/src/openssl32/crypto/ffc/ffc_params.c
Line | Count | Source (jump to first uncovered line) |
1 | | /* |
2 | | * Copyright 2019-2023 The OpenSSL Project Authors. All Rights Reserved. |
3 | | * |
4 | | * Licensed under the Apache License 2.0 (the "License"). You may not use |
5 | | * this file except in compliance with the License. You can obtain a copy |
6 | | * in the file LICENSE in the source distribution or at |
7 | | * https://www.openssl.org/source/license.html |
8 | | */ |
9 | | |
10 | | #include <string.h> /* memset */ |
11 | | #include <openssl/core_names.h> |
12 | | #include "internal/ffc.h" |
13 | | #include "internal/param_build_set.h" |
14 | | #include "internal/nelem.h" |
15 | | |
16 | | #ifndef FIPS_MODULE |
17 | | # include <openssl/asn1.h> /* ossl_ffc_params_print */ |
18 | | #endif |
19 | | |
20 | | void ossl_ffc_params_init(FFC_PARAMS *params) |
21 | 1.29M | { |
22 | 1.29M | memset(params, 0, sizeof(*params)); |
23 | 1.29M | params->pcounter = -1; |
24 | 1.29M | params->gindex = FFC_UNVERIFIABLE_GINDEX; |
25 | 1.29M | params->flags = FFC_PARAM_FLAG_VALIDATE_PQG; |
26 | 1.29M | } |
27 | | |
28 | | void ossl_ffc_params_cleanup(FFC_PARAMS *params) |
29 | 648k | { |
30 | 648k | BN_free(params->p); |
31 | 648k | BN_free(params->q); |
32 | 648k | BN_free(params->g); |
33 | 648k | BN_free(params->j); |
34 | 648k | OPENSSL_free(params->seed); |
35 | 648k | ossl_ffc_params_init(params); |
36 | 648k | } |
37 | | |
38 | | void ossl_ffc_params_set0_pqg(FFC_PARAMS *d, BIGNUM *p, BIGNUM *q, BIGNUM *g) |
39 | 84.6k | { |
40 | 84.6k | if (p != NULL && p != d->p) { |
41 | 84.6k | BN_free(d->p); |
42 | 84.6k | d->p = p; |
43 | 84.6k | } |
44 | 84.6k | if (q != NULL && q != d->q) { |
45 | 79.1k | BN_free(d->q); |
46 | 79.1k | d->q = q; |
47 | 79.1k | } |
48 | 84.6k | if (g != NULL && g != d->g) { |
49 | 84.6k | BN_free(d->g); |
50 | 84.6k | d->g = g; |
51 | 84.6k | } |
52 | 84.6k | } |
53 | | |
54 | | void ossl_ffc_params_get0_pqg(const FFC_PARAMS *d, const BIGNUM **p, |
55 | | const BIGNUM **q, const BIGNUM **g) |
56 | 46.7k | { |
57 | 46.7k | if (p != NULL) |
58 | 46.7k | *p = d->p; |
59 | 46.7k | if (q != NULL) |
60 | 38.5k | *q = d->q; |
61 | 46.7k | if (g != NULL) |
62 | 38.5k | *g = d->g; |
63 | 46.7k | } |
64 | | |
65 | | |
66 | | /* j is the 'cofactor' that is optionally output for ASN1. */ |
67 | | void ossl_ffc_params_set0_j(FFC_PARAMS *d, BIGNUM *j) |
68 | 82.9k | { |
69 | 82.9k | BN_free(d->j); |
70 | 82.9k | d->j = NULL; |
71 | 82.9k | if (j != NULL) |
72 | 9.19k | d->j = j; |
73 | 82.9k | } |
74 | | |
75 | | int ossl_ffc_params_set_seed(FFC_PARAMS *params, |
76 | | const unsigned char *seed, size_t seedlen) |
77 | 2.07k | { |
78 | 2.07k | if (params->seed != NULL) { |
79 | 0 | if (params->seed == seed) |
80 | 0 | return 1; |
81 | 0 | OPENSSL_free(params->seed); |
82 | 0 | } |
83 | | |
84 | 2.07k | if (seed != NULL && seedlen > 0) { |
85 | 106 | params->seed = OPENSSL_memdup(seed, seedlen); |
86 | 106 | if (params->seed == NULL) |
87 | 0 | return 0; |
88 | 106 | params->seedlen = seedlen; |
89 | 1.97k | } else { |
90 | 1.97k | params->seed = NULL; |
91 | 1.97k | params->seedlen = 0; |
92 | 1.97k | } |
93 | 2.07k | return 1; |
94 | 2.07k | } |
95 | | |
96 | | void ossl_ffc_params_set_gindex(FFC_PARAMS *params, int index) |
97 | 0 | { |
98 | 0 | params->gindex = index; |
99 | 0 | } |
100 | | |
101 | | void ossl_ffc_params_set_pcounter(FFC_PARAMS *params, int index) |
102 | 0 | { |
103 | 0 | params->pcounter = index; |
104 | 0 | } |
105 | | |
106 | | void ossl_ffc_params_set_h(FFC_PARAMS *params, int index) |
107 | 0 | { |
108 | 0 | params->h = index; |
109 | 0 | } |
110 | | |
111 | | void ossl_ffc_params_set_flags(FFC_PARAMS *params, unsigned int flags) |
112 | 0 | { |
113 | 0 | params->flags = flags; |
114 | 0 | } |
115 | | |
116 | | void ossl_ffc_params_enable_flags(FFC_PARAMS *params, unsigned int flags, |
117 | | int enable) |
118 | 80.1k | { |
119 | 80.1k | if (enable) |
120 | 50.8k | params->flags |= flags; |
121 | 29.2k | else |
122 | 29.2k | params->flags &= ~flags; |
123 | 80.1k | } |
124 | | |
125 | | void ossl_ffc_set_digest(FFC_PARAMS *params, const char *alg, const char *props) |
126 | 0 | { |
127 | 0 | params->mdname = alg; |
128 | 0 | params->mdprops = props; |
129 | 0 | } |
130 | | |
131 | | int ossl_ffc_params_set_validate_params(FFC_PARAMS *params, |
132 | | const unsigned char *seed, |
133 | | size_t seedlen, int counter) |
134 | 233 | { |
135 | 233 | if (!ossl_ffc_params_set_seed(params, seed, seedlen)) |
136 | 0 | return 0; |
137 | 233 | params->pcounter = counter; |
138 | 233 | return 1; |
139 | 233 | } |
140 | | |
141 | | void ossl_ffc_params_get_validate_params(const FFC_PARAMS *params, |
142 | | unsigned char **seed, size_t *seedlen, |
143 | | int *pcounter) |
144 | 274 | { |
145 | 274 | if (seed != NULL) |
146 | 274 | *seed = params->seed; |
147 | 274 | if (seedlen != NULL) |
148 | 274 | *seedlen = params->seedlen; |
149 | 274 | if (pcounter != NULL) |
150 | 274 | *pcounter = params->pcounter; |
151 | 274 | } |
152 | | |
153 | | static int ffc_bn_cpy(BIGNUM **dst, const BIGNUM *src) |
154 | 37.6k | { |
155 | 37.6k | BIGNUM *a; |
156 | | |
157 | | /* |
158 | | * If source is read only just copy the pointer, so |
159 | | * we don't have to reallocate it. |
160 | | */ |
161 | 37.6k | if (src == NULL) |
162 | 13.5k | a = NULL; |
163 | 24.1k | else if (BN_get_flags(src, BN_FLG_STATIC_DATA) |
164 | 24.1k | && !BN_get_flags(src, BN_FLG_MALLOCED)) |
165 | 3.10k | a = (BIGNUM *)src; |
166 | 20.9k | else if ((a = BN_dup(src)) == NULL) |
167 | 0 | return 0; |
168 | 37.6k | BN_clear_free(*dst); |
169 | 37.6k | *dst = a; |
170 | 37.6k | return 1; |
171 | 37.6k | } |
172 | | |
173 | | int ossl_ffc_params_copy(FFC_PARAMS *dst, const FFC_PARAMS *src) |
174 | 9.42k | { |
175 | 9.42k | if (!ffc_bn_cpy(&dst->p, src->p) |
176 | 9.42k | || !ffc_bn_cpy(&dst->g, src->g) |
177 | 9.42k | || !ffc_bn_cpy(&dst->q, src->q) |
178 | 9.42k | || !ffc_bn_cpy(&dst->j, src->j)) |
179 | 0 | return 0; |
180 | | |
181 | 9.42k | dst->mdname = src->mdname; |
182 | 9.42k | dst->mdprops = src->mdprops; |
183 | 9.42k | OPENSSL_free(dst->seed); |
184 | 9.42k | dst->seedlen = src->seedlen; |
185 | 9.42k | if (src->seed != NULL) { |
186 | 64 | dst->seed = OPENSSL_memdup(src->seed, src->seedlen); |
187 | 64 | if (dst->seed == NULL) |
188 | 0 | return 0; |
189 | 9.35k | } else { |
190 | 9.35k | dst->seed = NULL; |
191 | 9.35k | } |
192 | 9.42k | dst->nid = src->nid; |
193 | 9.42k | dst->pcounter = src->pcounter; |
194 | 9.42k | dst->h = src->h; |
195 | 9.42k | dst->gindex = src->gindex; |
196 | 9.42k | dst->flags = src->flags; |
197 | 9.42k | dst->keylength = src->keylength; |
198 | 9.42k | return 1; |
199 | 9.42k | } |
200 | | |
201 | | int ossl_ffc_params_cmp(const FFC_PARAMS *a, const FFC_PARAMS *b, int ignore_q) |
202 | 55.4k | { |
203 | 55.4k | return BN_cmp(a->p, b->p) == 0 |
204 | 55.4k | && BN_cmp(a->g, b->g) == 0 |
205 | 55.4k | && (ignore_q || BN_cmp(a->q, b->q) == 0); /* Note: q may be NULL */ |
206 | 55.4k | } |
207 | | |
208 | | int ossl_ffc_params_todata(const FFC_PARAMS *ffc, OSSL_PARAM_BLD *bld, |
209 | | OSSL_PARAM params[]) |
210 | 87.2k | { |
211 | 87.2k | int test_flags; |
212 | | |
213 | 87.2k | if (ffc->p != NULL |
214 | 87.2k | && !ossl_param_build_set_bn(bld, params, OSSL_PKEY_PARAM_FFC_P, ffc->p)) |
215 | 0 | return 0; |
216 | 87.2k | if (ffc->q != NULL |
217 | 87.2k | && !ossl_param_build_set_bn(bld, params, OSSL_PKEY_PARAM_FFC_Q, ffc->q)) |
218 | 0 | return 0; |
219 | 87.2k | if (ffc->g != NULL |
220 | 87.2k | && !ossl_param_build_set_bn(bld, params, OSSL_PKEY_PARAM_FFC_G, ffc->g)) |
221 | 0 | return 0; |
222 | 87.2k | if (ffc->j != NULL |
223 | 87.2k | && !ossl_param_build_set_bn(bld, params, OSSL_PKEY_PARAM_FFC_COFACTOR, |
224 | 4.71k | ffc->j)) |
225 | 0 | return 0; |
226 | 87.2k | if (!ossl_param_build_set_int(bld, params, OSSL_PKEY_PARAM_FFC_GINDEX, |
227 | 87.2k | ffc->gindex)) |
228 | 0 | return 0; |
229 | 87.2k | if (!ossl_param_build_set_int(bld, params, OSSL_PKEY_PARAM_FFC_PCOUNTER, |
230 | 87.2k | ffc->pcounter)) |
231 | 0 | return 0; |
232 | 87.2k | if (!ossl_param_build_set_int(bld, params, OSSL_PKEY_PARAM_FFC_H, ffc->h)) |
233 | 0 | return 0; |
234 | 87.2k | if (ffc->seed != NULL |
235 | 87.2k | && !ossl_param_build_set_octet_string(bld, params, |
236 | 128 | OSSL_PKEY_PARAM_FFC_SEED, |
237 | 128 | ffc->seed, ffc->seedlen)) |
238 | 0 | return 0; |
239 | 87.2k | if (ffc->nid != NID_undef) { |
240 | 2.32k | const DH_NAMED_GROUP *group = ossl_ffc_uid_to_dh_named_group(ffc->nid); |
241 | 2.32k | const char *name = ossl_ffc_named_group_get_name(group); |
242 | | |
243 | 2.32k | if (name == NULL |
244 | 2.32k | || !ossl_param_build_set_utf8_string(bld, params, |
245 | 2.32k | OSSL_PKEY_PARAM_GROUP_NAME, |
246 | 2.32k | name)) |
247 | 0 | return 0; |
248 | 2.32k | } |
249 | 87.2k | test_flags = ((ffc->flags & FFC_PARAM_FLAG_VALIDATE_PQ) != 0); |
250 | 87.2k | if (!ossl_param_build_set_int(bld, params, |
251 | 87.2k | OSSL_PKEY_PARAM_FFC_VALIDATE_PQ, test_flags)) |
252 | 0 | return 0; |
253 | 87.2k | test_flags = ((ffc->flags & FFC_PARAM_FLAG_VALIDATE_G) != 0); |
254 | 87.2k | if (!ossl_param_build_set_int(bld, params, |
255 | 87.2k | OSSL_PKEY_PARAM_FFC_VALIDATE_G, test_flags)) |
256 | 0 | return 0; |
257 | 87.2k | test_flags = ((ffc->flags & FFC_PARAM_FLAG_VALIDATE_LEGACY) != 0); |
258 | 87.2k | if (!ossl_param_build_set_int(bld, params, |
259 | 87.2k | OSSL_PKEY_PARAM_FFC_VALIDATE_LEGACY, |
260 | 87.2k | test_flags)) |
261 | 0 | return 0; |
262 | | |
263 | 87.2k | if (ffc->mdname != NULL |
264 | 87.2k | && !ossl_param_build_set_utf8_string(bld, params, |
265 | 0 | OSSL_PKEY_PARAM_FFC_DIGEST, |
266 | 0 | ffc->mdname)) |
267 | 0 | return 0; |
268 | 87.2k | if (ffc->mdprops != NULL |
269 | 87.2k | && !ossl_param_build_set_utf8_string(bld, params, |
270 | 0 | OSSL_PKEY_PARAM_FFC_DIGEST_PROPS, |
271 | 0 | ffc->mdprops)) |
272 | 0 | return 0; |
273 | 87.2k | return 1; |
274 | 87.2k | } |
275 | | |
276 | | #ifndef FIPS_MODULE |
277 | | int ossl_ffc_params_print(BIO *bp, const FFC_PARAMS *ffc, int indent) |
278 | 355 | { |
279 | 355 | if (!ASN1_bn_print(bp, "prime P:", ffc->p, NULL, indent)) |
280 | 0 | goto err; |
281 | 355 | if (!ASN1_bn_print(bp, "generator G:", ffc->g, NULL, indent)) |
282 | 0 | goto err; |
283 | 355 | if (ffc->q != NULL |
284 | 355 | && !ASN1_bn_print(bp, "subgroup order Q:", ffc->q, NULL, indent)) |
285 | 0 | goto err; |
286 | 355 | if (ffc->j != NULL |
287 | 355 | && !ASN1_bn_print(bp, "subgroup factor:", ffc->j, NULL, indent)) |
288 | 0 | goto err; |
289 | 355 | if (ffc->seed != NULL) { |
290 | 0 | size_t i; |
291 | |
|
292 | 0 | if (!BIO_indent(bp, indent, 128) |
293 | 0 | || BIO_puts(bp, "seed:") <= 0) |
294 | 0 | goto err; |
295 | 0 | for (i = 0; i < ffc->seedlen; i++) { |
296 | 0 | if ((i % 15) == 0) { |
297 | 0 | if (BIO_puts(bp, "\n") <= 0 |
298 | 0 | || !BIO_indent(bp, indent + 4, 128)) |
299 | 0 | goto err; |
300 | 0 | } |
301 | 0 | if (BIO_printf(bp, "%02x%s", ffc->seed[i], |
302 | 0 | ((i + 1) == ffc->seedlen) ? "" : ":") <= 0) |
303 | 0 | goto err; |
304 | 0 | } |
305 | 0 | if (BIO_write(bp, "\n", 1) <= 0) |
306 | 0 | return 0; |
307 | 0 | } |
308 | 355 | if (ffc->pcounter != -1) { |
309 | 0 | if (!BIO_indent(bp, indent, 128) |
310 | 0 | || BIO_printf(bp, "counter: %d\n", ffc->pcounter) <= 0) |
311 | 0 | goto err; |
312 | 0 | } |
313 | 355 | return 1; |
314 | 0 | err: |
315 | 0 | return 0; |
316 | 355 | } |
317 | | #endif /* FIPS_MODULE */ |