You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

Make ECDSA signing 10% faster and plug some timing leaks. None of the asymmetric crypto we inherented from OpenSSL is constant-time because of BIGNUM. BIGNUM chops leading zeros off the front of everything, so we end up leaking information about the first word, in theory. BIGNUM functions additionally tend to take the full range of inputs and then call into BN_nnmod at various points. All our secret values should be acted on in constant-time, but k in ECDSA is a particularly sensitive value. So, ecdsa_sign_setup, in an attempt to mitigate the BIGNUM leaks, would add a couple copies of the order. This does not work at all. k is used to compute two values: k^-1 and kG. The first operation when computing k^-1 is to call BN_nnmod if k is out of range. The entry point to our tuned constant-time curve implementations is to call BN_nnmod if the scalar has too many bits, which this causes. The result is both corrections are immediately undone but cause us to do more variable-time work in the meantime. Replace all these computations around k with the word-based functions added in the various preceding CLs. In doing so, replace the BN_mod_mul calls (which internally call BN_nnmod) with Montgomery reduction. We can avoid taking k^-1 out of Montgomery form, which combines nicely with Brian Smith's trick in 3426d1011946b26ff1bb2fd98a081ba4753c9cc8. Along the way, we avoid some unnecessary mallocs. BIGNUM still affects the private key itself, as well as the EC_POINTs. But this should hopefully be much better now. Also it's 10% faster: Before: Did 15000 ECDSA P-224 signing operations in 1069117us (14030.3 ops/sec) Did 18000 ECDSA P-256 signing operations in 1053908us (17079.3 ops/sec) Did 1078 ECDSA P-384 signing operations in 1087853us (990.9 ops/sec) Did 473 ECDSA P-521 signing operations in 1069835us (442.1 ops/sec) After: Did 16000 ECDSA P-224 signing operations in 1064799us (15026.3 ops/sec) Did 19000 ECDSA P-256 signing operations in 1007839us (18852.2 ops/sec) Did 1078 ECDSA P-384 signing operations in 1079413us (998.7 ops/sec) Did 484 ECDSA P-521 signing operations in 1083616us (446.7 ops/sec) Change-Id: I2a25e90fc99dac13c0616d0ea45e125a4bd8cca1 Reviewed-on: https://boringssl-review.googlesource.com/23075 Reviewed-by: Adam Langley <agl@google.com>
7 jaren geleden
123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401
  1. /* Originally written by Bodo Moeller for the OpenSSL project.
  2. * ====================================================================
  3. * Copyright (c) 1998-2005 The OpenSSL Project. All rights reserved.
  4. *
  5. * Redistribution and use in source and binary forms, with or without
  6. * modification, are permitted provided that the following conditions
  7. * are met:
  8. *
  9. * 1. Redistributions of source code must retain the above copyright
  10. * notice, this list of conditions and the following disclaimer.
  11. *
  12. * 2. Redistributions in binary form must reproduce the above copyright
  13. * notice, this list of conditions and the following disclaimer in
  14. * the documentation and/or other materials provided with the
  15. * distribution.
  16. *
  17. * 3. All advertising materials mentioning features or use of this
  18. * software must display the following acknowledgment:
  19. * "This product includes software developed by the OpenSSL Project
  20. * for use in the OpenSSL Toolkit. (http://www.openssl.org/)"
  21. *
  22. * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
  23. * endorse or promote products derived from this software without
  24. * prior written permission. For written permission, please contact
  25. * openssl-core@openssl.org.
  26. *
  27. * 5. Products derived from this software may not be called "OpenSSL"
  28. * nor may "OpenSSL" appear in their names without prior written
  29. * permission of the OpenSSL Project.
  30. *
  31. * 6. Redistributions of any form whatsoever must retain the following
  32. * acknowledgment:
  33. * "This product includes software developed by the OpenSSL Project
  34. * for use in the OpenSSL Toolkit (http://www.openssl.org/)"
  35. *
  36. * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
  37. * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
  38. * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
  39. * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR
  40. * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
  41. * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
  42. * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
  43. * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
  44. * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
  45. * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
  46. * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
  47. * OF THE POSSIBILITY OF SUCH DAMAGE.
  48. * ====================================================================
  49. *
  50. * This product includes cryptographic software written by Eric Young
  51. * (eay@cryptsoft.com). This product includes software written by Tim
  52. * Hudson (tjh@cryptsoft.com).
  53. *
  54. */
  55. /* ====================================================================
  56. * Copyright 2002 Sun Microsystems, Inc. ALL RIGHTS RESERVED.
  57. *
  58. * Portions of the attached software ("Contribution") are developed by
  59. * SUN MICROSYSTEMS, INC., and are contributed to the OpenSSL project.
  60. *
  61. * The Contribution is licensed pursuant to the OpenSSL open source
  62. * license provided above.
  63. *
  64. * The elliptic curve binary polynomial software is originally written by
  65. * Sheueling Chang Shantz and Douglas Stebila of Sun Microsystems
  66. * Laboratories. */
  67. #ifndef OPENSSL_HEADER_EC_H
  68. #define OPENSSL_HEADER_EC_H
  69. #include <openssl/base.h>
  70. #if defined(__cplusplus)
  71. extern "C" {
  72. #endif
  73. // Low-level operations on elliptic curves.
  74. // point_conversion_form_t enumerates forms, as defined in X9.62 (ECDSA), for
  75. // the encoding of a elliptic curve point (x,y)
  76. typedef enum {
  77. // POINT_CONVERSION_COMPRESSED indicates that the point is encoded as z||x,
  78. // where the octet z specifies which solution of the quadratic equation y
  79. // is.
  80. POINT_CONVERSION_COMPRESSED = 2,
  81. // POINT_CONVERSION_UNCOMPRESSED indicates that the point is encoded as
  82. // z||x||y, where z is the octet 0x04.
  83. POINT_CONVERSION_UNCOMPRESSED = 4,
  84. // POINT_CONVERSION_HYBRID indicates that the point is encoded as z||x||y,
  85. // where z specifies which solution of the quadratic equation y is. This is
  86. // not supported by the code and has never been observed in use.
  87. //
  88. // TODO(agl): remove once node.js no longer references this.
  89. POINT_CONVERSION_HYBRID = 6,
  90. } point_conversion_form_t;
  91. // Elliptic curve groups.
  92. // EC_GROUP_new_by_curve_name returns a fresh EC_GROUP object for the elliptic
  93. // curve specified by |nid|, or NULL on error.
  94. //
  95. // The supported NIDs are:
  96. // NID_secp224r1 (P-224),
  97. // NID_X9_62_prime256v1 (P-256),
  98. // NID_secp384r1 (P-384),
  99. // NID_secp521r1 (P-521)
  100. //
  101. // If in doubt, use |NID_X9_62_prime256v1|, or see the curve25519.h header for
  102. // more modern primitives.
  103. OPENSSL_EXPORT EC_GROUP *EC_GROUP_new_by_curve_name(int nid);
  104. // EC_GROUP_free releases a reference to |group|.
  105. OPENSSL_EXPORT void EC_GROUP_free(EC_GROUP *group);
  106. // EC_GROUP_dup takes a reference to |a| and returns it.
  107. OPENSSL_EXPORT EC_GROUP *EC_GROUP_dup(const EC_GROUP *a);
  108. // EC_GROUP_cmp returns zero if |a| and |b| are the same group and non-zero
  109. // otherwise.
  110. OPENSSL_EXPORT int EC_GROUP_cmp(const EC_GROUP *a, const EC_GROUP *b,
  111. BN_CTX *ignored);
  112. // EC_GROUP_get0_generator returns a pointer to the internal |EC_POINT| object
  113. // in |group| that specifies the generator for the group.
  114. OPENSSL_EXPORT const EC_POINT *EC_GROUP_get0_generator(const EC_GROUP *group);
  115. // EC_GROUP_get0_order returns a pointer to the internal |BIGNUM| object in
  116. // |group| that specifies the order of the group.
  117. OPENSSL_EXPORT const BIGNUM *EC_GROUP_get0_order(const EC_GROUP *group);
  118. // EC_GROUP_get_cofactor sets |*cofactor| to the cofactor of |group| using
  119. // |ctx|, if it's not NULL. It returns one on success and zero otherwise.
  120. OPENSSL_EXPORT int EC_GROUP_get_cofactor(const EC_GROUP *group,
  121. BIGNUM *cofactor, BN_CTX *ctx);
  122. // EC_GROUP_get_curve_GFp gets various parameters about a group. It sets
  123. // |*out_p| to the order of the coordinate field and |*out_a| and |*out_b| to
  124. // the parameters of the curve when expressed as y² = x³ + ax + b. Any of the
  125. // output parameters can be NULL. It returns one on success and zero on
  126. // error.
  127. OPENSSL_EXPORT int EC_GROUP_get_curve_GFp(const EC_GROUP *group, BIGNUM *out_p,
  128. BIGNUM *out_a, BIGNUM *out_b,
  129. BN_CTX *ctx);
  130. // EC_GROUP_get_curve_name returns a NID that identifies |group|.
  131. OPENSSL_EXPORT int EC_GROUP_get_curve_name(const EC_GROUP *group);
  132. // EC_GROUP_get_degree returns the number of bits needed to represent an
  133. // element of the field underlying |group|.
  134. OPENSSL_EXPORT unsigned EC_GROUP_get_degree(const EC_GROUP *group);
  135. // Points on elliptic curves.
  136. // EC_POINT_new returns a fresh |EC_POINT| object in the given group, or NULL
  137. // on error.
  138. OPENSSL_EXPORT EC_POINT *EC_POINT_new(const EC_GROUP *group);
  139. // EC_POINT_free frees |point| and the data that it points to.
  140. OPENSSL_EXPORT void EC_POINT_free(EC_POINT *point);
  141. // EC_POINT_copy sets |*dest| equal to |*src|. It returns one on success and
  142. // zero otherwise.
  143. OPENSSL_EXPORT int EC_POINT_copy(EC_POINT *dest, const EC_POINT *src);
  144. // EC_POINT_dup returns a fresh |EC_POINT| that contains the same values as
  145. // |src|, or NULL on error.
  146. OPENSSL_EXPORT EC_POINT *EC_POINT_dup(const EC_POINT *src,
  147. const EC_GROUP *group);
  148. // EC_POINT_set_to_infinity sets |point| to be the "point at infinity" for the
  149. // given group.
  150. OPENSSL_EXPORT int EC_POINT_set_to_infinity(const EC_GROUP *group,
  151. EC_POINT *point);
  152. // EC_POINT_is_at_infinity returns one iff |point| is the point at infinity and
  153. // zero otherwise.
  154. OPENSSL_EXPORT int EC_POINT_is_at_infinity(const EC_GROUP *group,
  155. const EC_POINT *point);
  156. // EC_POINT_is_on_curve returns one if |point| is an element of |group| and
  157. // and zero otherwise or when an error occurs. This is different from OpenSSL,
  158. // which returns -1 on error. If |ctx| is non-NULL, it may be used.
  159. OPENSSL_EXPORT int EC_POINT_is_on_curve(const EC_GROUP *group,
  160. const EC_POINT *point, BN_CTX *ctx);
  161. // EC_POINT_cmp returns zero if |a| is equal to |b|, greater than zero if
  162. // not equal and -1 on error. If |ctx| is not NULL, it may be used.
  163. OPENSSL_EXPORT int EC_POINT_cmp(const EC_GROUP *group, const EC_POINT *a,
  164. const EC_POINT *b, BN_CTX *ctx);
  165. // Point conversion.
  166. // EC_POINT_get_affine_coordinates_GFp sets |x| and |y| to the affine value of
  167. // |point| using |ctx|, if it's not NULL. It returns one on success and zero
  168. // otherwise.
  169. //
  170. // Either |x| or |y| may be NULL to skip computing that coordinate. This is
  171. // slightly faster in the common case where only the x-coordinate is needed.
  172. OPENSSL_EXPORT int EC_POINT_get_affine_coordinates_GFp(const EC_GROUP *group,
  173. const EC_POINT *point,
  174. BIGNUM *x, BIGNUM *y,
  175. BN_CTX *ctx);
  176. // EC_POINT_set_affine_coordinates_GFp sets the value of |point| to be
  177. // (|x|, |y|). The |ctx| argument may be used if not NULL. It returns one
  178. // on success or zero on error. Note that, unlike with OpenSSL, it's
  179. // considered an error if the point is not on the curve.
  180. OPENSSL_EXPORT int EC_POINT_set_affine_coordinates_GFp(const EC_GROUP *group,
  181. EC_POINT *point,
  182. const BIGNUM *x,
  183. const BIGNUM *y,
  184. BN_CTX *ctx);
  185. // EC_POINT_point2oct serialises |point| into the X9.62 form given by |form|
  186. // into, at most, |len| bytes at |buf|. It returns the number of bytes written
  187. // or zero on error if |buf| is non-NULL, else the number of bytes needed. The
  188. // |ctx| argument may be used if not NULL.
  189. OPENSSL_EXPORT size_t EC_POINT_point2oct(const EC_GROUP *group,
  190. const EC_POINT *point,
  191. point_conversion_form_t form,
  192. uint8_t *buf, size_t len, BN_CTX *ctx);
  193. // EC_POINT_point2cbb behaves like |EC_POINT_point2oct| but appends the
  194. // serialised point to |cbb|. It returns one on success and zero on error.
  195. OPENSSL_EXPORT int EC_POINT_point2cbb(CBB *out, const EC_GROUP *group,
  196. const EC_POINT *point,
  197. point_conversion_form_t form,
  198. BN_CTX *ctx);
  199. // EC_POINT_oct2point sets |point| from |len| bytes of X9.62 format
  200. // serialisation in |buf|. It returns one on success and zero otherwise. The
  201. // |ctx| argument may be used if not NULL.
  202. OPENSSL_EXPORT int EC_POINT_oct2point(const EC_GROUP *group, EC_POINT *point,
  203. const uint8_t *buf, size_t len,
  204. BN_CTX *ctx);
  205. // EC_POINT_set_compressed_coordinates_GFp sets |point| to equal the point with
  206. // the given |x| coordinate and the y coordinate specified by |y_bit| (see
  207. // X9.62). It returns one on success and zero otherwise.
  208. OPENSSL_EXPORT int EC_POINT_set_compressed_coordinates_GFp(
  209. const EC_GROUP *group, EC_POINT *point, const BIGNUM *x, int y_bit,
  210. BN_CTX *ctx);
  211. // Group operations.
  212. // EC_POINT_add sets |r| equal to |a| plus |b|. It returns one on success and
  213. // zero otherwise. If |ctx| is not NULL, it may be used.
  214. OPENSSL_EXPORT int EC_POINT_add(const EC_GROUP *group, EC_POINT *r,
  215. const EC_POINT *a, const EC_POINT *b,
  216. BN_CTX *ctx);
  217. // EC_POINT_dbl sets |r| equal to |a| plus |a|. It returns one on success and
  218. // zero otherwise. If |ctx| is not NULL, it may be used.
  219. OPENSSL_EXPORT int EC_POINT_dbl(const EC_GROUP *group, EC_POINT *r,
  220. const EC_POINT *a, BN_CTX *ctx);
  221. // EC_POINT_invert sets |a| equal to minus |a|. It returns one on success and
  222. // zero otherwise. If |ctx| is not NULL, it may be used.
  223. OPENSSL_EXPORT int EC_POINT_invert(const EC_GROUP *group, EC_POINT *a,
  224. BN_CTX *ctx);
  225. // EC_POINT_mul sets r = generator*n + q*m. It returns one on success and zero
  226. // otherwise. If |ctx| is not NULL, it may be used.
  227. OPENSSL_EXPORT int EC_POINT_mul(const EC_GROUP *group, EC_POINT *r,
  228. const BIGNUM *n, const EC_POINT *q,
  229. const BIGNUM *m, BN_CTX *ctx);
  230. // Deprecated functions.
  231. // EC_GROUP_new_curve_GFp creates a new, arbitrary elliptic curve group based
  232. // on the equation y² = x³ + a·x + b. It returns the new group or NULL on
  233. // error.
  234. //
  235. // This new group has no generator. It is an error to use a generator-less group
  236. // with any functions except for |EC_GROUP_free|, |EC_POINT_new|,
  237. // |EC_POINT_set_affine_coordinates_GFp|, and |EC_GROUP_set_generator|.
  238. //
  239. // |EC_GROUP|s returned by this function will always compare as unequal via
  240. // |EC_GROUP_cmp| (even to themselves). |EC_GROUP_get_curve_name| will always
  241. // return |NID_undef|.
  242. //
  243. // Avoid using arbitrary curves and use |EC_GROUP_new_by_curve_name| instead.
  244. OPENSSL_EXPORT EC_GROUP *EC_GROUP_new_curve_GFp(const BIGNUM *p,
  245. const BIGNUM *a,
  246. const BIGNUM *b, BN_CTX *ctx);
  247. // EC_GROUP_set_generator sets the generator for |group| to |generator|, which
  248. // must have the given order and cofactor. It may only be used with |EC_GROUP|
  249. // objects returned by |EC_GROUP_new_curve_GFp| and may only be used once on
  250. // each group. |generator| must have been created using |group|.
  251. OPENSSL_EXPORT int EC_GROUP_set_generator(EC_GROUP *group,
  252. const EC_POINT *generator,
  253. const BIGNUM *order,
  254. const BIGNUM *cofactor);
  255. // EC_GROUP_get_order sets |*order| to the order of |group|, if it's not
  256. // NULL. It returns one on success and zero otherwise. |ctx| is ignored. Use
  257. // |EC_GROUP_get0_order| instead.
  258. OPENSSL_EXPORT int EC_GROUP_get_order(const EC_GROUP *group, BIGNUM *order,
  259. BN_CTX *ctx);
  260. // EC_GROUP_set_asn1_flag does nothing.
  261. OPENSSL_EXPORT void EC_GROUP_set_asn1_flag(EC_GROUP *group, int flag);
  262. #define OPENSSL_EC_NAMED_CURVE 0
  263. typedef struct ec_method_st EC_METHOD;
  264. // EC_GROUP_method_of returns NULL.
  265. OPENSSL_EXPORT const EC_METHOD *EC_GROUP_method_of(const EC_GROUP *group);
  266. // EC_METHOD_get_field_type returns NID_X9_62_prime_field.
  267. OPENSSL_EXPORT int EC_METHOD_get_field_type(const EC_METHOD *meth);
  268. // EC_GROUP_set_point_conversion_form aborts the process if |form| is not
  269. // |POINT_CONVERSION_UNCOMPRESSED| and otherwise does nothing.
  270. OPENSSL_EXPORT void EC_GROUP_set_point_conversion_form(
  271. EC_GROUP *group, point_conversion_form_t form);
  272. // EC_builtin_curve describes a supported elliptic curve.
  273. typedef struct {
  274. int nid;
  275. const char *comment;
  276. } EC_builtin_curve;
  277. // EC_get_builtin_curves writes at most |max_num_curves| elements to
  278. // |out_curves| and returns the total number that it would have written, had
  279. // |max_num_curves| been large enough.
  280. //
  281. // The |EC_builtin_curve| items describe the supported elliptic curves.
  282. OPENSSL_EXPORT size_t EC_get_builtin_curves(EC_builtin_curve *out_curves,
  283. size_t max_num_curves);
  284. // EC_POINT_clear_free calls |EC_POINT_free|.
  285. OPENSSL_EXPORT void EC_POINT_clear_free(EC_POINT *point);
  286. // Old code expects to get EC_KEY from ec.h.
  287. #include <openssl/ec_key.h>
  288. #if defined(__cplusplus)
  289. } // extern C
  290. extern "C++" {
  291. namespace bssl {
  292. BORINGSSL_MAKE_DELETER(EC_POINT, EC_POINT_free)
  293. BORINGSSL_MAKE_DELETER(EC_GROUP, EC_GROUP_free)
  294. } // namespace bssl
  295. } // extern C++
  296. #endif
  297. #define EC_R_BUFFER_TOO_SMALL 100
  298. #define EC_R_COORDINATES_OUT_OF_RANGE 101
  299. #define EC_R_D2I_ECPKPARAMETERS_FAILURE 102
  300. #define EC_R_EC_GROUP_NEW_BY_NAME_FAILURE 103
  301. #define EC_R_GROUP2PKPARAMETERS_FAILURE 104
  302. #define EC_R_I2D_ECPKPARAMETERS_FAILURE 105
  303. #define EC_R_INCOMPATIBLE_OBJECTS 106
  304. #define EC_R_INVALID_COMPRESSED_POINT 107
  305. #define EC_R_INVALID_COMPRESSION_BIT 108
  306. #define EC_R_INVALID_ENCODING 109
  307. #define EC_R_INVALID_FIELD 110
  308. #define EC_R_INVALID_FORM 111
  309. #define EC_R_INVALID_GROUP_ORDER 112
  310. #define EC_R_INVALID_PRIVATE_KEY 113
  311. #define EC_R_MISSING_PARAMETERS 114
  312. #define EC_R_MISSING_PRIVATE_KEY 115
  313. #define EC_R_NON_NAMED_CURVE 116
  314. #define EC_R_NOT_INITIALIZED 117
  315. #define EC_R_PKPARAMETERS2GROUP_FAILURE 118
  316. #define EC_R_POINT_AT_INFINITY 119
  317. #define EC_R_POINT_IS_NOT_ON_CURVE 120
  318. #define EC_R_SLOT_FULL 121
  319. #define EC_R_UNDEFINED_GENERATOR 122
  320. #define EC_R_UNKNOWN_GROUP 123
  321. #define EC_R_UNKNOWN_ORDER 124
  322. #define EC_R_WRONG_ORDER 125
  323. #define EC_R_BIGNUM_OUT_OF_RANGE 126
  324. #define EC_R_WRONG_CURVE_PARAMETERS 127
  325. #define EC_R_DECODE_ERROR 128
  326. #define EC_R_ENCODE_ERROR 129
  327. #define EC_R_GROUP_MISMATCH 130
  328. #define EC_R_INVALID_COFACTOR 131
  329. #define EC_R_PUBLIC_KEY_VALIDATION_FAILED 132
  330. #define EC_R_INVALID_SCALAR 133
  331. #endif // OPENSSL_HEADER_EC_H