blob: c9c2e06bd10fea0934cb2e49aabb4ede17d44893 [file] [log] [blame]
Manuel Pégourié-Gonnard0bad5c22013-01-26 15:30:46 +01001/*
2 * Elliptic curve Diffie-Hellman
3 *
Bence Szépkúti1e148272020-08-07 13:07:28 +02004 * Copyright The Mbed TLS Contributors
Manuel Pégourié-Gonnard37ff1402015-09-04 14:21:07 +02005 * SPDX-License-Identifier: Apache-2.0
6 *
7 * Licensed under the Apache License, Version 2.0 (the "License"); you may
8 * not use this file except in compliance with the License.
9 * You may obtain a copy of the License at
10 *
11 * http://www.apache.org/licenses/LICENSE-2.0
12 *
13 * Unless required by applicable law or agreed to in writing, software
14 * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
15 * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
16 * See the License for the specific language governing permissions and
17 * limitations under the License.
Manuel Pégourié-Gonnard0bad5c22013-01-26 15:30:46 +010018 */
19
20/*
21 * References:
22 *
23 * SEC1 http://www.secg.org/index.php?action=secg,docs_secg
Manuel Pégourié-Gonnard63533e42013-02-10 14:21:04 +010024 * RFC 4492
Manuel Pégourié-Gonnard0bad5c22013-01-26 15:30:46 +010025 */
26
Gilles Peskinedb09ef62020-06-03 01:43:33 +020027#include "common.h"
Manuel Pégourié-Gonnard0bad5c22013-01-26 15:30:46 +010028
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020029#if defined(MBEDTLS_ECDH_C)
Manuel Pégourié-Gonnard0bad5c22013-01-26 15:30:46 +010030
Manuel Pégourié-Gonnard7f809972015-03-09 17:05:11 +000031#include "mbedtls/ecdh.h"
Hanno Becker91796d72018-12-17 18:10:51 +000032#include "mbedtls/platform_util.h"
Janos Follath24eed8d2019-11-22 13:21:35 +000033#include "mbedtls/error.h"
Jerry Yubdc71882021-09-14 19:30:36 +080034
Rich Evans00ab4702015-02-06 13:43:58 +000035#include <string.h>
36
Janos Follath5a3e1bf2018-08-13 15:54:22 +010037#if defined(MBEDTLS_ECDH_LEGACY_CONTEXT)
38typedef mbedtls_ecdh_context mbedtls_ecdh_context_mbed;
39#endif
40
Gilles Peskine30816292019-02-22 12:31:25 +010041static mbedtls_ecp_group_id mbedtls_ecdh_grp_id(
42 const mbedtls_ecdh_context *ctx )
43{
44#if defined(MBEDTLS_ECDH_LEGACY_CONTEXT)
45 return( ctx->grp.id );
46#else
47 return( ctx->grp_id );
48#endif
49}
50
Gilles Peskine20b3ef32019-02-11 18:41:27 +010051int mbedtls_ecdh_can_do( mbedtls_ecp_group_id gid )
52{
53 /* At this time, all groups support ECDH. */
54 (void) gid;
Christoph M. Wintersteigerc25df682019-04-16 12:54:56 +010055 return( 1 );
Gilles Peskine20b3ef32019-02-11 18:41:27 +010056}
57
Ron Eldora84c1cb2017-10-10 19:04:27 +030058#if !defined(MBEDTLS_ECDH_GEN_PUBLIC_ALT)
Manuel Pégourié-Gonnard6545ca72013-01-26 16:05:22 +010059/*
Manuel Pégourié-Gonnard66ba48a2017-04-27 11:38:26 +020060 * Generate public key (restartable version)
Manuel Pégourié-Gonnardc0edc962018-10-16 10:38:19 +020061 *
62 * Note: this internal function relies on its caller preserving the value of
Manuel Pégourié-Gonnardca29fdf2018-10-22 09:56:53 +020063 * the output parameter 'd' across continuation calls. This would not be
Manuel Pégourié-Gonnardc0edc962018-10-16 10:38:19 +020064 * acceptable for a public function but is OK here as we control call sites.
Manuel Pégourié-Gonnard66ba48a2017-04-27 11:38:26 +020065 */
66static int ecdh_gen_public_restartable( mbedtls_ecp_group *grp,
67 mbedtls_mpi *d, mbedtls_ecp_point *Q,
68 int (*f_rng)(void *, unsigned char *, size_t),
69 void *p_rng,
70 mbedtls_ecp_restart_ctx *rs_ctx )
71{
Janos Follath24eed8d2019-11-22 13:21:35 +000072 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
Manuel Pégourié-Gonnard66ba48a2017-04-27 11:38:26 +020073
David Horstmann91e20a02022-10-06 19:11:28 +010074 int restarting = 0;
Manuel Pégourié-Gonnard66ba48a2017-04-27 11:38:26 +020075#if defined(MBEDTLS_ECP_RESTARTABLE)
David Horstmann91e20a02022-10-06 19:11:28 +010076 restarting = ( rs_ctx != NULL && rs_ctx->rsm != NULL );
Manuel Pégourié-Gonnard66ba48a2017-04-27 11:38:26 +020077#endif
David Horstmann91e20a02022-10-06 19:11:28 +010078 /* If multiplication is in progress, we already generated a privkey */
79 if( !restarting )
Manuel Pégourié-Gonnard66ba48a2017-04-27 11:38:26 +020080 MBEDTLS_MPI_CHK( mbedtls_ecp_gen_privkey( grp, d, f_rng, p_rng ) );
81
82 MBEDTLS_MPI_CHK( mbedtls_ecp_mul_restartable( grp, Q, d, &grp->G,
83 f_rng, p_rng, rs_ctx ) );
84
85cleanup:
86 return( ret );
87}
88
89/*
90 * Generate public key
Manuel Pégourié-Gonnard6545ca72013-01-26 16:05:22 +010091 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020092int mbedtls_ecdh_gen_public( mbedtls_ecp_group *grp, mbedtls_mpi *d, mbedtls_ecp_point *Q,
Manuel Pégourié-Gonnard6545ca72013-01-26 16:05:22 +010093 int (*f_rng)(void *, unsigned char *, size_t),
94 void *p_rng )
95{
Manuel Pégourié-Gonnard66ba48a2017-04-27 11:38:26 +020096 return( ecdh_gen_public_restartable( grp, d, Q, f_rng, p_rng, NULL ) );
Manuel Pégourié-Gonnard6545ca72013-01-26 16:05:22 +010097}
Ron Eldor936d2842018-11-01 13:05:52 +020098#endif /* !MBEDTLS_ECDH_GEN_PUBLIC_ALT */
Manuel Pégourié-Gonnard6545ca72013-01-26 16:05:22 +010099
Ron Eldora84c1cb2017-10-10 19:04:27 +0300100#if !defined(MBEDTLS_ECDH_COMPUTE_SHARED_ALT)
Manuel Pégourié-Gonnard6545ca72013-01-26 16:05:22 +0100101/*
102 * Compute shared secret (SEC1 3.3.1)
103 */
Manuel Pégourié-Gonnard66ba48a2017-04-27 11:38:26 +0200104static int ecdh_compute_shared_restartable( mbedtls_ecp_group *grp,
105 mbedtls_mpi *z,
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200106 const mbedtls_ecp_point *Q, const mbedtls_mpi *d,
Manuel Pégourié-Gonnarde09d2f82013-09-02 14:29:09 +0200107 int (*f_rng)(void *, unsigned char *, size_t),
Manuel Pégourié-Gonnard66ba48a2017-04-27 11:38:26 +0200108 void *p_rng,
109 mbedtls_ecp_restart_ctx *rs_ctx )
Manuel Pégourié-Gonnard6545ca72013-01-26 16:05:22 +0100110{
Janos Follath24eed8d2019-11-22 13:21:35 +0000111 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200112 mbedtls_ecp_point P;
Manuel Pégourié-Gonnard6545ca72013-01-26 16:05:22 +0100113
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200114 mbedtls_ecp_point_init( &P );
Manuel Pégourié-Gonnard6545ca72013-01-26 16:05:22 +0100115
Manuel Pégourié-Gonnard66ba48a2017-04-27 11:38:26 +0200116 MBEDTLS_MPI_CHK( mbedtls_ecp_mul_restartable( grp, &P, d, Q,
117 f_rng, p_rng, rs_ctx ) );
Manuel Pégourié-Gonnard6545ca72013-01-26 16:05:22 +0100118
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200119 if( mbedtls_ecp_is_zero( &P ) )
Paul Bakkerb548d772013-07-26 14:21:34 +0200120 {
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200121 ret = MBEDTLS_ERR_ECP_BAD_INPUT_DATA;
Paul Bakkerb548d772013-07-26 14:21:34 +0200122 goto cleanup;
123 }
Manuel Pégourié-Gonnard6545ca72013-01-26 16:05:22 +0100124
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200125 MBEDTLS_MPI_CHK( mbedtls_mpi_copy( z, &P.X ) );
Manuel Pégourié-Gonnard6545ca72013-01-26 16:05:22 +0100126
127cleanup:
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200128 mbedtls_ecp_point_free( &P );
Manuel Pégourié-Gonnard6545ca72013-01-26 16:05:22 +0100129
130 return( ret );
131}
132
Manuel Pégourié-Gonnard63533e42013-02-10 14:21:04 +0100133/*
Manuel Pégourié-Gonnard66ba48a2017-04-27 11:38:26 +0200134 * Compute shared secret (SEC1 3.3.1)
135 */
136int mbedtls_ecdh_compute_shared( mbedtls_ecp_group *grp, mbedtls_mpi *z,
137 const mbedtls_ecp_point *Q, const mbedtls_mpi *d,
138 int (*f_rng)(void *, unsigned char *, size_t),
139 void *p_rng )
140{
141 return( ecdh_compute_shared_restartable( grp, z, Q, d,
142 f_rng, p_rng, NULL ) );
143}
Ron Eldor936d2842018-11-01 13:05:52 +0200144#endif /* !MBEDTLS_ECDH_COMPUTE_SHARED_ALT */
Manuel Pégourié-Gonnard66ba48a2017-04-27 11:38:26 +0200145
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100146static void ecdh_init_internal( mbedtls_ecdh_context_mbed *ctx )
Manuel Pégourié-Gonnard63533e42013-02-10 14:21:04 +0100147{
Manuel Pégourié-Gonnard5bd38b12017-08-23 16:55:59 +0200148 mbedtls_ecp_group_init( &ctx->grp );
149 mbedtls_mpi_init( &ctx->d );
150 mbedtls_ecp_point_init( &ctx->Q );
151 mbedtls_ecp_point_init( &ctx->Qp );
152 mbedtls_mpi_init( &ctx->z );
Manuel Pégourié-Gonnard66ba48a2017-04-27 11:38:26 +0200153
154#if defined(MBEDTLS_ECP_RESTARTABLE)
155 mbedtls_ecp_restart_init( &ctx->rs );
156#endif
Manuel Pégourié-Gonnard63533e42013-02-10 14:21:04 +0100157}
158
Manuel Pégourié-Gonnard63533e42013-02-10 14:21:04 +0100159/*
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100160 * Initialize context
Janos Follathf61e4862018-10-30 11:53:25 +0000161 */
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100162void mbedtls_ecdh_init( mbedtls_ecdh_context *ctx )
163{
164#if defined(MBEDTLS_ECDH_LEGACY_CONTEXT)
165 ecdh_init_internal( ctx );
166 mbedtls_ecp_point_init( &ctx->Vi );
167 mbedtls_ecp_point_init( &ctx->Vf );
168 mbedtls_mpi_init( &ctx->_d );
169#else
Christoph M. Wintersteigerd8c45d52019-02-20 17:16:53 +0000170 memset( ctx, 0, sizeof( mbedtls_ecdh_context ) );
171
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100172 ctx->var = MBEDTLS_ECDH_VARIANT_NONE;
173#endif
174 ctx->point_format = MBEDTLS_ECP_PF_UNCOMPRESSED;
175#if defined(MBEDTLS_ECP_RESTARTABLE)
176 ctx->restart_enabled = 0;
177#endif
178}
179
180static int ecdh_setup_internal( mbedtls_ecdh_context_mbed *ctx,
181 mbedtls_ecp_group_id grp_id )
Janos Follathf61e4862018-10-30 11:53:25 +0000182{
Janos Follath24eed8d2019-11-22 13:21:35 +0000183 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
Janos Follathf61e4862018-10-30 11:53:25 +0000184
185 ret = mbedtls_ecp_group_load( &ctx->grp, grp_id );
186 if( ret != 0 )
187 {
Janos Follathf61e4862018-10-30 11:53:25 +0000188 return( MBEDTLS_ERR_ECP_FEATURE_UNAVAILABLE );
189 }
190
191 return( 0 );
192}
193
194/*
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100195 * Setup context
Manuel Pégourié-Gonnard63533e42013-02-10 14:21:04 +0100196 */
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100197int mbedtls_ecdh_setup( mbedtls_ecdh_context *ctx, mbedtls_ecp_group_id grp_id )
Manuel Pégourié-Gonnard63533e42013-02-10 14:21:04 +0100198{
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100199#if defined(MBEDTLS_ECDH_LEGACY_CONTEXT)
200 return( ecdh_setup_internal( ctx, grp_id ) );
201#else
202 switch( grp_id )
203 {
Christoph M. Wintersteigerc9f737b2018-10-25 13:03:05 +0100204#if defined(MBEDTLS_ECDH_VARIANT_EVEREST_ENABLED)
Christoph M. Wintersteiger3ff60bc2019-02-15 12:59:59 +0000205 case MBEDTLS_ECP_DP_CURVE25519:
206 ctx->point_format = MBEDTLS_ECP_PF_COMPRESSED;
207 ctx->var = MBEDTLS_ECDH_VARIANT_EVEREST;
208 ctx->grp_id = grp_id;
209 return( mbedtls_everest_setup( &ctx->ctx.everest_ecdh, grp_id ) );
Christoph M. Wintersteiger78c9c462018-12-06 17:16:32 +0000210#endif
Christoph M. Wintersteiger3ff60bc2019-02-15 12:59:59 +0000211 default:
212 ctx->point_format = MBEDTLS_ECP_PF_UNCOMPRESSED;
213 ctx->var = MBEDTLS_ECDH_VARIANT_MBEDTLS_2_0;
214 ctx->grp_id = grp_id;
215 ecdh_init_internal( &ctx->ctx.mbed_ecdh );
216 return( ecdh_setup_internal( &ctx->ctx.mbed_ecdh, grp_id ) );
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100217 }
218#endif
219}
220
221static void ecdh_free_internal( mbedtls_ecdh_context_mbed *ctx )
222{
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200223 mbedtls_ecp_group_free( &ctx->grp );
Manuel Pégourié-Gonnard5bd38b12017-08-23 16:55:59 +0200224 mbedtls_mpi_free( &ctx->d );
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200225 mbedtls_ecp_point_free( &ctx->Q );
226 mbedtls_ecp_point_free( &ctx->Qp );
Manuel Pégourié-Gonnard5bd38b12017-08-23 16:55:59 +0200227 mbedtls_mpi_free( &ctx->z );
Manuel Pégourié-Gonnard66ba48a2017-04-27 11:38:26 +0200228
229#if defined(MBEDTLS_ECP_RESTARTABLE)
230 mbedtls_ecp_restart_free( &ctx->rs );
231#endif
Manuel Pégourié-Gonnard63533e42013-02-10 14:21:04 +0100232}
233
Manuel Pégourié-Gonnard23e41622017-05-18 12:35:37 +0200234#if defined(MBEDTLS_ECP_RESTARTABLE)
235/*
236 * Enable restartable operations for context
237 */
238void mbedtls_ecdh_enable_restart( mbedtls_ecdh_context *ctx )
239{
240 ctx->restart_enabled = 1;
241}
242#endif
243
Manuel Pégourié-Gonnard13724762013-02-10 15:01:54 +0100244/*
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100245 * Free context
Manuel Pégourié-Gonnard13724762013-02-10 15:01:54 +0100246 */
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100247void mbedtls_ecdh_free( mbedtls_ecdh_context *ctx )
248{
249 if( ctx == NULL )
250 return;
251
252#if defined(MBEDTLS_ECDH_LEGACY_CONTEXT)
253 mbedtls_ecp_point_free( &ctx->Vi );
254 mbedtls_ecp_point_free( &ctx->Vf );
255 mbedtls_mpi_free( &ctx->_d );
256 ecdh_free_internal( ctx );
257#else
258 switch( ctx->var )
259 {
Christoph M. Wintersteigerc9f737b2018-10-25 13:03:05 +0100260#if defined(MBEDTLS_ECDH_VARIANT_EVEREST_ENABLED)
261 case MBEDTLS_ECDH_VARIANT_EVEREST:
Christoph M. Wintersteiger4936beb2018-12-12 17:26:41 +0000262 mbedtls_everest_free( &ctx->ctx.everest_ecdh );
Christoph M. Wintersteigerc9f737b2018-10-25 13:03:05 +0100263 break;
264#endif
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100265 case MBEDTLS_ECDH_VARIANT_MBEDTLS_2_0:
266 ecdh_free_internal( &ctx->ctx.mbed_ecdh );
267 break;
268 default:
269 break;
270 }
271
272 ctx->point_format = MBEDTLS_ECP_PF_UNCOMPRESSED;
273 ctx->var = MBEDTLS_ECDH_VARIANT_NONE;
274 ctx->grp_id = MBEDTLS_ECP_DP_NONE;
275#endif
276}
277
278static int ecdh_make_params_internal( mbedtls_ecdh_context_mbed *ctx,
279 size_t *olen, int point_format,
280 unsigned char *buf, size_t blen,
281 int (*f_rng)(void *,
282 unsigned char *,
283 size_t),
284 void *p_rng,
285 int restart_enabled )
Manuel Pégourié-Gonnard13724762013-02-10 15:01:54 +0100286{
Janos Follath24eed8d2019-11-22 13:21:35 +0000287 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
Manuel Pégourié-Gonnard13724762013-02-10 15:01:54 +0100288 size_t grp_len, pt_len;
Ron Eldor2981d8f2018-11-05 18:07:10 +0200289#if defined(MBEDTLS_ECP_RESTARTABLE)
Manuel Pégourié-Gonnard66ba48a2017-04-27 11:38:26 +0200290 mbedtls_ecp_restart_ctx *rs_ctx = NULL;
Ron Eldor936d2842018-11-01 13:05:52 +0200291#endif
Manuel Pégourié-Gonnard13724762013-02-10 15:01:54 +0100292
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100293 if( ctx->grp.pbits == 0 )
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200294 return( MBEDTLS_ERR_ECP_BAD_INPUT_DATA );
Manuel Pégourié-Gonnardf35b7392013-02-11 22:12:39 +0100295
Ron Eldor19779c42018-11-05 16:58:13 +0200296#if defined(MBEDTLS_ECP_RESTARTABLE)
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100297 if( restart_enabled )
Manuel Pégourié-Gonnard23e41622017-05-18 12:35:37 +0200298 rs_ctx = &ctx->rs;
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100299#else
300 (void) restart_enabled;
Manuel Pégourié-Gonnard66ba48a2017-04-27 11:38:26 +0200301#endif
302
Ron Eldor8493f802018-11-01 11:32:15 +0200303
Ron Eldor2981d8f2018-11-05 18:07:10 +0200304#if defined(MBEDTLS_ECP_RESTARTABLE)
Manuel Pégourié-Gonnard66ba48a2017-04-27 11:38:26 +0200305 if( ( ret = ecdh_gen_public_restartable( &ctx->grp, &ctx->d, &ctx->Q,
Manuel Pégourié-Gonnardee68cff2018-10-15 15:27:49 +0200306 f_rng, p_rng, rs_ctx ) ) != 0 )
Manuel Pégourié-Gonnard13724762013-02-10 15:01:54 +0100307 return( ret );
Ron Eldor2981d8f2018-11-05 18:07:10 +0200308#else
309 if( ( ret = mbedtls_ecdh_gen_public( &ctx->grp, &ctx->d, &ctx->Q,
310 f_rng, p_rng ) ) != 0 )
311 return( ret );
312#endif /* MBEDTLS_ECP_RESTARTABLE */
Manuel Pégourié-Gonnard13724762013-02-10 15:01:54 +0100313
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100314 if( ( ret = mbedtls_ecp_tls_write_group( &ctx->grp, &grp_len, buf,
315 blen ) ) != 0 )
Manuel Pégourié-Gonnard13724762013-02-10 15:01:54 +0100316 return( ret );
317
318 buf += grp_len;
319 blen -= grp_len;
320
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100321 if( ( ret = mbedtls_ecp_tls_write_point( &ctx->grp, &ctx->Q, point_format,
Manuel Pégourié-Gonnardee68cff2018-10-15 15:27:49 +0200322 &pt_len, buf, blen ) ) != 0 )
Manuel Pégourié-Gonnard13724762013-02-10 15:01:54 +0100323 return( ret );
324
325 *olen = grp_len + pt_len;
Paul Bakkerd8bb8262014-06-17 14:06:49 +0200326 return( 0 );
Manuel Pégourié-Gonnard13724762013-02-10 15:01:54 +0100327}
328
Manuel Pégourié-Gonnard854fbd72013-02-11 20:28:55 +0100329/*
Christoph M. Wintersteigerc9f737b2018-10-25 13:03:05 +0100330 * Setup and write the ServerKeyExchange parameters (RFC 4492)
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100331 * struct {
332 * ECParameters curve_params;
333 * ECPoint public;
334 * } ServerECDHParams;
335 */
336int mbedtls_ecdh_make_params( mbedtls_ecdh_context *ctx, size_t *olen,
337 unsigned char *buf, size_t blen,
338 int (*f_rng)(void *, unsigned char *, size_t),
339 void *p_rng )
340{
341 int restart_enabled = 0;
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100342#if defined(MBEDTLS_ECP_RESTARTABLE)
343 restart_enabled = ctx->restart_enabled;
344#else
345 (void) restart_enabled;
346#endif
347
348#if defined(MBEDTLS_ECDH_LEGACY_CONTEXT)
349 return( ecdh_make_params_internal( ctx, olen, ctx->point_format, buf, blen,
350 f_rng, p_rng, restart_enabled ) );
351#else
352 switch( ctx->var )
353 {
Christoph M. Wintersteigerc9f737b2018-10-25 13:03:05 +0100354#if defined(MBEDTLS_ECDH_VARIANT_EVEREST_ENABLED)
355 case MBEDTLS_ECDH_VARIANT_EVEREST:
Christoph M. Wintersteiger4936beb2018-12-12 17:26:41 +0000356 return( mbedtls_everest_make_params( &ctx->ctx.everest_ecdh, olen,
357 buf, blen, f_rng, p_rng ) );
Christoph M. Wintersteigerc9f737b2018-10-25 13:03:05 +0100358#endif
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100359 case MBEDTLS_ECDH_VARIANT_MBEDTLS_2_0:
360 return( ecdh_make_params_internal( &ctx->ctx.mbed_ecdh, olen,
361 ctx->point_format, buf, blen,
362 f_rng, p_rng,
363 restart_enabled ) );
364 default:
365 return MBEDTLS_ERR_ECP_BAD_INPUT_DATA;
366 }
367#endif
368}
369
370static int ecdh_read_params_internal( mbedtls_ecdh_context_mbed *ctx,
371 const unsigned char **buf,
372 const unsigned char *end )
373{
374 return( mbedtls_ecp_tls_read_point( &ctx->grp, &ctx->Qp, buf,
375 end - *buf ) );
376}
377
378/*
bootstrap-prime6dbbf442022-05-17 19:30:44 -0400379 * Read the ServerKeyExchange parameters (RFC 4492)
Manuel Pégourié-Gonnard854fbd72013-02-11 20:28:55 +0100380 * struct {
381 * ECParameters curve_params;
382 * ECPoint public;
383 * } ServerECDHParams;
384 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200385int mbedtls_ecdh_read_params( mbedtls_ecdh_context *ctx,
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100386 const unsigned char **buf,
387 const unsigned char *end )
Manuel Pégourié-Gonnard854fbd72013-02-11 20:28:55 +0100388{
Janos Follath24eed8d2019-11-22 13:21:35 +0000389 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
Janos Follathf61e4862018-10-30 11:53:25 +0000390 mbedtls_ecp_group_id grp_id;
Janos Follathf61e4862018-10-30 11:53:25 +0000391 if( ( ret = mbedtls_ecp_tls_read_group_id( &grp_id, buf, end - *buf ) )
392 != 0 )
Manuel Pégourié-Gonnard854fbd72013-02-11 20:28:55 +0100393 return( ret );
394
Janos Follathf61e4862018-10-30 11:53:25 +0000395 if( ( ret = mbedtls_ecdh_setup( ctx, grp_id ) ) != 0 )
396 return( ret );
397
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100398#if defined(MBEDTLS_ECDH_LEGACY_CONTEXT)
399 return( ecdh_read_params_internal( ctx, buf, end ) );
400#else
401 switch( ctx->var )
402 {
Christoph M. Wintersteigerc9f737b2018-10-25 13:03:05 +0100403#if defined(MBEDTLS_ECDH_VARIANT_EVEREST_ENABLED)
404 case MBEDTLS_ECDH_VARIANT_EVEREST:
Christoph M. Wintersteiger4936beb2018-12-12 17:26:41 +0000405 return( mbedtls_everest_read_params( &ctx->ctx.everest_ecdh,
406 buf, end) );
Christoph M. Wintersteigerc9f737b2018-10-25 13:03:05 +0100407#endif
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100408 case MBEDTLS_ECDH_VARIANT_MBEDTLS_2_0:
409 return( ecdh_read_params_internal( &ctx->ctx.mbed_ecdh,
410 buf, end ) );
411 default:
412 return MBEDTLS_ERR_ECP_BAD_INPUT_DATA;
413 }
414#endif
Manuel Pégourié-Gonnard854fbd72013-02-11 20:28:55 +0100415}
Manuel Pégourié-Gonnard0bad5c22013-01-26 15:30:46 +0100416
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100417static int ecdh_get_params_internal( mbedtls_ecdh_context_mbed *ctx,
418 const mbedtls_ecp_keypair *key,
419 mbedtls_ecdh_side side )
Manuel Pégourié-Gonnardcdff3cf2013-12-12 09:55:52 +0100420{
Janos Follath24eed8d2019-11-22 13:21:35 +0000421 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
Manuel Pégourié-Gonnardcdff3cf2013-12-12 09:55:52 +0100422
Manuel Pégourié-Gonnardcdff3cf2013-12-12 09:55:52 +0100423 /* If it's not our key, just import the public part as Qp */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200424 if( side == MBEDTLS_ECDH_THEIRS )
425 return( mbedtls_ecp_copy( &ctx->Qp, &key->Q ) );
Manuel Pégourié-Gonnardcdff3cf2013-12-12 09:55:52 +0100426
427 /* Our key: import public (as Q) and private parts */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200428 if( side != MBEDTLS_ECDH_OURS )
429 return( MBEDTLS_ERR_ECP_BAD_INPUT_DATA );
Manuel Pégourié-Gonnardcdff3cf2013-12-12 09:55:52 +0100430
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200431 if( ( ret = mbedtls_ecp_copy( &ctx->Q, &key->Q ) ) != 0 ||
432 ( ret = mbedtls_mpi_copy( &ctx->d, &key->d ) ) != 0 )
Manuel Pégourié-Gonnardcdff3cf2013-12-12 09:55:52 +0100433 return( ret );
434
435 return( 0 );
436}
437
438/*
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100439 * Get parameters from a keypair
Manuel Pégourié-Gonnard5cceb412013-02-11 21:51:45 +0100440 */
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100441int mbedtls_ecdh_get_params( mbedtls_ecdh_context *ctx,
442 const mbedtls_ecp_keypair *key,
443 mbedtls_ecdh_side side )
444{
Janos Follath24eed8d2019-11-22 13:21:35 +0000445 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
Tuvshinzaya Erdenekhuuf69cac72022-07-27 14:43:38 +0100446 if( side != MBEDTLS_ECDH_OURS && side != MBEDTLS_ECDH_THEIRS )
447 return( MBEDTLS_ERR_ECP_BAD_INPUT_DATA );
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100448
Gilles Peskine30816292019-02-22 12:31:25 +0100449 if( mbedtls_ecdh_grp_id( ctx ) == MBEDTLS_ECP_DP_NONE )
Gilles Peskine0b1b71d2018-11-07 22:10:59 +0100450 {
451 /* This is the first call to get_params(). Set up the context
452 * for use with the group. */
453 if( ( ret = mbedtls_ecdh_setup( ctx, key->grp.id ) ) != 0 )
454 return( ret );
455 }
456 else
457 {
458 /* This is not the first call to get_params(). Check that the
459 * current key's group is the same as the context's, which was set
460 * from the first key's group. */
Gilles Peskine30816292019-02-22 12:31:25 +0100461 if( mbedtls_ecdh_grp_id( ctx ) != key->grp.id )
Gilles Peskine0b1b71d2018-11-07 22:10:59 +0100462 return( MBEDTLS_ERR_ECP_BAD_INPUT_DATA );
463 }
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100464
465#if defined(MBEDTLS_ECDH_LEGACY_CONTEXT)
466 return( ecdh_get_params_internal( ctx, key, side ) );
467#else
468 switch( ctx->var )
469 {
Christoph M. Wintersteigerc9f737b2018-10-25 13:03:05 +0100470#if defined(MBEDTLS_ECDH_VARIANT_EVEREST_ENABLED)
471 case MBEDTLS_ECDH_VARIANT_EVEREST:
Christoph M. Wintersteiger4936beb2018-12-12 17:26:41 +0000472 {
Christoph M. Wintersteiger2e724a12019-01-07 14:19:41 +0000473 mbedtls_everest_ecdh_side s = side == MBEDTLS_ECDH_OURS ?
Christoph M. Wintersteiger4936beb2018-12-12 17:26:41 +0000474 MBEDTLS_EVEREST_ECDH_OURS :
475 MBEDTLS_EVEREST_ECDH_THEIRS;
476 return( mbedtls_everest_get_params( &ctx->ctx.everest_ecdh,
477 key, s) );
478 }
Christoph M. Wintersteigerc9f737b2018-10-25 13:03:05 +0100479#endif
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100480 case MBEDTLS_ECDH_VARIANT_MBEDTLS_2_0:
481 return( ecdh_get_params_internal( &ctx->ctx.mbed_ecdh,
482 key, side ) );
483 default:
484 return MBEDTLS_ERR_ECP_BAD_INPUT_DATA;
485 }
486#endif
487}
488
489static int ecdh_make_public_internal( mbedtls_ecdh_context_mbed *ctx,
490 size_t *olen, int point_format,
491 unsigned char *buf, size_t blen,
492 int (*f_rng)(void *,
493 unsigned char *,
494 size_t),
495 void *p_rng,
496 int restart_enabled )
Manuel Pégourié-Gonnard5cceb412013-02-11 21:51:45 +0100497{
Janos Follath24eed8d2019-11-22 13:21:35 +0000498 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
Ron Eldor2981d8f2018-11-05 18:07:10 +0200499#if defined(MBEDTLS_ECP_RESTARTABLE)
Manuel Pégourié-Gonnard66ba48a2017-04-27 11:38:26 +0200500 mbedtls_ecp_restart_ctx *rs_ctx = NULL;
Ron Eldor936d2842018-11-01 13:05:52 +0200501#endif
Manuel Pégourié-Gonnard5cceb412013-02-11 21:51:45 +0100502
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100503 if( ctx->grp.pbits == 0 )
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200504 return( MBEDTLS_ERR_ECP_BAD_INPUT_DATA );
Manuel Pégourié-Gonnardf35b7392013-02-11 22:12:39 +0100505
Ron Eldorb430d9f2018-11-05 17:18:29 +0200506#if defined(MBEDTLS_ECP_RESTARTABLE)
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100507 if( restart_enabled )
Manuel Pégourié-Gonnard23e41622017-05-18 12:35:37 +0200508 rs_ctx = &ctx->rs;
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100509#else
510 (void) restart_enabled;
Manuel Pégourié-Gonnard66ba48a2017-04-27 11:38:26 +0200511#endif
512
Ron Eldor2981d8f2018-11-05 18:07:10 +0200513#if defined(MBEDTLS_ECP_RESTARTABLE)
Manuel Pégourié-Gonnard66ba48a2017-04-27 11:38:26 +0200514 if( ( ret = ecdh_gen_public_restartable( &ctx->grp, &ctx->d, &ctx->Q,
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100515 f_rng, p_rng, rs_ctx ) ) != 0 )
Manuel Pégourié-Gonnard5cceb412013-02-11 21:51:45 +0100516 return( ret );
Ron Eldor2981d8f2018-11-05 18:07:10 +0200517#else
518 if( ( ret = mbedtls_ecdh_gen_public( &ctx->grp, &ctx->d, &ctx->Q,
519 f_rng, p_rng ) ) != 0 )
520 return( ret );
521#endif /* MBEDTLS_ECP_RESTARTABLE */
Manuel Pégourié-Gonnard5cceb412013-02-11 21:51:45 +0100522
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100523 return mbedtls_ecp_tls_write_point( &ctx->grp, &ctx->Q, point_format, olen,
524 buf, blen );
Manuel Pégourié-Gonnard5cceb412013-02-11 21:51:45 +0100525}
526
527/*
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100528 * Setup and export the client public value
Manuel Pégourié-Gonnard5cceb412013-02-11 21:51:45 +0100529 */
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100530int mbedtls_ecdh_make_public( mbedtls_ecdh_context *ctx, size_t *olen,
531 unsigned char *buf, size_t blen,
532 int (*f_rng)(void *, unsigned char *, size_t),
533 void *p_rng )
Manuel Pégourié-Gonnard5cceb412013-02-11 21:51:45 +0100534{
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100535 int restart_enabled = 0;
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100536#if defined(MBEDTLS_ECP_RESTARTABLE)
537 restart_enabled = ctx->restart_enabled;
538#endif
539
540#if defined(MBEDTLS_ECDH_LEGACY_CONTEXT)
541 return( ecdh_make_public_internal( ctx, olen, ctx->point_format, buf, blen,
542 f_rng, p_rng, restart_enabled ) );
543#else
544 switch( ctx->var )
545 {
Christoph M. Wintersteigerc9f737b2018-10-25 13:03:05 +0100546#if defined(MBEDTLS_ECDH_VARIANT_EVEREST_ENABLED)
547 case MBEDTLS_ECDH_VARIANT_EVEREST:
Christoph M. Wintersteiger4936beb2018-12-12 17:26:41 +0000548 return( mbedtls_everest_make_public( &ctx->ctx.everest_ecdh, olen,
549 buf, blen, f_rng, p_rng ) );
Christoph M. Wintersteigerc9f737b2018-10-25 13:03:05 +0100550#endif
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100551 case MBEDTLS_ECDH_VARIANT_MBEDTLS_2_0:
552 return( ecdh_make_public_internal( &ctx->ctx.mbed_ecdh, olen,
553 ctx->point_format, buf, blen,
554 f_rng, p_rng,
555 restart_enabled ) );
556 default:
557 return MBEDTLS_ERR_ECP_BAD_INPUT_DATA;
558 }
559#endif
560}
561
562static int ecdh_read_public_internal( mbedtls_ecdh_context_mbed *ctx,
563 const unsigned char *buf, size_t blen )
564{
Janos Follath24eed8d2019-11-22 13:21:35 +0000565 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100566 const unsigned char *p = buf;
567
568 if( ( ret = mbedtls_ecp_tls_read_point( &ctx->grp, &ctx->Qp, &p,
569 blen ) ) != 0 )
Manuel Pégourié-Gonnard969ccc62014-03-26 19:53:25 +0100570 return( ret );
571
572 if( (size_t)( p - buf ) != blen )
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200573 return( MBEDTLS_ERR_ECP_BAD_INPUT_DATA );
Manuel Pégourié-Gonnard969ccc62014-03-26 19:53:25 +0100574
575 return( 0 );
Manuel Pégourié-Gonnard5cceb412013-02-11 21:51:45 +0100576}
577
Manuel Pégourié-Gonnard424fda52013-02-11 22:05:42 +0100578/*
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100579 * Parse and import the client's public value
Manuel Pégourié-Gonnard424fda52013-02-11 22:05:42 +0100580 */
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100581int mbedtls_ecdh_read_public( mbedtls_ecdh_context *ctx,
582 const unsigned char *buf, size_t blen )
583{
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100584#if defined(MBEDTLS_ECDH_LEGACY_CONTEXT)
585 return( ecdh_read_public_internal( ctx, buf, blen ) );
586#else
587 switch( ctx->var )
588 {
Christoph M. Wintersteigerc9f737b2018-10-25 13:03:05 +0100589#if defined(MBEDTLS_ECDH_VARIANT_EVEREST_ENABLED)
590 case MBEDTLS_ECDH_VARIANT_EVEREST:
Christoph M. Wintersteiger4936beb2018-12-12 17:26:41 +0000591 return( mbedtls_everest_read_public( &ctx->ctx.everest_ecdh,
592 buf, blen ) );
Christoph M. Wintersteigerc9f737b2018-10-25 13:03:05 +0100593#endif
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100594 case MBEDTLS_ECDH_VARIANT_MBEDTLS_2_0:
595 return( ecdh_read_public_internal( &ctx->ctx.mbed_ecdh,
596 buf, blen ) );
597 default:
598 return MBEDTLS_ERR_ECP_BAD_INPUT_DATA;
599 }
600#endif
601}
602
603static int ecdh_calc_secret_internal( mbedtls_ecdh_context_mbed *ctx,
604 size_t *olen, unsigned char *buf,
605 size_t blen,
606 int (*f_rng)(void *,
607 unsigned char *,
608 size_t),
609 void *p_rng,
610 int restart_enabled )
Manuel Pégourié-Gonnard424fda52013-02-11 22:05:42 +0100611{
Janos Follath24eed8d2019-11-22 13:21:35 +0000612 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
Ron Eldor2981d8f2018-11-05 18:07:10 +0200613#if defined(MBEDTLS_ECP_RESTARTABLE)
Manuel Pégourié-Gonnard66ba48a2017-04-27 11:38:26 +0200614 mbedtls_ecp_restart_ctx *rs_ctx = NULL;
Ron Eldor936d2842018-11-01 13:05:52 +0200615#endif
Manuel Pégourié-Gonnard424fda52013-02-11 22:05:42 +0100616
Manuel Pégourié-Gonnard66ba48a2017-04-27 11:38:26 +0200617 if( ctx == NULL || ctx->grp.pbits == 0 )
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200618 return( MBEDTLS_ERR_ECP_BAD_INPUT_DATA );
Manuel Pégourié-Gonnardf35b7392013-02-11 22:12:39 +0100619
Ron Eldorb430d9f2018-11-05 17:18:29 +0200620#if defined(MBEDTLS_ECP_RESTARTABLE)
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100621 if( restart_enabled )
Manuel Pégourié-Gonnard23e41622017-05-18 12:35:37 +0200622 rs_ctx = &ctx->rs;
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100623#else
624 (void) restart_enabled;
Manuel Pégourié-Gonnard66ba48a2017-04-27 11:38:26 +0200625#endif
626
Ron Eldor2981d8f2018-11-05 18:07:10 +0200627#if defined(MBEDTLS_ECP_RESTARTABLE)
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100628 if( ( ret = ecdh_compute_shared_restartable( &ctx->grp, &ctx->z, &ctx->Qp,
629 &ctx->d, f_rng, p_rng,
630 rs_ctx ) ) != 0 )
Manuel Pégourié-Gonnarde09d2f82013-09-02 14:29:09 +0200631 {
Manuel Pégourié-Gonnard424fda52013-02-11 22:05:42 +0100632 return( ret );
Manuel Pégourié-Gonnarde09d2f82013-09-02 14:29:09 +0200633 }
Ron Eldor2981d8f2018-11-05 18:07:10 +0200634#else
635 if( ( ret = mbedtls_ecdh_compute_shared( &ctx->grp, &ctx->z, &ctx->Qp,
636 &ctx->d, f_rng, p_rng ) ) != 0 )
637 {
638 return( ret );
639 }
640#endif /* MBEDTLS_ECP_RESTARTABLE */
Manuel Pégourié-Gonnard424fda52013-02-11 22:05:42 +0100641
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200642 if( mbedtls_mpi_size( &ctx->z ) > blen )
643 return( MBEDTLS_ERR_ECP_BAD_INPUT_DATA );
Paul Bakker41c83d32013-03-20 14:39:14 +0100644
Manuel Pégourié-Gonnard0a56c2c2014-01-17 21:24:04 +0100645 *olen = ctx->grp.pbits / 8 + ( ( ctx->grp.pbits % 8 ) != 0 );
Janos Follathab0f71a2019-02-20 10:48:49 +0000646
Janos Follath52ff8e92019-02-26 13:56:04 +0000647 if( mbedtls_ecp_get_type( &ctx->grp ) == MBEDTLS_ECP_TYPE_MONTGOMERY )
Janos Follathab0f71a2019-02-20 10:48:49 +0000648 return mbedtls_mpi_write_binary_le( &ctx->z, buf, *olen );
649
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200650 return mbedtls_mpi_write_binary( &ctx->z, buf, *olen );
Manuel Pégourié-Gonnard424fda52013-02-11 22:05:42 +0100651}
652
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100653/*
654 * Derive and export the shared secret
655 */
656int mbedtls_ecdh_calc_secret( mbedtls_ecdh_context *ctx, size_t *olen,
657 unsigned char *buf, size_t blen,
658 int (*f_rng)(void *, unsigned char *, size_t),
659 void *p_rng )
660{
661 int restart_enabled = 0;
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100662#if defined(MBEDTLS_ECP_RESTARTABLE)
663 restart_enabled = ctx->restart_enabled;
664#endif
665
666#if defined(MBEDTLS_ECDH_LEGACY_CONTEXT)
667 return( ecdh_calc_secret_internal( ctx, olen, buf, blen, f_rng, p_rng,
668 restart_enabled ) );
669#else
670 switch( ctx->var )
671 {
Christoph M. Wintersteigerc9f737b2018-10-25 13:03:05 +0100672#if defined(MBEDTLS_ECDH_VARIANT_EVEREST_ENABLED)
673 case MBEDTLS_ECDH_VARIANT_EVEREST:
Christoph M. Wintersteiger4936beb2018-12-12 17:26:41 +0000674 return( mbedtls_everest_calc_secret( &ctx->ctx.everest_ecdh, olen,
675 buf, blen, f_rng, p_rng ) );
Christoph M. Wintersteigerc9f737b2018-10-25 13:03:05 +0100676#endif
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100677 case MBEDTLS_ECDH_VARIANT_MBEDTLS_2_0:
678 return( ecdh_calc_secret_internal( &ctx->ctx.mbed_ecdh, olen, buf,
679 blen, f_rng, p_rng,
680 restart_enabled ) );
681 default:
682 return( MBEDTLS_ERR_ECP_BAD_INPUT_DATA );
683 }
684#endif
685}
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200686#endif /* MBEDTLS_ECDH_C */