xref: /OK3568_Linux_fs/external/security/librkcrypto/test/c_mode/ecdsa.c (revision 4882a59341e53eb6f0b4789bf948001014eff981)
1*4882a593Smuzhiyun /*
2*4882a593Smuzhiyun  *  Elliptic curve DSA
3*4882a593Smuzhiyun  *
4*4882a593Smuzhiyun  *  Copyright (C) 2006-2015, ARM Limited, All Rights Reserved
5*4882a593Smuzhiyun  *  SPDX-License-Identifier: Apache-2.0
6*4882a593Smuzhiyun  *
7*4882a593Smuzhiyun  *  Licensed under the Apache License, Version 2.0 (the "License"); you may
8*4882a593Smuzhiyun  *  not use this file except in compliance with the License.
9*4882a593Smuzhiyun  *  You may obtain a copy of the License at
10*4882a593Smuzhiyun  *
11*4882a593Smuzhiyun  *  http://www.apache.org/licenses/LICENSE-2.0
12*4882a593Smuzhiyun  *
13*4882a593Smuzhiyun  *  Unless required by applicable law or agreed to in writing, software
14*4882a593Smuzhiyun  *  distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
15*4882a593Smuzhiyun  *  WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
16*4882a593Smuzhiyun  *  See the License for the specific language governing permissions and
17*4882a593Smuzhiyun  *  limitations under the License.
18*4882a593Smuzhiyun  *
19*4882a593Smuzhiyun  *  This file is part of mbed TLS (https://tls.mbed.org)
20*4882a593Smuzhiyun  */
21*4882a593Smuzhiyun 
22*4882a593Smuzhiyun /*
23*4882a593Smuzhiyun  * References:
24*4882a593Smuzhiyun  *
25*4882a593Smuzhiyun  * SEC1 http://www.secg.org/index.php?action=secg,docs_secg
26*4882a593Smuzhiyun  */
27*4882a593Smuzhiyun 
28*4882a593Smuzhiyun #define MBEDTLS_ECDSA_C
29*4882a593Smuzhiyun #if defined(MBEDTLS_ECDSA_C)
30*4882a593Smuzhiyun #include <stdlib.h>
31*4882a593Smuzhiyun #include <stdio.h>
32*4882a593Smuzhiyun #include <time.h>
33*4882a593Smuzhiyun #include "ecdsa.h"
34*4882a593Smuzhiyun #include "asn1write.h"
35*4882a593Smuzhiyun 
36*4882a593Smuzhiyun #include <string.h>
37*4882a593Smuzhiyun 
38*4882a593Smuzhiyun #if defined(MBEDTLS_ECDSA_DETERMINISTIC)
39*4882a593Smuzhiyun #include "mbedtls/hmac_drbg.h"
40*4882a593Smuzhiyun #endif
41*4882a593Smuzhiyun 
42*4882a593Smuzhiyun #define DEBUG(format,...) printf("[%s]:%d: "format"\n", __func__,__LINE__, ##__VA_ARGS__)
43*4882a593Smuzhiyun 
44*4882a593Smuzhiyun /*
45*4882a593Smuzhiyun  * Derive a suitable integer for group grp from a buffer of length len
46*4882a593Smuzhiyun  * SEC1 4.1.3 step 5 aka SEC1 4.1.4 step 3
47*4882a593Smuzhiyun  */
derive_mpi(const mbedtls_ecp_group * grp,mbedtls_mpi * x,const unsigned char * buf,size_t blen)48*4882a593Smuzhiyun static int derive_mpi( const mbedtls_ecp_group *grp, mbedtls_mpi *x,
49*4882a593Smuzhiyun                        const unsigned char *buf, size_t blen )
50*4882a593Smuzhiyun {
51*4882a593Smuzhiyun     int ret;
52*4882a593Smuzhiyun     size_t n_size = ( grp->nbits + 7 ) / 8;
53*4882a593Smuzhiyun     size_t use_size = blen > n_size ? n_size : blen;
54*4882a593Smuzhiyun 
55*4882a593Smuzhiyun     MBEDTLS_MPI_CHK( mbedtls_mpi_read_binary( x, buf, use_size ) );
56*4882a593Smuzhiyun     if( use_size * 8 > grp->nbits )
57*4882a593Smuzhiyun         MBEDTLS_MPI_CHK( mbedtls_mpi_shift_r( x, use_size * 8 - grp->nbits ) );
58*4882a593Smuzhiyun 
59*4882a593Smuzhiyun     /* While at it, reduce modulo N */
60*4882a593Smuzhiyun     if( mbedtls_mpi_cmp_mpi( x, &grp->N ) >= 0 )
61*4882a593Smuzhiyun         MBEDTLS_MPI_CHK( mbedtls_mpi_sub_mpi( x, x, &grp->N ) );
62*4882a593Smuzhiyun 
63*4882a593Smuzhiyun cleanup:
64*4882a593Smuzhiyun     return( ret );
65*4882a593Smuzhiyun }
66*4882a593Smuzhiyun 
67*4882a593Smuzhiyun /*
68*4882a593Smuzhiyun  * Compute ECDSA signature of a hashed message (SEC1 4.1.3)
69*4882a593Smuzhiyun  * Obviously, compared to SEC1 4.1.3, we skip step 4 (hash message)
70*4882a593Smuzhiyun  */
mbedtls_ecdsa_sign(mbedtls_ecp_group * grp,mbedtls_mpi * r,mbedtls_mpi * s,const mbedtls_mpi * d,const unsigned char * buf,size_t blen,int (* f_rng)(void *,unsigned char *,size_t),void * p_rng)71*4882a593Smuzhiyun int mbedtls_ecdsa_sign( mbedtls_ecp_group *grp, mbedtls_mpi *r, mbedtls_mpi *s,
72*4882a593Smuzhiyun                 const mbedtls_mpi *d, const unsigned char *buf, size_t blen,
73*4882a593Smuzhiyun                 int (*f_rng)(void *, unsigned char *, size_t), void *p_rng )
74*4882a593Smuzhiyun {
75*4882a593Smuzhiyun     int ret, key_tries, sign_tries, blind_tries;
76*4882a593Smuzhiyun     mbedtls_ecp_point R;
77*4882a593Smuzhiyun     mbedtls_mpi k, e, t;
78*4882a593Smuzhiyun 
79*4882a593Smuzhiyun     /* Fail cleanly on curves such as Curve25519 that can't be used for ECDSA */
80*4882a593Smuzhiyun     if( grp->N.p == NULL )
81*4882a593Smuzhiyun         return( MBEDTLS_ERR_ECP_BAD_INPUT_DATA );
82*4882a593Smuzhiyun 
83*4882a593Smuzhiyun     mbedtls_ecp_point_init( &R );
84*4882a593Smuzhiyun     mbedtls_mpi_init( &k ); mbedtls_mpi_init( &e ); mbedtls_mpi_init( &t );
85*4882a593Smuzhiyun 
86*4882a593Smuzhiyun     sign_tries = 0;
87*4882a593Smuzhiyun     do
88*4882a593Smuzhiyun     {
89*4882a593Smuzhiyun         /*
90*4882a593Smuzhiyun          * Steps 1-3: generate a suitable ephemeral keypair
91*4882a593Smuzhiyun          * and set r = xR mod n
92*4882a593Smuzhiyun          */
93*4882a593Smuzhiyun         key_tries = 0;
94*4882a593Smuzhiyun         do
95*4882a593Smuzhiyun         {
96*4882a593Smuzhiyun             MBEDTLS_MPI_CHK( mbedtls_ecp_gen_keypair( grp, &k, &R, f_rng, p_rng ) );
97*4882a593Smuzhiyun             MBEDTLS_MPI_CHK( mbedtls_mpi_mod_mpi( r, &R.X, &grp->N ) );
98*4882a593Smuzhiyun 
99*4882a593Smuzhiyun             if( key_tries++ > 10 )
100*4882a593Smuzhiyun             {
101*4882a593Smuzhiyun                 ret = MBEDTLS_ERR_ECP_RANDOM_FAILED;
102*4882a593Smuzhiyun                 goto cleanup;
103*4882a593Smuzhiyun             }
104*4882a593Smuzhiyun         }
105*4882a593Smuzhiyun         while( mbedtls_mpi_cmp_int( r, 0 ) == 0 );
106*4882a593Smuzhiyun 
107*4882a593Smuzhiyun         /*
108*4882a593Smuzhiyun          * Step 5: derive MPI from hashed message
109*4882a593Smuzhiyun          */
110*4882a593Smuzhiyun         MBEDTLS_MPI_CHK( derive_mpi( grp, &e, buf, blen ) );
111*4882a593Smuzhiyun 
112*4882a593Smuzhiyun         /*
113*4882a593Smuzhiyun          * Generate a random value to blind inv_mod in next step,
114*4882a593Smuzhiyun          * avoiding a potential timing leak.
115*4882a593Smuzhiyun          */
116*4882a593Smuzhiyun         blind_tries = 0;
117*4882a593Smuzhiyun         do
118*4882a593Smuzhiyun         {
119*4882a593Smuzhiyun             size_t n_size = ( grp->nbits + 7 ) / 8;
120*4882a593Smuzhiyun             MBEDTLS_MPI_CHK( mbedtls_mpi_fill_random( &t, n_size, f_rng, p_rng ) );
121*4882a593Smuzhiyun             MBEDTLS_MPI_CHK( mbedtls_mpi_shift_r( &t, 8 * n_size - grp->nbits ) );
122*4882a593Smuzhiyun 
123*4882a593Smuzhiyun             /* See mbedtls_ecp_gen_keypair() */
124*4882a593Smuzhiyun             if( ++blind_tries > 30 )
125*4882a593Smuzhiyun                 return( MBEDTLS_ERR_ECP_RANDOM_FAILED );
126*4882a593Smuzhiyun         }
127*4882a593Smuzhiyun         while( mbedtls_mpi_cmp_int( &t, 1 ) < 0 ||
128*4882a593Smuzhiyun                mbedtls_mpi_cmp_mpi( &t, &grp->N ) >= 0 );
129*4882a593Smuzhiyun 
130*4882a593Smuzhiyun         /*
131*4882a593Smuzhiyun          * Step 6: compute s = (e + r * d) / k = t (e + rd) / (kt) mod n
132*4882a593Smuzhiyun          */
133*4882a593Smuzhiyun         MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mpi( s, r, d ) );
134*4882a593Smuzhiyun         MBEDTLS_MPI_CHK( mbedtls_mpi_add_mpi( &e, &e, s ) );
135*4882a593Smuzhiyun         MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mpi( &e, &e, &t ) );
136*4882a593Smuzhiyun         MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mpi( &k, &k, &t ) );
137*4882a593Smuzhiyun         MBEDTLS_MPI_CHK( mbedtls_mpi_inv_mod( s, &k, &grp->N ) );
138*4882a593Smuzhiyun         MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mpi( s, s, &e ) );
139*4882a593Smuzhiyun         MBEDTLS_MPI_CHK( mbedtls_mpi_mod_mpi( s, s, &grp->N ) );
140*4882a593Smuzhiyun 
141*4882a593Smuzhiyun         if( sign_tries++ > 10 )
142*4882a593Smuzhiyun         {
143*4882a593Smuzhiyun             ret = MBEDTLS_ERR_ECP_RANDOM_FAILED;
144*4882a593Smuzhiyun             goto cleanup;
145*4882a593Smuzhiyun         }
146*4882a593Smuzhiyun     }
147*4882a593Smuzhiyun     while( mbedtls_mpi_cmp_int( s, 0 ) == 0 );
148*4882a593Smuzhiyun 
149*4882a593Smuzhiyun cleanup:
150*4882a593Smuzhiyun     mbedtls_ecp_point_free( &R );
151*4882a593Smuzhiyun     mbedtls_mpi_free( &k ); mbedtls_mpi_free( &e ); mbedtls_mpi_free( &t );
152*4882a593Smuzhiyun 
153*4882a593Smuzhiyun     return( ret );
154*4882a593Smuzhiyun }
155*4882a593Smuzhiyun 
156*4882a593Smuzhiyun #if defined(MBEDTLS_ECDSA_DETERMINISTIC)
157*4882a593Smuzhiyun /*
158*4882a593Smuzhiyun  * Deterministic signature wrapper
159*4882a593Smuzhiyun  */
mbedtls_ecdsa_sign_det(mbedtls_ecp_group * grp,mbedtls_mpi * r,mbedtls_mpi * s,const mbedtls_mpi * d,const unsigned char * buf,size_t blen,mbedtls_md_type_t md_alg)160*4882a593Smuzhiyun int mbedtls_ecdsa_sign_det( mbedtls_ecp_group *grp, mbedtls_mpi *r, mbedtls_mpi *s,
161*4882a593Smuzhiyun                     const mbedtls_mpi *d, const unsigned char *buf, size_t blen,
162*4882a593Smuzhiyun                     mbedtls_md_type_t md_alg )
163*4882a593Smuzhiyun {
164*4882a593Smuzhiyun     int ret;
165*4882a593Smuzhiyun     mbedtls_hmac_drbg_context rng_ctx;
166*4882a593Smuzhiyun     unsigned char data[2 * MBEDTLS_ECP_MAX_BYTES];
167*4882a593Smuzhiyun     size_t grp_len = ( grp->nbits + 7 ) / 8;
168*4882a593Smuzhiyun     const mbedtls_md_info_t *md_info;
169*4882a593Smuzhiyun     mbedtls_mpi h;
170*4882a593Smuzhiyun 
171*4882a593Smuzhiyun     if( ( md_info = mbedtls_md_info_from_type( md_alg ) ) == NULL )
172*4882a593Smuzhiyun         return( MBEDTLS_ERR_ECP_BAD_INPUT_DATA );
173*4882a593Smuzhiyun 
174*4882a593Smuzhiyun     mbedtls_mpi_init( &h );
175*4882a593Smuzhiyun     mbedtls_hmac_drbg_init( &rng_ctx );
176*4882a593Smuzhiyun 
177*4882a593Smuzhiyun     /* Use private key and message hash (reduced) to initialize HMAC_DRBG */
178*4882a593Smuzhiyun     MBEDTLS_MPI_CHK( mbedtls_mpi_write_binary( d, data, grp_len ) );
179*4882a593Smuzhiyun     MBEDTLS_MPI_CHK( derive_mpi( grp, &h, buf, blen ) );
180*4882a593Smuzhiyun     MBEDTLS_MPI_CHK( mbedtls_mpi_write_binary( &h, data + grp_len, grp_len ) );
181*4882a593Smuzhiyun     mbedtls_hmac_drbg_seed_buf( &rng_ctx, md_info, data, 2 * grp_len );
182*4882a593Smuzhiyun 
183*4882a593Smuzhiyun     ret = mbedtls_ecdsa_sign( grp, r, s, d, buf, blen,
184*4882a593Smuzhiyun                       mbedtls_hmac_drbg_random, &rng_ctx );
185*4882a593Smuzhiyun 
186*4882a593Smuzhiyun cleanup:
187*4882a593Smuzhiyun     mbedtls_hmac_drbg_free( &rng_ctx );
188*4882a593Smuzhiyun     mbedtls_mpi_free( &h );
189*4882a593Smuzhiyun 
190*4882a593Smuzhiyun     return( ret );
191*4882a593Smuzhiyun }
192*4882a593Smuzhiyun #endif /* MBEDTLS_ECDSA_DETERMINISTIC */
193*4882a593Smuzhiyun 
194*4882a593Smuzhiyun /*
195*4882a593Smuzhiyun  * Verify ECDSA signature of hashed message (SEC1 4.1.4)
196*4882a593Smuzhiyun  * Obviously, compared to SEC1 4.1.3, we skip step 2 (hash message)
197*4882a593Smuzhiyun  */
mbedtls_ecdsa_verify(mbedtls_ecp_group * grp,const unsigned char * buf,size_t blen,const mbedtls_ecp_point * Q,const mbedtls_mpi * r,const mbedtls_mpi * s)198*4882a593Smuzhiyun int mbedtls_ecdsa_verify( mbedtls_ecp_group *grp,
199*4882a593Smuzhiyun                   const unsigned char *buf, size_t blen,
200*4882a593Smuzhiyun                   const mbedtls_ecp_point *Q, const mbedtls_mpi *r, const mbedtls_mpi *s)
201*4882a593Smuzhiyun {
202*4882a593Smuzhiyun     int ret;
203*4882a593Smuzhiyun     mbedtls_mpi e, s_inv, u1, u2;
204*4882a593Smuzhiyun     mbedtls_ecp_point R;
205*4882a593Smuzhiyun 
206*4882a593Smuzhiyun     mbedtls_ecp_point_init( &R );
207*4882a593Smuzhiyun     mbedtls_mpi_init( &e ); mbedtls_mpi_init( &s_inv ); mbedtls_mpi_init( &u1 ); mbedtls_mpi_init( &u2 );
208*4882a593Smuzhiyun 
209*4882a593Smuzhiyun     /* Fail cleanly on curves such as Curve25519 that can't be used for ECDSA */
210*4882a593Smuzhiyun     if( grp->N.p == NULL )
211*4882a593Smuzhiyun         return( MBEDTLS_ERR_ECP_BAD_INPUT_DATA );
212*4882a593Smuzhiyun 
213*4882a593Smuzhiyun     /*
214*4882a593Smuzhiyun      * Step 1: make sure r and s are in range 1..n-1
215*4882a593Smuzhiyun      */
216*4882a593Smuzhiyun     if( mbedtls_mpi_cmp_int( r, 1 ) < 0 || mbedtls_mpi_cmp_mpi( r, &grp->N ) >= 0 ||
217*4882a593Smuzhiyun         mbedtls_mpi_cmp_int( s, 1 ) < 0 || mbedtls_mpi_cmp_mpi( s, &grp->N ) >= 0 )
218*4882a593Smuzhiyun     {
219*4882a593Smuzhiyun         ret = MBEDTLS_ERR_ECP_VERIFY_FAILED;
220*4882a593Smuzhiyun         goto cleanup;
221*4882a593Smuzhiyun     }
222*4882a593Smuzhiyun 
223*4882a593Smuzhiyun     /*
224*4882a593Smuzhiyun      * Additional precaution: make sure Q is valid
225*4882a593Smuzhiyun      */
226*4882a593Smuzhiyun     MBEDTLS_MPI_CHK( mbedtls_ecp_check_pubkey( grp, Q ) );
227*4882a593Smuzhiyun 
228*4882a593Smuzhiyun     /*
229*4882a593Smuzhiyun      * Step 3: derive MPI from hashed message
230*4882a593Smuzhiyun      */
231*4882a593Smuzhiyun     MBEDTLS_MPI_CHK( derive_mpi( grp, &e, buf, blen ) );
232*4882a593Smuzhiyun 
233*4882a593Smuzhiyun     /*
234*4882a593Smuzhiyun      * Step 4: u1 = e / s mod n, u2 = r / s mod n
235*4882a593Smuzhiyun      */
236*4882a593Smuzhiyun     MBEDTLS_MPI_CHK( mbedtls_mpi_inv_mod( &s_inv, s, &grp->N ) );
237*4882a593Smuzhiyun 
238*4882a593Smuzhiyun     MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mpi( &u1, &e, &s_inv ) );
239*4882a593Smuzhiyun     MBEDTLS_MPI_CHK( mbedtls_mpi_mod_mpi( &u1, &u1, &grp->N ) );
240*4882a593Smuzhiyun 
241*4882a593Smuzhiyun     MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mpi( &u2, r, &s_inv ) );
242*4882a593Smuzhiyun     MBEDTLS_MPI_CHK( mbedtls_mpi_mod_mpi( &u2, &u2, &grp->N ) );
243*4882a593Smuzhiyun 
244*4882a593Smuzhiyun     /*
245*4882a593Smuzhiyun      * Step 5: R = u1 G + u2 Q
246*4882a593Smuzhiyun      *
247*4882a593Smuzhiyun      * Since we're not using any secret data, no need to pass a RNG to
248*4882a593Smuzhiyun      * mbedtls_ecp_mul() for countermesures.
249*4882a593Smuzhiyun      */
250*4882a593Smuzhiyun     MBEDTLS_MPI_CHK( mbedtls_ecp_muladd( grp, &R, &u1, &grp->G, &u2, Q ) );
251*4882a593Smuzhiyun 
252*4882a593Smuzhiyun     if( mbedtls_ecp_is_zero( &R ) )
253*4882a593Smuzhiyun     {
254*4882a593Smuzhiyun         ret = MBEDTLS_ERR_ECP_VERIFY_FAILED;
255*4882a593Smuzhiyun         goto cleanup;
256*4882a593Smuzhiyun     }
257*4882a593Smuzhiyun 
258*4882a593Smuzhiyun     /*
259*4882a593Smuzhiyun      * Step 6: convert xR to an integer (no-op)
260*4882a593Smuzhiyun      * Step 7: reduce xR mod n (gives v)
261*4882a593Smuzhiyun      */
262*4882a593Smuzhiyun     MBEDTLS_MPI_CHK( mbedtls_mpi_mod_mpi( &R.X, &R.X, &grp->N ) );
263*4882a593Smuzhiyun 
264*4882a593Smuzhiyun     /*
265*4882a593Smuzhiyun      * Step 8: check if v (that is, R.X) is equal to r
266*4882a593Smuzhiyun      */
267*4882a593Smuzhiyun     if( mbedtls_mpi_cmp_mpi( &R.X, r ) != 0 )
268*4882a593Smuzhiyun     {
269*4882a593Smuzhiyun         ret = MBEDTLS_ERR_ECP_VERIFY_FAILED;
270*4882a593Smuzhiyun         goto cleanup;
271*4882a593Smuzhiyun     }
272*4882a593Smuzhiyun 
273*4882a593Smuzhiyun cleanup:
274*4882a593Smuzhiyun     mbedtls_ecp_point_free( &R );
275*4882a593Smuzhiyun     mbedtls_mpi_free( &e ); mbedtls_mpi_free( &s_inv ); mbedtls_mpi_free( &u1 ); mbedtls_mpi_free( &u2 );
276*4882a593Smuzhiyun 
277*4882a593Smuzhiyun     return( ret );
278*4882a593Smuzhiyun }
279*4882a593Smuzhiyun 
280*4882a593Smuzhiyun /*
281*4882a593Smuzhiyun  * Convert a signature (given by context) to ASN.1
282*4882a593Smuzhiyun  */
ecdsa_signature_to_asn1(const mbedtls_mpi * r,const mbedtls_mpi * s,unsigned char * sig,size_t * slen)283*4882a593Smuzhiyun static int ecdsa_signature_to_asn1( const mbedtls_mpi *r, const mbedtls_mpi *s,
284*4882a593Smuzhiyun                                     unsigned char *sig, size_t *slen )
285*4882a593Smuzhiyun {
286*4882a593Smuzhiyun     int ret;
287*4882a593Smuzhiyun     unsigned char buf[MBEDTLS_ECDSA_MAX_LEN];
288*4882a593Smuzhiyun     unsigned char *p = buf + sizeof( buf );
289*4882a593Smuzhiyun     size_t len = 0;
290*4882a593Smuzhiyun 
291*4882a593Smuzhiyun     MBEDTLS_ASN1_CHK_ADD( len, mbedtls_asn1_write_mpi( &p, buf, s ) );
292*4882a593Smuzhiyun     MBEDTLS_ASN1_CHK_ADD( len, mbedtls_asn1_write_mpi( &p, buf, r ) );
293*4882a593Smuzhiyun 
294*4882a593Smuzhiyun     MBEDTLS_ASN1_CHK_ADD( len, mbedtls_asn1_write_len( &p, buf, len ) );
295*4882a593Smuzhiyun     MBEDTLS_ASN1_CHK_ADD( len, mbedtls_asn1_write_tag( &p, buf,
296*4882a593Smuzhiyun                                        MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE ) );
297*4882a593Smuzhiyun 
298*4882a593Smuzhiyun     memcpy( sig, p, len );
299*4882a593Smuzhiyun     *slen = len;
300*4882a593Smuzhiyun 
301*4882a593Smuzhiyun     return( 0 );
302*4882a593Smuzhiyun }
303*4882a593Smuzhiyun 
304*4882a593Smuzhiyun /*
305*4882a593Smuzhiyun  * Compute and write signature
306*4882a593Smuzhiyun  */
mbedtls_ecdsa_write_signature(mbedtls_ecdsa_context * ctx,mbedtls_md_type_t md_alg,const unsigned char * hash,size_t hlen,unsigned char * sig,size_t * slen,int (* f_rng)(void *,unsigned char *,size_t),void * p_rng)307*4882a593Smuzhiyun int mbedtls_ecdsa_write_signature( mbedtls_ecdsa_context *ctx, mbedtls_md_type_t md_alg,
308*4882a593Smuzhiyun                            const unsigned char *hash, size_t hlen,
309*4882a593Smuzhiyun                            unsigned char *sig, size_t *slen,
310*4882a593Smuzhiyun                            int (*f_rng)(void *, unsigned char *, size_t),
311*4882a593Smuzhiyun                            void *p_rng )
312*4882a593Smuzhiyun {
313*4882a593Smuzhiyun     int ret;
314*4882a593Smuzhiyun     mbedtls_mpi r, s;
315*4882a593Smuzhiyun 
316*4882a593Smuzhiyun     mbedtls_mpi_init( &r );
317*4882a593Smuzhiyun     mbedtls_mpi_init( &s );
318*4882a593Smuzhiyun 
319*4882a593Smuzhiyun #if defined(MBEDTLS_ECDSA_DETERMINISTIC)
320*4882a593Smuzhiyun     (void) f_rng;
321*4882a593Smuzhiyun     (void) p_rng;
322*4882a593Smuzhiyun 
323*4882a593Smuzhiyun     MBEDTLS_MPI_CHK( mbedtls_ecdsa_sign_det( &ctx->grp, &r, &s, &ctx->d,
324*4882a593Smuzhiyun                              hash, hlen, md_alg ) );
325*4882a593Smuzhiyun #else
326*4882a593Smuzhiyun     (void) md_alg;
327*4882a593Smuzhiyun 
328*4882a593Smuzhiyun     MBEDTLS_MPI_CHK( mbedtls_ecdsa_sign( &ctx->grp, &r, &s, &ctx->d,
329*4882a593Smuzhiyun                          hash, hlen, f_rng, p_rng ) );
330*4882a593Smuzhiyun #endif
331*4882a593Smuzhiyun 
332*4882a593Smuzhiyun     MBEDTLS_MPI_CHK( ecdsa_signature_to_asn1( &r, &s, sig, slen ) );
333*4882a593Smuzhiyun 
334*4882a593Smuzhiyun cleanup:
335*4882a593Smuzhiyun     mbedtls_mpi_free( &r );
336*4882a593Smuzhiyun     mbedtls_mpi_free( &s );
337*4882a593Smuzhiyun 
338*4882a593Smuzhiyun     return( ret );
339*4882a593Smuzhiyun }
340*4882a593Smuzhiyun 
341*4882a593Smuzhiyun #if ! defined(MBEDTLS_DEPRECATED_REMOVED) && \
342*4882a593Smuzhiyun     defined(MBEDTLS_ECDSA_DETERMINISTIC)
mbedtls_ecdsa_write_signature_det(mbedtls_ecdsa_context * ctx,const unsigned char * hash,size_t hlen,unsigned char * sig,size_t * slen,mbedtls_md_type_t md_alg)343*4882a593Smuzhiyun int mbedtls_ecdsa_write_signature_det( mbedtls_ecdsa_context *ctx,
344*4882a593Smuzhiyun                                const unsigned char *hash, size_t hlen,
345*4882a593Smuzhiyun                                unsigned char *sig, size_t *slen,
346*4882a593Smuzhiyun                                mbedtls_md_type_t md_alg )
347*4882a593Smuzhiyun {
348*4882a593Smuzhiyun     return( mbedtls_ecdsa_write_signature( ctx, md_alg, hash, hlen, sig, slen,
349*4882a593Smuzhiyun                                    NULL, NULL ) );
350*4882a593Smuzhiyun }
351*4882a593Smuzhiyun #endif
352*4882a593Smuzhiyun 
353*4882a593Smuzhiyun /*
354*4882a593Smuzhiyun  * Read and check signature
355*4882a593Smuzhiyun  */
mbedtls_ecdsa_read_signature(mbedtls_ecdsa_context * ctx,const unsigned char * hash,size_t hlen,const unsigned char * sig,size_t slen)356*4882a593Smuzhiyun int mbedtls_ecdsa_read_signature( mbedtls_ecdsa_context *ctx,
357*4882a593Smuzhiyun                           const unsigned char *hash, size_t hlen,
358*4882a593Smuzhiyun                           const unsigned char *sig, size_t slen )
359*4882a593Smuzhiyun {
360*4882a593Smuzhiyun     int ret;
361*4882a593Smuzhiyun     unsigned char *p = (unsigned char *) sig;
362*4882a593Smuzhiyun     const unsigned char *end = sig + slen;
363*4882a593Smuzhiyun     size_t len;
364*4882a593Smuzhiyun     mbedtls_mpi r, s;
365*4882a593Smuzhiyun 
366*4882a593Smuzhiyun     mbedtls_mpi_init( &r );
367*4882a593Smuzhiyun     mbedtls_mpi_init( &s );
368*4882a593Smuzhiyun 
369*4882a593Smuzhiyun     if( ( ret = mbedtls_asn1_get_tag( &p, end, &len,
370*4882a593Smuzhiyun                     MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE ) ) != 0 )
371*4882a593Smuzhiyun     {
372*4882a593Smuzhiyun         ret += MBEDTLS_ERR_ECP_BAD_INPUT_DATA;
373*4882a593Smuzhiyun         goto cleanup;
374*4882a593Smuzhiyun     }
375*4882a593Smuzhiyun 
376*4882a593Smuzhiyun     if( p + len != end )
377*4882a593Smuzhiyun     {
378*4882a593Smuzhiyun         ret = MBEDTLS_ERR_ECP_BAD_INPUT_DATA +
379*4882a593Smuzhiyun               MBEDTLS_ERR_ASN1_LENGTH_MISMATCH;
380*4882a593Smuzhiyun         goto cleanup;
381*4882a593Smuzhiyun     }
382*4882a593Smuzhiyun 
383*4882a593Smuzhiyun     if( ( ret = mbedtls_asn1_get_mpi( &p, end, &r ) ) != 0 ||
384*4882a593Smuzhiyun         ( ret = mbedtls_asn1_get_mpi( &p, end, &s ) ) != 0 )
385*4882a593Smuzhiyun     {
386*4882a593Smuzhiyun         ret += MBEDTLS_ERR_ECP_BAD_INPUT_DATA;
387*4882a593Smuzhiyun         goto cleanup;
388*4882a593Smuzhiyun     }
389*4882a593Smuzhiyun 
390*4882a593Smuzhiyun     if( ( ret = mbedtls_ecdsa_verify( &ctx->grp, hash, hlen,
391*4882a593Smuzhiyun                               &ctx->Q, &r, &s ) ) != 0 )
392*4882a593Smuzhiyun         goto cleanup;
393*4882a593Smuzhiyun 
394*4882a593Smuzhiyun     if( p != end )
395*4882a593Smuzhiyun         ret = MBEDTLS_ERR_ECP_SIG_LEN_MISMATCH;
396*4882a593Smuzhiyun 
397*4882a593Smuzhiyun cleanup:
398*4882a593Smuzhiyun     mbedtls_mpi_free( &r );
399*4882a593Smuzhiyun     mbedtls_mpi_free( &s );
400*4882a593Smuzhiyun 
401*4882a593Smuzhiyun     return( ret );
402*4882a593Smuzhiyun }
403*4882a593Smuzhiyun 
404*4882a593Smuzhiyun /*
405*4882a593Smuzhiyun  * Generate key pair
406*4882a593Smuzhiyun  */
mbedtls_ecdsa_genkey(mbedtls_ecdsa_context * ctx,mbedtls_ecp_group_id gid,int (* f_rng)(void *,unsigned char *,size_t),void * p_rng)407*4882a593Smuzhiyun int mbedtls_ecdsa_genkey( mbedtls_ecdsa_context *ctx, mbedtls_ecp_group_id gid,
408*4882a593Smuzhiyun                   int (*f_rng)(void *, unsigned char *, size_t), void *p_rng )
409*4882a593Smuzhiyun {
410*4882a593Smuzhiyun     return( mbedtls_ecp_group_load( &ctx->grp, gid ) ||
411*4882a593Smuzhiyun             mbedtls_ecp_gen_keypair( &ctx->grp, &ctx->d, &ctx->Q, f_rng, p_rng ) );
412*4882a593Smuzhiyun }
413*4882a593Smuzhiyun 
414*4882a593Smuzhiyun /*
415*4882a593Smuzhiyun  * Set context from an mbedtls_ecp_keypair
416*4882a593Smuzhiyun  */
mbedtls_ecdsa_from_keypair(mbedtls_ecdsa_context * ctx,const mbedtls_ecp_keypair * key)417*4882a593Smuzhiyun int mbedtls_ecdsa_from_keypair( mbedtls_ecdsa_context *ctx, const mbedtls_ecp_keypair *key )
418*4882a593Smuzhiyun {
419*4882a593Smuzhiyun     int ret;
420*4882a593Smuzhiyun 
421*4882a593Smuzhiyun     if( ( ret = mbedtls_ecp_group_copy( &ctx->grp, &key->grp ) ) != 0 ||
422*4882a593Smuzhiyun         ( ret = mbedtls_mpi_copy( &ctx->d, &key->d ) ) != 0 ||
423*4882a593Smuzhiyun         ( ret = mbedtls_ecp_copy( &ctx->Q, &key->Q ) ) != 0 )
424*4882a593Smuzhiyun     {
425*4882a593Smuzhiyun         mbedtls_ecdsa_free( ctx );
426*4882a593Smuzhiyun     }
427*4882a593Smuzhiyun 
428*4882a593Smuzhiyun     return( ret );
429*4882a593Smuzhiyun }
430*4882a593Smuzhiyun 
431*4882a593Smuzhiyun /*
432*4882a593Smuzhiyun  * Initialize context
433*4882a593Smuzhiyun  */
mbedtls_ecdsa_init(mbedtls_ecdsa_context * ctx)434*4882a593Smuzhiyun void mbedtls_ecdsa_init( mbedtls_ecdsa_context *ctx )
435*4882a593Smuzhiyun {
436*4882a593Smuzhiyun     mbedtls_ecp_keypair_init( ctx );
437*4882a593Smuzhiyun }
438*4882a593Smuzhiyun 
439*4882a593Smuzhiyun /*
440*4882a593Smuzhiyun  * Free context
441*4882a593Smuzhiyun  */
mbedtls_ecdsa_free(mbedtls_ecdsa_context * ctx)442*4882a593Smuzhiyun void mbedtls_ecdsa_free( mbedtls_ecdsa_context *ctx )
443*4882a593Smuzhiyun {
444*4882a593Smuzhiyun     mbedtls_ecp_keypair_free( ctx );
445*4882a593Smuzhiyun }
446*4882a593Smuzhiyun 
rnd_std_rand(void * rng_state,unsigned char * output,size_t len)447*4882a593Smuzhiyun static int rnd_std_rand( void *rng_state, unsigned char *output, size_t len )
448*4882a593Smuzhiyun {
449*4882a593Smuzhiyun     size_t i;
450*4882a593Smuzhiyun 	static int srand_flag = 1;
451*4882a593Smuzhiyun 
452*4882a593Smuzhiyun 	if(srand_flag) {
453*4882a593Smuzhiyun 		//srand(time(NULL));//������������ӡ�
454*4882a593Smuzhiyun 		srand(rand()+rand()+rand()+rand()*rand());
455*4882a593Smuzhiyun 		srand_flag = 0;
456*4882a593Smuzhiyun 	}
457*4882a593Smuzhiyun 
458*4882a593Smuzhiyun     for( i = 0; i < len; ++i )
459*4882a593Smuzhiyun         output[i] = rand();
460*4882a593Smuzhiyun     return( 0 );
461*4882a593Smuzhiyun }
462*4882a593Smuzhiyun 
463*4882a593Smuzhiyun #if 0
464*4882a593Smuzhiyun int rk_ecdsa_sign(mbed_ecc_key_t *ec_key, unsigned char *hash, unsigned int hash_len,
465*4882a593Smuzhiyun 											unsigned char *sig, unsigned int *sig_len)
466*4882a593Smuzhiyun {
467*4882a593Smuzhiyun 	int ret;
468*4882a593Smuzhiyun 	mbedtls_ecp_group grp;
469*4882a593Smuzhiyun 	mbedtls_mpi r, s, d;
470*4882a593Smuzhiyun 	mbedtls_ecp_group_id gid;
471*4882a593Smuzhiyun 
472*4882a593Smuzhiyun 	mbedtls_mpi_init(&r);
473*4882a593Smuzhiyun     mbedtls_mpi_init(&s);
474*4882a593Smuzhiyun 	mbedtls_mpi_init(&d);
475*4882a593Smuzhiyun 	mbedtls_ecp_group_init(&grp);
476*4882a593Smuzhiyun 
477*4882a593Smuzhiyun 	DEBUG("ec_key->curve = %d", ec_key->curve );
478*4882a593Smuzhiyun 	mbedtls_ecp_group_load(&grp, ec_key->curve);
479*4882a593Smuzhiyun 
480*4882a593Smuzhiyun 	MBEDTLS_MPI_CHK(mbedtls_ecdsa_sign(grp, &r, &s, d, hash, hash_len, rnd_std_rand, NULL));
481*4882a593Smuzhiyun     MBEDTLS_MPI_CHK(ecdsa_signature_to_asn1(&r, &s, sig, sig_len ));
482*4882a593Smuzhiyun 
483*4882a593Smuzhiyun cleanup:
484*4882a593Smuzhiyun 	mbedtls_mpi_free(&r);
485*4882a593Smuzhiyun     mbedtls_mpi_free(&s);
486*4882a593Smuzhiyun 	mbedtls_mpi_free(&d);
487*4882a593Smuzhiyun 	mbedtls_ecp_group_free(&grp);
488*4882a593Smuzhiyun     return ret;
489*4882a593Smuzhiyun }
490*4882a593Smuzhiyun #endif
491*4882a593Smuzhiyun 
rk_ecdsa_sign(const mbed_ecc_key_t * key,unsigned char * hash,unsigned int hash_len,unsigned char * sig,size_t * sig_len)492*4882a593Smuzhiyun int rk_ecdsa_sign(const mbed_ecc_key_t *key, unsigned char *hash, unsigned int hash_len,
493*4882a593Smuzhiyun 						unsigned char *sig, size_t *sig_len)
494*4882a593Smuzhiyun {
495*4882a593Smuzhiyun     int ret = -1;
496*4882a593Smuzhiyun 	mbedtls_ecp_group grp;
497*4882a593Smuzhiyun 	mbedtls_mpi r, s;
498*4882a593Smuzhiyun     mbedtls_mpi pri_key;
499*4882a593Smuzhiyun 
500*4882a593Smuzhiyun 	mbedtls_ecp_group_init( &grp );
501*4882a593Smuzhiyun     mbedtls_mpi_init( &pri_key);
502*4882a593Smuzhiyun 	mbedtls_mpi_init(&r);
503*4882a593Smuzhiyun     mbedtls_mpi_init(&s);
504*4882a593Smuzhiyun 
505*4882a593Smuzhiyun 	MBEDTLS_MPI_CHK( mbedtls_ecp_group_load( &grp, key->curve ) );
506*4882a593Smuzhiyun 	MBEDTLS_MPI_CHK( mbedtls_mpi_read_binary( &pri_key, key->d, key->d_len) );
507*4882a593Smuzhiyun 
508*4882a593Smuzhiyun     if(mbedtls_ecp_check_privkey( &grp, &pri_key) != 0)
509*4882a593Smuzhiyun     {
510*4882a593Smuzhiyun     	printf("mbedtls_ecp_check_privkey error\n");
511*4882a593Smuzhiyun         return -1;
512*4882a593Smuzhiyun     }
513*4882a593Smuzhiyun 
514*4882a593Smuzhiyun 	MBEDTLS_MPI_CHK(mbedtls_ecdsa_sign(&grp, &r, &s, &pri_key, hash, hash_len, rnd_std_rand, NULL));
515*4882a593Smuzhiyun 	MBEDTLS_MPI_CHK(ecdsa_signature_to_asn1(&r, &s, sig, sig_len ));
516*4882a593Smuzhiyun cleanup:
517*4882a593Smuzhiyun 	mbedtls_mpi_free(&r);
518*4882a593Smuzhiyun     mbedtls_mpi_free(&s);
519*4882a593Smuzhiyun 	mbedtls_ecp_group_free( &grp );
520*4882a593Smuzhiyun     mbedtls_mpi_free( &pri_key);
521*4882a593Smuzhiyun 	return ret;
522*4882a593Smuzhiyun }
523*4882a593Smuzhiyun 
rk_ecdsa_verify(const mbed_ecc_key_t * key,unsigned char * hash,unsigned int hash_len,unsigned char * sig,unsigned int sig_len)524*4882a593Smuzhiyun int rk_ecdsa_verify(const mbed_ecc_key_t *key, unsigned char *hash, unsigned int hash_len,
525*4882a593Smuzhiyun 						unsigned char *sig, unsigned int sig_len)
526*4882a593Smuzhiyun {
527*4882a593Smuzhiyun     int ret = -1;
528*4882a593Smuzhiyun 	mbedtls_ecp_group grp;
529*4882a593Smuzhiyun 	unsigned char *p = (unsigned char *) sig;
530*4882a593Smuzhiyun     const unsigned char *end = sig + sig_len;
531*4882a593Smuzhiyun     size_t len;
532*4882a593Smuzhiyun 	mbedtls_mpi r, s;
533*4882a593Smuzhiyun     mbedtls_ecp_point pub_key;
534*4882a593Smuzhiyun 
535*4882a593Smuzhiyun 	mbedtls_ecp_group_init( &grp );
536*4882a593Smuzhiyun     mbedtls_ecp_point_init( &pub_key);
537*4882a593Smuzhiyun 	mbedtls_mpi_init(&r);
538*4882a593Smuzhiyun     mbedtls_mpi_init(&s);
539*4882a593Smuzhiyun 
540*4882a593Smuzhiyun 	MBEDTLS_MPI_CHK( mbedtls_ecp_group_load( &grp, key->curve ) );
541*4882a593Smuzhiyun 	MBEDTLS_MPI_CHK( mbedtls_mpi_read_binary( &pub_key.X, key->x, key->x_len) );
542*4882a593Smuzhiyun 	MBEDTLS_MPI_CHK( mbedtls_mpi_read_binary( &pub_key.Y, key->y, key->y_len) );
543*4882a593Smuzhiyun 	MBEDTLS_MPI_CHK( mbedtls_mpi_lset( &pub_key.Z, 1 ));
544*4882a593Smuzhiyun 
545*4882a593Smuzhiyun     if(mbedtls_ecp_check_pubkey( &grp, &pub_key) != 0)
546*4882a593Smuzhiyun     {
547*4882a593Smuzhiyun     	printf("mbedtls_ecp_check_privkey error\n");
548*4882a593Smuzhiyun         return -1;
549*4882a593Smuzhiyun     }
550*4882a593Smuzhiyun 
551*4882a593Smuzhiyun 	 if( ( ret = mbedtls_asn1_get_tag( &p, end, &len,
552*4882a593Smuzhiyun                     MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE ) ) != 0 )
553*4882a593Smuzhiyun     {
554*4882a593Smuzhiyun         ret += MBEDTLS_ERR_ECP_BAD_INPUT_DATA;
555*4882a593Smuzhiyun         goto cleanup;
556*4882a593Smuzhiyun     }
557*4882a593Smuzhiyun 
558*4882a593Smuzhiyun     if( p + len != end )
559*4882a593Smuzhiyun     {
560*4882a593Smuzhiyun         ret = MBEDTLS_ERR_ECP_BAD_INPUT_DATA +
561*4882a593Smuzhiyun               MBEDTLS_ERR_ASN1_LENGTH_MISMATCH;
562*4882a593Smuzhiyun         goto cleanup;
563*4882a593Smuzhiyun     }
564*4882a593Smuzhiyun 
565*4882a593Smuzhiyun     if( ( ret = mbedtls_asn1_get_mpi( &p, end, &r ) ) != 0 ||
566*4882a593Smuzhiyun         ( ret = mbedtls_asn1_get_mpi( &p, end, &s ) ) != 0 )
567*4882a593Smuzhiyun     {
568*4882a593Smuzhiyun         ret += MBEDTLS_ERR_ECP_BAD_INPUT_DATA;
569*4882a593Smuzhiyun         goto cleanup;
570*4882a593Smuzhiyun     }
571*4882a593Smuzhiyun 
572*4882a593Smuzhiyun 	if( ( ret = mbedtls_ecdsa_verify( &grp, hash, hash_len, &pub_key, &r, &s ) ) != 0 )
573*4882a593Smuzhiyun         goto cleanup;
574*4882a593Smuzhiyun 
575*4882a593Smuzhiyun     if( p != end )
576*4882a593Smuzhiyun         ret = MBEDTLS_ERR_ECP_SIG_LEN_MISMATCH;
577*4882a593Smuzhiyun 
578*4882a593Smuzhiyun cleanup:
579*4882a593Smuzhiyun 	mbedtls_mpi_free(&r);
580*4882a593Smuzhiyun     mbedtls_mpi_free(&s);
581*4882a593Smuzhiyun 	mbedtls_ecp_group_free( &grp );
582*4882a593Smuzhiyun     mbedtls_ecp_point_free( &pub_key);
583*4882a593Smuzhiyun 	return ret;
584*4882a593Smuzhiyun }
585*4882a593Smuzhiyun 
rk_ecdsa_sign2(const mbed_ecc_key_t * key,unsigned char * hash,unsigned int hash_len,unsigned char * r_data,unsigned int * r_len,unsigned char * s_data,unsigned int * s_len)586*4882a593Smuzhiyun int rk_ecdsa_sign2(const mbed_ecc_key_t *key, unsigned char *hash, unsigned int hash_len,
587*4882a593Smuzhiyun 						unsigned char *r_data, unsigned int *r_len, unsigned char *s_data, unsigned int *s_len)
588*4882a593Smuzhiyun {
589*4882a593Smuzhiyun     int ret = -1;
590*4882a593Smuzhiyun 	mbedtls_ecp_group grp;
591*4882a593Smuzhiyun 	mbedtls_mpi r, s;
592*4882a593Smuzhiyun     mbedtls_mpi pri_key;
593*4882a593Smuzhiyun 
594*4882a593Smuzhiyun 	mbedtls_ecp_group_init( &grp );
595*4882a593Smuzhiyun     mbedtls_mpi_init( &pri_key);
596*4882a593Smuzhiyun 	mbedtls_mpi_init(&r);
597*4882a593Smuzhiyun     mbedtls_mpi_init(&s);
598*4882a593Smuzhiyun 
599*4882a593Smuzhiyun 	MBEDTLS_MPI_CHK( mbedtls_ecp_group_load( &grp, key->curve ) );
600*4882a593Smuzhiyun 	MBEDTLS_MPI_CHK( mbedtls_mpi_read_binary( &pri_key, key->d, key->d_len) );
601*4882a593Smuzhiyun 
602*4882a593Smuzhiyun     if(mbedtls_ecp_check_privkey( &grp, &pri_key) != 0)
603*4882a593Smuzhiyun     {
604*4882a593Smuzhiyun     	printf("mbedtls_ecp_check_privkey error\n");
605*4882a593Smuzhiyun         return -1;
606*4882a593Smuzhiyun     }
607*4882a593Smuzhiyun 
608*4882a593Smuzhiyun 	MBEDTLS_MPI_CHK(mbedtls_ecdsa_sign(&grp, &r, &s, &pri_key, hash, hash_len, rnd_std_rand, NULL));
609*4882a593Smuzhiyun 
610*4882a593Smuzhiyun 	*r_len = mbedtls_mpi_size(&r);
611*4882a593Smuzhiyun 	mbedtls_mpi_write_binary(&r, r_data, *r_len);
612*4882a593Smuzhiyun 
613*4882a593Smuzhiyun 	*s_len = mbedtls_mpi_size(&s);
614*4882a593Smuzhiyun 	mbedtls_mpi_write_binary(&s, s_data, *s_len);
615*4882a593Smuzhiyun cleanup:
616*4882a593Smuzhiyun 	mbedtls_mpi_free(&r);
617*4882a593Smuzhiyun     mbedtls_mpi_free(&s);
618*4882a593Smuzhiyun 	mbedtls_ecp_group_free( &grp );
619*4882a593Smuzhiyun     mbedtls_mpi_free( &pri_key);
620*4882a593Smuzhiyun 	return ret;
621*4882a593Smuzhiyun }
622*4882a593Smuzhiyun 
rk_ecdsa_verify2(const mbed_ecc_key_t * key,unsigned char * hash,unsigned int hash_len,unsigned char * r_data,unsigned int r_len,unsigned char * s_data,unsigned int s_len)623*4882a593Smuzhiyun int rk_ecdsa_verify2(const mbed_ecc_key_t *key, unsigned char *hash, unsigned int hash_len,
624*4882a593Smuzhiyun 						unsigned char *r_data, unsigned int r_len, unsigned char *s_data, unsigned int s_len)
625*4882a593Smuzhiyun {
626*4882a593Smuzhiyun     int ret = -1;
627*4882a593Smuzhiyun 	mbedtls_ecp_group grp;
628*4882a593Smuzhiyun 	mbedtls_mpi r, s;
629*4882a593Smuzhiyun     mbedtls_ecp_point pub_key;
630*4882a593Smuzhiyun 
631*4882a593Smuzhiyun 	mbedtls_ecp_group_init( &grp );
632*4882a593Smuzhiyun     mbedtls_ecp_point_init( &pub_key);
633*4882a593Smuzhiyun 	mbedtls_mpi_init(&r);
634*4882a593Smuzhiyun     mbedtls_mpi_init(&s);
635*4882a593Smuzhiyun 
636*4882a593Smuzhiyun 	MBEDTLS_MPI_CHK( mbedtls_mpi_read_binary( &r, r_data, r_len) );
637*4882a593Smuzhiyun 	MBEDTLS_MPI_CHK( mbedtls_mpi_read_binary( &s, s_data, s_len) );
638*4882a593Smuzhiyun 
639*4882a593Smuzhiyun 	MBEDTLS_MPI_CHK( mbedtls_ecp_group_load( &grp, key->curve ) );
640*4882a593Smuzhiyun 	MBEDTLS_MPI_CHK( mbedtls_mpi_read_binary( &pub_key.X, key->x, key->x_len) );
641*4882a593Smuzhiyun 	MBEDTLS_MPI_CHK( mbedtls_mpi_read_binary( &pub_key.Y, key->y, key->y_len) );
642*4882a593Smuzhiyun 	MBEDTLS_MPI_CHK( mbedtls_mpi_lset( &pub_key.Z, 1 ));
643*4882a593Smuzhiyun 
644*4882a593Smuzhiyun     if(mbedtls_ecp_check_pubkey( &grp, &pub_key) != 0)
645*4882a593Smuzhiyun     {
646*4882a593Smuzhiyun     	printf("mbedtls_ecp_check_privkey error\n");
647*4882a593Smuzhiyun         return -1;
648*4882a593Smuzhiyun     }
649*4882a593Smuzhiyun 
650*4882a593Smuzhiyun 	if( ( ret = mbedtls_ecdsa_verify( &grp, hash, hash_len, &pub_key, &r, &s ) ) != 0 )
651*4882a593Smuzhiyun         goto cleanup;
652*4882a593Smuzhiyun 
653*4882a593Smuzhiyun 
654*4882a593Smuzhiyun cleanup:
655*4882a593Smuzhiyun 	mbedtls_mpi_free(&r);
656*4882a593Smuzhiyun     mbedtls_mpi_free(&s);
657*4882a593Smuzhiyun 	mbedtls_ecp_group_free( &grp );
658*4882a593Smuzhiyun     mbedtls_ecp_point_free( &pub_key);
659*4882a593Smuzhiyun 	return ret;
660*4882a593Smuzhiyun }
661*4882a593Smuzhiyun 
662*4882a593Smuzhiyun 
663*4882a593Smuzhiyun #endif /* MBEDTLS_ECDSA_C */
664