You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 
 
 

288 lines
11 KiB

  1. /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
  2. * All rights reserved.
  3. *
  4. * This package is an SSL implementation written
  5. * by Eric Young (eay@cryptsoft.com).
  6. * The implementation was written so as to conform with Netscapes SSL.
  7. *
  8. * This library is free for commercial and non-commercial use as long as
  9. * the following conditions are aheared to. The following conditions
  10. * apply to all code found in this distribution, be it the RC4, RSA,
  11. * lhash, DES, etc., code; not just the SSL code. The SSL documentation
  12. * included with this distribution is covered by the same copyright terms
  13. * except that the holder is Tim Hudson (tjh@cryptsoft.com).
  14. *
  15. * Copyright remains Eric Young's, and as such any Copyright notices in
  16. * the code are not to be removed.
  17. * If this package is used in a product, Eric Young should be given attribution
  18. * as the author of the parts of the library used.
  19. * This can be in the form of a textual message at program startup or
  20. * in documentation (online or textual) provided with the package.
  21. *
  22. * Redistribution and use in source and binary forms, with or without
  23. * modification, are permitted provided that the following conditions
  24. * are met:
  25. * 1. Redistributions of source code must retain the copyright
  26. * notice, this list of conditions and the following disclaimer.
  27. * 2. Redistributions in binary form must reproduce the above copyright
  28. * notice, this list of conditions and the following disclaimer in the
  29. * documentation and/or other materials provided with the distribution.
  30. * 3. All advertising materials mentioning features or use of this software
  31. * must display the following acknowledgement:
  32. * "This product includes cryptographic software written by
  33. * Eric Young (eay@cryptsoft.com)"
  34. * The word 'cryptographic' can be left out if the rouines from the library
  35. * being used are not cryptographic related :-).
  36. * 4. If you include any Windows specific code (or a derivative thereof) from
  37. * the apps directory (application code) you must include an acknowledgement:
  38. * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
  39. *
  40. * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
  41. * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
  42. * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
  43. * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
  44. * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
  45. * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
  46. * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
  47. * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
  48. * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
  49. * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
  50. * SUCH DAMAGE.
  51. *
  52. * The licence and distribution terms for any publically available version or
  53. * derivative of this code cannot be changed. i.e. this code cannot simply be
  54. * copied and put under another distribution licence
  55. * [including the GNU Public Licence.] */
  56. #ifndef OPENSSL_HEADER_DH_H
  57. #define OPENSSL_HEADER_DH_H
  58. #include <openssl/base.h>
  59. #include <openssl/ex_data.h>
  60. #include <openssl/thread.h>
  61. #if defined(__cplusplus)
  62. extern "C" {
  63. #endif
  64. // DH contains functions for performing Diffie-Hellman key agreement in
  65. // multiplicative groups.
  66. // Allocation and destruction.
  67. // DH_new returns a new, empty DH object or NULL on error.
  68. OPENSSL_EXPORT DH *DH_new(void);
  69. // DH_free decrements the reference count of |dh| and frees it if the reference
  70. // count drops to zero.
  71. OPENSSL_EXPORT void DH_free(DH *dh);
  72. // DH_up_ref increments the reference count of |dh| and returns one.
  73. OPENSSL_EXPORT int DH_up_ref(DH *dh);
  74. // Properties.
  75. // DH_get0_key sets |*out_pub_key| and |*out_priv_key|, if non-NULL, to |dh|'s
  76. // public and private key, respectively. If |dh| is a public key, the private
  77. // key will be set to NULL.
  78. OPENSSL_EXPORT void DH_get0_key(const DH *dh, const BIGNUM **out_pub_key,
  79. const BIGNUM **out_priv_key);
  80. // DH_get0_pqg sets |*out_p|, |*out_q|, and |*out_g|, if non-NULL, to |dh|'s p,
  81. // q, and g parameters, respectively.
  82. OPENSSL_EXPORT void DH_get0_pqg(const DH *dh, const BIGNUM **out_p,
  83. const BIGNUM **out_q, const BIGNUM **out_g);
  84. // Standard parameters.
  85. // BN_get_rfc3526_prime_1536 sets |*ret| to the 1536-bit MODP group from RFC
  86. // 3526 and returns |ret|. If |ret| is NULL then a fresh |BIGNUM| is allocated
  87. // and returned. It returns NULL on allocation failure.
  88. OPENSSL_EXPORT BIGNUM *BN_get_rfc3526_prime_1536(BIGNUM *ret);
  89. // Parameter generation.
  90. #define DH_GENERATOR_2 2
  91. #define DH_GENERATOR_5 5
  92. // DH_generate_parameters_ex generates a suitable Diffie-Hellman group with a
  93. // prime that is |prime_bits| long and stores it in |dh|. The generator of the
  94. // group will be |generator|, which should be |DH_GENERATOR_2| unless there's a
  95. // good reason to use a different value. The |cb| argument contains a callback
  96. // function that will be called during the generation. See the documentation in
  97. // |bn.h| about this. In addition to the callback invocations from |BN|, |cb|
  98. // will also be called with |event| equal to three when the generation is
  99. // complete.
  100. OPENSSL_EXPORT int DH_generate_parameters_ex(DH *dh, int prime_bits,
  101. int generator, BN_GENCB *cb);
  102. // Diffie-Hellman operations.
  103. // DH_generate_key generates a new, random, private key and stores it in
  104. // |dh|. It returns one on success and zero on error.
  105. OPENSSL_EXPORT int DH_generate_key(DH *dh);
  106. // DH_compute_key calculates the shared key between |dh| and |peers_key| and
  107. // writes it as a big-endian integer into |out|, which must have |DH_size|
  108. // bytes of space. It returns the number of bytes written, or a negative number
  109. // on error.
  110. OPENSSL_EXPORT int DH_compute_key(uint8_t *out, const BIGNUM *peers_key,
  111. DH *dh);
  112. // Utility functions.
  113. // DH_size returns the number of bytes in the DH group's prime.
  114. OPENSSL_EXPORT int DH_size(const DH *dh);
  115. // DH_num_bits returns the minimum number of bits needed to represent the
  116. // absolute value of the DH group's prime.
  117. OPENSSL_EXPORT unsigned DH_num_bits(const DH *dh);
  118. #define DH_CHECK_P_NOT_PRIME 0x01
  119. #define DH_CHECK_P_NOT_SAFE_PRIME 0x02
  120. #define DH_CHECK_UNABLE_TO_CHECK_GENERATOR 0x04
  121. #define DH_CHECK_NOT_SUITABLE_GENERATOR 0x08
  122. #define DH_CHECK_Q_NOT_PRIME 0x10
  123. #define DH_CHECK_INVALID_Q_VALUE 0x20
  124. #define DH_CHECK_INVALID_J_VALUE 0x40
  125. // These are compatibility defines.
  126. #define DH_NOT_SUITABLE_GENERATOR DH_CHECK_NOT_SUITABLE_GENERATOR
  127. #define DH_UNABLE_TO_CHECK_GENERATOR DH_CHECK_UNABLE_TO_CHECK_GENERATOR
  128. // DH_check checks the suitability of |dh| as a Diffie-Hellman group. and sets
  129. // |DH_CHECK_*| flags in |*out_flags| if it finds any errors. It returns one if
  130. // |*out_flags| was successfully set and zero on error.
  131. //
  132. // Note: these checks may be quite computationally expensive.
  133. OPENSSL_EXPORT int DH_check(const DH *dh, int *out_flags);
  134. #define DH_CHECK_PUBKEY_TOO_SMALL 0x1
  135. #define DH_CHECK_PUBKEY_TOO_LARGE 0x2
  136. #define DH_CHECK_PUBKEY_INVALID 0x4
  137. // DH_check_pub_key checks the suitability of |pub_key| as a public key for the
  138. // DH group in |dh| and sets |DH_CHECK_PUBKEY_*| flags in |*out_flags| if it
  139. // finds any errors. It returns one if |*out_flags| was successfully set and
  140. // zero on error.
  141. OPENSSL_EXPORT int DH_check_pub_key(const DH *dh, const BIGNUM *pub_key,
  142. int *out_flags);
  143. // DHparams_dup allocates a fresh |DH| and copies the parameters from |dh| into
  144. // it. It returns the new |DH| or NULL on error.
  145. OPENSSL_EXPORT DH *DHparams_dup(const DH *dh);
  146. // ASN.1 functions.
  147. // DH_parse_parameters decodes a DER-encoded DHParameter structure (PKCS #3)
  148. // from |cbs| and advances |cbs|. It returns a newly-allocated |DH| or NULL on
  149. // error.
  150. OPENSSL_EXPORT DH *DH_parse_parameters(CBS *cbs);
  151. // DH_marshal_parameters marshals |dh| as a DER-encoded DHParameter structure
  152. // (PKCS #3) and appends the result to |cbb|. It returns one on success and zero
  153. // on error.
  154. OPENSSL_EXPORT int DH_marshal_parameters(CBB *cbb, const DH *dh);
  155. // ex_data functions.
  156. //
  157. // See |ex_data.h| for details.
  158. OPENSSL_EXPORT int DH_get_ex_new_index(long argl, void *argp,
  159. CRYPTO_EX_unused *unused,
  160. CRYPTO_EX_dup *dup_unused,
  161. CRYPTO_EX_free *free_func);
  162. OPENSSL_EXPORT int DH_set_ex_data(DH *d, int idx, void *arg);
  163. OPENSSL_EXPORT void *DH_get_ex_data(DH *d, int idx);
  164. // Deprecated functions.
  165. // DH_generate_parameters behaves like |DH_generate_parameters_ex|, which is
  166. // what you should use instead. It returns NULL on error, or a newly-allocated
  167. // |DH| on success. This function is provided for compatibility only.
  168. OPENSSL_EXPORT DH *DH_generate_parameters(int prime_len, int generator,
  169. void (*callback)(int, int, void *),
  170. void *cb_arg);
  171. // d2i_DHparams parses an ASN.1, DER encoded Diffie-Hellman parameters structure
  172. // from |len| bytes at |*inp|. If |ret| is not NULL then, on exit, a pointer to
  173. // the result is in |*ret|. Note that, even if |*ret| is already non-NULL on
  174. // entry, it will not be written to. Rather, a fresh |DH| is allocated and the
  175. // previous one is freed.
  176. //
  177. // On successful exit, |*inp| is advanced past the DER structure. It
  178. // returns the result or NULL on error.
  179. //
  180. // Use |DH_parse_parameters| instead.
  181. OPENSSL_EXPORT DH *d2i_DHparams(DH **ret, const unsigned char **inp, long len);
  182. // i2d_DHparams marshals |in| to an ASN.1, DER structure. If |outp| is not NULL
  183. // then the result is written to |*outp| and |*outp| is advanced just past the
  184. // output. It returns the number of bytes in the result, whether written or
  185. // not, or a negative value on error.
  186. //
  187. // Use |DH_marshal_parameters| instead.
  188. OPENSSL_EXPORT int i2d_DHparams(const DH *in, unsigned char **outp);
  189. struct dh_st {
  190. BIGNUM *p;
  191. BIGNUM *g;
  192. BIGNUM *pub_key; // g^x mod p
  193. BIGNUM *priv_key; // x
  194. // priv_length contains the length, in bits, of the private value. If zero,
  195. // the private value will be the same length as |p|.
  196. unsigned priv_length;
  197. CRYPTO_MUTEX method_mont_p_lock;
  198. BN_MONT_CTX *method_mont_p;
  199. // Place holders if we want to do X9.42 DH
  200. BIGNUM *q;
  201. BIGNUM *j;
  202. unsigned char *seed;
  203. int seedlen;
  204. BIGNUM *counter;
  205. int flags;
  206. CRYPTO_refcount_t references;
  207. CRYPTO_EX_DATA ex_data;
  208. };
  209. #if defined(__cplusplus)
  210. } // extern C
  211. extern "C++" {
  212. namespace bssl {
  213. BORINGSSL_MAKE_DELETER(DH, DH_free)
  214. } // namespace bssl
  215. } // extern C++
  216. #endif
  217. #define DH_R_BAD_GENERATOR 100
  218. #define DH_R_INVALID_PUBKEY 101
  219. #define DH_R_MODULUS_TOO_LARGE 102
  220. #define DH_R_NO_PRIVATE_VALUE 103
  221. #define DH_R_DECODE_ERROR 104
  222. #define DH_R_ENCODE_ERROR 105
  223. #endif // OPENSSL_HEADER_DH_H