2 * Copyright 2020-2021 The OpenSSL Project Authors. All Rights Reserved.
4 * Licensed under the Apache License 2.0 (the "License"). You may not use
5 * this file except in compliance with the License. You can obtain a copy
6 * in the file LICENSE in the source distribution or at
7 * https://www.openssl.org/source/license.html
10 #include "internal/deprecated.h"
12 #include <openssl/core_names.h>
13 #include <openssl/params.h>
14 #include <openssl/err.h>
15 #include <openssl/dh.h>
16 #include "crypto/dh.h"
17 #include "crypto/evp.h"
19 static int dh_paramgen_check(EVP_PKEY_CTX *ctx)
21 if (ctx == NULL || !EVP_PKEY_CTX_IS_GEN_OP(ctx)) {
22 ERR_raise(ERR_LIB_EVP, EVP_R_COMMAND_NOT_SUPPORTED);
23 /* Uses the same return values as EVP_PKEY_CTX_ctrl */
26 /* If key type not DH return error */
27 if (evp_pkey_ctx_is_legacy(ctx)
28 && ctx->pmeth->pkey_id != EVP_PKEY_DH
29 && ctx->pmeth->pkey_id != EVP_PKEY_DHX)
34 static int dh_param_derive_check(EVP_PKEY_CTX *ctx)
36 if (ctx == NULL || !EVP_PKEY_CTX_IS_DERIVE_OP(ctx)) {
37 ERR_raise(ERR_LIB_EVP, EVP_R_COMMAND_NOT_SUPPORTED);
38 /* Uses the same return values as EVP_PKEY_CTX_ctrl */
41 /* If key type not DH return error */
42 if (evp_pkey_ctx_is_legacy(ctx)
43 && ctx->pmeth->pkey_id != EVP_PKEY_DH
44 && ctx->pmeth->pkey_id != EVP_PKEY_DHX)
49 int EVP_PKEY_CTX_set_dh_paramgen_gindex(EVP_PKEY_CTX *ctx, int gindex)
52 OSSL_PARAM params[2], *p = params;
54 if ((ret = dh_paramgen_check(ctx)) <= 0)
57 *p++ = OSSL_PARAM_construct_int(OSSL_PKEY_PARAM_FFC_GINDEX, &gindex);
58 *p = OSSL_PARAM_construct_end();
60 return evp_pkey_ctx_set_params_strict(ctx, params);
63 int EVP_PKEY_CTX_set_dh_paramgen_seed(EVP_PKEY_CTX *ctx,
64 const unsigned char *seed,
68 OSSL_PARAM params[2], *p = params;
70 if ((ret = dh_paramgen_check(ctx)) <= 0)
73 *p++ = OSSL_PARAM_construct_octet_string(OSSL_PKEY_PARAM_FFC_SEED,
74 (void *)seed, seedlen);
75 *p = OSSL_PARAM_construct_end();
77 return evp_pkey_ctx_set_params_strict(ctx, params);
81 * This one is currently implemented as an EVP_PKEY_CTX_ctrl() wrapper,
82 * simply because that's easier.
84 int EVP_PKEY_CTX_set_dh_paramgen_type(EVP_PKEY_CTX *ctx, int typ)
86 return EVP_PKEY_CTX_ctrl(ctx, EVP_PKEY_DH, EVP_PKEY_OP_PARAMGEN,
87 EVP_PKEY_CTRL_DH_PARAMGEN_TYPE, typ, NULL);
90 int EVP_PKEY_CTX_set_dh_paramgen_prime_len(EVP_PKEY_CTX *ctx, int pbits)
93 OSSL_PARAM params[2], *p = params;
96 if ((ret = dh_paramgen_check(ctx)) <= 0)
99 *p++ = OSSL_PARAM_construct_size_t(OSSL_PKEY_PARAM_FFC_PBITS, &bits);
100 *p = OSSL_PARAM_construct_end();
101 return evp_pkey_ctx_set_params_strict(ctx, params);
104 int EVP_PKEY_CTX_set_dh_paramgen_subprime_len(EVP_PKEY_CTX *ctx, int qbits)
107 OSSL_PARAM params[2], *p = params;
108 size_t bits2 = qbits;
110 if ((ret = dh_paramgen_check(ctx)) <= 0)
113 *p++ = OSSL_PARAM_construct_size_t(OSSL_PKEY_PARAM_FFC_QBITS, &bits2);
114 *p = OSSL_PARAM_construct_end();
116 return evp_pkey_ctx_set_params_strict(ctx, params);
119 int EVP_PKEY_CTX_set_dh_paramgen_generator(EVP_PKEY_CTX *ctx, int gen)
122 OSSL_PARAM params[2], *p = params;
124 if ((ret = dh_paramgen_check(ctx)) <= 0)
127 *p++ = OSSL_PARAM_construct_int(OSSL_PKEY_PARAM_DH_GENERATOR, &gen);
128 *p = OSSL_PARAM_construct_end();
130 return evp_pkey_ctx_set_params_strict(ctx, params);
134 * This one is currently implemented as an EVP_PKEY_CTX_ctrl() wrapper,
135 * simply because that's easier.
137 int EVP_PKEY_CTX_set_dh_rfc5114(EVP_PKEY_CTX *ctx, int gen)
139 return EVP_PKEY_CTX_ctrl(ctx, EVP_PKEY_DHX, EVP_PKEY_OP_PARAMGEN,
140 EVP_PKEY_CTRL_DH_RFC5114, gen, NULL);
143 int EVP_PKEY_CTX_set_dhx_rfc5114(EVP_PKEY_CTX *ctx, int gen)
145 return EVP_PKEY_CTX_set_dh_rfc5114(ctx, gen);
149 * This one is currently implemented as an EVP_PKEY_CTX_ctrl() wrapper,
150 * simply because that's easier.
152 int EVP_PKEY_CTX_set_dh_nid(EVP_PKEY_CTX *ctx, int nid)
154 return EVP_PKEY_CTX_ctrl(ctx, EVP_PKEY_DH,
155 EVP_PKEY_OP_PARAMGEN | EVP_PKEY_OP_KEYGEN,
156 EVP_PKEY_CTRL_DH_NID, nid, NULL);
159 int EVP_PKEY_CTX_set_dh_pad(EVP_PKEY_CTX *ctx, int pad)
161 OSSL_PARAM dh_pad_params[2];
162 unsigned int upad = pad;
164 /* We use EVP_PKEY_CTX_ctrl return values */
165 if (ctx == NULL || !EVP_PKEY_CTX_IS_DERIVE_OP(ctx)) {
166 ERR_raise(ERR_LIB_EVP, EVP_R_COMMAND_NOT_SUPPORTED);
170 dh_pad_params[0] = OSSL_PARAM_construct_uint(OSSL_EXCHANGE_PARAM_PAD, &upad);
171 dh_pad_params[1] = OSSL_PARAM_construct_end();
173 return evp_pkey_ctx_set_params_strict(ctx, dh_pad_params);
177 * This one is currently implemented as an EVP_PKEY_CTX_ctrl() wrapper,
178 * simply because that's easier.
180 int EVP_PKEY_CTX_set_dh_kdf_type(EVP_PKEY_CTX *ctx, int kdf)
182 return EVP_PKEY_CTX_ctrl(ctx, EVP_PKEY_DHX, EVP_PKEY_OP_DERIVE,
183 EVP_PKEY_CTRL_DH_KDF_TYPE, kdf, NULL);
187 * This one is currently implemented as an EVP_PKEY_CTX_ctrl() wrapper,
188 * simply because that's easier.
190 int EVP_PKEY_CTX_get_dh_kdf_type(EVP_PKEY_CTX *ctx)
192 return EVP_PKEY_CTX_ctrl(ctx, EVP_PKEY_DHX, EVP_PKEY_OP_DERIVE,
193 EVP_PKEY_CTRL_DH_KDF_TYPE, -2, NULL);
197 * This one is currently implemented as an EVP_PKEY_CTX_ctrl() wrapper,
198 * simply because that's easier.
200 int EVP_PKEY_CTX_set0_dh_kdf_oid(EVP_PKEY_CTX *ctx, ASN1_OBJECT *oid)
202 return EVP_PKEY_CTX_ctrl(ctx, EVP_PKEY_DHX, EVP_PKEY_OP_DERIVE,
203 EVP_PKEY_CTRL_DH_KDF_OID, 0, (void *)(oid));
207 * This one is currently implemented as an EVP_PKEY_CTX_ctrl() wrapper,
208 * simply because that's easier.
210 int EVP_PKEY_CTX_get0_dh_kdf_oid(EVP_PKEY_CTX *ctx, ASN1_OBJECT **oid)
212 return EVP_PKEY_CTX_ctrl(ctx, EVP_PKEY_DHX, EVP_PKEY_OP_DERIVE,
213 EVP_PKEY_CTRL_GET_DH_KDF_OID, 0, (void *)(oid));
217 * This one is currently implemented as an EVP_PKEY_CTX_ctrl() wrapper,
218 * simply because that's easier.
220 int EVP_PKEY_CTX_set_dh_kdf_md(EVP_PKEY_CTX *ctx, const EVP_MD *md)
222 return EVP_PKEY_CTX_ctrl(ctx, EVP_PKEY_DHX, EVP_PKEY_OP_DERIVE,
223 EVP_PKEY_CTRL_DH_KDF_MD, 0, (void *)(md));
227 * This one is currently implemented as an EVP_PKEY_CTX_ctrl() wrapper,
228 * simply because that's easier.
230 int EVP_PKEY_CTX_get_dh_kdf_md(EVP_PKEY_CTX *ctx, const EVP_MD **pmd)
232 return EVP_PKEY_CTX_ctrl(ctx, EVP_PKEY_DHX, EVP_PKEY_OP_DERIVE,
233 EVP_PKEY_CTRL_GET_DH_KDF_MD, 0, (void *)(pmd));
236 int EVP_PKEY_CTX_set_dh_kdf_outlen(EVP_PKEY_CTX *ctx, int outlen)
240 OSSL_PARAM params[2], *p = params;
242 ret = dh_param_derive_check(ctx);
248 * This would ideally be -1 or 0, but we have to retain compatibility
249 * with legacy behaviour of EVP_PKEY_CTX_ctrl() which returned -2 if
255 *p++ = OSSL_PARAM_construct_size_t(OSSL_EXCHANGE_PARAM_KDF_OUTLEN,
257 *p = OSSL_PARAM_construct_end();
259 ret = evp_pkey_ctx_set_params_strict(ctx, params);
261 ERR_raise(ERR_LIB_EVP, EVP_R_COMMAND_NOT_SUPPORTED);
265 int EVP_PKEY_CTX_get_dh_kdf_outlen(EVP_PKEY_CTX *ctx, int *plen)
268 size_t len = UINT_MAX;
269 OSSL_PARAM params[2], *p = params;
271 ret = dh_param_derive_check(ctx);
275 *p++ = OSSL_PARAM_construct_size_t(OSSL_EXCHANGE_PARAM_KDF_OUTLEN,
277 *p = OSSL_PARAM_construct_end();
279 ret = evp_pkey_ctx_get_params_strict(ctx, params);
281 ERR_raise(ERR_LIB_EVP, EVP_R_COMMAND_NOT_SUPPORTED);
282 if (ret != 1 || len > INT_MAX)
290 int EVP_PKEY_CTX_set0_dh_kdf_ukm(EVP_PKEY_CTX *ctx, unsigned char *ukm, int len)
293 OSSL_PARAM params[2], *p = params;
298 ret = dh_param_derive_check(ctx);
302 *p++ = OSSL_PARAM_construct_octet_string(OSSL_EXCHANGE_PARAM_KDF_UKM,
304 * Cast away the const. This is read
305 * only so should be safe
309 *p = OSSL_PARAM_construct_end();
311 ret = evp_pkey_ctx_set_params_strict(ctx, params);
313 ERR_raise(ERR_LIB_EVP, EVP_R_COMMAND_NOT_SUPPORTED);
319 #ifndef OPENSSL_NO_DEPRECATED_3_0
320 int EVP_PKEY_CTX_get0_dh_kdf_ukm(EVP_PKEY_CTX *ctx, unsigned char **pukm)
324 OSSL_PARAM params[2], *p = params;
326 ret = dh_param_derive_check(ctx);
330 *p++ = OSSL_PARAM_construct_octet_ptr(OSSL_EXCHANGE_PARAM_KDF_UKM,
332 *p = OSSL_PARAM_construct_end();
334 ret = evp_pkey_ctx_get_params_strict(ctx, params);
336 ERR_raise(ERR_LIB_EVP, EVP_R_COMMAND_NOT_SUPPORTED);
340 ukmlen = params[0].return_size;
341 if (ukmlen > INT_MAX)