467 lines
12 KiB
C
Raw Normal View History

2004-01-25 17:40:34 +00:00
/* LibTomCrypt, modular cryptographic library -- Tom St Denis
*
* LibTomCrypt is a library that provides various cryptographic
* algorithms in a highly modular and flexible manner.
*
* The library is free for all purposes without any express
2004-05-12 20:42:16 +00:00
* guarantee it works.
2004-01-25 17:40:34 +00:00
*
* Tom St Denis, tomstdenis@iahu.ca, http://libtomcrypt.org
*/
2003-03-03 00:59:24 +00:00
#include "mycrypt.h"
#ifdef MDH
2004-06-20 02:41:49 +00:00
/* max export size we'll encounter (smaller than this but lets round up a bit */
#define DH_BUF_SIZE 1200
2003-03-03 01:01:00 +00:00
/* This holds the key settings. ***MUST*** be organized by size from smallest to largest. */
2003-03-03 00:59:24 +00:00
static const struct {
int size;
char *name, *base, *prime;
} sets[] = {
#ifdef DH768
{
96,
"DH-768",
2003-09-08 01:06:11 +00:00
"4",
"F///////////////////////////////////////////////////////////"
"////////////////////////////////////////////////////////////"
"//////m3wvV"
2003-03-03 00:59:24 +00:00
},
#endif
#ifdef DH1024
{
128,
"DH-1024",
2003-09-08 01:06:11 +00:00
"4",
"F///////////////////////////////////////////////////////////"
"////////////////////////////////////////////////////////////"
"////////////////////////////////////////////////m3C47"
2003-03-03 00:59:24 +00:00
},
#endif
#ifdef DH1280
{
160,
"DH-1280",
2003-09-08 01:06:11 +00:00
"4",
"F///////////////////////////////////////////////////////////"
"////////////////////////////////////////////////////////////"
"////////////////////////////////////////////////////////////"
"//////////////////////////////m4kSN"
2003-03-03 00:59:24 +00:00
},
#endif
#ifdef DH1536
{
192,
"DH-1536",
2003-09-08 01:06:11 +00:00
"4",
"F///////////////////////////////////////////////////////////"
"////////////////////////////////////////////////////////////"
"////////////////////////////////////////////////////////////"
"////////////////////////////////////////////////////////////"
"////////////m5uqd"
2003-03-03 00:59:24 +00:00
},
#endif
#ifdef DH1792
{
224,
"DH-1792",
2003-09-08 01:06:11 +00:00
"4",
"F///////////////////////////////////////////////////////////"
"////////////////////////////////////////////////////////////"
"////////////////////////////////////////////////////////////"
"////////////////////////////////////////////////////////////"
"//////////////////////////////////////////////////////mT/sd"
2003-03-03 00:59:24 +00:00
},
#endif
#ifdef DH2048
{
256,
"DH-2048",
2003-09-08 01:06:11 +00:00
"4",
"3///////////////////////////////////////////////////////////"
"////////////////////////////////////////////////////////////"
"////////////////////////////////////////////////////////////"
"////////////////////////////////////////////////////////////"
"////////////////////////////////////////////////////////////"
"/////////////////////////////////////////m8MPh"
2003-03-03 00:59:24 +00:00
},
#endif
#ifdef DH2560
{
320,
"DH-2560",
2003-09-08 01:06:11 +00:00
"4",
"3///////////////////////////////////////////////////////////"
"////////////////////////////////////////////////////////////"
"////////////////////////////////////////////////////////////"
"////////////////////////////////////////////////////////////"
"////////////////////////////////////////////////////////////"
"////////////////////////////////////////////////////////////"
"////////////////////////////////////////////////////////////"
"/////mKFpF"
2003-03-03 00:59:24 +00:00
},
#endif
#ifdef DH3072
{
384,
"DH-3072",
2003-09-08 01:06:11 +00:00
"4",
"3///////////////////////////////////////////////////////////"
"////////////////////////////////////////////////////////////"
"////////////////////////////////////////////////////////////"
"////////////////////////////////////////////////////////////"
"////////////////////////////////////////////////////////////"
"////////////////////////////////////////////////////////////"
"////////////////////////////////////////////////////////////"
"////////////////////////////////////////////////////////////"
"/////////////////////////////m32nN"
2003-03-03 00:59:24 +00:00
},
#endif
#ifdef DH4096
{
512,
2003-06-01 18:55:11 +00:00
"DH-4096",
2003-09-08 01:06:11 +00:00
"4",
"////////////////////////////////////////////////////////////"
"////////////////////////////////////////////////////////////"
"////////////////////////////////////////////////////////////"
"////////////////////////////////////////////////////////////"
"////////////////////////////////////////////////////////////"
"////////////////////////////////////////////////////////////"
"////////////////////////////////////////////////////////////"
"////////////////////////////////////////////////////////////"
"////////////////////////////////////////////////////////////"
"////////////////////////////////////////////////////////////"
"////////////////////////////////////////////////////////////"
"/////////////////////m8pOF"
2003-03-03 00:59:24 +00:00
},
#endif
2003-06-01 18:55:11 +00:00
{
2003-03-03 00:59:24 +00:00
0,
NULL,
NULL,
NULL
}
};
static int is_valid_idx(int n)
{
int x;
for (x = 0; sets[x].size; x++);
if ((n < 0) || (n >= x)) {
return 0;
}
return 1;
}
int dh_test(void)
{
mp_int p, g, tmp;
2004-02-20 20:03:32 +00:00
int x, err, primality;
2003-03-03 00:59:24 +00:00
2004-02-20 20:03:32 +00:00
if ((err = mp_init_multi(&p, &g, &tmp, NULL)) != MP_OKAY) { goto error; }
2003-03-03 00:59:24 +00:00
2003-03-03 01:02:42 +00:00
for (x = 0; sets[x].size != 0; x++) {
2003-03-03 00:59:24 +00:00
#if 0
printf("dh_test():testing size %d-bits\n", sets[x].size * 8);
#endif
2004-02-20 20:03:32 +00:00
if ((err = mp_read_radix(&g,(char *)sets[x].base, 64)) != MP_OKAY) { goto error; }
if ((err = mp_read_radix(&p,(char *)sets[x].prime, 64)) != MP_OKAY) { goto error; }
2003-03-03 00:59:24 +00:00
/* ensure p is prime */
2004-02-20 20:03:32 +00:00
if ((err = is_prime(&p, &primality)) != CRYPT_OK) { goto done; }
2003-06-01 18:55:11 +00:00
if (primality == 0) {
2004-02-20 20:03:32 +00:00
err = CRYPT_FAIL_TESTVECTOR;
2003-03-03 00:59:24 +00:00
goto done;
}
2004-02-20 20:03:32 +00:00
if ((err = mp_sub_d(&p, 1, &tmp)) != MP_OKAY) { goto error; }
if ((err = mp_div_2(&tmp, &tmp)) != MP_OKAY) { goto error; }
2003-03-03 00:59:24 +00:00
/* ensure (p-1)/2 is prime */
2004-02-20 20:03:32 +00:00
if ((err = is_prime(&tmp, &primality)) != CRYPT_OK) { goto done; }
2003-03-03 00:59:24 +00:00
if (primality == 0) {
2004-02-20 20:03:32 +00:00
err = CRYPT_FAIL_TESTVECTOR;
2003-03-03 00:59:24 +00:00
goto done;
}
/* now see if g^((p-1)/2) mod p is in fact 1 */
2004-02-20 20:03:32 +00:00
if ((err = mp_exptmod(&g, &tmp, &p, &tmp)) != MP_OKAY) { goto error; }
2003-03-03 00:59:24 +00:00
if (mp_cmp_d(&tmp, 1)) {
2004-02-20 20:03:32 +00:00
err = CRYPT_FAIL_TESTVECTOR;
2003-03-03 00:59:24 +00:00
goto done;
}
}
2004-02-20 20:03:32 +00:00
err = CRYPT_OK;
2003-03-03 00:59:24 +00:00
goto done;
error:
2004-02-20 20:03:32 +00:00
err = mpi_to_ltc_error(err);
2003-03-03 00:59:24 +00:00
done:
mp_clear_multi(&tmp, &g, &p, NULL);
2004-02-20 20:03:32 +00:00
return err;
2003-03-03 00:59:24 +00:00
}
void dh_sizes(int *low, int *high)
{
int x;
_ARGCHK(low != NULL);
_ARGCHK(high != NULL);
*low = INT_MAX;
*high = 0;
2003-03-03 01:02:42 +00:00
for (x = 0; sets[x].size != 0; x++) {
2003-03-03 00:59:24 +00:00
if (*low > sets[x].size) *low = sets[x].size;
if (*high < sets[x].size) *high = sets[x].size;
}
}
int dh_get_size(dh_key *key)
{
_ARGCHK(key != NULL);
2003-03-13 02:12:16 +00:00
if (is_valid_idx(key->idx) == 1) {
2003-03-03 00:59:24 +00:00
return sets[key->idx].size;
2003-03-13 02:12:16 +00:00
} else {
2003-03-03 00:59:24 +00:00
return INT_MAX; /* large value that would cause dh_make_key() to fail */
2003-03-13 02:12:16 +00:00
}
2003-03-03 00:59:24 +00:00
}
2003-06-01 18:55:11 +00:00
2003-03-03 00:59:24 +00:00
int dh_make_key(prng_state *prng, int wprng, int keysize, dh_key *key)
{
2004-06-20 02:41:49 +00:00
unsigned char *buf;
2003-03-03 00:59:24 +00:00
unsigned long x;
mp_int p, g;
2004-02-20 20:03:32 +00:00
int err;
2003-03-03 00:59:24 +00:00
_ARGCHK(key != NULL);
/* good prng? */
2003-03-03 01:02:42 +00:00
if ((err = prng_is_valid(wprng)) != CRYPT_OK) {
return err;
2003-03-03 00:59:24 +00:00
}
/* find key size */
2003-03-03 01:02:42 +00:00
for (x = 0; (keysize > sets[x].size) && (sets[x].size != 0); x++);
2003-03-03 00:59:24 +00:00
#ifdef FAST_PK
keysize = MIN(sets[x].size, 32);
2003-06-01 18:55:11 +00:00
#else
2003-03-03 00:59:24 +00:00
keysize = sets[x].size;
#endif
if (sets[x].size == 0) {
return CRYPT_INVALID_KEYSIZE;
}
key->idx = x;
2004-06-20 02:41:49 +00:00
/* allocate buffer */
buf = XMALLOC(keysize);
if (buf == NULL) {
return CRYPT_MEM;
}
2003-03-03 00:59:24 +00:00
/* make up random string */
2003-03-03 01:02:42 +00:00
if (prng_descriptor[wprng].read(buf, keysize, prng) != (unsigned long)keysize) {
2004-06-20 02:41:49 +00:00
err = CRYPT_ERROR_READPRNG;
goto error2;
2003-03-03 00:59:24 +00:00
}
/* init parameters */
2004-02-20 20:03:32 +00:00
if ((err = mp_init_multi(&g, &p, &key->x, &key->y, NULL)) != MP_OKAY) {
2004-06-20 02:41:49 +00:00
goto error;
2003-03-03 00:59:24 +00:00
}
2004-02-20 20:03:32 +00:00
if ((err = mp_read_radix(&g, sets[key->idx].base, 64)) != MP_OKAY) { goto error; }
if ((err = mp_read_radix(&p, sets[key->idx].prime, 64)) != MP_OKAY) { goto error; }
2003-03-03 00:59:24 +00:00
/* load the x value */
2004-02-20 20:03:32 +00:00
if ((err = mp_read_unsigned_bin(&key->x, buf, keysize)) != MP_OKAY) { goto error; }
if ((err = mp_exptmod(&g, &key->x, &p, &key->y)) != MP_OKAY) { goto error; }
2003-03-03 00:59:24 +00:00
key->type = PK_PRIVATE;
2003-06-01 18:55:11 +00:00
2004-02-20 20:03:32 +00:00
if ((err = mp_shrink(&key->x)) != MP_OKAY) { goto error; }
if ((err = mp_shrink(&key->y)) != MP_OKAY) { goto error; }
2003-03-03 00:59:24 +00:00
/* free up ram */
2004-02-20 20:03:32 +00:00
err = CRYPT_OK;
goto done;
2003-03-03 01:02:10 +00:00
error:
2004-02-20 20:03:32 +00:00
err = mpi_to_ltc_error(err);
2004-06-20 02:41:49 +00:00
error2:
2003-03-03 00:59:24 +00:00
mp_clear_multi(&key->x, &key->y, NULL);
2004-02-20 20:03:32 +00:00
done:
2004-06-20 02:41:49 +00:00
#ifdef CLEAN_STACK
zeromem(buf, keysize);
#endif
2003-03-03 00:59:24 +00:00
mp_clear_multi(&p, &g, NULL);
2004-06-20 02:41:49 +00:00
XFREE(buf);
2004-02-20 20:03:32 +00:00
return err;
2003-03-03 00:59:24 +00:00
}
void dh_free(dh_key *key)
{
_ARGCHK(key != NULL);
mp_clear_multi(&key->x, &key->y, NULL);
}
int dh_export(unsigned char *out, unsigned long *outlen, int type, dh_key *key)
{
unsigned long y, z;
2003-12-24 18:59:57 +00:00
int err;
2003-03-03 00:59:24 +00:00
2004-05-12 20:42:16 +00:00
_ARGCHK(out != NULL);
2003-03-03 00:59:24 +00:00
_ARGCHK(outlen != NULL);
2004-05-12 20:42:16 +00:00
_ARGCHK(key != NULL);
2003-03-03 00:59:24 +00:00
2004-02-20 20:03:32 +00:00
/* can we store the static header? */
if (*outlen < (PACKET_SIZE + 2)) {
return CRYPT_BUFFER_OVERFLOW;
}
2003-03-03 00:59:24 +00:00
if (type == PK_PRIVATE && key->type != PK_PRIVATE) {
return CRYPT_PK_NOT_PRIVATE;
}
/* header */
y = PACKET_SIZE;
/* header */
2004-02-20 20:03:32 +00:00
out[y++] = type;
out[y++] = (unsigned char)(sets[key->idx].size / 8);
2003-03-03 00:59:24 +00:00
/* export y */
2004-02-20 20:03:32 +00:00
OUTPUT_BIGNUM(&key->y, out, y, z);
2003-03-03 00:59:24 +00:00
2003-06-01 18:55:11 +00:00
if (type == PK_PRIVATE) {
2003-03-03 00:59:24 +00:00
/* export x */
2004-02-20 20:03:32 +00:00
OUTPUT_BIGNUM(&key->x, out, y, z);
2003-03-03 00:59:24 +00:00
}
/* store header */
2004-02-20 20:03:32 +00:00
packet_store_header(out, PACKET_SECT_DH, PACKET_SUB_KEY);
2003-03-03 00:59:24 +00:00
2004-02-20 20:03:32 +00:00
/* store len */
2003-03-03 00:59:24 +00:00
*outlen = y;
return CRYPT_OK;
}
2003-03-03 01:01:40 +00:00
int dh_import(const unsigned char *in, unsigned long inlen, dh_key *key)
2003-03-03 00:59:24 +00:00
{
2003-03-03 01:01:40 +00:00
unsigned long x, y, s;
2003-03-03 01:02:42 +00:00
int err;
2003-03-03 00:59:24 +00:00
2004-05-12 20:42:16 +00:00
_ARGCHK(in != NULL);
2003-03-03 00:59:24 +00:00
_ARGCHK(key != NULL);
2003-06-01 18:55:11 +00:00
/* make sure valid length */
2004-02-20 20:03:32 +00:00
if ((2+PACKET_SIZE) > inlen) {
2003-06-01 18:55:11 +00:00
return CRYPT_INVALID_PACKET;
}
2003-03-03 00:59:24 +00:00
/* check type byte */
2003-03-03 01:02:42 +00:00
if ((err = packet_valid_header((unsigned char *)in, PACKET_SECT_DH, PACKET_SUB_KEY)) != CRYPT_OK) {
return err;
2003-03-03 00:59:24 +00:00
}
/* init */
2003-12-24 18:59:57 +00:00
if ((err = mp_init_multi(&key->x, &key->y, NULL)) != MP_OKAY) {
return mpi_to_ltc_error(err);
2003-03-03 00:59:24 +00:00
}
2003-06-01 18:55:11 +00:00
/* advance past packet header */
2003-03-03 00:59:24 +00:00
y = PACKET_SIZE;
2003-06-01 18:55:11 +00:00
/* key type, e.g. private, public */
2003-03-03 01:02:42 +00:00
key->type = (int)in[y++];
2003-06-01 18:55:11 +00:00
/* key size in bytes */
2003-03-03 01:02:42 +00:00
s = (unsigned long)in[y++] * 8;
2003-06-01 18:55:11 +00:00
2003-03-03 01:02:42 +00:00
for (x = 0; (s > (unsigned long)sets[x].size) && (sets[x].size != 0); x++);
2003-03-03 01:01:00 +00:00
if (sets[x].size == 0) {
2003-03-03 01:02:42 +00:00
err = CRYPT_INVALID_KEYSIZE;
2003-03-03 01:01:00 +00:00
goto error;
}
2003-03-03 01:02:42 +00:00
key->idx = (int)x;
2003-03-03 00:59:24 +00:00
/* type check both values */
if ((key->type != PK_PUBLIC) && (key->type != PK_PRIVATE)) {
2003-03-03 01:02:42 +00:00
err = CRYPT_PK_TYPE_MISMATCH;
2003-03-03 00:59:24 +00:00
goto error;
}
/* is the key idx valid? */
2003-03-03 01:02:42 +00:00
if (is_valid_idx(key->idx) != 1) {
err = CRYPT_PK_TYPE_MISMATCH;
2003-03-03 00:59:24 +00:00
goto error;
}
/* load public value g^x mod p*/
2004-05-12 20:42:16 +00:00
INPUT_BIGNUM(&key->y, in, x, y, inlen);
2003-03-03 00:59:24 +00:00
if (key->type == PK_PRIVATE) {
2004-05-12 20:42:16 +00:00
INPUT_BIGNUM(&key->x, in, x, y, inlen);
2003-03-03 00:59:24 +00:00
}
2003-03-03 01:02:10 +00:00
/* eliminate private key if public */
if (key->type == PK_PUBLIC) {
mp_clear(&key->x);
2003-06-01 18:55:11 +00:00
}
2003-03-03 01:02:10 +00:00
2003-03-03 00:59:24 +00:00
return CRYPT_OK;
error:
mp_clear_multi(&key->y, &key->x, NULL);
2003-03-03 01:02:42 +00:00
return err;
2003-03-03 00:59:24 +00:00
}
2003-06-01 18:55:11 +00:00
int dh_shared_secret(dh_key *private_key, dh_key *public_key,
2003-03-03 00:59:24 +00:00
unsigned char *out, unsigned long *outlen)
{
mp_int tmp, p;
unsigned long x;
2004-02-20 20:03:32 +00:00
int err;
2003-03-03 00:59:24 +00:00
_ARGCHK(private_key != NULL);
_ARGCHK(public_key != NULL);
2004-02-20 20:03:32 +00:00
_ARGCHK(out != NULL);
_ARGCHK(outlen != NULL);
2003-03-03 00:59:24 +00:00
/* types valid? */
if (private_key->type != PK_PRIVATE) {
return CRYPT_PK_NOT_PRIVATE;
}
/* same idx? */
if (private_key->idx != public_key->idx) {
return CRYPT_PK_TYPE_MISMATCH;
}
/* compute y^x mod p */
2004-02-20 20:03:32 +00:00
if ((err = mp_init_multi(&tmp, &p, NULL)) != MP_OKAY) {
return mpi_to_ltc_error(err);
2003-03-03 00:59:24 +00:00
}
2004-02-20 20:03:32 +00:00
if ((err = mp_read_radix(&p, (char *)sets[private_key->idx].prime, 64)) != MP_OKAY) { goto error; }
if ((err = mp_exptmod(&public_key->y, &private_key->x, &p, &tmp)) != MP_OKAY) { goto error; }
2003-03-03 00:59:24 +00:00
/* enough space for output? */
2003-03-03 01:02:42 +00:00
x = (unsigned long)mp_unsigned_bin_size(&tmp);
2003-03-03 00:59:24 +00:00
if (*outlen < x) {
2004-02-20 20:03:32 +00:00
err = CRYPT_BUFFER_OVERFLOW;
2003-03-03 00:59:24 +00:00
goto done;
}
2004-02-20 20:03:32 +00:00
if ((err = mp_to_unsigned_bin(&tmp, out)) != MP_OKAY) { goto error; }
2003-03-03 00:59:24 +00:00
*outlen = x;
2004-02-20 20:03:32 +00:00
err = CRYPT_OK;
2003-03-03 00:59:24 +00:00
goto done;
error:
2004-02-20 20:03:32 +00:00
err = mpi_to_ltc_error(err);
2003-03-03 00:59:24 +00:00
done:
mp_clear_multi(&p, &tmp, NULL);
2004-02-20 20:03:32 +00:00
return err;
2003-03-03 00:59:24 +00:00
}
#include "dh_sys.c"
#endif