tomcrypt/dh.c

484 lines
13 KiB
C
Raw Normal View History

2003-03-02 19:59:24 -05:00
#include "mycrypt.h"
#ifdef MDH
2003-03-02 20:01:00 -05:00
/* This holds the key settings. ***MUST*** be organized by size from smallest to largest. */
2003-03-02 19:59:24 -05:00
static const struct {
int size;
char *name, *base, *prime;
} sets[] = {
#ifdef DH768
{
96,
"DH-768",
"2",
2003-03-02 20:02:10 -05:00
"1tH+dRFGpEYyVLe4ydZcYyGDpeAxnChz0yk+pNCtkEXwUsOORyguBtx8spUD"
"FAjEDS8PutUBTEu2q4USqu19dUbCLj9D2jY7y3871RnSccurMBsMm35ILcyQ"
"rpN0MQKc/"
2003-03-02 19:59:24 -05:00
},
#endif
#ifdef DH1024
{
128,
"DH-1024",
"2",
2003-03-02 20:02:10 -05:00
"Uypu+t9nfUnCj7xD+xokM+Cd6mASW4ofg1jpC2BpQasC5edtA1dJC+RjbOBZ"
"z+5mvq5VYT8Wfjmlpjm9tQxHOYB0+3Myl7gbCQ5SRljWT2oBLukLNvgFjiU4"
"wiWkmu41Ern/j6uxwKb740C+VIgDAdeUY4fA5hyfr3/+DWYb14/"
2003-03-02 19:59:24 -05:00
},
#endif
#ifdef DH1280
{
160,
"DH-1280",
"2",
2003-03-02 20:02:10 -05:00
"520QV4Tsq4NwK9Mt5CGR9xk4slvaikgi/ax3OPky5GERKTsoqEXOlFyMzURP"
"P8jYzCVz1izKd2zTDxbFfLxrJry0ceaQ5YZa5N4teByCPVlQh4v6iQl+944+"
"/NDlKzvWpx7HG7k8cGKhva7aFF8bP/CvLpaQhrfXlOX+X9pcmML9QH63tUjq"
"B80l8Yx9KN0dC3iNnsTV3DnqnEvFQkoqql"
2003-03-02 19:59:24 -05:00
},
#endif
#ifdef DH1536
{
192,
"DH-1536",
"3",
2003-03-02 20:02:10 -05:00
"1FTWXrPcY1w74oZ0ouIzSN8uZcRiOf6U11fx0ka6+7fqIAezPhd3Ab43QnDf"
"KFg+or/fFRGEWAxF8WIE2jx8iTOu010yNEQyH14CK0RAyy2zY4gRs2MpnU5r"
"/feWf60OkLtnPzN34+Xnlg5xf7Jl00wkHRCeJG17L3SklOidAPxWnE+Wm4BS"
"SOzdQBgiZOjlhrYS1+TIU3NP5H7BrtKFcf+ZwBULibf29L7LkDOgQbie1+43"
"lU+8SHAyBwAeGYMfZ"
2003-03-02 19:59:24 -05:00
},
#endif
#ifdef DH1792
{
224,
"DH-1792",
"2",
2003-03-02 20:02:10 -05:00
"IPo3wjvfS7vBYnFHwJHmesA51od9fnR8Aenezif4qLE2HX+YCv1tpvHA8yLH"
"yYbKe9QfSHHtOgVjK8AYEyPirpXxlmdykGuj+dX7EiWMRGYc+v1kKkqmCn0o"
"5tU416O/1HXTpQ2Hps0buchUD+HlCMrSgnIqRxK6Fjr0ZfiCS4XgAD6sLgi0"
"BxKFMxDsVzpGMNwF5Lj2R/cJiTi0cNDDY3gn4lK/PRUsJtRKU+9sxy0q5Yof"
"aG5VO8VcHkZJVwUKhDFHkZYWMHV808TGHXM2RQ9kRa2QvS2mXxMrDSCloQ/"
2003-03-02 19:59:24 -05:00
},
#endif
#ifdef DH2048
{
256,
"DH-2048",
"2",
2003-03-02 20:02:10 -05:00
"5sR1VmdsQQzzjN0iridVVyveug6sAC3+/jTIHSgEoimPOREXQ05r2WJZJAF2"
"CRu8kuusiPw2ivRli+fdLr63v1uZG5nQa28uLwNxZEsu4gu6TrGjepXeXm4Z"
"CVOC1HMmi660fLZ2ruHLa4v2NWex2Zx91/y4ygPlZM+K//iy+Gft9Ma9Ayn0"
"eYwofZeUL9vJSfutPVp2ZrIEUQDBKMvMm0SRSLiUjDtzXqrH+b/wuwIFG1K4"
"var3ucsT45mDzD9qb3tBdksSPZbr6yrELV8h+qmjiBr15oHKEglS0XwSvCap"
"abUn5XPPVoaKv13+tOnG9mGgzQ8JeClVXN63Q+GGEF"
2003-03-02 19:59:24 -05:00
},
#endif
#ifdef DH2560
{
320,
"DH-2560",
"3",
2003-03-02 20:02:10 -05:00
"G7UVKk+N6LfpGkdBP6XLB4QJ3wzee5YH/3o6tBDMwr4FS8YjCmeP6l4gu0hX"
"dzY2Rive4TYOu4Akm4naZuv32d71/2lQeNcO23BNYOEPxtn9BU8uYfaHP9Mo"
"M+m76oUCiI5uqpag5RH3BO34FyE4BiKkzjEXq9xxc8ERacG8Mo8DNiXu79p9"
"Q/0wsRz+W/lIN4gYw3w4iLMooAGnDrhcj5cZb0HysHWYfqmFo+jTBP6Egi0g"
"cmVO2qWQh2cZIQMfppaf1Ffq0XGIJpgDFyOHPl3NVxDabVK1tkVct+hathxJ"
"UTdqZmR2VFwMASXjfgj4VFdvFCUxV8Xr8JcwXkwlMjOJbAl0LoCa4M7hpYvz"
"G/0XviGCpv7qQaONKtsiQ6mHhMcyo9hBCRZXtNPkfPMZkPeV05akvaDs6Ek7"
"DZ62oKR"
2003-03-02 19:59:24 -05:00
},
#endif
#ifdef DH3072
{
384,
"DH-3072",
"2",
2003-03-02 20:02:10 -05:00
"1zsV6XgY57R/hu2RR4H/BjwRqmQL9h+Dc5rgoWOcqiTS8qpVTWafi1KFV77V"
"rUcjcer1EDgCV0tpzlemtyrC2pHpw7hr3EEl2evfWOvg05FRI6mKc2UPNv2c"
"2Bjww4LD/tdsLleX7AHHXCXFSSyd6C3qWq7BqABZriSpQeaEtXbWfeC6ytFe"
"2i3VeQsLa40XQ21UxwhPAjamjSOfYzkW7xi0fwI1e+4OQiFcWOfOuvswoaEf"
"MIICyAmVp67vjGo66dk81dMemyplipgXAWPdl7ppnDd6cEjyN4N90D7kQiNg"
"lVmJlKLecldOUtdIqMnbJCbiN/t/3/AEFaokGO9om5ckc6M9gG5PG0T7Oh1N"
"dSx/PstGdxwvs9DOwjyo5wl5C9QSLtUYJl2+GZYMj6WfsgCrb6jjRJJJQe2C"
"y7wUcBILbRsP3lYT8s14zm4xFBrfMUoLN287j3wQ1TNUXjYSCi4ZLKT1XDai"
"93345OiutLOqGGikFg6ypnymJK3yeHuul"
2003-03-02 19:59:24 -05:00
},
#endif
#ifdef DH4096
{
512,
"DH-4096",
"3",
2003-03-02 20:02:10 -05:00
"Id8ukxZdao3hS0NGTKAXdt3c8PpiyigIyBY8lwOHjM2cqkaZgwvr1pA6OowS"
"32kJkeOqKB8gNTZZZVqOFkPXgvC4WveUgA5a7rhTj28pDidNROmMO70CCcSw"
"aHI3GLFuEMz3JJyvQKGaGwpV3C9gS70dFWTxEfNRzdYEdvIic8/SXI79VgNP"
"LGR68nzd4qxCgaLpVBnWsanRp7mfEj52S/7Kxjs14lrbAOMjCuHgN4F6THWh"
"PNhG0VXfFFIwAMW2unrfpdo+gQHNclqCf2N1FALpABzvUesgs3wIP+QTMqms"
"os/AkuulG7MusbeFl3SoCtaoW12CF038ZbqW+e+DKI1zObhtsLanvaiZm/N4"
"BsJirW7avcWNQYm1oYjZ2bR/jYqfoJ0CLXLO/vqHb8J9a5VE9nz7cqMD3/MH"
"k/g7BapsOtKuol6ipbUvxQPtf4KCwqQQ40JeqgS6amivI/aLu05S7bAxKOwE"
"Yu8YxjN6lXm3co5Wy+BmNSuRlzKhxICyHEqMfKwUtm48XHzHuPaGQzHgkn6H"
"3A+FQjQGLHewADYlbfdTF3sHYyc5k9h/9cYVkbmv7bQze53CJGr3T1hZYbN6"
"+fuz0SPnfjiKu+bWD+8RYtZpLs2+f32huMz3OqoryGfULxC2aEjL2rdBn+ZR"
"PT0+ZAUyLSAVHbsul++cawh"
2003-03-02 19:59:24 -05:00
},
#endif
{
0,
NULL,
NULL,
NULL
}
};
static int is_valid_idx(int n)
{
int x;
for (x = 0; sets[x].size; x++);
if ((n < 0) || (n >= x)) {
return 0;
}
return 1;
}
int dh_test(void)
{
mp_int p, g, tmp;
int x, res, primality;
if (mp_init_multi(&p, &g, &tmp, NULL) != MP_OKAY) { goto error; }
2003-03-02 20:02:42 -05:00
for (x = 0; sets[x].size != 0; x++) {
2003-03-02 19:59:24 -05:00
#if 0
printf("dh_test():testing size %d-bits\n", sets[x].size * 8);
#endif
2003-03-02 20:02:42 -05:00
if (mp_read_radix(&g,(unsigned char *)sets[x].base, 64) != MP_OKAY) { goto error; }
if (mp_read_radix(&p,(unsigned char *)sets[x].prime, 64) != MP_OKAY) { goto error; }
2003-03-02 19:59:24 -05:00
/* ensure p is prime */
if ((res = is_prime(&p, &primality)) != CRYPT_OK) { goto done; }
if (primality == 0) {
res = CRYPT_FAIL_TESTVECTOR;
goto done;
}
if (mp_sub_d(&p, 1, &tmp) != MP_OKAY) { goto error; }
if (mp_div_2(&tmp, &tmp) != MP_OKAY) { goto error; }
/* ensure (p-1)/2 is prime */
if ((res = is_prime(&tmp, &primality)) != CRYPT_OK) { goto done; }
if (primality == 0) {
res = CRYPT_FAIL_TESTVECTOR;
goto done;
}
/* now see if g^((p-1)/2) mod p is in fact 1 */
if (mp_exptmod(&g, &tmp, &p, &tmp) != MP_OKAY) { goto error; }
if (mp_cmp_d(&tmp, 1)) {
res = CRYPT_FAIL_TESTVECTOR;
goto done;
}
}
res = CRYPT_OK;
goto done;
error:
res = CRYPT_MEM;
done:
mp_clear_multi(&tmp, &g, &p, NULL);
return res;
}
void dh_sizes(int *low, int *high)
{
int x;
_ARGCHK(low != NULL);
_ARGCHK(high != NULL);
*low = INT_MAX;
*high = 0;
2003-03-02 20:02:42 -05:00
for (x = 0; sets[x].size != 0; x++) {
2003-03-02 19:59:24 -05:00
if (*low > sets[x].size) *low = sets[x].size;
if (*high < sets[x].size) *high = sets[x].size;
}
}
int dh_get_size(dh_key *key)
{
_ARGCHK(key != NULL);
2003-03-02 20:02:42 -05:00
if (is_valid_idx(key->idx) == 1)
2003-03-02 19:59:24 -05:00
return sets[key->idx].size;
else
return INT_MAX; /* large value that would cause dh_make_key() to fail */
}
int dh_make_key(prng_state *prng, int wprng, int keysize, dh_key *key)
{
2003-03-02 20:02:42 -05:00
unsigned char buf[512];
2003-03-02 19:59:24 -05:00
unsigned long x;
mp_int p, g;
2003-03-02 20:02:42 -05:00
int res, err;
2003-03-02 19:59:24 -05:00
_ARGCHK(key != NULL);
/* good prng? */
2003-03-02 20:02:42 -05:00
if ((err = prng_is_valid(wprng)) != CRYPT_OK) {
return err;
2003-03-02 19:59:24 -05:00
}
/* find key size */
2003-03-02 20:02:42 -05:00
for (x = 0; (keysize > sets[x].size) && (sets[x].size != 0); x++);
2003-03-02 19:59:24 -05:00
#ifdef FAST_PK
keysize = MIN(sets[x].size, 32);
#else
keysize = sets[x].size;
#endif
if (sets[x].size == 0) {
return CRYPT_INVALID_KEYSIZE;
}
key->idx = x;
/* make up random string */
2003-03-02 20:02:42 -05:00
if (prng_descriptor[wprng].read(buf, keysize, prng) != (unsigned long)keysize) {
2003-03-02 19:59:24 -05:00
return CRYPT_ERROR_READPRNG;
}
/* init parameters */
if (mp_init_multi(&g, &p, &key->x, &key->y, NULL) != MP_OKAY) {
return CRYPT_MEM;
}
2003-03-02 20:02:10 -05:00
if (mp_read_radix(&g, sets[key->idx].base, 64) != MP_OKAY) { goto error; }
if (mp_read_radix(&p, sets[key->idx].prime, 64) != MP_OKAY) { goto error; }
2003-03-02 19:59:24 -05:00
/* load the x value */
2003-03-02 20:02:42 -05:00
if (mp_read_unsigned_bin(&key->x, buf, keysize) != MP_OKAY) { goto error; }
2003-03-02 20:02:10 -05:00
if (mp_exptmod(&g, &key->x, &p, &key->y) != MP_OKAY) { goto error; }
2003-03-02 19:59:24 -05:00
key->type = PK_PRIVATE;
2003-03-02 20:02:10 -05:00
if (mp_shrink(&key->x) != MP_OKAY) { goto error; }
if (mp_shrink(&key->y) != MP_OKAY) { goto error; }
2003-03-02 19:59:24 -05:00
/* free up ram */
res = CRYPT_OK;
goto done2;
2003-03-02 20:02:10 -05:00
error:
2003-03-02 19:59:24 -05:00
res = CRYPT_MEM;
mp_clear_multi(&key->x, &key->y, NULL);
done2:
mp_clear_multi(&p, &g, NULL);
zeromem(buf, sizeof(buf));
return res;
}
void dh_free(dh_key *key)
{
_ARGCHK(key != NULL);
mp_clear_multi(&key->x, &key->y, NULL);
}
#define OUTPUT_BIGNUM(num, buf2, y, z) \
{ \
2003-03-02 20:02:42 -05:00
z = (unsigned long)mp_unsigned_bin_size(num); \
2003-03-02 19:59:24 -05:00
STORE32L(z, buf2+y); \
y += 4; \
2003-03-02 20:02:42 -05:00
(void)mp_to_unsigned_bin(num, buf2+y); \
2003-03-02 19:59:24 -05:00
y += z; \
}
#define INPUT_BIGNUM(num, in, x, y) \
{ \
/* load value */ \
2003-03-02 20:01:40 -05:00
if (y + 4 > inlen) { \
2003-03-02 20:02:42 -05:00
err = CRYPT_INVALID_PACKET; \
2003-03-02 20:01:40 -05:00
goto error; \
} \
2003-03-02 19:59:24 -05:00
LOAD32L(x, in+y); \
y += 4; \
\
/* sanity check... */ \
2003-03-02 20:01:40 -05:00
if (x+y > inlen) { \
2003-03-02 20:02:42 -05:00
err = CRYPT_INVALID_PACKET; \
2003-03-02 19:59:24 -05:00
goto error; \
} \
\
/* load it */ \
2003-03-02 20:02:42 -05:00
if (mp_read_unsigned_bin(num, (unsigned char *)in+y, (int)x) != MP_OKAY) {\
err = CRYPT_MEM; \
2003-03-02 19:59:24 -05:00
goto error; \
} \
y += x; \
2003-03-02 20:02:10 -05:00
if (mp_shrink(num) != MP_OKAY) { \
2003-03-02 20:02:42 -05:00
err = CRYPT_MEM; \
2003-03-02 20:02:10 -05:00
goto error; \
} \
2003-03-02 19:59:24 -05:00
}
int dh_export(unsigned char *out, unsigned long *outlen, int type, dh_key *key)
{
unsigned char buf2[1536];
unsigned long y, z;
_ARGCHK(out != NULL);
_ARGCHK(outlen != NULL);
_ARGCHK(key != NULL);
if (type == PK_PRIVATE && key->type != PK_PRIVATE) {
return CRYPT_PK_NOT_PRIVATE;
}
/* header */
y = PACKET_SIZE;
/* header */
buf2[y++] = type;
2003-03-02 20:02:42 -05:00
buf2[y++] = (unsigned char)(sets[key->idx].size / 8);
2003-03-02 19:59:24 -05:00
/* export y */
OUTPUT_BIGNUM(&key->y, buf2, y, z);
if (type == PK_PRIVATE) {
/* export x */
OUTPUT_BIGNUM(&key->x, buf2, y, z);
}
/* check for overflow */
if (*outlen < y) {
#ifdef CLEAN_STACK
zeromem(buf2, sizeof(buf2));
#endif
return CRYPT_BUFFER_OVERFLOW;
}
/* store header */
2003-03-02 20:02:10 -05:00
packet_store_header(buf2, PACKET_SECT_DH, PACKET_SUB_KEY);
2003-03-02 19:59:24 -05:00
/* output it */
*outlen = y;
2003-03-02 20:02:42 -05:00
memcpy(out, buf2, (size_t)y);
2003-03-02 19:59:24 -05:00
/* clear mem */
2003-03-02 20:02:10 -05:00
#ifdef CLEAN_STACK
2003-03-02 19:59:24 -05:00
zeromem(buf2, sizeof(buf2));
2003-03-02 20:02:10 -05:00
#endif
2003-03-02 19:59:24 -05:00
return CRYPT_OK;
}
2003-03-02 20:01:40 -05:00
int dh_import(const unsigned char *in, unsigned long inlen, dh_key *key)
2003-03-02 19:59:24 -05:00
{
2003-03-02 20:01:40 -05:00
unsigned long x, y, s;
2003-03-02 20:02:42 -05:00
int err;
2003-03-02 19:59:24 -05:00
_ARGCHK(in != NULL);
_ARGCHK(key != NULL);
/* check type byte */
2003-03-02 20:02:42 -05:00
if ((err = packet_valid_header((unsigned char *)in, PACKET_SECT_DH, PACKET_SUB_KEY)) != CRYPT_OK) {
return err;
2003-03-02 19:59:24 -05:00
}
2003-03-02 20:01:40 -05:00
if (2+PACKET_SIZE > inlen) {
return CRYPT_INVALID_PACKET;
}
2003-03-02 19:59:24 -05:00
/* init */
if (mp_init_multi(&key->x, &key->y, NULL) != MP_OKAY) {
return CRYPT_MEM;
}
y = PACKET_SIZE;
2003-03-02 20:02:42 -05:00
key->type = (int)in[y++];
s = (unsigned long)in[y++] * 8;
2003-03-02 20:01:00 -05:00
2003-03-02 20:02:42 -05:00
for (x = 0; (s > (unsigned long)sets[x].size) && (sets[x].size != 0); x++);
2003-03-02 20:01:00 -05:00
if (sets[x].size == 0) {
2003-03-02 20:02:42 -05:00
err = CRYPT_INVALID_KEYSIZE;
2003-03-02 20:01:00 -05:00
goto error;
}
2003-03-02 20:02:42 -05:00
key->idx = (int)x;
2003-03-02 19:59:24 -05:00
/* type check both values */
if ((key->type != PK_PUBLIC) && (key->type != PK_PRIVATE)) {
2003-03-02 20:02:42 -05:00
err = CRYPT_PK_TYPE_MISMATCH;
2003-03-02 19:59:24 -05:00
goto error;
}
/* is the key idx valid? */
2003-03-02 20:02:42 -05:00
if (is_valid_idx(key->idx) != 1) {
err = CRYPT_PK_TYPE_MISMATCH;
2003-03-02 19:59:24 -05:00
goto error;
}
/* load public value g^x mod p*/
INPUT_BIGNUM(&key->y, in, x, y);
if (key->type == PK_PRIVATE) {
INPUT_BIGNUM(&key->x, in, x, y);
}
2003-03-02 20:02:10 -05:00
/* eliminate private key if public */
if (key->type == PK_PUBLIC) {
mp_clear(&key->x);
}
2003-03-02 19:59:24 -05:00
return CRYPT_OK;
error:
mp_clear_multi(&key->y, &key->x, NULL);
2003-03-02 20:02:42 -05:00
return err;
2003-03-02 19:59:24 -05:00
}
int dh_shared_secret(dh_key *private_key, dh_key *public_key,
unsigned char *out, unsigned long *outlen)
{
mp_int tmp, p;
unsigned long x;
int res;
_ARGCHK(private_key != NULL);
_ARGCHK(public_key != NULL);
_ARGCHK(out != NULL);
_ARGCHK(outlen != NULL);
/* types valid? */
if (private_key->type != PK_PRIVATE) {
return CRYPT_PK_NOT_PRIVATE;
}
/* same idx? */
if (private_key->idx != public_key->idx) {
return CRYPT_PK_TYPE_MISMATCH;
}
/* compute y^x mod p */
if (mp_init_multi(&tmp, &p, NULL) != MP_OKAY) {
return CRYPT_MEM;
}
2003-03-02 20:02:42 -05:00
if (mp_read_radix(&p, (unsigned char *)sets[private_key->idx].prime, 64) != MP_OKAY) { goto error; }
if (mp_exptmod(&public_key->y, &private_key->x, &p, &tmp) != MP_OKAY) { goto error; }
2003-03-02 19:59:24 -05:00
/* enough space for output? */
2003-03-02 20:02:42 -05:00
x = (unsigned long)mp_unsigned_bin_size(&tmp);
2003-03-02 19:59:24 -05:00
if (*outlen < x) {
res = CRYPT_BUFFER_OVERFLOW;
goto done;
}
2003-03-02 20:02:42 -05:00
(void)mp_to_unsigned_bin(&tmp, out);
2003-03-02 19:59:24 -05:00
*outlen = x;
res = CRYPT_OK;
goto done;
error:
res = CRYPT_MEM;
done:
mp_clear_multi(&p, &tmp, NULL);
return res;
}
#include "dh_sys.c"
#endif