Coverage Report

Created: 2022-08-24 06:30

/src/libressl/crypto/dh/dh_key.c
Line
Count
Source (jump to first uncovered line)
1
/* $OpenBSD: dh_key.c,v 1.37 2022/01/07 09:27:13 tb Exp $ */
2
/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
3
 * All rights reserved.
4
 *
5
 * This package is an SSL implementation written
6
 * by Eric Young (eay@cryptsoft.com).
7
 * The implementation was written so as to conform with Netscapes SSL.
8
 * 
9
 * This library is free for commercial and non-commercial use as long as
10
 * the following conditions are aheared to.  The following conditions
11
 * apply to all code found in this distribution, be it the RC4, RSA,
12
 * lhash, DES, etc., code; not just the SSL code.  The SSL documentation
13
 * included with this distribution is covered by the same copyright terms
14
 * except that the holder is Tim Hudson (tjh@cryptsoft.com).
15
 * 
16
 * Copyright remains Eric Young's, and as such any Copyright notices in
17
 * the code are not to be removed.
18
 * If this package is used in a product, Eric Young should be given attribution
19
 * as the author of the parts of the library used.
20
 * This can be in the form of a textual message at program startup or
21
 * in documentation (online or textual) provided with the package.
22
 * 
23
 * Redistribution and use in source and binary forms, with or without
24
 * modification, are permitted provided that the following conditions
25
 * are met:
26
 * 1. Redistributions of source code must retain the copyright
27
 *    notice, this list of conditions and the following disclaimer.
28
 * 2. Redistributions in binary form must reproduce the above copyright
29
 *    notice, this list of conditions and the following disclaimer in the
30
 *    documentation and/or other materials provided with the distribution.
31
 * 3. All advertising materials mentioning features or use of this software
32
 *    must display the following acknowledgement:
33
 *    "This product includes cryptographic software written by
34
 *     Eric Young (eay@cryptsoft.com)"
35
 *    The word 'cryptographic' can be left out if the rouines from the library
36
 *    being used are not cryptographic related :-).
37
 * 4. If you include any Windows specific code (or a derivative thereof) from 
38
 *    the apps directory (application code) you must include an acknowledgement:
39
 *    "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
40
 * 
41
 * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
42
 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
43
 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
44
 * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
45
 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
46
 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
47
 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
48
 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
49
 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
50
 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
51
 * SUCH DAMAGE.
52
 * 
53
 * The licence and distribution terms for any publically available version or
54
 * derivative of this code cannot be changed.  i.e. this code cannot simply be
55
 * copied and put under another distribution licence
56
 * [including the GNU Public Licence.]
57
 */
58
59
#include <stdio.h>
60
61
#include <openssl/bn.h>
62
#include <openssl/dh.h>
63
#include <openssl/err.h>
64
65
#include "bn_lcl.h"
66
#include "dh_local.h"
67
68
static int generate_key(DH *dh);
69
static int compute_key(unsigned char *key, const BIGNUM *pub_key, DH *dh);
70
static int dh_bn_mod_exp(const DH *dh, BIGNUM *r, const BIGNUM *a,
71
      const BIGNUM *p, const BIGNUM *m, BN_CTX *ctx, BN_MONT_CTX *m_ctx);
72
static int dh_init(DH *dh);
73
static int dh_finish(DH *dh);
74
75
int
76
DH_generate_key(DH *dh)
77
0
{
78
0
  return dh->meth->generate_key(dh);
79
0
}
80
81
int
82
DH_compute_key(unsigned char *key, const BIGNUM *pub_key, DH *dh)
83
0
{
84
0
  return dh->meth->compute_key(key, pub_key, dh);
85
0
}
86
87
static DH_METHOD dh_ossl = {
88
  .name = "OpenSSL DH Method",
89
  .generate_key = generate_key,
90
  .compute_key = compute_key,
91
  .bn_mod_exp = dh_bn_mod_exp,
92
  .init = dh_init,
93
  .finish = dh_finish,
94
};
95
96
const DH_METHOD *
97
DH_OpenSSL(void)
98
0
{
99
0
  return &dh_ossl;
100
0
}
101
102
static int
103
generate_key(DH *dh)
104
0
{
105
0
  int ok = 0;
106
0
  unsigned l;
107
0
  BN_CTX *ctx;
108
0
  BN_MONT_CTX *mont = NULL;
109
0
  BIGNUM *pub_key = NULL, *priv_key = NULL, *two = NULL;
110
111
0
  if (BN_num_bits(dh->p) > OPENSSL_DH_MAX_MODULUS_BITS) {
112
0
    DHerror(DH_R_MODULUS_TOO_LARGE);
113
0
    return 0;
114
0
  }
115
116
0
  ctx = BN_CTX_new();
117
0
  if (ctx == NULL)
118
0
    goto err;
119
120
0
  if ((priv_key = dh->priv_key) == NULL) {
121
0
    if ((priv_key = BN_new()) == NULL)
122
0
      goto err;
123
0
  }
124
125
0
  if ((pub_key = dh->pub_key) == NULL) {
126
0
    if ((pub_key = BN_new()) == NULL)
127
0
      goto err;
128
0
  }
129
130
0
  if (dh->flags & DH_FLAG_CACHE_MONT_P) {
131
0
    mont = BN_MONT_CTX_set_locked(&dh->method_mont_p,
132
0
        CRYPTO_LOCK_DH, dh->p, ctx);
133
0
    if (!mont)
134
0
      goto err;
135
0
  }
136
137
0
  if (dh->priv_key == NULL) {
138
0
    if (dh->q) {
139
0
      if ((two = BN_new()) == NULL)
140
0
        goto err;
141
0
      if (!BN_add(two, BN_value_one(), BN_value_one()))
142
0
        goto err;
143
0
      if (!bn_rand_interval(priv_key, two, dh->q))
144
0
        goto err;
145
0
    } else {
146
      /* secret exponent length */
147
0
      l = dh->length ? dh->length : BN_num_bits(dh->p) - 1;
148
0
      if (!BN_rand(priv_key, l, 0, 0))
149
0
        goto err;
150
0
    }
151
0
  }
152
153
0
  if (!dh->meth->bn_mod_exp(dh, pub_key, dh->g, priv_key, dh->p, ctx,
154
0
      mont))
155
0
    goto err;
156
157
0
  dh->pub_key = pub_key;
158
0
  dh->priv_key = priv_key;
159
0
  ok = 1;
160
0
 err:
161
0
  if (ok != 1)
162
0
    DHerror(ERR_R_BN_LIB);
163
164
0
  if (dh->pub_key == NULL)
165
0
    BN_free(pub_key);
166
0
  if (dh->priv_key == NULL)
167
0
    BN_free(priv_key);
168
0
  BN_CTX_free(ctx);
169
0
  BN_free(two);
170
0
  return ok;
171
0
}
172
173
static int
174
compute_key(unsigned char *key, const BIGNUM *pub_key, DH *dh)
175
0
{
176
0
  BN_CTX *ctx = NULL;
177
0
  BN_MONT_CTX *mont = NULL;
178
0
  BIGNUM *tmp;
179
0
  int ret = -1;
180
0
        int check_result;
181
182
0
  if (BN_num_bits(dh->p) > OPENSSL_DH_MAX_MODULUS_BITS) {
183
0
    DHerror(DH_R_MODULUS_TOO_LARGE);
184
0
    goto err;
185
0
  }
186
187
0
  ctx = BN_CTX_new();
188
0
  if (ctx == NULL)
189
0
    goto err;
190
0
  BN_CTX_start(ctx);
191
0
  if ((tmp = BN_CTX_get(ctx)) == NULL)
192
0
    goto err;
193
194
0
  if (dh->priv_key == NULL) {
195
0
    DHerror(DH_R_NO_PRIVATE_VALUE);
196
0
    goto err;
197
0
  }
198
199
0
  if (dh->flags & DH_FLAG_CACHE_MONT_P) {
200
0
    mont = BN_MONT_CTX_set_locked(&dh->method_mont_p,
201
0
        CRYPTO_LOCK_DH, dh->p, ctx);
202
203
0
    BN_set_flags(dh->priv_key, BN_FLG_CONSTTIME);
204
205
0
    if (!mont)
206
0
      goto err;
207
0
  }
208
209
0
        if (!DH_check_pub_key(dh, pub_key, &check_result) || check_result) {
210
0
    DHerror(DH_R_INVALID_PUBKEY);
211
0
    goto err;
212
0
  }
213
214
0
  if (!dh->meth->bn_mod_exp(dh, tmp, pub_key, dh->priv_key, dh->p, ctx,
215
0
      mont)) {
216
0
    DHerror(ERR_R_BN_LIB);
217
0
    goto err;
218
0
  }
219
220
0
  ret = BN_bn2bin(tmp, key);
221
0
 err:
222
0
  if (ctx != NULL) {
223
0
    BN_CTX_end(ctx);
224
0
    BN_CTX_free(ctx);
225
0
  }
226
0
  return ret;
227
0
}
228
229
static int
230
dh_bn_mod_exp(const DH *dh, BIGNUM *r, const BIGNUM *a, const BIGNUM *p,
231
    const BIGNUM *m, BN_CTX *ctx, BN_MONT_CTX *m_ctx)
232
0
{
233
0
  return BN_mod_exp_mont_ct(r, a, p, m, ctx, m_ctx);
234
0
}
235
236
static int
237
dh_init(DH *dh)
238
0
{
239
0
  dh->flags |= DH_FLAG_CACHE_MONT_P;
240
0
  return 1;
241
0
}
242
243
static int
244
dh_finish(DH *dh)
245
0
{
246
0
  BN_MONT_CTX_free(dh->method_mont_p);
247
0
  return 1;
248
0
}