blob: 20dfd2dcf215f85933313b59cef6f44ecd08ee66 [file] [log] [blame]
Przemek Stekiel359f4622022-12-05 14:11:55 +01001/*
2 * PSA FFDH layer on top of Mbed TLS crypto
3 */
4/*
5 * Copyright The Mbed TLS Contributors
6 * SPDX-License-Identifier: Apache-2.0
7 *
8 * Licensed under the Apache License, Version 2.0 (the "License"); you may
9 * not use this file except in compliance with the License.
10 * You may obtain a copy of the License at
11 *
12 * http://www.apache.org/licenses/LICENSE-2.0
13 *
14 * Unless required by applicable law or agreed to in writing, software
15 * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
16 * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
17 * See the License for the specific language governing permissions and
18 * limitations under the License.
19 */
20
21#include "common.h"
22
23#if defined(MBEDTLS_PSA_CRYPTO_C)
24
25#include <psa/crypto.h>
26#include "psa_crypto_core.h"
27#include "psa_crypto_ffdh.h"
28#include "psa_crypto_random_impl.h"
Przemek Stekiela59255f2023-05-11 11:03:54 +020029#include "mbedtls/platform.h"
Manuel Pégourié-Gonnardd55d66f2023-06-20 10:14:58 +020030#include "mbedtls/error.h"
Przemek Stekiel359f4622022-12-05 14:11:55 +010031
Valerio Settia55f0422023-07-10 15:34:41 +020032#if defined(MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_EXPORT) || \
33 defined(MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_GENERATE) || \
Przemek Stekiela59255f2023-05-11 11:03:54 +020034 defined(MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_PUBLIC_KEY) || \
35 defined(MBEDTLS_PSA_BUILTIN_ALG_FFDH)
Przemek Stekiel359f4622022-12-05 14:11:55 +010036static psa_status_t mbedtls_psa_ffdh_set_prime_generator(size_t key_size,
37 mbedtls_mpi *P,
38 mbedtls_mpi *G)
39{
40 const unsigned char *dhm_P = NULL;
41 const unsigned char *dhm_G = NULL;
42 size_t dhm_size_P = 0;
43 size_t dhm_size_G = 0;
44 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
45
46 if (P == NULL && G == NULL) {
47 return PSA_ERROR_INVALID_ARGUMENT;
48 }
49
50 static const unsigned char dhm_P_2048[] =
51 MBEDTLS_DHM_RFC7919_FFDHE2048_P_BIN;
52 static const unsigned char dhm_P_3072[] =
53 MBEDTLS_DHM_RFC7919_FFDHE3072_P_BIN;
54 static const unsigned char dhm_P_4096[] =
55 MBEDTLS_DHM_RFC7919_FFDHE4096_P_BIN;
56 static const unsigned char dhm_P_6144[] =
57 MBEDTLS_DHM_RFC7919_FFDHE6144_P_BIN;
58 static const unsigned char dhm_P_8192[] =
59 MBEDTLS_DHM_RFC7919_FFDHE8192_P_BIN;
60 static const unsigned char dhm_G_2048[] =
61 MBEDTLS_DHM_RFC7919_FFDHE2048_G_BIN;
62 static const unsigned char dhm_G_3072[] =
63 MBEDTLS_DHM_RFC7919_FFDHE3072_G_BIN;
64 static const unsigned char dhm_G_4096[] =
65 MBEDTLS_DHM_RFC7919_FFDHE4096_G_BIN;
66 static const unsigned char dhm_G_6144[] =
67 MBEDTLS_DHM_RFC7919_FFDHE6144_G_BIN;
68 static const unsigned char dhm_G_8192[] =
69 MBEDTLS_DHM_RFC7919_FFDHE8192_G_BIN;
70
Przemek Stekiel134cc2e2023-05-05 10:13:37 +020071 switch (key_size) {
Przemek Stekiel75095cc2023-04-28 14:20:27 +020072 case sizeof(dhm_P_2048):
73 dhm_P = dhm_P_2048;
74 dhm_G = dhm_G_2048;
75 dhm_size_P = sizeof(dhm_P_2048);
76 dhm_size_G = sizeof(dhm_G_2048);
77 break;
78 case sizeof(dhm_P_3072):
79 dhm_P = dhm_P_3072;
80 dhm_G = dhm_G_3072;
81 dhm_size_P = sizeof(dhm_P_3072);
82 dhm_size_G = sizeof(dhm_G_3072);
83 break;
84 case sizeof(dhm_P_4096):
85 dhm_P = dhm_P_4096;
86 dhm_G = dhm_G_4096;
87 dhm_size_P = sizeof(dhm_P_4096);
88 dhm_size_G = sizeof(dhm_G_4096);
89 break;
90 case sizeof(dhm_P_6144):
91 dhm_P = dhm_P_6144;
92 dhm_G = dhm_G_6144;
93 dhm_size_P = sizeof(dhm_P_6144);
94 dhm_size_G = sizeof(dhm_G_6144);
95 break;
96 case sizeof(dhm_P_8192):
97 dhm_P = dhm_P_8192;
98 dhm_G = dhm_G_8192;
99 dhm_size_P = sizeof(dhm_P_8192);
100 dhm_size_G = sizeof(dhm_G_8192);
101 break;
102 default:
103 return PSA_ERROR_INVALID_ARGUMENT;
Przemek Stekiel359f4622022-12-05 14:11:55 +0100104 }
105
106 if (P != NULL) {
107 MBEDTLS_MPI_CHK(mbedtls_mpi_read_binary(P, dhm_P,
108 dhm_size_P));
109 }
110 if (G != NULL) {
111 MBEDTLS_MPI_CHK(mbedtls_mpi_read_binary(G, dhm_G,
112 dhm_size_G));
113 }
114
115cleanup:
116 if (ret != 0) {
117 return mbedtls_to_psa_error(ret);
118 }
119
120 return PSA_SUCCESS;
121}
Valerio Settia55f0422023-07-10 15:34:41 +0200122#endif /* MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_EXPORT ||
123 MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_GENERATE ||
Przemek Stekiela59255f2023-05-11 11:03:54 +0200124 MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_PUBLIC_KEY ||
125 MBEDTLS_PSA_BUILTIN_ALG_FFDH */
Przemek Stekiel359f4622022-12-05 14:11:55 +0100126
Valerio Settia55f0422023-07-10 15:34:41 +0200127#if defined(MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_EXPORT) || \
Przemek Stekiela59255f2023-05-11 11:03:54 +0200128 defined(MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_PUBLIC_KEY)
Przemek Stekiel152bb462023-06-01 11:52:39 +0200129psa_status_t mbedtls_psa_ffdh_export_public_key(
Przemek Stekiel359f4622022-12-05 14:11:55 +0100130 const psa_key_attributes_t *attributes,
131 const uint8_t *key_buffer,
132 size_t key_buffer_size,
133 uint8_t *data,
134 size_t data_size,
135 size_t *data_length)
136{
137 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
138 psa_status_t status = PSA_ERROR_CORRUPTION_DETECTED;
139 mbedtls_mpi GX, G, X, P;
Przemek Stekiel33c91eb2023-05-30 15:16:35 +0200140 psa_key_type_t type = attributes->core.type;
141
142 if (PSA_KEY_TYPE_IS_PUBLIC_KEY(type)) {
143 if (key_buffer_size > data_size) {
144 return PSA_ERROR_BUFFER_TOO_SMALL;
145 }
146 memcpy(data, key_buffer, key_buffer_size);
147 memset(data + key_buffer_size, 0,
148 data_size - key_buffer_size);
149 *data_length = key_buffer_size;
150 return PSA_SUCCESS;
151 }
Przemek Stekiel359f4622022-12-05 14:11:55 +0100152
153 mbedtls_mpi_init(&GX); mbedtls_mpi_init(&G);
154 mbedtls_mpi_init(&X); mbedtls_mpi_init(&P);
155
Przemek Stekiela4700fa2023-06-02 15:26:20 +0200156 size_t key_len = PSA_BITS_TO_BYTES(attributes->core.bits);
157
158 status = mbedtls_psa_ffdh_set_prime_generator(key_len, &P, &G);
Przemek Stekiel359f4622022-12-05 14:11:55 +0100159
Przemek Stekiel134cc2e2023-05-05 10:13:37 +0200160 if (status != PSA_SUCCESS) {
Przemek Stekiel6fd72b62023-04-27 10:20:56 +0200161 goto cleanup;
Przemek Stekiel359f4622022-12-05 14:11:55 +0100162 }
Przemek Stekiel6fd72b62023-04-27 10:20:56 +0200163
164 MBEDTLS_MPI_CHK(mbedtls_mpi_read_binary(&X, key_buffer,
165 key_buffer_size));
166
167 MBEDTLS_MPI_CHK(mbedtls_mpi_exp_mod(&GX, &G, &X, &P, NULL));
Przemek Stekiela4700fa2023-06-02 15:26:20 +0200168 MBEDTLS_MPI_CHK(mbedtls_mpi_write_binary(&GX, data, key_len));
Przemek Stekiel6fd72b62023-04-27 10:20:56 +0200169
Przemek Stekiela4700fa2023-06-02 15:26:20 +0200170 *data_length = key_len;
Przemek Stekiel6fd72b62023-04-27 10:20:56 +0200171
172 ret = 0;
Przemek Stekiel359f4622022-12-05 14:11:55 +0100173cleanup:
174 mbedtls_mpi_free(&P); mbedtls_mpi_free(&G);
175 mbedtls_mpi_free(&X); mbedtls_mpi_free(&GX);
176
177 if (status == PSA_SUCCESS && ret != 0) {
Przemek Stekiel6fd72b62023-04-27 10:20:56 +0200178 status = mbedtls_to_psa_error(ret);
Przemek Stekiel359f4622022-12-05 14:11:55 +0100179 }
180
181 return status;
182}
Valerio Settia55f0422023-07-10 15:34:41 +0200183#endif /* MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_EXPORT ||
184 MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_PUBLIC_KEY */
Przemek Stekiel359f4622022-12-05 14:11:55 +0100185
Valerio Settia55f0422023-07-10 15:34:41 +0200186#if defined(MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_GENERATE)
Przemek Stekiel359f4622022-12-05 14:11:55 +0100187psa_status_t mbedtls_psa_ffdh_generate_key(
188 const psa_key_attributes_t *attributes,
189 uint8_t *key_buffer, size_t key_buffer_size, size_t *key_buffer_length)
190{
191 mbedtls_mpi X, P;
192 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
193 psa_status_t status = PSA_ERROR_CORRUPTION_DETECTED;
194 mbedtls_mpi_init(&P); mbedtls_mpi_init(&X);
Przemek Stekiele1621a42023-05-05 09:53:37 +0200195 (void) attributes;
Przemek Stekiel359f4622022-12-05 14:11:55 +0100196
Przemek Stekiele1621a42023-05-05 09:53:37 +0200197 status = mbedtls_psa_ffdh_set_prime_generator(key_buffer_size, &P, NULL);
Przemek Stekiel359f4622022-12-05 14:11:55 +0100198
Przemek Stekiele1621a42023-05-05 09:53:37 +0200199 if (status != PSA_SUCCESS) {
200 goto cleanup;
Przemek Stekiel359f4622022-12-05 14:11:55 +0100201 }
202
Przemek Stekiele1621a42023-05-05 09:53:37 +0200203 /* RFC7919: Traditional finite field Diffie-Hellman has each peer choose their
204 secret exponent from the range [2, P-2].
205 Select random value in range [3, P-1] and decrease it by 1. */
206 MBEDTLS_MPI_CHK(mbedtls_mpi_random(&X, 3, &P, mbedtls_psa_get_random,
Przemek Stekiel134cc2e2023-05-05 10:13:37 +0200207 MBEDTLS_PSA_RANDOM_STATE));
Przemek Stekiele1621a42023-05-05 09:53:37 +0200208 MBEDTLS_MPI_CHK(mbedtls_mpi_sub_int(&X, &X, 1));
209 MBEDTLS_MPI_CHK(mbedtls_mpi_write_binary(&X, key_buffer, key_buffer_size));
210 *key_buffer_length = key_buffer_size;
211
Przemek Stekiel359f4622022-12-05 14:11:55 +0100212cleanup:
213 mbedtls_mpi_free(&P); mbedtls_mpi_free(&X);
214 if (status == PSA_SUCCESS && ret != 0) {
215 return mbedtls_to_psa_error(ret);
216 }
217
218 return status;
219}
Valerio Settia55f0422023-07-10 15:34:41 +0200220#endif /* MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_GENERATE */
Przemek Stekiela59255f2023-05-11 11:03:54 +0200221
Valerio Settia55f0422023-07-10 15:34:41 +0200222#if defined(MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_IMPORT)
Przemek Stekiel33c91eb2023-05-30 15:16:35 +0200223psa_status_t mbedtls_psa_ffdh_import_key(
224 const psa_key_attributes_t *attributes,
225 const uint8_t *data, size_t data_length,
226 uint8_t *key_buffer, size_t key_buffer_size,
227 size_t *key_buffer_length, size_t *bits)
228{
229 (void) attributes;
230
231 if (key_buffer_size < data_length) {
232 return PSA_ERROR_BUFFER_TOO_SMALL;
233 }
234 memcpy(key_buffer, data, data_length);
235 *key_buffer_length = data_length;
236 *bits = PSA_BYTES_TO_BITS(data_length);
237
238 return PSA_SUCCESS;
239}
Valerio Settia55f0422023-07-10 15:34:41 +0200240#endif /* MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_IMPORT */
Przemek Stekiel359f4622022-12-05 14:11:55 +0100241
Przemek Stekiela59255f2023-05-11 11:03:54 +0200242#if defined(MBEDTLS_PSA_BUILTIN_ALG_FFDH)
Przemek Stekiel152bb462023-06-01 11:52:39 +0200243psa_status_t mbedtls_psa_ffdh_key_agreement(
Przemek Stekiela59255f2023-05-11 11:03:54 +0200244 const psa_key_attributes_t *attributes,
245 const uint8_t *peer_key,
246 size_t peer_key_length,
247 const uint8_t *key_buffer,
248 size_t key_buffer_size,
249 uint8_t *shared_secret,
250 size_t shared_secret_size,
251 size_t *shared_secret_length)
252{
253 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
254 psa_status_t status = PSA_ERROR_CORRUPTION_DETECTED;
255 mbedtls_mpi P, G, X, GY, K;
256 const size_t calculated_shared_secret_size = peer_key_length;
257
258 if (peer_key_length != key_buffer_size ||
259 calculated_shared_secret_size > shared_secret_size) {
260 return PSA_ERROR_INVALID_ARGUMENT;
261 }
262
263 if (!PSA_KEY_TYPE_IS_DH_KEY_PAIR(psa_get_key_type(attributes))) {
264 return PSA_ERROR_INVALID_ARGUMENT;
265 }
266
267 mbedtls_mpi_init(&P); mbedtls_mpi_init(&G);
268 mbedtls_mpi_init(&X); mbedtls_mpi_init(&GY);
269 mbedtls_mpi_init(&K);
270
271 status = mbedtls_psa_ffdh_set_prime_generator(
272 PSA_BITS_TO_BYTES(attributes->core.bits), &P, &G);
273
274 if (status != PSA_SUCCESS) {
275 goto cleanup;
276 }
277
278 MBEDTLS_MPI_CHK(mbedtls_mpi_read_binary(&X, key_buffer,
279 key_buffer_size));
280
281 MBEDTLS_MPI_CHK(mbedtls_mpi_read_binary(&GY, peer_key,
282 peer_key_length));
283
284 /* Calculate shared secret public key: K = G^(XY) mod P = GY^X mod P */
285 MBEDTLS_MPI_CHK(mbedtls_mpi_exp_mod(&K, &GY, &X, &P, NULL));
286
287 MBEDTLS_MPI_CHK(mbedtls_mpi_write_binary(&K, shared_secret,
288 calculated_shared_secret_size));
289
290 *shared_secret_length = calculated_shared_secret_size;
291
292 ret = 0;
293
294cleanup:
295 mbedtls_mpi_free(&P); mbedtls_mpi_free(&G);
296 mbedtls_mpi_free(&X); mbedtls_mpi_free(&GY);
297 mbedtls_mpi_free(&K);
298
299 if (status == PSA_SUCCESS && ret != 0) {
300 status = mbedtls_to_psa_error(ret);
301 }
302
303 return status;
304}
305#endif /* MBEDTLS_PSA_BUILTIN_ALG_FFDH */
306
Przemek Stekiel359f4622022-12-05 14:11:55 +0100307#endif /* MBEDTLS_PSA_CRYPTO_C */