summaryrefslogtreecommitdiff
path: root/src/lib/libcrypto/ecdh/ech_key.c
diff options
context:
space:
mode:
authorjsing <>2015-09-13 12:27:14 +0000
committerjsing <>2015-09-13 12:27:14 +0000
commitc21ecd46217786d28326bb8c5a074d9b95226b23 (patch)
treeadf112fcadab27caee1a5714876f39a3c70a2583 /src/lib/libcrypto/ecdh/ech_key.c
parenta9bac59217249b4a262676ea40d8eb2e2535cdbd (diff)
downloadopenbsd-c21ecd46217786d28326bb8c5a074d9b95226b23.tar.gz
openbsd-c21ecd46217786d28326bb8c5a074d9b95226b23.tar.bz2
openbsd-c21ecd46217786d28326bb8c5a074d9b95226b23.zip
Merge ech_ossl.c into ech_key.c - not much point having one file with a
four line function and a tonne of license text. ok beck@
Diffstat (limited to 'src/lib/libcrypto/ecdh/ech_key.c')
-rw-r--r--src/lib/libcrypto/ecdh/ech_key.c147
1 files changed, 146 insertions, 1 deletions
diff --git a/src/lib/libcrypto/ecdh/ech_key.c b/src/lib/libcrypto/ecdh/ech_key.c
index 9a8091fe19..7202c497cf 100644
--- a/src/lib/libcrypto/ecdh/ech_key.c
+++ b/src/lib/libcrypto/ecdh/ech_key.c
@@ -1,4 +1,4 @@
1/* $OpenBSD: ech_key.c,v 1.3 2015/09/13 10:46:20 jsing Exp $ */ 1/* $OpenBSD: ech_key.c,v 1.4 2015/09/13 12:27:14 jsing Exp $ */
2/* ==================================================================== 2/* ====================================================================
3 * Copyright 2002 Sun Microsystems, Inc. ALL RIGHTS RESERVED. 3 * Copyright 2002 Sun Microsystems, Inc. ALL RIGHTS RESERVED.
4 * 4 *
@@ -67,8 +67,153 @@
67 * 67 *
68 */ 68 */
69 69
70#include <limits.h>
71#include <string.h>
72
73#include <openssl/opensslconf.h>
74
75#include <openssl/bn.h>
76#include <openssl/err.h>
77#include <openssl/obj_mac.h>
78#include <openssl/sha.h>
79
70#include "ech_locl.h" 80#include "ech_locl.h"
71 81
82static int ecdh_compute_key(void *out, size_t len, const EC_POINT *pub_key,
83 EC_KEY *ecdh,
84 void *(*KDF)(const void *in, size_t inlen, void *out, size_t *outlen));
85
86/*
87 * This implementation is based on the following primitives in the IEEE 1363
88 * standard:
89 * - ECKAS-DH1
90 * - ECSVDP-DH
91 * Finally an optional KDF is applied.
92 */
93static int
94ecdh_compute_key(void *out, size_t outlen, const EC_POINT *pub_key,
95 EC_KEY *ecdh,
96 void *(*KDF)(const void *in, size_t inlen, void *out, size_t *outlen))
97{
98 BN_CTX *ctx;
99 EC_POINT *tmp = NULL;
100 BIGNUM *x = NULL, *y = NULL;
101 const BIGNUM *priv_key;
102 const EC_GROUP* group;
103 int ret = -1;
104 size_t buflen, len;
105 unsigned char *buf = NULL;
106
107 if (outlen > INT_MAX) {
108 /* Sort of, anyway. */
109 ECDHerr(ECDH_F_ECDH_COMPUTE_KEY, ERR_R_MALLOC_FAILURE);
110 return -1;
111 }
112
113 if ((ctx = BN_CTX_new()) == NULL)
114 goto err;
115 BN_CTX_start(ctx);
116 if ((x = BN_CTX_get(ctx)) == NULL)
117 goto err;
118 if ((y = BN_CTX_get(ctx)) == NULL)
119 goto err;
120
121 priv_key = EC_KEY_get0_private_key(ecdh);
122 if (priv_key == NULL) {
123 ECDHerr(ECDH_F_ECDH_COMPUTE_KEY, ECDH_R_NO_PRIVATE_VALUE);
124 goto err;
125 }
126
127 group = EC_KEY_get0_group(ecdh);
128 if ((tmp = EC_POINT_new(group)) == NULL) {
129 ECDHerr(ECDH_F_ECDH_COMPUTE_KEY, ERR_R_MALLOC_FAILURE);
130 goto err;
131 }
132
133 if (!EC_POINT_mul(group, tmp, NULL, pub_key, priv_key, ctx)) {
134 ECDHerr(ECDH_F_ECDH_COMPUTE_KEY,
135 ECDH_R_POINT_ARITHMETIC_FAILURE);
136 goto err;
137 }
138
139 if (EC_METHOD_get_field_type(EC_GROUP_method_of(group)) ==
140 NID_X9_62_prime_field) {
141 if (!EC_POINT_get_affine_coordinates_GFp(group, tmp, x, y,
142 ctx)) {
143 ECDHerr(ECDH_F_ECDH_COMPUTE_KEY,
144 ECDH_R_POINT_ARITHMETIC_FAILURE);
145 goto err;
146 }
147 }
148#ifndef OPENSSL_NO_EC2M
149 else {
150 if (!EC_POINT_get_affine_coordinates_GF2m(group, tmp, x, y,
151 ctx)) {
152 ECDHerr(ECDH_F_ECDH_COMPUTE_KEY,
153 ECDH_R_POINT_ARITHMETIC_FAILURE);
154 goto err;
155 }
156 }
157#endif
158
159 buflen = ECDH_size(ecdh);
160 len = BN_num_bytes(x);
161 if (len > buflen) {
162 ECDHerr(ECDH_F_ECDH_COMPUTE_KEY, ERR_R_INTERNAL_ERROR);
163 goto err;
164 }
165 if (outlen < buflen) {
166 /* The resulting key would be truncated. */
167 ECDHerr(ECDH_F_ECDH_COMPUTE_KEY, ECDH_R_KEY_TRUNCATION);
168 goto err;
169 }
170 if ((buf = malloc(buflen)) == NULL) {
171 ECDHerr(ECDH_F_ECDH_COMPUTE_KEY, ERR_R_MALLOC_FAILURE);
172 goto err;
173 }
174
175 memset(buf, 0, buflen - len);
176 if (len != (size_t)BN_bn2bin(x, buf + buflen - len)) {
177 ECDHerr(ECDH_F_ECDH_COMPUTE_KEY, ERR_R_BN_LIB);
178 goto err;
179 }
180
181 if (KDF != 0) {
182 if (KDF(buf, buflen, out, &outlen) == NULL) {
183 ECDHerr(ECDH_F_ECDH_COMPUTE_KEY, ECDH_R_KDF_FAILED);
184 goto err;
185 }
186 ret = outlen;
187 } else {
188 /* No KDF, just copy as much as we can and zero the rest. */
189 if (outlen > buflen) {
190 memset(out + buflen, 0, outlen - buflen);
191 outlen = buflen;
192 }
193 memcpy(out, buf, outlen);
194 ret = outlen;
195 }
196
197err:
198 EC_POINT_free(tmp);
199 if (ctx)
200 BN_CTX_end(ctx);
201 BN_CTX_free(ctx);
202 free(buf);
203 return (ret);
204}
205
206static ECDH_METHOD openssl_ecdh_meth = {
207 .name = "OpenSSL ECDH method",
208 .compute_key = ecdh_compute_key
209};
210
211const ECDH_METHOD *
212ECDH_OpenSSL(void)
213{
214 return &openssl_ecdh_meth;
215}
216
72int 217int
73ECDH_compute_key(void *out, size_t outlen, const EC_POINT *pub_key, 218ECDH_compute_key(void *out, size_t outlen, const EC_POINT *pub_key,
74 EC_KEY *eckey, 219 EC_KEY *eckey,