| /* |
| * Copyright 2019-2021 The OpenSSL Project Authors. All Rights Reserved. |
| * |
| * Licensed under the Apache License 2.0 (the "License"). You may not use |
| * this file except in compliance with the License. You can obtain a copy |
| * in the file LICENSE in the source distribution or at |
| * https://www.openssl.org/source/license.html |
| */ |
| |
| /* |
| * Finite Field cryptography (FFC) is used for DSA and DH. |
| * This file contains methods for validation of FFC parameters. |
| * It calls the same functions as the generation as the code is very similar. |
| */ |
| |
| #include <openssl/err.h> |
| #include <openssl/bn.h> |
| #include <openssl/dsaerr.h> |
| #include <openssl/dherr.h> |
| #include "internal/ffc.h" |
| |
| /* FIPS186-4 A.2.2 Unverifiable partial validation of Generator g */ |
| int ossl_ffc_params_validate_unverifiable_g(BN_CTX *ctx, BN_MONT_CTX *mont, |
| const BIGNUM *p, const BIGNUM *q, |
| const BIGNUM *g, BIGNUM *tmp, |
| int *ret) |
| { |
| /* |
| * A.2.2 Step (1) AND |
| * A.2.4 Step (2) |
| * Verify that 2 <= g <= (p - 1) |
| */ |
| if (BN_cmp(g, BN_value_one()) <= 0 || BN_cmp(g, p) >= 0) { |
| *ret |= FFC_ERROR_NOT_SUITABLE_GENERATOR; |
| return 0; |
| } |
| |
| /* |
| * A.2.2 Step (2) AND |
| * A.2.4 Step (3) |
| * Check g^q mod p = 1 |
| */ |
| if (!BN_mod_exp_mont(tmp, g, q, p, ctx, mont)) |
| return 0; |
| if (BN_cmp(tmp, BN_value_one()) != 0) { |
| *ret |= FFC_ERROR_NOT_SUITABLE_GENERATOR; |
| return 0; |
| } |
| return 1; |
| } |
| |
| int ossl_ffc_params_FIPS186_4_validate(OSSL_LIB_CTX *libctx, |
| const FFC_PARAMS *params, int type, |
| int *res, BN_GENCB *cb) |
| { |
| size_t L, N; |
| |
| if (params == NULL || params->p == NULL || params->q == NULL) |
| return FFC_PARAM_RET_STATUS_FAILED; |
| |
| /* A.1.1.3 Step (1..2) : L = len(p), N = len(q) */ |
| L = BN_num_bits(params->p); |
| N = BN_num_bits(params->q); |
| return ossl_ffc_params_FIPS186_4_gen_verify(libctx, (FFC_PARAMS *)params, |
| FFC_PARAM_MODE_VERIFY, type, |
| L, N, res, cb); |
| } |
| |
| /* This may be used in FIPS mode to validate deprecated FIPS-186-2 Params */ |
| int ossl_ffc_params_FIPS186_2_validate(OSSL_LIB_CTX *libctx, |
| const FFC_PARAMS *params, int type, |
| int *res, BN_GENCB *cb) |
| { |
| size_t L, N; |
| |
| if (params == NULL || params->p == NULL || params->q == NULL) { |
| *res = FFC_CHECK_INVALID_PQ; |
| return FFC_PARAM_RET_STATUS_FAILED; |
| } |
| |
| /* A.1.1.3 Step (1..2) : L = len(p), N = len(q) */ |
| L = BN_num_bits(params->p); |
| N = BN_num_bits(params->q); |
| return ossl_ffc_params_FIPS186_2_gen_verify(libctx, (FFC_PARAMS *)params, |
| FFC_PARAM_MODE_VERIFY, type, |
| L, N, res, cb); |
| } |
| |
| /* |
| * This does a simple check of L and N and partial g. |
| * It makes no attempt to do a full validation of p, q or g since these require |
| * extra parameters such as the digest and seed, which may not be available for |
| * this test. |
| */ |
| int ossl_ffc_params_simple_validate(OSSL_LIB_CTX *libctx, const FFC_PARAMS *params, |
| int paramstype, int *res) |
| { |
| int ret; |
| int tmpres = 0; |
| FFC_PARAMS tmpparams = {0}; |
| |
| if (params == NULL) |
| return 0; |
| |
| if (res == NULL) |
| res = &tmpres; |
| |
| if (!ossl_ffc_params_copy(&tmpparams, params)) |
| return 0; |
| |
| tmpparams.flags = FFC_PARAM_FLAG_VALIDATE_G; |
| tmpparams.gindex = FFC_UNVERIFIABLE_GINDEX; |
| |
| #ifndef FIPS_MODULE |
| if (params->flags & FFC_PARAM_FLAG_VALIDATE_LEGACY) |
| ret = ossl_ffc_params_FIPS186_2_validate(libctx, &tmpparams, paramstype, |
| res, NULL); |
| else |
| #endif |
| ret = ossl_ffc_params_FIPS186_4_validate(libctx, &tmpparams, paramstype, |
| res, NULL); |
| #ifndef OPENSSL_NO_DH |
| if (ret == FFC_PARAM_RET_STATUS_FAILED |
| && (*res & FFC_ERROR_NOT_SUITABLE_GENERATOR) != 0) { |
| ERR_raise(ERR_LIB_DH, DH_R_NOT_SUITABLE_GENERATOR); |
| } |
| #endif |
| |
| ossl_ffc_params_cleanup(&tmpparams); |
| |
| return ret != FFC_PARAM_RET_STATUS_FAILED; |
| } |
| |
| /* |
| * If possible (or always in FIPS_MODULE) do full FIPS 186-4 validation. |
| * Otherwise do simple check but in addition also check the primality of the |
| * p and q. |
| */ |
| int ossl_ffc_params_full_validate(OSSL_LIB_CTX *libctx, const FFC_PARAMS *params, |
| int paramstype, int *res) |
| { |
| int tmpres = 0; |
| |
| if (params == NULL) |
| return 0; |
| |
| if (res == NULL) |
| res = &tmpres; |
| |
| #ifdef FIPS_MODULE |
| return ossl_ffc_params_FIPS186_4_validate(libctx, params, paramstype, |
| res, NULL); |
| #else |
| if (params->seed != NULL) { |
| if (params->flags & FFC_PARAM_FLAG_VALIDATE_LEGACY) |
| return ossl_ffc_params_FIPS186_2_validate(libctx, params, paramstype, |
| res, NULL); |
| else |
| return ossl_ffc_params_FIPS186_4_validate(libctx, params, paramstype, |
| res, NULL); |
| } else { |
| int ret = 0; |
| |
| ret = ossl_ffc_params_simple_validate(libctx, params, paramstype, res); |
| if (ret) { |
| BN_CTX *ctx; |
| |
| if ((ctx = BN_CTX_new_ex(libctx)) == NULL) |
| return 0; |
| if (BN_check_prime(params->q, ctx, NULL) != 1) { |
| # ifndef OPENSSL_NO_DSA |
| ERR_raise(ERR_LIB_DSA, DSA_R_Q_NOT_PRIME); |
| # endif |
| ret = 0; |
| } |
| if (ret && BN_check_prime(params->p, ctx, NULL) != 1) { |
| # ifndef OPENSSL_NO_DSA |
| ERR_raise(ERR_LIB_DSA, DSA_R_P_NOT_PRIME); |
| # endif |
| ret = 0; |
| } |
| BN_CTX_free(ctx); |
| } |
| return ret; |
| } |
| #endif |
| } |