| /* |
| * Copyright 2019-2022 The OpenSSL Project Authors. All Rights Reserved. |
| * |
| * Licensed under the Apache License 2.0 (the "License"). You may not use |
| * this file except in compliance with the License. You can obtain a copy |
| * in the file LICENSE in the source distribution or at |
| * https://www.openssl.org/source/license.html |
| */ |
| |
| #include <string.h> /* memset */ |
| #include <openssl/core_names.h> |
| #include "internal/ffc.h" |
| #include "internal/param_build_set.h" |
| #include "internal/nelem.h" |
| |
| #ifndef FIPS_MODULE |
| # include <openssl/asn1.h> /* ossl_ffc_params_print */ |
| #endif |
| |
| void ossl_ffc_params_init(FFC_PARAMS *params) |
| { |
| memset(params, 0, sizeof(*params)); |
| params->pcounter = -1; |
| params->gindex = FFC_UNVERIFIABLE_GINDEX; |
| params->flags = FFC_PARAM_FLAG_VALIDATE_PQG; |
| } |
| |
| void ossl_ffc_params_cleanup(FFC_PARAMS *params) |
| { |
| BN_free(params->p); |
| BN_free(params->q); |
| BN_free(params->g); |
| BN_free(params->j); |
| OPENSSL_free(params->seed); |
| ossl_ffc_params_init(params); |
| } |
| |
| void ossl_ffc_params_set0_pqg(FFC_PARAMS *d, BIGNUM *p, BIGNUM *q, BIGNUM *g) |
| { |
| if (p != NULL && p != d->p) { |
| BN_free(d->p); |
| d->p = p; |
| } |
| if (q != NULL && q != d->q) { |
| BN_free(d->q); |
| d->q = q; |
| } |
| if (g != NULL && g != d->g) { |
| BN_free(d->g); |
| d->g = g; |
| } |
| } |
| |
| void ossl_ffc_params_get0_pqg(const FFC_PARAMS *d, const BIGNUM **p, |
| const BIGNUM **q, const BIGNUM **g) |
| { |
| if (p != NULL) |
| *p = d->p; |
| if (q != NULL) |
| *q = d->q; |
| if (g != NULL) |
| *g = d->g; |
| } |
| |
| |
| /* j is the 'cofactor' that is optionally output for ASN1. */ |
| void ossl_ffc_params_set0_j(FFC_PARAMS *d, BIGNUM *j) |
| { |
| BN_free(d->j); |
| d->j = NULL; |
| if (j != NULL) |
| d->j = j; |
| } |
| |
| int ossl_ffc_params_set_seed(FFC_PARAMS *params, |
| const unsigned char *seed, size_t seedlen) |
| { |
| if (params == NULL) |
| return 0; |
| |
| if (params->seed != NULL) { |
| if (params->seed == seed) |
| return 1; |
| OPENSSL_free(params->seed); |
| } |
| |
| if (seed != NULL && seedlen > 0) { |
| params->seed = OPENSSL_memdup(seed, seedlen); |
| if (params->seed == NULL) |
| return 0; |
| params->seedlen = seedlen; |
| } else { |
| params->seed = NULL; |
| params->seedlen = 0; |
| } |
| return 1; |
| } |
| |
| void ossl_ffc_params_set_gindex(FFC_PARAMS *params, int index) |
| { |
| params->gindex = index; |
| } |
| |
| void ossl_ffc_params_set_pcounter(FFC_PARAMS *params, int index) |
| { |
| params->pcounter = index; |
| } |
| |
| void ossl_ffc_params_set_h(FFC_PARAMS *params, int index) |
| { |
| params->h = index; |
| } |
| |
| void ossl_ffc_params_set_flags(FFC_PARAMS *params, unsigned int flags) |
| { |
| params->flags = flags; |
| } |
| |
| void ossl_ffc_params_enable_flags(FFC_PARAMS *params, unsigned int flags, |
| int enable) |
| { |
| if (enable) |
| params->flags |= flags; |
| else |
| params->flags &= ~flags; |
| } |
| |
| int ossl_ffc_set_digest(FFC_PARAMS *params, const char *alg, const char *props) |
| { |
| params->mdname = alg; |
| params->mdprops = props; |
| return 1; |
| } |
| |
| int ossl_ffc_params_set_validate_params(FFC_PARAMS *params, |
| const unsigned char *seed, |
| size_t seedlen, int counter) |
| { |
| if (!ossl_ffc_params_set_seed(params, seed, seedlen)) |
| return 0; |
| params->pcounter = counter; |
| return 1; |
| } |
| |
| void ossl_ffc_params_get_validate_params(const FFC_PARAMS *params, |
| unsigned char **seed, size_t *seedlen, |
| int *pcounter) |
| { |
| if (seed != NULL) |
| *seed = params->seed; |
| if (seedlen != NULL) |
| *seedlen = params->seedlen; |
| if (pcounter != NULL) |
| *pcounter = params->pcounter; |
| } |
| |
| static int ffc_bn_cpy(BIGNUM **dst, const BIGNUM *src) |
| { |
| BIGNUM *a; |
| |
| /* |
| * If source is read only just copy the pointer, so |
| * we don't have to reallocate it. |
| */ |
| if (src == NULL) |
| a = NULL; |
| else if (BN_get_flags(src, BN_FLG_STATIC_DATA) |
| && !BN_get_flags(src, BN_FLG_MALLOCED)) |
| a = (BIGNUM *)src; |
| else if ((a = BN_dup(src)) == NULL) |
| return 0; |
| BN_clear_free(*dst); |
| *dst = a; |
| return 1; |
| } |
| |
| int ossl_ffc_params_copy(FFC_PARAMS *dst, const FFC_PARAMS *src) |
| { |
| if (!ffc_bn_cpy(&dst->p, src->p) |
| || !ffc_bn_cpy(&dst->g, src->g) |
| || !ffc_bn_cpy(&dst->q, src->q) |
| || !ffc_bn_cpy(&dst->j, src->j)) |
| return 0; |
| |
| OPENSSL_free(dst->seed); |
| dst->seedlen = src->seedlen; |
| if (src->seed != NULL) { |
| dst->seed = OPENSSL_memdup(src->seed, src->seedlen); |
| if (dst->seed == NULL) |
| return 0; |
| } else { |
| dst->seed = NULL; |
| } |
| dst->nid = src->nid; |
| dst->pcounter = src->pcounter; |
| dst->h = src->h; |
| dst->gindex = src->gindex; |
| dst->flags = src->flags; |
| return 1; |
| } |
| |
| int ossl_ffc_params_cmp(const FFC_PARAMS *a, const FFC_PARAMS *b, int ignore_q) |
| { |
| return BN_cmp(a->p, b->p) == 0 |
| && BN_cmp(a->g, b->g) == 0 |
| && (ignore_q || BN_cmp(a->q, b->q) == 0); /* Note: q may be NULL */ |
| } |
| |
| int ossl_ffc_params_todata(const FFC_PARAMS *ffc, OSSL_PARAM_BLD *bld, |
| OSSL_PARAM params[]) |
| { |
| int test_flags; |
| |
| if (ffc == NULL) |
| return 0; |
| |
| if (ffc->p != NULL |
| && !ossl_param_build_set_bn(bld, params, OSSL_PKEY_PARAM_FFC_P, ffc->p)) |
| return 0; |
| if (ffc->q != NULL |
| && !ossl_param_build_set_bn(bld, params, OSSL_PKEY_PARAM_FFC_Q, ffc->q)) |
| return 0; |
| if (ffc->g != NULL |
| && !ossl_param_build_set_bn(bld, params, OSSL_PKEY_PARAM_FFC_G, ffc->g)) |
| return 0; |
| if (ffc->j != NULL |
| && !ossl_param_build_set_bn(bld, params, OSSL_PKEY_PARAM_FFC_COFACTOR, |
| ffc->j)) |
| return 0; |
| if (!ossl_param_build_set_int(bld, params, OSSL_PKEY_PARAM_FFC_GINDEX, |
| ffc->gindex)) |
| return 0; |
| if (!ossl_param_build_set_int(bld, params, OSSL_PKEY_PARAM_FFC_PCOUNTER, |
| ffc->pcounter)) |
| return 0; |
| if (!ossl_param_build_set_int(bld, params, OSSL_PKEY_PARAM_FFC_H, ffc->h)) |
| return 0; |
| if (ffc->seed != NULL |
| && !ossl_param_build_set_octet_string(bld, params, |
| OSSL_PKEY_PARAM_FFC_SEED, |
| ffc->seed, ffc->seedlen)) |
| return 0; |
| if (ffc->nid != NID_undef) { |
| const DH_NAMED_GROUP *group = ossl_ffc_uid_to_dh_named_group(ffc->nid); |
| const char *name = ossl_ffc_named_group_get_name(group); |
| |
| if (name == NULL |
| || !ossl_param_build_set_utf8_string(bld, params, |
| OSSL_PKEY_PARAM_GROUP_NAME, |
| name)) |
| return 0; |
| } |
| test_flags = ((ffc->flags & FFC_PARAM_FLAG_VALIDATE_PQ) != 0); |
| if (!ossl_param_build_set_int(bld, params, |
| OSSL_PKEY_PARAM_FFC_VALIDATE_PQ, test_flags)) |
| return 0; |
| test_flags = ((ffc->flags & FFC_PARAM_FLAG_VALIDATE_G) != 0); |
| if (!ossl_param_build_set_int(bld, params, |
| OSSL_PKEY_PARAM_FFC_VALIDATE_G, test_flags)) |
| return 0; |
| test_flags = ((ffc->flags & FFC_PARAM_FLAG_VALIDATE_LEGACY) != 0); |
| if (!ossl_param_build_set_int(bld, params, |
| OSSL_PKEY_PARAM_FFC_VALIDATE_LEGACY, |
| test_flags)) |
| return 0; |
| |
| if (ffc->mdname != NULL |
| && !ossl_param_build_set_utf8_string(bld, params, |
| OSSL_PKEY_PARAM_FFC_DIGEST, |
| ffc->mdname)) |
| return 0; |
| if (ffc->mdprops != NULL |
| && !ossl_param_build_set_utf8_string(bld, params, |
| OSSL_PKEY_PARAM_FFC_DIGEST_PROPS, |
| ffc->mdprops)) |
| return 0; |
| return 1; |
| } |
| |
| #ifndef FIPS_MODULE |
| int ossl_ffc_params_print(BIO *bp, const FFC_PARAMS *ffc, int indent) |
| { |
| if (!ASN1_bn_print(bp, "prime P:", ffc->p, NULL, indent)) |
| goto err; |
| if (!ASN1_bn_print(bp, "generator G:", ffc->g, NULL, indent)) |
| goto err; |
| if (ffc->q != NULL |
| && !ASN1_bn_print(bp, "subgroup order Q:", ffc->q, NULL, indent)) |
| goto err; |
| if (ffc->j != NULL |
| && !ASN1_bn_print(bp, "subgroup factor:", ffc->j, NULL, indent)) |
| goto err; |
| if (ffc->seed != NULL) { |
| size_t i; |
| |
| if (!BIO_indent(bp, indent, 128) |
| || BIO_puts(bp, "seed:") <= 0) |
| goto err; |
| for (i = 0; i < ffc->seedlen; i++) { |
| if ((i % 15) == 0) { |
| if (BIO_puts(bp, "\n") <= 0 |
| || !BIO_indent(bp, indent + 4, 128)) |
| goto err; |
| } |
| if (BIO_printf(bp, "%02x%s", ffc->seed[i], |
| ((i + 1) == ffc->seedlen) ? "" : ":") <= 0) |
| goto err; |
| } |
| if (BIO_write(bp, "\n", 1) <= 0) |
| return 0; |
| } |
| if (ffc->pcounter != -1) { |
| if (!BIO_indent(bp, indent, 128) |
| || BIO_printf(bp, "counter: %d\n", ffc->pcounter) <= 0) |
| goto err; |
| } |
| return 1; |
| err: |
| return 0; |
| } |
| #endif /* FIPS_MODULE */ |