package gnu.crypto.key.srp6;
// ----------------------------------------------------------------------------
// $Id: SRP6TLSServer.java,v 1.3 2005/10/06 04:24:16 rsdio Exp $
//
// Copyright (C) 2003 Free Software Foundation, Inc.
//
// This file is part of GNU Crypto.
//
// GNU Crypto is free software; you can redistribute it and/or modify
// it under the terms of the GNU General Public License as published by
// the Free Software Foundation; either version 2, or (at your option)
// any later version.
//
// GNU Crypto is distributed in the hope that it will be useful, but
// WITHOUT ANY WARRANTY; without even the implied warranty of
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
// General Public License for more details.
//
// You should have received a copy of the GNU General Public License
// along with this program; see the file COPYING. If not, write to the
//
// Free Software Foundation Inc.,
// 51 Franklin Street, Fifth Floor,
// Boston, MA 02110-1301
// USA
//
// Linking this library statically or dynamically with other modules is
// making a combined work based on this library. Thus, the terms and
// conditions of the GNU General Public License cover the whole
// combination.
//
// As a special exception, the copyright holders of this library give
// you permission to link this library with independent modules to
// produce an executable, regardless of the license terms of these
// independent modules, and to copy and distribute the resulting
// executable under terms of your choice, provided that you also meet,
// for each linked independent module, the terms and conditions of the
// license of that module. An independent module is a module which is
// not derived from or based on this library. If you modify this
// library, you may extend this exception to your version of the
// library, but you are not obligated to do so. If you do not wish to
// do so, delete this exception statement from your version.
// ----------------------------------------------------------------------------
import gnu.crypto.Registry;
import gnu.crypto.key.KeyAgreementException;
import gnu.crypto.key.OutgoingMessage;
import gnu.crypto.key.IncomingMessage;
import gnu.crypto.sasl.srp.SRP;
import gnu.crypto.sasl.srp.SRPAuthInfoProvider;
import gnu.crypto.sasl.srp.SRPRegistry;
import gnu.crypto.util.Util;
import java.io.IOException;
import java.math.BigInteger;
import java.security.KeyPair;
import java.security.SecureRandom;
import java.util.HashMap;
import java.util.Map;
import javax.security.sasl.AuthenticationException;
/**
* <p>A variation of the SRP6 key agreement protocol, for the server-side as
* proposed in
* <a href="http://www.ietf.org/internet-drafts/draft-ietf-tls-srp-05.txt">Using
* SRP for TLS Authentication</a>. The only difference between it and the SASL
* variant is that the shared secret is the entity <code>S</code> and not
* <code>H(S)</code>.</p>
*
* @version $Revision: 1.3 $
*/
public class SRP6TLSServer extends SRP6KeyAgreement {
// Constants and variables
// -------------------------------------------------------------------------
/** The user's ephemeral key pair. */
private KeyPair hostKeyPair;
/** The SRP password database. */
private SRPAuthInfoProvider passwordDB;
// Constructor(s)
// -------------------------------------------------------------------------
// default 0-arguments constructor
// Class methods
// -------------------------------------------------------------------------
// Instance methods
// -------------------------------------------------------------------------
// implementation of abstract methods in base class ------------------------
protected void engineInit(final Map attributes) throws KeyAgreementException {
rnd = (SecureRandom) attributes.get(SOURCE_OF_RANDOMNESS);
final String md = (String) attributes.get(HASH_FUNCTION);
if (md == null || "".equals(md.trim())) {
throw new KeyAgreementException("missing hash function");
}
srp = SRP.instance(md);
passwordDB = (SRPAuthInfoProvider) attributes.get(HOST_PASSWORD_DB);
if (passwordDB == null) {
throw new KeyAgreementException("missing SRP password database");
}
}
protected OutgoingMessage engineProcessMessage(final IncomingMessage in)
throws KeyAgreementException {
switch (step) {
case 0: return sendParameters(in);
case 1: return computeSharedSecret(in);
default: throw new IllegalStateException("unexpected state");
}
}
protected void engineReset() {
hostKeyPair = null;
super.engineReset();
}
// own methods -------------------------------------------------------------
private OutgoingMessage sendParameters(final IncomingMessage in)
throws KeyAgreementException {
final String I = in.readString();
// get s and v for user identified by I
// ----------------------------------------------------------------------
final Map credentials;
try {
final Map userID = new HashMap();
userID.put(Registry.SASL_USERNAME, I);
userID.put(SRPRegistry.MD_NAME_FIELD, srp.getAlgorithm());
credentials = passwordDB.lookup(userID);
} catch (IOException x) {
throw new KeyAgreementException("computeSharedSecret()", x);
}
final BigInteger s = new BigInteger(1, Util.fromBase64(
(String) credentials.get(SRPRegistry.SALT_FIELD)));
final BigInteger v = new BigInteger(1, Util.fromBase64(
(String) credentials.get(SRPRegistry.USER_VERIFIER_FIELD)));
final Map configuration;
try {
final String mode = (String) credentials.get(SRPRegistry.CONFIG_NDX_FIELD);
configuration = passwordDB.getConfiguration(mode);
} catch (IOException x) {
throw new KeyAgreementException("computeSharedSecret()", x);
}
N = new BigInteger(1, Util.fromBase64(
(String) configuration.get(SRPRegistry.SHARED_MODULUS)));
g = new BigInteger(1, Util.fromBase64(
(String) configuration.get(SRPRegistry.FIELD_GENERATOR)));
// ----------------------------------------------------------------------
// generate an ephemeral keypair
final SRPKeyPairGenerator kpg = new SRPKeyPairGenerator();
final Map attributes = new HashMap();
if (rnd != null) {
attributes.put(SRPKeyPairGenerator.SOURCE_OF_RANDOMNESS, rnd);
}
attributes.put(SRPKeyPairGenerator.SHARED_MODULUS, N);
attributes.put(SRPKeyPairGenerator.GENERATOR, g);
attributes.put(SRPKeyPairGenerator.USER_VERIFIER, v);
kpg.setup(attributes);
hostKeyPair = kpg.generate();
final BigInteger B = ((SRPPublicKey) hostKeyPair.getPublic()).getY();
final OutgoingMessage result = new OutgoingMessage();
result.writeMPI(N);
result.writeMPI(g);
result.writeMPI(s);
result.writeMPI(B);
return result;
}
protected OutgoingMessage computeSharedSecret(final IncomingMessage in)
throws KeyAgreementException {
final BigInteger A = in.readMPI();
final BigInteger B = ((SRPPublicKey) hostKeyPair.getPublic()).getY();
final BigInteger u = uValue(A, B); // u = H(A | B)
// compute S = (Av^u) ^ b
final BigInteger b = ((SRPPrivateKey) hostKeyPair.getPrivate()).getX();
final BigInteger v = ((SRPPrivateKey) hostKeyPair.getPrivate()).getV();
final BigInteger S = A.multiply(v.modPow(u, N)).modPow(b, N);
K = S;
complete = true;
return null;
}
}