1 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
2 | * All rights reserved. |
3 | * |
4 | * This package is an SSL implementation written |
5 | * by Eric Young (eay@cryptsoft.com). |
6 | * The implementation was written so as to conform with Netscapes SSL. |
7 | * |
8 | * This library is free for commercial and non-commercial use as long as |
9 | * the following conditions are aheared to. The following conditions |
10 | * apply to all code found in this distribution, be it the RC4, RSA, |
11 | * lhash, DES, etc., code; not just the SSL code. The SSL documentation |
12 | * included with this distribution is covered by the same copyright terms |
13 | * except that the holder is Tim Hudson (tjh@cryptsoft.com). |
14 | * |
15 | * Copyright remains Eric Young's, and as such any Copyright notices in |
16 | * the code are not to be removed. |
17 | * If this package is used in a product, Eric Young should be given attribution |
18 | * as the author of the parts of the library used. |
19 | * This can be in the form of a textual message at program startup or |
20 | * in documentation (online or textual) provided with the package. |
21 | * |
22 | * Redistribution and use in source and binary forms, with or without |
23 | * modification, are permitted provided that the following conditions |
24 | * are met: |
25 | * 1. Redistributions of source code must retain the copyright |
26 | * notice, this list of conditions and the following disclaimer. |
27 | * 2. Redistributions in binary form must reproduce the above copyright |
28 | * notice, this list of conditions and the following disclaimer in the |
29 | * documentation and/or other materials provided with the distribution. |
30 | * 3. All advertising materials mentioning features or use of this software |
31 | * must display the following acknowledgement: |
32 | * "This product includes cryptographic software written by |
33 | * Eric Young (eay@cryptsoft.com)" |
34 | * The word 'cryptographic' can be left out if the rouines from the library |
35 | * being used are not cryptographic related :-). |
36 | * 4. If you include any Windows specific code (or a derivative thereof) from |
37 | * the apps directory (application code) you must include an acknowledgement: |
38 | * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" |
39 | * |
40 | * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND |
41 | * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE |
42 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE |
43 | * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE |
44 | * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL |
45 | * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS |
46 | * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) |
47 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT |
48 | * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY |
49 | * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF |
50 | * SUCH DAMAGE. |
51 | * |
52 | * The licence and distribution terms for any publically available version or |
53 | * derivative of this code cannot be changed. i.e. this code cannot simply be |
54 | * copied and put under another distribution licence |
55 | * [including the GNU Public Licence.] */ |
56 | |
57 | #include <openssl/dh.h> |
58 | |
59 | #include <string.h> |
60 | |
61 | #include <openssl/bn.h> |
62 | #include <openssl/buf.h> |
63 | #include <openssl/err.h> |
64 | #include <openssl/ex_data.h> |
65 | #include <openssl/mem.h> |
66 | #include <openssl/thread.h> |
67 | |
68 | #include "../internal.h" |
69 | |
70 | |
71 | #define OPENSSL_DH_MAX_MODULUS_BITS 10000 |
72 | |
73 | static CRYPTO_EX_DATA_CLASS g_ex_data_class = CRYPTO_EX_DATA_CLASS_INIT; |
74 | |
75 | DH *DH_new(void) { |
76 | DH *dh = OPENSSL_malloc(sizeof(DH)); |
77 | if (dh == NULL) { |
78 | OPENSSL_PUT_ERROR(DH, ERR_R_MALLOC_FAILURE); |
79 | return NULL; |
80 | } |
81 | |
82 | OPENSSL_memset(dh, 0, sizeof(DH)); |
83 | |
84 | CRYPTO_MUTEX_init(&dh->method_mont_p_lock); |
85 | |
86 | dh->references = 1; |
87 | CRYPTO_new_ex_data(&dh->ex_data); |
88 | |
89 | return dh; |
90 | } |
91 | |
92 | void DH_free(DH *dh) { |
93 | if (dh == NULL) { |
94 | return; |
95 | } |
96 | |
97 | if (!CRYPTO_refcount_dec_and_test_zero(&dh->references)) { |
98 | return; |
99 | } |
100 | |
101 | CRYPTO_free_ex_data(&g_ex_data_class, dh, &dh->ex_data); |
102 | |
103 | BN_MONT_CTX_free(dh->method_mont_p); |
104 | BN_clear_free(dh->p); |
105 | BN_clear_free(dh->g); |
106 | BN_clear_free(dh->q); |
107 | BN_clear_free(dh->j); |
108 | OPENSSL_free(dh->seed); |
109 | BN_clear_free(dh->counter); |
110 | BN_clear_free(dh->pub_key); |
111 | BN_clear_free(dh->priv_key); |
112 | CRYPTO_MUTEX_cleanup(&dh->method_mont_p_lock); |
113 | |
114 | OPENSSL_free(dh); |
115 | } |
116 | |
117 | void DH_get0_key(const DH *dh, const BIGNUM **out_pub_key, |
118 | const BIGNUM **out_priv_key) { |
119 | if (out_pub_key != NULL) { |
120 | *out_pub_key = dh->pub_key; |
121 | } |
122 | if (out_priv_key != NULL) { |
123 | *out_priv_key = dh->priv_key; |
124 | } |
125 | } |
126 | |
127 | int DH_set0_key(DH *dh, BIGNUM *pub_key, BIGNUM *priv_key) { |
128 | if (pub_key != NULL) { |
129 | BN_free(dh->pub_key); |
130 | dh->pub_key = pub_key; |
131 | } |
132 | |
133 | if (priv_key != NULL) { |
134 | BN_free(dh->priv_key); |
135 | dh->priv_key = priv_key; |
136 | } |
137 | |
138 | return 1; |
139 | } |
140 | |
141 | void DH_get0_pqg(const DH *dh, const BIGNUM **out_p, const BIGNUM **out_q, |
142 | const BIGNUM **out_g) { |
143 | if (out_p != NULL) { |
144 | *out_p = dh->p; |
145 | } |
146 | if (out_q != NULL) { |
147 | *out_q = dh->q; |
148 | } |
149 | if (out_g != NULL) { |
150 | *out_g = dh->g; |
151 | } |
152 | } |
153 | |
154 | int DH_set0_pqg(DH *dh, BIGNUM *p, BIGNUM *q, BIGNUM *g) { |
155 | if ((dh->p == NULL && p == NULL) || |
156 | (dh->g == NULL && g == NULL)) { |
157 | return 0; |
158 | } |
159 | |
160 | if (p != NULL) { |
161 | BN_free(dh->p); |
162 | dh->p = p; |
163 | } |
164 | |
165 | if (q != NULL) { |
166 | BN_free(dh->q); |
167 | dh->q = q; |
168 | } |
169 | |
170 | if (g != NULL) { |
171 | BN_free(dh->g); |
172 | dh->g = g; |
173 | } |
174 | |
175 | return 1; |
176 | } |
177 | |
178 | int DH_generate_parameters_ex(DH *dh, int prime_bits, int generator, BN_GENCB *cb) { |
179 | // We generate DH parameters as follows |
180 | // find a prime q which is prime_bits/2 bits long. |
181 | // p=(2*q)+1 or (p-1)/2 = q |
182 | // For this case, g is a generator if |
183 | // g^((p-1)/q) mod p != 1 for values of q which are the factors of p-1. |
184 | // Since the factors of p-1 are q and 2, we just need to check |
185 | // g^2 mod p != 1 and g^q mod p != 1. |
186 | // |
187 | // Having said all that, |
188 | // there is another special case method for the generators 2, 3 and 5. |
189 | // for 2, p mod 24 == 11 |
190 | // for 3, p mod 12 == 5 <<<<< does not work for safe primes. |
191 | // for 5, p mod 10 == 3 or 7 |
192 | // |
193 | // Thanks to Phil Karn <karn@qualcomm.com> for the pointers about the |
194 | // special generators and for answering some of my questions. |
195 | // |
196 | // I've implemented the second simple method :-). |
197 | // Since DH should be using a safe prime (both p and q are prime), |
198 | // this generator function can take a very very long time to run. |
199 | |
200 | // Actually there is no reason to insist that 'generator' be a generator. |
201 | // It's just as OK (and in some sense better) to use a generator of the |
202 | // order-q subgroup. |
203 | |
204 | BIGNUM *t1, *t2; |
205 | int g, ok = 0; |
206 | BN_CTX *ctx = NULL; |
207 | |
208 | ctx = BN_CTX_new(); |
209 | if (ctx == NULL) { |
210 | goto err; |
211 | } |
212 | BN_CTX_start(ctx); |
213 | t1 = BN_CTX_get(ctx); |
214 | t2 = BN_CTX_get(ctx); |
215 | if (t1 == NULL || t2 == NULL) { |
216 | goto err; |
217 | } |
218 | |
219 | // Make sure |dh| has the necessary elements |
220 | if (dh->p == NULL) { |
221 | dh->p = BN_new(); |
222 | if (dh->p == NULL) { |
223 | goto err; |
224 | } |
225 | } |
226 | if (dh->g == NULL) { |
227 | dh->g = BN_new(); |
228 | if (dh->g == NULL) { |
229 | goto err; |
230 | } |
231 | } |
232 | |
233 | if (generator <= 1) { |
234 | OPENSSL_PUT_ERROR(DH, DH_R_BAD_GENERATOR); |
235 | goto err; |
236 | } |
237 | if (generator == DH_GENERATOR_2) { |
238 | if (!BN_set_word(t1, 24)) { |
239 | goto err; |
240 | } |
241 | if (!BN_set_word(t2, 11)) { |
242 | goto err; |
243 | } |
244 | g = 2; |
245 | } else if (generator == DH_GENERATOR_5) { |
246 | if (!BN_set_word(t1, 10)) { |
247 | goto err; |
248 | } |
249 | if (!BN_set_word(t2, 3)) { |
250 | goto err; |
251 | } |
252 | // BN_set_word(t3,7); just have to miss |
253 | // out on these ones :-( |
254 | g = 5; |
255 | } else { |
256 | // in the general case, don't worry if 'generator' is a |
257 | // generator or not: since we are using safe primes, |
258 | // it will generate either an order-q or an order-2q group, |
259 | // which both is OK |
260 | if (!BN_set_word(t1, 2)) { |
261 | goto err; |
262 | } |
263 | if (!BN_set_word(t2, 1)) { |
264 | goto err; |
265 | } |
266 | g = generator; |
267 | } |
268 | |
269 | if (!BN_generate_prime_ex(dh->p, prime_bits, 1, t1, t2, cb)) { |
270 | goto err; |
271 | } |
272 | if (!BN_GENCB_call(cb, 3, 0)) { |
273 | goto err; |
274 | } |
275 | if (!BN_set_word(dh->g, g)) { |
276 | goto err; |
277 | } |
278 | ok = 1; |
279 | |
280 | err: |
281 | if (!ok) { |
282 | OPENSSL_PUT_ERROR(DH, ERR_R_BN_LIB); |
283 | } |
284 | |
285 | if (ctx != NULL) { |
286 | BN_CTX_end(ctx); |
287 | BN_CTX_free(ctx); |
288 | } |
289 | return ok; |
290 | } |
291 | |
292 | int DH_generate_key(DH *dh) { |
293 | int ok = 0; |
294 | int generate_new_key = 0; |
295 | BN_CTX *ctx = NULL; |
296 | BIGNUM *pub_key = NULL, *priv_key = NULL; |
297 | |
298 | if (BN_num_bits(dh->p) > OPENSSL_DH_MAX_MODULUS_BITS) { |
299 | OPENSSL_PUT_ERROR(DH, DH_R_MODULUS_TOO_LARGE); |
300 | goto err; |
301 | } |
302 | |
303 | ctx = BN_CTX_new(); |
304 | if (ctx == NULL) { |
305 | goto err; |
306 | } |
307 | |
308 | if (dh->priv_key == NULL) { |
309 | priv_key = BN_new(); |
310 | if (priv_key == NULL) { |
311 | goto err; |
312 | } |
313 | generate_new_key = 1; |
314 | } else { |
315 | priv_key = dh->priv_key; |
316 | } |
317 | |
318 | if (dh->pub_key == NULL) { |
319 | pub_key = BN_new(); |
320 | if (pub_key == NULL) { |
321 | goto err; |
322 | } |
323 | } else { |
324 | pub_key = dh->pub_key; |
325 | } |
326 | |
327 | if (!BN_MONT_CTX_set_locked(&dh->method_mont_p, &dh->method_mont_p_lock, |
328 | dh->p, ctx)) { |
329 | goto err; |
330 | } |
331 | |
332 | if (generate_new_key) { |
333 | if (dh->q) { |
334 | if (!BN_rand_range_ex(priv_key, 2, dh->q)) { |
335 | goto err; |
336 | } |
337 | } else { |
338 | // secret exponent length |
339 | unsigned priv_bits = dh->priv_length; |
340 | if (priv_bits == 0) { |
341 | const unsigned p_bits = BN_num_bits(dh->p); |
342 | if (p_bits == 0) { |
343 | goto err; |
344 | } |
345 | |
346 | priv_bits = p_bits - 1; |
347 | } |
348 | |
349 | if (!BN_rand(priv_key, priv_bits, BN_RAND_TOP_ONE, BN_RAND_BOTTOM_ANY)) { |
350 | goto err; |
351 | } |
352 | } |
353 | } |
354 | |
355 | if (!BN_mod_exp_mont_consttime(pub_key, dh->g, priv_key, dh->p, ctx, |
356 | dh->method_mont_p)) { |
357 | goto err; |
358 | } |
359 | |
360 | dh->pub_key = pub_key; |
361 | dh->priv_key = priv_key; |
362 | ok = 1; |
363 | |
364 | err: |
365 | if (ok != 1) { |
366 | OPENSSL_PUT_ERROR(DH, ERR_R_BN_LIB); |
367 | } |
368 | |
369 | if (dh->pub_key == NULL) { |
370 | BN_free(pub_key); |
371 | } |
372 | if (dh->priv_key == NULL) { |
373 | BN_free(priv_key); |
374 | } |
375 | BN_CTX_free(ctx); |
376 | return ok; |
377 | } |
378 | |
379 | int DH_compute_key(unsigned char *out, const BIGNUM *peers_key, DH *dh) { |
380 | BN_CTX *ctx = NULL; |
381 | BIGNUM *shared_key; |
382 | int ret = -1; |
383 | int check_result; |
384 | |
385 | if (BN_num_bits(dh->p) > OPENSSL_DH_MAX_MODULUS_BITS) { |
386 | OPENSSL_PUT_ERROR(DH, DH_R_MODULUS_TOO_LARGE); |
387 | goto err; |
388 | } |
389 | |
390 | ctx = BN_CTX_new(); |
391 | if (ctx == NULL) { |
392 | goto err; |
393 | } |
394 | BN_CTX_start(ctx); |
395 | shared_key = BN_CTX_get(ctx); |
396 | if (shared_key == NULL) { |
397 | goto err; |
398 | } |
399 | |
400 | if (dh->priv_key == NULL) { |
401 | OPENSSL_PUT_ERROR(DH, DH_R_NO_PRIVATE_VALUE); |
402 | goto err; |
403 | } |
404 | |
405 | if (!BN_MONT_CTX_set_locked(&dh->method_mont_p, &dh->method_mont_p_lock, |
406 | dh->p, ctx)) { |
407 | goto err; |
408 | } |
409 | |
410 | if (!DH_check_pub_key(dh, peers_key, &check_result) || check_result) { |
411 | OPENSSL_PUT_ERROR(DH, DH_R_INVALID_PUBKEY); |
412 | goto err; |
413 | } |
414 | |
415 | if (!BN_mod_exp_mont_consttime(shared_key, peers_key, dh->priv_key, dh->p, |
416 | ctx, dh->method_mont_p)) { |
417 | OPENSSL_PUT_ERROR(DH, ERR_R_BN_LIB); |
418 | goto err; |
419 | } |
420 | |
421 | ret = BN_bn2bin(shared_key, out); |
422 | |
423 | err: |
424 | if (ctx != NULL) { |
425 | BN_CTX_end(ctx); |
426 | BN_CTX_free(ctx); |
427 | } |
428 | |
429 | return ret; |
430 | } |
431 | |
432 | int DH_size(const DH *dh) { return BN_num_bytes(dh->p); } |
433 | |
434 | unsigned DH_num_bits(const DH *dh) { return BN_num_bits(dh->p); } |
435 | |
436 | int DH_up_ref(DH *dh) { |
437 | CRYPTO_refcount_inc(&dh->references); |
438 | return 1; |
439 | } |
440 | |
441 | static int int_dh_bn_cpy(BIGNUM **dst, const BIGNUM *src) { |
442 | BIGNUM *a = NULL; |
443 | |
444 | if (src) { |
445 | a = BN_dup(src); |
446 | if (!a) { |
447 | return 0; |
448 | } |
449 | } |
450 | |
451 | BN_free(*dst); |
452 | *dst = a; |
453 | return 1; |
454 | } |
455 | |
456 | static int int_dh_param_copy(DH *to, const DH *from, int is_x942) { |
457 | if (is_x942 == -1) { |
458 | is_x942 = !!from->q; |
459 | } |
460 | if (!int_dh_bn_cpy(&to->p, from->p) || |
461 | !int_dh_bn_cpy(&to->g, from->g)) { |
462 | return 0; |
463 | } |
464 | |
465 | if (!is_x942) { |
466 | return 1; |
467 | } |
468 | |
469 | if (!int_dh_bn_cpy(&to->q, from->q) || |
470 | !int_dh_bn_cpy(&to->j, from->j)) { |
471 | return 0; |
472 | } |
473 | |
474 | OPENSSL_free(to->seed); |
475 | to->seed = NULL; |
476 | to->seedlen = 0; |
477 | |
478 | if (from->seed) { |
479 | to->seed = BUF_memdup(from->seed, from->seedlen); |
480 | if (!to->seed) { |
481 | return 0; |
482 | } |
483 | to->seedlen = from->seedlen; |
484 | } |
485 | |
486 | return 1; |
487 | } |
488 | |
489 | DH *DHparams_dup(const DH *dh) { |
490 | DH *ret = DH_new(); |
491 | if (!ret) { |
492 | return NULL; |
493 | } |
494 | |
495 | if (!int_dh_param_copy(ret, dh, -1)) { |
496 | DH_free(ret); |
497 | return NULL; |
498 | } |
499 | |
500 | return ret; |
501 | } |
502 | |
503 | int DH_get_ex_new_index(long argl, void *argp, CRYPTO_EX_unused *unused, |
504 | CRYPTO_EX_dup *dup_unused, CRYPTO_EX_free *free_func) { |
505 | int index; |
506 | if (!CRYPTO_get_ex_new_index(&g_ex_data_class, &index, argl, argp, |
507 | free_func)) { |
508 | return -1; |
509 | } |
510 | return index; |
511 | } |
512 | |
513 | int DH_set_ex_data(DH *d, int idx, void *arg) { |
514 | return CRYPTO_set_ex_data(&d->ex_data, idx, arg); |
515 | } |
516 | |
517 | void *DH_get_ex_data(DH *d, int idx) { |
518 | return CRYPTO_get_ex_data(&d->ex_data, idx); |
519 | } |
520 | |