Skip to content

Commit 802c7f1

Browse files
Salvatore Benedettoherbertx
authored andcommitted
crypto: dh - Add DH software implementation
* Implement MPI based Diffie-Hellman under kpp API * Test provided uses data generad by OpenSSL Signed-off-by: Salvatore Benedetto <[email protected]> Signed-off-by: Herbert Xu <[email protected]>
1 parent 4e5f2c4 commit 802c7f1

File tree

8 files changed

+700
-0
lines changed

8 files changed

+700
-0
lines changed

crypto/Kconfig

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -111,6 +111,14 @@ config CRYPTO_RSA
111111
help
112112
Generic implementation of the RSA public key algorithm.
113113

114+
config CRYPTO_DH
115+
tristate "Diffie-Hellman algorithm"
116+
select CRYPTO_KPP
117+
select MPILIB
118+
help
119+
Generic implementation of the Diffie-Hellman algorithm.
120+
121+
114122
config CRYPTO_MANAGER
115123
tristate "Cryptographic algorithm manager"
116124
select CRYPTO_MANAGER2

crypto/Makefile

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -32,6 +32,10 @@ obj-$(CONFIG_CRYPTO_HASH2) += crypto_hash.o
3232
obj-$(CONFIG_CRYPTO_AKCIPHER2) += akcipher.o
3333
obj-$(CONFIG_CRYPTO_KPP2) += kpp.o
3434

35+
dh_generic-y := dh.o
36+
dh_generic-y += dh_helper.o
37+
obj-$(CONFIG_CRYPTO_DH) += dh_generic.o
38+
3539
$(obj)/rsapubkey-asn1.o: $(obj)/rsapubkey-asn1.c $(obj)/rsapubkey-asn1.h
3640
$(obj)/rsaprivkey-asn1.o: $(obj)/rsaprivkey-asn1.c $(obj)/rsaprivkey-asn1.h
3741
clean-files += rsapubkey-asn1.c rsapubkey-asn1.h

crypto/dh.c

Lines changed: 189 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,189 @@
1+
/* Diffie-Hellman Key Agreement Method [RFC2631]
2+
*
3+
* Copyright (c) 2016, Intel Corporation
4+
* Authors: Salvatore Benedetto <[email protected]>
5+
*
6+
* This program is free software; you can redistribute it and/or
7+
* modify it under the terms of the GNU General Public Licence
8+
* as published by the Free Software Foundation; either version
9+
* 2 of the Licence, or (at your option) any later version.
10+
*/
11+
12+
#include <linux/module.h>
13+
#include <crypto/internal/kpp.h>
14+
#include <crypto/kpp.h>
15+
#include <crypto/dh.h>
16+
#include <linux/mpi.h>
17+
18+
struct dh_ctx {
19+
MPI p;
20+
MPI g;
21+
MPI xa;
22+
};
23+
24+
static inline void dh_clear_params(struct dh_ctx *ctx)
25+
{
26+
mpi_free(ctx->p);
27+
mpi_free(ctx->g);
28+
ctx->p = NULL;
29+
ctx->g = NULL;
30+
}
31+
32+
static void dh_free_ctx(struct dh_ctx *ctx)
33+
{
34+
dh_clear_params(ctx);
35+
mpi_free(ctx->xa);
36+
ctx->xa = NULL;
37+
}
38+
39+
/*
40+
* If base is g we compute the public key
41+
* ya = g^xa mod p; [RFC2631 sec 2.1.1]
42+
* else if base if the counterpart public key we compute the shared secret
43+
* ZZ = yb^xa mod p; [RFC2631 sec 2.1.1]
44+
*/
45+
static int _compute_val(const struct dh_ctx *ctx, MPI base, MPI val)
46+
{
47+
/* val = base^xa mod p */
48+
return mpi_powm(val, base, ctx->xa, ctx->p);
49+
}
50+
51+
static inline struct dh_ctx *dh_get_ctx(struct crypto_kpp *tfm)
52+
{
53+
return kpp_tfm_ctx(tfm);
54+
}
55+
56+
static int dh_check_params_length(unsigned int p_len)
57+
{
58+
return (p_len < 1536) ? -EINVAL : 0;
59+
}
60+
61+
static int dh_set_params(struct dh_ctx *ctx, struct dh *params)
62+
{
63+
if (unlikely(!params->p || !params->g))
64+
return -EINVAL;
65+
66+
if (dh_check_params_length(params->p_size << 3))
67+
return -EINVAL;
68+
69+
ctx->p = mpi_read_raw_data(params->p, params->p_size);
70+
if (!ctx->p)
71+
return -EINVAL;
72+
73+
ctx->g = mpi_read_raw_data(params->g, params->g_size);
74+
if (!ctx->g) {
75+
mpi_free(ctx->p);
76+
return -EINVAL;
77+
}
78+
79+
return 0;
80+
}
81+
82+
static int dh_set_secret(struct crypto_kpp *tfm, void *buf, unsigned int len)
83+
{
84+
struct dh_ctx *ctx = dh_get_ctx(tfm);
85+
struct dh params;
86+
87+
if (crypto_dh_decode_key(buf, len, &params) < 0)
88+
return -EINVAL;
89+
90+
if (dh_set_params(ctx, &params) < 0)
91+
return -EINVAL;
92+
93+
ctx->xa = mpi_read_raw_data(params.key, params.key_size);
94+
if (!ctx->xa) {
95+
dh_clear_params(ctx);
96+
return -EINVAL;
97+
}
98+
99+
return 0;
100+
}
101+
102+
static int dh_compute_value(struct kpp_request *req)
103+
{
104+
struct crypto_kpp *tfm = crypto_kpp_reqtfm(req);
105+
struct dh_ctx *ctx = dh_get_ctx(tfm);
106+
MPI base, val = mpi_alloc(0);
107+
int ret = 0;
108+
int sign;
109+
110+
if (!val)
111+
return -ENOMEM;
112+
113+
if (unlikely(!ctx->xa)) {
114+
ret = -EINVAL;
115+
goto err_free_val;
116+
}
117+
118+
if (req->src) {
119+
base = mpi_read_raw_from_sgl(req->src, req->src_len);
120+
if (!base) {
121+
ret = EINVAL;
122+
goto err_free_val;
123+
}
124+
} else {
125+
base = ctx->g;
126+
}
127+
128+
ret = _compute_val(ctx, base, val);
129+
if (ret)
130+
goto err_free_base;
131+
132+
ret = mpi_write_to_sgl(val, req->dst, &req->dst_len, &sign);
133+
if (ret)
134+
goto err_free_base;
135+
136+
if (sign < 0)
137+
ret = -EBADMSG;
138+
err_free_base:
139+
if (req->src)
140+
mpi_free(base);
141+
err_free_val:
142+
mpi_free(val);
143+
return ret;
144+
}
145+
146+
static int dh_max_size(struct crypto_kpp *tfm)
147+
{
148+
struct dh_ctx *ctx = dh_get_ctx(tfm);
149+
150+
return mpi_get_size(ctx->p);
151+
}
152+
153+
static void dh_exit_tfm(struct crypto_kpp *tfm)
154+
{
155+
struct dh_ctx *ctx = dh_get_ctx(tfm);
156+
157+
dh_free_ctx(ctx);
158+
}
159+
160+
static struct kpp_alg dh = {
161+
.set_secret = dh_set_secret,
162+
.generate_public_key = dh_compute_value,
163+
.compute_shared_secret = dh_compute_value,
164+
.max_size = dh_max_size,
165+
.exit = dh_exit_tfm,
166+
.base = {
167+
.cra_name = "dh",
168+
.cra_driver_name = "dh-generic",
169+
.cra_priority = 100,
170+
.cra_module = THIS_MODULE,
171+
.cra_ctxsize = sizeof(struct dh_ctx),
172+
},
173+
};
174+
175+
static int dh_init(void)
176+
{
177+
return crypto_register_kpp(&dh);
178+
}
179+
180+
static void dh_exit(void)
181+
{
182+
crypto_unregister_kpp(&dh);
183+
}
184+
185+
module_init(dh_init);
186+
module_exit(dh_exit);
187+
MODULE_ALIAS_CRYPTO("dh");
188+
MODULE_LICENSE("GPL");
189+
MODULE_DESCRIPTION("DH generic algorithm");

crypto/dh_helper.c

Lines changed: 95 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,95 @@
1+
/*
2+
* Copyright (c) 2016, Intel Corporation
3+
* Authors: Salvatore Benedetto <[email protected]>
4+
*
5+
* This program is free software; you can redistribute it and/or
6+
* modify it under the terms of the GNU General Public Licence
7+
* as published by the Free Software Foundation; either version
8+
* 2 of the Licence, or (at your option) any later version.
9+
*/
10+
#include <linux/kernel.h>
11+
#include <linux/export.h>
12+
#include <linux/err.h>
13+
#include <linux/string.h>
14+
#include <crypto/dh.h>
15+
#include <crypto/kpp.h>
16+
17+
#define DH_KPP_SECRET_MIN_SIZE (sizeof(struct kpp_secret) + 3 * sizeof(int))
18+
19+
static inline u8 *dh_pack_data(void *dst, const void *src, size_t size)
20+
{
21+
memcpy(dst, src, size);
22+
return dst + size;
23+
}
24+
25+
static inline const u8 *dh_unpack_data(void *dst, const void *src, size_t size)
26+
{
27+
memcpy(dst, src, size);
28+
return src + size;
29+
}
30+
31+
static inline int dh_data_size(const struct dh *p)
32+
{
33+
return p->key_size + p->p_size + p->g_size;
34+
}
35+
36+
int crypto_dh_key_len(const struct dh *p)
37+
{
38+
return DH_KPP_SECRET_MIN_SIZE + dh_data_size(p);
39+
}
40+
EXPORT_SYMBOL_GPL(crypto_dh_key_len);
41+
42+
int crypto_dh_encode_key(char *buf, unsigned int len, const struct dh *params)
43+
{
44+
u8 *ptr = buf;
45+
struct kpp_secret secret = {
46+
.type = CRYPTO_KPP_SECRET_TYPE_DH,
47+
.len = len
48+
};
49+
50+
if (unlikely(!buf))
51+
return -EINVAL;
52+
53+
if (len != crypto_dh_key_len(params))
54+
return -EINVAL;
55+
56+
ptr = dh_pack_data(ptr, &secret, sizeof(secret));
57+
ptr = dh_pack_data(ptr, &params->key_size, sizeof(params->key_size));
58+
ptr = dh_pack_data(ptr, &params->p_size, sizeof(params->p_size));
59+
ptr = dh_pack_data(ptr, &params->g_size, sizeof(params->g_size));
60+
ptr = dh_pack_data(ptr, params->key, params->key_size);
61+
ptr = dh_pack_data(ptr, params->p, params->p_size);
62+
dh_pack_data(ptr, params->g, params->g_size);
63+
64+
return 0;
65+
}
66+
EXPORT_SYMBOL_GPL(crypto_dh_encode_key);
67+
68+
int crypto_dh_decode_key(const char *buf, unsigned int len, struct dh *params)
69+
{
70+
const u8 *ptr = buf;
71+
struct kpp_secret secret;
72+
73+
if (unlikely(!buf || len < DH_KPP_SECRET_MIN_SIZE))
74+
return -EINVAL;
75+
76+
ptr = dh_unpack_data(&secret, ptr, sizeof(secret));
77+
if (secret.type != CRYPTO_KPP_SECRET_TYPE_DH)
78+
return -EINVAL;
79+
80+
ptr = dh_unpack_data(&params->key_size, ptr, sizeof(params->key_size));
81+
ptr = dh_unpack_data(&params->p_size, ptr, sizeof(params->p_size));
82+
ptr = dh_unpack_data(&params->g_size, ptr, sizeof(params->g_size));
83+
if (secret.len != crypto_dh_key_len(params))
84+
return -EINVAL;
85+
86+
/* Don't allocate memory. Set pointers to data within
87+
* the given buffer
88+
*/
89+
params->key = (void *)ptr;
90+
params->p = (void *)(ptr + params->key_size);
91+
params->g = (void *)(ptr + params->key_size + params->p_size);
92+
93+
return 0;
94+
}
95+
EXPORT_SYMBOL_GPL(crypto_dh_decode_key);

0 commit comments

Comments
 (0)