blob: 508831cb2ea6c8f9a5451d3679c558c3f43aa088 [file] [log] [blame]
Jarno Lamsa18987a42019-04-24 15:40:43 +03001/* ecc.c - TinyCrypt implementation of common ECC functions */
2
3/*
Simon Butcher92c3d1f2019-09-09 17:25:08 +01004 * Copyright (c) 2019, Arm Limited (or its affiliates), All Rights Reserved.
5 * SPDX-License-Identifier: BSD-3-Clause
6 */
7
8/*
Jarno Lamsa18987a42019-04-24 15:40:43 +03009 * Copyright (c) 2014, Kenneth MacKay
10 * All rights reserved.
11 *
12 * Redistribution and use in source and binary forms, with or without
13 * modification, are permitted provided that the following conditions are met:
14 * * Redistributions of source code must retain the above copyright notice,
15 * this list of conditions and the following disclaimer.
16 * * Redistributions in binary form must reproduce the above copyright notice,
17 * this list of conditions and the following disclaimer in the documentation
18 * and/or other materials provided with the distribution.
19 *
20 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND
21 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
22 * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
23 * DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR
24 * ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
25 * (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
26 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON
27 * ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
28 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
29 * SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
30 *
31 * Copyright (C) 2017 by Intel Corporation, All Rights Reserved.
32 *
33 * Redistribution and use in source and binary forms, with or without
34 * modification, are permitted provided that the following conditions are met:
35 *
36 * - Redistributions of source code must retain the above copyright notice,
37 * this list of conditions and the following disclaimer.
38 *
39 * - Redistributions in binary form must reproduce the above copyright
40 * notice, this list of conditions and the following disclaimer in the
41 * documentation and/or other materials provided with the distribution.
42 *
43 * - Neither the name of Intel Corporation nor the names of its contributors
44 * may be used to endorse or promote products derived from this software
45 * without specific prior written permission.
46 *
47 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
48 * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
49 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
50 * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE
51 * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
52 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
53 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
54 * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
55 * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
56 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
57 * POSSIBILITY OF SUCH DAMAGE.
58 */
59
Hanno Becker36ae7582019-07-23 15:52:35 +010060#if !defined(MBEDTLS_CONFIG_FILE)
61#include "mbedtls/config.h"
62#else
63#include MBEDTLS_CONFIG_FILE
64#endif
65
Manuel Pégourié-Gonnardafdc1b52019-05-09 11:24:11 +020066#if defined(MBEDTLS_USE_TINYCRYPT)
Jarno Lamsa18987a42019-04-24 15:40:43 +030067#include <tinycrypt/ecc.h>
Manuel Pégourié-Gonnardef238282019-11-04 11:19:30 +010068#include "mbedtls/platform_util.h"
Jarno Lamsa18987a42019-04-24 15:40:43 +030069#include <string.h>
70
71/* IMPORTANT: Make sure a cryptographically-secure PRNG is set and the platform
72 * has access to enough entropy in order to feed the PRNG regularly. */
73#if default_RNG_defined
74static uECC_RNG_Function g_rng_function = &default_CSPRNG;
75#else
76static uECC_RNG_Function g_rng_function = 0;
77#endif
78
79void uECC_set_rng(uECC_RNG_Function rng_function)
80{
81 g_rng_function = rng_function;
82}
83
84uECC_RNG_Function uECC_get_rng(void)
85{
86 return g_rng_function;
87}
88
89int uECC_curve_private_key_size(uECC_Curve curve)
90{
91 return BITS_TO_BYTES(curve->num_n_bits);
92}
93
94int uECC_curve_public_key_size(uECC_Curve curve)
95{
96 return 2 * curve->num_bytes;
97}
98
Manuel Pégourié-Gonnard94e48492019-11-04 12:47:28 +010099void uECC_vli_clear(uECC_word_t *vli)
Jarno Lamsa18987a42019-04-24 15:40:43 +0300100{
101 wordcount_t i;
Manuel Pégourié-Gonnard94e48492019-11-04 12:47:28 +0100102 for (i = 0; i < NUM_ECC_WORDS; ++i) {
Jarno Lamsa18987a42019-04-24 15:40:43 +0300103 vli[i] = 0;
104 }
105}
106
Manuel Pégourié-Gonnardf3899fc2019-11-04 12:44:43 +0100107uECC_word_t uECC_vli_isZero(const uECC_word_t *vli)
Jarno Lamsa18987a42019-04-24 15:40:43 +0300108{
109 uECC_word_t bits = 0;
110 wordcount_t i;
Manuel Pégourié-Gonnardf3899fc2019-11-04 12:44:43 +0100111 for (i = 0; i < NUM_ECC_WORDS; ++i) {
Jarno Lamsa18987a42019-04-24 15:40:43 +0300112 bits |= vli[i];
113 }
114 return (bits == 0);
115}
116
117uECC_word_t uECC_vli_testBit(const uECC_word_t *vli, bitcount_t bit)
118{
119 return (vli[bit >> uECC_WORD_BITS_SHIFT] &
120 ((uECC_word_t)1 << (bit & uECC_WORD_BITS_MASK)));
121}
122
123/* Counts the number of words in vli. */
Manuel Pégourié-Gonnard2bf5a122019-11-04 12:56:59 +0100124static wordcount_t vli_numDigits(const uECC_word_t *vli)
Jarno Lamsa18987a42019-04-24 15:40:43 +0300125{
126
127 wordcount_t i;
128 /* Search from the end until we find a non-zero digit. We do it in reverse
129 * because we expect that most digits will be nonzero. */
Manuel Pégourié-Gonnard2bf5a122019-11-04 12:56:59 +0100130 for (i = NUM_ECC_WORDS - 1; i >= 0 && vli[i] == 0; --i) {
Jarno Lamsa18987a42019-04-24 15:40:43 +0300131 }
132
133 return (i + 1);
134}
135
Manuel Pégourié-Gonnard2bf5a122019-11-04 12:56:59 +0100136bitcount_t uECC_vli_numBits(const uECC_word_t *vli)
Jarno Lamsa18987a42019-04-24 15:40:43 +0300137{
138
139 uECC_word_t i;
140 uECC_word_t digit;
141
Manuel Pégourié-Gonnard2bf5a122019-11-04 12:56:59 +0100142 wordcount_t num_digits = vli_numDigits(vli);
Jarno Lamsa18987a42019-04-24 15:40:43 +0300143 if (num_digits == 0) {
144 return 0;
145 }
146
147 digit = vli[num_digits - 1];
148 for (i = 0; digit; ++i) {
149 digit >>= 1;
150 }
151
152 return (((bitcount_t)(num_digits - 1) << uECC_WORD_BITS_SHIFT) + i);
153}
154
Manuel Pégourié-Gonnardcbbb0f02019-11-04 13:02:04 +0100155void uECC_vli_set(uECC_word_t *dest, const uECC_word_t *src)
Jarno Lamsa18987a42019-04-24 15:40:43 +0300156{
157 wordcount_t i;
158
Manuel Pégourié-Gonnardcbbb0f02019-11-04 13:02:04 +0100159 for (i = 0; i < NUM_ECC_WORDS; ++i) {
Jarno Lamsa18987a42019-04-24 15:40:43 +0300160 dest[i] = src[i];
161 }
162}
163
164cmpresult_t uECC_vli_cmp_unsafe(const uECC_word_t *left,
Manuel Pégourié-Gonnarda7521912019-11-04 14:31:35 +0100165 const uECC_word_t *right)
Jarno Lamsa18987a42019-04-24 15:40:43 +0300166{
167 wordcount_t i;
168
Manuel Pégourié-Gonnarda7521912019-11-04 14:31:35 +0100169 for (i = NUM_ECC_WORDS - 1; i >= 0; --i) {
Jarno Lamsa18987a42019-04-24 15:40:43 +0300170 if (left[i] > right[i]) {
171 return 1;
172 } else if (left[i] < right[i]) {
173 return -1;
174 }
175 }
176 return 0;
177}
178
Manuel Pégourié-Gonnard2eca3d32019-11-04 14:33:09 +0100179uECC_word_t uECC_vli_equal(const uECC_word_t *left, const uECC_word_t *right)
Jarno Lamsa18987a42019-04-24 15:40:43 +0300180{
181
182 uECC_word_t diff = 0;
183 wordcount_t i;
184
Manuel Pégourié-Gonnard2eca3d32019-11-04 14:33:09 +0100185 for (i = NUM_ECC_WORDS - 1; i >= 0; --i) {
Jarno Lamsa18987a42019-04-24 15:40:43 +0300186 diff |= (left[i] ^ right[i]);
187 }
188 return !(diff == 0);
189}
190
191uECC_word_t cond_set(uECC_word_t p_true, uECC_word_t p_false, unsigned int cond)
192{
193 return (p_true*(cond)) | (p_false*(!cond));
194}
195
196/* Computes result = left - right, returning borrow, in constant time.
197 * Can modify in place. */
198uECC_word_t uECC_vli_sub(uECC_word_t *result, const uECC_word_t *left,
Manuel Pégourié-Gonnard129b42e2019-11-04 14:41:45 +0100199 const uECC_word_t *right)
Jarno Lamsa18987a42019-04-24 15:40:43 +0300200{
201 uECC_word_t borrow = 0;
202 wordcount_t i;
Manuel Pégourié-Gonnard129b42e2019-11-04 14:41:45 +0100203 for (i = 0; i < NUM_ECC_WORDS; ++i) {
Jarno Lamsa18987a42019-04-24 15:40:43 +0300204 uECC_word_t diff = left[i] - right[i] - borrow;
205 uECC_word_t val = (diff > left[i]);
206 borrow = cond_set(val, borrow, (diff != left[i]));
207
208 result[i] = diff;
209 }
210 return borrow;
211}
212
213/* Computes result = left + right, returning carry, in constant time.
214 * Can modify in place. */
215static uECC_word_t uECC_vli_add(uECC_word_t *result, const uECC_word_t *left,
Manuel Pégourié-Gonnard02d9d212019-11-04 12:37:08 +0100216 const uECC_word_t *right)
Jarno Lamsa18987a42019-04-24 15:40:43 +0300217{
218 uECC_word_t carry = 0;
219 wordcount_t i;
Manuel Pégourié-Gonnard02d9d212019-11-04 12:37:08 +0100220 for (i = 0; i < NUM_ECC_WORDS; ++i) {
Jarno Lamsa18987a42019-04-24 15:40:43 +0300221 uECC_word_t sum = left[i] + right[i] + carry;
222 uECC_word_t val = (sum < left[i]);
223 carry = cond_set(val, carry, (sum != left[i]));
224 result[i] = sum;
225 }
226 return carry;
227}
228
Manuel Pégourié-Gonnard2cb3eea2019-11-04 14:43:35 +0100229cmpresult_t uECC_vli_cmp(const uECC_word_t *left, const uECC_word_t *right)
Jarno Lamsa18987a42019-04-24 15:40:43 +0300230{
231 uECC_word_t tmp[NUM_ECC_WORDS];
Manuel Pégourié-Gonnard129b42e2019-11-04 14:41:45 +0100232 uECC_word_t neg = !!uECC_vli_sub(tmp, left, right);
Manuel Pégourié-Gonnardf3899fc2019-11-04 12:44:43 +0100233 uECC_word_t equal = uECC_vli_isZero(tmp);
Jarno Lamsa18987a42019-04-24 15:40:43 +0300234 return (!equal - 2 * neg);
235}
236
237/* Computes vli = vli >> 1. */
Manuel Pégourié-Gonnard5e3baf22019-11-04 14:46:10 +0100238static void uECC_vli_rshift1(uECC_word_t *vli)
Jarno Lamsa18987a42019-04-24 15:40:43 +0300239{
240 uECC_word_t *end = vli;
241 uECC_word_t carry = 0;
242
Manuel Pégourié-Gonnard5e3baf22019-11-04 14:46:10 +0100243 vli += NUM_ECC_WORDS;
Jarno Lamsa18987a42019-04-24 15:40:43 +0300244 while (vli-- > end) {
245 uECC_word_t temp = *vli;
246 *vli = (temp >> 1) | carry;
247 carry = temp << (uECC_WORD_BITS - 1);
248 }
249}
250
Manuel Pégourié-Gonnard86c4f812019-10-31 13:02:03 +0100251/* Compute a * b + r, where r is a double-word with high-order word r1 and
252 * low-order word r0, and store the result in the same double-word (r1, r0),
253 * with the carry bit stored in r2.
254 *
255 * (r2, r1, r0) = a * b + (r1, r0):
Manuel Pégourié-Gonnard14ab9c22019-10-22 09:49:53 +0200256 * [in] a, b: operands to be multiplied
257 * [in] r0, r1: low and high-order words of operand to add
258 * [out] r0, r1: low and high-order words of the result
259 * [out] r2: carry
260 */
Jarno Lamsa18987a42019-04-24 15:40:43 +0300261static void muladd(uECC_word_t a, uECC_word_t b, uECC_word_t *r0,
262 uECC_word_t *r1, uECC_word_t *r2)
263{
264
265 uECC_dword_t p = (uECC_dword_t)a * b;
266 uECC_dword_t r01 = ((uECC_dword_t)(*r1) << uECC_WORD_BITS) | *r0;
267 r01 += p;
268 *r2 += (r01 < p);
269 *r1 = r01 >> uECC_WORD_BITS;
270 *r0 = (uECC_word_t)r01;
271
272}
273
Manuel Pégourié-Gonnard14ab9c22019-10-22 09:49:53 +0200274/* State for implementing random delays in uECC_vli_mult_rnd().
275 *
Manuel Pégourié-Gonnardd4671162019-10-31 11:26:26 +0100276 * The state is initialized by randomizing delays and setting i = 0.
Manuel Pégourié-Gonnard14ab9c22019-10-22 09:49:53 +0200277 * Each call to uECC_vli_mult_rnd() uses one byte of delays and increments i.
278 *
Manuel Pégourié-Gonnardd4671162019-10-31 11:26:26 +0100279 * Randomized vli multiplication is used only for point operations
280 * (XYcZ_add_rnd() * and XYcZ_addC_rnd()) in scalar multiplication
281 * (ECCPoint_mult()). Those go in pair, and each pair does 14 calls to
282 * uECC_vli_mult_rnd() (6 in XYcZ_add_rnd() and 8 in XYcZ_addC_rnd(),
Manuel Pégourié-Gonnardc78d86b2019-11-04 10:18:42 +0100283 * indirectly through uECC_vli_modMult_rnd().
Manuel Pégourié-Gonnardd4671162019-10-31 11:26:26 +0100284 *
285 * Considering this, in order to minimize the number of calls to the RNG
286 * (which impact performance) while keeping the size of the structure low,
287 * make room for 14 randomized vli mults, which corresponds to one step in the
288 * scalar multiplication routine.
Manuel Pégourié-Gonnard14ab9c22019-10-22 09:49:53 +0200289 */
290typedef struct {
Manuel Pégourié-Gonnardd4671162019-10-31 11:26:26 +0100291 uint8_t i;
292 uint8_t delays[14];
Manuel Pégourié-Gonnardd5e503e2019-10-31 12:53:44 +0100293} ecc_wait_state_t;
Manuel Pégourié-Gonnard14ab9c22019-10-22 09:49:53 +0200294
Manuel Pégourié-Gonnardd4671162019-10-31 11:26:26 +0100295/*
296 * Reset wait_state so that it's ready to be used.
297 */
Manuel Pégourié-Gonnardd5e503e2019-10-31 12:53:44 +0100298void ecc_wait_state_reset(ecc_wait_state_t *ws)
Manuel Pégourié-Gonnardd4671162019-10-31 11:26:26 +0100299{
300 if (ws == NULL)
301 return;
302
303 ws->i = 0;
304 g_rng_function(ws->delays, sizeof(ws->delays));
305}
306
Manuel Pégourié-Gonnard14ab9c22019-10-22 09:49:53 +0200307/* Computes result = left * right. Result must be 2 * num_words long.
308 *
309 * As a counter-measure against horizontal attacks, add noise by performing
310 * a random number of extra computations performing random additional accesses
311 * to limbs of the input.
312 *
313 * Each of the two actual computation loops is surrounded by two
314 * similar-looking waiting loops, to make the beginning and end of the actual
315 * computation harder to spot.
316 *
317 * We add 4 waiting loops of between 0 and 3 calls to muladd() each. That
318 * makes an average of 6 extra calls. Compared to the main computation which
319 * makes 64 such calls, this represents an average performance degradation of
320 * less than 10%.
321 *
322 * Compared to the original uECC_vli_mult(), loose the num_words argument as we
323 * know it's always 8. This saves a bit of code size and execution speed.
324 */
325static void uECC_vli_mult_rnd(uECC_word_t *result, const uECC_word_t *left,
Manuel Pégourié-Gonnardd5e503e2019-10-31 12:53:44 +0100326 const uECC_word_t *right, ecc_wait_state_t *s)
Jarno Lamsa18987a42019-04-24 15:40:43 +0300327{
328
329 uECC_word_t r0 = 0;
330 uECC_word_t r1 = 0;
331 uECC_word_t r2 = 0;
332 wordcount_t i, k;
Manuel Pégourié-Gonnard78a7e352019-11-04 12:31:06 +0100333 const uint8_t num_words = NUM_ECC_WORDS;
Manuel Pégourié-Gonnard14ab9c22019-10-22 09:49:53 +0200334
335 /* Fetch 8 bit worth of delay from the state; 0 if we have no state */
336 uint8_t delays = s ? s->delays[s->i++] : 0;
337 uECC_word_t rr0 = 0, rr1 = 0;
338 volatile uECC_word_t r;
339
340 /* Mimic start of next loop: k in [0, 3] */
341 k = 0 + (delays & 0x03);
342 delays >>= 2;
343 /* k = 0 -> i in [1, 0] -> 0 extra muladd;
344 * k = 3 -> i in [1, 3] -> 3 extra muladd */
345 for (i = 0; i <= k; ++i) {
346 muladd(left[i], right[k - i], &rr0, &rr1, &r2);
347 }
348 r = rr0;
349 rr0 = rr1;
350 rr1 = r2;
351 r2 = 0;
Jarno Lamsa18987a42019-04-24 15:40:43 +0300352
353 /* Compute each digit of result in sequence, maintaining the carries. */
354 for (k = 0; k < num_words; ++k) {
355
356 for (i = 0; i <= k; ++i) {
357 muladd(left[i], right[k - i], &r0, &r1, &r2);
358 }
359
360 result[k] = r0;
361 r0 = r1;
362 r1 = r2;
363 r2 = 0;
364 }
365
Manuel Pégourié-Gonnard14ab9c22019-10-22 09:49:53 +0200366 /* Mimic end of previous loop: k in [4, 7] */
367 k = 4 + (delays & 0x03);
368 delays >>= 2;
369 /* k = 4 -> i in [5, 4] -> 0 extra muladd;
370 * k = 7 -> i in [5, 7] -> 3 extra muladd */
371 for (i = 5; i <= k; ++i) {
372 muladd(left[i], right[k - i], &rr0, &rr1, &r2);
373 }
374 r = rr0;
375 rr0 = rr1;
376 rr1 = r2;
377 r2 = 0;
378
379 /* Mimic start of next loop: k in [8, 11] */
380 k = 11 - (delays & 0x03);
381 delays >>= 2;
382 /* k = 8 -> i in [5, 7] -> 3 extra muladd;
383 * k = 11 -> i in [8, 7] -> 0 extra muladd */
384 for (i = (k + 5) - num_words; i < num_words; ++i) {
385 muladd(left[i], right[k - i], &rr0, &rr1, &r2);
386 }
387 r = rr0;
388 rr0 = rr1;
389 rr1 = r2;
390 r2 = 0;
391
Jarno Lamsa18987a42019-04-24 15:40:43 +0300392 for (k = num_words; k < num_words * 2 - 1; ++k) {
393
394 for (i = (k + 1) - num_words; i < num_words; ++i) {
395 muladd(left[i], right[k - i], &r0, &r1, &r2);
396 }
397 result[k] = r0;
398 r0 = r1;
399 r1 = r2;
400 r2 = 0;
401 }
Manuel Pégourié-Gonnard14ab9c22019-10-22 09:49:53 +0200402
Jarno Lamsa18987a42019-04-24 15:40:43 +0300403 result[num_words * 2 - 1] = r0;
Manuel Pégourié-Gonnard14ab9c22019-10-22 09:49:53 +0200404
405 /* Mimic end of previous loop: k in [12, 15] */
406 k = 15 - (delays & 0x03);
407 delays >>= 2;
408 /* k = 12 -> i in [5, 7] -> 3 extra muladd;
409 * k = 15 -> i in [8, 7] -> 0 extra muladd */
410 for (i = (k + 1) - num_words; i < num_words; ++i) {
411 muladd(left[i], right[k - i], &rr0, &rr1, &r2);
412 }
413 r = rr0;
414 rr0 = rr1;
415 rr1 = r2;
416 r2 = 0;
417
418 /* avoid warning that r is set but not used */
419 (void) r;
420}
421
Jarno Lamsa18987a42019-04-24 15:40:43 +0300422void uECC_vli_modAdd(uECC_word_t *result, const uECC_word_t *left,
Manuel Pégourié-Gonnard0779be72019-11-04 14:48:22 +0100423 const uECC_word_t *right, const uECC_word_t *mod)
Jarno Lamsa18987a42019-04-24 15:40:43 +0300424{
Manuel Pégourié-Gonnard02d9d212019-11-04 12:37:08 +0100425 uECC_word_t carry = uECC_vli_add(result, left, right);
Manuel Pégourié-Gonnarda7521912019-11-04 14:31:35 +0100426 if (carry || uECC_vli_cmp_unsafe(mod, result) != 1) {
Jarno Lamsa18987a42019-04-24 15:40:43 +0300427 /* result > mod (result = mod + remainder), so subtract mod to get
428 * remainder. */
Manuel Pégourié-Gonnard129b42e2019-11-04 14:41:45 +0100429 uECC_vli_sub(result, result, mod);
Jarno Lamsa18987a42019-04-24 15:40:43 +0300430 }
431}
432
433void uECC_vli_modSub(uECC_word_t *result, const uECC_word_t *left,
Manuel Pégourié-Gonnard1b0875d2019-11-04 14:50:54 +0100434 const uECC_word_t *right, const uECC_word_t *mod)
Jarno Lamsa18987a42019-04-24 15:40:43 +0300435{
Manuel Pégourié-Gonnard129b42e2019-11-04 14:41:45 +0100436 uECC_word_t l_borrow = uECC_vli_sub(result, left, right);
Jarno Lamsa18987a42019-04-24 15:40:43 +0300437 if (l_borrow) {
438 /* In this case, result == -diff == (max int) - diff. Since -x % d == d - x,
439 * we can get the correct result from result + mod (with overflow). */
Manuel Pégourié-Gonnard02d9d212019-11-04 12:37:08 +0100440 uECC_vli_add(result, result, mod);
Jarno Lamsa18987a42019-04-24 15:40:43 +0300441 }
442}
443
444/* Computes result = product % mod, where product is 2N words long. */
445/* Currently only designed to work for curve_p or curve_n. */
446void uECC_vli_mmod(uECC_word_t *result, uECC_word_t *product,
Manuel Pégourié-Gonnard10349e42019-11-04 14:57:53 +0100447 const uECC_word_t *mod)
Jarno Lamsa18987a42019-04-24 15:40:43 +0300448{
449 uECC_word_t mod_multiple[2 * NUM_ECC_WORDS];
450 uECC_word_t tmp[2 * NUM_ECC_WORDS];
451 uECC_word_t *v[2] = {tmp, product};
452 uECC_word_t index;
Manuel Pégourié-Gonnard10349e42019-11-04 14:57:53 +0100453 const wordcount_t num_words = NUM_ECC_WORDS;
Jarno Lamsa18987a42019-04-24 15:40:43 +0300454
455 /* Shift mod so its highest set bit is at the maximum position. */
456 bitcount_t shift = (num_words * 2 * uECC_WORD_BITS) -
Manuel Pégourié-Gonnard2bf5a122019-11-04 12:56:59 +0100457 uECC_vli_numBits(mod);
Jarno Lamsa18987a42019-04-24 15:40:43 +0300458 wordcount_t word_shift = shift / uECC_WORD_BITS;
459 wordcount_t bit_shift = shift % uECC_WORD_BITS;
460 uECC_word_t carry = 0;
Manuel Pégourié-Gonnard94e48492019-11-04 12:47:28 +0100461 uECC_vli_clear(mod_multiple);
Jarno Lamsa18987a42019-04-24 15:40:43 +0300462 if (bit_shift > 0) {
463 for(index = 0; index < (uECC_word_t)num_words; ++index) {
464 mod_multiple[word_shift + index] = (mod[index] << bit_shift) | carry;
465 carry = mod[index] >> (uECC_WORD_BITS - bit_shift);
466 }
467 } else {
Manuel Pégourié-Gonnardcbbb0f02019-11-04 13:02:04 +0100468 uECC_vli_set(mod_multiple + word_shift, mod);
Jarno Lamsa18987a42019-04-24 15:40:43 +0300469 }
470
471 for (index = 1; shift >= 0; --shift) {
472 uECC_word_t borrow = 0;
473 wordcount_t i;
474 for (i = 0; i < num_words * 2; ++i) {
475 uECC_word_t diff = v[index][i] - mod_multiple[i] - borrow;
476 if (diff != v[index][i]) {
477 borrow = (diff > v[index][i]);
478 }
479 v[1 - index][i] = diff;
480 }
481 /* Swap the index if there was no borrow */
482 index = !(index ^ borrow);
Manuel Pégourié-Gonnard5e3baf22019-11-04 14:46:10 +0100483 uECC_vli_rshift1(mod_multiple);
Jarno Lamsa18987a42019-04-24 15:40:43 +0300484 mod_multiple[num_words - 1] |= mod_multiple[num_words] <<
485 (uECC_WORD_BITS - 1);
Manuel Pégourié-Gonnard5e3baf22019-11-04 14:46:10 +0100486 uECC_vli_rshift1(mod_multiple + num_words);
Jarno Lamsa18987a42019-04-24 15:40:43 +0300487 }
Manuel Pégourié-Gonnardcbbb0f02019-11-04 13:02:04 +0100488 uECC_vli_set(result, v[index]);
Jarno Lamsa18987a42019-04-24 15:40:43 +0300489}
490
491void uECC_vli_modMult(uECC_word_t *result, const uECC_word_t *left,
492 const uECC_word_t *right, const uECC_word_t *mod,
493 wordcount_t num_words)
494{
495 uECC_word_t product[2 * NUM_ECC_WORDS];
Manuel Pégourié-Gonnardc78d86b2019-11-04 10:18:42 +0100496 uECC_vli_mult_rnd(product, left, right, NULL);
Manuel Pégourié-Gonnard10349e42019-11-04 14:57:53 +0100497 uECC_vli_mmod(result, product, mod);
498 (void) num_words;
Jarno Lamsa18987a42019-04-24 15:40:43 +0300499}
500
Manuel Pégourié-Gonnard938f53f2019-10-29 11:23:43 +0100501static void uECC_vli_modMult_rnd(uECC_word_t *result, const uECC_word_t *left,
Manuel Pégourié-Gonnardd5e503e2019-10-31 12:53:44 +0100502 const uECC_word_t *right, ecc_wait_state_t *s)
Manuel Pégourié-Gonnard938f53f2019-10-29 11:23:43 +0100503{
504 uECC_word_t product[2 * NUM_ECC_WORDS];
505 uECC_vli_mult_rnd(product, left, right, s);
506
507 vli_mmod_fast_secp256r1(result, product);
508}
509
Jarno Lamsa18987a42019-04-24 15:40:43 +0300510void uECC_vli_modMult_fast(uECC_word_t *result, const uECC_word_t *left,
Manuel Pégourié-Gonnardc3ec14c2019-11-04 12:12:00 +0100511 const uECC_word_t *right)
Jarno Lamsa18987a42019-04-24 15:40:43 +0300512{
Manuel Pégourié-Gonnardc3ec14c2019-11-04 12:12:00 +0100513 uECC_vli_modMult_rnd(result, left, right, NULL);
Jarno Lamsa18987a42019-04-24 15:40:43 +0300514}
515
Jarno Lamsa18987a42019-04-24 15:40:43 +0300516#define EVEN(vli) (!(vli[0] & 1))
517
518static void vli_modInv_update(uECC_word_t *uv,
519 const uECC_word_t *mod,
520 wordcount_t num_words)
521{
522
523 uECC_word_t carry = 0;
524
525 if (!EVEN(uv)) {
Manuel Pégourié-Gonnard02d9d212019-11-04 12:37:08 +0100526 carry = uECC_vli_add(uv, uv, mod);
Jarno Lamsa18987a42019-04-24 15:40:43 +0300527 }
Manuel Pégourié-Gonnard5e3baf22019-11-04 14:46:10 +0100528 uECC_vli_rshift1(uv);
Jarno Lamsa18987a42019-04-24 15:40:43 +0300529 if (carry) {
530 uv[num_words - 1] |= HIGH_BIT_SET;
531 }
532}
533
534void uECC_vli_modInv(uECC_word_t *result, const uECC_word_t *input,
535 const uECC_word_t *mod, wordcount_t num_words)
536{
537 uECC_word_t a[NUM_ECC_WORDS], b[NUM_ECC_WORDS];
538 uECC_word_t u[NUM_ECC_WORDS], v[NUM_ECC_WORDS];
539 cmpresult_t cmpResult;
540
Manuel Pégourié-Gonnardf3899fc2019-11-04 12:44:43 +0100541 if (uECC_vli_isZero(input)) {
Manuel Pégourié-Gonnard94e48492019-11-04 12:47:28 +0100542 uECC_vli_clear(result);
Jarno Lamsa18987a42019-04-24 15:40:43 +0300543 return;
544 }
545
Manuel Pégourié-Gonnardcbbb0f02019-11-04 13:02:04 +0100546 uECC_vli_set(a, input);
547 uECC_vli_set(b, mod);
Manuel Pégourié-Gonnard94e48492019-11-04 12:47:28 +0100548 uECC_vli_clear(u);
Jarno Lamsa18987a42019-04-24 15:40:43 +0300549 u[0] = 1;
Manuel Pégourié-Gonnard94e48492019-11-04 12:47:28 +0100550 uECC_vli_clear(v);
Manuel Pégourié-Gonnarda7521912019-11-04 14:31:35 +0100551 while ((cmpResult = uECC_vli_cmp_unsafe(a, b)) != 0) {
Jarno Lamsa18987a42019-04-24 15:40:43 +0300552 if (EVEN(a)) {
Manuel Pégourié-Gonnard5e3baf22019-11-04 14:46:10 +0100553 uECC_vli_rshift1(a);
Jarno Lamsa18987a42019-04-24 15:40:43 +0300554 vli_modInv_update(u, mod, num_words);
555 } else if (EVEN(b)) {
Manuel Pégourié-Gonnard5e3baf22019-11-04 14:46:10 +0100556 uECC_vli_rshift1(b);
Jarno Lamsa18987a42019-04-24 15:40:43 +0300557 vli_modInv_update(v, mod, num_words);
558 } else if (cmpResult > 0) {
Manuel Pégourié-Gonnard129b42e2019-11-04 14:41:45 +0100559 uECC_vli_sub(a, a, b);
Manuel Pégourié-Gonnard5e3baf22019-11-04 14:46:10 +0100560 uECC_vli_rshift1(a);
Manuel Pégourié-Gonnarda7521912019-11-04 14:31:35 +0100561 if (uECC_vli_cmp_unsafe(u, v) < 0) {
Manuel Pégourié-Gonnard02d9d212019-11-04 12:37:08 +0100562 uECC_vli_add(u, u, mod);
Jarno Lamsa18987a42019-04-24 15:40:43 +0300563 }
Manuel Pégourié-Gonnard129b42e2019-11-04 14:41:45 +0100564 uECC_vli_sub(u, u, v);
Jarno Lamsa18987a42019-04-24 15:40:43 +0300565 vli_modInv_update(u, mod, num_words);
566 } else {
Manuel Pégourié-Gonnard129b42e2019-11-04 14:41:45 +0100567 uECC_vli_sub(b, b, a);
Manuel Pégourié-Gonnard5e3baf22019-11-04 14:46:10 +0100568 uECC_vli_rshift1(b);
Manuel Pégourié-Gonnarda7521912019-11-04 14:31:35 +0100569 if (uECC_vli_cmp_unsafe(v, u) < 0) {
Manuel Pégourié-Gonnard02d9d212019-11-04 12:37:08 +0100570 uECC_vli_add(v, v, mod);
Jarno Lamsa18987a42019-04-24 15:40:43 +0300571 }
Manuel Pégourié-Gonnard129b42e2019-11-04 14:41:45 +0100572 uECC_vli_sub(v, v, u);
Jarno Lamsa18987a42019-04-24 15:40:43 +0300573 vli_modInv_update(v, mod, num_words);
574 }
575 }
Manuel Pégourié-Gonnardcbbb0f02019-11-04 13:02:04 +0100576 uECC_vli_set(result, u);
Jarno Lamsa18987a42019-04-24 15:40:43 +0300577}
578
579/* ------ Point operations ------ */
580
581void double_jacobian_default(uECC_word_t * X1, uECC_word_t * Y1,
582 uECC_word_t * Z1, uECC_Curve curve)
583{
584 /* t1 = X, t2 = Y, t3 = Z */
585 uECC_word_t t4[NUM_ECC_WORDS];
586 uECC_word_t t5[NUM_ECC_WORDS];
587 wordcount_t num_words = curve->num_words;
588
Manuel Pégourié-Gonnardf3899fc2019-11-04 12:44:43 +0100589 if (uECC_vli_isZero(Z1)) {
Jarno Lamsa18987a42019-04-24 15:40:43 +0300590 return;
591 }
592
Manuel Pégourié-Gonnardc3ec14c2019-11-04 12:12:00 +0100593 uECC_vli_modMult_fast(t4, Y1, Y1); /* t4 = y1^2 */
594 uECC_vli_modMult_fast(t5, X1, t4); /* t5 = x1*y1^2 = A */
595 uECC_vli_modMult_fast(t4, t4, t4); /* t4 = y1^4 */
596 uECC_vli_modMult_fast(Y1, Y1, Z1); /* t2 = y1*z1 = z3 */
597 uECC_vli_modMult_fast(Z1, Z1, Z1); /* t3 = z1^2 */
Jarno Lamsa18987a42019-04-24 15:40:43 +0300598
Manuel Pégourié-Gonnard0779be72019-11-04 14:48:22 +0100599 uECC_vli_modAdd(X1, X1, Z1, curve->p); /* t1 = x1 + z1^2 */
600 uECC_vli_modAdd(Z1, Z1, Z1, curve->p); /* t3 = 2*z1^2 */
Manuel Pégourié-Gonnard1b0875d2019-11-04 14:50:54 +0100601 uECC_vli_modSub(Z1, X1, Z1, curve->p); /* t3 = x1 - z1^2 */
Manuel Pégourié-Gonnardc3ec14c2019-11-04 12:12:00 +0100602 uECC_vli_modMult_fast(X1, X1, Z1); /* t1 = x1^2 - z1^4 */
Jarno Lamsa18987a42019-04-24 15:40:43 +0300603
Manuel Pégourié-Gonnard0779be72019-11-04 14:48:22 +0100604 uECC_vli_modAdd(Z1, X1, X1, curve->p); /* t3 = 2*(x1^2 - z1^4) */
605 uECC_vli_modAdd(X1, X1, Z1, curve->p); /* t1 = 3*(x1^2 - z1^4) */
Jarno Lamsa18987a42019-04-24 15:40:43 +0300606 if (uECC_vli_testBit(X1, 0)) {
Manuel Pégourié-Gonnard02d9d212019-11-04 12:37:08 +0100607 uECC_word_t l_carry = uECC_vli_add(X1, X1, curve->p);
Manuel Pégourié-Gonnard5e3baf22019-11-04 14:46:10 +0100608 uECC_vli_rshift1(X1);
Jarno Lamsa18987a42019-04-24 15:40:43 +0300609 X1[num_words - 1] |= l_carry << (uECC_WORD_BITS - 1);
610 } else {
Manuel Pégourié-Gonnard5e3baf22019-11-04 14:46:10 +0100611 uECC_vli_rshift1(X1);
Jarno Lamsa18987a42019-04-24 15:40:43 +0300612 }
613
614 /* t1 = 3/2*(x1^2 - z1^4) = B */
Manuel Pégourié-Gonnardc3ec14c2019-11-04 12:12:00 +0100615 uECC_vli_modMult_fast(Z1, X1, X1); /* t3 = B^2 */
Manuel Pégourié-Gonnard1b0875d2019-11-04 14:50:54 +0100616 uECC_vli_modSub(Z1, Z1, t5, curve->p); /* t3 = B^2 - A */
617 uECC_vli_modSub(Z1, Z1, t5, curve->p); /* t3 = B^2 - 2A = x3 */
618 uECC_vli_modSub(t5, t5, Z1, curve->p); /* t5 = A - x3 */
Manuel Pégourié-Gonnardc3ec14c2019-11-04 12:12:00 +0100619 uECC_vli_modMult_fast(X1, X1, t5); /* t1 = B * (A - x3) */
Jarno Lamsa18987a42019-04-24 15:40:43 +0300620 /* t4 = B * (A - x3) - y1^4 = y3: */
Manuel Pégourié-Gonnard1b0875d2019-11-04 14:50:54 +0100621 uECC_vli_modSub(t4, X1, t4, curve->p);
Jarno Lamsa18987a42019-04-24 15:40:43 +0300622
Manuel Pégourié-Gonnardcbbb0f02019-11-04 13:02:04 +0100623 uECC_vli_set(X1, Z1);
624 uECC_vli_set(Z1, Y1);
625 uECC_vli_set(Y1, t4);
Jarno Lamsa18987a42019-04-24 15:40:43 +0300626}
627
628void x_side_default(uECC_word_t *result,
629 const uECC_word_t *x,
630 uECC_Curve curve)
631{
632 uECC_word_t _3[NUM_ECC_WORDS] = {3}; /* -a = 3 */
Jarno Lamsa18987a42019-04-24 15:40:43 +0300633
Manuel Pégourié-Gonnardc3ec14c2019-11-04 12:12:00 +0100634 uECC_vli_modMult_fast(result, x, x); /* r = x^2 */
Manuel Pégourié-Gonnard1b0875d2019-11-04 14:50:54 +0100635 uECC_vli_modSub(result, result, _3, curve->p); /* r = x^2 - 3 */
Manuel Pégourié-Gonnardc3ec14c2019-11-04 12:12:00 +0100636 uECC_vli_modMult_fast(result, result, x); /* r = x^3 - 3x */
Jarno Lamsa18987a42019-04-24 15:40:43 +0300637 /* r = x^3 - 3x + b: */
Manuel Pégourié-Gonnard0779be72019-11-04 14:48:22 +0100638 uECC_vli_modAdd(result, result, curve->b, curve->p);
Jarno Lamsa18987a42019-04-24 15:40:43 +0300639}
640
641uECC_Curve uECC_secp256r1(void)
642{
643 return &curve_secp256r1;
644}
645
646void vli_mmod_fast_secp256r1(unsigned int *result, unsigned int*product)
647{
648 unsigned int tmp[NUM_ECC_WORDS];
649 int carry;
650
651 /* t */
Manuel Pégourié-Gonnardcbbb0f02019-11-04 13:02:04 +0100652 uECC_vli_set(result, product);
Jarno Lamsa18987a42019-04-24 15:40:43 +0300653
654 /* s1 */
655 tmp[0] = tmp[1] = tmp[2] = 0;
656 tmp[3] = product[11];
657 tmp[4] = product[12];
658 tmp[5] = product[13];
659 tmp[6] = product[14];
660 tmp[7] = product[15];
Manuel Pégourié-Gonnard02d9d212019-11-04 12:37:08 +0100661 carry = uECC_vli_add(tmp, tmp, tmp);
662 carry += uECC_vli_add(result, result, tmp);
Jarno Lamsa18987a42019-04-24 15:40:43 +0300663
664 /* s2 */
665 tmp[3] = product[12];
666 tmp[4] = product[13];
667 tmp[5] = product[14];
668 tmp[6] = product[15];
669 tmp[7] = 0;
Manuel Pégourié-Gonnard02d9d212019-11-04 12:37:08 +0100670 carry += uECC_vli_add(tmp, tmp, tmp);
671 carry += uECC_vli_add(result, result, tmp);
Jarno Lamsa18987a42019-04-24 15:40:43 +0300672
673 /* s3 */
674 tmp[0] = product[8];
675 tmp[1] = product[9];
676 tmp[2] = product[10];
677 tmp[3] = tmp[4] = tmp[5] = 0;
678 tmp[6] = product[14];
679 tmp[7] = product[15];
Manuel Pégourié-Gonnard02d9d212019-11-04 12:37:08 +0100680 carry += uECC_vli_add(result, result, tmp);
Jarno Lamsa18987a42019-04-24 15:40:43 +0300681
682 /* s4 */
683 tmp[0] = product[9];
684 tmp[1] = product[10];
685 tmp[2] = product[11];
686 tmp[3] = product[13];
687 tmp[4] = product[14];
688 tmp[5] = product[15];
689 tmp[6] = product[13];
690 tmp[7] = product[8];
Manuel Pégourié-Gonnard02d9d212019-11-04 12:37:08 +0100691 carry += uECC_vli_add(result, result, tmp);
Jarno Lamsa18987a42019-04-24 15:40:43 +0300692
693 /* d1 */
694 tmp[0] = product[11];
695 tmp[1] = product[12];
696 tmp[2] = product[13];
697 tmp[3] = tmp[4] = tmp[5] = 0;
698 tmp[6] = product[8];
699 tmp[7] = product[10];
Manuel Pégourié-Gonnard129b42e2019-11-04 14:41:45 +0100700 carry -= uECC_vli_sub(result, result, tmp);
Jarno Lamsa18987a42019-04-24 15:40:43 +0300701
702 /* d2 */
703 tmp[0] = product[12];
704 tmp[1] = product[13];
705 tmp[2] = product[14];
706 tmp[3] = product[15];
707 tmp[4] = tmp[5] = 0;
708 tmp[6] = product[9];
709 tmp[7] = product[11];
Manuel Pégourié-Gonnard129b42e2019-11-04 14:41:45 +0100710 carry -= uECC_vli_sub(result, result, tmp);
Jarno Lamsa18987a42019-04-24 15:40:43 +0300711
712 /* d3 */
713 tmp[0] = product[13];
714 tmp[1] = product[14];
715 tmp[2] = product[15];
716 tmp[3] = product[8];
717 tmp[4] = product[9];
718 tmp[5] = product[10];
719 tmp[6] = 0;
720 tmp[7] = product[12];
Manuel Pégourié-Gonnard129b42e2019-11-04 14:41:45 +0100721 carry -= uECC_vli_sub(result, result, tmp);
Jarno Lamsa18987a42019-04-24 15:40:43 +0300722
723 /* d4 */
724 tmp[0] = product[14];
725 tmp[1] = product[15];
726 tmp[2] = 0;
727 tmp[3] = product[9];
728 tmp[4] = product[10];
729 tmp[5] = product[11];
730 tmp[6] = 0;
731 tmp[7] = product[13];
Manuel Pégourié-Gonnard129b42e2019-11-04 14:41:45 +0100732 carry -= uECC_vli_sub(result, result, tmp);
Jarno Lamsa18987a42019-04-24 15:40:43 +0300733
734 if (carry < 0) {
735 do {
Manuel Pégourié-Gonnard02d9d212019-11-04 12:37:08 +0100736 carry += uECC_vli_add(result, result, curve_secp256r1.p);
Jarno Lamsa18987a42019-04-24 15:40:43 +0300737 }
738 while (carry < 0);
739 } else {
740 while (carry ||
Manuel Pégourié-Gonnarda7521912019-11-04 14:31:35 +0100741 uECC_vli_cmp_unsafe(curve_secp256r1.p, result) != 1) {
Manuel Pégourié-Gonnard129b42e2019-11-04 14:41:45 +0100742 carry -= uECC_vli_sub(result, result, curve_secp256r1.p);
Jarno Lamsa18987a42019-04-24 15:40:43 +0300743 }
744 }
745}
746
747uECC_word_t EccPoint_isZero(const uECC_word_t *point, uECC_Curve curve)
748{
Manuel Pégourié-Gonnardf3899fc2019-11-04 12:44:43 +0100749 (void) curve;
750 return uECC_vli_isZero(point);
Jarno Lamsa18987a42019-04-24 15:40:43 +0300751}
752
Manuel Pégourié-Gonnardc3ec14c2019-11-04 12:12:00 +0100753void apply_z(uECC_word_t * X1, uECC_word_t * Y1, const uECC_word_t * const Z)
Jarno Lamsa18987a42019-04-24 15:40:43 +0300754{
755 uECC_word_t t1[NUM_ECC_WORDS];
756
Manuel Pégourié-Gonnardc3ec14c2019-11-04 12:12:00 +0100757 uECC_vli_modMult_fast(t1, Z, Z); /* z^2 */
758 uECC_vli_modMult_fast(X1, X1, t1); /* x1 * z^2 */
759 uECC_vli_modMult_fast(t1, t1, Z); /* z^3 */
760 uECC_vli_modMult_fast(Y1, Y1, t1); /* y1 * z^3 */
Jarno Lamsa18987a42019-04-24 15:40:43 +0300761}
762
763/* P = (x1, y1) => 2P, (x2, y2) => P' */
764static void XYcZ_initial_double(uECC_word_t * X1, uECC_word_t * Y1,
765 uECC_word_t * X2, uECC_word_t * Y2,
766 const uECC_word_t * const initial_Z,
767 uECC_Curve curve)
768{
769 uECC_word_t z[NUM_ECC_WORDS];
Jarno Lamsa18987a42019-04-24 15:40:43 +0300770 if (initial_Z) {
Manuel Pégourié-Gonnardcbbb0f02019-11-04 13:02:04 +0100771 uECC_vli_set(z, initial_Z);
Jarno Lamsa18987a42019-04-24 15:40:43 +0300772 } else {
Manuel Pégourié-Gonnard94e48492019-11-04 12:47:28 +0100773 uECC_vli_clear(z);
Jarno Lamsa18987a42019-04-24 15:40:43 +0300774 z[0] = 1;
775 }
776
Manuel Pégourié-Gonnardcbbb0f02019-11-04 13:02:04 +0100777 uECC_vli_set(X2, X1);
778 uECC_vli_set(Y2, Y1);
Jarno Lamsa18987a42019-04-24 15:40:43 +0300779
Manuel Pégourié-Gonnardc3ec14c2019-11-04 12:12:00 +0100780 apply_z(X1, Y1, z);
Jarno Lamsa18987a42019-04-24 15:40:43 +0300781 curve->double_jacobian(X1, Y1, z, curve);
Manuel Pégourié-Gonnardc3ec14c2019-11-04 12:12:00 +0100782 apply_z(X2, Y2, z);
Jarno Lamsa18987a42019-04-24 15:40:43 +0300783}
784
Manuel Pégourié-Gonnard938f53f2019-10-29 11:23:43 +0100785static void XYcZ_add_rnd(uECC_word_t * X1, uECC_word_t * Y1,
786 uECC_word_t * X2, uECC_word_t * Y2,
Manuel Pégourié-Gonnardd5e503e2019-10-31 12:53:44 +0100787 ecc_wait_state_t *s)
Jarno Lamsa18987a42019-04-24 15:40:43 +0300788{
789 /* t1 = X1, t2 = Y1, t3 = X2, t4 = Y2 */
790 uECC_word_t t5[NUM_ECC_WORDS];
Manuel Pégourié-Gonnard938f53f2019-10-29 11:23:43 +0100791 const uECC_Curve curve = &curve_secp256r1;
Jarno Lamsa18987a42019-04-24 15:40:43 +0300792
Manuel Pégourié-Gonnard1b0875d2019-11-04 14:50:54 +0100793 uECC_vli_modSub(t5, X2, X1, curve->p); /* t5 = x2 - x1 */
Manuel Pégourié-Gonnardc78d86b2019-11-04 10:18:42 +0100794 uECC_vli_modMult_rnd(t5, t5, t5, s); /* t5 = (x2 - x1)^2 = A */
Manuel Pégourié-Gonnard938f53f2019-10-29 11:23:43 +0100795 uECC_vli_modMult_rnd(X1, X1, t5, s); /* t1 = x1*A = B */
796 uECC_vli_modMult_rnd(X2, X2, t5, s); /* t3 = x2*A = C */
Manuel Pégourié-Gonnard1b0875d2019-11-04 14:50:54 +0100797 uECC_vli_modSub(Y2, Y2, Y1, curve->p); /* t4 = y2 - y1 */
Manuel Pégourié-Gonnardc78d86b2019-11-04 10:18:42 +0100798 uECC_vli_modMult_rnd(t5, Y2, Y2, s); /* t5 = (y2 - y1)^2 = D */
Jarno Lamsa18987a42019-04-24 15:40:43 +0300799
Manuel Pégourié-Gonnard1b0875d2019-11-04 14:50:54 +0100800 uECC_vli_modSub(t5, t5, X1, curve->p); /* t5 = D - B */
801 uECC_vli_modSub(t5, t5, X2, curve->p); /* t5 = D - B - C = x3 */
802 uECC_vli_modSub(X2, X2, X1, curve->p); /* t3 = C - B */
Manuel Pégourié-Gonnard938f53f2019-10-29 11:23:43 +0100803 uECC_vli_modMult_rnd(Y1, Y1, X2, s); /* t2 = y1*(C - B) */
Manuel Pégourié-Gonnard1b0875d2019-11-04 14:50:54 +0100804 uECC_vli_modSub(X2, X1, t5, curve->p); /* t3 = B - x3 */
Manuel Pégourié-Gonnard938f53f2019-10-29 11:23:43 +0100805 uECC_vli_modMult_rnd(Y2, Y2, X2, s); /* t4 = (y2 - y1)*(B - x3) */
Manuel Pégourié-Gonnard1b0875d2019-11-04 14:50:54 +0100806 uECC_vli_modSub(Y2, Y2, Y1, curve->p); /* t4 = y3 */
Jarno Lamsa18987a42019-04-24 15:40:43 +0300807
Manuel Pégourié-Gonnardcbbb0f02019-11-04 13:02:04 +0100808 uECC_vli_set(X2, t5);
Jarno Lamsa18987a42019-04-24 15:40:43 +0300809}
810
Manuel Pégourié-Gonnard938f53f2019-10-29 11:23:43 +0100811void XYcZ_add(uECC_word_t * X1, uECC_word_t * Y1,
812 uECC_word_t * X2, uECC_word_t * Y2,
813 uECC_Curve curve)
814{
815 (void) curve;
816 XYcZ_add_rnd(X1, Y1, X2, Y2, NULL);
817}
818
Jarno Lamsa18987a42019-04-24 15:40:43 +0300819/* Input P = (x1, y1, Z), Q = (x2, y2, Z)
820 Output P + Q = (x3, y3, Z3), P - Q = (x3', y3', Z3)
821 or P => P - Q, Q => P + Q
822 */
Manuel Pégourié-Gonnard938f53f2019-10-29 11:23:43 +0100823static void XYcZ_addC_rnd(uECC_word_t * X1, uECC_word_t * Y1,
824 uECC_word_t * X2, uECC_word_t * Y2,
Manuel Pégourié-Gonnardd5e503e2019-10-31 12:53:44 +0100825 ecc_wait_state_t *s)
Jarno Lamsa18987a42019-04-24 15:40:43 +0300826{
827 /* t1 = X1, t2 = Y1, t3 = X2, t4 = Y2 */
828 uECC_word_t t5[NUM_ECC_WORDS];
829 uECC_word_t t6[NUM_ECC_WORDS];
830 uECC_word_t t7[NUM_ECC_WORDS];
Manuel Pégourié-Gonnard938f53f2019-10-29 11:23:43 +0100831 const uECC_Curve curve = &curve_secp256r1;
Jarno Lamsa18987a42019-04-24 15:40:43 +0300832
Manuel Pégourié-Gonnard1b0875d2019-11-04 14:50:54 +0100833 uECC_vli_modSub(t5, X2, X1, curve->p); /* t5 = x2 - x1 */
Manuel Pégourié-Gonnardc78d86b2019-11-04 10:18:42 +0100834 uECC_vli_modMult_rnd(t5, t5, t5, s); /* t5 = (x2 - x1)^2 = A */
Manuel Pégourié-Gonnard938f53f2019-10-29 11:23:43 +0100835 uECC_vli_modMult_rnd(X1, X1, t5, s); /* t1 = x1*A = B */
836 uECC_vli_modMult_rnd(X2, X2, t5, s); /* t3 = x2*A = C */
Manuel Pégourié-Gonnard0779be72019-11-04 14:48:22 +0100837 uECC_vli_modAdd(t5, Y2, Y1, curve->p); /* t5 = y2 + y1 */
Manuel Pégourié-Gonnard1b0875d2019-11-04 14:50:54 +0100838 uECC_vli_modSub(Y2, Y2, Y1, curve->p); /* t4 = y2 - y1 */
Jarno Lamsa18987a42019-04-24 15:40:43 +0300839
Manuel Pégourié-Gonnard1b0875d2019-11-04 14:50:54 +0100840 uECC_vli_modSub(t6, X2, X1, curve->p); /* t6 = C - B */
Manuel Pégourié-Gonnard938f53f2019-10-29 11:23:43 +0100841 uECC_vli_modMult_rnd(Y1, Y1, t6, s); /* t2 = y1 * (C - B) = E */
Manuel Pégourié-Gonnard0779be72019-11-04 14:48:22 +0100842 uECC_vli_modAdd(t6, X1, X2, curve->p); /* t6 = B + C */
Manuel Pégourié-Gonnardc78d86b2019-11-04 10:18:42 +0100843 uECC_vli_modMult_rnd(X2, Y2, Y2, s); /* t3 = (y2 - y1)^2 = D */
Manuel Pégourié-Gonnard1b0875d2019-11-04 14:50:54 +0100844 uECC_vli_modSub(X2, X2, t6, curve->p); /* t3 = D - (B + C) = x3 */
Jarno Lamsa18987a42019-04-24 15:40:43 +0300845
Manuel Pégourié-Gonnard1b0875d2019-11-04 14:50:54 +0100846 uECC_vli_modSub(t7, X1, X2, curve->p); /* t7 = B - x3 */
Manuel Pégourié-Gonnard938f53f2019-10-29 11:23:43 +0100847 uECC_vli_modMult_rnd(Y2, Y2, t7, s); /* t4 = (y2 - y1)*(B - x3) */
Jarno Lamsa18987a42019-04-24 15:40:43 +0300848 /* t4 = (y2 - y1)*(B - x3) - E = y3: */
Manuel Pégourié-Gonnard1b0875d2019-11-04 14:50:54 +0100849 uECC_vli_modSub(Y2, Y2, Y1, curve->p);
Jarno Lamsa18987a42019-04-24 15:40:43 +0300850
Manuel Pégourié-Gonnardc78d86b2019-11-04 10:18:42 +0100851 uECC_vli_modMult_rnd(t7, t5, t5, s); /* t7 = (y2 + y1)^2 = F */
Manuel Pégourié-Gonnard1b0875d2019-11-04 14:50:54 +0100852 uECC_vli_modSub(t7, t7, t6, curve->p); /* t7 = F - (B + C) = x3' */
853 uECC_vli_modSub(t6, t7, X1, curve->p); /* t6 = x3' - B */
Manuel Pégourié-Gonnard938f53f2019-10-29 11:23:43 +0100854 uECC_vli_modMult_rnd(t6, t6, t5, s); /* t6 = (y2+y1)*(x3' - B) */
Jarno Lamsa18987a42019-04-24 15:40:43 +0300855 /* t2 = (y2+y1)*(x3' - B) - E = y3': */
Manuel Pégourié-Gonnard1b0875d2019-11-04 14:50:54 +0100856 uECC_vli_modSub(Y1, t6, Y1, curve->p);
Jarno Lamsa18987a42019-04-24 15:40:43 +0300857
Manuel Pégourié-Gonnardcbbb0f02019-11-04 13:02:04 +0100858 uECC_vli_set(X1, t7);
Jarno Lamsa18987a42019-04-24 15:40:43 +0300859}
860
Manuel Pégourié-Gonnard27926d62019-11-04 11:26:46 +0100861static void EccPoint_mult(uECC_word_t * result, const uECC_word_t * point,
Jarno Lamsa18987a42019-04-24 15:40:43 +0300862 const uECC_word_t * scalar,
Manuel Pégourié-Gonnard3645ac92019-11-04 11:39:18 +0100863 const uECC_word_t * initial_Z)
Jarno Lamsa18987a42019-04-24 15:40:43 +0300864{
865 /* R0 and R1 */
866 uECC_word_t Rx[2][NUM_ECC_WORDS];
867 uECC_word_t Ry[2][NUM_ECC_WORDS];
868 uECC_word_t z[NUM_ECC_WORDS];
869 bitcount_t i;
870 uECC_word_t nb;
Manuel Pégourié-Gonnard78a7e352019-11-04 12:31:06 +0100871 const wordcount_t num_words = NUM_ECC_WORDS;
872 const bitcount_t num_bits = NUM_ECC_BITS + 1; /* from regularize_k */
Manuel Pégourié-Gonnard3645ac92019-11-04 11:39:18 +0100873 const uECC_Curve curve = uECC_secp256r1();
Manuel Pégourié-Gonnardd5e503e2019-10-31 12:53:44 +0100874 ecc_wait_state_t wait_state;
875 ecc_wait_state_t * const ws = g_rng_function ? &wait_state : NULL;
Jarno Lamsa18987a42019-04-24 15:40:43 +0300876
Manuel Pégourié-Gonnardcbbb0f02019-11-04 13:02:04 +0100877 uECC_vli_set(Rx[1], point);
878 uECC_vli_set(Ry[1], point + num_words);
Jarno Lamsa18987a42019-04-24 15:40:43 +0300879
880 XYcZ_initial_double(Rx[1], Ry[1], Rx[0], Ry[0], initial_Z, curve);
881
882 for (i = num_bits - 2; i > 0; --i) {
Manuel Pégourié-Gonnardd5e503e2019-10-31 12:53:44 +0100883 ecc_wait_state_reset(ws);
Jarno Lamsa18987a42019-04-24 15:40:43 +0300884 nb = !uECC_vli_testBit(scalar, i);
Manuel Pégourié-Gonnard938f53f2019-10-29 11:23:43 +0100885 XYcZ_addC_rnd(Rx[1 - nb], Ry[1 - nb], Rx[nb], Ry[nb], ws);
886 XYcZ_add_rnd(Rx[nb], Ry[nb], Rx[1 - nb], Ry[1 - nb], ws);
Jarno Lamsa18987a42019-04-24 15:40:43 +0300887 }
888
Manuel Pégourié-Gonnardd5e503e2019-10-31 12:53:44 +0100889 ecc_wait_state_reset(ws);
Jarno Lamsa18987a42019-04-24 15:40:43 +0300890 nb = !uECC_vli_testBit(scalar, 0);
Manuel Pégourié-Gonnard938f53f2019-10-29 11:23:43 +0100891 XYcZ_addC_rnd(Rx[1 - nb], Ry[1 - nb], Rx[nb], Ry[nb], ws);
Jarno Lamsa18987a42019-04-24 15:40:43 +0300892
893 /* Find final 1/Z value. */
Manuel Pégourié-Gonnard1b0875d2019-11-04 14:50:54 +0100894 uECC_vli_modSub(z, Rx[1], Rx[0], curve->p); /* X1 - X0 */
Manuel Pégourié-Gonnardc3ec14c2019-11-04 12:12:00 +0100895 uECC_vli_modMult_fast(z, z, Ry[1 - nb]); /* Yb * (X1 - X0) */
896 uECC_vli_modMult_fast(z, z, point); /* xP * Yb * (X1 - X0) */
Jarno Lamsa18987a42019-04-24 15:40:43 +0300897 uECC_vli_modInv(z, z, curve->p, num_words); /* 1 / (xP * Yb * (X1 - X0))*/
898 /* yP / (xP * Yb * (X1 - X0)) */
Manuel Pégourié-Gonnardc3ec14c2019-11-04 12:12:00 +0100899 uECC_vli_modMult_fast(z, z, point + num_words);
Jarno Lamsa18987a42019-04-24 15:40:43 +0300900 /* Xb * yP / (xP * Yb * (X1 - X0)) */
Manuel Pégourié-Gonnardc3ec14c2019-11-04 12:12:00 +0100901 uECC_vli_modMult_fast(z, z, Rx[1 - nb]);
Jarno Lamsa18987a42019-04-24 15:40:43 +0300902 /* End 1/Z calculation */
903
Manuel Pégourié-Gonnard938f53f2019-10-29 11:23:43 +0100904 XYcZ_add_rnd(Rx[nb], Ry[nb], Rx[1 - nb], Ry[1 - nb], ws);
Manuel Pégourié-Gonnardc3ec14c2019-11-04 12:12:00 +0100905 apply_z(Rx[0], Ry[0], z);
Jarno Lamsa18987a42019-04-24 15:40:43 +0300906
Manuel Pégourié-Gonnardcbbb0f02019-11-04 13:02:04 +0100907 uECC_vli_set(result, Rx[0]);
908 uECC_vli_set(result + num_words, Ry[0]);
Jarno Lamsa18987a42019-04-24 15:40:43 +0300909}
910
Manuel Pégourié-Gonnard27926d62019-11-04 11:26:46 +0100911static uECC_word_t regularize_k(const uECC_word_t * const k, uECC_word_t *k0,
Manuel Pégourié-Gonnard3645ac92019-11-04 11:39:18 +0100912 uECC_word_t *k1)
Jarno Lamsa18987a42019-04-24 15:40:43 +0300913{
914
Manuel Pégourié-Gonnard78a7e352019-11-04 12:31:06 +0100915 wordcount_t num_n_words = NUM_ECC_WORDS;
916 bitcount_t num_n_bits = NUM_ECC_BITS;
Manuel Pégourié-Gonnard3645ac92019-11-04 11:39:18 +0100917 const uECC_Curve curve = uECC_secp256r1();
Jarno Lamsa18987a42019-04-24 15:40:43 +0300918
Manuel Pégourié-Gonnard02d9d212019-11-04 12:37:08 +0100919 uECC_word_t carry = uECC_vli_add(k0, k, curve->n) ||
Jarno Lamsa18987a42019-04-24 15:40:43 +0300920 (num_n_bits < ((bitcount_t)num_n_words * uECC_WORD_SIZE * 8) &&
921 uECC_vli_testBit(k0, num_n_bits));
922
Manuel Pégourié-Gonnard02d9d212019-11-04 12:37:08 +0100923 uECC_vli_add(k1, k0, curve->n);
Jarno Lamsa18987a42019-04-24 15:40:43 +0300924
925 return carry;
926}
927
Manuel Pégourié-Gonnardef238282019-11-04 11:19:30 +0100928int EccPoint_mult_safer(uECC_word_t * result, const uECC_word_t * point,
929 const uECC_word_t * scalar, uECC_Curve curve)
930{
931 uECC_word_t tmp[NUM_ECC_WORDS];
932 uECC_word_t s[NUM_ECC_WORDS];
933 uECC_word_t *k2[2] = {tmp, s};
Manuel Pégourié-Gonnard78a7e352019-11-04 12:31:06 +0100934 wordcount_t num_words = NUM_ECC_WORDS;
Manuel Pégourié-Gonnardef238282019-11-04 11:19:30 +0100935 uECC_word_t carry;
936 uECC_word_t *initial_Z = 0;
937 int r;
938
Manuel Pégourié-Gonnard3645ac92019-11-04 11:39:18 +0100939 if (curve != uECC_secp256r1())
940 return 0;
941
Manuel Pégourié-Gonnardef238282019-11-04 11:19:30 +0100942 /* Regularize the bitcount for the private key so that attackers cannot use a
943 * side channel attack to learn the number of leading zeros. */
Manuel Pégourié-Gonnard3645ac92019-11-04 11:39:18 +0100944 carry = regularize_k(scalar, tmp, s);
Manuel Pégourié-Gonnardef238282019-11-04 11:19:30 +0100945
946 /* If an RNG function was specified, get a random initial Z value to
947 * protect against side-channel attacks such as Template SPA */
948 if (g_rng_function) {
949 if (!uECC_generate_random_int(k2[carry], curve->p, num_words)) {
950 r = 0;
951 goto clear_and_out;
952 }
953 initial_Z = k2[carry];
954 }
955
Manuel Pégourié-Gonnard3645ac92019-11-04 11:39:18 +0100956 EccPoint_mult(result, point, k2[!carry], initial_Z);
Manuel Pégourié-Gonnardef238282019-11-04 11:19:30 +0100957 r = 1;
958
959clear_and_out:
960 /* erasing temporary buffer used to store secret: */
961 mbedtls_platform_zeroize(k2, sizeof(k2));
962 mbedtls_platform_zeroize(tmp, sizeof(tmp));
963 mbedtls_platform_zeroize(s, sizeof(s));
964
965 return r;
966}
967
Jarno Lamsa18987a42019-04-24 15:40:43 +0300968uECC_word_t EccPoint_compute_public_key(uECC_word_t *result,
969 uECC_word_t *private_key,
970 uECC_Curve curve)
971{
972
973 uECC_word_t tmp1[NUM_ECC_WORDS];
974 uECC_word_t tmp2[NUM_ECC_WORDS];
975 uECC_word_t *p2[2] = {tmp1, tmp2};
976 uECC_word_t carry;
977
Manuel Pégourié-Gonnard3645ac92019-11-04 11:39:18 +0100978 if (curve != uECC_secp256r1())
979 return 0;
980
Jarno Lamsa18987a42019-04-24 15:40:43 +0300981 /* Regularize the bitcount for the private key so that attackers cannot
982 * use a side channel attack to learn the number of leading zeros. */
Manuel Pégourié-Gonnard3645ac92019-11-04 11:39:18 +0100983 carry = regularize_k(private_key, tmp1, tmp2);
Jarno Lamsa18987a42019-04-24 15:40:43 +0300984
Manuel Pégourié-Gonnard3645ac92019-11-04 11:39:18 +0100985 EccPoint_mult(result, curve->G, p2[!carry], 0);
Jarno Lamsa18987a42019-04-24 15:40:43 +0300986
987 if (EccPoint_isZero(result, curve)) {
988 return 0;
989 }
990 return 1;
991}
992
993/* Converts an integer in uECC native format to big-endian bytes. */
994void uECC_vli_nativeToBytes(uint8_t *bytes, int num_bytes,
995 const unsigned int *native)
996{
997 wordcount_t i;
998 for (i = 0; i < num_bytes; ++i) {
999 unsigned b = num_bytes - 1 - i;
1000 bytes[i] = native[b / uECC_WORD_SIZE] >> (8 * (b % uECC_WORD_SIZE));
1001 }
1002}
1003
1004/* Converts big-endian bytes to an integer in uECC native format. */
1005void uECC_vli_bytesToNative(unsigned int *native, const uint8_t *bytes,
1006 int num_bytes)
1007{
1008 wordcount_t i;
Manuel Pégourié-Gonnard94e48492019-11-04 12:47:28 +01001009 uECC_vli_clear(native);
Jarno Lamsa18987a42019-04-24 15:40:43 +03001010 for (i = 0; i < num_bytes; ++i) {
1011 unsigned b = num_bytes - 1 - i;
1012 native[b / uECC_WORD_SIZE] |=
1013 (uECC_word_t)bytes[i] << (8 * (b % uECC_WORD_SIZE));
1014 }
1015}
1016
1017int uECC_generate_random_int(uECC_word_t *random, const uECC_word_t *top,
1018 wordcount_t num_words)
1019{
1020 uECC_word_t mask = (uECC_word_t)-1;
1021 uECC_word_t tries;
Manuel Pégourié-Gonnard2bf5a122019-11-04 12:56:59 +01001022 bitcount_t num_bits = uECC_vli_numBits(top);
Jarno Lamsa18987a42019-04-24 15:40:43 +03001023
1024 if (!g_rng_function) {
1025 return 0;
1026 }
1027
1028 for (tries = 0; tries < uECC_RNG_MAX_TRIES; ++tries) {
1029 if (!g_rng_function((uint8_t *)random, num_words * uECC_WORD_SIZE)) {
1030 return 0;
1031 }
1032 random[num_words - 1] &=
1033 mask >> ((bitcount_t)(num_words * uECC_WORD_SIZE * 8 - num_bits));
Manuel Pégourié-Gonnardf3899fc2019-11-04 12:44:43 +01001034 if (!uECC_vli_isZero(random) &&
Manuel Pégourié-Gonnard2cb3eea2019-11-04 14:43:35 +01001035 uECC_vli_cmp(top, random) == 1) {
Jarno Lamsa18987a42019-04-24 15:40:43 +03001036 return 1;
1037 }
1038 }
1039 return 0;
1040}
1041
1042
1043int uECC_valid_point(const uECC_word_t *point, uECC_Curve curve)
1044{
1045 uECC_word_t tmp1[NUM_ECC_WORDS];
1046 uECC_word_t tmp2[NUM_ECC_WORDS];
1047 wordcount_t num_words = curve->num_words;
1048
1049 /* The point at infinity is invalid. */
1050 if (EccPoint_isZero(point, curve)) {
1051 return -1;
1052 }
1053
1054 /* x and y must be smaller than p. */
Manuel Pégourié-Gonnarda7521912019-11-04 14:31:35 +01001055 if (uECC_vli_cmp_unsafe(curve->p, point) != 1 ||
1056 uECC_vli_cmp_unsafe(curve->p, point + num_words) != 1) {
Jarno Lamsa18987a42019-04-24 15:40:43 +03001057 return -2;
1058 }
1059
Manuel Pégourié-Gonnardc3ec14c2019-11-04 12:12:00 +01001060 uECC_vli_modMult_fast(tmp1, point + num_words, point + num_words);
Jarno Lamsa18987a42019-04-24 15:40:43 +03001061 curve->x_side(tmp2, point, curve); /* tmp2 = x^3 + ax + b */
1062
1063 /* Make sure that y^2 == x^3 + ax + b */
Manuel Pégourié-Gonnard2eca3d32019-11-04 14:33:09 +01001064 if (uECC_vli_equal(tmp1, tmp2) != 0)
Jarno Lamsa18987a42019-04-24 15:40:43 +03001065 return -3;
1066
1067 return 0;
1068}
1069
1070int uECC_valid_public_key(const uint8_t *public_key, uECC_Curve curve)
1071{
1072
1073 uECC_word_t _public[NUM_ECC_WORDS * 2];
1074
1075 uECC_vli_bytesToNative(_public, public_key, curve->num_bytes);
1076 uECC_vli_bytesToNative(
1077 _public + curve->num_words,
1078 public_key + curve->num_bytes,
1079 curve->num_bytes);
1080
Manuel Pégourié-Gonnarda7521912019-11-04 14:31:35 +01001081 if (memcmp(_public, curve->G, NUM_ECC_WORDS * 2) == 0) {
Jarno Lamsa18987a42019-04-24 15:40:43 +03001082 return -4;
1083 }
1084
1085 return uECC_valid_point(_public, curve);
1086}
1087
1088int uECC_compute_public_key(const uint8_t *private_key, uint8_t *public_key,
1089 uECC_Curve curve)
1090{
1091
1092 uECC_word_t _private[NUM_ECC_WORDS];
1093 uECC_word_t _public[NUM_ECC_WORDS * 2];
1094
1095 uECC_vli_bytesToNative(
1096 _private,
1097 private_key,
1098 BITS_TO_BYTES(curve->num_n_bits));
1099
1100 /* Make sure the private key is in the range [1, n-1]. */
Manuel Pégourié-Gonnardf3899fc2019-11-04 12:44:43 +01001101 if (uECC_vli_isZero(_private)) {
Jarno Lamsa18987a42019-04-24 15:40:43 +03001102 return 0;
1103 }
1104
Manuel Pégourié-Gonnard2cb3eea2019-11-04 14:43:35 +01001105 if (uECC_vli_cmp(curve->n, _private) != 1) {
Jarno Lamsa18987a42019-04-24 15:40:43 +03001106 return 0;
1107 }
1108
1109 /* Compute public key. */
1110 if (!EccPoint_compute_public_key(_public, _private, curve)) {
1111 return 0;
1112 }
1113
1114 uECC_vli_nativeToBytes(public_key, curve->num_bytes, _public);
1115 uECC_vli_nativeToBytes(
1116 public_key +
1117 curve->num_bytes, curve->num_bytes, _public + curve->num_words);
1118 return 1;
1119}
Jarno Lamsa46132202019-04-29 14:29:52 +03001120#else
Manuel Pégourié-Gonnardafdc1b52019-05-09 11:24:11 +02001121typedef int mbedtls_dummy_tinycrypt_def;
1122#endif /* MBEDTLS_USE_TINYCRYPT */
Jarno Lamsa18987a42019-04-24 15:40:43 +03001123