1817466cbSJens Wiklander /* 2817466cbSJens Wiklander * Elliptic curves over GF(p): generic functions 3817466cbSJens Wiklander * 4*7901324dSJerome Forissier * Copyright The Mbed TLS Contributors 5*7901324dSJerome Forissier * SPDX-License-Identifier: Apache-2.0 6817466cbSJens Wiklander * 7817466cbSJens Wiklander * Licensed under the Apache License, Version 2.0 (the "License"); you may 8817466cbSJens Wiklander * not use this file except in compliance with the License. 9817466cbSJens Wiklander * You may obtain a copy of the License at 10817466cbSJens Wiklander * 11817466cbSJens Wiklander * http://www.apache.org/licenses/LICENSE-2.0 12817466cbSJens Wiklander * 13817466cbSJens Wiklander * Unless required by applicable law or agreed to in writing, software 14817466cbSJens Wiklander * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT 15817466cbSJens Wiklander * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 16817466cbSJens Wiklander * See the License for the specific language governing permissions and 17817466cbSJens Wiklander * limitations under the License. 18817466cbSJens Wiklander */ 19817466cbSJens Wiklander 20817466cbSJens Wiklander /* 21817466cbSJens Wiklander * References: 22817466cbSJens Wiklander * 23817466cbSJens Wiklander * SEC1 http://www.secg.org/index.php?action=secg,docs_secg 24817466cbSJens Wiklander * GECC = Guide to Elliptic Curve Cryptography - Hankerson, Menezes, Vanstone 25817466cbSJens Wiklander * FIPS 186-3 http://csrc.nist.gov/publications/fips/fips186-3/fips_186-3.pdf 26817466cbSJens Wiklander * RFC 4492 for the related TLS structures and constants 273d3b0591SJens Wiklander * RFC 7748 for the Curve448 and Curve25519 curve definitions 28817466cbSJens Wiklander * 29817466cbSJens Wiklander * [Curve25519] http://cr.yp.to/ecdh/curve25519-20060209.pdf 30817466cbSJens Wiklander * 31817466cbSJens Wiklander * [2] CORON, Jean-S'ebastien. Resistance against differential power analysis 32817466cbSJens Wiklander * for elliptic curve cryptosystems. In : Cryptographic Hardware and 33817466cbSJens Wiklander * Embedded Systems. Springer Berlin Heidelberg, 1999. p. 292-302. 34817466cbSJens Wiklander * <http://link.springer.com/chapter/10.1007/3-540-48059-5_25> 35817466cbSJens Wiklander * 36817466cbSJens Wiklander * [3] HEDABOU, Mustapha, PINEL, Pierre, et B'EN'ETEAU, Lucien. A comb method to 37817466cbSJens Wiklander * render ECC resistant against Side Channel Attacks. IACR Cryptology 38817466cbSJens Wiklander * ePrint Archive, 2004, vol. 2004, p. 342. 39817466cbSJens Wiklander * <http://eprint.iacr.org/2004/342.pdf> 40817466cbSJens Wiklander */ 41817466cbSJens Wiklander 42*7901324dSJerome Forissier #include "common.h" 43817466cbSJens Wiklander 443d3b0591SJens Wiklander /** 453d3b0591SJens Wiklander * \brief Function level alternative implementation. 463d3b0591SJens Wiklander * 473d3b0591SJens Wiklander * The MBEDTLS_ECP_INTERNAL_ALT macro enables alternative implementations to 483d3b0591SJens Wiklander * replace certain functions in this module. The alternative implementations are 493d3b0591SJens Wiklander * typically hardware accelerators and need to activate the hardware before the 503d3b0591SJens Wiklander * computation starts and deactivate it after it finishes. The 513d3b0591SJens Wiklander * mbedtls_internal_ecp_init() and mbedtls_internal_ecp_free() functions serve 523d3b0591SJens Wiklander * this purpose. 533d3b0591SJens Wiklander * 543d3b0591SJens Wiklander * To preserve the correct functionality the following conditions must hold: 553d3b0591SJens Wiklander * 563d3b0591SJens Wiklander * - The alternative implementation must be activated by 573d3b0591SJens Wiklander * mbedtls_internal_ecp_init() before any of the replaceable functions is 583d3b0591SJens Wiklander * called. 593d3b0591SJens Wiklander * - mbedtls_internal_ecp_free() must \b only be called when the alternative 603d3b0591SJens Wiklander * implementation is activated. 613d3b0591SJens Wiklander * - mbedtls_internal_ecp_init() must \b not be called when the alternative 623d3b0591SJens Wiklander * implementation is activated. 633d3b0591SJens Wiklander * - Public functions must not return while the alternative implementation is 643d3b0591SJens Wiklander * activated. 653d3b0591SJens Wiklander * - Replaceable functions are guarded by \c MBEDTLS_ECP_XXX_ALT macros and 663d3b0591SJens Wiklander * before calling them an \code if( mbedtls_internal_ecp_grp_capable( grp ) ) 673d3b0591SJens Wiklander * \endcode ensures that the alternative implementation supports the current 683d3b0591SJens Wiklander * group. 693d3b0591SJens Wiklander */ 703d3b0591SJens Wiklander #if defined(MBEDTLS_ECP_INTERNAL_ALT) 713d3b0591SJens Wiklander #endif 723d3b0591SJens Wiklander 73817466cbSJens Wiklander #if defined(MBEDTLS_ECP_C) 74817466cbSJens Wiklander 75817466cbSJens Wiklander #include "mbedtls/ecp.h" 76817466cbSJens Wiklander #include "mbedtls/threading.h" 773d3b0591SJens Wiklander #include "mbedtls/platform_util.h" 7811fa71b9SJerome Forissier #include "mbedtls/error.h" 79*7901324dSJerome Forissier #include "mbedtls/bn_mul.h" 80*7901324dSJerome Forissier 81*7901324dSJerome Forissier #include "ecp_invasive.h" 82817466cbSJens Wiklander 83817466cbSJens Wiklander #include <string.h> 84817466cbSJens Wiklander 85817466cbSJens Wiklander #if !defined(MBEDTLS_ECP_ALT) 86817466cbSJens Wiklander 873d3b0591SJens Wiklander /* Parameter validation macros based on platform_util.h */ 883d3b0591SJens Wiklander #define ECP_VALIDATE_RET( cond ) \ 893d3b0591SJens Wiklander MBEDTLS_INTERNAL_VALIDATE_RET( cond, MBEDTLS_ERR_ECP_BAD_INPUT_DATA ) 903d3b0591SJens Wiklander #define ECP_VALIDATE( cond ) \ 913d3b0591SJens Wiklander MBEDTLS_INTERNAL_VALIDATE( cond ) 923d3b0591SJens Wiklander 93817466cbSJens Wiklander #if defined(MBEDTLS_PLATFORM_C) 94817466cbSJens Wiklander #include "mbedtls/platform.h" 95817466cbSJens Wiklander #else 96817466cbSJens Wiklander #include <stdlib.h> 97817466cbSJens Wiklander #include <stdio.h> 98817466cbSJens Wiklander #define mbedtls_printf printf 99817466cbSJens Wiklander #define mbedtls_calloc calloc 100817466cbSJens Wiklander #define mbedtls_free free 101817466cbSJens Wiklander #endif 102817466cbSJens Wiklander 103817466cbSJens Wiklander #include "mbedtls/ecp_internal.h" 104817466cbSJens Wiklander 105*7901324dSJerome Forissier #if !defined(MBEDTLS_ECP_NO_INTERNAL_RNG) 106*7901324dSJerome Forissier #if defined(MBEDTLS_HMAC_DRBG_C) 107*7901324dSJerome Forissier #include "mbedtls/hmac_drbg.h" 108*7901324dSJerome Forissier #elif defined(MBEDTLS_CTR_DRBG_C) 109*7901324dSJerome Forissier #include "mbedtls/ctr_drbg.h" 110*7901324dSJerome Forissier #else 111*7901324dSJerome Forissier #error "Invalid configuration detected. Include check_config.h to ensure that the configuration is valid." 112*7901324dSJerome Forissier #endif 113*7901324dSJerome Forissier #endif /* MBEDTLS_ECP_NO_INTERNAL_RNG */ 114*7901324dSJerome Forissier 115817466cbSJens Wiklander #if ( defined(__ARMCC_VERSION) || defined(_MSC_VER) ) && \ 116817466cbSJens Wiklander !defined(inline) && !defined(__cplusplus) 117817466cbSJens Wiklander #define inline __inline 118817466cbSJens Wiklander #endif 119817466cbSJens Wiklander 120817466cbSJens Wiklander #if defined(MBEDTLS_SELF_TEST) 121817466cbSJens Wiklander /* 122817466cbSJens Wiklander * Counts of point addition and doubling, and field multiplications. 123817466cbSJens Wiklander * Used to test resistance of point multiplication to simple timing attacks. 124817466cbSJens Wiklander */ 125817466cbSJens Wiklander static unsigned long add_count, dbl_count, mul_count; 126817466cbSJens Wiklander #endif 127817466cbSJens Wiklander 128*7901324dSJerome Forissier #if !defined(MBEDTLS_ECP_NO_INTERNAL_RNG) 129*7901324dSJerome Forissier /* 130*7901324dSJerome Forissier * Currently ecp_mul() takes a RNG function as an argument, used for 131*7901324dSJerome Forissier * side-channel protection, but it can be NULL. The initial reasoning was 132*7901324dSJerome Forissier * that people will pass non-NULL RNG when they care about side-channels, but 133*7901324dSJerome Forissier * unfortunately we have some APIs that call ecp_mul() with a NULL RNG, with 134*7901324dSJerome Forissier * no opportunity for the user to do anything about it. 135*7901324dSJerome Forissier * 136*7901324dSJerome Forissier * The obvious strategies for addressing that include: 137*7901324dSJerome Forissier * - change those APIs so that they take RNG arguments; 138*7901324dSJerome Forissier * - require a global RNG to be available to all crypto modules. 139*7901324dSJerome Forissier * 140*7901324dSJerome Forissier * Unfortunately those would break compatibility. So what we do instead is 141*7901324dSJerome Forissier * have our own internal DRBG instance, seeded from the secret scalar. 142*7901324dSJerome Forissier * 143*7901324dSJerome Forissier * The following is a light-weight abstraction layer for doing that with 144*7901324dSJerome Forissier * HMAC_DRBG (first choice) or CTR_DRBG. 145*7901324dSJerome Forissier */ 146*7901324dSJerome Forissier 147*7901324dSJerome Forissier #if defined(MBEDTLS_HMAC_DRBG_C) 148*7901324dSJerome Forissier 149*7901324dSJerome Forissier /* DRBG context type */ 150*7901324dSJerome Forissier typedef mbedtls_hmac_drbg_context ecp_drbg_context; 151*7901324dSJerome Forissier 152*7901324dSJerome Forissier /* DRBG context init */ 153*7901324dSJerome Forissier static inline void ecp_drbg_init( ecp_drbg_context *ctx ) 154*7901324dSJerome Forissier { 155*7901324dSJerome Forissier mbedtls_hmac_drbg_init( ctx ); 156*7901324dSJerome Forissier } 157*7901324dSJerome Forissier 158*7901324dSJerome Forissier /* DRBG context free */ 159*7901324dSJerome Forissier static inline void ecp_drbg_free( ecp_drbg_context *ctx ) 160*7901324dSJerome Forissier { 161*7901324dSJerome Forissier mbedtls_hmac_drbg_free( ctx ); 162*7901324dSJerome Forissier } 163*7901324dSJerome Forissier 164*7901324dSJerome Forissier /* DRBG function */ 165*7901324dSJerome Forissier static inline int ecp_drbg_random( void *p_rng, 166*7901324dSJerome Forissier unsigned char *output, size_t output_len ) 167*7901324dSJerome Forissier { 168*7901324dSJerome Forissier return( mbedtls_hmac_drbg_random( p_rng, output, output_len ) ); 169*7901324dSJerome Forissier } 170*7901324dSJerome Forissier 171*7901324dSJerome Forissier /* DRBG context seeding */ 172*7901324dSJerome Forissier static int ecp_drbg_seed( ecp_drbg_context *ctx, 173*7901324dSJerome Forissier const mbedtls_mpi *secret, size_t secret_len ) 174*7901324dSJerome Forissier { 175*7901324dSJerome Forissier int ret; 176*7901324dSJerome Forissier unsigned char secret_bytes[MBEDTLS_ECP_MAX_BYTES]; 177*7901324dSJerome Forissier /* The list starts with strong hashes */ 178*7901324dSJerome Forissier const mbedtls_md_type_t md_type = mbedtls_md_list()[0]; 179*7901324dSJerome Forissier const mbedtls_md_info_t *md_info = mbedtls_md_info_from_type( md_type ); 180*7901324dSJerome Forissier 181*7901324dSJerome Forissier if( secret_len > MBEDTLS_ECP_MAX_BYTES ) 182*7901324dSJerome Forissier { 183*7901324dSJerome Forissier ret = MBEDTLS_ERR_ECP_RANDOM_FAILED; 184*7901324dSJerome Forissier goto cleanup; 185*7901324dSJerome Forissier } 186*7901324dSJerome Forissier 187*7901324dSJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_write_binary( secret, 188*7901324dSJerome Forissier secret_bytes, secret_len ) ); 189*7901324dSJerome Forissier 190*7901324dSJerome Forissier ret = mbedtls_hmac_drbg_seed_buf( ctx, md_info, secret_bytes, secret_len ); 191*7901324dSJerome Forissier 192*7901324dSJerome Forissier cleanup: 193*7901324dSJerome Forissier mbedtls_platform_zeroize( secret_bytes, secret_len ); 194*7901324dSJerome Forissier 195*7901324dSJerome Forissier return( ret ); 196*7901324dSJerome Forissier } 197*7901324dSJerome Forissier 198*7901324dSJerome Forissier #elif defined(MBEDTLS_CTR_DRBG_C) 199*7901324dSJerome Forissier 200*7901324dSJerome Forissier /* DRBG context type */ 201*7901324dSJerome Forissier typedef mbedtls_ctr_drbg_context ecp_drbg_context; 202*7901324dSJerome Forissier 203*7901324dSJerome Forissier /* DRBG context init */ 204*7901324dSJerome Forissier static inline void ecp_drbg_init( ecp_drbg_context *ctx ) 205*7901324dSJerome Forissier { 206*7901324dSJerome Forissier mbedtls_ctr_drbg_init( ctx ); 207*7901324dSJerome Forissier } 208*7901324dSJerome Forissier 209*7901324dSJerome Forissier /* DRBG context free */ 210*7901324dSJerome Forissier static inline void ecp_drbg_free( ecp_drbg_context *ctx ) 211*7901324dSJerome Forissier { 212*7901324dSJerome Forissier mbedtls_ctr_drbg_free( ctx ); 213*7901324dSJerome Forissier } 214*7901324dSJerome Forissier 215*7901324dSJerome Forissier /* DRBG function */ 216*7901324dSJerome Forissier static inline int ecp_drbg_random( void *p_rng, 217*7901324dSJerome Forissier unsigned char *output, size_t output_len ) 218*7901324dSJerome Forissier { 219*7901324dSJerome Forissier return( mbedtls_ctr_drbg_random( p_rng, output, output_len ) ); 220*7901324dSJerome Forissier } 221*7901324dSJerome Forissier 222*7901324dSJerome Forissier /* 223*7901324dSJerome Forissier * Since CTR_DRBG doesn't have a seed_buf() function the way HMAC_DRBG does, 224*7901324dSJerome Forissier * we need to pass an entropy function when seeding. So we use a dummy 225*7901324dSJerome Forissier * function for that, and pass the actual entropy as customisation string. 226*7901324dSJerome Forissier * (During seeding of CTR_DRBG the entropy input and customisation string are 227*7901324dSJerome Forissier * concatenated before being used to update the secret state.) 228*7901324dSJerome Forissier */ 229*7901324dSJerome Forissier static int ecp_ctr_drbg_null_entropy(void *ctx, unsigned char *out, size_t len) 230*7901324dSJerome Forissier { 231*7901324dSJerome Forissier (void) ctx; 232*7901324dSJerome Forissier memset( out, 0, len ); 233*7901324dSJerome Forissier return( 0 ); 234*7901324dSJerome Forissier } 235*7901324dSJerome Forissier 236*7901324dSJerome Forissier /* DRBG context seeding */ 237*7901324dSJerome Forissier static int ecp_drbg_seed( ecp_drbg_context *ctx, 238*7901324dSJerome Forissier const mbedtls_mpi *secret, size_t secret_len ) 239*7901324dSJerome Forissier { 240*7901324dSJerome Forissier int ret; 241*7901324dSJerome Forissier unsigned char secret_bytes[MBEDTLS_ECP_MAX_BYTES]; 242*7901324dSJerome Forissier 243*7901324dSJerome Forissier if( secret_len > MBEDTLS_ECP_MAX_BYTES ) 244*7901324dSJerome Forissier { 245*7901324dSJerome Forissier ret = MBEDTLS_ERR_ECP_RANDOM_FAILED; 246*7901324dSJerome Forissier goto cleanup; 247*7901324dSJerome Forissier } 248*7901324dSJerome Forissier 249*7901324dSJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_write_binary( secret, 250*7901324dSJerome Forissier secret_bytes, secret_len ) ); 251*7901324dSJerome Forissier 252*7901324dSJerome Forissier ret = mbedtls_ctr_drbg_seed( ctx, ecp_ctr_drbg_null_entropy, NULL, 253*7901324dSJerome Forissier secret_bytes, secret_len ); 254*7901324dSJerome Forissier 255*7901324dSJerome Forissier cleanup: 256*7901324dSJerome Forissier mbedtls_platform_zeroize( secret_bytes, secret_len ); 257*7901324dSJerome Forissier 258*7901324dSJerome Forissier return( ret ); 259*7901324dSJerome Forissier } 260*7901324dSJerome Forissier 261*7901324dSJerome Forissier #else 262*7901324dSJerome Forissier #error "Invalid configuration detected. Include check_config.h to ensure that the configuration is valid." 263*7901324dSJerome Forissier #endif /* DRBG modules */ 264*7901324dSJerome Forissier #endif /* MBEDTLS_ECP_NO_INTERNAL_RNG */ 265*7901324dSJerome Forissier 2663d3b0591SJens Wiklander #if defined(MBEDTLS_ECP_RESTARTABLE) 2673d3b0591SJens Wiklander /* 2683d3b0591SJens Wiklander * Maximum number of "basic operations" to be done in a row. 2693d3b0591SJens Wiklander * 2703d3b0591SJens Wiklander * Default value 0 means that ECC operations will not yield. 2713d3b0591SJens Wiklander * Note that regardless of the value of ecp_max_ops, always at 2723d3b0591SJens Wiklander * least one step is performed before yielding. 2733d3b0591SJens Wiklander * 2743d3b0591SJens Wiklander * Setting ecp_max_ops=1 can be suitable for testing purposes 2753d3b0591SJens Wiklander * as it will interrupt computation at all possible points. 2763d3b0591SJens Wiklander */ 2773d3b0591SJens Wiklander static unsigned ecp_max_ops = 0; 2783d3b0591SJens Wiklander 2793d3b0591SJens Wiklander /* 2803d3b0591SJens Wiklander * Set ecp_max_ops 2813d3b0591SJens Wiklander */ 2823d3b0591SJens Wiklander void mbedtls_ecp_set_max_ops( unsigned max_ops ) 2833d3b0591SJens Wiklander { 2843d3b0591SJens Wiklander ecp_max_ops = max_ops; 2853d3b0591SJens Wiklander } 2863d3b0591SJens Wiklander 2873d3b0591SJens Wiklander /* 2883d3b0591SJens Wiklander * Check if restart is enabled 2893d3b0591SJens Wiklander */ 2903d3b0591SJens Wiklander int mbedtls_ecp_restart_is_enabled( void ) 2913d3b0591SJens Wiklander { 2923d3b0591SJens Wiklander return( ecp_max_ops != 0 ); 2933d3b0591SJens Wiklander } 2943d3b0591SJens Wiklander 2953d3b0591SJens Wiklander /* 2963d3b0591SJens Wiklander * Restart sub-context for ecp_mul_comb() 2973d3b0591SJens Wiklander */ 2983d3b0591SJens Wiklander struct mbedtls_ecp_restart_mul 2993d3b0591SJens Wiklander { 3003d3b0591SJens Wiklander mbedtls_ecp_point R; /* current intermediate result */ 3013d3b0591SJens Wiklander size_t i; /* current index in various loops, 0 outside */ 3023d3b0591SJens Wiklander mbedtls_ecp_point *T; /* table for precomputed points */ 3033d3b0591SJens Wiklander unsigned char T_size; /* number of points in table T */ 3043d3b0591SJens Wiklander enum { /* what were we doing last time we returned? */ 3053d3b0591SJens Wiklander ecp_rsm_init = 0, /* nothing so far, dummy initial state */ 3063d3b0591SJens Wiklander ecp_rsm_pre_dbl, /* precompute 2^n multiples */ 3073d3b0591SJens Wiklander ecp_rsm_pre_norm_dbl, /* normalize precomputed 2^n multiples */ 3083d3b0591SJens Wiklander ecp_rsm_pre_add, /* precompute remaining points by adding */ 3093d3b0591SJens Wiklander ecp_rsm_pre_norm_add, /* normalize all precomputed points */ 3103d3b0591SJens Wiklander ecp_rsm_comb_core, /* ecp_mul_comb_core() */ 3113d3b0591SJens Wiklander ecp_rsm_final_norm, /* do the final normalization */ 3123d3b0591SJens Wiklander } state; 313*7901324dSJerome Forissier #if !defined(MBEDTLS_ECP_NO_INTERNAL_RNG) 314*7901324dSJerome Forissier ecp_drbg_context drbg_ctx; 315*7901324dSJerome Forissier unsigned char drbg_seeded; 316*7901324dSJerome Forissier #endif 3173d3b0591SJens Wiklander }; 3183d3b0591SJens Wiklander 3193d3b0591SJens Wiklander /* 3203d3b0591SJens Wiklander * Init restart_mul sub-context 3213d3b0591SJens Wiklander */ 3223d3b0591SJens Wiklander static void ecp_restart_rsm_init( mbedtls_ecp_restart_mul_ctx *ctx ) 3233d3b0591SJens Wiklander { 3243d3b0591SJens Wiklander mbedtls_ecp_point_init( &ctx->R ); 3253d3b0591SJens Wiklander ctx->i = 0; 3263d3b0591SJens Wiklander ctx->T = NULL; 3273d3b0591SJens Wiklander ctx->T_size = 0; 3283d3b0591SJens Wiklander ctx->state = ecp_rsm_init; 329*7901324dSJerome Forissier #if !defined(MBEDTLS_ECP_NO_INTERNAL_RNG) 330*7901324dSJerome Forissier ecp_drbg_init( &ctx->drbg_ctx ); 331*7901324dSJerome Forissier ctx->drbg_seeded = 0; 332*7901324dSJerome Forissier #endif 3333d3b0591SJens Wiklander } 3343d3b0591SJens Wiklander 3353d3b0591SJens Wiklander /* 3363d3b0591SJens Wiklander * Free the components of a restart_mul sub-context 3373d3b0591SJens Wiklander */ 3383d3b0591SJens Wiklander static void ecp_restart_rsm_free( mbedtls_ecp_restart_mul_ctx *ctx ) 3393d3b0591SJens Wiklander { 3403d3b0591SJens Wiklander unsigned char i; 3413d3b0591SJens Wiklander 3423d3b0591SJens Wiklander if( ctx == NULL ) 3433d3b0591SJens Wiklander return; 3443d3b0591SJens Wiklander 3453d3b0591SJens Wiklander mbedtls_ecp_point_free( &ctx->R ); 3463d3b0591SJens Wiklander 3473d3b0591SJens Wiklander if( ctx->T != NULL ) 3483d3b0591SJens Wiklander { 3493d3b0591SJens Wiklander for( i = 0; i < ctx->T_size; i++ ) 3503d3b0591SJens Wiklander mbedtls_ecp_point_free( ctx->T + i ); 3513d3b0591SJens Wiklander mbedtls_free( ctx->T ); 3523d3b0591SJens Wiklander } 3533d3b0591SJens Wiklander 354*7901324dSJerome Forissier #if !defined(MBEDTLS_ECP_NO_INTERNAL_RNG) 355*7901324dSJerome Forissier ecp_drbg_free( &ctx->drbg_ctx ); 356*7901324dSJerome Forissier #endif 357*7901324dSJerome Forissier 3583d3b0591SJens Wiklander ecp_restart_rsm_init( ctx ); 3593d3b0591SJens Wiklander } 3603d3b0591SJens Wiklander 3613d3b0591SJens Wiklander /* 3623d3b0591SJens Wiklander * Restart context for ecp_muladd() 3633d3b0591SJens Wiklander */ 3643d3b0591SJens Wiklander struct mbedtls_ecp_restart_muladd 3653d3b0591SJens Wiklander { 3663d3b0591SJens Wiklander mbedtls_ecp_point mP; /* mP value */ 3673d3b0591SJens Wiklander mbedtls_ecp_point R; /* R intermediate result */ 3683d3b0591SJens Wiklander enum { /* what should we do next? */ 3693d3b0591SJens Wiklander ecp_rsma_mul1 = 0, /* first multiplication */ 3703d3b0591SJens Wiklander ecp_rsma_mul2, /* second multiplication */ 3713d3b0591SJens Wiklander ecp_rsma_add, /* addition */ 3723d3b0591SJens Wiklander ecp_rsma_norm, /* normalization */ 3733d3b0591SJens Wiklander } state; 3743d3b0591SJens Wiklander }; 3753d3b0591SJens Wiklander 3763d3b0591SJens Wiklander /* 3773d3b0591SJens Wiklander * Init restart_muladd sub-context 3783d3b0591SJens Wiklander */ 3793d3b0591SJens Wiklander static void ecp_restart_ma_init( mbedtls_ecp_restart_muladd_ctx *ctx ) 3803d3b0591SJens Wiklander { 3813d3b0591SJens Wiklander mbedtls_ecp_point_init( &ctx->mP ); 3823d3b0591SJens Wiklander mbedtls_ecp_point_init( &ctx->R ); 3833d3b0591SJens Wiklander ctx->state = ecp_rsma_mul1; 3843d3b0591SJens Wiklander } 3853d3b0591SJens Wiklander 3863d3b0591SJens Wiklander /* 3873d3b0591SJens Wiklander * Free the components of a restart_muladd sub-context 3883d3b0591SJens Wiklander */ 3893d3b0591SJens Wiklander static void ecp_restart_ma_free( mbedtls_ecp_restart_muladd_ctx *ctx ) 3903d3b0591SJens Wiklander { 3913d3b0591SJens Wiklander if( ctx == NULL ) 3923d3b0591SJens Wiklander return; 3933d3b0591SJens Wiklander 3943d3b0591SJens Wiklander mbedtls_ecp_point_free( &ctx->mP ); 3953d3b0591SJens Wiklander mbedtls_ecp_point_free( &ctx->R ); 3963d3b0591SJens Wiklander 3973d3b0591SJens Wiklander ecp_restart_ma_init( ctx ); 3983d3b0591SJens Wiklander } 3993d3b0591SJens Wiklander 4003d3b0591SJens Wiklander /* 4013d3b0591SJens Wiklander * Initialize a restart context 4023d3b0591SJens Wiklander */ 4033d3b0591SJens Wiklander void mbedtls_ecp_restart_init( mbedtls_ecp_restart_ctx *ctx ) 4043d3b0591SJens Wiklander { 4053d3b0591SJens Wiklander ECP_VALIDATE( ctx != NULL ); 4063d3b0591SJens Wiklander ctx->ops_done = 0; 4073d3b0591SJens Wiklander ctx->depth = 0; 4083d3b0591SJens Wiklander ctx->rsm = NULL; 4093d3b0591SJens Wiklander ctx->ma = NULL; 4103d3b0591SJens Wiklander } 4113d3b0591SJens Wiklander 4123d3b0591SJens Wiklander /* 4133d3b0591SJens Wiklander * Free the components of a restart context 4143d3b0591SJens Wiklander */ 4153d3b0591SJens Wiklander void mbedtls_ecp_restart_free( mbedtls_ecp_restart_ctx *ctx ) 4163d3b0591SJens Wiklander { 4173d3b0591SJens Wiklander if( ctx == NULL ) 4183d3b0591SJens Wiklander return; 4193d3b0591SJens Wiklander 4203d3b0591SJens Wiklander ecp_restart_rsm_free( ctx->rsm ); 4213d3b0591SJens Wiklander mbedtls_free( ctx->rsm ); 4223d3b0591SJens Wiklander 4233d3b0591SJens Wiklander ecp_restart_ma_free( ctx->ma ); 4243d3b0591SJens Wiklander mbedtls_free( ctx->ma ); 4253d3b0591SJens Wiklander 4263d3b0591SJens Wiklander mbedtls_ecp_restart_init( ctx ); 4273d3b0591SJens Wiklander } 4283d3b0591SJens Wiklander 4293d3b0591SJens Wiklander /* 4303d3b0591SJens Wiklander * Check if we can do the next step 4313d3b0591SJens Wiklander */ 4323d3b0591SJens Wiklander int mbedtls_ecp_check_budget( const mbedtls_ecp_group *grp, 4333d3b0591SJens Wiklander mbedtls_ecp_restart_ctx *rs_ctx, 4343d3b0591SJens Wiklander unsigned ops ) 4353d3b0591SJens Wiklander { 4363d3b0591SJens Wiklander ECP_VALIDATE_RET( grp != NULL ); 4373d3b0591SJens Wiklander 4383d3b0591SJens Wiklander if( rs_ctx != NULL && ecp_max_ops != 0 ) 4393d3b0591SJens Wiklander { 4403d3b0591SJens Wiklander /* scale depending on curve size: the chosen reference is 256-bit, 4413d3b0591SJens Wiklander * and multiplication is quadratic. Round to the closest integer. */ 4423d3b0591SJens Wiklander if( grp->pbits >= 512 ) 4433d3b0591SJens Wiklander ops *= 4; 4443d3b0591SJens Wiklander else if( grp->pbits >= 384 ) 4453d3b0591SJens Wiklander ops *= 2; 4463d3b0591SJens Wiklander 4473d3b0591SJens Wiklander /* Avoid infinite loops: always allow first step. 4483d3b0591SJens Wiklander * Because of that, however, it's not generally true 4493d3b0591SJens Wiklander * that ops_done <= ecp_max_ops, so the check 4503d3b0591SJens Wiklander * ops_done > ecp_max_ops below is mandatory. */ 4513d3b0591SJens Wiklander if( ( rs_ctx->ops_done != 0 ) && 4523d3b0591SJens Wiklander ( rs_ctx->ops_done > ecp_max_ops || 4533d3b0591SJens Wiklander ops > ecp_max_ops - rs_ctx->ops_done ) ) 4543d3b0591SJens Wiklander { 4553d3b0591SJens Wiklander return( MBEDTLS_ERR_ECP_IN_PROGRESS ); 4563d3b0591SJens Wiklander } 4573d3b0591SJens Wiklander 4583d3b0591SJens Wiklander /* update running count */ 4593d3b0591SJens Wiklander rs_ctx->ops_done += ops; 4603d3b0591SJens Wiklander } 4613d3b0591SJens Wiklander 4623d3b0591SJens Wiklander return( 0 ); 4633d3b0591SJens Wiklander } 4643d3b0591SJens Wiklander 4653d3b0591SJens Wiklander /* Call this when entering a function that needs its own sub-context */ 4663d3b0591SJens Wiklander #define ECP_RS_ENTER( SUB ) do { \ 4673d3b0591SJens Wiklander /* reset ops count for this call if top-level */ \ 4683d3b0591SJens Wiklander if( rs_ctx != NULL && rs_ctx->depth++ == 0 ) \ 4693d3b0591SJens Wiklander rs_ctx->ops_done = 0; \ 4703d3b0591SJens Wiklander \ 4713d3b0591SJens Wiklander /* set up our own sub-context if needed */ \ 4723d3b0591SJens Wiklander if( mbedtls_ecp_restart_is_enabled() && \ 4733d3b0591SJens Wiklander rs_ctx != NULL && rs_ctx->SUB == NULL ) \ 4743d3b0591SJens Wiklander { \ 4753d3b0591SJens Wiklander rs_ctx->SUB = mbedtls_calloc( 1, sizeof( *rs_ctx->SUB ) ); \ 4763d3b0591SJens Wiklander if( rs_ctx->SUB == NULL ) \ 4773d3b0591SJens Wiklander return( MBEDTLS_ERR_ECP_ALLOC_FAILED ); \ 4783d3b0591SJens Wiklander \ 4793d3b0591SJens Wiklander ecp_restart_## SUB ##_init( rs_ctx->SUB ); \ 4803d3b0591SJens Wiklander } \ 4813d3b0591SJens Wiklander } while( 0 ) 4823d3b0591SJens Wiklander 4833d3b0591SJens Wiklander /* Call this when leaving a function that needs its own sub-context */ 4843d3b0591SJens Wiklander #define ECP_RS_LEAVE( SUB ) do { \ 4853d3b0591SJens Wiklander /* clear our sub-context when not in progress (done or error) */ \ 4863d3b0591SJens Wiklander if( rs_ctx != NULL && rs_ctx->SUB != NULL && \ 4873d3b0591SJens Wiklander ret != MBEDTLS_ERR_ECP_IN_PROGRESS ) \ 4883d3b0591SJens Wiklander { \ 4893d3b0591SJens Wiklander ecp_restart_## SUB ##_free( rs_ctx->SUB ); \ 4903d3b0591SJens Wiklander mbedtls_free( rs_ctx->SUB ); \ 4913d3b0591SJens Wiklander rs_ctx->SUB = NULL; \ 4923d3b0591SJens Wiklander } \ 4933d3b0591SJens Wiklander \ 4943d3b0591SJens Wiklander if( rs_ctx != NULL ) \ 4953d3b0591SJens Wiklander rs_ctx->depth--; \ 4963d3b0591SJens Wiklander } while( 0 ) 4973d3b0591SJens Wiklander 4983d3b0591SJens Wiklander #else /* MBEDTLS_ECP_RESTARTABLE */ 4993d3b0591SJens Wiklander 5003d3b0591SJens Wiklander #define ECP_RS_ENTER( sub ) (void) rs_ctx; 5013d3b0591SJens Wiklander #define ECP_RS_LEAVE( sub ) (void) rs_ctx; 5023d3b0591SJens Wiklander 5033d3b0591SJens Wiklander #endif /* MBEDTLS_ECP_RESTARTABLE */ 5043d3b0591SJens Wiklander 505817466cbSJens Wiklander /* 506817466cbSJens Wiklander * List of supported curves: 507817466cbSJens Wiklander * - internal ID 50811fa71b9SJerome Forissier * - TLS NamedCurve ID (RFC 4492 sec. 5.1.1, RFC 7071 sec. 2, RFC 8446 sec. 4.2.7) 509817466cbSJens Wiklander * - size in bits 510817466cbSJens Wiklander * - readable name 511817466cbSJens Wiklander * 512817466cbSJens Wiklander * Curves are listed in order: largest curves first, and for a given size, 513817466cbSJens Wiklander * fastest curves first. This provides the default order for the SSL module. 514817466cbSJens Wiklander * 515817466cbSJens Wiklander * Reminder: update profiles in x509_crt.c when adding a new curves! 516817466cbSJens Wiklander */ 517817466cbSJens Wiklander static const mbedtls_ecp_curve_info ecp_supported_curves[] = 518817466cbSJens Wiklander { 519817466cbSJens Wiklander #if defined(MBEDTLS_ECP_DP_SECP521R1_ENABLED) 520817466cbSJens Wiklander { MBEDTLS_ECP_DP_SECP521R1, 25, 521, "secp521r1" }, 521817466cbSJens Wiklander #endif 522817466cbSJens Wiklander #if defined(MBEDTLS_ECP_DP_BP512R1_ENABLED) 523817466cbSJens Wiklander { MBEDTLS_ECP_DP_BP512R1, 28, 512, "brainpoolP512r1" }, 524817466cbSJens Wiklander #endif 525817466cbSJens Wiklander #if defined(MBEDTLS_ECP_DP_SECP384R1_ENABLED) 526817466cbSJens Wiklander { MBEDTLS_ECP_DP_SECP384R1, 24, 384, "secp384r1" }, 527817466cbSJens Wiklander #endif 528817466cbSJens Wiklander #if defined(MBEDTLS_ECP_DP_BP384R1_ENABLED) 529817466cbSJens Wiklander { MBEDTLS_ECP_DP_BP384R1, 27, 384, "brainpoolP384r1" }, 530817466cbSJens Wiklander #endif 531817466cbSJens Wiklander #if defined(MBEDTLS_ECP_DP_SECP256R1_ENABLED) 532817466cbSJens Wiklander { MBEDTLS_ECP_DP_SECP256R1, 23, 256, "secp256r1" }, 533817466cbSJens Wiklander #endif 534817466cbSJens Wiklander #if defined(MBEDTLS_ECP_DP_SECP256K1_ENABLED) 535817466cbSJens Wiklander { MBEDTLS_ECP_DP_SECP256K1, 22, 256, "secp256k1" }, 536817466cbSJens Wiklander #endif 537817466cbSJens Wiklander #if defined(MBEDTLS_ECP_DP_BP256R1_ENABLED) 538817466cbSJens Wiklander { MBEDTLS_ECP_DP_BP256R1, 26, 256, "brainpoolP256r1" }, 539817466cbSJens Wiklander #endif 540817466cbSJens Wiklander #if defined(MBEDTLS_ECP_DP_SECP224R1_ENABLED) 541817466cbSJens Wiklander { MBEDTLS_ECP_DP_SECP224R1, 21, 224, "secp224r1" }, 542817466cbSJens Wiklander #endif 543817466cbSJens Wiklander #if defined(MBEDTLS_ECP_DP_SECP224K1_ENABLED) 544817466cbSJens Wiklander { MBEDTLS_ECP_DP_SECP224K1, 20, 224, "secp224k1" }, 545817466cbSJens Wiklander #endif 546817466cbSJens Wiklander #if defined(MBEDTLS_ECP_DP_SECP192R1_ENABLED) 547817466cbSJens Wiklander { MBEDTLS_ECP_DP_SECP192R1, 19, 192, "secp192r1" }, 548817466cbSJens Wiklander #endif 549817466cbSJens Wiklander #if defined(MBEDTLS_ECP_DP_SECP192K1_ENABLED) 550817466cbSJens Wiklander { MBEDTLS_ECP_DP_SECP192K1, 18, 192, "secp192k1" }, 551817466cbSJens Wiklander #endif 552*7901324dSJerome Forissier #if defined(MBEDTLS_ECP_DP_CURVE25519_ENABLED) 55311fa71b9SJerome Forissier { MBEDTLS_ECP_DP_CURVE25519, 29, 256, "x25519" }, 55411fa71b9SJerome Forissier #endif 555*7901324dSJerome Forissier #if defined(MBEDTLS_ECP_DP_CURVE448_ENABLED) 556*7901324dSJerome Forissier { MBEDTLS_ECP_DP_CURVE448, 30, 448, "x448" }, 557*7901324dSJerome Forissier #endif 5589fc2442cSJerome Forissier #if defined(MBEDTLS_ECP_DP_SM2_ENABLED) 5599fc2442cSJerome Forissier /* https://tools.ietf.org/id/draft-yang-tls-tls13-sm-suites-05.html */ 5609fc2442cSJerome Forissier { MBEDTLS_ECP_DP_SM2, 41, 256, "sm2" }, 5619fc2442cSJerome Forissier #endif 562817466cbSJens Wiklander { MBEDTLS_ECP_DP_NONE, 0, 0, NULL }, 563817466cbSJens Wiklander }; 564817466cbSJens Wiklander 565817466cbSJens Wiklander #define ECP_NB_CURVES sizeof( ecp_supported_curves ) / \ 566817466cbSJens Wiklander sizeof( ecp_supported_curves[0] ) 567817466cbSJens Wiklander 568817466cbSJens Wiklander static mbedtls_ecp_group_id ecp_supported_grp_id[ECP_NB_CURVES]; 569817466cbSJens Wiklander 570817466cbSJens Wiklander /* 571817466cbSJens Wiklander * List of supported curves and associated info 572817466cbSJens Wiklander */ 573817466cbSJens Wiklander const mbedtls_ecp_curve_info *mbedtls_ecp_curve_list( void ) 574817466cbSJens Wiklander { 575817466cbSJens Wiklander return( ecp_supported_curves ); 576817466cbSJens Wiklander } 577817466cbSJens Wiklander 578817466cbSJens Wiklander /* 579817466cbSJens Wiklander * List of supported curves, group ID only 580817466cbSJens Wiklander */ 581817466cbSJens Wiklander const mbedtls_ecp_group_id *mbedtls_ecp_grp_id_list( void ) 582817466cbSJens Wiklander { 583817466cbSJens Wiklander static int init_done = 0; 584817466cbSJens Wiklander 585817466cbSJens Wiklander if( ! init_done ) 586817466cbSJens Wiklander { 587817466cbSJens Wiklander size_t i = 0; 588817466cbSJens Wiklander const mbedtls_ecp_curve_info *curve_info; 589817466cbSJens Wiklander 590817466cbSJens Wiklander for( curve_info = mbedtls_ecp_curve_list(); 591817466cbSJens Wiklander curve_info->grp_id != MBEDTLS_ECP_DP_NONE; 592817466cbSJens Wiklander curve_info++ ) 593817466cbSJens Wiklander { 594817466cbSJens Wiklander ecp_supported_grp_id[i++] = curve_info->grp_id; 595817466cbSJens Wiklander } 596817466cbSJens Wiklander ecp_supported_grp_id[i] = MBEDTLS_ECP_DP_NONE; 597817466cbSJens Wiklander 598817466cbSJens Wiklander init_done = 1; 599817466cbSJens Wiklander } 600817466cbSJens Wiklander 601817466cbSJens Wiklander return( ecp_supported_grp_id ); 602817466cbSJens Wiklander } 603817466cbSJens Wiklander 604817466cbSJens Wiklander /* 605817466cbSJens Wiklander * Get the curve info for the internal identifier 606817466cbSJens Wiklander */ 607817466cbSJens Wiklander const mbedtls_ecp_curve_info *mbedtls_ecp_curve_info_from_grp_id( mbedtls_ecp_group_id grp_id ) 608817466cbSJens Wiklander { 609817466cbSJens Wiklander const mbedtls_ecp_curve_info *curve_info; 610817466cbSJens Wiklander 611817466cbSJens Wiklander for( curve_info = mbedtls_ecp_curve_list(); 612817466cbSJens Wiklander curve_info->grp_id != MBEDTLS_ECP_DP_NONE; 613817466cbSJens Wiklander curve_info++ ) 614817466cbSJens Wiklander { 615817466cbSJens Wiklander if( curve_info->grp_id == grp_id ) 616817466cbSJens Wiklander return( curve_info ); 617817466cbSJens Wiklander } 618817466cbSJens Wiklander 619817466cbSJens Wiklander return( NULL ); 620817466cbSJens Wiklander } 621817466cbSJens Wiklander 622817466cbSJens Wiklander /* 623817466cbSJens Wiklander * Get the curve info from the TLS identifier 624817466cbSJens Wiklander */ 625817466cbSJens Wiklander const mbedtls_ecp_curve_info *mbedtls_ecp_curve_info_from_tls_id( uint16_t tls_id ) 626817466cbSJens Wiklander { 627817466cbSJens Wiklander const mbedtls_ecp_curve_info *curve_info; 628817466cbSJens Wiklander 629817466cbSJens Wiklander for( curve_info = mbedtls_ecp_curve_list(); 630817466cbSJens Wiklander curve_info->grp_id != MBEDTLS_ECP_DP_NONE; 631817466cbSJens Wiklander curve_info++ ) 632817466cbSJens Wiklander { 633817466cbSJens Wiklander if( curve_info->tls_id == tls_id ) 634817466cbSJens Wiklander return( curve_info ); 635817466cbSJens Wiklander } 636817466cbSJens Wiklander 637817466cbSJens Wiklander return( NULL ); 638817466cbSJens Wiklander } 639817466cbSJens Wiklander 640817466cbSJens Wiklander /* 641817466cbSJens Wiklander * Get the curve info from the name 642817466cbSJens Wiklander */ 643817466cbSJens Wiklander const mbedtls_ecp_curve_info *mbedtls_ecp_curve_info_from_name( const char *name ) 644817466cbSJens Wiklander { 645817466cbSJens Wiklander const mbedtls_ecp_curve_info *curve_info; 646817466cbSJens Wiklander 6473d3b0591SJens Wiklander if( name == NULL ) 6483d3b0591SJens Wiklander return( NULL ); 6493d3b0591SJens Wiklander 650817466cbSJens Wiklander for( curve_info = mbedtls_ecp_curve_list(); 651817466cbSJens Wiklander curve_info->grp_id != MBEDTLS_ECP_DP_NONE; 652817466cbSJens Wiklander curve_info++ ) 653817466cbSJens Wiklander { 654817466cbSJens Wiklander if( strcmp( curve_info->name, name ) == 0 ) 655817466cbSJens Wiklander return( curve_info ); 656817466cbSJens Wiklander } 657817466cbSJens Wiklander 658817466cbSJens Wiklander return( NULL ); 659817466cbSJens Wiklander } 660817466cbSJens Wiklander 661817466cbSJens Wiklander /* 662817466cbSJens Wiklander * Get the type of a curve 663817466cbSJens Wiklander */ 66411fa71b9SJerome Forissier mbedtls_ecp_curve_type mbedtls_ecp_get_type( const mbedtls_ecp_group *grp ) 665817466cbSJens Wiklander { 666817466cbSJens Wiklander if( grp->G.X.p == NULL ) 66711fa71b9SJerome Forissier return( MBEDTLS_ECP_TYPE_NONE ); 668817466cbSJens Wiklander 669817466cbSJens Wiklander if( grp->G.Y.p == NULL ) 67011fa71b9SJerome Forissier return( MBEDTLS_ECP_TYPE_MONTGOMERY ); 671817466cbSJens Wiklander else 67211fa71b9SJerome Forissier return( MBEDTLS_ECP_TYPE_SHORT_WEIERSTRASS ); 673817466cbSJens Wiklander } 674817466cbSJens Wiklander 675817466cbSJens Wiklander /* 676817466cbSJens Wiklander * Initialize (the components of) a point 677817466cbSJens Wiklander */ 678817466cbSJens Wiklander void mbedtls_ecp_point_init( mbedtls_ecp_point *pt ) 679817466cbSJens Wiklander { 6803d3b0591SJens Wiklander ECP_VALIDATE( pt != NULL ); 681817466cbSJens Wiklander 682817466cbSJens Wiklander mbedtls_mpi_init( &pt->X ); 683817466cbSJens Wiklander mbedtls_mpi_init( &pt->Y ); 684817466cbSJens Wiklander mbedtls_mpi_init( &pt->Z ); 685817466cbSJens Wiklander } 686817466cbSJens Wiklander 687817466cbSJens Wiklander /* 688817466cbSJens Wiklander * Initialize (the components of) a group 689817466cbSJens Wiklander */ 690817466cbSJens Wiklander void mbedtls_ecp_group_init( mbedtls_ecp_group *grp ) 691817466cbSJens Wiklander { 6923d3b0591SJens Wiklander ECP_VALIDATE( grp != NULL ); 693817466cbSJens Wiklander 6943d3b0591SJens Wiklander grp->id = MBEDTLS_ECP_DP_NONE; 6953d3b0591SJens Wiklander mbedtls_mpi_init( &grp->P ); 6963d3b0591SJens Wiklander mbedtls_mpi_init( &grp->A ); 6973d3b0591SJens Wiklander mbedtls_mpi_init( &grp->B ); 6983d3b0591SJens Wiklander mbedtls_ecp_point_init( &grp->G ); 6993d3b0591SJens Wiklander mbedtls_mpi_init( &grp->N ); 7003d3b0591SJens Wiklander grp->pbits = 0; 7013d3b0591SJens Wiklander grp->nbits = 0; 7023d3b0591SJens Wiklander grp->h = 0; 7033d3b0591SJens Wiklander grp->modp = NULL; 7043d3b0591SJens Wiklander grp->t_pre = NULL; 7053d3b0591SJens Wiklander grp->t_post = NULL; 7063d3b0591SJens Wiklander grp->t_data = NULL; 7073d3b0591SJens Wiklander grp->T = NULL; 7083d3b0591SJens Wiklander grp->T_size = 0; 709817466cbSJens Wiklander } 710817466cbSJens Wiklander 711817466cbSJens Wiklander /* 712817466cbSJens Wiklander * Initialize (the components of) a key pair 713817466cbSJens Wiklander */ 714817466cbSJens Wiklander void mbedtls_ecp_keypair_init( mbedtls_ecp_keypair *key ) 715817466cbSJens Wiklander { 7163d3b0591SJens Wiklander ECP_VALIDATE( key != NULL ); 717817466cbSJens Wiklander 718817466cbSJens Wiklander mbedtls_ecp_group_init( &key->grp ); 719817466cbSJens Wiklander mbedtls_mpi_init( &key->d ); 720817466cbSJens Wiklander mbedtls_ecp_point_init( &key->Q ); 721817466cbSJens Wiklander } 722817466cbSJens Wiklander 723817466cbSJens Wiklander /* 724817466cbSJens Wiklander * Unallocate (the components of) a point 725817466cbSJens Wiklander */ 726817466cbSJens Wiklander void mbedtls_ecp_point_free( mbedtls_ecp_point *pt ) 727817466cbSJens Wiklander { 728817466cbSJens Wiklander if( pt == NULL ) 729817466cbSJens Wiklander return; 730817466cbSJens Wiklander 731817466cbSJens Wiklander mbedtls_mpi_free( &( pt->X ) ); 732817466cbSJens Wiklander mbedtls_mpi_free( &( pt->Y ) ); 733817466cbSJens Wiklander mbedtls_mpi_free( &( pt->Z ) ); 734817466cbSJens Wiklander } 735817466cbSJens Wiklander 736817466cbSJens Wiklander /* 737817466cbSJens Wiklander * Unallocate (the components of) a group 738817466cbSJens Wiklander */ 739817466cbSJens Wiklander void mbedtls_ecp_group_free( mbedtls_ecp_group *grp ) 740817466cbSJens Wiklander { 741817466cbSJens Wiklander size_t i; 742817466cbSJens Wiklander 743817466cbSJens Wiklander if( grp == NULL ) 744817466cbSJens Wiklander return; 745817466cbSJens Wiklander 746817466cbSJens Wiklander if( grp->h != 1 ) 747817466cbSJens Wiklander { 748817466cbSJens Wiklander mbedtls_mpi_free( &grp->P ); 749817466cbSJens Wiklander mbedtls_mpi_free( &grp->A ); 750817466cbSJens Wiklander mbedtls_mpi_free( &grp->B ); 751817466cbSJens Wiklander mbedtls_ecp_point_free( &grp->G ); 752817466cbSJens Wiklander mbedtls_mpi_free( &grp->N ); 753817466cbSJens Wiklander } 754817466cbSJens Wiklander 755817466cbSJens Wiklander if( grp->T != NULL ) 756817466cbSJens Wiklander { 757817466cbSJens Wiklander for( i = 0; i < grp->T_size; i++ ) 758817466cbSJens Wiklander mbedtls_ecp_point_free( &grp->T[i] ); 759817466cbSJens Wiklander mbedtls_free( grp->T ); 760817466cbSJens Wiklander } 761817466cbSJens Wiklander 7623d3b0591SJens Wiklander mbedtls_platform_zeroize( grp, sizeof( mbedtls_ecp_group ) ); 763817466cbSJens Wiklander } 764817466cbSJens Wiklander 765817466cbSJens Wiklander /* 766817466cbSJens Wiklander * Unallocate (the components of) a key pair 767817466cbSJens Wiklander */ 768817466cbSJens Wiklander void mbedtls_ecp_keypair_free( mbedtls_ecp_keypair *key ) 769817466cbSJens Wiklander { 770817466cbSJens Wiklander if( key == NULL ) 771817466cbSJens Wiklander return; 772817466cbSJens Wiklander 773817466cbSJens Wiklander mbedtls_ecp_group_free( &key->grp ); 774817466cbSJens Wiklander mbedtls_mpi_free( &key->d ); 775817466cbSJens Wiklander mbedtls_ecp_point_free( &key->Q ); 776817466cbSJens Wiklander } 777817466cbSJens Wiklander 778817466cbSJens Wiklander /* 779817466cbSJens Wiklander * Copy the contents of a point 780817466cbSJens Wiklander */ 781817466cbSJens Wiklander int mbedtls_ecp_copy( mbedtls_ecp_point *P, const mbedtls_ecp_point *Q ) 782817466cbSJens Wiklander { 78311fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 7843d3b0591SJens Wiklander ECP_VALIDATE_RET( P != NULL ); 7853d3b0591SJens Wiklander ECP_VALIDATE_RET( Q != NULL ); 786817466cbSJens Wiklander 787817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_copy( &P->X, &Q->X ) ); 788817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_copy( &P->Y, &Q->Y ) ); 789817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_copy( &P->Z, &Q->Z ) ); 790817466cbSJens Wiklander 791817466cbSJens Wiklander cleanup: 792817466cbSJens Wiklander return( ret ); 793817466cbSJens Wiklander } 794817466cbSJens Wiklander 795817466cbSJens Wiklander /* 796817466cbSJens Wiklander * Copy the contents of a group object 797817466cbSJens Wiklander */ 798817466cbSJens Wiklander int mbedtls_ecp_group_copy( mbedtls_ecp_group *dst, const mbedtls_ecp_group *src ) 799817466cbSJens Wiklander { 8003d3b0591SJens Wiklander ECP_VALIDATE_RET( dst != NULL ); 8013d3b0591SJens Wiklander ECP_VALIDATE_RET( src != NULL ); 8023d3b0591SJens Wiklander 8033d3b0591SJens Wiklander return( mbedtls_ecp_group_load( dst, src->id ) ); 804817466cbSJens Wiklander } 805817466cbSJens Wiklander 806817466cbSJens Wiklander /* 807817466cbSJens Wiklander * Set point to zero 808817466cbSJens Wiklander */ 809817466cbSJens Wiklander int mbedtls_ecp_set_zero( mbedtls_ecp_point *pt ) 810817466cbSJens Wiklander { 81111fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 8123d3b0591SJens Wiklander ECP_VALIDATE_RET( pt != NULL ); 813817466cbSJens Wiklander 814817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_lset( &pt->X , 1 ) ); 815817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_lset( &pt->Y , 1 ) ); 816817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_lset( &pt->Z , 0 ) ); 817817466cbSJens Wiklander 818817466cbSJens Wiklander cleanup: 819817466cbSJens Wiklander return( ret ); 820817466cbSJens Wiklander } 821817466cbSJens Wiklander 822817466cbSJens Wiklander /* 823817466cbSJens Wiklander * Tell if a point is zero 824817466cbSJens Wiklander */ 825817466cbSJens Wiklander int mbedtls_ecp_is_zero( mbedtls_ecp_point *pt ) 826817466cbSJens Wiklander { 8273d3b0591SJens Wiklander ECP_VALIDATE_RET( pt != NULL ); 8283d3b0591SJens Wiklander 829817466cbSJens Wiklander return( mbedtls_mpi_cmp_int( &pt->Z, 0 ) == 0 ); 830817466cbSJens Wiklander } 831817466cbSJens Wiklander 832817466cbSJens Wiklander /* 8333d3b0591SJens Wiklander * Compare two points lazily 834817466cbSJens Wiklander */ 835817466cbSJens Wiklander int mbedtls_ecp_point_cmp( const mbedtls_ecp_point *P, 836817466cbSJens Wiklander const mbedtls_ecp_point *Q ) 837817466cbSJens Wiklander { 8383d3b0591SJens Wiklander ECP_VALIDATE_RET( P != NULL ); 8393d3b0591SJens Wiklander ECP_VALIDATE_RET( Q != NULL ); 8403d3b0591SJens Wiklander 841817466cbSJens Wiklander if( mbedtls_mpi_cmp_mpi( &P->X, &Q->X ) == 0 && 842817466cbSJens Wiklander mbedtls_mpi_cmp_mpi( &P->Y, &Q->Y ) == 0 && 843817466cbSJens Wiklander mbedtls_mpi_cmp_mpi( &P->Z, &Q->Z ) == 0 ) 844817466cbSJens Wiklander { 845817466cbSJens Wiklander return( 0 ); 846817466cbSJens Wiklander } 847817466cbSJens Wiklander 848817466cbSJens Wiklander return( MBEDTLS_ERR_ECP_BAD_INPUT_DATA ); 849817466cbSJens Wiklander } 850817466cbSJens Wiklander 851817466cbSJens Wiklander /* 852817466cbSJens Wiklander * Import a non-zero point from ASCII strings 853817466cbSJens Wiklander */ 854817466cbSJens Wiklander int mbedtls_ecp_point_read_string( mbedtls_ecp_point *P, int radix, 855817466cbSJens Wiklander const char *x, const char *y ) 856817466cbSJens Wiklander { 85711fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 8583d3b0591SJens Wiklander ECP_VALIDATE_RET( P != NULL ); 8593d3b0591SJens Wiklander ECP_VALIDATE_RET( x != NULL ); 8603d3b0591SJens Wiklander ECP_VALIDATE_RET( y != NULL ); 861817466cbSJens Wiklander 862817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_read_string( &P->X, radix, x ) ); 863817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_read_string( &P->Y, radix, y ) ); 864817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_lset( &P->Z, 1 ) ); 865817466cbSJens Wiklander 866817466cbSJens Wiklander cleanup: 867817466cbSJens Wiklander return( ret ); 868817466cbSJens Wiklander } 869817466cbSJens Wiklander 870817466cbSJens Wiklander /* 87111fa71b9SJerome Forissier * Export a point into unsigned binary data (SEC1 2.3.3 and RFC7748) 872817466cbSJens Wiklander */ 8733d3b0591SJens Wiklander int mbedtls_ecp_point_write_binary( const mbedtls_ecp_group *grp, 8743d3b0591SJens Wiklander const mbedtls_ecp_point *P, 875817466cbSJens Wiklander int format, size_t *olen, 876817466cbSJens Wiklander unsigned char *buf, size_t buflen ) 877817466cbSJens Wiklander { 87811fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ECP_FEATURE_UNAVAILABLE; 879817466cbSJens Wiklander size_t plen; 8803d3b0591SJens Wiklander ECP_VALIDATE_RET( grp != NULL ); 8813d3b0591SJens Wiklander ECP_VALIDATE_RET( P != NULL ); 8823d3b0591SJens Wiklander ECP_VALIDATE_RET( olen != NULL ); 8833d3b0591SJens Wiklander ECP_VALIDATE_RET( buf != NULL ); 8843d3b0591SJens Wiklander ECP_VALIDATE_RET( format == MBEDTLS_ECP_PF_UNCOMPRESSED || 8853d3b0591SJens Wiklander format == MBEDTLS_ECP_PF_COMPRESSED ); 886817466cbSJens Wiklander 88711fa71b9SJerome Forissier plen = mbedtls_mpi_size( &grp->P ); 88811fa71b9SJerome Forissier 889*7901324dSJerome Forissier #if defined(MBEDTLS_ECP_MONTGOMERY_ENABLED) 890*7901324dSJerome Forissier (void) format; /* Montgomery curves always use the same point format */ 89111fa71b9SJerome Forissier if( mbedtls_ecp_get_type( grp ) == MBEDTLS_ECP_TYPE_MONTGOMERY ) 89211fa71b9SJerome Forissier { 89311fa71b9SJerome Forissier *olen = plen; 89411fa71b9SJerome Forissier if( buflen < *olen ) 89511fa71b9SJerome Forissier return( MBEDTLS_ERR_ECP_BUFFER_TOO_SMALL ); 89611fa71b9SJerome Forissier 89711fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_write_binary_le( &P->X, buf, plen ) ); 89811fa71b9SJerome Forissier } 89911fa71b9SJerome Forissier #endif 900*7901324dSJerome Forissier #if defined(MBEDTLS_ECP_SHORT_WEIERSTRASS_ENABLED) 90111fa71b9SJerome Forissier if( mbedtls_ecp_get_type( grp ) == MBEDTLS_ECP_TYPE_SHORT_WEIERSTRASS ) 90211fa71b9SJerome Forissier { 903817466cbSJens Wiklander /* 904817466cbSJens Wiklander * Common case: P == 0 905817466cbSJens Wiklander */ 906817466cbSJens Wiklander if( mbedtls_mpi_cmp_int( &P->Z, 0 ) == 0 ) 907817466cbSJens Wiklander { 908817466cbSJens Wiklander if( buflen < 1 ) 909817466cbSJens Wiklander return( MBEDTLS_ERR_ECP_BUFFER_TOO_SMALL ); 910817466cbSJens Wiklander 911817466cbSJens Wiklander buf[0] = 0x00; 912817466cbSJens Wiklander *olen = 1; 913817466cbSJens Wiklander 914817466cbSJens Wiklander return( 0 ); 915817466cbSJens Wiklander } 916817466cbSJens Wiklander 917817466cbSJens Wiklander if( format == MBEDTLS_ECP_PF_UNCOMPRESSED ) 918817466cbSJens Wiklander { 919817466cbSJens Wiklander *olen = 2 * plen + 1; 920817466cbSJens Wiklander 921817466cbSJens Wiklander if( buflen < *olen ) 922817466cbSJens Wiklander return( MBEDTLS_ERR_ECP_BUFFER_TOO_SMALL ); 923817466cbSJens Wiklander 924817466cbSJens Wiklander buf[0] = 0x04; 925817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_write_binary( &P->X, buf + 1, plen ) ); 926817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_write_binary( &P->Y, buf + 1 + plen, plen ) ); 927817466cbSJens Wiklander } 928817466cbSJens Wiklander else if( format == MBEDTLS_ECP_PF_COMPRESSED ) 929817466cbSJens Wiklander { 930817466cbSJens Wiklander *olen = plen + 1; 931817466cbSJens Wiklander 932817466cbSJens Wiklander if( buflen < *olen ) 933817466cbSJens Wiklander return( MBEDTLS_ERR_ECP_BUFFER_TOO_SMALL ); 934817466cbSJens Wiklander 935817466cbSJens Wiklander buf[0] = 0x02 + mbedtls_mpi_get_bit( &P->Y, 0 ); 936817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_write_binary( &P->X, buf + 1, plen ) ); 937817466cbSJens Wiklander } 93811fa71b9SJerome Forissier } 93911fa71b9SJerome Forissier #endif 940817466cbSJens Wiklander 941817466cbSJens Wiklander cleanup: 942817466cbSJens Wiklander return( ret ); 943817466cbSJens Wiklander } 944817466cbSJens Wiklander 945817466cbSJens Wiklander /* 94611fa71b9SJerome Forissier * Import a point from unsigned binary data (SEC1 2.3.4 and RFC7748) 947817466cbSJens Wiklander */ 9483d3b0591SJens Wiklander int mbedtls_ecp_point_read_binary( const mbedtls_ecp_group *grp, 9493d3b0591SJens Wiklander mbedtls_ecp_point *pt, 950817466cbSJens Wiklander const unsigned char *buf, size_t ilen ) 951817466cbSJens Wiklander { 95211fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ECP_FEATURE_UNAVAILABLE; 953817466cbSJens Wiklander size_t plen; 9543d3b0591SJens Wiklander ECP_VALIDATE_RET( grp != NULL ); 9553d3b0591SJens Wiklander ECP_VALIDATE_RET( pt != NULL ); 9563d3b0591SJens Wiklander ECP_VALIDATE_RET( buf != NULL ); 957817466cbSJens Wiklander 958817466cbSJens Wiklander if( ilen < 1 ) 959817466cbSJens Wiklander return( MBEDTLS_ERR_ECP_BAD_INPUT_DATA ); 960817466cbSJens Wiklander 96111fa71b9SJerome Forissier plen = mbedtls_mpi_size( &grp->P ); 96211fa71b9SJerome Forissier 963*7901324dSJerome Forissier #if defined(MBEDTLS_ECP_MONTGOMERY_ENABLED) 96411fa71b9SJerome Forissier if( mbedtls_ecp_get_type( grp ) == MBEDTLS_ECP_TYPE_MONTGOMERY ) 96511fa71b9SJerome Forissier { 96611fa71b9SJerome Forissier if( plen != ilen ) 96711fa71b9SJerome Forissier return( MBEDTLS_ERR_ECP_BAD_INPUT_DATA ); 96811fa71b9SJerome Forissier 96911fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_read_binary_le( &pt->X, buf, plen ) ); 97011fa71b9SJerome Forissier mbedtls_mpi_free( &pt->Y ); 97111fa71b9SJerome Forissier 97211fa71b9SJerome Forissier if( grp->id == MBEDTLS_ECP_DP_CURVE25519 ) 97311fa71b9SJerome Forissier /* Set most significant bit to 0 as prescribed in RFC7748 §5 */ 97411fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_set_bit( &pt->X, plen * 8 - 1, 0 ) ); 97511fa71b9SJerome Forissier 97611fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_lset( &pt->Z, 1 ) ); 97711fa71b9SJerome Forissier } 97811fa71b9SJerome Forissier #endif 979*7901324dSJerome Forissier #if defined(MBEDTLS_ECP_SHORT_WEIERSTRASS_ENABLED) 98011fa71b9SJerome Forissier if( mbedtls_ecp_get_type( grp ) == MBEDTLS_ECP_TYPE_SHORT_WEIERSTRASS ) 98111fa71b9SJerome Forissier { 982817466cbSJens Wiklander if( buf[0] == 0x00 ) 983817466cbSJens Wiklander { 984817466cbSJens Wiklander if( ilen == 1 ) 985817466cbSJens Wiklander return( mbedtls_ecp_set_zero( pt ) ); 986817466cbSJens Wiklander else 987817466cbSJens Wiklander return( MBEDTLS_ERR_ECP_BAD_INPUT_DATA ); 988817466cbSJens Wiklander } 989817466cbSJens Wiklander 990817466cbSJens Wiklander if( buf[0] != 0x04 ) 991817466cbSJens Wiklander return( MBEDTLS_ERR_ECP_FEATURE_UNAVAILABLE ); 992817466cbSJens Wiklander 993817466cbSJens Wiklander if( ilen != 2 * plen + 1 ) 994817466cbSJens Wiklander return( MBEDTLS_ERR_ECP_BAD_INPUT_DATA ); 995817466cbSJens Wiklander 996817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_read_binary( &pt->X, buf + 1, plen ) ); 99711fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_read_binary( &pt->Y, 99811fa71b9SJerome Forissier buf + 1 + plen, plen ) ); 999817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_lset( &pt->Z, 1 ) ); 100011fa71b9SJerome Forissier } 100111fa71b9SJerome Forissier #endif 1002817466cbSJens Wiklander 1003817466cbSJens Wiklander cleanup: 1004817466cbSJens Wiklander return( ret ); 1005817466cbSJens Wiklander } 1006817466cbSJens Wiklander 1007817466cbSJens Wiklander /* 1008817466cbSJens Wiklander * Import a point from a TLS ECPoint record (RFC 4492) 1009817466cbSJens Wiklander * struct { 1010817466cbSJens Wiklander * opaque point <1..2^8-1>; 1011817466cbSJens Wiklander * } ECPoint; 1012817466cbSJens Wiklander */ 10133d3b0591SJens Wiklander int mbedtls_ecp_tls_read_point( const mbedtls_ecp_group *grp, 10143d3b0591SJens Wiklander mbedtls_ecp_point *pt, 1015817466cbSJens Wiklander const unsigned char **buf, size_t buf_len ) 1016817466cbSJens Wiklander { 1017817466cbSJens Wiklander unsigned char data_len; 1018817466cbSJens Wiklander const unsigned char *buf_start; 10193d3b0591SJens Wiklander ECP_VALIDATE_RET( grp != NULL ); 10203d3b0591SJens Wiklander ECP_VALIDATE_RET( pt != NULL ); 10213d3b0591SJens Wiklander ECP_VALIDATE_RET( buf != NULL ); 10223d3b0591SJens Wiklander ECP_VALIDATE_RET( *buf != NULL ); 1023817466cbSJens Wiklander 1024817466cbSJens Wiklander /* 1025817466cbSJens Wiklander * We must have at least two bytes (1 for length, at least one for data) 1026817466cbSJens Wiklander */ 1027817466cbSJens Wiklander if( buf_len < 2 ) 1028817466cbSJens Wiklander return( MBEDTLS_ERR_ECP_BAD_INPUT_DATA ); 1029817466cbSJens Wiklander 1030817466cbSJens Wiklander data_len = *(*buf)++; 1031817466cbSJens Wiklander if( data_len < 1 || data_len > buf_len - 1 ) 1032817466cbSJens Wiklander return( MBEDTLS_ERR_ECP_BAD_INPUT_DATA ); 1033817466cbSJens Wiklander 1034817466cbSJens Wiklander /* 1035817466cbSJens Wiklander * Save buffer start for read_binary and update buf 1036817466cbSJens Wiklander */ 1037817466cbSJens Wiklander buf_start = *buf; 1038817466cbSJens Wiklander *buf += data_len; 1039817466cbSJens Wiklander 10403d3b0591SJens Wiklander return( mbedtls_ecp_point_read_binary( grp, pt, buf_start, data_len ) ); 1041817466cbSJens Wiklander } 1042817466cbSJens Wiklander 1043817466cbSJens Wiklander /* 1044817466cbSJens Wiklander * Export a point as a TLS ECPoint record (RFC 4492) 1045817466cbSJens Wiklander * struct { 1046817466cbSJens Wiklander * opaque point <1..2^8-1>; 1047817466cbSJens Wiklander * } ECPoint; 1048817466cbSJens Wiklander */ 1049817466cbSJens Wiklander int mbedtls_ecp_tls_write_point( const mbedtls_ecp_group *grp, const mbedtls_ecp_point *pt, 1050817466cbSJens Wiklander int format, size_t *olen, 1051817466cbSJens Wiklander unsigned char *buf, size_t blen ) 1052817466cbSJens Wiklander { 105311fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 10543d3b0591SJens Wiklander ECP_VALIDATE_RET( grp != NULL ); 10553d3b0591SJens Wiklander ECP_VALIDATE_RET( pt != NULL ); 10563d3b0591SJens Wiklander ECP_VALIDATE_RET( olen != NULL ); 10573d3b0591SJens Wiklander ECP_VALIDATE_RET( buf != NULL ); 10583d3b0591SJens Wiklander ECP_VALIDATE_RET( format == MBEDTLS_ECP_PF_UNCOMPRESSED || 10593d3b0591SJens Wiklander format == MBEDTLS_ECP_PF_COMPRESSED ); 1060817466cbSJens Wiklander 1061817466cbSJens Wiklander /* 1062817466cbSJens Wiklander * buffer length must be at least one, for our length byte 1063817466cbSJens Wiklander */ 1064817466cbSJens Wiklander if( blen < 1 ) 1065817466cbSJens Wiklander return( MBEDTLS_ERR_ECP_BAD_INPUT_DATA ); 1066817466cbSJens Wiklander 1067817466cbSJens Wiklander if( ( ret = mbedtls_ecp_point_write_binary( grp, pt, format, 1068817466cbSJens Wiklander olen, buf + 1, blen - 1) ) != 0 ) 1069817466cbSJens Wiklander return( ret ); 1070817466cbSJens Wiklander 1071817466cbSJens Wiklander /* 1072817466cbSJens Wiklander * write length to the first byte and update total length 1073817466cbSJens Wiklander */ 1074817466cbSJens Wiklander buf[0] = (unsigned char) *olen; 1075817466cbSJens Wiklander ++*olen; 1076817466cbSJens Wiklander 1077817466cbSJens Wiklander return( 0 ); 1078817466cbSJens Wiklander } 1079817466cbSJens Wiklander 1080817466cbSJens Wiklander /* 1081817466cbSJens Wiklander * Set a group from an ECParameters record (RFC 4492) 1082817466cbSJens Wiklander */ 10833d3b0591SJens Wiklander int mbedtls_ecp_tls_read_group( mbedtls_ecp_group *grp, 10843d3b0591SJens Wiklander const unsigned char **buf, size_t len ) 10853d3b0591SJens Wiklander { 108611fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 10873d3b0591SJens Wiklander mbedtls_ecp_group_id grp_id; 10883d3b0591SJens Wiklander ECP_VALIDATE_RET( grp != NULL ); 10893d3b0591SJens Wiklander ECP_VALIDATE_RET( buf != NULL ); 10903d3b0591SJens Wiklander ECP_VALIDATE_RET( *buf != NULL ); 10913d3b0591SJens Wiklander 10923d3b0591SJens Wiklander if( ( ret = mbedtls_ecp_tls_read_group_id( &grp_id, buf, len ) ) != 0 ) 10933d3b0591SJens Wiklander return( ret ); 10943d3b0591SJens Wiklander 10953d3b0591SJens Wiklander return( mbedtls_ecp_group_load( grp, grp_id ) ); 10963d3b0591SJens Wiklander } 10973d3b0591SJens Wiklander 10983d3b0591SJens Wiklander /* 10993d3b0591SJens Wiklander * Read a group id from an ECParameters record (RFC 4492) and convert it to 11003d3b0591SJens Wiklander * mbedtls_ecp_group_id. 11013d3b0591SJens Wiklander */ 11023d3b0591SJens Wiklander int mbedtls_ecp_tls_read_group_id( mbedtls_ecp_group_id *grp, 11033d3b0591SJens Wiklander const unsigned char **buf, size_t len ) 1104817466cbSJens Wiklander { 1105817466cbSJens Wiklander uint16_t tls_id; 1106817466cbSJens Wiklander const mbedtls_ecp_curve_info *curve_info; 11073d3b0591SJens Wiklander ECP_VALIDATE_RET( grp != NULL ); 11083d3b0591SJens Wiklander ECP_VALIDATE_RET( buf != NULL ); 11093d3b0591SJens Wiklander ECP_VALIDATE_RET( *buf != NULL ); 1110817466cbSJens Wiklander 1111817466cbSJens Wiklander /* 1112817466cbSJens Wiklander * We expect at least three bytes (see below) 1113817466cbSJens Wiklander */ 1114817466cbSJens Wiklander if( len < 3 ) 1115817466cbSJens Wiklander return( MBEDTLS_ERR_ECP_BAD_INPUT_DATA ); 1116817466cbSJens Wiklander 1117817466cbSJens Wiklander /* 1118817466cbSJens Wiklander * First byte is curve_type; only named_curve is handled 1119817466cbSJens Wiklander */ 1120817466cbSJens Wiklander if( *(*buf)++ != MBEDTLS_ECP_TLS_NAMED_CURVE ) 1121817466cbSJens Wiklander return( MBEDTLS_ERR_ECP_BAD_INPUT_DATA ); 1122817466cbSJens Wiklander 1123817466cbSJens Wiklander /* 1124817466cbSJens Wiklander * Next two bytes are the namedcurve value 1125817466cbSJens Wiklander */ 1126817466cbSJens Wiklander tls_id = *(*buf)++; 1127817466cbSJens Wiklander tls_id <<= 8; 1128817466cbSJens Wiklander tls_id |= *(*buf)++; 1129817466cbSJens Wiklander 1130817466cbSJens Wiklander if( ( curve_info = mbedtls_ecp_curve_info_from_tls_id( tls_id ) ) == NULL ) 1131817466cbSJens Wiklander return( MBEDTLS_ERR_ECP_FEATURE_UNAVAILABLE ); 1132817466cbSJens Wiklander 11333d3b0591SJens Wiklander *grp = curve_info->grp_id; 11343d3b0591SJens Wiklander 11353d3b0591SJens Wiklander return( 0 ); 1136817466cbSJens Wiklander } 1137817466cbSJens Wiklander 1138817466cbSJens Wiklander /* 1139817466cbSJens Wiklander * Write the ECParameters record corresponding to a group (RFC 4492) 1140817466cbSJens Wiklander */ 1141817466cbSJens Wiklander int mbedtls_ecp_tls_write_group( const mbedtls_ecp_group *grp, size_t *olen, 1142817466cbSJens Wiklander unsigned char *buf, size_t blen ) 1143817466cbSJens Wiklander { 1144817466cbSJens Wiklander const mbedtls_ecp_curve_info *curve_info; 11453d3b0591SJens Wiklander ECP_VALIDATE_RET( grp != NULL ); 11463d3b0591SJens Wiklander ECP_VALIDATE_RET( buf != NULL ); 11473d3b0591SJens Wiklander ECP_VALIDATE_RET( olen != NULL ); 1148817466cbSJens Wiklander 1149817466cbSJens Wiklander if( ( curve_info = mbedtls_ecp_curve_info_from_grp_id( grp->id ) ) == NULL ) 1150817466cbSJens Wiklander return( MBEDTLS_ERR_ECP_BAD_INPUT_DATA ); 1151817466cbSJens Wiklander 1152817466cbSJens Wiklander /* 1153817466cbSJens Wiklander * We are going to write 3 bytes (see below) 1154817466cbSJens Wiklander */ 1155817466cbSJens Wiklander *olen = 3; 1156817466cbSJens Wiklander if( blen < *olen ) 1157817466cbSJens Wiklander return( MBEDTLS_ERR_ECP_BUFFER_TOO_SMALL ); 1158817466cbSJens Wiklander 1159817466cbSJens Wiklander /* 1160817466cbSJens Wiklander * First byte is curve_type, always named_curve 1161817466cbSJens Wiklander */ 1162817466cbSJens Wiklander *buf++ = MBEDTLS_ECP_TLS_NAMED_CURVE; 1163817466cbSJens Wiklander 1164817466cbSJens Wiklander /* 1165817466cbSJens Wiklander * Next two bytes are the namedcurve value 1166817466cbSJens Wiklander */ 1167817466cbSJens Wiklander buf[0] = curve_info->tls_id >> 8; 1168817466cbSJens Wiklander buf[1] = curve_info->tls_id & 0xFF; 1169817466cbSJens Wiklander 1170817466cbSJens Wiklander return( 0 ); 1171817466cbSJens Wiklander } 1172817466cbSJens Wiklander 1173817466cbSJens Wiklander /* 1174817466cbSJens Wiklander * Wrapper around fast quasi-modp functions, with fall-back to mbedtls_mpi_mod_mpi. 1175817466cbSJens Wiklander * See the documentation of struct mbedtls_ecp_group. 1176817466cbSJens Wiklander * 1177817466cbSJens Wiklander * This function is in the critial loop for mbedtls_ecp_mul, so pay attention to perf. 1178817466cbSJens Wiklander */ 1179817466cbSJens Wiklander static int ecp_modp( mbedtls_mpi *N, const mbedtls_ecp_group *grp ) 1180817466cbSJens Wiklander { 118111fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 1182817466cbSJens Wiklander 1183817466cbSJens Wiklander if( grp->modp == NULL ) 1184817466cbSJens Wiklander return( mbedtls_mpi_mod_mpi( N, N, &grp->P ) ); 1185817466cbSJens Wiklander 1186817466cbSJens Wiklander /* N->s < 0 is a much faster test, which fails only if N is 0 */ 1187817466cbSJens Wiklander if( ( N->s < 0 && mbedtls_mpi_cmp_int( N, 0 ) != 0 ) || 1188817466cbSJens Wiklander mbedtls_mpi_bitlen( N ) > 2 * grp->pbits ) 1189817466cbSJens Wiklander { 1190817466cbSJens Wiklander return( MBEDTLS_ERR_ECP_BAD_INPUT_DATA ); 1191817466cbSJens Wiklander } 1192817466cbSJens Wiklander 1193817466cbSJens Wiklander MBEDTLS_MPI_CHK( grp->modp( N ) ); 1194817466cbSJens Wiklander 1195817466cbSJens Wiklander /* N->s < 0 is a much faster test, which fails only if N is 0 */ 1196817466cbSJens Wiklander while( N->s < 0 && mbedtls_mpi_cmp_int( N, 0 ) != 0 ) 1197817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_add_mpi( N, N, &grp->P ) ); 1198817466cbSJens Wiklander 1199817466cbSJens Wiklander while( mbedtls_mpi_cmp_mpi( N, &grp->P ) >= 0 ) 1200817466cbSJens Wiklander /* we known P, N and the result are positive */ 1201817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_sub_abs( N, N, &grp->P ) ); 1202817466cbSJens Wiklander 1203817466cbSJens Wiklander cleanup: 1204817466cbSJens Wiklander return( ret ); 1205817466cbSJens Wiklander } 1206817466cbSJens Wiklander 1207817466cbSJens Wiklander /* 1208817466cbSJens Wiklander * Fast mod-p functions expect their argument to be in the 0..p^2 range. 1209817466cbSJens Wiklander * 1210817466cbSJens Wiklander * In order to guarantee that, we need to ensure that operands of 1211817466cbSJens Wiklander * mbedtls_mpi_mul_mpi are in the 0..p range. So, after each operation we will 1212817466cbSJens Wiklander * bring the result back to this range. 1213817466cbSJens Wiklander * 1214817466cbSJens Wiklander * The following macros are shortcuts for doing that. 1215817466cbSJens Wiklander */ 1216817466cbSJens Wiklander 1217817466cbSJens Wiklander /* 1218817466cbSJens Wiklander * Reduce a mbedtls_mpi mod p in-place, general case, to use after mbedtls_mpi_mul_mpi 1219817466cbSJens Wiklander */ 1220817466cbSJens Wiklander #if defined(MBEDTLS_SELF_TEST) 1221817466cbSJens Wiklander #define INC_MUL_COUNT mul_count++; 1222817466cbSJens Wiklander #else 1223817466cbSJens Wiklander #define INC_MUL_COUNT 1224817466cbSJens Wiklander #endif 1225817466cbSJens Wiklander 12265b25c76aSJerome Forissier #define MOD_MUL( N ) \ 12275b25c76aSJerome Forissier do \ 12285b25c76aSJerome Forissier { \ 12295b25c76aSJerome Forissier MBEDTLS_MPI_CHK( ecp_modp( &(N), grp ) ); \ 12305b25c76aSJerome Forissier INC_MUL_COUNT \ 12315b25c76aSJerome Forissier } while( 0 ) 1232817466cbSJens Wiklander 123311fa71b9SJerome Forissier static inline int mbedtls_mpi_mul_mod( const mbedtls_ecp_group *grp, 123411fa71b9SJerome Forissier mbedtls_mpi *X, 123511fa71b9SJerome Forissier const mbedtls_mpi *A, 123611fa71b9SJerome Forissier const mbedtls_mpi *B ) 123711fa71b9SJerome Forissier { 123811fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 123911fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mpi( X, A, B ) ); 124011fa71b9SJerome Forissier MOD_MUL( *X ); 124111fa71b9SJerome Forissier cleanup: 124211fa71b9SJerome Forissier return( ret ); 124311fa71b9SJerome Forissier } 124411fa71b9SJerome Forissier 1245817466cbSJens Wiklander /* 1246817466cbSJens Wiklander * Reduce a mbedtls_mpi mod p in-place, to use after mbedtls_mpi_sub_mpi 1247817466cbSJens Wiklander * N->s < 0 is a very fast test, which fails only if N is 0 1248817466cbSJens Wiklander */ 1249817466cbSJens Wiklander #define MOD_SUB( N ) \ 12505b25c76aSJerome Forissier while( (N).s < 0 && mbedtls_mpi_cmp_int( &(N), 0 ) != 0 ) \ 12515b25c76aSJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_add_mpi( &(N), &(N), &grp->P ) ) 1252817466cbSJens Wiklander 1253*7901324dSJerome Forissier #if ( defined(MBEDTLS_ECP_SHORT_WEIERSTRASS_ENABLED) && \ 1254*7901324dSJerome Forissier !( defined(MBEDTLS_ECP_NO_FALLBACK) && \ 1255*7901324dSJerome Forissier defined(MBEDTLS_ECP_DOUBLE_JAC_ALT) && \ 1256*7901324dSJerome Forissier defined(MBEDTLS_ECP_ADD_MIXED_ALT) ) ) || \ 1257*7901324dSJerome Forissier ( defined(MBEDTLS_ECP_MONTGOMERY_ENABLED) && \ 1258*7901324dSJerome Forissier !( defined(MBEDTLS_ECP_NO_FALLBACK) && \ 1259*7901324dSJerome Forissier defined(MBEDTLS_ECP_DOUBLE_ADD_MXZ_ALT) ) ) 126011fa71b9SJerome Forissier static inline int mbedtls_mpi_sub_mod( const mbedtls_ecp_group *grp, 126111fa71b9SJerome Forissier mbedtls_mpi *X, 126211fa71b9SJerome Forissier const mbedtls_mpi *A, 126311fa71b9SJerome Forissier const mbedtls_mpi *B ) 126411fa71b9SJerome Forissier { 126511fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 126611fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_sub_mpi( X, A, B ) ); 126711fa71b9SJerome Forissier MOD_SUB( *X ); 126811fa71b9SJerome Forissier cleanup: 126911fa71b9SJerome Forissier return( ret ); 127011fa71b9SJerome Forissier } 1271*7901324dSJerome Forissier #endif /* All functions referencing mbedtls_mpi_sub_mod() are alt-implemented without fallback */ 127211fa71b9SJerome Forissier 1273817466cbSJens Wiklander /* 1274817466cbSJens Wiklander * Reduce a mbedtls_mpi mod p in-place, to use after mbedtls_mpi_add_mpi and mbedtls_mpi_mul_int. 1275817466cbSJens Wiklander * We known P, N and the result are positive, so sub_abs is correct, and 1276817466cbSJens Wiklander * a bit faster. 1277817466cbSJens Wiklander */ 1278817466cbSJens Wiklander #define MOD_ADD( N ) \ 12795b25c76aSJerome Forissier while( mbedtls_mpi_cmp_mpi( &(N), &grp->P ) >= 0 ) \ 12805b25c76aSJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_sub_abs( &(N), &(N), &grp->P ) ) 1281817466cbSJens Wiklander 128211fa71b9SJerome Forissier static inline int mbedtls_mpi_add_mod( const mbedtls_ecp_group *grp, 128311fa71b9SJerome Forissier mbedtls_mpi *X, 128411fa71b9SJerome Forissier const mbedtls_mpi *A, 128511fa71b9SJerome Forissier const mbedtls_mpi *B ) 128611fa71b9SJerome Forissier { 128711fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 128811fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_add_mpi( X, A, B ) ); 128911fa71b9SJerome Forissier MOD_ADD( *X ); 129011fa71b9SJerome Forissier cleanup: 129111fa71b9SJerome Forissier return( ret ); 129211fa71b9SJerome Forissier } 129311fa71b9SJerome Forissier 1294*7901324dSJerome Forissier #if defined(MBEDTLS_ECP_SHORT_WEIERSTRASS_ENABLED) && \ 1295*7901324dSJerome Forissier !( defined(MBEDTLS_ECP_NO_FALLBACK) && \ 1296*7901324dSJerome Forissier defined(MBEDTLS_ECP_DOUBLE_JAC_ALT) && \ 1297*7901324dSJerome Forissier defined(MBEDTLS_ECP_ADD_MIXED_ALT) ) 129811fa71b9SJerome Forissier static inline int mbedtls_mpi_shift_l_mod( const mbedtls_ecp_group *grp, 129911fa71b9SJerome Forissier mbedtls_mpi *X, 130011fa71b9SJerome Forissier size_t count ) 130111fa71b9SJerome Forissier { 130211fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 130311fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_shift_l( X, count ) ); 130411fa71b9SJerome Forissier MOD_ADD( *X ); 130511fa71b9SJerome Forissier cleanup: 130611fa71b9SJerome Forissier return( ret ); 130711fa71b9SJerome Forissier } 1308*7901324dSJerome Forissier #endif /* All functions referencing mbedtls_mpi_shift_l_mod() are alt-implemented without fallback */ 130911fa71b9SJerome Forissier 1310*7901324dSJerome Forissier #if defined(MBEDTLS_ECP_SHORT_WEIERSTRASS_ENABLED) 1311817466cbSJens Wiklander /* 1312817466cbSJens Wiklander * For curves in short Weierstrass form, we do all the internal operations in 1313817466cbSJens Wiklander * Jacobian coordinates. 1314817466cbSJens Wiklander * 1315817466cbSJens Wiklander * For multiplication, we'll use a comb method with coutermeasueres against 1316817466cbSJens Wiklander * SPA, hence timing attacks. 1317817466cbSJens Wiklander */ 1318817466cbSJens Wiklander 1319817466cbSJens Wiklander /* 1320817466cbSJens Wiklander * Normalize jacobian coordinates so that Z == 0 || Z == 1 (GECC 3.2.1) 1321817466cbSJens Wiklander * Cost: 1N := 1I + 3M + 1S 1322817466cbSJens Wiklander */ 1323817466cbSJens Wiklander static int ecp_normalize_jac( const mbedtls_ecp_group *grp, mbedtls_ecp_point *pt ) 1324817466cbSJens Wiklander { 1325817466cbSJens Wiklander if( mbedtls_mpi_cmp_int( &pt->Z, 0 ) == 0 ) 1326817466cbSJens Wiklander return( 0 ); 1327817466cbSJens Wiklander 1328817466cbSJens Wiklander #if defined(MBEDTLS_ECP_NORMALIZE_JAC_ALT) 1329817466cbSJens Wiklander if( mbedtls_internal_ecp_grp_capable( grp ) ) 13303d3b0591SJens Wiklander return( mbedtls_internal_ecp_normalize_jac( grp, pt ) ); 1331817466cbSJens Wiklander #endif /* MBEDTLS_ECP_NORMALIZE_JAC_ALT */ 13323d3b0591SJens Wiklander 1333*7901324dSJerome Forissier #if defined(MBEDTLS_ECP_NO_FALLBACK) && defined(MBEDTLS_ECP_NORMALIZE_JAC_ALT) 1334*7901324dSJerome Forissier return( MBEDTLS_ERR_ECP_FEATURE_UNAVAILABLE ); 1335*7901324dSJerome Forissier #else 1336*7901324dSJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 1337*7901324dSJerome Forissier mbedtls_mpi Zi, ZZi; 1338817466cbSJens Wiklander mbedtls_mpi_init( &Zi ); mbedtls_mpi_init( &ZZi ); 1339817466cbSJens Wiklander 1340817466cbSJens Wiklander /* 1341817466cbSJens Wiklander * X = X / Z^2 mod p 1342817466cbSJens Wiklander */ 1343817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_inv_mod( &Zi, &pt->Z, &grp->P ) ); 134411fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &ZZi, &Zi, &Zi ) ); 134511fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &pt->X, &pt->X, &ZZi ) ); 1346817466cbSJens Wiklander 1347817466cbSJens Wiklander /* 1348817466cbSJens Wiklander * Y = Y / Z^3 mod p 1349817466cbSJens Wiklander */ 135011fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &pt->Y, &pt->Y, &ZZi ) ); 135111fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &pt->Y, &pt->Y, &Zi ) ); 1352817466cbSJens Wiklander 1353817466cbSJens Wiklander /* 1354817466cbSJens Wiklander * Z = 1 1355817466cbSJens Wiklander */ 1356817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_lset( &pt->Z, 1 ) ); 1357817466cbSJens Wiklander 1358817466cbSJens Wiklander cleanup: 1359817466cbSJens Wiklander 1360817466cbSJens Wiklander mbedtls_mpi_free( &Zi ); mbedtls_mpi_free( &ZZi ); 1361817466cbSJens Wiklander 1362817466cbSJens Wiklander return( ret ); 1363*7901324dSJerome Forissier #endif /* !defined(MBEDTLS_ECP_NO_FALLBACK) || !defined(MBEDTLS_ECP_NORMALIZE_JAC_ALT) */ 1364817466cbSJens Wiklander } 1365817466cbSJens Wiklander 1366817466cbSJens Wiklander /* 1367817466cbSJens Wiklander * Normalize jacobian coordinates of an array of (pointers to) points, 1368817466cbSJens Wiklander * using Montgomery's trick to perform only one inversion mod P. 1369817466cbSJens Wiklander * (See for example Cohen's "A Course in Computational Algebraic Number 1370817466cbSJens Wiklander * Theory", Algorithm 10.3.4.) 1371817466cbSJens Wiklander * 1372817466cbSJens Wiklander * Warning: fails (returning an error) if one of the points is zero! 1373817466cbSJens Wiklander * This should never happen, see choice of w in ecp_mul_comb(). 1374817466cbSJens Wiklander * 1375817466cbSJens Wiklander * Cost: 1N(t) := 1I + (6t - 3)M + 1S 1376817466cbSJens Wiklander */ 1377817466cbSJens Wiklander static int ecp_normalize_jac_many( const mbedtls_ecp_group *grp, 13783d3b0591SJens Wiklander mbedtls_ecp_point *T[], size_t T_size ) 1379817466cbSJens Wiklander { 13803d3b0591SJens Wiklander if( T_size < 2 ) 1381817466cbSJens Wiklander return( ecp_normalize_jac( grp, *T ) ); 1382817466cbSJens Wiklander 1383817466cbSJens Wiklander #if defined(MBEDTLS_ECP_NORMALIZE_JAC_MANY_ALT) 1384817466cbSJens Wiklander if( mbedtls_internal_ecp_grp_capable( grp ) ) 13853d3b0591SJens Wiklander return( mbedtls_internal_ecp_normalize_jac_many( grp, T, T_size ) ); 1386817466cbSJens Wiklander #endif 1387817466cbSJens Wiklander 1388*7901324dSJerome Forissier #if defined(MBEDTLS_ECP_NO_FALLBACK) && defined(MBEDTLS_ECP_NORMALIZE_JAC_MANY_ALT) 1389*7901324dSJerome Forissier return( MBEDTLS_ERR_ECP_FEATURE_UNAVAILABLE ); 1390*7901324dSJerome Forissier #else 1391*7901324dSJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 1392*7901324dSJerome Forissier size_t i; 1393*7901324dSJerome Forissier mbedtls_mpi *c, u, Zi, ZZi; 1394*7901324dSJerome Forissier 13953d3b0591SJens Wiklander if( ( c = mbedtls_calloc( T_size, sizeof( mbedtls_mpi ) ) ) == NULL ) 1396817466cbSJens Wiklander return( MBEDTLS_ERR_ECP_ALLOC_FAILED ); 1397817466cbSJens Wiklander 13983d3b0591SJens Wiklander for( i = 0; i < T_size; i++ ) 13993d3b0591SJens Wiklander mbedtls_mpi_init( &c[i] ); 14003d3b0591SJens Wiklander 1401817466cbSJens Wiklander mbedtls_mpi_init( &u ); mbedtls_mpi_init( &Zi ); mbedtls_mpi_init( &ZZi ); 1402817466cbSJens Wiklander 1403817466cbSJens Wiklander /* 1404817466cbSJens Wiklander * c[i] = Z_0 * ... * Z_i 1405817466cbSJens Wiklander */ 1406817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_copy( &c[0], &T[0]->Z ) ); 14073d3b0591SJens Wiklander for( i = 1; i < T_size; i++ ) 1408817466cbSJens Wiklander { 140911fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &c[i], &c[i-1], &T[i]->Z ) ); 1410817466cbSJens Wiklander } 1411817466cbSJens Wiklander 1412817466cbSJens Wiklander /* 1413817466cbSJens Wiklander * u = 1 / (Z_0 * ... * Z_n) mod P 1414817466cbSJens Wiklander */ 14153d3b0591SJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_inv_mod( &u, &c[T_size-1], &grp->P ) ); 1416817466cbSJens Wiklander 14173d3b0591SJens Wiklander for( i = T_size - 1; ; i-- ) 1418817466cbSJens Wiklander { 1419817466cbSJens Wiklander /* 1420817466cbSJens Wiklander * Zi = 1 / Z_i mod p 1421817466cbSJens Wiklander * u = 1 / (Z_0 * ... * Z_i) mod P 1422817466cbSJens Wiklander */ 1423817466cbSJens Wiklander if( i == 0 ) { 1424817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_copy( &Zi, &u ) ); 1425817466cbSJens Wiklander } 1426817466cbSJens Wiklander else 1427817466cbSJens Wiklander { 142811fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &Zi, &u, &c[i-1] ) ); 142911fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &u, &u, &T[i]->Z ) ); 1430817466cbSJens Wiklander } 1431817466cbSJens Wiklander 1432817466cbSJens Wiklander /* 1433817466cbSJens Wiklander * proceed as in normalize() 1434817466cbSJens Wiklander */ 143511fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &ZZi, &Zi, &Zi ) ); 143611fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &T[i]->X, &T[i]->X, &ZZi ) ); 143711fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &T[i]->Y, &T[i]->Y, &ZZi ) ); 143811fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &T[i]->Y, &T[i]->Y, &Zi ) ); 1439817466cbSJens Wiklander 1440817466cbSJens Wiklander /* 1441817466cbSJens Wiklander * Post-precessing: reclaim some memory by shrinking coordinates 1442817466cbSJens Wiklander * - not storing Z (always 1) 1443817466cbSJens Wiklander * - shrinking other coordinates, but still keeping the same number of 1444817466cbSJens Wiklander * limbs as P, as otherwise it will too likely be regrown too fast. 1445817466cbSJens Wiklander */ 1446817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_shrink( &T[i]->X, grp->P.n ) ); 1447817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_shrink( &T[i]->Y, grp->P.n ) ); 1448817466cbSJens Wiklander mbedtls_mpi_free( &T[i]->Z ); 1449817466cbSJens Wiklander 1450817466cbSJens Wiklander if( i == 0 ) 1451817466cbSJens Wiklander break; 1452817466cbSJens Wiklander } 1453817466cbSJens Wiklander 1454817466cbSJens Wiklander cleanup: 1455817466cbSJens Wiklander 1456817466cbSJens Wiklander mbedtls_mpi_free( &u ); mbedtls_mpi_free( &Zi ); mbedtls_mpi_free( &ZZi ); 14573d3b0591SJens Wiklander for( i = 0; i < T_size; i++ ) 1458817466cbSJens Wiklander mbedtls_mpi_free( &c[i] ); 1459817466cbSJens Wiklander mbedtls_free( c ); 1460817466cbSJens Wiklander 1461817466cbSJens Wiklander return( ret ); 1462*7901324dSJerome Forissier #endif /* !defined(MBEDTLS_ECP_NO_FALLBACK) || !defined(MBEDTLS_ECP_NORMALIZE_JAC_MANY_ALT) */ 1463817466cbSJens Wiklander } 1464817466cbSJens Wiklander 1465817466cbSJens Wiklander /* 1466817466cbSJens Wiklander * Conditional point inversion: Q -> -Q = (Q.X, -Q.Y, Q.Z) without leak. 1467817466cbSJens Wiklander * "inv" must be 0 (don't invert) or 1 (invert) or the result will be invalid 1468817466cbSJens Wiklander */ 1469817466cbSJens Wiklander static int ecp_safe_invert_jac( const mbedtls_ecp_group *grp, 1470817466cbSJens Wiklander mbedtls_ecp_point *Q, 1471817466cbSJens Wiklander unsigned char inv ) 1472817466cbSJens Wiklander { 147311fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 1474817466cbSJens Wiklander unsigned char nonzero; 1475817466cbSJens Wiklander mbedtls_mpi mQY; 1476817466cbSJens Wiklander 1477817466cbSJens Wiklander mbedtls_mpi_init( &mQY ); 1478817466cbSJens Wiklander 1479817466cbSJens Wiklander /* Use the fact that -Q.Y mod P = P - Q.Y unless Q.Y == 0 */ 1480817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_sub_mpi( &mQY, &grp->P, &Q->Y ) ); 1481817466cbSJens Wiklander nonzero = mbedtls_mpi_cmp_int( &Q->Y, 0 ) != 0; 1482817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_safe_cond_assign( &Q->Y, &mQY, inv & nonzero ) ); 1483817466cbSJens Wiklander 1484817466cbSJens Wiklander cleanup: 1485817466cbSJens Wiklander mbedtls_mpi_free( &mQY ); 1486817466cbSJens Wiklander 1487817466cbSJens Wiklander return( ret ); 1488817466cbSJens Wiklander } 1489817466cbSJens Wiklander 1490817466cbSJens Wiklander /* 1491817466cbSJens Wiklander * Point doubling R = 2 P, Jacobian coordinates 1492817466cbSJens Wiklander * 1493817466cbSJens Wiklander * Based on http://www.hyperelliptic.org/EFD/g1p/auto-shortw-jacobian.html#doubling-dbl-1998-cmo-2 . 1494817466cbSJens Wiklander * 1495817466cbSJens Wiklander * We follow the variable naming fairly closely. The formula variations that trade a MUL for a SQR 1496817466cbSJens Wiklander * (plus a few ADDs) aren't useful as our bignum implementation doesn't distinguish squaring. 1497817466cbSJens Wiklander * 1498817466cbSJens Wiklander * Standard optimizations are applied when curve parameter A is one of { 0, -3 }. 1499817466cbSJens Wiklander * 1500817466cbSJens Wiklander * Cost: 1D := 3M + 4S (A == 0) 1501817466cbSJens Wiklander * 4M + 4S (A == -3) 1502817466cbSJens Wiklander * 3M + 6S + 1a otherwise 1503817466cbSJens Wiklander */ 1504817466cbSJens Wiklander static int ecp_double_jac( const mbedtls_ecp_group *grp, mbedtls_ecp_point *R, 1505817466cbSJens Wiklander const mbedtls_ecp_point *P ) 1506817466cbSJens Wiklander { 1507817466cbSJens Wiklander #if defined(MBEDTLS_SELF_TEST) 1508817466cbSJens Wiklander dbl_count++; 1509817466cbSJens Wiklander #endif 1510817466cbSJens Wiklander 1511817466cbSJens Wiklander #if defined(MBEDTLS_ECP_DOUBLE_JAC_ALT) 1512817466cbSJens Wiklander if( mbedtls_internal_ecp_grp_capable( grp ) ) 15133d3b0591SJens Wiklander return( mbedtls_internal_ecp_double_jac( grp, R, P ) ); 1514817466cbSJens Wiklander #endif /* MBEDTLS_ECP_DOUBLE_JAC_ALT */ 1515817466cbSJens Wiklander 1516*7901324dSJerome Forissier #if defined(MBEDTLS_ECP_NO_FALLBACK) && defined(MBEDTLS_ECP_DOUBLE_JAC_ALT) 1517*7901324dSJerome Forissier return( MBEDTLS_ERR_ECP_FEATURE_UNAVAILABLE ); 1518*7901324dSJerome Forissier #else 1519*7901324dSJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 1520*7901324dSJerome Forissier mbedtls_mpi M, S, T, U; 1521*7901324dSJerome Forissier 1522817466cbSJens Wiklander mbedtls_mpi_init( &M ); mbedtls_mpi_init( &S ); mbedtls_mpi_init( &T ); mbedtls_mpi_init( &U ); 1523817466cbSJens Wiklander 1524817466cbSJens Wiklander /* Special case for A = -3 */ 1525817466cbSJens Wiklander if( grp->A.p == NULL ) 1526817466cbSJens Wiklander { 1527817466cbSJens Wiklander /* M = 3(X + Z^2)(X - Z^2) */ 152811fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &S, &P->Z, &P->Z ) ); 152911fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_add_mod( grp, &T, &P->X, &S ) ); 153011fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_sub_mod( grp, &U, &P->X, &S ) ); 153111fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &S, &T, &U ) ); 1532817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_mul_int( &M, &S, 3 ) ); MOD_ADD( M ); 1533817466cbSJens Wiklander } 1534817466cbSJens Wiklander else 1535817466cbSJens Wiklander { 1536817466cbSJens Wiklander /* M = 3.X^2 */ 153711fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &S, &P->X, &P->X ) ); 1538817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_mul_int( &M, &S, 3 ) ); MOD_ADD( M ); 1539817466cbSJens Wiklander 1540817466cbSJens Wiklander /* Optimize away for "koblitz" curves with A = 0 */ 1541817466cbSJens Wiklander if( mbedtls_mpi_cmp_int( &grp->A, 0 ) != 0 ) 1542817466cbSJens Wiklander { 1543817466cbSJens Wiklander /* M += A.Z^4 */ 154411fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &S, &P->Z, &P->Z ) ); 154511fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &T, &S, &S ) ); 154611fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &S, &T, &grp->A ) ); 154711fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_add_mod( grp, &M, &M, &S ) ); 1548817466cbSJens Wiklander } 1549817466cbSJens Wiklander } 1550817466cbSJens Wiklander 1551817466cbSJens Wiklander /* S = 4.X.Y^2 */ 155211fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &T, &P->Y, &P->Y ) ); 155311fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_shift_l_mod( grp, &T, 1 ) ); 155411fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &S, &P->X, &T ) ); 155511fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_shift_l_mod( grp, &S, 1 ) ); 1556817466cbSJens Wiklander 1557817466cbSJens Wiklander /* U = 8.Y^4 */ 155811fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &U, &T, &T ) ); 155911fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_shift_l_mod( grp, &U, 1 ) ); 1560817466cbSJens Wiklander 1561817466cbSJens Wiklander /* T = M^2 - 2.S */ 156211fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &T, &M, &M ) ); 156311fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_sub_mod( grp, &T, &T, &S ) ); 156411fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_sub_mod( grp, &T, &T, &S ) ); 1565817466cbSJens Wiklander 1566817466cbSJens Wiklander /* S = M(S - T) - U */ 156711fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_sub_mod( grp, &S, &S, &T ) ); 156811fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &S, &S, &M ) ); 156911fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_sub_mod( grp, &S, &S, &U ) ); 1570817466cbSJens Wiklander 1571817466cbSJens Wiklander /* U = 2.Y.Z */ 157211fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &U, &P->Y, &P->Z ) ); 157311fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_shift_l_mod( grp, &U, 1 ) ); 1574817466cbSJens Wiklander 1575817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_copy( &R->X, &T ) ); 1576817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_copy( &R->Y, &S ) ); 1577817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_copy( &R->Z, &U ) ); 1578817466cbSJens Wiklander 1579817466cbSJens Wiklander cleanup: 1580817466cbSJens Wiklander mbedtls_mpi_free( &M ); mbedtls_mpi_free( &S ); mbedtls_mpi_free( &T ); mbedtls_mpi_free( &U ); 1581817466cbSJens Wiklander 1582817466cbSJens Wiklander return( ret ); 1583*7901324dSJerome Forissier #endif /* !defined(MBEDTLS_ECP_NO_FALLBACK) || !defined(MBEDTLS_ECP_DOUBLE_JAC_ALT) */ 1584817466cbSJens Wiklander } 1585817466cbSJens Wiklander 1586817466cbSJens Wiklander /* 1587817466cbSJens Wiklander * Addition: R = P + Q, mixed affine-Jacobian coordinates (GECC 3.22) 1588817466cbSJens Wiklander * 1589817466cbSJens Wiklander * The coordinates of Q must be normalized (= affine), 1590817466cbSJens Wiklander * but those of P don't need to. R is not normalized. 1591817466cbSJens Wiklander * 1592817466cbSJens Wiklander * Special cases: (1) P or Q is zero, (2) R is zero, (3) P == Q. 1593817466cbSJens Wiklander * None of these cases can happen as intermediate step in ecp_mul_comb(): 1594817466cbSJens Wiklander * - at each step, P, Q and R are multiples of the base point, the factor 1595817466cbSJens Wiklander * being less than its order, so none of them is zero; 1596817466cbSJens Wiklander * - Q is an odd multiple of the base point, P an even multiple, 1597817466cbSJens Wiklander * due to the choice of precomputed points in the modified comb method. 1598817466cbSJens Wiklander * So branches for these cases do not leak secret information. 1599817466cbSJens Wiklander * 1600817466cbSJens Wiklander * We accept Q->Z being unset (saving memory in tables) as meaning 1. 1601817466cbSJens Wiklander * 1602817466cbSJens Wiklander * Cost: 1A := 8M + 3S 1603817466cbSJens Wiklander */ 1604817466cbSJens Wiklander static int ecp_add_mixed( const mbedtls_ecp_group *grp, mbedtls_ecp_point *R, 1605817466cbSJens Wiklander const mbedtls_ecp_point *P, const mbedtls_ecp_point *Q ) 1606817466cbSJens Wiklander { 1607817466cbSJens Wiklander #if defined(MBEDTLS_SELF_TEST) 1608817466cbSJens Wiklander add_count++; 1609817466cbSJens Wiklander #endif 1610817466cbSJens Wiklander 1611817466cbSJens Wiklander #if defined(MBEDTLS_ECP_ADD_MIXED_ALT) 1612817466cbSJens Wiklander if( mbedtls_internal_ecp_grp_capable( grp ) ) 16133d3b0591SJens Wiklander return( mbedtls_internal_ecp_add_mixed( grp, R, P, Q ) ); 1614817466cbSJens Wiklander #endif /* MBEDTLS_ECP_ADD_MIXED_ALT */ 1615817466cbSJens Wiklander 1616*7901324dSJerome Forissier #if defined(MBEDTLS_ECP_NO_FALLBACK) && defined(MBEDTLS_ECP_ADD_MIXED_ALT) 1617*7901324dSJerome Forissier return( MBEDTLS_ERR_ECP_FEATURE_UNAVAILABLE ); 1618*7901324dSJerome Forissier #else 1619*7901324dSJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 1620*7901324dSJerome Forissier mbedtls_mpi T1, T2, T3, T4, X, Y, Z; 1621*7901324dSJerome Forissier 1622817466cbSJens Wiklander /* 1623817466cbSJens Wiklander * Trivial cases: P == 0 or Q == 0 (case 1) 1624817466cbSJens Wiklander */ 1625817466cbSJens Wiklander if( mbedtls_mpi_cmp_int( &P->Z, 0 ) == 0 ) 1626817466cbSJens Wiklander return( mbedtls_ecp_copy( R, Q ) ); 1627817466cbSJens Wiklander 1628817466cbSJens Wiklander if( Q->Z.p != NULL && mbedtls_mpi_cmp_int( &Q->Z, 0 ) == 0 ) 1629817466cbSJens Wiklander return( mbedtls_ecp_copy( R, P ) ); 1630817466cbSJens Wiklander 1631817466cbSJens Wiklander /* 1632817466cbSJens Wiklander * Make sure Q coordinates are normalized 1633817466cbSJens Wiklander */ 1634817466cbSJens Wiklander if( Q->Z.p != NULL && mbedtls_mpi_cmp_int( &Q->Z, 1 ) != 0 ) 1635817466cbSJens Wiklander return( MBEDTLS_ERR_ECP_BAD_INPUT_DATA ); 1636817466cbSJens Wiklander 1637817466cbSJens Wiklander mbedtls_mpi_init( &T1 ); mbedtls_mpi_init( &T2 ); mbedtls_mpi_init( &T3 ); mbedtls_mpi_init( &T4 ); 1638817466cbSJens Wiklander mbedtls_mpi_init( &X ); mbedtls_mpi_init( &Y ); mbedtls_mpi_init( &Z ); 1639817466cbSJens Wiklander 164011fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &T1, &P->Z, &P->Z ) ); 164111fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &T2, &T1, &P->Z ) ); 164211fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &T1, &T1, &Q->X ) ); 164311fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &T2, &T2, &Q->Y ) ); 164411fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_sub_mod( grp, &T1, &T1, &P->X ) ); 164511fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_sub_mod( grp, &T2, &T2, &P->Y ) ); 1646817466cbSJens Wiklander 1647817466cbSJens Wiklander /* Special cases (2) and (3) */ 1648817466cbSJens Wiklander if( mbedtls_mpi_cmp_int( &T1, 0 ) == 0 ) 1649817466cbSJens Wiklander { 1650817466cbSJens Wiklander if( mbedtls_mpi_cmp_int( &T2, 0 ) == 0 ) 1651817466cbSJens Wiklander { 1652817466cbSJens Wiklander ret = ecp_double_jac( grp, R, P ); 1653817466cbSJens Wiklander goto cleanup; 1654817466cbSJens Wiklander } 1655817466cbSJens Wiklander else 1656817466cbSJens Wiklander { 1657817466cbSJens Wiklander ret = mbedtls_ecp_set_zero( R ); 1658817466cbSJens Wiklander goto cleanup; 1659817466cbSJens Wiklander } 1660817466cbSJens Wiklander } 1661817466cbSJens Wiklander 166211fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &Z, &P->Z, &T1 ) ); 166311fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &T3, &T1, &T1 ) ); 166411fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &T4, &T3, &T1 ) ); 166511fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &T3, &T3, &P->X ) ); 166611fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_copy( &T1, &T3 ) ); 166711fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_shift_l_mod( grp, &T1, 1 ) ); 166811fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &X, &T2, &T2 ) ); 166911fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_sub_mod( grp, &X, &X, &T1 ) ); 167011fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_sub_mod( grp, &X, &X, &T4 ) ); 167111fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_sub_mod( grp, &T3, &T3, &X ) ); 167211fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &T3, &T3, &T2 ) ); 167311fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &T4, &T4, &P->Y ) ); 167411fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_sub_mod( grp, &Y, &T3, &T4 ) ); 1675817466cbSJens Wiklander 1676817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_copy( &R->X, &X ) ); 1677817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_copy( &R->Y, &Y ) ); 1678817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_copy( &R->Z, &Z ) ); 1679817466cbSJens Wiklander 1680817466cbSJens Wiklander cleanup: 1681817466cbSJens Wiklander 1682817466cbSJens Wiklander mbedtls_mpi_free( &T1 ); mbedtls_mpi_free( &T2 ); mbedtls_mpi_free( &T3 ); mbedtls_mpi_free( &T4 ); 1683817466cbSJens Wiklander mbedtls_mpi_free( &X ); mbedtls_mpi_free( &Y ); mbedtls_mpi_free( &Z ); 1684817466cbSJens Wiklander 1685817466cbSJens Wiklander return( ret ); 1686*7901324dSJerome Forissier #endif /* !defined(MBEDTLS_ECP_NO_FALLBACK) || !defined(MBEDTLS_ECP_ADD_MIXED_ALT) */ 1687817466cbSJens Wiklander } 1688817466cbSJens Wiklander 1689817466cbSJens Wiklander /* 1690817466cbSJens Wiklander * Randomize jacobian coordinates: 1691817466cbSJens Wiklander * (X, Y, Z) -> (l^2 X, l^3 Y, l Z) for random l 1692817466cbSJens Wiklander * This is sort of the reverse operation of ecp_normalize_jac(). 1693817466cbSJens Wiklander * 1694817466cbSJens Wiklander * This countermeasure was first suggested in [2]. 1695817466cbSJens Wiklander */ 1696817466cbSJens Wiklander static int ecp_randomize_jac( const mbedtls_ecp_group *grp, mbedtls_ecp_point *pt, 1697817466cbSJens Wiklander int (*f_rng)(void *, unsigned char *, size_t), void *p_rng ) 1698817466cbSJens Wiklander { 1699817466cbSJens Wiklander #if defined(MBEDTLS_ECP_RANDOMIZE_JAC_ALT) 1700817466cbSJens Wiklander if( mbedtls_internal_ecp_grp_capable( grp ) ) 17013d3b0591SJens Wiklander return( mbedtls_internal_ecp_randomize_jac( grp, pt, f_rng, p_rng ) ); 1702817466cbSJens Wiklander #endif /* MBEDTLS_ECP_RANDOMIZE_JAC_ALT */ 1703817466cbSJens Wiklander 1704*7901324dSJerome Forissier #if defined(MBEDTLS_ECP_NO_FALLBACK) && defined(MBEDTLS_ECP_RANDOMIZE_JAC_ALT) 1705*7901324dSJerome Forissier return( MBEDTLS_ERR_ECP_FEATURE_UNAVAILABLE ); 1706*7901324dSJerome Forissier #else 1707*7901324dSJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 1708*7901324dSJerome Forissier mbedtls_mpi l, ll; 1709*7901324dSJerome Forissier 1710817466cbSJens Wiklander mbedtls_mpi_init( &l ); mbedtls_mpi_init( &ll ); 1711817466cbSJens Wiklander 1712817466cbSJens Wiklander /* Generate l such that 1 < l < p */ 1713*7901324dSJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_random( &l, 2, &grp->P, f_rng, p_rng ) ); 1714817466cbSJens Wiklander 1715817466cbSJens Wiklander /* Z = l * Z */ 171611fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &pt->Z, &pt->Z, &l ) ); 1717817466cbSJens Wiklander 1718817466cbSJens Wiklander /* X = l^2 * X */ 171911fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &ll, &l, &l ) ); 172011fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &pt->X, &pt->X, &ll ) ); 1721817466cbSJens Wiklander 1722817466cbSJens Wiklander /* Y = l^3 * Y */ 172311fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &ll, &ll, &l ) ); 172411fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &pt->Y, &pt->Y, &ll ) ); 1725817466cbSJens Wiklander 1726817466cbSJens Wiklander cleanup: 1727817466cbSJens Wiklander mbedtls_mpi_free( &l ); mbedtls_mpi_free( &ll ); 1728817466cbSJens Wiklander 1729*7901324dSJerome Forissier if( ret == MBEDTLS_ERR_MPI_NOT_ACCEPTABLE ) 1730*7901324dSJerome Forissier ret = MBEDTLS_ERR_ECP_RANDOM_FAILED; 1731817466cbSJens Wiklander return( ret ); 1732*7901324dSJerome Forissier #endif /* !defined(MBEDTLS_ECP_NO_FALLBACK) || !defined(MBEDTLS_ECP_RANDOMIZE_JAC_ALT) */ 1733817466cbSJens Wiklander } 1734817466cbSJens Wiklander 1735817466cbSJens Wiklander /* 1736817466cbSJens Wiklander * Check and define parameters used by the comb method (see below for details) 1737817466cbSJens Wiklander */ 1738817466cbSJens Wiklander #if MBEDTLS_ECP_WINDOW_SIZE < 2 || MBEDTLS_ECP_WINDOW_SIZE > 7 1739817466cbSJens Wiklander #error "MBEDTLS_ECP_WINDOW_SIZE out of bounds" 1740817466cbSJens Wiklander #endif 1741817466cbSJens Wiklander 1742817466cbSJens Wiklander /* d = ceil( n / w ) */ 1743817466cbSJens Wiklander #define COMB_MAX_D ( MBEDTLS_ECP_MAX_BITS + 1 ) / 2 1744817466cbSJens Wiklander 1745817466cbSJens Wiklander /* number of precomputed points */ 1746817466cbSJens Wiklander #define COMB_MAX_PRE ( 1 << ( MBEDTLS_ECP_WINDOW_SIZE - 1 ) ) 1747817466cbSJens Wiklander 1748817466cbSJens Wiklander /* 1749817466cbSJens Wiklander * Compute the representation of m that will be used with our comb method. 1750817466cbSJens Wiklander * 1751817466cbSJens Wiklander * The basic comb method is described in GECC 3.44 for example. We use a 1752817466cbSJens Wiklander * modified version that provides resistance to SPA by avoiding zero 1753817466cbSJens Wiklander * digits in the representation as in [3]. We modify the method further by 1754817466cbSJens Wiklander * requiring that all K_i be odd, which has the small cost that our 17553d3b0591SJens Wiklander * representation uses one more K_i, due to carries, but saves on the size of 17563d3b0591SJens Wiklander * the precomputed table. 1757817466cbSJens Wiklander * 17583d3b0591SJens Wiklander * Summary of the comb method and its modifications: 17593d3b0591SJens Wiklander * 17603d3b0591SJens Wiklander * - The goal is to compute m*P for some w*d-bit integer m. 17613d3b0591SJens Wiklander * 17623d3b0591SJens Wiklander * - The basic comb method splits m into the w-bit integers 17633d3b0591SJens Wiklander * x[0] .. x[d-1] where x[i] consists of the bits in m whose 17643d3b0591SJens Wiklander * index has residue i modulo d, and computes m * P as 17653d3b0591SJens Wiklander * S[x[0]] + 2 * S[x[1]] + .. + 2^(d-1) S[x[d-1]], where 17663d3b0591SJens Wiklander * S[i_{w-1} .. i_0] := i_{w-1} 2^{(w-1)d} P + ... + i_1 2^d P + i_0 P. 17673d3b0591SJens Wiklander * 17683d3b0591SJens Wiklander * - If it happens that, say, x[i+1]=0 (=> S[x[i+1]]=0), one can replace the sum by 17693d3b0591SJens Wiklander * .. + 2^{i-1} S[x[i-1]] - 2^i S[x[i]] + 2^{i+1} S[x[i]] + 2^{i+2} S[x[i+2]] .., 17703d3b0591SJens Wiklander * thereby successively converting it into a form where all summands 17713d3b0591SJens Wiklander * are nonzero, at the cost of negative summands. This is the basic idea of [3]. 17723d3b0591SJens Wiklander * 17733d3b0591SJens Wiklander * - More generally, even if x[i+1] != 0, we can first transform the sum as 17743d3b0591SJens Wiklander * .. - 2^i S[x[i]] + 2^{i+1} ( S[x[i]] + S[x[i+1]] ) + 2^{i+2} S[x[i+2]] .., 17753d3b0591SJens Wiklander * and then replace S[x[i]] + S[x[i+1]] = S[x[i] ^ x[i+1]] + 2 S[x[i] & x[i+1]]. 17763d3b0591SJens Wiklander * Performing and iterating this procedure for those x[i] that are even 17773d3b0591SJens Wiklander * (keeping track of carry), we can transform the original sum into one of the form 17783d3b0591SJens Wiklander * S[x'[0]] +- 2 S[x'[1]] +- .. +- 2^{d-1} S[x'[d-1]] + 2^d S[x'[d]] 17793d3b0591SJens Wiklander * with all x'[i] odd. It is therefore only necessary to know S at odd indices, 17803d3b0591SJens Wiklander * which is why we are only computing half of it in the first place in 17813d3b0591SJens Wiklander * ecp_precompute_comb and accessing it with index abs(i) / 2 in ecp_select_comb. 17823d3b0591SJens Wiklander * 17833d3b0591SJens Wiklander * - For the sake of compactness, only the seven low-order bits of x[i] 17843d3b0591SJens Wiklander * are used to represent its absolute value (K_i in the paper), and the msb 17853d3b0591SJens Wiklander * of x[i] encodes the sign (s_i in the paper): it is set if and only if 17863d3b0591SJens Wiklander * if s_i == -1; 1787817466cbSJens Wiklander * 1788817466cbSJens Wiklander * Calling conventions: 1789817466cbSJens Wiklander * - x is an array of size d + 1 1790817466cbSJens Wiklander * - w is the size, ie number of teeth, of the comb, and must be between 1791817466cbSJens Wiklander * 2 and 7 (in practice, between 2 and MBEDTLS_ECP_WINDOW_SIZE) 1792817466cbSJens Wiklander * - m is the MPI, expected to be odd and such that bitlength(m) <= w * d 1793817466cbSJens Wiklander * (the result will be incorrect if these assumptions are not satisfied) 1794817466cbSJens Wiklander */ 17953d3b0591SJens Wiklander static void ecp_comb_recode_core( unsigned char x[], size_t d, 1796817466cbSJens Wiklander unsigned char w, const mbedtls_mpi *m ) 1797817466cbSJens Wiklander { 1798817466cbSJens Wiklander size_t i, j; 1799817466cbSJens Wiklander unsigned char c, cc, adjust; 1800817466cbSJens Wiklander 1801817466cbSJens Wiklander memset( x, 0, d+1 ); 1802817466cbSJens Wiklander 1803817466cbSJens Wiklander /* First get the classical comb values (except for x_d = 0) */ 1804817466cbSJens Wiklander for( i = 0; i < d; i++ ) 1805817466cbSJens Wiklander for( j = 0; j < w; j++ ) 1806817466cbSJens Wiklander x[i] |= mbedtls_mpi_get_bit( m, i + d * j ) << j; 1807817466cbSJens Wiklander 1808817466cbSJens Wiklander /* Now make sure x_1 .. x_d are odd */ 1809817466cbSJens Wiklander c = 0; 1810817466cbSJens Wiklander for( i = 1; i <= d; i++ ) 1811817466cbSJens Wiklander { 1812817466cbSJens Wiklander /* Add carry and update it */ 1813817466cbSJens Wiklander cc = x[i] & c; 1814817466cbSJens Wiklander x[i] = x[i] ^ c; 1815817466cbSJens Wiklander c = cc; 1816817466cbSJens Wiklander 1817817466cbSJens Wiklander /* Adjust if needed, avoiding branches */ 1818817466cbSJens Wiklander adjust = 1 - ( x[i] & 0x01 ); 1819817466cbSJens Wiklander c |= x[i] & ( x[i-1] * adjust ); 1820817466cbSJens Wiklander x[i] = x[i] ^ ( x[i-1] * adjust ); 1821817466cbSJens Wiklander x[i-1] |= adjust << 7; 1822817466cbSJens Wiklander } 1823817466cbSJens Wiklander } 1824817466cbSJens Wiklander 1825817466cbSJens Wiklander /* 18263d3b0591SJens Wiklander * Precompute points for the adapted comb method 1827817466cbSJens Wiklander * 18283d3b0591SJens Wiklander * Assumption: T must be able to hold 2^{w - 1} elements. 1829817466cbSJens Wiklander * 18303d3b0591SJens Wiklander * Operation: If i = i_{w-1} ... i_1 is the binary representation of i, 18313d3b0591SJens Wiklander * sets T[i] = i_{w-1} 2^{(w-1)d} P + ... + i_1 2^d P + P. 1832817466cbSJens Wiklander * 1833817466cbSJens Wiklander * Cost: d(w-1) D + (2^{w-1} - 1) A + 1 N(w-1) + 1 N(2^{w-1} - 1) 18343d3b0591SJens Wiklander * 18353d3b0591SJens Wiklander * Note: Even comb values (those where P would be omitted from the 18363d3b0591SJens Wiklander * sum defining T[i] above) are not needed in our adaption 18373d3b0591SJens Wiklander * the comb method. See ecp_comb_recode_core(). 18383d3b0591SJens Wiklander * 18393d3b0591SJens Wiklander * This function currently works in four steps: 18403d3b0591SJens Wiklander * (1) [dbl] Computation of intermediate T[i] for 2-power values of i 18413d3b0591SJens Wiklander * (2) [norm_dbl] Normalization of coordinates of these T[i] 18423d3b0591SJens Wiklander * (3) [add] Computation of all T[i] 18433d3b0591SJens Wiklander * (4) [norm_add] Normalization of all T[i] 18443d3b0591SJens Wiklander * 18453d3b0591SJens Wiklander * Step 1 can be interrupted but not the others; together with the final 18463d3b0591SJens Wiklander * coordinate normalization they are the largest steps done at once, depending 18473d3b0591SJens Wiklander * on the window size. Here are operation counts for P-256: 18483d3b0591SJens Wiklander * 18493d3b0591SJens Wiklander * step (2) (3) (4) 18503d3b0591SJens Wiklander * w = 5 142 165 208 18513d3b0591SJens Wiklander * w = 4 136 77 160 18523d3b0591SJens Wiklander * w = 3 130 33 136 18533d3b0591SJens Wiklander * w = 2 124 11 124 18543d3b0591SJens Wiklander * 18553d3b0591SJens Wiklander * So if ECC operations are blocking for too long even with a low max_ops 18563d3b0591SJens Wiklander * value, it's useful to set MBEDTLS_ECP_WINDOW_SIZE to a lower value in order 18573d3b0591SJens Wiklander * to minimize maximum blocking time. 1858817466cbSJens Wiklander */ 1859817466cbSJens Wiklander static int ecp_precompute_comb( const mbedtls_ecp_group *grp, 1860817466cbSJens Wiklander mbedtls_ecp_point T[], const mbedtls_ecp_point *P, 18613d3b0591SJens Wiklander unsigned char w, size_t d, 18623d3b0591SJens Wiklander mbedtls_ecp_restart_ctx *rs_ctx ) 1863817466cbSJens Wiklander { 186411fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 18653d3b0591SJens Wiklander unsigned char i; 18663d3b0591SJens Wiklander size_t j = 0; 18673d3b0591SJens Wiklander const unsigned char T_size = 1U << ( w - 1 ); 1868817466cbSJens Wiklander mbedtls_ecp_point *cur, *TT[COMB_MAX_PRE - 1]; 1869817466cbSJens Wiklander 18703d3b0591SJens Wiklander #if defined(MBEDTLS_ECP_RESTARTABLE) 18713d3b0591SJens Wiklander if( rs_ctx != NULL && rs_ctx->rsm != NULL ) 18723d3b0591SJens Wiklander { 18733d3b0591SJens Wiklander if( rs_ctx->rsm->state == ecp_rsm_pre_dbl ) 18743d3b0591SJens Wiklander goto dbl; 18753d3b0591SJens Wiklander if( rs_ctx->rsm->state == ecp_rsm_pre_norm_dbl ) 18763d3b0591SJens Wiklander goto norm_dbl; 18773d3b0591SJens Wiklander if( rs_ctx->rsm->state == ecp_rsm_pre_add ) 18783d3b0591SJens Wiklander goto add; 18793d3b0591SJens Wiklander if( rs_ctx->rsm->state == ecp_rsm_pre_norm_add ) 18803d3b0591SJens Wiklander goto norm_add; 18813d3b0591SJens Wiklander } 18823d3b0591SJens Wiklander #else 18833d3b0591SJens Wiklander (void) rs_ctx; 18843d3b0591SJens Wiklander #endif 18853d3b0591SJens Wiklander 18863d3b0591SJens Wiklander #if defined(MBEDTLS_ECP_RESTARTABLE) 18873d3b0591SJens Wiklander if( rs_ctx != NULL && rs_ctx->rsm != NULL ) 18883d3b0591SJens Wiklander { 18893d3b0591SJens Wiklander rs_ctx->rsm->state = ecp_rsm_pre_dbl; 18903d3b0591SJens Wiklander 18913d3b0591SJens Wiklander /* initial state for the loop */ 18923d3b0591SJens Wiklander rs_ctx->rsm->i = 0; 18933d3b0591SJens Wiklander } 18943d3b0591SJens Wiklander 18953d3b0591SJens Wiklander dbl: 18963d3b0591SJens Wiklander #endif 1897817466cbSJens Wiklander /* 1898817466cbSJens Wiklander * Set T[0] = P and 1899817466cbSJens Wiklander * T[2^{l-1}] = 2^{dl} P for l = 1 .. w-1 (this is not the final value) 1900817466cbSJens Wiklander */ 1901817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_ecp_copy( &T[0], P ) ); 1902817466cbSJens Wiklander 19033d3b0591SJens Wiklander #if defined(MBEDTLS_ECP_RESTARTABLE) 19043d3b0591SJens Wiklander if( rs_ctx != NULL && rs_ctx->rsm != NULL && rs_ctx->rsm->i != 0 ) 19053d3b0591SJens Wiklander j = rs_ctx->rsm->i; 19063d3b0591SJens Wiklander else 19073d3b0591SJens Wiklander #endif 19083d3b0591SJens Wiklander j = 0; 1909817466cbSJens Wiklander 19103d3b0591SJens Wiklander for( ; j < d * ( w - 1 ); j++ ) 19113d3b0591SJens Wiklander { 19123d3b0591SJens Wiklander MBEDTLS_ECP_BUDGET( MBEDTLS_ECP_OPS_DBL ); 19133d3b0591SJens Wiklander 19143d3b0591SJens Wiklander i = 1U << ( j / d ); 19153d3b0591SJens Wiklander cur = T + i; 19163d3b0591SJens Wiklander 19173d3b0591SJens Wiklander if( j % d == 0 ) 19183d3b0591SJens Wiklander MBEDTLS_MPI_CHK( mbedtls_ecp_copy( cur, T + ( i >> 1 ) ) ); 19193d3b0591SJens Wiklander 19203d3b0591SJens Wiklander MBEDTLS_MPI_CHK( ecp_double_jac( grp, cur, cur ) ); 1921817466cbSJens Wiklander } 1922817466cbSJens Wiklander 19233d3b0591SJens Wiklander #if defined(MBEDTLS_ECP_RESTARTABLE) 19243d3b0591SJens Wiklander if( rs_ctx != NULL && rs_ctx->rsm != NULL ) 19253d3b0591SJens Wiklander rs_ctx->rsm->state = ecp_rsm_pre_norm_dbl; 1926817466cbSJens Wiklander 19273d3b0591SJens Wiklander norm_dbl: 19283d3b0591SJens Wiklander #endif 19293d3b0591SJens Wiklander /* 19303d3b0591SJens Wiklander * Normalize current elements in T. As T has holes, 19313d3b0591SJens Wiklander * use an auxiliary array of pointers to elements in T. 19323d3b0591SJens Wiklander */ 19333d3b0591SJens Wiklander j = 0; 19343d3b0591SJens Wiklander for( i = 1; i < T_size; i <<= 1 ) 19353d3b0591SJens Wiklander TT[j++] = T + i; 19363d3b0591SJens Wiklander 19373d3b0591SJens Wiklander MBEDTLS_ECP_BUDGET( MBEDTLS_ECP_OPS_INV + 6 * j - 2 ); 19383d3b0591SJens Wiklander 19393d3b0591SJens Wiklander MBEDTLS_MPI_CHK( ecp_normalize_jac_many( grp, TT, j ) ); 19403d3b0591SJens Wiklander 19413d3b0591SJens Wiklander #if defined(MBEDTLS_ECP_RESTARTABLE) 19423d3b0591SJens Wiklander if( rs_ctx != NULL && rs_ctx->rsm != NULL ) 19433d3b0591SJens Wiklander rs_ctx->rsm->state = ecp_rsm_pre_add; 19443d3b0591SJens Wiklander 19453d3b0591SJens Wiklander add: 19463d3b0591SJens Wiklander #endif 1947817466cbSJens Wiklander /* 1948817466cbSJens Wiklander * Compute the remaining ones using the minimal number of additions 1949817466cbSJens Wiklander * Be careful to update T[2^l] only after using it! 1950817466cbSJens Wiklander */ 19513d3b0591SJens Wiklander MBEDTLS_ECP_BUDGET( ( T_size - 1 ) * MBEDTLS_ECP_OPS_ADD ); 19523d3b0591SJens Wiklander 19533d3b0591SJens Wiklander for( i = 1; i < T_size; i <<= 1 ) 1954817466cbSJens Wiklander { 1955817466cbSJens Wiklander j = i; 1956817466cbSJens Wiklander while( j-- ) 1957817466cbSJens Wiklander MBEDTLS_MPI_CHK( ecp_add_mixed( grp, &T[i + j], &T[j], &T[i] ) ); 1958817466cbSJens Wiklander } 1959817466cbSJens Wiklander 19603d3b0591SJens Wiklander #if defined(MBEDTLS_ECP_RESTARTABLE) 19613d3b0591SJens Wiklander if( rs_ctx != NULL && rs_ctx->rsm != NULL ) 19623d3b0591SJens Wiklander rs_ctx->rsm->state = ecp_rsm_pre_norm_add; 19633d3b0591SJens Wiklander 19643d3b0591SJens Wiklander norm_add: 19653d3b0591SJens Wiklander #endif 19663d3b0591SJens Wiklander /* 19673d3b0591SJens Wiklander * Normalize final elements in T. Even though there are no holes now, we 19683d3b0591SJens Wiklander * still need the auxiliary array for homogeneity with the previous 19693d3b0591SJens Wiklander * call. Also, skip T[0] which is already normalised, being a copy of P. 19703d3b0591SJens Wiklander */ 19713d3b0591SJens Wiklander for( j = 0; j + 1 < T_size; j++ ) 19723d3b0591SJens Wiklander TT[j] = T + j + 1; 19733d3b0591SJens Wiklander 19743d3b0591SJens Wiklander MBEDTLS_ECP_BUDGET( MBEDTLS_ECP_OPS_INV + 6 * j - 2 ); 19753d3b0591SJens Wiklander 19763d3b0591SJens Wiklander MBEDTLS_MPI_CHK( ecp_normalize_jac_many( grp, TT, j ) ); 1977817466cbSJens Wiklander 1978817466cbSJens Wiklander cleanup: 19793d3b0591SJens Wiklander #if defined(MBEDTLS_ECP_RESTARTABLE) 19803d3b0591SJens Wiklander if( rs_ctx != NULL && rs_ctx->rsm != NULL && 19813d3b0591SJens Wiklander ret == MBEDTLS_ERR_ECP_IN_PROGRESS ) 19823d3b0591SJens Wiklander { 19833d3b0591SJens Wiklander if( rs_ctx->rsm->state == ecp_rsm_pre_dbl ) 19843d3b0591SJens Wiklander rs_ctx->rsm->i = j; 19853d3b0591SJens Wiklander } 19863d3b0591SJens Wiklander #endif 1987817466cbSJens Wiklander 1988817466cbSJens Wiklander return( ret ); 1989817466cbSJens Wiklander } 1990817466cbSJens Wiklander 1991817466cbSJens Wiklander /* 1992817466cbSJens Wiklander * Select precomputed point: R = sign(i) * T[ abs(i) / 2 ] 19933d3b0591SJens Wiklander * 19943d3b0591SJens Wiklander * See ecp_comb_recode_core() for background 1995817466cbSJens Wiklander */ 1996817466cbSJens Wiklander static int ecp_select_comb( const mbedtls_ecp_group *grp, mbedtls_ecp_point *R, 19973d3b0591SJens Wiklander const mbedtls_ecp_point T[], unsigned char T_size, 1998817466cbSJens Wiklander unsigned char i ) 1999817466cbSJens Wiklander { 200011fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 2001817466cbSJens Wiklander unsigned char ii, j; 2002817466cbSJens Wiklander 2003817466cbSJens Wiklander /* Ignore the "sign" bit and scale down */ 2004817466cbSJens Wiklander ii = ( i & 0x7Fu ) >> 1; 2005817466cbSJens Wiklander 2006817466cbSJens Wiklander /* Read the whole table to thwart cache-based timing attacks */ 20073d3b0591SJens Wiklander for( j = 0; j < T_size; j++ ) 2008817466cbSJens Wiklander { 2009817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_safe_cond_assign( &R->X, &T[j].X, j == ii ) ); 2010817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_safe_cond_assign( &R->Y, &T[j].Y, j == ii ) ); 2011817466cbSJens Wiklander } 2012817466cbSJens Wiklander 2013817466cbSJens Wiklander /* Safely invert result if i is "negative" */ 2014817466cbSJens Wiklander MBEDTLS_MPI_CHK( ecp_safe_invert_jac( grp, R, i >> 7 ) ); 2015817466cbSJens Wiklander 2016817466cbSJens Wiklander cleanup: 2017817466cbSJens Wiklander return( ret ); 2018817466cbSJens Wiklander } 2019817466cbSJens Wiklander 2020817466cbSJens Wiklander /* 2021817466cbSJens Wiklander * Core multiplication algorithm for the (modified) comb method. 2022817466cbSJens Wiklander * This part is actually common with the basic comb method (GECC 3.44) 2023817466cbSJens Wiklander * 2024817466cbSJens Wiklander * Cost: d A + d D + 1 R 2025817466cbSJens Wiklander */ 2026817466cbSJens Wiklander static int ecp_mul_comb_core( const mbedtls_ecp_group *grp, mbedtls_ecp_point *R, 20273d3b0591SJens Wiklander const mbedtls_ecp_point T[], unsigned char T_size, 2028817466cbSJens Wiklander const unsigned char x[], size_t d, 2029817466cbSJens Wiklander int (*f_rng)(void *, unsigned char *, size_t), 20303d3b0591SJens Wiklander void *p_rng, 20313d3b0591SJens Wiklander mbedtls_ecp_restart_ctx *rs_ctx ) 2032817466cbSJens Wiklander { 203311fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 2034817466cbSJens Wiklander mbedtls_ecp_point Txi; 2035817466cbSJens Wiklander size_t i; 2036817466cbSJens Wiklander 2037817466cbSJens Wiklander mbedtls_ecp_point_init( &Txi ); 2038817466cbSJens Wiklander 20393d3b0591SJens Wiklander #if !defined(MBEDTLS_ECP_RESTARTABLE) 20403d3b0591SJens Wiklander (void) rs_ctx; 20413d3b0591SJens Wiklander #endif 20423d3b0591SJens Wiklander 20433d3b0591SJens Wiklander #if defined(MBEDTLS_ECP_RESTARTABLE) 20443d3b0591SJens Wiklander if( rs_ctx != NULL && rs_ctx->rsm != NULL && 20453d3b0591SJens Wiklander rs_ctx->rsm->state != ecp_rsm_comb_core ) 20463d3b0591SJens Wiklander { 20473d3b0591SJens Wiklander rs_ctx->rsm->i = 0; 20483d3b0591SJens Wiklander rs_ctx->rsm->state = ecp_rsm_comb_core; 20493d3b0591SJens Wiklander } 20503d3b0591SJens Wiklander 20513d3b0591SJens Wiklander /* new 'if' instead of nested for the sake of the 'else' branch */ 20523d3b0591SJens Wiklander if( rs_ctx != NULL && rs_ctx->rsm != NULL && rs_ctx->rsm->i != 0 ) 20533d3b0591SJens Wiklander { 20543d3b0591SJens Wiklander /* restore current index (R already pointing to rs_ctx->rsm->R) */ 20553d3b0591SJens Wiklander i = rs_ctx->rsm->i; 20563d3b0591SJens Wiklander } 20573d3b0591SJens Wiklander else 20583d3b0591SJens Wiklander #endif 20593d3b0591SJens Wiklander { 2060817466cbSJens Wiklander /* Start with a non-zero point and randomize its coordinates */ 2061817466cbSJens Wiklander i = d; 20623d3b0591SJens Wiklander MBEDTLS_MPI_CHK( ecp_select_comb( grp, R, T, T_size, x[i] ) ); 2063817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_lset( &R->Z, 1 ) ); 2064*7901324dSJerome Forissier #if defined(MBEDTLS_ECP_NO_INTERNAL_RNG) 2065817466cbSJens Wiklander if( f_rng != 0 ) 2066*7901324dSJerome Forissier #endif 2067817466cbSJens Wiklander MBEDTLS_MPI_CHK( ecp_randomize_jac( grp, R, f_rng, p_rng ) ); 20683d3b0591SJens Wiklander } 2069817466cbSJens Wiklander 20703d3b0591SJens Wiklander while( i != 0 ) 2071817466cbSJens Wiklander { 20723d3b0591SJens Wiklander MBEDTLS_ECP_BUDGET( MBEDTLS_ECP_OPS_DBL + MBEDTLS_ECP_OPS_ADD ); 20733d3b0591SJens Wiklander --i; 20743d3b0591SJens Wiklander 2075817466cbSJens Wiklander MBEDTLS_MPI_CHK( ecp_double_jac( grp, R, R ) ); 20763d3b0591SJens Wiklander MBEDTLS_MPI_CHK( ecp_select_comb( grp, &Txi, T, T_size, x[i] ) ); 2077817466cbSJens Wiklander MBEDTLS_MPI_CHK( ecp_add_mixed( grp, R, R, &Txi ) ); 2078817466cbSJens Wiklander } 2079817466cbSJens Wiklander 2080817466cbSJens Wiklander cleanup: 2081817466cbSJens Wiklander 2082817466cbSJens Wiklander mbedtls_ecp_point_free( &Txi ); 2083817466cbSJens Wiklander 20843d3b0591SJens Wiklander #if defined(MBEDTLS_ECP_RESTARTABLE) 20853d3b0591SJens Wiklander if( rs_ctx != NULL && rs_ctx->rsm != NULL && 20863d3b0591SJens Wiklander ret == MBEDTLS_ERR_ECP_IN_PROGRESS ) 20873d3b0591SJens Wiklander { 20883d3b0591SJens Wiklander rs_ctx->rsm->i = i; 20893d3b0591SJens Wiklander /* no need to save R, already pointing to rs_ctx->rsm->R */ 20903d3b0591SJens Wiklander } 20913d3b0591SJens Wiklander #endif 20923d3b0591SJens Wiklander 2093817466cbSJens Wiklander return( ret ); 2094817466cbSJens Wiklander } 2095817466cbSJens Wiklander 2096817466cbSJens Wiklander /* 20973d3b0591SJens Wiklander * Recode the scalar to get constant-time comb multiplication 20983d3b0591SJens Wiklander * 20993d3b0591SJens Wiklander * As the actual scalar recoding needs an odd scalar as a starting point, 21003d3b0591SJens Wiklander * this wrapper ensures that by replacing m by N - m if necessary, and 21013d3b0591SJens Wiklander * informs the caller that the result of multiplication will be negated. 21023d3b0591SJens Wiklander * 21033d3b0591SJens Wiklander * This works because we only support large prime order for Short Weierstrass 21043d3b0591SJens Wiklander * curves, so N is always odd hence either m or N - m is. 21053d3b0591SJens Wiklander * 21063d3b0591SJens Wiklander * See ecp_comb_recode_core() for background. 2107817466cbSJens Wiklander */ 21083d3b0591SJens Wiklander static int ecp_comb_recode_scalar( const mbedtls_ecp_group *grp, 21093d3b0591SJens Wiklander const mbedtls_mpi *m, 21103d3b0591SJens Wiklander unsigned char k[COMB_MAX_D + 1], 21113d3b0591SJens Wiklander size_t d, 21123d3b0591SJens Wiklander unsigned char w, 21133d3b0591SJens Wiklander unsigned char *parity_trick ) 2114817466cbSJens Wiklander { 211511fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 2116817466cbSJens Wiklander mbedtls_mpi M, mm; 2117817466cbSJens Wiklander 2118817466cbSJens Wiklander mbedtls_mpi_init( &M ); 2119817466cbSJens Wiklander mbedtls_mpi_init( &mm ); 2120817466cbSJens Wiklander 21213d3b0591SJens Wiklander /* N is always odd (see above), just make extra sure */ 2122817466cbSJens Wiklander if( mbedtls_mpi_get_bit( &grp->N, 0 ) != 1 ) 2123817466cbSJens Wiklander return( MBEDTLS_ERR_ECP_BAD_INPUT_DATA ); 2124817466cbSJens Wiklander 21253d3b0591SJens Wiklander /* do we need the parity trick? */ 21263d3b0591SJens Wiklander *parity_trick = ( mbedtls_mpi_get_bit( m, 0 ) == 0 ); 21273d3b0591SJens Wiklander 21283d3b0591SJens Wiklander /* execute parity fix in constant time */ 21293d3b0591SJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_copy( &M, m ) ); 21303d3b0591SJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_sub_mpi( &mm, &grp->N, m ) ); 21313d3b0591SJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_safe_cond_assign( &M, &mm, *parity_trick ) ); 21323d3b0591SJens Wiklander 21333d3b0591SJens Wiklander /* actual scalar recoding */ 21343d3b0591SJens Wiklander ecp_comb_recode_core( k, d, w, &M ); 21353d3b0591SJens Wiklander 21363d3b0591SJens Wiklander cleanup: 21373d3b0591SJens Wiklander mbedtls_mpi_free( &mm ); 21383d3b0591SJens Wiklander mbedtls_mpi_free( &M ); 21393d3b0591SJens Wiklander 21403d3b0591SJens Wiklander return( ret ); 21413d3b0591SJens Wiklander } 21423d3b0591SJens Wiklander 21433d3b0591SJens Wiklander /* 21443d3b0591SJens Wiklander * Perform comb multiplication (for short Weierstrass curves) 21453d3b0591SJens Wiklander * once the auxiliary table has been pre-computed. 21463d3b0591SJens Wiklander * 21473d3b0591SJens Wiklander * Scalar recoding may use a parity trick that makes us compute -m * P, 21483d3b0591SJens Wiklander * if that is the case we'll need to recover m * P at the end. 21493d3b0591SJens Wiklander */ 21503d3b0591SJens Wiklander static int ecp_mul_comb_after_precomp( const mbedtls_ecp_group *grp, 21513d3b0591SJens Wiklander mbedtls_ecp_point *R, 21523d3b0591SJens Wiklander const mbedtls_mpi *m, 21533d3b0591SJens Wiklander const mbedtls_ecp_point *T, 21543d3b0591SJens Wiklander unsigned char T_size, 21553d3b0591SJens Wiklander unsigned char w, 21563d3b0591SJens Wiklander size_t d, 21573d3b0591SJens Wiklander int (*f_rng)(void *, unsigned char *, size_t), 21583d3b0591SJens Wiklander void *p_rng, 21593d3b0591SJens Wiklander mbedtls_ecp_restart_ctx *rs_ctx ) 21603d3b0591SJens Wiklander { 216111fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 21623d3b0591SJens Wiklander unsigned char parity_trick; 21633d3b0591SJens Wiklander unsigned char k[COMB_MAX_D + 1]; 21643d3b0591SJens Wiklander mbedtls_ecp_point *RR = R; 21653d3b0591SJens Wiklander 21663d3b0591SJens Wiklander #if defined(MBEDTLS_ECP_RESTARTABLE) 21673d3b0591SJens Wiklander if( rs_ctx != NULL && rs_ctx->rsm != NULL ) 21683d3b0591SJens Wiklander { 21693d3b0591SJens Wiklander RR = &rs_ctx->rsm->R; 21703d3b0591SJens Wiklander 21713d3b0591SJens Wiklander if( rs_ctx->rsm->state == ecp_rsm_final_norm ) 21723d3b0591SJens Wiklander goto final_norm; 21733d3b0591SJens Wiklander } 21743d3b0591SJens Wiklander #endif 21753d3b0591SJens Wiklander 21763d3b0591SJens Wiklander MBEDTLS_MPI_CHK( ecp_comb_recode_scalar( grp, m, k, d, w, 21773d3b0591SJens Wiklander &parity_trick ) ); 21783d3b0591SJens Wiklander MBEDTLS_MPI_CHK( ecp_mul_comb_core( grp, RR, T, T_size, k, d, 21793d3b0591SJens Wiklander f_rng, p_rng, rs_ctx ) ); 21803d3b0591SJens Wiklander MBEDTLS_MPI_CHK( ecp_safe_invert_jac( grp, RR, parity_trick ) ); 21813d3b0591SJens Wiklander 21823d3b0591SJens Wiklander #if defined(MBEDTLS_ECP_RESTARTABLE) 21833d3b0591SJens Wiklander if( rs_ctx != NULL && rs_ctx->rsm != NULL ) 21843d3b0591SJens Wiklander rs_ctx->rsm->state = ecp_rsm_final_norm; 21853d3b0591SJens Wiklander 21863d3b0591SJens Wiklander final_norm: 2187*7901324dSJerome Forissier MBEDTLS_ECP_BUDGET( MBEDTLS_ECP_OPS_INV ); 21883d3b0591SJens Wiklander #endif 218911fa71b9SJerome Forissier /* 219011fa71b9SJerome Forissier * Knowledge of the jacobian coordinates may leak the last few bits of the 219111fa71b9SJerome Forissier * scalar [1], and since our MPI implementation isn't constant-flow, 219211fa71b9SJerome Forissier * inversion (used for coordinate normalization) may leak the full value 219311fa71b9SJerome Forissier * of its input via side-channels [2]. 219411fa71b9SJerome Forissier * 219511fa71b9SJerome Forissier * [1] https://eprint.iacr.org/2003/191 219611fa71b9SJerome Forissier * [2] https://eprint.iacr.org/2020/055 219711fa71b9SJerome Forissier * 219811fa71b9SJerome Forissier * Avoid the leak by randomizing coordinates before we normalize them. 219911fa71b9SJerome Forissier */ 2200*7901324dSJerome Forissier #if defined(MBEDTLS_ECP_NO_INTERNAL_RNG) 220111fa71b9SJerome Forissier if( f_rng != 0 ) 2202*7901324dSJerome Forissier #endif 220311fa71b9SJerome Forissier MBEDTLS_MPI_CHK( ecp_randomize_jac( grp, RR, f_rng, p_rng ) ); 220411fa71b9SJerome Forissier 22053d3b0591SJens Wiklander MBEDTLS_MPI_CHK( ecp_normalize_jac( grp, RR ) ); 22063d3b0591SJens Wiklander 22073d3b0591SJens Wiklander #if defined(MBEDTLS_ECP_RESTARTABLE) 22083d3b0591SJens Wiklander if( rs_ctx != NULL && rs_ctx->rsm != NULL ) 22093d3b0591SJens Wiklander MBEDTLS_MPI_CHK( mbedtls_ecp_copy( R, RR ) ); 22103d3b0591SJens Wiklander #endif 22113d3b0591SJens Wiklander 22123d3b0591SJens Wiklander cleanup: 22133d3b0591SJens Wiklander return( ret ); 22143d3b0591SJens Wiklander } 22153d3b0591SJens Wiklander 22163d3b0591SJens Wiklander /* 22173d3b0591SJens Wiklander * Pick window size based on curve size and whether we optimize for base point 22183d3b0591SJens Wiklander */ 22193d3b0591SJens Wiklander static unsigned char ecp_pick_window_size( const mbedtls_ecp_group *grp, 22203d3b0591SJens Wiklander unsigned char p_eq_g ) 22213d3b0591SJens Wiklander { 22223d3b0591SJens Wiklander unsigned char w; 22233d3b0591SJens Wiklander 2224817466cbSJens Wiklander /* 2225817466cbSJens Wiklander * Minimize the number of multiplications, that is minimize 2226817466cbSJens Wiklander * 10 * d * w + 18 * 2^(w-1) + 11 * d + 7 * w, with d = ceil( nbits / w ) 2227817466cbSJens Wiklander * (see costs of the various parts, with 1S = 1M) 2228817466cbSJens Wiklander */ 2229817466cbSJens Wiklander w = grp->nbits >= 384 ? 5 : 4; 2230817466cbSJens Wiklander 2231817466cbSJens Wiklander /* 2232817466cbSJens Wiklander * If P == G, pre-compute a bit more, since this may be re-used later. 2233817466cbSJens Wiklander * Just adding one avoids upping the cost of the first mul too much, 2234817466cbSJens Wiklander * and the memory cost too. 2235817466cbSJens Wiklander */ 2236817466cbSJens Wiklander if( p_eq_g ) 2237817466cbSJens Wiklander w++; 2238817466cbSJens Wiklander 2239817466cbSJens Wiklander /* 2240817466cbSJens Wiklander * Make sure w is within bounds. 2241817466cbSJens Wiklander * (The last test is useful only for very small curves in the test suite.) 2242817466cbSJens Wiklander */ 224311fa71b9SJerome Forissier #if( MBEDTLS_ECP_WINDOW_SIZE < 6 ) 2244817466cbSJens Wiklander if( w > MBEDTLS_ECP_WINDOW_SIZE ) 2245817466cbSJens Wiklander w = MBEDTLS_ECP_WINDOW_SIZE; 224611fa71b9SJerome Forissier #endif 2247817466cbSJens Wiklander if( w >= grp->nbits ) 2248817466cbSJens Wiklander w = 2; 2249817466cbSJens Wiklander 22503d3b0591SJens Wiklander return( w ); 22513d3b0591SJens Wiklander } 2252817466cbSJens Wiklander 2253817466cbSJens Wiklander /* 22543d3b0591SJens Wiklander * Multiplication using the comb method - for curves in short Weierstrass form 22553d3b0591SJens Wiklander * 22563d3b0591SJens Wiklander * This function is mainly responsible for administrative work: 22573d3b0591SJens Wiklander * - managing the restart context if enabled 22583d3b0591SJens Wiklander * - managing the table of precomputed points (passed between the below two 22593d3b0591SJens Wiklander * functions): allocation, computation, ownership tranfer, freeing. 22603d3b0591SJens Wiklander * 22613d3b0591SJens Wiklander * It delegates the actual arithmetic work to: 22623d3b0591SJens Wiklander * ecp_precompute_comb() and ecp_mul_comb_with_precomp() 22633d3b0591SJens Wiklander * 22643d3b0591SJens Wiklander * See comments on ecp_comb_recode_core() regarding the computation strategy. 2265817466cbSJens Wiklander */ 22663d3b0591SJens Wiklander static int ecp_mul_comb( mbedtls_ecp_group *grp, mbedtls_ecp_point *R, 22673d3b0591SJens Wiklander const mbedtls_mpi *m, const mbedtls_ecp_point *P, 22683d3b0591SJens Wiklander int (*f_rng)(void *, unsigned char *, size_t), 22693d3b0591SJens Wiklander void *p_rng, 22703d3b0591SJens Wiklander mbedtls_ecp_restart_ctx *rs_ctx ) 2271817466cbSJens Wiklander { 227211fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 22733d3b0591SJens Wiklander unsigned char w, p_eq_g, i; 22743d3b0591SJens Wiklander size_t d; 2275*7901324dSJerome Forissier unsigned char T_size = 0, T_ok = 0; 2276*7901324dSJerome Forissier mbedtls_ecp_point *T = NULL; 2277*7901324dSJerome Forissier #if !defined(MBEDTLS_ECP_NO_INTERNAL_RNG) 2278*7901324dSJerome Forissier ecp_drbg_context drbg_ctx; 2279*7901324dSJerome Forissier 2280*7901324dSJerome Forissier ecp_drbg_init( &drbg_ctx ); 2281*7901324dSJerome Forissier #endif 22823d3b0591SJens Wiklander 22833d3b0591SJens Wiklander ECP_RS_ENTER( rsm ); 22843d3b0591SJens Wiklander 2285*7901324dSJerome Forissier #if !defined(MBEDTLS_ECP_NO_INTERNAL_RNG) 2286*7901324dSJerome Forissier if( f_rng == NULL ) 2287*7901324dSJerome Forissier { 2288*7901324dSJerome Forissier /* Adjust pointers */ 2289*7901324dSJerome Forissier f_rng = &ecp_drbg_random; 2290*7901324dSJerome Forissier #if defined(MBEDTLS_ECP_RESTARTABLE) 2291*7901324dSJerome Forissier if( rs_ctx != NULL && rs_ctx->rsm != NULL ) 2292*7901324dSJerome Forissier p_rng = &rs_ctx->rsm->drbg_ctx; 2293*7901324dSJerome Forissier else 2294*7901324dSJerome Forissier #endif 2295*7901324dSJerome Forissier p_rng = &drbg_ctx; 2296*7901324dSJerome Forissier 2297*7901324dSJerome Forissier /* Initialize internal DRBG if necessary */ 2298*7901324dSJerome Forissier #if defined(MBEDTLS_ECP_RESTARTABLE) 2299*7901324dSJerome Forissier if( rs_ctx == NULL || rs_ctx->rsm == NULL || 2300*7901324dSJerome Forissier rs_ctx->rsm->drbg_seeded == 0 ) 2301*7901324dSJerome Forissier #endif 2302*7901324dSJerome Forissier { 2303*7901324dSJerome Forissier const size_t m_len = ( grp->nbits + 7 ) / 8; 2304*7901324dSJerome Forissier MBEDTLS_MPI_CHK( ecp_drbg_seed( p_rng, m, m_len ) ); 2305*7901324dSJerome Forissier } 2306*7901324dSJerome Forissier #if defined(MBEDTLS_ECP_RESTARTABLE) 2307*7901324dSJerome Forissier if( rs_ctx != NULL && rs_ctx->rsm != NULL ) 2308*7901324dSJerome Forissier rs_ctx->rsm->drbg_seeded = 1; 2309*7901324dSJerome Forissier #endif 2310*7901324dSJerome Forissier } 2311*7901324dSJerome Forissier #endif /* !MBEDTLS_ECP_NO_INTERNAL_RNG */ 2312*7901324dSJerome Forissier 23133d3b0591SJens Wiklander /* Is P the base point ? */ 23143d3b0591SJens Wiklander #if MBEDTLS_ECP_FIXED_POINT_OPTIM == 1 23153d3b0591SJens Wiklander p_eq_g = ( mbedtls_mpi_cmp_mpi( &P->Y, &grp->G.Y ) == 0 && 23163d3b0591SJens Wiklander mbedtls_mpi_cmp_mpi( &P->X, &grp->G.X ) == 0 ); 23173d3b0591SJens Wiklander #else 23183d3b0591SJens Wiklander p_eq_g = 0; 23193d3b0591SJens Wiklander #endif 23203d3b0591SJens Wiklander 23213d3b0591SJens Wiklander /* Pick window size and deduce related sizes */ 23223d3b0591SJens Wiklander w = ecp_pick_window_size( grp, p_eq_g ); 23233d3b0591SJens Wiklander T_size = 1U << ( w - 1 ); 23243d3b0591SJens Wiklander d = ( grp->nbits + w - 1 ) / w; 23253d3b0591SJens Wiklander 23263d3b0591SJens Wiklander /* Pre-computed table: do we have it already for the base point? */ 23273d3b0591SJens Wiklander if( p_eq_g && grp->T != NULL ) 23283d3b0591SJens Wiklander { 23293d3b0591SJens Wiklander /* second pointer to the same table, will be deleted on exit */ 23303d3b0591SJens Wiklander T = grp->T; 23313d3b0591SJens Wiklander T_ok = 1; 23323d3b0591SJens Wiklander } 23333d3b0591SJens Wiklander else 23343d3b0591SJens Wiklander #if defined(MBEDTLS_ECP_RESTARTABLE) 23353d3b0591SJens Wiklander /* Pre-computed table: do we have one in progress? complete? */ 23363d3b0591SJens Wiklander if( rs_ctx != NULL && rs_ctx->rsm != NULL && rs_ctx->rsm->T != NULL ) 23373d3b0591SJens Wiklander { 23383d3b0591SJens Wiklander /* transfer ownership of T from rsm to local function */ 23393d3b0591SJens Wiklander T = rs_ctx->rsm->T; 23403d3b0591SJens Wiklander rs_ctx->rsm->T = NULL; 23413d3b0591SJens Wiklander rs_ctx->rsm->T_size = 0; 23423d3b0591SJens Wiklander 23433d3b0591SJens Wiklander /* This effectively jumps to the call to mul_comb_after_precomp() */ 23443d3b0591SJens Wiklander T_ok = rs_ctx->rsm->state >= ecp_rsm_comb_core; 23453d3b0591SJens Wiklander } 23463d3b0591SJens Wiklander else 23473d3b0591SJens Wiklander #endif 23483d3b0591SJens Wiklander /* Allocate table if we didn't have any */ 23493d3b0591SJens Wiklander { 23503d3b0591SJens Wiklander T = mbedtls_calloc( T_size, sizeof( mbedtls_ecp_point ) ); 2351817466cbSJens Wiklander if( T == NULL ) 2352817466cbSJens Wiklander { 2353817466cbSJens Wiklander ret = MBEDTLS_ERR_ECP_ALLOC_FAILED; 2354817466cbSJens Wiklander goto cleanup; 2355817466cbSJens Wiklander } 2356817466cbSJens Wiklander 23573d3b0591SJens Wiklander for( i = 0; i < T_size; i++ ) 23583d3b0591SJens Wiklander mbedtls_ecp_point_init( &T[i] ); 23593d3b0591SJens Wiklander 23603d3b0591SJens Wiklander T_ok = 0; 23613d3b0591SJens Wiklander } 23623d3b0591SJens Wiklander 23633d3b0591SJens Wiklander /* Compute table (or finish computing it) if not done already */ 23643d3b0591SJens Wiklander if( !T_ok ) 23653d3b0591SJens Wiklander { 23663d3b0591SJens Wiklander MBEDTLS_MPI_CHK( ecp_precompute_comb( grp, T, P, w, d, rs_ctx ) ); 2367817466cbSJens Wiklander 2368817466cbSJens Wiklander if( p_eq_g ) 2369817466cbSJens Wiklander { 23703d3b0591SJens Wiklander /* almost transfer ownership of T to the group, but keep a copy of 23713d3b0591SJens Wiklander * the pointer to use for calling the next function more easily */ 2372817466cbSJens Wiklander grp->T = T; 23733d3b0591SJens Wiklander grp->T_size = T_size; 2374817466cbSJens Wiklander } 2375817466cbSJens Wiklander } 2376817466cbSJens Wiklander 23773d3b0591SJens Wiklander /* Actual comb multiplication using precomputed points */ 23783d3b0591SJens Wiklander MBEDTLS_MPI_CHK( ecp_mul_comb_after_precomp( grp, R, m, 23793d3b0591SJens Wiklander T, T_size, w, d, 23803d3b0591SJens Wiklander f_rng, p_rng, rs_ctx ) ); 2381817466cbSJens Wiklander 2382817466cbSJens Wiklander cleanup: 2383817466cbSJens Wiklander 2384*7901324dSJerome Forissier #if !defined(MBEDTLS_ECP_NO_INTERNAL_RNG) 2385*7901324dSJerome Forissier ecp_drbg_free( &drbg_ctx ); 2386*7901324dSJerome Forissier #endif 2387*7901324dSJerome Forissier 23883d3b0591SJens Wiklander /* does T belong to the group? */ 23893d3b0591SJens Wiklander if( T == grp->T ) 23903d3b0591SJens Wiklander T = NULL; 23913d3b0591SJens Wiklander 23923d3b0591SJens Wiklander /* does T belong to the restart context? */ 23933d3b0591SJens Wiklander #if defined(MBEDTLS_ECP_RESTARTABLE) 23943d3b0591SJens Wiklander if( rs_ctx != NULL && rs_ctx->rsm != NULL && ret == MBEDTLS_ERR_ECP_IN_PROGRESS && T != NULL ) 2395817466cbSJens Wiklander { 23963d3b0591SJens Wiklander /* transfer ownership of T from local function to rsm */ 23973d3b0591SJens Wiklander rs_ctx->rsm->T_size = T_size; 23983d3b0591SJens Wiklander rs_ctx->rsm->T = T; 23993d3b0591SJens Wiklander T = NULL; 24003d3b0591SJens Wiklander } 24013d3b0591SJens Wiklander #endif 24023d3b0591SJens Wiklander 24033d3b0591SJens Wiklander /* did T belong to us? then let's destroy it! */ 24043d3b0591SJens Wiklander if( T != NULL ) 24053d3b0591SJens Wiklander { 24063d3b0591SJens Wiklander for( i = 0; i < T_size; i++ ) 2407817466cbSJens Wiklander mbedtls_ecp_point_free( &T[i] ); 2408817466cbSJens Wiklander mbedtls_free( T ); 2409817466cbSJens Wiklander } 2410817466cbSJens Wiklander 24113d3b0591SJens Wiklander /* don't free R while in progress in case R == P */ 24123d3b0591SJens Wiklander #if defined(MBEDTLS_ECP_RESTARTABLE) 24133d3b0591SJens Wiklander if( ret != MBEDTLS_ERR_ECP_IN_PROGRESS ) 24143d3b0591SJens Wiklander #endif 24153d3b0591SJens Wiklander /* prevent caller from using invalid value */ 2416817466cbSJens Wiklander if( ret != 0 ) 2417817466cbSJens Wiklander mbedtls_ecp_point_free( R ); 2418817466cbSJens Wiklander 24193d3b0591SJens Wiklander ECP_RS_LEAVE( rsm ); 24203d3b0591SJens Wiklander 2421817466cbSJens Wiklander return( ret ); 2422817466cbSJens Wiklander } 2423817466cbSJens Wiklander 2424*7901324dSJerome Forissier #endif /* MBEDTLS_ECP_SHORT_WEIERSTRASS_ENABLED */ 2425817466cbSJens Wiklander 2426*7901324dSJerome Forissier #if defined(MBEDTLS_ECP_MONTGOMERY_ENABLED) 2427817466cbSJens Wiklander /* 2428817466cbSJens Wiklander * For Montgomery curves, we do all the internal arithmetic in projective 2429817466cbSJens Wiklander * coordinates. Import/export of points uses only the x coordinates, which is 2430817466cbSJens Wiklander * internaly represented as X / Z. 2431817466cbSJens Wiklander * 2432817466cbSJens Wiklander * For scalar multiplication, we'll use a Montgomery ladder. 2433817466cbSJens Wiklander */ 2434817466cbSJens Wiklander 2435817466cbSJens Wiklander /* 2436817466cbSJens Wiklander * Normalize Montgomery x/z coordinates: X = X/Z, Z = 1 2437817466cbSJens Wiklander * Cost: 1M + 1I 2438817466cbSJens Wiklander */ 2439817466cbSJens Wiklander static int ecp_normalize_mxz( const mbedtls_ecp_group *grp, mbedtls_ecp_point *P ) 2440817466cbSJens Wiklander { 2441817466cbSJens Wiklander #if defined(MBEDTLS_ECP_NORMALIZE_MXZ_ALT) 2442817466cbSJens Wiklander if( mbedtls_internal_ecp_grp_capable( grp ) ) 24433d3b0591SJens Wiklander return( mbedtls_internal_ecp_normalize_mxz( grp, P ) ); 2444817466cbSJens Wiklander #endif /* MBEDTLS_ECP_NORMALIZE_MXZ_ALT */ 2445817466cbSJens Wiklander 2446*7901324dSJerome Forissier #if defined(MBEDTLS_ECP_NO_FALLBACK) && defined(MBEDTLS_ECP_NORMALIZE_MXZ_ALT) 2447*7901324dSJerome Forissier return( MBEDTLS_ERR_ECP_FEATURE_UNAVAILABLE ); 2448*7901324dSJerome Forissier #else 2449*7901324dSJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 2450817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_inv_mod( &P->Z, &P->Z, &grp->P ) ); 245111fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &P->X, &P->X, &P->Z ) ); 2452817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_lset( &P->Z, 1 ) ); 2453817466cbSJens Wiklander 2454817466cbSJens Wiklander cleanup: 2455817466cbSJens Wiklander return( ret ); 2456*7901324dSJerome Forissier #endif /* !defined(MBEDTLS_ECP_NO_FALLBACK) || !defined(MBEDTLS_ECP_NORMALIZE_MXZ_ALT) */ 2457817466cbSJens Wiklander } 2458817466cbSJens Wiklander 2459817466cbSJens Wiklander /* 2460817466cbSJens Wiklander * Randomize projective x/z coordinates: 2461817466cbSJens Wiklander * (X, Z) -> (l X, l Z) for random l 2462817466cbSJens Wiklander * This is sort of the reverse operation of ecp_normalize_mxz(). 2463817466cbSJens Wiklander * 2464817466cbSJens Wiklander * This countermeasure was first suggested in [2]. 2465817466cbSJens Wiklander * Cost: 2M 2466817466cbSJens Wiklander */ 2467817466cbSJens Wiklander static int ecp_randomize_mxz( const mbedtls_ecp_group *grp, mbedtls_ecp_point *P, 2468817466cbSJens Wiklander int (*f_rng)(void *, unsigned char *, size_t), void *p_rng ) 2469817466cbSJens Wiklander { 2470817466cbSJens Wiklander #if defined(MBEDTLS_ECP_RANDOMIZE_MXZ_ALT) 2471817466cbSJens Wiklander if( mbedtls_internal_ecp_grp_capable( grp ) ) 2472*7901324dSJerome Forissier return( mbedtls_internal_ecp_randomize_mxz( grp, P, f_rng, p_rng ) ); 2473817466cbSJens Wiklander #endif /* MBEDTLS_ECP_RANDOMIZE_MXZ_ALT */ 2474817466cbSJens Wiklander 2475*7901324dSJerome Forissier #if defined(MBEDTLS_ECP_NO_FALLBACK) && defined(MBEDTLS_ECP_RANDOMIZE_MXZ_ALT) 2476*7901324dSJerome Forissier return( MBEDTLS_ERR_ECP_FEATURE_UNAVAILABLE ); 2477*7901324dSJerome Forissier #else 2478*7901324dSJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 2479*7901324dSJerome Forissier mbedtls_mpi l; 2480817466cbSJens Wiklander mbedtls_mpi_init( &l ); 2481817466cbSJens Wiklander 2482817466cbSJens Wiklander /* Generate l such that 1 < l < p */ 2483*7901324dSJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_random( &l, 2, &grp->P, f_rng, p_rng ) ); 2484817466cbSJens Wiklander 248511fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &P->X, &P->X, &l ) ); 248611fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &P->Z, &P->Z, &l ) ); 2487817466cbSJens Wiklander 2488817466cbSJens Wiklander cleanup: 2489817466cbSJens Wiklander mbedtls_mpi_free( &l ); 2490817466cbSJens Wiklander 2491*7901324dSJerome Forissier if( ret == MBEDTLS_ERR_MPI_NOT_ACCEPTABLE ) 2492*7901324dSJerome Forissier ret = MBEDTLS_ERR_ECP_RANDOM_FAILED; 2493817466cbSJens Wiklander return( ret ); 2494*7901324dSJerome Forissier #endif /* !defined(MBEDTLS_ECP_NO_FALLBACK) || !defined(MBEDTLS_ECP_RANDOMIZE_MXZ_ALT) */ 2495817466cbSJens Wiklander } 2496817466cbSJens Wiklander 2497817466cbSJens Wiklander /* 2498817466cbSJens Wiklander * Double-and-add: R = 2P, S = P + Q, with d = X(P - Q), 2499817466cbSJens Wiklander * for Montgomery curves in x/z coordinates. 2500817466cbSJens Wiklander * 2501817466cbSJens Wiklander * http://www.hyperelliptic.org/EFD/g1p/auto-code/montgom/xz/ladder/mladd-1987-m.op3 2502817466cbSJens Wiklander * with 2503817466cbSJens Wiklander * d = X1 2504817466cbSJens Wiklander * P = (X2, Z2) 2505817466cbSJens Wiklander * Q = (X3, Z3) 2506817466cbSJens Wiklander * R = (X4, Z4) 2507817466cbSJens Wiklander * S = (X5, Z5) 2508817466cbSJens Wiklander * and eliminating temporary variables tO, ..., t4. 2509817466cbSJens Wiklander * 2510817466cbSJens Wiklander * Cost: 5M + 4S 2511817466cbSJens Wiklander */ 2512817466cbSJens Wiklander static int ecp_double_add_mxz( const mbedtls_ecp_group *grp, 2513817466cbSJens Wiklander mbedtls_ecp_point *R, mbedtls_ecp_point *S, 2514817466cbSJens Wiklander const mbedtls_ecp_point *P, const mbedtls_ecp_point *Q, 2515817466cbSJens Wiklander const mbedtls_mpi *d ) 2516817466cbSJens Wiklander { 2517817466cbSJens Wiklander #if defined(MBEDTLS_ECP_DOUBLE_ADD_MXZ_ALT) 2518817466cbSJens Wiklander if( mbedtls_internal_ecp_grp_capable( grp ) ) 25193d3b0591SJens Wiklander return( mbedtls_internal_ecp_double_add_mxz( grp, R, S, P, Q, d ) ); 2520817466cbSJens Wiklander #endif /* MBEDTLS_ECP_DOUBLE_ADD_MXZ_ALT */ 2521817466cbSJens Wiklander 2522*7901324dSJerome Forissier #if defined(MBEDTLS_ECP_NO_FALLBACK) && defined(MBEDTLS_ECP_DOUBLE_ADD_MXZ_ALT) 2523*7901324dSJerome Forissier return( MBEDTLS_ERR_ECP_FEATURE_UNAVAILABLE ); 2524*7901324dSJerome Forissier #else 2525*7901324dSJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 2526*7901324dSJerome Forissier mbedtls_mpi A, AA, B, BB, E, C, D, DA, CB; 2527*7901324dSJerome Forissier 2528817466cbSJens Wiklander mbedtls_mpi_init( &A ); mbedtls_mpi_init( &AA ); mbedtls_mpi_init( &B ); 2529817466cbSJens Wiklander mbedtls_mpi_init( &BB ); mbedtls_mpi_init( &E ); mbedtls_mpi_init( &C ); 2530817466cbSJens Wiklander mbedtls_mpi_init( &D ); mbedtls_mpi_init( &DA ); mbedtls_mpi_init( &CB ); 2531817466cbSJens Wiklander 253211fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_add_mod( grp, &A, &P->X, &P->Z ) ); 253311fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &AA, &A, &A ) ); 253411fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_sub_mod( grp, &B, &P->X, &P->Z ) ); 253511fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &BB, &B, &B ) ); 253611fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_sub_mod( grp, &E, &AA, &BB ) ); 253711fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_add_mod( grp, &C, &Q->X, &Q->Z ) ); 253811fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_sub_mod( grp, &D, &Q->X, &Q->Z ) ); 253911fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &DA, &D, &A ) ); 254011fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &CB, &C, &B ) ); 2541*7901324dSJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_add_mod( grp, &S->X, &DA, &CB ) ); 254211fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &S->X, &S->X, &S->X ) ); 254311fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_sub_mod( grp, &S->Z, &DA, &CB ) ); 254411fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &S->Z, &S->Z, &S->Z ) ); 254511fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &S->Z, d, &S->Z ) ); 254611fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &R->X, &AA, &BB ) ); 254711fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &R->Z, &grp->A, &E ) ); 254811fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_add_mod( grp, &R->Z, &BB, &R->Z ) ); 254911fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &R->Z, &E, &R->Z ) ); 2550817466cbSJens Wiklander 2551817466cbSJens Wiklander cleanup: 2552817466cbSJens Wiklander mbedtls_mpi_free( &A ); mbedtls_mpi_free( &AA ); mbedtls_mpi_free( &B ); 2553817466cbSJens Wiklander mbedtls_mpi_free( &BB ); mbedtls_mpi_free( &E ); mbedtls_mpi_free( &C ); 2554817466cbSJens Wiklander mbedtls_mpi_free( &D ); mbedtls_mpi_free( &DA ); mbedtls_mpi_free( &CB ); 2555817466cbSJens Wiklander 2556817466cbSJens Wiklander return( ret ); 2557*7901324dSJerome Forissier #endif /* !defined(MBEDTLS_ECP_NO_FALLBACK) || !defined(MBEDTLS_ECP_DOUBLE_ADD_MXZ_ALT) */ 2558817466cbSJens Wiklander } 2559817466cbSJens Wiklander 2560817466cbSJens Wiklander /* 2561817466cbSJens Wiklander * Multiplication with Montgomery ladder in x/z coordinates, 2562817466cbSJens Wiklander * for curves in Montgomery form 2563817466cbSJens Wiklander */ 2564817466cbSJens Wiklander static int ecp_mul_mxz( mbedtls_ecp_group *grp, mbedtls_ecp_point *R, 2565817466cbSJens Wiklander const mbedtls_mpi *m, const mbedtls_ecp_point *P, 2566817466cbSJens Wiklander int (*f_rng)(void *, unsigned char *, size_t), 2567817466cbSJens Wiklander void *p_rng ) 2568817466cbSJens Wiklander { 256911fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 2570817466cbSJens Wiklander size_t i; 2571817466cbSJens Wiklander unsigned char b; 2572817466cbSJens Wiklander mbedtls_ecp_point RP; 2573817466cbSJens Wiklander mbedtls_mpi PX; 2574*7901324dSJerome Forissier #if !defined(MBEDTLS_ECP_NO_INTERNAL_RNG) 2575*7901324dSJerome Forissier ecp_drbg_context drbg_ctx; 2576817466cbSJens Wiklander 2577*7901324dSJerome Forissier ecp_drbg_init( &drbg_ctx ); 2578*7901324dSJerome Forissier #endif 2579817466cbSJens Wiklander mbedtls_ecp_point_init( &RP ); mbedtls_mpi_init( &PX ); 2580817466cbSJens Wiklander 2581*7901324dSJerome Forissier #if !defined(MBEDTLS_ECP_NO_INTERNAL_RNG) 2582*7901324dSJerome Forissier if( f_rng == NULL ) 2583*7901324dSJerome Forissier { 2584*7901324dSJerome Forissier const size_t m_len = ( grp->nbits + 7 ) / 8; 2585*7901324dSJerome Forissier MBEDTLS_MPI_CHK( ecp_drbg_seed( &drbg_ctx, m, m_len ) ); 2586*7901324dSJerome Forissier f_rng = &ecp_drbg_random; 2587*7901324dSJerome Forissier p_rng = &drbg_ctx; 2588*7901324dSJerome Forissier } 2589*7901324dSJerome Forissier #endif /* !MBEDTLS_ECP_NO_INTERNAL_RNG */ 2590*7901324dSJerome Forissier 2591817466cbSJens Wiklander /* Save PX and read from P before writing to R, in case P == R */ 2592817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_copy( &PX, &P->X ) ); 2593817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_ecp_copy( &RP, P ) ); 2594817466cbSJens Wiklander 2595817466cbSJens Wiklander /* Set R to zero in modified x/z coordinates */ 2596817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_lset( &R->X, 1 ) ); 2597817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_lset( &R->Z, 0 ) ); 2598817466cbSJens Wiklander mbedtls_mpi_free( &R->Y ); 2599817466cbSJens Wiklander 2600817466cbSJens Wiklander /* RP.X might be sligtly larger than P, so reduce it */ 2601817466cbSJens Wiklander MOD_ADD( RP.X ); 2602817466cbSJens Wiklander 2603817466cbSJens Wiklander /* Randomize coordinates of the starting point */ 2604*7901324dSJerome Forissier #if defined(MBEDTLS_ECP_NO_INTERNAL_RNG) 2605817466cbSJens Wiklander if( f_rng != NULL ) 2606*7901324dSJerome Forissier #endif 2607817466cbSJens Wiklander MBEDTLS_MPI_CHK( ecp_randomize_mxz( grp, &RP, f_rng, p_rng ) ); 2608817466cbSJens Wiklander 2609817466cbSJens Wiklander /* Loop invariant: R = result so far, RP = R + P */ 2610817466cbSJens Wiklander i = mbedtls_mpi_bitlen( m ); /* one past the (zero-based) most significant bit */ 2611817466cbSJens Wiklander while( i-- > 0 ) 2612817466cbSJens Wiklander { 2613817466cbSJens Wiklander b = mbedtls_mpi_get_bit( m, i ); 2614817466cbSJens Wiklander /* 2615817466cbSJens Wiklander * if (b) R = 2R + P else R = 2R, 2616817466cbSJens Wiklander * which is: 2617817466cbSJens Wiklander * if (b) double_add( RP, R, RP, R ) 2618817466cbSJens Wiklander * else double_add( R, RP, R, RP ) 2619817466cbSJens Wiklander * but using safe conditional swaps to avoid leaks 2620817466cbSJens Wiklander */ 2621817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_safe_cond_swap( &R->X, &RP.X, b ) ); 2622817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_safe_cond_swap( &R->Z, &RP.Z, b ) ); 2623817466cbSJens Wiklander MBEDTLS_MPI_CHK( ecp_double_add_mxz( grp, R, &RP, R, &RP, &PX ) ); 2624817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_safe_cond_swap( &R->X, &RP.X, b ) ); 2625817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_safe_cond_swap( &R->Z, &RP.Z, b ) ); 2626817466cbSJens Wiklander } 2627817466cbSJens Wiklander 262811fa71b9SJerome Forissier /* 262911fa71b9SJerome Forissier * Knowledge of the projective coordinates may leak the last few bits of the 263011fa71b9SJerome Forissier * scalar [1], and since our MPI implementation isn't constant-flow, 263111fa71b9SJerome Forissier * inversion (used for coordinate normalization) may leak the full value 263211fa71b9SJerome Forissier * of its input via side-channels [2]. 263311fa71b9SJerome Forissier * 263411fa71b9SJerome Forissier * [1] https://eprint.iacr.org/2003/191 263511fa71b9SJerome Forissier * [2] https://eprint.iacr.org/2020/055 263611fa71b9SJerome Forissier * 263711fa71b9SJerome Forissier * Avoid the leak by randomizing coordinates before we normalize them. 263811fa71b9SJerome Forissier */ 2639*7901324dSJerome Forissier #if defined(MBEDTLS_ECP_NO_INTERNAL_RNG) 264011fa71b9SJerome Forissier if( f_rng != NULL ) 2641*7901324dSJerome Forissier #endif 264211fa71b9SJerome Forissier MBEDTLS_MPI_CHK( ecp_randomize_mxz( grp, R, f_rng, p_rng ) ); 264311fa71b9SJerome Forissier 2644817466cbSJens Wiklander MBEDTLS_MPI_CHK( ecp_normalize_mxz( grp, R ) ); 2645817466cbSJens Wiklander 2646817466cbSJens Wiklander cleanup: 2647*7901324dSJerome Forissier #if !defined(MBEDTLS_ECP_NO_INTERNAL_RNG) 2648*7901324dSJerome Forissier ecp_drbg_free( &drbg_ctx ); 2649*7901324dSJerome Forissier #endif 2650*7901324dSJerome Forissier 2651817466cbSJens Wiklander mbedtls_ecp_point_free( &RP ); mbedtls_mpi_free( &PX ); 2652817466cbSJens Wiklander 2653817466cbSJens Wiklander return( ret ); 2654817466cbSJens Wiklander } 2655817466cbSJens Wiklander 2656*7901324dSJerome Forissier #endif /* MBEDTLS_ECP_MONTGOMERY_ENABLED */ 2657817466cbSJens Wiklander 2658817466cbSJens Wiklander /* 26593d3b0591SJens Wiklander * Restartable multiplication R = m * P 26603d3b0591SJens Wiklander */ 26613d3b0591SJens Wiklander int mbedtls_ecp_mul_restartable( mbedtls_ecp_group *grp, mbedtls_ecp_point *R, 26623d3b0591SJens Wiklander const mbedtls_mpi *m, const mbedtls_ecp_point *P, 26633d3b0591SJens Wiklander int (*f_rng)(void *, unsigned char *, size_t), void *p_rng, 26643d3b0591SJens Wiklander mbedtls_ecp_restart_ctx *rs_ctx ) 26653d3b0591SJens Wiklander { 26663d3b0591SJens Wiklander int ret = MBEDTLS_ERR_ECP_BAD_INPUT_DATA; 26673d3b0591SJens Wiklander #if defined(MBEDTLS_ECP_INTERNAL_ALT) 26683d3b0591SJens Wiklander char is_grp_capable = 0; 26693d3b0591SJens Wiklander #endif 26703d3b0591SJens Wiklander ECP_VALIDATE_RET( grp != NULL ); 26713d3b0591SJens Wiklander ECP_VALIDATE_RET( R != NULL ); 26723d3b0591SJens Wiklander ECP_VALIDATE_RET( m != NULL ); 26733d3b0591SJens Wiklander ECP_VALIDATE_RET( P != NULL ); 26743d3b0591SJens Wiklander 26753d3b0591SJens Wiklander #if defined(MBEDTLS_ECP_RESTARTABLE) 26763d3b0591SJens Wiklander /* reset ops count for this call if top-level */ 26773d3b0591SJens Wiklander if( rs_ctx != NULL && rs_ctx->depth++ == 0 ) 26783d3b0591SJens Wiklander rs_ctx->ops_done = 0; 2679*7901324dSJerome Forissier #else 2680*7901324dSJerome Forissier (void) rs_ctx; 26813d3b0591SJens Wiklander #endif 26823d3b0591SJens Wiklander 26833d3b0591SJens Wiklander #if defined(MBEDTLS_ECP_INTERNAL_ALT) 26843d3b0591SJens Wiklander if( ( is_grp_capable = mbedtls_internal_ecp_grp_capable( grp ) ) ) 26853d3b0591SJens Wiklander MBEDTLS_MPI_CHK( mbedtls_internal_ecp_init( grp ) ); 26863d3b0591SJens Wiklander #endif /* MBEDTLS_ECP_INTERNAL_ALT */ 26873d3b0591SJens Wiklander 26883d3b0591SJens Wiklander #if defined(MBEDTLS_ECP_RESTARTABLE) 26893d3b0591SJens Wiklander /* skip argument check when restarting */ 26903d3b0591SJens Wiklander if( rs_ctx == NULL || rs_ctx->rsm == NULL ) 26913d3b0591SJens Wiklander #endif 26923d3b0591SJens Wiklander { 26933d3b0591SJens Wiklander /* check_privkey is free */ 26943d3b0591SJens Wiklander MBEDTLS_ECP_BUDGET( MBEDTLS_ECP_OPS_CHK ); 26953d3b0591SJens Wiklander 26963d3b0591SJens Wiklander /* Common sanity checks */ 26973d3b0591SJens Wiklander MBEDTLS_MPI_CHK( mbedtls_ecp_check_privkey( grp, m ) ); 26983d3b0591SJens Wiklander MBEDTLS_MPI_CHK( mbedtls_ecp_check_pubkey( grp, P ) ); 26993d3b0591SJens Wiklander } 27003d3b0591SJens Wiklander 27013d3b0591SJens Wiklander ret = MBEDTLS_ERR_ECP_BAD_INPUT_DATA; 2702*7901324dSJerome Forissier #if defined(MBEDTLS_ECP_MONTGOMERY_ENABLED) 270311fa71b9SJerome Forissier if( mbedtls_ecp_get_type( grp ) == MBEDTLS_ECP_TYPE_MONTGOMERY ) 27043d3b0591SJens Wiklander MBEDTLS_MPI_CHK( ecp_mul_mxz( grp, R, m, P, f_rng, p_rng ) ); 27053d3b0591SJens Wiklander #endif 2706*7901324dSJerome Forissier #if defined(MBEDTLS_ECP_SHORT_WEIERSTRASS_ENABLED) 270711fa71b9SJerome Forissier if( mbedtls_ecp_get_type( grp ) == MBEDTLS_ECP_TYPE_SHORT_WEIERSTRASS ) 27083d3b0591SJens Wiklander MBEDTLS_MPI_CHK( ecp_mul_comb( grp, R, m, P, f_rng, p_rng, rs_ctx ) ); 27093d3b0591SJens Wiklander #endif 27103d3b0591SJens Wiklander 27113d3b0591SJens Wiklander cleanup: 27123d3b0591SJens Wiklander 27133d3b0591SJens Wiklander #if defined(MBEDTLS_ECP_INTERNAL_ALT) 27143d3b0591SJens Wiklander if( is_grp_capable ) 27153d3b0591SJens Wiklander mbedtls_internal_ecp_free( grp ); 27163d3b0591SJens Wiklander #endif /* MBEDTLS_ECP_INTERNAL_ALT */ 27173d3b0591SJens Wiklander 27183d3b0591SJens Wiklander #if defined(MBEDTLS_ECP_RESTARTABLE) 27193d3b0591SJens Wiklander if( rs_ctx != NULL ) 27203d3b0591SJens Wiklander rs_ctx->depth--; 27213d3b0591SJens Wiklander #endif 27223d3b0591SJens Wiklander 27233d3b0591SJens Wiklander return( ret ); 27243d3b0591SJens Wiklander } 27253d3b0591SJens Wiklander 27263d3b0591SJens Wiklander /* 2727817466cbSJens Wiklander * Multiplication R = m * P 2728817466cbSJens Wiklander */ 2729817466cbSJens Wiklander int mbedtls_ecp_mul( mbedtls_ecp_group *grp, mbedtls_ecp_point *R, 2730817466cbSJens Wiklander const mbedtls_mpi *m, const mbedtls_ecp_point *P, 2731817466cbSJens Wiklander int (*f_rng)(void *, unsigned char *, size_t), void *p_rng ) 2732817466cbSJens Wiklander { 27333d3b0591SJens Wiklander ECP_VALIDATE_RET( grp != NULL ); 27343d3b0591SJens Wiklander ECP_VALIDATE_RET( R != NULL ); 27353d3b0591SJens Wiklander ECP_VALIDATE_RET( m != NULL ); 27363d3b0591SJens Wiklander ECP_VALIDATE_RET( P != NULL ); 27373d3b0591SJens Wiklander return( mbedtls_ecp_mul_restartable( grp, R, m, P, f_rng, p_rng, NULL ) ); 2738817466cbSJens Wiklander } 2739817466cbSJens Wiklander 2740*7901324dSJerome Forissier #if defined(MBEDTLS_ECP_SHORT_WEIERSTRASS_ENABLED) 2741817466cbSJens Wiklander /* 2742817466cbSJens Wiklander * Check that an affine point is valid as a public key, 2743817466cbSJens Wiklander * short weierstrass curves (SEC1 3.2.3.1) 2744817466cbSJens Wiklander */ 2745817466cbSJens Wiklander static int ecp_check_pubkey_sw( const mbedtls_ecp_group *grp, const mbedtls_ecp_point *pt ) 2746817466cbSJens Wiklander { 274711fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 2748817466cbSJens Wiklander mbedtls_mpi YY, RHS; 2749817466cbSJens Wiklander 2750817466cbSJens Wiklander /* pt coordinates must be normalized for our checks */ 2751817466cbSJens Wiklander if( mbedtls_mpi_cmp_int( &pt->X, 0 ) < 0 || 2752817466cbSJens Wiklander mbedtls_mpi_cmp_int( &pt->Y, 0 ) < 0 || 2753817466cbSJens Wiklander mbedtls_mpi_cmp_mpi( &pt->X, &grp->P ) >= 0 || 2754817466cbSJens Wiklander mbedtls_mpi_cmp_mpi( &pt->Y, &grp->P ) >= 0 ) 2755817466cbSJens Wiklander return( MBEDTLS_ERR_ECP_INVALID_KEY ); 2756817466cbSJens Wiklander 2757817466cbSJens Wiklander mbedtls_mpi_init( &YY ); mbedtls_mpi_init( &RHS ); 2758817466cbSJens Wiklander 2759817466cbSJens Wiklander /* 2760817466cbSJens Wiklander * YY = Y^2 2761817466cbSJens Wiklander * RHS = X (X^2 + A) + B = X^3 + A X + B 2762817466cbSJens Wiklander */ 276311fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &YY, &pt->Y, &pt->Y ) ); 276411fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &RHS, &pt->X, &pt->X ) ); 2765817466cbSJens Wiklander 2766817466cbSJens Wiklander /* Special case for A = -3 */ 2767817466cbSJens Wiklander if( grp->A.p == NULL ) 2768817466cbSJens Wiklander { 2769817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_sub_int( &RHS, &RHS, 3 ) ); MOD_SUB( RHS ); 2770817466cbSJens Wiklander } 2771817466cbSJens Wiklander else 2772817466cbSJens Wiklander { 277311fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_add_mod( grp, &RHS, &RHS, &grp->A ) ); 2774817466cbSJens Wiklander } 2775817466cbSJens Wiklander 277611fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &RHS, &RHS, &pt->X ) ); 277711fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_add_mod( grp, &RHS, &RHS, &grp->B ) ); 2778817466cbSJens Wiklander 2779817466cbSJens Wiklander if( mbedtls_mpi_cmp_mpi( &YY, &RHS ) != 0 ) 2780817466cbSJens Wiklander ret = MBEDTLS_ERR_ECP_INVALID_KEY; 2781817466cbSJens Wiklander 2782817466cbSJens Wiklander cleanup: 2783817466cbSJens Wiklander 2784817466cbSJens Wiklander mbedtls_mpi_free( &YY ); mbedtls_mpi_free( &RHS ); 2785817466cbSJens Wiklander 2786817466cbSJens Wiklander return( ret ); 2787817466cbSJens Wiklander } 2788*7901324dSJerome Forissier #endif /* MBEDTLS_ECP_SHORT_WEIERSTRASS_ENABLED */ 2789817466cbSJens Wiklander 2790*7901324dSJerome Forissier #if defined(MBEDTLS_ECP_SHORT_WEIERSTRASS_ENABLED) 2791817466cbSJens Wiklander /* 2792*7901324dSJerome Forissier * R = m * P with shortcuts for m == 0, m == 1 and m == -1 2793817466cbSJens Wiklander * NOT constant-time - ONLY for short Weierstrass! 2794817466cbSJens Wiklander */ 2795817466cbSJens Wiklander static int mbedtls_ecp_mul_shortcuts( mbedtls_ecp_group *grp, 2796817466cbSJens Wiklander mbedtls_ecp_point *R, 2797817466cbSJens Wiklander const mbedtls_mpi *m, 27983d3b0591SJens Wiklander const mbedtls_ecp_point *P, 27993d3b0591SJens Wiklander mbedtls_ecp_restart_ctx *rs_ctx ) 2800817466cbSJens Wiklander { 280111fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 2802817466cbSJens Wiklander 2803*7901324dSJerome Forissier if( mbedtls_mpi_cmp_int( m, 0 ) == 0 ) 2804*7901324dSJerome Forissier { 2805*7901324dSJerome Forissier MBEDTLS_MPI_CHK( mbedtls_ecp_set_zero( R ) ); 2806*7901324dSJerome Forissier } 2807*7901324dSJerome Forissier else if( mbedtls_mpi_cmp_int( m, 1 ) == 0 ) 2808817466cbSJens Wiklander { 2809817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_ecp_copy( R, P ) ); 2810817466cbSJens Wiklander } 2811817466cbSJens Wiklander else if( mbedtls_mpi_cmp_int( m, -1 ) == 0 ) 2812817466cbSJens Wiklander { 2813817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_ecp_copy( R, P ) ); 2814817466cbSJens Wiklander if( mbedtls_mpi_cmp_int( &R->Y, 0 ) != 0 ) 2815817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_sub_mpi( &R->Y, &grp->P, &R->Y ) ); 2816817466cbSJens Wiklander } 2817817466cbSJens Wiklander else 2818817466cbSJens Wiklander { 28193d3b0591SJens Wiklander MBEDTLS_MPI_CHK( mbedtls_ecp_mul_restartable( grp, R, m, P, 28203d3b0591SJens Wiklander NULL, NULL, rs_ctx ) ); 2821817466cbSJens Wiklander } 2822817466cbSJens Wiklander 2823817466cbSJens Wiklander cleanup: 2824817466cbSJens Wiklander return( ret ); 2825817466cbSJens Wiklander } 2826817466cbSJens Wiklander 2827817466cbSJens Wiklander /* 28283d3b0591SJens Wiklander * Restartable linear combination 28293d3b0591SJens Wiklander * NOT constant-time 28303d3b0591SJens Wiklander */ 28313d3b0591SJens Wiklander int mbedtls_ecp_muladd_restartable( 28323d3b0591SJens Wiklander mbedtls_ecp_group *grp, mbedtls_ecp_point *R, 28333d3b0591SJens Wiklander const mbedtls_mpi *m, const mbedtls_ecp_point *P, 28343d3b0591SJens Wiklander const mbedtls_mpi *n, const mbedtls_ecp_point *Q, 28353d3b0591SJens Wiklander mbedtls_ecp_restart_ctx *rs_ctx ) 28363d3b0591SJens Wiklander { 283711fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 28383d3b0591SJens Wiklander mbedtls_ecp_point mP; 28393d3b0591SJens Wiklander mbedtls_ecp_point *pmP = &mP; 28403d3b0591SJens Wiklander mbedtls_ecp_point *pR = R; 28413d3b0591SJens Wiklander #if defined(MBEDTLS_ECP_INTERNAL_ALT) 28423d3b0591SJens Wiklander char is_grp_capable = 0; 28433d3b0591SJens Wiklander #endif 28443d3b0591SJens Wiklander ECP_VALIDATE_RET( grp != NULL ); 28453d3b0591SJens Wiklander ECP_VALIDATE_RET( R != NULL ); 28463d3b0591SJens Wiklander ECP_VALIDATE_RET( m != NULL ); 28473d3b0591SJens Wiklander ECP_VALIDATE_RET( P != NULL ); 28483d3b0591SJens Wiklander ECP_VALIDATE_RET( n != NULL ); 28493d3b0591SJens Wiklander ECP_VALIDATE_RET( Q != NULL ); 28503d3b0591SJens Wiklander 285111fa71b9SJerome Forissier if( mbedtls_ecp_get_type( grp ) != MBEDTLS_ECP_TYPE_SHORT_WEIERSTRASS ) 28523d3b0591SJens Wiklander return( MBEDTLS_ERR_ECP_FEATURE_UNAVAILABLE ); 28533d3b0591SJens Wiklander 28543d3b0591SJens Wiklander mbedtls_ecp_point_init( &mP ); 28553d3b0591SJens Wiklander 28563d3b0591SJens Wiklander ECP_RS_ENTER( ma ); 28573d3b0591SJens Wiklander 28583d3b0591SJens Wiklander #if defined(MBEDTLS_ECP_RESTARTABLE) 28593d3b0591SJens Wiklander if( rs_ctx != NULL && rs_ctx->ma != NULL ) 28603d3b0591SJens Wiklander { 28613d3b0591SJens Wiklander /* redirect intermediate results to restart context */ 28623d3b0591SJens Wiklander pmP = &rs_ctx->ma->mP; 28633d3b0591SJens Wiklander pR = &rs_ctx->ma->R; 28643d3b0591SJens Wiklander 28653d3b0591SJens Wiklander /* jump to next operation */ 28663d3b0591SJens Wiklander if( rs_ctx->ma->state == ecp_rsma_mul2 ) 28673d3b0591SJens Wiklander goto mul2; 28683d3b0591SJens Wiklander if( rs_ctx->ma->state == ecp_rsma_add ) 28693d3b0591SJens Wiklander goto add; 28703d3b0591SJens Wiklander if( rs_ctx->ma->state == ecp_rsma_norm ) 28713d3b0591SJens Wiklander goto norm; 28723d3b0591SJens Wiklander } 28733d3b0591SJens Wiklander #endif /* MBEDTLS_ECP_RESTARTABLE */ 28743d3b0591SJens Wiklander 28753d3b0591SJens Wiklander MBEDTLS_MPI_CHK( mbedtls_ecp_mul_shortcuts( grp, pmP, m, P, rs_ctx ) ); 28763d3b0591SJens Wiklander #if defined(MBEDTLS_ECP_RESTARTABLE) 28773d3b0591SJens Wiklander if( rs_ctx != NULL && rs_ctx->ma != NULL ) 28783d3b0591SJens Wiklander rs_ctx->ma->state = ecp_rsma_mul2; 28793d3b0591SJens Wiklander 28803d3b0591SJens Wiklander mul2: 28813d3b0591SJens Wiklander #endif 28823d3b0591SJens Wiklander MBEDTLS_MPI_CHK( mbedtls_ecp_mul_shortcuts( grp, pR, n, Q, rs_ctx ) ); 28833d3b0591SJens Wiklander 28843d3b0591SJens Wiklander #if defined(MBEDTLS_ECP_INTERNAL_ALT) 28853d3b0591SJens Wiklander if( ( is_grp_capable = mbedtls_internal_ecp_grp_capable( grp ) ) ) 28863d3b0591SJens Wiklander MBEDTLS_MPI_CHK( mbedtls_internal_ecp_init( grp ) ); 28873d3b0591SJens Wiklander #endif /* MBEDTLS_ECP_INTERNAL_ALT */ 28883d3b0591SJens Wiklander 28893d3b0591SJens Wiklander #if defined(MBEDTLS_ECP_RESTARTABLE) 28903d3b0591SJens Wiklander if( rs_ctx != NULL && rs_ctx->ma != NULL ) 28913d3b0591SJens Wiklander rs_ctx->ma->state = ecp_rsma_add; 28923d3b0591SJens Wiklander 28933d3b0591SJens Wiklander add: 28943d3b0591SJens Wiklander #endif 28953d3b0591SJens Wiklander MBEDTLS_ECP_BUDGET( MBEDTLS_ECP_OPS_ADD ); 28963d3b0591SJens Wiklander MBEDTLS_MPI_CHK( ecp_add_mixed( grp, pR, pmP, pR ) ); 28973d3b0591SJens Wiklander #if defined(MBEDTLS_ECP_RESTARTABLE) 28983d3b0591SJens Wiklander if( rs_ctx != NULL && rs_ctx->ma != NULL ) 28993d3b0591SJens Wiklander rs_ctx->ma->state = ecp_rsma_norm; 29003d3b0591SJens Wiklander 29013d3b0591SJens Wiklander norm: 29023d3b0591SJens Wiklander #endif 29033d3b0591SJens Wiklander MBEDTLS_ECP_BUDGET( MBEDTLS_ECP_OPS_INV ); 29043d3b0591SJens Wiklander MBEDTLS_MPI_CHK( ecp_normalize_jac( grp, pR ) ); 29053d3b0591SJens Wiklander 29063d3b0591SJens Wiklander #if defined(MBEDTLS_ECP_RESTARTABLE) 29073d3b0591SJens Wiklander if( rs_ctx != NULL && rs_ctx->ma != NULL ) 29083d3b0591SJens Wiklander MBEDTLS_MPI_CHK( mbedtls_ecp_copy( R, pR ) ); 29093d3b0591SJens Wiklander #endif 29103d3b0591SJens Wiklander 29113d3b0591SJens Wiklander cleanup: 29123d3b0591SJens Wiklander #if defined(MBEDTLS_ECP_INTERNAL_ALT) 29133d3b0591SJens Wiklander if( is_grp_capable ) 29143d3b0591SJens Wiklander mbedtls_internal_ecp_free( grp ); 29153d3b0591SJens Wiklander #endif /* MBEDTLS_ECP_INTERNAL_ALT */ 29163d3b0591SJens Wiklander 29173d3b0591SJens Wiklander mbedtls_ecp_point_free( &mP ); 29183d3b0591SJens Wiklander 29193d3b0591SJens Wiklander ECP_RS_LEAVE( ma ); 29203d3b0591SJens Wiklander 29213d3b0591SJens Wiklander return( ret ); 29223d3b0591SJens Wiklander } 29233d3b0591SJens Wiklander 29243d3b0591SJens Wiklander /* 2925817466cbSJens Wiklander * Linear combination 2926817466cbSJens Wiklander * NOT constant-time 2927817466cbSJens Wiklander */ 2928817466cbSJens Wiklander int mbedtls_ecp_muladd( mbedtls_ecp_group *grp, mbedtls_ecp_point *R, 2929817466cbSJens Wiklander const mbedtls_mpi *m, const mbedtls_ecp_point *P, 2930817466cbSJens Wiklander const mbedtls_mpi *n, const mbedtls_ecp_point *Q ) 2931817466cbSJens Wiklander { 29323d3b0591SJens Wiklander ECP_VALIDATE_RET( grp != NULL ); 29333d3b0591SJens Wiklander ECP_VALIDATE_RET( R != NULL ); 29343d3b0591SJens Wiklander ECP_VALIDATE_RET( m != NULL ); 29353d3b0591SJens Wiklander ECP_VALIDATE_RET( P != NULL ); 29363d3b0591SJens Wiklander ECP_VALIDATE_RET( n != NULL ); 29373d3b0591SJens Wiklander ECP_VALIDATE_RET( Q != NULL ); 29383d3b0591SJens Wiklander return( mbedtls_ecp_muladd_restartable( grp, R, m, P, n, Q, NULL ) ); 2939817466cbSJens Wiklander } 2940*7901324dSJerome Forissier #endif /* MBEDTLS_ECP_SHORT_WEIERSTRASS_ENABLED */ 2941817466cbSJens Wiklander 2942*7901324dSJerome Forissier #if defined(MBEDTLS_ECP_MONTGOMERY_ENABLED) 2943*7901324dSJerome Forissier #if defined(MBEDTLS_ECP_DP_CURVE25519_ENABLED) 2944*7901324dSJerome Forissier #define ECP_MPI_INIT(s, n, p) {s, 0, (n), (mbedtls_mpi_uint *)(p)} 2945*7901324dSJerome Forissier #define ECP_MPI_INIT_ARRAY(x) \ 2946*7901324dSJerome Forissier ECP_MPI_INIT(1, sizeof(x) / sizeof(mbedtls_mpi_uint), x) 2947*7901324dSJerome Forissier /* 2948*7901324dSJerome Forissier * Constants for the two points other than 0, 1, -1 (mod p) in 2949*7901324dSJerome Forissier * https://cr.yp.to/ecdh.html#validate 2950*7901324dSJerome Forissier * See ecp_check_pubkey_x25519(). 2951*7901324dSJerome Forissier */ 2952*7901324dSJerome Forissier static const mbedtls_mpi_uint x25519_bad_point_1[] = { 2953*7901324dSJerome Forissier MBEDTLS_BYTES_TO_T_UINT_8( 0xe0, 0xeb, 0x7a, 0x7c, 0x3b, 0x41, 0xb8, 0xae ), 2954*7901324dSJerome Forissier MBEDTLS_BYTES_TO_T_UINT_8( 0x16, 0x56, 0xe3, 0xfa, 0xf1, 0x9f, 0xc4, 0x6a ), 2955*7901324dSJerome Forissier MBEDTLS_BYTES_TO_T_UINT_8( 0xda, 0x09, 0x8d, 0xeb, 0x9c, 0x32, 0xb1, 0xfd ), 2956*7901324dSJerome Forissier MBEDTLS_BYTES_TO_T_UINT_8( 0x86, 0x62, 0x05, 0x16, 0x5f, 0x49, 0xb8, 0x00 ), 2957*7901324dSJerome Forissier }; 2958*7901324dSJerome Forissier static const mbedtls_mpi_uint x25519_bad_point_2[] = { 2959*7901324dSJerome Forissier MBEDTLS_BYTES_TO_T_UINT_8( 0x5f, 0x9c, 0x95, 0xbc, 0xa3, 0x50, 0x8c, 0x24 ), 2960*7901324dSJerome Forissier MBEDTLS_BYTES_TO_T_UINT_8( 0xb1, 0xd0, 0xb1, 0x55, 0x9c, 0x83, 0xef, 0x5b ), 2961*7901324dSJerome Forissier MBEDTLS_BYTES_TO_T_UINT_8( 0x04, 0x44, 0x5c, 0xc4, 0x58, 0x1c, 0x8e, 0x86 ), 2962*7901324dSJerome Forissier MBEDTLS_BYTES_TO_T_UINT_8( 0xd8, 0x22, 0x4e, 0xdd, 0xd0, 0x9f, 0x11, 0x57 ), 2963*7901324dSJerome Forissier }; 2964*7901324dSJerome Forissier static const mbedtls_mpi ecp_x25519_bad_point_1 = ECP_MPI_INIT_ARRAY( 2965*7901324dSJerome Forissier x25519_bad_point_1 ); 2966*7901324dSJerome Forissier static const mbedtls_mpi ecp_x25519_bad_point_2 = ECP_MPI_INIT_ARRAY( 2967*7901324dSJerome Forissier x25519_bad_point_2 ); 2968*7901324dSJerome Forissier #endif /* MBEDTLS_ECP_DP_CURVE25519_ENABLED */ 2969*7901324dSJerome Forissier 2970*7901324dSJerome Forissier /* 2971*7901324dSJerome Forissier * Check that the input point is not one of the low-order points. 2972*7901324dSJerome Forissier * This is recommended by the "May the Fourth" paper: 2973*7901324dSJerome Forissier * https://eprint.iacr.org/2017/806.pdf 2974*7901324dSJerome Forissier * Those points are never sent by an honest peer. 2975*7901324dSJerome Forissier */ 2976*7901324dSJerome Forissier static int ecp_check_bad_points_mx( const mbedtls_mpi *X, const mbedtls_mpi *P, 2977*7901324dSJerome Forissier const mbedtls_ecp_group_id grp_id ) 2978*7901324dSJerome Forissier { 2979*7901324dSJerome Forissier int ret; 2980*7901324dSJerome Forissier mbedtls_mpi XmP; 2981*7901324dSJerome Forissier 2982*7901324dSJerome Forissier mbedtls_mpi_init( &XmP ); 2983*7901324dSJerome Forissier 2984*7901324dSJerome Forissier /* Reduce X mod P so that we only need to check values less than P. 2985*7901324dSJerome Forissier * We know X < 2^256 so we can proceed by subtraction. */ 2986*7901324dSJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_copy( &XmP, X ) ); 2987*7901324dSJerome Forissier while( mbedtls_mpi_cmp_mpi( &XmP, P ) >= 0 ) 2988*7901324dSJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_sub_mpi( &XmP, &XmP, P ) ); 2989*7901324dSJerome Forissier 2990*7901324dSJerome Forissier /* Check against the known bad values that are less than P. For Curve448 2991*7901324dSJerome Forissier * these are 0, 1 and -1. For Curve25519 we check the values less than P 2992*7901324dSJerome Forissier * from the following list: https://cr.yp.to/ecdh.html#validate */ 2993*7901324dSJerome Forissier if( mbedtls_mpi_cmp_int( &XmP, 1 ) <= 0 ) /* takes care of 0 and 1 */ 2994*7901324dSJerome Forissier { 2995*7901324dSJerome Forissier ret = MBEDTLS_ERR_ECP_INVALID_KEY; 2996*7901324dSJerome Forissier goto cleanup; 2997*7901324dSJerome Forissier } 2998*7901324dSJerome Forissier 2999*7901324dSJerome Forissier #if defined(MBEDTLS_ECP_DP_CURVE25519_ENABLED) 3000*7901324dSJerome Forissier if( grp_id == MBEDTLS_ECP_DP_CURVE25519 ) 3001*7901324dSJerome Forissier { 3002*7901324dSJerome Forissier if( mbedtls_mpi_cmp_mpi( &XmP, &ecp_x25519_bad_point_1 ) == 0 ) 3003*7901324dSJerome Forissier { 3004*7901324dSJerome Forissier ret = MBEDTLS_ERR_ECP_INVALID_KEY; 3005*7901324dSJerome Forissier goto cleanup; 3006*7901324dSJerome Forissier } 3007*7901324dSJerome Forissier 3008*7901324dSJerome Forissier if( mbedtls_mpi_cmp_mpi( &XmP, &ecp_x25519_bad_point_2 ) == 0 ) 3009*7901324dSJerome Forissier { 3010*7901324dSJerome Forissier ret = MBEDTLS_ERR_ECP_INVALID_KEY; 3011*7901324dSJerome Forissier goto cleanup; 3012*7901324dSJerome Forissier } 3013*7901324dSJerome Forissier } 3014*7901324dSJerome Forissier #else 3015*7901324dSJerome Forissier (void) grp_id; 3016*7901324dSJerome Forissier #endif 3017*7901324dSJerome Forissier 3018*7901324dSJerome Forissier /* Final check: check if XmP + 1 is P (final because it changes XmP!) */ 3019*7901324dSJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_add_int( &XmP, &XmP, 1 ) ); 3020*7901324dSJerome Forissier if( mbedtls_mpi_cmp_mpi( &XmP, P ) == 0 ) 3021*7901324dSJerome Forissier { 3022*7901324dSJerome Forissier ret = MBEDTLS_ERR_ECP_INVALID_KEY; 3023*7901324dSJerome Forissier goto cleanup; 3024*7901324dSJerome Forissier } 3025*7901324dSJerome Forissier 3026*7901324dSJerome Forissier ret = 0; 3027*7901324dSJerome Forissier 3028*7901324dSJerome Forissier cleanup: 3029*7901324dSJerome Forissier mbedtls_mpi_free( &XmP ); 3030*7901324dSJerome Forissier 3031*7901324dSJerome Forissier return( ret ); 3032*7901324dSJerome Forissier } 3033*7901324dSJerome Forissier 3034817466cbSJens Wiklander /* 3035817466cbSJens Wiklander * Check validity of a public key for Montgomery curves with x-only schemes 3036817466cbSJens Wiklander */ 3037817466cbSJens Wiklander static int ecp_check_pubkey_mx( const mbedtls_ecp_group *grp, const mbedtls_ecp_point *pt ) 3038817466cbSJens Wiklander { 3039817466cbSJens Wiklander /* [Curve25519 p. 5] Just check X is the correct number of bytes */ 30403d3b0591SJens Wiklander /* Allow any public value, if it's too big then we'll just reduce it mod p 30413d3b0591SJens Wiklander * (RFC 7748 sec. 5 para. 3). */ 3042817466cbSJens Wiklander if( mbedtls_mpi_size( &pt->X ) > ( grp->nbits + 7 ) / 8 ) 3043817466cbSJens Wiklander return( MBEDTLS_ERR_ECP_INVALID_KEY ); 3044817466cbSJens Wiklander 3045*7901324dSJerome Forissier /* Implicit in all standards (as they don't consider negative numbers): 3046*7901324dSJerome Forissier * X must be non-negative. This is normally ensured by the way it's 3047*7901324dSJerome Forissier * encoded for transmission, but let's be extra sure. */ 3048*7901324dSJerome Forissier if( mbedtls_mpi_cmp_int( &pt->X, 0 ) < 0 ) 3049*7901324dSJerome Forissier return( MBEDTLS_ERR_ECP_INVALID_KEY ); 3050*7901324dSJerome Forissier 3051*7901324dSJerome Forissier return( ecp_check_bad_points_mx( &pt->X, &grp->P, grp->id ) ); 3052817466cbSJens Wiklander } 3053*7901324dSJerome Forissier #endif /* MBEDTLS_ECP_MONTGOMERY_ENABLED */ 3054817466cbSJens Wiklander 3055817466cbSJens Wiklander /* 3056817466cbSJens Wiklander * Check that a point is valid as a public key 3057817466cbSJens Wiklander */ 30583d3b0591SJens Wiklander int mbedtls_ecp_check_pubkey( const mbedtls_ecp_group *grp, 30593d3b0591SJens Wiklander const mbedtls_ecp_point *pt ) 3060817466cbSJens Wiklander { 30613d3b0591SJens Wiklander ECP_VALIDATE_RET( grp != NULL ); 30623d3b0591SJens Wiklander ECP_VALIDATE_RET( pt != NULL ); 30633d3b0591SJens Wiklander 3064817466cbSJens Wiklander /* Must use affine coordinates */ 3065817466cbSJens Wiklander if( mbedtls_mpi_cmp_int( &pt->Z, 1 ) != 0 ) 3066817466cbSJens Wiklander return( MBEDTLS_ERR_ECP_INVALID_KEY ); 3067817466cbSJens Wiklander 3068*7901324dSJerome Forissier #if defined(MBEDTLS_ECP_MONTGOMERY_ENABLED) 306911fa71b9SJerome Forissier if( mbedtls_ecp_get_type( grp ) == MBEDTLS_ECP_TYPE_MONTGOMERY ) 3070817466cbSJens Wiklander return( ecp_check_pubkey_mx( grp, pt ) ); 3071817466cbSJens Wiklander #endif 3072*7901324dSJerome Forissier #if defined(MBEDTLS_ECP_SHORT_WEIERSTRASS_ENABLED) 307311fa71b9SJerome Forissier if( mbedtls_ecp_get_type( grp ) == MBEDTLS_ECP_TYPE_SHORT_WEIERSTRASS ) 3074817466cbSJens Wiklander return( ecp_check_pubkey_sw( grp, pt ) ); 3075817466cbSJens Wiklander #endif 3076817466cbSJens Wiklander return( MBEDTLS_ERR_ECP_BAD_INPUT_DATA ); 3077817466cbSJens Wiklander } 3078817466cbSJens Wiklander 3079817466cbSJens Wiklander /* 3080817466cbSJens Wiklander * Check that an mbedtls_mpi is valid as a private key 3081817466cbSJens Wiklander */ 30823d3b0591SJens Wiklander int mbedtls_ecp_check_privkey( const mbedtls_ecp_group *grp, 30833d3b0591SJens Wiklander const mbedtls_mpi *d ) 3084817466cbSJens Wiklander { 30853d3b0591SJens Wiklander ECP_VALIDATE_RET( grp != NULL ); 30863d3b0591SJens Wiklander ECP_VALIDATE_RET( d != NULL ); 30873d3b0591SJens Wiklander 3088*7901324dSJerome Forissier #if defined(MBEDTLS_ECP_MONTGOMERY_ENABLED) 308911fa71b9SJerome Forissier if( mbedtls_ecp_get_type( grp ) == MBEDTLS_ECP_TYPE_MONTGOMERY ) 3090817466cbSJens Wiklander { 30913d3b0591SJens Wiklander /* see RFC 7748 sec. 5 para. 5 */ 3092817466cbSJens Wiklander if( mbedtls_mpi_get_bit( d, 0 ) != 0 || 3093817466cbSJens Wiklander mbedtls_mpi_get_bit( d, 1 ) != 0 || 3094817466cbSJens Wiklander mbedtls_mpi_bitlen( d ) - 1 != grp->nbits ) /* mbedtls_mpi_bitlen is one-based! */ 3095817466cbSJens Wiklander return( MBEDTLS_ERR_ECP_INVALID_KEY ); 30963d3b0591SJens Wiklander 30973d3b0591SJens Wiklander /* see [Curve25519] page 5 */ 30983d3b0591SJens Wiklander if( grp->nbits == 254 && mbedtls_mpi_get_bit( d, 2 ) != 0 ) 30993d3b0591SJens Wiklander return( MBEDTLS_ERR_ECP_INVALID_KEY ); 31003d3b0591SJens Wiklander 3101817466cbSJens Wiklander return( 0 ); 3102817466cbSJens Wiklander } 3103*7901324dSJerome Forissier #endif /* MBEDTLS_ECP_MONTGOMERY_ENABLED */ 3104*7901324dSJerome Forissier #if defined(MBEDTLS_ECP_SHORT_WEIERSTRASS_ENABLED) 310511fa71b9SJerome Forissier if( mbedtls_ecp_get_type( grp ) == MBEDTLS_ECP_TYPE_SHORT_WEIERSTRASS ) 3106817466cbSJens Wiklander { 3107817466cbSJens Wiklander /* see SEC1 3.2 */ 3108817466cbSJens Wiklander if( mbedtls_mpi_cmp_int( d, 1 ) < 0 || 3109817466cbSJens Wiklander mbedtls_mpi_cmp_mpi( d, &grp->N ) >= 0 ) 3110817466cbSJens Wiklander return( MBEDTLS_ERR_ECP_INVALID_KEY ); 3111817466cbSJens Wiklander else 3112817466cbSJens Wiklander return( 0 ); 3113817466cbSJens Wiklander } 3114*7901324dSJerome Forissier #endif /* MBEDTLS_ECP_SHORT_WEIERSTRASS_ENABLED */ 3115817466cbSJens Wiklander 3116817466cbSJens Wiklander return( MBEDTLS_ERR_ECP_BAD_INPUT_DATA ); 3117817466cbSJens Wiklander } 3118817466cbSJens Wiklander 3119*7901324dSJerome Forissier #if defined(MBEDTLS_ECP_MONTGOMERY_ENABLED) 3120*7901324dSJerome Forissier MBEDTLS_STATIC_TESTABLE 3121*7901324dSJerome Forissier int mbedtls_ecp_gen_privkey_mx( size_t high_bit, 3122*7901324dSJerome Forissier mbedtls_mpi *d, 3123*7901324dSJerome Forissier int (*f_rng)(void *, unsigned char *, size_t), 3124*7901324dSJerome Forissier void *p_rng ) 3125*7901324dSJerome Forissier { 3126*7901324dSJerome Forissier int ret = MBEDTLS_ERR_ECP_BAD_INPUT_DATA; 3127*7901324dSJerome Forissier size_t n_random_bytes = high_bit / 8 + 1; 3128*7901324dSJerome Forissier 3129*7901324dSJerome Forissier /* [Curve25519] page 5 */ 3130*7901324dSJerome Forissier /* Generate a (high_bit+1)-bit random number by generating just enough 3131*7901324dSJerome Forissier * random bytes, then shifting out extra bits from the top (necessary 3132*7901324dSJerome Forissier * when (high_bit+1) is not a multiple of 8). */ 3133*7901324dSJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_fill_random( d, n_random_bytes, 3134*7901324dSJerome Forissier f_rng, p_rng ) ); 3135*7901324dSJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_shift_r( d, 8 * n_random_bytes - high_bit - 1 ) ); 3136*7901324dSJerome Forissier 3137*7901324dSJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_set_bit( d, high_bit, 1 ) ); 3138*7901324dSJerome Forissier 3139*7901324dSJerome Forissier /* Make sure the last two bits are unset for Curve448, three bits for 3140*7901324dSJerome Forissier Curve25519 */ 3141*7901324dSJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_set_bit( d, 0, 0 ) ); 3142*7901324dSJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_set_bit( d, 1, 0 ) ); 3143*7901324dSJerome Forissier if( high_bit == 254 ) 3144*7901324dSJerome Forissier { 3145*7901324dSJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_set_bit( d, 2, 0 ) ); 3146*7901324dSJerome Forissier } 3147*7901324dSJerome Forissier 3148*7901324dSJerome Forissier cleanup: 3149*7901324dSJerome Forissier return( ret ); 3150*7901324dSJerome Forissier } 3151*7901324dSJerome Forissier #endif /* MBEDTLS_ECP_MONTGOMERY_ENABLED */ 3152*7901324dSJerome Forissier 3153*7901324dSJerome Forissier #if defined(MBEDTLS_ECP_SHORT_WEIERSTRASS_ENABLED) 3154*7901324dSJerome Forissier static int mbedtls_ecp_gen_privkey_sw( 3155*7901324dSJerome Forissier const mbedtls_mpi *N, mbedtls_mpi *d, 3156*7901324dSJerome Forissier int (*f_rng)(void *, unsigned char *, size_t), void *p_rng ) 3157*7901324dSJerome Forissier { 3158*7901324dSJerome Forissier int ret = mbedtls_mpi_random( d, 1, N, f_rng, p_rng ); 3159*7901324dSJerome Forissier switch( ret ) 3160*7901324dSJerome Forissier { 3161*7901324dSJerome Forissier case MBEDTLS_ERR_MPI_NOT_ACCEPTABLE: 3162*7901324dSJerome Forissier return( MBEDTLS_ERR_ECP_RANDOM_FAILED ); 3163*7901324dSJerome Forissier default: 3164*7901324dSJerome Forissier return( ret ); 3165*7901324dSJerome Forissier } 3166*7901324dSJerome Forissier } 3167*7901324dSJerome Forissier #endif /* MBEDTLS_ECP_SHORT_WEIERSTRASS_ENABLED */ 3168*7901324dSJerome Forissier 3169817466cbSJens Wiklander /* 31703d3b0591SJens Wiklander * Generate a private key 3171817466cbSJens Wiklander */ 31723d3b0591SJens Wiklander int mbedtls_ecp_gen_privkey( const mbedtls_ecp_group *grp, 31733d3b0591SJens Wiklander mbedtls_mpi *d, 3174817466cbSJens Wiklander int (*f_rng)(void *, unsigned char *, size_t), 3175817466cbSJens Wiklander void *p_rng ) 3176817466cbSJens Wiklander { 31773d3b0591SJens Wiklander ECP_VALIDATE_RET( grp != NULL ); 31783d3b0591SJens Wiklander ECP_VALIDATE_RET( d != NULL ); 31793d3b0591SJens Wiklander ECP_VALIDATE_RET( f_rng != NULL ); 31803d3b0591SJens Wiklander 3181*7901324dSJerome Forissier #if defined(MBEDTLS_ECP_MONTGOMERY_ENABLED) 318211fa71b9SJerome Forissier if( mbedtls_ecp_get_type( grp ) == MBEDTLS_ECP_TYPE_MONTGOMERY ) 3183*7901324dSJerome Forissier return( mbedtls_ecp_gen_privkey_mx( grp->nbits, d, f_rng, p_rng ) ); 3184*7901324dSJerome Forissier #endif /* MBEDTLS_ECP_MONTGOMERY_ENABLED */ 3185817466cbSJens Wiklander 3186*7901324dSJerome Forissier #if defined(MBEDTLS_ECP_SHORT_WEIERSTRASS_ENABLED) 318711fa71b9SJerome Forissier if( mbedtls_ecp_get_type( grp ) == MBEDTLS_ECP_TYPE_SHORT_WEIERSTRASS ) 3188*7901324dSJerome Forissier return( mbedtls_ecp_gen_privkey_sw( &grp->N, d, f_rng, p_rng ) ); 3189*7901324dSJerome Forissier #endif /* MBEDTLS_ECP_SHORT_WEIERSTRASS_ENABLED */ 3190817466cbSJens Wiklander 3191*7901324dSJerome Forissier return( MBEDTLS_ERR_ECP_BAD_INPUT_DATA ); 31923d3b0591SJens Wiklander } 3193817466cbSJens Wiklander 31943d3b0591SJens Wiklander /* 31953d3b0591SJens Wiklander * Generate a keypair with configurable base point 31963d3b0591SJens Wiklander */ 31973d3b0591SJens Wiklander int mbedtls_ecp_gen_keypair_base( mbedtls_ecp_group *grp, 31983d3b0591SJens Wiklander const mbedtls_ecp_point *G, 31993d3b0591SJens Wiklander mbedtls_mpi *d, mbedtls_ecp_point *Q, 32003d3b0591SJens Wiklander int (*f_rng)(void *, unsigned char *, size_t), 32013d3b0591SJens Wiklander void *p_rng ) 32023d3b0591SJens Wiklander { 320311fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 32043d3b0591SJens Wiklander ECP_VALIDATE_RET( grp != NULL ); 32053d3b0591SJens Wiklander ECP_VALIDATE_RET( d != NULL ); 32063d3b0591SJens Wiklander ECP_VALIDATE_RET( G != NULL ); 32073d3b0591SJens Wiklander ECP_VALIDATE_RET( Q != NULL ); 32083d3b0591SJens Wiklander ECP_VALIDATE_RET( f_rng != NULL ); 32093d3b0591SJens Wiklander 32103d3b0591SJens Wiklander MBEDTLS_MPI_CHK( mbedtls_ecp_gen_privkey( grp, d, f_rng, p_rng ) ); 32113d3b0591SJens Wiklander MBEDTLS_MPI_CHK( mbedtls_ecp_mul( grp, Q, d, G, f_rng, p_rng ) ); 32123d3b0591SJens Wiklander 32133d3b0591SJens Wiklander cleanup: 32143d3b0591SJens Wiklander return( ret ); 3215817466cbSJens Wiklander } 3216817466cbSJens Wiklander 3217817466cbSJens Wiklander /* 3218817466cbSJens Wiklander * Generate key pair, wrapper for conventional base point 3219817466cbSJens Wiklander */ 3220817466cbSJens Wiklander int mbedtls_ecp_gen_keypair( mbedtls_ecp_group *grp, 3221817466cbSJens Wiklander mbedtls_mpi *d, mbedtls_ecp_point *Q, 3222817466cbSJens Wiklander int (*f_rng)(void *, unsigned char *, size_t), 3223817466cbSJens Wiklander void *p_rng ) 3224817466cbSJens Wiklander { 32253d3b0591SJens Wiklander ECP_VALIDATE_RET( grp != NULL ); 32263d3b0591SJens Wiklander ECP_VALIDATE_RET( d != NULL ); 32273d3b0591SJens Wiklander ECP_VALIDATE_RET( Q != NULL ); 32283d3b0591SJens Wiklander ECP_VALIDATE_RET( f_rng != NULL ); 32293d3b0591SJens Wiklander 3230817466cbSJens Wiklander return( mbedtls_ecp_gen_keypair_base( grp, &grp->G, d, Q, f_rng, p_rng ) ); 3231817466cbSJens Wiklander } 3232817466cbSJens Wiklander 3233817466cbSJens Wiklander /* 3234817466cbSJens Wiklander * Generate a keypair, prettier wrapper 3235817466cbSJens Wiklander */ 3236817466cbSJens Wiklander int mbedtls_ecp_gen_key( mbedtls_ecp_group_id grp_id, mbedtls_ecp_keypair *key, 3237817466cbSJens Wiklander int (*f_rng)(void *, unsigned char *, size_t), void *p_rng ) 3238817466cbSJens Wiklander { 323911fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 32403d3b0591SJens Wiklander ECP_VALIDATE_RET( key != NULL ); 32413d3b0591SJens Wiklander ECP_VALIDATE_RET( f_rng != NULL ); 3242817466cbSJens Wiklander 3243817466cbSJens Wiklander if( ( ret = mbedtls_ecp_group_load( &key->grp, grp_id ) ) != 0 ) 3244817466cbSJens Wiklander return( ret ); 3245817466cbSJens Wiklander 3246817466cbSJens Wiklander return( mbedtls_ecp_gen_keypair( &key->grp, &key->d, &key->Q, f_rng, p_rng ) ); 3247817466cbSJens Wiklander } 3248817466cbSJens Wiklander 324911fa71b9SJerome Forissier #define ECP_CURVE25519_KEY_SIZE 32 325011fa71b9SJerome Forissier /* 325111fa71b9SJerome Forissier * Read a private key. 325211fa71b9SJerome Forissier */ 325311fa71b9SJerome Forissier int mbedtls_ecp_read_key( mbedtls_ecp_group_id grp_id, mbedtls_ecp_keypair *key, 325411fa71b9SJerome Forissier const unsigned char *buf, size_t buflen ) 325511fa71b9SJerome Forissier { 325611fa71b9SJerome Forissier int ret = 0; 325711fa71b9SJerome Forissier 325811fa71b9SJerome Forissier ECP_VALIDATE_RET( key != NULL ); 325911fa71b9SJerome Forissier ECP_VALIDATE_RET( buf != NULL ); 326011fa71b9SJerome Forissier 326111fa71b9SJerome Forissier if( ( ret = mbedtls_ecp_group_load( &key->grp, grp_id ) ) != 0 ) 326211fa71b9SJerome Forissier return( ret ); 326311fa71b9SJerome Forissier 326411fa71b9SJerome Forissier ret = MBEDTLS_ERR_ECP_FEATURE_UNAVAILABLE; 326511fa71b9SJerome Forissier 3266*7901324dSJerome Forissier #if defined(MBEDTLS_ECP_MONTGOMERY_ENABLED) 326711fa71b9SJerome Forissier if( mbedtls_ecp_get_type( &key->grp ) == MBEDTLS_ECP_TYPE_MONTGOMERY ) 326811fa71b9SJerome Forissier { 326911fa71b9SJerome Forissier /* 327011fa71b9SJerome Forissier * If it is Curve25519 curve then mask the key as mandated by RFC7748 327111fa71b9SJerome Forissier */ 327211fa71b9SJerome Forissier if( grp_id == MBEDTLS_ECP_DP_CURVE25519 ) 327311fa71b9SJerome Forissier { 327411fa71b9SJerome Forissier if( buflen != ECP_CURVE25519_KEY_SIZE ) 327511fa71b9SJerome Forissier return MBEDTLS_ERR_ECP_INVALID_KEY; 327611fa71b9SJerome Forissier 327711fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_read_binary_le( &key->d, buf, buflen ) ); 327811fa71b9SJerome Forissier 327911fa71b9SJerome Forissier /* Set the three least significant bits to 0 */ 328011fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_set_bit( &key->d, 0, 0 ) ); 328111fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_set_bit( &key->d, 1, 0 ) ); 328211fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_set_bit( &key->d, 2, 0 ) ); 328311fa71b9SJerome Forissier 328411fa71b9SJerome Forissier /* Set the most significant bit to 0 */ 328511fa71b9SJerome Forissier MBEDTLS_MPI_CHK( 328611fa71b9SJerome Forissier mbedtls_mpi_set_bit( &key->d, 328711fa71b9SJerome Forissier ECP_CURVE25519_KEY_SIZE * 8 - 1, 0 ) 328811fa71b9SJerome Forissier ); 328911fa71b9SJerome Forissier 329011fa71b9SJerome Forissier /* Set the second most significant bit to 1 */ 329111fa71b9SJerome Forissier MBEDTLS_MPI_CHK( 329211fa71b9SJerome Forissier mbedtls_mpi_set_bit( &key->d, 329311fa71b9SJerome Forissier ECP_CURVE25519_KEY_SIZE * 8 - 2, 1 ) 329411fa71b9SJerome Forissier ); 329511fa71b9SJerome Forissier } 329611fa71b9SJerome Forissier else 329711fa71b9SJerome Forissier ret = MBEDTLS_ERR_ECP_FEATURE_UNAVAILABLE; 329811fa71b9SJerome Forissier } 329911fa71b9SJerome Forissier 330011fa71b9SJerome Forissier #endif 3301*7901324dSJerome Forissier #if defined(MBEDTLS_ECP_SHORT_WEIERSTRASS_ENABLED) 330211fa71b9SJerome Forissier if( mbedtls_ecp_get_type( &key->grp ) == MBEDTLS_ECP_TYPE_SHORT_WEIERSTRASS ) 330311fa71b9SJerome Forissier { 330411fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_read_binary( &key->d, buf, buflen ) ); 330511fa71b9SJerome Forissier 330611fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_ecp_check_privkey( &key->grp, &key->d ) ); 330711fa71b9SJerome Forissier } 330811fa71b9SJerome Forissier 330911fa71b9SJerome Forissier #endif 331011fa71b9SJerome Forissier cleanup: 331111fa71b9SJerome Forissier 331211fa71b9SJerome Forissier if( ret != 0 ) 331311fa71b9SJerome Forissier mbedtls_mpi_free( &key->d ); 331411fa71b9SJerome Forissier 331511fa71b9SJerome Forissier return( ret ); 331611fa71b9SJerome Forissier } 331711fa71b9SJerome Forissier 3318817466cbSJens Wiklander /* 3319*7901324dSJerome Forissier * Write a private key. 3320*7901324dSJerome Forissier */ 3321*7901324dSJerome Forissier int mbedtls_ecp_write_key( mbedtls_ecp_keypair *key, 3322*7901324dSJerome Forissier unsigned char *buf, size_t buflen ) 3323*7901324dSJerome Forissier { 3324*7901324dSJerome Forissier int ret = MBEDTLS_ERR_ECP_FEATURE_UNAVAILABLE; 3325*7901324dSJerome Forissier 3326*7901324dSJerome Forissier ECP_VALIDATE_RET( key != NULL ); 3327*7901324dSJerome Forissier ECP_VALIDATE_RET( buf != NULL ); 3328*7901324dSJerome Forissier 3329*7901324dSJerome Forissier #if defined(MBEDTLS_ECP_MONTGOMERY_ENABLED) 3330*7901324dSJerome Forissier if( mbedtls_ecp_get_type( &key->grp ) == MBEDTLS_ECP_TYPE_MONTGOMERY ) 3331*7901324dSJerome Forissier { 3332*7901324dSJerome Forissier if( key->grp.id == MBEDTLS_ECP_DP_CURVE25519 ) 3333*7901324dSJerome Forissier { 3334*7901324dSJerome Forissier if( buflen < ECP_CURVE25519_KEY_SIZE ) 3335*7901324dSJerome Forissier return MBEDTLS_ERR_ECP_BUFFER_TOO_SMALL; 3336*7901324dSJerome Forissier 3337*7901324dSJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_write_binary_le( &key->d, buf, buflen ) ); 3338*7901324dSJerome Forissier } 3339*7901324dSJerome Forissier else 3340*7901324dSJerome Forissier ret = MBEDTLS_ERR_ECP_FEATURE_UNAVAILABLE; 3341*7901324dSJerome Forissier } 3342*7901324dSJerome Forissier 3343*7901324dSJerome Forissier #endif 3344*7901324dSJerome Forissier #if defined(MBEDTLS_ECP_SHORT_WEIERSTRASS_ENABLED) 3345*7901324dSJerome Forissier if( mbedtls_ecp_get_type( &key->grp ) == MBEDTLS_ECP_TYPE_SHORT_WEIERSTRASS ) 3346*7901324dSJerome Forissier { 3347*7901324dSJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_write_binary( &key->d, buf, buflen ) ); 3348*7901324dSJerome Forissier } 3349*7901324dSJerome Forissier 3350*7901324dSJerome Forissier #endif 3351*7901324dSJerome Forissier cleanup: 3352*7901324dSJerome Forissier 3353*7901324dSJerome Forissier return( ret ); 3354*7901324dSJerome Forissier } 3355*7901324dSJerome Forissier 3356*7901324dSJerome Forissier 3357*7901324dSJerome Forissier /* 3358817466cbSJens Wiklander * Check a public-private key pair 3359817466cbSJens Wiklander */ 3360817466cbSJens Wiklander int mbedtls_ecp_check_pub_priv( const mbedtls_ecp_keypair *pub, const mbedtls_ecp_keypair *prv ) 3361817466cbSJens Wiklander { 336211fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 3363817466cbSJens Wiklander mbedtls_ecp_point Q; 3364817466cbSJens Wiklander mbedtls_ecp_group grp; 33653d3b0591SJens Wiklander ECP_VALIDATE_RET( pub != NULL ); 33663d3b0591SJens Wiklander ECP_VALIDATE_RET( prv != NULL ); 3367817466cbSJens Wiklander 3368817466cbSJens Wiklander if( pub->grp.id == MBEDTLS_ECP_DP_NONE || 3369817466cbSJens Wiklander pub->grp.id != prv->grp.id || 3370817466cbSJens Wiklander mbedtls_mpi_cmp_mpi( &pub->Q.X, &prv->Q.X ) || 3371817466cbSJens Wiklander mbedtls_mpi_cmp_mpi( &pub->Q.Y, &prv->Q.Y ) || 3372817466cbSJens Wiklander mbedtls_mpi_cmp_mpi( &pub->Q.Z, &prv->Q.Z ) ) 3373817466cbSJens Wiklander { 3374817466cbSJens Wiklander return( MBEDTLS_ERR_ECP_BAD_INPUT_DATA ); 3375817466cbSJens Wiklander } 3376817466cbSJens Wiklander 3377817466cbSJens Wiklander mbedtls_ecp_point_init( &Q ); 3378817466cbSJens Wiklander mbedtls_ecp_group_init( &grp ); 3379817466cbSJens Wiklander 3380817466cbSJens Wiklander /* mbedtls_ecp_mul() needs a non-const group... */ 3381817466cbSJens Wiklander mbedtls_ecp_group_copy( &grp, &prv->grp ); 3382817466cbSJens Wiklander 3383817466cbSJens Wiklander /* Also checks d is valid */ 3384817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_ecp_mul( &grp, &Q, &prv->d, &prv->grp.G, NULL, NULL ) ); 3385817466cbSJens Wiklander 3386817466cbSJens Wiklander if( mbedtls_mpi_cmp_mpi( &Q.X, &prv->Q.X ) || 3387817466cbSJens Wiklander mbedtls_mpi_cmp_mpi( &Q.Y, &prv->Q.Y ) || 3388817466cbSJens Wiklander mbedtls_mpi_cmp_mpi( &Q.Z, &prv->Q.Z ) ) 3389817466cbSJens Wiklander { 3390817466cbSJens Wiklander ret = MBEDTLS_ERR_ECP_BAD_INPUT_DATA; 3391817466cbSJens Wiklander goto cleanup; 3392817466cbSJens Wiklander } 3393817466cbSJens Wiklander 3394817466cbSJens Wiklander cleanup: 3395817466cbSJens Wiklander mbedtls_ecp_point_free( &Q ); 3396817466cbSJens Wiklander mbedtls_ecp_group_free( &grp ); 3397817466cbSJens Wiklander 3398817466cbSJens Wiklander return( ret ); 3399817466cbSJens Wiklander } 3400817466cbSJens Wiklander 3401817466cbSJens Wiklander #if defined(MBEDTLS_SELF_TEST) 3402817466cbSJens Wiklander 3403*7901324dSJerome Forissier /* Adjust the exponent to be a valid private point for the specified curve. 3404*7901324dSJerome Forissier * This is sometimes necessary because we use a single set of exponents 3405*7901324dSJerome Forissier * for all curves but the validity of values depends on the curve. */ 3406*7901324dSJerome Forissier static int self_test_adjust_exponent( const mbedtls_ecp_group *grp, 3407*7901324dSJerome Forissier mbedtls_mpi *m ) 3408*7901324dSJerome Forissier { 3409*7901324dSJerome Forissier int ret = 0; 3410*7901324dSJerome Forissier switch( grp->id ) 3411*7901324dSJerome Forissier { 3412*7901324dSJerome Forissier /* If Curve25519 is available, then that's what we use for the 3413*7901324dSJerome Forissier * Montgomery test, so we don't need the adjustment code. */ 3414*7901324dSJerome Forissier #if ! defined(MBEDTLS_ECP_DP_CURVE25519_ENABLED) 3415*7901324dSJerome Forissier #if defined(MBEDTLS_ECP_DP_CURVE448_ENABLED) 3416*7901324dSJerome Forissier case MBEDTLS_ECP_DP_CURVE448: 3417*7901324dSJerome Forissier /* Move highest bit from 254 to N-1. Setting bit N-1 is 3418*7901324dSJerome Forissier * necessary to enforce the highest-bit-set constraint. */ 3419*7901324dSJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_set_bit( m, 254, 0 ) ); 3420*7901324dSJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_set_bit( m, grp->nbits, 1 ) ); 3421*7901324dSJerome Forissier /* Copy second-highest bit from 253 to N-2. This is not 3422*7901324dSJerome Forissier * necessary but improves the test variety a bit. */ 3423*7901324dSJerome Forissier MBEDTLS_MPI_CHK( 3424*7901324dSJerome Forissier mbedtls_mpi_set_bit( m, grp->nbits - 1, 3425*7901324dSJerome Forissier mbedtls_mpi_get_bit( m, 253 ) ) ); 3426*7901324dSJerome Forissier break; 3427*7901324dSJerome Forissier #endif 3428*7901324dSJerome Forissier #endif /* ! defined(MBEDTLS_ECP_DP_CURVE25519_ENABLED) */ 3429*7901324dSJerome Forissier default: 3430*7901324dSJerome Forissier /* Non-Montgomery curves and Curve25519 need no adjustment. */ 3431*7901324dSJerome Forissier (void) grp; 3432*7901324dSJerome Forissier (void) m; 3433*7901324dSJerome Forissier goto cleanup; 3434*7901324dSJerome Forissier } 3435*7901324dSJerome Forissier cleanup: 3436*7901324dSJerome Forissier return( ret ); 3437*7901324dSJerome Forissier } 3438*7901324dSJerome Forissier 3439*7901324dSJerome Forissier /* Calculate R = m.P for each m in exponents. Check that the number of 3440*7901324dSJerome Forissier * basic operations doesn't depend on the value of m. */ 3441*7901324dSJerome Forissier static int self_test_point( int verbose, 3442*7901324dSJerome Forissier mbedtls_ecp_group *grp, 3443*7901324dSJerome Forissier mbedtls_ecp_point *R, 3444*7901324dSJerome Forissier mbedtls_mpi *m, 3445*7901324dSJerome Forissier const mbedtls_ecp_point *P, 3446*7901324dSJerome Forissier const char *const *exponents, 3447*7901324dSJerome Forissier size_t n_exponents ) 3448*7901324dSJerome Forissier { 3449*7901324dSJerome Forissier int ret = 0; 3450*7901324dSJerome Forissier size_t i = 0; 3451*7901324dSJerome Forissier unsigned long add_c_prev, dbl_c_prev, mul_c_prev; 3452*7901324dSJerome Forissier add_count = 0; 3453*7901324dSJerome Forissier dbl_count = 0; 3454*7901324dSJerome Forissier mul_count = 0; 3455*7901324dSJerome Forissier 3456*7901324dSJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_read_string( m, 16, exponents[0] ) ); 3457*7901324dSJerome Forissier MBEDTLS_MPI_CHK( self_test_adjust_exponent( grp, m ) ); 3458*7901324dSJerome Forissier MBEDTLS_MPI_CHK( mbedtls_ecp_mul( grp, R, m, P, NULL, NULL ) ); 3459*7901324dSJerome Forissier 3460*7901324dSJerome Forissier for( i = 1; i < n_exponents; i++ ) 3461*7901324dSJerome Forissier { 3462*7901324dSJerome Forissier add_c_prev = add_count; 3463*7901324dSJerome Forissier dbl_c_prev = dbl_count; 3464*7901324dSJerome Forissier mul_c_prev = mul_count; 3465*7901324dSJerome Forissier add_count = 0; 3466*7901324dSJerome Forissier dbl_count = 0; 3467*7901324dSJerome Forissier mul_count = 0; 3468*7901324dSJerome Forissier 3469*7901324dSJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_read_string( m, 16, exponents[i] ) ); 3470*7901324dSJerome Forissier MBEDTLS_MPI_CHK( self_test_adjust_exponent( grp, m ) ); 3471*7901324dSJerome Forissier MBEDTLS_MPI_CHK( mbedtls_ecp_mul( grp, R, m, P, NULL, NULL ) ); 3472*7901324dSJerome Forissier 3473*7901324dSJerome Forissier if( add_count != add_c_prev || 3474*7901324dSJerome Forissier dbl_count != dbl_c_prev || 3475*7901324dSJerome Forissier mul_count != mul_c_prev ) 3476*7901324dSJerome Forissier { 3477*7901324dSJerome Forissier ret = 1; 3478*7901324dSJerome Forissier break; 3479*7901324dSJerome Forissier } 3480*7901324dSJerome Forissier } 3481*7901324dSJerome Forissier 3482*7901324dSJerome Forissier cleanup: 3483*7901324dSJerome Forissier if( verbose != 0 ) 3484*7901324dSJerome Forissier { 3485*7901324dSJerome Forissier if( ret != 0 ) 3486*7901324dSJerome Forissier mbedtls_printf( "failed (%u)\n", (unsigned int) i ); 3487*7901324dSJerome Forissier else 3488*7901324dSJerome Forissier mbedtls_printf( "passed\n" ); 3489*7901324dSJerome Forissier } 3490*7901324dSJerome Forissier return( ret ); 3491*7901324dSJerome Forissier } 3492*7901324dSJerome Forissier 3493817466cbSJens Wiklander /* 3494817466cbSJens Wiklander * Checkup routine 3495817466cbSJens Wiklander */ 3496817466cbSJens Wiklander int mbedtls_ecp_self_test( int verbose ) 3497817466cbSJens Wiklander { 349811fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 3499817466cbSJens Wiklander mbedtls_ecp_group grp; 3500817466cbSJens Wiklander mbedtls_ecp_point R, P; 3501817466cbSJens Wiklander mbedtls_mpi m; 3502*7901324dSJerome Forissier 3503*7901324dSJerome Forissier #if defined(MBEDTLS_ECP_SHORT_WEIERSTRASS_ENABLED) 3504*7901324dSJerome Forissier /* Exponents especially adapted for secp192k1, which has the lowest 3505*7901324dSJerome Forissier * order n of all supported curves (secp192r1 is in a slightly larger 3506*7901324dSJerome Forissier * field but the order of its base point is slightly smaller). */ 3507*7901324dSJerome Forissier const char *sw_exponents[] = 3508817466cbSJens Wiklander { 3509817466cbSJens Wiklander "000000000000000000000000000000000000000000000001", /* one */ 3510*7901324dSJerome Forissier "FFFFFFFFFFFFFFFFFFFFFFFE26F2FC170F69466A74DEFD8C", /* n - 1 */ 3511817466cbSJens Wiklander "5EA6F389A38B8BC81E767753B15AA5569E1782E30ABE7D25", /* random */ 3512817466cbSJens Wiklander "400000000000000000000000000000000000000000000000", /* one and zeros */ 3513817466cbSJens Wiklander "7FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF", /* all ones */ 3514817466cbSJens Wiklander "555555555555555555555555555555555555555555555555", /* 101010... */ 3515817466cbSJens Wiklander }; 3516*7901324dSJerome Forissier #endif /* MBEDTLS_ECP_SHORT_WEIERSTRASS_ENABLED */ 3517*7901324dSJerome Forissier #if defined(MBEDTLS_ECP_MONTGOMERY_ENABLED) 3518*7901324dSJerome Forissier const char *m_exponents[] = 3519*7901324dSJerome Forissier { 3520*7901324dSJerome Forissier /* Valid private values for Curve25519. In a build with Curve448 3521*7901324dSJerome Forissier * but not Curve25519, they will be adjusted in 3522*7901324dSJerome Forissier * self_test_adjust_exponent(). */ 3523*7901324dSJerome Forissier "4000000000000000000000000000000000000000000000000000000000000000", 3524*7901324dSJerome Forissier "5C3C3C3C3C3C3C3C3C3C3C3C3C3C3C3C3C3C3C3C3C3C3C3C3C3C3C3C3C3C3C30", 3525*7901324dSJerome Forissier "5715ECCE24583F7A7023C24164390586842E816D7280A49EF6DF4EAE6B280BF8", 3526*7901324dSJerome Forissier "41A2B017516F6D254E1F002BCCBADD54BE30F8CEC737A0E912B4963B6BA74460", 3527*7901324dSJerome Forissier "5555555555555555555555555555555555555555555555555555555555555550", 3528*7901324dSJerome Forissier "7FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF8", 3529*7901324dSJerome Forissier }; 3530*7901324dSJerome Forissier #endif /* MBEDTLS_ECP_MONTGOMERY_ENABLED */ 3531817466cbSJens Wiklander 3532817466cbSJens Wiklander mbedtls_ecp_group_init( &grp ); 3533817466cbSJens Wiklander mbedtls_ecp_point_init( &R ); 3534817466cbSJens Wiklander mbedtls_ecp_point_init( &P ); 3535817466cbSJens Wiklander mbedtls_mpi_init( &m ); 3536817466cbSJens Wiklander 3537*7901324dSJerome Forissier #if defined(MBEDTLS_ECP_SHORT_WEIERSTRASS_ENABLED) 3538817466cbSJens Wiklander /* Use secp192r1 if available, or any available curve */ 3539817466cbSJens Wiklander #if defined(MBEDTLS_ECP_DP_SECP192R1_ENABLED) 3540817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_ecp_group_load( &grp, MBEDTLS_ECP_DP_SECP192R1 ) ); 3541817466cbSJens Wiklander #else 3542817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_ecp_group_load( &grp, mbedtls_ecp_curve_list()->grp_id ) ); 3543817466cbSJens Wiklander #endif 3544817466cbSJens Wiklander 3545817466cbSJens Wiklander if( verbose != 0 ) 3546*7901324dSJerome Forissier mbedtls_printf( " ECP SW test #1 (constant op_count, base point G): " ); 3547817466cbSJens Wiklander /* Do a dummy multiplication first to trigger precomputation */ 3548817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_lset( &m, 2 ) ); 3549817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_ecp_mul( &grp, &P, &m, &grp.G, NULL, NULL ) ); 3550*7901324dSJerome Forissier ret = self_test_point( verbose, 3551*7901324dSJerome Forissier &grp, &R, &m, &grp.G, 3552*7901324dSJerome Forissier sw_exponents, 3553*7901324dSJerome Forissier sizeof( sw_exponents ) / sizeof( sw_exponents[0] )); 3554*7901324dSJerome Forissier if( ret != 0 ) 3555817466cbSJens Wiklander goto cleanup; 3556817466cbSJens Wiklander 3557817466cbSJens Wiklander if( verbose != 0 ) 3558*7901324dSJerome Forissier mbedtls_printf( " ECP SW test #2 (constant op_count, other point): " ); 3559817466cbSJens Wiklander /* We computed P = 2G last time, use it */ 3560*7901324dSJerome Forissier ret = self_test_point( verbose, 3561*7901324dSJerome Forissier &grp, &R, &m, &P, 3562*7901324dSJerome Forissier sw_exponents, 3563*7901324dSJerome Forissier sizeof( sw_exponents ) / sizeof( sw_exponents[0] )); 3564*7901324dSJerome Forissier if( ret != 0 ) 3565817466cbSJens Wiklander goto cleanup; 3566817466cbSJens Wiklander 3567*7901324dSJerome Forissier mbedtls_ecp_group_free( &grp ); 3568*7901324dSJerome Forissier mbedtls_ecp_point_free( &R ); 3569*7901324dSJerome Forissier #endif /* MBEDTLS_ECP_SHORT_WEIERSTRASS_ENABLED */ 3570*7901324dSJerome Forissier 3571*7901324dSJerome Forissier #if defined(MBEDTLS_ECP_MONTGOMERY_ENABLED) 3572817466cbSJens Wiklander if( verbose != 0 ) 3573*7901324dSJerome Forissier mbedtls_printf( " ECP Montgomery test (constant op_count): " ); 3574*7901324dSJerome Forissier #if defined(MBEDTLS_ECP_DP_CURVE25519_ENABLED) 3575*7901324dSJerome Forissier MBEDTLS_MPI_CHK( mbedtls_ecp_group_load( &grp, MBEDTLS_ECP_DP_CURVE25519 ) ); 3576*7901324dSJerome Forissier #elif defined(MBEDTLS_ECP_DP_CURVE448_ENABLED) 3577*7901324dSJerome Forissier MBEDTLS_MPI_CHK( mbedtls_ecp_group_load( &grp, MBEDTLS_ECP_DP_CURVE448 ) ); 3578*7901324dSJerome Forissier #else 3579*7901324dSJerome Forissier #error "MBEDTLS_ECP_MONTGOMERY_ENABLED is defined, but no curve is supported for self-test" 3580*7901324dSJerome Forissier #endif 3581*7901324dSJerome Forissier ret = self_test_point( verbose, 3582*7901324dSJerome Forissier &grp, &R, &m, &grp.G, 3583*7901324dSJerome Forissier m_exponents, 3584*7901324dSJerome Forissier sizeof( m_exponents ) / sizeof( m_exponents[0] )); 3585*7901324dSJerome Forissier if( ret != 0 ) 3586*7901324dSJerome Forissier goto cleanup; 3587*7901324dSJerome Forissier #endif /* MBEDTLS_ECP_MONTGOMERY_ENABLED */ 3588817466cbSJens Wiklander 3589817466cbSJens Wiklander cleanup: 3590817466cbSJens Wiklander 3591817466cbSJens Wiklander if( ret < 0 && verbose != 0 ) 3592*7901324dSJerome Forissier mbedtls_printf( "Unexpected error, return code = %08X\n", (unsigned int) ret ); 3593817466cbSJens Wiklander 3594817466cbSJens Wiklander mbedtls_ecp_group_free( &grp ); 3595817466cbSJens Wiklander mbedtls_ecp_point_free( &R ); 3596817466cbSJens Wiklander mbedtls_ecp_point_free( &P ); 3597817466cbSJens Wiklander mbedtls_mpi_free( &m ); 3598817466cbSJens Wiklander 3599817466cbSJens Wiklander if( verbose != 0 ) 3600817466cbSJens Wiklander mbedtls_printf( "\n" ); 3601817466cbSJens Wiklander 3602817466cbSJens Wiklander return( ret ); 3603817466cbSJens Wiklander } 3604817466cbSJens Wiklander 3605817466cbSJens Wiklander #endif /* MBEDTLS_SELF_TEST */ 3606817466cbSJens Wiklander 3607817466cbSJens Wiklander #endif /* !MBEDTLS_ECP_ALT */ 3608817466cbSJens Wiklander 3609817466cbSJens Wiklander #endif /* MBEDTLS_ECP_C */ 3610