diff options
author | Michael Brown <mcb30@ipxe.org> | 2022-10-04 15:03:28 +0100 |
---|---|---|
committer | Michael Brown <mcb30@ipxe.org> | 2022-10-11 14:33:19 +0100 |
commit | 18b861024ad542bd6df337dfb10a84e04173040f (patch) | |
tree | dcfb83b24ab695cadf7173ad2348e094c12c8df0 /src/crypto | |
parent | 007d3cb800fd0e4b01be8a76f0cce2c795cfc89b (diff) | |
download | ipxe-18b861024ad542bd6df337dfb10a84e04173040f.tar.gz |
[crypto] Add Ephemeral Diffie-Hellman key exchange algorithm
Add an implementation of the Ephemeral Diffie-Hellman key exchange
algorithm as defined in RFC2631, with test vectors taken from the NIST
Cryptographic Toolkit.
Signed-off-by: Michael Brown <mcb30@ipxe.org>
Diffstat (limited to 'src/crypto')
-rw-r--r-- | src/crypto/dhe.c | 133 |
1 files changed, 133 insertions, 0 deletions
diff --git a/src/crypto/dhe.c b/src/crypto/dhe.c new file mode 100644 index 000000000..2da107d24 --- /dev/null +++ b/src/crypto/dhe.c @@ -0,0 +1,133 @@ +/* + * Copyright (C) 2022 Michael Brown <mbrown@fensystems.co.uk>. + * + * This program is free software; you can redistribute it and/or + * modify it under the terms of the GNU General Public License as + * published by the Free Software Foundation; either version 2 of the + * License, or any later version. + * + * This program is distributed in the hope that it will be useful, but + * WITHOUT ANY WARRANTY; without even the implied warranty of + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU + * General Public License for more details. + * + * You should have received a copy of the GNU General Public License + * along with this program; if not, write to the Free Software + * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA + * 02110-1301, USA. + * + * You can also choose to distribute this program under the terms of + * the Unmodified Binary Distribution Licence (as given in the file + * COPYING.UBDL), provided that you have satisfied its requirements. + */ + +FILE_LICENCE ( GPL2_OR_LATER_OR_UBDL ); + +/** @file + * + * Ephemeral Diffie-Hellman key exchange + * + */ + +#include <stdint.h> +#include <stdlib.h> +#include <errno.h> +#include <ipxe/bigint.h> +#include <ipxe/dhe.h> + +/** + * Calculate Diffie-Hellman key + * + * @v modulus Prime modulus + * @v len Length of prime modulus + * @v generator Generator + * @v generator_len Length of generator + * @v partner Partner public key + * @v partner_len Length of partner public key + * @v private Private key + * @v private_len Length of private key + * @ret public Public key (length equal to prime modulus) + * @ret shared Shared secret (length equal to prime modulus) + * @ret rc Return status code + */ +int dhe_key ( const void *modulus, size_t len, const void *generator, + size_t generator_len, const void *partner, size_t partner_len, + const void *private, size_t private_len, void *public, + void *shared ) { + unsigned int size = bigint_required_size ( len ); + unsigned int private_size = bigint_required_size ( private_len ); + bigint_t ( size ) *mod; + bigint_t ( private_size ) *exp; + size_t tmp_len = bigint_mod_exp_tmp_len ( mod, exp ); + struct { + bigint_t ( size ) modulus; + bigint_t ( size ) generator; + bigint_t ( size ) partner; + bigint_t ( private_size ) private; + bigint_t ( size ) result; + uint8_t tmp[tmp_len]; + } __attribute__ (( packed )) *ctx; + int rc; + + DBGC2 ( modulus, "DHE %p modulus:\n", modulus ); + DBGC2_HDA ( modulus, 0, modulus, len ); + DBGC2 ( modulus, "DHE %p generator:\n", modulus ); + DBGC2_HDA ( modulus, 0, generator, generator_len ); + DBGC2 ( modulus, "DHE %p partner public key:\n", modulus ); + DBGC2_HDA ( modulus, 0, partner, partner_len ); + DBGC2 ( modulus, "DHE %p private key:\n", modulus ); + DBGC2_HDA ( modulus, 0, private, private_len ); + + /* Sanity checks */ + if ( generator_len > len ) { + DBGC ( modulus, "DHE %p overlength generator\n", modulus ); + rc = -EINVAL; + goto err_sanity; + } + if ( partner_len > len ) { + DBGC ( modulus, "DHE %p overlength partner public key\n", + modulus ); + rc = -EINVAL; + goto err_sanity; + } + if ( private_len > len ) { + DBGC ( modulus, "DHE %p overlength private key\n", modulus ); + rc = -EINVAL; + goto err_sanity; + } + + /* Allocate context */ + ctx = malloc ( sizeof ( *ctx ) ); + if ( ! ctx ) { + rc = -ENOMEM; + goto err_alloc; + } + + /* Initialise context */ + bigint_init ( &ctx->modulus, modulus, len ); + bigint_init ( &ctx->generator, generator, generator_len ); + bigint_init ( &ctx->partner, partner, partner_len ); + bigint_init ( &ctx->private, private, private_len ); + + /* Calculate public key */ + bigint_mod_exp ( &ctx->generator, &ctx->modulus, &ctx->private, + &ctx->result, ctx->tmp ); + bigint_done ( &ctx->result, public, len ); + DBGC2 ( modulus, "DHE %p public key:\n", modulus ); + DBGC2_HDA ( modulus, 0, public, len ); + + /* Calculate shared secret */ + bigint_mod_exp ( &ctx->partner, &ctx->modulus, &ctx->private, + &ctx->result, ctx->tmp ); + bigint_done ( &ctx->result, shared, len ); + DBGC2 ( modulus, "DHE %p shared secret:\n", modulus ); + DBGC2_HDA ( modulus, 0, shared, len ); + + /* Success */ + rc = 0; + + free ( ctx ); + err_alloc: + err_sanity: + return rc; +} |