• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1 /*
2  * Copyright 2019-2021 The OpenSSL Project Authors. All Rights Reserved.
3  *
4  * Licensed under the Apache License 2.0 (the "License").  You may not use
5  * this file except in compliance with the License.  You can obtain a copy
6  * in the file LICENSE in the source distribution or at
7  * https://www.openssl.org/source/license.html
8  */
9 
10 /*
11  * Finite Field cryptography (FFC) is used for DSA and DH.
12  * This file contains methods for validation of FFC parameters.
13  * It calls the same functions as the generation as the code is very similar.
14  */
15 
16 #include <openssl/err.h>
17 #include <openssl/bn.h>
18 #include <openssl/dsaerr.h>
19 #include <openssl/dherr.h>
20 #include "internal/ffc.h"
21 
22 /* FIPS186-4 A.2.2 Unverifiable partial validation of Generator g */
ossl_ffc_params_validate_unverifiable_g(BN_CTX * ctx,BN_MONT_CTX * mont,const BIGNUM * p,const BIGNUM * q,const BIGNUM * g,BIGNUM * tmp,int * ret)23 int ossl_ffc_params_validate_unverifiable_g(BN_CTX *ctx, BN_MONT_CTX *mont,
24                                             const BIGNUM *p, const BIGNUM *q,
25                                             const BIGNUM *g, BIGNUM *tmp,
26                                             int *ret)
27 {
28     /*
29      * A.2.2 Step (1) AND
30      * A.2.4 Step (2)
31      * Verify that 2 <= g <= (p - 1)
32      */
33     if (BN_cmp(g, BN_value_one()) <= 0 || BN_cmp(g, p) >= 0) {
34         *ret |= FFC_ERROR_NOT_SUITABLE_GENERATOR;
35         return 0;
36     }
37 
38     /*
39      * A.2.2 Step (2) AND
40      * A.2.4 Step (3)
41      * Check g^q mod p = 1
42      */
43     if (!BN_mod_exp_mont(tmp, g, q, p, ctx, mont))
44         return 0;
45     if (BN_cmp(tmp, BN_value_one()) != 0) {
46         *ret |= FFC_ERROR_NOT_SUITABLE_GENERATOR;
47         return 0;
48     }
49     return 1;
50 }
51 
ossl_ffc_params_FIPS186_4_validate(OSSL_LIB_CTX * libctx,const FFC_PARAMS * params,int type,int * res,BN_GENCB * cb)52 int ossl_ffc_params_FIPS186_4_validate(OSSL_LIB_CTX *libctx,
53                                        const FFC_PARAMS *params, int type,
54                                        int *res, BN_GENCB *cb)
55 {
56     size_t L, N;
57 
58     if (params == NULL || params->p == NULL || params->q == NULL)
59         return FFC_PARAM_RET_STATUS_FAILED;
60 
61     /* A.1.1.3 Step (1..2) : L = len(p), N = len(q) */
62     L = BN_num_bits(params->p);
63     N = BN_num_bits(params->q);
64     return ossl_ffc_params_FIPS186_4_gen_verify(libctx, (FFC_PARAMS *)params,
65                                                 FFC_PARAM_MODE_VERIFY, type,
66                                                 L, N, res, cb);
67 }
68 
69 /* This may be used in FIPS mode to validate deprecated FIPS-186-2 Params */
ossl_ffc_params_FIPS186_2_validate(OSSL_LIB_CTX * libctx,const FFC_PARAMS * params,int type,int * res,BN_GENCB * cb)70 int ossl_ffc_params_FIPS186_2_validate(OSSL_LIB_CTX *libctx,
71                                        const FFC_PARAMS *params, int type,
72                                        int *res, BN_GENCB *cb)
73 {
74     size_t L, N;
75 
76     if (params == NULL || params->p == NULL || params->q == NULL) {
77         *res = FFC_CHECK_INVALID_PQ;
78         return FFC_PARAM_RET_STATUS_FAILED;
79     }
80 
81     /* A.1.1.3 Step (1..2) : L = len(p), N = len(q) */
82     L = BN_num_bits(params->p);
83     N = BN_num_bits(params->q);
84     return ossl_ffc_params_FIPS186_2_gen_verify(libctx, (FFC_PARAMS *)params,
85                                                 FFC_PARAM_MODE_VERIFY, type,
86                                                 L, N, res, cb);
87 }
88 
89 /*
90  * This does a simple check of L and N and partial g.
91  * It makes no attempt to do a full validation of p, q or g since these require
92  * extra parameters such as the digest and seed, which may not be available for
93  * this test.
94  */
ossl_ffc_params_simple_validate(OSSL_LIB_CTX * libctx,const FFC_PARAMS * params,int paramstype,int * res)95 int ossl_ffc_params_simple_validate(OSSL_LIB_CTX *libctx, const FFC_PARAMS *params,
96                                     int paramstype, int *res)
97 {
98     int ret;
99     int tmpres = 0;
100     FFC_PARAMS tmpparams = {0};
101 
102     if (params == NULL)
103         return 0;
104 
105     if (res == NULL)
106         res = &tmpres;
107 
108     if (!ossl_ffc_params_copy(&tmpparams, params))
109         return 0;
110 
111     tmpparams.flags = FFC_PARAM_FLAG_VALIDATE_G;
112     tmpparams.gindex = FFC_UNVERIFIABLE_GINDEX;
113 
114 #ifndef FIPS_MODULE
115     if (params->flags & FFC_PARAM_FLAG_VALIDATE_LEGACY)
116         ret = ossl_ffc_params_FIPS186_2_validate(libctx, &tmpparams, paramstype,
117                                                  res, NULL);
118     else
119 #endif
120         ret = ossl_ffc_params_FIPS186_4_validate(libctx, &tmpparams, paramstype,
121                                                  res, NULL);
122 #ifndef OPENSSL_NO_DH
123     if (ret == FFC_PARAM_RET_STATUS_FAILED
124         && (*res & FFC_ERROR_NOT_SUITABLE_GENERATOR) != 0) {
125         ERR_raise(ERR_LIB_DH, DH_R_NOT_SUITABLE_GENERATOR);
126     }
127 #endif
128 
129     ossl_ffc_params_cleanup(&tmpparams);
130 
131     return ret != FFC_PARAM_RET_STATUS_FAILED;
132 }
133 
134 /*
135  * If possible (or always in FIPS_MODULE) do full FIPS 186-4 validation.
136  * Otherwise do simple check but in addition also check the primality of the
137  * p and q.
138  */
ossl_ffc_params_full_validate(OSSL_LIB_CTX * libctx,const FFC_PARAMS * params,int paramstype,int * res)139 int ossl_ffc_params_full_validate(OSSL_LIB_CTX *libctx, const FFC_PARAMS *params,
140                                   int paramstype, int *res)
141 {
142     int tmpres = 0;
143 
144     if (params == NULL)
145         return 0;
146 
147     if (res == NULL)
148         res = &tmpres;
149 
150 #ifdef FIPS_MODULE
151     return ossl_ffc_params_FIPS186_4_validate(libctx, params, paramstype,
152                                               res, NULL);
153 #else
154     if (params->seed != NULL) {
155         if (params->flags & FFC_PARAM_FLAG_VALIDATE_LEGACY)
156             return ossl_ffc_params_FIPS186_2_validate(libctx, params, paramstype,
157                                                       res, NULL);
158         else
159             return ossl_ffc_params_FIPS186_4_validate(libctx, params, paramstype,
160                                                       res, NULL);
161     } else {
162         int ret = 0;
163 
164         ret = ossl_ffc_params_simple_validate(libctx, params, paramstype, res);
165         if (ret) {
166             BN_CTX *ctx;
167 
168             if ((ctx = BN_CTX_new_ex(libctx)) == NULL)
169                 return 0;
170             if (BN_check_prime(params->q, ctx, NULL) != 1) {
171 # ifndef OPENSSL_NO_DSA
172                 ERR_raise(ERR_LIB_DSA, DSA_R_Q_NOT_PRIME);
173 # endif
174                 ret = 0;
175             }
176             if (ret && BN_check_prime(params->p, ctx, NULL) != 1) {
177 # ifndef OPENSSL_NO_DSA
178                 ERR_raise(ERR_LIB_DSA, DSA_R_P_NOT_PRIME);
179 # endif
180                 ret = 0;
181             }
182             BN_CTX_free(ctx);
183         }
184         return ret;
185     }
186 #endif
187 }
188