VirtualBox

source: vbox/trunk/src/libs/openssl-3.0.7/crypto/ffc/ffc_params_validate.c@ 97372

Last change on this file since 97372 was 94320, checked in by vboxsync, 3 years ago

libs/openssl-3.0.1: Export to OSE and fix copyright headers in Makefiles, bugref:10128

File size: 5.9 KB
Line 
1/*
2 * Copyright 2019-2021 The OpenSSL Project Authors. All Rights Reserved.
3 *
4 * Licensed under the Apache License 2.0 (the "License"). You may not use
5 * this file except in compliance with the License. You can obtain a copy
6 * in the file LICENSE in the source distribution or at
7 * https://www.openssl.org/source/license.html
8 */
9
10/*
11 * Finite Field cryptography (FFC) is used for DSA and DH.
12 * This file contains methods for validation of FFC parameters.
13 * It calls the same functions as the generation as the code is very similar.
14 */
15
16#include <openssl/err.h>
17#include <openssl/bn.h>
18#include <openssl/dsaerr.h>
19#include <openssl/dherr.h>
20#include "internal/ffc.h"
21
22/* FIPS186-4 A.2.2 Unverifiable partial validation of Generator g */
23int ossl_ffc_params_validate_unverifiable_g(BN_CTX *ctx, BN_MONT_CTX *mont,
24 const BIGNUM *p, const BIGNUM *q,
25 const BIGNUM *g, BIGNUM *tmp,
26 int *ret)
27{
28 /*
29 * A.2.2 Step (1) AND
30 * A.2.4 Step (2)
31 * Verify that 2 <= g <= (p - 1)
32 */
33 if (BN_cmp(g, BN_value_one()) <= 0 || BN_cmp(g, p) >= 0) {
34 *ret |= FFC_ERROR_NOT_SUITABLE_GENERATOR;
35 return 0;
36 }
37
38 /*
39 * A.2.2 Step (2) AND
40 * A.2.4 Step (3)
41 * Check g^q mod p = 1
42 */
43 if (!BN_mod_exp_mont(tmp, g, q, p, ctx, mont))
44 return 0;
45 if (BN_cmp(tmp, BN_value_one()) != 0) {
46 *ret |= FFC_ERROR_NOT_SUITABLE_GENERATOR;
47 return 0;
48 }
49 return 1;
50}
51
52int ossl_ffc_params_FIPS186_4_validate(OSSL_LIB_CTX *libctx,
53 const FFC_PARAMS *params, int type,
54 int *res, BN_GENCB *cb)
55{
56 size_t L, N;
57
58 if (params == NULL || params->p == NULL || params->q == NULL)
59 return FFC_PARAM_RET_STATUS_FAILED;
60
61 /* A.1.1.3 Step (1..2) : L = len(p), N = len(q) */
62 L = BN_num_bits(params->p);
63 N = BN_num_bits(params->q);
64 return ossl_ffc_params_FIPS186_4_gen_verify(libctx, (FFC_PARAMS *)params,
65 FFC_PARAM_MODE_VERIFY, type,
66 L, N, res, cb);
67}
68
69/* This may be used in FIPS mode to validate deprecated FIPS-186-2 Params */
70int ossl_ffc_params_FIPS186_2_validate(OSSL_LIB_CTX *libctx,
71 const FFC_PARAMS *params, int type,
72 int *res, BN_GENCB *cb)
73{
74 size_t L, N;
75
76 if (params == NULL || params->p == NULL || params->q == NULL) {
77 *res = FFC_CHECK_INVALID_PQ;
78 return FFC_PARAM_RET_STATUS_FAILED;
79 }
80
81 /* A.1.1.3 Step (1..2) : L = len(p), N = len(q) */
82 L = BN_num_bits(params->p);
83 N = BN_num_bits(params->q);
84 return ossl_ffc_params_FIPS186_2_gen_verify(libctx, (FFC_PARAMS *)params,
85 FFC_PARAM_MODE_VERIFY, type,
86 L, N, res, cb);
87}
88
89/*
90 * This does a simple check of L and N and partial g.
91 * It makes no attempt to do a full validation of p, q or g since these require
92 * extra parameters such as the digest and seed, which may not be available for
93 * this test.
94 */
95int ossl_ffc_params_simple_validate(OSSL_LIB_CTX *libctx, const FFC_PARAMS *params,
96 int paramstype, int *res)
97{
98 int ret;
99 int tmpres = 0;
100 FFC_PARAMS tmpparams = {0};
101
102 if (params == NULL)
103 return 0;
104
105 if (res == NULL)
106 res = &tmpres;
107
108 if (!ossl_ffc_params_copy(&tmpparams, params))
109 return 0;
110
111 tmpparams.flags = FFC_PARAM_FLAG_VALIDATE_G;
112 tmpparams.gindex = FFC_UNVERIFIABLE_GINDEX;
113
114#ifndef FIPS_MODULE
115 if (params->flags & FFC_PARAM_FLAG_VALIDATE_LEGACY)
116 ret = ossl_ffc_params_FIPS186_2_validate(libctx, &tmpparams, paramstype,
117 res, NULL);
118 else
119#endif
120 ret = ossl_ffc_params_FIPS186_4_validate(libctx, &tmpparams, paramstype,
121 res, NULL);
122#ifndef OPENSSL_NO_DH
123 if (ret == FFC_PARAM_RET_STATUS_FAILED
124 && (*res & FFC_ERROR_NOT_SUITABLE_GENERATOR) != 0) {
125 ERR_raise(ERR_LIB_DH, DH_R_NOT_SUITABLE_GENERATOR);
126 }
127#endif
128
129 ossl_ffc_params_cleanup(&tmpparams);
130
131 return ret != FFC_PARAM_RET_STATUS_FAILED;
132}
133
134/*
135 * If possible (or always in FIPS_MODULE) do full FIPS 186-4 validation.
136 * Otherwise do simple check but in addition also check the primality of the
137 * p and q.
138 */
139int ossl_ffc_params_full_validate(OSSL_LIB_CTX *libctx, const FFC_PARAMS *params,
140 int paramstype, int *res)
141{
142 int tmpres = 0;
143
144 if (params == NULL)
145 return 0;
146
147 if (res == NULL)
148 res = &tmpres;
149
150#ifdef FIPS_MODULE
151 return ossl_ffc_params_FIPS186_4_validate(libctx, params, paramstype,
152 res, NULL);
153#else
154 if (params->seed != NULL) {
155 if (params->flags & FFC_PARAM_FLAG_VALIDATE_LEGACY)
156 return ossl_ffc_params_FIPS186_2_validate(libctx, params, paramstype,
157 res, NULL);
158 else
159 return ossl_ffc_params_FIPS186_4_validate(libctx, params, paramstype,
160 res, NULL);
161 } else {
162 int ret = 0;
163
164 ret = ossl_ffc_params_simple_validate(libctx, params, paramstype, res);
165 if (ret) {
166 BN_CTX *ctx;
167
168 if ((ctx = BN_CTX_new_ex(libctx)) == NULL)
169 return 0;
170 if (BN_check_prime(params->q, ctx, NULL) != 1) {
171# ifndef OPENSSL_NO_DSA
172 ERR_raise(ERR_LIB_DSA, DSA_R_Q_NOT_PRIME);
173# endif
174 ret = 0;
175 }
176 if (ret && BN_check_prime(params->p, ctx, NULL) != 1) {
177# ifndef OPENSSL_NO_DSA
178 ERR_raise(ERR_LIB_DSA, DSA_R_P_NOT_PRIME);
179# endif
180 ret = 0;
181 }
182 BN_CTX_free(ctx);
183 }
184 return ret;
185 }
186#endif
187}
Note: See TracBrowser for help on using the repository browser.

© 2024 Oracle Support Privacy / Do Not Sell My Info Terms of Use Trademark Policy Automated Access Etiquette