mirror of
https://github.com/oopuuu/zTC1.git
synced 2025-12-07 10:52:48 +08:00
修复mico-sdk错误
This commit is contained in:
@@ -1,22 +1,22 @@
|
||||
#
|
||||
# UNPUBLISHED PROPRIETARY SOURCE CODE
|
||||
# Copyright (c) 2016 MXCHIP Inc.
|
||||
#
|
||||
# The contents of this file may not be disclosed to third parties, copied or
|
||||
# duplicated in any form, in whole or in part, without the prior written
|
||||
# permission of MXCHIP Corporation.
|
||||
#
|
||||
|
||||
NAME := Lib_MiCO_Security_SRP_6a
|
||||
|
||||
GLOBAL_INCLUDES:= inc
|
||||
|
||||
#SRP-6a
|
||||
ifneq ($(wildcard $(CURDIR)Lib_SRP6a.$(HOST_ARCH).$(TOOLCHAIN_NAME).release.a),)
|
||||
$(NAME)_PREBUILT_LIBRARY := Lib_SRP6a.$(HOST_ARCH).$(TOOLCHAIN_NAME).release.a
|
||||
else
|
||||
# Build from source
|
||||
include $(CURDIR)SRP_6a_src.mk
|
||||
endif
|
||||
|
||||
|
||||
#
|
||||
# UNPUBLISHED PROPRIETARY SOURCE CODE
|
||||
# Copyright (c) 2016 MXCHIP Inc.
|
||||
#
|
||||
# The contents of this file may not be disclosed to third parties, copied or
|
||||
# duplicated in any form, in whole or in part, without the prior written
|
||||
# permission of MXCHIP Corporation.
|
||||
#
|
||||
|
||||
NAME := Lib_MiCO_Security_SRP_6a
|
||||
|
||||
GLOBAL_INCLUDES:= inc
|
||||
|
||||
#SRP-6a
|
||||
ifneq ($(wildcard $(CURDIR)Lib_SRP6a.$(HOST_ARCH).$(TOOLCHAIN_NAME).release.a),)
|
||||
$(NAME)_PREBUILT_LIBRARY := Lib_SRP6a.$(HOST_ARCH).$(TOOLCHAIN_NAME).release.a
|
||||
else
|
||||
# Build from source
|
||||
include $(CURDIR)SRP_6a_src.mk
|
||||
endif
|
||||
|
||||
|
||||
|
||||
@@ -1,22 +1,22 @@
|
||||
#
|
||||
# Copyright 2016, MXCHIP Corporation
|
||||
# All Rights Reserved.
|
||||
#
|
||||
|
||||
|
||||
SRP_6a_DIR := Lib_SRP6a
|
||||
|
||||
$(NAME)_SOURCES := \
|
||||
$(SRP_6a_DIR)/bn_add.c \
|
||||
$(SRP_6a_DIR)/bn_asm.c \
|
||||
$(SRP_6a_DIR)/bn_ctx.c \
|
||||
$(SRP_6a_DIR)/bn_div.c \
|
||||
$(SRP_6a_DIR)/bn_exp.c \
|
||||
$(SRP_6a_DIR)/bn_lib.c \
|
||||
$(SRP_6a_DIR)/bn_mul.c \
|
||||
$(SRP_6a_DIR)/bn_shift.c \
|
||||
$(SRP_6a_DIR)/bn_sqr.c \
|
||||
$(SRP_6a_DIR)/srp.c
|
||||
|
||||
$(NAME)_INCLUDES := inc
|
||||
|
||||
#
|
||||
# Copyright 2016, MXCHIP Corporation
|
||||
# All Rights Reserved.
|
||||
#
|
||||
|
||||
|
||||
SRP_6a_DIR := Lib_SRP6a
|
||||
|
||||
$(NAME)_SOURCES := \
|
||||
$(SRP_6a_DIR)/bn_add.c \
|
||||
$(SRP_6a_DIR)/bn_asm.c \
|
||||
$(SRP_6a_DIR)/bn_ctx.c \
|
||||
$(SRP_6a_DIR)/bn_div.c \
|
||||
$(SRP_6a_DIR)/bn_exp.c \
|
||||
$(SRP_6a_DIR)/bn_lib.c \
|
||||
$(SRP_6a_DIR)/bn_mul.c \
|
||||
$(SRP_6a_DIR)/bn_shift.c \
|
||||
$(SRP_6a_DIR)/bn_sqr.c \
|
||||
$(SRP_6a_DIR)/srp.c
|
||||
|
||||
$(NAME)_INCLUDES := inc
|
||||
|
||||
|
||||
358
mico-os/MiCO/security/SRP_6a/inc/srp.h
Executable file → Normal file
358
mico-os/MiCO/security/SRP_6a/inc/srp.h
Executable file → Normal file
@@ -1,179 +1,179 @@
|
||||
/*
|
||||
* Secure Remote Password 6a implementation
|
||||
* Copyright (c) 2010 Tom Cocagne. All rights reserved.
|
||||
* https://github.com/cocagne/csrp
|
||||
*
|
||||
* The MIT License (MIT)
|
||||
*
|
||||
* Copyright (c) 2013 Tom Cocagne
|
||||
*
|
||||
* Permission is hereby granted, free of charge, to any person obtaining a copy of
|
||||
* this software and associated documentation files (the "Software"), to deal in
|
||||
* the Software without restriction, including without limitation the rights to
|
||||
* use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies
|
||||
* of the Software, and to permit persons to whom the Software is furnished to do
|
||||
* so, subject to the following conditions:
|
||||
*
|
||||
* The above copyright notice and this permission notice shall be included in all
|
||||
* copies or substantial portions of the Software.
|
||||
*
|
||||
* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
||||
* IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
||||
* FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
|
||||
* AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
|
||||
* LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
|
||||
* OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
|
||||
* SOFTWARE.
|
||||
*
|
||||
*/
|
||||
|
||||
/*
|
||||
*
|
||||
* Purpose: This is a direct implementation of the Secure Remote Password
|
||||
* Protocol version 6a as described by
|
||||
* http://srp.stanford.edu/design.html
|
||||
*
|
||||
* Author: tom.cocagne@gmail.com (Tom Cocagne)
|
||||
*
|
||||
* Dependencies: OpenSSL (and Advapi32.lib on Windows)
|
||||
*
|
||||
* Usage: Refer to test_srp.c for a demonstration
|
||||
*
|
||||
* Notes:
|
||||
* This library allows multiple combinations of hashing algorithms and
|
||||
* prime number constants. For authentication to succeed, the hash and
|
||||
* prime number constants must match between
|
||||
* srp_create_salted_verification_key(), srp_user_new(),
|
||||
* and srp_verifier_new(). A recommended approach is to determine the
|
||||
* desired level of security for an application and globally define the
|
||||
* hash and prime number constants to the predetermined values.
|
||||
*
|
||||
* As one might suspect, more bits means more security. As one might also
|
||||
* suspect, more bits also means more processing time. The test_srp.c
|
||||
* program can be easily modified to profile various combinations of
|
||||
* hash & prime number pairings.
|
||||
*/
|
||||
|
||||
#ifndef SRP_H
|
||||
#define SRP_H
|
||||
|
||||
#include "common.h"
|
||||
#include "debug.h"
|
||||
|
||||
struct SRPVerifier;
|
||||
|
||||
#define PlatformRandomBytes MicoRandomNumberRead
|
||||
|
||||
typedef enum
|
||||
{
|
||||
SRP_NG_1024,
|
||||
SRP_NG_2048,
|
||||
SRP_NG_3072,
|
||||
SRP_NG_4096,
|
||||
SRP_NG_8192,
|
||||
SRP_NG_CUSTOM
|
||||
} SRP_NGType;
|
||||
|
||||
typedef enum
|
||||
{
|
||||
SRP_SHA1,
|
||||
SRP_SHA224,
|
||||
SRP_SHA256,
|
||||
SRP_SHA384,
|
||||
SRP_SHA512
|
||||
} SRP_HashAlgorithm;
|
||||
|
||||
/*Pair info*/
|
||||
typedef struct _srp_server_t {
|
||||
SRP_HashAlgorithm alg;
|
||||
bool authenticated;
|
||||
SRP_NGType ng_type;
|
||||
const char * n_hex;
|
||||
const char * g_hex;
|
||||
char *username;
|
||||
unsigned char *bytes_s;
|
||||
int len_s;
|
||||
unsigned char *bytes_B;
|
||||
int len_B;
|
||||
unsigned char *bytes_b;
|
||||
int len_b;
|
||||
unsigned char *bytes_v;
|
||||
int len_v;
|
||||
unsigned char *session_key;
|
||||
int len_session_key;
|
||||
unsigned char *bytes_M;
|
||||
int len_M;
|
||||
unsigned char *bytes_AMK;
|
||||
int len_AMK;
|
||||
} srp_server_t;
|
||||
|
||||
|
||||
|
||||
/* Out: bytes_s, len_s, bytes_v, len_v
|
||||
*
|
||||
* The caller is responsible for freeing the memory allocated for bytes_s and bytes_v
|
||||
*
|
||||
* The n_hex and g_hex parameters should be 0 unless SRP_NG_CUSTOM is used for ng_type.
|
||||
* If provided, they must contain ASCII text of the hexidecimal notation.
|
||||
*/
|
||||
void srp_create_salted_verification_key( SRP_HashAlgorithm alg,
|
||||
SRP_NGType ng_type, const char * username,
|
||||
const unsigned char * password, int len_password,
|
||||
const unsigned char ** bytes_s, int * len_s,
|
||||
const unsigned char ** bytes_v, int * len_v,
|
||||
const unsigned char ** bytes_B, int * len_B,
|
||||
const unsigned char ** bytes_b, int * len_b,
|
||||
const char * n_hex, const char * g_hex );
|
||||
|
||||
srp_server_t* srp_server_setup( SRP_HashAlgorithm alg,
|
||||
SRP_NGType ng_type, const char * username,
|
||||
const unsigned char * password, int len_password,
|
||||
const unsigned char * verifier, int len_verifier,
|
||||
const unsigned char * salt, int len_salt,
|
||||
const char * n_hex, const char * g_hex );
|
||||
|
||||
OSStatus srp_server_generate_session_key( srp_server_t* server, const unsigned char * bytes_A, int len_A );
|
||||
|
||||
void srp_server_verify_session( srp_server_t* server, const unsigned char * user_M, const unsigned char ** bytes_HAMK );
|
||||
|
||||
void srp_server_delete( srp_server_t** server);
|
||||
|
||||
|
||||
|
||||
/* Out: bytes_B, len_B.
|
||||
*
|
||||
* On failure, bytes_B will be set to NULL and len_B will be set to 0
|
||||
*
|
||||
* The n_hex and g_hex parameters should be 0 unless SRP_NG_CUSTOM is used for ng_type
|
||||
*/
|
||||
struct SRPVerifier * srp_verifier_new( SRP_HashAlgorithm alg, SRP_NGType ng_type, const char * username,
|
||||
const unsigned char * bytes_s, int len_s,
|
||||
const unsigned char * bytes_v, int len_v,
|
||||
const unsigned char * bytes_A, int len_A,
|
||||
const unsigned char * bytes_B, int len_B,
|
||||
const unsigned char * bytes_b, int len_b,
|
||||
const char * n_hex, const char * g_hex );
|
||||
|
||||
|
||||
void srp_verifier_delete( struct SRPVerifier * ver );
|
||||
|
||||
|
||||
int srp_verifier_is_authenticated( struct SRPVerifier * ver );
|
||||
|
||||
|
||||
const char * srp_verifier_get_username( struct SRPVerifier * ver );
|
||||
|
||||
/* key_length may be null */
|
||||
const unsigned char * srp_verifier_get_session_key( struct SRPVerifier * ver, int * key_length );
|
||||
|
||||
|
||||
int srp_verifier_get_session_key_length( struct SRPVerifier * ver );
|
||||
|
||||
|
||||
/* user_M must be exactly srp_verifier_get_session_key_length() bytes in size */
|
||||
void srp_verifier_verify_session( struct SRPVerifier * ver,
|
||||
const unsigned char * user_M,
|
||||
const unsigned char ** bytes_HAMK );
|
||||
|
||||
#endif /* Include Guard */
|
||||
|
||||
/*
|
||||
* Secure Remote Password 6a implementation
|
||||
* Copyright (c) 2010 Tom Cocagne. All rights reserved.
|
||||
* https://github.com/cocagne/csrp
|
||||
*
|
||||
* The MIT License (MIT)
|
||||
*
|
||||
* Copyright (c) 2013 Tom Cocagne
|
||||
*
|
||||
* Permission is hereby granted, free of charge, to any person obtaining a copy of
|
||||
* this software and associated documentation files (the "Software"), to deal in
|
||||
* the Software without restriction, including without limitation the rights to
|
||||
* use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies
|
||||
* of the Software, and to permit persons to whom the Software is furnished to do
|
||||
* so, subject to the following conditions:
|
||||
*
|
||||
* The above copyright notice and this permission notice shall be included in all
|
||||
* copies or substantial portions of the Software.
|
||||
*
|
||||
* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
||||
* IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
||||
* FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
|
||||
* AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
|
||||
* LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
|
||||
* OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
|
||||
* SOFTWARE.
|
||||
*
|
||||
*/
|
||||
|
||||
/*
|
||||
*
|
||||
* Purpose: This is a direct implementation of the Secure Remote Password
|
||||
* Protocol version 6a as described by
|
||||
* http://srp.stanford.edu/design.html
|
||||
*
|
||||
* Author: tom.cocagne@gmail.com (Tom Cocagne)
|
||||
*
|
||||
* Dependencies: OpenSSL (and Advapi32.lib on Windows)
|
||||
*
|
||||
* Usage: Refer to test_srp.c for a demonstration
|
||||
*
|
||||
* Notes:
|
||||
* This library allows multiple combinations of hashing algorithms and
|
||||
* prime number constants. For authentication to succeed, the hash and
|
||||
* prime number constants must match between
|
||||
* srp_create_salted_verification_key(), srp_user_new(),
|
||||
* and srp_verifier_new(). A recommended approach is to determine the
|
||||
* desired level of security for an application and globally define the
|
||||
* hash and prime number constants to the predetermined values.
|
||||
*
|
||||
* As one might suspect, more bits means more security. As one might also
|
||||
* suspect, more bits also means more processing time. The test_srp.c
|
||||
* program can be easily modified to profile various combinations of
|
||||
* hash & prime number pairings.
|
||||
*/
|
||||
|
||||
#ifndef SRP_H
|
||||
#define SRP_H
|
||||
|
||||
#include "common.h"
|
||||
#include "debug.h"
|
||||
|
||||
struct SRPVerifier;
|
||||
|
||||
#define PlatformRandomBytes MicoRandomNumberRead
|
||||
|
||||
typedef enum
|
||||
{
|
||||
SRP_NG_1024,
|
||||
SRP_NG_2048,
|
||||
SRP_NG_3072,
|
||||
SRP_NG_4096,
|
||||
SRP_NG_8192,
|
||||
SRP_NG_CUSTOM
|
||||
} SRP_NGType;
|
||||
|
||||
typedef enum
|
||||
{
|
||||
SRP_SHA1,
|
||||
SRP_SHA224,
|
||||
SRP_SHA256,
|
||||
SRP_SHA384,
|
||||
SRP_SHA512
|
||||
} SRP_HashAlgorithm;
|
||||
|
||||
/*Pair info*/
|
||||
typedef struct _srp_server_t {
|
||||
SRP_HashAlgorithm alg;
|
||||
bool authenticated;
|
||||
SRP_NGType ng_type;
|
||||
const char * n_hex;
|
||||
const char * g_hex;
|
||||
char *username;
|
||||
unsigned char *bytes_s;
|
||||
int len_s;
|
||||
unsigned char *bytes_B;
|
||||
int len_B;
|
||||
unsigned char *bytes_b;
|
||||
int len_b;
|
||||
unsigned char *bytes_v;
|
||||
int len_v;
|
||||
unsigned char *session_key;
|
||||
int len_session_key;
|
||||
unsigned char *bytes_M;
|
||||
int len_M;
|
||||
unsigned char *bytes_AMK;
|
||||
int len_AMK;
|
||||
} srp_server_t;
|
||||
|
||||
|
||||
|
||||
/* Out: bytes_s, len_s, bytes_v, len_v
|
||||
*
|
||||
* The caller is responsible for freeing the memory allocated for bytes_s and bytes_v
|
||||
*
|
||||
* The n_hex and g_hex parameters should be 0 unless SRP_NG_CUSTOM is used for ng_type.
|
||||
* If provided, they must contain ASCII text of the hexidecimal notation.
|
||||
*/
|
||||
void srp_create_salted_verification_key( SRP_HashAlgorithm alg,
|
||||
SRP_NGType ng_type, const char * username,
|
||||
const unsigned char * password, int len_password,
|
||||
const unsigned char ** bytes_s, int * len_s,
|
||||
const unsigned char ** bytes_v, int * len_v,
|
||||
const unsigned char ** bytes_B, int * len_B,
|
||||
const unsigned char ** bytes_b, int * len_b,
|
||||
const char * n_hex, const char * g_hex );
|
||||
|
||||
srp_server_t* srp_server_setup( SRP_HashAlgorithm alg,
|
||||
SRP_NGType ng_type, const char * username,
|
||||
const unsigned char * password, int len_password,
|
||||
const unsigned char * verifier, int len_verifier,
|
||||
const unsigned char * salt, int len_salt,
|
||||
const char * n_hex, const char * g_hex );
|
||||
|
||||
OSStatus srp_server_generate_session_key( srp_server_t* server, const unsigned char * bytes_A, int len_A );
|
||||
|
||||
void srp_server_verify_session( srp_server_t* server, const unsigned char * user_M, const unsigned char ** bytes_HAMK );
|
||||
|
||||
void srp_server_delete( srp_server_t** server);
|
||||
|
||||
|
||||
|
||||
/* Out: bytes_B, len_B.
|
||||
*
|
||||
* On failure, bytes_B will be set to NULL and len_B will be set to 0
|
||||
*
|
||||
* The n_hex and g_hex parameters should be 0 unless SRP_NG_CUSTOM is used for ng_type
|
||||
*/
|
||||
struct SRPVerifier * srp_verifier_new( SRP_HashAlgorithm alg, SRP_NGType ng_type, const char * username,
|
||||
const unsigned char * bytes_s, int len_s,
|
||||
const unsigned char * bytes_v, int len_v,
|
||||
const unsigned char * bytes_A, int len_A,
|
||||
const unsigned char * bytes_B, int len_B,
|
||||
const unsigned char * bytes_b, int len_b,
|
||||
const char * n_hex, const char * g_hex );
|
||||
|
||||
|
||||
void srp_verifier_delete( struct SRPVerifier * ver );
|
||||
|
||||
|
||||
int srp_verifier_is_authenticated( struct SRPVerifier * ver );
|
||||
|
||||
|
||||
const char * srp_verifier_get_username( struct SRPVerifier * ver );
|
||||
|
||||
/* key_length may be null */
|
||||
const unsigned char * srp_verifier_get_session_key( struct SRPVerifier * ver, int * key_length );
|
||||
|
||||
|
||||
int srp_verifier_get_session_key_length( struct SRPVerifier * ver );
|
||||
|
||||
|
||||
/* user_M must be exactly srp_verifier_get_session_key_length() bytes in size */
|
||||
void srp_verifier_verify_session( struct SRPVerifier * ver,
|
||||
const unsigned char * user_M,
|
||||
const unsigned char ** bytes_HAMK );
|
||||
|
||||
#endif /* Include Guard */
|
||||
|
||||
|
||||
Reference in New Issue
Block a user