blob: 4550a72b96c448ee066571bc9639400180b18612 [file] [log] [blame]
Przemek Stekiel359f4622022-12-05 14:11:55 +01001/*
2 * PSA FFDH layer on top of Mbed TLS crypto
3 */
4/*
5 * Copyright The Mbed TLS Contributors
6 * SPDX-License-Identifier: Apache-2.0
7 *
8 * Licensed under the Apache License, Version 2.0 (the "License"); you may
9 * not use this file except in compliance with the License.
10 * You may obtain a copy of the License at
11 *
12 * http://www.apache.org/licenses/LICENSE-2.0
13 *
14 * Unless required by applicable law or agreed to in writing, software
15 * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
16 * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
17 * See the License for the specific language governing permissions and
18 * limitations under the License.
19 */
20
21#include "common.h"
22
23#if defined(MBEDTLS_PSA_CRYPTO_C)
24
25#include <psa/crypto.h>
26#include "psa_crypto_core.h"
27#include "psa_crypto_ffdh.h"
28#include "psa_crypto_random_impl.h"
Przemek Stekiela59255f2023-05-11 11:03:54 +020029#include "mbedtls/platform.h"
Przemek Stekiel359f4622022-12-05 14:11:55 +010030
Przemek Stekiela59255f2023-05-11 11:03:54 +020031#if defined(MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR) || \
32 defined(MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_PUBLIC_KEY) || \
33 defined(MBEDTLS_PSA_BUILTIN_ALG_FFDH)
Przemek Stekiel359f4622022-12-05 14:11:55 +010034static psa_status_t mbedtls_psa_ffdh_set_prime_generator(size_t key_size,
35 mbedtls_mpi *P,
36 mbedtls_mpi *G)
37{
38 const unsigned char *dhm_P = NULL;
39 const unsigned char *dhm_G = NULL;
40 size_t dhm_size_P = 0;
41 size_t dhm_size_G = 0;
42 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
43
44 if (P == NULL && G == NULL) {
45 return PSA_ERROR_INVALID_ARGUMENT;
46 }
47
48 static const unsigned char dhm_P_2048[] =
49 MBEDTLS_DHM_RFC7919_FFDHE2048_P_BIN;
50 static const unsigned char dhm_P_3072[] =
51 MBEDTLS_DHM_RFC7919_FFDHE3072_P_BIN;
52 static const unsigned char dhm_P_4096[] =
53 MBEDTLS_DHM_RFC7919_FFDHE4096_P_BIN;
54 static const unsigned char dhm_P_6144[] =
55 MBEDTLS_DHM_RFC7919_FFDHE6144_P_BIN;
56 static const unsigned char dhm_P_8192[] =
57 MBEDTLS_DHM_RFC7919_FFDHE8192_P_BIN;
58 static const unsigned char dhm_G_2048[] =
59 MBEDTLS_DHM_RFC7919_FFDHE2048_G_BIN;
60 static const unsigned char dhm_G_3072[] =
61 MBEDTLS_DHM_RFC7919_FFDHE3072_G_BIN;
62 static const unsigned char dhm_G_4096[] =
63 MBEDTLS_DHM_RFC7919_FFDHE4096_G_BIN;
64 static const unsigned char dhm_G_6144[] =
65 MBEDTLS_DHM_RFC7919_FFDHE6144_G_BIN;
66 static const unsigned char dhm_G_8192[] =
67 MBEDTLS_DHM_RFC7919_FFDHE8192_G_BIN;
68
Przemek Stekiel134cc2e2023-05-05 10:13:37 +020069 switch (key_size) {
Przemek Stekiel75095cc2023-04-28 14:20:27 +020070 case sizeof(dhm_P_2048):
71 dhm_P = dhm_P_2048;
72 dhm_G = dhm_G_2048;
73 dhm_size_P = sizeof(dhm_P_2048);
74 dhm_size_G = sizeof(dhm_G_2048);
75 break;
76 case sizeof(dhm_P_3072):
77 dhm_P = dhm_P_3072;
78 dhm_G = dhm_G_3072;
79 dhm_size_P = sizeof(dhm_P_3072);
80 dhm_size_G = sizeof(dhm_G_3072);
81 break;
82 case sizeof(dhm_P_4096):
83 dhm_P = dhm_P_4096;
84 dhm_G = dhm_G_4096;
85 dhm_size_P = sizeof(dhm_P_4096);
86 dhm_size_G = sizeof(dhm_G_4096);
87 break;
88 case sizeof(dhm_P_6144):
89 dhm_P = dhm_P_6144;
90 dhm_G = dhm_G_6144;
91 dhm_size_P = sizeof(dhm_P_6144);
92 dhm_size_G = sizeof(dhm_G_6144);
93 break;
94 case sizeof(dhm_P_8192):
95 dhm_P = dhm_P_8192;
96 dhm_G = dhm_G_8192;
97 dhm_size_P = sizeof(dhm_P_8192);
98 dhm_size_G = sizeof(dhm_G_8192);
99 break;
100 default:
101 return PSA_ERROR_INVALID_ARGUMENT;
Przemek Stekiel359f4622022-12-05 14:11:55 +0100102 }
103
104 if (P != NULL) {
105 MBEDTLS_MPI_CHK(mbedtls_mpi_read_binary(P, dhm_P,
106 dhm_size_P));
107 }
108 if (G != NULL) {
109 MBEDTLS_MPI_CHK(mbedtls_mpi_read_binary(G, dhm_G,
110 dhm_size_G));
111 }
112
113cleanup:
114 if (ret != 0) {
115 return mbedtls_to_psa_error(ret);
116 }
117
118 return PSA_SUCCESS;
119}
Przemek Stekiela59255f2023-05-11 11:03:54 +0200120#endif /* MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR ||
121 MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_PUBLIC_KEY ||
122 MBEDTLS_PSA_BUILTIN_ALG_FFDH */
Przemek Stekiel359f4622022-12-05 14:11:55 +0100123
Przemek Stekiela59255f2023-05-11 11:03:54 +0200124#if defined(MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR) || \
125 defined(MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_PUBLIC_KEY)
Przemek Stekiel359f4622022-12-05 14:11:55 +0100126psa_status_t mbedtls_psa_export_ffdh_public_key(
127 const psa_key_attributes_t *attributes,
128 const uint8_t *key_buffer,
129 size_t key_buffer_size,
130 uint8_t *data,
131 size_t data_size,
132 size_t *data_length)
133{
134 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
135 psa_status_t status = PSA_ERROR_CORRUPTION_DETECTED;
136 mbedtls_mpi GX, G, X, P;
Przemek Stekiel33c91eb2023-05-30 15:16:35 +0200137 psa_key_type_t type = attributes->core.type;
138
139 if (PSA_KEY_TYPE_IS_PUBLIC_KEY(type)) {
140 if (key_buffer_size > data_size) {
141 return PSA_ERROR_BUFFER_TOO_SMALL;
142 }
143 memcpy(data, key_buffer, key_buffer_size);
144 memset(data + key_buffer_size, 0,
145 data_size - key_buffer_size);
146 *data_length = key_buffer_size;
147 return PSA_SUCCESS;
148 }
Przemek Stekiel359f4622022-12-05 14:11:55 +0100149
150 mbedtls_mpi_init(&GX); mbedtls_mpi_init(&G);
151 mbedtls_mpi_init(&X); mbedtls_mpi_init(&P);
152
Przemek Stekiel837d2d12023-05-05 12:33:46 +0200153 status = mbedtls_psa_ffdh_set_prime_generator(data_size, &P, &G);
Przemek Stekiel359f4622022-12-05 14:11:55 +0100154
Przemek Stekiel134cc2e2023-05-05 10:13:37 +0200155 if (status != PSA_SUCCESS) {
Przemek Stekiel6fd72b62023-04-27 10:20:56 +0200156 goto cleanup;
Przemek Stekiel359f4622022-12-05 14:11:55 +0100157 }
Przemek Stekiel6fd72b62023-04-27 10:20:56 +0200158
159 MBEDTLS_MPI_CHK(mbedtls_mpi_read_binary(&X, key_buffer,
160 key_buffer_size));
161
162 MBEDTLS_MPI_CHK(mbedtls_mpi_exp_mod(&GX, &G, &X, &P, NULL));
163 MBEDTLS_MPI_CHK(mbedtls_mpi_write_binary(&GX, data, data_size));
164
Przemek Stekiel837d2d12023-05-05 12:33:46 +0200165 *data_length = data_size;
Przemek Stekiel6fd72b62023-04-27 10:20:56 +0200166
167 ret = 0;
Przemek Stekiel359f4622022-12-05 14:11:55 +0100168cleanup:
169 mbedtls_mpi_free(&P); mbedtls_mpi_free(&G);
170 mbedtls_mpi_free(&X); mbedtls_mpi_free(&GX);
171
172 if (status == PSA_SUCCESS && ret != 0) {
Przemek Stekiel6fd72b62023-04-27 10:20:56 +0200173 status = mbedtls_to_psa_error(ret);
Przemek Stekiel359f4622022-12-05 14:11:55 +0100174 }
175
176 return status;
177}
178
179psa_status_t mbedtls_psa_ffdh_generate_key(
180 const psa_key_attributes_t *attributes,
181 uint8_t *key_buffer, size_t key_buffer_size, size_t *key_buffer_length)
182{
183 mbedtls_mpi X, P;
184 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
185 psa_status_t status = PSA_ERROR_CORRUPTION_DETECTED;
186 mbedtls_mpi_init(&P); mbedtls_mpi_init(&X);
Przemek Stekiele1621a42023-05-05 09:53:37 +0200187 (void) attributes;
Przemek Stekiel359f4622022-12-05 14:11:55 +0100188
Przemek Stekiele1621a42023-05-05 09:53:37 +0200189 status = mbedtls_psa_ffdh_set_prime_generator(key_buffer_size, &P, NULL);
Przemek Stekiel359f4622022-12-05 14:11:55 +0100190
Przemek Stekiele1621a42023-05-05 09:53:37 +0200191 if (status != PSA_SUCCESS) {
192 goto cleanup;
Przemek Stekiel359f4622022-12-05 14:11:55 +0100193 }
194
Przemek Stekiele1621a42023-05-05 09:53:37 +0200195 /* RFC7919: Traditional finite field Diffie-Hellman has each peer choose their
196 secret exponent from the range [2, P-2].
197 Select random value in range [3, P-1] and decrease it by 1. */
198 MBEDTLS_MPI_CHK(mbedtls_mpi_random(&X, 3, &P, mbedtls_psa_get_random,
Przemek Stekiel134cc2e2023-05-05 10:13:37 +0200199 MBEDTLS_PSA_RANDOM_STATE));
Przemek Stekiele1621a42023-05-05 09:53:37 +0200200 MBEDTLS_MPI_CHK(mbedtls_mpi_sub_int(&X, &X, 1));
201 MBEDTLS_MPI_CHK(mbedtls_mpi_write_binary(&X, key_buffer, key_buffer_size));
202 *key_buffer_length = key_buffer_size;
203
Przemek Stekiel359f4622022-12-05 14:11:55 +0100204cleanup:
205 mbedtls_mpi_free(&P); mbedtls_mpi_free(&X);
206 if (status == PSA_SUCCESS && ret != 0) {
207 return mbedtls_to_psa_error(ret);
208 }
209
210 return status;
211}
Przemek Stekiela59255f2023-05-11 11:03:54 +0200212
Przemek Stekiel33c91eb2023-05-30 15:16:35 +0200213psa_status_t mbedtls_psa_ffdh_import_key(
214 const psa_key_attributes_t *attributes,
215 const uint8_t *data, size_t data_length,
216 uint8_t *key_buffer, size_t key_buffer_size,
217 size_t *key_buffer_length, size_t *bits)
218{
219 (void) attributes;
220
221 if (key_buffer_size < data_length) {
222 return PSA_ERROR_BUFFER_TOO_SMALL;
223 }
224 memcpy(key_buffer, data, data_length);
225 *key_buffer_length = data_length;
226 *bits = PSA_BYTES_TO_BITS(data_length);
227
228 return PSA_SUCCESS;
229}
230
Przemek Stekiel6d85afa2023-04-28 11:42:17 +0200231#endif /* MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR ||
232 MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_PUBLIC_KEY */
Przemek Stekiel359f4622022-12-05 14:11:55 +0100233
Przemek Stekiela59255f2023-05-11 11:03:54 +0200234#if defined(MBEDTLS_PSA_BUILTIN_ALG_FFDH)
235psa_status_t mbedtls_psa_key_agreement_ffdh(
236 const psa_key_attributes_t *attributes,
237 const uint8_t *peer_key,
238 size_t peer_key_length,
239 const uint8_t *key_buffer,
240 size_t key_buffer_size,
241 uint8_t *shared_secret,
242 size_t shared_secret_size,
243 size_t *shared_secret_length)
244{
245 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
246 psa_status_t status = PSA_ERROR_CORRUPTION_DETECTED;
247 mbedtls_mpi P, G, X, GY, K;
248 const size_t calculated_shared_secret_size = peer_key_length;
249
250 if (peer_key_length != key_buffer_size ||
251 calculated_shared_secret_size > shared_secret_size) {
252 return PSA_ERROR_INVALID_ARGUMENT;
253 }
254
255 if (!PSA_KEY_TYPE_IS_DH_KEY_PAIR(psa_get_key_type(attributes))) {
256 return PSA_ERROR_INVALID_ARGUMENT;
257 }
258
259 mbedtls_mpi_init(&P); mbedtls_mpi_init(&G);
260 mbedtls_mpi_init(&X); mbedtls_mpi_init(&GY);
261 mbedtls_mpi_init(&K);
262
263 status = mbedtls_psa_ffdh_set_prime_generator(
264 PSA_BITS_TO_BYTES(attributes->core.bits), &P, &G);
265
266 if (status != PSA_SUCCESS) {
267 goto cleanup;
268 }
269
270 MBEDTLS_MPI_CHK(mbedtls_mpi_read_binary(&X, key_buffer,
271 key_buffer_size));
272
273 MBEDTLS_MPI_CHK(mbedtls_mpi_read_binary(&GY, peer_key,
274 peer_key_length));
275
276 /* Calculate shared secret public key: K = G^(XY) mod P = GY^X mod P */
277 MBEDTLS_MPI_CHK(mbedtls_mpi_exp_mod(&K, &GY, &X, &P, NULL));
278
279 MBEDTLS_MPI_CHK(mbedtls_mpi_write_binary(&K, shared_secret,
280 calculated_shared_secret_size));
281
282 *shared_secret_length = calculated_shared_secret_size;
283
284 ret = 0;
285
286cleanup:
287 mbedtls_mpi_free(&P); mbedtls_mpi_free(&G);
288 mbedtls_mpi_free(&X); mbedtls_mpi_free(&GY);
289 mbedtls_mpi_free(&K);
290
291 if (status == PSA_SUCCESS && ret != 0) {
292 status = mbedtls_to_psa_error(ret);
293 }
294
295 return status;
296}
297#endif /* MBEDTLS_PSA_BUILTIN_ALG_FFDH */
298
Przemek Stekiel359f4622022-12-05 14:11:55 +0100299#endif /* MBEDTLS_PSA_CRYPTO_C */