11305e95ba6ff9fa202d0818caf10405df4b0f648Mike Lockwood/* $OpenBSD: cipher.h,v 1.37 2009/01/26 09:58:15 markus Exp $ */
21305e95ba6ff9fa202d0818caf10405df4b0f648Mike Lockwood
31305e95ba6ff9fa202d0818caf10405df4b0f648Mike Lockwood/*
41305e95ba6ff9fa202d0818caf10405df4b0f648Mike Lockwood * Author: Tatu Ylonen <ylo@cs.hut.fi>
51305e95ba6ff9fa202d0818caf10405df4b0f648Mike Lockwood * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
61305e95ba6ff9fa202d0818caf10405df4b0f648Mike Lockwood *                    All rights reserved
71305e95ba6ff9fa202d0818caf10405df4b0f648Mike Lockwood *
81305e95ba6ff9fa202d0818caf10405df4b0f648Mike Lockwood * As far as I am concerned, the code I have written for this software
91305e95ba6ff9fa202d0818caf10405df4b0f648Mike Lockwood * can be used freely for any purpose.  Any derived versions of this
101305e95ba6ff9fa202d0818caf10405df4b0f648Mike Lockwood * software must be clearly marked as such, and if the derived work is
111305e95ba6ff9fa202d0818caf10405df4b0f648Mike Lockwood * incompatible with the protocol description in the RFC file, it must be
121305e95ba6ff9fa202d0818caf10405df4b0f648Mike Lockwood * called by a name other than "ssh" or "Secure Shell".
131305e95ba6ff9fa202d0818caf10405df4b0f648Mike Lockwood *
141305e95ba6ff9fa202d0818caf10405df4b0f648Mike Lockwood * Copyright (c) 2000 Markus Friedl.  All rights reserved.
151305e95ba6ff9fa202d0818caf10405df4b0f648Mike Lockwood *
161305e95ba6ff9fa202d0818caf10405df4b0f648Mike Lockwood * Redistribution and use in source and binary forms, with or without
171305e95ba6ff9fa202d0818caf10405df4b0f648Mike Lockwood * modification, are permitted provided that the following conditions
181305e95ba6ff9fa202d0818caf10405df4b0f648Mike Lockwood * are met:
191305e95ba6ff9fa202d0818caf10405df4b0f648Mike Lockwood * 1. Redistributions of source code must retain the above copyright
201305e95ba6ff9fa202d0818caf10405df4b0f648Mike Lockwood *    notice, this list of conditions and the following disclaimer.
211305e95ba6ff9fa202d0818caf10405df4b0f648Mike Lockwood * 2. Redistributions in binary form must reproduce the above copyright
221305e95ba6ff9fa202d0818caf10405df4b0f648Mike Lockwood *    notice, this list of conditions and the following disclaimer in the
231305e95ba6ff9fa202d0818caf10405df4b0f648Mike Lockwood *    documentation and/or other materials provided with the distribution.
241305e95ba6ff9fa202d0818caf10405df4b0f648Mike Lockwood *
251305e95ba6ff9fa202d0818caf10405df4b0f648Mike Lockwood * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
261305e95ba6ff9fa202d0818caf10405df4b0f648Mike Lockwood * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
271305e95ba6ff9fa202d0818caf10405df4b0f648Mike Lockwood * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
281305e95ba6ff9fa202d0818caf10405df4b0f648Mike Lockwood * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
291305e95ba6ff9fa202d0818caf10405df4b0f648Mike Lockwood * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
301305e95ba6ff9fa202d0818caf10405df4b0f648Mike Lockwood * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
311305e95ba6ff9fa202d0818caf10405df4b0f648Mike Lockwood * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
321305e95ba6ff9fa202d0818caf10405df4b0f648Mike Lockwood * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
331305e95ba6ff9fa202d0818caf10405df4b0f648Mike Lockwood * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
341305e95ba6ff9fa202d0818caf10405df4b0f648Mike Lockwood * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
351305e95ba6ff9fa202d0818caf10405df4b0f648Mike Lockwood */
361305e95ba6ff9fa202d0818caf10405df4b0f648Mike Lockwood
371305e95ba6ff9fa202d0818caf10405df4b0f648Mike Lockwood#ifndef CIPHER_H
381305e95ba6ff9fa202d0818caf10405df4b0f648Mike Lockwood#define CIPHER_H
391305e95ba6ff9fa202d0818caf10405df4b0f648Mike Lockwood
401305e95ba6ff9fa202d0818caf10405df4b0f648Mike Lockwood#include <openssl/evp.h>
411305e95ba6ff9fa202d0818caf10405df4b0f648Mike Lockwood/*
421305e95ba6ff9fa202d0818caf10405df4b0f648Mike Lockwood * Cipher types for SSH-1.  New types can be added, but old types should not
431305e95ba6ff9fa202d0818caf10405df4b0f648Mike Lockwood * be removed for compatibility.  The maximum allowed value is 31.
441305e95ba6ff9fa202d0818caf10405df4b0f648Mike Lockwood */
451305e95ba6ff9fa202d0818caf10405df4b0f648Mike Lockwood#define SSH_CIPHER_SSH2		-3
461305e95ba6ff9fa202d0818caf10405df4b0f648Mike Lockwood#define SSH_CIPHER_INVALID	-2	/* No valid cipher selected. */
471305e95ba6ff9fa202d0818caf10405df4b0f648Mike Lockwood#define SSH_CIPHER_NOT_SET	-1	/* None selected (invalid number). */
481305e95ba6ff9fa202d0818caf10405df4b0f648Mike Lockwood#define SSH_CIPHER_NONE		0	/* no encryption */
491305e95ba6ff9fa202d0818caf10405df4b0f648Mike Lockwood#define SSH_CIPHER_IDEA		1	/* IDEA CFB */
501305e95ba6ff9fa202d0818caf10405df4b0f648Mike Lockwood#define SSH_CIPHER_DES		2	/* DES CBC */
511305e95ba6ff9fa202d0818caf10405df4b0f648Mike Lockwood#define SSH_CIPHER_3DES		3	/* 3DES CBC */
521305e95ba6ff9fa202d0818caf10405df4b0f648Mike Lockwood#define SSH_CIPHER_BROKEN_TSS	4	/* TRI's Simple Stream encryption CBC */
531305e95ba6ff9fa202d0818caf10405df4b0f648Mike Lockwood#define SSH_CIPHER_BROKEN_RC4	5	/* Alleged RC4 */
541305e95ba6ff9fa202d0818caf10405df4b0f648Mike Lockwood#define SSH_CIPHER_BLOWFISH	6
551305e95ba6ff9fa202d0818caf10405df4b0f648Mike Lockwood#define SSH_CIPHER_RESERVED	7
561305e95ba6ff9fa202d0818caf10405df4b0f648Mike Lockwood#define SSH_CIPHER_MAX		31
571305e95ba6ff9fa202d0818caf10405df4b0f648Mike Lockwood
581305e95ba6ff9fa202d0818caf10405df4b0f648Mike Lockwood#define CIPHER_ENCRYPT		1
591305e95ba6ff9fa202d0818caf10405df4b0f648Mike Lockwood#define CIPHER_DECRYPT		0
601305e95ba6ff9fa202d0818caf10405df4b0f648Mike Lockwood
611305e95ba6ff9fa202d0818caf10405df4b0f648Mike Lockwoodtypedef struct Cipher Cipher;
621305e95ba6ff9fa202d0818caf10405df4b0f648Mike Lockwoodtypedef struct CipherContext CipherContext;
631305e95ba6ff9fa202d0818caf10405df4b0f648Mike Lockwood
641305e95ba6ff9fa202d0818caf10405df4b0f648Mike Lockwoodstruct Cipher;
651305e95ba6ff9fa202d0818caf10405df4b0f648Mike Lockwoodstruct CipherContext {
661305e95ba6ff9fa202d0818caf10405df4b0f648Mike Lockwood	int	plaintext;
671305e95ba6ff9fa202d0818caf10405df4b0f648Mike Lockwood	EVP_CIPHER_CTX evp;
681305e95ba6ff9fa202d0818caf10405df4b0f648Mike Lockwood	Cipher *cipher;
691305e95ba6ff9fa202d0818caf10405df4b0f648Mike Lockwood};
701305e95ba6ff9fa202d0818caf10405df4b0f648Mike Lockwood
711305e95ba6ff9fa202d0818caf10405df4b0f648Mike Lockwoodu_int	 cipher_mask_ssh1(int);
721305e95ba6ff9fa202d0818caf10405df4b0f648Mike LockwoodCipher	*cipher_by_name(const char *);
731305e95ba6ff9fa202d0818caf10405df4b0f648Mike LockwoodCipher	*cipher_by_number(int);
741305e95ba6ff9fa202d0818caf10405df4b0f648Mike Lockwoodint	 cipher_number(const char *);
751305e95ba6ff9fa202d0818caf10405df4b0f648Mike Lockwoodchar	*cipher_name(int);
761305e95ba6ff9fa202d0818caf10405df4b0f648Mike Lockwoodint	 ciphers_valid(const char *);
771305e95ba6ff9fa202d0818caf10405df4b0f648Mike Lockwoodvoid	 cipher_init(CipherContext *, Cipher *, const u_char *, u_int,
781305e95ba6ff9fa202d0818caf10405df4b0f648Mike Lockwood    const u_char *, u_int, int);
791305e95ba6ff9fa202d0818caf10405df4b0f648Mike Lockwoodvoid	 cipher_crypt(CipherContext *, u_char *, const u_char *, u_int);
801305e95ba6ff9fa202d0818caf10405df4b0f648Mike Lockwoodvoid	 cipher_cleanup(CipherContext *);
811305e95ba6ff9fa202d0818caf10405df4b0f648Mike Lockwoodvoid	 cipher_set_key_string(CipherContext *, Cipher *, const char *, int);
821305e95ba6ff9fa202d0818caf10405df4b0f648Mike Lockwoodu_int	 cipher_blocksize(const Cipher *);
831305e95ba6ff9fa202d0818caf10405df4b0f648Mike Lockwoodu_int	 cipher_keylen(const Cipher *);
841305e95ba6ff9fa202d0818caf10405df4b0f648Mike Lockwoodu_int	 cipher_is_cbc(const Cipher *);
851305e95ba6ff9fa202d0818caf10405df4b0f648Mike Lockwood
861305e95ba6ff9fa202d0818caf10405df4b0f648Mike Lockwoodu_int	 cipher_get_number(const Cipher *);
871305e95ba6ff9fa202d0818caf10405df4b0f648Mike Lockwoodvoid	 cipher_get_keyiv(CipherContext *, u_char *, u_int);
881305e95ba6ff9fa202d0818caf10405df4b0f648Mike Lockwoodvoid	 cipher_set_keyiv(CipherContext *, u_char *);
891305e95ba6ff9fa202d0818caf10405df4b0f648Mike Lockwoodint	 cipher_get_keyiv_len(const CipherContext *);
901305e95ba6ff9fa202d0818caf10405df4b0f648Mike Lockwoodint	 cipher_get_keycontext(const CipherContext *, u_char *);
911305e95ba6ff9fa202d0818caf10405df4b0f648Mike Lockwoodvoid	 cipher_set_keycontext(CipherContext *, u_char *);
921305e95ba6ff9fa202d0818caf10405df4b0f648Mike Lockwood#endif				/* CIPHER_H */
93