blob: 35ab1b70449adc0889d0fcfccab1a904cb4171fe [file] [log] [blame]
Manuel Pégourié-Gonnard0bad5c22013-01-26 15:30:46 +01001/*
2 * Elliptic curve Diffie-Hellman
3 *
Bence Szépkúti1e148272020-08-07 13:07:28 +02004 * Copyright The Mbed TLS Contributors
Manuel Pégourié-Gonnard37ff1402015-09-04 14:21:07 +02005 * SPDX-License-Identifier: Apache-2.0
6 *
7 * Licensed under the Apache License, Version 2.0 (the "License"); you may
8 * not use this file except in compliance with the License.
9 * You may obtain a copy of the License at
10 *
11 * http://www.apache.org/licenses/LICENSE-2.0
12 *
13 * Unless required by applicable law or agreed to in writing, software
14 * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
15 * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
16 * See the License for the specific language governing permissions and
17 * limitations under the License.
Manuel Pégourié-Gonnard0bad5c22013-01-26 15:30:46 +010018 */
19
20/*
21 * References:
22 *
23 * SEC1 http://www.secg.org/index.php?action=secg,docs_secg
Manuel Pégourié-Gonnard63533e42013-02-10 14:21:04 +010024 * RFC 4492
Manuel Pégourié-Gonnard0bad5c22013-01-26 15:30:46 +010025 */
26
Gilles Peskinedb09ef62020-06-03 01:43:33 +020027#include "common.h"
Manuel Pégourié-Gonnard0bad5c22013-01-26 15:30:46 +010028
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020029#if defined(MBEDTLS_ECDH_C)
Manuel Pégourié-Gonnard0bad5c22013-01-26 15:30:46 +010030
Manuel Pégourié-Gonnard7f809972015-03-09 17:05:11 +000031#include "mbedtls/ecdh.h"
Hanno Becker91796d72018-12-17 18:10:51 +000032#include "mbedtls/platform_util.h"
Janos Follath24eed8d2019-11-22 13:21:35 +000033#include "mbedtls/error.h"
Jerry Yubdc71882021-09-14 19:30:36 +080034
Rich Evans00ab4702015-02-06 13:43:58 +000035#include <string.h>
36
Janos Follath5a3e1bf2018-08-13 15:54:22 +010037#if defined(MBEDTLS_ECDH_LEGACY_CONTEXT)
38typedef mbedtls_ecdh_context mbedtls_ecdh_context_mbed;
39#endif
40
Gilles Peskine30816292019-02-22 12:31:25 +010041static mbedtls_ecp_group_id mbedtls_ecdh_grp_id(
42 const mbedtls_ecdh_context *ctx )
43{
44#if defined(MBEDTLS_ECDH_LEGACY_CONTEXT)
45 return( ctx->grp.id );
46#else
47 return( ctx->grp_id );
48#endif
49}
50
Gilles Peskine20b3ef32019-02-11 18:41:27 +010051int mbedtls_ecdh_can_do( mbedtls_ecp_group_id gid )
52{
53 /* At this time, all groups support ECDH. */
54 (void) gid;
Christoph M. Wintersteigerc25df682019-04-16 12:54:56 +010055 return( 1 );
Gilles Peskine20b3ef32019-02-11 18:41:27 +010056}
57
Ron Eldora84c1cb2017-10-10 19:04:27 +030058#if !defined(MBEDTLS_ECDH_GEN_PUBLIC_ALT)
Manuel Pégourié-Gonnard6545ca72013-01-26 16:05:22 +010059/*
Manuel Pégourié-Gonnard66ba48a2017-04-27 11:38:26 +020060 * Generate public key (restartable version)
Manuel Pégourié-Gonnardc0edc962018-10-16 10:38:19 +020061 *
62 * Note: this internal function relies on its caller preserving the value of
Manuel Pégourié-Gonnardca29fdf2018-10-22 09:56:53 +020063 * the output parameter 'd' across continuation calls. This would not be
Manuel Pégourié-Gonnardc0edc962018-10-16 10:38:19 +020064 * acceptable for a public function but is OK here as we control call sites.
Manuel Pégourié-Gonnard66ba48a2017-04-27 11:38:26 +020065 */
66static int ecdh_gen_public_restartable( mbedtls_ecp_group *grp,
67 mbedtls_mpi *d, mbedtls_ecp_point *Q,
68 int (*f_rng)(void *, unsigned char *, size_t),
69 void *p_rng,
70 mbedtls_ecp_restart_ctx *rs_ctx )
71{
Janos Follath24eed8d2019-11-22 13:21:35 +000072 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
Manuel Pégourié-Gonnard66ba48a2017-04-27 11:38:26 +020073
74 /* If multiplication is in progress, we already generated a privkey */
75#if defined(MBEDTLS_ECP_RESTARTABLE)
76 if( rs_ctx == NULL || rs_ctx->rsm == NULL )
77#endif
78 MBEDTLS_MPI_CHK( mbedtls_ecp_gen_privkey( grp, d, f_rng, p_rng ) );
79
80 MBEDTLS_MPI_CHK( mbedtls_ecp_mul_restartable( grp, Q, d, &grp->G,
81 f_rng, p_rng, rs_ctx ) );
82
83cleanup:
84 return( ret );
85}
86
87/*
88 * Generate public key
Manuel Pégourié-Gonnard6545ca72013-01-26 16:05:22 +010089 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020090int mbedtls_ecdh_gen_public( mbedtls_ecp_group *grp, mbedtls_mpi *d, mbedtls_ecp_point *Q,
Manuel Pégourié-Gonnard6545ca72013-01-26 16:05:22 +010091 int (*f_rng)(void *, unsigned char *, size_t),
92 void *p_rng )
93{
Manuel Pégourié-Gonnard66ba48a2017-04-27 11:38:26 +020094 return( ecdh_gen_public_restartable( grp, d, Q, f_rng, p_rng, NULL ) );
Manuel Pégourié-Gonnard6545ca72013-01-26 16:05:22 +010095}
Ron Eldor936d2842018-11-01 13:05:52 +020096#endif /* !MBEDTLS_ECDH_GEN_PUBLIC_ALT */
Manuel Pégourié-Gonnard6545ca72013-01-26 16:05:22 +010097
Ron Eldora84c1cb2017-10-10 19:04:27 +030098#if !defined(MBEDTLS_ECDH_COMPUTE_SHARED_ALT)
Manuel Pégourié-Gonnard6545ca72013-01-26 16:05:22 +010099/*
100 * Compute shared secret (SEC1 3.3.1)
101 */
Manuel Pégourié-Gonnard66ba48a2017-04-27 11:38:26 +0200102static int ecdh_compute_shared_restartable( mbedtls_ecp_group *grp,
103 mbedtls_mpi *z,
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200104 const mbedtls_ecp_point *Q, const mbedtls_mpi *d,
Manuel Pégourié-Gonnarde09d2f82013-09-02 14:29:09 +0200105 int (*f_rng)(void *, unsigned char *, size_t),
Manuel Pégourié-Gonnard66ba48a2017-04-27 11:38:26 +0200106 void *p_rng,
107 mbedtls_ecp_restart_ctx *rs_ctx )
Manuel Pégourié-Gonnard6545ca72013-01-26 16:05:22 +0100108{
Janos Follath24eed8d2019-11-22 13:21:35 +0000109 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200110 mbedtls_ecp_point P;
Manuel Pégourié-Gonnard6545ca72013-01-26 16:05:22 +0100111
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200112 mbedtls_ecp_point_init( &P );
Manuel Pégourié-Gonnard6545ca72013-01-26 16:05:22 +0100113
Manuel Pégourié-Gonnard66ba48a2017-04-27 11:38:26 +0200114 MBEDTLS_MPI_CHK( mbedtls_ecp_mul_restartable( grp, &P, d, Q,
115 f_rng, p_rng, rs_ctx ) );
Manuel Pégourié-Gonnard6545ca72013-01-26 16:05:22 +0100116
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200117 if( mbedtls_ecp_is_zero( &P ) )
Paul Bakkerb548d772013-07-26 14:21:34 +0200118 {
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200119 ret = MBEDTLS_ERR_ECP_BAD_INPUT_DATA;
Paul Bakkerb548d772013-07-26 14:21:34 +0200120 goto cleanup;
121 }
Manuel Pégourié-Gonnard6545ca72013-01-26 16:05:22 +0100122
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200123 MBEDTLS_MPI_CHK( mbedtls_mpi_copy( z, &P.X ) );
Manuel Pégourié-Gonnard6545ca72013-01-26 16:05:22 +0100124
125cleanup:
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200126 mbedtls_ecp_point_free( &P );
Manuel Pégourié-Gonnard6545ca72013-01-26 16:05:22 +0100127
128 return( ret );
129}
130
Manuel Pégourié-Gonnard63533e42013-02-10 14:21:04 +0100131/*
Manuel Pégourié-Gonnard66ba48a2017-04-27 11:38:26 +0200132 * Compute shared secret (SEC1 3.3.1)
133 */
134int mbedtls_ecdh_compute_shared( mbedtls_ecp_group *grp, mbedtls_mpi *z,
135 const mbedtls_ecp_point *Q, const mbedtls_mpi *d,
136 int (*f_rng)(void *, unsigned char *, size_t),
137 void *p_rng )
138{
139 return( ecdh_compute_shared_restartable( grp, z, Q, d,
140 f_rng, p_rng, NULL ) );
141}
Ron Eldor936d2842018-11-01 13:05:52 +0200142#endif /* !MBEDTLS_ECDH_COMPUTE_SHARED_ALT */
Manuel Pégourié-Gonnard66ba48a2017-04-27 11:38:26 +0200143
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100144static void ecdh_init_internal( mbedtls_ecdh_context_mbed *ctx )
Manuel Pégourié-Gonnard63533e42013-02-10 14:21:04 +0100145{
Manuel Pégourié-Gonnard5bd38b12017-08-23 16:55:59 +0200146 mbedtls_ecp_group_init( &ctx->grp );
147 mbedtls_mpi_init( &ctx->d );
148 mbedtls_ecp_point_init( &ctx->Q );
149 mbedtls_ecp_point_init( &ctx->Qp );
150 mbedtls_mpi_init( &ctx->z );
Manuel Pégourié-Gonnard66ba48a2017-04-27 11:38:26 +0200151
152#if defined(MBEDTLS_ECP_RESTARTABLE)
153 mbedtls_ecp_restart_init( &ctx->rs );
154#endif
Manuel Pégourié-Gonnard63533e42013-02-10 14:21:04 +0100155}
156
Manuel Pégourié-Gonnard63533e42013-02-10 14:21:04 +0100157/*
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100158 * Initialize context
Janos Follathf61e4862018-10-30 11:53:25 +0000159 */
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100160void mbedtls_ecdh_init( mbedtls_ecdh_context *ctx )
161{
162#if defined(MBEDTLS_ECDH_LEGACY_CONTEXT)
163 ecdh_init_internal( ctx );
164 mbedtls_ecp_point_init( &ctx->Vi );
165 mbedtls_ecp_point_init( &ctx->Vf );
166 mbedtls_mpi_init( &ctx->_d );
167#else
Christoph M. Wintersteigerd8c45d52019-02-20 17:16:53 +0000168 memset( ctx, 0, sizeof( mbedtls_ecdh_context ) );
169
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100170 ctx->var = MBEDTLS_ECDH_VARIANT_NONE;
171#endif
172 ctx->point_format = MBEDTLS_ECP_PF_UNCOMPRESSED;
173#if defined(MBEDTLS_ECP_RESTARTABLE)
174 ctx->restart_enabled = 0;
175#endif
176}
177
178static int ecdh_setup_internal( mbedtls_ecdh_context_mbed *ctx,
179 mbedtls_ecp_group_id grp_id )
Janos Follathf61e4862018-10-30 11:53:25 +0000180{
Janos Follath24eed8d2019-11-22 13:21:35 +0000181 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
Janos Follathf61e4862018-10-30 11:53:25 +0000182
183 ret = mbedtls_ecp_group_load( &ctx->grp, grp_id );
184 if( ret != 0 )
185 {
Janos Follathf61e4862018-10-30 11:53:25 +0000186 return( MBEDTLS_ERR_ECP_FEATURE_UNAVAILABLE );
187 }
188
189 return( 0 );
190}
191
192/*
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100193 * Setup context
Manuel Pégourié-Gonnard63533e42013-02-10 14:21:04 +0100194 */
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100195int mbedtls_ecdh_setup( mbedtls_ecdh_context *ctx, mbedtls_ecp_group_id grp_id )
Manuel Pégourié-Gonnard63533e42013-02-10 14:21:04 +0100196{
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100197#if defined(MBEDTLS_ECDH_LEGACY_CONTEXT)
198 return( ecdh_setup_internal( ctx, grp_id ) );
199#else
200 switch( grp_id )
201 {
Christoph M. Wintersteigerc9f737b2018-10-25 13:03:05 +0100202#if defined(MBEDTLS_ECDH_VARIANT_EVEREST_ENABLED)
Christoph M. Wintersteiger3ff60bc2019-02-15 12:59:59 +0000203 case MBEDTLS_ECP_DP_CURVE25519:
204 ctx->point_format = MBEDTLS_ECP_PF_COMPRESSED;
205 ctx->var = MBEDTLS_ECDH_VARIANT_EVEREST;
206 ctx->grp_id = grp_id;
207 return( mbedtls_everest_setup( &ctx->ctx.everest_ecdh, grp_id ) );
Christoph M. Wintersteiger78c9c462018-12-06 17:16:32 +0000208#endif
Christoph M. Wintersteiger3ff60bc2019-02-15 12:59:59 +0000209 default:
210 ctx->point_format = MBEDTLS_ECP_PF_UNCOMPRESSED;
211 ctx->var = MBEDTLS_ECDH_VARIANT_MBEDTLS_2_0;
212 ctx->grp_id = grp_id;
213 ecdh_init_internal( &ctx->ctx.mbed_ecdh );
214 return( ecdh_setup_internal( &ctx->ctx.mbed_ecdh, grp_id ) );
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100215 }
216#endif
217}
218
219static void ecdh_free_internal( mbedtls_ecdh_context_mbed *ctx )
220{
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200221 mbedtls_ecp_group_free( &ctx->grp );
Manuel Pégourié-Gonnard5bd38b12017-08-23 16:55:59 +0200222 mbedtls_mpi_free( &ctx->d );
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200223 mbedtls_ecp_point_free( &ctx->Q );
224 mbedtls_ecp_point_free( &ctx->Qp );
Manuel Pégourié-Gonnard5bd38b12017-08-23 16:55:59 +0200225 mbedtls_mpi_free( &ctx->z );
Manuel Pégourié-Gonnard66ba48a2017-04-27 11:38:26 +0200226
227#if defined(MBEDTLS_ECP_RESTARTABLE)
228 mbedtls_ecp_restart_free( &ctx->rs );
229#endif
Manuel Pégourié-Gonnard63533e42013-02-10 14:21:04 +0100230}
231
Manuel Pégourié-Gonnard23e41622017-05-18 12:35:37 +0200232#if defined(MBEDTLS_ECP_RESTARTABLE)
233/*
234 * Enable restartable operations for context
235 */
236void mbedtls_ecdh_enable_restart( mbedtls_ecdh_context *ctx )
237{
238 ctx->restart_enabled = 1;
239}
240#endif
241
Manuel Pégourié-Gonnard13724762013-02-10 15:01:54 +0100242/*
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100243 * Free context
Manuel Pégourié-Gonnard13724762013-02-10 15:01:54 +0100244 */
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100245void mbedtls_ecdh_free( mbedtls_ecdh_context *ctx )
246{
247 if( ctx == NULL )
248 return;
249
250#if defined(MBEDTLS_ECDH_LEGACY_CONTEXT)
251 mbedtls_ecp_point_free( &ctx->Vi );
252 mbedtls_ecp_point_free( &ctx->Vf );
253 mbedtls_mpi_free( &ctx->_d );
254 ecdh_free_internal( ctx );
255#else
256 switch( ctx->var )
257 {
Christoph M. Wintersteigerc9f737b2018-10-25 13:03:05 +0100258#if defined(MBEDTLS_ECDH_VARIANT_EVEREST_ENABLED)
259 case MBEDTLS_ECDH_VARIANT_EVEREST:
Christoph M. Wintersteiger4936beb2018-12-12 17:26:41 +0000260 mbedtls_everest_free( &ctx->ctx.everest_ecdh );
Christoph M. Wintersteigerc9f737b2018-10-25 13:03:05 +0100261 break;
262#endif
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100263 case MBEDTLS_ECDH_VARIANT_MBEDTLS_2_0:
264 ecdh_free_internal( &ctx->ctx.mbed_ecdh );
265 break;
266 default:
267 break;
268 }
269
270 ctx->point_format = MBEDTLS_ECP_PF_UNCOMPRESSED;
271 ctx->var = MBEDTLS_ECDH_VARIANT_NONE;
272 ctx->grp_id = MBEDTLS_ECP_DP_NONE;
273#endif
274}
275
276static int ecdh_make_params_internal( mbedtls_ecdh_context_mbed *ctx,
277 size_t *olen, int point_format,
278 unsigned char *buf, size_t blen,
279 int (*f_rng)(void *,
280 unsigned char *,
281 size_t),
282 void *p_rng,
283 int restart_enabled )
Manuel Pégourié-Gonnard13724762013-02-10 15:01:54 +0100284{
Janos Follath24eed8d2019-11-22 13:21:35 +0000285 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
Manuel Pégourié-Gonnard13724762013-02-10 15:01:54 +0100286 size_t grp_len, pt_len;
Ron Eldor2981d8f2018-11-05 18:07:10 +0200287#if defined(MBEDTLS_ECP_RESTARTABLE)
Manuel Pégourié-Gonnard66ba48a2017-04-27 11:38:26 +0200288 mbedtls_ecp_restart_ctx *rs_ctx = NULL;
Ron Eldor936d2842018-11-01 13:05:52 +0200289#endif
Manuel Pégourié-Gonnard13724762013-02-10 15:01:54 +0100290
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100291 if( ctx->grp.pbits == 0 )
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200292 return( MBEDTLS_ERR_ECP_BAD_INPUT_DATA );
Manuel Pégourié-Gonnardf35b7392013-02-11 22:12:39 +0100293
Ron Eldor19779c42018-11-05 16:58:13 +0200294#if defined(MBEDTLS_ECP_RESTARTABLE)
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100295 if( restart_enabled )
Manuel Pégourié-Gonnard23e41622017-05-18 12:35:37 +0200296 rs_ctx = &ctx->rs;
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100297#else
298 (void) restart_enabled;
Manuel Pégourié-Gonnard66ba48a2017-04-27 11:38:26 +0200299#endif
300
Ron Eldor8493f802018-11-01 11:32:15 +0200301
Ron Eldor2981d8f2018-11-05 18:07:10 +0200302#if defined(MBEDTLS_ECP_RESTARTABLE)
Manuel Pégourié-Gonnard66ba48a2017-04-27 11:38:26 +0200303 if( ( ret = ecdh_gen_public_restartable( &ctx->grp, &ctx->d, &ctx->Q,
Manuel Pégourié-Gonnardee68cff2018-10-15 15:27:49 +0200304 f_rng, p_rng, rs_ctx ) ) != 0 )
Manuel Pégourié-Gonnard13724762013-02-10 15:01:54 +0100305 return( ret );
Ron Eldor2981d8f2018-11-05 18:07:10 +0200306#else
307 if( ( ret = mbedtls_ecdh_gen_public( &ctx->grp, &ctx->d, &ctx->Q,
308 f_rng, p_rng ) ) != 0 )
309 return( ret );
310#endif /* MBEDTLS_ECP_RESTARTABLE */
Manuel Pégourié-Gonnard13724762013-02-10 15:01:54 +0100311
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100312 if( ( ret = mbedtls_ecp_tls_write_group( &ctx->grp, &grp_len, buf,
313 blen ) ) != 0 )
Manuel Pégourié-Gonnard13724762013-02-10 15:01:54 +0100314 return( ret );
315
316 buf += grp_len;
317 blen -= grp_len;
318
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100319 if( ( ret = mbedtls_ecp_tls_write_point( &ctx->grp, &ctx->Q, point_format,
Manuel Pégourié-Gonnardee68cff2018-10-15 15:27:49 +0200320 &pt_len, buf, blen ) ) != 0 )
Manuel Pégourié-Gonnard13724762013-02-10 15:01:54 +0100321 return( ret );
322
323 *olen = grp_len + pt_len;
Paul Bakkerd8bb8262014-06-17 14:06:49 +0200324 return( 0 );
Manuel Pégourié-Gonnard13724762013-02-10 15:01:54 +0100325}
326
Manuel Pégourié-Gonnard854fbd72013-02-11 20:28:55 +0100327/*
Christoph M. Wintersteigerc9f737b2018-10-25 13:03:05 +0100328 * Setup and write the ServerKeyExchange parameters (RFC 4492)
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100329 * struct {
330 * ECParameters curve_params;
331 * ECPoint public;
332 * } ServerECDHParams;
333 */
334int mbedtls_ecdh_make_params( mbedtls_ecdh_context *ctx, size_t *olen,
335 unsigned char *buf, size_t blen,
336 int (*f_rng)(void *, unsigned char *, size_t),
337 void *p_rng )
338{
339 int restart_enabled = 0;
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100340#if defined(MBEDTLS_ECP_RESTARTABLE)
341 restart_enabled = ctx->restart_enabled;
342#else
343 (void) restart_enabled;
344#endif
345
346#if defined(MBEDTLS_ECDH_LEGACY_CONTEXT)
347 return( ecdh_make_params_internal( ctx, olen, ctx->point_format, buf, blen,
348 f_rng, p_rng, restart_enabled ) );
349#else
350 switch( ctx->var )
351 {
Christoph M. Wintersteigerc9f737b2018-10-25 13:03:05 +0100352#if defined(MBEDTLS_ECDH_VARIANT_EVEREST_ENABLED)
353 case MBEDTLS_ECDH_VARIANT_EVEREST:
Christoph M. Wintersteiger4936beb2018-12-12 17:26:41 +0000354 return( mbedtls_everest_make_params( &ctx->ctx.everest_ecdh, olen,
355 buf, blen, f_rng, p_rng ) );
Christoph M. Wintersteigerc9f737b2018-10-25 13:03:05 +0100356#endif
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100357 case MBEDTLS_ECDH_VARIANT_MBEDTLS_2_0:
358 return( ecdh_make_params_internal( &ctx->ctx.mbed_ecdh, olen,
359 ctx->point_format, buf, blen,
360 f_rng, p_rng,
361 restart_enabled ) );
362 default:
363 return MBEDTLS_ERR_ECP_BAD_INPUT_DATA;
364 }
365#endif
366}
367
368static int ecdh_read_params_internal( mbedtls_ecdh_context_mbed *ctx,
369 const unsigned char **buf,
370 const unsigned char *end )
371{
372 return( mbedtls_ecp_tls_read_point( &ctx->grp, &ctx->Qp, buf,
373 end - *buf ) );
374}
375
376/*
bootstrap-prime6dbbf442022-05-17 19:30:44 -0400377 * Read the ServerKeyExchange parameters (RFC 4492)
Manuel Pégourié-Gonnard854fbd72013-02-11 20:28:55 +0100378 * struct {
379 * ECParameters curve_params;
380 * ECPoint public;
381 * } ServerECDHParams;
382 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200383int mbedtls_ecdh_read_params( mbedtls_ecdh_context *ctx,
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100384 const unsigned char **buf,
385 const unsigned char *end )
Manuel Pégourié-Gonnard854fbd72013-02-11 20:28:55 +0100386{
Janos Follath24eed8d2019-11-22 13:21:35 +0000387 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
Janos Follathf61e4862018-10-30 11:53:25 +0000388 mbedtls_ecp_group_id grp_id;
Janos Follathf61e4862018-10-30 11:53:25 +0000389 if( ( ret = mbedtls_ecp_tls_read_group_id( &grp_id, buf, end - *buf ) )
390 != 0 )
Manuel Pégourié-Gonnard854fbd72013-02-11 20:28:55 +0100391 return( ret );
392
Janos Follathf61e4862018-10-30 11:53:25 +0000393 if( ( ret = mbedtls_ecdh_setup( ctx, grp_id ) ) != 0 )
394 return( ret );
395
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100396#if defined(MBEDTLS_ECDH_LEGACY_CONTEXT)
397 return( ecdh_read_params_internal( ctx, buf, end ) );
398#else
399 switch( ctx->var )
400 {
Christoph M. Wintersteigerc9f737b2018-10-25 13:03:05 +0100401#if defined(MBEDTLS_ECDH_VARIANT_EVEREST_ENABLED)
402 case MBEDTLS_ECDH_VARIANT_EVEREST:
Christoph M. Wintersteiger4936beb2018-12-12 17:26:41 +0000403 return( mbedtls_everest_read_params( &ctx->ctx.everest_ecdh,
404 buf, end) );
Christoph M. Wintersteigerc9f737b2018-10-25 13:03:05 +0100405#endif
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100406 case MBEDTLS_ECDH_VARIANT_MBEDTLS_2_0:
407 return( ecdh_read_params_internal( &ctx->ctx.mbed_ecdh,
408 buf, end ) );
409 default:
410 return MBEDTLS_ERR_ECP_BAD_INPUT_DATA;
411 }
412#endif
Manuel Pégourié-Gonnard854fbd72013-02-11 20:28:55 +0100413}
Manuel Pégourié-Gonnard0bad5c22013-01-26 15:30:46 +0100414
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100415static int ecdh_get_params_internal( mbedtls_ecdh_context_mbed *ctx,
416 const mbedtls_ecp_keypair *key,
417 mbedtls_ecdh_side side )
Manuel Pégourié-Gonnardcdff3cf2013-12-12 09:55:52 +0100418{
Janos Follath24eed8d2019-11-22 13:21:35 +0000419 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
Manuel Pégourié-Gonnardcdff3cf2013-12-12 09:55:52 +0100420
Manuel Pégourié-Gonnardcdff3cf2013-12-12 09:55:52 +0100421 /* If it's not our key, just import the public part as Qp */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200422 if( side == MBEDTLS_ECDH_THEIRS )
423 return( mbedtls_ecp_copy( &ctx->Qp, &key->Q ) );
Manuel Pégourié-Gonnardcdff3cf2013-12-12 09:55:52 +0100424
425 /* Our key: import public (as Q) and private parts */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200426 if( side != MBEDTLS_ECDH_OURS )
427 return( MBEDTLS_ERR_ECP_BAD_INPUT_DATA );
Manuel Pégourié-Gonnardcdff3cf2013-12-12 09:55:52 +0100428
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200429 if( ( ret = mbedtls_ecp_copy( &ctx->Q, &key->Q ) ) != 0 ||
430 ( ret = mbedtls_mpi_copy( &ctx->d, &key->d ) ) != 0 )
Manuel Pégourié-Gonnardcdff3cf2013-12-12 09:55:52 +0100431 return( ret );
432
433 return( 0 );
434}
435
436/*
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100437 * Get parameters from a keypair
Manuel Pégourié-Gonnard5cceb412013-02-11 21:51:45 +0100438 */
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100439int mbedtls_ecdh_get_params( mbedtls_ecdh_context *ctx,
440 const mbedtls_ecp_keypair *key,
441 mbedtls_ecdh_side side )
442{
Janos Follath24eed8d2019-11-22 13:21:35 +0000443 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
Tuvshinzaya Erdenekhuuf69cac72022-07-27 14:43:38 +0100444 if( side != MBEDTLS_ECDH_OURS && side != MBEDTLS_ECDH_THEIRS )
445 return( MBEDTLS_ERR_ECP_BAD_INPUT_DATA );
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100446
Gilles Peskine30816292019-02-22 12:31:25 +0100447 if( mbedtls_ecdh_grp_id( ctx ) == MBEDTLS_ECP_DP_NONE )
Gilles Peskine0b1b71d2018-11-07 22:10:59 +0100448 {
449 /* This is the first call to get_params(). Set up the context
450 * for use with the group. */
451 if( ( ret = mbedtls_ecdh_setup( ctx, key->grp.id ) ) != 0 )
452 return( ret );
453 }
454 else
455 {
456 /* This is not the first call to get_params(). Check that the
457 * current key's group is the same as the context's, which was set
458 * from the first key's group. */
Gilles Peskine30816292019-02-22 12:31:25 +0100459 if( mbedtls_ecdh_grp_id( ctx ) != key->grp.id )
Gilles Peskine0b1b71d2018-11-07 22:10:59 +0100460 return( MBEDTLS_ERR_ECP_BAD_INPUT_DATA );
461 }
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100462
463#if defined(MBEDTLS_ECDH_LEGACY_CONTEXT)
464 return( ecdh_get_params_internal( ctx, key, side ) );
465#else
466 switch( ctx->var )
467 {
Christoph M. Wintersteigerc9f737b2018-10-25 13:03:05 +0100468#if defined(MBEDTLS_ECDH_VARIANT_EVEREST_ENABLED)
469 case MBEDTLS_ECDH_VARIANT_EVEREST:
Christoph M. Wintersteiger4936beb2018-12-12 17:26:41 +0000470 {
Christoph M. Wintersteiger2e724a12019-01-07 14:19:41 +0000471 mbedtls_everest_ecdh_side s = side == MBEDTLS_ECDH_OURS ?
Christoph M. Wintersteiger4936beb2018-12-12 17:26:41 +0000472 MBEDTLS_EVEREST_ECDH_OURS :
473 MBEDTLS_EVEREST_ECDH_THEIRS;
474 return( mbedtls_everest_get_params( &ctx->ctx.everest_ecdh,
475 key, s) );
476 }
Christoph M. Wintersteigerc9f737b2018-10-25 13:03:05 +0100477#endif
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100478 case MBEDTLS_ECDH_VARIANT_MBEDTLS_2_0:
479 return( ecdh_get_params_internal( &ctx->ctx.mbed_ecdh,
480 key, side ) );
481 default:
482 return MBEDTLS_ERR_ECP_BAD_INPUT_DATA;
483 }
484#endif
485}
486
487static int ecdh_make_public_internal( mbedtls_ecdh_context_mbed *ctx,
488 size_t *olen, int point_format,
489 unsigned char *buf, size_t blen,
490 int (*f_rng)(void *,
491 unsigned char *,
492 size_t),
493 void *p_rng,
494 int restart_enabled )
Manuel Pégourié-Gonnard5cceb412013-02-11 21:51:45 +0100495{
Janos Follath24eed8d2019-11-22 13:21:35 +0000496 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
Ron Eldor2981d8f2018-11-05 18:07:10 +0200497#if defined(MBEDTLS_ECP_RESTARTABLE)
Manuel Pégourié-Gonnard66ba48a2017-04-27 11:38:26 +0200498 mbedtls_ecp_restart_ctx *rs_ctx = NULL;
Ron Eldor936d2842018-11-01 13:05:52 +0200499#endif
Manuel Pégourié-Gonnard5cceb412013-02-11 21:51:45 +0100500
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100501 if( ctx->grp.pbits == 0 )
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200502 return( MBEDTLS_ERR_ECP_BAD_INPUT_DATA );
Manuel Pégourié-Gonnardf35b7392013-02-11 22:12:39 +0100503
Ron Eldorb430d9f2018-11-05 17:18:29 +0200504#if defined(MBEDTLS_ECP_RESTARTABLE)
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100505 if( restart_enabled )
Manuel Pégourié-Gonnard23e41622017-05-18 12:35:37 +0200506 rs_ctx = &ctx->rs;
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100507#else
508 (void) restart_enabled;
Manuel Pégourié-Gonnard66ba48a2017-04-27 11:38:26 +0200509#endif
510
Ron Eldor2981d8f2018-11-05 18:07:10 +0200511#if defined(MBEDTLS_ECP_RESTARTABLE)
Manuel Pégourié-Gonnard66ba48a2017-04-27 11:38:26 +0200512 if( ( ret = ecdh_gen_public_restartable( &ctx->grp, &ctx->d, &ctx->Q,
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100513 f_rng, p_rng, rs_ctx ) ) != 0 )
Manuel Pégourié-Gonnard5cceb412013-02-11 21:51:45 +0100514 return( ret );
Ron Eldor2981d8f2018-11-05 18:07:10 +0200515#else
516 if( ( ret = mbedtls_ecdh_gen_public( &ctx->grp, &ctx->d, &ctx->Q,
517 f_rng, p_rng ) ) != 0 )
518 return( ret );
519#endif /* MBEDTLS_ECP_RESTARTABLE */
Manuel Pégourié-Gonnard5cceb412013-02-11 21:51:45 +0100520
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100521 return mbedtls_ecp_tls_write_point( &ctx->grp, &ctx->Q, point_format, olen,
522 buf, blen );
Manuel Pégourié-Gonnard5cceb412013-02-11 21:51:45 +0100523}
524
525/*
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100526 * Setup and export the client public value
Manuel Pégourié-Gonnard5cceb412013-02-11 21:51:45 +0100527 */
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100528int mbedtls_ecdh_make_public( mbedtls_ecdh_context *ctx, size_t *olen,
529 unsigned char *buf, size_t blen,
530 int (*f_rng)(void *, unsigned char *, size_t),
531 void *p_rng )
Manuel Pégourié-Gonnard5cceb412013-02-11 21:51:45 +0100532{
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100533 int restart_enabled = 0;
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100534#if defined(MBEDTLS_ECP_RESTARTABLE)
535 restart_enabled = ctx->restart_enabled;
536#endif
537
538#if defined(MBEDTLS_ECDH_LEGACY_CONTEXT)
539 return( ecdh_make_public_internal( ctx, olen, ctx->point_format, buf, blen,
540 f_rng, p_rng, restart_enabled ) );
541#else
542 switch( ctx->var )
543 {
Christoph M. Wintersteigerc9f737b2018-10-25 13:03:05 +0100544#if defined(MBEDTLS_ECDH_VARIANT_EVEREST_ENABLED)
545 case MBEDTLS_ECDH_VARIANT_EVEREST:
Christoph M. Wintersteiger4936beb2018-12-12 17:26:41 +0000546 return( mbedtls_everest_make_public( &ctx->ctx.everest_ecdh, olen,
547 buf, blen, f_rng, p_rng ) );
Christoph M. Wintersteigerc9f737b2018-10-25 13:03:05 +0100548#endif
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100549 case MBEDTLS_ECDH_VARIANT_MBEDTLS_2_0:
550 return( ecdh_make_public_internal( &ctx->ctx.mbed_ecdh, olen,
551 ctx->point_format, buf, blen,
552 f_rng, p_rng,
553 restart_enabled ) );
554 default:
555 return MBEDTLS_ERR_ECP_BAD_INPUT_DATA;
556 }
557#endif
558}
559
560static int ecdh_read_public_internal( mbedtls_ecdh_context_mbed *ctx,
561 const unsigned char *buf, size_t blen )
562{
Janos Follath24eed8d2019-11-22 13:21:35 +0000563 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100564 const unsigned char *p = buf;
565
566 if( ( ret = mbedtls_ecp_tls_read_point( &ctx->grp, &ctx->Qp, &p,
567 blen ) ) != 0 )
Manuel Pégourié-Gonnard969ccc62014-03-26 19:53:25 +0100568 return( ret );
569
570 if( (size_t)( p - buf ) != blen )
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200571 return( MBEDTLS_ERR_ECP_BAD_INPUT_DATA );
Manuel Pégourié-Gonnard969ccc62014-03-26 19:53:25 +0100572
573 return( 0 );
Manuel Pégourié-Gonnard5cceb412013-02-11 21:51:45 +0100574}
575
Manuel Pégourié-Gonnard424fda52013-02-11 22:05:42 +0100576/*
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100577 * Parse and import the client's public value
Manuel Pégourié-Gonnard424fda52013-02-11 22:05:42 +0100578 */
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100579int mbedtls_ecdh_read_public( mbedtls_ecdh_context *ctx,
580 const unsigned char *buf, size_t blen )
581{
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100582#if defined(MBEDTLS_ECDH_LEGACY_CONTEXT)
583 return( ecdh_read_public_internal( ctx, buf, blen ) );
584#else
585 switch( ctx->var )
586 {
Christoph M. Wintersteigerc9f737b2018-10-25 13:03:05 +0100587#if defined(MBEDTLS_ECDH_VARIANT_EVEREST_ENABLED)
588 case MBEDTLS_ECDH_VARIANT_EVEREST:
Christoph M. Wintersteiger4936beb2018-12-12 17:26:41 +0000589 return( mbedtls_everest_read_public( &ctx->ctx.everest_ecdh,
590 buf, blen ) );
Christoph M. Wintersteigerc9f737b2018-10-25 13:03:05 +0100591#endif
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100592 case MBEDTLS_ECDH_VARIANT_MBEDTLS_2_0:
593 return( ecdh_read_public_internal( &ctx->ctx.mbed_ecdh,
594 buf, blen ) );
595 default:
596 return MBEDTLS_ERR_ECP_BAD_INPUT_DATA;
597 }
598#endif
599}
600
601static int ecdh_calc_secret_internal( mbedtls_ecdh_context_mbed *ctx,
602 size_t *olen, unsigned char *buf,
603 size_t blen,
604 int (*f_rng)(void *,
605 unsigned char *,
606 size_t),
607 void *p_rng,
608 int restart_enabled )
Manuel Pégourié-Gonnard424fda52013-02-11 22:05:42 +0100609{
Janos Follath24eed8d2019-11-22 13:21:35 +0000610 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
Ron Eldor2981d8f2018-11-05 18:07:10 +0200611#if defined(MBEDTLS_ECP_RESTARTABLE)
Manuel Pégourié-Gonnard66ba48a2017-04-27 11:38:26 +0200612 mbedtls_ecp_restart_ctx *rs_ctx = NULL;
Ron Eldor936d2842018-11-01 13:05:52 +0200613#endif
Manuel Pégourié-Gonnard424fda52013-02-11 22:05:42 +0100614
Manuel Pégourié-Gonnard66ba48a2017-04-27 11:38:26 +0200615 if( ctx == NULL || ctx->grp.pbits == 0 )
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200616 return( MBEDTLS_ERR_ECP_BAD_INPUT_DATA );
Manuel Pégourié-Gonnardf35b7392013-02-11 22:12:39 +0100617
Ron Eldorb430d9f2018-11-05 17:18:29 +0200618#if defined(MBEDTLS_ECP_RESTARTABLE)
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100619 if( restart_enabled )
Manuel Pégourié-Gonnard23e41622017-05-18 12:35:37 +0200620 rs_ctx = &ctx->rs;
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100621#else
622 (void) restart_enabled;
Manuel Pégourié-Gonnard66ba48a2017-04-27 11:38:26 +0200623#endif
624
Ron Eldor2981d8f2018-11-05 18:07:10 +0200625#if defined(MBEDTLS_ECP_RESTARTABLE)
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100626 if( ( ret = ecdh_compute_shared_restartable( &ctx->grp, &ctx->z, &ctx->Qp,
627 &ctx->d, f_rng, p_rng,
628 rs_ctx ) ) != 0 )
Manuel Pégourié-Gonnarde09d2f82013-09-02 14:29:09 +0200629 {
Manuel Pégourié-Gonnard424fda52013-02-11 22:05:42 +0100630 return( ret );
Manuel Pégourié-Gonnarde09d2f82013-09-02 14:29:09 +0200631 }
Ron Eldor2981d8f2018-11-05 18:07:10 +0200632#else
633 if( ( ret = mbedtls_ecdh_compute_shared( &ctx->grp, &ctx->z, &ctx->Qp,
634 &ctx->d, f_rng, p_rng ) ) != 0 )
635 {
636 return( ret );
637 }
638#endif /* MBEDTLS_ECP_RESTARTABLE */
Manuel Pégourié-Gonnard424fda52013-02-11 22:05:42 +0100639
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200640 if( mbedtls_mpi_size( &ctx->z ) > blen )
641 return( MBEDTLS_ERR_ECP_BAD_INPUT_DATA );
Paul Bakker41c83d32013-03-20 14:39:14 +0100642
Manuel Pégourié-Gonnard0a56c2c2014-01-17 21:24:04 +0100643 *olen = ctx->grp.pbits / 8 + ( ( ctx->grp.pbits % 8 ) != 0 );
Janos Follathab0f71a2019-02-20 10:48:49 +0000644
Janos Follath52ff8e92019-02-26 13:56:04 +0000645 if( mbedtls_ecp_get_type( &ctx->grp ) == MBEDTLS_ECP_TYPE_MONTGOMERY )
Janos Follathab0f71a2019-02-20 10:48:49 +0000646 return mbedtls_mpi_write_binary_le( &ctx->z, buf, *olen );
647
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200648 return mbedtls_mpi_write_binary( &ctx->z, buf, *olen );
Manuel Pégourié-Gonnard424fda52013-02-11 22:05:42 +0100649}
650
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100651/*
652 * Derive and export the shared secret
653 */
654int mbedtls_ecdh_calc_secret( mbedtls_ecdh_context *ctx, size_t *olen,
655 unsigned char *buf, size_t blen,
656 int (*f_rng)(void *, unsigned char *, size_t),
657 void *p_rng )
658{
659 int restart_enabled = 0;
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100660#if defined(MBEDTLS_ECP_RESTARTABLE)
661 restart_enabled = ctx->restart_enabled;
662#endif
663
664#if defined(MBEDTLS_ECDH_LEGACY_CONTEXT)
665 return( ecdh_calc_secret_internal( ctx, olen, buf, blen, f_rng, p_rng,
666 restart_enabled ) );
667#else
668 switch( ctx->var )
669 {
Christoph M. Wintersteigerc9f737b2018-10-25 13:03:05 +0100670#if defined(MBEDTLS_ECDH_VARIANT_EVEREST_ENABLED)
671 case MBEDTLS_ECDH_VARIANT_EVEREST:
Christoph M. Wintersteiger4936beb2018-12-12 17:26:41 +0000672 return( mbedtls_everest_calc_secret( &ctx->ctx.everest_ecdh, olen,
673 buf, blen, f_rng, p_rng ) );
Christoph M. Wintersteigerc9f737b2018-10-25 13:03:05 +0100674#endif
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100675 case MBEDTLS_ECDH_VARIANT_MBEDTLS_2_0:
676 return( ecdh_calc_secret_internal( &ctx->ctx.mbed_ecdh, olen, buf,
677 blen, f_rng, p_rng,
678 restart_enabled ) );
679 default:
680 return( MBEDTLS_ERR_ECP_BAD_INPUT_DATA );
681 }
682#endif
683}
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200684#endif /* MBEDTLS_ECDH_C */