2002-08-02 14:28:37 +00:00
|
|
|
/*
|
2018-05-01 12:34:30 +00:00
|
|
|
* Copyright 2001-2018 The OpenSSL Project Authors. All Rights Reserved.
|
2017-06-15 14:16:46 +00:00
|
|
|
* Copyright (c) 2002, Oracle and/or its affiliates. All rights reserved
|
2001-03-05 20:13:37 +00:00
|
|
|
*
|
2016-05-17 18:51:04 +00:00
|
|
|
* Licensed under the OpenSSL license (the "License"). You may not use
|
|
|
|
* this file except in compliance with the License. You can obtain a copy
|
|
|
|
* in the file LICENSE in the source distribution or at
|
|
|
|
* https://www.openssl.org/source/license.html
|
2001-03-05 20:13:37 +00:00
|
|
|
*/
|
2016-05-17 18:51:04 +00:00
|
|
|
|
2003-02-10 11:14:35 +00:00
|
|
|
#include <string.h>
|
2001-03-10 23:18:35 +00:00
|
|
|
#include <openssl/err.h>
|
|
|
|
|
2016-02-29 16:57:11 +00:00
|
|
|
#include "internal/cryptlib.h"
|
2014-10-28 22:58:56 +00:00
|
|
|
#include "internal/bn_int.h"
|
2001-03-05 20:13:37 +00:00
|
|
|
#include "ec_lcl.h"
|
2017-08-21 21:17:35 +00:00
|
|
|
#include "internal/refcount.h"
|
2001-03-10 23:18:35 +00:00
|
|
|
|
2003-02-06 19:25:12 +00:00
|
|
|
/*
|
2016-02-05 20:23:54 +00:00
|
|
|
* This file implements the wNAF-based interleaving multi-exponentiation method
|
2017-05-02 14:53:10 +00:00
|
|
|
* Formerly at:
|
|
|
|
* http://www.informatik.tu-darmstadt.de/TI/Mitarbeiter/moeller.html#multiexp
|
|
|
|
* You might now find it here:
|
|
|
|
* http://link.springer.com/chapter/10.1007%2F3-540-45537-X_13
|
|
|
|
* http://www.bmoeller.de/pdf/TI-01-08.multiexp.pdf
|
|
|
|
* For multiplication with precomputation, we use wNAF splitting, formerly at:
|
|
|
|
* http://www.informatik.tu-darmstadt.de/TI/Mitarbeiter/moeller.html#fastexp
|
2003-02-06 19:25:12 +00:00
|
|
|
*/
|
2001-03-10 23:18:35 +00:00
|
|
|
|
2003-02-06 19:25:12 +00:00
|
|
|
/* structure for precomputed multiples of the generator */
|
2016-01-05 18:06:03 +00:00
|
|
|
struct ec_pre_comp_st {
|
2015-01-22 03:40:55 +00:00
|
|
|
const EC_GROUP *group; /* parent EC_GROUP object */
|
|
|
|
size_t blocksize; /* block size for wNAF splitting */
|
|
|
|
size_t numblocks; /* max. number of blocks for which we have
|
|
|
|
* precomputation */
|
|
|
|
size_t w; /* window size */
|
|
|
|
EC_POINT **points; /* array with pre-calculated multiples of
|
|
|
|
* generator: 'num' pointers to EC_POINT
|
|
|
|
* objects followed by a NULL */
|
|
|
|
size_t num; /* numblocks * 2^(w-1) */
|
2016-08-27 14:01:08 +00:00
|
|
|
CRYPTO_REF_COUNT references;
|
2016-02-29 16:57:11 +00:00
|
|
|
CRYPTO_RWLOCK *lock;
|
2016-01-05 18:06:03 +00:00
|
|
|
};
|
2003-02-06 19:25:12 +00:00
|
|
|
|
|
|
|
static EC_PRE_COMP *ec_pre_comp_new(const EC_GROUP *group)
|
2015-01-22 03:40:55 +00:00
|
|
|
{
|
|
|
|
EC_PRE_COMP *ret = NULL;
|
|
|
|
|
|
|
|
if (!group)
|
|
|
|
return NULL;
|
|
|
|
|
2015-09-03 13:15:26 +00:00
|
|
|
ret = OPENSSL_zalloc(sizeof(*ret));
|
2015-10-30 11:12:26 +00:00
|
|
|
if (ret == NULL) {
|
2015-01-22 03:40:55 +00:00
|
|
|
ECerr(EC_F_EC_PRE_COMP_NEW, ERR_R_MALLOC_FAILURE);
|
|
|
|
return ret;
|
|
|
|
}
|
2016-02-29 16:57:11 +00:00
|
|
|
|
2015-01-22 03:40:55 +00:00
|
|
|
ret->group = group;
|
|
|
|
ret->blocksize = 8; /* default */
|
|
|
|
ret->w = 4; /* default */
|
|
|
|
ret->references = 1;
|
2016-02-29 16:57:11 +00:00
|
|
|
|
|
|
|
ret->lock = CRYPTO_THREAD_lock_new();
|
|
|
|
if (ret->lock == NULL) {
|
|
|
|
ECerr(EC_F_EC_PRE_COMP_NEW, ERR_R_MALLOC_FAILURE);
|
|
|
|
OPENSSL_free(ret);
|
|
|
|
return NULL;
|
|
|
|
}
|
2015-01-22 03:40:55 +00:00
|
|
|
return ret;
|
|
|
|
}
|
2003-02-06 19:25:12 +00:00
|
|
|
|
2016-01-05 18:06:03 +00:00
|
|
|
EC_PRE_COMP *EC_ec_pre_comp_dup(EC_PRE_COMP *pre)
|
2015-01-22 03:40:55 +00:00
|
|
|
{
|
2016-02-29 16:57:11 +00:00
|
|
|
int i;
|
2016-01-05 18:06:03 +00:00
|
|
|
if (pre != NULL)
|
2016-08-27 14:01:08 +00:00
|
|
|
CRYPTO_UP_REF(&pre->references, &i, pre->lock);
|
2016-01-05 18:06:03 +00:00
|
|
|
return pre;
|
2015-01-22 03:40:55 +00:00
|
|
|
}
|
2003-02-06 19:25:12 +00:00
|
|
|
|
2016-01-05 18:06:03 +00:00
|
|
|
void EC_ec_pre_comp_free(EC_PRE_COMP *pre)
|
2015-01-22 03:40:55 +00:00
|
|
|
{
|
2016-02-29 16:57:11 +00:00
|
|
|
int i;
|
|
|
|
|
|
|
|
if (pre == NULL)
|
|
|
|
return;
|
|
|
|
|
2016-08-27 14:01:08 +00:00
|
|
|
CRYPTO_DOWN_REF(&pre->references, &i, pre->lock);
|
2016-02-29 16:57:11 +00:00
|
|
|
REF_PRINT_COUNT("EC_ec", pre);
|
|
|
|
if (i > 0)
|
2015-01-22 03:40:55 +00:00
|
|
|
return;
|
2016-02-29 16:57:11 +00:00
|
|
|
REF_ASSERT_ISNT(i < 0);
|
2003-02-12 18:30:16 +00:00
|
|
|
|
2016-01-05 18:06:03 +00:00
|
|
|
if (pre->points != NULL) {
|
|
|
|
EC_POINT **pts;
|
2003-02-06 19:25:12 +00:00
|
|
|
|
2016-01-05 18:06:03 +00:00
|
|
|
for (pts = pre->points; *pts != NULL; pts++)
|
|
|
|
EC_POINT_free(*pts);
|
2015-01-22 03:40:55 +00:00
|
|
|
OPENSSL_free(pre->points);
|
|
|
|
}
|
2016-02-29 16:57:11 +00:00
|
|
|
CRYPTO_THREAD_lock_free(pre->lock);
|
2015-01-22 03:40:55 +00:00
|
|
|
OPENSSL_free(pre);
|
|
|
|
}
|
2003-02-06 19:25:12 +00:00
|
|
|
|
2018-04-19 12:43:33 +00:00
|
|
|
#define EC_POINT_BN_set_flags(P, flags) do { \
|
2018-04-19 09:21:51 +00:00
|
|
|
BN_set_flags((P)->X, (flags)); \
|
|
|
|
BN_set_flags((P)->Y, (flags)); \
|
|
|
|
BN_set_flags((P)->Z, (flags)); \
|
|
|
|
} while(0)
|
|
|
|
|
2018-04-20 11:02:52 +00:00
|
|
|
/*-
|
2018-04-19 09:21:51 +00:00
|
|
|
* This functions computes (in constant time) a point multiplication over the
|
|
|
|
* EC group.
|
|
|
|
*
|
2018-04-19 16:10:21 +00:00
|
|
|
* At a high level, it is Montgomery ladder with conditional swaps.
|
|
|
|
*
|
2018-04-24 13:00:08 +00:00
|
|
|
* It performs either a fixed point multiplication
|
2018-04-19 09:21:51 +00:00
|
|
|
* (scalar * generator)
|
2018-04-24 13:00:08 +00:00
|
|
|
* when point is NULL, or a variable point multiplication
|
2018-04-19 09:21:51 +00:00
|
|
|
* (scalar * point)
|
|
|
|
* when point is not NULL.
|
|
|
|
*
|
|
|
|
* scalar should be in the range [0,n) otherwise all constant time bets are off.
|
|
|
|
*
|
|
|
|
* NB: This says nothing about EC_POINT_add and EC_POINT_dbl,
|
|
|
|
* which of course are not constant time themselves.
|
|
|
|
*
|
|
|
|
* The product is stored in r.
|
|
|
|
*
|
|
|
|
* Returns 1 on success, 0 otherwise.
|
|
|
|
*/
|
2018-04-20 11:02:52 +00:00
|
|
|
static int ec_mul_consttime(const EC_GROUP *group, EC_POINT *r,
|
|
|
|
const BIGNUM *scalar, const EC_POINT *point,
|
|
|
|
BN_CTX *ctx)
|
2018-04-19 09:21:51 +00:00
|
|
|
{
|
2018-06-20 07:56:37 +00:00
|
|
|
int i, cardinality_bits, group_top, kbit, pbit, Z_is_one;
|
2018-04-19 09:21:51 +00:00
|
|
|
EC_POINT *s = NULL;
|
|
|
|
BIGNUM *k = NULL;
|
|
|
|
BIGNUM *lambda = NULL;
|
2018-06-20 07:56:37 +00:00
|
|
|
BIGNUM *cardinality = NULL;
|
2018-04-19 09:21:51 +00:00
|
|
|
BN_CTX *new_ctx = NULL;
|
2018-04-19 12:43:33 +00:00
|
|
|
int ret = 0;
|
2018-04-19 09:21:51 +00:00
|
|
|
|
2018-04-19 12:43:33 +00:00
|
|
|
if (ctx == NULL && (ctx = new_ctx = BN_CTX_secure_new()) == NULL)
|
2018-05-07 08:27:45 +00:00
|
|
|
return 0;
|
|
|
|
|
|
|
|
BN_CTX_start(ctx);
|
2018-04-19 09:21:51 +00:00
|
|
|
|
|
|
|
s = EC_POINT_new(group);
|
|
|
|
if (s == NULL)
|
|
|
|
goto err;
|
|
|
|
|
|
|
|
if (point == NULL) {
|
|
|
|
if (!EC_POINT_copy(s, group->generator))
|
|
|
|
goto err;
|
|
|
|
} else {
|
|
|
|
if (!EC_POINT_copy(s, point))
|
|
|
|
goto err;
|
|
|
|
}
|
|
|
|
|
2018-04-19 12:43:33 +00:00
|
|
|
EC_POINT_BN_set_flags(s, BN_FLG_CONSTTIME);
|
2018-04-19 09:21:51 +00:00
|
|
|
|
2018-06-20 07:56:37 +00:00
|
|
|
cardinality = BN_CTX_get(ctx);
|
2018-04-19 09:21:51 +00:00
|
|
|
lambda = BN_CTX_get(ctx);
|
|
|
|
k = BN_CTX_get(ctx);
|
2018-06-20 07:56:37 +00:00
|
|
|
if (k == NULL || !BN_mul(cardinality, group->order, group->cofactor, ctx))
|
2018-04-19 09:21:51 +00:00
|
|
|
goto err;
|
|
|
|
|
|
|
|
/*
|
2018-06-20 07:56:37 +00:00
|
|
|
* Group cardinalities are often on a word boundary.
|
2018-04-19 09:21:51 +00:00
|
|
|
* So when we pad the scalar, some timing diff might
|
|
|
|
* pop if it needs to be expanded due to carries.
|
|
|
|
* So expand ahead of time.
|
|
|
|
*/
|
2018-06-20 07:56:37 +00:00
|
|
|
cardinality_bits = BN_num_bits(cardinality);
|
|
|
|
group_top = bn_get_top(cardinality);
|
2018-04-19 09:21:51 +00:00
|
|
|
if ((bn_wexpand(k, group_top + 1) == NULL)
|
|
|
|
|| (bn_wexpand(lambda, group_top + 1) == NULL))
|
|
|
|
goto err;
|
|
|
|
|
|
|
|
if (!BN_copy(k, scalar))
|
|
|
|
goto err;
|
|
|
|
|
|
|
|
BN_set_flags(k, BN_FLG_CONSTTIME);
|
|
|
|
|
2018-06-20 07:56:37 +00:00
|
|
|
if ((BN_num_bits(k) > cardinality_bits) || (BN_is_negative(k))) {
|
2018-04-20 11:02:52 +00:00
|
|
|
/*-
|
2018-04-19 09:21:51 +00:00
|
|
|
* this is an unusual input, and we don't guarantee
|
|
|
|
* constant-timeness
|
|
|
|
*/
|
2018-06-20 07:56:37 +00:00
|
|
|
if (!BN_nnmod(k, k, cardinality, ctx))
|
2018-04-19 09:21:51 +00:00
|
|
|
goto err;
|
|
|
|
}
|
|
|
|
|
2018-06-20 07:56:37 +00:00
|
|
|
if (!BN_add(lambda, k, cardinality))
|
2018-04-19 09:21:51 +00:00
|
|
|
goto err;
|
|
|
|
BN_set_flags(lambda, BN_FLG_CONSTTIME);
|
2018-06-20 07:56:37 +00:00
|
|
|
if (!BN_add(k, lambda, cardinality))
|
2018-04-19 09:21:51 +00:00
|
|
|
goto err;
|
|
|
|
/*
|
2018-06-20 07:56:37 +00:00
|
|
|
* lambda := scalar + cardinality
|
|
|
|
* k := scalar + 2*cardinality
|
2018-04-19 09:21:51 +00:00
|
|
|
*/
|
2018-06-20 07:56:37 +00:00
|
|
|
kbit = BN_is_bit_set(lambda, cardinality_bits);
|
2018-04-19 09:21:51 +00:00
|
|
|
BN_consttime_swap(kbit, k, lambda, group_top + 1);
|
|
|
|
|
|
|
|
group_top = bn_get_top(group->field);
|
|
|
|
if ((bn_wexpand(s->X, group_top) == NULL)
|
|
|
|
|| (bn_wexpand(s->Y, group_top) == NULL)
|
|
|
|
|| (bn_wexpand(s->Z, group_top) == NULL)
|
|
|
|
|| (bn_wexpand(r->X, group_top) == NULL)
|
|
|
|
|| (bn_wexpand(r->Y, group_top) == NULL)
|
|
|
|
|| (bn_wexpand(r->Z, group_top) == NULL))
|
|
|
|
goto err;
|
|
|
|
|
Implement coordinate blinding for EC_POINT
This commit implements coordinate blinding, i.e., it randomizes the
representative of an elliptic curve point in its equivalence class, for
prime curves implemented through EC_GFp_simple_method,
EC_GFp_mont_method, and EC_GFp_nist_method.
This commit is derived from the patch
https://marc.info/?l=openssl-dev&m=131194808413635 by Billy Brumley.
Coordinate blinding is a generally useful side-channel countermeasure
and is (mostly) free. The function itself takes a few field
multiplicationss, but is usually only necessary at the beginning of a
scalar multiplication (as implemented in the patch). When used this way,
it makes the values that variables take (i.e., field elements in an
algorithm state) unpredictable.
For instance, this mitigates chosen EC point side-channel attacks for
settings such as ECDH and EC private key decryption, for the
aforementioned curves.
For EC_METHODs using different coordinate representations this commit
does nothing, but the corresponding coordinate blinding function can be
easily added in the future to extend these changes to such curves.
Co-authored-by: Nicola Tuveri <nic.tuv@gmail.com>
Co-authored-by: Billy Brumley <bbrumley@gmail.com>
Reviewed-by: Andy Polyakov <appro@openssl.org>
Reviewed-by: Matt Caswell <matt@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/6501)
2018-06-16 14:07:40 +00:00
|
|
|
/*-
|
|
|
|
* Apply coordinate blinding for EC_POINT.
|
|
|
|
*
|
|
|
|
* The underlying EC_METHOD can optionally implement this function:
|
|
|
|
* ec_point_blind_coordinates() returns 0 in case of errors or 1 on
|
|
|
|
* success or if coordinate blinding is not implemented for this
|
|
|
|
* group.
|
|
|
|
*/
|
|
|
|
if (!ec_point_blind_coordinates(group, s, ctx))
|
|
|
|
goto err;
|
|
|
|
|
2018-04-19 09:21:51 +00:00
|
|
|
/* top bit is a 1, in a fixed pos */
|
|
|
|
if (!EC_POINT_copy(r, s))
|
|
|
|
goto err;
|
|
|
|
|
2018-04-19 12:43:33 +00:00
|
|
|
EC_POINT_BN_set_flags(r, BN_FLG_CONSTTIME);
|
2018-04-19 09:21:51 +00:00
|
|
|
|
|
|
|
if (!EC_POINT_dbl(group, s, s, ctx))
|
|
|
|
goto err;
|
|
|
|
|
|
|
|
pbit = 0;
|
|
|
|
|
|
|
|
#define EC_POINT_CSWAP(c, a, b, w, t) do { \
|
|
|
|
BN_consttime_swap(c, (a)->X, (b)->X, w); \
|
|
|
|
BN_consttime_swap(c, (a)->Y, (b)->Y, w); \
|
|
|
|
BN_consttime_swap(c, (a)->Z, (b)->Z, w); \
|
|
|
|
t = ((a)->Z_is_one ^ (b)->Z_is_one) & (c); \
|
|
|
|
(a)->Z_is_one ^= (t); \
|
|
|
|
(b)->Z_is_one ^= (t); \
|
|
|
|
} while(0)
|
|
|
|
|
2018-04-20 11:02:52 +00:00
|
|
|
/*-
|
2018-04-19 16:10:21 +00:00
|
|
|
* The ladder step, with branches, is
|
|
|
|
*
|
|
|
|
* k[i] == 0: S = add(R, S), R = dbl(R)
|
|
|
|
* k[i] == 1: R = add(S, R), S = dbl(S)
|
|
|
|
*
|
|
|
|
* Swapping R, S conditionally on k[i] leaves you with state
|
|
|
|
*
|
|
|
|
* k[i] == 0: T, U = R, S
|
|
|
|
* k[i] == 1: T, U = S, R
|
|
|
|
*
|
|
|
|
* Then perform the ECC ops.
|
|
|
|
*
|
|
|
|
* U = add(T, U)
|
|
|
|
* T = dbl(T)
|
|
|
|
*
|
|
|
|
* Which leaves you with state
|
|
|
|
*
|
|
|
|
* k[i] == 0: U = add(R, S), T = dbl(R)
|
|
|
|
* k[i] == 1: U = add(S, R), T = dbl(S)
|
|
|
|
*
|
|
|
|
* Swapping T, U conditionally on k[i] leaves you with state
|
|
|
|
*
|
|
|
|
* k[i] == 0: R, S = T, U
|
|
|
|
* k[i] == 1: R, S = U, T
|
|
|
|
*
|
|
|
|
* Which leaves you with state
|
|
|
|
*
|
|
|
|
* k[i] == 0: S = add(R, S), R = dbl(R)
|
|
|
|
* k[i] == 1: R = add(S, R), S = dbl(S)
|
|
|
|
*
|
|
|
|
* So we get the same logic, but instead of a branch it's a
|
|
|
|
* conditional swap, followed by ECC ops, then another conditional swap.
|
|
|
|
*
|
|
|
|
* Optimization: The end of iteration i and start of i-1 looks like
|
|
|
|
*
|
|
|
|
* ...
|
|
|
|
* CSWAP(k[i], R, S)
|
|
|
|
* ECC
|
|
|
|
* CSWAP(k[i], R, S)
|
|
|
|
* (next iteration)
|
|
|
|
* CSWAP(k[i-1], R, S)
|
|
|
|
* ECC
|
|
|
|
* CSWAP(k[i-1], R, S)
|
|
|
|
* ...
|
|
|
|
*
|
|
|
|
* So instead of two contiguous swaps, you can merge the condition
|
|
|
|
* bits and do a single swap.
|
|
|
|
*
|
2018-04-20 11:02:52 +00:00
|
|
|
* k[i] k[i-1] Outcome
|
|
|
|
* 0 0 No Swap
|
|
|
|
* 0 1 Swap
|
|
|
|
* 1 0 Swap
|
|
|
|
* 1 1 No Swap
|
2018-04-19 16:10:21 +00:00
|
|
|
*
|
|
|
|
* This is XOR. pbit tracks the previous bit of k.
|
|
|
|
*/
|
|
|
|
|
2018-06-20 07:56:37 +00:00
|
|
|
for (i = cardinality_bits - 1; i >= 0; i--) {
|
2018-04-19 09:21:51 +00:00
|
|
|
kbit = BN_is_bit_set(k, i) ^ pbit;
|
|
|
|
EC_POINT_CSWAP(kbit, r, s, group_top, Z_is_one);
|
|
|
|
if (!EC_POINT_add(group, s, r, s, ctx))
|
|
|
|
goto err;
|
|
|
|
if (!EC_POINT_dbl(group, r, r, ctx))
|
|
|
|
goto err;
|
|
|
|
/*
|
|
|
|
* pbit logic merges this cswap with that of the
|
|
|
|
* next iteration
|
|
|
|
*/
|
|
|
|
pbit ^= kbit;
|
|
|
|
}
|
|
|
|
/* one final cswap to move the right value into r */
|
|
|
|
EC_POINT_CSWAP(pbit, r, s, group_top, Z_is_one);
|
|
|
|
#undef EC_POINT_CSWAP
|
|
|
|
|
|
|
|
ret = 1;
|
|
|
|
|
2018-04-20 11:02:52 +00:00
|
|
|
err:
|
2018-04-19 09:21:51 +00:00
|
|
|
EC_POINT_free(s);
|
|
|
|
BN_CTX_end(ctx);
|
|
|
|
BN_CTX_free(new_ctx);
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
2018-04-20 11:02:52 +00:00
|
|
|
|
2018-04-19 12:43:33 +00:00
|
|
|
#undef EC_POINT_BN_set_flags
|
2018-04-19 09:21:51 +00:00
|
|
|
|
2015-01-22 03:40:55 +00:00
|
|
|
/*
|
|
|
|
* TODO: table should be optimised for the wNAF-based implementation,
|
|
|
|
* sometimes smaller windows will give better performance (thus the
|
|
|
|
* boundaries should be increased)
|
2001-11-22 11:08:38 +00:00
|
|
|
*/
|
2001-11-15 22:32:11 +00:00
|
|
|
#define EC_window_bits_for_scalar_size(b) \
|
2015-01-22 03:40:55 +00:00
|
|
|
((size_t) \
|
|
|
|
((b) >= 2000 ? 6 : \
|
|
|
|
(b) >= 800 ? 5 : \
|
|
|
|
(b) >= 300 ? 4 : \
|
|
|
|
(b) >= 70 ? 3 : \
|
|
|
|
(b) >= 20 ? 2 : \
|
|
|
|
1))
|
2001-11-15 22:32:11 +00:00
|
|
|
|
2015-01-16 09:21:50 +00:00
|
|
|
/*-
|
|
|
|
* Compute
|
2001-11-15 22:32:11 +00:00
|
|
|
* \sum scalars[i]*points[i],
|
|
|
|
* also including
|
|
|
|
* scalar*generator
|
|
|
|
* in the addition if scalar != NULL
|
|
|
|
*/
|
2002-08-02 13:42:24 +00:00
|
|
|
int ec_wNAF_mul(const EC_GROUP *group, EC_POINT *r, const BIGNUM *scalar,
|
2015-01-22 03:40:55 +00:00
|
|
|
size_t num, const EC_POINT *points[], const BIGNUM *scalars[],
|
|
|
|
BN_CTX *ctx)
|
|
|
|
{
|
|
|
|
BN_CTX *new_ctx = NULL;
|
|
|
|
const EC_POINT *generator = NULL;
|
|
|
|
EC_POINT *tmp = NULL;
|
|
|
|
size_t totalnum;
|
|
|
|
size_t blocksize = 0, numblocks = 0; /* for wNAF splitting */
|
|
|
|
size_t pre_points_per_block = 0;
|
|
|
|
size_t i, j;
|
|
|
|
int k;
|
|
|
|
int r_is_inverted = 0;
|
|
|
|
int r_is_at_infinity = 1;
|
|
|
|
size_t *wsize = NULL; /* individual window sizes */
|
|
|
|
signed char **wNAF = NULL; /* individual wNAFs */
|
|
|
|
size_t *wNAF_len = NULL;
|
|
|
|
size_t max_len = 0;
|
|
|
|
size_t num_val;
|
|
|
|
EC_POINT **val = NULL; /* precomputation */
|
|
|
|
EC_POINT **v;
|
|
|
|
EC_POINT ***val_sub = NULL; /* pointers to sub-arrays of 'val' or
|
|
|
|
* 'pre_comp->points' */
|
|
|
|
const EC_PRE_COMP *pre_comp = NULL;
|
|
|
|
int num_scalar = 0; /* flag: will be set to 1 if 'scalar' must be
|
|
|
|
* treated like other scalars, i.e.
|
|
|
|
* precomputation is not available */
|
|
|
|
int ret = 0;
|
|
|
|
|
2018-05-21 14:24:56 +00:00
|
|
|
if (!ec_point_is_compat(r, group)) {
|
2018-04-20 11:13:40 +00:00
|
|
|
ECerr(EC_F_EC_WNAF_MUL, EC_R_INCOMPATIBLE_OBJECTS);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
if ((scalar == NULL) && (num == 0)) {
|
|
|
|
return EC_POINT_set_to_infinity(group, r);
|
|
|
|
}
|
|
|
|
|
2018-04-20 11:02:52 +00:00
|
|
|
/*-
|
|
|
|
* Handle the common cases where the scalar is secret, enforcing a constant
|
|
|
|
* time scalar multiplication algorithm.
|
2018-04-19 12:43:33 +00:00
|
|
|
*/
|
|
|
|
if ((scalar != NULL) && (num == 0)) {
|
2018-04-20 11:02:52 +00:00
|
|
|
/*-
|
|
|
|
* In this case we want to compute scalar * GeneratorPoint: this
|
|
|
|
* codepath is reached most prominently by (ephemeral) key generation
|
|
|
|
* of EC cryptosystems (i.e. ECDSA keygen and sign setup, ECDH
|
|
|
|
* keygen/first half), where the scalar is always secret. This is why
|
|
|
|
* we ignore if BN_FLG_CONSTTIME is actually set and we always call the
|
|
|
|
* constant time version.
|
2018-04-19 12:43:33 +00:00
|
|
|
*/
|
|
|
|
return ec_mul_consttime(group, r, scalar, NULL, ctx);
|
|
|
|
}
|
|
|
|
if ((scalar == NULL) && (num == 1)) {
|
2018-04-20 11:02:52 +00:00
|
|
|
/*-
|
|
|
|
* In this case we want to compute scalar * GenericPoint: this codepath
|
|
|
|
* is reached most prominently by the second half of ECDH, where the
|
|
|
|
* secret scalar is multiplied by the peer's public point. To protect
|
|
|
|
* the secret scalar, we ignore if BN_FLG_CONSTTIME is actually set and
|
|
|
|
* we always call the constant time version.
|
2018-04-19 12:43:33 +00:00
|
|
|
*/
|
|
|
|
return ec_mul_consttime(group, r, scalars[0], points[0], ctx);
|
|
|
|
}
|
|
|
|
|
2015-01-22 03:40:55 +00:00
|
|
|
for (i = 0; i < num; i++) {
|
2018-05-21 14:24:56 +00:00
|
|
|
if (!ec_point_is_compat(points[i], group)) {
|
2015-01-22 03:40:55 +00:00
|
|
|
ECerr(EC_F_EC_WNAF_MUL, EC_R_INCOMPATIBLE_OBJECTS);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (ctx == NULL) {
|
|
|
|
ctx = new_ctx = BN_CTX_new();
|
|
|
|
if (ctx == NULL)
|
|
|
|
goto err;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (scalar != NULL) {
|
|
|
|
generator = EC_GROUP_get0_generator(group);
|
|
|
|
if (generator == NULL) {
|
|
|
|
ECerr(EC_F_EC_WNAF_MUL, EC_R_UNDEFINED_GENERATOR);
|
|
|
|
goto err;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* look if we can use precomputed multiples of generator */
|
|
|
|
|
2016-01-05 18:06:03 +00:00
|
|
|
pre_comp = group->pre_comp.ec;
|
2015-01-22 03:40:55 +00:00
|
|
|
if (pre_comp && pre_comp->numblocks
|
|
|
|
&& (EC_POINT_cmp(group, generator, pre_comp->points[0], ctx) ==
|
|
|
|
0)) {
|
|
|
|
blocksize = pre_comp->blocksize;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* determine maximum number of blocks that wNAF splitting may
|
|
|
|
* yield (NB: maximum wNAF length is bit length plus one)
|
|
|
|
*/
|
|
|
|
numblocks = (BN_num_bits(scalar) / blocksize) + 1;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* we cannot use more blocks than we have precomputation for
|
|
|
|
*/
|
|
|
|
if (numblocks > pre_comp->numblocks)
|
|
|
|
numblocks = pre_comp->numblocks;
|
|
|
|
|
|
|
|
pre_points_per_block = (size_t)1 << (pre_comp->w - 1);
|
|
|
|
|
|
|
|
/* check that pre_comp looks sane */
|
|
|
|
if (pre_comp->num != (pre_comp->numblocks * pre_points_per_block)) {
|
|
|
|
ECerr(EC_F_EC_WNAF_MUL, ERR_R_INTERNAL_ERROR);
|
|
|
|
goto err;
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
/* can't use precomputation */
|
|
|
|
pre_comp = NULL;
|
|
|
|
numblocks = 1;
|
|
|
|
num_scalar = 1; /* treat 'scalar' like 'num'-th element of
|
|
|
|
* 'scalars' */
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
totalnum = num + numblocks;
|
|
|
|
|
2017-12-07 18:39:34 +00:00
|
|
|
wsize = OPENSSL_malloc(totalnum * sizeof(wsize[0]));
|
|
|
|
wNAF_len = OPENSSL_malloc(totalnum * sizeof(wNAF_len[0]));
|
|
|
|
/* include space for pivot */
|
|
|
|
wNAF = OPENSSL_malloc((totalnum + 1) * sizeof(wNAF[0]));
|
|
|
|
val_sub = OPENSSL_malloc(totalnum * sizeof(val_sub[0]));
|
2015-01-22 03:40:55 +00:00
|
|
|
|
|
|
|
/* Ensure wNAF is initialised in case we end up going to err */
|
2015-10-30 11:12:26 +00:00
|
|
|
if (wNAF != NULL)
|
2015-01-22 03:40:55 +00:00
|
|
|
wNAF[0] = NULL; /* preliminary pivot */
|
|
|
|
|
2015-10-30 11:12:26 +00:00
|
|
|
if (wsize == NULL || wNAF_len == NULL || wNAF == NULL || val_sub == NULL) {
|
2015-01-22 03:40:55 +00:00
|
|
|
ECerr(EC_F_EC_WNAF_MUL, ERR_R_MALLOC_FAILURE);
|
|
|
|
goto err;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* num_val will be the total number of temporarily precomputed points
|
|
|
|
*/
|
|
|
|
num_val = 0;
|
|
|
|
|
|
|
|
for (i = 0; i < num + num_scalar; i++) {
|
|
|
|
size_t bits;
|
|
|
|
|
|
|
|
bits = i < num ? BN_num_bits(scalars[i]) : BN_num_bits(scalar);
|
|
|
|
wsize[i] = EC_window_bits_for_scalar_size(bits);
|
|
|
|
num_val += (size_t)1 << (wsize[i] - 1);
|
|
|
|
wNAF[i + 1] = NULL; /* make sure we always have a pivot */
|
|
|
|
wNAF[i] =
|
|
|
|
bn_compute_wNAF((i < num ? scalars[i] : scalar), wsize[i],
|
|
|
|
&wNAF_len[i]);
|
|
|
|
if (wNAF[i] == NULL)
|
|
|
|
goto err;
|
|
|
|
if (wNAF_len[i] > max_len)
|
|
|
|
max_len = wNAF_len[i];
|
|
|
|
}
|
|
|
|
|
|
|
|
if (numblocks) {
|
|
|
|
/* we go here iff scalar != NULL */
|
|
|
|
|
|
|
|
if (pre_comp == NULL) {
|
|
|
|
if (num_scalar != 1) {
|
|
|
|
ECerr(EC_F_EC_WNAF_MUL, ERR_R_INTERNAL_ERROR);
|
|
|
|
goto err;
|
|
|
|
}
|
|
|
|
/* we have already generated a wNAF for 'scalar' */
|
|
|
|
} else {
|
|
|
|
signed char *tmp_wNAF = NULL;
|
|
|
|
size_t tmp_len = 0;
|
|
|
|
|
|
|
|
if (num_scalar != 0) {
|
|
|
|
ECerr(EC_F_EC_WNAF_MUL, ERR_R_INTERNAL_ERROR);
|
|
|
|
goto err;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* use the window size for which we have precomputation
|
|
|
|
*/
|
|
|
|
wsize[num] = pre_comp->w;
|
|
|
|
tmp_wNAF = bn_compute_wNAF(scalar, wsize[num], &tmp_len);
|
|
|
|
if (!tmp_wNAF)
|
|
|
|
goto err;
|
|
|
|
|
|
|
|
if (tmp_len <= max_len) {
|
|
|
|
/*
|
|
|
|
* One of the other wNAFs is at least as long as the wNAF
|
|
|
|
* belonging to the generator, so wNAF splitting will not buy
|
|
|
|
* us anything.
|
|
|
|
*/
|
|
|
|
|
|
|
|
numblocks = 1;
|
|
|
|
totalnum = num + 1; /* don't use wNAF splitting */
|
|
|
|
wNAF[num] = tmp_wNAF;
|
|
|
|
wNAF[num + 1] = NULL;
|
|
|
|
wNAF_len[num] = tmp_len;
|
|
|
|
/*
|
|
|
|
* pre_comp->points starts with the points that we need here:
|
|
|
|
*/
|
|
|
|
val_sub[num] = pre_comp->points;
|
|
|
|
} else {
|
|
|
|
/*
|
|
|
|
* don't include tmp_wNAF directly into wNAF array - use wNAF
|
|
|
|
* splitting and include the blocks
|
|
|
|
*/
|
|
|
|
|
|
|
|
signed char *pp;
|
|
|
|
EC_POINT **tmp_points;
|
|
|
|
|
|
|
|
if (tmp_len < numblocks * blocksize) {
|
|
|
|
/*
|
|
|
|
* possibly we can do with fewer blocks than estimated
|
|
|
|
*/
|
|
|
|
numblocks = (tmp_len + blocksize - 1) / blocksize;
|
|
|
|
if (numblocks > pre_comp->numblocks) {
|
|
|
|
ECerr(EC_F_EC_WNAF_MUL, ERR_R_INTERNAL_ERROR);
|
2016-04-27 13:38:44 +00:00
|
|
|
OPENSSL_free(tmp_wNAF);
|
2015-01-22 03:40:55 +00:00
|
|
|
goto err;
|
|
|
|
}
|
|
|
|
totalnum = num + numblocks;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* split wNAF in 'numblocks' parts */
|
|
|
|
pp = tmp_wNAF;
|
|
|
|
tmp_points = pre_comp->points;
|
|
|
|
|
|
|
|
for (i = num; i < totalnum; i++) {
|
|
|
|
if (i < totalnum - 1) {
|
|
|
|
wNAF_len[i] = blocksize;
|
|
|
|
if (tmp_len < blocksize) {
|
|
|
|
ECerr(EC_F_EC_WNAF_MUL, ERR_R_INTERNAL_ERROR);
|
2016-04-27 13:38:44 +00:00
|
|
|
OPENSSL_free(tmp_wNAF);
|
2015-01-22 03:40:55 +00:00
|
|
|
goto err;
|
|
|
|
}
|
|
|
|
tmp_len -= blocksize;
|
|
|
|
} else
|
|
|
|
/*
|
|
|
|
* last block gets whatever is left (this could be
|
|
|
|
* more or less than 'blocksize'!)
|
|
|
|
*/
|
|
|
|
wNAF_len[i] = tmp_len;
|
|
|
|
|
|
|
|
wNAF[i + 1] = NULL;
|
|
|
|
wNAF[i] = OPENSSL_malloc(wNAF_len[i]);
|
|
|
|
if (wNAF[i] == NULL) {
|
|
|
|
ECerr(EC_F_EC_WNAF_MUL, ERR_R_MALLOC_FAILURE);
|
|
|
|
OPENSSL_free(tmp_wNAF);
|
|
|
|
goto err;
|
|
|
|
}
|
|
|
|
memcpy(wNAF[i], pp, wNAF_len[i]);
|
|
|
|
if (wNAF_len[i] > max_len)
|
|
|
|
max_len = wNAF_len[i];
|
|
|
|
|
|
|
|
if (*tmp_points == NULL) {
|
|
|
|
ECerr(EC_F_EC_WNAF_MUL, ERR_R_INTERNAL_ERROR);
|
|
|
|
OPENSSL_free(tmp_wNAF);
|
|
|
|
goto err;
|
|
|
|
}
|
|
|
|
val_sub[i] = tmp_points;
|
|
|
|
tmp_points += pre_points_per_block;
|
|
|
|
pp += blocksize;
|
|
|
|
}
|
|
|
|
OPENSSL_free(tmp_wNAF);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* All points we precompute now go into a single array 'val'.
|
|
|
|
* 'val_sub[i]' is a pointer to the subarray for the i-th point, or to a
|
|
|
|
* subarray of 'pre_comp->points' if we already have precomputation.
|
|
|
|
*/
|
2017-12-07 18:39:34 +00:00
|
|
|
val = OPENSSL_malloc((num_val + 1) * sizeof(val[0]));
|
2015-01-22 03:40:55 +00:00
|
|
|
if (val == NULL) {
|
|
|
|
ECerr(EC_F_EC_WNAF_MUL, ERR_R_MALLOC_FAILURE);
|
|
|
|
goto err;
|
|
|
|
}
|
|
|
|
val[num_val] = NULL; /* pivot element */
|
|
|
|
|
|
|
|
/* allocate points for precomputation */
|
|
|
|
v = val;
|
|
|
|
for (i = 0; i < num + num_scalar; i++) {
|
|
|
|
val_sub[i] = v;
|
|
|
|
for (j = 0; j < ((size_t)1 << (wsize[i] - 1)); j++) {
|
|
|
|
*v = EC_POINT_new(group);
|
|
|
|
if (*v == NULL)
|
|
|
|
goto err;
|
|
|
|
v++;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (!(v == val + num_val)) {
|
|
|
|
ECerr(EC_F_EC_WNAF_MUL, ERR_R_INTERNAL_ERROR);
|
|
|
|
goto err;
|
|
|
|
}
|
|
|
|
|
2015-05-06 17:43:59 +00:00
|
|
|
if ((tmp = EC_POINT_new(group)) == NULL)
|
2015-01-22 03:40:55 +00:00
|
|
|
goto err;
|
|
|
|
|
2015-01-05 11:30:03 +00:00
|
|
|
/*-
|
|
|
|
* prepare precomputed values:
|
|
|
|
* val_sub[i][0] := points[i]
|
|
|
|
* val_sub[i][1] := 3 * points[i]
|
|
|
|
* val_sub[i][2] := 5 * points[i]
|
|
|
|
* ...
|
|
|
|
*/
|
2015-01-22 03:40:55 +00:00
|
|
|
for (i = 0; i < num + num_scalar; i++) {
|
|
|
|
if (i < num) {
|
|
|
|
if (!EC_POINT_copy(val_sub[i][0], points[i]))
|
|
|
|
goto err;
|
|
|
|
} else {
|
|
|
|
if (!EC_POINT_copy(val_sub[i][0], generator))
|
|
|
|
goto err;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (wsize[i] > 1) {
|
|
|
|
if (!EC_POINT_dbl(group, tmp, val_sub[i][0], ctx))
|
|
|
|
goto err;
|
|
|
|
for (j = 1; j < ((size_t)1 << (wsize[i] - 1)); j++) {
|
|
|
|
if (!EC_POINT_add
|
|
|
|
(group, val_sub[i][j], val_sub[i][j - 1], tmp, ctx))
|
|
|
|
goto err;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!EC_POINTs_make_affine(group, num_val, val, ctx))
|
|
|
|
goto err;
|
2001-11-15 22:32:11 +00:00
|
|
|
|
2015-01-22 03:40:55 +00:00
|
|
|
r_is_at_infinity = 1;
|
|
|
|
|
|
|
|
for (k = max_len - 1; k >= 0; k--) {
|
|
|
|
if (!r_is_at_infinity) {
|
|
|
|
if (!EC_POINT_dbl(group, r, r, ctx))
|
|
|
|
goto err;
|
|
|
|
}
|
|
|
|
|
|
|
|
for (i = 0; i < totalnum; i++) {
|
|
|
|
if (wNAF_len[i] > (size_t)k) {
|
|
|
|
int digit = wNAF[i][k];
|
|
|
|
int is_neg;
|
|
|
|
|
|
|
|
if (digit) {
|
|
|
|
is_neg = digit < 0;
|
|
|
|
|
|
|
|
if (is_neg)
|
|
|
|
digit = -digit;
|
|
|
|
|
|
|
|
if (is_neg != r_is_inverted) {
|
|
|
|
if (!r_is_at_infinity) {
|
|
|
|
if (!EC_POINT_invert(group, r, ctx))
|
|
|
|
goto err;
|
|
|
|
}
|
|
|
|
r_is_inverted = !r_is_inverted;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* digit > 0 */
|
|
|
|
|
|
|
|
if (r_is_at_infinity) {
|
|
|
|
if (!EC_POINT_copy(r, val_sub[i][digit >> 1]))
|
|
|
|
goto err;
|
|
|
|
r_is_at_infinity = 0;
|
|
|
|
} else {
|
|
|
|
if (!EC_POINT_add
|
|
|
|
(group, r, r, val_sub[i][digit >> 1], ctx))
|
|
|
|
goto err;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (r_is_at_infinity) {
|
|
|
|
if (!EC_POINT_set_to_infinity(group, r))
|
|
|
|
goto err;
|
|
|
|
} else {
|
|
|
|
if (r_is_inverted)
|
|
|
|
if (!EC_POINT_invert(group, r, ctx))
|
|
|
|
goto err;
|
|
|
|
}
|
|
|
|
|
|
|
|
ret = 1;
|
2001-11-15 22:32:11 +00:00
|
|
|
|
|
|
|
err:
|
2015-05-01 01:37:06 +00:00
|
|
|
BN_CTX_free(new_ctx);
|
2015-03-25 22:35:24 +00:00
|
|
|
EC_POINT_free(tmp);
|
2015-05-01 14:02:07 +00:00
|
|
|
OPENSSL_free(wsize);
|
|
|
|
OPENSSL_free(wNAF_len);
|
2015-01-22 03:40:55 +00:00
|
|
|
if (wNAF != NULL) {
|
|
|
|
signed char **w;
|
|
|
|
|
|
|
|
for (w = wNAF; *w != NULL; w++)
|
|
|
|
OPENSSL_free(*w);
|
|
|
|
|
|
|
|
OPENSSL_free(wNAF);
|
|
|
|
}
|
|
|
|
if (val != NULL) {
|
|
|
|
for (v = val; *v != NULL; v++)
|
|
|
|
EC_POINT_clear_free(*v);
|
|
|
|
|
|
|
|
OPENSSL_free(val);
|
|
|
|
}
|
2015-05-01 14:02:07 +00:00
|
|
|
OPENSSL_free(val_sub);
|
2015-01-22 03:40:55 +00:00
|
|
|
return ret;
|
|
|
|
}
|
2001-03-11 12:27:24 +00:00
|
|
|
|
2014-12-28 02:48:40 +00:00
|
|
|
/*-
|
|
|
|
* ec_wNAF_precompute_mult()
|
2003-02-06 19:25:12 +00:00
|
|
|
* creates an EC_PRE_COMP object with preprecomputed multiples of the generator
|
|
|
|
* for use with wNAF splitting as implemented in ec_wNAF_mul().
|
2015-01-22 03:40:55 +00:00
|
|
|
*
|
2003-02-06 19:25:12 +00:00
|
|
|
* 'pre_comp->points' is an array of multiples of the generator
|
|
|
|
* of the following form:
|
|
|
|
* points[0] = generator;
|
|
|
|
* points[1] = 3 * generator;
|
|
|
|
* ...
|
|
|
|
* points[2^(w-1)-1] = (2^(w-1)-1) * generator;
|
|
|
|
* points[2^(w-1)] = 2^blocksize * generator;
|
|
|
|
* points[2^(w-1)+1] = 3 * 2^blocksize * generator;
|
|
|
|
* ...
|
|
|
|
* points[2^(w-1)*(numblocks-1)-1] = (2^(w-1)) * 2^(blocksize*(numblocks-2)) * generator
|
|
|
|
* points[2^(w-1)*(numblocks-1)] = 2^(blocksize*(numblocks-1)) * generator
|
|
|
|
* ...
|
|
|
|
* points[2^(w-1)*numblocks-1] = (2^(w-1)) * 2^(blocksize*(numblocks-1)) * generator
|
|
|
|
* points[2^(w-1)*numblocks] = NULL
|
2002-08-02 13:42:24 +00:00
|
|
|
*/
|
|
|
|
int ec_wNAF_precompute_mult(EC_GROUP *group, BN_CTX *ctx)
|
2015-01-22 03:40:55 +00:00
|
|
|
{
|
|
|
|
const EC_POINT *generator;
|
|
|
|
EC_POINT *tmp_point = NULL, *base = NULL, **var;
|
|
|
|
BN_CTX *new_ctx = NULL;
|
2016-01-31 16:34:07 +00:00
|
|
|
const BIGNUM *order;
|
2015-01-22 03:40:55 +00:00
|
|
|
size_t i, bits, w, pre_points_per_block, blocksize, numblocks, num;
|
|
|
|
EC_POINT **points = NULL;
|
|
|
|
EC_PRE_COMP *pre_comp;
|
|
|
|
int ret = 0;
|
|
|
|
|
|
|
|
/* if there is an old EC_PRE_COMP object, throw it away */
|
2016-01-14 02:26:00 +00:00
|
|
|
EC_pre_comp_free(group);
|
2015-01-22 03:40:55 +00:00
|
|
|
if ((pre_comp = ec_pre_comp_new(group)) == NULL)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
generator = EC_GROUP_get0_generator(group);
|
|
|
|
if (generator == NULL) {
|
|
|
|
ECerr(EC_F_EC_WNAF_PRECOMPUTE_MULT, EC_R_UNDEFINED_GENERATOR);
|
|
|
|
goto err;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (ctx == NULL) {
|
|
|
|
ctx = new_ctx = BN_CTX_new();
|
|
|
|
if (ctx == NULL)
|
|
|
|
goto err;
|
|
|
|
}
|
|
|
|
|
|
|
|
BN_CTX_start(ctx);
|
|
|
|
|
2016-01-31 16:34:07 +00:00
|
|
|
order = EC_GROUP_get0_order(group);
|
|
|
|
if (order == NULL)
|
2015-01-22 03:40:55 +00:00
|
|
|
goto err;
|
|
|
|
if (BN_is_zero(order)) {
|
|
|
|
ECerr(EC_F_EC_WNAF_PRECOMPUTE_MULT, EC_R_UNKNOWN_ORDER);
|
|
|
|
goto err;
|
|
|
|
}
|
|
|
|
|
|
|
|
bits = BN_num_bits(order);
|
|
|
|
/*
|
|
|
|
* The following parameters mean we precompute (approximately) one point
|
|
|
|
* per bit. TBD: The combination 8, 4 is perfect for 160 bits; for other
|
|
|
|
* bit lengths, other parameter combinations might provide better
|
|
|
|
* efficiency.
|
|
|
|
*/
|
|
|
|
blocksize = 8;
|
|
|
|
w = 4;
|
|
|
|
if (EC_window_bits_for_scalar_size(bits) > w) {
|
|
|
|
/* let's not make the window too small ... */
|
|
|
|
w = EC_window_bits_for_scalar_size(bits);
|
|
|
|
}
|
|
|
|
|
|
|
|
numblocks = (bits + blocksize - 1) / blocksize; /* max. number of blocks
|
|
|
|
* to use for wNAF
|
|
|
|
* splitting */
|
|
|
|
|
|
|
|
pre_points_per_block = (size_t)1 << (w - 1);
|
|
|
|
num = pre_points_per_block * numblocks; /* number of points to compute
|
|
|
|
* and store */
|
|
|
|
|
2015-05-02 03:10:31 +00:00
|
|
|
points = OPENSSL_malloc(sizeof(*points) * (num + 1));
|
2015-10-30 11:12:26 +00:00
|
|
|
if (points == NULL) {
|
2015-01-22 03:40:55 +00:00
|
|
|
ECerr(EC_F_EC_WNAF_PRECOMPUTE_MULT, ERR_R_MALLOC_FAILURE);
|
|
|
|
goto err;
|
|
|
|
}
|
|
|
|
|
|
|
|
var = points;
|
|
|
|
var[num] = NULL; /* pivot */
|
|
|
|
for (i = 0; i < num; i++) {
|
|
|
|
if ((var[i] = EC_POINT_new(group)) == NULL) {
|
|
|
|
ECerr(EC_F_EC_WNAF_PRECOMPUTE_MULT, ERR_R_MALLOC_FAILURE);
|
|
|
|
goto err;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-05-06 17:43:59 +00:00
|
|
|
if ((tmp_point = EC_POINT_new(group)) == NULL
|
|
|
|
|| (base = EC_POINT_new(group)) == NULL) {
|
2015-01-22 03:40:55 +00:00
|
|
|
ECerr(EC_F_EC_WNAF_PRECOMPUTE_MULT, ERR_R_MALLOC_FAILURE);
|
|
|
|
goto err;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!EC_POINT_copy(base, generator))
|
|
|
|
goto err;
|
|
|
|
|
|
|
|
/* do the precomputation */
|
|
|
|
for (i = 0; i < numblocks; i++) {
|
|
|
|
size_t j;
|
|
|
|
|
|
|
|
if (!EC_POINT_dbl(group, tmp_point, base, ctx))
|
|
|
|
goto err;
|
|
|
|
|
|
|
|
if (!EC_POINT_copy(*var++, base))
|
|
|
|
goto err;
|
|
|
|
|
|
|
|
for (j = 1; j < pre_points_per_block; j++, var++) {
|
|
|
|
/*
|
|
|
|
* calculate odd multiples of the current base point
|
|
|
|
*/
|
|
|
|
if (!EC_POINT_add(group, *var, tmp_point, *(var - 1), ctx))
|
|
|
|
goto err;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (i < numblocks - 1) {
|
|
|
|
/*
|
|
|
|
* get the next base (multiply current one by 2^blocksize)
|
|
|
|
*/
|
|
|
|
size_t k;
|
|
|
|
|
|
|
|
if (blocksize <= 2) {
|
|
|
|
ECerr(EC_F_EC_WNAF_PRECOMPUTE_MULT, ERR_R_INTERNAL_ERROR);
|
|
|
|
goto err;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!EC_POINT_dbl(group, base, tmp_point, ctx))
|
|
|
|
goto err;
|
|
|
|
for (k = 2; k < blocksize; k++) {
|
|
|
|
if (!EC_POINT_dbl(group, base, base, ctx))
|
|
|
|
goto err;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!EC_POINTs_make_affine(group, num, points, ctx))
|
|
|
|
goto err;
|
|
|
|
|
|
|
|
pre_comp->group = group;
|
|
|
|
pre_comp->blocksize = blocksize;
|
|
|
|
pre_comp->numblocks = numblocks;
|
|
|
|
pre_comp->w = w;
|
|
|
|
pre_comp->points = points;
|
|
|
|
points = NULL;
|
|
|
|
pre_comp->num = num;
|
2016-01-05 18:06:03 +00:00
|
|
|
SETPRECOMP(group, ec, pre_comp);
|
2015-01-22 03:40:55 +00:00
|
|
|
pre_comp = NULL;
|
|
|
|
ret = 1;
|
2016-01-05 18:06:03 +00:00
|
|
|
|
2001-03-11 12:27:24 +00:00
|
|
|
err:
|
2015-01-22 03:40:55 +00:00
|
|
|
if (ctx != NULL)
|
|
|
|
BN_CTX_end(ctx);
|
2015-05-01 01:37:06 +00:00
|
|
|
BN_CTX_free(new_ctx);
|
2016-01-05 18:06:03 +00:00
|
|
|
EC_ec_pre_comp_free(pre_comp);
|
2015-01-22 03:40:55 +00:00
|
|
|
if (points) {
|
|
|
|
EC_POINT **p;
|
|
|
|
|
|
|
|
for (p = points; *p != NULL; p++)
|
|
|
|
EC_POINT_free(*p);
|
|
|
|
OPENSSL_free(points);
|
|
|
|
}
|
2015-03-25 22:35:24 +00:00
|
|
|
EC_POINT_free(tmp_point);
|
|
|
|
EC_POINT_free(base);
|
2015-01-22 03:40:55 +00:00
|
|
|
return ret;
|
|
|
|
}
|
2002-08-02 13:42:24 +00:00
|
|
|
|
2003-02-06 19:25:12 +00:00
|
|
|
int ec_wNAF_have_precompute_mult(const EC_GROUP *group)
|
2015-01-22 03:40:55 +00:00
|
|
|
{
|
2016-01-05 18:06:03 +00:00
|
|
|
return HAVEPRECOMP(group, ec);
|
2015-01-22 03:40:55 +00:00
|
|
|
}
|