Received: by 2002:a25:e74b:0:0:0:0:0 with SMTP id e72csp394162ybh; Sun, 12 Jul 2020 09:43:29 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzK57b6dwLU95pnYylo7Jpif2ZCbPHrqfY0Ss6aFGEhD/jtuTbJ+UidAzSQZEJS1ChqwgFV X-Received: by 2002:a17:906:abca:: with SMTP id kq10mr57515361ejb.515.1594572209774; Sun, 12 Jul 2020 09:43:29 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1594572209; cv=none; d=google.com; s=arc-20160816; b=n59RehZO87pmWP+SVcUvOQpcC9tgbuU2YqHblJQgu/GPWdJ0bvAPi73dFh231iW6EV U+Hn9dY9IPEgnIpbFT/ZXO409qQJxRodF/dbt+xb/YFq32vyeZVZEApBNzLqboTftxuX mN9Zxf5LiWokXrgijJlYc1Hzx+/uZMMN8qQgPYy4dgEB+/AoW0T6wsaX4f4nUXvAP5L7 +2T33bdmPMQhaf5KzBfyBua7aPZy5v94G9bYyV4awtk67gHYk2LabX73NRTYpR6MFe0g WeaVrenrkxROqlL57EmBBcI2UFurn++luJM3aH5BakgVeHasHDH2Q8A3H9kS5PZzWRJd F2rg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=PbTCrMuLKJg7LeJdSYhEdiWbAXVQXMVAuVIFa1I/WxE=; b=hUiFB+e7c0aHm7itWxfIHHohaN/IEKOddffyoLZHf2kQoTSG8cFM1l93eAGJgnO8m8 FWXHjlHaSWr+BqsKAcbAtqeuU1Vf4lKXGzbxGj3QFx/R146czD1tfhQdxLmz9xxLkxkm JJ4kCUf+6cSIl/ag/oSXfTUhIHF7fcc6gE+dAK+jjnZC27HMfzzSI3HzgLxul1X6uRwl xaIZ264zTbuZrepqtPvsakujLrpve2giMr+yiugmuI1aEKSj7L1dy0sMDCQzWYEyRDCK S0kLxILTSWHia32htthfIa9C19bmd1F3SqDHsWeTfk6Q6wWKcd2hboxCo/52jGCARFxj 129A== ARC-Authentication-Results: i=1; mx.google.com; dkim=fail header.i=@chronox.de header.s=strato-dkim-0002 header.b=DoCX3uZ1; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id y19si7573094edt.374.2020.07.12.09.42.55; Sun, 12 Jul 2020 09:43:29 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=fail header.i=@chronox.de header.s=strato-dkim-0002 header.b=DoCX3uZ1; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729143AbgGLQml (ORCPT + 99 others); Sun, 12 Jul 2020 12:42:41 -0400 Received: from mo4-p02-ob.smtp.rzone.de ([85.215.255.82]:24499 "EHLO mo4-p02-ob.smtp.rzone.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729136AbgGLQmg (ORCPT ); Sun, 12 Jul 2020 12:42:36 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; t=1594572151; s=strato-dkim-0002; d=chronox.de; h=References:In-Reply-To:Message-ID:Date:Subject:Cc:To:From: X-RZG-CLASS-ID:X-RZG-AUTH:From:Subject:Sender; bh=PbTCrMuLKJg7LeJdSYhEdiWbAXVQXMVAuVIFa1I/WxE=; b=DoCX3uZ1AZPrHjix+wnrqiO+WWeHWAbH0pzkZedSiCiC6iCUYknyYzhfqR4qU92+Xq 4eE0ZMm+wQri0cCoMib3nDEnQ7uCdNpA9PaveU4MhU1MQjWqpLpdRjbdipp7p2aqvtDg I5AgOoZ7QPZBCG9POUYNGLI3SkCItX1kB4sbB3yV3s80tjO4cO38DLJZ656k6sKsrZ9P 1yrJKY1v6yZ7CcjdA7SBRGhXO7PZv0v3P6Rkq4BMavQBWnq7vBdKO8B0hCxQientZK5w eXjxN/j6g8GuDV72MTyKC2UfJu2l0X8fkcXZwdBqMQOcDlRXs8WBSHeWRHamHZMXYoO9 gzFw== X-RZG-AUTH: ":P2ERcEykfu11Y98lp/T7+hdri+uKZK8TKWEqNyiHySGSa9k9xmwdNnzGHXPaIvSfHReW" X-RZG-CLASS-ID: mo00 Received: from positron.chronox.de by smtp.strato.de (RZmta 46.10.5 DYNA|AUTH) with ESMTPSA id y0546bw6CGgNieI (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256 bits)) (Client did not present a certificate); Sun, 12 Jul 2020 18:42:23 +0200 (CEST) From: Stephan =?ISO-8859-1?Q?M=FCller?= To: herbert@gondor.apana.org.au Cc: linux-crypto@vger.kernel.org, Marcelo Cerri , Tianjia Zhang , ard.biesheuvel@linaro.org, nhorman@redhat.com, simo@redhat.com Subject: [PATCH v2 0/5] DH: SP800-56A rev 3 compliant validation checks Date: Sun, 12 Jul 2020 18:38:49 +0200 Message-ID: <5722559.lOV4Wx5bFT@positron.chronox.de> In-Reply-To: <2543601.mvXUDI8C0e@positron.chronox.de> References: <2543601.mvXUDI8C0e@positron.chronox.de> MIME-Version: 1.0 Content-Transfer-Encoding: 7Bit Content-Type: text/plain; charset="us-ascii" Sender: linux-crypto-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org Hi, This patch set adds the required checks to make all aspects of (EC)DH compliant with SP800-56A rev 3 assuming that all keys are ephemeral. The use of static keys adds yet additional validations which are hard to achieve in the kernel. SP800-56A rev 3 mandates various checks: - validation of remote public key defined in section 5.6.2.2.2 is already implemented in: * ECC: crypto_ecdh_shared_secret with the call of ecc_is_pubkey_valid_partial * FFC: dh_compute_val when the req->src is read and validated with dh_is_pubkey_valid - validation of generated shared secret: The patch set adds the shared secret validation as defined by SP800-56A rev 3. For ECDH this only implies that the validation of the shared secret is moved before the shared secret is returned to the caller. For DH, the validation is required to be performed against the prime of the domain parameter set. This patch adds the MPI library file mpi_sub_ui that is required to calculate P - 1 for the DH check. It would be possible, though to simply set the LSB of the prime to 0 to obtain P - 1 (since P is odd per definition) which implies that mpi_sub_ui would not be needed. However, this would require a copy operation from the existing prime MPI value into a temporary MPI where the modification can be performed. Such copy operation is not available. Therefore, the solution with the addition of mpi_sub_ui was chosen. NOTE: The function mpi_sub_ui is also added with the patch set "[PATCH v5 2/8] lib/mpi: Extend the MPI library" currently sent to the linux-crypto mailing list. - validation of the generated local public key: Patches 4 and 5 of this patch set adds the required checks. Changes to v1: - fix reference to Gnu MP as outlined by Ard Biesheuvel - addition of patches 4 and 5 Marcelo Henrique Cerri (1): lib/mpi: Add mpi_sub_ui() Stephan Mueller (4): crypto: ECDH - check validity of Z before export crypto: DH - check validity of Z before export crypto: DH SP800-56A rev 3 local public key validation crypto: ECDH SP800-56A rev 3 local public key validation crypto/dh.c | 38 ++++++++++++++++++++++++++++ crypto/ecc.c | 42 ++++++++++++++++++++++++++++--- crypto/ecc.h | 14 +++++++++++ include/linux/mpi.h | 3 +++ lib/mpi/Makefile | 1 + lib/mpi/mpi-sub-ui.c | 60 ++++++++++++++++++++++++++++++++++++++++++++ 6 files changed, 154 insertions(+), 4 deletions(-) create mode 100644 lib/mpi/mpi-sub-ui.c -- 2.26.2