1e28a4053SRui Paulo /*
2e28a4053SRui Paulo * Crypto wrapper for internal crypto implementation - modexp
3e28a4053SRui Paulo * Copyright (c) 2006-2009, Jouni Malinen <j@w1.fi>
4e28a4053SRui Paulo *
5f05cddf9SRui Paulo * This software may be distributed under the terms of the BSD license.
6f05cddf9SRui Paulo * See README for more details.
7e28a4053SRui Paulo */
8e28a4053SRui Paulo
9e28a4053SRui Paulo #include "includes.h"
10e28a4053SRui Paulo
11e28a4053SRui Paulo #include "common.h"
12e28a4053SRui Paulo #include "tls/bignum.h"
13e28a4053SRui Paulo #include "crypto.h"
14e28a4053SRui Paulo
15e28a4053SRui Paulo
crypto_dh_init(u8 generator,const u8 * prime,size_t prime_len,u8 * privkey,u8 * pubkey)1685732ac8SCy Schubert int crypto_dh_init(u8 generator, const u8 *prime, size_t prime_len, u8 *privkey,
1785732ac8SCy Schubert u8 *pubkey)
1885732ac8SCy Schubert {
1985732ac8SCy Schubert size_t pubkey_len, pad;
2085732ac8SCy Schubert
2185732ac8SCy Schubert if (os_get_random(privkey, prime_len) < 0)
2285732ac8SCy Schubert return -1;
2385732ac8SCy Schubert if (os_memcmp(privkey, prime, prime_len) > 0) {
2485732ac8SCy Schubert /* Make sure private value is smaller than prime */
2585732ac8SCy Schubert privkey[0] = 0;
2685732ac8SCy Schubert }
2785732ac8SCy Schubert
2885732ac8SCy Schubert pubkey_len = prime_len;
2985732ac8SCy Schubert if (crypto_mod_exp(&generator, 1, privkey, prime_len, prime, prime_len,
3085732ac8SCy Schubert pubkey, &pubkey_len) < 0)
3185732ac8SCy Schubert return -1;
3285732ac8SCy Schubert if (pubkey_len < prime_len) {
3385732ac8SCy Schubert pad = prime_len - pubkey_len;
3485732ac8SCy Schubert os_memmove(pubkey + pad, pubkey, pubkey_len);
3585732ac8SCy Schubert os_memset(pubkey, 0, pad);
3685732ac8SCy Schubert }
3785732ac8SCy Schubert
3885732ac8SCy Schubert return 0;
3985732ac8SCy Schubert }
4085732ac8SCy Schubert
4185732ac8SCy Schubert
crypto_dh_derive_secret(u8 generator,const u8 * prime,size_t prime_len,const u8 * order,size_t order_len,const u8 * privkey,size_t privkey_len,const u8 * pubkey,size_t pubkey_len,u8 * secret,size_t * len)4285732ac8SCy Schubert int crypto_dh_derive_secret(u8 generator, const u8 *prime, size_t prime_len,
43*4bc52338SCy Schubert const u8 *order, size_t order_len,
4485732ac8SCy Schubert const u8 *privkey, size_t privkey_len,
4585732ac8SCy Schubert const u8 *pubkey, size_t pubkey_len,
4685732ac8SCy Schubert u8 *secret, size_t *len)
4785732ac8SCy Schubert {
48*4bc52338SCy Schubert struct bignum *pub;
49*4bc52338SCy Schubert int res = -1;
50*4bc52338SCy Schubert
51*4bc52338SCy Schubert if (pubkey_len > prime_len ||
52*4bc52338SCy Schubert (pubkey_len == prime_len &&
53*4bc52338SCy Schubert os_memcmp(pubkey, prime, prime_len) >= 0))
54*4bc52338SCy Schubert return -1;
55*4bc52338SCy Schubert
56*4bc52338SCy Schubert pub = bignum_init();
57*4bc52338SCy Schubert if (!pub || bignum_set_unsigned_bin(pub, pubkey, pubkey_len) < 0 ||
58*4bc52338SCy Schubert bignum_cmp_d(pub, 1) <= 0)
59*4bc52338SCy Schubert goto fail;
60*4bc52338SCy Schubert
61*4bc52338SCy Schubert if (order) {
62*4bc52338SCy Schubert struct bignum *p, *q, *tmp;
63*4bc52338SCy Schubert int failed;
64*4bc52338SCy Schubert
65*4bc52338SCy Schubert /* verify: pubkey^q == 1 mod p */
66*4bc52338SCy Schubert p = bignum_init();
67*4bc52338SCy Schubert q = bignum_init();
68*4bc52338SCy Schubert tmp = bignum_init();
69*4bc52338SCy Schubert failed = !p || !q || !tmp ||
70*4bc52338SCy Schubert bignum_set_unsigned_bin(p, prime, prime_len) < 0 ||
71*4bc52338SCy Schubert bignum_set_unsigned_bin(q, order, order_len) < 0 ||
72*4bc52338SCy Schubert bignum_exptmod(pub, q, p, tmp) < 0 ||
73*4bc52338SCy Schubert bignum_cmp_d(tmp, 1) != 0;
74*4bc52338SCy Schubert bignum_deinit(p);
75*4bc52338SCy Schubert bignum_deinit(q);
76*4bc52338SCy Schubert bignum_deinit(tmp);
77*4bc52338SCy Schubert if (failed)
78*4bc52338SCy Schubert goto fail;
79*4bc52338SCy Schubert }
80*4bc52338SCy Schubert
81*4bc52338SCy Schubert res = crypto_mod_exp(pubkey, pubkey_len, privkey, privkey_len,
8285732ac8SCy Schubert prime, prime_len, secret, len);
83*4bc52338SCy Schubert fail:
84*4bc52338SCy Schubert bignum_deinit(pub);
85*4bc52338SCy Schubert return res;
8685732ac8SCy Schubert }
8785732ac8SCy Schubert
8885732ac8SCy Schubert
crypto_mod_exp(const u8 * base,size_t base_len,const u8 * power,size_t power_len,const u8 * modulus,size_t modulus_len,u8 * result,size_t * result_len)89e28a4053SRui Paulo int crypto_mod_exp(const u8 *base, size_t base_len,
90e28a4053SRui Paulo const u8 *power, size_t power_len,
91e28a4053SRui Paulo const u8 *modulus, size_t modulus_len,
92e28a4053SRui Paulo u8 *result, size_t *result_len)
93e28a4053SRui Paulo {
94e28a4053SRui Paulo struct bignum *bn_base, *bn_exp, *bn_modulus, *bn_result;
95e28a4053SRui Paulo int ret = -1;
96e28a4053SRui Paulo
97e28a4053SRui Paulo bn_base = bignum_init();
98e28a4053SRui Paulo bn_exp = bignum_init();
99e28a4053SRui Paulo bn_modulus = bignum_init();
100e28a4053SRui Paulo bn_result = bignum_init();
101e28a4053SRui Paulo
102e28a4053SRui Paulo if (bn_base == NULL || bn_exp == NULL || bn_modulus == NULL ||
103e28a4053SRui Paulo bn_result == NULL)
104e28a4053SRui Paulo goto error;
105e28a4053SRui Paulo
106e28a4053SRui Paulo if (bignum_set_unsigned_bin(bn_base, base, base_len) < 0 ||
107e28a4053SRui Paulo bignum_set_unsigned_bin(bn_exp, power, power_len) < 0 ||
108e28a4053SRui Paulo bignum_set_unsigned_bin(bn_modulus, modulus, modulus_len) < 0)
109e28a4053SRui Paulo goto error;
110e28a4053SRui Paulo
111e28a4053SRui Paulo if (bignum_exptmod(bn_base, bn_exp, bn_modulus, bn_result) < 0)
112e28a4053SRui Paulo goto error;
113e28a4053SRui Paulo
114e28a4053SRui Paulo ret = bignum_get_unsigned_bin(bn_result, result, result_len);
115e28a4053SRui Paulo
116e28a4053SRui Paulo error:
117e28a4053SRui Paulo bignum_deinit(bn_base);
118e28a4053SRui Paulo bignum_deinit(bn_exp);
119e28a4053SRui Paulo bignum_deinit(bn_modulus);
120e28a4053SRui Paulo bignum_deinit(bn_result);
121e28a4053SRui Paulo return ret;
122e28a4053SRui Paulo }
123