]> git.ipfire.org Git - thirdparty/openssl.git/blame - crypto/dh/dh_pmeth.c
free NULL cleanup 7
[thirdparty/openssl.git] / crypto / dh / dh_pmeth.c
CommitLineData
0f113f3e
MC
1/*
2 * Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL project
3 * 2006.
3ba0885a
DSH
4 */
5/* ====================================================================
6 * Copyright (c) 2006 The OpenSSL Project. All rights reserved.
7 *
8 * Redistribution and use in source and binary forms, with or without
9 * modification, are permitted provided that the following conditions
10 * are met:
11 *
12 * 1. Redistributions of source code must retain the above copyright
0f113f3e 13 * notice, this list of conditions and the following disclaimer.
3ba0885a
DSH
14 *
15 * 2. Redistributions in binary form must reproduce the above copyright
16 * notice, this list of conditions and the following disclaimer in
17 * the documentation and/or other materials provided with the
18 * distribution.
19 *
20 * 3. All advertising materials mentioning features or use of this
21 * software must display the following acknowledgment:
22 * "This product includes software developed by the OpenSSL Project
23 * for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)"
24 *
25 * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
26 * endorse or promote products derived from this software without
27 * prior written permission. For written permission, please contact
28 * licensing@OpenSSL.org.
29 *
30 * 5. Products derived from this software may not be called "OpenSSL"
31 * nor may "OpenSSL" appear in their names without prior written
32 * permission of the OpenSSL Project.
33 *
34 * 6. Redistributions of any form whatsoever must retain the following
35 * acknowledgment:
36 * "This product includes software developed by the OpenSSL Project
37 * for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)"
38 *
39 * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
40 * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
41 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
42 * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR
43 * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
44 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
45 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
46 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
47 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
48 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
49 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
50 * OF THE POSSIBILITY OF SUCH DAMAGE.
51 * ====================================================================
52 *
53 * This product includes cryptographic software written by Eric Young
54 * (eay@cryptsoft.com). This product includes software written by Tim
55 * Hudson (tjh@cryptsoft.com).
56 *
57 */
58
59#include <stdio.h>
60#include "cryptlib.h"
61#include <openssl/asn1t.h>
62#include <openssl/x509.h>
3ba0885a 63#include <openssl/evp.h>
1e26a8ba
GT
64#include <openssl/dh.h>
65#include <openssl/bn.h>
39090878 66#ifndef OPENSSL_NO_DSA
0f113f3e 67# include <openssl/dsa.h>
39090878 68#endif
bd59f2b9 69#include <openssl/objects.h>
27af42f9 70#include "internal/evp_int.h"
3ba0885a
DSH
71
72/* DH pkey context structure */
73
0f113f3e
MC
74typedef struct {
75 /* Parameter gen parameters */
76 int prime_len;
77 int generator;
78 int use_dsa;
79 int subprime_len;
80 /* message digest used for parameter generation */
81 const EVP_MD *md;
82 int rfc5114_param;
83 /* Keygen callback info */
84 int gentmp[2];
85 /* KDF (if any) to use for DH */
86 char kdf_type;
87 /* OID to use for KDF */
88 ASN1_OBJECT *kdf_oid;
89 /* Message digest to use for key derivation */
90 const EVP_MD *kdf_md;
91 /* User key material */
92 unsigned char *kdf_ukm;
93 size_t kdf_ukmlen;
94 /* KDF output length */
95 size_t kdf_outlen;
96} DH_PKEY_CTX;
3ba0885a
DSH
97
98static int pkey_dh_init(EVP_PKEY_CTX *ctx)
0f113f3e
MC
99{
100 DH_PKEY_CTX *dctx;
101 dctx = OPENSSL_malloc(sizeof(DH_PKEY_CTX));
102 if (!dctx)
103 return 0;
104 dctx->prime_len = 1024;
105 dctx->subprime_len = -1;
106 dctx->generator = 2;
107 dctx->use_dsa = 0;
108 dctx->md = NULL;
109 dctx->rfc5114_param = 0;
110
111 dctx->kdf_type = EVP_PKEY_DH_KDF_NONE;
112 dctx->kdf_oid = NULL;
113 dctx->kdf_md = NULL;
114 dctx->kdf_ukm = NULL;
115 dctx->kdf_ukmlen = 0;
116 dctx->kdf_outlen = 0;
117
118 ctx->data = dctx;
119 ctx->keygen_info = dctx->gentmp;
120 ctx->keygen_info_count = 2;
121
122 return 1;
123}
3ba0885a 124
8bdcef40 125static int pkey_dh_copy(EVP_PKEY_CTX *dst, EVP_PKEY_CTX *src)
0f113f3e
MC
126{
127 DH_PKEY_CTX *dctx, *sctx;
128 if (!pkey_dh_init(dst))
129 return 0;
130 sctx = src->data;
131 dctx = dst->data;
132 dctx->prime_len = sctx->prime_len;
133 dctx->subprime_len = sctx->subprime_len;
134 dctx->generator = sctx->generator;
135 dctx->use_dsa = sctx->use_dsa;
136 dctx->md = sctx->md;
137 dctx->rfc5114_param = sctx->rfc5114_param;
138
139 dctx->kdf_type = sctx->kdf_type;
140 dctx->kdf_oid = OBJ_dup(sctx->kdf_oid);
141 if (!dctx->kdf_oid)
142 return 0;
143 dctx->kdf_md = sctx->kdf_md;
144 if (dctx->kdf_ukm) {
145 dctx->kdf_ukm = BUF_memdup(sctx->kdf_ukm, sctx->kdf_ukmlen);
146 dctx->kdf_ukmlen = sctx->kdf_ukmlen;
147 }
148 dctx->kdf_outlen = sctx->kdf_outlen;
149 return 1;
150}
8bdcef40 151
3ba0885a 152static void pkey_dh_cleanup(EVP_PKEY_CTX *ctx)
0f113f3e
MC
153{
154 DH_PKEY_CTX *dctx = ctx->data;
155 if (dctx) {
156 if (dctx->kdf_ukm)
157 OPENSSL_free(dctx->kdf_ukm);
0dfb9398 158 ASN1_OBJECT_free(dctx->kdf_oid);
0f113f3e
MC
159 OPENSSL_free(dctx);
160 }
161}
3ba0885a
DSH
162
163static int pkey_dh_ctrl(EVP_PKEY_CTX *ctx, int type, int p1, void *p2)
0f113f3e
MC
164{
165 DH_PKEY_CTX *dctx = ctx->data;
166 switch (type) {
167 case EVP_PKEY_CTRL_DH_PARAMGEN_PRIME_LEN:
168 if (p1 < 256)
169 return -2;
170 dctx->prime_len = p1;
171 return 1;
172
173 case EVP_PKEY_CTRL_DH_PARAMGEN_SUBPRIME_LEN:
174 if (dctx->use_dsa == 0)
175 return -2;
176 dctx->subprime_len = p1;
177 return 1;
178
179 case EVP_PKEY_CTRL_DH_PARAMGEN_GENERATOR:
180 if (dctx->use_dsa)
181 return -2;
182 dctx->generator = p1;
183 return 1;
184
185 case EVP_PKEY_CTRL_DH_PARAMGEN_TYPE:
39090878 186#ifdef OPENSSL_NO_DSA
0f113f3e
MC
187 if (p1 != 0)
188 return -2;
39090878 189#else
0f113f3e
MC
190 if (p1 < 0 || p1 > 2)
191 return -2;
39090878 192#endif
0f113f3e
MC
193 dctx->use_dsa = p1;
194 return 1;
195
196 case EVP_PKEY_CTRL_DH_RFC5114:
197 if (p1 < 1 || p1 > 3)
198 return -2;
199 dctx->rfc5114_param = p1;
200 return 1;
201
202 case EVP_PKEY_CTRL_PEER_KEY:
203 /* Default behaviour is OK */
204 return 1;
205
206 case EVP_PKEY_CTRL_DH_KDF_TYPE:
207 if (p1 == -2)
208 return dctx->kdf_type;
209 if (p1 != EVP_PKEY_DH_KDF_NONE && p1 != EVP_PKEY_DH_KDF_X9_42)
210 return -2;
211 dctx->kdf_type = p1;
212 return 1;
213
214 case EVP_PKEY_CTRL_DH_KDF_MD:
215 dctx->kdf_md = p2;
216 return 1;
217
218 case EVP_PKEY_CTRL_GET_DH_KDF_MD:
219 *(const EVP_MD **)p2 = dctx->kdf_md;
220 return 1;
221
222 case EVP_PKEY_CTRL_DH_KDF_OUTLEN:
223 if (p1 <= 0)
224 return -2;
225 dctx->kdf_outlen = (size_t)p1;
226 return 1;
227
228 case EVP_PKEY_CTRL_GET_DH_KDF_OUTLEN:
229 *(int *)p2 = dctx->kdf_outlen;
230 return 1;
231
232 case EVP_PKEY_CTRL_DH_KDF_UKM:
233 if (dctx->kdf_ukm)
234 OPENSSL_free(dctx->kdf_ukm);
235 dctx->kdf_ukm = p2;
236 if (p2)
237 dctx->kdf_ukmlen = p1;
238 else
239 dctx->kdf_ukmlen = 0;
240 return 1;
241
242 case EVP_PKEY_CTRL_GET_DH_KDF_UKM:
243 *(unsigned char **)p2 = dctx->kdf_ukm;
244 return dctx->kdf_ukmlen;
245
246 case EVP_PKEY_CTRL_DH_KDF_OID:
0dfb9398 247 ASN1_OBJECT_free(dctx->kdf_oid);
0f113f3e
MC
248 dctx->kdf_oid = p2;
249 return 1;
250
251 case EVP_PKEY_CTRL_GET_DH_KDF_OID:
252 *(ASN1_OBJECT **)p2 = dctx->kdf_oid;
253 return 1;
254
255 default:
256 return -2;
257
258 }
259}
39090878 260
3ba0885a 261static int pkey_dh_ctrl_str(EVP_PKEY_CTX *ctx,
0f113f3e
MC
262 const char *type, const char *value)
263{
264 if (!strcmp(type, "dh_paramgen_prime_len")) {
265 int len;
266 len = atoi(value);
267 return EVP_PKEY_CTX_set_dh_paramgen_prime_len(ctx, len);
268 }
269 if (!strcmp(type, "dh_rfc5114")) {
270 DH_PKEY_CTX *dctx = ctx->data;
271 int len;
272 len = atoi(value);
273 if (len < 0 || len > 3)
274 return -2;
275 dctx->rfc5114_param = len;
276 return 1;
277 }
278 if (!strcmp(type, "dh_paramgen_generator")) {
279 int len;
280 len = atoi(value);
281 return EVP_PKEY_CTX_set_dh_paramgen_generator(ctx, len);
282 }
283 if (!strcmp(type, "dh_paramgen_subprime_len")) {
284 int len;
285 len = atoi(value);
286 return EVP_PKEY_CTX_set_dh_paramgen_subprime_len(ctx, len);
287 }
288 if (!strcmp(type, "dh_paramgen_type")) {
289 int typ;
290 typ = atoi(value);
291 return EVP_PKEY_CTX_set_dh_paramgen_type(ctx, typ);
292 }
293 return -2;
294}
3ba0885a 295
39090878
DSH
296#ifndef OPENSSL_NO_DSA
297
298extern int dsa_builtin_paramgen(DSA *ret, size_t bits, size_t qbits,
0f113f3e
MC
299 const EVP_MD *evpmd,
300 const unsigned char *seed_in, size_t seed_len,
301 unsigned char *seed_out, int *counter_ret,
302 unsigned long *h_ret, BN_GENCB *cb);
39090878
DSH
303
304extern int dsa_builtin_paramgen2(DSA *ret, size_t L, size_t N,
0f113f3e
MC
305 const EVP_MD *evpmd,
306 const unsigned char *seed_in,
307 size_t seed_len, int idx,
308 unsigned char *seed_out, int *counter_ret,
309 unsigned long *h_ret, BN_GENCB *cb);
39090878
DSH
310
311static DSA *dsa_dh_generate(DH_PKEY_CTX *dctx, BN_GENCB *pcb)
0f113f3e
MC
312{
313 DSA *ret;
314 int rv = 0;
315 int prime_len = dctx->prime_len;
316 int subprime_len = dctx->subprime_len;
317 const EVP_MD *md = dctx->md;
318 if (dctx->use_dsa > 2)
319 return NULL;
320 ret = DSA_new();
321 if (!ret)
322 return NULL;
323 if (subprime_len == -1) {
324 if (prime_len >= 2048)
325 subprime_len = 256;
326 else
327 subprime_len = 160;
328 }
329 if (md == NULL) {
330 if (prime_len >= 2048)
331 md = EVP_sha256();
332 else
333 md = EVP_sha1();
334 }
335 if (dctx->use_dsa == 1)
336 rv = dsa_builtin_paramgen(ret, prime_len, subprime_len, md,
337 NULL, 0, NULL, NULL, NULL, pcb);
338 else if (dctx->use_dsa == 2)
339 rv = dsa_builtin_paramgen2(ret, prime_len, subprime_len, md,
340 NULL, 0, -1, NULL, NULL, NULL, pcb);
341 if (rv <= 0) {
342 DSA_free(ret);
343 return NULL;
344 }
345 return ret;
346}
39090878
DSH
347
348#endif
349
3ba0885a 350static int pkey_dh_paramgen(EVP_PKEY_CTX *ctx, EVP_PKEY *pkey)
0f113f3e
MC
351{
352 DH *dh = NULL;
353 DH_PKEY_CTX *dctx = ctx->data;
354 BN_GENCB *pcb;
355 int ret;
356 if (dctx->rfc5114_param) {
357 switch (dctx->rfc5114_param) {
358 case 1:
359 dh = DH_get_1024_160();
360 break;
361
362 case 2:
363 dh = DH_get_2048_224();
364 break;
365
366 case 3:
367 dh = DH_get_2048_256();
368 break;
369
370 default:
371 return -2;
372 }
373 EVP_PKEY_assign(pkey, EVP_PKEY_DHX, dh);
374 return 1;
375 }
376
377 if (ctx->pkey_gencb) {
378 pcb = BN_GENCB_new();
379 evp_pkey_set_cb_translate(pcb, ctx);
380 } else
381 pcb = NULL;
39090878 382#ifndef OPENSSL_NO_DSA
0f113f3e
MC
383 if (dctx->use_dsa) {
384 DSA *dsa_dh;
385 dsa_dh = dsa_dh_generate(dctx, pcb);
23a1d5e9 386 BN_GENCB_free(pcb);
0f113f3e
MC
387 if (!dsa_dh)
388 return 0;
389 dh = DSA_dup_DH(dsa_dh);
390 DSA_free(dsa_dh);
391 if (!dh)
392 return 0;
393 EVP_PKEY_assign(pkey, EVP_PKEY_DHX, dh);
394 return 1;
395 }
39090878 396#endif
0f113f3e
MC
397 dh = DH_new();
398 if (!dh) {
23a1d5e9 399 BN_GENCB_free(pcb);
0f113f3e
MC
400 return 0;
401 }
402 ret = DH_generate_parameters_ex(dh,
403 dctx->prime_len, dctx->generator, pcb);
23a1d5e9 404 BN_GENCB_free(pcb);
0f113f3e
MC
405 if (ret)
406 EVP_PKEY_assign_DH(pkey, dh);
407 else
408 DH_free(dh);
409 return ret;
410}
3ba0885a
DSH
411
412static int pkey_dh_keygen(EVP_PKEY_CTX *ctx, EVP_PKEY *pkey)
0f113f3e
MC
413{
414 DH *dh = NULL;
415 if (ctx->pkey == NULL) {
416 DHerr(DH_F_PKEY_DH_KEYGEN, DH_R_NO_PARAMETERS_SET);
417 return 0;
418 }
419 dh = DH_new();
420 if (!dh)
421 return 0;
422 EVP_PKEY_assign(pkey, ctx->pmeth->pkey_id, dh);
423 /* Note: if error return, pkey is freed by parent routine */
424 if (!EVP_PKEY_copy_parameters(pkey, ctx->pkey))
425 return 0;
426 return DH_generate_key(pkey->pkey.dh);
427}
428
429static int pkey_dh_derive(EVP_PKEY_CTX *ctx, unsigned char *key,
430 size_t *keylen)
431{
432 int ret;
433 DH *dh;
434 DH_PKEY_CTX *dctx = ctx->data;
435 BIGNUM *dhpub;
436 if (!ctx->pkey || !ctx->peerkey) {
437 DHerr(DH_F_PKEY_DH_DERIVE, DH_R_KEYS_NOT_SET);
438 return 0;
439 }
440 dh = ctx->pkey->pkey.dh;
441 dhpub = ctx->peerkey->pkey.dh->pub_key;
442 if (dctx->kdf_type == EVP_PKEY_DH_KDF_NONE) {
443 if (key == NULL) {
444 *keylen = DH_size(dh);
445 return 1;
446 }
447 ret = DH_compute_key(key, dhpub, dh);
448 if (ret < 0)
449 return ret;
450 *keylen = ret;
451 return 1;
452 } else if (dctx->kdf_type == EVP_PKEY_DH_KDF_X9_42) {
453 unsigned char *Z = NULL;
454 size_t Zlen = 0;
455 if (!dctx->kdf_outlen || !dctx->kdf_oid)
456 return 0;
457 if (key == NULL) {
458 *keylen = dctx->kdf_outlen;
459 return 1;
460 }
461 if (*keylen != dctx->kdf_outlen)
462 return 0;
463 ret = 0;
464 Zlen = DH_size(dh);
465 Z = OPENSSL_malloc(Zlen);
61986d32 466 if (!Z) {
918bb865
MC
467 goto err;
468 }
0f113f3e
MC
469 if (DH_compute_key_padded(Z, dhpub, dh) <= 0)
470 goto err;
471 if (!DH_KDF_X9_42(key, *keylen, Z, Zlen, dctx->kdf_oid,
472 dctx->kdf_ukm, dctx->kdf_ukmlen, dctx->kdf_md))
473 goto err;
474 *keylen = dctx->kdf_outlen;
475 ret = 1;
476 err:
4b45c6e5 477 OPENSSL_clear_free(Z, Zlen);
0f113f3e
MC
478 return ret;
479 }
480 return 1;
481}
482
483const EVP_PKEY_METHOD dh_pkey_meth = {
484 EVP_PKEY_DH,
485 0,
486 pkey_dh_init,
487 pkey_dh_copy,
488 pkey_dh_cleanup,
489
490 0,
491 pkey_dh_paramgen,
492
493 0,
494 pkey_dh_keygen,
495
496 0,
497 0,
498
499 0,
500 0,
501
502 0, 0,
503
504 0, 0, 0, 0,
505
506 0, 0,
507
508 0, 0,
509
510 0,
511 pkey_dh_derive,
512
513 pkey_dh_ctrl,
514 pkey_dh_ctrl_str
515};
516
517const EVP_PKEY_METHOD dhx_pkey_meth = {
518 EVP_PKEY_DHX,
519 0,
520 pkey_dh_init,
521 pkey_dh_copy,
522 pkey_dh_cleanup,
523
524 0,
525 pkey_dh_paramgen,
526
527 0,
528 pkey_dh_keygen,
529
530 0,
531 0,
532
533 0,
534 0,
535
536 0, 0,
537
538 0, 0, 0, 0,
539
540 0, 0,
541
542 0, 0,
543
544 0,
545 pkey_dh_derive,
546
547 pkey_dh_ctrl,
548 pkey_dh_ctrl_str
549};