Coverage Report

Created: 2025-08-29 06:25

/src/hostap/src/crypto/crypto_internal-modexp.c
Line
Count
Source (jump to first uncovered line)
1
/*
2
 * Crypto wrapper for internal crypto implementation - modexp
3
 * Copyright (c) 2006-2009, Jouni Malinen <j@w1.fi>
4
 *
5
 * This software may be distributed under the terms of the BSD license.
6
 * See README for more details.
7
 */
8
9
#include "includes.h"
10
11
#include "common.h"
12
#include "tls/bignum.h"
13
#include "crypto.h"
14
15
16
int crypto_dh_init(u8 generator, const u8 *prime, size_t prime_len, u8 *privkey,
17
       u8 *pubkey)
18
0
{
19
0
  size_t pubkey_len, pad;
20
21
0
  if (os_get_random(privkey, prime_len) < 0)
22
0
    return -1;
23
0
  if (os_memcmp(privkey, prime, prime_len) > 0) {
24
    /* Make sure private value is smaller than prime */
25
0
    privkey[0] = 0;
26
0
  }
27
28
0
  pubkey_len = prime_len;
29
0
  if (crypto_mod_exp(&generator, 1, privkey, prime_len, prime, prime_len,
30
0
         pubkey, &pubkey_len) < 0)
31
0
    return -1;
32
0
  if (pubkey_len < prime_len) {
33
0
    pad = prime_len - pubkey_len;
34
0
    os_memmove(pubkey + pad, pubkey, pubkey_len);
35
0
    os_memset(pubkey, 0, pad);
36
0
  }
37
38
0
  return 0;
39
0
}
40
41
42
int crypto_dh_derive_secret(u8 generator, const u8 *prime, size_t prime_len,
43
          const u8 *order, size_t order_len,
44
          const u8 *privkey, size_t privkey_len,
45
          const u8 *pubkey, size_t pubkey_len,
46
          u8 *secret, size_t *len)
47
0
{
48
0
  struct bignum *pub;
49
0
  int res = -1;
50
51
0
  if (pubkey_len > prime_len ||
52
0
      (pubkey_len == prime_len &&
53
0
       os_memcmp(pubkey, prime, prime_len) >= 0))
54
0
    return -1;
55
56
0
  pub = bignum_init();
57
0
  if (!pub || bignum_set_unsigned_bin(pub, pubkey, pubkey_len) < 0 ||
58
0
      bignum_cmp_d(pub, 1) <= 0)
59
0
    goto fail;
60
61
0
  if (order) {
62
0
    struct bignum *p, *q, *tmp;
63
0
    int failed;
64
65
    /* verify: pubkey^q == 1 mod p */
66
0
    p = bignum_init();
67
0
    q = bignum_init();
68
0
    tmp = bignum_init();
69
0
    failed = !p || !q || !tmp ||
70
0
      bignum_set_unsigned_bin(p, prime, prime_len) < 0 ||
71
0
      bignum_set_unsigned_bin(q, order, order_len) < 0 ||
72
0
      bignum_exptmod(pub, q, p, tmp) < 0 ||
73
0
      bignum_cmp_d(tmp, 1) != 0;
74
0
    bignum_deinit(p);
75
0
    bignum_deinit(q);
76
0
    bignum_deinit(tmp);
77
0
    if (failed)
78
0
      goto fail;
79
0
  }
80
81
0
  res = crypto_mod_exp(pubkey, pubkey_len, privkey, privkey_len,
82
0
           prime, prime_len, secret, len);
83
0
fail:
84
0
  bignum_deinit(pub);
85
0
  return res;
86
0
}
87
88
89
int crypto_mod_exp(const u8 *base, size_t base_len,
90
       const u8 *power, size_t power_len,
91
       const u8 *modulus, size_t modulus_len,
92
       u8 *result, size_t *result_len)
93
0
{
94
0
  struct bignum *bn_base, *bn_exp, *bn_modulus, *bn_result;
95
0
  int ret = -1;
96
97
0
  bn_base = bignum_init();
98
0
  bn_exp = bignum_init();
99
0
  bn_modulus = bignum_init();
100
0
  bn_result = bignum_init();
101
102
0
  if (bn_base == NULL || bn_exp == NULL || bn_modulus == NULL ||
103
0
      bn_result == NULL)
104
0
    goto error;
105
106
0
  if (bignum_set_unsigned_bin(bn_base, base, base_len) < 0 ||
107
0
      bignum_set_unsigned_bin(bn_exp, power, power_len) < 0 ||
108
0
      bignum_set_unsigned_bin(bn_modulus, modulus, modulus_len) < 0)
109
0
    goto error;
110
111
0
  if (bignum_exptmod(bn_base, bn_exp, bn_modulus, bn_result) < 0)
112
0
    goto error;
113
114
0
  ret = bignum_get_unsigned_bin(bn_result, result, result_len);
115
116
0
error:
117
0
  bignum_deinit(bn_base);
118
0
  bignum_deinit(bn_exp);
119
0
  bignum_deinit(bn_modulus);
120
0
  bignum_deinit(bn_result);
121
0
  return ret;
122
0
}