Received: by 2002:a05:6500:1b45:b0:1f5:f2ab:c469 with SMTP id cz5csp935222lqb; Wed, 17 Apr 2024 15:42:34 -0700 (PDT) X-Forwarded-Encrypted: i=3; AJvYcCXp6U/Tp2k+ufzoGybExriKPgYAT4n4IsGvc7BfrkonAd/7qDKg9DfrOlvNhmJhfAyzdAstir0wXd6wUggabTqHV9Ca9SNHG/65frLUsg== X-Google-Smtp-Source: AGHT+IEjcpkID691haghSoVJH0cAG6RpXLEpoi+wY/h0NqhkbLTTdhPrGIlYPFBlKvur3uiaAN0b X-Received: by 2002:a05:6214:5847:b0:696:8026:7dc6 with SMTP id ml7-20020a056214584700b0069680267dc6mr869957qvb.50.1713393754685; Wed, 17 Apr 2024 15:42:34 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1713393754; cv=pass; d=google.com; s=arc-20160816; b=rVUlDGwXThvAFCqajwVE4ZMHFj8zJn8gMXo7IiHL80K8+XQ2Nuoad+9QV4Q24f1u4o Sw0RFDjGlglTET1edgHzQYcE5SKAcCBWdz9sVc/BHCHLEeWNsOPpBKdozrBgzmspMQ3J aI2iFLJzpOTA0I5mz/28zoFxKMtm0j/T4pnkeNyIT/w4thn96+lB86MCVzywjkXWCpnI /emOHk8hfyl+j2kUK7MuJ6DUki5C0T5SZlmbf8JU9/VEk8jUCya5TgeZh8rRY3oynYeE 1ZsAuyC+ftNugz+ZmQp7MrRHj4/qSmWTwssuzr+cE8QOPWFr7BxNCz+F37idn6kYOffJ 6xcw== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=in-reply-to:references:to:from:subject:cc:message-id:date :content-transfer-encoding:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:dkim-signature; bh=O7SULxyIqPol7b0lPUIcTpmqWE1pFirQpuhFDAc4oX8=; fh=/EbOcpxOGxlo1yA6DzqQqI6JGUJwuB51h4jNlWBE8b4=; b=guCqPcRdCqo0F+4MppgqOTTG4O16BhyG/xCRWxX6w3aDUxvYd53pKniJB1UiM8wjJq MPfs3lPTfASdxV38Wtfi1KahdR7cikQyr0t4mKXc+S7wnIzTlb9Vd9xvBBcYsJjXY6b9 61ZVk0jck8F1auNEmxA47tOl0LfavVXjmf42q0/YDlyFovI/zc1n+Y1ZEN3rMJxC7Ls8 dup660sGegl2emxniXp8BlfTQZz/40qzbynvR1bly3huwdoMhASHJZi250vJilfCCrSH xuilhDs1IReLtuA3DiQe8liBWSgecMHSkd7KW5c577xgz2ROdXvUmntUpgiorYsdSYfc eSkg==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=DyqqWAg+; arc=pass (i=1 dkim=pass dkdomain=kernel.org); spf=pass (google.com: domain of linux-crypto+bounces-3639-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.199.223 as permitted sender) smtp.mailfrom="linux-crypto+bounces-3639-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from ny.mirrors.kernel.org (ny.mirrors.kernel.org. [147.75.199.223]) by mx.google.com with ESMTPS id iy14-20020a0562140f6e00b0069df236a052si179359qvb.462.2024.04.17.15.42.34 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 17 Apr 2024 15:42:34 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-crypto+bounces-3639-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.199.223 as permitted sender) client-ip=147.75.199.223; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=DyqqWAg+; arc=pass (i=1 dkim=pass dkdomain=kernel.org); spf=pass (google.com: domain of linux-crypto+bounces-3639-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.199.223 as permitted sender) smtp.mailfrom="linux-crypto+bounces-3639-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ny.mirrors.kernel.org (Postfix) with ESMTPS id 6CE741C2136E for ; Wed, 17 Apr 2024 22:42:34 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id DBFB47E588; Wed, 17 Apr 2024 22:42:30 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="DyqqWAg+" X-Original-To: linux-crypto@vger.kernel.org Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 98B333B185; Wed, 17 Apr 2024 22:42:30 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1713393750; cv=none; b=c/SblnJx6IpC4vX6kNhVq9+oi31Y5pE7X5Ndb0jHX5yvNtlRzn5YP2HtcjzuI5B6zl8Q+ByAHp22Gcvr2BeKt/pofXP5REBqLSPWfWV/YCRG5nAez7/dYqxdN/wASA/JP75a4dqY0hwABzBFvoqyyiUd4GlhALwz5TlhcPPT69M= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1713393750; c=relaxed/simple; bh=XWbQF5jD2/m0tERk6PZrN0PJtQTcq3cUhXrLmYsfu0I=; h=Mime-Version:Content-Type:Date:Message-Id:Cc:Subject:From:To: References:In-Reply-To; b=AsuceNmDR19UJidjDJ4ePMqRem1EMAXoZRFka0Yfr0a4VsPLyTFY+0nJNyv93fbatS8dq8lrBEQ0ocluwjrAKOXVhW57ZJ6gkfra0+rDPAtvNcQvjRPUPIMFStHmPiSjNMjFqCyCAo0sje0bhplA/lSl143Rp47mPgXr5RvUq8k= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=DyqqWAg+; arc=none smtp.client-ip=10.30.226.201 Received: by smtp.kernel.org (Postfix) with ESMTPSA id 85BCBC072AA; Wed, 17 Apr 2024 22:42:28 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1713393750; bh=XWbQF5jD2/m0tERk6PZrN0PJtQTcq3cUhXrLmYsfu0I=; h=Date:Cc:Subject:From:To:References:In-Reply-To:From; b=DyqqWAg+82aIDxJpTcIQMPdxLK043FPaSnw0h3g6IKnBoi6nXZqs3CHoWRHlYNg5V oEnC4LYtDRgDO+a2OZGgMoY/axWmxUgcWc9RSzblWPX6gsVusfp6krhxDo4qRSbIsD O26BpBe4jDdPjpannmnZSiairkhzYbT5Zo8vv95lJQpvzoTDTveR3j2NUtWifxAx9a 9j+yCVQFM4Nd4YgIEGEMIeiTKWn9Fl/cJ+MDIc9B+V65B5UlIQCiWKqVDRnlPIWAO1 jCWNq1DF5MN3NJ8LMHkfMOKWpk18DHF6ztHUKDg2kUFV/orHTrElozlHx3d6/rLG7/ 2jTSMq7RD0GkQ== Precedence: bulk X-Mailing-List: linux-crypto@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: Mime-Version: 1.0 Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset=UTF-8 Date: Thu, 18 Apr 2024 01:42:26 +0300 Message-Id: Cc: , , , Subject: Re: [PATCH v2 1/2] crypto: ecdh - Pass private key in proper byte order to check valid key From: "Jarkko Sakkinen" To: "Stefan Berger" , , , X-Mailer: aerc 0.17.0 References: <20240417162117.2752326-1-stefanb@linux.ibm.com> <20240417162117.2752326-2-stefanb@linux.ibm.com> In-Reply-To: <20240417162117.2752326-2-stefanb@linux.ibm.com> On Wed Apr 17, 2024 at 7:21 PM EEST, Stefan Berger wrote: > ecc_is_key_valid expects a key with the most significant digit in the las= t > entry of the digit array. Currently ecdh_set_secret passes a reversed key > to ecc_is_key_valid that then passes the rather simple test checking > whether the private key is in range [2, n-3]. For all current ecdh- > supported curves (NIST P192/256/384) the 'n' parameter is a rather large > number, therefore easily passing this test. > > Throughout the ecdh and ecc codebase the variable 'priv' is used for a > private_key holding the bytes in proper byte order. Therefore, introduce > priv in ecdh_set_secret and copy the bytes from ctx->private_key into > priv in proper byte order by using ecc_swap_digits. Pass priv to > ecc_is_valid_key. > > Cc: Ard Biesheuvel > Cc: Salvatore Benedetto > Signed-off-by: Stefan Berger > --- > crypto/ecdh.c | 11 ++++++++--- > 1 file changed, 8 insertions(+), 3 deletions(-) > > diff --git a/crypto/ecdh.c b/crypto/ecdh.c > index 3049f147e011..c02c9a2b9682 100644 > --- a/crypto/ecdh.c > +++ b/crypto/ecdh.c > @@ -27,7 +27,9 @@ static int ecdh_set_secret(struct crypto_kpp *tfm, cons= t void *buf, > unsigned int len) > { > struct ecdh_ctx *ctx =3D ecdh_get_ctx(tfm); > + u64 priv[ECC_MAX_DIGITS]; > struct ecdh params; > + int ret =3D 0; > =20 > if (crypto_ecdh_decode_key(buf, len, ¶ms) < 0 || > params.key_size > sizeof(u64) * ctx->ndigits) > @@ -40,13 +42,16 @@ static int ecdh_set_secret(struct crypto_kpp *tfm, co= nst void *buf, > ctx->private_key); > =20 > memcpy(ctx->private_key, params.key, params.key_size); > + ecc_swap_digits(ctx->private_key, priv, ctx->ndigits); > =20 > if (ecc_is_key_valid(ctx->curve_id, ctx->ndigits, > - ctx->private_key, params.key_size) < 0) { > + priv, params.key_size) < 0) { > memzero_explicit(ctx->private_key, params.key_size); > - return -EINVAL; > + ret =3D -EINVAL; > } > - return 0; > + memzero_explicit(priv, sizeof(priv)); > + > + return ret; > } > =20 > static int ecdh_compute_value(struct kpp_request *req) Acked-by: Jarkko Sakkinen BR, Jarkko