mirror of https://github.com/acidanthera/audk.git
239 lines
6.7 KiB
C
239 lines
6.7 KiB
C
|
/** @file
|
||
|
Diffie-Hellman Wrapper Implementation over OpenSSL.
|
||
|
|
||
|
Copyright (c) 2010, Intel Corporation. All rights reserved.<BR>
|
||
|
This program and the accompanying materials
|
||
|
are licensed and made available under the terms and conditions of the BSD License
|
||
|
which accompanies this distribution. The full text of the license may be found at
|
||
|
http://opensource.org/licenses/bsd-license.php
|
||
|
|
||
|
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,
|
||
|
WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
|
||
|
|
||
|
**/
|
||
|
|
||
|
#include "InternalCryptLib.h"
|
||
|
#include <openssl/dh.h>
|
||
|
|
||
|
|
||
|
/**
|
||
|
Allocates and Initializes one Diffie-Hellman Context for subsequent use.
|
||
|
|
||
|
@return Pointer to the Diffie-Hellman Context that has been initialized.
|
||
|
If the allocations fails, DhNew() returns NULL.
|
||
|
|
||
|
**/
|
||
|
VOID *
|
||
|
EFIAPI
|
||
|
DhNew (
|
||
|
VOID
|
||
|
)
|
||
|
{
|
||
|
//
|
||
|
// Allocates & Initializes DH Context by OpenSSL DH_new()
|
||
|
//
|
||
|
return (VOID *)DH_new ();
|
||
|
}
|
||
|
|
||
|
/**
|
||
|
Release the specified DH context.
|
||
|
|
||
|
If DhContext is NULL, then ASSERT().
|
||
|
|
||
|
@param[in] DhContext Pointer to the DH context to be released.
|
||
|
|
||
|
**/
|
||
|
VOID
|
||
|
EFIAPI
|
||
|
DhFree (
|
||
|
IN VOID *DhContext
|
||
|
)
|
||
|
{
|
||
|
//
|
||
|
// Free OpenSSL DH Context
|
||
|
//
|
||
|
DH_free ((DH *)DhContext);
|
||
|
}
|
||
|
|
||
|
/**
|
||
|
Generates DH parameter.
|
||
|
|
||
|
Given generator g, and length of prime number p in bits, this function generates p,
|
||
|
and sets DH context according to value of g and p.
|
||
|
|
||
|
Before this function can be invoked, pseudorandom number generator must be correctly
|
||
|
initialized by RandomSeed().
|
||
|
|
||
|
If DhContext is NULL, then ASSERT().
|
||
|
If Prime is NULL, then ASSERT().
|
||
|
|
||
|
@param[in, out] DhContext Pointer to the DH context.
|
||
|
@param[in] Generator Value of generator.
|
||
|
@param[in] PrimeLength Length in bits of prime to be generated.
|
||
|
@param[out] Prime Pointer to the buffer to receive the generated prime number.
|
||
|
|
||
|
@retval TRUE DH pamameter generation succeeded.
|
||
|
@retval FALSE Value of Generator is not supported.
|
||
|
@retval FALSE PRNG fails to generate random prime number with PrimeLength.
|
||
|
|
||
|
**/
|
||
|
BOOLEAN
|
||
|
EFIAPI
|
||
|
DhGenerateParameter (
|
||
|
IN OUT VOID *DhContext,
|
||
|
IN UINTN Generator,
|
||
|
IN UINTN PrimeLength,
|
||
|
OUT UINT8 *Prime
|
||
|
)
|
||
|
{
|
||
|
BOOLEAN RetVal;
|
||
|
|
||
|
if (Generator != DH_GENERATOR_2 && Generator != DH_GENERATOR_5) {
|
||
|
return FALSE;
|
||
|
}
|
||
|
|
||
|
RetVal = (BOOLEAN) DH_generate_parameters_ex (DhContext, (UINT32) PrimeLength, (UINT32) Generator, NULL);
|
||
|
if (!RetVal) {
|
||
|
return FALSE;
|
||
|
}
|
||
|
|
||
|
BN_bn2bin (((DH *) DhContext)->p, Prime);
|
||
|
|
||
|
return TRUE;
|
||
|
}
|
||
|
|
||
|
/**
|
||
|
Sets generator and prime parameters for DH.
|
||
|
|
||
|
Given generator g, and prime number p, this function and sets DH
|
||
|
context accordingly.
|
||
|
|
||
|
If DhContext is NULL, then ASSERT().
|
||
|
If Prime is NULL, then ASSERT().
|
||
|
|
||
|
@param[in, out] DhContext Pointer to the DH context.
|
||
|
@param[in] Generator Value of generator.
|
||
|
@param[in] PrimeLength Length in bits of prime to be generated.
|
||
|
@param[in] Prime Pointer to the prime number.
|
||
|
|
||
|
@retval TRUE DH pamameter setting succeeded.
|
||
|
@retval FALSE Value of Generator is not supported.
|
||
|
@retval FALSE Value of Generator is not suitable for the Prime.
|
||
|
@retval FALSE Value of Prime is not a prime number.
|
||
|
@retval FALSE Value of Prime is not a safe prime number.
|
||
|
|
||
|
**/
|
||
|
BOOLEAN
|
||
|
EFIAPI
|
||
|
DhSetParameter (
|
||
|
IN OUT VOID *DhContext,
|
||
|
IN UINTN Generator,
|
||
|
IN UINTN PrimeLength,
|
||
|
IN CONST UINT8 *Prime
|
||
|
)
|
||
|
{
|
||
|
DH *Dh;
|
||
|
|
||
|
if (Generator != DH_GENERATOR_2 && Generator != DH_GENERATOR_5) {
|
||
|
return FALSE;
|
||
|
}
|
||
|
|
||
|
Dh = (DH *) DhContext;
|
||
|
Dh->p = BN_new();
|
||
|
Dh->g = BN_new();
|
||
|
|
||
|
BN_bin2bn (Prime, (UINT32) (PrimeLength / 8), Dh->p);
|
||
|
BN_set_word (Dh->g, (UINT32) Generator);
|
||
|
|
||
|
return TRUE;
|
||
|
}
|
||
|
|
||
|
/**
|
||
|
Generates DH public key.
|
||
|
|
||
|
This function generates random secret exponent, and computes the public key, which is
|
||
|
returned via parameter PublicKey and PublicKeySize. DH context is updated accordingly.
|
||
|
If the PublicKey buffer is too small to hold the public key, FALSE is returned and
|
||
|
PublicKeySize is set to the required buffer size to obtain the public key.
|
||
|
|
||
|
If DhContext is NULL, then ASSERT().
|
||
|
If PublicKeySize is NULL, then ASSERT().
|
||
|
If PublicKeySize is large enough but PublicKey is NULL, then ASSERT().
|
||
|
|
||
|
@param[in, out] DhContext Pointer to the DH context.
|
||
|
@param[out] PublicKey Pointer to the buffer to receive generated public key.
|
||
|
@param[in, out] PublicKeySize On input, the size of PublicKey buffer in bytes.
|
||
|
On output, the size of data returned in PublicKey buffer in bytes.
|
||
|
|
||
|
@retval TRUE DH public key generation succeeded.
|
||
|
@retval FALSE DH public key generation failed.
|
||
|
@retval FALSE PublicKeySize is not large enough.
|
||
|
|
||
|
**/
|
||
|
BOOLEAN
|
||
|
EFIAPI
|
||
|
DhGenerateKey (
|
||
|
IN OUT VOID *DhContext,
|
||
|
OUT UINT8 *PublicKey,
|
||
|
IN OUT UINTN *PublicKeySize
|
||
|
)
|
||
|
{
|
||
|
BOOLEAN RetVal;
|
||
|
DH *Dh;
|
||
|
|
||
|
Dh = (DH *) DhContext;
|
||
|
*PublicKeySize = 0;
|
||
|
|
||
|
RetVal = (BOOLEAN) DH_generate_key (DhContext);
|
||
|
if (RetVal) {
|
||
|
BN_bn2bin (Dh->pub_key, PublicKey);
|
||
|
*PublicKeySize = BN_num_bytes (Dh->pub_key);
|
||
|
}
|
||
|
|
||
|
return RetVal;
|
||
|
}
|
||
|
|
||
|
/**
|
||
|
Computes exchanged common key.
|
||
|
|
||
|
Given peer's public key, this function computes the exchanged common key, based on its own
|
||
|
context including value of prime modulus and random secret exponent.
|
||
|
|
||
|
If DhContext is NULL, then ASSERT().
|
||
|
If PeerPublicKey is NULL, then ASSERT().
|
||
|
If KeySize is NULL, then ASSERT().
|
||
|
If KeySize is large enough but Key is NULL, then ASSERT().
|
||
|
|
||
|
@param[in, out] DhContext Pointer to the DH context.
|
||
|
@param[in] PeerPublicKey Pointer to the peer's public key.
|
||
|
@param[in] PeerPublicKeySize Size of peer's public key in bytes.
|
||
|
@param[out] Key Pointer to the buffer to receive generated key.
|
||
|
@param[in, out] KeySize On input, the size of Key buffer in bytes.
|
||
|
On output, the size of data returned in Key buffer in bytes.
|
||
|
|
||
|
@retval TRUE DH exchanged key generation succeeded.
|
||
|
@retval FALSE DH exchanged key generation failed.
|
||
|
@retval FALSE KeySize is not large enough.
|
||
|
|
||
|
**/
|
||
|
BOOLEAN
|
||
|
EFIAPI
|
||
|
DhComputeKey (
|
||
|
IN OUT VOID *DhContext,
|
||
|
IN CONST UINT8 *PeerPublicKey,
|
||
|
IN UINTN PeerPublicKeySize,
|
||
|
OUT UINT8 *Key,
|
||
|
IN OUT UINTN *KeySize
|
||
|
)
|
||
|
{
|
||
|
BIGNUM *Bn;
|
||
|
|
||
|
Bn = BN_bin2bn (PeerPublicKey, (UINT32) PeerPublicKeySize, NULL);
|
||
|
|
||
|
*KeySize = (BOOLEAN) DH_compute_key (Key, Bn, DhContext);
|
||
|
|
||
|
BN_free (Bn);
|
||
|
|
||
|
return TRUE;
|
||
|
}
|