blob: ae38f6d7c6da1eab9e5be902d6f2987dde5aa01e [file] [log] [blame]
Przemek Stekiel359f4622022-12-05 14:11:55 +01001/*
2 * PSA FFDH layer on top of Mbed TLS crypto
3 */
4/*
5 * Copyright The Mbed TLS Contributors
Dave Rodgman16799db2023-11-02 19:47:20 +00006 * SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later
Przemek Stekiel359f4622022-12-05 14:11:55 +01007 */
8
9#include "common.h"
10
11#if defined(MBEDTLS_PSA_CRYPTO_C)
12
Valerio Setti1a543522024-01-26 09:35:18 +010013/* This header is only needed because it defines
Valerio Setti2bec5df2024-01-26 14:39:28 +010014 * MBEDTLS_DHM_RFC7919_FFDHEXXXX_[P|G]_BIN symbols that are used in
15 * mbedtls_psa_ffdh_set_prime_generator(). Apart from that, this module
Valerio Setti1a543522024-01-26 09:35:18 +010016 * only uses bignum functions for arithmetic. */
17#include <mbedtls/dhm.h>
18
Przemek Stekiel359f4622022-12-05 14:11:55 +010019#include <psa/crypto.h>
20#include "psa_crypto_core.h"
21#include "psa_crypto_ffdh.h"
22#include "psa_crypto_random_impl.h"
Przemek Stekiela59255f2023-05-11 11:03:54 +020023#include "mbedtls/platform.h"
Manuel Pégourié-Gonnardd55d66f2023-06-20 10:14:58 +020024#include "mbedtls/error.h"
Przemek Stekiel359f4622022-12-05 14:11:55 +010025
Valerio Settia55f0422023-07-10 15:34:41 +020026#if defined(MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_EXPORT) || \
27 defined(MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_GENERATE) || \
Przemek Stekiela59255f2023-05-11 11:03:54 +020028 defined(MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_PUBLIC_KEY) || \
29 defined(MBEDTLS_PSA_BUILTIN_ALG_FFDH)
Przemek Stekiel359f4622022-12-05 14:11:55 +010030static psa_status_t mbedtls_psa_ffdh_set_prime_generator(size_t key_size,
31 mbedtls_mpi *P,
32 mbedtls_mpi *G)
33{
34 const unsigned char *dhm_P = NULL;
35 const unsigned char *dhm_G = NULL;
36 size_t dhm_size_P = 0;
37 size_t dhm_size_G = 0;
38 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
39
40 if (P == NULL && G == NULL) {
41 return PSA_ERROR_INVALID_ARGUMENT;
42 }
43
Valerio Setti4ed8daa2024-01-17 12:16:14 +010044#if defined(MBEDTLS_PSA_BUILTIN_DH_RFC7919_2048)
Przemek Stekiel359f4622022-12-05 14:11:55 +010045 static const unsigned char dhm_P_2048[] =
46 MBEDTLS_DHM_RFC7919_FFDHE2048_P_BIN;
Przemek Stekiel359f4622022-12-05 14:11:55 +010047 static const unsigned char dhm_G_2048[] =
48 MBEDTLS_DHM_RFC7919_FFDHE2048_G_BIN;
Valerio Setti4ed8daa2024-01-17 12:16:14 +010049#endif /* MBEDTLS_PSA_BUILTIN_DH_RFC7919_2048 */
50#if defined(MBEDTLS_PSA_BUILTIN_DH_RFC7919_3072)
51 static const unsigned char dhm_P_3072[] =
52 MBEDTLS_DHM_RFC7919_FFDHE3072_P_BIN;
Przemek Stekiel359f4622022-12-05 14:11:55 +010053 static const unsigned char dhm_G_3072[] =
54 MBEDTLS_DHM_RFC7919_FFDHE3072_G_BIN;
Valerio Setti4ed8daa2024-01-17 12:16:14 +010055#endif /* MBEDTLS_PSA_BUILTIN_DH_RFC7919_3072 */
56#if defined(MBEDTLS_PSA_BUILTIN_DH_RFC7919_4096)
57 static const unsigned char dhm_P_4096[] =
58 MBEDTLS_DHM_RFC7919_FFDHE4096_P_BIN;
Przemek Stekiel359f4622022-12-05 14:11:55 +010059 static const unsigned char dhm_G_4096[] =
60 MBEDTLS_DHM_RFC7919_FFDHE4096_G_BIN;
Valerio Setti4ed8daa2024-01-17 12:16:14 +010061#endif /* MBEDTLS_PSA_BUILTIN_DH_RFC7919_4096 */
62#if defined(MBEDTLS_PSA_BUILTIN_DH_RFC7919_6144)
63 static const unsigned char dhm_P_6144[] =
64 MBEDTLS_DHM_RFC7919_FFDHE6144_P_BIN;
Przemek Stekiel359f4622022-12-05 14:11:55 +010065 static const unsigned char dhm_G_6144[] =
66 MBEDTLS_DHM_RFC7919_FFDHE6144_G_BIN;
Valerio Setti4ed8daa2024-01-17 12:16:14 +010067#endif /* MBEDTLS_PSA_BUILTIN_DH_RFC7919_6144 */
68#if defined(MBEDTLS_PSA_BUILTIN_DH_RFC7919_8192)
69 static const unsigned char dhm_P_8192[] =
70 MBEDTLS_DHM_RFC7919_FFDHE8192_P_BIN;
Przemek Stekiel359f4622022-12-05 14:11:55 +010071 static const unsigned char dhm_G_8192[] =
72 MBEDTLS_DHM_RFC7919_FFDHE8192_G_BIN;
Valerio Setti4ed8daa2024-01-17 12:16:14 +010073#endif /* MBEDTLS_PSA_BUILTIN_DH_RFC7919_8192 */
Przemek Stekiel359f4622022-12-05 14:11:55 +010074
Przemek Stekiel134cc2e2023-05-05 10:13:37 +020075 switch (key_size) {
Valerio Setti4ed8daa2024-01-17 12:16:14 +010076#if defined(MBEDTLS_PSA_BUILTIN_DH_RFC7919_2048)
Przemek Stekiel75095cc2023-04-28 14:20:27 +020077 case sizeof(dhm_P_2048):
78 dhm_P = dhm_P_2048;
79 dhm_G = dhm_G_2048;
80 dhm_size_P = sizeof(dhm_P_2048);
81 dhm_size_G = sizeof(dhm_G_2048);
82 break;
Valerio Setti4ed8daa2024-01-17 12:16:14 +010083#endif /* MBEDTLS_PSA_BUILTIN_DH_RFC7919_2048 */
84#if defined(MBEDTLS_PSA_BUILTIN_DH_RFC7919_3072)
Przemek Stekiel75095cc2023-04-28 14:20:27 +020085 case sizeof(dhm_P_3072):
86 dhm_P = dhm_P_3072;
87 dhm_G = dhm_G_3072;
88 dhm_size_P = sizeof(dhm_P_3072);
89 dhm_size_G = sizeof(dhm_G_3072);
90 break;
Valerio Setti4ed8daa2024-01-17 12:16:14 +010091#endif /* MBEDTLS_PSA_BUILTIN_DH_RFC7919_3072 */
92#if defined(MBEDTLS_PSA_BUILTIN_DH_RFC7919_4096)
Przemek Stekiel75095cc2023-04-28 14:20:27 +020093 case sizeof(dhm_P_4096):
94 dhm_P = dhm_P_4096;
95 dhm_G = dhm_G_4096;
96 dhm_size_P = sizeof(dhm_P_4096);
97 dhm_size_G = sizeof(dhm_G_4096);
98 break;
Valerio Setti4ed8daa2024-01-17 12:16:14 +010099#endif /* MBEDTLS_PSA_BUILTIN_DH_RFC7919_4096 */
100#if defined(MBEDTLS_PSA_BUILTIN_DH_RFC7919_6144)
Przemek Stekiel75095cc2023-04-28 14:20:27 +0200101 case sizeof(dhm_P_6144):
102 dhm_P = dhm_P_6144;
103 dhm_G = dhm_G_6144;
104 dhm_size_P = sizeof(dhm_P_6144);
105 dhm_size_G = sizeof(dhm_G_6144);
106 break;
Valerio Setti4ed8daa2024-01-17 12:16:14 +0100107#endif /* MBEDTLS_PSA_BUILTIN_DH_RFC7919_6144 */
108#if defined(MBEDTLS_PSA_BUILTIN_DH_RFC7919_8192)
Przemek Stekiel75095cc2023-04-28 14:20:27 +0200109 case sizeof(dhm_P_8192):
110 dhm_P = dhm_P_8192;
111 dhm_G = dhm_G_8192;
112 dhm_size_P = sizeof(dhm_P_8192);
113 dhm_size_G = sizeof(dhm_G_8192);
114 break;
Valerio Setti4ed8daa2024-01-17 12:16:14 +0100115#endif /* MBEDTLS_PSA_BUILTIN_DH_RFC7919_8192 */
Przemek Stekiel75095cc2023-04-28 14:20:27 +0200116 default:
117 return PSA_ERROR_INVALID_ARGUMENT;
Przemek Stekiel359f4622022-12-05 14:11:55 +0100118 }
119
120 if (P != NULL) {
121 MBEDTLS_MPI_CHK(mbedtls_mpi_read_binary(P, dhm_P,
122 dhm_size_P));
123 }
124 if (G != NULL) {
125 MBEDTLS_MPI_CHK(mbedtls_mpi_read_binary(G, dhm_G,
126 dhm_size_G));
127 }
128
129cleanup:
130 if (ret != 0) {
131 return mbedtls_to_psa_error(ret);
132 }
133
134 return PSA_SUCCESS;
135}
Valerio Settia55f0422023-07-10 15:34:41 +0200136#endif /* MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_EXPORT ||
137 MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_GENERATE ||
Przemek Stekiela59255f2023-05-11 11:03:54 +0200138 MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_PUBLIC_KEY ||
139 MBEDTLS_PSA_BUILTIN_ALG_FFDH */
Przemek Stekiel359f4622022-12-05 14:11:55 +0100140
Valerio Settia55f0422023-07-10 15:34:41 +0200141#if defined(MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_EXPORT) || \
Przemek Stekiela59255f2023-05-11 11:03:54 +0200142 defined(MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_PUBLIC_KEY)
Przemek Stekiel152bb462023-06-01 11:52:39 +0200143psa_status_t mbedtls_psa_ffdh_export_public_key(
Przemek Stekiel359f4622022-12-05 14:11:55 +0100144 const psa_key_attributes_t *attributes,
145 const uint8_t *key_buffer,
146 size_t key_buffer_size,
147 uint8_t *data,
148 size_t data_size,
149 size_t *data_length)
150{
151 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
152 psa_status_t status = PSA_ERROR_CORRUPTION_DETECTED;
153 mbedtls_mpi GX, G, X, P;
Gilles Peskine2f107ae2024-02-28 01:26:46 +0100154 psa_key_type_t type = attributes->type;
Przemek Stekiel33c91eb2023-05-30 15:16:35 +0200155
156 if (PSA_KEY_TYPE_IS_PUBLIC_KEY(type)) {
157 if (key_buffer_size > data_size) {
158 return PSA_ERROR_BUFFER_TOO_SMALL;
159 }
160 memcpy(data, key_buffer, key_buffer_size);
161 memset(data + key_buffer_size, 0,
162 data_size - key_buffer_size);
163 *data_length = key_buffer_size;
164 return PSA_SUCCESS;
165 }
Przemek Stekiel359f4622022-12-05 14:11:55 +0100166
167 mbedtls_mpi_init(&GX); mbedtls_mpi_init(&G);
168 mbedtls_mpi_init(&X); mbedtls_mpi_init(&P);
169
Gilles Peskine2f107ae2024-02-28 01:26:46 +0100170 size_t key_len = PSA_BITS_TO_BYTES(attributes->bits);
Przemek Stekiela4700fa2023-06-02 15:26:20 +0200171
172 status = mbedtls_psa_ffdh_set_prime_generator(key_len, &P, &G);
Przemek Stekiel359f4622022-12-05 14:11:55 +0100173
Przemek Stekiel134cc2e2023-05-05 10:13:37 +0200174 if (status != PSA_SUCCESS) {
Przemek Stekiel6fd72b62023-04-27 10:20:56 +0200175 goto cleanup;
Przemek Stekiel359f4622022-12-05 14:11:55 +0100176 }
Przemek Stekiel6fd72b62023-04-27 10:20:56 +0200177
178 MBEDTLS_MPI_CHK(mbedtls_mpi_read_binary(&X, key_buffer,
179 key_buffer_size));
180
181 MBEDTLS_MPI_CHK(mbedtls_mpi_exp_mod(&GX, &G, &X, &P, NULL));
Przemek Stekiela4700fa2023-06-02 15:26:20 +0200182 MBEDTLS_MPI_CHK(mbedtls_mpi_write_binary(&GX, data, key_len));
Przemek Stekiel6fd72b62023-04-27 10:20:56 +0200183
Przemek Stekiela4700fa2023-06-02 15:26:20 +0200184 *data_length = key_len;
Przemek Stekiel6fd72b62023-04-27 10:20:56 +0200185
186 ret = 0;
Przemek Stekiel359f4622022-12-05 14:11:55 +0100187cleanup:
188 mbedtls_mpi_free(&P); mbedtls_mpi_free(&G);
189 mbedtls_mpi_free(&X); mbedtls_mpi_free(&GX);
190
191 if (status == PSA_SUCCESS && ret != 0) {
Przemek Stekiel6fd72b62023-04-27 10:20:56 +0200192 status = mbedtls_to_psa_error(ret);
Przemek Stekiel359f4622022-12-05 14:11:55 +0100193 }
194
195 return status;
196}
Valerio Settia55f0422023-07-10 15:34:41 +0200197#endif /* MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_EXPORT ||
198 MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_PUBLIC_KEY */
Przemek Stekiel359f4622022-12-05 14:11:55 +0100199
Valerio Settia55f0422023-07-10 15:34:41 +0200200#if defined(MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_GENERATE)
Przemek Stekiel359f4622022-12-05 14:11:55 +0100201psa_status_t mbedtls_psa_ffdh_generate_key(
202 const psa_key_attributes_t *attributes,
203 uint8_t *key_buffer, size_t key_buffer_size, size_t *key_buffer_length)
204{
205 mbedtls_mpi X, P;
206 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
207 psa_status_t status = PSA_ERROR_CORRUPTION_DETECTED;
208 mbedtls_mpi_init(&P); mbedtls_mpi_init(&X);
Przemek Stekiele1621a42023-05-05 09:53:37 +0200209 (void) attributes;
Przemek Stekiel359f4622022-12-05 14:11:55 +0100210
Przemek Stekiele1621a42023-05-05 09:53:37 +0200211 status = mbedtls_psa_ffdh_set_prime_generator(key_buffer_size, &P, NULL);
Przemek Stekiel359f4622022-12-05 14:11:55 +0100212
Przemek Stekiele1621a42023-05-05 09:53:37 +0200213 if (status != PSA_SUCCESS) {
214 goto cleanup;
Przemek Stekiel359f4622022-12-05 14:11:55 +0100215 }
216
Przemek Stekiele1621a42023-05-05 09:53:37 +0200217 /* RFC7919: Traditional finite field Diffie-Hellman has each peer choose their
218 secret exponent from the range [2, P-2].
219 Select random value in range [3, P-1] and decrease it by 1. */
220 MBEDTLS_MPI_CHK(mbedtls_mpi_random(&X, 3, &P, mbedtls_psa_get_random,
Przemek Stekiel134cc2e2023-05-05 10:13:37 +0200221 MBEDTLS_PSA_RANDOM_STATE));
Przemek Stekiele1621a42023-05-05 09:53:37 +0200222 MBEDTLS_MPI_CHK(mbedtls_mpi_sub_int(&X, &X, 1));
223 MBEDTLS_MPI_CHK(mbedtls_mpi_write_binary(&X, key_buffer, key_buffer_size));
224 *key_buffer_length = key_buffer_size;
225
Przemek Stekiel359f4622022-12-05 14:11:55 +0100226cleanup:
227 mbedtls_mpi_free(&P); mbedtls_mpi_free(&X);
228 if (status == PSA_SUCCESS && ret != 0) {
229 return mbedtls_to_psa_error(ret);
230 }
231
232 return status;
233}
Valerio Settia55f0422023-07-10 15:34:41 +0200234#endif /* MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_GENERATE */
Przemek Stekiela59255f2023-05-11 11:03:54 +0200235
Valerio Settia55f0422023-07-10 15:34:41 +0200236#if defined(MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_IMPORT)
Przemek Stekiel33c91eb2023-05-30 15:16:35 +0200237psa_status_t mbedtls_psa_ffdh_import_key(
238 const psa_key_attributes_t *attributes,
239 const uint8_t *data, size_t data_length,
240 uint8_t *key_buffer, size_t key_buffer_size,
241 size_t *key_buffer_length, size_t *bits)
242{
243 (void) attributes;
244
245 if (key_buffer_size < data_length) {
246 return PSA_ERROR_BUFFER_TOO_SMALL;
247 }
248 memcpy(key_buffer, data, data_length);
249 *key_buffer_length = data_length;
250 *bits = PSA_BYTES_TO_BITS(data_length);
251
252 return PSA_SUCCESS;
253}
Valerio Settia55f0422023-07-10 15:34:41 +0200254#endif /* MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_IMPORT */
Przemek Stekiel359f4622022-12-05 14:11:55 +0100255
Przemek Stekiela59255f2023-05-11 11:03:54 +0200256#if defined(MBEDTLS_PSA_BUILTIN_ALG_FFDH)
Przemek Stekiel152bb462023-06-01 11:52:39 +0200257psa_status_t mbedtls_psa_ffdh_key_agreement(
Przemek Stekiela59255f2023-05-11 11:03:54 +0200258 const psa_key_attributes_t *attributes,
259 const uint8_t *peer_key,
260 size_t peer_key_length,
261 const uint8_t *key_buffer,
262 size_t key_buffer_size,
263 uint8_t *shared_secret,
264 size_t shared_secret_size,
265 size_t *shared_secret_length)
266{
267 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
268 psa_status_t status = PSA_ERROR_CORRUPTION_DETECTED;
269 mbedtls_mpi P, G, X, GY, K;
270 const size_t calculated_shared_secret_size = peer_key_length;
271
272 if (peer_key_length != key_buffer_size ||
273 calculated_shared_secret_size > shared_secret_size) {
274 return PSA_ERROR_INVALID_ARGUMENT;
275 }
276
277 if (!PSA_KEY_TYPE_IS_DH_KEY_PAIR(psa_get_key_type(attributes))) {
278 return PSA_ERROR_INVALID_ARGUMENT;
279 }
280
281 mbedtls_mpi_init(&P); mbedtls_mpi_init(&G);
282 mbedtls_mpi_init(&X); mbedtls_mpi_init(&GY);
283 mbedtls_mpi_init(&K);
284
285 status = mbedtls_psa_ffdh_set_prime_generator(
Gilles Peskine2f107ae2024-02-28 01:26:46 +0100286 PSA_BITS_TO_BYTES(attributes->bits), &P, &G);
Przemek Stekiela59255f2023-05-11 11:03:54 +0200287
288 if (status != PSA_SUCCESS) {
289 goto cleanup;
290 }
291
292 MBEDTLS_MPI_CHK(mbedtls_mpi_read_binary(&X, key_buffer,
293 key_buffer_size));
294
295 MBEDTLS_MPI_CHK(mbedtls_mpi_read_binary(&GY, peer_key,
296 peer_key_length));
297
298 /* Calculate shared secret public key: K = G^(XY) mod P = GY^X mod P */
299 MBEDTLS_MPI_CHK(mbedtls_mpi_exp_mod(&K, &GY, &X, &P, NULL));
300
301 MBEDTLS_MPI_CHK(mbedtls_mpi_write_binary(&K, shared_secret,
302 calculated_shared_secret_size));
303
304 *shared_secret_length = calculated_shared_secret_size;
305
306 ret = 0;
307
308cleanup:
309 mbedtls_mpi_free(&P); mbedtls_mpi_free(&G);
310 mbedtls_mpi_free(&X); mbedtls_mpi_free(&GY);
311 mbedtls_mpi_free(&K);
312
313 if (status == PSA_SUCCESS && ret != 0) {
314 status = mbedtls_to_psa_error(ret);
315 }
316
317 return status;
318}
319#endif /* MBEDTLS_PSA_BUILTIN_ALG_FFDH */
320
Przemek Stekiel359f4622022-12-05 14:11:55 +0100321#endif /* MBEDTLS_PSA_CRYPTO_C */