blob: c26b5a2d6b66c35fd9dffd8f7a4e1fc9199e8e22 [file] [log] [blame]
Paul Bakker5121ce52009-01-03 21:22:43 +00001/**
2 * \file dhm.h
Paul Bakkere0ccd0a2009-01-04 16:27:10 +00003 *
Paul Bakker37ca75d2011-01-06 12:28:03 +00004 * \brief Diffie-Hellman-Merkle key exchange
5 *
Manuel Pégourié-Gonnard6fb81872015-07-27 11:11:48 +02006 * Copyright (C) 2006-2015, ARM Limited, All Rights Reserved
Manuel Pégourié-Gonnard37ff1402015-09-04 14:21:07 +02007 * SPDX-License-Identifier: Apache-2.0
8 *
9 * Licensed under the Apache License, Version 2.0 (the "License"); you may
10 * not use this file except in compliance with the License.
11 * You may obtain a copy of the License at
12 *
13 * http://www.apache.org/licenses/LICENSE-2.0
14 *
15 * Unless required by applicable law or agreed to in writing, software
16 * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
17 * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
18 * See the License for the specific language governing permissions and
19 * limitations under the License.
Paul Bakkerb96f1542010-07-18 20:36:00 +000020 *
Manuel Pégourié-Gonnardfe446432015-03-06 13:17:10 +000021 * This file is part of mbed TLS (https://tls.mbed.org)
Paul Bakker5121ce52009-01-03 21:22:43 +000022 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020023#ifndef MBEDTLS_DHM_H
24#define MBEDTLS_DHM_H
Paul Bakker5121ce52009-01-03 21:22:43 +000025
Paul Bakker314052f2011-08-15 09:07:52 +000026#include "bignum.h"
Paul Bakker5121ce52009-01-03 21:22:43 +000027
Paul Bakkerf3b86c12011-01-27 15:24:17 +000028/*
29 * DHM Error codes
30 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020031#define MBEDTLS_ERR_DHM_BAD_INPUT_DATA -0x3080 /**< Bad input parameters to function. */
32#define MBEDTLS_ERR_DHM_READ_PARAMS_FAILED -0x3100 /**< Reading of the DHM parameters failed. */
33#define MBEDTLS_ERR_DHM_MAKE_PARAMS_FAILED -0x3180 /**< Making of the DHM parameters failed. */
34#define MBEDTLS_ERR_DHM_READ_PUBLIC_FAILED -0x3200 /**< Reading of the public values failed. */
35#define MBEDTLS_ERR_DHM_MAKE_PUBLIC_FAILED -0x3280 /**< Making of the public value failed. */
36#define MBEDTLS_ERR_DHM_CALC_SECRET_FAILED -0x3300 /**< Calculation of the DHM secret failed. */
37#define MBEDTLS_ERR_DHM_INVALID_FORMAT -0x3380 /**< The ASN.1 data is not formatted correctly. */
Manuel Pégourié-Gonnard6a8ca332015-05-28 09:33:39 +020038#define MBEDTLS_ERR_DHM_ALLOC_FAILED -0x3400 /**< Allocation of memory failed. */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020039#define MBEDTLS_ERR_DHM_FILE_IO_ERROR -0x3480 /**< Read/write of file failed. */
Paul Bakker5121ce52009-01-03 21:22:43 +000040
Hanno Becker0e6dc842017-09-27 11:48:02 +010041#if ! defined(MBEDTLS_DEPRECATED_REMOVED)
42#if defined(MBEDTLS_DEPRECATED_WARNING)
43#define MBEDTLS_DEPRECATED __attribute__((deprecated))
44#else
45#define MBEDTLS_DEPRECATED
46#endif
47#endif
48
Paul Bakkerf3b86c12011-01-27 15:24:17 +000049/**
Hanno Beckerb2bad802017-09-27 11:49:31 +010050 * RFC 3526, RFC 5114 and RFC 7919 standardize a number of
51 * Diffie-Hellman groups, some of which are included here
52 * for use within the SSL/TLS module and the user's convenience
53 * when configuring the Diffie-Hellman parameters by hand
54 * through \c mbedtls_ssl_conf_dh_param.
Paul Bakker29b64762012-09-25 09:36:44 +000055 *
56 * Included are:
Hanno Beckerb2bad802017-09-27 11:49:31 +010057 * RFC 5114 2.2. 2048-bit MODP Group with 224-bit Prime Order Subgroup
Paul Bakkerda7e3f22012-09-28 07:18:17 +000058 * RFC 3526 3. 2048-bit MODP Group
59 * RFC 3526 4. 3072-bit MODP Group
Manuel Pégourié-Gonnard78931032015-07-03 17:06:39 +020060 * RFC 3526 5. 4096-bit MODP Group
Hanno Beckerb2bad802017-09-27 11:49:31 +010061 * RFC 7919 A.1 ffdhe2048
62 * RFC 7919 A.2 ffdhe3072
63 * RFC 7919 A.3 ffdhe4096
64 * RFC 7919 A.4 ffdhe6144
65 * RFC 7919 A.5 ffdhe8192
66 *
Hanno Becker0e6dc842017-09-27 11:48:02 +010067 * The constants with suffix "_p" denote the chosen prime moduli, while
68 * the constants with suffix "_g" denote the chosen generator
69 * of the associated prime field.
70 *
71 * All constants are represented as null-terminated strings containing the
72 * hexadecimal presentation of the respective numbers.
73 *
74 * \warning The origin of the primes in RFC 5114 is not documented and
75 * their use therefore constitutes a security risk!
76 *
77 * \deprecated The primes from RFC 5114 are superseded by the primes
78 * from RFC 3526 and RFC 7919 and should no longer be used.
79 * They will be removed in the next major revision.
Paul Bakker29b64762012-09-25 09:36:44 +000080 */
Paul Bakkerda7e3f22012-09-28 07:18:17 +000081
Hanno Becker0e6dc842017-09-27 11:48:02 +010082const char *mbedtls_dhm_rfc3526_modp_2048_p;
83const char *mbedtls_dhm_rfc3526_modp_2048_g;
84const char *mbedtls_dhm_rfc3526_modp_3072_p;
85const char *mbedtls_dhm_rfc3526_modp_3072_g;
86const char *mbedtls_dhm_rfc3526_modp_4096_p;
87const char *mbedtls_dhm_rfc3526_modp_4096_g;
Paul Bakkerda7e3f22012-09-28 07:18:17 +000088
Hanno Beckerb2bad802017-09-27 11:49:31 +010089const char *mbedtls_dhm_rfc7919_ffdhe2048_p;
90const char *mbedtls_dhm_rfc7919_ffdhe2048_g;
91const char *mbedtls_dhm_rfc7919_ffdhe3072_p;
92const char *mbedtls_dhm_rfc7919_ffdhe3072_g;
93const char *mbedtls_dhm_rfc7919_ffdhe4096_p;
94const char *mbedtls_dhm_rfc7919_ffdhe4096_g;
95const char *mbedtls_dhm_rfc7919_ffdhe6144_p;
96const char *mbedtls_dhm_rfc7919_ffdhe6144_g;
97const char *mbedtls_dhm_rfc7919_ffdhe8192_p;
98const char *mbedtls_dhm_rfc7919_ffdhe8192_g;
Paul Bakkerda7e3f22012-09-28 07:18:17 +000099
Hanno Becker0e6dc842017-09-27 11:48:02 +0100100#if !defined(MBEDTLS_DEPRECATED_REMOVED)
101MBEDTLS_DEPRECATED const char *mbedtls_dhm_rfc5114_modp_2048_p;
102MBEDTLS_DEPRECATED const char *mbedtls_dhm_rfc5114_modp_2048_g;
103#endif
Paul Bakkerda7e3f22012-09-28 07:18:17 +0000104
Hanno Becker0e6dc842017-09-27 11:48:02 +0100105/**
106 * \deprecated These macros are superseded by direct access to the corresponding
107 * global variables and will be removed in the next major revision.
108 */
109#if !defined(MBEDTLS_DEPRECATED_REMOVED)
110#define MBEDTLS_DHM_RFC5114_MODP_2048_P mbedtls_dhm_rfc5114_modp_2048_p
111#define MBEDTLS_DHM_RFC5114_MODP_2048_G mbedtls_dhm_rfc5114_modp_2048_g
112#define MBEDTLS_DHM_RFC3526_MODP_2048_P mbedtls_dhm_rfc3526_modp_2048_p
113#define MBEDTLS_DHM_RFC3526_MODP_2048_G mbedtls_dhm_rfc3526_modp_2048_g
114#define MBEDTLS_DHM_RFC3526_MODP_3072_P mbedtls_dhm_rfc3526_modp_3072_p
115#define MBEDTLS_DHM_RFC3526_MODP_3072_G mbedtls_dhm_rfc3526_modp_3072_g
116#define MBEDTLS_DHM_RFC3526_MODP_4096_P mbedtls_dhm_rfc3526_modp_4096_p
117#define MBEDTLS_DHM_RFC3526_MODP_4096_G mbedtls_dhm_rfc3526_modp_4096_g
118#endif
Paul Bakker29b64762012-09-25 09:36:44 +0000119
Paul Bakker407a0da2013-06-27 14:29:21 +0200120#ifdef __cplusplus
121extern "C" {
122#endif
123
Paul Bakker29b64762012-09-25 09:36:44 +0000124/**
Paul Bakkerf3b86c12011-01-27 15:24:17 +0000125 * \brief DHM context structure
126 */
Paul Bakker5121ce52009-01-03 21:22:43 +0000127typedef struct
128{
Paul Bakker23986e52011-04-24 08:57:21 +0000129 size_t len; /*!< size(P) in chars */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200130 mbedtls_mpi P; /*!< prime modulus */
131 mbedtls_mpi G; /*!< generator */
132 mbedtls_mpi X; /*!< secret value */
133 mbedtls_mpi GX; /*!< self = G^X mod P */
134 mbedtls_mpi GY; /*!< peer = G^Y mod P */
135 mbedtls_mpi K; /*!< key = GY^X mod P */
136 mbedtls_mpi RP; /*!< cached R^2 mod P */
137 mbedtls_mpi Vi; /*!< blinding value */
138 mbedtls_mpi Vf; /*!< un-blinding value */
139 mbedtls_mpi pX; /*!< previous X */
Paul Bakker5121ce52009-01-03 21:22:43 +0000140}
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200141mbedtls_dhm_context;
Paul Bakker5121ce52009-01-03 21:22:43 +0000142
Paul Bakker5121ce52009-01-03 21:22:43 +0000143/**
Paul Bakker8f870b02014-06-20 13:32:38 +0200144 * \brief Initialize DHM context
145 *
146 * \param ctx DHM context to be initialized
147 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200148void mbedtls_dhm_init( mbedtls_dhm_context *ctx );
Paul Bakker8f870b02014-06-20 13:32:38 +0200149
150/**
Paul Bakker5121ce52009-01-03 21:22:43 +0000151 * \brief Parse the ServerKeyExchange parameters
152 *
153 * \param ctx DHM context
154 * \param p &(start of input buffer)
155 * \param end end of buffer
156 *
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200157 * \return 0 if successful, or an MBEDTLS_ERR_DHM_XXX error code
Paul Bakker5121ce52009-01-03 21:22:43 +0000158 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200159int mbedtls_dhm_read_params( mbedtls_dhm_context *ctx,
Paul Bakker5121ce52009-01-03 21:22:43 +0000160 unsigned char **p,
Paul Bakkerff60ee62010-03-16 21:09:09 +0000161 const unsigned char *end );
Paul Bakker5121ce52009-01-03 21:22:43 +0000162
163/**
164 * \brief Setup and write the ServerKeyExchange parameters
165 *
166 * \param ctx DHM context
Paul Bakkerff7fe672010-07-18 09:45:05 +0000167 * \param x_size private value size in bytes
Paul Bakker5121ce52009-01-03 21:22:43 +0000168 * \param output destination buffer
169 * \param olen number of chars written
170 * \param f_rng RNG function
171 * \param p_rng RNG parameter
172 *
173 * \note This function assumes that ctx->P and ctx->G
174 * have already been properly set (for example
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200175 * using mbedtls_mpi_read_string or mbedtls_mpi_read_binary).
Paul Bakker5121ce52009-01-03 21:22:43 +0000176 *
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200177 * \return 0 if successful, or an MBEDTLS_ERR_DHM_XXX error code
Paul Bakker5121ce52009-01-03 21:22:43 +0000178 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200179int mbedtls_dhm_make_params( mbedtls_dhm_context *ctx, int x_size,
Paul Bakker23986e52011-04-24 08:57:21 +0000180 unsigned char *output, size_t *olen,
Paul Bakkera3d195c2011-11-27 21:07:34 +0000181 int (*f_rng)(void *, unsigned char *, size_t),
182 void *p_rng );
Paul Bakker5121ce52009-01-03 21:22:43 +0000183
184/**
185 * \brief Import the peer's public value G^Y
186 *
187 * \param ctx DHM context
188 * \param input input buffer
189 * \param ilen size of buffer
190 *
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200191 * \return 0 if successful, or an MBEDTLS_ERR_DHM_XXX error code
Paul Bakker5121ce52009-01-03 21:22:43 +0000192 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200193int mbedtls_dhm_read_public( mbedtls_dhm_context *ctx,
Paul Bakker23986e52011-04-24 08:57:21 +0000194 const unsigned char *input, size_t ilen );
Paul Bakker5121ce52009-01-03 21:22:43 +0000195
196/**
197 * \brief Create own private value X and export G^X
198 *
199 * \param ctx DHM context
Paul Bakker84bef1d2012-04-20 13:42:02 +0000200 * \param x_size private value size in bytes
Paul Bakker5121ce52009-01-03 21:22:43 +0000201 * \param output destination buffer
Simon Butcher2917b9e2016-05-25 00:59:37 +0100202 * \param olen must be at least equal to the size of P, ctx->len
Paul Bakker5121ce52009-01-03 21:22:43 +0000203 * \param f_rng RNG function
204 * \param p_rng RNG parameter
205 *
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200206 * \return 0 if successful, or an MBEDTLS_ERR_DHM_XXX error code
Paul Bakker5121ce52009-01-03 21:22:43 +0000207 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200208int mbedtls_dhm_make_public( mbedtls_dhm_context *ctx, int x_size,
Paul Bakker23986e52011-04-24 08:57:21 +0000209 unsigned char *output, size_t olen,
Paul Bakkera3d195c2011-11-27 21:07:34 +0000210 int (*f_rng)(void *, unsigned char *, size_t),
211 void *p_rng );
Paul Bakker5121ce52009-01-03 21:22:43 +0000212
213/**
214 * \brief Derive and export the shared secret (G^Y)^X mod P
215 *
216 * \param ctx DHM context
217 * \param output destination buffer
Manuel Pégourié-Gonnard33352052015-06-02 16:17:08 +0100218 * \param output_size size of the destination buffer
219 * \param olen on exit, holds the actual number of bytes written
Manuel Pégourié-Gonnard2d627642013-09-04 14:22:07 +0200220 * \param f_rng RNG function, for blinding purposes
221 * \param p_rng RNG parameter
Paul Bakker5121ce52009-01-03 21:22:43 +0000222 *
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200223 * \return 0 if successful, or an MBEDTLS_ERR_DHM_XXX error code
Manuel Pégourié-Gonnard143b5022013-09-04 16:29:59 +0200224 *
Manuel Pégourié-Gonnard15d5de12013-09-17 11:34:11 +0200225 * \note If non-NULL, f_rng is used to blind the input as
226 * countermeasure against timing attacks. Blinding is
227 * automatically used if and only if our secret value X is
228 * re-used and costs nothing otherwise, so it is recommended
229 * to always pass a non-NULL f_rng argument.
Paul Bakker5121ce52009-01-03 21:22:43 +0000230 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200231int mbedtls_dhm_calc_secret( mbedtls_dhm_context *ctx,
Manuel Pégourié-Gonnard33352052015-06-02 16:17:08 +0100232 unsigned char *output, size_t output_size, size_t *olen,
Manuel Pégourié-Gonnard2d627642013-09-04 14:22:07 +0200233 int (*f_rng)(void *, unsigned char *, size_t),
234 void *p_rng );
Paul Bakker5121ce52009-01-03 21:22:43 +0000235
Paul Bakker9a736322012-11-14 12:39:52 +0000236/**
Paul Bakker8f870b02014-06-20 13:32:38 +0200237 * \brief Free and clear the components of a DHM key
238 *
239 * \param ctx DHM context to free and clear
Paul Bakker5121ce52009-01-03 21:22:43 +0000240 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200241void mbedtls_dhm_free( mbedtls_dhm_context *ctx );
Paul Bakker5121ce52009-01-03 21:22:43 +0000242
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200243#if defined(MBEDTLS_ASN1_PARSE_C)
Paul Bakker40ce79f2013-09-15 17:43:54 +0200244/** \ingroup x509_module */
245/**
Manuel Pégourié-Gonnard43b37cb2015-05-12 11:20:10 +0200246 * \brief Parse DHM parameters in PEM or DER format
Paul Bakker40ce79f2013-09-15 17:43:54 +0200247 *
248 * \param dhm DHM context to be initialized
249 * \param dhmin input buffer
250 * \param dhminlen size of the buffer
Manuel Pégourié-Gonnard43b37cb2015-05-12 11:20:10 +0200251 * (including the terminating null byte for PEM data)
Paul Bakker40ce79f2013-09-15 17:43:54 +0200252 *
253 * \return 0 if successful, or a specific DHM or PEM error code
254 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200255int mbedtls_dhm_parse_dhm( mbedtls_dhm_context *dhm, const unsigned char *dhmin,
Paul Bakker40ce79f2013-09-15 17:43:54 +0200256 size_t dhminlen );
257
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200258#if defined(MBEDTLS_FS_IO)
Paul Bakker40ce79f2013-09-15 17:43:54 +0200259/** \ingroup x509_module */
260/**
261 * \brief Load and parse DHM parameters
262 *
263 * \param dhm DHM context to be initialized
264 * \param path filename to read the DHM Parameters from
265 *
266 * \return 0 if successful, or a specific DHM or PEM error code
267 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200268int mbedtls_dhm_parse_dhmfile( mbedtls_dhm_context *dhm, const char *path );
269#endif /* MBEDTLS_FS_IO */
270#endif /* MBEDTLS_ASN1_PARSE_C */
Paul Bakker40ce79f2013-09-15 17:43:54 +0200271
Paul Bakker5121ce52009-01-03 21:22:43 +0000272/**
273 * \brief Checkup routine
274 *
275 * \return 0 if successful, or 1 if the test failed
276 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200277int mbedtls_dhm_self_test( int verbose );
Paul Bakker5121ce52009-01-03 21:22:43 +0000278
279#ifdef __cplusplus
280}
281#endif
282
Paul Bakker9af723c2014-05-01 13:03:14 +0200283#endif /* dhm.h */