psa_crypto_ffdh.c 11 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322
  1. /*
  2. * PSA FFDH layer on top of Mbed TLS crypto
  3. */
  4. /*
  5. * Copyright The Mbed TLS Contributors
  6. * SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later
  7. */
  8. #include "common.h"
  9. #if defined(MBEDTLS_PSA_CRYPTO_C)
  10. /* This header is only needed because it defines
  11. * MBEDTLS_DHM_RFC7919_FFDHEXXXX_[P|G]_BIN symbols that are used in
  12. * mbedtls_psa_ffdh_set_prime_generator(). Apart from that, this module
  13. * only uses bignum functions for arithmetic. */
  14. #include <mbedtls/dhm.h>
  15. #include <psa/crypto.h>
  16. #include "psa_crypto_core.h"
  17. #include "psa_crypto_ffdh.h"
  18. #include "psa_crypto_random_impl.h"
  19. #include "mbedtls/platform.h"
  20. #include "mbedtls/error.h"
  21. #if defined(MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_EXPORT) || \
  22. defined(MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_GENERATE) || \
  23. defined(MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_PUBLIC_KEY) || \
  24. defined(MBEDTLS_PSA_BUILTIN_ALG_FFDH)
  25. static psa_status_t mbedtls_psa_ffdh_set_prime_generator(size_t key_size,
  26. mbedtls_mpi *P,
  27. mbedtls_mpi *G)
  28. {
  29. const unsigned char *dhm_P = NULL;
  30. const unsigned char *dhm_G = NULL;
  31. size_t dhm_size_P = 0;
  32. size_t dhm_size_G = 0;
  33. int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
  34. if (P == NULL && G == NULL) {
  35. return PSA_ERROR_INVALID_ARGUMENT;
  36. }
  37. #if defined(MBEDTLS_PSA_BUILTIN_DH_RFC7919_2048)
  38. static const unsigned char dhm_P_2048[] =
  39. MBEDTLS_DHM_RFC7919_FFDHE2048_P_BIN;
  40. static const unsigned char dhm_G_2048[] =
  41. MBEDTLS_DHM_RFC7919_FFDHE2048_G_BIN;
  42. #endif /* MBEDTLS_PSA_BUILTIN_DH_RFC7919_2048 */
  43. #if defined(MBEDTLS_PSA_BUILTIN_DH_RFC7919_3072)
  44. static const unsigned char dhm_P_3072[] =
  45. MBEDTLS_DHM_RFC7919_FFDHE3072_P_BIN;
  46. static const unsigned char dhm_G_3072[] =
  47. MBEDTLS_DHM_RFC7919_FFDHE3072_G_BIN;
  48. #endif /* MBEDTLS_PSA_BUILTIN_DH_RFC7919_3072 */
  49. #if defined(MBEDTLS_PSA_BUILTIN_DH_RFC7919_4096)
  50. static const unsigned char dhm_P_4096[] =
  51. MBEDTLS_DHM_RFC7919_FFDHE4096_P_BIN;
  52. static const unsigned char dhm_G_4096[] =
  53. MBEDTLS_DHM_RFC7919_FFDHE4096_G_BIN;
  54. #endif /* MBEDTLS_PSA_BUILTIN_DH_RFC7919_4096 */
  55. #if defined(MBEDTLS_PSA_BUILTIN_DH_RFC7919_6144)
  56. static const unsigned char dhm_P_6144[] =
  57. MBEDTLS_DHM_RFC7919_FFDHE6144_P_BIN;
  58. static const unsigned char dhm_G_6144[] =
  59. MBEDTLS_DHM_RFC7919_FFDHE6144_G_BIN;
  60. #endif /* MBEDTLS_PSA_BUILTIN_DH_RFC7919_6144 */
  61. #if defined(MBEDTLS_PSA_BUILTIN_DH_RFC7919_8192)
  62. static const unsigned char dhm_P_8192[] =
  63. MBEDTLS_DHM_RFC7919_FFDHE8192_P_BIN;
  64. static const unsigned char dhm_G_8192[] =
  65. MBEDTLS_DHM_RFC7919_FFDHE8192_G_BIN;
  66. #endif /* MBEDTLS_PSA_BUILTIN_DH_RFC7919_8192 */
  67. switch (key_size) {
  68. #if defined(MBEDTLS_PSA_BUILTIN_DH_RFC7919_2048)
  69. case sizeof(dhm_P_2048):
  70. dhm_P = dhm_P_2048;
  71. dhm_G = dhm_G_2048;
  72. dhm_size_P = sizeof(dhm_P_2048);
  73. dhm_size_G = sizeof(dhm_G_2048);
  74. break;
  75. #endif /* MBEDTLS_PSA_BUILTIN_DH_RFC7919_2048 */
  76. #if defined(MBEDTLS_PSA_BUILTIN_DH_RFC7919_3072)
  77. case sizeof(dhm_P_3072):
  78. dhm_P = dhm_P_3072;
  79. dhm_G = dhm_G_3072;
  80. dhm_size_P = sizeof(dhm_P_3072);
  81. dhm_size_G = sizeof(dhm_G_3072);
  82. break;
  83. #endif /* MBEDTLS_PSA_BUILTIN_DH_RFC7919_3072 */
  84. #if defined(MBEDTLS_PSA_BUILTIN_DH_RFC7919_4096)
  85. case sizeof(dhm_P_4096):
  86. dhm_P = dhm_P_4096;
  87. dhm_G = dhm_G_4096;
  88. dhm_size_P = sizeof(dhm_P_4096);
  89. dhm_size_G = sizeof(dhm_G_4096);
  90. break;
  91. #endif /* MBEDTLS_PSA_BUILTIN_DH_RFC7919_4096 */
  92. #if defined(MBEDTLS_PSA_BUILTIN_DH_RFC7919_6144)
  93. case sizeof(dhm_P_6144):
  94. dhm_P = dhm_P_6144;
  95. dhm_G = dhm_G_6144;
  96. dhm_size_P = sizeof(dhm_P_6144);
  97. dhm_size_G = sizeof(dhm_G_6144);
  98. break;
  99. #endif /* MBEDTLS_PSA_BUILTIN_DH_RFC7919_6144 */
  100. #if defined(MBEDTLS_PSA_BUILTIN_DH_RFC7919_8192)
  101. case sizeof(dhm_P_8192):
  102. dhm_P = dhm_P_8192;
  103. dhm_G = dhm_G_8192;
  104. dhm_size_P = sizeof(dhm_P_8192);
  105. dhm_size_G = sizeof(dhm_G_8192);
  106. break;
  107. #endif /* MBEDTLS_PSA_BUILTIN_DH_RFC7919_8192 */
  108. default:
  109. return PSA_ERROR_INVALID_ARGUMENT;
  110. }
  111. if (P != NULL) {
  112. MBEDTLS_MPI_CHK(mbedtls_mpi_read_binary(P, dhm_P,
  113. dhm_size_P));
  114. }
  115. if (G != NULL) {
  116. MBEDTLS_MPI_CHK(mbedtls_mpi_read_binary(G, dhm_G,
  117. dhm_size_G));
  118. }
  119. cleanup:
  120. if (ret != 0) {
  121. return mbedtls_to_psa_error(ret);
  122. }
  123. return PSA_SUCCESS;
  124. }
  125. #endif /* MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_EXPORT ||
  126. MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_GENERATE ||
  127. MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_PUBLIC_KEY ||
  128. MBEDTLS_PSA_BUILTIN_ALG_FFDH */
  129. #if defined(MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_EXPORT) || \
  130. defined(MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_PUBLIC_KEY)
  131. psa_status_t mbedtls_psa_ffdh_export_public_key(
  132. const psa_key_attributes_t *attributes,
  133. const uint8_t *key_buffer,
  134. size_t key_buffer_size,
  135. uint8_t *data,
  136. size_t data_size,
  137. size_t *data_length)
  138. {
  139. int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
  140. psa_status_t status = PSA_ERROR_CORRUPTION_DETECTED;
  141. mbedtls_mpi GX, G, X, P;
  142. psa_key_type_t type = attributes->type;
  143. if (PSA_KEY_TYPE_IS_PUBLIC_KEY(type)) {
  144. if (key_buffer_size > data_size) {
  145. return PSA_ERROR_BUFFER_TOO_SMALL;
  146. }
  147. memcpy(data, key_buffer, key_buffer_size);
  148. memset(data + key_buffer_size, 0,
  149. data_size - key_buffer_size);
  150. *data_length = key_buffer_size;
  151. return PSA_SUCCESS;
  152. }
  153. mbedtls_mpi_init(&GX); mbedtls_mpi_init(&G);
  154. mbedtls_mpi_init(&X); mbedtls_mpi_init(&P);
  155. size_t key_len = PSA_BITS_TO_BYTES(attributes->bits);
  156. status = mbedtls_psa_ffdh_set_prime_generator(key_len, &P, &G);
  157. if (status != PSA_SUCCESS) {
  158. goto cleanup;
  159. }
  160. MBEDTLS_MPI_CHK(mbedtls_mpi_read_binary(&X, key_buffer,
  161. key_buffer_size));
  162. MBEDTLS_MPI_CHK(mbedtls_mpi_exp_mod(&GX, &G, &X, &P, NULL));
  163. MBEDTLS_MPI_CHK(mbedtls_mpi_write_binary(&GX, data, key_len));
  164. *data_length = key_len;
  165. ret = 0;
  166. cleanup:
  167. mbedtls_mpi_free(&P); mbedtls_mpi_free(&G);
  168. mbedtls_mpi_free(&X); mbedtls_mpi_free(&GX);
  169. if (status == PSA_SUCCESS && ret != 0) {
  170. status = mbedtls_to_psa_error(ret);
  171. }
  172. return status;
  173. }
  174. #endif /* MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_EXPORT ||
  175. MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_PUBLIC_KEY */
  176. #if defined(MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_GENERATE)
  177. psa_status_t mbedtls_psa_ffdh_generate_key(
  178. const psa_key_attributes_t *attributes,
  179. uint8_t *key_buffer, size_t key_buffer_size, size_t *key_buffer_length)
  180. {
  181. mbedtls_mpi X, P;
  182. int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
  183. psa_status_t status = PSA_ERROR_CORRUPTION_DETECTED;
  184. mbedtls_mpi_init(&P); mbedtls_mpi_init(&X);
  185. (void) attributes;
  186. status = mbedtls_psa_ffdh_set_prime_generator(key_buffer_size, &P, NULL);
  187. if (status != PSA_SUCCESS) {
  188. goto cleanup;
  189. }
  190. /* RFC7919: Traditional finite field Diffie-Hellman has each peer choose their
  191. secret exponent from the range [2, P-2].
  192. Select random value in range [3, P-1] and decrease it by 1. */
  193. MBEDTLS_MPI_CHK(mbedtls_mpi_random(&X, 3, &P, mbedtls_psa_get_random,
  194. MBEDTLS_PSA_RANDOM_STATE));
  195. MBEDTLS_MPI_CHK(mbedtls_mpi_sub_int(&X, &X, 1));
  196. MBEDTLS_MPI_CHK(mbedtls_mpi_write_binary(&X, key_buffer, key_buffer_size));
  197. *key_buffer_length = key_buffer_size;
  198. cleanup:
  199. mbedtls_mpi_free(&P); mbedtls_mpi_free(&X);
  200. if (status == PSA_SUCCESS && ret != 0) {
  201. return mbedtls_to_psa_error(ret);
  202. }
  203. return status;
  204. }
  205. #endif /* MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_GENERATE */
  206. #if defined(MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_IMPORT)
  207. psa_status_t mbedtls_psa_ffdh_import_key(
  208. const psa_key_attributes_t *attributes,
  209. const uint8_t *data, size_t data_length,
  210. uint8_t *key_buffer, size_t key_buffer_size,
  211. size_t *key_buffer_length, size_t *bits)
  212. {
  213. (void) attributes;
  214. if (key_buffer_size < data_length) {
  215. return PSA_ERROR_BUFFER_TOO_SMALL;
  216. }
  217. memcpy(key_buffer, data, data_length);
  218. *key_buffer_length = data_length;
  219. *bits = PSA_BYTES_TO_BITS(data_length);
  220. return PSA_SUCCESS;
  221. }
  222. #endif /* MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_IMPORT */
  223. #if defined(MBEDTLS_PSA_BUILTIN_ALG_FFDH)
  224. psa_status_t mbedtls_psa_ffdh_key_agreement(
  225. const psa_key_attributes_t *attributes,
  226. const uint8_t *peer_key,
  227. size_t peer_key_length,
  228. const uint8_t *key_buffer,
  229. size_t key_buffer_size,
  230. uint8_t *shared_secret,
  231. size_t shared_secret_size,
  232. size_t *shared_secret_length)
  233. {
  234. int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
  235. psa_status_t status = PSA_ERROR_CORRUPTION_DETECTED;
  236. mbedtls_mpi P, G, X, GY, K;
  237. const size_t calculated_shared_secret_size = peer_key_length;
  238. if (peer_key_length != key_buffer_size ||
  239. calculated_shared_secret_size > shared_secret_size) {
  240. return PSA_ERROR_INVALID_ARGUMENT;
  241. }
  242. if (!PSA_KEY_TYPE_IS_DH_KEY_PAIR(psa_get_key_type(attributes))) {
  243. return PSA_ERROR_INVALID_ARGUMENT;
  244. }
  245. mbedtls_mpi_init(&P); mbedtls_mpi_init(&G);
  246. mbedtls_mpi_init(&X); mbedtls_mpi_init(&GY);
  247. mbedtls_mpi_init(&K);
  248. status = mbedtls_psa_ffdh_set_prime_generator(
  249. PSA_BITS_TO_BYTES(attributes->bits), &P, &G);
  250. if (status != PSA_SUCCESS) {
  251. goto cleanup;
  252. }
  253. MBEDTLS_MPI_CHK(mbedtls_mpi_read_binary(&X, key_buffer,
  254. key_buffer_size));
  255. MBEDTLS_MPI_CHK(mbedtls_mpi_read_binary(&GY, peer_key,
  256. peer_key_length));
  257. /* Calculate shared secret public key: K = G^(XY) mod P = GY^X mod P */
  258. MBEDTLS_MPI_CHK(mbedtls_mpi_exp_mod(&K, &GY, &X, &P, NULL));
  259. MBEDTLS_MPI_CHK(mbedtls_mpi_write_binary(&K, shared_secret,
  260. calculated_shared_secret_size));
  261. *shared_secret_length = calculated_shared_secret_size;
  262. ret = 0;
  263. cleanup:
  264. mbedtls_mpi_free(&P); mbedtls_mpi_free(&G);
  265. mbedtls_mpi_free(&X); mbedtls_mpi_free(&GY);
  266. mbedtls_mpi_free(&K);
  267. if (status == PSA_SUCCESS && ret != 0) {
  268. status = mbedtls_to_psa_error(ret);
  269. }
  270. return status;
  271. }
  272. #endif /* MBEDTLS_PSA_BUILTIN_ALG_FFDH */
  273. #endif /* MBEDTLS_PSA_CRYPTO_C */