blob: 34e70c94ff0883b85067e0e54b4102797c11c449 [file] [log] [blame]
Adam Langley95c29f32014-06-20 12:00:00 -07001/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
2 * All rights reserved.
3 *
4 * This package is an SSL implementation written
5 * by Eric Young (eay@cryptsoft.com).
6 * The implementation was written so as to conform with Netscapes SSL.
7 *
8 * This library is free for commercial and non-commercial use as long as
9 * the following conditions are aheared to. The following conditions
10 * apply to all code found in this distribution, be it the RC4, RSA,
11 * lhash, DES, etc., code; not just the SSL code. The SSL documentation
12 * included with this distribution is covered by the same copyright terms
13 * except that the holder is Tim Hudson (tjh@cryptsoft.com).
14 *
15 * Copyright remains Eric Young's, and as such any Copyright notices in
16 * the code are not to be removed.
17 * If this package is used in a product, Eric Young should be given attribution
18 * as the author of the parts of the library used.
19 * This can be in the form of a textual message at program startup or
20 * in documentation (online or textual) provided with the package.
21 *
22 * Redistribution and use in source and binary forms, with or without
23 * modification, are permitted provided that the following conditions
24 * are met:
25 * 1. Redistributions of source code must retain the copyright
26 * notice, this list of conditions and the following disclaimer.
27 * 2. Redistributions in binary form must reproduce the above copyright
28 * notice, this list of conditions and the following disclaimer in the
29 * documentation and/or other materials provided with the distribution.
30 * 3. All advertising materials mentioning features or use of this software
31 * must display the following acknowledgement:
32 * "This product includes cryptographic software written by
33 * Eric Young (eay@cryptsoft.com)"
34 * The word 'cryptographic' can be left out if the rouines from the library
35 * being used are not cryptographic related :-).
36 * 4. If you include any Windows specific code (or a derivative thereof) from
37 * the apps directory (application code) you must include an acknowledgement:
38 * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
39 *
40 * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
41 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
42 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
43 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
44 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
45 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
46 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
47 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
48 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
49 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
50 * SUCH DAMAGE.
51 *
52 * The licence and distribution terms for any publically available version or
53 * derivative of this code cannot be changed. i.e. this code cannot simply be
54 * copied and put under another distribution licence
55 * [including the GNU Public Licence.] */
56
57#ifndef OPENSSL_HEADER_DH_H
58#define OPENSSL_HEADER_DH_H
59
60#include <openssl/base.h>
61
Adam Langley95c29f32014-06-20 12:00:00 -070062#include <openssl/ex_data.h>
Adam Langley683d7bd2015-04-13 11:04:14 -070063#include <openssl/thread.h>
Adam Langley95c29f32014-06-20 12:00:00 -070064
65#if defined(__cplusplus)
66extern "C" {
67#endif
68
69
David Benjamin4512b792017-08-18 19:21:50 -040070// DH contains functions for performing Diffie-Hellman key agreement in
71// multiplicative groups.
David Benjamine0900ac2020-09-09 10:16:18 -040072//
73// This module is deprecated and retained for legacy reasons only. It is not
74// considered a priority for performance or hardening work. Do not use it in
75// new code. Use X25519 or ECDH with P-256 instead.
Adam Langley95c29f32014-06-20 12:00:00 -070076
77
David Benjamin4512b792017-08-18 19:21:50 -040078// Allocation and destruction.
Adam Langley95c29f32014-06-20 12:00:00 -070079
David Benjamin4512b792017-08-18 19:21:50 -040080// DH_new returns a new, empty DH object or NULL on error.
Adam Langleyeb7d2ed2014-07-30 16:02:14 -070081OPENSSL_EXPORT DH *DH_new(void);
Adam Langley95c29f32014-06-20 12:00:00 -070082
David Benjamin4512b792017-08-18 19:21:50 -040083// DH_free decrements the reference count of |dh| and frees it if the reference
84// count drops to zero.
Adam Langleyeb7d2ed2014-07-30 16:02:14 -070085OPENSSL_EXPORT void DH_free(DH *dh);
Adam Langley95c29f32014-06-20 12:00:00 -070086
David Benjamin4512b792017-08-18 19:21:50 -040087// DH_up_ref increments the reference count of |dh| and returns one.
Adam Langleyeb7d2ed2014-07-30 16:02:14 -070088OPENSSL_EXPORT int DH_up_ref(DH *dh);
Adam Langley95c29f32014-06-20 12:00:00 -070089
90
David Benjamin4512b792017-08-18 19:21:50 -040091// Properties.
David Benjamin5a915032016-08-09 11:04:24 -040092
David Benjamincdc5c182020-04-01 12:13:31 -040093// DH_get0_pub_key returns |dh|'s public key.
94OPENSSL_EXPORT const BIGNUM *DH_get0_pub_key(const DH *dh);
95
96// DH_get0_priv_key returns |dh|'s private key, or NULL if |dh| is a public key.
97OPENSSL_EXPORT const BIGNUM *DH_get0_priv_key(const DH *dh);
98
99// DH_get0_p returns |dh|'s group modulus.
100OPENSSL_EXPORT const BIGNUM *DH_get0_p(const DH *dh);
101
102// DH_get0_q returns the size of |dh|'s subgroup, or NULL if it is unset.
103OPENSSL_EXPORT const BIGNUM *DH_get0_q(const DH *dh);
104
105// DH_get0_g returns |dh|'s group generator.
106OPENSSL_EXPORT const BIGNUM *DH_get0_g(const DH *dh);
107
David Benjamin4512b792017-08-18 19:21:50 -0400108// DH_get0_key sets |*out_pub_key| and |*out_priv_key|, if non-NULL, to |dh|'s
109// public and private key, respectively. If |dh| is a public key, the private
110// key will be set to NULL.
David Benjamin5a915032016-08-09 11:04:24 -0400111OPENSSL_EXPORT void DH_get0_key(const DH *dh, const BIGNUM **out_pub_key,
112 const BIGNUM **out_priv_key);
113
David Benjamin81f030b2016-08-12 14:48:19 -0400114// DH_set0_key sets |dh|'s public and private key to the specified values. If
115// NULL, the field is left unchanged. On success, it takes ownership of each
116// argument and returns one. Otherwise, it returns zero.
117OPENSSL_EXPORT int DH_set0_key(DH *dh, BIGNUM *pub_key, BIGNUM *priv_key);
118
David Benjamin4512b792017-08-18 19:21:50 -0400119// DH_get0_pqg sets |*out_p|, |*out_q|, and |*out_g|, if non-NULL, to |dh|'s p,
120// q, and g parameters, respectively.
David Benjamin5a915032016-08-09 11:04:24 -0400121OPENSSL_EXPORT void DH_get0_pqg(const DH *dh, const BIGNUM **out_p,
122 const BIGNUM **out_q, const BIGNUM **out_g);
123
David Benjamin81f030b2016-08-12 14:48:19 -0400124// DH_set0_pqg sets |dh|'s p, q, and g parameters to the specified values. If
125// NULL, the field is left unchanged. On success, it takes ownership of each
126// argument and returns one. Otherwise, it returns zero. |q| may be NULL, but
127// |p| and |g| must either be specified or already configured on |dh|.
128OPENSSL_EXPORT int DH_set0_pqg(DH *dh, BIGNUM *p, BIGNUM *q, BIGNUM *g);
129
David Benjamin0064c292020-03-23 18:50:47 -0400130// DH_set_length sets the number of bits to use for the secret exponent when
131// calling |DH_generate_key| on |dh| and returns one. If unset,
132// |DH_generate_key| will use the bit length of p.
133OPENSSL_EXPORT int DH_set_length(DH *dh, unsigned priv_length);
134
David Benjamin5a915032016-08-09 11:04:24 -0400135
David Benjamin4512b792017-08-18 19:21:50 -0400136// Standard parameters.
Adam Langley95c29f32014-06-20 12:00:00 -0700137
David Benjamin4512b792017-08-18 19:21:50 -0400138// BN_get_rfc3526_prime_1536 sets |*ret| to the 1536-bit MODP group from RFC
139// 3526 and returns |ret|. If |ret| is NULL then a fresh |BIGNUM| is allocated
140// and returned. It returns NULL on allocation failure.
David Benjamin96e1a252016-08-10 13:38:51 -0400141OPENSSL_EXPORT BIGNUM *BN_get_rfc3526_prime_1536(BIGNUM *ret);
142
Adam Langley95c29f32014-06-20 12:00:00 -0700143
David Benjamin4512b792017-08-18 19:21:50 -0400144// Parameter generation.
Adam Langley95c29f32014-06-20 12:00:00 -0700145
146#define DH_GENERATOR_2 2
147#define DH_GENERATOR_5 5
148
David Benjamin4512b792017-08-18 19:21:50 -0400149// DH_generate_parameters_ex generates a suitable Diffie-Hellman group with a
150// prime that is |prime_bits| long and stores it in |dh|. The generator of the
151// group will be |generator|, which should be |DH_GENERATOR_2| unless there's a
152// good reason to use a different value. The |cb| argument contains a callback
153// function that will be called during the generation. See the documentation in
154// |bn.h| about this. In addition to the callback invocations from |BN|, |cb|
155// will also be called with |event| equal to three when the generation is
156// complete.
Adam Langleyeb7d2ed2014-07-30 16:02:14 -0700157OPENSSL_EXPORT int DH_generate_parameters_ex(DH *dh, int prime_bits,
158 int generator, BN_GENCB *cb);
Adam Langley95c29f32014-06-20 12:00:00 -0700159
160
David Benjamin4512b792017-08-18 19:21:50 -0400161// Diffie-Hellman operations.
Adam Langley95c29f32014-06-20 12:00:00 -0700162
David Benjamin4512b792017-08-18 19:21:50 -0400163// DH_generate_key generates a new, random, private key and stores it in
164// |dh|. It returns one on success and zero on error.
Adam Langleyeb7d2ed2014-07-30 16:02:14 -0700165OPENSSL_EXPORT int DH_generate_key(DH *dh);
Adam Langley95c29f32014-06-20 12:00:00 -0700166
David Benjamin4512b792017-08-18 19:21:50 -0400167// DH_compute_key calculates the shared key between |dh| and |peers_key| and
168// writes it as a big-endian integer into |out|, which must have |DH_size|
169// bytes of space. It returns the number of bytes written, or a negative number
170// on error.
David Benjamine0900ac2020-09-09 10:16:18 -0400171//
172// Note the output may be shorter than |DH_size| bytes. Contrary to PKCS #3,
173// this function returns a variable-length shared key with leading zeros
174// removed. This may result in sporadic key mismatch and, if |dh| is reused,
175// side channel attacks such as https://raccoon-attack.com/.
176//
177// This is a legacy algorithm, so we do not provide a fixed-width variant. Use
178// X25519 or ECDH with P-256 instead.
Adam Langleyded93582014-07-31 15:23:51 -0700179OPENSSL_EXPORT int DH_compute_key(uint8_t *out, const BIGNUM *peers_key,
180 DH *dh);
Adam Langley95c29f32014-06-20 12:00:00 -0700181
182
David Benjamin4512b792017-08-18 19:21:50 -0400183// Utility functions.
Adam Langley95c29f32014-06-20 12:00:00 -0700184
David Benjamin4512b792017-08-18 19:21:50 -0400185// DH_size returns the number of bytes in the DH group's prime.
Adam Langleyeb7d2ed2014-07-30 16:02:14 -0700186OPENSSL_EXPORT int DH_size(const DH *dh);
Adam Langley95c29f32014-06-20 12:00:00 -0700187
David Benjamin4512b792017-08-18 19:21:50 -0400188// DH_num_bits returns the minimum number of bits needed to represent the
189// absolute value of the DH group's prime.
Adam Langleya7997f12015-05-14 17:38:50 -0700190OPENSSL_EXPORT unsigned DH_num_bits(const DH *dh);
191
Adam Langley95c29f32014-06-20 12:00:00 -0700192#define DH_CHECK_P_NOT_PRIME 0x01
193#define DH_CHECK_P_NOT_SAFE_PRIME 0x02
194#define DH_CHECK_UNABLE_TO_CHECK_GENERATOR 0x04
195#define DH_CHECK_NOT_SUITABLE_GENERATOR 0x08
196#define DH_CHECK_Q_NOT_PRIME 0x10
197#define DH_CHECK_INVALID_Q_VALUE 0x20
198#define DH_CHECK_INVALID_J_VALUE 0x40
199
David Benjamin4512b792017-08-18 19:21:50 -0400200// These are compatibility defines.
Adam Langley7e6c4c82015-04-02 13:09:19 -0700201#define DH_NOT_SUITABLE_GENERATOR DH_CHECK_NOT_SUITABLE_GENERATOR
202#define DH_UNABLE_TO_CHECK_GENERATOR DH_CHECK_UNABLE_TO_CHECK_GENERATOR
203
David Benjamin4512b792017-08-18 19:21:50 -0400204// DH_check checks the suitability of |dh| as a Diffie-Hellman group. and sets
205// |DH_CHECK_*| flags in |*out_flags| if it finds any errors. It returns one if
206// |*out_flags| was successfully set and zero on error.
207//
208// Note: these checks may be quite computationally expensive.
Adam Langleyeb7d2ed2014-07-30 16:02:14 -0700209OPENSSL_EXPORT int DH_check(const DH *dh, int *out_flags);
Adam Langley95c29f32014-06-20 12:00:00 -0700210
David Benjamin47ebec12016-01-28 14:57:35 -0500211#define DH_CHECK_PUBKEY_TOO_SMALL 0x1
212#define DH_CHECK_PUBKEY_TOO_LARGE 0x2
213#define DH_CHECK_PUBKEY_INVALID 0x4
Adam Langley95c29f32014-06-20 12:00:00 -0700214
David Benjamin4512b792017-08-18 19:21:50 -0400215// DH_check_pub_key checks the suitability of |pub_key| as a public key for the
216// DH group in |dh| and sets |DH_CHECK_PUBKEY_*| flags in |*out_flags| if it
217// finds any errors. It returns one if |*out_flags| was successfully set and
218// zero on error.
Adam Langleyeb7d2ed2014-07-30 16:02:14 -0700219OPENSSL_EXPORT int DH_check_pub_key(const DH *dh, const BIGNUM *pub_key,
220 int *out_flags);
Adam Langley95c29f32014-06-20 12:00:00 -0700221
David Benjamin4512b792017-08-18 19:21:50 -0400222// DHparams_dup allocates a fresh |DH| and copies the parameters from |dh| into
223// it. It returns the new |DH| or NULL on error.
Adam Langleyeb7d2ed2014-07-30 16:02:14 -0700224OPENSSL_EXPORT DH *DHparams_dup(const DH *dh);
Adam Langley95c29f32014-06-20 12:00:00 -0700225
226
David Benjamin4512b792017-08-18 19:21:50 -0400227// ASN.1 functions.
Adam Langley95c29f32014-06-20 12:00:00 -0700228
David Benjamin4512b792017-08-18 19:21:50 -0400229// DH_parse_parameters decodes a DER-encoded DHParameter structure (PKCS #3)
230// from |cbs| and advances |cbs|. It returns a newly-allocated |DH| or NULL on
231// error.
David Benjamin34733152016-05-07 17:40:02 -0400232OPENSSL_EXPORT DH *DH_parse_parameters(CBS *cbs);
Adam Langley95c29f32014-06-20 12:00:00 -0700233
David Benjamin4512b792017-08-18 19:21:50 -0400234// DH_marshal_parameters marshals |dh| as a DER-encoded DHParameter structure
235// (PKCS #3) and appends the result to |cbb|. It returns one on success and zero
236// on error.
David Benjamin34733152016-05-07 17:40:02 -0400237OPENSSL_EXPORT int DH_marshal_parameters(CBB *cbb, const DH *dh);
Adam Langley95c29f32014-06-20 12:00:00 -0700238
239
David Benjamin4512b792017-08-18 19:21:50 -0400240// ex_data functions.
241//
242// See |ex_data.h| for details.
Adam Langley95c29f32014-06-20 12:00:00 -0700243
Adam Langleyeb7d2ed2014-07-30 16:02:14 -0700244OPENSSL_EXPORT int DH_get_ex_new_index(long argl, void *argp,
David Benjamin8a589332015-12-04 23:14:35 -0500245 CRYPTO_EX_unused *unused,
David Benjamind94682d2017-05-14 17:10:18 -0400246 CRYPTO_EX_dup *dup_unused,
Adam Langleyeb7d2ed2014-07-30 16:02:14 -0700247 CRYPTO_EX_free *free_func);
248OPENSSL_EXPORT int DH_set_ex_data(DH *d, int idx, void *arg);
249OPENSSL_EXPORT void *DH_get_ex_data(DH *d, int idx);
Adam Langley95c29f32014-06-20 12:00:00 -0700250
251
David Benjamin4512b792017-08-18 19:21:50 -0400252// Deprecated functions.
Piotr Sikora8b0fe8c2016-03-18 18:22:54 -0700253
David Benjamin4512b792017-08-18 19:21:50 -0400254// DH_generate_parameters behaves like |DH_generate_parameters_ex|, which is
255// what you should use instead. It returns NULL on error, or a newly-allocated
256// |DH| on success. This function is provided for compatibility only.
Piotr Sikora8b0fe8c2016-03-18 18:22:54 -0700257OPENSSL_EXPORT DH *DH_generate_parameters(int prime_len, int generator,
258 void (*callback)(int, int, void *),
259 void *cb_arg);
260
David Benjamin4512b792017-08-18 19:21:50 -0400261// d2i_DHparams parses an ASN.1, DER encoded Diffie-Hellman parameters structure
262// from |len| bytes at |*inp|. If |ret| is not NULL then, on exit, a pointer to
263// the result is in |*ret|. Note that, even if |*ret| is already non-NULL on
264// entry, it will not be written to. Rather, a fresh |DH| is allocated and the
265// previous one is freed.
266//
267// On successful exit, |*inp| is advanced past the DER structure. It
268// returns the result or NULL on error.
269//
270// Use |DH_parse_parameters| instead.
David Benjamin34733152016-05-07 17:40:02 -0400271OPENSSL_EXPORT DH *d2i_DHparams(DH **ret, const unsigned char **inp, long len);
272
David Benjamin4512b792017-08-18 19:21:50 -0400273// i2d_DHparams marshals |in| to an ASN.1, DER structure. If |outp| is not NULL
274// then the result is written to |*outp| and |*outp| is advanced just past the
275// output. It returns the number of bytes in the result, whether written or
276// not, or a negative value on error.
277//
278// Use |DH_marshal_parameters| instead.
David Benjamin34733152016-05-07 17:40:02 -0400279OPENSSL_EXPORT int i2d_DHparams(const DH *in, unsigned char **outp);
280
Piotr Sikora8b0fe8c2016-03-18 18:22:54 -0700281
Adam Langley95c29f32014-06-20 12:00:00 -0700282struct dh_st {
Adam Langley95c29f32014-06-20 12:00:00 -0700283 BIGNUM *p;
284 BIGNUM *g;
David Benjamin4512b792017-08-18 19:21:50 -0400285 BIGNUM *pub_key; // g^x mod p
286 BIGNUM *priv_key; // x
Adam Langley95c29f32014-06-20 12:00:00 -0700287
David Benjamin4512b792017-08-18 19:21:50 -0400288 // priv_length contains the length, in bits, of the private value. If zero,
289 // the private value will be the same length as |p|.
Adam Langley95c29f32014-06-20 12:00:00 -0700290 unsigned priv_length;
Adam Langley683d7bd2015-04-13 11:04:14 -0700291
292 CRYPTO_MUTEX method_mont_p_lock;
Adam Langley95c29f32014-06-20 12:00:00 -0700293 BN_MONT_CTX *method_mont_p;
294
David Benjamin4512b792017-08-18 19:21:50 -0400295 // Place holders if we want to do X9.42 DH
Adam Langley95c29f32014-06-20 12:00:00 -0700296 BIGNUM *q;
297 BIGNUM *j;
298 unsigned char *seed;
299 int seedlen;
300 BIGNUM *counter;
301
302 int flags;
Adam Langley0da323a2015-05-15 12:49:30 -0700303 CRYPTO_refcount_t references;
Adam Langley95c29f32014-06-20 12:00:00 -0700304 CRYPTO_EX_DATA ex_data;
305};
306
307
308#if defined(__cplusplus)
David Benjamin4512b792017-08-18 19:21:50 -0400309} // extern C
Matt Braithwaited17d74d2016-08-17 20:10:28 -0700310
311extern "C++" {
312
Joshua Liebow-Feeser8c7c6352018-08-26 18:53:36 -0700313BSSL_NAMESPACE_BEGIN
Matt Braithwaited17d74d2016-08-17 20:10:28 -0700314
Matt Braithwaited17d74d2016-08-17 20:10:28 -0700315BORINGSSL_MAKE_DELETER(DH, DH_free)
David Benjamin5cf05ad2018-09-14 09:34:17 -0700316BORINGSSL_MAKE_UP_REF(DH, DH_up_ref)
Matt Braithwaited17d74d2016-08-17 20:10:28 -0700317
Joshua Liebow-Feeser8c7c6352018-08-26 18:53:36 -0700318BSSL_NAMESPACE_END
Matt Braithwaited17d74d2016-08-17 20:10:28 -0700319
David Benjamin4512b792017-08-18 19:21:50 -0400320} // extern C++
Matt Braithwaited17d74d2016-08-17 20:10:28 -0700321
Adam Langley95c29f32014-06-20 12:00:00 -0700322#endif
323
David Benjamin689be0f2015-02-11 15:55:26 -0500324#define DH_R_BAD_GENERATOR 100
325#define DH_R_INVALID_PUBKEY 101
Adam Langley95c29f32014-06-20 12:00:00 -0700326#define DH_R_MODULUS_TOO_LARGE 102
327#define DH_R_NO_PRIVATE_VALUE 103
David Benjamin34733152016-05-07 17:40:02 -0400328#define DH_R_DECODE_ERROR 104
329#define DH_R_ENCODE_ERROR 105
Adam Langley95c29f32014-06-20 12:00:00 -0700330
David Benjamin4512b792017-08-18 19:21:50 -0400331#endif // OPENSSL_HEADER_DH_H