1c6672fdcSEdison Ai // SPDX-License-Identifier: Apache-2.0 2817466cbSJens Wiklander /* 3817466cbSJens Wiklander * Diffie-Hellman-Merkle key exchange 4817466cbSJens Wiklander * 5817466cbSJens Wiklander * Copyright (C) 2006-2015, ARM Limited, All Rights Reserved 6817466cbSJens Wiklander * 7817466cbSJens Wiklander * Licensed under the Apache License, Version 2.0 (the "License"); you may 8817466cbSJens Wiklander * not use this file except in compliance with the License. 9817466cbSJens Wiklander * You may obtain a copy of the License at 10817466cbSJens Wiklander * 11817466cbSJens Wiklander * http://www.apache.org/licenses/LICENSE-2.0 12817466cbSJens Wiklander * 13817466cbSJens Wiklander * Unless required by applicable law or agreed to in writing, software 14817466cbSJens Wiklander * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT 15817466cbSJens Wiklander * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 16817466cbSJens Wiklander * See the License for the specific language governing permissions and 17817466cbSJens Wiklander * limitations under the License. 18817466cbSJens Wiklander * 19817466cbSJens Wiklander * This file is part of mbed TLS (https://tls.mbed.org) 20817466cbSJens Wiklander */ 21817466cbSJens Wiklander /* 22817466cbSJens Wiklander * The following sources were referenced in the design of this implementation 23817466cbSJens Wiklander * of the Diffie-Hellman-Merkle algorithm: 24817466cbSJens Wiklander * 25817466cbSJens Wiklander * [1] Handbook of Applied Cryptography - 1997, Chapter 12 26817466cbSJens Wiklander * Menezes, van Oorschot and Vanstone 27817466cbSJens Wiklander * 28817466cbSJens Wiklander */ 29817466cbSJens Wiklander 30817466cbSJens Wiklander #if !defined(MBEDTLS_CONFIG_FILE) 31817466cbSJens Wiklander #include "mbedtls/config.h" 32817466cbSJens Wiklander #else 33817466cbSJens Wiklander #include MBEDTLS_CONFIG_FILE 34817466cbSJens Wiklander #endif 35817466cbSJens Wiklander 36817466cbSJens Wiklander #if defined(MBEDTLS_DHM_C) 37817466cbSJens Wiklander 38817466cbSJens Wiklander #include "mbedtls/dhm.h" 393d3b0591SJens Wiklander #include "mbedtls/platform_util.h" 40*11fa71b9SJerome Forissier #include "mbedtls/error.h" 41817466cbSJens Wiklander 42817466cbSJens Wiklander #include <string.h> 43817466cbSJens Wiklander 44817466cbSJens Wiklander #if defined(MBEDTLS_PEM_PARSE_C) 45817466cbSJens Wiklander #include "mbedtls/pem.h" 46817466cbSJens Wiklander #endif 47817466cbSJens Wiklander 48817466cbSJens Wiklander #if defined(MBEDTLS_ASN1_PARSE_C) 49817466cbSJens Wiklander #include "mbedtls/asn1.h" 50817466cbSJens Wiklander #endif 51817466cbSJens Wiklander 52817466cbSJens Wiklander #if defined(MBEDTLS_PLATFORM_C) 53817466cbSJens Wiklander #include "mbedtls/platform.h" 54817466cbSJens Wiklander #else 55817466cbSJens Wiklander #include <stdlib.h> 56817466cbSJens Wiklander #include <stdio.h> 57817466cbSJens Wiklander #define mbedtls_printf printf 58817466cbSJens Wiklander #define mbedtls_calloc calloc 59817466cbSJens Wiklander #define mbedtls_free free 60817466cbSJens Wiklander #endif 61817466cbSJens Wiklander 623d3b0591SJens Wiklander #if !defined(MBEDTLS_DHM_ALT) 633d3b0591SJens Wiklander 643d3b0591SJens Wiklander #define DHM_VALIDATE_RET( cond ) \ 653d3b0591SJens Wiklander MBEDTLS_INTERNAL_VALIDATE_RET( cond, MBEDTLS_ERR_DHM_BAD_INPUT_DATA ) 663d3b0591SJens Wiklander #define DHM_VALIDATE( cond ) \ 673d3b0591SJens Wiklander MBEDTLS_INTERNAL_VALIDATE( cond ) 68817466cbSJens Wiklander 69817466cbSJens Wiklander /* 70817466cbSJens Wiklander * helper to validate the mbedtls_mpi size and import it 71817466cbSJens Wiklander */ 72817466cbSJens Wiklander static int dhm_read_bignum( mbedtls_mpi *X, 73817466cbSJens Wiklander unsigned char **p, 74817466cbSJens Wiklander const unsigned char *end ) 75817466cbSJens Wiklander { 76817466cbSJens Wiklander int ret, n; 77817466cbSJens Wiklander 78817466cbSJens Wiklander if( end - *p < 2 ) 79817466cbSJens Wiklander return( MBEDTLS_ERR_DHM_BAD_INPUT_DATA ); 80817466cbSJens Wiklander 81817466cbSJens Wiklander n = ( (*p)[0] << 8 ) | (*p)[1]; 82817466cbSJens Wiklander (*p) += 2; 83817466cbSJens Wiklander 84817466cbSJens Wiklander if( (int)( end - *p ) < n ) 85817466cbSJens Wiklander return( MBEDTLS_ERR_DHM_BAD_INPUT_DATA ); 86817466cbSJens Wiklander 87817466cbSJens Wiklander if( ( ret = mbedtls_mpi_read_binary( X, *p, n ) ) != 0 ) 88817466cbSJens Wiklander return( MBEDTLS_ERR_DHM_READ_PARAMS_FAILED + ret ); 89817466cbSJens Wiklander 90817466cbSJens Wiklander (*p) += n; 91817466cbSJens Wiklander 92817466cbSJens Wiklander return( 0 ); 93817466cbSJens Wiklander } 94817466cbSJens Wiklander 95817466cbSJens Wiklander /* 96817466cbSJens Wiklander * Verify sanity of parameter with regards to P 97817466cbSJens Wiklander * 98817466cbSJens Wiklander * Parameter should be: 2 <= public_param <= P - 2 99817466cbSJens Wiklander * 1003d3b0591SJens Wiklander * This means that we need to return an error if 1013d3b0591SJens Wiklander * public_param < 2 or public_param > P-2 1023d3b0591SJens Wiklander * 103817466cbSJens Wiklander * For more information on the attack, see: 104817466cbSJens Wiklander * http://www.cl.cam.ac.uk/~rja14/Papers/psandqs.pdf 105817466cbSJens Wiklander * http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2005-2643 106817466cbSJens Wiklander */ 107817466cbSJens Wiklander static int dhm_check_range( const mbedtls_mpi *param, const mbedtls_mpi *P ) 108817466cbSJens Wiklander { 109817466cbSJens Wiklander mbedtls_mpi L, U; 1103d3b0591SJens Wiklander int ret = 0; 111817466cbSJens Wiklander 112817466cbSJens Wiklander mbedtls_mpi_init( &L ); mbedtls_mpi_init( &U ); 113817466cbSJens Wiklander 114817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_lset( &L, 2 ) ); 115817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_sub_int( &U, P, 2 ) ); 116817466cbSJens Wiklander 1173d3b0591SJens Wiklander if( mbedtls_mpi_cmp_mpi( param, &L ) < 0 || 1183d3b0591SJens Wiklander mbedtls_mpi_cmp_mpi( param, &U ) > 0 ) 119817466cbSJens Wiklander { 1203d3b0591SJens Wiklander ret = MBEDTLS_ERR_DHM_BAD_INPUT_DATA; 121817466cbSJens Wiklander } 122817466cbSJens Wiklander 123817466cbSJens Wiklander cleanup: 124817466cbSJens Wiklander mbedtls_mpi_free( &L ); mbedtls_mpi_free( &U ); 125817466cbSJens Wiklander return( ret ); 126817466cbSJens Wiklander } 127817466cbSJens Wiklander 128817466cbSJens Wiklander void mbedtls_dhm_init( mbedtls_dhm_context *ctx ) 129817466cbSJens Wiklander { 1303d3b0591SJens Wiklander DHM_VALIDATE( ctx != NULL ); 131817466cbSJens Wiklander memset( ctx, 0, sizeof( mbedtls_dhm_context ) ); 132817466cbSJens Wiklander } 133817466cbSJens Wiklander 134817466cbSJens Wiklander /* 135817466cbSJens Wiklander * Parse the ServerKeyExchange parameters 136817466cbSJens Wiklander */ 137817466cbSJens Wiklander int mbedtls_dhm_read_params( mbedtls_dhm_context *ctx, 138817466cbSJens Wiklander unsigned char **p, 139817466cbSJens Wiklander const unsigned char *end ) 140817466cbSJens Wiklander { 141*11fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 1423d3b0591SJens Wiklander DHM_VALIDATE_RET( ctx != NULL ); 1433d3b0591SJens Wiklander DHM_VALIDATE_RET( p != NULL && *p != NULL ); 1443d3b0591SJens Wiklander DHM_VALIDATE_RET( end != NULL ); 145817466cbSJens Wiklander 146817466cbSJens Wiklander if( ( ret = dhm_read_bignum( &ctx->P, p, end ) ) != 0 || 147817466cbSJens Wiklander ( ret = dhm_read_bignum( &ctx->G, p, end ) ) != 0 || 148817466cbSJens Wiklander ( ret = dhm_read_bignum( &ctx->GY, p, end ) ) != 0 ) 149817466cbSJens Wiklander return( ret ); 150817466cbSJens Wiklander 151817466cbSJens Wiklander if( ( ret = dhm_check_range( &ctx->GY, &ctx->P ) ) != 0 ) 152817466cbSJens Wiklander return( ret ); 153817466cbSJens Wiklander 154817466cbSJens Wiklander ctx->len = mbedtls_mpi_size( &ctx->P ); 155817466cbSJens Wiklander 156817466cbSJens Wiklander return( 0 ); 157817466cbSJens Wiklander } 158817466cbSJens Wiklander 159817466cbSJens Wiklander /* 160817466cbSJens Wiklander * Setup and write the ServerKeyExchange parameters 161817466cbSJens Wiklander */ 162817466cbSJens Wiklander int mbedtls_dhm_make_params( mbedtls_dhm_context *ctx, int x_size, 163817466cbSJens Wiklander unsigned char *output, size_t *olen, 164817466cbSJens Wiklander int (*f_rng)(void *, unsigned char *, size_t), 165817466cbSJens Wiklander void *p_rng ) 166817466cbSJens Wiklander { 167817466cbSJens Wiklander int ret, count = 0; 168817466cbSJens Wiklander size_t n1, n2, n3; 169817466cbSJens Wiklander unsigned char *p; 1703d3b0591SJens Wiklander DHM_VALIDATE_RET( ctx != NULL ); 1713d3b0591SJens Wiklander DHM_VALIDATE_RET( output != NULL ); 1723d3b0591SJens Wiklander DHM_VALIDATE_RET( olen != NULL ); 1733d3b0591SJens Wiklander DHM_VALIDATE_RET( f_rng != NULL ); 174817466cbSJens Wiklander 175817466cbSJens Wiklander if( mbedtls_mpi_cmp_int( &ctx->P, 0 ) == 0 ) 176817466cbSJens Wiklander return( MBEDTLS_ERR_DHM_BAD_INPUT_DATA ); 177817466cbSJens Wiklander 178817466cbSJens Wiklander /* 179817466cbSJens Wiklander * Generate X as large as possible ( < P ) 180817466cbSJens Wiklander */ 181817466cbSJens Wiklander do 182817466cbSJens Wiklander { 183817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_fill_random( &ctx->X, x_size, f_rng, p_rng ) ); 184817466cbSJens Wiklander 185817466cbSJens Wiklander while( mbedtls_mpi_cmp_mpi( &ctx->X, &ctx->P ) >= 0 ) 186817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_shift_r( &ctx->X, 1 ) ); 187817466cbSJens Wiklander 188817466cbSJens Wiklander if( count++ > 10 ) 189817466cbSJens Wiklander return( MBEDTLS_ERR_DHM_MAKE_PARAMS_FAILED ); 190817466cbSJens Wiklander } 191817466cbSJens Wiklander while( dhm_check_range( &ctx->X, &ctx->P ) != 0 ); 192817466cbSJens Wiklander 193817466cbSJens Wiklander /* 194817466cbSJens Wiklander * Calculate GX = G^X mod P 195817466cbSJens Wiklander */ 196817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_exp_mod( &ctx->GX, &ctx->G, &ctx->X, 197817466cbSJens Wiklander &ctx->P , &ctx->RP ) ); 198817466cbSJens Wiklander 199817466cbSJens Wiklander if( ( ret = dhm_check_range( &ctx->GX, &ctx->P ) ) != 0 ) 200817466cbSJens Wiklander return( ret ); 201817466cbSJens Wiklander 202817466cbSJens Wiklander /* 203817466cbSJens Wiklander * export P, G, GX 204817466cbSJens Wiklander */ 205817466cbSJens Wiklander #define DHM_MPI_EXPORT( X, n ) \ 2063d3b0591SJens Wiklander do { \ 2073d3b0591SJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_write_binary( ( X ), \ 2083d3b0591SJens Wiklander p + 2, \ 2093d3b0591SJens Wiklander ( n ) ) ); \ 2103d3b0591SJens Wiklander *p++ = (unsigned char)( ( n ) >> 8 ); \ 2113d3b0591SJens Wiklander *p++ = (unsigned char)( ( n ) ); \ 2123d3b0591SJens Wiklander p += ( n ); \ 2133d3b0591SJens Wiklander } while( 0 ) 214817466cbSJens Wiklander 215817466cbSJens Wiklander n1 = mbedtls_mpi_size( &ctx->P ); 216817466cbSJens Wiklander n2 = mbedtls_mpi_size( &ctx->G ); 217817466cbSJens Wiklander n3 = mbedtls_mpi_size( &ctx->GX ); 218817466cbSJens Wiklander 219817466cbSJens Wiklander p = output; 220817466cbSJens Wiklander DHM_MPI_EXPORT( &ctx->P , n1 ); 221817466cbSJens Wiklander DHM_MPI_EXPORT( &ctx->G , n2 ); 222817466cbSJens Wiklander DHM_MPI_EXPORT( &ctx->GX, n3 ); 223817466cbSJens Wiklander 224817466cbSJens Wiklander *olen = p - output; 225817466cbSJens Wiklander 226817466cbSJens Wiklander ctx->len = n1; 227817466cbSJens Wiklander 228817466cbSJens Wiklander cleanup: 229817466cbSJens Wiklander 230817466cbSJens Wiklander if( ret != 0 ) 231817466cbSJens Wiklander return( MBEDTLS_ERR_DHM_MAKE_PARAMS_FAILED + ret ); 232817466cbSJens Wiklander 233817466cbSJens Wiklander return( 0 ); 234817466cbSJens Wiklander } 235817466cbSJens Wiklander 236817466cbSJens Wiklander /* 2373d3b0591SJens Wiklander * Set prime modulus and generator 2383d3b0591SJens Wiklander */ 2393d3b0591SJens Wiklander int mbedtls_dhm_set_group( mbedtls_dhm_context *ctx, 2403d3b0591SJens Wiklander const mbedtls_mpi *P, 2413d3b0591SJens Wiklander const mbedtls_mpi *G ) 2423d3b0591SJens Wiklander { 243*11fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 2443d3b0591SJens Wiklander DHM_VALIDATE_RET( ctx != NULL ); 2453d3b0591SJens Wiklander DHM_VALIDATE_RET( P != NULL ); 2463d3b0591SJens Wiklander DHM_VALIDATE_RET( G != NULL ); 2473d3b0591SJens Wiklander 2483d3b0591SJens Wiklander if( ( ret = mbedtls_mpi_copy( &ctx->P, P ) ) != 0 || 2493d3b0591SJens Wiklander ( ret = mbedtls_mpi_copy( &ctx->G, G ) ) != 0 ) 2503d3b0591SJens Wiklander { 2513d3b0591SJens Wiklander return( MBEDTLS_ERR_DHM_SET_GROUP_FAILED + ret ); 2523d3b0591SJens Wiklander } 2533d3b0591SJens Wiklander 2543d3b0591SJens Wiklander ctx->len = mbedtls_mpi_size( &ctx->P ); 2553d3b0591SJens Wiklander return( 0 ); 2563d3b0591SJens Wiklander } 2573d3b0591SJens Wiklander 2583d3b0591SJens Wiklander /* 259817466cbSJens Wiklander * Import the peer's public value G^Y 260817466cbSJens Wiklander */ 261817466cbSJens Wiklander int mbedtls_dhm_read_public( mbedtls_dhm_context *ctx, 262817466cbSJens Wiklander const unsigned char *input, size_t ilen ) 263817466cbSJens Wiklander { 264*11fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 2653d3b0591SJens Wiklander DHM_VALIDATE_RET( ctx != NULL ); 2663d3b0591SJens Wiklander DHM_VALIDATE_RET( input != NULL ); 267817466cbSJens Wiklander 2683d3b0591SJens Wiklander if( ilen < 1 || ilen > ctx->len ) 269817466cbSJens Wiklander return( MBEDTLS_ERR_DHM_BAD_INPUT_DATA ); 270817466cbSJens Wiklander 271817466cbSJens Wiklander if( ( ret = mbedtls_mpi_read_binary( &ctx->GY, input, ilen ) ) != 0 ) 272817466cbSJens Wiklander return( MBEDTLS_ERR_DHM_READ_PUBLIC_FAILED + ret ); 273817466cbSJens Wiklander 274817466cbSJens Wiklander return( 0 ); 275817466cbSJens Wiklander } 276817466cbSJens Wiklander 277817466cbSJens Wiklander /* 278817466cbSJens Wiklander * Create own private value X and export G^X 279817466cbSJens Wiklander */ 280817466cbSJens Wiklander int mbedtls_dhm_make_public( mbedtls_dhm_context *ctx, int x_size, 281817466cbSJens Wiklander unsigned char *output, size_t olen, 282817466cbSJens Wiklander int (*f_rng)(void *, unsigned char *, size_t), 283817466cbSJens Wiklander void *p_rng ) 284817466cbSJens Wiklander { 285817466cbSJens Wiklander int ret, count = 0; 2863d3b0591SJens Wiklander DHM_VALIDATE_RET( ctx != NULL ); 2873d3b0591SJens Wiklander DHM_VALIDATE_RET( output != NULL ); 2883d3b0591SJens Wiklander DHM_VALIDATE_RET( f_rng != NULL ); 289817466cbSJens Wiklander 2903d3b0591SJens Wiklander if( olen < 1 || olen > ctx->len ) 291817466cbSJens Wiklander return( MBEDTLS_ERR_DHM_BAD_INPUT_DATA ); 292817466cbSJens Wiklander 293817466cbSJens Wiklander if( mbedtls_mpi_cmp_int( &ctx->P, 0 ) == 0 ) 294817466cbSJens Wiklander return( MBEDTLS_ERR_DHM_BAD_INPUT_DATA ); 295817466cbSJens Wiklander 296817466cbSJens Wiklander /* 297817466cbSJens Wiklander * generate X and calculate GX = G^X mod P 298817466cbSJens Wiklander */ 299817466cbSJens Wiklander do 300817466cbSJens Wiklander { 301817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_fill_random( &ctx->X, x_size, f_rng, p_rng ) ); 302817466cbSJens Wiklander 303817466cbSJens Wiklander while( mbedtls_mpi_cmp_mpi( &ctx->X, &ctx->P ) >= 0 ) 304817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_shift_r( &ctx->X, 1 ) ); 305817466cbSJens Wiklander 306817466cbSJens Wiklander if( count++ > 10 ) 307817466cbSJens Wiklander return( MBEDTLS_ERR_DHM_MAKE_PUBLIC_FAILED ); 308817466cbSJens Wiklander } 309817466cbSJens Wiklander while( dhm_check_range( &ctx->X, &ctx->P ) != 0 ); 310817466cbSJens Wiklander 311817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_exp_mod( &ctx->GX, &ctx->G, &ctx->X, 312817466cbSJens Wiklander &ctx->P , &ctx->RP ) ); 313817466cbSJens Wiklander 314817466cbSJens Wiklander if( ( ret = dhm_check_range( &ctx->GX, &ctx->P ) ) != 0 ) 315817466cbSJens Wiklander return( ret ); 316817466cbSJens Wiklander 317817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_write_binary( &ctx->GX, output, olen ) ); 318817466cbSJens Wiklander 319817466cbSJens Wiklander cleanup: 320817466cbSJens Wiklander 321817466cbSJens Wiklander if( ret != 0 ) 322817466cbSJens Wiklander return( MBEDTLS_ERR_DHM_MAKE_PUBLIC_FAILED + ret ); 323817466cbSJens Wiklander 324817466cbSJens Wiklander return( 0 ); 325817466cbSJens Wiklander } 326817466cbSJens Wiklander 327817466cbSJens Wiklander /* 328817466cbSJens Wiklander * Use the blinding method and optimisation suggested in section 10 of: 329817466cbSJens Wiklander * KOCHER, Paul C. Timing attacks on implementations of Diffie-Hellman, RSA, 330817466cbSJens Wiklander * DSS, and other systems. In : Advances in Cryptology-CRYPTO'96. Springer 331817466cbSJens Wiklander * Berlin Heidelberg, 1996. p. 104-113. 332817466cbSJens Wiklander */ 333817466cbSJens Wiklander static int dhm_update_blinding( mbedtls_dhm_context *ctx, 334817466cbSJens Wiklander int (*f_rng)(void *, unsigned char *, size_t), void *p_rng ) 335817466cbSJens Wiklander { 336817466cbSJens Wiklander int ret, count; 337817466cbSJens Wiklander 338817466cbSJens Wiklander /* 339817466cbSJens Wiklander * Don't use any blinding the first time a particular X is used, 340817466cbSJens Wiklander * but remember it to use blinding next time. 341817466cbSJens Wiklander */ 342817466cbSJens Wiklander if( mbedtls_mpi_cmp_mpi( &ctx->X, &ctx->pX ) != 0 ) 343817466cbSJens Wiklander { 344817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_copy( &ctx->pX, &ctx->X ) ); 345817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_lset( &ctx->Vi, 1 ) ); 346817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_lset( &ctx->Vf, 1 ) ); 347817466cbSJens Wiklander 348817466cbSJens Wiklander return( 0 ); 349817466cbSJens Wiklander } 350817466cbSJens Wiklander 351817466cbSJens Wiklander /* 352817466cbSJens Wiklander * Ok, we need blinding. Can we re-use existing values? 353817466cbSJens Wiklander * If yes, just update them by squaring them. 354817466cbSJens Wiklander */ 355817466cbSJens Wiklander if( mbedtls_mpi_cmp_int( &ctx->Vi, 1 ) != 0 ) 356817466cbSJens Wiklander { 357817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mpi( &ctx->Vi, &ctx->Vi, &ctx->Vi ) ); 358817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_mod_mpi( &ctx->Vi, &ctx->Vi, &ctx->P ) ); 359817466cbSJens Wiklander 360817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mpi( &ctx->Vf, &ctx->Vf, &ctx->Vf ) ); 361817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_mod_mpi( &ctx->Vf, &ctx->Vf, &ctx->P ) ); 362817466cbSJens Wiklander 363817466cbSJens Wiklander return( 0 ); 364817466cbSJens Wiklander } 365817466cbSJens Wiklander 366817466cbSJens Wiklander /* 367817466cbSJens Wiklander * We need to generate blinding values from scratch 368817466cbSJens Wiklander */ 369817466cbSJens Wiklander 370817466cbSJens Wiklander /* Vi = random( 2, P-1 ) */ 371817466cbSJens Wiklander count = 0; 372817466cbSJens Wiklander do 373817466cbSJens Wiklander { 374817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_fill_random( &ctx->Vi, mbedtls_mpi_size( &ctx->P ), f_rng, p_rng ) ); 375817466cbSJens Wiklander 376817466cbSJens Wiklander while( mbedtls_mpi_cmp_mpi( &ctx->Vi, &ctx->P ) >= 0 ) 377817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_shift_r( &ctx->Vi, 1 ) ); 378817466cbSJens Wiklander 379817466cbSJens Wiklander if( count++ > 10 ) 380817466cbSJens Wiklander return( MBEDTLS_ERR_MPI_NOT_ACCEPTABLE ); 381817466cbSJens Wiklander } 382817466cbSJens Wiklander while( mbedtls_mpi_cmp_int( &ctx->Vi, 1 ) <= 0 ); 383817466cbSJens Wiklander 384817466cbSJens Wiklander /* Vf = Vi^-X mod P */ 385817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_inv_mod( &ctx->Vf, &ctx->Vi, &ctx->P ) ); 386817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_exp_mod( &ctx->Vf, &ctx->Vf, &ctx->X, &ctx->P, &ctx->RP ) ); 387817466cbSJens Wiklander 388817466cbSJens Wiklander cleanup: 389817466cbSJens Wiklander return( ret ); 390817466cbSJens Wiklander } 391817466cbSJens Wiklander 392817466cbSJens Wiklander /* 393817466cbSJens Wiklander * Derive and export the shared secret (G^Y)^X mod P 394817466cbSJens Wiklander */ 395817466cbSJens Wiklander int mbedtls_dhm_calc_secret( mbedtls_dhm_context *ctx, 396817466cbSJens Wiklander unsigned char *output, size_t output_size, size_t *olen, 397817466cbSJens Wiklander int (*f_rng)(void *, unsigned char *, size_t), 398817466cbSJens Wiklander void *p_rng ) 399817466cbSJens Wiklander { 400*11fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 401817466cbSJens Wiklander mbedtls_mpi GYb; 4023d3b0591SJens Wiklander DHM_VALIDATE_RET( ctx != NULL ); 4033d3b0591SJens Wiklander DHM_VALIDATE_RET( output != NULL ); 4043d3b0591SJens Wiklander DHM_VALIDATE_RET( olen != NULL ); 405817466cbSJens Wiklander 4063d3b0591SJens Wiklander if( output_size < ctx->len ) 407817466cbSJens Wiklander return( MBEDTLS_ERR_DHM_BAD_INPUT_DATA ); 408817466cbSJens Wiklander 409817466cbSJens Wiklander if( ( ret = dhm_check_range( &ctx->GY, &ctx->P ) ) != 0 ) 410817466cbSJens Wiklander return( ret ); 411817466cbSJens Wiklander 412817466cbSJens Wiklander mbedtls_mpi_init( &GYb ); 413817466cbSJens Wiklander 414817466cbSJens Wiklander /* Blind peer's value */ 415817466cbSJens Wiklander if( f_rng != NULL ) 416817466cbSJens Wiklander { 417817466cbSJens Wiklander MBEDTLS_MPI_CHK( dhm_update_blinding( ctx, f_rng, p_rng ) ); 418817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mpi( &GYb, &ctx->GY, &ctx->Vi ) ); 419817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_mod_mpi( &GYb, &GYb, &ctx->P ) ); 420817466cbSJens Wiklander } 421817466cbSJens Wiklander else 422817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_copy( &GYb, &ctx->GY ) ); 423817466cbSJens Wiklander 424817466cbSJens Wiklander /* Do modular exponentiation */ 425817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_exp_mod( &ctx->K, &GYb, &ctx->X, 426817466cbSJens Wiklander &ctx->P, &ctx->RP ) ); 427817466cbSJens Wiklander 428817466cbSJens Wiklander /* Unblind secret value */ 429817466cbSJens Wiklander if( f_rng != NULL ) 430817466cbSJens Wiklander { 431817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mpi( &ctx->K, &ctx->K, &ctx->Vf ) ); 432817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_mod_mpi( &ctx->K, &ctx->K, &ctx->P ) ); 433817466cbSJens Wiklander } 434817466cbSJens Wiklander 435817466cbSJens Wiklander *olen = mbedtls_mpi_size( &ctx->K ); 436817466cbSJens Wiklander 437817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_write_binary( &ctx->K, output, *olen ) ); 438817466cbSJens Wiklander 439817466cbSJens Wiklander cleanup: 440817466cbSJens Wiklander mbedtls_mpi_free( &GYb ); 441817466cbSJens Wiklander 442817466cbSJens Wiklander if( ret != 0 ) 443817466cbSJens Wiklander return( MBEDTLS_ERR_DHM_CALC_SECRET_FAILED + ret ); 444817466cbSJens Wiklander 445817466cbSJens Wiklander return( 0 ); 446817466cbSJens Wiklander } 447817466cbSJens Wiklander 448817466cbSJens Wiklander /* 449817466cbSJens Wiklander * Free the components of a DHM key 450817466cbSJens Wiklander */ 451817466cbSJens Wiklander void mbedtls_dhm_free( mbedtls_dhm_context *ctx ) 452817466cbSJens Wiklander { 4533d3b0591SJens Wiklander if( ctx == NULL ) 4543d3b0591SJens Wiklander return; 4553d3b0591SJens Wiklander 4563d3b0591SJens Wiklander mbedtls_mpi_free( &ctx->pX ); 4573d3b0591SJens Wiklander mbedtls_mpi_free( &ctx->Vf ); 4583d3b0591SJens Wiklander mbedtls_mpi_free( &ctx->Vi ); 4593d3b0591SJens Wiklander mbedtls_mpi_free( &ctx->RP ); 4603d3b0591SJens Wiklander mbedtls_mpi_free( &ctx->K ); 4613d3b0591SJens Wiklander mbedtls_mpi_free( &ctx->GY ); 4623d3b0591SJens Wiklander mbedtls_mpi_free( &ctx->GX ); 4633d3b0591SJens Wiklander mbedtls_mpi_free( &ctx->X ); 4643d3b0591SJens Wiklander mbedtls_mpi_free( &ctx->G ); 465817466cbSJens Wiklander mbedtls_mpi_free( &ctx->P ); 466817466cbSJens Wiklander 4673d3b0591SJens Wiklander mbedtls_platform_zeroize( ctx, sizeof( mbedtls_dhm_context ) ); 468817466cbSJens Wiklander } 469817466cbSJens Wiklander 470817466cbSJens Wiklander #if defined(MBEDTLS_ASN1_PARSE_C) 471817466cbSJens Wiklander /* 472817466cbSJens Wiklander * Parse DHM parameters 473817466cbSJens Wiklander */ 474817466cbSJens Wiklander int mbedtls_dhm_parse_dhm( mbedtls_dhm_context *dhm, const unsigned char *dhmin, 475817466cbSJens Wiklander size_t dhminlen ) 476817466cbSJens Wiklander { 477*11fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 478817466cbSJens Wiklander size_t len; 479817466cbSJens Wiklander unsigned char *p, *end; 480817466cbSJens Wiklander #if defined(MBEDTLS_PEM_PARSE_C) 481817466cbSJens Wiklander mbedtls_pem_context pem; 4823d3b0591SJens Wiklander #endif /* MBEDTLS_PEM_PARSE_C */ 483817466cbSJens Wiklander 4843d3b0591SJens Wiklander DHM_VALIDATE_RET( dhm != NULL ); 4853d3b0591SJens Wiklander DHM_VALIDATE_RET( dhmin != NULL ); 4863d3b0591SJens Wiklander 4873d3b0591SJens Wiklander #if defined(MBEDTLS_PEM_PARSE_C) 488817466cbSJens Wiklander mbedtls_pem_init( &pem ); 489817466cbSJens Wiklander 490817466cbSJens Wiklander /* Avoid calling mbedtls_pem_read_buffer() on non-null-terminated string */ 491817466cbSJens Wiklander if( dhminlen == 0 || dhmin[dhminlen - 1] != '\0' ) 492817466cbSJens Wiklander ret = MBEDTLS_ERR_PEM_NO_HEADER_FOOTER_PRESENT; 493817466cbSJens Wiklander else 494817466cbSJens Wiklander ret = mbedtls_pem_read_buffer( &pem, 495817466cbSJens Wiklander "-----BEGIN DH PARAMETERS-----", 496817466cbSJens Wiklander "-----END DH PARAMETERS-----", 497817466cbSJens Wiklander dhmin, NULL, 0, &dhminlen ); 498817466cbSJens Wiklander 499817466cbSJens Wiklander if( ret == 0 ) 500817466cbSJens Wiklander { 501817466cbSJens Wiklander /* 502817466cbSJens Wiklander * Was PEM encoded 503817466cbSJens Wiklander */ 504817466cbSJens Wiklander dhminlen = pem.buflen; 505817466cbSJens Wiklander } 506817466cbSJens Wiklander else if( ret != MBEDTLS_ERR_PEM_NO_HEADER_FOOTER_PRESENT ) 507817466cbSJens Wiklander goto exit; 508817466cbSJens Wiklander 509817466cbSJens Wiklander p = ( ret == 0 ) ? pem.buf : (unsigned char *) dhmin; 510817466cbSJens Wiklander #else 511817466cbSJens Wiklander p = (unsigned char *) dhmin; 512817466cbSJens Wiklander #endif /* MBEDTLS_PEM_PARSE_C */ 513817466cbSJens Wiklander end = p + dhminlen; 514817466cbSJens Wiklander 515817466cbSJens Wiklander /* 516817466cbSJens Wiklander * DHParams ::= SEQUENCE { 517817466cbSJens Wiklander * prime INTEGER, -- P 518817466cbSJens Wiklander * generator INTEGER, -- g 519817466cbSJens Wiklander * privateValueLength INTEGER OPTIONAL 520817466cbSJens Wiklander * } 521817466cbSJens Wiklander */ 522817466cbSJens Wiklander if( ( ret = mbedtls_asn1_get_tag( &p, end, &len, 523817466cbSJens Wiklander MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE ) ) != 0 ) 524817466cbSJens Wiklander { 525817466cbSJens Wiklander ret = MBEDTLS_ERR_DHM_INVALID_FORMAT + ret; 526817466cbSJens Wiklander goto exit; 527817466cbSJens Wiklander } 528817466cbSJens Wiklander 529817466cbSJens Wiklander end = p + len; 530817466cbSJens Wiklander 531817466cbSJens Wiklander if( ( ret = mbedtls_asn1_get_mpi( &p, end, &dhm->P ) ) != 0 || 532817466cbSJens Wiklander ( ret = mbedtls_asn1_get_mpi( &p, end, &dhm->G ) ) != 0 ) 533817466cbSJens Wiklander { 534817466cbSJens Wiklander ret = MBEDTLS_ERR_DHM_INVALID_FORMAT + ret; 535817466cbSJens Wiklander goto exit; 536817466cbSJens Wiklander } 537817466cbSJens Wiklander 538817466cbSJens Wiklander if( p != end ) 539817466cbSJens Wiklander { 540817466cbSJens Wiklander /* This might be the optional privateValueLength. 541817466cbSJens Wiklander * If so, we can cleanly discard it */ 542817466cbSJens Wiklander mbedtls_mpi rec; 543817466cbSJens Wiklander mbedtls_mpi_init( &rec ); 544817466cbSJens Wiklander ret = mbedtls_asn1_get_mpi( &p, end, &rec ); 545817466cbSJens Wiklander mbedtls_mpi_free( &rec ); 546817466cbSJens Wiklander if ( ret != 0 ) 547817466cbSJens Wiklander { 548817466cbSJens Wiklander ret = MBEDTLS_ERR_DHM_INVALID_FORMAT + ret; 549817466cbSJens Wiklander goto exit; 550817466cbSJens Wiklander } 551817466cbSJens Wiklander if ( p != end ) 552817466cbSJens Wiklander { 553817466cbSJens Wiklander ret = MBEDTLS_ERR_DHM_INVALID_FORMAT + 554817466cbSJens Wiklander MBEDTLS_ERR_ASN1_LENGTH_MISMATCH; 555817466cbSJens Wiklander goto exit; 556817466cbSJens Wiklander } 557817466cbSJens Wiklander } 558817466cbSJens Wiklander 559817466cbSJens Wiklander ret = 0; 560817466cbSJens Wiklander 561817466cbSJens Wiklander dhm->len = mbedtls_mpi_size( &dhm->P ); 562817466cbSJens Wiklander 563817466cbSJens Wiklander exit: 564817466cbSJens Wiklander #if defined(MBEDTLS_PEM_PARSE_C) 565817466cbSJens Wiklander mbedtls_pem_free( &pem ); 566817466cbSJens Wiklander #endif 567817466cbSJens Wiklander if( ret != 0 ) 568817466cbSJens Wiklander mbedtls_dhm_free( dhm ); 569817466cbSJens Wiklander 570817466cbSJens Wiklander return( ret ); 571817466cbSJens Wiklander } 572817466cbSJens Wiklander 573817466cbSJens Wiklander #if defined(MBEDTLS_FS_IO) 574817466cbSJens Wiklander /* 575817466cbSJens Wiklander * Load all data from a file into a given buffer. 576817466cbSJens Wiklander * 577817466cbSJens Wiklander * The file is expected to contain either PEM or DER encoded data. 578817466cbSJens Wiklander * A terminating null byte is always appended. It is included in the announced 579817466cbSJens Wiklander * length only if the data looks like it is PEM encoded. 580817466cbSJens Wiklander */ 581817466cbSJens Wiklander static int load_file( const char *path, unsigned char **buf, size_t *n ) 582817466cbSJens Wiklander { 583817466cbSJens Wiklander FILE *f; 584817466cbSJens Wiklander long size; 585817466cbSJens Wiklander 586817466cbSJens Wiklander if( ( f = fopen( path, "rb" ) ) == NULL ) 587817466cbSJens Wiklander return( MBEDTLS_ERR_DHM_FILE_IO_ERROR ); 588817466cbSJens Wiklander 589817466cbSJens Wiklander fseek( f, 0, SEEK_END ); 590817466cbSJens Wiklander if( ( size = ftell( f ) ) == -1 ) 591817466cbSJens Wiklander { 592817466cbSJens Wiklander fclose( f ); 593817466cbSJens Wiklander return( MBEDTLS_ERR_DHM_FILE_IO_ERROR ); 594817466cbSJens Wiklander } 595817466cbSJens Wiklander fseek( f, 0, SEEK_SET ); 596817466cbSJens Wiklander 597817466cbSJens Wiklander *n = (size_t) size; 598817466cbSJens Wiklander 599817466cbSJens Wiklander if( *n + 1 == 0 || 600817466cbSJens Wiklander ( *buf = mbedtls_calloc( 1, *n + 1 ) ) == NULL ) 601817466cbSJens Wiklander { 602817466cbSJens Wiklander fclose( f ); 603817466cbSJens Wiklander return( MBEDTLS_ERR_DHM_ALLOC_FAILED ); 604817466cbSJens Wiklander } 605817466cbSJens Wiklander 606817466cbSJens Wiklander if( fread( *buf, 1, *n, f ) != *n ) 607817466cbSJens Wiklander { 608817466cbSJens Wiklander fclose( f ); 6093d3b0591SJens Wiklander 6103d3b0591SJens Wiklander mbedtls_platform_zeroize( *buf, *n + 1 ); 611817466cbSJens Wiklander mbedtls_free( *buf ); 6123d3b0591SJens Wiklander 613817466cbSJens Wiklander return( MBEDTLS_ERR_DHM_FILE_IO_ERROR ); 614817466cbSJens Wiklander } 615817466cbSJens Wiklander 616817466cbSJens Wiklander fclose( f ); 617817466cbSJens Wiklander 618817466cbSJens Wiklander (*buf)[*n] = '\0'; 619817466cbSJens Wiklander 620817466cbSJens Wiklander if( strstr( (const char *) *buf, "-----BEGIN " ) != NULL ) 621817466cbSJens Wiklander ++*n; 622817466cbSJens Wiklander 623817466cbSJens Wiklander return( 0 ); 624817466cbSJens Wiklander } 625817466cbSJens Wiklander 626817466cbSJens Wiklander /* 627817466cbSJens Wiklander * Load and parse DHM parameters 628817466cbSJens Wiklander */ 629817466cbSJens Wiklander int mbedtls_dhm_parse_dhmfile( mbedtls_dhm_context *dhm, const char *path ) 630817466cbSJens Wiklander { 631*11fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 632817466cbSJens Wiklander size_t n; 633817466cbSJens Wiklander unsigned char *buf; 6343d3b0591SJens Wiklander DHM_VALIDATE_RET( dhm != NULL ); 6353d3b0591SJens Wiklander DHM_VALIDATE_RET( path != NULL ); 636817466cbSJens Wiklander 637817466cbSJens Wiklander if( ( ret = load_file( path, &buf, &n ) ) != 0 ) 638817466cbSJens Wiklander return( ret ); 639817466cbSJens Wiklander 640817466cbSJens Wiklander ret = mbedtls_dhm_parse_dhm( dhm, buf, n ); 641817466cbSJens Wiklander 6423d3b0591SJens Wiklander mbedtls_platform_zeroize( buf, n ); 643817466cbSJens Wiklander mbedtls_free( buf ); 644817466cbSJens Wiklander 645817466cbSJens Wiklander return( ret ); 646817466cbSJens Wiklander } 647817466cbSJens Wiklander #endif /* MBEDTLS_FS_IO */ 648817466cbSJens Wiklander #endif /* MBEDTLS_ASN1_PARSE_C */ 6493d3b0591SJens Wiklander #endif /* MBEDTLS_DHM_ALT */ 650817466cbSJens Wiklander 651817466cbSJens Wiklander #if defined(MBEDTLS_SELF_TEST) 652817466cbSJens Wiklander 6535b25c76aSJerome Forissier #if defined(MBEDTLS_PEM_PARSE_C) 654817466cbSJens Wiklander static const char mbedtls_test_dhm_params[] = 655817466cbSJens Wiklander "-----BEGIN DH PARAMETERS-----\r\n" 656817466cbSJens Wiklander "MIGHAoGBAJ419DBEOgmQTzo5qXl5fQcN9TN455wkOL7052HzxxRVMyhYmwQcgJvh\r\n" 657817466cbSJens Wiklander "1sa18fyfR9OiVEMYglOpkqVoGLN7qd5aQNNi5W7/C+VBdHTBJcGZJyyP5B3qcz32\r\n" 658817466cbSJens Wiklander "9mLJKudlVudV0Qxk5qUJaPZ/xupz0NyoVpviuiBOI1gNi8ovSXWzAgEC\r\n" 659817466cbSJens Wiklander "-----END DH PARAMETERS-----\r\n"; 6605b25c76aSJerome Forissier #else /* MBEDTLS_PEM_PARSE_C */ 6615b25c76aSJerome Forissier static const char mbedtls_test_dhm_params[] = { 6625b25c76aSJerome Forissier 0x30, 0x81, 0x87, 0x02, 0x81, 0x81, 0x00, 0x9e, 0x35, 0xf4, 0x30, 0x44, 6635b25c76aSJerome Forissier 0x3a, 0x09, 0x90, 0x4f, 0x3a, 0x39, 0xa9, 0x79, 0x79, 0x7d, 0x07, 0x0d, 6645b25c76aSJerome Forissier 0xf5, 0x33, 0x78, 0xe7, 0x9c, 0x24, 0x38, 0xbe, 0xf4, 0xe7, 0x61, 0xf3, 6655b25c76aSJerome Forissier 0xc7, 0x14, 0x55, 0x33, 0x28, 0x58, 0x9b, 0x04, 0x1c, 0x80, 0x9b, 0xe1, 6665b25c76aSJerome Forissier 0xd6, 0xc6, 0xb5, 0xf1, 0xfc, 0x9f, 0x47, 0xd3, 0xa2, 0x54, 0x43, 0x18, 6675b25c76aSJerome Forissier 0x82, 0x53, 0xa9, 0x92, 0xa5, 0x68, 0x18, 0xb3, 0x7b, 0xa9, 0xde, 0x5a, 6685b25c76aSJerome Forissier 0x40, 0xd3, 0x62, 0xe5, 0x6e, 0xff, 0x0b, 0xe5, 0x41, 0x74, 0x74, 0xc1, 6695b25c76aSJerome Forissier 0x25, 0xc1, 0x99, 0x27, 0x2c, 0x8f, 0xe4, 0x1d, 0xea, 0x73, 0x3d, 0xf6, 6705b25c76aSJerome Forissier 0xf6, 0x62, 0xc9, 0x2a, 0xe7, 0x65, 0x56, 0xe7, 0x55, 0xd1, 0x0c, 0x64, 6715b25c76aSJerome Forissier 0xe6, 0xa5, 0x09, 0x68, 0xf6, 0x7f, 0xc6, 0xea, 0x73, 0xd0, 0xdc, 0xa8, 6725b25c76aSJerome Forissier 0x56, 0x9b, 0xe2, 0xba, 0x20, 0x4e, 0x23, 0x58, 0x0d, 0x8b, 0xca, 0x2f, 6735b25c76aSJerome Forissier 0x49, 0x75, 0xb3, 0x02, 0x01, 0x02 }; 6745b25c76aSJerome Forissier #endif /* MBEDTLS_PEM_PARSE_C */ 675817466cbSJens Wiklander 676817466cbSJens Wiklander static const size_t mbedtls_test_dhm_params_len = sizeof( mbedtls_test_dhm_params ); 677817466cbSJens Wiklander 678817466cbSJens Wiklander /* 679817466cbSJens Wiklander * Checkup routine 680817466cbSJens Wiklander */ 681817466cbSJens Wiklander int mbedtls_dhm_self_test( int verbose ) 682817466cbSJens Wiklander { 683*11fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 684817466cbSJens Wiklander mbedtls_dhm_context dhm; 685817466cbSJens Wiklander 686817466cbSJens Wiklander mbedtls_dhm_init( &dhm ); 687817466cbSJens Wiklander 688817466cbSJens Wiklander if( verbose != 0 ) 689817466cbSJens Wiklander mbedtls_printf( " DHM parameter load: " ); 690817466cbSJens Wiklander 691817466cbSJens Wiklander if( ( ret = mbedtls_dhm_parse_dhm( &dhm, 692817466cbSJens Wiklander (const unsigned char *) mbedtls_test_dhm_params, 693817466cbSJens Wiklander mbedtls_test_dhm_params_len ) ) != 0 ) 694817466cbSJens Wiklander { 695817466cbSJens Wiklander if( verbose != 0 ) 696817466cbSJens Wiklander mbedtls_printf( "failed\n" ); 697817466cbSJens Wiklander 698817466cbSJens Wiklander ret = 1; 699817466cbSJens Wiklander goto exit; 700817466cbSJens Wiklander } 701817466cbSJens Wiklander 702817466cbSJens Wiklander if( verbose != 0 ) 703817466cbSJens Wiklander mbedtls_printf( "passed\n\n" ); 704817466cbSJens Wiklander 705817466cbSJens Wiklander exit: 706817466cbSJens Wiklander mbedtls_dhm_free( &dhm ); 707817466cbSJens Wiklander 708817466cbSJens Wiklander return( ret ); 709817466cbSJens Wiklander } 710817466cbSJens Wiklander 711817466cbSJens Wiklander #endif /* MBEDTLS_SELF_TEST */ 712817466cbSJens Wiklander 713817466cbSJens Wiklander #endif /* MBEDTLS_DHM_C */ 714