blob: 9dfa8680637b37c5972424080a0fc6b413d859d3 [file] [log] [blame]
Manuel Pégourié-Gonnard0bad5c22013-01-26 15:30:46 +01001/*
2 * Elliptic curve Diffie-Hellman
3 *
Bence Szépkúti1e148272020-08-07 13:07:28 +02004 * Copyright The Mbed TLS Contributors
Manuel Pégourié-Gonnard37ff1402015-09-04 14:21:07 +02005 * SPDX-License-Identifier: Apache-2.0
6 *
7 * Licensed under the Apache License, Version 2.0 (the "License"); you may
8 * not use this file except in compliance with the License.
9 * You may obtain a copy of the License at
10 *
11 * http://www.apache.org/licenses/LICENSE-2.0
12 *
13 * Unless required by applicable law or agreed to in writing, software
14 * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
15 * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
16 * See the License for the specific language governing permissions and
17 * limitations under the License.
Manuel Pégourié-Gonnard0bad5c22013-01-26 15:30:46 +010018 */
19
20/*
21 * References:
22 *
23 * SEC1 http://www.secg.org/index.php?action=secg,docs_secg
Manuel Pégourié-Gonnard63533e42013-02-10 14:21:04 +010024 * RFC 4492
Manuel Pégourié-Gonnard0bad5c22013-01-26 15:30:46 +010025 */
26
Gilles Peskinedb09ef62020-06-03 01:43:33 +020027#include "common.h"
Manuel Pégourié-Gonnard0bad5c22013-01-26 15:30:46 +010028
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020029#if defined(MBEDTLS_ECDH_C)
Manuel Pégourié-Gonnard0bad5c22013-01-26 15:30:46 +010030
Manuel Pégourié-Gonnard7f809972015-03-09 17:05:11 +000031#include "mbedtls/ecdh.h"
Hanno Becker91796d72018-12-17 18:10:51 +000032#include "mbedtls/platform_util.h"
Janos Follath24eed8d2019-11-22 13:21:35 +000033#include "mbedtls/error.h"
Manuel Pégourié-Gonnard0bad5c22013-01-26 15:30:46 +010034
Rich Evans00ab4702015-02-06 13:43:58 +000035#include <string.h>
36
Hanno Becker91796d72018-12-17 18:10:51 +000037/* Parameter validation macros based on platform_util.h */
38#define ECDH_VALIDATE_RET( cond ) \
39 MBEDTLS_INTERNAL_VALIDATE_RET( cond, MBEDTLS_ERR_ECP_BAD_INPUT_DATA )
40#define ECDH_VALIDATE( cond ) \
41 MBEDTLS_INTERNAL_VALIDATE( cond )
42
Janos Follath5a3e1bf2018-08-13 15:54:22 +010043#if defined(MBEDTLS_ECDH_LEGACY_CONTEXT)
44typedef mbedtls_ecdh_context mbedtls_ecdh_context_mbed;
45#endif
46
Gilles Peskine30816292019-02-22 12:31:25 +010047static mbedtls_ecp_group_id mbedtls_ecdh_grp_id(
48 const mbedtls_ecdh_context *ctx )
49{
50#if defined(MBEDTLS_ECDH_LEGACY_CONTEXT)
51 return( ctx->grp.id );
52#else
53 return( ctx->grp_id );
54#endif
55}
56
Gilles Peskine20b3ef32019-02-11 18:41:27 +010057int mbedtls_ecdh_can_do( mbedtls_ecp_group_id gid )
58{
59 /* At this time, all groups support ECDH. */
60 (void) gid;
Christoph M. Wintersteigerc25df682019-04-16 12:54:56 +010061 return( 1 );
Gilles Peskine20b3ef32019-02-11 18:41:27 +010062}
63
Ron Eldora84c1cb2017-10-10 19:04:27 +030064#if !defined(MBEDTLS_ECDH_GEN_PUBLIC_ALT)
Manuel Pégourié-Gonnard6545ca72013-01-26 16:05:22 +010065/*
Manuel Pégourié-Gonnard66ba48a2017-04-27 11:38:26 +020066 * Generate public key (restartable version)
Manuel Pégourié-Gonnardc0edc962018-10-16 10:38:19 +020067 *
68 * Note: this internal function relies on its caller preserving the value of
Manuel Pégourié-Gonnardca29fdf2018-10-22 09:56:53 +020069 * the output parameter 'd' across continuation calls. This would not be
Manuel Pégourié-Gonnardc0edc962018-10-16 10:38:19 +020070 * acceptable for a public function but is OK here as we control call sites.
Manuel Pégourié-Gonnard66ba48a2017-04-27 11:38:26 +020071 */
72static int ecdh_gen_public_restartable( mbedtls_ecp_group *grp,
73 mbedtls_mpi *d, mbedtls_ecp_point *Q,
74 int (*f_rng)(void *, unsigned char *, size_t),
75 void *p_rng,
76 mbedtls_ecp_restart_ctx *rs_ctx )
77{
Janos Follath24eed8d2019-11-22 13:21:35 +000078 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
Manuel Pégourié-Gonnard66ba48a2017-04-27 11:38:26 +020079
80 /* If multiplication is in progress, we already generated a privkey */
81#if defined(MBEDTLS_ECP_RESTARTABLE)
82 if( rs_ctx == NULL || rs_ctx->rsm == NULL )
83#endif
84 MBEDTLS_MPI_CHK( mbedtls_ecp_gen_privkey( grp, d, f_rng, p_rng ) );
85
86 MBEDTLS_MPI_CHK( mbedtls_ecp_mul_restartable( grp, Q, d, &grp->G,
87 f_rng, p_rng, rs_ctx ) );
88
89cleanup:
90 return( ret );
91}
92
93/*
94 * Generate public key
Manuel Pégourié-Gonnard6545ca72013-01-26 16:05:22 +010095 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020096int mbedtls_ecdh_gen_public( mbedtls_ecp_group *grp, mbedtls_mpi *d, mbedtls_ecp_point *Q,
Manuel Pégourié-Gonnard6545ca72013-01-26 16:05:22 +010097 int (*f_rng)(void *, unsigned char *, size_t),
98 void *p_rng )
99{
Hanno Becker91796d72018-12-17 18:10:51 +0000100 ECDH_VALIDATE_RET( grp != NULL );
101 ECDH_VALIDATE_RET( d != NULL );
102 ECDH_VALIDATE_RET( Q != NULL );
103 ECDH_VALIDATE_RET( f_rng != NULL );
Manuel Pégourié-Gonnard66ba48a2017-04-27 11:38:26 +0200104 return( ecdh_gen_public_restartable( grp, d, Q, f_rng, p_rng, NULL ) );
Manuel Pégourié-Gonnard6545ca72013-01-26 16:05:22 +0100105}
Ron Eldor936d2842018-11-01 13:05:52 +0200106#endif /* !MBEDTLS_ECDH_GEN_PUBLIC_ALT */
Manuel Pégourié-Gonnard6545ca72013-01-26 16:05:22 +0100107
Ron Eldora84c1cb2017-10-10 19:04:27 +0300108#if !defined(MBEDTLS_ECDH_COMPUTE_SHARED_ALT)
Manuel Pégourié-Gonnard6545ca72013-01-26 16:05:22 +0100109/*
110 * Compute shared secret (SEC1 3.3.1)
111 */
Manuel Pégourié-Gonnard66ba48a2017-04-27 11:38:26 +0200112static int ecdh_compute_shared_restartable( mbedtls_ecp_group *grp,
113 mbedtls_mpi *z,
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200114 const mbedtls_ecp_point *Q, const mbedtls_mpi *d,
Manuel Pégourié-Gonnarde09d2f82013-09-02 14:29:09 +0200115 int (*f_rng)(void *, unsigned char *, size_t),
Manuel Pégourié-Gonnard66ba48a2017-04-27 11:38:26 +0200116 void *p_rng,
117 mbedtls_ecp_restart_ctx *rs_ctx )
Manuel Pégourié-Gonnard6545ca72013-01-26 16:05:22 +0100118{
Janos Follath24eed8d2019-11-22 13:21:35 +0000119 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200120 mbedtls_ecp_point P;
Manuel Pégourié-Gonnard6545ca72013-01-26 16:05:22 +0100121
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200122 mbedtls_ecp_point_init( &P );
Manuel Pégourié-Gonnard6545ca72013-01-26 16:05:22 +0100123
Manuel Pégourié-Gonnard66ba48a2017-04-27 11:38:26 +0200124 MBEDTLS_MPI_CHK( mbedtls_ecp_mul_restartable( grp, &P, d, Q,
125 f_rng, p_rng, rs_ctx ) );
Manuel Pégourié-Gonnard6545ca72013-01-26 16:05:22 +0100126
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200127 if( mbedtls_ecp_is_zero( &P ) )
Paul Bakkerb548d772013-07-26 14:21:34 +0200128 {
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200129 ret = MBEDTLS_ERR_ECP_BAD_INPUT_DATA;
Paul Bakkerb548d772013-07-26 14:21:34 +0200130 goto cleanup;
131 }
Manuel Pégourié-Gonnard6545ca72013-01-26 16:05:22 +0100132
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200133 MBEDTLS_MPI_CHK( mbedtls_mpi_copy( z, &P.X ) );
Manuel Pégourié-Gonnard6545ca72013-01-26 16:05:22 +0100134
135cleanup:
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200136 mbedtls_ecp_point_free( &P );
Manuel Pégourié-Gonnard6545ca72013-01-26 16:05:22 +0100137
138 return( ret );
139}
140
Manuel Pégourié-Gonnard63533e42013-02-10 14:21:04 +0100141/*
Manuel Pégourié-Gonnard66ba48a2017-04-27 11:38:26 +0200142 * Compute shared secret (SEC1 3.3.1)
143 */
144int mbedtls_ecdh_compute_shared( mbedtls_ecp_group *grp, mbedtls_mpi *z,
145 const mbedtls_ecp_point *Q, const mbedtls_mpi *d,
146 int (*f_rng)(void *, unsigned char *, size_t),
147 void *p_rng )
148{
Hanno Becker91796d72018-12-17 18:10:51 +0000149 ECDH_VALIDATE_RET( grp != NULL );
150 ECDH_VALIDATE_RET( Q != NULL );
151 ECDH_VALIDATE_RET( d != NULL );
152 ECDH_VALIDATE_RET( z != NULL );
Manuel Pégourié-Gonnard66ba48a2017-04-27 11:38:26 +0200153 return( ecdh_compute_shared_restartable( grp, z, Q, d,
154 f_rng, p_rng, NULL ) );
155}
Ron Eldor936d2842018-11-01 13:05:52 +0200156#endif /* !MBEDTLS_ECDH_COMPUTE_SHARED_ALT */
Manuel Pégourié-Gonnard66ba48a2017-04-27 11:38:26 +0200157
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100158static void ecdh_init_internal( mbedtls_ecdh_context_mbed *ctx )
Manuel Pégourié-Gonnard63533e42013-02-10 14:21:04 +0100159{
Manuel Pégourié-Gonnard5bd38b12017-08-23 16:55:59 +0200160 mbedtls_ecp_group_init( &ctx->grp );
161 mbedtls_mpi_init( &ctx->d );
162 mbedtls_ecp_point_init( &ctx->Q );
163 mbedtls_ecp_point_init( &ctx->Qp );
164 mbedtls_mpi_init( &ctx->z );
Manuel Pégourié-Gonnard66ba48a2017-04-27 11:38:26 +0200165
166#if defined(MBEDTLS_ECP_RESTARTABLE)
167 mbedtls_ecp_restart_init( &ctx->rs );
168#endif
Manuel Pégourié-Gonnard63533e42013-02-10 14:21:04 +0100169}
170
Manuel Pégourié-Gonnard63533e42013-02-10 14:21:04 +0100171/*
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100172 * Initialize context
Janos Follathf61e4862018-10-30 11:53:25 +0000173 */
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100174void mbedtls_ecdh_init( mbedtls_ecdh_context *ctx )
175{
Hanno Becker91796d72018-12-17 18:10:51 +0000176 ECDH_VALIDATE( ctx != NULL );
177
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100178#if defined(MBEDTLS_ECDH_LEGACY_CONTEXT)
179 ecdh_init_internal( ctx );
180 mbedtls_ecp_point_init( &ctx->Vi );
181 mbedtls_ecp_point_init( &ctx->Vf );
182 mbedtls_mpi_init( &ctx->_d );
183#else
Christoph M. Wintersteigerd8c45d52019-02-20 17:16:53 +0000184 memset( ctx, 0, sizeof( mbedtls_ecdh_context ) );
185
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100186 ctx->var = MBEDTLS_ECDH_VARIANT_NONE;
187#endif
188 ctx->point_format = MBEDTLS_ECP_PF_UNCOMPRESSED;
189#if defined(MBEDTLS_ECP_RESTARTABLE)
190 ctx->restart_enabled = 0;
191#endif
192}
193
194static int ecdh_setup_internal( mbedtls_ecdh_context_mbed *ctx,
195 mbedtls_ecp_group_id grp_id )
Janos Follathf61e4862018-10-30 11:53:25 +0000196{
Janos Follath24eed8d2019-11-22 13:21:35 +0000197 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
Janos Follathf61e4862018-10-30 11:53:25 +0000198
199 ret = mbedtls_ecp_group_load( &ctx->grp, grp_id );
200 if( ret != 0 )
201 {
Janos Follathf61e4862018-10-30 11:53:25 +0000202 return( MBEDTLS_ERR_ECP_FEATURE_UNAVAILABLE );
203 }
204
205 return( 0 );
206}
207
208/*
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100209 * Setup context
Manuel Pégourié-Gonnard63533e42013-02-10 14:21:04 +0100210 */
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100211int mbedtls_ecdh_setup( mbedtls_ecdh_context *ctx, mbedtls_ecp_group_id grp_id )
Manuel Pégourié-Gonnard63533e42013-02-10 14:21:04 +0100212{
Hanno Becker91796d72018-12-17 18:10:51 +0000213 ECDH_VALIDATE_RET( ctx != NULL );
Manuel Pégourié-Gonnard63533e42013-02-10 14:21:04 +0100214
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100215#if defined(MBEDTLS_ECDH_LEGACY_CONTEXT)
216 return( ecdh_setup_internal( ctx, grp_id ) );
217#else
218 switch( grp_id )
219 {
Christoph M. Wintersteigerc9f737b2018-10-25 13:03:05 +0100220#if defined(MBEDTLS_ECDH_VARIANT_EVEREST_ENABLED)
Christoph M. Wintersteiger3ff60bc2019-02-15 12:59:59 +0000221 case MBEDTLS_ECP_DP_CURVE25519:
222 ctx->point_format = MBEDTLS_ECP_PF_COMPRESSED;
223 ctx->var = MBEDTLS_ECDH_VARIANT_EVEREST;
224 ctx->grp_id = grp_id;
225 return( mbedtls_everest_setup( &ctx->ctx.everest_ecdh, grp_id ) );
Christoph M. Wintersteiger78c9c462018-12-06 17:16:32 +0000226#endif
Christoph M. Wintersteiger3ff60bc2019-02-15 12:59:59 +0000227 default:
228 ctx->point_format = MBEDTLS_ECP_PF_UNCOMPRESSED;
229 ctx->var = MBEDTLS_ECDH_VARIANT_MBEDTLS_2_0;
230 ctx->grp_id = grp_id;
231 ecdh_init_internal( &ctx->ctx.mbed_ecdh );
232 return( ecdh_setup_internal( &ctx->ctx.mbed_ecdh, grp_id ) );
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100233 }
234#endif
235}
236
237static void ecdh_free_internal( mbedtls_ecdh_context_mbed *ctx )
238{
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200239 mbedtls_ecp_group_free( &ctx->grp );
Manuel Pégourié-Gonnard5bd38b12017-08-23 16:55:59 +0200240 mbedtls_mpi_free( &ctx->d );
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200241 mbedtls_ecp_point_free( &ctx->Q );
242 mbedtls_ecp_point_free( &ctx->Qp );
Manuel Pégourié-Gonnard5bd38b12017-08-23 16:55:59 +0200243 mbedtls_mpi_free( &ctx->z );
Manuel Pégourié-Gonnard66ba48a2017-04-27 11:38:26 +0200244
245#if defined(MBEDTLS_ECP_RESTARTABLE)
246 mbedtls_ecp_restart_free( &ctx->rs );
247#endif
Manuel Pégourié-Gonnard63533e42013-02-10 14:21:04 +0100248}
249
Manuel Pégourié-Gonnard23e41622017-05-18 12:35:37 +0200250#if defined(MBEDTLS_ECP_RESTARTABLE)
251/*
252 * Enable restartable operations for context
253 */
254void mbedtls_ecdh_enable_restart( mbedtls_ecdh_context *ctx )
255{
Hanno Beckera7634e82018-12-18 18:45:00 +0000256 ECDH_VALIDATE( ctx != NULL );
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100257
Manuel Pégourié-Gonnard23e41622017-05-18 12:35:37 +0200258 ctx->restart_enabled = 1;
259}
260#endif
261
Manuel Pégourié-Gonnard13724762013-02-10 15:01:54 +0100262/*
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100263 * Free context
Manuel Pégourié-Gonnard13724762013-02-10 15:01:54 +0100264 */
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100265void mbedtls_ecdh_free( mbedtls_ecdh_context *ctx )
266{
267 if( ctx == NULL )
268 return;
269
270#if defined(MBEDTLS_ECDH_LEGACY_CONTEXT)
271 mbedtls_ecp_point_free( &ctx->Vi );
272 mbedtls_ecp_point_free( &ctx->Vf );
273 mbedtls_mpi_free( &ctx->_d );
274 ecdh_free_internal( ctx );
275#else
276 switch( ctx->var )
277 {
Christoph M. Wintersteigerc9f737b2018-10-25 13:03:05 +0100278#if defined(MBEDTLS_ECDH_VARIANT_EVEREST_ENABLED)
279 case MBEDTLS_ECDH_VARIANT_EVEREST:
Christoph M. Wintersteiger4936beb2018-12-12 17:26:41 +0000280 mbedtls_everest_free( &ctx->ctx.everest_ecdh );
Christoph M. Wintersteigerc9f737b2018-10-25 13:03:05 +0100281 break;
282#endif
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100283 case MBEDTLS_ECDH_VARIANT_MBEDTLS_2_0:
284 ecdh_free_internal( &ctx->ctx.mbed_ecdh );
285 break;
286 default:
287 break;
288 }
289
290 ctx->point_format = MBEDTLS_ECP_PF_UNCOMPRESSED;
291 ctx->var = MBEDTLS_ECDH_VARIANT_NONE;
292 ctx->grp_id = MBEDTLS_ECP_DP_NONE;
293#endif
294}
295
296static int ecdh_make_params_internal( mbedtls_ecdh_context_mbed *ctx,
297 size_t *olen, int point_format,
298 unsigned char *buf, size_t blen,
299 int (*f_rng)(void *,
300 unsigned char *,
301 size_t),
302 void *p_rng,
303 int restart_enabled )
Manuel Pégourié-Gonnard13724762013-02-10 15:01:54 +0100304{
Janos Follath24eed8d2019-11-22 13:21:35 +0000305 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
Manuel Pégourié-Gonnard13724762013-02-10 15:01:54 +0100306 size_t grp_len, pt_len;
Ron Eldor2981d8f2018-11-05 18:07:10 +0200307#if defined(MBEDTLS_ECP_RESTARTABLE)
Manuel Pégourié-Gonnard66ba48a2017-04-27 11:38:26 +0200308 mbedtls_ecp_restart_ctx *rs_ctx = NULL;
Ron Eldor936d2842018-11-01 13:05:52 +0200309#endif
Manuel Pégourié-Gonnard13724762013-02-10 15:01:54 +0100310
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100311 if( ctx->grp.pbits == 0 )
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200312 return( MBEDTLS_ERR_ECP_BAD_INPUT_DATA );
Manuel Pégourié-Gonnardf35b7392013-02-11 22:12:39 +0100313
Ron Eldor19779c42018-11-05 16:58:13 +0200314#if defined(MBEDTLS_ECP_RESTARTABLE)
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100315 if( restart_enabled )
Manuel Pégourié-Gonnard23e41622017-05-18 12:35:37 +0200316 rs_ctx = &ctx->rs;
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100317#else
318 (void) restart_enabled;
Manuel Pégourié-Gonnard66ba48a2017-04-27 11:38:26 +0200319#endif
320
Ron Eldor8493f802018-11-01 11:32:15 +0200321
Ron Eldor2981d8f2018-11-05 18:07:10 +0200322#if defined(MBEDTLS_ECP_RESTARTABLE)
Manuel Pégourié-Gonnard66ba48a2017-04-27 11:38:26 +0200323 if( ( ret = ecdh_gen_public_restartable( &ctx->grp, &ctx->d, &ctx->Q,
Manuel Pégourié-Gonnardee68cff2018-10-15 15:27:49 +0200324 f_rng, p_rng, rs_ctx ) ) != 0 )
Manuel Pégourié-Gonnard13724762013-02-10 15:01:54 +0100325 return( ret );
Ron Eldor2981d8f2018-11-05 18:07:10 +0200326#else
327 if( ( ret = mbedtls_ecdh_gen_public( &ctx->grp, &ctx->d, &ctx->Q,
328 f_rng, p_rng ) ) != 0 )
329 return( ret );
330#endif /* MBEDTLS_ECP_RESTARTABLE */
Manuel Pégourié-Gonnard13724762013-02-10 15:01:54 +0100331
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100332 if( ( ret = mbedtls_ecp_tls_write_group( &ctx->grp, &grp_len, buf,
333 blen ) ) != 0 )
Manuel Pégourié-Gonnard13724762013-02-10 15:01:54 +0100334 return( ret );
335
336 buf += grp_len;
337 blen -= grp_len;
338
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100339 if( ( ret = mbedtls_ecp_tls_write_point( &ctx->grp, &ctx->Q, point_format,
Manuel Pégourié-Gonnardee68cff2018-10-15 15:27:49 +0200340 &pt_len, buf, blen ) ) != 0 )
Manuel Pégourié-Gonnard13724762013-02-10 15:01:54 +0100341 return( ret );
342
343 *olen = grp_len + pt_len;
Paul Bakkerd8bb8262014-06-17 14:06:49 +0200344 return( 0 );
Manuel Pégourié-Gonnard13724762013-02-10 15:01:54 +0100345}
346
Manuel Pégourié-Gonnard854fbd72013-02-11 20:28:55 +0100347/*
Christoph M. Wintersteigerc9f737b2018-10-25 13:03:05 +0100348 * Setup and write the ServerKeyExchange parameters (RFC 4492)
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100349 * struct {
350 * ECParameters curve_params;
351 * ECPoint public;
352 * } ServerECDHParams;
353 */
354int mbedtls_ecdh_make_params( mbedtls_ecdh_context *ctx, size_t *olen,
355 unsigned char *buf, size_t blen,
356 int (*f_rng)(void *, unsigned char *, size_t),
357 void *p_rng )
358{
359 int restart_enabled = 0;
Hanno Becker91796d72018-12-17 18:10:51 +0000360 ECDH_VALIDATE_RET( ctx != NULL );
361 ECDH_VALIDATE_RET( olen != NULL );
362 ECDH_VALIDATE_RET( buf != NULL );
363 ECDH_VALIDATE_RET( f_rng != NULL );
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100364
365#if defined(MBEDTLS_ECP_RESTARTABLE)
366 restart_enabled = ctx->restart_enabled;
367#else
368 (void) restart_enabled;
369#endif
370
371#if defined(MBEDTLS_ECDH_LEGACY_CONTEXT)
372 return( ecdh_make_params_internal( ctx, olen, ctx->point_format, buf, blen,
373 f_rng, p_rng, restart_enabled ) );
374#else
375 switch( ctx->var )
376 {
Christoph M. Wintersteigerc9f737b2018-10-25 13:03:05 +0100377#if defined(MBEDTLS_ECDH_VARIANT_EVEREST_ENABLED)
378 case MBEDTLS_ECDH_VARIANT_EVEREST:
Christoph M. Wintersteiger4936beb2018-12-12 17:26:41 +0000379 return( mbedtls_everest_make_params( &ctx->ctx.everest_ecdh, olen,
380 buf, blen, f_rng, p_rng ) );
Christoph M. Wintersteigerc9f737b2018-10-25 13:03:05 +0100381#endif
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100382 case MBEDTLS_ECDH_VARIANT_MBEDTLS_2_0:
383 return( ecdh_make_params_internal( &ctx->ctx.mbed_ecdh, olen,
384 ctx->point_format, buf, blen,
385 f_rng, p_rng,
386 restart_enabled ) );
387 default:
388 return MBEDTLS_ERR_ECP_BAD_INPUT_DATA;
389 }
390#endif
391}
392
393static int ecdh_read_params_internal( mbedtls_ecdh_context_mbed *ctx,
394 const unsigned char **buf,
395 const unsigned char *end )
396{
397 return( mbedtls_ecp_tls_read_point( &ctx->grp, &ctx->Qp, buf,
398 end - *buf ) );
399}
400
401/*
Manuel Pégourié-Gonnard854fbd72013-02-11 20:28:55 +0100402 * Read the ServerKeyExhange parameters (RFC 4492)
403 * struct {
404 * ECParameters curve_params;
405 * ECPoint public;
406 * } ServerECDHParams;
407 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200408int mbedtls_ecdh_read_params( mbedtls_ecdh_context *ctx,
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100409 const unsigned char **buf,
410 const unsigned char *end )
Manuel Pégourié-Gonnard854fbd72013-02-11 20:28:55 +0100411{
Janos Follath24eed8d2019-11-22 13:21:35 +0000412 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
Janos Follathf61e4862018-10-30 11:53:25 +0000413 mbedtls_ecp_group_id grp_id;
Hanno Becker91796d72018-12-17 18:10:51 +0000414 ECDH_VALIDATE_RET( ctx != NULL );
415 ECDH_VALIDATE_RET( buf != NULL );
416 ECDH_VALIDATE_RET( *buf != NULL );
417 ECDH_VALIDATE_RET( end != NULL );
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100418
Janos Follathf61e4862018-10-30 11:53:25 +0000419 if( ( ret = mbedtls_ecp_tls_read_group_id( &grp_id, buf, end - *buf ) )
420 != 0 )
Manuel Pégourié-Gonnard854fbd72013-02-11 20:28:55 +0100421 return( ret );
422
Janos Follathf61e4862018-10-30 11:53:25 +0000423 if( ( ret = mbedtls_ecdh_setup( ctx, grp_id ) ) != 0 )
424 return( ret );
425
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100426#if defined(MBEDTLS_ECDH_LEGACY_CONTEXT)
427 return( ecdh_read_params_internal( ctx, buf, end ) );
428#else
429 switch( ctx->var )
430 {
Christoph M. Wintersteigerc9f737b2018-10-25 13:03:05 +0100431#if defined(MBEDTLS_ECDH_VARIANT_EVEREST_ENABLED)
432 case MBEDTLS_ECDH_VARIANT_EVEREST:
Christoph M. Wintersteiger4936beb2018-12-12 17:26:41 +0000433 return( mbedtls_everest_read_params( &ctx->ctx.everest_ecdh,
434 buf, end) );
Christoph M. Wintersteigerc9f737b2018-10-25 13:03:05 +0100435#endif
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100436 case MBEDTLS_ECDH_VARIANT_MBEDTLS_2_0:
437 return( ecdh_read_params_internal( &ctx->ctx.mbed_ecdh,
438 buf, end ) );
439 default:
440 return MBEDTLS_ERR_ECP_BAD_INPUT_DATA;
441 }
442#endif
Manuel Pégourié-Gonnard854fbd72013-02-11 20:28:55 +0100443}
Manuel Pégourié-Gonnard0bad5c22013-01-26 15:30:46 +0100444
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100445static int ecdh_get_params_internal( mbedtls_ecdh_context_mbed *ctx,
446 const mbedtls_ecp_keypair *key,
447 mbedtls_ecdh_side side )
Manuel Pégourié-Gonnardcdff3cf2013-12-12 09:55:52 +0100448{
Janos Follath24eed8d2019-11-22 13:21:35 +0000449 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
Manuel Pégourié-Gonnardcdff3cf2013-12-12 09:55:52 +0100450
Manuel Pégourié-Gonnardcdff3cf2013-12-12 09:55:52 +0100451 /* If it's not our key, just import the public part as Qp */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200452 if( side == MBEDTLS_ECDH_THEIRS )
453 return( mbedtls_ecp_copy( &ctx->Qp, &key->Q ) );
Manuel Pégourié-Gonnardcdff3cf2013-12-12 09:55:52 +0100454
455 /* Our key: import public (as Q) and private parts */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200456 if( side != MBEDTLS_ECDH_OURS )
457 return( MBEDTLS_ERR_ECP_BAD_INPUT_DATA );
Manuel Pégourié-Gonnardcdff3cf2013-12-12 09:55:52 +0100458
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200459 if( ( ret = mbedtls_ecp_copy( &ctx->Q, &key->Q ) ) != 0 ||
460 ( ret = mbedtls_mpi_copy( &ctx->d, &key->d ) ) != 0 )
Manuel Pégourié-Gonnardcdff3cf2013-12-12 09:55:52 +0100461 return( ret );
462
463 return( 0 );
464}
465
466/*
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100467 * Get parameters from a keypair
Manuel Pégourié-Gonnard5cceb412013-02-11 21:51:45 +0100468 */
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100469int mbedtls_ecdh_get_params( mbedtls_ecdh_context *ctx,
470 const mbedtls_ecp_keypair *key,
471 mbedtls_ecdh_side side )
472{
Janos Follath24eed8d2019-11-22 13:21:35 +0000473 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
Hanno Becker91796d72018-12-17 18:10:51 +0000474 ECDH_VALIDATE_RET( ctx != NULL );
475 ECDH_VALIDATE_RET( key != NULL );
476 ECDH_VALIDATE_RET( side == MBEDTLS_ECDH_OURS ||
477 side == MBEDTLS_ECDH_THEIRS );
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100478
Gilles Peskine30816292019-02-22 12:31:25 +0100479 if( mbedtls_ecdh_grp_id( ctx ) == MBEDTLS_ECP_DP_NONE )
Gilles Peskine0b1b71d2018-11-07 22:10:59 +0100480 {
481 /* This is the first call to get_params(). Set up the context
482 * for use with the group. */
483 if( ( ret = mbedtls_ecdh_setup( ctx, key->grp.id ) ) != 0 )
484 return( ret );
485 }
486 else
487 {
488 /* This is not the first call to get_params(). Check that the
489 * current key's group is the same as the context's, which was set
490 * from the first key's group. */
Gilles Peskine30816292019-02-22 12:31:25 +0100491 if( mbedtls_ecdh_grp_id( ctx ) != key->grp.id )
Gilles Peskine0b1b71d2018-11-07 22:10:59 +0100492 return( MBEDTLS_ERR_ECP_BAD_INPUT_DATA );
493 }
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100494
495#if defined(MBEDTLS_ECDH_LEGACY_CONTEXT)
496 return( ecdh_get_params_internal( ctx, key, side ) );
497#else
498 switch( ctx->var )
499 {
Christoph M. Wintersteigerc9f737b2018-10-25 13:03:05 +0100500#if defined(MBEDTLS_ECDH_VARIANT_EVEREST_ENABLED)
501 case MBEDTLS_ECDH_VARIANT_EVEREST:
Christoph M. Wintersteiger4936beb2018-12-12 17:26:41 +0000502 {
Christoph M. Wintersteiger2e724a12019-01-07 14:19:41 +0000503 mbedtls_everest_ecdh_side s = side == MBEDTLS_ECDH_OURS ?
Christoph M. Wintersteiger4936beb2018-12-12 17:26:41 +0000504 MBEDTLS_EVEREST_ECDH_OURS :
505 MBEDTLS_EVEREST_ECDH_THEIRS;
506 return( mbedtls_everest_get_params( &ctx->ctx.everest_ecdh,
507 key, s) );
508 }
Christoph M. Wintersteigerc9f737b2018-10-25 13:03:05 +0100509#endif
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100510 case MBEDTLS_ECDH_VARIANT_MBEDTLS_2_0:
511 return( ecdh_get_params_internal( &ctx->ctx.mbed_ecdh,
512 key, side ) );
513 default:
514 return MBEDTLS_ERR_ECP_BAD_INPUT_DATA;
515 }
516#endif
517}
518
519static int ecdh_make_public_internal( mbedtls_ecdh_context_mbed *ctx,
520 size_t *olen, int point_format,
521 unsigned char *buf, size_t blen,
522 int (*f_rng)(void *,
523 unsigned char *,
524 size_t),
525 void *p_rng,
526 int restart_enabled )
Manuel Pégourié-Gonnard5cceb412013-02-11 21:51:45 +0100527{
Janos Follath24eed8d2019-11-22 13:21:35 +0000528 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
Ron Eldor2981d8f2018-11-05 18:07:10 +0200529#if defined(MBEDTLS_ECP_RESTARTABLE)
Manuel Pégourié-Gonnard66ba48a2017-04-27 11:38:26 +0200530 mbedtls_ecp_restart_ctx *rs_ctx = NULL;
Ron Eldor936d2842018-11-01 13:05:52 +0200531#endif
Manuel Pégourié-Gonnard5cceb412013-02-11 21:51:45 +0100532
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100533 if( ctx->grp.pbits == 0 )
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200534 return( MBEDTLS_ERR_ECP_BAD_INPUT_DATA );
Manuel Pégourié-Gonnardf35b7392013-02-11 22:12:39 +0100535
Ron Eldorb430d9f2018-11-05 17:18:29 +0200536#if defined(MBEDTLS_ECP_RESTARTABLE)
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100537 if( restart_enabled )
Manuel Pégourié-Gonnard23e41622017-05-18 12:35:37 +0200538 rs_ctx = &ctx->rs;
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100539#else
540 (void) restart_enabled;
Manuel Pégourié-Gonnard66ba48a2017-04-27 11:38:26 +0200541#endif
542
Ron Eldor2981d8f2018-11-05 18:07:10 +0200543#if defined(MBEDTLS_ECP_RESTARTABLE)
Manuel Pégourié-Gonnard66ba48a2017-04-27 11:38:26 +0200544 if( ( ret = ecdh_gen_public_restartable( &ctx->grp, &ctx->d, &ctx->Q,
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100545 f_rng, p_rng, rs_ctx ) ) != 0 )
Manuel Pégourié-Gonnard5cceb412013-02-11 21:51:45 +0100546 return( ret );
Ron Eldor2981d8f2018-11-05 18:07:10 +0200547#else
548 if( ( ret = mbedtls_ecdh_gen_public( &ctx->grp, &ctx->d, &ctx->Q,
549 f_rng, p_rng ) ) != 0 )
550 return( ret );
551#endif /* MBEDTLS_ECP_RESTARTABLE */
Manuel Pégourié-Gonnard5cceb412013-02-11 21:51:45 +0100552
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100553 return mbedtls_ecp_tls_write_point( &ctx->grp, &ctx->Q, point_format, olen,
554 buf, blen );
Manuel Pégourié-Gonnard5cceb412013-02-11 21:51:45 +0100555}
556
557/*
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100558 * Setup and export the client public value
Manuel Pégourié-Gonnard5cceb412013-02-11 21:51:45 +0100559 */
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100560int mbedtls_ecdh_make_public( mbedtls_ecdh_context *ctx, size_t *olen,
561 unsigned char *buf, size_t blen,
562 int (*f_rng)(void *, unsigned char *, size_t),
563 void *p_rng )
Manuel Pégourié-Gonnard5cceb412013-02-11 21:51:45 +0100564{
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100565 int restart_enabled = 0;
Hanno Becker91796d72018-12-17 18:10:51 +0000566 ECDH_VALIDATE_RET( ctx != NULL );
567 ECDH_VALIDATE_RET( olen != NULL );
568 ECDH_VALIDATE_RET( buf != NULL );
Hanno Beckerc81cfec2018-12-18 23:32:42 +0000569 ECDH_VALIDATE_RET( f_rng != NULL );
Manuel Pégourié-Gonnardf35b7392013-02-11 22:12:39 +0100570
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100571#if defined(MBEDTLS_ECP_RESTARTABLE)
572 restart_enabled = ctx->restart_enabled;
573#endif
574
575#if defined(MBEDTLS_ECDH_LEGACY_CONTEXT)
576 return( ecdh_make_public_internal( ctx, olen, ctx->point_format, buf, blen,
577 f_rng, p_rng, restart_enabled ) );
578#else
579 switch( ctx->var )
580 {
Christoph M. Wintersteigerc9f737b2018-10-25 13:03:05 +0100581#if defined(MBEDTLS_ECDH_VARIANT_EVEREST_ENABLED)
582 case MBEDTLS_ECDH_VARIANT_EVEREST:
Christoph M. Wintersteiger4936beb2018-12-12 17:26:41 +0000583 return( mbedtls_everest_make_public( &ctx->ctx.everest_ecdh, olen,
584 buf, blen, f_rng, p_rng ) );
Christoph M. Wintersteigerc9f737b2018-10-25 13:03:05 +0100585#endif
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100586 case MBEDTLS_ECDH_VARIANT_MBEDTLS_2_0:
587 return( ecdh_make_public_internal( &ctx->ctx.mbed_ecdh, olen,
588 ctx->point_format, buf, blen,
589 f_rng, p_rng,
590 restart_enabled ) );
591 default:
592 return MBEDTLS_ERR_ECP_BAD_INPUT_DATA;
593 }
594#endif
595}
596
597static int ecdh_read_public_internal( mbedtls_ecdh_context_mbed *ctx,
598 const unsigned char *buf, size_t blen )
599{
Janos Follath24eed8d2019-11-22 13:21:35 +0000600 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100601 const unsigned char *p = buf;
602
603 if( ( ret = mbedtls_ecp_tls_read_point( &ctx->grp, &ctx->Qp, &p,
604 blen ) ) != 0 )
Manuel Pégourié-Gonnard969ccc62014-03-26 19:53:25 +0100605 return( ret );
606
607 if( (size_t)( p - buf ) != blen )
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200608 return( MBEDTLS_ERR_ECP_BAD_INPUT_DATA );
Manuel Pégourié-Gonnard969ccc62014-03-26 19:53:25 +0100609
610 return( 0 );
Manuel Pégourié-Gonnard5cceb412013-02-11 21:51:45 +0100611}
612
Manuel Pégourié-Gonnard424fda52013-02-11 22:05:42 +0100613/*
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100614 * Parse and import the client's public value
Manuel Pégourié-Gonnard424fda52013-02-11 22:05:42 +0100615 */
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100616int mbedtls_ecdh_read_public( mbedtls_ecdh_context *ctx,
617 const unsigned char *buf, size_t blen )
618{
Hanno Becker91796d72018-12-17 18:10:51 +0000619 ECDH_VALIDATE_RET( ctx != NULL );
620 ECDH_VALIDATE_RET( buf != NULL );
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100621
622#if defined(MBEDTLS_ECDH_LEGACY_CONTEXT)
623 return( ecdh_read_public_internal( ctx, buf, blen ) );
624#else
625 switch( ctx->var )
626 {
Christoph M. Wintersteigerc9f737b2018-10-25 13:03:05 +0100627#if defined(MBEDTLS_ECDH_VARIANT_EVEREST_ENABLED)
628 case MBEDTLS_ECDH_VARIANT_EVEREST:
Christoph M. Wintersteiger4936beb2018-12-12 17:26:41 +0000629 return( mbedtls_everest_read_public( &ctx->ctx.everest_ecdh,
630 buf, blen ) );
Christoph M. Wintersteigerc9f737b2018-10-25 13:03:05 +0100631#endif
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100632 case MBEDTLS_ECDH_VARIANT_MBEDTLS_2_0:
633 return( ecdh_read_public_internal( &ctx->ctx.mbed_ecdh,
634 buf, blen ) );
635 default:
636 return MBEDTLS_ERR_ECP_BAD_INPUT_DATA;
637 }
638#endif
639}
640
641static int ecdh_calc_secret_internal( mbedtls_ecdh_context_mbed *ctx,
642 size_t *olen, unsigned char *buf,
643 size_t blen,
644 int (*f_rng)(void *,
645 unsigned char *,
646 size_t),
647 void *p_rng,
648 int restart_enabled )
Manuel Pégourié-Gonnard424fda52013-02-11 22:05:42 +0100649{
Janos Follath24eed8d2019-11-22 13:21:35 +0000650 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
Ron Eldor2981d8f2018-11-05 18:07:10 +0200651#if defined(MBEDTLS_ECP_RESTARTABLE)
Manuel Pégourié-Gonnard66ba48a2017-04-27 11:38:26 +0200652 mbedtls_ecp_restart_ctx *rs_ctx = NULL;
Ron Eldor936d2842018-11-01 13:05:52 +0200653#endif
Manuel Pégourié-Gonnard424fda52013-02-11 22:05:42 +0100654
Manuel Pégourié-Gonnard66ba48a2017-04-27 11:38:26 +0200655 if( ctx == NULL || ctx->grp.pbits == 0 )
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200656 return( MBEDTLS_ERR_ECP_BAD_INPUT_DATA );
Manuel Pégourié-Gonnardf35b7392013-02-11 22:12:39 +0100657
Ron Eldorb430d9f2018-11-05 17:18:29 +0200658#if defined(MBEDTLS_ECP_RESTARTABLE)
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100659 if( restart_enabled )
Manuel Pégourié-Gonnard23e41622017-05-18 12:35:37 +0200660 rs_ctx = &ctx->rs;
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100661#else
662 (void) restart_enabled;
Manuel Pégourié-Gonnard66ba48a2017-04-27 11:38:26 +0200663#endif
664
Ron Eldor2981d8f2018-11-05 18:07:10 +0200665#if defined(MBEDTLS_ECP_RESTARTABLE)
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100666 if( ( ret = ecdh_compute_shared_restartable( &ctx->grp, &ctx->z, &ctx->Qp,
667 &ctx->d, f_rng, p_rng,
668 rs_ctx ) ) != 0 )
Manuel Pégourié-Gonnarde09d2f82013-09-02 14:29:09 +0200669 {
Manuel Pégourié-Gonnard424fda52013-02-11 22:05:42 +0100670 return( ret );
Manuel Pégourié-Gonnarde09d2f82013-09-02 14:29:09 +0200671 }
Ron Eldor2981d8f2018-11-05 18:07:10 +0200672#else
673 if( ( ret = mbedtls_ecdh_compute_shared( &ctx->grp, &ctx->z, &ctx->Qp,
674 &ctx->d, f_rng, p_rng ) ) != 0 )
675 {
676 return( ret );
677 }
678#endif /* MBEDTLS_ECP_RESTARTABLE */
Manuel Pégourié-Gonnard424fda52013-02-11 22:05:42 +0100679
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200680 if( mbedtls_mpi_size( &ctx->z ) > blen )
681 return( MBEDTLS_ERR_ECP_BAD_INPUT_DATA );
Paul Bakker41c83d32013-03-20 14:39:14 +0100682
Manuel Pégourié-Gonnard0a56c2c2014-01-17 21:24:04 +0100683 *olen = ctx->grp.pbits / 8 + ( ( ctx->grp.pbits % 8 ) != 0 );
Janos Follathab0f71a2019-02-20 10:48:49 +0000684
Janos Follath52ff8e92019-02-26 13:56:04 +0000685 if( mbedtls_ecp_get_type( &ctx->grp ) == MBEDTLS_ECP_TYPE_MONTGOMERY )
Janos Follathab0f71a2019-02-20 10:48:49 +0000686 return mbedtls_mpi_write_binary_le( &ctx->z, buf, *olen );
687
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200688 return mbedtls_mpi_write_binary( &ctx->z, buf, *olen );
Manuel Pégourié-Gonnard424fda52013-02-11 22:05:42 +0100689}
690
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100691/*
692 * Derive and export the shared secret
693 */
694int mbedtls_ecdh_calc_secret( mbedtls_ecdh_context *ctx, size_t *olen,
695 unsigned char *buf, size_t blen,
696 int (*f_rng)(void *, unsigned char *, size_t),
697 void *p_rng )
698{
699 int restart_enabled = 0;
Hanno Becker91796d72018-12-17 18:10:51 +0000700 ECDH_VALIDATE_RET( ctx != NULL );
701 ECDH_VALIDATE_RET( olen != NULL );
702 ECDH_VALIDATE_RET( buf != NULL );
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100703
704#if defined(MBEDTLS_ECP_RESTARTABLE)
705 restart_enabled = ctx->restart_enabled;
706#endif
707
708#if defined(MBEDTLS_ECDH_LEGACY_CONTEXT)
709 return( ecdh_calc_secret_internal( ctx, olen, buf, blen, f_rng, p_rng,
710 restart_enabled ) );
711#else
712 switch( ctx->var )
713 {
Christoph M. Wintersteigerc9f737b2018-10-25 13:03:05 +0100714#if defined(MBEDTLS_ECDH_VARIANT_EVEREST_ENABLED)
715 case MBEDTLS_ECDH_VARIANT_EVEREST:
Christoph M. Wintersteiger4936beb2018-12-12 17:26:41 +0000716 return( mbedtls_everest_calc_secret( &ctx->ctx.everest_ecdh, olen,
717 buf, blen, f_rng, p_rng ) );
Christoph M. Wintersteigerc9f737b2018-10-25 13:03:05 +0100718#endif
Janos Follath5a3e1bf2018-08-13 15:54:22 +0100719 case MBEDTLS_ECDH_VARIANT_MBEDTLS_2_0:
720 return( ecdh_calc_secret_internal( &ctx->ctx.mbed_ecdh, olen, buf,
721 blen, f_rng, p_rng,
722 restart_enabled ) );
723 default:
724 return( MBEDTLS_ERR_ECP_BAD_INPUT_DATA );
725 }
726#endif
727}
728
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200729#endif /* MBEDTLS_ECDH_C */