mirror of
https://github.com/ARMmbed/mbedtls.git
synced 2025-05-09 08:31:33 +08:00
Add FFDH definitions and translation functions
Signed-off-by: Przemek Stekiel <przemyslaw.stekiel@mobica.com> Signed-off-by: Przemek Stekiel <przemyslaw.stekiel@mobica.com>
This commit is contained in:
parent
060012c5fd
commit
cceb933e30
@ -66,6 +66,7 @@
|
|||||||
|
|
||||||
#include "mbedtls/build_info.h"
|
#include "mbedtls/build_info.h"
|
||||||
#include "mbedtls/bignum.h"
|
#include "mbedtls/bignum.h"
|
||||||
|
#include <string.h>
|
||||||
|
|
||||||
/*
|
/*
|
||||||
* DHM Error codes
|
* DHM Error codes
|
||||||
@ -91,6 +92,20 @@
|
|||||||
/** Setting the modulus and generator failed. */
|
/** Setting the modulus and generator failed. */
|
||||||
#define MBEDTLS_ERR_DHM_SET_GROUP_FAILED -0x3580
|
#define MBEDTLS_ERR_DHM_SET_GROUP_FAILED -0x3580
|
||||||
|
|
||||||
|
/* Finite Field Groups (DHE) */
|
||||||
|
#define MBEDTLS_DHM_GROUP_FFDHE2048 0x0100
|
||||||
|
#define MBEDTLS_DHM_GROUP_FFDHE3072 0x0101
|
||||||
|
#define MBEDTLS_DHM_GROUP_FFDHE4096 0x0102
|
||||||
|
#define MBEDTLS_DHM_GROUP_FFDHE6144 0x0103
|
||||||
|
#define MBEDTLS_DHM_GROUP_FFDHE8192 0x0104
|
||||||
|
|
||||||
|
/* Finite Field Group Names (DHE) */
|
||||||
|
#define MBEDTLS_DHM_GROUP_NAME_FFDHE2048 "ffdhe2048"
|
||||||
|
#define MBEDTLS_DHM_GROUP_NAME_FFDHE3072 "ffdhe3072"
|
||||||
|
#define MBEDTLS_DHM_GROUP_NAME_FFDHE4096 "ffdhe4096"
|
||||||
|
#define MBEDTLS_DHM_GROUP_NAME_FFDHE6144 "ffdhe6144"
|
||||||
|
#define MBEDTLS_DHM_GROUP_NAME_FFDHE8192 "ffdhe8192"
|
||||||
|
|
||||||
/** Which parameter to access in mbedtls_dhm_get_value(). */
|
/** Which parameter to access in mbedtls_dhm_get_value(). */
|
||||||
typedef enum {
|
typedef enum {
|
||||||
MBEDTLS_DHM_PARAM_P, /*!< The prime modulus. */
|
MBEDTLS_DHM_PARAM_P, /*!< The prime modulus. */
|
||||||
@ -377,6 +392,55 @@ int mbedtls_dhm_parse_dhmfile(mbedtls_dhm_context *dhm, const char *path);
|
|||||||
#endif /* MBEDTLS_FS_IO */
|
#endif /* MBEDTLS_FS_IO */
|
||||||
#endif /* MBEDTLS_ASN1_PARSE_C */
|
#endif /* MBEDTLS_ASN1_PARSE_C */
|
||||||
|
|
||||||
|
static inline uint16_t mbedtls_ssl_ffdh_group_from_name(const char *name)
|
||||||
|
{
|
||||||
|
if (strcmp(name, MBEDTLS_DHM_GROUP_NAME_FFDHE2048) == 0) {
|
||||||
|
return MBEDTLS_DHM_GROUP_FFDHE2048;
|
||||||
|
} else if (strcmp(name, MBEDTLS_DHM_GROUP_NAME_FFDHE3072) == 0) {
|
||||||
|
return MBEDTLS_DHM_GROUP_FFDHE3072;
|
||||||
|
} else if (strcmp(name, MBEDTLS_DHM_GROUP_NAME_FFDHE4096) == 0) {
|
||||||
|
return MBEDTLS_DHM_GROUP_FFDHE4096;
|
||||||
|
} else if (strcmp(name, MBEDTLS_DHM_GROUP_NAME_FFDHE6144) == 0) {
|
||||||
|
return MBEDTLS_DHM_GROUP_FFDHE6144;
|
||||||
|
} else if (strcmp(name, MBEDTLS_DHM_GROUP_NAME_FFDHE8192) == 0) {
|
||||||
|
return MBEDTLS_DHM_GROUP_FFDHE8192;
|
||||||
|
}
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
static inline const char *mbedtls_ssl_ffdh_name_from_group(uint16_t group)
|
||||||
|
{
|
||||||
|
switch (group) {
|
||||||
|
case MBEDTLS_DHM_GROUP_FFDHE2048:
|
||||||
|
return MBEDTLS_DHM_GROUP_NAME_FFDHE2048;
|
||||||
|
case MBEDTLS_DHM_GROUP_FFDHE3072:
|
||||||
|
return MBEDTLS_DHM_GROUP_NAME_FFDHE3072;
|
||||||
|
case MBEDTLS_DHM_GROUP_FFDHE4096:
|
||||||
|
return MBEDTLS_DHM_GROUP_NAME_FFDHE4096;
|
||||||
|
case MBEDTLS_DHM_GROUP_FFDHE6144:
|
||||||
|
return MBEDTLS_DHM_GROUP_NAME_FFDHE6144;
|
||||||
|
case MBEDTLS_DHM_GROUP_FFDHE8192:
|
||||||
|
return MBEDTLS_DHM_GROUP_NAME_FFDHE8192;
|
||||||
|
default:
|
||||||
|
return NULL;
|
||||||
|
}
|
||||||
|
return NULL;
|
||||||
|
}
|
||||||
|
|
||||||
|
static inline uint16_t *mbedtls_ssl_ffdh_supported_groups(void)
|
||||||
|
{
|
||||||
|
static uint16_t ffdh_groups[] = {
|
||||||
|
MBEDTLS_DHM_GROUP_FFDHE2048,
|
||||||
|
MBEDTLS_DHM_GROUP_FFDHE3072,
|
||||||
|
MBEDTLS_DHM_GROUP_FFDHE4096,
|
||||||
|
MBEDTLS_DHM_GROUP_FFDHE6144,
|
||||||
|
MBEDTLS_DHM_GROUP_FFDHE8192,
|
||||||
|
0
|
||||||
|
};
|
||||||
|
|
||||||
|
return ffdh_groups;
|
||||||
|
}
|
||||||
|
|
||||||
#if defined(MBEDTLS_SELF_TEST)
|
#if defined(MBEDTLS_SELF_TEST)
|
||||||
|
|
||||||
/**
|
/**
|
||||||
|
@ -38,6 +38,7 @@
|
|||||||
#include "mbedtls/pk.h"
|
#include "mbedtls/pk.h"
|
||||||
#include "mbedtls/oid.h"
|
#include "mbedtls/oid.h"
|
||||||
#include "mbedtls/error.h"
|
#include "mbedtls/error.h"
|
||||||
|
#include "mbedtls/ssl.h"
|
||||||
|
|
||||||
#include <string.h>
|
#include <string.h>
|
||||||
|
|
||||||
@ -276,6 +277,33 @@ static inline int mbedtls_psa_get_ecc_oid_from_id(
|
|||||||
#define MBEDTLS_PSA_MAX_EC_KEY_PAIR_LENGTH \
|
#define MBEDTLS_PSA_MAX_EC_KEY_PAIR_LENGTH \
|
||||||
PSA_KEY_EXPORT_ECC_KEY_PAIR_MAX_SIZE(PSA_VENDOR_ECC_MAX_CURVE_BITS)
|
PSA_KEY_EXPORT_ECC_KEY_PAIR_MAX_SIZE(PSA_VENDOR_ECC_MAX_CURVE_BITS)
|
||||||
|
|
||||||
|
#define MBEDTLS_PSA_MAX_FFDH_PUBKEY_LENGTH \
|
||||||
|
PSA_KEY_EXPORT_FFDH_PUBLIC_KEY_MAX_SIZE(PSA_VENDOR_FFDH_MAX_KEY_BITS)
|
||||||
|
|
||||||
|
static inline psa_key_type_t mbedtls_psa_parse_tls_ffdh_group(
|
||||||
|
uint16_t tls_ecc_grp_reg_id, size_t *bits)
|
||||||
|
{
|
||||||
|
switch (tls_ecc_grp_reg_id) {
|
||||||
|
case MBEDTLS_SSL_IANA_TLS_GROUP_FFDHE2048:
|
||||||
|
*bits = 2048;
|
||||||
|
return PSA_KEY_TYPE_DH_KEY_PAIR(PSA_DH_FAMILY_RFC7919);
|
||||||
|
case MBEDTLS_SSL_IANA_TLS_GROUP_FFDHE3072:
|
||||||
|
*bits = 3072;
|
||||||
|
return PSA_KEY_TYPE_DH_KEY_PAIR(PSA_DH_FAMILY_RFC7919);
|
||||||
|
case MBEDTLS_SSL_IANA_TLS_GROUP_FFDHE4096:
|
||||||
|
*bits = 4096;
|
||||||
|
return PSA_KEY_TYPE_DH_KEY_PAIR(PSA_DH_FAMILY_RFC7919);
|
||||||
|
case MBEDTLS_SSL_IANA_TLS_GROUP_FFDHE6144:
|
||||||
|
*bits = 6144;
|
||||||
|
return PSA_KEY_TYPE_DH_KEY_PAIR(PSA_DH_FAMILY_RFC7919);
|
||||||
|
case MBEDTLS_SSL_IANA_TLS_GROUP_FFDHE8192:
|
||||||
|
*bits = 8192;
|
||||||
|
return PSA_KEY_TYPE_DH_KEY_PAIR(PSA_DH_FAMILY_RFC7919);
|
||||||
|
default:
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
/* Expose whatever RNG the PSA subsystem uses to applications using the
|
/* Expose whatever RNG the PSA subsystem uses to applications using the
|
||||||
* mbedtls_xxx API. The declarations and definitions here need to be
|
* mbedtls_xxx API. The declarations and definitions here need to be
|
||||||
* consistent with the implementation in library/psa_crypto_random_impl.h.
|
* consistent with the implementation in library/psa_crypto_random_impl.h.
|
||||||
|
@ -307,7 +307,7 @@ static int ssl_write_supported_groups_ext(mbedtls_ssl_context *ssl,
|
|||||||
p += 2;
|
p += 2;
|
||||||
MBEDTLS_SSL_DEBUG_MSG(3, ("NamedGroup: %s ( %x )",
|
MBEDTLS_SSL_DEBUG_MSG(3, ("NamedGroup: %s ( %x )",
|
||||||
ffdh_group, *group_list));
|
ffdh_group, *group_list));
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
/* Length of named_group_list */
|
/* Length of named_group_list */
|
||||||
@ -336,7 +336,6 @@ static int ssl_write_supported_groups_ext(mbedtls_ssl_context *ssl,
|
|||||||
|
|
||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
#endif /* MBEDTLS_ECDH_C || MBEDTLS_ECDSA_C ||
|
#endif /* MBEDTLS_ECDH_C || MBEDTLS_ECDSA_C ||
|
||||||
MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED */
|
MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED */
|
||||||
|
|
||||||
|
@ -756,15 +756,19 @@ struct mbedtls_ssl_handshake_params {
|
|||||||
mbedtls_ecdh_context ecdh_ctx; /*!< ECDH key exchange */
|
mbedtls_ecdh_context ecdh_ctx; /*!< ECDH key exchange */
|
||||||
#endif /* MBEDTLS_ECDH_C && !MBEDTLS_USE_PSA_CRYPTO */
|
#endif /* MBEDTLS_ECDH_C && !MBEDTLS_USE_PSA_CRYPTO */
|
||||||
|
|
||||||
#if defined(PSA_WANT_ALG_ECDH) && \
|
#if (defined(PSA_WANT_ALG_ECDH) || defined(PSA_WANT_ALG_FFDH)) && \
|
||||||
(defined(MBEDTLS_USE_PSA_CRYPTO) || defined(MBEDTLS_SSL_PROTO_TLS1_3))
|
(defined(MBEDTLS_USE_PSA_CRYPTO) || defined(MBEDTLS_SSL_PROTO_TLS1_3))
|
||||||
psa_key_type_t ecdh_psa_type;
|
psa_key_type_t ecdh_psa_type;
|
||||||
size_t ecdh_bits;
|
size_t ecdh_bits;
|
||||||
mbedtls_svc_key_id_t ecdh_psa_privkey;
|
mbedtls_svc_key_id_t ecdh_psa_privkey;
|
||||||
uint8_t ecdh_psa_privkey_is_external;
|
uint8_t ecdh_psa_privkey_is_external;
|
||||||
|
#if defined(PSA_WANT_ALG_FFDH)
|
||||||
|
unsigned char ecdh_psa_peerkey[MBEDTLS_PSA_MAX_FFDH_PUBKEY_LENGTH];
|
||||||
|
#else
|
||||||
unsigned char ecdh_psa_peerkey[MBEDTLS_PSA_MAX_EC_PUBKEY_LENGTH];
|
unsigned char ecdh_psa_peerkey[MBEDTLS_PSA_MAX_EC_PUBKEY_LENGTH];
|
||||||
|
#endif
|
||||||
size_t ecdh_psa_peerkey_len;
|
size_t ecdh_psa_peerkey_len;
|
||||||
#endif /* PSA_WANT_ALG_ECDH &&
|
#endif /* (PSA_WANT_ALG_ECDH || PSA_WANT_ALG_FFDH) &&
|
||||||
(MBEDTLS_USE_PSA_CRYPTO || MBEDTLS_SSL_PROTO_TLS1_3) */
|
(MBEDTLS_USE_PSA_CRYPTO || MBEDTLS_SSL_PROTO_TLS1_3) */
|
||||||
|
|
||||||
#if defined(MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED)
|
#if defined(MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED)
|
||||||
@ -2122,6 +2126,13 @@ int mbedtls_ssl_tls13_generate_and_write_ecdh_key_exchange(
|
|||||||
size_t *out_len);
|
size_t *out_len);
|
||||||
#endif /* PSA_WANT_ALG_ECDH */
|
#endif /* PSA_WANT_ALG_ECDH */
|
||||||
|
|
||||||
|
int mbedtls_ssl_tls13_generate_and_write_dhe_key_exchange(
|
||||||
|
mbedtls_ssl_context *ssl,
|
||||||
|
uint16_t named_group,
|
||||||
|
unsigned char *buf,
|
||||||
|
unsigned char *end,
|
||||||
|
size_t *out_len);
|
||||||
|
|
||||||
#if defined(MBEDTLS_SSL_EARLY_DATA)
|
#if defined(MBEDTLS_SSL_EARLY_DATA)
|
||||||
int mbedtls_ssl_tls13_write_early_data_ext(mbedtls_ssl_context *ssl,
|
int mbedtls_ssl_tls13_write_early_data_ext(mbedtls_ssl_context *ssl,
|
||||||
unsigned char *buf,
|
unsigned char *buf,
|
||||||
@ -2245,9 +2256,15 @@ static inline int mbedtls_ssl_named_group_is_supported(uint16_t named_group)
|
|||||||
return 1;
|
return 1;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
#else
|
#endif
|
||||||
((void) named_group);
|
#if defined(PSA_WANT_ALG_FFDH)
|
||||||
#endif /* PSA_WANT_ALG_ECDH */
|
if (mbedtls_ssl_tls13_named_group_is_dhe(named_group)) {
|
||||||
|
return 1;
|
||||||
|
}
|
||||||
|
#endif
|
||||||
|
#if !defined(PSA_WANT_ALG_ECDH) && !defined(PSA_WANT_ALG_FFDH)
|
||||||
|
(void) named_group;
|
||||||
|
#endif
|
||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
Loading…
x
Reference in New Issue
Block a user