2 * Portions Copyright (C) 2004-2007 Internet Systems Consortium, Inc. ("ISC")
3 * Portions Copyright (C) 1999-2002 Internet Software Consortium.
4 * Portions Copyright (C) 1995-2000 by Network Associates, Inc.
6 * Permission to use, copy, modify, and/or distribute this software for any
7 * purpose with or without fee is hereby granted, provided that the above
8 * copyright notice and this permission notice appear in all copies.
10 * THE SOFTWARE IS PROVIDED "AS IS" AND ISC AND NETWORK ASSOCIATES DISCLAIMS
11 * ALL WARRANTIES WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED
12 * WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL ISC BE LIABLE
13 * FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
14 * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
15 * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR
16 * IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
20 * Principal Author: Brian Wellington
21 * $Id: openssldh_link.c,v 1.1.6.10 2007/08/28 07:20:04 tbox Exp $
31 #include <isc/string.h>
34 #include <dst/result.h>
36 #include "dst_internal.h"
37 #include "dst_openssl.h"
38 #include "dst_parse.h"
40 #include <openssl/dh.h>
42 #define PRIME768 "FFFFFFFFFFFFFFFFC90FDAA22168C234C4C6628B80DC1CD129024E088" \
43 "A67CC74020BBEA63B139B22514A08798E3404DDEF9519B3CD3A431B302B0A6DF25" \
44 "F14374FE1356D6D51C245E485B576625E7EC6F44C42E9A63A3620FFFFFFFFFFFFFFFF"
46 #define PRIME1024 "FFFFFFFFFFFFFFFFC90FDAA22168C234C4C6628B80DC1CD129024E08" \
47 "8A67CC74020BBEA63B139B22514A08798E3404DDEF9519B3CD3A431B302B0A6DF2" \
48 "5F14374FE1356D6D51C245E485B576625E7EC6F44C42E9A637ED6B0BFF5CB6F406" \
49 "B7EDEE386BFB5A899FA5AE9F24117C4B1FE649286651ECE65381FFFFFFFFFFFFFFFF"
51 #define PRIME1536 "FFFFFFFFFFFFFFFFC90FDAA22168C234C4C6628B80DC1CD1" \
52 "29024E088A67CC74020BBEA63B139B22514A08798E3404DD" \
53 "EF9519B3CD3A431B302B0A6DF25F14374FE1356D6D51C245" \
54 "E485B576625E7EC6F44C42E9A637ED6B0BFF5CB6F406B7ED" \
55 "EE386BFB5A899FA5AE9F24117C4B1FE649286651ECE45B3D" \
56 "C2007CB8A163BF0598DA48361C55D39A69163FA8FD24CF5F" \
57 "83655D23DCA3AD961C62F356208552BB9ED529077096966D" \
58 "670C354E4ABC9804F1746C08CA237327FFFFFFFFFFFFFFFF"
61 static isc_result_t openssldh_todns(const dst_key_t *key, isc_buffer_t *data);
63 static BIGNUM bn2, bn768, bn1024, bn1536;
66 openssldh_computesecret(const dst_key_t *pub, const dst_key_t *priv,
74 REQUIRE(pub->opaque != NULL);
75 REQUIRE(priv->opaque != NULL);
77 dhpub = (DH *) pub->opaque;
78 dhpriv = (DH *) priv->opaque;
80 len = DH_size(dhpriv);
81 isc_buffer_availableregion(secret, &r);
83 return (ISC_R_NOSPACE);
84 ret = DH_compute_key(r.base, dhpub->pub_key, dhpriv);
86 return (dst__openssl_toresult(DST_R_COMPUTESECRETFAILURE));
87 isc_buffer_add(secret, len);
88 return (ISC_R_SUCCESS);
92 openssldh_compare(const dst_key_t *key1, const dst_key_t *key2) {
96 dh1 = (DH *) key1->opaque;
97 dh2 = (DH *) key2->opaque;
99 if (dh1 == NULL && dh2 == NULL)
101 else if (dh1 == NULL || dh2 == NULL)
104 status = BN_cmp(dh1->p, dh2->p) ||
105 BN_cmp(dh1->g, dh2->g) ||
106 BN_cmp(dh1->pub_key, dh2->pub_key);
111 if (dh1->priv_key != NULL || dh2->priv_key != NULL) {
112 if (dh1->priv_key == NULL || dh2->priv_key == NULL)
114 if (BN_cmp(dh1->priv_key, dh2->priv_key) != 0)
121 openssldh_paramcompare(const dst_key_t *key1, const dst_key_t *key2) {
125 dh1 = (DH *) key1->opaque;
126 dh2 = (DH *) key2->opaque;
128 if (dh1 == NULL && dh2 == NULL)
130 else if (dh1 == NULL || dh2 == NULL)
133 status = BN_cmp(dh1->p, dh2->p) ||
134 BN_cmp(dh1->g, dh2->g);
142 openssldh_generate(dst_key_t *key, int generator) {
143 #if OPENSSL_VERSION_NUMBER > 0x00908000L
148 if (generator == 0) {
149 if (key->key_size == 768 ||
150 key->key_size == 1024 ||
151 key->key_size == 1536)
155 return (dst__openssl_toresult(ISC_R_NOMEMORY));
156 if (key->key_size == 768)
158 else if (key->key_size == 1024)
167 if (generator != 0) {
168 #if OPENSSL_VERSION_NUMBER > 0x00908000L
171 return (dst__openssl_toresult(DST_R_OPENSSLFAILURE));
173 BN_GENCB_set_old(&cb, NULL, NULL);
175 if (!DH_generate_parameters_ex(dh, key->key_size, generator,
178 return (dst__openssl_toresult(DST_R_OPENSSLFAILURE));
181 dh = DH_generate_parameters(key->key_size, generator,
187 return (dst__openssl_toresult(DST_R_OPENSSLFAILURE));
189 if (DH_generate_key(dh) == 0) {
191 return (dst__openssl_toresult(DST_R_OPENSSLFAILURE));
193 dh->flags &= ~DH_FLAG_CACHE_MONT_P;
197 return (ISC_R_SUCCESS);
201 openssldh_isprivate(const dst_key_t *key) {
202 DH *dh = (DH *) key->opaque;
203 return (ISC_TF(dh != NULL && dh->priv_key != NULL));
207 openssldh_destroy(dst_key_t *key) {
208 DH *dh = key->opaque;
213 if (dh->p == &bn768 || dh->p == &bn1024 || dh->p == &bn1536)
222 uint16_toregion(isc_uint16_t val, isc_region_t *region) {
223 *region->base++ = (val & 0xff00) >> 8;
224 *region->base++ = (val & 0x00ff);
228 uint16_fromregion(isc_region_t *region) {
230 unsigned char *cp = region->base;
232 val = ((unsigned int)(cp[0])) << 8;
233 val |= ((unsigned int)(cp[1]));
240 openssldh_todns(const dst_key_t *key, isc_buffer_t *data) {
243 isc_uint16_t dnslen, plen, glen, publen;
245 REQUIRE(key->opaque != NULL);
247 dh = (DH *) key->opaque;
249 isc_buffer_availableregion(data, &r);
252 (dh->p == &bn768 || dh->p == &bn1024 || dh->p == &bn1536)) {
257 plen = BN_num_bytes(dh->p);
258 glen = BN_num_bytes(dh->g);
260 publen = BN_num_bytes(dh->pub_key);
261 dnslen = plen + glen + publen + 6;
262 if (r.length < (unsigned int) dnslen)
263 return (ISC_R_NOSPACE);
265 uint16_toregion(plen, &r);
269 else if (dh->p == &bn1024)
275 BN_bn2bin(dh->p, r.base);
278 uint16_toregion(glen, &r);
280 BN_bn2bin(dh->g, r.base);
283 uint16_toregion(publen, &r);
284 BN_bn2bin(dh->pub_key, r.base);
287 isc_buffer_add(data, dnslen);
289 return (ISC_R_SUCCESS);
293 openssldh_fromdns(dst_key_t *key, isc_buffer_t *data) {
296 isc_uint16_t plen, glen, publen;
299 isc_buffer_remainingregion(data, &r);
301 return (ISC_R_SUCCESS);
305 return (dst__openssl_toresult(ISC_R_NOMEMORY));
306 dh->flags &= ~DH_FLAG_CACHE_MONT_P;
309 * Read the prime length. 1 & 2 are table entries, > 16 means a
310 * prime follows, otherwise an error.
314 return (DST_R_INVALIDPUBLICKEY);
316 plen = uint16_fromregion(&r);
317 if (plen < 16 && plen != 1 && plen != 2) {
319 return (DST_R_INVALIDPUBLICKEY);
321 if (r.length < plen) {
323 return (DST_R_INVALIDPUBLICKEY);
325 if (plen == 1 || plen == 2) {
329 special = uint16_fromregion(&r);
342 return (DST_R_INVALIDPUBLICKEY);
346 dh->p = BN_bin2bn(r.base, plen, NULL);
351 * Read the generator length. This should be 0 if the prime was
352 * special, but it might not be. If it's 0 and the prime is not
353 * special, we have a problem.
357 return (DST_R_INVALIDPUBLICKEY);
359 glen = uint16_fromregion(&r);
360 if (r.length < glen) {
362 return (DST_R_INVALIDPUBLICKEY);
368 dh->g = BN_bin2bn(r.base, glen, NULL);
369 if (BN_cmp(dh->g, &bn2) == 0) {
375 return (DST_R_INVALIDPUBLICKEY);
382 return (DST_R_INVALIDPUBLICKEY);
384 dh->g = BN_bin2bn(r.base, glen, NULL);
390 return (DST_R_INVALIDPUBLICKEY);
392 publen = uint16_fromregion(&r);
393 if (r.length < publen) {
395 return (DST_R_INVALIDPUBLICKEY);
397 dh->pub_key = BN_bin2bn(r.base, publen, NULL);
400 key->key_size = BN_num_bits(dh->p);
402 isc_buffer_forward(data, plen + glen + publen + 6);
404 key->opaque = (void *) dh;
406 return (ISC_R_SUCCESS);
410 openssldh_tofile(const dst_key_t *key, const char *directory) {
414 unsigned char *bufs[4];
417 if (key->opaque == NULL)
418 return (DST_R_NULLKEY);
420 dh = (DH *) key->opaque;
422 for (i = 0; i < 4; i++) {
423 bufs[i] = isc_mem_get(key->mctx, BN_num_bytes(dh->p));
424 if (bufs[i] == NULL) {
425 result = ISC_R_NOMEMORY;
432 priv.elements[i].tag = TAG_DH_PRIME;
433 priv.elements[i].length = BN_num_bytes(dh->p);
434 BN_bn2bin(dh->p, bufs[i]);
435 priv.elements[i].data = bufs[i];
438 priv.elements[i].tag = TAG_DH_GENERATOR;
439 priv.elements[i].length = BN_num_bytes(dh->g);
440 BN_bn2bin(dh->g, bufs[i]);
441 priv.elements[i].data = bufs[i];
444 priv.elements[i].tag = TAG_DH_PRIVATE;
445 priv.elements[i].length = BN_num_bytes(dh->priv_key);
446 BN_bn2bin(dh->priv_key, bufs[i]);
447 priv.elements[i].data = bufs[i];
450 priv.elements[i].tag = TAG_DH_PUBLIC;
451 priv.elements[i].length = BN_num_bytes(dh->pub_key);
452 BN_bn2bin(dh->pub_key, bufs[i]);
453 priv.elements[i].data = bufs[i];
457 result = dst__privstruct_writefile(key, &priv, directory);
459 for (i = 0; i < 4; i++) {
462 isc_mem_put(key->mctx, bufs[i], BN_num_bytes(dh->p));
468 openssldh_parse(dst_key_t *key, isc_lex_t *lexer) {
474 #define DST_RET(a) {ret = a; goto err;}
478 /* read private key file */
479 ret = dst__privstruct_parse(key, DST_ALG_DH, lexer, mctx, &priv);
480 if (ret != ISC_R_SUCCESS)
485 DST_RET(ISC_R_NOMEMORY);
486 dh->flags &= ~DH_FLAG_CACHE_MONT_P;
489 for (i = 0; i < priv.nelements; i++) {
491 bn = BN_bin2bn(priv.elements[i].data,
492 priv.elements[i].length, NULL);
494 DST_RET(ISC_R_NOMEMORY);
496 switch (priv.elements[i].tag) {
500 case TAG_DH_GENERATOR:
511 dst__privstruct_free(&priv, mctx);
513 key->key_size = BN_num_bits(dh->p);
515 if ((key->key_size == 768 ||
516 key->key_size == 1024 ||
517 key->key_size == 1536) &&
518 BN_cmp(dh->g, &bn2) == 0)
520 if (key->key_size == 768 && BN_cmp(dh->p, &bn768) == 0) {
525 } else if (key->key_size == 1024 &&
526 BN_cmp(dh->p, &bn1024) == 0) {
531 } else if (key->key_size == 1536 &&
532 BN_cmp(dh->p, &bn1536) == 0) {
540 return (ISC_R_SUCCESS);
543 openssldh_destroy(key);
544 dst__privstruct_free(&priv, mctx);
545 memset(&priv, 0, sizeof(priv));
550 BN_fromhex(BIGNUM *b, const char *str) {
551 static const char hexdigits[] = "0123456789abcdef";
552 unsigned char data[512];
556 RUNTIME_CHECK(strlen(str) < 1024U && strlen(str) % 2 == 0U);
557 for (i = 0; i < strlen(str); i += 2) {
559 unsigned int high, low;
561 s = strchr(hexdigits, tolower((unsigned char)str[i]));
562 RUNTIME_CHECK(s != NULL);
563 high = s - hexdigits;
565 s = strchr(hexdigits, tolower((unsigned char)str[i + 1]));
566 RUNTIME_CHECK(s != NULL);
569 data[i/2] = (unsigned char)((high << 4) + low);
571 out = BN_bin2bn(data, strlen(str)/2, b);
572 RUNTIME_CHECK(out != NULL);
576 openssldh_cleanup(void) {
583 static dst_func_t openssldh_functions = {
584 NULL, /*%< createctx */
585 NULL, /*%< destroyctx */
586 NULL, /*%< adddata */
587 NULL, /*%< openssldh_sign */
588 NULL, /*%< openssldh_verify */
589 openssldh_computesecret,
591 openssldh_paramcompare,
603 dst__openssldh_init(dst_func_t **funcp) {
604 REQUIRE(funcp != NULL);
605 if (*funcp == NULL) {
610 BN_set_word(&bn2, 2);
611 BN_fromhex(&bn768, PRIME768);
612 BN_fromhex(&bn1024, PRIME1024);
613 BN_fromhex(&bn1536, PRIME1536);
614 *funcp = &openssldh_functions;
616 return (ISC_R_SUCCESS);
621 #include <isc/util.h>
623 EMPTY_TRANSLATION_UNIT