SAE: Store rand value as bignum instead of octet string

This avoids unnecessary bignum initialization steps during the SAE
exchange.

Signed-hostap: Jouni Malinen <j@w1.fi>
This commit is contained in:
Jouni Malinen 2013-01-06 15:32:38 +02:00
parent bf4f5d6570
commit 629c56d70a
2 changed files with 35 additions and 50 deletions

View file

@ -72,6 +72,7 @@ void sae_clear_data(struct sae_data *sae)
crypto_ec_deinit(sae->ec); crypto_ec_deinit(sae->ec);
crypto_bignum_deinit(sae->prime_buf, 0); crypto_bignum_deinit(sae->prime_buf, 0);
crypto_bignum_deinit(sae->order_buf, 0); crypto_bignum_deinit(sae->order_buf, 0);
crypto_bignum_deinit(sae->sae_rand, 1);
os_memset(sae, 0, sizeof(*sae)); os_memset(sae, 0, sizeof(*sae));
} }
@ -122,64 +123,57 @@ static void buf_shift_right(u8 *buf, size_t len, size_t bits)
} }
static int sae_get_rand(const u8 *order, size_t order_len_bits, u8 *val) static struct crypto_bignum * sae_get_rand(const u8 *order,
size_t order_len_bits)
{ {
u8 val[SAE_MAX_PRIME_LEN];
int iter = 0; int iter = 0;
size_t order_len = (order_len_bits + 7) / 8; size_t order_len = (order_len_bits + 7) / 8;
struct crypto_bignum *bn;
if (order_len > sizeof(val))
return NULL;
do { do {
if (iter++ > 100) if (iter++ > 100)
return -1; return NULL;
if (random_get_bytes(val, order_len) < 0) if (random_get_bytes(val, order_len) < 0)
return -1; return NULL;
if (order_len_bits % 8) if (order_len_bits % 8)
buf_shift_right(val, order_len, 8 - order_len_bits % 8); buf_shift_right(val, order_len, 8 - order_len_bits % 8);
} while (os_memcmp(val, order, order_len) >= 0 || } while (os_memcmp(val, order, order_len) >= 0 ||
val_zero_or_one(val, order_len)); val_zero_or_one(val, order_len));
return 0; bn = crypto_bignum_init_set(val, order_len);
os_memset(val, 0, order_len);
return bn;
} }
static struct crypto_bignum * sae_get_rand_and_mask(struct sae_data *sae) static struct crypto_bignum * sae_get_rand_and_mask(struct sae_data *sae)
{ {
u8 mask[SAE_MAX_PRIME_LEN], order[SAE_MAX_PRIME_LEN]; u8 order[SAE_MAX_PRIME_LEN];
struct crypto_bignum *bn;
size_t prime_len_bits = crypto_ec_prime_len_bits(sae->ec); size_t prime_len_bits = crypto_ec_prime_len_bits(sae->ec);
if (crypto_bignum_to_bin(sae->order, order, sizeof(order), if (crypto_bignum_to_bin(sae->order, order, sizeof(order),
sae->prime_len) < 0) sae->prime_len) < 0)
return NULL; return NULL;
if (sae_get_rand(order, prime_len_bits, sae->sae_rand) < 0 || crypto_bignum_deinit(sae->sae_rand, 1);
sae_get_rand(order, prime_len_bits, mask) < 0) sae->sae_rand = sae_get_rand(order, prime_len_bits);
if (sae->sae_rand == NULL)
return NULL; return NULL;
sae->rand_len = sae->prime_len; return sae_get_rand(order, prime_len_bits);
wpa_hexdump_key(MSG_DEBUG, "SAE: rand",
sae->sae_rand, sae->rand_len);
wpa_hexdump_key(MSG_DEBUG, "SAE: mask", mask, sae->prime_len);
bn = crypto_bignum_init_set(mask, sae->prime_len);
os_memset(mask, 0, sizeof(mask));
return bn;
} }
static struct crypto_bignum * sae_get_rand_and_mask_dh(struct sae_data *sae) static struct crypto_bignum * sae_get_rand_and_mask_dh(struct sae_data *sae)
{ {
u8 mask[SAE_MAX_PRIME_LEN]; crypto_bignum_deinit(sae->sae_rand, 1);
struct crypto_bignum *bn; sae->sae_rand = sae_get_rand(sae->dh->order, sae->dh->order_len * 8);
if (sae->sae_rand == NULL)
if (sae_get_rand(sae->dh->order, sae->dh->order_len * 8, sae->sae_rand)
< 0 ||
sae_get_rand(sae->dh->order, sae->dh->order_len * 8, mask) < 0)
return NULL; return NULL;
return sae_get_rand(sae->dh->order, sae->dh->order_len * 8);
sae->rand_len = sae->dh->order_len;
wpa_hexdump_key(MSG_DEBUG, "SAE: rand", sae->sae_rand, sae->rand_len);
wpa_hexdump_key(MSG_DEBUG, "SAE: mask", mask, sae->dh->order_len);
bn = crypto_bignum_init_set(mask, sae->dh->order_len);
os_memset(mask, 0, sizeof(mask));
return bn;
} }
@ -323,7 +317,7 @@ static int sae_derive_pwe(struct sae_data *sae, const u8 *addr1,
static int sae_derive_commit(struct sae_data *sae, struct crypto_ec_point *pwe) static int sae_derive_commit(struct sae_data *sae, struct crypto_ec_point *pwe)
{ {
struct crypto_bignum *x, *bn_rand, *mask; struct crypto_bignum *x, *mask;
struct crypto_ec_point *elem; struct crypto_ec_point *elem;
int ret = -1; int ret = -1;
@ -334,13 +328,12 @@ static int sae_derive_commit(struct sae_data *sae, struct crypto_ec_point *pwe)
} }
x = crypto_bignum_init(); x = crypto_bignum_init();
bn_rand = crypto_bignum_init_set(sae->sae_rand, sae->rand_len);
elem = crypto_ec_point_init(sae->ec); elem = crypto_ec_point_init(sae->ec);
if (x == NULL || bn_rand == NULL || elem == NULL) if (x == NULL || elem == NULL)
goto fail; goto fail;
/* commit-scalar = (rand + mask) modulo r */ /* commit-scalar = (rand + mask) modulo r */
crypto_bignum_add(bn_rand, mask, x); crypto_bignum_add(sae->sae_rand, mask, x);
crypto_bignum_mod(x, sae->order, x); crypto_bignum_mod(x, sae->order, x);
crypto_bignum_to_bin(x, sae->own_commit_scalar, crypto_bignum_to_bin(x, sae->own_commit_scalar,
sizeof(sae->own_commit_scalar), sae->prime_len); sizeof(sae->own_commit_scalar), sae->prime_len);
@ -366,7 +359,6 @@ static int sae_derive_commit(struct sae_data *sae, struct crypto_ec_point *pwe)
fail: fail:
crypto_ec_point_deinit(elem, 0); crypto_ec_point_deinit(elem, 0);
crypto_bignum_deinit(mask, 1); crypto_bignum_deinit(mask, 1);
crypto_bignum_deinit(bn_rand, 1);
crypto_bignum_deinit(x, 1); crypto_bignum_deinit(x, 1);
return ret; return ret;
} }
@ -526,7 +518,7 @@ static int sae_derive_pwe_dh(struct sae_data *sae, const u8 *addr1,
static int sae_derive_commit_dh(struct sae_data *sae, struct crypto_bignum *pwe) static int sae_derive_commit_dh(struct sae_data *sae, struct crypto_bignum *pwe)
{ {
struct crypto_bignum *x, *bn_rand, *mask, *elem; struct crypto_bignum *x, *mask, *elem;
int ret = -1; int ret = -1;
mask = sae_get_rand_and_mask_dh(sae); mask = sae_get_rand_and_mask_dh(sae);
@ -536,13 +528,12 @@ static int sae_derive_commit_dh(struct sae_data *sae, struct crypto_bignum *pwe)
} }
x = crypto_bignum_init(); x = crypto_bignum_init();
bn_rand = crypto_bignum_init_set(sae->sae_rand, sae->rand_len);
elem = crypto_bignum_init(); elem = crypto_bignum_init();
if (x == NULL || bn_rand == NULL || elem == NULL) if (x == NULL || elem == NULL)
goto fail; goto fail;
/* commit-scalar = (rand + mask) modulo r */ /* commit-scalar = (rand + mask) modulo r */
crypto_bignum_add(bn_rand, mask, x); crypto_bignum_add(sae->sae_rand, mask, x);
crypto_bignum_mod(x, sae->order, x); crypto_bignum_mod(x, sae->order, x);
crypto_bignum_to_bin(x, sae->own_commit_scalar, crypto_bignum_to_bin(x, sae->own_commit_scalar,
sizeof(sae->own_commit_scalar), sae->prime_len); sizeof(sae->own_commit_scalar), sae->prime_len);
@ -566,7 +557,6 @@ static int sae_derive_commit_dh(struct sae_data *sae, struct crypto_bignum *pwe)
fail: fail:
crypto_bignum_deinit(elem, 0); crypto_bignum_deinit(elem, 0);
crypto_bignum_deinit(mask, 1); crypto_bignum_deinit(mask, 1);
crypto_bignum_deinit(bn_rand, 1);
crypto_bignum_deinit(x, 1); crypto_bignum_deinit(x, 1);
return ret; return ret;
} }
@ -653,7 +643,7 @@ static int sae_check_peer_commit(struct sae_data *sae)
static int sae_derive_k_ec(struct sae_data *sae, u8 *k) static int sae_derive_k_ec(struct sae_data *sae, u8 *k)
{ {
struct crypto_ec_point *pwe, *peer_elem, *K; struct crypto_ec_point *pwe, *peer_elem, *K;
struct crypto_bignum *rand_bn, *peer_scalar; struct crypto_bignum *peer_scalar;
int ret = -1; int ret = -1;
pwe = crypto_ec_point_from_bin(sae->ec, sae->pwe); pwe = crypto_ec_point_from_bin(sae->ec, sae->pwe);
@ -661,9 +651,8 @@ static int sae_derive_k_ec(struct sae_data *sae, u8 *k)
sae->prime_len); sae->prime_len);
peer_elem = crypto_ec_point_from_bin(sae->ec, sae->peer_commit_element); peer_elem = crypto_ec_point_from_bin(sae->ec, sae->peer_commit_element);
K = crypto_ec_point_init(sae->ec); K = crypto_ec_point_init(sae->ec);
rand_bn = crypto_bignum_init_set(sae->sae_rand, sae->rand_len);
if (pwe == NULL || peer_elem == NULL || peer_scalar == NULL || if (pwe == NULL || peer_elem == NULL || peer_scalar == NULL ||
K == NULL || rand_bn == NULL) K == NULL)
goto fail; goto fail;
if (!crypto_ec_point_is_on_curve(sae->ec, peer_elem)) { if (!crypto_ec_point_is_on_curve(sae->ec, peer_elem)) {
@ -680,7 +669,7 @@ static int sae_derive_k_ec(struct sae_data *sae, u8 *k)
if (crypto_ec_point_mul(sae->ec, pwe, peer_scalar, K) < 0 || if (crypto_ec_point_mul(sae->ec, pwe, peer_scalar, K) < 0 ||
crypto_ec_point_add(sae->ec, K, peer_elem, K) < 0 || crypto_ec_point_add(sae->ec, K, peer_elem, K) < 0 ||
crypto_ec_point_mul(sae->ec, K, rand_bn, K) < 0 || crypto_ec_point_mul(sae->ec, K, sae->sae_rand, K) < 0 ||
crypto_ec_point_is_at_infinity(sae->ec, K) || crypto_ec_point_is_at_infinity(sae->ec, K) ||
crypto_ec_point_to_bin(sae->ec, K, k, NULL) < 0) { crypto_ec_point_to_bin(sae->ec, K, k, NULL) < 0) {
wpa_printf(MSG_DEBUG, "SAE: Failed to calculate K and k"); wpa_printf(MSG_DEBUG, "SAE: Failed to calculate K and k");
@ -694,14 +683,13 @@ fail:
crypto_ec_point_deinit(pwe, 1); crypto_ec_point_deinit(pwe, 1);
crypto_ec_point_deinit(peer_elem, 0); crypto_ec_point_deinit(peer_elem, 0);
crypto_ec_point_deinit(K, 1); crypto_ec_point_deinit(K, 1);
crypto_bignum_deinit(rand_bn, 1);
return ret; return ret;
} }
static int sae_derive_k_dh(struct sae_data *sae, u8 *k) static int sae_derive_k_dh(struct sae_data *sae, u8 *k)
{ {
struct crypto_bignum *pwe, *peer_elem, *K, *rand_bn, *peer_scalar; struct crypto_bignum *pwe, *peer_elem, *K, *peer_scalar;
int ret = -1; int ret = -1;
pwe = crypto_bignum_init_set(sae->pwe, sae->prime_len); pwe = crypto_bignum_init_set(sae->pwe, sae->prime_len);
@ -710,9 +698,8 @@ static int sae_derive_k_dh(struct sae_data *sae, u8 *k)
peer_elem = crypto_bignum_init_set(sae->peer_commit_element, peer_elem = crypto_bignum_init_set(sae->peer_commit_element,
sae->prime_len); sae->prime_len);
K = crypto_bignum_init(); K = crypto_bignum_init();
rand_bn = crypto_bignum_init_set(sae->sae_rand, sae->rand_len);
if (pwe == NULL || peer_elem == NULL || peer_scalar == NULL || if (pwe == NULL || peer_elem == NULL || peer_scalar == NULL ||
K == NULL || rand_bn == NULL) K == NULL)
goto fail; goto fail;
/* /*
@ -724,7 +711,7 @@ static int sae_derive_k_dh(struct sae_data *sae, u8 *k)
if (crypto_bignum_exptmod(pwe, peer_scalar, sae->prime, K) < 0 || if (crypto_bignum_exptmod(pwe, peer_scalar, sae->prime, K) < 0 ||
crypto_bignum_mulmod(K, peer_elem, sae->prime, K) < 0 || crypto_bignum_mulmod(K, peer_elem, sae->prime, K) < 0 ||
crypto_bignum_exptmod(K, rand_bn, sae->prime, K) < 0 || crypto_bignum_exptmod(K, sae->sae_rand, sae->prime, K) < 0 ||
crypto_bignum_to_bin(K, k, SAE_MAX_PRIME_LEN, sae->prime_len) < 0 || crypto_bignum_to_bin(K, k, SAE_MAX_PRIME_LEN, sae->prime_len) < 0 ||
val_one(k, sae->prime_len)) { val_one(k, sae->prime_len)) {
wpa_printf(MSG_DEBUG, "SAE: Failed to calculate K and k"); wpa_printf(MSG_DEBUG, "SAE: Failed to calculate K and k");
@ -738,7 +725,6 @@ fail:
crypto_bignum_deinit(pwe, 1); crypto_bignum_deinit(pwe, 1);
crypto_bignum_deinit(peer_elem, 0); crypto_bignum_deinit(peer_elem, 0);
crypto_bignum_deinit(K, 1); crypto_bignum_deinit(K, 1);
crypto_bignum_deinit(rand_bn, 1);
return ret; return ret;
} }

View file

@ -27,8 +27,7 @@ struct sae_data {
u8 peer_commit_scalar[SAE_MAX_PRIME_LEN]; u8 peer_commit_scalar[SAE_MAX_PRIME_LEN];
u8 peer_commit_element[2 * SAE_MAX_PRIME_LEN]; u8 peer_commit_element[2 * SAE_MAX_PRIME_LEN];
u8 pwe[2 * SAE_MAX_PRIME_LEN]; u8 pwe[2 * SAE_MAX_PRIME_LEN];
u8 sae_rand[SAE_MAX_PRIME_LEN]; struct crypto_bignum *sae_rand;
size_t rand_len;
int group; int group;
struct crypto_ec *ec; struct crypto_ec *ec;
int prime_len; int prime_len;