blob: 6cc086ef60822963437d2e8e8585a541cd09a254 [file] [log] [blame]
Przemek Stekiel359f4622022-12-05 14:11:55 +01001/*
2 * PSA FFDH layer on top of Mbed TLS crypto
3 */
4/*
5 * Copyright The Mbed TLS Contributors
Dave Rodgman16799db2023-11-02 19:47:20 +00006 * SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later
Przemek Stekiel359f4622022-12-05 14:11:55 +01007 */
8
9#include "common.h"
10
11#if defined(MBEDTLS_PSA_CRYPTO_C)
12
13#include <psa/crypto.h>
14#include "psa_crypto_core.h"
15#include "psa_crypto_ffdh.h"
16#include "psa_crypto_random_impl.h"
Przemek Stekiela59255f2023-05-11 11:03:54 +020017#include "mbedtls/platform.h"
Manuel Pégourié-Gonnardd55d66f2023-06-20 10:14:58 +020018#include "mbedtls/error.h"
Przemek Stekiel359f4622022-12-05 14:11:55 +010019
Valerio Settia55f0422023-07-10 15:34:41 +020020#if defined(MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_EXPORT) || \
21 defined(MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_GENERATE) || \
Przemek Stekiela59255f2023-05-11 11:03:54 +020022 defined(MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_PUBLIC_KEY) || \
23 defined(MBEDTLS_PSA_BUILTIN_ALG_FFDH)
Przemek Stekiel359f4622022-12-05 14:11:55 +010024static psa_status_t mbedtls_psa_ffdh_set_prime_generator(size_t key_size,
25 mbedtls_mpi *P,
26 mbedtls_mpi *G)
27{
28 const unsigned char *dhm_P = NULL;
29 const unsigned char *dhm_G = NULL;
30 size_t dhm_size_P = 0;
31 size_t dhm_size_G = 0;
32 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
33
34 if (P == NULL && G == NULL) {
35 return PSA_ERROR_INVALID_ARGUMENT;
36 }
37
Valerio Setti4ed8daa2024-01-17 12:16:14 +010038#if defined(MBEDTLS_PSA_BUILTIN_DH_RFC7919_2048)
Przemek Stekiel359f4622022-12-05 14:11:55 +010039 static const unsigned char dhm_P_2048[] =
40 MBEDTLS_DHM_RFC7919_FFDHE2048_P_BIN;
Przemek Stekiel359f4622022-12-05 14:11:55 +010041 static const unsigned char dhm_G_2048[] =
42 MBEDTLS_DHM_RFC7919_FFDHE2048_G_BIN;
Valerio Setti4ed8daa2024-01-17 12:16:14 +010043#endif /* MBEDTLS_PSA_BUILTIN_DH_RFC7919_2048 */
44#if defined(MBEDTLS_PSA_BUILTIN_DH_RFC7919_3072)
45 static const unsigned char dhm_P_3072[] =
46 MBEDTLS_DHM_RFC7919_FFDHE3072_P_BIN;
Przemek Stekiel359f4622022-12-05 14:11:55 +010047 static const unsigned char dhm_G_3072[] =
48 MBEDTLS_DHM_RFC7919_FFDHE3072_G_BIN;
Valerio Setti4ed8daa2024-01-17 12:16:14 +010049#endif /* MBEDTLS_PSA_BUILTIN_DH_RFC7919_3072 */
50#if defined(MBEDTLS_PSA_BUILTIN_DH_RFC7919_4096)
51 static const unsigned char dhm_P_4096[] =
52 MBEDTLS_DHM_RFC7919_FFDHE4096_P_BIN;
Przemek Stekiel359f4622022-12-05 14:11:55 +010053 static const unsigned char dhm_G_4096[] =
54 MBEDTLS_DHM_RFC7919_FFDHE4096_G_BIN;
Valerio Setti4ed8daa2024-01-17 12:16:14 +010055#endif /* MBEDTLS_PSA_BUILTIN_DH_RFC7919_4096 */
56#if defined(MBEDTLS_PSA_BUILTIN_DH_RFC7919_6144)
57 static const unsigned char dhm_P_6144[] =
58 MBEDTLS_DHM_RFC7919_FFDHE6144_P_BIN;
Przemek Stekiel359f4622022-12-05 14:11:55 +010059 static const unsigned char dhm_G_6144[] =
60 MBEDTLS_DHM_RFC7919_FFDHE6144_G_BIN;
Valerio Setti4ed8daa2024-01-17 12:16:14 +010061#endif /* MBEDTLS_PSA_BUILTIN_DH_RFC7919_6144 */
62#if defined(MBEDTLS_PSA_BUILTIN_DH_RFC7919_8192)
63 static const unsigned char dhm_P_8192[] =
64 MBEDTLS_DHM_RFC7919_FFDHE8192_P_BIN;
Przemek Stekiel359f4622022-12-05 14:11:55 +010065 static const unsigned char dhm_G_8192[] =
66 MBEDTLS_DHM_RFC7919_FFDHE8192_G_BIN;
Valerio Setti4ed8daa2024-01-17 12:16:14 +010067#endif /* MBEDTLS_PSA_BUILTIN_DH_RFC7919_8192 */
Przemek Stekiel359f4622022-12-05 14:11:55 +010068
Przemek Stekiel134cc2e2023-05-05 10:13:37 +020069 switch (key_size) {
Valerio Setti4ed8daa2024-01-17 12:16:14 +010070#if defined(MBEDTLS_PSA_BUILTIN_DH_RFC7919_2048)
Przemek Stekiel75095cc2023-04-28 14:20:27 +020071 case sizeof(dhm_P_2048):
72 dhm_P = dhm_P_2048;
73 dhm_G = dhm_G_2048;
74 dhm_size_P = sizeof(dhm_P_2048);
75 dhm_size_G = sizeof(dhm_G_2048);
76 break;
Valerio Setti4ed8daa2024-01-17 12:16:14 +010077#endif /* MBEDTLS_PSA_BUILTIN_DH_RFC7919_2048 */
78#if defined(MBEDTLS_PSA_BUILTIN_DH_RFC7919_3072)
Przemek Stekiel75095cc2023-04-28 14:20:27 +020079 case sizeof(dhm_P_3072):
80 dhm_P = dhm_P_3072;
81 dhm_G = dhm_G_3072;
82 dhm_size_P = sizeof(dhm_P_3072);
83 dhm_size_G = sizeof(dhm_G_3072);
84 break;
Valerio Setti4ed8daa2024-01-17 12:16:14 +010085#endif /* MBEDTLS_PSA_BUILTIN_DH_RFC7919_3072 */
86#if defined(MBEDTLS_PSA_BUILTIN_DH_RFC7919_4096)
Przemek Stekiel75095cc2023-04-28 14:20:27 +020087 case sizeof(dhm_P_4096):
88 dhm_P = dhm_P_4096;
89 dhm_G = dhm_G_4096;
90 dhm_size_P = sizeof(dhm_P_4096);
91 dhm_size_G = sizeof(dhm_G_4096);
92 break;
Valerio Setti4ed8daa2024-01-17 12:16:14 +010093#endif /* MBEDTLS_PSA_BUILTIN_DH_RFC7919_4096 */
94#if defined(MBEDTLS_PSA_BUILTIN_DH_RFC7919_6144)
Przemek Stekiel75095cc2023-04-28 14:20:27 +020095 case sizeof(dhm_P_6144):
96 dhm_P = dhm_P_6144;
97 dhm_G = dhm_G_6144;
98 dhm_size_P = sizeof(dhm_P_6144);
99 dhm_size_G = sizeof(dhm_G_6144);
100 break;
Valerio Setti4ed8daa2024-01-17 12:16:14 +0100101#endif /* MBEDTLS_PSA_BUILTIN_DH_RFC7919_6144 */
102#if defined(MBEDTLS_PSA_BUILTIN_DH_RFC7919_8192)
Przemek Stekiel75095cc2023-04-28 14:20:27 +0200103 case sizeof(dhm_P_8192):
104 dhm_P = dhm_P_8192;
105 dhm_G = dhm_G_8192;
106 dhm_size_P = sizeof(dhm_P_8192);
107 dhm_size_G = sizeof(dhm_G_8192);
108 break;
Valerio Setti4ed8daa2024-01-17 12:16:14 +0100109#endif /* MBEDTLS_PSA_BUILTIN_DH_RFC7919_8192 */
Przemek Stekiel75095cc2023-04-28 14:20:27 +0200110 default:
111 return PSA_ERROR_INVALID_ARGUMENT;
Przemek Stekiel359f4622022-12-05 14:11:55 +0100112 }
113
114 if (P != NULL) {
115 MBEDTLS_MPI_CHK(mbedtls_mpi_read_binary(P, dhm_P,
116 dhm_size_P));
117 }
118 if (G != NULL) {
119 MBEDTLS_MPI_CHK(mbedtls_mpi_read_binary(G, dhm_G,
120 dhm_size_G));
121 }
122
123cleanup:
124 if (ret != 0) {
125 return mbedtls_to_psa_error(ret);
126 }
127
128 return PSA_SUCCESS;
129}
Valerio Settia55f0422023-07-10 15:34:41 +0200130#endif /* MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_EXPORT ||
131 MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_GENERATE ||
Przemek Stekiela59255f2023-05-11 11:03:54 +0200132 MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_PUBLIC_KEY ||
133 MBEDTLS_PSA_BUILTIN_ALG_FFDH */
Przemek Stekiel359f4622022-12-05 14:11:55 +0100134
Valerio Settia55f0422023-07-10 15:34:41 +0200135#if defined(MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_EXPORT) || \
Przemek Stekiela59255f2023-05-11 11:03:54 +0200136 defined(MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_PUBLIC_KEY)
Przemek Stekiel152bb462023-06-01 11:52:39 +0200137psa_status_t mbedtls_psa_ffdh_export_public_key(
Przemek Stekiel359f4622022-12-05 14:11:55 +0100138 const psa_key_attributes_t *attributes,
139 const uint8_t *key_buffer,
140 size_t key_buffer_size,
141 uint8_t *data,
142 size_t data_size,
143 size_t *data_length)
144{
145 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
146 psa_status_t status = PSA_ERROR_CORRUPTION_DETECTED;
147 mbedtls_mpi GX, G, X, P;
Przemek Stekiel33c91eb2023-05-30 15:16:35 +0200148 psa_key_type_t type = attributes->core.type;
149
150 if (PSA_KEY_TYPE_IS_PUBLIC_KEY(type)) {
151 if (key_buffer_size > data_size) {
152 return PSA_ERROR_BUFFER_TOO_SMALL;
153 }
154 memcpy(data, key_buffer, key_buffer_size);
155 memset(data + key_buffer_size, 0,
156 data_size - key_buffer_size);
157 *data_length = key_buffer_size;
158 return PSA_SUCCESS;
159 }
Przemek Stekiel359f4622022-12-05 14:11:55 +0100160
161 mbedtls_mpi_init(&GX); mbedtls_mpi_init(&G);
162 mbedtls_mpi_init(&X); mbedtls_mpi_init(&P);
163
Przemek Stekiela4700fa2023-06-02 15:26:20 +0200164 size_t key_len = PSA_BITS_TO_BYTES(attributes->core.bits);
165
166 status = mbedtls_psa_ffdh_set_prime_generator(key_len, &P, &G);
Przemek Stekiel359f4622022-12-05 14:11:55 +0100167
Przemek Stekiel134cc2e2023-05-05 10:13:37 +0200168 if (status != PSA_SUCCESS) {
Przemek Stekiel6fd72b62023-04-27 10:20:56 +0200169 goto cleanup;
Przemek Stekiel359f4622022-12-05 14:11:55 +0100170 }
Przemek Stekiel6fd72b62023-04-27 10:20:56 +0200171
172 MBEDTLS_MPI_CHK(mbedtls_mpi_read_binary(&X, key_buffer,
173 key_buffer_size));
174
175 MBEDTLS_MPI_CHK(mbedtls_mpi_exp_mod(&GX, &G, &X, &P, NULL));
Przemek Stekiela4700fa2023-06-02 15:26:20 +0200176 MBEDTLS_MPI_CHK(mbedtls_mpi_write_binary(&GX, data, key_len));
Przemek Stekiel6fd72b62023-04-27 10:20:56 +0200177
Przemek Stekiela4700fa2023-06-02 15:26:20 +0200178 *data_length = key_len;
Przemek Stekiel6fd72b62023-04-27 10:20:56 +0200179
180 ret = 0;
Przemek Stekiel359f4622022-12-05 14:11:55 +0100181cleanup:
182 mbedtls_mpi_free(&P); mbedtls_mpi_free(&G);
183 mbedtls_mpi_free(&X); mbedtls_mpi_free(&GX);
184
185 if (status == PSA_SUCCESS && ret != 0) {
Przemek Stekiel6fd72b62023-04-27 10:20:56 +0200186 status = mbedtls_to_psa_error(ret);
Przemek Stekiel359f4622022-12-05 14:11:55 +0100187 }
188
189 return status;
190}
Valerio Settia55f0422023-07-10 15:34:41 +0200191#endif /* MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_EXPORT ||
192 MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_PUBLIC_KEY */
Przemek Stekiel359f4622022-12-05 14:11:55 +0100193
Valerio Settia55f0422023-07-10 15:34:41 +0200194#if defined(MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_GENERATE)
Przemek Stekiel359f4622022-12-05 14:11:55 +0100195psa_status_t mbedtls_psa_ffdh_generate_key(
196 const psa_key_attributes_t *attributes,
197 uint8_t *key_buffer, size_t key_buffer_size, size_t *key_buffer_length)
198{
199 mbedtls_mpi X, P;
200 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
201 psa_status_t status = PSA_ERROR_CORRUPTION_DETECTED;
202 mbedtls_mpi_init(&P); mbedtls_mpi_init(&X);
Przemek Stekiele1621a42023-05-05 09:53:37 +0200203 (void) attributes;
Przemek Stekiel359f4622022-12-05 14:11:55 +0100204
Przemek Stekiele1621a42023-05-05 09:53:37 +0200205 status = mbedtls_psa_ffdh_set_prime_generator(key_buffer_size, &P, NULL);
Przemek Stekiel359f4622022-12-05 14:11:55 +0100206
Przemek Stekiele1621a42023-05-05 09:53:37 +0200207 if (status != PSA_SUCCESS) {
208 goto cleanup;
Przemek Stekiel359f4622022-12-05 14:11:55 +0100209 }
210
Przemek Stekiele1621a42023-05-05 09:53:37 +0200211 /* RFC7919: Traditional finite field Diffie-Hellman has each peer choose their
212 secret exponent from the range [2, P-2].
213 Select random value in range [3, P-1] and decrease it by 1. */
214 MBEDTLS_MPI_CHK(mbedtls_mpi_random(&X, 3, &P, mbedtls_psa_get_random,
Przemek Stekiel134cc2e2023-05-05 10:13:37 +0200215 MBEDTLS_PSA_RANDOM_STATE));
Przemek Stekiele1621a42023-05-05 09:53:37 +0200216 MBEDTLS_MPI_CHK(mbedtls_mpi_sub_int(&X, &X, 1));
217 MBEDTLS_MPI_CHK(mbedtls_mpi_write_binary(&X, key_buffer, key_buffer_size));
218 *key_buffer_length = key_buffer_size;
219
Przemek Stekiel359f4622022-12-05 14:11:55 +0100220cleanup:
221 mbedtls_mpi_free(&P); mbedtls_mpi_free(&X);
222 if (status == PSA_SUCCESS && ret != 0) {
223 return mbedtls_to_psa_error(ret);
224 }
225
226 return status;
227}
Valerio Settia55f0422023-07-10 15:34:41 +0200228#endif /* MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_GENERATE */
Przemek Stekiela59255f2023-05-11 11:03:54 +0200229
Valerio Settia55f0422023-07-10 15:34:41 +0200230#if defined(MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_IMPORT)
Przemek Stekiel33c91eb2023-05-30 15:16:35 +0200231psa_status_t mbedtls_psa_ffdh_import_key(
232 const psa_key_attributes_t *attributes,
233 const uint8_t *data, size_t data_length,
234 uint8_t *key_buffer, size_t key_buffer_size,
235 size_t *key_buffer_length, size_t *bits)
236{
237 (void) attributes;
238
239 if (key_buffer_size < data_length) {
240 return PSA_ERROR_BUFFER_TOO_SMALL;
241 }
242 memcpy(key_buffer, data, data_length);
243 *key_buffer_length = data_length;
244 *bits = PSA_BYTES_TO_BITS(data_length);
245
246 return PSA_SUCCESS;
247}
Valerio Settia55f0422023-07-10 15:34:41 +0200248#endif /* MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_IMPORT */
Przemek Stekiel359f4622022-12-05 14:11:55 +0100249
Przemek Stekiela59255f2023-05-11 11:03:54 +0200250#if defined(MBEDTLS_PSA_BUILTIN_ALG_FFDH)
Przemek Stekiel152bb462023-06-01 11:52:39 +0200251psa_status_t mbedtls_psa_ffdh_key_agreement(
Przemek Stekiela59255f2023-05-11 11:03:54 +0200252 const psa_key_attributes_t *attributes,
253 const uint8_t *peer_key,
254 size_t peer_key_length,
255 const uint8_t *key_buffer,
256 size_t key_buffer_size,
257 uint8_t *shared_secret,
258 size_t shared_secret_size,
259 size_t *shared_secret_length)
260{
261 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
262 psa_status_t status = PSA_ERROR_CORRUPTION_DETECTED;
263 mbedtls_mpi P, G, X, GY, K;
264 const size_t calculated_shared_secret_size = peer_key_length;
265
266 if (peer_key_length != key_buffer_size ||
267 calculated_shared_secret_size > shared_secret_size) {
268 return PSA_ERROR_INVALID_ARGUMENT;
269 }
270
271 if (!PSA_KEY_TYPE_IS_DH_KEY_PAIR(psa_get_key_type(attributes))) {
272 return PSA_ERROR_INVALID_ARGUMENT;
273 }
274
275 mbedtls_mpi_init(&P); mbedtls_mpi_init(&G);
276 mbedtls_mpi_init(&X); mbedtls_mpi_init(&GY);
277 mbedtls_mpi_init(&K);
278
279 status = mbedtls_psa_ffdh_set_prime_generator(
280 PSA_BITS_TO_BYTES(attributes->core.bits), &P, &G);
281
282 if (status != PSA_SUCCESS) {
283 goto cleanup;
284 }
285
286 MBEDTLS_MPI_CHK(mbedtls_mpi_read_binary(&X, key_buffer,
287 key_buffer_size));
288
289 MBEDTLS_MPI_CHK(mbedtls_mpi_read_binary(&GY, peer_key,
290 peer_key_length));
291
292 /* Calculate shared secret public key: K = G^(XY) mod P = GY^X mod P */
293 MBEDTLS_MPI_CHK(mbedtls_mpi_exp_mod(&K, &GY, &X, &P, NULL));
294
295 MBEDTLS_MPI_CHK(mbedtls_mpi_write_binary(&K, shared_secret,
296 calculated_shared_secret_size));
297
298 *shared_secret_length = calculated_shared_secret_size;
299
300 ret = 0;
301
302cleanup:
303 mbedtls_mpi_free(&P); mbedtls_mpi_free(&G);
304 mbedtls_mpi_free(&X); mbedtls_mpi_free(&GY);
305 mbedtls_mpi_free(&K);
306
307 if (status == PSA_SUCCESS && ret != 0) {
308 status = mbedtls_to_psa_error(ret);
309 }
310
311 return status;
312}
313#endif /* MBEDTLS_PSA_BUILTIN_ALG_FFDH */
314
Przemek Stekiel359f4622022-12-05 14:11:55 +0100315#endif /* MBEDTLS_PSA_CRYPTO_C */