blob: ebc167674ab22dea2306a69642345cf3cab0b803 [file] [log] [blame]
Manuel Pégourié-Gonnard0bad5c22013-01-26 15:30:46 +01001/*
2 * Elliptic curve Diffie-Hellman
3 *
4 * Copyright (C) 2006-2013, Brainspark B.V.
5 *
6 * This file is part of PolarSSL (http://www.polarssl.org)
7 * Lead Maintainer: Paul Bakker <polarssl_maintainer at polarssl.org>
8 *
9 * All rights reserved.
10 *
11 * This program is free software; you can redistribute it and/or modify
12 * it under the terms of the GNU General Public License as published by
13 * the Free Software Foundation; either version 2 of the License, or
14 * (at your option) any later version.
15 *
16 * This program is distributed in the hope that it will be useful,
17 * but WITHOUT ANY WARRANTY; without even the implied warranty of
18 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
19 * GNU General Public License for more details.
20 *
21 * You should have received a copy of the GNU General Public License along
22 * with this program; if not, write to the Free Software Foundation, Inc.,
23 * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
24 */
25
26/*
27 * References:
28 *
29 * SEC1 http://www.secg.org/index.php?action=secg,docs_secg
Manuel Pégourié-Gonnard63533e42013-02-10 14:21:04 +010030 * RFC 4492
Manuel Pégourié-Gonnard0bad5c22013-01-26 15:30:46 +010031 */
32
33#include "polarssl/config.h"
34
Manuel Pégourié-Gonnard2aea1412013-01-26 16:33:44 +010035#if defined(POLARSSL_ECDH_C)
Manuel Pégourié-Gonnard0bad5c22013-01-26 15:30:46 +010036
37#include "polarssl/ecdh.h"
38
Manuel Pégourié-Gonnard6545ca72013-01-26 16:05:22 +010039/*
40 * Generate public key: simple wrapper around ecp_gen_keypair
41 */
Manuel Pégourié-Gonnard161ef962013-09-17 19:13:10 +020042int ecdh_gen_public( ecp_group *grp, mpi *d, ecp_point *Q,
Manuel Pégourié-Gonnard6545ca72013-01-26 16:05:22 +010043 int (*f_rng)(void *, unsigned char *, size_t),
44 void *p_rng )
45{
46 return ecp_gen_keypair( grp, d, Q, f_rng, p_rng );
47}
48
49/*
50 * Compute shared secret (SEC1 3.3.1)
51 */
Manuel Pégourié-Gonnard161ef962013-09-17 19:13:10 +020052int ecdh_compute_shared( ecp_group *grp, mpi *z,
Manuel Pégourié-Gonnarde09d2f82013-09-02 14:29:09 +020053 const ecp_point *Q, const mpi *d,
54 int (*f_rng)(void *, unsigned char *, size_t),
55 void *p_rng )
Manuel Pégourié-Gonnard6545ca72013-01-26 16:05:22 +010056{
57 int ret;
58 ecp_point P;
59
60 ecp_point_init( &P );
61
62 /*
63 * Make sure Q is a valid pubkey before using it
64 */
65 MPI_CHK( ecp_check_pubkey( grp, Q ) );
66
Manuel Pégourié-Gonnarde09d2f82013-09-02 14:29:09 +020067 MPI_CHK( ecp_mul( grp, &P, d, Q, f_rng, p_rng ) );
Manuel Pégourié-Gonnard6545ca72013-01-26 16:05:22 +010068
69 if( ecp_is_zero( &P ) )
Paul Bakkerb548d772013-07-26 14:21:34 +020070 {
71 ret = POLARSSL_ERR_ECP_BAD_INPUT_DATA;
72 goto cleanup;
73 }
Manuel Pégourié-Gonnard6545ca72013-01-26 16:05:22 +010074
75 MPI_CHK( mpi_copy( z, &P.X ) );
76
77cleanup:
78 ecp_point_free( &P );
79
80 return( ret );
81}
82
Manuel Pégourié-Gonnard63533e42013-02-10 14:21:04 +010083/*
84 * Initialize context
85 */
86void ecdh_init( ecdh_context *ctx )
87{
Manuel Pégourié-Gonnardc83e4182013-09-17 10:48:41 +020088 memset( ctx, 0, sizeof( ecdh_context ) );
Manuel Pégourié-Gonnard63533e42013-02-10 14:21:04 +010089}
90
Manuel Pégourié-Gonnard63533e42013-02-10 14:21:04 +010091/*
92 * Free context
93 */
94void ecdh_free( ecdh_context *ctx )
95{
96 if( ctx == NULL )
97 return;
98
99 ecp_group_free( &ctx->grp );
100 mpi_free ( &ctx->d );
101 ecp_point_free( &ctx->Q );
102 ecp_point_free( &ctx->Qp );
103 mpi_free ( &ctx->z );
Manuel Pégourié-Gonnardc83e4182013-09-17 10:48:41 +0200104 ecp_point_free( &ctx->Vi );
105 ecp_point_free( &ctx->Vf );
106 mpi_free ( &ctx->_d );
Manuel Pégourié-Gonnard63533e42013-02-10 14:21:04 +0100107}
108
Manuel Pégourié-Gonnard13724762013-02-10 15:01:54 +0100109/*
Manuel Pégourié-Gonnard854fbd72013-02-11 20:28:55 +0100110 * Setup and write the ServerKeyExhange parameters (RFC 4492)
Manuel Pégourié-Gonnard13724762013-02-10 15:01:54 +0100111 * struct {
112 * ECParameters curve_params;
113 * ECPoint public;
114 * } ServerECDHParams;
115 */
Manuel Pégourié-Gonnard854fbd72013-02-11 20:28:55 +0100116int ecdh_make_params( ecdh_context *ctx, size_t *olen,
117 unsigned char *buf, size_t blen,
118 int (*f_rng)(void *, unsigned char *, size_t),
119 void *p_rng )
Manuel Pégourié-Gonnard13724762013-02-10 15:01:54 +0100120{
121 int ret;
122 size_t grp_len, pt_len;
123
Manuel Pégourié-Gonnardf35b7392013-02-11 22:12:39 +0100124 if( ctx == NULL || ctx->grp.pbits == 0 )
125 return( POLARSSL_ERR_ECP_BAD_INPUT_DATA );
126
Manuel Pégourié-Gonnard13724762013-02-10 15:01:54 +0100127 if( ( ret = ecdh_gen_public( &ctx->grp, &ctx->d, &ctx->Q, f_rng, p_rng ) )
128 != 0 )
129 return( ret );
130
131 if( ( ret = ecp_tls_write_group( &ctx->grp, &grp_len, buf, blen ) )
132 != 0 )
133 return( ret );
134
135 buf += grp_len;
136 blen -= grp_len;
137
138 if( ( ret = ecp_tls_write_point( &ctx->grp, &ctx->Q, ctx->point_format,
139 &pt_len, buf, blen ) ) != 0 )
140 return( ret );
141
142 *olen = grp_len + pt_len;
143 return 0;
144}
145
Manuel Pégourié-Gonnard854fbd72013-02-11 20:28:55 +0100146/*
147 * Read the ServerKeyExhange parameters (RFC 4492)
148 * struct {
149 * ECParameters curve_params;
150 * ECPoint public;
151 * } ServerECDHParams;
152 */
153int ecdh_read_params( ecdh_context *ctx,
154 const unsigned char **buf, const unsigned char *end )
155{
156 int ret;
157
158 if( ( ret = ecp_tls_read_group( &ctx->grp, buf, end - *buf ) ) != 0 )
159 return( ret );
160
161 if( ( ret = ecp_tls_read_point( &ctx->grp, &ctx->Qp, buf, end - *buf ) )
162 != 0 )
163 return( ret );
164
165 return 0;
166}
Manuel Pégourié-Gonnard0bad5c22013-01-26 15:30:46 +0100167
Manuel Pégourié-Gonnard5cceb412013-02-11 21:51:45 +0100168/*
Manuel Pégourié-Gonnardcdff3cf2013-12-12 09:55:52 +0100169 * Get parameters from a keypair
170 */
171int ecdh_get_params( ecdh_context *ctx, const ecp_keypair *key,
172 ecdh_side side )
173{
174 int ret;
175
176 if( ( ret = ecp_group_copy( &ctx->grp, &key->grp ) ) != 0 )
177 return( ret );
178
179 /* If it's not our key, just import the public part as Qp */
180 if( side == POLARSSL_ECDH_THEIRS )
181 return( ecp_copy( &ctx->Qp, &key->Q ) );
182
183 /* Our key: import public (as Q) and private parts */
184 if( side != POLARSSL_ECDH_OURS )
185 return( POLARSSL_ERR_ECP_BAD_INPUT_DATA );
186
187 if( ( ret = ecp_copy( &ctx->Q, &key->Q ) ) != 0 ||
188 ( ret = mpi_copy( &ctx->d, &key->d ) ) != 0 )
189 return( ret );
190
191 return( 0 );
192}
193
194/*
Manuel Pégourié-Gonnard5cceb412013-02-11 21:51:45 +0100195 * Setup and export the client public value
196 */
197int ecdh_make_public( ecdh_context *ctx, size_t *olen,
198 unsigned char *buf, size_t blen,
199 int (*f_rng)(void *, unsigned char *, size_t),
200 void *p_rng )
201{
202 int ret;
203
Manuel Pégourié-Gonnardf35b7392013-02-11 22:12:39 +0100204 if( ctx == NULL || ctx->grp.pbits == 0 )
205 return( POLARSSL_ERR_ECP_BAD_INPUT_DATA );
206
Manuel Pégourié-Gonnard5cceb412013-02-11 21:51:45 +0100207 if( ( ret = ecdh_gen_public( &ctx->grp, &ctx->d, &ctx->Q, f_rng, p_rng ) )
208 != 0 )
209 return( ret );
210
211 return ecp_tls_write_point( &ctx->grp, &ctx->Q, ctx->point_format,
212 olen, buf, blen );
213}
214
215/*
216 * Parse and import the client's public value
217 */
218int ecdh_read_public( ecdh_context *ctx,
219 const unsigned char *buf, size_t blen )
220{
Manuel Pégourié-Gonnardf35b7392013-02-11 22:12:39 +0100221 if( ctx == NULL )
222 return( POLARSSL_ERR_ECP_BAD_INPUT_DATA );
223
Manuel Pégourié-Gonnard5cceb412013-02-11 21:51:45 +0100224 return ecp_tls_read_point( &ctx->grp, &ctx->Qp, &buf, blen );
225}
226
Manuel Pégourié-Gonnard424fda52013-02-11 22:05:42 +0100227/*
228 * Derive and export the shared secret
229 */
230int ecdh_calc_secret( ecdh_context *ctx, size_t *olen,
Manuel Pégourié-Gonnarde09d2f82013-09-02 14:29:09 +0200231 unsigned char *buf, size_t blen,
232 int (*f_rng)(void *, unsigned char *, size_t),
233 void *p_rng )
Manuel Pégourié-Gonnard424fda52013-02-11 22:05:42 +0100234{
235 int ret;
236
Manuel Pégourié-Gonnardf35b7392013-02-11 22:12:39 +0100237 if( ctx == NULL )
238 return( POLARSSL_ERR_ECP_BAD_INPUT_DATA );
239
Manuel Pégourié-Gonnarde09d2f82013-09-02 14:29:09 +0200240 if( ( ret = ecdh_compute_shared( &ctx->grp, &ctx->z, &ctx->Qp, &ctx->d,
241 f_rng, p_rng ) ) != 0 )
242 {
Manuel Pégourié-Gonnard424fda52013-02-11 22:05:42 +0100243 return( ret );
Manuel Pégourié-Gonnarde09d2f82013-09-02 14:29:09 +0200244 }
Manuel Pégourié-Gonnard424fda52013-02-11 22:05:42 +0100245
Paul Bakker41c83d32013-03-20 14:39:14 +0100246 if( mpi_size( &ctx->z ) > blen )
247 return( POLARSSL_ERR_ECP_BAD_INPUT_DATA );
248
Manuel Pégourié-Gonnard0a56c2c2014-01-17 21:24:04 +0100249 *olen = ctx->grp.pbits / 8 + ( ( ctx->grp.pbits % 8 ) != 0 );
Paul Bakker41c83d32013-03-20 14:39:14 +0100250 return mpi_write_binary( &ctx->z, buf, *olen );
Manuel Pégourié-Gonnard424fda52013-02-11 22:05:42 +0100251}
252
253
Manuel Pégourié-Gonnard0bad5c22013-01-26 15:30:46 +0100254#if defined(POLARSSL_SELF_TEST)
255
256/*
257 * Checkup routine
258 */
259int ecdh_self_test( int verbose )
260{
261 return( verbose++ );
262}
263
264#endif
265
Manuel Pégourié-Gonnard2aea1412013-01-26 16:33:44 +0100266#endif /* defined(POLARSSL_ECDH_C) */