bn_const.c 4.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153
  1. /*
  2. * Copyright 2005-2020 The OpenSSL Project Authors. All Rights Reserved.
  3. *
  4. * Licensed under the Apache License 2.0 (the "License"). You may not use
  5. * this file except in compliance with the License. You can obtain a copy
  6. * in the file LICENSE in the source distribution or at
  7. * https://www.openssl.org/source/license.html
  8. */
  9. #include <openssl/bn.h>
  10. #include "crypto/bn_dh.h"
  11. #define COPY_BN(dst, src) (dst != NULL) ? BN_copy(dst, &src) : BN_dup(&src)
  12. /*-
  13. * "First Oakley Default Group" from RFC2409, section 6.1.
  14. *
  15. * The prime is: 2^768 - 2 ^704 - 1 + 2^64 * { [2^638 pi] + 149686 }
  16. *
  17. * RFC2409 specifies a generator of 2.
  18. * RFC2412 specifies a generator of of 22.
  19. */
  20. BIGNUM *BN_get_rfc2409_prime_768(BIGNUM *bn)
  21. {
  22. static const unsigned char RFC2409_PRIME_768[] = {
  23. 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF,
  24. 0xC9, 0x0F, 0xDA, 0xA2, 0x21, 0x68, 0xC2, 0x34,
  25. 0xC4, 0xC6, 0x62, 0x8B, 0x80, 0xDC, 0x1C, 0xD1,
  26. 0x29, 0x02, 0x4E, 0x08, 0x8A, 0x67, 0xCC, 0x74,
  27. 0x02, 0x0B, 0xBE, 0xA6, 0x3B, 0x13, 0x9B, 0x22,
  28. 0x51, 0x4A, 0x08, 0x79, 0x8E, 0x34, 0x04, 0xDD,
  29. 0xEF, 0x95, 0x19, 0xB3, 0xCD, 0x3A, 0x43, 0x1B,
  30. 0x30, 0x2B, 0x0A, 0x6D, 0xF2, 0x5F, 0x14, 0x37,
  31. 0x4F, 0xE1, 0x35, 0x6D, 0x6D, 0x51, 0xC2, 0x45,
  32. 0xE4, 0x85, 0xB5, 0x76, 0x62, 0x5E, 0x7E, 0xC6,
  33. 0xF4, 0x4C, 0x42, 0xE9, 0xA6, 0x3A, 0x36, 0x20,
  34. 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF,
  35. };
  36. return BN_bin2bn(RFC2409_PRIME_768, sizeof(RFC2409_PRIME_768), bn);
  37. }
  38. /*-
  39. * "Second Oakley Default Group" from RFC2409, section 6.2.
  40. *
  41. * The prime is: 2^1024 - 2^960 - 1 + 2^64 * { [2^894 pi] + 129093 }.
  42. *
  43. * RFC2409 specifies a generator of 2.
  44. * RFC2412 specifies a generator of 22.
  45. */
  46. BIGNUM *BN_get_rfc2409_prime_1024(BIGNUM *bn)
  47. {
  48. static const unsigned char RFC2409_PRIME_1024[] = {
  49. 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF,
  50. 0xC9, 0x0F, 0xDA, 0xA2, 0x21, 0x68, 0xC2, 0x34,
  51. 0xC4, 0xC6, 0x62, 0x8B, 0x80, 0xDC, 0x1C, 0xD1,
  52. 0x29, 0x02, 0x4E, 0x08, 0x8A, 0x67, 0xCC, 0x74,
  53. 0x02, 0x0B, 0xBE, 0xA6, 0x3B, 0x13, 0x9B, 0x22,
  54. 0x51, 0x4A, 0x08, 0x79, 0x8E, 0x34, 0x04, 0xDD,
  55. 0xEF, 0x95, 0x19, 0xB3, 0xCD, 0x3A, 0x43, 0x1B,
  56. 0x30, 0x2B, 0x0A, 0x6D, 0xF2, 0x5F, 0x14, 0x37,
  57. 0x4F, 0xE1, 0x35, 0x6D, 0x6D, 0x51, 0xC2, 0x45,
  58. 0xE4, 0x85, 0xB5, 0x76, 0x62, 0x5E, 0x7E, 0xC6,
  59. 0xF4, 0x4C, 0x42, 0xE9, 0xA6, 0x37, 0xED, 0x6B,
  60. 0x0B, 0xFF, 0x5C, 0xB6, 0xF4, 0x06, 0xB7, 0xED,
  61. 0xEE, 0x38, 0x6B, 0xFB, 0x5A, 0x89, 0x9F, 0xA5,
  62. 0xAE, 0x9F, 0x24, 0x11, 0x7C, 0x4B, 0x1F, 0xE6,
  63. 0x49, 0x28, 0x66, 0x51, 0xEC, 0xE6, 0x53, 0x81,
  64. 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF,
  65. };
  66. return BN_bin2bn(RFC2409_PRIME_1024, sizeof(RFC2409_PRIME_1024), bn);
  67. }
  68. /*-
  69. * "1536-bit MODP Group" from RFC3526, Section 2.
  70. *
  71. * The prime is: 2^1536 - 2^1472 - 1 + 2^64 * { [2^1406 pi] + 741804 }
  72. *
  73. * RFC3526 specifies a generator of 2.
  74. * RFC2312 specifies a generator of 22.
  75. */
  76. BIGNUM *BN_get_rfc3526_prime_1536(BIGNUM *bn)
  77. {
  78. return COPY_BN(bn, _bignum_modp_1536_p);
  79. }
  80. /*-
  81. * "2048-bit MODP Group" from RFC3526, Section 3.
  82. *
  83. * The prime is: 2^2048 - 2^1984 - 1 + 2^64 * { [2^1918 pi] + 124476 }
  84. *
  85. * RFC3526 specifies a generator of 2.
  86. */
  87. BIGNUM *BN_get_rfc3526_prime_2048(BIGNUM *bn)
  88. {
  89. return COPY_BN(bn, _bignum_modp_2048_p);
  90. }
  91. /*-
  92. * "3072-bit MODP Group" from RFC3526, Section 4.
  93. *
  94. * The prime is: 2^3072 - 2^3008 - 1 + 2^64 * { [2^2942 pi] + 1690314 }
  95. *
  96. * RFC3526 specifies a generator of 2.
  97. */
  98. BIGNUM *BN_get_rfc3526_prime_3072(BIGNUM *bn)
  99. {
  100. return COPY_BN(bn, _bignum_modp_3072_p);
  101. }
  102. /*-
  103. * "4096-bit MODP Group" from RFC3526, Section 5.
  104. *
  105. * The prime is: 2^4096 - 2^4032 - 1 + 2^64 * { [2^3966 pi] + 240904 }
  106. *
  107. * RFC3526 specifies a generator of 2.
  108. */
  109. BIGNUM *BN_get_rfc3526_prime_4096(BIGNUM *bn)
  110. {
  111. return COPY_BN(bn, _bignum_modp_4096_p);
  112. }
  113. /*-
  114. * "6144-bit MODP Group" from RFC3526, Section 6.
  115. *
  116. * The prime is: 2^6144 - 2^6080 - 1 + 2^64 * { [2^6014 pi] + 929484 }
  117. *
  118. * RFC3526 specifies a generator of 2.
  119. */
  120. BIGNUM *BN_get_rfc3526_prime_6144(BIGNUM *bn)
  121. {
  122. return COPY_BN(bn, _bignum_modp_6144_p);
  123. }
  124. /*-
  125. * "8192-bit MODP Group" from RFC3526, Section 7.
  126. *
  127. * The prime is: 2^8192 - 2^8128 - 1 + 2^64 * { [2^8062 pi] + 4743158 }
  128. *
  129. * RFC3526 specifies a generator of 2.
  130. */
  131. BIGNUM *BN_get_rfc3526_prime_8192(BIGNUM *bn)
  132. {
  133. return COPY_BN(bn, _bignum_modp_8192_p);
  134. }