snac2/xs_openssl.h

239 lines
5.5 KiB
C
Raw Permalink Normal View History

2023-07-28 09:34:18 +00:00
/* copyright (c) 2022 - 2023 grunfink et al. / MIT license */
2022-09-19 18:41:11 +00:00
#ifndef _XS_OPENSSL_H
#define _XS_OPENSSL_H
2023-03-30 09:17:27 +00:00
xs_str *_xs_digest(const xs_val *input, int size, const char *digest, int as_hex);
2023-05-17 08:08:57 +00:00
#ifndef _XS_MD5_H
2023-03-30 09:17:27 +00:00
#define xs_md5_hex(input, size) _xs_digest(input, size, "md5", 1)
2023-05-17 08:08:57 +00:00
#endif /* XS_MD5_H */
#ifndef _XS_BASE64_H
xs_str *xs_base64_enc(const xs_val *data, int sz);
xs_val *xs_base64_dec(const xs_str *data, int *size);
#endif /* XS_BASE64_H */
2023-03-30 09:17:27 +00:00
#define xs_sha1_hex(input, size) _xs_digest(input, size, "sha1", 1)
#define xs_sha256_hex(input, size) _xs_digest(input, size, "sha256", 1)
#define xs_sha256_base64(input, size) _xs_digest(input, size, "sha256", 0)
xs_dict *xs_evp_genkey(int bits);
2023-01-28 16:49:02 +00:00
xs_str *xs_evp_sign(const char *secret, const char *mem, int size);
2022-10-08 05:00:05 +00:00
int xs_evp_verify(const char *pubkey, const char *mem, int size, const char *b64sig);
2022-09-19 18:41:11 +00:00
#ifdef XS_IMPLEMENTATION
#include "openssl/rsa.h"
#include "openssl/pem.h"
2022-09-26 12:44:53 +00:00
#include "openssl/evp.h"
2022-09-19 18:41:11 +00:00
2023-05-17 08:08:57 +00:00
#ifndef _XS_BASE64_H
2023-05-11 08:48:37 +00:00
xs_str *xs_base64_enc(const xs_val *data, int sz)
/* encodes data to base64 */
{
BIO *mem, *b64;
BUF_MEM *bptr;
b64 = BIO_new(BIO_f_base64());
mem = BIO_new(BIO_s_mem());
b64 = BIO_push(b64, mem);
BIO_set_flags(b64, BIO_FLAGS_BASE64_NO_NL);
BIO_write(b64, data, sz);
BIO_flush(b64);
BIO_get_mem_ptr(b64, &bptr);
int n = bptr->length;
xs_str *s = xs_realloc(NULL, _xs_blk_size(n + 1));
memcpy(s, bptr->data, n);
s[n] = '\0';
BIO_free_all(b64);
return s;
}
xs_val *xs_base64_dec(const xs_str *data, int *size)
/* decodes data from base64 */
{
BIO *b64, *mem;
*size = strlen(data);
b64 = BIO_new(BIO_f_base64());
mem = BIO_new_mem_buf(data, *size);
b64 = BIO_push(b64, mem);
BIO_set_flags(b64, BIO_FLAGS_BASE64_NO_NL);
/* alloc a very big buffer */
xs_str *s = xs_realloc(NULL, *size);
*size = BIO_read(b64, s, *size);
/* adjust to current size */
s = xs_realloc(s, _xs_blk_size(*size + 1));
s[*size] = '\0';
BIO_free_all(mem);
return s;
}
2023-05-17 08:08:57 +00:00
#endif /* _XS_BASE64_H */
2023-05-11 08:48:37 +00:00
2023-03-30 09:17:27 +00:00
xs_str *_xs_digest(const xs_val *input, int size, const char *digest, int as_hex)
/* generic function for generating and encoding digests */
2022-09-21 07:17:59 +00:00
{
2023-03-30 09:17:27 +00:00
const EVP_MD *md;
2022-09-19 18:41:11 +00:00
2023-03-30 09:17:27 +00:00
if ((md = EVP_get_digestbyname(digest)) == NULL)
return NULL;
2022-09-19 18:41:11 +00:00
2023-03-30 09:17:27 +00:00
unsigned char output[1024];
unsigned int out_size;
EVP_MD_CTX *mdctx;
2022-09-21 07:17:59 +00:00
2023-03-30 09:17:27 +00:00
mdctx = EVP_MD_CTX_new();
EVP_DigestInit_ex(mdctx, md, NULL);
EVP_DigestUpdate(mdctx, input, size);
EVP_DigestFinal_ex(mdctx, output, &out_size);
EVP_MD_CTX_free(mdctx);
2022-09-21 07:17:59 +00:00
2023-03-30 09:17:27 +00:00
return as_hex ? xs_hex_enc ((char *)output, out_size) :
xs_base64_enc((char *)output, out_size);
2022-09-21 07:17:59 +00:00
}
xs_dict *xs_evp_genkey(int bits)
/* generates an RSA keypair using the EVP interface */
2022-09-19 18:41:11 +00:00
{
2023-01-28 16:49:02 +00:00
xs_dict *keypair = NULL;
EVP_PKEY_CTX *ctx;
EVP_PKEY *pkey = NULL;
2022-09-19 18:41:11 +00:00
if ((ctx = EVP_PKEY_CTX_new_id(EVP_PKEY_RSA, NULL)) == NULL)
goto end;
2022-09-19 18:41:11 +00:00
if (EVP_PKEY_keygen_init(ctx) <= 0 ||
EVP_PKEY_CTX_set_rsa_keygen_bits(ctx, bits) <= 0 ||
EVP_PKEY_keygen(ctx, &pkey) <= 0)
goto end;
2022-09-19 18:41:11 +00:00
BIO *bs = BIO_new(BIO_s_mem());
BIO *bp = BIO_new(BIO_s_mem());
BUF_MEM *sptr;
BUF_MEM *pptr;
2022-09-19 18:41:11 +00:00
PEM_write_bio_PrivateKey(bs, pkey, NULL, NULL, 0, 0, NULL);
BIO_get_mem_ptr(bs, &sptr);
2022-09-19 18:41:11 +00:00
PEM_write_bio_PUBKEY(bp, pkey);
BIO_get_mem_ptr(bp, &pptr);
2022-09-19 18:41:11 +00:00
keypair = xs_dict_new();
2022-09-19 18:41:11 +00:00
keypair = xs_dict_append(keypair, "secret", sptr->data);
keypair = xs_dict_append(keypair, "public", pptr->data);
2022-09-19 18:41:11 +00:00
BIO_free(bs);
BIO_free(bp);
2022-09-19 18:41:11 +00:00
end:
return keypair;
2022-09-19 18:41:11 +00:00
}
2022-09-26 12:44:53 +00:00
2023-01-28 16:49:02 +00:00
xs_str *xs_evp_sign(const char *secret, const char *mem, int size)
2022-09-26 12:44:53 +00:00
/* signs a memory block (secret is in PEM format) */
{
2023-01-28 16:49:02 +00:00
xs_str *signature = NULL;
2022-09-26 12:44:53 +00:00
BIO *b;
unsigned char *sig;
unsigned int sig_len;
EVP_PKEY *pkey;
EVP_MD_CTX *mdctx;
const EVP_MD *md;
/* un-PEM the key */
b = BIO_new_mem_buf(secret, strlen(secret));
pkey = PEM_read_bio_PrivateKey(b, NULL, NULL, NULL);
2022-09-26 16:40:46 +00:00
/* I've learnt all these magical incantations by watching
the Python module code and the OpenSSL manual pages */
2022-09-27 08:03:41 +00:00
/* Well, "learnt" may be an overstatement */
2022-09-26 16:40:46 +00:00
2022-09-26 12:44:53 +00:00
md = EVP_get_digestbyname("sha256");
mdctx = EVP_MD_CTX_new();
sig_len = EVP_PKEY_size(pkey);
2022-10-07 11:48:53 +00:00
sig = xs_realloc(NULL, sig_len);
2022-09-26 12:44:53 +00:00
EVP_SignInit(mdctx, md);
EVP_SignUpdate(mdctx, mem, size);
if (EVP_SignFinal(mdctx, sig, &sig_len, pkey) == 1)
signature = xs_base64_enc((char *)sig, sig_len);
EVP_MD_CTX_free(mdctx);
2022-09-29 12:16:20 +00:00
EVP_PKEY_free(pkey);
2022-09-26 12:44:53 +00:00
BIO_free(b);
2022-10-25 07:32:41 +00:00
xs_free(sig);
2022-09-26 12:44:53 +00:00
return signature;
}
2022-10-08 05:00:05 +00:00
int xs_evp_verify(const char *pubkey, const char *mem, int size, const char *b64sig)
2022-09-29 12:16:20 +00:00
/* verifies a base64 block, returns non-zero on ok */
{
int r = 0;
BIO *b;
EVP_PKEY *pkey;
EVP_MD_CTX *mdctx;
const EVP_MD *md;
/* un-PEM the key */
b = BIO_new_mem_buf(pubkey, strlen(pubkey));
pkey = PEM_read_bio_PUBKEY(b, NULL, NULL, NULL);
md = EVP_get_digestbyname("sha256");
mdctx = EVP_MD_CTX_new();
if (pkey != NULL) {
xs *sig = NULL;
int s_size;
/* de-base64 */
sig = xs_base64_dec(b64sig, &s_size);
if (sig != NULL) {
EVP_VerifyInit(mdctx, md);
EVP_VerifyUpdate(mdctx, mem, size);
r = EVP_VerifyFinal(mdctx, (unsigned char *)sig, s_size, pkey);
}
}
EVP_MD_CTX_free(mdctx);
EVP_PKEY_free(pkey);
BIO_free(b);
return r;
}
2022-09-19 18:41:11 +00:00
#endif /* XS_IMPLEMENTATION */
#endif /* _XS_OPENSSL_H */