]>
Commit | Line | Data |
---|---|---|
2874c5fd | 1 | // SPDX-License-Identifier: GPL-2.0-or-later |
802c7f1c SB |
2 | /* Diffie-Hellman Key Agreement Method [RFC2631] |
3 | * | |
4 | * Copyright (c) 2016, Intel Corporation | |
5 | * Authors: Salvatore Benedetto <[email protected]> | |
802c7f1c SB |
6 | */ |
7 | ||
1e146c39 | 8 | #include <linux/fips.h> |
802c7f1c SB |
9 | #include <linux/module.h> |
10 | #include <crypto/internal/kpp.h> | |
11 | #include <crypto/kpp.h> | |
12 | #include <crypto/dh.h> | |
1e207964 | 13 | #include <crypto/rng.h> |
802c7f1c SB |
14 | #include <linux/mpi.h> |
15 | ||
16 | struct dh_ctx { | |
e3fe0ae1 | 17 | MPI p; /* Value is guaranteed to be set. */ |
e3fe0ae1 SM |
18 | MPI g; /* Value is guaranteed to be set. */ |
19 | MPI xa; /* Value is guaranteed to be set. */ | |
802c7f1c SB |
20 | }; |
21 | ||
12d41a02 | 22 | static void dh_clear_ctx(struct dh_ctx *ctx) |
802c7f1c SB |
23 | { |
24 | mpi_free(ctx->p); | |
25 | mpi_free(ctx->g); | |
802c7f1c | 26 | mpi_free(ctx->xa); |
12d41a02 | 27 | memset(ctx, 0, sizeof(*ctx)); |
802c7f1c SB |
28 | } |
29 | ||
30 | /* | |
31 | * If base is g we compute the public key | |
32 | * ya = g^xa mod p; [RFC2631 sec 2.1.1] | |
33 | * else if base if the counterpart public key we compute the shared secret | |
34 | * ZZ = yb^xa mod p; [RFC2631 sec 2.1.1] | |
35 | */ | |
36 | static int _compute_val(const struct dh_ctx *ctx, MPI base, MPI val) | |
37 | { | |
38 | /* val = base^xa mod p */ | |
39 | return mpi_powm(val, base, ctx->xa, ctx->p); | |
40 | } | |
41 | ||
42 | static inline struct dh_ctx *dh_get_ctx(struct crypto_kpp *tfm) | |
43 | { | |
44 | return kpp_tfm_ctx(tfm); | |
45 | } | |
46 | ||
47 | static int dh_check_params_length(unsigned int p_len) | |
48 | { | |
1e146c39 SM |
49 | if (fips_enabled) |
50 | return (p_len < 2048) ? -EINVAL : 0; | |
51 | ||
802c7f1c SB |
52 | return (p_len < 1536) ? -EINVAL : 0; |
53 | } | |
54 | ||
55 | static int dh_set_params(struct dh_ctx *ctx, struct dh *params) | |
56 | { | |
802c7f1c SB |
57 | if (dh_check_params_length(params->p_size << 3)) |
58 | return -EINVAL; | |
59 | ||
60 | ctx->p = mpi_read_raw_data(params->p, params->p_size); | |
61 | if (!ctx->p) | |
62 | return -EINVAL; | |
63 | ||
64 | ctx->g = mpi_read_raw_data(params->g, params->g_size); | |
12d41a02 | 65 | if (!ctx->g) |
802c7f1c | 66 | return -EINVAL; |
802c7f1c SB |
67 | |
68 | return 0; | |
69 | } | |
70 | ||
5527dfb6 EB |
71 | static int dh_set_secret(struct crypto_kpp *tfm, const void *buf, |
72 | unsigned int len) | |
802c7f1c SB |
73 | { |
74 | struct dh_ctx *ctx = dh_get_ctx(tfm); | |
75 | struct dh params; | |
76 | ||
ee34e264 | 77 | /* Free the old MPI key if any */ |
12d41a02 | 78 | dh_clear_ctx(ctx); |
ee34e264 | 79 | |
802c7f1c | 80 | if (crypto_dh_decode_key(buf, len, ¶ms) < 0) |
12d41a02 | 81 | goto err_clear_ctx; |
802c7f1c SB |
82 | |
83 | if (dh_set_params(ctx, ¶ms) < 0) | |
12d41a02 | 84 | goto err_clear_ctx; |
802c7f1c SB |
85 | |
86 | ctx->xa = mpi_read_raw_data(params.key, params.key_size); | |
12d41a02 EB |
87 | if (!ctx->xa) |
88 | goto err_clear_ctx; | |
802c7f1c SB |
89 | |
90 | return 0; | |
12d41a02 EB |
91 | |
92 | err_clear_ctx: | |
93 | dh_clear_ctx(ctx); | |
94 | return -EINVAL; | |
802c7f1c SB |
95 | } |
96 | ||
e3fe0ae1 SM |
97 | /* |
98 | * SP800-56A public key verification: | |
99 | * | |
35d2bf20 NS |
100 | * * For the safe-prime groups in FIPS mode, Q can be computed |
101 | * trivially from P and a full validation according to SP800-56A | |
102 | * section 5.6.2.3.1 is performed. | |
e3fe0ae1 | 103 | * |
35d2bf20 NS |
104 | * * For all other sets of group parameters, only a partial validation |
105 | * according to SP800-56A section 5.6.2.3.2 is performed. | |
e3fe0ae1 SM |
106 | */ |
107 | static int dh_is_pubkey_valid(struct dh_ctx *ctx, MPI y) | |
108 | { | |
109 | if (unlikely(!ctx->p)) | |
110 | return -EINVAL; | |
111 | ||
112 | /* | |
113 | * Step 1: Verify that 2 <= y <= p - 2. | |
114 | * | |
115 | * The upper limit check is actually y < p instead of y < p - 1 | |
35d2bf20 NS |
116 | * in order to save one mpi_sub_ui() invocation here. Note that |
117 | * p - 1 is the non-trivial element of the subgroup of order 2 and | |
118 | * thus, the check on y^q below would fail if y == p - 1. | |
e3fe0ae1 SM |
119 | */ |
120 | if (mpi_cmp_ui(y, 1) < 1 || mpi_cmp(y, ctx->p) >= 0) | |
121 | return -EINVAL; | |
122 | ||
35d2bf20 NS |
123 | /* |
124 | * Step 2: Verify that 1 = y^q mod p | |
125 | * | |
126 | * For the safe-prime groups q = (p - 1)/2. | |
127 | */ | |
128 | if (fips_enabled) { | |
129 | MPI val, q; | |
e3fe0ae1 SM |
130 | int ret; |
131 | ||
35d2bf20 | 132 | val = mpi_alloc(0); |
e3fe0ae1 SM |
133 | if (!val) |
134 | return -ENOMEM; | |
135 | ||
35d2bf20 NS |
136 | q = mpi_alloc(mpi_get_nlimbs(ctx->p)); |
137 | if (!q) { | |
138 | mpi_free(val); | |
139 | return -ENOMEM; | |
140 | } | |
141 | ||
142 | /* | |
143 | * ->p is odd, so no need to explicitly subtract one | |
144 | * from it before shifting to the right. | |
145 | */ | |
146 | mpi_rshift(q, ctx->p, 1); | |
e3fe0ae1 | 147 | |
35d2bf20 NS |
148 | ret = mpi_powm(val, y, q, ctx->p); |
149 | mpi_free(q); | |
e3fe0ae1 SM |
150 | if (ret) { |
151 | mpi_free(val); | |
152 | return ret; | |
153 | } | |
154 | ||
155 | ret = mpi_cmp_ui(val, 1); | |
156 | ||
157 | mpi_free(val); | |
158 | ||
159 | if (ret != 0) | |
160 | return -EINVAL; | |
161 | } | |
162 | ||
163 | return 0; | |
164 | } | |
165 | ||
802c7f1c SB |
166 | static int dh_compute_value(struct kpp_request *req) |
167 | { | |
168 | struct crypto_kpp *tfm = crypto_kpp_reqtfm(req); | |
169 | struct dh_ctx *ctx = dh_get_ctx(tfm); | |
170 | MPI base, val = mpi_alloc(0); | |
171 | int ret = 0; | |
172 | int sign; | |
173 | ||
174 | if (!val) | |
175 | return -ENOMEM; | |
176 | ||
177 | if (unlikely(!ctx->xa)) { | |
178 | ret = -EINVAL; | |
179 | goto err_free_val; | |
180 | } | |
181 | ||
182 | if (req->src) { | |
183 | base = mpi_read_raw_from_sgl(req->src, req->src_len); | |
184 | if (!base) { | |
8edda7d2 | 185 | ret = -EINVAL; |
802c7f1c SB |
186 | goto err_free_val; |
187 | } | |
e3fe0ae1 SM |
188 | ret = dh_is_pubkey_valid(ctx, base); |
189 | if (ret) | |
3fd8093b | 190 | goto err_free_base; |
802c7f1c SB |
191 | } else { |
192 | base = ctx->g; | |
193 | } | |
194 | ||
195 | ret = _compute_val(ctx, base, val); | |
196 | if (ret) | |
197 | goto err_free_base; | |
198 | ||
2ed5ba61 SM |
199 | if (fips_enabled) { |
200 | /* SP800-56A rev3 5.7.1.1 check: Validation of shared secret */ | |
201 | if (req->src) { | |
202 | MPI pone; | |
203 | ||
204 | /* z <= 1 */ | |
205 | if (mpi_cmp_ui(val, 1) < 1) { | |
206 | ret = -EBADMSG; | |
207 | goto err_free_base; | |
208 | } | |
209 | ||
210 | /* z == p - 1 */ | |
211 | pone = mpi_alloc(0); | |
212 | ||
213 | if (!pone) { | |
214 | ret = -ENOMEM; | |
215 | goto err_free_base; | |
216 | } | |
217 | ||
218 | ret = mpi_sub_ui(pone, ctx->p, 1); | |
219 | if (!ret && !mpi_cmp(pone, val)) | |
220 | ret = -EBADMSG; | |
221 | ||
222 | mpi_free(pone); | |
223 | ||
224 | if (ret) | |
225 | goto err_free_base; | |
226 | ||
227 | /* SP800-56A rev 3 5.6.2.1.3 key check */ | |
228 | } else { | |
229 | if (dh_is_pubkey_valid(ctx, val)) { | |
230 | ret = -EAGAIN; | |
231 | goto err_free_val; | |
232 | } | |
90fa9ae5 | 233 | } |
90fa9ae5 SM |
234 | } |
235 | ||
9b45b7bb | 236 | ret = mpi_write_to_sgl(val, req->dst, req->dst_len, &sign); |
802c7f1c SB |
237 | if (ret) |
238 | goto err_free_base; | |
239 | ||
240 | if (sign < 0) | |
241 | ret = -EBADMSG; | |
242 | err_free_base: | |
243 | if (req->src) | |
244 | mpi_free(base); | |
245 | err_free_val: | |
246 | mpi_free(val); | |
247 | return ret; | |
248 | } | |
249 | ||
7f691050 | 250 | static unsigned int dh_max_size(struct crypto_kpp *tfm) |
802c7f1c SB |
251 | { |
252 | struct dh_ctx *ctx = dh_get_ctx(tfm); | |
253 | ||
254 | return mpi_get_size(ctx->p); | |
255 | } | |
256 | ||
257 | static void dh_exit_tfm(struct crypto_kpp *tfm) | |
258 | { | |
259 | struct dh_ctx *ctx = dh_get_ctx(tfm); | |
260 | ||
12d41a02 | 261 | dh_clear_ctx(ctx); |
802c7f1c SB |
262 | } |
263 | ||
264 | static struct kpp_alg dh = { | |
265 | .set_secret = dh_set_secret, | |
266 | .generate_public_key = dh_compute_value, | |
267 | .compute_shared_secret = dh_compute_value, | |
268 | .max_size = dh_max_size, | |
269 | .exit = dh_exit_tfm, | |
270 | .base = { | |
271 | .cra_name = "dh", | |
272 | .cra_driver_name = "dh-generic", | |
273 | .cra_priority = 100, | |
274 | .cra_module = THIS_MODULE, | |
275 | .cra_ctxsize = sizeof(struct dh_ctx), | |
276 | }, | |
277 | }; | |
278 | ||
d902981f NS |
279 | |
280 | struct dh_safe_prime { | |
281 | unsigned int max_strength; | |
282 | unsigned int p_size; | |
283 | const char *p; | |
284 | }; | |
285 | ||
286 | static const char safe_prime_g[] = { 2 }; | |
287 | ||
288 | struct dh_safe_prime_instance_ctx { | |
289 | struct crypto_kpp_spawn dh_spawn; | |
290 | const struct dh_safe_prime *safe_prime; | |
291 | }; | |
292 | ||
293 | struct dh_safe_prime_tfm_ctx { | |
294 | struct crypto_kpp *dh_tfm; | |
295 | }; | |
296 | ||
297 | static void dh_safe_prime_free_instance(struct kpp_instance *inst) | |
298 | { | |
299 | struct dh_safe_prime_instance_ctx *ctx = kpp_instance_ctx(inst); | |
300 | ||
301 | crypto_drop_kpp(&ctx->dh_spawn); | |
302 | kfree(inst); | |
303 | } | |
304 | ||
305 | static inline struct dh_safe_prime_instance_ctx *dh_safe_prime_instance_ctx( | |
306 | struct crypto_kpp *tfm) | |
307 | { | |
308 | return kpp_instance_ctx(kpp_alg_instance(tfm)); | |
309 | } | |
310 | ||
d902981f NS |
311 | static int dh_safe_prime_init_tfm(struct crypto_kpp *tfm) |
312 | { | |
313 | struct dh_safe_prime_instance_ctx *inst_ctx = | |
314 | dh_safe_prime_instance_ctx(tfm); | |
315 | struct dh_safe_prime_tfm_ctx *tfm_ctx = kpp_tfm_ctx(tfm); | |
316 | ||
317 | tfm_ctx->dh_tfm = crypto_spawn_kpp(&inst_ctx->dh_spawn); | |
318 | if (IS_ERR(tfm_ctx->dh_tfm)) | |
319 | return PTR_ERR(tfm_ctx->dh_tfm); | |
320 | ||
321 | return 0; | |
322 | } | |
323 | ||
324 | static void dh_safe_prime_exit_tfm(struct crypto_kpp *tfm) | |
325 | { | |
326 | struct dh_safe_prime_tfm_ctx *tfm_ctx = kpp_tfm_ctx(tfm); | |
327 | ||
328 | crypto_free_kpp(tfm_ctx->dh_tfm); | |
329 | } | |
330 | ||
1e207964 NS |
331 | static u64 __add_u64_to_be(__be64 *dst, unsigned int n, u64 val) |
332 | { | |
333 | unsigned int i; | |
334 | ||
335 | for (i = n; val && i > 0; --i) { | |
336 | u64 tmp = be64_to_cpu(dst[i - 1]); | |
337 | ||
338 | tmp += val; | |
339 | val = tmp >= val ? 0 : 1; | |
340 | dst[i - 1] = cpu_to_be64(tmp); | |
341 | } | |
342 | ||
343 | return val; | |
344 | } | |
345 | ||
346 | static void *dh_safe_prime_gen_privkey(const struct dh_safe_prime *safe_prime, | |
347 | unsigned int *key_size) | |
348 | { | |
349 | unsigned int n, oversampling_size; | |
350 | __be64 *key; | |
351 | int err; | |
352 | u64 h, o; | |
353 | ||
354 | /* | |
355 | * Generate a private key following NIST SP800-56Ar3, | |
356 | * sec. 5.6.1.1.1 and 5.6.1.1.3 resp.. | |
357 | * | |
358 | * 5.6.1.1.1: choose key length N such that | |
359 | * 2 * ->max_strength <= N <= log2(q) + 1 = ->p_size * 8 - 1 | |
360 | * with q = (p - 1) / 2 for the safe-prime groups. | |
361 | * Choose the lower bound's next power of two for N in order to | |
362 | * avoid excessively large private keys while still | |
363 | * maintaining some extra reserve beyond the bare minimum in | |
364 | * most cases. Note that for each entry in safe_prime_groups[], | |
365 | * the following holds for such N: | |
366 | * - N >= 256, in particular it is a multiple of 2^6 = 64 | |
367 | * bits and | |
368 | * - N < log2(q) + 1, i.e. N respects the upper bound. | |
369 | */ | |
370 | n = roundup_pow_of_two(2 * safe_prime->max_strength); | |
371 | WARN_ON_ONCE(n & ((1u << 6) - 1)); | |
372 | n >>= 6; /* Convert N into units of u64. */ | |
373 | ||
374 | /* | |
375 | * Reserve one extra u64 to hold the extra random bits | |
376 | * required as per 5.6.1.1.3. | |
377 | */ | |
378 | oversampling_size = (n + 1) * sizeof(__be64); | |
379 | key = kmalloc(oversampling_size, GFP_KERNEL); | |
380 | if (!key) | |
381 | return ERR_PTR(-ENOMEM); | |
382 | ||
383 | /* | |
384 | * 5.6.1.1.3, step 3 (and implicitly step 4): obtain N + 64 | |
385 | * random bits and interpret them as a big endian integer. | |
386 | */ | |
387 | err = -EFAULT; | |
388 | if (crypto_get_default_rng()) | |
389 | goto out_err; | |
390 | ||
391 | err = crypto_rng_get_bytes(crypto_default_rng, (u8 *)key, | |
392 | oversampling_size); | |
393 | crypto_put_default_rng(); | |
394 | if (err) | |
395 | goto out_err; | |
396 | ||
397 | /* | |
398 | * 5.6.1.1.3, step 5 is implicit: 2^N < q and thus, | |
399 | * M = min(2^N, q) = 2^N. | |
400 | * | |
401 | * For step 6, calculate | |
402 | * key = (key[] mod (M - 1)) + 1 = (key[] mod (2^N - 1)) + 1. | |
403 | * | |
404 | * In order to avoid expensive divisions, note that | |
405 | * 2^N mod (2^N - 1) = 1 and thus, for any integer h, | |
406 | * 2^N * h mod (2^N - 1) = h mod (2^N - 1) always holds. | |
407 | * The big endian integer key[] composed of n + 1 64bit words | |
408 | * may be written as key[] = h * 2^N + l, with h = key[0] | |
409 | * representing the 64 most significant bits and l | |
410 | * corresponding to the remaining 2^N bits. With the remark | |
411 | * from above, | |
412 | * h * 2^N + l mod (2^N - 1) = l + h mod (2^N - 1). | |
413 | * As both, l and h are less than 2^N, their sum after | |
414 | * this first reduction is guaranteed to be <= 2^(N + 1) - 2. | |
415 | * Or equivalently, that their sum can again be written as | |
416 | * h' * 2^N + l' with h' now either zero or one and if one, | |
417 | * then l' <= 2^N - 2. Thus, all bits at positions >= N will | |
418 | * be zero after a second reduction: | |
419 | * h' * 2^N + l' mod (2^N - 1) = l' + h' mod (2^N - 1). | |
420 | * At this point, it is still possible that | |
421 | * l' + h' = 2^N - 1, i.e. that l' + h' mod (2^N - 1) | |
422 | * is zero. This condition will be detected below by means of | |
423 | * the final increment overflowing in this case. | |
424 | */ | |
425 | h = be64_to_cpu(key[0]); | |
426 | h = __add_u64_to_be(key + 1, n, h); | |
427 | h = __add_u64_to_be(key + 1, n, h); | |
428 | WARN_ON_ONCE(h); | |
429 | ||
430 | /* Increment to obtain the final result. */ | |
431 | o = __add_u64_to_be(key + 1, n, 1); | |
432 | /* | |
433 | * The overflow bit o from the increment is either zero or | |
434 | * one. If zero, key[1:n] holds the final result in big-endian | |
435 | * order. If one, key[1:n] is zero now, but needs to be set to | |
436 | * one, c.f. above. | |
437 | */ | |
438 | if (o) | |
439 | key[n] = cpu_to_be64(1); | |
440 | ||
441 | /* n is in units of u64, convert to bytes. */ | |
442 | *key_size = n << 3; | |
443 | /* Strip the leading extra __be64, which is (virtually) zero by now. */ | |
444 | memmove(key, &key[1], *key_size); | |
445 | ||
446 | return key; | |
447 | ||
448 | out_err: | |
449 | kfree_sensitive(key); | |
450 | return ERR_PTR(err); | |
451 | } | |
452 | ||
d902981f NS |
453 | static int dh_safe_prime_set_secret(struct crypto_kpp *tfm, const void *buffer, |
454 | unsigned int len) | |
455 | { | |
456 | struct dh_safe_prime_instance_ctx *inst_ctx = | |
457 | dh_safe_prime_instance_ctx(tfm); | |
458 | struct dh_safe_prime_tfm_ctx *tfm_ctx = kpp_tfm_ctx(tfm); | |
c8e8236c | 459 | struct dh params = {}; |
1e207964 | 460 | void *buf = NULL, *key = NULL; |
d902981f NS |
461 | unsigned int buf_size; |
462 | int err; | |
463 | ||
c8e8236c NS |
464 | if (buffer) { |
465 | err = __crypto_dh_decode_key(buffer, len, ¶ms); | |
466 | if (err) | |
467 | return err; | |
468 | if (params.p_size || params.g_size) | |
469 | return -EINVAL; | |
470 | } | |
d902981f NS |
471 | |
472 | params.p = inst_ctx->safe_prime->p; | |
473 | params.p_size = inst_ctx->safe_prime->p_size; | |
474 | params.g = safe_prime_g; | |
475 | params.g_size = sizeof(safe_prime_g); | |
476 | ||
1e207964 NS |
477 | if (!params.key_size) { |
478 | key = dh_safe_prime_gen_privkey(inst_ctx->safe_prime, | |
479 | ¶ms.key_size); | |
480 | if (IS_ERR(key)) | |
481 | return PTR_ERR(key); | |
482 | params.key = key; | |
483 | } | |
484 | ||
d902981f NS |
485 | buf_size = crypto_dh_key_len(¶ms); |
486 | buf = kmalloc(buf_size, GFP_KERNEL); | |
1e207964 NS |
487 | if (!buf) { |
488 | err = -ENOMEM; | |
489 | goto out; | |
490 | } | |
d902981f NS |
491 | |
492 | err = crypto_dh_encode_key(buf, buf_size, ¶ms); | |
493 | if (err) | |
494 | goto out; | |
495 | ||
496 | err = crypto_kpp_set_secret(tfm_ctx->dh_tfm, buf, buf_size); | |
497 | out: | |
498 | kfree_sensitive(buf); | |
1e207964 | 499 | kfree_sensitive(key); |
d902981f NS |
500 | return err; |
501 | } | |
502 | ||
503 | static void dh_safe_prime_complete_req(struct crypto_async_request *dh_req, | |
504 | int err) | |
505 | { | |
506 | struct kpp_request *req = dh_req->data; | |
507 | ||
508 | kpp_request_complete(req, err); | |
509 | } | |
510 | ||
511 | static struct kpp_request *dh_safe_prime_prepare_dh_req(struct kpp_request *req) | |
512 | { | |
513 | struct dh_safe_prime_tfm_ctx *tfm_ctx = | |
514 | kpp_tfm_ctx(crypto_kpp_reqtfm(req)); | |
515 | struct kpp_request *dh_req = kpp_request_ctx(req); | |
516 | ||
517 | kpp_request_set_tfm(dh_req, tfm_ctx->dh_tfm); | |
518 | kpp_request_set_callback(dh_req, req->base.flags, | |
519 | dh_safe_prime_complete_req, req); | |
520 | ||
521 | kpp_request_set_input(dh_req, req->src, req->src_len); | |
522 | kpp_request_set_output(dh_req, req->dst, req->dst_len); | |
523 | ||
524 | return dh_req; | |
525 | } | |
526 | ||
527 | static int dh_safe_prime_generate_public_key(struct kpp_request *req) | |
528 | { | |
529 | struct kpp_request *dh_req = dh_safe_prime_prepare_dh_req(req); | |
530 | ||
531 | return crypto_kpp_generate_public_key(dh_req); | |
532 | } | |
533 | ||
534 | static int dh_safe_prime_compute_shared_secret(struct kpp_request *req) | |
535 | { | |
536 | struct kpp_request *dh_req = dh_safe_prime_prepare_dh_req(req); | |
537 | ||
538 | return crypto_kpp_compute_shared_secret(dh_req); | |
539 | } | |
540 | ||
541 | static unsigned int dh_safe_prime_max_size(struct crypto_kpp *tfm) | |
542 | { | |
543 | struct dh_safe_prime_tfm_ctx *tfm_ctx = kpp_tfm_ctx(tfm); | |
544 | ||
545 | return crypto_kpp_maxsize(tfm_ctx->dh_tfm); | |
546 | } | |
547 | ||
548 | static int __maybe_unused __dh_safe_prime_create( | |
549 | struct crypto_template *tmpl, struct rtattr **tb, | |
550 | const struct dh_safe_prime *safe_prime) | |
551 | { | |
552 | struct kpp_instance *inst; | |
553 | struct dh_safe_prime_instance_ctx *ctx; | |
554 | const char *dh_name; | |
555 | struct kpp_alg *dh_alg; | |
556 | u32 mask; | |
557 | int err; | |
558 | ||
559 | err = crypto_check_attr_type(tb, CRYPTO_ALG_TYPE_KPP, &mask); | |
560 | if (err) | |
561 | return err; | |
562 | ||
563 | dh_name = crypto_attr_alg_name(tb[1]); | |
564 | if (IS_ERR(dh_name)) | |
565 | return PTR_ERR(dh_name); | |
566 | ||
567 | inst = kzalloc(sizeof(*inst) + sizeof(*ctx), GFP_KERNEL); | |
568 | if (!inst) | |
569 | return -ENOMEM; | |
570 | ||
571 | ctx = kpp_instance_ctx(inst); | |
572 | ||
573 | err = crypto_grab_kpp(&ctx->dh_spawn, kpp_crypto_instance(inst), | |
574 | dh_name, 0, mask); | |
575 | if (err) | |
576 | goto err_free_inst; | |
577 | ||
578 | err = -EINVAL; | |
579 | dh_alg = crypto_spawn_kpp_alg(&ctx->dh_spawn); | |
580 | if (strcmp(dh_alg->base.cra_name, "dh")) | |
581 | goto err_free_inst; | |
582 | ||
583 | ctx->safe_prime = safe_prime; | |
584 | ||
585 | err = crypto_inst_setname(kpp_crypto_instance(inst), | |
586 | tmpl->name, &dh_alg->base); | |
587 | if (err) | |
588 | goto err_free_inst; | |
589 | ||
590 | inst->alg.set_secret = dh_safe_prime_set_secret; | |
591 | inst->alg.generate_public_key = dh_safe_prime_generate_public_key; | |
592 | inst->alg.compute_shared_secret = dh_safe_prime_compute_shared_secret; | |
593 | inst->alg.max_size = dh_safe_prime_max_size; | |
594 | inst->alg.init = dh_safe_prime_init_tfm; | |
595 | inst->alg.exit = dh_safe_prime_exit_tfm; | |
596 | inst->alg.reqsize = sizeof(struct kpp_request) + dh_alg->reqsize; | |
597 | inst->alg.base.cra_priority = dh_alg->base.cra_priority; | |
598 | inst->alg.base.cra_module = THIS_MODULE; | |
599 | inst->alg.base.cra_ctxsize = sizeof(struct dh_safe_prime_tfm_ctx); | |
600 | ||
601 | inst->free = dh_safe_prime_free_instance; | |
602 | ||
603 | err = kpp_register_instance(tmpl, inst); | |
604 | if (err) | |
605 | goto err_free_inst; | |
606 | ||
607 | return 0; | |
608 | ||
609 | err_free_inst: | |
610 | dh_safe_prime_free_instance(inst); | |
611 | ||
612 | return err; | |
613 | } | |
614 | ||
7dce5981 NS |
615 | #ifdef CONFIG_CRYPTO_DH_RFC7919_GROUPS |
616 | ||
617 | static const struct dh_safe_prime ffdhe2048_prime = { | |
618 | .max_strength = 112, | |
619 | .p_size = 256, | |
620 | .p = | |
621 | "\xff\xff\xff\xff\xff\xff\xff\xff\xad\xf8\x54\x58\xa2\xbb\x4a\x9a" | |
622 | "\xaf\xdc\x56\x20\x27\x3d\x3c\xf1\xd8\xb9\xc5\x83\xce\x2d\x36\x95" | |
623 | "\xa9\xe1\x36\x41\x14\x64\x33\xfb\xcc\x93\x9d\xce\x24\x9b\x3e\xf9" | |
624 | "\x7d\x2f\xe3\x63\x63\x0c\x75\xd8\xf6\x81\xb2\x02\xae\xc4\x61\x7a" | |
625 | "\xd3\xdf\x1e\xd5\xd5\xfd\x65\x61\x24\x33\xf5\x1f\x5f\x06\x6e\xd0" | |
626 | "\x85\x63\x65\x55\x3d\xed\x1a\xf3\xb5\x57\x13\x5e\x7f\x57\xc9\x35" | |
627 | "\x98\x4f\x0c\x70\xe0\xe6\x8b\x77\xe2\xa6\x89\xda\xf3\xef\xe8\x72" | |
628 | "\x1d\xf1\x58\xa1\x36\xad\xe7\x35\x30\xac\xca\x4f\x48\x3a\x79\x7a" | |
629 | "\xbc\x0a\xb1\x82\xb3\x24\xfb\x61\xd1\x08\xa9\x4b\xb2\xc8\xe3\xfb" | |
630 | "\xb9\x6a\xda\xb7\x60\xd7\xf4\x68\x1d\x4f\x42\xa3\xde\x39\x4d\xf4" | |
631 | "\xae\x56\xed\xe7\x63\x72\xbb\x19\x0b\x07\xa7\xc8\xee\x0a\x6d\x70" | |
632 | "\x9e\x02\xfc\xe1\xcd\xf7\xe2\xec\xc0\x34\x04\xcd\x28\x34\x2f\x61" | |
633 | "\x91\x72\xfe\x9c\xe9\x85\x83\xff\x8e\x4f\x12\x32\xee\xf2\x81\x83" | |
634 | "\xc3\xfe\x3b\x1b\x4c\x6f\xad\x73\x3b\xb5\xfc\xbc\x2e\xc2\x20\x05" | |
635 | "\xc5\x8e\xf1\x83\x7d\x16\x83\xb2\xc6\xf3\x4a\x26\xc1\xb2\xef\xfa" | |
636 | "\x88\x6b\x42\x38\x61\x28\x5c\x97\xff\xff\xff\xff\xff\xff\xff\xff", | |
637 | }; | |
638 | ||
639 | static const struct dh_safe_prime ffdhe3072_prime = { | |
640 | .max_strength = 128, | |
641 | .p_size = 384, | |
642 | .p = | |
643 | "\xff\xff\xff\xff\xff\xff\xff\xff\xad\xf8\x54\x58\xa2\xbb\x4a\x9a" | |
644 | "\xaf\xdc\x56\x20\x27\x3d\x3c\xf1\xd8\xb9\xc5\x83\xce\x2d\x36\x95" | |
645 | "\xa9\xe1\x36\x41\x14\x64\x33\xfb\xcc\x93\x9d\xce\x24\x9b\x3e\xf9" | |
646 | "\x7d\x2f\xe3\x63\x63\x0c\x75\xd8\xf6\x81\xb2\x02\xae\xc4\x61\x7a" | |
647 | "\xd3\xdf\x1e\xd5\xd5\xfd\x65\x61\x24\x33\xf5\x1f\x5f\x06\x6e\xd0" | |
648 | "\x85\x63\x65\x55\x3d\xed\x1a\xf3\xb5\x57\x13\x5e\x7f\x57\xc9\x35" | |
649 | "\x98\x4f\x0c\x70\xe0\xe6\x8b\x77\xe2\xa6\x89\xda\xf3\xef\xe8\x72" | |
650 | "\x1d\xf1\x58\xa1\x36\xad\xe7\x35\x30\xac\xca\x4f\x48\x3a\x79\x7a" | |
651 | "\xbc\x0a\xb1\x82\xb3\x24\xfb\x61\xd1\x08\xa9\x4b\xb2\xc8\xe3\xfb" | |
652 | "\xb9\x6a\xda\xb7\x60\xd7\xf4\x68\x1d\x4f\x42\xa3\xde\x39\x4d\xf4" | |
653 | "\xae\x56\xed\xe7\x63\x72\xbb\x19\x0b\x07\xa7\xc8\xee\x0a\x6d\x70" | |
654 | "\x9e\x02\xfc\xe1\xcd\xf7\xe2\xec\xc0\x34\x04\xcd\x28\x34\x2f\x61" | |
655 | "\x91\x72\xfe\x9c\xe9\x85\x83\xff\x8e\x4f\x12\x32\xee\xf2\x81\x83" | |
656 | "\xc3\xfe\x3b\x1b\x4c\x6f\xad\x73\x3b\xb5\xfc\xbc\x2e\xc2\x20\x05" | |
657 | "\xc5\x8e\xf1\x83\x7d\x16\x83\xb2\xc6\xf3\x4a\x26\xc1\xb2\xef\xfa" | |
658 | "\x88\x6b\x42\x38\x61\x1f\xcf\xdc\xde\x35\x5b\x3b\x65\x19\x03\x5b" | |
659 | "\xbc\x34\xf4\xde\xf9\x9c\x02\x38\x61\xb4\x6f\xc9\xd6\xe6\xc9\x07" | |
660 | "\x7a\xd9\x1d\x26\x91\xf7\xf7\xee\x59\x8c\xb0\xfa\xc1\x86\xd9\x1c" | |
661 | "\xae\xfe\x13\x09\x85\x13\x92\x70\xb4\x13\x0c\x93\xbc\x43\x79\x44" | |
662 | "\xf4\xfd\x44\x52\xe2\xd7\x4d\xd3\x64\xf2\xe2\x1e\x71\xf5\x4b\xff" | |
663 | "\x5c\xae\x82\xab\x9c\x9d\xf6\x9e\xe8\x6d\x2b\xc5\x22\x36\x3a\x0d" | |
664 | "\xab\xc5\x21\x97\x9b\x0d\xea\xda\x1d\xbf\x9a\x42\xd5\xc4\x48\x4e" | |
665 | "\x0a\xbc\xd0\x6b\xfa\x53\xdd\xef\x3c\x1b\x20\xee\x3f\xd5\x9d\x7c" | |
666 | "\x25\xe4\x1d\x2b\x66\xc6\x2e\x37\xff\xff\xff\xff\xff\xff\xff\xff", | |
667 | }; | |
668 | ||
669 | static const struct dh_safe_prime ffdhe4096_prime = { | |
670 | .max_strength = 152, | |
671 | .p_size = 512, | |
672 | .p = | |
673 | "\xff\xff\xff\xff\xff\xff\xff\xff\xad\xf8\x54\x58\xa2\xbb\x4a\x9a" | |
674 | "\xaf\xdc\x56\x20\x27\x3d\x3c\xf1\xd8\xb9\xc5\x83\xce\x2d\x36\x95" | |
675 | "\xa9\xe1\x36\x41\x14\x64\x33\xfb\xcc\x93\x9d\xce\x24\x9b\x3e\xf9" | |
676 | "\x7d\x2f\xe3\x63\x63\x0c\x75\xd8\xf6\x81\xb2\x02\xae\xc4\x61\x7a" | |
677 | "\xd3\xdf\x1e\xd5\xd5\xfd\x65\x61\x24\x33\xf5\x1f\x5f\x06\x6e\xd0" | |
678 | "\x85\x63\x65\x55\x3d\xed\x1a\xf3\xb5\x57\x13\x5e\x7f\x57\xc9\x35" | |
679 | "\x98\x4f\x0c\x70\xe0\xe6\x8b\x77\xe2\xa6\x89\xda\xf3\xef\xe8\x72" | |
680 | "\x1d\xf1\x58\xa1\x36\xad\xe7\x35\x30\xac\xca\x4f\x48\x3a\x79\x7a" | |
681 | "\xbc\x0a\xb1\x82\xb3\x24\xfb\x61\xd1\x08\xa9\x4b\xb2\xc8\xe3\xfb" | |
682 | "\xb9\x6a\xda\xb7\x60\xd7\xf4\x68\x1d\x4f\x42\xa3\xde\x39\x4d\xf4" | |
683 | "\xae\x56\xed\xe7\x63\x72\xbb\x19\x0b\x07\xa7\xc8\xee\x0a\x6d\x70" | |
684 | "\x9e\x02\xfc\xe1\xcd\xf7\xe2\xec\xc0\x34\x04\xcd\x28\x34\x2f\x61" | |
685 | "\x91\x72\xfe\x9c\xe9\x85\x83\xff\x8e\x4f\x12\x32\xee\xf2\x81\x83" | |
686 | "\xc3\xfe\x3b\x1b\x4c\x6f\xad\x73\x3b\xb5\xfc\xbc\x2e\xc2\x20\x05" | |
687 | "\xc5\x8e\xf1\x83\x7d\x16\x83\xb2\xc6\xf3\x4a\x26\xc1\xb2\xef\xfa" | |
688 | "\x88\x6b\x42\x38\x61\x1f\xcf\xdc\xde\x35\x5b\x3b\x65\x19\x03\x5b" | |
689 | "\xbc\x34\xf4\xde\xf9\x9c\x02\x38\x61\xb4\x6f\xc9\xd6\xe6\xc9\x07" | |
690 | "\x7a\xd9\x1d\x26\x91\xf7\xf7\xee\x59\x8c\xb0\xfa\xc1\x86\xd9\x1c" | |
691 | "\xae\xfe\x13\x09\x85\x13\x92\x70\xb4\x13\x0c\x93\xbc\x43\x79\x44" | |
692 | "\xf4\xfd\x44\x52\xe2\xd7\x4d\xd3\x64\xf2\xe2\x1e\x71\xf5\x4b\xff" | |
693 | "\x5c\xae\x82\xab\x9c\x9d\xf6\x9e\xe8\x6d\x2b\xc5\x22\x36\x3a\x0d" | |
694 | "\xab\xc5\x21\x97\x9b\x0d\xea\xda\x1d\xbf\x9a\x42\xd5\xc4\x48\x4e" | |
695 | "\x0a\xbc\xd0\x6b\xfa\x53\xdd\xef\x3c\x1b\x20\xee\x3f\xd5\x9d\x7c" | |
696 | "\x25\xe4\x1d\x2b\x66\x9e\x1e\xf1\x6e\x6f\x52\xc3\x16\x4d\xf4\xfb" | |
697 | "\x79\x30\xe9\xe4\xe5\x88\x57\xb6\xac\x7d\x5f\x42\xd6\x9f\x6d\x18" | |
698 | "\x77\x63\xcf\x1d\x55\x03\x40\x04\x87\xf5\x5b\xa5\x7e\x31\xcc\x7a" | |
699 | "\x71\x35\xc8\x86\xef\xb4\x31\x8a\xed\x6a\x1e\x01\x2d\x9e\x68\x32" | |
700 | "\xa9\x07\x60\x0a\x91\x81\x30\xc4\x6d\xc7\x78\xf9\x71\xad\x00\x38" | |
701 | "\x09\x29\x99\xa3\x33\xcb\x8b\x7a\x1a\x1d\xb9\x3d\x71\x40\x00\x3c" | |
702 | "\x2a\x4e\xce\xa9\xf9\x8d\x0a\xcc\x0a\x82\x91\xcd\xce\xc9\x7d\xcf" | |
703 | "\x8e\xc9\xb5\x5a\x7f\x88\xa4\x6b\x4d\xb5\xa8\x51\xf4\x41\x82\xe1" | |
704 | "\xc6\x8a\x00\x7e\x5e\x65\x5f\x6a\xff\xff\xff\xff\xff\xff\xff\xff", | |
705 | }; | |
706 | ||
707 | static const struct dh_safe_prime ffdhe6144_prime = { | |
708 | .max_strength = 176, | |
709 | .p_size = 768, | |
710 | .p = | |
711 | "\xff\xff\xff\xff\xff\xff\xff\xff\xad\xf8\x54\x58\xa2\xbb\x4a\x9a" | |
712 | "\xaf\xdc\x56\x20\x27\x3d\x3c\xf1\xd8\xb9\xc5\x83\xce\x2d\x36\x95" | |
713 | "\xa9\xe1\x36\x41\x14\x64\x33\xfb\xcc\x93\x9d\xce\x24\x9b\x3e\xf9" | |
714 | "\x7d\x2f\xe3\x63\x63\x0c\x75\xd8\xf6\x81\xb2\x02\xae\xc4\x61\x7a" | |
715 | "\xd3\xdf\x1e\xd5\xd5\xfd\x65\x61\x24\x33\xf5\x1f\x5f\x06\x6e\xd0" | |
716 | "\x85\x63\x65\x55\x3d\xed\x1a\xf3\xb5\x57\x13\x5e\x7f\x57\xc9\x35" | |
717 | "\x98\x4f\x0c\x70\xe0\xe6\x8b\x77\xe2\xa6\x89\xda\xf3\xef\xe8\x72" | |
718 | "\x1d\xf1\x58\xa1\x36\xad\xe7\x35\x30\xac\xca\x4f\x48\x3a\x79\x7a" | |
719 | "\xbc\x0a\xb1\x82\xb3\x24\xfb\x61\xd1\x08\xa9\x4b\xb2\xc8\xe3\xfb" | |
720 | "\xb9\x6a\xda\xb7\x60\xd7\xf4\x68\x1d\x4f\x42\xa3\xde\x39\x4d\xf4" | |
721 | "\xae\x56\xed\xe7\x63\x72\xbb\x19\x0b\x07\xa7\xc8\xee\x0a\x6d\x70" | |
722 | "\x9e\x02\xfc\xe1\xcd\xf7\xe2\xec\xc0\x34\x04\xcd\x28\x34\x2f\x61" | |
723 | "\x91\x72\xfe\x9c\xe9\x85\x83\xff\x8e\x4f\x12\x32\xee\xf2\x81\x83" | |
724 | "\xc3\xfe\x3b\x1b\x4c\x6f\xad\x73\x3b\xb5\xfc\xbc\x2e\xc2\x20\x05" | |
725 | "\xc5\x8e\xf1\x83\x7d\x16\x83\xb2\xc6\xf3\x4a\x26\xc1\xb2\xef\xfa" | |
726 | "\x88\x6b\x42\x38\x61\x1f\xcf\xdc\xde\x35\x5b\x3b\x65\x19\x03\x5b" | |
727 | "\xbc\x34\xf4\xde\xf9\x9c\x02\x38\x61\xb4\x6f\xc9\xd6\xe6\xc9\x07" | |
728 | "\x7a\xd9\x1d\x26\x91\xf7\xf7\xee\x59\x8c\xb0\xfa\xc1\x86\xd9\x1c" | |
729 | "\xae\xfe\x13\x09\x85\x13\x92\x70\xb4\x13\x0c\x93\xbc\x43\x79\x44" | |
730 | "\xf4\xfd\x44\x52\xe2\xd7\x4d\xd3\x64\xf2\xe2\x1e\x71\xf5\x4b\xff" | |
731 | "\x5c\xae\x82\xab\x9c\x9d\xf6\x9e\xe8\x6d\x2b\xc5\x22\x36\x3a\x0d" | |
732 | "\xab\xc5\x21\x97\x9b\x0d\xea\xda\x1d\xbf\x9a\x42\xd5\xc4\x48\x4e" | |
733 | "\x0a\xbc\xd0\x6b\xfa\x53\xdd\xef\x3c\x1b\x20\xee\x3f\xd5\x9d\x7c" | |
734 | "\x25\xe4\x1d\x2b\x66\x9e\x1e\xf1\x6e\x6f\x52\xc3\x16\x4d\xf4\xfb" | |
735 | "\x79\x30\xe9\xe4\xe5\x88\x57\xb6\xac\x7d\x5f\x42\xd6\x9f\x6d\x18" | |
736 | "\x77\x63\xcf\x1d\x55\x03\x40\x04\x87\xf5\x5b\xa5\x7e\x31\xcc\x7a" | |
737 | "\x71\x35\xc8\x86\xef\xb4\x31\x8a\xed\x6a\x1e\x01\x2d\x9e\x68\x32" | |
738 | "\xa9\x07\x60\x0a\x91\x81\x30\xc4\x6d\xc7\x78\xf9\x71\xad\x00\x38" | |
739 | "\x09\x29\x99\xa3\x33\xcb\x8b\x7a\x1a\x1d\xb9\x3d\x71\x40\x00\x3c" | |
740 | "\x2a\x4e\xce\xa9\xf9\x8d\x0a\xcc\x0a\x82\x91\xcd\xce\xc9\x7d\xcf" | |
741 | "\x8e\xc9\xb5\x5a\x7f\x88\xa4\x6b\x4d\xb5\xa8\x51\xf4\x41\x82\xe1" | |
742 | "\xc6\x8a\x00\x7e\x5e\x0d\xd9\x02\x0b\xfd\x64\xb6\x45\x03\x6c\x7a" | |
743 | "\x4e\x67\x7d\x2c\x38\x53\x2a\x3a\x23\xba\x44\x42\xca\xf5\x3e\xa6" | |
744 | "\x3b\xb4\x54\x32\x9b\x76\x24\xc8\x91\x7b\xdd\x64\xb1\xc0\xfd\x4c" | |
745 | "\xb3\x8e\x8c\x33\x4c\x70\x1c\x3a\xcd\xad\x06\x57\xfc\xcf\xec\x71" | |
746 | "\x9b\x1f\x5c\x3e\x4e\x46\x04\x1f\x38\x81\x47\xfb\x4c\xfd\xb4\x77" | |
747 | "\xa5\x24\x71\xf7\xa9\xa9\x69\x10\xb8\x55\x32\x2e\xdb\x63\x40\xd8" | |
748 | "\xa0\x0e\xf0\x92\x35\x05\x11\xe3\x0a\xbe\xc1\xff\xf9\xe3\xa2\x6e" | |
749 | "\x7f\xb2\x9f\x8c\x18\x30\x23\xc3\x58\x7e\x38\xda\x00\x77\xd9\xb4" | |
750 | "\x76\x3e\x4e\x4b\x94\xb2\xbb\xc1\x94\xc6\x65\x1e\x77\xca\xf9\x92" | |
751 | "\xee\xaa\xc0\x23\x2a\x28\x1b\xf6\xb3\xa7\x39\xc1\x22\x61\x16\x82" | |
752 | "\x0a\xe8\xdb\x58\x47\xa6\x7c\xbe\xf9\xc9\x09\x1b\x46\x2d\x53\x8c" | |
753 | "\xd7\x2b\x03\x74\x6a\xe7\x7f\x5e\x62\x29\x2c\x31\x15\x62\xa8\x46" | |
754 | "\x50\x5d\xc8\x2d\xb8\x54\x33\x8a\xe4\x9f\x52\x35\xc9\x5b\x91\x17" | |
755 | "\x8c\xcf\x2d\xd5\xca\xce\xf4\x03\xec\x9d\x18\x10\xc6\x27\x2b\x04" | |
756 | "\x5b\x3b\x71\xf9\xdc\x6b\x80\xd6\x3f\xdd\x4a\x8e\x9a\xdb\x1e\x69" | |
757 | "\x62\xa6\x95\x26\xd4\x31\x61\xc1\xa4\x1d\x57\x0d\x79\x38\xda\xd4" | |
758 | "\xa4\x0e\x32\x9c\xd0\xe4\x0e\x65\xff\xff\xff\xff\xff\xff\xff\xff", | |
759 | }; | |
760 | ||
761 | static const struct dh_safe_prime ffdhe8192_prime = { | |
762 | .max_strength = 200, | |
763 | .p_size = 1024, | |
764 | .p = | |
765 | "\xff\xff\xff\xff\xff\xff\xff\xff\xad\xf8\x54\x58\xa2\xbb\x4a\x9a" | |
766 | "\xaf\xdc\x56\x20\x27\x3d\x3c\xf1\xd8\xb9\xc5\x83\xce\x2d\x36\x95" | |
767 | "\xa9\xe1\x36\x41\x14\x64\x33\xfb\xcc\x93\x9d\xce\x24\x9b\x3e\xf9" | |
768 | "\x7d\x2f\xe3\x63\x63\x0c\x75\xd8\xf6\x81\xb2\x02\xae\xc4\x61\x7a" | |
769 | "\xd3\xdf\x1e\xd5\xd5\xfd\x65\x61\x24\x33\xf5\x1f\x5f\x06\x6e\xd0" | |
770 | "\x85\x63\x65\x55\x3d\xed\x1a\xf3\xb5\x57\x13\x5e\x7f\x57\xc9\x35" | |
771 | "\x98\x4f\x0c\x70\xe0\xe6\x8b\x77\xe2\xa6\x89\xda\xf3\xef\xe8\x72" | |
772 | "\x1d\xf1\x58\xa1\x36\xad\xe7\x35\x30\xac\xca\x4f\x48\x3a\x79\x7a" | |
773 | "\xbc\x0a\xb1\x82\xb3\x24\xfb\x61\xd1\x08\xa9\x4b\xb2\xc8\xe3\xfb" | |
774 | "\xb9\x6a\xda\xb7\x60\xd7\xf4\x68\x1d\x4f\x42\xa3\xde\x39\x4d\xf4" | |
775 | "\xae\x56\xed\xe7\x63\x72\xbb\x19\x0b\x07\xa7\xc8\xee\x0a\x6d\x70" | |
776 | "\x9e\x02\xfc\xe1\xcd\xf7\xe2\xec\xc0\x34\x04\xcd\x28\x34\x2f\x61" | |
777 | "\x91\x72\xfe\x9c\xe9\x85\x83\xff\x8e\x4f\x12\x32\xee\xf2\x81\x83" | |
778 | "\xc3\xfe\x3b\x1b\x4c\x6f\xad\x73\x3b\xb5\xfc\xbc\x2e\xc2\x20\x05" | |
779 | "\xc5\x8e\xf1\x83\x7d\x16\x83\xb2\xc6\xf3\x4a\x26\xc1\xb2\xef\xfa" | |
780 | "\x88\x6b\x42\x38\x61\x1f\xcf\xdc\xde\x35\x5b\x3b\x65\x19\x03\x5b" | |
781 | "\xbc\x34\xf4\xde\xf9\x9c\x02\x38\x61\xb4\x6f\xc9\xd6\xe6\xc9\x07" | |
782 | "\x7a\xd9\x1d\x26\x91\xf7\xf7\xee\x59\x8c\xb0\xfa\xc1\x86\xd9\x1c" | |
783 | "\xae\xfe\x13\x09\x85\x13\x92\x70\xb4\x13\x0c\x93\xbc\x43\x79\x44" | |
784 | "\xf4\xfd\x44\x52\xe2\xd7\x4d\xd3\x64\xf2\xe2\x1e\x71\xf5\x4b\xff" | |
785 | "\x5c\xae\x82\xab\x9c\x9d\xf6\x9e\xe8\x6d\x2b\xc5\x22\x36\x3a\x0d" | |
786 | "\xab\xc5\x21\x97\x9b\x0d\xea\xda\x1d\xbf\x9a\x42\xd5\xc4\x48\x4e" | |
787 | "\x0a\xbc\xd0\x6b\xfa\x53\xdd\xef\x3c\x1b\x20\xee\x3f\xd5\x9d\x7c" | |
788 | "\x25\xe4\x1d\x2b\x66\x9e\x1e\xf1\x6e\x6f\x52\xc3\x16\x4d\xf4\xfb" | |
789 | "\x79\x30\xe9\xe4\xe5\x88\x57\xb6\xac\x7d\x5f\x42\xd6\x9f\x6d\x18" | |
790 | "\x77\x63\xcf\x1d\x55\x03\x40\x04\x87\xf5\x5b\xa5\x7e\x31\xcc\x7a" | |
791 | "\x71\x35\xc8\x86\xef\xb4\x31\x8a\xed\x6a\x1e\x01\x2d\x9e\x68\x32" | |
792 | "\xa9\x07\x60\x0a\x91\x81\x30\xc4\x6d\xc7\x78\xf9\x71\xad\x00\x38" | |
793 | "\x09\x29\x99\xa3\x33\xcb\x8b\x7a\x1a\x1d\xb9\x3d\x71\x40\x00\x3c" | |
794 | "\x2a\x4e\xce\xa9\xf9\x8d\x0a\xcc\x0a\x82\x91\xcd\xce\xc9\x7d\xcf" | |
795 | "\x8e\xc9\xb5\x5a\x7f\x88\xa4\x6b\x4d\xb5\xa8\x51\xf4\x41\x82\xe1" | |
796 | "\xc6\x8a\x00\x7e\x5e\x0d\xd9\x02\x0b\xfd\x64\xb6\x45\x03\x6c\x7a" | |
797 | "\x4e\x67\x7d\x2c\x38\x53\x2a\x3a\x23\xba\x44\x42\xca\xf5\x3e\xa6" | |
798 | "\x3b\xb4\x54\x32\x9b\x76\x24\xc8\x91\x7b\xdd\x64\xb1\xc0\xfd\x4c" | |
799 | "\xb3\x8e\x8c\x33\x4c\x70\x1c\x3a\xcd\xad\x06\x57\xfc\xcf\xec\x71" | |
800 | "\x9b\x1f\x5c\x3e\x4e\x46\x04\x1f\x38\x81\x47\xfb\x4c\xfd\xb4\x77" | |
801 | "\xa5\x24\x71\xf7\xa9\xa9\x69\x10\xb8\x55\x32\x2e\xdb\x63\x40\xd8" | |
802 | "\xa0\x0e\xf0\x92\x35\x05\x11\xe3\x0a\xbe\xc1\xff\xf9\xe3\xa2\x6e" | |
803 | "\x7f\xb2\x9f\x8c\x18\x30\x23\xc3\x58\x7e\x38\xda\x00\x77\xd9\xb4" | |
804 | "\x76\x3e\x4e\x4b\x94\xb2\xbb\xc1\x94\xc6\x65\x1e\x77\xca\xf9\x92" | |
805 | "\xee\xaa\xc0\x23\x2a\x28\x1b\xf6\xb3\xa7\x39\xc1\x22\x61\x16\x82" | |
806 | "\x0a\xe8\xdb\x58\x47\xa6\x7c\xbe\xf9\xc9\x09\x1b\x46\x2d\x53\x8c" | |
807 | "\xd7\x2b\x03\x74\x6a\xe7\x7f\x5e\x62\x29\x2c\x31\x15\x62\xa8\x46" | |
808 | "\x50\x5d\xc8\x2d\xb8\x54\x33\x8a\xe4\x9f\x52\x35\xc9\x5b\x91\x17" | |
809 | "\x8c\xcf\x2d\xd5\xca\xce\xf4\x03\xec\x9d\x18\x10\xc6\x27\x2b\x04" | |
810 | "\x5b\x3b\x71\xf9\xdc\x6b\x80\xd6\x3f\xdd\x4a\x8e\x9a\xdb\x1e\x69" | |
811 | "\x62\xa6\x95\x26\xd4\x31\x61\xc1\xa4\x1d\x57\x0d\x79\x38\xda\xd4" | |
812 | "\xa4\x0e\x32\x9c\xcf\xf4\x6a\xaa\x36\xad\x00\x4c\xf6\x00\xc8\x38" | |
813 | "\x1e\x42\x5a\x31\xd9\x51\xae\x64\xfd\xb2\x3f\xce\xc9\x50\x9d\x43" | |
814 | "\x68\x7f\xeb\x69\xed\xd1\xcc\x5e\x0b\x8c\xc3\xbd\xf6\x4b\x10\xef" | |
815 | "\x86\xb6\x31\x42\xa3\xab\x88\x29\x55\x5b\x2f\x74\x7c\x93\x26\x65" | |
816 | "\xcb\x2c\x0f\x1c\xc0\x1b\xd7\x02\x29\x38\x88\x39\xd2\xaf\x05\xe4" | |
817 | "\x54\x50\x4a\xc7\x8b\x75\x82\x82\x28\x46\xc0\xba\x35\xc3\x5f\x5c" | |
818 | "\x59\x16\x0c\xc0\x46\xfd\x82\x51\x54\x1f\xc6\x8c\x9c\x86\xb0\x22" | |
819 | "\xbb\x70\x99\x87\x6a\x46\x0e\x74\x51\xa8\xa9\x31\x09\x70\x3f\xee" | |
820 | "\x1c\x21\x7e\x6c\x38\x26\xe5\x2c\x51\xaa\x69\x1e\x0e\x42\x3c\xfc" | |
821 | "\x99\xe9\xe3\x16\x50\xc1\x21\x7b\x62\x48\x16\xcd\xad\x9a\x95\xf9" | |
822 | "\xd5\xb8\x01\x94\x88\xd9\xc0\xa0\xa1\xfe\x30\x75\xa5\x77\xe2\x31" | |
823 | "\x83\xf8\x1d\x4a\x3f\x2f\xa4\x57\x1e\xfc\x8c\xe0\xba\x8a\x4f\xe8" | |
824 | "\xb6\x85\x5d\xfe\x72\xb0\xa6\x6e\xde\xd2\xfb\xab\xfb\xe5\x8a\x30" | |
825 | "\xfa\xfa\xbe\x1c\x5d\x71\xa8\x7e\x2f\x74\x1e\xf8\xc1\xfe\x86\xfe" | |
826 | "\xa6\xbb\xfd\xe5\x30\x67\x7f\x0d\x97\xd1\x1d\x49\xf7\xa8\x44\x3d" | |
827 | "\x08\x22\xe5\x06\xa9\xf4\x61\x4e\x01\x1e\x2a\x94\x83\x8f\xf8\x8c" | |
828 | "\xd6\x8c\x8b\xb7\xc5\xc6\x42\x4c\xff\xff\xff\xff\xff\xff\xff\xff", | |
829 | }; | |
830 | ||
831 | static int dh_ffdhe2048_create(struct crypto_template *tmpl, | |
832 | struct rtattr **tb) | |
833 | { | |
834 | return __dh_safe_prime_create(tmpl, tb, &ffdhe2048_prime); | |
835 | } | |
836 | ||
837 | static int dh_ffdhe3072_create(struct crypto_template *tmpl, | |
838 | struct rtattr **tb) | |
839 | { | |
840 | return __dh_safe_prime_create(tmpl, tb, &ffdhe3072_prime); | |
841 | } | |
842 | ||
843 | static int dh_ffdhe4096_create(struct crypto_template *tmpl, | |
844 | struct rtattr **tb) | |
845 | { | |
846 | return __dh_safe_prime_create(tmpl, tb, &ffdhe4096_prime); | |
847 | } | |
848 | ||
849 | static int dh_ffdhe6144_create(struct crypto_template *tmpl, | |
850 | struct rtattr **tb) | |
851 | { | |
852 | return __dh_safe_prime_create(tmpl, tb, &ffdhe6144_prime); | |
853 | } | |
854 | ||
855 | static int dh_ffdhe8192_create(struct crypto_template *tmpl, | |
856 | struct rtattr **tb) | |
857 | { | |
858 | return __dh_safe_prime_create(tmpl, tb, &ffdhe8192_prime); | |
859 | } | |
860 | ||
861 | static struct crypto_template crypto_ffdhe_templates[] = { | |
862 | { | |
863 | .name = "ffdhe2048", | |
864 | .create = dh_ffdhe2048_create, | |
865 | .module = THIS_MODULE, | |
866 | }, | |
867 | { | |
868 | .name = "ffdhe3072", | |
869 | .create = dh_ffdhe3072_create, | |
870 | .module = THIS_MODULE, | |
871 | }, | |
872 | { | |
873 | .name = "ffdhe4096", | |
874 | .create = dh_ffdhe4096_create, | |
875 | .module = THIS_MODULE, | |
876 | }, | |
877 | { | |
878 | .name = "ffdhe6144", | |
879 | .create = dh_ffdhe6144_create, | |
880 | .module = THIS_MODULE, | |
881 | }, | |
882 | { | |
883 | .name = "ffdhe8192", | |
884 | .create = dh_ffdhe8192_create, | |
885 | .module = THIS_MODULE, | |
886 | }, | |
887 | }; | |
888 | ||
889 | #else /* ! CONFIG_CRYPTO_DH_RFC7919_GROUPS */ | |
890 | ||
891 | static struct crypto_template crypto_ffdhe_templates[] = {}; | |
892 | ||
893 | #endif /* CONFIG_CRYPTO_DH_RFC7919_GROUPS */ | |
894 | ||
895 | ||
802c7f1c SB |
896 | static int dh_init(void) |
897 | { | |
7dce5981 NS |
898 | int err; |
899 | ||
900 | err = crypto_register_kpp(&dh); | |
901 | if (err) | |
902 | return err; | |
903 | ||
904 | err = crypto_register_templates(crypto_ffdhe_templates, | |
905 | ARRAY_SIZE(crypto_ffdhe_templates)); | |
906 | if (err) { | |
907 | crypto_unregister_kpp(&dh); | |
908 | return err; | |
909 | } | |
910 | ||
911 | return 0; | |
802c7f1c SB |
912 | } |
913 | ||
914 | static void dh_exit(void) | |
915 | { | |
7dce5981 NS |
916 | crypto_unregister_templates(crypto_ffdhe_templates, |
917 | ARRAY_SIZE(crypto_ffdhe_templates)); | |
802c7f1c SB |
918 | crypto_unregister_kpp(&dh); |
919 | } | |
920 | ||
c4741b23 | 921 | subsys_initcall(dh_init); |
802c7f1c SB |
922 | module_exit(dh_exit); |
923 | MODULE_ALIAS_CRYPTO("dh"); | |
924 | MODULE_LICENSE("GPL"); | |
925 | MODULE_DESCRIPTION("DH generic algorithm"); |