|
| 1 | +#include "ecdh.h" |
| 2 | + |
| 3 | +#define ECDH_LOGGER "ecdh" |
| 4 | +static logger_id_t logger_id; |
| 5 | + |
| 6 | +void ecdh_logger_init() { logger_id = logger_helper_enable(ECDH_LOGGER, LOGGER_DEBUG, true); } |
| 7 | + |
| 8 | +int ecdh_logger_release() { |
| 9 | + logger_helper_release(logger_id); |
| 10 | + return 0; |
| 11 | +} |
| 12 | + |
| 13 | +status_t rand_num_gen_init(mbedtls_entropy_context *entropy, mbedtls_ctr_drbg_context *ctr_drbg, char *rand_seed, |
| 14 | + uint16_t seed_len) { |
| 15 | + int ret = 1; |
| 16 | + status_t sc = SC_OK; |
| 17 | + |
| 18 | + mbedtls_ctr_drbg_init(ctr_drbg); |
| 19 | + mbedtls_entropy_init(entropy); |
| 20 | + |
| 21 | + if ((ret = mbedtls_ctr_drbg_seed(ctr_drbg, mbedtls_entropy_func, entropy, (const unsigned char *)rand_seed, |
| 22 | + seed_len)) != 0) { |
| 23 | + ta_log_error("mbedtls_ctr_drbg_seed returned %d\n", ret); |
| 24 | + sc = SC_CRYPTO_RAND_INIT; |
| 25 | + } |
| 26 | + |
| 27 | + return sc; |
| 28 | +} |
| 29 | + |
| 30 | +status_t ecdh_gen_public_key(mbedtls_ecdh_context *ctx, mbedtls_ctr_drbg_context *ctr_drbg, unsigned char *pkey) { |
| 31 | + int ret = 1; |
| 32 | + status_t sc = SC_OK; |
| 33 | + |
| 34 | + ret = mbedtls_ecp_group_load(&ctx->grp, MBEDTLS_ECP_DP_CURVE25519); |
| 35 | + if (ret != 0) { |
| 36 | + ta_log_error("mbedtls_ecp_group_load returned %d\n", ret); |
| 37 | + sc = SC_CRYPTO_GEN_PKEY; |
| 38 | + goto exit; |
| 39 | + } |
| 40 | + |
| 41 | + ret = mbedtls_ecdh_gen_public(&ctx->grp, &ctx->d, &ctx->Q, mbedtls_ctr_drbg_random, ctr_drbg); |
| 42 | + if (ret != 0) { |
| 43 | + ta_log_error("mbedtls_ecdh_gen_public returned %d\n", ret); |
| 44 | + sc = SC_CRYPTO_GEN_PKEY; |
| 45 | + goto exit; |
| 46 | + } |
| 47 | + |
| 48 | + ret = mbedtls_mpi_write_binary(&ctx->Q.X, pkey, SHARE_DATA_LEN); |
| 49 | + if (ret != 0) { |
| 50 | + ta_log_error("mbedtls_mpi_write_binary returned %d\n", ret); |
| 51 | + sc = SC_CRYPTO_GEN_PKEY; |
| 52 | + } |
| 53 | + |
| 54 | +exit: |
| 55 | + return sc; |
| 56 | +} |
| 57 | + |
| 58 | +status_t ecdh_compute_shared_secret(mbedtls_ecdh_context *ctx, mbedtls_ctr_drbg_context *ctr_drbg, |
| 59 | + unsigned char *input_shared_data) { |
| 60 | + int ret = 1; |
| 61 | + status_t sc = SC_OK; |
| 62 | + |
| 63 | + ret = mbedtls_mpi_lset(&ctx->Qp.Z, 1); |
| 64 | + if (ret != 0) { |
| 65 | + ta_log_error("mbedtls_mpi_lset returned %d\n", ret); |
| 66 | + sc = SC_CRYPTO_COMPUTE_SECRET; |
| 67 | + goto exit; |
| 68 | + } |
| 69 | + |
| 70 | + ret = mbedtls_mpi_read_binary(&ctx->Qp.X, input_shared_data, SHARE_DATA_LEN); |
| 71 | + if (ret != 0) { |
| 72 | + ta_log_error("mbedtls_mpi_read_binary returned %d\n", ret); |
| 73 | + sc = SC_CRYPTO_COMPUTE_SECRET; |
| 74 | + goto exit; |
| 75 | + } |
| 76 | + |
| 77 | + ret = mbedtls_ecdh_compute_shared(&ctx->grp, &ctx->z, &ctx->Qp, &ctx->d, mbedtls_ctr_drbg_random, ctr_drbg); |
| 78 | + if (ret != 0) { |
| 79 | + ta_log_error("mbedtls_ecdh_compute_shared returned %d\n", ret); |
| 80 | + sc = SC_CRYPTO_COMPUTE_SECRET; |
| 81 | + } |
| 82 | + |
| 83 | +exit: |
| 84 | + return sc; |
| 85 | +} |
| 86 | + |
| 87 | +void rand_num_gen_release(mbedtls_entropy_context *entropy, mbedtls_ctr_drbg_context *ctr_drbg) { |
| 88 | + mbedtls_ctr_drbg_free(ctr_drbg); |
| 89 | + mbedtls_entropy_free(entropy); |
| 90 | +} |
0 commit comments