blob: 706e0ee4d8129ee12a7130788f6c4075fcda79b4 [file] [log] [blame]
Manuel Pégourié-Gonnard32b04c12013-12-02 15:49:09 +01001/*
2 * Elliptic curves over GF(p): curve-specific data and functions
3 *
4 * Copyright (C) 2006-2013, Brainspark B.V.
5 *
6 * This file is part of PolarSSL (http://www.polarssl.org)
7 * Lead Maintainer: Paul Bakker <polarssl_maintainer at polarssl.org>
8 *
9 * All rights reserved.
10 *
11 * This program is free software; you can redistribute it and/or modify
12 * it under the terms of the GNU General Public License as published by
13 * the Free Software Foundation; either version 2 of the License, or
14 * (at your option) any later version.
15 *
16 * This program is distributed in the hope that it will be useful,
17 * but WITHOUT ANY WARRANTY; without even the implied warranty of
18 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
19 * GNU General Public License for more details.
20 *
21 * You should have received a copy of the GNU General Public License along
22 * with this program; if not, write to the Free Software Foundation, Inc.,
23 * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
24 */
25
26#include "polarssl/config.h"
27
28#if defined(POLARSSL_ECP_C)
29
30#include "polarssl/ecp.h"
31
Paul Bakker498fd352013-12-02 22:17:24 +010032#if defined(_MSC_VER) && !defined(inline)
33#define inline _inline
34#else
35#if defined(__ARMCC_VERSION) && !defined(inline)
36#define inline __inline
37#endif /* __ARMCC_VERSION */
38#endif /*_MSC_VER */
39
Manuel Pégourié-Gonnardbaee5d42013-12-06 13:38:41 +010040/*
41 * Conversion macros for embedded constants:
Manuel Pégourié-Gonnard14a96c52013-12-11 12:15:28 +010042 * build lists of t_uint's from lists of unsigned char's grouped by 8, 4 or 2
Manuel Pégourié-Gonnardbaee5d42013-12-06 13:38:41 +010043 */
Manuel Pégourié-Gonnard731d08b2013-12-06 12:16:10 +010044#if defined(POLARSSL_HAVE_INT8)
45
Manuel Pégourié-Gonnard95b45b72013-12-11 12:03:23 +010046#define BYTES_TO_T_UINT_8( a, b, c, d, e, f, g, h ) \
Manuel Pégourié-Gonnard731d08b2013-12-06 12:16:10 +010047 a, b, c, d, e, f, g, h
48
Manuel Pégourié-Gonnard14a96c52013-12-11 12:15:28 +010049#define BYTES_TO_T_UINT_4( a, b, c, d ) \
50 a, b, c, d
51
52#define BYTES_TO_T_UINT_2( a, b ) \
53 a, b
54
Manuel Pégourié-Gonnard731d08b2013-12-06 12:16:10 +010055#elif defined(POLARSSL_HAVE_INT16)
56
Manuel Pégourié-Gonnard95b45b72013-12-11 12:03:23 +010057#define BYTES_TO_T_UINT_2( a, b ) \
58 ( (t_uint) a << 0 ) | \
Manuel Pégourié-Gonnard731d08b2013-12-06 12:16:10 +010059 ( (t_uint) b << 8 )
Manuel Pégourié-Gonnard95b45b72013-12-11 12:03:23 +010060
Manuel Pégourié-Gonnard14a96c52013-12-11 12:15:28 +010061#define BYTES_TO_T_UINT_4( a, b, c, d ) \
62 BYTES_TO_T_UINT_2( a, b ), \
63 BYTES_TO_T_UINT_2( c, d )
64
Manuel Pégourié-Gonnard95b45b72013-12-11 12:03:23 +010065#define BYTES_TO_T_UINT_8( a, b, c, d, e, f, g, h ) \
66 BYTES_TO_T_UINT_2( a, b ), \
67 BYTES_TO_T_UINT_2( c, d ), \
68 BYTES_TO_T_UINT_2( e, f ), \
69 BYTES_TO_T_UINT_2( g, h )
Manuel Pégourié-Gonnard731d08b2013-12-06 12:16:10 +010070
71#elif defined(POLARSSL_HAVE_INT32)
72
Manuel Pégourié-Gonnard95b45b72013-12-11 12:03:23 +010073#define BYTES_TO_T_UINT_4( a, b, c, d ) \
74 ( (t_uint) a << 0 ) | \
75 ( (t_uint) b << 8 ) | \
76 ( (t_uint) c << 16 ) | \
Manuel Pégourié-Gonnard731d08b2013-12-06 12:16:10 +010077 ( (t_uint) d << 24 )
Manuel Pégourié-Gonnard95b45b72013-12-11 12:03:23 +010078
Manuel Pégourié-Gonnard14a96c52013-12-11 12:15:28 +010079#define BYTES_TO_T_UINT_2( a, b ) \
80 BYTES_TO_T_UINT_4( a, b, 0, 0 )
81
Manuel Pégourié-Gonnard95b45b72013-12-11 12:03:23 +010082#define BYTES_TO_T_UINT_8( a, b, c, d, e, f, g, h ) \
Manuel Pégourié-Gonnard69ab3542013-12-12 15:50:08 +010083 BYTES_TO_T_UINT_4( a, b, c, d ), \
Manuel Pégourié-Gonnard95b45b72013-12-11 12:03:23 +010084 BYTES_TO_T_UINT_4( e, f, g, h )
Manuel Pégourié-Gonnard731d08b2013-12-06 12:16:10 +010085
86#else /* 64-bits */
87
Manuel Pégourié-Gonnard95b45b72013-12-11 12:03:23 +010088#define BYTES_TO_T_UINT_8( a, b, c, d, e, f, g, h ) \
Manuel Pégourié-Gonnard731d08b2013-12-06 12:16:10 +010089 ( (t_uint) a << 0 ) | \
90 ( (t_uint) b << 8 ) | \
91 ( (t_uint) c << 16 ) | \
92 ( (t_uint) d << 24 ) | \
93 ( (t_uint) e << 32 ) | \
94 ( (t_uint) f << 40 ) | \
95 ( (t_uint) g << 48 ) | \
96 ( (t_uint) h << 56 )
97
Manuel Pégourié-Gonnard14a96c52013-12-11 12:15:28 +010098#define BYTES_TO_T_UINT_4( a, b, c, d ) \
99 BYTES_TO_T_UINT_8( a, b, c, d, 0, 0, 0, 0 )
100
101#define BYTES_TO_T_UINT_2( a, b ) \
102 BYTES_TO_T_UINT_8( a, b, 0, 0, 0, 0, 0, 0 )
103
Manuel Pégourié-Gonnard731d08b2013-12-06 12:16:10 +0100104#endif /* bits in t_uint */
105
Manuel Pégourié-Gonnard32b04c12013-12-02 15:49:09 +0100106/*
Manuel Pégourié-Gonnard14a96c52013-12-11 12:15:28 +0100107 * Note: the constants are in little-endian order
108 * to be directly usable in MPIs
109 */
110
111/*
Manuel Pégourié-Gonnard32b04c12013-12-02 15:49:09 +0100112 * Domain parameters for secp192r1
113 */
Manuel Pégourié-Gonnardbaee5d42013-12-06 13:38:41 +0100114#if defined(POLARSSL_ECP_DP_SECP192R1_ENABLED)
Manuel Pégourié-Gonnard731d08b2013-12-06 12:16:10 +0100115static t_uint secp192r1_p[] = {
Manuel Pégourié-Gonnard95b45b72013-12-11 12:03:23 +0100116 BYTES_TO_T_UINT_8( 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF ),
117 BYTES_TO_T_UINT_8( 0xFE, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF ),
118 BYTES_TO_T_UINT_8( 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF ),
Manuel Pégourié-Gonnard731d08b2013-12-06 12:16:10 +0100119};
Manuel Pégourié-Gonnard731d08b2013-12-06 12:16:10 +0100120static t_uint secp192r1_b[] = {
Manuel Pégourié-Gonnard95b45b72013-12-11 12:03:23 +0100121 BYTES_TO_T_UINT_8( 0xB1, 0xB9, 0x46, 0xC1, 0xEC, 0xDE, 0xB8, 0xFE ),
122 BYTES_TO_T_UINT_8( 0x49, 0x30, 0x24, 0x72, 0xAB, 0xE9, 0xA7, 0x0F ),
123 BYTES_TO_T_UINT_8( 0xE7, 0x80, 0x9C, 0xE5, 0x19, 0x05, 0x21, 0x64 ),
Manuel Pégourié-Gonnard731d08b2013-12-06 12:16:10 +0100124};
125static t_uint secp192r1_gx[] = {
Manuel Pégourié-Gonnard95b45b72013-12-11 12:03:23 +0100126 BYTES_TO_T_UINT_8( 0x12, 0x10, 0xFF, 0x82, 0xFD, 0x0A, 0xFF, 0xF4 ),
127 BYTES_TO_T_UINT_8( 0x00, 0x88, 0xA1, 0x43, 0xEB, 0x20, 0xBF, 0x7C ),
128 BYTES_TO_T_UINT_8( 0xF6, 0x90, 0x30, 0xB0, 0x0E, 0xA8, 0x8D, 0x18 ),
Manuel Pégourié-Gonnard731d08b2013-12-06 12:16:10 +0100129};
130static t_uint secp192r1_gy[] = {
Manuel Pégourié-Gonnard95b45b72013-12-11 12:03:23 +0100131 BYTES_TO_T_UINT_8( 0x11, 0x48, 0x79, 0x1E, 0xA1, 0x77, 0xF9, 0x73 ),
132 BYTES_TO_T_UINT_8( 0xD5, 0xCD, 0x24, 0x6B, 0xED, 0x11, 0x10, 0x63 ),
133 BYTES_TO_T_UINT_8( 0x78, 0xDA, 0xC8, 0xFF, 0x95, 0x2B, 0x19, 0x07 ),
Manuel Pégourié-Gonnard731d08b2013-12-06 12:16:10 +0100134};
135static t_uint secp192r1_n[] = {
Manuel Pégourié-Gonnard95b45b72013-12-11 12:03:23 +0100136 BYTES_TO_T_UINT_8( 0x31, 0x28, 0xD2, 0xB4, 0xB1, 0xC9, 0x6B, 0x14 ),
137 BYTES_TO_T_UINT_8( 0x36, 0xF8, 0xDE, 0x99, 0xFF, 0xFF, 0xFF, 0xFF ),
138 BYTES_TO_T_UINT_8( 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF ),
Manuel Pégourié-Gonnard731d08b2013-12-06 12:16:10 +0100139};
Manuel Pégourié-Gonnardbaee5d42013-12-06 13:38:41 +0100140#endif /* POLARSSL_ECP_DP_SECP192R1_ENABLED */
Manuel Pégourié-Gonnard32b04c12013-12-02 15:49:09 +0100141
142/*
143 * Domain parameters for secp224r1
144 */
Manuel Pégourié-Gonnardbaee5d42013-12-06 13:38:41 +0100145#if defined(POLARSSL_ECP_DP_SECP224R1_ENABLED)
Manuel Pégourié-Gonnard731d08b2013-12-06 12:16:10 +0100146static t_uint secp224r1_p[] = {
Manuel Pégourié-Gonnard95b45b72013-12-11 12:03:23 +0100147 BYTES_TO_T_UINT_8( 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 ),
148 BYTES_TO_T_UINT_8( 0x00, 0x00, 0x00, 0x00, 0xFF, 0xFF, 0xFF, 0xFF ),
149 BYTES_TO_T_UINT_8( 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF ),
150 BYTES_TO_T_UINT_8( 0xFF, 0xFF, 0xFF, 0xFF, 0x00, 0x00, 0x00, 0x00 ),
Manuel Pégourié-Gonnard731d08b2013-12-06 12:16:10 +0100151};
Manuel Pégourié-Gonnard731d08b2013-12-06 12:16:10 +0100152static t_uint secp224r1_b[] = {
Manuel Pégourié-Gonnard95b45b72013-12-11 12:03:23 +0100153 BYTES_TO_T_UINT_8( 0xB4, 0xFF, 0x55, 0x23, 0x43, 0x39, 0x0B, 0x27 ),
154 BYTES_TO_T_UINT_8( 0xBA, 0xD8, 0xBF, 0xD7, 0xB7, 0xB0, 0x44, 0x50 ),
155 BYTES_TO_T_UINT_8( 0x56, 0x32, 0x41, 0xF5, 0xAB, 0xB3, 0x04, 0x0C ),
Manuel Pégourié-Gonnard14a96c52013-12-11 12:15:28 +0100156 BYTES_TO_T_UINT_4( 0x85, 0x0A, 0x05, 0xB4 ),
Manuel Pégourié-Gonnard731d08b2013-12-06 12:16:10 +0100157};
158static t_uint secp224r1_gx[] = {
Manuel Pégourié-Gonnard95b45b72013-12-11 12:03:23 +0100159 BYTES_TO_T_UINT_8( 0x21, 0x1D, 0x5C, 0x11, 0xD6, 0x80, 0x32, 0x34 ),
160 BYTES_TO_T_UINT_8( 0x22, 0x11, 0xC2, 0x56, 0xD3, 0xC1, 0x03, 0x4A ),
161 BYTES_TO_T_UINT_8( 0xB9, 0x90, 0x13, 0x32, 0x7F, 0xBF, 0xB4, 0x6B ),
Manuel Pégourié-Gonnard14a96c52013-12-11 12:15:28 +0100162 BYTES_TO_T_UINT_4( 0xBD, 0x0C, 0x0E, 0xB7 ),
Manuel Pégourié-Gonnard731d08b2013-12-06 12:16:10 +0100163};
164static t_uint secp224r1_gy[] = {
Manuel Pégourié-Gonnard95b45b72013-12-11 12:03:23 +0100165 BYTES_TO_T_UINT_8( 0x34, 0x7E, 0x00, 0x85, 0x99, 0x81, 0xD5, 0x44 ),
166 BYTES_TO_T_UINT_8( 0x64, 0x47, 0x07, 0x5A, 0xA0, 0x75, 0x43, 0xCD ),
167 BYTES_TO_T_UINT_8( 0xE6, 0xDF, 0x22, 0x4C, 0xFB, 0x23, 0xF7, 0xB5 ),
Manuel Pégourié-Gonnard14a96c52013-12-11 12:15:28 +0100168 BYTES_TO_T_UINT_4( 0x88, 0x63, 0x37, 0xBD ),
Manuel Pégourié-Gonnard731d08b2013-12-06 12:16:10 +0100169};
170static t_uint secp224r1_n[] = {
Manuel Pégourié-Gonnard95b45b72013-12-11 12:03:23 +0100171 BYTES_TO_T_UINT_8( 0x3D, 0x2A, 0x5C, 0x5C, 0x45, 0x29, 0xDD, 0x13 ),
172 BYTES_TO_T_UINT_8( 0x3E, 0xF0, 0xB8, 0xE0, 0xA2, 0x16, 0xFF, 0xFF ),
173 BYTES_TO_T_UINT_8( 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF ),
Manuel Pégourié-Gonnard14a96c52013-12-11 12:15:28 +0100174 BYTES_TO_T_UINT_4( 0xFF, 0xFF, 0xFF, 0xFF ),
Manuel Pégourié-Gonnard731d08b2013-12-06 12:16:10 +0100175};
Manuel Pégourié-Gonnardbaee5d42013-12-06 13:38:41 +0100176#endif /* POLARSSL_ECP_DP_SECP224R1_ENABLED */
Manuel Pégourié-Gonnard32b04c12013-12-02 15:49:09 +0100177
178/*
179 * Domain parameters for secp256r1
180 */
Manuel Pégourié-Gonnardbaee5d42013-12-06 13:38:41 +0100181#if defined(POLARSSL_ECP_DP_SECP256R1_ENABLED)
Manuel Pégourié-Gonnard731d08b2013-12-06 12:16:10 +0100182static t_uint secp256r1_p[] = {
Manuel Pégourié-Gonnard95b45b72013-12-11 12:03:23 +0100183 BYTES_TO_T_UINT_8( 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF ),
184 BYTES_TO_T_UINT_8( 0xFF, 0xFF, 0xFF, 0xFF, 0x00, 0x00, 0x00, 0x00 ),
185 BYTES_TO_T_UINT_8( 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 ),
186 BYTES_TO_T_UINT_8( 0x01, 0x00, 0x00, 0x00, 0xFF, 0xFF, 0xFF, 0xFF ),
Manuel Pégourié-Gonnard731d08b2013-12-06 12:16:10 +0100187};
Manuel Pégourié-Gonnard731d08b2013-12-06 12:16:10 +0100188static t_uint secp256r1_b[] = {
Manuel Pégourié-Gonnard95b45b72013-12-11 12:03:23 +0100189 BYTES_TO_T_UINT_8( 0x4B, 0x60, 0xD2, 0x27, 0x3E, 0x3C, 0xCE, 0x3B ),
190 BYTES_TO_T_UINT_8( 0xF6, 0xB0, 0x53, 0xCC, 0xB0, 0x06, 0x1D, 0x65 ),
191 BYTES_TO_T_UINT_8( 0xBC, 0x86, 0x98, 0x76, 0x55, 0xBD, 0xEB, 0xB3 ),
192 BYTES_TO_T_UINT_8( 0xE7, 0x93, 0x3A, 0xAA, 0xD8, 0x35, 0xC6, 0x5A ),
Manuel Pégourié-Gonnard731d08b2013-12-06 12:16:10 +0100193};
194static t_uint secp256r1_gx[] = {
Manuel Pégourié-Gonnard95b45b72013-12-11 12:03:23 +0100195 BYTES_TO_T_UINT_8( 0x96, 0xC2, 0x98, 0xD8, 0x45, 0x39, 0xA1, 0xF4 ),
196 BYTES_TO_T_UINT_8( 0xA0, 0x33, 0xEB, 0x2D, 0x81, 0x7D, 0x03, 0x77 ),
197 BYTES_TO_T_UINT_8( 0xF2, 0x40, 0xA4, 0x63, 0xE5, 0xE6, 0xBC, 0xF8 ),
198 BYTES_TO_T_UINT_8( 0x47, 0x42, 0x2C, 0xE1, 0xF2, 0xD1, 0x17, 0x6B ),
Manuel Pégourié-Gonnard731d08b2013-12-06 12:16:10 +0100199};
200static t_uint secp256r1_gy[] = {
Manuel Pégourié-Gonnard95b45b72013-12-11 12:03:23 +0100201 BYTES_TO_T_UINT_8( 0xF5, 0x51, 0xBF, 0x37, 0x68, 0x40, 0xB6, 0xCB ),
202 BYTES_TO_T_UINT_8( 0xCE, 0x5E, 0x31, 0x6B, 0x57, 0x33, 0xCE, 0x2B ),
203 BYTES_TO_T_UINT_8( 0x16, 0x9E, 0x0F, 0x7C, 0x4A, 0xEB, 0xE7, 0x8E ),
204 BYTES_TO_T_UINT_8( 0x9B, 0x7F, 0x1A, 0xFE, 0xE2, 0x42, 0xE3, 0x4F ),
Manuel Pégourié-Gonnard731d08b2013-12-06 12:16:10 +0100205};
206static t_uint secp256r1_n[] = {
Manuel Pégourié-Gonnard95b45b72013-12-11 12:03:23 +0100207 BYTES_TO_T_UINT_8( 0x51, 0x25, 0x63, 0xFC, 0xC2, 0xCA, 0xB9, 0xF3 ),
208 BYTES_TO_T_UINT_8( 0x84, 0x9E, 0x17, 0xA7, 0xAD, 0xFA, 0xE6, 0xBC ),
209 BYTES_TO_T_UINT_8( 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF ),
210 BYTES_TO_T_UINT_8( 0x00, 0x00, 0x00, 0x00, 0xFF, 0xFF, 0xFF, 0xFF ),
Manuel Pégourié-Gonnard731d08b2013-12-06 12:16:10 +0100211};
Manuel Pégourié-Gonnardbaee5d42013-12-06 13:38:41 +0100212#endif /* POLARSSL_ECP_DP_SECP256R1_ENABLED */
Manuel Pégourié-Gonnard32b04c12013-12-02 15:49:09 +0100213
214/*
215 * Domain parameters for secp384r1
216 */
Manuel Pégourié-Gonnardbaee5d42013-12-06 13:38:41 +0100217#if defined(POLARSSL_ECP_DP_SECP384R1_ENABLED)
Manuel Pégourié-Gonnard731d08b2013-12-06 12:16:10 +0100218static t_uint secp384r1_p[] = {
Manuel Pégourié-Gonnard95b45b72013-12-11 12:03:23 +0100219 BYTES_TO_T_UINT_8( 0xFF, 0xFF, 0xFF, 0xFF, 0x00, 0x00, 0x00, 0x00 ),
220 BYTES_TO_T_UINT_8( 0x00, 0x00, 0x00, 0x00, 0xFF, 0xFF, 0xFF, 0xFF ),
221 BYTES_TO_T_UINT_8( 0xFE, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF ),
222 BYTES_TO_T_UINT_8( 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF ),
223 BYTES_TO_T_UINT_8( 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF ),
224 BYTES_TO_T_UINT_8( 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF ),
Manuel Pégourié-Gonnard731d08b2013-12-06 12:16:10 +0100225};
Manuel Pégourié-Gonnard731d08b2013-12-06 12:16:10 +0100226static t_uint secp384r1_b[] = {
Manuel Pégourié-Gonnard95b45b72013-12-11 12:03:23 +0100227 BYTES_TO_T_UINT_8( 0xEF, 0x2A, 0xEC, 0xD3, 0xED, 0xC8, 0x85, 0x2A ),
228 BYTES_TO_T_UINT_8( 0x9D, 0xD1, 0x2E, 0x8A, 0x8D, 0x39, 0x56, 0xC6 ),
229 BYTES_TO_T_UINT_8( 0x5A, 0x87, 0x13, 0x50, 0x8F, 0x08, 0x14, 0x03 ),
230 BYTES_TO_T_UINT_8( 0x12, 0x41, 0x81, 0xFE, 0x6E, 0x9C, 0x1D, 0x18 ),
231 BYTES_TO_T_UINT_8( 0x19, 0x2D, 0xF8, 0xE3, 0x6B, 0x05, 0x8E, 0x98 ),
232 BYTES_TO_T_UINT_8( 0xE4, 0xE7, 0x3E, 0xE2, 0xA7, 0x2F, 0x31, 0xB3 ),
Manuel Pégourié-Gonnard731d08b2013-12-06 12:16:10 +0100233};
234static t_uint secp384r1_gx[] = {
Manuel Pégourié-Gonnard95b45b72013-12-11 12:03:23 +0100235 BYTES_TO_T_UINT_8( 0xB7, 0x0A, 0x76, 0x72, 0x38, 0x5E, 0x54, 0x3A ),
236 BYTES_TO_T_UINT_8( 0x6C, 0x29, 0x55, 0xBF, 0x5D, 0xF2, 0x02, 0x55 ),
237 BYTES_TO_T_UINT_8( 0x38, 0x2A, 0x54, 0x82, 0xE0, 0x41, 0xF7, 0x59 ),
238 BYTES_TO_T_UINT_8( 0x98, 0x9B, 0xA7, 0x8B, 0x62, 0x3B, 0x1D, 0x6E ),
239 BYTES_TO_T_UINT_8( 0x74, 0xAD, 0x20, 0xF3, 0x1E, 0xC7, 0xB1, 0x8E ),
240 BYTES_TO_T_UINT_8( 0x37, 0x05, 0x8B, 0xBE, 0x22, 0xCA, 0x87, 0xAA ),
Manuel Pégourié-Gonnard731d08b2013-12-06 12:16:10 +0100241};
242static t_uint secp384r1_gy[] = {
Manuel Pégourié-Gonnard95b45b72013-12-11 12:03:23 +0100243 BYTES_TO_T_UINT_8( 0x5F, 0x0E, 0xEA, 0x90, 0x7C, 0x1D, 0x43, 0x7A ),
244 BYTES_TO_T_UINT_8( 0x9D, 0x81, 0x7E, 0x1D, 0xCE, 0xB1, 0x60, 0x0A ),
245 BYTES_TO_T_UINT_8( 0xC0, 0xB8, 0xF0, 0xB5, 0x13, 0x31, 0xDA, 0xE9 ),
246 BYTES_TO_T_UINT_8( 0x7C, 0x14, 0x9A, 0x28, 0xBD, 0x1D, 0xF4, 0xF8 ),
247 BYTES_TO_T_UINT_8( 0x29, 0xDC, 0x92, 0x92, 0xBF, 0x98, 0x9E, 0x5D ),
248 BYTES_TO_T_UINT_8( 0x6F, 0x2C, 0x26, 0x96, 0x4A, 0xDE, 0x17, 0x36 ),
Manuel Pégourié-Gonnard731d08b2013-12-06 12:16:10 +0100249};
250static t_uint secp384r1_n[] = {
Manuel Pégourié-Gonnard95b45b72013-12-11 12:03:23 +0100251 BYTES_TO_T_UINT_8( 0x73, 0x29, 0xC5, 0xCC, 0x6A, 0x19, 0xEC, 0xEC ),
252 BYTES_TO_T_UINT_8( 0x7A, 0xA7, 0xB0, 0x48, 0xB2, 0x0D, 0x1A, 0x58 ),
253 BYTES_TO_T_UINT_8( 0xDF, 0x2D, 0x37, 0xF4, 0x81, 0x4D, 0x63, 0xC7 ),
254 BYTES_TO_T_UINT_8( 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF ),
255 BYTES_TO_T_UINT_8( 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF ),
256 BYTES_TO_T_UINT_8( 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF ),
Manuel Pégourié-Gonnard731d08b2013-12-06 12:16:10 +0100257};
Manuel Pégourié-Gonnardbaee5d42013-12-06 13:38:41 +0100258#endif /* POLARSSL_ECP_DP_SECP384R1_ENABLED */
Manuel Pégourié-Gonnard32b04c12013-12-02 15:49:09 +0100259
260/*
261 * Domain parameters for secp521r1
262 */
Manuel Pégourié-Gonnardbaee5d42013-12-06 13:38:41 +0100263#if defined(POLARSSL_ECP_DP_SECP521R1_ENABLED)
Manuel Pégourié-Gonnard731d08b2013-12-06 12:16:10 +0100264static t_uint secp521r1_p[] = {
Manuel Pégourié-Gonnard95b45b72013-12-11 12:03:23 +0100265 BYTES_TO_T_UINT_8( 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF ),
266 BYTES_TO_T_UINT_8( 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF ),
267 BYTES_TO_T_UINT_8( 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF ),
268 BYTES_TO_T_UINT_8( 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF ),
269 BYTES_TO_T_UINT_8( 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF ),
270 BYTES_TO_T_UINT_8( 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF ),
271 BYTES_TO_T_UINT_8( 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF ),
272 BYTES_TO_T_UINT_8( 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF ),
Manuel Pégourié-Gonnard14a96c52013-12-11 12:15:28 +0100273 BYTES_TO_T_UINT_2( 0xFF, 0x01 ),
Manuel Pégourié-Gonnard731d08b2013-12-06 12:16:10 +0100274};
Manuel Pégourié-Gonnard731d08b2013-12-06 12:16:10 +0100275static t_uint secp521r1_b[] = {
Manuel Pégourié-Gonnard95b45b72013-12-11 12:03:23 +0100276 BYTES_TO_T_UINT_8( 0x00, 0x3F, 0x50, 0x6B, 0xD4, 0x1F, 0x45, 0xEF ),
277 BYTES_TO_T_UINT_8( 0xF1, 0x34, 0x2C, 0x3D, 0x88, 0xDF, 0x73, 0x35 ),
278 BYTES_TO_T_UINT_8( 0x07, 0xBF, 0xB1, 0x3B, 0xBD, 0xC0, 0x52, 0x16 ),
279 BYTES_TO_T_UINT_8( 0x7B, 0x93, 0x7E, 0xEC, 0x51, 0x39, 0x19, 0x56 ),
280 BYTES_TO_T_UINT_8( 0xE1, 0x09, 0xF1, 0x8E, 0x91, 0x89, 0xB4, 0xB8 ),
281 BYTES_TO_T_UINT_8( 0xF3, 0x15, 0xB3, 0x99, 0x5B, 0x72, 0xDA, 0xA2 ),
282 BYTES_TO_T_UINT_8( 0xEE, 0x40, 0x85, 0xB6, 0xA0, 0x21, 0x9A, 0x92 ),
283 BYTES_TO_T_UINT_8( 0x1F, 0x9A, 0x1C, 0x8E, 0x61, 0xB9, 0x3E, 0x95 ),
Manuel Pégourié-Gonnard14a96c52013-12-11 12:15:28 +0100284 BYTES_TO_T_UINT_2( 0x51, 0x00 ),
Manuel Pégourié-Gonnard731d08b2013-12-06 12:16:10 +0100285};
286static t_uint secp521r1_gx[] = {
Manuel Pégourié-Gonnard95b45b72013-12-11 12:03:23 +0100287 BYTES_TO_T_UINT_8( 0x66, 0xBD, 0xE5, 0xC2, 0x31, 0x7E, 0x7E, 0xF9 ),
288 BYTES_TO_T_UINT_8( 0x9B, 0x42, 0x6A, 0x85, 0xC1, 0xB3, 0x48, 0x33 ),
289 BYTES_TO_T_UINT_8( 0xDE, 0xA8, 0xFF, 0xA2, 0x27, 0xC1, 0x1D, 0xFE ),
290 BYTES_TO_T_UINT_8( 0x28, 0x59, 0xE7, 0xEF, 0x77, 0x5E, 0x4B, 0xA1 ),
291 BYTES_TO_T_UINT_8( 0xBA, 0x3D, 0x4D, 0x6B, 0x60, 0xAF, 0x28, 0xF8 ),
292 BYTES_TO_T_UINT_8( 0x21, 0xB5, 0x3F, 0x05, 0x39, 0x81, 0x64, 0x9C ),
293 BYTES_TO_T_UINT_8( 0x42, 0xB4, 0x95, 0x23, 0x66, 0xCB, 0x3E, 0x9E ),
294 BYTES_TO_T_UINT_8( 0xCD, 0xE9, 0x04, 0x04, 0xB7, 0x06, 0x8E, 0x85 ),
Manuel Pégourié-Gonnard14a96c52013-12-11 12:15:28 +0100295 BYTES_TO_T_UINT_2( 0xC6, 0x00 ),
Manuel Pégourié-Gonnard731d08b2013-12-06 12:16:10 +0100296};
297static t_uint secp521r1_gy[] = {
Manuel Pégourié-Gonnard95b45b72013-12-11 12:03:23 +0100298 BYTES_TO_T_UINT_8( 0x50, 0x66, 0xD1, 0x9F, 0x76, 0x94, 0xBE, 0x88 ),
299 BYTES_TO_T_UINT_8( 0x40, 0xC2, 0x72, 0xA2, 0x86, 0x70, 0x3C, 0x35 ),
300 BYTES_TO_T_UINT_8( 0x61, 0x07, 0xAD, 0x3F, 0x01, 0xB9, 0x50, 0xC5 ),
301 BYTES_TO_T_UINT_8( 0x40, 0x26, 0xF4, 0x5E, 0x99, 0x72, 0xEE, 0x97 ),
302 BYTES_TO_T_UINT_8( 0x2C, 0x66, 0x3E, 0x27, 0x17, 0xBD, 0xAF, 0x17 ),
303 BYTES_TO_T_UINT_8( 0x68, 0x44, 0x9B, 0x57, 0x49, 0x44, 0xF5, 0x98 ),
304 BYTES_TO_T_UINT_8( 0xD9, 0x1B, 0x7D, 0x2C, 0xB4, 0x5F, 0x8A, 0x5C ),
305 BYTES_TO_T_UINT_8( 0x04, 0xC0, 0x3B, 0x9A, 0x78, 0x6A, 0x29, 0x39 ),
Manuel Pégourié-Gonnard14a96c52013-12-11 12:15:28 +0100306 BYTES_TO_T_UINT_2( 0x18, 0x01 ),
Manuel Pégourié-Gonnard731d08b2013-12-06 12:16:10 +0100307};
308static t_uint secp521r1_n[] = {
Manuel Pégourié-Gonnard95b45b72013-12-11 12:03:23 +0100309 BYTES_TO_T_UINT_8( 0x09, 0x64, 0x38, 0x91, 0x1E, 0xB7, 0x6F, 0xBB ),
310 BYTES_TO_T_UINT_8( 0xAE, 0x47, 0x9C, 0x89, 0xB8, 0xC9, 0xB5, 0x3B ),
311 BYTES_TO_T_UINT_8( 0xD0, 0xA5, 0x09, 0xF7, 0x48, 0x01, 0xCC, 0x7F ),
312 BYTES_TO_T_UINT_8( 0x6B, 0x96, 0x2F, 0xBF, 0x83, 0x87, 0x86, 0x51 ),
313 BYTES_TO_T_UINT_8( 0xFA, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF ),
314 BYTES_TO_T_UINT_8( 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF ),
315 BYTES_TO_T_UINT_8( 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF ),
316 BYTES_TO_T_UINT_8( 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF ),
Manuel Pégourié-Gonnard14a96c52013-12-11 12:15:28 +0100317 BYTES_TO_T_UINT_2( 0xFF, 0x01 ),
Manuel Pégourié-Gonnard731d08b2013-12-06 12:16:10 +0100318};
Manuel Pégourié-Gonnardbaee5d42013-12-06 13:38:41 +0100319#endif /* POLARSSL_ECP_DP_SECP521R1_ENABLED */
Manuel Pégourié-Gonnard32b04c12013-12-02 15:49:09 +0100320
321/*
322 * Domain parameters for brainpoolP256r1 (RFC 5639 3.4)
323 */
Manuel Pégourié-Gonnardbaee5d42013-12-06 13:38:41 +0100324#if defined(POLARSSL_ECP_DP_BP256R1_ENABLED)
Manuel Pégourié-Gonnard731d08b2013-12-06 12:16:10 +0100325static t_uint brainpoolP256r1_p[] = {
Manuel Pégourié-Gonnard95b45b72013-12-11 12:03:23 +0100326 BYTES_TO_T_UINT_8( 0x77, 0x53, 0x6E, 0x1F, 0x1D, 0x48, 0x13, 0x20 ),
327 BYTES_TO_T_UINT_8( 0x28, 0x20, 0x26, 0xD5, 0x23, 0xF6, 0x3B, 0x6E ),
328 BYTES_TO_T_UINT_8( 0x72, 0x8D, 0x83, 0x9D, 0x90, 0x0A, 0x66, 0x3E ),
329 BYTES_TO_T_UINT_8( 0xBC, 0xA9, 0xEE, 0xA1, 0xDB, 0x57, 0xFB, 0xA9 ),
Manuel Pégourié-Gonnard731d08b2013-12-06 12:16:10 +0100330};
331static t_uint brainpoolP256r1_a[] = {
Manuel Pégourié-Gonnard95b45b72013-12-11 12:03:23 +0100332 BYTES_TO_T_UINT_8( 0xD9, 0xB5, 0x30, 0xF3, 0x44, 0x4B, 0x4A, 0xE9 ),
333 BYTES_TO_T_UINT_8( 0x6C, 0x5C, 0xDC, 0x26, 0xC1, 0x55, 0x80, 0xFB ),
334 BYTES_TO_T_UINT_8( 0xE7, 0xFF, 0x7A, 0x41, 0x30, 0x75, 0xF6, 0xEE ),
335 BYTES_TO_T_UINT_8( 0x57, 0x30, 0x2C, 0xFC, 0x75, 0x09, 0x5A, 0x7D ),
Manuel Pégourié-Gonnard731d08b2013-12-06 12:16:10 +0100336};
337static t_uint brainpoolP256r1_b[] = {
Manuel Pégourié-Gonnard95b45b72013-12-11 12:03:23 +0100338 BYTES_TO_T_UINT_8( 0xB6, 0x07, 0x8C, 0xFF, 0x18, 0xDC, 0xCC, 0x6B ),
339 BYTES_TO_T_UINT_8( 0xCE, 0xE1, 0xF7, 0x5C, 0x29, 0x16, 0x84, 0x95 ),
340 BYTES_TO_T_UINT_8( 0xBF, 0x7C, 0xD7, 0xBB, 0xD9, 0xB5, 0x30, 0xF3 ),
341 BYTES_TO_T_UINT_8( 0x44, 0x4B, 0x4A, 0xE9, 0x6C, 0x5C, 0xDC, 0x26 ),
Manuel Pégourié-Gonnard731d08b2013-12-06 12:16:10 +0100342};
343static t_uint brainpoolP256r1_gx[] = {
Manuel Pégourié-Gonnard95b45b72013-12-11 12:03:23 +0100344 BYTES_TO_T_UINT_8( 0x62, 0x32, 0xCE, 0x9A, 0xBD, 0x53, 0x44, 0x3A ),
345 BYTES_TO_T_UINT_8( 0xC2, 0x23, 0xBD, 0xE3, 0xE1, 0x27, 0xDE, 0xB9 ),
346 BYTES_TO_T_UINT_8( 0xAF, 0xB7, 0x81, 0xFC, 0x2F, 0x48, 0x4B, 0x2C ),
347 BYTES_TO_T_UINT_8( 0xCB, 0x57, 0x7E, 0xCB, 0xB9, 0xAE, 0xD2, 0x8B ),
Manuel Pégourié-Gonnard731d08b2013-12-06 12:16:10 +0100348};
349static t_uint brainpoolP256r1_gy[] = {
Manuel Pégourié-Gonnard95b45b72013-12-11 12:03:23 +0100350 BYTES_TO_T_UINT_8( 0x97, 0x69, 0x04, 0x2F, 0xC7, 0x54, 0x1D, 0x5C ),
351 BYTES_TO_T_UINT_8( 0x54, 0x8E, 0xED, 0x2D, 0x13, 0x45, 0x77, 0xC2 ),
352 BYTES_TO_T_UINT_8( 0xC9, 0x1D, 0x61, 0x14, 0x1A, 0x46, 0xF8, 0x97 ),
353 BYTES_TO_T_UINT_8( 0xFD, 0xC4, 0xDA, 0xC3, 0x35, 0xF8, 0x7E, 0x54 ),
Manuel Pégourié-Gonnard731d08b2013-12-06 12:16:10 +0100354};
355static t_uint brainpoolP256r1_n[] = {
Manuel Pégourié-Gonnard95b45b72013-12-11 12:03:23 +0100356 BYTES_TO_T_UINT_8( 0xA7, 0x56, 0x48, 0x97, 0x82, 0x0E, 0x1E, 0x90 ),
357 BYTES_TO_T_UINT_8( 0xF7, 0xA6, 0x61, 0xB5, 0xA3, 0x7A, 0x39, 0x8C ),
358 BYTES_TO_T_UINT_8( 0x71, 0x8D, 0x83, 0x9D, 0x90, 0x0A, 0x66, 0x3E ),
359 BYTES_TO_T_UINT_8( 0xBC, 0xA9, 0xEE, 0xA1, 0xDB, 0x57, 0xFB, 0xA9 ),
Manuel Pégourié-Gonnard731d08b2013-12-06 12:16:10 +0100360};
Manuel Pégourié-Gonnardbaee5d42013-12-06 13:38:41 +0100361#endif /* POLARSSL_ECP_DP_BP256R1_ENABLED */
Manuel Pégourié-Gonnard32b04c12013-12-02 15:49:09 +0100362
363/*
364 * Domain parameters for brainpoolP384r1 (RFC 5639 3.6)
365 */
Manuel Pégourié-Gonnardbaee5d42013-12-06 13:38:41 +0100366#if defined(POLARSSL_ECP_DP_BP384R1_ENABLED)
Manuel Pégourié-Gonnard731d08b2013-12-06 12:16:10 +0100367static t_uint brainpoolP384r1_p[] = {
Manuel Pégourié-Gonnard95b45b72013-12-11 12:03:23 +0100368 BYTES_TO_T_UINT_8( 0x53, 0xEC, 0x07, 0x31, 0x13, 0x00, 0x47, 0x87 ),
369 BYTES_TO_T_UINT_8( 0x71, 0x1A, 0x1D, 0x90, 0x29, 0xA7, 0xD3, 0xAC ),
370 BYTES_TO_T_UINT_8( 0x23, 0x11, 0xB7, 0x7F, 0x19, 0xDA, 0xB1, 0x12 ),
371 BYTES_TO_T_UINT_8( 0xB4, 0x56, 0x54, 0xED, 0x09, 0x71, 0x2F, 0x15 ),
372 BYTES_TO_T_UINT_8( 0xDF, 0x41, 0xE6, 0x50, 0x7E, 0x6F, 0x5D, 0x0F ),
373 BYTES_TO_T_UINT_8( 0x28, 0x6D, 0x38, 0xA3, 0x82, 0x1E, 0xB9, 0x8C ),
Manuel Pégourié-Gonnard731d08b2013-12-06 12:16:10 +0100374};
375static t_uint brainpoolP384r1_a[] = {
Manuel Pégourié-Gonnard95b45b72013-12-11 12:03:23 +0100376 BYTES_TO_T_UINT_8( 0x26, 0x28, 0xCE, 0x22, 0xDD, 0xC7, 0xA8, 0x04 ),
377 BYTES_TO_T_UINT_8( 0xEB, 0xD4, 0x3A, 0x50, 0x4A, 0x81, 0xA5, 0x8A ),
378 BYTES_TO_T_UINT_8( 0x0F, 0xF9, 0x91, 0xBA, 0xEF, 0x65, 0x91, 0x13 ),
379 BYTES_TO_T_UINT_8( 0x87, 0x27, 0xB2, 0x4F, 0x8E, 0xA2, 0xBE, 0xC2 ),
380 BYTES_TO_T_UINT_8( 0xA0, 0xAF, 0x05, 0xCE, 0x0A, 0x08, 0x72, 0x3C ),
381 BYTES_TO_T_UINT_8( 0x0C, 0x15, 0x8C, 0x3D, 0xC6, 0x82, 0xC3, 0x7B ),
Manuel Pégourié-Gonnard731d08b2013-12-06 12:16:10 +0100382};
383static t_uint brainpoolP384r1_b[] = {
Manuel Pégourié-Gonnard95b45b72013-12-11 12:03:23 +0100384 BYTES_TO_T_UINT_8( 0x11, 0x4C, 0x50, 0xFA, 0x96, 0x86, 0xB7, 0x3A ),
385 BYTES_TO_T_UINT_8( 0x94, 0xC9, 0xDB, 0x95, 0x02, 0x39, 0xB4, 0x7C ),
386 BYTES_TO_T_UINT_8( 0xD5, 0x62, 0xEB, 0x3E, 0xA5, 0x0E, 0x88, 0x2E ),
387 BYTES_TO_T_UINT_8( 0xA6, 0xD2, 0xDC, 0x07, 0xE1, 0x7D, 0xB7, 0x2F ),
388 BYTES_TO_T_UINT_8( 0x7C, 0x44, 0xF0, 0x16, 0x54, 0xB5, 0x39, 0x8B ),
389 BYTES_TO_T_UINT_8( 0x26, 0x28, 0xCE, 0x22, 0xDD, 0xC7, 0xA8, 0x04 ),
Manuel Pégourié-Gonnard731d08b2013-12-06 12:16:10 +0100390};
391static t_uint brainpoolP384r1_gx[] = {
Manuel Pégourié-Gonnard95b45b72013-12-11 12:03:23 +0100392 BYTES_TO_T_UINT_8( 0x1E, 0xAF, 0xD4, 0x47, 0xE2, 0xB2, 0x87, 0xEF ),
393 BYTES_TO_T_UINT_8( 0xAA, 0x46, 0xD6, 0x36, 0x34, 0xE0, 0x26, 0xE8 ),
394 BYTES_TO_T_UINT_8( 0xE8, 0x10, 0xBD, 0x0C, 0xFE, 0xCA, 0x7F, 0xDB ),
395 BYTES_TO_T_UINT_8( 0xE3, 0x4F, 0xF1, 0x7E, 0xE7, 0xA3, 0x47, 0x88 ),
396 BYTES_TO_T_UINT_8( 0x6B, 0x3F, 0xC1, 0xB7, 0x81, 0x3A, 0xA6, 0xA2 ),
397 BYTES_TO_T_UINT_8( 0xFF, 0x45, 0xCF, 0x68, 0xF0, 0x64, 0x1C, 0x1D ),
Manuel Pégourié-Gonnard731d08b2013-12-06 12:16:10 +0100398};
399static t_uint brainpoolP384r1_gy[] = {
Manuel Pégourié-Gonnard95b45b72013-12-11 12:03:23 +0100400 BYTES_TO_T_UINT_8( 0x15, 0x53, 0x3C, 0x26, 0x41, 0x03, 0x82, 0x42 ),
401 BYTES_TO_T_UINT_8( 0x11, 0x81, 0x91, 0x77, 0x21, 0x46, 0x46, 0x0E ),
402 BYTES_TO_T_UINT_8( 0x28, 0x29, 0x91, 0xF9, 0x4F, 0x05, 0x9C, 0xE1 ),
403 BYTES_TO_T_UINT_8( 0x64, 0x58, 0xEC, 0xFE, 0x29, 0x0B, 0xB7, 0x62 ),
404 BYTES_TO_T_UINT_8( 0x52, 0xD5, 0xCF, 0x95, 0x8E, 0xEB, 0xB1, 0x5C ),
405 BYTES_TO_T_UINT_8( 0xA4, 0xC2, 0xF9, 0x20, 0x75, 0x1D, 0xBE, 0x8A ),
Manuel Pégourié-Gonnard731d08b2013-12-06 12:16:10 +0100406};
407static t_uint brainpoolP384r1_n[] = {
Manuel Pégourié-Gonnard95b45b72013-12-11 12:03:23 +0100408 BYTES_TO_T_UINT_8( 0x65, 0x65, 0x04, 0xE9, 0x02, 0x32, 0x88, 0x3B ),
409 BYTES_TO_T_UINT_8( 0x10, 0xC3, 0x7F, 0x6B, 0xAF, 0xB6, 0x3A, 0xCF ),
410 BYTES_TO_T_UINT_8( 0xA7, 0x25, 0x04, 0xAC, 0x6C, 0x6E, 0x16, 0x1F ),
411 BYTES_TO_T_UINT_8( 0xB3, 0x56, 0x54, 0xED, 0x09, 0x71, 0x2F, 0x15 ),
412 BYTES_TO_T_UINT_8( 0xDF, 0x41, 0xE6, 0x50, 0x7E, 0x6F, 0x5D, 0x0F ),
413 BYTES_TO_T_UINT_8( 0x28, 0x6D, 0x38, 0xA3, 0x82, 0x1E, 0xB9, 0x8C ),
Manuel Pégourié-Gonnard731d08b2013-12-06 12:16:10 +0100414};
Manuel Pégourié-Gonnardbaee5d42013-12-06 13:38:41 +0100415#endif /* POLARSSL_ECP_DP_BP384R1_ENABLED */
Manuel Pégourié-Gonnard32b04c12013-12-02 15:49:09 +0100416
417/*
418 * Domain parameters for brainpoolP512r1 (RFC 5639 3.7)
419 */
Manuel Pégourié-Gonnardbaee5d42013-12-06 13:38:41 +0100420#if defined(POLARSSL_ECP_DP_BP512R1_ENABLED)
Manuel Pégourié-Gonnard731d08b2013-12-06 12:16:10 +0100421static t_uint brainpoolP512r1_p[] = {
Manuel Pégourié-Gonnard95b45b72013-12-11 12:03:23 +0100422 BYTES_TO_T_UINT_8( 0xF3, 0x48, 0x3A, 0x58, 0x56, 0x60, 0xAA, 0x28 ),
423 BYTES_TO_T_UINT_8( 0x85, 0xC6, 0x82, 0x2D, 0x2F, 0xFF, 0x81, 0x28 ),
424 BYTES_TO_T_UINT_8( 0xE6, 0x80, 0xA3, 0xE6, 0x2A, 0xA1, 0xCD, 0xAE ),
425 BYTES_TO_T_UINT_8( 0x42, 0x68, 0xC6, 0x9B, 0x00, 0x9B, 0x4D, 0x7D ),
426 BYTES_TO_T_UINT_8( 0x71, 0x08, 0x33, 0x70, 0xCA, 0x9C, 0x63, 0xD6 ),
427 BYTES_TO_T_UINT_8( 0x0E, 0xD2, 0xC9, 0xB3, 0xB3, 0x8D, 0x30, 0xCB ),
428 BYTES_TO_T_UINT_8( 0x07, 0xFC, 0xC9, 0x33, 0xAE, 0xE6, 0xD4, 0x3F ),
429 BYTES_TO_T_UINT_8( 0x8B, 0xC4, 0xE9, 0xDB, 0xB8, 0x9D, 0xDD, 0xAA ),
Manuel Pégourié-Gonnard731d08b2013-12-06 12:16:10 +0100430};
431static t_uint brainpoolP512r1_a[] = {
Manuel Pégourié-Gonnard95b45b72013-12-11 12:03:23 +0100432 BYTES_TO_T_UINT_8( 0xCA, 0x94, 0xFC, 0x77, 0x4D, 0xAC, 0xC1, 0xE7 ),
433 BYTES_TO_T_UINT_8( 0xB9, 0xC7, 0xF2, 0x2B, 0xA7, 0x17, 0x11, 0x7F ),
434 BYTES_TO_T_UINT_8( 0xB5, 0xC8, 0x9A, 0x8B, 0xC9, 0xF1, 0x2E, 0x0A ),
435 BYTES_TO_T_UINT_8( 0xA1, 0x3A, 0x25, 0xA8, 0x5A, 0x5D, 0xED, 0x2D ),
436 BYTES_TO_T_UINT_8( 0xBC, 0x63, 0x98, 0xEA, 0xCA, 0x41, 0x34, 0xA8 ),
437 BYTES_TO_T_UINT_8( 0x10, 0x16, 0xF9, 0x3D, 0x8D, 0xDD, 0xCB, 0x94 ),
438 BYTES_TO_T_UINT_8( 0xC5, 0x4C, 0x23, 0xAC, 0x45, 0x71, 0x32, 0xE2 ),
439 BYTES_TO_T_UINT_8( 0x89, 0x3B, 0x60, 0x8B, 0x31, 0xA3, 0x30, 0x78 ),
Manuel Pégourié-Gonnard731d08b2013-12-06 12:16:10 +0100440};
441static t_uint brainpoolP512r1_b[] = {
Manuel Pégourié-Gonnard95b45b72013-12-11 12:03:23 +0100442 BYTES_TO_T_UINT_8( 0x23, 0xF7, 0x16, 0x80, 0x63, 0xBD, 0x09, 0x28 ),
443 BYTES_TO_T_UINT_8( 0xDD, 0xE5, 0xBA, 0x5E, 0xB7, 0x50, 0x40, 0x98 ),
444 BYTES_TO_T_UINT_8( 0x67, 0x3E, 0x08, 0xDC, 0xCA, 0x94, 0xFC, 0x77 ),
445 BYTES_TO_T_UINT_8( 0x4D, 0xAC, 0xC1, 0xE7, 0xB9, 0xC7, 0xF2, 0x2B ),
446 BYTES_TO_T_UINT_8( 0xA7, 0x17, 0x11, 0x7F, 0xB5, 0xC8, 0x9A, 0x8B ),
447 BYTES_TO_T_UINT_8( 0xC9, 0xF1, 0x2E, 0x0A, 0xA1, 0x3A, 0x25, 0xA8 ),
448 BYTES_TO_T_UINT_8( 0x5A, 0x5D, 0xED, 0x2D, 0xBC, 0x63, 0x98, 0xEA ),
449 BYTES_TO_T_UINT_8( 0xCA, 0x41, 0x34, 0xA8, 0x10, 0x16, 0xF9, 0x3D ),
Manuel Pégourié-Gonnard731d08b2013-12-06 12:16:10 +0100450};
451static t_uint brainpoolP512r1_gx[] = {
Manuel Pégourié-Gonnard95b45b72013-12-11 12:03:23 +0100452 BYTES_TO_T_UINT_8( 0x22, 0xF8, 0xB9, 0xBC, 0x09, 0x22, 0x35, 0x8B ),
453 BYTES_TO_T_UINT_8( 0x68, 0x5E, 0x6A, 0x40, 0x47, 0x50, 0x6D, 0x7C ),
454 BYTES_TO_T_UINT_8( 0x5F, 0x7D, 0xB9, 0x93, 0x7B, 0x68, 0xD1, 0x50 ),
455 BYTES_TO_T_UINT_8( 0x8D, 0xD4, 0xD0, 0xE2, 0x78, 0x1F, 0x3B, 0xFF ),
456 BYTES_TO_T_UINT_8( 0x8E, 0x09, 0xD0, 0xF4, 0xEE, 0x62, 0x3B, 0xB4 ),
457 BYTES_TO_T_UINT_8( 0xC1, 0x16, 0xD9, 0xB5, 0x70, 0x9F, 0xED, 0x85 ),
458 BYTES_TO_T_UINT_8( 0x93, 0x6A, 0x4C, 0x9C, 0x2E, 0x32, 0x21, 0x5A ),
459 BYTES_TO_T_UINT_8( 0x64, 0xD9, 0x2E, 0xD8, 0xBD, 0xE4, 0xAE, 0x81 ),
Manuel Pégourié-Gonnard731d08b2013-12-06 12:16:10 +0100460};
461static t_uint brainpoolP512r1_gy[] = {
Manuel Pégourié-Gonnard95b45b72013-12-11 12:03:23 +0100462 BYTES_TO_T_UINT_8( 0x92, 0x08, 0xD8, 0x3A, 0x0F, 0x1E, 0xCD, 0x78 ),
463 BYTES_TO_T_UINT_8( 0x06, 0x54, 0xF0, 0xA8, 0x2F, 0x2B, 0xCA, 0xD1 ),
464 BYTES_TO_T_UINT_8( 0xAE, 0x63, 0x27, 0x8A, 0xD8, 0x4B, 0xCA, 0x5B ),
465 BYTES_TO_T_UINT_8( 0x5E, 0x48, 0x5F, 0x4A, 0x49, 0xDE, 0xDC, 0xB2 ),
466 BYTES_TO_T_UINT_8( 0x11, 0x81, 0x1F, 0x88, 0x5B, 0xC5, 0x00, 0xA0 ),
467 BYTES_TO_T_UINT_8( 0x1A, 0x7B, 0xA5, 0x24, 0x00, 0xF7, 0x09, 0xF2 ),
468 BYTES_TO_T_UINT_8( 0xFD, 0x22, 0x78, 0xCF, 0xA9, 0xBF, 0xEA, 0xC0 ),
469 BYTES_TO_T_UINT_8( 0xEC, 0x32, 0x63, 0x56, 0x5D, 0x38, 0xDE, 0x7D ),
Manuel Pégourié-Gonnard731d08b2013-12-06 12:16:10 +0100470};
471static t_uint brainpoolP512r1_n[] = {
Manuel Pégourié-Gonnard95b45b72013-12-11 12:03:23 +0100472 BYTES_TO_T_UINT_8( 0x69, 0x00, 0xA9, 0x9C, 0x82, 0x96, 0x87, 0xB5 ),
473 BYTES_TO_T_UINT_8( 0xDD, 0xDA, 0x5D, 0x08, 0x81, 0xD3, 0xB1, 0x1D ),
474 BYTES_TO_T_UINT_8( 0x47, 0x10, 0xAC, 0x7F, 0x19, 0x61, 0x86, 0x41 ),
475 BYTES_TO_T_UINT_8( 0x19, 0x26, 0xA9, 0x4C, 0x41, 0x5C, 0x3E, 0x55 ),
476 BYTES_TO_T_UINT_8( 0x70, 0x08, 0x33, 0x70, 0xCA, 0x9C, 0x63, 0xD6 ),
477 BYTES_TO_T_UINT_8( 0x0E, 0xD2, 0xC9, 0xB3, 0xB3, 0x8D, 0x30, 0xCB ),
478 BYTES_TO_T_UINT_8( 0x07, 0xFC, 0xC9, 0x33, 0xAE, 0xE6, 0xD4, 0x3F ),
479 BYTES_TO_T_UINT_8( 0x8B, 0xC4, 0xE9, 0xDB, 0xB8, 0x9D, 0xDD, 0xAA ),
Manuel Pégourié-Gonnard731d08b2013-12-06 12:16:10 +0100480};
Manuel Pégourié-Gonnardbaee5d42013-12-06 13:38:41 +0100481#endif /* POLARSSL_ECP_DP_BP512R1_ENABLED */
Manuel Pégourié-Gonnard32b04c12013-12-02 15:49:09 +0100482
483/*
Manuel Pégourié-Gonnard731d08b2013-12-06 12:16:10 +0100484 * Create an MPI from embedded constants
485 * (assumes len is an exact multiple of sizeof t_uint)
Manuel Pégourié-Gonnard32b04c12013-12-02 15:49:09 +0100486 */
Manuel Pégourié-Gonnard731d08b2013-12-06 12:16:10 +0100487static inline void ecp_mpi_load( mpi *X, const t_uint *p, size_t len )
488{
489 X->s = 1;
490 X->n = len / sizeof( t_uint );
491 X->p = (t_uint *) p;
492}
493
494/*
Manuel Pégourié-Gonnard73cc01d2013-12-06 12:41:30 +0100495 * Set an MPI to static value 1
496 */
497static inline void ecp_mpi_set1( mpi *X )
498{
499 static t_uint one[] = { 1 };
500 X->s = 1;
501 X->n = 1;
502 X->p = one;
503}
504
505/*
Manuel Pégourié-Gonnard731d08b2013-12-06 12:16:10 +0100506 * Make group available from embedded constants
507 */
508static int ecp_group_load( ecp_group *grp,
509 const t_uint *p, size_t plen,
510 const t_uint *a, size_t alen,
511 const t_uint *b, size_t blen,
512 const t_uint *gx, size_t gxlen,
513 const t_uint *gy, size_t gylen,
514 const t_uint *n, size_t nlen)
Manuel Pégourié-Gonnard32b04c12013-12-02 15:49:09 +0100515{
Manuel Pégourié-Gonnard731d08b2013-12-06 12:16:10 +0100516 ecp_mpi_load( &grp->P, p, plen );
Manuel Pégourié-Gonnard9854fe92013-12-02 16:30:43 +0100517 if( a != NULL )
Manuel Pégourié-Gonnard731d08b2013-12-06 12:16:10 +0100518 ecp_mpi_load( &grp->A, a, alen );
Manuel Pégourié-Gonnard731d08b2013-12-06 12:16:10 +0100519 ecp_mpi_load( &grp->B, b, blen );
520 ecp_mpi_load( &grp->N, n, nlen );
Manuel Pégourié-Gonnard9854fe92013-12-02 16:30:43 +0100521
Manuel Pégourié-Gonnard731d08b2013-12-06 12:16:10 +0100522 ecp_mpi_load( &grp->G.X, gx, gxlen );
523 ecp_mpi_load( &grp->G.Y, gy, gylen );
Manuel Pégourié-Gonnard73cc01d2013-12-06 12:41:30 +0100524 ecp_mpi_set1( &grp->G.Z );
Manuel Pégourié-Gonnard32b04c12013-12-02 15:49:09 +0100525
526 grp->pbits = mpi_msb( &grp->P );
527 grp->nbits = mpi_msb( &grp->N );
528
Manuel Pégourié-Gonnard1f82b042013-12-06 12:51:50 +0100529 grp->h = 1;
530
Manuel Pégourié-Gonnard73cc01d2013-12-06 12:41:30 +0100531 return( 0 );
Manuel Pégourié-Gonnard32b04c12013-12-02 15:49:09 +0100532}
533
534#if defined(POLARSSL_ECP_NIST_OPTIM)
535/* Forward declarations */
Manuel Pégourié-Gonnard3d7053a2013-12-04 20:51:13 +0100536#if defined(POLARSSL_ECP_DP_SECP192R1_ENABLED)
Manuel Pégourié-Gonnard3ee90002013-12-02 17:14:48 +0100537static int ecp_mod_p192( mpi * );
Manuel Pégourié-Gonnard3d7053a2013-12-04 20:51:13 +0100538#endif
539#if defined(POLARSSL_ECP_DP_SECP224R1_ENABLED)
Manuel Pégourié-Gonnard3ee90002013-12-02 17:14:48 +0100540static int ecp_mod_p224( mpi * );
Manuel Pégourié-Gonnard3d7053a2013-12-04 20:51:13 +0100541#endif
542#if defined(POLARSSL_ECP_DP_SECP256R1_ENABLED)
Manuel Pégourié-Gonnard3ee90002013-12-02 17:14:48 +0100543static int ecp_mod_p256( mpi * );
Manuel Pégourié-Gonnard3d7053a2013-12-04 20:51:13 +0100544#endif
545#if defined(POLARSSL_ECP_DP_SECP384R1_ENABLED)
Manuel Pégourié-Gonnard3ee90002013-12-02 17:14:48 +0100546static int ecp_mod_p384( mpi * );
Manuel Pégourié-Gonnard3d7053a2013-12-04 20:51:13 +0100547#endif
548#if defined(POLARSSL_ECP_DP_SECP521R1_ENABLED)
Manuel Pégourié-Gonnard3ee90002013-12-02 17:14:48 +0100549static int ecp_mod_p521( mpi * );
Manuel Pégourié-Gonnard3d7053a2013-12-04 20:51:13 +0100550#endif
551#if defined(POLARSSL_ECP_DP_M255_ENABLED)
552static int ecp_mod_p255( mpi * );
553#endif
Manuel Pégourié-Gonnard3ee90002013-12-02 17:14:48 +0100554
555#define NIST_MODP( P ) grp->modp = ecp_mod_ ## P;
556#else
557#define NIST_MODP( P )
Manuel Pégourié-Gonnard3d7053a2013-12-04 20:51:13 +0100558#endif /* POLARSSL_ECP_NIST_OPTIM */
Manuel Pégourié-Gonnard32b04c12013-12-02 15:49:09 +0100559
Manuel Pégourié-Gonnard81e1b102013-12-06 13:28:05 +0100560#define LOAD_GROUP_A( G ) ecp_group_load( grp, \
561 G ## _p, sizeof( G ## _p ), \
562 G ## _a, sizeof( G ## _a ), \
563 G ## _b, sizeof( G ## _b ), \
564 G ## _gx, sizeof( G ## _gx ), \
565 G ## _gy, sizeof( G ## _gy ), \
566 G ## _n, sizeof( G ## _n ) )
567
568#define LOAD_GROUP( G ) ecp_group_load( grp, \
569 G ## _p, sizeof( G ## _p ), \
570 NULL, 0, \
571 G ## _b, sizeof( G ## _b ), \
572 G ## _gx, sizeof( G ## _gx ), \
573 G ## _gy, sizeof( G ## _gy ), \
574 G ## _n, sizeof( G ## _n ) )
575
Paul Bakker0c0476f2013-12-19 16:20:53 +0100576#if defined(POLARSSL_ECP_DP_M255_ENABLED)
Manuel Pégourié-Gonnard32b04c12013-12-02 15:49:09 +0100577/*
Manuel Pégourié-Gonnard66153662013-12-03 14:12:26 +0100578 * Specialized function for creating the Curve25519 group
579 */
580static int ecp_use_curve25519( ecp_group *grp )
581{
582 int ret;
583
584 /* Actually ( A + 2 ) / 4 */
585 MPI_CHK( mpi_read_string( &grp->A, 16, "01DB42" ) );
586
587 /* P = 2^255 - 19 */
588 MPI_CHK( mpi_lset( &grp->P, 1 ) );
589 MPI_CHK( mpi_shift_l( &grp->P, 255 ) );
590 MPI_CHK( mpi_sub_int( &grp->P, &grp->P, 19 ) );
591 grp->pbits = mpi_msb( &grp->P );
592
Manuel Pégourié-Gonnard312d2e82013-12-04 11:08:01 +0100593 /* Y intentionaly not set, since we use x/z coordinates.
594 * This is used as a marker to identify Montgomery curves! */
595 MPI_CHK( mpi_lset( &grp->G.X, 9 ) );
596 MPI_CHK( mpi_lset( &grp->G.Z, 1 ) );
597 mpi_free( &grp->G.Y );
598
Manuel Pégourié-Gonnard66153662013-12-03 14:12:26 +0100599 /* Actually, the required msb for private keys */
600 grp->nbits = 254;
601
602cleanup:
603 if( ret != 0 )
604 ecp_group_free( grp );
605
606 return( ret );
607}
Paul Bakker0c0476f2013-12-19 16:20:53 +0100608#endif /* POLARSSL_ECP_DP_M255_ENABLED */
Manuel Pégourié-Gonnard66153662013-12-03 14:12:26 +0100609
610/*
Manuel Pégourié-Gonnard32b04c12013-12-02 15:49:09 +0100611 * Set a group using well-known domain parameters
612 */
613int ecp_use_known_dp( ecp_group *grp, ecp_group_id id )
614{
Manuel Pégourié-Gonnard66153662013-12-03 14:12:26 +0100615 ecp_group_free( grp );
616
Manuel Pégourié-Gonnard32b04c12013-12-02 15:49:09 +0100617 grp->id = id;
618
619 switch( id )
620 {
621#if defined(POLARSSL_ECP_DP_SECP192R1_ENABLED)
622 case POLARSSL_ECP_DP_SECP192R1:
Manuel Pégourié-Gonnard3ee90002013-12-02 17:14:48 +0100623 NIST_MODP( p192 );
Manuel Pégourié-Gonnard9854fe92013-12-02 16:30:43 +0100624 return( LOAD_GROUP( secp192r1 ) );
Manuel Pégourié-Gonnard32b04c12013-12-02 15:49:09 +0100625#endif /* POLARSSL_ECP_DP_SECP192R1_ENABLED */
626
627#if defined(POLARSSL_ECP_DP_SECP224R1_ENABLED)
628 case POLARSSL_ECP_DP_SECP224R1:
Manuel Pégourié-Gonnard3ee90002013-12-02 17:14:48 +0100629 NIST_MODP( p224 );
Manuel Pégourié-Gonnard9854fe92013-12-02 16:30:43 +0100630 return( LOAD_GROUP( secp224r1 ) );
Manuel Pégourié-Gonnard32b04c12013-12-02 15:49:09 +0100631#endif /* POLARSSL_ECP_DP_SECP224R1_ENABLED */
632
633#if defined(POLARSSL_ECP_DP_SECP256R1_ENABLED)
634 case POLARSSL_ECP_DP_SECP256R1:
Manuel Pégourié-Gonnard3ee90002013-12-02 17:14:48 +0100635 NIST_MODP( p256 );
Manuel Pégourié-Gonnard9854fe92013-12-02 16:30:43 +0100636 return( LOAD_GROUP( secp256r1 ) );
Manuel Pégourié-Gonnard32b04c12013-12-02 15:49:09 +0100637#endif /* POLARSSL_ECP_DP_SECP256R1_ENABLED */
638
639#if defined(POLARSSL_ECP_DP_SECP384R1_ENABLED)
640 case POLARSSL_ECP_DP_SECP384R1:
Manuel Pégourié-Gonnard3ee90002013-12-02 17:14:48 +0100641 NIST_MODP( p384 );
Manuel Pégourié-Gonnard9854fe92013-12-02 16:30:43 +0100642 return( LOAD_GROUP( secp384r1 ) );
Manuel Pégourié-Gonnard32b04c12013-12-02 15:49:09 +0100643#endif /* POLARSSL_ECP_DP_SECP384R1_ENABLED */
644
645#if defined(POLARSSL_ECP_DP_SECP521R1_ENABLED)
646 case POLARSSL_ECP_DP_SECP521R1:
Manuel Pégourié-Gonnard3ee90002013-12-02 17:14:48 +0100647 NIST_MODP( p521 );
Manuel Pégourié-Gonnard9854fe92013-12-02 16:30:43 +0100648 return( LOAD_GROUP( secp521r1 ) );
Manuel Pégourié-Gonnard32b04c12013-12-02 15:49:09 +0100649#endif /* POLARSSL_ECP_DP_SECP521R1_ENABLED */
650
651#if defined(POLARSSL_ECP_DP_BP256R1_ENABLED)
652 case POLARSSL_ECP_DP_BP256R1:
Manuel Pégourié-Gonnard81e1b102013-12-06 13:28:05 +0100653 return( LOAD_GROUP_A( brainpoolP256r1 ) );
Manuel Pégourié-Gonnard32b04c12013-12-02 15:49:09 +0100654#endif /* POLARSSL_ECP_DP_BP256R1_ENABLED */
655
656#if defined(POLARSSL_ECP_DP_BP384R1_ENABLED)
657 case POLARSSL_ECP_DP_BP384R1:
Manuel Pégourié-Gonnard81e1b102013-12-06 13:28:05 +0100658 return( LOAD_GROUP_A( brainpoolP384r1 ) );
Manuel Pégourié-Gonnard32b04c12013-12-02 15:49:09 +0100659#endif /* POLARSSL_ECP_DP_BP384R1_ENABLED */
660
661#if defined(POLARSSL_ECP_DP_BP512R1_ENABLED)
662 case POLARSSL_ECP_DP_BP512R1:
Manuel Pégourié-Gonnard81e1b102013-12-06 13:28:05 +0100663 return( LOAD_GROUP_A( brainpoolP512r1 ) );
Manuel Pégourié-Gonnard32b04c12013-12-02 15:49:09 +0100664#endif /* POLARSSL_ECP_DP_BP512R1_ENABLED */
665
Manuel Pégourié-Gonnard66153662013-12-03 14:12:26 +0100666#if defined(POLARSSL_ECP_DP_M255_ENABLED)
667 case POLARSSL_ECP_DP_M255:
Manuel Pégourié-Gonnard3d7053a2013-12-04 20:51:13 +0100668 grp->modp = ecp_mod_p255;
Manuel Pégourié-Gonnard66153662013-12-03 14:12:26 +0100669 return( ecp_use_curve25519( grp ) );
670#endif /* POLARSSL_ECP_DP_M255_ENABLED */
671
Manuel Pégourié-Gonnard32b04c12013-12-02 15:49:09 +0100672 default:
673 ecp_group_free( grp );
674 return( POLARSSL_ERR_ECP_FEATURE_UNAVAILABLE );
675 }
676}
677
678#if defined(POLARSSL_ECP_NIST_OPTIM)
679/*
680 * Fast reduction modulo the primes used by the NIST curves.
681 *
682 * These functions are critical for speed, but not needed for correct
683 * operations. So, we make the choice to heavily rely on the internals of our
684 * bignum library, which creates a tight coupling between these functions and
685 * our MPI implementation. However, the coupling between the ECP module and
686 * MPI remains loose, since these functions can be deactivated at will.
687 */
688
689#if defined(POLARSSL_ECP_DP_SECP192R1_ENABLED)
690/*
691 * Compared to the way things are presented in FIPS 186-3 D.2,
692 * we proceed in columns, from right (least significant chunk) to left,
693 * adding chunks to N in place, and keeping a carry for the next chunk.
694 * This avoids moving things around in memory, and uselessly adding zeros,
695 * compared to the more straightforward, line-oriented approach.
696 *
697 * For this prime we need to handle data in chunks of 64 bits.
698 * Since this is always a multiple of our basic t_uint, we can
699 * use a t_uint * to designate such a chunk, and small loops to handle it.
700 */
701
702/* Add 64-bit chunks (dst += src) and update carry */
703static inline void add64( t_uint *dst, t_uint *src, t_uint *carry )
704{
705 unsigned char i;
706 t_uint c = 0;
707 for( i = 0; i < 8 / sizeof( t_uint ); i++, dst++, src++ )
708 {
709 *dst += c; c = ( *dst < c );
710 *dst += *src; c += ( *dst < *src );
711 }
712 *carry += c;
713}
714
715/* Add carry to a 64-bit chunk and update carry */
716static inline void carry64( t_uint *dst, t_uint *carry )
717{
718 unsigned char i;
719 for( i = 0; i < 8 / sizeof( t_uint ); i++, dst++ )
720 {
721 *dst += *carry;
722 *carry = ( *dst < *carry );
723 }
724}
725
726#define WIDTH 8 / sizeof( t_uint )
727#define A( i ) N->p + i * WIDTH
728#define ADD( i ) add64( p, A( i ), &c )
729#define NEXT p += WIDTH; carry64( p, &c )
730#define LAST p += WIDTH; *p = c; while( ++p < end ) *p = 0
731
732/*
733 * Fast quasi-reduction modulo p192 (FIPS 186-3 D.2.1)
734 */
Manuel Pégourié-Gonnard3ee90002013-12-02 17:14:48 +0100735static int ecp_mod_p192( mpi *N )
Manuel Pégourié-Gonnard32b04c12013-12-02 15:49:09 +0100736{
737 int ret;
738 t_uint c = 0;
739 t_uint *p, *end;
740
741 /* Make sure we have enough blocks so that A(5) is legal */
742 MPI_CHK( mpi_grow( N, 6 * WIDTH ) );
743
744 p = N->p;
745 end = p + N->n;
746
747 ADD( 3 ); ADD( 5 ); NEXT; // A0 += A3 + A5
748 ADD( 3 ); ADD( 4 ); ADD( 5 ); NEXT; // A1 += A3 + A4 + A5
749 ADD( 4 ); ADD( 5 ); LAST; // A2 += A4 + A5
750
751cleanup:
752 return( ret );
753}
754
755#undef WIDTH
756#undef A
757#undef ADD
758#undef NEXT
759#undef LAST
760#endif /* POLARSSL_ECP_DP_SECP192R1_ENABLED */
761
762#if defined(POLARSSL_ECP_DP_SECP224R1_ENABLED) || \
763 defined(POLARSSL_ECP_DP_SECP256R1_ENABLED) || \
764 defined(POLARSSL_ECP_DP_SECP384R1_ENABLED)
765/*
766 * The reader is advised to first understand ecp_mod_p192() since the same
767 * general structure is used here, but with additional complications:
768 * (1) chunks of 32 bits, and (2) subtractions.
769 */
770
771/*
772 * For these primes, we need to handle data in chunks of 32 bits.
773 * This makes it more complicated if we use 64 bits limbs in MPI,
774 * which prevents us from using a uniform access method as for p192.
775 *
776 * So, we define a mini abstraction layer to access 32 bit chunks,
777 * load them in 'cur' for work, and store them back from 'cur' when done.
778 *
779 * While at it, also define the size of N in terms of 32-bit chunks.
780 */
781#define LOAD32 cur = A( i );
782
783#if defined(POLARSSL_HAVE_INT8) /* 8 bit */
784
785#define MAX32 N->n / 4
786#define A( j ) (uint32_t)( N->p[4*j+0] ) | \
787 ( N->p[4*j+1] << 8 ) | \
788 ( N->p[4*j+2] << 16 ) | \
789 ( N->p[4*j+3] << 24 )
790#define STORE32 N->p[4*i+0] = (t_uint)( cur ); \
791 N->p[4*i+1] = (t_uint)( cur >> 8 ); \
792 N->p[4*i+2] = (t_uint)( cur >> 16 ); \
793 N->p[4*i+3] = (t_uint)( cur >> 24 );
794
795#elif defined(POLARSSL_HAVE_INT16) /* 16 bit */
796
797#define MAX32 N->n / 2
798#define A( j ) (uint32_t)( N->p[2*j] ) | ( N->p[2*j+1] << 16 )
799#define STORE32 N->p[2*i+0] = (t_uint)( cur ); \
800 N->p[2*i+1] = (t_uint)( cur >> 16 );
801
802#elif defined(POLARSSL_HAVE_INT32) /* 32 bit */
803
804#define MAX32 N->n
805#define A( j ) N->p[j]
806#define STORE32 N->p[i] = cur;
807
808#else /* 64-bit */
809
810#define MAX32 N->n * 2
811#define A( j ) j % 2 ? (uint32_t)( N->p[j/2] >> 32 ) : (uint32_t)( N->p[j/2] )
812#define STORE32 \
813 if( i % 2 ) { \
814 N->p[i/2] &= 0x00000000FFFFFFFF; \
815 N->p[i/2] |= ((t_uint) cur) << 32; \
816 } else { \
817 N->p[i/2] &= 0xFFFFFFFF00000000; \
818 N->p[i/2] |= (t_uint) cur; \
819 }
820
821#endif /* sizeof( t_uint ) */
822
823/*
824 * Helpers for addition and subtraction of chunks, with signed carry.
825 */
826static inline void add32( uint32_t *dst, uint32_t src, signed char *carry )
827{
828 *dst += src;
829 *carry += ( *dst < src );
830}
831
832static inline void sub32( uint32_t *dst, uint32_t src, signed char *carry )
833{
834 *carry -= ( *dst < src );
835 *dst -= src;
836}
837
838#define ADD( j ) add32( &cur, A( j ), &c );
839#define SUB( j ) sub32( &cur, A( j ), &c );
840
841/*
842 * Helpers for the main 'loop'
843 * (see fix_negative for the motivation of C)
844 */
845#define INIT( b ) \
846 int ret; \
847 signed char c = 0, cc; \
848 uint32_t cur; \
849 size_t i = 0, bits = b; \
850 mpi C; \
851 t_uint Cp[ b / 8 / sizeof( t_uint) + 1 ]; \
852 \
853 C.s = 1; \
854 C.n = b / 8 / sizeof( t_uint) + 1; \
855 C.p = Cp; \
856 memset( Cp, 0, C.n * sizeof( t_uint ) ); \
857 \
858 MPI_CHK( mpi_grow( N, b * 2 / 8 / sizeof( t_uint ) ) ); \
859 LOAD32;
860
861#define NEXT \
862 STORE32; i++; LOAD32; \
863 cc = c; c = 0; \
864 if( cc < 0 ) \
865 sub32( &cur, -cc, &c ); \
866 else \
867 add32( &cur, cc, &c ); \
868
869#define LAST \
870 STORE32; i++; \
871 cur = c > 0 ? c : 0; STORE32; \
872 cur = 0; while( ++i < MAX32 ) { STORE32; } \
873 if( c < 0 ) fix_negative( N, c, &C, bits );
874
875/*
876 * If the result is negative, we get it in the form
877 * c * 2^(bits + 32) + N, with c negative and N positive shorter than 'bits'
878 */
879static inline int fix_negative( mpi *N, signed char c, mpi *C, size_t bits )
880{
881 int ret;
882
883 /* C = - c * 2^(bits + 32) */
884#if !defined(POLARSSL_HAVE_INT64)
885 ((void) bits);
886#else
887 if( bits == 224 )
888 C->p[ C->n - 1 ] = ((t_uint) -c) << 32;
889 else
890#endif
891 C->p[ C->n - 1 ] = (t_uint) -c;
892
893 /* N = - ( C - N ) */
894 MPI_CHK( mpi_sub_abs( N, C, N ) );
895 N->s = -1;
896
897cleanup:
898
899 return( ret );
900}
901
902#if defined(POLARSSL_ECP_DP_SECP224R1_ENABLED)
903/*
904 * Fast quasi-reduction modulo p224 (FIPS 186-3 D.2.2)
905 */
Manuel Pégourié-Gonnard3ee90002013-12-02 17:14:48 +0100906static int ecp_mod_p224( mpi *N )
Manuel Pégourié-Gonnard32b04c12013-12-02 15:49:09 +0100907{
908 INIT( 224 );
909
910 SUB( 7 ); SUB( 11 ); NEXT; // A0 += -A7 - A11
911 SUB( 8 ); SUB( 12 ); NEXT; // A1 += -A8 - A12
912 SUB( 9 ); SUB( 13 ); NEXT; // A2 += -A9 - A13
913 SUB( 10 ); ADD( 7 ); ADD( 11 ); NEXT; // A3 += -A10 + A7 + A11
914 SUB( 11 ); ADD( 8 ); ADD( 12 ); NEXT; // A4 += -A11 + A8 + A12
915 SUB( 12 ); ADD( 9 ); ADD( 13 ); NEXT; // A5 += -A12 + A9 + A13
916 SUB( 13 ); ADD( 10 ); LAST; // A6 += -A13 + A10
917
918cleanup:
919 return( ret );
920}
921#endif /* POLARSSL_ECP_DP_SECP224R1_ENABLED */
922
923#if defined(POLARSSL_ECP_DP_SECP256R1_ENABLED)
924/*
925 * Fast quasi-reduction modulo p256 (FIPS 186-3 D.2.3)
926 */
Manuel Pégourié-Gonnard3ee90002013-12-02 17:14:48 +0100927static int ecp_mod_p256( mpi *N )
Manuel Pégourié-Gonnard32b04c12013-12-02 15:49:09 +0100928{
929 INIT( 256 );
930
931 ADD( 8 ); ADD( 9 );
932 SUB( 11 ); SUB( 12 ); SUB( 13 ); SUB( 14 ); NEXT; // A0
933
934 ADD( 9 ); ADD( 10 );
935 SUB( 12 ); SUB( 13 ); SUB( 14 ); SUB( 15 ); NEXT; // A1
936
937 ADD( 10 ); ADD( 11 );
938 SUB( 13 ); SUB( 14 ); SUB( 15 ); NEXT; // A2
939
940 ADD( 11 ); ADD( 11 ); ADD( 12 ); ADD( 12 ); ADD( 13 );
941 SUB( 15 ); SUB( 8 ); SUB( 9 ); NEXT; // A3
942
943 ADD( 12 ); ADD( 12 ); ADD( 13 ); ADD( 13 ); ADD( 14 );
944 SUB( 9 ); SUB( 10 ); NEXT; // A4
945
946 ADD( 13 ); ADD( 13 ); ADD( 14 ); ADD( 14 ); ADD( 15 );
947 SUB( 10 ); SUB( 11 ); NEXT; // A5
948
949 ADD( 14 ); ADD( 14 ); ADD( 15 ); ADD( 15 ); ADD( 14 ); ADD( 13 );
950 SUB( 8 ); SUB( 9 ); NEXT; // A6
951
952 ADD( 15 ); ADD( 15 ); ADD( 15 ); ADD( 8 );
953 SUB( 10 ); SUB( 11 ); SUB( 12 ); SUB( 13 ); LAST; // A7
954
955cleanup:
956 return( ret );
957}
958#endif /* POLARSSL_ECP_DP_SECP256R1_ENABLED */
959
960#if defined(POLARSSL_ECP_DP_SECP384R1_ENABLED)
961/*
962 * Fast quasi-reduction modulo p384 (FIPS 186-3 D.2.4)
963 */
Manuel Pégourié-Gonnard3ee90002013-12-02 17:14:48 +0100964static int ecp_mod_p384( mpi *N )
Manuel Pégourié-Gonnard32b04c12013-12-02 15:49:09 +0100965{
966 INIT( 384 );
967
968 ADD( 12 ); ADD( 21 ); ADD( 20 );
969 SUB( 23 ); NEXT; // A0
970
971 ADD( 13 ); ADD( 22 ); ADD( 23 );
972 SUB( 12 ); SUB( 20 ); NEXT; // A2
973
974 ADD( 14 ); ADD( 23 );
975 SUB( 13 ); SUB( 21 ); NEXT; // A2
976
977 ADD( 15 ); ADD( 12 ); ADD( 20 ); ADD( 21 );
978 SUB( 14 ); SUB( 22 ); SUB( 23 ); NEXT; // A3
979
980 ADD( 21 ); ADD( 21 ); ADD( 16 ); ADD( 13 ); ADD( 12 ); ADD( 20 ); ADD( 22 );
981 SUB( 15 ); SUB( 23 ); SUB( 23 ); NEXT; // A4
982
983 ADD( 22 ); ADD( 22 ); ADD( 17 ); ADD( 14 ); ADD( 13 ); ADD( 21 ); ADD( 23 );
984 SUB( 16 ); NEXT; // A5
985
986 ADD( 23 ); ADD( 23 ); ADD( 18 ); ADD( 15 ); ADD( 14 ); ADD( 22 );
987 SUB( 17 ); NEXT; // A6
988
989 ADD( 19 ); ADD( 16 ); ADD( 15 ); ADD( 23 );
990 SUB( 18 ); NEXT; // A7
991
992 ADD( 20 ); ADD( 17 ); ADD( 16 );
993 SUB( 19 ); NEXT; // A8
994
995 ADD( 21 ); ADD( 18 ); ADD( 17 );
996 SUB( 20 ); NEXT; // A9
997
998 ADD( 22 ); ADD( 19 ); ADD( 18 );
999 SUB( 21 ); NEXT; // A10
1000
1001 ADD( 23 ); ADD( 20 ); ADD( 19 );
1002 SUB( 22 ); LAST; // A11
1003
1004cleanup:
1005 return( ret );
1006}
1007#endif /* POLARSSL_ECP_DP_SECP384R1_ENABLED */
1008
1009#undef A
1010#undef LOAD32
1011#undef STORE32
1012#undef MAX32
1013#undef INIT
1014#undef NEXT
1015#undef LAST
1016
1017#endif /* POLARSSL_ECP_DP_SECP224R1_ENABLED ||
1018 POLARSSL_ECP_DP_SECP256R1_ENABLED ||
1019 POLARSSL_ECP_DP_SECP384R1_ENABLED */
1020
1021#if defined(POLARSSL_ECP_DP_SECP521R1_ENABLED)
1022/*
1023 * Here we have an actual Mersenne prime, so things are more straightforward.
1024 * However, chunks are aligned on a 'weird' boundary (521 bits).
1025 */
1026
1027/* Size of p521 in terms of t_uint */
1028#define P521_WIDTH ( 521 / 8 / sizeof( t_uint ) + 1 )
1029
1030/* Bits to keep in the most significant t_uint */
1031#if defined(POLARSSL_HAVE_INT8)
1032#define P521_MASK 0x01
1033#else
1034#define P521_MASK 0x01FF
1035#endif
1036
1037/*
1038 * Fast quasi-reduction modulo p521 (FIPS 186-3 D.2.5)
1039 * Write N as A1 + 2^521 A0, return A0 + A1
1040 */
Manuel Pégourié-Gonnard3ee90002013-12-02 17:14:48 +01001041static int ecp_mod_p521( mpi *N )
Manuel Pégourié-Gonnard32b04c12013-12-02 15:49:09 +01001042{
1043 int ret;
1044 size_t i;
1045 mpi M;
1046 t_uint Mp[P521_WIDTH + 1];
1047 /* Worst case for the size of M is when t_uint is 16 bits:
1048 * we need to hold bits 513 to 1056, which is 34 limbs, that is
1049 * P521_WIDTH + 1. Otherwise P521_WIDTH is enough. */
1050
1051 if( N->n < P521_WIDTH )
1052 return( 0 );
1053
1054 /* M = A1 */
1055 M.s = 1;
1056 M.n = N->n - ( P521_WIDTH - 1 );
1057 if( M.n > P521_WIDTH + 1 )
1058 M.n = P521_WIDTH + 1;
1059 M.p = Mp;
1060 memcpy( Mp, N->p + P521_WIDTH - 1, M.n * sizeof( t_uint ) );
1061 MPI_CHK( mpi_shift_r( &M, 521 % ( 8 * sizeof( t_uint ) ) ) );
1062
1063 /* N = A0 */
1064 N->p[P521_WIDTH - 1] &= P521_MASK;
1065 for( i = P521_WIDTH; i < N->n; i++ )
1066 N->p[i] = 0;
1067
1068 /* N = A0 + A1 */
1069 MPI_CHK( mpi_add_abs( N, N, &M ) );
1070
1071cleanup:
1072 return( ret );
1073}
1074
1075#undef P521_WIDTH
1076#undef P521_MASK
1077#endif /* POLARSSL_ECP_DP_SECP521R1_ENABLED */
1078
1079#endif /* POLARSSL_ECP_NIST_OPTIM */
1080
Manuel Pégourié-Gonnard3d7053a2013-12-04 20:51:13 +01001081#if defined(POLARSSL_ECP_DP_M255_ENABLED)
1082
1083/* Size of p255 in terms of t_uint */
1084#define P255_WIDTH ( 255 / 8 / sizeof( t_uint ) + 1 )
1085
1086/*
1087 * Fast quasi-reduction modulo p255 = 2^255 - 19
1088 * Write N as A1 + 2^255 A1, return A0 + 19 * A1
1089 */
1090static int ecp_mod_p255( mpi *N )
1091{
1092 int ret;
1093 size_t i;
1094 mpi M;
1095 t_uint Mp[P255_WIDTH + 2];
1096
1097 if( N->n < P255_WIDTH )
1098 return( 0 );
1099
1100 /* M = A1 */
1101 M.s = 1;
1102 M.n = N->n - ( P255_WIDTH - 1 );
1103 if( M.n > P255_WIDTH + 1 )
1104 M.n = P255_WIDTH + 1;
1105 M.p = Mp;
1106 memset( Mp, 0, sizeof Mp );
1107 memcpy( Mp, N->p + P255_WIDTH - 1, M.n * sizeof( t_uint ) );
1108 MPI_CHK( mpi_shift_r( &M, 255 % ( 8 * sizeof( t_uint ) ) ) );
1109 M.n++; /* Make room for multiplication by 19 */
1110
1111 /* N = A0 */
1112 mpi_set_bit( N, 255, 0 );
1113 for( i = P255_WIDTH; i < N->n; i++ )
1114 N->p[i] = 0;
1115
1116 /* N = A0 + 19 * A1 */
1117 MPI_CHK( mpi_mul_int( &M, &M, 19 ) );
1118 MPI_CHK( mpi_add_abs( N, N, &M ) );
1119
1120cleanup:
1121 return( ret );
1122}
1123#endif /* POLARSSL_ECP_DP_M255_ENABLED */
1124
Manuel Pégourié-Gonnard32b04c12013-12-02 15:49:09 +01001125#endif