1c6672fdcSEdison Ai // SPDX-License-Identifier: Apache-2.0 2817466cbSJens Wiklander /* 3817466cbSJens Wiklander * Elliptic curves over GF(p): generic functions 4817466cbSJens Wiklander * 5817466cbSJens Wiklander * Copyright (C) 2006-2015, ARM Limited, All Rights Reserved 6817466cbSJens Wiklander * 7817466cbSJens Wiklander * Licensed under the Apache License, Version 2.0 (the "License"); you may 8817466cbSJens Wiklander * not use this file except in compliance with the License. 9817466cbSJens Wiklander * You may obtain a copy of the License at 10817466cbSJens Wiklander * 11817466cbSJens Wiklander * http://www.apache.org/licenses/LICENSE-2.0 12817466cbSJens Wiklander * 13817466cbSJens Wiklander * Unless required by applicable law or agreed to in writing, software 14817466cbSJens Wiklander * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT 15817466cbSJens Wiklander * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 16817466cbSJens Wiklander * See the License for the specific language governing permissions and 17817466cbSJens Wiklander * limitations under the License. 18817466cbSJens Wiklander * 19817466cbSJens Wiklander * This file is part of mbed TLS (https://tls.mbed.org) 20817466cbSJens Wiklander */ 21817466cbSJens Wiklander 22817466cbSJens Wiklander /* 23817466cbSJens Wiklander * References: 24817466cbSJens Wiklander * 25817466cbSJens Wiklander * SEC1 http://www.secg.org/index.php?action=secg,docs_secg 26817466cbSJens Wiklander * GECC = Guide to Elliptic Curve Cryptography - Hankerson, Menezes, Vanstone 27817466cbSJens Wiklander * FIPS 186-3 http://csrc.nist.gov/publications/fips/fips186-3/fips_186-3.pdf 28817466cbSJens Wiklander * RFC 4492 for the related TLS structures and constants 293d3b0591SJens Wiklander * RFC 7748 for the Curve448 and Curve25519 curve definitions 30817466cbSJens Wiklander * 31817466cbSJens Wiklander * [Curve25519] http://cr.yp.to/ecdh/curve25519-20060209.pdf 32817466cbSJens Wiklander * 33817466cbSJens Wiklander * [2] CORON, Jean-S'ebastien. Resistance against differential power analysis 34817466cbSJens Wiklander * for elliptic curve cryptosystems. In : Cryptographic Hardware and 35817466cbSJens Wiklander * Embedded Systems. Springer Berlin Heidelberg, 1999. p. 292-302. 36817466cbSJens Wiklander * <http://link.springer.com/chapter/10.1007/3-540-48059-5_25> 37817466cbSJens Wiklander * 38817466cbSJens Wiklander * [3] HEDABOU, Mustapha, PINEL, Pierre, et B'EN'ETEAU, Lucien. A comb method to 39817466cbSJens Wiklander * render ECC resistant against Side Channel Attacks. IACR Cryptology 40817466cbSJens Wiklander * ePrint Archive, 2004, vol. 2004, p. 342. 41817466cbSJens Wiklander * <http://eprint.iacr.org/2004/342.pdf> 42817466cbSJens Wiklander */ 43817466cbSJens Wiklander 44817466cbSJens Wiklander #if !defined(MBEDTLS_CONFIG_FILE) 45817466cbSJens Wiklander #include "mbedtls/config.h" 46817466cbSJens Wiklander #else 47817466cbSJens Wiklander #include MBEDTLS_CONFIG_FILE 48817466cbSJens Wiklander #endif 49817466cbSJens Wiklander 503d3b0591SJens Wiklander /** 513d3b0591SJens Wiklander * \brief Function level alternative implementation. 523d3b0591SJens Wiklander * 533d3b0591SJens Wiklander * The MBEDTLS_ECP_INTERNAL_ALT macro enables alternative implementations to 543d3b0591SJens Wiklander * replace certain functions in this module. The alternative implementations are 553d3b0591SJens Wiklander * typically hardware accelerators and need to activate the hardware before the 563d3b0591SJens Wiklander * computation starts and deactivate it after it finishes. The 573d3b0591SJens Wiklander * mbedtls_internal_ecp_init() and mbedtls_internal_ecp_free() functions serve 583d3b0591SJens Wiklander * this purpose. 593d3b0591SJens Wiklander * 603d3b0591SJens Wiklander * To preserve the correct functionality the following conditions must hold: 613d3b0591SJens Wiklander * 623d3b0591SJens Wiklander * - The alternative implementation must be activated by 633d3b0591SJens Wiklander * mbedtls_internal_ecp_init() before any of the replaceable functions is 643d3b0591SJens Wiklander * called. 653d3b0591SJens Wiklander * - mbedtls_internal_ecp_free() must \b only be called when the alternative 663d3b0591SJens Wiklander * implementation is activated. 673d3b0591SJens Wiklander * - mbedtls_internal_ecp_init() must \b not be called when the alternative 683d3b0591SJens Wiklander * implementation is activated. 693d3b0591SJens Wiklander * - Public functions must not return while the alternative implementation is 703d3b0591SJens Wiklander * activated. 713d3b0591SJens Wiklander * - Replaceable functions are guarded by \c MBEDTLS_ECP_XXX_ALT macros and 723d3b0591SJens Wiklander * before calling them an \code if( mbedtls_internal_ecp_grp_capable( grp ) ) 733d3b0591SJens Wiklander * \endcode ensures that the alternative implementation supports the current 743d3b0591SJens Wiklander * group. 753d3b0591SJens Wiklander */ 763d3b0591SJens Wiklander #if defined(MBEDTLS_ECP_INTERNAL_ALT) 773d3b0591SJens Wiklander #endif 783d3b0591SJens Wiklander 79817466cbSJens Wiklander #if defined(MBEDTLS_ECP_C) 80817466cbSJens Wiklander 81817466cbSJens Wiklander #include "mbedtls/ecp.h" 82817466cbSJens Wiklander #include "mbedtls/threading.h" 833d3b0591SJens Wiklander #include "mbedtls/platform_util.h" 8411fa71b9SJerome Forissier #include "mbedtls/error.h" 85817466cbSJens Wiklander 86817466cbSJens Wiklander #include <string.h> 87817466cbSJens Wiklander 88817466cbSJens Wiklander #if !defined(MBEDTLS_ECP_ALT) 89817466cbSJens Wiklander 903d3b0591SJens Wiklander /* Parameter validation macros based on platform_util.h */ 913d3b0591SJens Wiklander #define ECP_VALIDATE_RET( cond ) \ 923d3b0591SJens Wiklander MBEDTLS_INTERNAL_VALIDATE_RET( cond, MBEDTLS_ERR_ECP_BAD_INPUT_DATA ) 933d3b0591SJens Wiklander #define ECP_VALIDATE( cond ) \ 943d3b0591SJens Wiklander MBEDTLS_INTERNAL_VALIDATE( cond ) 953d3b0591SJens Wiklander 96817466cbSJens Wiklander #if defined(MBEDTLS_PLATFORM_C) 97817466cbSJens Wiklander #include "mbedtls/platform.h" 98817466cbSJens Wiklander #else 99817466cbSJens Wiklander #include <stdlib.h> 100817466cbSJens Wiklander #include <stdio.h> 101817466cbSJens Wiklander #define mbedtls_printf printf 102817466cbSJens Wiklander #define mbedtls_calloc calloc 103817466cbSJens Wiklander #define mbedtls_free free 104817466cbSJens Wiklander #endif 105817466cbSJens Wiklander 106817466cbSJens Wiklander #include "mbedtls/ecp_internal.h" 107817466cbSJens Wiklander 108817466cbSJens Wiklander #if ( defined(__ARMCC_VERSION) || defined(_MSC_VER) ) && \ 109817466cbSJens Wiklander !defined(inline) && !defined(__cplusplus) 110817466cbSJens Wiklander #define inline __inline 111817466cbSJens Wiklander #endif 112817466cbSJens Wiklander 113817466cbSJens Wiklander #if defined(MBEDTLS_SELF_TEST) 114817466cbSJens Wiklander /* 115817466cbSJens Wiklander * Counts of point addition and doubling, and field multiplications. 116817466cbSJens Wiklander * Used to test resistance of point multiplication to simple timing attacks. 117817466cbSJens Wiklander */ 118817466cbSJens Wiklander static unsigned long add_count, dbl_count, mul_count; 119817466cbSJens Wiklander #endif 120817466cbSJens Wiklander 1213d3b0591SJens Wiklander #if defined(MBEDTLS_ECP_RESTARTABLE) 1223d3b0591SJens Wiklander /* 1233d3b0591SJens Wiklander * Maximum number of "basic operations" to be done in a row. 1243d3b0591SJens Wiklander * 1253d3b0591SJens Wiklander * Default value 0 means that ECC operations will not yield. 1263d3b0591SJens Wiklander * Note that regardless of the value of ecp_max_ops, always at 1273d3b0591SJens Wiklander * least one step is performed before yielding. 1283d3b0591SJens Wiklander * 1293d3b0591SJens Wiklander * Setting ecp_max_ops=1 can be suitable for testing purposes 1303d3b0591SJens Wiklander * as it will interrupt computation at all possible points. 1313d3b0591SJens Wiklander */ 1323d3b0591SJens Wiklander static unsigned ecp_max_ops = 0; 1333d3b0591SJens Wiklander 1343d3b0591SJens Wiklander /* 1353d3b0591SJens Wiklander * Set ecp_max_ops 1363d3b0591SJens Wiklander */ 1373d3b0591SJens Wiklander void mbedtls_ecp_set_max_ops( unsigned max_ops ) 1383d3b0591SJens Wiklander { 1393d3b0591SJens Wiklander ecp_max_ops = max_ops; 1403d3b0591SJens Wiklander } 1413d3b0591SJens Wiklander 1423d3b0591SJens Wiklander /* 1433d3b0591SJens Wiklander * Check if restart is enabled 1443d3b0591SJens Wiklander */ 1453d3b0591SJens Wiklander int mbedtls_ecp_restart_is_enabled( void ) 1463d3b0591SJens Wiklander { 1473d3b0591SJens Wiklander return( ecp_max_ops != 0 ); 1483d3b0591SJens Wiklander } 1493d3b0591SJens Wiklander 1503d3b0591SJens Wiklander /* 1513d3b0591SJens Wiklander * Restart sub-context for ecp_mul_comb() 1523d3b0591SJens Wiklander */ 1533d3b0591SJens Wiklander struct mbedtls_ecp_restart_mul 1543d3b0591SJens Wiklander { 1553d3b0591SJens Wiklander mbedtls_ecp_point R; /* current intermediate result */ 1563d3b0591SJens Wiklander size_t i; /* current index in various loops, 0 outside */ 1573d3b0591SJens Wiklander mbedtls_ecp_point *T; /* table for precomputed points */ 1583d3b0591SJens Wiklander unsigned char T_size; /* number of points in table T */ 1593d3b0591SJens Wiklander enum { /* what were we doing last time we returned? */ 1603d3b0591SJens Wiklander ecp_rsm_init = 0, /* nothing so far, dummy initial state */ 1613d3b0591SJens Wiklander ecp_rsm_pre_dbl, /* precompute 2^n multiples */ 1623d3b0591SJens Wiklander ecp_rsm_pre_norm_dbl, /* normalize precomputed 2^n multiples */ 1633d3b0591SJens Wiklander ecp_rsm_pre_add, /* precompute remaining points by adding */ 1643d3b0591SJens Wiklander ecp_rsm_pre_norm_add, /* normalize all precomputed points */ 1653d3b0591SJens Wiklander ecp_rsm_comb_core, /* ecp_mul_comb_core() */ 1663d3b0591SJens Wiklander ecp_rsm_final_norm, /* do the final normalization */ 1673d3b0591SJens Wiklander } state; 1683d3b0591SJens Wiklander }; 1693d3b0591SJens Wiklander 1703d3b0591SJens Wiklander /* 1713d3b0591SJens Wiklander * Init restart_mul sub-context 1723d3b0591SJens Wiklander */ 1733d3b0591SJens Wiklander static void ecp_restart_rsm_init( mbedtls_ecp_restart_mul_ctx *ctx ) 1743d3b0591SJens Wiklander { 1753d3b0591SJens Wiklander mbedtls_ecp_point_init( &ctx->R ); 1763d3b0591SJens Wiklander ctx->i = 0; 1773d3b0591SJens Wiklander ctx->T = NULL; 1783d3b0591SJens Wiklander ctx->T_size = 0; 1793d3b0591SJens Wiklander ctx->state = ecp_rsm_init; 1803d3b0591SJens Wiklander } 1813d3b0591SJens Wiklander 1823d3b0591SJens Wiklander /* 1833d3b0591SJens Wiklander * Free the components of a restart_mul sub-context 1843d3b0591SJens Wiklander */ 1853d3b0591SJens Wiklander static void ecp_restart_rsm_free( mbedtls_ecp_restart_mul_ctx *ctx ) 1863d3b0591SJens Wiklander { 1873d3b0591SJens Wiklander unsigned char i; 1883d3b0591SJens Wiklander 1893d3b0591SJens Wiklander if( ctx == NULL ) 1903d3b0591SJens Wiklander return; 1913d3b0591SJens Wiklander 1923d3b0591SJens Wiklander mbedtls_ecp_point_free( &ctx->R ); 1933d3b0591SJens Wiklander 1943d3b0591SJens Wiklander if( ctx->T != NULL ) 1953d3b0591SJens Wiklander { 1963d3b0591SJens Wiklander for( i = 0; i < ctx->T_size; i++ ) 1973d3b0591SJens Wiklander mbedtls_ecp_point_free( ctx->T + i ); 1983d3b0591SJens Wiklander mbedtls_free( ctx->T ); 1993d3b0591SJens Wiklander } 2003d3b0591SJens Wiklander 2013d3b0591SJens Wiklander ecp_restart_rsm_init( ctx ); 2023d3b0591SJens Wiklander } 2033d3b0591SJens Wiklander 2043d3b0591SJens Wiklander /* 2053d3b0591SJens Wiklander * Restart context for ecp_muladd() 2063d3b0591SJens Wiklander */ 2073d3b0591SJens Wiklander struct mbedtls_ecp_restart_muladd 2083d3b0591SJens Wiklander { 2093d3b0591SJens Wiklander mbedtls_ecp_point mP; /* mP value */ 2103d3b0591SJens Wiklander mbedtls_ecp_point R; /* R intermediate result */ 2113d3b0591SJens Wiklander enum { /* what should we do next? */ 2123d3b0591SJens Wiklander ecp_rsma_mul1 = 0, /* first multiplication */ 2133d3b0591SJens Wiklander ecp_rsma_mul2, /* second multiplication */ 2143d3b0591SJens Wiklander ecp_rsma_add, /* addition */ 2153d3b0591SJens Wiklander ecp_rsma_norm, /* normalization */ 2163d3b0591SJens Wiklander } state; 2173d3b0591SJens Wiklander }; 2183d3b0591SJens Wiklander 2193d3b0591SJens Wiklander /* 2203d3b0591SJens Wiklander * Init restart_muladd sub-context 2213d3b0591SJens Wiklander */ 2223d3b0591SJens Wiklander static void ecp_restart_ma_init( mbedtls_ecp_restart_muladd_ctx *ctx ) 2233d3b0591SJens Wiklander { 2243d3b0591SJens Wiklander mbedtls_ecp_point_init( &ctx->mP ); 2253d3b0591SJens Wiklander mbedtls_ecp_point_init( &ctx->R ); 2263d3b0591SJens Wiklander ctx->state = ecp_rsma_mul1; 2273d3b0591SJens Wiklander } 2283d3b0591SJens Wiklander 2293d3b0591SJens Wiklander /* 2303d3b0591SJens Wiklander * Free the components of a restart_muladd sub-context 2313d3b0591SJens Wiklander */ 2323d3b0591SJens Wiklander static void ecp_restart_ma_free( mbedtls_ecp_restart_muladd_ctx *ctx ) 2333d3b0591SJens Wiklander { 2343d3b0591SJens Wiklander if( ctx == NULL ) 2353d3b0591SJens Wiklander return; 2363d3b0591SJens Wiklander 2373d3b0591SJens Wiklander mbedtls_ecp_point_free( &ctx->mP ); 2383d3b0591SJens Wiklander mbedtls_ecp_point_free( &ctx->R ); 2393d3b0591SJens Wiklander 2403d3b0591SJens Wiklander ecp_restart_ma_init( ctx ); 2413d3b0591SJens Wiklander } 2423d3b0591SJens Wiklander 2433d3b0591SJens Wiklander /* 2443d3b0591SJens Wiklander * Initialize a restart context 2453d3b0591SJens Wiklander */ 2463d3b0591SJens Wiklander void mbedtls_ecp_restart_init( mbedtls_ecp_restart_ctx *ctx ) 2473d3b0591SJens Wiklander { 2483d3b0591SJens Wiklander ECP_VALIDATE( ctx != NULL ); 2493d3b0591SJens Wiklander ctx->ops_done = 0; 2503d3b0591SJens Wiklander ctx->depth = 0; 2513d3b0591SJens Wiklander ctx->rsm = NULL; 2523d3b0591SJens Wiklander ctx->ma = NULL; 2533d3b0591SJens Wiklander } 2543d3b0591SJens Wiklander 2553d3b0591SJens Wiklander /* 2563d3b0591SJens Wiklander * Free the components of a restart context 2573d3b0591SJens Wiklander */ 2583d3b0591SJens Wiklander void mbedtls_ecp_restart_free( mbedtls_ecp_restart_ctx *ctx ) 2593d3b0591SJens Wiklander { 2603d3b0591SJens Wiklander if( ctx == NULL ) 2613d3b0591SJens Wiklander return; 2623d3b0591SJens Wiklander 2633d3b0591SJens Wiklander ecp_restart_rsm_free( ctx->rsm ); 2643d3b0591SJens Wiklander mbedtls_free( ctx->rsm ); 2653d3b0591SJens Wiklander 2663d3b0591SJens Wiklander ecp_restart_ma_free( ctx->ma ); 2673d3b0591SJens Wiklander mbedtls_free( ctx->ma ); 2683d3b0591SJens Wiklander 2693d3b0591SJens Wiklander mbedtls_ecp_restart_init( ctx ); 2703d3b0591SJens Wiklander } 2713d3b0591SJens Wiklander 2723d3b0591SJens Wiklander /* 2733d3b0591SJens Wiklander * Check if we can do the next step 2743d3b0591SJens Wiklander */ 2753d3b0591SJens Wiklander int mbedtls_ecp_check_budget( const mbedtls_ecp_group *grp, 2763d3b0591SJens Wiklander mbedtls_ecp_restart_ctx *rs_ctx, 2773d3b0591SJens Wiklander unsigned ops ) 2783d3b0591SJens Wiklander { 2793d3b0591SJens Wiklander ECP_VALIDATE_RET( grp != NULL ); 2803d3b0591SJens Wiklander 2813d3b0591SJens Wiklander if( rs_ctx != NULL && ecp_max_ops != 0 ) 2823d3b0591SJens Wiklander { 2833d3b0591SJens Wiklander /* scale depending on curve size: the chosen reference is 256-bit, 2843d3b0591SJens Wiklander * and multiplication is quadratic. Round to the closest integer. */ 2853d3b0591SJens Wiklander if( grp->pbits >= 512 ) 2863d3b0591SJens Wiklander ops *= 4; 2873d3b0591SJens Wiklander else if( grp->pbits >= 384 ) 2883d3b0591SJens Wiklander ops *= 2; 2893d3b0591SJens Wiklander 2903d3b0591SJens Wiklander /* Avoid infinite loops: always allow first step. 2913d3b0591SJens Wiklander * Because of that, however, it's not generally true 2923d3b0591SJens Wiklander * that ops_done <= ecp_max_ops, so the check 2933d3b0591SJens Wiklander * ops_done > ecp_max_ops below is mandatory. */ 2943d3b0591SJens Wiklander if( ( rs_ctx->ops_done != 0 ) && 2953d3b0591SJens Wiklander ( rs_ctx->ops_done > ecp_max_ops || 2963d3b0591SJens Wiklander ops > ecp_max_ops - rs_ctx->ops_done ) ) 2973d3b0591SJens Wiklander { 2983d3b0591SJens Wiklander return( MBEDTLS_ERR_ECP_IN_PROGRESS ); 2993d3b0591SJens Wiklander } 3003d3b0591SJens Wiklander 3013d3b0591SJens Wiklander /* update running count */ 3023d3b0591SJens Wiklander rs_ctx->ops_done += ops; 3033d3b0591SJens Wiklander } 3043d3b0591SJens Wiklander 3053d3b0591SJens Wiklander return( 0 ); 3063d3b0591SJens Wiklander } 3073d3b0591SJens Wiklander 3083d3b0591SJens Wiklander /* Call this when entering a function that needs its own sub-context */ 3093d3b0591SJens Wiklander #define ECP_RS_ENTER( SUB ) do { \ 3103d3b0591SJens Wiklander /* reset ops count for this call if top-level */ \ 3113d3b0591SJens Wiklander if( rs_ctx != NULL && rs_ctx->depth++ == 0 ) \ 3123d3b0591SJens Wiklander rs_ctx->ops_done = 0; \ 3133d3b0591SJens Wiklander \ 3143d3b0591SJens Wiklander /* set up our own sub-context if needed */ \ 3153d3b0591SJens Wiklander if( mbedtls_ecp_restart_is_enabled() && \ 3163d3b0591SJens Wiklander rs_ctx != NULL && rs_ctx->SUB == NULL ) \ 3173d3b0591SJens Wiklander { \ 3183d3b0591SJens Wiklander rs_ctx->SUB = mbedtls_calloc( 1, sizeof( *rs_ctx->SUB ) ); \ 3193d3b0591SJens Wiklander if( rs_ctx->SUB == NULL ) \ 3203d3b0591SJens Wiklander return( MBEDTLS_ERR_ECP_ALLOC_FAILED ); \ 3213d3b0591SJens Wiklander \ 3223d3b0591SJens Wiklander ecp_restart_## SUB ##_init( rs_ctx->SUB ); \ 3233d3b0591SJens Wiklander } \ 3243d3b0591SJens Wiklander } while( 0 ) 3253d3b0591SJens Wiklander 3263d3b0591SJens Wiklander /* Call this when leaving a function that needs its own sub-context */ 3273d3b0591SJens Wiklander #define ECP_RS_LEAVE( SUB ) do { \ 3283d3b0591SJens Wiklander /* clear our sub-context when not in progress (done or error) */ \ 3293d3b0591SJens Wiklander if( rs_ctx != NULL && rs_ctx->SUB != NULL && \ 3303d3b0591SJens Wiklander ret != MBEDTLS_ERR_ECP_IN_PROGRESS ) \ 3313d3b0591SJens Wiklander { \ 3323d3b0591SJens Wiklander ecp_restart_## SUB ##_free( rs_ctx->SUB ); \ 3333d3b0591SJens Wiklander mbedtls_free( rs_ctx->SUB ); \ 3343d3b0591SJens Wiklander rs_ctx->SUB = NULL; \ 3353d3b0591SJens Wiklander } \ 3363d3b0591SJens Wiklander \ 3373d3b0591SJens Wiklander if( rs_ctx != NULL ) \ 3383d3b0591SJens Wiklander rs_ctx->depth--; \ 3393d3b0591SJens Wiklander } while( 0 ) 3403d3b0591SJens Wiklander 3413d3b0591SJens Wiklander #else /* MBEDTLS_ECP_RESTARTABLE */ 3423d3b0591SJens Wiklander 3433d3b0591SJens Wiklander #define ECP_RS_ENTER( sub ) (void) rs_ctx; 3443d3b0591SJens Wiklander #define ECP_RS_LEAVE( sub ) (void) rs_ctx; 3453d3b0591SJens Wiklander 3463d3b0591SJens Wiklander #endif /* MBEDTLS_ECP_RESTARTABLE */ 3473d3b0591SJens Wiklander 348817466cbSJens Wiklander #if defined(MBEDTLS_ECP_DP_SECP192R1_ENABLED) || \ 349817466cbSJens Wiklander defined(MBEDTLS_ECP_DP_SECP224R1_ENABLED) || \ 350817466cbSJens Wiklander defined(MBEDTLS_ECP_DP_SECP256R1_ENABLED) || \ 351817466cbSJens Wiklander defined(MBEDTLS_ECP_DP_SECP384R1_ENABLED) || \ 352817466cbSJens Wiklander defined(MBEDTLS_ECP_DP_SECP521R1_ENABLED) || \ 353817466cbSJens Wiklander defined(MBEDTLS_ECP_DP_BP256R1_ENABLED) || \ 354817466cbSJens Wiklander defined(MBEDTLS_ECP_DP_BP384R1_ENABLED) || \ 355817466cbSJens Wiklander defined(MBEDTLS_ECP_DP_BP512R1_ENABLED) || \ 356817466cbSJens Wiklander defined(MBEDTLS_ECP_DP_SECP192K1_ENABLED) || \ 357817466cbSJens Wiklander defined(MBEDTLS_ECP_DP_SECP224K1_ENABLED) || \ 358*9fc2442cSJerome Forissier defined(MBEDTLS_ECP_DP_SECP256K1_ENABLED) || \ 359*9fc2442cSJerome Forissier defined(MBEDTLS_ECP_DP_SM2_ENABLED) 360817466cbSJens Wiklander #define ECP_SHORTWEIERSTRASS 361817466cbSJens Wiklander #endif 362817466cbSJens Wiklander 3633d3b0591SJens Wiklander #if defined(MBEDTLS_ECP_DP_CURVE25519_ENABLED) || \ 3643d3b0591SJens Wiklander defined(MBEDTLS_ECP_DP_CURVE448_ENABLED) 365817466cbSJens Wiklander #define ECP_MONTGOMERY 366817466cbSJens Wiklander #endif 367817466cbSJens Wiklander 368817466cbSJens Wiklander /* 369817466cbSJens Wiklander * List of supported curves: 370817466cbSJens Wiklander * - internal ID 37111fa71b9SJerome Forissier * - TLS NamedCurve ID (RFC 4492 sec. 5.1.1, RFC 7071 sec. 2, RFC 8446 sec. 4.2.7) 372817466cbSJens Wiklander * - size in bits 373817466cbSJens Wiklander * - readable name 374817466cbSJens Wiklander * 375817466cbSJens Wiklander * Curves are listed in order: largest curves first, and for a given size, 376817466cbSJens Wiklander * fastest curves first. This provides the default order for the SSL module. 377817466cbSJens Wiklander * 378817466cbSJens Wiklander * Reminder: update profiles in x509_crt.c when adding a new curves! 379817466cbSJens Wiklander */ 380817466cbSJens Wiklander static const mbedtls_ecp_curve_info ecp_supported_curves[] = 381817466cbSJens Wiklander { 382817466cbSJens Wiklander #if defined(MBEDTLS_ECP_DP_SECP521R1_ENABLED) 383817466cbSJens Wiklander { MBEDTLS_ECP_DP_SECP521R1, 25, 521, "secp521r1" }, 384817466cbSJens Wiklander #endif 385817466cbSJens Wiklander #if defined(MBEDTLS_ECP_DP_BP512R1_ENABLED) 386817466cbSJens Wiklander { MBEDTLS_ECP_DP_BP512R1, 28, 512, "brainpoolP512r1" }, 387817466cbSJens Wiklander #endif 388817466cbSJens Wiklander #if defined(MBEDTLS_ECP_DP_SECP384R1_ENABLED) 389817466cbSJens Wiklander { MBEDTLS_ECP_DP_SECP384R1, 24, 384, "secp384r1" }, 390817466cbSJens Wiklander #endif 391817466cbSJens Wiklander #if defined(MBEDTLS_ECP_DP_BP384R1_ENABLED) 392817466cbSJens Wiklander { MBEDTLS_ECP_DP_BP384R1, 27, 384, "brainpoolP384r1" }, 393817466cbSJens Wiklander #endif 394817466cbSJens Wiklander #if defined(MBEDTLS_ECP_DP_SECP256R1_ENABLED) 395817466cbSJens Wiklander { MBEDTLS_ECP_DP_SECP256R1, 23, 256, "secp256r1" }, 396817466cbSJens Wiklander #endif 397817466cbSJens Wiklander #if defined(MBEDTLS_ECP_DP_SECP256K1_ENABLED) 398817466cbSJens Wiklander { MBEDTLS_ECP_DP_SECP256K1, 22, 256, "secp256k1" }, 399817466cbSJens Wiklander #endif 400817466cbSJens Wiklander #if defined(MBEDTLS_ECP_DP_BP256R1_ENABLED) 401817466cbSJens Wiklander { MBEDTLS_ECP_DP_BP256R1, 26, 256, "brainpoolP256r1" }, 402817466cbSJens Wiklander #endif 403817466cbSJens Wiklander #if defined(MBEDTLS_ECP_DP_SECP224R1_ENABLED) 404817466cbSJens Wiklander { MBEDTLS_ECP_DP_SECP224R1, 21, 224, "secp224r1" }, 405817466cbSJens Wiklander #endif 406817466cbSJens Wiklander #if defined(MBEDTLS_ECP_DP_SECP224K1_ENABLED) 407817466cbSJens Wiklander { MBEDTLS_ECP_DP_SECP224K1, 20, 224, "secp224k1" }, 408817466cbSJens Wiklander #endif 409817466cbSJens Wiklander #if defined(MBEDTLS_ECP_DP_SECP192R1_ENABLED) 410817466cbSJens Wiklander { MBEDTLS_ECP_DP_SECP192R1, 19, 192, "secp192r1" }, 411817466cbSJens Wiklander #endif 412817466cbSJens Wiklander #if defined(MBEDTLS_ECP_DP_SECP192K1_ENABLED) 413817466cbSJens Wiklander { MBEDTLS_ECP_DP_SECP192K1, 18, 192, "secp192k1" }, 414817466cbSJens Wiklander #endif 41511fa71b9SJerome Forissier #if defined(MBEDTLS_ECP_DP_CURVE25519_ENABLED) && defined(MBEDTLS_ECDH_VARIANT_EVEREST_ENABLED) 41611fa71b9SJerome Forissier { MBEDTLS_ECP_DP_CURVE25519, 29, 256, "x25519" }, 41711fa71b9SJerome Forissier #endif 418*9fc2442cSJerome Forissier #if defined(MBEDTLS_ECP_DP_SM2_ENABLED) 419*9fc2442cSJerome Forissier /* https://tools.ietf.org/id/draft-yang-tls-tls13-sm-suites-05.html */ 420*9fc2442cSJerome Forissier { MBEDTLS_ECP_DP_SM2, 41, 256, "sm2" }, 421*9fc2442cSJerome Forissier #endif 422817466cbSJens Wiklander { MBEDTLS_ECP_DP_NONE, 0, 0, NULL }, 423817466cbSJens Wiklander }; 424817466cbSJens Wiklander 425817466cbSJens Wiklander #define ECP_NB_CURVES sizeof( ecp_supported_curves ) / \ 426817466cbSJens Wiklander sizeof( ecp_supported_curves[0] ) 427817466cbSJens Wiklander 428817466cbSJens Wiklander static mbedtls_ecp_group_id ecp_supported_grp_id[ECP_NB_CURVES]; 429817466cbSJens Wiklander 430817466cbSJens Wiklander /* 431817466cbSJens Wiklander * List of supported curves and associated info 432817466cbSJens Wiklander */ 433817466cbSJens Wiklander const mbedtls_ecp_curve_info *mbedtls_ecp_curve_list( void ) 434817466cbSJens Wiklander { 435817466cbSJens Wiklander return( ecp_supported_curves ); 436817466cbSJens Wiklander } 437817466cbSJens Wiklander 438817466cbSJens Wiklander /* 439817466cbSJens Wiklander * List of supported curves, group ID only 440817466cbSJens Wiklander */ 441817466cbSJens Wiklander const mbedtls_ecp_group_id *mbedtls_ecp_grp_id_list( void ) 442817466cbSJens Wiklander { 443817466cbSJens Wiklander static int init_done = 0; 444817466cbSJens Wiklander 445817466cbSJens Wiklander if( ! init_done ) 446817466cbSJens Wiklander { 447817466cbSJens Wiklander size_t i = 0; 448817466cbSJens Wiklander const mbedtls_ecp_curve_info *curve_info; 449817466cbSJens Wiklander 450817466cbSJens Wiklander for( curve_info = mbedtls_ecp_curve_list(); 451817466cbSJens Wiklander curve_info->grp_id != MBEDTLS_ECP_DP_NONE; 452817466cbSJens Wiklander curve_info++ ) 453817466cbSJens Wiklander { 454817466cbSJens Wiklander ecp_supported_grp_id[i++] = curve_info->grp_id; 455817466cbSJens Wiklander } 456817466cbSJens Wiklander ecp_supported_grp_id[i] = MBEDTLS_ECP_DP_NONE; 457817466cbSJens Wiklander 458817466cbSJens Wiklander init_done = 1; 459817466cbSJens Wiklander } 460817466cbSJens Wiklander 461817466cbSJens Wiklander return( ecp_supported_grp_id ); 462817466cbSJens Wiklander } 463817466cbSJens Wiklander 464817466cbSJens Wiklander /* 465817466cbSJens Wiklander * Get the curve info for the internal identifier 466817466cbSJens Wiklander */ 467817466cbSJens Wiklander const mbedtls_ecp_curve_info *mbedtls_ecp_curve_info_from_grp_id( mbedtls_ecp_group_id grp_id ) 468817466cbSJens Wiklander { 469817466cbSJens Wiklander const mbedtls_ecp_curve_info *curve_info; 470817466cbSJens Wiklander 471817466cbSJens Wiklander for( curve_info = mbedtls_ecp_curve_list(); 472817466cbSJens Wiklander curve_info->grp_id != MBEDTLS_ECP_DP_NONE; 473817466cbSJens Wiklander curve_info++ ) 474817466cbSJens Wiklander { 475817466cbSJens Wiklander if( curve_info->grp_id == grp_id ) 476817466cbSJens Wiklander return( curve_info ); 477817466cbSJens Wiklander } 478817466cbSJens Wiklander 479817466cbSJens Wiklander return( NULL ); 480817466cbSJens Wiklander } 481817466cbSJens Wiklander 482817466cbSJens Wiklander /* 483817466cbSJens Wiklander * Get the curve info from the TLS identifier 484817466cbSJens Wiklander */ 485817466cbSJens Wiklander const mbedtls_ecp_curve_info *mbedtls_ecp_curve_info_from_tls_id( uint16_t tls_id ) 486817466cbSJens Wiklander { 487817466cbSJens Wiklander const mbedtls_ecp_curve_info *curve_info; 488817466cbSJens Wiklander 489817466cbSJens Wiklander for( curve_info = mbedtls_ecp_curve_list(); 490817466cbSJens Wiklander curve_info->grp_id != MBEDTLS_ECP_DP_NONE; 491817466cbSJens Wiklander curve_info++ ) 492817466cbSJens Wiklander { 493817466cbSJens Wiklander if( curve_info->tls_id == tls_id ) 494817466cbSJens Wiklander return( curve_info ); 495817466cbSJens Wiklander } 496817466cbSJens Wiklander 497817466cbSJens Wiklander return( NULL ); 498817466cbSJens Wiklander } 499817466cbSJens Wiklander 500817466cbSJens Wiklander /* 501817466cbSJens Wiklander * Get the curve info from the name 502817466cbSJens Wiklander */ 503817466cbSJens Wiklander const mbedtls_ecp_curve_info *mbedtls_ecp_curve_info_from_name( const char *name ) 504817466cbSJens Wiklander { 505817466cbSJens Wiklander const mbedtls_ecp_curve_info *curve_info; 506817466cbSJens Wiklander 5073d3b0591SJens Wiklander if( name == NULL ) 5083d3b0591SJens Wiklander return( NULL ); 5093d3b0591SJens Wiklander 510817466cbSJens Wiklander for( curve_info = mbedtls_ecp_curve_list(); 511817466cbSJens Wiklander curve_info->grp_id != MBEDTLS_ECP_DP_NONE; 512817466cbSJens Wiklander curve_info++ ) 513817466cbSJens Wiklander { 514817466cbSJens Wiklander if( strcmp( curve_info->name, name ) == 0 ) 515817466cbSJens Wiklander return( curve_info ); 516817466cbSJens Wiklander } 517817466cbSJens Wiklander 518817466cbSJens Wiklander return( NULL ); 519817466cbSJens Wiklander } 520817466cbSJens Wiklander 521817466cbSJens Wiklander /* 522817466cbSJens Wiklander * Get the type of a curve 523817466cbSJens Wiklander */ 52411fa71b9SJerome Forissier mbedtls_ecp_curve_type mbedtls_ecp_get_type( const mbedtls_ecp_group *grp ) 525817466cbSJens Wiklander { 526817466cbSJens Wiklander if( grp->G.X.p == NULL ) 52711fa71b9SJerome Forissier return( MBEDTLS_ECP_TYPE_NONE ); 528817466cbSJens Wiklander 529817466cbSJens Wiklander if( grp->G.Y.p == NULL ) 53011fa71b9SJerome Forissier return( MBEDTLS_ECP_TYPE_MONTGOMERY ); 531817466cbSJens Wiklander else 53211fa71b9SJerome Forissier return( MBEDTLS_ECP_TYPE_SHORT_WEIERSTRASS ); 533817466cbSJens Wiklander } 534817466cbSJens Wiklander 535817466cbSJens Wiklander /* 536817466cbSJens Wiklander * Initialize (the components of) a point 537817466cbSJens Wiklander */ 538817466cbSJens Wiklander void mbedtls_ecp_point_init( mbedtls_ecp_point *pt ) 539817466cbSJens Wiklander { 5403d3b0591SJens Wiklander ECP_VALIDATE( pt != NULL ); 541817466cbSJens Wiklander 542817466cbSJens Wiklander mbedtls_mpi_init( &pt->X ); 543817466cbSJens Wiklander mbedtls_mpi_init( &pt->Y ); 544817466cbSJens Wiklander mbedtls_mpi_init( &pt->Z ); 545817466cbSJens Wiklander } 546817466cbSJens Wiklander 547817466cbSJens Wiklander /* 548817466cbSJens Wiklander * Initialize (the components of) a group 549817466cbSJens Wiklander */ 550817466cbSJens Wiklander void mbedtls_ecp_group_init( mbedtls_ecp_group *grp ) 551817466cbSJens Wiklander { 5523d3b0591SJens Wiklander ECP_VALIDATE( grp != NULL ); 553817466cbSJens Wiklander 5543d3b0591SJens Wiklander grp->id = MBEDTLS_ECP_DP_NONE; 5553d3b0591SJens Wiklander mbedtls_mpi_init( &grp->P ); 5563d3b0591SJens Wiklander mbedtls_mpi_init( &grp->A ); 5573d3b0591SJens Wiklander mbedtls_mpi_init( &grp->B ); 5583d3b0591SJens Wiklander mbedtls_ecp_point_init( &grp->G ); 5593d3b0591SJens Wiklander mbedtls_mpi_init( &grp->N ); 5603d3b0591SJens Wiklander grp->pbits = 0; 5613d3b0591SJens Wiklander grp->nbits = 0; 5623d3b0591SJens Wiklander grp->h = 0; 5633d3b0591SJens Wiklander grp->modp = NULL; 5643d3b0591SJens Wiklander grp->t_pre = NULL; 5653d3b0591SJens Wiklander grp->t_post = NULL; 5663d3b0591SJens Wiklander grp->t_data = NULL; 5673d3b0591SJens Wiklander grp->T = NULL; 5683d3b0591SJens Wiklander grp->T_size = 0; 569817466cbSJens Wiklander } 570817466cbSJens Wiklander 571817466cbSJens Wiklander /* 572817466cbSJens Wiklander * Initialize (the components of) a key pair 573817466cbSJens Wiklander */ 574817466cbSJens Wiklander void mbedtls_ecp_keypair_init( mbedtls_ecp_keypair *key ) 575817466cbSJens Wiklander { 5763d3b0591SJens Wiklander ECP_VALIDATE( key != NULL ); 577817466cbSJens Wiklander 578817466cbSJens Wiklander mbedtls_ecp_group_init( &key->grp ); 579817466cbSJens Wiklander mbedtls_mpi_init( &key->d ); 580817466cbSJens Wiklander mbedtls_ecp_point_init( &key->Q ); 581817466cbSJens Wiklander } 582817466cbSJens Wiklander 583817466cbSJens Wiklander /* 584817466cbSJens Wiklander * Unallocate (the components of) a point 585817466cbSJens Wiklander */ 586817466cbSJens Wiklander void mbedtls_ecp_point_free( mbedtls_ecp_point *pt ) 587817466cbSJens Wiklander { 588817466cbSJens Wiklander if( pt == NULL ) 589817466cbSJens Wiklander return; 590817466cbSJens Wiklander 591817466cbSJens Wiklander mbedtls_mpi_free( &( pt->X ) ); 592817466cbSJens Wiklander mbedtls_mpi_free( &( pt->Y ) ); 593817466cbSJens Wiklander mbedtls_mpi_free( &( pt->Z ) ); 594817466cbSJens Wiklander } 595817466cbSJens Wiklander 596817466cbSJens Wiklander /* 597817466cbSJens Wiklander * Unallocate (the components of) a group 598817466cbSJens Wiklander */ 599817466cbSJens Wiklander void mbedtls_ecp_group_free( mbedtls_ecp_group *grp ) 600817466cbSJens Wiklander { 601817466cbSJens Wiklander size_t i; 602817466cbSJens Wiklander 603817466cbSJens Wiklander if( grp == NULL ) 604817466cbSJens Wiklander return; 605817466cbSJens Wiklander 606817466cbSJens Wiklander if( grp->h != 1 ) 607817466cbSJens Wiklander { 608817466cbSJens Wiklander mbedtls_mpi_free( &grp->P ); 609817466cbSJens Wiklander mbedtls_mpi_free( &grp->A ); 610817466cbSJens Wiklander mbedtls_mpi_free( &grp->B ); 611817466cbSJens Wiklander mbedtls_ecp_point_free( &grp->G ); 612817466cbSJens Wiklander mbedtls_mpi_free( &grp->N ); 613817466cbSJens Wiklander } 614817466cbSJens Wiklander 615817466cbSJens Wiklander if( grp->T != NULL ) 616817466cbSJens Wiklander { 617817466cbSJens Wiklander for( i = 0; i < grp->T_size; i++ ) 618817466cbSJens Wiklander mbedtls_ecp_point_free( &grp->T[i] ); 619817466cbSJens Wiklander mbedtls_free( grp->T ); 620817466cbSJens Wiklander } 621817466cbSJens Wiklander 6223d3b0591SJens Wiklander mbedtls_platform_zeroize( grp, sizeof( mbedtls_ecp_group ) ); 623817466cbSJens Wiklander } 624817466cbSJens Wiklander 625817466cbSJens Wiklander /* 626817466cbSJens Wiklander * Unallocate (the components of) a key pair 627817466cbSJens Wiklander */ 628817466cbSJens Wiklander void mbedtls_ecp_keypair_free( mbedtls_ecp_keypair *key ) 629817466cbSJens Wiklander { 630817466cbSJens Wiklander if( key == NULL ) 631817466cbSJens Wiklander return; 632817466cbSJens Wiklander 633817466cbSJens Wiklander mbedtls_ecp_group_free( &key->grp ); 634817466cbSJens Wiklander mbedtls_mpi_free( &key->d ); 635817466cbSJens Wiklander mbedtls_ecp_point_free( &key->Q ); 636817466cbSJens Wiklander } 637817466cbSJens Wiklander 638817466cbSJens Wiklander /* 639817466cbSJens Wiklander * Copy the contents of a point 640817466cbSJens Wiklander */ 641817466cbSJens Wiklander int mbedtls_ecp_copy( mbedtls_ecp_point *P, const mbedtls_ecp_point *Q ) 642817466cbSJens Wiklander { 64311fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 6443d3b0591SJens Wiklander ECP_VALIDATE_RET( P != NULL ); 6453d3b0591SJens Wiklander ECP_VALIDATE_RET( Q != NULL ); 646817466cbSJens Wiklander 647817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_copy( &P->X, &Q->X ) ); 648817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_copy( &P->Y, &Q->Y ) ); 649817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_copy( &P->Z, &Q->Z ) ); 650817466cbSJens Wiklander 651817466cbSJens Wiklander cleanup: 652817466cbSJens Wiklander return( ret ); 653817466cbSJens Wiklander } 654817466cbSJens Wiklander 655817466cbSJens Wiklander /* 656817466cbSJens Wiklander * Copy the contents of a group object 657817466cbSJens Wiklander */ 658817466cbSJens Wiklander int mbedtls_ecp_group_copy( mbedtls_ecp_group *dst, const mbedtls_ecp_group *src ) 659817466cbSJens Wiklander { 6603d3b0591SJens Wiklander ECP_VALIDATE_RET( dst != NULL ); 6613d3b0591SJens Wiklander ECP_VALIDATE_RET( src != NULL ); 6623d3b0591SJens Wiklander 6633d3b0591SJens Wiklander return( mbedtls_ecp_group_load( dst, src->id ) ); 664817466cbSJens Wiklander } 665817466cbSJens Wiklander 666817466cbSJens Wiklander /* 667817466cbSJens Wiklander * Set point to zero 668817466cbSJens Wiklander */ 669817466cbSJens Wiklander int mbedtls_ecp_set_zero( mbedtls_ecp_point *pt ) 670817466cbSJens Wiklander { 67111fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 6723d3b0591SJens Wiklander ECP_VALIDATE_RET( pt != NULL ); 673817466cbSJens Wiklander 674817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_lset( &pt->X , 1 ) ); 675817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_lset( &pt->Y , 1 ) ); 676817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_lset( &pt->Z , 0 ) ); 677817466cbSJens Wiklander 678817466cbSJens Wiklander cleanup: 679817466cbSJens Wiklander return( ret ); 680817466cbSJens Wiklander } 681817466cbSJens Wiklander 682817466cbSJens Wiklander /* 683817466cbSJens Wiklander * Tell if a point is zero 684817466cbSJens Wiklander */ 685817466cbSJens Wiklander int mbedtls_ecp_is_zero( mbedtls_ecp_point *pt ) 686817466cbSJens Wiklander { 6873d3b0591SJens Wiklander ECP_VALIDATE_RET( pt != NULL ); 6883d3b0591SJens Wiklander 689817466cbSJens Wiklander return( mbedtls_mpi_cmp_int( &pt->Z, 0 ) == 0 ); 690817466cbSJens Wiklander } 691817466cbSJens Wiklander 692817466cbSJens Wiklander /* 6933d3b0591SJens Wiklander * Compare two points lazily 694817466cbSJens Wiklander */ 695817466cbSJens Wiklander int mbedtls_ecp_point_cmp( const mbedtls_ecp_point *P, 696817466cbSJens Wiklander const mbedtls_ecp_point *Q ) 697817466cbSJens Wiklander { 6983d3b0591SJens Wiklander ECP_VALIDATE_RET( P != NULL ); 6993d3b0591SJens Wiklander ECP_VALIDATE_RET( Q != NULL ); 7003d3b0591SJens Wiklander 701817466cbSJens Wiklander if( mbedtls_mpi_cmp_mpi( &P->X, &Q->X ) == 0 && 702817466cbSJens Wiklander mbedtls_mpi_cmp_mpi( &P->Y, &Q->Y ) == 0 && 703817466cbSJens Wiklander mbedtls_mpi_cmp_mpi( &P->Z, &Q->Z ) == 0 ) 704817466cbSJens Wiklander { 705817466cbSJens Wiklander return( 0 ); 706817466cbSJens Wiklander } 707817466cbSJens Wiklander 708817466cbSJens Wiklander return( MBEDTLS_ERR_ECP_BAD_INPUT_DATA ); 709817466cbSJens Wiklander } 710817466cbSJens Wiklander 711817466cbSJens Wiklander /* 712817466cbSJens Wiklander * Import a non-zero point from ASCII strings 713817466cbSJens Wiklander */ 714817466cbSJens Wiklander int mbedtls_ecp_point_read_string( mbedtls_ecp_point *P, int radix, 715817466cbSJens Wiklander const char *x, const char *y ) 716817466cbSJens Wiklander { 71711fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 7183d3b0591SJens Wiklander ECP_VALIDATE_RET( P != NULL ); 7193d3b0591SJens Wiklander ECP_VALIDATE_RET( x != NULL ); 7203d3b0591SJens Wiklander ECP_VALIDATE_RET( y != NULL ); 721817466cbSJens Wiklander 722817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_read_string( &P->X, radix, x ) ); 723817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_read_string( &P->Y, radix, y ) ); 724817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_lset( &P->Z, 1 ) ); 725817466cbSJens Wiklander 726817466cbSJens Wiklander cleanup: 727817466cbSJens Wiklander return( ret ); 728817466cbSJens Wiklander } 729817466cbSJens Wiklander 730817466cbSJens Wiklander /* 73111fa71b9SJerome Forissier * Export a point into unsigned binary data (SEC1 2.3.3 and RFC7748) 732817466cbSJens Wiklander */ 7333d3b0591SJens Wiklander int mbedtls_ecp_point_write_binary( const mbedtls_ecp_group *grp, 7343d3b0591SJens Wiklander const mbedtls_ecp_point *P, 735817466cbSJens Wiklander int format, size_t *olen, 736817466cbSJens Wiklander unsigned char *buf, size_t buflen ) 737817466cbSJens Wiklander { 73811fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ECP_FEATURE_UNAVAILABLE; 739817466cbSJens Wiklander size_t plen; 7403d3b0591SJens Wiklander ECP_VALIDATE_RET( grp != NULL ); 7413d3b0591SJens Wiklander ECP_VALIDATE_RET( P != NULL ); 7423d3b0591SJens Wiklander ECP_VALIDATE_RET( olen != NULL ); 7433d3b0591SJens Wiklander ECP_VALIDATE_RET( buf != NULL ); 7443d3b0591SJens Wiklander ECP_VALIDATE_RET( format == MBEDTLS_ECP_PF_UNCOMPRESSED || 7453d3b0591SJens Wiklander format == MBEDTLS_ECP_PF_COMPRESSED ); 746817466cbSJens Wiklander 74711fa71b9SJerome Forissier plen = mbedtls_mpi_size( &grp->P ); 74811fa71b9SJerome Forissier 74911fa71b9SJerome Forissier #if defined(ECP_MONTGOMERY) 75011fa71b9SJerome Forissier if( mbedtls_ecp_get_type( grp ) == MBEDTLS_ECP_TYPE_MONTGOMERY ) 75111fa71b9SJerome Forissier { 75211fa71b9SJerome Forissier *olen = plen; 75311fa71b9SJerome Forissier if( buflen < *olen ) 75411fa71b9SJerome Forissier return( MBEDTLS_ERR_ECP_BUFFER_TOO_SMALL ); 75511fa71b9SJerome Forissier 75611fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_write_binary_le( &P->X, buf, plen ) ); 75711fa71b9SJerome Forissier } 75811fa71b9SJerome Forissier #endif 75911fa71b9SJerome Forissier #if defined(ECP_SHORTWEIERSTRASS) 76011fa71b9SJerome Forissier if( mbedtls_ecp_get_type( grp ) == MBEDTLS_ECP_TYPE_SHORT_WEIERSTRASS ) 76111fa71b9SJerome Forissier { 762817466cbSJens Wiklander /* 763817466cbSJens Wiklander * Common case: P == 0 764817466cbSJens Wiklander */ 765817466cbSJens Wiklander if( mbedtls_mpi_cmp_int( &P->Z, 0 ) == 0 ) 766817466cbSJens Wiklander { 767817466cbSJens Wiklander if( buflen < 1 ) 768817466cbSJens Wiklander return( MBEDTLS_ERR_ECP_BUFFER_TOO_SMALL ); 769817466cbSJens Wiklander 770817466cbSJens Wiklander buf[0] = 0x00; 771817466cbSJens Wiklander *olen = 1; 772817466cbSJens Wiklander 773817466cbSJens Wiklander return( 0 ); 774817466cbSJens Wiklander } 775817466cbSJens Wiklander 776817466cbSJens Wiklander if( format == MBEDTLS_ECP_PF_UNCOMPRESSED ) 777817466cbSJens Wiklander { 778817466cbSJens Wiklander *olen = 2 * plen + 1; 779817466cbSJens Wiklander 780817466cbSJens Wiklander if( buflen < *olen ) 781817466cbSJens Wiklander return( MBEDTLS_ERR_ECP_BUFFER_TOO_SMALL ); 782817466cbSJens Wiklander 783817466cbSJens Wiklander buf[0] = 0x04; 784817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_write_binary( &P->X, buf + 1, plen ) ); 785817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_write_binary( &P->Y, buf + 1 + plen, plen ) ); 786817466cbSJens Wiklander } 787817466cbSJens Wiklander else if( format == MBEDTLS_ECP_PF_COMPRESSED ) 788817466cbSJens Wiklander { 789817466cbSJens Wiklander *olen = plen + 1; 790817466cbSJens Wiklander 791817466cbSJens Wiklander if( buflen < *olen ) 792817466cbSJens Wiklander return( MBEDTLS_ERR_ECP_BUFFER_TOO_SMALL ); 793817466cbSJens Wiklander 794817466cbSJens Wiklander buf[0] = 0x02 + mbedtls_mpi_get_bit( &P->Y, 0 ); 795817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_write_binary( &P->X, buf + 1, plen ) ); 796817466cbSJens Wiklander } 79711fa71b9SJerome Forissier } 79811fa71b9SJerome Forissier #endif 799817466cbSJens Wiklander 800817466cbSJens Wiklander cleanup: 801817466cbSJens Wiklander return( ret ); 802817466cbSJens Wiklander } 803817466cbSJens Wiklander 804817466cbSJens Wiklander /* 80511fa71b9SJerome Forissier * Import a point from unsigned binary data (SEC1 2.3.4 and RFC7748) 806817466cbSJens Wiklander */ 8073d3b0591SJens Wiklander int mbedtls_ecp_point_read_binary( const mbedtls_ecp_group *grp, 8083d3b0591SJens Wiklander mbedtls_ecp_point *pt, 809817466cbSJens Wiklander const unsigned char *buf, size_t ilen ) 810817466cbSJens Wiklander { 81111fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ECP_FEATURE_UNAVAILABLE; 812817466cbSJens Wiklander size_t plen; 8133d3b0591SJens Wiklander ECP_VALIDATE_RET( grp != NULL ); 8143d3b0591SJens Wiklander ECP_VALIDATE_RET( pt != NULL ); 8153d3b0591SJens Wiklander ECP_VALIDATE_RET( buf != NULL ); 816817466cbSJens Wiklander 817817466cbSJens Wiklander if( ilen < 1 ) 818817466cbSJens Wiklander return( MBEDTLS_ERR_ECP_BAD_INPUT_DATA ); 819817466cbSJens Wiklander 82011fa71b9SJerome Forissier plen = mbedtls_mpi_size( &grp->P ); 82111fa71b9SJerome Forissier 82211fa71b9SJerome Forissier #if defined(ECP_MONTGOMERY) 82311fa71b9SJerome Forissier if( mbedtls_ecp_get_type( grp ) == MBEDTLS_ECP_TYPE_MONTGOMERY ) 82411fa71b9SJerome Forissier { 82511fa71b9SJerome Forissier if( plen != ilen ) 82611fa71b9SJerome Forissier return( MBEDTLS_ERR_ECP_BAD_INPUT_DATA ); 82711fa71b9SJerome Forissier 82811fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_read_binary_le( &pt->X, buf, plen ) ); 82911fa71b9SJerome Forissier mbedtls_mpi_free( &pt->Y ); 83011fa71b9SJerome Forissier 83111fa71b9SJerome Forissier if( grp->id == MBEDTLS_ECP_DP_CURVE25519 ) 83211fa71b9SJerome Forissier /* Set most significant bit to 0 as prescribed in RFC7748 §5 */ 83311fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_set_bit( &pt->X, plen * 8 - 1, 0 ) ); 83411fa71b9SJerome Forissier 83511fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_lset( &pt->Z, 1 ) ); 83611fa71b9SJerome Forissier } 83711fa71b9SJerome Forissier #endif 83811fa71b9SJerome Forissier #if defined(ECP_SHORTWEIERSTRASS) 83911fa71b9SJerome Forissier if( mbedtls_ecp_get_type( grp ) == MBEDTLS_ECP_TYPE_SHORT_WEIERSTRASS ) 84011fa71b9SJerome Forissier { 841817466cbSJens Wiklander if( buf[0] == 0x00 ) 842817466cbSJens Wiklander { 843817466cbSJens Wiklander if( ilen == 1 ) 844817466cbSJens Wiklander return( mbedtls_ecp_set_zero( pt ) ); 845817466cbSJens Wiklander else 846817466cbSJens Wiklander return( MBEDTLS_ERR_ECP_BAD_INPUT_DATA ); 847817466cbSJens Wiklander } 848817466cbSJens Wiklander 849817466cbSJens Wiklander if( buf[0] != 0x04 ) 850817466cbSJens Wiklander return( MBEDTLS_ERR_ECP_FEATURE_UNAVAILABLE ); 851817466cbSJens Wiklander 852817466cbSJens Wiklander if( ilen != 2 * plen + 1 ) 853817466cbSJens Wiklander return( MBEDTLS_ERR_ECP_BAD_INPUT_DATA ); 854817466cbSJens Wiklander 855817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_read_binary( &pt->X, buf + 1, plen ) ); 85611fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_read_binary( &pt->Y, 85711fa71b9SJerome Forissier buf + 1 + plen, plen ) ); 858817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_lset( &pt->Z, 1 ) ); 85911fa71b9SJerome Forissier } 86011fa71b9SJerome Forissier #endif 861817466cbSJens Wiklander 862817466cbSJens Wiklander cleanup: 863817466cbSJens Wiklander return( ret ); 864817466cbSJens Wiklander } 865817466cbSJens Wiklander 866817466cbSJens Wiklander /* 867817466cbSJens Wiklander * Import a point from a TLS ECPoint record (RFC 4492) 868817466cbSJens Wiklander * struct { 869817466cbSJens Wiklander * opaque point <1..2^8-1>; 870817466cbSJens Wiklander * } ECPoint; 871817466cbSJens Wiklander */ 8723d3b0591SJens Wiklander int mbedtls_ecp_tls_read_point( const mbedtls_ecp_group *grp, 8733d3b0591SJens Wiklander mbedtls_ecp_point *pt, 874817466cbSJens Wiklander const unsigned char **buf, size_t buf_len ) 875817466cbSJens Wiklander { 876817466cbSJens Wiklander unsigned char data_len; 877817466cbSJens Wiklander const unsigned char *buf_start; 8783d3b0591SJens Wiklander ECP_VALIDATE_RET( grp != NULL ); 8793d3b0591SJens Wiklander ECP_VALIDATE_RET( pt != NULL ); 8803d3b0591SJens Wiklander ECP_VALIDATE_RET( buf != NULL ); 8813d3b0591SJens Wiklander ECP_VALIDATE_RET( *buf != NULL ); 882817466cbSJens Wiklander 883817466cbSJens Wiklander /* 884817466cbSJens Wiklander * We must have at least two bytes (1 for length, at least one for data) 885817466cbSJens Wiklander */ 886817466cbSJens Wiklander if( buf_len < 2 ) 887817466cbSJens Wiklander return( MBEDTLS_ERR_ECP_BAD_INPUT_DATA ); 888817466cbSJens Wiklander 889817466cbSJens Wiklander data_len = *(*buf)++; 890817466cbSJens Wiklander if( data_len < 1 || data_len > buf_len - 1 ) 891817466cbSJens Wiklander return( MBEDTLS_ERR_ECP_BAD_INPUT_DATA ); 892817466cbSJens Wiklander 893817466cbSJens Wiklander /* 894817466cbSJens Wiklander * Save buffer start for read_binary and update buf 895817466cbSJens Wiklander */ 896817466cbSJens Wiklander buf_start = *buf; 897817466cbSJens Wiklander *buf += data_len; 898817466cbSJens Wiklander 8993d3b0591SJens Wiklander return( mbedtls_ecp_point_read_binary( grp, pt, buf_start, data_len ) ); 900817466cbSJens Wiklander } 901817466cbSJens Wiklander 902817466cbSJens Wiklander /* 903817466cbSJens Wiklander * Export a point as a TLS ECPoint record (RFC 4492) 904817466cbSJens Wiklander * struct { 905817466cbSJens Wiklander * opaque point <1..2^8-1>; 906817466cbSJens Wiklander * } ECPoint; 907817466cbSJens Wiklander */ 908817466cbSJens Wiklander int mbedtls_ecp_tls_write_point( const mbedtls_ecp_group *grp, const mbedtls_ecp_point *pt, 909817466cbSJens Wiklander int format, size_t *olen, 910817466cbSJens Wiklander unsigned char *buf, size_t blen ) 911817466cbSJens Wiklander { 91211fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 9133d3b0591SJens Wiklander ECP_VALIDATE_RET( grp != NULL ); 9143d3b0591SJens Wiklander ECP_VALIDATE_RET( pt != NULL ); 9153d3b0591SJens Wiklander ECP_VALIDATE_RET( olen != NULL ); 9163d3b0591SJens Wiklander ECP_VALIDATE_RET( buf != NULL ); 9173d3b0591SJens Wiklander ECP_VALIDATE_RET( format == MBEDTLS_ECP_PF_UNCOMPRESSED || 9183d3b0591SJens Wiklander format == MBEDTLS_ECP_PF_COMPRESSED ); 919817466cbSJens Wiklander 920817466cbSJens Wiklander /* 921817466cbSJens Wiklander * buffer length must be at least one, for our length byte 922817466cbSJens Wiklander */ 923817466cbSJens Wiklander if( blen < 1 ) 924817466cbSJens Wiklander return( MBEDTLS_ERR_ECP_BAD_INPUT_DATA ); 925817466cbSJens Wiklander 926817466cbSJens Wiklander if( ( ret = mbedtls_ecp_point_write_binary( grp, pt, format, 927817466cbSJens Wiklander olen, buf + 1, blen - 1) ) != 0 ) 928817466cbSJens Wiklander return( ret ); 929817466cbSJens Wiklander 930817466cbSJens Wiklander /* 931817466cbSJens Wiklander * write length to the first byte and update total length 932817466cbSJens Wiklander */ 933817466cbSJens Wiklander buf[0] = (unsigned char) *olen; 934817466cbSJens Wiklander ++*olen; 935817466cbSJens Wiklander 936817466cbSJens Wiklander return( 0 ); 937817466cbSJens Wiklander } 938817466cbSJens Wiklander 939817466cbSJens Wiklander /* 940817466cbSJens Wiklander * Set a group from an ECParameters record (RFC 4492) 941817466cbSJens Wiklander */ 9423d3b0591SJens Wiklander int mbedtls_ecp_tls_read_group( mbedtls_ecp_group *grp, 9433d3b0591SJens Wiklander const unsigned char **buf, size_t len ) 9443d3b0591SJens Wiklander { 94511fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 9463d3b0591SJens Wiklander mbedtls_ecp_group_id grp_id; 9473d3b0591SJens Wiklander ECP_VALIDATE_RET( grp != NULL ); 9483d3b0591SJens Wiklander ECP_VALIDATE_RET( buf != NULL ); 9493d3b0591SJens Wiklander ECP_VALIDATE_RET( *buf != NULL ); 9503d3b0591SJens Wiklander 9513d3b0591SJens Wiklander if( ( ret = mbedtls_ecp_tls_read_group_id( &grp_id, buf, len ) ) != 0 ) 9523d3b0591SJens Wiklander return( ret ); 9533d3b0591SJens Wiklander 9543d3b0591SJens Wiklander return( mbedtls_ecp_group_load( grp, grp_id ) ); 9553d3b0591SJens Wiklander } 9563d3b0591SJens Wiklander 9573d3b0591SJens Wiklander /* 9583d3b0591SJens Wiklander * Read a group id from an ECParameters record (RFC 4492) and convert it to 9593d3b0591SJens Wiklander * mbedtls_ecp_group_id. 9603d3b0591SJens Wiklander */ 9613d3b0591SJens Wiklander int mbedtls_ecp_tls_read_group_id( mbedtls_ecp_group_id *grp, 9623d3b0591SJens Wiklander const unsigned char **buf, size_t len ) 963817466cbSJens Wiklander { 964817466cbSJens Wiklander uint16_t tls_id; 965817466cbSJens Wiklander const mbedtls_ecp_curve_info *curve_info; 9663d3b0591SJens Wiklander ECP_VALIDATE_RET( grp != NULL ); 9673d3b0591SJens Wiklander ECP_VALIDATE_RET( buf != NULL ); 9683d3b0591SJens Wiklander ECP_VALIDATE_RET( *buf != NULL ); 969817466cbSJens Wiklander 970817466cbSJens Wiklander /* 971817466cbSJens Wiklander * We expect at least three bytes (see below) 972817466cbSJens Wiklander */ 973817466cbSJens Wiklander if( len < 3 ) 974817466cbSJens Wiklander return( MBEDTLS_ERR_ECP_BAD_INPUT_DATA ); 975817466cbSJens Wiklander 976817466cbSJens Wiklander /* 977817466cbSJens Wiklander * First byte is curve_type; only named_curve is handled 978817466cbSJens Wiklander */ 979817466cbSJens Wiklander if( *(*buf)++ != MBEDTLS_ECP_TLS_NAMED_CURVE ) 980817466cbSJens Wiklander return( MBEDTLS_ERR_ECP_BAD_INPUT_DATA ); 981817466cbSJens Wiklander 982817466cbSJens Wiklander /* 983817466cbSJens Wiklander * Next two bytes are the namedcurve value 984817466cbSJens Wiklander */ 985817466cbSJens Wiklander tls_id = *(*buf)++; 986817466cbSJens Wiklander tls_id <<= 8; 987817466cbSJens Wiklander tls_id |= *(*buf)++; 988817466cbSJens Wiklander 989817466cbSJens Wiklander if( ( curve_info = mbedtls_ecp_curve_info_from_tls_id( tls_id ) ) == NULL ) 990817466cbSJens Wiklander return( MBEDTLS_ERR_ECP_FEATURE_UNAVAILABLE ); 991817466cbSJens Wiklander 9923d3b0591SJens Wiklander *grp = curve_info->grp_id; 9933d3b0591SJens Wiklander 9943d3b0591SJens Wiklander return( 0 ); 995817466cbSJens Wiklander } 996817466cbSJens Wiklander 997817466cbSJens Wiklander /* 998817466cbSJens Wiklander * Write the ECParameters record corresponding to a group (RFC 4492) 999817466cbSJens Wiklander */ 1000817466cbSJens Wiklander int mbedtls_ecp_tls_write_group( const mbedtls_ecp_group *grp, size_t *olen, 1001817466cbSJens Wiklander unsigned char *buf, size_t blen ) 1002817466cbSJens Wiklander { 1003817466cbSJens Wiklander const mbedtls_ecp_curve_info *curve_info; 10043d3b0591SJens Wiklander ECP_VALIDATE_RET( grp != NULL ); 10053d3b0591SJens Wiklander ECP_VALIDATE_RET( buf != NULL ); 10063d3b0591SJens Wiklander ECP_VALIDATE_RET( olen != NULL ); 1007817466cbSJens Wiklander 1008817466cbSJens Wiklander if( ( curve_info = mbedtls_ecp_curve_info_from_grp_id( grp->id ) ) == NULL ) 1009817466cbSJens Wiklander return( MBEDTLS_ERR_ECP_BAD_INPUT_DATA ); 1010817466cbSJens Wiklander 1011817466cbSJens Wiklander /* 1012817466cbSJens Wiklander * We are going to write 3 bytes (see below) 1013817466cbSJens Wiklander */ 1014817466cbSJens Wiklander *olen = 3; 1015817466cbSJens Wiklander if( blen < *olen ) 1016817466cbSJens Wiklander return( MBEDTLS_ERR_ECP_BUFFER_TOO_SMALL ); 1017817466cbSJens Wiklander 1018817466cbSJens Wiklander /* 1019817466cbSJens Wiklander * First byte is curve_type, always named_curve 1020817466cbSJens Wiklander */ 1021817466cbSJens Wiklander *buf++ = MBEDTLS_ECP_TLS_NAMED_CURVE; 1022817466cbSJens Wiklander 1023817466cbSJens Wiklander /* 1024817466cbSJens Wiklander * Next two bytes are the namedcurve value 1025817466cbSJens Wiklander */ 1026817466cbSJens Wiklander buf[0] = curve_info->tls_id >> 8; 1027817466cbSJens Wiklander buf[1] = curve_info->tls_id & 0xFF; 1028817466cbSJens Wiklander 1029817466cbSJens Wiklander return( 0 ); 1030817466cbSJens Wiklander } 1031817466cbSJens Wiklander 1032817466cbSJens Wiklander /* 1033817466cbSJens Wiklander * Wrapper around fast quasi-modp functions, with fall-back to mbedtls_mpi_mod_mpi. 1034817466cbSJens Wiklander * See the documentation of struct mbedtls_ecp_group. 1035817466cbSJens Wiklander * 1036817466cbSJens Wiklander * This function is in the critial loop for mbedtls_ecp_mul, so pay attention to perf. 1037817466cbSJens Wiklander */ 1038817466cbSJens Wiklander static int ecp_modp( mbedtls_mpi *N, const mbedtls_ecp_group *grp ) 1039817466cbSJens Wiklander { 104011fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 1041817466cbSJens Wiklander 1042817466cbSJens Wiklander if( grp->modp == NULL ) 1043817466cbSJens Wiklander return( mbedtls_mpi_mod_mpi( N, N, &grp->P ) ); 1044817466cbSJens Wiklander 1045817466cbSJens Wiklander /* N->s < 0 is a much faster test, which fails only if N is 0 */ 1046817466cbSJens Wiklander if( ( N->s < 0 && mbedtls_mpi_cmp_int( N, 0 ) != 0 ) || 1047817466cbSJens Wiklander mbedtls_mpi_bitlen( N ) > 2 * grp->pbits ) 1048817466cbSJens Wiklander { 1049817466cbSJens Wiklander return( MBEDTLS_ERR_ECP_BAD_INPUT_DATA ); 1050817466cbSJens Wiklander } 1051817466cbSJens Wiklander 1052817466cbSJens Wiklander MBEDTLS_MPI_CHK( grp->modp( N ) ); 1053817466cbSJens Wiklander 1054817466cbSJens Wiklander /* N->s < 0 is a much faster test, which fails only if N is 0 */ 1055817466cbSJens Wiklander while( N->s < 0 && mbedtls_mpi_cmp_int( N, 0 ) != 0 ) 1056817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_add_mpi( N, N, &grp->P ) ); 1057817466cbSJens Wiklander 1058817466cbSJens Wiklander while( mbedtls_mpi_cmp_mpi( N, &grp->P ) >= 0 ) 1059817466cbSJens Wiklander /* we known P, N and the result are positive */ 1060817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_sub_abs( N, N, &grp->P ) ); 1061817466cbSJens Wiklander 1062817466cbSJens Wiklander cleanup: 1063817466cbSJens Wiklander return( ret ); 1064817466cbSJens Wiklander } 1065817466cbSJens Wiklander 1066817466cbSJens Wiklander /* 1067817466cbSJens Wiklander * Fast mod-p functions expect their argument to be in the 0..p^2 range. 1068817466cbSJens Wiklander * 1069817466cbSJens Wiklander * In order to guarantee that, we need to ensure that operands of 1070817466cbSJens Wiklander * mbedtls_mpi_mul_mpi are in the 0..p range. So, after each operation we will 1071817466cbSJens Wiklander * bring the result back to this range. 1072817466cbSJens Wiklander * 1073817466cbSJens Wiklander * The following macros are shortcuts for doing that. 1074817466cbSJens Wiklander */ 1075817466cbSJens Wiklander 1076817466cbSJens Wiklander /* 1077817466cbSJens Wiklander * Reduce a mbedtls_mpi mod p in-place, general case, to use after mbedtls_mpi_mul_mpi 1078817466cbSJens Wiklander */ 1079817466cbSJens Wiklander #if defined(MBEDTLS_SELF_TEST) 1080817466cbSJens Wiklander #define INC_MUL_COUNT mul_count++; 1081817466cbSJens Wiklander #else 1082817466cbSJens Wiklander #define INC_MUL_COUNT 1083817466cbSJens Wiklander #endif 1084817466cbSJens Wiklander 10855b25c76aSJerome Forissier #define MOD_MUL( N ) \ 10865b25c76aSJerome Forissier do \ 10875b25c76aSJerome Forissier { \ 10885b25c76aSJerome Forissier MBEDTLS_MPI_CHK( ecp_modp( &(N), grp ) ); \ 10895b25c76aSJerome Forissier INC_MUL_COUNT \ 10905b25c76aSJerome Forissier } while( 0 ) 1091817466cbSJens Wiklander 109211fa71b9SJerome Forissier static inline int mbedtls_mpi_mul_mod( const mbedtls_ecp_group *grp, 109311fa71b9SJerome Forissier mbedtls_mpi *X, 109411fa71b9SJerome Forissier const mbedtls_mpi *A, 109511fa71b9SJerome Forissier const mbedtls_mpi *B ) 109611fa71b9SJerome Forissier { 109711fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 109811fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mpi( X, A, B ) ); 109911fa71b9SJerome Forissier MOD_MUL( *X ); 110011fa71b9SJerome Forissier cleanup: 110111fa71b9SJerome Forissier return( ret ); 110211fa71b9SJerome Forissier } 110311fa71b9SJerome Forissier 1104817466cbSJens Wiklander /* 1105817466cbSJens Wiklander * Reduce a mbedtls_mpi mod p in-place, to use after mbedtls_mpi_sub_mpi 1106817466cbSJens Wiklander * N->s < 0 is a very fast test, which fails only if N is 0 1107817466cbSJens Wiklander */ 1108817466cbSJens Wiklander #define MOD_SUB( N ) \ 11095b25c76aSJerome Forissier while( (N).s < 0 && mbedtls_mpi_cmp_int( &(N), 0 ) != 0 ) \ 11105b25c76aSJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_add_mpi( &(N), &(N), &grp->P ) ) 1111817466cbSJens Wiklander 111211fa71b9SJerome Forissier static inline int mbedtls_mpi_sub_mod( const mbedtls_ecp_group *grp, 111311fa71b9SJerome Forissier mbedtls_mpi *X, 111411fa71b9SJerome Forissier const mbedtls_mpi *A, 111511fa71b9SJerome Forissier const mbedtls_mpi *B ) 111611fa71b9SJerome Forissier { 111711fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 111811fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_sub_mpi( X, A, B ) ); 111911fa71b9SJerome Forissier MOD_SUB( *X ); 112011fa71b9SJerome Forissier cleanup: 112111fa71b9SJerome Forissier return( ret ); 112211fa71b9SJerome Forissier } 112311fa71b9SJerome Forissier 1124817466cbSJens Wiklander /* 1125817466cbSJens Wiklander * Reduce a mbedtls_mpi mod p in-place, to use after mbedtls_mpi_add_mpi and mbedtls_mpi_mul_int. 1126817466cbSJens Wiklander * We known P, N and the result are positive, so sub_abs is correct, and 1127817466cbSJens Wiklander * a bit faster. 1128817466cbSJens Wiklander */ 1129817466cbSJens Wiklander #define MOD_ADD( N ) \ 11305b25c76aSJerome Forissier while( mbedtls_mpi_cmp_mpi( &(N), &grp->P ) >= 0 ) \ 11315b25c76aSJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_sub_abs( &(N), &(N), &grp->P ) ) 1132817466cbSJens Wiklander 113311fa71b9SJerome Forissier static inline int mbedtls_mpi_add_mod( const mbedtls_ecp_group *grp, 113411fa71b9SJerome Forissier mbedtls_mpi *X, 113511fa71b9SJerome Forissier const mbedtls_mpi *A, 113611fa71b9SJerome Forissier const mbedtls_mpi *B ) 113711fa71b9SJerome Forissier { 113811fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 113911fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_add_mpi( X, A, B ) ); 114011fa71b9SJerome Forissier MOD_ADD( *X ); 114111fa71b9SJerome Forissier cleanup: 114211fa71b9SJerome Forissier return( ret ); 114311fa71b9SJerome Forissier } 114411fa71b9SJerome Forissier 114511fa71b9SJerome Forissier static inline int mbedtls_mpi_shift_l_mod( const mbedtls_ecp_group *grp, 114611fa71b9SJerome Forissier mbedtls_mpi *X, 114711fa71b9SJerome Forissier size_t count ) 114811fa71b9SJerome Forissier { 114911fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 115011fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_shift_l( X, count ) ); 115111fa71b9SJerome Forissier MOD_ADD( *X ); 115211fa71b9SJerome Forissier cleanup: 115311fa71b9SJerome Forissier return( ret ); 115411fa71b9SJerome Forissier } 115511fa71b9SJerome Forissier 1156817466cbSJens Wiklander #if defined(ECP_SHORTWEIERSTRASS) 1157817466cbSJens Wiklander /* 1158817466cbSJens Wiklander * For curves in short Weierstrass form, we do all the internal operations in 1159817466cbSJens Wiklander * Jacobian coordinates. 1160817466cbSJens Wiklander * 1161817466cbSJens Wiklander * For multiplication, we'll use a comb method with coutermeasueres against 1162817466cbSJens Wiklander * SPA, hence timing attacks. 1163817466cbSJens Wiklander */ 1164817466cbSJens Wiklander 1165817466cbSJens Wiklander /* 1166817466cbSJens Wiklander * Normalize jacobian coordinates so that Z == 0 || Z == 1 (GECC 3.2.1) 1167817466cbSJens Wiklander * Cost: 1N := 1I + 3M + 1S 1168817466cbSJens Wiklander */ 1169817466cbSJens Wiklander static int ecp_normalize_jac( const mbedtls_ecp_group *grp, mbedtls_ecp_point *pt ) 1170817466cbSJens Wiklander { 117111fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 1172817466cbSJens Wiklander mbedtls_mpi Zi, ZZi; 1173817466cbSJens Wiklander 1174817466cbSJens Wiklander if( mbedtls_mpi_cmp_int( &pt->Z, 0 ) == 0 ) 1175817466cbSJens Wiklander return( 0 ); 1176817466cbSJens Wiklander 1177817466cbSJens Wiklander #if defined(MBEDTLS_ECP_NORMALIZE_JAC_ALT) 1178817466cbSJens Wiklander if( mbedtls_internal_ecp_grp_capable( grp ) ) 11793d3b0591SJens Wiklander return( mbedtls_internal_ecp_normalize_jac( grp, pt ) ); 1180817466cbSJens Wiklander #endif /* MBEDTLS_ECP_NORMALIZE_JAC_ALT */ 11813d3b0591SJens Wiklander 1182817466cbSJens Wiklander mbedtls_mpi_init( &Zi ); mbedtls_mpi_init( &ZZi ); 1183817466cbSJens Wiklander 1184817466cbSJens Wiklander /* 1185817466cbSJens Wiklander * X = X / Z^2 mod p 1186817466cbSJens Wiklander */ 1187817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_inv_mod( &Zi, &pt->Z, &grp->P ) ); 118811fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &ZZi, &Zi, &Zi ) ); 118911fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &pt->X, &pt->X, &ZZi ) ); 1190817466cbSJens Wiklander 1191817466cbSJens Wiklander /* 1192817466cbSJens Wiklander * Y = Y / Z^3 mod p 1193817466cbSJens Wiklander */ 119411fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &pt->Y, &pt->Y, &ZZi ) ); 119511fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &pt->Y, &pt->Y, &Zi ) ); 1196817466cbSJens Wiklander 1197817466cbSJens Wiklander /* 1198817466cbSJens Wiklander * Z = 1 1199817466cbSJens Wiklander */ 1200817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_lset( &pt->Z, 1 ) ); 1201817466cbSJens Wiklander 1202817466cbSJens Wiklander cleanup: 1203817466cbSJens Wiklander 1204817466cbSJens Wiklander mbedtls_mpi_free( &Zi ); mbedtls_mpi_free( &ZZi ); 1205817466cbSJens Wiklander 1206817466cbSJens Wiklander return( ret ); 1207817466cbSJens Wiklander } 1208817466cbSJens Wiklander 1209817466cbSJens Wiklander /* 1210817466cbSJens Wiklander * Normalize jacobian coordinates of an array of (pointers to) points, 1211817466cbSJens Wiklander * using Montgomery's trick to perform only one inversion mod P. 1212817466cbSJens Wiklander * (See for example Cohen's "A Course in Computational Algebraic Number 1213817466cbSJens Wiklander * Theory", Algorithm 10.3.4.) 1214817466cbSJens Wiklander * 1215817466cbSJens Wiklander * Warning: fails (returning an error) if one of the points is zero! 1216817466cbSJens Wiklander * This should never happen, see choice of w in ecp_mul_comb(). 1217817466cbSJens Wiklander * 1218817466cbSJens Wiklander * Cost: 1N(t) := 1I + (6t - 3)M + 1S 1219817466cbSJens Wiklander */ 1220817466cbSJens Wiklander static int ecp_normalize_jac_many( const mbedtls_ecp_group *grp, 12213d3b0591SJens Wiklander mbedtls_ecp_point *T[], size_t T_size ) 1222817466cbSJens Wiklander { 122311fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 1224817466cbSJens Wiklander size_t i; 1225817466cbSJens Wiklander mbedtls_mpi *c, u, Zi, ZZi; 1226817466cbSJens Wiklander 12273d3b0591SJens Wiklander if( T_size < 2 ) 1228817466cbSJens Wiklander return( ecp_normalize_jac( grp, *T ) ); 1229817466cbSJens Wiklander 1230817466cbSJens Wiklander #if defined(MBEDTLS_ECP_NORMALIZE_JAC_MANY_ALT) 1231817466cbSJens Wiklander if( mbedtls_internal_ecp_grp_capable( grp ) ) 12323d3b0591SJens Wiklander return( mbedtls_internal_ecp_normalize_jac_many( grp, T, T_size ) ); 1233817466cbSJens Wiklander #endif 1234817466cbSJens Wiklander 12353d3b0591SJens Wiklander if( ( c = mbedtls_calloc( T_size, sizeof( mbedtls_mpi ) ) ) == NULL ) 1236817466cbSJens Wiklander return( MBEDTLS_ERR_ECP_ALLOC_FAILED ); 1237817466cbSJens Wiklander 12383d3b0591SJens Wiklander for( i = 0; i < T_size; i++ ) 12393d3b0591SJens Wiklander mbedtls_mpi_init( &c[i] ); 12403d3b0591SJens Wiklander 1241817466cbSJens Wiklander mbedtls_mpi_init( &u ); mbedtls_mpi_init( &Zi ); mbedtls_mpi_init( &ZZi ); 1242817466cbSJens Wiklander 1243817466cbSJens Wiklander /* 1244817466cbSJens Wiklander * c[i] = Z_0 * ... * Z_i 1245817466cbSJens Wiklander */ 1246817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_copy( &c[0], &T[0]->Z ) ); 12473d3b0591SJens Wiklander for( i = 1; i < T_size; i++ ) 1248817466cbSJens Wiklander { 124911fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &c[i], &c[i-1], &T[i]->Z ) ); 1250817466cbSJens Wiklander } 1251817466cbSJens Wiklander 1252817466cbSJens Wiklander /* 1253817466cbSJens Wiklander * u = 1 / (Z_0 * ... * Z_n) mod P 1254817466cbSJens Wiklander */ 12553d3b0591SJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_inv_mod( &u, &c[T_size-1], &grp->P ) ); 1256817466cbSJens Wiklander 12573d3b0591SJens Wiklander for( i = T_size - 1; ; i-- ) 1258817466cbSJens Wiklander { 1259817466cbSJens Wiklander /* 1260817466cbSJens Wiklander * Zi = 1 / Z_i mod p 1261817466cbSJens Wiklander * u = 1 / (Z_0 * ... * Z_i) mod P 1262817466cbSJens Wiklander */ 1263817466cbSJens Wiklander if( i == 0 ) { 1264817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_copy( &Zi, &u ) ); 1265817466cbSJens Wiklander } 1266817466cbSJens Wiklander else 1267817466cbSJens Wiklander { 126811fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &Zi, &u, &c[i-1] ) ); 126911fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &u, &u, &T[i]->Z ) ); 1270817466cbSJens Wiklander } 1271817466cbSJens Wiklander 1272817466cbSJens Wiklander /* 1273817466cbSJens Wiklander * proceed as in normalize() 1274817466cbSJens Wiklander */ 127511fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &ZZi, &Zi, &Zi ) ); 127611fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &T[i]->X, &T[i]->X, &ZZi ) ); 127711fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &T[i]->Y, &T[i]->Y, &ZZi ) ); 127811fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &T[i]->Y, &T[i]->Y, &Zi ) ); 1279817466cbSJens Wiklander 1280817466cbSJens Wiklander /* 1281817466cbSJens Wiklander * Post-precessing: reclaim some memory by shrinking coordinates 1282817466cbSJens Wiklander * - not storing Z (always 1) 1283817466cbSJens Wiklander * - shrinking other coordinates, but still keeping the same number of 1284817466cbSJens Wiklander * limbs as P, as otherwise it will too likely be regrown too fast. 1285817466cbSJens Wiklander */ 1286817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_shrink( &T[i]->X, grp->P.n ) ); 1287817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_shrink( &T[i]->Y, grp->P.n ) ); 1288817466cbSJens Wiklander mbedtls_mpi_free( &T[i]->Z ); 1289817466cbSJens Wiklander 1290817466cbSJens Wiklander if( i == 0 ) 1291817466cbSJens Wiklander break; 1292817466cbSJens Wiklander } 1293817466cbSJens Wiklander 1294817466cbSJens Wiklander cleanup: 1295817466cbSJens Wiklander 1296817466cbSJens Wiklander mbedtls_mpi_free( &u ); mbedtls_mpi_free( &Zi ); mbedtls_mpi_free( &ZZi ); 12973d3b0591SJens Wiklander for( i = 0; i < T_size; i++ ) 1298817466cbSJens Wiklander mbedtls_mpi_free( &c[i] ); 1299817466cbSJens Wiklander mbedtls_free( c ); 1300817466cbSJens Wiklander 1301817466cbSJens Wiklander return( ret ); 1302817466cbSJens Wiklander } 1303817466cbSJens Wiklander 1304817466cbSJens Wiklander /* 1305817466cbSJens Wiklander * Conditional point inversion: Q -> -Q = (Q.X, -Q.Y, Q.Z) without leak. 1306817466cbSJens Wiklander * "inv" must be 0 (don't invert) or 1 (invert) or the result will be invalid 1307817466cbSJens Wiklander */ 1308817466cbSJens Wiklander static int ecp_safe_invert_jac( const mbedtls_ecp_group *grp, 1309817466cbSJens Wiklander mbedtls_ecp_point *Q, 1310817466cbSJens Wiklander unsigned char inv ) 1311817466cbSJens Wiklander { 131211fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 1313817466cbSJens Wiklander unsigned char nonzero; 1314817466cbSJens Wiklander mbedtls_mpi mQY; 1315817466cbSJens Wiklander 1316817466cbSJens Wiklander mbedtls_mpi_init( &mQY ); 1317817466cbSJens Wiklander 1318817466cbSJens Wiklander /* Use the fact that -Q.Y mod P = P - Q.Y unless Q.Y == 0 */ 1319817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_sub_mpi( &mQY, &grp->P, &Q->Y ) ); 1320817466cbSJens Wiklander nonzero = mbedtls_mpi_cmp_int( &Q->Y, 0 ) != 0; 1321817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_safe_cond_assign( &Q->Y, &mQY, inv & nonzero ) ); 1322817466cbSJens Wiklander 1323817466cbSJens Wiklander cleanup: 1324817466cbSJens Wiklander mbedtls_mpi_free( &mQY ); 1325817466cbSJens Wiklander 1326817466cbSJens Wiklander return( ret ); 1327817466cbSJens Wiklander } 1328817466cbSJens Wiklander 1329817466cbSJens Wiklander /* 1330817466cbSJens Wiklander * Point doubling R = 2 P, Jacobian coordinates 1331817466cbSJens Wiklander * 1332817466cbSJens Wiklander * Based on http://www.hyperelliptic.org/EFD/g1p/auto-shortw-jacobian.html#doubling-dbl-1998-cmo-2 . 1333817466cbSJens Wiklander * 1334817466cbSJens Wiklander * We follow the variable naming fairly closely. The formula variations that trade a MUL for a SQR 1335817466cbSJens Wiklander * (plus a few ADDs) aren't useful as our bignum implementation doesn't distinguish squaring. 1336817466cbSJens Wiklander * 1337817466cbSJens Wiklander * Standard optimizations are applied when curve parameter A is one of { 0, -3 }. 1338817466cbSJens Wiklander * 1339817466cbSJens Wiklander * Cost: 1D := 3M + 4S (A == 0) 1340817466cbSJens Wiklander * 4M + 4S (A == -3) 1341817466cbSJens Wiklander * 3M + 6S + 1a otherwise 1342817466cbSJens Wiklander */ 1343817466cbSJens Wiklander static int ecp_double_jac( const mbedtls_ecp_group *grp, mbedtls_ecp_point *R, 1344817466cbSJens Wiklander const mbedtls_ecp_point *P ) 1345817466cbSJens Wiklander { 134611fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 1347817466cbSJens Wiklander mbedtls_mpi M, S, T, U; 1348817466cbSJens Wiklander 1349817466cbSJens Wiklander #if defined(MBEDTLS_SELF_TEST) 1350817466cbSJens Wiklander dbl_count++; 1351817466cbSJens Wiklander #endif 1352817466cbSJens Wiklander 1353817466cbSJens Wiklander #if defined(MBEDTLS_ECP_DOUBLE_JAC_ALT) 1354817466cbSJens Wiklander if( mbedtls_internal_ecp_grp_capable( grp ) ) 13553d3b0591SJens Wiklander return( mbedtls_internal_ecp_double_jac( grp, R, P ) ); 1356817466cbSJens Wiklander #endif /* MBEDTLS_ECP_DOUBLE_JAC_ALT */ 1357817466cbSJens Wiklander 1358817466cbSJens Wiklander mbedtls_mpi_init( &M ); mbedtls_mpi_init( &S ); mbedtls_mpi_init( &T ); mbedtls_mpi_init( &U ); 1359817466cbSJens Wiklander 1360817466cbSJens Wiklander /* Special case for A = -3 */ 1361817466cbSJens Wiklander if( grp->A.p == NULL ) 1362817466cbSJens Wiklander { 1363817466cbSJens Wiklander /* M = 3(X + Z^2)(X - Z^2) */ 136411fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &S, &P->Z, &P->Z ) ); 136511fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_add_mod( grp, &T, &P->X, &S ) ); 136611fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_sub_mod( grp, &U, &P->X, &S ) ); 136711fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &S, &T, &U ) ); 1368817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_mul_int( &M, &S, 3 ) ); MOD_ADD( M ); 1369817466cbSJens Wiklander } 1370817466cbSJens Wiklander else 1371817466cbSJens Wiklander { 1372817466cbSJens Wiklander /* M = 3.X^2 */ 137311fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &S, &P->X, &P->X ) ); 1374817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_mul_int( &M, &S, 3 ) ); MOD_ADD( M ); 1375817466cbSJens Wiklander 1376817466cbSJens Wiklander /* Optimize away for "koblitz" curves with A = 0 */ 1377817466cbSJens Wiklander if( mbedtls_mpi_cmp_int( &grp->A, 0 ) != 0 ) 1378817466cbSJens Wiklander { 1379817466cbSJens Wiklander /* M += A.Z^4 */ 138011fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &S, &P->Z, &P->Z ) ); 138111fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &T, &S, &S ) ); 138211fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &S, &T, &grp->A ) ); 138311fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_add_mod( grp, &M, &M, &S ) ); 1384817466cbSJens Wiklander } 1385817466cbSJens Wiklander } 1386817466cbSJens Wiklander 1387817466cbSJens Wiklander /* S = 4.X.Y^2 */ 138811fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &T, &P->Y, &P->Y ) ); 138911fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_shift_l_mod( grp, &T, 1 ) ); 139011fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &S, &P->X, &T ) ); 139111fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_shift_l_mod( grp, &S, 1 ) ); 1392817466cbSJens Wiklander 1393817466cbSJens Wiklander /* U = 8.Y^4 */ 139411fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &U, &T, &T ) ); 139511fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_shift_l_mod( grp, &U, 1 ) ); 1396817466cbSJens Wiklander 1397817466cbSJens Wiklander /* T = M^2 - 2.S */ 139811fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &T, &M, &M ) ); 139911fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_sub_mod( grp, &T, &T, &S ) ); 140011fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_sub_mod( grp, &T, &T, &S ) ); 1401817466cbSJens Wiklander 1402817466cbSJens Wiklander /* S = M(S - T) - U */ 140311fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_sub_mod( grp, &S, &S, &T ) ); 140411fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &S, &S, &M ) ); 140511fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_sub_mod( grp, &S, &S, &U ) ); 1406817466cbSJens Wiklander 1407817466cbSJens Wiklander /* U = 2.Y.Z */ 140811fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &U, &P->Y, &P->Z ) ); 140911fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_shift_l_mod( grp, &U, 1 ) ); 1410817466cbSJens Wiklander 1411817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_copy( &R->X, &T ) ); 1412817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_copy( &R->Y, &S ) ); 1413817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_copy( &R->Z, &U ) ); 1414817466cbSJens Wiklander 1415817466cbSJens Wiklander cleanup: 1416817466cbSJens Wiklander mbedtls_mpi_free( &M ); mbedtls_mpi_free( &S ); mbedtls_mpi_free( &T ); mbedtls_mpi_free( &U ); 1417817466cbSJens Wiklander 1418817466cbSJens Wiklander return( ret ); 1419817466cbSJens Wiklander } 1420817466cbSJens Wiklander 1421817466cbSJens Wiklander /* 1422817466cbSJens Wiklander * Addition: R = P + Q, mixed affine-Jacobian coordinates (GECC 3.22) 1423817466cbSJens Wiklander * 1424817466cbSJens Wiklander * The coordinates of Q must be normalized (= affine), 1425817466cbSJens Wiklander * but those of P don't need to. R is not normalized. 1426817466cbSJens Wiklander * 1427817466cbSJens Wiklander * Special cases: (1) P or Q is zero, (2) R is zero, (3) P == Q. 1428817466cbSJens Wiklander * None of these cases can happen as intermediate step in ecp_mul_comb(): 1429817466cbSJens Wiklander * - at each step, P, Q and R are multiples of the base point, the factor 1430817466cbSJens Wiklander * being less than its order, so none of them is zero; 1431817466cbSJens Wiklander * - Q is an odd multiple of the base point, P an even multiple, 1432817466cbSJens Wiklander * due to the choice of precomputed points in the modified comb method. 1433817466cbSJens Wiklander * So branches for these cases do not leak secret information. 1434817466cbSJens Wiklander * 1435817466cbSJens Wiklander * We accept Q->Z being unset (saving memory in tables) as meaning 1. 1436817466cbSJens Wiklander * 1437817466cbSJens Wiklander * Cost: 1A := 8M + 3S 1438817466cbSJens Wiklander */ 1439817466cbSJens Wiklander static int ecp_add_mixed( const mbedtls_ecp_group *grp, mbedtls_ecp_point *R, 1440817466cbSJens Wiklander const mbedtls_ecp_point *P, const mbedtls_ecp_point *Q ) 1441817466cbSJens Wiklander { 144211fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 1443817466cbSJens Wiklander mbedtls_mpi T1, T2, T3, T4, X, Y, Z; 1444817466cbSJens Wiklander 1445817466cbSJens Wiklander #if defined(MBEDTLS_SELF_TEST) 1446817466cbSJens Wiklander add_count++; 1447817466cbSJens Wiklander #endif 1448817466cbSJens Wiklander 1449817466cbSJens Wiklander #if defined(MBEDTLS_ECP_ADD_MIXED_ALT) 1450817466cbSJens Wiklander if( mbedtls_internal_ecp_grp_capable( grp ) ) 14513d3b0591SJens Wiklander return( mbedtls_internal_ecp_add_mixed( grp, R, P, Q ) ); 1452817466cbSJens Wiklander #endif /* MBEDTLS_ECP_ADD_MIXED_ALT */ 1453817466cbSJens Wiklander 1454817466cbSJens Wiklander /* 1455817466cbSJens Wiklander * Trivial cases: P == 0 or Q == 0 (case 1) 1456817466cbSJens Wiklander */ 1457817466cbSJens Wiklander if( mbedtls_mpi_cmp_int( &P->Z, 0 ) == 0 ) 1458817466cbSJens Wiklander return( mbedtls_ecp_copy( R, Q ) ); 1459817466cbSJens Wiklander 1460817466cbSJens Wiklander if( Q->Z.p != NULL && mbedtls_mpi_cmp_int( &Q->Z, 0 ) == 0 ) 1461817466cbSJens Wiklander return( mbedtls_ecp_copy( R, P ) ); 1462817466cbSJens Wiklander 1463817466cbSJens Wiklander /* 1464817466cbSJens Wiklander * Make sure Q coordinates are normalized 1465817466cbSJens Wiklander */ 1466817466cbSJens Wiklander if( Q->Z.p != NULL && mbedtls_mpi_cmp_int( &Q->Z, 1 ) != 0 ) 1467817466cbSJens Wiklander return( MBEDTLS_ERR_ECP_BAD_INPUT_DATA ); 1468817466cbSJens Wiklander 1469817466cbSJens Wiklander mbedtls_mpi_init( &T1 ); mbedtls_mpi_init( &T2 ); mbedtls_mpi_init( &T3 ); mbedtls_mpi_init( &T4 ); 1470817466cbSJens Wiklander mbedtls_mpi_init( &X ); mbedtls_mpi_init( &Y ); mbedtls_mpi_init( &Z ); 1471817466cbSJens Wiklander 147211fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &T1, &P->Z, &P->Z ) ); 147311fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &T2, &T1, &P->Z ) ); 147411fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &T1, &T1, &Q->X ) ); 147511fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &T2, &T2, &Q->Y ) ); 147611fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_sub_mod( grp, &T1, &T1, &P->X ) ); 147711fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_sub_mod( grp, &T2, &T2, &P->Y ) ); 1478817466cbSJens Wiklander 1479817466cbSJens Wiklander /* Special cases (2) and (3) */ 1480817466cbSJens Wiklander if( mbedtls_mpi_cmp_int( &T1, 0 ) == 0 ) 1481817466cbSJens Wiklander { 1482817466cbSJens Wiklander if( mbedtls_mpi_cmp_int( &T2, 0 ) == 0 ) 1483817466cbSJens Wiklander { 1484817466cbSJens Wiklander ret = ecp_double_jac( grp, R, P ); 1485817466cbSJens Wiklander goto cleanup; 1486817466cbSJens Wiklander } 1487817466cbSJens Wiklander else 1488817466cbSJens Wiklander { 1489817466cbSJens Wiklander ret = mbedtls_ecp_set_zero( R ); 1490817466cbSJens Wiklander goto cleanup; 1491817466cbSJens Wiklander } 1492817466cbSJens Wiklander } 1493817466cbSJens Wiklander 149411fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &Z, &P->Z, &T1 ) ); 149511fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &T3, &T1, &T1 ) ); 149611fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &T4, &T3, &T1 ) ); 149711fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &T3, &T3, &P->X ) ); 149811fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_copy( &T1, &T3 ) ); 149911fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_shift_l_mod( grp, &T1, 1 ) ); 150011fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &X, &T2, &T2 ) ); 150111fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_sub_mod( grp, &X, &X, &T1 ) ); 150211fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_sub_mod( grp, &X, &X, &T4 ) ); 150311fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_sub_mod( grp, &T3, &T3, &X ) ); 150411fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &T3, &T3, &T2 ) ); 150511fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &T4, &T4, &P->Y ) ); 150611fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_sub_mod( grp, &Y, &T3, &T4 ) ); 1507817466cbSJens Wiklander 1508817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_copy( &R->X, &X ) ); 1509817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_copy( &R->Y, &Y ) ); 1510817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_copy( &R->Z, &Z ) ); 1511817466cbSJens Wiklander 1512817466cbSJens Wiklander cleanup: 1513817466cbSJens Wiklander 1514817466cbSJens Wiklander mbedtls_mpi_free( &T1 ); mbedtls_mpi_free( &T2 ); mbedtls_mpi_free( &T3 ); mbedtls_mpi_free( &T4 ); 1515817466cbSJens Wiklander mbedtls_mpi_free( &X ); mbedtls_mpi_free( &Y ); mbedtls_mpi_free( &Z ); 1516817466cbSJens Wiklander 1517817466cbSJens Wiklander return( ret ); 1518817466cbSJens Wiklander } 1519817466cbSJens Wiklander 1520817466cbSJens Wiklander /* 1521817466cbSJens Wiklander * Randomize jacobian coordinates: 1522817466cbSJens Wiklander * (X, Y, Z) -> (l^2 X, l^3 Y, l Z) for random l 1523817466cbSJens Wiklander * This is sort of the reverse operation of ecp_normalize_jac(). 1524817466cbSJens Wiklander * 1525817466cbSJens Wiklander * This countermeasure was first suggested in [2]. 1526817466cbSJens Wiklander */ 1527817466cbSJens Wiklander static int ecp_randomize_jac( const mbedtls_ecp_group *grp, mbedtls_ecp_point *pt, 1528817466cbSJens Wiklander int (*f_rng)(void *, unsigned char *, size_t), void *p_rng ) 1529817466cbSJens Wiklander { 153011fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 1531817466cbSJens Wiklander mbedtls_mpi l, ll; 1532817466cbSJens Wiklander size_t p_size; 1533817466cbSJens Wiklander int count = 0; 1534817466cbSJens Wiklander 1535817466cbSJens Wiklander #if defined(MBEDTLS_ECP_RANDOMIZE_JAC_ALT) 1536817466cbSJens Wiklander if( mbedtls_internal_ecp_grp_capable( grp ) ) 15373d3b0591SJens Wiklander return( mbedtls_internal_ecp_randomize_jac( grp, pt, f_rng, p_rng ) ); 1538817466cbSJens Wiklander #endif /* MBEDTLS_ECP_RANDOMIZE_JAC_ALT */ 1539817466cbSJens Wiklander 1540817466cbSJens Wiklander p_size = ( grp->pbits + 7 ) / 8; 1541817466cbSJens Wiklander mbedtls_mpi_init( &l ); mbedtls_mpi_init( &ll ); 1542817466cbSJens Wiklander 1543817466cbSJens Wiklander /* Generate l such that 1 < l < p */ 1544817466cbSJens Wiklander do 1545817466cbSJens Wiklander { 1546817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_fill_random( &l, p_size, f_rng, p_rng ) ); 1547817466cbSJens Wiklander 1548817466cbSJens Wiklander while( mbedtls_mpi_cmp_mpi( &l, &grp->P ) >= 0 ) 1549817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_shift_r( &l, 1 ) ); 1550817466cbSJens Wiklander 1551817466cbSJens Wiklander if( count++ > 10 ) 1552817466cbSJens Wiklander return( MBEDTLS_ERR_ECP_RANDOM_FAILED ); 1553817466cbSJens Wiklander } 1554817466cbSJens Wiklander while( mbedtls_mpi_cmp_int( &l, 1 ) <= 0 ); 1555817466cbSJens Wiklander 1556817466cbSJens Wiklander /* Z = l * Z */ 155711fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &pt->Z, &pt->Z, &l ) ); 1558817466cbSJens Wiklander 1559817466cbSJens Wiklander /* X = l^2 * X */ 156011fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &ll, &l, &l ) ); 156111fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &pt->X, &pt->X, &ll ) ); 1562817466cbSJens Wiklander 1563817466cbSJens Wiklander /* Y = l^3 * Y */ 156411fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &ll, &ll, &l ) ); 156511fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &pt->Y, &pt->Y, &ll ) ); 1566817466cbSJens Wiklander 1567817466cbSJens Wiklander cleanup: 1568817466cbSJens Wiklander mbedtls_mpi_free( &l ); mbedtls_mpi_free( &ll ); 1569817466cbSJens Wiklander 1570817466cbSJens Wiklander return( ret ); 1571817466cbSJens Wiklander } 1572817466cbSJens Wiklander 1573817466cbSJens Wiklander /* 1574817466cbSJens Wiklander * Check and define parameters used by the comb method (see below for details) 1575817466cbSJens Wiklander */ 1576817466cbSJens Wiklander #if MBEDTLS_ECP_WINDOW_SIZE < 2 || MBEDTLS_ECP_WINDOW_SIZE > 7 1577817466cbSJens Wiklander #error "MBEDTLS_ECP_WINDOW_SIZE out of bounds" 1578817466cbSJens Wiklander #endif 1579817466cbSJens Wiklander 1580817466cbSJens Wiklander /* d = ceil( n / w ) */ 1581817466cbSJens Wiklander #define COMB_MAX_D ( MBEDTLS_ECP_MAX_BITS + 1 ) / 2 1582817466cbSJens Wiklander 1583817466cbSJens Wiklander /* number of precomputed points */ 1584817466cbSJens Wiklander #define COMB_MAX_PRE ( 1 << ( MBEDTLS_ECP_WINDOW_SIZE - 1 ) ) 1585817466cbSJens Wiklander 1586817466cbSJens Wiklander /* 1587817466cbSJens Wiklander * Compute the representation of m that will be used with our comb method. 1588817466cbSJens Wiklander * 1589817466cbSJens Wiklander * The basic comb method is described in GECC 3.44 for example. We use a 1590817466cbSJens Wiklander * modified version that provides resistance to SPA by avoiding zero 1591817466cbSJens Wiklander * digits in the representation as in [3]. We modify the method further by 1592817466cbSJens Wiklander * requiring that all K_i be odd, which has the small cost that our 15933d3b0591SJens Wiklander * representation uses one more K_i, due to carries, but saves on the size of 15943d3b0591SJens Wiklander * the precomputed table. 1595817466cbSJens Wiklander * 15963d3b0591SJens Wiklander * Summary of the comb method and its modifications: 15973d3b0591SJens Wiklander * 15983d3b0591SJens Wiklander * - The goal is to compute m*P for some w*d-bit integer m. 15993d3b0591SJens Wiklander * 16003d3b0591SJens Wiklander * - The basic comb method splits m into the w-bit integers 16013d3b0591SJens Wiklander * x[0] .. x[d-1] where x[i] consists of the bits in m whose 16023d3b0591SJens Wiklander * index has residue i modulo d, and computes m * P as 16033d3b0591SJens Wiklander * S[x[0]] + 2 * S[x[1]] + .. + 2^(d-1) S[x[d-1]], where 16043d3b0591SJens Wiklander * S[i_{w-1} .. i_0] := i_{w-1} 2^{(w-1)d} P + ... + i_1 2^d P + i_0 P. 16053d3b0591SJens Wiklander * 16063d3b0591SJens Wiklander * - If it happens that, say, x[i+1]=0 (=> S[x[i+1]]=0), one can replace the sum by 16073d3b0591SJens Wiklander * .. + 2^{i-1} S[x[i-1]] - 2^i S[x[i]] + 2^{i+1} S[x[i]] + 2^{i+2} S[x[i+2]] .., 16083d3b0591SJens Wiklander * thereby successively converting it into a form where all summands 16093d3b0591SJens Wiklander * are nonzero, at the cost of negative summands. This is the basic idea of [3]. 16103d3b0591SJens Wiklander * 16113d3b0591SJens Wiklander * - More generally, even if x[i+1] != 0, we can first transform the sum as 16123d3b0591SJens Wiklander * .. - 2^i S[x[i]] + 2^{i+1} ( S[x[i]] + S[x[i+1]] ) + 2^{i+2} S[x[i+2]] .., 16133d3b0591SJens Wiklander * and then replace S[x[i]] + S[x[i+1]] = S[x[i] ^ x[i+1]] + 2 S[x[i] & x[i+1]]. 16143d3b0591SJens Wiklander * Performing and iterating this procedure for those x[i] that are even 16153d3b0591SJens Wiklander * (keeping track of carry), we can transform the original sum into one of the form 16163d3b0591SJens Wiklander * S[x'[0]] +- 2 S[x'[1]] +- .. +- 2^{d-1} S[x'[d-1]] + 2^d S[x'[d]] 16173d3b0591SJens Wiklander * with all x'[i] odd. It is therefore only necessary to know S at odd indices, 16183d3b0591SJens Wiklander * which is why we are only computing half of it in the first place in 16193d3b0591SJens Wiklander * ecp_precompute_comb and accessing it with index abs(i) / 2 in ecp_select_comb. 16203d3b0591SJens Wiklander * 16213d3b0591SJens Wiklander * - For the sake of compactness, only the seven low-order bits of x[i] 16223d3b0591SJens Wiklander * are used to represent its absolute value (K_i in the paper), and the msb 16233d3b0591SJens Wiklander * of x[i] encodes the sign (s_i in the paper): it is set if and only if 16243d3b0591SJens Wiklander * if s_i == -1; 1625817466cbSJens Wiklander * 1626817466cbSJens Wiklander * Calling conventions: 1627817466cbSJens Wiklander * - x is an array of size d + 1 1628817466cbSJens Wiklander * - w is the size, ie number of teeth, of the comb, and must be between 1629817466cbSJens Wiklander * 2 and 7 (in practice, between 2 and MBEDTLS_ECP_WINDOW_SIZE) 1630817466cbSJens Wiklander * - m is the MPI, expected to be odd and such that bitlength(m) <= w * d 1631817466cbSJens Wiklander * (the result will be incorrect if these assumptions are not satisfied) 1632817466cbSJens Wiklander */ 16333d3b0591SJens Wiklander static void ecp_comb_recode_core( unsigned char x[], size_t d, 1634817466cbSJens Wiklander unsigned char w, const mbedtls_mpi *m ) 1635817466cbSJens Wiklander { 1636817466cbSJens Wiklander size_t i, j; 1637817466cbSJens Wiklander unsigned char c, cc, adjust; 1638817466cbSJens Wiklander 1639817466cbSJens Wiklander memset( x, 0, d+1 ); 1640817466cbSJens Wiklander 1641817466cbSJens Wiklander /* First get the classical comb values (except for x_d = 0) */ 1642817466cbSJens Wiklander for( i = 0; i < d; i++ ) 1643817466cbSJens Wiklander for( j = 0; j < w; j++ ) 1644817466cbSJens Wiklander x[i] |= mbedtls_mpi_get_bit( m, i + d * j ) << j; 1645817466cbSJens Wiklander 1646817466cbSJens Wiklander /* Now make sure x_1 .. x_d are odd */ 1647817466cbSJens Wiklander c = 0; 1648817466cbSJens Wiklander for( i = 1; i <= d; i++ ) 1649817466cbSJens Wiklander { 1650817466cbSJens Wiklander /* Add carry and update it */ 1651817466cbSJens Wiklander cc = x[i] & c; 1652817466cbSJens Wiklander x[i] = x[i] ^ c; 1653817466cbSJens Wiklander c = cc; 1654817466cbSJens Wiklander 1655817466cbSJens Wiklander /* Adjust if needed, avoiding branches */ 1656817466cbSJens Wiklander adjust = 1 - ( x[i] & 0x01 ); 1657817466cbSJens Wiklander c |= x[i] & ( x[i-1] * adjust ); 1658817466cbSJens Wiklander x[i] = x[i] ^ ( x[i-1] * adjust ); 1659817466cbSJens Wiklander x[i-1] |= adjust << 7; 1660817466cbSJens Wiklander } 1661817466cbSJens Wiklander } 1662817466cbSJens Wiklander 1663817466cbSJens Wiklander /* 16643d3b0591SJens Wiklander * Precompute points for the adapted comb method 1665817466cbSJens Wiklander * 16663d3b0591SJens Wiklander * Assumption: T must be able to hold 2^{w - 1} elements. 1667817466cbSJens Wiklander * 16683d3b0591SJens Wiklander * Operation: If i = i_{w-1} ... i_1 is the binary representation of i, 16693d3b0591SJens Wiklander * sets T[i] = i_{w-1} 2^{(w-1)d} P + ... + i_1 2^d P + P. 1670817466cbSJens Wiklander * 1671817466cbSJens Wiklander * Cost: d(w-1) D + (2^{w-1} - 1) A + 1 N(w-1) + 1 N(2^{w-1} - 1) 16723d3b0591SJens Wiklander * 16733d3b0591SJens Wiklander * Note: Even comb values (those where P would be omitted from the 16743d3b0591SJens Wiklander * sum defining T[i] above) are not needed in our adaption 16753d3b0591SJens Wiklander * the comb method. See ecp_comb_recode_core(). 16763d3b0591SJens Wiklander * 16773d3b0591SJens Wiklander * This function currently works in four steps: 16783d3b0591SJens Wiklander * (1) [dbl] Computation of intermediate T[i] for 2-power values of i 16793d3b0591SJens Wiklander * (2) [norm_dbl] Normalization of coordinates of these T[i] 16803d3b0591SJens Wiklander * (3) [add] Computation of all T[i] 16813d3b0591SJens Wiklander * (4) [norm_add] Normalization of all T[i] 16823d3b0591SJens Wiklander * 16833d3b0591SJens Wiklander * Step 1 can be interrupted but not the others; together with the final 16843d3b0591SJens Wiklander * coordinate normalization they are the largest steps done at once, depending 16853d3b0591SJens Wiklander * on the window size. Here are operation counts for P-256: 16863d3b0591SJens Wiklander * 16873d3b0591SJens Wiklander * step (2) (3) (4) 16883d3b0591SJens Wiklander * w = 5 142 165 208 16893d3b0591SJens Wiklander * w = 4 136 77 160 16903d3b0591SJens Wiklander * w = 3 130 33 136 16913d3b0591SJens Wiklander * w = 2 124 11 124 16923d3b0591SJens Wiklander * 16933d3b0591SJens Wiklander * So if ECC operations are blocking for too long even with a low max_ops 16943d3b0591SJens Wiklander * value, it's useful to set MBEDTLS_ECP_WINDOW_SIZE to a lower value in order 16953d3b0591SJens Wiklander * to minimize maximum blocking time. 1696817466cbSJens Wiklander */ 1697817466cbSJens Wiklander static int ecp_precompute_comb( const mbedtls_ecp_group *grp, 1698817466cbSJens Wiklander mbedtls_ecp_point T[], const mbedtls_ecp_point *P, 16993d3b0591SJens Wiklander unsigned char w, size_t d, 17003d3b0591SJens Wiklander mbedtls_ecp_restart_ctx *rs_ctx ) 1701817466cbSJens Wiklander { 170211fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 17033d3b0591SJens Wiklander unsigned char i; 17043d3b0591SJens Wiklander size_t j = 0; 17053d3b0591SJens Wiklander const unsigned char T_size = 1U << ( w - 1 ); 1706817466cbSJens Wiklander mbedtls_ecp_point *cur, *TT[COMB_MAX_PRE - 1]; 1707817466cbSJens Wiklander 17083d3b0591SJens Wiklander #if defined(MBEDTLS_ECP_RESTARTABLE) 17093d3b0591SJens Wiklander if( rs_ctx != NULL && rs_ctx->rsm != NULL ) 17103d3b0591SJens Wiklander { 17113d3b0591SJens Wiklander if( rs_ctx->rsm->state == ecp_rsm_pre_dbl ) 17123d3b0591SJens Wiklander goto dbl; 17133d3b0591SJens Wiklander if( rs_ctx->rsm->state == ecp_rsm_pre_norm_dbl ) 17143d3b0591SJens Wiklander goto norm_dbl; 17153d3b0591SJens Wiklander if( rs_ctx->rsm->state == ecp_rsm_pre_add ) 17163d3b0591SJens Wiklander goto add; 17173d3b0591SJens Wiklander if( rs_ctx->rsm->state == ecp_rsm_pre_norm_add ) 17183d3b0591SJens Wiklander goto norm_add; 17193d3b0591SJens Wiklander } 17203d3b0591SJens Wiklander #else 17213d3b0591SJens Wiklander (void) rs_ctx; 17223d3b0591SJens Wiklander #endif 17233d3b0591SJens Wiklander 17243d3b0591SJens Wiklander #if defined(MBEDTLS_ECP_RESTARTABLE) 17253d3b0591SJens Wiklander if( rs_ctx != NULL && rs_ctx->rsm != NULL ) 17263d3b0591SJens Wiklander { 17273d3b0591SJens Wiklander rs_ctx->rsm->state = ecp_rsm_pre_dbl; 17283d3b0591SJens Wiklander 17293d3b0591SJens Wiklander /* initial state for the loop */ 17303d3b0591SJens Wiklander rs_ctx->rsm->i = 0; 17313d3b0591SJens Wiklander } 17323d3b0591SJens Wiklander 17333d3b0591SJens Wiklander dbl: 17343d3b0591SJens Wiklander #endif 1735817466cbSJens Wiklander /* 1736817466cbSJens Wiklander * Set T[0] = P and 1737817466cbSJens Wiklander * T[2^{l-1}] = 2^{dl} P for l = 1 .. w-1 (this is not the final value) 1738817466cbSJens Wiklander */ 1739817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_ecp_copy( &T[0], P ) ); 1740817466cbSJens Wiklander 17413d3b0591SJens Wiklander #if defined(MBEDTLS_ECP_RESTARTABLE) 17423d3b0591SJens Wiklander if( rs_ctx != NULL && rs_ctx->rsm != NULL && rs_ctx->rsm->i != 0 ) 17433d3b0591SJens Wiklander j = rs_ctx->rsm->i; 17443d3b0591SJens Wiklander else 17453d3b0591SJens Wiklander #endif 17463d3b0591SJens Wiklander j = 0; 1747817466cbSJens Wiklander 17483d3b0591SJens Wiklander for( ; j < d * ( w - 1 ); j++ ) 17493d3b0591SJens Wiklander { 17503d3b0591SJens Wiklander MBEDTLS_ECP_BUDGET( MBEDTLS_ECP_OPS_DBL ); 17513d3b0591SJens Wiklander 17523d3b0591SJens Wiklander i = 1U << ( j / d ); 17533d3b0591SJens Wiklander cur = T + i; 17543d3b0591SJens Wiklander 17553d3b0591SJens Wiklander if( j % d == 0 ) 17563d3b0591SJens Wiklander MBEDTLS_MPI_CHK( mbedtls_ecp_copy( cur, T + ( i >> 1 ) ) ); 17573d3b0591SJens Wiklander 17583d3b0591SJens Wiklander MBEDTLS_MPI_CHK( ecp_double_jac( grp, cur, cur ) ); 1759817466cbSJens Wiklander } 1760817466cbSJens Wiklander 17613d3b0591SJens Wiklander #if defined(MBEDTLS_ECP_RESTARTABLE) 17623d3b0591SJens Wiklander if( rs_ctx != NULL && rs_ctx->rsm != NULL ) 17633d3b0591SJens Wiklander rs_ctx->rsm->state = ecp_rsm_pre_norm_dbl; 1764817466cbSJens Wiklander 17653d3b0591SJens Wiklander norm_dbl: 17663d3b0591SJens Wiklander #endif 17673d3b0591SJens Wiklander /* 17683d3b0591SJens Wiklander * Normalize current elements in T. As T has holes, 17693d3b0591SJens Wiklander * use an auxiliary array of pointers to elements in T. 17703d3b0591SJens Wiklander */ 17713d3b0591SJens Wiklander j = 0; 17723d3b0591SJens Wiklander for( i = 1; i < T_size; i <<= 1 ) 17733d3b0591SJens Wiklander TT[j++] = T + i; 17743d3b0591SJens Wiklander 17753d3b0591SJens Wiklander MBEDTLS_ECP_BUDGET( MBEDTLS_ECP_OPS_INV + 6 * j - 2 ); 17763d3b0591SJens Wiklander 17773d3b0591SJens Wiklander MBEDTLS_MPI_CHK( ecp_normalize_jac_many( grp, TT, j ) ); 17783d3b0591SJens Wiklander 17793d3b0591SJens Wiklander #if defined(MBEDTLS_ECP_RESTARTABLE) 17803d3b0591SJens Wiklander if( rs_ctx != NULL && rs_ctx->rsm != NULL ) 17813d3b0591SJens Wiklander rs_ctx->rsm->state = ecp_rsm_pre_add; 17823d3b0591SJens Wiklander 17833d3b0591SJens Wiklander add: 17843d3b0591SJens Wiklander #endif 1785817466cbSJens Wiklander /* 1786817466cbSJens Wiklander * Compute the remaining ones using the minimal number of additions 1787817466cbSJens Wiklander * Be careful to update T[2^l] only after using it! 1788817466cbSJens Wiklander */ 17893d3b0591SJens Wiklander MBEDTLS_ECP_BUDGET( ( T_size - 1 ) * MBEDTLS_ECP_OPS_ADD ); 17903d3b0591SJens Wiklander 17913d3b0591SJens Wiklander for( i = 1; i < T_size; i <<= 1 ) 1792817466cbSJens Wiklander { 1793817466cbSJens Wiklander j = i; 1794817466cbSJens Wiklander while( j-- ) 1795817466cbSJens Wiklander MBEDTLS_MPI_CHK( ecp_add_mixed( grp, &T[i + j], &T[j], &T[i] ) ); 1796817466cbSJens Wiklander } 1797817466cbSJens Wiklander 17983d3b0591SJens Wiklander #if defined(MBEDTLS_ECP_RESTARTABLE) 17993d3b0591SJens Wiklander if( rs_ctx != NULL && rs_ctx->rsm != NULL ) 18003d3b0591SJens Wiklander rs_ctx->rsm->state = ecp_rsm_pre_norm_add; 18013d3b0591SJens Wiklander 18023d3b0591SJens Wiklander norm_add: 18033d3b0591SJens Wiklander #endif 18043d3b0591SJens Wiklander /* 18053d3b0591SJens Wiklander * Normalize final elements in T. Even though there are no holes now, we 18063d3b0591SJens Wiklander * still need the auxiliary array for homogeneity with the previous 18073d3b0591SJens Wiklander * call. Also, skip T[0] which is already normalised, being a copy of P. 18083d3b0591SJens Wiklander */ 18093d3b0591SJens Wiklander for( j = 0; j + 1 < T_size; j++ ) 18103d3b0591SJens Wiklander TT[j] = T + j + 1; 18113d3b0591SJens Wiklander 18123d3b0591SJens Wiklander MBEDTLS_ECP_BUDGET( MBEDTLS_ECP_OPS_INV + 6 * j - 2 ); 18133d3b0591SJens Wiklander 18143d3b0591SJens Wiklander MBEDTLS_MPI_CHK( ecp_normalize_jac_many( grp, TT, j ) ); 1815817466cbSJens Wiklander 1816817466cbSJens Wiklander cleanup: 18173d3b0591SJens Wiklander #if defined(MBEDTLS_ECP_RESTARTABLE) 18183d3b0591SJens Wiklander if( rs_ctx != NULL && rs_ctx->rsm != NULL && 18193d3b0591SJens Wiklander ret == MBEDTLS_ERR_ECP_IN_PROGRESS ) 18203d3b0591SJens Wiklander { 18213d3b0591SJens Wiklander if( rs_ctx->rsm->state == ecp_rsm_pre_dbl ) 18223d3b0591SJens Wiklander rs_ctx->rsm->i = j; 18233d3b0591SJens Wiklander } 18243d3b0591SJens Wiklander #endif 1825817466cbSJens Wiklander 1826817466cbSJens Wiklander return( ret ); 1827817466cbSJens Wiklander } 1828817466cbSJens Wiklander 1829817466cbSJens Wiklander /* 1830817466cbSJens Wiklander * Select precomputed point: R = sign(i) * T[ abs(i) / 2 ] 18313d3b0591SJens Wiklander * 18323d3b0591SJens Wiklander * See ecp_comb_recode_core() for background 1833817466cbSJens Wiklander */ 1834817466cbSJens Wiklander static int ecp_select_comb( const mbedtls_ecp_group *grp, mbedtls_ecp_point *R, 18353d3b0591SJens Wiklander const mbedtls_ecp_point T[], unsigned char T_size, 1836817466cbSJens Wiklander unsigned char i ) 1837817466cbSJens Wiklander { 183811fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 1839817466cbSJens Wiklander unsigned char ii, j; 1840817466cbSJens Wiklander 1841817466cbSJens Wiklander /* Ignore the "sign" bit and scale down */ 1842817466cbSJens Wiklander ii = ( i & 0x7Fu ) >> 1; 1843817466cbSJens Wiklander 1844817466cbSJens Wiklander /* Read the whole table to thwart cache-based timing attacks */ 18453d3b0591SJens Wiklander for( j = 0; j < T_size; j++ ) 1846817466cbSJens Wiklander { 1847817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_safe_cond_assign( &R->X, &T[j].X, j == ii ) ); 1848817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_safe_cond_assign( &R->Y, &T[j].Y, j == ii ) ); 1849817466cbSJens Wiklander } 1850817466cbSJens Wiklander 1851817466cbSJens Wiklander /* Safely invert result if i is "negative" */ 1852817466cbSJens Wiklander MBEDTLS_MPI_CHK( ecp_safe_invert_jac( grp, R, i >> 7 ) ); 1853817466cbSJens Wiklander 1854817466cbSJens Wiklander cleanup: 1855817466cbSJens Wiklander return( ret ); 1856817466cbSJens Wiklander } 1857817466cbSJens Wiklander 1858817466cbSJens Wiklander /* 1859817466cbSJens Wiklander * Core multiplication algorithm for the (modified) comb method. 1860817466cbSJens Wiklander * This part is actually common with the basic comb method (GECC 3.44) 1861817466cbSJens Wiklander * 1862817466cbSJens Wiklander * Cost: d A + d D + 1 R 1863817466cbSJens Wiklander */ 1864817466cbSJens Wiklander static int ecp_mul_comb_core( const mbedtls_ecp_group *grp, mbedtls_ecp_point *R, 18653d3b0591SJens Wiklander const mbedtls_ecp_point T[], unsigned char T_size, 1866817466cbSJens Wiklander const unsigned char x[], size_t d, 1867817466cbSJens Wiklander int (*f_rng)(void *, unsigned char *, size_t), 18683d3b0591SJens Wiklander void *p_rng, 18693d3b0591SJens Wiklander mbedtls_ecp_restart_ctx *rs_ctx ) 1870817466cbSJens Wiklander { 187111fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 1872817466cbSJens Wiklander mbedtls_ecp_point Txi; 1873817466cbSJens Wiklander size_t i; 1874817466cbSJens Wiklander 1875817466cbSJens Wiklander mbedtls_ecp_point_init( &Txi ); 1876817466cbSJens Wiklander 18773d3b0591SJens Wiklander #if !defined(MBEDTLS_ECP_RESTARTABLE) 18783d3b0591SJens Wiklander (void) rs_ctx; 18793d3b0591SJens Wiklander #endif 18803d3b0591SJens Wiklander 18813d3b0591SJens Wiklander #if defined(MBEDTLS_ECP_RESTARTABLE) 18823d3b0591SJens Wiklander if( rs_ctx != NULL && rs_ctx->rsm != NULL && 18833d3b0591SJens Wiklander rs_ctx->rsm->state != ecp_rsm_comb_core ) 18843d3b0591SJens Wiklander { 18853d3b0591SJens Wiklander rs_ctx->rsm->i = 0; 18863d3b0591SJens Wiklander rs_ctx->rsm->state = ecp_rsm_comb_core; 18873d3b0591SJens Wiklander } 18883d3b0591SJens Wiklander 18893d3b0591SJens Wiklander /* new 'if' instead of nested for the sake of the 'else' branch */ 18903d3b0591SJens Wiklander if( rs_ctx != NULL && rs_ctx->rsm != NULL && rs_ctx->rsm->i != 0 ) 18913d3b0591SJens Wiklander { 18923d3b0591SJens Wiklander /* restore current index (R already pointing to rs_ctx->rsm->R) */ 18933d3b0591SJens Wiklander i = rs_ctx->rsm->i; 18943d3b0591SJens Wiklander } 18953d3b0591SJens Wiklander else 18963d3b0591SJens Wiklander #endif 18973d3b0591SJens Wiklander { 1898817466cbSJens Wiklander /* Start with a non-zero point and randomize its coordinates */ 1899817466cbSJens Wiklander i = d; 19003d3b0591SJens Wiklander MBEDTLS_MPI_CHK( ecp_select_comb( grp, R, T, T_size, x[i] ) ); 1901817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_lset( &R->Z, 1 ) ); 1902817466cbSJens Wiklander if( f_rng != 0 ) 1903817466cbSJens Wiklander MBEDTLS_MPI_CHK( ecp_randomize_jac( grp, R, f_rng, p_rng ) ); 19043d3b0591SJens Wiklander } 1905817466cbSJens Wiklander 19063d3b0591SJens Wiklander while( i != 0 ) 1907817466cbSJens Wiklander { 19083d3b0591SJens Wiklander MBEDTLS_ECP_BUDGET( MBEDTLS_ECP_OPS_DBL + MBEDTLS_ECP_OPS_ADD ); 19093d3b0591SJens Wiklander --i; 19103d3b0591SJens Wiklander 1911817466cbSJens Wiklander MBEDTLS_MPI_CHK( ecp_double_jac( grp, R, R ) ); 19123d3b0591SJens Wiklander MBEDTLS_MPI_CHK( ecp_select_comb( grp, &Txi, T, T_size, x[i] ) ); 1913817466cbSJens Wiklander MBEDTLS_MPI_CHK( ecp_add_mixed( grp, R, R, &Txi ) ); 1914817466cbSJens Wiklander } 1915817466cbSJens Wiklander 1916817466cbSJens Wiklander cleanup: 1917817466cbSJens Wiklander 1918817466cbSJens Wiklander mbedtls_ecp_point_free( &Txi ); 1919817466cbSJens Wiklander 19203d3b0591SJens Wiklander #if defined(MBEDTLS_ECP_RESTARTABLE) 19213d3b0591SJens Wiklander if( rs_ctx != NULL && rs_ctx->rsm != NULL && 19223d3b0591SJens Wiklander ret == MBEDTLS_ERR_ECP_IN_PROGRESS ) 19233d3b0591SJens Wiklander { 19243d3b0591SJens Wiklander rs_ctx->rsm->i = i; 19253d3b0591SJens Wiklander /* no need to save R, already pointing to rs_ctx->rsm->R */ 19263d3b0591SJens Wiklander } 19273d3b0591SJens Wiklander #endif 19283d3b0591SJens Wiklander 1929817466cbSJens Wiklander return( ret ); 1930817466cbSJens Wiklander } 1931817466cbSJens Wiklander 1932817466cbSJens Wiklander /* 19333d3b0591SJens Wiklander * Recode the scalar to get constant-time comb multiplication 19343d3b0591SJens Wiklander * 19353d3b0591SJens Wiklander * As the actual scalar recoding needs an odd scalar as a starting point, 19363d3b0591SJens Wiklander * this wrapper ensures that by replacing m by N - m if necessary, and 19373d3b0591SJens Wiklander * informs the caller that the result of multiplication will be negated. 19383d3b0591SJens Wiklander * 19393d3b0591SJens Wiklander * This works because we only support large prime order for Short Weierstrass 19403d3b0591SJens Wiklander * curves, so N is always odd hence either m or N - m is. 19413d3b0591SJens Wiklander * 19423d3b0591SJens Wiklander * See ecp_comb_recode_core() for background. 1943817466cbSJens Wiklander */ 19443d3b0591SJens Wiklander static int ecp_comb_recode_scalar( const mbedtls_ecp_group *grp, 19453d3b0591SJens Wiklander const mbedtls_mpi *m, 19463d3b0591SJens Wiklander unsigned char k[COMB_MAX_D + 1], 19473d3b0591SJens Wiklander size_t d, 19483d3b0591SJens Wiklander unsigned char w, 19493d3b0591SJens Wiklander unsigned char *parity_trick ) 1950817466cbSJens Wiklander { 195111fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 1952817466cbSJens Wiklander mbedtls_mpi M, mm; 1953817466cbSJens Wiklander 1954817466cbSJens Wiklander mbedtls_mpi_init( &M ); 1955817466cbSJens Wiklander mbedtls_mpi_init( &mm ); 1956817466cbSJens Wiklander 19573d3b0591SJens Wiklander /* N is always odd (see above), just make extra sure */ 1958817466cbSJens Wiklander if( mbedtls_mpi_get_bit( &grp->N, 0 ) != 1 ) 1959817466cbSJens Wiklander return( MBEDTLS_ERR_ECP_BAD_INPUT_DATA ); 1960817466cbSJens Wiklander 19613d3b0591SJens Wiklander /* do we need the parity trick? */ 19623d3b0591SJens Wiklander *parity_trick = ( mbedtls_mpi_get_bit( m, 0 ) == 0 ); 19633d3b0591SJens Wiklander 19643d3b0591SJens Wiklander /* execute parity fix in constant time */ 19653d3b0591SJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_copy( &M, m ) ); 19663d3b0591SJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_sub_mpi( &mm, &grp->N, m ) ); 19673d3b0591SJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_safe_cond_assign( &M, &mm, *parity_trick ) ); 19683d3b0591SJens Wiklander 19693d3b0591SJens Wiklander /* actual scalar recoding */ 19703d3b0591SJens Wiklander ecp_comb_recode_core( k, d, w, &M ); 19713d3b0591SJens Wiklander 19723d3b0591SJens Wiklander cleanup: 19733d3b0591SJens Wiklander mbedtls_mpi_free( &mm ); 19743d3b0591SJens Wiklander mbedtls_mpi_free( &M ); 19753d3b0591SJens Wiklander 19763d3b0591SJens Wiklander return( ret ); 19773d3b0591SJens Wiklander } 19783d3b0591SJens Wiklander 19793d3b0591SJens Wiklander /* 19803d3b0591SJens Wiklander * Perform comb multiplication (for short Weierstrass curves) 19813d3b0591SJens Wiklander * once the auxiliary table has been pre-computed. 19823d3b0591SJens Wiklander * 19833d3b0591SJens Wiklander * Scalar recoding may use a parity trick that makes us compute -m * P, 19843d3b0591SJens Wiklander * if that is the case we'll need to recover m * P at the end. 19853d3b0591SJens Wiklander */ 19863d3b0591SJens Wiklander static int ecp_mul_comb_after_precomp( const mbedtls_ecp_group *grp, 19873d3b0591SJens Wiklander mbedtls_ecp_point *R, 19883d3b0591SJens Wiklander const mbedtls_mpi *m, 19893d3b0591SJens Wiklander const mbedtls_ecp_point *T, 19903d3b0591SJens Wiklander unsigned char T_size, 19913d3b0591SJens Wiklander unsigned char w, 19923d3b0591SJens Wiklander size_t d, 19933d3b0591SJens Wiklander int (*f_rng)(void *, unsigned char *, size_t), 19943d3b0591SJens Wiklander void *p_rng, 19953d3b0591SJens Wiklander mbedtls_ecp_restart_ctx *rs_ctx ) 19963d3b0591SJens Wiklander { 199711fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 19983d3b0591SJens Wiklander unsigned char parity_trick; 19993d3b0591SJens Wiklander unsigned char k[COMB_MAX_D + 1]; 20003d3b0591SJens Wiklander mbedtls_ecp_point *RR = R; 20013d3b0591SJens Wiklander 20023d3b0591SJens Wiklander #if defined(MBEDTLS_ECP_RESTARTABLE) 20033d3b0591SJens Wiklander if( rs_ctx != NULL && rs_ctx->rsm != NULL ) 20043d3b0591SJens Wiklander { 20053d3b0591SJens Wiklander RR = &rs_ctx->rsm->R; 20063d3b0591SJens Wiklander 20073d3b0591SJens Wiklander if( rs_ctx->rsm->state == ecp_rsm_final_norm ) 20083d3b0591SJens Wiklander goto final_norm; 20093d3b0591SJens Wiklander } 20103d3b0591SJens Wiklander #endif 20113d3b0591SJens Wiklander 20123d3b0591SJens Wiklander MBEDTLS_MPI_CHK( ecp_comb_recode_scalar( grp, m, k, d, w, 20133d3b0591SJens Wiklander &parity_trick ) ); 20143d3b0591SJens Wiklander MBEDTLS_MPI_CHK( ecp_mul_comb_core( grp, RR, T, T_size, k, d, 20153d3b0591SJens Wiklander f_rng, p_rng, rs_ctx ) ); 20163d3b0591SJens Wiklander MBEDTLS_MPI_CHK( ecp_safe_invert_jac( grp, RR, parity_trick ) ); 20173d3b0591SJens Wiklander 20183d3b0591SJens Wiklander #if defined(MBEDTLS_ECP_RESTARTABLE) 20193d3b0591SJens Wiklander if( rs_ctx != NULL && rs_ctx->rsm != NULL ) 20203d3b0591SJens Wiklander rs_ctx->rsm->state = ecp_rsm_final_norm; 20213d3b0591SJens Wiklander 20223d3b0591SJens Wiklander final_norm: 20233d3b0591SJens Wiklander #endif 202411fa71b9SJerome Forissier /* 202511fa71b9SJerome Forissier * Knowledge of the jacobian coordinates may leak the last few bits of the 202611fa71b9SJerome Forissier * scalar [1], and since our MPI implementation isn't constant-flow, 202711fa71b9SJerome Forissier * inversion (used for coordinate normalization) may leak the full value 202811fa71b9SJerome Forissier * of its input via side-channels [2]. 202911fa71b9SJerome Forissier * 203011fa71b9SJerome Forissier * [1] https://eprint.iacr.org/2003/191 203111fa71b9SJerome Forissier * [2] https://eprint.iacr.org/2020/055 203211fa71b9SJerome Forissier * 203311fa71b9SJerome Forissier * Avoid the leak by randomizing coordinates before we normalize them. 203411fa71b9SJerome Forissier */ 203511fa71b9SJerome Forissier if( f_rng != 0 ) 203611fa71b9SJerome Forissier MBEDTLS_MPI_CHK( ecp_randomize_jac( grp, RR, f_rng, p_rng ) ); 203711fa71b9SJerome Forissier 20383d3b0591SJens Wiklander MBEDTLS_ECP_BUDGET( MBEDTLS_ECP_OPS_INV ); 20393d3b0591SJens Wiklander MBEDTLS_MPI_CHK( ecp_normalize_jac( grp, RR ) ); 20403d3b0591SJens Wiklander 20413d3b0591SJens Wiklander #if defined(MBEDTLS_ECP_RESTARTABLE) 20423d3b0591SJens Wiklander if( rs_ctx != NULL && rs_ctx->rsm != NULL ) 20433d3b0591SJens Wiklander MBEDTLS_MPI_CHK( mbedtls_ecp_copy( R, RR ) ); 20443d3b0591SJens Wiklander #endif 20453d3b0591SJens Wiklander 20463d3b0591SJens Wiklander cleanup: 20473d3b0591SJens Wiklander return( ret ); 20483d3b0591SJens Wiklander } 20493d3b0591SJens Wiklander 20503d3b0591SJens Wiklander /* 20513d3b0591SJens Wiklander * Pick window size based on curve size and whether we optimize for base point 20523d3b0591SJens Wiklander */ 20533d3b0591SJens Wiklander static unsigned char ecp_pick_window_size( const mbedtls_ecp_group *grp, 20543d3b0591SJens Wiklander unsigned char p_eq_g ) 20553d3b0591SJens Wiklander { 20563d3b0591SJens Wiklander unsigned char w; 20573d3b0591SJens Wiklander 2058817466cbSJens Wiklander /* 2059817466cbSJens Wiklander * Minimize the number of multiplications, that is minimize 2060817466cbSJens Wiklander * 10 * d * w + 18 * 2^(w-1) + 11 * d + 7 * w, with d = ceil( nbits / w ) 2061817466cbSJens Wiklander * (see costs of the various parts, with 1S = 1M) 2062817466cbSJens Wiklander */ 2063817466cbSJens Wiklander w = grp->nbits >= 384 ? 5 : 4; 2064817466cbSJens Wiklander 2065817466cbSJens Wiklander /* 2066817466cbSJens Wiklander * If P == G, pre-compute a bit more, since this may be re-used later. 2067817466cbSJens Wiklander * Just adding one avoids upping the cost of the first mul too much, 2068817466cbSJens Wiklander * and the memory cost too. 2069817466cbSJens Wiklander */ 2070817466cbSJens Wiklander if( p_eq_g ) 2071817466cbSJens Wiklander w++; 2072817466cbSJens Wiklander 2073817466cbSJens Wiklander /* 2074817466cbSJens Wiklander * Make sure w is within bounds. 2075817466cbSJens Wiklander * (The last test is useful only for very small curves in the test suite.) 2076817466cbSJens Wiklander */ 207711fa71b9SJerome Forissier #if( MBEDTLS_ECP_WINDOW_SIZE < 6 ) 2078817466cbSJens Wiklander if( w > MBEDTLS_ECP_WINDOW_SIZE ) 2079817466cbSJens Wiklander w = MBEDTLS_ECP_WINDOW_SIZE; 208011fa71b9SJerome Forissier #endif 2081817466cbSJens Wiklander if( w >= grp->nbits ) 2082817466cbSJens Wiklander w = 2; 2083817466cbSJens Wiklander 20843d3b0591SJens Wiklander return( w ); 20853d3b0591SJens Wiklander } 2086817466cbSJens Wiklander 2087817466cbSJens Wiklander /* 20883d3b0591SJens Wiklander * Multiplication using the comb method - for curves in short Weierstrass form 20893d3b0591SJens Wiklander * 20903d3b0591SJens Wiklander * This function is mainly responsible for administrative work: 20913d3b0591SJens Wiklander * - managing the restart context if enabled 20923d3b0591SJens Wiklander * - managing the table of precomputed points (passed between the below two 20933d3b0591SJens Wiklander * functions): allocation, computation, ownership tranfer, freeing. 20943d3b0591SJens Wiklander * 20953d3b0591SJens Wiklander * It delegates the actual arithmetic work to: 20963d3b0591SJens Wiklander * ecp_precompute_comb() and ecp_mul_comb_with_precomp() 20973d3b0591SJens Wiklander * 20983d3b0591SJens Wiklander * See comments on ecp_comb_recode_core() regarding the computation strategy. 2099817466cbSJens Wiklander */ 21003d3b0591SJens Wiklander static int ecp_mul_comb( mbedtls_ecp_group *grp, mbedtls_ecp_point *R, 21013d3b0591SJens Wiklander const mbedtls_mpi *m, const mbedtls_ecp_point *P, 21023d3b0591SJens Wiklander int (*f_rng)(void *, unsigned char *, size_t), 21033d3b0591SJens Wiklander void *p_rng, 21043d3b0591SJens Wiklander mbedtls_ecp_restart_ctx *rs_ctx ) 2105817466cbSJens Wiklander { 210611fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 21073d3b0591SJens Wiklander unsigned char w, p_eq_g, i; 21083d3b0591SJens Wiklander size_t d; 21093d3b0591SJens Wiklander unsigned char T_size, T_ok; 21103d3b0591SJens Wiklander mbedtls_ecp_point *T; 21113d3b0591SJens Wiklander 21123d3b0591SJens Wiklander ECP_RS_ENTER( rsm ); 21133d3b0591SJens Wiklander 21143d3b0591SJens Wiklander /* Is P the base point ? */ 21153d3b0591SJens Wiklander #if MBEDTLS_ECP_FIXED_POINT_OPTIM == 1 21163d3b0591SJens Wiklander p_eq_g = ( mbedtls_mpi_cmp_mpi( &P->Y, &grp->G.Y ) == 0 && 21173d3b0591SJens Wiklander mbedtls_mpi_cmp_mpi( &P->X, &grp->G.X ) == 0 ); 21183d3b0591SJens Wiklander #else 21193d3b0591SJens Wiklander p_eq_g = 0; 21203d3b0591SJens Wiklander #endif 21213d3b0591SJens Wiklander 21223d3b0591SJens Wiklander /* Pick window size and deduce related sizes */ 21233d3b0591SJens Wiklander w = ecp_pick_window_size( grp, p_eq_g ); 21243d3b0591SJens Wiklander T_size = 1U << ( w - 1 ); 21253d3b0591SJens Wiklander d = ( grp->nbits + w - 1 ) / w; 21263d3b0591SJens Wiklander 21273d3b0591SJens Wiklander /* Pre-computed table: do we have it already for the base point? */ 21283d3b0591SJens Wiklander if( p_eq_g && grp->T != NULL ) 21293d3b0591SJens Wiklander { 21303d3b0591SJens Wiklander /* second pointer to the same table, will be deleted on exit */ 21313d3b0591SJens Wiklander T = grp->T; 21323d3b0591SJens Wiklander T_ok = 1; 21333d3b0591SJens Wiklander } 21343d3b0591SJens Wiklander else 21353d3b0591SJens Wiklander #if defined(MBEDTLS_ECP_RESTARTABLE) 21363d3b0591SJens Wiklander /* Pre-computed table: do we have one in progress? complete? */ 21373d3b0591SJens Wiklander if( rs_ctx != NULL && rs_ctx->rsm != NULL && rs_ctx->rsm->T != NULL ) 21383d3b0591SJens Wiklander { 21393d3b0591SJens Wiklander /* transfer ownership of T from rsm to local function */ 21403d3b0591SJens Wiklander T = rs_ctx->rsm->T; 21413d3b0591SJens Wiklander rs_ctx->rsm->T = NULL; 21423d3b0591SJens Wiklander rs_ctx->rsm->T_size = 0; 21433d3b0591SJens Wiklander 21443d3b0591SJens Wiklander /* This effectively jumps to the call to mul_comb_after_precomp() */ 21453d3b0591SJens Wiklander T_ok = rs_ctx->rsm->state >= ecp_rsm_comb_core; 21463d3b0591SJens Wiklander } 21473d3b0591SJens Wiklander else 21483d3b0591SJens Wiklander #endif 21493d3b0591SJens Wiklander /* Allocate table if we didn't have any */ 21503d3b0591SJens Wiklander { 21513d3b0591SJens Wiklander T = mbedtls_calloc( T_size, sizeof( mbedtls_ecp_point ) ); 2152817466cbSJens Wiklander if( T == NULL ) 2153817466cbSJens Wiklander { 2154817466cbSJens Wiklander ret = MBEDTLS_ERR_ECP_ALLOC_FAILED; 2155817466cbSJens Wiklander goto cleanup; 2156817466cbSJens Wiklander } 2157817466cbSJens Wiklander 21583d3b0591SJens Wiklander for( i = 0; i < T_size; i++ ) 21593d3b0591SJens Wiklander mbedtls_ecp_point_init( &T[i] ); 21603d3b0591SJens Wiklander 21613d3b0591SJens Wiklander T_ok = 0; 21623d3b0591SJens Wiklander } 21633d3b0591SJens Wiklander 21643d3b0591SJens Wiklander /* Compute table (or finish computing it) if not done already */ 21653d3b0591SJens Wiklander if( !T_ok ) 21663d3b0591SJens Wiklander { 21673d3b0591SJens Wiklander MBEDTLS_MPI_CHK( ecp_precompute_comb( grp, T, P, w, d, rs_ctx ) ); 2168817466cbSJens Wiklander 2169817466cbSJens Wiklander if( p_eq_g ) 2170817466cbSJens Wiklander { 21713d3b0591SJens Wiklander /* almost transfer ownership of T to the group, but keep a copy of 21723d3b0591SJens Wiklander * the pointer to use for calling the next function more easily */ 2173817466cbSJens Wiklander grp->T = T; 21743d3b0591SJens Wiklander grp->T_size = T_size; 2175817466cbSJens Wiklander } 2176817466cbSJens Wiklander } 2177817466cbSJens Wiklander 21783d3b0591SJens Wiklander /* Actual comb multiplication using precomputed points */ 21793d3b0591SJens Wiklander MBEDTLS_MPI_CHK( ecp_mul_comb_after_precomp( grp, R, m, 21803d3b0591SJens Wiklander T, T_size, w, d, 21813d3b0591SJens Wiklander f_rng, p_rng, rs_ctx ) ); 2182817466cbSJens Wiklander 2183817466cbSJens Wiklander cleanup: 2184817466cbSJens Wiklander 21853d3b0591SJens Wiklander /* does T belong to the group? */ 21863d3b0591SJens Wiklander if( T == grp->T ) 21873d3b0591SJens Wiklander T = NULL; 21883d3b0591SJens Wiklander 21893d3b0591SJens Wiklander /* does T belong to the restart context? */ 21903d3b0591SJens Wiklander #if defined(MBEDTLS_ECP_RESTARTABLE) 21913d3b0591SJens Wiklander if( rs_ctx != NULL && rs_ctx->rsm != NULL && ret == MBEDTLS_ERR_ECP_IN_PROGRESS && T != NULL ) 2192817466cbSJens Wiklander { 21933d3b0591SJens Wiklander /* transfer ownership of T from local function to rsm */ 21943d3b0591SJens Wiklander rs_ctx->rsm->T_size = T_size; 21953d3b0591SJens Wiklander rs_ctx->rsm->T = T; 21963d3b0591SJens Wiklander T = NULL; 21973d3b0591SJens Wiklander } 21983d3b0591SJens Wiklander #endif 21993d3b0591SJens Wiklander 22003d3b0591SJens Wiklander /* did T belong to us? then let's destroy it! */ 22013d3b0591SJens Wiklander if( T != NULL ) 22023d3b0591SJens Wiklander { 22033d3b0591SJens Wiklander for( i = 0; i < T_size; i++ ) 2204817466cbSJens Wiklander mbedtls_ecp_point_free( &T[i] ); 2205817466cbSJens Wiklander mbedtls_free( T ); 2206817466cbSJens Wiklander } 2207817466cbSJens Wiklander 22083d3b0591SJens Wiklander /* don't free R while in progress in case R == P */ 22093d3b0591SJens Wiklander #if defined(MBEDTLS_ECP_RESTARTABLE) 22103d3b0591SJens Wiklander if( ret != MBEDTLS_ERR_ECP_IN_PROGRESS ) 22113d3b0591SJens Wiklander #endif 22123d3b0591SJens Wiklander /* prevent caller from using invalid value */ 2213817466cbSJens Wiklander if( ret != 0 ) 2214817466cbSJens Wiklander mbedtls_ecp_point_free( R ); 2215817466cbSJens Wiklander 22163d3b0591SJens Wiklander ECP_RS_LEAVE( rsm ); 22173d3b0591SJens Wiklander 2218817466cbSJens Wiklander return( ret ); 2219817466cbSJens Wiklander } 2220817466cbSJens Wiklander 2221817466cbSJens Wiklander #endif /* ECP_SHORTWEIERSTRASS */ 2222817466cbSJens Wiklander 2223817466cbSJens Wiklander #if defined(ECP_MONTGOMERY) 2224817466cbSJens Wiklander /* 2225817466cbSJens Wiklander * For Montgomery curves, we do all the internal arithmetic in projective 2226817466cbSJens Wiklander * coordinates. Import/export of points uses only the x coordinates, which is 2227817466cbSJens Wiklander * internaly represented as X / Z. 2228817466cbSJens Wiklander * 2229817466cbSJens Wiklander * For scalar multiplication, we'll use a Montgomery ladder. 2230817466cbSJens Wiklander */ 2231817466cbSJens Wiklander 2232817466cbSJens Wiklander /* 2233817466cbSJens Wiklander * Normalize Montgomery x/z coordinates: X = X/Z, Z = 1 2234817466cbSJens Wiklander * Cost: 1M + 1I 2235817466cbSJens Wiklander */ 2236817466cbSJens Wiklander static int ecp_normalize_mxz( const mbedtls_ecp_group *grp, mbedtls_ecp_point *P ) 2237817466cbSJens Wiklander { 223811fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 2239817466cbSJens Wiklander 2240817466cbSJens Wiklander #if defined(MBEDTLS_ECP_NORMALIZE_MXZ_ALT) 2241817466cbSJens Wiklander if( mbedtls_internal_ecp_grp_capable( grp ) ) 22423d3b0591SJens Wiklander return( mbedtls_internal_ecp_normalize_mxz( grp, P ) ); 2243817466cbSJens Wiklander #endif /* MBEDTLS_ECP_NORMALIZE_MXZ_ALT */ 2244817466cbSJens Wiklander 2245817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_inv_mod( &P->Z, &P->Z, &grp->P ) ); 224611fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &P->X, &P->X, &P->Z ) ); 2247817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_lset( &P->Z, 1 ) ); 2248817466cbSJens Wiklander 2249817466cbSJens Wiklander cleanup: 2250817466cbSJens Wiklander return( ret ); 2251817466cbSJens Wiklander } 2252817466cbSJens Wiklander 2253817466cbSJens Wiklander /* 2254817466cbSJens Wiklander * Randomize projective x/z coordinates: 2255817466cbSJens Wiklander * (X, Z) -> (l X, l Z) for random l 2256817466cbSJens Wiklander * This is sort of the reverse operation of ecp_normalize_mxz(). 2257817466cbSJens Wiklander * 2258817466cbSJens Wiklander * This countermeasure was first suggested in [2]. 2259817466cbSJens Wiklander * Cost: 2M 2260817466cbSJens Wiklander */ 2261817466cbSJens Wiklander static int ecp_randomize_mxz( const mbedtls_ecp_group *grp, mbedtls_ecp_point *P, 2262817466cbSJens Wiklander int (*f_rng)(void *, unsigned char *, size_t), void *p_rng ) 2263817466cbSJens Wiklander { 226411fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 2265817466cbSJens Wiklander mbedtls_mpi l; 2266817466cbSJens Wiklander size_t p_size; 2267817466cbSJens Wiklander int count = 0; 2268817466cbSJens Wiklander 2269817466cbSJens Wiklander #if defined(MBEDTLS_ECP_RANDOMIZE_MXZ_ALT) 2270817466cbSJens Wiklander if( mbedtls_internal_ecp_grp_capable( grp ) ) 22713d3b0591SJens Wiklander return( mbedtls_internal_ecp_randomize_mxz( grp, P, f_rng, p_rng ); 2272817466cbSJens Wiklander #endif /* MBEDTLS_ECP_RANDOMIZE_MXZ_ALT */ 2273817466cbSJens Wiklander 2274817466cbSJens Wiklander p_size = ( grp->pbits + 7 ) / 8; 2275817466cbSJens Wiklander mbedtls_mpi_init( &l ); 2276817466cbSJens Wiklander 2277817466cbSJens Wiklander /* Generate l such that 1 < l < p */ 2278817466cbSJens Wiklander do 2279817466cbSJens Wiklander { 2280817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_fill_random( &l, p_size, f_rng, p_rng ) ); 2281817466cbSJens Wiklander 2282817466cbSJens Wiklander while( mbedtls_mpi_cmp_mpi( &l, &grp->P ) >= 0 ) 2283817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_shift_r( &l, 1 ) ); 2284817466cbSJens Wiklander 2285817466cbSJens Wiklander if( count++ > 10 ) 2286817466cbSJens Wiklander return( MBEDTLS_ERR_ECP_RANDOM_FAILED ); 2287817466cbSJens Wiklander } 2288817466cbSJens Wiklander while( mbedtls_mpi_cmp_int( &l, 1 ) <= 0 ); 2289817466cbSJens Wiklander 229011fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &P->X, &P->X, &l ) ); 229111fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &P->Z, &P->Z, &l ) ); 2292817466cbSJens Wiklander 2293817466cbSJens Wiklander cleanup: 2294817466cbSJens Wiklander mbedtls_mpi_free( &l ); 2295817466cbSJens Wiklander 2296817466cbSJens Wiklander return( ret ); 2297817466cbSJens Wiklander } 2298817466cbSJens Wiklander 2299817466cbSJens Wiklander /* 2300817466cbSJens Wiklander * Double-and-add: R = 2P, S = P + Q, with d = X(P - Q), 2301817466cbSJens Wiklander * for Montgomery curves in x/z coordinates. 2302817466cbSJens Wiklander * 2303817466cbSJens Wiklander * http://www.hyperelliptic.org/EFD/g1p/auto-code/montgom/xz/ladder/mladd-1987-m.op3 2304817466cbSJens Wiklander * with 2305817466cbSJens Wiklander * d = X1 2306817466cbSJens Wiklander * P = (X2, Z2) 2307817466cbSJens Wiklander * Q = (X3, Z3) 2308817466cbSJens Wiklander * R = (X4, Z4) 2309817466cbSJens Wiklander * S = (X5, Z5) 2310817466cbSJens Wiklander * and eliminating temporary variables tO, ..., t4. 2311817466cbSJens Wiklander * 2312817466cbSJens Wiklander * Cost: 5M + 4S 2313817466cbSJens Wiklander */ 2314817466cbSJens Wiklander static int ecp_double_add_mxz( const mbedtls_ecp_group *grp, 2315817466cbSJens Wiklander mbedtls_ecp_point *R, mbedtls_ecp_point *S, 2316817466cbSJens Wiklander const mbedtls_ecp_point *P, const mbedtls_ecp_point *Q, 2317817466cbSJens Wiklander const mbedtls_mpi *d ) 2318817466cbSJens Wiklander { 231911fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 2320817466cbSJens Wiklander mbedtls_mpi A, AA, B, BB, E, C, D, DA, CB; 2321817466cbSJens Wiklander 2322817466cbSJens Wiklander #if defined(MBEDTLS_ECP_DOUBLE_ADD_MXZ_ALT) 2323817466cbSJens Wiklander if( mbedtls_internal_ecp_grp_capable( grp ) ) 23243d3b0591SJens Wiklander return( mbedtls_internal_ecp_double_add_mxz( grp, R, S, P, Q, d ) ); 2325817466cbSJens Wiklander #endif /* MBEDTLS_ECP_DOUBLE_ADD_MXZ_ALT */ 2326817466cbSJens Wiklander 2327817466cbSJens Wiklander mbedtls_mpi_init( &A ); mbedtls_mpi_init( &AA ); mbedtls_mpi_init( &B ); 2328817466cbSJens Wiklander mbedtls_mpi_init( &BB ); mbedtls_mpi_init( &E ); mbedtls_mpi_init( &C ); 2329817466cbSJens Wiklander mbedtls_mpi_init( &D ); mbedtls_mpi_init( &DA ); mbedtls_mpi_init( &CB ); 2330817466cbSJens Wiklander 233111fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_add_mod( grp, &A, &P->X, &P->Z ) ); 233211fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &AA, &A, &A ) ); 233311fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_sub_mod( grp, &B, &P->X, &P->Z ) ); 233411fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &BB, &B, &B ) ); 233511fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_sub_mod( grp, &E, &AA, &BB ) ); 233611fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_add_mod( grp, &C, &Q->X, &Q->Z ) ); 233711fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_sub_mod( grp, &D, &Q->X, &Q->Z ) ); 233811fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &DA, &D, &A ) ); 233911fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &CB, &C, &B ) ); 2340817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_add_mpi( &S->X, &DA, &CB ) ); MOD_MUL( S->X ); 234111fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &S->X, &S->X, &S->X ) ); 234211fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_sub_mod( grp, &S->Z, &DA, &CB ) ); 234311fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &S->Z, &S->Z, &S->Z ) ); 234411fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &S->Z, d, &S->Z ) ); 234511fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &R->X, &AA, &BB ) ); 234611fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &R->Z, &grp->A, &E ) ); 234711fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_add_mod( grp, &R->Z, &BB, &R->Z ) ); 234811fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &R->Z, &E, &R->Z ) ); 2349817466cbSJens Wiklander 2350817466cbSJens Wiklander cleanup: 2351817466cbSJens Wiklander mbedtls_mpi_free( &A ); mbedtls_mpi_free( &AA ); mbedtls_mpi_free( &B ); 2352817466cbSJens Wiklander mbedtls_mpi_free( &BB ); mbedtls_mpi_free( &E ); mbedtls_mpi_free( &C ); 2353817466cbSJens Wiklander mbedtls_mpi_free( &D ); mbedtls_mpi_free( &DA ); mbedtls_mpi_free( &CB ); 2354817466cbSJens Wiklander 2355817466cbSJens Wiklander return( ret ); 2356817466cbSJens Wiklander } 2357817466cbSJens Wiklander 2358817466cbSJens Wiklander /* 2359817466cbSJens Wiklander * Multiplication with Montgomery ladder in x/z coordinates, 2360817466cbSJens Wiklander * for curves in Montgomery form 2361817466cbSJens Wiklander */ 2362817466cbSJens Wiklander static int ecp_mul_mxz( mbedtls_ecp_group *grp, mbedtls_ecp_point *R, 2363817466cbSJens Wiklander const mbedtls_mpi *m, const mbedtls_ecp_point *P, 2364817466cbSJens Wiklander int (*f_rng)(void *, unsigned char *, size_t), 2365817466cbSJens Wiklander void *p_rng ) 2366817466cbSJens Wiklander { 236711fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 2368817466cbSJens Wiklander size_t i; 2369817466cbSJens Wiklander unsigned char b; 2370817466cbSJens Wiklander mbedtls_ecp_point RP; 2371817466cbSJens Wiklander mbedtls_mpi PX; 2372817466cbSJens Wiklander 2373817466cbSJens Wiklander mbedtls_ecp_point_init( &RP ); mbedtls_mpi_init( &PX ); 2374817466cbSJens Wiklander 2375817466cbSJens Wiklander /* Save PX and read from P before writing to R, in case P == R */ 2376817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_copy( &PX, &P->X ) ); 2377817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_ecp_copy( &RP, P ) ); 2378817466cbSJens Wiklander 2379817466cbSJens Wiklander /* Set R to zero in modified x/z coordinates */ 2380817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_lset( &R->X, 1 ) ); 2381817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_lset( &R->Z, 0 ) ); 2382817466cbSJens Wiklander mbedtls_mpi_free( &R->Y ); 2383817466cbSJens Wiklander 2384817466cbSJens Wiklander /* RP.X might be sligtly larger than P, so reduce it */ 2385817466cbSJens Wiklander MOD_ADD( RP.X ); 2386817466cbSJens Wiklander 2387817466cbSJens Wiklander /* Randomize coordinates of the starting point */ 2388817466cbSJens Wiklander if( f_rng != NULL ) 2389817466cbSJens Wiklander MBEDTLS_MPI_CHK( ecp_randomize_mxz( grp, &RP, f_rng, p_rng ) ); 2390817466cbSJens Wiklander 2391817466cbSJens Wiklander /* Loop invariant: R = result so far, RP = R + P */ 2392817466cbSJens Wiklander i = mbedtls_mpi_bitlen( m ); /* one past the (zero-based) most significant bit */ 2393817466cbSJens Wiklander while( i-- > 0 ) 2394817466cbSJens Wiklander { 2395817466cbSJens Wiklander b = mbedtls_mpi_get_bit( m, i ); 2396817466cbSJens Wiklander /* 2397817466cbSJens Wiklander * if (b) R = 2R + P else R = 2R, 2398817466cbSJens Wiklander * which is: 2399817466cbSJens Wiklander * if (b) double_add( RP, R, RP, R ) 2400817466cbSJens Wiklander * else double_add( R, RP, R, RP ) 2401817466cbSJens Wiklander * but using safe conditional swaps to avoid leaks 2402817466cbSJens Wiklander */ 2403817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_safe_cond_swap( &R->X, &RP.X, b ) ); 2404817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_safe_cond_swap( &R->Z, &RP.Z, b ) ); 2405817466cbSJens Wiklander MBEDTLS_MPI_CHK( ecp_double_add_mxz( grp, R, &RP, R, &RP, &PX ) ); 2406817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_safe_cond_swap( &R->X, &RP.X, b ) ); 2407817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_safe_cond_swap( &R->Z, &RP.Z, b ) ); 2408817466cbSJens Wiklander } 2409817466cbSJens Wiklander 241011fa71b9SJerome Forissier /* 241111fa71b9SJerome Forissier * Knowledge of the projective coordinates may leak the last few bits of the 241211fa71b9SJerome Forissier * scalar [1], and since our MPI implementation isn't constant-flow, 241311fa71b9SJerome Forissier * inversion (used for coordinate normalization) may leak the full value 241411fa71b9SJerome Forissier * of its input via side-channels [2]. 241511fa71b9SJerome Forissier * 241611fa71b9SJerome Forissier * [1] https://eprint.iacr.org/2003/191 241711fa71b9SJerome Forissier * [2] https://eprint.iacr.org/2020/055 241811fa71b9SJerome Forissier * 241911fa71b9SJerome Forissier * Avoid the leak by randomizing coordinates before we normalize them. 242011fa71b9SJerome Forissier */ 242111fa71b9SJerome Forissier if( f_rng != NULL ) 242211fa71b9SJerome Forissier MBEDTLS_MPI_CHK( ecp_randomize_mxz( grp, R, f_rng, p_rng ) ); 242311fa71b9SJerome Forissier 2424817466cbSJens Wiklander MBEDTLS_MPI_CHK( ecp_normalize_mxz( grp, R ) ); 2425817466cbSJens Wiklander 2426817466cbSJens Wiklander cleanup: 2427817466cbSJens Wiklander mbedtls_ecp_point_free( &RP ); mbedtls_mpi_free( &PX ); 2428817466cbSJens Wiklander 2429817466cbSJens Wiklander return( ret ); 2430817466cbSJens Wiklander } 2431817466cbSJens Wiklander 2432817466cbSJens Wiklander #endif /* ECP_MONTGOMERY */ 2433817466cbSJens Wiklander 2434817466cbSJens Wiklander /* 24353d3b0591SJens Wiklander * Restartable multiplication R = m * P 24363d3b0591SJens Wiklander */ 24373d3b0591SJens Wiklander int mbedtls_ecp_mul_restartable( mbedtls_ecp_group *grp, mbedtls_ecp_point *R, 24383d3b0591SJens Wiklander const mbedtls_mpi *m, const mbedtls_ecp_point *P, 24393d3b0591SJens Wiklander int (*f_rng)(void *, unsigned char *, size_t), void *p_rng, 24403d3b0591SJens Wiklander mbedtls_ecp_restart_ctx *rs_ctx ) 24413d3b0591SJens Wiklander { 24423d3b0591SJens Wiklander int ret = MBEDTLS_ERR_ECP_BAD_INPUT_DATA; 24433d3b0591SJens Wiklander #if defined(MBEDTLS_ECP_INTERNAL_ALT) 24443d3b0591SJens Wiklander char is_grp_capable = 0; 24453d3b0591SJens Wiklander #endif 24463d3b0591SJens Wiklander ECP_VALIDATE_RET( grp != NULL ); 24473d3b0591SJens Wiklander ECP_VALIDATE_RET( R != NULL ); 24483d3b0591SJens Wiklander ECP_VALIDATE_RET( m != NULL ); 24493d3b0591SJens Wiklander ECP_VALIDATE_RET( P != NULL ); 24503d3b0591SJens Wiklander 24513d3b0591SJens Wiklander #if defined(MBEDTLS_ECP_RESTARTABLE) 24523d3b0591SJens Wiklander /* reset ops count for this call if top-level */ 24533d3b0591SJens Wiklander if( rs_ctx != NULL && rs_ctx->depth++ == 0 ) 24543d3b0591SJens Wiklander rs_ctx->ops_done = 0; 24553d3b0591SJens Wiklander #endif 24563d3b0591SJens Wiklander 24573d3b0591SJens Wiklander #if defined(MBEDTLS_ECP_INTERNAL_ALT) 24583d3b0591SJens Wiklander if( ( is_grp_capable = mbedtls_internal_ecp_grp_capable( grp ) ) ) 24593d3b0591SJens Wiklander MBEDTLS_MPI_CHK( mbedtls_internal_ecp_init( grp ) ); 24603d3b0591SJens Wiklander #endif /* MBEDTLS_ECP_INTERNAL_ALT */ 24613d3b0591SJens Wiklander 24623d3b0591SJens Wiklander #if defined(MBEDTLS_ECP_RESTARTABLE) 24633d3b0591SJens Wiklander /* skip argument check when restarting */ 24643d3b0591SJens Wiklander if( rs_ctx == NULL || rs_ctx->rsm == NULL ) 24653d3b0591SJens Wiklander #endif 24663d3b0591SJens Wiklander { 24673d3b0591SJens Wiklander /* check_privkey is free */ 24683d3b0591SJens Wiklander MBEDTLS_ECP_BUDGET( MBEDTLS_ECP_OPS_CHK ); 24693d3b0591SJens Wiklander 24703d3b0591SJens Wiklander /* Common sanity checks */ 24713d3b0591SJens Wiklander MBEDTLS_MPI_CHK( mbedtls_ecp_check_privkey( grp, m ) ); 24723d3b0591SJens Wiklander MBEDTLS_MPI_CHK( mbedtls_ecp_check_pubkey( grp, P ) ); 24733d3b0591SJens Wiklander } 24743d3b0591SJens Wiklander 24753d3b0591SJens Wiklander ret = MBEDTLS_ERR_ECP_BAD_INPUT_DATA; 24763d3b0591SJens Wiklander #if defined(ECP_MONTGOMERY) 247711fa71b9SJerome Forissier if( mbedtls_ecp_get_type( grp ) == MBEDTLS_ECP_TYPE_MONTGOMERY ) 24783d3b0591SJens Wiklander MBEDTLS_MPI_CHK( ecp_mul_mxz( grp, R, m, P, f_rng, p_rng ) ); 24793d3b0591SJens Wiklander #endif 24803d3b0591SJens Wiklander #if defined(ECP_SHORTWEIERSTRASS) 248111fa71b9SJerome Forissier if( mbedtls_ecp_get_type( grp ) == MBEDTLS_ECP_TYPE_SHORT_WEIERSTRASS ) 24823d3b0591SJens Wiklander MBEDTLS_MPI_CHK( ecp_mul_comb( grp, R, m, P, f_rng, p_rng, rs_ctx ) ); 24833d3b0591SJens Wiklander #endif 24843d3b0591SJens Wiklander 24853d3b0591SJens Wiklander cleanup: 24863d3b0591SJens Wiklander 24873d3b0591SJens Wiklander #if defined(MBEDTLS_ECP_INTERNAL_ALT) 24883d3b0591SJens Wiklander if( is_grp_capable ) 24893d3b0591SJens Wiklander mbedtls_internal_ecp_free( grp ); 24903d3b0591SJens Wiklander #endif /* MBEDTLS_ECP_INTERNAL_ALT */ 24913d3b0591SJens Wiklander 24923d3b0591SJens Wiklander #if defined(MBEDTLS_ECP_RESTARTABLE) 24933d3b0591SJens Wiklander if( rs_ctx != NULL ) 24943d3b0591SJens Wiklander rs_ctx->depth--; 24953d3b0591SJens Wiklander #endif 24963d3b0591SJens Wiklander 24973d3b0591SJens Wiklander return( ret ); 24983d3b0591SJens Wiklander } 24993d3b0591SJens Wiklander 25003d3b0591SJens Wiklander /* 2501817466cbSJens Wiklander * Multiplication R = m * P 2502817466cbSJens Wiklander */ 2503817466cbSJens Wiklander int mbedtls_ecp_mul( mbedtls_ecp_group *grp, mbedtls_ecp_point *R, 2504817466cbSJens Wiklander const mbedtls_mpi *m, const mbedtls_ecp_point *P, 2505817466cbSJens Wiklander int (*f_rng)(void *, unsigned char *, size_t), void *p_rng ) 2506817466cbSJens Wiklander { 25073d3b0591SJens Wiklander ECP_VALIDATE_RET( grp != NULL ); 25083d3b0591SJens Wiklander ECP_VALIDATE_RET( R != NULL ); 25093d3b0591SJens Wiklander ECP_VALIDATE_RET( m != NULL ); 25103d3b0591SJens Wiklander ECP_VALIDATE_RET( P != NULL ); 25113d3b0591SJens Wiklander return( mbedtls_ecp_mul_restartable( grp, R, m, P, f_rng, p_rng, NULL ) ); 2512817466cbSJens Wiklander } 2513817466cbSJens Wiklander 2514817466cbSJens Wiklander #if defined(ECP_SHORTWEIERSTRASS) 2515817466cbSJens Wiklander /* 2516817466cbSJens Wiklander * Check that an affine point is valid as a public key, 2517817466cbSJens Wiklander * short weierstrass curves (SEC1 3.2.3.1) 2518817466cbSJens Wiklander */ 2519817466cbSJens Wiklander static int ecp_check_pubkey_sw( const mbedtls_ecp_group *grp, const mbedtls_ecp_point *pt ) 2520817466cbSJens Wiklander { 252111fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 2522817466cbSJens Wiklander mbedtls_mpi YY, RHS; 2523817466cbSJens Wiklander 2524817466cbSJens Wiklander /* pt coordinates must be normalized for our checks */ 2525817466cbSJens Wiklander if( mbedtls_mpi_cmp_int( &pt->X, 0 ) < 0 || 2526817466cbSJens Wiklander mbedtls_mpi_cmp_int( &pt->Y, 0 ) < 0 || 2527817466cbSJens Wiklander mbedtls_mpi_cmp_mpi( &pt->X, &grp->P ) >= 0 || 2528817466cbSJens Wiklander mbedtls_mpi_cmp_mpi( &pt->Y, &grp->P ) >= 0 ) 2529817466cbSJens Wiklander return( MBEDTLS_ERR_ECP_INVALID_KEY ); 2530817466cbSJens Wiklander 2531817466cbSJens Wiklander mbedtls_mpi_init( &YY ); mbedtls_mpi_init( &RHS ); 2532817466cbSJens Wiklander 2533817466cbSJens Wiklander /* 2534817466cbSJens Wiklander * YY = Y^2 2535817466cbSJens Wiklander * RHS = X (X^2 + A) + B = X^3 + A X + B 2536817466cbSJens Wiklander */ 253711fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &YY, &pt->Y, &pt->Y ) ); 253811fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &RHS, &pt->X, &pt->X ) ); 2539817466cbSJens Wiklander 2540817466cbSJens Wiklander /* Special case for A = -3 */ 2541817466cbSJens Wiklander if( grp->A.p == NULL ) 2542817466cbSJens Wiklander { 2543817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_sub_int( &RHS, &RHS, 3 ) ); MOD_SUB( RHS ); 2544817466cbSJens Wiklander } 2545817466cbSJens Wiklander else 2546817466cbSJens Wiklander { 254711fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_add_mod( grp, &RHS, &RHS, &grp->A ) ); 2548817466cbSJens Wiklander } 2549817466cbSJens Wiklander 255011fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mod( grp, &RHS, &RHS, &pt->X ) ); 255111fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_add_mod( grp, &RHS, &RHS, &grp->B ) ); 2552817466cbSJens Wiklander 2553817466cbSJens Wiklander if( mbedtls_mpi_cmp_mpi( &YY, &RHS ) != 0 ) 2554817466cbSJens Wiklander ret = MBEDTLS_ERR_ECP_INVALID_KEY; 2555817466cbSJens Wiklander 2556817466cbSJens Wiklander cleanup: 2557817466cbSJens Wiklander 2558817466cbSJens Wiklander mbedtls_mpi_free( &YY ); mbedtls_mpi_free( &RHS ); 2559817466cbSJens Wiklander 2560817466cbSJens Wiklander return( ret ); 2561817466cbSJens Wiklander } 2562817466cbSJens Wiklander #endif /* ECP_SHORTWEIERSTRASS */ 2563817466cbSJens Wiklander 2564817466cbSJens Wiklander /* 2565817466cbSJens Wiklander * R = m * P with shortcuts for m == 1 and m == -1 2566817466cbSJens Wiklander * NOT constant-time - ONLY for short Weierstrass! 2567817466cbSJens Wiklander */ 2568817466cbSJens Wiklander static int mbedtls_ecp_mul_shortcuts( mbedtls_ecp_group *grp, 2569817466cbSJens Wiklander mbedtls_ecp_point *R, 2570817466cbSJens Wiklander const mbedtls_mpi *m, 25713d3b0591SJens Wiklander const mbedtls_ecp_point *P, 25723d3b0591SJens Wiklander mbedtls_ecp_restart_ctx *rs_ctx ) 2573817466cbSJens Wiklander { 257411fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 2575817466cbSJens Wiklander 2576817466cbSJens Wiklander if( mbedtls_mpi_cmp_int( m, 1 ) == 0 ) 2577817466cbSJens Wiklander { 2578817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_ecp_copy( R, P ) ); 2579817466cbSJens Wiklander } 2580817466cbSJens Wiklander else if( mbedtls_mpi_cmp_int( m, -1 ) == 0 ) 2581817466cbSJens Wiklander { 2582817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_ecp_copy( R, P ) ); 2583817466cbSJens Wiklander if( mbedtls_mpi_cmp_int( &R->Y, 0 ) != 0 ) 2584817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_sub_mpi( &R->Y, &grp->P, &R->Y ) ); 2585817466cbSJens Wiklander } 2586817466cbSJens Wiklander else 2587817466cbSJens Wiklander { 25883d3b0591SJens Wiklander MBEDTLS_MPI_CHK( mbedtls_ecp_mul_restartable( grp, R, m, P, 25893d3b0591SJens Wiklander NULL, NULL, rs_ctx ) ); 2590817466cbSJens Wiklander } 2591817466cbSJens Wiklander 2592817466cbSJens Wiklander cleanup: 2593817466cbSJens Wiklander return( ret ); 2594817466cbSJens Wiklander } 2595817466cbSJens Wiklander 2596817466cbSJens Wiklander /* 25973d3b0591SJens Wiklander * Restartable linear combination 25983d3b0591SJens Wiklander * NOT constant-time 25993d3b0591SJens Wiklander */ 26003d3b0591SJens Wiklander int mbedtls_ecp_muladd_restartable( 26013d3b0591SJens Wiklander mbedtls_ecp_group *grp, mbedtls_ecp_point *R, 26023d3b0591SJens Wiklander const mbedtls_mpi *m, const mbedtls_ecp_point *P, 26033d3b0591SJens Wiklander const mbedtls_mpi *n, const mbedtls_ecp_point *Q, 26043d3b0591SJens Wiklander mbedtls_ecp_restart_ctx *rs_ctx ) 26053d3b0591SJens Wiklander { 260611fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 26073d3b0591SJens Wiklander mbedtls_ecp_point mP; 26083d3b0591SJens Wiklander mbedtls_ecp_point *pmP = &mP; 26093d3b0591SJens Wiklander mbedtls_ecp_point *pR = R; 26103d3b0591SJens Wiklander #if defined(MBEDTLS_ECP_INTERNAL_ALT) 26113d3b0591SJens Wiklander char is_grp_capable = 0; 26123d3b0591SJens Wiklander #endif 26133d3b0591SJens Wiklander ECP_VALIDATE_RET( grp != NULL ); 26143d3b0591SJens Wiklander ECP_VALIDATE_RET( R != NULL ); 26153d3b0591SJens Wiklander ECP_VALIDATE_RET( m != NULL ); 26163d3b0591SJens Wiklander ECP_VALIDATE_RET( P != NULL ); 26173d3b0591SJens Wiklander ECP_VALIDATE_RET( n != NULL ); 26183d3b0591SJens Wiklander ECP_VALIDATE_RET( Q != NULL ); 26193d3b0591SJens Wiklander 262011fa71b9SJerome Forissier if( mbedtls_ecp_get_type( grp ) != MBEDTLS_ECP_TYPE_SHORT_WEIERSTRASS ) 26213d3b0591SJens Wiklander return( MBEDTLS_ERR_ECP_FEATURE_UNAVAILABLE ); 26223d3b0591SJens Wiklander 26233d3b0591SJens Wiklander mbedtls_ecp_point_init( &mP ); 26243d3b0591SJens Wiklander 26253d3b0591SJens Wiklander ECP_RS_ENTER( ma ); 26263d3b0591SJens Wiklander 26273d3b0591SJens Wiklander #if defined(MBEDTLS_ECP_RESTARTABLE) 26283d3b0591SJens Wiklander if( rs_ctx != NULL && rs_ctx->ma != NULL ) 26293d3b0591SJens Wiklander { 26303d3b0591SJens Wiklander /* redirect intermediate results to restart context */ 26313d3b0591SJens Wiklander pmP = &rs_ctx->ma->mP; 26323d3b0591SJens Wiklander pR = &rs_ctx->ma->R; 26333d3b0591SJens Wiklander 26343d3b0591SJens Wiklander /* jump to next operation */ 26353d3b0591SJens Wiklander if( rs_ctx->ma->state == ecp_rsma_mul2 ) 26363d3b0591SJens Wiklander goto mul2; 26373d3b0591SJens Wiklander if( rs_ctx->ma->state == ecp_rsma_add ) 26383d3b0591SJens Wiklander goto add; 26393d3b0591SJens Wiklander if( rs_ctx->ma->state == ecp_rsma_norm ) 26403d3b0591SJens Wiklander goto norm; 26413d3b0591SJens Wiklander } 26423d3b0591SJens Wiklander #endif /* MBEDTLS_ECP_RESTARTABLE */ 26433d3b0591SJens Wiklander 26443d3b0591SJens Wiklander MBEDTLS_MPI_CHK( mbedtls_ecp_mul_shortcuts( grp, pmP, m, P, rs_ctx ) ); 26453d3b0591SJens Wiklander #if defined(MBEDTLS_ECP_RESTARTABLE) 26463d3b0591SJens Wiklander if( rs_ctx != NULL && rs_ctx->ma != NULL ) 26473d3b0591SJens Wiklander rs_ctx->ma->state = ecp_rsma_mul2; 26483d3b0591SJens Wiklander 26493d3b0591SJens Wiklander mul2: 26503d3b0591SJens Wiklander #endif 26513d3b0591SJens Wiklander MBEDTLS_MPI_CHK( mbedtls_ecp_mul_shortcuts( grp, pR, n, Q, rs_ctx ) ); 26523d3b0591SJens Wiklander 26533d3b0591SJens Wiklander #if defined(MBEDTLS_ECP_INTERNAL_ALT) 26543d3b0591SJens Wiklander if( ( is_grp_capable = mbedtls_internal_ecp_grp_capable( grp ) ) ) 26553d3b0591SJens Wiklander MBEDTLS_MPI_CHK( mbedtls_internal_ecp_init( grp ) ); 26563d3b0591SJens Wiklander #endif /* MBEDTLS_ECP_INTERNAL_ALT */ 26573d3b0591SJens Wiklander 26583d3b0591SJens Wiklander #if defined(MBEDTLS_ECP_RESTARTABLE) 26593d3b0591SJens Wiklander if( rs_ctx != NULL && rs_ctx->ma != NULL ) 26603d3b0591SJens Wiklander rs_ctx->ma->state = ecp_rsma_add; 26613d3b0591SJens Wiklander 26623d3b0591SJens Wiklander add: 26633d3b0591SJens Wiklander #endif 26643d3b0591SJens Wiklander MBEDTLS_ECP_BUDGET( MBEDTLS_ECP_OPS_ADD ); 26653d3b0591SJens Wiklander MBEDTLS_MPI_CHK( ecp_add_mixed( grp, pR, pmP, pR ) ); 26663d3b0591SJens Wiklander #if defined(MBEDTLS_ECP_RESTARTABLE) 26673d3b0591SJens Wiklander if( rs_ctx != NULL && rs_ctx->ma != NULL ) 26683d3b0591SJens Wiklander rs_ctx->ma->state = ecp_rsma_norm; 26693d3b0591SJens Wiklander 26703d3b0591SJens Wiklander norm: 26713d3b0591SJens Wiklander #endif 26723d3b0591SJens Wiklander MBEDTLS_ECP_BUDGET( MBEDTLS_ECP_OPS_INV ); 26733d3b0591SJens Wiklander MBEDTLS_MPI_CHK( ecp_normalize_jac( grp, pR ) ); 26743d3b0591SJens Wiklander 26753d3b0591SJens Wiklander #if defined(MBEDTLS_ECP_RESTARTABLE) 26763d3b0591SJens Wiklander if( rs_ctx != NULL && rs_ctx->ma != NULL ) 26773d3b0591SJens Wiklander MBEDTLS_MPI_CHK( mbedtls_ecp_copy( R, pR ) ); 26783d3b0591SJens Wiklander #endif 26793d3b0591SJens Wiklander 26803d3b0591SJens Wiklander cleanup: 26813d3b0591SJens Wiklander #if defined(MBEDTLS_ECP_INTERNAL_ALT) 26823d3b0591SJens Wiklander if( is_grp_capable ) 26833d3b0591SJens Wiklander mbedtls_internal_ecp_free( grp ); 26843d3b0591SJens Wiklander #endif /* MBEDTLS_ECP_INTERNAL_ALT */ 26853d3b0591SJens Wiklander 26863d3b0591SJens Wiklander mbedtls_ecp_point_free( &mP ); 26873d3b0591SJens Wiklander 26883d3b0591SJens Wiklander ECP_RS_LEAVE( ma ); 26893d3b0591SJens Wiklander 26903d3b0591SJens Wiklander return( ret ); 26913d3b0591SJens Wiklander } 26923d3b0591SJens Wiklander 26933d3b0591SJens Wiklander /* 2694817466cbSJens Wiklander * Linear combination 2695817466cbSJens Wiklander * NOT constant-time 2696817466cbSJens Wiklander */ 2697817466cbSJens Wiklander int mbedtls_ecp_muladd( mbedtls_ecp_group *grp, mbedtls_ecp_point *R, 2698817466cbSJens Wiklander const mbedtls_mpi *m, const mbedtls_ecp_point *P, 2699817466cbSJens Wiklander const mbedtls_mpi *n, const mbedtls_ecp_point *Q ) 2700817466cbSJens Wiklander { 27013d3b0591SJens Wiklander ECP_VALIDATE_RET( grp != NULL ); 27023d3b0591SJens Wiklander ECP_VALIDATE_RET( R != NULL ); 27033d3b0591SJens Wiklander ECP_VALIDATE_RET( m != NULL ); 27043d3b0591SJens Wiklander ECP_VALIDATE_RET( P != NULL ); 27053d3b0591SJens Wiklander ECP_VALIDATE_RET( n != NULL ); 27063d3b0591SJens Wiklander ECP_VALIDATE_RET( Q != NULL ); 27073d3b0591SJens Wiklander return( mbedtls_ecp_muladd_restartable( grp, R, m, P, n, Q, NULL ) ); 2708817466cbSJens Wiklander } 2709817466cbSJens Wiklander 2710817466cbSJens Wiklander #if defined(ECP_MONTGOMERY) 2711817466cbSJens Wiklander /* 2712817466cbSJens Wiklander * Check validity of a public key for Montgomery curves with x-only schemes 2713817466cbSJens Wiklander */ 2714817466cbSJens Wiklander static int ecp_check_pubkey_mx( const mbedtls_ecp_group *grp, const mbedtls_ecp_point *pt ) 2715817466cbSJens Wiklander { 2716817466cbSJens Wiklander /* [Curve25519 p. 5] Just check X is the correct number of bytes */ 27173d3b0591SJens Wiklander /* Allow any public value, if it's too big then we'll just reduce it mod p 27183d3b0591SJens Wiklander * (RFC 7748 sec. 5 para. 3). */ 2719817466cbSJens Wiklander if( mbedtls_mpi_size( &pt->X ) > ( grp->nbits + 7 ) / 8 ) 2720817466cbSJens Wiklander return( MBEDTLS_ERR_ECP_INVALID_KEY ); 2721817466cbSJens Wiklander 2722817466cbSJens Wiklander return( 0 ); 2723817466cbSJens Wiklander } 2724817466cbSJens Wiklander #endif /* ECP_MONTGOMERY */ 2725817466cbSJens Wiklander 2726817466cbSJens Wiklander /* 2727817466cbSJens Wiklander * Check that a point is valid as a public key 2728817466cbSJens Wiklander */ 27293d3b0591SJens Wiklander int mbedtls_ecp_check_pubkey( const mbedtls_ecp_group *grp, 27303d3b0591SJens Wiklander const mbedtls_ecp_point *pt ) 2731817466cbSJens Wiklander { 27323d3b0591SJens Wiklander ECP_VALIDATE_RET( grp != NULL ); 27333d3b0591SJens Wiklander ECP_VALIDATE_RET( pt != NULL ); 27343d3b0591SJens Wiklander 2735817466cbSJens Wiklander /* Must use affine coordinates */ 2736817466cbSJens Wiklander if( mbedtls_mpi_cmp_int( &pt->Z, 1 ) != 0 ) 2737817466cbSJens Wiklander return( MBEDTLS_ERR_ECP_INVALID_KEY ); 2738817466cbSJens Wiklander 2739817466cbSJens Wiklander #if defined(ECP_MONTGOMERY) 274011fa71b9SJerome Forissier if( mbedtls_ecp_get_type( grp ) == MBEDTLS_ECP_TYPE_MONTGOMERY ) 2741817466cbSJens Wiklander return( ecp_check_pubkey_mx( grp, pt ) ); 2742817466cbSJens Wiklander #endif 2743817466cbSJens Wiklander #if defined(ECP_SHORTWEIERSTRASS) 274411fa71b9SJerome Forissier if( mbedtls_ecp_get_type( grp ) == MBEDTLS_ECP_TYPE_SHORT_WEIERSTRASS ) 2745817466cbSJens Wiklander return( ecp_check_pubkey_sw( grp, pt ) ); 2746817466cbSJens Wiklander #endif 2747817466cbSJens Wiklander return( MBEDTLS_ERR_ECP_BAD_INPUT_DATA ); 2748817466cbSJens Wiklander } 2749817466cbSJens Wiklander 2750817466cbSJens Wiklander /* 2751817466cbSJens Wiklander * Check that an mbedtls_mpi is valid as a private key 2752817466cbSJens Wiklander */ 27533d3b0591SJens Wiklander int mbedtls_ecp_check_privkey( const mbedtls_ecp_group *grp, 27543d3b0591SJens Wiklander const mbedtls_mpi *d ) 2755817466cbSJens Wiklander { 27563d3b0591SJens Wiklander ECP_VALIDATE_RET( grp != NULL ); 27573d3b0591SJens Wiklander ECP_VALIDATE_RET( d != NULL ); 27583d3b0591SJens Wiklander 2759817466cbSJens Wiklander #if defined(ECP_MONTGOMERY) 276011fa71b9SJerome Forissier if( mbedtls_ecp_get_type( grp ) == MBEDTLS_ECP_TYPE_MONTGOMERY ) 2761817466cbSJens Wiklander { 27623d3b0591SJens Wiklander /* see RFC 7748 sec. 5 para. 5 */ 2763817466cbSJens Wiklander if( mbedtls_mpi_get_bit( d, 0 ) != 0 || 2764817466cbSJens Wiklander mbedtls_mpi_get_bit( d, 1 ) != 0 || 2765817466cbSJens Wiklander mbedtls_mpi_bitlen( d ) - 1 != grp->nbits ) /* mbedtls_mpi_bitlen is one-based! */ 2766817466cbSJens Wiklander return( MBEDTLS_ERR_ECP_INVALID_KEY ); 27673d3b0591SJens Wiklander 27683d3b0591SJens Wiklander /* see [Curve25519] page 5 */ 27693d3b0591SJens Wiklander if( grp->nbits == 254 && mbedtls_mpi_get_bit( d, 2 ) != 0 ) 27703d3b0591SJens Wiklander return( MBEDTLS_ERR_ECP_INVALID_KEY ); 27713d3b0591SJens Wiklander 2772817466cbSJens Wiklander return( 0 ); 2773817466cbSJens Wiklander } 2774817466cbSJens Wiklander #endif /* ECP_MONTGOMERY */ 2775817466cbSJens Wiklander #if defined(ECP_SHORTWEIERSTRASS) 277611fa71b9SJerome Forissier if( mbedtls_ecp_get_type( grp ) == MBEDTLS_ECP_TYPE_SHORT_WEIERSTRASS ) 2777817466cbSJens Wiklander { 2778817466cbSJens Wiklander /* see SEC1 3.2 */ 2779817466cbSJens Wiklander if( mbedtls_mpi_cmp_int( d, 1 ) < 0 || 2780817466cbSJens Wiklander mbedtls_mpi_cmp_mpi( d, &grp->N ) >= 0 ) 2781817466cbSJens Wiklander return( MBEDTLS_ERR_ECP_INVALID_KEY ); 2782817466cbSJens Wiklander else 2783817466cbSJens Wiklander return( 0 ); 2784817466cbSJens Wiklander } 2785817466cbSJens Wiklander #endif /* ECP_SHORTWEIERSTRASS */ 2786817466cbSJens Wiklander 2787817466cbSJens Wiklander return( MBEDTLS_ERR_ECP_BAD_INPUT_DATA ); 2788817466cbSJens Wiklander } 2789817466cbSJens Wiklander 2790817466cbSJens Wiklander /* 27913d3b0591SJens Wiklander * Generate a private key 2792817466cbSJens Wiklander */ 27933d3b0591SJens Wiklander int mbedtls_ecp_gen_privkey( const mbedtls_ecp_group *grp, 27943d3b0591SJens Wiklander mbedtls_mpi *d, 2795817466cbSJens Wiklander int (*f_rng)(void *, unsigned char *, size_t), 2796817466cbSJens Wiklander void *p_rng ) 2797817466cbSJens Wiklander { 27983d3b0591SJens Wiklander int ret = MBEDTLS_ERR_ECP_BAD_INPUT_DATA; 27993d3b0591SJens Wiklander size_t n_size; 28003d3b0591SJens Wiklander 28013d3b0591SJens Wiklander ECP_VALIDATE_RET( grp != NULL ); 28023d3b0591SJens Wiklander ECP_VALIDATE_RET( d != NULL ); 28033d3b0591SJens Wiklander ECP_VALIDATE_RET( f_rng != NULL ); 28043d3b0591SJens Wiklander 28053d3b0591SJens Wiklander n_size = ( grp->nbits + 7 ) / 8; 2806817466cbSJens Wiklander 2807817466cbSJens Wiklander #if defined(ECP_MONTGOMERY) 280811fa71b9SJerome Forissier if( mbedtls_ecp_get_type( grp ) == MBEDTLS_ECP_TYPE_MONTGOMERY ) 2809817466cbSJens Wiklander { 2810817466cbSJens Wiklander /* [M225] page 5 */ 2811817466cbSJens Wiklander size_t b; 2812817466cbSJens Wiklander 2813817466cbSJens Wiklander do { 2814817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_fill_random( d, n_size, f_rng, p_rng ) ); 2815817466cbSJens Wiklander } while( mbedtls_mpi_bitlen( d ) == 0); 2816817466cbSJens Wiklander 2817817466cbSJens Wiklander /* Make sure the most significant bit is nbits */ 2818817466cbSJens Wiklander b = mbedtls_mpi_bitlen( d ) - 1; /* mbedtls_mpi_bitlen is one-based */ 2819817466cbSJens Wiklander if( b > grp->nbits ) 2820817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_shift_r( d, b - grp->nbits ) ); 2821817466cbSJens Wiklander else 2822817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_set_bit( d, grp->nbits, 1 ) ); 2823817466cbSJens Wiklander 28243d3b0591SJens Wiklander /* Make sure the last two bits are unset for Curve448, three bits for 28253d3b0591SJens Wiklander Curve25519 */ 2826817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_set_bit( d, 0, 0 ) ); 2827817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_set_bit( d, 1, 0 ) ); 28283d3b0591SJens Wiklander if( grp->nbits == 254 ) 28293d3b0591SJens Wiklander { 2830817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_set_bit( d, 2, 0 ) ); 2831817466cbSJens Wiklander } 28323d3b0591SJens Wiklander } 2833817466cbSJens Wiklander #endif /* ECP_MONTGOMERY */ 28343d3b0591SJens Wiklander 2835817466cbSJens Wiklander #if defined(ECP_SHORTWEIERSTRASS) 283611fa71b9SJerome Forissier if( mbedtls_ecp_get_type( grp ) == MBEDTLS_ECP_TYPE_SHORT_WEIERSTRASS ) 2837817466cbSJens Wiklander { 2838817466cbSJens Wiklander /* SEC1 3.2.1: Generate d such that 1 <= n < N */ 2839817466cbSJens Wiklander int count = 0; 28405b25c76aSJerome Forissier unsigned cmp = 0; 2841817466cbSJens Wiklander 2842817466cbSJens Wiklander /* 2843817466cbSJens Wiklander * Match the procedure given in RFC 6979 (deterministic ECDSA): 2844817466cbSJens Wiklander * - use the same byte ordering; 2845817466cbSJens Wiklander * - keep the leftmost nbits bits of the generated octet string; 2846817466cbSJens Wiklander * - try until result is in the desired range. 2847817466cbSJens Wiklander * This also avoids any biais, which is especially important for ECDSA. 2848817466cbSJens Wiklander */ 2849817466cbSJens Wiklander do 2850817466cbSJens Wiklander { 28513d3b0591SJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_fill_random( d, n_size, f_rng, p_rng ) ); 2852817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_shift_r( d, 8 * n_size - grp->nbits ) ); 2853817466cbSJens Wiklander 2854817466cbSJens Wiklander /* 2855817466cbSJens Wiklander * Each try has at worst a probability 1/2 of failing (the msb has 2856817466cbSJens Wiklander * a probability 1/2 of being 0, and then the result will be < N), 2857817466cbSJens Wiklander * so after 30 tries failure probability is a most 2**(-30). 2858817466cbSJens Wiklander * 2859817466cbSJens Wiklander * For most curves, 1 try is enough with overwhelming probability, 2860817466cbSJens Wiklander * since N starts with a lot of 1s in binary, but some curves 2861817466cbSJens Wiklander * such as secp224k1 are actually very close to the worst case. 2862817466cbSJens Wiklander */ 2863817466cbSJens Wiklander if( ++count > 30 ) 2864817466cbSJens Wiklander return( MBEDTLS_ERR_ECP_RANDOM_FAILED ); 28655b25c76aSJerome Forissier 28665b25c76aSJerome Forissier ret = mbedtls_mpi_lt_mpi_ct( d, &grp->N, &cmp ); 28675b25c76aSJerome Forissier if( ret != 0 ) 28685b25c76aSJerome Forissier { 28695b25c76aSJerome Forissier goto cleanup; 2870817466cbSJens Wiklander } 28715b25c76aSJerome Forissier } 28725b25c76aSJerome Forissier while( mbedtls_mpi_cmp_int( d, 1 ) < 0 || cmp != 1 ); 2873817466cbSJens Wiklander } 2874817466cbSJens Wiklander #endif /* ECP_SHORTWEIERSTRASS */ 2875817466cbSJens Wiklander 2876817466cbSJens Wiklander cleanup: 2877817466cbSJens Wiklander return( ret ); 28783d3b0591SJens Wiklander } 2879817466cbSJens Wiklander 28803d3b0591SJens Wiklander /* 28813d3b0591SJens Wiklander * Generate a keypair with configurable base point 28823d3b0591SJens Wiklander */ 28833d3b0591SJens Wiklander int mbedtls_ecp_gen_keypair_base( mbedtls_ecp_group *grp, 28843d3b0591SJens Wiklander const mbedtls_ecp_point *G, 28853d3b0591SJens Wiklander mbedtls_mpi *d, mbedtls_ecp_point *Q, 28863d3b0591SJens Wiklander int (*f_rng)(void *, unsigned char *, size_t), 28873d3b0591SJens Wiklander void *p_rng ) 28883d3b0591SJens Wiklander { 288911fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 28903d3b0591SJens Wiklander ECP_VALIDATE_RET( grp != NULL ); 28913d3b0591SJens Wiklander ECP_VALIDATE_RET( d != NULL ); 28923d3b0591SJens Wiklander ECP_VALIDATE_RET( G != NULL ); 28933d3b0591SJens Wiklander ECP_VALIDATE_RET( Q != NULL ); 28943d3b0591SJens Wiklander ECP_VALIDATE_RET( f_rng != NULL ); 28953d3b0591SJens Wiklander 28963d3b0591SJens Wiklander MBEDTLS_MPI_CHK( mbedtls_ecp_gen_privkey( grp, d, f_rng, p_rng ) ); 28973d3b0591SJens Wiklander MBEDTLS_MPI_CHK( mbedtls_ecp_mul( grp, Q, d, G, f_rng, p_rng ) ); 28983d3b0591SJens Wiklander 28993d3b0591SJens Wiklander cleanup: 29003d3b0591SJens Wiklander return( ret ); 2901817466cbSJens Wiklander } 2902817466cbSJens Wiklander 2903817466cbSJens Wiklander /* 2904817466cbSJens Wiklander * Generate key pair, wrapper for conventional base point 2905817466cbSJens Wiklander */ 2906817466cbSJens Wiklander int mbedtls_ecp_gen_keypair( mbedtls_ecp_group *grp, 2907817466cbSJens Wiklander mbedtls_mpi *d, mbedtls_ecp_point *Q, 2908817466cbSJens Wiklander int (*f_rng)(void *, unsigned char *, size_t), 2909817466cbSJens Wiklander void *p_rng ) 2910817466cbSJens Wiklander { 29113d3b0591SJens Wiklander ECP_VALIDATE_RET( grp != NULL ); 29123d3b0591SJens Wiklander ECP_VALIDATE_RET( d != NULL ); 29133d3b0591SJens Wiklander ECP_VALIDATE_RET( Q != NULL ); 29143d3b0591SJens Wiklander ECP_VALIDATE_RET( f_rng != NULL ); 29153d3b0591SJens Wiklander 2916817466cbSJens Wiklander return( mbedtls_ecp_gen_keypair_base( grp, &grp->G, d, Q, f_rng, p_rng ) ); 2917817466cbSJens Wiklander } 2918817466cbSJens Wiklander 2919817466cbSJens Wiklander /* 2920817466cbSJens Wiklander * Generate a keypair, prettier wrapper 2921817466cbSJens Wiklander */ 2922817466cbSJens Wiklander int mbedtls_ecp_gen_key( mbedtls_ecp_group_id grp_id, mbedtls_ecp_keypair *key, 2923817466cbSJens Wiklander int (*f_rng)(void *, unsigned char *, size_t), void *p_rng ) 2924817466cbSJens Wiklander { 292511fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 29263d3b0591SJens Wiklander ECP_VALIDATE_RET( key != NULL ); 29273d3b0591SJens Wiklander ECP_VALIDATE_RET( f_rng != NULL ); 2928817466cbSJens Wiklander 2929817466cbSJens Wiklander if( ( ret = mbedtls_ecp_group_load( &key->grp, grp_id ) ) != 0 ) 2930817466cbSJens Wiklander return( ret ); 2931817466cbSJens Wiklander 2932817466cbSJens Wiklander return( mbedtls_ecp_gen_keypair( &key->grp, &key->d, &key->Q, f_rng, p_rng ) ); 2933817466cbSJens Wiklander } 2934817466cbSJens Wiklander 293511fa71b9SJerome Forissier #define ECP_CURVE25519_KEY_SIZE 32 293611fa71b9SJerome Forissier /* 293711fa71b9SJerome Forissier * Read a private key. 293811fa71b9SJerome Forissier */ 293911fa71b9SJerome Forissier int mbedtls_ecp_read_key( mbedtls_ecp_group_id grp_id, mbedtls_ecp_keypair *key, 294011fa71b9SJerome Forissier const unsigned char *buf, size_t buflen ) 294111fa71b9SJerome Forissier { 294211fa71b9SJerome Forissier int ret = 0; 294311fa71b9SJerome Forissier 294411fa71b9SJerome Forissier ECP_VALIDATE_RET( key != NULL ); 294511fa71b9SJerome Forissier ECP_VALIDATE_RET( buf != NULL ); 294611fa71b9SJerome Forissier 294711fa71b9SJerome Forissier if( ( ret = mbedtls_ecp_group_load( &key->grp, grp_id ) ) != 0 ) 294811fa71b9SJerome Forissier return( ret ); 294911fa71b9SJerome Forissier 295011fa71b9SJerome Forissier ret = MBEDTLS_ERR_ECP_FEATURE_UNAVAILABLE; 295111fa71b9SJerome Forissier 295211fa71b9SJerome Forissier #if defined(ECP_MONTGOMERY) 295311fa71b9SJerome Forissier if( mbedtls_ecp_get_type( &key->grp ) == MBEDTLS_ECP_TYPE_MONTGOMERY ) 295411fa71b9SJerome Forissier { 295511fa71b9SJerome Forissier /* 295611fa71b9SJerome Forissier * If it is Curve25519 curve then mask the key as mandated by RFC7748 295711fa71b9SJerome Forissier */ 295811fa71b9SJerome Forissier if( grp_id == MBEDTLS_ECP_DP_CURVE25519 ) 295911fa71b9SJerome Forissier { 296011fa71b9SJerome Forissier if( buflen != ECP_CURVE25519_KEY_SIZE ) 296111fa71b9SJerome Forissier return MBEDTLS_ERR_ECP_INVALID_KEY; 296211fa71b9SJerome Forissier 296311fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_read_binary_le( &key->d, buf, buflen ) ); 296411fa71b9SJerome Forissier 296511fa71b9SJerome Forissier /* Set the three least significant bits to 0 */ 296611fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_set_bit( &key->d, 0, 0 ) ); 296711fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_set_bit( &key->d, 1, 0 ) ); 296811fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_set_bit( &key->d, 2, 0 ) ); 296911fa71b9SJerome Forissier 297011fa71b9SJerome Forissier /* Set the most significant bit to 0 */ 297111fa71b9SJerome Forissier MBEDTLS_MPI_CHK( 297211fa71b9SJerome Forissier mbedtls_mpi_set_bit( &key->d, 297311fa71b9SJerome Forissier ECP_CURVE25519_KEY_SIZE * 8 - 1, 0 ) 297411fa71b9SJerome Forissier ); 297511fa71b9SJerome Forissier 297611fa71b9SJerome Forissier /* Set the second most significant bit to 1 */ 297711fa71b9SJerome Forissier MBEDTLS_MPI_CHK( 297811fa71b9SJerome Forissier mbedtls_mpi_set_bit( &key->d, 297911fa71b9SJerome Forissier ECP_CURVE25519_KEY_SIZE * 8 - 2, 1 ) 298011fa71b9SJerome Forissier ); 298111fa71b9SJerome Forissier } 298211fa71b9SJerome Forissier else 298311fa71b9SJerome Forissier ret = MBEDTLS_ERR_ECP_FEATURE_UNAVAILABLE; 298411fa71b9SJerome Forissier } 298511fa71b9SJerome Forissier 298611fa71b9SJerome Forissier #endif 298711fa71b9SJerome Forissier #if defined(ECP_SHORTWEIERSTRASS) 298811fa71b9SJerome Forissier if( mbedtls_ecp_get_type( &key->grp ) == MBEDTLS_ECP_TYPE_SHORT_WEIERSTRASS ) 298911fa71b9SJerome Forissier { 299011fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_mpi_read_binary( &key->d, buf, buflen ) ); 299111fa71b9SJerome Forissier 299211fa71b9SJerome Forissier MBEDTLS_MPI_CHK( mbedtls_ecp_check_privkey( &key->grp, &key->d ) ); 299311fa71b9SJerome Forissier } 299411fa71b9SJerome Forissier 299511fa71b9SJerome Forissier #endif 299611fa71b9SJerome Forissier cleanup: 299711fa71b9SJerome Forissier 299811fa71b9SJerome Forissier if( ret != 0 ) 299911fa71b9SJerome Forissier mbedtls_mpi_free( &key->d ); 300011fa71b9SJerome Forissier 300111fa71b9SJerome Forissier return( ret ); 300211fa71b9SJerome Forissier } 300311fa71b9SJerome Forissier 3004817466cbSJens Wiklander /* 3005817466cbSJens Wiklander * Check a public-private key pair 3006817466cbSJens Wiklander */ 3007817466cbSJens Wiklander int mbedtls_ecp_check_pub_priv( const mbedtls_ecp_keypair *pub, const mbedtls_ecp_keypair *prv ) 3008817466cbSJens Wiklander { 300911fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 3010817466cbSJens Wiklander mbedtls_ecp_point Q; 3011817466cbSJens Wiklander mbedtls_ecp_group grp; 30123d3b0591SJens Wiklander ECP_VALIDATE_RET( pub != NULL ); 30133d3b0591SJens Wiklander ECP_VALIDATE_RET( prv != NULL ); 3014817466cbSJens Wiklander 3015817466cbSJens Wiklander if( pub->grp.id == MBEDTLS_ECP_DP_NONE || 3016817466cbSJens Wiklander pub->grp.id != prv->grp.id || 3017817466cbSJens Wiklander mbedtls_mpi_cmp_mpi( &pub->Q.X, &prv->Q.X ) || 3018817466cbSJens Wiklander mbedtls_mpi_cmp_mpi( &pub->Q.Y, &prv->Q.Y ) || 3019817466cbSJens Wiklander mbedtls_mpi_cmp_mpi( &pub->Q.Z, &prv->Q.Z ) ) 3020817466cbSJens Wiklander { 3021817466cbSJens Wiklander return( MBEDTLS_ERR_ECP_BAD_INPUT_DATA ); 3022817466cbSJens Wiklander } 3023817466cbSJens Wiklander 3024817466cbSJens Wiklander mbedtls_ecp_point_init( &Q ); 3025817466cbSJens Wiklander mbedtls_ecp_group_init( &grp ); 3026817466cbSJens Wiklander 3027817466cbSJens Wiklander /* mbedtls_ecp_mul() needs a non-const group... */ 3028817466cbSJens Wiklander mbedtls_ecp_group_copy( &grp, &prv->grp ); 3029817466cbSJens Wiklander 3030817466cbSJens Wiklander /* Also checks d is valid */ 3031817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_ecp_mul( &grp, &Q, &prv->d, &prv->grp.G, NULL, NULL ) ); 3032817466cbSJens Wiklander 3033817466cbSJens Wiklander if( mbedtls_mpi_cmp_mpi( &Q.X, &prv->Q.X ) || 3034817466cbSJens Wiklander mbedtls_mpi_cmp_mpi( &Q.Y, &prv->Q.Y ) || 3035817466cbSJens Wiklander mbedtls_mpi_cmp_mpi( &Q.Z, &prv->Q.Z ) ) 3036817466cbSJens Wiklander { 3037817466cbSJens Wiklander ret = MBEDTLS_ERR_ECP_BAD_INPUT_DATA; 3038817466cbSJens Wiklander goto cleanup; 3039817466cbSJens Wiklander } 3040817466cbSJens Wiklander 3041817466cbSJens Wiklander cleanup: 3042817466cbSJens Wiklander mbedtls_ecp_point_free( &Q ); 3043817466cbSJens Wiklander mbedtls_ecp_group_free( &grp ); 3044817466cbSJens Wiklander 3045817466cbSJens Wiklander return( ret ); 3046817466cbSJens Wiklander } 3047817466cbSJens Wiklander 3048817466cbSJens Wiklander #if defined(MBEDTLS_SELF_TEST) 3049817466cbSJens Wiklander 3050817466cbSJens Wiklander /* 3051817466cbSJens Wiklander * Checkup routine 3052817466cbSJens Wiklander */ 3053817466cbSJens Wiklander int mbedtls_ecp_self_test( int verbose ) 3054817466cbSJens Wiklander { 305511fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 3056817466cbSJens Wiklander size_t i; 3057817466cbSJens Wiklander mbedtls_ecp_group grp; 3058817466cbSJens Wiklander mbedtls_ecp_point R, P; 3059817466cbSJens Wiklander mbedtls_mpi m; 3060817466cbSJens Wiklander unsigned long add_c_prev, dbl_c_prev, mul_c_prev; 3061817466cbSJens Wiklander /* exponents especially adapted for secp192r1 */ 3062817466cbSJens Wiklander const char *exponents[] = 3063817466cbSJens Wiklander { 3064817466cbSJens Wiklander "000000000000000000000000000000000000000000000001", /* one */ 3065817466cbSJens Wiklander "FFFFFFFFFFFFFFFFFFFFFFFF99DEF836146BC9B1B4D22830", /* N - 1 */ 3066817466cbSJens Wiklander "5EA6F389A38B8BC81E767753B15AA5569E1782E30ABE7D25", /* random */ 3067817466cbSJens Wiklander "400000000000000000000000000000000000000000000000", /* one and zeros */ 3068817466cbSJens Wiklander "7FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF", /* all ones */ 3069817466cbSJens Wiklander "555555555555555555555555555555555555555555555555", /* 101010... */ 3070817466cbSJens Wiklander }; 3071817466cbSJens Wiklander 3072817466cbSJens Wiklander mbedtls_ecp_group_init( &grp ); 3073817466cbSJens Wiklander mbedtls_ecp_point_init( &R ); 3074817466cbSJens Wiklander mbedtls_ecp_point_init( &P ); 3075817466cbSJens Wiklander mbedtls_mpi_init( &m ); 3076817466cbSJens Wiklander 3077817466cbSJens Wiklander /* Use secp192r1 if available, or any available curve */ 3078817466cbSJens Wiklander #if defined(MBEDTLS_ECP_DP_SECP192R1_ENABLED) 3079817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_ecp_group_load( &grp, MBEDTLS_ECP_DP_SECP192R1 ) ); 3080817466cbSJens Wiklander #else 3081817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_ecp_group_load( &grp, mbedtls_ecp_curve_list()->grp_id ) ); 3082817466cbSJens Wiklander #endif 3083817466cbSJens Wiklander 3084817466cbSJens Wiklander if( verbose != 0 ) 3085817466cbSJens Wiklander mbedtls_printf( " ECP test #1 (constant op_count, base point G): " ); 3086817466cbSJens Wiklander 3087817466cbSJens Wiklander /* Do a dummy multiplication first to trigger precomputation */ 3088817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_lset( &m, 2 ) ); 3089817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_ecp_mul( &grp, &P, &m, &grp.G, NULL, NULL ) ); 3090817466cbSJens Wiklander 3091817466cbSJens Wiklander add_count = 0; 3092817466cbSJens Wiklander dbl_count = 0; 3093817466cbSJens Wiklander mul_count = 0; 3094817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_read_string( &m, 16, exponents[0] ) ); 3095817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_ecp_mul( &grp, &R, &m, &grp.G, NULL, NULL ) ); 3096817466cbSJens Wiklander 3097817466cbSJens Wiklander for( i = 1; i < sizeof( exponents ) / sizeof( exponents[0] ); i++ ) 3098817466cbSJens Wiklander { 3099817466cbSJens Wiklander add_c_prev = add_count; 3100817466cbSJens Wiklander dbl_c_prev = dbl_count; 3101817466cbSJens Wiklander mul_c_prev = mul_count; 3102817466cbSJens Wiklander add_count = 0; 3103817466cbSJens Wiklander dbl_count = 0; 3104817466cbSJens Wiklander mul_count = 0; 3105817466cbSJens Wiklander 3106817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_read_string( &m, 16, exponents[i] ) ); 3107817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_ecp_mul( &grp, &R, &m, &grp.G, NULL, NULL ) ); 3108817466cbSJens Wiklander 3109817466cbSJens Wiklander if( add_count != add_c_prev || 3110817466cbSJens Wiklander dbl_count != dbl_c_prev || 3111817466cbSJens Wiklander mul_count != mul_c_prev ) 3112817466cbSJens Wiklander { 3113817466cbSJens Wiklander if( verbose != 0 ) 3114817466cbSJens Wiklander mbedtls_printf( "failed (%u)\n", (unsigned int) i ); 3115817466cbSJens Wiklander 3116817466cbSJens Wiklander ret = 1; 3117817466cbSJens Wiklander goto cleanup; 3118817466cbSJens Wiklander } 3119817466cbSJens Wiklander } 3120817466cbSJens Wiklander 3121817466cbSJens Wiklander if( verbose != 0 ) 3122817466cbSJens Wiklander mbedtls_printf( "passed\n" ); 3123817466cbSJens Wiklander 3124817466cbSJens Wiklander if( verbose != 0 ) 3125817466cbSJens Wiklander mbedtls_printf( " ECP test #2 (constant op_count, other point): " ); 3126817466cbSJens Wiklander /* We computed P = 2G last time, use it */ 3127817466cbSJens Wiklander 3128817466cbSJens Wiklander add_count = 0; 3129817466cbSJens Wiklander dbl_count = 0; 3130817466cbSJens Wiklander mul_count = 0; 3131817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_read_string( &m, 16, exponents[0] ) ); 3132817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_ecp_mul( &grp, &R, &m, &P, NULL, NULL ) ); 3133817466cbSJens Wiklander 3134817466cbSJens Wiklander for( i = 1; i < sizeof( exponents ) / sizeof( exponents[0] ); i++ ) 3135817466cbSJens Wiklander { 3136817466cbSJens Wiklander add_c_prev = add_count; 3137817466cbSJens Wiklander dbl_c_prev = dbl_count; 3138817466cbSJens Wiklander mul_c_prev = mul_count; 3139817466cbSJens Wiklander add_count = 0; 3140817466cbSJens Wiklander dbl_count = 0; 3141817466cbSJens Wiklander mul_count = 0; 3142817466cbSJens Wiklander 3143817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_read_string( &m, 16, exponents[i] ) ); 3144817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_ecp_mul( &grp, &R, &m, &P, NULL, NULL ) ); 3145817466cbSJens Wiklander 3146817466cbSJens Wiklander if( add_count != add_c_prev || 3147817466cbSJens Wiklander dbl_count != dbl_c_prev || 3148817466cbSJens Wiklander mul_count != mul_c_prev ) 3149817466cbSJens Wiklander { 3150817466cbSJens Wiklander if( verbose != 0 ) 3151817466cbSJens Wiklander mbedtls_printf( "failed (%u)\n", (unsigned int) i ); 3152817466cbSJens Wiklander 3153817466cbSJens Wiklander ret = 1; 3154817466cbSJens Wiklander goto cleanup; 3155817466cbSJens Wiklander } 3156817466cbSJens Wiklander } 3157817466cbSJens Wiklander 3158817466cbSJens Wiklander if( verbose != 0 ) 3159817466cbSJens Wiklander mbedtls_printf( "passed\n" ); 3160817466cbSJens Wiklander 3161817466cbSJens Wiklander cleanup: 3162817466cbSJens Wiklander 3163817466cbSJens Wiklander if( ret < 0 && verbose != 0 ) 3164817466cbSJens Wiklander mbedtls_printf( "Unexpected error, return code = %08X\n", ret ); 3165817466cbSJens Wiklander 3166817466cbSJens Wiklander mbedtls_ecp_group_free( &grp ); 3167817466cbSJens Wiklander mbedtls_ecp_point_free( &R ); 3168817466cbSJens Wiklander mbedtls_ecp_point_free( &P ); 3169817466cbSJens Wiklander mbedtls_mpi_free( &m ); 3170817466cbSJens Wiklander 3171817466cbSJens Wiklander if( verbose != 0 ) 3172817466cbSJens Wiklander mbedtls_printf( "\n" ); 3173817466cbSJens Wiklander 3174817466cbSJens Wiklander return( ret ); 3175817466cbSJens Wiklander } 3176817466cbSJens Wiklander 3177817466cbSJens Wiklander #endif /* MBEDTLS_SELF_TEST */ 3178817466cbSJens Wiklander 3179817466cbSJens Wiklander #endif /* !MBEDTLS_ECP_ALT */ 3180817466cbSJens Wiklander 3181817466cbSJens Wiklander #endif /* MBEDTLS_ECP_C */ 3182