/* DH interface */
-/* Returns public key as a malloced hex string */
+/* Returns public key as a malloced hex string. The secretlen will be the
+ * secret_len reported by the closure. This operation is not expected to
+ * fail.
+ */
typedef string_t dh_makepublic_fn(void *st, uint8_t *secret,
int32_t secretlen);
-/* Fills buffer (up to buflen) with shared secret */
+
+/* Fills buffer (up to buflen) with shared secret. The rempublic string
+ * comes from the remote site, and may not be acceptable, though it has been
+ * checked for memory-safety. The secretlen and buflen are the secret_len
+ * and shared_len reported by the closure, respectively. Return false on
+ * faliure (e.g., if the publiclen is unacceptable).
+ */
typedef bool_t dh_makeshared_fn(void *st, uint8_t *secret,
int32_t secretlen, cstring_t rempublic,
uint8_t *sharedsecret, int32_t buflen);
+
struct dh_if {
void *st;
- int32_t len; /* Approximate size of modulus in bytes */
- int32_t ceil_len; /* Number of bytes just sufficient to contain modulus */
+ int32_t secret_len; /* Size of random secret to generate */
+ int32_t shared_len; /* Size of generated shared secret */
dh_makepublic_fn *makepublic;
dh_makeshared_fn *makeshared;
};
_Bool ok;
/* Make room for the shared key */
- st->sharedsecretlen=st->chosen_transform->keylen?:st->dh->ceil_len;
+ st->sharedsecretlen=st->chosen_transform->keylen?:st->dh->shared_len;
assert(st->sharedsecretlen);
if (st->sharedsecretlen > st->sharedsecretallocd) {
st->sharedsecretallocd=st->sharedsecretlen;
}
/* Generate the shared key */
- if (!st->dh->makeshared(st->dh->st,st->dhsecret,st->dh->len,pk,
- st->sharedsecret,st->sharedsecretlen))
+ if (!st->dh->makeshared(st->dh->st,st->dhsecret,st->dh->secret_len,
+ pk, st->sharedsecret,st->sharedsecretlen))
return False;
/* Set up the transform */
buf_append_uint8(&st->buffer,st->chosen_transform->capab_bit);
} while (0);
- dhpub=st->dh->makepublic(st->dh->st,st->dhsecret,st->dh->len);
+ dhpub=st->dh->makepublic(st->dh->st,st->dhsecret,st->dh->secret_len);
buf_append_string(&st->buffer,dhpub);
free(dhpub);
{
/* Now we have our nonce and their nonce. Think of a secret key,
and create message number 3. */
- st->random->generate(st->random->st,st->dh->len,st->dhsecret);
+ st->random->generate(st->random->st,st->dh->secret_len,st->dhsecret);
return generate_msg(st,
(st->remote_capabilities & CAPAB_TRANSFORM_MASK)
? LABEL_MSG3BIS
/* Terminate their DH public key with a '0' */
m->pk[m->pklen]=0;
/* Invent our DH secret key */
- st->random->generate(st->random->st,st->dh->len,st->dhsecret);
+ st->random->generate(st->random->st,st->dh->secret_len,st->dhsecret);
/* Generate the shared key and set up the transform */
if (!set_new_transform(st,m->pk)) return False;
FILLZERO(st->localN);
FILLZERO(st->remoteN);
dispose_transform(&st->new_transform);
- memset(st->dhsecret,0,st->dh->len);
+ memset(st->dhsecret,0,st->dh->secret_len);
if (st->sharedsecret) memset(st->sharedsecret,0,st->sharedsecretlen);
set_link_quality(st);
transport_peers_clear(st,&st->peers);
transport_peers_clear(st,&st->setup_peers);
/* XXX mlock these */
- st->dhsecret=safe_malloc(st->dh->len,"site:dhsecret");
+ st->dhsecret=safe_malloc(st->dh->secret_len,"site:dhsecret");
st->sharedsecretlen=st->sharedsecretallocd=0;
st->sharedsecret=0;