1c6672fdcSEdison Ai // SPDX-License-Identifier: Apache-2.0 2817466cbSJens Wiklander /* 3817466cbSJens Wiklander * Elliptic curves over GF(p): generic functions 4817466cbSJens Wiklander * 5817466cbSJens Wiklander * Copyright (C) 2006-2015, ARM Limited, All Rights Reserved 6817466cbSJens Wiklander * 7817466cbSJens Wiklander * Licensed under the Apache License, Version 2.0 (the "License"); you may 8817466cbSJens Wiklander * not use this file except in compliance with the License. 9817466cbSJens Wiklander * You may obtain a copy of the License at 10817466cbSJens Wiklander * 11817466cbSJens Wiklander * http://www.apache.org/licenses/LICENSE-2.0 12817466cbSJens Wiklander * 13817466cbSJens Wiklander * Unless required by applicable law or agreed to in writing, software 14817466cbSJens Wiklander * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT 15817466cbSJens Wiklander * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 16817466cbSJens Wiklander * See the License for the specific language governing permissions and 17817466cbSJens Wiklander * limitations under the License. 18817466cbSJens Wiklander * 19817466cbSJens Wiklander * This file is part of mbed TLS (https://tls.mbed.org) 20817466cbSJens Wiklander */ 21817466cbSJens Wiklander 22817466cbSJens Wiklander /* 23817466cbSJens Wiklander * References: 24817466cbSJens Wiklander * 25817466cbSJens Wiklander * SEC1 http://www.secg.org/index.php?action=secg,docs_secg 26817466cbSJens Wiklander * GECC = Guide to Elliptic Curve Cryptography - Hankerson, Menezes, Vanstone 27817466cbSJens Wiklander * FIPS 186-3 http://csrc.nist.gov/publications/fips/fips186-3/fips_186-3.pdf 28817466cbSJens Wiklander * RFC 4492 for the related TLS structures and constants 293d3b0591SJens Wiklander * RFC 7748 for the Curve448 and Curve25519 curve definitions 30817466cbSJens Wiklander * 31817466cbSJens Wiklander * [Curve25519] http://cr.yp.to/ecdh/curve25519-20060209.pdf 32817466cbSJens Wiklander * 33817466cbSJens Wiklander * [2] CORON, Jean-S'ebastien. Resistance against differential power analysis 34817466cbSJens Wiklander * for elliptic curve cryptosystems. In : Cryptographic Hardware and 35817466cbSJens Wiklander * Embedded Systems. Springer Berlin Heidelberg, 1999. p. 292-302. 36817466cbSJens Wiklander * <http://link.springer.com/chapter/10.1007/3-540-48059-5_25> 37817466cbSJens Wiklander * 38817466cbSJens Wiklander * [3] HEDABOU, Mustapha, PINEL, Pierre, et B'EN'ETEAU, Lucien. A comb method to 39817466cbSJens Wiklander * render ECC resistant against Side Channel Attacks. IACR Cryptology 40817466cbSJens Wiklander * ePrint Archive, 2004, vol. 2004, p. 342. 41817466cbSJens Wiklander * <http://eprint.iacr.org/2004/342.pdf> 42817466cbSJens Wiklander */ 43817466cbSJens Wiklander 44817466cbSJens Wiklander #if !defined(MBEDTLS_CONFIG_FILE) 45817466cbSJens Wiklander #include "mbedtls/config.h" 46817466cbSJens Wiklander #else 47817466cbSJens Wiklander #include MBEDTLS_CONFIG_FILE 48817466cbSJens Wiklander #endif 49817466cbSJens Wiklander 503d3b0591SJens Wiklander /** 513d3b0591SJens Wiklander * \brief Function level alternative implementation. 523d3b0591SJens Wiklander * 533d3b0591SJens Wiklander * The MBEDTLS_ECP_INTERNAL_ALT macro enables alternative implementations to 543d3b0591SJens Wiklander * replace certain functions in this module. The alternative implementations are 553d3b0591SJens Wiklander * typically hardware accelerators and need to activate the hardware before the 563d3b0591SJens Wiklander * computation starts and deactivate it after it finishes. The 573d3b0591SJens Wiklander * mbedtls_internal_ecp_init() and mbedtls_internal_ecp_free() functions serve 583d3b0591SJens Wiklander * this purpose. 593d3b0591SJens Wiklander * 603d3b0591SJens Wiklander * To preserve the correct functionality the following conditions must hold: 613d3b0591SJens Wiklander * 623d3b0591SJens Wiklander * - The alternative implementation must be activated by 633d3b0591SJens Wiklander * mbedtls_internal_ecp_init() before any of the replaceable functions is 643d3b0591SJens Wiklander * called. 653d3b0591SJens Wiklander * - mbedtls_internal_ecp_free() must \b only be called when the alternative 663d3b0591SJens Wiklander * implementation is activated. 673d3b0591SJens Wiklander * - mbedtls_internal_ecp_init() must \b not be called when the alternative 683d3b0591SJens Wiklander * implementation is activated. 693d3b0591SJens Wiklander * - Public functions must not return while the alternative implementation is 703d3b0591SJens Wiklander * activated. 713d3b0591SJens Wiklander * - Replaceable functions are guarded by \c MBEDTLS_ECP_XXX_ALT macros and 723d3b0591SJens Wiklander * before calling them an \code if( mbedtls_internal_ecp_grp_capable( grp ) ) 733d3b0591SJens Wiklander * \endcode ensures that the alternative implementation supports the current 743d3b0591SJens Wiklander * group. 753d3b0591SJens Wiklander */ 763d3b0591SJens Wiklander #if defined(MBEDTLS_ECP_INTERNAL_ALT) 773d3b0591SJens Wiklander #endif 783d3b0591SJens Wiklander 79817466cbSJens Wiklander #if defined(MBEDTLS_ECP_C) 80817466cbSJens Wiklander 81817466cbSJens Wiklander #include "mbedtls/ecp.h" 82817466cbSJens Wiklander #include "mbedtls/threading.h" 833d3b0591SJens Wiklander #include "mbedtls/platform_util.h" 84*11fa71b9SJerome Forissier #include "mbedtls/error.h" 85817466cbSJens Wiklander 86817466cbSJens Wiklander #include <string.h> 87817466cbSJens Wiklander 88817466cbSJens Wiklander #if !defined(MBEDTLS_ECP_ALT) 89817466cbSJens Wiklander 903d3b0591SJens Wiklander /* Parameter validation macros based on platform_util.h */ 913d3b0591SJens Wiklander #define ECP_VALIDATE_RET( cond ) \ 923d3b0591SJens Wiklander MBEDTLS_INTERNAL_VALIDATE_RET( cond, MBEDTLS_ERR_ECP_BAD_INPUT_DATA ) 933d3b0591SJens Wiklander #define ECP_VALIDATE( cond ) \ 943d3b0591SJens Wiklander MBEDTLS_INTERNAL_VALIDATE( cond ) 953d3b0591SJens Wiklander 96817466cbSJens Wiklander #if defined(MBEDTLS_PLATFORM_C) 97817466cbSJens Wiklander #include "mbedtls/platform.h" 98817466cbSJens Wiklander #else 99817466cbSJens Wiklander #include <stdlib.h> 100817466cbSJens Wiklander #include <stdio.h> 101817466cbSJens Wiklander #define mbedtls_printf printf 102817466cbSJens Wiklander #define mbedtls_calloc calloc 103817466cbSJens Wiklander #define mbedtls_free free 104817466cbSJens Wiklander #endif 105817466cbSJens Wiklander 106817466cbSJens Wiklander #include "mbedtls/ecp_internal.h" 107817466cbSJens Wiklander 108817466cbSJens Wiklander #if ( defined(__ARMCC_VERSION) || defined(_MSC_VER) ) && \ 109817466cbSJens Wiklander !defined(inline) && !defined(__cplusplus) 110817466cbSJens Wiklander #define inline __inline 111817466cbSJens Wiklander #endif 112817466cbSJens Wiklander 113817466cbSJens Wiklander #if defined(MBEDTLS_SELF_TEST) 114817466cbSJens Wiklander /* 115817466cbSJens Wiklander * Counts of point addition and doubling, and field multiplications. 116817466cbSJens Wiklander * Used to test resistance of point multiplication to simple timing attacks. 117817466cbSJens Wiklander */ 118817466cbSJens Wiklander static unsigned long add_count, dbl_count, mul_count; 119817466cbSJens Wiklander #endif 120817466cbSJens Wiklander 1213d3b0591SJens Wiklander #if defined(MBEDTLS_ECP_RESTARTABLE) 1223d3b0591SJens Wiklander /* 1233d3b0591SJens Wiklander * Maximum number of "basic operations" to be done in a row. 1243d3b0591SJens Wiklander * 1253d3b0591SJens Wiklander * Default value 0 means that ECC operations will not yield. 1263d3b0591SJens Wiklander * Note that regardless of the value of ecp_max_ops, always at 1273d3b0591SJens Wiklander * least one step is performed before yielding. 1283d3b0591SJens Wiklander * 1293d3b0591SJens Wiklander * Setting ecp_max_ops=1 can be suitable for testing purposes 1303d3b0591SJens Wiklander * as it will interrupt computation at all possible points. 1313d3b0591SJens Wiklander */ 1323d3b0591SJens Wiklander static unsigned ecp_max_ops = 0; 1333d3b0591SJens Wiklander 1343d3b0591SJens Wiklander /* 1353d3b0591SJens Wiklander * Set ecp_max_ops 1363d3b0591SJens Wiklander */ 1373d3b0591SJens Wiklander void mbedtls_ecp_set_max_ops( unsigned max_ops ) 1383d3b0591SJens Wiklander { 1393d3b0591SJens Wiklander ecp_max_ops = max_ops; 1403d3b0591SJens Wiklander } 1413d3b0591SJens Wiklander 1423d3b0591SJens Wiklander /* 1433d3b0591SJens Wiklander * Check if restart is enabled 1443d3b0591SJens Wiklander */ 1453d3b0591SJens Wiklander int mbedtls_ecp_restart_is_enabled( void ) 1463d3b0591SJens Wiklander { 1473d3b0591SJens Wiklander return( ecp_max_ops != 0 ); 1483d3b0591SJens Wiklander } 1493d3b0591SJens Wiklander 1503d3b0591SJens Wiklander /* 1513d3b0591SJens Wiklander * Restart sub-context for ecp_mul_comb() 1523d3b0591SJens Wiklander */ 1533d3b0591SJens Wiklander struct mbedtls_ecp_restart_mul 1543d3b0591SJens Wiklander { 1553d3b0591SJens Wiklander mbedtls_ecp_point R; /* current intermediate result */ 1563d3b0591SJens Wiklander size_t i; /* current index in various loops, 0 outside */ 1573d3b0591SJens Wiklander mbedtls_ecp_point *T; /* table for precomputed points */ 1583d3b0591SJens Wiklander unsigned char T_size; /* number of points in table T */ 1593d3b0591SJens Wiklander enum { /* what were we doing last time we returned? */ 1603d3b0591SJens Wiklander ecp_rsm_init = 0, /* nothing so far, dummy initial state */ 1613d3b0591SJens Wiklander ecp_rsm_pre_dbl, /* precompute 2^n multiples */ 1623d3b0591SJens Wiklander ecp_rsm_pre_norm_dbl, /* normalize precomputed 2^n multiples */ 1633d3b0591SJens Wiklander ecp_rsm_pre_add, /* precompute remaining points by adding */ 1643d3b0591SJens Wiklander ecp_rsm_pre_norm_add, /* normalize all precomputed points */ 1653d3b0591SJens Wiklander ecp_rsm_comb_core, /* ecp_mul_comb_core() */ 1663d3b0591SJens Wiklander ecp_rsm_final_norm, /* do the final normalization */ 1673d3b0591SJens Wiklander } state; 1683d3b0591SJens Wiklander }; 1693d3b0591SJens Wiklander 1703d3b0591SJens Wiklander /* 1713d3b0591SJens Wiklander * Init restart_mul sub-context 1723d3b0591SJens Wiklander */ 1733d3b0591SJens Wiklander static void ecp_restart_rsm_init( mbedtls_ecp_restart_mul_ctx *ctx ) 1743d3b0591SJens Wiklander { 1753d3b0591SJens Wiklander mbedtls_ecp_point_init( &ctx->R ); 1763d3b0591SJens Wiklander ctx->i = 0; 1773d3b0591SJens Wiklander ctx->T = NULL; 1783d3b0591SJens Wiklander ctx->T_size = 0; 1793d3b0591SJens Wiklander ctx->state = ecp_rsm_init; 1803d3b0591SJens Wiklander } 1813d3b0591SJens Wiklander 1823d3b0591SJens Wiklander /* 1833d3b0591SJens Wiklander * Free the components of a restart_mul sub-context 1843d3b0591SJens Wiklander */ 1853d3b0591SJens Wiklander static void ecp_restart_rsm_free( mbedtls_ecp_restart_mul_ctx *ctx ) 1863d3b0591SJens Wiklander { 1873d3b0591SJens Wiklander unsigned char i; 1883d3b0591SJens Wiklander 1893d3b0591SJens Wiklander if( ctx == NULL ) 1903d3b0591SJens Wiklander return; 1913d3b0591SJens Wiklander 1923d3b0591SJens Wiklander mbedtls_ecp_point_free( &ctx->R ); 1933d3b0591SJens Wiklander 1943d3b0591SJens Wiklander if( ctx->T != NULL ) 1953d3b0591SJens Wiklander { 1963d3b0591SJens Wiklander for( i = 0; i < ctx->T_size; i++ ) 1973d3b0591SJens Wiklander mbedtls_ecp_point_free( ctx->T + i ); 1983d3b0591SJens Wiklander mbedtls_free( ctx->T ); 1993d3b0591SJens Wiklander } 2003d3b0591SJens Wiklander 2013d3b0591SJens Wiklander ecp_restart_rsm_init( ctx ); 2023d3b0591SJens Wiklander } 2033d3b0591SJens Wiklander 2043d3b0591SJens Wiklander /* 2053d3b0591SJens Wiklander * Restart context for ecp_muladd() 2063d3b0591SJens Wiklander */ 2073d3b0591SJens Wiklander struct mbedtls_ecp_restart_muladd 2083d3b0591SJens Wiklander { 2093d3b0591SJens Wiklander mbedtls_ecp_point mP; /* mP value */ 2103d3b0591SJens Wiklander mbedtls_ecp_point R; /* R intermediate result */ 2113d3b0591SJens Wiklander enum { /* what should we do next? */ 2123d3b0591SJens Wiklander ecp_rsma_mul1 = 0, /* first multiplication */ 2133d3b0591SJens Wiklander ecp_rsma_mul2, /* second multiplication */ 2143d3b0591SJens Wiklander ecp_rsma_add, /* addition */ 2153d3b0591SJens Wiklander ecp_rsma_norm, /* normalization */ 2163d3b0591SJens Wiklander } state; 2173d3b0591SJens Wiklander }; 2183d3b0591SJens Wiklander 2193d3b0591SJens Wiklander /* 2203d3b0591SJens Wiklander * Init restart_muladd sub-context 2213d3b0591SJens Wiklander */ 2223d3b0591SJens Wiklander static void ecp_restart_ma_init( mbedtls_ecp_restart_muladd_ctx *ctx ) 2233d3b0591SJens Wiklander { 2243d3b0591SJens Wiklander mbedtls_ecp_point_init( &ctx->mP ); 2253d3b0591SJens Wiklander mbedtls_ecp_point_init( &ctx->R ); 2263d3b0591SJens Wiklander ctx->state = ecp_rsma_mul1; 2273d3b0591SJens Wiklander } 2283d3b0591SJens Wiklander 2293d3b0591SJens Wiklander /* 2303d3b0591SJens Wiklander * Free the components of a restart_muladd sub-context 2313d3b0591SJens Wiklander */ 2323d3b0591SJens Wiklander static void ecp_restart_ma_free( mbedtls_ecp_restart_muladd_ctx *ctx ) 2333d3b0591SJens Wiklander { 2343d3b0591SJens Wiklander if( ctx == NULL ) 2353d3b0591SJens Wiklander return; 2363d3b0591SJens Wiklander 2373d3b0591SJens Wiklander mbedtls_ecp_point_free( &ctx->mP ); 2383d3b0591SJens Wiklander mbedtls_ecp_point_free( &ctx->R ); 2393d3b0591SJens Wiklander 2403d3b0591SJens Wiklander ecp_restart_ma_init( ctx ); 2413d3b0591SJens Wiklander } 2423d3b0591SJens Wiklander 2433d3b0591SJens Wiklander /* 2443d3b0591SJens Wiklander * Initialize a restart context 2453d3b0591SJens Wiklander */ 2463d3b0591SJens Wiklander void mbedtls_ecp_restart_init( mbedtls_ecp_restart_ctx *ctx ) 2473d3b0591SJens Wiklander { 2483d3b0591SJens Wiklander ECP_VALIDATE( ctx != NULL ); 2493d3b0591SJens Wiklander ctx->ops_done = 0; 2503d3b0591SJens Wiklander ctx->depth = 0; 2513d3b0591SJens Wiklander ctx->rsm = NULL; 2523d3b0591SJens Wiklander ctx->ma = NULL; 2533d3b0591SJens Wiklander } 2543d3b0591SJens Wiklander 2553d3b0591SJens Wiklander /* 2563d3b0591SJens Wiklander * Free the components of a restart context 2573d3b0591SJens Wiklander */ 2583d3b0591SJens Wiklander void mbedtls_ecp_restart_free( mbedtls_ecp_restart_ctx *ctx ) 2593d3b0591SJens Wiklander { 2603d3b0591SJens Wiklander if( ctx == NULL ) 2613d3b0591SJens Wiklander return; 2623d3b0591SJens Wiklander 2633d3b0591SJens Wiklander ecp_restart_rsm_free( ctx->rsm ); 2643d3b0591SJens Wiklander mbedtls_free( ctx->rsm ); 2653d3b0591SJens Wiklander 2663d3b0591SJens Wiklander ecp_restart_ma_free( ctx->ma ); 2673d3b0591SJens Wiklander mbedtls_free( ctx->ma ); 2683d3b0591SJens Wiklander 2693d3b0591SJens Wiklander mbedtls_ecp_restart_init( ctx ); 2703d3b0591SJens Wiklander } 2713d3b0591SJens Wiklander 2723d3b0591SJens Wiklander /* 2733d3b0591SJens Wiklander * Check if we can do the next step 2743d3b0591SJens Wiklander */ 2753d3b0591SJens Wiklander int mbedtls_ecp_check_budget( const mbedtls_ecp_group *grp, 2763d3b0591SJens Wiklander mbedtls_ecp_restart_ctx *rs_ctx, 2773d3b0591SJens Wiklander unsigned ops ) 2783d3b0591SJens Wiklander { 2793d3b0591SJens Wiklander ECP_VALIDATE_RET( grp != NULL ); 2803d3b0591SJens Wiklander 2813d3b0591SJens Wiklander if( rs_ctx != NULL && ecp_max_ops != 0 ) 2823d3b0591SJens Wiklander { 2833d3b0591SJens Wiklander /* scale depending on curve size: the chosen reference is 256-bit, 2843d3b0591SJens Wiklander * and multiplication is quadratic. Round to the closest integer. */ 2853d3b0591SJens Wiklander if( grp->pbits >= 512 ) 2863d3b0591SJens Wiklander ops *= 4; 2873d3b0591SJens Wiklander else if( grp->pbits >= 384 ) 2883d3b0591SJens Wiklander ops *= 2; 2893d3b0591SJens Wiklander 2903d3b0591SJens Wiklander /* Avoid infinite loops: always allow first step. 2913d3b0591SJens Wiklander * Because of that, however, it's not generally true 2923d3b0591SJens Wiklander * that ops_done <= ecp_max_ops, so the check 2933d3b0591SJens Wiklander * ops_done > ecp_max_ops below is mandatory. */ 2943d3b0591SJens Wiklander if( ( rs_ctx->ops_done != 0 ) && 2953d3b0591SJens Wiklander ( rs_ctx->ops_done > ecp_max_ops || 2963d3b0591SJens Wiklander ops > ecp_max_ops - rs_ctx->ops_done ) ) 2973d3b0591SJens Wiklander { 2983d3b0591SJens Wiklander return( MBEDTLS_ERR_ECP_IN_PROGRESS ); 2993d3b0591SJens Wiklander } 3003d3b0591SJens Wiklander 3013d3b0591SJens Wiklander /* update running count */ 3023d3b0591SJens Wiklander rs_ctx->ops_done += ops; 3033d3b0591SJens Wiklander } 3043d3b0591SJens Wiklander 3053d3b0591SJens Wiklander return( 0 ); 3063d3b0591SJens Wiklander } 3073d3b0591SJens Wiklander 3083d3b0591SJens Wiklander /* Call this when entering a function that needs its own sub-context */ 3093d3b0591SJens Wiklander #define ECP_RS_ENTER( SUB ) do { \ 3103d3b0591SJens Wiklander /* reset ops count for this call if top-level */ \ 3113d3b0591SJens Wiklander if( rs_ctx != NULL && rs_ctx->depth++ == 0 ) \ 3123d3b0591SJens Wiklander rs_ctx->ops_done = 0; \ 3133d3b0591SJens Wiklander \ 3143d3b0591SJens Wiklander /* set up our own sub-context if needed */ \ 3153d3b0591SJens Wiklander if( mbedtls_ecp_restart_is_enabled() && \ 3163d3b0591SJens Wiklander rs_ctx != NULL && rs_ctx->SUB == NULL ) \ 3173d3b0591SJens Wiklander { \ 3183d3b0591SJens Wiklander rs_ctx->SUB = mbedtls_calloc( 1, sizeof( *rs_ctx->SUB ) ); \ 3193d3b0591SJens Wiklander if( rs_ctx->SUB == NULL ) \ 3203d3b0591SJens Wiklander return( MBEDTLS_ERR_ECP_ALLOC_FAILED ); \ 3213d3b0591SJens Wiklander \ 3223d3b0591SJens Wiklander ecp_restart_## SUB ##_init( rs_ctx->SUB ); \ 3233d3b0591SJens Wiklander } \ 3243d3b0591SJens Wiklander } while( 0 ) 3253d3b0591SJens Wiklander 3263d3b0591SJens Wiklander /* Call this when leaving a function that needs its own sub-context */ 3273d3b0591SJens Wiklander #define ECP_RS_LEAVE( SUB ) do { \ 3283d3b0591SJens Wiklander /* clear our sub-context when not in progress (done or error) */ \ 3293d3b0591SJens Wiklander if( rs_ctx != NULL && rs_ctx->SUB != NULL && \ 3303d3b0591SJens Wiklander ret != MBEDTLS_ERR_ECP_IN_PROGRESS ) \ 3313d3b0591SJens Wiklander { \ 3323d3b0591SJens Wiklander ecp_restart_## SUB ##_free( rs_ctx->SUB ); \ 3333d3b0591SJens Wiklander mbedtls_free( rs_ctx->SUB ); \ 3343d3b0591SJens Wiklander rs_ctx->SUB = NULL; \ 3353d3b0591SJens Wiklander } \ 3363d3b0591SJens Wiklander \ 3373d3b0591SJens Wiklander if( rs_ctx != NULL ) \ 3383d3b0591SJens Wiklander rs_ctx->depth--; \ 3393d3b0591SJens Wiklander } while( 0 ) 3403d3b0591SJens Wiklander 3413d3b0591SJens Wiklander #else /* MBEDTLS_ECP_RESTARTABLE */ 3423d3b0591SJens Wiklander 3433d3b0591SJens Wiklander #define ECP_RS_ENTER( sub ) (void) rs_ctx; 3443d3b0591SJens Wiklander #define ECP_RS_LEAVE( sub ) (void) rs_ctx; 3453d3b0591SJens Wiklander 3463d3b0591SJens Wiklander #endif /* MBEDTLS_ECP_RESTARTABLE */ 3473d3b0591SJens Wiklander 348817466cbSJens Wiklander #if defined(MBEDTLS_ECP_DP_SECP192R1_ENABLED) || \ 349817466cbSJens Wiklander defined(MBEDTLS_ECP_DP_SECP224R1_ENABLED) || \ 350817466cbSJens Wiklander defined(MBEDTLS_ECP_DP_SECP256R1_ENABLED) || \ 351817466cbSJens Wiklander defined(MBEDTLS_ECP_DP_SECP384R1_ENABLED) || \ 352817466cbSJens Wiklander defined(MBEDTLS_ECP_DP_SECP521R1_ENABLED) || \ 353817466cbSJens Wiklander defined(MBEDTLS_ECP_DP_BP256R1_ENABLED) || \ 354817466cbSJens Wiklander defined(MBEDTLS_ECP_DP_BP384R1_ENABLED) || \ 355817466cbSJens Wiklander defined(MBEDTLS_ECP_DP_BP512R1_ENABLED) || \ 356817466cbSJens Wiklander defined(MBEDTLS_ECP_DP_SECP192K1_ENABLED) || \ 357817466cbSJens Wiklander defined(MBEDTLS_ECP_DP_SECP224K1_ENABLED) || \ 358817466cbSJens Wiklander defined(MBEDTLS_ECP_DP_SECP256K1_ENABLED) 359817466cbSJens Wiklander #define ECP_SHORTWEIERSTRASS 360817466cbSJens Wiklander #endif 361817466cbSJens Wiklander 3623d3b0591SJens Wiklander #if defined(MBEDTLS_ECP_DP_CURVE25519_ENABLED) || \ 3633d3b0591SJens Wiklander defined(MBEDTLS_ECP_DP_CURVE448_ENABLED) 364817466cbSJens Wiklander #define ECP_MONTGOMERY 365817466cbSJens Wiklander #endif 366817466cbSJens Wiklander 367817466cbSJens Wiklander /* 368817466cbSJens Wiklander * List of supported curves: 369817466cbSJens Wiklander * - internal ID 370*11fa71b9SJerome Forissier * - TLS NamedCurve ID (RFC 4492 sec. 5.1.1, RFC 7071 sec. 2, RFC 8446 sec. 4.2.7) 371817466cbSJens Wiklander * - size in bits 372817466cbSJens Wiklander * - readable name 373817466cbSJens Wiklander * 374817466cbSJens Wiklander * Curves are listed in order: largest curves first, and for a given size, 375817466cbSJens Wiklander * fastest curves first. This provides the default order for the SSL module. 376817466cbSJens Wiklander * 377817466cbSJens Wiklander * Reminder: update profiles in x509_crt.c when adding a new curves! 378817466cbSJens Wiklander */ 379817466cbSJens Wiklander static const mbedtls_ecp_curve_info ecp_supported_curves[] = 380817466cbSJens Wiklander { 381817466cbSJens Wiklander #if defined(MBEDTLS_ECP_DP_SECP521R1_ENABLED) 382817466cbSJens Wiklander { MBEDTLS_ECP_DP_SECP521R1, 25, 521, "secp521r1" }, 383817466cbSJens Wiklander #endif 384817466cbSJens Wiklander #if defined(MBEDTLS_ECP_DP_BP512R1_ENABLED) 385817466cbSJens Wiklander { MBEDTLS_ECP_DP_BP512R1, 28, 512, "brainpoolP512r1" }, 386817466cbSJens Wiklander #endif 387817466cbSJens Wiklander #if defined(MBEDTLS_ECP_DP_SECP384R1_ENABLED) 388817466cbSJens Wiklander { MBEDTLS_ECP_DP_SECP384R1, 24, 384, "secp384r1" }, 389817466cbSJens Wiklander #endif 390817466cbSJens Wiklander #if defined(MBEDTLS_ECP_DP_BP384R1_ENABLED) 391817466cbSJens Wiklander { MBEDTLS_ECP_DP_BP384R1, 27, 384, "brainpoolP384r1" }, 392817466cbSJens Wiklander #endif 393817466cbSJens Wiklander #if defined(MBEDTLS_ECP_DP_SECP256R1_ENABLED) 394817466cbSJens Wiklander { MBEDTLS_ECP_DP_SECP256R1, 23, 256, "secp256r1" }, 395817466cbSJens Wiklander #endif 396817466cbSJens Wiklander #if defined(MBEDTLS_ECP_DP_SECP256K1_ENABLED) 397817466cbSJens Wiklander { MBEDTLS_ECP_DP_SECP256K1, 22, 256, "secp256k1" }, 398817466cbSJens Wiklander #endif 399817466cbSJens Wiklander #if defined(MBEDTLS_ECP_DP_BP256R1_ENABLED) 400817466cbSJens Wiklander { MBEDTLS_ECP_DP_BP256R1, 26, 256, "brainpoolP256r1" }, 401817466cbSJens Wiklander #endif 402817466cbSJens Wiklander #if defined(MBEDTLS_ECP_DP_SECP224R1_ENABLED) 403817466cbSJens Wiklander { MBEDTLS_ECP_DP_SECP224R1, 21, 224, "secp224r1" }, 404817466cbSJens Wiklander #endif 405817466cbSJens Wiklander #if defined(MBEDTLS_ECP_DP_SECP224K1_ENABLED) 406817466cbSJens Wiklander { MBEDTLS_ECP_DP_SECP224K1, 20, 224, "secp224k1" }, 407817466cbSJens Wiklander #endif 408817466cbSJens Wiklander #if defined(MBEDTLS_ECP_DP_SECP192R1_ENABLED) 409817466cbSJens Wiklander { MBEDTLS_ECP_DP_SECP192R1, 19, 192, "secp192r1" }, 410817466cbSJens Wiklander #endif 411817466cbSJens Wiklander #if defined(MBEDTLS_ECP_DP_SECP192K1_ENABLED) 412817466cbSJens Wiklander { MBEDTLS_ECP_DP_SECP192K1, 18, 192, "secp192k1" }, 413817466cbSJens Wiklander #endif 414*11fa71b9SJerome Forissier #if defined(MBEDTLS_ECP_DP_CURVE25519_ENABLED) && defined(MBEDTLS_ECDH_VARIANT_EVEREST_ENABLED) 415*11fa71b9SJerome Forissier { MBEDTLS_ECP_DP_CURVE25519, 29, 256, "x25519" }, 416*11fa71b9SJerome Forissier #endif 417817466cbSJens Wiklander { MBEDTLS_ECP_DP_NONE, 0, 0, NULL }, 418817466cbSJens Wiklander }; 419817466cbSJens Wiklander 420817466cbSJens Wiklander #define ECP_NB_CURVES sizeof( ecp_supported_curves ) / \ 421817466cbSJens Wiklander sizeof( ecp_supported_curves[0] ) 422817466cbSJens Wiklander 423817466cbSJens Wiklander static mbedtls_ecp_group_id ecp_supported_grp_id[ECP_NB_CURVES]; 424817466cbSJens Wiklander 425817466cbSJens Wiklander /* 426817466cbSJens Wiklander * List of supported curves and associated info 427817466cbSJens Wiklander */ 428817466cbSJens Wiklander const mbedtls_ecp_curve_info *mbedtls_ecp_curve_list( void ) 429817466cbSJens Wiklander { 430817466cbSJens Wiklander return( ecp_supported_curves ); 431817466cbSJens Wiklander } 432817466cbSJens Wiklander 433817466cbSJens Wiklander /* 434817466cbSJens Wiklander * List of supported curves, group ID only 435817466cbSJens Wiklander */ 436817466cbSJens Wiklander const mbedtls_ecp_group_id *mbedtls_ecp_grp_id_list( void ) 437817466cbSJens Wiklander { 438817466cbSJens Wiklander static int init_done = 0; 439817466cbSJens Wiklander 440817466cbSJens Wiklander if( ! init_done ) 441817466cbSJens Wiklander { 442817466cbSJens Wiklander size_t i = 0; 443817466cbSJens Wiklander const mbedtls_ecp_curve_info *curve_info; 444817466cbSJens Wiklander 445817466cbSJens Wiklander for( curve_info = mbedtls_ecp_curve_list(); 446817466cbSJens Wiklander curve_info->grp_id != MBEDTLS_ECP_DP_NONE; 447817466cbSJens Wiklander curve_info++ ) 448817466cbSJens Wiklander { 449817466cbSJens Wiklander ecp_supported_grp_id[i++] = curve_info->grp_id; 450817466cbSJens Wiklander } 451817466cbSJens Wiklander ecp_supported_grp_id[i] = MBEDTLS_ECP_DP_NONE; 452817466cbSJens Wiklander 453817466cbSJens Wiklander init_done = 1; 454817466cbSJens Wiklander } 455817466cbSJens Wiklander 456817466cbSJens Wiklander return( ecp_supported_grp_id ); 457817466cbSJens Wiklander } 458817466cbSJens Wiklander 459817466cbSJens Wiklander /* 460817466cbSJens Wiklander * Get the curve info for the internal identifier 461817466cbSJens Wiklander */ 462817466cbSJens Wiklander const mbedtls_ecp_curve_info *mbedtls_ecp_curve_info_from_grp_id( mbedtls_ecp_group_id grp_id ) 463817466cbSJens Wiklander { 464817466cbSJens Wiklander const mbedtls_ecp_curve_info *curve_info; 465817466cbSJens Wiklander 466817466cbSJens Wiklander for( curve_info = mbedtls_ecp_curve_list(); 467817466cbSJens Wiklander curve_info->grp_id != MBEDTLS_ECP_DP_NONE; 468817466cbSJens Wiklander curve_info++ ) 469817466cbSJens Wiklander { 470817466cbSJens Wiklander if( curve_info->grp_id == grp_id ) 471817466cbSJens Wiklander return( curve_info ); 472817466cbSJens Wiklander } 473817466cbSJens Wiklander 474817466cbSJens Wiklander return( NULL ); 475817466cbSJens Wiklander } 476817466cbSJens Wiklander 477817466cbSJens Wiklander /* 478817466cbSJens Wiklander * Get the curve info from the TLS identifier 479817466cbSJens Wiklander */ 480817466cbSJens Wiklander const mbedtls_ecp_curve_info *mbedtls_ecp_curve_info_from_tls_id( uint16_t tls_id ) 481817466cbSJens Wiklander { 482817466cbSJens Wiklander const mbedtls_ecp_curve_info *curve_info; 483817466cbSJens Wiklander 484817466cbSJens Wiklander for( curve_info = mbedtls_ecp_curve_list(); 485817466cbSJens Wiklander curve_info->grp_id != MBEDTLS_ECP_DP_NONE; 486817466cbSJens Wiklander curve_info++ ) 487817466cbSJens Wiklander { 488817466cbSJens Wiklander if( curve_info->tls_id == tls_id ) 489817466cbSJens Wiklander return( curve_info ); 490817466cbSJens Wiklander } 491817466cbSJens Wiklander 492817466cbSJens Wiklander return( NULL ); 493817466cbSJens Wiklander } 494817466cbSJens Wiklander 495817466cbSJens Wiklander /* 496817466cbSJens Wiklander * Get the curve info from the name 497817466cbSJens Wiklander */ 498817466cbSJens Wiklander const mbedtls_ecp_curve_info *mbedtls_ecp_curve_info_from_name( const char *name ) 499817466cbSJens Wiklander { 500817466cbSJens Wiklander const mbedtls_ecp_curve_info *curve_info; 501817466cbSJens Wiklander 5023d3b0591SJens Wiklander if( name == NULL ) 5033d3b0591SJens Wiklander return( NULL ); 5043d3b0591SJens Wiklander 505817466cbSJens Wiklander for( curve_info = mbedtls_ecp_curve_list(); 506817466cbSJens Wiklander curve_info->grp_id != MBEDTLS_ECP_DP_NONE; 507817466cbSJens Wiklander curve_info++ ) 508817466cbSJens Wiklander { 509817466cbSJens Wiklander if( strcmp( curve_info->name, name ) == 0 ) 510817466cbSJens Wiklander return( curve_info ); 511817466cbSJens Wiklander } 512817466cbSJens Wiklander 513817466cbSJens Wiklander return( NULL ); 514817466cbSJens Wiklander } 515817466cbSJens Wiklander 516817466cbSJens Wiklander /* 517817466cbSJens Wiklander * Get the type of a curve 518817466cbSJens Wiklander */ 519*11fa71b9SJerome Forissier mbedtls_ecp_curve_type mbedtls_ecp_get_type( const mbedtls_ecp_group *grp ) 520817466cbSJens Wiklander { 521817466cbSJens Wiklander if( grp->G.X.p == NULL ) 522*11fa71b9SJerome Forissier return( MBEDTLS_ECP_TYPE_NONE ); 523817466cbSJens Wiklander 524817466cbSJens Wiklander if( grp->G.Y.p == NULL ) 525*11fa71b9SJerome Forissier return( MBEDTLS_ECP_TYPE_MONTGOMERY ); 526817466cbSJens Wiklander else 527*11fa71b9SJerome Forissier return( MBEDTLS_ECP_TYPE_SHORT_WEIERSTRASS ); 528817466cbSJens Wiklander } 529817466cbSJens Wiklander 530817466cbSJens Wiklander /* 531817466cbSJens Wiklander * Initialize (the components of) a point 532817466cbSJens Wiklander */ 533817466cbSJens Wiklander void mbedtls_ecp_point_init( mbedtls_ecp_point *pt ) 534817466cbSJens Wiklander { 5353d3b0591SJens Wiklander ECP_VALIDATE( pt != NULL ); 536817466cbSJens Wiklander 537817466cbSJens Wiklander mbedtls_mpi_init( &pt->X ); 538817466cbSJens Wiklander mbedtls_mpi_init( &pt->Y ); 539817466cbSJens Wiklander mbedtls_mpi_init( &pt->Z ); 540817466cbSJens Wiklander } 541817466cbSJens Wiklander 542817466cbSJens Wiklander /* 543817466cbSJens Wiklander * Initialize (the components of) a group 544817466cbSJens Wiklander */ 545817466cbSJens Wiklander void mbedtls_ecp_group_init( mbedtls_ecp_group *grp ) 546817466cbSJens Wiklander { 5473d3b0591SJens Wiklander ECP_VALIDATE( grp != NULL ); 548817466cbSJens Wiklander 5493d3b0591SJens Wiklander grp->id = MBEDTLS_ECP_DP_NONE; 5503d3b0591SJens Wiklander mbedtls_mpi_init( &grp->P ); 5513d3b0591SJens Wiklander mbedtls_mpi_init( &grp->A ); 5523d3b0591SJens Wiklander mbedtls_mpi_init( &grp->B ); 5533d3b0591SJens Wiklander mbedtls_ecp_point_init( &grp->G ); 5543d3b0591SJens Wiklander mbedtls_mpi_init( &grp->N ); 5553d3b0591SJens Wiklander grp->pbits = 0; 5563d3b0591SJens Wiklander grp->nbits = 0; 5573d3b0591SJens Wiklander grp->h = 0; 5583d3b0591SJens Wiklander grp->modp = NULL; 5593d3b0591SJens Wiklander grp->t_pre = NULL; 5603d3b0591SJens Wiklander grp->t_post = NULL; 5613d3b0591SJens Wiklander grp->t_data = NULL; 5623d3b0591SJens Wiklander grp->T = NULL; 5633d3b0591SJens Wiklander grp->T_size = 0; 564817466cbSJens Wiklander } 565817466cbSJens Wiklander 566817466cbSJens Wiklander /* 567817466cbSJens Wiklander * Initialize (the components of) a key pair 568817466cbSJens Wiklander */ 569817466cbSJens Wiklander void mbedtls_ecp_keypair_init( mbedtls_ecp_keypair *key ) 570817466cbSJens Wiklander { 5713d3b0591SJens Wiklander ECP_VALIDATE( key != NULL ); 572817466cbSJens Wiklander 573817466cbSJens Wiklander mbedtls_ecp_group_init( &key->grp ); 574817466cbSJens Wiklander mbedtls_mpi_init( &key->d ); 575817466cbSJens Wiklander mbedtls_ecp_point_init( &key->Q ); 576817466cbSJens Wiklander } 577817466cbSJens Wiklander 578817466cbSJens Wiklander /* 579817466cbSJens Wiklander * Unallocate (the components of) a point 580817466cbSJens Wiklander */ 581817466cbSJens Wiklander void mbedtls_ecp_point_free( mbedtls_ecp_point *pt ) 582817466cbSJens Wiklander { 583817466cbSJens Wiklander if( pt == NULL ) 584817466cbSJens Wiklander return; 585817466cbSJens Wiklander 586817466cbSJens Wiklander mbedtls_mpi_free( &( pt->X ) ); 587817466cbSJens Wiklander mbedtls_mpi_free( &( pt->Y ) ); 588817466cbSJens Wiklander mbedtls_mpi_free( &( pt->Z ) ); 589817466cbSJens Wiklander } 590817466cbSJens Wiklander 591817466cbSJens Wiklander /* 592817466cbSJens Wiklander * Unallocate (the components of) a group 593817466cbSJens Wiklander */ 594817466cbSJens Wiklander void mbedtls_ecp_group_free( mbedtls_ecp_group *grp ) 595817466cbSJens Wiklander { 596817466cbSJens Wiklander size_t i; 597817466cbSJens Wiklander 598817466cbSJens Wiklander if( grp == NULL ) 599817466cbSJens Wiklander return; 600817466cbSJens Wiklander 601817466cbSJens Wiklander if( grp->h != 1 ) 602817466cbSJens Wiklander { 603817466cbSJens Wiklander mbedtls_mpi_free( &grp->P ); 604817466cbSJens Wiklander mbedtls_mpi_free( &grp->A ); 605817466cbSJens Wiklander mbedtls_mpi_free( &grp->B ); 606817466cbSJens Wiklander mbedtls_ecp_point_free( &grp->G ); 607817466cbSJens Wiklander mbedtls_mpi_free( &grp->N ); 608817466cbSJens Wiklander } 609817466cbSJens Wiklander 610817466cbSJens Wiklander if( grp->T != NULL ) 611817466cbSJens Wiklander { 612817466cbSJens Wiklander for( i = 0; i < grp->T_size; i++ ) 613817466cbSJens Wiklander mbedtls_ecp_point_free( &grp->T[i] ); 614817466cbSJens Wiklander mbedtls_free( grp->T ); 615817466cbSJens Wiklander } 616817466cbSJens Wiklander 6173d3b0591SJens Wiklander mbedtls_platform_zeroize( grp, sizeof( mbedtls_ecp_group ) ); 618817466cbSJens Wiklander } 619817466cbSJens Wiklander 620817466cbSJens Wiklander /* 621817466cbSJens Wiklander * Unallocate (the components of) a key pair 622817466cbSJens Wiklander */ 623817466cbSJens Wiklander void mbedtls_ecp_keypair_free( mbedtls_ecp_keypair *key ) 624817466cbSJens Wiklander { 625817466cbSJens Wiklander if( key == NULL ) 626817466cbSJens Wiklander return; 627817466cbSJens Wiklander 628817466cbSJens Wiklander mbedtls_ecp_group_free( &key->grp ); 629817466cbSJens Wiklander mbedtls_mpi_free( &key->d ); 630817466cbSJens Wiklander mbedtls_ecp_point_free( &key->Q ); 631817466cbSJens Wiklander } 632817466cbSJens Wiklander 633817466cbSJens Wiklander /* 634817466cbSJens Wiklander * Copy the contents of a point 635817466cbSJens Wiklander */ 636817466cbSJens Wiklander int mbedtls_ecp_copy( mbedtls_ecp_point *P, const mbedtls_ecp_point *Q ) 637817466cbSJens Wiklander { 638*11fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 6393d3b0591SJens Wiklander ECP_VALIDATE_RET( P != NULL ); 6403d3b0591SJens Wiklander ECP_VALIDATE_RET( Q != NULL ); 641817466cbSJens Wiklander 642817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_copy( &P->X, &Q->X ) ); 643817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_copy( &P->Y, &Q->Y ) ); 644817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_copy( &P->Z, &Q->Z ) ); 645817466cbSJens Wiklander 646817466cbSJens Wiklander cleanup: 647817466cbSJens Wiklander return( ret ); 648817466cbSJens Wiklander } 649817466cbSJens Wiklander 650817466cbSJens Wiklander /* 651817466cbSJens Wiklander * Copy the contents of a group object 652817466cbSJens Wiklander */ 653817466cbSJens Wiklander int mbedtls_ecp_group_copy( mbedtls_ecp_group *dst, const mbedtls_ecp_group *src ) 654817466cbSJens Wiklander { 6553d3b0591SJens Wiklander ECP_VALIDATE_RET( dst != NULL ); 6563d3b0591SJens Wiklander ECP_VALIDATE_RET( src != NULL ); 6573d3b0591SJens Wiklander 6583d3b0591SJens Wiklander return( mbedtls_ecp_group_load( dst, src->id ) ); 659817466cbSJens Wiklander } 660817466cbSJens Wiklander 661817466cbSJens Wiklander /* 662817466cbSJens Wiklander * Set point to zero 663817466cbSJens Wiklander */ 664817466cbSJens Wiklander int mbedtls_ecp_set_zero( mbedtls_ecp_point *pt ) 665817466cbSJens Wiklander { 666*11fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 6673d3b0591SJens Wiklander ECP_VALIDATE_RET( pt != NULL ); 668817466cbSJens Wiklander 669817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_lset( &pt->X , 1 ) ); 670817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_lset( &pt->Y , 1 ) ); 671817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_lset( &pt->Z , 0 ) ); 672817466cbSJens Wiklander 673817466cbSJens Wiklander cleanup: 674817466cbSJens Wiklander return( ret ); 675817466cbSJens Wiklander } 676817466cbSJens Wiklander 677817466cbSJens Wiklander /* 678817466cbSJens Wiklander * Tell if a point is zero 679817466cbSJens Wiklander */ 680817466cbSJens Wiklander int mbedtls_ecp_is_zero( mbedtls_ecp_point *pt ) 681817466cbSJens Wiklander { 6823d3b0591SJens Wiklander ECP_VALIDATE_RET( pt != NULL ); 6833d3b0591SJens Wiklander 684817466cbSJens Wiklander return( mbedtls_mpi_cmp_int( &pt->Z, 0 ) == 0 ); 685817466cbSJens Wiklander } 686817466cbSJens Wiklander 687817466cbSJens Wiklander /* 6883d3b0591SJens Wiklander * Compare two points lazily 689817466cbSJens Wiklander */ 690817466cbSJens Wiklander int mbedtls_ecp_point_cmp( const mbedtls_ecp_point *P, 691817466cbSJens Wiklander const mbedtls_ecp_point *Q ) 692817466cbSJens Wiklander { 6933d3b0591SJens Wiklander ECP_VALIDATE_RET( P != NULL ); 6943d3b0591SJens Wiklander ECP_VALIDATE_RET( Q != NULL ); 6953d3b0591SJens Wiklander 696817466cbSJens Wiklander if( mbedtls_mpi_cmp_mpi( &P->X, &Q->X ) == 0 && 697817466cbSJens Wiklander mbedtls_mpi_cmp_mpi( &P->Y, &Q->Y ) == 0 && 698817466cbSJens Wiklander mbedtls_mpi_cmp_mpi( &P->Z, &Q->Z ) == 0 ) 699817466cbSJens Wiklander { 700817466cbSJens Wiklander return( 0 ); 701817466cbSJens Wiklander } 702817466cbSJens Wiklander 703817466cbSJens Wiklander return( MBEDTLS_ERR_ECP_BAD_INPUT_DATA ); 704817466cbSJens Wiklander } 705817466cbSJens Wiklander 706817466cbSJens Wiklander /* 707817466cbSJens Wiklander * Import a non-zero point from ASCII strings 708817466cbSJens Wiklander */ 709817466cbSJens Wiklander int mbedtls_ecp_point_read_string( mbedtls_ecp_point *P, int radix, 710817466cbSJens Wiklander const char *x, const char *y ) 711817466cbSJens Wiklander { 712*11fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 7133d3b0591SJens Wiklander ECP_VALIDATE_RET( P != NULL ); 7143d3b0591SJens Wiklander ECP_VALIDATE_RET( x != NULL ); 7153d3b0591SJens Wiklander ECP_VALIDATE_RET( y != NULL ); 716817466cbSJens Wiklander 717817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_read_string( &P->X, radix, x ) ); 718817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_read_string( &P->Y, radix, y ) ); 719817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_lset( &P->Z, 1 ) ); 720817466cbSJens Wiklander 721817466cbSJens Wiklander cleanup: 722817466cbSJens Wiklander return( ret ); 723817466cbSJens Wiklander } 724817466cbSJens Wiklander 725817466cbSJens Wiklander /* 726*11fa71b9SJerome Forissier * Export a point into unsigned binary data (SEC1 2.3.3 and RFC7748) 727817466cbSJens Wiklander */ 7283d3b0591SJens Wiklander int mbedtls_ecp_point_write_binary( const mbedtls_ecp_group *grp, 7293d3b0591SJens Wiklander const mbedtls_ecp_point *P, 730817466cbSJens Wiklander int format, size_t *olen, 731817466cbSJens Wiklander unsigned char *buf, size_t buflen ) 732817466cbSJens Wiklander { 733*11fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ECP_FEATURE_UNAVAILABLE; 734817466cbSJens Wiklander size_t plen; 7353d3b0591SJens Wiklander ECP_VALIDATE_RET( grp != NULL ); 7363d3b0591SJens Wiklander ECP_VALIDATE_RET( P != NULL ); 7373d3b0591SJens Wiklander ECP_VALIDATE_RET( olen != NULL ); 7383d3b0591SJens Wiklander ECP_VALIDATE_RET( buf != NULL ); 7393d3b0591SJens Wiklander ECP_VALIDATE_RET( format == MBEDTLS_ECP_PF_UNCOMPRESSED || 7403d3b0591SJens Wiklander format == MBEDTLS_ECP_PF_COMPRESSED ); 741817466cbSJens Wiklander 742*11fa71b9SJerome Forissier plen = mbedtls_mpi_size( &grp->P ); 743*11fa71b9SJerome Forissier 744*11fa71b9SJerome Forissier #if defined(ECP_MONTGOMERY) 745*11fa71b9SJerome Forissier if( mbedtls_ecp_get_type( grp ) == MBEDTLS_ECP_TYPE_MONTGOMERY ) 746*11fa71b9SJerome Forissier { 747*11fa71b9SJerome Forissier *olen = plen; 748*11fa71b9SJerome Forissier if( buflen < *olen ) 749*11fa71b9SJerome Forissier return( MBEDTLS_ERR_ECP_BUFFER_TOO_SMALL ); 750*11fa71b9SJerome Forissier 751*11fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_write_binary_le( &P->X, buf, plen ) ); 752*11fa71b9SJerome Forissier } 753*11fa71b9SJerome Forissier #endif 754*11fa71b9SJerome Forissier #if defined(ECP_SHORTWEIERSTRASS) 755*11fa71b9SJerome Forissier if( mbedtls_ecp_get_type( grp ) == MBEDTLS_ECP_TYPE_SHORT_WEIERSTRASS ) 756*11fa71b9SJerome Forissier { 757817466cbSJens Wiklander /* 758817466cbSJens Wiklander * Common case: P == 0 759817466cbSJens Wiklander */ 760817466cbSJens Wiklander if( mbedtls_mpi_cmp_int( &P->Z, 0 ) == 0 ) 761817466cbSJens Wiklander { 762817466cbSJens Wiklander if( buflen < 1 ) 763817466cbSJens Wiklander return( MBEDTLS_ERR_ECP_BUFFER_TOO_SMALL ); 764817466cbSJens Wiklander 765817466cbSJens Wiklander buf[0] = 0x00; 766817466cbSJens Wiklander *olen = 1; 767817466cbSJens Wiklander 768817466cbSJens Wiklander return( 0 ); 769817466cbSJens Wiklander } 770817466cbSJens Wiklander 771817466cbSJens Wiklander if( format == MBEDTLS_ECP_PF_UNCOMPRESSED ) 772817466cbSJens Wiklander { 773817466cbSJens Wiklander *olen = 2 * plen + 1; 774817466cbSJens Wiklander 775817466cbSJens Wiklander if( buflen < *olen ) 776817466cbSJens Wiklander return( MBEDTLS_ERR_ECP_BUFFER_TOO_SMALL ); 777817466cbSJens Wiklander 778817466cbSJens Wiklander buf[0] = 0x04; 779817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_write_binary( &P->X, buf + 1, plen ) ); 780817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_write_binary( &P->Y, buf + 1 + plen, plen ) ); 781817466cbSJens Wiklander } 782817466cbSJens Wiklander else if( format == MBEDTLS_ECP_PF_COMPRESSED ) 783817466cbSJens Wiklander { 784817466cbSJens Wiklander *olen = plen + 1; 785817466cbSJens Wiklander 786817466cbSJens Wiklander if( buflen < *olen ) 787817466cbSJens Wiklander return( MBEDTLS_ERR_ECP_BUFFER_TOO_SMALL ); 788817466cbSJens Wiklander 789817466cbSJens Wiklander buf[0] = 0x02 + mbedtls_mpi_get_bit( &P->Y, 0 ); 790817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_write_binary( &P->X, buf + 1, plen ) ); 791817466cbSJens Wiklander } 792*11fa71b9SJerome Forissier } 793*11fa71b9SJerome Forissier #endif 794817466cbSJens Wiklander 795817466cbSJens Wiklander cleanup: 796817466cbSJens Wiklander return( ret ); 797817466cbSJens Wiklander } 798817466cbSJens Wiklander 799817466cbSJens Wiklander /* 800*11fa71b9SJerome Forissier * Import a point from unsigned binary data (SEC1 2.3.4 and RFC7748) 801817466cbSJens Wiklander */ 8023d3b0591SJens Wiklander int mbedtls_ecp_point_read_binary( const mbedtls_ecp_group *grp, 8033d3b0591SJens Wiklander mbedtls_ecp_point *pt, 804817466cbSJens Wiklander const unsigned char *buf, size_t ilen ) 805817466cbSJens Wiklander { 806*11fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ECP_FEATURE_UNAVAILABLE; 807817466cbSJens Wiklander size_t plen; 8083d3b0591SJens Wiklander ECP_VALIDATE_RET( grp != NULL ); 8093d3b0591SJens Wiklander ECP_VALIDATE_RET( pt != NULL ); 8103d3b0591SJens Wiklander ECP_VALIDATE_RET( buf != NULL ); 811817466cbSJens Wiklander 812817466cbSJens Wiklander if( ilen < 1 ) 813817466cbSJens Wiklander return( MBEDTLS_ERR_ECP_BAD_INPUT_DATA ); 814817466cbSJens Wiklander 815*11fa71b9SJerome Forissier plen = mbedtls_mpi_size( &grp->P ); 816*11fa71b9SJerome Forissier 817*11fa71b9SJerome Forissier #if defined(ECP_MONTGOMERY) 818*11fa71b9SJerome Forissier if( mbedtls_ecp_get_type( grp ) == MBEDTLS_ECP_TYPE_MONTGOMERY ) 819*11fa71b9SJerome Forissier { 820*11fa71b9SJerome Forissier if( plen != ilen ) 821*11fa71b9SJerome Forissier return( MBEDTLS_ERR_ECP_BAD_INPUT_DATA ); 822*11fa71b9SJerome Forissier 823*11fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_read_binary_le( &pt->X, buf, plen ) ); 824*11fa71b9SJerome Forissier mbedtls_mpi_free( &pt->Y ); 825*11fa71b9SJerome Forissier 826*11fa71b9SJerome Forissier if( grp->id == MBEDTLS_ECP_DP_CURVE25519 ) 827*11fa71b9SJerome Forissier /* Set most significant bit to 0 as prescribed in RFC7748 §5 */ 828*11fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_set_bit( &pt->X, plen * 8 - 1, 0 ) ); 829*11fa71b9SJerome Forissier 830*11fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_lset( &pt->Z, 1 ) ); 831*11fa71b9SJerome Forissier } 832*11fa71b9SJerome Forissier #endif 833*11fa71b9SJerome Forissier #if defined(ECP_SHORTWEIERSTRASS) 834*11fa71b9SJerome Forissier if( mbedtls_ecp_get_type( grp ) == MBEDTLS_ECP_TYPE_SHORT_WEIERSTRASS ) 835*11fa71b9SJerome Forissier { 836817466cbSJens Wiklander if( buf[0] == 0x00 ) 837817466cbSJens Wiklander { 838817466cbSJens Wiklander if( ilen == 1 ) 839817466cbSJens Wiklander return( mbedtls_ecp_set_zero( pt ) ); 840817466cbSJens Wiklander else 841817466cbSJens Wiklander return( MBEDTLS_ERR_ECP_BAD_INPUT_DATA ); 842817466cbSJens Wiklander } 843817466cbSJens Wiklander 844817466cbSJens Wiklander if( buf[0] != 0x04 ) 845817466cbSJens Wiklander return( MBEDTLS_ERR_ECP_FEATURE_UNAVAILABLE ); 846817466cbSJens Wiklander 847817466cbSJens Wiklander if( ilen != 2 * plen + 1 ) 848817466cbSJens Wiklander return( MBEDTLS_ERR_ECP_BAD_INPUT_DATA ); 849817466cbSJens Wiklander 850817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_read_binary( &pt->X, buf + 1, plen ) ); 851*11fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_read_binary( &pt->Y, 852*11fa71b9SJerome Forissier buf + 1 + plen, plen ) ); 853817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_lset( &pt->Z, 1 ) ); 854*11fa71b9SJerome Forissier } 855*11fa71b9SJerome Forissier #endif 856817466cbSJens Wiklander 857817466cbSJens Wiklander cleanup: 858817466cbSJens Wiklander return( ret ); 859817466cbSJens Wiklander } 860817466cbSJens Wiklander 861817466cbSJens Wiklander /* 862817466cbSJens Wiklander * Import a point from a TLS ECPoint record (RFC 4492) 863817466cbSJens Wiklander * struct { 864817466cbSJens Wiklander * opaque point <1..2^8-1>; 865817466cbSJens Wiklander * } ECPoint; 866817466cbSJens Wiklander */ 8673d3b0591SJens Wiklander int mbedtls_ecp_tls_read_point( const mbedtls_ecp_group *grp, 8683d3b0591SJens Wiklander mbedtls_ecp_point *pt, 869817466cbSJens Wiklander const unsigned char **buf, size_t buf_len ) 870817466cbSJens Wiklander { 871817466cbSJens Wiklander unsigned char data_len; 872817466cbSJens Wiklander const unsigned char *buf_start; 8733d3b0591SJens Wiklander ECP_VALIDATE_RET( grp != NULL ); 8743d3b0591SJens Wiklander ECP_VALIDATE_RET( pt != NULL ); 8753d3b0591SJens Wiklander ECP_VALIDATE_RET( buf != NULL ); 8763d3b0591SJens Wiklander ECP_VALIDATE_RET( *buf != NULL ); 877817466cbSJens Wiklander 878817466cbSJens Wiklander /* 879817466cbSJens Wiklander * We must have at least two bytes (1 for length, at least one for data) 880817466cbSJens Wiklander */ 881817466cbSJens Wiklander if( buf_len < 2 ) 882817466cbSJens Wiklander return( MBEDTLS_ERR_ECP_BAD_INPUT_DATA ); 883817466cbSJens Wiklander 884817466cbSJens Wiklander data_len = *(*buf)++; 885817466cbSJens Wiklander if( data_len < 1 || data_len > buf_len - 1 ) 886817466cbSJens Wiklander return( MBEDTLS_ERR_ECP_BAD_INPUT_DATA ); 887817466cbSJens Wiklander 888817466cbSJens Wiklander /* 889817466cbSJens Wiklander * Save buffer start for read_binary and update buf 890817466cbSJens Wiklander */ 891817466cbSJens Wiklander buf_start = *buf; 892817466cbSJens Wiklander *buf += data_len; 893817466cbSJens Wiklander 8943d3b0591SJens Wiklander return( mbedtls_ecp_point_read_binary( grp, pt, buf_start, data_len ) ); 895817466cbSJens Wiklander } 896817466cbSJens Wiklander 897817466cbSJens Wiklander /* 898817466cbSJens Wiklander * Export a point as a TLS ECPoint record (RFC 4492) 899817466cbSJens Wiklander * struct { 900817466cbSJens Wiklander * opaque point <1..2^8-1>; 901817466cbSJens Wiklander * } ECPoint; 902817466cbSJens Wiklander */ 903817466cbSJens Wiklander int mbedtls_ecp_tls_write_point( const mbedtls_ecp_group *grp, const mbedtls_ecp_point *pt, 904817466cbSJens Wiklander int format, size_t *olen, 905817466cbSJens Wiklander unsigned char *buf, size_t blen ) 906817466cbSJens Wiklander { 907*11fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 9083d3b0591SJens Wiklander ECP_VALIDATE_RET( grp != NULL ); 9093d3b0591SJens Wiklander ECP_VALIDATE_RET( pt != NULL ); 9103d3b0591SJens Wiklander ECP_VALIDATE_RET( olen != NULL ); 9113d3b0591SJens Wiklander ECP_VALIDATE_RET( buf != NULL ); 9123d3b0591SJens Wiklander ECP_VALIDATE_RET( format == MBEDTLS_ECP_PF_UNCOMPRESSED || 9133d3b0591SJens Wiklander format == MBEDTLS_ECP_PF_COMPRESSED ); 914817466cbSJens Wiklander 915817466cbSJens Wiklander /* 916817466cbSJens Wiklander * buffer length must be at least one, for our length byte 917817466cbSJens Wiklander */ 918817466cbSJens Wiklander if( blen < 1 ) 919817466cbSJens Wiklander return( MBEDTLS_ERR_ECP_BAD_INPUT_DATA ); 920817466cbSJens Wiklander 921817466cbSJens Wiklander if( ( ret = mbedtls_ecp_point_write_binary( grp, pt, format, 922817466cbSJens Wiklander olen, buf + 1, blen - 1) ) != 0 ) 923817466cbSJens Wiklander return( ret ); 924817466cbSJens Wiklander 925817466cbSJens Wiklander /* 926817466cbSJens Wiklander * write length to the first byte and update total length 927817466cbSJens Wiklander */ 928817466cbSJens Wiklander buf[0] = (unsigned char) *olen; 929817466cbSJens Wiklander ++*olen; 930817466cbSJens Wiklander 931817466cbSJens Wiklander return( 0 ); 932817466cbSJens Wiklander } 933817466cbSJens Wiklander 934817466cbSJens Wiklander /* 935817466cbSJens Wiklander * Set a group from an ECParameters record (RFC 4492) 936817466cbSJens Wiklander */ 9373d3b0591SJens Wiklander int mbedtls_ecp_tls_read_group( mbedtls_ecp_group *grp, 9383d3b0591SJens Wiklander const unsigned char **buf, size_t len ) 9393d3b0591SJens Wiklander { 940*11fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 9413d3b0591SJens Wiklander mbedtls_ecp_group_id grp_id; 9423d3b0591SJens Wiklander ECP_VALIDATE_RET( grp != NULL ); 9433d3b0591SJens Wiklander ECP_VALIDATE_RET( buf != NULL ); 9443d3b0591SJens Wiklander ECP_VALIDATE_RET( *buf != NULL ); 9453d3b0591SJens Wiklander 9463d3b0591SJens Wiklander if( ( ret = mbedtls_ecp_tls_read_group_id( &grp_id, buf, len ) ) != 0 ) 9473d3b0591SJens Wiklander return( ret ); 9483d3b0591SJens Wiklander 9493d3b0591SJens Wiklander return( mbedtls_ecp_group_load( grp, grp_id ) ); 9503d3b0591SJens Wiklander } 9513d3b0591SJens Wiklander 9523d3b0591SJens Wiklander /* 9533d3b0591SJens Wiklander * Read a group id from an ECParameters record (RFC 4492) and convert it to 9543d3b0591SJens Wiklander * mbedtls_ecp_group_id. 9553d3b0591SJens Wiklander */ 9563d3b0591SJens Wiklander int mbedtls_ecp_tls_read_group_id( mbedtls_ecp_group_id *grp, 9573d3b0591SJens Wiklander const unsigned char **buf, size_t len ) 958817466cbSJens Wiklander { 959817466cbSJens Wiklander uint16_t tls_id; 960817466cbSJens Wiklander const mbedtls_ecp_curve_info *curve_info; 9613d3b0591SJens Wiklander ECP_VALIDATE_RET( grp != NULL ); 9623d3b0591SJens Wiklander ECP_VALIDATE_RET( buf != NULL ); 9633d3b0591SJens Wiklander ECP_VALIDATE_RET( *buf != NULL ); 964817466cbSJens Wiklander 965817466cbSJens Wiklander /* 966817466cbSJens Wiklander * We expect at least three bytes (see below) 967817466cbSJens Wiklander */ 968817466cbSJens Wiklander if( len < 3 ) 969817466cbSJens Wiklander return( MBEDTLS_ERR_ECP_BAD_INPUT_DATA ); 970817466cbSJens Wiklander 971817466cbSJens Wiklander /* 972817466cbSJens Wiklander * First byte is curve_type; only named_curve is handled 973817466cbSJens Wiklander */ 974817466cbSJens Wiklander if( *(*buf)++ != MBEDTLS_ECP_TLS_NAMED_CURVE ) 975817466cbSJens Wiklander return( MBEDTLS_ERR_ECP_BAD_INPUT_DATA ); 976817466cbSJens Wiklander 977817466cbSJens Wiklander /* 978817466cbSJens Wiklander * Next two bytes are the namedcurve value 979817466cbSJens Wiklander */ 980817466cbSJens Wiklander tls_id = *(*buf)++; 981817466cbSJens Wiklander tls_id <<= 8; 982817466cbSJens Wiklander tls_id |= *(*buf)++; 983817466cbSJens Wiklander 984817466cbSJens Wiklander if( ( curve_info = mbedtls_ecp_curve_info_from_tls_id( tls_id ) ) == NULL ) 985817466cbSJens Wiklander return( MBEDTLS_ERR_ECP_FEATURE_UNAVAILABLE ); 986817466cbSJens Wiklander 9873d3b0591SJens Wiklander *grp = curve_info->grp_id; 9883d3b0591SJens Wiklander 9893d3b0591SJens Wiklander return( 0 ); 990817466cbSJens Wiklander } 991817466cbSJens Wiklander 992817466cbSJens Wiklander /* 993817466cbSJens Wiklander * Write the ECParameters record corresponding to a group (RFC 4492) 994817466cbSJens Wiklander */ 995817466cbSJens Wiklander int mbedtls_ecp_tls_write_group( const mbedtls_ecp_group *grp, size_t *olen, 996817466cbSJens Wiklander unsigned char *buf, size_t blen ) 997817466cbSJens Wiklander { 998817466cbSJens Wiklander const mbedtls_ecp_curve_info *curve_info; 9993d3b0591SJens Wiklander ECP_VALIDATE_RET( grp != NULL ); 10003d3b0591SJens Wiklander ECP_VALIDATE_RET( buf != NULL ); 10013d3b0591SJens Wiklander ECP_VALIDATE_RET( olen != NULL ); 1002817466cbSJens Wiklander 1003817466cbSJens Wiklander if( ( curve_info = mbedtls_ecp_curve_info_from_grp_id( grp->id ) ) == NULL ) 1004817466cbSJens Wiklander return( MBEDTLS_ERR_ECP_BAD_INPUT_DATA ); 1005817466cbSJens Wiklander 1006817466cbSJens Wiklander /* 1007817466cbSJens Wiklander * We are going to write 3 bytes (see below) 1008817466cbSJens Wiklander */ 1009817466cbSJens Wiklander *olen = 3; 1010817466cbSJens Wiklander if( blen < *olen ) 1011817466cbSJens Wiklander return( MBEDTLS_ERR_ECP_BUFFER_TOO_SMALL ); 1012817466cbSJens Wiklander 1013817466cbSJens Wiklander /* 1014817466cbSJens Wiklander * First byte is curve_type, always named_curve 1015817466cbSJens Wiklander */ 1016817466cbSJens Wiklander *buf++ = MBEDTLS_ECP_TLS_NAMED_CURVE; 1017817466cbSJens Wiklander 1018817466cbSJens Wiklander /* 1019817466cbSJens Wiklander * Next two bytes are the namedcurve value 1020817466cbSJens Wiklander */ 1021817466cbSJens Wiklander buf[0] = curve_info->tls_id >> 8; 1022817466cbSJens Wiklander buf[1] = curve_info->tls_id & 0xFF; 1023817466cbSJens Wiklander 1024817466cbSJens Wiklander return( 0 ); 1025817466cbSJens Wiklander } 1026817466cbSJens Wiklander 1027817466cbSJens Wiklander /* 1028817466cbSJens Wiklander * Wrapper around fast quasi-modp functions, with fall-back to mbedtls_mpi_mod_mpi. 1029817466cbSJens Wiklander * See the documentation of struct mbedtls_ecp_group. 1030817466cbSJens Wiklander * 1031817466cbSJens Wiklander * This function is in the critial loop for mbedtls_ecp_mul, so pay attention to perf. 1032817466cbSJens Wiklander */ 1033817466cbSJens Wiklander static int ecp_modp( mbedtls_mpi *N, const mbedtls_ecp_group *grp ) 1034817466cbSJens Wiklander { 1035*11fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 1036817466cbSJens Wiklander 1037817466cbSJens Wiklander if( grp->modp == NULL ) 1038817466cbSJens Wiklander return( mbedtls_mpi_mod_mpi( N, N, &grp->P ) ); 1039817466cbSJens Wiklander 1040817466cbSJens Wiklander /* N->s < 0 is a much faster test, which fails only if N is 0 */ 1041817466cbSJens Wiklander if( ( N->s < 0 && mbedtls_mpi_cmp_int( N, 0 ) != 0 ) || 1042817466cbSJens Wiklander mbedtls_mpi_bitlen( N ) > 2 * grp->pbits ) 1043817466cbSJens Wiklander { 1044817466cbSJens Wiklander return( MBEDTLS_ERR_ECP_BAD_INPUT_DATA ); 1045817466cbSJens Wiklander } 1046817466cbSJens Wiklander 1047817466cbSJens Wiklander MBEDTLS_MPI_CHK( grp->modp( N ) ); 1048817466cbSJens Wiklander 1049817466cbSJens Wiklander /* N->s < 0 is a much faster test, which fails only if N is 0 */ 1050817466cbSJens Wiklander while( N->s < 0 && mbedtls_mpi_cmp_int( N, 0 ) != 0 ) 1051817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_add_mpi( N, N, &grp->P ) ); 1052817466cbSJens Wiklander 1053817466cbSJens Wiklander while( mbedtls_mpi_cmp_mpi( N, &grp->P ) >= 0 ) 1054817466cbSJens Wiklander /* we known P, N and the result are positive */ 1055817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_sub_abs( N, N, &grp->P ) ); 1056817466cbSJens Wiklander 1057817466cbSJens Wiklander cleanup: 1058817466cbSJens Wiklander return( ret ); 1059817466cbSJens Wiklander } 1060817466cbSJens Wiklander 1061817466cbSJens Wiklander /* 1062817466cbSJens Wiklander * Fast mod-p functions expect their argument to be in the 0..p^2 range. 1063817466cbSJens Wiklander * 1064817466cbSJens Wiklander * In order to guarantee that, we need to ensure that operands of 1065817466cbSJens Wiklander * mbedtls_mpi_mul_mpi are in the 0..p range. So, after each operation we will 1066817466cbSJens Wiklander * bring the result back to this range. 1067817466cbSJens Wiklander * 1068817466cbSJens Wiklander * The following macros are shortcuts for doing that. 1069817466cbSJens Wiklander */ 1070817466cbSJens Wiklander 1071817466cbSJens Wiklander /* 1072817466cbSJens Wiklander * Reduce a mbedtls_mpi mod p in-place, general case, to use after mbedtls_mpi_mul_mpi 1073817466cbSJens Wiklander */ 1074817466cbSJens Wiklander #if defined(MBEDTLS_SELF_TEST) 1075817466cbSJens Wiklander #define INC_MUL_COUNT mul_count++; 1076817466cbSJens Wiklander #else 1077817466cbSJens Wiklander #define INC_MUL_COUNT 1078817466cbSJens Wiklander #endif 1079817466cbSJens Wiklander 10805b25c76aSJerome Forissier #define MOD_MUL( N ) \ 10815b25c76aSJerome Forissier do \ 10825b25c76aSJerome Forissier { \ 10835b25c76aSJerome Forissier MBEDTLS_MPI_CHK( ecp_modp( &(N), grp ) ); \ 10845b25c76aSJerome Forissier INC_MUL_COUNT \ 10855b25c76aSJerome Forissier } while( 0 ) 1086817466cbSJens Wiklander 1087*11fa71b9SJerome Forissier static inline int mbedtls_mpi_mul_mod( const mbedtls_ecp_group *grp, 1088*11fa71b9SJerome Forissier mbedtls_mpi *X, 1089*11fa71b9SJerome Forissier const mbedtls_mpi *A, 1090*11fa71b9SJerome Forissier const mbedtls_mpi *B ) 1091*11fa71b9SJerome Forissier { 1092*11fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 1093*11fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mpi( X, A, B ) ); 1094*11fa71b9SJerome Forissier MOD_MUL( *X ); 1095*11fa71b9SJerome Forissier cleanup: 1096*11fa71b9SJerome Forissier return( ret ); 1097*11fa71b9SJerome Forissier } 1098*11fa71b9SJerome Forissier 1099817466cbSJens Wiklander /* 1100817466cbSJens Wiklander * Reduce a mbedtls_mpi mod p in-place, to use after mbedtls_mpi_sub_mpi 1101817466cbSJens Wiklander * N->s < 0 is a very fast test, which fails only if N is 0 1102817466cbSJens Wiklander */ 1103817466cbSJens Wiklander #define MOD_SUB( N ) \ 11045b25c76aSJerome Forissier while( (N).s < 0 && mbedtls_mpi_cmp_int( &(N), 0 ) != 0 ) \ 11055b25c76aSJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_add_mpi( &(N), &(N), &grp->P ) ) 1106817466cbSJens Wiklander 1107*11fa71b9SJerome Forissier static inline int mbedtls_mpi_sub_mod( const mbedtls_ecp_group *grp, 1108*11fa71b9SJerome Forissier mbedtls_mpi *X, 1109*11fa71b9SJerome Forissier const mbedtls_mpi *A, 1110*11fa71b9SJerome Forissier const mbedtls_mpi *B ) 1111*11fa71b9SJerome Forissier { 1112*11fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 1113*11fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_sub_mpi( X, A, B ) ); 1114*11fa71b9SJerome Forissier MOD_SUB( *X ); 1115*11fa71b9SJerome Forissier cleanup: 1116*11fa71b9SJerome Forissier return( ret ); 1117*11fa71b9SJerome Forissier } 1118*11fa71b9SJerome Forissier 1119817466cbSJens Wiklander /* 1120817466cbSJens Wiklander * Reduce a mbedtls_mpi mod p in-place, to use after mbedtls_mpi_add_mpi and mbedtls_mpi_mul_int. 1121817466cbSJens Wiklander * We known P, N and the result are positive, so sub_abs is correct, and 1122817466cbSJens Wiklander * a bit faster. 1123817466cbSJens Wiklander */ 1124817466cbSJens Wiklander #define MOD_ADD( N ) \ 11255b25c76aSJerome Forissier while( mbedtls_mpi_cmp_mpi( &(N), &grp->P ) >= 0 ) \ 11265b25c76aSJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_sub_abs( &(N), &(N), &grp->P ) ) 1127817466cbSJens Wiklander 1128*11fa71b9SJerome Forissier static inline int mbedtls_mpi_add_mod( const mbedtls_ecp_group *grp, 1129*11fa71b9SJerome Forissier mbedtls_mpi *X, 1130*11fa71b9SJerome Forissier const mbedtls_mpi *A, 1131*11fa71b9SJerome Forissier const mbedtls_mpi *B ) 1132*11fa71b9SJerome Forissier { 1133*11fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 1134*11fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_add_mpi( X, A, B ) ); 1135*11fa71b9SJerome Forissier MOD_ADD( *X ); 1136*11fa71b9SJerome Forissier cleanup: 1137*11fa71b9SJerome Forissier return( ret ); 1138*11fa71b9SJerome Forissier } 1139*11fa71b9SJerome Forissier 1140*11fa71b9SJerome Forissier static inline int mbedtls_mpi_shift_l_mod( const mbedtls_ecp_group *grp, 1141*11fa71b9SJerome Forissier mbedtls_mpi *X, 1142*11fa71b9SJerome Forissier size_t count ) 1143*11fa71b9SJerome Forissier { 1144*11fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 1145*11fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_shift_l( X, count ) ); 1146*11fa71b9SJerome Forissier MOD_ADD( *X ); 1147*11fa71b9SJerome Forissier cleanup: 1148*11fa71b9SJerome Forissier return( ret ); 1149*11fa71b9SJerome Forissier } 1150*11fa71b9SJerome Forissier 1151817466cbSJens Wiklander #if defined(ECP_SHORTWEIERSTRASS) 1152817466cbSJens Wiklander /* 1153817466cbSJens Wiklander * For curves in short Weierstrass form, we do all the internal operations in 1154817466cbSJens Wiklander * Jacobian coordinates. 1155817466cbSJens Wiklander * 1156817466cbSJens Wiklander * For multiplication, we'll use a comb method with coutermeasueres against 1157817466cbSJens Wiklander * SPA, hence timing attacks. 1158817466cbSJens Wiklander */ 1159817466cbSJens Wiklander 1160817466cbSJens Wiklander /* 1161817466cbSJens Wiklander * Normalize jacobian coordinates so that Z == 0 || Z == 1 (GECC 3.2.1) 1162817466cbSJens Wiklander * Cost: 1N := 1I + 3M + 1S 1163817466cbSJens Wiklander */ 1164817466cbSJens Wiklander static int ecp_normalize_jac( const mbedtls_ecp_group *grp, mbedtls_ecp_point *pt ) 1165817466cbSJens Wiklander { 1166*11fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 1167817466cbSJens Wiklander mbedtls_mpi Zi, ZZi; 1168817466cbSJens Wiklander 1169817466cbSJens Wiklander if( mbedtls_mpi_cmp_int( &pt->Z, 0 ) == 0 ) 1170817466cbSJens Wiklander return( 0 ); 1171817466cbSJens Wiklander 1172817466cbSJens Wiklander #if defined(MBEDTLS_ECP_NORMALIZE_JAC_ALT) 1173817466cbSJens Wiklander if( mbedtls_internal_ecp_grp_capable( grp ) ) 11743d3b0591SJens Wiklander return( mbedtls_internal_ecp_normalize_jac( grp, pt ) ); 1175817466cbSJens Wiklander #endif /* MBEDTLS_ECP_NORMALIZE_JAC_ALT */ 11763d3b0591SJens Wiklander 1177817466cbSJens Wiklander mbedtls_mpi_init( &Zi ); mbedtls_mpi_init( &ZZi ); 1178817466cbSJens Wiklander 1179817466cbSJens Wiklander /* 1180817466cbSJens Wiklander * X = X / Z^2 mod p 1181817466cbSJens Wiklander */ 1182817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_inv_mod( &Zi, &pt->Z, &grp->P ) ); 1183*11fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &ZZi, &Zi, &Zi ) ); 1184*11fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &pt->X, &pt->X, &ZZi ) ); 1185817466cbSJens Wiklander 1186817466cbSJens Wiklander /* 1187817466cbSJens Wiklander * Y = Y / Z^3 mod p 1188817466cbSJens Wiklander */ 1189*11fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &pt->Y, &pt->Y, &ZZi ) ); 1190*11fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &pt->Y, &pt->Y, &Zi ) ); 1191817466cbSJens Wiklander 1192817466cbSJens Wiklander /* 1193817466cbSJens Wiklander * Z = 1 1194817466cbSJens Wiklander */ 1195817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_lset( &pt->Z, 1 ) ); 1196817466cbSJens Wiklander 1197817466cbSJens Wiklander cleanup: 1198817466cbSJens Wiklander 1199817466cbSJens Wiklander mbedtls_mpi_free( &Zi ); mbedtls_mpi_free( &ZZi ); 1200817466cbSJens Wiklander 1201817466cbSJens Wiklander return( ret ); 1202817466cbSJens Wiklander } 1203817466cbSJens Wiklander 1204817466cbSJens Wiklander /* 1205817466cbSJens Wiklander * Normalize jacobian coordinates of an array of (pointers to) points, 1206817466cbSJens Wiklander * using Montgomery's trick to perform only one inversion mod P. 1207817466cbSJens Wiklander * (See for example Cohen's "A Course in Computational Algebraic Number 1208817466cbSJens Wiklander * Theory", Algorithm 10.3.4.) 1209817466cbSJens Wiklander * 1210817466cbSJens Wiklander * Warning: fails (returning an error) if one of the points is zero! 1211817466cbSJens Wiklander * This should never happen, see choice of w in ecp_mul_comb(). 1212817466cbSJens Wiklander * 1213817466cbSJens Wiklander * Cost: 1N(t) := 1I + (6t - 3)M + 1S 1214817466cbSJens Wiklander */ 1215817466cbSJens Wiklander static int ecp_normalize_jac_many( const mbedtls_ecp_group *grp, 12163d3b0591SJens Wiklander mbedtls_ecp_point *T[], size_t T_size ) 1217817466cbSJens Wiklander { 1218*11fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 1219817466cbSJens Wiklander size_t i; 1220817466cbSJens Wiklander mbedtls_mpi *c, u, Zi, ZZi; 1221817466cbSJens Wiklander 12223d3b0591SJens Wiklander if( T_size < 2 ) 1223817466cbSJens Wiklander return( ecp_normalize_jac( grp, *T ) ); 1224817466cbSJens Wiklander 1225817466cbSJens Wiklander #if defined(MBEDTLS_ECP_NORMALIZE_JAC_MANY_ALT) 1226817466cbSJens Wiklander if( mbedtls_internal_ecp_grp_capable( grp ) ) 12273d3b0591SJens Wiklander return( mbedtls_internal_ecp_normalize_jac_many( grp, T, T_size ) ); 1228817466cbSJens Wiklander #endif 1229817466cbSJens Wiklander 12303d3b0591SJens Wiklander if( ( c = mbedtls_calloc( T_size, sizeof( mbedtls_mpi ) ) ) == NULL ) 1231817466cbSJens Wiklander return( MBEDTLS_ERR_ECP_ALLOC_FAILED ); 1232817466cbSJens Wiklander 12333d3b0591SJens Wiklander for( i = 0; i < T_size; i++ ) 12343d3b0591SJens Wiklander mbedtls_mpi_init( &c[i] ); 12353d3b0591SJens Wiklander 1236817466cbSJens Wiklander mbedtls_mpi_init( &u ); mbedtls_mpi_init( &Zi ); mbedtls_mpi_init( &ZZi ); 1237817466cbSJens Wiklander 1238817466cbSJens Wiklander /* 1239817466cbSJens Wiklander * c[i] = Z_0 * ... * Z_i 1240817466cbSJens Wiklander */ 1241817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_copy( &c[0], &T[0]->Z ) ); 12423d3b0591SJens Wiklander for( i = 1; i < T_size; i++ ) 1243817466cbSJens Wiklander { 1244*11fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &c[i], &c[i-1], &T[i]->Z ) ); 1245817466cbSJens Wiklander } 1246817466cbSJens Wiklander 1247817466cbSJens Wiklander /* 1248817466cbSJens Wiklander * u = 1 / (Z_0 * ... * Z_n) mod P 1249817466cbSJens Wiklander */ 12503d3b0591SJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_inv_mod( &u, &c[T_size-1], &grp->P ) ); 1251817466cbSJens Wiklander 12523d3b0591SJens Wiklander for( i = T_size - 1; ; i-- ) 1253817466cbSJens Wiklander { 1254817466cbSJens Wiklander /* 1255817466cbSJens Wiklander * Zi = 1 / Z_i mod p 1256817466cbSJens Wiklander * u = 1 / (Z_0 * ... * Z_i) mod P 1257817466cbSJens Wiklander */ 1258817466cbSJens Wiklander if( i == 0 ) { 1259817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_copy( &Zi, &u ) ); 1260817466cbSJens Wiklander } 1261817466cbSJens Wiklander else 1262817466cbSJens Wiklander { 1263*11fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &Zi, &u, &c[i-1] ) ); 1264*11fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &u, &u, &T[i]->Z ) ); 1265817466cbSJens Wiklander } 1266817466cbSJens Wiklander 1267817466cbSJens Wiklander /* 1268817466cbSJens Wiklander * proceed as in normalize() 1269817466cbSJens Wiklander */ 1270*11fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &ZZi, &Zi, &Zi ) ); 1271*11fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &T[i]->X, &T[i]->X, &ZZi ) ); 1272*11fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &T[i]->Y, &T[i]->Y, &ZZi ) ); 1273*11fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &T[i]->Y, &T[i]->Y, &Zi ) ); 1274817466cbSJens Wiklander 1275817466cbSJens Wiklander /* 1276817466cbSJens Wiklander * Post-precessing: reclaim some memory by shrinking coordinates 1277817466cbSJens Wiklander * - not storing Z (always 1) 1278817466cbSJens Wiklander * - shrinking other coordinates, but still keeping the same number of 1279817466cbSJens Wiklander * limbs as P, as otherwise it will too likely be regrown too fast. 1280817466cbSJens Wiklander */ 1281817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_shrink( &T[i]->X, grp->P.n ) ); 1282817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_shrink( &T[i]->Y, grp->P.n ) ); 1283817466cbSJens Wiklander mbedtls_mpi_free( &T[i]->Z ); 1284817466cbSJens Wiklander 1285817466cbSJens Wiklander if( i == 0 ) 1286817466cbSJens Wiklander break; 1287817466cbSJens Wiklander } 1288817466cbSJens Wiklander 1289817466cbSJens Wiklander cleanup: 1290817466cbSJens Wiklander 1291817466cbSJens Wiklander mbedtls_mpi_free( &u ); mbedtls_mpi_free( &Zi ); mbedtls_mpi_free( &ZZi ); 12923d3b0591SJens Wiklander for( i = 0; i < T_size; i++ ) 1293817466cbSJens Wiklander mbedtls_mpi_free( &c[i] ); 1294817466cbSJens Wiklander mbedtls_free( c ); 1295817466cbSJens Wiklander 1296817466cbSJens Wiklander return( ret ); 1297817466cbSJens Wiklander } 1298817466cbSJens Wiklander 1299817466cbSJens Wiklander /* 1300817466cbSJens Wiklander * Conditional point inversion: Q -> -Q = (Q.X, -Q.Y, Q.Z) without leak. 1301817466cbSJens Wiklander * "inv" must be 0 (don't invert) or 1 (invert) or the result will be invalid 1302817466cbSJens Wiklander */ 1303817466cbSJens Wiklander static int ecp_safe_invert_jac( const mbedtls_ecp_group *grp, 1304817466cbSJens Wiklander mbedtls_ecp_point *Q, 1305817466cbSJens Wiklander unsigned char inv ) 1306817466cbSJens Wiklander { 1307*11fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 1308817466cbSJens Wiklander unsigned char nonzero; 1309817466cbSJens Wiklander mbedtls_mpi mQY; 1310817466cbSJens Wiklander 1311817466cbSJens Wiklander mbedtls_mpi_init( &mQY ); 1312817466cbSJens Wiklander 1313817466cbSJens Wiklander /* Use the fact that -Q.Y mod P = P - Q.Y unless Q.Y == 0 */ 1314817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_sub_mpi( &mQY, &grp->P, &Q->Y ) ); 1315817466cbSJens Wiklander nonzero = mbedtls_mpi_cmp_int( &Q->Y, 0 ) != 0; 1316817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_safe_cond_assign( &Q->Y, &mQY, inv & nonzero ) ); 1317817466cbSJens Wiklander 1318817466cbSJens Wiklander cleanup: 1319817466cbSJens Wiklander mbedtls_mpi_free( &mQY ); 1320817466cbSJens Wiklander 1321817466cbSJens Wiklander return( ret ); 1322817466cbSJens Wiklander } 1323817466cbSJens Wiklander 1324817466cbSJens Wiklander /* 1325817466cbSJens Wiklander * Point doubling R = 2 P, Jacobian coordinates 1326817466cbSJens Wiklander * 1327817466cbSJens Wiklander * Based on http://www.hyperelliptic.org/EFD/g1p/auto-shortw-jacobian.html#doubling-dbl-1998-cmo-2 . 1328817466cbSJens Wiklander * 1329817466cbSJens Wiklander * We follow the variable naming fairly closely. The formula variations that trade a MUL for a SQR 1330817466cbSJens Wiklander * (plus a few ADDs) aren't useful as our bignum implementation doesn't distinguish squaring. 1331817466cbSJens Wiklander * 1332817466cbSJens Wiklander * Standard optimizations are applied when curve parameter A is one of { 0, -3 }. 1333817466cbSJens Wiklander * 1334817466cbSJens Wiklander * Cost: 1D := 3M + 4S (A == 0) 1335817466cbSJens Wiklander * 4M + 4S (A == -3) 1336817466cbSJens Wiklander * 3M + 6S + 1a otherwise 1337817466cbSJens Wiklander */ 1338817466cbSJens Wiklander static int ecp_double_jac( const mbedtls_ecp_group *grp, mbedtls_ecp_point *R, 1339817466cbSJens Wiklander const mbedtls_ecp_point *P ) 1340817466cbSJens Wiklander { 1341*11fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 1342817466cbSJens Wiklander mbedtls_mpi M, S, T, U; 1343817466cbSJens Wiklander 1344817466cbSJens Wiklander #if defined(MBEDTLS_SELF_TEST) 1345817466cbSJens Wiklander dbl_count++; 1346817466cbSJens Wiklander #endif 1347817466cbSJens Wiklander 1348817466cbSJens Wiklander #if defined(MBEDTLS_ECP_DOUBLE_JAC_ALT) 1349817466cbSJens Wiklander if( mbedtls_internal_ecp_grp_capable( grp ) ) 13503d3b0591SJens Wiklander return( mbedtls_internal_ecp_double_jac( grp, R, P ) ); 1351817466cbSJens Wiklander #endif /* MBEDTLS_ECP_DOUBLE_JAC_ALT */ 1352817466cbSJens Wiklander 1353817466cbSJens Wiklander mbedtls_mpi_init( &M ); mbedtls_mpi_init( &S ); mbedtls_mpi_init( &T ); mbedtls_mpi_init( &U ); 1354817466cbSJens Wiklander 1355817466cbSJens Wiklander /* Special case for A = -3 */ 1356817466cbSJens Wiklander if( grp->A.p == NULL ) 1357817466cbSJens Wiklander { 1358817466cbSJens Wiklander /* M = 3(X + Z^2)(X - Z^2) */ 1359*11fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &S, &P->Z, &P->Z ) ); 1360*11fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_add_mod( grp, &T, &P->X, &S ) ); 1361*11fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_sub_mod( grp, &U, &P->X, &S ) ); 1362*11fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &S, &T, &U ) ); 1363817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_mul_int( &M, &S, 3 ) ); MOD_ADD( M ); 1364817466cbSJens Wiklander } 1365817466cbSJens Wiklander else 1366817466cbSJens Wiklander { 1367817466cbSJens Wiklander /* M = 3.X^2 */ 1368*11fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &S, &P->X, &P->X ) ); 1369817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_mul_int( &M, &S, 3 ) ); MOD_ADD( M ); 1370817466cbSJens Wiklander 1371817466cbSJens Wiklander /* Optimize away for "koblitz" curves with A = 0 */ 1372817466cbSJens Wiklander if( mbedtls_mpi_cmp_int( &grp->A, 0 ) != 0 ) 1373817466cbSJens Wiklander { 1374817466cbSJens Wiklander /* M += A.Z^4 */ 1375*11fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &S, &P->Z, &P->Z ) ); 1376*11fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &T, &S, &S ) ); 1377*11fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &S, &T, &grp->A ) ); 1378*11fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_add_mod( grp, &M, &M, &S ) ); 1379817466cbSJens Wiklander } 1380817466cbSJens Wiklander } 1381817466cbSJens Wiklander 1382817466cbSJens Wiklander /* S = 4.X.Y^2 */ 1383*11fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &T, &P->Y, &P->Y ) ); 1384*11fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_shift_l_mod( grp, &T, 1 ) ); 1385*11fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &S, &P->X, &T ) ); 1386*11fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_shift_l_mod( grp, &S, 1 ) ); 1387817466cbSJens Wiklander 1388817466cbSJens Wiklander /* U = 8.Y^4 */ 1389*11fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &U, &T, &T ) ); 1390*11fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_shift_l_mod( grp, &U, 1 ) ); 1391817466cbSJens Wiklander 1392817466cbSJens Wiklander /* T = M^2 - 2.S */ 1393*11fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &T, &M, &M ) ); 1394*11fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_sub_mod( grp, &T, &T, &S ) ); 1395*11fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_sub_mod( grp, &T, &T, &S ) ); 1396817466cbSJens Wiklander 1397817466cbSJens Wiklander /* S = M(S - T) - U */ 1398*11fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_sub_mod( grp, &S, &S, &T ) ); 1399*11fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &S, &S, &M ) ); 1400*11fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_sub_mod( grp, &S, &S, &U ) ); 1401817466cbSJens Wiklander 1402817466cbSJens Wiklander /* U = 2.Y.Z */ 1403*11fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &U, &P->Y, &P->Z ) ); 1404*11fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_shift_l_mod( grp, &U, 1 ) ); 1405817466cbSJens Wiklander 1406817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_copy( &R->X, &T ) ); 1407817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_copy( &R->Y, &S ) ); 1408817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_copy( &R->Z, &U ) ); 1409817466cbSJens Wiklander 1410817466cbSJens Wiklander cleanup: 1411817466cbSJens Wiklander mbedtls_mpi_free( &M ); mbedtls_mpi_free( &S ); mbedtls_mpi_free( &T ); mbedtls_mpi_free( &U ); 1412817466cbSJens Wiklander 1413817466cbSJens Wiklander return( ret ); 1414817466cbSJens Wiklander } 1415817466cbSJens Wiklander 1416817466cbSJens Wiklander /* 1417817466cbSJens Wiklander * Addition: R = P + Q, mixed affine-Jacobian coordinates (GECC 3.22) 1418817466cbSJens Wiklander * 1419817466cbSJens Wiklander * The coordinates of Q must be normalized (= affine), 1420817466cbSJens Wiklander * but those of P don't need to. R is not normalized. 1421817466cbSJens Wiklander * 1422817466cbSJens Wiklander * Special cases: (1) P or Q is zero, (2) R is zero, (3) P == Q. 1423817466cbSJens Wiklander * None of these cases can happen as intermediate step in ecp_mul_comb(): 1424817466cbSJens Wiklander * - at each step, P, Q and R are multiples of the base point, the factor 1425817466cbSJens Wiklander * being less than its order, so none of them is zero; 1426817466cbSJens Wiklander * - Q is an odd multiple of the base point, P an even multiple, 1427817466cbSJens Wiklander * due to the choice of precomputed points in the modified comb method. 1428817466cbSJens Wiklander * So branches for these cases do not leak secret information. 1429817466cbSJens Wiklander * 1430817466cbSJens Wiklander * We accept Q->Z being unset (saving memory in tables) as meaning 1. 1431817466cbSJens Wiklander * 1432817466cbSJens Wiklander * Cost: 1A := 8M + 3S 1433817466cbSJens Wiklander */ 1434817466cbSJens Wiklander static int ecp_add_mixed( const mbedtls_ecp_group *grp, mbedtls_ecp_point *R, 1435817466cbSJens Wiklander const mbedtls_ecp_point *P, const mbedtls_ecp_point *Q ) 1436817466cbSJens Wiklander { 1437*11fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 1438817466cbSJens Wiklander mbedtls_mpi T1, T2, T3, T4, X, Y, Z; 1439817466cbSJens Wiklander 1440817466cbSJens Wiklander #if defined(MBEDTLS_SELF_TEST) 1441817466cbSJens Wiklander add_count++; 1442817466cbSJens Wiklander #endif 1443817466cbSJens Wiklander 1444817466cbSJens Wiklander #if defined(MBEDTLS_ECP_ADD_MIXED_ALT) 1445817466cbSJens Wiklander if( mbedtls_internal_ecp_grp_capable( grp ) ) 14463d3b0591SJens Wiklander return( mbedtls_internal_ecp_add_mixed( grp, R, P, Q ) ); 1447817466cbSJens Wiklander #endif /* MBEDTLS_ECP_ADD_MIXED_ALT */ 1448817466cbSJens Wiklander 1449817466cbSJens Wiklander /* 1450817466cbSJens Wiklander * Trivial cases: P == 0 or Q == 0 (case 1) 1451817466cbSJens Wiklander */ 1452817466cbSJens Wiklander if( mbedtls_mpi_cmp_int( &P->Z, 0 ) == 0 ) 1453817466cbSJens Wiklander return( mbedtls_ecp_copy( R, Q ) ); 1454817466cbSJens Wiklander 1455817466cbSJens Wiklander if( Q->Z.p != NULL && mbedtls_mpi_cmp_int( &Q->Z, 0 ) == 0 ) 1456817466cbSJens Wiklander return( mbedtls_ecp_copy( R, P ) ); 1457817466cbSJens Wiklander 1458817466cbSJens Wiklander /* 1459817466cbSJens Wiklander * Make sure Q coordinates are normalized 1460817466cbSJens Wiklander */ 1461817466cbSJens Wiklander if( Q->Z.p != NULL && mbedtls_mpi_cmp_int( &Q->Z, 1 ) != 0 ) 1462817466cbSJens Wiklander return( MBEDTLS_ERR_ECP_BAD_INPUT_DATA ); 1463817466cbSJens Wiklander 1464817466cbSJens Wiklander mbedtls_mpi_init( &T1 ); mbedtls_mpi_init( &T2 ); mbedtls_mpi_init( &T3 ); mbedtls_mpi_init( &T4 ); 1465817466cbSJens Wiklander mbedtls_mpi_init( &X ); mbedtls_mpi_init( &Y ); mbedtls_mpi_init( &Z ); 1466817466cbSJens Wiklander 1467*11fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &T1, &P->Z, &P->Z ) ); 1468*11fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &T2, &T1, &P->Z ) ); 1469*11fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &T1, &T1, &Q->X ) ); 1470*11fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &T2, &T2, &Q->Y ) ); 1471*11fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_sub_mod( grp, &T1, &T1, &P->X ) ); 1472*11fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_sub_mod( grp, &T2, &T2, &P->Y ) ); 1473817466cbSJens Wiklander 1474817466cbSJens Wiklander /* Special cases (2) and (3) */ 1475817466cbSJens Wiklander if( mbedtls_mpi_cmp_int( &T1, 0 ) == 0 ) 1476817466cbSJens Wiklander { 1477817466cbSJens Wiklander if( mbedtls_mpi_cmp_int( &T2, 0 ) == 0 ) 1478817466cbSJens Wiklander { 1479817466cbSJens Wiklander ret = ecp_double_jac( grp, R, P ); 1480817466cbSJens Wiklander goto cleanup; 1481817466cbSJens Wiklander } 1482817466cbSJens Wiklander else 1483817466cbSJens Wiklander { 1484817466cbSJens Wiklander ret = mbedtls_ecp_set_zero( R ); 1485817466cbSJens Wiklander goto cleanup; 1486817466cbSJens Wiklander } 1487817466cbSJens Wiklander } 1488817466cbSJens Wiklander 1489*11fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &Z, &P->Z, &T1 ) ); 1490*11fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &T3, &T1, &T1 ) ); 1491*11fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &T4, &T3, &T1 ) ); 1492*11fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &T3, &T3, &P->X ) ); 1493*11fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_copy( &T1, &T3 ) ); 1494*11fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_shift_l_mod( grp, &T1, 1 ) ); 1495*11fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &X, &T2, &T2 ) ); 1496*11fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_sub_mod( grp, &X, &X, &T1 ) ); 1497*11fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_sub_mod( grp, &X, &X, &T4 ) ); 1498*11fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_sub_mod( grp, &T3, &T3, &X ) ); 1499*11fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &T3, &T3, &T2 ) ); 1500*11fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &T4, &T4, &P->Y ) ); 1501*11fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_sub_mod( grp, &Y, &T3, &T4 ) ); 1502817466cbSJens Wiklander 1503817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_copy( &R->X, &X ) ); 1504817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_copy( &R->Y, &Y ) ); 1505817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_copy( &R->Z, &Z ) ); 1506817466cbSJens Wiklander 1507817466cbSJens Wiklander cleanup: 1508817466cbSJens Wiklander 1509817466cbSJens Wiklander mbedtls_mpi_free( &T1 ); mbedtls_mpi_free( &T2 ); mbedtls_mpi_free( &T3 ); mbedtls_mpi_free( &T4 ); 1510817466cbSJens Wiklander mbedtls_mpi_free( &X ); mbedtls_mpi_free( &Y ); mbedtls_mpi_free( &Z ); 1511817466cbSJens Wiklander 1512817466cbSJens Wiklander return( ret ); 1513817466cbSJens Wiklander } 1514817466cbSJens Wiklander 1515817466cbSJens Wiklander /* 1516817466cbSJens Wiklander * Randomize jacobian coordinates: 1517817466cbSJens Wiklander * (X, Y, Z) -> (l^2 X, l^3 Y, l Z) for random l 1518817466cbSJens Wiklander * This is sort of the reverse operation of ecp_normalize_jac(). 1519817466cbSJens Wiklander * 1520817466cbSJens Wiklander * This countermeasure was first suggested in [2]. 1521817466cbSJens Wiklander */ 1522817466cbSJens Wiklander static int ecp_randomize_jac( const mbedtls_ecp_group *grp, mbedtls_ecp_point *pt, 1523817466cbSJens Wiklander int (*f_rng)(void *, unsigned char *, size_t), void *p_rng ) 1524817466cbSJens Wiklander { 1525*11fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 1526817466cbSJens Wiklander mbedtls_mpi l, ll; 1527817466cbSJens Wiklander size_t p_size; 1528817466cbSJens Wiklander int count = 0; 1529817466cbSJens Wiklander 1530817466cbSJens Wiklander #if defined(MBEDTLS_ECP_RANDOMIZE_JAC_ALT) 1531817466cbSJens Wiklander if( mbedtls_internal_ecp_grp_capable( grp ) ) 15323d3b0591SJens Wiklander return( mbedtls_internal_ecp_randomize_jac( grp, pt, f_rng, p_rng ) ); 1533817466cbSJens Wiklander #endif /* MBEDTLS_ECP_RANDOMIZE_JAC_ALT */ 1534817466cbSJens Wiklander 1535817466cbSJens Wiklander p_size = ( grp->pbits + 7 ) / 8; 1536817466cbSJens Wiklander mbedtls_mpi_init( &l ); mbedtls_mpi_init( &ll ); 1537817466cbSJens Wiklander 1538817466cbSJens Wiklander /* Generate l such that 1 < l < p */ 1539817466cbSJens Wiklander do 1540817466cbSJens Wiklander { 1541817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_fill_random( &l, p_size, f_rng, p_rng ) ); 1542817466cbSJens Wiklander 1543817466cbSJens Wiklander while( mbedtls_mpi_cmp_mpi( &l, &grp->P ) >= 0 ) 1544817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_shift_r( &l, 1 ) ); 1545817466cbSJens Wiklander 1546817466cbSJens Wiklander if( count++ > 10 ) 1547817466cbSJens Wiklander return( MBEDTLS_ERR_ECP_RANDOM_FAILED ); 1548817466cbSJens Wiklander } 1549817466cbSJens Wiklander while( mbedtls_mpi_cmp_int( &l, 1 ) <= 0 ); 1550817466cbSJens Wiklander 1551817466cbSJens Wiklander /* Z = l * Z */ 1552*11fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &pt->Z, &pt->Z, &l ) ); 1553817466cbSJens Wiklander 1554817466cbSJens Wiklander /* X = l^2 * X */ 1555*11fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &ll, &l, &l ) ); 1556*11fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &pt->X, &pt->X, &ll ) ); 1557817466cbSJens Wiklander 1558817466cbSJens Wiklander /* Y = l^3 * Y */ 1559*11fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &ll, &ll, &l ) ); 1560*11fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &pt->Y, &pt->Y, &ll ) ); 1561817466cbSJens Wiklander 1562817466cbSJens Wiklander cleanup: 1563817466cbSJens Wiklander mbedtls_mpi_free( &l ); mbedtls_mpi_free( &ll ); 1564817466cbSJens Wiklander 1565817466cbSJens Wiklander return( ret ); 1566817466cbSJens Wiklander } 1567817466cbSJens Wiklander 1568817466cbSJens Wiklander /* 1569817466cbSJens Wiklander * Check and define parameters used by the comb method (see below for details) 1570817466cbSJens Wiklander */ 1571817466cbSJens Wiklander #if MBEDTLS_ECP_WINDOW_SIZE < 2 || MBEDTLS_ECP_WINDOW_SIZE > 7 1572817466cbSJens Wiklander #error "MBEDTLS_ECP_WINDOW_SIZE out of bounds" 1573817466cbSJens Wiklander #endif 1574817466cbSJens Wiklander 1575817466cbSJens Wiklander /* d = ceil( n / w ) */ 1576817466cbSJens Wiklander #define COMB_MAX_D ( MBEDTLS_ECP_MAX_BITS + 1 ) / 2 1577817466cbSJens Wiklander 1578817466cbSJens Wiklander /* number of precomputed points */ 1579817466cbSJens Wiklander #define COMB_MAX_PRE ( 1 << ( MBEDTLS_ECP_WINDOW_SIZE - 1 ) ) 1580817466cbSJens Wiklander 1581817466cbSJens Wiklander /* 1582817466cbSJens Wiklander * Compute the representation of m that will be used with our comb method. 1583817466cbSJens Wiklander * 1584817466cbSJens Wiklander * The basic comb method is described in GECC 3.44 for example. We use a 1585817466cbSJens Wiklander * modified version that provides resistance to SPA by avoiding zero 1586817466cbSJens Wiklander * digits in the representation as in [3]. We modify the method further by 1587817466cbSJens Wiklander * requiring that all K_i be odd, which has the small cost that our 15883d3b0591SJens Wiklander * representation uses one more K_i, due to carries, but saves on the size of 15893d3b0591SJens Wiklander * the precomputed table. 1590817466cbSJens Wiklander * 15913d3b0591SJens Wiklander * Summary of the comb method and its modifications: 15923d3b0591SJens Wiklander * 15933d3b0591SJens Wiklander * - The goal is to compute m*P for some w*d-bit integer m. 15943d3b0591SJens Wiklander * 15953d3b0591SJens Wiklander * - The basic comb method splits m into the w-bit integers 15963d3b0591SJens Wiklander * x[0] .. x[d-1] where x[i] consists of the bits in m whose 15973d3b0591SJens Wiklander * index has residue i modulo d, and computes m * P as 15983d3b0591SJens Wiklander * S[x[0]] + 2 * S[x[1]] + .. + 2^(d-1) S[x[d-1]], where 15993d3b0591SJens Wiklander * S[i_{w-1} .. i_0] := i_{w-1} 2^{(w-1)d} P + ... + i_1 2^d P + i_0 P. 16003d3b0591SJens Wiklander * 16013d3b0591SJens Wiklander * - If it happens that, say, x[i+1]=0 (=> S[x[i+1]]=0), one can replace the sum by 16023d3b0591SJens Wiklander * .. + 2^{i-1} S[x[i-1]] - 2^i S[x[i]] + 2^{i+1} S[x[i]] + 2^{i+2} S[x[i+2]] .., 16033d3b0591SJens Wiklander * thereby successively converting it into a form where all summands 16043d3b0591SJens Wiklander * are nonzero, at the cost of negative summands. This is the basic idea of [3]. 16053d3b0591SJens Wiklander * 16063d3b0591SJens Wiklander * - More generally, even if x[i+1] != 0, we can first transform the sum as 16073d3b0591SJens Wiklander * .. - 2^i S[x[i]] + 2^{i+1} ( S[x[i]] + S[x[i+1]] ) + 2^{i+2} S[x[i+2]] .., 16083d3b0591SJens Wiklander * and then replace S[x[i]] + S[x[i+1]] = S[x[i] ^ x[i+1]] + 2 S[x[i] & x[i+1]]. 16093d3b0591SJens Wiklander * Performing and iterating this procedure for those x[i] that are even 16103d3b0591SJens Wiklander * (keeping track of carry), we can transform the original sum into one of the form 16113d3b0591SJens Wiklander * S[x'[0]] +- 2 S[x'[1]] +- .. +- 2^{d-1} S[x'[d-1]] + 2^d S[x'[d]] 16123d3b0591SJens Wiklander * with all x'[i] odd. It is therefore only necessary to know S at odd indices, 16133d3b0591SJens Wiklander * which is why we are only computing half of it in the first place in 16143d3b0591SJens Wiklander * ecp_precompute_comb and accessing it with index abs(i) / 2 in ecp_select_comb. 16153d3b0591SJens Wiklander * 16163d3b0591SJens Wiklander * - For the sake of compactness, only the seven low-order bits of x[i] 16173d3b0591SJens Wiklander * are used to represent its absolute value (K_i in the paper), and the msb 16183d3b0591SJens Wiklander * of x[i] encodes the sign (s_i in the paper): it is set if and only if 16193d3b0591SJens Wiklander * if s_i == -1; 1620817466cbSJens Wiklander * 1621817466cbSJens Wiklander * Calling conventions: 1622817466cbSJens Wiklander * - x is an array of size d + 1 1623817466cbSJens Wiklander * - w is the size, ie number of teeth, of the comb, and must be between 1624817466cbSJens Wiklander * 2 and 7 (in practice, between 2 and MBEDTLS_ECP_WINDOW_SIZE) 1625817466cbSJens Wiklander * - m is the MPI, expected to be odd and such that bitlength(m) <= w * d 1626817466cbSJens Wiklander * (the result will be incorrect if these assumptions are not satisfied) 1627817466cbSJens Wiklander */ 16283d3b0591SJens Wiklander static void ecp_comb_recode_core( unsigned char x[], size_t d, 1629817466cbSJens Wiklander unsigned char w, const mbedtls_mpi *m ) 1630817466cbSJens Wiklander { 1631817466cbSJens Wiklander size_t i, j; 1632817466cbSJens Wiklander unsigned char c, cc, adjust; 1633817466cbSJens Wiklander 1634817466cbSJens Wiklander memset( x, 0, d+1 ); 1635817466cbSJens Wiklander 1636817466cbSJens Wiklander /* First get the classical comb values (except for x_d = 0) */ 1637817466cbSJens Wiklander for( i = 0; i < d; i++ ) 1638817466cbSJens Wiklander for( j = 0; j < w; j++ ) 1639817466cbSJens Wiklander x[i] |= mbedtls_mpi_get_bit( m, i + d * j ) << j; 1640817466cbSJens Wiklander 1641817466cbSJens Wiklander /* Now make sure x_1 .. x_d are odd */ 1642817466cbSJens Wiklander c = 0; 1643817466cbSJens Wiklander for( i = 1; i <= d; i++ ) 1644817466cbSJens Wiklander { 1645817466cbSJens Wiklander /* Add carry and update it */ 1646817466cbSJens Wiklander cc = x[i] & c; 1647817466cbSJens Wiklander x[i] = x[i] ^ c; 1648817466cbSJens Wiklander c = cc; 1649817466cbSJens Wiklander 1650817466cbSJens Wiklander /* Adjust if needed, avoiding branches */ 1651817466cbSJens Wiklander adjust = 1 - ( x[i] & 0x01 ); 1652817466cbSJens Wiklander c |= x[i] & ( x[i-1] * adjust ); 1653817466cbSJens Wiklander x[i] = x[i] ^ ( x[i-1] * adjust ); 1654817466cbSJens Wiklander x[i-1] |= adjust << 7; 1655817466cbSJens Wiklander } 1656817466cbSJens Wiklander } 1657817466cbSJens Wiklander 1658817466cbSJens Wiklander /* 16593d3b0591SJens Wiklander * Precompute points for the adapted comb method 1660817466cbSJens Wiklander * 16613d3b0591SJens Wiklander * Assumption: T must be able to hold 2^{w - 1} elements. 1662817466cbSJens Wiklander * 16633d3b0591SJens Wiklander * Operation: If i = i_{w-1} ... i_1 is the binary representation of i, 16643d3b0591SJens Wiklander * sets T[i] = i_{w-1} 2^{(w-1)d} P + ... + i_1 2^d P + P. 1665817466cbSJens Wiklander * 1666817466cbSJens Wiklander * Cost: d(w-1) D + (2^{w-1} - 1) A + 1 N(w-1) + 1 N(2^{w-1} - 1) 16673d3b0591SJens Wiklander * 16683d3b0591SJens Wiklander * Note: Even comb values (those where P would be omitted from the 16693d3b0591SJens Wiklander * sum defining T[i] above) are not needed in our adaption 16703d3b0591SJens Wiklander * the comb method. See ecp_comb_recode_core(). 16713d3b0591SJens Wiklander * 16723d3b0591SJens Wiklander * This function currently works in four steps: 16733d3b0591SJens Wiklander * (1) [dbl] Computation of intermediate T[i] for 2-power values of i 16743d3b0591SJens Wiklander * (2) [norm_dbl] Normalization of coordinates of these T[i] 16753d3b0591SJens Wiklander * (3) [add] Computation of all T[i] 16763d3b0591SJens Wiklander * (4) [norm_add] Normalization of all T[i] 16773d3b0591SJens Wiklander * 16783d3b0591SJens Wiklander * Step 1 can be interrupted but not the others; together with the final 16793d3b0591SJens Wiklander * coordinate normalization they are the largest steps done at once, depending 16803d3b0591SJens Wiklander * on the window size. Here are operation counts for P-256: 16813d3b0591SJens Wiklander * 16823d3b0591SJens Wiklander * step (2) (3) (4) 16833d3b0591SJens Wiklander * w = 5 142 165 208 16843d3b0591SJens Wiklander * w = 4 136 77 160 16853d3b0591SJens Wiklander * w = 3 130 33 136 16863d3b0591SJens Wiklander * w = 2 124 11 124 16873d3b0591SJens Wiklander * 16883d3b0591SJens Wiklander * So if ECC operations are blocking for too long even with a low max_ops 16893d3b0591SJens Wiklander * value, it's useful to set MBEDTLS_ECP_WINDOW_SIZE to a lower value in order 16903d3b0591SJens Wiklander * to minimize maximum blocking time. 1691817466cbSJens Wiklander */ 1692817466cbSJens Wiklander static int ecp_precompute_comb( const mbedtls_ecp_group *grp, 1693817466cbSJens Wiklander mbedtls_ecp_point T[], const mbedtls_ecp_point *P, 16943d3b0591SJens Wiklander unsigned char w, size_t d, 16953d3b0591SJens Wiklander mbedtls_ecp_restart_ctx *rs_ctx ) 1696817466cbSJens Wiklander { 1697*11fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 16983d3b0591SJens Wiklander unsigned char i; 16993d3b0591SJens Wiklander size_t j = 0; 17003d3b0591SJens Wiklander const unsigned char T_size = 1U << ( w - 1 ); 1701817466cbSJens Wiklander mbedtls_ecp_point *cur, *TT[COMB_MAX_PRE - 1]; 1702817466cbSJens Wiklander 17033d3b0591SJens Wiklander #if defined(MBEDTLS_ECP_RESTARTABLE) 17043d3b0591SJens Wiklander if( rs_ctx != NULL && rs_ctx->rsm != NULL ) 17053d3b0591SJens Wiklander { 17063d3b0591SJens Wiklander if( rs_ctx->rsm->state == ecp_rsm_pre_dbl ) 17073d3b0591SJens Wiklander goto dbl; 17083d3b0591SJens Wiklander if( rs_ctx->rsm->state == ecp_rsm_pre_norm_dbl ) 17093d3b0591SJens Wiklander goto norm_dbl; 17103d3b0591SJens Wiklander if( rs_ctx->rsm->state == ecp_rsm_pre_add ) 17113d3b0591SJens Wiklander goto add; 17123d3b0591SJens Wiklander if( rs_ctx->rsm->state == ecp_rsm_pre_norm_add ) 17133d3b0591SJens Wiklander goto norm_add; 17143d3b0591SJens Wiklander } 17153d3b0591SJens Wiklander #else 17163d3b0591SJens Wiklander (void) rs_ctx; 17173d3b0591SJens Wiklander #endif 17183d3b0591SJens Wiklander 17193d3b0591SJens Wiklander #if defined(MBEDTLS_ECP_RESTARTABLE) 17203d3b0591SJens Wiklander if( rs_ctx != NULL && rs_ctx->rsm != NULL ) 17213d3b0591SJens Wiklander { 17223d3b0591SJens Wiklander rs_ctx->rsm->state = ecp_rsm_pre_dbl; 17233d3b0591SJens Wiklander 17243d3b0591SJens Wiklander /* initial state for the loop */ 17253d3b0591SJens Wiklander rs_ctx->rsm->i = 0; 17263d3b0591SJens Wiklander } 17273d3b0591SJens Wiklander 17283d3b0591SJens Wiklander dbl: 17293d3b0591SJens Wiklander #endif 1730817466cbSJens Wiklander /* 1731817466cbSJens Wiklander * Set T[0] = P and 1732817466cbSJens Wiklander * T[2^{l-1}] = 2^{dl} P for l = 1 .. w-1 (this is not the final value) 1733817466cbSJens Wiklander */ 1734817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_ecp_copy( &T[0], P ) ); 1735817466cbSJens Wiklander 17363d3b0591SJens Wiklander #if defined(MBEDTLS_ECP_RESTARTABLE) 17373d3b0591SJens Wiklander if( rs_ctx != NULL && rs_ctx->rsm != NULL && rs_ctx->rsm->i != 0 ) 17383d3b0591SJens Wiklander j = rs_ctx->rsm->i; 17393d3b0591SJens Wiklander else 17403d3b0591SJens Wiklander #endif 17413d3b0591SJens Wiklander j = 0; 1742817466cbSJens Wiklander 17433d3b0591SJens Wiklander for( ; j < d * ( w - 1 ); j++ ) 17443d3b0591SJens Wiklander { 17453d3b0591SJens Wiklander MBEDTLS_ECP_BUDGET( MBEDTLS_ECP_OPS_DBL ); 17463d3b0591SJens Wiklander 17473d3b0591SJens Wiklander i = 1U << ( j / d ); 17483d3b0591SJens Wiklander cur = T + i; 17493d3b0591SJens Wiklander 17503d3b0591SJens Wiklander if( j % d == 0 ) 17513d3b0591SJens Wiklander MBEDTLS_MPI_CHK( mbedtls_ecp_copy( cur, T + ( i >> 1 ) ) ); 17523d3b0591SJens Wiklander 17533d3b0591SJens Wiklander MBEDTLS_MPI_CHK( ecp_double_jac( grp, cur, cur ) ); 1754817466cbSJens Wiklander } 1755817466cbSJens Wiklander 17563d3b0591SJens Wiklander #if defined(MBEDTLS_ECP_RESTARTABLE) 17573d3b0591SJens Wiklander if( rs_ctx != NULL && rs_ctx->rsm != NULL ) 17583d3b0591SJens Wiklander rs_ctx->rsm->state = ecp_rsm_pre_norm_dbl; 1759817466cbSJens Wiklander 17603d3b0591SJens Wiklander norm_dbl: 17613d3b0591SJens Wiklander #endif 17623d3b0591SJens Wiklander /* 17633d3b0591SJens Wiklander * Normalize current elements in T. As T has holes, 17643d3b0591SJens Wiklander * use an auxiliary array of pointers to elements in T. 17653d3b0591SJens Wiklander */ 17663d3b0591SJens Wiklander j = 0; 17673d3b0591SJens Wiklander for( i = 1; i < T_size; i <<= 1 ) 17683d3b0591SJens Wiklander TT[j++] = T + i; 17693d3b0591SJens Wiklander 17703d3b0591SJens Wiklander MBEDTLS_ECP_BUDGET( MBEDTLS_ECP_OPS_INV + 6 * j - 2 ); 17713d3b0591SJens Wiklander 17723d3b0591SJens Wiklander MBEDTLS_MPI_CHK( ecp_normalize_jac_many( grp, TT, j ) ); 17733d3b0591SJens Wiklander 17743d3b0591SJens Wiklander #if defined(MBEDTLS_ECP_RESTARTABLE) 17753d3b0591SJens Wiklander if( rs_ctx != NULL && rs_ctx->rsm != NULL ) 17763d3b0591SJens Wiklander rs_ctx->rsm->state = ecp_rsm_pre_add; 17773d3b0591SJens Wiklander 17783d3b0591SJens Wiklander add: 17793d3b0591SJens Wiklander #endif 1780817466cbSJens Wiklander /* 1781817466cbSJens Wiklander * Compute the remaining ones using the minimal number of additions 1782817466cbSJens Wiklander * Be careful to update T[2^l] only after using it! 1783817466cbSJens Wiklander */ 17843d3b0591SJens Wiklander MBEDTLS_ECP_BUDGET( ( T_size - 1 ) * MBEDTLS_ECP_OPS_ADD ); 17853d3b0591SJens Wiklander 17863d3b0591SJens Wiklander for( i = 1; i < T_size; i <<= 1 ) 1787817466cbSJens Wiklander { 1788817466cbSJens Wiklander j = i; 1789817466cbSJens Wiklander while( j-- ) 1790817466cbSJens Wiklander MBEDTLS_MPI_CHK( ecp_add_mixed( grp, &T[i + j], &T[j], &T[i] ) ); 1791817466cbSJens Wiklander } 1792817466cbSJens Wiklander 17933d3b0591SJens Wiklander #if defined(MBEDTLS_ECP_RESTARTABLE) 17943d3b0591SJens Wiklander if( rs_ctx != NULL && rs_ctx->rsm != NULL ) 17953d3b0591SJens Wiklander rs_ctx->rsm->state = ecp_rsm_pre_norm_add; 17963d3b0591SJens Wiklander 17973d3b0591SJens Wiklander norm_add: 17983d3b0591SJens Wiklander #endif 17993d3b0591SJens Wiklander /* 18003d3b0591SJens Wiklander * Normalize final elements in T. Even though there are no holes now, we 18013d3b0591SJens Wiklander * still need the auxiliary array for homogeneity with the previous 18023d3b0591SJens Wiklander * call. Also, skip T[0] which is already normalised, being a copy of P. 18033d3b0591SJens Wiklander */ 18043d3b0591SJens Wiklander for( j = 0; j + 1 < T_size; j++ ) 18053d3b0591SJens Wiklander TT[j] = T + j + 1; 18063d3b0591SJens Wiklander 18073d3b0591SJens Wiklander MBEDTLS_ECP_BUDGET( MBEDTLS_ECP_OPS_INV + 6 * j - 2 ); 18083d3b0591SJens Wiklander 18093d3b0591SJens Wiklander MBEDTLS_MPI_CHK( ecp_normalize_jac_many( grp, TT, j ) ); 1810817466cbSJens Wiklander 1811817466cbSJens Wiklander cleanup: 18123d3b0591SJens Wiklander #if defined(MBEDTLS_ECP_RESTARTABLE) 18133d3b0591SJens Wiklander if( rs_ctx != NULL && rs_ctx->rsm != NULL && 18143d3b0591SJens Wiklander ret == MBEDTLS_ERR_ECP_IN_PROGRESS ) 18153d3b0591SJens Wiklander { 18163d3b0591SJens Wiklander if( rs_ctx->rsm->state == ecp_rsm_pre_dbl ) 18173d3b0591SJens Wiklander rs_ctx->rsm->i = j; 18183d3b0591SJens Wiklander } 18193d3b0591SJens Wiklander #endif 1820817466cbSJens Wiklander 1821817466cbSJens Wiklander return( ret ); 1822817466cbSJens Wiklander } 1823817466cbSJens Wiklander 1824817466cbSJens Wiklander /* 1825817466cbSJens Wiklander * Select precomputed point: R = sign(i) * T[ abs(i) / 2 ] 18263d3b0591SJens Wiklander * 18273d3b0591SJens Wiklander * See ecp_comb_recode_core() for background 1828817466cbSJens Wiklander */ 1829817466cbSJens Wiklander static int ecp_select_comb( const mbedtls_ecp_group *grp, mbedtls_ecp_point *R, 18303d3b0591SJens Wiklander const mbedtls_ecp_point T[], unsigned char T_size, 1831817466cbSJens Wiklander unsigned char i ) 1832817466cbSJens Wiklander { 1833*11fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 1834817466cbSJens Wiklander unsigned char ii, j; 1835817466cbSJens Wiklander 1836817466cbSJens Wiklander /* Ignore the "sign" bit and scale down */ 1837817466cbSJens Wiklander ii = ( i & 0x7Fu ) >> 1; 1838817466cbSJens Wiklander 1839817466cbSJens Wiklander /* Read the whole table to thwart cache-based timing attacks */ 18403d3b0591SJens Wiklander for( j = 0; j < T_size; j++ ) 1841817466cbSJens Wiklander { 1842817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_safe_cond_assign( &R->X, &T[j].X, j == ii ) ); 1843817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_safe_cond_assign( &R->Y, &T[j].Y, j == ii ) ); 1844817466cbSJens Wiklander } 1845817466cbSJens Wiklander 1846817466cbSJens Wiklander /* Safely invert result if i is "negative" */ 1847817466cbSJens Wiklander MBEDTLS_MPI_CHK( ecp_safe_invert_jac( grp, R, i >> 7 ) ); 1848817466cbSJens Wiklander 1849817466cbSJens Wiklander cleanup: 1850817466cbSJens Wiklander return( ret ); 1851817466cbSJens Wiklander } 1852817466cbSJens Wiklander 1853817466cbSJens Wiklander /* 1854817466cbSJens Wiklander * Core multiplication algorithm for the (modified) comb method. 1855817466cbSJens Wiklander * This part is actually common with the basic comb method (GECC 3.44) 1856817466cbSJens Wiklander * 1857817466cbSJens Wiklander * Cost: d A + d D + 1 R 1858817466cbSJens Wiklander */ 1859817466cbSJens Wiklander static int ecp_mul_comb_core( const mbedtls_ecp_group *grp, mbedtls_ecp_point *R, 18603d3b0591SJens Wiklander const mbedtls_ecp_point T[], unsigned char T_size, 1861817466cbSJens Wiklander const unsigned char x[], size_t d, 1862817466cbSJens Wiklander int (*f_rng)(void *, unsigned char *, size_t), 18633d3b0591SJens Wiklander void *p_rng, 18643d3b0591SJens Wiklander mbedtls_ecp_restart_ctx *rs_ctx ) 1865817466cbSJens Wiklander { 1866*11fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 1867817466cbSJens Wiklander mbedtls_ecp_point Txi; 1868817466cbSJens Wiklander size_t i; 1869817466cbSJens Wiklander 1870817466cbSJens Wiklander mbedtls_ecp_point_init( &Txi ); 1871817466cbSJens Wiklander 18723d3b0591SJens Wiklander #if !defined(MBEDTLS_ECP_RESTARTABLE) 18733d3b0591SJens Wiklander (void) rs_ctx; 18743d3b0591SJens Wiklander #endif 18753d3b0591SJens Wiklander 18763d3b0591SJens Wiklander #if defined(MBEDTLS_ECP_RESTARTABLE) 18773d3b0591SJens Wiklander if( rs_ctx != NULL && rs_ctx->rsm != NULL && 18783d3b0591SJens Wiklander rs_ctx->rsm->state != ecp_rsm_comb_core ) 18793d3b0591SJens Wiklander { 18803d3b0591SJens Wiklander rs_ctx->rsm->i = 0; 18813d3b0591SJens Wiklander rs_ctx->rsm->state = ecp_rsm_comb_core; 18823d3b0591SJens Wiklander } 18833d3b0591SJens Wiklander 18843d3b0591SJens Wiklander /* new 'if' instead of nested for the sake of the 'else' branch */ 18853d3b0591SJens Wiklander if( rs_ctx != NULL && rs_ctx->rsm != NULL && rs_ctx->rsm->i != 0 ) 18863d3b0591SJens Wiklander { 18873d3b0591SJens Wiklander /* restore current index (R already pointing to rs_ctx->rsm->R) */ 18883d3b0591SJens Wiklander i = rs_ctx->rsm->i; 18893d3b0591SJens Wiklander } 18903d3b0591SJens Wiklander else 18913d3b0591SJens Wiklander #endif 18923d3b0591SJens Wiklander { 1893817466cbSJens Wiklander /* Start with a non-zero point and randomize its coordinates */ 1894817466cbSJens Wiklander i = d; 18953d3b0591SJens Wiklander MBEDTLS_MPI_CHK( ecp_select_comb( grp, R, T, T_size, x[i] ) ); 1896817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_lset( &R->Z, 1 ) ); 1897817466cbSJens Wiklander if( f_rng != 0 ) 1898817466cbSJens Wiklander MBEDTLS_MPI_CHK( ecp_randomize_jac( grp, R, f_rng, p_rng ) ); 18993d3b0591SJens Wiklander } 1900817466cbSJens Wiklander 19013d3b0591SJens Wiklander while( i != 0 ) 1902817466cbSJens Wiklander { 19033d3b0591SJens Wiklander MBEDTLS_ECP_BUDGET( MBEDTLS_ECP_OPS_DBL + MBEDTLS_ECP_OPS_ADD ); 19043d3b0591SJens Wiklander --i; 19053d3b0591SJens Wiklander 1906817466cbSJens Wiklander MBEDTLS_MPI_CHK( ecp_double_jac( grp, R, R ) ); 19073d3b0591SJens Wiklander MBEDTLS_MPI_CHK( ecp_select_comb( grp, &Txi, T, T_size, x[i] ) ); 1908817466cbSJens Wiklander MBEDTLS_MPI_CHK( ecp_add_mixed( grp, R, R, &Txi ) ); 1909817466cbSJens Wiklander } 1910817466cbSJens Wiklander 1911817466cbSJens Wiklander cleanup: 1912817466cbSJens Wiklander 1913817466cbSJens Wiklander mbedtls_ecp_point_free( &Txi ); 1914817466cbSJens Wiklander 19153d3b0591SJens Wiklander #if defined(MBEDTLS_ECP_RESTARTABLE) 19163d3b0591SJens Wiklander if( rs_ctx != NULL && rs_ctx->rsm != NULL && 19173d3b0591SJens Wiklander ret == MBEDTLS_ERR_ECP_IN_PROGRESS ) 19183d3b0591SJens Wiklander { 19193d3b0591SJens Wiklander rs_ctx->rsm->i = i; 19203d3b0591SJens Wiklander /* no need to save R, already pointing to rs_ctx->rsm->R */ 19213d3b0591SJens Wiklander } 19223d3b0591SJens Wiklander #endif 19233d3b0591SJens Wiklander 1924817466cbSJens Wiklander return( ret ); 1925817466cbSJens Wiklander } 1926817466cbSJens Wiklander 1927817466cbSJens Wiklander /* 19283d3b0591SJens Wiklander * Recode the scalar to get constant-time comb multiplication 19293d3b0591SJens Wiklander * 19303d3b0591SJens Wiklander * As the actual scalar recoding needs an odd scalar as a starting point, 19313d3b0591SJens Wiklander * this wrapper ensures that by replacing m by N - m if necessary, and 19323d3b0591SJens Wiklander * informs the caller that the result of multiplication will be negated. 19333d3b0591SJens Wiklander * 19343d3b0591SJens Wiklander * This works because we only support large prime order for Short Weierstrass 19353d3b0591SJens Wiklander * curves, so N is always odd hence either m or N - m is. 19363d3b0591SJens Wiklander * 19373d3b0591SJens Wiklander * See ecp_comb_recode_core() for background. 1938817466cbSJens Wiklander */ 19393d3b0591SJens Wiklander static int ecp_comb_recode_scalar( const mbedtls_ecp_group *grp, 19403d3b0591SJens Wiklander const mbedtls_mpi *m, 19413d3b0591SJens Wiklander unsigned char k[COMB_MAX_D + 1], 19423d3b0591SJens Wiklander size_t d, 19433d3b0591SJens Wiklander unsigned char w, 19443d3b0591SJens Wiklander unsigned char *parity_trick ) 1945817466cbSJens Wiklander { 1946*11fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 1947817466cbSJens Wiklander mbedtls_mpi M, mm; 1948817466cbSJens Wiklander 1949817466cbSJens Wiklander mbedtls_mpi_init( &M ); 1950817466cbSJens Wiklander mbedtls_mpi_init( &mm ); 1951817466cbSJens Wiklander 19523d3b0591SJens Wiklander /* N is always odd (see above), just make extra sure */ 1953817466cbSJens Wiklander if( mbedtls_mpi_get_bit( &grp->N, 0 ) != 1 ) 1954817466cbSJens Wiklander return( MBEDTLS_ERR_ECP_BAD_INPUT_DATA ); 1955817466cbSJens Wiklander 19563d3b0591SJens Wiklander /* do we need the parity trick? */ 19573d3b0591SJens Wiklander *parity_trick = ( mbedtls_mpi_get_bit( m, 0 ) == 0 ); 19583d3b0591SJens Wiklander 19593d3b0591SJens Wiklander /* execute parity fix in constant time */ 19603d3b0591SJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_copy( &M, m ) ); 19613d3b0591SJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_sub_mpi( &mm, &grp->N, m ) ); 19623d3b0591SJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_safe_cond_assign( &M, &mm, *parity_trick ) ); 19633d3b0591SJens Wiklander 19643d3b0591SJens Wiklander /* actual scalar recoding */ 19653d3b0591SJens Wiklander ecp_comb_recode_core( k, d, w, &M ); 19663d3b0591SJens Wiklander 19673d3b0591SJens Wiklander cleanup: 19683d3b0591SJens Wiklander mbedtls_mpi_free( &mm ); 19693d3b0591SJens Wiklander mbedtls_mpi_free( &M ); 19703d3b0591SJens Wiklander 19713d3b0591SJens Wiklander return( ret ); 19723d3b0591SJens Wiklander } 19733d3b0591SJens Wiklander 19743d3b0591SJens Wiklander /* 19753d3b0591SJens Wiklander * Perform comb multiplication (for short Weierstrass curves) 19763d3b0591SJens Wiklander * once the auxiliary table has been pre-computed. 19773d3b0591SJens Wiklander * 19783d3b0591SJens Wiklander * Scalar recoding may use a parity trick that makes us compute -m * P, 19793d3b0591SJens Wiklander * if that is the case we'll need to recover m * P at the end. 19803d3b0591SJens Wiklander */ 19813d3b0591SJens Wiklander static int ecp_mul_comb_after_precomp( const mbedtls_ecp_group *grp, 19823d3b0591SJens Wiklander mbedtls_ecp_point *R, 19833d3b0591SJens Wiklander const mbedtls_mpi *m, 19843d3b0591SJens Wiklander const mbedtls_ecp_point *T, 19853d3b0591SJens Wiklander unsigned char T_size, 19863d3b0591SJens Wiklander unsigned char w, 19873d3b0591SJens Wiklander size_t d, 19883d3b0591SJens Wiklander int (*f_rng)(void *, unsigned char *, size_t), 19893d3b0591SJens Wiklander void *p_rng, 19903d3b0591SJens Wiklander mbedtls_ecp_restart_ctx *rs_ctx ) 19913d3b0591SJens Wiklander { 1992*11fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 19933d3b0591SJens Wiklander unsigned char parity_trick; 19943d3b0591SJens Wiklander unsigned char k[COMB_MAX_D + 1]; 19953d3b0591SJens Wiklander mbedtls_ecp_point *RR = R; 19963d3b0591SJens Wiklander 19973d3b0591SJens Wiklander #if defined(MBEDTLS_ECP_RESTARTABLE) 19983d3b0591SJens Wiklander if( rs_ctx != NULL && rs_ctx->rsm != NULL ) 19993d3b0591SJens Wiklander { 20003d3b0591SJens Wiklander RR = &rs_ctx->rsm->R; 20013d3b0591SJens Wiklander 20023d3b0591SJens Wiklander if( rs_ctx->rsm->state == ecp_rsm_final_norm ) 20033d3b0591SJens Wiklander goto final_norm; 20043d3b0591SJens Wiklander } 20053d3b0591SJens Wiklander #endif 20063d3b0591SJens Wiklander 20073d3b0591SJens Wiklander MBEDTLS_MPI_CHK( ecp_comb_recode_scalar( grp, m, k, d, w, 20083d3b0591SJens Wiklander &parity_trick ) ); 20093d3b0591SJens Wiklander MBEDTLS_MPI_CHK( ecp_mul_comb_core( grp, RR, T, T_size, k, d, 20103d3b0591SJens Wiklander f_rng, p_rng, rs_ctx ) ); 20113d3b0591SJens Wiklander MBEDTLS_MPI_CHK( ecp_safe_invert_jac( grp, RR, parity_trick ) ); 20123d3b0591SJens Wiklander 20133d3b0591SJens Wiklander #if defined(MBEDTLS_ECP_RESTARTABLE) 20143d3b0591SJens Wiklander if( rs_ctx != NULL && rs_ctx->rsm != NULL ) 20153d3b0591SJens Wiklander rs_ctx->rsm->state = ecp_rsm_final_norm; 20163d3b0591SJens Wiklander 20173d3b0591SJens Wiklander final_norm: 20183d3b0591SJens Wiklander #endif 2019*11fa71b9SJerome Forissier /* 2020*11fa71b9SJerome Forissier * Knowledge of the jacobian coordinates may leak the last few bits of the 2021*11fa71b9SJerome Forissier * scalar [1], and since our MPI implementation isn't constant-flow, 2022*11fa71b9SJerome Forissier * inversion (used for coordinate normalization) may leak the full value 2023*11fa71b9SJerome Forissier * of its input via side-channels [2]. 2024*11fa71b9SJerome Forissier * 2025*11fa71b9SJerome Forissier * [1] https://eprint.iacr.org/2003/191 2026*11fa71b9SJerome Forissier * [2] https://eprint.iacr.org/2020/055 2027*11fa71b9SJerome Forissier * 2028*11fa71b9SJerome Forissier * Avoid the leak by randomizing coordinates before we normalize them. 2029*11fa71b9SJerome Forissier */ 2030*11fa71b9SJerome Forissier if( f_rng != 0 ) 2031*11fa71b9SJerome Forissier MBEDTLS_MPI_CHK( ecp_randomize_jac( grp, RR, f_rng, p_rng ) ); 2032*11fa71b9SJerome Forissier 20333d3b0591SJens Wiklander MBEDTLS_ECP_BUDGET( MBEDTLS_ECP_OPS_INV ); 20343d3b0591SJens Wiklander MBEDTLS_MPI_CHK( ecp_normalize_jac( grp, RR ) ); 20353d3b0591SJens Wiklander 20363d3b0591SJens Wiklander #if defined(MBEDTLS_ECP_RESTARTABLE) 20373d3b0591SJens Wiklander if( rs_ctx != NULL && rs_ctx->rsm != NULL ) 20383d3b0591SJens Wiklander MBEDTLS_MPI_CHK( mbedtls_ecp_copy( R, RR ) ); 20393d3b0591SJens Wiklander #endif 20403d3b0591SJens Wiklander 20413d3b0591SJens Wiklander cleanup: 20423d3b0591SJens Wiklander return( ret ); 20433d3b0591SJens Wiklander } 20443d3b0591SJens Wiklander 20453d3b0591SJens Wiklander /* 20463d3b0591SJens Wiklander * Pick window size based on curve size and whether we optimize for base point 20473d3b0591SJens Wiklander */ 20483d3b0591SJens Wiklander static unsigned char ecp_pick_window_size( const mbedtls_ecp_group *grp, 20493d3b0591SJens Wiklander unsigned char p_eq_g ) 20503d3b0591SJens Wiklander { 20513d3b0591SJens Wiklander unsigned char w; 20523d3b0591SJens Wiklander 2053817466cbSJens Wiklander /* 2054817466cbSJens Wiklander * Minimize the number of multiplications, that is minimize 2055817466cbSJens Wiklander * 10 * d * w + 18 * 2^(w-1) + 11 * d + 7 * w, with d = ceil( nbits / w ) 2056817466cbSJens Wiklander * (see costs of the various parts, with 1S = 1M) 2057817466cbSJens Wiklander */ 2058817466cbSJens Wiklander w = grp->nbits >= 384 ? 5 : 4; 2059817466cbSJens Wiklander 2060817466cbSJens Wiklander /* 2061817466cbSJens Wiklander * If P == G, pre-compute a bit more, since this may be re-used later. 2062817466cbSJens Wiklander * Just adding one avoids upping the cost of the first mul too much, 2063817466cbSJens Wiklander * and the memory cost too. 2064817466cbSJens Wiklander */ 2065817466cbSJens Wiklander if( p_eq_g ) 2066817466cbSJens Wiklander w++; 2067817466cbSJens Wiklander 2068817466cbSJens Wiklander /* 2069817466cbSJens Wiklander * Make sure w is within bounds. 2070817466cbSJens Wiklander * (The last test is useful only for very small curves in the test suite.) 2071817466cbSJens Wiklander */ 2072*11fa71b9SJerome Forissier #if( MBEDTLS_ECP_WINDOW_SIZE < 6 ) 2073817466cbSJens Wiklander if( w > MBEDTLS_ECP_WINDOW_SIZE ) 2074817466cbSJens Wiklander w = MBEDTLS_ECP_WINDOW_SIZE; 2075*11fa71b9SJerome Forissier #endif 2076817466cbSJens Wiklander if( w >= grp->nbits ) 2077817466cbSJens Wiklander w = 2; 2078817466cbSJens Wiklander 20793d3b0591SJens Wiklander return( w ); 20803d3b0591SJens Wiklander } 2081817466cbSJens Wiklander 2082817466cbSJens Wiklander /* 20833d3b0591SJens Wiklander * Multiplication using the comb method - for curves in short Weierstrass form 20843d3b0591SJens Wiklander * 20853d3b0591SJens Wiklander * This function is mainly responsible for administrative work: 20863d3b0591SJens Wiklander * - managing the restart context if enabled 20873d3b0591SJens Wiklander * - managing the table of precomputed points (passed between the below two 20883d3b0591SJens Wiklander * functions): allocation, computation, ownership tranfer, freeing. 20893d3b0591SJens Wiklander * 20903d3b0591SJens Wiklander * It delegates the actual arithmetic work to: 20913d3b0591SJens Wiklander * ecp_precompute_comb() and ecp_mul_comb_with_precomp() 20923d3b0591SJens Wiklander * 20933d3b0591SJens Wiklander * See comments on ecp_comb_recode_core() regarding the computation strategy. 2094817466cbSJens Wiklander */ 20953d3b0591SJens Wiklander static int ecp_mul_comb( mbedtls_ecp_group *grp, mbedtls_ecp_point *R, 20963d3b0591SJens Wiklander const mbedtls_mpi *m, const mbedtls_ecp_point *P, 20973d3b0591SJens Wiklander int (*f_rng)(void *, unsigned char *, size_t), 20983d3b0591SJens Wiklander void *p_rng, 20993d3b0591SJens Wiklander mbedtls_ecp_restart_ctx *rs_ctx ) 2100817466cbSJens Wiklander { 2101*11fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 21023d3b0591SJens Wiklander unsigned char w, p_eq_g, i; 21033d3b0591SJens Wiklander size_t d; 21043d3b0591SJens Wiklander unsigned char T_size, T_ok; 21053d3b0591SJens Wiklander mbedtls_ecp_point *T; 21063d3b0591SJens Wiklander 21073d3b0591SJens Wiklander ECP_RS_ENTER( rsm ); 21083d3b0591SJens Wiklander 21093d3b0591SJens Wiklander /* Is P the base point ? */ 21103d3b0591SJens Wiklander #if MBEDTLS_ECP_FIXED_POINT_OPTIM == 1 21113d3b0591SJens Wiklander p_eq_g = ( mbedtls_mpi_cmp_mpi( &P->Y, &grp->G.Y ) == 0 && 21123d3b0591SJens Wiklander mbedtls_mpi_cmp_mpi( &P->X, &grp->G.X ) == 0 ); 21133d3b0591SJens Wiklander #else 21143d3b0591SJens Wiklander p_eq_g = 0; 21153d3b0591SJens Wiklander #endif 21163d3b0591SJens Wiklander 21173d3b0591SJens Wiklander /* Pick window size and deduce related sizes */ 21183d3b0591SJens Wiklander w = ecp_pick_window_size( grp, p_eq_g ); 21193d3b0591SJens Wiklander T_size = 1U << ( w - 1 ); 21203d3b0591SJens Wiklander d = ( grp->nbits + w - 1 ) / w; 21213d3b0591SJens Wiklander 21223d3b0591SJens Wiklander /* Pre-computed table: do we have it already for the base point? */ 21233d3b0591SJens Wiklander if( p_eq_g && grp->T != NULL ) 21243d3b0591SJens Wiklander { 21253d3b0591SJens Wiklander /* second pointer to the same table, will be deleted on exit */ 21263d3b0591SJens Wiklander T = grp->T; 21273d3b0591SJens Wiklander T_ok = 1; 21283d3b0591SJens Wiklander } 21293d3b0591SJens Wiklander else 21303d3b0591SJens Wiklander #if defined(MBEDTLS_ECP_RESTARTABLE) 21313d3b0591SJens Wiklander /* Pre-computed table: do we have one in progress? complete? */ 21323d3b0591SJens Wiklander if( rs_ctx != NULL && rs_ctx->rsm != NULL && rs_ctx->rsm->T != NULL ) 21333d3b0591SJens Wiklander { 21343d3b0591SJens Wiklander /* transfer ownership of T from rsm to local function */ 21353d3b0591SJens Wiklander T = rs_ctx->rsm->T; 21363d3b0591SJens Wiklander rs_ctx->rsm->T = NULL; 21373d3b0591SJens Wiklander rs_ctx->rsm->T_size = 0; 21383d3b0591SJens Wiklander 21393d3b0591SJens Wiklander /* This effectively jumps to the call to mul_comb_after_precomp() */ 21403d3b0591SJens Wiklander T_ok = rs_ctx->rsm->state >= ecp_rsm_comb_core; 21413d3b0591SJens Wiklander } 21423d3b0591SJens Wiklander else 21433d3b0591SJens Wiklander #endif 21443d3b0591SJens Wiklander /* Allocate table if we didn't have any */ 21453d3b0591SJens Wiklander { 21463d3b0591SJens Wiklander T = mbedtls_calloc( T_size, sizeof( mbedtls_ecp_point ) ); 2147817466cbSJens Wiklander if( T == NULL ) 2148817466cbSJens Wiklander { 2149817466cbSJens Wiklander ret = MBEDTLS_ERR_ECP_ALLOC_FAILED; 2150817466cbSJens Wiklander goto cleanup; 2151817466cbSJens Wiklander } 2152817466cbSJens Wiklander 21533d3b0591SJens Wiklander for( i = 0; i < T_size; i++ ) 21543d3b0591SJens Wiklander mbedtls_ecp_point_init( &T[i] ); 21553d3b0591SJens Wiklander 21563d3b0591SJens Wiklander T_ok = 0; 21573d3b0591SJens Wiklander } 21583d3b0591SJens Wiklander 21593d3b0591SJens Wiklander /* Compute table (or finish computing it) if not done already */ 21603d3b0591SJens Wiklander if( !T_ok ) 21613d3b0591SJens Wiklander { 21623d3b0591SJens Wiklander MBEDTLS_MPI_CHK( ecp_precompute_comb( grp, T, P, w, d, rs_ctx ) ); 2163817466cbSJens Wiklander 2164817466cbSJens Wiklander if( p_eq_g ) 2165817466cbSJens Wiklander { 21663d3b0591SJens Wiklander /* almost transfer ownership of T to the group, but keep a copy of 21673d3b0591SJens Wiklander * the pointer to use for calling the next function more easily */ 2168817466cbSJens Wiklander grp->T = T; 21693d3b0591SJens Wiklander grp->T_size = T_size; 2170817466cbSJens Wiklander } 2171817466cbSJens Wiklander } 2172817466cbSJens Wiklander 21733d3b0591SJens Wiklander /* Actual comb multiplication using precomputed points */ 21743d3b0591SJens Wiklander MBEDTLS_MPI_CHK( ecp_mul_comb_after_precomp( grp, R, m, 21753d3b0591SJens Wiklander T, T_size, w, d, 21763d3b0591SJens Wiklander f_rng, p_rng, rs_ctx ) ); 2177817466cbSJens Wiklander 2178817466cbSJens Wiklander cleanup: 2179817466cbSJens Wiklander 21803d3b0591SJens Wiklander /* does T belong to the group? */ 21813d3b0591SJens Wiklander if( T == grp->T ) 21823d3b0591SJens Wiklander T = NULL; 21833d3b0591SJens Wiklander 21843d3b0591SJens Wiklander /* does T belong to the restart context? */ 21853d3b0591SJens Wiklander #if defined(MBEDTLS_ECP_RESTARTABLE) 21863d3b0591SJens Wiklander if( rs_ctx != NULL && rs_ctx->rsm != NULL && ret == MBEDTLS_ERR_ECP_IN_PROGRESS && T != NULL ) 2187817466cbSJens Wiklander { 21883d3b0591SJens Wiklander /* transfer ownership of T from local function to rsm */ 21893d3b0591SJens Wiklander rs_ctx->rsm->T_size = T_size; 21903d3b0591SJens Wiklander rs_ctx->rsm->T = T; 21913d3b0591SJens Wiklander T = NULL; 21923d3b0591SJens Wiklander } 21933d3b0591SJens Wiklander #endif 21943d3b0591SJens Wiklander 21953d3b0591SJens Wiklander /* did T belong to us? then let's destroy it! */ 21963d3b0591SJens Wiklander if( T != NULL ) 21973d3b0591SJens Wiklander { 21983d3b0591SJens Wiklander for( i = 0; i < T_size; i++ ) 2199817466cbSJens Wiklander mbedtls_ecp_point_free( &T[i] ); 2200817466cbSJens Wiklander mbedtls_free( T ); 2201817466cbSJens Wiklander } 2202817466cbSJens Wiklander 22033d3b0591SJens Wiklander /* don't free R while in progress in case R == P */ 22043d3b0591SJens Wiklander #if defined(MBEDTLS_ECP_RESTARTABLE) 22053d3b0591SJens Wiklander if( ret != MBEDTLS_ERR_ECP_IN_PROGRESS ) 22063d3b0591SJens Wiklander #endif 22073d3b0591SJens Wiklander /* prevent caller from using invalid value */ 2208817466cbSJens Wiklander if( ret != 0 ) 2209817466cbSJens Wiklander mbedtls_ecp_point_free( R ); 2210817466cbSJens Wiklander 22113d3b0591SJens Wiklander ECP_RS_LEAVE( rsm ); 22123d3b0591SJens Wiklander 2213817466cbSJens Wiklander return( ret ); 2214817466cbSJens Wiklander } 2215817466cbSJens Wiklander 2216817466cbSJens Wiklander #endif /* ECP_SHORTWEIERSTRASS */ 2217817466cbSJens Wiklander 2218817466cbSJens Wiklander #if defined(ECP_MONTGOMERY) 2219817466cbSJens Wiklander /* 2220817466cbSJens Wiklander * For Montgomery curves, we do all the internal arithmetic in projective 2221817466cbSJens Wiklander * coordinates. Import/export of points uses only the x coordinates, which is 2222817466cbSJens Wiklander * internaly represented as X / Z. 2223817466cbSJens Wiklander * 2224817466cbSJens Wiklander * For scalar multiplication, we'll use a Montgomery ladder. 2225817466cbSJens Wiklander */ 2226817466cbSJens Wiklander 2227817466cbSJens Wiklander /* 2228817466cbSJens Wiklander * Normalize Montgomery x/z coordinates: X = X/Z, Z = 1 2229817466cbSJens Wiklander * Cost: 1M + 1I 2230817466cbSJens Wiklander */ 2231817466cbSJens Wiklander static int ecp_normalize_mxz( const mbedtls_ecp_group *grp, mbedtls_ecp_point *P ) 2232817466cbSJens Wiklander { 2233*11fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 2234817466cbSJens Wiklander 2235817466cbSJens Wiklander #if defined(MBEDTLS_ECP_NORMALIZE_MXZ_ALT) 2236817466cbSJens Wiklander if( mbedtls_internal_ecp_grp_capable( grp ) ) 22373d3b0591SJens Wiklander return( mbedtls_internal_ecp_normalize_mxz( grp, P ) ); 2238817466cbSJens Wiklander #endif /* MBEDTLS_ECP_NORMALIZE_MXZ_ALT */ 2239817466cbSJens Wiklander 2240817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_inv_mod( &P->Z, &P->Z, &grp->P ) ); 2241*11fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &P->X, &P->X, &P->Z ) ); 2242817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_lset( &P->Z, 1 ) ); 2243817466cbSJens Wiklander 2244817466cbSJens Wiklander cleanup: 2245817466cbSJens Wiklander return( ret ); 2246817466cbSJens Wiklander } 2247817466cbSJens Wiklander 2248817466cbSJens Wiklander /* 2249817466cbSJens Wiklander * Randomize projective x/z coordinates: 2250817466cbSJens Wiklander * (X, Z) -> (l X, l Z) for random l 2251817466cbSJens Wiklander * This is sort of the reverse operation of ecp_normalize_mxz(). 2252817466cbSJens Wiklander * 2253817466cbSJens Wiklander * This countermeasure was first suggested in [2]. 2254817466cbSJens Wiklander * Cost: 2M 2255817466cbSJens Wiklander */ 2256817466cbSJens Wiklander static int ecp_randomize_mxz( const mbedtls_ecp_group *grp, mbedtls_ecp_point *P, 2257817466cbSJens Wiklander int (*f_rng)(void *, unsigned char *, size_t), void *p_rng ) 2258817466cbSJens Wiklander { 2259*11fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 2260817466cbSJens Wiklander mbedtls_mpi l; 2261817466cbSJens Wiklander size_t p_size; 2262817466cbSJens Wiklander int count = 0; 2263817466cbSJens Wiklander 2264817466cbSJens Wiklander #if defined(MBEDTLS_ECP_RANDOMIZE_MXZ_ALT) 2265817466cbSJens Wiklander if( mbedtls_internal_ecp_grp_capable( grp ) ) 22663d3b0591SJens Wiklander return( mbedtls_internal_ecp_randomize_mxz( grp, P, f_rng, p_rng ); 2267817466cbSJens Wiklander #endif /* MBEDTLS_ECP_RANDOMIZE_MXZ_ALT */ 2268817466cbSJens Wiklander 2269817466cbSJens Wiklander p_size = ( grp->pbits + 7 ) / 8; 2270817466cbSJens Wiklander mbedtls_mpi_init( &l ); 2271817466cbSJens Wiklander 2272817466cbSJens Wiklander /* Generate l such that 1 < l < p */ 2273817466cbSJens Wiklander do 2274817466cbSJens Wiklander { 2275817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_fill_random( &l, p_size, f_rng, p_rng ) ); 2276817466cbSJens Wiklander 2277817466cbSJens Wiklander while( mbedtls_mpi_cmp_mpi( &l, &grp->P ) >= 0 ) 2278817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_shift_r( &l, 1 ) ); 2279817466cbSJens Wiklander 2280817466cbSJens Wiklander if( count++ > 10 ) 2281817466cbSJens Wiklander return( MBEDTLS_ERR_ECP_RANDOM_FAILED ); 2282817466cbSJens Wiklander } 2283817466cbSJens Wiklander while( mbedtls_mpi_cmp_int( &l, 1 ) <= 0 ); 2284817466cbSJens Wiklander 2285*11fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &P->X, &P->X, &l ) ); 2286*11fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &P->Z, &P->Z, &l ) ); 2287817466cbSJens Wiklander 2288817466cbSJens Wiklander cleanup: 2289817466cbSJens Wiklander mbedtls_mpi_free( &l ); 2290817466cbSJens Wiklander 2291817466cbSJens Wiklander return( ret ); 2292817466cbSJens Wiklander } 2293817466cbSJens Wiklander 2294817466cbSJens Wiklander /* 2295817466cbSJens Wiklander * Double-and-add: R = 2P, S = P + Q, with d = X(P - Q), 2296817466cbSJens Wiklander * for Montgomery curves in x/z coordinates. 2297817466cbSJens Wiklander * 2298817466cbSJens Wiklander * http://www.hyperelliptic.org/EFD/g1p/auto-code/montgom/xz/ladder/mladd-1987-m.op3 2299817466cbSJens Wiklander * with 2300817466cbSJens Wiklander * d = X1 2301817466cbSJens Wiklander * P = (X2, Z2) 2302817466cbSJens Wiklander * Q = (X3, Z3) 2303817466cbSJens Wiklander * R = (X4, Z4) 2304817466cbSJens Wiklander * S = (X5, Z5) 2305817466cbSJens Wiklander * and eliminating temporary variables tO, ..., t4. 2306817466cbSJens Wiklander * 2307817466cbSJens Wiklander * Cost: 5M + 4S 2308817466cbSJens Wiklander */ 2309817466cbSJens Wiklander static int ecp_double_add_mxz( const mbedtls_ecp_group *grp, 2310817466cbSJens Wiklander mbedtls_ecp_point *R, mbedtls_ecp_point *S, 2311817466cbSJens Wiklander const mbedtls_ecp_point *P, const mbedtls_ecp_point *Q, 2312817466cbSJens Wiklander const mbedtls_mpi *d ) 2313817466cbSJens Wiklander { 2314*11fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 2315817466cbSJens Wiklander mbedtls_mpi A, AA, B, BB, E, C, D, DA, CB; 2316817466cbSJens Wiklander 2317817466cbSJens Wiklander #if defined(MBEDTLS_ECP_DOUBLE_ADD_MXZ_ALT) 2318817466cbSJens Wiklander if( mbedtls_internal_ecp_grp_capable( grp ) ) 23193d3b0591SJens Wiklander return( mbedtls_internal_ecp_double_add_mxz( grp, R, S, P, Q, d ) ); 2320817466cbSJens Wiklander #endif /* MBEDTLS_ECP_DOUBLE_ADD_MXZ_ALT */ 2321817466cbSJens Wiklander 2322817466cbSJens Wiklander mbedtls_mpi_init( &A ); mbedtls_mpi_init( &AA ); mbedtls_mpi_init( &B ); 2323817466cbSJens Wiklander mbedtls_mpi_init( &BB ); mbedtls_mpi_init( &E ); mbedtls_mpi_init( &C ); 2324817466cbSJens Wiklander mbedtls_mpi_init( &D ); mbedtls_mpi_init( &DA ); mbedtls_mpi_init( &CB ); 2325817466cbSJens Wiklander 2326*11fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_add_mod( grp, &A, &P->X, &P->Z ) ); 2327*11fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &AA, &A, &A ) ); 2328*11fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_sub_mod( grp, &B, &P->X, &P->Z ) ); 2329*11fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &BB, &B, &B ) ); 2330*11fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_sub_mod( grp, &E, &AA, &BB ) ); 2331*11fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_add_mod( grp, &C, &Q->X, &Q->Z ) ); 2332*11fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_sub_mod( grp, &D, &Q->X, &Q->Z ) ); 2333*11fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &DA, &D, &A ) ); 2334*11fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &CB, &C, &B ) ); 2335817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_add_mpi( &S->X, &DA, &CB ) ); MOD_MUL( S->X ); 2336*11fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &S->X, &S->X, &S->X ) ); 2337*11fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_sub_mod( grp, &S->Z, &DA, &CB ) ); 2338*11fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &S->Z, &S->Z, &S->Z ) ); 2339*11fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &S->Z, d, &S->Z ) ); 2340*11fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &R->X, &AA, &BB ) ); 2341*11fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &R->Z, &grp->A, &E ) ); 2342*11fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_add_mod( grp, &R->Z, &BB, &R->Z ) ); 2343*11fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &R->Z, &E, &R->Z ) ); 2344817466cbSJens Wiklander 2345817466cbSJens Wiklander cleanup: 2346817466cbSJens Wiklander mbedtls_mpi_free( &A ); mbedtls_mpi_free( &AA ); mbedtls_mpi_free( &B ); 2347817466cbSJens Wiklander mbedtls_mpi_free( &BB ); mbedtls_mpi_free( &E ); mbedtls_mpi_free( &C ); 2348817466cbSJens Wiklander mbedtls_mpi_free( &D ); mbedtls_mpi_free( &DA ); mbedtls_mpi_free( &CB ); 2349817466cbSJens Wiklander 2350817466cbSJens Wiklander return( ret ); 2351817466cbSJens Wiklander } 2352817466cbSJens Wiklander 2353817466cbSJens Wiklander /* 2354817466cbSJens Wiklander * Multiplication with Montgomery ladder in x/z coordinates, 2355817466cbSJens Wiklander * for curves in Montgomery form 2356817466cbSJens Wiklander */ 2357817466cbSJens Wiklander static int ecp_mul_mxz( mbedtls_ecp_group *grp, mbedtls_ecp_point *R, 2358817466cbSJens Wiklander const mbedtls_mpi *m, const mbedtls_ecp_point *P, 2359817466cbSJens Wiklander int (*f_rng)(void *, unsigned char *, size_t), 2360817466cbSJens Wiklander void *p_rng ) 2361817466cbSJens Wiklander { 2362*11fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 2363817466cbSJens Wiklander size_t i; 2364817466cbSJens Wiklander unsigned char b; 2365817466cbSJens Wiklander mbedtls_ecp_point RP; 2366817466cbSJens Wiklander mbedtls_mpi PX; 2367817466cbSJens Wiklander 2368817466cbSJens Wiklander mbedtls_ecp_point_init( &RP ); mbedtls_mpi_init( &PX ); 2369817466cbSJens Wiklander 2370817466cbSJens Wiklander /* Save PX and read from P before writing to R, in case P == R */ 2371817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_copy( &PX, &P->X ) ); 2372817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_ecp_copy( &RP, P ) ); 2373817466cbSJens Wiklander 2374817466cbSJens Wiklander /* Set R to zero in modified x/z coordinates */ 2375817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_lset( &R->X, 1 ) ); 2376817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_lset( &R->Z, 0 ) ); 2377817466cbSJens Wiklander mbedtls_mpi_free( &R->Y ); 2378817466cbSJens Wiklander 2379817466cbSJens Wiklander /* RP.X might be sligtly larger than P, so reduce it */ 2380817466cbSJens Wiklander MOD_ADD( RP.X ); 2381817466cbSJens Wiklander 2382817466cbSJens Wiklander /* Randomize coordinates of the starting point */ 2383817466cbSJens Wiklander if( f_rng != NULL ) 2384817466cbSJens Wiklander MBEDTLS_MPI_CHK( ecp_randomize_mxz( grp, &RP, f_rng, p_rng ) ); 2385817466cbSJens Wiklander 2386817466cbSJens Wiklander /* Loop invariant: R = result so far, RP = R + P */ 2387817466cbSJens Wiklander i = mbedtls_mpi_bitlen( m ); /* one past the (zero-based) most significant bit */ 2388817466cbSJens Wiklander while( i-- > 0 ) 2389817466cbSJens Wiklander { 2390817466cbSJens Wiklander b = mbedtls_mpi_get_bit( m, i ); 2391817466cbSJens Wiklander /* 2392817466cbSJens Wiklander * if (b) R = 2R + P else R = 2R, 2393817466cbSJens Wiklander * which is: 2394817466cbSJens Wiklander * if (b) double_add( RP, R, RP, R ) 2395817466cbSJens Wiklander * else double_add( R, RP, R, RP ) 2396817466cbSJens Wiklander * but using safe conditional swaps to avoid leaks 2397817466cbSJens Wiklander */ 2398817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_safe_cond_swap( &R->X, &RP.X, b ) ); 2399817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_safe_cond_swap( &R->Z, &RP.Z, b ) ); 2400817466cbSJens Wiklander MBEDTLS_MPI_CHK( ecp_double_add_mxz( grp, R, &RP, R, &RP, &PX ) ); 2401817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_safe_cond_swap( &R->X, &RP.X, b ) ); 2402817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_safe_cond_swap( &R->Z, &RP.Z, b ) ); 2403817466cbSJens Wiklander } 2404817466cbSJens Wiklander 2405*11fa71b9SJerome Forissier /* 2406*11fa71b9SJerome Forissier * Knowledge of the projective coordinates may leak the last few bits of the 2407*11fa71b9SJerome Forissier * scalar [1], and since our MPI implementation isn't constant-flow, 2408*11fa71b9SJerome Forissier * inversion (used for coordinate normalization) may leak the full value 2409*11fa71b9SJerome Forissier * of its input via side-channels [2]. 2410*11fa71b9SJerome Forissier * 2411*11fa71b9SJerome Forissier * [1] https://eprint.iacr.org/2003/191 2412*11fa71b9SJerome Forissier * [2] https://eprint.iacr.org/2020/055 2413*11fa71b9SJerome Forissier * 2414*11fa71b9SJerome Forissier * Avoid the leak by randomizing coordinates before we normalize them. 2415*11fa71b9SJerome Forissier */ 2416*11fa71b9SJerome Forissier if( f_rng != NULL ) 2417*11fa71b9SJerome Forissier MBEDTLS_MPI_CHK( ecp_randomize_mxz( grp, R, f_rng, p_rng ) ); 2418*11fa71b9SJerome Forissier 2419817466cbSJens Wiklander MBEDTLS_MPI_CHK( ecp_normalize_mxz( grp, R ) ); 2420817466cbSJens Wiklander 2421817466cbSJens Wiklander cleanup: 2422817466cbSJens Wiklander mbedtls_ecp_point_free( &RP ); mbedtls_mpi_free( &PX ); 2423817466cbSJens Wiklander 2424817466cbSJens Wiklander return( ret ); 2425817466cbSJens Wiklander } 2426817466cbSJens Wiklander 2427817466cbSJens Wiklander #endif /* ECP_MONTGOMERY */ 2428817466cbSJens Wiklander 2429817466cbSJens Wiklander /* 24303d3b0591SJens Wiklander * Restartable multiplication R = m * P 24313d3b0591SJens Wiklander */ 24323d3b0591SJens Wiklander int mbedtls_ecp_mul_restartable( mbedtls_ecp_group *grp, mbedtls_ecp_point *R, 24333d3b0591SJens Wiklander const mbedtls_mpi *m, const mbedtls_ecp_point *P, 24343d3b0591SJens Wiklander int (*f_rng)(void *, unsigned char *, size_t), void *p_rng, 24353d3b0591SJens Wiklander mbedtls_ecp_restart_ctx *rs_ctx ) 24363d3b0591SJens Wiklander { 24373d3b0591SJens Wiklander int ret = MBEDTLS_ERR_ECP_BAD_INPUT_DATA; 24383d3b0591SJens Wiklander #if defined(MBEDTLS_ECP_INTERNAL_ALT) 24393d3b0591SJens Wiklander char is_grp_capable = 0; 24403d3b0591SJens Wiklander #endif 24413d3b0591SJens Wiklander ECP_VALIDATE_RET( grp != NULL ); 24423d3b0591SJens Wiklander ECP_VALIDATE_RET( R != NULL ); 24433d3b0591SJens Wiklander ECP_VALIDATE_RET( m != NULL ); 24443d3b0591SJens Wiklander ECP_VALIDATE_RET( P != NULL ); 24453d3b0591SJens Wiklander 24463d3b0591SJens Wiklander #if defined(MBEDTLS_ECP_RESTARTABLE) 24473d3b0591SJens Wiklander /* reset ops count for this call if top-level */ 24483d3b0591SJens Wiklander if( rs_ctx != NULL && rs_ctx->depth++ == 0 ) 24493d3b0591SJens Wiklander rs_ctx->ops_done = 0; 24503d3b0591SJens Wiklander #endif 24513d3b0591SJens Wiklander 24523d3b0591SJens Wiklander #if defined(MBEDTLS_ECP_INTERNAL_ALT) 24533d3b0591SJens Wiklander if( ( is_grp_capable = mbedtls_internal_ecp_grp_capable( grp ) ) ) 24543d3b0591SJens Wiklander MBEDTLS_MPI_CHK( mbedtls_internal_ecp_init( grp ) ); 24553d3b0591SJens Wiklander #endif /* MBEDTLS_ECP_INTERNAL_ALT */ 24563d3b0591SJens Wiklander 24573d3b0591SJens Wiklander #if defined(MBEDTLS_ECP_RESTARTABLE) 24583d3b0591SJens Wiklander /* skip argument check when restarting */ 24593d3b0591SJens Wiklander if( rs_ctx == NULL || rs_ctx->rsm == NULL ) 24603d3b0591SJens Wiklander #endif 24613d3b0591SJens Wiklander { 24623d3b0591SJens Wiklander /* check_privkey is free */ 24633d3b0591SJens Wiklander MBEDTLS_ECP_BUDGET( MBEDTLS_ECP_OPS_CHK ); 24643d3b0591SJens Wiklander 24653d3b0591SJens Wiklander /* Common sanity checks */ 24663d3b0591SJens Wiklander MBEDTLS_MPI_CHK( mbedtls_ecp_check_privkey( grp, m ) ); 24673d3b0591SJens Wiklander MBEDTLS_MPI_CHK( mbedtls_ecp_check_pubkey( grp, P ) ); 24683d3b0591SJens Wiklander } 24693d3b0591SJens Wiklander 24703d3b0591SJens Wiklander ret = MBEDTLS_ERR_ECP_BAD_INPUT_DATA; 24713d3b0591SJens Wiklander #if defined(ECP_MONTGOMERY) 2472*11fa71b9SJerome Forissier if( mbedtls_ecp_get_type( grp ) == MBEDTLS_ECP_TYPE_MONTGOMERY ) 24733d3b0591SJens Wiklander MBEDTLS_MPI_CHK( ecp_mul_mxz( grp, R, m, P, f_rng, p_rng ) ); 24743d3b0591SJens Wiklander #endif 24753d3b0591SJens Wiklander #if defined(ECP_SHORTWEIERSTRASS) 2476*11fa71b9SJerome Forissier if( mbedtls_ecp_get_type( grp ) == MBEDTLS_ECP_TYPE_SHORT_WEIERSTRASS ) 24773d3b0591SJens Wiklander MBEDTLS_MPI_CHK( ecp_mul_comb( grp, R, m, P, f_rng, p_rng, rs_ctx ) ); 24783d3b0591SJens Wiklander #endif 24793d3b0591SJens Wiklander 24803d3b0591SJens Wiklander cleanup: 24813d3b0591SJens Wiklander 24823d3b0591SJens Wiklander #if defined(MBEDTLS_ECP_INTERNAL_ALT) 24833d3b0591SJens Wiklander if( is_grp_capable ) 24843d3b0591SJens Wiklander mbedtls_internal_ecp_free( grp ); 24853d3b0591SJens Wiklander #endif /* MBEDTLS_ECP_INTERNAL_ALT */ 24863d3b0591SJens Wiklander 24873d3b0591SJens Wiklander #if defined(MBEDTLS_ECP_RESTARTABLE) 24883d3b0591SJens Wiklander if( rs_ctx != NULL ) 24893d3b0591SJens Wiklander rs_ctx->depth--; 24903d3b0591SJens Wiklander #endif 24913d3b0591SJens Wiklander 24923d3b0591SJens Wiklander return( ret ); 24933d3b0591SJens Wiklander } 24943d3b0591SJens Wiklander 24953d3b0591SJens Wiklander /* 2496817466cbSJens Wiklander * Multiplication R = m * P 2497817466cbSJens Wiklander */ 2498817466cbSJens Wiklander int mbedtls_ecp_mul( mbedtls_ecp_group *grp, mbedtls_ecp_point *R, 2499817466cbSJens Wiklander const mbedtls_mpi *m, const mbedtls_ecp_point *P, 2500817466cbSJens Wiklander int (*f_rng)(void *, unsigned char *, size_t), void *p_rng ) 2501817466cbSJens Wiklander { 25023d3b0591SJens Wiklander ECP_VALIDATE_RET( grp != NULL ); 25033d3b0591SJens Wiklander ECP_VALIDATE_RET( R != NULL ); 25043d3b0591SJens Wiklander ECP_VALIDATE_RET( m != NULL ); 25053d3b0591SJens Wiklander ECP_VALIDATE_RET( P != NULL ); 25063d3b0591SJens Wiklander return( mbedtls_ecp_mul_restartable( grp, R, m, P, f_rng, p_rng, NULL ) ); 2507817466cbSJens Wiklander } 2508817466cbSJens Wiklander 2509817466cbSJens Wiklander #if defined(ECP_SHORTWEIERSTRASS) 2510817466cbSJens Wiklander /* 2511817466cbSJens Wiklander * Check that an affine point is valid as a public key, 2512817466cbSJens Wiklander * short weierstrass curves (SEC1 3.2.3.1) 2513817466cbSJens Wiklander */ 2514817466cbSJens Wiklander static int ecp_check_pubkey_sw( const mbedtls_ecp_group *grp, const mbedtls_ecp_point *pt ) 2515817466cbSJens Wiklander { 2516*11fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 2517817466cbSJens Wiklander mbedtls_mpi YY, RHS; 2518817466cbSJens Wiklander 2519817466cbSJens Wiklander /* pt coordinates must be normalized for our checks */ 2520817466cbSJens Wiklander if( mbedtls_mpi_cmp_int( &pt->X, 0 ) < 0 || 2521817466cbSJens Wiklander mbedtls_mpi_cmp_int( &pt->Y, 0 ) < 0 || 2522817466cbSJens Wiklander mbedtls_mpi_cmp_mpi( &pt->X, &grp->P ) >= 0 || 2523817466cbSJens Wiklander mbedtls_mpi_cmp_mpi( &pt->Y, &grp->P ) >= 0 ) 2524817466cbSJens Wiklander return( MBEDTLS_ERR_ECP_INVALID_KEY ); 2525817466cbSJens Wiklander 2526817466cbSJens Wiklander mbedtls_mpi_init( &YY ); mbedtls_mpi_init( &RHS ); 2527817466cbSJens Wiklander 2528817466cbSJens Wiklander /* 2529817466cbSJens Wiklander * YY = Y^2 2530817466cbSJens Wiklander * RHS = X (X^2 + A) + B = X^3 + A X + B 2531817466cbSJens Wiklander */ 2532*11fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &YY, &pt->Y, &pt->Y ) ); 2533*11fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &RHS, &pt->X, &pt->X ) ); 2534817466cbSJens Wiklander 2535817466cbSJens Wiklander /* Special case for A = -3 */ 2536817466cbSJens Wiklander if( grp->A.p == NULL ) 2537817466cbSJens Wiklander { 2538817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_sub_int( &RHS, &RHS, 3 ) ); MOD_SUB( RHS ); 2539817466cbSJens Wiklander } 2540817466cbSJens Wiklander else 2541817466cbSJens Wiklander { 2542*11fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_add_mod( grp, &RHS, &RHS, &grp->A ) ); 2543817466cbSJens Wiklander } 2544817466cbSJens Wiklander 2545*11fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &RHS, &RHS, &pt->X ) ); 2546*11fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_add_mod( grp, &RHS, &RHS, &grp->B ) ); 2547817466cbSJens Wiklander 2548817466cbSJens Wiklander if( mbedtls_mpi_cmp_mpi( &YY, &RHS ) != 0 ) 2549817466cbSJens Wiklander ret = MBEDTLS_ERR_ECP_INVALID_KEY; 2550817466cbSJens Wiklander 2551817466cbSJens Wiklander cleanup: 2552817466cbSJens Wiklander 2553817466cbSJens Wiklander mbedtls_mpi_free( &YY ); mbedtls_mpi_free( &RHS ); 2554817466cbSJens Wiklander 2555817466cbSJens Wiklander return( ret ); 2556817466cbSJens Wiklander } 2557817466cbSJens Wiklander #endif /* ECP_SHORTWEIERSTRASS */ 2558817466cbSJens Wiklander 2559817466cbSJens Wiklander /* 2560817466cbSJens Wiklander * R = m * P with shortcuts for m == 1 and m == -1 2561817466cbSJens Wiklander * NOT constant-time - ONLY for short Weierstrass! 2562817466cbSJens Wiklander */ 2563817466cbSJens Wiklander static int mbedtls_ecp_mul_shortcuts( mbedtls_ecp_group *grp, 2564817466cbSJens Wiklander mbedtls_ecp_point *R, 2565817466cbSJens Wiklander const mbedtls_mpi *m, 25663d3b0591SJens Wiklander const mbedtls_ecp_point *P, 25673d3b0591SJens Wiklander mbedtls_ecp_restart_ctx *rs_ctx ) 2568817466cbSJens Wiklander { 2569*11fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 2570817466cbSJens Wiklander 2571817466cbSJens Wiklander if( mbedtls_mpi_cmp_int( m, 1 ) == 0 ) 2572817466cbSJens Wiklander { 2573817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_ecp_copy( R, P ) ); 2574817466cbSJens Wiklander } 2575817466cbSJens Wiklander else if( mbedtls_mpi_cmp_int( m, -1 ) == 0 ) 2576817466cbSJens Wiklander { 2577817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_ecp_copy( R, P ) ); 2578817466cbSJens Wiklander if( mbedtls_mpi_cmp_int( &R->Y, 0 ) != 0 ) 2579817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_sub_mpi( &R->Y, &grp->P, &R->Y ) ); 2580817466cbSJens Wiklander } 2581817466cbSJens Wiklander else 2582817466cbSJens Wiklander { 25833d3b0591SJens Wiklander MBEDTLS_MPI_CHK( mbedtls_ecp_mul_restartable( grp, R, m, P, 25843d3b0591SJens Wiklander NULL, NULL, rs_ctx ) ); 2585817466cbSJens Wiklander } 2586817466cbSJens Wiklander 2587817466cbSJens Wiklander cleanup: 2588817466cbSJens Wiklander return( ret ); 2589817466cbSJens Wiklander } 2590817466cbSJens Wiklander 2591817466cbSJens Wiklander /* 25923d3b0591SJens Wiklander * Restartable linear combination 25933d3b0591SJens Wiklander * NOT constant-time 25943d3b0591SJens Wiklander */ 25953d3b0591SJens Wiklander int mbedtls_ecp_muladd_restartable( 25963d3b0591SJens Wiklander mbedtls_ecp_group *grp, mbedtls_ecp_point *R, 25973d3b0591SJens Wiklander const mbedtls_mpi *m, const mbedtls_ecp_point *P, 25983d3b0591SJens Wiklander const mbedtls_mpi *n, const mbedtls_ecp_point *Q, 25993d3b0591SJens Wiklander mbedtls_ecp_restart_ctx *rs_ctx ) 26003d3b0591SJens Wiklander { 2601*11fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 26023d3b0591SJens Wiklander mbedtls_ecp_point mP; 26033d3b0591SJens Wiklander mbedtls_ecp_point *pmP = &mP; 26043d3b0591SJens Wiklander mbedtls_ecp_point *pR = R; 26053d3b0591SJens Wiklander #if defined(MBEDTLS_ECP_INTERNAL_ALT) 26063d3b0591SJens Wiklander char is_grp_capable = 0; 26073d3b0591SJens Wiklander #endif 26083d3b0591SJens Wiklander ECP_VALIDATE_RET( grp != NULL ); 26093d3b0591SJens Wiklander ECP_VALIDATE_RET( R != NULL ); 26103d3b0591SJens Wiklander ECP_VALIDATE_RET( m != NULL ); 26113d3b0591SJens Wiklander ECP_VALIDATE_RET( P != NULL ); 26123d3b0591SJens Wiklander ECP_VALIDATE_RET( n != NULL ); 26133d3b0591SJens Wiklander ECP_VALIDATE_RET( Q != NULL ); 26143d3b0591SJens Wiklander 2615*11fa71b9SJerome Forissier if( mbedtls_ecp_get_type( grp ) != MBEDTLS_ECP_TYPE_SHORT_WEIERSTRASS ) 26163d3b0591SJens Wiklander return( MBEDTLS_ERR_ECP_FEATURE_UNAVAILABLE ); 26173d3b0591SJens Wiklander 26183d3b0591SJens Wiklander mbedtls_ecp_point_init( &mP ); 26193d3b0591SJens Wiklander 26203d3b0591SJens Wiklander ECP_RS_ENTER( ma ); 26213d3b0591SJens Wiklander 26223d3b0591SJens Wiklander #if defined(MBEDTLS_ECP_RESTARTABLE) 26233d3b0591SJens Wiklander if( rs_ctx != NULL && rs_ctx->ma != NULL ) 26243d3b0591SJens Wiklander { 26253d3b0591SJens Wiklander /* redirect intermediate results to restart context */ 26263d3b0591SJens Wiklander pmP = &rs_ctx->ma->mP; 26273d3b0591SJens Wiklander pR = &rs_ctx->ma->R; 26283d3b0591SJens Wiklander 26293d3b0591SJens Wiklander /* jump to next operation */ 26303d3b0591SJens Wiklander if( rs_ctx->ma->state == ecp_rsma_mul2 ) 26313d3b0591SJens Wiklander goto mul2; 26323d3b0591SJens Wiklander if( rs_ctx->ma->state == ecp_rsma_add ) 26333d3b0591SJens Wiklander goto add; 26343d3b0591SJens Wiklander if( rs_ctx->ma->state == ecp_rsma_norm ) 26353d3b0591SJens Wiklander goto norm; 26363d3b0591SJens Wiklander } 26373d3b0591SJens Wiklander #endif /* MBEDTLS_ECP_RESTARTABLE */ 26383d3b0591SJens Wiklander 26393d3b0591SJens Wiklander MBEDTLS_MPI_CHK( mbedtls_ecp_mul_shortcuts( grp, pmP, m, P, rs_ctx ) ); 26403d3b0591SJens Wiklander #if defined(MBEDTLS_ECP_RESTARTABLE) 26413d3b0591SJens Wiklander if( rs_ctx != NULL && rs_ctx->ma != NULL ) 26423d3b0591SJens Wiklander rs_ctx->ma->state = ecp_rsma_mul2; 26433d3b0591SJens Wiklander 26443d3b0591SJens Wiklander mul2: 26453d3b0591SJens Wiklander #endif 26463d3b0591SJens Wiklander MBEDTLS_MPI_CHK( mbedtls_ecp_mul_shortcuts( grp, pR, n, Q, rs_ctx ) ); 26473d3b0591SJens Wiklander 26483d3b0591SJens Wiklander #if defined(MBEDTLS_ECP_INTERNAL_ALT) 26493d3b0591SJens Wiklander if( ( is_grp_capable = mbedtls_internal_ecp_grp_capable( grp ) ) ) 26503d3b0591SJens Wiklander MBEDTLS_MPI_CHK( mbedtls_internal_ecp_init( grp ) ); 26513d3b0591SJens Wiklander #endif /* MBEDTLS_ECP_INTERNAL_ALT */ 26523d3b0591SJens Wiklander 26533d3b0591SJens Wiklander #if defined(MBEDTLS_ECP_RESTARTABLE) 26543d3b0591SJens Wiklander if( rs_ctx != NULL && rs_ctx->ma != NULL ) 26553d3b0591SJens Wiklander rs_ctx->ma->state = ecp_rsma_add; 26563d3b0591SJens Wiklander 26573d3b0591SJens Wiklander add: 26583d3b0591SJens Wiklander #endif 26593d3b0591SJens Wiklander MBEDTLS_ECP_BUDGET( MBEDTLS_ECP_OPS_ADD ); 26603d3b0591SJens Wiklander MBEDTLS_MPI_CHK( ecp_add_mixed( grp, pR, pmP, pR ) ); 26613d3b0591SJens Wiklander #if defined(MBEDTLS_ECP_RESTARTABLE) 26623d3b0591SJens Wiklander if( rs_ctx != NULL && rs_ctx->ma != NULL ) 26633d3b0591SJens Wiklander rs_ctx->ma->state = ecp_rsma_norm; 26643d3b0591SJens Wiklander 26653d3b0591SJens Wiklander norm: 26663d3b0591SJens Wiklander #endif 26673d3b0591SJens Wiklander MBEDTLS_ECP_BUDGET( MBEDTLS_ECP_OPS_INV ); 26683d3b0591SJens Wiklander MBEDTLS_MPI_CHK( ecp_normalize_jac( grp, pR ) ); 26693d3b0591SJens Wiklander 26703d3b0591SJens Wiklander #if defined(MBEDTLS_ECP_RESTARTABLE) 26713d3b0591SJens Wiklander if( rs_ctx != NULL && rs_ctx->ma != NULL ) 26723d3b0591SJens Wiklander MBEDTLS_MPI_CHK( mbedtls_ecp_copy( R, pR ) ); 26733d3b0591SJens Wiklander #endif 26743d3b0591SJens Wiklander 26753d3b0591SJens Wiklander cleanup: 26763d3b0591SJens Wiklander #if defined(MBEDTLS_ECP_INTERNAL_ALT) 26773d3b0591SJens Wiklander if( is_grp_capable ) 26783d3b0591SJens Wiklander mbedtls_internal_ecp_free( grp ); 26793d3b0591SJens Wiklander #endif /* MBEDTLS_ECP_INTERNAL_ALT */ 26803d3b0591SJens Wiklander 26813d3b0591SJens Wiklander mbedtls_ecp_point_free( &mP ); 26823d3b0591SJens Wiklander 26833d3b0591SJens Wiklander ECP_RS_LEAVE( ma ); 26843d3b0591SJens Wiklander 26853d3b0591SJens Wiklander return( ret ); 26863d3b0591SJens Wiklander } 26873d3b0591SJens Wiklander 26883d3b0591SJens Wiklander /* 2689817466cbSJens Wiklander * Linear combination 2690817466cbSJens Wiklander * NOT constant-time 2691817466cbSJens Wiklander */ 2692817466cbSJens Wiklander int mbedtls_ecp_muladd( mbedtls_ecp_group *grp, mbedtls_ecp_point *R, 2693817466cbSJens Wiklander const mbedtls_mpi *m, const mbedtls_ecp_point *P, 2694817466cbSJens Wiklander const mbedtls_mpi *n, const mbedtls_ecp_point *Q ) 2695817466cbSJens Wiklander { 26963d3b0591SJens Wiklander ECP_VALIDATE_RET( grp != NULL ); 26973d3b0591SJens Wiklander ECP_VALIDATE_RET( R != NULL ); 26983d3b0591SJens Wiklander ECP_VALIDATE_RET( m != NULL ); 26993d3b0591SJens Wiklander ECP_VALIDATE_RET( P != NULL ); 27003d3b0591SJens Wiklander ECP_VALIDATE_RET( n != NULL ); 27013d3b0591SJens Wiklander ECP_VALIDATE_RET( Q != NULL ); 27023d3b0591SJens Wiklander return( mbedtls_ecp_muladd_restartable( grp, R, m, P, n, Q, NULL ) ); 2703817466cbSJens Wiklander } 2704817466cbSJens Wiklander 2705817466cbSJens Wiklander #if defined(ECP_MONTGOMERY) 2706817466cbSJens Wiklander /* 2707817466cbSJens Wiklander * Check validity of a public key for Montgomery curves with x-only schemes 2708817466cbSJens Wiklander */ 2709817466cbSJens Wiklander static int ecp_check_pubkey_mx( const mbedtls_ecp_group *grp, const mbedtls_ecp_point *pt ) 2710817466cbSJens Wiklander { 2711817466cbSJens Wiklander /* [Curve25519 p. 5] Just check X is the correct number of bytes */ 27123d3b0591SJens Wiklander /* Allow any public value, if it's too big then we'll just reduce it mod p 27133d3b0591SJens Wiklander * (RFC 7748 sec. 5 para. 3). */ 2714817466cbSJens Wiklander if( mbedtls_mpi_size( &pt->X ) > ( grp->nbits + 7 ) / 8 ) 2715817466cbSJens Wiklander return( MBEDTLS_ERR_ECP_INVALID_KEY ); 2716817466cbSJens Wiklander 2717817466cbSJens Wiklander return( 0 ); 2718817466cbSJens Wiklander } 2719817466cbSJens Wiklander #endif /* ECP_MONTGOMERY */ 2720817466cbSJens Wiklander 2721817466cbSJens Wiklander /* 2722817466cbSJens Wiklander * Check that a point is valid as a public key 2723817466cbSJens Wiklander */ 27243d3b0591SJens Wiklander int mbedtls_ecp_check_pubkey( const mbedtls_ecp_group *grp, 27253d3b0591SJens Wiklander const mbedtls_ecp_point *pt ) 2726817466cbSJens Wiklander { 27273d3b0591SJens Wiklander ECP_VALIDATE_RET( grp != NULL ); 27283d3b0591SJens Wiklander ECP_VALIDATE_RET( pt != NULL ); 27293d3b0591SJens Wiklander 2730817466cbSJens Wiklander /* Must use affine coordinates */ 2731817466cbSJens Wiklander if( mbedtls_mpi_cmp_int( &pt->Z, 1 ) != 0 ) 2732817466cbSJens Wiklander return( MBEDTLS_ERR_ECP_INVALID_KEY ); 2733817466cbSJens Wiklander 2734817466cbSJens Wiklander #if defined(ECP_MONTGOMERY) 2735*11fa71b9SJerome Forissier if( mbedtls_ecp_get_type( grp ) == MBEDTLS_ECP_TYPE_MONTGOMERY ) 2736817466cbSJens Wiklander return( ecp_check_pubkey_mx( grp, pt ) ); 2737817466cbSJens Wiklander #endif 2738817466cbSJens Wiklander #if defined(ECP_SHORTWEIERSTRASS) 2739*11fa71b9SJerome Forissier if( mbedtls_ecp_get_type( grp ) == MBEDTLS_ECP_TYPE_SHORT_WEIERSTRASS ) 2740817466cbSJens Wiklander return( ecp_check_pubkey_sw( grp, pt ) ); 2741817466cbSJens Wiklander #endif 2742817466cbSJens Wiklander return( MBEDTLS_ERR_ECP_BAD_INPUT_DATA ); 2743817466cbSJens Wiklander } 2744817466cbSJens Wiklander 2745817466cbSJens Wiklander /* 2746817466cbSJens Wiklander * Check that an mbedtls_mpi is valid as a private key 2747817466cbSJens Wiklander */ 27483d3b0591SJens Wiklander int mbedtls_ecp_check_privkey( const mbedtls_ecp_group *grp, 27493d3b0591SJens Wiklander const mbedtls_mpi *d ) 2750817466cbSJens Wiklander { 27513d3b0591SJens Wiklander ECP_VALIDATE_RET( grp != NULL ); 27523d3b0591SJens Wiklander ECP_VALIDATE_RET( d != NULL ); 27533d3b0591SJens Wiklander 2754817466cbSJens Wiklander #if defined(ECP_MONTGOMERY) 2755*11fa71b9SJerome Forissier if( mbedtls_ecp_get_type( grp ) == MBEDTLS_ECP_TYPE_MONTGOMERY ) 2756817466cbSJens Wiklander { 27573d3b0591SJens Wiklander /* see RFC 7748 sec. 5 para. 5 */ 2758817466cbSJens Wiklander if( mbedtls_mpi_get_bit( d, 0 ) != 0 || 2759817466cbSJens Wiklander mbedtls_mpi_get_bit( d, 1 ) != 0 || 2760817466cbSJens Wiklander mbedtls_mpi_bitlen( d ) - 1 != grp->nbits ) /* mbedtls_mpi_bitlen is one-based! */ 2761817466cbSJens Wiklander return( MBEDTLS_ERR_ECP_INVALID_KEY ); 27623d3b0591SJens Wiklander 27633d3b0591SJens Wiklander /* see [Curve25519] page 5 */ 27643d3b0591SJens Wiklander if( grp->nbits == 254 && mbedtls_mpi_get_bit( d, 2 ) != 0 ) 27653d3b0591SJens Wiklander return( MBEDTLS_ERR_ECP_INVALID_KEY ); 27663d3b0591SJens Wiklander 2767817466cbSJens Wiklander return( 0 ); 2768817466cbSJens Wiklander } 2769817466cbSJens Wiklander #endif /* ECP_MONTGOMERY */ 2770817466cbSJens Wiklander #if defined(ECP_SHORTWEIERSTRASS) 2771*11fa71b9SJerome Forissier if( mbedtls_ecp_get_type( grp ) == MBEDTLS_ECP_TYPE_SHORT_WEIERSTRASS ) 2772817466cbSJens Wiklander { 2773817466cbSJens Wiklander /* see SEC1 3.2 */ 2774817466cbSJens Wiklander if( mbedtls_mpi_cmp_int( d, 1 ) < 0 || 2775817466cbSJens Wiklander mbedtls_mpi_cmp_mpi( d, &grp->N ) >= 0 ) 2776817466cbSJens Wiklander return( MBEDTLS_ERR_ECP_INVALID_KEY ); 2777817466cbSJens Wiklander else 2778817466cbSJens Wiklander return( 0 ); 2779817466cbSJens Wiklander } 2780817466cbSJens Wiklander #endif /* ECP_SHORTWEIERSTRASS */ 2781817466cbSJens Wiklander 2782817466cbSJens Wiklander return( MBEDTLS_ERR_ECP_BAD_INPUT_DATA ); 2783817466cbSJens Wiklander } 2784817466cbSJens Wiklander 2785817466cbSJens Wiklander /* 27863d3b0591SJens Wiklander * Generate a private key 2787817466cbSJens Wiklander */ 27883d3b0591SJens Wiklander int mbedtls_ecp_gen_privkey( const mbedtls_ecp_group *grp, 27893d3b0591SJens Wiklander mbedtls_mpi *d, 2790817466cbSJens Wiklander int (*f_rng)(void *, unsigned char *, size_t), 2791817466cbSJens Wiklander void *p_rng ) 2792817466cbSJens Wiklander { 27933d3b0591SJens Wiklander int ret = MBEDTLS_ERR_ECP_BAD_INPUT_DATA; 27943d3b0591SJens Wiklander size_t n_size; 27953d3b0591SJens Wiklander 27963d3b0591SJens Wiklander ECP_VALIDATE_RET( grp != NULL ); 27973d3b0591SJens Wiklander ECP_VALIDATE_RET( d != NULL ); 27983d3b0591SJens Wiklander ECP_VALIDATE_RET( f_rng != NULL ); 27993d3b0591SJens Wiklander 28003d3b0591SJens Wiklander n_size = ( grp->nbits + 7 ) / 8; 2801817466cbSJens Wiklander 2802817466cbSJens Wiklander #if defined(ECP_MONTGOMERY) 2803*11fa71b9SJerome Forissier if( mbedtls_ecp_get_type( grp ) == MBEDTLS_ECP_TYPE_MONTGOMERY ) 2804817466cbSJens Wiklander { 2805817466cbSJens Wiklander /* [M225] page 5 */ 2806817466cbSJens Wiklander size_t b; 2807817466cbSJens Wiklander 2808817466cbSJens Wiklander do { 2809817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_fill_random( d, n_size, f_rng, p_rng ) ); 2810817466cbSJens Wiklander } while( mbedtls_mpi_bitlen( d ) == 0); 2811817466cbSJens Wiklander 2812817466cbSJens Wiklander /* Make sure the most significant bit is nbits */ 2813817466cbSJens Wiklander b = mbedtls_mpi_bitlen( d ) - 1; /* mbedtls_mpi_bitlen is one-based */ 2814817466cbSJens Wiklander if( b > grp->nbits ) 2815817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_shift_r( d, b - grp->nbits ) ); 2816817466cbSJens Wiklander else 2817817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_set_bit( d, grp->nbits, 1 ) ); 2818817466cbSJens Wiklander 28193d3b0591SJens Wiklander /* Make sure the last two bits are unset for Curve448, three bits for 28203d3b0591SJens Wiklander Curve25519 */ 2821817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_set_bit( d, 0, 0 ) ); 2822817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_set_bit( d, 1, 0 ) ); 28233d3b0591SJens Wiklander if( grp->nbits == 254 ) 28243d3b0591SJens Wiklander { 2825817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_set_bit( d, 2, 0 ) ); 2826817466cbSJens Wiklander } 28273d3b0591SJens Wiklander } 2828817466cbSJens Wiklander #endif /* ECP_MONTGOMERY */ 28293d3b0591SJens Wiklander 2830817466cbSJens Wiklander #if defined(ECP_SHORTWEIERSTRASS) 2831*11fa71b9SJerome Forissier if( mbedtls_ecp_get_type( grp ) == MBEDTLS_ECP_TYPE_SHORT_WEIERSTRASS ) 2832817466cbSJens Wiklander { 2833817466cbSJens Wiklander /* SEC1 3.2.1: Generate d such that 1 <= n < N */ 2834817466cbSJens Wiklander int count = 0; 28355b25c76aSJerome Forissier unsigned cmp = 0; 2836817466cbSJens Wiklander 2837817466cbSJens Wiklander /* 2838817466cbSJens Wiklander * Match the procedure given in RFC 6979 (deterministic ECDSA): 2839817466cbSJens Wiklander * - use the same byte ordering; 2840817466cbSJens Wiklander * - keep the leftmost nbits bits of the generated octet string; 2841817466cbSJens Wiklander * - try until result is in the desired range. 2842817466cbSJens Wiklander * This also avoids any biais, which is especially important for ECDSA. 2843817466cbSJens Wiklander */ 2844817466cbSJens Wiklander do 2845817466cbSJens Wiklander { 28463d3b0591SJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_fill_random( d, n_size, f_rng, p_rng ) ); 2847817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_shift_r( d, 8 * n_size - grp->nbits ) ); 2848817466cbSJens Wiklander 2849817466cbSJens Wiklander /* 2850817466cbSJens Wiklander * Each try has at worst a probability 1/2 of failing (the msb has 2851817466cbSJens Wiklander * a probability 1/2 of being 0, and then the result will be < N), 2852817466cbSJens Wiklander * so after 30 tries failure probability is a most 2**(-30). 2853817466cbSJens Wiklander * 2854817466cbSJens Wiklander * For most curves, 1 try is enough with overwhelming probability, 2855817466cbSJens Wiklander * since N starts with a lot of 1s in binary, but some curves 2856817466cbSJens Wiklander * such as secp224k1 are actually very close to the worst case. 2857817466cbSJens Wiklander */ 2858817466cbSJens Wiklander if( ++count > 30 ) 2859817466cbSJens Wiklander return( MBEDTLS_ERR_ECP_RANDOM_FAILED ); 28605b25c76aSJerome Forissier 28615b25c76aSJerome Forissier ret = mbedtls_mpi_lt_mpi_ct( d, &grp->N, &cmp ); 28625b25c76aSJerome Forissier if( ret != 0 ) 28635b25c76aSJerome Forissier { 28645b25c76aSJerome Forissier goto cleanup; 2865817466cbSJens Wiklander } 28665b25c76aSJerome Forissier } 28675b25c76aSJerome Forissier while( mbedtls_mpi_cmp_int( d, 1 ) < 0 || cmp != 1 ); 2868817466cbSJens Wiklander } 2869817466cbSJens Wiklander #endif /* ECP_SHORTWEIERSTRASS */ 2870817466cbSJens Wiklander 2871817466cbSJens Wiklander cleanup: 2872817466cbSJens Wiklander return( ret ); 28733d3b0591SJens Wiklander } 2874817466cbSJens Wiklander 28753d3b0591SJens Wiklander /* 28763d3b0591SJens Wiklander * Generate a keypair with configurable base point 28773d3b0591SJens Wiklander */ 28783d3b0591SJens Wiklander int mbedtls_ecp_gen_keypair_base( mbedtls_ecp_group *grp, 28793d3b0591SJens Wiklander const mbedtls_ecp_point *G, 28803d3b0591SJens Wiklander mbedtls_mpi *d, mbedtls_ecp_point *Q, 28813d3b0591SJens Wiklander int (*f_rng)(void *, unsigned char *, size_t), 28823d3b0591SJens Wiklander void *p_rng ) 28833d3b0591SJens Wiklander { 2884*11fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 28853d3b0591SJens Wiklander ECP_VALIDATE_RET( grp != NULL ); 28863d3b0591SJens Wiklander ECP_VALIDATE_RET( d != NULL ); 28873d3b0591SJens Wiklander ECP_VALIDATE_RET( G != NULL ); 28883d3b0591SJens Wiklander ECP_VALIDATE_RET( Q != NULL ); 28893d3b0591SJens Wiklander ECP_VALIDATE_RET( f_rng != NULL ); 28903d3b0591SJens Wiklander 28913d3b0591SJens Wiklander MBEDTLS_MPI_CHK( mbedtls_ecp_gen_privkey( grp, d, f_rng, p_rng ) ); 28923d3b0591SJens Wiklander MBEDTLS_MPI_CHK( mbedtls_ecp_mul( grp, Q, d, G, f_rng, p_rng ) ); 28933d3b0591SJens Wiklander 28943d3b0591SJens Wiklander cleanup: 28953d3b0591SJens Wiklander return( ret ); 2896817466cbSJens Wiklander } 2897817466cbSJens Wiklander 2898817466cbSJens Wiklander /* 2899817466cbSJens Wiklander * Generate key pair, wrapper for conventional base point 2900817466cbSJens Wiklander */ 2901817466cbSJens Wiklander int mbedtls_ecp_gen_keypair( mbedtls_ecp_group *grp, 2902817466cbSJens Wiklander mbedtls_mpi *d, mbedtls_ecp_point *Q, 2903817466cbSJens Wiklander int (*f_rng)(void *, unsigned char *, size_t), 2904817466cbSJens Wiklander void *p_rng ) 2905817466cbSJens Wiklander { 29063d3b0591SJens Wiklander ECP_VALIDATE_RET( grp != NULL ); 29073d3b0591SJens Wiklander ECP_VALIDATE_RET( d != NULL ); 29083d3b0591SJens Wiklander ECP_VALIDATE_RET( Q != NULL ); 29093d3b0591SJens Wiklander ECP_VALIDATE_RET( f_rng != NULL ); 29103d3b0591SJens Wiklander 2911817466cbSJens Wiklander return( mbedtls_ecp_gen_keypair_base( grp, &grp->G, d, Q, f_rng, p_rng ) ); 2912817466cbSJens Wiklander } 2913817466cbSJens Wiklander 2914817466cbSJens Wiklander /* 2915817466cbSJens Wiklander * Generate a keypair, prettier wrapper 2916817466cbSJens Wiklander */ 2917817466cbSJens Wiklander int mbedtls_ecp_gen_key( mbedtls_ecp_group_id grp_id, mbedtls_ecp_keypair *key, 2918817466cbSJens Wiklander int (*f_rng)(void *, unsigned char *, size_t), void *p_rng ) 2919817466cbSJens Wiklander { 2920*11fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 29213d3b0591SJens Wiklander ECP_VALIDATE_RET( key != NULL ); 29223d3b0591SJens Wiklander ECP_VALIDATE_RET( f_rng != NULL ); 2923817466cbSJens Wiklander 2924817466cbSJens Wiklander if( ( ret = mbedtls_ecp_group_load( &key->grp, grp_id ) ) != 0 ) 2925817466cbSJens Wiklander return( ret ); 2926817466cbSJens Wiklander 2927817466cbSJens Wiklander return( mbedtls_ecp_gen_keypair( &key->grp, &key->d, &key->Q, f_rng, p_rng ) ); 2928817466cbSJens Wiklander } 2929817466cbSJens Wiklander 2930*11fa71b9SJerome Forissier #define ECP_CURVE25519_KEY_SIZE 32 2931*11fa71b9SJerome Forissier /* 2932*11fa71b9SJerome Forissier * Read a private key. 2933*11fa71b9SJerome Forissier */ 2934*11fa71b9SJerome Forissier int mbedtls_ecp_read_key( mbedtls_ecp_group_id grp_id, mbedtls_ecp_keypair *key, 2935*11fa71b9SJerome Forissier const unsigned char *buf, size_t buflen ) 2936*11fa71b9SJerome Forissier { 2937*11fa71b9SJerome Forissier int ret = 0; 2938*11fa71b9SJerome Forissier 2939*11fa71b9SJerome Forissier ECP_VALIDATE_RET( key != NULL ); 2940*11fa71b9SJerome Forissier ECP_VALIDATE_RET( buf != NULL ); 2941*11fa71b9SJerome Forissier 2942*11fa71b9SJerome Forissier if( ( ret = mbedtls_ecp_group_load( &key->grp, grp_id ) ) != 0 ) 2943*11fa71b9SJerome Forissier return( ret ); 2944*11fa71b9SJerome Forissier 2945*11fa71b9SJerome Forissier ret = MBEDTLS_ERR_ECP_FEATURE_UNAVAILABLE; 2946*11fa71b9SJerome Forissier 2947*11fa71b9SJerome Forissier #if defined(ECP_MONTGOMERY) 2948*11fa71b9SJerome Forissier if( mbedtls_ecp_get_type( &key->grp ) == MBEDTLS_ECP_TYPE_MONTGOMERY ) 2949*11fa71b9SJerome Forissier { 2950*11fa71b9SJerome Forissier /* 2951*11fa71b9SJerome Forissier * If it is Curve25519 curve then mask the key as mandated by RFC7748 2952*11fa71b9SJerome Forissier */ 2953*11fa71b9SJerome Forissier if( grp_id == MBEDTLS_ECP_DP_CURVE25519 ) 2954*11fa71b9SJerome Forissier { 2955*11fa71b9SJerome Forissier if( buflen != ECP_CURVE25519_KEY_SIZE ) 2956*11fa71b9SJerome Forissier return MBEDTLS_ERR_ECP_INVALID_KEY; 2957*11fa71b9SJerome Forissier 2958*11fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_read_binary_le( &key->d, buf, buflen ) ); 2959*11fa71b9SJerome Forissier 2960*11fa71b9SJerome Forissier /* Set the three least significant bits to 0 */ 2961*11fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_set_bit( &key->d, 0, 0 ) ); 2962*11fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_set_bit( &key->d, 1, 0 ) ); 2963*11fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_set_bit( &key->d, 2, 0 ) ); 2964*11fa71b9SJerome Forissier 2965*11fa71b9SJerome Forissier /* Set the most significant bit to 0 */ 2966*11fa71b9SJerome Forissier MBEDTLS_MPI_CHK( 2967*11fa71b9SJerome Forissier mbedtls_mpi_set_bit( &key->d, 2968*11fa71b9SJerome Forissier ECP_CURVE25519_KEY_SIZE * 8 - 1, 0 ) 2969*11fa71b9SJerome Forissier ); 2970*11fa71b9SJerome Forissier 2971*11fa71b9SJerome Forissier /* Set the second most significant bit to 1 */ 2972*11fa71b9SJerome Forissier MBEDTLS_MPI_CHK( 2973*11fa71b9SJerome Forissier mbedtls_mpi_set_bit( &key->d, 2974*11fa71b9SJerome Forissier ECP_CURVE25519_KEY_SIZE * 8 - 2, 1 ) 2975*11fa71b9SJerome Forissier ); 2976*11fa71b9SJerome Forissier } 2977*11fa71b9SJerome Forissier else 2978*11fa71b9SJerome Forissier ret = MBEDTLS_ERR_ECP_FEATURE_UNAVAILABLE; 2979*11fa71b9SJerome Forissier } 2980*11fa71b9SJerome Forissier 2981*11fa71b9SJerome Forissier #endif 2982*11fa71b9SJerome Forissier #if defined(ECP_SHORTWEIERSTRASS) 2983*11fa71b9SJerome Forissier if( mbedtls_ecp_get_type( &key->grp ) == MBEDTLS_ECP_TYPE_SHORT_WEIERSTRASS ) 2984*11fa71b9SJerome Forissier { 2985*11fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_read_binary( &key->d, buf, buflen ) ); 2986*11fa71b9SJerome Forissier 2987*11fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_ecp_check_privkey( &key->grp, &key->d ) ); 2988*11fa71b9SJerome Forissier } 2989*11fa71b9SJerome Forissier 2990*11fa71b9SJerome Forissier #endif 2991*11fa71b9SJerome Forissier cleanup: 2992*11fa71b9SJerome Forissier 2993*11fa71b9SJerome Forissier if( ret != 0 ) 2994*11fa71b9SJerome Forissier mbedtls_mpi_free( &key->d ); 2995*11fa71b9SJerome Forissier 2996*11fa71b9SJerome Forissier return( ret ); 2997*11fa71b9SJerome Forissier } 2998*11fa71b9SJerome Forissier 2999817466cbSJens Wiklander /* 3000817466cbSJens Wiklander * Check a public-private key pair 3001817466cbSJens Wiklander */ 3002817466cbSJens Wiklander int mbedtls_ecp_check_pub_priv( const mbedtls_ecp_keypair *pub, const mbedtls_ecp_keypair *prv ) 3003817466cbSJens Wiklander { 3004*11fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 3005817466cbSJens Wiklander mbedtls_ecp_point Q; 3006817466cbSJens Wiklander mbedtls_ecp_group grp; 30073d3b0591SJens Wiklander ECP_VALIDATE_RET( pub != NULL ); 30083d3b0591SJens Wiklander ECP_VALIDATE_RET( prv != NULL ); 3009817466cbSJens Wiklander 3010817466cbSJens Wiklander if( pub->grp.id == MBEDTLS_ECP_DP_NONE || 3011817466cbSJens Wiklander pub->grp.id != prv->grp.id || 3012817466cbSJens Wiklander mbedtls_mpi_cmp_mpi( &pub->Q.X, &prv->Q.X ) || 3013817466cbSJens Wiklander mbedtls_mpi_cmp_mpi( &pub->Q.Y, &prv->Q.Y ) || 3014817466cbSJens Wiklander mbedtls_mpi_cmp_mpi( &pub->Q.Z, &prv->Q.Z ) ) 3015817466cbSJens Wiklander { 3016817466cbSJens Wiklander return( MBEDTLS_ERR_ECP_BAD_INPUT_DATA ); 3017817466cbSJens Wiklander } 3018817466cbSJens Wiklander 3019817466cbSJens Wiklander mbedtls_ecp_point_init( &Q ); 3020817466cbSJens Wiklander mbedtls_ecp_group_init( &grp ); 3021817466cbSJens Wiklander 3022817466cbSJens Wiklander /* mbedtls_ecp_mul() needs a non-const group... */ 3023817466cbSJens Wiklander mbedtls_ecp_group_copy( &grp, &prv->grp ); 3024817466cbSJens Wiklander 3025817466cbSJens Wiklander /* Also checks d is valid */ 3026817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_ecp_mul( &grp, &Q, &prv->d, &prv->grp.G, NULL, NULL ) ); 3027817466cbSJens Wiklander 3028817466cbSJens Wiklander if( mbedtls_mpi_cmp_mpi( &Q.X, &prv->Q.X ) || 3029817466cbSJens Wiklander mbedtls_mpi_cmp_mpi( &Q.Y, &prv->Q.Y ) || 3030817466cbSJens Wiklander mbedtls_mpi_cmp_mpi( &Q.Z, &prv->Q.Z ) ) 3031817466cbSJens Wiklander { 3032817466cbSJens Wiklander ret = MBEDTLS_ERR_ECP_BAD_INPUT_DATA; 3033817466cbSJens Wiklander goto cleanup; 3034817466cbSJens Wiklander } 3035817466cbSJens Wiklander 3036817466cbSJens Wiklander cleanup: 3037817466cbSJens Wiklander mbedtls_ecp_point_free( &Q ); 3038817466cbSJens Wiklander mbedtls_ecp_group_free( &grp ); 3039817466cbSJens Wiklander 3040817466cbSJens Wiklander return( ret ); 3041817466cbSJens Wiklander } 3042817466cbSJens Wiklander 3043817466cbSJens Wiklander #if defined(MBEDTLS_SELF_TEST) 3044817466cbSJens Wiklander 3045817466cbSJens Wiklander /* 3046817466cbSJens Wiklander * Checkup routine 3047817466cbSJens Wiklander */ 3048817466cbSJens Wiklander int mbedtls_ecp_self_test( int verbose ) 3049817466cbSJens Wiklander { 3050*11fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 3051817466cbSJens Wiklander size_t i; 3052817466cbSJens Wiklander mbedtls_ecp_group grp; 3053817466cbSJens Wiklander mbedtls_ecp_point R, P; 3054817466cbSJens Wiklander mbedtls_mpi m; 3055817466cbSJens Wiklander unsigned long add_c_prev, dbl_c_prev, mul_c_prev; 3056817466cbSJens Wiklander /* exponents especially adapted for secp192r1 */ 3057817466cbSJens Wiklander const char *exponents[] = 3058817466cbSJens Wiklander { 3059817466cbSJens Wiklander "000000000000000000000000000000000000000000000001", /* one */ 3060817466cbSJens Wiklander "FFFFFFFFFFFFFFFFFFFFFFFF99DEF836146BC9B1B4D22830", /* N - 1 */ 3061817466cbSJens Wiklander "5EA6F389A38B8BC81E767753B15AA5569E1782E30ABE7D25", /* random */ 3062817466cbSJens Wiklander "400000000000000000000000000000000000000000000000", /* one and zeros */ 3063817466cbSJens Wiklander "7FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF", /* all ones */ 3064817466cbSJens Wiklander "555555555555555555555555555555555555555555555555", /* 101010... */ 3065817466cbSJens Wiklander }; 3066817466cbSJens Wiklander 3067817466cbSJens Wiklander mbedtls_ecp_group_init( &grp ); 3068817466cbSJens Wiklander mbedtls_ecp_point_init( &R ); 3069817466cbSJens Wiklander mbedtls_ecp_point_init( &P ); 3070817466cbSJens Wiklander mbedtls_mpi_init( &m ); 3071817466cbSJens Wiklander 3072817466cbSJens Wiklander /* Use secp192r1 if available, or any available curve */ 3073817466cbSJens Wiklander #if defined(MBEDTLS_ECP_DP_SECP192R1_ENABLED) 3074817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_ecp_group_load( &grp, MBEDTLS_ECP_DP_SECP192R1 ) ); 3075817466cbSJens Wiklander #else 3076817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_ecp_group_load( &grp, mbedtls_ecp_curve_list()->grp_id ) ); 3077817466cbSJens Wiklander #endif 3078817466cbSJens Wiklander 3079817466cbSJens Wiklander if( verbose != 0 ) 3080817466cbSJens Wiklander mbedtls_printf( " ECP test #1 (constant op_count, base point G): " ); 3081817466cbSJens Wiklander 3082817466cbSJens Wiklander /* Do a dummy multiplication first to trigger precomputation */ 3083817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_lset( &m, 2 ) ); 3084817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_ecp_mul( &grp, &P, &m, &grp.G, NULL, NULL ) ); 3085817466cbSJens Wiklander 3086817466cbSJens Wiklander add_count = 0; 3087817466cbSJens Wiklander dbl_count = 0; 3088817466cbSJens Wiklander mul_count = 0; 3089817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_read_string( &m, 16, exponents[0] ) ); 3090817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_ecp_mul( &grp, &R, &m, &grp.G, NULL, NULL ) ); 3091817466cbSJens Wiklander 3092817466cbSJens Wiklander for( i = 1; i < sizeof( exponents ) / sizeof( exponents[0] ); i++ ) 3093817466cbSJens Wiklander { 3094817466cbSJens Wiklander add_c_prev = add_count; 3095817466cbSJens Wiklander dbl_c_prev = dbl_count; 3096817466cbSJens Wiklander mul_c_prev = mul_count; 3097817466cbSJens Wiklander add_count = 0; 3098817466cbSJens Wiklander dbl_count = 0; 3099817466cbSJens Wiklander mul_count = 0; 3100817466cbSJens Wiklander 3101817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_read_string( &m, 16, exponents[i] ) ); 3102817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_ecp_mul( &grp, &R, &m, &grp.G, NULL, NULL ) ); 3103817466cbSJens Wiklander 3104817466cbSJens Wiklander if( add_count != add_c_prev || 3105817466cbSJens Wiklander dbl_count != dbl_c_prev || 3106817466cbSJens Wiklander mul_count != mul_c_prev ) 3107817466cbSJens Wiklander { 3108817466cbSJens Wiklander if( verbose != 0 ) 3109817466cbSJens Wiklander mbedtls_printf( "failed (%u)\n", (unsigned int) i ); 3110817466cbSJens Wiklander 3111817466cbSJens Wiklander ret = 1; 3112817466cbSJens Wiklander goto cleanup; 3113817466cbSJens Wiklander } 3114817466cbSJens Wiklander } 3115817466cbSJens Wiklander 3116817466cbSJens Wiklander if( verbose != 0 ) 3117817466cbSJens Wiklander mbedtls_printf( "passed\n" ); 3118817466cbSJens Wiklander 3119817466cbSJens Wiklander if( verbose != 0 ) 3120817466cbSJens Wiklander mbedtls_printf( " ECP test #2 (constant op_count, other point): " ); 3121817466cbSJens Wiklander /* We computed P = 2G last time, use it */ 3122817466cbSJens Wiklander 3123817466cbSJens Wiklander add_count = 0; 3124817466cbSJens Wiklander dbl_count = 0; 3125817466cbSJens Wiklander mul_count = 0; 3126817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_read_string( &m, 16, exponents[0] ) ); 3127817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_ecp_mul( &grp, &R, &m, &P, NULL, NULL ) ); 3128817466cbSJens Wiklander 3129817466cbSJens Wiklander for( i = 1; i < sizeof( exponents ) / sizeof( exponents[0] ); i++ ) 3130817466cbSJens Wiklander { 3131817466cbSJens Wiklander add_c_prev = add_count; 3132817466cbSJens Wiklander dbl_c_prev = dbl_count; 3133817466cbSJens Wiklander mul_c_prev = mul_count; 3134817466cbSJens Wiklander add_count = 0; 3135817466cbSJens Wiklander dbl_count = 0; 3136817466cbSJens Wiklander mul_count = 0; 3137817466cbSJens Wiklander 3138817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_read_string( &m, 16, exponents[i] ) ); 3139817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_ecp_mul( &grp, &R, &m, &P, NULL, NULL ) ); 3140817466cbSJens Wiklander 3141817466cbSJens Wiklander if( add_count != add_c_prev || 3142817466cbSJens Wiklander dbl_count != dbl_c_prev || 3143817466cbSJens Wiklander mul_count != mul_c_prev ) 3144817466cbSJens Wiklander { 3145817466cbSJens Wiklander if( verbose != 0 ) 3146817466cbSJens Wiklander mbedtls_printf( "failed (%u)\n", (unsigned int) i ); 3147817466cbSJens Wiklander 3148817466cbSJens Wiklander ret = 1; 3149817466cbSJens Wiklander goto cleanup; 3150817466cbSJens Wiklander } 3151817466cbSJens Wiklander } 3152817466cbSJens Wiklander 3153817466cbSJens Wiklander if( verbose != 0 ) 3154817466cbSJens Wiklander mbedtls_printf( "passed\n" ); 3155817466cbSJens Wiklander 3156817466cbSJens Wiklander cleanup: 3157817466cbSJens Wiklander 3158817466cbSJens Wiklander if( ret < 0 && verbose != 0 ) 3159817466cbSJens Wiklander mbedtls_printf( "Unexpected error, return code = %08X\n", ret ); 3160817466cbSJens Wiklander 3161817466cbSJens Wiklander mbedtls_ecp_group_free( &grp ); 3162817466cbSJens Wiklander mbedtls_ecp_point_free( &R ); 3163817466cbSJens Wiklander mbedtls_ecp_point_free( &P ); 3164817466cbSJens Wiklander mbedtls_mpi_free( &m ); 3165817466cbSJens Wiklander 3166817466cbSJens Wiklander if( verbose != 0 ) 3167817466cbSJens Wiklander mbedtls_printf( "\n" ); 3168817466cbSJens Wiklander 3169817466cbSJens Wiklander return( ret ); 3170817466cbSJens Wiklander } 3171817466cbSJens Wiklander 3172817466cbSJens Wiklander #endif /* MBEDTLS_SELF_TEST */ 3173817466cbSJens Wiklander 3174817466cbSJens Wiklander #endif /* !MBEDTLS_ECP_ALT */ 3175817466cbSJens Wiklander 3176817466cbSJens Wiklander #endif /* MBEDTLS_ECP_C */ 3177