strongswan/src/libstrongswan/plugins/wolfssl/wolfssl_ec_diffie_hellman.c

393 lines
8.8 KiB
C

/*
* Copyright (C) 2019 Sean Parkinson, wolfSSL Inc.
*
* Permission is hereby granted, free of charge, to any person obtaining a copy
* of this software and associated documentation files (the "Software"), to deal
* in the Software without restriction, including without limitation the rights
* to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
* copies of the Software, and to permit persons to whom the Software is
* furnished to do so, subject to the following conditions:
*
* The above copyright notice and this permission notice shall be included in
* all copies or substantial portions of the Software.
*
* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
* IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
* FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
* AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
* LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
* OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
* THE SOFTWARE.
*/
#include "wolfssl_common.h"
#ifdef HAVE_ECC_DHE
#include <wolfssl/wolfcrypt/ecc.h>
#include "wolfssl_ec_diffie_hellman.h"
#include "wolfssl_util.h"
#include <utils/debug.h>
typedef struct private_wolfssl_ec_diffie_hellman_t private_wolfssl_ec_diffie_hellman_t;
/**
* Private data of an wolfssl_ec_diffie_hellman_t object.
*/
struct private_wolfssl_ec_diffie_hellman_t {
/**
* Public wolfssl_ec_diffie_hellman_t interface.
*/
wolfssl_ec_diffie_hellman_t public;
/**
* Diffie Hellman group number.
*/
diffie_hellman_group_t group;
/**
* EC curve id for creating keys
*/
ecc_curve_id curve_id;
/**
* Size of an ordinate in bytes
*/
int keysize;
/**
* EC private (public) key
*/
ecc_key key;
/**
* Other public key
*/
ecc_point *pub_key;
/**
* Shared secret
*/
chunk_t shared_secret;
/**
* Random number generator
*/
WC_RNG rng;
/**
* True if shared secret is computed
*/
bool computed;
};
/**
* Convert a chunk to an ecc_point (which must already exist). The x and y
* coordinates of the point have to be concatenated in the chunk.
*/
static bool chunk2ecp(chunk_t chunk, ecc_point *point)
{
if (!wolfssl_mp_split(chunk, point->x, point->y))
return FALSE;
if (mp_set(point->z, 1) != 0)
return FALSE;
return TRUE;
}
/**
* Convert an ec_point to a chunk by concatenating the x and y coordinates of
* the point. This function allocates memory for the chunk.
*/
static bool ecp2chunk(int keysize, ecc_point *point, chunk_t *chunk,
bool x_coordinate_only)
{
mp_int *y = NULL;
if (!x_coordinate_only)
{
keysize *= 2;
y = point->y;
}
return wolfssl_mp_cat(keysize, point->x, y, chunk);
}
/**
* Perform the elliptic curve scalar multiplication.
*/
static bool wolfssl_ecc_multiply(const ecc_set_type *ecc_set, mp_int *scalar,
ecc_point* point, ecc_point* r)
{
int ret;
mp_int a, prime;
ret = mp_init(&a);
if (ret != 0)
{
return FALSE;
}
ret = mp_init(&prime);
if (ret != 0)
{
mp_free(&a);
return FALSE;
}
ret = mp_read_radix(&a, ecc_set->Af, MP_RADIX_HEX);
if (ret == 0)
{
ret = mp_read_radix(&prime, ecc_set->prime, MP_RADIX_HEX);
}
if (ret == 0)
{
/* Multiply the point by our secret */
ret = wc_ecc_mulmod(scalar, point, r, &a, &prime, 1);
}
mp_free(&prime);
mp_free(&a);
return ret == 0;
}
/**
* Compute the shared secret.
*
* We cannot use the function wc_ecc_shared_secret() because that returns only
* the x coordinate of the shared secret point (which is defined, for instance,
* in 'NIST SP 800-56A').
* However, we need both coordinates as RFC 4753 says: "The Diffie-Hellman
* public value is obtained by concatenating the x and y values. The format
* of the Diffie-Hellman shared secret value is the same as that of the
* Diffie-Hellman public value."
*/
static bool compute_shared_key(private_wolfssl_ec_diffie_hellman_t *this,
chunk_t *shared_secret)
{
bool success = FALSE;
ecc_point* secret;
bool x_coordinate_only;
if ((secret = wc_ecc_new_point()) == NULL)
{
return FALSE;
}
if (wolfssl_ecc_multiply(this->key.dp, &this->key.k, this->pub_key, secret))
{
/*
* The default setting ecp_x_coordinate_only = TRUE
* applies the following errata for RFC 4753:
* http://www.rfc-editor.org/errata_search.php?eid=9
*/
x_coordinate_only = lib->settings->get_bool(lib->settings,
"%s.ecp_x_coordinate_only", TRUE, lib->ns);
success = ecp2chunk(this->keysize, secret, shared_secret,
x_coordinate_only);
}
wc_ecc_del_point(secret);
return success;
}
METHOD(diffie_hellman_t, set_other_public_value, bool,
private_wolfssl_ec_diffie_hellman_t *this, chunk_t value)
{
if (!diffie_hellman_verify_value(this->group, value))
{
return FALSE;
}
if (!chunk2ecp(value, this->pub_key))
{
DBG1(DBG_LIB, "ECDH public value is malformed");
return FALSE;
}
chunk_clear(&this->shared_secret);
if (!compute_shared_key(this, &this->shared_secret))
{
DBG1(DBG_LIB, "ECDH shared secret computation failed");
return FALSE;
}
this->computed = TRUE;
return TRUE;
}
METHOD(diffie_hellman_t, get_my_public_value, bool,
private_wolfssl_ec_diffie_hellman_t *this,chunk_t *value)
{
return ecp2chunk(this->keysize, &this->key.pubkey, value, FALSE);
}
METHOD(diffie_hellman_t, set_private_value, bool,
private_wolfssl_ec_diffie_hellman_t *this, chunk_t value)
{
bool success = FALSE;
ecc_point *base;
int ret;
if ((base = wc_ecc_new_point()) == NULL)
{
return FALSE;
}
ret = mp_read_unsigned_bin(&this->key.k, value.ptr, value.len);
/* Get base point */
if (ret == 0)
{
ret = mp_read_radix(base->x, this->key.dp->Gx, MP_RADIX_HEX);
}
if (ret == 0)
{
ret = mp_read_radix(base->y, this->key.dp->Gy, MP_RADIX_HEX);
}
if (ret == 0)
{
ret = mp_set(base->z, 1);
}
if (ret == 0)
{
/* Calculate public key */
success = wolfssl_ecc_multiply(this->key.dp, &this->key.k, base,
&this->key.pubkey);
}
wc_ecc_del_point(base);
return success;
}
METHOD(diffie_hellman_t, get_shared_secret, bool,
private_wolfssl_ec_diffie_hellman_t *this, chunk_t *secret)
{
if (!this->computed)
{
return FALSE;
}
*secret = chunk_clone(this->shared_secret);
return TRUE;
}
METHOD(diffie_hellman_t, get_dh_group, diffie_hellman_group_t,
private_wolfssl_ec_diffie_hellman_t *this)
{
return this->group;
}
METHOD(diffie_hellman_t, destroy, void,
private_wolfssl_ec_diffie_hellman_t *this)
{
wc_FreeRng(&this->rng);
wc_ecc_del_point(this->pub_key);
wc_ecc_free(&this->key);
chunk_clear(&this->shared_secret);
free(this);
}
/*
* Described in header.
*/
wolfssl_ec_diffie_hellman_t *wolfssl_ec_diffie_hellman_create(diffie_hellman_group_t group)
{
private_wolfssl_ec_diffie_hellman_t *this;
INIT(this,
.public = {
.dh = {
.get_shared_secret = _get_shared_secret,
.set_other_public_value = _set_other_public_value,
.get_my_public_value = _get_my_public_value,
.set_private_value = _set_private_value,
.get_dh_group = _get_dh_group,
.destroy = _destroy,
},
},
.group = group,
);
if (wc_ecc_init(&this->key) != 0)
{
DBG1(DBG_LIB, "key init failed, ecdh create failed");
free(this);
return NULL;
}
if ((this->pub_key = wc_ecc_new_point()) == NULL)
{
wc_ecc_free(&this->key);
DBG1(DBG_LIB, "pub_key init failed, ecdh create failed");
free(this);
return NULL;
}
if (wc_InitRng(&this->rng) != 0)
{
wc_ecc_del_point(this->pub_key);
wc_ecc_free(&this->key);
DBG1(DBG_LIB, "RNG init failed, ecdh create failed");
free(this);
return NULL;
}
switch (group)
{
case ECP_192_BIT:
this->curve_id = ECC_SECP192R1;
this->keysize = 192 / 8;
break;
case ECP_224_BIT:
this->curve_id = ECC_SECP224R1;
this->keysize = 224 / 8;
break;
case ECP_256_BIT:
this->curve_id = ECC_SECP256R1;
this->keysize = 256 / 8;
break;
case ECP_384_BIT:
this->curve_id = ECC_SECP384R1;
this->keysize = 384 / 8;
break;
case ECP_521_BIT:
this->curve_id = ECC_SECP521R1;
this->keysize = (521 + 7) / 8;
break;
#ifdef HAVE_BRAINPOOL
case ECP_224_BP:
this->curve_id = ECC_BRAINPOOLP224R1;
this->keysize = 224 / 8;
break;
case ECP_256_BP:
this->curve_id = ECC_BRAINPOOLP256R1;
this->keysize = 256 / 8;
break;
case ECP_384_BP:
this->curve_id = ECC_BRAINPOOLP384R1;
this->keysize = 384 / 8;
break;
case ECP_512_BP:
this->curve_id = ECC_BRAINPOOLP512R1;
this->keysize = 512 / 8;
break;
#endif
default:
DBG1(DBG_LIB, "EC group not supported");
destroy(this);
return NULL;
}
/* generate an EC private (public) key */
if (wc_ecc_make_key_ex(&this->rng, this->keysize, &this->key,
this->curve_id) != 0)
{
DBG1(DBG_LIB, "Make key failed, wolfssl ECDH create failed");
destroy(this);
return NULL;
}
return &this->public;
}
#endif /* HAVE_ECC_DHE */