]> andersk Git - openssh.git/blame - dh.c
- (tim) [configure.ac] corrections to libedit tests. Report and patches
[openssh.git] / dh.c
CommitLineData
94ec8c6b 1/*
2 * Copyright (c) 2000 Niels Provos. All rights reserved.
3 *
4 * Redistribution and use in source and binary forms, with or without
5 * modification, are permitted provided that the following conditions
6 * are met:
7 * 1. Redistributions of source code must retain the above copyright
8 * notice, this list of conditions and the following disclaimer.
9 * 2. Redistributions in binary form must reproduce the above copyright
10 * notice, this list of conditions and the following disclaimer in the
11 * documentation and/or other materials provided with the distribution.
12 *
13 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
14 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
15 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
16 * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
17 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
18 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
19 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
20 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
21 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
22 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
23 */
24
25#include "includes.h"
0875a0a2 26RCSID("$OpenBSD: dh.c,v 1.31 2004/08/04 10:37:52 djm Exp $");
94ec8c6b 27
28#include "xmalloc.h"
29
30#include <openssl/bn.h>
31#include <openssl/dh.h>
32#include <openssl/evp.h>
33
94ec8c6b 34#include "buffer.h"
42f11eb2 35#include "cipher.h"
94ec8c6b 36#include "kex.h"
37#include "dh.h"
42f11eb2 38#include "pathnames.h"
39#include "log.h"
40#include "misc.h"
94ec8c6b 41
396c147e 42static int
94ec8c6b 43parse_prime(int linenum, char *line, struct dhgroup *dhg)
44{
45 char *cp, *arg;
46 char *strsize, *gen, *prime;
47
48 cp = line;
49 arg = strdelim(&cp);
50 /* Ignore leading whitespace */
51 if (*arg == '\0')
52 arg = strdelim(&cp);
f11fe301 53 if (!arg || !*arg || *arg == '#')
94ec8c6b 54 return 0;
55
56 /* time */
57 if (cp == NULL || *arg == '\0')
58 goto fail;
59 arg = strsep(&cp, " "); /* type */
60 if (cp == NULL || *arg == '\0')
61 goto fail;
62 arg = strsep(&cp, " "); /* tests */
63 if (cp == NULL || *arg == '\0')
64 goto fail;
65 arg = strsep(&cp, " "); /* tries */
66 if (cp == NULL || *arg == '\0')
67 goto fail;
68 strsize = strsep(&cp, " "); /* size */
69 if (cp == NULL || *strsize == '\0' ||
70 (dhg->size = atoi(strsize)) == 0)
71 goto fail;
db1cd2f3 72 /* The whole group is one bit larger */
73 dhg->size++;
94ec8c6b 74 gen = strsep(&cp, " "); /* gen */
75 if (cp == NULL || *gen == '\0')
76 goto fail;
77 prime = strsep(&cp, " "); /* prime */
78 if (cp != NULL || *prime == '\0')
79 goto fail;
80
b775c6f2 81 if ((dhg->g = BN_new()) == NULL)
82 fatal("parse_prime: BN_new failed");
83 if ((dhg->p = BN_new()) == NULL)
84 fatal("parse_prime: BN_new failed");
ec1f12d3 85 if (BN_hex2bn(&dhg->g, gen) == 0)
c8682232 86 goto failclean;
87
ec1f12d3 88 if (BN_hex2bn(&dhg->p, prime) == 0)
c8682232 89 goto failclean;
90
91 if (BN_num_bits(dhg->p) != dhg->size)
92 goto failclean;
94ec8c6b 93
8b0a55ac 94 if (BN_is_zero(dhg->g) || BN_is_one(dhg->g))
95 goto failclean;
96
94ec8c6b 97 return (1);
c8682232 98
99 failclean:
108d362e 100 BN_clear_free(dhg->g);
101 BN_clear_free(dhg->p);
94ec8c6b 102 fail:
54b974dc 103 error("Bad prime description in line %d", linenum);
94ec8c6b 104 return (0);
105}
106
107DH *
db1cd2f3 108choose_dh(int min, int wantbits, int max)
94ec8c6b 109{
110 FILE *f;
cd744742 111 char line[4096];
94ec8c6b 112 int best, bestcount, which;
113 int linenum;
114 struct dhgroup dhg;
115
e2854364 116 if ((f = fopen(_PATH_DH_MODULI, "r")) == NULL &&
117 (f = fopen(_PATH_DH_PRIMES, "r")) == NULL) {
41e5bd9a 118 logit("WARNING: %s does not exist, using fixed modulus",
119 _PATH_DH_MODULI);
120 return (dh_new_group14());
94ec8c6b 121 }
122
123 linenum = 0;
124 best = bestcount = 0;
125 while (fgets(line, sizeof(line), f)) {
126 linenum++;
127 if (!parse_prime(linenum, line, &dhg))
128 continue;
108d362e 129 BN_clear_free(dhg.g);
130 BN_clear_free(dhg.p);
94ec8c6b 131
db1cd2f3 132 if (dhg.size > max || dhg.size < min)
133 continue;
134
135 if ((dhg.size > wantbits && dhg.size < best) ||
136 (dhg.size > best && best < wantbits)) {
94ec8c6b 137 best = dhg.size;
138 bestcount = 0;
139 }
140 if (dhg.size == best)
141 bestcount++;
142 }
826676b3 143 rewind(f);
94ec8c6b 144
145 if (bestcount == 0) {
826676b3 146 fclose(f);
bbe88b6d 147 logit("WARNING: no suitable primes in %s", _PATH_DH_PRIMES);
0875a0a2 148 return (dh_new_group14());
94ec8c6b 149 }
150
94ec8c6b 151 linenum = 0;
152 which = arc4random() % bestcount;
153 while (fgets(line, sizeof(line), f)) {
154 if (!parse_prime(linenum, line, &dhg))
155 continue;
a7ca6275 156 if ((dhg.size > max || dhg.size < min) ||
157 dhg.size != best ||
158 linenum++ != which) {
108d362e 159 BN_clear_free(dhg.g);
160 BN_clear_free(dhg.p);
94ec8c6b 161 continue;
162 }
163 break;
164 }
165 fclose(f);
a7ca6275 166 if (linenum != which+1)
167 fatal("WARNING: line %d disappeared in %s, giving up",
168 which, _PATH_DH_PRIMES);
94ec8c6b 169
170 return (dh_new_group(dhg.g, dhg.p));
171}
03b8f8be 172
41e5bd9a 173/* diffie-hellman-groupN-sha1 */
03b8f8be 174
175int
176dh_pub_is_valid(DH *dh, BIGNUM *dh_pub)
177{
178 int i;
179 int n = BN_num_bits(dh_pub);
180 int bits_set = 0;
181
182 if (dh_pub->neg) {
bbe88b6d 183 logit("invalid public DH value: negativ");
03b8f8be 184 return 0;
185 }
186 for (i = 0; i <= n; i++)
187 if (BN_is_bit_set(dh_pub, i))
188 bits_set++;
35efb24c 189 debug2("bits set: %d/%d", bits_set, BN_num_bits(dh->p));
03b8f8be 190
191 /* if g==2 and bits_set==1 then computing log_g(dh_pub) is trivial */
192 if (bits_set > 1 && (BN_cmp(dh_pub, dh->p) == -1))
193 return 1;
bbe88b6d 194 logit("invalid public DH value (%d/%d)", bits_set, BN_num_bits(dh->p));
03b8f8be 195 return 0;
196}
197
198void
199dh_gen_key(DH *dh, int need)
200{
e24bb7d5 201 int i, bits_set, tries = 0;
03b8f8be 202
203 if (dh->p == NULL)
204 fatal("dh_gen_key: dh->p == NULL");
bb92e5cc 205 if (need > INT_MAX / 2 || 2 * need >= BN_num_bits(dh->p))
03b8f8be 206 fatal("dh_gen_key: group too small: %d (2*need %d)",
207 BN_num_bits(dh->p), 2*need);
208 do {
209 if (dh->priv_key != NULL)
108d362e 210 BN_clear_free(dh->priv_key);
b775c6f2 211 if ((dh->priv_key = BN_new()) == NULL)
03b8f8be 212 fatal("dh_gen_key: BN_new failed");
213 /* generate a 2*need bits random private exponent */
83a9aa63 214 if (!BN_rand(dh->priv_key, 2*need, 0, 0))
215 fatal("dh_gen_key: BN_rand failed");
03b8f8be 216 if (DH_generate_key(dh) == 0)
217 fatal("DH_generate_key");
e24bb7d5 218 for (i = 0, bits_set = 0; i <= BN_num_bits(dh->priv_key); i++)
03b8f8be 219 if (BN_is_bit_set(dh->priv_key, i))
220 bits_set++;
35efb24c 221 debug2("dh_gen_key: priv key bits set: %d/%d",
03b8f8be 222 bits_set, BN_num_bits(dh->priv_key));
223 if (tries++ > 10)
224 fatal("dh_gen_key: too many bad keys: giving up");
225 } while (!dh_pub_is_valid(dh, dh->pub_key));
226}
227
228DH *
229dh_new_group_asc(const char *gen, const char *modulus)
230{
231 DH *dh;
03b8f8be 232
b775c6f2 233 if ((dh = DH_new()) == NULL)
234 fatal("dh_new_group_asc: DH_new");
03b8f8be 235
ec1f12d3 236 if (BN_hex2bn(&dh->p, modulus) == 0)
03b8f8be 237 fatal("BN_hex2bn p");
ec1f12d3 238 if (BN_hex2bn(&dh->g, gen) == 0)
03b8f8be 239 fatal("BN_hex2bn g");
240
241 return (dh);
242}
243
244/*
245 * This just returns the group, we still need to generate the exchange
246 * value.
247 */
248
249DH *
250dh_new_group(BIGNUM *gen, BIGNUM *modulus)
251{
252 DH *dh;
253
b775c6f2 254 if ((dh = DH_new()) == NULL)
255 fatal("dh_new_group: DH_new");
03b8f8be 256 dh->p = modulus;
257 dh->g = gen;
258
259 return (dh);
260}
261
262DH *
263dh_new_group1(void)
264{
265 static char *gen = "2", *group1 =
266 "FFFFFFFF" "FFFFFFFF" "C90FDAA2" "2168C234" "C4C6628B" "80DC1CD1"
267 "29024E08" "8A67CC74" "020BBEA6" "3B139B22" "514A0879" "8E3404DD"
268 "EF9519B3" "CD3A431B" "302B0A6D" "F25F1437" "4FE1356D" "6D51C245"
269 "E485B576" "625E7EC6" "F44C42E9" "A637ED6B" "0BFF5CB6" "F406B7ED"
270 "EE386BFB" "5A899FA5" "AE9F2411" "7C4B1FE6" "49286651" "ECE65381"
271 "FFFFFFFF" "FFFFFFFF";
272
273 return (dh_new_group_asc(gen, group1));
274}
a5c9ffdb 275
41e5bd9a 276DH *
277dh_new_group14(void)
278{
279 static char *gen = "2", *group14 =
280 "FFFFFFFF" "FFFFFFFF" "C90FDAA2" "2168C234" "C4C6628B" "80DC1CD1"
281 "29024E08" "8A67CC74" "020BBEA6" "3B139B22" "514A0879" "8E3404DD"
282 "EF9519B3" "CD3A431B" "302B0A6D" "F25F1437" "4FE1356D" "6D51C245"
283 "E485B576" "625E7EC6" "F44C42E9" "A637ED6B" "0BFF5CB6" "F406B7ED"
284 "EE386BFB" "5A899FA5" "AE9F2411" "7C4B1FE6" "49286651" "ECE45B3D"
285 "C2007CB8" "A163BF05" "98DA4836" "1C55D39A" "69163FA8" "FD24CF5F"
286 "83655D23" "DCA3AD96" "1C62F356" "208552BB" "9ED52907" "7096966D"
287 "670C354E" "4ABC9804" "F1746C08" "CA18217C" "32905E46" "2E36CE3B"
288 "E39E772C" "180E8603" "9B2783A2" "EC07A28F" "B5C55DF0" "6F4C52C9"
289 "DE2BCBF6" "95581718" "3995497C" "EA956AE5" "15D22618" "98FA0510"
290 "15728E5A" "8AACAA68" "FFFFFFFF" "FFFFFFFF";
291
292 return (dh_new_group_asc(gen, group14));
293}
294
a5c9ffdb 295/*
296 * Estimates the group order for a Diffie-Hellman group that has an
297 * attack complexity approximately the same as O(2**bits). Estimate
298 * with: O(exp(1.9223 * (ln q)^(1/3) (ln ln q)^(2/3)))
299 */
300
301int
302dh_estimate(int bits)
303{
304
b3c35b71 305 if (bits <= 128)
a5c9ffdb 306 return (1024); /* O(2**86) */
b3c35b71 307 if (bits <= 192)
a5c9ffdb 308 return (2048); /* O(2**116) */
309 return (4096); /* O(2**156) */
310}
This page took 0.456453 seconds and 5 git commands to generate.