| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317 | /* * Copyright 2019-2023 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License").  You may not use * this file except in compliance with the License.  You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */#include <string.h> /* memset */#include <openssl/core_names.h>#include "internal/ffc.h"#include "internal/param_build_set.h"#include "internal/nelem.h"#ifndef FIPS_MODULE# include <openssl/asn1.h> /* ossl_ffc_params_print */#endifvoid ossl_ffc_params_init(FFC_PARAMS *params){    memset(params, 0, sizeof(*params));    params->pcounter = -1;    params->gindex = FFC_UNVERIFIABLE_GINDEX;    params->flags = FFC_PARAM_FLAG_VALIDATE_PQG;}void ossl_ffc_params_cleanup(FFC_PARAMS *params){    BN_free(params->p);    BN_free(params->q);    BN_free(params->g);    BN_free(params->j);    OPENSSL_free(params->seed);    ossl_ffc_params_init(params);}void ossl_ffc_params_set0_pqg(FFC_PARAMS *d, BIGNUM *p, BIGNUM *q, BIGNUM *g){    if (p != NULL && p != d->p) {        BN_free(d->p);        d->p = p;    }    if (q != NULL && q != d->q) {        BN_free(d->q);        d->q = q;    }    if (g != NULL && g != d->g) {        BN_free(d->g);        d->g = g;    }}void ossl_ffc_params_get0_pqg(const FFC_PARAMS *d, const BIGNUM **p,                              const BIGNUM **q, const BIGNUM **g){    if (p != NULL)        *p = d->p;    if (q != NULL)        *q = d->q;    if (g != NULL)        *g = d->g;}/* j is the 'cofactor' that is optionally output for ASN1. */void ossl_ffc_params_set0_j(FFC_PARAMS *d, BIGNUM *j){    BN_free(d->j);    d->j = NULL;    if (j != NULL)        d->j = j;}int ossl_ffc_params_set_seed(FFC_PARAMS *params,                             const unsigned char *seed, size_t seedlen){    if (params->seed != NULL) {        if (params->seed == seed)            return 1;        OPENSSL_free(params->seed);    }    if (seed != NULL && seedlen > 0) {        params->seed = OPENSSL_memdup(seed, seedlen);        if (params->seed == NULL)            return 0;        params->seedlen = seedlen;    } else {        params->seed = NULL;        params->seedlen = 0;    }    return 1;}void ossl_ffc_params_set_gindex(FFC_PARAMS *params, int index){    params->gindex = index;}void ossl_ffc_params_set_pcounter(FFC_PARAMS *params, int index){    params->pcounter = index;}void ossl_ffc_params_set_h(FFC_PARAMS *params, int index){    params->h = index;}void ossl_ffc_params_set_flags(FFC_PARAMS *params, unsigned int flags){    params->flags = flags;}void ossl_ffc_params_enable_flags(FFC_PARAMS *params, unsigned int flags,                                  int enable){    if (enable)        params->flags |= flags;    else        params->flags &= ~flags;}void ossl_ffc_set_digest(FFC_PARAMS *params, const char *alg, const char *props){    params->mdname = alg;    params->mdprops = props;}int ossl_ffc_params_set_validate_params(FFC_PARAMS *params,                                        const unsigned char *seed,                                        size_t seedlen, int counter){    if (!ossl_ffc_params_set_seed(params, seed, seedlen))        return 0;    params->pcounter = counter;    return 1;}void ossl_ffc_params_get_validate_params(const FFC_PARAMS *params,                                         unsigned char **seed, size_t *seedlen,                                         int *pcounter){    if (seed != NULL)        *seed = params->seed;    if (seedlen != NULL)        *seedlen = params->seedlen;    if (pcounter != NULL)        *pcounter = params->pcounter;}static int ffc_bn_cpy(BIGNUM **dst, const BIGNUM *src){    BIGNUM *a;    /*     * If source is read only just copy the pointer, so     * we don't have to reallocate it.     */    if (src == NULL)        a = NULL;    else if (BN_get_flags(src, BN_FLG_STATIC_DATA)             && !BN_get_flags(src, BN_FLG_MALLOCED))        a = (BIGNUM *)src;    else if ((a = BN_dup(src)) == NULL)        return 0;    BN_clear_free(*dst);    *dst = a;    return 1;}int ossl_ffc_params_copy(FFC_PARAMS *dst, const FFC_PARAMS *src){    if (!ffc_bn_cpy(&dst->p, src->p)        || !ffc_bn_cpy(&dst->g, src->g)        || !ffc_bn_cpy(&dst->q, src->q)        || !ffc_bn_cpy(&dst->j, src->j))        return 0;    dst->mdname = src->mdname;    dst->mdprops = src->mdprops;    OPENSSL_free(dst->seed);    dst->seedlen = src->seedlen;    if (src->seed != NULL) {        dst->seed = OPENSSL_memdup(src->seed, src->seedlen);        if  (dst->seed == NULL)            return 0;    } else {        dst->seed = NULL;    }    dst->nid = src->nid;    dst->pcounter = src->pcounter;    dst->h = src->h;    dst->gindex = src->gindex;    dst->flags = src->flags;    dst->keylength = src->keylength;    return 1;}int ossl_ffc_params_cmp(const FFC_PARAMS *a, const FFC_PARAMS *b, int ignore_q){    return BN_cmp(a->p, b->p) == 0           && BN_cmp(a->g, b->g) == 0           && (ignore_q || BN_cmp(a->q, b->q) == 0); /* Note: q may be NULL */}int ossl_ffc_params_todata(const FFC_PARAMS *ffc, OSSL_PARAM_BLD *bld,                      OSSL_PARAM params[]){    int test_flags;    if (ffc->p != NULL        && !ossl_param_build_set_bn(bld, params, OSSL_PKEY_PARAM_FFC_P, ffc->p))        return 0;    if (ffc->q != NULL        && !ossl_param_build_set_bn(bld, params, OSSL_PKEY_PARAM_FFC_Q, ffc->q))        return 0;    if (ffc->g != NULL        && !ossl_param_build_set_bn(bld, params, OSSL_PKEY_PARAM_FFC_G, ffc->g))        return 0;    if (ffc->j != NULL        && !ossl_param_build_set_bn(bld, params, OSSL_PKEY_PARAM_FFC_COFACTOR,                                    ffc->j))        return 0;    if (!ossl_param_build_set_int(bld, params, OSSL_PKEY_PARAM_FFC_GINDEX,                                  ffc->gindex))        return 0;    if (!ossl_param_build_set_int(bld, params, OSSL_PKEY_PARAM_FFC_PCOUNTER,                                  ffc->pcounter))        return 0;    if (!ossl_param_build_set_int(bld, params, OSSL_PKEY_PARAM_FFC_H, ffc->h))        return 0;    if (ffc->seed != NULL        && !ossl_param_build_set_octet_string(bld, params,                                              OSSL_PKEY_PARAM_FFC_SEED,                                              ffc->seed, ffc->seedlen))        return 0;    if (ffc->nid != NID_undef) {        const DH_NAMED_GROUP *group = ossl_ffc_uid_to_dh_named_group(ffc->nid);        const char *name = ossl_ffc_named_group_get_name(group);        if (name == NULL            || !ossl_param_build_set_utf8_string(bld, params,                                                 OSSL_PKEY_PARAM_GROUP_NAME,                                                 name))            return 0;    }    test_flags = ((ffc->flags & FFC_PARAM_FLAG_VALIDATE_PQ) != 0);    if (!ossl_param_build_set_int(bld, params,                                  OSSL_PKEY_PARAM_FFC_VALIDATE_PQ, test_flags))        return 0;    test_flags = ((ffc->flags & FFC_PARAM_FLAG_VALIDATE_G) != 0);    if (!ossl_param_build_set_int(bld, params,                                  OSSL_PKEY_PARAM_FFC_VALIDATE_G, test_flags))        return 0;    test_flags = ((ffc->flags & FFC_PARAM_FLAG_VALIDATE_LEGACY) != 0);    if (!ossl_param_build_set_int(bld, params,                                  OSSL_PKEY_PARAM_FFC_VALIDATE_LEGACY,                                  test_flags))        return 0;    if (ffc->mdname != NULL        && !ossl_param_build_set_utf8_string(bld, params,                                             OSSL_PKEY_PARAM_FFC_DIGEST,                                             ffc->mdname))       return 0;    if (ffc->mdprops != NULL        && !ossl_param_build_set_utf8_string(bld, params,                                             OSSL_PKEY_PARAM_FFC_DIGEST_PROPS,                                             ffc->mdprops))        return 0;    return 1;}#ifndef FIPS_MODULEint ossl_ffc_params_print(BIO *bp, const FFC_PARAMS *ffc, int indent){    if (!ASN1_bn_print(bp, "prime P:", ffc->p, NULL, indent))        goto err;    if (!ASN1_bn_print(bp, "generator G:", ffc->g, NULL, indent))        goto err;    if (ffc->q != NULL        && !ASN1_bn_print(bp, "subgroup order Q:", ffc->q, NULL, indent))        goto err;    if (ffc->j != NULL        && !ASN1_bn_print(bp, "subgroup factor:", ffc->j, NULL, indent))        goto err;    if (ffc->seed != NULL) {        size_t i;        if (!BIO_indent(bp, indent, 128)            || BIO_puts(bp, "seed:") <= 0)            goto err;        for (i = 0; i < ffc->seedlen; i++) {            if ((i % 15) == 0) {                if (BIO_puts(bp, "\n") <= 0                    || !BIO_indent(bp, indent + 4, 128))                    goto err;            }            if (BIO_printf(bp, "%02x%s", ffc->seed[i],                           ((i + 1) == ffc->seedlen) ? "" : ":") <= 0)                goto err;        }        if (BIO_write(bp, "\n", 1) <= 0)            return 0;    }    if (ffc->pcounter != -1) {        if (!BIO_indent(bp, indent, 128)            || BIO_printf(bp, "counter: %d\n", ffc->pcounter) <= 0)            goto err;    }    return 1;err:    return 0;}#endif /* FIPS_MODULE */
 |