1817466cbSJens Wiklander /* 2817466cbSJens Wiklander * Elliptic curves over GF(p): generic functions 3817466cbSJens Wiklander * 47901324dSJerome Forissier * Copyright The Mbed TLS Contributors 57901324dSJerome Forissier * SPDX-License-Identifier: Apache-2.0 6817466cbSJens Wiklander * 7817466cbSJens Wiklander * Licensed under the Apache License, Version 2.0 (the "License"); you may 8817466cbSJens Wiklander * not use this file except in compliance with the License. 9817466cbSJens Wiklander * You may obtain a copy of the License at 10817466cbSJens Wiklander * 11817466cbSJens Wiklander * http://www.apache.org/licenses/LICENSE-2.0 12817466cbSJens Wiklander * 13817466cbSJens Wiklander * Unless required by applicable law or agreed to in writing, software 14817466cbSJens Wiklander * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT 15817466cbSJens Wiklander * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 16817466cbSJens Wiklander * See the License for the specific language governing permissions and 17817466cbSJens Wiklander * limitations under the License. 18817466cbSJens Wiklander */ 19817466cbSJens Wiklander 20817466cbSJens Wiklander /* 21817466cbSJens Wiklander * References: 22817466cbSJens Wiklander * 23817466cbSJens Wiklander * SEC1 http://www.secg.org/index.php?action=secg,docs_secg 24817466cbSJens Wiklander * GECC = Guide to Elliptic Curve Cryptography - Hankerson, Menezes, Vanstone 25817466cbSJens Wiklander * FIPS 186-3 http://csrc.nist.gov/publications/fips/fips186-3/fips_186-3.pdf 26817466cbSJens Wiklander * RFC 4492 for the related TLS structures and constants 273d3b0591SJens Wiklander * RFC 7748 for the Curve448 and Curve25519 curve definitions 28817466cbSJens Wiklander * 29817466cbSJens Wiklander * [Curve25519] http://cr.yp.to/ecdh/curve25519-20060209.pdf 30817466cbSJens Wiklander * 31817466cbSJens Wiklander * [2] CORON, Jean-S'ebastien. Resistance against differential power analysis 32817466cbSJens Wiklander * for elliptic curve cryptosystems. In : Cryptographic Hardware and 33817466cbSJens Wiklander * Embedded Systems. Springer Berlin Heidelberg, 1999. p. 292-302. 34817466cbSJens Wiklander * <http://link.springer.com/chapter/10.1007/3-540-48059-5_25> 35817466cbSJens Wiklander * 36817466cbSJens Wiklander * [3] HEDABOU, Mustapha, PINEL, Pierre, et B'EN'ETEAU, Lucien. A comb method to 37817466cbSJens Wiklander * render ECC resistant against Side Channel Attacks. IACR Cryptology 38817466cbSJens Wiklander * ePrint Archive, 2004, vol. 2004, p. 342. 39817466cbSJens Wiklander * <http://eprint.iacr.org/2004/342.pdf> 40817466cbSJens Wiklander */ 41817466cbSJens Wiklander 427901324dSJerome Forissier #include "common.h" 43817466cbSJens Wiklander 443d3b0591SJens Wiklander /** 453d3b0591SJens Wiklander * \brief Function level alternative implementation. 463d3b0591SJens Wiklander * 473d3b0591SJens Wiklander * The MBEDTLS_ECP_INTERNAL_ALT macro enables alternative implementations to 483d3b0591SJens Wiklander * replace certain functions in this module. The alternative implementations are 493d3b0591SJens Wiklander * typically hardware accelerators and need to activate the hardware before the 503d3b0591SJens Wiklander * computation starts and deactivate it after it finishes. The 513d3b0591SJens Wiklander * mbedtls_internal_ecp_init() and mbedtls_internal_ecp_free() functions serve 523d3b0591SJens Wiklander * this purpose. 533d3b0591SJens Wiklander * 543d3b0591SJens Wiklander * To preserve the correct functionality the following conditions must hold: 553d3b0591SJens Wiklander * 563d3b0591SJens Wiklander * - The alternative implementation must be activated by 573d3b0591SJens Wiklander * mbedtls_internal_ecp_init() before any of the replaceable functions is 583d3b0591SJens Wiklander * called. 593d3b0591SJens Wiklander * - mbedtls_internal_ecp_free() must \b only be called when the alternative 603d3b0591SJens Wiklander * implementation is activated. 613d3b0591SJens Wiklander * - mbedtls_internal_ecp_init() must \b not be called when the alternative 623d3b0591SJens Wiklander * implementation is activated. 633d3b0591SJens Wiklander * - Public functions must not return while the alternative implementation is 643d3b0591SJens Wiklander * activated. 653d3b0591SJens Wiklander * - Replaceable functions are guarded by \c MBEDTLS_ECP_XXX_ALT macros and 663d3b0591SJens Wiklander * before calling them an \code if( mbedtls_internal_ecp_grp_capable( grp ) ) 673d3b0591SJens Wiklander * \endcode ensures that the alternative implementation supports the current 683d3b0591SJens Wiklander * group. 693d3b0591SJens Wiklander */ 703d3b0591SJens Wiklander #if defined(MBEDTLS_ECP_INTERNAL_ALT) 713d3b0591SJens Wiklander #endif 723d3b0591SJens Wiklander 73817466cbSJens Wiklander #if defined(MBEDTLS_ECP_C) 74817466cbSJens Wiklander 75817466cbSJens Wiklander #include "mbedtls/ecp.h" 76817466cbSJens Wiklander #include "mbedtls/threading.h" 773d3b0591SJens Wiklander #include "mbedtls/platform_util.h" 7811fa71b9SJerome Forissier #include "mbedtls/error.h" 797901324dSJerome Forissier #include "mbedtls/bn_mul.h" 807901324dSJerome Forissier 817901324dSJerome Forissier #include "ecp_invasive.h" 82817466cbSJens Wiklander 83817466cbSJens Wiklander #include <string.h> 84817466cbSJens Wiklander 85817466cbSJens Wiklander #if !defined(MBEDTLS_ECP_ALT) 86817466cbSJens Wiklander 873d3b0591SJens Wiklander /* Parameter validation macros based on platform_util.h */ 883d3b0591SJens Wiklander #define ECP_VALIDATE_RET( cond ) \ 893d3b0591SJens Wiklander MBEDTLS_INTERNAL_VALIDATE_RET( cond, MBEDTLS_ERR_ECP_BAD_INPUT_DATA ) 903d3b0591SJens Wiklander #define ECP_VALIDATE( cond ) \ 913d3b0591SJens Wiklander MBEDTLS_INTERNAL_VALIDATE( cond ) 923d3b0591SJens Wiklander 93817466cbSJens Wiklander #if defined(MBEDTLS_PLATFORM_C) 94817466cbSJens Wiklander #include "mbedtls/platform.h" 95817466cbSJens Wiklander #else 96817466cbSJens Wiklander #include <stdlib.h> 97817466cbSJens Wiklander #include <stdio.h> 98817466cbSJens Wiklander #define mbedtls_printf printf 99817466cbSJens Wiklander #define mbedtls_calloc calloc 100817466cbSJens Wiklander #define mbedtls_free free 101817466cbSJens Wiklander #endif 102817466cbSJens Wiklander 103817466cbSJens Wiklander #include "mbedtls/ecp_internal.h" 104817466cbSJens Wiklander 1057901324dSJerome Forissier #if !defined(MBEDTLS_ECP_NO_INTERNAL_RNG) 1067901324dSJerome Forissier #if defined(MBEDTLS_HMAC_DRBG_C) 1077901324dSJerome Forissier #include "mbedtls/hmac_drbg.h" 1087901324dSJerome Forissier #elif defined(MBEDTLS_CTR_DRBG_C) 1097901324dSJerome Forissier #include "mbedtls/ctr_drbg.h" 1107901324dSJerome Forissier #else 1117901324dSJerome Forissier #error "Invalid configuration detected. Include check_config.h to ensure that the configuration is valid." 1127901324dSJerome Forissier #endif 1137901324dSJerome Forissier #endif /* MBEDTLS_ECP_NO_INTERNAL_RNG */ 1147901324dSJerome Forissier 115817466cbSJens Wiklander #if ( defined(__ARMCC_VERSION) || defined(_MSC_VER) ) && \ 116817466cbSJens Wiklander !defined(inline) && !defined(__cplusplus) 117817466cbSJens Wiklander #define inline __inline 118817466cbSJens Wiklander #endif 119817466cbSJens Wiklander 120817466cbSJens Wiklander #if defined(MBEDTLS_SELF_TEST) 121817466cbSJens Wiklander /* 122817466cbSJens Wiklander * Counts of point addition and doubling, and field multiplications. 123817466cbSJens Wiklander * Used to test resistance of point multiplication to simple timing attacks. 124817466cbSJens Wiklander */ 125817466cbSJens Wiklander static unsigned long add_count, dbl_count, mul_count; 126817466cbSJens Wiklander #endif 127817466cbSJens Wiklander 1287901324dSJerome Forissier #if !defined(MBEDTLS_ECP_NO_INTERNAL_RNG) 1297901324dSJerome Forissier /* 1307901324dSJerome Forissier * Currently ecp_mul() takes a RNG function as an argument, used for 1317901324dSJerome Forissier * side-channel protection, but it can be NULL. The initial reasoning was 1327901324dSJerome Forissier * that people will pass non-NULL RNG when they care about side-channels, but 1337901324dSJerome Forissier * unfortunately we have some APIs that call ecp_mul() with a NULL RNG, with 1347901324dSJerome Forissier * no opportunity for the user to do anything about it. 1357901324dSJerome Forissier * 1367901324dSJerome Forissier * The obvious strategies for addressing that include: 1377901324dSJerome Forissier * - change those APIs so that they take RNG arguments; 1387901324dSJerome Forissier * - require a global RNG to be available to all crypto modules. 1397901324dSJerome Forissier * 1407901324dSJerome Forissier * Unfortunately those would break compatibility. So what we do instead is 1417901324dSJerome Forissier * have our own internal DRBG instance, seeded from the secret scalar. 1427901324dSJerome Forissier * 1437901324dSJerome Forissier * The following is a light-weight abstraction layer for doing that with 1447901324dSJerome Forissier * HMAC_DRBG (first choice) or CTR_DRBG. 1457901324dSJerome Forissier */ 1467901324dSJerome Forissier 1477901324dSJerome Forissier #if defined(MBEDTLS_HMAC_DRBG_C) 1487901324dSJerome Forissier 1497901324dSJerome Forissier /* DRBG context type */ 1507901324dSJerome Forissier typedef mbedtls_hmac_drbg_context ecp_drbg_context; 1517901324dSJerome Forissier 1527901324dSJerome Forissier /* DRBG context init */ 1537901324dSJerome Forissier static inline void ecp_drbg_init( ecp_drbg_context *ctx ) 1547901324dSJerome Forissier { 1557901324dSJerome Forissier mbedtls_hmac_drbg_init( ctx ); 1567901324dSJerome Forissier } 1577901324dSJerome Forissier 1587901324dSJerome Forissier /* DRBG context free */ 1597901324dSJerome Forissier static inline void ecp_drbg_free( ecp_drbg_context *ctx ) 1607901324dSJerome Forissier { 1617901324dSJerome Forissier mbedtls_hmac_drbg_free( ctx ); 1627901324dSJerome Forissier } 1637901324dSJerome Forissier 1647901324dSJerome Forissier /* DRBG function */ 1657901324dSJerome Forissier static inline int ecp_drbg_random( void *p_rng, 1667901324dSJerome Forissier unsigned char *output, size_t output_len ) 1677901324dSJerome Forissier { 1687901324dSJerome Forissier return( mbedtls_hmac_drbg_random( p_rng, output, output_len ) ); 1697901324dSJerome Forissier } 1707901324dSJerome Forissier 1717901324dSJerome Forissier /* DRBG context seeding */ 1727901324dSJerome Forissier static int ecp_drbg_seed( ecp_drbg_context *ctx, 1737901324dSJerome Forissier const mbedtls_mpi *secret, size_t secret_len ) 1747901324dSJerome Forissier { 1757901324dSJerome Forissier int ret; 1767901324dSJerome Forissier unsigned char secret_bytes[MBEDTLS_ECP_MAX_BYTES]; 1777901324dSJerome Forissier /* The list starts with strong hashes */ 1787901324dSJerome Forissier const mbedtls_md_type_t md_type = mbedtls_md_list()[0]; 1797901324dSJerome Forissier const mbedtls_md_info_t *md_info = mbedtls_md_info_from_type( md_type ); 1807901324dSJerome Forissier 1817901324dSJerome Forissier if( secret_len > MBEDTLS_ECP_MAX_BYTES ) 1827901324dSJerome Forissier { 1837901324dSJerome Forissier ret = MBEDTLS_ERR_ECP_RANDOM_FAILED; 1847901324dSJerome Forissier goto cleanup; 1857901324dSJerome Forissier } 1867901324dSJerome Forissier 1877901324dSJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_write_binary( secret, 1887901324dSJerome Forissier secret_bytes, secret_len ) ); 1897901324dSJerome Forissier 1907901324dSJerome Forissier ret = mbedtls_hmac_drbg_seed_buf( ctx, md_info, secret_bytes, secret_len ); 1917901324dSJerome Forissier 1927901324dSJerome Forissier cleanup: 1937901324dSJerome Forissier mbedtls_platform_zeroize( secret_bytes, secret_len ); 1947901324dSJerome Forissier 1957901324dSJerome Forissier return( ret ); 1967901324dSJerome Forissier } 1977901324dSJerome Forissier 1987901324dSJerome Forissier #elif defined(MBEDTLS_CTR_DRBG_C) 1997901324dSJerome Forissier 2007901324dSJerome Forissier /* DRBG context type */ 2017901324dSJerome Forissier typedef mbedtls_ctr_drbg_context ecp_drbg_context; 2027901324dSJerome Forissier 2037901324dSJerome Forissier /* DRBG context init */ 2047901324dSJerome Forissier static inline void ecp_drbg_init( ecp_drbg_context *ctx ) 2057901324dSJerome Forissier { 2067901324dSJerome Forissier mbedtls_ctr_drbg_init( ctx ); 2077901324dSJerome Forissier } 2087901324dSJerome Forissier 2097901324dSJerome Forissier /* DRBG context free */ 2107901324dSJerome Forissier static inline void ecp_drbg_free( ecp_drbg_context *ctx ) 2117901324dSJerome Forissier { 2127901324dSJerome Forissier mbedtls_ctr_drbg_free( ctx ); 2137901324dSJerome Forissier } 2147901324dSJerome Forissier 2157901324dSJerome Forissier /* DRBG function */ 2167901324dSJerome Forissier static inline int ecp_drbg_random( void *p_rng, 2177901324dSJerome Forissier unsigned char *output, size_t output_len ) 2187901324dSJerome Forissier { 2197901324dSJerome Forissier return( mbedtls_ctr_drbg_random( p_rng, output, output_len ) ); 2207901324dSJerome Forissier } 2217901324dSJerome Forissier 2227901324dSJerome Forissier /* 2237901324dSJerome Forissier * Since CTR_DRBG doesn't have a seed_buf() function the way HMAC_DRBG does, 2247901324dSJerome Forissier * we need to pass an entropy function when seeding. So we use a dummy 2257901324dSJerome Forissier * function for that, and pass the actual entropy as customisation string. 2267901324dSJerome Forissier * (During seeding of CTR_DRBG the entropy input and customisation string are 2277901324dSJerome Forissier * concatenated before being used to update the secret state.) 2287901324dSJerome Forissier */ 2297901324dSJerome Forissier static int ecp_ctr_drbg_null_entropy(void *ctx, unsigned char *out, size_t len) 2307901324dSJerome Forissier { 2317901324dSJerome Forissier (void) ctx; 2327901324dSJerome Forissier memset( out, 0, len ); 2337901324dSJerome Forissier return( 0 ); 2347901324dSJerome Forissier } 2357901324dSJerome Forissier 2367901324dSJerome Forissier /* DRBG context seeding */ 2377901324dSJerome Forissier static int ecp_drbg_seed( ecp_drbg_context *ctx, 2387901324dSJerome Forissier const mbedtls_mpi *secret, size_t secret_len ) 2397901324dSJerome Forissier { 2407901324dSJerome Forissier int ret; 2417901324dSJerome Forissier unsigned char secret_bytes[MBEDTLS_ECP_MAX_BYTES]; 2427901324dSJerome Forissier 2437901324dSJerome Forissier if( secret_len > MBEDTLS_ECP_MAX_BYTES ) 2447901324dSJerome Forissier { 2457901324dSJerome Forissier ret = MBEDTLS_ERR_ECP_RANDOM_FAILED; 2467901324dSJerome Forissier goto cleanup; 2477901324dSJerome Forissier } 2487901324dSJerome Forissier 2497901324dSJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_write_binary( secret, 2507901324dSJerome Forissier secret_bytes, secret_len ) ); 2517901324dSJerome Forissier 2527901324dSJerome Forissier ret = mbedtls_ctr_drbg_seed( ctx, ecp_ctr_drbg_null_entropy, NULL, 2537901324dSJerome Forissier secret_bytes, secret_len ); 2547901324dSJerome Forissier 2557901324dSJerome Forissier cleanup: 2567901324dSJerome Forissier mbedtls_platform_zeroize( secret_bytes, secret_len ); 2577901324dSJerome Forissier 2587901324dSJerome Forissier return( ret ); 2597901324dSJerome Forissier } 2607901324dSJerome Forissier 2617901324dSJerome Forissier #else 2627901324dSJerome Forissier #error "Invalid configuration detected. Include check_config.h to ensure that the configuration is valid." 2637901324dSJerome Forissier #endif /* DRBG modules */ 2647901324dSJerome Forissier #endif /* MBEDTLS_ECP_NO_INTERNAL_RNG */ 2657901324dSJerome Forissier 2663d3b0591SJens Wiklander #if defined(MBEDTLS_ECP_RESTARTABLE) 2673d3b0591SJens Wiklander /* 2683d3b0591SJens Wiklander * Maximum number of "basic operations" to be done in a row. 2693d3b0591SJens Wiklander * 2703d3b0591SJens Wiklander * Default value 0 means that ECC operations will not yield. 2713d3b0591SJens Wiklander * Note that regardless of the value of ecp_max_ops, always at 2723d3b0591SJens Wiklander * least one step is performed before yielding. 2733d3b0591SJens Wiklander * 2743d3b0591SJens Wiklander * Setting ecp_max_ops=1 can be suitable for testing purposes 2753d3b0591SJens Wiklander * as it will interrupt computation at all possible points. 2763d3b0591SJens Wiklander */ 2773d3b0591SJens Wiklander static unsigned ecp_max_ops = 0; 2783d3b0591SJens Wiklander 2793d3b0591SJens Wiklander /* 2803d3b0591SJens Wiklander * Set ecp_max_ops 2813d3b0591SJens Wiklander */ 2823d3b0591SJens Wiklander void mbedtls_ecp_set_max_ops( unsigned max_ops ) 2833d3b0591SJens Wiklander { 2843d3b0591SJens Wiklander ecp_max_ops = max_ops; 2853d3b0591SJens Wiklander } 2863d3b0591SJens Wiklander 2873d3b0591SJens Wiklander /* 2883d3b0591SJens Wiklander * Check if restart is enabled 2893d3b0591SJens Wiklander */ 2903d3b0591SJens Wiklander int mbedtls_ecp_restart_is_enabled( void ) 2913d3b0591SJens Wiklander { 2923d3b0591SJens Wiklander return( ecp_max_ops != 0 ); 2933d3b0591SJens Wiklander } 2943d3b0591SJens Wiklander 2953d3b0591SJens Wiklander /* 2963d3b0591SJens Wiklander * Restart sub-context for ecp_mul_comb() 2973d3b0591SJens Wiklander */ 2983d3b0591SJens Wiklander struct mbedtls_ecp_restart_mul 2993d3b0591SJens Wiklander { 3003d3b0591SJens Wiklander mbedtls_ecp_point R; /* current intermediate result */ 3013d3b0591SJens Wiklander size_t i; /* current index in various loops, 0 outside */ 3023d3b0591SJens Wiklander mbedtls_ecp_point *T; /* table for precomputed points */ 3033d3b0591SJens Wiklander unsigned char T_size; /* number of points in table T */ 3043d3b0591SJens Wiklander enum { /* what were we doing last time we returned? */ 3053d3b0591SJens Wiklander ecp_rsm_init = 0, /* nothing so far, dummy initial state */ 3063d3b0591SJens Wiklander ecp_rsm_pre_dbl, /* precompute 2^n multiples */ 3073d3b0591SJens Wiklander ecp_rsm_pre_norm_dbl, /* normalize precomputed 2^n multiples */ 3083d3b0591SJens Wiklander ecp_rsm_pre_add, /* precompute remaining points by adding */ 3093d3b0591SJens Wiklander ecp_rsm_pre_norm_add, /* normalize all precomputed points */ 3103d3b0591SJens Wiklander ecp_rsm_comb_core, /* ecp_mul_comb_core() */ 3113d3b0591SJens Wiklander ecp_rsm_final_norm, /* do the final normalization */ 3123d3b0591SJens Wiklander } state; 3137901324dSJerome Forissier #if !defined(MBEDTLS_ECP_NO_INTERNAL_RNG) 3147901324dSJerome Forissier ecp_drbg_context drbg_ctx; 3157901324dSJerome Forissier unsigned char drbg_seeded; 3167901324dSJerome Forissier #endif 3173d3b0591SJens Wiklander }; 3183d3b0591SJens Wiklander 3193d3b0591SJens Wiklander /* 3203d3b0591SJens Wiklander * Init restart_mul sub-context 3213d3b0591SJens Wiklander */ 3223d3b0591SJens Wiklander static void ecp_restart_rsm_init( mbedtls_ecp_restart_mul_ctx *ctx ) 3233d3b0591SJens Wiklander { 3243d3b0591SJens Wiklander mbedtls_ecp_point_init( &ctx->R ); 3253d3b0591SJens Wiklander ctx->i = 0; 3263d3b0591SJens Wiklander ctx->T = NULL; 3273d3b0591SJens Wiklander ctx->T_size = 0; 3283d3b0591SJens Wiklander ctx->state = ecp_rsm_init; 3297901324dSJerome Forissier #if !defined(MBEDTLS_ECP_NO_INTERNAL_RNG) 3307901324dSJerome Forissier ecp_drbg_init( &ctx->drbg_ctx ); 3317901324dSJerome Forissier ctx->drbg_seeded = 0; 3327901324dSJerome Forissier #endif 3333d3b0591SJens Wiklander } 3343d3b0591SJens Wiklander 3353d3b0591SJens Wiklander /* 3363d3b0591SJens Wiklander * Free the components of a restart_mul sub-context 3373d3b0591SJens Wiklander */ 3383d3b0591SJens Wiklander static void ecp_restart_rsm_free( mbedtls_ecp_restart_mul_ctx *ctx ) 3393d3b0591SJens Wiklander { 3403d3b0591SJens Wiklander unsigned char i; 3413d3b0591SJens Wiklander 3423d3b0591SJens Wiklander if( ctx == NULL ) 3433d3b0591SJens Wiklander return; 3443d3b0591SJens Wiklander 3453d3b0591SJens Wiklander mbedtls_ecp_point_free( &ctx->R ); 3463d3b0591SJens Wiklander 3473d3b0591SJens Wiklander if( ctx->T != NULL ) 3483d3b0591SJens Wiklander { 3493d3b0591SJens Wiklander for( i = 0; i < ctx->T_size; i++ ) 3503d3b0591SJens Wiklander mbedtls_ecp_point_free( ctx->T + i ); 3513d3b0591SJens Wiklander mbedtls_free( ctx->T ); 3523d3b0591SJens Wiklander } 3533d3b0591SJens Wiklander 3547901324dSJerome Forissier #if !defined(MBEDTLS_ECP_NO_INTERNAL_RNG) 3557901324dSJerome Forissier ecp_drbg_free( &ctx->drbg_ctx ); 3567901324dSJerome Forissier #endif 3577901324dSJerome Forissier 3583d3b0591SJens Wiklander ecp_restart_rsm_init( ctx ); 3593d3b0591SJens Wiklander } 3603d3b0591SJens Wiklander 3613d3b0591SJens Wiklander /* 3623d3b0591SJens Wiklander * Restart context for ecp_muladd() 3633d3b0591SJens Wiklander */ 3643d3b0591SJens Wiklander struct mbedtls_ecp_restart_muladd 3653d3b0591SJens Wiklander { 3663d3b0591SJens Wiklander mbedtls_ecp_point mP; /* mP value */ 3673d3b0591SJens Wiklander mbedtls_ecp_point R; /* R intermediate result */ 3683d3b0591SJens Wiklander enum { /* what should we do next? */ 3693d3b0591SJens Wiklander ecp_rsma_mul1 = 0, /* first multiplication */ 3703d3b0591SJens Wiklander ecp_rsma_mul2, /* second multiplication */ 3713d3b0591SJens Wiklander ecp_rsma_add, /* addition */ 3723d3b0591SJens Wiklander ecp_rsma_norm, /* normalization */ 3733d3b0591SJens Wiklander } state; 3743d3b0591SJens Wiklander }; 3753d3b0591SJens Wiklander 3763d3b0591SJens Wiklander /* 3773d3b0591SJens Wiklander * Init restart_muladd sub-context 3783d3b0591SJens Wiklander */ 3793d3b0591SJens Wiklander static void ecp_restart_ma_init( mbedtls_ecp_restart_muladd_ctx *ctx ) 3803d3b0591SJens Wiklander { 3813d3b0591SJens Wiklander mbedtls_ecp_point_init( &ctx->mP ); 3823d3b0591SJens Wiklander mbedtls_ecp_point_init( &ctx->R ); 3833d3b0591SJens Wiklander ctx->state = ecp_rsma_mul1; 3843d3b0591SJens Wiklander } 3853d3b0591SJens Wiklander 3863d3b0591SJens Wiklander /* 3873d3b0591SJens Wiklander * Free the components of a restart_muladd sub-context 3883d3b0591SJens Wiklander */ 3893d3b0591SJens Wiklander static void ecp_restart_ma_free( mbedtls_ecp_restart_muladd_ctx *ctx ) 3903d3b0591SJens Wiklander { 3913d3b0591SJens Wiklander if( ctx == NULL ) 3923d3b0591SJens Wiklander return; 3933d3b0591SJens Wiklander 3943d3b0591SJens Wiklander mbedtls_ecp_point_free( &ctx->mP ); 3953d3b0591SJens Wiklander mbedtls_ecp_point_free( &ctx->R ); 3963d3b0591SJens Wiklander 3973d3b0591SJens Wiklander ecp_restart_ma_init( ctx ); 3983d3b0591SJens Wiklander } 3993d3b0591SJens Wiklander 4003d3b0591SJens Wiklander /* 4013d3b0591SJens Wiklander * Initialize a restart context 4023d3b0591SJens Wiklander */ 4033d3b0591SJens Wiklander void mbedtls_ecp_restart_init( mbedtls_ecp_restart_ctx *ctx ) 4043d3b0591SJens Wiklander { 4053d3b0591SJens Wiklander ECP_VALIDATE( ctx != NULL ); 4063d3b0591SJens Wiklander ctx->ops_done = 0; 4073d3b0591SJens Wiklander ctx->depth = 0; 4083d3b0591SJens Wiklander ctx->rsm = NULL; 4093d3b0591SJens Wiklander ctx->ma = NULL; 4103d3b0591SJens Wiklander } 4113d3b0591SJens Wiklander 4123d3b0591SJens Wiklander /* 4133d3b0591SJens Wiklander * Free the components of a restart context 4143d3b0591SJens Wiklander */ 4153d3b0591SJens Wiklander void mbedtls_ecp_restart_free( mbedtls_ecp_restart_ctx *ctx ) 4163d3b0591SJens Wiklander { 4173d3b0591SJens Wiklander if( ctx == NULL ) 4183d3b0591SJens Wiklander return; 4193d3b0591SJens Wiklander 4203d3b0591SJens Wiklander ecp_restart_rsm_free( ctx->rsm ); 4213d3b0591SJens Wiklander mbedtls_free( ctx->rsm ); 4223d3b0591SJens Wiklander 4233d3b0591SJens Wiklander ecp_restart_ma_free( ctx->ma ); 4243d3b0591SJens Wiklander mbedtls_free( ctx->ma ); 4253d3b0591SJens Wiklander 4263d3b0591SJens Wiklander mbedtls_ecp_restart_init( ctx ); 4273d3b0591SJens Wiklander } 4283d3b0591SJens Wiklander 4293d3b0591SJens Wiklander /* 4303d3b0591SJens Wiklander * Check if we can do the next step 4313d3b0591SJens Wiklander */ 4323d3b0591SJens Wiklander int mbedtls_ecp_check_budget( const mbedtls_ecp_group *grp, 4333d3b0591SJens Wiklander mbedtls_ecp_restart_ctx *rs_ctx, 4343d3b0591SJens Wiklander unsigned ops ) 4353d3b0591SJens Wiklander { 4363d3b0591SJens Wiklander ECP_VALIDATE_RET( grp != NULL ); 4373d3b0591SJens Wiklander 4383d3b0591SJens Wiklander if( rs_ctx != NULL && ecp_max_ops != 0 ) 4393d3b0591SJens Wiklander { 4403d3b0591SJens Wiklander /* scale depending on curve size: the chosen reference is 256-bit, 4413d3b0591SJens Wiklander * and multiplication is quadratic. Round to the closest integer. */ 4423d3b0591SJens Wiklander if( grp->pbits >= 512 ) 4433d3b0591SJens Wiklander ops *= 4; 4443d3b0591SJens Wiklander else if( grp->pbits >= 384 ) 4453d3b0591SJens Wiklander ops *= 2; 4463d3b0591SJens Wiklander 4473d3b0591SJens Wiklander /* Avoid infinite loops: always allow first step. 4483d3b0591SJens Wiklander * Because of that, however, it's not generally true 4493d3b0591SJens Wiklander * that ops_done <= ecp_max_ops, so the check 4503d3b0591SJens Wiklander * ops_done > ecp_max_ops below is mandatory. */ 4513d3b0591SJens Wiklander if( ( rs_ctx->ops_done != 0 ) && 4523d3b0591SJens Wiklander ( rs_ctx->ops_done > ecp_max_ops || 4533d3b0591SJens Wiklander ops > ecp_max_ops - rs_ctx->ops_done ) ) 4543d3b0591SJens Wiklander { 4553d3b0591SJens Wiklander return( MBEDTLS_ERR_ECP_IN_PROGRESS ); 4563d3b0591SJens Wiklander } 4573d3b0591SJens Wiklander 4583d3b0591SJens Wiklander /* update running count */ 4593d3b0591SJens Wiklander rs_ctx->ops_done += ops; 4603d3b0591SJens Wiklander } 4613d3b0591SJens Wiklander 4623d3b0591SJens Wiklander return( 0 ); 4633d3b0591SJens Wiklander } 4643d3b0591SJens Wiklander 4653d3b0591SJens Wiklander /* Call this when entering a function that needs its own sub-context */ 4663d3b0591SJens Wiklander #define ECP_RS_ENTER( SUB ) do { \ 4673d3b0591SJens Wiklander /* reset ops count for this call if top-level */ \ 4683d3b0591SJens Wiklander if( rs_ctx != NULL && rs_ctx->depth++ == 0 ) \ 4693d3b0591SJens Wiklander rs_ctx->ops_done = 0; \ 4703d3b0591SJens Wiklander \ 4713d3b0591SJens Wiklander /* set up our own sub-context if needed */ \ 4723d3b0591SJens Wiklander if( mbedtls_ecp_restart_is_enabled() && \ 4733d3b0591SJens Wiklander rs_ctx != NULL && rs_ctx->SUB == NULL ) \ 4743d3b0591SJens Wiklander { \ 4753d3b0591SJens Wiklander rs_ctx->SUB = mbedtls_calloc( 1, sizeof( *rs_ctx->SUB ) ); \ 4763d3b0591SJens Wiklander if( rs_ctx->SUB == NULL ) \ 4773d3b0591SJens Wiklander return( MBEDTLS_ERR_ECP_ALLOC_FAILED ); \ 4783d3b0591SJens Wiklander \ 4793d3b0591SJens Wiklander ecp_restart_## SUB ##_init( rs_ctx->SUB ); \ 4803d3b0591SJens Wiklander } \ 4813d3b0591SJens Wiklander } while( 0 ) 4823d3b0591SJens Wiklander 4833d3b0591SJens Wiklander /* Call this when leaving a function that needs its own sub-context */ 4843d3b0591SJens Wiklander #define ECP_RS_LEAVE( SUB ) do { \ 4853d3b0591SJens Wiklander /* clear our sub-context when not in progress (done or error) */ \ 4863d3b0591SJens Wiklander if( rs_ctx != NULL && rs_ctx->SUB != NULL && \ 4873d3b0591SJens Wiklander ret != MBEDTLS_ERR_ECP_IN_PROGRESS ) \ 4883d3b0591SJens Wiklander { \ 4893d3b0591SJens Wiklander ecp_restart_## SUB ##_free( rs_ctx->SUB ); \ 4903d3b0591SJens Wiklander mbedtls_free( rs_ctx->SUB ); \ 4913d3b0591SJens Wiklander rs_ctx->SUB = NULL; \ 4923d3b0591SJens Wiklander } \ 4933d3b0591SJens Wiklander \ 4943d3b0591SJens Wiklander if( rs_ctx != NULL ) \ 4953d3b0591SJens Wiklander rs_ctx->depth--; \ 4963d3b0591SJens Wiklander } while( 0 ) 4973d3b0591SJens Wiklander 4983d3b0591SJens Wiklander #else /* MBEDTLS_ECP_RESTARTABLE */ 4993d3b0591SJens Wiklander 5003d3b0591SJens Wiklander #define ECP_RS_ENTER( sub ) (void) rs_ctx; 5013d3b0591SJens Wiklander #define ECP_RS_LEAVE( sub ) (void) rs_ctx; 5023d3b0591SJens Wiklander 5033d3b0591SJens Wiklander #endif /* MBEDTLS_ECP_RESTARTABLE */ 5043d3b0591SJens Wiklander 505817466cbSJens Wiklander /* 506817466cbSJens Wiklander * List of supported curves: 507817466cbSJens Wiklander * - internal ID 50811fa71b9SJerome Forissier * - TLS NamedCurve ID (RFC 4492 sec. 5.1.1, RFC 7071 sec. 2, RFC 8446 sec. 4.2.7) 509817466cbSJens Wiklander * - size in bits 510817466cbSJens Wiklander * - readable name 511817466cbSJens Wiklander * 512817466cbSJens Wiklander * Curves are listed in order: largest curves first, and for a given size, 513817466cbSJens Wiklander * fastest curves first. This provides the default order for the SSL module. 514817466cbSJens Wiklander * 515817466cbSJens Wiklander * Reminder: update profiles in x509_crt.c when adding a new curves! 516817466cbSJens Wiklander */ 517817466cbSJens Wiklander static const mbedtls_ecp_curve_info ecp_supported_curves[] = 518817466cbSJens Wiklander { 519817466cbSJens Wiklander #if defined(MBEDTLS_ECP_DP_SECP521R1_ENABLED) 520817466cbSJens Wiklander { MBEDTLS_ECP_DP_SECP521R1, 25, 521, "secp521r1" }, 521817466cbSJens Wiklander #endif 522817466cbSJens Wiklander #if defined(MBEDTLS_ECP_DP_BP512R1_ENABLED) 523817466cbSJens Wiklander { MBEDTLS_ECP_DP_BP512R1, 28, 512, "brainpoolP512r1" }, 524817466cbSJens Wiklander #endif 525817466cbSJens Wiklander #if defined(MBEDTLS_ECP_DP_SECP384R1_ENABLED) 526817466cbSJens Wiklander { MBEDTLS_ECP_DP_SECP384R1, 24, 384, "secp384r1" }, 527817466cbSJens Wiklander #endif 528817466cbSJens Wiklander #if defined(MBEDTLS_ECP_DP_BP384R1_ENABLED) 529817466cbSJens Wiklander { MBEDTLS_ECP_DP_BP384R1, 27, 384, "brainpoolP384r1" }, 530817466cbSJens Wiklander #endif 531817466cbSJens Wiklander #if defined(MBEDTLS_ECP_DP_SECP256R1_ENABLED) 532817466cbSJens Wiklander { MBEDTLS_ECP_DP_SECP256R1, 23, 256, "secp256r1" }, 533817466cbSJens Wiklander #endif 534817466cbSJens Wiklander #if defined(MBEDTLS_ECP_DP_SECP256K1_ENABLED) 535817466cbSJens Wiklander { MBEDTLS_ECP_DP_SECP256K1, 22, 256, "secp256k1" }, 536817466cbSJens Wiklander #endif 537817466cbSJens Wiklander #if defined(MBEDTLS_ECP_DP_BP256R1_ENABLED) 538817466cbSJens Wiklander { MBEDTLS_ECP_DP_BP256R1, 26, 256, "brainpoolP256r1" }, 539817466cbSJens Wiklander #endif 540817466cbSJens Wiklander #if defined(MBEDTLS_ECP_DP_SECP224R1_ENABLED) 541817466cbSJens Wiklander { MBEDTLS_ECP_DP_SECP224R1, 21, 224, "secp224r1" }, 542817466cbSJens Wiklander #endif 543817466cbSJens Wiklander #if defined(MBEDTLS_ECP_DP_SECP224K1_ENABLED) 544817466cbSJens Wiklander { MBEDTLS_ECP_DP_SECP224K1, 20, 224, "secp224k1" }, 545817466cbSJens Wiklander #endif 546817466cbSJens Wiklander #if defined(MBEDTLS_ECP_DP_SECP192R1_ENABLED) 547817466cbSJens Wiklander { MBEDTLS_ECP_DP_SECP192R1, 19, 192, "secp192r1" }, 548817466cbSJens Wiklander #endif 549817466cbSJens Wiklander #if defined(MBEDTLS_ECP_DP_SECP192K1_ENABLED) 550817466cbSJens Wiklander { MBEDTLS_ECP_DP_SECP192K1, 18, 192, "secp192k1" }, 551817466cbSJens Wiklander #endif 5527901324dSJerome Forissier #if defined(MBEDTLS_ECP_DP_CURVE25519_ENABLED) 55311fa71b9SJerome Forissier { MBEDTLS_ECP_DP_CURVE25519, 29, 256, "x25519" }, 55411fa71b9SJerome Forissier #endif 5557901324dSJerome Forissier #if defined(MBEDTLS_ECP_DP_CURVE448_ENABLED) 5567901324dSJerome Forissier { MBEDTLS_ECP_DP_CURVE448, 30, 448, "x448" }, 5577901324dSJerome Forissier #endif 5589fc2442cSJerome Forissier #if defined(MBEDTLS_ECP_DP_SM2_ENABLED) 5599fc2442cSJerome Forissier /* https://tools.ietf.org/id/draft-yang-tls-tls13-sm-suites-05.html */ 5609fc2442cSJerome Forissier { MBEDTLS_ECP_DP_SM2, 41, 256, "sm2" }, 5619fc2442cSJerome Forissier #endif 562817466cbSJens Wiklander { MBEDTLS_ECP_DP_NONE, 0, 0, NULL }, 563817466cbSJens Wiklander }; 564817466cbSJens Wiklander 565817466cbSJens Wiklander #define ECP_NB_CURVES sizeof( ecp_supported_curves ) / \ 566817466cbSJens Wiklander sizeof( ecp_supported_curves[0] ) 567817466cbSJens Wiklander 568817466cbSJens Wiklander static mbedtls_ecp_group_id ecp_supported_grp_id[ECP_NB_CURVES]; 569817466cbSJens Wiklander 570817466cbSJens Wiklander /* 571817466cbSJens Wiklander * List of supported curves and associated info 572817466cbSJens Wiklander */ 573817466cbSJens Wiklander const mbedtls_ecp_curve_info *mbedtls_ecp_curve_list( void ) 574817466cbSJens Wiklander { 575817466cbSJens Wiklander return( ecp_supported_curves ); 576817466cbSJens Wiklander } 577817466cbSJens Wiklander 578817466cbSJens Wiklander /* 579817466cbSJens Wiklander * List of supported curves, group ID only 580817466cbSJens Wiklander */ 581817466cbSJens Wiklander const mbedtls_ecp_group_id *mbedtls_ecp_grp_id_list( void ) 582817466cbSJens Wiklander { 583817466cbSJens Wiklander static int init_done = 0; 584817466cbSJens Wiklander 585817466cbSJens Wiklander if( ! init_done ) 586817466cbSJens Wiklander { 587817466cbSJens Wiklander size_t i = 0; 588817466cbSJens Wiklander const mbedtls_ecp_curve_info *curve_info; 589817466cbSJens Wiklander 590817466cbSJens Wiklander for( curve_info = mbedtls_ecp_curve_list(); 591817466cbSJens Wiklander curve_info->grp_id != MBEDTLS_ECP_DP_NONE; 592817466cbSJens Wiklander curve_info++ ) 593817466cbSJens Wiklander { 594817466cbSJens Wiklander ecp_supported_grp_id[i++] = curve_info->grp_id; 595817466cbSJens Wiklander } 596817466cbSJens Wiklander ecp_supported_grp_id[i] = MBEDTLS_ECP_DP_NONE; 597817466cbSJens Wiklander 598817466cbSJens Wiklander init_done = 1; 599817466cbSJens Wiklander } 600817466cbSJens Wiklander 601817466cbSJens Wiklander return( ecp_supported_grp_id ); 602817466cbSJens Wiklander } 603817466cbSJens Wiklander 604817466cbSJens Wiklander /* 605817466cbSJens Wiklander * Get the curve info for the internal identifier 606817466cbSJens Wiklander */ 607817466cbSJens Wiklander const mbedtls_ecp_curve_info *mbedtls_ecp_curve_info_from_grp_id( mbedtls_ecp_group_id grp_id ) 608817466cbSJens Wiklander { 609817466cbSJens Wiklander const mbedtls_ecp_curve_info *curve_info; 610817466cbSJens Wiklander 611817466cbSJens Wiklander for( curve_info = mbedtls_ecp_curve_list(); 612817466cbSJens Wiklander curve_info->grp_id != MBEDTLS_ECP_DP_NONE; 613817466cbSJens Wiklander curve_info++ ) 614817466cbSJens Wiklander { 615817466cbSJens Wiklander if( curve_info->grp_id == grp_id ) 616817466cbSJens Wiklander return( curve_info ); 617817466cbSJens Wiklander } 618817466cbSJens Wiklander 619817466cbSJens Wiklander return( NULL ); 620817466cbSJens Wiklander } 621817466cbSJens Wiklander 622817466cbSJens Wiklander /* 623817466cbSJens Wiklander * Get the curve info from the TLS identifier 624817466cbSJens Wiklander */ 625817466cbSJens Wiklander const mbedtls_ecp_curve_info *mbedtls_ecp_curve_info_from_tls_id( uint16_t tls_id ) 626817466cbSJens Wiklander { 627817466cbSJens Wiklander const mbedtls_ecp_curve_info *curve_info; 628817466cbSJens Wiklander 629817466cbSJens Wiklander for( curve_info = mbedtls_ecp_curve_list(); 630817466cbSJens Wiklander curve_info->grp_id != MBEDTLS_ECP_DP_NONE; 631817466cbSJens Wiklander curve_info++ ) 632817466cbSJens Wiklander { 633817466cbSJens Wiklander if( curve_info->tls_id == tls_id ) 634817466cbSJens Wiklander return( curve_info ); 635817466cbSJens Wiklander } 636817466cbSJens Wiklander 637817466cbSJens Wiklander return( NULL ); 638817466cbSJens Wiklander } 639817466cbSJens Wiklander 640817466cbSJens Wiklander /* 641817466cbSJens Wiklander * Get the curve info from the name 642817466cbSJens Wiklander */ 643817466cbSJens Wiklander const mbedtls_ecp_curve_info *mbedtls_ecp_curve_info_from_name( const char *name ) 644817466cbSJens Wiklander { 645817466cbSJens Wiklander const mbedtls_ecp_curve_info *curve_info; 646817466cbSJens Wiklander 6473d3b0591SJens Wiklander if( name == NULL ) 6483d3b0591SJens Wiklander return( NULL ); 6493d3b0591SJens Wiklander 650817466cbSJens Wiklander for( curve_info = mbedtls_ecp_curve_list(); 651817466cbSJens Wiklander curve_info->grp_id != MBEDTLS_ECP_DP_NONE; 652817466cbSJens Wiklander curve_info++ ) 653817466cbSJens Wiklander { 654817466cbSJens Wiklander if( strcmp( curve_info->name, name ) == 0 ) 655817466cbSJens Wiklander return( curve_info ); 656817466cbSJens Wiklander } 657817466cbSJens Wiklander 658817466cbSJens Wiklander return( NULL ); 659817466cbSJens Wiklander } 660817466cbSJens Wiklander 661817466cbSJens Wiklander /* 662817466cbSJens Wiklander * Get the type of a curve 663817466cbSJens Wiklander */ 66411fa71b9SJerome Forissier mbedtls_ecp_curve_type mbedtls_ecp_get_type( const mbedtls_ecp_group *grp ) 665817466cbSJens Wiklander { 666817466cbSJens Wiklander if( grp->G.X.p == NULL ) 66711fa71b9SJerome Forissier return( MBEDTLS_ECP_TYPE_NONE ); 668817466cbSJens Wiklander 669817466cbSJens Wiklander if( grp->G.Y.p == NULL ) 67011fa71b9SJerome Forissier return( MBEDTLS_ECP_TYPE_MONTGOMERY ); 671817466cbSJens Wiklander else 67211fa71b9SJerome Forissier return( MBEDTLS_ECP_TYPE_SHORT_WEIERSTRASS ); 673817466cbSJens Wiklander } 674817466cbSJens Wiklander 675817466cbSJens Wiklander /* 676817466cbSJens Wiklander * Initialize (the components of) a point 677817466cbSJens Wiklander */ 678817466cbSJens Wiklander void mbedtls_ecp_point_init( mbedtls_ecp_point *pt ) 679817466cbSJens Wiklander { 6803d3b0591SJens Wiklander ECP_VALIDATE( pt != NULL ); 681817466cbSJens Wiklander 682817466cbSJens Wiklander mbedtls_mpi_init( &pt->X ); 683817466cbSJens Wiklander mbedtls_mpi_init( &pt->Y ); 684817466cbSJens Wiklander mbedtls_mpi_init( &pt->Z ); 685817466cbSJens Wiklander } 686817466cbSJens Wiklander 687817466cbSJens Wiklander /* 688817466cbSJens Wiklander * Initialize (the components of) a group 689817466cbSJens Wiklander */ 690817466cbSJens Wiklander void mbedtls_ecp_group_init( mbedtls_ecp_group *grp ) 691817466cbSJens Wiklander { 6923d3b0591SJens Wiklander ECP_VALIDATE( grp != NULL ); 693817466cbSJens Wiklander 6943d3b0591SJens Wiklander grp->id = MBEDTLS_ECP_DP_NONE; 6953d3b0591SJens Wiklander mbedtls_mpi_init( &grp->P ); 6963d3b0591SJens Wiklander mbedtls_mpi_init( &grp->A ); 6973d3b0591SJens Wiklander mbedtls_mpi_init( &grp->B ); 6983d3b0591SJens Wiklander mbedtls_ecp_point_init( &grp->G ); 6993d3b0591SJens Wiklander mbedtls_mpi_init( &grp->N ); 7003d3b0591SJens Wiklander grp->pbits = 0; 7013d3b0591SJens Wiklander grp->nbits = 0; 7023d3b0591SJens Wiklander grp->h = 0; 7033d3b0591SJens Wiklander grp->modp = NULL; 7043d3b0591SJens Wiklander grp->t_pre = NULL; 7053d3b0591SJens Wiklander grp->t_post = NULL; 7063d3b0591SJens Wiklander grp->t_data = NULL; 7073d3b0591SJens Wiklander grp->T = NULL; 7083d3b0591SJens Wiklander grp->T_size = 0; 709817466cbSJens Wiklander } 710817466cbSJens Wiklander 711817466cbSJens Wiklander /* 712817466cbSJens Wiklander * Initialize (the components of) a key pair 713817466cbSJens Wiklander */ 714817466cbSJens Wiklander void mbedtls_ecp_keypair_init( mbedtls_ecp_keypair *key ) 715817466cbSJens Wiklander { 7163d3b0591SJens Wiklander ECP_VALIDATE( key != NULL ); 717817466cbSJens Wiklander 718817466cbSJens Wiklander mbedtls_ecp_group_init( &key->grp ); 719817466cbSJens Wiklander mbedtls_mpi_init( &key->d ); 720817466cbSJens Wiklander mbedtls_ecp_point_init( &key->Q ); 721817466cbSJens Wiklander } 722817466cbSJens Wiklander 723817466cbSJens Wiklander /* 724817466cbSJens Wiklander * Unallocate (the components of) a point 725817466cbSJens Wiklander */ 726817466cbSJens Wiklander void mbedtls_ecp_point_free( mbedtls_ecp_point *pt ) 727817466cbSJens Wiklander { 728817466cbSJens Wiklander if( pt == NULL ) 729817466cbSJens Wiklander return; 730817466cbSJens Wiklander 731817466cbSJens Wiklander mbedtls_mpi_free( &( pt->X ) ); 732817466cbSJens Wiklander mbedtls_mpi_free( &( pt->Y ) ); 733817466cbSJens Wiklander mbedtls_mpi_free( &( pt->Z ) ); 734817466cbSJens Wiklander } 735817466cbSJens Wiklander 736817466cbSJens Wiklander /* 737817466cbSJens Wiklander * Unallocate (the components of) a group 738817466cbSJens Wiklander */ 739817466cbSJens Wiklander void mbedtls_ecp_group_free( mbedtls_ecp_group *grp ) 740817466cbSJens Wiklander { 741817466cbSJens Wiklander size_t i; 742817466cbSJens Wiklander 743817466cbSJens Wiklander if( grp == NULL ) 744817466cbSJens Wiklander return; 745817466cbSJens Wiklander 746817466cbSJens Wiklander if( grp->h != 1 ) 747817466cbSJens Wiklander { 748817466cbSJens Wiklander mbedtls_mpi_free( &grp->P ); 749817466cbSJens Wiklander mbedtls_mpi_free( &grp->A ); 750817466cbSJens Wiklander mbedtls_mpi_free( &grp->B ); 751817466cbSJens Wiklander mbedtls_ecp_point_free( &grp->G ); 752817466cbSJens Wiklander mbedtls_mpi_free( &grp->N ); 753817466cbSJens Wiklander } 754817466cbSJens Wiklander 755817466cbSJens Wiklander if( grp->T != NULL ) 756817466cbSJens Wiklander { 757817466cbSJens Wiklander for( i = 0; i < grp->T_size; i++ ) 758817466cbSJens Wiklander mbedtls_ecp_point_free( &grp->T[i] ); 759817466cbSJens Wiklander mbedtls_free( grp->T ); 760817466cbSJens Wiklander } 761817466cbSJens Wiklander 7623d3b0591SJens Wiklander mbedtls_platform_zeroize( grp, sizeof( mbedtls_ecp_group ) ); 763817466cbSJens Wiklander } 764817466cbSJens Wiklander 765817466cbSJens Wiklander /* 766817466cbSJens Wiklander * Unallocate (the components of) a key pair 767817466cbSJens Wiklander */ 768817466cbSJens Wiklander void mbedtls_ecp_keypair_free( mbedtls_ecp_keypair *key ) 769817466cbSJens Wiklander { 770817466cbSJens Wiklander if( key == NULL ) 771817466cbSJens Wiklander return; 772817466cbSJens Wiklander 773817466cbSJens Wiklander mbedtls_ecp_group_free( &key->grp ); 774817466cbSJens Wiklander mbedtls_mpi_free( &key->d ); 775817466cbSJens Wiklander mbedtls_ecp_point_free( &key->Q ); 776817466cbSJens Wiklander } 777817466cbSJens Wiklander 778817466cbSJens Wiklander /* 779817466cbSJens Wiklander * Copy the contents of a point 780817466cbSJens Wiklander */ 781817466cbSJens Wiklander int mbedtls_ecp_copy( mbedtls_ecp_point *P, const mbedtls_ecp_point *Q ) 782817466cbSJens Wiklander { 78311fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 7843d3b0591SJens Wiklander ECP_VALIDATE_RET( P != NULL ); 7853d3b0591SJens Wiklander ECP_VALIDATE_RET( Q != NULL ); 786817466cbSJens Wiklander 787817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_copy( &P->X, &Q->X ) ); 788817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_copy( &P->Y, &Q->Y ) ); 789817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_copy( &P->Z, &Q->Z ) ); 790817466cbSJens Wiklander 791817466cbSJens Wiklander cleanup: 792817466cbSJens Wiklander return( ret ); 793817466cbSJens Wiklander } 794817466cbSJens Wiklander 795817466cbSJens Wiklander /* 796817466cbSJens Wiklander * Copy the contents of a group object 797817466cbSJens Wiklander */ 798817466cbSJens Wiklander int mbedtls_ecp_group_copy( mbedtls_ecp_group *dst, const mbedtls_ecp_group *src ) 799817466cbSJens Wiklander { 8003d3b0591SJens Wiklander ECP_VALIDATE_RET( dst != NULL ); 8013d3b0591SJens Wiklander ECP_VALIDATE_RET( src != NULL ); 8023d3b0591SJens Wiklander 8033d3b0591SJens Wiklander return( mbedtls_ecp_group_load( dst, src->id ) ); 804817466cbSJens Wiklander } 805817466cbSJens Wiklander 806817466cbSJens Wiklander /* 807817466cbSJens Wiklander * Set point to zero 808817466cbSJens Wiklander */ 809817466cbSJens Wiklander int mbedtls_ecp_set_zero( mbedtls_ecp_point *pt ) 810817466cbSJens Wiklander { 81111fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 8123d3b0591SJens Wiklander ECP_VALIDATE_RET( pt != NULL ); 813817466cbSJens Wiklander 814817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_lset( &pt->X , 1 ) ); 815817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_lset( &pt->Y , 1 ) ); 816817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_lset( &pt->Z , 0 ) ); 817817466cbSJens Wiklander 818817466cbSJens Wiklander cleanup: 819817466cbSJens Wiklander return( ret ); 820817466cbSJens Wiklander } 821817466cbSJens Wiklander 822817466cbSJens Wiklander /* 823817466cbSJens Wiklander * Tell if a point is zero 824817466cbSJens Wiklander */ 825817466cbSJens Wiklander int mbedtls_ecp_is_zero( mbedtls_ecp_point *pt ) 826817466cbSJens Wiklander { 8273d3b0591SJens Wiklander ECP_VALIDATE_RET( pt != NULL ); 8283d3b0591SJens Wiklander 829817466cbSJens Wiklander return( mbedtls_mpi_cmp_int( &pt->Z, 0 ) == 0 ); 830817466cbSJens Wiklander } 831817466cbSJens Wiklander 832817466cbSJens Wiklander /* 8333d3b0591SJens Wiklander * Compare two points lazily 834817466cbSJens Wiklander */ 835817466cbSJens Wiklander int mbedtls_ecp_point_cmp( const mbedtls_ecp_point *P, 836817466cbSJens Wiklander const mbedtls_ecp_point *Q ) 837817466cbSJens Wiklander { 8383d3b0591SJens Wiklander ECP_VALIDATE_RET( P != NULL ); 8393d3b0591SJens Wiklander ECP_VALIDATE_RET( Q != NULL ); 8403d3b0591SJens Wiklander 841817466cbSJens Wiklander if( mbedtls_mpi_cmp_mpi( &P->X, &Q->X ) == 0 && 842817466cbSJens Wiklander mbedtls_mpi_cmp_mpi( &P->Y, &Q->Y ) == 0 && 843817466cbSJens Wiklander mbedtls_mpi_cmp_mpi( &P->Z, &Q->Z ) == 0 ) 844817466cbSJens Wiklander { 845817466cbSJens Wiklander return( 0 ); 846817466cbSJens Wiklander } 847817466cbSJens Wiklander 848817466cbSJens Wiklander return( MBEDTLS_ERR_ECP_BAD_INPUT_DATA ); 849817466cbSJens Wiklander } 850817466cbSJens Wiklander 851817466cbSJens Wiklander /* 852817466cbSJens Wiklander * Import a non-zero point from ASCII strings 853817466cbSJens Wiklander */ 854817466cbSJens Wiklander int mbedtls_ecp_point_read_string( mbedtls_ecp_point *P, int radix, 855817466cbSJens Wiklander const char *x, const char *y ) 856817466cbSJens Wiklander { 85711fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 8583d3b0591SJens Wiklander ECP_VALIDATE_RET( P != NULL ); 8593d3b0591SJens Wiklander ECP_VALIDATE_RET( x != NULL ); 8603d3b0591SJens Wiklander ECP_VALIDATE_RET( y != NULL ); 861817466cbSJens Wiklander 862817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_read_string( &P->X, radix, x ) ); 863817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_read_string( &P->Y, radix, y ) ); 864817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_lset( &P->Z, 1 ) ); 865817466cbSJens Wiklander 866817466cbSJens Wiklander cleanup: 867817466cbSJens Wiklander return( ret ); 868817466cbSJens Wiklander } 869817466cbSJens Wiklander 870817466cbSJens Wiklander /* 87111fa71b9SJerome Forissier * Export a point into unsigned binary data (SEC1 2.3.3 and RFC7748) 872817466cbSJens Wiklander */ 8733d3b0591SJens Wiklander int mbedtls_ecp_point_write_binary( const mbedtls_ecp_group *grp, 8743d3b0591SJens Wiklander const mbedtls_ecp_point *P, 875817466cbSJens Wiklander int format, size_t *olen, 876817466cbSJens Wiklander unsigned char *buf, size_t buflen ) 877817466cbSJens Wiklander { 87811fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ECP_FEATURE_UNAVAILABLE; 879817466cbSJens Wiklander size_t plen; 8803d3b0591SJens Wiklander ECP_VALIDATE_RET( grp != NULL ); 8813d3b0591SJens Wiklander ECP_VALIDATE_RET( P != NULL ); 8823d3b0591SJens Wiklander ECP_VALIDATE_RET( olen != NULL ); 8833d3b0591SJens Wiklander ECP_VALIDATE_RET( buf != NULL ); 8843d3b0591SJens Wiklander ECP_VALIDATE_RET( format == MBEDTLS_ECP_PF_UNCOMPRESSED || 8853d3b0591SJens Wiklander format == MBEDTLS_ECP_PF_COMPRESSED ); 886817466cbSJens Wiklander 88711fa71b9SJerome Forissier plen = mbedtls_mpi_size( &grp->P ); 88811fa71b9SJerome Forissier 8897901324dSJerome Forissier #if defined(MBEDTLS_ECP_MONTGOMERY_ENABLED) 8907901324dSJerome Forissier (void) format; /* Montgomery curves always use the same point format */ 89111fa71b9SJerome Forissier if( mbedtls_ecp_get_type( grp ) == MBEDTLS_ECP_TYPE_MONTGOMERY ) 89211fa71b9SJerome Forissier { 89311fa71b9SJerome Forissier *olen = plen; 89411fa71b9SJerome Forissier if( buflen < *olen ) 89511fa71b9SJerome Forissier return( MBEDTLS_ERR_ECP_BUFFER_TOO_SMALL ); 89611fa71b9SJerome Forissier 89711fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_write_binary_le( &P->X, buf, plen ) ); 89811fa71b9SJerome Forissier } 89911fa71b9SJerome Forissier #endif 9007901324dSJerome Forissier #if defined(MBEDTLS_ECP_SHORT_WEIERSTRASS_ENABLED) 90111fa71b9SJerome Forissier if( mbedtls_ecp_get_type( grp ) == MBEDTLS_ECP_TYPE_SHORT_WEIERSTRASS ) 90211fa71b9SJerome Forissier { 903817466cbSJens Wiklander /* 904817466cbSJens Wiklander * Common case: P == 0 905817466cbSJens Wiklander */ 906817466cbSJens Wiklander if( mbedtls_mpi_cmp_int( &P->Z, 0 ) == 0 ) 907817466cbSJens Wiklander { 908817466cbSJens Wiklander if( buflen < 1 ) 909817466cbSJens Wiklander return( MBEDTLS_ERR_ECP_BUFFER_TOO_SMALL ); 910817466cbSJens Wiklander 911817466cbSJens Wiklander buf[0] = 0x00; 912817466cbSJens Wiklander *olen = 1; 913817466cbSJens Wiklander 914817466cbSJens Wiklander return( 0 ); 915817466cbSJens Wiklander } 916817466cbSJens Wiklander 917817466cbSJens Wiklander if( format == MBEDTLS_ECP_PF_UNCOMPRESSED ) 918817466cbSJens Wiklander { 919817466cbSJens Wiklander *olen = 2 * plen + 1; 920817466cbSJens Wiklander 921817466cbSJens Wiklander if( buflen < *olen ) 922817466cbSJens Wiklander return( MBEDTLS_ERR_ECP_BUFFER_TOO_SMALL ); 923817466cbSJens Wiklander 924817466cbSJens Wiklander buf[0] = 0x04; 925817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_write_binary( &P->X, buf + 1, plen ) ); 926817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_write_binary( &P->Y, buf + 1 + plen, plen ) ); 927817466cbSJens Wiklander } 928817466cbSJens Wiklander else if( format == MBEDTLS_ECP_PF_COMPRESSED ) 929817466cbSJens Wiklander { 930817466cbSJens Wiklander *olen = plen + 1; 931817466cbSJens Wiklander 932817466cbSJens Wiklander if( buflen < *olen ) 933817466cbSJens Wiklander return( MBEDTLS_ERR_ECP_BUFFER_TOO_SMALL ); 934817466cbSJens Wiklander 935817466cbSJens Wiklander buf[0] = 0x02 + mbedtls_mpi_get_bit( &P->Y, 0 ); 936817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_write_binary( &P->X, buf + 1, plen ) ); 937817466cbSJens Wiklander } 93811fa71b9SJerome Forissier } 93911fa71b9SJerome Forissier #endif 940817466cbSJens Wiklander 941817466cbSJens Wiklander cleanup: 942817466cbSJens Wiklander return( ret ); 943817466cbSJens Wiklander } 944817466cbSJens Wiklander 945817466cbSJens Wiklander /* 94611fa71b9SJerome Forissier * Import a point from unsigned binary data (SEC1 2.3.4 and RFC7748) 947817466cbSJens Wiklander */ 9483d3b0591SJens Wiklander int mbedtls_ecp_point_read_binary( const mbedtls_ecp_group *grp, 9493d3b0591SJens Wiklander mbedtls_ecp_point *pt, 950817466cbSJens Wiklander const unsigned char *buf, size_t ilen ) 951817466cbSJens Wiklander { 95211fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ECP_FEATURE_UNAVAILABLE; 953817466cbSJens Wiklander size_t plen; 9543d3b0591SJens Wiklander ECP_VALIDATE_RET( grp != NULL ); 9553d3b0591SJens Wiklander ECP_VALIDATE_RET( pt != NULL ); 9563d3b0591SJens Wiklander ECP_VALIDATE_RET( buf != NULL ); 957817466cbSJens Wiklander 958817466cbSJens Wiklander if( ilen < 1 ) 959817466cbSJens Wiklander return( MBEDTLS_ERR_ECP_BAD_INPUT_DATA ); 960817466cbSJens Wiklander 96111fa71b9SJerome Forissier plen = mbedtls_mpi_size( &grp->P ); 96211fa71b9SJerome Forissier 9637901324dSJerome Forissier #if defined(MBEDTLS_ECP_MONTGOMERY_ENABLED) 96411fa71b9SJerome Forissier if( mbedtls_ecp_get_type( grp ) == MBEDTLS_ECP_TYPE_MONTGOMERY ) 96511fa71b9SJerome Forissier { 96611fa71b9SJerome Forissier if( plen != ilen ) 96711fa71b9SJerome Forissier return( MBEDTLS_ERR_ECP_BAD_INPUT_DATA ); 96811fa71b9SJerome Forissier 96911fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_read_binary_le( &pt->X, buf, plen ) ); 97011fa71b9SJerome Forissier mbedtls_mpi_free( &pt->Y ); 97111fa71b9SJerome Forissier 97211fa71b9SJerome Forissier if( grp->id == MBEDTLS_ECP_DP_CURVE25519 ) 97311fa71b9SJerome Forissier /* Set most significant bit to 0 as prescribed in RFC7748 §5 */ 97411fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_set_bit( &pt->X, plen * 8 - 1, 0 ) ); 97511fa71b9SJerome Forissier 97611fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_lset( &pt->Z, 1 ) ); 97711fa71b9SJerome Forissier } 97811fa71b9SJerome Forissier #endif 9797901324dSJerome Forissier #if defined(MBEDTLS_ECP_SHORT_WEIERSTRASS_ENABLED) 98011fa71b9SJerome Forissier if( mbedtls_ecp_get_type( grp ) == MBEDTLS_ECP_TYPE_SHORT_WEIERSTRASS ) 98111fa71b9SJerome Forissier { 982817466cbSJens Wiklander if( buf[0] == 0x00 ) 983817466cbSJens Wiklander { 984817466cbSJens Wiklander if( ilen == 1 ) 985817466cbSJens Wiklander return( mbedtls_ecp_set_zero( pt ) ); 986817466cbSJens Wiklander else 987817466cbSJens Wiklander return( MBEDTLS_ERR_ECP_BAD_INPUT_DATA ); 988817466cbSJens Wiklander } 989817466cbSJens Wiklander 990817466cbSJens Wiklander if( buf[0] != 0x04 ) 991817466cbSJens Wiklander return( MBEDTLS_ERR_ECP_FEATURE_UNAVAILABLE ); 992817466cbSJens Wiklander 993817466cbSJens Wiklander if( ilen != 2 * plen + 1 ) 994817466cbSJens Wiklander return( MBEDTLS_ERR_ECP_BAD_INPUT_DATA ); 995817466cbSJens Wiklander 996817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_read_binary( &pt->X, buf + 1, plen ) ); 99711fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_read_binary( &pt->Y, 99811fa71b9SJerome Forissier buf + 1 + plen, plen ) ); 999817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_lset( &pt->Z, 1 ) ); 100011fa71b9SJerome Forissier } 100111fa71b9SJerome Forissier #endif 1002817466cbSJens Wiklander 1003817466cbSJens Wiklander cleanup: 1004817466cbSJens Wiklander return( ret ); 1005817466cbSJens Wiklander } 1006817466cbSJens Wiklander 1007817466cbSJens Wiklander /* 1008817466cbSJens Wiklander * Import a point from a TLS ECPoint record (RFC 4492) 1009817466cbSJens Wiklander * struct { 1010817466cbSJens Wiklander * opaque point <1..2^8-1>; 1011817466cbSJens Wiklander * } ECPoint; 1012817466cbSJens Wiklander */ 10133d3b0591SJens Wiklander int mbedtls_ecp_tls_read_point( const mbedtls_ecp_group *grp, 10143d3b0591SJens Wiklander mbedtls_ecp_point *pt, 1015817466cbSJens Wiklander const unsigned char **buf, size_t buf_len ) 1016817466cbSJens Wiklander { 1017817466cbSJens Wiklander unsigned char data_len; 1018817466cbSJens Wiklander const unsigned char *buf_start; 10193d3b0591SJens Wiklander ECP_VALIDATE_RET( grp != NULL ); 10203d3b0591SJens Wiklander ECP_VALIDATE_RET( pt != NULL ); 10213d3b0591SJens Wiklander ECP_VALIDATE_RET( buf != NULL ); 10223d3b0591SJens Wiklander ECP_VALIDATE_RET( *buf != NULL ); 1023817466cbSJens Wiklander 1024817466cbSJens Wiklander /* 1025817466cbSJens Wiklander * We must have at least two bytes (1 for length, at least one for data) 1026817466cbSJens Wiklander */ 1027817466cbSJens Wiklander if( buf_len < 2 ) 1028817466cbSJens Wiklander return( MBEDTLS_ERR_ECP_BAD_INPUT_DATA ); 1029817466cbSJens Wiklander 1030817466cbSJens Wiklander data_len = *(*buf)++; 1031817466cbSJens Wiklander if( data_len < 1 || data_len > buf_len - 1 ) 1032817466cbSJens Wiklander return( MBEDTLS_ERR_ECP_BAD_INPUT_DATA ); 1033817466cbSJens Wiklander 1034817466cbSJens Wiklander /* 1035817466cbSJens Wiklander * Save buffer start for read_binary and update buf 1036817466cbSJens Wiklander */ 1037817466cbSJens Wiklander buf_start = *buf; 1038817466cbSJens Wiklander *buf += data_len; 1039817466cbSJens Wiklander 10403d3b0591SJens Wiklander return( mbedtls_ecp_point_read_binary( grp, pt, buf_start, data_len ) ); 1041817466cbSJens Wiklander } 1042817466cbSJens Wiklander 1043817466cbSJens Wiklander /* 1044817466cbSJens Wiklander * Export a point as a TLS ECPoint record (RFC 4492) 1045817466cbSJens Wiklander * struct { 1046817466cbSJens Wiklander * opaque point <1..2^8-1>; 1047817466cbSJens Wiklander * } ECPoint; 1048817466cbSJens Wiklander */ 1049817466cbSJens Wiklander int mbedtls_ecp_tls_write_point( const mbedtls_ecp_group *grp, const mbedtls_ecp_point *pt, 1050817466cbSJens Wiklander int format, size_t *olen, 1051817466cbSJens Wiklander unsigned char *buf, size_t blen ) 1052817466cbSJens Wiklander { 105311fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 10543d3b0591SJens Wiklander ECP_VALIDATE_RET( grp != NULL ); 10553d3b0591SJens Wiklander ECP_VALIDATE_RET( pt != NULL ); 10563d3b0591SJens Wiklander ECP_VALIDATE_RET( olen != NULL ); 10573d3b0591SJens Wiklander ECP_VALIDATE_RET( buf != NULL ); 10583d3b0591SJens Wiklander ECP_VALIDATE_RET( format == MBEDTLS_ECP_PF_UNCOMPRESSED || 10593d3b0591SJens Wiklander format == MBEDTLS_ECP_PF_COMPRESSED ); 1060817466cbSJens Wiklander 1061817466cbSJens Wiklander /* 1062817466cbSJens Wiklander * buffer length must be at least one, for our length byte 1063817466cbSJens Wiklander */ 1064817466cbSJens Wiklander if( blen < 1 ) 1065817466cbSJens Wiklander return( MBEDTLS_ERR_ECP_BAD_INPUT_DATA ); 1066817466cbSJens Wiklander 1067817466cbSJens Wiklander if( ( ret = mbedtls_ecp_point_write_binary( grp, pt, format, 1068817466cbSJens Wiklander olen, buf + 1, blen - 1) ) != 0 ) 1069817466cbSJens Wiklander return( ret ); 1070817466cbSJens Wiklander 1071817466cbSJens Wiklander /* 1072817466cbSJens Wiklander * write length to the first byte and update total length 1073817466cbSJens Wiklander */ 1074817466cbSJens Wiklander buf[0] = (unsigned char) *olen; 1075817466cbSJens Wiklander ++*olen; 1076817466cbSJens Wiklander 1077817466cbSJens Wiklander return( 0 ); 1078817466cbSJens Wiklander } 1079817466cbSJens Wiklander 1080817466cbSJens Wiklander /* 1081817466cbSJens Wiklander * Set a group from an ECParameters record (RFC 4492) 1082817466cbSJens Wiklander */ 10833d3b0591SJens Wiklander int mbedtls_ecp_tls_read_group( mbedtls_ecp_group *grp, 10843d3b0591SJens Wiklander const unsigned char **buf, size_t len ) 10853d3b0591SJens Wiklander { 108611fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 10873d3b0591SJens Wiklander mbedtls_ecp_group_id grp_id; 10883d3b0591SJens Wiklander ECP_VALIDATE_RET( grp != NULL ); 10893d3b0591SJens Wiklander ECP_VALIDATE_RET( buf != NULL ); 10903d3b0591SJens Wiklander ECP_VALIDATE_RET( *buf != NULL ); 10913d3b0591SJens Wiklander 10923d3b0591SJens Wiklander if( ( ret = mbedtls_ecp_tls_read_group_id( &grp_id, buf, len ) ) != 0 ) 10933d3b0591SJens Wiklander return( ret ); 10943d3b0591SJens Wiklander 10953d3b0591SJens Wiklander return( mbedtls_ecp_group_load( grp, grp_id ) ); 10963d3b0591SJens Wiklander } 10973d3b0591SJens Wiklander 10983d3b0591SJens Wiklander /* 10993d3b0591SJens Wiklander * Read a group id from an ECParameters record (RFC 4492) and convert it to 11003d3b0591SJens Wiklander * mbedtls_ecp_group_id. 11013d3b0591SJens Wiklander */ 11023d3b0591SJens Wiklander int mbedtls_ecp_tls_read_group_id( mbedtls_ecp_group_id *grp, 11033d3b0591SJens Wiklander const unsigned char **buf, size_t len ) 1104817466cbSJens Wiklander { 1105817466cbSJens Wiklander uint16_t tls_id; 1106817466cbSJens Wiklander const mbedtls_ecp_curve_info *curve_info; 11073d3b0591SJens Wiklander ECP_VALIDATE_RET( grp != NULL ); 11083d3b0591SJens Wiklander ECP_VALIDATE_RET( buf != NULL ); 11093d3b0591SJens Wiklander ECP_VALIDATE_RET( *buf != NULL ); 1110817466cbSJens Wiklander 1111817466cbSJens Wiklander /* 1112817466cbSJens Wiklander * We expect at least three bytes (see below) 1113817466cbSJens Wiklander */ 1114817466cbSJens Wiklander if( len < 3 ) 1115817466cbSJens Wiklander return( MBEDTLS_ERR_ECP_BAD_INPUT_DATA ); 1116817466cbSJens Wiklander 1117817466cbSJens Wiklander /* 1118817466cbSJens Wiklander * First byte is curve_type; only named_curve is handled 1119817466cbSJens Wiklander */ 1120817466cbSJens Wiklander if( *(*buf)++ != MBEDTLS_ECP_TLS_NAMED_CURVE ) 1121817466cbSJens Wiklander return( MBEDTLS_ERR_ECP_BAD_INPUT_DATA ); 1122817466cbSJens Wiklander 1123817466cbSJens Wiklander /* 1124817466cbSJens Wiklander * Next two bytes are the namedcurve value 1125817466cbSJens Wiklander */ 1126817466cbSJens Wiklander tls_id = *(*buf)++; 1127817466cbSJens Wiklander tls_id <<= 8; 1128817466cbSJens Wiklander tls_id |= *(*buf)++; 1129817466cbSJens Wiklander 1130817466cbSJens Wiklander if( ( curve_info = mbedtls_ecp_curve_info_from_tls_id( tls_id ) ) == NULL ) 1131817466cbSJens Wiklander return( MBEDTLS_ERR_ECP_FEATURE_UNAVAILABLE ); 1132817466cbSJens Wiklander 11333d3b0591SJens Wiklander *grp = curve_info->grp_id; 11343d3b0591SJens Wiklander 11353d3b0591SJens Wiklander return( 0 ); 1136817466cbSJens Wiklander } 1137817466cbSJens Wiklander 1138817466cbSJens Wiklander /* 1139817466cbSJens Wiklander * Write the ECParameters record corresponding to a group (RFC 4492) 1140817466cbSJens Wiklander */ 1141817466cbSJens Wiklander int mbedtls_ecp_tls_write_group( const mbedtls_ecp_group *grp, size_t *olen, 1142817466cbSJens Wiklander unsigned char *buf, size_t blen ) 1143817466cbSJens Wiklander { 1144817466cbSJens Wiklander const mbedtls_ecp_curve_info *curve_info; 11453d3b0591SJens Wiklander ECP_VALIDATE_RET( grp != NULL ); 11463d3b0591SJens Wiklander ECP_VALIDATE_RET( buf != NULL ); 11473d3b0591SJens Wiklander ECP_VALIDATE_RET( olen != NULL ); 1148817466cbSJens Wiklander 1149817466cbSJens Wiklander if( ( curve_info = mbedtls_ecp_curve_info_from_grp_id( grp->id ) ) == NULL ) 1150817466cbSJens Wiklander return( MBEDTLS_ERR_ECP_BAD_INPUT_DATA ); 1151817466cbSJens Wiklander 1152817466cbSJens Wiklander /* 1153817466cbSJens Wiklander * We are going to write 3 bytes (see below) 1154817466cbSJens Wiklander */ 1155817466cbSJens Wiklander *olen = 3; 1156817466cbSJens Wiklander if( blen < *olen ) 1157817466cbSJens Wiklander return( MBEDTLS_ERR_ECP_BUFFER_TOO_SMALL ); 1158817466cbSJens Wiklander 1159817466cbSJens Wiklander /* 1160817466cbSJens Wiklander * First byte is curve_type, always named_curve 1161817466cbSJens Wiklander */ 1162817466cbSJens Wiklander *buf++ = MBEDTLS_ECP_TLS_NAMED_CURVE; 1163817466cbSJens Wiklander 1164817466cbSJens Wiklander /* 1165817466cbSJens Wiklander * Next two bytes are the namedcurve value 1166817466cbSJens Wiklander */ 1167*039e02dfSJerome Forissier MBEDTLS_PUT_UINT16_BE( curve_info->tls_id, buf, 0 ); 1168817466cbSJens Wiklander 1169817466cbSJens Wiklander return( 0 ); 1170817466cbSJens Wiklander } 1171817466cbSJens Wiklander 1172817466cbSJens Wiklander /* 1173817466cbSJens Wiklander * Wrapper around fast quasi-modp functions, with fall-back to mbedtls_mpi_mod_mpi. 1174817466cbSJens Wiklander * See the documentation of struct mbedtls_ecp_group. 1175817466cbSJens Wiklander * 1176817466cbSJens Wiklander * This function is in the critial loop for mbedtls_ecp_mul, so pay attention to perf. 1177817466cbSJens Wiklander */ 1178817466cbSJens Wiklander static int ecp_modp( mbedtls_mpi *N, const mbedtls_ecp_group *grp ) 1179817466cbSJens Wiklander { 118011fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 1181817466cbSJens Wiklander 1182817466cbSJens Wiklander if( grp->modp == NULL ) 1183817466cbSJens Wiklander return( mbedtls_mpi_mod_mpi( N, N, &grp->P ) ); 1184817466cbSJens Wiklander 1185817466cbSJens Wiklander /* N->s < 0 is a much faster test, which fails only if N is 0 */ 1186817466cbSJens Wiklander if( ( N->s < 0 && mbedtls_mpi_cmp_int( N, 0 ) != 0 ) || 1187817466cbSJens Wiklander mbedtls_mpi_bitlen( N ) > 2 * grp->pbits ) 1188817466cbSJens Wiklander { 1189817466cbSJens Wiklander return( MBEDTLS_ERR_ECP_BAD_INPUT_DATA ); 1190817466cbSJens Wiklander } 1191817466cbSJens Wiklander 1192817466cbSJens Wiklander MBEDTLS_MPI_CHK( grp->modp( N ) ); 1193817466cbSJens Wiklander 1194817466cbSJens Wiklander /* N->s < 0 is a much faster test, which fails only if N is 0 */ 1195817466cbSJens Wiklander while( N->s < 0 && mbedtls_mpi_cmp_int( N, 0 ) != 0 ) 1196817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_add_mpi( N, N, &grp->P ) ); 1197817466cbSJens Wiklander 1198817466cbSJens Wiklander while( mbedtls_mpi_cmp_mpi( N, &grp->P ) >= 0 ) 1199817466cbSJens Wiklander /* we known P, N and the result are positive */ 1200817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_sub_abs( N, N, &grp->P ) ); 1201817466cbSJens Wiklander 1202817466cbSJens Wiklander cleanup: 1203817466cbSJens Wiklander return( ret ); 1204817466cbSJens Wiklander } 1205817466cbSJens Wiklander 1206817466cbSJens Wiklander /* 1207817466cbSJens Wiklander * Fast mod-p functions expect their argument to be in the 0..p^2 range. 1208817466cbSJens Wiklander * 1209817466cbSJens Wiklander * In order to guarantee that, we need to ensure that operands of 1210817466cbSJens Wiklander * mbedtls_mpi_mul_mpi are in the 0..p range. So, after each operation we will 1211817466cbSJens Wiklander * bring the result back to this range. 1212817466cbSJens Wiklander * 1213817466cbSJens Wiklander * The following macros are shortcuts for doing that. 1214817466cbSJens Wiklander */ 1215817466cbSJens Wiklander 1216817466cbSJens Wiklander /* 1217817466cbSJens Wiklander * Reduce a mbedtls_mpi mod p in-place, general case, to use after mbedtls_mpi_mul_mpi 1218817466cbSJens Wiklander */ 1219817466cbSJens Wiklander #if defined(MBEDTLS_SELF_TEST) 1220817466cbSJens Wiklander #define INC_MUL_COUNT mul_count++; 1221817466cbSJens Wiklander #else 1222817466cbSJens Wiklander #define INC_MUL_COUNT 1223817466cbSJens Wiklander #endif 1224817466cbSJens Wiklander 12255b25c76aSJerome Forissier #define MOD_MUL( N ) \ 12265b25c76aSJerome Forissier do \ 12275b25c76aSJerome Forissier { \ 12285b25c76aSJerome Forissier MBEDTLS_MPI_CHK( ecp_modp( &(N), grp ) ); \ 12295b25c76aSJerome Forissier INC_MUL_COUNT \ 12305b25c76aSJerome Forissier } while( 0 ) 1231817466cbSJens Wiklander 123211fa71b9SJerome Forissier static inline int mbedtls_mpi_mul_mod( const mbedtls_ecp_group *grp, 123311fa71b9SJerome Forissier mbedtls_mpi *X, 123411fa71b9SJerome Forissier const mbedtls_mpi *A, 123511fa71b9SJerome Forissier const mbedtls_mpi *B ) 123611fa71b9SJerome Forissier { 123711fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 123811fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mpi( X, A, B ) ); 123911fa71b9SJerome Forissier MOD_MUL( *X ); 124011fa71b9SJerome Forissier cleanup: 124111fa71b9SJerome Forissier return( ret ); 124211fa71b9SJerome Forissier } 124311fa71b9SJerome Forissier 1244817466cbSJens Wiklander /* 1245817466cbSJens Wiklander * Reduce a mbedtls_mpi mod p in-place, to use after mbedtls_mpi_sub_mpi 1246817466cbSJens Wiklander * N->s < 0 is a very fast test, which fails only if N is 0 1247817466cbSJens Wiklander */ 1248817466cbSJens Wiklander #define MOD_SUB( N ) \ 12495b25c76aSJerome Forissier while( (N).s < 0 && mbedtls_mpi_cmp_int( &(N), 0 ) != 0 ) \ 12505b25c76aSJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_add_mpi( &(N), &(N), &grp->P ) ) 1251817466cbSJens Wiklander 12527901324dSJerome Forissier #if ( defined(MBEDTLS_ECP_SHORT_WEIERSTRASS_ENABLED) && \ 12537901324dSJerome Forissier !( defined(MBEDTLS_ECP_NO_FALLBACK) && \ 12547901324dSJerome Forissier defined(MBEDTLS_ECP_DOUBLE_JAC_ALT) && \ 12557901324dSJerome Forissier defined(MBEDTLS_ECP_ADD_MIXED_ALT) ) ) || \ 12567901324dSJerome Forissier ( defined(MBEDTLS_ECP_MONTGOMERY_ENABLED) && \ 12577901324dSJerome Forissier !( defined(MBEDTLS_ECP_NO_FALLBACK) && \ 12587901324dSJerome Forissier defined(MBEDTLS_ECP_DOUBLE_ADD_MXZ_ALT) ) ) 125911fa71b9SJerome Forissier static inline int mbedtls_mpi_sub_mod( const mbedtls_ecp_group *grp, 126011fa71b9SJerome Forissier mbedtls_mpi *X, 126111fa71b9SJerome Forissier const mbedtls_mpi *A, 126211fa71b9SJerome Forissier const mbedtls_mpi *B ) 126311fa71b9SJerome Forissier { 126411fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 126511fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_sub_mpi( X, A, B ) ); 126611fa71b9SJerome Forissier MOD_SUB( *X ); 126711fa71b9SJerome Forissier cleanup: 126811fa71b9SJerome Forissier return( ret ); 126911fa71b9SJerome Forissier } 12707901324dSJerome Forissier #endif /* All functions referencing mbedtls_mpi_sub_mod() are alt-implemented without fallback */ 127111fa71b9SJerome Forissier 1272817466cbSJens Wiklander /* 1273817466cbSJens Wiklander * Reduce a mbedtls_mpi mod p in-place, to use after mbedtls_mpi_add_mpi and mbedtls_mpi_mul_int. 1274817466cbSJens Wiklander * We known P, N and the result are positive, so sub_abs is correct, and 1275817466cbSJens Wiklander * a bit faster. 1276817466cbSJens Wiklander */ 1277817466cbSJens Wiklander #define MOD_ADD( N ) \ 12785b25c76aSJerome Forissier while( mbedtls_mpi_cmp_mpi( &(N), &grp->P ) >= 0 ) \ 12795b25c76aSJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_sub_abs( &(N), &(N), &grp->P ) ) 1280817466cbSJens Wiklander 128111fa71b9SJerome Forissier static inline int mbedtls_mpi_add_mod( const mbedtls_ecp_group *grp, 128211fa71b9SJerome Forissier mbedtls_mpi *X, 128311fa71b9SJerome Forissier const mbedtls_mpi *A, 128411fa71b9SJerome Forissier const mbedtls_mpi *B ) 128511fa71b9SJerome Forissier { 128611fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 128711fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_add_mpi( X, A, B ) ); 128811fa71b9SJerome Forissier MOD_ADD( *X ); 128911fa71b9SJerome Forissier cleanup: 129011fa71b9SJerome Forissier return( ret ); 129111fa71b9SJerome Forissier } 129211fa71b9SJerome Forissier 12937901324dSJerome Forissier #if defined(MBEDTLS_ECP_SHORT_WEIERSTRASS_ENABLED) && \ 12947901324dSJerome Forissier !( defined(MBEDTLS_ECP_NO_FALLBACK) && \ 12957901324dSJerome Forissier defined(MBEDTLS_ECP_DOUBLE_JAC_ALT) && \ 12967901324dSJerome Forissier defined(MBEDTLS_ECP_ADD_MIXED_ALT) ) 129711fa71b9SJerome Forissier static inline int mbedtls_mpi_shift_l_mod( const mbedtls_ecp_group *grp, 129811fa71b9SJerome Forissier mbedtls_mpi *X, 129911fa71b9SJerome Forissier size_t count ) 130011fa71b9SJerome Forissier { 130111fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 130211fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_shift_l( X, count ) ); 130311fa71b9SJerome Forissier MOD_ADD( *X ); 130411fa71b9SJerome Forissier cleanup: 130511fa71b9SJerome Forissier return( ret ); 130611fa71b9SJerome Forissier } 13077901324dSJerome Forissier #endif /* All functions referencing mbedtls_mpi_shift_l_mod() are alt-implemented without fallback */ 130811fa71b9SJerome Forissier 13097901324dSJerome Forissier #if defined(MBEDTLS_ECP_SHORT_WEIERSTRASS_ENABLED) 1310817466cbSJens Wiklander /* 1311817466cbSJens Wiklander * For curves in short Weierstrass form, we do all the internal operations in 1312817466cbSJens Wiklander * Jacobian coordinates. 1313817466cbSJens Wiklander * 1314*039e02dfSJerome Forissier * For multiplication, we'll use a comb method with countermeasures against 1315817466cbSJens Wiklander * SPA, hence timing attacks. 1316817466cbSJens Wiklander */ 1317817466cbSJens Wiklander 1318817466cbSJens Wiklander /* 1319817466cbSJens Wiklander * Normalize jacobian coordinates so that Z == 0 || Z == 1 (GECC 3.2.1) 1320817466cbSJens Wiklander * Cost: 1N := 1I + 3M + 1S 1321817466cbSJens Wiklander */ 1322817466cbSJens Wiklander static int ecp_normalize_jac( const mbedtls_ecp_group *grp, mbedtls_ecp_point *pt ) 1323817466cbSJens Wiklander { 1324817466cbSJens Wiklander if( mbedtls_mpi_cmp_int( &pt->Z, 0 ) == 0 ) 1325817466cbSJens Wiklander return( 0 ); 1326817466cbSJens Wiklander 1327817466cbSJens Wiklander #if defined(MBEDTLS_ECP_NORMALIZE_JAC_ALT) 1328817466cbSJens Wiklander if( mbedtls_internal_ecp_grp_capable( grp ) ) 13293d3b0591SJens Wiklander return( mbedtls_internal_ecp_normalize_jac( grp, pt ) ); 1330817466cbSJens Wiklander #endif /* MBEDTLS_ECP_NORMALIZE_JAC_ALT */ 13313d3b0591SJens Wiklander 13327901324dSJerome Forissier #if defined(MBEDTLS_ECP_NO_FALLBACK) && defined(MBEDTLS_ECP_NORMALIZE_JAC_ALT) 13337901324dSJerome Forissier return( MBEDTLS_ERR_ECP_FEATURE_UNAVAILABLE ); 13347901324dSJerome Forissier #else 13357901324dSJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 13367901324dSJerome Forissier mbedtls_mpi Zi, ZZi; 1337817466cbSJens Wiklander mbedtls_mpi_init( &Zi ); mbedtls_mpi_init( &ZZi ); 1338817466cbSJens Wiklander 1339817466cbSJens Wiklander /* 1340817466cbSJens Wiklander * X = X / Z^2 mod p 1341817466cbSJens Wiklander */ 1342817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_inv_mod( &Zi, &pt->Z, &grp->P ) ); 134311fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &ZZi, &Zi, &Zi ) ); 134411fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &pt->X, &pt->X, &ZZi ) ); 1345817466cbSJens Wiklander 1346817466cbSJens Wiklander /* 1347817466cbSJens Wiklander * Y = Y / Z^3 mod p 1348817466cbSJens Wiklander */ 134911fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &pt->Y, &pt->Y, &ZZi ) ); 135011fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &pt->Y, &pt->Y, &Zi ) ); 1351817466cbSJens Wiklander 1352817466cbSJens Wiklander /* 1353817466cbSJens Wiklander * Z = 1 1354817466cbSJens Wiklander */ 1355817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_lset( &pt->Z, 1 ) ); 1356817466cbSJens Wiklander 1357817466cbSJens Wiklander cleanup: 1358817466cbSJens Wiklander 1359817466cbSJens Wiklander mbedtls_mpi_free( &Zi ); mbedtls_mpi_free( &ZZi ); 1360817466cbSJens Wiklander 1361817466cbSJens Wiklander return( ret ); 13627901324dSJerome Forissier #endif /* !defined(MBEDTLS_ECP_NO_FALLBACK) || !defined(MBEDTLS_ECP_NORMALIZE_JAC_ALT) */ 1363817466cbSJens Wiklander } 1364817466cbSJens Wiklander 1365817466cbSJens Wiklander /* 1366817466cbSJens Wiklander * Normalize jacobian coordinates of an array of (pointers to) points, 1367817466cbSJens Wiklander * using Montgomery's trick to perform only one inversion mod P. 1368817466cbSJens Wiklander * (See for example Cohen's "A Course in Computational Algebraic Number 1369817466cbSJens Wiklander * Theory", Algorithm 10.3.4.) 1370817466cbSJens Wiklander * 1371817466cbSJens Wiklander * Warning: fails (returning an error) if one of the points is zero! 1372817466cbSJens Wiklander * This should never happen, see choice of w in ecp_mul_comb(). 1373817466cbSJens Wiklander * 1374817466cbSJens Wiklander * Cost: 1N(t) := 1I + (6t - 3)M + 1S 1375817466cbSJens Wiklander */ 1376817466cbSJens Wiklander static int ecp_normalize_jac_many( const mbedtls_ecp_group *grp, 13773d3b0591SJens Wiklander mbedtls_ecp_point *T[], size_t T_size ) 1378817466cbSJens Wiklander { 13793d3b0591SJens Wiklander if( T_size < 2 ) 1380817466cbSJens Wiklander return( ecp_normalize_jac( grp, *T ) ); 1381817466cbSJens Wiklander 1382817466cbSJens Wiklander #if defined(MBEDTLS_ECP_NORMALIZE_JAC_MANY_ALT) 1383817466cbSJens Wiklander if( mbedtls_internal_ecp_grp_capable( grp ) ) 13843d3b0591SJens Wiklander return( mbedtls_internal_ecp_normalize_jac_many( grp, T, T_size ) ); 1385817466cbSJens Wiklander #endif 1386817466cbSJens Wiklander 13877901324dSJerome Forissier #if defined(MBEDTLS_ECP_NO_FALLBACK) && defined(MBEDTLS_ECP_NORMALIZE_JAC_MANY_ALT) 13887901324dSJerome Forissier return( MBEDTLS_ERR_ECP_FEATURE_UNAVAILABLE ); 13897901324dSJerome Forissier #else 13907901324dSJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 13917901324dSJerome Forissier size_t i; 13927901324dSJerome Forissier mbedtls_mpi *c, u, Zi, ZZi; 13937901324dSJerome Forissier 13943d3b0591SJens Wiklander if( ( c = mbedtls_calloc( T_size, sizeof( mbedtls_mpi ) ) ) == NULL ) 1395817466cbSJens Wiklander return( MBEDTLS_ERR_ECP_ALLOC_FAILED ); 1396817466cbSJens Wiklander 13973d3b0591SJens Wiklander for( i = 0; i < T_size; i++ ) 13983d3b0591SJens Wiklander mbedtls_mpi_init( &c[i] ); 13993d3b0591SJens Wiklander 1400817466cbSJens Wiklander mbedtls_mpi_init( &u ); mbedtls_mpi_init( &Zi ); mbedtls_mpi_init( &ZZi ); 1401817466cbSJens Wiklander 1402817466cbSJens Wiklander /* 1403817466cbSJens Wiklander * c[i] = Z_0 * ... * Z_i 1404817466cbSJens Wiklander */ 1405817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_copy( &c[0], &T[0]->Z ) ); 14063d3b0591SJens Wiklander for( i = 1; i < T_size; i++ ) 1407817466cbSJens Wiklander { 140811fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &c[i], &c[i-1], &T[i]->Z ) ); 1409817466cbSJens Wiklander } 1410817466cbSJens Wiklander 1411817466cbSJens Wiklander /* 1412817466cbSJens Wiklander * u = 1 / (Z_0 * ... * Z_n) mod P 1413817466cbSJens Wiklander */ 14143d3b0591SJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_inv_mod( &u, &c[T_size-1], &grp->P ) ); 1415817466cbSJens Wiklander 14163d3b0591SJens Wiklander for( i = T_size - 1; ; i-- ) 1417817466cbSJens Wiklander { 1418817466cbSJens Wiklander /* 1419817466cbSJens Wiklander * Zi = 1 / Z_i mod p 1420817466cbSJens Wiklander * u = 1 / (Z_0 * ... * Z_i) mod P 1421817466cbSJens Wiklander */ 1422817466cbSJens Wiklander if( i == 0 ) { 1423817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_copy( &Zi, &u ) ); 1424817466cbSJens Wiklander } 1425817466cbSJens Wiklander else 1426817466cbSJens Wiklander { 142711fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &Zi, &u, &c[i-1] ) ); 142811fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &u, &u, &T[i]->Z ) ); 1429817466cbSJens Wiklander } 1430817466cbSJens Wiklander 1431817466cbSJens Wiklander /* 1432817466cbSJens Wiklander * proceed as in normalize() 1433817466cbSJens Wiklander */ 143411fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &ZZi, &Zi, &Zi ) ); 143511fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &T[i]->X, &T[i]->X, &ZZi ) ); 143611fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &T[i]->Y, &T[i]->Y, &ZZi ) ); 143711fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &T[i]->Y, &T[i]->Y, &Zi ) ); 1438817466cbSJens Wiklander 1439817466cbSJens Wiklander /* 1440817466cbSJens Wiklander * Post-precessing: reclaim some memory by shrinking coordinates 1441817466cbSJens Wiklander * - not storing Z (always 1) 1442817466cbSJens Wiklander * - shrinking other coordinates, but still keeping the same number of 1443817466cbSJens Wiklander * limbs as P, as otherwise it will too likely be regrown too fast. 1444817466cbSJens Wiklander */ 1445817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_shrink( &T[i]->X, grp->P.n ) ); 1446817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_shrink( &T[i]->Y, grp->P.n ) ); 1447817466cbSJens Wiklander mbedtls_mpi_free( &T[i]->Z ); 1448817466cbSJens Wiklander 1449817466cbSJens Wiklander if( i == 0 ) 1450817466cbSJens Wiklander break; 1451817466cbSJens Wiklander } 1452817466cbSJens Wiklander 1453817466cbSJens Wiklander cleanup: 1454817466cbSJens Wiklander 1455817466cbSJens Wiklander mbedtls_mpi_free( &u ); mbedtls_mpi_free( &Zi ); mbedtls_mpi_free( &ZZi ); 14563d3b0591SJens Wiklander for( i = 0; i < T_size; i++ ) 1457817466cbSJens Wiklander mbedtls_mpi_free( &c[i] ); 1458817466cbSJens Wiklander mbedtls_free( c ); 1459817466cbSJens Wiklander 1460817466cbSJens Wiklander return( ret ); 14617901324dSJerome Forissier #endif /* !defined(MBEDTLS_ECP_NO_FALLBACK) || !defined(MBEDTLS_ECP_NORMALIZE_JAC_MANY_ALT) */ 1462817466cbSJens Wiklander } 1463817466cbSJens Wiklander 1464817466cbSJens Wiklander /* 1465817466cbSJens Wiklander * Conditional point inversion: Q -> -Q = (Q.X, -Q.Y, Q.Z) without leak. 1466817466cbSJens Wiklander * "inv" must be 0 (don't invert) or 1 (invert) or the result will be invalid 1467817466cbSJens Wiklander */ 1468817466cbSJens Wiklander static int ecp_safe_invert_jac( const mbedtls_ecp_group *grp, 1469817466cbSJens Wiklander mbedtls_ecp_point *Q, 1470817466cbSJens Wiklander unsigned char inv ) 1471817466cbSJens Wiklander { 147211fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 1473817466cbSJens Wiklander unsigned char nonzero; 1474817466cbSJens Wiklander mbedtls_mpi mQY; 1475817466cbSJens Wiklander 1476817466cbSJens Wiklander mbedtls_mpi_init( &mQY ); 1477817466cbSJens Wiklander 1478817466cbSJens Wiklander /* Use the fact that -Q.Y mod P = P - Q.Y unless Q.Y == 0 */ 1479817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_sub_mpi( &mQY, &grp->P, &Q->Y ) ); 1480817466cbSJens Wiklander nonzero = mbedtls_mpi_cmp_int( &Q->Y, 0 ) != 0; 1481817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_safe_cond_assign( &Q->Y, &mQY, inv & nonzero ) ); 1482817466cbSJens Wiklander 1483817466cbSJens Wiklander cleanup: 1484817466cbSJens Wiklander mbedtls_mpi_free( &mQY ); 1485817466cbSJens Wiklander 1486817466cbSJens Wiklander return( ret ); 1487817466cbSJens Wiklander } 1488817466cbSJens Wiklander 1489817466cbSJens Wiklander /* 1490817466cbSJens Wiklander * Point doubling R = 2 P, Jacobian coordinates 1491817466cbSJens Wiklander * 1492817466cbSJens Wiklander * Based on http://www.hyperelliptic.org/EFD/g1p/auto-shortw-jacobian.html#doubling-dbl-1998-cmo-2 . 1493817466cbSJens Wiklander * 1494817466cbSJens Wiklander * We follow the variable naming fairly closely. The formula variations that trade a MUL for a SQR 1495817466cbSJens Wiklander * (plus a few ADDs) aren't useful as our bignum implementation doesn't distinguish squaring. 1496817466cbSJens Wiklander * 1497817466cbSJens Wiklander * Standard optimizations are applied when curve parameter A is one of { 0, -3 }. 1498817466cbSJens Wiklander * 1499817466cbSJens Wiklander * Cost: 1D := 3M + 4S (A == 0) 1500817466cbSJens Wiklander * 4M + 4S (A == -3) 1501817466cbSJens Wiklander * 3M + 6S + 1a otherwise 1502817466cbSJens Wiklander */ 1503817466cbSJens Wiklander static int ecp_double_jac( const mbedtls_ecp_group *grp, mbedtls_ecp_point *R, 1504817466cbSJens Wiklander const mbedtls_ecp_point *P ) 1505817466cbSJens Wiklander { 1506817466cbSJens Wiklander #if defined(MBEDTLS_SELF_TEST) 1507817466cbSJens Wiklander dbl_count++; 1508817466cbSJens Wiklander #endif 1509817466cbSJens Wiklander 1510817466cbSJens Wiklander #if defined(MBEDTLS_ECP_DOUBLE_JAC_ALT) 1511817466cbSJens Wiklander if( mbedtls_internal_ecp_grp_capable( grp ) ) 15123d3b0591SJens Wiklander return( mbedtls_internal_ecp_double_jac( grp, R, P ) ); 1513817466cbSJens Wiklander #endif /* MBEDTLS_ECP_DOUBLE_JAC_ALT */ 1514817466cbSJens Wiklander 15157901324dSJerome Forissier #if defined(MBEDTLS_ECP_NO_FALLBACK) && defined(MBEDTLS_ECP_DOUBLE_JAC_ALT) 15167901324dSJerome Forissier return( MBEDTLS_ERR_ECP_FEATURE_UNAVAILABLE ); 15177901324dSJerome Forissier #else 15187901324dSJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 15197901324dSJerome Forissier mbedtls_mpi M, S, T, U; 15207901324dSJerome Forissier 1521817466cbSJens Wiklander mbedtls_mpi_init( &M ); mbedtls_mpi_init( &S ); mbedtls_mpi_init( &T ); mbedtls_mpi_init( &U ); 1522817466cbSJens Wiklander 1523817466cbSJens Wiklander /* Special case for A = -3 */ 1524817466cbSJens Wiklander if( grp->A.p == NULL ) 1525817466cbSJens Wiklander { 1526817466cbSJens Wiklander /* M = 3(X + Z^2)(X - Z^2) */ 152711fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &S, &P->Z, &P->Z ) ); 152811fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_add_mod( grp, &T, &P->X, &S ) ); 152911fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_sub_mod( grp, &U, &P->X, &S ) ); 153011fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &S, &T, &U ) ); 1531817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_mul_int( &M, &S, 3 ) ); MOD_ADD( M ); 1532817466cbSJens Wiklander } 1533817466cbSJens Wiklander else 1534817466cbSJens Wiklander { 1535817466cbSJens Wiklander /* M = 3.X^2 */ 153611fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &S, &P->X, &P->X ) ); 1537817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_mul_int( &M, &S, 3 ) ); MOD_ADD( M ); 1538817466cbSJens Wiklander 1539817466cbSJens Wiklander /* Optimize away for "koblitz" curves with A = 0 */ 1540817466cbSJens Wiklander if( mbedtls_mpi_cmp_int( &grp->A, 0 ) != 0 ) 1541817466cbSJens Wiklander { 1542817466cbSJens Wiklander /* M += A.Z^4 */ 154311fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &S, &P->Z, &P->Z ) ); 154411fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &T, &S, &S ) ); 154511fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &S, &T, &grp->A ) ); 154611fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_add_mod( grp, &M, &M, &S ) ); 1547817466cbSJens Wiklander } 1548817466cbSJens Wiklander } 1549817466cbSJens Wiklander 1550817466cbSJens Wiklander /* S = 4.X.Y^2 */ 155111fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &T, &P->Y, &P->Y ) ); 155211fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_shift_l_mod( grp, &T, 1 ) ); 155311fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &S, &P->X, &T ) ); 155411fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_shift_l_mod( grp, &S, 1 ) ); 1555817466cbSJens Wiklander 1556817466cbSJens Wiklander /* U = 8.Y^4 */ 155711fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &U, &T, &T ) ); 155811fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_shift_l_mod( grp, &U, 1 ) ); 1559817466cbSJens Wiklander 1560817466cbSJens Wiklander /* T = M^2 - 2.S */ 156111fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &T, &M, &M ) ); 156211fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_sub_mod( grp, &T, &T, &S ) ); 156311fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_sub_mod( grp, &T, &T, &S ) ); 1564817466cbSJens Wiklander 1565817466cbSJens Wiklander /* S = M(S - T) - U */ 156611fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_sub_mod( grp, &S, &S, &T ) ); 156711fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &S, &S, &M ) ); 156811fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_sub_mod( grp, &S, &S, &U ) ); 1569817466cbSJens Wiklander 1570817466cbSJens Wiklander /* U = 2.Y.Z */ 157111fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &U, &P->Y, &P->Z ) ); 157211fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_shift_l_mod( grp, &U, 1 ) ); 1573817466cbSJens Wiklander 1574817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_copy( &R->X, &T ) ); 1575817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_copy( &R->Y, &S ) ); 1576817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_copy( &R->Z, &U ) ); 1577817466cbSJens Wiklander 1578817466cbSJens Wiklander cleanup: 1579817466cbSJens Wiklander mbedtls_mpi_free( &M ); mbedtls_mpi_free( &S ); mbedtls_mpi_free( &T ); mbedtls_mpi_free( &U ); 1580817466cbSJens Wiklander 1581817466cbSJens Wiklander return( ret ); 15827901324dSJerome Forissier #endif /* !defined(MBEDTLS_ECP_NO_FALLBACK) || !defined(MBEDTLS_ECP_DOUBLE_JAC_ALT) */ 1583817466cbSJens Wiklander } 1584817466cbSJens Wiklander 1585817466cbSJens Wiklander /* 1586817466cbSJens Wiklander * Addition: R = P + Q, mixed affine-Jacobian coordinates (GECC 3.22) 1587817466cbSJens Wiklander * 1588817466cbSJens Wiklander * The coordinates of Q must be normalized (= affine), 1589817466cbSJens Wiklander * but those of P don't need to. R is not normalized. 1590817466cbSJens Wiklander * 1591817466cbSJens Wiklander * Special cases: (1) P or Q is zero, (2) R is zero, (3) P == Q. 1592817466cbSJens Wiklander * None of these cases can happen as intermediate step in ecp_mul_comb(): 1593817466cbSJens Wiklander * - at each step, P, Q and R are multiples of the base point, the factor 1594817466cbSJens Wiklander * being less than its order, so none of them is zero; 1595817466cbSJens Wiklander * - Q is an odd multiple of the base point, P an even multiple, 1596817466cbSJens Wiklander * due to the choice of precomputed points in the modified comb method. 1597817466cbSJens Wiklander * So branches for these cases do not leak secret information. 1598817466cbSJens Wiklander * 1599817466cbSJens Wiklander * We accept Q->Z being unset (saving memory in tables) as meaning 1. 1600817466cbSJens Wiklander * 1601817466cbSJens Wiklander * Cost: 1A := 8M + 3S 1602817466cbSJens Wiklander */ 1603817466cbSJens Wiklander static int ecp_add_mixed( const mbedtls_ecp_group *grp, mbedtls_ecp_point *R, 1604817466cbSJens Wiklander const mbedtls_ecp_point *P, const mbedtls_ecp_point *Q ) 1605817466cbSJens Wiklander { 1606817466cbSJens Wiklander #if defined(MBEDTLS_SELF_TEST) 1607817466cbSJens Wiklander add_count++; 1608817466cbSJens Wiklander #endif 1609817466cbSJens Wiklander 1610817466cbSJens Wiklander #if defined(MBEDTLS_ECP_ADD_MIXED_ALT) 1611817466cbSJens Wiklander if( mbedtls_internal_ecp_grp_capable( grp ) ) 16123d3b0591SJens Wiklander return( mbedtls_internal_ecp_add_mixed( grp, R, P, Q ) ); 1613817466cbSJens Wiklander #endif /* MBEDTLS_ECP_ADD_MIXED_ALT */ 1614817466cbSJens Wiklander 16157901324dSJerome Forissier #if defined(MBEDTLS_ECP_NO_FALLBACK) && defined(MBEDTLS_ECP_ADD_MIXED_ALT) 16167901324dSJerome Forissier return( MBEDTLS_ERR_ECP_FEATURE_UNAVAILABLE ); 16177901324dSJerome Forissier #else 16187901324dSJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 16197901324dSJerome Forissier mbedtls_mpi T1, T2, T3, T4, X, Y, Z; 16207901324dSJerome Forissier 1621817466cbSJens Wiklander /* 1622817466cbSJens Wiklander * Trivial cases: P == 0 or Q == 0 (case 1) 1623817466cbSJens Wiklander */ 1624817466cbSJens Wiklander if( mbedtls_mpi_cmp_int( &P->Z, 0 ) == 0 ) 1625817466cbSJens Wiklander return( mbedtls_ecp_copy( R, Q ) ); 1626817466cbSJens Wiklander 1627817466cbSJens Wiklander if( Q->Z.p != NULL && mbedtls_mpi_cmp_int( &Q->Z, 0 ) == 0 ) 1628817466cbSJens Wiklander return( mbedtls_ecp_copy( R, P ) ); 1629817466cbSJens Wiklander 1630817466cbSJens Wiklander /* 1631817466cbSJens Wiklander * Make sure Q coordinates are normalized 1632817466cbSJens Wiklander */ 1633817466cbSJens Wiklander if( Q->Z.p != NULL && mbedtls_mpi_cmp_int( &Q->Z, 1 ) != 0 ) 1634817466cbSJens Wiklander return( MBEDTLS_ERR_ECP_BAD_INPUT_DATA ); 1635817466cbSJens Wiklander 1636817466cbSJens Wiklander mbedtls_mpi_init( &T1 ); mbedtls_mpi_init( &T2 ); mbedtls_mpi_init( &T3 ); mbedtls_mpi_init( &T4 ); 1637817466cbSJens Wiklander mbedtls_mpi_init( &X ); mbedtls_mpi_init( &Y ); mbedtls_mpi_init( &Z ); 1638817466cbSJens Wiklander 163911fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &T1, &P->Z, &P->Z ) ); 164011fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &T2, &T1, &P->Z ) ); 164111fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &T1, &T1, &Q->X ) ); 164211fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &T2, &T2, &Q->Y ) ); 164311fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_sub_mod( grp, &T1, &T1, &P->X ) ); 164411fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_sub_mod( grp, &T2, &T2, &P->Y ) ); 1645817466cbSJens Wiklander 1646817466cbSJens Wiklander /* Special cases (2) and (3) */ 1647817466cbSJens Wiklander if( mbedtls_mpi_cmp_int( &T1, 0 ) == 0 ) 1648817466cbSJens Wiklander { 1649817466cbSJens Wiklander if( mbedtls_mpi_cmp_int( &T2, 0 ) == 0 ) 1650817466cbSJens Wiklander { 1651817466cbSJens Wiklander ret = ecp_double_jac( grp, R, P ); 1652817466cbSJens Wiklander goto cleanup; 1653817466cbSJens Wiklander } 1654817466cbSJens Wiklander else 1655817466cbSJens Wiklander { 1656817466cbSJens Wiklander ret = mbedtls_ecp_set_zero( R ); 1657817466cbSJens Wiklander goto cleanup; 1658817466cbSJens Wiklander } 1659817466cbSJens Wiklander } 1660817466cbSJens Wiklander 166111fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &Z, &P->Z, &T1 ) ); 166211fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &T3, &T1, &T1 ) ); 166311fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &T4, &T3, &T1 ) ); 166411fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &T3, &T3, &P->X ) ); 166511fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_copy( &T1, &T3 ) ); 166611fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_shift_l_mod( grp, &T1, 1 ) ); 166711fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &X, &T2, &T2 ) ); 166811fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_sub_mod( grp, &X, &X, &T1 ) ); 166911fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_sub_mod( grp, &X, &X, &T4 ) ); 167011fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_sub_mod( grp, &T3, &T3, &X ) ); 167111fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &T3, &T3, &T2 ) ); 167211fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &T4, &T4, &P->Y ) ); 167311fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_sub_mod( grp, &Y, &T3, &T4 ) ); 1674817466cbSJens Wiklander 1675817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_copy( &R->X, &X ) ); 1676817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_copy( &R->Y, &Y ) ); 1677817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_copy( &R->Z, &Z ) ); 1678817466cbSJens Wiklander 1679817466cbSJens Wiklander cleanup: 1680817466cbSJens Wiklander 1681817466cbSJens Wiklander mbedtls_mpi_free( &T1 ); mbedtls_mpi_free( &T2 ); mbedtls_mpi_free( &T3 ); mbedtls_mpi_free( &T4 ); 1682817466cbSJens Wiklander mbedtls_mpi_free( &X ); mbedtls_mpi_free( &Y ); mbedtls_mpi_free( &Z ); 1683817466cbSJens Wiklander 1684817466cbSJens Wiklander return( ret ); 16857901324dSJerome Forissier #endif /* !defined(MBEDTLS_ECP_NO_FALLBACK) || !defined(MBEDTLS_ECP_ADD_MIXED_ALT) */ 1686817466cbSJens Wiklander } 1687817466cbSJens Wiklander 1688817466cbSJens Wiklander /* 1689817466cbSJens Wiklander * Randomize jacobian coordinates: 1690817466cbSJens Wiklander * (X, Y, Z) -> (l^2 X, l^3 Y, l Z) for random l 1691817466cbSJens Wiklander * This is sort of the reverse operation of ecp_normalize_jac(). 1692817466cbSJens Wiklander * 1693817466cbSJens Wiklander * This countermeasure was first suggested in [2]. 1694817466cbSJens Wiklander */ 1695817466cbSJens Wiklander static int ecp_randomize_jac( const mbedtls_ecp_group *grp, mbedtls_ecp_point *pt, 1696817466cbSJens Wiklander int (*f_rng)(void *, unsigned char *, size_t), void *p_rng ) 1697817466cbSJens Wiklander { 1698817466cbSJens Wiklander #if defined(MBEDTLS_ECP_RANDOMIZE_JAC_ALT) 1699817466cbSJens Wiklander if( mbedtls_internal_ecp_grp_capable( grp ) ) 17003d3b0591SJens Wiklander return( mbedtls_internal_ecp_randomize_jac( grp, pt, f_rng, p_rng ) ); 1701817466cbSJens Wiklander #endif /* MBEDTLS_ECP_RANDOMIZE_JAC_ALT */ 1702817466cbSJens Wiklander 17037901324dSJerome Forissier #if defined(MBEDTLS_ECP_NO_FALLBACK) && defined(MBEDTLS_ECP_RANDOMIZE_JAC_ALT) 17047901324dSJerome Forissier return( MBEDTLS_ERR_ECP_FEATURE_UNAVAILABLE ); 17057901324dSJerome Forissier #else 17067901324dSJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 17077901324dSJerome Forissier mbedtls_mpi l, ll; 17087901324dSJerome Forissier 1709817466cbSJens Wiklander mbedtls_mpi_init( &l ); mbedtls_mpi_init( &ll ); 1710817466cbSJens Wiklander 1711817466cbSJens Wiklander /* Generate l such that 1 < l < p */ 17127901324dSJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_random( &l, 2, &grp->P, f_rng, p_rng ) ); 1713817466cbSJens Wiklander 1714817466cbSJens Wiklander /* Z = l * Z */ 171511fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &pt->Z, &pt->Z, &l ) ); 1716817466cbSJens Wiklander 1717817466cbSJens Wiklander /* X = l^2 * X */ 171811fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &ll, &l, &l ) ); 171911fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &pt->X, &pt->X, &ll ) ); 1720817466cbSJens Wiklander 1721817466cbSJens Wiklander /* Y = l^3 * Y */ 172211fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &ll, &ll, &l ) ); 172311fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &pt->Y, &pt->Y, &ll ) ); 1724817466cbSJens Wiklander 1725817466cbSJens Wiklander cleanup: 1726817466cbSJens Wiklander mbedtls_mpi_free( &l ); mbedtls_mpi_free( &ll ); 1727817466cbSJens Wiklander 17287901324dSJerome Forissier if( ret == MBEDTLS_ERR_MPI_NOT_ACCEPTABLE ) 17297901324dSJerome Forissier ret = MBEDTLS_ERR_ECP_RANDOM_FAILED; 1730817466cbSJens Wiklander return( ret ); 17317901324dSJerome Forissier #endif /* !defined(MBEDTLS_ECP_NO_FALLBACK) || !defined(MBEDTLS_ECP_RANDOMIZE_JAC_ALT) */ 1732817466cbSJens Wiklander } 1733817466cbSJens Wiklander 1734817466cbSJens Wiklander /* 1735817466cbSJens Wiklander * Check and define parameters used by the comb method (see below for details) 1736817466cbSJens Wiklander */ 1737817466cbSJens Wiklander #if MBEDTLS_ECP_WINDOW_SIZE < 2 || MBEDTLS_ECP_WINDOW_SIZE > 7 1738817466cbSJens Wiklander #error "MBEDTLS_ECP_WINDOW_SIZE out of bounds" 1739817466cbSJens Wiklander #endif 1740817466cbSJens Wiklander 1741817466cbSJens Wiklander /* d = ceil( n / w ) */ 1742817466cbSJens Wiklander #define COMB_MAX_D ( MBEDTLS_ECP_MAX_BITS + 1 ) / 2 1743817466cbSJens Wiklander 1744817466cbSJens Wiklander /* number of precomputed points */ 1745817466cbSJens Wiklander #define COMB_MAX_PRE ( 1 << ( MBEDTLS_ECP_WINDOW_SIZE - 1 ) ) 1746817466cbSJens Wiklander 1747817466cbSJens Wiklander /* 1748817466cbSJens Wiklander * Compute the representation of m that will be used with our comb method. 1749817466cbSJens Wiklander * 1750817466cbSJens Wiklander * The basic comb method is described in GECC 3.44 for example. We use a 1751817466cbSJens Wiklander * modified version that provides resistance to SPA by avoiding zero 1752817466cbSJens Wiklander * digits in the representation as in [3]. We modify the method further by 1753817466cbSJens Wiklander * requiring that all K_i be odd, which has the small cost that our 17543d3b0591SJens Wiklander * representation uses one more K_i, due to carries, but saves on the size of 17553d3b0591SJens Wiklander * the precomputed table. 1756817466cbSJens Wiklander * 17573d3b0591SJens Wiklander * Summary of the comb method and its modifications: 17583d3b0591SJens Wiklander * 17593d3b0591SJens Wiklander * - The goal is to compute m*P for some w*d-bit integer m. 17603d3b0591SJens Wiklander * 17613d3b0591SJens Wiklander * - The basic comb method splits m into the w-bit integers 17623d3b0591SJens Wiklander * x[0] .. x[d-1] where x[i] consists of the bits in m whose 17633d3b0591SJens Wiklander * index has residue i modulo d, and computes m * P as 17643d3b0591SJens Wiklander * S[x[0]] + 2 * S[x[1]] + .. + 2^(d-1) S[x[d-1]], where 17653d3b0591SJens Wiklander * S[i_{w-1} .. i_0] := i_{w-1} 2^{(w-1)d} P + ... + i_1 2^d P + i_0 P. 17663d3b0591SJens Wiklander * 17673d3b0591SJens Wiklander * - If it happens that, say, x[i+1]=0 (=> S[x[i+1]]=0), one can replace the sum by 17683d3b0591SJens Wiklander * .. + 2^{i-1} S[x[i-1]] - 2^i S[x[i]] + 2^{i+1} S[x[i]] + 2^{i+2} S[x[i+2]] .., 17693d3b0591SJens Wiklander * thereby successively converting it into a form where all summands 17703d3b0591SJens Wiklander * are nonzero, at the cost of negative summands. This is the basic idea of [3]. 17713d3b0591SJens Wiklander * 17723d3b0591SJens Wiklander * - More generally, even if x[i+1] != 0, we can first transform the sum as 17733d3b0591SJens Wiklander * .. - 2^i S[x[i]] + 2^{i+1} ( S[x[i]] + S[x[i+1]] ) + 2^{i+2} S[x[i+2]] .., 17743d3b0591SJens Wiklander * and then replace S[x[i]] + S[x[i+1]] = S[x[i] ^ x[i+1]] + 2 S[x[i] & x[i+1]]. 17753d3b0591SJens Wiklander * Performing and iterating this procedure for those x[i] that are even 17763d3b0591SJens Wiklander * (keeping track of carry), we can transform the original sum into one of the form 17773d3b0591SJens Wiklander * S[x'[0]] +- 2 S[x'[1]] +- .. +- 2^{d-1} S[x'[d-1]] + 2^d S[x'[d]] 17783d3b0591SJens Wiklander * with all x'[i] odd. It is therefore only necessary to know S at odd indices, 17793d3b0591SJens Wiklander * which is why we are only computing half of it in the first place in 17803d3b0591SJens Wiklander * ecp_precompute_comb and accessing it with index abs(i) / 2 in ecp_select_comb. 17813d3b0591SJens Wiklander * 17823d3b0591SJens Wiklander * - For the sake of compactness, only the seven low-order bits of x[i] 17833d3b0591SJens Wiklander * are used to represent its absolute value (K_i in the paper), and the msb 17843d3b0591SJens Wiklander * of x[i] encodes the sign (s_i in the paper): it is set if and only if 17853d3b0591SJens Wiklander * if s_i == -1; 1786817466cbSJens Wiklander * 1787817466cbSJens Wiklander * Calling conventions: 1788817466cbSJens Wiklander * - x is an array of size d + 1 1789817466cbSJens Wiklander * - w is the size, ie number of teeth, of the comb, and must be between 1790817466cbSJens Wiklander * 2 and 7 (in practice, between 2 and MBEDTLS_ECP_WINDOW_SIZE) 1791817466cbSJens Wiklander * - m is the MPI, expected to be odd and such that bitlength(m) <= w * d 1792817466cbSJens Wiklander * (the result will be incorrect if these assumptions are not satisfied) 1793817466cbSJens Wiklander */ 17943d3b0591SJens Wiklander static void ecp_comb_recode_core( unsigned char x[], size_t d, 1795817466cbSJens Wiklander unsigned char w, const mbedtls_mpi *m ) 1796817466cbSJens Wiklander { 1797817466cbSJens Wiklander size_t i, j; 1798817466cbSJens Wiklander unsigned char c, cc, adjust; 1799817466cbSJens Wiklander 1800817466cbSJens Wiklander memset( x, 0, d+1 ); 1801817466cbSJens Wiklander 1802817466cbSJens Wiklander /* First get the classical comb values (except for x_d = 0) */ 1803817466cbSJens Wiklander for( i = 0; i < d; i++ ) 1804817466cbSJens Wiklander for( j = 0; j < w; j++ ) 1805817466cbSJens Wiklander x[i] |= mbedtls_mpi_get_bit( m, i + d * j ) << j; 1806817466cbSJens Wiklander 1807817466cbSJens Wiklander /* Now make sure x_1 .. x_d are odd */ 1808817466cbSJens Wiklander c = 0; 1809817466cbSJens Wiklander for( i = 1; i <= d; i++ ) 1810817466cbSJens Wiklander { 1811817466cbSJens Wiklander /* Add carry and update it */ 1812817466cbSJens Wiklander cc = x[i] & c; 1813817466cbSJens Wiklander x[i] = x[i] ^ c; 1814817466cbSJens Wiklander c = cc; 1815817466cbSJens Wiklander 1816817466cbSJens Wiklander /* Adjust if needed, avoiding branches */ 1817817466cbSJens Wiklander adjust = 1 - ( x[i] & 0x01 ); 1818817466cbSJens Wiklander c |= x[i] & ( x[i-1] * adjust ); 1819817466cbSJens Wiklander x[i] = x[i] ^ ( x[i-1] * adjust ); 1820817466cbSJens Wiklander x[i-1] |= adjust << 7; 1821817466cbSJens Wiklander } 1822817466cbSJens Wiklander } 1823817466cbSJens Wiklander 1824817466cbSJens Wiklander /* 18253d3b0591SJens Wiklander * Precompute points for the adapted comb method 1826817466cbSJens Wiklander * 18273d3b0591SJens Wiklander * Assumption: T must be able to hold 2^{w - 1} elements. 1828817466cbSJens Wiklander * 18293d3b0591SJens Wiklander * Operation: If i = i_{w-1} ... i_1 is the binary representation of i, 18303d3b0591SJens Wiklander * sets T[i] = i_{w-1} 2^{(w-1)d} P + ... + i_1 2^d P + P. 1831817466cbSJens Wiklander * 1832817466cbSJens Wiklander * Cost: d(w-1) D + (2^{w-1} - 1) A + 1 N(w-1) + 1 N(2^{w-1} - 1) 18333d3b0591SJens Wiklander * 18343d3b0591SJens Wiklander * Note: Even comb values (those where P would be omitted from the 18353d3b0591SJens Wiklander * sum defining T[i] above) are not needed in our adaption 18363d3b0591SJens Wiklander * the comb method. See ecp_comb_recode_core(). 18373d3b0591SJens Wiklander * 18383d3b0591SJens Wiklander * This function currently works in four steps: 18393d3b0591SJens Wiklander * (1) [dbl] Computation of intermediate T[i] for 2-power values of i 18403d3b0591SJens Wiklander * (2) [norm_dbl] Normalization of coordinates of these T[i] 18413d3b0591SJens Wiklander * (3) [add] Computation of all T[i] 18423d3b0591SJens Wiklander * (4) [norm_add] Normalization of all T[i] 18433d3b0591SJens Wiklander * 18443d3b0591SJens Wiklander * Step 1 can be interrupted but not the others; together with the final 18453d3b0591SJens Wiklander * coordinate normalization they are the largest steps done at once, depending 18463d3b0591SJens Wiklander * on the window size. Here are operation counts for P-256: 18473d3b0591SJens Wiklander * 18483d3b0591SJens Wiklander * step (2) (3) (4) 18493d3b0591SJens Wiklander * w = 5 142 165 208 18503d3b0591SJens Wiklander * w = 4 136 77 160 18513d3b0591SJens Wiklander * w = 3 130 33 136 18523d3b0591SJens Wiklander * w = 2 124 11 124 18533d3b0591SJens Wiklander * 18543d3b0591SJens Wiklander * So if ECC operations are blocking for too long even with a low max_ops 18553d3b0591SJens Wiklander * value, it's useful to set MBEDTLS_ECP_WINDOW_SIZE to a lower value in order 18563d3b0591SJens Wiklander * to minimize maximum blocking time. 1857817466cbSJens Wiklander */ 1858817466cbSJens Wiklander static int ecp_precompute_comb( const mbedtls_ecp_group *grp, 1859817466cbSJens Wiklander mbedtls_ecp_point T[], const mbedtls_ecp_point *P, 18603d3b0591SJens Wiklander unsigned char w, size_t d, 18613d3b0591SJens Wiklander mbedtls_ecp_restart_ctx *rs_ctx ) 1862817466cbSJens Wiklander { 186311fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 18643d3b0591SJens Wiklander unsigned char i; 18653d3b0591SJens Wiklander size_t j = 0; 18663d3b0591SJens Wiklander const unsigned char T_size = 1U << ( w - 1 ); 1867817466cbSJens Wiklander mbedtls_ecp_point *cur, *TT[COMB_MAX_PRE - 1]; 1868817466cbSJens Wiklander 18693d3b0591SJens Wiklander #if defined(MBEDTLS_ECP_RESTARTABLE) 18703d3b0591SJens Wiklander if( rs_ctx != NULL && rs_ctx->rsm != NULL ) 18713d3b0591SJens Wiklander { 18723d3b0591SJens Wiklander if( rs_ctx->rsm->state == ecp_rsm_pre_dbl ) 18733d3b0591SJens Wiklander goto dbl; 18743d3b0591SJens Wiklander if( rs_ctx->rsm->state == ecp_rsm_pre_norm_dbl ) 18753d3b0591SJens Wiklander goto norm_dbl; 18763d3b0591SJens Wiklander if( rs_ctx->rsm->state == ecp_rsm_pre_add ) 18773d3b0591SJens Wiklander goto add; 18783d3b0591SJens Wiklander if( rs_ctx->rsm->state == ecp_rsm_pre_norm_add ) 18793d3b0591SJens Wiklander goto norm_add; 18803d3b0591SJens Wiklander } 18813d3b0591SJens Wiklander #else 18823d3b0591SJens Wiklander (void) rs_ctx; 18833d3b0591SJens Wiklander #endif 18843d3b0591SJens Wiklander 18853d3b0591SJens Wiklander #if defined(MBEDTLS_ECP_RESTARTABLE) 18863d3b0591SJens Wiklander if( rs_ctx != NULL && rs_ctx->rsm != NULL ) 18873d3b0591SJens Wiklander { 18883d3b0591SJens Wiklander rs_ctx->rsm->state = ecp_rsm_pre_dbl; 18893d3b0591SJens Wiklander 18903d3b0591SJens Wiklander /* initial state for the loop */ 18913d3b0591SJens Wiklander rs_ctx->rsm->i = 0; 18923d3b0591SJens Wiklander } 18933d3b0591SJens Wiklander 18943d3b0591SJens Wiklander dbl: 18953d3b0591SJens Wiklander #endif 1896817466cbSJens Wiklander /* 1897817466cbSJens Wiklander * Set T[0] = P and 1898817466cbSJens Wiklander * T[2^{l-1}] = 2^{dl} P for l = 1 .. w-1 (this is not the final value) 1899817466cbSJens Wiklander */ 1900817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_ecp_copy( &T[0], P ) ); 1901817466cbSJens Wiklander 19023d3b0591SJens Wiklander #if defined(MBEDTLS_ECP_RESTARTABLE) 19033d3b0591SJens Wiklander if( rs_ctx != NULL && rs_ctx->rsm != NULL && rs_ctx->rsm->i != 0 ) 19043d3b0591SJens Wiklander j = rs_ctx->rsm->i; 19053d3b0591SJens Wiklander else 19063d3b0591SJens Wiklander #endif 19073d3b0591SJens Wiklander j = 0; 1908817466cbSJens Wiklander 19093d3b0591SJens Wiklander for( ; j < d * ( w - 1 ); j++ ) 19103d3b0591SJens Wiklander { 19113d3b0591SJens Wiklander MBEDTLS_ECP_BUDGET( MBEDTLS_ECP_OPS_DBL ); 19123d3b0591SJens Wiklander 19133d3b0591SJens Wiklander i = 1U << ( j / d ); 19143d3b0591SJens Wiklander cur = T + i; 19153d3b0591SJens Wiklander 19163d3b0591SJens Wiklander if( j % d == 0 ) 19173d3b0591SJens Wiklander MBEDTLS_MPI_CHK( mbedtls_ecp_copy( cur, T + ( i >> 1 ) ) ); 19183d3b0591SJens Wiklander 19193d3b0591SJens Wiklander MBEDTLS_MPI_CHK( ecp_double_jac( grp, cur, cur ) ); 1920817466cbSJens Wiklander } 1921817466cbSJens Wiklander 19223d3b0591SJens Wiklander #if defined(MBEDTLS_ECP_RESTARTABLE) 19233d3b0591SJens Wiklander if( rs_ctx != NULL && rs_ctx->rsm != NULL ) 19243d3b0591SJens Wiklander rs_ctx->rsm->state = ecp_rsm_pre_norm_dbl; 1925817466cbSJens Wiklander 19263d3b0591SJens Wiklander norm_dbl: 19273d3b0591SJens Wiklander #endif 19283d3b0591SJens Wiklander /* 19293d3b0591SJens Wiklander * Normalize current elements in T. As T has holes, 19303d3b0591SJens Wiklander * use an auxiliary array of pointers to elements in T. 19313d3b0591SJens Wiklander */ 19323d3b0591SJens Wiklander j = 0; 19333d3b0591SJens Wiklander for( i = 1; i < T_size; i <<= 1 ) 19343d3b0591SJens Wiklander TT[j++] = T + i; 19353d3b0591SJens Wiklander 19363d3b0591SJens Wiklander MBEDTLS_ECP_BUDGET( MBEDTLS_ECP_OPS_INV + 6 * j - 2 ); 19373d3b0591SJens Wiklander 19383d3b0591SJens Wiklander MBEDTLS_MPI_CHK( ecp_normalize_jac_many( grp, TT, j ) ); 19393d3b0591SJens Wiklander 19403d3b0591SJens Wiklander #if defined(MBEDTLS_ECP_RESTARTABLE) 19413d3b0591SJens Wiklander if( rs_ctx != NULL && rs_ctx->rsm != NULL ) 19423d3b0591SJens Wiklander rs_ctx->rsm->state = ecp_rsm_pre_add; 19433d3b0591SJens Wiklander 19443d3b0591SJens Wiklander add: 19453d3b0591SJens Wiklander #endif 1946817466cbSJens Wiklander /* 1947817466cbSJens Wiklander * Compute the remaining ones using the minimal number of additions 1948817466cbSJens Wiklander * Be careful to update T[2^l] only after using it! 1949817466cbSJens Wiklander */ 19503d3b0591SJens Wiklander MBEDTLS_ECP_BUDGET( ( T_size - 1 ) * MBEDTLS_ECP_OPS_ADD ); 19513d3b0591SJens Wiklander 19523d3b0591SJens Wiklander for( i = 1; i < T_size; i <<= 1 ) 1953817466cbSJens Wiklander { 1954817466cbSJens Wiklander j = i; 1955817466cbSJens Wiklander while( j-- ) 1956817466cbSJens Wiklander MBEDTLS_MPI_CHK( ecp_add_mixed( grp, &T[i + j], &T[j], &T[i] ) ); 1957817466cbSJens Wiklander } 1958817466cbSJens Wiklander 19593d3b0591SJens Wiklander #if defined(MBEDTLS_ECP_RESTARTABLE) 19603d3b0591SJens Wiklander if( rs_ctx != NULL && rs_ctx->rsm != NULL ) 19613d3b0591SJens Wiklander rs_ctx->rsm->state = ecp_rsm_pre_norm_add; 19623d3b0591SJens Wiklander 19633d3b0591SJens Wiklander norm_add: 19643d3b0591SJens Wiklander #endif 19653d3b0591SJens Wiklander /* 19663d3b0591SJens Wiklander * Normalize final elements in T. Even though there are no holes now, we 19673d3b0591SJens Wiklander * still need the auxiliary array for homogeneity with the previous 19683d3b0591SJens Wiklander * call. Also, skip T[0] which is already normalised, being a copy of P. 19693d3b0591SJens Wiklander */ 19703d3b0591SJens Wiklander for( j = 0; j + 1 < T_size; j++ ) 19713d3b0591SJens Wiklander TT[j] = T + j + 1; 19723d3b0591SJens Wiklander 19733d3b0591SJens Wiklander MBEDTLS_ECP_BUDGET( MBEDTLS_ECP_OPS_INV + 6 * j - 2 ); 19743d3b0591SJens Wiklander 19753d3b0591SJens Wiklander MBEDTLS_MPI_CHK( ecp_normalize_jac_many( grp, TT, j ) ); 1976817466cbSJens Wiklander 1977817466cbSJens Wiklander cleanup: 19783d3b0591SJens Wiklander #if defined(MBEDTLS_ECP_RESTARTABLE) 19793d3b0591SJens Wiklander if( rs_ctx != NULL && rs_ctx->rsm != NULL && 19803d3b0591SJens Wiklander ret == MBEDTLS_ERR_ECP_IN_PROGRESS ) 19813d3b0591SJens Wiklander { 19823d3b0591SJens Wiklander if( rs_ctx->rsm->state == ecp_rsm_pre_dbl ) 19833d3b0591SJens Wiklander rs_ctx->rsm->i = j; 19843d3b0591SJens Wiklander } 19853d3b0591SJens Wiklander #endif 1986817466cbSJens Wiklander 1987817466cbSJens Wiklander return( ret ); 1988817466cbSJens Wiklander } 1989817466cbSJens Wiklander 1990817466cbSJens Wiklander /* 1991817466cbSJens Wiklander * Select precomputed point: R = sign(i) * T[ abs(i) / 2 ] 19923d3b0591SJens Wiklander * 19933d3b0591SJens Wiklander * See ecp_comb_recode_core() for background 1994817466cbSJens Wiklander */ 1995817466cbSJens Wiklander static int ecp_select_comb( const mbedtls_ecp_group *grp, mbedtls_ecp_point *R, 19963d3b0591SJens Wiklander const mbedtls_ecp_point T[], unsigned char T_size, 1997817466cbSJens Wiklander unsigned char i ) 1998817466cbSJens Wiklander { 199911fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 2000817466cbSJens Wiklander unsigned char ii, j; 2001817466cbSJens Wiklander 2002817466cbSJens Wiklander /* Ignore the "sign" bit and scale down */ 2003817466cbSJens Wiklander ii = ( i & 0x7Fu ) >> 1; 2004817466cbSJens Wiklander 2005817466cbSJens Wiklander /* Read the whole table to thwart cache-based timing attacks */ 20063d3b0591SJens Wiklander for( j = 0; j < T_size; j++ ) 2007817466cbSJens Wiklander { 2008817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_safe_cond_assign( &R->X, &T[j].X, j == ii ) ); 2009817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_safe_cond_assign( &R->Y, &T[j].Y, j == ii ) ); 2010817466cbSJens Wiklander } 2011817466cbSJens Wiklander 2012817466cbSJens Wiklander /* Safely invert result if i is "negative" */ 2013817466cbSJens Wiklander MBEDTLS_MPI_CHK( ecp_safe_invert_jac( grp, R, i >> 7 ) ); 2014817466cbSJens Wiklander 2015817466cbSJens Wiklander cleanup: 2016817466cbSJens Wiklander return( ret ); 2017817466cbSJens Wiklander } 2018817466cbSJens Wiklander 2019817466cbSJens Wiklander /* 2020817466cbSJens Wiklander * Core multiplication algorithm for the (modified) comb method. 2021817466cbSJens Wiklander * This part is actually common with the basic comb method (GECC 3.44) 2022817466cbSJens Wiklander * 2023817466cbSJens Wiklander * Cost: d A + d D + 1 R 2024817466cbSJens Wiklander */ 2025817466cbSJens Wiklander static int ecp_mul_comb_core( const mbedtls_ecp_group *grp, mbedtls_ecp_point *R, 20263d3b0591SJens Wiklander const mbedtls_ecp_point T[], unsigned char T_size, 2027817466cbSJens Wiklander const unsigned char x[], size_t d, 2028817466cbSJens Wiklander int (*f_rng)(void *, unsigned char *, size_t), 20293d3b0591SJens Wiklander void *p_rng, 20303d3b0591SJens Wiklander mbedtls_ecp_restart_ctx *rs_ctx ) 2031817466cbSJens Wiklander { 203211fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 2033817466cbSJens Wiklander mbedtls_ecp_point Txi; 2034817466cbSJens Wiklander size_t i; 2035817466cbSJens Wiklander 2036817466cbSJens Wiklander mbedtls_ecp_point_init( &Txi ); 2037817466cbSJens Wiklander 20383d3b0591SJens Wiklander #if !defined(MBEDTLS_ECP_RESTARTABLE) 20393d3b0591SJens Wiklander (void) rs_ctx; 20403d3b0591SJens Wiklander #endif 20413d3b0591SJens Wiklander 20423d3b0591SJens Wiklander #if defined(MBEDTLS_ECP_RESTARTABLE) 20433d3b0591SJens Wiklander if( rs_ctx != NULL && rs_ctx->rsm != NULL && 20443d3b0591SJens Wiklander rs_ctx->rsm->state != ecp_rsm_comb_core ) 20453d3b0591SJens Wiklander { 20463d3b0591SJens Wiklander rs_ctx->rsm->i = 0; 20473d3b0591SJens Wiklander rs_ctx->rsm->state = ecp_rsm_comb_core; 20483d3b0591SJens Wiklander } 20493d3b0591SJens Wiklander 20503d3b0591SJens Wiklander /* new 'if' instead of nested for the sake of the 'else' branch */ 20513d3b0591SJens Wiklander if( rs_ctx != NULL && rs_ctx->rsm != NULL && rs_ctx->rsm->i != 0 ) 20523d3b0591SJens Wiklander { 20533d3b0591SJens Wiklander /* restore current index (R already pointing to rs_ctx->rsm->R) */ 20543d3b0591SJens Wiklander i = rs_ctx->rsm->i; 20553d3b0591SJens Wiklander } 20563d3b0591SJens Wiklander else 20573d3b0591SJens Wiklander #endif 20583d3b0591SJens Wiklander { 2059817466cbSJens Wiklander /* Start with a non-zero point and randomize its coordinates */ 2060817466cbSJens Wiklander i = d; 20613d3b0591SJens Wiklander MBEDTLS_MPI_CHK( ecp_select_comb( grp, R, T, T_size, x[i] ) ); 2062817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_lset( &R->Z, 1 ) ); 20637901324dSJerome Forissier #if defined(MBEDTLS_ECP_NO_INTERNAL_RNG) 2064817466cbSJens Wiklander if( f_rng != 0 ) 20657901324dSJerome Forissier #endif 2066817466cbSJens Wiklander MBEDTLS_MPI_CHK( ecp_randomize_jac( grp, R, f_rng, p_rng ) ); 20673d3b0591SJens Wiklander } 2068817466cbSJens Wiklander 20693d3b0591SJens Wiklander while( i != 0 ) 2070817466cbSJens Wiklander { 20713d3b0591SJens Wiklander MBEDTLS_ECP_BUDGET( MBEDTLS_ECP_OPS_DBL + MBEDTLS_ECP_OPS_ADD ); 20723d3b0591SJens Wiklander --i; 20733d3b0591SJens Wiklander 2074817466cbSJens Wiklander MBEDTLS_MPI_CHK( ecp_double_jac( grp, R, R ) ); 20753d3b0591SJens Wiklander MBEDTLS_MPI_CHK( ecp_select_comb( grp, &Txi, T, T_size, x[i] ) ); 2076817466cbSJens Wiklander MBEDTLS_MPI_CHK( ecp_add_mixed( grp, R, R, &Txi ) ); 2077817466cbSJens Wiklander } 2078817466cbSJens Wiklander 2079817466cbSJens Wiklander cleanup: 2080817466cbSJens Wiklander 2081817466cbSJens Wiklander mbedtls_ecp_point_free( &Txi ); 2082817466cbSJens Wiklander 20833d3b0591SJens Wiklander #if defined(MBEDTLS_ECP_RESTARTABLE) 20843d3b0591SJens Wiklander if( rs_ctx != NULL && rs_ctx->rsm != NULL && 20853d3b0591SJens Wiklander ret == MBEDTLS_ERR_ECP_IN_PROGRESS ) 20863d3b0591SJens Wiklander { 20873d3b0591SJens Wiklander rs_ctx->rsm->i = i; 20883d3b0591SJens Wiklander /* no need to save R, already pointing to rs_ctx->rsm->R */ 20893d3b0591SJens Wiklander } 20903d3b0591SJens Wiklander #endif 20913d3b0591SJens Wiklander 2092817466cbSJens Wiklander return( ret ); 2093817466cbSJens Wiklander } 2094817466cbSJens Wiklander 2095817466cbSJens Wiklander /* 20963d3b0591SJens Wiklander * Recode the scalar to get constant-time comb multiplication 20973d3b0591SJens Wiklander * 20983d3b0591SJens Wiklander * As the actual scalar recoding needs an odd scalar as a starting point, 20993d3b0591SJens Wiklander * this wrapper ensures that by replacing m by N - m if necessary, and 21003d3b0591SJens Wiklander * informs the caller that the result of multiplication will be negated. 21013d3b0591SJens Wiklander * 21023d3b0591SJens Wiklander * This works because we only support large prime order for Short Weierstrass 21033d3b0591SJens Wiklander * curves, so N is always odd hence either m or N - m is. 21043d3b0591SJens Wiklander * 21053d3b0591SJens Wiklander * See ecp_comb_recode_core() for background. 2106817466cbSJens Wiklander */ 21073d3b0591SJens Wiklander static int ecp_comb_recode_scalar( const mbedtls_ecp_group *grp, 21083d3b0591SJens Wiklander const mbedtls_mpi *m, 21093d3b0591SJens Wiklander unsigned char k[COMB_MAX_D + 1], 21103d3b0591SJens Wiklander size_t d, 21113d3b0591SJens Wiklander unsigned char w, 21123d3b0591SJens Wiklander unsigned char *parity_trick ) 2113817466cbSJens Wiklander { 211411fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 2115817466cbSJens Wiklander mbedtls_mpi M, mm; 2116817466cbSJens Wiklander 2117817466cbSJens Wiklander mbedtls_mpi_init( &M ); 2118817466cbSJens Wiklander mbedtls_mpi_init( &mm ); 2119817466cbSJens Wiklander 21203d3b0591SJens Wiklander /* N is always odd (see above), just make extra sure */ 2121817466cbSJens Wiklander if( mbedtls_mpi_get_bit( &grp->N, 0 ) != 1 ) 2122817466cbSJens Wiklander return( MBEDTLS_ERR_ECP_BAD_INPUT_DATA ); 2123817466cbSJens Wiklander 21243d3b0591SJens Wiklander /* do we need the parity trick? */ 21253d3b0591SJens Wiklander *parity_trick = ( mbedtls_mpi_get_bit( m, 0 ) == 0 ); 21263d3b0591SJens Wiklander 21273d3b0591SJens Wiklander /* execute parity fix in constant time */ 21283d3b0591SJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_copy( &M, m ) ); 21293d3b0591SJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_sub_mpi( &mm, &grp->N, m ) ); 21303d3b0591SJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_safe_cond_assign( &M, &mm, *parity_trick ) ); 21313d3b0591SJens Wiklander 21323d3b0591SJens Wiklander /* actual scalar recoding */ 21333d3b0591SJens Wiklander ecp_comb_recode_core( k, d, w, &M ); 21343d3b0591SJens Wiklander 21353d3b0591SJens Wiklander cleanup: 21363d3b0591SJens Wiklander mbedtls_mpi_free( &mm ); 21373d3b0591SJens Wiklander mbedtls_mpi_free( &M ); 21383d3b0591SJens Wiklander 21393d3b0591SJens Wiklander return( ret ); 21403d3b0591SJens Wiklander } 21413d3b0591SJens Wiklander 21423d3b0591SJens Wiklander /* 21433d3b0591SJens Wiklander * Perform comb multiplication (for short Weierstrass curves) 21443d3b0591SJens Wiklander * once the auxiliary table has been pre-computed. 21453d3b0591SJens Wiklander * 21463d3b0591SJens Wiklander * Scalar recoding may use a parity trick that makes us compute -m * P, 21473d3b0591SJens Wiklander * if that is the case we'll need to recover m * P at the end. 21483d3b0591SJens Wiklander */ 21493d3b0591SJens Wiklander static int ecp_mul_comb_after_precomp( const mbedtls_ecp_group *grp, 21503d3b0591SJens Wiklander mbedtls_ecp_point *R, 21513d3b0591SJens Wiklander const mbedtls_mpi *m, 21523d3b0591SJens Wiklander const mbedtls_ecp_point *T, 21533d3b0591SJens Wiklander unsigned char T_size, 21543d3b0591SJens Wiklander unsigned char w, 21553d3b0591SJens Wiklander size_t d, 21563d3b0591SJens Wiklander int (*f_rng)(void *, unsigned char *, size_t), 21573d3b0591SJens Wiklander void *p_rng, 21583d3b0591SJens Wiklander mbedtls_ecp_restart_ctx *rs_ctx ) 21593d3b0591SJens Wiklander { 216011fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 21613d3b0591SJens Wiklander unsigned char parity_trick; 21623d3b0591SJens Wiklander unsigned char k[COMB_MAX_D + 1]; 21633d3b0591SJens Wiklander mbedtls_ecp_point *RR = R; 21643d3b0591SJens Wiklander 21653d3b0591SJens Wiklander #if defined(MBEDTLS_ECP_RESTARTABLE) 21663d3b0591SJens Wiklander if( rs_ctx != NULL && rs_ctx->rsm != NULL ) 21673d3b0591SJens Wiklander { 21683d3b0591SJens Wiklander RR = &rs_ctx->rsm->R; 21693d3b0591SJens Wiklander 21703d3b0591SJens Wiklander if( rs_ctx->rsm->state == ecp_rsm_final_norm ) 21713d3b0591SJens Wiklander goto final_norm; 21723d3b0591SJens Wiklander } 21733d3b0591SJens Wiklander #endif 21743d3b0591SJens Wiklander 21753d3b0591SJens Wiklander MBEDTLS_MPI_CHK( ecp_comb_recode_scalar( grp, m, k, d, w, 21763d3b0591SJens Wiklander &parity_trick ) ); 21773d3b0591SJens Wiklander MBEDTLS_MPI_CHK( ecp_mul_comb_core( grp, RR, T, T_size, k, d, 21783d3b0591SJens Wiklander f_rng, p_rng, rs_ctx ) ); 21793d3b0591SJens Wiklander MBEDTLS_MPI_CHK( ecp_safe_invert_jac( grp, RR, parity_trick ) ); 21803d3b0591SJens Wiklander 21813d3b0591SJens Wiklander #if defined(MBEDTLS_ECP_RESTARTABLE) 21823d3b0591SJens Wiklander if( rs_ctx != NULL && rs_ctx->rsm != NULL ) 21833d3b0591SJens Wiklander rs_ctx->rsm->state = ecp_rsm_final_norm; 21843d3b0591SJens Wiklander 21853d3b0591SJens Wiklander final_norm: 21867901324dSJerome Forissier MBEDTLS_ECP_BUDGET( MBEDTLS_ECP_OPS_INV ); 21873d3b0591SJens Wiklander #endif 218811fa71b9SJerome Forissier /* 218911fa71b9SJerome Forissier * Knowledge of the jacobian coordinates may leak the last few bits of the 219011fa71b9SJerome Forissier * scalar [1], and since our MPI implementation isn't constant-flow, 219111fa71b9SJerome Forissier * inversion (used for coordinate normalization) may leak the full value 219211fa71b9SJerome Forissier * of its input via side-channels [2]. 219311fa71b9SJerome Forissier * 219411fa71b9SJerome Forissier * [1] https://eprint.iacr.org/2003/191 219511fa71b9SJerome Forissier * [2] https://eprint.iacr.org/2020/055 219611fa71b9SJerome Forissier * 219711fa71b9SJerome Forissier * Avoid the leak by randomizing coordinates before we normalize them. 219811fa71b9SJerome Forissier */ 21997901324dSJerome Forissier #if defined(MBEDTLS_ECP_NO_INTERNAL_RNG) 220011fa71b9SJerome Forissier if( f_rng != 0 ) 22017901324dSJerome Forissier #endif 220211fa71b9SJerome Forissier MBEDTLS_MPI_CHK( ecp_randomize_jac( grp, RR, f_rng, p_rng ) ); 220311fa71b9SJerome Forissier 22043d3b0591SJens Wiklander MBEDTLS_MPI_CHK( ecp_normalize_jac( grp, RR ) ); 22053d3b0591SJens Wiklander 22063d3b0591SJens Wiklander #if defined(MBEDTLS_ECP_RESTARTABLE) 22073d3b0591SJens Wiklander if( rs_ctx != NULL && rs_ctx->rsm != NULL ) 22083d3b0591SJens Wiklander MBEDTLS_MPI_CHK( mbedtls_ecp_copy( R, RR ) ); 22093d3b0591SJens Wiklander #endif 22103d3b0591SJens Wiklander 22113d3b0591SJens Wiklander cleanup: 22123d3b0591SJens Wiklander return( ret ); 22133d3b0591SJens Wiklander } 22143d3b0591SJens Wiklander 22153d3b0591SJens Wiklander /* 22163d3b0591SJens Wiklander * Pick window size based on curve size and whether we optimize for base point 22173d3b0591SJens Wiklander */ 22183d3b0591SJens Wiklander static unsigned char ecp_pick_window_size( const mbedtls_ecp_group *grp, 22193d3b0591SJens Wiklander unsigned char p_eq_g ) 22203d3b0591SJens Wiklander { 22213d3b0591SJens Wiklander unsigned char w; 22223d3b0591SJens Wiklander 2223817466cbSJens Wiklander /* 2224817466cbSJens Wiklander * Minimize the number of multiplications, that is minimize 2225817466cbSJens Wiklander * 10 * d * w + 18 * 2^(w-1) + 11 * d + 7 * w, with d = ceil( nbits / w ) 2226817466cbSJens Wiklander * (see costs of the various parts, with 1S = 1M) 2227817466cbSJens Wiklander */ 2228817466cbSJens Wiklander w = grp->nbits >= 384 ? 5 : 4; 2229817466cbSJens Wiklander 2230817466cbSJens Wiklander /* 2231817466cbSJens Wiklander * If P == G, pre-compute a bit more, since this may be re-used later. 2232817466cbSJens Wiklander * Just adding one avoids upping the cost of the first mul too much, 2233817466cbSJens Wiklander * and the memory cost too. 2234817466cbSJens Wiklander */ 2235817466cbSJens Wiklander if( p_eq_g ) 2236817466cbSJens Wiklander w++; 2237817466cbSJens Wiklander 2238817466cbSJens Wiklander /* 2239817466cbSJens Wiklander * Make sure w is within bounds. 2240817466cbSJens Wiklander * (The last test is useful only for very small curves in the test suite.) 2241817466cbSJens Wiklander */ 224211fa71b9SJerome Forissier #if( MBEDTLS_ECP_WINDOW_SIZE < 6 ) 2243817466cbSJens Wiklander if( w > MBEDTLS_ECP_WINDOW_SIZE ) 2244817466cbSJens Wiklander w = MBEDTLS_ECP_WINDOW_SIZE; 224511fa71b9SJerome Forissier #endif 2246817466cbSJens Wiklander if( w >= grp->nbits ) 2247817466cbSJens Wiklander w = 2; 2248817466cbSJens Wiklander 22493d3b0591SJens Wiklander return( w ); 22503d3b0591SJens Wiklander } 2251817466cbSJens Wiklander 2252817466cbSJens Wiklander /* 22533d3b0591SJens Wiklander * Multiplication using the comb method - for curves in short Weierstrass form 22543d3b0591SJens Wiklander * 22553d3b0591SJens Wiklander * This function is mainly responsible for administrative work: 22563d3b0591SJens Wiklander * - managing the restart context if enabled 22573d3b0591SJens Wiklander * - managing the table of precomputed points (passed between the below two 2258*039e02dfSJerome Forissier * functions): allocation, computation, ownership transfer, freeing. 22593d3b0591SJens Wiklander * 22603d3b0591SJens Wiklander * It delegates the actual arithmetic work to: 22613d3b0591SJens Wiklander * ecp_precompute_comb() and ecp_mul_comb_with_precomp() 22623d3b0591SJens Wiklander * 22633d3b0591SJens Wiklander * See comments on ecp_comb_recode_core() regarding the computation strategy. 2264817466cbSJens Wiklander */ 22653d3b0591SJens Wiklander static int ecp_mul_comb( mbedtls_ecp_group *grp, mbedtls_ecp_point *R, 22663d3b0591SJens Wiklander const mbedtls_mpi *m, const mbedtls_ecp_point *P, 22673d3b0591SJens Wiklander int (*f_rng)(void *, unsigned char *, size_t), 22683d3b0591SJens Wiklander void *p_rng, 22693d3b0591SJens Wiklander mbedtls_ecp_restart_ctx *rs_ctx ) 2270817466cbSJens Wiklander { 227111fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 22723d3b0591SJens Wiklander unsigned char w, p_eq_g, i; 22733d3b0591SJens Wiklander size_t d; 22747901324dSJerome Forissier unsigned char T_size = 0, T_ok = 0; 22757901324dSJerome Forissier mbedtls_ecp_point *T = NULL; 22767901324dSJerome Forissier #if !defined(MBEDTLS_ECP_NO_INTERNAL_RNG) 22777901324dSJerome Forissier ecp_drbg_context drbg_ctx; 22787901324dSJerome Forissier 22797901324dSJerome Forissier ecp_drbg_init( &drbg_ctx ); 22807901324dSJerome Forissier #endif 22813d3b0591SJens Wiklander 22823d3b0591SJens Wiklander ECP_RS_ENTER( rsm ); 22833d3b0591SJens Wiklander 22847901324dSJerome Forissier #if !defined(MBEDTLS_ECP_NO_INTERNAL_RNG) 22857901324dSJerome Forissier if( f_rng == NULL ) 22867901324dSJerome Forissier { 22877901324dSJerome Forissier /* Adjust pointers */ 22887901324dSJerome Forissier f_rng = &ecp_drbg_random; 22897901324dSJerome Forissier #if defined(MBEDTLS_ECP_RESTARTABLE) 22907901324dSJerome Forissier if( rs_ctx != NULL && rs_ctx->rsm != NULL ) 22917901324dSJerome Forissier p_rng = &rs_ctx->rsm->drbg_ctx; 22927901324dSJerome Forissier else 22937901324dSJerome Forissier #endif 22947901324dSJerome Forissier p_rng = &drbg_ctx; 22957901324dSJerome Forissier 22967901324dSJerome Forissier /* Initialize internal DRBG if necessary */ 22977901324dSJerome Forissier #if defined(MBEDTLS_ECP_RESTARTABLE) 22987901324dSJerome Forissier if( rs_ctx == NULL || rs_ctx->rsm == NULL || 22997901324dSJerome Forissier rs_ctx->rsm->drbg_seeded == 0 ) 23007901324dSJerome Forissier #endif 23017901324dSJerome Forissier { 23027901324dSJerome Forissier const size_t m_len = ( grp->nbits + 7 ) / 8; 23037901324dSJerome Forissier MBEDTLS_MPI_CHK( ecp_drbg_seed( p_rng, m, m_len ) ); 23047901324dSJerome Forissier } 23057901324dSJerome Forissier #if defined(MBEDTLS_ECP_RESTARTABLE) 23067901324dSJerome Forissier if( rs_ctx != NULL && rs_ctx->rsm != NULL ) 23077901324dSJerome Forissier rs_ctx->rsm->drbg_seeded = 1; 23087901324dSJerome Forissier #endif 23097901324dSJerome Forissier } 23107901324dSJerome Forissier #endif /* !MBEDTLS_ECP_NO_INTERNAL_RNG */ 23117901324dSJerome Forissier 23123d3b0591SJens Wiklander /* Is P the base point ? */ 23133d3b0591SJens Wiklander #if MBEDTLS_ECP_FIXED_POINT_OPTIM == 1 23143d3b0591SJens Wiklander p_eq_g = ( mbedtls_mpi_cmp_mpi( &P->Y, &grp->G.Y ) == 0 && 23153d3b0591SJens Wiklander mbedtls_mpi_cmp_mpi( &P->X, &grp->G.X ) == 0 ); 23163d3b0591SJens Wiklander #else 23173d3b0591SJens Wiklander p_eq_g = 0; 23183d3b0591SJens Wiklander #endif 23193d3b0591SJens Wiklander 23203d3b0591SJens Wiklander /* Pick window size and deduce related sizes */ 23213d3b0591SJens Wiklander w = ecp_pick_window_size( grp, p_eq_g ); 23223d3b0591SJens Wiklander T_size = 1U << ( w - 1 ); 23233d3b0591SJens Wiklander d = ( grp->nbits + w - 1 ) / w; 23243d3b0591SJens Wiklander 23253d3b0591SJens Wiklander /* Pre-computed table: do we have it already for the base point? */ 23263d3b0591SJens Wiklander if( p_eq_g && grp->T != NULL ) 23273d3b0591SJens Wiklander { 23283d3b0591SJens Wiklander /* second pointer to the same table, will be deleted on exit */ 23293d3b0591SJens Wiklander T = grp->T; 23303d3b0591SJens Wiklander T_ok = 1; 23313d3b0591SJens Wiklander } 23323d3b0591SJens Wiklander else 23333d3b0591SJens Wiklander #if defined(MBEDTLS_ECP_RESTARTABLE) 23343d3b0591SJens Wiklander /* Pre-computed table: do we have one in progress? complete? */ 23353d3b0591SJens Wiklander if( rs_ctx != NULL && rs_ctx->rsm != NULL && rs_ctx->rsm->T != NULL ) 23363d3b0591SJens Wiklander { 23373d3b0591SJens Wiklander /* transfer ownership of T from rsm to local function */ 23383d3b0591SJens Wiklander T = rs_ctx->rsm->T; 23393d3b0591SJens Wiklander rs_ctx->rsm->T = NULL; 23403d3b0591SJens Wiklander rs_ctx->rsm->T_size = 0; 23413d3b0591SJens Wiklander 23423d3b0591SJens Wiklander /* This effectively jumps to the call to mul_comb_after_precomp() */ 23433d3b0591SJens Wiklander T_ok = rs_ctx->rsm->state >= ecp_rsm_comb_core; 23443d3b0591SJens Wiklander } 23453d3b0591SJens Wiklander else 23463d3b0591SJens Wiklander #endif 23473d3b0591SJens Wiklander /* Allocate table if we didn't have any */ 23483d3b0591SJens Wiklander { 23493d3b0591SJens Wiklander T = mbedtls_calloc( T_size, sizeof( mbedtls_ecp_point ) ); 2350817466cbSJens Wiklander if( T == NULL ) 2351817466cbSJens Wiklander { 2352817466cbSJens Wiklander ret = MBEDTLS_ERR_ECP_ALLOC_FAILED; 2353817466cbSJens Wiklander goto cleanup; 2354817466cbSJens Wiklander } 2355817466cbSJens Wiklander 23563d3b0591SJens Wiklander for( i = 0; i < T_size; i++ ) 23573d3b0591SJens Wiklander mbedtls_ecp_point_init( &T[i] ); 23583d3b0591SJens Wiklander 23593d3b0591SJens Wiklander T_ok = 0; 23603d3b0591SJens Wiklander } 23613d3b0591SJens Wiklander 23623d3b0591SJens Wiklander /* Compute table (or finish computing it) if not done already */ 23633d3b0591SJens Wiklander if( !T_ok ) 23643d3b0591SJens Wiklander { 23653d3b0591SJens Wiklander MBEDTLS_MPI_CHK( ecp_precompute_comb( grp, T, P, w, d, rs_ctx ) ); 2366817466cbSJens Wiklander 2367817466cbSJens Wiklander if( p_eq_g ) 2368817466cbSJens Wiklander { 23693d3b0591SJens Wiklander /* almost transfer ownership of T to the group, but keep a copy of 23703d3b0591SJens Wiklander * the pointer to use for calling the next function more easily */ 2371817466cbSJens Wiklander grp->T = T; 23723d3b0591SJens Wiklander grp->T_size = T_size; 2373817466cbSJens Wiklander } 2374817466cbSJens Wiklander } 2375817466cbSJens Wiklander 23763d3b0591SJens Wiklander /* Actual comb multiplication using precomputed points */ 23773d3b0591SJens Wiklander MBEDTLS_MPI_CHK( ecp_mul_comb_after_precomp( grp, R, m, 23783d3b0591SJens Wiklander T, T_size, w, d, 23793d3b0591SJens Wiklander f_rng, p_rng, rs_ctx ) ); 2380817466cbSJens Wiklander 2381817466cbSJens Wiklander cleanup: 2382817466cbSJens Wiklander 23837901324dSJerome Forissier #if !defined(MBEDTLS_ECP_NO_INTERNAL_RNG) 23847901324dSJerome Forissier ecp_drbg_free( &drbg_ctx ); 23857901324dSJerome Forissier #endif 23867901324dSJerome Forissier 23873d3b0591SJens Wiklander /* does T belong to the group? */ 23883d3b0591SJens Wiklander if( T == grp->T ) 23893d3b0591SJens Wiklander T = NULL; 23903d3b0591SJens Wiklander 23913d3b0591SJens Wiklander /* does T belong to the restart context? */ 23923d3b0591SJens Wiklander #if defined(MBEDTLS_ECP_RESTARTABLE) 23933d3b0591SJens Wiklander if( rs_ctx != NULL && rs_ctx->rsm != NULL && ret == MBEDTLS_ERR_ECP_IN_PROGRESS && T != NULL ) 2394817466cbSJens Wiklander { 23953d3b0591SJens Wiklander /* transfer ownership of T from local function to rsm */ 23963d3b0591SJens Wiklander rs_ctx->rsm->T_size = T_size; 23973d3b0591SJens Wiklander rs_ctx->rsm->T = T; 23983d3b0591SJens Wiklander T = NULL; 23993d3b0591SJens Wiklander } 24003d3b0591SJens Wiklander #endif 24013d3b0591SJens Wiklander 24023d3b0591SJens Wiklander /* did T belong to us? then let's destroy it! */ 24033d3b0591SJens Wiklander if( T != NULL ) 24043d3b0591SJens Wiklander { 24053d3b0591SJens Wiklander for( i = 0; i < T_size; i++ ) 2406817466cbSJens Wiklander mbedtls_ecp_point_free( &T[i] ); 2407817466cbSJens Wiklander mbedtls_free( T ); 2408817466cbSJens Wiklander } 2409817466cbSJens Wiklander 24103d3b0591SJens Wiklander /* don't free R while in progress in case R == P */ 24113d3b0591SJens Wiklander #if defined(MBEDTLS_ECP_RESTARTABLE) 24123d3b0591SJens Wiklander if( ret != MBEDTLS_ERR_ECP_IN_PROGRESS ) 24133d3b0591SJens Wiklander #endif 24143d3b0591SJens Wiklander /* prevent caller from using invalid value */ 2415817466cbSJens Wiklander if( ret != 0 ) 2416817466cbSJens Wiklander mbedtls_ecp_point_free( R ); 2417817466cbSJens Wiklander 24183d3b0591SJens Wiklander ECP_RS_LEAVE( rsm ); 24193d3b0591SJens Wiklander 2420817466cbSJens Wiklander return( ret ); 2421817466cbSJens Wiklander } 2422817466cbSJens Wiklander 24237901324dSJerome Forissier #endif /* MBEDTLS_ECP_SHORT_WEIERSTRASS_ENABLED */ 2424817466cbSJens Wiklander 24257901324dSJerome Forissier #if defined(MBEDTLS_ECP_MONTGOMERY_ENABLED) 2426817466cbSJens Wiklander /* 2427817466cbSJens Wiklander * For Montgomery curves, we do all the internal arithmetic in projective 2428817466cbSJens Wiklander * coordinates. Import/export of points uses only the x coordinates, which is 2429*039e02dfSJerome Forissier * internally represented as X / Z. 2430817466cbSJens Wiklander * 2431817466cbSJens Wiklander * For scalar multiplication, we'll use a Montgomery ladder. 2432817466cbSJens Wiklander */ 2433817466cbSJens Wiklander 2434817466cbSJens Wiklander /* 2435817466cbSJens Wiklander * Normalize Montgomery x/z coordinates: X = X/Z, Z = 1 2436817466cbSJens Wiklander * Cost: 1M + 1I 2437817466cbSJens Wiklander */ 2438817466cbSJens Wiklander static int ecp_normalize_mxz( const mbedtls_ecp_group *grp, mbedtls_ecp_point *P ) 2439817466cbSJens Wiklander { 2440817466cbSJens Wiklander #if defined(MBEDTLS_ECP_NORMALIZE_MXZ_ALT) 2441817466cbSJens Wiklander if( mbedtls_internal_ecp_grp_capable( grp ) ) 24423d3b0591SJens Wiklander return( mbedtls_internal_ecp_normalize_mxz( grp, P ) ); 2443817466cbSJens Wiklander #endif /* MBEDTLS_ECP_NORMALIZE_MXZ_ALT */ 2444817466cbSJens Wiklander 24457901324dSJerome Forissier #if defined(MBEDTLS_ECP_NO_FALLBACK) && defined(MBEDTLS_ECP_NORMALIZE_MXZ_ALT) 24467901324dSJerome Forissier return( MBEDTLS_ERR_ECP_FEATURE_UNAVAILABLE ); 24477901324dSJerome Forissier #else 24487901324dSJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 2449817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_inv_mod( &P->Z, &P->Z, &grp->P ) ); 245011fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &P->X, &P->X, &P->Z ) ); 2451817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_lset( &P->Z, 1 ) ); 2452817466cbSJens Wiklander 2453817466cbSJens Wiklander cleanup: 2454817466cbSJens Wiklander return( ret ); 24557901324dSJerome Forissier #endif /* !defined(MBEDTLS_ECP_NO_FALLBACK) || !defined(MBEDTLS_ECP_NORMALIZE_MXZ_ALT) */ 2456817466cbSJens Wiklander } 2457817466cbSJens Wiklander 2458817466cbSJens Wiklander /* 2459817466cbSJens Wiklander * Randomize projective x/z coordinates: 2460817466cbSJens Wiklander * (X, Z) -> (l X, l Z) for random l 2461817466cbSJens Wiklander * This is sort of the reverse operation of ecp_normalize_mxz(). 2462817466cbSJens Wiklander * 2463817466cbSJens Wiklander * This countermeasure was first suggested in [2]. 2464817466cbSJens Wiklander * Cost: 2M 2465817466cbSJens Wiklander */ 2466817466cbSJens Wiklander static int ecp_randomize_mxz( const mbedtls_ecp_group *grp, mbedtls_ecp_point *P, 2467817466cbSJens Wiklander int (*f_rng)(void *, unsigned char *, size_t), void *p_rng ) 2468817466cbSJens Wiklander { 2469817466cbSJens Wiklander #if defined(MBEDTLS_ECP_RANDOMIZE_MXZ_ALT) 2470817466cbSJens Wiklander if( mbedtls_internal_ecp_grp_capable( grp ) ) 24717901324dSJerome Forissier return( mbedtls_internal_ecp_randomize_mxz( grp, P, f_rng, p_rng ) ); 2472817466cbSJens Wiklander #endif /* MBEDTLS_ECP_RANDOMIZE_MXZ_ALT */ 2473817466cbSJens Wiklander 24747901324dSJerome Forissier #if defined(MBEDTLS_ECP_NO_FALLBACK) && defined(MBEDTLS_ECP_RANDOMIZE_MXZ_ALT) 24757901324dSJerome Forissier return( MBEDTLS_ERR_ECP_FEATURE_UNAVAILABLE ); 24767901324dSJerome Forissier #else 24777901324dSJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 24787901324dSJerome Forissier mbedtls_mpi l; 2479817466cbSJens Wiklander mbedtls_mpi_init( &l ); 2480817466cbSJens Wiklander 2481817466cbSJens Wiklander /* Generate l such that 1 < l < p */ 24827901324dSJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_random( &l, 2, &grp->P, f_rng, p_rng ) ); 2483817466cbSJens Wiklander 248411fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &P->X, &P->X, &l ) ); 248511fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &P->Z, &P->Z, &l ) ); 2486817466cbSJens Wiklander 2487817466cbSJens Wiklander cleanup: 2488817466cbSJens Wiklander mbedtls_mpi_free( &l ); 2489817466cbSJens Wiklander 24907901324dSJerome Forissier if( ret == MBEDTLS_ERR_MPI_NOT_ACCEPTABLE ) 24917901324dSJerome Forissier ret = MBEDTLS_ERR_ECP_RANDOM_FAILED; 2492817466cbSJens Wiklander return( ret ); 24937901324dSJerome Forissier #endif /* !defined(MBEDTLS_ECP_NO_FALLBACK) || !defined(MBEDTLS_ECP_RANDOMIZE_MXZ_ALT) */ 2494817466cbSJens Wiklander } 2495817466cbSJens Wiklander 2496817466cbSJens Wiklander /* 2497817466cbSJens Wiklander * Double-and-add: R = 2P, S = P + Q, with d = X(P - Q), 2498817466cbSJens Wiklander * for Montgomery curves in x/z coordinates. 2499817466cbSJens Wiklander * 2500817466cbSJens Wiklander * http://www.hyperelliptic.org/EFD/g1p/auto-code/montgom/xz/ladder/mladd-1987-m.op3 2501817466cbSJens Wiklander * with 2502817466cbSJens Wiklander * d = X1 2503817466cbSJens Wiklander * P = (X2, Z2) 2504817466cbSJens Wiklander * Q = (X3, Z3) 2505817466cbSJens Wiklander * R = (X4, Z4) 2506817466cbSJens Wiklander * S = (X5, Z5) 2507817466cbSJens Wiklander * and eliminating temporary variables tO, ..., t4. 2508817466cbSJens Wiklander * 2509817466cbSJens Wiklander * Cost: 5M + 4S 2510817466cbSJens Wiklander */ 2511817466cbSJens Wiklander static int ecp_double_add_mxz( const mbedtls_ecp_group *grp, 2512817466cbSJens Wiklander mbedtls_ecp_point *R, mbedtls_ecp_point *S, 2513817466cbSJens Wiklander const mbedtls_ecp_point *P, const mbedtls_ecp_point *Q, 2514817466cbSJens Wiklander const mbedtls_mpi *d ) 2515817466cbSJens Wiklander { 2516817466cbSJens Wiklander #if defined(MBEDTLS_ECP_DOUBLE_ADD_MXZ_ALT) 2517817466cbSJens Wiklander if( mbedtls_internal_ecp_grp_capable( grp ) ) 25183d3b0591SJens Wiklander return( mbedtls_internal_ecp_double_add_mxz( grp, R, S, P, Q, d ) ); 2519817466cbSJens Wiklander #endif /* MBEDTLS_ECP_DOUBLE_ADD_MXZ_ALT */ 2520817466cbSJens Wiklander 25217901324dSJerome Forissier #if defined(MBEDTLS_ECP_NO_FALLBACK) && defined(MBEDTLS_ECP_DOUBLE_ADD_MXZ_ALT) 25227901324dSJerome Forissier return( MBEDTLS_ERR_ECP_FEATURE_UNAVAILABLE ); 25237901324dSJerome Forissier #else 25247901324dSJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 25257901324dSJerome Forissier mbedtls_mpi A, AA, B, BB, E, C, D, DA, CB; 25267901324dSJerome Forissier 2527817466cbSJens Wiklander mbedtls_mpi_init( &A ); mbedtls_mpi_init( &AA ); mbedtls_mpi_init( &B ); 2528817466cbSJens Wiklander mbedtls_mpi_init( &BB ); mbedtls_mpi_init( &E ); mbedtls_mpi_init( &C ); 2529817466cbSJens Wiklander mbedtls_mpi_init( &D ); mbedtls_mpi_init( &DA ); mbedtls_mpi_init( &CB ); 2530817466cbSJens Wiklander 253111fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_add_mod( grp, &A, &P->X, &P->Z ) ); 253211fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &AA, &A, &A ) ); 253311fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_sub_mod( grp, &B, &P->X, &P->Z ) ); 253411fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &BB, &B, &B ) ); 253511fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_sub_mod( grp, &E, &AA, &BB ) ); 253611fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_add_mod( grp, &C, &Q->X, &Q->Z ) ); 253711fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_sub_mod( grp, &D, &Q->X, &Q->Z ) ); 253811fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &DA, &D, &A ) ); 253911fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &CB, &C, &B ) ); 25407901324dSJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_add_mod( grp, &S->X, &DA, &CB ) ); 254111fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &S->X, &S->X, &S->X ) ); 254211fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_sub_mod( grp, &S->Z, &DA, &CB ) ); 254311fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &S->Z, &S->Z, &S->Z ) ); 254411fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &S->Z, d, &S->Z ) ); 254511fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &R->X, &AA, &BB ) ); 254611fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &R->Z, &grp->A, &E ) ); 254711fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_add_mod( grp, &R->Z, &BB, &R->Z ) ); 254811fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &R->Z, &E, &R->Z ) ); 2549817466cbSJens Wiklander 2550817466cbSJens Wiklander cleanup: 2551817466cbSJens Wiklander mbedtls_mpi_free( &A ); mbedtls_mpi_free( &AA ); mbedtls_mpi_free( &B ); 2552817466cbSJens Wiklander mbedtls_mpi_free( &BB ); mbedtls_mpi_free( &E ); mbedtls_mpi_free( &C ); 2553817466cbSJens Wiklander mbedtls_mpi_free( &D ); mbedtls_mpi_free( &DA ); mbedtls_mpi_free( &CB ); 2554817466cbSJens Wiklander 2555817466cbSJens Wiklander return( ret ); 25567901324dSJerome Forissier #endif /* !defined(MBEDTLS_ECP_NO_FALLBACK) || !defined(MBEDTLS_ECP_DOUBLE_ADD_MXZ_ALT) */ 2557817466cbSJens Wiklander } 2558817466cbSJens Wiklander 2559817466cbSJens Wiklander /* 2560817466cbSJens Wiklander * Multiplication with Montgomery ladder in x/z coordinates, 2561817466cbSJens Wiklander * for curves in Montgomery form 2562817466cbSJens Wiklander */ 2563817466cbSJens Wiklander static int ecp_mul_mxz( mbedtls_ecp_group *grp, mbedtls_ecp_point *R, 2564817466cbSJens Wiklander const mbedtls_mpi *m, const mbedtls_ecp_point *P, 2565817466cbSJens Wiklander int (*f_rng)(void *, unsigned char *, size_t), 2566817466cbSJens Wiklander void *p_rng ) 2567817466cbSJens Wiklander { 256811fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 2569817466cbSJens Wiklander size_t i; 2570817466cbSJens Wiklander unsigned char b; 2571817466cbSJens Wiklander mbedtls_ecp_point RP; 2572817466cbSJens Wiklander mbedtls_mpi PX; 25737901324dSJerome Forissier #if !defined(MBEDTLS_ECP_NO_INTERNAL_RNG) 25747901324dSJerome Forissier ecp_drbg_context drbg_ctx; 2575817466cbSJens Wiklander 25767901324dSJerome Forissier ecp_drbg_init( &drbg_ctx ); 25777901324dSJerome Forissier #endif 2578817466cbSJens Wiklander mbedtls_ecp_point_init( &RP ); mbedtls_mpi_init( &PX ); 2579817466cbSJens Wiklander 25807901324dSJerome Forissier #if !defined(MBEDTLS_ECP_NO_INTERNAL_RNG) 25817901324dSJerome Forissier if( f_rng == NULL ) 25827901324dSJerome Forissier { 25837901324dSJerome Forissier const size_t m_len = ( grp->nbits + 7 ) / 8; 25847901324dSJerome Forissier MBEDTLS_MPI_CHK( ecp_drbg_seed( &drbg_ctx, m, m_len ) ); 25857901324dSJerome Forissier f_rng = &ecp_drbg_random; 25867901324dSJerome Forissier p_rng = &drbg_ctx; 25877901324dSJerome Forissier } 25887901324dSJerome Forissier #endif /* !MBEDTLS_ECP_NO_INTERNAL_RNG */ 25897901324dSJerome Forissier 2590817466cbSJens Wiklander /* Save PX and read from P before writing to R, in case P == R */ 2591817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_copy( &PX, &P->X ) ); 2592817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_ecp_copy( &RP, P ) ); 2593817466cbSJens Wiklander 2594817466cbSJens Wiklander /* Set R to zero in modified x/z coordinates */ 2595817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_lset( &R->X, 1 ) ); 2596817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_lset( &R->Z, 0 ) ); 2597817466cbSJens Wiklander mbedtls_mpi_free( &R->Y ); 2598817466cbSJens Wiklander 2599*039e02dfSJerome Forissier /* RP.X might be slightly larger than P, so reduce it */ 2600817466cbSJens Wiklander MOD_ADD( RP.X ); 2601817466cbSJens Wiklander 2602817466cbSJens Wiklander /* Randomize coordinates of the starting point */ 26037901324dSJerome Forissier #if defined(MBEDTLS_ECP_NO_INTERNAL_RNG) 2604817466cbSJens Wiklander if( f_rng != NULL ) 26057901324dSJerome Forissier #endif 2606817466cbSJens Wiklander MBEDTLS_MPI_CHK( ecp_randomize_mxz( grp, &RP, f_rng, p_rng ) ); 2607817466cbSJens Wiklander 2608817466cbSJens Wiklander /* Loop invariant: R = result so far, RP = R + P */ 2609817466cbSJens Wiklander i = mbedtls_mpi_bitlen( m ); /* one past the (zero-based) most significant bit */ 2610817466cbSJens Wiklander while( i-- > 0 ) 2611817466cbSJens Wiklander { 2612817466cbSJens Wiklander b = mbedtls_mpi_get_bit( m, i ); 2613817466cbSJens Wiklander /* 2614817466cbSJens Wiklander * if (b) R = 2R + P else R = 2R, 2615817466cbSJens Wiklander * which is: 2616817466cbSJens Wiklander * if (b) double_add( RP, R, RP, R ) 2617817466cbSJens Wiklander * else double_add( R, RP, R, RP ) 2618817466cbSJens Wiklander * but using safe conditional swaps to avoid leaks 2619817466cbSJens Wiklander */ 2620817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_safe_cond_swap( &R->X, &RP.X, b ) ); 2621817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_safe_cond_swap( &R->Z, &RP.Z, b ) ); 2622817466cbSJens Wiklander MBEDTLS_MPI_CHK( ecp_double_add_mxz( grp, R, &RP, R, &RP, &PX ) ); 2623817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_safe_cond_swap( &R->X, &RP.X, b ) ); 2624817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_safe_cond_swap( &R->Z, &RP.Z, b ) ); 2625817466cbSJens Wiklander } 2626817466cbSJens Wiklander 262711fa71b9SJerome Forissier /* 262811fa71b9SJerome Forissier * Knowledge of the projective coordinates may leak the last few bits of the 262911fa71b9SJerome Forissier * scalar [1], and since our MPI implementation isn't constant-flow, 263011fa71b9SJerome Forissier * inversion (used for coordinate normalization) may leak the full value 263111fa71b9SJerome Forissier * of its input via side-channels [2]. 263211fa71b9SJerome Forissier * 263311fa71b9SJerome Forissier * [1] https://eprint.iacr.org/2003/191 263411fa71b9SJerome Forissier * [2] https://eprint.iacr.org/2020/055 263511fa71b9SJerome Forissier * 263611fa71b9SJerome Forissier * Avoid the leak by randomizing coordinates before we normalize them. 263711fa71b9SJerome Forissier */ 26387901324dSJerome Forissier #if defined(MBEDTLS_ECP_NO_INTERNAL_RNG) 263911fa71b9SJerome Forissier if( f_rng != NULL ) 26407901324dSJerome Forissier #endif 264111fa71b9SJerome Forissier MBEDTLS_MPI_CHK( ecp_randomize_mxz( grp, R, f_rng, p_rng ) ); 264211fa71b9SJerome Forissier 2643817466cbSJens Wiklander MBEDTLS_MPI_CHK( ecp_normalize_mxz( grp, R ) ); 2644817466cbSJens Wiklander 2645817466cbSJens Wiklander cleanup: 26467901324dSJerome Forissier #if !defined(MBEDTLS_ECP_NO_INTERNAL_RNG) 26477901324dSJerome Forissier ecp_drbg_free( &drbg_ctx ); 26487901324dSJerome Forissier #endif 26497901324dSJerome Forissier 2650817466cbSJens Wiklander mbedtls_ecp_point_free( &RP ); mbedtls_mpi_free( &PX ); 2651817466cbSJens Wiklander 2652817466cbSJens Wiklander return( ret ); 2653817466cbSJens Wiklander } 2654817466cbSJens Wiklander 26557901324dSJerome Forissier #endif /* MBEDTLS_ECP_MONTGOMERY_ENABLED */ 2656817466cbSJens Wiklander 2657817466cbSJens Wiklander /* 26583d3b0591SJens Wiklander * Restartable multiplication R = m * P 26593d3b0591SJens Wiklander */ 26603d3b0591SJens Wiklander int mbedtls_ecp_mul_restartable( mbedtls_ecp_group *grp, mbedtls_ecp_point *R, 26613d3b0591SJens Wiklander const mbedtls_mpi *m, const mbedtls_ecp_point *P, 26623d3b0591SJens Wiklander int (*f_rng)(void *, unsigned char *, size_t), void *p_rng, 26633d3b0591SJens Wiklander mbedtls_ecp_restart_ctx *rs_ctx ) 26643d3b0591SJens Wiklander { 26653d3b0591SJens Wiklander int ret = MBEDTLS_ERR_ECP_BAD_INPUT_DATA; 26663d3b0591SJens Wiklander #if defined(MBEDTLS_ECP_INTERNAL_ALT) 26673d3b0591SJens Wiklander char is_grp_capable = 0; 26683d3b0591SJens Wiklander #endif 26693d3b0591SJens Wiklander ECP_VALIDATE_RET( grp != NULL ); 26703d3b0591SJens Wiklander ECP_VALIDATE_RET( R != NULL ); 26713d3b0591SJens Wiklander ECP_VALIDATE_RET( m != NULL ); 26723d3b0591SJens Wiklander ECP_VALIDATE_RET( P != NULL ); 26733d3b0591SJens Wiklander 26743d3b0591SJens Wiklander #if defined(MBEDTLS_ECP_RESTARTABLE) 26753d3b0591SJens Wiklander /* reset ops count for this call if top-level */ 26763d3b0591SJens Wiklander if( rs_ctx != NULL && rs_ctx->depth++ == 0 ) 26773d3b0591SJens Wiklander rs_ctx->ops_done = 0; 26787901324dSJerome Forissier #else 26797901324dSJerome Forissier (void) rs_ctx; 26803d3b0591SJens Wiklander #endif 26813d3b0591SJens Wiklander 26823d3b0591SJens Wiklander #if defined(MBEDTLS_ECP_INTERNAL_ALT) 26833d3b0591SJens Wiklander if( ( is_grp_capable = mbedtls_internal_ecp_grp_capable( grp ) ) ) 26843d3b0591SJens Wiklander MBEDTLS_MPI_CHK( mbedtls_internal_ecp_init( grp ) ); 26853d3b0591SJens Wiklander #endif /* MBEDTLS_ECP_INTERNAL_ALT */ 26863d3b0591SJens Wiklander 26873d3b0591SJens Wiklander #if defined(MBEDTLS_ECP_RESTARTABLE) 26883d3b0591SJens Wiklander /* skip argument check when restarting */ 26893d3b0591SJens Wiklander if( rs_ctx == NULL || rs_ctx->rsm == NULL ) 26903d3b0591SJens Wiklander #endif 26913d3b0591SJens Wiklander { 26923d3b0591SJens Wiklander /* check_privkey is free */ 26933d3b0591SJens Wiklander MBEDTLS_ECP_BUDGET( MBEDTLS_ECP_OPS_CHK ); 26943d3b0591SJens Wiklander 26953d3b0591SJens Wiklander /* Common sanity checks */ 26963d3b0591SJens Wiklander MBEDTLS_MPI_CHK( mbedtls_ecp_check_privkey( grp, m ) ); 26973d3b0591SJens Wiklander MBEDTLS_MPI_CHK( mbedtls_ecp_check_pubkey( grp, P ) ); 26983d3b0591SJens Wiklander } 26993d3b0591SJens Wiklander 27003d3b0591SJens Wiklander ret = MBEDTLS_ERR_ECP_BAD_INPUT_DATA; 27017901324dSJerome Forissier #if defined(MBEDTLS_ECP_MONTGOMERY_ENABLED) 270211fa71b9SJerome Forissier if( mbedtls_ecp_get_type( grp ) == MBEDTLS_ECP_TYPE_MONTGOMERY ) 27033d3b0591SJens Wiklander MBEDTLS_MPI_CHK( ecp_mul_mxz( grp, R, m, P, f_rng, p_rng ) ); 27043d3b0591SJens Wiklander #endif 27057901324dSJerome Forissier #if defined(MBEDTLS_ECP_SHORT_WEIERSTRASS_ENABLED) 270611fa71b9SJerome Forissier if( mbedtls_ecp_get_type( grp ) == MBEDTLS_ECP_TYPE_SHORT_WEIERSTRASS ) 27073d3b0591SJens Wiklander MBEDTLS_MPI_CHK( ecp_mul_comb( grp, R, m, P, f_rng, p_rng, rs_ctx ) ); 27083d3b0591SJens Wiklander #endif 27093d3b0591SJens Wiklander 27103d3b0591SJens Wiklander cleanup: 27113d3b0591SJens Wiklander 27123d3b0591SJens Wiklander #if defined(MBEDTLS_ECP_INTERNAL_ALT) 27133d3b0591SJens Wiklander if( is_grp_capable ) 27143d3b0591SJens Wiklander mbedtls_internal_ecp_free( grp ); 27153d3b0591SJens Wiklander #endif /* MBEDTLS_ECP_INTERNAL_ALT */ 27163d3b0591SJens Wiklander 27173d3b0591SJens Wiklander #if defined(MBEDTLS_ECP_RESTARTABLE) 27183d3b0591SJens Wiklander if( rs_ctx != NULL ) 27193d3b0591SJens Wiklander rs_ctx->depth--; 27203d3b0591SJens Wiklander #endif 27213d3b0591SJens Wiklander 27223d3b0591SJens Wiklander return( ret ); 27233d3b0591SJens Wiklander } 27243d3b0591SJens Wiklander 27253d3b0591SJens Wiklander /* 2726817466cbSJens Wiklander * Multiplication R = m * P 2727817466cbSJens Wiklander */ 2728817466cbSJens Wiklander int mbedtls_ecp_mul( mbedtls_ecp_group *grp, mbedtls_ecp_point *R, 2729817466cbSJens Wiklander const mbedtls_mpi *m, const mbedtls_ecp_point *P, 2730817466cbSJens Wiklander int (*f_rng)(void *, unsigned char *, size_t), void *p_rng ) 2731817466cbSJens Wiklander { 27323d3b0591SJens Wiklander ECP_VALIDATE_RET( grp != NULL ); 27333d3b0591SJens Wiklander ECP_VALIDATE_RET( R != NULL ); 27343d3b0591SJens Wiklander ECP_VALIDATE_RET( m != NULL ); 27353d3b0591SJens Wiklander ECP_VALIDATE_RET( P != NULL ); 27363d3b0591SJens Wiklander return( mbedtls_ecp_mul_restartable( grp, R, m, P, f_rng, p_rng, NULL ) ); 2737817466cbSJens Wiklander } 2738817466cbSJens Wiklander 27397901324dSJerome Forissier #if defined(MBEDTLS_ECP_SHORT_WEIERSTRASS_ENABLED) 2740817466cbSJens Wiklander /* 2741817466cbSJens Wiklander * Check that an affine point is valid as a public key, 2742817466cbSJens Wiklander * short weierstrass curves (SEC1 3.2.3.1) 2743817466cbSJens Wiklander */ 2744817466cbSJens Wiklander static int ecp_check_pubkey_sw( const mbedtls_ecp_group *grp, const mbedtls_ecp_point *pt ) 2745817466cbSJens Wiklander { 274611fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 2747817466cbSJens Wiklander mbedtls_mpi YY, RHS; 2748817466cbSJens Wiklander 2749817466cbSJens Wiklander /* pt coordinates must be normalized for our checks */ 2750817466cbSJens Wiklander if( mbedtls_mpi_cmp_int( &pt->X, 0 ) < 0 || 2751817466cbSJens Wiklander mbedtls_mpi_cmp_int( &pt->Y, 0 ) < 0 || 2752817466cbSJens Wiklander mbedtls_mpi_cmp_mpi( &pt->X, &grp->P ) >= 0 || 2753817466cbSJens Wiklander mbedtls_mpi_cmp_mpi( &pt->Y, &grp->P ) >= 0 ) 2754817466cbSJens Wiklander return( MBEDTLS_ERR_ECP_INVALID_KEY ); 2755817466cbSJens Wiklander 2756817466cbSJens Wiklander mbedtls_mpi_init( &YY ); mbedtls_mpi_init( &RHS ); 2757817466cbSJens Wiklander 2758817466cbSJens Wiklander /* 2759817466cbSJens Wiklander * YY = Y^2 2760817466cbSJens Wiklander * RHS = X (X^2 + A) + B = X^3 + A X + B 2761817466cbSJens Wiklander */ 276211fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &YY, &pt->Y, &pt->Y ) ); 276311fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &RHS, &pt->X, &pt->X ) ); 2764817466cbSJens Wiklander 2765817466cbSJens Wiklander /* Special case for A = -3 */ 2766817466cbSJens Wiklander if( grp->A.p == NULL ) 2767817466cbSJens Wiklander { 2768817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_sub_int( &RHS, &RHS, 3 ) ); MOD_SUB( RHS ); 2769817466cbSJens Wiklander } 2770817466cbSJens Wiklander else 2771817466cbSJens Wiklander { 277211fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_add_mod( grp, &RHS, &RHS, &grp->A ) ); 2773817466cbSJens Wiklander } 2774817466cbSJens Wiklander 277511fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &RHS, &RHS, &pt->X ) ); 277611fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_add_mod( grp, &RHS, &RHS, &grp->B ) ); 2777817466cbSJens Wiklander 2778817466cbSJens Wiklander if( mbedtls_mpi_cmp_mpi( &YY, &RHS ) != 0 ) 2779817466cbSJens Wiklander ret = MBEDTLS_ERR_ECP_INVALID_KEY; 2780817466cbSJens Wiklander 2781817466cbSJens Wiklander cleanup: 2782817466cbSJens Wiklander 2783817466cbSJens Wiklander mbedtls_mpi_free( &YY ); mbedtls_mpi_free( &RHS ); 2784817466cbSJens Wiklander 2785817466cbSJens Wiklander return( ret ); 2786817466cbSJens Wiklander } 27877901324dSJerome Forissier #endif /* MBEDTLS_ECP_SHORT_WEIERSTRASS_ENABLED */ 2788817466cbSJens Wiklander 27897901324dSJerome Forissier #if defined(MBEDTLS_ECP_SHORT_WEIERSTRASS_ENABLED) 2790817466cbSJens Wiklander /* 27917901324dSJerome Forissier * R = m * P with shortcuts for m == 0, m == 1 and m == -1 2792817466cbSJens Wiklander * NOT constant-time - ONLY for short Weierstrass! 2793817466cbSJens Wiklander */ 2794817466cbSJens Wiklander static int mbedtls_ecp_mul_shortcuts( mbedtls_ecp_group *grp, 2795817466cbSJens Wiklander mbedtls_ecp_point *R, 2796817466cbSJens Wiklander const mbedtls_mpi *m, 27973d3b0591SJens Wiklander const mbedtls_ecp_point *P, 27983d3b0591SJens Wiklander mbedtls_ecp_restart_ctx *rs_ctx ) 2799817466cbSJens Wiklander { 280011fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 2801817466cbSJens Wiklander 28027901324dSJerome Forissier if( mbedtls_mpi_cmp_int( m, 0 ) == 0 ) 28037901324dSJerome Forissier { 28047901324dSJerome Forissier MBEDTLS_MPI_CHK( mbedtls_ecp_set_zero( R ) ); 28057901324dSJerome Forissier } 28067901324dSJerome Forissier else if( mbedtls_mpi_cmp_int( m, 1 ) == 0 ) 2807817466cbSJens Wiklander { 2808817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_ecp_copy( R, P ) ); 2809817466cbSJens Wiklander } 2810817466cbSJens Wiklander else if( mbedtls_mpi_cmp_int( m, -1 ) == 0 ) 2811817466cbSJens Wiklander { 2812817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_ecp_copy( R, P ) ); 2813817466cbSJens Wiklander if( mbedtls_mpi_cmp_int( &R->Y, 0 ) != 0 ) 2814817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_sub_mpi( &R->Y, &grp->P, &R->Y ) ); 2815817466cbSJens Wiklander } 2816817466cbSJens Wiklander else 2817817466cbSJens Wiklander { 28183d3b0591SJens Wiklander MBEDTLS_MPI_CHK( mbedtls_ecp_mul_restartable( grp, R, m, P, 28193d3b0591SJens Wiklander NULL, NULL, rs_ctx ) ); 2820817466cbSJens Wiklander } 2821817466cbSJens Wiklander 2822817466cbSJens Wiklander cleanup: 2823817466cbSJens Wiklander return( ret ); 2824817466cbSJens Wiklander } 2825817466cbSJens Wiklander 2826817466cbSJens Wiklander /* 28273d3b0591SJens Wiklander * Restartable linear combination 28283d3b0591SJens Wiklander * NOT constant-time 28293d3b0591SJens Wiklander */ 28303d3b0591SJens Wiklander int mbedtls_ecp_muladd_restartable( 28313d3b0591SJens Wiklander mbedtls_ecp_group *grp, mbedtls_ecp_point *R, 28323d3b0591SJens Wiklander const mbedtls_mpi *m, const mbedtls_ecp_point *P, 28333d3b0591SJens Wiklander const mbedtls_mpi *n, const mbedtls_ecp_point *Q, 28343d3b0591SJens Wiklander mbedtls_ecp_restart_ctx *rs_ctx ) 28353d3b0591SJens Wiklander { 283611fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 28373d3b0591SJens Wiklander mbedtls_ecp_point mP; 28383d3b0591SJens Wiklander mbedtls_ecp_point *pmP = &mP; 28393d3b0591SJens Wiklander mbedtls_ecp_point *pR = R; 28403d3b0591SJens Wiklander #if defined(MBEDTLS_ECP_INTERNAL_ALT) 28413d3b0591SJens Wiklander char is_grp_capable = 0; 28423d3b0591SJens Wiklander #endif 28433d3b0591SJens Wiklander ECP_VALIDATE_RET( grp != NULL ); 28443d3b0591SJens Wiklander ECP_VALIDATE_RET( R != NULL ); 28453d3b0591SJens Wiklander ECP_VALIDATE_RET( m != NULL ); 28463d3b0591SJens Wiklander ECP_VALIDATE_RET( P != NULL ); 28473d3b0591SJens Wiklander ECP_VALIDATE_RET( n != NULL ); 28483d3b0591SJens Wiklander ECP_VALIDATE_RET( Q != NULL ); 28493d3b0591SJens Wiklander 285011fa71b9SJerome Forissier if( mbedtls_ecp_get_type( grp ) != MBEDTLS_ECP_TYPE_SHORT_WEIERSTRASS ) 28513d3b0591SJens Wiklander return( MBEDTLS_ERR_ECP_FEATURE_UNAVAILABLE ); 28523d3b0591SJens Wiklander 28533d3b0591SJens Wiklander mbedtls_ecp_point_init( &mP ); 28543d3b0591SJens Wiklander 28553d3b0591SJens Wiklander ECP_RS_ENTER( ma ); 28563d3b0591SJens Wiklander 28573d3b0591SJens Wiklander #if defined(MBEDTLS_ECP_RESTARTABLE) 28583d3b0591SJens Wiklander if( rs_ctx != NULL && rs_ctx->ma != NULL ) 28593d3b0591SJens Wiklander { 28603d3b0591SJens Wiklander /* redirect intermediate results to restart context */ 28613d3b0591SJens Wiklander pmP = &rs_ctx->ma->mP; 28623d3b0591SJens Wiklander pR = &rs_ctx->ma->R; 28633d3b0591SJens Wiklander 28643d3b0591SJens Wiklander /* jump to next operation */ 28653d3b0591SJens Wiklander if( rs_ctx->ma->state == ecp_rsma_mul2 ) 28663d3b0591SJens Wiklander goto mul2; 28673d3b0591SJens Wiklander if( rs_ctx->ma->state == ecp_rsma_add ) 28683d3b0591SJens Wiklander goto add; 28693d3b0591SJens Wiklander if( rs_ctx->ma->state == ecp_rsma_norm ) 28703d3b0591SJens Wiklander goto norm; 28713d3b0591SJens Wiklander } 28723d3b0591SJens Wiklander #endif /* MBEDTLS_ECP_RESTARTABLE */ 28733d3b0591SJens Wiklander 28743d3b0591SJens Wiklander MBEDTLS_MPI_CHK( mbedtls_ecp_mul_shortcuts( grp, pmP, m, P, rs_ctx ) ); 28753d3b0591SJens Wiklander #if defined(MBEDTLS_ECP_RESTARTABLE) 28763d3b0591SJens Wiklander if( rs_ctx != NULL && rs_ctx->ma != NULL ) 28773d3b0591SJens Wiklander rs_ctx->ma->state = ecp_rsma_mul2; 28783d3b0591SJens Wiklander 28793d3b0591SJens Wiklander mul2: 28803d3b0591SJens Wiklander #endif 28813d3b0591SJens Wiklander MBEDTLS_MPI_CHK( mbedtls_ecp_mul_shortcuts( grp, pR, n, Q, rs_ctx ) ); 28823d3b0591SJens Wiklander 28833d3b0591SJens Wiklander #if defined(MBEDTLS_ECP_INTERNAL_ALT) 28843d3b0591SJens Wiklander if( ( is_grp_capable = mbedtls_internal_ecp_grp_capable( grp ) ) ) 28853d3b0591SJens Wiklander MBEDTLS_MPI_CHK( mbedtls_internal_ecp_init( grp ) ); 28863d3b0591SJens Wiklander #endif /* MBEDTLS_ECP_INTERNAL_ALT */ 28873d3b0591SJens Wiklander 28883d3b0591SJens Wiklander #if defined(MBEDTLS_ECP_RESTARTABLE) 28893d3b0591SJens Wiklander if( rs_ctx != NULL && rs_ctx->ma != NULL ) 28903d3b0591SJens Wiklander rs_ctx->ma->state = ecp_rsma_add; 28913d3b0591SJens Wiklander 28923d3b0591SJens Wiklander add: 28933d3b0591SJens Wiklander #endif 28943d3b0591SJens Wiklander MBEDTLS_ECP_BUDGET( MBEDTLS_ECP_OPS_ADD ); 28953d3b0591SJens Wiklander MBEDTLS_MPI_CHK( ecp_add_mixed( grp, pR, pmP, pR ) ); 28963d3b0591SJens Wiklander #if defined(MBEDTLS_ECP_RESTARTABLE) 28973d3b0591SJens Wiklander if( rs_ctx != NULL && rs_ctx->ma != NULL ) 28983d3b0591SJens Wiklander rs_ctx->ma->state = ecp_rsma_norm; 28993d3b0591SJens Wiklander 29003d3b0591SJens Wiklander norm: 29013d3b0591SJens Wiklander #endif 29023d3b0591SJens Wiklander MBEDTLS_ECP_BUDGET( MBEDTLS_ECP_OPS_INV ); 29033d3b0591SJens Wiklander MBEDTLS_MPI_CHK( ecp_normalize_jac( grp, pR ) ); 29043d3b0591SJens Wiklander 29053d3b0591SJens Wiklander #if defined(MBEDTLS_ECP_RESTARTABLE) 29063d3b0591SJens Wiklander if( rs_ctx != NULL && rs_ctx->ma != NULL ) 29073d3b0591SJens Wiklander MBEDTLS_MPI_CHK( mbedtls_ecp_copy( R, pR ) ); 29083d3b0591SJens Wiklander #endif 29093d3b0591SJens Wiklander 29103d3b0591SJens Wiklander cleanup: 29113d3b0591SJens Wiklander #if defined(MBEDTLS_ECP_INTERNAL_ALT) 29123d3b0591SJens Wiklander if( is_grp_capable ) 29133d3b0591SJens Wiklander mbedtls_internal_ecp_free( grp ); 29143d3b0591SJens Wiklander #endif /* MBEDTLS_ECP_INTERNAL_ALT */ 29153d3b0591SJens Wiklander 29163d3b0591SJens Wiklander mbedtls_ecp_point_free( &mP ); 29173d3b0591SJens Wiklander 29183d3b0591SJens Wiklander ECP_RS_LEAVE( ma ); 29193d3b0591SJens Wiklander 29203d3b0591SJens Wiklander return( ret ); 29213d3b0591SJens Wiklander } 29223d3b0591SJens Wiklander 29233d3b0591SJens Wiklander /* 2924817466cbSJens Wiklander * Linear combination 2925817466cbSJens Wiklander * NOT constant-time 2926817466cbSJens Wiklander */ 2927817466cbSJens Wiklander int mbedtls_ecp_muladd( mbedtls_ecp_group *grp, mbedtls_ecp_point *R, 2928817466cbSJens Wiklander const mbedtls_mpi *m, const mbedtls_ecp_point *P, 2929817466cbSJens Wiklander const mbedtls_mpi *n, const mbedtls_ecp_point *Q ) 2930817466cbSJens Wiklander { 29313d3b0591SJens Wiklander ECP_VALIDATE_RET( grp != NULL ); 29323d3b0591SJens Wiklander ECP_VALIDATE_RET( R != NULL ); 29333d3b0591SJens Wiklander ECP_VALIDATE_RET( m != NULL ); 29343d3b0591SJens Wiklander ECP_VALIDATE_RET( P != NULL ); 29353d3b0591SJens Wiklander ECP_VALIDATE_RET( n != NULL ); 29363d3b0591SJens Wiklander ECP_VALIDATE_RET( Q != NULL ); 29373d3b0591SJens Wiklander return( mbedtls_ecp_muladd_restartable( grp, R, m, P, n, Q, NULL ) ); 2938817466cbSJens Wiklander } 29397901324dSJerome Forissier #endif /* MBEDTLS_ECP_SHORT_WEIERSTRASS_ENABLED */ 2940817466cbSJens Wiklander 29417901324dSJerome Forissier #if defined(MBEDTLS_ECP_MONTGOMERY_ENABLED) 29427901324dSJerome Forissier #if defined(MBEDTLS_ECP_DP_CURVE25519_ENABLED) 29437901324dSJerome Forissier #define ECP_MPI_INIT(s, n, p) {s, 0, (n), (mbedtls_mpi_uint *)(p)} 29447901324dSJerome Forissier #define ECP_MPI_INIT_ARRAY(x) \ 29457901324dSJerome Forissier ECP_MPI_INIT(1, sizeof(x) / sizeof(mbedtls_mpi_uint), x) 29467901324dSJerome Forissier /* 29477901324dSJerome Forissier * Constants for the two points other than 0, 1, -1 (mod p) in 29487901324dSJerome Forissier * https://cr.yp.to/ecdh.html#validate 29497901324dSJerome Forissier * See ecp_check_pubkey_x25519(). 29507901324dSJerome Forissier */ 29517901324dSJerome Forissier static const mbedtls_mpi_uint x25519_bad_point_1[] = { 29527901324dSJerome Forissier MBEDTLS_BYTES_TO_T_UINT_8( 0xe0, 0xeb, 0x7a, 0x7c, 0x3b, 0x41, 0xb8, 0xae ), 29537901324dSJerome Forissier MBEDTLS_BYTES_TO_T_UINT_8( 0x16, 0x56, 0xe3, 0xfa, 0xf1, 0x9f, 0xc4, 0x6a ), 29547901324dSJerome Forissier MBEDTLS_BYTES_TO_T_UINT_8( 0xda, 0x09, 0x8d, 0xeb, 0x9c, 0x32, 0xb1, 0xfd ), 29557901324dSJerome Forissier MBEDTLS_BYTES_TO_T_UINT_8( 0x86, 0x62, 0x05, 0x16, 0x5f, 0x49, 0xb8, 0x00 ), 29567901324dSJerome Forissier }; 29577901324dSJerome Forissier static const mbedtls_mpi_uint x25519_bad_point_2[] = { 29587901324dSJerome Forissier MBEDTLS_BYTES_TO_T_UINT_8( 0x5f, 0x9c, 0x95, 0xbc, 0xa3, 0x50, 0x8c, 0x24 ), 29597901324dSJerome Forissier MBEDTLS_BYTES_TO_T_UINT_8( 0xb1, 0xd0, 0xb1, 0x55, 0x9c, 0x83, 0xef, 0x5b ), 29607901324dSJerome Forissier MBEDTLS_BYTES_TO_T_UINT_8( 0x04, 0x44, 0x5c, 0xc4, 0x58, 0x1c, 0x8e, 0x86 ), 29617901324dSJerome Forissier MBEDTLS_BYTES_TO_T_UINT_8( 0xd8, 0x22, 0x4e, 0xdd, 0xd0, 0x9f, 0x11, 0x57 ), 29627901324dSJerome Forissier }; 29637901324dSJerome Forissier static const mbedtls_mpi ecp_x25519_bad_point_1 = ECP_MPI_INIT_ARRAY( 29647901324dSJerome Forissier x25519_bad_point_1 ); 29657901324dSJerome Forissier static const mbedtls_mpi ecp_x25519_bad_point_2 = ECP_MPI_INIT_ARRAY( 29667901324dSJerome Forissier x25519_bad_point_2 ); 29677901324dSJerome Forissier #endif /* MBEDTLS_ECP_DP_CURVE25519_ENABLED */ 29687901324dSJerome Forissier 29697901324dSJerome Forissier /* 29707901324dSJerome Forissier * Check that the input point is not one of the low-order points. 29717901324dSJerome Forissier * This is recommended by the "May the Fourth" paper: 29727901324dSJerome Forissier * https://eprint.iacr.org/2017/806.pdf 29737901324dSJerome Forissier * Those points are never sent by an honest peer. 29747901324dSJerome Forissier */ 29757901324dSJerome Forissier static int ecp_check_bad_points_mx( const mbedtls_mpi *X, const mbedtls_mpi *P, 29767901324dSJerome Forissier const mbedtls_ecp_group_id grp_id ) 29777901324dSJerome Forissier { 29787901324dSJerome Forissier int ret; 29797901324dSJerome Forissier mbedtls_mpi XmP; 29807901324dSJerome Forissier 29817901324dSJerome Forissier mbedtls_mpi_init( &XmP ); 29827901324dSJerome Forissier 29837901324dSJerome Forissier /* Reduce X mod P so that we only need to check values less than P. 29847901324dSJerome Forissier * We know X < 2^256 so we can proceed by subtraction. */ 29857901324dSJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_copy( &XmP, X ) ); 29867901324dSJerome Forissier while( mbedtls_mpi_cmp_mpi( &XmP, P ) >= 0 ) 29877901324dSJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_sub_mpi( &XmP, &XmP, P ) ); 29887901324dSJerome Forissier 29897901324dSJerome Forissier /* Check against the known bad values that are less than P. For Curve448 29907901324dSJerome Forissier * these are 0, 1 and -1. For Curve25519 we check the values less than P 29917901324dSJerome Forissier * from the following list: https://cr.yp.to/ecdh.html#validate */ 29927901324dSJerome Forissier if( mbedtls_mpi_cmp_int( &XmP, 1 ) <= 0 ) /* takes care of 0 and 1 */ 29937901324dSJerome Forissier { 29947901324dSJerome Forissier ret = MBEDTLS_ERR_ECP_INVALID_KEY; 29957901324dSJerome Forissier goto cleanup; 29967901324dSJerome Forissier } 29977901324dSJerome Forissier 29987901324dSJerome Forissier #if defined(MBEDTLS_ECP_DP_CURVE25519_ENABLED) 29997901324dSJerome Forissier if( grp_id == MBEDTLS_ECP_DP_CURVE25519 ) 30007901324dSJerome Forissier { 30017901324dSJerome Forissier if( mbedtls_mpi_cmp_mpi( &XmP, &ecp_x25519_bad_point_1 ) == 0 ) 30027901324dSJerome Forissier { 30037901324dSJerome Forissier ret = MBEDTLS_ERR_ECP_INVALID_KEY; 30047901324dSJerome Forissier goto cleanup; 30057901324dSJerome Forissier } 30067901324dSJerome Forissier 30077901324dSJerome Forissier if( mbedtls_mpi_cmp_mpi( &XmP, &ecp_x25519_bad_point_2 ) == 0 ) 30087901324dSJerome Forissier { 30097901324dSJerome Forissier ret = MBEDTLS_ERR_ECP_INVALID_KEY; 30107901324dSJerome Forissier goto cleanup; 30117901324dSJerome Forissier } 30127901324dSJerome Forissier } 30137901324dSJerome Forissier #else 30147901324dSJerome Forissier (void) grp_id; 30157901324dSJerome Forissier #endif 30167901324dSJerome Forissier 30177901324dSJerome Forissier /* Final check: check if XmP + 1 is P (final because it changes XmP!) */ 30187901324dSJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_add_int( &XmP, &XmP, 1 ) ); 30197901324dSJerome Forissier if( mbedtls_mpi_cmp_mpi( &XmP, P ) == 0 ) 30207901324dSJerome Forissier { 30217901324dSJerome Forissier ret = MBEDTLS_ERR_ECP_INVALID_KEY; 30227901324dSJerome Forissier goto cleanup; 30237901324dSJerome Forissier } 30247901324dSJerome Forissier 30257901324dSJerome Forissier ret = 0; 30267901324dSJerome Forissier 30277901324dSJerome Forissier cleanup: 30287901324dSJerome Forissier mbedtls_mpi_free( &XmP ); 30297901324dSJerome Forissier 30307901324dSJerome Forissier return( ret ); 30317901324dSJerome Forissier } 30327901324dSJerome Forissier 3033817466cbSJens Wiklander /* 3034817466cbSJens Wiklander * Check validity of a public key for Montgomery curves with x-only schemes 3035817466cbSJens Wiklander */ 3036817466cbSJens Wiklander static int ecp_check_pubkey_mx( const mbedtls_ecp_group *grp, const mbedtls_ecp_point *pt ) 3037817466cbSJens Wiklander { 3038817466cbSJens Wiklander /* [Curve25519 p. 5] Just check X is the correct number of bytes */ 30393d3b0591SJens Wiklander /* Allow any public value, if it's too big then we'll just reduce it mod p 30403d3b0591SJens Wiklander * (RFC 7748 sec. 5 para. 3). */ 3041817466cbSJens Wiklander if( mbedtls_mpi_size( &pt->X ) > ( grp->nbits + 7 ) / 8 ) 3042817466cbSJens Wiklander return( MBEDTLS_ERR_ECP_INVALID_KEY ); 3043817466cbSJens Wiklander 30447901324dSJerome Forissier /* Implicit in all standards (as they don't consider negative numbers): 30457901324dSJerome Forissier * X must be non-negative. This is normally ensured by the way it's 30467901324dSJerome Forissier * encoded for transmission, but let's be extra sure. */ 30477901324dSJerome Forissier if( mbedtls_mpi_cmp_int( &pt->X, 0 ) < 0 ) 30487901324dSJerome Forissier return( MBEDTLS_ERR_ECP_INVALID_KEY ); 30497901324dSJerome Forissier 30507901324dSJerome Forissier return( ecp_check_bad_points_mx( &pt->X, &grp->P, grp->id ) ); 3051817466cbSJens Wiklander } 30527901324dSJerome Forissier #endif /* MBEDTLS_ECP_MONTGOMERY_ENABLED */ 3053817466cbSJens Wiklander 3054817466cbSJens Wiklander /* 3055817466cbSJens Wiklander * Check that a point is valid as a public key 3056817466cbSJens Wiklander */ 30573d3b0591SJens Wiklander int mbedtls_ecp_check_pubkey( const mbedtls_ecp_group *grp, 30583d3b0591SJens Wiklander const mbedtls_ecp_point *pt ) 3059817466cbSJens Wiklander { 30603d3b0591SJens Wiklander ECP_VALIDATE_RET( grp != NULL ); 30613d3b0591SJens Wiklander ECP_VALIDATE_RET( pt != NULL ); 30623d3b0591SJens Wiklander 3063817466cbSJens Wiklander /* Must use affine coordinates */ 3064817466cbSJens Wiklander if( mbedtls_mpi_cmp_int( &pt->Z, 1 ) != 0 ) 3065817466cbSJens Wiklander return( MBEDTLS_ERR_ECP_INVALID_KEY ); 3066817466cbSJens Wiklander 30677901324dSJerome Forissier #if defined(MBEDTLS_ECP_MONTGOMERY_ENABLED) 306811fa71b9SJerome Forissier if( mbedtls_ecp_get_type( grp ) == MBEDTLS_ECP_TYPE_MONTGOMERY ) 3069817466cbSJens Wiklander return( ecp_check_pubkey_mx( grp, pt ) ); 3070817466cbSJens Wiklander #endif 30717901324dSJerome Forissier #if defined(MBEDTLS_ECP_SHORT_WEIERSTRASS_ENABLED) 307211fa71b9SJerome Forissier if( mbedtls_ecp_get_type( grp ) == MBEDTLS_ECP_TYPE_SHORT_WEIERSTRASS ) 3073817466cbSJens Wiklander return( ecp_check_pubkey_sw( grp, pt ) ); 3074817466cbSJens Wiklander #endif 3075817466cbSJens Wiklander return( MBEDTLS_ERR_ECP_BAD_INPUT_DATA ); 3076817466cbSJens Wiklander } 3077817466cbSJens Wiklander 3078817466cbSJens Wiklander /* 3079817466cbSJens Wiklander * Check that an mbedtls_mpi is valid as a private key 3080817466cbSJens Wiklander */ 30813d3b0591SJens Wiklander int mbedtls_ecp_check_privkey( const mbedtls_ecp_group *grp, 30823d3b0591SJens Wiklander const mbedtls_mpi *d ) 3083817466cbSJens Wiklander { 30843d3b0591SJens Wiklander ECP_VALIDATE_RET( grp != NULL ); 30853d3b0591SJens Wiklander ECP_VALIDATE_RET( d != NULL ); 30863d3b0591SJens Wiklander 30877901324dSJerome Forissier #if defined(MBEDTLS_ECP_MONTGOMERY_ENABLED) 308811fa71b9SJerome Forissier if( mbedtls_ecp_get_type( grp ) == MBEDTLS_ECP_TYPE_MONTGOMERY ) 3089817466cbSJens Wiklander { 30903d3b0591SJens Wiklander /* see RFC 7748 sec. 5 para. 5 */ 3091817466cbSJens Wiklander if( mbedtls_mpi_get_bit( d, 0 ) != 0 || 3092817466cbSJens Wiklander mbedtls_mpi_get_bit( d, 1 ) != 0 || 3093817466cbSJens Wiklander mbedtls_mpi_bitlen( d ) - 1 != grp->nbits ) /* mbedtls_mpi_bitlen is one-based! */ 3094817466cbSJens Wiklander return( MBEDTLS_ERR_ECP_INVALID_KEY ); 30953d3b0591SJens Wiklander 30963d3b0591SJens Wiklander /* see [Curve25519] page 5 */ 30973d3b0591SJens Wiklander if( grp->nbits == 254 && mbedtls_mpi_get_bit( d, 2 ) != 0 ) 30983d3b0591SJens Wiklander return( MBEDTLS_ERR_ECP_INVALID_KEY ); 30993d3b0591SJens Wiklander 3100817466cbSJens Wiklander return( 0 ); 3101817466cbSJens Wiklander } 31027901324dSJerome Forissier #endif /* MBEDTLS_ECP_MONTGOMERY_ENABLED */ 31037901324dSJerome Forissier #if defined(MBEDTLS_ECP_SHORT_WEIERSTRASS_ENABLED) 310411fa71b9SJerome Forissier if( mbedtls_ecp_get_type( grp ) == MBEDTLS_ECP_TYPE_SHORT_WEIERSTRASS ) 3105817466cbSJens Wiklander { 3106817466cbSJens Wiklander /* see SEC1 3.2 */ 3107817466cbSJens Wiklander if( mbedtls_mpi_cmp_int( d, 1 ) < 0 || 3108817466cbSJens Wiklander mbedtls_mpi_cmp_mpi( d, &grp->N ) >= 0 ) 3109817466cbSJens Wiklander return( MBEDTLS_ERR_ECP_INVALID_KEY ); 3110817466cbSJens Wiklander else 3111817466cbSJens Wiklander return( 0 ); 3112817466cbSJens Wiklander } 31137901324dSJerome Forissier #endif /* MBEDTLS_ECP_SHORT_WEIERSTRASS_ENABLED */ 3114817466cbSJens Wiklander 3115817466cbSJens Wiklander return( MBEDTLS_ERR_ECP_BAD_INPUT_DATA ); 3116817466cbSJens Wiklander } 3117817466cbSJens Wiklander 31187901324dSJerome Forissier #if defined(MBEDTLS_ECP_MONTGOMERY_ENABLED) 31197901324dSJerome Forissier MBEDTLS_STATIC_TESTABLE 31207901324dSJerome Forissier int mbedtls_ecp_gen_privkey_mx( size_t high_bit, 31217901324dSJerome Forissier mbedtls_mpi *d, 31227901324dSJerome Forissier int (*f_rng)(void *, unsigned char *, size_t), 31237901324dSJerome Forissier void *p_rng ) 31247901324dSJerome Forissier { 31257901324dSJerome Forissier int ret = MBEDTLS_ERR_ECP_BAD_INPUT_DATA; 31267901324dSJerome Forissier size_t n_random_bytes = high_bit / 8 + 1; 31277901324dSJerome Forissier 31287901324dSJerome Forissier /* [Curve25519] page 5 */ 31297901324dSJerome Forissier /* Generate a (high_bit+1)-bit random number by generating just enough 31307901324dSJerome Forissier * random bytes, then shifting out extra bits from the top (necessary 31317901324dSJerome Forissier * when (high_bit+1) is not a multiple of 8). */ 31327901324dSJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_fill_random( d, n_random_bytes, 31337901324dSJerome Forissier f_rng, p_rng ) ); 31347901324dSJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_shift_r( d, 8 * n_random_bytes - high_bit - 1 ) ); 31357901324dSJerome Forissier 31367901324dSJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_set_bit( d, high_bit, 1 ) ); 31377901324dSJerome Forissier 31387901324dSJerome Forissier /* Make sure the last two bits are unset for Curve448, three bits for 31397901324dSJerome Forissier Curve25519 */ 31407901324dSJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_set_bit( d, 0, 0 ) ); 31417901324dSJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_set_bit( d, 1, 0 ) ); 31427901324dSJerome Forissier if( high_bit == 254 ) 31437901324dSJerome Forissier { 31447901324dSJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_set_bit( d, 2, 0 ) ); 31457901324dSJerome Forissier } 31467901324dSJerome Forissier 31477901324dSJerome Forissier cleanup: 31487901324dSJerome Forissier return( ret ); 31497901324dSJerome Forissier } 31507901324dSJerome Forissier #endif /* MBEDTLS_ECP_MONTGOMERY_ENABLED */ 31517901324dSJerome Forissier 31527901324dSJerome Forissier #if defined(MBEDTLS_ECP_SHORT_WEIERSTRASS_ENABLED) 31537901324dSJerome Forissier static int mbedtls_ecp_gen_privkey_sw( 31547901324dSJerome Forissier const mbedtls_mpi *N, mbedtls_mpi *d, 31557901324dSJerome Forissier int (*f_rng)(void *, unsigned char *, size_t), void *p_rng ) 31567901324dSJerome Forissier { 31577901324dSJerome Forissier int ret = mbedtls_mpi_random( d, 1, N, f_rng, p_rng ); 31587901324dSJerome Forissier switch( ret ) 31597901324dSJerome Forissier { 31607901324dSJerome Forissier case MBEDTLS_ERR_MPI_NOT_ACCEPTABLE: 31617901324dSJerome Forissier return( MBEDTLS_ERR_ECP_RANDOM_FAILED ); 31627901324dSJerome Forissier default: 31637901324dSJerome Forissier return( ret ); 31647901324dSJerome Forissier } 31657901324dSJerome Forissier } 31667901324dSJerome Forissier #endif /* MBEDTLS_ECP_SHORT_WEIERSTRASS_ENABLED */ 31677901324dSJerome Forissier 3168817466cbSJens Wiklander /* 31693d3b0591SJens Wiklander * Generate a private key 3170817466cbSJens Wiklander */ 31713d3b0591SJens Wiklander int mbedtls_ecp_gen_privkey( const mbedtls_ecp_group *grp, 31723d3b0591SJens Wiklander mbedtls_mpi *d, 3173817466cbSJens Wiklander int (*f_rng)(void *, unsigned char *, size_t), 3174817466cbSJens Wiklander void *p_rng ) 3175817466cbSJens Wiklander { 31763d3b0591SJens Wiklander ECP_VALIDATE_RET( grp != NULL ); 31773d3b0591SJens Wiklander ECP_VALIDATE_RET( d != NULL ); 31783d3b0591SJens Wiklander ECP_VALIDATE_RET( f_rng != NULL ); 31793d3b0591SJens Wiklander 31807901324dSJerome Forissier #if defined(MBEDTLS_ECP_MONTGOMERY_ENABLED) 318111fa71b9SJerome Forissier if( mbedtls_ecp_get_type( grp ) == MBEDTLS_ECP_TYPE_MONTGOMERY ) 31827901324dSJerome Forissier return( mbedtls_ecp_gen_privkey_mx( grp->nbits, d, f_rng, p_rng ) ); 31837901324dSJerome Forissier #endif /* MBEDTLS_ECP_MONTGOMERY_ENABLED */ 3184817466cbSJens Wiklander 31857901324dSJerome Forissier #if defined(MBEDTLS_ECP_SHORT_WEIERSTRASS_ENABLED) 318611fa71b9SJerome Forissier if( mbedtls_ecp_get_type( grp ) == MBEDTLS_ECP_TYPE_SHORT_WEIERSTRASS ) 31877901324dSJerome Forissier return( mbedtls_ecp_gen_privkey_sw( &grp->N, d, f_rng, p_rng ) ); 31887901324dSJerome Forissier #endif /* MBEDTLS_ECP_SHORT_WEIERSTRASS_ENABLED */ 3189817466cbSJens Wiklander 31907901324dSJerome Forissier return( MBEDTLS_ERR_ECP_BAD_INPUT_DATA ); 31913d3b0591SJens Wiklander } 3192817466cbSJens Wiklander 31933d3b0591SJens Wiklander /* 31943d3b0591SJens Wiklander * Generate a keypair with configurable base point 31953d3b0591SJens Wiklander */ 31963d3b0591SJens Wiklander int mbedtls_ecp_gen_keypair_base( mbedtls_ecp_group *grp, 31973d3b0591SJens Wiklander const mbedtls_ecp_point *G, 31983d3b0591SJens Wiklander mbedtls_mpi *d, mbedtls_ecp_point *Q, 31993d3b0591SJens Wiklander int (*f_rng)(void *, unsigned char *, size_t), 32003d3b0591SJens Wiklander void *p_rng ) 32013d3b0591SJens Wiklander { 320211fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 32033d3b0591SJens Wiklander ECP_VALIDATE_RET( grp != NULL ); 32043d3b0591SJens Wiklander ECP_VALIDATE_RET( d != NULL ); 32053d3b0591SJens Wiklander ECP_VALIDATE_RET( G != NULL ); 32063d3b0591SJens Wiklander ECP_VALIDATE_RET( Q != NULL ); 32073d3b0591SJens Wiklander ECP_VALIDATE_RET( f_rng != NULL ); 32083d3b0591SJens Wiklander 32093d3b0591SJens Wiklander MBEDTLS_MPI_CHK( mbedtls_ecp_gen_privkey( grp, d, f_rng, p_rng ) ); 32103d3b0591SJens Wiklander MBEDTLS_MPI_CHK( mbedtls_ecp_mul( grp, Q, d, G, f_rng, p_rng ) ); 32113d3b0591SJens Wiklander 32123d3b0591SJens Wiklander cleanup: 32133d3b0591SJens Wiklander return( ret ); 3214817466cbSJens Wiklander } 3215817466cbSJens Wiklander 3216817466cbSJens Wiklander /* 3217817466cbSJens Wiklander * Generate key pair, wrapper for conventional base point 3218817466cbSJens Wiklander */ 3219817466cbSJens Wiklander int mbedtls_ecp_gen_keypair( mbedtls_ecp_group *grp, 3220817466cbSJens Wiklander mbedtls_mpi *d, mbedtls_ecp_point *Q, 3221817466cbSJens Wiklander int (*f_rng)(void *, unsigned char *, size_t), 3222817466cbSJens Wiklander void *p_rng ) 3223817466cbSJens Wiklander { 32243d3b0591SJens Wiklander ECP_VALIDATE_RET( grp != NULL ); 32253d3b0591SJens Wiklander ECP_VALIDATE_RET( d != NULL ); 32263d3b0591SJens Wiklander ECP_VALIDATE_RET( Q != NULL ); 32273d3b0591SJens Wiklander ECP_VALIDATE_RET( f_rng != NULL ); 32283d3b0591SJens Wiklander 3229817466cbSJens Wiklander return( mbedtls_ecp_gen_keypair_base( grp, &grp->G, d, Q, f_rng, p_rng ) ); 3230817466cbSJens Wiklander } 3231817466cbSJens Wiklander 3232817466cbSJens Wiklander /* 3233817466cbSJens Wiklander * Generate a keypair, prettier wrapper 3234817466cbSJens Wiklander */ 3235817466cbSJens Wiklander int mbedtls_ecp_gen_key( mbedtls_ecp_group_id grp_id, mbedtls_ecp_keypair *key, 3236817466cbSJens Wiklander int (*f_rng)(void *, unsigned char *, size_t), void *p_rng ) 3237817466cbSJens Wiklander { 323811fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 32393d3b0591SJens Wiklander ECP_VALIDATE_RET( key != NULL ); 32403d3b0591SJens Wiklander ECP_VALIDATE_RET( f_rng != NULL ); 3241817466cbSJens Wiklander 3242817466cbSJens Wiklander if( ( ret = mbedtls_ecp_group_load( &key->grp, grp_id ) ) != 0 ) 3243817466cbSJens Wiklander return( ret ); 3244817466cbSJens Wiklander 3245817466cbSJens Wiklander return( mbedtls_ecp_gen_keypair( &key->grp, &key->d, &key->Q, f_rng, p_rng ) ); 3246817466cbSJens Wiklander } 3247817466cbSJens Wiklander 324811fa71b9SJerome Forissier #define ECP_CURVE25519_KEY_SIZE 32 324911fa71b9SJerome Forissier /* 325011fa71b9SJerome Forissier * Read a private key. 325111fa71b9SJerome Forissier */ 325211fa71b9SJerome Forissier int mbedtls_ecp_read_key( mbedtls_ecp_group_id grp_id, mbedtls_ecp_keypair *key, 325311fa71b9SJerome Forissier const unsigned char *buf, size_t buflen ) 325411fa71b9SJerome Forissier { 325511fa71b9SJerome Forissier int ret = 0; 325611fa71b9SJerome Forissier 325711fa71b9SJerome Forissier ECP_VALIDATE_RET( key != NULL ); 325811fa71b9SJerome Forissier ECP_VALIDATE_RET( buf != NULL ); 325911fa71b9SJerome Forissier 326011fa71b9SJerome Forissier if( ( ret = mbedtls_ecp_group_load( &key->grp, grp_id ) ) != 0 ) 326111fa71b9SJerome Forissier return( ret ); 326211fa71b9SJerome Forissier 326311fa71b9SJerome Forissier ret = MBEDTLS_ERR_ECP_FEATURE_UNAVAILABLE; 326411fa71b9SJerome Forissier 32657901324dSJerome Forissier #if defined(MBEDTLS_ECP_MONTGOMERY_ENABLED) 326611fa71b9SJerome Forissier if( mbedtls_ecp_get_type( &key->grp ) == MBEDTLS_ECP_TYPE_MONTGOMERY ) 326711fa71b9SJerome Forissier { 326811fa71b9SJerome Forissier /* 326911fa71b9SJerome Forissier * If it is Curve25519 curve then mask the key as mandated by RFC7748 327011fa71b9SJerome Forissier */ 327111fa71b9SJerome Forissier if( grp_id == MBEDTLS_ECP_DP_CURVE25519 ) 327211fa71b9SJerome Forissier { 327311fa71b9SJerome Forissier if( buflen != ECP_CURVE25519_KEY_SIZE ) 327411fa71b9SJerome Forissier return MBEDTLS_ERR_ECP_INVALID_KEY; 327511fa71b9SJerome Forissier 327611fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_read_binary_le( &key->d, buf, buflen ) ); 327711fa71b9SJerome Forissier 327811fa71b9SJerome Forissier /* Set the three least significant bits to 0 */ 327911fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_set_bit( &key->d, 0, 0 ) ); 328011fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_set_bit( &key->d, 1, 0 ) ); 328111fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_set_bit( &key->d, 2, 0 ) ); 328211fa71b9SJerome Forissier 328311fa71b9SJerome Forissier /* Set the most significant bit to 0 */ 328411fa71b9SJerome Forissier MBEDTLS_MPI_CHK( 328511fa71b9SJerome Forissier mbedtls_mpi_set_bit( &key->d, 328611fa71b9SJerome Forissier ECP_CURVE25519_KEY_SIZE * 8 - 1, 0 ) 328711fa71b9SJerome Forissier ); 328811fa71b9SJerome Forissier 328911fa71b9SJerome Forissier /* Set the second most significant bit to 1 */ 329011fa71b9SJerome Forissier MBEDTLS_MPI_CHK( 329111fa71b9SJerome Forissier mbedtls_mpi_set_bit( &key->d, 329211fa71b9SJerome Forissier ECP_CURVE25519_KEY_SIZE * 8 - 2, 1 ) 329311fa71b9SJerome Forissier ); 329411fa71b9SJerome Forissier } 329511fa71b9SJerome Forissier else 329611fa71b9SJerome Forissier ret = MBEDTLS_ERR_ECP_FEATURE_UNAVAILABLE; 329711fa71b9SJerome Forissier } 329811fa71b9SJerome Forissier 329911fa71b9SJerome Forissier #endif 33007901324dSJerome Forissier #if defined(MBEDTLS_ECP_SHORT_WEIERSTRASS_ENABLED) 330111fa71b9SJerome Forissier if( mbedtls_ecp_get_type( &key->grp ) == MBEDTLS_ECP_TYPE_SHORT_WEIERSTRASS ) 330211fa71b9SJerome Forissier { 330311fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_read_binary( &key->d, buf, buflen ) ); 330411fa71b9SJerome Forissier 330511fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_ecp_check_privkey( &key->grp, &key->d ) ); 330611fa71b9SJerome Forissier } 330711fa71b9SJerome Forissier 330811fa71b9SJerome Forissier #endif 330911fa71b9SJerome Forissier cleanup: 331011fa71b9SJerome Forissier 331111fa71b9SJerome Forissier if( ret != 0 ) 331211fa71b9SJerome Forissier mbedtls_mpi_free( &key->d ); 331311fa71b9SJerome Forissier 331411fa71b9SJerome Forissier return( ret ); 331511fa71b9SJerome Forissier } 331611fa71b9SJerome Forissier 3317817466cbSJens Wiklander /* 33187901324dSJerome Forissier * Write a private key. 33197901324dSJerome Forissier */ 33207901324dSJerome Forissier int mbedtls_ecp_write_key( mbedtls_ecp_keypair *key, 33217901324dSJerome Forissier unsigned char *buf, size_t buflen ) 33227901324dSJerome Forissier { 33237901324dSJerome Forissier int ret = MBEDTLS_ERR_ECP_FEATURE_UNAVAILABLE; 33247901324dSJerome Forissier 33257901324dSJerome Forissier ECP_VALIDATE_RET( key != NULL ); 33267901324dSJerome Forissier ECP_VALIDATE_RET( buf != NULL ); 33277901324dSJerome Forissier 33287901324dSJerome Forissier #if defined(MBEDTLS_ECP_MONTGOMERY_ENABLED) 33297901324dSJerome Forissier if( mbedtls_ecp_get_type( &key->grp ) == MBEDTLS_ECP_TYPE_MONTGOMERY ) 33307901324dSJerome Forissier { 33317901324dSJerome Forissier if( key->grp.id == MBEDTLS_ECP_DP_CURVE25519 ) 33327901324dSJerome Forissier { 33337901324dSJerome Forissier if( buflen < ECP_CURVE25519_KEY_SIZE ) 33347901324dSJerome Forissier return MBEDTLS_ERR_ECP_BUFFER_TOO_SMALL; 33357901324dSJerome Forissier 33367901324dSJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_write_binary_le( &key->d, buf, buflen ) ); 33377901324dSJerome Forissier } 33387901324dSJerome Forissier else 33397901324dSJerome Forissier ret = MBEDTLS_ERR_ECP_FEATURE_UNAVAILABLE; 33407901324dSJerome Forissier } 33417901324dSJerome Forissier 33427901324dSJerome Forissier #endif 33437901324dSJerome Forissier #if defined(MBEDTLS_ECP_SHORT_WEIERSTRASS_ENABLED) 33447901324dSJerome Forissier if( mbedtls_ecp_get_type( &key->grp ) == MBEDTLS_ECP_TYPE_SHORT_WEIERSTRASS ) 33457901324dSJerome Forissier { 33467901324dSJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_write_binary( &key->d, buf, buflen ) ); 33477901324dSJerome Forissier } 33487901324dSJerome Forissier 33497901324dSJerome Forissier #endif 33507901324dSJerome Forissier cleanup: 33517901324dSJerome Forissier 33527901324dSJerome Forissier return( ret ); 33537901324dSJerome Forissier } 33547901324dSJerome Forissier 33557901324dSJerome Forissier 33567901324dSJerome Forissier /* 3357817466cbSJens Wiklander * Check a public-private key pair 3358817466cbSJens Wiklander */ 3359817466cbSJens Wiklander int mbedtls_ecp_check_pub_priv( const mbedtls_ecp_keypair *pub, const mbedtls_ecp_keypair *prv ) 3360817466cbSJens Wiklander { 336111fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 3362817466cbSJens Wiklander mbedtls_ecp_point Q; 3363817466cbSJens Wiklander mbedtls_ecp_group grp; 33643d3b0591SJens Wiklander ECP_VALIDATE_RET( pub != NULL ); 33653d3b0591SJens Wiklander ECP_VALIDATE_RET( prv != NULL ); 3366817466cbSJens Wiklander 3367817466cbSJens Wiklander if( pub->grp.id == MBEDTLS_ECP_DP_NONE || 3368817466cbSJens Wiklander pub->grp.id != prv->grp.id || 3369817466cbSJens Wiklander mbedtls_mpi_cmp_mpi( &pub->Q.X, &prv->Q.X ) || 3370817466cbSJens Wiklander mbedtls_mpi_cmp_mpi( &pub->Q.Y, &prv->Q.Y ) || 3371817466cbSJens Wiklander mbedtls_mpi_cmp_mpi( &pub->Q.Z, &prv->Q.Z ) ) 3372817466cbSJens Wiklander { 3373817466cbSJens Wiklander return( MBEDTLS_ERR_ECP_BAD_INPUT_DATA ); 3374817466cbSJens Wiklander } 3375817466cbSJens Wiklander 3376817466cbSJens Wiklander mbedtls_ecp_point_init( &Q ); 3377817466cbSJens Wiklander mbedtls_ecp_group_init( &grp ); 3378817466cbSJens Wiklander 3379817466cbSJens Wiklander /* mbedtls_ecp_mul() needs a non-const group... */ 3380817466cbSJens Wiklander mbedtls_ecp_group_copy( &grp, &prv->grp ); 3381817466cbSJens Wiklander 3382817466cbSJens Wiklander /* Also checks d is valid */ 3383817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_ecp_mul( &grp, &Q, &prv->d, &prv->grp.G, NULL, NULL ) ); 3384817466cbSJens Wiklander 3385817466cbSJens Wiklander if( mbedtls_mpi_cmp_mpi( &Q.X, &prv->Q.X ) || 3386817466cbSJens Wiklander mbedtls_mpi_cmp_mpi( &Q.Y, &prv->Q.Y ) || 3387817466cbSJens Wiklander mbedtls_mpi_cmp_mpi( &Q.Z, &prv->Q.Z ) ) 3388817466cbSJens Wiklander { 3389817466cbSJens Wiklander ret = MBEDTLS_ERR_ECP_BAD_INPUT_DATA; 3390817466cbSJens Wiklander goto cleanup; 3391817466cbSJens Wiklander } 3392817466cbSJens Wiklander 3393817466cbSJens Wiklander cleanup: 3394817466cbSJens Wiklander mbedtls_ecp_point_free( &Q ); 3395817466cbSJens Wiklander mbedtls_ecp_group_free( &grp ); 3396817466cbSJens Wiklander 3397817466cbSJens Wiklander return( ret ); 3398817466cbSJens Wiklander } 3399817466cbSJens Wiklander 3400817466cbSJens Wiklander #if defined(MBEDTLS_SELF_TEST) 3401817466cbSJens Wiklander 34027901324dSJerome Forissier /* Adjust the exponent to be a valid private point for the specified curve. 34037901324dSJerome Forissier * This is sometimes necessary because we use a single set of exponents 34047901324dSJerome Forissier * for all curves but the validity of values depends on the curve. */ 34057901324dSJerome Forissier static int self_test_adjust_exponent( const mbedtls_ecp_group *grp, 34067901324dSJerome Forissier mbedtls_mpi *m ) 34077901324dSJerome Forissier { 34087901324dSJerome Forissier int ret = 0; 34097901324dSJerome Forissier switch( grp->id ) 34107901324dSJerome Forissier { 34117901324dSJerome Forissier /* If Curve25519 is available, then that's what we use for the 34127901324dSJerome Forissier * Montgomery test, so we don't need the adjustment code. */ 34137901324dSJerome Forissier #if ! defined(MBEDTLS_ECP_DP_CURVE25519_ENABLED) 34147901324dSJerome Forissier #if defined(MBEDTLS_ECP_DP_CURVE448_ENABLED) 34157901324dSJerome Forissier case MBEDTLS_ECP_DP_CURVE448: 34167901324dSJerome Forissier /* Move highest bit from 254 to N-1. Setting bit N-1 is 34177901324dSJerome Forissier * necessary to enforce the highest-bit-set constraint. */ 34187901324dSJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_set_bit( m, 254, 0 ) ); 34197901324dSJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_set_bit( m, grp->nbits, 1 ) ); 34207901324dSJerome Forissier /* Copy second-highest bit from 253 to N-2. This is not 34217901324dSJerome Forissier * necessary but improves the test variety a bit. */ 34227901324dSJerome Forissier MBEDTLS_MPI_CHK( 34237901324dSJerome Forissier mbedtls_mpi_set_bit( m, grp->nbits - 1, 34247901324dSJerome Forissier mbedtls_mpi_get_bit( m, 253 ) ) ); 34257901324dSJerome Forissier break; 34267901324dSJerome Forissier #endif 34277901324dSJerome Forissier #endif /* ! defined(MBEDTLS_ECP_DP_CURVE25519_ENABLED) */ 34287901324dSJerome Forissier default: 34297901324dSJerome Forissier /* Non-Montgomery curves and Curve25519 need no adjustment. */ 34307901324dSJerome Forissier (void) grp; 34317901324dSJerome Forissier (void) m; 34327901324dSJerome Forissier goto cleanup; 34337901324dSJerome Forissier } 34347901324dSJerome Forissier cleanup: 34357901324dSJerome Forissier return( ret ); 34367901324dSJerome Forissier } 34377901324dSJerome Forissier 34387901324dSJerome Forissier /* Calculate R = m.P for each m in exponents. Check that the number of 34397901324dSJerome Forissier * basic operations doesn't depend on the value of m. */ 34407901324dSJerome Forissier static int self_test_point( int verbose, 34417901324dSJerome Forissier mbedtls_ecp_group *grp, 34427901324dSJerome Forissier mbedtls_ecp_point *R, 34437901324dSJerome Forissier mbedtls_mpi *m, 34447901324dSJerome Forissier const mbedtls_ecp_point *P, 34457901324dSJerome Forissier const char *const *exponents, 34467901324dSJerome Forissier size_t n_exponents ) 34477901324dSJerome Forissier { 34487901324dSJerome Forissier int ret = 0; 34497901324dSJerome Forissier size_t i = 0; 34507901324dSJerome Forissier unsigned long add_c_prev, dbl_c_prev, mul_c_prev; 34517901324dSJerome Forissier add_count = 0; 34527901324dSJerome Forissier dbl_count = 0; 34537901324dSJerome Forissier mul_count = 0; 34547901324dSJerome Forissier 34557901324dSJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_read_string( m, 16, exponents[0] ) ); 34567901324dSJerome Forissier MBEDTLS_MPI_CHK( self_test_adjust_exponent( grp, m ) ); 34577901324dSJerome Forissier MBEDTLS_MPI_CHK( mbedtls_ecp_mul( grp, R, m, P, NULL, NULL ) ); 34587901324dSJerome Forissier 34597901324dSJerome Forissier for( i = 1; i < n_exponents; i++ ) 34607901324dSJerome Forissier { 34617901324dSJerome Forissier add_c_prev = add_count; 34627901324dSJerome Forissier dbl_c_prev = dbl_count; 34637901324dSJerome Forissier mul_c_prev = mul_count; 34647901324dSJerome Forissier add_count = 0; 34657901324dSJerome Forissier dbl_count = 0; 34667901324dSJerome Forissier mul_count = 0; 34677901324dSJerome Forissier 34687901324dSJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_read_string( m, 16, exponents[i] ) ); 34697901324dSJerome Forissier MBEDTLS_MPI_CHK( self_test_adjust_exponent( grp, m ) ); 34707901324dSJerome Forissier MBEDTLS_MPI_CHK( mbedtls_ecp_mul( grp, R, m, P, NULL, NULL ) ); 34717901324dSJerome Forissier 34727901324dSJerome Forissier if( add_count != add_c_prev || 34737901324dSJerome Forissier dbl_count != dbl_c_prev || 34747901324dSJerome Forissier mul_count != mul_c_prev ) 34757901324dSJerome Forissier { 34767901324dSJerome Forissier ret = 1; 34777901324dSJerome Forissier break; 34787901324dSJerome Forissier } 34797901324dSJerome Forissier } 34807901324dSJerome Forissier 34817901324dSJerome Forissier cleanup: 34827901324dSJerome Forissier if( verbose != 0 ) 34837901324dSJerome Forissier { 34847901324dSJerome Forissier if( ret != 0 ) 34857901324dSJerome Forissier mbedtls_printf( "failed (%u)\n", (unsigned int) i ); 34867901324dSJerome Forissier else 34877901324dSJerome Forissier mbedtls_printf( "passed\n" ); 34887901324dSJerome Forissier } 34897901324dSJerome Forissier return( ret ); 34907901324dSJerome Forissier } 34917901324dSJerome Forissier 3492817466cbSJens Wiklander /* 3493817466cbSJens Wiklander * Checkup routine 3494817466cbSJens Wiklander */ 3495817466cbSJens Wiklander int mbedtls_ecp_self_test( int verbose ) 3496817466cbSJens Wiklander { 349711fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 3498817466cbSJens Wiklander mbedtls_ecp_group grp; 3499817466cbSJens Wiklander mbedtls_ecp_point R, P; 3500817466cbSJens Wiklander mbedtls_mpi m; 35017901324dSJerome Forissier 35027901324dSJerome Forissier #if defined(MBEDTLS_ECP_SHORT_WEIERSTRASS_ENABLED) 35037901324dSJerome Forissier /* Exponents especially adapted for secp192k1, which has the lowest 35047901324dSJerome Forissier * order n of all supported curves (secp192r1 is in a slightly larger 35057901324dSJerome Forissier * field but the order of its base point is slightly smaller). */ 35067901324dSJerome Forissier const char *sw_exponents[] = 3507817466cbSJens Wiklander { 3508817466cbSJens Wiklander "000000000000000000000000000000000000000000000001", /* one */ 35097901324dSJerome Forissier "FFFFFFFFFFFFFFFFFFFFFFFE26F2FC170F69466A74DEFD8C", /* n - 1 */ 3510817466cbSJens Wiklander "5EA6F389A38B8BC81E767753B15AA5569E1782E30ABE7D25", /* random */ 3511817466cbSJens Wiklander "400000000000000000000000000000000000000000000000", /* one and zeros */ 3512817466cbSJens Wiklander "7FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF", /* all ones */ 3513817466cbSJens Wiklander "555555555555555555555555555555555555555555555555", /* 101010... */ 3514817466cbSJens Wiklander }; 35157901324dSJerome Forissier #endif /* MBEDTLS_ECP_SHORT_WEIERSTRASS_ENABLED */ 35167901324dSJerome Forissier #if defined(MBEDTLS_ECP_MONTGOMERY_ENABLED) 35177901324dSJerome Forissier const char *m_exponents[] = 35187901324dSJerome Forissier { 35197901324dSJerome Forissier /* Valid private values for Curve25519. In a build with Curve448 35207901324dSJerome Forissier * but not Curve25519, they will be adjusted in 35217901324dSJerome Forissier * self_test_adjust_exponent(). */ 35227901324dSJerome Forissier "4000000000000000000000000000000000000000000000000000000000000000", 35237901324dSJerome Forissier "5C3C3C3C3C3C3C3C3C3C3C3C3C3C3C3C3C3C3C3C3C3C3C3C3C3C3C3C3C3C3C30", 35247901324dSJerome Forissier "5715ECCE24583F7A7023C24164390586842E816D7280A49EF6DF4EAE6B280BF8", 35257901324dSJerome Forissier "41A2B017516F6D254E1F002BCCBADD54BE30F8CEC737A0E912B4963B6BA74460", 35267901324dSJerome Forissier "5555555555555555555555555555555555555555555555555555555555555550", 35277901324dSJerome Forissier "7FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF8", 35287901324dSJerome Forissier }; 35297901324dSJerome Forissier #endif /* MBEDTLS_ECP_MONTGOMERY_ENABLED */ 3530817466cbSJens Wiklander 3531817466cbSJens Wiklander mbedtls_ecp_group_init( &grp ); 3532817466cbSJens Wiklander mbedtls_ecp_point_init( &R ); 3533817466cbSJens Wiklander mbedtls_ecp_point_init( &P ); 3534817466cbSJens Wiklander mbedtls_mpi_init( &m ); 3535817466cbSJens Wiklander 35367901324dSJerome Forissier #if defined(MBEDTLS_ECP_SHORT_WEIERSTRASS_ENABLED) 3537817466cbSJens Wiklander /* Use secp192r1 if available, or any available curve */ 3538817466cbSJens Wiklander #if defined(MBEDTLS_ECP_DP_SECP192R1_ENABLED) 3539817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_ecp_group_load( &grp, MBEDTLS_ECP_DP_SECP192R1 ) ); 3540817466cbSJens Wiklander #else 3541817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_ecp_group_load( &grp, mbedtls_ecp_curve_list()->grp_id ) ); 3542817466cbSJens Wiklander #endif 3543817466cbSJens Wiklander 3544817466cbSJens Wiklander if( verbose != 0 ) 35457901324dSJerome Forissier mbedtls_printf( " ECP SW test #1 (constant op_count, base point G): " ); 3546817466cbSJens Wiklander /* Do a dummy multiplication first to trigger precomputation */ 3547817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_lset( &m, 2 ) ); 3548817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_ecp_mul( &grp, &P, &m, &grp.G, NULL, NULL ) ); 35497901324dSJerome Forissier ret = self_test_point( verbose, 35507901324dSJerome Forissier &grp, &R, &m, &grp.G, 35517901324dSJerome Forissier sw_exponents, 35527901324dSJerome Forissier sizeof( sw_exponents ) / sizeof( sw_exponents[0] )); 35537901324dSJerome Forissier if( ret != 0 ) 3554817466cbSJens Wiklander goto cleanup; 3555817466cbSJens Wiklander 3556817466cbSJens Wiklander if( verbose != 0 ) 35577901324dSJerome Forissier mbedtls_printf( " ECP SW test #2 (constant op_count, other point): " ); 3558817466cbSJens Wiklander /* We computed P = 2G last time, use it */ 35597901324dSJerome Forissier ret = self_test_point( verbose, 35607901324dSJerome Forissier &grp, &R, &m, &P, 35617901324dSJerome Forissier sw_exponents, 35627901324dSJerome Forissier sizeof( sw_exponents ) / sizeof( sw_exponents[0] )); 35637901324dSJerome Forissier if( ret != 0 ) 3564817466cbSJens Wiklander goto cleanup; 3565817466cbSJens Wiklander 35667901324dSJerome Forissier mbedtls_ecp_group_free( &grp ); 35677901324dSJerome Forissier mbedtls_ecp_point_free( &R ); 35687901324dSJerome Forissier #endif /* MBEDTLS_ECP_SHORT_WEIERSTRASS_ENABLED */ 35697901324dSJerome Forissier 35707901324dSJerome Forissier #if defined(MBEDTLS_ECP_MONTGOMERY_ENABLED) 3571817466cbSJens Wiklander if( verbose != 0 ) 35727901324dSJerome Forissier mbedtls_printf( " ECP Montgomery test (constant op_count): " ); 35737901324dSJerome Forissier #if defined(MBEDTLS_ECP_DP_CURVE25519_ENABLED) 35747901324dSJerome Forissier MBEDTLS_MPI_CHK( mbedtls_ecp_group_load( &grp, MBEDTLS_ECP_DP_CURVE25519 ) ); 35757901324dSJerome Forissier #elif defined(MBEDTLS_ECP_DP_CURVE448_ENABLED) 35767901324dSJerome Forissier MBEDTLS_MPI_CHK( mbedtls_ecp_group_load( &grp, MBEDTLS_ECP_DP_CURVE448 ) ); 35777901324dSJerome Forissier #else 35787901324dSJerome Forissier #error "MBEDTLS_ECP_MONTGOMERY_ENABLED is defined, but no curve is supported for self-test" 35797901324dSJerome Forissier #endif 35807901324dSJerome Forissier ret = self_test_point( verbose, 35817901324dSJerome Forissier &grp, &R, &m, &grp.G, 35827901324dSJerome Forissier m_exponents, 35837901324dSJerome Forissier sizeof( m_exponents ) / sizeof( m_exponents[0] )); 35847901324dSJerome Forissier if( ret != 0 ) 35857901324dSJerome Forissier goto cleanup; 35867901324dSJerome Forissier #endif /* MBEDTLS_ECP_MONTGOMERY_ENABLED */ 3587817466cbSJens Wiklander 3588817466cbSJens Wiklander cleanup: 3589817466cbSJens Wiklander 3590817466cbSJens Wiklander if( ret < 0 && verbose != 0 ) 35917901324dSJerome Forissier mbedtls_printf( "Unexpected error, return code = %08X\n", (unsigned int) ret ); 3592817466cbSJens Wiklander 3593817466cbSJens Wiklander mbedtls_ecp_group_free( &grp ); 3594817466cbSJens Wiklander mbedtls_ecp_point_free( &R ); 3595817466cbSJens Wiklander mbedtls_ecp_point_free( &P ); 3596817466cbSJens Wiklander mbedtls_mpi_free( &m ); 3597817466cbSJens Wiklander 3598817466cbSJens Wiklander if( verbose != 0 ) 3599817466cbSJens Wiklander mbedtls_printf( "\n" ); 3600817466cbSJens Wiklander 3601817466cbSJens Wiklander return( ret ); 3602817466cbSJens Wiklander } 3603817466cbSJens Wiklander 3604817466cbSJens Wiklander #endif /* MBEDTLS_SELF_TEST */ 3605817466cbSJens Wiklander 3606817466cbSJens Wiklander #endif /* !MBEDTLS_ECP_ALT */ 3607817466cbSJens Wiklander 3608817466cbSJens Wiklander #endif /* MBEDTLS_ECP_C */ 3609