2015-11-03 22:02:04 +00:00
|
|
|
/* Copyright (c) 2014, Intel Corporation.
|
|
|
|
*
|
|
|
|
* Permission to use, copy, modify, and/or distribute this software for any
|
|
|
|
* purpose with or without fee is hereby granted, provided that the above
|
|
|
|
* copyright notice and this permission notice appear in all copies.
|
|
|
|
*
|
|
|
|
* THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
|
|
|
|
* WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
|
|
|
|
* MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY
|
|
|
|
* SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
|
|
|
|
* WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION
|
|
|
|
* OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN
|
|
|
|
* CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. */
|
|
|
|
|
2017-08-18 19:06:02 +01:00
|
|
|
// Developers and authors:
|
|
|
|
// Shay Gueron (1, 2), and Vlad Krasnov (1)
|
|
|
|
// (1) Intel Corporation, Israel Development Center
|
|
|
|
// (2) University of Haifa
|
|
|
|
// Reference:
|
|
|
|
// S.Gueron and V.Krasnov, "Fast Prime Field Elliptic Curve Cryptography with
|
|
|
|
// 256 Bit Primes"
|
2015-11-03 22:02:04 +00:00
|
|
|
|
|
|
|
#include <openssl/ec.h>
|
|
|
|
|
2015-11-13 01:05:22 +00:00
|
|
|
#include <assert.h>
|
2015-11-03 22:02:04 +00:00
|
|
|
#include <stdint.h>
|
|
|
|
#include <string.h>
|
|
|
|
|
|
|
|
#include <openssl/bn.h>
|
|
|
|
#include <openssl/crypto.h>
|
|
|
|
#include <openssl/err.h>
|
|
|
|
|
2017-05-02 22:25:39 +01:00
|
|
|
#include "../bn/internal.h"
|
|
|
|
#include "../delocate.h"
|
|
|
|
#include "../../internal.h"
|
2016-10-25 01:02:26 +01:00
|
|
|
#include "internal.h"
|
|
|
|
#include "p256-x86_64.h"
|
2015-11-03 22:02:04 +00:00
|
|
|
|
|
|
|
|
|
|
|
#if !defined(OPENSSL_NO_ASM) && defined(OPENSSL_X86_64) && \
|
|
|
|
!defined(OPENSSL_SMALL)
|
|
|
|
|
|
|
|
typedef P256_POINT_AFFINE PRECOMP256_ROW[64];
|
|
|
|
|
2017-08-18 19:06:02 +01:00
|
|
|
// One converted into the Montgomery domain
|
2015-11-03 22:02:04 +00:00
|
|
|
static const BN_ULONG ONE[P256_LIMBS] = {
|
|
|
|
TOBN(0x00000000, 0x00000001), TOBN(0xffffffff, 0x00000000),
|
|
|
|
TOBN(0xffffffff, 0xffffffff), TOBN(0x00000000, 0xfffffffe),
|
|
|
|
};
|
|
|
|
|
2017-08-18 19:06:02 +01:00
|
|
|
// Precomputed tables for the default generator
|
2015-11-03 22:02:04 +00:00
|
|
|
#include "p256-x86_64-table.h"
|
|
|
|
|
2017-08-18 19:06:02 +01:00
|
|
|
// Recode window to a signed digit, see util-64.c for details
|
2015-11-03 22:02:04 +00:00
|
|
|
static unsigned booth_recode_w5(unsigned in) {
|
|
|
|
unsigned s, d;
|
|
|
|
|
|
|
|
s = ~((in >> 5) - 1);
|
|
|
|
d = (1 << 6) - in - 1;
|
|
|
|
d = (d & s) | (in & ~s);
|
|
|
|
d = (d >> 1) + (d & 1);
|
|
|
|
|
|
|
|
return (d << 1) + (s & 1);
|
|
|
|
}
|
|
|
|
|
|
|
|
static unsigned booth_recode_w7(unsigned in) {
|
|
|
|
unsigned s, d;
|
|
|
|
|
|
|
|
s = ~((in >> 7) - 1);
|
|
|
|
d = (1 << 8) - in - 1;
|
|
|
|
d = (d & s) | (in & ~s);
|
|
|
|
d = (d >> 1) + (d & 1);
|
|
|
|
|
|
|
|
return (d << 1) + (s & 1);
|
|
|
|
}
|
|
|
|
|
2017-08-18 19:06:02 +01:00
|
|
|
// copy_conditional copies |src| to |dst| if |move| is one and leaves it as-is
|
|
|
|
// if |move| is zero.
|
|
|
|
//
|
|
|
|
// WARNING: this breaks the usual convention of constant-time functions
|
|
|
|
// returning masks.
|
2015-11-03 22:02:04 +00:00
|
|
|
static void copy_conditional(BN_ULONG dst[P256_LIMBS],
|
|
|
|
const BN_ULONG src[P256_LIMBS], BN_ULONG move) {
|
2015-11-03 22:29:01 +00:00
|
|
|
BN_ULONG mask1 = ((BN_ULONG)0) - move;
|
2015-11-03 22:02:04 +00:00
|
|
|
BN_ULONG mask2 = ~mask1;
|
|
|
|
|
|
|
|
dst[0] = (src[0] & mask1) ^ (dst[0] & mask2);
|
|
|
|
dst[1] = (src[1] & mask1) ^ (dst[1] & mask2);
|
|
|
|
dst[2] = (src[2] & mask1) ^ (dst[2] & mask2);
|
|
|
|
dst[3] = (src[3] & mask1) ^ (dst[3] & mask2);
|
|
|
|
if (P256_LIMBS == 8) {
|
|
|
|
dst[4] = (src[4] & mask1) ^ (dst[4] & mask2);
|
|
|
|
dst[5] = (src[5] & mask1) ^ (dst[5] & mask2);
|
|
|
|
dst[6] = (src[6] & mask1) ^ (dst[6] & mask2);
|
|
|
|
dst[7] = (src[7] & mask1) ^ (dst[7] & mask2);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-08-18 19:06:02 +01:00
|
|
|
// is_not_zero returns one iff in != 0 and zero otherwise.
|
|
|
|
//
|
|
|
|
// WARNING: this breaks the usual convention of constant-time functions
|
|
|
|
// returning masks.
|
|
|
|
//
|
|
|
|
// (define-fun is_not_zero ((in (_ BitVec 64))) (_ BitVec 64)
|
|
|
|
// (bvlshr (bvor in (bvsub #x0000000000000000 in)) #x000000000000003f)
|
|
|
|
// )
|
|
|
|
//
|
|
|
|
// (declare-fun x () (_ BitVec 64))
|
|
|
|
//
|
|
|
|
// (assert (and (= x #x0000000000000000) (= (is_not_zero x) #x0000000000000001)))
|
|
|
|
// (check-sat)
|
|
|
|
//
|
|
|
|
// (assert (and (not (= x #x0000000000000000)) (= (is_not_zero x) #x0000000000000000)))
|
|
|
|
// (check-sat)
|
|
|
|
//
|
2016-11-11 13:38:49 +00:00
|
|
|
static BN_ULONG is_not_zero(BN_ULONG in) {
|
|
|
|
in |= (0 - in);
|
|
|
|
in >>= BN_BITS2 - 1;
|
|
|
|
return in;
|
|
|
|
}
|
|
|
|
|
2017-08-18 19:06:02 +01:00
|
|
|
// ecp_nistz256_mod_inverse_mont sets |r| to (|in| * 2^-256)^-1 * 2^256 mod p.
|
|
|
|
// That is, |r| is the modular inverse of |in| for input and output in the
|
|
|
|
// Montgomery domain.
|
2016-11-11 03:58:36 +00:00
|
|
|
static void ecp_nistz256_mod_inverse_mont(BN_ULONG r[P256_LIMBS],
|
|
|
|
const BN_ULONG in[P256_LIMBS]) {
|
2015-11-03 22:02:04 +00:00
|
|
|
/* The poly is ffffffff 00000001 00000000 00000000 00000000 ffffffff ffffffff
|
|
|
|
ffffffff
|
|
|
|
We use FLT and used poly-2 as exponent */
|
|
|
|
BN_ULONG p2[P256_LIMBS];
|
|
|
|
BN_ULONG p4[P256_LIMBS];
|
|
|
|
BN_ULONG p8[P256_LIMBS];
|
|
|
|
BN_ULONG p16[P256_LIMBS];
|
|
|
|
BN_ULONG p32[P256_LIMBS];
|
|
|
|
BN_ULONG res[P256_LIMBS];
|
|
|
|
int i;
|
|
|
|
|
|
|
|
ecp_nistz256_sqr_mont(res, in);
|
2017-08-18 19:06:02 +01:00
|
|
|
ecp_nistz256_mul_mont(p2, res, in); // 3*p
|
2015-11-03 22:02:04 +00:00
|
|
|
|
|
|
|
ecp_nistz256_sqr_mont(res, p2);
|
|
|
|
ecp_nistz256_sqr_mont(res, res);
|
2017-08-18 19:06:02 +01:00
|
|
|
ecp_nistz256_mul_mont(p4, res, p2); // f*p
|
2015-11-03 22:02:04 +00:00
|
|
|
|
|
|
|
ecp_nistz256_sqr_mont(res, p4);
|
|
|
|
ecp_nistz256_sqr_mont(res, res);
|
|
|
|
ecp_nistz256_sqr_mont(res, res);
|
|
|
|
ecp_nistz256_sqr_mont(res, res);
|
2017-08-18 19:06:02 +01:00
|
|
|
ecp_nistz256_mul_mont(p8, res, p4); // ff*p
|
2015-11-03 22:02:04 +00:00
|
|
|
|
|
|
|
ecp_nistz256_sqr_mont(res, p8);
|
|
|
|
for (i = 0; i < 7; i++) {
|
|
|
|
ecp_nistz256_sqr_mont(res, res);
|
|
|
|
}
|
2017-08-18 19:06:02 +01:00
|
|
|
ecp_nistz256_mul_mont(p16, res, p8); // ffff*p
|
2015-11-03 22:02:04 +00:00
|
|
|
|
|
|
|
ecp_nistz256_sqr_mont(res, p16);
|
|
|
|
for (i = 0; i < 15; i++) {
|
|
|
|
ecp_nistz256_sqr_mont(res, res);
|
|
|
|
}
|
2017-08-18 19:06:02 +01:00
|
|
|
ecp_nistz256_mul_mont(p32, res, p16); // ffffffff*p
|
2015-11-03 22:02:04 +00:00
|
|
|
|
|
|
|
ecp_nistz256_sqr_mont(res, p32);
|
|
|
|
for (i = 0; i < 31; i++) {
|
|
|
|
ecp_nistz256_sqr_mont(res, res);
|
|
|
|
}
|
|
|
|
ecp_nistz256_mul_mont(res, res, in);
|
|
|
|
|
|
|
|
for (i = 0; i < 32 * 4; i++) {
|
|
|
|
ecp_nistz256_sqr_mont(res, res);
|
|
|
|
}
|
|
|
|
ecp_nistz256_mul_mont(res, res, p32);
|
|
|
|
|
|
|
|
for (i = 0; i < 32; i++) {
|
|
|
|
ecp_nistz256_sqr_mont(res, res);
|
|
|
|
}
|
|
|
|
ecp_nistz256_mul_mont(res, res, p32);
|
|
|
|
|
|
|
|
for (i = 0; i < 16; i++) {
|
|
|
|
ecp_nistz256_sqr_mont(res, res);
|
|
|
|
}
|
|
|
|
ecp_nistz256_mul_mont(res, res, p16);
|
|
|
|
|
|
|
|
for (i = 0; i < 8; i++) {
|
|
|
|
ecp_nistz256_sqr_mont(res, res);
|
|
|
|
}
|
|
|
|
ecp_nistz256_mul_mont(res, res, p8);
|
|
|
|
|
|
|
|
ecp_nistz256_sqr_mont(res, res);
|
|
|
|
ecp_nistz256_sqr_mont(res, res);
|
|
|
|
ecp_nistz256_sqr_mont(res, res);
|
|
|
|
ecp_nistz256_sqr_mont(res, res);
|
|
|
|
ecp_nistz256_mul_mont(res, res, p4);
|
|
|
|
|
|
|
|
ecp_nistz256_sqr_mont(res, res);
|
|
|
|
ecp_nistz256_sqr_mont(res, res);
|
|
|
|
ecp_nistz256_mul_mont(res, res, p2);
|
|
|
|
|
|
|
|
ecp_nistz256_sqr_mont(res, res);
|
|
|
|
ecp_nistz256_sqr_mont(res, res);
|
2016-03-26 09:09:26 +00:00
|
|
|
ecp_nistz256_mul_mont(r, res, in);
|
2015-11-03 22:02:04 +00:00
|
|
|
}
|
|
|
|
|
2017-08-18 19:06:02 +01:00
|
|
|
// ecp_nistz256_bignum_to_field_elem copies the contents of |in| to |out| and
|
|
|
|
// returns one if it fits. Otherwise it returns zero.
|
2015-11-03 22:02:04 +00:00
|
|
|
static int ecp_nistz256_bignum_to_field_elem(BN_ULONG out[P256_LIMBS],
|
|
|
|
const BIGNUM *in) {
|
|
|
|
if (in->top > P256_LIMBS) {
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2016-12-13 06:07:13 +00:00
|
|
|
OPENSSL_memset(out, 0, sizeof(BN_ULONG) * P256_LIMBS);
|
|
|
|
OPENSSL_memcpy(out, in->d, sizeof(BN_ULONG) * in->top);
|
2015-11-03 22:02:04 +00:00
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
2017-08-18 19:06:02 +01:00
|
|
|
// r = p * p_scalar
|
2015-11-13 04:31:35 +00:00
|
|
|
static int ecp_nistz256_windowed_mul(const EC_GROUP *group, P256_POINT *r,
|
Make ECDSA signing 10% faster and plug some timing leaks.
None of the asymmetric crypto we inherented from OpenSSL is
constant-time because of BIGNUM. BIGNUM chops leading zeros off the
front of everything, so we end up leaking information about the first
word, in theory. BIGNUM functions additionally tend to take the full
range of inputs and then call into BN_nnmod at various points.
All our secret values should be acted on in constant-time, but k in
ECDSA is a particularly sensitive value. So, ecdsa_sign_setup, in an
attempt to mitigate the BIGNUM leaks, would add a couple copies of the
order.
This does not work at all. k is used to compute two values: k^-1 and kG.
The first operation when computing k^-1 is to call BN_nnmod if k is out
of range. The entry point to our tuned constant-time curve
implementations is to call BN_nnmod if the scalar has too many bits,
which this causes. The result is both corrections are immediately undone
but cause us to do more variable-time work in the meantime.
Replace all these computations around k with the word-based functions
added in the various preceding CLs. In doing so, replace the BN_mod_mul
calls (which internally call BN_nnmod) with Montgomery reduction. We can
avoid taking k^-1 out of Montgomery form, which combines nicely with
Brian Smith's trick in 3426d1011946b26ff1bb2fd98a081ba4753c9cc8. Along
the way, we avoid some unnecessary mallocs.
BIGNUM still affects the private key itself, as well as the EC_POINTs.
But this should hopefully be much better now. Also it's 10% faster:
Before:
Did 15000 ECDSA P-224 signing operations in 1069117us (14030.3 ops/sec)
Did 18000 ECDSA P-256 signing operations in 1053908us (17079.3 ops/sec)
Did 1078 ECDSA P-384 signing operations in 1087853us (990.9 ops/sec)
Did 473 ECDSA P-521 signing operations in 1069835us (442.1 ops/sec)
After:
Did 16000 ECDSA P-224 signing operations in 1064799us (15026.3 ops/sec)
Did 19000 ECDSA P-256 signing operations in 1007839us (18852.2 ops/sec)
Did 1078 ECDSA P-384 signing operations in 1079413us (998.7 ops/sec)
Did 484 ECDSA P-521 signing operations in 1083616us (446.7 ops/sec)
Change-Id: I2a25e90fc99dac13c0616d0ea45e125a4bd8cca1
Reviewed-on: https://boringssl-review.googlesource.com/23075
Reviewed-by: Adam Langley <agl@google.com>
2017-11-13 03:58:00 +00:00
|
|
|
const EC_POINT *p,
|
|
|
|
const EC_SCALAR *p_scalar) {
|
2015-11-13 01:05:22 +00:00
|
|
|
assert(p != NULL);
|
|
|
|
assert(p_scalar != NULL);
|
|
|
|
|
2015-11-03 22:02:04 +00:00
|
|
|
static const unsigned kWindowSize = 5;
|
|
|
|
static const unsigned kMask = (1 << (5 /* kWindowSize */ + 1)) - 1;
|
|
|
|
|
2017-08-18 19:06:02 +01:00
|
|
|
// A |P256_POINT| is (3 * 32) = 96 bytes, and the 64-byte alignment should
|
|
|
|
// add no more than 63 bytes of overhead. Thus, |table| should require
|
|
|
|
// ~1599 ((96 * 16) + 63) bytes of stack space.
|
2016-01-18 06:12:57 +00:00
|
|
|
alignas(64) P256_POINT table[16];
|
2015-11-13 01:05:22 +00:00
|
|
|
uint8_t p_str[33];
|
Make ECDSA signing 10% faster and plug some timing leaks.
None of the asymmetric crypto we inherented from OpenSSL is
constant-time because of BIGNUM. BIGNUM chops leading zeros off the
front of everything, so we end up leaking information about the first
word, in theory. BIGNUM functions additionally tend to take the full
range of inputs and then call into BN_nnmod at various points.
All our secret values should be acted on in constant-time, but k in
ECDSA is a particularly sensitive value. So, ecdsa_sign_setup, in an
attempt to mitigate the BIGNUM leaks, would add a couple copies of the
order.
This does not work at all. k is used to compute two values: k^-1 and kG.
The first operation when computing k^-1 is to call BN_nnmod if k is out
of range. The entry point to our tuned constant-time curve
implementations is to call BN_nnmod if the scalar has too many bits,
which this causes. The result is both corrections are immediately undone
but cause us to do more variable-time work in the meantime.
Replace all these computations around k with the word-based functions
added in the various preceding CLs. In doing so, replace the BN_mod_mul
calls (which internally call BN_nnmod) with Montgomery reduction. We can
avoid taking k^-1 out of Montgomery form, which combines nicely with
Brian Smith's trick in 3426d1011946b26ff1bb2fd98a081ba4753c9cc8. Along
the way, we avoid some unnecessary mallocs.
BIGNUM still affects the private key itself, as well as the EC_POINTs.
But this should hopefully be much better now. Also it's 10% faster:
Before:
Did 15000 ECDSA P-224 signing operations in 1069117us (14030.3 ops/sec)
Did 18000 ECDSA P-256 signing operations in 1053908us (17079.3 ops/sec)
Did 1078 ECDSA P-384 signing operations in 1087853us (990.9 ops/sec)
Did 473 ECDSA P-521 signing operations in 1069835us (442.1 ops/sec)
After:
Did 16000 ECDSA P-224 signing operations in 1064799us (15026.3 ops/sec)
Did 19000 ECDSA P-256 signing operations in 1007839us (18852.2 ops/sec)
Did 1078 ECDSA P-384 signing operations in 1079413us (998.7 ops/sec)
Did 484 ECDSA P-521 signing operations in 1083616us (446.7 ops/sec)
Change-Id: I2a25e90fc99dac13c0616d0ea45e125a4bd8cca1
Reviewed-on: https://boringssl-review.googlesource.com/23075
Reviewed-by: Adam Langley <agl@google.com>
2017-11-13 03:58:00 +00:00
|
|
|
OPENSSL_memcpy(p_str, p_scalar->bytes, 32);
|
|
|
|
p_str[32] = 0;
|
2015-11-03 22:02:04 +00:00
|
|
|
|
2017-08-18 19:06:02 +01:00
|
|
|
// table[0] is implicitly (0,0,0) (the point at infinity), therefore it is
|
|
|
|
// not stored. All other values are actually stored with an offset of -1 in
|
|
|
|
// table.
|
2015-11-13 01:05:22 +00:00
|
|
|
P256_POINT *row = table;
|
2015-11-03 22:02:04 +00:00
|
|
|
|
2015-11-13 01:05:22 +00:00
|
|
|
if (!ecp_nistz256_bignum_to_field_elem(row[1 - 1].X, &p->X) ||
|
|
|
|
!ecp_nistz256_bignum_to_field_elem(row[1 - 1].Y, &p->Y) ||
|
|
|
|
!ecp_nistz256_bignum_to_field_elem(row[1 - 1].Z, &p->Z)) {
|
|
|
|
OPENSSL_PUT_ERROR(EC, EC_R_COORDINATES_OUT_OF_RANGE);
|
Make ECDSA signing 10% faster and plug some timing leaks.
None of the asymmetric crypto we inherented from OpenSSL is
constant-time because of BIGNUM. BIGNUM chops leading zeros off the
front of everything, so we end up leaking information about the first
word, in theory. BIGNUM functions additionally tend to take the full
range of inputs and then call into BN_nnmod at various points.
All our secret values should be acted on in constant-time, but k in
ECDSA is a particularly sensitive value. So, ecdsa_sign_setup, in an
attempt to mitigate the BIGNUM leaks, would add a couple copies of the
order.
This does not work at all. k is used to compute two values: k^-1 and kG.
The first operation when computing k^-1 is to call BN_nnmod if k is out
of range. The entry point to our tuned constant-time curve
implementations is to call BN_nnmod if the scalar has too many bits,
which this causes. The result is both corrections are immediately undone
but cause us to do more variable-time work in the meantime.
Replace all these computations around k with the word-based functions
added in the various preceding CLs. In doing so, replace the BN_mod_mul
calls (which internally call BN_nnmod) with Montgomery reduction. We can
avoid taking k^-1 out of Montgomery form, which combines nicely with
Brian Smith's trick in 3426d1011946b26ff1bb2fd98a081ba4753c9cc8. Along
the way, we avoid some unnecessary mallocs.
BIGNUM still affects the private key itself, as well as the EC_POINTs.
But this should hopefully be much better now. Also it's 10% faster:
Before:
Did 15000 ECDSA P-224 signing operations in 1069117us (14030.3 ops/sec)
Did 18000 ECDSA P-256 signing operations in 1053908us (17079.3 ops/sec)
Did 1078 ECDSA P-384 signing operations in 1087853us (990.9 ops/sec)
Did 473 ECDSA P-521 signing operations in 1069835us (442.1 ops/sec)
After:
Did 16000 ECDSA P-224 signing operations in 1064799us (15026.3 ops/sec)
Did 19000 ECDSA P-256 signing operations in 1007839us (18852.2 ops/sec)
Did 1078 ECDSA P-384 signing operations in 1079413us (998.7 ops/sec)
Did 484 ECDSA P-521 signing operations in 1083616us (446.7 ops/sec)
Change-Id: I2a25e90fc99dac13c0616d0ea45e125a4bd8cca1
Reviewed-on: https://boringssl-review.googlesource.com/23075
Reviewed-by: Adam Langley <agl@google.com>
2017-11-13 03:58:00 +00:00
|
|
|
return 0;
|
2015-11-03 22:02:04 +00:00
|
|
|
}
|
|
|
|
|
2015-11-13 01:05:22 +00:00
|
|
|
ecp_nistz256_point_double(&row[2 - 1], &row[1 - 1]);
|
|
|
|
ecp_nistz256_point_add(&row[3 - 1], &row[2 - 1], &row[1 - 1]);
|
|
|
|
ecp_nistz256_point_double(&row[4 - 1], &row[2 - 1]);
|
|
|
|
ecp_nistz256_point_double(&row[6 - 1], &row[3 - 1]);
|
|
|
|
ecp_nistz256_point_double(&row[8 - 1], &row[4 - 1]);
|
|
|
|
ecp_nistz256_point_double(&row[12 - 1], &row[6 - 1]);
|
|
|
|
ecp_nistz256_point_add(&row[5 - 1], &row[4 - 1], &row[1 - 1]);
|
|
|
|
ecp_nistz256_point_add(&row[7 - 1], &row[6 - 1], &row[1 - 1]);
|
|
|
|
ecp_nistz256_point_add(&row[9 - 1], &row[8 - 1], &row[1 - 1]);
|
|
|
|
ecp_nistz256_point_add(&row[13 - 1], &row[12 - 1], &row[1 - 1]);
|
|
|
|
ecp_nistz256_point_double(&row[14 - 1], &row[7 - 1]);
|
|
|
|
ecp_nistz256_point_double(&row[10 - 1], &row[5 - 1]);
|
|
|
|
ecp_nistz256_point_add(&row[15 - 1], &row[14 - 1], &row[1 - 1]);
|
|
|
|
ecp_nistz256_point_add(&row[11 - 1], &row[10 - 1], &row[1 - 1]);
|
2016-07-17 22:22:39 +01:00
|
|
|
ecp_nistz256_point_double(&row[16 - 1], &row[8 - 1]);
|
2015-11-13 01:05:22 +00:00
|
|
|
|
2015-11-03 22:02:04 +00:00
|
|
|
BN_ULONG tmp[P256_LIMBS];
|
2016-01-18 06:12:57 +00:00
|
|
|
alignas(32) P256_POINT h;
|
2015-11-03 22:02:04 +00:00
|
|
|
unsigned index = 255;
|
2015-11-13 01:05:22 +00:00
|
|
|
unsigned wvalue = p_str[(index - 1) / 8];
|
2015-11-03 22:02:04 +00:00
|
|
|
wvalue = (wvalue >> ((index - 1) % 8)) & kMask;
|
|
|
|
|
2015-11-13 01:05:22 +00:00
|
|
|
ecp_nistz256_select_w5(r, table, booth_recode_w5(wvalue) >> 1);
|
2015-11-03 22:02:04 +00:00
|
|
|
|
|
|
|
while (index >= 5) {
|
2015-11-13 01:05:22 +00:00
|
|
|
if (index != 255) {
|
2015-11-03 22:02:04 +00:00
|
|
|
unsigned off = (index - 1) / 8;
|
|
|
|
|
2015-11-13 01:05:22 +00:00
|
|
|
wvalue = p_str[off] | p_str[off + 1] << 8;
|
2015-11-03 22:02:04 +00:00
|
|
|
wvalue = (wvalue >> ((index - 1) % 8)) & kMask;
|
|
|
|
|
|
|
|
wvalue = booth_recode_w5(wvalue);
|
|
|
|
|
2015-11-13 01:05:22 +00:00
|
|
|
ecp_nistz256_select_w5(&h, table, wvalue >> 1);
|
2015-11-03 22:02:04 +00:00
|
|
|
|
|
|
|
ecp_nistz256_neg(tmp, h.Y);
|
|
|
|
copy_conditional(h.Y, tmp, (wvalue & 1));
|
|
|
|
|
|
|
|
ecp_nistz256_point_add(r, r, &h);
|
|
|
|
}
|
|
|
|
|
|
|
|
index -= kWindowSize;
|
|
|
|
|
|
|
|
ecp_nistz256_point_double(r, r);
|
|
|
|
ecp_nistz256_point_double(r, r);
|
|
|
|
ecp_nistz256_point_double(r, r);
|
|
|
|
ecp_nistz256_point_double(r, r);
|
|
|
|
ecp_nistz256_point_double(r, r);
|
|
|
|
}
|
|
|
|
|
2017-08-18 19:06:02 +01:00
|
|
|
// Final window
|
2015-11-13 01:05:22 +00:00
|
|
|
wvalue = p_str[0];
|
|
|
|
wvalue = (wvalue << 1) & kMask;
|
2015-11-03 22:02:04 +00:00
|
|
|
|
2015-11-13 01:05:22 +00:00
|
|
|
wvalue = booth_recode_w5(wvalue);
|
2015-11-03 22:02:04 +00:00
|
|
|
|
2015-11-13 01:05:22 +00:00
|
|
|
ecp_nistz256_select_w5(&h, table, wvalue >> 1);
|
2015-11-03 22:02:04 +00:00
|
|
|
|
2015-11-13 01:05:22 +00:00
|
|
|
ecp_nistz256_neg(tmp, h.Y);
|
|
|
|
copy_conditional(h.Y, tmp, wvalue & 1);
|
2015-11-03 22:02:04 +00:00
|
|
|
|
2015-11-13 01:05:22 +00:00
|
|
|
ecp_nistz256_point_add(r, r, &h);
|
2015-11-03 22:02:04 +00:00
|
|
|
|
Make ECDSA signing 10% faster and plug some timing leaks.
None of the asymmetric crypto we inherented from OpenSSL is
constant-time because of BIGNUM. BIGNUM chops leading zeros off the
front of everything, so we end up leaking information about the first
word, in theory. BIGNUM functions additionally tend to take the full
range of inputs and then call into BN_nnmod at various points.
All our secret values should be acted on in constant-time, but k in
ECDSA is a particularly sensitive value. So, ecdsa_sign_setup, in an
attempt to mitigate the BIGNUM leaks, would add a couple copies of the
order.
This does not work at all. k is used to compute two values: k^-1 and kG.
The first operation when computing k^-1 is to call BN_nnmod if k is out
of range. The entry point to our tuned constant-time curve
implementations is to call BN_nnmod if the scalar has too many bits,
which this causes. The result is both corrections are immediately undone
but cause us to do more variable-time work in the meantime.
Replace all these computations around k with the word-based functions
added in the various preceding CLs. In doing so, replace the BN_mod_mul
calls (which internally call BN_nnmod) with Montgomery reduction. We can
avoid taking k^-1 out of Montgomery form, which combines nicely with
Brian Smith's trick in 3426d1011946b26ff1bb2fd98a081ba4753c9cc8. Along
the way, we avoid some unnecessary mallocs.
BIGNUM still affects the private key itself, as well as the EC_POINTs.
But this should hopefully be much better now. Also it's 10% faster:
Before:
Did 15000 ECDSA P-224 signing operations in 1069117us (14030.3 ops/sec)
Did 18000 ECDSA P-256 signing operations in 1053908us (17079.3 ops/sec)
Did 1078 ECDSA P-384 signing operations in 1087853us (990.9 ops/sec)
Did 473 ECDSA P-521 signing operations in 1069835us (442.1 ops/sec)
After:
Did 16000 ECDSA P-224 signing operations in 1064799us (15026.3 ops/sec)
Did 19000 ECDSA P-256 signing operations in 1007839us (18852.2 ops/sec)
Did 1078 ECDSA P-384 signing operations in 1079413us (998.7 ops/sec)
Did 484 ECDSA P-521 signing operations in 1083616us (446.7 ops/sec)
Change-Id: I2a25e90fc99dac13c0616d0ea45e125a4bd8cca1
Reviewed-on: https://boringssl-review.googlesource.com/23075
Reviewed-by: Adam Langley <agl@google.com>
2017-11-13 03:58:00 +00:00
|
|
|
return 1;
|
2015-11-03 22:02:04 +00:00
|
|
|
}
|
|
|
|
|
Make ECDSA signing 10% faster and plug some timing leaks.
None of the asymmetric crypto we inherented from OpenSSL is
constant-time because of BIGNUM. BIGNUM chops leading zeros off the
front of everything, so we end up leaking information about the first
word, in theory. BIGNUM functions additionally tend to take the full
range of inputs and then call into BN_nnmod at various points.
All our secret values should be acted on in constant-time, but k in
ECDSA is a particularly sensitive value. So, ecdsa_sign_setup, in an
attempt to mitigate the BIGNUM leaks, would add a couple copies of the
order.
This does not work at all. k is used to compute two values: k^-1 and kG.
The first operation when computing k^-1 is to call BN_nnmod if k is out
of range. The entry point to our tuned constant-time curve
implementations is to call BN_nnmod if the scalar has too many bits,
which this causes. The result is both corrections are immediately undone
but cause us to do more variable-time work in the meantime.
Replace all these computations around k with the word-based functions
added in the various preceding CLs. In doing so, replace the BN_mod_mul
calls (which internally call BN_nnmod) with Montgomery reduction. We can
avoid taking k^-1 out of Montgomery form, which combines nicely with
Brian Smith's trick in 3426d1011946b26ff1bb2fd98a081ba4753c9cc8. Along
the way, we avoid some unnecessary mallocs.
BIGNUM still affects the private key itself, as well as the EC_POINTs.
But this should hopefully be much better now. Also it's 10% faster:
Before:
Did 15000 ECDSA P-224 signing operations in 1069117us (14030.3 ops/sec)
Did 18000 ECDSA P-256 signing operations in 1053908us (17079.3 ops/sec)
Did 1078 ECDSA P-384 signing operations in 1087853us (990.9 ops/sec)
Did 473 ECDSA P-521 signing operations in 1069835us (442.1 ops/sec)
After:
Did 16000 ECDSA P-224 signing operations in 1064799us (15026.3 ops/sec)
Did 19000 ECDSA P-256 signing operations in 1007839us (18852.2 ops/sec)
Did 1078 ECDSA P-384 signing operations in 1079413us (998.7 ops/sec)
Did 484 ECDSA P-521 signing operations in 1083616us (446.7 ops/sec)
Change-Id: I2a25e90fc99dac13c0616d0ea45e125a4bd8cca1
Reviewed-on: https://boringssl-review.googlesource.com/23075
Reviewed-by: Adam Langley <agl@google.com>
2017-11-13 03:58:00 +00:00
|
|
|
static int ecp_nistz256_points_mul(const EC_GROUP *group, EC_POINT *r,
|
|
|
|
const EC_SCALAR *g_scalar,
|
|
|
|
const EC_POINT *p_,
|
|
|
|
const EC_SCALAR *p_scalar, BN_CTX *ctx) {
|
2015-11-13 01:05:22 +00:00
|
|
|
assert((p_ != NULL) == (p_scalar != NULL));
|
|
|
|
|
2015-11-03 22:02:04 +00:00
|
|
|
static const unsigned kWindowSize = 7;
|
|
|
|
static const unsigned kMask = (1 << (7 /* kWindowSize */ + 1)) - 1;
|
|
|
|
|
2016-01-18 06:12:57 +00:00
|
|
|
alignas(32) union {
|
2015-11-03 22:02:04 +00:00
|
|
|
P256_POINT p;
|
|
|
|
P256_POINT_AFFINE a;
|
|
|
|
} t, p;
|
|
|
|
|
2015-11-13 01:05:22 +00:00
|
|
|
if (g_scalar != NULL) {
|
Make ECDSA signing 10% faster and plug some timing leaks.
None of the asymmetric crypto we inherented from OpenSSL is
constant-time because of BIGNUM. BIGNUM chops leading zeros off the
front of everything, so we end up leaking information about the first
word, in theory. BIGNUM functions additionally tend to take the full
range of inputs and then call into BN_nnmod at various points.
All our secret values should be acted on in constant-time, but k in
ECDSA is a particularly sensitive value. So, ecdsa_sign_setup, in an
attempt to mitigate the BIGNUM leaks, would add a couple copies of the
order.
This does not work at all. k is used to compute two values: k^-1 and kG.
The first operation when computing k^-1 is to call BN_nnmod if k is out
of range. The entry point to our tuned constant-time curve
implementations is to call BN_nnmod if the scalar has too many bits,
which this causes. The result is both corrections are immediately undone
but cause us to do more variable-time work in the meantime.
Replace all these computations around k with the word-based functions
added in the various preceding CLs. In doing so, replace the BN_mod_mul
calls (which internally call BN_nnmod) with Montgomery reduction. We can
avoid taking k^-1 out of Montgomery form, which combines nicely with
Brian Smith's trick in 3426d1011946b26ff1bb2fd98a081ba4753c9cc8. Along
the way, we avoid some unnecessary mallocs.
BIGNUM still affects the private key itself, as well as the EC_POINTs.
But this should hopefully be much better now. Also it's 10% faster:
Before:
Did 15000 ECDSA P-224 signing operations in 1069117us (14030.3 ops/sec)
Did 18000 ECDSA P-256 signing operations in 1053908us (17079.3 ops/sec)
Did 1078 ECDSA P-384 signing operations in 1087853us (990.9 ops/sec)
Did 473 ECDSA P-521 signing operations in 1069835us (442.1 ops/sec)
After:
Did 16000 ECDSA P-224 signing operations in 1064799us (15026.3 ops/sec)
Did 19000 ECDSA P-256 signing operations in 1007839us (18852.2 ops/sec)
Did 1078 ECDSA P-384 signing operations in 1079413us (998.7 ops/sec)
Did 484 ECDSA P-521 signing operations in 1083616us (446.7 ops/sec)
Change-Id: I2a25e90fc99dac13c0616d0ea45e125a4bd8cca1
Reviewed-on: https://boringssl-review.googlesource.com/23075
Reviewed-by: Adam Langley <agl@google.com>
2017-11-13 03:58:00 +00:00
|
|
|
uint8_t p_str[33];
|
|
|
|
OPENSSL_memcpy(p_str, g_scalar->bytes, 32);
|
|
|
|
p_str[32] = 0;
|
2015-11-03 22:02:04 +00:00
|
|
|
|
2017-08-18 19:06:02 +01:00
|
|
|
// First window
|
2015-11-08 08:15:32 +00:00
|
|
|
unsigned wvalue = (p_str[0] << 1) & kMask;
|
|
|
|
unsigned index = kWindowSize;
|
2015-11-03 22:02:04 +00:00
|
|
|
|
2015-11-08 08:15:32 +00:00
|
|
|
wvalue = booth_recode_w7(wvalue);
|
2015-11-03 22:02:04 +00:00
|
|
|
|
2015-11-08 08:15:32 +00:00
|
|
|
const PRECOMP256_ROW *const precomputed_table =
|
|
|
|
(const PRECOMP256_ROW *)ecp_nistz256_precomputed;
|
|
|
|
ecp_nistz256_select_w7(&p.a, precomputed_table[0], wvalue >> 1);
|
2015-11-03 22:02:04 +00:00
|
|
|
|
2015-11-08 08:15:32 +00:00
|
|
|
ecp_nistz256_neg(p.p.Z, p.p.Y);
|
|
|
|
copy_conditional(p.p.Y, p.p.Z, wvalue & 1);
|
2015-11-03 22:02:04 +00:00
|
|
|
|
2017-08-18 19:06:02 +01:00
|
|
|
// Convert |p| from affine to Jacobian coordinates. We set Z to zero if |p|
|
|
|
|
// is infinity and |ONE| otherwise. |p| was computed from the table, so it
|
|
|
|
// is infinity iff |wvalue >> 1| is zero.
|
2016-12-13 06:07:13 +00:00
|
|
|
OPENSSL_memset(p.p.Z, 0, sizeof(p.p.Z));
|
2016-11-11 13:38:49 +00:00
|
|
|
copy_conditional(p.p.Z, ONE, is_not_zero(wvalue >> 1));
|
2015-11-03 22:02:04 +00:00
|
|
|
|
Make ECDSA signing 10% faster and plug some timing leaks.
None of the asymmetric crypto we inherented from OpenSSL is
constant-time because of BIGNUM. BIGNUM chops leading zeros off the
front of everything, so we end up leaking information about the first
word, in theory. BIGNUM functions additionally tend to take the full
range of inputs and then call into BN_nnmod at various points.
All our secret values should be acted on in constant-time, but k in
ECDSA is a particularly sensitive value. So, ecdsa_sign_setup, in an
attempt to mitigate the BIGNUM leaks, would add a couple copies of the
order.
This does not work at all. k is used to compute two values: k^-1 and kG.
The first operation when computing k^-1 is to call BN_nnmod if k is out
of range. The entry point to our tuned constant-time curve
implementations is to call BN_nnmod if the scalar has too many bits,
which this causes. The result is both corrections are immediately undone
but cause us to do more variable-time work in the meantime.
Replace all these computations around k with the word-based functions
added in the various preceding CLs. In doing so, replace the BN_mod_mul
calls (which internally call BN_nnmod) with Montgomery reduction. We can
avoid taking k^-1 out of Montgomery form, which combines nicely with
Brian Smith's trick in 3426d1011946b26ff1bb2fd98a081ba4753c9cc8. Along
the way, we avoid some unnecessary mallocs.
BIGNUM still affects the private key itself, as well as the EC_POINTs.
But this should hopefully be much better now. Also it's 10% faster:
Before:
Did 15000 ECDSA P-224 signing operations in 1069117us (14030.3 ops/sec)
Did 18000 ECDSA P-256 signing operations in 1053908us (17079.3 ops/sec)
Did 1078 ECDSA P-384 signing operations in 1087853us (990.9 ops/sec)
Did 473 ECDSA P-521 signing operations in 1069835us (442.1 ops/sec)
After:
Did 16000 ECDSA P-224 signing operations in 1064799us (15026.3 ops/sec)
Did 19000 ECDSA P-256 signing operations in 1007839us (18852.2 ops/sec)
Did 1078 ECDSA P-384 signing operations in 1079413us (998.7 ops/sec)
Did 484 ECDSA P-521 signing operations in 1083616us (446.7 ops/sec)
Change-Id: I2a25e90fc99dac13c0616d0ea45e125a4bd8cca1
Reviewed-on: https://boringssl-review.googlesource.com/23075
Reviewed-by: Adam Langley <agl@google.com>
2017-11-13 03:58:00 +00:00
|
|
|
for (int i = 1; i < 37; i++) {
|
2015-11-08 08:15:32 +00:00
|
|
|
unsigned off = (index - 1) / 8;
|
|
|
|
wvalue = p_str[off] | p_str[off + 1] << 8;
|
|
|
|
wvalue = (wvalue >> ((index - 1) % 8)) & kMask;
|
|
|
|
index += kWindowSize;
|
2015-11-03 22:02:04 +00:00
|
|
|
|
2015-11-08 08:15:32 +00:00
|
|
|
wvalue = booth_recode_w7(wvalue);
|
2015-11-03 22:02:04 +00:00
|
|
|
|
2015-11-08 08:15:32 +00:00
|
|
|
ecp_nistz256_select_w7(&t.a, precomputed_table[i], wvalue >> 1);
|
2015-11-03 22:02:04 +00:00
|
|
|
|
2015-11-08 08:15:32 +00:00
|
|
|
ecp_nistz256_neg(t.p.Z, t.a.Y);
|
|
|
|
copy_conditional(t.a.Y, t.p.Z, wvalue & 1);
|
2015-11-03 22:02:04 +00:00
|
|
|
|
2015-11-08 08:15:32 +00:00
|
|
|
ecp_nistz256_point_add_affine(&p.p, &p.p, &t.a);
|
2015-11-03 22:02:04 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-11-13 01:05:22 +00:00
|
|
|
const int p_is_infinity = g_scalar == NULL;
|
|
|
|
if (p_scalar != NULL) {
|
2015-11-03 22:02:04 +00:00
|
|
|
P256_POINT *out = &t.p;
|
|
|
|
if (p_is_infinity) {
|
|
|
|
out = &p.p;
|
|
|
|
}
|
|
|
|
|
Make ECDSA signing 10% faster and plug some timing leaks.
None of the asymmetric crypto we inherented from OpenSSL is
constant-time because of BIGNUM. BIGNUM chops leading zeros off the
front of everything, so we end up leaking information about the first
word, in theory. BIGNUM functions additionally tend to take the full
range of inputs and then call into BN_nnmod at various points.
All our secret values should be acted on in constant-time, but k in
ECDSA is a particularly sensitive value. So, ecdsa_sign_setup, in an
attempt to mitigate the BIGNUM leaks, would add a couple copies of the
order.
This does not work at all. k is used to compute two values: k^-1 and kG.
The first operation when computing k^-1 is to call BN_nnmod if k is out
of range. The entry point to our tuned constant-time curve
implementations is to call BN_nnmod if the scalar has too many bits,
which this causes. The result is both corrections are immediately undone
but cause us to do more variable-time work in the meantime.
Replace all these computations around k with the word-based functions
added in the various preceding CLs. In doing so, replace the BN_mod_mul
calls (which internally call BN_nnmod) with Montgomery reduction. We can
avoid taking k^-1 out of Montgomery form, which combines nicely with
Brian Smith's trick in 3426d1011946b26ff1bb2fd98a081ba4753c9cc8. Along
the way, we avoid some unnecessary mallocs.
BIGNUM still affects the private key itself, as well as the EC_POINTs.
But this should hopefully be much better now. Also it's 10% faster:
Before:
Did 15000 ECDSA P-224 signing operations in 1069117us (14030.3 ops/sec)
Did 18000 ECDSA P-256 signing operations in 1053908us (17079.3 ops/sec)
Did 1078 ECDSA P-384 signing operations in 1087853us (990.9 ops/sec)
Did 473 ECDSA P-521 signing operations in 1069835us (442.1 ops/sec)
After:
Did 16000 ECDSA P-224 signing operations in 1064799us (15026.3 ops/sec)
Did 19000 ECDSA P-256 signing operations in 1007839us (18852.2 ops/sec)
Did 1078 ECDSA P-384 signing operations in 1079413us (998.7 ops/sec)
Did 484 ECDSA P-521 signing operations in 1083616us (446.7 ops/sec)
Change-Id: I2a25e90fc99dac13c0616d0ea45e125a4bd8cca1
Reviewed-on: https://boringssl-review.googlesource.com/23075
Reviewed-by: Adam Langley <agl@google.com>
2017-11-13 03:58:00 +00:00
|
|
|
if (!ecp_nistz256_windowed_mul(group, out, p_, p_scalar)) {
|
|
|
|
return 0;
|
2015-11-13 04:31:35 +00:00
|
|
|
}
|
2015-11-03 22:02:04 +00:00
|
|
|
|
|
|
|
if (!p_is_infinity) {
|
|
|
|
ecp_nistz256_point_add(&p.p, &p.p, out);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-08-18 19:06:02 +01:00
|
|
|
// Not constant-time, but we're only operating on the public output.
|
2016-03-09 03:09:40 +00:00
|
|
|
if (!bn_set_words(&r->X, p.p.X, P256_LIMBS) ||
|
|
|
|
!bn_set_words(&r->Y, p.p.Y, P256_LIMBS) ||
|
|
|
|
!bn_set_words(&r->Z, p.p.Z, P256_LIMBS)) {
|
|
|
|
return 0;
|
|
|
|
}
|
2015-11-03 22:02:04 +00:00
|
|
|
|
Make ECDSA signing 10% faster and plug some timing leaks.
None of the asymmetric crypto we inherented from OpenSSL is
constant-time because of BIGNUM. BIGNUM chops leading zeros off the
front of everything, so we end up leaking information about the first
word, in theory. BIGNUM functions additionally tend to take the full
range of inputs and then call into BN_nnmod at various points.
All our secret values should be acted on in constant-time, but k in
ECDSA is a particularly sensitive value. So, ecdsa_sign_setup, in an
attempt to mitigate the BIGNUM leaks, would add a couple copies of the
order.
This does not work at all. k is used to compute two values: k^-1 and kG.
The first operation when computing k^-1 is to call BN_nnmod if k is out
of range. The entry point to our tuned constant-time curve
implementations is to call BN_nnmod if the scalar has too many bits,
which this causes. The result is both corrections are immediately undone
but cause us to do more variable-time work in the meantime.
Replace all these computations around k with the word-based functions
added in the various preceding CLs. In doing so, replace the BN_mod_mul
calls (which internally call BN_nnmod) with Montgomery reduction. We can
avoid taking k^-1 out of Montgomery form, which combines nicely with
Brian Smith's trick in 3426d1011946b26ff1bb2fd98a081ba4753c9cc8. Along
the way, we avoid some unnecessary mallocs.
BIGNUM still affects the private key itself, as well as the EC_POINTs.
But this should hopefully be much better now. Also it's 10% faster:
Before:
Did 15000 ECDSA P-224 signing operations in 1069117us (14030.3 ops/sec)
Did 18000 ECDSA P-256 signing operations in 1053908us (17079.3 ops/sec)
Did 1078 ECDSA P-384 signing operations in 1087853us (990.9 ops/sec)
Did 473 ECDSA P-521 signing operations in 1069835us (442.1 ops/sec)
After:
Did 16000 ECDSA P-224 signing operations in 1064799us (15026.3 ops/sec)
Did 19000 ECDSA P-256 signing operations in 1007839us (18852.2 ops/sec)
Did 1078 ECDSA P-384 signing operations in 1079413us (998.7 ops/sec)
Did 484 ECDSA P-521 signing operations in 1083616us (446.7 ops/sec)
Change-Id: I2a25e90fc99dac13c0616d0ea45e125a4bd8cca1
Reviewed-on: https://boringssl-review.googlesource.com/23075
Reviewed-by: Adam Langley <agl@google.com>
2017-11-13 03:58:00 +00:00
|
|
|
return 1;
|
2015-11-03 22:02:04 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static int ecp_nistz256_get_affine(const EC_GROUP *group, const EC_POINT *point,
|
|
|
|
BIGNUM *x, BIGNUM *y, BN_CTX *ctx) {
|
|
|
|
BN_ULONG z_inv2[P256_LIMBS];
|
|
|
|
BN_ULONG z_inv3[P256_LIMBS];
|
|
|
|
BN_ULONG point_x[P256_LIMBS], point_y[P256_LIMBS], point_z[P256_LIMBS];
|
|
|
|
|
|
|
|
if (EC_POINT_is_at_infinity(group, point)) {
|
|
|
|
OPENSSL_PUT_ERROR(EC, EC_R_POINT_AT_INFINITY);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!ecp_nistz256_bignum_to_field_elem(point_x, &point->X) ||
|
|
|
|
!ecp_nistz256_bignum_to_field_elem(point_y, &point->Y) ||
|
|
|
|
!ecp_nistz256_bignum_to_field_elem(point_z, &point->Z)) {
|
|
|
|
OPENSSL_PUT_ERROR(EC, EC_R_COORDINATES_OUT_OF_RANGE);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2016-11-11 03:58:36 +00:00
|
|
|
ecp_nistz256_mod_inverse_mont(z_inv3, point_z);
|
2015-11-03 22:02:04 +00:00
|
|
|
ecp_nistz256_sqr_mont(z_inv2, z_inv3);
|
|
|
|
|
2017-08-18 19:06:02 +01:00
|
|
|
// Instead of using |ecp_nistz256_from_mont| to convert the |x| coordinate
|
|
|
|
// and then calling |ecp_nistz256_from_mont| again to convert the |y|
|
|
|
|
// coordinate below, convert the common factor |z_inv2| once now, saving one
|
|
|
|
// reduction.
|
2016-11-11 23:52:39 +00:00
|
|
|
ecp_nistz256_from_mont(z_inv2, z_inv2);
|
2016-03-26 00:22:40 +00:00
|
|
|
|
2016-03-26 00:29:52 +00:00
|
|
|
if (x != NULL) {
|
2016-07-18 23:17:18 +01:00
|
|
|
BN_ULONG x_aff[P256_LIMBS];
|
|
|
|
ecp_nistz256_mul_mont(x_aff, z_inv2, point_x);
|
|
|
|
if (!bn_set_words(x, x_aff, P256_LIMBS)) {
|
2015-11-13 04:31:35 +00:00
|
|
|
OPENSSL_PUT_ERROR(EC, ERR_R_MALLOC_FAILURE);
|
|
|
|
return 0;
|
|
|
|
}
|
2015-11-03 22:02:04 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
if (y != NULL) {
|
2016-07-18 23:17:18 +01:00
|
|
|
BN_ULONG y_aff[P256_LIMBS];
|
2015-11-03 22:02:04 +00:00
|
|
|
ecp_nistz256_mul_mont(z_inv3, z_inv3, z_inv2);
|
2016-07-18 23:17:18 +01:00
|
|
|
ecp_nistz256_mul_mont(y_aff, z_inv3, point_y);
|
|
|
|
if (!bn_set_words(y, y_aff, P256_LIMBS)) {
|
2015-11-13 04:31:35 +00:00
|
|
|
OPENSSL_PUT_ERROR(EC, ERR_R_MALLOC_FAILURE);
|
|
|
|
return 0;
|
|
|
|
}
|
2015-11-03 22:02:04 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
2017-05-02 22:25:39 +01:00
|
|
|
DEFINE_METHOD_FUNCTION(EC_METHOD, EC_GFp_nistz256_method) {
|
|
|
|
out->group_init = ec_GFp_mont_group_init;
|
|
|
|
out->group_finish = ec_GFp_mont_group_finish;
|
|
|
|
out->group_set_curve = ec_GFp_mont_group_set_curve;
|
|
|
|
out->point_get_affine_coordinates = ecp_nistz256_get_affine;
|
|
|
|
out->mul = ecp_nistz256_points_mul;
|
|
|
|
out->field_mul = ec_GFp_mont_field_mul;
|
|
|
|
out->field_sqr = ec_GFp_mont_field_sqr;
|
|
|
|
out->field_encode = ec_GFp_mont_field_encode;
|
|
|
|
out->field_decode = ec_GFp_mont_field_decode;
|
2016-08-14 21:41:27 +01:00
|
|
|
};
|
2015-11-03 22:02:04 +00:00
|
|
|
|
|
|
|
#endif /* !defined(OPENSSL_NO_ASM) && defined(OPENSSL_X86_64) && \
|
|
|
|
!defined(OPENSSL_SMALL) */
|