wolfSSL 3.11.1 for TLS1.3 beta
Fork of wolfSSL by
wolfcrypt/src/dh.c
- Committer:
- wolfSSL
- Date:
- 2017-05-30
- Revision:
- 11:cee25a834751
File content as of revision 11:cee25a834751:
/* dh.c * * Copyright (C) 2006-2016 wolfSSL Inc. * * This file is part of wolfSSL. * * wolfSSL is free software; you can redistribute it and/or modify * it under the terms of the GNU General Public License as published by * the Free Software Foundation; either version 2 of the License, or * (at your option) any later version. * * wolfSSL is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU General Public License for more details. * * You should have received a copy of the GNU General Public License * along with this program; if not, write to the Free Software * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1335, USA */ #ifdef HAVE_CONFIG_H #include <config.h> #endif #include <wolfssl/wolfcrypt/settings.h> #ifndef NO_DH #include <wolfssl/wolfcrypt/dh.h> #include <wolfssl/wolfcrypt/error-crypt.h> #include <wolfssl/wolfcrypt/logging.h> #ifdef NO_INLINE #include <wolfssl/wolfcrypt/misc.h> #else #define WOLFSSL_MISC_INCLUDED #include <wolfcrypt/src/misc.c> #endif #if !defined(USER_MATH_LIB) && !defined(WOLFSSL_DH_CONST) #include <math.h> #define XPOW(x,y) pow((x),(y)) #define XLOG(x) log((x)) #else /* user's own math lib */ #endif int wc_InitDhKey_ex(DhKey* key, void* heap, int devId) { int ret = 0; if (key == NULL) return BAD_FUNC_ARG; key->heap = heap; /* for XMALLOC/XFREE in future */ if (mp_init_multi(&key->p, &key->g, NULL, NULL, NULL, NULL) != MP_OKAY) return MEMORY_E; #if defined(WOLFSSL_ASYNC_CRYPT) && defined(WC_ASYNC_ENABLE_DH) /* handle as async */ ret = wolfAsync_DevCtxInit(&key->asyncDev, WOLFSSL_ASYNC_MARKER_DH, key->heap, devId); #else (void)devId; #endif return ret; } int wc_InitDhKey(DhKey* key) { return wc_InitDhKey_ex(key, NULL, INVALID_DEVID); } void wc_FreeDhKey(DhKey* key) { if (key) { mp_clear(&key->p); mp_clear(&key->g); #if defined(WOLFSSL_ASYNC_CRYPT) && defined(WC_ASYNC_ENABLE_DH) wolfAsync_DevCtxFree(&key->asyncDev, WOLFSSL_ASYNC_MARKER_DH); #endif } } /* if defined to not use floating point values do not compile in */ #ifndef WOLFSSL_DH_CONST static word32 DiscreteLogWorkFactor(word32 n) { /* assuming discrete log takes about the same time as factoring */ if (n < 5) return 0; else return (word32)(2.4 * XPOW((double)n, 1.0/3.0) * XPOW(XLOG((double)n), 2.0/3.0) - 5); } #endif /* WOLFSSL_DH_CONST*/ /* if not using fixed points use DiscreteLogWorkFactor function for unsual size otherwise round up on size needed */ #ifndef WOLFSSL_DH_CONST #define WOLFSSL_DH_ROUND(x) #else #define WOLFSSL_DH_ROUND(x) \ do { \ if (x % 128) { \ x &= 0xffffff80;\ x += 128; \ } \ } \ while (0) #endif static int GeneratePrivateDh(DhKey* key, WC_RNG* rng, byte* priv, word32* privSz) { int ret = 0; word32 sz = mp_unsigned_bin_size(&key->p); /* Table of predetermined values from the operation 2 * DiscreteLogWorkFactor(sz * WOLFSSL_BIT_SIZE) / WOLFSSL_BIT_SIZE + 1 Sizes in table checked against RFC 3526 */ WOLFSSL_DH_ROUND(sz); /* if using fixed points only, then round up */ switch (sz) { case 128: sz = 21; break; case 256: sz = 29; break; case 384: sz = 34; break; case 512: sz = 39; break; case 640: sz = 42; break; case 768: sz = 46; break; case 896: sz = 49; break; case 1024: sz = 52; break; default: #ifndef WOLFSSL_DH_CONST /* if using floating points and size of p is not in table */ sz = min(sz, 2 * DiscreteLogWorkFactor(sz * WOLFSSL_BIT_SIZE) / WOLFSSL_BIT_SIZE + 1); break; #else return BAD_FUNC_ARG; #endif } ret = wc_RNG_GenerateBlock(rng, priv, sz); if (ret == 0) { priv[0] |= 0x0C; *privSz = sz; } return ret; } static int GeneratePublicDh(DhKey* key, byte* priv, word32 privSz, byte* pub, word32* pubSz) { int ret = 0; mp_int x; mp_int y; if (mp_init_multi(&x, &y, 0, 0, 0, 0) != MP_OKAY) return MP_INIT_E; if (mp_read_unsigned_bin(&x, priv, privSz) != MP_OKAY) ret = MP_READ_E; if (ret == 0 && mp_exptmod(&key->g, &x, &key->p, &y) != MP_OKAY) ret = MP_EXPTMOD_E; if (ret == 0 && mp_to_unsigned_bin(&y, pub) != MP_OKAY) ret = MP_TO_E; if (ret == 0) *pubSz = mp_unsigned_bin_size(&y); mp_clear(&y); mp_clear(&x); return ret; } static int wc_DhGenerateKeyPair_Sync(DhKey* key, WC_RNG* rng, byte* priv, word32* privSz, byte* pub, word32* pubSz) { int ret; if (key == NULL || rng == NULL || priv == NULL || privSz == NULL || pub == NULL || pubSz == NULL) { return BAD_FUNC_ARG; } ret = GeneratePrivateDh(key, rng, priv, privSz); return (ret != 0) ? ret : GeneratePublicDh(key, priv, *privSz, pub, pubSz); } #if defined(WOLFSSL_ASYNC_CRYPT) && defined(WC_ASYNC_ENABLE_DH) static int wc_DhGenerateKeyPair_Async(DhKey* key, WC_RNG* rng, byte* priv, word32* privSz, byte* pub, word32* pubSz) { int ret; #if defined(HAVE_INTEL_QA) mp_int x; ret = mp_init(&x); if (ret != MP_OKAY) return ret; ret = GeneratePrivateDh(key, rng, priv, privSz); if (ret == 0) ret = mp_read_unsigned_bin(&x, priv, *privSz); if (ret == MP_OKAY) ret = wc_mp_to_bigint(&x, &x.raw); if (ret == MP_OKAY) ret = wc_mp_to_bigint(&key->p, &key->p.raw); if (ret == MP_OKAY) ret = wc_mp_to_bigint(&key->g, &key->g.raw); if (ret == MP_OKAY) ret = IntelQaDhKeyGen(&key->asyncDev, &key->p.raw, &key->g.raw, &x.raw, pub, pubSz); mp_clear(&x); #else #if defined(HAVE_CAVIUM) /* TODO: Not implemented - use software for now */ #else /* WOLFSSL_ASYNC_CRYPT_TEST */ WC_ASYNC_TEST* testDev = &key->asyncDev.test; if (testDev->type == ASYNC_TEST_NONE) { testDev->type = ASYNC_TEST_DH_GEN; testDev->dhGen.key = key; testDev->dhGen.rng = rng; testDev->dhGen.priv = priv; testDev->dhGen.privSz = privSz; testDev->dhGen.pub = pub; testDev->dhGen.pubSz = pubSz; return WC_PENDING_E; } #endif ret = wc_DhGenerateKeyPair_Sync(key, rng, priv, privSz, pub, pubSz); #endif /* HAVE_INTEL_QA */ return ret; } #endif /* WOLFSSL_ASYNC_CRYPT && WC_ASYNC_ENABLE_DH */ /* Check DH Public Key for invalid numbers * * key DH key group parameters. * pub Public Key. * pubSz Public Key size. * * returns 0 on success or error code */ int wc_DhCheckPubKey(DhKey* key, const byte* pub, word32 pubSz) { int ret = 0; mp_int x; mp_int y; if (key == NULL || pub == NULL) { return BAD_FUNC_ARG; } if (mp_init_multi(&x, &y, NULL, NULL, NULL, NULL) != MP_OKAY) { return MP_INIT_E; } if (mp_read_unsigned_bin(&x, pub, pubSz) != MP_OKAY) { ret = MP_READ_E; } /* pub should not be 0 or 1 */ if (ret == 0 && mp_cmp_d(&x, 2) == MP_LT) { ret = MP_CMP_E; } /* pub shouldn't be greater than or equal to p - 1 */ if (ret == 0 && mp_copy(&key->p, &y) != MP_OKAY) { ret = MP_INIT_E; } if (ret == 0 && mp_sub_d(&y, 2, &y) != MP_OKAY) { ret = MP_SUB_E; } if (ret == 0 && mp_cmp(&x, &y) == MP_GT) { ret = MP_CMP_E; } mp_clear(&y); mp_clear(&x); return ret; } int wc_DhGenerateKeyPair(DhKey* key, WC_RNG* rng, byte* priv, word32* privSz, byte* pub, word32* pubSz) { int ret; if (key == NULL || rng == NULL || priv == NULL || privSz == NULL || pub == NULL || pubSz == NULL) { return BAD_FUNC_ARG; } #if defined(WOLFSSL_ASYNC_CRYPT) && defined(WC_ASYNC_ENABLE_DH) if (key->asyncDev.marker == WOLFSSL_ASYNC_MARKER_DH) { ret = wc_DhGenerateKeyPair_Async(key, rng, priv, privSz, pub, pubSz); } else #endif { ret = wc_DhGenerateKeyPair_Sync(key, rng, priv, privSz, pub, pubSz); } return ret; } static int wc_DhAgree_Sync(DhKey* key, byte* agree, word32* agreeSz, const byte* priv, word32 privSz, const byte* otherPub, word32 pubSz) { int ret = 0; mp_int x; mp_int y; mp_int z; if (wc_DhCheckPubKey(key, otherPub, pubSz) != 0) { WOLFSSL_MSG("wc_DhAgree wc_DhCheckPubKey failed"); return DH_CHECK_PUB_E; } if (mp_init_multi(&x, &y, &z, 0, 0, 0) != MP_OKAY) return MP_INIT_E; if (mp_read_unsigned_bin(&x, priv, privSz) != MP_OKAY) ret = MP_READ_E; if (ret == 0 && mp_read_unsigned_bin(&y, otherPub, pubSz) != MP_OKAY) ret = MP_READ_E; if (ret == 0 && mp_exptmod(&y, &x, &key->p, &z) != MP_OKAY) ret = MP_EXPTMOD_E; if (ret == 0 && mp_to_unsigned_bin(&z, agree) != MP_OKAY) ret = MP_TO_E; if (ret == 0) *agreeSz = mp_unsigned_bin_size(&z); mp_clear(&z); mp_clear(&y); mp_forcezero(&x); return ret; } #if defined(WOLFSSL_ASYNC_CRYPT) && defined(WC_ASYNC_ENABLE_DH) static int wc_DhAgree_Async(DhKey* key, byte* agree, word32* agreeSz, const byte* priv, word32 privSz, const byte* otherPub, word32 pubSz) { int ret; #ifdef HAVE_CAVIUM /* TODO: Not implemented - use software for now */ ret = wc_DhAgree_Sync(key, agree, agreeSz, priv, privSz, otherPub, pubSz); #elif defined(HAVE_INTEL_QA) ret = wc_mp_to_bigint(&key->p, &key->p.raw); if (ret == MP_OKAY) ret = IntelQaDhAgree(&key->asyncDev, &key->p.raw, agree, agreeSz, priv, privSz, otherPub, pubSz); #else /* WOLFSSL_ASYNC_CRYPT_TEST */ WC_ASYNC_TEST* testDev = &key->asyncDev.test; if (testDev->type == ASYNC_TEST_NONE) { testDev->type = ASYNC_TEST_DH_AGREE; testDev->dhAgree.key = key; testDev->dhAgree.agree = agree; testDev->dhAgree.agreeSz = agreeSz; testDev->dhAgree.priv = priv; testDev->dhAgree.privSz = privSz; testDev->dhAgree.otherPub = otherPub; testDev->dhAgree.pubSz = pubSz; return WC_PENDING_E; } ret = wc_DhAgree_Sync(key, agree, agreeSz, priv, privSz, otherPub, pubSz); #endif return ret; } #endif /* WOLFSSL_ASYNC_CRYPT */ int wc_DhAgree(DhKey* key, byte* agree, word32* agreeSz, const byte* priv, word32 privSz, const byte* otherPub, word32 pubSz) { int ret = 0; if (key == NULL || agree == NULL || agreeSz == NULL || priv == NULL || otherPub == NULL) { return BAD_FUNC_ARG; } #if defined(WOLFSSL_ASYNC_CRYPT) && defined(WC_ASYNC_ENABLE_DH) if (key->asyncDev.marker == WOLFSSL_ASYNC_MARKER_DH) { ret = wc_DhAgree_Async(key, agree, agreeSz, priv, privSz, otherPub, pubSz); } else #endif { ret = wc_DhAgree_Sync(key, agree, agreeSz, priv, privSz, otherPub, pubSz); } return ret; } /* not in asn anymore since no actual asn types used */ int wc_DhSetKey(DhKey* key, const byte* p, word32 pSz, const byte* g, word32 gSz) { if (key == NULL || p == NULL || g == NULL || pSz == 0 || gSz == 0) { return BAD_FUNC_ARG; } /* may have leading 0 */ if (p[0] == 0) { pSz--; p++; } if (g[0] == 0) { gSz--; g++; } if (mp_init(&key->p) != MP_OKAY) return MP_INIT_E; if (mp_read_unsigned_bin(&key->p, p, pSz) != 0) { mp_clear(&key->p); return ASN_DH_KEY_E; } if (mp_init(&key->g) != MP_OKAY) { mp_clear(&key->p); return MP_INIT_E; } if (mp_read_unsigned_bin(&key->g, g, gSz) != 0) { mp_clear(&key->g); mp_clear(&key->p); return ASN_DH_KEY_E; } return 0; } #endif /* NO_DH */