blob: d8a208fae27be184052cfbc0e39e7cf76f6e4e65 [file] [log] [blame]
Przemek Stekiel359f4622022-12-05 14:11:55 +01001/*
2 * PSA FFDH layer on top of Mbed TLS crypto
3 */
4/*
5 * Copyright The Mbed TLS Contributors
6 * SPDX-License-Identifier: Apache-2.0
7 *
8 * Licensed under the Apache License, Version 2.0 (the "License"); you may
9 * not use this file except in compliance with the License.
10 * You may obtain a copy of the License at
11 *
12 * http://www.apache.org/licenses/LICENSE-2.0
13 *
14 * Unless required by applicable law or agreed to in writing, software
15 * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
16 * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
17 * See the License for the specific language governing permissions and
18 * limitations under the License.
19 */
20
21#include "common.h"
22
23#if defined(MBEDTLS_PSA_CRYPTO_C)
24
25#include <psa/crypto.h>
26#include "psa_crypto_core.h"
27#include "psa_crypto_ffdh.h"
28#include "psa_crypto_random_impl.h"
Przemek Stekiela59255f2023-05-11 11:03:54 +020029#include "mbedtls/platform.h"
Manuel Pégourié-Gonnardd55d66f2023-06-20 10:14:58 +020030#include "mbedtls/error.h"
Przemek Stekiel359f4622022-12-05 14:11:55 +010031
Valerio Setti8bb57632023-05-26 13:48:07 +020032#if defined(MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_LEGACY) || \
Przemek Stekiela59255f2023-05-11 11:03:54 +020033 defined(MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_PUBLIC_KEY) || \
34 defined(MBEDTLS_PSA_BUILTIN_ALG_FFDH)
Przemek Stekiel359f4622022-12-05 14:11:55 +010035static psa_status_t mbedtls_psa_ffdh_set_prime_generator(size_t key_size,
36 mbedtls_mpi *P,
37 mbedtls_mpi *G)
38{
39 const unsigned char *dhm_P = NULL;
40 const unsigned char *dhm_G = NULL;
41 size_t dhm_size_P = 0;
42 size_t dhm_size_G = 0;
43 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
44
45 if (P == NULL && G == NULL) {
46 return PSA_ERROR_INVALID_ARGUMENT;
47 }
48
49 static const unsigned char dhm_P_2048[] =
50 MBEDTLS_DHM_RFC7919_FFDHE2048_P_BIN;
51 static const unsigned char dhm_P_3072[] =
52 MBEDTLS_DHM_RFC7919_FFDHE3072_P_BIN;
53 static const unsigned char dhm_P_4096[] =
54 MBEDTLS_DHM_RFC7919_FFDHE4096_P_BIN;
55 static const unsigned char dhm_P_6144[] =
56 MBEDTLS_DHM_RFC7919_FFDHE6144_P_BIN;
57 static const unsigned char dhm_P_8192[] =
58 MBEDTLS_DHM_RFC7919_FFDHE8192_P_BIN;
59 static const unsigned char dhm_G_2048[] =
60 MBEDTLS_DHM_RFC7919_FFDHE2048_G_BIN;
61 static const unsigned char dhm_G_3072[] =
62 MBEDTLS_DHM_RFC7919_FFDHE3072_G_BIN;
63 static const unsigned char dhm_G_4096[] =
64 MBEDTLS_DHM_RFC7919_FFDHE4096_G_BIN;
65 static const unsigned char dhm_G_6144[] =
66 MBEDTLS_DHM_RFC7919_FFDHE6144_G_BIN;
67 static const unsigned char dhm_G_8192[] =
68 MBEDTLS_DHM_RFC7919_FFDHE8192_G_BIN;
69
Przemek Stekiel134cc2e2023-05-05 10:13:37 +020070 switch (key_size) {
Przemek Stekiel75095cc2023-04-28 14:20:27 +020071 case sizeof(dhm_P_2048):
72 dhm_P = dhm_P_2048;
73 dhm_G = dhm_G_2048;
74 dhm_size_P = sizeof(dhm_P_2048);
75 dhm_size_G = sizeof(dhm_G_2048);
76 break;
77 case sizeof(dhm_P_3072):
78 dhm_P = dhm_P_3072;
79 dhm_G = dhm_G_3072;
80 dhm_size_P = sizeof(dhm_P_3072);
81 dhm_size_G = sizeof(dhm_G_3072);
82 break;
83 case sizeof(dhm_P_4096):
84 dhm_P = dhm_P_4096;
85 dhm_G = dhm_G_4096;
86 dhm_size_P = sizeof(dhm_P_4096);
87 dhm_size_G = sizeof(dhm_G_4096);
88 break;
89 case sizeof(dhm_P_6144):
90 dhm_P = dhm_P_6144;
91 dhm_G = dhm_G_6144;
92 dhm_size_P = sizeof(dhm_P_6144);
93 dhm_size_G = sizeof(dhm_G_6144);
94 break;
95 case sizeof(dhm_P_8192):
96 dhm_P = dhm_P_8192;
97 dhm_G = dhm_G_8192;
98 dhm_size_P = sizeof(dhm_P_8192);
99 dhm_size_G = sizeof(dhm_G_8192);
100 break;
101 default:
102 return PSA_ERROR_INVALID_ARGUMENT;
Przemek Stekiel359f4622022-12-05 14:11:55 +0100103 }
104
105 if (P != NULL) {
106 MBEDTLS_MPI_CHK(mbedtls_mpi_read_binary(P, dhm_P,
107 dhm_size_P));
108 }
109 if (G != NULL) {
110 MBEDTLS_MPI_CHK(mbedtls_mpi_read_binary(G, dhm_G,
111 dhm_size_G));
112 }
113
114cleanup:
115 if (ret != 0) {
116 return mbedtls_to_psa_error(ret);
117 }
118
119 return PSA_SUCCESS;
120}
Valerio Setti8bb57632023-05-26 13:48:07 +0200121#endif /* MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_LEGACY ||
Przemek Stekiela59255f2023-05-11 11:03:54 +0200122 MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_PUBLIC_KEY ||
123 MBEDTLS_PSA_BUILTIN_ALG_FFDH */
Przemek Stekiel359f4622022-12-05 14:11:55 +0100124
Valerio Setti8bb57632023-05-26 13:48:07 +0200125#if defined(MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_LEGACY) || \
Przemek Stekiela59255f2023-05-11 11:03:54 +0200126 defined(MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_PUBLIC_KEY)
Przemek Stekiel152bb462023-06-01 11:52:39 +0200127psa_status_t mbedtls_psa_ffdh_export_public_key(
Przemek Stekiel359f4622022-12-05 14:11:55 +0100128 const psa_key_attributes_t *attributes,
129 const uint8_t *key_buffer,
130 size_t key_buffer_size,
131 uint8_t *data,
132 size_t data_size,
133 size_t *data_length)
134{
135 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
136 psa_status_t status = PSA_ERROR_CORRUPTION_DETECTED;
137 mbedtls_mpi GX, G, X, P;
Przemek Stekiel33c91eb2023-05-30 15:16:35 +0200138 psa_key_type_t type = attributes->core.type;
139
140 if (PSA_KEY_TYPE_IS_PUBLIC_KEY(type)) {
141 if (key_buffer_size > data_size) {
142 return PSA_ERROR_BUFFER_TOO_SMALL;
143 }
144 memcpy(data, key_buffer, key_buffer_size);
145 memset(data + key_buffer_size, 0,
146 data_size - key_buffer_size);
147 *data_length = key_buffer_size;
148 return PSA_SUCCESS;
149 }
Przemek Stekiel359f4622022-12-05 14:11:55 +0100150
151 mbedtls_mpi_init(&GX); mbedtls_mpi_init(&G);
152 mbedtls_mpi_init(&X); mbedtls_mpi_init(&P);
153
Przemek Stekiela4700fa2023-06-02 15:26:20 +0200154 size_t key_len = PSA_BITS_TO_BYTES(attributes->core.bits);
155
156 status = mbedtls_psa_ffdh_set_prime_generator(key_len, &P, &G);
Przemek Stekiel359f4622022-12-05 14:11:55 +0100157
Przemek Stekiel134cc2e2023-05-05 10:13:37 +0200158 if (status != PSA_SUCCESS) {
Przemek Stekiel6fd72b62023-04-27 10:20:56 +0200159 goto cleanup;
Przemek Stekiel359f4622022-12-05 14:11:55 +0100160 }
Przemek Stekiel6fd72b62023-04-27 10:20:56 +0200161
162 MBEDTLS_MPI_CHK(mbedtls_mpi_read_binary(&X, key_buffer,
163 key_buffer_size));
164
165 MBEDTLS_MPI_CHK(mbedtls_mpi_exp_mod(&GX, &G, &X, &P, NULL));
Przemek Stekiela4700fa2023-06-02 15:26:20 +0200166 MBEDTLS_MPI_CHK(mbedtls_mpi_write_binary(&GX, data, key_len));
Przemek Stekiel6fd72b62023-04-27 10:20:56 +0200167
Przemek Stekiela4700fa2023-06-02 15:26:20 +0200168 *data_length = key_len;
Przemek Stekiel6fd72b62023-04-27 10:20:56 +0200169
170 ret = 0;
Przemek Stekiel359f4622022-12-05 14:11:55 +0100171cleanup:
172 mbedtls_mpi_free(&P); mbedtls_mpi_free(&G);
173 mbedtls_mpi_free(&X); mbedtls_mpi_free(&GX);
174
175 if (status == PSA_SUCCESS && ret != 0) {
Przemek Stekiel6fd72b62023-04-27 10:20:56 +0200176 status = mbedtls_to_psa_error(ret);
Przemek Stekiel359f4622022-12-05 14:11:55 +0100177 }
178
179 return status;
180}
181
182psa_status_t mbedtls_psa_ffdh_generate_key(
183 const psa_key_attributes_t *attributes,
184 uint8_t *key_buffer, size_t key_buffer_size, size_t *key_buffer_length)
185{
186 mbedtls_mpi X, P;
187 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
188 psa_status_t status = PSA_ERROR_CORRUPTION_DETECTED;
189 mbedtls_mpi_init(&P); mbedtls_mpi_init(&X);
Przemek Stekiele1621a42023-05-05 09:53:37 +0200190 (void) attributes;
Przemek Stekiel359f4622022-12-05 14:11:55 +0100191
Przemek Stekiele1621a42023-05-05 09:53:37 +0200192 status = mbedtls_psa_ffdh_set_prime_generator(key_buffer_size, &P, NULL);
Przemek Stekiel359f4622022-12-05 14:11:55 +0100193
Przemek Stekiele1621a42023-05-05 09:53:37 +0200194 if (status != PSA_SUCCESS) {
195 goto cleanup;
Przemek Stekiel359f4622022-12-05 14:11:55 +0100196 }
197
Przemek Stekiele1621a42023-05-05 09:53:37 +0200198 /* RFC7919: Traditional finite field Diffie-Hellman has each peer choose their
199 secret exponent from the range [2, P-2].
200 Select random value in range [3, P-1] and decrease it by 1. */
201 MBEDTLS_MPI_CHK(mbedtls_mpi_random(&X, 3, &P, mbedtls_psa_get_random,
Przemek Stekiel134cc2e2023-05-05 10:13:37 +0200202 MBEDTLS_PSA_RANDOM_STATE));
Przemek Stekiele1621a42023-05-05 09:53:37 +0200203 MBEDTLS_MPI_CHK(mbedtls_mpi_sub_int(&X, &X, 1));
204 MBEDTLS_MPI_CHK(mbedtls_mpi_write_binary(&X, key_buffer, key_buffer_size));
205 *key_buffer_length = key_buffer_size;
206
Przemek Stekiel359f4622022-12-05 14:11:55 +0100207cleanup:
208 mbedtls_mpi_free(&P); mbedtls_mpi_free(&X);
209 if (status == PSA_SUCCESS && ret != 0) {
210 return mbedtls_to_psa_error(ret);
211 }
212
213 return status;
214}
Przemek Stekiela59255f2023-05-11 11:03:54 +0200215
Przemek Stekiel33c91eb2023-05-30 15:16:35 +0200216psa_status_t mbedtls_psa_ffdh_import_key(
217 const psa_key_attributes_t *attributes,
218 const uint8_t *data, size_t data_length,
219 uint8_t *key_buffer, size_t key_buffer_size,
220 size_t *key_buffer_length, size_t *bits)
221{
222 (void) attributes;
223
224 if (key_buffer_size < data_length) {
225 return PSA_ERROR_BUFFER_TOO_SMALL;
226 }
227 memcpy(key_buffer, data, data_length);
228 *key_buffer_length = data_length;
229 *bits = PSA_BYTES_TO_BITS(data_length);
230
231 return PSA_SUCCESS;
232}
233
Valerio Setti8bb57632023-05-26 13:48:07 +0200234#endif /* MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_LEGACY ||
Przemek Stekiel6d85afa2023-04-28 11:42:17 +0200235 MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_PUBLIC_KEY */
Przemek Stekiel359f4622022-12-05 14:11:55 +0100236
Przemek Stekiela59255f2023-05-11 11:03:54 +0200237#if defined(MBEDTLS_PSA_BUILTIN_ALG_FFDH)
Przemek Stekiel152bb462023-06-01 11:52:39 +0200238psa_status_t mbedtls_psa_ffdh_key_agreement(
Przemek Stekiela59255f2023-05-11 11:03:54 +0200239 const psa_key_attributes_t *attributes,
240 const uint8_t *peer_key,
241 size_t peer_key_length,
242 const uint8_t *key_buffer,
243 size_t key_buffer_size,
244 uint8_t *shared_secret,
245 size_t shared_secret_size,
246 size_t *shared_secret_length)
247{
248 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
249 psa_status_t status = PSA_ERROR_CORRUPTION_DETECTED;
250 mbedtls_mpi P, G, X, GY, K;
251 const size_t calculated_shared_secret_size = peer_key_length;
252
253 if (peer_key_length != key_buffer_size ||
254 calculated_shared_secret_size > shared_secret_size) {
255 return PSA_ERROR_INVALID_ARGUMENT;
256 }
257
258 if (!PSA_KEY_TYPE_IS_DH_KEY_PAIR(psa_get_key_type(attributes))) {
259 return PSA_ERROR_INVALID_ARGUMENT;
260 }
261
262 mbedtls_mpi_init(&P); mbedtls_mpi_init(&G);
263 mbedtls_mpi_init(&X); mbedtls_mpi_init(&GY);
264 mbedtls_mpi_init(&K);
265
266 status = mbedtls_psa_ffdh_set_prime_generator(
267 PSA_BITS_TO_BYTES(attributes->core.bits), &P, &G);
268
269 if (status != PSA_SUCCESS) {
270 goto cleanup;
271 }
272
273 MBEDTLS_MPI_CHK(mbedtls_mpi_read_binary(&X, key_buffer,
274 key_buffer_size));
275
276 MBEDTLS_MPI_CHK(mbedtls_mpi_read_binary(&GY, peer_key,
277 peer_key_length));
278
279 /* Calculate shared secret public key: K = G^(XY) mod P = GY^X mod P */
280 MBEDTLS_MPI_CHK(mbedtls_mpi_exp_mod(&K, &GY, &X, &P, NULL));
281
282 MBEDTLS_MPI_CHK(mbedtls_mpi_write_binary(&K, shared_secret,
283 calculated_shared_secret_size));
284
285 *shared_secret_length = calculated_shared_secret_size;
286
287 ret = 0;
288
289cleanup:
290 mbedtls_mpi_free(&P); mbedtls_mpi_free(&G);
291 mbedtls_mpi_free(&X); mbedtls_mpi_free(&GY);
292 mbedtls_mpi_free(&K);
293
294 if (status == PSA_SUCCESS && ret != 0) {
295 status = mbedtls_to_psa_error(ret);
296 }
297
298 return status;
299}
300#endif /* MBEDTLS_PSA_BUILTIN_ALG_FFDH */
301
Przemek Stekiel359f4622022-12-05 14:11:55 +0100302#endif /* MBEDTLS_PSA_CRYPTO_C */