dh_pmeth.c 14 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558
  1. /*
  2. * Written by Dr Stephen N Henson ([email protected]) for the OpenSSL project
  3. * 2006.
  4. */
  5. /* ====================================================================
  6. * Copyright (c) 2006-2018 The OpenSSL Project. All rights reserved.
  7. *
  8. * Redistribution and use in source and binary forms, with or without
  9. * modification, are permitted provided that the following conditions
  10. * are met:
  11. *
  12. * 1. Redistributions of source code must retain the above copyright
  13. * notice, this list of conditions and the following disclaimer.
  14. *
  15. * 2. Redistributions in binary form must reproduce the above copyright
  16. * notice, this list of conditions and the following disclaimer in
  17. * the documentation and/or other materials provided with the
  18. * distribution.
  19. *
  20. * 3. All advertising materials mentioning features or use of this
  21. * software must display the following acknowledgment:
  22. * "This product includes software developed by the OpenSSL Project
  23. * for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)"
  24. *
  25. * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
  26. * endorse or promote products derived from this software without
  27. * prior written permission. For written permission, please contact
  28. * [email protected].
  29. *
  30. * 5. Products derived from this software may not be called "OpenSSL"
  31. * nor may "OpenSSL" appear in their names without prior written
  32. * permission of the OpenSSL Project.
  33. *
  34. * 6. Redistributions of any form whatsoever must retain the following
  35. * acknowledgment:
  36. * "This product includes software developed by the OpenSSL Project
  37. * for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)"
  38. *
  39. * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
  40. * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
  41. * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
  42. * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR
  43. * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
  44. * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
  45. * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
  46. * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
  47. * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
  48. * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
  49. * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
  50. * OF THE POSSIBILITY OF SUCH DAMAGE.
  51. * ====================================================================
  52. *
  53. * This product includes cryptographic software written by Eric Young
  54. * ([email protected]). This product includes software written by Tim
  55. * Hudson ([email protected]).
  56. *
  57. */
  58. #include <stdio.h>
  59. #include "cryptlib.h"
  60. #include <openssl/asn1t.h>
  61. #include <openssl/x509.h>
  62. #include <openssl/evp.h>
  63. #include <openssl/dh.h>
  64. #include <openssl/bn.h>
  65. #ifndef OPENSSL_NO_DSA
  66. # include <openssl/dsa.h>
  67. #endif
  68. #include <openssl/objects.h>
  69. #include "evp_locl.h"
  70. /* DH pkey context structure */
  71. typedef struct {
  72. /* Parameter gen parameters */
  73. int prime_len;
  74. int generator;
  75. int use_dsa;
  76. int subprime_len;
  77. /* message digest used for parameter generation */
  78. const EVP_MD *md;
  79. int rfc5114_param;
  80. /* Keygen callback info */
  81. int gentmp[2];
  82. /* KDF (if any) to use for DH */
  83. char kdf_type;
  84. /* OID to use for KDF */
  85. ASN1_OBJECT *kdf_oid;
  86. /* Message digest to use for key derivation */
  87. const EVP_MD *kdf_md;
  88. /* User key material */
  89. unsigned char *kdf_ukm;
  90. size_t kdf_ukmlen;
  91. /* KDF output length */
  92. size_t kdf_outlen;
  93. } DH_PKEY_CTX;
  94. static int pkey_dh_init(EVP_PKEY_CTX *ctx)
  95. {
  96. DH_PKEY_CTX *dctx;
  97. dctx = OPENSSL_malloc(sizeof(DH_PKEY_CTX));
  98. if (!dctx)
  99. return 0;
  100. dctx->prime_len = 1024;
  101. dctx->subprime_len = -1;
  102. dctx->generator = 2;
  103. dctx->use_dsa = 0;
  104. dctx->md = NULL;
  105. dctx->rfc5114_param = 0;
  106. dctx->kdf_type = EVP_PKEY_DH_KDF_NONE;
  107. dctx->kdf_oid = NULL;
  108. dctx->kdf_md = NULL;
  109. dctx->kdf_ukm = NULL;
  110. dctx->kdf_ukmlen = 0;
  111. dctx->kdf_outlen = 0;
  112. ctx->data = dctx;
  113. ctx->keygen_info = dctx->gentmp;
  114. ctx->keygen_info_count = 2;
  115. return 1;
  116. }
  117. static int pkey_dh_copy(EVP_PKEY_CTX *dst, EVP_PKEY_CTX *src)
  118. {
  119. DH_PKEY_CTX *dctx, *sctx;
  120. if (!pkey_dh_init(dst))
  121. return 0;
  122. sctx = src->data;
  123. dctx = dst->data;
  124. dctx->prime_len = sctx->prime_len;
  125. dctx->subprime_len = sctx->subprime_len;
  126. dctx->generator = sctx->generator;
  127. dctx->use_dsa = sctx->use_dsa;
  128. dctx->md = sctx->md;
  129. dctx->rfc5114_param = sctx->rfc5114_param;
  130. dctx->kdf_type = sctx->kdf_type;
  131. dctx->kdf_oid = OBJ_dup(sctx->kdf_oid);
  132. if (!dctx->kdf_oid)
  133. return 0;
  134. dctx->kdf_md = sctx->kdf_md;
  135. if (dctx->kdf_ukm) {
  136. dctx->kdf_ukm = BUF_memdup(sctx->kdf_ukm, sctx->kdf_ukmlen);
  137. dctx->kdf_ukmlen = sctx->kdf_ukmlen;
  138. }
  139. dctx->kdf_outlen = sctx->kdf_outlen;
  140. return 1;
  141. }
  142. static void pkey_dh_cleanup(EVP_PKEY_CTX *ctx)
  143. {
  144. DH_PKEY_CTX *dctx = ctx->data;
  145. if (dctx) {
  146. if (dctx->kdf_ukm)
  147. OPENSSL_free(dctx->kdf_ukm);
  148. if (dctx->kdf_oid)
  149. ASN1_OBJECT_free(dctx->kdf_oid);
  150. OPENSSL_free(dctx);
  151. }
  152. }
  153. static int pkey_dh_ctrl(EVP_PKEY_CTX *ctx, int type, int p1, void *p2)
  154. {
  155. DH_PKEY_CTX *dctx = ctx->data;
  156. switch (type) {
  157. case EVP_PKEY_CTRL_DH_PARAMGEN_PRIME_LEN:
  158. if (p1 < 256)
  159. return -2;
  160. dctx->prime_len = p1;
  161. return 1;
  162. case EVP_PKEY_CTRL_DH_PARAMGEN_SUBPRIME_LEN:
  163. if (dctx->use_dsa == 0)
  164. return -2;
  165. dctx->subprime_len = p1;
  166. return 1;
  167. case EVP_PKEY_CTRL_DH_PARAMGEN_GENERATOR:
  168. if (dctx->use_dsa)
  169. return -2;
  170. dctx->generator = p1;
  171. return 1;
  172. case EVP_PKEY_CTRL_DH_PARAMGEN_TYPE:
  173. #ifdef OPENSSL_NO_DSA
  174. if (p1 != 0)
  175. return -2;
  176. #else
  177. if (p1 < 0 || p1 > 2)
  178. return -2;
  179. #endif
  180. dctx->use_dsa = p1;
  181. return 1;
  182. case EVP_PKEY_CTRL_DH_RFC5114:
  183. if (p1 < 1 || p1 > 3)
  184. return -2;
  185. dctx->rfc5114_param = p1;
  186. return 1;
  187. case EVP_PKEY_CTRL_PEER_KEY:
  188. /* Default behaviour is OK */
  189. return 1;
  190. case EVP_PKEY_CTRL_DH_KDF_TYPE:
  191. if (p1 == -2)
  192. return dctx->kdf_type;
  193. #ifdef OPENSSL_NO_CMS
  194. if (p1 != EVP_PKEY_DH_KDF_NONE)
  195. #else
  196. if (p1 != EVP_PKEY_DH_KDF_NONE && p1 != EVP_PKEY_DH_KDF_X9_42)
  197. #endif
  198. return -2;
  199. dctx->kdf_type = p1;
  200. return 1;
  201. case EVP_PKEY_CTRL_DH_KDF_MD:
  202. dctx->kdf_md = p2;
  203. return 1;
  204. case EVP_PKEY_CTRL_GET_DH_KDF_MD:
  205. *(const EVP_MD **)p2 = dctx->kdf_md;
  206. return 1;
  207. case EVP_PKEY_CTRL_DH_KDF_OUTLEN:
  208. if (p1 <= 0)
  209. return -2;
  210. dctx->kdf_outlen = (size_t)p1;
  211. return 1;
  212. case EVP_PKEY_CTRL_GET_DH_KDF_OUTLEN:
  213. *(int *)p2 = dctx->kdf_outlen;
  214. return 1;
  215. case EVP_PKEY_CTRL_DH_KDF_UKM:
  216. if (dctx->kdf_ukm)
  217. OPENSSL_free(dctx->kdf_ukm);
  218. dctx->kdf_ukm = p2;
  219. if (p2)
  220. dctx->kdf_ukmlen = p1;
  221. else
  222. dctx->kdf_ukmlen = 0;
  223. return 1;
  224. case EVP_PKEY_CTRL_GET_DH_KDF_UKM:
  225. *(unsigned char **)p2 = dctx->kdf_ukm;
  226. return dctx->kdf_ukmlen;
  227. case EVP_PKEY_CTRL_DH_KDF_OID:
  228. if (dctx->kdf_oid)
  229. ASN1_OBJECT_free(dctx->kdf_oid);
  230. dctx->kdf_oid = p2;
  231. return 1;
  232. case EVP_PKEY_CTRL_GET_DH_KDF_OID:
  233. *(ASN1_OBJECT **)p2 = dctx->kdf_oid;
  234. return 1;
  235. default:
  236. return -2;
  237. }
  238. }
  239. static int pkey_dh_ctrl_str(EVP_PKEY_CTX *ctx,
  240. const char *type, const char *value)
  241. {
  242. if (!strcmp(type, "dh_paramgen_prime_len")) {
  243. int len;
  244. len = atoi(value);
  245. return EVP_PKEY_CTX_set_dh_paramgen_prime_len(ctx, len);
  246. }
  247. if (!strcmp(type, "dh_rfc5114")) {
  248. DH_PKEY_CTX *dctx = ctx->data;
  249. int len;
  250. len = atoi(value);
  251. if (len < 0 || len > 3)
  252. return -2;
  253. dctx->rfc5114_param = len;
  254. return 1;
  255. }
  256. if (!strcmp(type, "dh_paramgen_generator")) {
  257. int len;
  258. len = atoi(value);
  259. return EVP_PKEY_CTX_set_dh_paramgen_generator(ctx, len);
  260. }
  261. if (!strcmp(type, "dh_paramgen_subprime_len")) {
  262. int len;
  263. len = atoi(value);
  264. return EVP_PKEY_CTX_set_dh_paramgen_subprime_len(ctx, len);
  265. }
  266. if (!strcmp(type, "dh_paramgen_type")) {
  267. int typ;
  268. typ = atoi(value);
  269. return EVP_PKEY_CTX_set_dh_paramgen_type(ctx, typ);
  270. }
  271. return -2;
  272. }
  273. #ifndef OPENSSL_NO_DSA
  274. extern int dsa_builtin_paramgen(DSA *ret, size_t bits, size_t qbits,
  275. const EVP_MD *evpmd,
  276. const unsigned char *seed_in, size_t seed_len,
  277. unsigned char *seed_out, int *counter_ret,
  278. unsigned long *h_ret, BN_GENCB *cb);
  279. extern int dsa_builtin_paramgen2(DSA *ret, size_t L, size_t N,
  280. const EVP_MD *evpmd,
  281. const unsigned char *seed_in,
  282. size_t seed_len, int idx,
  283. unsigned char *seed_out, int *counter_ret,
  284. unsigned long *h_ret, BN_GENCB *cb);
  285. static DSA *dsa_dh_generate(DH_PKEY_CTX *dctx, BN_GENCB *pcb)
  286. {
  287. DSA *ret;
  288. int rv = 0;
  289. int prime_len = dctx->prime_len;
  290. int subprime_len = dctx->subprime_len;
  291. const EVP_MD *md = dctx->md;
  292. if (dctx->use_dsa > 2)
  293. return NULL;
  294. ret = DSA_new();
  295. if (!ret)
  296. return NULL;
  297. if (subprime_len == -1) {
  298. if (prime_len >= 2048)
  299. subprime_len = 256;
  300. else
  301. subprime_len = 160;
  302. }
  303. if (md == NULL) {
  304. if (prime_len >= 2048)
  305. md = EVP_sha256();
  306. else
  307. md = EVP_sha1();
  308. }
  309. if (dctx->use_dsa == 1)
  310. rv = dsa_builtin_paramgen(ret, prime_len, subprime_len, md,
  311. NULL, 0, NULL, NULL, NULL, pcb);
  312. else if (dctx->use_dsa == 2)
  313. rv = dsa_builtin_paramgen2(ret, prime_len, subprime_len, md,
  314. NULL, 0, -1, NULL, NULL, NULL, pcb);
  315. if (rv <= 0) {
  316. DSA_free(ret);
  317. return NULL;
  318. }
  319. return ret;
  320. }
  321. #endif
  322. static int pkey_dh_paramgen(EVP_PKEY_CTX *ctx, EVP_PKEY *pkey)
  323. {
  324. DH *dh = NULL;
  325. DH_PKEY_CTX *dctx = ctx->data;
  326. BN_GENCB *pcb, cb;
  327. int ret;
  328. if (dctx->rfc5114_param) {
  329. switch (dctx->rfc5114_param) {
  330. case 1:
  331. dh = DH_get_1024_160();
  332. break;
  333. case 2:
  334. dh = DH_get_2048_224();
  335. break;
  336. case 3:
  337. dh = DH_get_2048_256();
  338. break;
  339. default:
  340. return -2;
  341. }
  342. EVP_PKEY_assign(pkey, EVP_PKEY_DHX, dh);
  343. return 1;
  344. }
  345. if (ctx->pkey_gencb) {
  346. pcb = &cb;
  347. evp_pkey_set_cb_translate(pcb, ctx);
  348. } else
  349. pcb = NULL;
  350. #ifndef OPENSSL_NO_DSA
  351. if (dctx->use_dsa) {
  352. DSA *dsa_dh;
  353. dsa_dh = dsa_dh_generate(dctx, pcb);
  354. if (!dsa_dh)
  355. return 0;
  356. dh = DSA_dup_DH(dsa_dh);
  357. DSA_free(dsa_dh);
  358. if (!dh)
  359. return 0;
  360. EVP_PKEY_assign(pkey, EVP_PKEY_DHX, dh);
  361. return 1;
  362. }
  363. #endif
  364. dh = DH_new();
  365. if (!dh)
  366. return 0;
  367. ret = DH_generate_parameters_ex(dh,
  368. dctx->prime_len, dctx->generator, pcb);
  369. if (ret)
  370. EVP_PKEY_assign_DH(pkey, dh);
  371. else
  372. DH_free(dh);
  373. return ret;
  374. }
  375. static int pkey_dh_keygen(EVP_PKEY_CTX *ctx, EVP_PKEY *pkey)
  376. {
  377. DH *dh = NULL;
  378. if (ctx->pkey == NULL) {
  379. DHerr(DH_F_PKEY_DH_KEYGEN, DH_R_NO_PARAMETERS_SET);
  380. return 0;
  381. }
  382. dh = DH_new();
  383. if (!dh)
  384. return 0;
  385. EVP_PKEY_assign(pkey, ctx->pmeth->pkey_id, dh);
  386. /* Note: if error return, pkey is freed by parent routine */
  387. if (!EVP_PKEY_copy_parameters(pkey, ctx->pkey))
  388. return 0;
  389. return DH_generate_key(pkey->pkey.dh);
  390. }
  391. static int pkey_dh_derive(EVP_PKEY_CTX *ctx, unsigned char *key,
  392. size_t *keylen)
  393. {
  394. int ret;
  395. DH *dh;
  396. DH_PKEY_CTX *dctx = ctx->data;
  397. BIGNUM *dhpub;
  398. if (!ctx->pkey || !ctx->peerkey) {
  399. DHerr(DH_F_PKEY_DH_DERIVE, DH_R_KEYS_NOT_SET);
  400. return 0;
  401. }
  402. dh = ctx->pkey->pkey.dh;
  403. dhpub = ctx->peerkey->pkey.dh->pub_key;
  404. if (dctx->kdf_type == EVP_PKEY_DH_KDF_NONE) {
  405. if (key == NULL) {
  406. *keylen = DH_size(dh);
  407. return 1;
  408. }
  409. ret = DH_compute_key(key, dhpub, dh);
  410. if (ret < 0)
  411. return ret;
  412. *keylen = ret;
  413. return 1;
  414. }
  415. #ifndef OPENSSL_NO_CMS
  416. else if (dctx->kdf_type == EVP_PKEY_DH_KDF_X9_42) {
  417. unsigned char *Z = NULL;
  418. size_t Zlen = 0;
  419. if (!dctx->kdf_outlen || !dctx->kdf_oid)
  420. return 0;
  421. if (key == NULL) {
  422. *keylen = dctx->kdf_outlen;
  423. return 1;
  424. }
  425. if (*keylen != dctx->kdf_outlen)
  426. return 0;
  427. ret = 0;
  428. Zlen = DH_size(dh);
  429. Z = OPENSSL_malloc(Zlen);
  430. if (!Z) {
  431. goto err;
  432. }
  433. if (DH_compute_key_padded(Z, dhpub, dh) <= 0)
  434. goto err;
  435. if (!DH_KDF_X9_42(key, *keylen, Z, Zlen, dctx->kdf_oid,
  436. dctx->kdf_ukm, dctx->kdf_ukmlen, dctx->kdf_md))
  437. goto err;
  438. *keylen = dctx->kdf_outlen;
  439. ret = 1;
  440. err:
  441. if (Z) {
  442. OPENSSL_cleanse(Z, Zlen);
  443. OPENSSL_free(Z);
  444. }
  445. return ret;
  446. }
  447. #endif
  448. return 0;
  449. }
  450. const EVP_PKEY_METHOD dh_pkey_meth = {
  451. EVP_PKEY_DH,
  452. 0,
  453. pkey_dh_init,
  454. pkey_dh_copy,
  455. pkey_dh_cleanup,
  456. 0,
  457. pkey_dh_paramgen,
  458. 0,
  459. pkey_dh_keygen,
  460. 0,
  461. 0,
  462. 0,
  463. 0,
  464. 0, 0,
  465. 0, 0, 0, 0,
  466. 0, 0,
  467. 0, 0,
  468. 0,
  469. pkey_dh_derive,
  470. pkey_dh_ctrl,
  471. pkey_dh_ctrl_str
  472. };
  473. const EVP_PKEY_METHOD dhx_pkey_meth = {
  474. EVP_PKEY_DHX,
  475. 0,
  476. pkey_dh_init,
  477. pkey_dh_copy,
  478. pkey_dh_cleanup,
  479. 0,
  480. pkey_dh_paramgen,
  481. 0,
  482. pkey_dh_keygen,
  483. 0,
  484. 0,
  485. 0,
  486. 0,
  487. 0, 0,
  488. 0, 0, 0, 0,
  489. 0, 0,
  490. 0, 0,
  491. 0,
  492. pkey_dh_derive,
  493. pkey_dh_ctrl,
  494. pkey_dh_ctrl_str
  495. };