/* * Copyright 2019 Google LLC. * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * https://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ #include "private_join_and_compute/crypto/context.h" #include #include #include #include "absl/strings/str_cat.h" #include "absl/strings/string_view.h" #include "private_join_and_compute/crypto/openssl_init.h" namespace private_join_and_compute { std::string OpenSSLErrorString() { char buf[256]; ERR_error_string_n(ERR_get_error(), buf, sizeof(buf)); return buf; } Context::Context() : bn_ctx_(BN_CTX_new()), evp_md_ctx_(EVP_MD_CTX_create()), zero_bn_(CreateBigNum(0)), one_bn_(CreateBigNum(1)), two_bn_(CreateBigNum(2)), three_bn_(CreateBigNum(3)) { OpenSSLInit(); CHECK(RAND_status()) << "OpenSSL PRNG is not properly seeded."; HMAC_CTX_init(&hmac_ctx_); } Context::~Context() { HMAC_CTX_cleanup(&hmac_ctx_); } BN_CTX* Context::GetBnCtx() { return bn_ctx_.get(); } BigNum Context::CreateBigNum(absl::string_view bytes) { return BigNum(bn_ctx_.get(), bytes); } BigNum Context::CreateBigNum(uint64_t number) { return BigNum(bn_ctx_.get(), number); } BigNum Context::CreateBigNum(BigNum::BignumPtr bn) { return BigNum(bn_ctx_.get(), std::move(bn)); } std::string Context::Sha256String(absl::string_view bytes) { unsigned char hash[EVP_MAX_MD_SIZE]; CRYPTO_CHECK(1 == EVP_DigestInit_ex(evp_md_ctx_.get(), EVP_sha256(), nullptr)); CRYPTO_CHECK( 1 == EVP_DigestUpdate(evp_md_ctx_.get(), bytes.data(), bytes.length())); unsigned int md_len; CRYPTO_CHECK(1 == EVP_DigestFinal_ex(evp_md_ctx_.get(), hash, &md_len)); return std::string(reinterpret_cast(hash), md_len); } std::string Context::Sha384String(absl::string_view bytes) { unsigned char hash[EVP_MAX_MD_SIZE]; CRYPTO_CHECK(1 == EVP_DigestInit_ex(evp_md_ctx_.get(), EVP_sha384(), nullptr)); CRYPTO_CHECK( 1 == EVP_DigestUpdate(evp_md_ctx_.get(), bytes.data(), bytes.length())); unsigned int md_len; CRYPTO_CHECK(1 == EVP_DigestFinal_ex(evp_md_ctx_.get(), hash, &md_len)); return std::string(reinterpret_cast(hash), md_len); } std::string Context::Sha512String(absl::string_view bytes) { unsigned char hash[EVP_MAX_MD_SIZE]; CRYPTO_CHECK(1 == EVP_DigestInit_ex(evp_md_ctx_.get(), EVP_sha512(), nullptr)); CRYPTO_CHECK( 1 == EVP_DigestUpdate(evp_md_ctx_.get(), bytes.data(), bytes.length())); unsigned int md_len; CRYPTO_CHECK(1 == EVP_DigestFinal_ex(evp_md_ctx_.get(), hash, &md_len)); return std::string(reinterpret_cast(hash), md_len); } BigNum Context::RandomOracle(absl::string_view x, const BigNum& max_value, RandomOracleHashType hash_type) { int hash_output_length = 256; if (hash_type == SHA512) { hash_output_length = 512; } else if (hash_type == SHA384) { hash_output_length = 384; } int output_bit_length = max_value.BitLength() + hash_output_length; int iter_count = std::ceil(static_cast(output_bit_length) / hash_output_length); CHECK(iter_count * hash_output_length < 130048) << "The domain bit length must not be greater than " "130048. Desired bit length: " << output_bit_length; int excess_bit_count = (iter_count * hash_output_length) - output_bit_length; BigNum hash_output = CreateBigNum(0); for (int i = 1; i < iter_count + 1; i++) { hash_output = hash_output.Lshift(hash_output_length); std::string bignum_bytes = absl::StrCat(CreateBigNum(i).ToBytes(), x); std::string hashed_string; if (hash_type == SHA512) { hashed_string = Sha512String(bignum_bytes); } else if (hash_type == SHA384) { hashed_string = Sha384String(bignum_bytes); } else { hashed_string = Sha256String(bignum_bytes); } hash_output = hash_output + CreateBigNum(hashed_string); } return hash_output.Rshift(excess_bit_count).Mod(max_value); } BigNum Context::RandomOracleSha512(absl::string_view x, const BigNum& max_value) { return RandomOracle(x, max_value, SHA512); } BigNum Context::RandomOracleSha384(absl::string_view x, const BigNum& max_value) { return RandomOracle(x, max_value, SHA384); } BigNum Context::RandomOracleSha256(absl::string_view x, const BigNum& max_value) { return RandomOracle(x, max_value, SHA256); } BigNum Context::PRF(absl::string_view key, absl::string_view data, const BigNum& max_value) { CHECK_GE(key.size() * 8, 80); CHECK_LE(max_value.BitLength(), 512) << "The requested output length is not supported. The maximum " "supported output length is 512. The requested output length is " << max_value.BitLength(); CRYPTO_CHECK(1 == HMAC_Init_ex(&hmac_ctx_, key.data(), key.size(), EVP_sha512(), nullptr)); CRYPTO_CHECK(1 == HMAC_Update(&hmac_ctx_, reinterpret_cast(data.data()), data.size())); unsigned int md_len; unsigned char hash[EVP_MAX_MD_SIZE]; CRYPTO_CHECK(1 == HMAC_Final(&hmac_ctx_, hash, &md_len)); BigNum hash_bn(bn_ctx_.get(), hash, md_len); BigNum hash_bn_reduced = hash_bn.GetLastNBits(max_value.BitLength()); if (hash_bn_reduced < max_value) { return hash_bn_reduced; } else { return Context::PRF(key, hash_bn.ToBytes(), max_value); } } BigNum Context::GenerateSafePrime(int prime_length) { BigNum r(bn_ctx_.get()); CRYPTO_CHECK(1 == BN_generate_prime_ex(r.bn_.get(), prime_length, 1, nullptr, nullptr, nullptr)); return r; } BigNum Context::GeneratePrime(int prime_length) { BigNum r(bn_ctx_.get()); CRYPTO_CHECK(1 == BN_generate_prime_ex(r.bn_.get(), prime_length, 0, nullptr, nullptr, nullptr)); return r; } BigNum Context::GenerateRandLessThan(const BigNum& max_value) { BigNum r(bn_ctx_.get()); CRYPTO_CHECK(1 == BN_rand_range(r.bn_.get(), max_value.bn_.get())); return r; } BigNum Context::GenerateRandBetween(const BigNum& start, const BigNum& end) { CHECK(start < end); return GenerateRandLessThan(end - start) + start; } std::string Context::GenerateRandomBytes(int num_bytes) { CHECK_GE(num_bytes, 0) << "num_bytes must be nonnegative, provided value was " << num_bytes << "."; std::unique_ptr bytes(new unsigned char[num_bytes]); CRYPTO_CHECK(1 == RAND_bytes(bytes.get(), num_bytes)); return std::string(reinterpret_cast(bytes.get()), num_bytes); } BigNum Context::RelativelyPrimeRandomLessThan(const BigNum& num) { BigNum rand_num = GenerateRandLessThan(num); while (rand_num.Gcd(num) > One()) { rand_num = GenerateRandLessThan(num); } return rand_num; } } // namespace private_join_and_compute