2002-10-28 21:23:24 +08:00
|
|
|
/*
|
2021-03-11 21:27:36 +08:00
|
|
|
* Copyright 2001-2021 The OpenSSL Project Authors. All Rights Reserved.
|
2017-06-15 22:16:46 +08:00
|
|
|
* Copyright (c) 2002, Oracle and/or its affiliates. All rights reserved
|
2001-03-06 04:31:49 +08:00
|
|
|
*
|
2018-12-06 20:38:06 +08:00
|
|
|
* Licensed under the Apache License 2.0 (the "License"). You may not use
|
2016-05-18 02:51:04 +08:00
|
|
|
* this file except in compliance with the License. You can obtain a copy
|
|
|
|
* in the file LICENSE in the source distribution or at
|
|
|
|
* https://www.openssl.org/source/license.html
|
2001-03-06 04:31:49 +08:00
|
|
|
*/
|
2016-05-18 02:51:04 +08:00
|
|
|
|
2020-01-28 13:14:18 +08:00
|
|
|
/*
|
|
|
|
* ECDSA low level APIs are deprecated for public use, but still ok for
|
|
|
|
* internal use.
|
|
|
|
*/
|
|
|
|
#include "internal/deprecated.h"
|
|
|
|
|
2005-04-12 04:59:58 +08:00
|
|
|
#include <limits.h>
|
|
|
|
|
2002-10-28 21:23:24 +08:00
|
|
|
#include <openssl/err.h>
|
|
|
|
#include <openssl/obj_mac.h>
|
2019-09-28 06:45:40 +08:00
|
|
|
#include "ec_local.h"
|
2001-03-07 09:17:05 +08:00
|
|
|
|
|
|
|
const EC_METHOD *EC_GFp_nist_method(void)
|
|
|
|
{
|
2001-03-07 17:29:45 +08:00
|
|
|
static const EC_METHOD ret = {
|
2011-02-15 00:52:12 +08:00
|
|
|
EC_FLAGS_DEFAULT_OCT,
|
2002-10-28 21:23:24 +08:00
|
|
|
NID_X9_62_prime_field,
|
2021-02-18 18:27:26 +08:00
|
|
|
ossl_ec_GFp_simple_group_init,
|
|
|
|
ossl_ec_GFp_simple_group_finish,
|
|
|
|
ossl_ec_GFp_simple_group_clear_finish,
|
|
|
|
ossl_ec_GFp_nist_group_copy,
|
|
|
|
ossl_ec_GFp_nist_group_set_curve,
|
|
|
|
ossl_ec_GFp_simple_group_get_curve,
|
|
|
|
ossl_ec_GFp_simple_group_get_degree,
|
|
|
|
ossl_ec_group_simple_order_bits,
|
|
|
|
ossl_ec_GFp_simple_group_check_discriminant,
|
|
|
|
ossl_ec_GFp_simple_point_init,
|
|
|
|
ossl_ec_GFp_simple_point_finish,
|
|
|
|
ossl_ec_GFp_simple_point_clear_finish,
|
|
|
|
ossl_ec_GFp_simple_point_copy,
|
|
|
|
ossl_ec_GFp_simple_point_set_to_infinity,
|
|
|
|
ossl_ec_GFp_simple_point_set_affine_coordinates,
|
|
|
|
ossl_ec_GFp_simple_point_get_affine_coordinates,
|
2011-02-15 00:52:12 +08:00
|
|
|
0, 0, 0,
|
2021-02-18 18:27:26 +08:00
|
|
|
ossl_ec_GFp_simple_add,
|
|
|
|
ossl_ec_GFp_simple_dbl,
|
|
|
|
ossl_ec_GFp_simple_invert,
|
|
|
|
ossl_ec_GFp_simple_is_at_infinity,
|
|
|
|
ossl_ec_GFp_simple_is_on_curve,
|
|
|
|
ossl_ec_GFp_simple_cmp,
|
|
|
|
ossl_ec_GFp_simple_make_affine,
|
|
|
|
ossl_ec_GFp_simple_points_make_affine,
|
2003-02-07 03:25:12 +08:00
|
|
|
0 /* mul */ ,
|
|
|
|
0 /* precompute_mult */ ,
|
|
|
|
0 /* have_precompute_mult */ ,
|
2021-02-18 18:27:26 +08:00
|
|
|
ossl_ec_GFp_nist_field_mul,
|
|
|
|
ossl_ec_GFp_nist_field_sqr,
|
2002-08-02 21:42:24 +08:00
|
|
|
0 /* field_div */ ,
|
2021-02-18 18:27:26 +08:00
|
|
|
ossl_ec_GFp_simple_field_inv,
|
2001-03-09 04:55:16 +08:00
|
|
|
0 /* field_encode */ ,
|
2001-03-11 07:18:35 +08:00
|
|
|
0 /* field_decode */ ,
|
2016-02-29 01:48:48 +08:00
|
|
|
0, /* field_set_to_one */
|
2021-02-18 18:27:26 +08:00
|
|
|
ossl_ec_key_simple_priv2oct,
|
|
|
|
ossl_ec_key_simple_oct2priv,
|
2016-02-29 01:48:48 +08:00
|
|
|
0, /* set private */
|
2021-02-18 18:27:26 +08:00
|
|
|
ossl_ec_key_simple_generate_key,
|
|
|
|
ossl_ec_key_simple_check_key,
|
|
|
|
ossl_ec_key_simple_generate_public_key,
|
2016-02-29 01:48:48 +08:00
|
|
|
0, /* keycopy */
|
|
|
|
0, /* keyfinish */
|
2021-02-18 18:27:26 +08:00
|
|
|
ossl_ecdh_simple_compute_key,
|
|
|
|
ossl_ecdsa_simple_sign_setup,
|
|
|
|
ossl_ecdsa_simple_sign_sig,
|
|
|
|
ossl_ecdsa_simple_verify_sig,
|
Implement coordinate blinding for EC_POINT
This commit implements coordinate blinding, i.e., it randomizes the
representative of an elliptic curve point in its equivalence class, for
prime curves implemented through EC_GFp_simple_method,
EC_GFp_mont_method, and EC_GFp_nist_method.
This commit is derived from the patch
https://marc.info/?l=openssl-dev&m=131194808413635 by Billy Brumley.
Coordinate blinding is a generally useful side-channel countermeasure
and is (mostly) free. The function itself takes a few field
multiplicationss, but is usually only necessary at the beginning of a
scalar multiplication (as implemented in the patch). When used this way,
it makes the values that variables take (i.e., field elements in an
algorithm state) unpredictable.
For instance, this mitigates chosen EC point side-channel attacks for
settings such as ECDH and EC private key decryption, for the
aforementioned curves.
For EC_METHODs using different coordinate representations this commit
does nothing, but the corresponding coordinate blinding function can be
easily added in the future to extend these changes to such curves.
Co-authored-by: Nicola Tuveri <nic.tuv@gmail.com>
Co-authored-by: Billy Brumley <bbrumley@gmail.com>
Reviewed-by: Andy Polyakov <appro@openssl.org>
Reviewed-by: Matt Caswell <matt@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/6501)
2018-06-16 22:07:40 +08:00
|
|
|
0, /* field_inverse_mod_ord */
|
2021-02-18 18:27:26 +08:00
|
|
|
ossl_ec_GFp_simple_blind_coordinates,
|
|
|
|
ossl_ec_GFp_simple_ladder_pre,
|
|
|
|
ossl_ec_GFp_simple_ladder_step,
|
|
|
|
ossl_ec_GFp_simple_ladder_post
|
2001-03-11 07:18:35 +08:00
|
|
|
};
|
2015-01-22 11:40:55 +08:00
|
|
|
|
2001-03-07 09:17:05 +08:00
|
|
|
return &ret;
|
|
|
|
}
|
2001-03-08 03:54:35 +08:00
|
|
|
|
2021-02-18 18:27:26 +08:00
|
|
|
int ossl_ec_GFp_nist_group_copy(EC_GROUP *dest, const EC_GROUP *src)
|
2003-02-09 03:51:37 +08:00
|
|
|
{
|
|
|
|
dest->field_mod_func = src->field_mod_func;
|
|
|
|
|
2021-02-18 18:27:26 +08:00
|
|
|
return ossl_ec_GFp_simple_group_copy(dest, src);
|
2003-02-09 03:51:37 +08:00
|
|
|
}
|
2002-10-28 21:23:24 +08:00
|
|
|
|
2021-02-18 18:27:26 +08:00
|
|
|
int ossl_ec_GFp_nist_group_set_curve(EC_GROUP *group, const BIGNUM *p,
|
|
|
|
const BIGNUM *a, const BIGNUM *b,
|
|
|
|
BN_CTX *ctx)
|
2002-10-28 21:23:24 +08:00
|
|
|
{
|
|
|
|
int ret = 0;
|
|
|
|
BN_CTX *new_ctx = NULL;
|
2015-01-22 11:40:55 +08:00
|
|
|
|
2002-10-28 21:23:24 +08:00
|
|
|
if (ctx == NULL)
|
2019-07-04 00:30:03 +08:00
|
|
|
if ((ctx = new_ctx = BN_CTX_new_ex(group->libctx)) == NULL)
|
2002-10-28 21:23:24 +08:00
|
|
|
return 0;
|
2015-01-22 11:40:55 +08:00
|
|
|
|
2002-10-28 21:23:24 +08:00
|
|
|
BN_CTX_start(ctx);
|
2015-01-22 11:40:55 +08:00
|
|
|
|
2002-10-28 21:23:24 +08:00
|
|
|
if (BN_ucmp(BN_get0_nist_prime_192(), p) == 0)
|
2002-10-28 22:02:19 +08:00
|
|
|
group->field_mod_func = BN_nist_mod_192;
|
2002-10-28 21:23:24 +08:00
|
|
|
else if (BN_ucmp(BN_get0_nist_prime_224(), p) == 0)
|
2002-10-28 22:02:19 +08:00
|
|
|
group->field_mod_func = BN_nist_mod_224;
|
2002-10-28 21:23:24 +08:00
|
|
|
else if (BN_ucmp(BN_get0_nist_prime_256(), p) == 0)
|
2002-10-28 22:02:19 +08:00
|
|
|
group->field_mod_func = BN_nist_mod_256;
|
2002-10-28 21:23:24 +08:00
|
|
|
else if (BN_ucmp(BN_get0_nist_prime_384(), p) == 0)
|
2002-10-28 22:02:19 +08:00
|
|
|
group->field_mod_func = BN_nist_mod_384;
|
2002-10-28 21:23:24 +08:00
|
|
|
else if (BN_ucmp(BN_get0_nist_prime_521(), p) == 0)
|
2002-10-28 22:02:19 +08:00
|
|
|
group->field_mod_func = BN_nist_mod_521;
|
2002-10-28 21:23:24 +08:00
|
|
|
else {
|
2020-11-04 19:23:19 +08:00
|
|
|
ERR_raise(ERR_LIB_EC, EC_R_NOT_A_NIST_PRIME);
|
2002-10-28 21:23:24 +08:00
|
|
|
goto err;
|
|
|
|
}
|
2015-01-22 11:40:55 +08:00
|
|
|
|
2021-02-18 18:27:26 +08:00
|
|
|
ret = ossl_ec_GFp_simple_group_set_curve(group, p, a, b, ctx);
|
2002-10-28 21:23:24 +08:00
|
|
|
|
|
|
|
err:
|
|
|
|
BN_CTX_end(ctx);
|
2015-05-01 09:37:06 +08:00
|
|
|
BN_CTX_free(new_ctx);
|
2002-10-28 21:23:24 +08:00
|
|
|
return ret;
|
|
|
|
}
|
2002-11-18 22:37:35 +08:00
|
|
|
|
2021-02-18 18:27:26 +08:00
|
|
|
int ossl_ec_GFp_nist_field_mul(const EC_GROUP *group, BIGNUM *r, const BIGNUM *a,
|
|
|
|
const BIGNUM *b, BN_CTX *ctx)
|
2002-10-28 21:23:24 +08:00
|
|
|
{
|
|
|
|
int ret = 0;
|
|
|
|
BN_CTX *ctx_new = NULL;
|
2015-01-22 11:40:55 +08:00
|
|
|
|
2002-10-28 21:23:24 +08:00
|
|
|
if (!group || !r || !a || !b) {
|
2020-11-04 19:23:19 +08:00
|
|
|
ERR_raise(ERR_LIB_EC, ERR_R_PASSED_NULL_PARAMETER);
|
2002-10-28 21:23:24 +08:00
|
|
|
goto err;
|
|
|
|
}
|
|
|
|
if (!ctx)
|
2019-07-04 00:30:03 +08:00
|
|
|
if ((ctx_new = ctx = BN_CTX_new_ex(group->libctx)) == NULL)
|
2002-10-28 21:23:24 +08:00
|
|
|
goto err;
|
2015-01-22 11:40:55 +08:00
|
|
|
|
2002-10-28 21:23:24 +08:00
|
|
|
if (!BN_mul(r, a, b, ctx))
|
|
|
|
goto err;
|
2014-10-29 06:58:56 +08:00
|
|
|
if (!group->field_mod_func(r, r, group->field, ctx))
|
2002-10-28 21:23:24 +08:00
|
|
|
goto err;
|
2015-01-22 11:40:55 +08:00
|
|
|
|
2002-10-28 21:23:24 +08:00
|
|
|
ret = 1;
|
|
|
|
err:
|
2015-05-01 09:37:06 +08:00
|
|
|
BN_CTX_free(ctx_new);
|
2002-10-28 21:23:24 +08:00
|
|
|
return ret;
|
|
|
|
}
|
2002-11-18 22:37:35 +08:00
|
|
|
|
2021-02-18 18:27:26 +08:00
|
|
|
int ossl_ec_GFp_nist_field_sqr(const EC_GROUP *group, BIGNUM *r, const BIGNUM *a,
|
|
|
|
BN_CTX *ctx)
|
2002-10-28 21:23:24 +08:00
|
|
|
{
|
|
|
|
int ret = 0;
|
|
|
|
BN_CTX *ctx_new = NULL;
|
2015-01-22 11:40:55 +08:00
|
|
|
|
2002-10-28 21:23:24 +08:00
|
|
|
if (!group || !r || !a) {
|
2020-11-04 19:23:19 +08:00
|
|
|
ERR_raise(ERR_LIB_EC, EC_R_PASSED_NULL_PARAMETER);
|
2002-10-28 21:23:24 +08:00
|
|
|
goto err;
|
|
|
|
}
|
|
|
|
if (!ctx)
|
2019-07-04 00:30:03 +08:00
|
|
|
if ((ctx_new = ctx = BN_CTX_new_ex(group->libctx)) == NULL)
|
2002-10-28 21:23:24 +08:00
|
|
|
goto err;
|
2015-01-22 11:40:55 +08:00
|
|
|
|
2002-10-28 21:23:24 +08:00
|
|
|
if (!BN_sqr(r, a, ctx))
|
|
|
|
goto err;
|
2014-10-29 06:58:56 +08:00
|
|
|
if (!group->field_mod_func(r, r, group->field, ctx))
|
2002-10-28 21:23:24 +08:00
|
|
|
goto err;
|
2015-01-22 11:40:55 +08:00
|
|
|
|
2002-10-28 21:23:24 +08:00
|
|
|
ret = 1;
|
|
|
|
err:
|
2015-05-01 09:37:06 +08:00
|
|
|
BN_CTX_free(ctx_new);
|
2002-10-28 21:23:24 +08:00
|
|
|
return ret;
|
|
|
|
}
|