blob: d8c153a2157b8b6ad20e51dcc34823a363ab01c8 [file] [log] [blame]
Przemek Stekiel359f4622022-12-05 14:11:55 +01001/*
2 * PSA FFDH layer on top of Mbed TLS crypto
3 */
4/*
5 * Copyright The Mbed TLS Contributors
6 * SPDX-License-Identifier: Apache-2.0
7 *
8 * Licensed under the Apache License, Version 2.0 (the "License"); you may
9 * not use this file except in compliance with the License.
10 * You may obtain a copy of the License at
11 *
12 * http://www.apache.org/licenses/LICENSE-2.0
13 *
14 * Unless required by applicable law or agreed to in writing, software
15 * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
16 * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
17 * See the License for the specific language governing permissions and
18 * limitations under the License.
19 */
20
21#include "common.h"
22
23#if defined(MBEDTLS_PSA_CRYPTO_C)
24
25#include <psa/crypto.h>
26#include "psa_crypto_core.h"
27#include "psa_crypto_ffdh.h"
28#include "psa_crypto_random_impl.h"
29
30#if defined(MBEDTLS_PSA_BUILTIN_KEY_TYPE_FFDH_KEY_PAIR) || \
31 defined(MBEDTLS_PSA_BUILTIN_KEY_TYPE_FFDH_PUBLIC_KEY)
32static psa_status_t mbedtls_psa_ffdh_set_prime_generator(size_t key_size,
33 mbedtls_mpi *P,
34 mbedtls_mpi *G)
35{
36 const unsigned char *dhm_P = NULL;
37 const unsigned char *dhm_G = NULL;
38 size_t dhm_size_P = 0;
39 size_t dhm_size_G = 0;
40 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
41
42 if (P == NULL && G == NULL) {
43 return PSA_ERROR_INVALID_ARGUMENT;
44 }
45
46 static const unsigned char dhm_P_2048[] =
47 MBEDTLS_DHM_RFC7919_FFDHE2048_P_BIN;
48 static const unsigned char dhm_P_3072[] =
49 MBEDTLS_DHM_RFC7919_FFDHE3072_P_BIN;
50 static const unsigned char dhm_P_4096[] =
51 MBEDTLS_DHM_RFC7919_FFDHE4096_P_BIN;
52 static const unsigned char dhm_P_6144[] =
53 MBEDTLS_DHM_RFC7919_FFDHE6144_P_BIN;
54 static const unsigned char dhm_P_8192[] =
55 MBEDTLS_DHM_RFC7919_FFDHE8192_P_BIN;
56 static const unsigned char dhm_G_2048[] =
57 MBEDTLS_DHM_RFC7919_FFDHE2048_G_BIN;
58 static const unsigned char dhm_G_3072[] =
59 MBEDTLS_DHM_RFC7919_FFDHE3072_G_BIN;
60 static const unsigned char dhm_G_4096[] =
61 MBEDTLS_DHM_RFC7919_FFDHE4096_G_BIN;
62 static const unsigned char dhm_G_6144[] =
63 MBEDTLS_DHM_RFC7919_FFDHE6144_G_BIN;
64 static const unsigned char dhm_G_8192[] =
65 MBEDTLS_DHM_RFC7919_FFDHE8192_G_BIN;
66
67 if (key_size <= 256) {
68 dhm_P = dhm_P_2048;
69 dhm_G = dhm_G_2048;
70 dhm_size_P = sizeof(dhm_P_2048);
71 dhm_size_G = sizeof(dhm_G_2048);
72 } else if (key_size <= 384) {
73 dhm_P = dhm_P_3072;
74 dhm_G = dhm_G_3072;
75 dhm_size_P = sizeof(dhm_P_3072);
76 dhm_size_G = sizeof(dhm_G_3072);
77 } else if (key_size <= 512) {
78 dhm_P = dhm_P_4096;
79 dhm_G = dhm_G_4096;
80 dhm_size_P = sizeof(dhm_P_4096);
81 dhm_size_G = sizeof(dhm_G_4096);
82 } else if (key_size <= 768) {
83 dhm_P = dhm_P_6144;
84 dhm_G = dhm_G_6144;
85 dhm_size_P = sizeof(dhm_P_6144);
86 dhm_size_G = sizeof(dhm_G_6144);
87 } else if (key_size <= 1024) {
88 dhm_P = dhm_P_8192;
89 dhm_G = dhm_G_8192;
90 dhm_size_P = sizeof(dhm_P_8192);
91 dhm_size_G = sizeof(dhm_G_8192);
92 } else {
93 return PSA_ERROR_INVALID_ARGUMENT;
94 }
95
96 if (P != NULL) {
97 MBEDTLS_MPI_CHK(mbedtls_mpi_read_binary(P, dhm_P,
98 dhm_size_P));
99 }
100 if (G != NULL) {
101 MBEDTLS_MPI_CHK(mbedtls_mpi_read_binary(G, dhm_G,
102 dhm_size_G));
103 }
104
105cleanup:
106 if (ret != 0) {
107 return mbedtls_to_psa_error(ret);
108 }
109
110 return PSA_SUCCESS;
111}
112
113#if defined(MBEDTLS_PSA_BUILTIN_ALG_FFDH)
114psa_status_t mbedtls_psa_key_agreement_ffdh(
115 const psa_key_attributes_t *attributes,
116 const uint8_t *peer_key,
117 size_t peer_key_length,
118 const uint8_t *key_buffer,
119 size_t key_buffer_size,
120 uint8_t *shared_secret,
121 size_t shared_secret_size,
122 size_t *shared_secret_length)
123{
124 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
125 psa_status_t status = PSA_ERROR_CORRUPTION_DETECTED;
126 mbedtls_mpi P, G, X, GY, K;
127 const size_t calculated_shared_secret_size = peer_key_length;
128
129 if (peer_key_length != key_buffer_size ||
130 calculated_shared_secret_size > shared_secret_size) {
131 return PSA_ERROR_INVALID_ARGUMENT;
132 }
133
134 mbedtls_mpi_init(&P); mbedtls_mpi_init(&G);
135 mbedtls_mpi_init(&X); mbedtls_mpi_init(&GY);
136 mbedtls_mpi_init(&K);
137
138 status = mbedtls_psa_ffdh_set_prime_generator(
139 PSA_BITS_TO_BYTES(attributes->core.bits), &P, &G);
140
141 if (status == PSA_SUCCESS) {
142 MBEDTLS_MPI_CHK(mbedtls_mpi_read_binary(&X, key_buffer,
143 key_buffer_size));
144
145 MBEDTLS_MPI_CHK(mbedtls_mpi_read_binary(&GY, peer_key,
146 peer_key_length));
147
148 /* Calculate shared secret public key: K = G^(XY) mod P */
149 MBEDTLS_MPI_CHK(mbedtls_mpi_exp_mod(&K, &GY, &X, &P, NULL));
150
151 MBEDTLS_MPI_CHK(mbedtls_mpi_write_binary(&K, shared_secret,
152 calculated_shared_secret_size));
153
154 *shared_secret_length = calculated_shared_secret_size;
155 }
156cleanup:
157 mbedtls_mpi_free(&P); mbedtls_mpi_free(&G);
158 mbedtls_mpi_free(&X); mbedtls_mpi_free(&GY);
159 mbedtls_mpi_free(&K);
160
161 if (status == PSA_SUCCESS && ret != 0) {
162 return mbedtls_to_psa_error(ret);
163 }
164
165 return PSA_SUCCESS;
166}
167#endif /* MBEDTLS_PSA_BUILTIN_ALG_FFDH */
168
169psa_status_t mbedtls_psa_export_ffdh_public_key(
170 const psa_key_attributes_t *attributes,
171 const uint8_t *key_buffer,
172 size_t key_buffer_size,
173 uint8_t *data,
174 size_t data_size,
175 size_t *data_length)
176{
177 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
178 psa_status_t status = PSA_ERROR_CORRUPTION_DETECTED;
179 mbedtls_mpi GX, G, X, P;
180
181 mbedtls_mpi_init(&GX); mbedtls_mpi_init(&G);
182 mbedtls_mpi_init(&X); mbedtls_mpi_init(&P);
183
184 status = mbedtls_psa_ffdh_set_prime_generator(
185 PSA_BITS_TO_BYTES(attributes->core.bits), &P, &G);
186
187 if (status == PSA_SUCCESS) {
188 MBEDTLS_MPI_CHK(mbedtls_mpi_read_binary(&X, key_buffer,
189 key_buffer_size));
190
191 MBEDTLS_MPI_CHK(mbedtls_mpi_exp_mod(&GX, &G, &X, &P, NULL));
192 MBEDTLS_MPI_CHK(mbedtls_mpi_write_binary(&GX, data, data_size));
193
194 *data_length = mbedtls_mpi_size(&GX);
195 }
196cleanup:
197 mbedtls_mpi_free(&P); mbedtls_mpi_free(&G);
198 mbedtls_mpi_free(&X); mbedtls_mpi_free(&GX);
199
200 if (status == PSA_SUCCESS && ret != 0) {
201 return mbedtls_to_psa_error(ret);
202 }
203
204 return status;
205}
206
207psa_status_t mbedtls_psa_ffdh_generate_key(
208 const psa_key_attributes_t *attributes,
209 uint8_t *key_buffer, size_t key_buffer_size, size_t *key_buffer_length)
210{
211 mbedtls_mpi X, P;
212 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
213 psa_status_t status = PSA_ERROR_CORRUPTION_DETECTED;
214 mbedtls_mpi_init(&P); mbedtls_mpi_init(&X);
215
216 status = mbedtls_psa_ffdh_set_prime_generator(
217 PSA_BITS_TO_BYTES(attributes->core.bits), &P, NULL);
218
219 if (status == PSA_SUCCESS) {
220 MBEDTLS_MPI_CHK(mbedtls_mpi_random(&X, 4, &P, mbedtls_psa_get_random,
221 MBEDTLS_PSA_RANDOM_STATE));
222 MBEDTLS_MPI_CHK(mbedtls_mpi_sub_int(&X, &X, 2));
223
224 *key_buffer_length = mbedtls_mpi_size(&X);
225
226 MBEDTLS_MPI_CHK(mbedtls_mpi_write_binary(&X, key_buffer,
227 key_buffer_size));
228 }
229
230cleanup:
231 mbedtls_mpi_free(&P); mbedtls_mpi_free(&X);
232 if (status == PSA_SUCCESS && ret != 0) {
233 return mbedtls_to_psa_error(ret);
234 }
235
236 return status;
237}
238#endif /* MBEDTLS_PSA_BUILTIN_KEY_TYPE_FFDH_KEY_PAIR ||
239 MBEDTLS_PSA_BUILTIN_KEY_TYPE_FFDH_PUBLIC_KEY */
240
241#endif /* MBEDTLS_PSA_CRYPTO_C */