aboutsummaryrefslogtreecommitdiffstats
path: root/src/libstrongswan/plugins/ntru/ntru_ke.c
diff options
context:
space:
mode:
Diffstat (limited to 'src/libstrongswan/plugins/ntru/ntru_ke.c')
-rw-r--r--src/libstrongswan/plugins/ntru/ntru_ke.c120
1 files changed, 76 insertions, 44 deletions
diff --git a/src/libstrongswan/plugins/ntru/ntru_ke.c b/src/libstrongswan/plugins/ntru/ntru_ke.c
index 8c2f614f3..88e6366f7 100644
--- a/src/libstrongswan/plugins/ntru/ntru_ke.c
+++ b/src/libstrongswan/plugins/ntru/ntru_ke.c
@@ -22,6 +22,48 @@
#include <utils/debug.h>
typedef struct private_ntru_ke_t private_ntru_ke_t;
+typedef struct param_set_t param_set_t;
+
+/**
+ * Defines an NTRU parameter set by ID or OID
+ */
+struct param_set_t {
+ NTRU_ENCRYPT_PARAM_SET_ID id;
+ char oid[3];
+ char *name;
+};
+
+/* Best bandwidth and speed, no X9.98 compatibility */
+static param_set_t param_sets_optimum[] = {
+ { NTRU_EES401EP2, {0x00, 0x02, 0x10}, "ees401ep2" },
+ { NTRU_EES439EP1, {0x00, 0x03, 0x10}, "ees439ep1" },
+ { NTRU_EES593EP1, {0x00, 0x05, 0x10}, "ees593ep1" },
+ { NTRU_EES743EP1, {0x00, 0x06, 0x10}, "ees743ep1" }
+};
+
+/* X9.98/IEEE 1363.1 parameter sets for best speed */
+static param_set_t param_sets_x9_98_speed[] = {
+ { NTRU_EES659EP1, {0x00, 0x02, 0x06}, "ees659ep1" },
+ { NTRU_EES761EP1, {0x00, 0x03, 0x05}, "ees761ep1" },
+ { NTRU_EES1087EP1, {0x00, 0x05, 0x05}, "ees1087ep1" },
+ { NTRU_EES1499EP1, {0x00, 0x06, 0x05}, "ees1499ep1" }
+};
+
+/* X9.98/IEEE 1363.1 parameter sets for best bandwidth (smallest size) */
+static param_set_t param_sets_x9_98_bandwidth[] = {
+ { NTRU_EES401EP1, {0x00, 0x02, 0x04}, "ees401ep1" },
+ { NTRU_EES449EP1, {0x00, 0x03, 0x03}, "ees449ep1" },
+ { NTRU_EES677EP1, {0x00, 0x05, 0x03}, "ees677ep1" },
+ { NTRU_EES1087EP2, {0x00, 0x06, 0x03}, "ees1087ep2" }
+};
+
+/* X9.98/IEEE 1363.1 parameter sets balancing speed and bandwidth */
+static param_set_t param_sets_x9_98_balance[] = {
+ { NTRU_EES541EP1, {0x00, 0x02, 0x05}, "ees541ep1" },
+ { NTRU_EES613EP1, {0x00, 0x03, 0x04}, "ees613ep1" },
+ { NTRU_EES887EP1, {0x00, 0x05, 0x04}, "ees887ep1" },
+ { NTRU_EES1171EP1, {0x00, 0x06, 0x04}, "ees1171ep1" }
+};
/**
* Private data of an ntru_ke_t object.
@@ -38,9 +80,9 @@ struct private_ntru_ke_t {
u_int16_t group;
/**
- * NTRU Parameter Set ID
+ * NTRU Parameter Set
*/
- NTRU_ENCRYPT_PARAM_SET_ID param_set_id;
+ param_set_t *param_set;
/**
* Cryptographical strength in bits of the NTRU Parameter Set
@@ -102,7 +144,7 @@ METHOD(diffie_hellman_t, get_my_public_value, void,
if (this->pub_key.len == 0)
{
/* determine the NTRU public and private key sizes */
- if (ntru_crypto_ntru_encrypt_keygen(this->drbg, this->param_set_id,
+ if (ntru_crypto_ntru_encrypt_keygen(this->drbg, this->param_set->id,
&pub_key_len, NULL,
&priv_key_len, NULL) != NTRU_OK)
{
@@ -114,7 +156,7 @@ METHOD(diffie_hellman_t, get_my_public_value, void,
this->priv_key = chunk_alloc(priv_key_len);
/* generate a random NTRU public/private key pair */
- if (ntru_crypto_ntru_encrypt_keygen(this->drbg, this->param_set_id,
+ if (ntru_crypto_ntru_encrypt_keygen(this->drbg, this->param_set->id,
&pub_key_len, this->pub_key.ptr,
&priv_key_len, this->priv_key.ptr) != NTRU_OK)
{
@@ -180,6 +222,18 @@ METHOD(diffie_hellman_t, set_other_public_value, void,
{
/* responder generating and encrypting the shared secret */
this->responder = TRUE;
+
+ /* check the NTRU public key format */
+ if (value.len < 5 || value.ptr[0] != 1 || value.ptr[1] != 3)
+ {
+ DBG1(DBG_LIB, "received NTRU public key with invalid header");
+ return;
+ }
+ if (!memeq(value.ptr + 2, this->param_set->oid, 3))
+ {
+ DBG1(DBG_LIB, "received NTRU public key with wrong OID");
+ return;
+ }
this->pub_key = chunk_clone(value);
/* shared secret size is chosen as twice the cryptographical strength */
@@ -247,72 +301,54 @@ ntru_ke_t *ntru_ke_create(diffie_hellman_group_t group, chunk_t g, chunk_t p)
{
private_ntru_ke_t *this;
char personalization_str[] = "strongSwan NTRU-KE";
- NTRU_ENCRYPT_PARAM_SET_ID *param_set, param_set_id;
+ param_set_t *param_sets, *param_set;
DRBG_HANDLE drbg;
- char *param_set_selection;
+ char *parameter_set;
u_int32_t strength;
- /* Best bandwidth and speed, no X9.98 compatibility */
- NTRU_ENCRYPT_PARAM_SET_ID param_set_optimum[] = {
- NTRU_EES401EP2, NTRU_EES439EP1, NTRU_EES593EP1, NTRU_EES743EP1
- };
-
- /* X9.98/IEEE 1363.1 parameter set for best speed */
- NTRU_ENCRYPT_PARAM_SET_ID param_set_x9_98_speed[] = {
- NTRU_EES659EP1, NTRU_EES761EP1, NTRU_EES1087EP1, NTRU_EES1499EP1
- };
+ parameter_set = lib->settings->get_str(lib->settings,
+ "libstrongswan.plugins.ntru.parameter_set", "optimum");
- /* X9.98/IEEE 1363.1 parameter set for best bandwidth (smallest size) */
- NTRU_ENCRYPT_PARAM_SET_ID param_set_x9_98_bandwidth[] = {
- NTRU_EES401EP1, NTRU_EES449EP1, NTRU_EES677EP1, NTRU_EES1087EP1
- };
-
- /* X9.98/IEEE 1363.1 parameter set balancing speed and bandwidth */
- NTRU_ENCRYPT_PARAM_SET_ID param_set_x9_98_balance[] = {
- NTRU_EES541EP1, NTRU_EES613EP1, NTRU_EES887EP1, NTRU_EES1171EP1
- };
-
- param_set_selection = lib->settings->get_str(lib->settings,
- "libstrongswan.plugins.ntru.param__set_selection", "optimum");
-
- if (streq(param_set_selection, "x9_98_speed"))
+ if (streq(parameter_set, "x9_98_speed"))
{
- param_set = param_set_x9_98_speed;
+ param_sets = param_sets_x9_98_speed;
}
- else if (streq(param_set_selection, "x9_98_bandwidth"))
+ else if (streq(parameter_set, "x9_98_bandwidth"))
{
- param_set = param_set_x9_98_bandwidth;
+ param_sets = param_sets_x9_98_bandwidth;
}
- else if (streq(param_set_selection, "x9_98_balance"))
+ else if (streq(parameter_set, "x9_98_balance"))
{
- param_set = param_set_x9_98_balance;
+ param_sets = param_sets_x9_98_balance;
}
else
{
- param_set = param_set_optimum;
+ param_sets = param_sets_optimum;
}
switch (group)
{
case NTRU_112_BIT:
strength = 112;
- param_set_id = param_set[0];
+ param_set = &param_sets[0];
break;
case NTRU_128_BIT:
strength = 128;
- param_set_id = param_set[1];
+ param_set = &param_sets[1];
break;
case NTRU_192_BIT:
strength = 192;
- param_set_id = param_set[2];
+ param_set = &param_sets[2];
break;
case NTRU_256_BIT:
strength = 256;
- param_set_id = param_set[3];
+ param_set = &param_sets[3];
break;
default:
return NULL;
}
+ DBG1(DBG_LIB, "%u bit %s NTRU parameter set %s selected", strength,
+ parameter_set, param_set->name);
if (ntru_crypto_drbg_instantiate(strength,
personalization_str, strlen(personalization_str),
@@ -321,10 +357,6 @@ ntru_ke_t *ntru_ke_create(diffie_hellman_group_t group, chunk_t g, chunk_t p)
DBG1(DBG_LIB, "error instantiating DRBG at %u bit security", strength);
return NULL;
}
- else
- {
- DBG2(DBG_LIB, "instantiated DRBG at %u bit security", strength);
- }
INIT(this,
.public = {
@@ -337,7 +369,7 @@ ntru_ke_t *ntru_ke_create(diffie_hellman_group_t group, chunk_t g, chunk_t p)
},
},
.group = group,
- .param_set_id = param_set_id,
+ .param_set = param_set,
.strength = strength,
.drbg = drbg,
);