#include "elgamal.h" #include "gcrypt.h" #include #include #ifdef POINTER_TRACING #define TRACE(FILE, LINE, PTR) \ fprintf(stderr, "%s %d %p\n", FILE, LINE, PTR); #else #define TRACE(FILE, LINE, PTR) #endif static gcry_mpi_t p; static gcry_mpi_t q; static gcry_mpi_t g; static const unsigned int nr_bytes = 256; static const unsigned int nr_bits = 256*8; void check(gcry_error_t error) { if (error) { fprintf (stderr, "Error: %s/%s\n", gcry_strsource (error), gcry_strerror (error)); exit(1); } } void print_sexp(gcry_sexp_t exp) { size_t required_size = gcry_sexp_sprint(exp, GCRYSEXP_FMT_ADVANCED, NULL, 0); //passing NULL as the buffer will return the size needed. char* str = (char *) malloc(sizeof(char)*required_size); gcry_sexp_sprint(exp, GCRYSEXP_FMT_ADVANCED, str, required_size); //So we ignore the size here. printf("size = %zu\n", required_size); for(size_t i = 0; i < required_size; i++) printf("%c", str[i]); printf("\n"); free(str); } void gcrypt_elgamal_initialize(void) { if (!gcry_check_version (GCRYPT_VERSION)) { fprintf(stderr, "libgcrypt version mismatch\n"); exit(-1); } gcry_control (GCRYCTL_SUSPEND_SECMEM_WARN); gcry_control (GCRYCTL_INIT_SECMEM, 16384, 0); gcry_control (GCRYCTL_RESUME_SECMEM_WARN); gcry_control (GCRYCTL_INITIALIZATION_FINISHED, 0); //leading 0 as specified by libgcrypt char p_hex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char q_hex[] = "08CF83642A709A097B447997640129DA299B1A47D1EB3750BA308B0FE64F5FBD3"; char g_hex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char p_hex[] = "0b"; //char q_hex[] = "00"; //char g_hex[] = "02"; size_t nr_bytes_scanned; gcry_error_t error; error = gcry_mpi_scan(&p, GCRYMPI_FMT_HEX, p_hex, 0, &nr_bytes_scanned); check(error); error = gcry_mpi_scan(&q, GCRYMPI_FMT_HEX, q_hex, 0, &nr_bytes_scanned); check(error); error = gcry_mpi_scan(&g, GCRYMPI_FMT_HEX, g_hex, 0, &nr_bytes_scanned); check(error); TRACE(__FILE__, __LINE__, p); TRACE(__FILE__, __LINE__, q); TRACE(__FILE__, __LINE__, g); } struct KeyPair gcrypt_elgamal_create_keypair() { size_t parse_error_offset; gcry_error_t error; gcry_mpi_t x = NULL; do { gcry_mpi_release(x); void* bytes = gcry_random_bytes_secure(nr_bytes, GCRY_VERY_STRONG_RANDOM); TRACE(__FILE__, __LINE__, bytes); error = gcry_mpi_scan(&x, GCRYMPI_FMT_USG, bytes, nr_bytes, &parse_error_offset); gcry_free(bytes); check(error); } while(gcry_mpi_cmp_ui(x, 0) == 0 || gcry_mpi_cmp(x, p) != -1); gcry_mpi_t y = gcry_mpi_new(nr_bits); gcry_mpi_powm(y, g, x, p); gcry_sexp_t priv_key; error = gcry_sexp_build(&priv_key, &parse_error_offset, "(private-key (elg (p %M) (g %M) (y %M) (x %M)))", p, g, y, x); check(error); error = gcry_pk_testkey(priv_key); check(error); gcry_sexp_release(priv_key); TRACE(__FILE__, __LINE__, x); TRACE(__FILE__, __LINE__, y); return (struct KeyPair){ x, y, }; } void gcrypt_elgamal_delete_keypair(struct KeyPair* pair) { gcry_mpi_release((gcry_mpi_t) pair->sec); gcry_mpi_release((gcry_mpi_t) pair->pub); pair->sec = NULL; pair->pub = NULL; } void gcrypt_elgamal_element_to_array(unsigned char** buffer, size_t* len, void* key) { gcry_error_t error; error = gcry_mpi_aprint(GCRYMPI_FMT_USG, buffer, len, (gcry_mpi_t) key); TRACE(__FILE__, __LINE__, *buffer); check(error); } void gcrypt_elgamal_free_buffer(void* buffer) { gcry_free(buffer); } void* gcrypt_elgamal_array_to_element(char const* buffer, size_t len, bool secure) { (void) secure; size_t error_pos; gcry_error_t error; gcry_mpi_t mpi; error = gcry_mpi_scan(&mpi, GCRYMPI_FMT_USG, buffer, len, &error_pos); check(error); TRACE(__FILE__, __LINE__, mpi); return mpi; } GroupElement gcrypt_elgamal_message_to_element(char const* buffer, size_t len, bool secure) { return gcrypt_elgamal_array_to_element(buffer, len, secure); } void gcrypt_elgamal_element_to_message(unsigned char** buffer, GroupElement el) { size_t len; gcrypt_elgamal_element_to_array(buffer, &len, el); } void gcrypt_elgamal_get_pub_key_hash(char** buffer, size_t* len, GroupElement const pub) { gcry_sexp_t pubkey; gcry_error_t error; size_t err_off; error = gcry_sexp_build(&pubkey, &err_off, "(public-key (elg (p %M) (g %M) (y %M)))", p, g, (gcry_mpi_t) pub); check(error); *buffer = (char*) gcry_pk_get_keygrip(pubkey, NULL); TRACE(__FILE__, __LINE__, *buffer); *len = 20; gcry_sexp_release(pubkey); } size_t gcrypt_elgamal_get_pub_key_hash_length() { return 20u; } void* gcrypt_elgamal_get_group_element(bool secure) { (void) secure; size_t parse_error_offset; gcry_error_t error; gcry_mpi_t a = NULL; do { gcry_mpi_release(a); void* bytes = gcry_random_bytes_secure(nr_bytes, GCRY_VERY_STRONG_RANDOM); TRACE(__FILE__, __LINE__, bytes); error = gcry_mpi_scan(&a, GCRYMPI_FMT_USG, bytes, nr_bytes, &parse_error_offset); check(error); gcry_free(bytes); } while(gcry_mpi_cmp_ui(a, 0) == 0 || gcry_mpi_cmp(a, p) != -1); //random bytes generated with GCRY{,_VERY}_STRONG_RANDOM are generated in "secure memory" //so secure is unused. return a; } GroupElement gcrypt_elgamal_get_key_exchange_value(GroupElement group_el) { gcry_mpi_t val = gcry_mpi_new(nr_bits); gcry_mpi_powm(val, g, (gcry_mpi_t) group_el, p); TRACE(__FILE__, __LINE__, val); return val; } GroupElement gcrypt_elgamal_invert(GroupElement const el); void gcrypt_elgamal_delete_group_element(GroupElement el); GroupElement gcrypt_elgamal_combine(GroupElement lh, GroupElement rh, bool secure) { gcry_mpi_t ret = secure ? gcry_mpi_snew(0) : gcry_mpi_new(0); TRACE(__FILE__, __LINE__, ret); gcry_mpi_mulm(ret, (gcry_mpi_t) lh, (gcry_mpi_t) rh, p); return ret; } GroupElement gcrypt_elgamal_uncombine(GroupElement lh, GroupElement rh, bool secure) { (void) secure; GroupElement inv_rh = gcrypt_elgamal_invert(rh); GroupElement ret = gcrypt_elgamal_combine(lh, inv_rh, true); gcrypt_elgamal_delete_group_element(inv_rh); return ret; } GroupElement gcrypt_elgamal_get_decryption_share(GroupElement r, GroupElement e) { gcry_mpi_t inv_d = gcry_mpi_snew(nr_bits); gcry_mpi_powm(inv_d, (gcry_mpi_t)r, (gcry_mpi_t)e, p); gcry_mpi_t d = gcry_mpi_snew(nr_bits); gcry_mpi_invm(d, inv_d, p); TRACE(__FILE__, __LINE__, inv_d); TRACE(__FILE__, __LINE__, d); gcry_mpi_release(inv_d); return d; } size_t gcrypt_elgamal_get_group_element_array_size() { return nr_bytes; } size_t gcrypt_elgamal_get_message_size() { return nr_bytes - 1; } void gcrypt_elgamal_delete_group_element(void* el) { gcry_mpi_release((gcry_mpi_t) el); } void gcrypt_elgamal_add_public_share(GroupElement* el, char const* share, size_t in_len, void* pubkey) { gcry_error_t error; size_t parse_error_pos; gcry_mpi_t mpi_share; error = gcry_mpi_scan(&mpi_share, GCRYMPI_FMT_USG, share, in_len, &parse_error_pos); check(error); gcry_mpi_t result = gcry_mpi_new(nr_bits); gcry_mpi_mulm(result, mpi_share, (gcry_mpi_t) pubkey, p); TRACE(__FILE__, __LINE__, result); TRACE(__FILE__, __LINE__, mpi_share); *el = result; gcry_mpi_release(mpi_share); } GroupElement gcrypt_elgamal_derive_shared_key(struct KeyPair keypair, unsigned char const* other_pub, size_t pub_len, unsigned char const* value, size_t value_len, void* priv_value, bool swap) { (void) keypair; (void) other_pub; (void) pub_len; (void) swap; gcry_error_t error; size_t parse_error_pos; gcry_mpi_t ga; error = gcry_mpi_scan(&ga, GCRYMPI_FMT_USG, value, value_len, &parse_error_pos); check(error); gcry_mpi_t b = (gcry_mpi_t) priv_value; gcry_mpi_t gab = gcry_mpi_snew(nr_bits); gcry_mpi_powm(gab, ga, b, p); TRACE(__FILE__, __LINE__, ga); TRACE(__FILE__, __LINE__, b); TRACE(__FILE__, __LINE__, gab); gcry_mpi_release(ga); return gab; } void gcrypt_elgamal_delete_shared_key(struct SharedKey* s) { gcry_mpi_release((gcry_mpi_t) s->shared); s->shared = NULL; } void gcrypt_elgamal_encrypt(GroupElement* random_element, GroupElement* message_element, GroupElement value, GroupElement key) { GroupElement random = gcrypt_elgamal_get_group_element(true); *random_element = gcry_mpi_new(nr_bits); gcry_mpi_powm((gcry_mpi_t) *random_element, g, (gcry_mpi_t) random, p); gcry_mpi_t key_pow_random = gcry_mpi_snew(nr_bits); gcry_mpi_powm(key_pow_random, (gcry_mpi_t) key, (gcry_mpi_t) random, p); TRACE(__FILE__, __LINE__, *random_element); TRACE(__FILE__, __LINE__, key_pow_random); *message_element = gcry_mpi_snew(nr_bits); gcry_mpi_mulm((gcry_mpi_t)*message_element, (gcry_mpi_t) value, key_pow_random, p); TRACE(__FILE__, __LINE__, *message_element); TRACE(__FILE__, __LINE__, random); TRACE(__FILE__, __LINE__, key_pow_random); gcry_mpi_release((gcry_mpi_t) random); gcry_mpi_release(key_pow_random); } GroupElement gcrypt_elgamal_invert(GroupElement const x) { gcry_mpi_t inv_x = gcry_mpi_new(nr_bits); gcry_mpi_invm(inv_x, (gcry_mpi_t)x, p); TRACE(__FILE__, __LINE__, inv_x); return inv_x; } unsigned int gcrypt_elgamal_get_uniform_int(unsigned int upper) { unsigned int random_value; if(upper == 0) { void* buffer = gcry_random_bytes_secure(sizeof(unsigned int), GCRY_STRONG_RANDOM); TRACE(__FILE__, __LINE__, buffer); memcpy(&random_value, buffer, sizeof(unsigned int)); gcry_free(buffer); return random_value; } unsigned int lower = -upper % upper; do { void* buffer = gcry_random_bytes_secure(sizeof(unsigned int), GCRY_STRONG_RANDOM); TRACE(__FILE__, __LINE__, buffer); memcpy(&random_value, buffer, sizeof(unsigned int)); gcry_free(buffer); if (random_value >= lower) return random_value % upper; } while(true); } void gcrypt_elgamal_deinitialize(void) { gcry_mpi_release(p); p = NULL; gcry_mpi_release(q); q = NULL; gcry_mpi_release(g); g = NULL; } Initializer elgamal_initialize = &gcrypt_elgamal_initialize; KeyPairCreator elgamal_create_keypair = &gcrypt_elgamal_create_keypair; KeyPairDeleter elgamal_delete_keypair = &gcrypt_elgamal_delete_keypair; ElementToArray elgamal_element_to_array = &gcrypt_elgamal_element_to_array; BufferDeleter elgamal_free_buffer = &gcrypt_elgamal_free_buffer; ArrayToElement elgamal_array_to_element = &gcrypt_elgamal_array_to_element; MessageToElement elgamal_message_to_element = &gcrypt_elgamal_message_to_element; ElementToMessage elgamal_element_to_message = &gcrypt_elgamal_element_to_message; PubKeyHashGetter elgamal_get_pub_key_hash = &gcrypt_elgamal_get_pub_key_hash; PubKeyHashLengthGetter elgamal_get_pub_key_hash_length = &gcrypt_elgamal_get_pub_key_hash_length; GroupElementGetter elgamal_get_group_element = &gcrypt_elgamal_get_group_element; GroupElementDeleter elgamal_delete_group_element = &gcrypt_elgamal_delete_group_element; KeyExchangeValueGetter elgamal_get_key_exchange_value = &gcrypt_elgamal_get_key_exchange_value; GroupElementCombiner elgamal_combine = &gcrypt_elgamal_combine; GroupElementUncombiner elgamal_uncombine = &gcrypt_elgamal_uncombine; DecryptionShareGetter elgamal_get_decryption_share = &gcrypt_elgamal_get_decryption_share; GroupElementArraySizeGetter elgamal_get_group_element_array_size = &gcrypt_elgamal_get_group_element_array_size; MessageSizeGetter elgamal_get_message_size = &gcrypt_elgamal_get_message_size; PublicShareAdder elgamal_add_public_share = &gcrypt_elgamal_add_public_share; SharedKeyDeriver elgamal_derive_shared_key = &gcrypt_elgamal_derive_shared_key; SharedKeyDeleter elgamal_delete_shared_key = &gcrypt_elgamal_delete_shared_key; Encrypter elgamal_encrypt = &gcrypt_elgamal_encrypt; Inverter elgamal_invert = &gcrypt_elgamal_invert; UniformIntGetter elgamal_get_uniform_int = &gcrypt_elgamal_get_uniform_int; Deinitializer elgamal_deinitialize = &gcrypt_elgamal_deinitialize;