2 * Copyright 2019 The OpenSSL Project Authors. All Rights Reserved.
4 * Licensed under the Apache License 2.0 (the "License"). You may not use
5 * this file except in compliance with the License. You can obtain a copy
6 * in the file LICENSE in the source distribution or at
7 * https://www.openssl.org/source/license.html
10 #include <openssl/crypto.h>
11 #include <openssl/core_numbers.h>
12 #include <openssl/core_names.h>
13 #include <openssl/dh.h>
14 #include <openssl/params.h>
15 #include "internal/provider_algs.h"
17 static OSSL_OP_keyexch_newctx_fn dh_newctx;
18 static OSSL_OP_keyexch_init_fn dh_init;
19 static OSSL_OP_keyexch_set_peer_fn dh_set_peer;
20 static OSSL_OP_keyexch_derive_fn dh_derive;
21 static OSSL_OP_keyexch_freectx_fn dh_freectx;
22 static OSSL_OP_keyexch_dupctx_fn dh_dupctx;
23 static OSSL_OP_keyexch_set_ctx_params_fn dh_set_ctx_params;
24 static OSSL_OP_keyexch_settable_ctx_params_fn dh_settable_ctx_params;
27 * What's passed as an actual key is defined by the KEYMGMT interface.
28 * We happen to know that our KEYMGMT simply passes DH structures, so
29 * we use that here too.
38 static void *dh_newctx(void *provctx)
40 return OPENSSL_zalloc(sizeof(PROV_DH_CTX));
43 static int dh_init(void *vpdhctx, void *vdh)
45 PROV_DH_CTX *pdhctx = (PROV_DH_CTX *)vpdhctx;
47 if (pdhctx == NULL || vdh == NULL || !DH_up_ref(vdh))
54 static int dh_set_peer(void *vpdhctx, void *vdh)
56 PROV_DH_CTX *pdhctx = (PROV_DH_CTX *)vpdhctx;
58 if (pdhctx == NULL || vdh == NULL || !DH_up_ref(vdh))
60 DH_free(pdhctx->dhpeer);
65 static int dh_derive(void *vpdhctx, unsigned char *secret, size_t *secretlen,
68 PROV_DH_CTX *pdhctx = (PROV_DH_CTX *)vpdhctx;
71 const BIGNUM *pub_key = NULL;
73 /* TODO(3.0): Add errors to stack */
74 if (pdhctx->dh == NULL || pdhctx->dhpeer == NULL)
77 dhsize = (size_t)DH_size(pdhctx->dh);
85 DH_get0_key(pdhctx->dhpeer, &pub_key, NULL);
86 ret = (pdhctx->pad) ? DH_compute_key_padded(secret, pub_key, pdhctx->dh)
87 : DH_compute_key(secret, pub_key, pdhctx->dh);
95 static void dh_freectx(void *vpdhctx)
97 PROV_DH_CTX *pdhctx = (PROV_DH_CTX *)vpdhctx;
100 DH_free(pdhctx->dhpeer);
102 OPENSSL_free(pdhctx);
105 static void *dh_dupctx(void *vpdhctx)
107 PROV_DH_CTX *srcctx = (PROV_DH_CTX *)vpdhctx;
110 dstctx = OPENSSL_zalloc(sizeof(*srcctx));
115 if (dstctx->dh != NULL && !DH_up_ref(dstctx->dh)) {
116 OPENSSL_free(dstctx);
120 if (dstctx->dhpeer != NULL && !DH_up_ref(dstctx->dhpeer)) {
122 OPENSSL_free(dstctx);
129 static int dh_set_ctx_params(void *vpdhctx, const OSSL_PARAM params[])
131 PROV_DH_CTX *pdhctx = (PROV_DH_CTX *)vpdhctx;
135 if (pdhctx == NULL || params == NULL)
138 p = OSSL_PARAM_locate_const(params, OSSL_EXCHANGE_PARAM_PAD);
139 if (p == NULL || !OSSL_PARAM_get_uint(p, &pad))
141 pdhctx->pad = pad ? 1 : 0;
145 static const OSSL_PARAM known_settable_ctx_params[] = {
146 OSSL_PARAM_int(OSSL_EXCHANGE_PARAM_PAD, NULL),
150 static const OSSL_PARAM *dh_settable_ctx_params(void)
152 return known_settable_ctx_params;
155 const OSSL_DISPATCH dh_keyexch_functions[] = {
156 { OSSL_FUNC_KEYEXCH_NEWCTX, (void (*)(void))dh_newctx },
157 { OSSL_FUNC_KEYEXCH_INIT, (void (*)(void))dh_init },
158 { OSSL_FUNC_KEYEXCH_DERIVE, (void (*)(void))dh_derive },
159 { OSSL_FUNC_KEYEXCH_SET_PEER, (void (*)(void))dh_set_peer },
160 { OSSL_FUNC_KEYEXCH_FREECTX, (void (*)(void))dh_freectx },
161 { OSSL_FUNC_KEYEXCH_DUPCTX, (void (*)(void))dh_dupctx },
162 { OSSL_FUNC_KEYEXCH_SET_CTX_PARAMS, (void (*)(void))dh_set_ctx_params },
163 { OSSL_FUNC_KEYEXCH_SETTABLE_CTX_PARAMS,
164 (void (*)(void))dh_settable_ctx_params },