mirror of https://github.com/openssl/openssl.git
				
				
				
			
		
			
				
	
	
		
			347 lines
		
	
	
		
			9.9 KiB
		
	
	
	
		
			C
		
	
	
	
			
		
		
	
	
			347 lines
		
	
	
		
			9.9 KiB
		
	
	
	
		
			C
		
	
	
	
| /*
 | |
|  * Copyright 2020-2021 The OpenSSL Project Authors. All Rights Reserved.
 | |
|  *
 | |
|  * Licensed under the Apache License 2.0 (the "License").  You may not use
 | |
|  * this file except in compliance with the License.  You can obtain a copy
 | |
|  * in the file LICENSE in the source distribution or at
 | |
|  * https://www.openssl.org/source/license.html
 | |
|  */
 | |
| 
 | |
| #include "internal/deprecated.h"
 | |
| 
 | |
| #include <openssl/core_names.h>
 | |
| #include <openssl/params.h>
 | |
| #include <openssl/err.h>
 | |
| #include <openssl/dh.h>
 | |
| #include "crypto/dh.h"
 | |
| #include "crypto/evp.h"
 | |
| 
 | |
| static int dh_paramgen_check(EVP_PKEY_CTX *ctx)
 | |
| {
 | |
|     if (ctx == NULL || !EVP_PKEY_CTX_IS_GEN_OP(ctx)) {
 | |
|         ERR_raise(ERR_LIB_EVP, EVP_R_COMMAND_NOT_SUPPORTED);
 | |
|         /* Uses the same return values as EVP_PKEY_CTX_ctrl */
 | |
|         return -2;
 | |
|     }
 | |
|     /* If key type not DH return error */
 | |
|     if (evp_pkey_ctx_is_legacy(ctx)
 | |
|         && ctx->pmeth->pkey_id != EVP_PKEY_DH
 | |
|         && ctx->pmeth->pkey_id != EVP_PKEY_DHX)
 | |
|         return -1;
 | |
|     return 1;
 | |
| }
 | |
| 
 | |
| static int dh_param_derive_check(EVP_PKEY_CTX *ctx)
 | |
| {
 | |
|     if (ctx == NULL || !EVP_PKEY_CTX_IS_DERIVE_OP(ctx)) {
 | |
|         ERR_raise(ERR_LIB_EVP, EVP_R_COMMAND_NOT_SUPPORTED);
 | |
|         /* Uses the same return values as EVP_PKEY_CTX_ctrl */
 | |
|         return -2;
 | |
|     }
 | |
|     /* If key type not DH return error */
 | |
|     if (evp_pkey_ctx_is_legacy(ctx)
 | |
|         && ctx->pmeth->pkey_id != EVP_PKEY_DH
 | |
|         && ctx->pmeth->pkey_id != EVP_PKEY_DHX)
 | |
|         return -1;
 | |
|     return 1;
 | |
| }
 | |
| 
 | |
| int EVP_PKEY_CTX_set_dh_paramgen_gindex(EVP_PKEY_CTX *ctx, int gindex)
 | |
| {
 | |
|     int ret;
 | |
|     OSSL_PARAM params[2], *p = params;
 | |
| 
 | |
|     if ((ret = dh_paramgen_check(ctx)) <= 0)
 | |
|         return ret;
 | |
| 
 | |
|     *p++ = OSSL_PARAM_construct_int(OSSL_PKEY_PARAM_FFC_GINDEX, &gindex);
 | |
|     *p = OSSL_PARAM_construct_end();
 | |
| 
 | |
|     return evp_pkey_ctx_set_params_strict(ctx, params);
 | |
| }
 | |
| 
 | |
| int EVP_PKEY_CTX_set_dh_paramgen_seed(EVP_PKEY_CTX *ctx,
 | |
|                                       const unsigned char *seed,
 | |
|                                       size_t seedlen)
 | |
| {
 | |
|     int ret;
 | |
|     OSSL_PARAM params[2], *p = params;
 | |
| 
 | |
|     if ((ret = dh_paramgen_check(ctx)) <= 0)
 | |
|         return ret;
 | |
| 
 | |
|     *p++ = OSSL_PARAM_construct_octet_string(OSSL_PKEY_PARAM_FFC_SEED,
 | |
|                                              (void *)seed, seedlen);
 | |
|     *p = OSSL_PARAM_construct_end();
 | |
| 
 | |
|     return evp_pkey_ctx_set_params_strict(ctx, params);
 | |
| }
 | |
| 
 | |
| /*
 | |
|  * This one is currently implemented as an EVP_PKEY_CTX_ctrl() wrapper,
 | |
|  * simply because that's easier.
 | |
|  */
 | |
| int EVP_PKEY_CTX_set_dh_paramgen_type(EVP_PKEY_CTX *ctx, int typ)
 | |
| {
 | |
|     return EVP_PKEY_CTX_ctrl(ctx, EVP_PKEY_DH, EVP_PKEY_OP_PARAMGEN,
 | |
|                              EVP_PKEY_CTRL_DH_PARAMGEN_TYPE, typ, NULL);
 | |
| }
 | |
| 
 | |
| int EVP_PKEY_CTX_set_dh_paramgen_prime_len(EVP_PKEY_CTX *ctx, int pbits)
 | |
| {
 | |
|     int ret;
 | |
|     OSSL_PARAM params[2], *p = params;
 | |
|     size_t bits = pbits;
 | |
| 
 | |
|     if ((ret = dh_paramgen_check(ctx)) <= 0)
 | |
|         return ret;
 | |
| 
 | |
|     *p++ = OSSL_PARAM_construct_size_t(OSSL_PKEY_PARAM_FFC_PBITS, &bits);
 | |
|     *p = OSSL_PARAM_construct_end();
 | |
|     return evp_pkey_ctx_set_params_strict(ctx, params);
 | |
| }
 | |
| 
 | |
| int EVP_PKEY_CTX_set_dh_paramgen_subprime_len(EVP_PKEY_CTX *ctx, int qbits)
 | |
| {
 | |
|     int ret;
 | |
|     OSSL_PARAM params[2], *p = params;
 | |
|     size_t bits2 = qbits;
 | |
| 
 | |
|     if ((ret = dh_paramgen_check(ctx)) <= 0)
 | |
|         return ret;
 | |
| 
 | |
|     *p++ = OSSL_PARAM_construct_size_t(OSSL_PKEY_PARAM_FFC_QBITS, &bits2);
 | |
|     *p = OSSL_PARAM_construct_end();
 | |
| 
 | |
|     return evp_pkey_ctx_set_params_strict(ctx, params);
 | |
| }
 | |
| 
 | |
| int EVP_PKEY_CTX_set_dh_paramgen_generator(EVP_PKEY_CTX *ctx, int gen)
 | |
| {
 | |
|     int ret;
 | |
|     OSSL_PARAM params[2], *p = params;
 | |
| 
 | |
|     if ((ret = dh_paramgen_check(ctx)) <= 0)
 | |
|         return ret;
 | |
| 
 | |
|     *p++ = OSSL_PARAM_construct_int(OSSL_PKEY_PARAM_DH_GENERATOR, &gen);
 | |
|     *p = OSSL_PARAM_construct_end();
 | |
| 
 | |
|     return evp_pkey_ctx_set_params_strict(ctx, params);
 | |
| }
 | |
| 
 | |
| /*
 | |
|  * This one is currently implemented as an EVP_PKEY_CTX_ctrl() wrapper,
 | |
|  * simply because that's easier.
 | |
|  */
 | |
| int EVP_PKEY_CTX_set_dh_rfc5114(EVP_PKEY_CTX *ctx, int gen)
 | |
| {
 | |
|     return EVP_PKEY_CTX_ctrl(ctx, EVP_PKEY_DHX, EVP_PKEY_OP_PARAMGEN,
 | |
|                              EVP_PKEY_CTRL_DH_RFC5114, gen, NULL);
 | |
| }
 | |
| 
 | |
| int EVP_PKEY_CTX_set_dhx_rfc5114(EVP_PKEY_CTX *ctx, int gen)
 | |
| {
 | |
|     return EVP_PKEY_CTX_set_dh_rfc5114(ctx, gen);
 | |
| }
 | |
| 
 | |
| /*
 | |
|  * This one is currently implemented as an EVP_PKEY_CTX_ctrl() wrapper,
 | |
|  * simply because that's easier.
 | |
|  */
 | |
| int EVP_PKEY_CTX_set_dh_nid(EVP_PKEY_CTX *ctx, int nid)
 | |
| {
 | |
|     return EVP_PKEY_CTX_ctrl(ctx, EVP_PKEY_DH,
 | |
|                              EVP_PKEY_OP_PARAMGEN | EVP_PKEY_OP_KEYGEN,
 | |
|                              EVP_PKEY_CTRL_DH_NID, nid, NULL);
 | |
| }
 | |
| 
 | |
| int EVP_PKEY_CTX_set_dh_pad(EVP_PKEY_CTX *ctx, int pad)
 | |
| {
 | |
|     OSSL_PARAM dh_pad_params[2];
 | |
|     unsigned int upad = pad;
 | |
| 
 | |
|     /* We use EVP_PKEY_CTX_ctrl return values */
 | |
|     if (ctx == NULL || !EVP_PKEY_CTX_IS_DERIVE_OP(ctx)) {
 | |
|         ERR_raise(ERR_LIB_EVP, EVP_R_COMMAND_NOT_SUPPORTED);
 | |
|         return -2;
 | |
|     }
 | |
| 
 | |
|     dh_pad_params[0] = OSSL_PARAM_construct_uint(OSSL_EXCHANGE_PARAM_PAD, &upad);
 | |
|     dh_pad_params[1] = OSSL_PARAM_construct_end();
 | |
| 
 | |
|     return evp_pkey_ctx_set_params_strict(ctx, dh_pad_params);
 | |
| }
 | |
| 
 | |
| /*
 | |
|  * This one is currently implemented as an EVP_PKEY_CTX_ctrl() wrapper,
 | |
|  * simply because that's easier.
 | |
|  */
 | |
| int EVP_PKEY_CTX_set_dh_kdf_type(EVP_PKEY_CTX *ctx, int kdf)
 | |
| {
 | |
|     return EVP_PKEY_CTX_ctrl(ctx, EVP_PKEY_DHX, EVP_PKEY_OP_DERIVE,
 | |
|                              EVP_PKEY_CTRL_DH_KDF_TYPE, kdf, NULL);
 | |
| }
 | |
| 
 | |
| /*
 | |
|  * This one is currently implemented as an EVP_PKEY_CTX_ctrl() wrapper,
 | |
|  * simply because that's easier.
 | |
|  */
 | |
| int EVP_PKEY_CTX_get_dh_kdf_type(EVP_PKEY_CTX *ctx)
 | |
| {
 | |
|     return EVP_PKEY_CTX_ctrl(ctx, EVP_PKEY_DHX, EVP_PKEY_OP_DERIVE,
 | |
|                              EVP_PKEY_CTRL_DH_KDF_TYPE, -2, NULL);
 | |
| }
 | |
| 
 | |
| /*
 | |
|  * This one is currently implemented as an EVP_PKEY_CTX_ctrl() wrapper,
 | |
|  * simply because that's easier.
 | |
|  */
 | |
| int EVP_PKEY_CTX_set0_dh_kdf_oid(EVP_PKEY_CTX *ctx, ASN1_OBJECT *oid)
 | |
| {
 | |
|     return EVP_PKEY_CTX_ctrl(ctx, EVP_PKEY_DHX, EVP_PKEY_OP_DERIVE,
 | |
|                              EVP_PKEY_CTRL_DH_KDF_OID, 0, (void *)(oid));
 | |
| }
 | |
| 
 | |
| /*
 | |
|  * This one is currently implemented as an EVP_PKEY_CTX_ctrl() wrapper,
 | |
|  * simply because that's easier.
 | |
|  */
 | |
| int EVP_PKEY_CTX_get0_dh_kdf_oid(EVP_PKEY_CTX *ctx, ASN1_OBJECT **oid)
 | |
| {
 | |
|     return EVP_PKEY_CTX_ctrl(ctx, EVP_PKEY_DHX, EVP_PKEY_OP_DERIVE,
 | |
|                              EVP_PKEY_CTRL_GET_DH_KDF_OID, 0, (void *)(oid));
 | |
| }
 | |
| 
 | |
| /*
 | |
|  * This one is currently implemented as an EVP_PKEY_CTX_ctrl() wrapper,
 | |
|  * simply because that's easier.
 | |
|  */
 | |
| int EVP_PKEY_CTX_set_dh_kdf_md(EVP_PKEY_CTX *ctx, const EVP_MD *md)
 | |
| {
 | |
|     return EVP_PKEY_CTX_ctrl(ctx, EVP_PKEY_DHX, EVP_PKEY_OP_DERIVE,
 | |
|                              EVP_PKEY_CTRL_DH_KDF_MD, 0, (void *)(md));
 | |
| }
 | |
| 
 | |
| /*
 | |
|  * This one is currently implemented as an EVP_PKEY_CTX_ctrl() wrapper,
 | |
|  * simply because that's easier.
 | |
|  */
 | |
| int EVP_PKEY_CTX_get_dh_kdf_md(EVP_PKEY_CTX *ctx, const EVP_MD **pmd)
 | |
| {
 | |
|         return EVP_PKEY_CTX_ctrl(ctx, EVP_PKEY_DHX, EVP_PKEY_OP_DERIVE,
 | |
|                                  EVP_PKEY_CTRL_GET_DH_KDF_MD, 0, (void *)(pmd));
 | |
| }
 | |
| 
 | |
| int EVP_PKEY_CTX_set_dh_kdf_outlen(EVP_PKEY_CTX *ctx, int outlen)
 | |
| {
 | |
|     int ret;
 | |
|     size_t len = outlen;
 | |
|     OSSL_PARAM params[2], *p = params;
 | |
| 
 | |
|     ret = dh_param_derive_check(ctx);
 | |
|     if (ret != 1)
 | |
|         return ret;
 | |
| 
 | |
|     if (outlen <= 0) {
 | |
|         /*
 | |
|          * This would ideally be -1 or 0, but we have to retain compatibility
 | |
|          * with legacy behaviour of EVP_PKEY_CTX_ctrl() which returned -2 if
 | |
|          * inlen <= 0
 | |
|          */
 | |
|         return -2;
 | |
|     }
 | |
| 
 | |
|     *p++ = OSSL_PARAM_construct_size_t(OSSL_EXCHANGE_PARAM_KDF_OUTLEN,
 | |
|                                        &len);
 | |
|     *p = OSSL_PARAM_construct_end();
 | |
| 
 | |
|     ret = evp_pkey_ctx_set_params_strict(ctx, params);
 | |
|     if (ret == -2)
 | |
|         ERR_raise(ERR_LIB_EVP, EVP_R_COMMAND_NOT_SUPPORTED);
 | |
|     return ret;
 | |
| }
 | |
| 
 | |
| int EVP_PKEY_CTX_get_dh_kdf_outlen(EVP_PKEY_CTX *ctx, int *plen)
 | |
| {
 | |
|     int ret;
 | |
|     size_t len = UINT_MAX;
 | |
|     OSSL_PARAM params[2], *p = params;
 | |
| 
 | |
|     ret = dh_param_derive_check(ctx);
 | |
|     if (ret != 1)
 | |
|         return ret;
 | |
| 
 | |
|     *p++ = OSSL_PARAM_construct_size_t(OSSL_EXCHANGE_PARAM_KDF_OUTLEN,
 | |
|                                        &len);
 | |
|     *p = OSSL_PARAM_construct_end();
 | |
| 
 | |
|     ret = evp_pkey_ctx_get_params_strict(ctx, params);
 | |
|     if (ret == -2)
 | |
|         ERR_raise(ERR_LIB_EVP, EVP_R_COMMAND_NOT_SUPPORTED);
 | |
|     if (ret != 1 || len > INT_MAX)
 | |
|         return -1;
 | |
| 
 | |
|     *plen = (int)len;
 | |
| 
 | |
|     return 1;
 | |
| }
 | |
| 
 | |
| int EVP_PKEY_CTX_set0_dh_kdf_ukm(EVP_PKEY_CTX *ctx, unsigned char *ukm, int len)
 | |
| {
 | |
|     int ret;
 | |
|     OSSL_PARAM params[2], *p = params;
 | |
| 
 | |
|     if (len < 0)
 | |
|         return -1;
 | |
| 
 | |
|     ret = dh_param_derive_check(ctx);
 | |
|     if (ret != 1)
 | |
|         return ret;
 | |
| 
 | |
|     *p++ = OSSL_PARAM_construct_octet_string(OSSL_EXCHANGE_PARAM_KDF_UKM,
 | |
|                                             /*
 | |
|                                              * Cast away the const. This is read
 | |
|                                              * only so should be safe
 | |
|                                              */
 | |
|                                             (void *)ukm,
 | |
|                                             (size_t)len);
 | |
|     *p = OSSL_PARAM_construct_end();
 | |
| 
 | |
|     ret = evp_pkey_ctx_set_params_strict(ctx, params);
 | |
|     if (ret == -2)
 | |
|         ERR_raise(ERR_LIB_EVP, EVP_R_COMMAND_NOT_SUPPORTED);
 | |
|     if (ret == 1)
 | |
|         OPENSSL_free(ukm);
 | |
|     return ret;
 | |
| }
 | |
| 
 | |
| #ifndef OPENSSL_NO_DEPRECATED_3_0
 | |
| int EVP_PKEY_CTX_get0_dh_kdf_ukm(EVP_PKEY_CTX *ctx, unsigned char **pukm)
 | |
| {
 | |
|     int ret;
 | |
|     size_t ukmlen;
 | |
|     OSSL_PARAM params[2], *p = params;
 | |
| 
 | |
|     ret = dh_param_derive_check(ctx);
 | |
|     if (ret != 1)
 | |
|         return ret;
 | |
| 
 | |
|     *p++ = OSSL_PARAM_construct_octet_ptr(OSSL_EXCHANGE_PARAM_KDF_UKM,
 | |
|                                           (void **)pukm, 0);
 | |
|     *p = OSSL_PARAM_construct_end();
 | |
| 
 | |
|     ret = evp_pkey_ctx_get_params_strict(ctx, params);
 | |
|     if (ret == -2)
 | |
|         ERR_raise(ERR_LIB_EVP, EVP_R_COMMAND_NOT_SUPPORTED);
 | |
|     if (ret != 1)
 | |
|         return -1;
 | |
| 
 | |
|     ukmlen = params[0].return_size;
 | |
|     if (ukmlen > INT_MAX)
 | |
|         return -1;
 | |
| 
 | |
|     return (int)ukmlen;
 | |
| }
 | |
| #endif
 |