491 lines
		
	
	
		
			14 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			491 lines
		
	
	
		
			14 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
| #include "mycrypt.h"
 | |
| 
 | |
| #ifdef MDH
 | |
| 
 | |
| /* This holds the key settings.  ***MUST*** be organized by size from smallest to largest. */
 | |
| static const struct {
 | |
|     int size;
 | |
|     char *name, *base, *prime;
 | |
| } sets[] = {
 | |
| #ifdef DH768
 | |
| {
 | |
|    96,
 | |
|    "DH-768",
 | |
|    "2",
 | |
|    "1tH+dRFGpEYyVLe4ydZcYyGDpeAxnChz0yk+pNCtkEXwUsOORyguBtx8spUD"
 | |
|    "FAjEDS8PutUBTEu2q4USqu19dUbCLj9D2jY7y3871RnSccurMBsMm35ILcyQ"
 | |
|     "rpN0MQKc/"
 | |
| },
 | |
| #endif
 | |
| #ifdef DH1024
 | |
| {
 | |
|    128,
 | |
|    "DH-1024",
 | |
|    "2",
 | |
|    "Uypu+t9nfUnCj7xD+xokM+Cd6mASW4ofg1jpC2BpQasC5edtA1dJC+RjbOBZ"
 | |
|    "z+5mvq5VYT8Wfjmlpjm9tQxHOYB0+3Myl7gbCQ5SRljWT2oBLukLNvgFjiU4"
 | |
|    "wiWkmu41Ern/j6uxwKb740C+VIgDAdeUY4fA5hyfr3/+DWYb14/"
 | |
| },
 | |
| #endif
 | |
| #ifdef DH1280
 | |
| {
 | |
|    160,
 | |
|    "DH-1280",
 | |
|    "2",
 | |
|    "520QV4Tsq4NwK9Mt5CGR9xk4slvaikgi/ax3OPky5GERKTsoqEXOlFyMzURP"
 | |
|    "P8jYzCVz1izKd2zTDxbFfLxrJry0ceaQ5YZa5N4teByCPVlQh4v6iQl+944+"
 | |
|    "/NDlKzvWpx7HG7k8cGKhva7aFF8bP/CvLpaQhrfXlOX+X9pcmML9QH63tUjq"
 | |
|    "B80l8Yx9KN0dC3iNnsTV3DnqnEvFQkoqql"
 | |
| },
 | |
| #endif
 | |
| #ifdef DH1536
 | |
| {
 | |
|    192,
 | |
|    "DH-1536",
 | |
|    "3",
 | |
|    "1FTWXrPcY1w74oZ0ouIzSN8uZcRiOf6U11fx0ka6+7fqIAezPhd3Ab43QnDf"
 | |
|    "KFg+or/fFRGEWAxF8WIE2jx8iTOu010yNEQyH14CK0RAyy2zY4gRs2MpnU5r"
 | |
|    "/feWf60OkLtnPzN34+Xnlg5xf7Jl00wkHRCeJG17L3SklOidAPxWnE+Wm4BS"
 | |
|    "SOzdQBgiZOjlhrYS1+TIU3NP5H7BrtKFcf+ZwBULibf29L7LkDOgQbie1+43"
 | |
|    "lU+8SHAyBwAeGYMfZ"
 | |
| },
 | |
| #endif
 | |
| #ifdef DH1792
 | |
| {
 | |
|    224,
 | |
|    "DH-1792",
 | |
|    "2",
 | |
|    "IPo3wjvfS7vBYnFHwJHmesA51od9fnR8Aenezif4qLE2HX+YCv1tpvHA8yLH"
 | |
|    "yYbKe9QfSHHtOgVjK8AYEyPirpXxlmdykGuj+dX7EiWMRGYc+v1kKkqmCn0o"
 | |
|    "5tU416O/1HXTpQ2Hps0buchUD+HlCMrSgnIqRxK6Fjr0ZfiCS4XgAD6sLgi0"
 | |
|    "BxKFMxDsVzpGMNwF5Lj2R/cJiTi0cNDDY3gn4lK/PRUsJtRKU+9sxy0q5Yof"
 | |
|    "aG5VO8VcHkZJVwUKhDFHkZYWMHV808TGHXM2RQ9kRa2QvS2mXxMrDSCloQ/"
 | |
| },
 | |
| #endif
 | |
| #ifdef DH2048
 | |
| {
 | |
|    256,
 | |
|    "DH-2048",
 | |
|    "2",
 | |
|    "5sR1VmdsQQzzjN0iridVVyveug6sAC3+/jTIHSgEoimPOREXQ05r2WJZJAF2"
 | |
|    "CRu8kuusiPw2ivRli+fdLr63v1uZG5nQa28uLwNxZEsu4gu6TrGjepXeXm4Z"
 | |
|    "CVOC1HMmi660fLZ2ruHLa4v2NWex2Zx91/y4ygPlZM+K//iy+Gft9Ma9Ayn0"
 | |
|    "eYwofZeUL9vJSfutPVp2ZrIEUQDBKMvMm0SRSLiUjDtzXqrH+b/wuwIFG1K4"
 | |
|    "var3ucsT45mDzD9qb3tBdksSPZbr6yrELV8h+qmjiBr15oHKEglS0XwSvCap"
 | |
|    "abUn5XPPVoaKv13+tOnG9mGgzQ8JeClVXN63Q+GGEF"
 | |
| },
 | |
| #endif
 | |
| #ifdef DH2560
 | |
| {
 | |
|    320,
 | |
|    "DH-2560",
 | |
|    "3",
 | |
|    "G7UVKk+N6LfpGkdBP6XLB4QJ3wzee5YH/3o6tBDMwr4FS8YjCmeP6l4gu0hX"
 | |
|    "dzY2Rive4TYOu4Akm4naZuv32d71/2lQeNcO23BNYOEPxtn9BU8uYfaHP9Mo"
 | |
|    "M+m76oUCiI5uqpag5RH3BO34FyE4BiKkzjEXq9xxc8ERacG8Mo8DNiXu79p9"
 | |
|    "Q/0wsRz+W/lIN4gYw3w4iLMooAGnDrhcj5cZb0HysHWYfqmFo+jTBP6Egi0g"
 | |
|    "cmVO2qWQh2cZIQMfppaf1Ffq0XGIJpgDFyOHPl3NVxDabVK1tkVct+hathxJ"
 | |
|    "UTdqZmR2VFwMASXjfgj4VFdvFCUxV8Xr8JcwXkwlMjOJbAl0LoCa4M7hpYvz"
 | |
|    "G/0XviGCpv7qQaONKtsiQ6mHhMcyo9hBCRZXtNPkfPMZkPeV05akvaDs6Ek7"
 | |
|    "DZ62oKR"
 | |
| },
 | |
| #endif
 | |
| #ifdef DH3072
 | |
| {
 | |
|    384,
 | |
|    "DH-3072",
 | |
|    "2",
 | |
|    "1zsV6XgY57R/hu2RR4H/BjwRqmQL9h+Dc5rgoWOcqiTS8qpVTWafi1KFV77V"
 | |
|    "rUcjcer1EDgCV0tpzlemtyrC2pHpw7hr3EEl2evfWOvg05FRI6mKc2UPNv2c"
 | |
|    "2Bjww4LD/tdsLleX7AHHXCXFSSyd6C3qWq7BqABZriSpQeaEtXbWfeC6ytFe"
 | |
|    "2i3VeQsLa40XQ21UxwhPAjamjSOfYzkW7xi0fwI1e+4OQiFcWOfOuvswoaEf"
 | |
|    "MIICyAmVp67vjGo66dk81dMemyplipgXAWPdl7ppnDd6cEjyN4N90D7kQiNg"
 | |
|    "lVmJlKLecldOUtdIqMnbJCbiN/t/3/AEFaokGO9om5ckc6M9gG5PG0T7Oh1N"
 | |
|    "dSx/PstGdxwvs9DOwjyo5wl5C9QSLtUYJl2+GZYMj6WfsgCrb6jjRJJJQe2C"
 | |
|    "y7wUcBILbRsP3lYT8s14zm4xFBrfMUoLN287j3wQ1TNUXjYSCi4ZLKT1XDai"
 | |
|    "93345OiutLOqGGikFg6ypnymJK3yeHuul"
 | |
| },
 | |
| #endif
 | |
| #ifdef DH4096
 | |
| {
 | |
|    512,
 | |
|    "DH-4096",
 | |
|    "3",
 | |
|    "Id8ukxZdao3hS0NGTKAXdt3c8PpiyigIyBY8lwOHjM2cqkaZgwvr1pA6OowS"
 | |
|    "32kJkeOqKB8gNTZZZVqOFkPXgvC4WveUgA5a7rhTj28pDidNROmMO70CCcSw"
 | |
|    "aHI3GLFuEMz3JJyvQKGaGwpV3C9gS70dFWTxEfNRzdYEdvIic8/SXI79VgNP"
 | |
|    "LGR68nzd4qxCgaLpVBnWsanRp7mfEj52S/7Kxjs14lrbAOMjCuHgN4F6THWh"
 | |
|    "PNhG0VXfFFIwAMW2unrfpdo+gQHNclqCf2N1FALpABzvUesgs3wIP+QTMqms"
 | |
|    "os/AkuulG7MusbeFl3SoCtaoW12CF038ZbqW+e+DKI1zObhtsLanvaiZm/N4"
 | |
|    "BsJirW7avcWNQYm1oYjZ2bR/jYqfoJ0CLXLO/vqHb8J9a5VE9nz7cqMD3/MH"
 | |
|    "k/g7BapsOtKuol6ipbUvxQPtf4KCwqQQ40JeqgS6amivI/aLu05S7bAxKOwE"
 | |
|    "Yu8YxjN6lXm3co5Wy+BmNSuRlzKhxICyHEqMfKwUtm48XHzHuPaGQzHgkn6H"
 | |
|    "3A+FQjQGLHewADYlbfdTF3sHYyc5k9h/9cYVkbmv7bQze53CJGr3T1hZYbN6"
 | |
|    "+fuz0SPnfjiKu+bWD+8RYtZpLs2+f32huMz3OqoryGfULxC2aEjL2rdBn+ZR"
 | |
|    "PT0+ZAUyLSAVHbsul++cawh"
 | |
| },
 | |
| #endif
 | |
| {
 | |
|    0,
 | |
|    NULL,
 | |
|    NULL,
 | |
|    NULL
 | |
| }
 | |
| };
 | |
| 
 | |
| static int is_valid_idx(int n)
 | |
| {
 | |
|    int x;
 | |
| 
 | |
|    for (x = 0; sets[x].size; x++);
 | |
|    if ((n < 0) || (n >= x)) {
 | |
|       return 0;
 | |
|    }
 | |
|    return 1;
 | |
| }
 | |
| 
 | |
| int dh_test(void)
 | |
| {
 | |
|     mp_int p, g, tmp;
 | |
|     int x, res, primality;
 | |
| 
 | |
|     if (mp_init_multi(&p, &g, &tmp, NULL) != MP_OKAY)                 { goto error; }
 | |
| 
 | |
|     for (x = 0; sets[x].size != 0; x++) {
 | |
| #if 0
 | |
|         printf("dh_test():testing size %d-bits\n", sets[x].size * 8);
 | |
| #endif
 | |
|         if (mp_read_radix(&g,(unsigned char *)sets[x].base, 64) != MP_OKAY)   { goto error; }
 | |
|         if (mp_read_radix(&p,(unsigned char *)sets[x].prime, 64) != MP_OKAY)  { goto error; }
 | |
| 
 | |
|         /* ensure p is prime */
 | |
|         if ((res = is_prime(&p, &primality)) != CRYPT_OK)             { goto done; }
 | |
|         if (primality == 0) {
 | |
|            res = CRYPT_FAIL_TESTVECTOR;
 | |
|            goto done;
 | |
|         }
 | |
| 
 | |
|         if (mp_sub_d(&p, 1, &tmp) != MP_OKAY)                         { goto error; }
 | |
|         if (mp_div_2(&tmp, &tmp) != MP_OKAY)                          { goto error; }
 | |
| 
 | |
|         /* ensure (p-1)/2 is prime */
 | |
|         if ((res = is_prime(&tmp, &primality)) != CRYPT_OK)           { goto done; }
 | |
|         if (primality == 0) {
 | |
|            res = CRYPT_FAIL_TESTVECTOR;
 | |
|            goto done;
 | |
|         }
 | |
| 
 | |
|         /* now see if g^((p-1)/2) mod p is in fact 1 */
 | |
|         if (mp_exptmod(&g, &tmp, &p, &tmp) != MP_OKAY)                { goto error; }
 | |
|         if (mp_cmp_d(&tmp, 1)) {
 | |
|            res = CRYPT_FAIL_TESTVECTOR;
 | |
|            goto done;
 | |
|         }
 | |
|     }
 | |
|     res = CRYPT_OK;
 | |
|     goto done;
 | |
| error:
 | |
|     res = CRYPT_MEM;
 | |
| done:
 | |
|     mp_clear_multi(&tmp, &g, &p, NULL);
 | |
|     return res;
 | |
| }
 | |
| 
 | |
| void dh_sizes(int *low, int *high)
 | |
| {
 | |
|    int x;
 | |
|    _ARGCHK(low != NULL);
 | |
|    _ARGCHK(high != NULL);
 | |
|    *low  = INT_MAX;
 | |
|    *high = 0;
 | |
|    for (x = 0; sets[x].size != 0; x++) {
 | |
|        if (*low > sets[x].size)  *low  = sets[x].size;
 | |
|        if (*high < sets[x].size) *high = sets[x].size;
 | |
|    }
 | |
| }
 | |
| 
 | |
| int dh_get_size(dh_key *key)
 | |
| {
 | |
|     _ARGCHK(key != NULL);
 | |
|     if (is_valid_idx(key->idx) == 1) {
 | |
|         return sets[key->idx].size;
 | |
|     } else {
 | |
|         return INT_MAX; /* large value that would cause dh_make_key() to fail */
 | |
|     }
 | |
| }
 | |
| 
 | |
| int dh_make_key(prng_state *prng, int wprng, int keysize, dh_key *key)
 | |
| {
 | |
|    unsigned char buf[512];
 | |
|    unsigned long x;
 | |
|    mp_int p, g;
 | |
|    int res, err;
 | |
| 
 | |
|    _ARGCHK(key  != NULL);
 | |
| 
 | |
|    /* good prng? */
 | |
|    if ((err = prng_is_valid(wprng)) != CRYPT_OK) {
 | |
|       return err;
 | |
|    }
 | |
| 
 | |
|    /* find key size */
 | |
|    for (x = 0; (keysize > sets[x].size) && (sets[x].size != 0); x++);
 | |
| #ifdef FAST_PK
 | |
|    keysize = MIN(sets[x].size, 32);
 | |
| #else
 | |
|    keysize = sets[x].size;
 | |
| #endif
 | |
| 
 | |
|    if (sets[x].size == 0) {
 | |
|       return CRYPT_INVALID_KEYSIZE;
 | |
|    }
 | |
|    key->idx = x;
 | |
| 
 | |
|    /* make up random string */
 | |
|    if (prng_descriptor[wprng].read(buf, keysize, prng) != (unsigned long)keysize) {
 | |
|       return CRYPT_ERROR_READPRNG;
 | |
|    }
 | |
| 
 | |
|    /* init parameters */
 | |
|    if (mp_init_multi(&g, &p, &key->x, &key->y, NULL) != MP_OKAY) {
 | |
|       return CRYPT_MEM;
 | |
|    }
 | |
|    if (mp_read_radix(&g, sets[key->idx].base, 64) != MP_OKAY)      { goto error; }
 | |
|    if (mp_read_radix(&p, sets[key->idx].prime, 64) != MP_OKAY)     { goto error; }
 | |
| 
 | |
|    /* load the x value */
 | |
|    if (mp_read_unsigned_bin(&key->x, buf, keysize) != MP_OKAY)     { goto error; }
 | |
|    if (mp_exptmod(&g, &key->x, &p, &key->y) != MP_OKAY)            { goto error; }
 | |
|    key->type = PK_PRIVATE;
 | |
| 
 | |
|    if (mp_shrink(&key->x) != MP_OKAY)                              { goto error; }
 | |
|    if (mp_shrink(&key->y) != MP_OKAY)                              { goto error; }
 | |
| 
 | |
|    /* free up ram */
 | |
|    res = CRYPT_OK;
 | |
|    goto done2;
 | |
| error:
 | |
|    res = CRYPT_MEM;
 | |
|    mp_clear_multi(&key->x, &key->y, NULL);
 | |
| done2:
 | |
|    mp_clear_multi(&p, &g, NULL);
 | |
|    zeromem(buf, sizeof(buf));
 | |
|    return res;
 | |
| }
 | |
| 
 | |
| void dh_free(dh_key *key)
 | |
| {
 | |
|    _ARGCHK(key != NULL);
 | |
|    mp_clear_multi(&key->x, &key->y, NULL);
 | |
| }
 | |
| 
 | |
| #define OUTPUT_BIGNUM(num, buf2, y, z)         \
 | |
| {                                              \
 | |
|       z = (unsigned long)mp_unsigned_bin_size(num);           \
 | |
|       STORE32L(z, buf2+y);                     \
 | |
|       y += 4;                                  \
 | |
|       (void)mp_to_unsigned_bin(num, buf2+y);   \
 | |
|       y += z;                                  \
 | |
| }
 | |
| 
 | |
| 
 | |
| #define INPUT_BIGNUM(num, in, x, y)                              \
 | |
| {                                                                \
 | |
|      /* load value */                                            \
 | |
|      if (y + 4 > inlen) {                                        \
 | |
|         err = CRYPT_INVALID_PACKET;                            \
 | |
|         goto error;                                              \
 | |
|      }                                                           \
 | |
|      LOAD32L(x, in+y);                                           \
 | |
|      y += 4;                                                     \
 | |
|                                                                  \
 | |
|      /* sanity check... */                                       \
 | |
|      if (x+y > inlen) {                                          \
 | |
|         err = CRYPT_INVALID_PACKET;                            \
 | |
|         goto error;                                              \
 | |
|      }                                                           \
 | |
|                                                                  \
 | |
|      /* load it */                                               \
 | |
|      if (mp_read_unsigned_bin(num, (unsigned char *)in+y, (int)x) != MP_OKAY) {\
 | |
|         err =  CRYPT_MEM;                                      \
 | |
|         goto error;                                              \
 | |
|      }                                                           \
 | |
|      y += x;                                                     \
 | |
|      if (mp_shrink(num) != MP_OKAY) {                            \
 | |
|         err = CRYPT_MEM;                                       \
 | |
|         goto error;                                              \
 | |
|      }                                                           \
 | |
| }
 | |
| 
 | |
| 
 | |
| int dh_export(unsigned char *out, unsigned long *outlen, int type, dh_key *key)
 | |
| {
 | |
|    unsigned char buf2[1536];
 | |
|    unsigned long y, z;
 | |
| 
 | |
|    _ARGCHK(out != NULL);
 | |
|    _ARGCHK(outlen != NULL);
 | |
|    _ARGCHK(key != NULL);
 | |
| 
 | |
|    if (type == PK_PRIVATE && key->type != PK_PRIVATE) {
 | |
|       return CRYPT_PK_NOT_PRIVATE;
 | |
|    }
 | |
| 
 | |
|    /* header */
 | |
|    y = PACKET_SIZE;
 | |
| 
 | |
|    /* header */
 | |
|    buf2[y++] = type;
 | |
|    buf2[y++] = (unsigned char)(sets[key->idx].size / 8);
 | |
| 
 | |
|    /* export y */
 | |
|    OUTPUT_BIGNUM(&key->y, buf2, y, z);
 | |
| 
 | |
|    if (type == PK_PRIVATE) {
 | |
|       /* export x */
 | |
|       OUTPUT_BIGNUM(&key->x, buf2, y, z);
 | |
|    }
 | |
| 
 | |
|    /* check for overflow */
 | |
|    if (*outlen < y) {
 | |
|       #ifdef CLEAN_STACK
 | |
|          zeromem(buf2, sizeof(buf2));
 | |
|       #endif
 | |
|       return CRYPT_BUFFER_OVERFLOW;
 | |
|    }
 | |
| 
 | |
|    /* store header */
 | |
|    packet_store_header(buf2, PACKET_SECT_DH, PACKET_SUB_KEY);
 | |
| 
 | |
|    /* output it */
 | |
|    *outlen = y;
 | |
|    memcpy(out, buf2, (size_t)y);
 | |
| 
 | |
|    /* clear mem */
 | |
| #ifdef CLEAN_STACK
 | |
|    zeromem(buf2, sizeof(buf2));
 | |
| #endif
 | |
|    return CRYPT_OK;
 | |
| }
 | |
| 
 | |
| int dh_import(const unsigned char *in, unsigned long inlen, dh_key *key)
 | |
| {
 | |
|    unsigned long x, y, s;
 | |
|    int err;
 | |
| 
 | |
|    _ARGCHK(in != NULL);
 | |
|    _ARGCHK(key != NULL);
 | |
| 
 | |
|    /* make sure valid length */
 | |
|    if (2+PACKET_SIZE > inlen) {
 | |
|       return CRYPT_INVALID_PACKET;
 | |
|    }
 | |
| 
 | |
|    /* check type byte */
 | |
|    if ((err = packet_valid_header((unsigned char *)in, PACKET_SECT_DH, PACKET_SUB_KEY)) != CRYPT_OK) {
 | |
|       return err;
 | |
|    }
 | |
| 
 | |
|    /* init */
 | |
|    if (mp_init_multi(&key->x, &key->y, NULL) != MP_OKAY) {
 | |
|       return CRYPT_MEM;
 | |
|    }
 | |
| 
 | |
|    /* advance past packet header */
 | |
|    y = PACKET_SIZE;
 | |
| 
 | |
|    /* key type, e.g. private, public */
 | |
|    key->type = (int)in[y++];
 | |
| 
 | |
|    /* key size in bytes */
 | |
|    s  = (unsigned long)in[y++] * 8;
 | |
| 
 | |
|    for (x = 0; (s > (unsigned long)sets[x].size) && (sets[x].size != 0); x++);
 | |
|    if (sets[x].size == 0) {
 | |
|       err = CRYPT_INVALID_KEYSIZE;
 | |
|       goto error;
 | |
|    }
 | |
|    key->idx = (int)x;
 | |
| 
 | |
|    /* type check both values */
 | |
|    if ((key->type != PK_PUBLIC) && (key->type != PK_PRIVATE))  {
 | |
|       err = CRYPT_PK_TYPE_MISMATCH;
 | |
|       goto error;
 | |
|    }
 | |
| 
 | |
|    /* is the key idx valid? */
 | |
|    if (is_valid_idx(key->idx) != 1) {
 | |
|       err = CRYPT_PK_TYPE_MISMATCH;
 | |
|       goto error;
 | |
|    }
 | |
| 
 | |
|    /* load public value g^x mod p*/
 | |
|    INPUT_BIGNUM(&key->y, in, x, y);
 | |
| 
 | |
|    if (key->type == PK_PRIVATE) {
 | |
|       INPUT_BIGNUM(&key->x, in, x, y);
 | |
|    }
 | |
| 
 | |
|    /* eliminate private key if public */
 | |
|    if (key->type == PK_PUBLIC) {
 | |
|       mp_clear(&key->x);
 | |
|    }
 | |
| 
 | |
|    return CRYPT_OK;
 | |
| error:
 | |
|    mp_clear_multi(&key->y, &key->x, NULL);
 | |
|    return err;
 | |
| }
 | |
| 
 | |
| int dh_shared_secret(dh_key *private_key, dh_key *public_key,
 | |
|                      unsigned char *out, unsigned long *outlen)
 | |
| {
 | |
|    mp_int tmp, p;
 | |
|    unsigned long x;
 | |
|    int res;
 | |
| 
 | |
|    _ARGCHK(private_key != NULL);
 | |
|    _ARGCHK(public_key  != NULL);
 | |
|    _ARGCHK(out != NULL);
 | |
|    _ARGCHK(outlen != NULL);
 | |
| 
 | |
|    /* types valid? */
 | |
|    if (private_key->type != PK_PRIVATE) {
 | |
|       return CRYPT_PK_NOT_PRIVATE;
 | |
|    }
 | |
| 
 | |
|    /* same idx? */
 | |
|    if (private_key->idx != public_key->idx) {
 | |
|       return CRYPT_PK_TYPE_MISMATCH;
 | |
|    }
 | |
| 
 | |
|    /* compute y^x mod p */
 | |
|    if (mp_init_multi(&tmp, &p, NULL) != MP_OKAY) {
 | |
|       return CRYPT_MEM;
 | |
|    }
 | |
| 
 | |
|    if (mp_read_radix(&p, (unsigned char *)sets[private_key->idx].prime, 64) != MP_OKAY)     { goto error; }
 | |
|    if (mp_exptmod(&public_key->y, &private_key->x, &p, &tmp) != MP_OKAY)                    { goto error; }
 | |
| 
 | |
|    /* enough space for output? */
 | |
|    x = (unsigned long)mp_unsigned_bin_size(&tmp);
 | |
|    if (*outlen < x) {
 | |
|       res = CRYPT_BUFFER_OVERFLOW;
 | |
|       goto done;
 | |
|    }
 | |
|    if (mp_to_unsigned_bin(&tmp, out) != MP_OKAY)                                            { goto error; }
 | |
|    *outlen = x;
 | |
|    res = CRYPT_OK;
 | |
|    goto done;
 | |
| error:
 | |
|    res = CRYPT_MEM;
 | |
| done:
 | |
|    mp_clear_multi(&p, &tmp, NULL);
 | |
|    return res;
 | |
| }
 | |
| 
 | |
| #include "dh_sys.c"
 | |
| 
 | |
| #endif
 | |
| 
 |