/* */ #ifndef _D_LIBGCRYPT_DH_KEY_EXCHANGE_H_ #define _D_LIBGCRYPT_DH_KEY_EXCHANGE_H_ #include "common.h" #include "DlAbortEx.h" #include namespace aria2 { class DHKeyExchange { private: gcry_mpi_t _prime; gcry_mpi_t _generator; gcry_mpi_t _privateKey; gcry_mpi_t _publicKey; void handleError(int errno) const { throw new DlAbortEx("Exception in libgcrypt routine(DHKeyExchange class): %s", gcry_strerror(errno)); } public: DHKeyExchange():_prime(0), _generator(0), _privateKey(0), _publicKey(0) {} ~DHKeyExchange() { gcry_mpi_release(_prime); gcry_mpi_release(_generator); gcry_mpi_release(_privateKey); gcry_mpi_release(_publicKey); } void init(const unsigned char* prime, const unsigned char* generator, size_t privateKeyBits) { gcry_mpi_release(_prime); gcry_mpi_release(_generator); gcry_mpi_release(_privateKey); { gcry_error_t r = gcry_mpi_scan(&_prime, GCRYMPI_FMT_HEX, prime, 0, 0); if(r) { handleError(r); } } { gcry_error_t r = gcry_mpi_scan(&_generator, GCRYMPI_FMT_HEX, generator, 0, 0); if(r) { handleError(r); } } _privateKey = gcry_mpi_new(0); gcry_mpi_randomize(_privateKey, privateKeyBits, GCRY_STRONG_RANDOM); } void generatePublicKey() { gcry_mpi_release(_publicKey); _publicKey = gcry_mpi_new(0); gcry_mpi_powm(_publicKey, _generator, _privateKey, _prime); } size_t publicKeyLength() const { return (gcry_mpi_get_nbits(_publicKey)+7)/8; } size_t getPublicKey(unsigned char* out, size_t outLength) const { if(outLength < publicKeyLength()) { throw new DlAbortEx("Insufficient buffer for public key. expect:%u, actual:%u", publicKeyLength(), outLength); } size_t nwritten; gcry_error_t r = gcry_mpi_print(GCRYMPI_FMT_USG, out, outLength, &nwritten, _publicKey); if(r) { handleError(r); } return nwritten; } void generateNonce(unsigned char* out, size_t outLength) const { gcry_create_nonce(out, outLength); } size_t computeSecret(unsigned char* out, size_t outLength, const unsigned char* peerPublicKeyData, size_t peerPublicKeyLength) const { if(outLength < publicKeyLength()) { throw new DlAbortEx("Insufficient buffer for secret. expect:%u, actual:%u", publicKeyLength(), outLength); } gcry_mpi_t peerPublicKey; { gcry_error_t r = gcry_mpi_scan(&peerPublicKey, GCRYMPI_FMT_USG, peerPublicKeyData, peerPublicKeyLength, 0); if(r) { handleError(r); } } gcry_mpi_t secret = gcry_mpi_new(0); gcry_mpi_powm(secret, peerPublicKey, _privateKey, _prime); gcry_mpi_release(peerPublicKey); size_t nwritten; { gcry_error_t r = gcry_mpi_print(GCRYMPI_FMT_USG, out, outLength, &nwritten, secret); gcry_mpi_release(secret); if(r) { handleError(r); } } return nwritten; } }; } // namespace aria2 #endif // _D_LIBGCRYPT_DH_KEY_EXCHANGE_H_