diff options
| author | ryker <> | 1998-10-05 20:13:15 +0000 |
|---|---|---|
| committer | ryker <> | 1998-10-05 20:13:15 +0000 |
| commit | 9e77c62555877f9a64805c49d0dcd7dbfbb40f4e (patch) | |
| tree | 2a6396b738ecede1e1dd3ad84c90e47e21d0bcbd /src/lib/libcrypto/dh | |
| parent | fe5d0717e2760d02faf23bf5a714f17b33ae4abb (diff) | |
| parent | 536c76cbb863bab152f19842ab88772c01e922c7 (diff) | |
| download | openbsd-9e77c62555877f9a64805c49d0dcd7dbfbb40f4e.tar.gz openbsd-9e77c62555877f9a64805c49d0dcd7dbfbb40f4e.tar.bz2 openbsd-9e77c62555877f9a64805c49d0dcd7dbfbb40f4e.zip | |
This commit was generated by cvs2git to track changes on a CVS vendor
branch.
Diffstat (limited to 'src/lib/libcrypto/dh')
| -rw-r--r-- | src/lib/libcrypto/dh/dh1024.pem | 5 | ||||
| -rw-r--r-- | src/lib/libcrypto/dh/dh192.pem | 3 | ||||
| -rw-r--r-- | src/lib/libcrypto/dh/dh2048.pem | 16 | ||||
| -rw-r--r-- | src/lib/libcrypto/dh/dh4096.pem | 14 | ||||
| -rw-r--r-- | src/lib/libcrypto/dh/dh512.pem | 4 | ||||
| -rw-r--r-- | src/lib/libcrypto/dh/dhtest.c | 188 | ||||
| -rw-r--r-- | src/lib/libcrypto/dh/example | 50 | ||||
| -rw-r--r-- | src/lib/libcrypto/dh/generate | 65 | ||||
| -rw-r--r-- | src/lib/libcrypto/dh/p1024.c | 92 | ||||
| -rw-r--r-- | src/lib/libcrypto/dh/p192.c | 80 | ||||
| -rw-r--r-- | src/lib/libcrypto/dh/p512.c | 85 |
11 files changed, 602 insertions, 0 deletions
diff --git a/src/lib/libcrypto/dh/dh1024.pem b/src/lib/libcrypto/dh/dh1024.pem new file mode 100644 index 0000000000..81d43f6a3e --- /dev/null +++ b/src/lib/libcrypto/dh/dh1024.pem | |||
| @@ -0,0 +1,5 @@ | |||
| 1 | -----BEGIN DH PARAMETERS----- | ||
| 2 | MIGHAoGBAJf2QmHKtQXdKCjhPx1ottPb0PMTBH9A6FbaWMsTuKG/K3g6TG1Z1fkq | ||
| 3 | /Gz/PWk/eLI9TzFgqVAuPvr3q14a1aZeVUMTgo2oO5/y2UHe6VaJ+trqCTat3xlx | ||
| 4 | /mNbIK9HA2RgPC3gWfVLZQrY+gz3ASHHR5nXWHEyvpuZm7m3h+irAgEC | ||
| 5 | -----END DH PARAMETERS----- | ||
diff --git a/src/lib/libcrypto/dh/dh192.pem b/src/lib/libcrypto/dh/dh192.pem new file mode 100644 index 0000000000..521c07271d --- /dev/null +++ b/src/lib/libcrypto/dh/dh192.pem | |||
| @@ -0,0 +1,3 @@ | |||
| 1 | -----BEGIN DH PARAMETERS----- | ||
| 2 | MB4CGQDUoLoCULb9LsYm5+/WN992xxbiLQlEuIsCAQM= | ||
| 3 | -----END DH PARAMETERS----- | ||
diff --git a/src/lib/libcrypto/dh/dh2048.pem b/src/lib/libcrypto/dh/dh2048.pem new file mode 100644 index 0000000000..295460f508 --- /dev/null +++ b/src/lib/libcrypto/dh/dh2048.pem | |||
| @@ -0,0 +1,16 @@ | |||
| 1 | -----BEGIN DH PARAMETERS----- | ||
| 2 | MIIBCAKCAQEA7ZKJNYJFVcs7+6J2WmkEYb8h86tT0s0h2v94GRFS8Q7B4lW9aG9o | ||
| 3 | AFO5Imov5Jo0H2XMWTKKvbHbSe3fpxJmw/0hBHAY8H/W91hRGXKCeyKpNBgdL8sh | ||
| 4 | z22SrkO2qCnHJ6PLAMXy5fsKpFmFor2tRfCzrfnggTXu2YOzzK7q62bmqVdmufEo | ||
| 5 | pT8igNcLpvZxk5uBDvhakObMym9mX3rAEBoe8PwttggMYiiw7NuJKO4MqD1llGkW | ||
| 6 | aVM8U2ATsCun1IKHrRxynkE1/MJ86VHeYYX8GZt2YA8z+GuzylIOKcMH6JAWzMwA | ||
| 7 | Gbatw6QwizOhr9iMjZ0B26TE3X8LvW84wwIBAg== | ||
| 8 | -----END DH PARAMETERS----- | ||
| 9 | -----BEGIN DH PARAMETERS----- | ||
| 10 | MIIBCAKCAQEArtA3w73zP6Lu3EOQtwogiXt3AXXpuS6yD4BhzNS1pZFyPHk0/an5 | ||
| 11 | 8ydEkPhQZHKDW+BZJxxPLANaTudWo2YT8TgtvUdN6KSgMiEi6McwqDw+SADuvW+F | ||
| 12 | SKUYFxG6VFIxyEP6xBdf+vhJxEDbRG2EYsHDRRtJ76gp9cSKTHusf2R+4AAVGqnt | ||
| 13 | gRAbNqtcOar/7FSj+Pl8G3v0Bty0LcCSpbqgYlnv6z+rErQmmC6PPvSz97TDMCok | ||
| 14 | yKpCE9hFA1zkqK3TH4FmFvGeIaXJUIBZf4mArWuBTjWFW3nmhESRUn1VK3K3x42N | ||
| 15 | a5k6c2+EhrMFiLjxuH6JZoqL0/E93FF9SwIBAg== | ||
| 16 | -----END DH PARAMETERS----- | ||
diff --git a/src/lib/libcrypto/dh/dh4096.pem b/src/lib/libcrypto/dh/dh4096.pem new file mode 100644 index 0000000000..390943a21d --- /dev/null +++ b/src/lib/libcrypto/dh/dh4096.pem | |||
| @@ -0,0 +1,14 @@ | |||
| 1 | -----BEGIN DH PARAMETERS----- | ||
| 2 | MIICCAKCAgEA/urRnb6vkPYc/KEGXWnbCIOaKitq7ySIq9dTH7s+Ri59zs77zty7 | ||
| 3 | vfVlSe6VFTBWgYjD2XKUFmtqq6CqXMhVX5ElUDoYDpAyTH85xqNFLzFC7nKrff/H | ||
| 4 | TFKNttp22cZE9V0IPpzedPfnQkE7aUdmF9JnDyv21Z/818O93u1B4r0szdnmEvEF | ||
| 5 | bKuIxEHX+bp0ZR7RqE1AeifXGJX3d6tsd2PMAObxwwsv55RGkn50vHO4QxtTARr1 | ||
| 6 | rRUV5j3B3oPMgC7Offxx+98Xn45B1/G0Prp11anDsR1PGwtaCYipqsvMwQUSJtyE | ||
| 7 | EOQWk+yFkeMe4vWv367eEi0Sd/wnC+TSXBE3pYvpYerJ8n1MceI5GQTdarJ77OW9 | ||
| 8 | bGTHmxRsLSCM1jpLdPja5jjb4siAa6EHc4qN9c/iFKS3PQPJEnX7pXKBRs5f7AF3 | ||
| 9 | W3RIGt+G9IVNZfXaS7Z/iCpgzgvKCs0VeqN38QsJGtC1aIkwOeyjPNy2G6jJ4yqH | ||
| 10 | ovXYt/0mc00vCWeSNS1wren0pR2EiLxX0ypjjgsU1mk/Z3b/+zVf7fZSIB+nDLjb | ||
| 11 | NPtUlJCVGnAeBK1J1nG3TQicqowOXoM6ISkdaXj5GPJdXHab2+S7cqhKGv5qC7rR | ||
| 12 | jT6sx7RUr0CNTxzLI7muV2/a4tGmj0PSdXQdsZ7tw7gbXlaWT1+MM2MCAQI= | ||
| 13 | -----END DH PARAMETERS----- | ||
| 14 | |||
diff --git a/src/lib/libcrypto/dh/dh512.pem b/src/lib/libcrypto/dh/dh512.pem new file mode 100644 index 0000000000..0a4d863ebe --- /dev/null +++ b/src/lib/libcrypto/dh/dh512.pem | |||
| @@ -0,0 +1,4 @@ | |||
| 1 | -----BEGIN DH PARAMETERS----- | ||
| 2 | MEYCQQDaWDwW2YUiidDkr3VvTMqS3UvlM7gE+w/tlO+cikQD7VdGUNNpmdsp13Yn | ||
| 3 | a6LT1BLiGPTdHghM9tgAPnxHdOgzAgEC | ||
| 4 | -----END DH PARAMETERS----- | ||
diff --git a/src/lib/libcrypto/dh/dhtest.c b/src/lib/libcrypto/dh/dhtest.c new file mode 100644 index 0000000000..488f10fd41 --- /dev/null +++ b/src/lib/libcrypto/dh/dhtest.c | |||
| @@ -0,0 +1,188 @@ | |||
| 1 | /* crypto/dh/dhtest.c */ | ||
| 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | ||
| 3 | * All rights reserved. | ||
| 4 | * | ||
| 5 | * This package is an SSL implementation written | ||
| 6 | * by Eric Young (eay@cryptsoft.com). | ||
| 7 | * The implementation was written so as to conform with Netscapes SSL. | ||
| 8 | * | ||
| 9 | * This library is free for commercial and non-commercial use as long as | ||
| 10 | * the following conditions are aheared to. The following conditions | ||
| 11 | * apply to all code found in this distribution, be it the RC4, RSA, | ||
| 12 | * lhash, DES, etc., code; not just the SSL code. The SSL documentation | ||
| 13 | * included with this distribution is covered by the same copyright terms | ||
| 14 | * except that the holder is Tim Hudson (tjh@cryptsoft.com). | ||
| 15 | * | ||
| 16 | * Copyright remains Eric Young's, and as such any Copyright notices in | ||
| 17 | * the code are not to be removed. | ||
| 18 | * If this package is used in a product, Eric Young should be given attribution | ||
| 19 | * as the author of the parts of the library used. | ||
| 20 | * This can be in the form of a textual message at program startup or | ||
| 21 | * in documentation (online or textual) provided with the package. | ||
| 22 | * | ||
| 23 | * Redistribution and use in source and binary forms, with or without | ||
| 24 | * modification, are permitted provided that the following conditions | ||
| 25 | * are met: | ||
| 26 | * 1. Redistributions of source code must retain the copyright | ||
| 27 | * notice, this list of conditions and the following disclaimer. | ||
| 28 | * 2. Redistributions in binary form must reproduce the above copyright | ||
| 29 | * notice, this list of conditions and the following disclaimer in the | ||
| 30 | * documentation and/or other materials provided with the distribution. | ||
| 31 | * 3. All advertising materials mentioning features or use of this software | ||
| 32 | * must display the following acknowledgement: | ||
| 33 | * "This product includes cryptographic software written by | ||
| 34 | * Eric Young (eay@cryptsoft.com)" | ||
| 35 | * The word 'cryptographic' can be left out if the rouines from the library | ||
| 36 | * being used are not cryptographic related :-). | ||
| 37 | * 4. If you include any Windows specific code (or a derivative thereof) from | ||
| 38 | * the apps directory (application code) you must include an acknowledgement: | ||
| 39 | * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" | ||
| 40 | * | ||
| 41 | * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND | ||
| 42 | * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | ||
| 43 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE | ||
| 44 | * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE | ||
| 45 | * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL | ||
| 46 | * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS | ||
| 47 | * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | ||
| 48 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT | ||
| 49 | * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY | ||
| 50 | * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF | ||
| 51 | * SUCH DAMAGE. | ||
| 52 | * | ||
| 53 | * The licence and distribution terms for any publically available version or | ||
| 54 | * derivative of this code cannot be changed. i.e. this code cannot simply be | ||
| 55 | * copied and put under another distribution licence | ||
| 56 | * [including the GNU Public Licence.] | ||
| 57 | */ | ||
| 58 | |||
| 59 | #include <stdio.h> | ||
| 60 | #include <stdlib.h> | ||
| 61 | #include <string.h> | ||
| 62 | #ifdef WINDOWS | ||
| 63 | #include "../bio/bss_file.c" | ||
| 64 | #endif | ||
| 65 | #include "crypto.h" | ||
| 66 | #include "bio.h" | ||
| 67 | #include "bn.h" | ||
| 68 | #include "dh.h" | ||
| 69 | |||
| 70 | #ifdef WIN16 | ||
| 71 | #define MS_CALLBACK _far _loadds | ||
| 72 | #else | ||
| 73 | #define MS_CALLBACK | ||
| 74 | #endif | ||
| 75 | |||
| 76 | #ifndef NOPROTO | ||
| 77 | static void MS_CALLBACK cb(int p, int n, char *arg); | ||
| 78 | #else | ||
| 79 | static void MS_CALLBACK cb(); | ||
| 80 | #endif | ||
| 81 | |||
| 82 | #ifdef NO_STDIO | ||
| 83 | #define APPS_WIN16 | ||
| 84 | #include "bss_file.c" | ||
| 85 | #endif | ||
| 86 | |||
| 87 | BIO *out=NULL; | ||
| 88 | |||
| 89 | int main(argc,argv) | ||
| 90 | int argc; | ||
| 91 | char *argv[]; | ||
| 92 | { | ||
| 93 | DH *a,*b; | ||
| 94 | char buf[12]; | ||
| 95 | unsigned char *abuf=NULL,*bbuf=NULL; | ||
| 96 | int i,alen,blen,aout,bout,ret=1; | ||
| 97 | |||
| 98 | #ifdef WIN32 | ||
| 99 | CRYPTO_malloc_init(); | ||
| 100 | #endif | ||
| 101 | |||
| 102 | out=BIO_new(BIO_s_file()); | ||
| 103 | if (out == NULL) exit(1); | ||
| 104 | BIO_set_fp(out,stdout,BIO_NOCLOSE); | ||
| 105 | |||
| 106 | a=DH_generate_parameters(64,DH_GENERATOR_5,cb,(char *)out); | ||
| 107 | if (a == NULL) goto err; | ||
| 108 | |||
| 109 | BIO_puts(out,"\np ="); | ||
| 110 | BN_print(out,a->p); | ||
| 111 | BIO_puts(out,"\ng ="); | ||
| 112 | BN_print(out,a->g); | ||
| 113 | BIO_puts(out,"\n"); | ||
| 114 | |||
| 115 | b=DH_new(); | ||
| 116 | if (b == NULL) goto err; | ||
| 117 | |||
| 118 | b->p=BN_dup(a->p); | ||
| 119 | b->g=BN_dup(a->g); | ||
| 120 | if ((b->p == NULL) || (b->g == NULL)) goto err; | ||
| 121 | |||
| 122 | if (!DH_generate_key(a)) goto err; | ||
| 123 | BIO_puts(out,"pri 1="); | ||
| 124 | BN_print(out,a->priv_key); | ||
| 125 | BIO_puts(out,"\npub 1="); | ||
| 126 | BN_print(out,a->pub_key); | ||
| 127 | BIO_puts(out,"\n"); | ||
| 128 | |||
| 129 | if (!DH_generate_key(b)) goto err; | ||
| 130 | BIO_puts(out,"pri 2="); | ||
| 131 | BN_print(out,b->priv_key); | ||
| 132 | BIO_puts(out,"\npub 2="); | ||
| 133 | BN_print(out,b->pub_key); | ||
| 134 | BIO_puts(out,"\n"); | ||
| 135 | |||
| 136 | alen=DH_size(a); | ||
| 137 | abuf=(unsigned char *)Malloc(alen); | ||
| 138 | aout=DH_compute_key(abuf,b->pub_key,a); | ||
| 139 | |||
| 140 | BIO_puts(out,"key1 ="); | ||
| 141 | for (i=0; i<aout; i++) | ||
| 142 | { | ||
| 143 | sprintf(buf,"%02X",abuf[i]); | ||
| 144 | BIO_puts(out,buf); | ||
| 145 | } | ||
| 146 | BIO_puts(out,"\n"); | ||
| 147 | |||
| 148 | blen=DH_size(b); | ||
| 149 | bbuf=(unsigned char *)Malloc(blen); | ||
| 150 | bout=DH_compute_key(bbuf,a->pub_key,b); | ||
| 151 | |||
| 152 | BIO_puts(out,"key2 ="); | ||
| 153 | for (i=0; i<bout; i++) | ||
| 154 | { | ||
| 155 | sprintf(buf,"%02X",bbuf[i]); | ||
| 156 | BIO_puts(out,buf); | ||
| 157 | } | ||
| 158 | BIO_puts(out,"\n"); | ||
| 159 | if ((aout < 4) || (bout != aout) || (memcmp(abuf,bbuf,aout) != 0)) | ||
| 160 | { | ||
| 161 | fprintf(stderr,"Error in DH routines\n"); | ||
| 162 | ret=1; | ||
| 163 | } | ||
| 164 | else | ||
| 165 | ret=0; | ||
| 166 | err: | ||
| 167 | if (abuf != NULL) Free(abuf); | ||
| 168 | if (bbuf != NULL) Free(bbuf); | ||
| 169 | exit(ret); | ||
| 170 | return(ret); | ||
| 171 | } | ||
| 172 | |||
| 173 | static void MS_CALLBACK cb(p, n,arg) | ||
| 174 | int p; | ||
| 175 | int n; | ||
| 176 | char *arg; | ||
| 177 | { | ||
| 178 | char c='*'; | ||
| 179 | |||
| 180 | if (p == 0) c='.'; | ||
| 181 | if (p == 1) c='+'; | ||
| 182 | if (p == 2) c='*'; | ||
| 183 | if (p == 3) c='\n'; | ||
| 184 | BIO_write((BIO *)arg,&c,1); | ||
| 185 | #ifdef LINT | ||
| 186 | p=n; | ||
| 187 | #endif | ||
| 188 | } | ||
diff --git a/src/lib/libcrypto/dh/example b/src/lib/libcrypto/dh/example new file mode 100644 index 0000000000..16a33d2910 --- /dev/null +++ b/src/lib/libcrypto/dh/example | |||
| @@ -0,0 +1,50 @@ | |||
| 1 | From owner-cypherpunks@toad.com Mon Sep 25 10:50:51 1995 | ||
| 2 | Received: from minbne.mincom.oz.au by orb.mincom.oz.au with SMTP id AA10562 | ||
| 3 | (5.65c/IDA-1.4.4 for eay); Wed, 27 Sep 1995 19:41:55 +1000 | ||
| 4 | Received: by minbne.mincom.oz.au id AA19958 | ||
| 5 | (5.65c/IDA-1.4.4 for eay@orb.mincom.oz.au); Wed, 27 Sep 1995 19:34:59 +1000 | ||
| 6 | Received: from relay3.UU.NET by bunyip.cc.uq.oz.au with SMTP (PP); | ||
| 7 | Wed, 27 Sep 1995 19:13:05 +1000 | ||
| 8 | Received: from toad.com by relay3.UU.NET with SMTP id QQzizb16156; | ||
| 9 | Wed, 27 Sep 1995 04:48:46 -0400 | ||
| 10 | Received: by toad.com id AA07905; Tue, 26 Sep 95 06:31:45 PDT | ||
| 11 | Received: from by toad.com id AB07851; Tue, 26 Sep 95 06:31:40 PDT | ||
| 12 | Received: from servo.qualcomm.com (servo.qualcomm.com [129.46.128.14]) | ||
| 13 | by cygnus.com (8.6.12/8.6.9) with ESMTP id RAA18442 | ||
| 14 | for <cypherpunks@toad.com>; Mon, 25 Sep 1995 17:52:47 -0700 | ||
| 15 | Received: (karn@localhost) by servo.qualcomm.com (8.6.12/QC-BSD-2.5.1) | ||
| 16 | id RAA14732; Mon, 25 Sep 1995 17:50:51 -0700 | ||
| 17 | Date: Mon, 25 Sep 1995 17:50:51 -0700 | ||
| 18 | From: Phil Karn <karn@qualcomm.com> | ||
| 19 | Message-Id: <199509260050.RAA14732@servo.qualcomm.com> | ||
| 20 | To: cypherpunks@toad.com, ipsec-dev@eit.com | ||
| 21 | Subject: Primality verification needed | ||
| 22 | Sender: owner-cypherpunks@toad.com | ||
| 23 | Precedence: bulk | ||
| 24 | Status: RO | ||
| 25 | X-Status: | ||
| 26 | |||
| 27 | Hi. I've generated a 2047-bit "strong" prime number that I would like to | ||
| 28 | use with Diffie-Hellman key exchange. I assert that not only is this number | ||
| 29 | 'p' prime, but so is (p-1)/2. | ||
| 30 | |||
| 31 | I've used the mpz_probab_prime() function in the Gnu Math Package (GMP) version | ||
| 32 | 1.3.2 to test this number. This function uses the Miller-Rabin primality test. | ||
| 33 | However, to increase my confidence that this number really is a strong prime, | ||
| 34 | I'd like to ask others to confirm it with other tests. Here's the number in hex: | ||
| 35 | |||
| 36 | 72a925f760b2f954ed287f1b0953f3e6aef92e456172f9fe86fdd8822241b9c9788fbc289982743e | ||
| 37 | fbcd2ccf062b242d7a567ba8bbb40d79bca7b8e0b6c05f835a5b938d985816bc648985adcff5402a | ||
| 38 | a76756b36c845a840a1d059ce02707e19cf47af0b5a882f32315c19d1b86a56c5389c5e9bee16b65 | ||
| 39 | fde7b1a8d74a7675de9b707d4c5a4633c0290c95ff30a605aeb7ae864ff48370f13cf01d49adb9f2 | ||
| 40 | 3d19a439f753ee7703cf342d87f431105c843c78ca4df639931f3458fae8a94d1687e99a76ed99d0 | ||
| 41 | ba87189f42fd31ad8262c54a8cf5914ae6c28c540d714a5f6087a171fb74f4814c6f968d72386ef3 | ||
| 42 | 56a05180c3bec7ddd5ef6fe76b1f717b | ||
| 43 | |||
| 44 | The generator, g, for this prime is 2. | ||
| 45 | |||
| 46 | Thanks! | ||
| 47 | |||
| 48 | Phil Karn | ||
| 49 | |||
| 50 | |||
diff --git a/src/lib/libcrypto/dh/generate b/src/lib/libcrypto/dh/generate new file mode 100644 index 0000000000..5d407231df --- /dev/null +++ b/src/lib/libcrypto/dh/generate | |||
| @@ -0,0 +1,65 @@ | |||
| 1 | From: stewarts@ix.netcom.com (Bill Stewart) | ||
| 2 | Newsgroups: sci.crypt | ||
| 3 | Subject: Re: Diffie-Hellman key exchange | ||
| 4 | Date: Wed, 11 Oct 1995 23:08:28 GMT | ||
| 5 | Organization: Freelance Information Architect | ||
| 6 | Lines: 32 | ||
| 7 | Message-ID: <45hir2$7l8@ixnews7.ix.netcom.com> | ||
| 8 | References: <458rhn$76m$1@mhadf.production.compuserve.com> | ||
| 9 | NNTP-Posting-Host: ix-pl4-16.ix.netcom.com | ||
| 10 | X-NETCOM-Date: Wed Oct 11 4:09:22 PM PDT 1995 | ||
| 11 | X-Newsreader: Forte Free Agent 1.0.82 | ||
| 12 | |||
| 13 | Kent Briggs <72124.3234@CompuServe.COM> wrote: | ||
| 14 | |||
| 15 | >I have a copy of the 1976 IEEE article describing the | ||
| 16 | >Diffie-Hellman public key exchange algorithm: y=a^x mod q. I'm | ||
| 17 | >looking for sources that give examples of secure a,q pairs and | ||
| 18 | >possible some source code that I could examine. | ||
| 19 | |||
| 20 | q should be prime, and ideally should be a "strong prime", | ||
| 21 | which means it's of the form 2n+1 where n is also prime. | ||
| 22 | q also needs to be long enough to prevent the attacks LaMacchia and | ||
| 23 | Odlyzko described (some variant on a factoring attack which generates | ||
| 24 | a large pile of simultaneous equations and then solves them); | ||
| 25 | long enough is about the same size as factoring, so 512 bits may not | ||
| 26 | be secure enough for most applications. (The 192 bits used by | ||
| 27 | "secure NFS" was certainly not long enough.) | ||
| 28 | |||
| 29 | a should be a generator for q, which means it needs to be | ||
| 30 | relatively prime to q-1. Usually a small prime like 2, 3 or 5 will | ||
| 31 | work. | ||
| 32 | |||
| 33 | .... | ||
| 34 | |||
| 35 | Date: Tue, 26 Sep 1995 13:52:36 MST | ||
| 36 | From: "Richard Schroeppel" <rcs@cs.arizona.edu> | ||
| 37 | To: karn | ||
| 38 | Cc: ho@cs.arizona.edu | ||
| 39 | Subject: random large primes | ||
| 40 | |||
| 41 | Since your prime is really random, proving it is hard. | ||
| 42 | My personal limit on rigorously proved primes is ~350 digits. | ||
| 43 | If you really want a proof, we should talk to Francois Morain, | ||
| 44 | or the Australian group. | ||
| 45 | |||
| 46 | If you want 2 to be a generator (mod P), then you need it | ||
| 47 | to be a non-square. If (P-1)/2 is also prime, then | ||
| 48 | non-square == primitive-root for bases << P. | ||
| 49 | |||
| 50 | In the case at hand, this means 2 is a generator iff P = 11 (mod 24). | ||
| 51 | If you want this, you should restrict your sieve accordingly. | ||
| 52 | |||
| 53 | 3 is a generator iff P = 5 (mod 12). | ||
| 54 | |||
| 55 | 5 is a generator iff P = 3 or 7 (mod 10). | ||
| 56 | |||
| 57 | 2 is perfectly usable as a base even if it's a non-generator, since | ||
| 58 | it still covers half the space of possible residues. And an | ||
| 59 | eavesdropper can always determine the low-bit of your exponent for | ||
| 60 | a generator anyway. | ||
| 61 | |||
| 62 | Rich rcs@cs.arizona.edu | ||
| 63 | |||
| 64 | |||
| 65 | |||
diff --git a/src/lib/libcrypto/dh/p1024.c b/src/lib/libcrypto/dh/p1024.c new file mode 100644 index 0000000000..0c50c24cfb --- /dev/null +++ b/src/lib/libcrypto/dh/p1024.c | |||
| @@ -0,0 +1,92 @@ | |||
| 1 | /* crypto/dh/p1024.c */ | ||
| 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | ||
| 3 | * All rights reserved. | ||
| 4 | * | ||
| 5 | * This package is an SSL implementation written | ||
| 6 | * by Eric Young (eay@cryptsoft.com). | ||
| 7 | * The implementation was written so as to conform with Netscapes SSL. | ||
| 8 | * | ||
| 9 | * This library is free for commercial and non-commercial use as long as | ||
| 10 | * the following conditions are aheared to. The following conditions | ||
| 11 | * apply to all code found in this distribution, be it the RC4, RSA, | ||
| 12 | * lhash, DES, etc., code; not just the SSL code. The SSL documentation | ||
| 13 | * included with this distribution is covered by the same copyright terms | ||
| 14 | * except that the holder is Tim Hudson (tjh@cryptsoft.com). | ||
| 15 | * | ||
| 16 | * Copyright remains Eric Young's, and as such any Copyright notices in | ||
| 17 | * the code are not to be removed. | ||
| 18 | * If this package is used in a product, Eric Young should be given attribution | ||
| 19 | * as the author of the parts of the library used. | ||
| 20 | * This can be in the form of a textual message at program startup or | ||
| 21 | * in documentation (online or textual) provided with the package. | ||
| 22 | * | ||
| 23 | * Redistribution and use in source and binary forms, with or without | ||
| 24 | * modification, are permitted provided that the following conditions | ||
| 25 | * are met: | ||
| 26 | * 1. Redistributions of source code must retain the copyright | ||
| 27 | * notice, this list of conditions and the following disclaimer. | ||
| 28 | * 2. Redistributions in binary form must reproduce the above copyright | ||
| 29 | * notice, this list of conditions and the following disclaimer in the | ||
| 30 | * documentation and/or other materials provided with the distribution. | ||
| 31 | * 3. All advertising materials mentioning features or use of this software | ||
| 32 | * must display the following acknowledgement: | ||
| 33 | * "This product includes cryptographic software written by | ||
| 34 | * Eric Young (eay@cryptsoft.com)" | ||
| 35 | * The word 'cryptographic' can be left out if the rouines from the library | ||
| 36 | * being used are not cryptographic related :-). | ||
| 37 | * 4. If you include any Windows specific code (or a derivative thereof) from | ||
| 38 | * the apps directory (application code) you must include an acknowledgement: | ||
| 39 | * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" | ||
| 40 | * | ||
| 41 | * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND | ||
| 42 | * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | ||
| 43 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE | ||
| 44 | * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE | ||
| 45 | * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL | ||
| 46 | * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS | ||
| 47 | * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | ||
| 48 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT | ||
| 49 | * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY | ||
| 50 | * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF | ||
| 51 | * SUCH DAMAGE. | ||
| 52 | * | ||
| 53 | * The licence and distribution terms for any publically available version or | ||
| 54 | * derivative of this code cannot be changed. i.e. this code cannot simply be | ||
| 55 | * copied and put under another distribution licence | ||
| 56 | * [including the GNU Public Licence.] | ||
| 57 | */ | ||
| 58 | |||
| 59 | #include <stdio.h> | ||
| 60 | #include "bn.h" | ||
| 61 | #include "asn1.h" | ||
| 62 | #include "dh.h" | ||
| 63 | #include "pem.h" | ||
| 64 | |||
| 65 | unsigned char data[]={0x97,0xF6,0x42,0x61,0xCA,0xB5,0x05,0xDD, | ||
| 66 | 0x28,0x28,0xE1,0x3F,0x1D,0x68,0xB6,0xD3, | ||
| 67 | 0xDB,0xD0,0xF3,0x13,0x04,0x7F,0x40,0xE8, | ||
| 68 | 0x56,0xDA,0x58,0xCB,0x13,0xB8,0xA1,0xBF, | ||
| 69 | 0x2B,0x78,0x3A,0x4C,0x6D,0x59,0xD5,0xF9, | ||
| 70 | 0x2A,0xFC,0x6C,0xFF,0x3D,0x69,0x3F,0x78, | ||
| 71 | 0xB2,0x3D,0x4F,0x31,0x60,0xA9,0x50,0x2E, | ||
| 72 | 0x3E,0xFA,0xF7,0xAB,0x5E,0x1A,0xD5,0xA6, | ||
| 73 | 0x5E,0x55,0x43,0x13,0x82,0x8D,0xA8,0x3B, | ||
| 74 | 0x9F,0xF2,0xD9,0x41,0xDE,0xE9,0x56,0x89, | ||
| 75 | 0xFA,0xDA,0xEA,0x09,0x36,0xAD,0xDF,0x19, | ||
| 76 | 0x71,0xFE,0x63,0x5B,0x20,0xAF,0x47,0x03, | ||
| 77 | 0x64,0x60,0x3C,0x2D,0xE0,0x59,0xF5,0x4B, | ||
| 78 | 0x65,0x0A,0xD8,0xFA,0x0C,0xF7,0x01,0x21, | ||
| 79 | 0xC7,0x47,0x99,0xD7,0x58,0x71,0x32,0xBE, | ||
| 80 | 0x9B,0x99,0x9B,0xB9,0xB7,0x87,0xE8,0xAB, | ||
| 81 | }; | ||
| 82 | |||
| 83 | main() | ||
| 84 | { | ||
| 85 | DH *dh; | ||
| 86 | |||
| 87 | dh=DH_new(); | ||
| 88 | dh->p=BN_bin2bn(data,sizeof(data),NULL); | ||
| 89 | dh->g=BN_new(); | ||
| 90 | BN_set_word(dh->g,2); | ||
| 91 | PEM_write_DHparams(stdout,dh); | ||
| 92 | } | ||
diff --git a/src/lib/libcrypto/dh/p192.c b/src/lib/libcrypto/dh/p192.c new file mode 100644 index 0000000000..881908169a --- /dev/null +++ b/src/lib/libcrypto/dh/p192.c | |||
| @@ -0,0 +1,80 @@ | |||
| 1 | /* crypto/dh/p192.c */ | ||
| 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | ||
| 3 | * All rights reserved. | ||
| 4 | * | ||
| 5 | * This package is an SSL implementation written | ||
| 6 | * by Eric Young (eay@cryptsoft.com). | ||
| 7 | * The implementation was written so as to conform with Netscapes SSL. | ||
| 8 | * | ||
| 9 | * This library is free for commercial and non-commercial use as long as | ||
| 10 | * the following conditions are aheared to. The following conditions | ||
| 11 | * apply to all code found in this distribution, be it the RC4, RSA, | ||
| 12 | * lhash, DES, etc., code; not just the SSL code. The SSL documentation | ||
| 13 | * included with this distribution is covered by the same copyright terms | ||
| 14 | * except that the holder is Tim Hudson (tjh@cryptsoft.com). | ||
| 15 | * | ||
| 16 | * Copyright remains Eric Young's, and as such any Copyright notices in | ||
| 17 | * the code are not to be removed. | ||
| 18 | * If this package is used in a product, Eric Young should be given attribution | ||
| 19 | * as the author of the parts of the library used. | ||
| 20 | * This can be in the form of a textual message at program startup or | ||
| 21 | * in documentation (online or textual) provided with the package. | ||
| 22 | * | ||
| 23 | * Redistribution and use in source and binary forms, with or without | ||
| 24 | * modification, are permitted provided that the following conditions | ||
| 25 | * are met: | ||
| 26 | * 1. Redistributions of source code must retain the copyright | ||
| 27 | * notice, this list of conditions and the following disclaimer. | ||
| 28 | * 2. Redistributions in binary form must reproduce the above copyright | ||
| 29 | * notice, this list of conditions and the following disclaimer in the | ||
| 30 | * documentation and/or other materials provided with the distribution. | ||
| 31 | * 3. All advertising materials mentioning features or use of this software | ||
| 32 | * must display the following acknowledgement: | ||
| 33 | * "This product includes cryptographic software written by | ||
| 34 | * Eric Young (eay@cryptsoft.com)" | ||
| 35 | * The word 'cryptographic' can be left out if the rouines from the library | ||
| 36 | * being used are not cryptographic related :-). | ||
| 37 | * 4. If you include any Windows specific code (or a derivative thereof) from | ||
| 38 | * the apps directory (application code) you must include an acknowledgement: | ||
| 39 | * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" | ||
| 40 | * | ||
| 41 | * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND | ||
| 42 | * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | ||
| 43 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE | ||
| 44 | * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE | ||
| 45 | * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL | ||
| 46 | * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS | ||
| 47 | * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | ||
| 48 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT | ||
| 49 | * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY | ||
| 50 | * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF | ||
| 51 | * SUCH DAMAGE. | ||
| 52 | * | ||
| 53 | * The licence and distribution terms for any publically available version or | ||
| 54 | * derivative of this code cannot be changed. i.e. this code cannot simply be | ||
| 55 | * copied and put under another distribution licence | ||
| 56 | * [including the GNU Public Licence.] | ||
| 57 | */ | ||
| 58 | |||
| 59 | #include <stdio.h> | ||
| 60 | #include "bn.h" | ||
| 61 | #include "asn1.h" | ||
| 62 | #include "dh.h" | ||
| 63 | #include "pem.h" | ||
| 64 | |||
| 65 | unsigned char data[]={ | ||
| 66 | 0xD4,0xA0,0xBA,0x02,0x50,0xB6,0xFD,0x2E, | ||
| 67 | 0xC6,0x26,0xE7,0xEF,0xD6,0x37,0xDF,0x76, | ||
| 68 | 0xC7,0x16,0xE2,0x2D,0x09,0x44,0xB8,0x8B, | ||
| 69 | }; | ||
| 70 | |||
| 71 | main() | ||
| 72 | { | ||
| 73 | DH *dh; | ||
| 74 | |||
| 75 | dh=DH_new(); | ||
| 76 | dh->p=BN_bin2bn(data,sizeof(data),NULL); | ||
| 77 | dh->g=BN_new(); | ||
| 78 | BN_set_word(dh->g,3); | ||
| 79 | PEM_write_DHparams(stdout,dh); | ||
| 80 | } | ||
diff --git a/src/lib/libcrypto/dh/p512.c b/src/lib/libcrypto/dh/p512.c new file mode 100644 index 0000000000..cc84e8e50e --- /dev/null +++ b/src/lib/libcrypto/dh/p512.c | |||
| @@ -0,0 +1,85 @@ | |||
| 1 | /* crypto/dh/p512.c */ | ||
| 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | ||
| 3 | * All rights reserved. | ||
| 4 | * | ||
| 5 | * This package is an SSL implementation written | ||
| 6 | * by Eric Young (eay@cryptsoft.com). | ||
| 7 | * The implementation was written so as to conform with Netscapes SSL. | ||
| 8 | * | ||
| 9 | * This library is free for commercial and non-commercial use as long as | ||
| 10 | * the following conditions are aheared to. The following conditions | ||
| 11 | * apply to all code found in this distribution, be it the RC4, RSA, | ||
| 12 | * lhash, DES, etc., code; not just the SSL code. The SSL documentation | ||
| 13 | * included with this distribution is covered by the same copyright terms | ||
| 14 | * except that the holder is Tim Hudson (tjh@cryptsoft.com). | ||
| 15 | * | ||
| 16 | * Copyright remains Eric Young's, and as such any Copyright notices in | ||
| 17 | * the code are not to be removed. | ||
| 18 | * If this package is used in a product, Eric Young should be given attribution | ||
| 19 | * as the author of the parts of the library used. | ||
| 20 | * This can be in the form of a textual message at program startup or | ||
| 21 | * in documentation (online or textual) provided with the package. | ||
| 22 | * | ||
| 23 | * Redistribution and use in source and binary forms, with or without | ||
| 24 | * modification, are permitted provided that the following conditions | ||
| 25 | * are met: | ||
| 26 | * 1. Redistributions of source code must retain the copyright | ||
| 27 | * notice, this list of conditions and the following disclaimer. | ||
| 28 | * 2. Redistributions in binary form must reproduce the above copyright | ||
| 29 | * notice, this list of conditions and the following disclaimer in the | ||
| 30 | * documentation and/or other materials provided with the distribution. | ||
| 31 | * 3. All advertising materials mentioning features or use of this software | ||
| 32 | * must display the following acknowledgement: | ||
| 33 | * "This product includes cryptographic software written by | ||
| 34 | * Eric Young (eay@cryptsoft.com)" | ||
| 35 | * The word 'cryptographic' can be left out if the rouines from the library | ||
| 36 | * being used are not cryptographic related :-). | ||
| 37 | * 4. If you include any Windows specific code (or a derivative thereof) from | ||
| 38 | * the apps directory (application code) you must include an acknowledgement: | ||
| 39 | * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" | ||
| 40 | * | ||
| 41 | * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND | ||
| 42 | * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | ||
| 43 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE | ||
| 44 | * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE | ||
| 45 | * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL | ||
| 46 | * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS | ||
| 47 | * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | ||
| 48 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT | ||
| 49 | * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY | ||
| 50 | * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF | ||
| 51 | * SUCH DAMAGE. | ||
| 52 | * | ||
| 53 | * The licence and distribution terms for any publically available version or | ||
| 54 | * derivative of this code cannot be changed. i.e. this code cannot simply be | ||
| 55 | * copied and put under another distribution licence | ||
| 56 | * [including the GNU Public Licence.] | ||
| 57 | */ | ||
| 58 | |||
| 59 | #include <stdio.h> | ||
| 60 | #include "bn.h" | ||
| 61 | #include "asn1.h" | ||
| 62 | #include "dh.h" | ||
| 63 | #include "pem.h" | ||
| 64 | |||
| 65 | unsigned char data[]={ | ||
| 66 | 0xDA,0x58,0x3C,0x16,0xD9,0x85,0x22,0x89, | ||
| 67 | 0xD0,0xE4,0xAF,0x75,0x6F,0x4C,0xCA,0x92, | ||
| 68 | 0xDD,0x4B,0xE5,0x33,0xB8,0x04,0xFB,0x0F, | ||
| 69 | 0xED,0x94,0xEF,0x9C,0x8A,0x44,0x03,0xED, | ||
| 70 | 0x57,0x46,0x50,0xD3,0x69,0x99,0xDB,0x29, | ||
| 71 | 0xD7,0x76,0x27,0x6B,0xA2,0xD3,0xD4,0x12, | ||
| 72 | 0xE2,0x18,0xF4,0xDD,0x1E,0x08,0x4C,0xF6, | ||
| 73 | 0xD8,0x00,0x3E,0x7C,0x47,0x74,0xE8,0x33, | ||
| 74 | }; | ||
| 75 | |||
| 76 | main() | ||
| 77 | { | ||
| 78 | DH *dh; | ||
| 79 | |||
| 80 | dh=DH_new(); | ||
| 81 | dh->p=BN_bin2bn(data,sizeof(data),NULL); | ||
| 82 | dh->g=BN_new(); | ||
| 83 | BN_set_word(dh->g,2); | ||
| 84 | PEM_write_DHparams(stdout,dh); | ||
| 85 | } | ||
