1*b0563631STom Van Eyck /*
2*b0563631STom Van Eyck * PSA FFDH layer on top of Mbed TLS crypto
3*b0563631STom Van Eyck */
4*b0563631STom Van Eyck /*
5*b0563631STom Van Eyck * Copyright The Mbed TLS Contributors
6*b0563631STom Van Eyck * SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later
7*b0563631STom Van Eyck */
8*b0563631STom Van Eyck
9*b0563631STom Van Eyck #include "common.h"
10*b0563631STom Van Eyck
11*b0563631STom Van Eyck #if defined(MBEDTLS_PSA_CRYPTO_C)
12*b0563631STom Van Eyck
13*b0563631STom Van Eyck /* This header is only needed because it defines
14*b0563631STom Van Eyck * MBEDTLS_DHM_RFC7919_FFDHEXXXX_[P|G]_BIN symbols that are used in
15*b0563631STom Van Eyck * mbedtls_psa_ffdh_set_prime_generator(). Apart from that, this module
16*b0563631STom Van Eyck * only uses bignum functions for arithmetic. */
17*b0563631STom Van Eyck #include <mbedtls/dhm.h>
18*b0563631STom Van Eyck
19*b0563631STom Van Eyck #include <psa/crypto.h>
20*b0563631STom Van Eyck #include "psa_crypto_core.h"
21*b0563631STom Van Eyck #include "psa_crypto_ffdh.h"
22*b0563631STom Van Eyck #include "psa_crypto_random_impl.h"
23*b0563631STom Van Eyck #include "mbedtls/platform.h"
24*b0563631STom Van Eyck #include "mbedtls/error.h"
25*b0563631STom Van Eyck
26*b0563631STom Van Eyck #if defined(MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_EXPORT) || \
27*b0563631STom Van Eyck defined(MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_GENERATE) || \
28*b0563631STom Van Eyck defined(MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_PUBLIC_KEY) || \
29*b0563631STom Van Eyck defined(MBEDTLS_PSA_BUILTIN_ALG_FFDH)
mbedtls_psa_ffdh_set_prime_generator(size_t key_size,mbedtls_mpi * P,mbedtls_mpi * G)30*b0563631STom Van Eyck static psa_status_t mbedtls_psa_ffdh_set_prime_generator(size_t key_size,
31*b0563631STom Van Eyck mbedtls_mpi *P,
32*b0563631STom Van Eyck mbedtls_mpi *G)
33*b0563631STom Van Eyck {
34*b0563631STom Van Eyck const unsigned char *dhm_P = NULL;
35*b0563631STom Van Eyck const unsigned char *dhm_G = NULL;
36*b0563631STom Van Eyck size_t dhm_size_P = 0;
37*b0563631STom Van Eyck size_t dhm_size_G = 0;
38*b0563631STom Van Eyck int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
39*b0563631STom Van Eyck
40*b0563631STom Van Eyck if (P == NULL && G == NULL) {
41*b0563631STom Van Eyck return PSA_ERROR_INVALID_ARGUMENT;
42*b0563631STom Van Eyck }
43*b0563631STom Van Eyck
44*b0563631STom Van Eyck #if defined(MBEDTLS_PSA_BUILTIN_DH_RFC7919_2048)
45*b0563631STom Van Eyck static const unsigned char dhm_P_2048[] =
46*b0563631STom Van Eyck MBEDTLS_DHM_RFC7919_FFDHE2048_P_BIN;
47*b0563631STom Van Eyck static const unsigned char dhm_G_2048[] =
48*b0563631STom Van Eyck MBEDTLS_DHM_RFC7919_FFDHE2048_G_BIN;
49*b0563631STom Van Eyck #endif /* MBEDTLS_PSA_BUILTIN_DH_RFC7919_2048 */
50*b0563631STom Van Eyck #if defined(MBEDTLS_PSA_BUILTIN_DH_RFC7919_3072)
51*b0563631STom Van Eyck static const unsigned char dhm_P_3072[] =
52*b0563631STom Van Eyck MBEDTLS_DHM_RFC7919_FFDHE3072_P_BIN;
53*b0563631STom Van Eyck static const unsigned char dhm_G_3072[] =
54*b0563631STom Van Eyck MBEDTLS_DHM_RFC7919_FFDHE3072_G_BIN;
55*b0563631STom Van Eyck #endif /* MBEDTLS_PSA_BUILTIN_DH_RFC7919_3072 */
56*b0563631STom Van Eyck #if defined(MBEDTLS_PSA_BUILTIN_DH_RFC7919_4096)
57*b0563631STom Van Eyck static const unsigned char dhm_P_4096[] =
58*b0563631STom Van Eyck MBEDTLS_DHM_RFC7919_FFDHE4096_P_BIN;
59*b0563631STom Van Eyck static const unsigned char dhm_G_4096[] =
60*b0563631STom Van Eyck MBEDTLS_DHM_RFC7919_FFDHE4096_G_BIN;
61*b0563631STom Van Eyck #endif /* MBEDTLS_PSA_BUILTIN_DH_RFC7919_4096 */
62*b0563631STom Van Eyck #if defined(MBEDTLS_PSA_BUILTIN_DH_RFC7919_6144)
63*b0563631STom Van Eyck static const unsigned char dhm_P_6144[] =
64*b0563631STom Van Eyck MBEDTLS_DHM_RFC7919_FFDHE6144_P_BIN;
65*b0563631STom Van Eyck static const unsigned char dhm_G_6144[] =
66*b0563631STom Van Eyck MBEDTLS_DHM_RFC7919_FFDHE6144_G_BIN;
67*b0563631STom Van Eyck #endif /* MBEDTLS_PSA_BUILTIN_DH_RFC7919_6144 */
68*b0563631STom Van Eyck #if defined(MBEDTLS_PSA_BUILTIN_DH_RFC7919_8192)
69*b0563631STom Van Eyck static const unsigned char dhm_P_8192[] =
70*b0563631STom Van Eyck MBEDTLS_DHM_RFC7919_FFDHE8192_P_BIN;
71*b0563631STom Van Eyck static const unsigned char dhm_G_8192[] =
72*b0563631STom Van Eyck MBEDTLS_DHM_RFC7919_FFDHE8192_G_BIN;
73*b0563631STom Van Eyck #endif /* MBEDTLS_PSA_BUILTIN_DH_RFC7919_8192 */
74*b0563631STom Van Eyck
75*b0563631STom Van Eyck switch (key_size) {
76*b0563631STom Van Eyck #if defined(MBEDTLS_PSA_BUILTIN_DH_RFC7919_2048)
77*b0563631STom Van Eyck case sizeof(dhm_P_2048):
78*b0563631STom Van Eyck dhm_P = dhm_P_2048;
79*b0563631STom Van Eyck dhm_G = dhm_G_2048;
80*b0563631STom Van Eyck dhm_size_P = sizeof(dhm_P_2048);
81*b0563631STom Van Eyck dhm_size_G = sizeof(dhm_G_2048);
82*b0563631STom Van Eyck break;
83*b0563631STom Van Eyck #endif /* MBEDTLS_PSA_BUILTIN_DH_RFC7919_2048 */
84*b0563631STom Van Eyck #if defined(MBEDTLS_PSA_BUILTIN_DH_RFC7919_3072)
85*b0563631STom Van Eyck case sizeof(dhm_P_3072):
86*b0563631STom Van Eyck dhm_P = dhm_P_3072;
87*b0563631STom Van Eyck dhm_G = dhm_G_3072;
88*b0563631STom Van Eyck dhm_size_P = sizeof(dhm_P_3072);
89*b0563631STom Van Eyck dhm_size_G = sizeof(dhm_G_3072);
90*b0563631STom Van Eyck break;
91*b0563631STom Van Eyck #endif /* MBEDTLS_PSA_BUILTIN_DH_RFC7919_3072 */
92*b0563631STom Van Eyck #if defined(MBEDTLS_PSA_BUILTIN_DH_RFC7919_4096)
93*b0563631STom Van Eyck case sizeof(dhm_P_4096):
94*b0563631STom Van Eyck dhm_P = dhm_P_4096;
95*b0563631STom Van Eyck dhm_G = dhm_G_4096;
96*b0563631STom Van Eyck dhm_size_P = sizeof(dhm_P_4096);
97*b0563631STom Van Eyck dhm_size_G = sizeof(dhm_G_4096);
98*b0563631STom Van Eyck break;
99*b0563631STom Van Eyck #endif /* MBEDTLS_PSA_BUILTIN_DH_RFC7919_4096 */
100*b0563631STom Van Eyck #if defined(MBEDTLS_PSA_BUILTIN_DH_RFC7919_6144)
101*b0563631STom Van Eyck case sizeof(dhm_P_6144):
102*b0563631STom Van Eyck dhm_P = dhm_P_6144;
103*b0563631STom Van Eyck dhm_G = dhm_G_6144;
104*b0563631STom Van Eyck dhm_size_P = sizeof(dhm_P_6144);
105*b0563631STom Van Eyck dhm_size_G = sizeof(dhm_G_6144);
106*b0563631STom Van Eyck break;
107*b0563631STom Van Eyck #endif /* MBEDTLS_PSA_BUILTIN_DH_RFC7919_6144 */
108*b0563631STom Van Eyck #if defined(MBEDTLS_PSA_BUILTIN_DH_RFC7919_8192)
109*b0563631STom Van Eyck case sizeof(dhm_P_8192):
110*b0563631STom Van Eyck dhm_P = dhm_P_8192;
111*b0563631STom Van Eyck dhm_G = dhm_G_8192;
112*b0563631STom Van Eyck dhm_size_P = sizeof(dhm_P_8192);
113*b0563631STom Van Eyck dhm_size_G = sizeof(dhm_G_8192);
114*b0563631STom Van Eyck break;
115*b0563631STom Van Eyck #endif /* MBEDTLS_PSA_BUILTIN_DH_RFC7919_8192 */
116*b0563631STom Van Eyck default:
117*b0563631STom Van Eyck return PSA_ERROR_INVALID_ARGUMENT;
118*b0563631STom Van Eyck }
119*b0563631STom Van Eyck
120*b0563631STom Van Eyck if (P != NULL) {
121*b0563631STom Van Eyck MBEDTLS_MPI_CHK(mbedtls_mpi_read_binary(P, dhm_P,
122*b0563631STom Van Eyck dhm_size_P));
123*b0563631STom Van Eyck }
124*b0563631STom Van Eyck if (G != NULL) {
125*b0563631STom Van Eyck MBEDTLS_MPI_CHK(mbedtls_mpi_read_binary(G, dhm_G,
126*b0563631STom Van Eyck dhm_size_G));
127*b0563631STom Van Eyck }
128*b0563631STom Van Eyck
129*b0563631STom Van Eyck cleanup:
130*b0563631STom Van Eyck if (ret != 0) {
131*b0563631STom Van Eyck return mbedtls_to_psa_error(ret);
132*b0563631STom Van Eyck }
133*b0563631STom Van Eyck
134*b0563631STom Van Eyck return PSA_SUCCESS;
135*b0563631STom Van Eyck }
136*b0563631STom Van Eyck #endif /* MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_EXPORT ||
137*b0563631STom Van Eyck MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_GENERATE ||
138*b0563631STom Van Eyck MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_PUBLIC_KEY ||
139*b0563631STom Van Eyck MBEDTLS_PSA_BUILTIN_ALG_FFDH */
140*b0563631STom Van Eyck
141*b0563631STom Van Eyck #if defined(MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_EXPORT) || \
142*b0563631STom Van Eyck defined(MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_PUBLIC_KEY)
mbedtls_psa_ffdh_export_public_key(const psa_key_attributes_t * attributes,const uint8_t * key_buffer,size_t key_buffer_size,uint8_t * data,size_t data_size,size_t * data_length)143*b0563631STom Van Eyck psa_status_t mbedtls_psa_ffdh_export_public_key(
144*b0563631STom Van Eyck const psa_key_attributes_t *attributes,
145*b0563631STom Van Eyck const uint8_t *key_buffer,
146*b0563631STom Van Eyck size_t key_buffer_size,
147*b0563631STom Van Eyck uint8_t *data,
148*b0563631STom Van Eyck size_t data_size,
149*b0563631STom Van Eyck size_t *data_length)
150*b0563631STom Van Eyck {
151*b0563631STom Van Eyck int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
152*b0563631STom Van Eyck psa_status_t status = PSA_ERROR_CORRUPTION_DETECTED;
153*b0563631STom Van Eyck mbedtls_mpi GX, G, X, P;
154*b0563631STom Van Eyck psa_key_type_t type = attributes->type;
155*b0563631STom Van Eyck
156*b0563631STom Van Eyck if (PSA_KEY_TYPE_IS_PUBLIC_KEY(type)) {
157*b0563631STom Van Eyck if (key_buffer_size > data_size) {
158*b0563631STom Van Eyck return PSA_ERROR_BUFFER_TOO_SMALL;
159*b0563631STom Van Eyck }
160*b0563631STom Van Eyck memcpy(data, key_buffer, key_buffer_size);
161*b0563631STom Van Eyck memset(data + key_buffer_size, 0,
162*b0563631STom Van Eyck data_size - key_buffer_size);
163*b0563631STom Van Eyck *data_length = key_buffer_size;
164*b0563631STom Van Eyck return PSA_SUCCESS;
165*b0563631STom Van Eyck }
166*b0563631STom Van Eyck
167*b0563631STom Van Eyck mbedtls_mpi_init(&GX); mbedtls_mpi_init(&G);
168*b0563631STom Van Eyck mbedtls_mpi_init(&X); mbedtls_mpi_init(&P);
169*b0563631STom Van Eyck
170*b0563631STom Van Eyck size_t key_len = PSA_BITS_TO_BYTES(attributes->bits);
171*b0563631STom Van Eyck
172*b0563631STom Van Eyck status = mbedtls_psa_ffdh_set_prime_generator(key_len, &P, &G);
173*b0563631STom Van Eyck
174*b0563631STom Van Eyck if (status != PSA_SUCCESS) {
175*b0563631STom Van Eyck goto cleanup;
176*b0563631STom Van Eyck }
177*b0563631STom Van Eyck
178*b0563631STom Van Eyck MBEDTLS_MPI_CHK(mbedtls_mpi_read_binary(&X, key_buffer,
179*b0563631STom Van Eyck key_buffer_size));
180*b0563631STom Van Eyck
181*b0563631STom Van Eyck MBEDTLS_MPI_CHK(mbedtls_mpi_exp_mod(&GX, &G, &X, &P, NULL));
182*b0563631STom Van Eyck MBEDTLS_MPI_CHK(mbedtls_mpi_write_binary(&GX, data, key_len));
183*b0563631STom Van Eyck
184*b0563631STom Van Eyck *data_length = key_len;
185*b0563631STom Van Eyck
186*b0563631STom Van Eyck ret = 0;
187*b0563631STom Van Eyck cleanup:
188*b0563631STom Van Eyck mbedtls_mpi_free(&P); mbedtls_mpi_free(&G);
189*b0563631STom Van Eyck mbedtls_mpi_free(&X); mbedtls_mpi_free(&GX);
190*b0563631STom Van Eyck
191*b0563631STom Van Eyck if (status == PSA_SUCCESS && ret != 0) {
192*b0563631STom Van Eyck status = mbedtls_to_psa_error(ret);
193*b0563631STom Van Eyck }
194*b0563631STom Van Eyck
195*b0563631STom Van Eyck return status;
196*b0563631STom Van Eyck }
197*b0563631STom Van Eyck #endif /* MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_EXPORT ||
198*b0563631STom Van Eyck MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_PUBLIC_KEY */
199*b0563631STom Van Eyck
200*b0563631STom Van Eyck #if defined(MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_GENERATE)
mbedtls_psa_ffdh_generate_key(const psa_key_attributes_t * attributes,uint8_t * key_buffer,size_t key_buffer_size,size_t * key_buffer_length)201*b0563631STom Van Eyck psa_status_t mbedtls_psa_ffdh_generate_key(
202*b0563631STom Van Eyck const psa_key_attributes_t *attributes,
203*b0563631STom Van Eyck uint8_t *key_buffer, size_t key_buffer_size, size_t *key_buffer_length)
204*b0563631STom Van Eyck {
205*b0563631STom Van Eyck mbedtls_mpi X, P;
206*b0563631STom Van Eyck int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
207*b0563631STom Van Eyck psa_status_t status = PSA_ERROR_CORRUPTION_DETECTED;
208*b0563631STom Van Eyck mbedtls_mpi_init(&P); mbedtls_mpi_init(&X);
209*b0563631STom Van Eyck (void) attributes;
210*b0563631STom Van Eyck
211*b0563631STom Van Eyck status = mbedtls_psa_ffdh_set_prime_generator(key_buffer_size, &P, NULL);
212*b0563631STom Van Eyck
213*b0563631STom Van Eyck if (status != PSA_SUCCESS) {
214*b0563631STom Van Eyck goto cleanup;
215*b0563631STom Van Eyck }
216*b0563631STom Van Eyck
217*b0563631STom Van Eyck /* RFC7919: Traditional finite field Diffie-Hellman has each peer choose their
218*b0563631STom Van Eyck secret exponent from the range [2, P-2].
219*b0563631STom Van Eyck Select random value in range [3, P-1] and decrease it by 1. */
220*b0563631STom Van Eyck MBEDTLS_MPI_CHK(mbedtls_mpi_random(&X, 3, &P, mbedtls_psa_get_random,
221*b0563631STom Van Eyck MBEDTLS_PSA_RANDOM_STATE));
222*b0563631STom Van Eyck MBEDTLS_MPI_CHK(mbedtls_mpi_sub_int(&X, &X, 1));
223*b0563631STom Van Eyck MBEDTLS_MPI_CHK(mbedtls_mpi_write_binary(&X, key_buffer, key_buffer_size));
224*b0563631STom Van Eyck *key_buffer_length = key_buffer_size;
225*b0563631STom Van Eyck
226*b0563631STom Van Eyck cleanup:
227*b0563631STom Van Eyck mbedtls_mpi_free(&P); mbedtls_mpi_free(&X);
228*b0563631STom Van Eyck if (status == PSA_SUCCESS && ret != 0) {
229*b0563631STom Van Eyck return mbedtls_to_psa_error(ret);
230*b0563631STom Van Eyck }
231*b0563631STom Van Eyck
232*b0563631STom Van Eyck return status;
233*b0563631STom Van Eyck }
234*b0563631STom Van Eyck #endif /* MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_GENERATE */
235*b0563631STom Van Eyck
236*b0563631STom Van Eyck #if defined(MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_IMPORT)
mbedtls_psa_ffdh_import_key(const psa_key_attributes_t * attributes,const uint8_t * data,size_t data_length,uint8_t * key_buffer,size_t key_buffer_size,size_t * key_buffer_length,size_t * bits)237*b0563631STom Van Eyck psa_status_t mbedtls_psa_ffdh_import_key(
238*b0563631STom Van Eyck const psa_key_attributes_t *attributes,
239*b0563631STom Van Eyck const uint8_t *data, size_t data_length,
240*b0563631STom Van Eyck uint8_t *key_buffer, size_t key_buffer_size,
241*b0563631STom Van Eyck size_t *key_buffer_length, size_t *bits)
242*b0563631STom Van Eyck {
243*b0563631STom Van Eyck (void) attributes;
244*b0563631STom Van Eyck
245*b0563631STom Van Eyck if (key_buffer_size < data_length) {
246*b0563631STom Van Eyck return PSA_ERROR_BUFFER_TOO_SMALL;
247*b0563631STom Van Eyck }
248*b0563631STom Van Eyck memcpy(key_buffer, data, data_length);
249*b0563631STom Van Eyck *key_buffer_length = data_length;
250*b0563631STom Van Eyck *bits = PSA_BYTES_TO_BITS(data_length);
251*b0563631STom Van Eyck
252*b0563631STom Van Eyck return PSA_SUCCESS;
253*b0563631STom Van Eyck }
254*b0563631STom Van Eyck #endif /* MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_IMPORT */
255*b0563631STom Van Eyck
256*b0563631STom Van Eyck #if defined(MBEDTLS_PSA_BUILTIN_ALG_FFDH)
mbedtls_psa_ffdh_key_agreement(const psa_key_attributes_t * attributes,const uint8_t * peer_key,size_t peer_key_length,const uint8_t * key_buffer,size_t key_buffer_size,uint8_t * shared_secret,size_t shared_secret_size,size_t * shared_secret_length)257*b0563631STom Van Eyck psa_status_t mbedtls_psa_ffdh_key_agreement(
258*b0563631STom Van Eyck const psa_key_attributes_t *attributes,
259*b0563631STom Van Eyck const uint8_t *peer_key,
260*b0563631STom Van Eyck size_t peer_key_length,
261*b0563631STom Van Eyck const uint8_t *key_buffer,
262*b0563631STom Van Eyck size_t key_buffer_size,
263*b0563631STom Van Eyck uint8_t *shared_secret,
264*b0563631STom Van Eyck size_t shared_secret_size,
265*b0563631STom Van Eyck size_t *shared_secret_length)
266*b0563631STom Van Eyck {
267*b0563631STom Van Eyck int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
268*b0563631STom Van Eyck psa_status_t status = PSA_ERROR_CORRUPTION_DETECTED;
269*b0563631STom Van Eyck mbedtls_mpi P, G, X, GY, K;
270*b0563631STom Van Eyck const size_t calculated_shared_secret_size = peer_key_length;
271*b0563631STom Van Eyck
272*b0563631STom Van Eyck if (peer_key_length != key_buffer_size ||
273*b0563631STom Van Eyck calculated_shared_secret_size > shared_secret_size) {
274*b0563631STom Van Eyck return PSA_ERROR_INVALID_ARGUMENT;
275*b0563631STom Van Eyck }
276*b0563631STom Van Eyck
277*b0563631STom Van Eyck if (!PSA_KEY_TYPE_IS_DH_KEY_PAIR(psa_get_key_type(attributes))) {
278*b0563631STom Van Eyck return PSA_ERROR_INVALID_ARGUMENT;
279*b0563631STom Van Eyck }
280*b0563631STom Van Eyck
281*b0563631STom Van Eyck mbedtls_mpi_init(&P); mbedtls_mpi_init(&G);
282*b0563631STom Van Eyck mbedtls_mpi_init(&X); mbedtls_mpi_init(&GY);
283*b0563631STom Van Eyck mbedtls_mpi_init(&K);
284*b0563631STom Van Eyck
285*b0563631STom Van Eyck status = mbedtls_psa_ffdh_set_prime_generator(
286*b0563631STom Van Eyck PSA_BITS_TO_BYTES(attributes->bits), &P, &G);
287*b0563631STom Van Eyck
288*b0563631STom Van Eyck if (status != PSA_SUCCESS) {
289*b0563631STom Van Eyck goto cleanup;
290*b0563631STom Van Eyck }
291*b0563631STom Van Eyck
292*b0563631STom Van Eyck MBEDTLS_MPI_CHK(mbedtls_mpi_read_binary(&X, key_buffer,
293*b0563631STom Van Eyck key_buffer_size));
294*b0563631STom Van Eyck
295*b0563631STom Van Eyck MBEDTLS_MPI_CHK(mbedtls_mpi_read_binary(&GY, peer_key,
296*b0563631STom Van Eyck peer_key_length));
297*b0563631STom Van Eyck
298*b0563631STom Van Eyck /* Calculate shared secret public key: K = G^(XY) mod P = GY^X mod P */
299*b0563631STom Van Eyck MBEDTLS_MPI_CHK(mbedtls_mpi_exp_mod(&K, &GY, &X, &P, NULL));
300*b0563631STom Van Eyck
301*b0563631STom Van Eyck MBEDTLS_MPI_CHK(mbedtls_mpi_write_binary(&K, shared_secret,
302*b0563631STom Van Eyck calculated_shared_secret_size));
303*b0563631STom Van Eyck
304*b0563631STom Van Eyck *shared_secret_length = calculated_shared_secret_size;
305*b0563631STom Van Eyck
306*b0563631STom Van Eyck ret = 0;
307*b0563631STom Van Eyck
308*b0563631STom Van Eyck cleanup:
309*b0563631STom Van Eyck mbedtls_mpi_free(&P); mbedtls_mpi_free(&G);
310*b0563631STom Van Eyck mbedtls_mpi_free(&X); mbedtls_mpi_free(&GY);
311*b0563631STom Van Eyck mbedtls_mpi_free(&K);
312*b0563631STom Van Eyck
313*b0563631STom Van Eyck if (status == PSA_SUCCESS && ret != 0) {
314*b0563631STom Van Eyck status = mbedtls_to_psa_error(ret);
315*b0563631STom Van Eyck }
316*b0563631STom Van Eyck
317*b0563631STom Van Eyck return status;
318*b0563631STom Van Eyck }
319*b0563631STom Van Eyck #endif /* MBEDTLS_PSA_BUILTIN_ALG_FFDH */
320*b0563631STom Van Eyck
321*b0563631STom Van Eyck #endif /* MBEDTLS_PSA_CRYPTO_C */
322