123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293 |
- # This file is dual licensed under the terms of the Apache License, Version
- # 2.0, and the BSD License. See the LICENSE file in the root of this repository
- # for complete details.
- from cryptography.exceptions import UnsupportedAlgorithm, _Reasons
- from cryptography.hazmat.primitives import serialization
- from cryptography.hazmat.primitives.asymmetric import dh
- def _dh_params_dup(dh_cdata, backend):
- lib = backend._lib
- ffi = backend._ffi
- param_cdata = lib.DHparams_dup(dh_cdata)
- backend.openssl_assert(param_cdata != ffi.NULL)
- param_cdata = ffi.gc(param_cdata, lib.DH_free)
- if lib.CRYPTOGRAPHY_IS_LIBRESSL:
- # In libressl DHparams_dup don't copy q
- q = ffi.new("BIGNUM **")
- lib.DH_get0_pqg(dh_cdata, ffi.NULL, q, ffi.NULL)
- q_dup = lib.BN_dup(q[0])
- res = lib.DH_set0_pqg(param_cdata, ffi.NULL, q_dup, ffi.NULL)
- backend.openssl_assert(res == 1)
- return param_cdata
- def _dh_cdata_to_parameters(dh_cdata, backend):
- param_cdata = _dh_params_dup(dh_cdata, backend)
- return _DHParameters(backend, param_cdata)
- class _DHParameters(dh.DHParameters):
- def __init__(self, backend, dh_cdata):
- self._backend = backend
- self._dh_cdata = dh_cdata
- def parameter_numbers(self) -> dh.DHParameterNumbers:
- p = self._backend._ffi.new("BIGNUM **")
- g = self._backend._ffi.new("BIGNUM **")
- q = self._backend._ffi.new("BIGNUM **")
- self._backend._lib.DH_get0_pqg(self._dh_cdata, p, q, g)
- self._backend.openssl_assert(p[0] != self._backend._ffi.NULL)
- self._backend.openssl_assert(g[0] != self._backend._ffi.NULL)
- if q[0] == self._backend._ffi.NULL:
- q_val = None
- else:
- q_val = self._backend._bn_to_int(q[0])
- return dh.DHParameterNumbers(
- p=self._backend._bn_to_int(p[0]),
- g=self._backend._bn_to_int(g[0]),
- q=q_val,
- )
- def generate_private_key(self) -> dh.DHPrivateKey:
- return self._backend.generate_dh_private_key(self)
- def parameter_bytes(
- self,
- encoding: serialization.Encoding,
- format: serialization.ParameterFormat,
- ) -> bytes:
- if format is not serialization.ParameterFormat.PKCS3:
- raise ValueError("Only PKCS3 serialization is supported")
- if not self._backend._lib.Cryptography_HAS_EVP_PKEY_DHX:
- q = self._backend._ffi.new("BIGNUM **")
- self._backend._lib.DH_get0_pqg(
- self._dh_cdata,
- self._backend._ffi.NULL,
- q,
- self._backend._ffi.NULL,
- )
- if q[0] != self._backend._ffi.NULL:
- raise UnsupportedAlgorithm(
- "DH X9.42 serialization is not supported",
- _Reasons.UNSUPPORTED_SERIALIZATION,
- )
- return self._backend._parameter_bytes(encoding, format, self._dh_cdata)
- def _get_dh_num_bits(backend, dh_cdata) -> int:
- p = backend._ffi.new("BIGNUM **")
- backend._lib.DH_get0_pqg(dh_cdata, p, backend._ffi.NULL, backend._ffi.NULL)
- backend.openssl_assert(p[0] != backend._ffi.NULL)
- return backend._lib.BN_num_bits(p[0])
- class _DHPrivateKey(dh.DHPrivateKey):
- def __init__(self, backend, dh_cdata, evp_pkey):
- self._backend = backend
- self._dh_cdata = dh_cdata
- self._evp_pkey = evp_pkey
- self._key_size_bytes = self._backend._lib.DH_size(dh_cdata)
- @property
- def key_size(self) -> int:
- return _get_dh_num_bits(self._backend, self._dh_cdata)
- def private_numbers(self) -> dh.DHPrivateNumbers:
- p = self._backend._ffi.new("BIGNUM **")
- g = self._backend._ffi.new("BIGNUM **")
- q = self._backend._ffi.new("BIGNUM **")
- self._backend._lib.DH_get0_pqg(self._dh_cdata, p, q, g)
- self._backend.openssl_assert(p[0] != self._backend._ffi.NULL)
- self._backend.openssl_assert(g[0] != self._backend._ffi.NULL)
- if q[0] == self._backend._ffi.NULL:
- q_val = None
- else:
- q_val = self._backend._bn_to_int(q[0])
- pub_key = self._backend._ffi.new("BIGNUM **")
- priv_key = self._backend._ffi.new("BIGNUM **")
- self._backend._lib.DH_get0_key(self._dh_cdata, pub_key, priv_key)
- self._backend.openssl_assert(pub_key[0] != self._backend._ffi.NULL)
- self._backend.openssl_assert(priv_key[0] != self._backend._ffi.NULL)
- return dh.DHPrivateNumbers(
- public_numbers=dh.DHPublicNumbers(
- parameter_numbers=dh.DHParameterNumbers(
- p=self._backend._bn_to_int(p[0]),
- g=self._backend._bn_to_int(g[0]),
- q=q_val,
- ),
- y=self._backend._bn_to_int(pub_key[0]),
- ),
- x=self._backend._bn_to_int(priv_key[0]),
- )
- def exchange(self, peer_public_key: dh.DHPublicKey) -> bytes:
- if not isinstance(peer_public_key, _DHPublicKey):
- raise TypeError("peer_public_key must be a DHPublicKey")
- ctx = self._backend._lib.EVP_PKEY_CTX_new(
- self._evp_pkey, self._backend._ffi.NULL
- )
- self._backend.openssl_assert(ctx != self._backend._ffi.NULL)
- ctx = self._backend._ffi.gc(ctx, self._backend._lib.EVP_PKEY_CTX_free)
- res = self._backend._lib.EVP_PKEY_derive_init(ctx)
- self._backend.openssl_assert(res == 1)
- res = self._backend._lib.EVP_PKEY_derive_set_peer(
- ctx, peer_public_key._evp_pkey
- )
- # Invalid kex errors here in OpenSSL 3.0 because checks were moved
- # to EVP_PKEY_derive_set_peer
- self._exchange_assert(res == 1)
- keylen = self._backend._ffi.new("size_t *")
- res = self._backend._lib.EVP_PKEY_derive(
- ctx, self._backend._ffi.NULL, keylen
- )
- # Invalid kex errors here in OpenSSL < 3
- self._exchange_assert(res == 1)
- self._backend.openssl_assert(keylen[0] > 0)
- buf = self._backend._ffi.new("unsigned char[]", keylen[0])
- res = self._backend._lib.EVP_PKEY_derive(ctx, buf, keylen)
- self._backend.openssl_assert(res == 1)
- key = self._backend._ffi.buffer(buf, keylen[0])[:]
- pad = self._key_size_bytes - len(key)
- if pad > 0:
- key = (b"\x00" * pad) + key
- return key
- def _exchange_assert(self, ok):
- if not ok:
- errors_with_text = self._backend._consume_errors_with_text()
- raise ValueError(
- "Error computing shared key.",
- errors_with_text,
- )
- def public_key(self) -> dh.DHPublicKey:
- dh_cdata = _dh_params_dup(self._dh_cdata, self._backend)
- pub_key = self._backend._ffi.new("BIGNUM **")
- self._backend._lib.DH_get0_key(
- self._dh_cdata, pub_key, self._backend._ffi.NULL
- )
- self._backend.openssl_assert(pub_key[0] != self._backend._ffi.NULL)
- pub_key_dup = self._backend._lib.BN_dup(pub_key[0])
- self._backend.openssl_assert(pub_key_dup != self._backend._ffi.NULL)
- res = self._backend._lib.DH_set0_key(
- dh_cdata, pub_key_dup, self._backend._ffi.NULL
- )
- self._backend.openssl_assert(res == 1)
- evp_pkey = self._backend._dh_cdata_to_evp_pkey(dh_cdata)
- return _DHPublicKey(self._backend, dh_cdata, evp_pkey)
- def parameters(self) -> dh.DHParameters:
- return _dh_cdata_to_parameters(self._dh_cdata, self._backend)
- def private_bytes(
- self,
- encoding: serialization.Encoding,
- format: serialization.PrivateFormat,
- encryption_algorithm: serialization.KeySerializationEncryption,
- ) -> bytes:
- if format is not serialization.PrivateFormat.PKCS8:
- raise ValueError(
- "DH private keys support only PKCS8 serialization"
- )
- if not self._backend._lib.Cryptography_HAS_EVP_PKEY_DHX:
- q = self._backend._ffi.new("BIGNUM **")
- self._backend._lib.DH_get0_pqg(
- self._dh_cdata,
- self._backend._ffi.NULL,
- q,
- self._backend._ffi.NULL,
- )
- if q[0] != self._backend._ffi.NULL:
- raise UnsupportedAlgorithm(
- "DH X9.42 serialization is not supported",
- _Reasons.UNSUPPORTED_SERIALIZATION,
- )
- return self._backend._private_key_bytes(
- encoding,
- format,
- encryption_algorithm,
- self,
- self._evp_pkey,
- self._dh_cdata,
- )
- class _DHPublicKey(dh.DHPublicKey):
- def __init__(self, backend, dh_cdata, evp_pkey):
- self._backend = backend
- self._dh_cdata = dh_cdata
- self._evp_pkey = evp_pkey
- self._key_size_bits = _get_dh_num_bits(self._backend, self._dh_cdata)
- @property
- def key_size(self) -> int:
- return self._key_size_bits
- def public_numbers(self) -> dh.DHPublicNumbers:
- p = self._backend._ffi.new("BIGNUM **")
- g = self._backend._ffi.new("BIGNUM **")
- q = self._backend._ffi.new("BIGNUM **")
- self._backend._lib.DH_get0_pqg(self._dh_cdata, p, q, g)
- self._backend.openssl_assert(p[0] != self._backend._ffi.NULL)
- self._backend.openssl_assert(g[0] != self._backend._ffi.NULL)
- if q[0] == self._backend._ffi.NULL:
- q_val = None
- else:
- q_val = self._backend._bn_to_int(q[0])
- pub_key = self._backend._ffi.new("BIGNUM **")
- self._backend._lib.DH_get0_key(
- self._dh_cdata, pub_key, self._backend._ffi.NULL
- )
- self._backend.openssl_assert(pub_key[0] != self._backend._ffi.NULL)
- return dh.DHPublicNumbers(
- parameter_numbers=dh.DHParameterNumbers(
- p=self._backend._bn_to_int(p[0]),
- g=self._backend._bn_to_int(g[0]),
- q=q_val,
- ),
- y=self._backend._bn_to_int(pub_key[0]),
- )
- def parameters(self) -> dh.DHParameters:
- return _dh_cdata_to_parameters(self._dh_cdata, self._backend)
- def public_bytes(
- self,
- encoding: serialization.Encoding,
- format: serialization.PublicFormat,
- ) -> bytes:
- if format is not serialization.PublicFormat.SubjectPublicKeyInfo:
- raise ValueError(
- "DH public keys support only "
- "SubjectPublicKeyInfo serialization"
- )
- if not self._backend._lib.Cryptography_HAS_EVP_PKEY_DHX:
- q = self._backend._ffi.new("BIGNUM **")
- self._backend._lib.DH_get0_pqg(
- self._dh_cdata,
- self._backend._ffi.NULL,
- q,
- self._backend._ffi.NULL,
- )
- if q[0] != self._backend._ffi.NULL:
- raise UnsupportedAlgorithm(
- "DH X9.42 serialization is not supported",
- _Reasons.UNSUPPORTED_SERIALIZATION,
- )
- return self._backend._public_key_bytes(
- encoding, format, self, self._evp_pkey, None
- )
|