217 lines
7.4 KiB
Rust
217 lines
7.4 KiB
Rust
// Copyright 2015-2016 Brian Smith.
|
|
//
|
|
// Permission to use, copy, modify, and/or distribute this software for any
|
|
// purpose with or without fee is hereby granted, provided that the above
|
|
// copyright notice and this permission notice appear in all copies.
|
|
//
|
|
// THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHORS DISCLAIM ALL WARRANTIES
|
|
// WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
|
|
// MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHORS BE LIABLE FOR ANY
|
|
// SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
|
|
// WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION
|
|
// OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN
|
|
// CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
|
|
|
|
//! X25519 Key agreement.
|
|
|
|
use super::{ops, scalar::SCALAR_LEN};
|
|
use crate::{agreement, constant_time, cpu, ec, error, rand};
|
|
|
|
static CURVE25519: ec::Curve = ec::Curve {
|
|
public_key_len: PUBLIC_KEY_LEN,
|
|
elem_scalar_seed_len: ELEM_AND_SCALAR_LEN,
|
|
id: ec::CurveID::Curve25519,
|
|
check_private_key_bytes: x25519_check_private_key_bytes,
|
|
generate_private_key: x25519_generate_private_key,
|
|
public_from_private: x25519_public_from_private,
|
|
};
|
|
|
|
/// X25519 (ECDH using Curve25519) as described in [RFC 7748].
|
|
///
|
|
/// Everything is as described in RFC 7748. Key agreement will fail if the
|
|
/// result of the X25519 operation is zero; see the notes on the
|
|
/// "all-zero value" in [RFC 7748 section 6.1].
|
|
///
|
|
/// [RFC 7748]: https://tools.ietf.org/html/rfc7748
|
|
/// [RFC 7748 section 6.1]: https://tools.ietf.org/html/rfc7748#section-6.1
|
|
pub static X25519: agreement::Algorithm = agreement::Algorithm {
|
|
curve: &CURVE25519,
|
|
ecdh: x25519_ecdh,
|
|
};
|
|
|
|
#[allow(clippy::unnecessary_wraps)]
|
|
fn x25519_check_private_key_bytes(bytes: &[u8]) -> Result<(), error::Unspecified> {
|
|
debug_assert_eq!(bytes.len(), PRIVATE_KEY_LEN);
|
|
Ok(())
|
|
}
|
|
|
|
fn x25519_generate_private_key(
|
|
rng: &dyn rand::SecureRandom,
|
|
out: &mut [u8],
|
|
) -> Result<(), error::Unspecified> {
|
|
rng.fill(out)
|
|
}
|
|
|
|
fn x25519_public_from_private(
|
|
public_out: &mut [u8],
|
|
private_key: &ec::Seed,
|
|
) -> Result<(), error::Unspecified> {
|
|
let public_out = public_out.try_into()?;
|
|
|
|
#[cfg(target_arch = "arm")]
|
|
let cpu_features = private_key.cpu_features;
|
|
|
|
let private_key: &[u8; SCALAR_LEN] = private_key.bytes_less_safe().try_into()?;
|
|
let private_key = ops::MaskedScalar::from_bytes_masked(*private_key);
|
|
|
|
#[cfg(all(not(target_os = "ios"), target_arch = "arm"))]
|
|
{
|
|
if cpu::arm::NEON.available(cpu_features) {
|
|
static MONTGOMERY_BASE_POINT: [u8; 32] = [
|
|
9, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
0, 0, 0, 0,
|
|
];
|
|
x25519_neon(public_out, &private_key, &MONTGOMERY_BASE_POINT);
|
|
return Ok(());
|
|
}
|
|
}
|
|
|
|
prefixed_extern! {
|
|
fn x25519_public_from_private_generic_masked(
|
|
public_key_out: &mut PublicKey,
|
|
private_key: &PrivateKey,
|
|
);
|
|
}
|
|
unsafe {
|
|
x25519_public_from_private_generic_masked(public_out, &private_key);
|
|
}
|
|
|
|
Ok(())
|
|
}
|
|
|
|
fn x25519_ecdh(
|
|
out: &mut [u8],
|
|
my_private_key: &ec::Seed,
|
|
peer_public_key: untrusted::Input,
|
|
) -> Result<(), error::Unspecified> {
|
|
let cpu_features = my_private_key.cpu_features;
|
|
let my_private_key: &[u8; SCALAR_LEN] = my_private_key.bytes_less_safe().try_into()?;
|
|
let my_private_key = ops::MaskedScalar::from_bytes_masked(*my_private_key);
|
|
let peer_public_key: &[u8; PUBLIC_KEY_LEN] = peer_public_key.as_slice_less_safe().try_into()?;
|
|
|
|
fn scalar_mult(
|
|
out: &mut ops::EncodedPoint,
|
|
scalar: &ops::MaskedScalar,
|
|
point: &ops::EncodedPoint,
|
|
#[allow(unused_variables)] cpu_features: cpu::Features,
|
|
) {
|
|
#[cfg(all(not(target_os = "ios"), target_arch = "arm"))]
|
|
{
|
|
if cpu::arm::NEON.available(cpu_features) {
|
|
return x25519_neon(out, scalar, point);
|
|
}
|
|
}
|
|
|
|
prefixed_extern! {
|
|
fn x25519_scalar_mult_generic_masked(
|
|
out: &mut ops::EncodedPoint,
|
|
scalar: &ops::MaskedScalar,
|
|
point: &ops::EncodedPoint,
|
|
);
|
|
}
|
|
unsafe {
|
|
x25519_scalar_mult_generic_masked(out, scalar, point);
|
|
}
|
|
}
|
|
|
|
scalar_mult(
|
|
out.try_into()?,
|
|
&my_private_key,
|
|
peer_public_key,
|
|
cpu_features,
|
|
);
|
|
|
|
let zeros: SharedSecret = [0; SHARED_SECRET_LEN];
|
|
if constant_time::verify_slices_are_equal(out, &zeros).is_ok() {
|
|
// All-zero output results when the input is a point of small order.
|
|
return Err(error::Unspecified);
|
|
}
|
|
|
|
Ok(())
|
|
}
|
|
|
|
#[cfg(all(not(target_os = "ios"), target_arch = "arm"))]
|
|
fn x25519_neon(out: &mut ops::EncodedPoint, scalar: &ops::MaskedScalar, point: &ops::EncodedPoint) {
|
|
prefixed_extern! {
|
|
fn x25519_NEON(
|
|
out: &mut ops::EncodedPoint,
|
|
scalar: &ops::MaskedScalar,
|
|
point: &ops::EncodedPoint,
|
|
);
|
|
}
|
|
unsafe { x25519_NEON(out, scalar, point) }
|
|
}
|
|
|
|
const ELEM_AND_SCALAR_LEN: usize = ops::ELEM_LEN;
|
|
|
|
type PrivateKey = ops::MaskedScalar;
|
|
const PRIVATE_KEY_LEN: usize = ELEM_AND_SCALAR_LEN;
|
|
|
|
// An X25519 public key as an encoded Curve25519 point.
|
|
type PublicKey = [u8; PUBLIC_KEY_LEN];
|
|
const PUBLIC_KEY_LEN: usize = ELEM_AND_SCALAR_LEN;
|
|
|
|
// An X25519 shared secret as an encoded Curve25519 point.
|
|
type SharedSecret = [u8; SHARED_SECRET_LEN];
|
|
const SHARED_SECRET_LEN: usize = ELEM_AND_SCALAR_LEN;
|
|
|
|
#[cfg(test)]
|
|
mod tests {
|
|
use super::*;
|
|
use crate::ec;
|
|
use untrusted::Input;
|
|
|
|
#[test]
|
|
fn test_x25519_public_from_private() {
|
|
struct TestVector {
|
|
private: [u8; 32],
|
|
public: [u8; 32],
|
|
}
|
|
static TEST_CASES: &[TestVector] = &[
|
|
TestVector {
|
|
private: [
|
|
0x77, 0x07, 0x6d, 0x0a, 0x73, 0x18, 0xa5, 0x7d, 0x3c, 0x16, 0xc1, 0x72, 0x51,
|
|
0xb2, 0x66, 0x45, 0xdf, 0x4c, 0x2f, 0x87, 0xeb, 0xc0, 0x99, 0x2a, 0xb1, 0x77,
|
|
0xfb, 0xa5, 0x1d, 0xb9, 0x2c, 0x2a,
|
|
],
|
|
public: [
|
|
0x85, 0x20, 0xf0, 0x09, 0x89, 0x30, 0xa7, 0x54, 0x74, 0x8b, 0x7d, 0xdc, 0xb4,
|
|
0x3e, 0xf7, 0x5a, 0x0d, 0xbf, 0x3a, 0x0d, 0x26, 0x38, 0x1a, 0xf4, 0xeb, 0xa4,
|
|
0xa9, 0x8e, 0xaa, 0x9b, 0x4e, 0x6a,
|
|
],
|
|
},
|
|
TestVector {
|
|
private: [
|
|
0x5d, 0xab, 0x08, 0x7e, 0x62, 0x4a, 0x8a, 0x4b, 0x79, 0xe1, 0x7f, 0x8b, 0x83,
|
|
0x80, 0x0e, 0xe6, 0x6f, 0x3b, 0xb1, 0x29, 0x26, 0x18, 0xb6, 0xfd, 0x1c, 0x2f,
|
|
0x8b, 0x27, 0xff, 0x88, 0xe0, 0xeb,
|
|
],
|
|
public: [
|
|
0xde, 0x9e, 0xdb, 0x7d, 0x7b, 0x7d, 0xc1, 0xb4, 0xd3, 0x5b, 0x61, 0xc2, 0xec,
|
|
0xe4, 0x35, 0x37, 0x3f, 0x83, 0x43, 0xc8, 0x5b, 0x78, 0x67, 0x4d, 0xad, 0xfc,
|
|
0x7e, 0x14, 0x6f, 0x88, 0x2b, 0x4f,
|
|
],
|
|
},
|
|
];
|
|
let cpu_features = cpu::features();
|
|
for test_case in TEST_CASES {
|
|
let seed =
|
|
ec::Seed::from_bytes(&CURVE25519, Input::from(&test_case.private), cpu_features)
|
|
.unwrap();
|
|
let mut output = [0u8; 32];
|
|
x25519_public_from_private(&mut output, &seed).unwrap();
|
|
assert_eq!(output, test_case.public);
|
|
}
|
|
}
|
|
}
|