1*4882a593Smuzhiyun /*
2*4882a593Smuzhiyun * Elliptic curve DSA
3*4882a593Smuzhiyun *
4*4882a593Smuzhiyun * Copyright (C) 2006-2015, ARM Limited, All Rights Reserved
5*4882a593Smuzhiyun * SPDX-License-Identifier: Apache-2.0
6*4882a593Smuzhiyun *
7*4882a593Smuzhiyun * Licensed under the Apache License, Version 2.0 (the "License"); you may
8*4882a593Smuzhiyun * not use this file except in compliance with the License.
9*4882a593Smuzhiyun * You may obtain a copy of the License at
10*4882a593Smuzhiyun *
11*4882a593Smuzhiyun * http://www.apache.org/licenses/LICENSE-2.0
12*4882a593Smuzhiyun *
13*4882a593Smuzhiyun * Unless required by applicable law or agreed to in writing, software
14*4882a593Smuzhiyun * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
15*4882a593Smuzhiyun * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
16*4882a593Smuzhiyun * See the License for the specific language governing permissions and
17*4882a593Smuzhiyun * limitations under the License.
18*4882a593Smuzhiyun *
19*4882a593Smuzhiyun * This file is part of mbed TLS (https://tls.mbed.org)
20*4882a593Smuzhiyun */
21*4882a593Smuzhiyun
22*4882a593Smuzhiyun /*
23*4882a593Smuzhiyun * References:
24*4882a593Smuzhiyun *
25*4882a593Smuzhiyun * SEC1 http://www.secg.org/index.php?action=secg,docs_secg
26*4882a593Smuzhiyun */
27*4882a593Smuzhiyun
28*4882a593Smuzhiyun #define MBEDTLS_ECDSA_C
29*4882a593Smuzhiyun #if defined(MBEDTLS_ECDSA_C)
30*4882a593Smuzhiyun #include <stdlib.h>
31*4882a593Smuzhiyun #include <stdio.h>
32*4882a593Smuzhiyun #include <time.h>
33*4882a593Smuzhiyun #include "ecdsa.h"
34*4882a593Smuzhiyun #include "asn1write.h"
35*4882a593Smuzhiyun
36*4882a593Smuzhiyun #include <string.h>
37*4882a593Smuzhiyun
38*4882a593Smuzhiyun #if defined(MBEDTLS_ECDSA_DETERMINISTIC)
39*4882a593Smuzhiyun #include "mbedtls/hmac_drbg.h"
40*4882a593Smuzhiyun #endif
41*4882a593Smuzhiyun
42*4882a593Smuzhiyun #define DEBUG(format,...) printf("[%s]:%d: "format"\n", __func__,__LINE__, ##__VA_ARGS__)
43*4882a593Smuzhiyun
44*4882a593Smuzhiyun /*
45*4882a593Smuzhiyun * Derive a suitable integer for group grp from a buffer of length len
46*4882a593Smuzhiyun * SEC1 4.1.3 step 5 aka SEC1 4.1.4 step 3
47*4882a593Smuzhiyun */
derive_mpi(const mbedtls_ecp_group * grp,mbedtls_mpi * x,const unsigned char * buf,size_t blen)48*4882a593Smuzhiyun static int derive_mpi( const mbedtls_ecp_group *grp, mbedtls_mpi *x,
49*4882a593Smuzhiyun const unsigned char *buf, size_t blen )
50*4882a593Smuzhiyun {
51*4882a593Smuzhiyun int ret;
52*4882a593Smuzhiyun size_t n_size = ( grp->nbits + 7 ) / 8;
53*4882a593Smuzhiyun size_t use_size = blen > n_size ? n_size : blen;
54*4882a593Smuzhiyun
55*4882a593Smuzhiyun MBEDTLS_MPI_CHK( mbedtls_mpi_read_binary( x, buf, use_size ) );
56*4882a593Smuzhiyun if( use_size * 8 > grp->nbits )
57*4882a593Smuzhiyun MBEDTLS_MPI_CHK( mbedtls_mpi_shift_r( x, use_size * 8 - grp->nbits ) );
58*4882a593Smuzhiyun
59*4882a593Smuzhiyun /* While at it, reduce modulo N */
60*4882a593Smuzhiyun if( mbedtls_mpi_cmp_mpi( x, &grp->N ) >= 0 )
61*4882a593Smuzhiyun MBEDTLS_MPI_CHK( mbedtls_mpi_sub_mpi( x, x, &grp->N ) );
62*4882a593Smuzhiyun
63*4882a593Smuzhiyun cleanup:
64*4882a593Smuzhiyun return( ret );
65*4882a593Smuzhiyun }
66*4882a593Smuzhiyun
67*4882a593Smuzhiyun /*
68*4882a593Smuzhiyun * Compute ECDSA signature of a hashed message (SEC1 4.1.3)
69*4882a593Smuzhiyun * Obviously, compared to SEC1 4.1.3, we skip step 4 (hash message)
70*4882a593Smuzhiyun */
mbedtls_ecdsa_sign(mbedtls_ecp_group * grp,mbedtls_mpi * r,mbedtls_mpi * s,const mbedtls_mpi * d,const unsigned char * buf,size_t blen,int (* f_rng)(void *,unsigned char *,size_t),void * p_rng)71*4882a593Smuzhiyun int mbedtls_ecdsa_sign( mbedtls_ecp_group *grp, mbedtls_mpi *r, mbedtls_mpi *s,
72*4882a593Smuzhiyun const mbedtls_mpi *d, const unsigned char *buf, size_t blen,
73*4882a593Smuzhiyun int (*f_rng)(void *, unsigned char *, size_t), void *p_rng )
74*4882a593Smuzhiyun {
75*4882a593Smuzhiyun int ret, key_tries, sign_tries, blind_tries;
76*4882a593Smuzhiyun mbedtls_ecp_point R;
77*4882a593Smuzhiyun mbedtls_mpi k, e, t;
78*4882a593Smuzhiyun
79*4882a593Smuzhiyun /* Fail cleanly on curves such as Curve25519 that can't be used for ECDSA */
80*4882a593Smuzhiyun if( grp->N.p == NULL )
81*4882a593Smuzhiyun return( MBEDTLS_ERR_ECP_BAD_INPUT_DATA );
82*4882a593Smuzhiyun
83*4882a593Smuzhiyun mbedtls_ecp_point_init( &R );
84*4882a593Smuzhiyun mbedtls_mpi_init( &k ); mbedtls_mpi_init( &e ); mbedtls_mpi_init( &t );
85*4882a593Smuzhiyun
86*4882a593Smuzhiyun sign_tries = 0;
87*4882a593Smuzhiyun do
88*4882a593Smuzhiyun {
89*4882a593Smuzhiyun /*
90*4882a593Smuzhiyun * Steps 1-3: generate a suitable ephemeral keypair
91*4882a593Smuzhiyun * and set r = xR mod n
92*4882a593Smuzhiyun */
93*4882a593Smuzhiyun key_tries = 0;
94*4882a593Smuzhiyun do
95*4882a593Smuzhiyun {
96*4882a593Smuzhiyun MBEDTLS_MPI_CHK( mbedtls_ecp_gen_keypair( grp, &k, &R, f_rng, p_rng ) );
97*4882a593Smuzhiyun MBEDTLS_MPI_CHK( mbedtls_mpi_mod_mpi( r, &R.X, &grp->N ) );
98*4882a593Smuzhiyun
99*4882a593Smuzhiyun if( key_tries++ > 10 )
100*4882a593Smuzhiyun {
101*4882a593Smuzhiyun ret = MBEDTLS_ERR_ECP_RANDOM_FAILED;
102*4882a593Smuzhiyun goto cleanup;
103*4882a593Smuzhiyun }
104*4882a593Smuzhiyun }
105*4882a593Smuzhiyun while( mbedtls_mpi_cmp_int( r, 0 ) == 0 );
106*4882a593Smuzhiyun
107*4882a593Smuzhiyun /*
108*4882a593Smuzhiyun * Step 5: derive MPI from hashed message
109*4882a593Smuzhiyun */
110*4882a593Smuzhiyun MBEDTLS_MPI_CHK( derive_mpi( grp, &e, buf, blen ) );
111*4882a593Smuzhiyun
112*4882a593Smuzhiyun /*
113*4882a593Smuzhiyun * Generate a random value to blind inv_mod in next step,
114*4882a593Smuzhiyun * avoiding a potential timing leak.
115*4882a593Smuzhiyun */
116*4882a593Smuzhiyun blind_tries = 0;
117*4882a593Smuzhiyun do
118*4882a593Smuzhiyun {
119*4882a593Smuzhiyun size_t n_size = ( grp->nbits + 7 ) / 8;
120*4882a593Smuzhiyun MBEDTLS_MPI_CHK( mbedtls_mpi_fill_random( &t, n_size, f_rng, p_rng ) );
121*4882a593Smuzhiyun MBEDTLS_MPI_CHK( mbedtls_mpi_shift_r( &t, 8 * n_size - grp->nbits ) );
122*4882a593Smuzhiyun
123*4882a593Smuzhiyun /* See mbedtls_ecp_gen_keypair() */
124*4882a593Smuzhiyun if( ++blind_tries > 30 )
125*4882a593Smuzhiyun return( MBEDTLS_ERR_ECP_RANDOM_FAILED );
126*4882a593Smuzhiyun }
127*4882a593Smuzhiyun while( mbedtls_mpi_cmp_int( &t, 1 ) < 0 ||
128*4882a593Smuzhiyun mbedtls_mpi_cmp_mpi( &t, &grp->N ) >= 0 );
129*4882a593Smuzhiyun
130*4882a593Smuzhiyun /*
131*4882a593Smuzhiyun * Step 6: compute s = (e + r * d) / k = t (e + rd) / (kt) mod n
132*4882a593Smuzhiyun */
133*4882a593Smuzhiyun MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mpi( s, r, d ) );
134*4882a593Smuzhiyun MBEDTLS_MPI_CHK( mbedtls_mpi_add_mpi( &e, &e, s ) );
135*4882a593Smuzhiyun MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mpi( &e, &e, &t ) );
136*4882a593Smuzhiyun MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mpi( &k, &k, &t ) );
137*4882a593Smuzhiyun MBEDTLS_MPI_CHK( mbedtls_mpi_inv_mod( s, &k, &grp->N ) );
138*4882a593Smuzhiyun MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mpi( s, s, &e ) );
139*4882a593Smuzhiyun MBEDTLS_MPI_CHK( mbedtls_mpi_mod_mpi( s, s, &grp->N ) );
140*4882a593Smuzhiyun
141*4882a593Smuzhiyun if( sign_tries++ > 10 )
142*4882a593Smuzhiyun {
143*4882a593Smuzhiyun ret = MBEDTLS_ERR_ECP_RANDOM_FAILED;
144*4882a593Smuzhiyun goto cleanup;
145*4882a593Smuzhiyun }
146*4882a593Smuzhiyun }
147*4882a593Smuzhiyun while( mbedtls_mpi_cmp_int( s, 0 ) == 0 );
148*4882a593Smuzhiyun
149*4882a593Smuzhiyun cleanup:
150*4882a593Smuzhiyun mbedtls_ecp_point_free( &R );
151*4882a593Smuzhiyun mbedtls_mpi_free( &k ); mbedtls_mpi_free( &e ); mbedtls_mpi_free( &t );
152*4882a593Smuzhiyun
153*4882a593Smuzhiyun return( ret );
154*4882a593Smuzhiyun }
155*4882a593Smuzhiyun
156*4882a593Smuzhiyun #if defined(MBEDTLS_ECDSA_DETERMINISTIC)
157*4882a593Smuzhiyun /*
158*4882a593Smuzhiyun * Deterministic signature wrapper
159*4882a593Smuzhiyun */
mbedtls_ecdsa_sign_det(mbedtls_ecp_group * grp,mbedtls_mpi * r,mbedtls_mpi * s,const mbedtls_mpi * d,const unsigned char * buf,size_t blen,mbedtls_md_type_t md_alg)160*4882a593Smuzhiyun int mbedtls_ecdsa_sign_det( mbedtls_ecp_group *grp, mbedtls_mpi *r, mbedtls_mpi *s,
161*4882a593Smuzhiyun const mbedtls_mpi *d, const unsigned char *buf, size_t blen,
162*4882a593Smuzhiyun mbedtls_md_type_t md_alg )
163*4882a593Smuzhiyun {
164*4882a593Smuzhiyun int ret;
165*4882a593Smuzhiyun mbedtls_hmac_drbg_context rng_ctx;
166*4882a593Smuzhiyun unsigned char data[2 * MBEDTLS_ECP_MAX_BYTES];
167*4882a593Smuzhiyun size_t grp_len = ( grp->nbits + 7 ) / 8;
168*4882a593Smuzhiyun const mbedtls_md_info_t *md_info;
169*4882a593Smuzhiyun mbedtls_mpi h;
170*4882a593Smuzhiyun
171*4882a593Smuzhiyun if( ( md_info = mbedtls_md_info_from_type( md_alg ) ) == NULL )
172*4882a593Smuzhiyun return( MBEDTLS_ERR_ECP_BAD_INPUT_DATA );
173*4882a593Smuzhiyun
174*4882a593Smuzhiyun mbedtls_mpi_init( &h );
175*4882a593Smuzhiyun mbedtls_hmac_drbg_init( &rng_ctx );
176*4882a593Smuzhiyun
177*4882a593Smuzhiyun /* Use private key and message hash (reduced) to initialize HMAC_DRBG */
178*4882a593Smuzhiyun MBEDTLS_MPI_CHK( mbedtls_mpi_write_binary( d, data, grp_len ) );
179*4882a593Smuzhiyun MBEDTLS_MPI_CHK( derive_mpi( grp, &h, buf, blen ) );
180*4882a593Smuzhiyun MBEDTLS_MPI_CHK( mbedtls_mpi_write_binary( &h, data + grp_len, grp_len ) );
181*4882a593Smuzhiyun mbedtls_hmac_drbg_seed_buf( &rng_ctx, md_info, data, 2 * grp_len );
182*4882a593Smuzhiyun
183*4882a593Smuzhiyun ret = mbedtls_ecdsa_sign( grp, r, s, d, buf, blen,
184*4882a593Smuzhiyun mbedtls_hmac_drbg_random, &rng_ctx );
185*4882a593Smuzhiyun
186*4882a593Smuzhiyun cleanup:
187*4882a593Smuzhiyun mbedtls_hmac_drbg_free( &rng_ctx );
188*4882a593Smuzhiyun mbedtls_mpi_free( &h );
189*4882a593Smuzhiyun
190*4882a593Smuzhiyun return( ret );
191*4882a593Smuzhiyun }
192*4882a593Smuzhiyun #endif /* MBEDTLS_ECDSA_DETERMINISTIC */
193*4882a593Smuzhiyun
194*4882a593Smuzhiyun /*
195*4882a593Smuzhiyun * Verify ECDSA signature of hashed message (SEC1 4.1.4)
196*4882a593Smuzhiyun * Obviously, compared to SEC1 4.1.3, we skip step 2 (hash message)
197*4882a593Smuzhiyun */
mbedtls_ecdsa_verify(mbedtls_ecp_group * grp,const unsigned char * buf,size_t blen,const mbedtls_ecp_point * Q,const mbedtls_mpi * r,const mbedtls_mpi * s)198*4882a593Smuzhiyun int mbedtls_ecdsa_verify( mbedtls_ecp_group *grp,
199*4882a593Smuzhiyun const unsigned char *buf, size_t blen,
200*4882a593Smuzhiyun const mbedtls_ecp_point *Q, const mbedtls_mpi *r, const mbedtls_mpi *s)
201*4882a593Smuzhiyun {
202*4882a593Smuzhiyun int ret;
203*4882a593Smuzhiyun mbedtls_mpi e, s_inv, u1, u2;
204*4882a593Smuzhiyun mbedtls_ecp_point R;
205*4882a593Smuzhiyun
206*4882a593Smuzhiyun mbedtls_ecp_point_init( &R );
207*4882a593Smuzhiyun mbedtls_mpi_init( &e ); mbedtls_mpi_init( &s_inv ); mbedtls_mpi_init( &u1 ); mbedtls_mpi_init( &u2 );
208*4882a593Smuzhiyun
209*4882a593Smuzhiyun /* Fail cleanly on curves such as Curve25519 that can't be used for ECDSA */
210*4882a593Smuzhiyun if( grp->N.p == NULL )
211*4882a593Smuzhiyun return( MBEDTLS_ERR_ECP_BAD_INPUT_DATA );
212*4882a593Smuzhiyun
213*4882a593Smuzhiyun /*
214*4882a593Smuzhiyun * Step 1: make sure r and s are in range 1..n-1
215*4882a593Smuzhiyun */
216*4882a593Smuzhiyun if( mbedtls_mpi_cmp_int( r, 1 ) < 0 || mbedtls_mpi_cmp_mpi( r, &grp->N ) >= 0 ||
217*4882a593Smuzhiyun mbedtls_mpi_cmp_int( s, 1 ) < 0 || mbedtls_mpi_cmp_mpi( s, &grp->N ) >= 0 )
218*4882a593Smuzhiyun {
219*4882a593Smuzhiyun ret = MBEDTLS_ERR_ECP_VERIFY_FAILED;
220*4882a593Smuzhiyun goto cleanup;
221*4882a593Smuzhiyun }
222*4882a593Smuzhiyun
223*4882a593Smuzhiyun /*
224*4882a593Smuzhiyun * Additional precaution: make sure Q is valid
225*4882a593Smuzhiyun */
226*4882a593Smuzhiyun MBEDTLS_MPI_CHK( mbedtls_ecp_check_pubkey( grp, Q ) );
227*4882a593Smuzhiyun
228*4882a593Smuzhiyun /*
229*4882a593Smuzhiyun * Step 3: derive MPI from hashed message
230*4882a593Smuzhiyun */
231*4882a593Smuzhiyun MBEDTLS_MPI_CHK( derive_mpi( grp, &e, buf, blen ) );
232*4882a593Smuzhiyun
233*4882a593Smuzhiyun /*
234*4882a593Smuzhiyun * Step 4: u1 = e / s mod n, u2 = r / s mod n
235*4882a593Smuzhiyun */
236*4882a593Smuzhiyun MBEDTLS_MPI_CHK( mbedtls_mpi_inv_mod( &s_inv, s, &grp->N ) );
237*4882a593Smuzhiyun
238*4882a593Smuzhiyun MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mpi( &u1, &e, &s_inv ) );
239*4882a593Smuzhiyun MBEDTLS_MPI_CHK( mbedtls_mpi_mod_mpi( &u1, &u1, &grp->N ) );
240*4882a593Smuzhiyun
241*4882a593Smuzhiyun MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mpi( &u2, r, &s_inv ) );
242*4882a593Smuzhiyun MBEDTLS_MPI_CHK( mbedtls_mpi_mod_mpi( &u2, &u2, &grp->N ) );
243*4882a593Smuzhiyun
244*4882a593Smuzhiyun /*
245*4882a593Smuzhiyun * Step 5: R = u1 G + u2 Q
246*4882a593Smuzhiyun *
247*4882a593Smuzhiyun * Since we're not using any secret data, no need to pass a RNG to
248*4882a593Smuzhiyun * mbedtls_ecp_mul() for countermesures.
249*4882a593Smuzhiyun */
250*4882a593Smuzhiyun MBEDTLS_MPI_CHK( mbedtls_ecp_muladd( grp, &R, &u1, &grp->G, &u2, Q ) );
251*4882a593Smuzhiyun
252*4882a593Smuzhiyun if( mbedtls_ecp_is_zero( &R ) )
253*4882a593Smuzhiyun {
254*4882a593Smuzhiyun ret = MBEDTLS_ERR_ECP_VERIFY_FAILED;
255*4882a593Smuzhiyun goto cleanup;
256*4882a593Smuzhiyun }
257*4882a593Smuzhiyun
258*4882a593Smuzhiyun /*
259*4882a593Smuzhiyun * Step 6: convert xR to an integer (no-op)
260*4882a593Smuzhiyun * Step 7: reduce xR mod n (gives v)
261*4882a593Smuzhiyun */
262*4882a593Smuzhiyun MBEDTLS_MPI_CHK( mbedtls_mpi_mod_mpi( &R.X, &R.X, &grp->N ) );
263*4882a593Smuzhiyun
264*4882a593Smuzhiyun /*
265*4882a593Smuzhiyun * Step 8: check if v (that is, R.X) is equal to r
266*4882a593Smuzhiyun */
267*4882a593Smuzhiyun if( mbedtls_mpi_cmp_mpi( &R.X, r ) != 0 )
268*4882a593Smuzhiyun {
269*4882a593Smuzhiyun ret = MBEDTLS_ERR_ECP_VERIFY_FAILED;
270*4882a593Smuzhiyun goto cleanup;
271*4882a593Smuzhiyun }
272*4882a593Smuzhiyun
273*4882a593Smuzhiyun cleanup:
274*4882a593Smuzhiyun mbedtls_ecp_point_free( &R );
275*4882a593Smuzhiyun mbedtls_mpi_free( &e ); mbedtls_mpi_free( &s_inv ); mbedtls_mpi_free( &u1 ); mbedtls_mpi_free( &u2 );
276*4882a593Smuzhiyun
277*4882a593Smuzhiyun return( ret );
278*4882a593Smuzhiyun }
279*4882a593Smuzhiyun
280*4882a593Smuzhiyun /*
281*4882a593Smuzhiyun * Convert a signature (given by context) to ASN.1
282*4882a593Smuzhiyun */
ecdsa_signature_to_asn1(const mbedtls_mpi * r,const mbedtls_mpi * s,unsigned char * sig,size_t * slen)283*4882a593Smuzhiyun static int ecdsa_signature_to_asn1( const mbedtls_mpi *r, const mbedtls_mpi *s,
284*4882a593Smuzhiyun unsigned char *sig, size_t *slen )
285*4882a593Smuzhiyun {
286*4882a593Smuzhiyun int ret;
287*4882a593Smuzhiyun unsigned char buf[MBEDTLS_ECDSA_MAX_LEN];
288*4882a593Smuzhiyun unsigned char *p = buf + sizeof( buf );
289*4882a593Smuzhiyun size_t len = 0;
290*4882a593Smuzhiyun
291*4882a593Smuzhiyun MBEDTLS_ASN1_CHK_ADD( len, mbedtls_asn1_write_mpi( &p, buf, s ) );
292*4882a593Smuzhiyun MBEDTLS_ASN1_CHK_ADD( len, mbedtls_asn1_write_mpi( &p, buf, r ) );
293*4882a593Smuzhiyun
294*4882a593Smuzhiyun MBEDTLS_ASN1_CHK_ADD( len, mbedtls_asn1_write_len( &p, buf, len ) );
295*4882a593Smuzhiyun MBEDTLS_ASN1_CHK_ADD( len, mbedtls_asn1_write_tag( &p, buf,
296*4882a593Smuzhiyun MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE ) );
297*4882a593Smuzhiyun
298*4882a593Smuzhiyun memcpy( sig, p, len );
299*4882a593Smuzhiyun *slen = len;
300*4882a593Smuzhiyun
301*4882a593Smuzhiyun return( 0 );
302*4882a593Smuzhiyun }
303*4882a593Smuzhiyun
304*4882a593Smuzhiyun /*
305*4882a593Smuzhiyun * Compute and write signature
306*4882a593Smuzhiyun */
mbedtls_ecdsa_write_signature(mbedtls_ecdsa_context * ctx,mbedtls_md_type_t md_alg,const unsigned char * hash,size_t hlen,unsigned char * sig,size_t * slen,int (* f_rng)(void *,unsigned char *,size_t),void * p_rng)307*4882a593Smuzhiyun int mbedtls_ecdsa_write_signature( mbedtls_ecdsa_context *ctx, mbedtls_md_type_t md_alg,
308*4882a593Smuzhiyun const unsigned char *hash, size_t hlen,
309*4882a593Smuzhiyun unsigned char *sig, size_t *slen,
310*4882a593Smuzhiyun int (*f_rng)(void *, unsigned char *, size_t),
311*4882a593Smuzhiyun void *p_rng )
312*4882a593Smuzhiyun {
313*4882a593Smuzhiyun int ret;
314*4882a593Smuzhiyun mbedtls_mpi r, s;
315*4882a593Smuzhiyun
316*4882a593Smuzhiyun mbedtls_mpi_init( &r );
317*4882a593Smuzhiyun mbedtls_mpi_init( &s );
318*4882a593Smuzhiyun
319*4882a593Smuzhiyun #if defined(MBEDTLS_ECDSA_DETERMINISTIC)
320*4882a593Smuzhiyun (void) f_rng;
321*4882a593Smuzhiyun (void) p_rng;
322*4882a593Smuzhiyun
323*4882a593Smuzhiyun MBEDTLS_MPI_CHK( mbedtls_ecdsa_sign_det( &ctx->grp, &r, &s, &ctx->d,
324*4882a593Smuzhiyun hash, hlen, md_alg ) );
325*4882a593Smuzhiyun #else
326*4882a593Smuzhiyun (void) md_alg;
327*4882a593Smuzhiyun
328*4882a593Smuzhiyun MBEDTLS_MPI_CHK( mbedtls_ecdsa_sign( &ctx->grp, &r, &s, &ctx->d,
329*4882a593Smuzhiyun hash, hlen, f_rng, p_rng ) );
330*4882a593Smuzhiyun #endif
331*4882a593Smuzhiyun
332*4882a593Smuzhiyun MBEDTLS_MPI_CHK( ecdsa_signature_to_asn1( &r, &s, sig, slen ) );
333*4882a593Smuzhiyun
334*4882a593Smuzhiyun cleanup:
335*4882a593Smuzhiyun mbedtls_mpi_free( &r );
336*4882a593Smuzhiyun mbedtls_mpi_free( &s );
337*4882a593Smuzhiyun
338*4882a593Smuzhiyun return( ret );
339*4882a593Smuzhiyun }
340*4882a593Smuzhiyun
341*4882a593Smuzhiyun #if ! defined(MBEDTLS_DEPRECATED_REMOVED) && \
342*4882a593Smuzhiyun defined(MBEDTLS_ECDSA_DETERMINISTIC)
mbedtls_ecdsa_write_signature_det(mbedtls_ecdsa_context * ctx,const unsigned char * hash,size_t hlen,unsigned char * sig,size_t * slen,mbedtls_md_type_t md_alg)343*4882a593Smuzhiyun int mbedtls_ecdsa_write_signature_det( mbedtls_ecdsa_context *ctx,
344*4882a593Smuzhiyun const unsigned char *hash, size_t hlen,
345*4882a593Smuzhiyun unsigned char *sig, size_t *slen,
346*4882a593Smuzhiyun mbedtls_md_type_t md_alg )
347*4882a593Smuzhiyun {
348*4882a593Smuzhiyun return( mbedtls_ecdsa_write_signature( ctx, md_alg, hash, hlen, sig, slen,
349*4882a593Smuzhiyun NULL, NULL ) );
350*4882a593Smuzhiyun }
351*4882a593Smuzhiyun #endif
352*4882a593Smuzhiyun
353*4882a593Smuzhiyun /*
354*4882a593Smuzhiyun * Read and check signature
355*4882a593Smuzhiyun */
mbedtls_ecdsa_read_signature(mbedtls_ecdsa_context * ctx,const unsigned char * hash,size_t hlen,const unsigned char * sig,size_t slen)356*4882a593Smuzhiyun int mbedtls_ecdsa_read_signature( mbedtls_ecdsa_context *ctx,
357*4882a593Smuzhiyun const unsigned char *hash, size_t hlen,
358*4882a593Smuzhiyun const unsigned char *sig, size_t slen )
359*4882a593Smuzhiyun {
360*4882a593Smuzhiyun int ret;
361*4882a593Smuzhiyun unsigned char *p = (unsigned char *) sig;
362*4882a593Smuzhiyun const unsigned char *end = sig + slen;
363*4882a593Smuzhiyun size_t len;
364*4882a593Smuzhiyun mbedtls_mpi r, s;
365*4882a593Smuzhiyun
366*4882a593Smuzhiyun mbedtls_mpi_init( &r );
367*4882a593Smuzhiyun mbedtls_mpi_init( &s );
368*4882a593Smuzhiyun
369*4882a593Smuzhiyun if( ( ret = mbedtls_asn1_get_tag( &p, end, &len,
370*4882a593Smuzhiyun MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE ) ) != 0 )
371*4882a593Smuzhiyun {
372*4882a593Smuzhiyun ret += MBEDTLS_ERR_ECP_BAD_INPUT_DATA;
373*4882a593Smuzhiyun goto cleanup;
374*4882a593Smuzhiyun }
375*4882a593Smuzhiyun
376*4882a593Smuzhiyun if( p + len != end )
377*4882a593Smuzhiyun {
378*4882a593Smuzhiyun ret = MBEDTLS_ERR_ECP_BAD_INPUT_DATA +
379*4882a593Smuzhiyun MBEDTLS_ERR_ASN1_LENGTH_MISMATCH;
380*4882a593Smuzhiyun goto cleanup;
381*4882a593Smuzhiyun }
382*4882a593Smuzhiyun
383*4882a593Smuzhiyun if( ( ret = mbedtls_asn1_get_mpi( &p, end, &r ) ) != 0 ||
384*4882a593Smuzhiyun ( ret = mbedtls_asn1_get_mpi( &p, end, &s ) ) != 0 )
385*4882a593Smuzhiyun {
386*4882a593Smuzhiyun ret += MBEDTLS_ERR_ECP_BAD_INPUT_DATA;
387*4882a593Smuzhiyun goto cleanup;
388*4882a593Smuzhiyun }
389*4882a593Smuzhiyun
390*4882a593Smuzhiyun if( ( ret = mbedtls_ecdsa_verify( &ctx->grp, hash, hlen,
391*4882a593Smuzhiyun &ctx->Q, &r, &s ) ) != 0 )
392*4882a593Smuzhiyun goto cleanup;
393*4882a593Smuzhiyun
394*4882a593Smuzhiyun if( p != end )
395*4882a593Smuzhiyun ret = MBEDTLS_ERR_ECP_SIG_LEN_MISMATCH;
396*4882a593Smuzhiyun
397*4882a593Smuzhiyun cleanup:
398*4882a593Smuzhiyun mbedtls_mpi_free( &r );
399*4882a593Smuzhiyun mbedtls_mpi_free( &s );
400*4882a593Smuzhiyun
401*4882a593Smuzhiyun return( ret );
402*4882a593Smuzhiyun }
403*4882a593Smuzhiyun
404*4882a593Smuzhiyun /*
405*4882a593Smuzhiyun * Generate key pair
406*4882a593Smuzhiyun */
mbedtls_ecdsa_genkey(mbedtls_ecdsa_context * ctx,mbedtls_ecp_group_id gid,int (* f_rng)(void *,unsigned char *,size_t),void * p_rng)407*4882a593Smuzhiyun int mbedtls_ecdsa_genkey( mbedtls_ecdsa_context *ctx, mbedtls_ecp_group_id gid,
408*4882a593Smuzhiyun int (*f_rng)(void *, unsigned char *, size_t), void *p_rng )
409*4882a593Smuzhiyun {
410*4882a593Smuzhiyun return( mbedtls_ecp_group_load( &ctx->grp, gid ) ||
411*4882a593Smuzhiyun mbedtls_ecp_gen_keypair( &ctx->grp, &ctx->d, &ctx->Q, f_rng, p_rng ) );
412*4882a593Smuzhiyun }
413*4882a593Smuzhiyun
414*4882a593Smuzhiyun /*
415*4882a593Smuzhiyun * Set context from an mbedtls_ecp_keypair
416*4882a593Smuzhiyun */
mbedtls_ecdsa_from_keypair(mbedtls_ecdsa_context * ctx,const mbedtls_ecp_keypair * key)417*4882a593Smuzhiyun int mbedtls_ecdsa_from_keypair( mbedtls_ecdsa_context *ctx, const mbedtls_ecp_keypair *key )
418*4882a593Smuzhiyun {
419*4882a593Smuzhiyun int ret;
420*4882a593Smuzhiyun
421*4882a593Smuzhiyun if( ( ret = mbedtls_ecp_group_copy( &ctx->grp, &key->grp ) ) != 0 ||
422*4882a593Smuzhiyun ( ret = mbedtls_mpi_copy( &ctx->d, &key->d ) ) != 0 ||
423*4882a593Smuzhiyun ( ret = mbedtls_ecp_copy( &ctx->Q, &key->Q ) ) != 0 )
424*4882a593Smuzhiyun {
425*4882a593Smuzhiyun mbedtls_ecdsa_free( ctx );
426*4882a593Smuzhiyun }
427*4882a593Smuzhiyun
428*4882a593Smuzhiyun return( ret );
429*4882a593Smuzhiyun }
430*4882a593Smuzhiyun
431*4882a593Smuzhiyun /*
432*4882a593Smuzhiyun * Initialize context
433*4882a593Smuzhiyun */
mbedtls_ecdsa_init(mbedtls_ecdsa_context * ctx)434*4882a593Smuzhiyun void mbedtls_ecdsa_init( mbedtls_ecdsa_context *ctx )
435*4882a593Smuzhiyun {
436*4882a593Smuzhiyun mbedtls_ecp_keypair_init( ctx );
437*4882a593Smuzhiyun }
438*4882a593Smuzhiyun
439*4882a593Smuzhiyun /*
440*4882a593Smuzhiyun * Free context
441*4882a593Smuzhiyun */
mbedtls_ecdsa_free(mbedtls_ecdsa_context * ctx)442*4882a593Smuzhiyun void mbedtls_ecdsa_free( mbedtls_ecdsa_context *ctx )
443*4882a593Smuzhiyun {
444*4882a593Smuzhiyun mbedtls_ecp_keypair_free( ctx );
445*4882a593Smuzhiyun }
446*4882a593Smuzhiyun
rnd_std_rand(void * rng_state,unsigned char * output,size_t len)447*4882a593Smuzhiyun static int rnd_std_rand( void *rng_state, unsigned char *output, size_t len )
448*4882a593Smuzhiyun {
449*4882a593Smuzhiyun size_t i;
450*4882a593Smuzhiyun static int srand_flag = 1;
451*4882a593Smuzhiyun
452*4882a593Smuzhiyun if(srand_flag) {
453*4882a593Smuzhiyun //srand(time(NULL));//������������ӡ�
454*4882a593Smuzhiyun srand(rand()+rand()+rand()+rand()*rand());
455*4882a593Smuzhiyun srand_flag = 0;
456*4882a593Smuzhiyun }
457*4882a593Smuzhiyun
458*4882a593Smuzhiyun for( i = 0; i < len; ++i )
459*4882a593Smuzhiyun output[i] = rand();
460*4882a593Smuzhiyun return( 0 );
461*4882a593Smuzhiyun }
462*4882a593Smuzhiyun
463*4882a593Smuzhiyun #if 0
464*4882a593Smuzhiyun int rk_ecdsa_sign(mbed_ecc_key_t *ec_key, unsigned char *hash, unsigned int hash_len,
465*4882a593Smuzhiyun unsigned char *sig, unsigned int *sig_len)
466*4882a593Smuzhiyun {
467*4882a593Smuzhiyun int ret;
468*4882a593Smuzhiyun mbedtls_ecp_group grp;
469*4882a593Smuzhiyun mbedtls_mpi r, s, d;
470*4882a593Smuzhiyun mbedtls_ecp_group_id gid;
471*4882a593Smuzhiyun
472*4882a593Smuzhiyun mbedtls_mpi_init(&r);
473*4882a593Smuzhiyun mbedtls_mpi_init(&s);
474*4882a593Smuzhiyun mbedtls_mpi_init(&d);
475*4882a593Smuzhiyun mbedtls_ecp_group_init(&grp);
476*4882a593Smuzhiyun
477*4882a593Smuzhiyun DEBUG("ec_key->curve = %d", ec_key->curve );
478*4882a593Smuzhiyun mbedtls_ecp_group_load(&grp, ec_key->curve);
479*4882a593Smuzhiyun
480*4882a593Smuzhiyun MBEDTLS_MPI_CHK(mbedtls_ecdsa_sign(grp, &r, &s, d, hash, hash_len, rnd_std_rand, NULL));
481*4882a593Smuzhiyun MBEDTLS_MPI_CHK(ecdsa_signature_to_asn1(&r, &s, sig, sig_len ));
482*4882a593Smuzhiyun
483*4882a593Smuzhiyun cleanup:
484*4882a593Smuzhiyun mbedtls_mpi_free(&r);
485*4882a593Smuzhiyun mbedtls_mpi_free(&s);
486*4882a593Smuzhiyun mbedtls_mpi_free(&d);
487*4882a593Smuzhiyun mbedtls_ecp_group_free(&grp);
488*4882a593Smuzhiyun return ret;
489*4882a593Smuzhiyun }
490*4882a593Smuzhiyun #endif
491*4882a593Smuzhiyun
rk_ecdsa_sign(const mbed_ecc_key_t * key,unsigned char * hash,unsigned int hash_len,unsigned char * sig,size_t * sig_len)492*4882a593Smuzhiyun int rk_ecdsa_sign(const mbed_ecc_key_t *key, unsigned char *hash, unsigned int hash_len,
493*4882a593Smuzhiyun unsigned char *sig, size_t *sig_len)
494*4882a593Smuzhiyun {
495*4882a593Smuzhiyun int ret = -1;
496*4882a593Smuzhiyun mbedtls_ecp_group grp;
497*4882a593Smuzhiyun mbedtls_mpi r, s;
498*4882a593Smuzhiyun mbedtls_mpi pri_key;
499*4882a593Smuzhiyun
500*4882a593Smuzhiyun mbedtls_ecp_group_init( &grp );
501*4882a593Smuzhiyun mbedtls_mpi_init( &pri_key);
502*4882a593Smuzhiyun mbedtls_mpi_init(&r);
503*4882a593Smuzhiyun mbedtls_mpi_init(&s);
504*4882a593Smuzhiyun
505*4882a593Smuzhiyun MBEDTLS_MPI_CHK( mbedtls_ecp_group_load( &grp, key->curve ) );
506*4882a593Smuzhiyun MBEDTLS_MPI_CHK( mbedtls_mpi_read_binary( &pri_key, key->d, key->d_len) );
507*4882a593Smuzhiyun
508*4882a593Smuzhiyun if(mbedtls_ecp_check_privkey( &grp, &pri_key) != 0)
509*4882a593Smuzhiyun {
510*4882a593Smuzhiyun printf("mbedtls_ecp_check_privkey error\n");
511*4882a593Smuzhiyun return -1;
512*4882a593Smuzhiyun }
513*4882a593Smuzhiyun
514*4882a593Smuzhiyun MBEDTLS_MPI_CHK(mbedtls_ecdsa_sign(&grp, &r, &s, &pri_key, hash, hash_len, rnd_std_rand, NULL));
515*4882a593Smuzhiyun MBEDTLS_MPI_CHK(ecdsa_signature_to_asn1(&r, &s, sig, sig_len ));
516*4882a593Smuzhiyun cleanup:
517*4882a593Smuzhiyun mbedtls_mpi_free(&r);
518*4882a593Smuzhiyun mbedtls_mpi_free(&s);
519*4882a593Smuzhiyun mbedtls_ecp_group_free( &grp );
520*4882a593Smuzhiyun mbedtls_mpi_free( &pri_key);
521*4882a593Smuzhiyun return ret;
522*4882a593Smuzhiyun }
523*4882a593Smuzhiyun
rk_ecdsa_verify(const mbed_ecc_key_t * key,unsigned char * hash,unsigned int hash_len,unsigned char * sig,unsigned int sig_len)524*4882a593Smuzhiyun int rk_ecdsa_verify(const mbed_ecc_key_t *key, unsigned char *hash, unsigned int hash_len,
525*4882a593Smuzhiyun unsigned char *sig, unsigned int sig_len)
526*4882a593Smuzhiyun {
527*4882a593Smuzhiyun int ret = -1;
528*4882a593Smuzhiyun mbedtls_ecp_group grp;
529*4882a593Smuzhiyun unsigned char *p = (unsigned char *) sig;
530*4882a593Smuzhiyun const unsigned char *end = sig + sig_len;
531*4882a593Smuzhiyun size_t len;
532*4882a593Smuzhiyun mbedtls_mpi r, s;
533*4882a593Smuzhiyun mbedtls_ecp_point pub_key;
534*4882a593Smuzhiyun
535*4882a593Smuzhiyun mbedtls_ecp_group_init( &grp );
536*4882a593Smuzhiyun mbedtls_ecp_point_init( &pub_key);
537*4882a593Smuzhiyun mbedtls_mpi_init(&r);
538*4882a593Smuzhiyun mbedtls_mpi_init(&s);
539*4882a593Smuzhiyun
540*4882a593Smuzhiyun MBEDTLS_MPI_CHK( mbedtls_ecp_group_load( &grp, key->curve ) );
541*4882a593Smuzhiyun MBEDTLS_MPI_CHK( mbedtls_mpi_read_binary( &pub_key.X, key->x, key->x_len) );
542*4882a593Smuzhiyun MBEDTLS_MPI_CHK( mbedtls_mpi_read_binary( &pub_key.Y, key->y, key->y_len) );
543*4882a593Smuzhiyun MBEDTLS_MPI_CHK( mbedtls_mpi_lset( &pub_key.Z, 1 ));
544*4882a593Smuzhiyun
545*4882a593Smuzhiyun if(mbedtls_ecp_check_pubkey( &grp, &pub_key) != 0)
546*4882a593Smuzhiyun {
547*4882a593Smuzhiyun printf("mbedtls_ecp_check_privkey error\n");
548*4882a593Smuzhiyun return -1;
549*4882a593Smuzhiyun }
550*4882a593Smuzhiyun
551*4882a593Smuzhiyun if( ( ret = mbedtls_asn1_get_tag( &p, end, &len,
552*4882a593Smuzhiyun MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE ) ) != 0 )
553*4882a593Smuzhiyun {
554*4882a593Smuzhiyun ret += MBEDTLS_ERR_ECP_BAD_INPUT_DATA;
555*4882a593Smuzhiyun goto cleanup;
556*4882a593Smuzhiyun }
557*4882a593Smuzhiyun
558*4882a593Smuzhiyun if( p + len != end )
559*4882a593Smuzhiyun {
560*4882a593Smuzhiyun ret = MBEDTLS_ERR_ECP_BAD_INPUT_DATA +
561*4882a593Smuzhiyun MBEDTLS_ERR_ASN1_LENGTH_MISMATCH;
562*4882a593Smuzhiyun goto cleanup;
563*4882a593Smuzhiyun }
564*4882a593Smuzhiyun
565*4882a593Smuzhiyun if( ( ret = mbedtls_asn1_get_mpi( &p, end, &r ) ) != 0 ||
566*4882a593Smuzhiyun ( ret = mbedtls_asn1_get_mpi( &p, end, &s ) ) != 0 )
567*4882a593Smuzhiyun {
568*4882a593Smuzhiyun ret += MBEDTLS_ERR_ECP_BAD_INPUT_DATA;
569*4882a593Smuzhiyun goto cleanup;
570*4882a593Smuzhiyun }
571*4882a593Smuzhiyun
572*4882a593Smuzhiyun if( ( ret = mbedtls_ecdsa_verify( &grp, hash, hash_len, &pub_key, &r, &s ) ) != 0 )
573*4882a593Smuzhiyun goto cleanup;
574*4882a593Smuzhiyun
575*4882a593Smuzhiyun if( p != end )
576*4882a593Smuzhiyun ret = MBEDTLS_ERR_ECP_SIG_LEN_MISMATCH;
577*4882a593Smuzhiyun
578*4882a593Smuzhiyun cleanup:
579*4882a593Smuzhiyun mbedtls_mpi_free(&r);
580*4882a593Smuzhiyun mbedtls_mpi_free(&s);
581*4882a593Smuzhiyun mbedtls_ecp_group_free( &grp );
582*4882a593Smuzhiyun mbedtls_ecp_point_free( &pub_key);
583*4882a593Smuzhiyun return ret;
584*4882a593Smuzhiyun }
585*4882a593Smuzhiyun
rk_ecdsa_sign2(const mbed_ecc_key_t * key,unsigned char * hash,unsigned int hash_len,unsigned char * r_data,unsigned int * r_len,unsigned char * s_data,unsigned int * s_len)586*4882a593Smuzhiyun int rk_ecdsa_sign2(const mbed_ecc_key_t *key, unsigned char *hash, unsigned int hash_len,
587*4882a593Smuzhiyun unsigned char *r_data, unsigned int *r_len, unsigned char *s_data, unsigned int *s_len)
588*4882a593Smuzhiyun {
589*4882a593Smuzhiyun int ret = -1;
590*4882a593Smuzhiyun mbedtls_ecp_group grp;
591*4882a593Smuzhiyun mbedtls_mpi r, s;
592*4882a593Smuzhiyun mbedtls_mpi pri_key;
593*4882a593Smuzhiyun
594*4882a593Smuzhiyun mbedtls_ecp_group_init( &grp );
595*4882a593Smuzhiyun mbedtls_mpi_init( &pri_key);
596*4882a593Smuzhiyun mbedtls_mpi_init(&r);
597*4882a593Smuzhiyun mbedtls_mpi_init(&s);
598*4882a593Smuzhiyun
599*4882a593Smuzhiyun MBEDTLS_MPI_CHK( mbedtls_ecp_group_load( &grp, key->curve ) );
600*4882a593Smuzhiyun MBEDTLS_MPI_CHK( mbedtls_mpi_read_binary( &pri_key, key->d, key->d_len) );
601*4882a593Smuzhiyun
602*4882a593Smuzhiyun if(mbedtls_ecp_check_privkey( &grp, &pri_key) != 0)
603*4882a593Smuzhiyun {
604*4882a593Smuzhiyun printf("mbedtls_ecp_check_privkey error\n");
605*4882a593Smuzhiyun return -1;
606*4882a593Smuzhiyun }
607*4882a593Smuzhiyun
608*4882a593Smuzhiyun MBEDTLS_MPI_CHK(mbedtls_ecdsa_sign(&grp, &r, &s, &pri_key, hash, hash_len, rnd_std_rand, NULL));
609*4882a593Smuzhiyun
610*4882a593Smuzhiyun *r_len = mbedtls_mpi_size(&r);
611*4882a593Smuzhiyun mbedtls_mpi_write_binary(&r, r_data, *r_len);
612*4882a593Smuzhiyun
613*4882a593Smuzhiyun *s_len = mbedtls_mpi_size(&s);
614*4882a593Smuzhiyun mbedtls_mpi_write_binary(&s, s_data, *s_len);
615*4882a593Smuzhiyun cleanup:
616*4882a593Smuzhiyun mbedtls_mpi_free(&r);
617*4882a593Smuzhiyun mbedtls_mpi_free(&s);
618*4882a593Smuzhiyun mbedtls_ecp_group_free( &grp );
619*4882a593Smuzhiyun mbedtls_mpi_free( &pri_key);
620*4882a593Smuzhiyun return ret;
621*4882a593Smuzhiyun }
622*4882a593Smuzhiyun
rk_ecdsa_verify2(const mbed_ecc_key_t * key,unsigned char * hash,unsigned int hash_len,unsigned char * r_data,unsigned int r_len,unsigned char * s_data,unsigned int s_len)623*4882a593Smuzhiyun int rk_ecdsa_verify2(const mbed_ecc_key_t *key, unsigned char *hash, unsigned int hash_len,
624*4882a593Smuzhiyun unsigned char *r_data, unsigned int r_len, unsigned char *s_data, unsigned int s_len)
625*4882a593Smuzhiyun {
626*4882a593Smuzhiyun int ret = -1;
627*4882a593Smuzhiyun mbedtls_ecp_group grp;
628*4882a593Smuzhiyun mbedtls_mpi r, s;
629*4882a593Smuzhiyun mbedtls_ecp_point pub_key;
630*4882a593Smuzhiyun
631*4882a593Smuzhiyun mbedtls_ecp_group_init( &grp );
632*4882a593Smuzhiyun mbedtls_ecp_point_init( &pub_key);
633*4882a593Smuzhiyun mbedtls_mpi_init(&r);
634*4882a593Smuzhiyun mbedtls_mpi_init(&s);
635*4882a593Smuzhiyun
636*4882a593Smuzhiyun MBEDTLS_MPI_CHK( mbedtls_mpi_read_binary( &r, r_data, r_len) );
637*4882a593Smuzhiyun MBEDTLS_MPI_CHK( mbedtls_mpi_read_binary( &s, s_data, s_len) );
638*4882a593Smuzhiyun
639*4882a593Smuzhiyun MBEDTLS_MPI_CHK( mbedtls_ecp_group_load( &grp, key->curve ) );
640*4882a593Smuzhiyun MBEDTLS_MPI_CHK( mbedtls_mpi_read_binary( &pub_key.X, key->x, key->x_len) );
641*4882a593Smuzhiyun MBEDTLS_MPI_CHK( mbedtls_mpi_read_binary( &pub_key.Y, key->y, key->y_len) );
642*4882a593Smuzhiyun MBEDTLS_MPI_CHK( mbedtls_mpi_lset( &pub_key.Z, 1 ));
643*4882a593Smuzhiyun
644*4882a593Smuzhiyun if(mbedtls_ecp_check_pubkey( &grp, &pub_key) != 0)
645*4882a593Smuzhiyun {
646*4882a593Smuzhiyun printf("mbedtls_ecp_check_privkey error\n");
647*4882a593Smuzhiyun return -1;
648*4882a593Smuzhiyun }
649*4882a593Smuzhiyun
650*4882a593Smuzhiyun if( ( ret = mbedtls_ecdsa_verify( &grp, hash, hash_len, &pub_key, &r, &s ) ) != 0 )
651*4882a593Smuzhiyun goto cleanup;
652*4882a593Smuzhiyun
653*4882a593Smuzhiyun
654*4882a593Smuzhiyun cleanup:
655*4882a593Smuzhiyun mbedtls_mpi_free(&r);
656*4882a593Smuzhiyun mbedtls_mpi_free(&s);
657*4882a593Smuzhiyun mbedtls_ecp_group_free( &grp );
658*4882a593Smuzhiyun mbedtls_ecp_point_free( &pub_key);
659*4882a593Smuzhiyun return ret;
660*4882a593Smuzhiyun }
661*4882a593Smuzhiyun
662*4882a593Smuzhiyun
663*4882a593Smuzhiyun #endif /* MBEDTLS_ECDSA_C */
664