Workaround the panic, triggered by the netgraph attempting to
[dragonfly.git] / crypto / openssh-3.9p1 / dh.c
blob044d869fb8838934bbc88cb8fc635bbbfd1235f1
1 /*
2 * Copyright (c) 2000 Niels Provos. All rights reserved.
4 * Redistribution and use in source and binary forms, with or without
5 * modification, are permitted provided that the following conditions
6 * are met:
7 * 1. Redistributions of source code must retain the above copyright
8 * notice, this list of conditions and the following disclaimer.
9 * 2. Redistributions in binary form must reproduce the above copyright
10 * notice, this list of conditions and the following disclaimer in the
11 * documentation and/or other materials provided with the distribution.
13 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
14 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
15 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
16 * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
17 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
18 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
19 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
20 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
21 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
22 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
25 #include "includes.h"
26 RCSID("$OpenBSD: dh.c,v 1.31 2004/08/04 10:37:52 djm Exp $");
28 #include "xmalloc.h"
30 #include <openssl/bn.h>
31 #include <openssl/dh.h>
32 #include <openssl/evp.h>
34 #include "buffer.h"
35 #include "cipher.h"
36 #include "kex.h"
37 #include "dh.h"
38 #include "pathnames.h"
39 #include "log.h"
40 #include "misc.h"
42 static int
43 parse_prime(int linenum, char *line, struct dhgroup *dhg)
45 char *cp, *arg;
46 char *strsize, *gen, *prime;
48 cp = line;
49 arg = strdelim(&cp);
50 /* Ignore leading whitespace */
51 if (*arg == '\0')
52 arg = strdelim(&cp);
53 if (!arg || !*arg || *arg == '#')
54 return 0;
56 /* time */
57 if (cp == NULL || *arg == '\0')
58 goto fail;
59 arg = strsep(&cp, " "); /* type */
60 if (cp == NULL || *arg == '\0')
61 goto fail;
62 arg = strsep(&cp, " "); /* tests */
63 if (cp == NULL || *arg == '\0')
64 goto fail;
65 arg = strsep(&cp, " "); /* tries */
66 if (cp == NULL || *arg == '\0')
67 goto fail;
68 strsize = strsep(&cp, " "); /* size */
69 if (cp == NULL || *strsize == '\0' ||
70 (dhg->size = atoi(strsize)) == 0)
71 goto fail;
72 /* The whole group is one bit larger */
73 dhg->size++;
74 gen = strsep(&cp, " "); /* gen */
75 if (cp == NULL || *gen == '\0')
76 goto fail;
77 prime = strsep(&cp, " "); /* prime */
78 if (cp != NULL || *prime == '\0')
79 goto fail;
81 if ((dhg->g = BN_new()) == NULL)
82 fatal("parse_prime: BN_new failed");
83 if ((dhg->p = BN_new()) == NULL)
84 fatal("parse_prime: BN_new failed");
85 if (BN_hex2bn(&dhg->g, gen) == 0)
86 goto failclean;
88 if (BN_hex2bn(&dhg->p, prime) == 0)
89 goto failclean;
91 if (BN_num_bits(dhg->p) != dhg->size)
92 goto failclean;
94 if (BN_is_zero(dhg->g) || BN_is_one(dhg->g))
95 goto failclean;
97 return (1);
99 failclean:
100 BN_clear_free(dhg->g);
101 BN_clear_free(dhg->p);
102 fail:
103 error("Bad prime description in line %d", linenum);
104 return (0);
107 DH *
108 choose_dh(int min, int wantbits, int max)
110 FILE *f;
111 char line[4096];
112 int best, bestcount, which;
113 int linenum;
114 struct dhgroup dhg;
116 if ((f = fopen(_PATH_DH_MODULI, "r")) == NULL &&
117 (f = fopen(_PATH_DH_PRIMES, "r")) == NULL) {
118 logit("WARNING: %s does not exist, using fixed modulus",
119 _PATH_DH_MODULI);
120 return (dh_new_group14());
123 linenum = 0;
124 best = bestcount = 0;
125 while (fgets(line, sizeof(line), f)) {
126 linenum++;
127 if (!parse_prime(linenum, line, &dhg))
128 continue;
129 BN_clear_free(dhg.g);
130 BN_clear_free(dhg.p);
132 if (dhg.size > max || dhg.size < min)
133 continue;
135 if ((dhg.size > wantbits && dhg.size < best) ||
136 (dhg.size > best && best < wantbits)) {
137 best = dhg.size;
138 bestcount = 0;
140 if (dhg.size == best)
141 bestcount++;
143 rewind(f);
145 if (bestcount == 0) {
146 fclose(f);
147 logit("WARNING: no suitable primes in %s", _PATH_DH_PRIMES);
148 return (dh_new_group14());
151 linenum = 0;
152 which = arc4random() % bestcount;
153 while (fgets(line, sizeof(line), f)) {
154 if (!parse_prime(linenum, line, &dhg))
155 continue;
156 if ((dhg.size > max || dhg.size < min) ||
157 dhg.size != best ||
158 linenum++ != which) {
159 BN_clear_free(dhg.g);
160 BN_clear_free(dhg.p);
161 continue;
163 break;
165 fclose(f);
166 if (linenum != which+1)
167 fatal("WARNING: line %d disappeared in %s, giving up",
168 which, _PATH_DH_PRIMES);
170 return (dh_new_group(dhg.g, dhg.p));
173 /* diffie-hellman-groupN-sha1 */
176 dh_pub_is_valid(DH *dh, BIGNUM *dh_pub)
178 int i;
179 int n = BN_num_bits(dh_pub);
180 int bits_set = 0;
182 if (dh_pub->neg) {
183 logit("invalid public DH value: negativ");
184 return 0;
186 for (i = 0; i <= n; i++)
187 if (BN_is_bit_set(dh_pub, i))
188 bits_set++;
189 debug2("bits set: %d/%d", bits_set, BN_num_bits(dh->p));
191 /* if g==2 and bits_set==1 then computing log_g(dh_pub) is trivial */
192 if (bits_set > 1 && (BN_cmp(dh_pub, dh->p) == -1))
193 return 1;
194 logit("invalid public DH value (%d/%d)", bits_set, BN_num_bits(dh->p));
195 return 0;
198 void
199 dh_gen_key(DH *dh, int need)
201 int i, bits_set, tries = 0;
203 if (dh->p == NULL)
204 fatal("dh_gen_key: dh->p == NULL");
205 if (need > INT_MAX / 2 || 2 * need >= BN_num_bits(dh->p))
206 fatal("dh_gen_key: group too small: %d (2*need %d)",
207 BN_num_bits(dh->p), 2*need);
208 do {
209 if (dh->priv_key != NULL)
210 BN_clear_free(dh->priv_key);
211 if ((dh->priv_key = BN_new()) == NULL)
212 fatal("dh_gen_key: BN_new failed");
213 /* generate a 2*need bits random private exponent */
214 if (!BN_rand(dh->priv_key, 2*need, 0, 0))
215 fatal("dh_gen_key: BN_rand failed");
216 if (DH_generate_key(dh) == 0)
217 fatal("DH_generate_key");
218 for (i = 0, bits_set = 0; i <= BN_num_bits(dh->priv_key); i++)
219 if (BN_is_bit_set(dh->priv_key, i))
220 bits_set++;
221 debug2("dh_gen_key: priv key bits set: %d/%d",
222 bits_set, BN_num_bits(dh->priv_key));
223 if (tries++ > 10)
224 fatal("dh_gen_key: too many bad keys: giving up");
225 } while (!dh_pub_is_valid(dh, dh->pub_key));
228 DH *
229 dh_new_group_asc(const char *gen, const char *modulus)
231 DH *dh;
233 if ((dh = DH_new()) == NULL)
234 fatal("dh_new_group_asc: DH_new");
236 if (BN_hex2bn(&dh->p, modulus) == 0)
237 fatal("BN_hex2bn p");
238 if (BN_hex2bn(&dh->g, gen) == 0)
239 fatal("BN_hex2bn g");
241 return (dh);
245 * This just returns the group, we still need to generate the exchange
246 * value.
249 DH *
250 dh_new_group(BIGNUM *gen, BIGNUM *modulus)
252 DH *dh;
254 if ((dh = DH_new()) == NULL)
255 fatal("dh_new_group: DH_new");
256 dh->p = modulus;
257 dh->g = gen;
259 return (dh);
262 DH *
263 dh_new_group1(void)
265 static char *gen = "2", *group1 =
266 "FFFFFFFF" "FFFFFFFF" "C90FDAA2" "2168C234" "C4C6628B" "80DC1CD1"
267 "29024E08" "8A67CC74" "020BBEA6" "3B139B22" "514A0879" "8E3404DD"
268 "EF9519B3" "CD3A431B" "302B0A6D" "F25F1437" "4FE1356D" "6D51C245"
269 "E485B576" "625E7EC6" "F44C42E9" "A637ED6B" "0BFF5CB6" "F406B7ED"
270 "EE386BFB" "5A899FA5" "AE9F2411" "7C4B1FE6" "49286651" "ECE65381"
271 "FFFFFFFF" "FFFFFFFF";
273 return (dh_new_group_asc(gen, group1));
276 DH *
277 dh_new_group14(void)
279 static char *gen = "2", *group14 =
280 "FFFFFFFF" "FFFFFFFF" "C90FDAA2" "2168C234" "C4C6628B" "80DC1CD1"
281 "29024E08" "8A67CC74" "020BBEA6" "3B139B22" "514A0879" "8E3404DD"
282 "EF9519B3" "CD3A431B" "302B0A6D" "F25F1437" "4FE1356D" "6D51C245"
283 "E485B576" "625E7EC6" "F44C42E9" "A637ED6B" "0BFF5CB6" "F406B7ED"
284 "EE386BFB" "5A899FA5" "AE9F2411" "7C4B1FE6" "49286651" "ECE45B3D"
285 "C2007CB8" "A163BF05" "98DA4836" "1C55D39A" "69163FA8" "FD24CF5F"
286 "83655D23" "DCA3AD96" "1C62F356" "208552BB" "9ED52907" "7096966D"
287 "670C354E" "4ABC9804" "F1746C08" "CA18217C" "32905E46" "2E36CE3B"
288 "E39E772C" "180E8603" "9B2783A2" "EC07A28F" "B5C55DF0" "6F4C52C9"
289 "DE2BCBF6" "95581718" "3995497C" "EA956AE5" "15D22618" "98FA0510"
290 "15728E5A" "8AACAA68" "FFFFFFFF" "FFFFFFFF";
292 return (dh_new_group_asc(gen, group14));
296 * Estimates the group order for a Diffie-Hellman group that has an
297 * attack complexity approximately the same as O(2**bits). Estimate
298 * with: O(exp(1.9223 * (ln q)^(1/3) (ln ln q)^(2/3)))
302 dh_estimate(int bits)
305 if (bits <= 128)
306 return (1024); /* O(2**86) */
307 if (bits <= 192)
308 return (2048); /* O(2**116) */
309 return (4096); /* O(2**156) */