2020-09-03 19:11:42 -04:00
|
|
|
package sshkeys
|
|
|
|
|
2020-09-11 23:06:51 -04:00
|
|
|
// Needed for V1 key format.
|
2020-09-03 19:11:42 -04:00
|
|
|
const (
|
2020-09-11 23:06:51 -04:00
|
|
|
KeyV1Magic string = "openssh-key-v1"
|
2020-09-03 19:11:42 -04:00
|
|
|
)
|
|
|
|
|
2020-09-17 08:37:05 -04:00
|
|
|
// "Meta". Used for comment strings, etc.
|
|
|
|
|
|
|
|
const projUrl = "https://git.square-r00t.net/SSHSecure"
|
|
|
|
|
|
|
|
// Defaults.
|
|
|
|
const (
|
|
|
|
defCipher string = CipherAes256Ctr
|
|
|
|
defKeyType string = KeyEd25519
|
|
|
|
defKDF string = KdfBcrypt
|
|
|
|
defRounds uint32 = 100
|
|
|
|
defRSABitSize uint32 = 4096
|
|
|
|
defSaltLen int = 16
|
2020-09-18 04:04:39 -04:00
|
|
|
// bcrypt_pbkdf maxes out at 32 for private key gen (sk is actually 64; sk+pk)
|
|
|
|
// But per OpenSSH code, we pass a key len of kdfKeyLen + len(salt)
|
|
|
|
kdfKeyLen int = 32
|
|
|
|
kdfSplit int = 32
|
2020-09-17 08:37:05 -04:00
|
|
|
)
|
|
|
|
|
2020-09-11 23:53:55 -04:00
|
|
|
// Cipher names. I believe only AES256-CTR is supported upstream currently.
|
2020-09-11 23:06:51 -04:00
|
|
|
const (
|
2020-09-17 08:37:05 -04:00
|
|
|
CipherNull string = "none"
|
|
|
|
CipherAes256Ctr string = "aes256-ctr"
|
2020-09-11 23:53:55 -04:00
|
|
|
)
|
|
|
|
|
2020-09-17 08:37:05 -04:00
|
|
|
var allowed_ciphers = [...]string{CipherNull, CipherAes256Ctr}
|
2020-09-12 00:58:58 -04:00
|
|
|
|
2020-09-11 23:53:55 -04:00
|
|
|
// Key types.
|
|
|
|
const (
|
2020-09-17 08:37:05 -04:00
|
|
|
KeyEd25519 string = "ssh-ed25519"
|
|
|
|
KeyRsa string = "ssh-rsa"
|
2020-09-11 23:53:55 -04:00
|
|
|
)
|
|
|
|
|
2020-09-17 08:37:05 -04:00
|
|
|
var allowed_keytypes = [...]string{KeyEd25519, KeyRsa}
|
2020-09-12 00:58:58 -04:00
|
|
|
|
2020-09-11 23:53:55 -04:00
|
|
|
// KDF names. I believe only bcrypt is supported upstream currently.
|
|
|
|
const (
|
2020-09-17 08:37:05 -04:00
|
|
|
KdfNull string = "none"
|
|
|
|
KdfBcrypt string = "bcrypt"
|
2020-09-11 23:06:51 -04:00
|
|
|
)
|
2020-09-12 00:58:58 -04:00
|
|
|
|
2020-09-17 08:37:05 -04:00
|
|
|
var allowed_kdfnames = [...]string{KdfNull, KdfBcrypt}
|
|
|
|
|
|
|
|
// Key lengths.
|
|
|
|
const (
|
|
|
|
// ED25519 in OpenSSH uses a static key size of 64 bytes.
|
|
|
|
ed25519Len uint32 = 64
|
|
|
|
)
|
|
|
|
|
|
|
|
// Key/Block sizes.
|
|
|
|
const (
|
2020-09-18 04:04:39 -04:00
|
|
|
keyEd25519 uint32 = 32
|
|
|
|
// Is this correct? Based on PROTOCOL.key's "padlen % 255", it seems to be.
|
|
|
|
blockPad uint32 = 255
|
2020-09-17 08:37:05 -04:00
|
|
|
blockEd25519 uint32 = 16
|
2020-09-18 04:04:39 -04:00
|
|
|
// Blocksize for RSA depends on key bits, I think.
|
|
|
|
blockNull uint32 = 8
|
2020-09-17 08:37:05 -04:00
|
|
|
)
|