dh_pmeth.c 14 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547
  1. /*
  2. * Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL project
  3. * 2006.
  4. */
  5. /* ====================================================================
  6. * Copyright (c) 2006 The OpenSSL Project. All rights reserved.
  7. *
  8. * Redistribution and use in source and binary forms, with or without
  9. * modification, are permitted provided that the following conditions
  10. * are met:
  11. *
  12. * 1. Redistributions of source code must retain the above copyright
  13. * notice, this list of conditions and the following disclaimer.
  14. *
  15. * 2. Redistributions in binary form must reproduce the above copyright
  16. * notice, this list of conditions and the following disclaimer in
  17. * the documentation and/or other materials provided with the
  18. * distribution.
  19. *
  20. * 3. All advertising materials mentioning features or use of this
  21. * software must display the following acknowledgment:
  22. * "This product includes software developed by the OpenSSL Project
  23. * for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)"
  24. *
  25. * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
  26. * endorse or promote products derived from this software without
  27. * prior written permission. For written permission, please contact
  28. * licensing@OpenSSL.org.
  29. *
  30. * 5. Products derived from this software may not be called "OpenSSL"
  31. * nor may "OpenSSL" appear in their names without prior written
  32. * permission of the OpenSSL Project.
  33. *
  34. * 6. Redistributions of any form whatsoever must retain the following
  35. * acknowledgment:
  36. * "This product includes software developed by the OpenSSL Project
  37. * for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)"
  38. *
  39. * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
  40. * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
  41. * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
  42. * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR
  43. * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
  44. * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
  45. * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
  46. * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
  47. * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
  48. * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
  49. * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
  50. * OF THE POSSIBILITY OF SUCH DAMAGE.
  51. * ====================================================================
  52. *
  53. * This product includes cryptographic software written by Eric Young
  54. * (eay@cryptsoft.com). This product includes software written by Tim
  55. * Hudson (tjh@cryptsoft.com).
  56. *
  57. */
  58. #include <stdio.h>
  59. #include "internal/cryptlib.h"
  60. #include <openssl/asn1t.h>
  61. #include <openssl/x509.h>
  62. #include <openssl/evp.h>
  63. #include <openssl/dh.h>
  64. #include <openssl/bn.h>
  65. #ifndef OPENSSL_NO_DSA
  66. # include <openssl/dsa.h>
  67. #endif
  68. #include <openssl/objects.h>
  69. #include "internal/evp_int.h"
  70. /* DH pkey context structure */
  71. typedef struct {
  72. /* Parameter gen parameters */
  73. int prime_len;
  74. int generator;
  75. int use_dsa;
  76. int subprime_len;
  77. /* message digest used for parameter generation */
  78. const EVP_MD *md;
  79. int rfc5114_param;
  80. /* Keygen callback info */
  81. int gentmp[2];
  82. /* KDF (if any) to use for DH */
  83. char kdf_type;
  84. /* OID to use for KDF */
  85. ASN1_OBJECT *kdf_oid;
  86. /* Message digest to use for key derivation */
  87. const EVP_MD *kdf_md;
  88. /* User key material */
  89. unsigned char *kdf_ukm;
  90. size_t kdf_ukmlen;
  91. /* KDF output length */
  92. size_t kdf_outlen;
  93. } DH_PKEY_CTX;
  94. static int pkey_dh_init(EVP_PKEY_CTX *ctx)
  95. {
  96. DH_PKEY_CTX *dctx;
  97. dctx = OPENSSL_malloc(sizeof(*dctx));
  98. if (!dctx)
  99. return 0;
  100. dctx->prime_len = 1024;
  101. dctx->subprime_len = -1;
  102. dctx->generator = 2;
  103. dctx->use_dsa = 0;
  104. dctx->md = NULL;
  105. dctx->rfc5114_param = 0;
  106. dctx->kdf_type = EVP_PKEY_DH_KDF_NONE;
  107. dctx->kdf_oid = NULL;
  108. dctx->kdf_md = NULL;
  109. dctx->kdf_ukm = NULL;
  110. dctx->kdf_ukmlen = 0;
  111. dctx->kdf_outlen = 0;
  112. ctx->data = dctx;
  113. ctx->keygen_info = dctx->gentmp;
  114. ctx->keygen_info_count = 2;
  115. return 1;
  116. }
  117. static int pkey_dh_copy(EVP_PKEY_CTX *dst, EVP_PKEY_CTX *src)
  118. {
  119. DH_PKEY_CTX *dctx, *sctx;
  120. if (!pkey_dh_init(dst))
  121. return 0;
  122. sctx = src->data;
  123. dctx = dst->data;
  124. dctx->prime_len = sctx->prime_len;
  125. dctx->subprime_len = sctx->subprime_len;
  126. dctx->generator = sctx->generator;
  127. dctx->use_dsa = sctx->use_dsa;
  128. dctx->md = sctx->md;
  129. dctx->rfc5114_param = sctx->rfc5114_param;
  130. dctx->kdf_type = sctx->kdf_type;
  131. dctx->kdf_oid = OBJ_dup(sctx->kdf_oid);
  132. if (!dctx->kdf_oid)
  133. return 0;
  134. dctx->kdf_md = sctx->kdf_md;
  135. if (dctx->kdf_ukm) {
  136. dctx->kdf_ukm = BUF_memdup(sctx->kdf_ukm, sctx->kdf_ukmlen);
  137. dctx->kdf_ukmlen = sctx->kdf_ukmlen;
  138. }
  139. dctx->kdf_outlen = sctx->kdf_outlen;
  140. return 1;
  141. }
  142. static void pkey_dh_cleanup(EVP_PKEY_CTX *ctx)
  143. {
  144. DH_PKEY_CTX *dctx = ctx->data;
  145. if (dctx) {
  146. OPENSSL_free(dctx->kdf_ukm);
  147. ASN1_OBJECT_free(dctx->kdf_oid);
  148. OPENSSL_free(dctx);
  149. }
  150. }
  151. static int pkey_dh_ctrl(EVP_PKEY_CTX *ctx, int type, int p1, void *p2)
  152. {
  153. DH_PKEY_CTX *dctx = ctx->data;
  154. switch (type) {
  155. case EVP_PKEY_CTRL_DH_PARAMGEN_PRIME_LEN:
  156. if (p1 < 256)
  157. return -2;
  158. dctx->prime_len = p1;
  159. return 1;
  160. case EVP_PKEY_CTRL_DH_PARAMGEN_SUBPRIME_LEN:
  161. if (dctx->use_dsa == 0)
  162. return -2;
  163. dctx->subprime_len = p1;
  164. return 1;
  165. case EVP_PKEY_CTRL_DH_PARAMGEN_GENERATOR:
  166. if (dctx->use_dsa)
  167. return -2;
  168. dctx->generator = p1;
  169. return 1;
  170. case EVP_PKEY_CTRL_DH_PARAMGEN_TYPE:
  171. #ifdef OPENSSL_NO_DSA
  172. if (p1 != 0)
  173. return -2;
  174. #else
  175. if (p1 < 0 || p1 > 2)
  176. return -2;
  177. #endif
  178. dctx->use_dsa = p1;
  179. return 1;
  180. case EVP_PKEY_CTRL_DH_RFC5114:
  181. if (p1 < 1 || p1 > 3)
  182. return -2;
  183. dctx->rfc5114_param = p1;
  184. return 1;
  185. case EVP_PKEY_CTRL_PEER_KEY:
  186. /* Default behaviour is OK */
  187. return 1;
  188. case EVP_PKEY_CTRL_DH_KDF_TYPE:
  189. if (p1 == -2)
  190. return dctx->kdf_type;
  191. if (p1 != EVP_PKEY_DH_KDF_NONE && p1 != EVP_PKEY_DH_KDF_X9_42)
  192. return -2;
  193. dctx->kdf_type = p1;
  194. return 1;
  195. case EVP_PKEY_CTRL_DH_KDF_MD:
  196. dctx->kdf_md = p2;
  197. return 1;
  198. case EVP_PKEY_CTRL_GET_DH_KDF_MD:
  199. *(const EVP_MD **)p2 = dctx->kdf_md;
  200. return 1;
  201. case EVP_PKEY_CTRL_DH_KDF_OUTLEN:
  202. if (p1 <= 0)
  203. return -2;
  204. dctx->kdf_outlen = (size_t)p1;
  205. return 1;
  206. case EVP_PKEY_CTRL_GET_DH_KDF_OUTLEN:
  207. *(int *)p2 = dctx->kdf_outlen;
  208. return 1;
  209. case EVP_PKEY_CTRL_DH_KDF_UKM:
  210. OPENSSL_free(dctx->kdf_ukm);
  211. dctx->kdf_ukm = p2;
  212. if (p2)
  213. dctx->kdf_ukmlen = p1;
  214. else
  215. dctx->kdf_ukmlen = 0;
  216. return 1;
  217. case EVP_PKEY_CTRL_GET_DH_KDF_UKM:
  218. *(unsigned char **)p2 = dctx->kdf_ukm;
  219. return dctx->kdf_ukmlen;
  220. case EVP_PKEY_CTRL_DH_KDF_OID:
  221. ASN1_OBJECT_free(dctx->kdf_oid);
  222. dctx->kdf_oid = p2;
  223. return 1;
  224. case EVP_PKEY_CTRL_GET_DH_KDF_OID:
  225. *(ASN1_OBJECT **)p2 = dctx->kdf_oid;
  226. return 1;
  227. default:
  228. return -2;
  229. }
  230. }
  231. static int pkey_dh_ctrl_str(EVP_PKEY_CTX *ctx,
  232. const char *type, const char *value)
  233. {
  234. if (strcmp(type, "dh_paramgen_prime_len") == 0) {
  235. int len;
  236. len = atoi(value);
  237. return EVP_PKEY_CTX_set_dh_paramgen_prime_len(ctx, len);
  238. }
  239. if (strcmp(type, "dh_rfc5114") == 0) {
  240. DH_PKEY_CTX *dctx = ctx->data;
  241. int len;
  242. len = atoi(value);
  243. if (len < 0 || len > 3)
  244. return -2;
  245. dctx->rfc5114_param = len;
  246. return 1;
  247. }
  248. if (strcmp(type, "dh_paramgen_generator") == 0) {
  249. int len;
  250. len = atoi(value);
  251. return EVP_PKEY_CTX_set_dh_paramgen_generator(ctx, len);
  252. }
  253. if (strcmp(type, "dh_paramgen_subprime_len") == 0) {
  254. int len;
  255. len = atoi(value);
  256. return EVP_PKEY_CTX_set_dh_paramgen_subprime_len(ctx, len);
  257. }
  258. if (strcmp(type, "dh_paramgen_type") == 0) {
  259. int typ;
  260. typ = atoi(value);
  261. return EVP_PKEY_CTX_set_dh_paramgen_type(ctx, typ);
  262. }
  263. return -2;
  264. }
  265. #ifndef OPENSSL_NO_DSA
  266. extern int dsa_builtin_paramgen(DSA *ret, size_t bits, size_t qbits,
  267. const EVP_MD *evpmd,
  268. const unsigned char *seed_in, size_t seed_len,
  269. unsigned char *seed_out, int *counter_ret,
  270. unsigned long *h_ret, BN_GENCB *cb);
  271. extern int dsa_builtin_paramgen2(DSA *ret, size_t L, size_t N,
  272. const EVP_MD *evpmd,
  273. const unsigned char *seed_in,
  274. size_t seed_len, int idx,
  275. unsigned char *seed_out, int *counter_ret,
  276. unsigned long *h_ret, BN_GENCB *cb);
  277. static DSA *dsa_dh_generate(DH_PKEY_CTX *dctx, BN_GENCB *pcb)
  278. {
  279. DSA *ret;
  280. int rv = 0;
  281. int prime_len = dctx->prime_len;
  282. int subprime_len = dctx->subprime_len;
  283. const EVP_MD *md = dctx->md;
  284. if (dctx->use_dsa > 2)
  285. return NULL;
  286. ret = DSA_new();
  287. if (!ret)
  288. return NULL;
  289. if (subprime_len == -1) {
  290. if (prime_len >= 2048)
  291. subprime_len = 256;
  292. else
  293. subprime_len = 160;
  294. }
  295. if (md == NULL) {
  296. if (prime_len >= 2048)
  297. md = EVP_sha256();
  298. else
  299. md = EVP_sha1();
  300. }
  301. if (dctx->use_dsa == 1)
  302. rv = dsa_builtin_paramgen(ret, prime_len, subprime_len, md,
  303. NULL, 0, NULL, NULL, NULL, pcb);
  304. else if (dctx->use_dsa == 2)
  305. rv = dsa_builtin_paramgen2(ret, prime_len, subprime_len, md,
  306. NULL, 0, -1, NULL, NULL, NULL, pcb);
  307. if (rv <= 0) {
  308. DSA_free(ret);
  309. return NULL;
  310. }
  311. return ret;
  312. }
  313. #endif
  314. static int pkey_dh_paramgen(EVP_PKEY_CTX *ctx, EVP_PKEY *pkey)
  315. {
  316. DH *dh = NULL;
  317. DH_PKEY_CTX *dctx = ctx->data;
  318. BN_GENCB *pcb;
  319. int ret;
  320. if (dctx->rfc5114_param) {
  321. switch (dctx->rfc5114_param) {
  322. case 1:
  323. dh = DH_get_1024_160();
  324. break;
  325. case 2:
  326. dh = DH_get_2048_224();
  327. break;
  328. case 3:
  329. dh = DH_get_2048_256();
  330. break;
  331. default:
  332. return -2;
  333. }
  334. EVP_PKEY_assign(pkey, EVP_PKEY_DHX, dh);
  335. return 1;
  336. }
  337. if (ctx->pkey_gencb) {
  338. pcb = BN_GENCB_new();
  339. evp_pkey_set_cb_translate(pcb, ctx);
  340. } else
  341. pcb = NULL;
  342. #ifndef OPENSSL_NO_DSA
  343. if (dctx->use_dsa) {
  344. DSA *dsa_dh;
  345. dsa_dh = dsa_dh_generate(dctx, pcb);
  346. BN_GENCB_free(pcb);
  347. if (!dsa_dh)
  348. return 0;
  349. dh = DSA_dup_DH(dsa_dh);
  350. DSA_free(dsa_dh);
  351. if (!dh)
  352. return 0;
  353. EVP_PKEY_assign(pkey, EVP_PKEY_DHX, dh);
  354. return 1;
  355. }
  356. #endif
  357. dh = DH_new();
  358. if (!dh) {
  359. BN_GENCB_free(pcb);
  360. return 0;
  361. }
  362. ret = DH_generate_parameters_ex(dh,
  363. dctx->prime_len, dctx->generator, pcb);
  364. BN_GENCB_free(pcb);
  365. if (ret)
  366. EVP_PKEY_assign_DH(pkey, dh);
  367. else
  368. DH_free(dh);
  369. return ret;
  370. }
  371. static int pkey_dh_keygen(EVP_PKEY_CTX *ctx, EVP_PKEY *pkey)
  372. {
  373. DH *dh = NULL;
  374. if (ctx->pkey == NULL) {
  375. DHerr(DH_F_PKEY_DH_KEYGEN, DH_R_NO_PARAMETERS_SET);
  376. return 0;
  377. }
  378. dh = DH_new();
  379. if (!dh)
  380. return 0;
  381. EVP_PKEY_assign(pkey, ctx->pmeth->pkey_id, dh);
  382. /* Note: if error return, pkey is freed by parent routine */
  383. if (!EVP_PKEY_copy_parameters(pkey, ctx->pkey))
  384. return 0;
  385. return DH_generate_key(pkey->pkey.dh);
  386. }
  387. static int pkey_dh_derive(EVP_PKEY_CTX *ctx, unsigned char *key,
  388. size_t *keylen)
  389. {
  390. int ret;
  391. DH *dh;
  392. DH_PKEY_CTX *dctx = ctx->data;
  393. BIGNUM *dhpub;
  394. if (!ctx->pkey || !ctx->peerkey) {
  395. DHerr(DH_F_PKEY_DH_DERIVE, DH_R_KEYS_NOT_SET);
  396. return 0;
  397. }
  398. dh = ctx->pkey->pkey.dh;
  399. dhpub = ctx->peerkey->pkey.dh->pub_key;
  400. if (dctx->kdf_type == EVP_PKEY_DH_KDF_NONE) {
  401. if (key == NULL) {
  402. *keylen = DH_size(dh);
  403. return 1;
  404. }
  405. ret = DH_compute_key(key, dhpub, dh);
  406. if (ret < 0)
  407. return ret;
  408. *keylen = ret;
  409. return 1;
  410. } else if (dctx->kdf_type == EVP_PKEY_DH_KDF_X9_42) {
  411. unsigned char *Z = NULL;
  412. size_t Zlen = 0;
  413. if (!dctx->kdf_outlen || !dctx->kdf_oid)
  414. return 0;
  415. if (key == NULL) {
  416. *keylen = dctx->kdf_outlen;
  417. return 1;
  418. }
  419. if (*keylen != dctx->kdf_outlen)
  420. return 0;
  421. ret = 0;
  422. Zlen = DH_size(dh);
  423. Z = OPENSSL_malloc(Zlen);
  424. if (!Z) {
  425. goto err;
  426. }
  427. if (DH_compute_key_padded(Z, dhpub, dh) <= 0)
  428. goto err;
  429. if (!DH_KDF_X9_42(key, *keylen, Z, Zlen, dctx->kdf_oid,
  430. dctx->kdf_ukm, dctx->kdf_ukmlen, dctx->kdf_md))
  431. goto err;
  432. *keylen = dctx->kdf_outlen;
  433. ret = 1;
  434. err:
  435. OPENSSL_clear_free(Z, Zlen);
  436. return ret;
  437. }
  438. return 1;
  439. }
  440. const EVP_PKEY_METHOD dh_pkey_meth = {
  441. EVP_PKEY_DH,
  442. 0,
  443. pkey_dh_init,
  444. pkey_dh_copy,
  445. pkey_dh_cleanup,
  446. 0,
  447. pkey_dh_paramgen,
  448. 0,
  449. pkey_dh_keygen,
  450. 0,
  451. 0,
  452. 0,
  453. 0,
  454. 0, 0,
  455. 0, 0, 0, 0,
  456. 0, 0,
  457. 0, 0,
  458. 0,
  459. pkey_dh_derive,
  460. pkey_dh_ctrl,
  461. pkey_dh_ctrl_str
  462. };
  463. const EVP_PKEY_METHOD dhx_pkey_meth = {
  464. EVP_PKEY_DHX,
  465. 0,
  466. pkey_dh_init,
  467. pkey_dh_copy,
  468. pkey_dh_cleanup,
  469. 0,
  470. pkey_dh_paramgen,
  471. 0,
  472. pkey_dh_keygen,
  473. 0,
  474. 0,
  475. 0,
  476. 0,
  477. 0, 0,
  478. 0, 0, 0, 0,
  479. 0, 0,
  480. 0, 0,
  481. 0,
  482. pkey_dh_derive,
  483. pkey_dh_ctrl,
  484. pkey_dh_ctrl_str
  485. };