aria2/src/LibsslDHKeyExchange.h

184 lines
5.3 KiB
C++

/* <!-- copyright */
/*
* aria2 - The high speed download utility
*
* Copyright (C) 2006 Tatsuhiro Tsujikawa
*
* This program is free software; you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation; either version 2 of the License, or
* (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program; if not, write to the Free Software
* Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
*
* In addition, as a special exception, the copyright holders give
* permission to link the code of portions of this program with the
* OpenSSL library under certain conditions as described in each
* individual source file, and distribute linked combinations
* including the two.
* You must obey the GNU General Public License in all respects
* for all of the code used other than OpenSSL. If you modify
* file(s) with this exception, you may extend this exception to your
* version of the file(s), but you are not obligated to do so. If you
* do not wish to do so, delete this exception statement from your
* version. If you delete this exception statement from all source
* files in the program, then also delete it here.
*/
/* copyright --> */
#ifndef _D_LIBSSL_DH_KEY_EXCHANGE_H_
#define _D_LIBSSL_DH_KEY_EXCHANGE_H_
#include "common.h"
#include "DlAbortEx.h"
#include "StringFormat.h"
#include <cstring>
#include <openssl/dh.h>
#include <openssl/rand.h>
#include <openssl/err.h>
namespace aria2 {
class DHKeyExchange {
private:
BN_CTX* _bnCtx;
size_t _keyLength;
BIGNUM* _prime;
BIGNUM* _generator;
BIGNUM* _privateKey;
BIGNUM* _publicKey;
void handleError(const std::string& funName) const
{
throw DlAbortEx
(StringFormat("Exception in libssl routine %s(DHKeyExchange class): %s",
funName.c_str(), ERR_error_string(ERR_get_error(), 0)).str());
}
public:
DHKeyExchange():_bnCtx(0),
_keyLength(0),
_prime(0),
_generator(0),
_privateKey(0),
_publicKey(0) {}
~DHKeyExchange()
{
BN_CTX_free(_bnCtx);
BN_free(_prime);
BN_free(_generator);
BN_free(_privateKey);
BN_free(_publicKey);
}
void init(const unsigned char* prime, size_t primeBits,
const unsigned char* generator,
size_t privateKeyBits)
{
BN_CTX_free(_bnCtx);
_bnCtx = BN_CTX_new();
if(!_bnCtx) {
handleError("BN_CTX_new in init");
}
BN_free(_prime);
_prime = 0;
BN_free(_generator);
_generator = 0;
BN_free(_privateKey);
_privateKey = 0;
if(BN_hex2bn(&_prime, reinterpret_cast<const char*>(prime)) == 0) {
handleError("BN_hex2bn in init");
}
if(BN_hex2bn(&_generator, reinterpret_cast<const char*>(generator)) == 0) {
handleError("BN_hex2bn in init");
}
_privateKey = BN_new();
if(BN_rand(_privateKey, privateKeyBits, -1, false) == 0) {
handleError("BN_new in init");
}
_keyLength = (primeBits+7)/8;
}
void generatePublicKey()
{
BN_free(_publicKey);
_publicKey = BN_new();
BN_mod_exp(_publicKey, _generator, _privateKey, _prime, _bnCtx);
}
size_t getPublicKey(unsigned char* out, size_t outLength) const
{
if(outLength < _keyLength) {
throw DlAbortEx
(StringFormat("Insufficient buffer for public key. expect:%u, actual:%u",
_keyLength, outLength).str());
}
memset(out, 0, outLength);
size_t publicKeyBytes = BN_num_bytes(_publicKey);
size_t offset = _keyLength-publicKeyBytes;
size_t nwritten = BN_bn2bin(_publicKey, out+offset);
if(nwritten != publicKeyBytes) {
throw DlAbortEx
(StringFormat("BN_bn2bin in DHKeyExchange::getPublicKey, %u bytes written, but %u bytes expected.", nwritten, publicKeyBytes).str());
}
return nwritten;
}
void generateNonce(unsigned char* out, size_t outLength) const
{
if(RAND_bytes(out, outLength) != 1) {
handleError("RAND_bytes in generateNonce");
}
}
size_t computeSecret(unsigned char* out, size_t outLength,
const unsigned char* peerPublicKeyData,
size_t peerPublicKeyLength) const
{
if(outLength < _keyLength) {
throw DlAbortEx
(StringFormat("Insufficient buffer for secret. expect:%u, actual:%u",
_keyLength, outLength).str());
}
BIGNUM* peerPublicKey = BN_bin2bn(peerPublicKeyData, peerPublicKeyLength, 0);
if(!peerPublicKey) {
handleError("BN_bin2bn in computeSecret");
}
BIGNUM* secret = BN_new();
BN_mod_exp(secret, peerPublicKey, _privateKey, _prime, _bnCtx);
BN_free(peerPublicKey);
memset(out, 0, outLength);
size_t secretBytes = BN_num_bytes(secret);
size_t offset = _keyLength-secretBytes;
size_t nwritten = BN_bn2bin(secret, out+offset);
BN_free(secret);
if(nwritten != secretBytes) {
throw DlAbortEx
(StringFormat("BN_bn2bin in DHKeyExchange::getPublicKey, %u bytes written, but %u bytes expected.", nwritten, secretBytes).str());
}
return nwritten;
}
};
} // namespace aria2
#endif // _D_LIBSSL_DH_KEY_EXCHANGE_H_