1*62c56f98SSadaf Ebrahimi /*
2*62c56f98SSadaf Ebrahimi * PSA FFDH layer on top of Mbed TLS crypto
3*62c56f98SSadaf Ebrahimi */
4*62c56f98SSadaf Ebrahimi /*
5*62c56f98SSadaf Ebrahimi * Copyright The Mbed TLS Contributors
6*62c56f98SSadaf Ebrahimi * SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later
7*62c56f98SSadaf Ebrahimi */
8*62c56f98SSadaf Ebrahimi
9*62c56f98SSadaf Ebrahimi #include "common.h"
10*62c56f98SSadaf Ebrahimi
11*62c56f98SSadaf Ebrahimi #if defined(MBEDTLS_PSA_CRYPTO_C)
12*62c56f98SSadaf Ebrahimi
13*62c56f98SSadaf Ebrahimi #include <psa/crypto.h>
14*62c56f98SSadaf Ebrahimi #include "psa_crypto_core.h"
15*62c56f98SSadaf Ebrahimi #include "psa_crypto_ffdh.h"
16*62c56f98SSadaf Ebrahimi #include "psa_crypto_random_impl.h"
17*62c56f98SSadaf Ebrahimi #include "mbedtls/platform.h"
18*62c56f98SSadaf Ebrahimi #include "mbedtls/error.h"
19*62c56f98SSadaf Ebrahimi
20*62c56f98SSadaf Ebrahimi #if defined(MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_EXPORT) || \
21*62c56f98SSadaf Ebrahimi defined(MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_GENERATE) || \
22*62c56f98SSadaf Ebrahimi defined(MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_PUBLIC_KEY) || \
23*62c56f98SSadaf Ebrahimi defined(MBEDTLS_PSA_BUILTIN_ALG_FFDH)
mbedtls_psa_ffdh_set_prime_generator(size_t key_size,mbedtls_mpi * P,mbedtls_mpi * G)24*62c56f98SSadaf Ebrahimi static psa_status_t mbedtls_psa_ffdh_set_prime_generator(size_t key_size,
25*62c56f98SSadaf Ebrahimi mbedtls_mpi *P,
26*62c56f98SSadaf Ebrahimi mbedtls_mpi *G)
27*62c56f98SSadaf Ebrahimi {
28*62c56f98SSadaf Ebrahimi const unsigned char *dhm_P = NULL;
29*62c56f98SSadaf Ebrahimi const unsigned char *dhm_G = NULL;
30*62c56f98SSadaf Ebrahimi size_t dhm_size_P = 0;
31*62c56f98SSadaf Ebrahimi size_t dhm_size_G = 0;
32*62c56f98SSadaf Ebrahimi int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
33*62c56f98SSadaf Ebrahimi
34*62c56f98SSadaf Ebrahimi if (P == NULL && G == NULL) {
35*62c56f98SSadaf Ebrahimi return PSA_ERROR_INVALID_ARGUMENT;
36*62c56f98SSadaf Ebrahimi }
37*62c56f98SSadaf Ebrahimi
38*62c56f98SSadaf Ebrahimi static const unsigned char dhm_P_2048[] =
39*62c56f98SSadaf Ebrahimi MBEDTLS_DHM_RFC7919_FFDHE2048_P_BIN;
40*62c56f98SSadaf Ebrahimi static const unsigned char dhm_P_3072[] =
41*62c56f98SSadaf Ebrahimi MBEDTLS_DHM_RFC7919_FFDHE3072_P_BIN;
42*62c56f98SSadaf Ebrahimi static const unsigned char dhm_P_4096[] =
43*62c56f98SSadaf Ebrahimi MBEDTLS_DHM_RFC7919_FFDHE4096_P_BIN;
44*62c56f98SSadaf Ebrahimi static const unsigned char dhm_P_6144[] =
45*62c56f98SSadaf Ebrahimi MBEDTLS_DHM_RFC7919_FFDHE6144_P_BIN;
46*62c56f98SSadaf Ebrahimi static const unsigned char dhm_P_8192[] =
47*62c56f98SSadaf Ebrahimi MBEDTLS_DHM_RFC7919_FFDHE8192_P_BIN;
48*62c56f98SSadaf Ebrahimi static const unsigned char dhm_G_2048[] =
49*62c56f98SSadaf Ebrahimi MBEDTLS_DHM_RFC7919_FFDHE2048_G_BIN;
50*62c56f98SSadaf Ebrahimi static const unsigned char dhm_G_3072[] =
51*62c56f98SSadaf Ebrahimi MBEDTLS_DHM_RFC7919_FFDHE3072_G_BIN;
52*62c56f98SSadaf Ebrahimi static const unsigned char dhm_G_4096[] =
53*62c56f98SSadaf Ebrahimi MBEDTLS_DHM_RFC7919_FFDHE4096_G_BIN;
54*62c56f98SSadaf Ebrahimi static const unsigned char dhm_G_6144[] =
55*62c56f98SSadaf Ebrahimi MBEDTLS_DHM_RFC7919_FFDHE6144_G_BIN;
56*62c56f98SSadaf Ebrahimi static const unsigned char dhm_G_8192[] =
57*62c56f98SSadaf Ebrahimi MBEDTLS_DHM_RFC7919_FFDHE8192_G_BIN;
58*62c56f98SSadaf Ebrahimi
59*62c56f98SSadaf Ebrahimi switch (key_size) {
60*62c56f98SSadaf Ebrahimi case sizeof(dhm_P_2048):
61*62c56f98SSadaf Ebrahimi dhm_P = dhm_P_2048;
62*62c56f98SSadaf Ebrahimi dhm_G = dhm_G_2048;
63*62c56f98SSadaf Ebrahimi dhm_size_P = sizeof(dhm_P_2048);
64*62c56f98SSadaf Ebrahimi dhm_size_G = sizeof(dhm_G_2048);
65*62c56f98SSadaf Ebrahimi break;
66*62c56f98SSadaf Ebrahimi case sizeof(dhm_P_3072):
67*62c56f98SSadaf Ebrahimi dhm_P = dhm_P_3072;
68*62c56f98SSadaf Ebrahimi dhm_G = dhm_G_3072;
69*62c56f98SSadaf Ebrahimi dhm_size_P = sizeof(dhm_P_3072);
70*62c56f98SSadaf Ebrahimi dhm_size_G = sizeof(dhm_G_3072);
71*62c56f98SSadaf Ebrahimi break;
72*62c56f98SSadaf Ebrahimi case sizeof(dhm_P_4096):
73*62c56f98SSadaf Ebrahimi dhm_P = dhm_P_4096;
74*62c56f98SSadaf Ebrahimi dhm_G = dhm_G_4096;
75*62c56f98SSadaf Ebrahimi dhm_size_P = sizeof(dhm_P_4096);
76*62c56f98SSadaf Ebrahimi dhm_size_G = sizeof(dhm_G_4096);
77*62c56f98SSadaf Ebrahimi break;
78*62c56f98SSadaf Ebrahimi case sizeof(dhm_P_6144):
79*62c56f98SSadaf Ebrahimi dhm_P = dhm_P_6144;
80*62c56f98SSadaf Ebrahimi dhm_G = dhm_G_6144;
81*62c56f98SSadaf Ebrahimi dhm_size_P = sizeof(dhm_P_6144);
82*62c56f98SSadaf Ebrahimi dhm_size_G = sizeof(dhm_G_6144);
83*62c56f98SSadaf Ebrahimi break;
84*62c56f98SSadaf Ebrahimi case sizeof(dhm_P_8192):
85*62c56f98SSadaf Ebrahimi dhm_P = dhm_P_8192;
86*62c56f98SSadaf Ebrahimi dhm_G = dhm_G_8192;
87*62c56f98SSadaf Ebrahimi dhm_size_P = sizeof(dhm_P_8192);
88*62c56f98SSadaf Ebrahimi dhm_size_G = sizeof(dhm_G_8192);
89*62c56f98SSadaf Ebrahimi break;
90*62c56f98SSadaf Ebrahimi default:
91*62c56f98SSadaf Ebrahimi return PSA_ERROR_INVALID_ARGUMENT;
92*62c56f98SSadaf Ebrahimi }
93*62c56f98SSadaf Ebrahimi
94*62c56f98SSadaf Ebrahimi if (P != NULL) {
95*62c56f98SSadaf Ebrahimi MBEDTLS_MPI_CHK(mbedtls_mpi_read_binary(P, dhm_P,
96*62c56f98SSadaf Ebrahimi dhm_size_P));
97*62c56f98SSadaf Ebrahimi }
98*62c56f98SSadaf Ebrahimi if (G != NULL) {
99*62c56f98SSadaf Ebrahimi MBEDTLS_MPI_CHK(mbedtls_mpi_read_binary(G, dhm_G,
100*62c56f98SSadaf Ebrahimi dhm_size_G));
101*62c56f98SSadaf Ebrahimi }
102*62c56f98SSadaf Ebrahimi
103*62c56f98SSadaf Ebrahimi cleanup:
104*62c56f98SSadaf Ebrahimi if (ret != 0) {
105*62c56f98SSadaf Ebrahimi return mbedtls_to_psa_error(ret);
106*62c56f98SSadaf Ebrahimi }
107*62c56f98SSadaf Ebrahimi
108*62c56f98SSadaf Ebrahimi return PSA_SUCCESS;
109*62c56f98SSadaf Ebrahimi }
110*62c56f98SSadaf Ebrahimi #endif /* MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_EXPORT ||
111*62c56f98SSadaf Ebrahimi MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_GENERATE ||
112*62c56f98SSadaf Ebrahimi MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_PUBLIC_KEY ||
113*62c56f98SSadaf Ebrahimi MBEDTLS_PSA_BUILTIN_ALG_FFDH */
114*62c56f98SSadaf Ebrahimi
115*62c56f98SSadaf Ebrahimi #if defined(MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_EXPORT) || \
116*62c56f98SSadaf Ebrahimi defined(MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_PUBLIC_KEY)
mbedtls_psa_ffdh_export_public_key(const psa_key_attributes_t * attributes,const uint8_t * key_buffer,size_t key_buffer_size,uint8_t * data,size_t data_size,size_t * data_length)117*62c56f98SSadaf Ebrahimi psa_status_t mbedtls_psa_ffdh_export_public_key(
118*62c56f98SSadaf Ebrahimi const psa_key_attributes_t *attributes,
119*62c56f98SSadaf Ebrahimi const uint8_t *key_buffer,
120*62c56f98SSadaf Ebrahimi size_t key_buffer_size,
121*62c56f98SSadaf Ebrahimi uint8_t *data,
122*62c56f98SSadaf Ebrahimi size_t data_size,
123*62c56f98SSadaf Ebrahimi size_t *data_length)
124*62c56f98SSadaf Ebrahimi {
125*62c56f98SSadaf Ebrahimi int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
126*62c56f98SSadaf Ebrahimi psa_status_t status = PSA_ERROR_CORRUPTION_DETECTED;
127*62c56f98SSadaf Ebrahimi mbedtls_mpi GX, G, X, P;
128*62c56f98SSadaf Ebrahimi psa_key_type_t type = attributes->core.type;
129*62c56f98SSadaf Ebrahimi
130*62c56f98SSadaf Ebrahimi if (PSA_KEY_TYPE_IS_PUBLIC_KEY(type)) {
131*62c56f98SSadaf Ebrahimi if (key_buffer_size > data_size) {
132*62c56f98SSadaf Ebrahimi return PSA_ERROR_BUFFER_TOO_SMALL;
133*62c56f98SSadaf Ebrahimi }
134*62c56f98SSadaf Ebrahimi memcpy(data, key_buffer, key_buffer_size);
135*62c56f98SSadaf Ebrahimi memset(data + key_buffer_size, 0,
136*62c56f98SSadaf Ebrahimi data_size - key_buffer_size);
137*62c56f98SSadaf Ebrahimi *data_length = key_buffer_size;
138*62c56f98SSadaf Ebrahimi return PSA_SUCCESS;
139*62c56f98SSadaf Ebrahimi }
140*62c56f98SSadaf Ebrahimi
141*62c56f98SSadaf Ebrahimi mbedtls_mpi_init(&GX); mbedtls_mpi_init(&G);
142*62c56f98SSadaf Ebrahimi mbedtls_mpi_init(&X); mbedtls_mpi_init(&P);
143*62c56f98SSadaf Ebrahimi
144*62c56f98SSadaf Ebrahimi size_t key_len = PSA_BITS_TO_BYTES(attributes->core.bits);
145*62c56f98SSadaf Ebrahimi
146*62c56f98SSadaf Ebrahimi status = mbedtls_psa_ffdh_set_prime_generator(key_len, &P, &G);
147*62c56f98SSadaf Ebrahimi
148*62c56f98SSadaf Ebrahimi if (status != PSA_SUCCESS) {
149*62c56f98SSadaf Ebrahimi goto cleanup;
150*62c56f98SSadaf Ebrahimi }
151*62c56f98SSadaf Ebrahimi
152*62c56f98SSadaf Ebrahimi MBEDTLS_MPI_CHK(mbedtls_mpi_read_binary(&X, key_buffer,
153*62c56f98SSadaf Ebrahimi key_buffer_size));
154*62c56f98SSadaf Ebrahimi
155*62c56f98SSadaf Ebrahimi MBEDTLS_MPI_CHK(mbedtls_mpi_exp_mod(&GX, &G, &X, &P, NULL));
156*62c56f98SSadaf Ebrahimi MBEDTLS_MPI_CHK(mbedtls_mpi_write_binary(&GX, data, key_len));
157*62c56f98SSadaf Ebrahimi
158*62c56f98SSadaf Ebrahimi *data_length = key_len;
159*62c56f98SSadaf Ebrahimi
160*62c56f98SSadaf Ebrahimi ret = 0;
161*62c56f98SSadaf Ebrahimi cleanup:
162*62c56f98SSadaf Ebrahimi mbedtls_mpi_free(&P); mbedtls_mpi_free(&G);
163*62c56f98SSadaf Ebrahimi mbedtls_mpi_free(&X); mbedtls_mpi_free(&GX);
164*62c56f98SSadaf Ebrahimi
165*62c56f98SSadaf Ebrahimi if (status == PSA_SUCCESS && ret != 0) {
166*62c56f98SSadaf Ebrahimi status = mbedtls_to_psa_error(ret);
167*62c56f98SSadaf Ebrahimi }
168*62c56f98SSadaf Ebrahimi
169*62c56f98SSadaf Ebrahimi return status;
170*62c56f98SSadaf Ebrahimi }
171*62c56f98SSadaf Ebrahimi #endif /* MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_EXPORT ||
172*62c56f98SSadaf Ebrahimi MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_PUBLIC_KEY */
173*62c56f98SSadaf Ebrahimi
174*62c56f98SSadaf Ebrahimi #if defined(MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_GENERATE)
mbedtls_psa_ffdh_generate_key(const psa_key_attributes_t * attributes,uint8_t * key_buffer,size_t key_buffer_size,size_t * key_buffer_length)175*62c56f98SSadaf Ebrahimi psa_status_t mbedtls_psa_ffdh_generate_key(
176*62c56f98SSadaf Ebrahimi const psa_key_attributes_t *attributes,
177*62c56f98SSadaf Ebrahimi uint8_t *key_buffer, size_t key_buffer_size, size_t *key_buffer_length)
178*62c56f98SSadaf Ebrahimi {
179*62c56f98SSadaf Ebrahimi mbedtls_mpi X, P;
180*62c56f98SSadaf Ebrahimi int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
181*62c56f98SSadaf Ebrahimi psa_status_t status = PSA_ERROR_CORRUPTION_DETECTED;
182*62c56f98SSadaf Ebrahimi mbedtls_mpi_init(&P); mbedtls_mpi_init(&X);
183*62c56f98SSadaf Ebrahimi (void) attributes;
184*62c56f98SSadaf Ebrahimi
185*62c56f98SSadaf Ebrahimi status = mbedtls_psa_ffdh_set_prime_generator(key_buffer_size, &P, NULL);
186*62c56f98SSadaf Ebrahimi
187*62c56f98SSadaf Ebrahimi if (status != PSA_SUCCESS) {
188*62c56f98SSadaf Ebrahimi goto cleanup;
189*62c56f98SSadaf Ebrahimi }
190*62c56f98SSadaf Ebrahimi
191*62c56f98SSadaf Ebrahimi /* RFC7919: Traditional finite field Diffie-Hellman has each peer choose their
192*62c56f98SSadaf Ebrahimi secret exponent from the range [2, P-2].
193*62c56f98SSadaf Ebrahimi Select random value in range [3, P-1] and decrease it by 1. */
194*62c56f98SSadaf Ebrahimi MBEDTLS_MPI_CHK(mbedtls_mpi_random(&X, 3, &P, mbedtls_psa_get_random,
195*62c56f98SSadaf Ebrahimi MBEDTLS_PSA_RANDOM_STATE));
196*62c56f98SSadaf Ebrahimi MBEDTLS_MPI_CHK(mbedtls_mpi_sub_int(&X, &X, 1));
197*62c56f98SSadaf Ebrahimi MBEDTLS_MPI_CHK(mbedtls_mpi_write_binary(&X, key_buffer, key_buffer_size));
198*62c56f98SSadaf Ebrahimi *key_buffer_length = key_buffer_size;
199*62c56f98SSadaf Ebrahimi
200*62c56f98SSadaf Ebrahimi cleanup:
201*62c56f98SSadaf Ebrahimi mbedtls_mpi_free(&P); mbedtls_mpi_free(&X);
202*62c56f98SSadaf Ebrahimi if (status == PSA_SUCCESS && ret != 0) {
203*62c56f98SSadaf Ebrahimi return mbedtls_to_psa_error(ret);
204*62c56f98SSadaf Ebrahimi }
205*62c56f98SSadaf Ebrahimi
206*62c56f98SSadaf Ebrahimi return status;
207*62c56f98SSadaf Ebrahimi }
208*62c56f98SSadaf Ebrahimi #endif /* MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_GENERATE */
209*62c56f98SSadaf Ebrahimi
210*62c56f98SSadaf Ebrahimi #if defined(MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_IMPORT)
mbedtls_psa_ffdh_import_key(const psa_key_attributes_t * attributes,const uint8_t * data,size_t data_length,uint8_t * key_buffer,size_t key_buffer_size,size_t * key_buffer_length,size_t * bits)211*62c56f98SSadaf Ebrahimi psa_status_t mbedtls_psa_ffdh_import_key(
212*62c56f98SSadaf Ebrahimi const psa_key_attributes_t *attributes,
213*62c56f98SSadaf Ebrahimi const uint8_t *data, size_t data_length,
214*62c56f98SSadaf Ebrahimi uint8_t *key_buffer, size_t key_buffer_size,
215*62c56f98SSadaf Ebrahimi size_t *key_buffer_length, size_t *bits)
216*62c56f98SSadaf Ebrahimi {
217*62c56f98SSadaf Ebrahimi (void) attributes;
218*62c56f98SSadaf Ebrahimi
219*62c56f98SSadaf Ebrahimi if (key_buffer_size < data_length) {
220*62c56f98SSadaf Ebrahimi return PSA_ERROR_BUFFER_TOO_SMALL;
221*62c56f98SSadaf Ebrahimi }
222*62c56f98SSadaf Ebrahimi memcpy(key_buffer, data, data_length);
223*62c56f98SSadaf Ebrahimi *key_buffer_length = data_length;
224*62c56f98SSadaf Ebrahimi *bits = PSA_BYTES_TO_BITS(data_length);
225*62c56f98SSadaf Ebrahimi
226*62c56f98SSadaf Ebrahimi return PSA_SUCCESS;
227*62c56f98SSadaf Ebrahimi }
228*62c56f98SSadaf Ebrahimi #endif /* MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_IMPORT */
229*62c56f98SSadaf Ebrahimi
230*62c56f98SSadaf Ebrahimi #if defined(MBEDTLS_PSA_BUILTIN_ALG_FFDH)
mbedtls_psa_ffdh_key_agreement(const psa_key_attributes_t * attributes,const uint8_t * peer_key,size_t peer_key_length,const uint8_t * key_buffer,size_t key_buffer_size,uint8_t * shared_secret,size_t shared_secret_size,size_t * shared_secret_length)231*62c56f98SSadaf Ebrahimi psa_status_t mbedtls_psa_ffdh_key_agreement(
232*62c56f98SSadaf Ebrahimi const psa_key_attributes_t *attributes,
233*62c56f98SSadaf Ebrahimi const uint8_t *peer_key,
234*62c56f98SSadaf Ebrahimi size_t peer_key_length,
235*62c56f98SSadaf Ebrahimi const uint8_t *key_buffer,
236*62c56f98SSadaf Ebrahimi size_t key_buffer_size,
237*62c56f98SSadaf Ebrahimi uint8_t *shared_secret,
238*62c56f98SSadaf Ebrahimi size_t shared_secret_size,
239*62c56f98SSadaf Ebrahimi size_t *shared_secret_length)
240*62c56f98SSadaf Ebrahimi {
241*62c56f98SSadaf Ebrahimi int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
242*62c56f98SSadaf Ebrahimi psa_status_t status = PSA_ERROR_CORRUPTION_DETECTED;
243*62c56f98SSadaf Ebrahimi mbedtls_mpi P, G, X, GY, K;
244*62c56f98SSadaf Ebrahimi const size_t calculated_shared_secret_size = peer_key_length;
245*62c56f98SSadaf Ebrahimi
246*62c56f98SSadaf Ebrahimi if (peer_key_length != key_buffer_size ||
247*62c56f98SSadaf Ebrahimi calculated_shared_secret_size > shared_secret_size) {
248*62c56f98SSadaf Ebrahimi return PSA_ERROR_INVALID_ARGUMENT;
249*62c56f98SSadaf Ebrahimi }
250*62c56f98SSadaf Ebrahimi
251*62c56f98SSadaf Ebrahimi if (!PSA_KEY_TYPE_IS_DH_KEY_PAIR(psa_get_key_type(attributes))) {
252*62c56f98SSadaf Ebrahimi return PSA_ERROR_INVALID_ARGUMENT;
253*62c56f98SSadaf Ebrahimi }
254*62c56f98SSadaf Ebrahimi
255*62c56f98SSadaf Ebrahimi mbedtls_mpi_init(&P); mbedtls_mpi_init(&G);
256*62c56f98SSadaf Ebrahimi mbedtls_mpi_init(&X); mbedtls_mpi_init(&GY);
257*62c56f98SSadaf Ebrahimi mbedtls_mpi_init(&K);
258*62c56f98SSadaf Ebrahimi
259*62c56f98SSadaf Ebrahimi status = mbedtls_psa_ffdh_set_prime_generator(
260*62c56f98SSadaf Ebrahimi PSA_BITS_TO_BYTES(attributes->core.bits), &P, &G);
261*62c56f98SSadaf Ebrahimi
262*62c56f98SSadaf Ebrahimi if (status != PSA_SUCCESS) {
263*62c56f98SSadaf Ebrahimi goto cleanup;
264*62c56f98SSadaf Ebrahimi }
265*62c56f98SSadaf Ebrahimi
266*62c56f98SSadaf Ebrahimi MBEDTLS_MPI_CHK(mbedtls_mpi_read_binary(&X, key_buffer,
267*62c56f98SSadaf Ebrahimi key_buffer_size));
268*62c56f98SSadaf Ebrahimi
269*62c56f98SSadaf Ebrahimi MBEDTLS_MPI_CHK(mbedtls_mpi_read_binary(&GY, peer_key,
270*62c56f98SSadaf Ebrahimi peer_key_length));
271*62c56f98SSadaf Ebrahimi
272*62c56f98SSadaf Ebrahimi /* Calculate shared secret public key: K = G^(XY) mod P = GY^X mod P */
273*62c56f98SSadaf Ebrahimi MBEDTLS_MPI_CHK(mbedtls_mpi_exp_mod(&K, &GY, &X, &P, NULL));
274*62c56f98SSadaf Ebrahimi
275*62c56f98SSadaf Ebrahimi MBEDTLS_MPI_CHK(mbedtls_mpi_write_binary(&K, shared_secret,
276*62c56f98SSadaf Ebrahimi calculated_shared_secret_size));
277*62c56f98SSadaf Ebrahimi
278*62c56f98SSadaf Ebrahimi *shared_secret_length = calculated_shared_secret_size;
279*62c56f98SSadaf Ebrahimi
280*62c56f98SSadaf Ebrahimi ret = 0;
281*62c56f98SSadaf Ebrahimi
282*62c56f98SSadaf Ebrahimi cleanup:
283*62c56f98SSadaf Ebrahimi mbedtls_mpi_free(&P); mbedtls_mpi_free(&G);
284*62c56f98SSadaf Ebrahimi mbedtls_mpi_free(&X); mbedtls_mpi_free(&GY);
285*62c56f98SSadaf Ebrahimi mbedtls_mpi_free(&K);
286*62c56f98SSadaf Ebrahimi
287*62c56f98SSadaf Ebrahimi if (status == PSA_SUCCESS && ret != 0) {
288*62c56f98SSadaf Ebrahimi status = mbedtls_to_psa_error(ret);
289*62c56f98SSadaf Ebrahimi }
290*62c56f98SSadaf Ebrahimi
291*62c56f98SSadaf Ebrahimi return status;
292*62c56f98SSadaf Ebrahimi }
293*62c56f98SSadaf Ebrahimi #endif /* MBEDTLS_PSA_BUILTIN_ALG_FFDH */
294*62c56f98SSadaf Ebrahimi
295*62c56f98SSadaf Ebrahimi #endif /* MBEDTLS_PSA_CRYPTO_C */
296