Files
cli/vendor/aws-lc-sys/aws-lc/crypto/dh_extra/dh_test.cc

1133 lines
55 KiB
C++

// Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) All rights reserved.
// SPDX-License-Identifier: Apache-2.0
#include <openssl/dh.h>
#include <stdio.h>
#include <string.h>
#include <vector>
#include <gtest/gtest.h>
#include <openssl/bn.h>
#include <openssl/bytestring.h>
#include <openssl/crypto.h>
#include <openssl/dh.h>
#include <openssl/digest.h>
#include <openssl/err.h>
#include <openssl/mem.h>
#include <openssl/nid.h>
#include "../fipsmodule/dh/internal.h"
#include "../test/test_util.h"
#include "openssl/pem.h"
TEST(DHTest, ComputeKeyHashedRejectsXOF) {
bssl::UniquePtr<DH> a(DH_new_by_nid(NID_ffdhe2048));
ASSERT_TRUE(a);
bssl::UniquePtr<DH> b(DHparams_dup(a.get()));
ASSERT_TRUE(b);
ASSERT_TRUE(DH_generate_key(a.get()));
ASSERT_TRUE(DH_generate_key(b.get()));
uint8_t out[64];
size_t out_len = 0;
// XOF digests should be rejected.
EXPECT_FALSE(DH_compute_key_hashed(a.get(), out, &out_len, sizeof(out),
DH_get0_pub_key(b.get()), EVP_shake128()));
EXPECT_FALSE(DH_compute_key_hashed(a.get(), out, &out_len, sizeof(out),
DH_get0_pub_key(b.get()), EVP_shake256()));
// Non-XOF digests should succeed.
EXPECT_TRUE(DH_compute_key_hashed(a.get(), out, &out_len, sizeof(out),
DH_get0_pub_key(b.get()), EVP_sha256()));
EXPECT_EQ(out_len, 32u);
}
TEST(DHTest, Basic) {
bssl::UniquePtr<DH> a(DH_new());
ASSERT_TRUE(a);
ASSERT_TRUE(DH_generate_parameters_ex(a.get(), 64, DH_GENERATOR_5, nullptr));
int check_result;
ASSERT_TRUE(DH_check(a.get(), &check_result));
EXPECT_FALSE(check_result & DH_CHECK_P_NOT_PRIME);
EXPECT_FALSE(check_result & DH_CHECK_P_NOT_SAFE_PRIME);
EXPECT_FALSE(check_result & DH_CHECK_UNABLE_TO_CHECK_GENERATOR);
EXPECT_FALSE(check_result & DH_CHECK_NOT_SUITABLE_GENERATOR);
bssl::UniquePtr<DH> b(DHparams_dup(a.get()));
ASSERT_TRUE(b);
ASSERT_TRUE(DH_generate_key(a.get()));
ASSERT_TRUE(DH_generate_key(b.get()));
std::vector<uint8_t> key1(DH_size(a.get()));
int ret = DH_compute_key(key1.data(), DH_get0_pub_key(b.get()), a.get());
ASSERT_GE(ret, 0);
key1.resize(ret);
std::vector<uint8_t> key2(DH_size(b.get()));
ret = DH_compute_key(key2.data(), DH_get0_pub_key(a.get()), b.get());
ASSERT_GE(ret, 0);
key2.resize(ret);
EXPECT_EQ(Bytes(key1), Bytes(key2));
// |DH_compute_key|, unlike |DH_compute_key_padded|, removes leading zeros
// from the output, so the key will not have a fixed length. This test uses a
// small, 64-bit prime, so check for at least 32 bits of output after removing
// leading zeros.
EXPECT_GE(key1.size(), 4u);
}
// The following parameters are taken from RFC 5114, section 2.2. This is not a
// safe prime. Do not use these parameters.
static const uint8_t kRFC5114_2048_224P[] = {
0xad, 0x10, 0x7e, 0x1e, 0x91, 0x23, 0xa9, 0xd0, 0xd6, 0x60, 0xfa, 0xa7,
0x95, 0x59, 0xc5, 0x1f, 0xa2, 0x0d, 0x64, 0xe5, 0x68, 0x3b, 0x9f, 0xd1,
0xb5, 0x4b, 0x15, 0x97, 0xb6, 0x1d, 0x0a, 0x75, 0xe6, 0xfa, 0x14, 0x1d,
0xf9, 0x5a, 0x56, 0xdb, 0xaf, 0x9a, 0x3c, 0x40, 0x7b, 0xa1, 0xdf, 0x15,
0xeb, 0x3d, 0x68, 0x8a, 0x30, 0x9c, 0x18, 0x0e, 0x1d, 0xe6, 0xb8, 0x5a,
0x12, 0x74, 0xa0, 0xa6, 0x6d, 0x3f, 0x81, 0x52, 0xad, 0x6a, 0xc2, 0x12,
0x90, 0x37, 0xc9, 0xed, 0xef, 0xda, 0x4d, 0xf8, 0xd9, 0x1e, 0x8f, 0xef,
0x55, 0xb7, 0x39, 0x4b, 0x7a, 0xd5, 0xb7, 0xd0, 0xb6, 0xc1, 0x22, 0x07,
0xc9, 0xf9, 0x8d, 0x11, 0xed, 0x34, 0xdb, 0xf6, 0xc6, 0xba, 0x0b, 0x2c,
0x8b, 0xbc, 0x27, 0xbe, 0x6a, 0x00, 0xe0, 0xa0, 0xb9, 0xc4, 0x97, 0x08,
0xb3, 0xbf, 0x8a, 0x31, 0x70, 0x91, 0x88, 0x36, 0x81, 0x28, 0x61, 0x30,
0xbc, 0x89, 0x85, 0xdb, 0x16, 0x02, 0xe7, 0x14, 0x41, 0x5d, 0x93, 0x30,
0x27, 0x82, 0x73, 0xc7, 0xde, 0x31, 0xef, 0xdc, 0x73, 0x10, 0xf7, 0x12,
0x1f, 0xd5, 0xa0, 0x74, 0x15, 0x98, 0x7d, 0x9a, 0xdc, 0x0a, 0x48, 0x6d,
0xcd, 0xf9, 0x3a, 0xcc, 0x44, 0x32, 0x83, 0x87, 0x31, 0x5d, 0x75, 0xe1,
0x98, 0xc6, 0x41, 0xa4, 0x80, 0xcd, 0x86, 0xa1, 0xb9, 0xe5, 0x87, 0xe8,
0xbe, 0x60, 0xe6, 0x9c, 0xc9, 0x28, 0xb2, 0xb9, 0xc5, 0x21, 0x72, 0xe4,
0x13, 0x04, 0x2e, 0x9b, 0x23, 0xf1, 0x0b, 0x0e, 0x16, 0xe7, 0x97, 0x63,
0xc9, 0xb5, 0x3d, 0xcf, 0x4b, 0xa8, 0x0a, 0x29, 0xe3, 0xfb, 0x73, 0xc1,
0x6b, 0x8e, 0x75, 0xb9, 0x7e, 0xf3, 0x63, 0xe2, 0xff, 0xa3, 0x1f, 0x71,
0xcf, 0x9d, 0xe5, 0x38, 0x4e, 0x71, 0xb8, 0x1c, 0x0a, 0xc4, 0xdf, 0xfe,
0x0c, 0x10, 0xe6, 0x4f,
};
static const uint8_t kRFC5114_2048_224G[] = {
0xac, 0x40, 0x32, 0xef, 0x4f, 0x2d, 0x9a, 0xe3, 0x9d, 0xf3, 0x0b, 0x5c,
0x8f, 0xfd, 0xac, 0x50, 0x6c, 0xde, 0xbe, 0x7b, 0x89, 0x99, 0x8c, 0xaf,
0x74, 0x86, 0x6a, 0x08, 0xcf, 0xe4, 0xff, 0xe3, 0xa6, 0x82, 0x4a, 0x4e,
0x10, 0xb9, 0xa6, 0xf0, 0xdd, 0x92, 0x1f, 0x01, 0xa7, 0x0c, 0x4a, 0xfa,
0xab, 0x73, 0x9d, 0x77, 0x00, 0xc2, 0x9f, 0x52, 0xc5, 0x7d, 0xb1, 0x7c,
0x62, 0x0a, 0x86, 0x52, 0xbe, 0x5e, 0x90, 0x01, 0xa8, 0xd6, 0x6a, 0xd7,
0xc1, 0x76, 0x69, 0x10, 0x19, 0x99, 0x02, 0x4a, 0xf4, 0xd0, 0x27, 0x27,
0x5a, 0xc1, 0x34, 0x8b, 0xb8, 0xa7, 0x62, 0xd0, 0x52, 0x1b, 0xc9, 0x8a,
0xe2, 0x47, 0x15, 0x04, 0x22, 0xea, 0x1e, 0xd4, 0x09, 0x93, 0x9d, 0x54,
0xda, 0x74, 0x60, 0xcd, 0xb5, 0xf6, 0xc6, 0xb2, 0x50, 0x71, 0x7c, 0xbe,
0xf1, 0x80, 0xeb, 0x34, 0x11, 0x8e, 0x98, 0xd1, 0x19, 0x52, 0x9a, 0x45,
0xd6, 0xf8, 0x34, 0x56, 0x6e, 0x30, 0x25, 0xe3, 0x16, 0xa3, 0x30, 0xef,
0xbb, 0x77, 0xa8, 0x6f, 0x0c, 0x1a, 0xb1, 0x5b, 0x05, 0x1a, 0xe3, 0xd4,
0x28, 0xc8, 0xf8, 0xac, 0xb7, 0x0a, 0x81, 0x37, 0x15, 0x0b, 0x8e, 0xeb,
0x10, 0xe1, 0x83, 0xed, 0xd1, 0x99, 0x63, 0xdd, 0xd9, 0xe2, 0x63, 0xe4,
0x77, 0x05, 0x89, 0xef, 0x6a, 0xa2, 0x1e, 0x7f, 0x5f, 0x2f, 0xf3, 0x81,
0xb5, 0x39, 0xcc, 0xe3, 0x40, 0x9d, 0x13, 0xcd, 0x56, 0x6a, 0xfb, 0xb4,
0x8d, 0x6c, 0x01, 0x91, 0x81, 0xe1, 0xbc, 0xfe, 0x94, 0xb3, 0x02, 0x69,
0xed, 0xfe, 0x72, 0xfe, 0x9b, 0x6a, 0xa4, 0xbd, 0x7b, 0x5a, 0x0f, 0x1c,
0x71, 0xcf, 0xff, 0x4c, 0x19, 0xc4, 0x18, 0xe1, 0xf6, 0xec, 0x01, 0x79,
0x81, 0xbc, 0x08, 0x7f, 0x2a, 0x70, 0x65, 0xb3, 0x84, 0xb8, 0x90, 0xd3,
0x19, 0x1f, 0x2b, 0xfa,
};
static const uint8_t kRFC5114_2048_224Q[] = {
0x80, 0x1c, 0x0d, 0x34, 0xc5, 0x8d, 0x93, 0xfe, 0x99, 0x71,
0x77, 0x10, 0x1f, 0x80, 0x53, 0x5a, 0x47, 0x38, 0xce, 0xbc,
0xbf, 0x38, 0x9a, 0x99, 0xb3, 0x63, 0x71, 0xeb,
};
// kRFC5114_2048_224BadY is a bad y-coordinate for RFC 5114's 2048-bit MODP
// Group with 224-bit Prime Order Subgroup (section 2.2).
static const uint8_t kRFC5114_2048_224BadY[] = {
0x45, 0x32, 0x5f, 0x51, 0x07, 0xe5, 0xdf, 0x1c, 0xd6, 0x02, 0x82, 0xb3,
0x32, 0x8f, 0xa4, 0x0f, 0x87, 0xb8, 0x41, 0xfe, 0xb9, 0x35, 0xde, 0xad,
0xc6, 0x26, 0x85, 0xb4, 0xff, 0x94, 0x8c, 0x12, 0x4c, 0xbf, 0x5b, 0x20,
0xc4, 0x46, 0xa3, 0x26, 0xeb, 0xa4, 0x25, 0xb7, 0x68, 0x8e, 0xcc, 0x67,
0xba, 0xea, 0x58, 0xd0, 0xf2, 0xe9, 0xd2, 0x24, 0x72, 0x60, 0xda, 0x88,
0x18, 0x9c, 0xe0, 0x31, 0x6a, 0xad, 0x50, 0x6d, 0x94, 0x35, 0x8b, 0x83,
0x4a, 0x6e, 0xfa, 0x48, 0x73, 0x0f, 0x83, 0x87, 0xff, 0x6b, 0x66, 0x1f,
0xa8, 0x82, 0xc6, 0x01, 0xe5, 0x80, 0xb5, 0xb0, 0x52, 0xd0, 0xe9, 0xd8,
0x72, 0xf9, 0x7d, 0x5b, 0x8b, 0xa5, 0x4c, 0xa5, 0x25, 0x95, 0x74, 0xe2,
0x7a, 0x61, 0x4e, 0xa7, 0x8f, 0x12, 0xe2, 0xd2, 0x9d, 0x8c, 0x02, 0x70,
0x34, 0x44, 0x32, 0xc7, 0xb2, 0xf3, 0xb9, 0xfe, 0x17, 0x2b, 0xd6, 0x1f,
0x8b, 0x7e, 0x4a, 0xfa, 0xa3, 0xb5, 0x3e, 0x7a, 0x81, 0x9a, 0x33, 0x66,
0x62, 0xa4, 0x50, 0x18, 0x3e, 0xa2, 0x5f, 0x00, 0x07, 0xd8, 0x9b, 0x22,
0xe4, 0xec, 0x84, 0xd5, 0xeb, 0x5a, 0xf3, 0x2a, 0x31, 0x23, 0xd8, 0x44,
0x22, 0x2a, 0x8b, 0x37, 0x44, 0xcc, 0xc6, 0x87, 0x4b, 0xbe, 0x50, 0x9d,
0x4a, 0xc4, 0x8e, 0x45, 0xcf, 0x72, 0x4d, 0xc0, 0x89, 0xb3, 0x72, 0xed,
0x33, 0x2c, 0xbc, 0x7f, 0x16, 0x39, 0x3b, 0xeb, 0xd2, 0xdd, 0xa8, 0x01,
0x73, 0x84, 0x62, 0xb9, 0x29, 0xd2, 0xc9, 0x51, 0x32, 0x9e, 0x7a, 0x6a,
0xcf, 0xc1, 0x0a, 0xdb, 0x0e, 0xe0, 0x62, 0x77, 0x6f, 0x59, 0x62, 0x72,
0x5a, 0x69, 0xa6, 0x5b, 0x70, 0xca, 0x65, 0xc4, 0x95, 0x6f, 0x9a, 0xc2,
0xdf, 0x72, 0x6d, 0xb1, 0x1e, 0x54, 0x7b, 0x51, 0xb4, 0xef, 0x7f, 0x89,
0x93, 0x74, 0x89, 0x59,
};
static bssl::UniquePtr<DH> NewDHGroup(const BIGNUM *p, const BIGNUM *q,
const BIGNUM *g) {
bssl::UniquePtr<BIGNUM> p_copy(BN_dup(p));
bssl::UniquePtr<BIGNUM> q_copy(q != nullptr ? BN_dup(q) : nullptr);
bssl::UniquePtr<BIGNUM> g_copy(BN_dup(g));
bssl::UniquePtr<DH> dh(DH_new());
if (p_copy == nullptr || (q != nullptr && q_copy == nullptr) ||
g_copy == nullptr || dh == nullptr ||
!DH_set0_pqg(dh.get(), p_copy.get(), q_copy.get(), g_copy.get())) {
return nullptr;
}
p_copy.release();
q_copy.release();
g_copy.release();
return dh;
}
TEST(DHTest, BadY) {
bssl::UniquePtr<BIGNUM> p(
BN_bin2bn(kRFC5114_2048_224P, sizeof(kRFC5114_2048_224P), nullptr));
bssl::UniquePtr<BIGNUM> q(
BN_bin2bn(kRFC5114_2048_224Q, sizeof(kRFC5114_2048_224Q), nullptr));
bssl::UniquePtr<BIGNUM> g(
BN_bin2bn(kRFC5114_2048_224G, sizeof(kRFC5114_2048_224G), nullptr));
ASSERT_TRUE(p);
ASSERT_TRUE(q);
ASSERT_TRUE(g);
bssl::UniquePtr<DH> dh = NewDHGroup(p.get(), q.get(), g.get());
ASSERT_TRUE(dh);
bssl::UniquePtr<BIGNUM> pub_key(
BN_bin2bn(kRFC5114_2048_224BadY, sizeof(kRFC5114_2048_224BadY), nullptr));
ASSERT_TRUE(pub_key);
ASSERT_TRUE(DH_generate_key(dh.get()));
int flags;
ASSERT_TRUE(DH_check_pub_key(dh.get(), pub_key.get(), &flags));
EXPECT_TRUE(flags & DH_CHECK_PUBKEY_INVALID)
<< "DH_check_pub_key did not reject the key";
std::vector<uint8_t> result(DH_size(dh.get()));
EXPECT_LT(DH_compute_key(result.data(), pub_key.get(), dh.get()), 0)
<< "DH_compute_key unexpectedly succeeded";
ERR_clear_error();
}
static bool BIGNUMEqualsHex(const BIGNUM *bn, const char *hex) {
BIGNUM *hex_bn = NULL;
if (!BN_hex2bn(&hex_bn, hex)) {
return false;
}
bssl::UniquePtr<BIGNUM> free_hex_bn(hex_bn);
return BN_cmp(bn, hex_bn) == 0;
}
TEST(DHTest, ASN1) {
// kParams are a set of Diffie-Hellman parameters generated with
// openssl dhparam 256
static const uint8_t kParams[] = {
0x30, 0x26, 0x02, 0x21, 0x00, 0xd7, 0x20, 0x34, 0xa3, 0x27,
0x4f, 0xdf, 0xbf, 0x04, 0xfd, 0x24, 0x68, 0x25, 0xb6, 0x56,
0xd8, 0xab, 0x2a, 0x41, 0x2d, 0x74, 0x0a, 0x52, 0x08, 0x7c,
0x40, 0x71, 0x4e, 0xd2, 0x57, 0x93, 0x13, 0x02, 0x01, 0x02,
};
CBS cbs;
CBS_init(&cbs, kParams, sizeof(kParams));
bssl::UniquePtr<DH> dh(DH_parse_parameters(&cbs));
ASSERT_TRUE(dh);
EXPECT_EQ(CBS_len(&cbs), 0u);
EXPECT_TRUE(BIGNUMEqualsHex(
DH_get0_p(dh.get()),
"d72034a3274fdfbf04fd246825b656d8ab2a412d740a52087c40714ed2579313"));
EXPECT_TRUE(BIGNUMEqualsHex(DH_get0_g(dh.get()), "2"));
EXPECT_EQ(dh->priv_length, 0u);
bssl::ScopedCBB cbb;
uint8_t *der;
size_t der_len;
ASSERT_TRUE(CBB_init(cbb.get(), 0));
ASSERT_TRUE(DH_marshal_parameters(cbb.get(), dh.get()));
ASSERT_TRUE(CBB_finish(cbb.get(), &der, &der_len));
bssl::UniquePtr<uint8_t> free_der(der);
EXPECT_EQ(Bytes(kParams), Bytes(der, der_len));
// kParamsDSA are a set of Diffie-Hellman parameters generated with
// openssl dhparam 256 -dsaparam
static const uint8_t kParamsDSA[] = {
0x30, 0x81, 0x89, 0x02, 0x41, 0x00, 0x93, 0xf3, 0xc1, 0x18, 0x01, 0xe6,
0x62, 0xb6, 0xd1, 0x46, 0x9a, 0x2c, 0x72, 0xea, 0x31, 0xd9, 0x18, 0x10,
0x30, 0x28, 0x63, 0xe2, 0x34, 0x7d, 0x80, 0xca, 0xee, 0x82, 0x2b, 0x19,
0x3c, 0x19, 0xbb, 0x42, 0x83, 0x02, 0x70, 0xdd, 0xdb, 0x8c, 0x03, 0xab,
0xe9, 0x9c, 0xc4, 0x00, 0x4d, 0x70, 0x5f, 0x52, 0x03, 0x31, 0x2c, 0xa4,
0x67, 0x34, 0x51, 0x95, 0x2a, 0xac, 0x11, 0xe2, 0x6a, 0x55, 0x02, 0x40,
0x44, 0xc8, 0x10, 0x53, 0x44, 0x32, 0x31, 0x63, 0xd8, 0xd1, 0x8c, 0x75,
0xc8, 0x98, 0x53, 0x3b, 0x5b, 0x4a, 0x2a, 0x0a, 0x09, 0xe7, 0xd0, 0x3c,
0x53, 0x72, 0xa8, 0x6b, 0x70, 0x41, 0x9c, 0x26, 0x71, 0x44, 0xfc, 0x7f,
0x08, 0x75, 0xe1, 0x02, 0xab, 0x74, 0x41, 0xe8, 0x2a, 0x3d, 0x3c, 0x26,
0x33, 0x09, 0xe4, 0x8b, 0xb4, 0x41, 0xec, 0xa6, 0xa8, 0xba, 0x1a, 0x07,
0x8a, 0x77, 0xf5, 0x5f, 0x02, 0x02, 0x00, 0xa0,
};
CBS_init(&cbs, kParamsDSA, sizeof(kParamsDSA));
dh.reset(DH_parse_parameters(&cbs));
ASSERT_TRUE(dh);
EXPECT_EQ(CBS_len(&cbs), 0u);
EXPECT_TRUE(
BIGNUMEqualsHex(DH_get0_p(dh.get()),
"93f3c11801e662b6d1469a2c72ea31d91810302863e2347d80caee8"
"22b193c19bb42830270dddb8c03abe99cc4004d705f5203312ca467"
"3451952aac11e26a55"));
EXPECT_TRUE(
BIGNUMEqualsHex(DH_get0_g(dh.get()),
"44c8105344323163d8d18c75c898533b5b4a2a0a09e7d03c5372a86"
"b70419c267144fc7f0875e102ab7441e82a3d3c263309e48bb441ec"
"a6a8ba1a078a77f55f"));
EXPECT_EQ(dh->priv_length, 160u);
ASSERT_TRUE(CBB_init(cbb.get(), 0));
ASSERT_TRUE(DH_marshal_parameters(cbb.get(), dh.get()));
ASSERT_TRUE(CBB_finish(cbb.get(), &der, &der_len));
bssl::UniquePtr<uint8_t> free_der2(der);
EXPECT_EQ(Bytes(kParamsDSA), Bytes(der, der_len));
}
static void check_bn_matches_bytes(std::vector<uint8_t> bytes, const BIGNUM*bn) {
uint8_t buffer[4096];
ASSERT_EQ(BN_bn2bin(bn, buffer), bytes.size());
EXPECT_EQ(Bytes(buffer, bytes.size()), Bytes(bytes));
}
static std::vector<uint8_t> rfc_string_to_bytes(const char *str) {
std::string string(str);
string.erase(std::remove_if(string.begin(),string.end(), ::isspace),string.end());
return HexToBytes(string.c_str());
}
TEST(DHTest, RFC3526) {
bssl::UniquePtr<BIGNUM> bn(BN_get_rfc3526_prime_1536(nullptr));
ASSERT_TRUE(bn);
// Taken from section 2
std::vector<uint8_t> kPrime1536 = rfc_string_to_bytes(
"FFFFFFFF FFFFFFFF C90FDAA2 2168C234 C4C6628B 80DC1CD1"
"29024E08 8A67CC74 020BBEA6 3B139B22 514A0879 8E3404DD"
"EF9519B3 CD3A431B 302B0A6D F25F1437 4FE1356D 6D51C245"
"E485B576 625E7EC6 F44C42E9 A637ED6B 0BFF5CB6 F406B7ED"
"EE386BFB 5A899FA5 AE9F2411 7C4B1FE6 49286651 ECE45B3D"
"C2007CB8 A163BF05 98DA4836 1C55D39A 69163FA8 FD24CF5F"
"83655D23 DCA3AD96 1C62F356 208552BB 9ED52907 7096966D"
"670C354E 4ABC9804 F1746C08 CA237327 FFFFFFFF FFFFFFFF");
check_bn_matches_bytes(kPrime1536, bn.get());
}
TEST(DHTest, RFC7919) {
// Primes taken from Appendix 1-4 of RFC 7919
struct testInput {
int nid;
std::vector<uint8_t> p;
std::vector<uint8_t> q;
};
testInput testInputs[] = {
{NID_ffdhe2048,
rfc_string_to_bytes(
"FFFFFFFF FFFFFFFF ADF85458 A2BB4A9A AFDC5620 273D3CF1"
"D8B9C583 CE2D3695 A9E13641 146433FB CC939DCE 249B3EF9"
"7D2FE363 630C75D8 F681B202 AEC4617A D3DF1ED5 D5FD6561"
"2433F51F 5F066ED0 85636555 3DED1AF3 B557135E 7F57C935"
"984F0C70 E0E68B77 E2A689DA F3EFE872 1DF158A1 36ADE735"
"30ACCA4F 483A797A BC0AB182 B324FB61 D108A94B B2C8E3FB"
"B96ADAB7 60D7F468 1D4F42A3 DE394DF4 AE56EDE7 6372BB19"
"0B07A7C8 EE0A6D70 9E02FCE1 CDF7E2EC C03404CD 28342F61"
"9172FE9C E98583FF 8E4F1232 EEF28183 C3FE3B1B 4C6FAD73"
"3BB5FCBC 2EC22005 C58EF183 7D1683B2 C6F34A26 C1B2EFFA"
"886B4238 61285C97 FFFFFFFF FFFFFFFF"),
rfc_string_to_bytes(
"7FFFFFFF FFFFFFFF D6FC2A2C 515DA54D 57EE2B10 139E9E78"
"EC5CE2C1 E7169B4A D4F09B20 8A3219FD E649CEE7 124D9F7C"
"BE97F1B1 B1863AEC 7B40D901 576230BD 69EF8F6A EAFEB2B0"
"9219FA8F AF833768 42B1B2AA 9EF68D79 DAAB89AF 3FABE49A"
"CC278638 707345BB F15344ED 79F7F439 0EF8AC50 9B56F39A"
"98566527 A41D3CBD 5E0558C1 59927DB0 E88454A5 D96471FD"
"DCB56D5B B06BFA34 0EA7A151 EF1CA6FA 572B76F3 B1B95D8C"
"8583D3E4 770536B8 4F017E70 E6FBF176 601A0266 941A17B0"
"C8B97F4E 74C2C1FF C7278919 777940C1 E1FF1D8D A637D6B9"
"9DDAFE5E 17611002 E2C778C1 BE8B41D9 6379A513 60D977FD"
"4435A11C 30942E4B FFFFFFFF FFFFFFFF")},
{NID_ffdhe3072,
rfc_string_to_bytes(
"FFFFFFFF FFFFFFFF ADF85458 A2BB4A9A AFDC5620 273D3CF1"
"D8B9C583 CE2D3695 A9E13641 146433FB CC939DCE 249B3EF9"
"7D2FE363 630C75D8 F681B202 AEC4617A D3DF1ED5 D5FD6561"
"2433F51F 5F066ED0 85636555 3DED1AF3 B557135E 7F57C935"
"984F0C70 E0E68B77 E2A689DA F3EFE872 1DF158A1 36ADE735"
"30ACCA4F 483A797A BC0AB182 B324FB61 D108A94B B2C8E3FB"
"B96ADAB7 60D7F468 1D4F42A3 DE394DF4 AE56EDE7 6372BB19"
"0B07A7C8 EE0A6D70 9E02FCE1 CDF7E2EC C03404CD 28342F61"
"9172FE9C E98583FF 8E4F1232 EEF28183 C3FE3B1B 4C6FAD73"
"3BB5FCBC 2EC22005 C58EF183 7D1683B2 C6F34A26 C1B2EFFA"
"886B4238 611FCFDC DE355B3B 6519035B BC34F4DE F99C0238"
"61B46FC9 D6E6C907 7AD91D26 91F7F7EE 598CB0FA C186D91C"
"AEFE1309 85139270 B4130C93 BC437944 F4FD4452 E2D74DD3"
"64F2E21E 71F54BFF 5CAE82AB 9C9DF69E E86D2BC5 22363A0D"
"ABC52197 9B0DEADA 1DBF9A42 D5C4484E 0ABCD06B FA53DDEF"
"3C1B20EE 3FD59D7C 25E41D2B 66C62E37 FFFFFFFF FFFFFFFF"),
rfc_string_to_bytes(
"7FFFFFFF FFFFFFFF D6FC2A2C 515DA54D 57EE2B10 139E9E78"
"EC5CE2C1 E7169B4A D4F09B20 8A3219FD E649CEE7 124D9F7C"
"BE97F1B1 B1863AEC 7B40D901 576230BD 69EF8F6A EAFEB2B0"
"9219FA8F AF833768 42B1B2AA 9EF68D79 DAAB89AF 3FABE49A"
"CC278638 707345BB F15344ED 79F7F439 0EF8AC50 9B56F39A"
"98566527 A41D3CBD 5E0558C1 59927DB0 E88454A5 D96471FD"
"DCB56D5B B06BFA34 0EA7A151 EF1CA6FA 572B76F3 B1B95D8C"
"8583D3E4 770536B8 4F017E70 E6FBF176 601A0266 941A17B0"
"C8B97F4E 74C2C1FF C7278919 777940C1 E1FF1D8D A637D6B9"
"9DDAFE5E 17611002 E2C778C1 BE8B41D9 6379A513 60D977FD"
"4435A11C 308FE7EE 6F1AAD9D B28C81AD DE1A7A6F 7CCE011C"
"30DA37E4 EB736483 BD6C8E93 48FBFBF7 2CC6587D 60C36C8E"
"577F0984 C289C938 5A098649 DE21BCA2 7A7EA229 716BA6E9"
"B279710F 38FAA5FF AE574155 CE4EFB4F 743695E2 911B1D06"
"D5E290CB CD86F56D 0EDFCD21 6AE22427 055E6835 FD29EEF7"
"9E0D9077 1FEACEBE 12F20E95 B363171B FFFFFFFF FFFFFFFF")},
{NID_ffdhe4096,
rfc_string_to_bytes(
"FFFFFFFF FFFFFFFF ADF85458 A2BB4A9A AFDC5620 273D3CF1"
"D8B9C583 CE2D3695 A9E13641 146433FB CC939DCE 249B3EF9"
"7D2FE363 630C75D8 F681B202 AEC4617A D3DF1ED5 D5FD6561"
"2433F51F 5F066ED0 85636555 3DED1AF3 B557135E 7F57C935"
"984F0C70 E0E68B77 E2A689DA F3EFE872 1DF158A1 36ADE735"
"30ACCA4F 483A797A BC0AB182 B324FB61 D108A94B B2C8E3FB"
"B96ADAB7 60D7F468 1D4F42A3 DE394DF4 AE56EDE7 6372BB19"
"0B07A7C8 EE0A6D70 9E02FCE1 CDF7E2EC C03404CD 28342F61"
"9172FE9C E98583FF 8E4F1232 EEF28183 C3FE3B1B 4C6FAD73"
"3BB5FCBC 2EC22005 C58EF183 7D1683B2 C6F34A26 C1B2EFFA"
"886B4238 611FCFDC DE355B3B 6519035B BC34F4DE F99C0238"
"61B46FC9 D6E6C907 7AD91D26 91F7F7EE 598CB0FA C186D91C"
"AEFE1309 85139270 B4130C93 BC437944 F4FD4452 E2D74DD3"
"64F2E21E 71F54BFF 5CAE82AB 9C9DF69E E86D2BC5 22363A0D"
"ABC52197 9B0DEADA 1DBF9A42 D5C4484E 0ABCD06B FA53DDEF"
"3C1B20EE 3FD59D7C 25E41D2B 669E1EF1 6E6F52C3 164DF4FB"
"7930E9E4 E58857B6 AC7D5F42 D69F6D18 7763CF1D 55034004"
"87F55BA5 7E31CC7A 7135C886 EFB4318A ED6A1E01 2D9E6832"
"A907600A 918130C4 6DC778F9 71AD0038 092999A3 33CB8B7A"
"1A1DB93D 7140003C 2A4ECEA9 F98D0ACC 0A8291CD CEC97DCF"
"8EC9B55A 7F88A46B 4DB5A851 F44182E1 C68A007E 5E655F6A"
"FFFFFFFF FFFFFFFF"),
rfc_string_to_bytes(
"7FFFFFFF FFFFFFFF D6FC2A2C 515DA54D 57EE2B10 139E9E78"
"EC5CE2C1 E7169B4A D4F09B20 8A3219FD E649CEE7 124D9F7C"
"BE97F1B1 B1863AEC 7B40D901 576230BD 69EF8F6A EAFEB2B0"
"9219FA8F AF833768 42B1B2AA 9EF68D79 DAAB89AF 3FABE49A"
"CC278638 707345BB F15344ED 79F7F439 0EF8AC50 9B56F39A"
"98566527 A41D3CBD 5E0558C1 59927DB0 E88454A5 D96471FD"
"DCB56D5B B06BFA34 0EA7A151 EF1CA6FA 572B76F3 B1B95D8C"
"8583D3E4 770536B8 4F017E70 E6FBF176 601A0266 941A17B0"
"C8B97F4E 74C2C1FF C7278919 777940C1 E1FF1D8D A637D6B9"
"9DDAFE5E 17611002 E2C778C1 BE8B41D9 6379A513 60D977FD"
"4435A11C 308FE7EE 6F1AAD9D B28C81AD DE1A7A6F 7CCE011C"
"30DA37E4 EB736483 BD6C8E93 48FBFBF7 2CC6587D 60C36C8E"
"577F0984 C289C938 5A098649 DE21BCA2 7A7EA229 716BA6E9"
"B279710F 38FAA5FF AE574155 CE4EFB4F 743695E2 911B1D06"
"D5E290CB CD86F56D 0EDFCD21 6AE22427 055E6835 FD29EEF7"
"9E0D9077 1FEACEBE 12F20E95 B34F0F78 B737A961 8B26FA7D"
"BC9874F2 72C42BDB 563EAFA1 6B4FB68C 3BB1E78E AA81A002"
"43FAADD2 BF18E63D 389AE443 77DA18C5 76B50F00 96CF3419"
"5483B005 48C09862 36E3BC7C B8D6801C 0494CCD1 99E5C5BD"
"0D0EDC9E B8A0001E 15276754 FCC68566 054148E6 E764BEE7"
"C764DAAD 3FC45235 A6DAD428 FA20C170 E345003F 2F32AFB5"
"7FFFFFFF FFFFFFFF")},
{NID_ffdhe8192,
rfc_string_to_bytes(
"FFFFFFFF FFFFFFFF ADF85458 A2BB4A9A AFDC5620 273D3CF1"
"D8B9C583 CE2D3695 A9E13641 146433FB CC939DCE 249B3EF9"
"7D2FE363 630C75D8 F681B202 AEC4617A D3DF1ED5 D5FD6561"
"2433F51F 5F066ED0 85636555 3DED1AF3 B557135E 7F57C935"
"984F0C70 E0E68B77 E2A689DA F3EFE872 1DF158A1 36ADE735"
"30ACCA4F 483A797A BC0AB182 B324FB61 D108A94B B2C8E3FB"
"B96ADAB7 60D7F468 1D4F42A3 DE394DF4 AE56EDE7 6372BB19"
"0B07A7C8 EE0A6D70 9E02FCE1 CDF7E2EC C03404CD 28342F61"
"9172FE9C E98583FF 8E4F1232 EEF28183 C3FE3B1B 4C6FAD73"
"3BB5FCBC 2EC22005 C58EF183 7D1683B2 C6F34A26 C1B2EFFA"
"886B4238 611FCFDC DE355B3B 6519035B BC34F4DE F99C0238"
"61B46FC9 D6E6C907 7AD91D26 91F7F7EE 598CB0FA C186D91C"
"AEFE1309 85139270 B4130C93 BC437944 F4FD4452 E2D74DD3"
"64F2E21E 71F54BFF 5CAE82AB 9C9DF69E E86D2BC5 22363A0D"
"ABC52197 9B0DEADA 1DBF9A42 D5C4484E 0ABCD06B FA53DDEF"
"3C1B20EE 3FD59D7C 25E41D2B 669E1EF1 6E6F52C3 164DF4FB"
"7930E9E4 E58857B6 AC7D5F42 D69F6D18 7763CF1D 55034004"
"87F55BA5 7E31CC7A 7135C886 EFB4318A ED6A1E01 2D9E6832"
"A907600A 918130C4 6DC778F9 71AD0038 092999A3 33CB8B7A"
"1A1DB93D 7140003C 2A4ECEA9 F98D0ACC 0A8291CD CEC97DCF"
"8EC9B55A 7F88A46B 4DB5A851 F44182E1 C68A007E 5E0DD902"
"0BFD64B6 45036C7A 4E677D2C 38532A3A 23BA4442 CAF53EA6"
"3BB45432 9B7624C8 917BDD64 B1C0FD4C B38E8C33 4C701C3A"
"CDAD0657 FCCFEC71 9B1F5C3E 4E46041F 388147FB 4CFDB477"
"A52471F7 A9A96910 B855322E DB6340D8 A00EF092 350511E3"
"0ABEC1FF F9E3A26E 7FB29F8C 183023C3 587E38DA 0077D9B4"
"763E4E4B 94B2BBC1 94C6651E 77CAF992 EEAAC023 2A281BF6"
"B3A739C1 22611682 0AE8DB58 47A67CBE F9C9091B 462D538C"
"D72B0374 6AE77F5E 62292C31 1562A846 505DC82D B854338A"
"E49F5235 C95B9117 8CCF2DD5 CACEF403 EC9D1810 C6272B04"
"5B3B71F9 DC6B80D6 3FDD4A8E 9ADB1E69 62A69526 D43161C1"
"A41D570D 7938DAD4 A40E329C CFF46AAA 36AD004C F600C838"
"1E425A31 D951AE64 FDB23FCE C9509D43 687FEB69 EDD1CC5E"
"0B8CC3BD F64B10EF 86B63142 A3AB8829 555B2F74 7C932665"
"CB2C0F1C C01BD702 29388839 D2AF05E4 54504AC7 8B758282"
"2846C0BA 35C35F5C 59160CC0 46FD8251 541FC68C 9C86B022"
"BB709987 6A460E74 51A8A931 09703FEE 1C217E6C 3826E52C"
"51AA691E 0E423CFC 99E9E316 50C1217B 624816CD AD9A95F9"
"D5B80194 88D9C0A0 A1FE3075 A577E231 83F81D4A 3F2FA457"
"1EFC8CE0 BA8A4FE8 B6855DFE 72B0A66E DED2FBAB FBE58A30"
"FAFABE1C 5D71A87E 2F741EF8 C1FE86FE A6BBFDE5 30677F0D"
"97D11D49 F7A8443D 0822E506 A9F4614E 011E2A94 838FF88C"
"D68C8BB7 C5C6424C FFFFFFFF FFFFFFFF"),
rfc_string_to_bytes(
"7FFFFFFF FFFFFFFF D6FC2A2C 515DA54D 57EE2B10 139E9E78"
"EC5CE2C1 E7169B4A D4F09B20 8A3219FD E649CEE7 124D9F7C"
"BE97F1B1 B1863AEC 7B40D901 576230BD 69EF8F6A EAFEB2B0"
"9219FA8F AF833768 42B1B2AA 9EF68D79 DAAB89AF 3FABE49A"
"CC278638 707345BB F15344ED 79F7F439 0EF8AC50 9B56F39A"
"98566527 A41D3CBD 5E0558C1 59927DB0 E88454A5 D96471FD"
"DCB56D5B B06BFA34 0EA7A151 EF1CA6FA 572B76F3 B1B95D8C"
"8583D3E4 770536B8 4F017E70 E6FBF176 601A0266 941A17B0"
"C8B97F4E 74C2C1FF C7278919 777940C1 E1FF1D8D A637D6B9"
"9DDAFE5E 17611002 E2C778C1 BE8B41D9 6379A513 60D977FD"
"4435A11C 308FE7EE 6F1AAD9D B28C81AD DE1A7A6F 7CCE011C"
"30DA37E4 EB736483 BD6C8E93 48FBFBF7 2CC6587D 60C36C8E"
"577F0984 C289C938 5A098649 DE21BCA2 7A7EA229 716BA6E9"
"B279710F 38FAA5FF AE574155 CE4EFB4F 743695E2 911B1D06"
"D5E290CB CD86F56D 0EDFCD21 6AE22427 055E6835 FD29EEF7"
"9E0D9077 1FEACEBE 12F20E95 B34F0F78 B737A961 8B26FA7D"
"BC9874F2 72C42BDB 563EAFA1 6B4FB68C 3BB1E78E AA81A002"
"43FAADD2 BF18E63D 389AE443 77DA18C5 76B50F00 96CF3419"
"5483B005 48C09862 36E3BC7C B8D6801C 0494CCD1 99E5C5BD"
"0D0EDC9E B8A0001E 15276754 FCC68566 054148E6 E764BEE7"
"C764DAAD 3FC45235 A6DAD428 FA20C170 E345003F 2F06EC81"
"05FEB25B 2281B63D 2733BE96 1C29951D 11DD2221 657A9F53"
"1DDA2A19 4DBB1264 48BDEEB2 58E07EA6 59C74619 A6380E1D"
"66D6832B FE67F638 CD8FAE1F 2723020F 9C40A3FD A67EDA3B"
"D29238FB D4D4B488 5C2A9917 6DB1A06C 50077849 1A8288F1"
"855F60FF FCF1D137 3FD94FC6 0C1811E1 AC3F1C6D 003BECDA"
"3B1F2725 CA595DE0 CA63328F 3BE57CC9 77556011 95140DFB"
"59D39CE0 91308B41 05746DAC 23D33E5F 7CE4848D A316A9C6"
"6B9581BA 3573BFAF 31149618 8AB15423 282EE416 DC2A19C5"
"724FA91A E4ADC88B C66796EA E5677A01 F64E8C08 63139582"
"2D9DB8FC EE35C06B 1FEEA547 4D6D8F34 B1534A93 6A18B0E0"
"D20EAB86 BC9C6D6A 5207194E 67FA3555 1B568026 7B00641C"
"0F212D18 ECA8D732 7ED91FE7 64A84EA1 B43FF5B4 F6E8E62F"
"05C661DE FB258877 C35B18A1 51D5C414 AAAD97BA 3E499332"
"E596078E 600DEB81 149C441C E95782F2 2A282563 C5BAC141"
"1423605D 1AE1AFAE 2C8B0660 237EC128 AA0FE346 4E435811"
"5DB84CC3 B523073A 28D45498 84B81FF7 0E10BF36 1C137296"
"28D5348F 07211E7E 4CF4F18B 286090BD B1240B66 D6CD4AFC"
"EADC00CA 446CE050 50FF183A D2BBF118 C1FC0EA5 1F97D22B"
"8F7E4670 5D4527F4 5B42AEFF 39585337 6F697DD5 FDF2C518"
"7D7D5F0E 2EB8D43F 17BA0F7C 60FF437F 535DFEF2 9833BF86"
"CBE88EA4 FBD4221E 84117283 54FA30A7 008F154A 41C7FC46"
"6B4645DB E2E32126 7FFFFFFF FFFFFFFF")}};
for (const testInput &test : testInputs) {
bssl::UniquePtr<DH> dh(DH_new_by_nid(test.nid));
ASSERT_TRUE(dh);
check_bn_matches_bytes(test.p, DH_get0_p(dh.get()));
check_bn_matches_bytes(test.q, DH_get0_q(dh.get()));
}
}
TEST(DHExpectedTestnputTest, CalculateSharedSecretMatches) {
// KAT calculated with the following sage math code:
// prime = int("0x[prime for field sizes 2048, 3072, 4096, 8192]", 16);
// R = Integers(prime);
// g = R(2);
// client_sk = int("0xABCDEF1234567890ABCDEF1234567890ABCDEF1234567890ABCDEF"
// "1234567890", 16);
// client_pk = g^client_sk;
// server_sk = int("0xAABBCCDDEEFF11223344556677889900AABBCCDDEEFF1122334455"
// "6677889900", 16);
// shared_secret = client_pk^server_sk;
// print("client_pk", format(int(client_pk), '#x'));
// print("server_sk", format(server_sk, '#x'));
// print("expected_ss", format(int(shared_secret), '#x'));
struct testInput {
int nid;
std::vector<uint8_t> client_pk;
std::vector<uint8_t> server_sk;
std::vector<uint8_t> expected_ss;
};
testInput testInputs[] = {
{NID_ffdhe2048,
HexToBytes(
"50f2d9e890e290c60618a15fb314b71f9b24f4942db80ef29d1de007b5fc7a89"
"2f80d15b4b22a131e505beebc98d27d96eaade29d293b035f8b38b64d8927b16"
"ff3aebb887e14c56f889f5bf9fc248a2bf7e575fcc112c53f01048fa5127459c"
"e06ca98cd961a3a3aa075688da64c4983ee44668fdef1dcabc7791e4906f9301"
"eb0189b35c768c9c5b8e819f78c998a631ff9ded899080c4fb3cbd264689059e"
"6d8adca7df629fde5c2c73aeef7c39b464ebe833689e6dd85e08dbfaad89bbf9"
"140d15b5b2b31ec9b046a891fde9503234bf1c7818ec44ce00c103787e971b23"
"b7214a93cdf98b4f1920ec1f55ddb4507b5e80301d068ab76ec3df34d440089a"),
HexToBytes(
"aabbccddeeff11223344556677889900aabbccddeeff11223344556677889900"),
HexToBytes(
"897396da313e171565c15595197c521862358a5071db94b50ac24952b5619c94"
"3e4fffdb56dcfcfae886709038553b1ec7e4b6f165454ff09250662f4ea65cd9"
"86b0040de370637e053495ba08cf649e6e53a5fcc58334496061f2cc8a375d32"
"293cd2979283bedd08a2eb9a53a0f106fa29c6775b4d45cdf6b8516afb41ebfa"
"3a487510d8f3c4d337a0af880271ebfa28b5551286cb3c3b2cb6a2cc35116816"
"5e0a3a1f930bc547149fd6dfe1dc7ad7945dd74a38d46a6bc7658ac953b43770"
"b5d9212737a3cef574796c50aaa4168f07ddabccf5d12d8f87808e526cf68e15"
"224b8eb822048df910fe36a84a752177dbfce76a90f1ae864543e721d7885ad7")},
{NID_ffdhe3072,
HexToBytes(
"b3955fefb03b1979f9bd6c26d8d7820ed1d14155f6d8f08c94480bee2753f659bcf"
"2c364f58e173c114d14b782034d97eb45a2e24b313151e1b3ae4e1bb3986786c18e"
"fe5f75cc5c6dcec48e5a0a2799e12fe17b2a803f9bb0c18a5fc207a580cf4d47bda"
"d1495b26668abbbdf13ff1cda7753a792060176a167ea84f3cf6d9f303f88b5dcad"
"8201582d783cc4858f8cc6f720db0f3739a5d05b3a1b5a5c5edfa933c0a7fb4c5ee"
"f534d3212c74318080c863ee6845d85f429a9707e228868144726e8a0e93eae380a"
"2f28164f6a764a3dd114ade26cf0e5db7f49148d84dcdf7e535dcc3ff9591787ba0"
"5060b02e0d934b951ee2b3f7444c8cd1ab12af3e5722a80c441d4bb394414a6ca5e"
"f9892a6543a2087759922a94723beff30116e9a262396ca7bb601d4c786d822e2e0"
"e476cc8551c1699e4599124e7e29489230fd2fddbff2eab311113d356e2de8772ad"
"20eeddf650021cb9ae5f24ab14ab8d43b15a800421a8b26126cbcd2a754ba981660"
"68e832dd76d1992fb89689cf624d76a"),
HexToBytes(
"aabbccddeeff11223344556677889900aabbccddeeff11223344556677889900"),
HexToBytes(
"baba992b3ad121f3a9f7ff2d197e54a2e65d6951691c93e91655a4c59e01f83af28"
"85e87dbc56514026bc428095be04be5509aacf0ab9b7bc15579849a3f39f392470e"
"07d84f72f692b9ef4a898d8b68a7c73b620e5af7035579b50697f0fec671fbbdafe"
"a144330886f2c4408554a5881778f9aa29ab17cf68d82b1c98c7c93d3d287d035ff"
"2905246030ee5224ff47aac779af072c6fc4710da0d82dd58679a74cd8c33a4ceda"
"b73c3b8339028a7ccfe2e7f6564a8bbec24cf285683c772e53810f0959edfeeea9a"
"6295c669fe07df7ddbde3ba7cea8473fbdaef9cea70011150191144ddd71e36b3bc"
"d48455adaa3c7bec645e1cb8a92ffc18bd5414d9e1ddd18bc36fc843c2955028497"
"970b6806b1f721f208b813e5d16e0503a4186c964a476035a5afe221936c6a3b721"
"cc6ca686fe6e8a65faf3cd6db3c718a7af58e3b8cd6712b34d33bb917a24c6ab41c"
"15c056e2afb0936970b3224b4c183eb3bba319a09083621ecb93ed78139955b17c8"
"bfebcb188edcc5b27385eab0588ad4a")},
{NID_ffdhe4096,
HexToBytes(
"525b74f0c4c3d942cd65f924cebd4f76a1ec2c866d48462e1c468f75070b18bc"
"d6f4ce8d874895d6a9d2ad55781fcc1406b61526d1667954674cf6bb2d873ad4"
"1128bb3f9412be3f452582bb9ea6091a39b05cd877a7774e52e44e9066a96cf2"
"f6829f96e6e26a892cca132ae31dc771b333f4f0e011a9c9c83b245865b24ff9"
"f6bda4adcdee17195518c58d6821f2819498631ab83a8a99e7f33bdd98d2821b"
"e01dbd8d83dcbee7d1302597354bef404f2f17cac5febfe7cc6c5860faa39ceb"
"236eceddf59c7d463071d2715612ed78c35d6e3783da3042862068cf206a08fe"
"ce83f60572db55c60f6f6811f359b6f1d504e33d3054c0fe083dc7e73030ed42"
"7f079ce60324e71e81fed25c11d2dc853a9fa9f2f64c33f92618d01b8b9bdde6"
"2792fbc353aeb97f370f0ef85bbbd0eccbfd7104f6c4e77c7b26ff380aedb4e4"
"f974706aa9b4c8eeb924c72d233aa90b8d0376f540ff4af63fa4a7baf47b035f"
"f2a1564080e2c31bfc4fad3834d021858e26e4710db3e37144332b909f3340a8"
"805b66a7cf042c37797bd46f784793e49cb16e3728e1fc6c98986d21027303ef"
"898d32caf0131c323518ced384a9b7ae0c45c15edcb054dfe7044af3ec616ce8"
"e5870ea2bef5aa40f4e65721d724ec68774638b13350abbb1f2ac22b0852c6e3"
"4ab2608390ec3b971021c0c20e18e2cbcc89b1eea1c2ecb1db6eeaf4195ec7f2"),
HexToBytes(
"aabbccddeeff11223344556677889900aabbccddeeff11223344556677889900"),
HexToBytes(
"ba7d5bb3682473327e80c07bcfd58a6af9bf0fa4662288291feb847cc8121ca6"
"12ff09bc9d46e3a76f44bad0006e1babdafef5091aed25e53037a9077af93bc5"
"76910dbc3e6d345174b36dbec2ab92e0744dc4f5d1d25596b9aa53bc10c22dfe"
"fec93c178b8ffd4388c07ffa9ad8a7f22c274066c92f8063b1665609aa224039"
"aff15fb5ac07b21f9c81aace529ad5c29688d6940996b5e3a47de1b8cd3b212a"
"3e534677df246375679cc014a77c3cc4e14aaa5eb4fc4d0f8a542a0e833a16f4"
"dc5c46f11c5ffe14152b9c7f9e504ae01ff84db158b9e48e9fbc46b99190cad2"
"e22113797dc7c81ad7c86bcd5e75405226459bb54b26fae179378e377ce5618e"
"65f04d2213e1991cefe991ec43272b6c7d93b51e2ccc3bf64486efd1e5c73b3b"
"f9344271ab9fbc43af41232ae7524c8213433ef39c64481e9cd06b9f9dc34226"
"85dfb2d69b8dc1af0f44d6f52d1d857ec28d93f459a23386ecfe5d97130e201d"
"90f159ff5995bbf766ceb38594b7a3192c99432e007b99f1ea7a828d15a1cba6"
"d86cd020ff64b1774cd35e33e3696a98574cedb64534f8ca88e2690709718d66"
"f4b88d759689819cde545d202b641b0529a02d588ff4c6b832c3f5a3d9bec9ec"
"ce0fb9af978b76bf93eba919c5bef844b4b1e2bff3d3758b577c70fa78d89a1d"
"d5a1864a2d3795c3668562c67aa77265f38812f001d28b25f7965109481ec2c7")
},
{NID_ffdhe8192,
HexToBytes(
"9d8f631335eb2f802176a33b08ea7553398407e474f2b8031fbefe1f62cdec9798d"
"1804ac73a0b1dd5735ad177b8b89d8f9b807e103dbf1f3161a63475e1249fed8a37"
"f6704c730be48f7dfc0716cc30b094457b91b641c13f95074b7230ab5daf38ced4d"
"784c6ed56eae1cb9a9c4276039270f04e4a4b0e4ca48945ba8ccc2837f4063db35c"
"cbe4a03533ab50058518a89183938f4f94bf014e4142da43745002c35e10b67335c"
"564b728cda9b340330a921d776dcfcffca773d354813b387b215eb2fc3732f79ba9"
"b9a1d11231796d33192a92c3a686245c6c40d8c78140761f2a961ee587965ea395d"
"fdaa306141efdd51c5c6ed8976d4a87ff8b8d29f94556195e763d9b6c19de3d0b74"
"d9e11a6b5b7b2a6477c419460e7c4a611bee2eea9486dadc625ba7b4e7438eb2a42"
"c2d2c577e384ef22e355662989b27022872cfa97f14a20bdb2769eecd7756fd45a2"
"5d471ad9e4db865deb58e9d049a1947dcbbcc409d7a14dea8dd32e68dbd0f9e7872"
"373e3c33c96c86d50602fe320951cf19d5cf1444150c9063585d1993e79279a5492"
"5a077256ba254e468d1cba8e48ff9c9b87c8814a61c1b4005314f5b75dd50ccb1a8"
"9142277d64edea02b81b5ba825d5822c0092cf1206feb88392e213447153e1aa0aa"
"23837f641b7c7da7cafeac26e8c09ec0402c4c39e67f35b2fe5b0a122bb16cd30e2"
"ac5a6f1a3c9aae8338c315c80dc874eb4584c9a68dd329ef30489927bb0cac69518"
"88108712055b1d89b0e394245f92a236f31387a0e5bde7dfa86b112209f84d5c97c"
"c9003cf72e58ab8acd05c8c08b8897021d801cc7f2035d04c3f6eda42e827741e73"
"5a36eef2031661f6cb766adf5026e52cbb520f0c7913f6d13235655932f61bb9396"
"cf55da603a81f2e1e56cdf483a05f11d192e9a689a18334465df0cbd6c9180a636d"
"f31f3583331582b1b7042de6ab3c2c16b02d288adc082840471d569aed38fed5fa6"
"a19b30fffb9a17030e78eea87c9151040308685d1edc1de44eca7fdb04f4bf9783a"
"cb9711a3f5fd5d04e2d5ef77f4ea2d8fe3624e0c78e90354e7558d65a56f5e720fa"
"97aec18da9428ad8b4736d1cb1d89fa4c54015bff26289eaf4c523a29fe40a7ef53"
"988b7c21034eed774617fc252b01f09d0a7e335d0363e0d703b5d3b10ef9fb1b999"
"c8d6eceb185f570235f3109bcfcfc843ebb2a3df45227a679d5e48d681ba95e0121"
"3b5a096a5fd0e2bc9701816819a89fac2cb83d1485566b6191ca768ce154649a70b"
"47eec616b142755405b344307f2fd74aa013e1c4ccfe9bb5547f353b1f94440f356"
"7a8994bcadcc22798bd9449211098ee5e0bbaf649aa77cfe9ef51795190ad0c0d7d"
"376cb82bde11286ff39f94798c8b2bcff253f5cc0e77668596a125c77c39ef89574"
"a9f246bb9fc6b5e5f86b5c07f26f06af119d19"),
HexToBytes(
"aabbccddeeff11223344556677889900aabbccddeeff11223344556677889900"),
HexToBytes(
"9040f16f84a65d195f5016293a8c9e7cac0aa740636ead9e8bc008be34111702f60"
"b449c8bced3a155e6a1f44652bbbe1d8c1390db146ee361a571fa7145092fb0752a"
"6af48b2e9de26b07757fc35bc846e8ecb5c1e626bed394fb24fe9d470b0e210f87c"
"18716a16612e263367da677d0f57be0afeb9e76b113b2a629bb9075b02005d734b8"
"33c63b2a19c201089fc6125bf0117cf7ae35908e5d8eabf98aeb46fd405ee1d93cd"
"6883fd328cbabbc3274d13e7f653bf54091205e7ff2a26e52223e74f508aa309892"
"f962370c98c16d012c13bcbe6d5fcf6e6319d14db76829d6c8e121f0f4b59cde07b"
"564645c37d127fec97fd8efaeac174f30bfdda1c90007637e126f748e4485f8a36d"
"c735cd78f2c12cbff1d0057d573a764ad01661726117c91a6227c8d4e9ab0c9f13f"
"9dd5720bb840da91e71313bb39093d5d00c7051d2ef52b7e091fc467ff4c7427702"
"6b223e3217b0a407cdb3061bb2f71d0ffe8e46536069973c0f4424381758554ab35"
"1fdf25c7a33bf267de0bddfa8f52ff903fd0df500cd13f44b7911ad30913fbf45da"
"594b9a57a7cadaba17c5b5e62ff8ddc3fe6a3d9c484078ab676fc6862a8c77cd433"
"3b36e396e979a41438ea82f9a491414c75acedb0cc77063695569f5bc1dc509bb0d"
"81c2c44d041815e3d2f043f4910e15dfa1cfbd3daab2f3b4b0b21d2d1edc1d18bbd"
"a9547fa67f9f9c28cc3a9da2fe829c02df7e20a1aa1bcba93f0a9868358dab26edb"
"31337c9121bd35b8c56616f1958db33d807ab042cf8efa8fad60a2f0f264efd49e6"
"759cf384fda088d3a14f176eeb3b06eca54fff2e4898e9f5126b2236ffd3777839c"
"98586fd4180f602132a943f9c401b06c8e1281953157164546e75d4359b518be90b"
"e3fc8dd731218a75c3c7627a40f50d7f604776de08814ec5cc6f2865ee8ecd0e426"
"123c08c71ddbf39a0564b0edaa43513674688c56d61c9712d4b11375ada55d69641"
"b416880c1387428ecd0cdb39cedd02987ae30839c97141b0162de1992c549046214"
"bf45a3054561539a647aaebe0392366cd6936accf7262412d987618a05882d5d19e"
"d93a1f3245f3930f3bf4cbc6529ab14dddf02ce6045b6971de8572a625d9911d092"
"9d159307491b6b6f17dba77e0e9ce76875ab276226bc01f301effc949257092c2bd"
"ab22141e7487dd1df5188edad0776dcefaa7298b3a2a9c42799cef5207a47b37a0c"
"5c45c160b76394adda6b76e40ac32d705c279e23c49c74b9ab2609009950fa6758e"
"710fa7eb58ef4bdbddf876978d7c99cdb357d25c6515e0a7192b15751b7dd04c077"
"095753c8481d0835ff5008c0953ac1d5ab08c9925c3a73c25875f3bb4be449e4247"
"660d45ee031b25061aaa9eb5d72d3fa0670e9c7ed72a86d5dc2df7c64ee2da143e7"
"5e6042700423e990849b387d59b9a372dd0d04")}};
for (const testInput &test : testInputs) {
bssl::UniquePtr<BIGNUM> client_public(
BN_bin2bn(test.client_pk.data(), test.client_pk.size(), nullptr));
EXPECT_TRUE(client_public);
bssl::UniquePtr<BIGNUM> server_secret(
BN_bin2bn(test.server_sk.data(), test.server_sk.size(), nullptr));
EXPECT_TRUE(server_secret);
bssl::UniquePtr<DH> ffdhe2048_dh(DH_new_by_nid(test.nid));
EXPECT_TRUE(
DH_set0_key(ffdhe2048_dh.get(), nullptr, server_secret.release()));
uint8_t buffer[4096];
int size = DH_compute_key(buffer, client_public.get(), ffdhe2048_dh.get());
EXPECT_TRUE(size > 0 && size < 4096);
EXPECT_EQ(Bytes(buffer, size), Bytes(test.expected_ss));
}
}
TEST(DHTest, LeadingZeros) {
bssl::UniquePtr<BIGNUM> p(BN_get_rfc3526_prime_1536(nullptr));
ASSERT_TRUE(p);
bssl::UniquePtr<BIGNUM> g(BN_new());
ASSERT_TRUE(g);
ASSERT_TRUE(BN_set_word(g.get(), 2));
bssl::UniquePtr<DH> dh = NewDHGroup(p.get(), /*q=*/nullptr, g.get());
ASSERT_TRUE(dh);
// These values are far too small to be reasonable Diffie-Hellman keys, but
// they are an easy way to get a shared secret with leading zeros.
bssl::UniquePtr<BIGNUM> priv_key(BN_new()), peer_key(BN_new());
ASSERT_TRUE(priv_key);
ASSERT_TRUE(BN_set_word(priv_key.get(), 2));
ASSERT_TRUE(peer_key);
ASSERT_TRUE(BN_set_word(peer_key.get(), 3));
ASSERT_TRUE(DH_set0_key(dh.get(), /*pub_key=*/nullptr, priv_key.get()));
priv_key.release();
uint8_t padded[192] = {0};
padded[191] = 9;
static const uint8_t kTruncated[] = {9};
EXPECT_EQ(int(sizeof(padded)), DH_size(dh.get()));
std::vector<uint8_t> buf(DH_size(dh.get()));
int len = DH_compute_key(buf.data(), peer_key.get(), dh.get());
ASSERT_GT(len, 0);
EXPECT_EQ(Bytes(buf.data(), len), Bytes(kTruncated));
len = DH_compute_key_padded(buf.data(), peer_key.get(), dh.get());
ASSERT_GT(len, 0);
EXPECT_EQ(Bytes(buf.data(), len), Bytes(padded));
}
TEST(DHTest, Overwrite) {
// Generate a DH key with the 1536-bit MODP group.
bssl::UniquePtr<BIGNUM> p(BN_get_rfc3526_prime_1536(nullptr));
ASSERT_TRUE(p);
bssl::UniquePtr<BIGNUM> g(BN_new());
ASSERT_TRUE(g);
ASSERT_TRUE(BN_set_word(g.get(), 2));
bssl::UniquePtr<DH> key1 = NewDHGroup(p.get(), /*q=*/nullptr, g.get());
ASSERT_TRUE(key1);
ASSERT_TRUE(DH_generate_key(key1.get()));
bssl::UniquePtr<BIGNUM> peer_key(BN_new());
ASSERT_TRUE(peer_key);
ASSERT_TRUE(BN_set_word(peer_key.get(), 42));
// Use the key to fill in cached values.
std::vector<uint8_t> buf1(DH_size(key1.get()));
ASSERT_GT(DH_compute_key_padded(buf1.data(), peer_key.get(), key1.get()), 0);
// Generate a different key with a different group.
p.reset(BN_get_rfc3526_prime_2048(nullptr));
ASSERT_TRUE(p);
bssl::UniquePtr<DH> key2 = NewDHGroup(p.get(), /*q=*/nullptr, g.get());
ASSERT_TRUE(key2);
ASSERT_TRUE(DH_generate_key(key2.get()));
// Overwrite |key1|'s contents with |key2|.
p.reset(BN_dup(DH_get0_p(key2.get())));
ASSERT_TRUE(p);
g.reset(BN_dup(DH_get0_g(key2.get())));
ASSERT_TRUE(g);
bssl::UniquePtr<BIGNUM> pub(BN_dup(DH_get0_pub_key(key2.get())));
ASSERT_TRUE(pub);
bssl::UniquePtr<BIGNUM> priv(BN_dup(DH_get0_priv_key(key2.get())));
ASSERT_TRUE(priv);
ASSERT_TRUE(DH_set0_pqg(key1.get(), p.get(), /*q=*/nullptr, g.get()));
p.release();
g.release();
ASSERT_TRUE(DH_set0_key(key1.get(), pub.get(), priv.get()));
pub.release();
priv.release();
// Verify that |key1| and |key2| behave equivalently.
buf1.resize(DH_size(key1.get()));
ASSERT_GT(DH_compute_key_padded(buf1.data(), peer_key.get(), key1.get()), 0);
std::vector<uint8_t> buf2(DH_size(key2.get()));
ASSERT_GT(DH_compute_key_padded(buf2.data(), peer_key.get(), key2.get()), 0);
EXPECT_EQ(Bytes(buf1), Bytes(buf2));
}
TEST(DHTest, GenerateKeyTwice) {
bssl::UniquePtr<BIGNUM> p(BN_get_rfc3526_prime_2048(nullptr));
ASSERT_TRUE(p);
bssl::UniquePtr<BIGNUM> g(BN_new());
ASSERT_TRUE(g);
ASSERT_TRUE(BN_set_word(g.get(), 2));
bssl::UniquePtr<DH> key1 = NewDHGroup(p.get(), /*q=*/nullptr, g.get());
ASSERT_TRUE(key1);
ASSERT_TRUE(DH_generate_key(key1.get()));
// Copy the parameters and private key to a new DH object.
bssl::UniquePtr<DH> key2(DHparams_dup(key1.get()));
ASSERT_TRUE(key2);
bssl::UniquePtr<BIGNUM> priv_key(BN_dup(DH_get0_priv_key(key1.get())));
ASSERT_TRUE(DH_set0_key(key2.get(), /*pub_key=*/NULL, priv_key.get()));
priv_key.release();
// This time, calling |DH_generate_key| preserves the old key and recomputes
// the public key.
ASSERT_TRUE(DH_generate_key(key2.get()));
EXPECT_EQ(BN_cmp(DH_get0_priv_key(key1.get()), DH_get0_priv_key(key2.get())),
0);
EXPECT_EQ(BN_cmp(DH_get0_pub_key(key1.get()), DH_get0_pub_key(key2.get())),
0);
}
// Bad parameters should be rejected, rather than cause a DoS risk in the
// event that an application uses Diffie-Hellman incorrectly, with untrusted
// domain parameters.
TEST(DHTest, InvalidParameters) {
auto check_invalid_group = [](DH *dh) {
// All operations on egregiously invalid groups should fail.
EXPECT_FALSE(DH_generate_key(dh));
int check_result;
EXPECT_FALSE(DH_check(dh, &check_result));
bssl::UniquePtr<BIGNUM> pub_key(BN_new());
ASSERT_TRUE(pub_key);
ASSERT_TRUE(BN_set_u64(pub_key.get(), 42));
EXPECT_FALSE(DH_check_pub_key(dh, pub_key.get(), &check_result));
uint8_t buf[1024];
EXPECT_EQ(DH_compute_key(buf, pub_key.get(), dh), -1);
EXPECT_EQ(DH_compute_key_padded(buf, pub_key.get(), dh), -1);
};
bssl::UniquePtr<BIGNUM> p(BN_get_rfc3526_prime_2048(nullptr));
ASSERT_TRUE(p);
bssl::UniquePtr<BIGNUM> g(BN_new());
ASSERT_TRUE(g);
ASSERT_TRUE(BN_set_word(g.get(), 2));
// p is negative.
BN_set_negative(p.get(), 1);
bssl::UniquePtr<DH> dh = NewDHGroup(p.get(), /*q=*/nullptr, g.get());
ASSERT_TRUE(dh);
BN_set_negative(p.get(), 0);
check_invalid_group(dh.get());
// g is negative.
BN_set_negative(g.get(), 1);
dh = NewDHGroup(p.get(), /*q=*/nullptr, g.get());
ASSERT_TRUE(dh);
BN_set_negative(g.get(), 0);
check_invalid_group(dh.get());
// g is not reduced mod p.
dh = NewDHGroup(p.get(), /*q=*/nullptr, p.get());
ASSERT_TRUE(dh);
BN_set_negative(g.get(), 0);
check_invalid_group(dh.get());
// p is too large.
bssl::UniquePtr<BIGNUM> large(BN_new());
ASSERT_TRUE(BN_set_bit(large.get(), 0));
ASSERT_TRUE(BN_set_bit(large.get(), 10000000));
dh = NewDHGroup(large.get(), /*q=*/nullptr, g.get());
ASSERT_TRUE(dh);
check_invalid_group(dh.get());
// q is too large.
dh = NewDHGroup(p.get(), large.get(), g.get());
ASSERT_TRUE(dh);
check_invalid_group(dh.get());
// Attempting to generate too large of a Diffie-Hellman group should fail.
EXPECT_FALSE(
DH_generate_parameters_ex(dh.get(), 20000, DH_GENERATOR_5, nullptr));
}
TEST(DHTest, PrivateKeyLength) {
// Use a custom P, rather than one of the MODP primes, to pick one which does
// not begin with all ones. Otherwise some of the tests for boundary
// conditions below will not notice mistakes.
static const uint8_t kP[] = {
0xb6, 0xfa, 0x00, 0x07, 0x0a, 0x1f, 0xfb, 0x28, 0x7e, 0x6e, 0x6a, 0x97,
0xca, 0xa4, 0x6d, 0xf5, 0x25, 0x84, 0x76, 0xc6, 0xc4, 0xa5, 0x47, 0xb6,
0xb2, 0x7d, 0x76, 0x46, 0xf2, 0xb5, 0x7c, 0xc6, 0xc6, 0xb4, 0xb4, 0x82,
0xc5, 0xed, 0x7b, 0xd9, 0x30, 0x6e, 0x41, 0xdb, 0x7f, 0x93, 0x2f, 0xb5,
0x85, 0xa7, 0x38, 0x9e, 0x08, 0xc4, 0x25, 0x92, 0x7d, 0x5d, 0x2b, 0x77,
0x09, 0xe0, 0x2f, 0x4e, 0x14, 0x36, 0x8a, 0x08, 0x0b, 0xfd, 0x89, 0x22,
0x47, 0xb4, 0xbd, 0xff, 0x79, 0x4e, 0x78, 0x66, 0x2a, 0x77, 0x74, 0xbd,
0x85, 0xb6, 0xce, 0x5a, 0x89, 0xb7, 0x60, 0xc3, 0x8d, 0x2a, 0x1f, 0xb7,
0x30, 0x33, 0x1a, 0xc4, 0x51, 0xa8, 0x18, 0x62, 0x40, 0xb6, 0x5a, 0xb5,
0x6c, 0xf5, 0xf9, 0xbc, 0x94, 0x50, 0xba, 0xeb, 0xa2, 0xe9, 0xb3, 0x99,
0xde, 0xf8, 0x55, 0xfd, 0xed, 0x46, 0x1b, 0x69, 0xa5, 0x6a, 0x04, 0xe3,
0xa9, 0x2c, 0x0c, 0x89, 0x41, 0xfe, 0xe4, 0xa0, 0x85, 0x85, 0x2c, 0x45,
0xf1, 0xcb, 0x96, 0x04, 0x23, 0x4a, 0x7d, 0x56, 0x38, 0xd8, 0x86, 0x9d,
0xfc, 0xe0, 0x33, 0x65, 0x1a, 0xff, 0x07, 0xf0, 0xfb, 0xc6, 0x5d, 0x26,
0xa2, 0x96, 0xd4, 0xb5, 0xe8, 0xcd, 0x48, 0xd7, 0x8e, 0x53, 0xfe, 0xcb,
0x4b, 0xf2, 0x3a, 0x8b, 0x35, 0x87, 0x0a, 0x79, 0xbe, 0x8d, 0x36, 0x45,
0x12, 0x6e, 0x1b, 0xd4, 0xa5, 0x57, 0xe0, 0x98, 0xb7, 0x59, 0xba, 0xc2,
0xd8, 0x2e, 0x05, 0x0f, 0xe1, 0x70, 0x39, 0x5b, 0xe6, 0x4e, 0xdb, 0xb0,
0xdd, 0x7e, 0xe6, 0x66, 0x13, 0x85, 0x26, 0x32, 0x27, 0xa1, 0x00, 0x7f,
0x6a, 0xa9, 0xda, 0x2e, 0x50, 0x25, 0x87, 0x73, 0xab, 0x71, 0xfb, 0xa0,
0x92, 0xba, 0x8e, 0x9c, 0x4e, 0xea, 0x18, 0x32, 0xc4, 0x02, 0x8f, 0xe8,
0x95, 0x9e, 0xcb, 0x9f};
bssl::UniquePtr<BIGNUM> p(BN_bin2bn(kP, sizeof(kP), nullptr));
ASSERT_TRUE(p);
bssl::UniquePtr<BIGNUM> g(BN_new());
ASSERT_TRUE(g);
ASSERT_TRUE(BN_set_word(g.get(), 2));
bssl::UniquePtr<BIGNUM> q(BN_new());
ASSERT_TRUE(q);
ASSERT_TRUE(BN_rshift1(q.get(), p.get())); // (p-1)/2
EXPECT_EQ(BN_num_bits(p.get()), 2048u);
EXPECT_EQ(BN_num_bits(q.get()), 2047u);
// This test will only probabilistically notice some kinds of failures, so we
// repeat it for several iterations.
constexpr unsigned kIterations = 100;
// If the private key was chosen from the range [1, M), num_bits(priv_key)
// should be very close to num_bits(M), but may be a few bits short. Allow 128
// leading zeros, which should fail with negligible probability.
constexpr unsigned kMaxLeadingZeros = 128;
for (unsigned i = 0; i < kIterations; i++) {
// If unspecified, the private key is bounded by q = (p-1)/2.
bssl::UniquePtr<DH> dh = NewDHGroup(p.get(), /*q=*/nullptr, g.get());
ASSERT_TRUE(dh);
ASSERT_TRUE(DH_generate_key(dh.get()));
EXPECT_LT(BN_cmp(DH_get0_priv_key(dh.get()), q.get()), 0);
EXPECT_LE(BN_num_bits(q.get()) - kMaxLeadingZeros,
BN_num_bits(DH_get0_priv_key(dh.get())));
// Setting too large of a private key length should not be a DoS vector. The
// key is clamped to q = (p-1)/2.
dh = NewDHGroup(p.get(), /*q=*/nullptr, g.get());
ASSERT_TRUE(dh);
DH_set_length(dh.get(), 10000000);
ASSERT_TRUE(DH_generate_key(dh.get()));
EXPECT_LT(BN_cmp(DH_get0_priv_key(dh.get()), q.get()), 0);
EXPECT_LE(BN_num_bits(q.get()) - kMaxLeadingZeros,
BN_num_bits(DH_get0_priv_key(dh.get())));
// A small private key size should bound the private key.
dh = NewDHGroup(p.get(), /*q=*/nullptr, g.get());
ASSERT_TRUE(dh);
unsigned bits = 1024;
DH_set_length(dh.get(), bits);
ASSERT_TRUE(DH_generate_key(dh.get()));
EXPECT_LE(BN_num_bits(DH_get0_priv_key(dh.get())), bits);
EXPECT_LE(bits - kMaxLeadingZeros, BN_num_bits(DH_get0_priv_key(dh.get())));
// If the private key length is num_bits(q) - 1, the length should be the
// limiting factor.
dh = NewDHGroup(p.get(), /*q=*/nullptr, g.get());
ASSERT_TRUE(dh);
bits = BN_num_bits(q.get()) - 1;
DH_set_length(dh.get(), bits);
ASSERT_TRUE(DH_generate_key(dh.get()));
EXPECT_LE(BN_num_bits(DH_get0_priv_key(dh.get())), bits);
EXPECT_LE(bits - kMaxLeadingZeros, BN_num_bits(DH_get0_priv_key(dh.get())));
// If the private key length is num_bits(q), q should be the limiting
// factor.
dh = NewDHGroup(p.get(), /*q=*/nullptr, g.get());
ASSERT_TRUE(dh);
DH_set_length(dh.get(), BN_num_bits(q.get()));
ASSERT_TRUE(DH_generate_key(dh.get()));
EXPECT_LT(BN_cmp(DH_get0_priv_key(dh.get()), q.get()), 0);
EXPECT_LE(BN_num_bits(q.get()) - kMaxLeadingZeros,
BN_num_bits(DH_get0_priv_key(dh.get())));
}
}
// Test to make sure DH_check validates the standard DH parameters
// from RFC 3526 and RFC 7919.
TEST(DHTest, DHCheckForStandardParams) {
int flags;
bssl::UniquePtr<DH> dh1(DH_get_rfc7919_2048());
ASSERT_TRUE(DH_check(dh1.get(), &flags));
EXPECT_EQ(flags, 0);
bssl::UniquePtr<BIGNUM> p(BN_get_rfc3526_prime_2048(nullptr));
ASSERT_TRUE(p);
bssl::UniquePtr<BIGNUM> g(BN_new());
ASSERT_TRUE(g);
ASSERT_TRUE(BN_set_word(g.get(), 2));
bssl::UniquePtr<DH> dh2 = NewDHGroup(p.get(), /*q=*/nullptr, g.get());
ASSERT_TRUE(dh2);
ASSERT_TRUE(DH_check(dh2.get(), &flags));
EXPECT_EQ(flags, 0);
}
TEST(DHTest, DHMarshalPubKey) {
const char* dh512_pem =
"-----BEGIN DH PARAMETERS-----\n"
"MEYCQQDqvLe5oX3p+Dw8T7NWG7nlWVFK58Ev74xvxYH72DC4kqfPEFPvNnCpFoRB\n"
"RdxOz7DZ6JO/GxobSRyAAI766+GDAgEC\n"
"-----END DH PARAMETERS-----";
const uint64_t encoded_g = 2;
const char encoded_p_dec_str[] = "12294183602774786812319504504704470077603616440910559765086569005477513835495488680341310019770549315448633656928525381740662262980129138358936697450520963";
bssl::UniquePtr<EVP_PKEY> epkey_dh_params(nullptr);
{
const size_t pem_len = OPENSSL_strnlen(dh512_pem, 1024);
bssl::UniquePtr<BIO> in_bio(BIO_new_mem_buf(dh512_pem, pem_len));
ASSERT_TRUE(in_bio);
epkey_dh_params.reset(PEM_read_bio_Parameters(in_bio.get(), nullptr));
ASSERT_TRUE(epkey_dh_params);
}
// Sanity check the Param parsing
{
DH *dh_params = EVP_PKEY_get0_DH(epkey_dh_params.get());
ASSERT_TRUE(dh_params);
const BIGNUM *p = DH_get0_p(dh_params);
const BIGNUM *g = DH_get0_g(dh_params);
uint64_t parsed_g = 0;
ASSERT_TRUE(BN_get_u64(g, &parsed_g));
ASSERT_EQ(parsed_g, encoded_g);
const char *parsed_p_dec_str = BN_bn2dec(p);
ASSERT_NE(parsed_p_dec_str, nullptr);
ASSERT_EQ(OPENSSL_strcasecmp(encoded_p_dec_str, parsed_p_dec_str), 0);
OPENSSL_free((void *)parsed_p_dec_str);
}
// Perform keygen operation
bssl::UniquePtr<EVP_PKEY> gen_dh(nullptr);
{
bssl::UniquePtr<EVP_PKEY_CTX> epkey_ctx(
EVP_PKEY_CTX_new(epkey_dh_params.get(), nullptr));
ASSERT_TRUE(epkey_ctx);
ASSERT_TRUE(EVP_PKEY_keygen_init(epkey_ctx.get()));
EVP_PKEY *gen_dh_raw = nullptr;
ASSERT_TRUE(EVP_PKEY_keygen(epkey_ctx.get(), &gen_dh_raw));
gen_dh.reset(gen_dh_raw);
ASSERT_TRUE(gen_dh);
}
// Marshall pubkey to der
const uint8_t* pubkey_der = NULL;
size_t pubkey_der_len = 0;
{
bssl::UniquePtr<BIO> out_bio(BIO_new(BIO_s_mem()));
ASSERT_TRUE(out_bio);
ASSERT_TRUE(i2d_PUBKEY_bio(out_bio.get(), gen_dh.get()));
ASSERT_TRUE(BIO_flush(out_bio.get()));
ASSERT_TRUE(BIO_mem_contents(out_bio.get(), &pubkey_der, &pubkey_der_len));
ASSERT_GT(pubkey_der_len, (size_t)0);
ASSERT_NE(pubkey_der, nullptr);
// We own the allocation after this
pubkey_der = (const uint8_t*)OPENSSL_memdup(pubkey_der, pubkey_der_len);
}
// Parse der to pubkey
bssl::UniquePtr<EVP_PKEY> parsed_der_pubkey(nullptr);
{
bssl::UniquePtr<BIO> in_bio(BIO_new_mem_buf(pubkey_der, pubkey_der_len));
ASSERT_TRUE(in_bio);
EVP_PKEY* parsed_dh_pubkey_raw = nullptr;
ASSERT_TRUE(d2i_PUBKEY_bio(in_bio.get(), &parsed_dh_pubkey_raw));
parsed_der_pubkey.reset(parsed_dh_pubkey_raw);
ASSERT_TRUE(parsed_der_pubkey);
}
ASSERT_TRUE(EVP_PKEY_cmp(gen_dh.get(), parsed_der_pubkey.get()));
// Marshall pubkey to PEM
const uint8_t* pubkey_pem = NULL;
size_t pubkey_pem_len = 0;
{
bssl::UniquePtr<BIO> out_bio(BIO_new(BIO_s_mem()));
ASSERT_TRUE(out_bio);
ASSERT_TRUE(PEM_write_bio_PUBKEY(out_bio.get(), gen_dh.get()));
ASSERT_TRUE(BIO_flush(out_bio.get()));
ASSERT_TRUE(BIO_mem_contents(out_bio.get(), &pubkey_pem, &pubkey_pem_len));
ASSERT_GT(pubkey_pem_len, (size_t)0);
ASSERT_TRUE(pubkey_pem);
// We own the allocation after this
pubkey_pem = (const uint8_t*)OPENSSL_memdup(pubkey_pem, pubkey_pem_len);
}
// Parse PEM to pubkey
bssl::UniquePtr<EVP_PKEY> parsed_pem_pubkey(nullptr);
{
bssl::UniquePtr<BIO> in_bio(BIO_new_mem_buf(pubkey_pem, pubkey_pem_len));
ASSERT_TRUE(in_bio);
EVP_PKEY* pem_pubkey_raw = NULL;
ASSERT_TRUE(PEM_read_bio_PUBKEY(in_bio.get(), &pem_pubkey_raw, NULL, NULL));
parsed_pem_pubkey.reset(pem_pubkey_raw);
ASSERT_TRUE(parsed_pem_pubkey);
}
ASSERT_TRUE(EVP_PKEY_cmp(gen_dh.get(), parsed_pem_pubkey.get()));
OPENSSL_free((void*)pubkey_der);
OPENSSL_free((void*)pubkey_pem);
}