| Przemek Stekiel | 359f462 | 2022-12-05 14:11:55 +0100 | [diff] [blame] | 1 | /* | 
|  | 2 | *  PSA FFDH layer on top of Mbed TLS crypto | 
|  | 3 | */ | 
|  | 4 | /* | 
|  | 5 | *  Copyright The Mbed TLS Contributors | 
|  | 6 | *  SPDX-License-Identifier: Apache-2.0 | 
|  | 7 | * | 
|  | 8 | *  Licensed under the Apache License, Version 2.0 (the "License"); you may | 
|  | 9 | *  not use this file except in compliance with the License. | 
|  | 10 | *  You may obtain a copy of the License at | 
|  | 11 | * | 
|  | 12 | *  http://www.apache.org/licenses/LICENSE-2.0 | 
|  | 13 | * | 
|  | 14 | *  Unless required by applicable law or agreed to in writing, software | 
|  | 15 | *  distributed under the License is distributed on an "AS IS" BASIS, WITHOUT | 
|  | 16 | *  WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. | 
|  | 17 | *  See the License for the specific language governing permissions and | 
|  | 18 | *  limitations under the License. | 
|  | 19 | */ | 
|  | 20 |  | 
|  | 21 | #include "common.h" | 
|  | 22 |  | 
|  | 23 | #if defined(MBEDTLS_PSA_CRYPTO_C) | 
|  | 24 |  | 
|  | 25 | #include <psa/crypto.h> | 
|  | 26 | #include "psa_crypto_core.h" | 
|  | 27 | #include "psa_crypto_ffdh.h" | 
|  | 28 | #include "psa_crypto_random_impl.h" | 
| Przemek Stekiel | a59255f | 2023-05-11 11:03:54 +0200 | [diff] [blame] | 29 | #include "mbedtls/platform.h" | 
| Przemek Stekiel | 359f462 | 2022-12-05 14:11:55 +0100 | [diff] [blame] | 30 |  | 
| Przemek Stekiel | a59255f | 2023-05-11 11:03:54 +0200 | [diff] [blame] | 31 | #if defined(MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR) ||   \ | 
|  | 32 | defined(MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_PUBLIC_KEY) || \ | 
|  | 33 | defined(MBEDTLS_PSA_BUILTIN_ALG_FFDH) | 
| Przemek Stekiel | 359f462 | 2022-12-05 14:11:55 +0100 | [diff] [blame] | 34 | static psa_status_t mbedtls_psa_ffdh_set_prime_generator(size_t key_size, | 
|  | 35 | mbedtls_mpi *P, | 
|  | 36 | mbedtls_mpi *G) | 
|  | 37 | { | 
|  | 38 | const unsigned char *dhm_P = NULL; | 
|  | 39 | const unsigned char *dhm_G = NULL; | 
|  | 40 | size_t dhm_size_P = 0; | 
|  | 41 | size_t dhm_size_G = 0; | 
|  | 42 | int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; | 
|  | 43 |  | 
|  | 44 | if (P == NULL && G == NULL) { | 
|  | 45 | return PSA_ERROR_INVALID_ARGUMENT; | 
|  | 46 | } | 
|  | 47 |  | 
|  | 48 | static const unsigned char dhm_P_2048[] = | 
|  | 49 | MBEDTLS_DHM_RFC7919_FFDHE2048_P_BIN; | 
|  | 50 | static const unsigned char dhm_P_3072[] = | 
|  | 51 | MBEDTLS_DHM_RFC7919_FFDHE3072_P_BIN; | 
|  | 52 | static const unsigned char dhm_P_4096[] = | 
|  | 53 | MBEDTLS_DHM_RFC7919_FFDHE4096_P_BIN; | 
|  | 54 | static const unsigned char dhm_P_6144[] = | 
|  | 55 | MBEDTLS_DHM_RFC7919_FFDHE6144_P_BIN; | 
|  | 56 | static const unsigned char dhm_P_8192[] = | 
|  | 57 | MBEDTLS_DHM_RFC7919_FFDHE8192_P_BIN; | 
|  | 58 | static const unsigned char dhm_G_2048[] = | 
|  | 59 | MBEDTLS_DHM_RFC7919_FFDHE2048_G_BIN; | 
|  | 60 | static const unsigned char dhm_G_3072[] = | 
|  | 61 | MBEDTLS_DHM_RFC7919_FFDHE3072_G_BIN; | 
|  | 62 | static const unsigned char dhm_G_4096[] = | 
|  | 63 | MBEDTLS_DHM_RFC7919_FFDHE4096_G_BIN; | 
|  | 64 | static const unsigned char dhm_G_6144[] = | 
|  | 65 | MBEDTLS_DHM_RFC7919_FFDHE6144_G_BIN; | 
|  | 66 | static const unsigned char dhm_G_8192[] = | 
|  | 67 | MBEDTLS_DHM_RFC7919_FFDHE8192_G_BIN; | 
|  | 68 |  | 
| Przemek Stekiel | 134cc2e | 2023-05-05 10:13:37 +0200 | [diff] [blame] | 69 | switch (key_size) { | 
| Przemek Stekiel | 75095cc | 2023-04-28 14:20:27 +0200 | [diff] [blame] | 70 | case sizeof(dhm_P_2048): | 
|  | 71 | dhm_P = dhm_P_2048; | 
|  | 72 | dhm_G = dhm_G_2048; | 
|  | 73 | dhm_size_P = sizeof(dhm_P_2048); | 
|  | 74 | dhm_size_G = sizeof(dhm_G_2048); | 
|  | 75 | break; | 
|  | 76 | case sizeof(dhm_P_3072): | 
|  | 77 | dhm_P = dhm_P_3072; | 
|  | 78 | dhm_G = dhm_G_3072; | 
|  | 79 | dhm_size_P = sizeof(dhm_P_3072); | 
|  | 80 | dhm_size_G = sizeof(dhm_G_3072); | 
|  | 81 | break; | 
|  | 82 | case sizeof(dhm_P_4096): | 
|  | 83 | dhm_P = dhm_P_4096; | 
|  | 84 | dhm_G = dhm_G_4096; | 
|  | 85 | dhm_size_P = sizeof(dhm_P_4096); | 
|  | 86 | dhm_size_G = sizeof(dhm_G_4096); | 
|  | 87 | break; | 
|  | 88 | case sizeof(dhm_P_6144): | 
|  | 89 | dhm_P = dhm_P_6144; | 
|  | 90 | dhm_G = dhm_G_6144; | 
|  | 91 | dhm_size_P = sizeof(dhm_P_6144); | 
|  | 92 | dhm_size_G = sizeof(dhm_G_6144); | 
|  | 93 | break; | 
|  | 94 | case sizeof(dhm_P_8192): | 
|  | 95 | dhm_P = dhm_P_8192; | 
|  | 96 | dhm_G = dhm_G_8192; | 
|  | 97 | dhm_size_P = sizeof(dhm_P_8192); | 
|  | 98 | dhm_size_G = sizeof(dhm_G_8192); | 
|  | 99 | break; | 
|  | 100 | default: | 
|  | 101 | return PSA_ERROR_INVALID_ARGUMENT; | 
| Przemek Stekiel | 359f462 | 2022-12-05 14:11:55 +0100 | [diff] [blame] | 102 | } | 
|  | 103 |  | 
|  | 104 | if (P != NULL) { | 
|  | 105 | MBEDTLS_MPI_CHK(mbedtls_mpi_read_binary(P, dhm_P, | 
|  | 106 | dhm_size_P)); | 
|  | 107 | } | 
|  | 108 | if (G != NULL) { | 
|  | 109 | MBEDTLS_MPI_CHK(mbedtls_mpi_read_binary(G, dhm_G, | 
|  | 110 | dhm_size_G)); | 
|  | 111 | } | 
|  | 112 |  | 
|  | 113 | cleanup: | 
|  | 114 | if (ret != 0) { | 
|  | 115 | return mbedtls_to_psa_error(ret); | 
|  | 116 | } | 
|  | 117 |  | 
|  | 118 | return PSA_SUCCESS; | 
|  | 119 | } | 
| Przemek Stekiel | a59255f | 2023-05-11 11:03:54 +0200 | [diff] [blame] | 120 | #endif /* MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR || | 
|  | 121 | MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_PUBLIC_KEY || | 
|  | 122 | MBEDTLS_PSA_BUILTIN_ALG_FFDH */ | 
| Przemek Stekiel | 359f462 | 2022-12-05 14:11:55 +0100 | [diff] [blame] | 123 |  | 
| Przemek Stekiel | a59255f | 2023-05-11 11:03:54 +0200 | [diff] [blame] | 124 | #if defined(MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR) || \ | 
|  | 125 | defined(MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_PUBLIC_KEY) | 
| Przemek Stekiel | 359f462 | 2022-12-05 14:11:55 +0100 | [diff] [blame] | 126 | psa_status_t mbedtls_psa_export_ffdh_public_key( | 
|  | 127 | const psa_key_attributes_t *attributes, | 
|  | 128 | const uint8_t *key_buffer, | 
|  | 129 | size_t key_buffer_size, | 
|  | 130 | uint8_t *data, | 
|  | 131 | size_t data_size, | 
|  | 132 | size_t *data_length) | 
|  | 133 | { | 
|  | 134 | int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; | 
|  | 135 | psa_status_t status = PSA_ERROR_CORRUPTION_DETECTED; | 
|  | 136 | mbedtls_mpi GX, G, X, P; | 
| Przemek Stekiel | 33c91eb | 2023-05-30 15:16:35 +0200 | [diff] [blame] | 137 | psa_key_type_t type = attributes->core.type; | 
|  | 138 |  | 
|  | 139 | if (PSA_KEY_TYPE_IS_PUBLIC_KEY(type)) { | 
|  | 140 | if (key_buffer_size > data_size) { | 
|  | 141 | return PSA_ERROR_BUFFER_TOO_SMALL; | 
|  | 142 | } | 
|  | 143 | memcpy(data, key_buffer, key_buffer_size); | 
|  | 144 | memset(data + key_buffer_size, 0, | 
|  | 145 | data_size - key_buffer_size); | 
|  | 146 | *data_length = key_buffer_size; | 
|  | 147 | return PSA_SUCCESS; | 
|  | 148 | } | 
| Przemek Stekiel | 359f462 | 2022-12-05 14:11:55 +0100 | [diff] [blame] | 149 |  | 
|  | 150 | mbedtls_mpi_init(&GX); mbedtls_mpi_init(&G); | 
|  | 151 | mbedtls_mpi_init(&X); mbedtls_mpi_init(&P); | 
|  | 152 |  | 
| Przemek Stekiel | 837d2d1 | 2023-05-05 12:33:46 +0200 | [diff] [blame] | 153 | status = mbedtls_psa_ffdh_set_prime_generator(data_size, &P, &G); | 
| Przemek Stekiel | 359f462 | 2022-12-05 14:11:55 +0100 | [diff] [blame] | 154 |  | 
| Przemek Stekiel | 134cc2e | 2023-05-05 10:13:37 +0200 | [diff] [blame] | 155 | if (status != PSA_SUCCESS) { | 
| Przemek Stekiel | 6fd72b6 | 2023-04-27 10:20:56 +0200 | [diff] [blame] | 156 | goto cleanup; | 
| Przemek Stekiel | 359f462 | 2022-12-05 14:11:55 +0100 | [diff] [blame] | 157 | } | 
| Przemek Stekiel | 6fd72b6 | 2023-04-27 10:20:56 +0200 | [diff] [blame] | 158 |  | 
|  | 159 | MBEDTLS_MPI_CHK(mbedtls_mpi_read_binary(&X, key_buffer, | 
|  | 160 | key_buffer_size)); | 
|  | 161 |  | 
|  | 162 | MBEDTLS_MPI_CHK(mbedtls_mpi_exp_mod(&GX, &G, &X, &P, NULL)); | 
|  | 163 | MBEDTLS_MPI_CHK(mbedtls_mpi_write_binary(&GX, data, data_size)); | 
|  | 164 |  | 
| Przemek Stekiel | 837d2d1 | 2023-05-05 12:33:46 +0200 | [diff] [blame] | 165 | *data_length = data_size; | 
| Przemek Stekiel | 6fd72b6 | 2023-04-27 10:20:56 +0200 | [diff] [blame] | 166 |  | 
|  | 167 | ret = 0; | 
| Przemek Stekiel | 359f462 | 2022-12-05 14:11:55 +0100 | [diff] [blame] | 168 | cleanup: | 
|  | 169 | mbedtls_mpi_free(&P); mbedtls_mpi_free(&G); | 
|  | 170 | mbedtls_mpi_free(&X); mbedtls_mpi_free(&GX); | 
|  | 171 |  | 
|  | 172 | if (status == PSA_SUCCESS && ret != 0) { | 
| Przemek Stekiel | 6fd72b6 | 2023-04-27 10:20:56 +0200 | [diff] [blame] | 173 | status = mbedtls_to_psa_error(ret); | 
| Przemek Stekiel | 359f462 | 2022-12-05 14:11:55 +0100 | [diff] [blame] | 174 | } | 
|  | 175 |  | 
|  | 176 | return status; | 
|  | 177 | } | 
|  | 178 |  | 
|  | 179 | psa_status_t mbedtls_psa_ffdh_generate_key( | 
|  | 180 | const psa_key_attributes_t *attributes, | 
|  | 181 | uint8_t *key_buffer, size_t key_buffer_size, size_t *key_buffer_length) | 
|  | 182 | { | 
|  | 183 | mbedtls_mpi X, P; | 
|  | 184 | int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; | 
|  | 185 | psa_status_t status = PSA_ERROR_CORRUPTION_DETECTED; | 
|  | 186 | mbedtls_mpi_init(&P); mbedtls_mpi_init(&X); | 
| Przemek Stekiel | e1621a4 | 2023-05-05 09:53:37 +0200 | [diff] [blame] | 187 | (void) attributes; | 
| Przemek Stekiel | 359f462 | 2022-12-05 14:11:55 +0100 | [diff] [blame] | 188 |  | 
| Przemek Stekiel | e1621a4 | 2023-05-05 09:53:37 +0200 | [diff] [blame] | 189 | status = mbedtls_psa_ffdh_set_prime_generator(key_buffer_size, &P, NULL); | 
| Przemek Stekiel | 359f462 | 2022-12-05 14:11:55 +0100 | [diff] [blame] | 190 |  | 
| Przemek Stekiel | e1621a4 | 2023-05-05 09:53:37 +0200 | [diff] [blame] | 191 | if (status != PSA_SUCCESS) { | 
|  | 192 | goto cleanup; | 
| Przemek Stekiel | 359f462 | 2022-12-05 14:11:55 +0100 | [diff] [blame] | 193 | } | 
|  | 194 |  | 
| Przemek Stekiel | e1621a4 | 2023-05-05 09:53:37 +0200 | [diff] [blame] | 195 | /* RFC7919: Traditional finite field Diffie-Hellman has each peer choose their | 
|  | 196 | secret exponent from the range [2, P-2]. | 
|  | 197 | Select random value in range [3, P-1] and decrease it by 1. */ | 
|  | 198 | MBEDTLS_MPI_CHK(mbedtls_mpi_random(&X, 3, &P, mbedtls_psa_get_random, | 
| Przemek Stekiel | 134cc2e | 2023-05-05 10:13:37 +0200 | [diff] [blame] | 199 | MBEDTLS_PSA_RANDOM_STATE)); | 
| Przemek Stekiel | e1621a4 | 2023-05-05 09:53:37 +0200 | [diff] [blame] | 200 | MBEDTLS_MPI_CHK(mbedtls_mpi_sub_int(&X, &X, 1)); | 
|  | 201 | MBEDTLS_MPI_CHK(mbedtls_mpi_write_binary(&X, key_buffer, key_buffer_size)); | 
|  | 202 | *key_buffer_length = key_buffer_size; | 
|  | 203 |  | 
| Przemek Stekiel | 359f462 | 2022-12-05 14:11:55 +0100 | [diff] [blame] | 204 | cleanup: | 
|  | 205 | mbedtls_mpi_free(&P); mbedtls_mpi_free(&X); | 
|  | 206 | if (status == PSA_SUCCESS && ret != 0) { | 
|  | 207 | return mbedtls_to_psa_error(ret); | 
|  | 208 | } | 
|  | 209 |  | 
|  | 210 | return status; | 
|  | 211 | } | 
| Przemek Stekiel | a59255f | 2023-05-11 11:03:54 +0200 | [diff] [blame] | 212 |  | 
| Przemek Stekiel | 33c91eb | 2023-05-30 15:16:35 +0200 | [diff] [blame] | 213 | psa_status_t mbedtls_psa_ffdh_import_key( | 
|  | 214 | const psa_key_attributes_t *attributes, | 
|  | 215 | const uint8_t *data, size_t data_length, | 
|  | 216 | uint8_t *key_buffer, size_t key_buffer_size, | 
|  | 217 | size_t *key_buffer_length, size_t *bits) | 
|  | 218 | { | 
|  | 219 | (void) attributes; | 
|  | 220 |  | 
|  | 221 | if (key_buffer_size < data_length) { | 
|  | 222 | return PSA_ERROR_BUFFER_TOO_SMALL; | 
|  | 223 | } | 
|  | 224 | memcpy(key_buffer, data, data_length); | 
|  | 225 | *key_buffer_length = data_length; | 
|  | 226 | *bits = PSA_BYTES_TO_BITS(data_length); | 
|  | 227 |  | 
|  | 228 | return PSA_SUCCESS; | 
|  | 229 | } | 
|  | 230 |  | 
| Przemek Stekiel | 6d85afa | 2023-04-28 11:42:17 +0200 | [diff] [blame] | 231 | #endif /* MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR || | 
|  | 232 | MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_PUBLIC_KEY */ | 
| Przemek Stekiel | 359f462 | 2022-12-05 14:11:55 +0100 | [diff] [blame] | 233 |  | 
| Przemek Stekiel | a59255f | 2023-05-11 11:03:54 +0200 | [diff] [blame] | 234 | #if defined(MBEDTLS_PSA_BUILTIN_ALG_FFDH) | 
|  | 235 | psa_status_t mbedtls_psa_key_agreement_ffdh( | 
|  | 236 | const psa_key_attributes_t *attributes, | 
|  | 237 | const uint8_t *peer_key, | 
|  | 238 | size_t peer_key_length, | 
|  | 239 | const uint8_t *key_buffer, | 
|  | 240 | size_t key_buffer_size, | 
|  | 241 | uint8_t *shared_secret, | 
|  | 242 | size_t shared_secret_size, | 
|  | 243 | size_t *shared_secret_length) | 
|  | 244 | { | 
|  | 245 | int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; | 
|  | 246 | psa_status_t status = PSA_ERROR_CORRUPTION_DETECTED; | 
|  | 247 | mbedtls_mpi P, G, X, GY, K; | 
|  | 248 | const size_t calculated_shared_secret_size = peer_key_length; | 
|  | 249 |  | 
|  | 250 | if (peer_key_length != key_buffer_size || | 
|  | 251 | calculated_shared_secret_size > shared_secret_size) { | 
|  | 252 | return PSA_ERROR_INVALID_ARGUMENT; | 
|  | 253 | } | 
|  | 254 |  | 
|  | 255 | if (!PSA_KEY_TYPE_IS_DH_KEY_PAIR(psa_get_key_type(attributes))) { | 
|  | 256 | return PSA_ERROR_INVALID_ARGUMENT; | 
|  | 257 | } | 
|  | 258 |  | 
|  | 259 | mbedtls_mpi_init(&P); mbedtls_mpi_init(&G); | 
|  | 260 | mbedtls_mpi_init(&X); mbedtls_mpi_init(&GY); | 
|  | 261 | mbedtls_mpi_init(&K); | 
|  | 262 |  | 
|  | 263 | status = mbedtls_psa_ffdh_set_prime_generator( | 
|  | 264 | PSA_BITS_TO_BYTES(attributes->core.bits), &P, &G); | 
|  | 265 |  | 
|  | 266 | if (status != PSA_SUCCESS) { | 
|  | 267 | goto cleanup; | 
|  | 268 | } | 
|  | 269 |  | 
|  | 270 | MBEDTLS_MPI_CHK(mbedtls_mpi_read_binary(&X, key_buffer, | 
|  | 271 | key_buffer_size)); | 
|  | 272 |  | 
|  | 273 | MBEDTLS_MPI_CHK(mbedtls_mpi_read_binary(&GY, peer_key, | 
|  | 274 | peer_key_length)); | 
|  | 275 |  | 
|  | 276 | /* Calculate shared secret public key: K = G^(XY) mod P = GY^X mod P */ | 
|  | 277 | MBEDTLS_MPI_CHK(mbedtls_mpi_exp_mod(&K, &GY, &X, &P, NULL)); | 
|  | 278 |  | 
|  | 279 | MBEDTLS_MPI_CHK(mbedtls_mpi_write_binary(&K, shared_secret, | 
|  | 280 | calculated_shared_secret_size)); | 
|  | 281 |  | 
|  | 282 | *shared_secret_length = calculated_shared_secret_size; | 
|  | 283 |  | 
|  | 284 | ret = 0; | 
|  | 285 |  | 
|  | 286 | cleanup: | 
|  | 287 | mbedtls_mpi_free(&P); mbedtls_mpi_free(&G); | 
|  | 288 | mbedtls_mpi_free(&X); mbedtls_mpi_free(&GY); | 
|  | 289 | mbedtls_mpi_free(&K); | 
|  | 290 |  | 
|  | 291 | if (status == PSA_SUCCESS && ret != 0) { | 
|  | 292 | status = mbedtls_to_psa_error(ret); | 
|  | 293 | } | 
|  | 294 |  | 
|  | 295 | return status; | 
|  | 296 | } | 
|  | 297 | #endif /* MBEDTLS_PSA_BUILTIN_ALG_FFDH */ | 
|  | 298 |  | 
| Przemek Stekiel | 359f462 | 2022-12-05 14:11:55 +0100 | [diff] [blame] | 299 | #endif /* MBEDTLS_PSA_CRYPTO_C */ |