diff options
Diffstat (limited to '')
29 files changed, 0 insertions, 12626 deletions
diff --git a/src/lib/libcrypto/ec/ec.h b/src/lib/libcrypto/ec/ec.h deleted file mode 100644 index 8bc2a235b1..0000000000 --- a/src/lib/libcrypto/ec/ec.h +++ /dev/null | |||
@@ -1,526 +0,0 @@ | |||
1 | /* crypto/ec/ec.h */ | ||
2 | /* | ||
3 | * Originally written by Bodo Moeller for the OpenSSL project. | ||
4 | */ | ||
5 | /* ==================================================================== | ||
6 | * Copyright (c) 1998-2003 The OpenSSL Project. All rights reserved. | ||
7 | * | ||
8 | * Redistribution and use in source and binary forms, with or without | ||
9 | * modification, are permitted provided that the following conditions | ||
10 | * are met: | ||
11 | * | ||
12 | * 1. Redistributions of source code must retain the above copyright | ||
13 | * notice, this list of conditions and the following disclaimer. | ||
14 | * | ||
15 | * 2. Redistributions in binary form must reproduce the above copyright | ||
16 | * notice, this list of conditions and the following disclaimer in | ||
17 | * the documentation and/or other materials provided with the | ||
18 | * distribution. | ||
19 | * | ||
20 | * 3. All advertising materials mentioning features or use of this | ||
21 | * software must display the following acknowledgment: | ||
22 | * "This product includes software developed by the OpenSSL Project | ||
23 | * for use in the OpenSSL Toolkit. (http://www.openssl.org/)" | ||
24 | * | ||
25 | * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to | ||
26 | * endorse or promote products derived from this software without | ||
27 | * prior written permission. For written permission, please contact | ||
28 | * openssl-core@openssl.org. | ||
29 | * | ||
30 | * 5. Products derived from this software may not be called "OpenSSL" | ||
31 | * nor may "OpenSSL" appear in their names without prior written | ||
32 | * permission of the OpenSSL Project. | ||
33 | * | ||
34 | * 6. Redistributions of any form whatsoever must retain the following | ||
35 | * acknowledgment: | ||
36 | * "This product includes software developed by the OpenSSL Project | ||
37 | * for use in the OpenSSL Toolkit (http://www.openssl.org/)" | ||
38 | * | ||
39 | * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY | ||
40 | * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | ||
41 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR | ||
42 | * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR | ||
43 | * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, | ||
44 | * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT | ||
45 | * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; | ||
46 | * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | ||
47 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, | ||
48 | * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) | ||
49 | * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | ||
50 | * OF THE POSSIBILITY OF SUCH DAMAGE. | ||
51 | * ==================================================================== | ||
52 | * | ||
53 | * This product includes cryptographic software written by Eric Young | ||
54 | * (eay@cryptsoft.com). This product includes software written by Tim | ||
55 | * Hudson (tjh@cryptsoft.com). | ||
56 | * | ||
57 | */ | ||
58 | /* ==================================================================== | ||
59 | * Copyright 2002 Sun Microsystems, Inc. ALL RIGHTS RESERVED. | ||
60 | * | ||
61 | * Portions of the attached software ("Contribution") are developed by | ||
62 | * SUN MICROSYSTEMS, INC., and are contributed to the OpenSSL project. | ||
63 | * | ||
64 | * The Contribution is licensed pursuant to the OpenSSL open source | ||
65 | * license provided above. | ||
66 | * | ||
67 | * The elliptic curve binary polynomial software is originally written by | ||
68 | * Sheueling Chang Shantz and Douglas Stebila of Sun Microsystems Laboratories. | ||
69 | * | ||
70 | */ | ||
71 | |||
72 | #ifndef HEADER_EC_H | ||
73 | #define HEADER_EC_H | ||
74 | |||
75 | #include <openssl/opensslconf.h> | ||
76 | |||
77 | #ifdef OPENSSL_NO_EC | ||
78 | #error EC is disabled. | ||
79 | #endif | ||
80 | |||
81 | #include <openssl/asn1.h> | ||
82 | #include <openssl/symhacks.h> | ||
83 | #ifndef OPENSSL_NO_DEPRECATED | ||
84 | #include <openssl/bn.h> | ||
85 | #endif | ||
86 | |||
87 | #ifdef __cplusplus | ||
88 | extern "C" { | ||
89 | #elif defined(__SUNPRO_C) | ||
90 | # if __SUNPRO_C >= 0x520 | ||
91 | # pragma error_messages (off,E_ARRAY_OF_INCOMPLETE_NONAME,E_ARRAY_OF_INCOMPLETE) | ||
92 | # endif | ||
93 | #endif | ||
94 | |||
95 | |||
96 | #ifndef OPENSSL_ECC_MAX_FIELD_BITS | ||
97 | # define OPENSSL_ECC_MAX_FIELD_BITS 661 | ||
98 | #endif | ||
99 | |||
100 | typedef enum { | ||
101 | /* values as defined in X9.62 (ECDSA) and elsewhere */ | ||
102 | POINT_CONVERSION_COMPRESSED = 2, | ||
103 | POINT_CONVERSION_UNCOMPRESSED = 4, | ||
104 | POINT_CONVERSION_HYBRID = 6 | ||
105 | } point_conversion_form_t; | ||
106 | |||
107 | |||
108 | typedef struct ec_method_st EC_METHOD; | ||
109 | |||
110 | typedef struct ec_group_st | ||
111 | /* | ||
112 | EC_METHOD *meth; | ||
113 | -- field definition | ||
114 | -- curve coefficients | ||
115 | -- optional generator with associated information (order, cofactor) | ||
116 | -- optional extra data (precomputed table for fast computation of multiples of generator) | ||
117 | -- ASN1 stuff | ||
118 | */ | ||
119 | EC_GROUP; | ||
120 | |||
121 | typedef struct ec_point_st EC_POINT; | ||
122 | |||
123 | |||
124 | /* EC_METHODs for curves over GF(p). | ||
125 | * EC_GFp_simple_method provides the basis for the optimized methods. | ||
126 | */ | ||
127 | const EC_METHOD *EC_GFp_simple_method(void); | ||
128 | const EC_METHOD *EC_GFp_mont_method(void); | ||
129 | const EC_METHOD *EC_GFp_nist_method(void); | ||
130 | |||
131 | /* EC_METHOD for curves over GF(2^m). | ||
132 | */ | ||
133 | const EC_METHOD *EC_GF2m_simple_method(void); | ||
134 | |||
135 | |||
136 | EC_GROUP *EC_GROUP_new(const EC_METHOD *); | ||
137 | void EC_GROUP_free(EC_GROUP *); | ||
138 | void EC_GROUP_clear_free(EC_GROUP *); | ||
139 | int EC_GROUP_copy(EC_GROUP *, const EC_GROUP *); | ||
140 | EC_GROUP *EC_GROUP_dup(const EC_GROUP *); | ||
141 | |||
142 | const EC_METHOD *EC_GROUP_method_of(const EC_GROUP *); | ||
143 | int EC_METHOD_get_field_type(const EC_METHOD *); | ||
144 | |||
145 | int EC_GROUP_set_generator(EC_GROUP *, const EC_POINT *generator, const BIGNUM *order, const BIGNUM *cofactor); | ||
146 | const EC_POINT *EC_GROUP_get0_generator(const EC_GROUP *); | ||
147 | int EC_GROUP_get_order(const EC_GROUP *, BIGNUM *order, BN_CTX *); | ||
148 | int EC_GROUP_get_cofactor(const EC_GROUP *, BIGNUM *cofactor, BN_CTX *); | ||
149 | |||
150 | void EC_GROUP_set_curve_name(EC_GROUP *, int nid); | ||
151 | int EC_GROUP_get_curve_name(const EC_GROUP *); | ||
152 | |||
153 | void EC_GROUP_set_asn1_flag(EC_GROUP *, int flag); | ||
154 | int EC_GROUP_get_asn1_flag(const EC_GROUP *); | ||
155 | |||
156 | void EC_GROUP_set_point_conversion_form(EC_GROUP *, point_conversion_form_t); | ||
157 | point_conversion_form_t EC_GROUP_get_point_conversion_form(const EC_GROUP *); | ||
158 | |||
159 | unsigned char *EC_GROUP_get0_seed(const EC_GROUP *); | ||
160 | size_t EC_GROUP_get_seed_len(const EC_GROUP *); | ||
161 | size_t EC_GROUP_set_seed(EC_GROUP *, const unsigned char *, size_t len); | ||
162 | |||
163 | int EC_GROUP_set_curve_GFp(EC_GROUP *, const BIGNUM *p, const BIGNUM *a, const BIGNUM *b, BN_CTX *); | ||
164 | int EC_GROUP_get_curve_GFp(const EC_GROUP *, BIGNUM *p, BIGNUM *a, BIGNUM *b, BN_CTX *); | ||
165 | int EC_GROUP_set_curve_GF2m(EC_GROUP *, const BIGNUM *p, const BIGNUM *a, const BIGNUM *b, BN_CTX *); | ||
166 | int EC_GROUP_get_curve_GF2m(const EC_GROUP *, BIGNUM *p, BIGNUM *a, BIGNUM *b, BN_CTX *); | ||
167 | |||
168 | /* returns the number of bits needed to represent a field element */ | ||
169 | int EC_GROUP_get_degree(const EC_GROUP *); | ||
170 | |||
171 | /* EC_GROUP_check() returns 1 if 'group' defines a valid group, 0 otherwise */ | ||
172 | int EC_GROUP_check(const EC_GROUP *group, BN_CTX *ctx); | ||
173 | /* EC_GROUP_check_discriminant() returns 1 if the discriminant of the | ||
174 | * elliptic curve is not zero, 0 otherwise */ | ||
175 | int EC_GROUP_check_discriminant(const EC_GROUP *, BN_CTX *); | ||
176 | |||
177 | /* EC_GROUP_cmp() returns 0 if both groups are equal and 1 otherwise */ | ||
178 | int EC_GROUP_cmp(const EC_GROUP *, const EC_GROUP *, BN_CTX *); | ||
179 | |||
180 | /* EC_GROUP_new_GF*() calls EC_GROUP_new() and EC_GROUP_set_GF*() | ||
181 | * after choosing an appropriate EC_METHOD */ | ||
182 | EC_GROUP *EC_GROUP_new_curve_GFp(const BIGNUM *p, const BIGNUM *a, const BIGNUM *b, BN_CTX *); | ||
183 | EC_GROUP *EC_GROUP_new_curve_GF2m(const BIGNUM *p, const BIGNUM *a, const BIGNUM *b, BN_CTX *); | ||
184 | |||
185 | /* EC_GROUP_new_by_curve_name() creates a EC_GROUP structure | ||
186 | * specified by a curve name (in form of a NID) */ | ||
187 | EC_GROUP *EC_GROUP_new_by_curve_name(int nid); | ||
188 | /* handling of internal curves */ | ||
189 | typedef struct { | ||
190 | int nid; | ||
191 | const char *comment; | ||
192 | } EC_builtin_curve; | ||
193 | /* EC_builtin_curves(EC_builtin_curve *r, size_t size) returns number | ||
194 | * of all available curves or zero if a error occurred. | ||
195 | * In case r ist not zero nitems EC_builtin_curve structures | ||
196 | * are filled with the data of the first nitems internal groups */ | ||
197 | size_t EC_get_builtin_curves(EC_builtin_curve *r, size_t nitems); | ||
198 | |||
199 | |||
200 | /* EC_POINT functions */ | ||
201 | |||
202 | EC_POINT *EC_POINT_new(const EC_GROUP *); | ||
203 | void EC_POINT_free(EC_POINT *); | ||
204 | void EC_POINT_clear_free(EC_POINT *); | ||
205 | int EC_POINT_copy(EC_POINT *, const EC_POINT *); | ||
206 | EC_POINT *EC_POINT_dup(const EC_POINT *, const EC_GROUP *); | ||
207 | |||
208 | const EC_METHOD *EC_POINT_method_of(const EC_POINT *); | ||
209 | |||
210 | int EC_POINT_set_to_infinity(const EC_GROUP *, EC_POINT *); | ||
211 | int EC_POINT_set_Jprojective_coordinates_GFp(const EC_GROUP *, EC_POINT *, | ||
212 | const BIGNUM *x, const BIGNUM *y, const BIGNUM *z, BN_CTX *); | ||
213 | int EC_POINT_get_Jprojective_coordinates_GFp(const EC_GROUP *, const EC_POINT *, | ||
214 | BIGNUM *x, BIGNUM *y, BIGNUM *z, BN_CTX *); | ||
215 | int EC_POINT_set_affine_coordinates_GFp(const EC_GROUP *, EC_POINT *, | ||
216 | const BIGNUM *x, const BIGNUM *y, BN_CTX *); | ||
217 | int EC_POINT_get_affine_coordinates_GFp(const EC_GROUP *, const EC_POINT *, | ||
218 | BIGNUM *x, BIGNUM *y, BN_CTX *); | ||
219 | int EC_POINT_set_compressed_coordinates_GFp(const EC_GROUP *, EC_POINT *, | ||
220 | const BIGNUM *x, int y_bit, BN_CTX *); | ||
221 | |||
222 | int EC_POINT_set_affine_coordinates_GF2m(const EC_GROUP *, EC_POINT *, | ||
223 | const BIGNUM *x, const BIGNUM *y, BN_CTX *); | ||
224 | int EC_POINT_get_affine_coordinates_GF2m(const EC_GROUP *, const EC_POINT *, | ||
225 | BIGNUM *x, BIGNUM *y, BN_CTX *); | ||
226 | int EC_POINT_set_compressed_coordinates_GF2m(const EC_GROUP *, EC_POINT *, | ||
227 | const BIGNUM *x, int y_bit, BN_CTX *); | ||
228 | |||
229 | size_t EC_POINT_point2oct(const EC_GROUP *, const EC_POINT *, point_conversion_form_t form, | ||
230 | unsigned char *buf, size_t len, BN_CTX *); | ||
231 | int EC_POINT_oct2point(const EC_GROUP *, EC_POINT *, | ||
232 | const unsigned char *buf, size_t len, BN_CTX *); | ||
233 | |||
234 | /* other interfaces to point2oct/oct2point: */ | ||
235 | BIGNUM *EC_POINT_point2bn(const EC_GROUP *, const EC_POINT *, | ||
236 | point_conversion_form_t form, BIGNUM *, BN_CTX *); | ||
237 | EC_POINT *EC_POINT_bn2point(const EC_GROUP *, const BIGNUM *, | ||
238 | EC_POINT *, BN_CTX *); | ||
239 | char *EC_POINT_point2hex(const EC_GROUP *, const EC_POINT *, | ||
240 | point_conversion_form_t form, BN_CTX *); | ||
241 | EC_POINT *EC_POINT_hex2point(const EC_GROUP *, const char *, | ||
242 | EC_POINT *, BN_CTX *); | ||
243 | |||
244 | int EC_POINT_add(const EC_GROUP *, EC_POINT *r, const EC_POINT *a, const EC_POINT *b, BN_CTX *); | ||
245 | int EC_POINT_dbl(const EC_GROUP *, EC_POINT *r, const EC_POINT *a, BN_CTX *); | ||
246 | int EC_POINT_invert(const EC_GROUP *, EC_POINT *, BN_CTX *); | ||
247 | |||
248 | int EC_POINT_is_at_infinity(const EC_GROUP *, const EC_POINT *); | ||
249 | int EC_POINT_is_on_curve(const EC_GROUP *, const EC_POINT *, BN_CTX *); | ||
250 | int EC_POINT_cmp(const EC_GROUP *, const EC_POINT *a, const EC_POINT *b, BN_CTX *); | ||
251 | |||
252 | int EC_POINT_make_affine(const EC_GROUP *, EC_POINT *, BN_CTX *); | ||
253 | int EC_POINTs_make_affine(const EC_GROUP *, size_t num, EC_POINT *[], BN_CTX *); | ||
254 | |||
255 | |||
256 | int EC_POINTs_mul(const EC_GROUP *, EC_POINT *r, const BIGNUM *, size_t num, const EC_POINT *[], const BIGNUM *[], BN_CTX *); | ||
257 | int EC_POINT_mul(const EC_GROUP *, EC_POINT *r, const BIGNUM *, const EC_POINT *, const BIGNUM *, BN_CTX *); | ||
258 | |||
259 | /* EC_GROUP_precompute_mult() stores multiples of generator for faster point multiplication */ | ||
260 | int EC_GROUP_precompute_mult(EC_GROUP *, BN_CTX *); | ||
261 | /* EC_GROUP_have_precompute_mult() reports whether such precomputation has been done */ | ||
262 | int EC_GROUP_have_precompute_mult(const EC_GROUP *); | ||
263 | |||
264 | |||
265 | |||
266 | /* ASN1 stuff */ | ||
267 | |||
268 | /* EC_GROUP_get_basis_type() returns the NID of the basis type | ||
269 | * used to represent the field elements */ | ||
270 | int EC_GROUP_get_basis_type(const EC_GROUP *); | ||
271 | int EC_GROUP_get_trinomial_basis(const EC_GROUP *, unsigned int *k); | ||
272 | int EC_GROUP_get_pentanomial_basis(const EC_GROUP *, unsigned int *k1, | ||
273 | unsigned int *k2, unsigned int *k3); | ||
274 | |||
275 | #define OPENSSL_EC_NAMED_CURVE 0x001 | ||
276 | |||
277 | typedef struct ecpk_parameters_st ECPKPARAMETERS; | ||
278 | |||
279 | EC_GROUP *d2i_ECPKParameters(EC_GROUP **, const unsigned char **in, long len); | ||
280 | int i2d_ECPKParameters(const EC_GROUP *, unsigned char **out); | ||
281 | |||
282 | #define d2i_ECPKParameters_bio(bp,x) ASN1_d2i_bio_of(EC_GROUP,NULL,d2i_ECPKParameters,bp,x) | ||
283 | #define i2d_ECPKParameters_bio(bp,x) ASN1_i2d_bio_of_const(EC_GROUP,i2d_ECPKParameters,bp,x) | ||
284 | #define d2i_ECPKParameters_fp(fp,x) (EC_GROUP *)ASN1_d2i_fp(NULL, \ | ||
285 | (char *(*)())d2i_ECPKParameters,(fp),(unsigned char **)(x)) | ||
286 | #define i2d_ECPKParameters_fp(fp,x) ASN1_i2d_fp(i2d_ECPKParameters,(fp), \ | ||
287 | (unsigned char *)(x)) | ||
288 | |||
289 | #ifndef OPENSSL_NO_BIO | ||
290 | int ECPKParameters_print(BIO *bp, const EC_GROUP *x, int off); | ||
291 | #endif | ||
292 | #ifndef OPENSSL_NO_FP_API | ||
293 | int ECPKParameters_print_fp(FILE *fp, const EC_GROUP *x, int off); | ||
294 | #endif | ||
295 | |||
296 | /* the EC_KEY stuff */ | ||
297 | typedef struct ec_key_st EC_KEY; | ||
298 | |||
299 | /* some values for the encoding_flag */ | ||
300 | #define EC_PKEY_NO_PARAMETERS 0x001 | ||
301 | #define EC_PKEY_NO_PUBKEY 0x002 | ||
302 | |||
303 | EC_KEY *EC_KEY_new(void); | ||
304 | EC_KEY *EC_KEY_new_by_curve_name(int nid); | ||
305 | void EC_KEY_free(EC_KEY *); | ||
306 | EC_KEY *EC_KEY_copy(EC_KEY *, const EC_KEY *); | ||
307 | EC_KEY *EC_KEY_dup(const EC_KEY *); | ||
308 | |||
309 | int EC_KEY_up_ref(EC_KEY *); | ||
310 | |||
311 | const EC_GROUP *EC_KEY_get0_group(const EC_KEY *); | ||
312 | int EC_KEY_set_group(EC_KEY *, const EC_GROUP *); | ||
313 | const BIGNUM *EC_KEY_get0_private_key(const EC_KEY *); | ||
314 | int EC_KEY_set_private_key(EC_KEY *, const BIGNUM *); | ||
315 | const EC_POINT *EC_KEY_get0_public_key(const EC_KEY *); | ||
316 | int EC_KEY_set_public_key(EC_KEY *, const EC_POINT *); | ||
317 | unsigned EC_KEY_get_enc_flags(const EC_KEY *); | ||
318 | void EC_KEY_set_enc_flags(EC_KEY *, unsigned int); | ||
319 | point_conversion_form_t EC_KEY_get_conv_form(const EC_KEY *); | ||
320 | void EC_KEY_set_conv_form(EC_KEY *, point_conversion_form_t); | ||
321 | /* functions to set/get method specific data */ | ||
322 | void *EC_KEY_get_key_method_data(EC_KEY *, | ||
323 | void *(*dup_func)(void *), void (*free_func)(void *), void (*clear_free_func)(void *)); | ||
324 | void EC_KEY_insert_key_method_data(EC_KEY *, void *data, | ||
325 | void *(*dup_func)(void *), void (*free_func)(void *), void (*clear_free_func)(void *)); | ||
326 | /* wrapper functions for the underlying EC_GROUP object */ | ||
327 | void EC_KEY_set_asn1_flag(EC_KEY *, int); | ||
328 | int EC_KEY_precompute_mult(EC_KEY *, BN_CTX *ctx); | ||
329 | |||
330 | /* EC_KEY_generate_key() creates a ec private (public) key */ | ||
331 | int EC_KEY_generate_key(EC_KEY *); | ||
332 | /* EC_KEY_check_key() */ | ||
333 | int EC_KEY_check_key(const EC_KEY *); | ||
334 | |||
335 | /* de- and encoding functions for SEC1 ECPrivateKey */ | ||
336 | EC_KEY *d2i_ECPrivateKey(EC_KEY **a, const unsigned char **in, long len); | ||
337 | int i2d_ECPrivateKey(EC_KEY *a, unsigned char **out); | ||
338 | /* de- and encoding functions for EC parameters */ | ||
339 | EC_KEY *d2i_ECParameters(EC_KEY **a, const unsigned char **in, long len); | ||
340 | int i2d_ECParameters(EC_KEY *a, unsigned char **out); | ||
341 | /* de- and encoding functions for EC public key | ||
342 | * (octet string, not DER -- hence 'o2i' and 'i2o') */ | ||
343 | EC_KEY *o2i_ECPublicKey(EC_KEY **a, const unsigned char **in, long len); | ||
344 | int i2o_ECPublicKey(EC_KEY *a, unsigned char **out); | ||
345 | |||
346 | #ifndef OPENSSL_NO_BIO | ||
347 | int ECParameters_print(BIO *bp, const EC_KEY *x); | ||
348 | int EC_KEY_print(BIO *bp, const EC_KEY *x, int off); | ||
349 | #endif | ||
350 | #ifndef OPENSSL_NO_FP_API | ||
351 | int ECParameters_print_fp(FILE *fp, const EC_KEY *x); | ||
352 | int EC_KEY_print_fp(FILE *fp, const EC_KEY *x, int off); | ||
353 | #endif | ||
354 | |||
355 | #define ECParameters_dup(x) ASN1_dup_of(EC_KEY,i2d_ECParameters,d2i_ECParameters,x) | ||
356 | |||
357 | #ifndef __cplusplus | ||
358 | #if defined(__SUNPRO_C) | ||
359 | # if __SUNPRO_C >= 0x520 | ||
360 | # pragma error_messages (default,E_ARRAY_OF_INCOMPLETE_NONAME,E_ARRAY_OF_INCOMPLETE) | ||
361 | # endif | ||
362 | # endif | ||
363 | #endif | ||
364 | |||
365 | /* BEGIN ERROR CODES */ | ||
366 | /* The following lines are auto generated by the script mkerr.pl. Any changes | ||
367 | * made after this point may be overwritten when the script is next run. | ||
368 | */ | ||
369 | void ERR_load_EC_strings(void); | ||
370 | |||
371 | /* Error codes for the EC functions. */ | ||
372 | |||
373 | /* Function codes. */ | ||
374 | #define EC_F_COMPUTE_WNAF 143 | ||
375 | #define EC_F_D2I_ECPARAMETERS 144 | ||
376 | #define EC_F_D2I_ECPKPARAMETERS 145 | ||
377 | #define EC_F_D2I_ECPRIVATEKEY 146 | ||
378 | #define EC_F_ECPARAMETERS_PRINT 147 | ||
379 | #define EC_F_ECPARAMETERS_PRINT_FP 148 | ||
380 | #define EC_F_ECPKPARAMETERS_PRINT 149 | ||
381 | #define EC_F_ECPKPARAMETERS_PRINT_FP 150 | ||
382 | #define EC_F_ECP_NIST_MOD_192 203 | ||
383 | #define EC_F_ECP_NIST_MOD_224 204 | ||
384 | #define EC_F_ECP_NIST_MOD_256 205 | ||
385 | #define EC_F_ECP_NIST_MOD_521 206 | ||
386 | #define EC_F_EC_ASN1_GROUP2CURVE 153 | ||
387 | #define EC_F_EC_ASN1_GROUP2FIELDID 154 | ||
388 | #define EC_F_EC_ASN1_GROUP2PARAMETERS 155 | ||
389 | #define EC_F_EC_ASN1_GROUP2PKPARAMETERS 156 | ||
390 | #define EC_F_EC_ASN1_PARAMETERS2GROUP 157 | ||
391 | #define EC_F_EC_ASN1_PKPARAMETERS2GROUP 158 | ||
392 | #define EC_F_EC_EX_DATA_SET_DATA 211 | ||
393 | #define EC_F_EC_GF2M_MONTGOMERY_POINT_MULTIPLY 208 | ||
394 | #define EC_F_EC_GF2M_SIMPLE_GROUP_CHECK_DISCRIMINANT 159 | ||
395 | #define EC_F_EC_GF2M_SIMPLE_GROUP_SET_CURVE 195 | ||
396 | #define EC_F_EC_GF2M_SIMPLE_OCT2POINT 160 | ||
397 | #define EC_F_EC_GF2M_SIMPLE_POINT2OCT 161 | ||
398 | #define EC_F_EC_GF2M_SIMPLE_POINT_GET_AFFINE_COORDINATES 162 | ||
399 | #define EC_F_EC_GF2M_SIMPLE_POINT_SET_AFFINE_COORDINATES 163 | ||
400 | #define EC_F_EC_GF2M_SIMPLE_SET_COMPRESSED_COORDINATES 164 | ||
401 | #define EC_F_EC_GFP_MONT_FIELD_DECODE 133 | ||
402 | #define EC_F_EC_GFP_MONT_FIELD_ENCODE 134 | ||
403 | #define EC_F_EC_GFP_MONT_FIELD_MUL 131 | ||
404 | #define EC_F_EC_GFP_MONT_FIELD_SET_TO_ONE 209 | ||
405 | #define EC_F_EC_GFP_MONT_FIELD_SQR 132 | ||
406 | #define EC_F_EC_GFP_MONT_GROUP_SET_CURVE 189 | ||
407 | #define EC_F_EC_GFP_MONT_GROUP_SET_CURVE_GFP 135 | ||
408 | #define EC_F_EC_GFP_NIST_FIELD_MUL 200 | ||
409 | #define EC_F_EC_GFP_NIST_FIELD_SQR 201 | ||
410 | #define EC_F_EC_GFP_NIST_GROUP_SET_CURVE 202 | ||
411 | #define EC_F_EC_GFP_SIMPLE_GROUP_CHECK_DISCRIMINANT 165 | ||
412 | #define EC_F_EC_GFP_SIMPLE_GROUP_SET_CURVE 166 | ||
413 | #define EC_F_EC_GFP_SIMPLE_GROUP_SET_CURVE_GFP 100 | ||
414 | #define EC_F_EC_GFP_SIMPLE_GROUP_SET_GENERATOR 101 | ||
415 | #define EC_F_EC_GFP_SIMPLE_MAKE_AFFINE 102 | ||
416 | #define EC_F_EC_GFP_SIMPLE_OCT2POINT 103 | ||
417 | #define EC_F_EC_GFP_SIMPLE_POINT2OCT 104 | ||
418 | #define EC_F_EC_GFP_SIMPLE_POINTS_MAKE_AFFINE 137 | ||
419 | #define EC_F_EC_GFP_SIMPLE_POINT_GET_AFFINE_COORDINATES 167 | ||
420 | #define EC_F_EC_GFP_SIMPLE_POINT_GET_AFFINE_COORDINATES_GFP 105 | ||
421 | #define EC_F_EC_GFP_SIMPLE_POINT_SET_AFFINE_COORDINATES 168 | ||
422 | #define EC_F_EC_GFP_SIMPLE_POINT_SET_AFFINE_COORDINATES_GFP 128 | ||
423 | #define EC_F_EC_GFP_SIMPLE_SET_COMPRESSED_COORDINATES 169 | ||
424 | #define EC_F_EC_GFP_SIMPLE_SET_COMPRESSED_COORDINATES_GFP 129 | ||
425 | #define EC_F_EC_GROUP_CHECK 170 | ||
426 | #define EC_F_EC_GROUP_CHECK_DISCRIMINANT 171 | ||
427 | #define EC_F_EC_GROUP_COPY 106 | ||
428 | #define EC_F_EC_GROUP_GET0_GENERATOR 139 | ||
429 | #define EC_F_EC_GROUP_GET_COFACTOR 140 | ||
430 | #define EC_F_EC_GROUP_GET_CURVE_GF2M 172 | ||
431 | #define EC_F_EC_GROUP_GET_CURVE_GFP 130 | ||
432 | #define EC_F_EC_GROUP_GET_DEGREE 173 | ||
433 | #define EC_F_EC_GROUP_GET_ORDER 141 | ||
434 | #define EC_F_EC_GROUP_GET_PENTANOMIAL_BASIS 193 | ||
435 | #define EC_F_EC_GROUP_GET_TRINOMIAL_BASIS 194 | ||
436 | #define EC_F_EC_GROUP_NEW 108 | ||
437 | #define EC_F_EC_GROUP_NEW_BY_CURVE_NAME 174 | ||
438 | #define EC_F_EC_GROUP_NEW_FROM_DATA 175 | ||
439 | #define EC_F_EC_GROUP_PRECOMPUTE_MULT 142 | ||
440 | #define EC_F_EC_GROUP_SET_CURVE_GF2M 176 | ||
441 | #define EC_F_EC_GROUP_SET_CURVE_GFP 109 | ||
442 | #define EC_F_EC_GROUP_SET_EXTRA_DATA 110 | ||
443 | #define EC_F_EC_GROUP_SET_GENERATOR 111 | ||
444 | #define EC_F_EC_KEY_CHECK_KEY 177 | ||
445 | #define EC_F_EC_KEY_COPY 178 | ||
446 | #define EC_F_EC_KEY_GENERATE_KEY 179 | ||
447 | #define EC_F_EC_KEY_NEW 182 | ||
448 | #define EC_F_EC_KEY_PRINT 180 | ||
449 | #define EC_F_EC_KEY_PRINT_FP 181 | ||
450 | #define EC_F_EC_POINTS_MAKE_AFFINE 136 | ||
451 | #define EC_F_EC_POINTS_MUL 138 | ||
452 | #define EC_F_EC_POINT_ADD 112 | ||
453 | #define EC_F_EC_POINT_CMP 113 | ||
454 | #define EC_F_EC_POINT_COPY 114 | ||
455 | #define EC_F_EC_POINT_DBL 115 | ||
456 | #define EC_F_EC_POINT_GET_AFFINE_COORDINATES_GF2M 183 | ||
457 | #define EC_F_EC_POINT_GET_AFFINE_COORDINATES_GFP 116 | ||
458 | #define EC_F_EC_POINT_GET_JPROJECTIVE_COORDINATES_GFP 117 | ||
459 | #define EC_F_EC_POINT_INVERT 210 | ||
460 | #define EC_F_EC_POINT_IS_AT_INFINITY 118 | ||
461 | #define EC_F_EC_POINT_IS_ON_CURVE 119 | ||
462 | #define EC_F_EC_POINT_MAKE_AFFINE 120 | ||
463 | #define EC_F_EC_POINT_MUL 184 | ||
464 | #define EC_F_EC_POINT_NEW 121 | ||
465 | #define EC_F_EC_POINT_OCT2POINT 122 | ||
466 | #define EC_F_EC_POINT_POINT2OCT 123 | ||
467 | #define EC_F_EC_POINT_SET_AFFINE_COORDINATES_GF2M 185 | ||
468 | #define EC_F_EC_POINT_SET_AFFINE_COORDINATES_GFP 124 | ||
469 | #define EC_F_EC_POINT_SET_COMPRESSED_COORDINATES_GF2M 186 | ||
470 | #define EC_F_EC_POINT_SET_COMPRESSED_COORDINATES_GFP 125 | ||
471 | #define EC_F_EC_POINT_SET_JPROJECTIVE_COORDINATES_GFP 126 | ||
472 | #define EC_F_EC_POINT_SET_TO_INFINITY 127 | ||
473 | #define EC_F_EC_PRE_COMP_DUP 207 | ||
474 | #define EC_F_EC_PRE_COMP_NEW 196 | ||
475 | #define EC_F_EC_WNAF_MUL 187 | ||
476 | #define EC_F_EC_WNAF_PRECOMPUTE_MULT 188 | ||
477 | #define EC_F_I2D_ECPARAMETERS 190 | ||
478 | #define EC_F_I2D_ECPKPARAMETERS 191 | ||
479 | #define EC_F_I2D_ECPRIVATEKEY 192 | ||
480 | #define EC_F_I2O_ECPUBLICKEY 151 | ||
481 | #define EC_F_O2I_ECPUBLICKEY 152 | ||
482 | |||
483 | /* Reason codes. */ | ||
484 | #define EC_R_ASN1_ERROR 115 | ||
485 | #define EC_R_ASN1_UNKNOWN_FIELD 116 | ||
486 | #define EC_R_BUFFER_TOO_SMALL 100 | ||
487 | #define EC_R_D2I_ECPKPARAMETERS_FAILURE 117 | ||
488 | #define EC_R_DISCRIMINANT_IS_ZERO 118 | ||
489 | #define EC_R_EC_GROUP_NEW_BY_NAME_FAILURE 119 | ||
490 | #define EC_R_FIELD_TOO_LARGE 138 | ||
491 | #define EC_R_GROUP2PKPARAMETERS_FAILURE 120 | ||
492 | #define EC_R_I2D_ECPKPARAMETERS_FAILURE 121 | ||
493 | #define EC_R_INCOMPATIBLE_OBJECTS 101 | ||
494 | #define EC_R_INVALID_ARGUMENT 112 | ||
495 | #define EC_R_INVALID_COMPRESSED_POINT 110 | ||
496 | #define EC_R_INVALID_COMPRESSION_BIT 109 | ||
497 | #define EC_R_INVALID_ENCODING 102 | ||
498 | #define EC_R_INVALID_FIELD 103 | ||
499 | #define EC_R_INVALID_FORM 104 | ||
500 | #define EC_R_INVALID_GROUP_ORDER 122 | ||
501 | #define EC_R_INVALID_PENTANOMIAL_BASIS 132 | ||
502 | #define EC_R_INVALID_PRIVATE_KEY 123 | ||
503 | #define EC_R_INVALID_TRINOMIAL_BASIS 137 | ||
504 | #define EC_R_MISSING_PARAMETERS 124 | ||
505 | #define EC_R_MISSING_PRIVATE_KEY 125 | ||
506 | #define EC_R_NOT_A_NIST_PRIME 135 | ||
507 | #define EC_R_NOT_A_SUPPORTED_NIST_PRIME 136 | ||
508 | #define EC_R_NOT_IMPLEMENTED 126 | ||
509 | #define EC_R_NOT_INITIALIZED 111 | ||
510 | #define EC_R_NO_FIELD_MOD 133 | ||
511 | #define EC_R_PASSED_NULL_PARAMETER 134 | ||
512 | #define EC_R_PKPARAMETERS2GROUP_FAILURE 127 | ||
513 | #define EC_R_POINT_AT_INFINITY 106 | ||
514 | #define EC_R_POINT_IS_NOT_ON_CURVE 107 | ||
515 | #define EC_R_SLOT_FULL 108 | ||
516 | #define EC_R_UNDEFINED_GENERATOR 113 | ||
517 | #define EC_R_UNDEFINED_ORDER 128 | ||
518 | #define EC_R_UNKNOWN_GROUP 129 | ||
519 | #define EC_R_UNKNOWN_ORDER 114 | ||
520 | #define EC_R_UNSUPPORTED_FIELD 131 | ||
521 | #define EC_R_WRONG_ORDER 130 | ||
522 | |||
523 | #ifdef __cplusplus | ||
524 | } | ||
525 | #endif | ||
526 | #endif | ||
diff --git a/src/lib/libcrypto/ec/ec2_mult.c b/src/lib/libcrypto/ec/ec2_mult.c deleted file mode 100644 index ff368fd7d7..0000000000 --- a/src/lib/libcrypto/ec/ec2_mult.c +++ /dev/null | |||
@@ -1,380 +0,0 @@ | |||
1 | /* crypto/ec/ec2_mult.c */ | ||
2 | /* ==================================================================== | ||
3 | * Copyright 2002 Sun Microsystems, Inc. ALL RIGHTS RESERVED. | ||
4 | * | ||
5 | * The Elliptic Curve Public-Key Crypto Library (ECC Code) included | ||
6 | * herein is developed by SUN MICROSYSTEMS, INC., and is contributed | ||
7 | * to the OpenSSL project. | ||
8 | * | ||
9 | * The ECC Code is licensed pursuant to the OpenSSL open source | ||
10 | * license provided below. | ||
11 | * | ||
12 | * The software is originally written by Sheueling Chang Shantz and | ||
13 | * Douglas Stebila of Sun Microsystems Laboratories. | ||
14 | * | ||
15 | */ | ||
16 | /* ==================================================================== | ||
17 | * Copyright (c) 1998-2003 The OpenSSL Project. All rights reserved. | ||
18 | * | ||
19 | * Redistribution and use in source and binary forms, with or without | ||
20 | * modification, are permitted provided that the following conditions | ||
21 | * are met: | ||
22 | * | ||
23 | * 1. Redistributions of source code must retain the above copyright | ||
24 | * notice, this list of conditions and the following disclaimer. | ||
25 | * | ||
26 | * 2. Redistributions in binary form must reproduce the above copyright | ||
27 | * notice, this list of conditions and the following disclaimer in | ||
28 | * the documentation and/or other materials provided with the | ||
29 | * distribution. | ||
30 | * | ||
31 | * 3. All advertising materials mentioning features or use of this | ||
32 | * software must display the following acknowledgment: | ||
33 | * "This product includes software developed by the OpenSSL Project | ||
34 | * for use in the OpenSSL Toolkit. (http://www.openssl.org/)" | ||
35 | * | ||
36 | * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to | ||
37 | * endorse or promote products derived from this software without | ||
38 | * prior written permission. For written permission, please contact | ||
39 | * openssl-core@openssl.org. | ||
40 | * | ||
41 | * 5. Products derived from this software may not be called "OpenSSL" | ||
42 | * nor may "OpenSSL" appear in their names without prior written | ||
43 | * permission of the OpenSSL Project. | ||
44 | * | ||
45 | * 6. Redistributions of any form whatsoever must retain the following | ||
46 | * acknowledgment: | ||
47 | * "This product includes software developed by the OpenSSL Project | ||
48 | * for use in the OpenSSL Toolkit (http://www.openssl.org/)" | ||
49 | * | ||
50 | * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY | ||
51 | * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | ||
52 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR | ||
53 | * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR | ||
54 | * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, | ||
55 | * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT | ||
56 | * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; | ||
57 | * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | ||
58 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, | ||
59 | * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) | ||
60 | * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | ||
61 | * OF THE POSSIBILITY OF SUCH DAMAGE. | ||
62 | * ==================================================================== | ||
63 | * | ||
64 | * This product includes cryptographic software written by Eric Young | ||
65 | * (eay@cryptsoft.com). This product includes software written by Tim | ||
66 | * Hudson (tjh@cryptsoft.com). | ||
67 | * | ||
68 | */ | ||
69 | |||
70 | #include <openssl/err.h> | ||
71 | |||
72 | #include "ec_lcl.h" | ||
73 | |||
74 | |||
75 | /* Compute the x-coordinate x/z for the point 2*(x/z) in Montgomery projective | ||
76 | * coordinates. | ||
77 | * Uses algorithm Mdouble in appendix of | ||
78 | * Lopez, J. and Dahab, R. "Fast multiplication on elliptic curves over | ||
79 | * GF(2^m) without precomputation". | ||
80 | * modified to not require precomputation of c=b^{2^{m-1}}. | ||
81 | */ | ||
82 | static int gf2m_Mdouble(const EC_GROUP *group, BIGNUM *x, BIGNUM *z, BN_CTX *ctx) | ||
83 | { | ||
84 | BIGNUM *t1; | ||
85 | int ret = 0; | ||
86 | |||
87 | /* Since Mdouble is static we can guarantee that ctx != NULL. */ | ||
88 | BN_CTX_start(ctx); | ||
89 | t1 = BN_CTX_get(ctx); | ||
90 | if (t1 == NULL) goto err; | ||
91 | |||
92 | if (!group->meth->field_sqr(group, x, x, ctx)) goto err; | ||
93 | if (!group->meth->field_sqr(group, t1, z, ctx)) goto err; | ||
94 | if (!group->meth->field_mul(group, z, x, t1, ctx)) goto err; | ||
95 | if (!group->meth->field_sqr(group, x, x, ctx)) goto err; | ||
96 | if (!group->meth->field_sqr(group, t1, t1, ctx)) goto err; | ||
97 | if (!group->meth->field_mul(group, t1, &group->b, t1, ctx)) goto err; | ||
98 | if (!BN_GF2m_add(x, x, t1)) goto err; | ||
99 | |||
100 | ret = 1; | ||
101 | |||
102 | err: | ||
103 | BN_CTX_end(ctx); | ||
104 | return ret; | ||
105 | } | ||
106 | |||
107 | /* Compute the x-coordinate x1/z1 for the point (x1/z1)+(x2/x2) in Montgomery | ||
108 | * projective coordinates. | ||
109 | * Uses algorithm Madd in appendix of | ||
110 | * Lopex, J. and Dahab, R. "Fast multiplication on elliptic curves over | ||
111 | * GF(2^m) without precomputation". | ||
112 | */ | ||
113 | static int gf2m_Madd(const EC_GROUP *group, const BIGNUM *x, BIGNUM *x1, BIGNUM *z1, | ||
114 | const BIGNUM *x2, const BIGNUM *z2, BN_CTX *ctx) | ||
115 | { | ||
116 | BIGNUM *t1, *t2; | ||
117 | int ret = 0; | ||
118 | |||
119 | /* Since Madd is static we can guarantee that ctx != NULL. */ | ||
120 | BN_CTX_start(ctx); | ||
121 | t1 = BN_CTX_get(ctx); | ||
122 | t2 = BN_CTX_get(ctx); | ||
123 | if (t2 == NULL) goto err; | ||
124 | |||
125 | if (!BN_copy(t1, x)) goto err; | ||
126 | if (!group->meth->field_mul(group, x1, x1, z2, ctx)) goto err; | ||
127 | if (!group->meth->field_mul(group, z1, z1, x2, ctx)) goto err; | ||
128 | if (!group->meth->field_mul(group, t2, x1, z1, ctx)) goto err; | ||
129 | if (!BN_GF2m_add(z1, z1, x1)) goto err; | ||
130 | if (!group->meth->field_sqr(group, z1, z1, ctx)) goto err; | ||
131 | if (!group->meth->field_mul(group, x1, z1, t1, ctx)) goto err; | ||
132 | if (!BN_GF2m_add(x1, x1, t2)) goto err; | ||
133 | |||
134 | ret = 1; | ||
135 | |||
136 | err: | ||
137 | BN_CTX_end(ctx); | ||
138 | return ret; | ||
139 | } | ||
140 | |||
141 | /* Compute the x, y affine coordinates from the point (x1, z1) (x2, z2) | ||
142 | * using Montgomery point multiplication algorithm Mxy() in appendix of | ||
143 | * Lopex, J. and Dahab, R. "Fast multiplication on elliptic curves over | ||
144 | * GF(2^m) without precomputation". | ||
145 | * Returns: | ||
146 | * 0 on error | ||
147 | * 1 if return value should be the point at infinity | ||
148 | * 2 otherwise | ||
149 | */ | ||
150 | static int gf2m_Mxy(const EC_GROUP *group, const BIGNUM *x, const BIGNUM *y, BIGNUM *x1, | ||
151 | BIGNUM *z1, BIGNUM *x2, BIGNUM *z2, BN_CTX *ctx) | ||
152 | { | ||
153 | BIGNUM *t3, *t4, *t5; | ||
154 | int ret = 0; | ||
155 | |||
156 | if (BN_is_zero(z1)) | ||
157 | { | ||
158 | BN_zero(x2); | ||
159 | BN_zero(z2); | ||
160 | return 1; | ||
161 | } | ||
162 | |||
163 | if (BN_is_zero(z2)) | ||
164 | { | ||
165 | if (!BN_copy(x2, x)) return 0; | ||
166 | if (!BN_GF2m_add(z2, x, y)) return 0; | ||
167 | return 2; | ||
168 | } | ||
169 | |||
170 | /* Since Mxy is static we can guarantee that ctx != NULL. */ | ||
171 | BN_CTX_start(ctx); | ||
172 | t3 = BN_CTX_get(ctx); | ||
173 | t4 = BN_CTX_get(ctx); | ||
174 | t5 = BN_CTX_get(ctx); | ||
175 | if (t5 == NULL) goto err; | ||
176 | |||
177 | if (!BN_one(t5)) goto err; | ||
178 | |||
179 | if (!group->meth->field_mul(group, t3, z1, z2, ctx)) goto err; | ||
180 | |||
181 | if (!group->meth->field_mul(group, z1, z1, x, ctx)) goto err; | ||
182 | if (!BN_GF2m_add(z1, z1, x1)) goto err; | ||
183 | if (!group->meth->field_mul(group, z2, z2, x, ctx)) goto err; | ||
184 | if (!group->meth->field_mul(group, x1, z2, x1, ctx)) goto err; | ||
185 | if (!BN_GF2m_add(z2, z2, x2)) goto err; | ||
186 | |||
187 | if (!group->meth->field_mul(group, z2, z2, z1, ctx)) goto err; | ||
188 | if (!group->meth->field_sqr(group, t4, x, ctx)) goto err; | ||
189 | if (!BN_GF2m_add(t4, t4, y)) goto err; | ||
190 | if (!group->meth->field_mul(group, t4, t4, t3, ctx)) goto err; | ||
191 | if (!BN_GF2m_add(t4, t4, z2)) goto err; | ||
192 | |||
193 | if (!group->meth->field_mul(group, t3, t3, x, ctx)) goto err; | ||
194 | if (!group->meth->field_div(group, t3, t5, t3, ctx)) goto err; | ||
195 | if (!group->meth->field_mul(group, t4, t3, t4, ctx)) goto err; | ||
196 | if (!group->meth->field_mul(group, x2, x1, t3, ctx)) goto err; | ||
197 | if (!BN_GF2m_add(z2, x2, x)) goto err; | ||
198 | |||
199 | if (!group->meth->field_mul(group, z2, z2, t4, ctx)) goto err; | ||
200 | if (!BN_GF2m_add(z2, z2, y)) goto err; | ||
201 | |||
202 | ret = 2; | ||
203 | |||
204 | err: | ||
205 | BN_CTX_end(ctx); | ||
206 | return ret; | ||
207 | } | ||
208 | |||
209 | /* Computes scalar*point and stores the result in r. | ||
210 | * point can not equal r. | ||
211 | * Uses algorithm 2P of | ||
212 | * Lopex, J. and Dahab, R. "Fast multiplication on elliptic curves over | ||
213 | * GF(2^m) without precomputation". | ||
214 | */ | ||
215 | static int ec_GF2m_montgomery_point_multiply(const EC_GROUP *group, EC_POINT *r, const BIGNUM *scalar, | ||
216 | const EC_POINT *point, BN_CTX *ctx) | ||
217 | { | ||
218 | BIGNUM *x1, *x2, *z1, *z2; | ||
219 | int ret = 0, i, j; | ||
220 | BN_ULONG mask; | ||
221 | |||
222 | if (r == point) | ||
223 | { | ||
224 | ECerr(EC_F_EC_GF2M_MONTGOMERY_POINT_MULTIPLY, EC_R_INVALID_ARGUMENT); | ||
225 | return 0; | ||
226 | } | ||
227 | |||
228 | /* if result should be point at infinity */ | ||
229 | if ((scalar == NULL) || BN_is_zero(scalar) || (point == NULL) || | ||
230 | EC_POINT_is_at_infinity(group, point)) | ||
231 | { | ||
232 | return EC_POINT_set_to_infinity(group, r); | ||
233 | } | ||
234 | |||
235 | /* only support affine coordinates */ | ||
236 | if (!point->Z_is_one) return 0; | ||
237 | |||
238 | /* Since point_multiply is static we can guarantee that ctx != NULL. */ | ||
239 | BN_CTX_start(ctx); | ||
240 | x1 = BN_CTX_get(ctx); | ||
241 | z1 = BN_CTX_get(ctx); | ||
242 | if (z1 == NULL) goto err; | ||
243 | |||
244 | x2 = &r->X; | ||
245 | z2 = &r->Y; | ||
246 | |||
247 | if (!BN_GF2m_mod_arr(x1, &point->X, group->poly)) goto err; /* x1 = x */ | ||
248 | if (!BN_one(z1)) goto err; /* z1 = 1 */ | ||
249 | if (!group->meth->field_sqr(group, z2, x1, ctx)) goto err; /* z2 = x1^2 = x^2 */ | ||
250 | if (!group->meth->field_sqr(group, x2, z2, ctx)) goto err; | ||
251 | if (!BN_GF2m_add(x2, x2, &group->b)) goto err; /* x2 = x^4 + b */ | ||
252 | |||
253 | /* find top most bit and go one past it */ | ||
254 | i = scalar->top - 1; j = BN_BITS2 - 1; | ||
255 | mask = BN_TBIT; | ||
256 | while (!(scalar->d[i] & mask)) { mask >>= 1; j--; } | ||
257 | mask >>= 1; j--; | ||
258 | /* if top most bit was at word break, go to next word */ | ||
259 | if (!mask) | ||
260 | { | ||
261 | i--; j = BN_BITS2 - 1; | ||
262 | mask = BN_TBIT; | ||
263 | } | ||
264 | |||
265 | for (; i >= 0; i--) | ||
266 | { | ||
267 | for (; j >= 0; j--) | ||
268 | { | ||
269 | if (scalar->d[i] & mask) | ||
270 | { | ||
271 | if (!gf2m_Madd(group, &point->X, x1, z1, x2, z2, ctx)) goto err; | ||
272 | if (!gf2m_Mdouble(group, x2, z2, ctx)) goto err; | ||
273 | } | ||
274 | else | ||
275 | { | ||
276 | if (!gf2m_Madd(group, &point->X, x2, z2, x1, z1, ctx)) goto err; | ||
277 | if (!gf2m_Mdouble(group, x1, z1, ctx)) goto err; | ||
278 | } | ||
279 | mask >>= 1; | ||
280 | } | ||
281 | j = BN_BITS2 - 1; | ||
282 | mask = BN_TBIT; | ||
283 | } | ||
284 | |||
285 | /* convert out of "projective" coordinates */ | ||
286 | i = gf2m_Mxy(group, &point->X, &point->Y, x1, z1, x2, z2, ctx); | ||
287 | if (i == 0) goto err; | ||
288 | else if (i == 1) | ||
289 | { | ||
290 | if (!EC_POINT_set_to_infinity(group, r)) goto err; | ||
291 | } | ||
292 | else | ||
293 | { | ||
294 | if (!BN_one(&r->Z)) goto err; | ||
295 | r->Z_is_one = 1; | ||
296 | } | ||
297 | |||
298 | /* GF(2^m) field elements should always have BIGNUM::neg = 0 */ | ||
299 | BN_set_negative(&r->X, 0); | ||
300 | BN_set_negative(&r->Y, 0); | ||
301 | |||
302 | ret = 1; | ||
303 | |||
304 | err: | ||
305 | BN_CTX_end(ctx); | ||
306 | return ret; | ||
307 | } | ||
308 | |||
309 | |||
310 | /* Computes the sum | ||
311 | * scalar*group->generator + scalars[0]*points[0] + ... + scalars[num-1]*points[num-1] | ||
312 | * gracefully ignoring NULL scalar values. | ||
313 | */ | ||
314 | int ec_GF2m_simple_mul(const EC_GROUP *group, EC_POINT *r, const BIGNUM *scalar, | ||
315 | size_t num, const EC_POINT *points[], const BIGNUM *scalars[], BN_CTX *ctx) | ||
316 | { | ||
317 | BN_CTX *new_ctx = NULL; | ||
318 | int ret = 0; | ||
319 | size_t i; | ||
320 | EC_POINT *p=NULL; | ||
321 | |||
322 | if (ctx == NULL) | ||
323 | { | ||
324 | ctx = new_ctx = BN_CTX_new(); | ||
325 | if (ctx == NULL) | ||
326 | return 0; | ||
327 | } | ||
328 | |||
329 | /* This implementation is more efficient than the wNAF implementation for 2 | ||
330 | * or fewer points. Use the ec_wNAF_mul implementation for 3 or more points, | ||
331 | * or if we can perform a fast multiplication based on precomputation. | ||
332 | */ | ||
333 | if ((scalar && (num > 1)) || (num > 2) || (num == 0 && EC_GROUP_have_precompute_mult(group))) | ||
334 | { | ||
335 | ret = ec_wNAF_mul(group, r, scalar, num, points, scalars, ctx); | ||
336 | goto err; | ||
337 | } | ||
338 | |||
339 | if ((p = EC_POINT_new(group)) == NULL) goto err; | ||
340 | |||
341 | if (!EC_POINT_set_to_infinity(group, r)) goto err; | ||
342 | |||
343 | if (scalar) | ||
344 | { | ||
345 | if (!ec_GF2m_montgomery_point_multiply(group, p, scalar, group->generator, ctx)) goto err; | ||
346 | if (BN_is_negative(scalar)) | ||
347 | if (!group->meth->invert(group, p, ctx)) goto err; | ||
348 | if (!group->meth->add(group, r, r, p, ctx)) goto err; | ||
349 | } | ||
350 | |||
351 | for (i = 0; i < num; i++) | ||
352 | { | ||
353 | if (!ec_GF2m_montgomery_point_multiply(group, p, scalars[i], points[i], ctx)) goto err; | ||
354 | if (BN_is_negative(scalars[i])) | ||
355 | if (!group->meth->invert(group, p, ctx)) goto err; | ||
356 | if (!group->meth->add(group, r, r, p, ctx)) goto err; | ||
357 | } | ||
358 | |||
359 | ret = 1; | ||
360 | |||
361 | err: | ||
362 | if (p) EC_POINT_free(p); | ||
363 | if (new_ctx != NULL) | ||
364 | BN_CTX_free(new_ctx); | ||
365 | return ret; | ||
366 | } | ||
367 | |||
368 | |||
369 | /* Precomputation for point multiplication: fall back to wNAF methods | ||
370 | * because ec_GF2m_simple_mul() uses ec_wNAF_mul() if appropriate */ | ||
371 | |||
372 | int ec_GF2m_precompute_mult(EC_GROUP *group, BN_CTX *ctx) | ||
373 | { | ||
374 | return ec_wNAF_precompute_mult(group, ctx); | ||
375 | } | ||
376 | |||
377 | int ec_GF2m_have_precompute_mult(const EC_GROUP *group) | ||
378 | { | ||
379 | return ec_wNAF_have_precompute_mult(group); | ||
380 | } | ||
diff --git a/src/lib/libcrypto/ec/ec2_smpl.c b/src/lib/libcrypto/ec/ec2_smpl.c deleted file mode 100644 index 5cd1eac41f..0000000000 --- a/src/lib/libcrypto/ec/ec2_smpl.c +++ /dev/null | |||
@@ -1,971 +0,0 @@ | |||
1 | /* crypto/ec/ec2_smpl.c */ | ||
2 | /* ==================================================================== | ||
3 | * Copyright 2002 Sun Microsystems, Inc. ALL RIGHTS RESERVED. | ||
4 | * | ||
5 | * The Elliptic Curve Public-Key Crypto Library (ECC Code) included | ||
6 | * herein is developed by SUN MICROSYSTEMS, INC., and is contributed | ||
7 | * to the OpenSSL project. | ||
8 | * | ||
9 | * The ECC Code is licensed pursuant to the OpenSSL open source | ||
10 | * license provided below. | ||
11 | * | ||
12 | * The software is originally written by Sheueling Chang Shantz and | ||
13 | * Douglas Stebila of Sun Microsystems Laboratories. | ||
14 | * | ||
15 | */ | ||
16 | /* ==================================================================== | ||
17 | * Copyright (c) 1998-2003 The OpenSSL Project. All rights reserved. | ||
18 | * | ||
19 | * Redistribution and use in source and binary forms, with or without | ||
20 | * modification, are permitted provided that the following conditions | ||
21 | * are met: | ||
22 | * | ||
23 | * 1. Redistributions of source code must retain the above copyright | ||
24 | * notice, this list of conditions and the following disclaimer. | ||
25 | * | ||
26 | * 2. Redistributions in binary form must reproduce the above copyright | ||
27 | * notice, this list of conditions and the following disclaimer in | ||
28 | * the documentation and/or other materials provided with the | ||
29 | * distribution. | ||
30 | * | ||
31 | * 3. All advertising materials mentioning features or use of this | ||
32 | * software must display the following acknowledgment: | ||
33 | * "This product includes software developed by the OpenSSL Project | ||
34 | * for use in the OpenSSL Toolkit. (http://www.openssl.org/)" | ||
35 | * | ||
36 | * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to | ||
37 | * endorse or promote products derived from this software without | ||
38 | * prior written permission. For written permission, please contact | ||
39 | * openssl-core@openssl.org. | ||
40 | * | ||
41 | * 5. Products derived from this software may not be called "OpenSSL" | ||
42 | * nor may "OpenSSL" appear in their names without prior written | ||
43 | * permission of the OpenSSL Project. | ||
44 | * | ||
45 | * 6. Redistributions of any form whatsoever must retain the following | ||
46 | * acknowledgment: | ||
47 | * "This product includes software developed by the OpenSSL Project | ||
48 | * for use in the OpenSSL Toolkit (http://www.openssl.org/)" | ||
49 | * | ||
50 | * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY | ||
51 | * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | ||
52 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR | ||
53 | * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR | ||
54 | * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, | ||
55 | * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT | ||
56 | * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; | ||
57 | * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | ||
58 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, | ||
59 | * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) | ||
60 | * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | ||
61 | * OF THE POSSIBILITY OF SUCH DAMAGE. | ||
62 | * ==================================================================== | ||
63 | * | ||
64 | * This product includes cryptographic software written by Eric Young | ||
65 | * (eay@cryptsoft.com). This product includes software written by Tim | ||
66 | * Hudson (tjh@cryptsoft.com). | ||
67 | * | ||
68 | */ | ||
69 | |||
70 | #include <openssl/err.h> | ||
71 | |||
72 | #include "ec_lcl.h" | ||
73 | |||
74 | |||
75 | const EC_METHOD *EC_GF2m_simple_method(void) | ||
76 | { | ||
77 | static const EC_METHOD ret = { | ||
78 | NID_X9_62_characteristic_two_field, | ||
79 | ec_GF2m_simple_group_init, | ||
80 | ec_GF2m_simple_group_finish, | ||
81 | ec_GF2m_simple_group_clear_finish, | ||
82 | ec_GF2m_simple_group_copy, | ||
83 | ec_GF2m_simple_group_set_curve, | ||
84 | ec_GF2m_simple_group_get_curve, | ||
85 | ec_GF2m_simple_group_get_degree, | ||
86 | ec_GF2m_simple_group_check_discriminant, | ||
87 | ec_GF2m_simple_point_init, | ||
88 | ec_GF2m_simple_point_finish, | ||
89 | ec_GF2m_simple_point_clear_finish, | ||
90 | ec_GF2m_simple_point_copy, | ||
91 | ec_GF2m_simple_point_set_to_infinity, | ||
92 | 0 /* set_Jprojective_coordinates_GFp */, | ||
93 | 0 /* get_Jprojective_coordinates_GFp */, | ||
94 | ec_GF2m_simple_point_set_affine_coordinates, | ||
95 | ec_GF2m_simple_point_get_affine_coordinates, | ||
96 | ec_GF2m_simple_set_compressed_coordinates, | ||
97 | ec_GF2m_simple_point2oct, | ||
98 | ec_GF2m_simple_oct2point, | ||
99 | ec_GF2m_simple_add, | ||
100 | ec_GF2m_simple_dbl, | ||
101 | ec_GF2m_simple_invert, | ||
102 | ec_GF2m_simple_is_at_infinity, | ||
103 | ec_GF2m_simple_is_on_curve, | ||
104 | ec_GF2m_simple_cmp, | ||
105 | ec_GF2m_simple_make_affine, | ||
106 | ec_GF2m_simple_points_make_affine, | ||
107 | |||
108 | /* the following three method functions are defined in ec2_mult.c */ | ||
109 | ec_GF2m_simple_mul, | ||
110 | ec_GF2m_precompute_mult, | ||
111 | ec_GF2m_have_precompute_mult, | ||
112 | |||
113 | ec_GF2m_simple_field_mul, | ||
114 | ec_GF2m_simple_field_sqr, | ||
115 | ec_GF2m_simple_field_div, | ||
116 | 0 /* field_encode */, | ||
117 | 0 /* field_decode */, | ||
118 | 0 /* field_set_to_one */ }; | ||
119 | |||
120 | return &ret; | ||
121 | } | ||
122 | |||
123 | |||
124 | /* Initialize a GF(2^m)-based EC_GROUP structure. | ||
125 | * Note that all other members are handled by EC_GROUP_new. | ||
126 | */ | ||
127 | int ec_GF2m_simple_group_init(EC_GROUP *group) | ||
128 | { | ||
129 | BN_init(&group->field); | ||
130 | BN_init(&group->a); | ||
131 | BN_init(&group->b); | ||
132 | return 1; | ||
133 | } | ||
134 | |||
135 | |||
136 | /* Free a GF(2^m)-based EC_GROUP structure. | ||
137 | * Note that all other members are handled by EC_GROUP_free. | ||
138 | */ | ||
139 | void ec_GF2m_simple_group_finish(EC_GROUP *group) | ||
140 | { | ||
141 | BN_free(&group->field); | ||
142 | BN_free(&group->a); | ||
143 | BN_free(&group->b); | ||
144 | } | ||
145 | |||
146 | |||
147 | /* Clear and free a GF(2^m)-based EC_GROUP structure. | ||
148 | * Note that all other members are handled by EC_GROUP_clear_free. | ||
149 | */ | ||
150 | void ec_GF2m_simple_group_clear_finish(EC_GROUP *group) | ||
151 | { | ||
152 | BN_clear_free(&group->field); | ||
153 | BN_clear_free(&group->a); | ||
154 | BN_clear_free(&group->b); | ||
155 | group->poly[0] = 0; | ||
156 | group->poly[1] = 0; | ||
157 | group->poly[2] = 0; | ||
158 | group->poly[3] = 0; | ||
159 | group->poly[4] = 0; | ||
160 | } | ||
161 | |||
162 | |||
163 | /* Copy a GF(2^m)-based EC_GROUP structure. | ||
164 | * Note that all other members are handled by EC_GROUP_copy. | ||
165 | */ | ||
166 | int ec_GF2m_simple_group_copy(EC_GROUP *dest, const EC_GROUP *src) | ||
167 | { | ||
168 | int i; | ||
169 | if (!BN_copy(&dest->field, &src->field)) return 0; | ||
170 | if (!BN_copy(&dest->a, &src->a)) return 0; | ||
171 | if (!BN_copy(&dest->b, &src->b)) return 0; | ||
172 | dest->poly[0] = src->poly[0]; | ||
173 | dest->poly[1] = src->poly[1]; | ||
174 | dest->poly[2] = src->poly[2]; | ||
175 | dest->poly[3] = src->poly[3]; | ||
176 | dest->poly[4] = src->poly[4]; | ||
177 | bn_wexpand(&dest->a, (int)(dest->poly[0] + BN_BITS2 - 1) / BN_BITS2); | ||
178 | bn_wexpand(&dest->b, (int)(dest->poly[0] + BN_BITS2 - 1) / BN_BITS2); | ||
179 | for (i = dest->a.top; i < dest->a.dmax; i++) dest->a.d[i] = 0; | ||
180 | for (i = dest->b.top; i < dest->b.dmax; i++) dest->b.d[i] = 0; | ||
181 | return 1; | ||
182 | } | ||
183 | |||
184 | |||
185 | /* Set the curve parameters of an EC_GROUP structure. */ | ||
186 | int ec_GF2m_simple_group_set_curve(EC_GROUP *group, | ||
187 | const BIGNUM *p, const BIGNUM *a, const BIGNUM *b, BN_CTX *ctx) | ||
188 | { | ||
189 | int ret = 0, i; | ||
190 | |||
191 | /* group->field */ | ||
192 | if (!BN_copy(&group->field, p)) goto err; | ||
193 | i = BN_GF2m_poly2arr(&group->field, group->poly, 5); | ||
194 | if ((i != 5) && (i != 3)) | ||
195 | { | ||
196 | ECerr(EC_F_EC_GF2M_SIMPLE_GROUP_SET_CURVE, EC_R_UNSUPPORTED_FIELD); | ||
197 | goto err; | ||
198 | } | ||
199 | |||
200 | /* group->a */ | ||
201 | if (!BN_GF2m_mod_arr(&group->a, a, group->poly)) goto err; | ||
202 | bn_wexpand(&group->a, (int)(group->poly[0] + BN_BITS2 - 1) / BN_BITS2); | ||
203 | for (i = group->a.top; i < group->a.dmax; i++) group->a.d[i] = 0; | ||
204 | |||
205 | /* group->b */ | ||
206 | if (!BN_GF2m_mod_arr(&group->b, b, group->poly)) goto err; | ||
207 | bn_wexpand(&group->b, (int)(group->poly[0] + BN_BITS2 - 1) / BN_BITS2); | ||
208 | for (i = group->b.top; i < group->b.dmax; i++) group->b.d[i] = 0; | ||
209 | |||
210 | ret = 1; | ||
211 | err: | ||
212 | return ret; | ||
213 | } | ||
214 | |||
215 | |||
216 | /* Get the curve parameters of an EC_GROUP structure. | ||
217 | * If p, a, or b are NULL then there values will not be set but the method will return with success. | ||
218 | */ | ||
219 | int ec_GF2m_simple_group_get_curve(const EC_GROUP *group, BIGNUM *p, BIGNUM *a, BIGNUM *b, BN_CTX *ctx) | ||
220 | { | ||
221 | int ret = 0; | ||
222 | |||
223 | if (p != NULL) | ||
224 | { | ||
225 | if (!BN_copy(p, &group->field)) return 0; | ||
226 | } | ||
227 | |||
228 | if (a != NULL) | ||
229 | { | ||
230 | if (!BN_copy(a, &group->a)) goto err; | ||
231 | } | ||
232 | |||
233 | if (b != NULL) | ||
234 | { | ||
235 | if (!BN_copy(b, &group->b)) goto err; | ||
236 | } | ||
237 | |||
238 | ret = 1; | ||
239 | |||
240 | err: | ||
241 | return ret; | ||
242 | } | ||
243 | |||
244 | |||
245 | /* Gets the degree of the field. For a curve over GF(2^m) this is the value m. */ | ||
246 | int ec_GF2m_simple_group_get_degree(const EC_GROUP *group) | ||
247 | { | ||
248 | return BN_num_bits(&group->field)-1; | ||
249 | } | ||
250 | |||
251 | |||
252 | /* Checks the discriminant of the curve. | ||
253 | * y^2 + x*y = x^3 + a*x^2 + b is an elliptic curve <=> b != 0 (mod p) | ||
254 | */ | ||
255 | int ec_GF2m_simple_group_check_discriminant(const EC_GROUP *group, BN_CTX *ctx) | ||
256 | { | ||
257 | int ret = 0; | ||
258 | BIGNUM *b; | ||
259 | BN_CTX *new_ctx = NULL; | ||
260 | |||
261 | if (ctx == NULL) | ||
262 | { | ||
263 | ctx = new_ctx = BN_CTX_new(); | ||
264 | if (ctx == NULL) | ||
265 | { | ||
266 | ECerr(EC_F_EC_GF2M_SIMPLE_GROUP_CHECK_DISCRIMINANT, ERR_R_MALLOC_FAILURE); | ||
267 | goto err; | ||
268 | } | ||
269 | } | ||
270 | BN_CTX_start(ctx); | ||
271 | b = BN_CTX_get(ctx); | ||
272 | if (b == NULL) goto err; | ||
273 | |||
274 | if (!BN_GF2m_mod_arr(b, &group->b, group->poly)) goto err; | ||
275 | |||
276 | /* check the discriminant: | ||
277 | * y^2 + x*y = x^3 + a*x^2 + b is an elliptic curve <=> b != 0 (mod p) | ||
278 | */ | ||
279 | if (BN_is_zero(b)) goto err; | ||
280 | |||
281 | ret = 1; | ||
282 | |||
283 | err: | ||
284 | if (ctx != NULL) | ||
285 | BN_CTX_end(ctx); | ||
286 | if (new_ctx != NULL) | ||
287 | BN_CTX_free(new_ctx); | ||
288 | return ret; | ||
289 | } | ||
290 | |||
291 | |||
292 | /* Initializes an EC_POINT. */ | ||
293 | int ec_GF2m_simple_point_init(EC_POINT *point) | ||
294 | { | ||
295 | BN_init(&point->X); | ||
296 | BN_init(&point->Y); | ||
297 | BN_init(&point->Z); | ||
298 | return 1; | ||
299 | } | ||
300 | |||
301 | |||
302 | /* Frees an EC_POINT. */ | ||
303 | void ec_GF2m_simple_point_finish(EC_POINT *point) | ||
304 | { | ||
305 | BN_free(&point->X); | ||
306 | BN_free(&point->Y); | ||
307 | BN_free(&point->Z); | ||
308 | } | ||
309 | |||
310 | |||
311 | /* Clears and frees an EC_POINT. */ | ||
312 | void ec_GF2m_simple_point_clear_finish(EC_POINT *point) | ||
313 | { | ||
314 | BN_clear_free(&point->X); | ||
315 | BN_clear_free(&point->Y); | ||
316 | BN_clear_free(&point->Z); | ||
317 | point->Z_is_one = 0; | ||
318 | } | ||
319 | |||
320 | |||
321 | /* Copy the contents of one EC_POINT into another. Assumes dest is initialized. */ | ||
322 | int ec_GF2m_simple_point_copy(EC_POINT *dest, const EC_POINT *src) | ||
323 | { | ||
324 | if (!BN_copy(&dest->X, &src->X)) return 0; | ||
325 | if (!BN_copy(&dest->Y, &src->Y)) return 0; | ||
326 | if (!BN_copy(&dest->Z, &src->Z)) return 0; | ||
327 | dest->Z_is_one = src->Z_is_one; | ||
328 | |||
329 | return 1; | ||
330 | } | ||
331 | |||
332 | |||
333 | /* Set an EC_POINT to the point at infinity. | ||
334 | * A point at infinity is represented by having Z=0. | ||
335 | */ | ||
336 | int ec_GF2m_simple_point_set_to_infinity(const EC_GROUP *group, EC_POINT *point) | ||
337 | { | ||
338 | point->Z_is_one = 0; | ||
339 | BN_zero(&point->Z); | ||
340 | return 1; | ||
341 | } | ||
342 | |||
343 | |||
344 | /* Set the coordinates of an EC_POINT using affine coordinates. | ||
345 | * Note that the simple implementation only uses affine coordinates. | ||
346 | */ | ||
347 | int ec_GF2m_simple_point_set_affine_coordinates(const EC_GROUP *group, EC_POINT *point, | ||
348 | const BIGNUM *x, const BIGNUM *y, BN_CTX *ctx) | ||
349 | { | ||
350 | int ret = 0; | ||
351 | if (x == NULL || y == NULL) | ||
352 | { | ||
353 | ECerr(EC_F_EC_GF2M_SIMPLE_POINT_SET_AFFINE_COORDINATES, ERR_R_PASSED_NULL_PARAMETER); | ||
354 | return 0; | ||
355 | } | ||
356 | |||
357 | if (!BN_copy(&point->X, x)) goto err; | ||
358 | BN_set_negative(&point->X, 0); | ||
359 | if (!BN_copy(&point->Y, y)) goto err; | ||
360 | BN_set_negative(&point->Y, 0); | ||
361 | if (!BN_copy(&point->Z, BN_value_one())) goto err; | ||
362 | BN_set_negative(&point->Z, 0); | ||
363 | point->Z_is_one = 1; | ||
364 | ret = 1; | ||
365 | |||
366 | err: | ||
367 | return ret; | ||
368 | } | ||
369 | |||
370 | |||
371 | /* Gets the affine coordinates of an EC_POINT. | ||
372 | * Note that the simple implementation only uses affine coordinates. | ||
373 | */ | ||
374 | int ec_GF2m_simple_point_get_affine_coordinates(const EC_GROUP *group, const EC_POINT *point, | ||
375 | BIGNUM *x, BIGNUM *y, BN_CTX *ctx) | ||
376 | { | ||
377 | int ret = 0; | ||
378 | |||
379 | if (EC_POINT_is_at_infinity(group, point)) | ||
380 | { | ||
381 | ECerr(EC_F_EC_GF2M_SIMPLE_POINT_GET_AFFINE_COORDINATES, EC_R_POINT_AT_INFINITY); | ||
382 | return 0; | ||
383 | } | ||
384 | |||
385 | if (BN_cmp(&point->Z, BN_value_one())) | ||
386 | { | ||
387 | ECerr(EC_F_EC_GF2M_SIMPLE_POINT_GET_AFFINE_COORDINATES, ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED); | ||
388 | return 0; | ||
389 | } | ||
390 | if (x != NULL) | ||
391 | { | ||
392 | if (!BN_copy(x, &point->X)) goto err; | ||
393 | BN_set_negative(x, 0); | ||
394 | } | ||
395 | if (y != NULL) | ||
396 | { | ||
397 | if (!BN_copy(y, &point->Y)) goto err; | ||
398 | BN_set_negative(y, 0); | ||
399 | } | ||
400 | ret = 1; | ||
401 | |||
402 | err: | ||
403 | return ret; | ||
404 | } | ||
405 | |||
406 | |||
407 | /* Include patented algorithms. */ | ||
408 | #include "ec2_smpt.c" | ||
409 | |||
410 | |||
411 | /* Converts an EC_POINT to an octet string. | ||
412 | * If buf is NULL, the encoded length will be returned. | ||
413 | * If the length len of buf is smaller than required an error will be returned. | ||
414 | * | ||
415 | * The point compression section of this function is patented by Certicom Corp. | ||
416 | * under US Patent 6,141,420. Point compression is disabled by default and can | ||
417 | * be enabled by defining the preprocessor macro OPENSSL_EC_BIN_PT_COMP at | ||
418 | * Configure-time. | ||
419 | */ | ||
420 | size_t ec_GF2m_simple_point2oct(const EC_GROUP *group, const EC_POINT *point, point_conversion_form_t form, | ||
421 | unsigned char *buf, size_t len, BN_CTX *ctx) | ||
422 | { | ||
423 | size_t ret; | ||
424 | BN_CTX *new_ctx = NULL; | ||
425 | int used_ctx = 0; | ||
426 | BIGNUM *x, *y, *yxi; | ||
427 | size_t field_len, i, skip; | ||
428 | |||
429 | #ifndef OPENSSL_EC_BIN_PT_COMP | ||
430 | if ((form == POINT_CONVERSION_COMPRESSED) || (form == POINT_CONVERSION_HYBRID)) | ||
431 | { | ||
432 | ECerr(EC_F_EC_GF2M_SIMPLE_POINT2OCT, ERR_R_DISABLED); | ||
433 | goto err; | ||
434 | } | ||
435 | #endif | ||
436 | |||
437 | if ((form != POINT_CONVERSION_COMPRESSED) | ||
438 | && (form != POINT_CONVERSION_UNCOMPRESSED) | ||
439 | && (form != POINT_CONVERSION_HYBRID)) | ||
440 | { | ||
441 | ECerr(EC_F_EC_GF2M_SIMPLE_POINT2OCT, EC_R_INVALID_FORM); | ||
442 | goto err; | ||
443 | } | ||
444 | |||
445 | if (EC_POINT_is_at_infinity(group, point)) | ||
446 | { | ||
447 | /* encodes to a single 0 octet */ | ||
448 | if (buf != NULL) | ||
449 | { | ||
450 | if (len < 1) | ||
451 | { | ||
452 | ECerr(EC_F_EC_GF2M_SIMPLE_POINT2OCT, EC_R_BUFFER_TOO_SMALL); | ||
453 | return 0; | ||
454 | } | ||
455 | buf[0] = 0; | ||
456 | } | ||
457 | return 1; | ||
458 | } | ||
459 | |||
460 | |||
461 | /* ret := required output buffer length */ | ||
462 | field_len = (EC_GROUP_get_degree(group) + 7) / 8; | ||
463 | ret = (form == POINT_CONVERSION_COMPRESSED) ? 1 + field_len : 1 + 2*field_len; | ||
464 | |||
465 | /* if 'buf' is NULL, just return required length */ | ||
466 | if (buf != NULL) | ||
467 | { | ||
468 | if (len < ret) | ||
469 | { | ||
470 | ECerr(EC_F_EC_GF2M_SIMPLE_POINT2OCT, EC_R_BUFFER_TOO_SMALL); | ||
471 | goto err; | ||
472 | } | ||
473 | |||
474 | if (ctx == NULL) | ||
475 | { | ||
476 | ctx = new_ctx = BN_CTX_new(); | ||
477 | if (ctx == NULL) | ||
478 | return 0; | ||
479 | } | ||
480 | |||
481 | BN_CTX_start(ctx); | ||
482 | used_ctx = 1; | ||
483 | x = BN_CTX_get(ctx); | ||
484 | y = BN_CTX_get(ctx); | ||
485 | yxi = BN_CTX_get(ctx); | ||
486 | if (yxi == NULL) goto err; | ||
487 | |||
488 | if (!EC_POINT_get_affine_coordinates_GF2m(group, point, x, y, ctx)) goto err; | ||
489 | |||
490 | buf[0] = form; | ||
491 | #ifdef OPENSSL_EC_BIN_PT_COMP | ||
492 | if ((form != POINT_CONVERSION_UNCOMPRESSED) && !BN_is_zero(x)) | ||
493 | { | ||
494 | if (!group->meth->field_div(group, yxi, y, x, ctx)) goto err; | ||
495 | if (BN_is_odd(yxi)) buf[0]++; | ||
496 | } | ||
497 | #endif | ||
498 | |||
499 | i = 1; | ||
500 | |||
501 | skip = field_len - BN_num_bytes(x); | ||
502 | if (skip > field_len) | ||
503 | { | ||
504 | ECerr(EC_F_EC_GF2M_SIMPLE_POINT2OCT, ERR_R_INTERNAL_ERROR); | ||
505 | goto err; | ||
506 | } | ||
507 | while (skip > 0) | ||
508 | { | ||
509 | buf[i++] = 0; | ||
510 | skip--; | ||
511 | } | ||
512 | skip = BN_bn2bin(x, buf + i); | ||
513 | i += skip; | ||
514 | if (i != 1 + field_len) | ||
515 | { | ||
516 | ECerr(EC_F_EC_GF2M_SIMPLE_POINT2OCT, ERR_R_INTERNAL_ERROR); | ||
517 | goto err; | ||
518 | } | ||
519 | |||
520 | if (form == POINT_CONVERSION_UNCOMPRESSED || form == POINT_CONVERSION_HYBRID) | ||
521 | { | ||
522 | skip = field_len - BN_num_bytes(y); | ||
523 | if (skip > field_len) | ||
524 | { | ||
525 | ECerr(EC_F_EC_GF2M_SIMPLE_POINT2OCT, ERR_R_INTERNAL_ERROR); | ||
526 | goto err; | ||
527 | } | ||
528 | while (skip > 0) | ||
529 | { | ||
530 | buf[i++] = 0; | ||
531 | skip--; | ||
532 | } | ||
533 | skip = BN_bn2bin(y, buf + i); | ||
534 | i += skip; | ||
535 | } | ||
536 | |||
537 | if (i != ret) | ||
538 | { | ||
539 | ECerr(EC_F_EC_GF2M_SIMPLE_POINT2OCT, ERR_R_INTERNAL_ERROR); | ||
540 | goto err; | ||
541 | } | ||
542 | } | ||
543 | |||
544 | if (used_ctx) | ||
545 | BN_CTX_end(ctx); | ||
546 | if (new_ctx != NULL) | ||
547 | BN_CTX_free(new_ctx); | ||
548 | return ret; | ||
549 | |||
550 | err: | ||
551 | if (used_ctx) | ||
552 | BN_CTX_end(ctx); | ||
553 | if (new_ctx != NULL) | ||
554 | BN_CTX_free(new_ctx); | ||
555 | return 0; | ||
556 | } | ||
557 | |||
558 | |||
559 | /* Converts an octet string representation to an EC_POINT. | ||
560 | * Note that the simple implementation only uses affine coordinates. | ||
561 | */ | ||
562 | int ec_GF2m_simple_oct2point(const EC_GROUP *group, EC_POINT *point, | ||
563 | const unsigned char *buf, size_t len, BN_CTX *ctx) | ||
564 | { | ||
565 | point_conversion_form_t form; | ||
566 | int y_bit; | ||
567 | BN_CTX *new_ctx = NULL; | ||
568 | BIGNUM *x, *y, *yxi; | ||
569 | size_t field_len, enc_len; | ||
570 | int ret = 0; | ||
571 | |||
572 | if (len == 0) | ||
573 | { | ||
574 | ECerr(EC_F_EC_GF2M_SIMPLE_OCT2POINT, EC_R_BUFFER_TOO_SMALL); | ||
575 | return 0; | ||
576 | } | ||
577 | form = buf[0]; | ||
578 | y_bit = form & 1; | ||
579 | form = form & ~1U; | ||
580 | if ((form != 0) && (form != POINT_CONVERSION_COMPRESSED) | ||
581 | && (form != POINT_CONVERSION_UNCOMPRESSED) | ||
582 | && (form != POINT_CONVERSION_HYBRID)) | ||
583 | { | ||
584 | ECerr(EC_F_EC_GF2M_SIMPLE_OCT2POINT, EC_R_INVALID_ENCODING); | ||
585 | return 0; | ||
586 | } | ||
587 | if ((form == 0 || form == POINT_CONVERSION_UNCOMPRESSED) && y_bit) | ||
588 | { | ||
589 | ECerr(EC_F_EC_GF2M_SIMPLE_OCT2POINT, EC_R_INVALID_ENCODING); | ||
590 | return 0; | ||
591 | } | ||
592 | |||
593 | if (form == 0) | ||
594 | { | ||
595 | if (len != 1) | ||
596 | { | ||
597 | ECerr(EC_F_EC_GF2M_SIMPLE_OCT2POINT, EC_R_INVALID_ENCODING); | ||
598 | return 0; | ||
599 | } | ||
600 | |||
601 | return EC_POINT_set_to_infinity(group, point); | ||
602 | } | ||
603 | |||
604 | field_len = (EC_GROUP_get_degree(group) + 7) / 8; | ||
605 | enc_len = (form == POINT_CONVERSION_COMPRESSED) ? 1 + field_len : 1 + 2*field_len; | ||
606 | |||
607 | if (len != enc_len) | ||
608 | { | ||
609 | ECerr(EC_F_EC_GF2M_SIMPLE_OCT2POINT, EC_R_INVALID_ENCODING); | ||
610 | return 0; | ||
611 | } | ||
612 | |||
613 | if (ctx == NULL) | ||
614 | { | ||
615 | ctx = new_ctx = BN_CTX_new(); | ||
616 | if (ctx == NULL) | ||
617 | return 0; | ||
618 | } | ||
619 | |||
620 | BN_CTX_start(ctx); | ||
621 | x = BN_CTX_get(ctx); | ||
622 | y = BN_CTX_get(ctx); | ||
623 | yxi = BN_CTX_get(ctx); | ||
624 | if (yxi == NULL) goto err; | ||
625 | |||
626 | if (!BN_bin2bn(buf + 1, field_len, x)) goto err; | ||
627 | if (BN_ucmp(x, &group->field) >= 0) | ||
628 | { | ||
629 | ECerr(EC_F_EC_GF2M_SIMPLE_OCT2POINT, EC_R_INVALID_ENCODING); | ||
630 | goto err; | ||
631 | } | ||
632 | |||
633 | if (form == POINT_CONVERSION_COMPRESSED) | ||
634 | { | ||
635 | if (!EC_POINT_set_compressed_coordinates_GF2m(group, point, x, y_bit, ctx)) goto err; | ||
636 | } | ||
637 | else | ||
638 | { | ||
639 | if (!BN_bin2bn(buf + 1 + field_len, field_len, y)) goto err; | ||
640 | if (BN_ucmp(y, &group->field) >= 0) | ||
641 | { | ||
642 | ECerr(EC_F_EC_GF2M_SIMPLE_OCT2POINT, EC_R_INVALID_ENCODING); | ||
643 | goto err; | ||
644 | } | ||
645 | if (form == POINT_CONVERSION_HYBRID) | ||
646 | { | ||
647 | if (!group->meth->field_div(group, yxi, y, x, ctx)) goto err; | ||
648 | if (y_bit != BN_is_odd(yxi)) | ||
649 | { | ||
650 | ECerr(EC_F_EC_GF2M_SIMPLE_OCT2POINT, EC_R_INVALID_ENCODING); | ||
651 | goto err; | ||
652 | } | ||
653 | } | ||
654 | |||
655 | if (!EC_POINT_set_affine_coordinates_GF2m(group, point, x, y, ctx)) goto err; | ||
656 | } | ||
657 | |||
658 | if (!EC_POINT_is_on_curve(group, point, ctx)) /* test required by X9.62 */ | ||
659 | { | ||
660 | ECerr(EC_F_EC_GF2M_SIMPLE_OCT2POINT, EC_R_POINT_IS_NOT_ON_CURVE); | ||
661 | goto err; | ||
662 | } | ||
663 | |||
664 | ret = 1; | ||
665 | |||
666 | err: | ||
667 | BN_CTX_end(ctx); | ||
668 | if (new_ctx != NULL) | ||
669 | BN_CTX_free(new_ctx); | ||
670 | return ret; | ||
671 | } | ||
672 | |||
673 | |||
674 | /* Computes a + b and stores the result in r. r could be a or b, a could be b. | ||
675 | * Uses algorithm A.10.2 of IEEE P1363. | ||
676 | */ | ||
677 | int ec_GF2m_simple_add(const EC_GROUP *group, EC_POINT *r, const EC_POINT *a, const EC_POINT *b, BN_CTX *ctx) | ||
678 | { | ||
679 | BN_CTX *new_ctx = NULL; | ||
680 | BIGNUM *x0, *y0, *x1, *y1, *x2, *y2, *s, *t; | ||
681 | int ret = 0; | ||
682 | |||
683 | if (EC_POINT_is_at_infinity(group, a)) | ||
684 | { | ||
685 | if (!EC_POINT_copy(r, b)) return 0; | ||
686 | return 1; | ||
687 | } | ||
688 | |||
689 | if (EC_POINT_is_at_infinity(group, b)) | ||
690 | { | ||
691 | if (!EC_POINT_copy(r, a)) return 0; | ||
692 | return 1; | ||
693 | } | ||
694 | |||
695 | if (ctx == NULL) | ||
696 | { | ||
697 | ctx = new_ctx = BN_CTX_new(); | ||
698 | if (ctx == NULL) | ||
699 | return 0; | ||
700 | } | ||
701 | |||
702 | BN_CTX_start(ctx); | ||
703 | x0 = BN_CTX_get(ctx); | ||
704 | y0 = BN_CTX_get(ctx); | ||
705 | x1 = BN_CTX_get(ctx); | ||
706 | y1 = BN_CTX_get(ctx); | ||
707 | x2 = BN_CTX_get(ctx); | ||
708 | y2 = BN_CTX_get(ctx); | ||
709 | s = BN_CTX_get(ctx); | ||
710 | t = BN_CTX_get(ctx); | ||
711 | if (t == NULL) goto err; | ||
712 | |||
713 | if (a->Z_is_one) | ||
714 | { | ||
715 | if (!BN_copy(x0, &a->X)) goto err; | ||
716 | if (!BN_copy(y0, &a->Y)) goto err; | ||
717 | } | ||
718 | else | ||
719 | { | ||
720 | if (!EC_POINT_get_affine_coordinates_GF2m(group, a, x0, y0, ctx)) goto err; | ||
721 | } | ||
722 | if (b->Z_is_one) | ||
723 | { | ||
724 | if (!BN_copy(x1, &b->X)) goto err; | ||
725 | if (!BN_copy(y1, &b->Y)) goto err; | ||
726 | } | ||
727 | else | ||
728 | { | ||
729 | if (!EC_POINT_get_affine_coordinates_GF2m(group, b, x1, y1, ctx)) goto err; | ||
730 | } | ||
731 | |||
732 | |||
733 | if (BN_GF2m_cmp(x0, x1)) | ||
734 | { | ||
735 | if (!BN_GF2m_add(t, x0, x1)) goto err; | ||
736 | if (!BN_GF2m_add(s, y0, y1)) goto err; | ||
737 | if (!group->meth->field_div(group, s, s, t, ctx)) goto err; | ||
738 | if (!group->meth->field_sqr(group, x2, s, ctx)) goto err; | ||
739 | if (!BN_GF2m_add(x2, x2, &group->a)) goto err; | ||
740 | if (!BN_GF2m_add(x2, x2, s)) goto err; | ||
741 | if (!BN_GF2m_add(x2, x2, t)) goto err; | ||
742 | } | ||
743 | else | ||
744 | { | ||
745 | if (BN_GF2m_cmp(y0, y1) || BN_is_zero(x1)) | ||
746 | { | ||
747 | if (!EC_POINT_set_to_infinity(group, r)) goto err; | ||
748 | ret = 1; | ||
749 | goto err; | ||
750 | } | ||
751 | if (!group->meth->field_div(group, s, y1, x1, ctx)) goto err; | ||
752 | if (!BN_GF2m_add(s, s, x1)) goto err; | ||
753 | |||
754 | if (!group->meth->field_sqr(group, x2, s, ctx)) goto err; | ||
755 | if (!BN_GF2m_add(x2, x2, s)) goto err; | ||
756 | if (!BN_GF2m_add(x2, x2, &group->a)) goto err; | ||
757 | } | ||
758 | |||
759 | if (!BN_GF2m_add(y2, x1, x2)) goto err; | ||
760 | if (!group->meth->field_mul(group, y2, y2, s, ctx)) goto err; | ||
761 | if (!BN_GF2m_add(y2, y2, x2)) goto err; | ||
762 | if (!BN_GF2m_add(y2, y2, y1)) goto err; | ||
763 | |||
764 | if (!EC_POINT_set_affine_coordinates_GF2m(group, r, x2, y2, ctx)) goto err; | ||
765 | |||
766 | ret = 1; | ||
767 | |||
768 | err: | ||
769 | BN_CTX_end(ctx); | ||
770 | if (new_ctx != NULL) | ||
771 | BN_CTX_free(new_ctx); | ||
772 | return ret; | ||
773 | } | ||
774 | |||
775 | |||
776 | /* Computes 2 * a and stores the result in r. r could be a. | ||
777 | * Uses algorithm A.10.2 of IEEE P1363. | ||
778 | */ | ||
779 | int ec_GF2m_simple_dbl(const EC_GROUP *group, EC_POINT *r, const EC_POINT *a, BN_CTX *ctx) | ||
780 | { | ||
781 | return ec_GF2m_simple_add(group, r, a, a, ctx); | ||
782 | } | ||
783 | |||
784 | |||
785 | int ec_GF2m_simple_invert(const EC_GROUP *group, EC_POINT *point, BN_CTX *ctx) | ||
786 | { | ||
787 | if (EC_POINT_is_at_infinity(group, point) || BN_is_zero(&point->Y)) | ||
788 | /* point is its own inverse */ | ||
789 | return 1; | ||
790 | |||
791 | if (!EC_POINT_make_affine(group, point, ctx)) return 0; | ||
792 | return BN_GF2m_add(&point->Y, &point->X, &point->Y); | ||
793 | } | ||
794 | |||
795 | |||
796 | /* Indicates whether the given point is the point at infinity. */ | ||
797 | int ec_GF2m_simple_is_at_infinity(const EC_GROUP *group, const EC_POINT *point) | ||
798 | { | ||
799 | return BN_is_zero(&point->Z); | ||
800 | } | ||
801 | |||
802 | |||
803 | /* Determines whether the given EC_POINT is an actual point on the curve defined | ||
804 | * in the EC_GROUP. A point is valid if it satisfies the Weierstrass equation: | ||
805 | * y^2 + x*y = x^3 + a*x^2 + b. | ||
806 | */ | ||
807 | int ec_GF2m_simple_is_on_curve(const EC_GROUP *group, const EC_POINT *point, BN_CTX *ctx) | ||
808 | { | ||
809 | int ret = -1; | ||
810 | BN_CTX *new_ctx = NULL; | ||
811 | BIGNUM *lh, *y2; | ||
812 | int (*field_mul)(const EC_GROUP *, BIGNUM *, const BIGNUM *, const BIGNUM *, BN_CTX *); | ||
813 | int (*field_sqr)(const EC_GROUP *, BIGNUM *, const BIGNUM *, BN_CTX *); | ||
814 | |||
815 | if (EC_POINT_is_at_infinity(group, point)) | ||
816 | return 1; | ||
817 | |||
818 | field_mul = group->meth->field_mul; | ||
819 | field_sqr = group->meth->field_sqr; | ||
820 | |||
821 | /* only support affine coordinates */ | ||
822 | if (!point->Z_is_one) goto err; | ||
823 | |||
824 | if (ctx == NULL) | ||
825 | { | ||
826 | ctx = new_ctx = BN_CTX_new(); | ||
827 | if (ctx == NULL) | ||
828 | return -1; | ||
829 | } | ||
830 | |||
831 | BN_CTX_start(ctx); | ||
832 | y2 = BN_CTX_get(ctx); | ||
833 | lh = BN_CTX_get(ctx); | ||
834 | if (lh == NULL) goto err; | ||
835 | |||
836 | /* We have a curve defined by a Weierstrass equation | ||
837 | * y^2 + x*y = x^3 + a*x^2 + b. | ||
838 | * <=> x^3 + a*x^2 + x*y + b + y^2 = 0 | ||
839 | * <=> ((x + a) * x + y ) * x + b + y^2 = 0 | ||
840 | */ | ||
841 | if (!BN_GF2m_add(lh, &point->X, &group->a)) goto err; | ||
842 | if (!field_mul(group, lh, lh, &point->X, ctx)) goto err; | ||
843 | if (!BN_GF2m_add(lh, lh, &point->Y)) goto err; | ||
844 | if (!field_mul(group, lh, lh, &point->X, ctx)) goto err; | ||
845 | if (!BN_GF2m_add(lh, lh, &group->b)) goto err; | ||
846 | if (!field_sqr(group, y2, &point->Y, ctx)) goto err; | ||
847 | if (!BN_GF2m_add(lh, lh, y2)) goto err; | ||
848 | ret = BN_is_zero(lh); | ||
849 | err: | ||
850 | if (ctx) BN_CTX_end(ctx); | ||
851 | if (new_ctx) BN_CTX_free(new_ctx); | ||
852 | return ret; | ||
853 | } | ||
854 | |||
855 | |||
856 | /* Indicates whether two points are equal. | ||
857 | * Return values: | ||
858 | * -1 error | ||
859 | * 0 equal (in affine coordinates) | ||
860 | * 1 not equal | ||
861 | */ | ||
862 | int ec_GF2m_simple_cmp(const EC_GROUP *group, const EC_POINT *a, const EC_POINT *b, BN_CTX *ctx) | ||
863 | { | ||
864 | BIGNUM *aX, *aY, *bX, *bY; | ||
865 | BN_CTX *new_ctx = NULL; | ||
866 | int ret = -1; | ||
867 | |||
868 | if (EC_POINT_is_at_infinity(group, a)) | ||
869 | { | ||
870 | return EC_POINT_is_at_infinity(group, b) ? 0 : 1; | ||
871 | } | ||
872 | |||
873 | if (a->Z_is_one && b->Z_is_one) | ||
874 | { | ||
875 | return ((BN_cmp(&a->X, &b->X) == 0) && BN_cmp(&a->Y, &b->Y) == 0) ? 0 : 1; | ||
876 | } | ||
877 | |||
878 | if (ctx == NULL) | ||
879 | { | ||
880 | ctx = new_ctx = BN_CTX_new(); | ||
881 | if (ctx == NULL) | ||
882 | return -1; | ||
883 | } | ||
884 | |||
885 | BN_CTX_start(ctx); | ||
886 | aX = BN_CTX_get(ctx); | ||
887 | aY = BN_CTX_get(ctx); | ||
888 | bX = BN_CTX_get(ctx); | ||
889 | bY = BN_CTX_get(ctx); | ||
890 | if (bY == NULL) goto err; | ||
891 | |||
892 | if (!EC_POINT_get_affine_coordinates_GF2m(group, a, aX, aY, ctx)) goto err; | ||
893 | if (!EC_POINT_get_affine_coordinates_GF2m(group, b, bX, bY, ctx)) goto err; | ||
894 | ret = ((BN_cmp(aX, bX) == 0) && BN_cmp(aY, bY) == 0) ? 0 : 1; | ||
895 | |||
896 | err: | ||
897 | if (ctx) BN_CTX_end(ctx); | ||
898 | if (new_ctx) BN_CTX_free(new_ctx); | ||
899 | return ret; | ||
900 | } | ||
901 | |||
902 | |||
903 | /* Forces the given EC_POINT to internally use affine coordinates. */ | ||
904 | int ec_GF2m_simple_make_affine(const EC_GROUP *group, EC_POINT *point, BN_CTX *ctx) | ||
905 | { | ||
906 | BN_CTX *new_ctx = NULL; | ||
907 | BIGNUM *x, *y; | ||
908 | int ret = 0; | ||
909 | |||
910 | if (point->Z_is_one || EC_POINT_is_at_infinity(group, point)) | ||
911 | return 1; | ||
912 | |||
913 | if (ctx == NULL) | ||
914 | { | ||
915 | ctx = new_ctx = BN_CTX_new(); | ||
916 | if (ctx == NULL) | ||
917 | return 0; | ||
918 | } | ||
919 | |||
920 | BN_CTX_start(ctx); | ||
921 | x = BN_CTX_get(ctx); | ||
922 | y = BN_CTX_get(ctx); | ||
923 | if (y == NULL) goto err; | ||
924 | |||
925 | if (!EC_POINT_get_affine_coordinates_GF2m(group, point, x, y, ctx)) goto err; | ||
926 | if (!BN_copy(&point->X, x)) goto err; | ||
927 | if (!BN_copy(&point->Y, y)) goto err; | ||
928 | if (!BN_one(&point->Z)) goto err; | ||
929 | |||
930 | ret = 1; | ||
931 | |||
932 | err: | ||
933 | if (ctx) BN_CTX_end(ctx); | ||
934 | if (new_ctx) BN_CTX_free(new_ctx); | ||
935 | return ret; | ||
936 | } | ||
937 | |||
938 | |||
939 | /* Forces each of the EC_POINTs in the given array to use affine coordinates. */ | ||
940 | int ec_GF2m_simple_points_make_affine(const EC_GROUP *group, size_t num, EC_POINT *points[], BN_CTX *ctx) | ||
941 | { | ||
942 | size_t i; | ||
943 | |||
944 | for (i = 0; i < num; i++) | ||
945 | { | ||
946 | if (!group->meth->make_affine(group, points[i], ctx)) return 0; | ||
947 | } | ||
948 | |||
949 | return 1; | ||
950 | } | ||
951 | |||
952 | |||
953 | /* Wrapper to simple binary polynomial field multiplication implementation. */ | ||
954 | int ec_GF2m_simple_field_mul(const EC_GROUP *group, BIGNUM *r, const BIGNUM *a, const BIGNUM *b, BN_CTX *ctx) | ||
955 | { | ||
956 | return BN_GF2m_mod_mul_arr(r, a, b, group->poly, ctx); | ||
957 | } | ||
958 | |||
959 | |||
960 | /* Wrapper to simple binary polynomial field squaring implementation. */ | ||
961 | int ec_GF2m_simple_field_sqr(const EC_GROUP *group, BIGNUM *r, const BIGNUM *a, BN_CTX *ctx) | ||
962 | { | ||
963 | return BN_GF2m_mod_sqr_arr(r, a, group->poly, ctx); | ||
964 | } | ||
965 | |||
966 | |||
967 | /* Wrapper to simple binary polynomial field division implementation. */ | ||
968 | int ec_GF2m_simple_field_div(const EC_GROUP *group, BIGNUM *r, const BIGNUM *a, const BIGNUM *b, BN_CTX *ctx) | ||
969 | { | ||
970 | return BN_GF2m_mod_div(r, a, b, &group->field, ctx); | ||
971 | } | ||
diff --git a/src/lib/libcrypto/ec/ec_asn1.c b/src/lib/libcrypto/ec/ec_asn1.c deleted file mode 100644 index ae55539859..0000000000 --- a/src/lib/libcrypto/ec/ec_asn1.c +++ /dev/null | |||
@@ -1,1429 +0,0 @@ | |||
1 | /* crypto/ec/ec_asn1.c */ | ||
2 | /* | ||
3 | * Written by Nils Larsch for the OpenSSL project. | ||
4 | */ | ||
5 | /* ==================================================================== | ||
6 | * Copyright (c) 2000-2003 The OpenSSL Project. All rights reserved. | ||
7 | * | ||
8 | * Redistribution and use in source and binary forms, with or without | ||
9 | * modification, are permitted provided that the following conditions | ||
10 | * are met: | ||
11 | * | ||
12 | * 1. Redistributions of source code must retain the above copyright | ||
13 | * notice, this list of conditions and the following disclaimer. | ||
14 | * | ||
15 | * 2. Redistributions in binary form must reproduce the above copyright | ||
16 | * notice, this list of conditions and the following disclaimer in | ||
17 | * the documentation and/or other materials provided with the | ||
18 | * distribution. | ||
19 | * | ||
20 | * 3. All advertising materials mentioning features or use of this | ||
21 | * software must display the following acknowledgment: | ||
22 | * "This product includes software developed by the OpenSSL Project | ||
23 | * for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)" | ||
24 | * | ||
25 | * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to | ||
26 | * endorse or promote products derived from this software without | ||
27 | * prior written permission. For written permission, please contact | ||
28 | * licensing@OpenSSL.org. | ||
29 | * | ||
30 | * 5. Products derived from this software may not be called "OpenSSL" | ||
31 | * nor may "OpenSSL" appear in their names without prior written | ||
32 | * permission of the OpenSSL Project. | ||
33 | * | ||
34 | * 6. Redistributions of any form whatsoever must retain the following | ||
35 | * acknowledgment: | ||
36 | * "This product includes software developed by the OpenSSL Project | ||
37 | * for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)" | ||
38 | * | ||
39 | * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY | ||
40 | * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | ||
41 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR | ||
42 | * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR | ||
43 | * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, | ||
44 | * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT | ||
45 | * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; | ||
46 | * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | ||
47 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, | ||
48 | * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) | ||
49 | * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | ||
50 | * OF THE POSSIBILITY OF SUCH DAMAGE. | ||
51 | * ==================================================================== | ||
52 | * | ||
53 | * This product includes cryptographic software written by Eric Young | ||
54 | * (eay@cryptsoft.com). This product includes software written by Tim | ||
55 | * Hudson (tjh@cryptsoft.com). | ||
56 | * | ||
57 | */ | ||
58 | |||
59 | #include <string.h> | ||
60 | #include "ec_lcl.h" | ||
61 | #include <openssl/err.h> | ||
62 | #include <openssl/asn1t.h> | ||
63 | #include <openssl/objects.h> | ||
64 | |||
65 | |||
66 | int EC_GROUP_get_basis_type(const EC_GROUP *group) | ||
67 | { | ||
68 | int i=0; | ||
69 | |||
70 | if (EC_METHOD_get_field_type(EC_GROUP_method_of(group)) != | ||
71 | NID_X9_62_characteristic_two_field) | ||
72 | /* everything else is currently not supported */ | ||
73 | return 0; | ||
74 | |||
75 | while (group->poly[i] != 0) | ||
76 | i++; | ||
77 | |||
78 | if (i == 4) | ||
79 | return NID_X9_62_ppBasis; | ||
80 | else if (i == 2) | ||
81 | return NID_X9_62_tpBasis; | ||
82 | else | ||
83 | /* everything else is currently not supported */ | ||
84 | return 0; | ||
85 | } | ||
86 | |||
87 | int EC_GROUP_get_trinomial_basis(const EC_GROUP *group, unsigned int *k) | ||
88 | { | ||
89 | if (group == NULL) | ||
90 | return 0; | ||
91 | |||
92 | if (EC_GROUP_method_of(group)->group_set_curve != ec_GF2m_simple_group_set_curve | ||
93 | || !((group->poly[0] != 0) && (group->poly[1] != 0) && (group->poly[2] == 0))) | ||
94 | { | ||
95 | ECerr(EC_F_EC_GROUP_GET_TRINOMIAL_BASIS, ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED); | ||
96 | return 0; | ||
97 | } | ||
98 | |||
99 | if (k) | ||
100 | *k = group->poly[1]; | ||
101 | |||
102 | return 1; | ||
103 | } | ||
104 | |||
105 | int EC_GROUP_get_pentanomial_basis(const EC_GROUP *group, unsigned int *k1, | ||
106 | unsigned int *k2, unsigned int *k3) | ||
107 | { | ||
108 | if (group == NULL) | ||
109 | return 0; | ||
110 | |||
111 | if (EC_GROUP_method_of(group)->group_set_curve != ec_GF2m_simple_group_set_curve | ||
112 | || !((group->poly[0] != 0) && (group->poly[1] != 0) && (group->poly[2] != 0) && (group->poly[3] != 0) && (group->poly[4] == 0))) | ||
113 | { | ||
114 | ECerr(EC_F_EC_GROUP_GET_PENTANOMIAL_BASIS, ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED); | ||
115 | return 0; | ||
116 | } | ||
117 | |||
118 | if (k1) | ||
119 | *k1 = group->poly[3]; | ||
120 | if (k2) | ||
121 | *k2 = group->poly[2]; | ||
122 | if (k3) | ||
123 | *k3 = group->poly[1]; | ||
124 | |||
125 | return 1; | ||
126 | } | ||
127 | |||
128 | |||
129 | |||
130 | /* some structures needed for the asn1 encoding */ | ||
131 | typedef struct x9_62_pentanomial_st { | ||
132 | long k1; | ||
133 | long k2; | ||
134 | long k3; | ||
135 | } X9_62_PENTANOMIAL; | ||
136 | |||
137 | typedef struct x9_62_characteristic_two_st { | ||
138 | long m; | ||
139 | ASN1_OBJECT *type; | ||
140 | union { | ||
141 | char *ptr; | ||
142 | /* NID_X9_62_onBasis */ | ||
143 | ASN1_NULL *onBasis; | ||
144 | /* NID_X9_62_tpBasis */ | ||
145 | ASN1_INTEGER *tpBasis; | ||
146 | /* NID_X9_62_ppBasis */ | ||
147 | X9_62_PENTANOMIAL *ppBasis; | ||
148 | /* anything else */ | ||
149 | ASN1_TYPE *other; | ||
150 | } p; | ||
151 | } X9_62_CHARACTERISTIC_TWO; | ||
152 | |||
153 | typedef struct x9_62_fieldid_st { | ||
154 | ASN1_OBJECT *fieldType; | ||
155 | union { | ||
156 | char *ptr; | ||
157 | /* NID_X9_62_prime_field */ | ||
158 | ASN1_INTEGER *prime; | ||
159 | /* NID_X9_62_characteristic_two_field */ | ||
160 | X9_62_CHARACTERISTIC_TWO *char_two; | ||
161 | /* anything else */ | ||
162 | ASN1_TYPE *other; | ||
163 | } p; | ||
164 | } X9_62_FIELDID; | ||
165 | |||
166 | typedef struct x9_62_curve_st { | ||
167 | ASN1_OCTET_STRING *a; | ||
168 | ASN1_OCTET_STRING *b; | ||
169 | ASN1_BIT_STRING *seed; | ||
170 | } X9_62_CURVE; | ||
171 | |||
172 | typedef struct ec_parameters_st { | ||
173 | long version; | ||
174 | X9_62_FIELDID *fieldID; | ||
175 | X9_62_CURVE *curve; | ||
176 | ASN1_OCTET_STRING *base; | ||
177 | ASN1_INTEGER *order; | ||
178 | ASN1_INTEGER *cofactor; | ||
179 | } ECPARAMETERS; | ||
180 | |||
181 | struct ecpk_parameters_st { | ||
182 | int type; | ||
183 | union { | ||
184 | ASN1_OBJECT *named_curve; | ||
185 | ECPARAMETERS *parameters; | ||
186 | ASN1_NULL *implicitlyCA; | ||
187 | } value; | ||
188 | }/* ECPKPARAMETERS */; | ||
189 | |||
190 | /* SEC1 ECPrivateKey */ | ||
191 | typedef struct ec_privatekey_st { | ||
192 | long version; | ||
193 | ASN1_OCTET_STRING *privateKey; | ||
194 | ECPKPARAMETERS *parameters; | ||
195 | ASN1_BIT_STRING *publicKey; | ||
196 | } EC_PRIVATEKEY; | ||
197 | |||
198 | /* the OpenSSL ASN.1 definitions */ | ||
199 | ASN1_SEQUENCE(X9_62_PENTANOMIAL) = { | ||
200 | ASN1_SIMPLE(X9_62_PENTANOMIAL, k1, LONG), | ||
201 | ASN1_SIMPLE(X9_62_PENTANOMIAL, k2, LONG), | ||
202 | ASN1_SIMPLE(X9_62_PENTANOMIAL, k3, LONG) | ||
203 | } ASN1_SEQUENCE_END(X9_62_PENTANOMIAL) | ||
204 | |||
205 | DECLARE_ASN1_ALLOC_FUNCTIONS(X9_62_PENTANOMIAL) | ||
206 | IMPLEMENT_ASN1_ALLOC_FUNCTIONS(X9_62_PENTANOMIAL) | ||
207 | |||
208 | ASN1_ADB_TEMPLATE(char_two_def) = ASN1_SIMPLE(X9_62_CHARACTERISTIC_TWO, p.other, ASN1_ANY); | ||
209 | |||
210 | ASN1_ADB(X9_62_CHARACTERISTIC_TWO) = { | ||
211 | ADB_ENTRY(NID_X9_62_onBasis, ASN1_SIMPLE(X9_62_CHARACTERISTIC_TWO, p.onBasis, ASN1_NULL)), | ||
212 | ADB_ENTRY(NID_X9_62_tpBasis, ASN1_SIMPLE(X9_62_CHARACTERISTIC_TWO, p.tpBasis, ASN1_INTEGER)), | ||
213 | ADB_ENTRY(NID_X9_62_ppBasis, ASN1_SIMPLE(X9_62_CHARACTERISTIC_TWO, p.ppBasis, X9_62_PENTANOMIAL)) | ||
214 | } ASN1_ADB_END(X9_62_CHARACTERISTIC_TWO, 0, type, 0, &char_two_def_tt, NULL); | ||
215 | |||
216 | ASN1_SEQUENCE(X9_62_CHARACTERISTIC_TWO) = { | ||
217 | ASN1_SIMPLE(X9_62_CHARACTERISTIC_TWO, m, LONG), | ||
218 | ASN1_SIMPLE(X9_62_CHARACTERISTIC_TWO, type, ASN1_OBJECT), | ||
219 | ASN1_ADB_OBJECT(X9_62_CHARACTERISTIC_TWO) | ||
220 | } ASN1_SEQUENCE_END(X9_62_CHARACTERISTIC_TWO) | ||
221 | |||
222 | DECLARE_ASN1_ALLOC_FUNCTIONS(X9_62_CHARACTERISTIC_TWO) | ||
223 | IMPLEMENT_ASN1_ALLOC_FUNCTIONS(X9_62_CHARACTERISTIC_TWO) | ||
224 | |||
225 | ASN1_ADB_TEMPLATE(fieldID_def) = ASN1_SIMPLE(X9_62_FIELDID, p.other, ASN1_ANY); | ||
226 | |||
227 | ASN1_ADB(X9_62_FIELDID) = { | ||
228 | ADB_ENTRY(NID_X9_62_prime_field, ASN1_SIMPLE(X9_62_FIELDID, p.prime, ASN1_INTEGER)), | ||
229 | ADB_ENTRY(NID_X9_62_characteristic_two_field, ASN1_SIMPLE(X9_62_FIELDID, p.char_two, X9_62_CHARACTERISTIC_TWO)) | ||
230 | } ASN1_ADB_END(X9_62_FIELDID, 0, fieldType, 0, &fieldID_def_tt, NULL); | ||
231 | |||
232 | ASN1_SEQUENCE(X9_62_FIELDID) = { | ||
233 | ASN1_SIMPLE(X9_62_FIELDID, fieldType, ASN1_OBJECT), | ||
234 | ASN1_ADB_OBJECT(X9_62_FIELDID) | ||
235 | } ASN1_SEQUENCE_END(X9_62_FIELDID) | ||
236 | |||
237 | ASN1_SEQUENCE(X9_62_CURVE) = { | ||
238 | ASN1_SIMPLE(X9_62_CURVE, a, ASN1_OCTET_STRING), | ||
239 | ASN1_SIMPLE(X9_62_CURVE, b, ASN1_OCTET_STRING), | ||
240 | ASN1_OPT(X9_62_CURVE, seed, ASN1_BIT_STRING) | ||
241 | } ASN1_SEQUENCE_END(X9_62_CURVE) | ||
242 | |||
243 | ASN1_SEQUENCE(ECPARAMETERS) = { | ||
244 | ASN1_SIMPLE(ECPARAMETERS, version, LONG), | ||
245 | ASN1_SIMPLE(ECPARAMETERS, fieldID, X9_62_FIELDID), | ||
246 | ASN1_SIMPLE(ECPARAMETERS, curve, X9_62_CURVE), | ||
247 | ASN1_SIMPLE(ECPARAMETERS, base, ASN1_OCTET_STRING), | ||
248 | ASN1_SIMPLE(ECPARAMETERS, order, ASN1_INTEGER), | ||
249 | ASN1_OPT(ECPARAMETERS, cofactor, ASN1_INTEGER) | ||
250 | } ASN1_SEQUENCE_END(ECPARAMETERS) | ||
251 | |||
252 | DECLARE_ASN1_ALLOC_FUNCTIONS(ECPARAMETERS) | ||
253 | IMPLEMENT_ASN1_ALLOC_FUNCTIONS(ECPARAMETERS) | ||
254 | |||
255 | ASN1_CHOICE(ECPKPARAMETERS) = { | ||
256 | ASN1_SIMPLE(ECPKPARAMETERS, value.named_curve, ASN1_OBJECT), | ||
257 | ASN1_SIMPLE(ECPKPARAMETERS, value.parameters, ECPARAMETERS), | ||
258 | ASN1_SIMPLE(ECPKPARAMETERS, value.implicitlyCA, ASN1_NULL) | ||
259 | } ASN1_CHOICE_END(ECPKPARAMETERS) | ||
260 | |||
261 | DECLARE_ASN1_FUNCTIONS_const(ECPKPARAMETERS) | ||
262 | DECLARE_ASN1_ENCODE_FUNCTIONS_const(ECPKPARAMETERS, ECPKPARAMETERS) | ||
263 | IMPLEMENT_ASN1_FUNCTIONS_const(ECPKPARAMETERS) | ||
264 | |||
265 | ASN1_SEQUENCE(EC_PRIVATEKEY) = { | ||
266 | ASN1_SIMPLE(EC_PRIVATEKEY, version, LONG), | ||
267 | ASN1_SIMPLE(EC_PRIVATEKEY, privateKey, ASN1_OCTET_STRING), | ||
268 | ASN1_EXP_OPT(EC_PRIVATEKEY, parameters, ECPKPARAMETERS, 0), | ||
269 | ASN1_EXP_OPT(EC_PRIVATEKEY, publicKey, ASN1_BIT_STRING, 1) | ||
270 | } ASN1_SEQUENCE_END(EC_PRIVATEKEY) | ||
271 | |||
272 | DECLARE_ASN1_FUNCTIONS_const(EC_PRIVATEKEY) | ||
273 | DECLARE_ASN1_ENCODE_FUNCTIONS_const(EC_PRIVATEKEY, EC_PRIVATEKEY) | ||
274 | IMPLEMENT_ASN1_FUNCTIONS_const(EC_PRIVATEKEY) | ||
275 | |||
276 | /* some declarations of internal function */ | ||
277 | |||
278 | /* ec_asn1_group2field() sets the values in a X9_62_FIELDID object */ | ||
279 | static int ec_asn1_group2fieldid(const EC_GROUP *, X9_62_FIELDID *); | ||
280 | /* ec_asn1_group2curve() sets the values in a X9_62_CURVE object */ | ||
281 | static int ec_asn1_group2curve(const EC_GROUP *, X9_62_CURVE *); | ||
282 | /* ec_asn1_parameters2group() creates a EC_GROUP object from a | ||
283 | * ECPARAMETERS object */ | ||
284 | static EC_GROUP *ec_asn1_parameters2group(const ECPARAMETERS *); | ||
285 | /* ec_asn1_group2parameters() creates a ECPARAMETERS object from a | ||
286 | * EC_GROUP object */ | ||
287 | static ECPARAMETERS *ec_asn1_group2parameters(const EC_GROUP *,ECPARAMETERS *); | ||
288 | /* ec_asn1_pkparameters2group() creates a EC_GROUP object from a | ||
289 | * ECPKPARAMETERS object */ | ||
290 | static EC_GROUP *ec_asn1_pkparameters2group(const ECPKPARAMETERS *); | ||
291 | /* ec_asn1_group2pkparameters() creates a ECPKPARAMETERS object from a | ||
292 | * EC_GROUP object */ | ||
293 | static ECPKPARAMETERS *ec_asn1_group2pkparameters(const EC_GROUP *, | ||
294 | ECPKPARAMETERS *); | ||
295 | |||
296 | |||
297 | /* the function definitions */ | ||
298 | |||
299 | static int ec_asn1_group2fieldid(const EC_GROUP *group, X9_62_FIELDID *field) | ||
300 | { | ||
301 | int ok=0, nid; | ||
302 | BIGNUM *tmp = NULL; | ||
303 | |||
304 | if (group == NULL || field == NULL) | ||
305 | return 0; | ||
306 | |||
307 | /* clear the old values (if necessary) */ | ||
308 | if (field->fieldType != NULL) | ||
309 | ASN1_OBJECT_free(field->fieldType); | ||
310 | if (field->p.other != NULL) | ||
311 | ASN1_TYPE_free(field->p.other); | ||
312 | |||
313 | nid = EC_METHOD_get_field_type(EC_GROUP_method_of(group)); | ||
314 | /* set OID for the field */ | ||
315 | if ((field->fieldType = OBJ_nid2obj(nid)) == NULL) | ||
316 | { | ||
317 | ECerr(EC_F_EC_ASN1_GROUP2FIELDID, ERR_R_OBJ_LIB); | ||
318 | goto err; | ||
319 | } | ||
320 | |||
321 | if (nid == NID_X9_62_prime_field) | ||
322 | { | ||
323 | if ((tmp = BN_new()) == NULL) | ||
324 | { | ||
325 | ECerr(EC_F_EC_ASN1_GROUP2FIELDID, ERR_R_MALLOC_FAILURE); | ||
326 | goto err; | ||
327 | } | ||
328 | /* the parameters are specified by the prime number p */ | ||
329 | if (!EC_GROUP_get_curve_GFp(group, tmp, NULL, NULL, NULL)) | ||
330 | { | ||
331 | ECerr(EC_F_EC_ASN1_GROUP2FIELDID, ERR_R_EC_LIB); | ||
332 | goto err; | ||
333 | } | ||
334 | /* set the prime number */ | ||
335 | field->p.prime = BN_to_ASN1_INTEGER(tmp,NULL); | ||
336 | if (field->p.prime == NULL) | ||
337 | { | ||
338 | ECerr(EC_F_EC_ASN1_GROUP2FIELDID, ERR_R_ASN1_LIB); | ||
339 | goto err; | ||
340 | } | ||
341 | } | ||
342 | else /* nid == NID_X9_62_characteristic_two_field */ | ||
343 | { | ||
344 | int field_type; | ||
345 | X9_62_CHARACTERISTIC_TWO *char_two; | ||
346 | |||
347 | field->p.char_two = X9_62_CHARACTERISTIC_TWO_new(); | ||
348 | char_two = field->p.char_two; | ||
349 | |||
350 | if (char_two == NULL) | ||
351 | { | ||
352 | ECerr(EC_F_EC_ASN1_GROUP2FIELDID, ERR_R_MALLOC_FAILURE); | ||
353 | goto err; | ||
354 | } | ||
355 | |||
356 | char_two->m = (long)EC_GROUP_get_degree(group); | ||
357 | |||
358 | field_type = EC_GROUP_get_basis_type(group); | ||
359 | |||
360 | if (field_type == 0) | ||
361 | { | ||
362 | ECerr(EC_F_EC_ASN1_GROUP2FIELDID, ERR_R_EC_LIB); | ||
363 | goto err; | ||
364 | } | ||
365 | /* set base type OID */ | ||
366 | if ((char_two->type = OBJ_nid2obj(field_type)) == NULL) | ||
367 | { | ||
368 | ECerr(EC_F_EC_ASN1_GROUP2FIELDID, ERR_R_OBJ_LIB); | ||
369 | goto err; | ||
370 | } | ||
371 | |||
372 | if (field_type == NID_X9_62_tpBasis) | ||
373 | { | ||
374 | unsigned int k; | ||
375 | |||
376 | if (!EC_GROUP_get_trinomial_basis(group, &k)) | ||
377 | goto err; | ||
378 | |||
379 | char_two->p.tpBasis = ASN1_INTEGER_new(); | ||
380 | if (!char_two->p.tpBasis) | ||
381 | { | ||
382 | ECerr(EC_F_EC_ASN1_GROUP2FIELDID, ERR_R_MALLOC_FAILURE); | ||
383 | goto err; | ||
384 | } | ||
385 | if (!ASN1_INTEGER_set(char_two->p.tpBasis, (long)k)) | ||
386 | { | ||
387 | ECerr(EC_F_EC_ASN1_GROUP2FIELDID, | ||
388 | ERR_R_ASN1_LIB); | ||
389 | goto err; | ||
390 | } | ||
391 | } | ||
392 | else if (field_type == NID_X9_62_ppBasis) | ||
393 | { | ||
394 | unsigned int k1, k2, k3; | ||
395 | |||
396 | if (!EC_GROUP_get_pentanomial_basis(group, &k1, &k2, &k3)) | ||
397 | goto err; | ||
398 | |||
399 | char_two->p.ppBasis = X9_62_PENTANOMIAL_new(); | ||
400 | if (!char_two->p.ppBasis) | ||
401 | { | ||
402 | ECerr(EC_F_EC_ASN1_GROUP2FIELDID, ERR_R_MALLOC_FAILURE); | ||
403 | goto err; | ||
404 | } | ||
405 | |||
406 | /* set k? values */ | ||
407 | char_two->p.ppBasis->k1 = (long)k1; | ||
408 | char_two->p.ppBasis->k2 = (long)k2; | ||
409 | char_two->p.ppBasis->k3 = (long)k3; | ||
410 | } | ||
411 | else /* field_type == NID_X9_62_onBasis */ | ||
412 | { | ||
413 | /* for ONB the parameters are (asn1) NULL */ | ||
414 | char_two->p.onBasis = ASN1_NULL_new(); | ||
415 | if (!char_two->p.onBasis) | ||
416 | { | ||
417 | ECerr(EC_F_EC_ASN1_GROUP2FIELDID, ERR_R_MALLOC_FAILURE); | ||
418 | goto err; | ||
419 | } | ||
420 | } | ||
421 | } | ||
422 | |||
423 | ok = 1; | ||
424 | |||
425 | err : if (tmp) | ||
426 | BN_free(tmp); | ||
427 | return(ok); | ||
428 | } | ||
429 | |||
430 | static int ec_asn1_group2curve(const EC_GROUP *group, X9_62_CURVE *curve) | ||
431 | { | ||
432 | int ok=0, nid; | ||
433 | BIGNUM *tmp_1=NULL, *tmp_2=NULL; | ||
434 | unsigned char *buffer_1=NULL, *buffer_2=NULL, | ||
435 | *a_buf=NULL, *b_buf=NULL; | ||
436 | size_t len_1, len_2; | ||
437 | unsigned char char_zero = 0; | ||
438 | |||
439 | if (!group || !curve || !curve->a || !curve->b) | ||
440 | return 0; | ||
441 | |||
442 | if ((tmp_1 = BN_new()) == NULL || (tmp_2 = BN_new()) == NULL) | ||
443 | { | ||
444 | ECerr(EC_F_EC_ASN1_GROUP2CURVE, ERR_R_MALLOC_FAILURE); | ||
445 | goto err; | ||
446 | } | ||
447 | |||
448 | nid = EC_METHOD_get_field_type(EC_GROUP_method_of(group)); | ||
449 | |||
450 | /* get a and b */ | ||
451 | if (nid == NID_X9_62_prime_field) | ||
452 | { | ||
453 | if (!EC_GROUP_get_curve_GFp(group, NULL, tmp_1, tmp_2, NULL)) | ||
454 | { | ||
455 | ECerr(EC_F_EC_ASN1_GROUP2CURVE, ERR_R_EC_LIB); | ||
456 | goto err; | ||
457 | } | ||
458 | } | ||
459 | else /* nid == NID_X9_62_characteristic_two_field */ | ||
460 | { | ||
461 | if (!EC_GROUP_get_curve_GF2m(group, NULL, tmp_1, tmp_2, NULL)) | ||
462 | { | ||
463 | ECerr(EC_F_EC_ASN1_GROUP2CURVE, ERR_R_EC_LIB); | ||
464 | goto err; | ||
465 | } | ||
466 | } | ||
467 | |||
468 | len_1 = (size_t)BN_num_bytes(tmp_1); | ||
469 | len_2 = (size_t)BN_num_bytes(tmp_2); | ||
470 | |||
471 | if (len_1 == 0) | ||
472 | { | ||
473 | /* len_1 == 0 => a == 0 */ | ||
474 | a_buf = &char_zero; | ||
475 | len_1 = 1; | ||
476 | } | ||
477 | else | ||
478 | { | ||
479 | if ((buffer_1 = OPENSSL_malloc(len_1)) == NULL) | ||
480 | { | ||
481 | ECerr(EC_F_EC_ASN1_GROUP2CURVE, | ||
482 | ERR_R_MALLOC_FAILURE); | ||
483 | goto err; | ||
484 | } | ||
485 | if ( (len_1 = BN_bn2bin(tmp_1, buffer_1)) == 0) | ||
486 | { | ||
487 | ECerr(EC_F_EC_ASN1_GROUP2CURVE, ERR_R_BN_LIB); | ||
488 | goto err; | ||
489 | } | ||
490 | a_buf = buffer_1; | ||
491 | } | ||
492 | |||
493 | if (len_2 == 0) | ||
494 | { | ||
495 | /* len_2 == 0 => b == 0 */ | ||
496 | b_buf = &char_zero; | ||
497 | len_2 = 1; | ||
498 | } | ||
499 | else | ||
500 | { | ||
501 | if ((buffer_2 = OPENSSL_malloc(len_2)) == NULL) | ||
502 | { | ||
503 | ECerr(EC_F_EC_ASN1_GROUP2CURVE, | ||
504 | ERR_R_MALLOC_FAILURE); | ||
505 | goto err; | ||
506 | } | ||
507 | if ( (len_2 = BN_bn2bin(tmp_2, buffer_2)) == 0) | ||
508 | { | ||
509 | ECerr(EC_F_EC_ASN1_GROUP2CURVE, ERR_R_BN_LIB); | ||
510 | goto err; | ||
511 | } | ||
512 | b_buf = buffer_2; | ||
513 | } | ||
514 | |||
515 | /* set a and b */ | ||
516 | if (!M_ASN1_OCTET_STRING_set(curve->a, a_buf, len_1) || | ||
517 | !M_ASN1_OCTET_STRING_set(curve->b, b_buf, len_2)) | ||
518 | { | ||
519 | ECerr(EC_F_EC_ASN1_GROUP2CURVE, ERR_R_ASN1_LIB); | ||
520 | goto err; | ||
521 | } | ||
522 | |||
523 | /* set the seed (optional) */ | ||
524 | if (group->seed) | ||
525 | { | ||
526 | if (!curve->seed) | ||
527 | if ((curve->seed = ASN1_BIT_STRING_new()) == NULL) | ||
528 | { | ||
529 | ECerr(EC_F_EC_ASN1_GROUP2CURVE, ERR_R_MALLOC_FAILURE); | ||
530 | goto err; | ||
531 | } | ||
532 | curve->seed->flags &= ~(ASN1_STRING_FLAG_BITS_LEFT|0x07); | ||
533 | curve->seed->flags |= ASN1_STRING_FLAG_BITS_LEFT; | ||
534 | if (!ASN1_BIT_STRING_set(curve->seed, group->seed, | ||
535 | (int)group->seed_len)) | ||
536 | { | ||
537 | ECerr(EC_F_EC_ASN1_GROUP2CURVE, ERR_R_ASN1_LIB); | ||
538 | goto err; | ||
539 | } | ||
540 | } | ||
541 | else | ||
542 | { | ||
543 | if (curve->seed) | ||
544 | { | ||
545 | ASN1_BIT_STRING_free(curve->seed); | ||
546 | curve->seed = NULL; | ||
547 | } | ||
548 | } | ||
549 | |||
550 | ok = 1; | ||
551 | |||
552 | err: if (buffer_1) | ||
553 | OPENSSL_free(buffer_1); | ||
554 | if (buffer_2) | ||
555 | OPENSSL_free(buffer_2); | ||
556 | if (tmp_1) | ||
557 | BN_free(tmp_1); | ||
558 | if (tmp_2) | ||
559 | BN_free(tmp_2); | ||
560 | return(ok); | ||
561 | } | ||
562 | |||
563 | static ECPARAMETERS *ec_asn1_group2parameters(const EC_GROUP *group, | ||
564 | ECPARAMETERS *param) | ||
565 | { | ||
566 | int ok=0; | ||
567 | size_t len=0; | ||
568 | ECPARAMETERS *ret=NULL; | ||
569 | BIGNUM *tmp=NULL; | ||
570 | unsigned char *buffer=NULL; | ||
571 | const EC_POINT *point=NULL; | ||
572 | point_conversion_form_t form; | ||
573 | |||
574 | if ((tmp = BN_new()) == NULL) | ||
575 | { | ||
576 | ECerr(EC_F_EC_ASN1_GROUP2PARAMETERS, ERR_R_MALLOC_FAILURE); | ||
577 | goto err; | ||
578 | } | ||
579 | |||
580 | if (param == NULL) | ||
581 | { | ||
582 | if ((ret = ECPARAMETERS_new()) == NULL) | ||
583 | { | ||
584 | ECerr(EC_F_EC_ASN1_GROUP2PARAMETERS, | ||
585 | ERR_R_MALLOC_FAILURE); | ||
586 | goto err; | ||
587 | } | ||
588 | } | ||
589 | else | ||
590 | ret = param; | ||
591 | |||
592 | /* set the version (always one) */ | ||
593 | ret->version = (long)0x1; | ||
594 | |||
595 | /* set the fieldID */ | ||
596 | if (!ec_asn1_group2fieldid(group, ret->fieldID)) | ||
597 | { | ||
598 | ECerr(EC_F_EC_ASN1_GROUP2PARAMETERS, ERR_R_EC_LIB); | ||
599 | goto err; | ||
600 | } | ||
601 | |||
602 | /* set the curve */ | ||
603 | if (!ec_asn1_group2curve(group, ret->curve)) | ||
604 | { | ||
605 | ECerr(EC_F_EC_ASN1_GROUP2PARAMETERS, ERR_R_EC_LIB); | ||
606 | goto err; | ||
607 | } | ||
608 | |||
609 | /* set the base point */ | ||
610 | if ((point = EC_GROUP_get0_generator(group)) == NULL) | ||
611 | { | ||
612 | ECerr(EC_F_EC_ASN1_GROUP2PARAMETERS, EC_R_UNDEFINED_GENERATOR); | ||
613 | goto err; | ||
614 | } | ||
615 | |||
616 | form = EC_GROUP_get_point_conversion_form(group); | ||
617 | |||
618 | len = EC_POINT_point2oct(group, point, form, NULL, len, NULL); | ||
619 | if (len == 0) | ||
620 | { | ||
621 | ECerr(EC_F_EC_ASN1_GROUP2PARAMETERS, ERR_R_EC_LIB); | ||
622 | goto err; | ||
623 | } | ||
624 | if ((buffer = OPENSSL_malloc(len)) == NULL) | ||
625 | { | ||
626 | ECerr(EC_F_EC_ASN1_GROUP2PARAMETERS, ERR_R_MALLOC_FAILURE); | ||
627 | goto err; | ||
628 | } | ||
629 | if (!EC_POINT_point2oct(group, point, form, buffer, len, NULL)) | ||
630 | { | ||
631 | ECerr(EC_F_EC_ASN1_GROUP2PARAMETERS, ERR_R_EC_LIB); | ||
632 | goto err; | ||
633 | } | ||
634 | if (ret->base == NULL && (ret->base = ASN1_OCTET_STRING_new()) == NULL) | ||
635 | { | ||
636 | ECerr(EC_F_EC_ASN1_GROUP2PARAMETERS, ERR_R_MALLOC_FAILURE); | ||
637 | goto err; | ||
638 | } | ||
639 | if (!ASN1_OCTET_STRING_set(ret->base, buffer, len)) | ||
640 | { | ||
641 | ECerr(EC_F_EC_ASN1_GROUP2PARAMETERS, ERR_R_ASN1_LIB); | ||
642 | goto err; | ||
643 | } | ||
644 | |||
645 | /* set the order */ | ||
646 | if (!EC_GROUP_get_order(group, tmp, NULL)) | ||
647 | { | ||
648 | ECerr(EC_F_EC_ASN1_GROUP2PARAMETERS, ERR_R_EC_LIB); | ||
649 | goto err; | ||
650 | } | ||
651 | ret->order = BN_to_ASN1_INTEGER(tmp, ret->order); | ||
652 | if (ret->order == NULL) | ||
653 | { | ||
654 | ECerr(EC_F_EC_ASN1_GROUP2PARAMETERS, ERR_R_ASN1_LIB); | ||
655 | goto err; | ||
656 | } | ||
657 | |||
658 | /* set the cofactor (optional) */ | ||
659 | if (EC_GROUP_get_cofactor(group, tmp, NULL)) | ||
660 | { | ||
661 | ret->cofactor = BN_to_ASN1_INTEGER(tmp, ret->cofactor); | ||
662 | if (ret->cofactor == NULL) | ||
663 | { | ||
664 | ECerr(EC_F_EC_ASN1_GROUP2PARAMETERS, ERR_R_ASN1_LIB); | ||
665 | goto err; | ||
666 | } | ||
667 | } | ||
668 | |||
669 | ok = 1; | ||
670 | |||
671 | err : if(!ok) | ||
672 | { | ||
673 | if (ret && !param) | ||
674 | ECPARAMETERS_free(ret); | ||
675 | ret = NULL; | ||
676 | } | ||
677 | if (tmp) | ||
678 | BN_free(tmp); | ||
679 | if (buffer) | ||
680 | OPENSSL_free(buffer); | ||
681 | return(ret); | ||
682 | } | ||
683 | |||
684 | ECPKPARAMETERS *ec_asn1_group2pkparameters(const EC_GROUP *group, | ||
685 | ECPKPARAMETERS *params) | ||
686 | { | ||
687 | int ok = 1, tmp; | ||
688 | ECPKPARAMETERS *ret = params; | ||
689 | |||
690 | if (ret == NULL) | ||
691 | { | ||
692 | if ((ret = ECPKPARAMETERS_new()) == NULL) | ||
693 | { | ||
694 | ECerr(EC_F_EC_ASN1_GROUP2PKPARAMETERS, | ||
695 | ERR_R_MALLOC_FAILURE); | ||
696 | return NULL; | ||
697 | } | ||
698 | } | ||
699 | else | ||
700 | { | ||
701 | if (ret->type == 0 && ret->value.named_curve) | ||
702 | ASN1_OBJECT_free(ret->value.named_curve); | ||
703 | else if (ret->type == 1 && ret->value.parameters) | ||
704 | ECPARAMETERS_free(ret->value.parameters); | ||
705 | } | ||
706 | |||
707 | if (EC_GROUP_get_asn1_flag(group)) | ||
708 | { | ||
709 | /* use the asn1 OID to describe the | ||
710 | * the elliptic curve parameters | ||
711 | */ | ||
712 | tmp = EC_GROUP_get_curve_name(group); | ||
713 | if (tmp) | ||
714 | { | ||
715 | ret->type = 0; | ||
716 | if ((ret->value.named_curve = OBJ_nid2obj(tmp)) == NULL) | ||
717 | ok = 0; | ||
718 | } | ||
719 | else | ||
720 | /* we don't kmow the nid => ERROR */ | ||
721 | ok = 0; | ||
722 | } | ||
723 | else | ||
724 | { | ||
725 | /* use the ECPARAMETERS structure */ | ||
726 | ret->type = 1; | ||
727 | if ((ret->value.parameters = ec_asn1_group2parameters( | ||
728 | group, NULL)) == NULL) | ||
729 | ok = 0; | ||
730 | } | ||
731 | |||
732 | if (!ok) | ||
733 | { | ||
734 | ECPKPARAMETERS_free(ret); | ||
735 | return NULL; | ||
736 | } | ||
737 | return ret; | ||
738 | } | ||
739 | |||
740 | static EC_GROUP *ec_asn1_parameters2group(const ECPARAMETERS *params) | ||
741 | { | ||
742 | int ok = 0, tmp; | ||
743 | EC_GROUP *ret = NULL; | ||
744 | BIGNUM *p = NULL, *a = NULL, *b = NULL; | ||
745 | EC_POINT *point=NULL; | ||
746 | long field_bits; | ||
747 | |||
748 | if (!params->fieldID || !params->fieldID->fieldType || | ||
749 | !params->fieldID->p.ptr) | ||
750 | { | ||
751 | ECerr(EC_F_EC_ASN1_PARAMETERS2GROUP, EC_R_ASN1_ERROR); | ||
752 | goto err; | ||
753 | } | ||
754 | |||
755 | /* now extract the curve parameters a and b */ | ||
756 | if (!params->curve || !params->curve->a || | ||
757 | !params->curve->a->data || !params->curve->b || | ||
758 | !params->curve->b->data) | ||
759 | { | ||
760 | ECerr(EC_F_EC_ASN1_PARAMETERS2GROUP, EC_R_ASN1_ERROR); | ||
761 | goto err; | ||
762 | } | ||
763 | a = BN_bin2bn(params->curve->a->data, params->curve->a->length, NULL); | ||
764 | if (a == NULL) | ||
765 | { | ||
766 | ECerr(EC_F_EC_ASN1_PARAMETERS2GROUP, ERR_R_BN_LIB); | ||
767 | goto err; | ||
768 | } | ||
769 | b = BN_bin2bn(params->curve->b->data, params->curve->b->length, NULL); | ||
770 | if (b == NULL) | ||
771 | { | ||
772 | ECerr(EC_F_EC_ASN1_PARAMETERS2GROUP, ERR_R_BN_LIB); | ||
773 | goto err; | ||
774 | } | ||
775 | |||
776 | /* get the field parameters */ | ||
777 | tmp = OBJ_obj2nid(params->fieldID->fieldType); | ||
778 | |||
779 | if (tmp == NID_X9_62_characteristic_two_field) | ||
780 | { | ||
781 | X9_62_CHARACTERISTIC_TWO *char_two; | ||
782 | |||
783 | char_two = params->fieldID->p.char_two; | ||
784 | |||
785 | field_bits = char_two->m; | ||
786 | if (field_bits > OPENSSL_ECC_MAX_FIELD_BITS) | ||
787 | { | ||
788 | ECerr(EC_F_EC_ASN1_PARAMETERS2GROUP, EC_R_FIELD_TOO_LARGE); | ||
789 | goto err; | ||
790 | } | ||
791 | |||
792 | if ((p = BN_new()) == NULL) | ||
793 | { | ||
794 | ECerr(EC_F_EC_ASN1_PARAMETERS2GROUP, ERR_R_MALLOC_FAILURE); | ||
795 | goto err; | ||
796 | } | ||
797 | |||
798 | /* get the base type */ | ||
799 | tmp = OBJ_obj2nid(char_two->type); | ||
800 | |||
801 | if (tmp == NID_X9_62_tpBasis) | ||
802 | { | ||
803 | long tmp_long; | ||
804 | |||
805 | if (!char_two->p.tpBasis) | ||
806 | { | ||
807 | ECerr(EC_F_EC_ASN1_PARAMETERS2GROUP, EC_R_ASN1_ERROR); | ||
808 | goto err; | ||
809 | } | ||
810 | |||
811 | tmp_long = ASN1_INTEGER_get(char_two->p.tpBasis); | ||
812 | |||
813 | if (!(char_two->m > tmp_long && tmp_long > 0)) | ||
814 | { | ||
815 | ECerr(EC_F_EC_ASN1_PARAMETERS2GROUP, EC_R_INVALID_TRINOMIAL_BASIS); | ||
816 | goto err; | ||
817 | } | ||
818 | |||
819 | /* create the polynomial */ | ||
820 | if (!BN_set_bit(p, (int)char_two->m)) | ||
821 | goto err; | ||
822 | if (!BN_set_bit(p, (int)tmp_long)) | ||
823 | goto err; | ||
824 | if (!BN_set_bit(p, 0)) | ||
825 | goto err; | ||
826 | } | ||
827 | else if (tmp == NID_X9_62_ppBasis) | ||
828 | { | ||
829 | X9_62_PENTANOMIAL *penta; | ||
830 | |||
831 | penta = char_two->p.ppBasis; | ||
832 | if (!penta) | ||
833 | { | ||
834 | ECerr(EC_F_EC_ASN1_PARAMETERS2GROUP, EC_R_ASN1_ERROR); | ||
835 | goto err; | ||
836 | } | ||
837 | |||
838 | if (!(char_two->m > penta->k3 && penta->k3 > penta->k2 && penta->k2 > penta->k1 && penta->k1 > 0)) | ||
839 | { | ||
840 | ECerr(EC_F_EC_ASN1_PARAMETERS2GROUP, EC_R_INVALID_PENTANOMIAL_BASIS); | ||
841 | goto err; | ||
842 | } | ||
843 | |||
844 | /* create the polynomial */ | ||
845 | if (!BN_set_bit(p, (int)char_two->m)) goto err; | ||
846 | if (!BN_set_bit(p, (int)penta->k1)) goto err; | ||
847 | if (!BN_set_bit(p, (int)penta->k2)) goto err; | ||
848 | if (!BN_set_bit(p, (int)penta->k3)) goto err; | ||
849 | if (!BN_set_bit(p, 0)) goto err; | ||
850 | } | ||
851 | else if (tmp == NID_X9_62_onBasis) | ||
852 | { | ||
853 | ECerr(EC_F_EC_ASN1_PARAMETERS2GROUP, EC_R_NOT_IMPLEMENTED); | ||
854 | goto err; | ||
855 | } | ||
856 | else /* error */ | ||
857 | { | ||
858 | ECerr(EC_F_EC_ASN1_PARAMETERS2GROUP, EC_R_ASN1_ERROR); | ||
859 | goto err; | ||
860 | } | ||
861 | |||
862 | /* create the EC_GROUP structure */ | ||
863 | ret = EC_GROUP_new_curve_GF2m(p, a, b, NULL); | ||
864 | } | ||
865 | else if (tmp == NID_X9_62_prime_field) | ||
866 | { | ||
867 | /* we have a curve over a prime field */ | ||
868 | /* extract the prime number */ | ||
869 | if (!params->fieldID->p.prime) | ||
870 | { | ||
871 | ECerr(EC_F_EC_ASN1_PARAMETERS2GROUP, EC_R_ASN1_ERROR); | ||
872 | goto err; | ||
873 | } | ||
874 | p = ASN1_INTEGER_to_BN(params->fieldID->p.prime, NULL); | ||
875 | if (p == NULL) | ||
876 | { | ||
877 | ECerr(EC_F_EC_ASN1_PARAMETERS2GROUP, ERR_R_ASN1_LIB); | ||
878 | goto err; | ||
879 | } | ||
880 | |||
881 | if (BN_is_negative(p) || BN_is_zero(p)) | ||
882 | { | ||
883 | ECerr(EC_F_EC_ASN1_PARAMETERS2GROUP, EC_R_INVALID_FIELD); | ||
884 | goto err; | ||
885 | } | ||
886 | |||
887 | field_bits = BN_num_bits(p); | ||
888 | if (field_bits > OPENSSL_ECC_MAX_FIELD_BITS) | ||
889 | { | ||
890 | ECerr(EC_F_EC_ASN1_PARAMETERS2GROUP, EC_R_FIELD_TOO_LARGE); | ||
891 | goto err; | ||
892 | } | ||
893 | |||
894 | /* create the EC_GROUP structure */ | ||
895 | ret = EC_GROUP_new_curve_GFp(p, a, b, NULL); | ||
896 | } | ||
897 | else | ||
898 | { | ||
899 | ECerr(EC_F_EC_ASN1_PARAMETERS2GROUP, EC_R_INVALID_FIELD); | ||
900 | goto err; | ||
901 | } | ||
902 | |||
903 | if (ret == NULL) | ||
904 | { | ||
905 | ECerr(EC_F_EC_ASN1_PARAMETERS2GROUP, ERR_R_EC_LIB); | ||
906 | goto err; | ||
907 | } | ||
908 | |||
909 | /* extract seed (optional) */ | ||
910 | if (params->curve->seed != NULL) | ||
911 | { | ||
912 | if (ret->seed != NULL) | ||
913 | OPENSSL_free(ret->seed); | ||
914 | if (!(ret->seed = OPENSSL_malloc(params->curve->seed->length))) | ||
915 | { | ||
916 | ECerr(EC_F_EC_ASN1_PARAMETERS2GROUP, | ||
917 | ERR_R_MALLOC_FAILURE); | ||
918 | goto err; | ||
919 | } | ||
920 | memcpy(ret->seed, params->curve->seed->data, | ||
921 | params->curve->seed->length); | ||
922 | ret->seed_len = params->curve->seed->length; | ||
923 | } | ||
924 | |||
925 | if (!params->order || !params->base || !params->base->data) | ||
926 | { | ||
927 | ECerr(EC_F_EC_ASN1_PARAMETERS2GROUP, EC_R_ASN1_ERROR); | ||
928 | goto err; | ||
929 | } | ||
930 | |||
931 | if ((point = EC_POINT_new(ret)) == NULL) goto err; | ||
932 | |||
933 | /* set the point conversion form */ | ||
934 | EC_GROUP_set_point_conversion_form(ret, (point_conversion_form_t) | ||
935 | (params->base->data[0] & ~0x01)); | ||
936 | |||
937 | /* extract the ec point */ | ||
938 | if (!EC_POINT_oct2point(ret, point, params->base->data, | ||
939 | params->base->length, NULL)) | ||
940 | { | ||
941 | ECerr(EC_F_EC_ASN1_PARAMETERS2GROUP, ERR_R_EC_LIB); | ||
942 | goto err; | ||
943 | } | ||
944 | |||
945 | /* extract the order */ | ||
946 | if ((a = ASN1_INTEGER_to_BN(params->order, a)) == NULL) | ||
947 | { | ||
948 | ECerr(EC_F_EC_ASN1_PARAMETERS2GROUP, ERR_R_ASN1_LIB); | ||
949 | goto err; | ||
950 | } | ||
951 | if (BN_is_negative(a) || BN_is_zero(a)) | ||
952 | { | ||
953 | ECerr(EC_F_EC_ASN1_PARAMETERS2GROUP, EC_R_INVALID_GROUP_ORDER); | ||
954 | goto err; | ||
955 | } | ||
956 | if (BN_num_bits(a) > (int)field_bits + 1) /* Hasse bound */ | ||
957 | { | ||
958 | ECerr(EC_F_EC_ASN1_PARAMETERS2GROUP, EC_R_INVALID_GROUP_ORDER); | ||
959 | goto err; | ||
960 | } | ||
961 | |||
962 | /* extract the cofactor (optional) */ | ||
963 | if (params->cofactor == NULL) | ||
964 | { | ||
965 | if (b) | ||
966 | { | ||
967 | BN_free(b); | ||
968 | b = NULL; | ||
969 | } | ||
970 | } | ||
971 | else | ||
972 | if ((b = ASN1_INTEGER_to_BN(params->cofactor, b)) == NULL) | ||
973 | { | ||
974 | ECerr(EC_F_EC_ASN1_PARAMETERS2GROUP, ERR_R_ASN1_LIB); | ||
975 | goto err; | ||
976 | } | ||
977 | /* set the generator, order and cofactor (if present) */ | ||
978 | if (!EC_GROUP_set_generator(ret, point, a, b)) | ||
979 | { | ||
980 | ECerr(EC_F_EC_ASN1_PARAMETERS2GROUP, ERR_R_EC_LIB); | ||
981 | goto err; | ||
982 | } | ||
983 | |||
984 | ok = 1; | ||
985 | |||
986 | err: if (!ok) | ||
987 | { | ||
988 | if (ret) | ||
989 | EC_GROUP_clear_free(ret); | ||
990 | ret = NULL; | ||
991 | } | ||
992 | |||
993 | if (p) | ||
994 | BN_free(p); | ||
995 | if (a) | ||
996 | BN_free(a); | ||
997 | if (b) | ||
998 | BN_free(b); | ||
999 | if (point) | ||
1000 | EC_POINT_free(point); | ||
1001 | return(ret); | ||
1002 | } | ||
1003 | |||
1004 | EC_GROUP *ec_asn1_pkparameters2group(const ECPKPARAMETERS *params) | ||
1005 | { | ||
1006 | EC_GROUP *ret=NULL; | ||
1007 | int tmp=0; | ||
1008 | |||
1009 | if (params == NULL) | ||
1010 | { | ||
1011 | ECerr(EC_F_EC_ASN1_PKPARAMETERS2GROUP, | ||
1012 | EC_R_MISSING_PARAMETERS); | ||
1013 | return NULL; | ||
1014 | } | ||
1015 | |||
1016 | if (params->type == 0) | ||
1017 | { /* the curve is given by an OID */ | ||
1018 | tmp = OBJ_obj2nid(params->value.named_curve); | ||
1019 | if ((ret = EC_GROUP_new_by_curve_name(tmp)) == NULL) | ||
1020 | { | ||
1021 | ECerr(EC_F_EC_ASN1_PKPARAMETERS2GROUP, | ||
1022 | EC_R_EC_GROUP_NEW_BY_NAME_FAILURE); | ||
1023 | return NULL; | ||
1024 | } | ||
1025 | EC_GROUP_set_asn1_flag(ret, OPENSSL_EC_NAMED_CURVE); | ||
1026 | } | ||
1027 | else if (params->type == 1) | ||
1028 | { /* the parameters are given by a ECPARAMETERS | ||
1029 | * structure */ | ||
1030 | ret = ec_asn1_parameters2group(params->value.parameters); | ||
1031 | if (!ret) | ||
1032 | { | ||
1033 | ECerr(EC_F_EC_ASN1_PKPARAMETERS2GROUP, ERR_R_EC_LIB); | ||
1034 | return NULL; | ||
1035 | } | ||
1036 | EC_GROUP_set_asn1_flag(ret, 0x0); | ||
1037 | } | ||
1038 | else if (params->type == 2) | ||
1039 | { /* implicitlyCA */ | ||
1040 | return NULL; | ||
1041 | } | ||
1042 | else | ||
1043 | { | ||
1044 | ECerr(EC_F_EC_ASN1_PKPARAMETERS2GROUP, EC_R_ASN1_ERROR); | ||
1045 | return NULL; | ||
1046 | } | ||
1047 | |||
1048 | return ret; | ||
1049 | } | ||
1050 | |||
1051 | /* EC_GROUP <-> DER encoding of ECPKPARAMETERS */ | ||
1052 | |||
1053 | EC_GROUP *d2i_ECPKParameters(EC_GROUP **a, const unsigned char **in, long len) | ||
1054 | { | ||
1055 | EC_GROUP *group = NULL; | ||
1056 | ECPKPARAMETERS *params = NULL; | ||
1057 | |||
1058 | if ((params = d2i_ECPKPARAMETERS(NULL, in, len)) == NULL) | ||
1059 | { | ||
1060 | ECerr(EC_F_D2I_ECPKPARAMETERS, EC_R_D2I_ECPKPARAMETERS_FAILURE); | ||
1061 | ECPKPARAMETERS_free(params); | ||
1062 | return NULL; | ||
1063 | } | ||
1064 | |||
1065 | if ((group = ec_asn1_pkparameters2group(params)) == NULL) | ||
1066 | { | ||
1067 | ECerr(EC_F_D2I_ECPKPARAMETERS, EC_R_PKPARAMETERS2GROUP_FAILURE); | ||
1068 | return NULL; | ||
1069 | } | ||
1070 | |||
1071 | |||
1072 | if (a && *a) | ||
1073 | EC_GROUP_clear_free(*a); | ||
1074 | if (a) | ||
1075 | *a = group; | ||
1076 | |||
1077 | ECPKPARAMETERS_free(params); | ||
1078 | return(group); | ||
1079 | } | ||
1080 | |||
1081 | int i2d_ECPKParameters(const EC_GROUP *a, unsigned char **out) | ||
1082 | { | ||
1083 | int ret=0; | ||
1084 | ECPKPARAMETERS *tmp = ec_asn1_group2pkparameters(a, NULL); | ||
1085 | if (tmp == NULL) | ||
1086 | { | ||
1087 | ECerr(EC_F_I2D_ECPKPARAMETERS, EC_R_GROUP2PKPARAMETERS_FAILURE); | ||
1088 | return 0; | ||
1089 | } | ||
1090 | if ((ret = i2d_ECPKPARAMETERS(tmp, out)) == 0) | ||
1091 | { | ||
1092 | ECerr(EC_F_I2D_ECPKPARAMETERS, EC_R_I2D_ECPKPARAMETERS_FAILURE); | ||
1093 | ECPKPARAMETERS_free(tmp); | ||
1094 | return 0; | ||
1095 | } | ||
1096 | ECPKPARAMETERS_free(tmp); | ||
1097 | return(ret); | ||
1098 | } | ||
1099 | |||
1100 | /* some EC_KEY functions */ | ||
1101 | |||
1102 | EC_KEY *d2i_ECPrivateKey(EC_KEY **a, const unsigned char **in, long len) | ||
1103 | { | ||
1104 | int ok=0; | ||
1105 | EC_KEY *ret=NULL; | ||
1106 | EC_PRIVATEKEY *priv_key=NULL; | ||
1107 | |||
1108 | if ((priv_key = EC_PRIVATEKEY_new()) == NULL) | ||
1109 | { | ||
1110 | ECerr(EC_F_D2I_ECPRIVATEKEY, ERR_R_MALLOC_FAILURE); | ||
1111 | return NULL; | ||
1112 | } | ||
1113 | |||
1114 | if ((priv_key = d2i_EC_PRIVATEKEY(&priv_key, in, len)) == NULL) | ||
1115 | { | ||
1116 | ECerr(EC_F_D2I_ECPRIVATEKEY, ERR_R_EC_LIB); | ||
1117 | EC_PRIVATEKEY_free(priv_key); | ||
1118 | return NULL; | ||
1119 | } | ||
1120 | |||
1121 | if (a == NULL || *a == NULL) | ||
1122 | { | ||
1123 | if ((ret = EC_KEY_new()) == NULL) | ||
1124 | { | ||
1125 | ECerr(EC_F_D2I_ECPRIVATEKEY, | ||
1126 | ERR_R_MALLOC_FAILURE); | ||
1127 | goto err; | ||
1128 | } | ||
1129 | if (a) | ||
1130 | *a = ret; | ||
1131 | } | ||
1132 | else | ||
1133 | ret = *a; | ||
1134 | |||
1135 | if (priv_key->parameters) | ||
1136 | { | ||
1137 | if (ret->group) | ||
1138 | EC_GROUP_clear_free(ret->group); | ||
1139 | ret->group = ec_asn1_pkparameters2group(priv_key->parameters); | ||
1140 | } | ||
1141 | |||
1142 | if (ret->group == NULL) | ||
1143 | { | ||
1144 | ECerr(EC_F_D2I_ECPRIVATEKEY, ERR_R_EC_LIB); | ||
1145 | goto err; | ||
1146 | } | ||
1147 | |||
1148 | ret->version = priv_key->version; | ||
1149 | |||
1150 | if (priv_key->privateKey) | ||
1151 | { | ||
1152 | ret->priv_key = BN_bin2bn( | ||
1153 | M_ASN1_STRING_data(priv_key->privateKey), | ||
1154 | M_ASN1_STRING_length(priv_key->privateKey), | ||
1155 | ret->priv_key); | ||
1156 | if (ret->priv_key == NULL) | ||
1157 | { | ||
1158 | ECerr(EC_F_D2I_ECPRIVATEKEY, | ||
1159 | ERR_R_BN_LIB); | ||
1160 | goto err; | ||
1161 | } | ||
1162 | } | ||
1163 | else | ||
1164 | { | ||
1165 | ECerr(EC_F_D2I_ECPRIVATEKEY, | ||
1166 | EC_R_MISSING_PRIVATE_KEY); | ||
1167 | goto err; | ||
1168 | } | ||
1169 | |||
1170 | if (priv_key->publicKey) | ||
1171 | { | ||
1172 | const unsigned char *pub_oct; | ||
1173 | size_t pub_oct_len; | ||
1174 | |||
1175 | if (ret->pub_key) | ||
1176 | EC_POINT_clear_free(ret->pub_key); | ||
1177 | ret->pub_key = EC_POINT_new(ret->group); | ||
1178 | if (ret->pub_key == NULL) | ||
1179 | { | ||
1180 | ECerr(EC_F_D2I_ECPRIVATEKEY, ERR_R_EC_LIB); | ||
1181 | goto err; | ||
1182 | } | ||
1183 | pub_oct = M_ASN1_STRING_data(priv_key->publicKey); | ||
1184 | pub_oct_len = M_ASN1_STRING_length(priv_key->publicKey); | ||
1185 | /* save the point conversion form */ | ||
1186 | ret->conv_form = (point_conversion_form_t)(pub_oct[0] & ~0x01); | ||
1187 | if (!EC_POINT_oct2point(ret->group, ret->pub_key, | ||
1188 | pub_oct, pub_oct_len, NULL)) | ||
1189 | { | ||
1190 | ECerr(EC_F_D2I_ECPRIVATEKEY, ERR_R_EC_LIB); | ||
1191 | goto err; | ||
1192 | } | ||
1193 | } | ||
1194 | |||
1195 | ok = 1; | ||
1196 | err: | ||
1197 | if (!ok) | ||
1198 | { | ||
1199 | if (ret) | ||
1200 | EC_KEY_free(ret); | ||
1201 | ret = NULL; | ||
1202 | } | ||
1203 | |||
1204 | if (priv_key) | ||
1205 | EC_PRIVATEKEY_free(priv_key); | ||
1206 | |||
1207 | return(ret); | ||
1208 | } | ||
1209 | |||
1210 | int i2d_ECPrivateKey(EC_KEY *a, unsigned char **out) | ||
1211 | { | ||
1212 | int ret=0, ok=0; | ||
1213 | unsigned char *buffer=NULL; | ||
1214 | size_t buf_len=0, tmp_len; | ||
1215 | EC_PRIVATEKEY *priv_key=NULL; | ||
1216 | |||
1217 | if (a == NULL || a->group == NULL || a->priv_key == NULL) | ||
1218 | { | ||
1219 | ECerr(EC_F_I2D_ECPRIVATEKEY, | ||
1220 | ERR_R_PASSED_NULL_PARAMETER); | ||
1221 | goto err; | ||
1222 | } | ||
1223 | |||
1224 | if ((priv_key = EC_PRIVATEKEY_new()) == NULL) | ||
1225 | { | ||
1226 | ECerr(EC_F_I2D_ECPRIVATEKEY, | ||
1227 | ERR_R_MALLOC_FAILURE); | ||
1228 | goto err; | ||
1229 | } | ||
1230 | |||
1231 | priv_key->version = a->version; | ||
1232 | |||
1233 | buf_len = (size_t)BN_num_bytes(a->priv_key); | ||
1234 | buffer = OPENSSL_malloc(buf_len); | ||
1235 | if (buffer == NULL) | ||
1236 | { | ||
1237 | ECerr(EC_F_I2D_ECPRIVATEKEY, | ||
1238 | ERR_R_MALLOC_FAILURE); | ||
1239 | goto err; | ||
1240 | } | ||
1241 | |||
1242 | if (!BN_bn2bin(a->priv_key, buffer)) | ||
1243 | { | ||
1244 | ECerr(EC_F_I2D_ECPRIVATEKEY, ERR_R_BN_LIB); | ||
1245 | goto err; | ||
1246 | } | ||
1247 | |||
1248 | if (!M_ASN1_OCTET_STRING_set(priv_key->privateKey, buffer, buf_len)) | ||
1249 | { | ||
1250 | ECerr(EC_F_I2D_ECPRIVATEKEY, ERR_R_ASN1_LIB); | ||
1251 | goto err; | ||
1252 | } | ||
1253 | |||
1254 | if (!(a->enc_flag & EC_PKEY_NO_PARAMETERS)) | ||
1255 | { | ||
1256 | if ((priv_key->parameters = ec_asn1_group2pkparameters( | ||
1257 | a->group, priv_key->parameters)) == NULL) | ||
1258 | { | ||
1259 | ECerr(EC_F_I2D_ECPRIVATEKEY, ERR_R_EC_LIB); | ||
1260 | goto err; | ||
1261 | } | ||
1262 | } | ||
1263 | |||
1264 | if (!(a->enc_flag & EC_PKEY_NO_PUBKEY)) | ||
1265 | { | ||
1266 | priv_key->publicKey = M_ASN1_BIT_STRING_new(); | ||
1267 | if (priv_key->publicKey == NULL) | ||
1268 | { | ||
1269 | ECerr(EC_F_I2D_ECPRIVATEKEY, | ||
1270 | ERR_R_MALLOC_FAILURE); | ||
1271 | goto err; | ||
1272 | } | ||
1273 | |||
1274 | tmp_len = EC_POINT_point2oct(a->group, a->pub_key, | ||
1275 | a->conv_form, NULL, 0, NULL); | ||
1276 | |||
1277 | if (tmp_len > buf_len) | ||
1278 | { | ||
1279 | unsigned char *tmp_buffer = OPENSSL_realloc(buffer, tmp_len); | ||
1280 | if (!tmp_buffer) | ||
1281 | { | ||
1282 | ECerr(EC_F_I2D_ECPRIVATEKEY, ERR_R_MALLOC_FAILURE); | ||
1283 | goto err; | ||
1284 | } | ||
1285 | buffer = tmp_buffer; | ||
1286 | buf_len = tmp_len; | ||
1287 | } | ||
1288 | |||
1289 | if (!EC_POINT_point2oct(a->group, a->pub_key, | ||
1290 | a->conv_form, buffer, buf_len, NULL)) | ||
1291 | { | ||
1292 | ECerr(EC_F_I2D_ECPRIVATEKEY, ERR_R_EC_LIB); | ||
1293 | goto err; | ||
1294 | } | ||
1295 | |||
1296 | priv_key->publicKey->flags &= ~(ASN1_STRING_FLAG_BITS_LEFT|0x07); | ||
1297 | priv_key->publicKey->flags |= ASN1_STRING_FLAG_BITS_LEFT; | ||
1298 | if (!M_ASN1_BIT_STRING_set(priv_key->publicKey, buffer, | ||
1299 | buf_len)) | ||
1300 | { | ||
1301 | ECerr(EC_F_I2D_ECPRIVATEKEY, ERR_R_ASN1_LIB); | ||
1302 | goto err; | ||
1303 | } | ||
1304 | } | ||
1305 | |||
1306 | if ((ret = i2d_EC_PRIVATEKEY(priv_key, out)) == 0) | ||
1307 | { | ||
1308 | ECerr(EC_F_I2D_ECPRIVATEKEY, ERR_R_EC_LIB); | ||
1309 | goto err; | ||
1310 | } | ||
1311 | ok=1; | ||
1312 | err: | ||
1313 | if (buffer) | ||
1314 | OPENSSL_free(buffer); | ||
1315 | if (priv_key) | ||
1316 | EC_PRIVATEKEY_free(priv_key); | ||
1317 | return(ok?ret:0); | ||
1318 | } | ||
1319 | |||
1320 | int i2d_ECParameters(EC_KEY *a, unsigned char **out) | ||
1321 | { | ||
1322 | if (a == NULL) | ||
1323 | { | ||
1324 | ECerr(EC_F_I2D_ECPARAMETERS, ERR_R_PASSED_NULL_PARAMETER); | ||
1325 | return 0; | ||
1326 | } | ||
1327 | return i2d_ECPKParameters(a->group, out); | ||
1328 | } | ||
1329 | |||
1330 | EC_KEY *d2i_ECParameters(EC_KEY **a, const unsigned char **in, long len) | ||
1331 | { | ||
1332 | EC_KEY *ret; | ||
1333 | |||
1334 | if (in == NULL || *in == NULL) | ||
1335 | { | ||
1336 | ECerr(EC_F_D2I_ECPARAMETERS, ERR_R_PASSED_NULL_PARAMETER); | ||
1337 | return NULL; | ||
1338 | } | ||
1339 | |||
1340 | if (a == NULL || *a == NULL) | ||
1341 | { | ||
1342 | if ((ret = EC_KEY_new()) == NULL) | ||
1343 | { | ||
1344 | ECerr(EC_F_D2I_ECPARAMETERS, ERR_R_MALLOC_FAILURE); | ||
1345 | return NULL; | ||
1346 | } | ||
1347 | if (a) | ||
1348 | *a = ret; | ||
1349 | } | ||
1350 | else | ||
1351 | ret = *a; | ||
1352 | |||
1353 | if (!d2i_ECPKParameters(&ret->group, in, len)) | ||
1354 | { | ||
1355 | ECerr(EC_F_D2I_ECPARAMETERS, ERR_R_EC_LIB); | ||
1356 | return NULL; | ||
1357 | } | ||
1358 | |||
1359 | return ret; | ||
1360 | } | ||
1361 | |||
1362 | EC_KEY *o2i_ECPublicKey(EC_KEY **a, const unsigned char **in, long len) | ||
1363 | { | ||
1364 | EC_KEY *ret=NULL; | ||
1365 | |||
1366 | if (a == NULL || (*a) == NULL || (*a)->group == NULL) | ||
1367 | { | ||
1368 | /* sorry, but a EC_GROUP-structur is necessary | ||
1369 | * to set the public key */ | ||
1370 | ECerr(EC_F_O2I_ECPUBLICKEY, ERR_R_PASSED_NULL_PARAMETER); | ||
1371 | return 0; | ||
1372 | } | ||
1373 | ret = *a; | ||
1374 | if (ret->pub_key == NULL && | ||
1375 | (ret->pub_key = EC_POINT_new(ret->group)) == NULL) | ||
1376 | { | ||
1377 | ECerr(EC_F_O2I_ECPUBLICKEY, ERR_R_MALLOC_FAILURE); | ||
1378 | return 0; | ||
1379 | } | ||
1380 | if (!EC_POINT_oct2point(ret->group, ret->pub_key, *in, len, NULL)) | ||
1381 | { | ||
1382 | ECerr(EC_F_O2I_ECPUBLICKEY, ERR_R_EC_LIB); | ||
1383 | return 0; | ||
1384 | } | ||
1385 | /* save the point conversion form */ | ||
1386 | ret->conv_form = (point_conversion_form_t)(*in[0] & ~0x01); | ||
1387 | *in += len; | ||
1388 | return ret; | ||
1389 | } | ||
1390 | |||
1391 | int i2o_ECPublicKey(EC_KEY *a, unsigned char **out) | ||
1392 | { | ||
1393 | size_t buf_len=0; | ||
1394 | int new_buffer = 0; | ||
1395 | |||
1396 | if (a == NULL) | ||
1397 | { | ||
1398 | ECerr(EC_F_I2O_ECPUBLICKEY, ERR_R_PASSED_NULL_PARAMETER); | ||
1399 | return 0; | ||
1400 | } | ||
1401 | |||
1402 | buf_len = EC_POINT_point2oct(a->group, a->pub_key, | ||
1403 | a->conv_form, NULL, 0, NULL); | ||
1404 | |||
1405 | if (out == NULL || buf_len == 0) | ||
1406 | /* out == NULL => just return the length of the octet string */ | ||
1407 | return buf_len; | ||
1408 | |||
1409 | if (*out == NULL) | ||
1410 | { | ||
1411 | if ((*out = OPENSSL_malloc(buf_len)) == NULL) | ||
1412 | { | ||
1413 | ECerr(EC_F_I2O_ECPUBLICKEY, ERR_R_MALLOC_FAILURE); | ||
1414 | return 0; | ||
1415 | } | ||
1416 | new_buffer = 1; | ||
1417 | } | ||
1418 | if (!EC_POINT_point2oct(a->group, a->pub_key, a->conv_form, | ||
1419 | *out, buf_len, NULL)) | ||
1420 | { | ||
1421 | ECerr(EC_F_I2O_ECPUBLICKEY, ERR_R_EC_LIB); | ||
1422 | OPENSSL_free(*out); | ||
1423 | *out = NULL; | ||
1424 | return 0; | ||
1425 | } | ||
1426 | if (!new_buffer) | ||
1427 | *out += buf_len; | ||
1428 | return buf_len; | ||
1429 | } | ||
diff --git a/src/lib/libcrypto/ec/ec_check.c b/src/lib/libcrypto/ec/ec_check.c deleted file mode 100644 index 0e316b4b3f..0000000000 --- a/src/lib/libcrypto/ec/ec_check.c +++ /dev/null | |||
@@ -1,123 +0,0 @@ | |||
1 | /* crypto/ec/ec_check.c */ | ||
2 | /* ==================================================================== | ||
3 | * Copyright (c) 1998-2002 The OpenSSL Project. All rights reserved. | ||
4 | * | ||
5 | * Redistribution and use in source and binary forms, with or without | ||
6 | * modification, are permitted provided that the following conditions | ||
7 | * are met: | ||
8 | * | ||
9 | * 1. Redistributions of source code must retain the above copyright | ||
10 | * notice, this list of conditions and the following disclaimer. | ||
11 | * | ||
12 | * 2. Redistributions in binary form must reproduce the above copyright | ||
13 | * notice, this list of conditions and the following disclaimer in | ||
14 | * the documentation and/or other materials provided with the | ||
15 | * distribution. | ||
16 | * | ||
17 | * 3. All advertising materials mentioning features or use of this | ||
18 | * software must display the following acknowledgment: | ||
19 | * "This product includes software developed by the OpenSSL Project | ||
20 | * for use in the OpenSSL Toolkit. (http://www.openssl.org/)" | ||
21 | * | ||
22 | * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to | ||
23 | * endorse or promote products derived from this software without | ||
24 | * prior written permission. For written permission, please contact | ||
25 | * openssl-core@openssl.org. | ||
26 | * | ||
27 | * 5. Products derived from this software may not be called "OpenSSL" | ||
28 | * nor may "OpenSSL" appear in their names without prior written | ||
29 | * permission of the OpenSSL Project. | ||
30 | * | ||
31 | * 6. Redistributions of any form whatsoever must retain the following | ||
32 | * acknowledgment: | ||
33 | * "This product includes software developed by the OpenSSL Project | ||
34 | * for use in the OpenSSL Toolkit (http://www.openssl.org/)" | ||
35 | * | ||
36 | * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY | ||
37 | * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | ||
38 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR | ||
39 | * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR | ||
40 | * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, | ||
41 | * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT | ||
42 | * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; | ||
43 | * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | ||
44 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, | ||
45 | * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) | ||
46 | * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | ||
47 | * OF THE POSSIBILITY OF SUCH DAMAGE. | ||
48 | * ==================================================================== | ||
49 | * | ||
50 | * This product includes cryptographic software written by Eric Young | ||
51 | * (eay@cryptsoft.com). This product includes software written by Tim | ||
52 | * Hudson (tjh@cryptsoft.com). | ||
53 | * | ||
54 | */ | ||
55 | |||
56 | #include "ec_lcl.h" | ||
57 | #include <openssl/err.h> | ||
58 | |||
59 | int EC_GROUP_check(const EC_GROUP *group, BN_CTX *ctx) | ||
60 | { | ||
61 | int ret = 0; | ||
62 | BIGNUM *order; | ||
63 | BN_CTX *new_ctx = NULL; | ||
64 | EC_POINT *point = NULL; | ||
65 | |||
66 | if (ctx == NULL) | ||
67 | { | ||
68 | ctx = new_ctx = BN_CTX_new(); | ||
69 | if (ctx == NULL) | ||
70 | { | ||
71 | ECerr(EC_F_EC_GROUP_CHECK, ERR_R_MALLOC_FAILURE); | ||
72 | goto err; | ||
73 | } | ||
74 | } | ||
75 | BN_CTX_start(ctx); | ||
76 | if ((order = BN_CTX_get(ctx)) == NULL) goto err; | ||
77 | |||
78 | /* check the discriminant */ | ||
79 | if (!EC_GROUP_check_discriminant(group, ctx)) | ||
80 | { | ||
81 | ECerr(EC_F_EC_GROUP_CHECK, EC_R_DISCRIMINANT_IS_ZERO); | ||
82 | goto err; | ||
83 | } | ||
84 | |||
85 | /* check the generator */ | ||
86 | if (group->generator == NULL) | ||
87 | { | ||
88 | ECerr(EC_F_EC_GROUP_CHECK, EC_R_UNDEFINED_GENERATOR); | ||
89 | goto err; | ||
90 | } | ||
91 | if (!EC_POINT_is_on_curve(group, group->generator, ctx)) | ||
92 | { | ||
93 | ECerr(EC_F_EC_GROUP_CHECK, EC_R_POINT_IS_NOT_ON_CURVE); | ||
94 | goto err; | ||
95 | } | ||
96 | |||
97 | /* check the order of the generator */ | ||
98 | if ((point = EC_POINT_new(group)) == NULL) goto err; | ||
99 | if (!EC_GROUP_get_order(group, order, ctx)) goto err; | ||
100 | if (BN_is_zero(order)) | ||
101 | { | ||
102 | ECerr(EC_F_EC_GROUP_CHECK, EC_R_UNDEFINED_ORDER); | ||
103 | goto err; | ||
104 | } | ||
105 | |||
106 | if (!EC_POINT_mul(group, point, order, NULL, NULL, ctx)) goto err; | ||
107 | if (!EC_POINT_is_at_infinity(group, point)) | ||
108 | { | ||
109 | ECerr(EC_F_EC_GROUP_CHECK, EC_R_INVALID_GROUP_ORDER); | ||
110 | goto err; | ||
111 | } | ||
112 | |||
113 | ret = 1; | ||
114 | |||
115 | err: | ||
116 | if (ctx != NULL) | ||
117 | BN_CTX_end(ctx); | ||
118 | if (new_ctx != NULL) | ||
119 | BN_CTX_free(new_ctx); | ||
120 | if (point) | ||
121 | EC_POINT_free(point); | ||
122 | return ret; | ||
123 | } | ||
diff --git a/src/lib/libcrypto/ec/ec_curve.c b/src/lib/libcrypto/ec/ec_curve.c deleted file mode 100644 index beac20969b..0000000000 --- a/src/lib/libcrypto/ec/ec_curve.c +++ /dev/null | |||
@@ -1,1270 +0,0 @@ | |||
1 | /* crypto/ec/ec_curve.c */ | ||
2 | /* | ||
3 | * Written by Nils Larsch for the OpenSSL project. | ||
4 | */ | ||
5 | /* ==================================================================== | ||
6 | * Copyright (c) 1998-2004 The OpenSSL Project. All rights reserved. | ||
7 | * | ||
8 | * Redistribution and use in source and binary forms, with or without | ||
9 | * modification, are permitted provided that the following conditions | ||
10 | * are met: | ||
11 | * | ||
12 | * 1. Redistributions of source code must retain the above copyright | ||
13 | * notice, this list of conditions and the following disclaimer. | ||
14 | * | ||
15 | * 2. Redistributions in binary form must reproduce the above copyright | ||
16 | * notice, this list of conditions and the following disclaimer in | ||
17 | * the documentation and/or other materials provided with the | ||
18 | * distribution. | ||
19 | * | ||
20 | * 3. All advertising materials mentioning features or use of this | ||
21 | * software must display the following acknowledgment: | ||
22 | * "This product includes software developed by the OpenSSL Project | ||
23 | * for use in the OpenSSL Toolkit. (http://www.openssl.org/)" | ||
24 | * | ||
25 | * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to | ||
26 | * endorse or promote products derived from this software without | ||
27 | * prior written permission. For written permission, please contact | ||
28 | * openssl-core@openssl.org. | ||
29 | * | ||
30 | * 5. Products derived from this software may not be called "OpenSSL" | ||
31 | * nor may "OpenSSL" appear in their names without prior written | ||
32 | * permission of the OpenSSL Project. | ||
33 | * | ||
34 | * 6. Redistributions of any form whatsoever must retain the following | ||
35 | * acknowledgment: | ||
36 | * "This product includes software developed by the OpenSSL Project | ||
37 | * for use in the OpenSSL Toolkit (http://www.openssl.org/)" | ||
38 | * | ||
39 | * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY | ||
40 | * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | ||
41 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR | ||
42 | * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR | ||
43 | * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, | ||
44 | * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT | ||
45 | * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; | ||
46 | * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | ||
47 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, | ||
48 | * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) | ||
49 | * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | ||
50 | * OF THE POSSIBILITY OF SUCH DAMAGE. | ||
51 | * ==================================================================== | ||
52 | * | ||
53 | * This product includes cryptographic software written by Eric Young | ||
54 | * (eay@cryptsoft.com). This product includes software written by Tim | ||
55 | * Hudson (tjh@cryptsoft.com). | ||
56 | * | ||
57 | */ | ||
58 | /* ==================================================================== | ||
59 | * Copyright 2002 Sun Microsystems, Inc. ALL RIGHTS RESERVED. | ||
60 | * | ||
61 | * Portions of the attached software ("Contribution") are developed by | ||
62 | * SUN MICROSYSTEMS, INC., and are contributed to the OpenSSL project. | ||
63 | * | ||
64 | * The Contribution is licensed pursuant to the OpenSSL open source | ||
65 | * license provided above. | ||
66 | * | ||
67 | * The elliptic curve binary polynomial software is originally written by | ||
68 | * Sheueling Chang Shantz and Douglas Stebila of Sun Microsystems Laboratories. | ||
69 | * | ||
70 | */ | ||
71 | |||
72 | #include "ec_lcl.h" | ||
73 | #include <openssl/err.h> | ||
74 | #include <openssl/obj_mac.h> | ||
75 | |||
76 | typedef struct ec_curve_data_st { | ||
77 | int field_type; /* either NID_X9_62_prime_field or | ||
78 | * NID_X9_62_characteristic_two_field */ | ||
79 | const char *p; /* either a prime number or a polynomial */ | ||
80 | const char *a; | ||
81 | const char *b; | ||
82 | const char *x; /* the x coordinate of the generator */ | ||
83 | const char *y; /* the y coordinate of the generator */ | ||
84 | const char *order; /* the order of the group generated by the | ||
85 | * generator */ | ||
86 | const BN_ULONG cofactor;/* the cofactor */ | ||
87 | const unsigned char *seed;/* the seed (optional) */ | ||
88 | size_t seed_len; | ||
89 | const char *comment; /* a short description of the curve */ | ||
90 | } EC_CURVE_DATA; | ||
91 | |||
92 | /* the nist prime curves */ | ||
93 | static const unsigned char _EC_NIST_PRIME_192_SEED[] = { | ||
94 | 0x30,0x45,0xAE,0x6F,0xC8,0x42,0x2F,0x64,0xED,0x57, | ||
95 | 0x95,0x28,0xD3,0x81,0x20,0xEA,0xE1,0x21,0x96,0xD5}; | ||
96 | static const EC_CURVE_DATA _EC_NIST_PRIME_192 = { | ||
97 | NID_X9_62_prime_field, | ||
98 | "FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFEFFFFFFFFFFFFFFFF", | ||
99 | "FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFEFFFFFFFFFFFFFFFC", | ||
100 | "64210519E59C80E70FA7E9AB72243049FEB8DEECC146B9B1", | ||
101 | "188DA80EB03090F67CBF20EB43A18800F4FF0AFD82FF1012", | ||
102 | "07192b95ffc8da78631011ed6b24cdd573f977a11e794811", | ||
103 | "FFFFFFFFFFFFFFFFFFFFFFFF99DEF836146BC9B1B4D22831",1, | ||
104 | _EC_NIST_PRIME_192_SEED, 20, | ||
105 | "NIST/X9.62/SECG curve over a 192 bit prime field" | ||
106 | }; | ||
107 | |||
108 | static const unsigned char _EC_NIST_PRIME_224_SEED[] = { | ||
109 | 0xBD,0x71,0x34,0x47,0x99,0xD5,0xC7,0xFC,0xDC,0x45, | ||
110 | 0xB5,0x9F,0xA3,0xB9,0xAB,0x8F,0x6A,0x94,0x8B,0xC5}; | ||
111 | static const EC_CURVE_DATA _EC_NIST_PRIME_224 = { | ||
112 | NID_X9_62_prime_field, | ||
113 | "FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF000000000000000000000001", | ||
114 | "FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFEFFFFFFFFFFFFFFFFFFFFFFFE", | ||
115 | "B4050A850C04B3ABF54132565044B0B7D7BFD8BA270B39432355FFB4", | ||
116 | "B70E0CBD6BB4BF7F321390B94A03C1D356C21122343280D6115C1D21", | ||
117 | "bd376388b5f723fb4c22dfe6cd4375a05a07476444d5819985007e34", | ||
118 | "FFFFFFFFFFFFFFFFFFFFFFFFFFFF16A2E0B8F03E13DD29455C5C2A3D",1, | ||
119 | _EC_NIST_PRIME_224_SEED, 20, | ||
120 | "NIST/SECG curve over a 224 bit prime field" | ||
121 | }; | ||
122 | |||
123 | static const unsigned char _EC_NIST_PRIME_384_SEED[] = { | ||
124 | 0xA3,0x35,0x92,0x6A,0xA3,0x19,0xA2,0x7A,0x1D,0x00, | ||
125 | 0x89,0x6A,0x67,0x73,0xA4,0x82,0x7A,0xCD,0xAC,0x73}; | ||
126 | static const EC_CURVE_DATA _EC_NIST_PRIME_384 = { | ||
127 | NID_X9_62_prime_field, | ||
128 | "FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFEFFFFF" | ||
129 | "FFF0000000000000000FFFFFFFF", | ||
130 | "FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFEFFFFF" | ||
131 | "FFF0000000000000000FFFFFFFC", | ||
132 | "B3312FA7E23EE7E4988E056BE3F82D19181D9C6EFE8141120314088F5013875AC6563" | ||
133 | "98D8A2ED19D2A85C8EDD3EC2AEF", | ||
134 | "AA87CA22BE8B05378EB1C71EF320AD746E1D3B628BA79B9859F741E082542A385502F" | ||
135 | "25DBF55296C3A545E3872760AB7", | ||
136 | "3617de4a96262c6f5d9e98bf9292dc29f8f41dbd289a147ce9da3113b5f0b8c00a60b" | ||
137 | "1ce1d7e819d7a431d7c90ea0e5f", | ||
138 | "FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFC7634D81F4372DDF581A0" | ||
139 | "DB248B0A77AECEC196ACCC52973",1, | ||
140 | _EC_NIST_PRIME_384_SEED, 20, | ||
141 | "NIST/SECG curve over a 384 bit prime field" | ||
142 | }; | ||
143 | |||
144 | static const unsigned char _EC_NIST_PRIME_521_SEED[] = { | ||
145 | 0xD0,0x9E,0x88,0x00,0x29,0x1C,0xB8,0x53,0x96,0xCC, | ||
146 | 0x67,0x17,0x39,0x32,0x84,0xAA,0xA0,0xDA,0x64,0xBA}; | ||
147 | static const EC_CURVE_DATA _EC_NIST_PRIME_521 = { | ||
148 | NID_X9_62_prime_field, | ||
149 | "1FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF" | ||
150 | "FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF", | ||
151 | "1FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF" | ||
152 | "FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFC", | ||
153 | "051953EB9618E1C9A1F929A21A0B68540EEA2DA725B99B315F3B8B489918EF109E156" | ||
154 | "193951EC7E937B1652C0BD3BB1BF073573DF883D2C34F1EF451FD46B503F00", | ||
155 | "C6858E06B70404E9CD9E3ECB662395B4429C648139053FB521F828AF606B4D3DBAA14" | ||
156 | "B5E77EFE75928FE1DC127A2FFA8DE3348B3C1856A429BF97E7E31C2E5BD66", | ||
157 | "011839296a789a3bc0045c8a5fb42c7d1bd998f54449579b446817afbd17273e662c9" | ||
158 | "7ee72995ef42640c550b9013fad0761353c7086a272c24088be94769fd16650", | ||
159 | "1FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFA51" | ||
160 | "868783BF2F966B7FCC0148F709A5D03BB5C9B8899C47AEBB6FB71E91386409",1, | ||
161 | _EC_NIST_PRIME_521_SEED, 20, | ||
162 | "NIST/SECG curve over a 521 bit prime field" | ||
163 | }; | ||
164 | /* the x9.62 prime curves (minus the nist prime curves) */ | ||
165 | static const unsigned char _EC_X9_62_PRIME_192V2_SEED[] = { | ||
166 | 0x31,0xA9,0x2E,0xE2,0x02,0x9F,0xD1,0x0D,0x90,0x1B, | ||
167 | 0x11,0x3E,0x99,0x07,0x10,0xF0,0xD2,0x1A,0xC6,0xB6}; | ||
168 | static const EC_CURVE_DATA _EC_X9_62_PRIME_192V2 = { | ||
169 | NID_X9_62_prime_field, | ||
170 | "FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFEFFFFFFFFFFFFFFFF", | ||
171 | "FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFEFFFFFFFFFFFFFFFC", | ||
172 | "CC22D6DFB95C6B25E49C0D6364A4E5980C393AA21668D953", | ||
173 | "EEA2BAE7E1497842F2DE7769CFE9C989C072AD696F48034A", | ||
174 | "6574d11d69b6ec7a672bb82a083df2f2b0847de970b2de15", | ||
175 | "FFFFFFFFFFFFFFFFFFFFFFFE5FB1A724DC80418648D8DD31",1, | ||
176 | _EC_X9_62_PRIME_192V2_SEED, 20, | ||
177 | "X9.62 curve over a 192 bit prime field" | ||
178 | }; | ||
179 | |||
180 | static const unsigned char _EC_X9_62_PRIME_192V3_SEED[] = { | ||
181 | 0xC4,0x69,0x68,0x44,0x35,0xDE,0xB3,0x78,0xC4,0xB6, | ||
182 | 0x5C,0xA9,0x59,0x1E,0x2A,0x57,0x63,0x05,0x9A,0x2E}; | ||
183 | static const EC_CURVE_DATA _EC_X9_62_PRIME_192V3 = { | ||
184 | NID_X9_62_prime_field, | ||
185 | "FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFEFFFFFFFFFFFFFFFF", | ||
186 | "FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFEFFFFFFFFFFFFFFFC", | ||
187 | "22123DC2395A05CAA7423DAECCC94760A7D462256BD56916", | ||
188 | "7D29778100C65A1DA1783716588DCE2B8B4AEE8E228F1896", | ||
189 | "38a90f22637337334b49dcb66a6dc8f9978aca7648a943b0", | ||
190 | "FFFFFFFFFFFFFFFFFFFFFFFF7A62D031C83F4294F640EC13",1, | ||
191 | _EC_X9_62_PRIME_192V3_SEED, 20, | ||
192 | "X9.62 curve over a 192 bit prime field" | ||
193 | }; | ||
194 | |||
195 | static const unsigned char _EC_X9_62_PRIME_239V1_SEED[] = { | ||
196 | 0xE4,0x3B,0xB4,0x60,0xF0,0xB8,0x0C,0xC0,0xC0,0xB0, | ||
197 | 0x75,0x79,0x8E,0x94,0x80,0x60,0xF8,0x32,0x1B,0x7D}; | ||
198 | static const EC_CURVE_DATA _EC_X9_62_PRIME_239V1 = { | ||
199 | NID_X9_62_prime_field, | ||
200 | "7FFFFFFFFFFFFFFFFFFFFFFF7FFFFFFFFFFF8000000000007FFFFFFFFFFF", | ||
201 | "7FFFFFFFFFFFFFFFFFFFFFFF7FFFFFFFFFFF8000000000007FFFFFFFFFFC", | ||
202 | "6B016C3BDCF18941D0D654921475CA71A9DB2FB27D1D37796185C2942C0A", | ||
203 | "0FFA963CDCA8816CCC33B8642BEDF905C3D358573D3F27FBBD3B3CB9AAAF", | ||
204 | "7debe8e4e90a5dae6e4054ca530ba04654b36818ce226b39fccb7b02f1ae", | ||
205 | "7FFFFFFFFFFFFFFFFFFFFFFF7FFFFF9E5E9A9F5D9071FBD1522688909D0B",1, | ||
206 | _EC_X9_62_PRIME_239V1_SEED, 20, | ||
207 | "X9.62 curve over a 239 bit prime field" | ||
208 | }; | ||
209 | |||
210 | static const unsigned char _EC_X9_62_PRIME_239V2_SEED[] = { | ||
211 | 0xE8,0xB4,0x01,0x16,0x04,0x09,0x53,0x03,0xCA,0x3B, | ||
212 | 0x80,0x99,0x98,0x2B,0xE0,0x9F,0xCB,0x9A,0xE6,0x16}; | ||
213 | static const EC_CURVE_DATA _EC_X9_62_PRIME_239V2 = { | ||
214 | NID_X9_62_prime_field, | ||
215 | "7FFFFFFFFFFFFFFFFFFFFFFF7FFFFFFFFFFF8000000000007FFFFFFFFFFF", | ||
216 | "7FFFFFFFFFFFFFFFFFFFFFFF7FFFFFFFFFFF8000000000007FFFFFFFFFFC", | ||
217 | "617FAB6832576CBBFED50D99F0249C3FEE58B94BA0038C7AE84C8C832F2C", | ||
218 | "38AF09D98727705120C921BB5E9E26296A3CDCF2F35757A0EAFD87B830E7", | ||
219 | "5b0125e4dbea0ec7206da0fc01d9b081329fb555de6ef460237dff8be4ba", | ||
220 | "7FFFFFFFFFFFFFFFFFFFFFFF800000CFA7E8594377D414C03821BC582063",1, | ||
221 | _EC_X9_62_PRIME_239V2_SEED, 20, | ||
222 | "X9.62 curve over a 239 bit prime field" | ||
223 | }; | ||
224 | |||
225 | static const unsigned char _EC_X9_62_PRIME_239V3_SEED[] = { | ||
226 | 0x7D,0x73,0x74,0x16,0x8F,0xFE,0x34,0x71,0xB6,0x0A, | ||
227 | 0x85,0x76,0x86,0xA1,0x94,0x75,0xD3,0xBF,0xA2,0xFF}; | ||
228 | static const EC_CURVE_DATA _EC_X9_62_PRIME_239V3 = { | ||
229 | NID_X9_62_prime_field, | ||
230 | "7FFFFFFFFFFFFFFFFFFFFFFF7FFFFFFFFFFF8000000000007FFFFFFFFFFF", | ||
231 | "7FFFFFFFFFFFFFFFFFFFFFFF7FFFFFFFFFFF8000000000007FFFFFFFFFFC", | ||
232 | "255705FA2A306654B1F4CB03D6A750A30C250102D4988717D9BA15AB6D3E", | ||
233 | "6768AE8E18BB92CFCF005C949AA2C6D94853D0E660BBF854B1C9505FE95A", | ||
234 | "1607e6898f390c06bc1d552bad226f3b6fcfe48b6e818499af18e3ed6cf3", | ||
235 | "7FFFFFFFFFFFFFFFFFFFFFFF7FFFFF975DEB41B3A6057C3C432146526551",1, | ||
236 | _EC_X9_62_PRIME_239V3_SEED, 20, | ||
237 | "X9.62 curve over a 239 bit prime field" | ||
238 | }; | ||
239 | |||
240 | static const unsigned char _EC_X9_62_PRIME_256V1_SEED[] = { | ||
241 | 0xC4,0x9D,0x36,0x08,0x86,0xE7,0x04,0x93,0x6A,0x66, | ||
242 | 0x78,0xE1,0x13,0x9D,0x26,0xB7,0x81,0x9F,0x7E,0x90}; | ||
243 | static const EC_CURVE_DATA _EC_X9_62_PRIME_256V1 = { | ||
244 | NID_X9_62_prime_field, | ||
245 | "FFFFFFFF00000001000000000000000000000000FFFFFFFFFFFFFFFFFFFFFFFF", | ||
246 | "FFFFFFFF00000001000000000000000000000000FFFFFFFFFFFFFFFFFFFFFFFC", | ||
247 | "5AC635D8AA3A93E7B3EBBD55769886BC651D06B0CC53B0F63BCE3C3E27D2604B", | ||
248 | "6B17D1F2E12C4247F8BCE6E563A440F277037D812DEB33A0F4A13945D898C296", | ||
249 | "4fe342e2fe1a7f9b8ee7eb4a7c0f9e162bce33576b315ececbb6406837bf51f5", | ||
250 | "FFFFFFFF00000000FFFFFFFFFFFFFFFFBCE6FAADA7179E84F3B9CAC2FC632551",1, | ||
251 | _EC_X9_62_PRIME_256V1_SEED, 20, | ||
252 | "X9.62/SECG curve over a 256 bit prime field" | ||
253 | }; | ||
254 | /* the secg prime curves (minus the nist and x9.62 prime curves) */ | ||
255 | static const unsigned char _EC_SECG_PRIME_112R1_SEED[] = { | ||
256 | 0x00,0xF5,0x0B,0x02,0x8E,0x4D,0x69,0x6E,0x67,0x68, | ||
257 | 0x75,0x61,0x51,0x75,0x29,0x04,0x72,0x78,0x3F,0xB1}; | ||
258 | static const EC_CURVE_DATA _EC_SECG_PRIME_112R1 = { | ||
259 | NID_X9_62_prime_field, | ||
260 | "DB7C2ABF62E35E668076BEAD208B", | ||
261 | "DB7C2ABF62E35E668076BEAD2088", | ||
262 | "659EF8BA043916EEDE8911702B22", | ||
263 | "09487239995A5EE76B55F9C2F098", | ||
264 | "a89ce5af8724c0a23e0e0ff77500", | ||
265 | "DB7C2ABF62E35E7628DFAC6561C5",1, | ||
266 | _EC_SECG_PRIME_112R1_SEED, 20, | ||
267 | "SECG/WTLS curve over a 112 bit prime field" | ||
268 | }; | ||
269 | |||
270 | static const unsigned char _EC_SECG_PRIME_112R2_SEED[] = { | ||
271 | 0x00,0x27,0x57,0xA1,0x11,0x4D,0x69,0x6E,0x67,0x68, | ||
272 | 0x75,0x61,0x51,0x75,0x53,0x16,0xC0,0x5E,0x0B,0xD4}; | ||
273 | static const EC_CURVE_DATA _EC_SECG_PRIME_112R2 = { | ||
274 | NID_X9_62_prime_field, | ||
275 | "DB7C2ABF62E35E668076BEAD208B", | ||
276 | "6127C24C05F38A0AAAF65C0EF02C", | ||
277 | "51DEF1815DB5ED74FCC34C85D709", | ||
278 | "4BA30AB5E892B4E1649DD0928643", | ||
279 | "adcd46f5882e3747def36e956e97", | ||
280 | "36DF0AAFD8B8D7597CA10520D04B",4, | ||
281 | _EC_SECG_PRIME_112R2_SEED, 20, | ||
282 | "SECG curve over a 112 bit prime field" | ||
283 | }; | ||
284 | |||
285 | static const unsigned char _EC_SECG_PRIME_128R1_SEED[] = { | ||
286 | 0x00,0x0E,0x0D,0x4D,0x69,0x6E,0x67,0x68,0x75,0x61, | ||
287 | 0x51,0x75,0x0C,0xC0,0x3A,0x44,0x73,0xD0,0x36,0x79}; | ||
288 | static const EC_CURVE_DATA _EC_SECG_PRIME_128R1 = { | ||
289 | NID_X9_62_prime_field, | ||
290 | "FFFFFFFDFFFFFFFFFFFFFFFFFFFFFFFF", | ||
291 | "FFFFFFFDFFFFFFFFFFFFFFFFFFFFFFFC", | ||
292 | "E87579C11079F43DD824993C2CEE5ED3", | ||
293 | "161FF7528B899B2D0C28607CA52C5B86", | ||
294 | "cf5ac8395bafeb13c02da292dded7a83", | ||
295 | "FFFFFFFE0000000075A30D1B9038A115",1, | ||
296 | _EC_SECG_PRIME_128R1_SEED, 20, | ||
297 | "SECG curve over a 128 bit prime field" | ||
298 | }; | ||
299 | |||
300 | static const unsigned char _EC_SECG_PRIME_128R2_SEED[] = { | ||
301 | 0x00,0x4D,0x69,0x6E,0x67,0x68,0x75,0x61,0x51,0x75, | ||
302 | 0x12,0xD8,0xF0,0x34,0x31,0xFC,0xE6,0x3B,0x88,0xF4}; | ||
303 | static const EC_CURVE_DATA _EC_SECG_PRIME_128R2 = { | ||
304 | NID_X9_62_prime_field, | ||
305 | "FFFFFFFDFFFFFFFFFFFFFFFFFFFFFFFF", | ||
306 | "D6031998D1B3BBFEBF59CC9BBFF9AEE1", | ||
307 | "5EEEFCA380D02919DC2C6558BB6D8A5D", | ||
308 | "7B6AA5D85E572983E6FB32A7CDEBC140", | ||
309 | "27b6916a894d3aee7106fe805fc34b44", | ||
310 | "3FFFFFFF7FFFFFFFBE0024720613B5A3",4, | ||
311 | _EC_SECG_PRIME_128R2_SEED, 20, | ||
312 | "SECG curve over a 128 bit prime field" | ||
313 | }; | ||
314 | |||
315 | static const EC_CURVE_DATA _EC_SECG_PRIME_160K1 = { | ||
316 | NID_X9_62_prime_field, | ||
317 | "FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFEFFFFAC73", | ||
318 | "0", | ||
319 | "7", | ||
320 | "3B4C382CE37AA192A4019E763036F4F5DD4D7EBB", | ||
321 | "938cf935318fdced6bc28286531733c3f03c4fee", | ||
322 | "0100000000000000000001B8FA16DFAB9ACA16B6B3",1, | ||
323 | NULL, 0, | ||
324 | "SECG curve over a 160 bit prime field" | ||
325 | }; | ||
326 | |||
327 | static const unsigned char _EC_SECG_PRIME_160R1_SEED[] = { | ||
328 | 0x10,0x53,0xCD,0xE4,0x2C,0x14,0xD6,0x96,0xE6,0x76, | ||
329 | 0x87,0x56,0x15,0x17,0x53,0x3B,0xF3,0xF8,0x33,0x45}; | ||
330 | static const EC_CURVE_DATA _EC_SECG_PRIME_160R1 = { | ||
331 | NID_X9_62_prime_field, | ||
332 | "FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF7FFFFFFF", | ||
333 | "FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF7FFFFFFC", | ||
334 | "1C97BEFC54BD7A8B65ACF89F81D4D4ADC565FA45", | ||
335 | "4A96B5688EF573284664698968C38BB913CBFC82", | ||
336 | "23a628553168947d59dcc912042351377ac5fb32", | ||
337 | "0100000000000000000001F4C8F927AED3CA752257",1, | ||
338 | _EC_SECG_PRIME_160R1_SEED, 20, | ||
339 | "SECG curve over a 160 bit prime field" | ||
340 | }; | ||
341 | |||
342 | static const unsigned char _EC_SECG_PRIME_160R2_SEED[] = { | ||
343 | 0xB9,0x9B,0x99,0xB0,0x99,0xB3,0x23,0xE0,0x27,0x09, | ||
344 | 0xA4,0xD6,0x96,0xE6,0x76,0x87,0x56,0x15,0x17,0x51}; | ||
345 | static const EC_CURVE_DATA _EC_SECG_PRIME_160R2 = { | ||
346 | NID_X9_62_prime_field, | ||
347 | "FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFEFFFFAC73", | ||
348 | "FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFEFFFFAC70", | ||
349 | "B4E134D3FB59EB8BAB57274904664D5AF50388BA", | ||
350 | "52DCB034293A117E1F4FF11B30F7199D3144CE6D", | ||
351 | "feaffef2e331f296e071fa0df9982cfea7d43f2e", | ||
352 | "0100000000000000000000351EE786A818F3A1A16B",1, | ||
353 | _EC_SECG_PRIME_160R2_SEED, 20, | ||
354 | "SECG/WTLS curve over a 160 bit prime field" | ||
355 | }; | ||
356 | |||
357 | static const EC_CURVE_DATA _EC_SECG_PRIME_192K1 = { | ||
358 | NID_X9_62_prime_field, | ||
359 | "FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFEFFFFEE37", | ||
360 | "0", | ||
361 | "3", | ||
362 | "DB4FF10EC057E9AE26B07D0280B7F4341DA5D1B1EAE06C7D", | ||
363 | "9b2f2f6d9c5628a7844163d015be86344082aa88d95e2f9d", | ||
364 | "FFFFFFFFFFFFFFFFFFFFFFFE26F2FC170F69466A74DEFD8D",1, | ||
365 | NULL, 20, | ||
366 | "SECG curve over a 192 bit prime field" | ||
367 | }; | ||
368 | |||
369 | static const EC_CURVE_DATA _EC_SECG_PRIME_224K1 = { | ||
370 | NID_X9_62_prime_field, | ||
371 | "FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFEFFFFE56D", | ||
372 | "0", | ||
373 | "5", | ||
374 | "A1455B334DF099DF30FC28A169A467E9E47075A90F7E650EB6B7A45C", | ||
375 | "7e089fed7fba344282cafbd6f7e319f7c0b0bd59e2ca4bdb556d61a5", | ||
376 | "010000000000000000000000000001DCE8D2EC6184CAF0A971769FB1F7",1, | ||
377 | NULL, 20, | ||
378 | "SECG curve over a 224 bit prime field" | ||
379 | }; | ||
380 | |||
381 | static const EC_CURVE_DATA _EC_SECG_PRIME_256K1 = { | ||
382 | NID_X9_62_prime_field, | ||
383 | "FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFEFFFFFC2F", | ||
384 | "0", | ||
385 | "7", | ||
386 | "79BE667EF9DCBBAC55A06295CE870B07029BFCDB2DCE28D959F2815B16F81798", | ||
387 | "483ada7726a3c4655da4fbfc0e1108a8fd17b448a68554199c47d08ffb10d4b8", | ||
388 | "FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFEBAAEDCE6AF48A03BBFD25E8CD0364141",1, | ||
389 | NULL, 20, | ||
390 | "SECG curve over a 256 bit prime field" | ||
391 | }; | ||
392 | |||
393 | /* some wap/wtls curves */ | ||
394 | static const EC_CURVE_DATA _EC_WTLS_8 = { | ||
395 | NID_X9_62_prime_field, | ||
396 | "FFFFFFFFFFFFFFFFFFFFFFFFFDE7", | ||
397 | "0", | ||
398 | "3", | ||
399 | "1", | ||
400 | "2", | ||
401 | "0100000000000001ECEA551AD837E9",1, | ||
402 | NULL, 20, | ||
403 | "WTLS curve over a 112 bit prime field" | ||
404 | }; | ||
405 | |||
406 | static const EC_CURVE_DATA _EC_WTLS_9 = { | ||
407 | NID_X9_62_prime_field, | ||
408 | "FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFC808F", | ||
409 | "0", | ||
410 | "3", | ||
411 | "1", | ||
412 | "2", | ||
413 | "0100000000000000000001CDC98AE0E2DE574ABF33",1, | ||
414 | NULL, 20, | ||
415 | "WTLS curve over a 160 bit prime field" | ||
416 | }; | ||
417 | |||
418 | static const EC_CURVE_DATA _EC_WTLS_12 = { | ||
419 | NID_X9_62_prime_field, | ||
420 | "FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF000000000000000000000001", | ||
421 | "FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFEFFFFFFFFFFFFFFFFFFFFFFFE", | ||
422 | "B4050A850C04B3ABF54132565044B0B7D7BFD8BA270B39432355FFB4", | ||
423 | "B70E0CBD6BB4BF7F321390B94A03C1D356C21122343280D6115C1D21", | ||
424 | "bd376388b5f723fb4c22dfe6cd4375a05a07476444d5819985007e34", | ||
425 | "FFFFFFFFFFFFFFFFFFFFFFFFFFFF16A2E0B8F03E13DD29455C5C2A3D", 1, | ||
426 | NULL, 0, | ||
427 | "WTLS curvs over a 224 bit prime field" | ||
428 | }; | ||
429 | |||
430 | /* characteristic two curves */ | ||
431 | static const unsigned char _EC_SECG_CHAR2_113R1_SEED[] = { | ||
432 | 0x10,0xE7,0x23,0xAB,0x14,0xD6,0x96,0xE6,0x76,0x87, | ||
433 | 0x56,0x15,0x17,0x56,0xFE,0xBF,0x8F,0xCB,0x49,0xA9}; | ||
434 | static const EC_CURVE_DATA _EC_SECG_CHAR2_113R1 = { | ||
435 | NID_X9_62_characteristic_two_field, | ||
436 | "020000000000000000000000000201", | ||
437 | "003088250CA6E7C7FE649CE85820F7", | ||
438 | "00E8BEE4D3E2260744188BE0E9C723", | ||
439 | "009D73616F35F4AB1407D73562C10F", | ||
440 | "00A52830277958EE84D1315ED31886", | ||
441 | "0100000000000000D9CCEC8A39E56F", 2, | ||
442 | _EC_SECG_CHAR2_113R1_SEED, 20, | ||
443 | "SECG curve over a 113 bit binary field" | ||
444 | }; | ||
445 | |||
446 | static const unsigned char _EC_SECG_CHAR2_113R2_SEED[] = { | ||
447 | 0x10,0xC0,0xFB,0x15,0x76,0x08,0x60,0xDE,0xF1,0xEE, | ||
448 | 0xF4,0xD6,0x96,0xE6,0x76,0x87,0x56,0x15,0x17,0x5D}; | ||
449 | static const EC_CURVE_DATA _EC_SECG_CHAR2_113R2 = { | ||
450 | NID_X9_62_characteristic_two_field, | ||
451 | "020000000000000000000000000201", | ||
452 | "00689918DBEC7E5A0DD6DFC0AA55C7", | ||
453 | "0095E9A9EC9B297BD4BF36E059184F", | ||
454 | "01A57A6A7B26CA5EF52FCDB8164797", | ||
455 | "00B3ADC94ED1FE674C06E695BABA1D", | ||
456 | "010000000000000108789B2496AF93", 2, | ||
457 | _EC_SECG_CHAR2_113R2_SEED, 20, | ||
458 | "SECG curve over a 113 bit binary field" | ||
459 | }; | ||
460 | |||
461 | static const unsigned char _EC_SECG_CHAR2_131R1_SEED[] = { | ||
462 | 0x4D,0x69,0x6E,0x67,0x68,0x75,0x61,0x51,0x75,0x98, | ||
463 | 0x5B,0xD3,0xAD,0xBA,0xDA,0x21,0xB4,0x3A,0x97,0xE2}; | ||
464 | static const EC_CURVE_DATA _EC_SECG_CHAR2_131R1 = { | ||
465 | NID_X9_62_characteristic_two_field, | ||
466 | "080000000000000000000000000000010D", | ||
467 | "07A11B09A76B562144418FF3FF8C2570B8", | ||
468 | "0217C05610884B63B9C6C7291678F9D341", | ||
469 | "0081BAF91FDF9833C40F9C181343638399", | ||
470 | "078C6E7EA38C001F73C8134B1B4EF9E150", | ||
471 | "0400000000000000023123953A9464B54D", 2, | ||
472 | _EC_SECG_CHAR2_131R1_SEED, 20, | ||
473 | "SECG/WTLS curve over a 131 bit binary field" | ||
474 | }; | ||
475 | |||
476 | static const unsigned char _EC_SECG_CHAR2_131R2_SEED[] = { | ||
477 | 0x98,0x5B,0xD3,0xAD,0xBA,0xD4,0xD6,0x96,0xE6,0x76, | ||
478 | 0x87,0x56,0x15,0x17,0x5A,0x21,0xB4,0x3A,0x97,0xE3}; | ||
479 | static const EC_CURVE_DATA _EC_SECG_CHAR2_131R2 = { | ||
480 | NID_X9_62_characteristic_two_field, | ||
481 | "080000000000000000000000000000010D", | ||
482 | "03E5A88919D7CAFCBF415F07C2176573B2", | ||
483 | "04B8266A46C55657AC734CE38F018F2192", | ||
484 | "0356DCD8F2F95031AD652D23951BB366A8", | ||
485 | "0648F06D867940A5366D9E265DE9EB240F", | ||
486 | "0400000000000000016954A233049BA98F", 2, | ||
487 | _EC_SECG_CHAR2_131R2_SEED, 20, | ||
488 | "SECG curve over a 131 bit binary field" | ||
489 | }; | ||
490 | |||
491 | static const EC_CURVE_DATA _EC_NIST_CHAR2_163K = { | ||
492 | NID_X9_62_characteristic_two_field, | ||
493 | "0800000000000000000000000000000000000000C9", | ||
494 | "1", | ||
495 | "1", | ||
496 | "02FE13C0537BBC11ACAA07D793DE4E6D5E5C94EEE8", | ||
497 | "0289070FB05D38FF58321F2E800536D538CCDAA3D9", | ||
498 | "04000000000000000000020108A2E0CC0D99F8A5EF", 2, | ||
499 | NULL, 0, | ||
500 | "NIST/SECG/WTLS curve over a 163 bit binary field" | ||
501 | }; | ||
502 | |||
503 | static const unsigned char _EC_SECG_CHAR2_163R1_SEED[] = { | ||
504 | 0x24,0xB7,0xB1,0x37,0xC8,0xA1,0x4D,0x69,0x6E,0x67, | ||
505 | 0x68,0x75,0x61,0x51,0x75,0x6F,0xD0,0xDA,0x2E,0x5C}; | ||
506 | static const EC_CURVE_DATA _EC_SECG_CHAR2_163R1 = { | ||
507 | NID_X9_62_characteristic_two_field, | ||
508 | "0800000000000000000000000000000000000000C9", | ||
509 | "07B6882CAAEFA84F9554FF8428BD88E246D2782AE2", | ||
510 | "0713612DCDDCB40AAB946BDA29CA91F73AF958AFD9", | ||
511 | "0369979697AB43897789566789567F787A7876A654", | ||
512 | "00435EDB42EFAFB2989D51FEFCE3C80988F41FF883", | ||
513 | "03FFFFFFFFFFFFFFFFFFFF48AAB689C29CA710279B", 2, | ||
514 | /* The algorithm used to derive the curve parameters from | ||
515 | * the seed used here is slightly different than the | ||
516 | * algorithm described in X9.62 . | ||
517 | */ | ||
518 | #if 0 | ||
519 | _EC_SECG_CHAR2_163R1_SEED, 20, | ||
520 | #else | ||
521 | NULL, 0, | ||
522 | #endif | ||
523 | "SECG curve over a 163 bit binary field" | ||
524 | }; | ||
525 | |||
526 | static const unsigned char _EC_NIST_CHAR2_163B_SEED[] = { | ||
527 | 0x85,0xE2,0x5B,0xFE,0x5C,0x86,0x22,0x6C,0xDB,0x12, | ||
528 | 0x01,0x6F,0x75,0x53,0xF9,0xD0,0xE6,0x93,0xA2,0x68}; | ||
529 | static const EC_CURVE_DATA _EC_NIST_CHAR2_163B ={ | ||
530 | NID_X9_62_characteristic_two_field, | ||
531 | "0800000000000000000000000000000000000000C9", | ||
532 | "1", | ||
533 | "020A601907B8C953CA1481EB10512F78744A3205FD", | ||
534 | "03F0EBA16286A2D57EA0991168D4994637E8343E36", | ||
535 | "00D51FBC6C71A0094FA2CDD545B11C5C0C797324F1", | ||
536 | "040000000000000000000292FE77E70C12A4234C33", 2, | ||
537 | /* The seed here was used to created the curve parameters in normal | ||
538 | * basis representation (and not the polynomial representation used here) | ||
539 | */ | ||
540 | #if 0 | ||
541 | _EC_NIST_CHAR2_163B_SEED, 20, | ||
542 | #else | ||
543 | NULL, 0, | ||
544 | #endif | ||
545 | "NIST/SECG curve over a 163 bit binary field" | ||
546 | }; | ||
547 | |||
548 | static const unsigned char _EC_SECG_CHAR2_193R1_SEED[] = { | ||
549 | 0x10,0x3F,0xAE,0xC7,0x4D,0x69,0x6E,0x67,0x68,0x75, | ||
550 | 0x61,0x51,0x75,0x77,0x7F,0xC5,0xB1,0x91,0xEF,0x30}; | ||
551 | static const EC_CURVE_DATA _EC_SECG_CHAR2_193R1 = { | ||
552 | NID_X9_62_characteristic_two_field, | ||
553 | "02000000000000000000000000000000000000000000008001", | ||
554 | "0017858FEB7A98975169E171F77B4087DE098AC8A911DF7B01", | ||
555 | "00FDFB49BFE6C3A89FACADAA7A1E5BBC7CC1C2E5D831478814", | ||
556 | "01F481BC5F0FF84A74AD6CDF6FDEF4BF6179625372D8C0C5E1", | ||
557 | "0025E399F2903712CCF3EA9E3A1AD17FB0B3201B6AF7CE1B05", | ||
558 | "01000000000000000000000000C7F34A778F443ACC920EBA49", 2, | ||
559 | _EC_SECG_CHAR2_193R1_SEED, 20, | ||
560 | "SECG curve over a 193 bit binary field" | ||
561 | }; | ||
562 | |||
563 | static const unsigned char _EC_SECG_CHAR2_193R2_SEED[] = { | ||
564 | 0x10,0xB7,0xB4,0xD6,0x96,0xE6,0x76,0x87,0x56,0x15, | ||
565 | 0x17,0x51,0x37,0xC8,0xA1,0x6F,0xD0,0xDA,0x22,0x11}; | ||
566 | static const EC_CURVE_DATA _EC_SECG_CHAR2_193R2 = { | ||
567 | NID_X9_62_characteristic_two_field, | ||
568 | "02000000000000000000000000000000000000000000008001", | ||
569 | "0163F35A5137C2CE3EA6ED8667190B0BC43ECD69977702709B", | ||
570 | "00C9BB9E8927D4D64C377E2AB2856A5B16E3EFB7F61D4316AE", | ||
571 | "00D9B67D192E0367C803F39E1A7E82CA14A651350AAE617E8F", | ||
572 | "01CE94335607C304AC29E7DEFBD9CA01F596F927224CDECF6C", | ||
573 | "010000000000000000000000015AAB561B005413CCD4EE99D5", 2, | ||
574 | _EC_SECG_CHAR2_193R2_SEED, 20, | ||
575 | "SECG curve over a 193 bit binary field" | ||
576 | }; | ||
577 | |||
578 | static const EC_CURVE_DATA _EC_NIST_CHAR2_233K = { | ||
579 | NID_X9_62_characteristic_two_field, | ||
580 | "020000000000000000000000000000000000000004000000000000000001", | ||
581 | "0", | ||
582 | "1", | ||
583 | "017232BA853A7E731AF129F22FF4149563A419C26BF50A4C9D6EEFAD6126", | ||
584 | "01DB537DECE819B7F70F555A67C427A8CD9BF18AEB9B56E0C11056FAE6A3", | ||
585 | "008000000000000000000000000000069D5BB915BCD46EFB1AD5F173ABDF", 4, | ||
586 | NULL, 0, | ||
587 | "NIST/SECG/WTLS curve over a 233 bit binary field" | ||
588 | }; | ||
589 | |||
590 | static const unsigned char _EC_NIST_CHAR2_233B_SEED[] = { | ||
591 | 0x74,0xD5,0x9F,0xF0,0x7F,0x6B,0x41,0x3D,0x0E,0xA1, | ||
592 | 0x4B,0x34,0x4B,0x20,0xA2,0xDB,0x04,0x9B,0x50,0xC3}; | ||
593 | static const EC_CURVE_DATA _EC_NIST_CHAR2_233B = { | ||
594 | NID_X9_62_characteristic_two_field, | ||
595 | "020000000000000000000000000000000000000004000000000000000001", | ||
596 | "000000000000000000000000000000000000000000000000000000000001", | ||
597 | "0066647EDE6C332C7F8C0923BB58213B333B20E9CE4281FE115F7D8F90AD", | ||
598 | "00FAC9DFCBAC8313BB2139F1BB755FEF65BC391F8B36F8F8EB7371FD558B", | ||
599 | "01006A08A41903350678E58528BEBF8A0BEFF867A7CA36716F7E01F81052", | ||
600 | "01000000000000000000000000000013E974E72F8A6922031D2603CFE0D7", 2, | ||
601 | _EC_NIST_CHAR2_233B_SEED, 20, | ||
602 | "NIST/SECG/WTLS curve over a 233 bit binary field" | ||
603 | }; | ||
604 | |||
605 | static const EC_CURVE_DATA _EC_SECG_CHAR2_239K1 = { | ||
606 | NID_X9_62_characteristic_two_field, | ||
607 | "800000000000000000004000000000000000000000000000000000000001", | ||
608 | "0", | ||
609 | "1", | ||
610 | "29A0B6A887A983E9730988A68727A8B2D126C44CC2CC7B2A6555193035DC", | ||
611 | "76310804F12E549BDB011C103089E73510ACB275FC312A5DC6B76553F0CA", | ||
612 | "2000000000000000000000000000005A79FEC67CB6E91F1C1DA800E478A5", 4, | ||
613 | NULL, 0, | ||
614 | "SECG curve over a 239 bit binary field" | ||
615 | }; | ||
616 | |||
617 | static const EC_CURVE_DATA _EC_NIST_CHAR2_283K = { | ||
618 | NID_X9_62_characteristic_two_field, | ||
619 | "080000000000000000000000000000000000000000000000000000000000000000001" | ||
620 | "0A1", | ||
621 | "0", | ||
622 | "1", | ||
623 | "0503213F78CA44883F1A3B8162F188E553CD265F23C1567A16876913B0C2AC2458492" | ||
624 | "836", | ||
625 | "01CCDA380F1C9E318D90F95D07E5426FE87E45C0E8184698E45962364E34116177DD2" | ||
626 | "259", | ||
627 | "01FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFE9AE2ED07577265DFF7F94451E061E163" | ||
628 | "C61", 4, | ||
629 | NULL, 20, | ||
630 | "NIST/SECG curve over a 283 bit binary field" | ||
631 | }; | ||
632 | |||
633 | static const unsigned char _EC_NIST_CHAR2_283B_SEED[] = { | ||
634 | 0x77,0xE2,0xB0,0x73,0x70,0xEB,0x0F,0x83,0x2A,0x6D, | ||
635 | 0xD5,0xB6,0x2D,0xFC,0x88,0xCD,0x06,0xBB,0x84,0xBE}; | ||
636 | static const EC_CURVE_DATA _EC_NIST_CHAR2_283B = { | ||
637 | NID_X9_62_characteristic_two_field, | ||
638 | "080000000000000000000000000000000000000000000000000000000000000000001" | ||
639 | "0A1", | ||
640 | "000000000000000000000000000000000000000000000000000000000000000000000" | ||
641 | "001", | ||
642 | "027B680AC8B8596DA5A4AF8A19A0303FCA97FD7645309FA2A581485AF6263E313B79A" | ||
643 | "2F5", | ||
644 | "05F939258DB7DD90E1934F8C70B0DFEC2EED25B8557EAC9C80E2E198F8CDBECD86B12" | ||
645 | "053", | ||
646 | "03676854FE24141CB98FE6D4B20D02B4516FF702350EDDB0826779C813F0DF45BE811" | ||
647 | "2F4", | ||
648 | "03FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFEF90399660FC938A90165B042A7CEFADB" | ||
649 | "307", 2, | ||
650 | _EC_NIST_CHAR2_283B_SEED, 20, | ||
651 | "NIST/SECG curve over a 283 bit binary field" | ||
652 | }; | ||
653 | |||
654 | static const EC_CURVE_DATA _EC_NIST_CHAR2_409K = { | ||
655 | NID_X9_62_characteristic_two_field, | ||
656 | "020000000000000000000000000000000000000000000000000000000000000000000" | ||
657 | "00000000000008000000000000000000001", | ||
658 | "0", | ||
659 | "1", | ||
660 | "0060F05F658F49C1AD3AB1890F7184210EFD0987E307C84C27ACCFB8F9F67CC2C4601" | ||
661 | "89EB5AAAA62EE222EB1B35540CFE9023746", | ||
662 | "01E369050B7C4E42ACBA1DACBF04299C3460782F918EA427E6325165E9EA10E3DA5F6" | ||
663 | "C42E9C55215AA9CA27A5863EC48D8E0286B", | ||
664 | "007FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFE5F83B2D4EA20400" | ||
665 | "EC4557D5ED3E3E7CA5B4B5C83B8E01E5FCF", 4, | ||
666 | NULL, 0, | ||
667 | "NIST/SECG curve over a 409 bit binary field" | ||
668 | }; | ||
669 | |||
670 | static const unsigned char _EC_NIST_CHAR2_409B_SEED[] = { | ||
671 | 0x40,0x99,0xB5,0xA4,0x57,0xF9,0xD6,0x9F,0x79,0x21, | ||
672 | 0x3D,0x09,0x4C,0x4B,0xCD,0x4D,0x42,0x62,0x21,0x0B}; | ||
673 | static const EC_CURVE_DATA _EC_NIST_CHAR2_409B = { | ||
674 | NID_X9_62_characteristic_two_field, | ||
675 | "020000000000000000000000000000000000000000000000000000000000000000000" | ||
676 | "00000000000008000000000000000000001", | ||
677 | "000000000000000000000000000000000000000000000000000000000000000000000" | ||
678 | "00000000000000000000000000000000001", | ||
679 | "0021A5C2C8EE9FEB5C4B9A753B7B476B7FD6422EF1F3DD674761FA99D6AC27C8A9A19" | ||
680 | "7B272822F6CD57A55AA4F50AE317B13545F", | ||
681 | "015D4860D088DDB3496B0C6064756260441CDE4AF1771D4DB01FFE5B34E59703DC255" | ||
682 | "A868A1180515603AEAB60794E54BB7996A7", | ||
683 | "0061B1CFAB6BE5F32BBFA78324ED106A7636B9C5A7BD198D0158AA4F5488D08F38514" | ||
684 | "F1FDF4B4F40D2181B3681C364BA0273C706", | ||
685 | "010000000000000000000000000000000000000000000000000001E2AAD6A612F3330" | ||
686 | "7BE5FA47C3C9E052F838164CD37D9A21173", 2, | ||
687 | _EC_NIST_CHAR2_409B_SEED, 20, | ||
688 | "NIST/SECG curve over a 409 bit binary field" | ||
689 | }; | ||
690 | |||
691 | static const EC_CURVE_DATA _EC_NIST_CHAR2_571K = { | ||
692 | NID_X9_62_characteristic_two_field, | ||
693 | "800000000000000000000000000000000000000000000000000000000000000000000" | ||
694 | "000000000000000000000000000000000000000000000000000000000000000000000" | ||
695 | "00425", | ||
696 | "0", | ||
697 | "1", | ||
698 | "026EB7A859923FBC82189631F8103FE4AC9CA2970012D5D46024804801841CA443709" | ||
699 | "58493B205E647DA304DB4CEB08CBBD1BA39494776FB988B47174DCA88C7E2945283A0" | ||
700 | "1C8972", | ||
701 | "0349DC807F4FBF374F4AEADE3BCA95314DD58CEC9F307A54FFC61EFC006D8A2C9D497" | ||
702 | "9C0AC44AEA74FBEBBB9F772AEDCB620B01A7BA7AF1B320430C8591984F601CD4C143E" | ||
703 | "F1C7A3", | ||
704 | "020000000000000000000000000000000000000000000000000000000000000000000" | ||
705 | "000131850E1F19A63E4B391A8DB917F4138B630D84BE5D639381E91DEB45CFE778F63" | ||
706 | "7C1001", 4, | ||
707 | NULL, 0, | ||
708 | "NIST/SECG curve over a 571 bit binary field" | ||
709 | }; | ||
710 | |||
711 | static const unsigned char _EC_NIST_CHAR2_571B_SEED[] = { | ||
712 | 0x2A,0xA0,0x58,0xF7,0x3A,0x0E,0x33,0xAB,0x48,0x6B, | ||
713 | 0x0F,0x61,0x04,0x10,0xC5,0x3A,0x7F,0x13,0x23,0x10}; | ||
714 | static const EC_CURVE_DATA _EC_NIST_CHAR2_571B = { | ||
715 | NID_X9_62_characteristic_two_field, | ||
716 | "800000000000000000000000000000000000000000000000000000000000000000000" | ||
717 | "000000000000000000000000000000000000000000000000000000000000000000000" | ||
718 | "00425", | ||
719 | "000000000000000000000000000000000000000000000000000000000000000000000" | ||
720 | "000000000000000000000000000000000000000000000000000000000000000000000" | ||
721 | "000001", | ||
722 | "02F40E7E2221F295DE297117B7F3D62F5C6A97FFCB8CEFF1CD6BA8CE4A9A18AD84FFA" | ||
723 | "BBD8EFA59332BE7AD6756A66E294AFD185A78FF12AA520E4DE739BACA0C7FFEFF7F29" | ||
724 | "55727A", | ||
725 | "0303001D34B856296C16C0D40D3CD7750A93D1D2955FA80AA5F40FC8DB7B2ABDBDE53" | ||
726 | "950F4C0D293CDD711A35B67FB1499AE60038614F1394ABFA3B4C850D927E1E7769C8E" | ||
727 | "EC2D19", | ||
728 | "037BF27342DA639B6DCCFFFEB73D69D78C6C27A6009CBBCA1980F8533921E8A684423" | ||
729 | "E43BAB08A576291AF8F461BB2A8B3531D2F0485C19B16E2F1516E23DD3C1A4827AF1B" | ||
730 | "8AC15B", | ||
731 | "03FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF" | ||
732 | "FFFE661CE18FF55987308059B186823851EC7DD9CA1161DE93D5174D66E8382E9BB2F" | ||
733 | "E84E47", 2, | ||
734 | _EC_NIST_CHAR2_571B_SEED, 20, | ||
735 | "NIST/SECG curve over a 571 bit binary field" | ||
736 | }; | ||
737 | |||
738 | static const unsigned char _EC_X9_62_CHAR2_163V1_SEED[] = { | ||
739 | 0xD2,0xC0,0xFB,0x15,0x76,0x08,0x60,0xDE,0xF1,0xEE, | ||
740 | 0xF4,0xD6,0x96,0xE6,0x76,0x87,0x56,0x15,0x17,0x54}; | ||
741 | static const EC_CURVE_DATA _EC_X9_62_CHAR2_163V1 = { | ||
742 | NID_X9_62_characteristic_two_field, | ||
743 | "080000000000000000000000000000000000000107", | ||
744 | "072546B5435234A422E0789675F432C89435DE5242", | ||
745 | "00C9517D06D5240D3CFF38C74B20B6CD4D6F9DD4D9", | ||
746 | "07AF69989546103D79329FCC3D74880F33BBE803CB", | ||
747 | "01EC23211B5966ADEA1D3F87F7EA5848AEF0B7CA9F", | ||
748 | "0400000000000000000001E60FC8821CC74DAEAFC1", 2, | ||
749 | _EC_X9_62_CHAR2_163V1_SEED, 20, | ||
750 | "X9.62 curve over a 163 bit binary field" | ||
751 | }; | ||
752 | |||
753 | static const unsigned char _EC_X9_62_CHAR2_163V2_SEED[] = { | ||
754 | 0x53,0x81,0x4C,0x05,0x0D,0x44,0xD6,0x96,0xE6,0x76, | ||
755 | 0x87,0x56,0x15,0x17,0x58,0x0C,0xA4,0xE2,0x9F,0xFD}; | ||
756 | static const EC_CURVE_DATA _EC_X9_62_CHAR2_163V2 = { | ||
757 | NID_X9_62_characteristic_two_field, | ||
758 | "080000000000000000000000000000000000000107", | ||
759 | "0108B39E77C4B108BED981ED0E890E117C511CF072", | ||
760 | "0667ACEB38AF4E488C407433FFAE4F1C811638DF20", | ||
761 | "0024266E4EB5106D0A964D92C4860E2671DB9B6CC5", | ||
762 | "079F684DDF6684C5CD258B3890021B2386DFD19FC5", | ||
763 | "03FFFFFFFFFFFFFFFFFFFDF64DE1151ADBB78F10A7", 2, | ||
764 | _EC_X9_62_CHAR2_163V2_SEED, 20, | ||
765 | "X9.62 curve over a 163 bit binary field" | ||
766 | }; | ||
767 | |||
768 | static const unsigned char _EC_X9_62_CHAR2_163V3_SEED[] = { | ||
769 | 0x50,0xCB,0xF1,0xD9,0x5C,0xA9,0x4D,0x69,0x6E,0x67, | ||
770 | 0x68,0x75,0x61,0x51,0x75,0xF1,0x6A,0x36,0xA3,0xB8}; | ||
771 | static const EC_CURVE_DATA _EC_X9_62_CHAR2_163V3 = { | ||
772 | NID_X9_62_characteristic_two_field, | ||
773 | "080000000000000000000000000000000000000107", | ||
774 | "07A526C63D3E25A256A007699F5447E32AE456B50E", | ||
775 | "03F7061798EB99E238FD6F1BF95B48FEEB4854252B", | ||
776 | "02F9F87B7C574D0BDECF8A22E6524775F98CDEBDCB", | ||
777 | "05B935590C155E17EA48EB3FF3718B893DF59A05D0", | ||
778 | "03FFFFFFFFFFFFFFFFFFFE1AEE140F110AFF961309", 2, | ||
779 | _EC_X9_62_CHAR2_163V3_SEED, 20, | ||
780 | "X9.62 curve over a 163 bit binary field" | ||
781 | }; | ||
782 | |||
783 | static const EC_CURVE_DATA _EC_X9_62_CHAR2_176V1 = { | ||
784 | NID_X9_62_characteristic_two_field, | ||
785 | "0100000000000000000000000000000000080000000007", | ||
786 | "E4E6DB2995065C407D9D39B8D0967B96704BA8E9C90B", | ||
787 | "5DDA470ABE6414DE8EC133AE28E9BBD7FCEC0AE0FFF2", | ||
788 | "8D16C2866798B600F9F08BB4A8E860F3298CE04A5798", | ||
789 | "6FA4539C2DADDDD6BAB5167D61B436E1D92BB16A562C", | ||
790 | "00010092537397ECA4F6145799D62B0A19CE06FE26AD", 0xFF6E, | ||
791 | NULL, 0, | ||
792 | "X9.62 curve over a 176 bit binary field" | ||
793 | }; | ||
794 | |||
795 | static const unsigned char _EC_X9_62_CHAR2_191V1_SEED[] = { | ||
796 | 0x4E,0x13,0xCA,0x54,0x27,0x44,0xD6,0x96,0xE6,0x76, | ||
797 | 0x87,0x56,0x15,0x17,0x55,0x2F,0x27,0x9A,0x8C,0x84}; | ||
798 | static const EC_CURVE_DATA _EC_X9_62_CHAR2_191V1 = { | ||
799 | NID_X9_62_characteristic_two_field, | ||
800 | "800000000000000000000000000000000000000000000201", | ||
801 | "2866537B676752636A68F56554E12640276B649EF7526267", | ||
802 | "2E45EF571F00786F67B0081B9495A3D95462F5DE0AA185EC", | ||
803 | "36B3DAF8A23206F9C4F299D7B21A9C369137F2C84AE1AA0D", | ||
804 | "765BE73433B3F95E332932E70EA245CA2418EA0EF98018FB", | ||
805 | "40000000000000000000000004A20E90C39067C893BBB9A5", 2, | ||
806 | _EC_X9_62_CHAR2_191V1_SEED, 20, | ||
807 | "X9.62 curve over a 191 bit binary field" | ||
808 | }; | ||
809 | |||
810 | static const unsigned char _EC_X9_62_CHAR2_191V2_SEED[] = { | ||
811 | 0x08,0x71,0xEF,0x2F,0xEF,0x24,0xD6,0x96,0xE6,0x76, | ||
812 | 0x87,0x56,0x15,0x17,0x58,0xBE,0xE0,0xD9,0x5C,0x15}; | ||
813 | static const EC_CURVE_DATA _EC_X9_62_CHAR2_191V2 = { | ||
814 | NID_X9_62_characteristic_two_field, | ||
815 | "800000000000000000000000000000000000000000000201", | ||
816 | "401028774D7777C7B7666D1366EA432071274F89FF01E718", | ||
817 | "0620048D28BCBD03B6249C99182B7C8CD19700C362C46A01", | ||
818 | "3809B2B7CC1B28CC5A87926AAD83FD28789E81E2C9E3BF10", | ||
819 | "17434386626D14F3DBF01760D9213A3E1CF37AEC437D668A", | ||
820 | "20000000000000000000000050508CB89F652824E06B8173", 4, | ||
821 | _EC_X9_62_CHAR2_191V2_SEED, 20, | ||
822 | "X9.62 curve over a 191 bit binary field" | ||
823 | }; | ||
824 | |||
825 | static const unsigned char _EC_X9_62_CHAR2_191V3_SEED[] = { | ||
826 | 0xE0,0x53,0x51,0x2D,0xC6,0x84,0xD6,0x96,0xE6,0x76, | ||
827 | 0x87,0x56,0x15,0x17,0x50,0x67,0xAE,0x78,0x6D,0x1F}; | ||
828 | static const EC_CURVE_DATA _EC_X9_62_CHAR2_191V3 = { | ||
829 | NID_X9_62_characteristic_two_field, | ||
830 | "800000000000000000000000000000000000000000000201", | ||
831 | "6C01074756099122221056911C77D77E77A777E7E7E77FCB", | ||
832 | "71FE1AF926CF847989EFEF8DB459F66394D90F32AD3F15E8", | ||
833 | "375D4CE24FDE434489DE8746E71786015009E66E38A926DD", | ||
834 | "545A39176196575D985999366E6AD34CE0A77CD7127B06BE", | ||
835 | "155555555555555555555555610C0B196812BFB6288A3EA3", 6, | ||
836 | _EC_X9_62_CHAR2_191V3_SEED, 20, | ||
837 | "X9.62 curve over a 191 bit binary field" | ||
838 | }; | ||
839 | |||
840 | static const EC_CURVE_DATA _EC_X9_62_CHAR2_208W1 = { | ||
841 | NID_X9_62_characteristic_two_field, | ||
842 | "010000000000000000000000000000000800000000000000000007", | ||
843 | "0000000000000000000000000000000000000000000000000000", | ||
844 | "C8619ED45A62E6212E1160349E2BFA844439FAFC2A3FD1638F9E", | ||
845 | "89FDFBE4ABE193DF9559ECF07AC0CE78554E2784EB8C1ED1A57A", | ||
846 | "0F55B51A06E78E9AC38A035FF520D8B01781BEB1A6BB08617DE3", | ||
847 | "000101BAF95C9723C57B6C21DA2EFF2D5ED588BDD5717E212F9D", 0xFE48, | ||
848 | NULL, 0, | ||
849 | "X9.62 curve over a 208 bit binary field" | ||
850 | }; | ||
851 | |||
852 | static const unsigned char _EC_X9_62_CHAR2_239V1_SEED[] = { | ||
853 | 0xD3,0x4B,0x9A,0x4D,0x69,0x6E,0x67,0x68,0x75,0x61, | ||
854 | 0x51,0x75,0xCA,0x71,0xB9,0x20,0xBF,0xEF,0xB0,0x5D}; | ||
855 | static const EC_CURVE_DATA _EC_X9_62_CHAR2_239V1 = { | ||
856 | NID_X9_62_characteristic_two_field, | ||
857 | "800000000000000000000000000000000000000000000000001000000001", | ||
858 | "32010857077C5431123A46B808906756F543423E8D27877578125778AC76", | ||
859 | "790408F2EEDAF392B012EDEFB3392F30F4327C0CA3F31FC383C422AA8C16", | ||
860 | "57927098FA932E7C0A96D3FD5B706EF7E5F5C156E16B7E7C86038552E91D", | ||
861 | "61D8EE5077C33FECF6F1A16B268DE469C3C7744EA9A971649FC7A9616305", | ||
862 | "2000000000000000000000000000000F4D42FFE1492A4993F1CAD666E447", 4, | ||
863 | _EC_X9_62_CHAR2_239V1_SEED, 20, | ||
864 | "X9.62 curve over a 239 bit binary field" | ||
865 | }; | ||
866 | |||
867 | static const unsigned char _EC_X9_62_CHAR2_239V2_SEED[] = { | ||
868 | 0x2A,0xA6,0x98,0x2F,0xDF,0xA4,0xD6,0x96,0xE6,0x76, | ||
869 | 0x87,0x56,0x15,0x17,0x5D,0x26,0x67,0x27,0x27,0x7D}; | ||
870 | static const EC_CURVE_DATA _EC_X9_62_CHAR2_239V2 = { | ||
871 | NID_X9_62_characteristic_two_field, | ||
872 | "800000000000000000000000000000000000000000000000001000000001", | ||
873 | "4230017757A767FAE42398569B746325D45313AF0766266479B75654E65F", | ||
874 | "5037EA654196CFF0CD82B2C14A2FCF2E3FF8775285B545722F03EACDB74B", | ||
875 | "28F9D04E900069C8DC47A08534FE76D2B900B7D7EF31F5709F200C4CA205", | ||
876 | "5667334C45AFF3B5A03BAD9DD75E2C71A99362567D5453F7FA6E227EC833", | ||
877 | "1555555555555555555555555555553C6F2885259C31E3FCDF154624522D", 6, | ||
878 | _EC_X9_62_CHAR2_239V2_SEED, 20, | ||
879 | "X9.62 curve over a 239 bit binary field" | ||
880 | }; | ||
881 | |||
882 | static const unsigned char _EC_X9_62_CHAR2_239V3_SEED[] = { | ||
883 | 0x9E,0x07,0x6F,0x4D,0x69,0x6E,0x67,0x68,0x75,0x61, | ||
884 | 0x51,0x75,0xE1,0x1E,0x9F,0xDD,0x77,0xF9,0x20,0x41}; | ||
885 | static const EC_CURVE_DATA _EC_X9_62_CHAR2_239V3 = { | ||
886 | NID_X9_62_characteristic_two_field, | ||
887 | "800000000000000000000000000000000000000000000000001000000001", | ||
888 | "01238774666A67766D6676F778E676B66999176666E687666D8766C66A9F", | ||
889 | "6A941977BA9F6A435199ACFC51067ED587F519C5ECB541B8E44111DE1D40", | ||
890 | "70F6E9D04D289C4E89913CE3530BFDE903977D42B146D539BF1BDE4E9C92", | ||
891 | "2E5A0EAF6E5E1305B9004DCE5C0ED7FE59A35608F33837C816D80B79F461", | ||
892 | "0CCCCCCCCCCCCCCCCCCCCCCCCCCCCCAC4912D2D9DF903EF9888B8A0E4CFF", 0xA, | ||
893 | _EC_X9_62_CHAR2_239V3_SEED, 20, | ||
894 | "X9.62 curve over a 239 bit binary field" | ||
895 | }; | ||
896 | |||
897 | static const EC_CURVE_DATA _EC_X9_62_CHAR2_272W1 = { | ||
898 | NID_X9_62_characteristic_two_field, | ||
899 | "010000000000000000000000000000000000000000000000000000010000000000000" | ||
900 | "B", | ||
901 | "91A091F03B5FBA4AB2CCF49C4EDD220FB028712D42BE752B2C40094DBACDB586FB20", | ||
902 | "7167EFC92BB2E3CE7C8AAAFF34E12A9C557003D7C73A6FAF003F99F6CC8482E540F7", | ||
903 | "6108BABB2CEEBCF787058A056CBE0CFE622D7723A289E08A07AE13EF0D10D171DD8D", | ||
904 | "10C7695716851EEF6BA7F6872E6142FBD241B830FF5EFCACECCAB05E02005DDE9D23", | ||
905 | "000100FAF51354E0E39E4892DF6E319C72C8161603FA45AA7B998A167B8F1E629521", | ||
906 | 0xFF06, | ||
907 | NULL, 0, | ||
908 | "X9.62 curve over a 272 bit binary field" | ||
909 | }; | ||
910 | |||
911 | static const EC_CURVE_DATA _EC_X9_62_CHAR2_304W1 = { | ||
912 | NID_X9_62_characteristic_two_field, | ||
913 | "010000000000000000000000000000000000000000000000000000000000000000000" | ||
914 | "000000807", | ||
915 | "FD0D693149A118F651E6DCE6802085377E5F882D1B510B44160074C1288078365A039" | ||
916 | "6C8E681", | ||
917 | "BDDB97E555A50A908E43B01C798EA5DAA6788F1EA2794EFCF57166B8C14039601E558" | ||
918 | "27340BE", | ||
919 | "197B07845E9BE2D96ADB0F5F3C7F2CFFBD7A3EB8B6FEC35C7FD67F26DDF6285A644F7" | ||
920 | "40A2614", | ||
921 | "E19FBEB76E0DA171517ECF401B50289BF014103288527A9B416A105E80260B549FDC1" | ||
922 | "B92C03B", | ||
923 | "000101D556572AABAC800101D556572AABAC8001022D5C91DD173F8FB561DA6899164" | ||
924 | "443051D", 0xFE2E, | ||
925 | NULL, 0, | ||
926 | "X9.62 curve over a 304 bit binary field" | ||
927 | }; | ||
928 | |||
929 | static const unsigned char _EC_X9_62_CHAR2_359V1_SEED[] = { | ||
930 | 0x2B,0x35,0x49,0x20,0xB7,0x24,0xD6,0x96,0xE6,0x76, | ||
931 | 0x87,0x56,0x15,0x17,0x58,0x5B,0xA1,0x33,0x2D,0xC6}; | ||
932 | static const EC_CURVE_DATA _EC_X9_62_CHAR2_359V1 = { | ||
933 | NID_X9_62_characteristic_two_field, | ||
934 | "800000000000000000000000000000000000000000000000000000000000000000000" | ||
935 | "000100000000000000001", | ||
936 | "5667676A654B20754F356EA92017D946567C46675556F19556A04616B567D223A5E05" | ||
937 | "656FB549016A96656A557", | ||
938 | "2472E2D0197C49363F1FE7F5B6DB075D52B6947D135D8CA445805D39BC34562608968" | ||
939 | "7742B6329E70680231988", | ||
940 | "3C258EF3047767E7EDE0F1FDAA79DAEE3841366A132E163ACED4ED2401DF9C6BDCDE9" | ||
941 | "8E8E707C07A2239B1B097", | ||
942 | "53D7E08529547048121E9C95F3791DD804963948F34FAE7BF44EA82365DC7868FE57E" | ||
943 | "4AE2DE211305A407104BD", | ||
944 | "01AF286BCA1AF286BCA1AF286BCA1AF286BCA1AF286BC9FB8F6B85C556892C20A7EB9" | ||
945 | "64FE7719E74F490758D3B", 0x4C, | ||
946 | _EC_X9_62_CHAR2_359V1_SEED, 20, | ||
947 | "X9.62 curve over a 359 bit binary field" | ||
948 | }; | ||
949 | |||
950 | static const EC_CURVE_DATA _EC_X9_62_CHAR2_368W1 = { | ||
951 | NID_X9_62_characteristic_two_field, | ||
952 | "010000000000000000000000000000000000000000000000000000000000000000000" | ||
953 | "0002000000000000000000007", | ||
954 | "E0D2EE25095206F5E2A4F9ED229F1F256E79A0E2B455970D8D0D865BD94778C576D62" | ||
955 | "F0AB7519CCD2A1A906AE30D", | ||
956 | "FC1217D4320A90452C760A58EDCD30C8DD069B3C34453837A34ED50CB54917E1C2112" | ||
957 | "D84D164F444F8F74786046A", | ||
958 | "1085E2755381DCCCE3C1557AFA10C2F0C0C2825646C5B34A394CBCFA8BC16B22E7E78" | ||
959 | "9E927BE216F02E1FB136A5F", | ||
960 | "7B3EB1BDDCBA62D5D8B2059B525797FC73822C59059C623A45FF3843CEE8F87CD1855" | ||
961 | "ADAA81E2A0750B80FDA2310", | ||
962 | "00010090512DA9AF72B08349D98A5DD4C7B0532ECA51CE03E2D10F3B7AC579BD87E90" | ||
963 | "9AE40A6F131E9CFCE5BD967", 0xFF70, | ||
964 | NULL, 0, | ||
965 | "X9.62 curve over a 368 bit binary field" | ||
966 | }; | ||
967 | |||
968 | static const EC_CURVE_DATA _EC_X9_62_CHAR2_431R1 = { | ||
969 | NID_X9_62_characteristic_two_field, | ||
970 | "800000000000000000000000000000000000000000000000000000000000000000000" | ||
971 | "000000001000000000000000000000000000001", | ||
972 | "1A827EF00DD6FC0E234CAF046C6A5D8A85395B236CC4AD2CF32A0CADBDC9DDF620B0E" | ||
973 | "B9906D0957F6C6FEACD615468DF104DE296CD8F", | ||
974 | "10D9B4A3D9047D8B154359ABFB1B7F5485B04CEB868237DDC9DEDA982A679A5A919B6" | ||
975 | "26D4E50A8DD731B107A9962381FB5D807BF2618", | ||
976 | "120FC05D3C67A99DE161D2F4092622FECA701BE4F50F4758714E8A87BBF2A658EF8C2" | ||
977 | "1E7C5EFE965361F6C2999C0C247B0DBD70CE6B7", | ||
978 | "20D0AF8903A96F8D5FA2C255745D3C451B302C9346D9B7E485E7BCE41F6B591F3E8F6" | ||
979 | "ADDCBB0BC4C2F947A7DE1A89B625D6A598B3760", | ||
980 | "0340340340340340340340340340340340340340340340340340340323C313FAB5058" | ||
981 | "9703B5EC68D3587FEC60D161CC149C1AD4A91", 0x2760, | ||
982 | NULL, 0, | ||
983 | "X9.62 curve over a 431 bit binary field" | ||
984 | }; | ||
985 | |||
986 | static const EC_CURVE_DATA _EC_WTLS_1 = { | ||
987 | NID_X9_62_characteristic_two_field, | ||
988 | "020000000000000000000000000201", | ||
989 | "1", | ||
990 | "1", | ||
991 | "01667979A40BA497E5D5C270780617", | ||
992 | "00F44B4AF1ECC2630E08785CEBCC15", | ||
993 | "00FFFFFFFFFFFFFFFDBF91AF6DEA73", 2, | ||
994 | NULL, 0, | ||
995 | "WTLS curve over a 113 bit binary field" | ||
996 | }; | ||
997 | |||
998 | /* IPSec curves */ | ||
999 | /* NOTE: The of curves over a extension field of non prime degree | ||
1000 | * is not recommended (Weil-descent). | ||
1001 | * As the group order is not a prime this curve is not suitable | ||
1002 | * for ECDSA. | ||
1003 | */ | ||
1004 | static const EC_CURVE_DATA _EC_IPSEC_155_ID3 = { | ||
1005 | NID_X9_62_characteristic_two_field, | ||
1006 | "0800000000000000000000004000000000000001", | ||
1007 | "0", | ||
1008 | "07338f", | ||
1009 | "7b", | ||
1010 | "1c8", | ||
1011 | "2AAAAAAAAAAAAAAAAAAC7F3C7881BD0868FA86C",3, | ||
1012 | NULL, 0, | ||
1013 | "\n\tIPSec/IKE/Oakley curve #3 over a 155 bit binary field.\n" | ||
1014 | "\tNot suitable for ECDSA.\n\tQuestionable extension field!" | ||
1015 | }; | ||
1016 | |||
1017 | /* NOTE: The of curves over a extension field of non prime degree | ||
1018 | * is not recommended (Weil-descent). | ||
1019 | * As the group order is not a prime this curve is not suitable | ||
1020 | * for ECDSA. | ||
1021 | */ | ||
1022 | static const EC_CURVE_DATA _EC_IPSEC_185_ID4 = { | ||
1023 | NID_X9_62_characteristic_two_field, | ||
1024 | "020000000000000000000000000000200000000000000001", | ||
1025 | "0", | ||
1026 | "1ee9", | ||
1027 | "18", | ||
1028 | "0d", | ||
1029 | "FFFFFFFFFFFFFFFFFFFFFFEDF97C44DB9F2420BAFCA75E",2, | ||
1030 | NULL, 0, | ||
1031 | "\n\tIPSec/IKE/Oakley curve #4 over a 185 bit binary field.\n" | ||
1032 | "\tNot suitable for ECDSA.\n\tQuestionable extension field!" | ||
1033 | }; | ||
1034 | |||
1035 | typedef struct _ec_list_element_st { | ||
1036 | int nid; | ||
1037 | const EC_CURVE_DATA *data; | ||
1038 | } ec_list_element; | ||
1039 | |||
1040 | static const ec_list_element curve_list[] = { | ||
1041 | /* prime field curves */ | ||
1042 | /* secg curves */ | ||
1043 | { NID_secp112r1, &_EC_SECG_PRIME_112R1}, | ||
1044 | { NID_secp112r2, &_EC_SECG_PRIME_112R2}, | ||
1045 | { NID_secp128r1, &_EC_SECG_PRIME_128R1}, | ||
1046 | { NID_secp128r2, &_EC_SECG_PRIME_128R2}, | ||
1047 | { NID_secp160k1, &_EC_SECG_PRIME_160K1}, | ||
1048 | { NID_secp160r1, &_EC_SECG_PRIME_160R1}, | ||
1049 | { NID_secp160r2, &_EC_SECG_PRIME_160R2}, | ||
1050 | /* SECG secp192r1 is the same as X9.62 prime192v1 and hence omitted */ | ||
1051 | { NID_secp192k1, &_EC_SECG_PRIME_192K1}, | ||
1052 | { NID_secp224k1, &_EC_SECG_PRIME_224K1}, | ||
1053 | { NID_secp224r1, &_EC_NIST_PRIME_224}, | ||
1054 | { NID_secp256k1, &_EC_SECG_PRIME_256K1}, | ||
1055 | /* SECG secp256r1 is the same as X9.62 prime256v1 and hence omitted */ | ||
1056 | { NID_secp384r1, &_EC_NIST_PRIME_384}, | ||
1057 | { NID_secp521r1, &_EC_NIST_PRIME_521}, | ||
1058 | /* X9.62 curves */ | ||
1059 | { NID_X9_62_prime192v1, &_EC_NIST_PRIME_192}, | ||
1060 | { NID_X9_62_prime192v2, &_EC_X9_62_PRIME_192V2}, | ||
1061 | { NID_X9_62_prime192v3, &_EC_X9_62_PRIME_192V3}, | ||
1062 | { NID_X9_62_prime239v1, &_EC_X9_62_PRIME_239V1}, | ||
1063 | { NID_X9_62_prime239v2, &_EC_X9_62_PRIME_239V2}, | ||
1064 | { NID_X9_62_prime239v3, &_EC_X9_62_PRIME_239V3}, | ||
1065 | { NID_X9_62_prime256v1, &_EC_X9_62_PRIME_256V1}, | ||
1066 | /* characteristic two field curves */ | ||
1067 | /* NIST/SECG curves */ | ||
1068 | { NID_sect113r1, &_EC_SECG_CHAR2_113R1}, | ||
1069 | { NID_sect113r2, &_EC_SECG_CHAR2_113R2}, | ||
1070 | { NID_sect131r1, &_EC_SECG_CHAR2_131R1}, | ||
1071 | { NID_sect131r2, &_EC_SECG_CHAR2_131R2}, | ||
1072 | { NID_sect163k1, &_EC_NIST_CHAR2_163K }, | ||
1073 | { NID_sect163r1, &_EC_SECG_CHAR2_163R1}, | ||
1074 | { NID_sect163r2, &_EC_NIST_CHAR2_163B }, | ||
1075 | { NID_sect193r1, &_EC_SECG_CHAR2_193R1}, | ||
1076 | { NID_sect193r2, &_EC_SECG_CHAR2_193R2}, | ||
1077 | { NID_sect233k1, &_EC_NIST_CHAR2_233K }, | ||
1078 | { NID_sect233r1, &_EC_NIST_CHAR2_233B }, | ||
1079 | { NID_sect239k1, &_EC_SECG_CHAR2_239K1}, | ||
1080 | { NID_sect283k1, &_EC_NIST_CHAR2_283K }, | ||
1081 | { NID_sect283r1, &_EC_NIST_CHAR2_283B }, | ||
1082 | { NID_sect409k1, &_EC_NIST_CHAR2_409K }, | ||
1083 | { NID_sect409r1, &_EC_NIST_CHAR2_409B }, | ||
1084 | { NID_sect571k1, &_EC_NIST_CHAR2_571K }, | ||
1085 | { NID_sect571r1, &_EC_NIST_CHAR2_571B }, | ||
1086 | /* X9.62 curves */ | ||
1087 | { NID_X9_62_c2pnb163v1, &_EC_X9_62_CHAR2_163V1}, | ||
1088 | { NID_X9_62_c2pnb163v2, &_EC_X9_62_CHAR2_163V2}, | ||
1089 | { NID_X9_62_c2pnb163v3, &_EC_X9_62_CHAR2_163V3}, | ||
1090 | { NID_X9_62_c2pnb176v1, &_EC_X9_62_CHAR2_176V1}, | ||
1091 | { NID_X9_62_c2tnb191v1, &_EC_X9_62_CHAR2_191V1}, | ||
1092 | { NID_X9_62_c2tnb191v2, &_EC_X9_62_CHAR2_191V2}, | ||
1093 | { NID_X9_62_c2tnb191v3, &_EC_X9_62_CHAR2_191V3}, | ||
1094 | { NID_X9_62_c2pnb208w1, &_EC_X9_62_CHAR2_208W1}, | ||
1095 | { NID_X9_62_c2tnb239v1, &_EC_X9_62_CHAR2_239V1}, | ||
1096 | { NID_X9_62_c2tnb239v2, &_EC_X9_62_CHAR2_239V2}, | ||
1097 | { NID_X9_62_c2tnb239v3, &_EC_X9_62_CHAR2_239V3}, | ||
1098 | { NID_X9_62_c2pnb272w1, &_EC_X9_62_CHAR2_272W1}, | ||
1099 | { NID_X9_62_c2pnb304w1, &_EC_X9_62_CHAR2_304W1}, | ||
1100 | { NID_X9_62_c2tnb359v1, &_EC_X9_62_CHAR2_359V1}, | ||
1101 | { NID_X9_62_c2pnb368w1, &_EC_X9_62_CHAR2_368W1}, | ||
1102 | { NID_X9_62_c2tnb431r1, &_EC_X9_62_CHAR2_431R1}, | ||
1103 | /* the WAP/WTLS curves | ||
1104 | * [unlike SECG, spec has its own OIDs for curves from X9.62] */ | ||
1105 | { NID_wap_wsg_idm_ecid_wtls1, &_EC_WTLS_1}, | ||
1106 | { NID_wap_wsg_idm_ecid_wtls3, &_EC_NIST_CHAR2_163K}, | ||
1107 | { NID_wap_wsg_idm_ecid_wtls4, &_EC_SECG_CHAR2_113R1}, | ||
1108 | { NID_wap_wsg_idm_ecid_wtls5, &_EC_X9_62_CHAR2_163V1}, | ||
1109 | { NID_wap_wsg_idm_ecid_wtls6, &_EC_SECG_PRIME_112R1}, | ||
1110 | { NID_wap_wsg_idm_ecid_wtls7, &_EC_SECG_PRIME_160R2}, | ||
1111 | { NID_wap_wsg_idm_ecid_wtls8, &_EC_WTLS_8}, | ||
1112 | { NID_wap_wsg_idm_ecid_wtls9, &_EC_WTLS_9 }, | ||
1113 | { NID_wap_wsg_idm_ecid_wtls10, &_EC_NIST_CHAR2_233K}, | ||
1114 | { NID_wap_wsg_idm_ecid_wtls11, &_EC_NIST_CHAR2_233B}, | ||
1115 | { NID_wap_wsg_idm_ecid_wtls12, &_EC_WTLS_12}, | ||
1116 | /* IPSec curves */ | ||
1117 | { NID_ipsec3, &_EC_IPSEC_155_ID3}, | ||
1118 | { NID_ipsec4, &_EC_IPSEC_185_ID4}, | ||
1119 | }; | ||
1120 | |||
1121 | static size_t curve_list_length = sizeof(curve_list)/sizeof(ec_list_element); | ||
1122 | |||
1123 | static EC_GROUP *ec_group_new_from_data(const EC_CURVE_DATA *data) | ||
1124 | { | ||
1125 | EC_GROUP *group=NULL; | ||
1126 | EC_POINT *P=NULL; | ||
1127 | BN_CTX *ctx=NULL; | ||
1128 | BIGNUM *p=NULL, *a=NULL, *b=NULL, *x=NULL, *y=NULL, *order=NULL; | ||
1129 | int ok=0; | ||
1130 | |||
1131 | if ((ctx = BN_CTX_new()) == NULL) | ||
1132 | { | ||
1133 | ECerr(EC_F_EC_GROUP_NEW_FROM_DATA, ERR_R_MALLOC_FAILURE); | ||
1134 | goto err; | ||
1135 | } | ||
1136 | if ((p = BN_new()) == NULL || (a = BN_new()) == NULL || | ||
1137 | (b = BN_new()) == NULL || (x = BN_new()) == NULL || | ||
1138 | (y = BN_new()) == NULL || (order = BN_new()) == NULL) | ||
1139 | { | ||
1140 | ECerr(EC_F_EC_GROUP_NEW_FROM_DATA, ERR_R_MALLOC_FAILURE); | ||
1141 | goto err; | ||
1142 | } | ||
1143 | |||
1144 | if (!BN_hex2bn(&p, data->p) || !BN_hex2bn(&a, data->a) | ||
1145 | || !BN_hex2bn(&b, data->b)) | ||
1146 | { | ||
1147 | ECerr(EC_F_EC_GROUP_NEW_FROM_DATA, ERR_R_BN_LIB); | ||
1148 | goto err; | ||
1149 | } | ||
1150 | |||
1151 | if (data->field_type == NID_X9_62_prime_field) | ||
1152 | { | ||
1153 | if ((group = EC_GROUP_new_curve_GFp(p, a, b, ctx)) == NULL) | ||
1154 | { | ||
1155 | ECerr(EC_F_EC_GROUP_NEW_FROM_DATA, ERR_R_EC_LIB); | ||
1156 | goto err; | ||
1157 | } | ||
1158 | } | ||
1159 | else | ||
1160 | { /* field_type == NID_X9_62_characteristic_two_field */ | ||
1161 | if ((group = EC_GROUP_new_curve_GF2m(p, a, b, ctx)) == NULL) | ||
1162 | { | ||
1163 | ECerr(EC_F_EC_GROUP_NEW_FROM_DATA, ERR_R_EC_LIB); | ||
1164 | goto err; | ||
1165 | } | ||
1166 | } | ||
1167 | |||
1168 | if ((P = EC_POINT_new(group)) == NULL) | ||
1169 | { | ||
1170 | ECerr(EC_F_EC_GROUP_NEW_FROM_DATA, ERR_R_EC_LIB); | ||
1171 | goto err; | ||
1172 | } | ||
1173 | |||
1174 | if (!BN_hex2bn(&x, data->x) || !BN_hex2bn(&y, data->y)) | ||
1175 | { | ||
1176 | ECerr(EC_F_EC_GROUP_NEW_FROM_DATA, ERR_R_BN_LIB); | ||
1177 | goto err; | ||
1178 | } | ||
1179 | if (!EC_POINT_set_affine_coordinates_GF2m(group, P, x, y, ctx)) | ||
1180 | { | ||
1181 | ECerr(EC_F_EC_GROUP_NEW_FROM_DATA, ERR_R_EC_LIB); | ||
1182 | goto err; | ||
1183 | } | ||
1184 | if (!BN_hex2bn(&order, data->order) || !BN_set_word(x, data->cofactor)) | ||
1185 | { | ||
1186 | ECerr(EC_F_EC_GROUP_NEW_FROM_DATA, ERR_R_BN_LIB); | ||
1187 | goto err; | ||
1188 | } | ||
1189 | if (!EC_GROUP_set_generator(group, P, order, x)) | ||
1190 | { | ||
1191 | ECerr(EC_F_EC_GROUP_NEW_FROM_DATA, ERR_R_EC_LIB); | ||
1192 | goto err; | ||
1193 | } | ||
1194 | if (data->seed) | ||
1195 | { | ||
1196 | if (!EC_GROUP_set_seed(group, data->seed, data->seed_len)) | ||
1197 | { | ||
1198 | ECerr(EC_F_EC_GROUP_NEW_FROM_DATA, ERR_R_EC_LIB); | ||
1199 | goto err; | ||
1200 | } | ||
1201 | } | ||
1202 | ok=1; | ||
1203 | err: | ||
1204 | if (!ok) | ||
1205 | { | ||
1206 | EC_GROUP_free(group); | ||
1207 | group = NULL; | ||
1208 | } | ||
1209 | if (P) | ||
1210 | EC_POINT_free(P); | ||
1211 | if (ctx) | ||
1212 | BN_CTX_free(ctx); | ||
1213 | if (p) | ||
1214 | BN_free(p); | ||
1215 | if (a) | ||
1216 | BN_free(a); | ||
1217 | if (b) | ||
1218 | BN_free(b); | ||
1219 | if (order) | ||
1220 | BN_free(order); | ||
1221 | if (x) | ||
1222 | BN_free(x); | ||
1223 | if (y) | ||
1224 | BN_free(y); | ||
1225 | return group; | ||
1226 | } | ||
1227 | |||
1228 | EC_GROUP *EC_GROUP_new_by_curve_name(int nid) | ||
1229 | { | ||
1230 | size_t i; | ||
1231 | EC_GROUP *ret = NULL; | ||
1232 | |||
1233 | if (nid <= 0) | ||
1234 | return NULL; | ||
1235 | |||
1236 | for (i=0; i<curve_list_length; i++) | ||
1237 | if (curve_list[i].nid == nid) | ||
1238 | { | ||
1239 | ret = ec_group_new_from_data(curve_list[i].data); | ||
1240 | break; | ||
1241 | } | ||
1242 | |||
1243 | if (ret == NULL) | ||
1244 | { | ||
1245 | ECerr(EC_F_EC_GROUP_NEW_BY_CURVE_NAME, EC_R_UNKNOWN_GROUP); | ||
1246 | return NULL; | ||
1247 | } | ||
1248 | |||
1249 | EC_GROUP_set_curve_name(ret, nid); | ||
1250 | |||
1251 | return ret; | ||
1252 | } | ||
1253 | |||
1254 | size_t EC_get_builtin_curves(EC_builtin_curve *r, size_t nitems) | ||
1255 | { | ||
1256 | size_t i, min; | ||
1257 | |||
1258 | if (r == NULL || nitems == 0) | ||
1259 | return curve_list_length; | ||
1260 | |||
1261 | min = nitems < curve_list_length ? nitems : curve_list_length; | ||
1262 | |||
1263 | for (i = 0; i < min; i++) | ||
1264 | { | ||
1265 | r[i].nid = curve_list[i].nid; | ||
1266 | r[i].comment = curve_list[i].data->comment; | ||
1267 | } | ||
1268 | |||
1269 | return curve_list_length; | ||
1270 | } | ||
diff --git a/src/lib/libcrypto/ec/ec_cvt.c b/src/lib/libcrypto/ec/ec_cvt.c deleted file mode 100644 index d45640bab9..0000000000 --- a/src/lib/libcrypto/ec/ec_cvt.c +++ /dev/null | |||
@@ -1,144 +0,0 @@ | |||
1 | /* crypto/ec/ec_cvt.c */ | ||
2 | /* | ||
3 | * Originally written by Bodo Moeller for the OpenSSL project. | ||
4 | */ | ||
5 | /* ==================================================================== | ||
6 | * Copyright (c) 1998-2002 The OpenSSL Project. All rights reserved. | ||
7 | * | ||
8 | * Redistribution and use in source and binary forms, with or without | ||
9 | * modification, are permitted provided that the following conditions | ||
10 | * are met: | ||
11 | * | ||
12 | * 1. Redistributions of source code must retain the above copyright | ||
13 | * notice, this list of conditions and the following disclaimer. | ||
14 | * | ||
15 | * 2. Redistributions in binary form must reproduce the above copyright | ||
16 | * notice, this list of conditions and the following disclaimer in | ||
17 | * the documentation and/or other materials provided with the | ||
18 | * distribution. | ||
19 | * | ||
20 | * 3. All advertising materials mentioning features or use of this | ||
21 | * software must display the following acknowledgment: | ||
22 | * "This product includes software developed by the OpenSSL Project | ||
23 | * for use in the OpenSSL Toolkit. (http://www.openssl.org/)" | ||
24 | * | ||
25 | * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to | ||
26 | * endorse or promote products derived from this software without | ||
27 | * prior written permission. For written permission, please contact | ||
28 | * openssl-core@openssl.org. | ||
29 | * | ||
30 | * 5. Products derived from this software may not be called "OpenSSL" | ||
31 | * nor may "OpenSSL" appear in their names without prior written | ||
32 | * permission of the OpenSSL Project. | ||
33 | * | ||
34 | * 6. Redistributions of any form whatsoever must retain the following | ||
35 | * acknowledgment: | ||
36 | * "This product includes software developed by the OpenSSL Project | ||
37 | * for use in the OpenSSL Toolkit (http://www.openssl.org/)" | ||
38 | * | ||
39 | * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY | ||
40 | * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | ||
41 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR | ||
42 | * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR | ||
43 | * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, | ||
44 | * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT | ||
45 | * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; | ||
46 | * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | ||
47 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, | ||
48 | * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) | ||
49 | * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | ||
50 | * OF THE POSSIBILITY OF SUCH DAMAGE. | ||
51 | * ==================================================================== | ||
52 | * | ||
53 | * This product includes cryptographic software written by Eric Young | ||
54 | * (eay@cryptsoft.com). This product includes software written by Tim | ||
55 | * Hudson (tjh@cryptsoft.com). | ||
56 | * | ||
57 | */ | ||
58 | /* ==================================================================== | ||
59 | * Copyright 2002 Sun Microsystems, Inc. ALL RIGHTS RESERVED. | ||
60 | * | ||
61 | * Portions of the attached software ("Contribution") are developed by | ||
62 | * SUN MICROSYSTEMS, INC., and are contributed to the OpenSSL project. | ||
63 | * | ||
64 | * The Contribution is licensed pursuant to the OpenSSL open source | ||
65 | * license provided above. | ||
66 | * | ||
67 | * The elliptic curve binary polynomial software is originally written by | ||
68 | * Sheueling Chang Shantz and Douglas Stebila of Sun Microsystems Laboratories. | ||
69 | * | ||
70 | */ | ||
71 | |||
72 | #include <openssl/err.h> | ||
73 | #include "ec_lcl.h" | ||
74 | |||
75 | |||
76 | EC_GROUP *EC_GROUP_new_curve_GFp(const BIGNUM *p, const BIGNUM *a, const BIGNUM *b, BN_CTX *ctx) | ||
77 | { | ||
78 | const EC_METHOD *meth; | ||
79 | EC_GROUP *ret; | ||
80 | |||
81 | meth = EC_GFp_nist_method(); | ||
82 | |||
83 | ret = EC_GROUP_new(meth); | ||
84 | if (ret == NULL) | ||
85 | return NULL; | ||
86 | |||
87 | if (!EC_GROUP_set_curve_GFp(ret, p, a, b, ctx)) | ||
88 | { | ||
89 | unsigned long err; | ||
90 | |||
91 | err = ERR_peek_last_error(); | ||
92 | |||
93 | if (!(ERR_GET_LIB(err) == ERR_LIB_EC && | ||
94 | ((ERR_GET_REASON(err) == EC_R_NOT_A_NIST_PRIME) || | ||
95 | (ERR_GET_REASON(err) == EC_R_NOT_A_SUPPORTED_NIST_PRIME)))) | ||
96 | { | ||
97 | /* real error */ | ||
98 | |||
99 | EC_GROUP_clear_free(ret); | ||
100 | return NULL; | ||
101 | } | ||
102 | |||
103 | |||
104 | /* not an actual error, we just cannot use EC_GFp_nist_method */ | ||
105 | |||
106 | ERR_clear_error(); | ||
107 | |||
108 | EC_GROUP_clear_free(ret); | ||
109 | meth = EC_GFp_mont_method(); | ||
110 | |||
111 | ret = EC_GROUP_new(meth); | ||
112 | if (ret == NULL) | ||
113 | return NULL; | ||
114 | |||
115 | if (!EC_GROUP_set_curve_GFp(ret, p, a, b, ctx)) | ||
116 | { | ||
117 | EC_GROUP_clear_free(ret); | ||
118 | return NULL; | ||
119 | } | ||
120 | } | ||
121 | |||
122 | return ret; | ||
123 | } | ||
124 | |||
125 | |||
126 | EC_GROUP *EC_GROUP_new_curve_GF2m(const BIGNUM *p, const BIGNUM *a, const BIGNUM *b, BN_CTX *ctx) | ||
127 | { | ||
128 | const EC_METHOD *meth; | ||
129 | EC_GROUP *ret; | ||
130 | |||
131 | meth = EC_GF2m_simple_method(); | ||
132 | |||
133 | ret = EC_GROUP_new(meth); | ||
134 | if (ret == NULL) | ||
135 | return NULL; | ||
136 | |||
137 | if (!EC_GROUP_set_curve_GF2m(ret, p, a, b, ctx)) | ||
138 | { | ||
139 | EC_GROUP_clear_free(ret); | ||
140 | return NULL; | ||
141 | } | ||
142 | |||
143 | return ret; | ||
144 | } | ||
diff --git a/src/lib/libcrypto/ec/ec_err.c b/src/lib/libcrypto/ec/ec_err.c deleted file mode 100644 index d04c895560..0000000000 --- a/src/lib/libcrypto/ec/ec_err.c +++ /dev/null | |||
@@ -1,239 +0,0 @@ | |||
1 | /* crypto/ec/ec_err.c */ | ||
2 | /* ==================================================================== | ||
3 | * Copyright (c) 1999-2007 The OpenSSL Project. All rights reserved. | ||
4 | * | ||
5 | * Redistribution and use in source and binary forms, with or without | ||
6 | * modification, are permitted provided that the following conditions | ||
7 | * are met: | ||
8 | * | ||
9 | * 1. Redistributions of source code must retain the above copyright | ||
10 | * notice, this list of conditions and the following disclaimer. | ||
11 | * | ||
12 | * 2. Redistributions in binary form must reproduce the above copyright | ||
13 | * notice, this list of conditions and the following disclaimer in | ||
14 | * the documentation and/or other materials provided with the | ||
15 | * distribution. | ||
16 | * | ||
17 | * 3. All advertising materials mentioning features or use of this | ||
18 | * software must display the following acknowledgment: | ||
19 | * "This product includes software developed by the OpenSSL Project | ||
20 | * for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)" | ||
21 | * | ||
22 | * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to | ||
23 | * endorse or promote products derived from this software without | ||
24 | * prior written permission. For written permission, please contact | ||
25 | * openssl-core@OpenSSL.org. | ||
26 | * | ||
27 | * 5. Products derived from this software may not be called "OpenSSL" | ||
28 | * nor may "OpenSSL" appear in their names without prior written | ||
29 | * permission of the OpenSSL Project. | ||
30 | * | ||
31 | * 6. Redistributions of any form whatsoever must retain the following | ||
32 | * acknowledgment: | ||
33 | * "This product includes software developed by the OpenSSL Project | ||
34 | * for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)" | ||
35 | * | ||
36 | * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY | ||
37 | * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | ||
38 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR | ||
39 | * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR | ||
40 | * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, | ||
41 | * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT | ||
42 | * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; | ||
43 | * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | ||
44 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, | ||
45 | * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) | ||
46 | * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | ||
47 | * OF THE POSSIBILITY OF SUCH DAMAGE. | ||
48 | * ==================================================================== | ||
49 | * | ||
50 | * This product includes cryptographic software written by Eric Young | ||
51 | * (eay@cryptsoft.com). This product includes software written by Tim | ||
52 | * Hudson (tjh@cryptsoft.com). | ||
53 | * | ||
54 | */ | ||
55 | |||
56 | /* NOTE: this file was auto generated by the mkerr.pl script: any changes | ||
57 | * made to it will be overwritten when the script next updates this file, | ||
58 | * only reason strings will be preserved. | ||
59 | */ | ||
60 | |||
61 | #include <stdio.h> | ||
62 | #include <openssl/err.h> | ||
63 | #include <openssl/ec.h> | ||
64 | |||
65 | /* BEGIN ERROR CODES */ | ||
66 | #ifndef OPENSSL_NO_ERR | ||
67 | |||
68 | #define ERR_FUNC(func) ERR_PACK(ERR_LIB_EC,func,0) | ||
69 | #define ERR_REASON(reason) ERR_PACK(ERR_LIB_EC,0,reason) | ||
70 | |||
71 | static ERR_STRING_DATA EC_str_functs[]= | ||
72 | { | ||
73 | {ERR_FUNC(EC_F_COMPUTE_WNAF), "COMPUTE_WNAF"}, | ||
74 | {ERR_FUNC(EC_F_D2I_ECPARAMETERS), "d2i_ECParameters"}, | ||
75 | {ERR_FUNC(EC_F_D2I_ECPKPARAMETERS), "d2i_ECPKParameters"}, | ||
76 | {ERR_FUNC(EC_F_D2I_ECPRIVATEKEY), "d2i_ECPrivateKey"}, | ||
77 | {ERR_FUNC(EC_F_ECPARAMETERS_PRINT), "ECParameters_print"}, | ||
78 | {ERR_FUNC(EC_F_ECPARAMETERS_PRINT_FP), "ECParameters_print_fp"}, | ||
79 | {ERR_FUNC(EC_F_ECPKPARAMETERS_PRINT), "ECPKParameters_print"}, | ||
80 | {ERR_FUNC(EC_F_ECPKPARAMETERS_PRINT_FP), "ECPKParameters_print_fp"}, | ||
81 | {ERR_FUNC(EC_F_ECP_NIST_MOD_192), "ECP_NIST_MOD_192"}, | ||
82 | {ERR_FUNC(EC_F_ECP_NIST_MOD_224), "ECP_NIST_MOD_224"}, | ||
83 | {ERR_FUNC(EC_F_ECP_NIST_MOD_256), "ECP_NIST_MOD_256"}, | ||
84 | {ERR_FUNC(EC_F_ECP_NIST_MOD_521), "ECP_NIST_MOD_521"}, | ||
85 | {ERR_FUNC(EC_F_EC_ASN1_GROUP2CURVE), "EC_ASN1_GROUP2CURVE"}, | ||
86 | {ERR_FUNC(EC_F_EC_ASN1_GROUP2FIELDID), "EC_ASN1_GROUP2FIELDID"}, | ||
87 | {ERR_FUNC(EC_F_EC_ASN1_GROUP2PARAMETERS), "EC_ASN1_GROUP2PARAMETERS"}, | ||
88 | {ERR_FUNC(EC_F_EC_ASN1_GROUP2PKPARAMETERS), "EC_ASN1_GROUP2PKPARAMETERS"}, | ||
89 | {ERR_FUNC(EC_F_EC_ASN1_PARAMETERS2GROUP), "EC_ASN1_PARAMETERS2GROUP"}, | ||
90 | {ERR_FUNC(EC_F_EC_ASN1_PKPARAMETERS2GROUP), "EC_ASN1_PKPARAMETERS2GROUP"}, | ||
91 | {ERR_FUNC(EC_F_EC_EX_DATA_SET_DATA), "EC_EX_DATA_set_data"}, | ||
92 | {ERR_FUNC(EC_F_EC_GF2M_MONTGOMERY_POINT_MULTIPLY), "EC_GF2M_MONTGOMERY_POINT_MULTIPLY"}, | ||
93 | {ERR_FUNC(EC_F_EC_GF2M_SIMPLE_GROUP_CHECK_DISCRIMINANT), "ec_GF2m_simple_group_check_discriminant"}, | ||
94 | {ERR_FUNC(EC_F_EC_GF2M_SIMPLE_GROUP_SET_CURVE), "ec_GF2m_simple_group_set_curve"}, | ||
95 | {ERR_FUNC(EC_F_EC_GF2M_SIMPLE_OCT2POINT), "ec_GF2m_simple_oct2point"}, | ||
96 | {ERR_FUNC(EC_F_EC_GF2M_SIMPLE_POINT2OCT), "ec_GF2m_simple_point2oct"}, | ||
97 | {ERR_FUNC(EC_F_EC_GF2M_SIMPLE_POINT_GET_AFFINE_COORDINATES), "ec_GF2m_simple_point_get_affine_coordinates"}, | ||
98 | {ERR_FUNC(EC_F_EC_GF2M_SIMPLE_POINT_SET_AFFINE_COORDINATES), "ec_GF2m_simple_point_set_affine_coordinates"}, | ||
99 | {ERR_FUNC(EC_F_EC_GF2M_SIMPLE_SET_COMPRESSED_COORDINATES), "ec_GF2m_simple_set_compressed_coordinates"}, | ||
100 | {ERR_FUNC(EC_F_EC_GFP_MONT_FIELD_DECODE), "ec_GFp_mont_field_decode"}, | ||
101 | {ERR_FUNC(EC_F_EC_GFP_MONT_FIELD_ENCODE), "ec_GFp_mont_field_encode"}, | ||
102 | {ERR_FUNC(EC_F_EC_GFP_MONT_FIELD_MUL), "ec_GFp_mont_field_mul"}, | ||
103 | {ERR_FUNC(EC_F_EC_GFP_MONT_FIELD_SET_TO_ONE), "ec_GFp_mont_field_set_to_one"}, | ||
104 | {ERR_FUNC(EC_F_EC_GFP_MONT_FIELD_SQR), "ec_GFp_mont_field_sqr"}, | ||
105 | {ERR_FUNC(EC_F_EC_GFP_MONT_GROUP_SET_CURVE), "ec_GFp_mont_group_set_curve"}, | ||
106 | {ERR_FUNC(EC_F_EC_GFP_MONT_GROUP_SET_CURVE_GFP), "EC_GFP_MONT_GROUP_SET_CURVE_GFP"}, | ||
107 | {ERR_FUNC(EC_F_EC_GFP_NIST_FIELD_MUL), "ec_GFp_nist_field_mul"}, | ||
108 | {ERR_FUNC(EC_F_EC_GFP_NIST_FIELD_SQR), "ec_GFp_nist_field_sqr"}, | ||
109 | {ERR_FUNC(EC_F_EC_GFP_NIST_GROUP_SET_CURVE), "ec_GFp_nist_group_set_curve"}, | ||
110 | {ERR_FUNC(EC_F_EC_GFP_SIMPLE_GROUP_CHECK_DISCRIMINANT), "ec_GFp_simple_group_check_discriminant"}, | ||
111 | {ERR_FUNC(EC_F_EC_GFP_SIMPLE_GROUP_SET_CURVE), "ec_GFp_simple_group_set_curve"}, | ||
112 | {ERR_FUNC(EC_F_EC_GFP_SIMPLE_GROUP_SET_CURVE_GFP), "EC_GFP_SIMPLE_GROUP_SET_CURVE_GFP"}, | ||
113 | {ERR_FUNC(EC_F_EC_GFP_SIMPLE_GROUP_SET_GENERATOR), "EC_GFP_SIMPLE_GROUP_SET_GENERATOR"}, | ||
114 | {ERR_FUNC(EC_F_EC_GFP_SIMPLE_MAKE_AFFINE), "ec_GFp_simple_make_affine"}, | ||
115 | {ERR_FUNC(EC_F_EC_GFP_SIMPLE_OCT2POINT), "ec_GFp_simple_oct2point"}, | ||
116 | {ERR_FUNC(EC_F_EC_GFP_SIMPLE_POINT2OCT), "ec_GFp_simple_point2oct"}, | ||
117 | {ERR_FUNC(EC_F_EC_GFP_SIMPLE_POINTS_MAKE_AFFINE), "ec_GFp_simple_points_make_affine"}, | ||
118 | {ERR_FUNC(EC_F_EC_GFP_SIMPLE_POINT_GET_AFFINE_COORDINATES), "ec_GFp_simple_point_get_affine_coordinates"}, | ||
119 | {ERR_FUNC(EC_F_EC_GFP_SIMPLE_POINT_GET_AFFINE_COORDINATES_GFP), "EC_GFP_SIMPLE_POINT_GET_AFFINE_COORDINATES_GFP"}, | ||
120 | {ERR_FUNC(EC_F_EC_GFP_SIMPLE_POINT_SET_AFFINE_COORDINATES), "ec_GFp_simple_point_set_affine_coordinates"}, | ||
121 | {ERR_FUNC(EC_F_EC_GFP_SIMPLE_POINT_SET_AFFINE_COORDINATES_GFP), "EC_GFP_SIMPLE_POINT_SET_AFFINE_COORDINATES_GFP"}, | ||
122 | {ERR_FUNC(EC_F_EC_GFP_SIMPLE_SET_COMPRESSED_COORDINATES), "ec_GFp_simple_set_compressed_coordinates"}, | ||
123 | {ERR_FUNC(EC_F_EC_GFP_SIMPLE_SET_COMPRESSED_COORDINATES_GFP), "EC_GFP_SIMPLE_SET_COMPRESSED_COORDINATES_GFP"}, | ||
124 | {ERR_FUNC(EC_F_EC_GROUP_CHECK), "EC_GROUP_check"}, | ||
125 | {ERR_FUNC(EC_F_EC_GROUP_CHECK_DISCRIMINANT), "EC_GROUP_check_discriminant"}, | ||
126 | {ERR_FUNC(EC_F_EC_GROUP_COPY), "EC_GROUP_copy"}, | ||
127 | {ERR_FUNC(EC_F_EC_GROUP_GET0_GENERATOR), "EC_GROUP_get0_generator"}, | ||
128 | {ERR_FUNC(EC_F_EC_GROUP_GET_COFACTOR), "EC_GROUP_get_cofactor"}, | ||
129 | {ERR_FUNC(EC_F_EC_GROUP_GET_CURVE_GF2M), "EC_GROUP_get_curve_GF2m"}, | ||
130 | {ERR_FUNC(EC_F_EC_GROUP_GET_CURVE_GFP), "EC_GROUP_get_curve_GFp"}, | ||
131 | {ERR_FUNC(EC_F_EC_GROUP_GET_DEGREE), "EC_GROUP_get_degree"}, | ||
132 | {ERR_FUNC(EC_F_EC_GROUP_GET_ORDER), "EC_GROUP_get_order"}, | ||
133 | {ERR_FUNC(EC_F_EC_GROUP_GET_PENTANOMIAL_BASIS), "EC_GROUP_get_pentanomial_basis"}, | ||
134 | {ERR_FUNC(EC_F_EC_GROUP_GET_TRINOMIAL_BASIS), "EC_GROUP_get_trinomial_basis"}, | ||
135 | {ERR_FUNC(EC_F_EC_GROUP_NEW), "EC_GROUP_new"}, | ||
136 | {ERR_FUNC(EC_F_EC_GROUP_NEW_BY_CURVE_NAME), "EC_GROUP_new_by_curve_name"}, | ||
137 | {ERR_FUNC(EC_F_EC_GROUP_NEW_FROM_DATA), "EC_GROUP_NEW_FROM_DATA"}, | ||
138 | {ERR_FUNC(EC_F_EC_GROUP_PRECOMPUTE_MULT), "EC_GROUP_precompute_mult"}, | ||
139 | {ERR_FUNC(EC_F_EC_GROUP_SET_CURVE_GF2M), "EC_GROUP_set_curve_GF2m"}, | ||
140 | {ERR_FUNC(EC_F_EC_GROUP_SET_CURVE_GFP), "EC_GROUP_set_curve_GFp"}, | ||
141 | {ERR_FUNC(EC_F_EC_GROUP_SET_EXTRA_DATA), "EC_GROUP_SET_EXTRA_DATA"}, | ||
142 | {ERR_FUNC(EC_F_EC_GROUP_SET_GENERATOR), "EC_GROUP_set_generator"}, | ||
143 | {ERR_FUNC(EC_F_EC_KEY_CHECK_KEY), "EC_KEY_check_key"}, | ||
144 | {ERR_FUNC(EC_F_EC_KEY_COPY), "EC_KEY_copy"}, | ||
145 | {ERR_FUNC(EC_F_EC_KEY_GENERATE_KEY), "EC_KEY_generate_key"}, | ||
146 | {ERR_FUNC(EC_F_EC_KEY_NEW), "EC_KEY_new"}, | ||
147 | {ERR_FUNC(EC_F_EC_KEY_PRINT), "EC_KEY_print"}, | ||
148 | {ERR_FUNC(EC_F_EC_KEY_PRINT_FP), "EC_KEY_print_fp"}, | ||
149 | {ERR_FUNC(EC_F_EC_POINTS_MAKE_AFFINE), "EC_POINTs_make_affine"}, | ||
150 | {ERR_FUNC(EC_F_EC_POINTS_MUL), "EC_POINTs_mul"}, | ||
151 | {ERR_FUNC(EC_F_EC_POINT_ADD), "EC_POINT_add"}, | ||
152 | {ERR_FUNC(EC_F_EC_POINT_CMP), "EC_POINT_cmp"}, | ||
153 | {ERR_FUNC(EC_F_EC_POINT_COPY), "EC_POINT_copy"}, | ||
154 | {ERR_FUNC(EC_F_EC_POINT_DBL), "EC_POINT_dbl"}, | ||
155 | {ERR_FUNC(EC_F_EC_POINT_GET_AFFINE_COORDINATES_GF2M), "EC_POINT_get_affine_coordinates_GF2m"}, | ||
156 | {ERR_FUNC(EC_F_EC_POINT_GET_AFFINE_COORDINATES_GFP), "EC_POINT_get_affine_coordinates_GFp"}, | ||
157 | {ERR_FUNC(EC_F_EC_POINT_GET_JPROJECTIVE_COORDINATES_GFP), "EC_POINT_get_Jprojective_coordinates_GFp"}, | ||
158 | {ERR_FUNC(EC_F_EC_POINT_INVERT), "EC_POINT_invert"}, | ||
159 | {ERR_FUNC(EC_F_EC_POINT_IS_AT_INFINITY), "EC_POINT_is_at_infinity"}, | ||
160 | {ERR_FUNC(EC_F_EC_POINT_IS_ON_CURVE), "EC_POINT_is_on_curve"}, | ||
161 | {ERR_FUNC(EC_F_EC_POINT_MAKE_AFFINE), "EC_POINT_make_affine"}, | ||
162 | {ERR_FUNC(EC_F_EC_POINT_MUL), "EC_POINT_mul"}, | ||
163 | {ERR_FUNC(EC_F_EC_POINT_NEW), "EC_POINT_new"}, | ||
164 | {ERR_FUNC(EC_F_EC_POINT_OCT2POINT), "EC_POINT_oct2point"}, | ||
165 | {ERR_FUNC(EC_F_EC_POINT_POINT2OCT), "EC_POINT_point2oct"}, | ||
166 | {ERR_FUNC(EC_F_EC_POINT_SET_AFFINE_COORDINATES_GF2M), "EC_POINT_set_affine_coordinates_GF2m"}, | ||
167 | {ERR_FUNC(EC_F_EC_POINT_SET_AFFINE_COORDINATES_GFP), "EC_POINT_set_affine_coordinates_GFp"}, | ||
168 | {ERR_FUNC(EC_F_EC_POINT_SET_COMPRESSED_COORDINATES_GF2M), "EC_POINT_set_compressed_coordinates_GF2m"}, | ||
169 | {ERR_FUNC(EC_F_EC_POINT_SET_COMPRESSED_COORDINATES_GFP), "EC_POINT_set_compressed_coordinates_GFp"}, | ||
170 | {ERR_FUNC(EC_F_EC_POINT_SET_JPROJECTIVE_COORDINATES_GFP), "EC_POINT_set_Jprojective_coordinates_GFp"}, | ||
171 | {ERR_FUNC(EC_F_EC_POINT_SET_TO_INFINITY), "EC_POINT_set_to_infinity"}, | ||
172 | {ERR_FUNC(EC_F_EC_PRE_COMP_DUP), "EC_PRE_COMP_DUP"}, | ||
173 | {ERR_FUNC(EC_F_EC_PRE_COMP_NEW), "EC_PRE_COMP_NEW"}, | ||
174 | {ERR_FUNC(EC_F_EC_WNAF_MUL), "ec_wNAF_mul"}, | ||
175 | {ERR_FUNC(EC_F_EC_WNAF_PRECOMPUTE_MULT), "ec_wNAF_precompute_mult"}, | ||
176 | {ERR_FUNC(EC_F_I2D_ECPARAMETERS), "i2d_ECParameters"}, | ||
177 | {ERR_FUNC(EC_F_I2D_ECPKPARAMETERS), "i2d_ECPKParameters"}, | ||
178 | {ERR_FUNC(EC_F_I2D_ECPRIVATEKEY), "i2d_ECPrivateKey"}, | ||
179 | {ERR_FUNC(EC_F_I2O_ECPUBLICKEY), "i2o_ECPublicKey"}, | ||
180 | {ERR_FUNC(EC_F_O2I_ECPUBLICKEY), "o2i_ECPublicKey"}, | ||
181 | {0,NULL} | ||
182 | }; | ||
183 | |||
184 | static ERR_STRING_DATA EC_str_reasons[]= | ||
185 | { | ||
186 | {ERR_REASON(EC_R_ASN1_ERROR) ,"asn1 error"}, | ||
187 | {ERR_REASON(EC_R_ASN1_UNKNOWN_FIELD) ,"asn1 unknown field"}, | ||
188 | {ERR_REASON(EC_R_BUFFER_TOO_SMALL) ,"buffer too small"}, | ||
189 | {ERR_REASON(EC_R_D2I_ECPKPARAMETERS_FAILURE),"d2i ecpkparameters failure"}, | ||
190 | {ERR_REASON(EC_R_DISCRIMINANT_IS_ZERO) ,"discriminant is zero"}, | ||
191 | {ERR_REASON(EC_R_EC_GROUP_NEW_BY_NAME_FAILURE),"ec group new by name failure"}, | ||
192 | {ERR_REASON(EC_R_FIELD_TOO_LARGE) ,"field too large"}, | ||
193 | {ERR_REASON(EC_R_GROUP2PKPARAMETERS_FAILURE),"group2pkparameters failure"}, | ||
194 | {ERR_REASON(EC_R_I2D_ECPKPARAMETERS_FAILURE),"i2d ecpkparameters failure"}, | ||
195 | {ERR_REASON(EC_R_INCOMPATIBLE_OBJECTS) ,"incompatible objects"}, | ||
196 | {ERR_REASON(EC_R_INVALID_ARGUMENT) ,"invalid argument"}, | ||
197 | {ERR_REASON(EC_R_INVALID_COMPRESSED_POINT),"invalid compressed point"}, | ||
198 | {ERR_REASON(EC_R_INVALID_COMPRESSION_BIT),"invalid compression bit"}, | ||
199 | {ERR_REASON(EC_R_INVALID_ENCODING) ,"invalid encoding"}, | ||
200 | {ERR_REASON(EC_R_INVALID_FIELD) ,"invalid field"}, | ||
201 | {ERR_REASON(EC_R_INVALID_FORM) ,"invalid form"}, | ||
202 | {ERR_REASON(EC_R_INVALID_GROUP_ORDER) ,"invalid group order"}, | ||
203 | {ERR_REASON(EC_R_INVALID_PENTANOMIAL_BASIS),"invalid pentanomial basis"}, | ||
204 | {ERR_REASON(EC_R_INVALID_PRIVATE_KEY) ,"invalid private key"}, | ||
205 | {ERR_REASON(EC_R_INVALID_TRINOMIAL_BASIS),"invalid trinomial basis"}, | ||
206 | {ERR_REASON(EC_R_MISSING_PARAMETERS) ,"missing parameters"}, | ||
207 | {ERR_REASON(EC_R_MISSING_PRIVATE_KEY) ,"missing private key"}, | ||
208 | {ERR_REASON(EC_R_NOT_A_NIST_PRIME) ,"not a NIST prime"}, | ||
209 | {ERR_REASON(EC_R_NOT_A_SUPPORTED_NIST_PRIME),"not a supported NIST prime"}, | ||
210 | {ERR_REASON(EC_R_NOT_IMPLEMENTED) ,"not implemented"}, | ||
211 | {ERR_REASON(EC_R_NOT_INITIALIZED) ,"not initialized"}, | ||
212 | {ERR_REASON(EC_R_NO_FIELD_MOD) ,"no field mod"}, | ||
213 | {ERR_REASON(EC_R_PASSED_NULL_PARAMETER) ,"passed null parameter"}, | ||
214 | {ERR_REASON(EC_R_PKPARAMETERS2GROUP_FAILURE),"pkparameters2group failure"}, | ||
215 | {ERR_REASON(EC_R_POINT_AT_INFINITY) ,"point at infinity"}, | ||
216 | {ERR_REASON(EC_R_POINT_IS_NOT_ON_CURVE) ,"point is not on curve"}, | ||
217 | {ERR_REASON(EC_R_SLOT_FULL) ,"slot full"}, | ||
218 | {ERR_REASON(EC_R_UNDEFINED_GENERATOR) ,"undefined generator"}, | ||
219 | {ERR_REASON(EC_R_UNDEFINED_ORDER) ,"undefined order"}, | ||
220 | {ERR_REASON(EC_R_UNKNOWN_GROUP) ,"unknown group"}, | ||
221 | {ERR_REASON(EC_R_UNKNOWN_ORDER) ,"unknown order"}, | ||
222 | {ERR_REASON(EC_R_UNSUPPORTED_FIELD) ,"unsupported field"}, | ||
223 | {ERR_REASON(EC_R_WRONG_ORDER) ,"wrong order"}, | ||
224 | {0,NULL} | ||
225 | }; | ||
226 | |||
227 | #endif | ||
228 | |||
229 | void ERR_load_EC_strings(void) | ||
230 | { | ||
231 | #ifndef OPENSSL_NO_ERR | ||
232 | |||
233 | if (ERR_func_error_string(EC_str_functs[0].error) == NULL) | ||
234 | { | ||
235 | ERR_load_strings(0,EC_str_functs); | ||
236 | ERR_load_strings(0,EC_str_reasons); | ||
237 | } | ||
238 | #endif | ||
239 | } | ||
diff --git a/src/lib/libcrypto/ec/ec_key.c b/src/lib/libcrypto/ec/ec_key.c deleted file mode 100644 index 12fb0e6d6d..0000000000 --- a/src/lib/libcrypto/ec/ec_key.c +++ /dev/null | |||
@@ -1,457 +0,0 @@ | |||
1 | /* crypto/ec/ec_key.c */ | ||
2 | /* | ||
3 | * Written by Nils Larsch for the OpenSSL project. | ||
4 | */ | ||
5 | /* ==================================================================== | ||
6 | * Copyright (c) 1998-2005 The OpenSSL Project. All rights reserved. | ||
7 | * | ||
8 | * Redistribution and use in source and binary forms, with or without | ||
9 | * modification, are permitted provided that the following conditions | ||
10 | * are met: | ||
11 | * | ||
12 | * 1. Redistributions of source code must retain the above copyright | ||
13 | * notice, this list of conditions and the following disclaimer. | ||
14 | * | ||
15 | * 2. Redistributions in binary form must reproduce the above copyright | ||
16 | * notice, this list of conditions and the following disclaimer in | ||
17 | * the documentation and/or other materials provided with the | ||
18 | * distribution. | ||
19 | * | ||
20 | * 3. All advertising materials mentioning features or use of this | ||
21 | * software must display the following acknowledgment: | ||
22 | * "This product includes software developed by the OpenSSL Project | ||
23 | * for use in the OpenSSL Toolkit. (http://www.openssl.org/)" | ||
24 | * | ||
25 | * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to | ||
26 | * endorse or promote products derived from this software without | ||
27 | * prior written permission. For written permission, please contact | ||
28 | * openssl-core@openssl.org. | ||
29 | * | ||
30 | * 5. Products derived from this software may not be called "OpenSSL" | ||
31 | * nor may "OpenSSL" appear in their names without prior written | ||
32 | * permission of the OpenSSL Project. | ||
33 | * | ||
34 | * 6. Redistributions of any form whatsoever must retain the following | ||
35 | * acknowledgment: | ||
36 | * "This product includes software developed by the OpenSSL Project | ||
37 | * for use in the OpenSSL Toolkit (http://www.openssl.org/)" | ||
38 | * | ||
39 | * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY | ||
40 | * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | ||
41 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR | ||
42 | * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR | ||
43 | * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, | ||
44 | * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT | ||
45 | * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; | ||
46 | * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | ||
47 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, | ||
48 | * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) | ||
49 | * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | ||
50 | * OF THE POSSIBILITY OF SUCH DAMAGE. | ||
51 | * ==================================================================== | ||
52 | * | ||
53 | * This product includes cryptographic software written by Eric Young | ||
54 | * (eay@cryptsoft.com). This product includes software written by Tim | ||
55 | * Hudson (tjh@cryptsoft.com). | ||
56 | * | ||
57 | */ | ||
58 | /* ==================================================================== | ||
59 | * Copyright 2002 Sun Microsystems, Inc. ALL RIGHTS RESERVED. | ||
60 | * Portions originally developed by SUN MICROSYSTEMS, INC., and | ||
61 | * contributed to the OpenSSL project. | ||
62 | */ | ||
63 | |||
64 | #include <string.h> | ||
65 | #include "ec_lcl.h" | ||
66 | #include <openssl/err.h> | ||
67 | #include <string.h> | ||
68 | |||
69 | EC_KEY *EC_KEY_new(void) | ||
70 | { | ||
71 | EC_KEY *ret; | ||
72 | |||
73 | ret=(EC_KEY *)OPENSSL_malloc(sizeof(EC_KEY)); | ||
74 | if (ret == NULL) | ||
75 | { | ||
76 | ECerr(EC_F_EC_KEY_NEW, ERR_R_MALLOC_FAILURE); | ||
77 | return(NULL); | ||
78 | } | ||
79 | |||
80 | ret->version = 1; | ||
81 | ret->group = NULL; | ||
82 | ret->pub_key = NULL; | ||
83 | ret->priv_key= NULL; | ||
84 | ret->enc_flag= 0; | ||
85 | ret->conv_form = POINT_CONVERSION_UNCOMPRESSED; | ||
86 | ret->references= 1; | ||
87 | ret->method_data = NULL; | ||
88 | return(ret); | ||
89 | } | ||
90 | |||
91 | EC_KEY *EC_KEY_new_by_curve_name(int nid) | ||
92 | { | ||
93 | EC_KEY *ret = EC_KEY_new(); | ||
94 | if (ret == NULL) | ||
95 | return NULL; | ||
96 | ret->group = EC_GROUP_new_by_curve_name(nid); | ||
97 | if (ret->group == NULL) | ||
98 | { | ||
99 | EC_KEY_free(ret); | ||
100 | return NULL; | ||
101 | } | ||
102 | return ret; | ||
103 | } | ||
104 | |||
105 | void EC_KEY_free(EC_KEY *r) | ||
106 | { | ||
107 | int i; | ||
108 | |||
109 | if (r == NULL) return; | ||
110 | |||
111 | i=CRYPTO_add(&r->references,-1,CRYPTO_LOCK_EC); | ||
112 | #ifdef REF_PRINT | ||
113 | REF_PRINT("EC_KEY",r); | ||
114 | #endif | ||
115 | if (i > 0) return; | ||
116 | #ifdef REF_CHECK | ||
117 | if (i < 0) | ||
118 | { | ||
119 | fprintf(stderr,"EC_KEY_free, bad reference count\n"); | ||
120 | abort(); | ||
121 | } | ||
122 | #endif | ||
123 | |||
124 | if (r->group != NULL) | ||
125 | EC_GROUP_free(r->group); | ||
126 | if (r->pub_key != NULL) | ||
127 | EC_POINT_free(r->pub_key); | ||
128 | if (r->priv_key != NULL) | ||
129 | BN_clear_free(r->priv_key); | ||
130 | |||
131 | EC_EX_DATA_free_all_data(&r->method_data); | ||
132 | |||
133 | OPENSSL_cleanse((void *)r, sizeof(EC_KEY)); | ||
134 | |||
135 | OPENSSL_free(r); | ||
136 | } | ||
137 | |||
138 | EC_KEY *EC_KEY_copy(EC_KEY *dest, const EC_KEY *src) | ||
139 | { | ||
140 | EC_EXTRA_DATA *d; | ||
141 | |||
142 | if (dest == NULL || src == NULL) | ||
143 | { | ||
144 | ECerr(EC_F_EC_KEY_COPY, ERR_R_PASSED_NULL_PARAMETER); | ||
145 | return NULL; | ||
146 | } | ||
147 | /* copy the parameters */ | ||
148 | if (src->group) | ||
149 | { | ||
150 | const EC_METHOD *meth = EC_GROUP_method_of(src->group); | ||
151 | /* clear the old group */ | ||
152 | if (dest->group) | ||
153 | EC_GROUP_free(dest->group); | ||
154 | dest->group = EC_GROUP_new(meth); | ||
155 | if (dest->group == NULL) | ||
156 | return NULL; | ||
157 | if (!EC_GROUP_copy(dest->group, src->group)) | ||
158 | return NULL; | ||
159 | } | ||
160 | /* copy the public key */ | ||
161 | if (src->pub_key && src->group) | ||
162 | { | ||
163 | if (dest->pub_key) | ||
164 | EC_POINT_free(dest->pub_key); | ||
165 | dest->pub_key = EC_POINT_new(src->group); | ||
166 | if (dest->pub_key == NULL) | ||
167 | return NULL; | ||
168 | if (!EC_POINT_copy(dest->pub_key, src->pub_key)) | ||
169 | return NULL; | ||
170 | } | ||
171 | /* copy the private key */ | ||
172 | if (src->priv_key) | ||
173 | { | ||
174 | if (dest->priv_key == NULL) | ||
175 | { | ||
176 | dest->priv_key = BN_new(); | ||
177 | if (dest->priv_key == NULL) | ||
178 | return NULL; | ||
179 | } | ||
180 | if (!BN_copy(dest->priv_key, src->priv_key)) | ||
181 | return NULL; | ||
182 | } | ||
183 | /* copy method/extra data */ | ||
184 | EC_EX_DATA_free_all_data(&dest->method_data); | ||
185 | |||
186 | for (d = src->method_data; d != NULL; d = d->next) | ||
187 | { | ||
188 | void *t = d->dup_func(d->data); | ||
189 | |||
190 | if (t == NULL) | ||
191 | return 0; | ||
192 | if (!EC_EX_DATA_set_data(&dest->method_data, t, d->dup_func, d->free_func, d->clear_free_func)) | ||
193 | return 0; | ||
194 | } | ||
195 | |||
196 | /* copy the rest */ | ||
197 | dest->enc_flag = src->enc_flag; | ||
198 | dest->conv_form = src->conv_form; | ||
199 | dest->version = src->version; | ||
200 | |||
201 | return dest; | ||
202 | } | ||
203 | |||
204 | EC_KEY *EC_KEY_dup(const EC_KEY *ec_key) | ||
205 | { | ||
206 | EC_KEY *ret = EC_KEY_new(); | ||
207 | if (ret == NULL) | ||
208 | return NULL; | ||
209 | if (EC_KEY_copy(ret, ec_key) == NULL) | ||
210 | { | ||
211 | EC_KEY_free(ret); | ||
212 | return NULL; | ||
213 | } | ||
214 | return ret; | ||
215 | } | ||
216 | |||
217 | int EC_KEY_up_ref(EC_KEY *r) | ||
218 | { | ||
219 | int i = CRYPTO_add(&r->references, 1, CRYPTO_LOCK_EC); | ||
220 | #ifdef REF_PRINT | ||
221 | REF_PRINT("EC_KEY",r); | ||
222 | #endif | ||
223 | #ifdef REF_CHECK | ||
224 | if (i < 2) | ||
225 | { | ||
226 | fprintf(stderr, "EC_KEY_up, bad reference count\n"); | ||
227 | abort(); | ||
228 | } | ||
229 | #endif | ||
230 | return ((i > 1) ? 1 : 0); | ||
231 | } | ||
232 | |||
233 | int EC_KEY_generate_key(EC_KEY *eckey) | ||
234 | { | ||
235 | int ok = 0; | ||
236 | BN_CTX *ctx = NULL; | ||
237 | BIGNUM *priv_key = NULL, *order = NULL; | ||
238 | EC_POINT *pub_key = NULL; | ||
239 | |||
240 | if (!eckey || !eckey->group) | ||
241 | { | ||
242 | ECerr(EC_F_EC_KEY_GENERATE_KEY, ERR_R_PASSED_NULL_PARAMETER); | ||
243 | return 0; | ||
244 | } | ||
245 | |||
246 | if ((order = BN_new()) == NULL) goto err; | ||
247 | if ((ctx = BN_CTX_new()) == NULL) goto err; | ||
248 | |||
249 | if (eckey->priv_key == NULL) | ||
250 | { | ||
251 | priv_key = BN_new(); | ||
252 | if (priv_key == NULL) | ||
253 | goto err; | ||
254 | } | ||
255 | else | ||
256 | priv_key = eckey->priv_key; | ||
257 | |||
258 | if (!EC_GROUP_get_order(eckey->group, order, ctx)) | ||
259 | goto err; | ||
260 | |||
261 | do | ||
262 | if (!BN_rand_range(priv_key, order)) | ||
263 | goto err; | ||
264 | while (BN_is_zero(priv_key)); | ||
265 | |||
266 | if (eckey->pub_key == NULL) | ||
267 | { | ||
268 | pub_key = EC_POINT_new(eckey->group); | ||
269 | if (pub_key == NULL) | ||
270 | goto err; | ||
271 | } | ||
272 | else | ||
273 | pub_key = eckey->pub_key; | ||
274 | |||
275 | if (!EC_POINT_mul(eckey->group, pub_key, priv_key, NULL, NULL, ctx)) | ||
276 | goto err; | ||
277 | |||
278 | eckey->priv_key = priv_key; | ||
279 | eckey->pub_key = pub_key; | ||
280 | |||
281 | ok=1; | ||
282 | |||
283 | err: | ||
284 | if (order) | ||
285 | BN_free(order); | ||
286 | if (pub_key != NULL && eckey->pub_key == NULL) | ||
287 | EC_POINT_free(pub_key); | ||
288 | if (priv_key != NULL && eckey->priv_key == NULL) | ||
289 | BN_free(priv_key); | ||
290 | if (ctx != NULL) | ||
291 | BN_CTX_free(ctx); | ||
292 | return(ok); | ||
293 | } | ||
294 | |||
295 | int EC_KEY_check_key(const EC_KEY *eckey) | ||
296 | { | ||
297 | int ok = 0; | ||
298 | BN_CTX *ctx = NULL; | ||
299 | const BIGNUM *order = NULL; | ||
300 | EC_POINT *point = NULL; | ||
301 | |||
302 | if (!eckey || !eckey->group || !eckey->pub_key) | ||
303 | { | ||
304 | ECerr(EC_F_EC_KEY_CHECK_KEY, ERR_R_PASSED_NULL_PARAMETER); | ||
305 | return 0; | ||
306 | } | ||
307 | |||
308 | if ((ctx = BN_CTX_new()) == NULL) | ||
309 | goto err; | ||
310 | if ((point = EC_POINT_new(eckey->group)) == NULL) | ||
311 | goto err; | ||
312 | |||
313 | /* testing whether the pub_key is on the elliptic curve */ | ||
314 | if (!EC_POINT_is_on_curve(eckey->group, eckey->pub_key, ctx)) | ||
315 | { | ||
316 | ECerr(EC_F_EC_KEY_CHECK_KEY, EC_R_POINT_IS_NOT_ON_CURVE); | ||
317 | goto err; | ||
318 | } | ||
319 | /* testing whether pub_key * order is the point at infinity */ | ||
320 | order = &eckey->group->order; | ||
321 | if (BN_is_zero(order)) | ||
322 | { | ||
323 | ECerr(EC_F_EC_KEY_CHECK_KEY, EC_R_INVALID_GROUP_ORDER); | ||
324 | goto err; | ||
325 | } | ||
326 | if (!EC_POINT_mul(eckey->group, point, NULL, eckey->pub_key, order, ctx)) | ||
327 | { | ||
328 | ECerr(EC_F_EC_KEY_CHECK_KEY, ERR_R_EC_LIB); | ||
329 | goto err; | ||
330 | } | ||
331 | if (!EC_POINT_is_at_infinity(eckey->group, point)) | ||
332 | { | ||
333 | ECerr(EC_F_EC_KEY_CHECK_KEY, EC_R_WRONG_ORDER); | ||
334 | goto err; | ||
335 | } | ||
336 | /* in case the priv_key is present : | ||
337 | * check if generator * priv_key == pub_key | ||
338 | */ | ||
339 | if (eckey->priv_key) | ||
340 | { | ||
341 | if (BN_cmp(eckey->priv_key, order) >= 0) | ||
342 | { | ||
343 | ECerr(EC_F_EC_KEY_CHECK_KEY, EC_R_WRONG_ORDER); | ||
344 | goto err; | ||
345 | } | ||
346 | if (!EC_POINT_mul(eckey->group, point, eckey->priv_key, | ||
347 | NULL, NULL, ctx)) | ||
348 | { | ||
349 | ECerr(EC_F_EC_KEY_CHECK_KEY, ERR_R_EC_LIB); | ||
350 | goto err; | ||
351 | } | ||
352 | if (EC_POINT_cmp(eckey->group, point, eckey->pub_key, | ||
353 | ctx) != 0) | ||
354 | { | ||
355 | ECerr(EC_F_EC_KEY_CHECK_KEY, EC_R_INVALID_PRIVATE_KEY); | ||
356 | goto err; | ||
357 | } | ||
358 | } | ||
359 | ok = 1; | ||
360 | err: | ||
361 | if (ctx != NULL) | ||
362 | BN_CTX_free(ctx); | ||
363 | if (point != NULL) | ||
364 | EC_POINT_free(point); | ||
365 | return(ok); | ||
366 | } | ||
367 | |||
368 | const EC_GROUP *EC_KEY_get0_group(const EC_KEY *key) | ||
369 | { | ||
370 | return key->group; | ||
371 | } | ||
372 | |||
373 | int EC_KEY_set_group(EC_KEY *key, const EC_GROUP *group) | ||
374 | { | ||
375 | if (key->group != NULL) | ||
376 | EC_GROUP_free(key->group); | ||
377 | key->group = EC_GROUP_dup(group); | ||
378 | return (key->group == NULL) ? 0 : 1; | ||
379 | } | ||
380 | |||
381 | const BIGNUM *EC_KEY_get0_private_key(const EC_KEY *key) | ||
382 | { | ||
383 | return key->priv_key; | ||
384 | } | ||
385 | |||
386 | int EC_KEY_set_private_key(EC_KEY *key, const BIGNUM *priv_key) | ||
387 | { | ||
388 | if (key->priv_key) | ||
389 | BN_clear_free(key->priv_key); | ||
390 | key->priv_key = BN_dup(priv_key); | ||
391 | return (key->priv_key == NULL) ? 0 : 1; | ||
392 | } | ||
393 | |||
394 | const EC_POINT *EC_KEY_get0_public_key(const EC_KEY *key) | ||
395 | { | ||
396 | return key->pub_key; | ||
397 | } | ||
398 | |||
399 | int EC_KEY_set_public_key(EC_KEY *key, const EC_POINT *pub_key) | ||
400 | { | ||
401 | if (key->pub_key != NULL) | ||
402 | EC_POINT_free(key->pub_key); | ||
403 | key->pub_key = EC_POINT_dup(pub_key, key->group); | ||
404 | return (key->pub_key == NULL) ? 0 : 1; | ||
405 | } | ||
406 | |||
407 | unsigned int EC_KEY_get_enc_flags(const EC_KEY *key) | ||
408 | { | ||
409 | return key->enc_flag; | ||
410 | } | ||
411 | |||
412 | void EC_KEY_set_enc_flags(EC_KEY *key, unsigned int flags) | ||
413 | { | ||
414 | key->enc_flag = flags; | ||
415 | } | ||
416 | |||
417 | point_conversion_form_t EC_KEY_get_conv_form(const EC_KEY *key) | ||
418 | { | ||
419 | return key->conv_form; | ||
420 | } | ||
421 | |||
422 | void EC_KEY_set_conv_form(EC_KEY *key, point_conversion_form_t cform) | ||
423 | { | ||
424 | key->conv_form = cform; | ||
425 | if (key->group != NULL) | ||
426 | EC_GROUP_set_point_conversion_form(key->group, cform); | ||
427 | } | ||
428 | |||
429 | void *EC_KEY_get_key_method_data(EC_KEY *key, | ||
430 | void *(*dup_func)(void *), void (*free_func)(void *), void (*clear_free_func)(void *)) | ||
431 | { | ||
432 | return EC_EX_DATA_get_data(key->method_data, dup_func, free_func, clear_free_func); | ||
433 | } | ||
434 | |||
435 | void EC_KEY_insert_key_method_data(EC_KEY *key, void *data, | ||
436 | void *(*dup_func)(void *), void (*free_func)(void *), void (*clear_free_func)(void *)) | ||
437 | { | ||
438 | EC_EXTRA_DATA *ex_data; | ||
439 | CRYPTO_w_lock(CRYPTO_LOCK_EC); | ||
440 | ex_data = EC_EX_DATA_get_data(key->method_data, dup_func, free_func, clear_free_func); | ||
441 | if (ex_data == NULL) | ||
442 | EC_EX_DATA_set_data(&key->method_data, data, dup_func, free_func, clear_free_func); | ||
443 | CRYPTO_w_unlock(CRYPTO_LOCK_EC); | ||
444 | } | ||
445 | |||
446 | void EC_KEY_set_asn1_flag(EC_KEY *key, int flag) | ||
447 | { | ||
448 | if (key->group != NULL) | ||
449 | EC_GROUP_set_asn1_flag(key->group, flag); | ||
450 | } | ||
451 | |||
452 | int EC_KEY_precompute_mult(EC_KEY *key, BN_CTX *ctx) | ||
453 | { | ||
454 | if (key->group == NULL) | ||
455 | return 0; | ||
456 | return EC_GROUP_precompute_mult(key->group, ctx); | ||
457 | } | ||
diff --git a/src/lib/libcrypto/ec/ec_lcl.h b/src/lib/libcrypto/ec/ec_lcl.h deleted file mode 100644 index fdd7aa2755..0000000000 --- a/src/lib/libcrypto/ec/ec_lcl.h +++ /dev/null | |||
@@ -1,390 +0,0 @@ | |||
1 | /* crypto/ec/ec_lcl.h */ | ||
2 | /* | ||
3 | * Originally written by Bodo Moeller for the OpenSSL project. | ||
4 | */ | ||
5 | /* ==================================================================== | ||
6 | * Copyright (c) 1998-2003 The OpenSSL Project. All rights reserved. | ||
7 | * | ||
8 | * Redistribution and use in source and binary forms, with or without | ||
9 | * modification, are permitted provided that the following conditions | ||
10 | * are met: | ||
11 | * | ||
12 | * 1. Redistributions of source code must retain the above copyright | ||
13 | * notice, this list of conditions and the following disclaimer. | ||
14 | * | ||
15 | * 2. Redistributions in binary form must reproduce the above copyright | ||
16 | * notice, this list of conditions and the following disclaimer in | ||
17 | * the documentation and/or other materials provided with the | ||
18 | * distribution. | ||
19 | * | ||
20 | * 3. All advertising materials mentioning features or use of this | ||
21 | * software must display the following acknowledgment: | ||
22 | * "This product includes software developed by the OpenSSL Project | ||
23 | * for use in the OpenSSL Toolkit. (http://www.openssl.org/)" | ||
24 | * | ||
25 | * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to | ||
26 | * endorse or promote products derived from this software without | ||
27 | * prior written permission. For written permission, please contact | ||
28 | * openssl-core@openssl.org. | ||
29 | * | ||
30 | * 5. Products derived from this software may not be called "OpenSSL" | ||
31 | * nor may "OpenSSL" appear in their names without prior written | ||
32 | * permission of the OpenSSL Project. | ||
33 | * | ||
34 | * 6. Redistributions of any form whatsoever must retain the following | ||
35 | * acknowledgment: | ||
36 | * "This product includes software developed by the OpenSSL Project | ||
37 | * for use in the OpenSSL Toolkit (http://www.openssl.org/)" | ||
38 | * | ||
39 | * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY | ||
40 | * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | ||
41 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR | ||
42 | * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR | ||
43 | * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, | ||
44 | * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT | ||
45 | * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; | ||
46 | * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | ||
47 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, | ||
48 | * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) | ||
49 | * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | ||
50 | * OF THE POSSIBILITY OF SUCH DAMAGE. | ||
51 | * ==================================================================== | ||
52 | * | ||
53 | * This product includes cryptographic software written by Eric Young | ||
54 | * (eay@cryptsoft.com). This product includes software written by Tim | ||
55 | * Hudson (tjh@cryptsoft.com). | ||
56 | * | ||
57 | */ | ||
58 | /* ==================================================================== | ||
59 | * Copyright 2002 Sun Microsystems, Inc. ALL RIGHTS RESERVED. | ||
60 | * | ||
61 | * Portions of the attached software ("Contribution") are developed by | ||
62 | * SUN MICROSYSTEMS, INC., and are contributed to the OpenSSL project. | ||
63 | * | ||
64 | * The Contribution is licensed pursuant to the OpenSSL open source | ||
65 | * license provided above. | ||
66 | * | ||
67 | * The elliptic curve binary polynomial software is originally written by | ||
68 | * Sheueling Chang Shantz and Douglas Stebila of Sun Microsystems Laboratories. | ||
69 | * | ||
70 | */ | ||
71 | |||
72 | |||
73 | #include <stdlib.h> | ||
74 | |||
75 | #include <openssl/obj_mac.h> | ||
76 | #include <openssl/ec.h> | ||
77 | #include <openssl/bn.h> | ||
78 | |||
79 | #if defined(__SUNPRO_C) | ||
80 | # if __SUNPRO_C >= 0x520 | ||
81 | # pragma error_messages (off,E_ARRAY_OF_INCOMPLETE_NONAME,E_ARRAY_OF_INCOMPLETE) | ||
82 | # endif | ||
83 | #endif | ||
84 | |||
85 | /* Structure details are not part of the exported interface, | ||
86 | * so all this may change in future versions. */ | ||
87 | |||
88 | struct ec_method_st { | ||
89 | /* used by EC_METHOD_get_field_type: */ | ||
90 | int field_type; /* a NID */ | ||
91 | |||
92 | /* used by EC_GROUP_new, EC_GROUP_free, EC_GROUP_clear_free, EC_GROUP_copy: */ | ||
93 | int (*group_init)(EC_GROUP *); | ||
94 | void (*group_finish)(EC_GROUP *); | ||
95 | void (*group_clear_finish)(EC_GROUP *); | ||
96 | int (*group_copy)(EC_GROUP *, const EC_GROUP *); | ||
97 | |||
98 | /* used by EC_GROUP_set_curve_GFp, EC_GROUP_get_curve_GFp, */ | ||
99 | /* EC_GROUP_set_curve_GF2m, and EC_GROUP_get_curve_GF2m: */ | ||
100 | int (*group_set_curve)(EC_GROUP *, const BIGNUM *p, const BIGNUM *a, const BIGNUM *b, BN_CTX *); | ||
101 | int (*group_get_curve)(const EC_GROUP *, BIGNUM *p, BIGNUM *a, BIGNUM *b, BN_CTX *); | ||
102 | |||
103 | /* used by EC_GROUP_get_degree: */ | ||
104 | int (*group_get_degree)(const EC_GROUP *); | ||
105 | |||
106 | /* used by EC_GROUP_check: */ | ||
107 | int (*group_check_discriminant)(const EC_GROUP *, BN_CTX *); | ||
108 | |||
109 | /* used by EC_POINT_new, EC_POINT_free, EC_POINT_clear_free, EC_POINT_copy: */ | ||
110 | int (*point_init)(EC_POINT *); | ||
111 | void (*point_finish)(EC_POINT *); | ||
112 | void (*point_clear_finish)(EC_POINT *); | ||
113 | int (*point_copy)(EC_POINT *, const EC_POINT *); | ||
114 | |||
115 | /* used by EC_POINT_set_to_infinity, | ||
116 | * EC_POINT_set_Jprojective_coordinates_GFp, | ||
117 | * EC_POINT_get_Jprojective_coordinates_GFp, | ||
118 | * EC_POINT_set_affine_coordinates_GFp, ..._GF2m, | ||
119 | * EC_POINT_get_affine_coordinates_GFp, ..._GF2m, | ||
120 | * EC_POINT_set_compressed_coordinates_GFp, ..._GF2m: | ||
121 | */ | ||
122 | int (*point_set_to_infinity)(const EC_GROUP *, EC_POINT *); | ||
123 | int (*point_set_Jprojective_coordinates_GFp)(const EC_GROUP *, EC_POINT *, | ||
124 | const BIGNUM *x, const BIGNUM *y, const BIGNUM *z, BN_CTX *); | ||
125 | int (*point_get_Jprojective_coordinates_GFp)(const EC_GROUP *, const EC_POINT *, | ||
126 | BIGNUM *x, BIGNUM *y, BIGNUM *z, BN_CTX *); | ||
127 | int (*point_set_affine_coordinates)(const EC_GROUP *, EC_POINT *, | ||
128 | const BIGNUM *x, const BIGNUM *y, BN_CTX *); | ||
129 | int (*point_get_affine_coordinates)(const EC_GROUP *, const EC_POINT *, | ||
130 | BIGNUM *x, BIGNUM *y, BN_CTX *); | ||
131 | int (*point_set_compressed_coordinates)(const EC_GROUP *, EC_POINT *, | ||
132 | const BIGNUM *x, int y_bit, BN_CTX *); | ||
133 | |||
134 | /* used by EC_POINT_point2oct, EC_POINT_oct2point: */ | ||
135 | size_t (*point2oct)(const EC_GROUP *, const EC_POINT *, point_conversion_form_t form, | ||
136 | unsigned char *buf, size_t len, BN_CTX *); | ||
137 | int (*oct2point)(const EC_GROUP *, EC_POINT *, | ||
138 | const unsigned char *buf, size_t len, BN_CTX *); | ||
139 | |||
140 | /* used by EC_POINT_add, EC_POINT_dbl, ECP_POINT_invert: */ | ||
141 | int (*add)(const EC_GROUP *, EC_POINT *r, const EC_POINT *a, const EC_POINT *b, BN_CTX *); | ||
142 | int (*dbl)(const EC_GROUP *, EC_POINT *r, const EC_POINT *a, BN_CTX *); | ||
143 | int (*invert)(const EC_GROUP *, EC_POINT *, BN_CTX *); | ||
144 | |||
145 | /* used by EC_POINT_is_at_infinity, EC_POINT_is_on_curve, EC_POINT_cmp: */ | ||
146 | int (*is_at_infinity)(const EC_GROUP *, const EC_POINT *); | ||
147 | int (*is_on_curve)(const EC_GROUP *, const EC_POINT *, BN_CTX *); | ||
148 | int (*point_cmp)(const EC_GROUP *, const EC_POINT *a, const EC_POINT *b, BN_CTX *); | ||
149 | |||
150 | /* used by EC_POINT_make_affine, EC_POINTs_make_affine: */ | ||
151 | int (*make_affine)(const EC_GROUP *, EC_POINT *, BN_CTX *); | ||
152 | int (*points_make_affine)(const EC_GROUP *, size_t num, EC_POINT *[], BN_CTX *); | ||
153 | |||
154 | /* used by EC_POINTs_mul, EC_POINT_mul, EC_POINT_precompute_mult, EC_POINT_have_precompute_mult | ||
155 | * (default implementations are used if the 'mul' pointer is 0): */ | ||
156 | int (*mul)(const EC_GROUP *group, EC_POINT *r, const BIGNUM *scalar, | ||
157 | size_t num, const EC_POINT *points[], const BIGNUM *scalars[], BN_CTX *); | ||
158 | int (*precompute_mult)(EC_GROUP *group, BN_CTX *); | ||
159 | int (*have_precompute_mult)(const EC_GROUP *group); | ||
160 | |||
161 | |||
162 | /* internal functions */ | ||
163 | |||
164 | /* 'field_mul', 'field_sqr', and 'field_div' can be used by 'add' and 'dbl' so that | ||
165 | * the same implementations of point operations can be used with different | ||
166 | * optimized implementations of expensive field operations: */ | ||
167 | int (*field_mul)(const EC_GROUP *, BIGNUM *r, const BIGNUM *a, const BIGNUM *b, BN_CTX *); | ||
168 | int (*field_sqr)(const EC_GROUP *, BIGNUM *r, const BIGNUM *a, BN_CTX *); | ||
169 | int (*field_div)(const EC_GROUP *, BIGNUM *r, const BIGNUM *a, const BIGNUM *b, BN_CTX *); | ||
170 | |||
171 | int (*field_encode)(const EC_GROUP *, BIGNUM *r, const BIGNUM *a, BN_CTX *); /* e.g. to Montgomery */ | ||
172 | int (*field_decode)(const EC_GROUP *, BIGNUM *r, const BIGNUM *a, BN_CTX *); /* e.g. from Montgomery */ | ||
173 | int (*field_set_to_one)(const EC_GROUP *, BIGNUM *r, BN_CTX *); | ||
174 | } /* EC_METHOD */; | ||
175 | |||
176 | typedef struct ec_extra_data_st { | ||
177 | struct ec_extra_data_st *next; | ||
178 | void *data; | ||
179 | void *(*dup_func)(void *); | ||
180 | void (*free_func)(void *); | ||
181 | void (*clear_free_func)(void *); | ||
182 | } EC_EXTRA_DATA; /* used in EC_GROUP */ | ||
183 | |||
184 | struct ec_group_st { | ||
185 | const EC_METHOD *meth; | ||
186 | |||
187 | EC_POINT *generator; /* optional */ | ||
188 | BIGNUM order, cofactor; | ||
189 | |||
190 | int curve_name;/* optional NID for named curve */ | ||
191 | int asn1_flag; /* flag to control the asn1 encoding */ | ||
192 | point_conversion_form_t asn1_form; | ||
193 | |||
194 | unsigned char *seed; /* optional seed for parameters (appears in ASN1) */ | ||
195 | size_t seed_len; | ||
196 | |||
197 | EC_EXTRA_DATA *extra_data; /* linked list */ | ||
198 | |||
199 | /* The following members are handled by the method functions, | ||
200 | * even if they appear generic */ | ||
201 | |||
202 | BIGNUM field; /* Field specification. | ||
203 | * For curves over GF(p), this is the modulus; | ||
204 | * for curves over GF(2^m), this is the | ||
205 | * irreducible polynomial defining the field. | ||
206 | */ | ||
207 | |||
208 | unsigned int poly[5]; /* Field specification for curves over GF(2^m). | ||
209 | * The irreducible f(t) is then of the form: | ||
210 | * t^poly[0] + t^poly[1] + ... + t^poly[k] | ||
211 | * where m = poly[0] > poly[1] > ... > poly[k] = 0. | ||
212 | */ | ||
213 | |||
214 | BIGNUM a, b; /* Curve coefficients. | ||
215 | * (Here the assumption is that BIGNUMs can be used | ||
216 | * or abused for all kinds of fields, not just GF(p).) | ||
217 | * For characteristic > 3, the curve is defined | ||
218 | * by a Weierstrass equation of the form | ||
219 | * y^2 = x^3 + a*x + b. | ||
220 | * For characteristic 2, the curve is defined by | ||
221 | * an equation of the form | ||
222 | * y^2 + x*y = x^3 + a*x^2 + b. | ||
223 | */ | ||
224 | |||
225 | int a_is_minus3; /* enable optimized point arithmetics for special case */ | ||
226 | |||
227 | void *field_data1; /* method-specific (e.g., Montgomery structure) */ | ||
228 | void *field_data2; /* method-specific */ | ||
229 | int (*field_mod_func)(BIGNUM *, const BIGNUM *, const BIGNUM *, BN_CTX *); /* method-specific */ | ||
230 | } /* EC_GROUP */; | ||
231 | |||
232 | struct ec_key_st { | ||
233 | int version; | ||
234 | |||
235 | EC_GROUP *group; | ||
236 | |||
237 | EC_POINT *pub_key; | ||
238 | BIGNUM *priv_key; | ||
239 | |||
240 | unsigned int enc_flag; | ||
241 | point_conversion_form_t conv_form; | ||
242 | |||
243 | int references; | ||
244 | |||
245 | EC_EXTRA_DATA *method_data; | ||
246 | } /* EC_KEY */; | ||
247 | |||
248 | /* Basically a 'mixin' for extra data, but available for EC_GROUPs/EC_KEYs only | ||
249 | * (with visibility limited to 'package' level for now). | ||
250 | * We use the function pointers as index for retrieval; this obviates | ||
251 | * global ex_data-style index tables. | ||
252 | */ | ||
253 | int EC_EX_DATA_set_data(EC_EXTRA_DATA **, void *data, | ||
254 | void *(*dup_func)(void *), void (*free_func)(void *), void (*clear_free_func)(void *)); | ||
255 | void *EC_EX_DATA_get_data(const EC_EXTRA_DATA *, | ||
256 | void *(*dup_func)(void *), void (*free_func)(void *), void (*clear_free_func)(void *)); | ||
257 | void EC_EX_DATA_free_data(EC_EXTRA_DATA **, | ||
258 | void *(*dup_func)(void *), void (*free_func)(void *), void (*clear_free_func)(void *)); | ||
259 | void EC_EX_DATA_clear_free_data(EC_EXTRA_DATA **, | ||
260 | void *(*dup_func)(void *), void (*free_func)(void *), void (*clear_free_func)(void *)); | ||
261 | void EC_EX_DATA_free_all_data(EC_EXTRA_DATA **); | ||
262 | void EC_EX_DATA_clear_free_all_data(EC_EXTRA_DATA **); | ||
263 | |||
264 | |||
265 | |||
266 | struct ec_point_st { | ||
267 | const EC_METHOD *meth; | ||
268 | |||
269 | /* All members except 'meth' are handled by the method functions, | ||
270 | * even if they appear generic */ | ||
271 | |||
272 | BIGNUM X; | ||
273 | BIGNUM Y; | ||
274 | BIGNUM Z; /* Jacobian projective coordinates: | ||
275 | * (X, Y, Z) represents (X/Z^2, Y/Z^3) if Z != 0 */ | ||
276 | int Z_is_one; /* enable optimized point arithmetics for special case */ | ||
277 | } /* EC_POINT */; | ||
278 | |||
279 | |||
280 | |||
281 | /* method functions in ec_mult.c | ||
282 | * (ec_lib.c uses these as defaults if group->method->mul is 0) */ | ||
283 | int ec_wNAF_mul(const EC_GROUP *group, EC_POINT *r, const BIGNUM *scalar, | ||
284 | size_t num, const EC_POINT *points[], const BIGNUM *scalars[], BN_CTX *); | ||
285 | int ec_wNAF_precompute_mult(EC_GROUP *group, BN_CTX *); | ||
286 | int ec_wNAF_have_precompute_mult(const EC_GROUP *group); | ||
287 | |||
288 | |||
289 | /* method functions in ecp_smpl.c */ | ||
290 | int ec_GFp_simple_group_init(EC_GROUP *); | ||
291 | void ec_GFp_simple_group_finish(EC_GROUP *); | ||
292 | void ec_GFp_simple_group_clear_finish(EC_GROUP *); | ||
293 | int ec_GFp_simple_group_copy(EC_GROUP *, const EC_GROUP *); | ||
294 | int ec_GFp_simple_group_set_curve(EC_GROUP *, const BIGNUM *p, const BIGNUM *a, const BIGNUM *b, BN_CTX *); | ||
295 | int ec_GFp_simple_group_get_curve(const EC_GROUP *, BIGNUM *p, BIGNUM *a, BIGNUM *b, BN_CTX *); | ||
296 | int ec_GFp_simple_group_get_degree(const EC_GROUP *); | ||
297 | int ec_GFp_simple_group_check_discriminant(const EC_GROUP *, BN_CTX *); | ||
298 | int ec_GFp_simple_point_init(EC_POINT *); | ||
299 | void ec_GFp_simple_point_finish(EC_POINT *); | ||
300 | void ec_GFp_simple_point_clear_finish(EC_POINT *); | ||
301 | int ec_GFp_simple_point_copy(EC_POINT *, const EC_POINT *); | ||
302 | int ec_GFp_simple_point_set_to_infinity(const EC_GROUP *, EC_POINT *); | ||
303 | int ec_GFp_simple_set_Jprojective_coordinates_GFp(const EC_GROUP *, EC_POINT *, | ||
304 | const BIGNUM *x, const BIGNUM *y, const BIGNUM *z, BN_CTX *); | ||
305 | int ec_GFp_simple_get_Jprojective_coordinates_GFp(const EC_GROUP *, const EC_POINT *, | ||
306 | BIGNUM *x, BIGNUM *y, BIGNUM *z, BN_CTX *); | ||
307 | int ec_GFp_simple_point_set_affine_coordinates(const EC_GROUP *, EC_POINT *, | ||
308 | const BIGNUM *x, const BIGNUM *y, BN_CTX *); | ||
309 | int ec_GFp_simple_point_get_affine_coordinates(const EC_GROUP *, const EC_POINT *, | ||
310 | BIGNUM *x, BIGNUM *y, BN_CTX *); | ||
311 | int ec_GFp_simple_set_compressed_coordinates(const EC_GROUP *, EC_POINT *, | ||
312 | const BIGNUM *x, int y_bit, BN_CTX *); | ||
313 | size_t ec_GFp_simple_point2oct(const EC_GROUP *, const EC_POINT *, point_conversion_form_t form, | ||
314 | unsigned char *buf, size_t len, BN_CTX *); | ||
315 | int ec_GFp_simple_oct2point(const EC_GROUP *, EC_POINT *, | ||
316 | const unsigned char *buf, size_t len, BN_CTX *); | ||
317 | int ec_GFp_simple_add(const EC_GROUP *, EC_POINT *r, const EC_POINT *a, const EC_POINT *b, BN_CTX *); | ||
318 | int ec_GFp_simple_dbl(const EC_GROUP *, EC_POINT *r, const EC_POINT *a, BN_CTX *); | ||
319 | int ec_GFp_simple_invert(const EC_GROUP *, EC_POINT *, BN_CTX *); | ||
320 | int ec_GFp_simple_is_at_infinity(const EC_GROUP *, const EC_POINT *); | ||
321 | int ec_GFp_simple_is_on_curve(const EC_GROUP *, const EC_POINT *, BN_CTX *); | ||
322 | int ec_GFp_simple_cmp(const EC_GROUP *, const EC_POINT *a, const EC_POINT *b, BN_CTX *); | ||
323 | int ec_GFp_simple_make_affine(const EC_GROUP *, EC_POINT *, BN_CTX *); | ||
324 | int ec_GFp_simple_points_make_affine(const EC_GROUP *, size_t num, EC_POINT *[], BN_CTX *); | ||
325 | int ec_GFp_simple_field_mul(const EC_GROUP *, BIGNUM *r, const BIGNUM *a, const BIGNUM *b, BN_CTX *); | ||
326 | int ec_GFp_simple_field_sqr(const EC_GROUP *, BIGNUM *r, const BIGNUM *a, BN_CTX *); | ||
327 | |||
328 | |||
329 | /* method functions in ecp_mont.c */ | ||
330 | int ec_GFp_mont_group_init(EC_GROUP *); | ||
331 | int ec_GFp_mont_group_set_curve(EC_GROUP *, const BIGNUM *p, const BIGNUM *a, const BIGNUM *b, BN_CTX *); | ||
332 | void ec_GFp_mont_group_finish(EC_GROUP *); | ||
333 | void ec_GFp_mont_group_clear_finish(EC_GROUP *); | ||
334 | int ec_GFp_mont_group_copy(EC_GROUP *, const EC_GROUP *); | ||
335 | int ec_GFp_mont_field_mul(const EC_GROUP *, BIGNUM *r, const BIGNUM *a, const BIGNUM *b, BN_CTX *); | ||
336 | int ec_GFp_mont_field_sqr(const EC_GROUP *, BIGNUM *r, const BIGNUM *a, BN_CTX *); | ||
337 | int ec_GFp_mont_field_encode(const EC_GROUP *, BIGNUM *r, const BIGNUM *a, BN_CTX *); | ||
338 | int ec_GFp_mont_field_decode(const EC_GROUP *, BIGNUM *r, const BIGNUM *a, BN_CTX *); | ||
339 | int ec_GFp_mont_field_set_to_one(const EC_GROUP *, BIGNUM *r, BN_CTX *); | ||
340 | |||
341 | |||
342 | /* method functions in ecp_nist.c */ | ||
343 | int ec_GFp_nist_group_copy(EC_GROUP *dest, const EC_GROUP *src); | ||
344 | int ec_GFp_nist_group_set_curve(EC_GROUP *, const BIGNUM *p, const BIGNUM *a, const BIGNUM *b, BN_CTX *); | ||
345 | int ec_GFp_nist_field_mul(const EC_GROUP *, BIGNUM *r, const BIGNUM *a, const BIGNUM *b, BN_CTX *); | ||
346 | int ec_GFp_nist_field_sqr(const EC_GROUP *, BIGNUM *r, const BIGNUM *a, BN_CTX *); | ||
347 | |||
348 | |||
349 | /* method functions in ec2_smpl.c */ | ||
350 | int ec_GF2m_simple_group_init(EC_GROUP *); | ||
351 | void ec_GF2m_simple_group_finish(EC_GROUP *); | ||
352 | void ec_GF2m_simple_group_clear_finish(EC_GROUP *); | ||
353 | int ec_GF2m_simple_group_copy(EC_GROUP *, const EC_GROUP *); | ||
354 | int ec_GF2m_simple_group_set_curve(EC_GROUP *, const BIGNUM *p, const BIGNUM *a, const BIGNUM *b, BN_CTX *); | ||
355 | int ec_GF2m_simple_group_get_curve(const EC_GROUP *, BIGNUM *p, BIGNUM *a, BIGNUM *b, BN_CTX *); | ||
356 | int ec_GF2m_simple_group_get_degree(const EC_GROUP *); | ||
357 | int ec_GF2m_simple_group_check_discriminant(const EC_GROUP *, BN_CTX *); | ||
358 | int ec_GF2m_simple_point_init(EC_POINT *); | ||
359 | void ec_GF2m_simple_point_finish(EC_POINT *); | ||
360 | void ec_GF2m_simple_point_clear_finish(EC_POINT *); | ||
361 | int ec_GF2m_simple_point_copy(EC_POINT *, const EC_POINT *); | ||
362 | int ec_GF2m_simple_point_set_to_infinity(const EC_GROUP *, EC_POINT *); | ||
363 | int ec_GF2m_simple_point_set_affine_coordinates(const EC_GROUP *, EC_POINT *, | ||
364 | const BIGNUM *x, const BIGNUM *y, BN_CTX *); | ||
365 | int ec_GF2m_simple_point_get_affine_coordinates(const EC_GROUP *, const EC_POINT *, | ||
366 | BIGNUM *x, BIGNUM *y, BN_CTX *); | ||
367 | int ec_GF2m_simple_set_compressed_coordinates(const EC_GROUP *, EC_POINT *, | ||
368 | const BIGNUM *x, int y_bit, BN_CTX *); | ||
369 | size_t ec_GF2m_simple_point2oct(const EC_GROUP *, const EC_POINT *, point_conversion_form_t form, | ||
370 | unsigned char *buf, size_t len, BN_CTX *); | ||
371 | int ec_GF2m_simple_oct2point(const EC_GROUP *, EC_POINT *, | ||
372 | const unsigned char *buf, size_t len, BN_CTX *); | ||
373 | int ec_GF2m_simple_add(const EC_GROUP *, EC_POINT *r, const EC_POINT *a, const EC_POINT *b, BN_CTX *); | ||
374 | int ec_GF2m_simple_dbl(const EC_GROUP *, EC_POINT *r, const EC_POINT *a, BN_CTX *); | ||
375 | int ec_GF2m_simple_invert(const EC_GROUP *, EC_POINT *, BN_CTX *); | ||
376 | int ec_GF2m_simple_is_at_infinity(const EC_GROUP *, const EC_POINT *); | ||
377 | int ec_GF2m_simple_is_on_curve(const EC_GROUP *, const EC_POINT *, BN_CTX *); | ||
378 | int ec_GF2m_simple_cmp(const EC_GROUP *, const EC_POINT *a, const EC_POINT *b, BN_CTX *); | ||
379 | int ec_GF2m_simple_make_affine(const EC_GROUP *, EC_POINT *, BN_CTX *); | ||
380 | int ec_GF2m_simple_points_make_affine(const EC_GROUP *, size_t num, EC_POINT *[], BN_CTX *); | ||
381 | int ec_GF2m_simple_field_mul(const EC_GROUP *, BIGNUM *r, const BIGNUM *a, const BIGNUM *b, BN_CTX *); | ||
382 | int ec_GF2m_simple_field_sqr(const EC_GROUP *, BIGNUM *r, const BIGNUM *a, BN_CTX *); | ||
383 | int ec_GF2m_simple_field_div(const EC_GROUP *, BIGNUM *r, const BIGNUM *a, const BIGNUM *b, BN_CTX *); | ||
384 | |||
385 | |||
386 | /* method functions in ec2_mult.c */ | ||
387 | int ec_GF2m_simple_mul(const EC_GROUP *group, EC_POINT *r, const BIGNUM *scalar, | ||
388 | size_t num, const EC_POINT *points[], const BIGNUM *scalars[], BN_CTX *); | ||
389 | int ec_GF2m_precompute_mult(EC_GROUP *group, BN_CTX *ctx); | ||
390 | int ec_GF2m_have_precompute_mult(const EC_GROUP *group); | ||
diff --git a/src/lib/libcrypto/ec/ec_lib.c b/src/lib/libcrypto/ec/ec_lib.c deleted file mode 100644 index 5af84376c6..0000000000 --- a/src/lib/libcrypto/ec/ec_lib.c +++ /dev/null | |||
@@ -1,1164 +0,0 @@ | |||
1 | /* crypto/ec/ec_lib.c */ | ||
2 | /* | ||
3 | * Originally written by Bodo Moeller for the OpenSSL project. | ||
4 | */ | ||
5 | /* ==================================================================== | ||
6 | * Copyright (c) 1998-2003 The OpenSSL Project. All rights reserved. | ||
7 | * | ||
8 | * Redistribution and use in source and binary forms, with or without | ||
9 | * modification, are permitted provided that the following conditions | ||
10 | * are met: | ||
11 | * | ||
12 | * 1. Redistributions of source code must retain the above copyright | ||
13 | * notice, this list of conditions and the following disclaimer. | ||
14 | * | ||
15 | * 2. Redistributions in binary form must reproduce the above copyright | ||
16 | * notice, this list of conditions and the following disclaimer in | ||
17 | * the documentation and/or other materials provided with the | ||
18 | * distribution. | ||
19 | * | ||
20 | * 3. All advertising materials mentioning features or use of this | ||
21 | * software must display the following acknowledgment: | ||
22 | * "This product includes software developed by the OpenSSL Project | ||
23 | * for use in the OpenSSL Toolkit. (http://www.openssl.org/)" | ||
24 | * | ||
25 | * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to | ||
26 | * endorse or promote products derived from this software without | ||
27 | * prior written permission. For written permission, please contact | ||
28 | * openssl-core@openssl.org. | ||
29 | * | ||
30 | * 5. Products derived from this software may not be called "OpenSSL" | ||
31 | * nor may "OpenSSL" appear in their names without prior written | ||
32 | * permission of the OpenSSL Project. | ||
33 | * | ||
34 | * 6. Redistributions of any form whatsoever must retain the following | ||
35 | * acknowledgment: | ||
36 | * "This product includes software developed by the OpenSSL Project | ||
37 | * for use in the OpenSSL Toolkit (http://www.openssl.org/)" | ||
38 | * | ||
39 | * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY | ||
40 | * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | ||
41 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR | ||
42 | * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR | ||
43 | * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, | ||
44 | * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT | ||
45 | * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; | ||
46 | * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | ||
47 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, | ||
48 | * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) | ||
49 | * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | ||
50 | * OF THE POSSIBILITY OF SUCH DAMAGE. | ||
51 | * ==================================================================== | ||
52 | * | ||
53 | * This product includes cryptographic software written by Eric Young | ||
54 | * (eay@cryptsoft.com). This product includes software written by Tim | ||
55 | * Hudson (tjh@cryptsoft.com). | ||
56 | * | ||
57 | */ | ||
58 | /* ==================================================================== | ||
59 | * Copyright 2002 Sun Microsystems, Inc. ALL RIGHTS RESERVED. | ||
60 | * Binary polynomial ECC support in OpenSSL originally developed by | ||
61 | * SUN MICROSYSTEMS, INC., and contributed to the OpenSSL project. | ||
62 | */ | ||
63 | |||
64 | #include <string.h> | ||
65 | |||
66 | #include <openssl/err.h> | ||
67 | #include <openssl/opensslv.h> | ||
68 | |||
69 | #include "ec_lcl.h" | ||
70 | |||
71 | static const char EC_version[] = "EC" OPENSSL_VERSION_PTEXT; | ||
72 | |||
73 | |||
74 | /* functions for EC_GROUP objects */ | ||
75 | |||
76 | EC_GROUP *EC_GROUP_new(const EC_METHOD *meth) | ||
77 | { | ||
78 | EC_GROUP *ret; | ||
79 | |||
80 | if (meth == NULL) | ||
81 | { | ||
82 | ECerr(EC_F_EC_GROUP_NEW, ERR_R_PASSED_NULL_PARAMETER); | ||
83 | return NULL; | ||
84 | } | ||
85 | if (meth->group_init == 0) | ||
86 | { | ||
87 | ECerr(EC_F_EC_GROUP_NEW, ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED); | ||
88 | return NULL; | ||
89 | } | ||
90 | |||
91 | ret = OPENSSL_malloc(sizeof *ret); | ||
92 | if (ret == NULL) | ||
93 | { | ||
94 | ECerr(EC_F_EC_GROUP_NEW, ERR_R_MALLOC_FAILURE); | ||
95 | return NULL; | ||
96 | } | ||
97 | |||
98 | ret->meth = meth; | ||
99 | |||
100 | ret->extra_data = NULL; | ||
101 | |||
102 | ret->generator = NULL; | ||
103 | BN_init(&ret->order); | ||
104 | BN_init(&ret->cofactor); | ||
105 | |||
106 | ret->curve_name = 0; | ||
107 | ret->asn1_flag = 0; | ||
108 | ret->asn1_form = POINT_CONVERSION_UNCOMPRESSED; | ||
109 | |||
110 | ret->seed = NULL; | ||
111 | ret->seed_len = 0; | ||
112 | |||
113 | if (!meth->group_init(ret)) | ||
114 | { | ||
115 | OPENSSL_free(ret); | ||
116 | return NULL; | ||
117 | } | ||
118 | |||
119 | return ret; | ||
120 | } | ||
121 | |||
122 | |||
123 | void EC_GROUP_free(EC_GROUP *group) | ||
124 | { | ||
125 | if (!group) return; | ||
126 | |||
127 | if (group->meth->group_finish != 0) | ||
128 | group->meth->group_finish(group); | ||
129 | |||
130 | EC_EX_DATA_free_all_data(&group->extra_data); | ||
131 | |||
132 | if (group->generator != NULL) | ||
133 | EC_POINT_free(group->generator); | ||
134 | BN_free(&group->order); | ||
135 | BN_free(&group->cofactor); | ||
136 | |||
137 | if (group->seed) | ||
138 | OPENSSL_free(group->seed); | ||
139 | |||
140 | OPENSSL_free(group); | ||
141 | } | ||
142 | |||
143 | |||
144 | void EC_GROUP_clear_free(EC_GROUP *group) | ||
145 | { | ||
146 | if (!group) return; | ||
147 | |||
148 | if (group->meth->group_clear_finish != 0) | ||
149 | group->meth->group_clear_finish(group); | ||
150 | else if (group->meth->group_finish != 0) | ||
151 | group->meth->group_finish(group); | ||
152 | |||
153 | EC_EX_DATA_clear_free_all_data(&group->extra_data); | ||
154 | |||
155 | if (group->generator != NULL) | ||
156 | EC_POINT_clear_free(group->generator); | ||
157 | BN_clear_free(&group->order); | ||
158 | BN_clear_free(&group->cofactor); | ||
159 | |||
160 | if (group->seed) | ||
161 | { | ||
162 | OPENSSL_cleanse(group->seed, group->seed_len); | ||
163 | OPENSSL_free(group->seed); | ||
164 | } | ||
165 | |||
166 | OPENSSL_cleanse(group, sizeof *group); | ||
167 | OPENSSL_free(group); | ||
168 | } | ||
169 | |||
170 | |||
171 | int EC_GROUP_copy(EC_GROUP *dest, const EC_GROUP *src) | ||
172 | { | ||
173 | EC_EXTRA_DATA *d; | ||
174 | |||
175 | if (dest->meth->group_copy == 0) | ||
176 | { | ||
177 | ECerr(EC_F_EC_GROUP_COPY, ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED); | ||
178 | return 0; | ||
179 | } | ||
180 | if (dest->meth != src->meth) | ||
181 | { | ||
182 | ECerr(EC_F_EC_GROUP_COPY, EC_R_INCOMPATIBLE_OBJECTS); | ||
183 | return 0; | ||
184 | } | ||
185 | if (dest == src) | ||
186 | return 1; | ||
187 | |||
188 | EC_EX_DATA_free_all_data(&dest->extra_data); | ||
189 | |||
190 | for (d = src->extra_data; d != NULL; d = d->next) | ||
191 | { | ||
192 | void *t = d->dup_func(d->data); | ||
193 | |||
194 | if (t == NULL) | ||
195 | return 0; | ||
196 | if (!EC_EX_DATA_set_data(&dest->extra_data, t, d->dup_func, d->free_func, d->clear_free_func)) | ||
197 | return 0; | ||
198 | } | ||
199 | |||
200 | if (src->generator != NULL) | ||
201 | { | ||
202 | if (dest->generator == NULL) | ||
203 | { | ||
204 | dest->generator = EC_POINT_new(dest); | ||
205 | if (dest->generator == NULL) return 0; | ||
206 | } | ||
207 | if (!EC_POINT_copy(dest->generator, src->generator)) return 0; | ||
208 | } | ||
209 | else | ||
210 | { | ||
211 | /* src->generator == NULL */ | ||
212 | if (dest->generator != NULL) | ||
213 | { | ||
214 | EC_POINT_clear_free(dest->generator); | ||
215 | dest->generator = NULL; | ||
216 | } | ||
217 | } | ||
218 | |||
219 | if (!BN_copy(&dest->order, &src->order)) return 0; | ||
220 | if (!BN_copy(&dest->cofactor, &src->cofactor)) return 0; | ||
221 | |||
222 | dest->curve_name = src->curve_name; | ||
223 | dest->asn1_flag = src->asn1_flag; | ||
224 | dest->asn1_form = src->asn1_form; | ||
225 | |||
226 | if (src->seed) | ||
227 | { | ||
228 | if (dest->seed) | ||
229 | OPENSSL_free(dest->seed); | ||
230 | dest->seed = OPENSSL_malloc(src->seed_len); | ||
231 | if (dest->seed == NULL) | ||
232 | return 0; | ||
233 | if (!memcpy(dest->seed, src->seed, src->seed_len)) | ||
234 | return 0; | ||
235 | dest->seed_len = src->seed_len; | ||
236 | } | ||
237 | else | ||
238 | { | ||
239 | if (dest->seed) | ||
240 | OPENSSL_free(dest->seed); | ||
241 | dest->seed = NULL; | ||
242 | dest->seed_len = 0; | ||
243 | } | ||
244 | |||
245 | |||
246 | return dest->meth->group_copy(dest, src); | ||
247 | } | ||
248 | |||
249 | |||
250 | EC_GROUP *EC_GROUP_dup(const EC_GROUP *a) | ||
251 | { | ||
252 | EC_GROUP *t = NULL; | ||
253 | int ok = 0; | ||
254 | |||
255 | if (a == NULL) return NULL; | ||
256 | |||
257 | if ((t = EC_GROUP_new(a->meth)) == NULL) return(NULL); | ||
258 | if (!EC_GROUP_copy(t, a)) goto err; | ||
259 | |||
260 | ok = 1; | ||
261 | |||
262 | err: | ||
263 | if (!ok) | ||
264 | { | ||
265 | if (t) EC_GROUP_free(t); | ||
266 | return NULL; | ||
267 | } | ||
268 | else return t; | ||
269 | } | ||
270 | |||
271 | |||
272 | const EC_METHOD *EC_GROUP_method_of(const EC_GROUP *group) | ||
273 | { | ||
274 | return group->meth; | ||
275 | } | ||
276 | |||
277 | |||
278 | int EC_METHOD_get_field_type(const EC_METHOD *meth) | ||
279 | { | ||
280 | return meth->field_type; | ||
281 | } | ||
282 | |||
283 | |||
284 | int EC_GROUP_set_generator(EC_GROUP *group, const EC_POINT *generator, const BIGNUM *order, const BIGNUM *cofactor) | ||
285 | { | ||
286 | if (generator == NULL) | ||
287 | { | ||
288 | ECerr(EC_F_EC_GROUP_SET_GENERATOR, ERR_R_PASSED_NULL_PARAMETER); | ||
289 | return 0 ; | ||
290 | } | ||
291 | |||
292 | if (group->generator == NULL) | ||
293 | { | ||
294 | group->generator = EC_POINT_new(group); | ||
295 | if (group->generator == NULL) return 0; | ||
296 | } | ||
297 | if (!EC_POINT_copy(group->generator, generator)) return 0; | ||
298 | |||
299 | if (order != NULL) | ||
300 | { if (!BN_copy(&group->order, order)) return 0; } | ||
301 | else | ||
302 | BN_zero(&group->order); | ||
303 | |||
304 | if (cofactor != NULL) | ||
305 | { if (!BN_copy(&group->cofactor, cofactor)) return 0; } | ||
306 | else | ||
307 | BN_zero(&group->cofactor); | ||
308 | |||
309 | return 1; | ||
310 | } | ||
311 | |||
312 | |||
313 | const EC_POINT *EC_GROUP_get0_generator(const EC_GROUP *group) | ||
314 | { | ||
315 | return group->generator; | ||
316 | } | ||
317 | |||
318 | |||
319 | int EC_GROUP_get_order(const EC_GROUP *group, BIGNUM *order, BN_CTX *ctx) | ||
320 | { | ||
321 | if (!BN_copy(order, &group->order)) | ||
322 | return 0; | ||
323 | |||
324 | return !BN_is_zero(order); | ||
325 | } | ||
326 | |||
327 | |||
328 | int EC_GROUP_get_cofactor(const EC_GROUP *group, BIGNUM *cofactor, BN_CTX *ctx) | ||
329 | { | ||
330 | if (!BN_copy(cofactor, &group->cofactor)) | ||
331 | return 0; | ||
332 | |||
333 | return !BN_is_zero(&group->cofactor); | ||
334 | } | ||
335 | |||
336 | |||
337 | void EC_GROUP_set_curve_name(EC_GROUP *group, int nid) | ||
338 | { | ||
339 | group->curve_name = nid; | ||
340 | } | ||
341 | |||
342 | |||
343 | int EC_GROUP_get_curve_name(const EC_GROUP *group) | ||
344 | { | ||
345 | return group->curve_name; | ||
346 | } | ||
347 | |||
348 | |||
349 | void EC_GROUP_set_asn1_flag(EC_GROUP *group, int flag) | ||
350 | { | ||
351 | group->asn1_flag = flag; | ||
352 | } | ||
353 | |||
354 | |||
355 | int EC_GROUP_get_asn1_flag(const EC_GROUP *group) | ||
356 | { | ||
357 | return group->asn1_flag; | ||
358 | } | ||
359 | |||
360 | |||
361 | void EC_GROUP_set_point_conversion_form(EC_GROUP *group, | ||
362 | point_conversion_form_t form) | ||
363 | { | ||
364 | group->asn1_form = form; | ||
365 | } | ||
366 | |||
367 | |||
368 | point_conversion_form_t EC_GROUP_get_point_conversion_form(const EC_GROUP *group) | ||
369 | { | ||
370 | return group->asn1_form; | ||
371 | } | ||
372 | |||
373 | |||
374 | size_t EC_GROUP_set_seed(EC_GROUP *group, const unsigned char *p, size_t len) | ||
375 | { | ||
376 | if (group->seed) | ||
377 | { | ||
378 | OPENSSL_free(group->seed); | ||
379 | group->seed = NULL; | ||
380 | group->seed_len = 0; | ||
381 | } | ||
382 | |||
383 | if (!len || !p) | ||
384 | return 1; | ||
385 | |||
386 | if ((group->seed = OPENSSL_malloc(len)) == NULL) | ||
387 | return 0; | ||
388 | memcpy(group->seed, p, len); | ||
389 | group->seed_len = len; | ||
390 | |||
391 | return len; | ||
392 | } | ||
393 | |||
394 | |||
395 | unsigned char *EC_GROUP_get0_seed(const EC_GROUP *group) | ||
396 | { | ||
397 | return group->seed; | ||
398 | } | ||
399 | |||
400 | |||
401 | size_t EC_GROUP_get_seed_len(const EC_GROUP *group) | ||
402 | { | ||
403 | return group->seed_len; | ||
404 | } | ||
405 | |||
406 | |||
407 | int EC_GROUP_set_curve_GFp(EC_GROUP *group, const BIGNUM *p, const BIGNUM *a, const BIGNUM *b, BN_CTX *ctx) | ||
408 | { | ||
409 | if (group->meth->group_set_curve == 0) | ||
410 | { | ||
411 | ECerr(EC_F_EC_GROUP_SET_CURVE_GFP, ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED); | ||
412 | return 0; | ||
413 | } | ||
414 | return group->meth->group_set_curve(group, p, a, b, ctx); | ||
415 | } | ||
416 | |||
417 | |||
418 | int EC_GROUP_get_curve_GFp(const EC_GROUP *group, BIGNUM *p, BIGNUM *a, BIGNUM *b, BN_CTX *ctx) | ||
419 | { | ||
420 | if (group->meth->group_get_curve == 0) | ||
421 | { | ||
422 | ECerr(EC_F_EC_GROUP_GET_CURVE_GFP, ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED); | ||
423 | return 0; | ||
424 | } | ||
425 | return group->meth->group_get_curve(group, p, a, b, ctx); | ||
426 | } | ||
427 | |||
428 | |||
429 | int EC_GROUP_set_curve_GF2m(EC_GROUP *group, const BIGNUM *p, const BIGNUM *a, const BIGNUM *b, BN_CTX *ctx) | ||
430 | { | ||
431 | if (group->meth->group_set_curve == 0) | ||
432 | { | ||
433 | ECerr(EC_F_EC_GROUP_SET_CURVE_GF2M, ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED); | ||
434 | return 0; | ||
435 | } | ||
436 | return group->meth->group_set_curve(group, p, a, b, ctx); | ||
437 | } | ||
438 | |||
439 | |||
440 | int EC_GROUP_get_curve_GF2m(const EC_GROUP *group, BIGNUM *p, BIGNUM *a, BIGNUM *b, BN_CTX *ctx) | ||
441 | { | ||
442 | if (group->meth->group_get_curve == 0) | ||
443 | { | ||
444 | ECerr(EC_F_EC_GROUP_GET_CURVE_GF2M, ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED); | ||
445 | return 0; | ||
446 | } | ||
447 | return group->meth->group_get_curve(group, p, a, b, ctx); | ||
448 | } | ||
449 | |||
450 | |||
451 | int EC_GROUP_get_degree(const EC_GROUP *group) | ||
452 | { | ||
453 | if (group->meth->group_get_degree == 0) | ||
454 | { | ||
455 | ECerr(EC_F_EC_GROUP_GET_DEGREE, ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED); | ||
456 | return 0; | ||
457 | } | ||
458 | return group->meth->group_get_degree(group); | ||
459 | } | ||
460 | |||
461 | |||
462 | int EC_GROUP_check_discriminant(const EC_GROUP *group, BN_CTX *ctx) | ||
463 | { | ||
464 | if (group->meth->group_check_discriminant == 0) | ||
465 | { | ||
466 | ECerr(EC_F_EC_GROUP_CHECK_DISCRIMINANT, ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED); | ||
467 | return 0; | ||
468 | } | ||
469 | return group->meth->group_check_discriminant(group, ctx); | ||
470 | } | ||
471 | |||
472 | |||
473 | int EC_GROUP_cmp(const EC_GROUP *a, const EC_GROUP *b, BN_CTX *ctx) | ||
474 | { | ||
475 | int r = 0; | ||
476 | BIGNUM *a1, *a2, *a3, *b1, *b2, *b3; | ||
477 | BN_CTX *ctx_new = NULL; | ||
478 | |||
479 | /* compare the field types*/ | ||
480 | if (EC_METHOD_get_field_type(EC_GROUP_method_of(a)) != | ||
481 | EC_METHOD_get_field_type(EC_GROUP_method_of(b))) | ||
482 | return 1; | ||
483 | /* compare the curve name (if present) */ | ||
484 | if (EC_GROUP_get_curve_name(a) && EC_GROUP_get_curve_name(b) && | ||
485 | EC_GROUP_get_curve_name(a) == EC_GROUP_get_curve_name(b)) | ||
486 | return 0; | ||
487 | |||
488 | if (!ctx) | ||
489 | ctx_new = ctx = BN_CTX_new(); | ||
490 | if (!ctx) | ||
491 | return -1; | ||
492 | |||
493 | BN_CTX_start(ctx); | ||
494 | a1 = BN_CTX_get(ctx); | ||
495 | a2 = BN_CTX_get(ctx); | ||
496 | a3 = BN_CTX_get(ctx); | ||
497 | b1 = BN_CTX_get(ctx); | ||
498 | b2 = BN_CTX_get(ctx); | ||
499 | b3 = BN_CTX_get(ctx); | ||
500 | if (!b3) | ||
501 | { | ||
502 | BN_CTX_end(ctx); | ||
503 | if (ctx_new) | ||
504 | BN_CTX_free(ctx); | ||
505 | return -1; | ||
506 | } | ||
507 | |||
508 | /* XXX This approach assumes that the external representation | ||
509 | * of curves over the same field type is the same. | ||
510 | */ | ||
511 | if (!a->meth->group_get_curve(a, a1, a2, a3, ctx) || | ||
512 | !b->meth->group_get_curve(b, b1, b2, b3, ctx)) | ||
513 | r = 1; | ||
514 | |||
515 | if (r || BN_cmp(a1, b1) || BN_cmp(a2, b2) || BN_cmp(a3, b3)) | ||
516 | r = 1; | ||
517 | |||
518 | /* XXX EC_POINT_cmp() assumes that the methods are equal */ | ||
519 | if (r || EC_POINT_cmp(a, EC_GROUP_get0_generator(a), | ||
520 | EC_GROUP_get0_generator(b), ctx)) | ||
521 | r = 1; | ||
522 | |||
523 | if (!r) | ||
524 | { | ||
525 | /* compare the order and cofactor */ | ||
526 | if (!EC_GROUP_get_order(a, a1, ctx) || | ||
527 | !EC_GROUP_get_order(b, b1, ctx) || | ||
528 | !EC_GROUP_get_cofactor(a, a2, ctx) || | ||
529 | !EC_GROUP_get_cofactor(b, b2, ctx)) | ||
530 | { | ||
531 | BN_CTX_end(ctx); | ||
532 | if (ctx_new) | ||
533 | BN_CTX_free(ctx); | ||
534 | return -1; | ||
535 | } | ||
536 | if (BN_cmp(a1, b1) || BN_cmp(a2, b2)) | ||
537 | r = 1; | ||
538 | } | ||
539 | |||
540 | BN_CTX_end(ctx); | ||
541 | if (ctx_new) | ||
542 | BN_CTX_free(ctx); | ||
543 | |||
544 | return r; | ||
545 | } | ||
546 | |||
547 | |||
548 | /* this has 'package' visibility */ | ||
549 | int EC_EX_DATA_set_data(EC_EXTRA_DATA **ex_data, void *data, | ||
550 | void *(*dup_func)(void *), void (*free_func)(void *), void (*clear_free_func)(void *)) | ||
551 | { | ||
552 | EC_EXTRA_DATA *d; | ||
553 | |||
554 | if (ex_data == NULL) | ||
555 | return 0; | ||
556 | |||
557 | for (d = *ex_data; d != NULL; d = d->next) | ||
558 | { | ||
559 | if (d->dup_func == dup_func && d->free_func == free_func && d->clear_free_func == clear_free_func) | ||
560 | { | ||
561 | ECerr(EC_F_EC_EX_DATA_SET_DATA, EC_R_SLOT_FULL); | ||
562 | return 0; | ||
563 | } | ||
564 | } | ||
565 | |||
566 | if (data == NULL) | ||
567 | /* no explicit entry needed */ | ||
568 | return 1; | ||
569 | |||
570 | d = OPENSSL_malloc(sizeof *d); | ||
571 | if (d == NULL) | ||
572 | return 0; | ||
573 | |||
574 | d->data = data; | ||
575 | d->dup_func = dup_func; | ||
576 | d->free_func = free_func; | ||
577 | d->clear_free_func = clear_free_func; | ||
578 | |||
579 | d->next = *ex_data; | ||
580 | *ex_data = d; | ||
581 | |||
582 | return 1; | ||
583 | } | ||
584 | |||
585 | /* this has 'package' visibility */ | ||
586 | void *EC_EX_DATA_get_data(const EC_EXTRA_DATA *ex_data, | ||
587 | void *(*dup_func)(void *), void (*free_func)(void *), void (*clear_free_func)(void *)) | ||
588 | { | ||
589 | const EC_EXTRA_DATA *d; | ||
590 | |||
591 | for (d = ex_data; d != NULL; d = d->next) | ||
592 | { | ||
593 | if (d->dup_func == dup_func && d->free_func == free_func && d->clear_free_func == clear_free_func) | ||
594 | return d->data; | ||
595 | } | ||
596 | |||
597 | return NULL; | ||
598 | } | ||
599 | |||
600 | /* this has 'package' visibility */ | ||
601 | void EC_EX_DATA_free_data(EC_EXTRA_DATA **ex_data, | ||
602 | void *(*dup_func)(void *), void (*free_func)(void *), void (*clear_free_func)(void *)) | ||
603 | { | ||
604 | EC_EXTRA_DATA **p; | ||
605 | |||
606 | if (ex_data == NULL) | ||
607 | return; | ||
608 | |||
609 | for (p = ex_data; *p != NULL; p = &((*p)->next)) | ||
610 | { | ||
611 | if ((*p)->dup_func == dup_func && (*p)->free_func == free_func && (*p)->clear_free_func == clear_free_func) | ||
612 | { | ||
613 | EC_EXTRA_DATA *next = (*p)->next; | ||
614 | |||
615 | (*p)->free_func((*p)->data); | ||
616 | OPENSSL_free(*p); | ||
617 | |||
618 | *p = next; | ||
619 | return; | ||
620 | } | ||
621 | } | ||
622 | } | ||
623 | |||
624 | /* this has 'package' visibility */ | ||
625 | void EC_EX_DATA_clear_free_data(EC_EXTRA_DATA **ex_data, | ||
626 | void *(*dup_func)(void *), void (*free_func)(void *), void (*clear_free_func)(void *)) | ||
627 | { | ||
628 | EC_EXTRA_DATA **p; | ||
629 | |||
630 | if (ex_data == NULL) | ||
631 | return; | ||
632 | |||
633 | for (p = ex_data; *p != NULL; p = &((*p)->next)) | ||
634 | { | ||
635 | if ((*p)->dup_func == dup_func && (*p)->free_func == free_func && (*p)->clear_free_func == clear_free_func) | ||
636 | { | ||
637 | EC_EXTRA_DATA *next = (*p)->next; | ||
638 | |||
639 | (*p)->clear_free_func((*p)->data); | ||
640 | OPENSSL_free(*p); | ||
641 | |||
642 | *p = next; | ||
643 | return; | ||
644 | } | ||
645 | } | ||
646 | } | ||
647 | |||
648 | /* this has 'package' visibility */ | ||
649 | void EC_EX_DATA_free_all_data(EC_EXTRA_DATA **ex_data) | ||
650 | { | ||
651 | EC_EXTRA_DATA *d; | ||
652 | |||
653 | if (ex_data == NULL) | ||
654 | return; | ||
655 | |||
656 | d = *ex_data; | ||
657 | while (d) | ||
658 | { | ||
659 | EC_EXTRA_DATA *next = d->next; | ||
660 | |||
661 | d->free_func(d->data); | ||
662 | OPENSSL_free(d); | ||
663 | |||
664 | d = next; | ||
665 | } | ||
666 | *ex_data = NULL; | ||
667 | } | ||
668 | |||
669 | /* this has 'package' visibility */ | ||
670 | void EC_EX_DATA_clear_free_all_data(EC_EXTRA_DATA **ex_data) | ||
671 | { | ||
672 | EC_EXTRA_DATA *d; | ||
673 | |||
674 | if (ex_data == NULL) | ||
675 | return; | ||
676 | |||
677 | d = *ex_data; | ||
678 | while (d) | ||
679 | { | ||
680 | EC_EXTRA_DATA *next = d->next; | ||
681 | |||
682 | d->clear_free_func(d->data); | ||
683 | OPENSSL_free(d); | ||
684 | |||
685 | d = next; | ||
686 | } | ||
687 | *ex_data = NULL; | ||
688 | } | ||
689 | |||
690 | |||
691 | /* functions for EC_POINT objects */ | ||
692 | |||
693 | EC_POINT *EC_POINT_new(const EC_GROUP *group) | ||
694 | { | ||
695 | EC_POINT *ret; | ||
696 | |||
697 | if (group == NULL) | ||
698 | { | ||
699 | ECerr(EC_F_EC_POINT_NEW, ERR_R_PASSED_NULL_PARAMETER); | ||
700 | return NULL; | ||
701 | } | ||
702 | if (group->meth->point_init == 0) | ||
703 | { | ||
704 | ECerr(EC_F_EC_POINT_NEW, ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED); | ||
705 | return NULL; | ||
706 | } | ||
707 | |||
708 | ret = OPENSSL_malloc(sizeof *ret); | ||
709 | if (ret == NULL) | ||
710 | { | ||
711 | ECerr(EC_F_EC_POINT_NEW, ERR_R_MALLOC_FAILURE); | ||
712 | return NULL; | ||
713 | } | ||
714 | |||
715 | ret->meth = group->meth; | ||
716 | |||
717 | if (!ret->meth->point_init(ret)) | ||
718 | { | ||
719 | OPENSSL_free(ret); | ||
720 | return NULL; | ||
721 | } | ||
722 | |||
723 | return ret; | ||
724 | } | ||
725 | |||
726 | |||
727 | void EC_POINT_free(EC_POINT *point) | ||
728 | { | ||
729 | if (!point) return; | ||
730 | |||
731 | if (point->meth->point_finish != 0) | ||
732 | point->meth->point_finish(point); | ||
733 | OPENSSL_free(point); | ||
734 | } | ||
735 | |||
736 | |||
737 | void EC_POINT_clear_free(EC_POINT *point) | ||
738 | { | ||
739 | if (!point) return; | ||
740 | |||
741 | if (point->meth->point_clear_finish != 0) | ||
742 | point->meth->point_clear_finish(point); | ||
743 | else if (point->meth != NULL && point->meth->point_finish != 0) | ||
744 | point->meth->point_finish(point); | ||
745 | OPENSSL_cleanse(point, sizeof *point); | ||
746 | OPENSSL_free(point); | ||
747 | } | ||
748 | |||
749 | |||
750 | int EC_POINT_copy(EC_POINT *dest, const EC_POINT *src) | ||
751 | { | ||
752 | if (dest->meth->point_copy == 0) | ||
753 | { | ||
754 | ECerr(EC_F_EC_POINT_COPY, ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED); | ||
755 | return 0; | ||
756 | } | ||
757 | if (dest->meth != src->meth) | ||
758 | { | ||
759 | ECerr(EC_F_EC_POINT_COPY, EC_R_INCOMPATIBLE_OBJECTS); | ||
760 | return 0; | ||
761 | } | ||
762 | if (dest == src) | ||
763 | return 1; | ||
764 | return dest->meth->point_copy(dest, src); | ||
765 | } | ||
766 | |||
767 | |||
768 | EC_POINT *EC_POINT_dup(const EC_POINT *a, const EC_GROUP *group) | ||
769 | { | ||
770 | EC_POINT *t; | ||
771 | int r; | ||
772 | |||
773 | if (a == NULL) return NULL; | ||
774 | |||
775 | t = EC_POINT_new(group); | ||
776 | if (t == NULL) return(NULL); | ||
777 | r = EC_POINT_copy(t, a); | ||
778 | if (!r) | ||
779 | { | ||
780 | EC_POINT_free(t); | ||
781 | return NULL; | ||
782 | } | ||
783 | else return t; | ||
784 | } | ||
785 | |||
786 | |||
787 | const EC_METHOD *EC_POINT_method_of(const EC_POINT *point) | ||
788 | { | ||
789 | return point->meth; | ||
790 | } | ||
791 | |||
792 | |||
793 | int EC_POINT_set_to_infinity(const EC_GROUP *group, EC_POINT *point) | ||
794 | { | ||
795 | if (group->meth->point_set_to_infinity == 0) | ||
796 | { | ||
797 | ECerr(EC_F_EC_POINT_SET_TO_INFINITY, ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED); | ||
798 | return 0; | ||
799 | } | ||
800 | if (group->meth != point->meth) | ||
801 | { | ||
802 | ECerr(EC_F_EC_POINT_SET_TO_INFINITY, EC_R_INCOMPATIBLE_OBJECTS); | ||
803 | return 0; | ||
804 | } | ||
805 | return group->meth->point_set_to_infinity(group, point); | ||
806 | } | ||
807 | |||
808 | |||
809 | int EC_POINT_set_Jprojective_coordinates_GFp(const EC_GROUP *group, EC_POINT *point, | ||
810 | const BIGNUM *x, const BIGNUM *y, const BIGNUM *z, BN_CTX *ctx) | ||
811 | { | ||
812 | if (group->meth->point_set_Jprojective_coordinates_GFp == 0) | ||
813 | { | ||
814 | ECerr(EC_F_EC_POINT_SET_JPROJECTIVE_COORDINATES_GFP, ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED); | ||
815 | return 0; | ||
816 | } | ||
817 | if (group->meth != point->meth) | ||
818 | { | ||
819 | ECerr(EC_F_EC_POINT_SET_JPROJECTIVE_COORDINATES_GFP, EC_R_INCOMPATIBLE_OBJECTS); | ||
820 | return 0; | ||
821 | } | ||
822 | return group->meth->point_set_Jprojective_coordinates_GFp(group, point, x, y, z, ctx); | ||
823 | } | ||
824 | |||
825 | |||
826 | int EC_POINT_get_Jprojective_coordinates_GFp(const EC_GROUP *group, const EC_POINT *point, | ||
827 | BIGNUM *x, BIGNUM *y, BIGNUM *z, BN_CTX *ctx) | ||
828 | { | ||
829 | if (group->meth->point_get_Jprojective_coordinates_GFp == 0) | ||
830 | { | ||
831 | ECerr(EC_F_EC_POINT_GET_JPROJECTIVE_COORDINATES_GFP, ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED); | ||
832 | return 0; | ||
833 | } | ||
834 | if (group->meth != point->meth) | ||
835 | { | ||
836 | ECerr(EC_F_EC_POINT_GET_JPROJECTIVE_COORDINATES_GFP, EC_R_INCOMPATIBLE_OBJECTS); | ||
837 | return 0; | ||
838 | } | ||
839 | return group->meth->point_get_Jprojective_coordinates_GFp(group, point, x, y, z, ctx); | ||
840 | } | ||
841 | |||
842 | |||
843 | int EC_POINT_set_affine_coordinates_GFp(const EC_GROUP *group, EC_POINT *point, | ||
844 | const BIGNUM *x, const BIGNUM *y, BN_CTX *ctx) | ||
845 | { | ||
846 | if (group->meth->point_set_affine_coordinates == 0) | ||
847 | { | ||
848 | ECerr(EC_F_EC_POINT_SET_AFFINE_COORDINATES_GFP, ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED); | ||
849 | return 0; | ||
850 | } | ||
851 | if (group->meth != point->meth) | ||
852 | { | ||
853 | ECerr(EC_F_EC_POINT_SET_AFFINE_COORDINATES_GFP, EC_R_INCOMPATIBLE_OBJECTS); | ||
854 | return 0; | ||
855 | } | ||
856 | return group->meth->point_set_affine_coordinates(group, point, x, y, ctx); | ||
857 | } | ||
858 | |||
859 | |||
860 | int EC_POINT_set_affine_coordinates_GF2m(const EC_GROUP *group, EC_POINT *point, | ||
861 | const BIGNUM *x, const BIGNUM *y, BN_CTX *ctx) | ||
862 | { | ||
863 | if (group->meth->point_set_affine_coordinates == 0) | ||
864 | { | ||
865 | ECerr(EC_F_EC_POINT_SET_AFFINE_COORDINATES_GF2M, ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED); | ||
866 | return 0; | ||
867 | } | ||
868 | if (group->meth != point->meth) | ||
869 | { | ||
870 | ECerr(EC_F_EC_POINT_SET_AFFINE_COORDINATES_GF2M, EC_R_INCOMPATIBLE_OBJECTS); | ||
871 | return 0; | ||
872 | } | ||
873 | return group->meth->point_set_affine_coordinates(group, point, x, y, ctx); | ||
874 | } | ||
875 | |||
876 | |||
877 | int EC_POINT_get_affine_coordinates_GFp(const EC_GROUP *group, const EC_POINT *point, | ||
878 | BIGNUM *x, BIGNUM *y, BN_CTX *ctx) | ||
879 | { | ||
880 | if (group->meth->point_get_affine_coordinates == 0) | ||
881 | { | ||
882 | ECerr(EC_F_EC_POINT_GET_AFFINE_COORDINATES_GFP, ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED); | ||
883 | return 0; | ||
884 | } | ||
885 | if (group->meth != point->meth) | ||
886 | { | ||
887 | ECerr(EC_F_EC_POINT_GET_AFFINE_COORDINATES_GFP, EC_R_INCOMPATIBLE_OBJECTS); | ||
888 | return 0; | ||
889 | } | ||
890 | return group->meth->point_get_affine_coordinates(group, point, x, y, ctx); | ||
891 | } | ||
892 | |||
893 | |||
894 | int EC_POINT_get_affine_coordinates_GF2m(const EC_GROUP *group, const EC_POINT *point, | ||
895 | BIGNUM *x, BIGNUM *y, BN_CTX *ctx) | ||
896 | { | ||
897 | if (group->meth->point_get_affine_coordinates == 0) | ||
898 | { | ||
899 | ECerr(EC_F_EC_POINT_GET_AFFINE_COORDINATES_GF2M, ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED); | ||
900 | return 0; | ||
901 | } | ||
902 | if (group->meth != point->meth) | ||
903 | { | ||
904 | ECerr(EC_F_EC_POINT_GET_AFFINE_COORDINATES_GF2M, EC_R_INCOMPATIBLE_OBJECTS); | ||
905 | return 0; | ||
906 | } | ||
907 | return group->meth->point_get_affine_coordinates(group, point, x, y, ctx); | ||
908 | } | ||
909 | |||
910 | |||
911 | int EC_POINT_set_compressed_coordinates_GFp(const EC_GROUP *group, EC_POINT *point, | ||
912 | const BIGNUM *x, int y_bit, BN_CTX *ctx) | ||
913 | { | ||
914 | if (group->meth->point_set_compressed_coordinates == 0) | ||
915 | { | ||
916 | ECerr(EC_F_EC_POINT_SET_COMPRESSED_COORDINATES_GFP, ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED); | ||
917 | return 0; | ||
918 | } | ||
919 | if (group->meth != point->meth) | ||
920 | { | ||
921 | ECerr(EC_F_EC_POINT_SET_COMPRESSED_COORDINATES_GFP, EC_R_INCOMPATIBLE_OBJECTS); | ||
922 | return 0; | ||
923 | } | ||
924 | return group->meth->point_set_compressed_coordinates(group, point, x, y_bit, ctx); | ||
925 | } | ||
926 | |||
927 | |||
928 | int EC_POINT_set_compressed_coordinates_GF2m(const EC_GROUP *group, EC_POINT *point, | ||
929 | const BIGNUM *x, int y_bit, BN_CTX *ctx) | ||
930 | { | ||
931 | if (group->meth->point_set_compressed_coordinates == 0) | ||
932 | { | ||
933 | ECerr(EC_F_EC_POINT_SET_COMPRESSED_COORDINATES_GF2M, ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED); | ||
934 | return 0; | ||
935 | } | ||
936 | if (group->meth != point->meth) | ||
937 | { | ||
938 | ECerr(EC_F_EC_POINT_SET_COMPRESSED_COORDINATES_GF2M, EC_R_INCOMPATIBLE_OBJECTS); | ||
939 | return 0; | ||
940 | } | ||
941 | return group->meth->point_set_compressed_coordinates(group, point, x, y_bit, ctx); | ||
942 | } | ||
943 | |||
944 | |||
945 | size_t EC_POINT_point2oct(const EC_GROUP *group, const EC_POINT *point, point_conversion_form_t form, | ||
946 | unsigned char *buf, size_t len, BN_CTX *ctx) | ||
947 | { | ||
948 | if (group->meth->point2oct == 0) | ||
949 | { | ||
950 | ECerr(EC_F_EC_POINT_POINT2OCT, ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED); | ||
951 | return 0; | ||
952 | } | ||
953 | if (group->meth != point->meth) | ||
954 | { | ||
955 | ECerr(EC_F_EC_POINT_POINT2OCT, EC_R_INCOMPATIBLE_OBJECTS); | ||
956 | return 0; | ||
957 | } | ||
958 | return group->meth->point2oct(group, point, form, buf, len, ctx); | ||
959 | } | ||
960 | |||
961 | |||
962 | int EC_POINT_oct2point(const EC_GROUP *group, EC_POINT *point, | ||
963 | const unsigned char *buf, size_t len, BN_CTX *ctx) | ||
964 | { | ||
965 | if (group->meth->oct2point == 0) | ||
966 | { | ||
967 | ECerr(EC_F_EC_POINT_OCT2POINT, ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED); | ||
968 | return 0; | ||
969 | } | ||
970 | if (group->meth != point->meth) | ||
971 | { | ||
972 | ECerr(EC_F_EC_POINT_OCT2POINT, EC_R_INCOMPATIBLE_OBJECTS); | ||
973 | return 0; | ||
974 | } | ||
975 | return group->meth->oct2point(group, point, buf, len, ctx); | ||
976 | } | ||
977 | |||
978 | |||
979 | int EC_POINT_add(const EC_GROUP *group, EC_POINT *r, const EC_POINT *a, const EC_POINT *b, BN_CTX *ctx) | ||
980 | { | ||
981 | if (group->meth->add == 0) | ||
982 | { | ||
983 | ECerr(EC_F_EC_POINT_ADD, ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED); | ||
984 | return 0; | ||
985 | } | ||
986 | if ((group->meth != r->meth) || (r->meth != a->meth) || (a->meth != b->meth)) | ||
987 | { | ||
988 | ECerr(EC_F_EC_POINT_ADD, EC_R_INCOMPATIBLE_OBJECTS); | ||
989 | return 0; | ||
990 | } | ||
991 | return group->meth->add(group, r, a, b, ctx); | ||
992 | } | ||
993 | |||
994 | |||
995 | int EC_POINT_dbl(const EC_GROUP *group, EC_POINT *r, const EC_POINT *a, BN_CTX *ctx) | ||
996 | { | ||
997 | if (group->meth->dbl == 0) | ||
998 | { | ||
999 | ECerr(EC_F_EC_POINT_DBL, ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED); | ||
1000 | return 0; | ||
1001 | } | ||
1002 | if ((group->meth != r->meth) || (r->meth != a->meth)) | ||
1003 | { | ||
1004 | ECerr(EC_F_EC_POINT_DBL, EC_R_INCOMPATIBLE_OBJECTS); | ||
1005 | return 0; | ||
1006 | } | ||
1007 | return group->meth->dbl(group, r, a, ctx); | ||
1008 | } | ||
1009 | |||
1010 | |||
1011 | int EC_POINT_invert(const EC_GROUP *group, EC_POINT *a, BN_CTX *ctx) | ||
1012 | { | ||
1013 | if (group->meth->dbl == 0) | ||
1014 | { | ||
1015 | ECerr(EC_F_EC_POINT_INVERT, ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED); | ||
1016 | return 0; | ||
1017 | } | ||
1018 | if (group->meth != a->meth) | ||
1019 | { | ||
1020 | ECerr(EC_F_EC_POINT_INVERT, EC_R_INCOMPATIBLE_OBJECTS); | ||
1021 | return 0; | ||
1022 | } | ||
1023 | return group->meth->invert(group, a, ctx); | ||
1024 | } | ||
1025 | |||
1026 | |||
1027 | int EC_POINT_is_at_infinity(const EC_GROUP *group, const EC_POINT *point) | ||
1028 | { | ||
1029 | if (group->meth->is_at_infinity == 0) | ||
1030 | { | ||
1031 | ECerr(EC_F_EC_POINT_IS_AT_INFINITY, ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED); | ||
1032 | return 0; | ||
1033 | } | ||
1034 | if (group->meth != point->meth) | ||
1035 | { | ||
1036 | ECerr(EC_F_EC_POINT_IS_AT_INFINITY, EC_R_INCOMPATIBLE_OBJECTS); | ||
1037 | return 0; | ||
1038 | } | ||
1039 | return group->meth->is_at_infinity(group, point); | ||
1040 | } | ||
1041 | |||
1042 | |||
1043 | int EC_POINT_is_on_curve(const EC_GROUP *group, const EC_POINT *point, BN_CTX *ctx) | ||
1044 | { | ||
1045 | if (group->meth->is_on_curve == 0) | ||
1046 | { | ||
1047 | ECerr(EC_F_EC_POINT_IS_ON_CURVE, ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED); | ||
1048 | return 0; | ||
1049 | } | ||
1050 | if (group->meth != point->meth) | ||
1051 | { | ||
1052 | ECerr(EC_F_EC_POINT_IS_ON_CURVE, EC_R_INCOMPATIBLE_OBJECTS); | ||
1053 | return 0; | ||
1054 | } | ||
1055 | return group->meth->is_on_curve(group, point, ctx); | ||
1056 | } | ||
1057 | |||
1058 | |||
1059 | int EC_POINT_cmp(const EC_GROUP *group, const EC_POINT *a, const EC_POINT *b, BN_CTX *ctx) | ||
1060 | { | ||
1061 | if (group->meth->point_cmp == 0) | ||
1062 | { | ||
1063 | ECerr(EC_F_EC_POINT_CMP, ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED); | ||
1064 | return 0; | ||
1065 | } | ||
1066 | if ((group->meth != a->meth) || (a->meth != b->meth)) | ||
1067 | { | ||
1068 | ECerr(EC_F_EC_POINT_CMP, EC_R_INCOMPATIBLE_OBJECTS); | ||
1069 | return 0; | ||
1070 | } | ||
1071 | return group->meth->point_cmp(group, a, b, ctx); | ||
1072 | } | ||
1073 | |||
1074 | |||
1075 | int EC_POINT_make_affine(const EC_GROUP *group, EC_POINT *point, BN_CTX *ctx) | ||
1076 | { | ||
1077 | if (group->meth->make_affine == 0) | ||
1078 | { | ||
1079 | ECerr(EC_F_EC_POINT_MAKE_AFFINE, ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED); | ||
1080 | return 0; | ||
1081 | } | ||
1082 | if (group->meth != point->meth) | ||
1083 | { | ||
1084 | ECerr(EC_F_EC_POINT_MAKE_AFFINE, EC_R_INCOMPATIBLE_OBJECTS); | ||
1085 | return 0; | ||
1086 | } | ||
1087 | return group->meth->make_affine(group, point, ctx); | ||
1088 | } | ||
1089 | |||
1090 | |||
1091 | int EC_POINTs_make_affine(const EC_GROUP *group, size_t num, EC_POINT *points[], BN_CTX *ctx) | ||
1092 | { | ||
1093 | size_t i; | ||
1094 | |||
1095 | if (group->meth->points_make_affine == 0) | ||
1096 | { | ||
1097 | ECerr(EC_F_EC_POINTS_MAKE_AFFINE, ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED); | ||
1098 | return 0; | ||
1099 | } | ||
1100 | for (i = 0; i < num; i++) | ||
1101 | { | ||
1102 | if (group->meth != points[i]->meth) | ||
1103 | { | ||
1104 | ECerr(EC_F_EC_POINTS_MAKE_AFFINE, EC_R_INCOMPATIBLE_OBJECTS); | ||
1105 | return 0; | ||
1106 | } | ||
1107 | } | ||
1108 | return group->meth->points_make_affine(group, num, points, ctx); | ||
1109 | } | ||
1110 | |||
1111 | |||
1112 | /* Functions for point multiplication. | ||
1113 | * | ||
1114 | * If group->meth->mul is 0, we use the wNAF-based implementations in ec_mult.c; | ||
1115 | * otherwise we dispatch through methods. | ||
1116 | */ | ||
1117 | |||
1118 | int EC_POINTs_mul(const EC_GROUP *group, EC_POINT *r, const BIGNUM *scalar, | ||
1119 | size_t num, const EC_POINT *points[], const BIGNUM *scalars[], BN_CTX *ctx) | ||
1120 | { | ||
1121 | if (group->meth->mul == 0) | ||
1122 | /* use default */ | ||
1123 | return ec_wNAF_mul(group, r, scalar, num, points, scalars, ctx); | ||
1124 | |||
1125 | return group->meth->mul(group, r, scalar, num, points, scalars, ctx); | ||
1126 | } | ||
1127 | |||
1128 | int EC_POINT_mul(const EC_GROUP *group, EC_POINT *r, const BIGNUM *g_scalar, | ||
1129 | const EC_POINT *point, const BIGNUM *p_scalar, BN_CTX *ctx) | ||
1130 | { | ||
1131 | /* just a convenient interface to EC_POINTs_mul() */ | ||
1132 | |||
1133 | const EC_POINT *points[1]; | ||
1134 | const BIGNUM *scalars[1]; | ||
1135 | |||
1136 | points[0] = point; | ||
1137 | scalars[0] = p_scalar; | ||
1138 | |||
1139 | return EC_POINTs_mul(group, r, g_scalar, (point != NULL && p_scalar != NULL), points, scalars, ctx); | ||
1140 | } | ||
1141 | |||
1142 | int EC_GROUP_precompute_mult(EC_GROUP *group, BN_CTX *ctx) | ||
1143 | { | ||
1144 | if (group->meth->mul == 0) | ||
1145 | /* use default */ | ||
1146 | return ec_wNAF_precompute_mult(group, ctx); | ||
1147 | |||
1148 | if (group->meth->precompute_mult != 0) | ||
1149 | return group->meth->precompute_mult(group, ctx); | ||
1150 | else | ||
1151 | return 1; /* nothing to do, so report success */ | ||
1152 | } | ||
1153 | |||
1154 | int EC_GROUP_have_precompute_mult(const EC_GROUP *group) | ||
1155 | { | ||
1156 | if (group->meth->mul == 0) | ||
1157 | /* use default */ | ||
1158 | return ec_wNAF_have_precompute_mult(group); | ||
1159 | |||
1160 | if (group->meth->have_precompute_mult != 0) | ||
1161 | return group->meth->have_precompute_mult(group); | ||
1162 | else | ||
1163 | return 0; /* cannot tell whether precomputation has been performed */ | ||
1164 | } | ||
diff --git a/src/lib/libcrypto/ec/ec_mult.c b/src/lib/libcrypto/ec/ec_mult.c deleted file mode 100644 index 2ba173ef36..0000000000 --- a/src/lib/libcrypto/ec/ec_mult.c +++ /dev/null | |||
@@ -1,938 +0,0 @@ | |||
1 | /* crypto/ec/ec_mult.c */ | ||
2 | /* | ||
3 | * Originally written by Bodo Moeller and Nils Larsch for the OpenSSL project. | ||
4 | */ | ||
5 | /* ==================================================================== | ||
6 | * Copyright (c) 1998-2007 The OpenSSL Project. All rights reserved. | ||
7 | * | ||
8 | * Redistribution and use in source and binary forms, with or without | ||
9 | * modification, are permitted provided that the following conditions | ||
10 | * are met: | ||
11 | * | ||
12 | * 1. Redistributions of source code must retain the above copyright | ||
13 | * notice, this list of conditions and the following disclaimer. | ||
14 | * | ||
15 | * 2. Redistributions in binary form must reproduce the above copyright | ||
16 | * notice, this list of conditions and the following disclaimer in | ||
17 | * the documentation and/or other materials provided with the | ||
18 | * distribution. | ||
19 | * | ||
20 | * 3. All advertising materials mentioning features or use of this | ||
21 | * software must display the following acknowledgment: | ||
22 | * "This product includes software developed by the OpenSSL Project | ||
23 | * for use in the OpenSSL Toolkit. (http://www.openssl.org/)" | ||
24 | * | ||
25 | * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to | ||
26 | * endorse or promote products derived from this software without | ||
27 | * prior written permission. For written permission, please contact | ||
28 | * openssl-core@openssl.org. | ||
29 | * | ||
30 | * 5. Products derived from this software may not be called "OpenSSL" | ||
31 | * nor may "OpenSSL" appear in their names without prior written | ||
32 | * permission of the OpenSSL Project. | ||
33 | * | ||
34 | * 6. Redistributions of any form whatsoever must retain the following | ||
35 | * acknowledgment: | ||
36 | * "This product includes software developed by the OpenSSL Project | ||
37 | * for use in the OpenSSL Toolkit (http://www.openssl.org/)" | ||
38 | * | ||
39 | * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY | ||
40 | * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | ||
41 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR | ||
42 | * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR | ||
43 | * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, | ||
44 | * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT | ||
45 | * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; | ||
46 | * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | ||
47 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, | ||
48 | * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) | ||
49 | * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | ||
50 | * OF THE POSSIBILITY OF SUCH DAMAGE. | ||
51 | * ==================================================================== | ||
52 | * | ||
53 | * This product includes cryptographic software written by Eric Young | ||
54 | * (eay@cryptsoft.com). This product includes software written by Tim | ||
55 | * Hudson (tjh@cryptsoft.com). | ||
56 | * | ||
57 | */ | ||
58 | /* ==================================================================== | ||
59 | * Copyright 2002 Sun Microsystems, Inc. ALL RIGHTS RESERVED. | ||
60 | * Portions of this software developed by SUN MICROSYSTEMS, INC., | ||
61 | * and contributed to the OpenSSL project. | ||
62 | */ | ||
63 | |||
64 | #include <string.h> | ||
65 | |||
66 | #include <openssl/err.h> | ||
67 | |||
68 | #include "ec_lcl.h" | ||
69 | |||
70 | |||
71 | /* | ||
72 | * This file implements the wNAF-based interleaving multi-exponentation method | ||
73 | * (<URL:http://www.informatik.tu-darmstadt.de/TI/Mitarbeiter/moeller.html#multiexp>); | ||
74 | * for multiplication with precomputation, we use wNAF splitting | ||
75 | * (<URL:http://www.informatik.tu-darmstadt.de/TI/Mitarbeiter/moeller.html#fastexp>). | ||
76 | */ | ||
77 | |||
78 | |||
79 | |||
80 | |||
81 | /* structure for precomputed multiples of the generator */ | ||
82 | typedef struct ec_pre_comp_st { | ||
83 | const EC_GROUP *group; /* parent EC_GROUP object */ | ||
84 | size_t blocksize; /* block size for wNAF splitting */ | ||
85 | size_t numblocks; /* max. number of blocks for which we have precomputation */ | ||
86 | size_t w; /* window size */ | ||
87 | EC_POINT **points; /* array with pre-calculated multiples of generator: | ||
88 | * 'num' pointers to EC_POINT objects followed by a NULL */ | ||
89 | size_t num; /* numblocks * 2^(w-1) */ | ||
90 | int references; | ||
91 | } EC_PRE_COMP; | ||
92 | |||
93 | /* functions to manage EC_PRE_COMP within the EC_GROUP extra_data framework */ | ||
94 | static void *ec_pre_comp_dup(void *); | ||
95 | static void ec_pre_comp_free(void *); | ||
96 | static void ec_pre_comp_clear_free(void *); | ||
97 | |||
98 | static EC_PRE_COMP *ec_pre_comp_new(const EC_GROUP *group) | ||
99 | { | ||
100 | EC_PRE_COMP *ret = NULL; | ||
101 | |||
102 | if (!group) | ||
103 | return NULL; | ||
104 | |||
105 | ret = (EC_PRE_COMP *)OPENSSL_malloc(sizeof(EC_PRE_COMP)); | ||
106 | if (!ret) | ||
107 | { | ||
108 | ECerr(EC_F_EC_PRE_COMP_NEW, ERR_R_MALLOC_FAILURE); | ||
109 | return ret; | ||
110 | } | ||
111 | ret->group = group; | ||
112 | ret->blocksize = 8; /* default */ | ||
113 | ret->numblocks = 0; | ||
114 | ret->w = 4; /* default */ | ||
115 | ret->points = NULL; | ||
116 | ret->num = 0; | ||
117 | ret->references = 1; | ||
118 | return ret; | ||
119 | } | ||
120 | |||
121 | static void *ec_pre_comp_dup(void *src_) | ||
122 | { | ||
123 | EC_PRE_COMP *src = src_; | ||
124 | |||
125 | /* no need to actually copy, these objects never change! */ | ||
126 | |||
127 | CRYPTO_add(&src->references, 1, CRYPTO_LOCK_EC_PRE_COMP); | ||
128 | |||
129 | return src_; | ||
130 | } | ||
131 | |||
132 | static void ec_pre_comp_free(void *pre_) | ||
133 | { | ||
134 | int i; | ||
135 | EC_PRE_COMP *pre = pre_; | ||
136 | |||
137 | if (!pre) | ||
138 | return; | ||
139 | |||
140 | i = CRYPTO_add(&pre->references, -1, CRYPTO_LOCK_EC_PRE_COMP); | ||
141 | if (i > 0) | ||
142 | return; | ||
143 | |||
144 | if (pre->points) | ||
145 | { | ||
146 | EC_POINT **p; | ||
147 | |||
148 | for (p = pre->points; *p != NULL; p++) | ||
149 | EC_POINT_free(*p); | ||
150 | OPENSSL_free(pre->points); | ||
151 | } | ||
152 | OPENSSL_free(pre); | ||
153 | } | ||
154 | |||
155 | static void ec_pre_comp_clear_free(void *pre_) | ||
156 | { | ||
157 | int i; | ||
158 | EC_PRE_COMP *pre = pre_; | ||
159 | |||
160 | if (!pre) | ||
161 | return; | ||
162 | |||
163 | i = CRYPTO_add(&pre->references, -1, CRYPTO_LOCK_EC_PRE_COMP); | ||
164 | if (i > 0) | ||
165 | return; | ||
166 | |||
167 | if (pre->points) | ||
168 | { | ||
169 | EC_POINT **p; | ||
170 | |||
171 | for (p = pre->points; *p != NULL; p++) | ||
172 | EC_POINT_clear_free(*p); | ||
173 | OPENSSL_cleanse(pre->points, sizeof pre->points); | ||
174 | OPENSSL_free(pre->points); | ||
175 | } | ||
176 | OPENSSL_cleanse(pre, sizeof pre); | ||
177 | OPENSSL_free(pre); | ||
178 | } | ||
179 | |||
180 | |||
181 | |||
182 | |||
183 | /* Determine the modified width-(w+1) Non-Adjacent Form (wNAF) of 'scalar'. | ||
184 | * This is an array r[] of values that are either zero or odd with an | ||
185 | * absolute value less than 2^w satisfying | ||
186 | * scalar = \sum_j r[j]*2^j | ||
187 | * where at most one of any w+1 consecutive digits is non-zero | ||
188 | * with the exception that the most significant digit may be only | ||
189 | * w-1 zeros away from that next non-zero digit. | ||
190 | */ | ||
191 | static signed char *compute_wNAF(const BIGNUM *scalar, int w, size_t *ret_len) | ||
192 | { | ||
193 | int window_val; | ||
194 | int ok = 0; | ||
195 | signed char *r = NULL; | ||
196 | int sign = 1; | ||
197 | int bit, next_bit, mask; | ||
198 | size_t len = 0, j; | ||
199 | |||
200 | if (BN_is_zero(scalar)) | ||
201 | { | ||
202 | r = OPENSSL_malloc(1); | ||
203 | if (!r) | ||
204 | { | ||
205 | ECerr(EC_F_COMPUTE_WNAF, ERR_R_MALLOC_FAILURE); | ||
206 | goto err; | ||
207 | } | ||
208 | r[0] = 0; | ||
209 | *ret_len = 1; | ||
210 | return r; | ||
211 | } | ||
212 | |||
213 | if (w <= 0 || w > 7) /* 'signed char' can represent integers with absolute values less than 2^7 */ | ||
214 | { | ||
215 | ECerr(EC_F_COMPUTE_WNAF, ERR_R_INTERNAL_ERROR); | ||
216 | goto err; | ||
217 | } | ||
218 | bit = 1 << w; /* at most 128 */ | ||
219 | next_bit = bit << 1; /* at most 256 */ | ||
220 | mask = next_bit - 1; /* at most 255 */ | ||
221 | |||
222 | if (BN_is_negative(scalar)) | ||
223 | { | ||
224 | sign = -1; | ||
225 | } | ||
226 | |||
227 | len = BN_num_bits(scalar); | ||
228 | r = OPENSSL_malloc(len + 1); /* modified wNAF may be one digit longer than binary representation | ||
229 | * (*ret_len will be set to the actual length, i.e. at most | ||
230 | * BN_num_bits(scalar) + 1) */ | ||
231 | if (r == NULL) | ||
232 | { | ||
233 | ECerr(EC_F_COMPUTE_WNAF, ERR_R_MALLOC_FAILURE); | ||
234 | goto err; | ||
235 | } | ||
236 | |||
237 | if (scalar->d == NULL || scalar->top == 0) | ||
238 | { | ||
239 | ECerr(EC_F_COMPUTE_WNAF, ERR_R_INTERNAL_ERROR); | ||
240 | goto err; | ||
241 | } | ||
242 | window_val = scalar->d[0] & mask; | ||
243 | j = 0; | ||
244 | while ((window_val != 0) || (j + w + 1 < len)) /* if j+w+1 >= len, window_val will not increase */ | ||
245 | { | ||
246 | int digit = 0; | ||
247 | |||
248 | /* 0 <= window_val <= 2^(w+1) */ | ||
249 | |||
250 | if (window_val & 1) | ||
251 | { | ||
252 | /* 0 < window_val < 2^(w+1) */ | ||
253 | |||
254 | if (window_val & bit) | ||
255 | { | ||
256 | digit = window_val - next_bit; /* -2^w < digit < 0 */ | ||
257 | |||
258 | #if 1 /* modified wNAF */ | ||
259 | if (j + w + 1 >= len) | ||
260 | { | ||
261 | /* special case for generating modified wNAFs: | ||
262 | * no new bits will be added into window_val, | ||
263 | * so using a positive digit here will decrease | ||
264 | * the total length of the representation */ | ||
265 | |||
266 | digit = window_val & (mask >> 1); /* 0 < digit < 2^w */ | ||
267 | } | ||
268 | #endif | ||
269 | } | ||
270 | else | ||
271 | { | ||
272 | digit = window_val; /* 0 < digit < 2^w */ | ||
273 | } | ||
274 | |||
275 | if (digit <= -bit || digit >= bit || !(digit & 1)) | ||
276 | { | ||
277 | ECerr(EC_F_COMPUTE_WNAF, ERR_R_INTERNAL_ERROR); | ||
278 | goto err; | ||
279 | } | ||
280 | |||
281 | window_val -= digit; | ||
282 | |||
283 | /* now window_val is 0 or 2^(w+1) in standard wNAF generation; | ||
284 | * for modified window NAFs, it may also be 2^w | ||
285 | */ | ||
286 | if (window_val != 0 && window_val != next_bit && window_val != bit) | ||
287 | { | ||
288 | ECerr(EC_F_COMPUTE_WNAF, ERR_R_INTERNAL_ERROR); | ||
289 | goto err; | ||
290 | } | ||
291 | } | ||
292 | |||
293 | r[j++] = sign * digit; | ||
294 | |||
295 | window_val >>= 1; | ||
296 | window_val += bit * BN_is_bit_set(scalar, j + w); | ||
297 | |||
298 | if (window_val > next_bit) | ||
299 | { | ||
300 | ECerr(EC_F_COMPUTE_WNAF, ERR_R_INTERNAL_ERROR); | ||
301 | goto err; | ||
302 | } | ||
303 | } | ||
304 | |||
305 | if (j > len + 1) | ||
306 | { | ||
307 | ECerr(EC_F_COMPUTE_WNAF, ERR_R_INTERNAL_ERROR); | ||
308 | goto err; | ||
309 | } | ||
310 | len = j; | ||
311 | ok = 1; | ||
312 | |||
313 | err: | ||
314 | if (!ok) | ||
315 | { | ||
316 | OPENSSL_free(r); | ||
317 | r = NULL; | ||
318 | } | ||
319 | if (ok) | ||
320 | *ret_len = len; | ||
321 | return r; | ||
322 | } | ||
323 | |||
324 | |||
325 | /* TODO: table should be optimised for the wNAF-based implementation, | ||
326 | * sometimes smaller windows will give better performance | ||
327 | * (thus the boundaries should be increased) | ||
328 | */ | ||
329 | #define EC_window_bits_for_scalar_size(b) \ | ||
330 | ((size_t) \ | ||
331 | ((b) >= 2000 ? 6 : \ | ||
332 | (b) >= 800 ? 5 : \ | ||
333 | (b) >= 300 ? 4 : \ | ||
334 | (b) >= 70 ? 3 : \ | ||
335 | (b) >= 20 ? 2 : \ | ||
336 | 1)) | ||
337 | |||
338 | /* Compute | ||
339 | * \sum scalars[i]*points[i], | ||
340 | * also including | ||
341 | * scalar*generator | ||
342 | * in the addition if scalar != NULL | ||
343 | */ | ||
344 | int ec_wNAF_mul(const EC_GROUP *group, EC_POINT *r, const BIGNUM *scalar, | ||
345 | size_t num, const EC_POINT *points[], const BIGNUM *scalars[], BN_CTX *ctx) | ||
346 | { | ||
347 | BN_CTX *new_ctx = NULL; | ||
348 | const EC_POINT *generator = NULL; | ||
349 | EC_POINT *tmp = NULL; | ||
350 | size_t totalnum; | ||
351 | size_t blocksize = 0, numblocks = 0; /* for wNAF splitting */ | ||
352 | size_t pre_points_per_block = 0; | ||
353 | size_t i, j; | ||
354 | int k; | ||
355 | int r_is_inverted = 0; | ||
356 | int r_is_at_infinity = 1; | ||
357 | size_t *wsize = NULL; /* individual window sizes */ | ||
358 | signed char **wNAF = NULL; /* individual wNAFs */ | ||
359 | size_t *wNAF_len = NULL; | ||
360 | size_t max_len = 0; | ||
361 | size_t num_val; | ||
362 | EC_POINT **val = NULL; /* precomputation */ | ||
363 | EC_POINT **v; | ||
364 | EC_POINT ***val_sub = NULL; /* pointers to sub-arrays of 'val' or 'pre_comp->points' */ | ||
365 | const EC_PRE_COMP *pre_comp = NULL; | ||
366 | int num_scalar = 0; /* flag: will be set to 1 if 'scalar' must be treated like other scalars, | ||
367 | * i.e. precomputation is not available */ | ||
368 | int ret = 0; | ||
369 | |||
370 | if (group->meth != r->meth) | ||
371 | { | ||
372 | ECerr(EC_F_EC_WNAF_MUL, EC_R_INCOMPATIBLE_OBJECTS); | ||
373 | return 0; | ||
374 | } | ||
375 | |||
376 | if ((scalar == NULL) && (num == 0)) | ||
377 | { | ||
378 | return EC_POINT_set_to_infinity(group, r); | ||
379 | } | ||
380 | |||
381 | for (i = 0; i < num; i++) | ||
382 | { | ||
383 | if (group->meth != points[i]->meth) | ||
384 | { | ||
385 | ECerr(EC_F_EC_WNAF_MUL, EC_R_INCOMPATIBLE_OBJECTS); | ||
386 | return 0; | ||
387 | } | ||
388 | } | ||
389 | |||
390 | if (ctx == NULL) | ||
391 | { | ||
392 | ctx = new_ctx = BN_CTX_new(); | ||
393 | if (ctx == NULL) | ||
394 | goto err; | ||
395 | } | ||
396 | |||
397 | if (scalar != NULL) | ||
398 | { | ||
399 | generator = EC_GROUP_get0_generator(group); | ||
400 | if (generator == NULL) | ||
401 | { | ||
402 | ECerr(EC_F_EC_WNAF_MUL, EC_R_UNDEFINED_GENERATOR); | ||
403 | goto err; | ||
404 | } | ||
405 | |||
406 | /* look if we can use precomputed multiples of generator */ | ||
407 | |||
408 | pre_comp = EC_EX_DATA_get_data(group->extra_data, ec_pre_comp_dup, ec_pre_comp_free, ec_pre_comp_clear_free); | ||
409 | |||
410 | if (pre_comp && pre_comp->numblocks && (EC_POINT_cmp(group, generator, pre_comp->points[0], ctx) == 0)) | ||
411 | { | ||
412 | blocksize = pre_comp->blocksize; | ||
413 | |||
414 | /* determine maximum number of blocks that wNAF splitting may yield | ||
415 | * (NB: maximum wNAF length is bit length plus one) */ | ||
416 | numblocks = (BN_num_bits(scalar) / blocksize) + 1; | ||
417 | |||
418 | /* we cannot use more blocks than we have precomputation for */ | ||
419 | if (numblocks > pre_comp->numblocks) | ||
420 | numblocks = pre_comp->numblocks; | ||
421 | |||
422 | pre_points_per_block = 1u << (pre_comp->w - 1); | ||
423 | |||
424 | /* check that pre_comp looks sane */ | ||
425 | if (pre_comp->num != (pre_comp->numblocks * pre_points_per_block)) | ||
426 | { | ||
427 | ECerr(EC_F_EC_WNAF_MUL, ERR_R_INTERNAL_ERROR); | ||
428 | goto err; | ||
429 | } | ||
430 | } | ||
431 | else | ||
432 | { | ||
433 | /* can't use precomputation */ | ||
434 | pre_comp = NULL; | ||
435 | numblocks = 1; | ||
436 | num_scalar = 1; /* treat 'scalar' like 'num'-th element of 'scalars' */ | ||
437 | } | ||
438 | } | ||
439 | |||
440 | totalnum = num + numblocks; | ||
441 | |||
442 | wsize = OPENSSL_malloc(totalnum * sizeof wsize[0]); | ||
443 | wNAF_len = OPENSSL_malloc(totalnum * sizeof wNAF_len[0]); | ||
444 | wNAF = OPENSSL_malloc((totalnum + 1) * sizeof wNAF[0]); /* includes space for pivot */ | ||
445 | val_sub = OPENSSL_malloc(totalnum * sizeof val_sub[0]); | ||
446 | |||
447 | if (!wsize || !wNAF_len || !wNAF || !val_sub) | ||
448 | { | ||
449 | ECerr(EC_F_EC_WNAF_MUL, ERR_R_MALLOC_FAILURE); | ||
450 | goto err; | ||
451 | } | ||
452 | |||
453 | wNAF[0] = NULL; /* preliminary pivot */ | ||
454 | |||
455 | /* num_val will be the total number of temporarily precomputed points */ | ||
456 | num_val = 0; | ||
457 | |||
458 | for (i = 0; i < num + num_scalar; i++) | ||
459 | { | ||
460 | size_t bits; | ||
461 | |||
462 | bits = i < num ? BN_num_bits(scalars[i]) : BN_num_bits(scalar); | ||
463 | wsize[i] = EC_window_bits_for_scalar_size(bits); | ||
464 | num_val += 1u << (wsize[i] - 1); | ||
465 | wNAF[i + 1] = NULL; /* make sure we always have a pivot */ | ||
466 | wNAF[i] = compute_wNAF((i < num ? scalars[i] : scalar), wsize[i], &wNAF_len[i]); | ||
467 | if (wNAF[i] == NULL) | ||
468 | goto err; | ||
469 | if (wNAF_len[i] > max_len) | ||
470 | max_len = wNAF_len[i]; | ||
471 | } | ||
472 | |||
473 | if (numblocks) | ||
474 | { | ||
475 | /* we go here iff scalar != NULL */ | ||
476 | |||
477 | if (pre_comp == NULL) | ||
478 | { | ||
479 | if (num_scalar != 1) | ||
480 | { | ||
481 | ECerr(EC_F_EC_WNAF_MUL, ERR_R_INTERNAL_ERROR); | ||
482 | goto err; | ||
483 | } | ||
484 | /* we have already generated a wNAF for 'scalar' */ | ||
485 | } | ||
486 | else | ||
487 | { | ||
488 | signed char *tmp_wNAF = NULL; | ||
489 | size_t tmp_len = 0; | ||
490 | |||
491 | if (num_scalar != 0) | ||
492 | { | ||
493 | ECerr(EC_F_EC_WNAF_MUL, ERR_R_INTERNAL_ERROR); | ||
494 | goto err; | ||
495 | } | ||
496 | |||
497 | /* use the window size for which we have precomputation */ | ||
498 | wsize[num] = pre_comp->w; | ||
499 | tmp_wNAF = compute_wNAF(scalar, wsize[num], &tmp_len); | ||
500 | if (!tmp_wNAF) | ||
501 | goto err; | ||
502 | |||
503 | if (tmp_len <= max_len) | ||
504 | { | ||
505 | /* One of the other wNAFs is at least as long | ||
506 | * as the wNAF belonging to the generator, | ||
507 | * so wNAF splitting will not buy us anything. */ | ||
508 | |||
509 | numblocks = 1; | ||
510 | totalnum = num + 1; /* don't use wNAF splitting */ | ||
511 | wNAF[num] = tmp_wNAF; | ||
512 | wNAF[num + 1] = NULL; | ||
513 | wNAF_len[num] = tmp_len; | ||
514 | if (tmp_len > max_len) | ||
515 | max_len = tmp_len; | ||
516 | /* pre_comp->points starts with the points that we need here: */ | ||
517 | val_sub[num] = pre_comp->points; | ||
518 | } | ||
519 | else | ||
520 | { | ||
521 | /* don't include tmp_wNAF directly into wNAF array | ||
522 | * - use wNAF splitting and include the blocks */ | ||
523 | |||
524 | signed char *pp; | ||
525 | EC_POINT **tmp_points; | ||
526 | |||
527 | if (tmp_len < numblocks * blocksize) | ||
528 | { | ||
529 | /* possibly we can do with fewer blocks than estimated */ | ||
530 | numblocks = (tmp_len + blocksize - 1) / blocksize; | ||
531 | if (numblocks > pre_comp->numblocks) | ||
532 | { | ||
533 | ECerr(EC_F_EC_WNAF_MUL, ERR_R_INTERNAL_ERROR); | ||
534 | goto err; | ||
535 | } | ||
536 | totalnum = num + numblocks; | ||
537 | } | ||
538 | |||
539 | /* split wNAF in 'numblocks' parts */ | ||
540 | pp = tmp_wNAF; | ||
541 | tmp_points = pre_comp->points; | ||
542 | |||
543 | for (i = num; i < totalnum; i++) | ||
544 | { | ||
545 | if (i < totalnum - 1) | ||
546 | { | ||
547 | wNAF_len[i] = blocksize; | ||
548 | if (tmp_len < blocksize) | ||
549 | { | ||
550 | ECerr(EC_F_EC_WNAF_MUL, ERR_R_INTERNAL_ERROR); | ||
551 | goto err; | ||
552 | } | ||
553 | tmp_len -= blocksize; | ||
554 | } | ||
555 | else | ||
556 | /* last block gets whatever is left | ||
557 | * (this could be more or less than 'blocksize'!) */ | ||
558 | wNAF_len[i] = tmp_len; | ||
559 | |||
560 | wNAF[i + 1] = NULL; | ||
561 | wNAF[i] = OPENSSL_malloc(wNAF_len[i]); | ||
562 | if (wNAF[i] == NULL) | ||
563 | { | ||
564 | ECerr(EC_F_EC_WNAF_MUL, ERR_R_MALLOC_FAILURE); | ||
565 | OPENSSL_free(tmp_wNAF); | ||
566 | goto err; | ||
567 | } | ||
568 | memcpy(wNAF[i], pp, wNAF_len[i]); | ||
569 | if (wNAF_len[i] > max_len) | ||
570 | max_len = wNAF_len[i]; | ||
571 | |||
572 | if (*tmp_points == NULL) | ||
573 | { | ||
574 | ECerr(EC_F_EC_WNAF_MUL, ERR_R_INTERNAL_ERROR); | ||
575 | OPENSSL_free(tmp_wNAF); | ||
576 | goto err; | ||
577 | } | ||
578 | val_sub[i] = tmp_points; | ||
579 | tmp_points += pre_points_per_block; | ||
580 | pp += blocksize; | ||
581 | } | ||
582 | OPENSSL_free(tmp_wNAF); | ||
583 | } | ||
584 | } | ||
585 | } | ||
586 | |||
587 | /* All points we precompute now go into a single array 'val'. | ||
588 | * 'val_sub[i]' is a pointer to the subarray for the i-th point, | ||
589 | * or to a subarray of 'pre_comp->points' if we already have precomputation. */ | ||
590 | val = OPENSSL_malloc((num_val + 1) * sizeof val[0]); | ||
591 | if (val == NULL) | ||
592 | { | ||
593 | ECerr(EC_F_EC_WNAF_MUL, ERR_R_MALLOC_FAILURE); | ||
594 | goto err; | ||
595 | } | ||
596 | val[num_val] = NULL; /* pivot element */ | ||
597 | |||
598 | /* allocate points for precomputation */ | ||
599 | v = val; | ||
600 | for (i = 0; i < num + num_scalar; i++) | ||
601 | { | ||
602 | val_sub[i] = v; | ||
603 | for (j = 0; j < (1u << (wsize[i] - 1)); j++) | ||
604 | { | ||
605 | *v = EC_POINT_new(group); | ||
606 | if (*v == NULL) goto err; | ||
607 | v++; | ||
608 | } | ||
609 | } | ||
610 | if (!(v == val + num_val)) | ||
611 | { | ||
612 | ECerr(EC_F_EC_WNAF_MUL, ERR_R_INTERNAL_ERROR); | ||
613 | goto err; | ||
614 | } | ||
615 | |||
616 | if (!(tmp = EC_POINT_new(group))) | ||
617 | goto err; | ||
618 | |||
619 | /* prepare precomputed values: | ||
620 | * val_sub[i][0] := points[i] | ||
621 | * val_sub[i][1] := 3 * points[i] | ||
622 | * val_sub[i][2] := 5 * points[i] | ||
623 | * ... | ||
624 | */ | ||
625 | for (i = 0; i < num + num_scalar; i++) | ||
626 | { | ||
627 | if (i < num) | ||
628 | { | ||
629 | if (!EC_POINT_copy(val_sub[i][0], points[i])) goto err; | ||
630 | } | ||
631 | else | ||
632 | { | ||
633 | if (!EC_POINT_copy(val_sub[i][0], generator)) goto err; | ||
634 | } | ||
635 | |||
636 | if (wsize[i] > 1) | ||
637 | { | ||
638 | if (!EC_POINT_dbl(group, tmp, val_sub[i][0], ctx)) goto err; | ||
639 | for (j = 1; j < (1u << (wsize[i] - 1)); j++) | ||
640 | { | ||
641 | if (!EC_POINT_add(group, val_sub[i][j], val_sub[i][j - 1], tmp, ctx)) goto err; | ||
642 | } | ||
643 | } | ||
644 | } | ||
645 | |||
646 | #if 1 /* optional; EC_window_bits_for_scalar_size assumes we do this step */ | ||
647 | if (!EC_POINTs_make_affine(group, num_val, val, ctx)) | ||
648 | goto err; | ||
649 | #endif | ||
650 | |||
651 | r_is_at_infinity = 1; | ||
652 | |||
653 | for (k = max_len - 1; k >= 0; k--) | ||
654 | { | ||
655 | if (!r_is_at_infinity) | ||
656 | { | ||
657 | if (!EC_POINT_dbl(group, r, r, ctx)) goto err; | ||
658 | } | ||
659 | |||
660 | for (i = 0; i < totalnum; i++) | ||
661 | { | ||
662 | if (wNAF_len[i] > (size_t)k) | ||
663 | { | ||
664 | int digit = wNAF[i][k]; | ||
665 | int is_neg; | ||
666 | |||
667 | if (digit) | ||
668 | { | ||
669 | is_neg = digit < 0; | ||
670 | |||
671 | if (is_neg) | ||
672 | digit = -digit; | ||
673 | |||
674 | if (is_neg != r_is_inverted) | ||
675 | { | ||
676 | if (!r_is_at_infinity) | ||
677 | { | ||
678 | if (!EC_POINT_invert(group, r, ctx)) goto err; | ||
679 | } | ||
680 | r_is_inverted = !r_is_inverted; | ||
681 | } | ||
682 | |||
683 | /* digit > 0 */ | ||
684 | |||
685 | if (r_is_at_infinity) | ||
686 | { | ||
687 | if (!EC_POINT_copy(r, val_sub[i][digit >> 1])) goto err; | ||
688 | r_is_at_infinity = 0; | ||
689 | } | ||
690 | else | ||
691 | { | ||
692 | if (!EC_POINT_add(group, r, r, val_sub[i][digit >> 1], ctx)) goto err; | ||
693 | } | ||
694 | } | ||
695 | } | ||
696 | } | ||
697 | } | ||
698 | |||
699 | if (r_is_at_infinity) | ||
700 | { | ||
701 | if (!EC_POINT_set_to_infinity(group, r)) goto err; | ||
702 | } | ||
703 | else | ||
704 | { | ||
705 | if (r_is_inverted) | ||
706 | if (!EC_POINT_invert(group, r, ctx)) goto err; | ||
707 | } | ||
708 | |||
709 | ret = 1; | ||
710 | |||
711 | err: | ||
712 | if (new_ctx != NULL) | ||
713 | BN_CTX_free(new_ctx); | ||
714 | if (tmp != NULL) | ||
715 | EC_POINT_free(tmp); | ||
716 | if (wsize != NULL) | ||
717 | OPENSSL_free(wsize); | ||
718 | if (wNAF_len != NULL) | ||
719 | OPENSSL_free(wNAF_len); | ||
720 | if (wNAF != NULL) | ||
721 | { | ||
722 | signed char **w; | ||
723 | |||
724 | for (w = wNAF; *w != NULL; w++) | ||
725 | OPENSSL_free(*w); | ||
726 | |||
727 | OPENSSL_free(wNAF); | ||
728 | } | ||
729 | if (val != NULL) | ||
730 | { | ||
731 | for (v = val; *v != NULL; v++) | ||
732 | EC_POINT_clear_free(*v); | ||
733 | |||
734 | OPENSSL_free(val); | ||
735 | } | ||
736 | if (val_sub != NULL) | ||
737 | { | ||
738 | OPENSSL_free(val_sub); | ||
739 | } | ||
740 | return ret; | ||
741 | } | ||
742 | |||
743 | |||
744 | /* ec_wNAF_precompute_mult() | ||
745 | * creates an EC_PRE_COMP object with preprecomputed multiples of the generator | ||
746 | * for use with wNAF splitting as implemented in ec_wNAF_mul(). | ||
747 | * | ||
748 | * 'pre_comp->points' is an array of multiples of the generator | ||
749 | * of the following form: | ||
750 | * points[0] = generator; | ||
751 | * points[1] = 3 * generator; | ||
752 | * ... | ||
753 | * points[2^(w-1)-1] = (2^(w-1)-1) * generator; | ||
754 | * points[2^(w-1)] = 2^blocksize * generator; | ||
755 | * points[2^(w-1)+1] = 3 * 2^blocksize * generator; | ||
756 | * ... | ||
757 | * points[2^(w-1)*(numblocks-1)-1] = (2^(w-1)) * 2^(blocksize*(numblocks-2)) * generator | ||
758 | * points[2^(w-1)*(numblocks-1)] = 2^(blocksize*(numblocks-1)) * generator | ||
759 | * ... | ||
760 | * points[2^(w-1)*numblocks-1] = (2^(w-1)) * 2^(blocksize*(numblocks-1)) * generator | ||
761 | * points[2^(w-1)*numblocks] = NULL | ||
762 | */ | ||
763 | int ec_wNAF_precompute_mult(EC_GROUP *group, BN_CTX *ctx) | ||
764 | { | ||
765 | const EC_POINT *generator; | ||
766 | EC_POINT *tmp_point = NULL, *base = NULL, **var; | ||
767 | BN_CTX *new_ctx = NULL; | ||
768 | BIGNUM *order; | ||
769 | size_t i, bits, w, pre_points_per_block, blocksize, numblocks, num; | ||
770 | EC_POINT **points = NULL; | ||
771 | EC_PRE_COMP *pre_comp; | ||
772 | int ret = 0; | ||
773 | |||
774 | /* if there is an old EC_PRE_COMP object, throw it away */ | ||
775 | EC_EX_DATA_free_data(&group->extra_data, ec_pre_comp_dup, ec_pre_comp_free, ec_pre_comp_clear_free); | ||
776 | |||
777 | if ((pre_comp = ec_pre_comp_new(group)) == NULL) | ||
778 | return 0; | ||
779 | |||
780 | generator = EC_GROUP_get0_generator(group); | ||
781 | if (generator == NULL) | ||
782 | { | ||
783 | ECerr(EC_F_EC_WNAF_PRECOMPUTE_MULT, EC_R_UNDEFINED_GENERATOR); | ||
784 | goto err; | ||
785 | } | ||
786 | |||
787 | if (ctx == NULL) | ||
788 | { | ||
789 | ctx = new_ctx = BN_CTX_new(); | ||
790 | if (ctx == NULL) | ||
791 | goto err; | ||
792 | } | ||
793 | |||
794 | BN_CTX_start(ctx); | ||
795 | order = BN_CTX_get(ctx); | ||
796 | if (order == NULL) goto err; | ||
797 | |||
798 | if (!EC_GROUP_get_order(group, order, ctx)) goto err; | ||
799 | if (BN_is_zero(order)) | ||
800 | { | ||
801 | ECerr(EC_F_EC_WNAF_PRECOMPUTE_MULT, EC_R_UNKNOWN_ORDER); | ||
802 | goto err; | ||
803 | } | ||
804 | |||
805 | bits = BN_num_bits(order); | ||
806 | /* The following parameters mean we precompute (approximately) | ||
807 | * one point per bit. | ||
808 | * | ||
809 | * TBD: The combination 8, 4 is perfect for 160 bits; for other | ||
810 | * bit lengths, other parameter combinations might provide better | ||
811 | * efficiency. | ||
812 | */ | ||
813 | blocksize = 8; | ||
814 | w = 4; | ||
815 | if (EC_window_bits_for_scalar_size(bits) > w) | ||
816 | { | ||
817 | /* let's not make the window too small ... */ | ||
818 | w = EC_window_bits_for_scalar_size(bits); | ||
819 | } | ||
820 | |||
821 | numblocks = (bits + blocksize - 1) / blocksize; /* max. number of blocks to use for wNAF splitting */ | ||
822 | |||
823 | pre_points_per_block = 1u << (w - 1); | ||
824 | num = pre_points_per_block * numblocks; /* number of points to compute and store */ | ||
825 | |||
826 | points = OPENSSL_malloc(sizeof (EC_POINT*)*(num + 1)); | ||
827 | if (!points) | ||
828 | { | ||
829 | ECerr(EC_F_EC_WNAF_PRECOMPUTE_MULT, ERR_R_MALLOC_FAILURE); | ||
830 | goto err; | ||
831 | } | ||
832 | |||
833 | var = points; | ||
834 | var[num] = NULL; /* pivot */ | ||
835 | for (i = 0; i < num; i++) | ||
836 | { | ||
837 | if ((var[i] = EC_POINT_new(group)) == NULL) | ||
838 | { | ||
839 | ECerr(EC_F_EC_WNAF_PRECOMPUTE_MULT, ERR_R_MALLOC_FAILURE); | ||
840 | goto err; | ||
841 | } | ||
842 | } | ||
843 | |||
844 | if (!(tmp_point = EC_POINT_new(group)) || !(base = EC_POINT_new(group))) | ||
845 | { | ||
846 | ECerr(EC_F_EC_WNAF_PRECOMPUTE_MULT, ERR_R_MALLOC_FAILURE); | ||
847 | goto err; | ||
848 | } | ||
849 | |||
850 | if (!EC_POINT_copy(base, generator)) | ||
851 | goto err; | ||
852 | |||
853 | /* do the precomputation */ | ||
854 | for (i = 0; i < numblocks; i++) | ||
855 | { | ||
856 | size_t j; | ||
857 | |||
858 | if (!EC_POINT_dbl(group, tmp_point, base, ctx)) | ||
859 | goto err; | ||
860 | |||
861 | if (!EC_POINT_copy(*var++, base)) | ||
862 | goto err; | ||
863 | |||
864 | for (j = 1; j < pre_points_per_block; j++, var++) | ||
865 | { | ||
866 | /* calculate odd multiples of the current base point */ | ||
867 | if (!EC_POINT_add(group, *var, tmp_point, *(var - 1), ctx)) | ||
868 | goto err; | ||
869 | } | ||
870 | |||
871 | if (i < numblocks - 1) | ||
872 | { | ||
873 | /* get the next base (multiply current one by 2^blocksize) */ | ||
874 | size_t k; | ||
875 | |||
876 | if (blocksize <= 2) | ||
877 | { | ||
878 | ECerr(EC_F_EC_WNAF_PRECOMPUTE_MULT, ERR_R_INTERNAL_ERROR); | ||
879 | goto err; | ||
880 | } | ||
881 | |||
882 | if (!EC_POINT_dbl(group, base, tmp_point, ctx)) | ||
883 | goto err; | ||
884 | for (k = 2; k < blocksize; k++) | ||
885 | { | ||
886 | if (!EC_POINT_dbl(group,base,base,ctx)) | ||
887 | goto err; | ||
888 | } | ||
889 | } | ||
890 | } | ||
891 | |||
892 | if (!EC_POINTs_make_affine(group, num, points, ctx)) | ||
893 | goto err; | ||
894 | |||
895 | pre_comp->group = group; | ||
896 | pre_comp->blocksize = blocksize; | ||
897 | pre_comp->numblocks = numblocks; | ||
898 | pre_comp->w = w; | ||
899 | pre_comp->points = points; | ||
900 | points = NULL; | ||
901 | pre_comp->num = num; | ||
902 | |||
903 | if (!EC_EX_DATA_set_data(&group->extra_data, pre_comp, | ||
904 | ec_pre_comp_dup, ec_pre_comp_free, ec_pre_comp_clear_free)) | ||
905 | goto err; | ||
906 | pre_comp = NULL; | ||
907 | |||
908 | ret = 1; | ||
909 | err: | ||
910 | if (ctx != NULL) | ||
911 | BN_CTX_end(ctx); | ||
912 | if (new_ctx != NULL) | ||
913 | BN_CTX_free(new_ctx); | ||
914 | if (pre_comp) | ||
915 | ec_pre_comp_free(pre_comp); | ||
916 | if (points) | ||
917 | { | ||
918 | EC_POINT **p; | ||
919 | |||
920 | for (p = points; *p != NULL; p++) | ||
921 | EC_POINT_free(*p); | ||
922 | OPENSSL_free(points); | ||
923 | } | ||
924 | if (tmp_point) | ||
925 | EC_POINT_free(tmp_point); | ||
926 | if (base) | ||
927 | EC_POINT_free(base); | ||
928 | return ret; | ||
929 | } | ||
930 | |||
931 | |||
932 | int ec_wNAF_have_precompute_mult(const EC_GROUP *group) | ||
933 | { | ||
934 | if (EC_EX_DATA_get_data(group->extra_data, ec_pre_comp_dup, ec_pre_comp_free, ec_pre_comp_clear_free) != NULL) | ||
935 | return 1; | ||
936 | else | ||
937 | return 0; | ||
938 | } | ||
diff --git a/src/lib/libcrypto/ec/ec_print.c b/src/lib/libcrypto/ec/ec_print.c deleted file mode 100644 index f7c8a303ac..0000000000 --- a/src/lib/libcrypto/ec/ec_print.c +++ /dev/null | |||
@@ -1,195 +0,0 @@ | |||
1 | /* crypto/ec/ec_print.c */ | ||
2 | /* ==================================================================== | ||
3 | * Copyright (c) 1998-2002 The OpenSSL Project. All rights reserved. | ||
4 | * | ||
5 | * Redistribution and use in source and binary forms, with or without | ||
6 | * modification, are permitted provided that the following conditions | ||
7 | * are met: | ||
8 | * | ||
9 | * 1. Redistributions of source code must retain the above copyright | ||
10 | * notice, this list of conditions and the following disclaimer. | ||
11 | * | ||
12 | * 2. Redistributions in binary form must reproduce the above copyright | ||
13 | * notice, this list of conditions and the following disclaimer in | ||
14 | * the documentation and/or other materials provided with the | ||
15 | * distribution. | ||
16 | * | ||
17 | * 3. All advertising materials mentioning features or use of this | ||
18 | * software must display the following acknowledgment: | ||
19 | * "This product includes software developed by the OpenSSL Project | ||
20 | * for use in the OpenSSL Toolkit. (http://www.openssl.org/)" | ||
21 | * | ||
22 | * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to | ||
23 | * endorse or promote products derived from this software without | ||
24 | * prior written permission. For written permission, please contact | ||
25 | * openssl-core@openssl.org. | ||
26 | * | ||
27 | * 5. Products derived from this software may not be called "OpenSSL" | ||
28 | * nor may "OpenSSL" appear in their names without prior written | ||
29 | * permission of the OpenSSL Project. | ||
30 | * | ||
31 | * 6. Redistributions of any form whatsoever must retain the following | ||
32 | * acknowledgment: | ||
33 | * "This product includes software developed by the OpenSSL Project | ||
34 | * for use in the OpenSSL Toolkit (http://www.openssl.org/)" | ||
35 | * | ||
36 | * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY | ||
37 | * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | ||
38 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR | ||
39 | * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR | ||
40 | * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, | ||
41 | * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT | ||
42 | * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; | ||
43 | * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | ||
44 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, | ||
45 | * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) | ||
46 | * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | ||
47 | * OF THE POSSIBILITY OF SUCH DAMAGE. | ||
48 | * ==================================================================== | ||
49 | * | ||
50 | * This product includes cryptographic software written by Eric Young | ||
51 | * (eay@cryptsoft.com). This product includes software written by Tim | ||
52 | * Hudson (tjh@cryptsoft.com). | ||
53 | * | ||
54 | */ | ||
55 | |||
56 | #include <openssl/crypto.h> | ||
57 | #include "ec_lcl.h" | ||
58 | |||
59 | BIGNUM *EC_POINT_point2bn(const EC_GROUP *group, | ||
60 | const EC_POINT *point, | ||
61 | point_conversion_form_t form, | ||
62 | BIGNUM *ret, | ||
63 | BN_CTX *ctx) | ||
64 | { | ||
65 | size_t buf_len=0; | ||
66 | unsigned char *buf; | ||
67 | |||
68 | buf_len = EC_POINT_point2oct(group, point, form, | ||
69 | NULL, 0, ctx); | ||
70 | if (buf_len == 0) | ||
71 | return NULL; | ||
72 | |||
73 | if ((buf = OPENSSL_malloc(buf_len)) == NULL) | ||
74 | return NULL; | ||
75 | |||
76 | if (!EC_POINT_point2oct(group, point, form, buf, buf_len, ctx)) | ||
77 | { | ||
78 | OPENSSL_free(buf); | ||
79 | return NULL; | ||
80 | } | ||
81 | |||
82 | ret = BN_bin2bn(buf, buf_len, ret); | ||
83 | |||
84 | OPENSSL_free(buf); | ||
85 | |||
86 | return ret; | ||
87 | } | ||
88 | |||
89 | EC_POINT *EC_POINT_bn2point(const EC_GROUP *group, | ||
90 | const BIGNUM *bn, | ||
91 | EC_POINT *point, | ||
92 | BN_CTX *ctx) | ||
93 | { | ||
94 | size_t buf_len=0; | ||
95 | unsigned char *buf; | ||
96 | EC_POINT *ret; | ||
97 | |||
98 | if ((buf_len = BN_num_bytes(bn)) == 0) return NULL; | ||
99 | buf = OPENSSL_malloc(buf_len); | ||
100 | if (buf == NULL) | ||
101 | return NULL; | ||
102 | |||
103 | if (!BN_bn2bin(bn, buf)) | ||
104 | { | ||
105 | OPENSSL_free(buf); | ||
106 | return NULL; | ||
107 | } | ||
108 | |||
109 | if (point == NULL) | ||
110 | { | ||
111 | if ((ret = EC_POINT_new(group)) == NULL) | ||
112 | { | ||
113 | OPENSSL_free(buf); | ||
114 | return NULL; | ||
115 | } | ||
116 | } | ||
117 | else | ||
118 | ret = point; | ||
119 | |||
120 | if (!EC_POINT_oct2point(group, ret, buf, buf_len, ctx)) | ||
121 | { | ||
122 | if (point == NULL) | ||
123 | EC_POINT_clear_free(ret); | ||
124 | OPENSSL_free(buf); | ||
125 | return NULL; | ||
126 | } | ||
127 | |||
128 | OPENSSL_free(buf); | ||
129 | return ret; | ||
130 | } | ||
131 | |||
132 | static const char *HEX_DIGITS = "0123456789ABCDEF"; | ||
133 | |||
134 | /* the return value must be freed (using OPENSSL_free()) */ | ||
135 | char *EC_POINT_point2hex(const EC_GROUP *group, | ||
136 | const EC_POINT *point, | ||
137 | point_conversion_form_t form, | ||
138 | BN_CTX *ctx) | ||
139 | { | ||
140 | char *ret, *p; | ||
141 | size_t buf_len=0,i; | ||
142 | unsigned char *buf, *pbuf; | ||
143 | |||
144 | buf_len = EC_POINT_point2oct(group, point, form, | ||
145 | NULL, 0, ctx); | ||
146 | if (buf_len == 0) | ||
147 | return NULL; | ||
148 | |||
149 | if ((buf = OPENSSL_malloc(buf_len)) == NULL) | ||
150 | return NULL; | ||
151 | |||
152 | if (!EC_POINT_point2oct(group, point, form, buf, buf_len, ctx)) | ||
153 | { | ||
154 | OPENSSL_free(buf); | ||
155 | return NULL; | ||
156 | } | ||
157 | |||
158 | ret = (char *)OPENSSL_malloc(buf_len*2+2); | ||
159 | if (ret == NULL) | ||
160 | { | ||
161 | OPENSSL_free(buf); | ||
162 | return NULL; | ||
163 | } | ||
164 | p = ret; | ||
165 | pbuf = buf; | ||
166 | for (i=buf_len; i > 0; i--) | ||
167 | { | ||
168 | int v = (int) *(pbuf++); | ||
169 | *(p++)=HEX_DIGITS[v>>4]; | ||
170 | *(p++)=HEX_DIGITS[v&0x0F]; | ||
171 | } | ||
172 | *p='\0'; | ||
173 | |||
174 | OPENSSL_free(buf); | ||
175 | |||
176 | return ret; | ||
177 | } | ||
178 | |||
179 | EC_POINT *EC_POINT_hex2point(const EC_GROUP *group, | ||
180 | const char *buf, | ||
181 | EC_POINT *point, | ||
182 | BN_CTX *ctx) | ||
183 | { | ||
184 | EC_POINT *ret=NULL; | ||
185 | BIGNUM *tmp_bn=NULL; | ||
186 | |||
187 | if (!BN_hex2bn(&tmp_bn, buf)) | ||
188 | return NULL; | ||
189 | |||
190 | ret = EC_POINT_bn2point(group, tmp_bn, point, ctx); | ||
191 | |||
192 | BN_clear_free(tmp_bn); | ||
193 | |||
194 | return ret; | ||
195 | } | ||
diff --git a/src/lib/libcrypto/ec/ecp_mont.c b/src/lib/libcrypto/ec/ecp_mont.c deleted file mode 100644 index 9fc4a466a5..0000000000 --- a/src/lib/libcrypto/ec/ecp_mont.c +++ /dev/null | |||
@@ -1,315 +0,0 @@ | |||
1 | /* crypto/ec/ecp_mont.c */ | ||
2 | /* | ||
3 | * Originally written by Bodo Moeller for the OpenSSL project. | ||
4 | */ | ||
5 | /* ==================================================================== | ||
6 | * Copyright (c) 1998-2001 The OpenSSL Project. All rights reserved. | ||
7 | * | ||
8 | * Redistribution and use in source and binary forms, with or without | ||
9 | * modification, are permitted provided that the following conditions | ||
10 | * are met: | ||
11 | * | ||
12 | * 1. Redistributions of source code must retain the above copyright | ||
13 | * notice, this list of conditions and the following disclaimer. | ||
14 | * | ||
15 | * 2. Redistributions in binary form must reproduce the above copyright | ||
16 | * notice, this list of conditions and the following disclaimer in | ||
17 | * the documentation and/or other materials provided with the | ||
18 | * distribution. | ||
19 | * | ||
20 | * 3. All advertising materials mentioning features or use of this | ||
21 | * software must display the following acknowledgment: | ||
22 | * "This product includes software developed by the OpenSSL Project | ||
23 | * for use in the OpenSSL Toolkit. (http://www.openssl.org/)" | ||
24 | * | ||
25 | * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to | ||
26 | * endorse or promote products derived from this software without | ||
27 | * prior written permission. For written permission, please contact | ||
28 | * openssl-core@openssl.org. | ||
29 | * | ||
30 | * 5. Products derived from this software may not be called "OpenSSL" | ||
31 | * nor may "OpenSSL" appear in their names without prior written | ||
32 | * permission of the OpenSSL Project. | ||
33 | * | ||
34 | * 6. Redistributions of any form whatsoever must retain the following | ||
35 | * acknowledgment: | ||
36 | * "This product includes software developed by the OpenSSL Project | ||
37 | * for use in the OpenSSL Toolkit (http://www.openssl.org/)" | ||
38 | * | ||
39 | * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY | ||
40 | * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | ||
41 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR | ||
42 | * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR | ||
43 | * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, | ||
44 | * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT | ||
45 | * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; | ||
46 | * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | ||
47 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, | ||
48 | * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) | ||
49 | * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | ||
50 | * OF THE POSSIBILITY OF SUCH DAMAGE. | ||
51 | * ==================================================================== | ||
52 | * | ||
53 | * This product includes cryptographic software written by Eric Young | ||
54 | * (eay@cryptsoft.com). This product includes software written by Tim | ||
55 | * Hudson (tjh@cryptsoft.com). | ||
56 | * | ||
57 | */ | ||
58 | /* ==================================================================== | ||
59 | * Copyright 2002 Sun Microsystems, Inc. ALL RIGHTS RESERVED. | ||
60 | * Portions of this software developed by SUN MICROSYSTEMS, INC., | ||
61 | * and contributed to the OpenSSL project. | ||
62 | */ | ||
63 | |||
64 | #include <openssl/err.h> | ||
65 | |||
66 | #include "ec_lcl.h" | ||
67 | |||
68 | |||
69 | const EC_METHOD *EC_GFp_mont_method(void) | ||
70 | { | ||
71 | static const EC_METHOD ret = { | ||
72 | NID_X9_62_prime_field, | ||
73 | ec_GFp_mont_group_init, | ||
74 | ec_GFp_mont_group_finish, | ||
75 | ec_GFp_mont_group_clear_finish, | ||
76 | ec_GFp_mont_group_copy, | ||
77 | ec_GFp_mont_group_set_curve, | ||
78 | ec_GFp_simple_group_get_curve, | ||
79 | ec_GFp_simple_group_get_degree, | ||
80 | ec_GFp_simple_group_check_discriminant, | ||
81 | ec_GFp_simple_point_init, | ||
82 | ec_GFp_simple_point_finish, | ||
83 | ec_GFp_simple_point_clear_finish, | ||
84 | ec_GFp_simple_point_copy, | ||
85 | ec_GFp_simple_point_set_to_infinity, | ||
86 | ec_GFp_simple_set_Jprojective_coordinates_GFp, | ||
87 | ec_GFp_simple_get_Jprojective_coordinates_GFp, | ||
88 | ec_GFp_simple_point_set_affine_coordinates, | ||
89 | ec_GFp_simple_point_get_affine_coordinates, | ||
90 | ec_GFp_simple_set_compressed_coordinates, | ||
91 | ec_GFp_simple_point2oct, | ||
92 | ec_GFp_simple_oct2point, | ||
93 | ec_GFp_simple_add, | ||
94 | ec_GFp_simple_dbl, | ||
95 | ec_GFp_simple_invert, | ||
96 | ec_GFp_simple_is_at_infinity, | ||
97 | ec_GFp_simple_is_on_curve, | ||
98 | ec_GFp_simple_cmp, | ||
99 | ec_GFp_simple_make_affine, | ||
100 | ec_GFp_simple_points_make_affine, | ||
101 | 0 /* mul */, | ||
102 | 0 /* precompute_mult */, | ||
103 | 0 /* have_precompute_mult */, | ||
104 | ec_GFp_mont_field_mul, | ||
105 | ec_GFp_mont_field_sqr, | ||
106 | 0 /* field_div */, | ||
107 | ec_GFp_mont_field_encode, | ||
108 | ec_GFp_mont_field_decode, | ||
109 | ec_GFp_mont_field_set_to_one }; | ||
110 | |||
111 | return &ret; | ||
112 | } | ||
113 | |||
114 | |||
115 | int ec_GFp_mont_group_init(EC_GROUP *group) | ||
116 | { | ||
117 | int ok; | ||
118 | |||
119 | ok = ec_GFp_simple_group_init(group); | ||
120 | group->field_data1 = NULL; | ||
121 | group->field_data2 = NULL; | ||
122 | return ok; | ||
123 | } | ||
124 | |||
125 | |||
126 | void ec_GFp_mont_group_finish(EC_GROUP *group) | ||
127 | { | ||
128 | if (group->field_data1 != NULL) | ||
129 | { | ||
130 | BN_MONT_CTX_free(group->field_data1); | ||
131 | group->field_data1 = NULL; | ||
132 | } | ||
133 | if (group->field_data2 != NULL) | ||
134 | { | ||
135 | BN_free(group->field_data2); | ||
136 | group->field_data2 = NULL; | ||
137 | } | ||
138 | ec_GFp_simple_group_finish(group); | ||
139 | } | ||
140 | |||
141 | |||
142 | void ec_GFp_mont_group_clear_finish(EC_GROUP *group) | ||
143 | { | ||
144 | if (group->field_data1 != NULL) | ||
145 | { | ||
146 | BN_MONT_CTX_free(group->field_data1); | ||
147 | group->field_data1 = NULL; | ||
148 | } | ||
149 | if (group->field_data2 != NULL) | ||
150 | { | ||
151 | BN_clear_free(group->field_data2); | ||
152 | group->field_data2 = NULL; | ||
153 | } | ||
154 | ec_GFp_simple_group_clear_finish(group); | ||
155 | } | ||
156 | |||
157 | |||
158 | int ec_GFp_mont_group_copy(EC_GROUP *dest, const EC_GROUP *src) | ||
159 | { | ||
160 | if (dest->field_data1 != NULL) | ||
161 | { | ||
162 | BN_MONT_CTX_free(dest->field_data1); | ||
163 | dest->field_data1 = NULL; | ||
164 | } | ||
165 | if (dest->field_data2 != NULL) | ||
166 | { | ||
167 | BN_clear_free(dest->field_data2); | ||
168 | dest->field_data2 = NULL; | ||
169 | } | ||
170 | |||
171 | if (!ec_GFp_simple_group_copy(dest, src)) return 0; | ||
172 | |||
173 | if (src->field_data1 != NULL) | ||
174 | { | ||
175 | dest->field_data1 = BN_MONT_CTX_new(); | ||
176 | if (dest->field_data1 == NULL) return 0; | ||
177 | if (!BN_MONT_CTX_copy(dest->field_data1, src->field_data1)) goto err; | ||
178 | } | ||
179 | if (src->field_data2 != NULL) | ||
180 | { | ||
181 | dest->field_data2 = BN_dup(src->field_data2); | ||
182 | if (dest->field_data2 == NULL) goto err; | ||
183 | } | ||
184 | |||
185 | return 1; | ||
186 | |||
187 | err: | ||
188 | if (dest->field_data1 != NULL) | ||
189 | { | ||
190 | BN_MONT_CTX_free(dest->field_data1); | ||
191 | dest->field_data1 = NULL; | ||
192 | } | ||
193 | return 0; | ||
194 | } | ||
195 | |||
196 | |||
197 | int ec_GFp_mont_group_set_curve(EC_GROUP *group, const BIGNUM *p, const BIGNUM *a, const BIGNUM *b, BN_CTX *ctx) | ||
198 | { | ||
199 | BN_CTX *new_ctx = NULL; | ||
200 | BN_MONT_CTX *mont = NULL; | ||
201 | BIGNUM *one = NULL; | ||
202 | int ret = 0; | ||
203 | |||
204 | if (group->field_data1 != NULL) | ||
205 | { | ||
206 | BN_MONT_CTX_free(group->field_data1); | ||
207 | group->field_data1 = NULL; | ||
208 | } | ||
209 | if (group->field_data2 != NULL) | ||
210 | { | ||
211 | BN_free(group->field_data2); | ||
212 | group->field_data2 = NULL; | ||
213 | } | ||
214 | |||
215 | if (ctx == NULL) | ||
216 | { | ||
217 | ctx = new_ctx = BN_CTX_new(); | ||
218 | if (ctx == NULL) | ||
219 | return 0; | ||
220 | } | ||
221 | |||
222 | mont = BN_MONT_CTX_new(); | ||
223 | if (mont == NULL) goto err; | ||
224 | if (!BN_MONT_CTX_set(mont, p, ctx)) | ||
225 | { | ||
226 | ECerr(EC_F_EC_GFP_MONT_GROUP_SET_CURVE, ERR_R_BN_LIB); | ||
227 | goto err; | ||
228 | } | ||
229 | one = BN_new(); | ||
230 | if (one == NULL) goto err; | ||
231 | if (!BN_to_montgomery(one, BN_value_one(), mont, ctx)) goto err; | ||
232 | |||
233 | group->field_data1 = mont; | ||
234 | mont = NULL; | ||
235 | group->field_data2 = one; | ||
236 | one = NULL; | ||
237 | |||
238 | ret = ec_GFp_simple_group_set_curve(group, p, a, b, ctx); | ||
239 | |||
240 | if (!ret) | ||
241 | { | ||
242 | BN_MONT_CTX_free(group->field_data1); | ||
243 | group->field_data1 = NULL; | ||
244 | BN_free(group->field_data2); | ||
245 | group->field_data2 = NULL; | ||
246 | } | ||
247 | |||
248 | err: | ||
249 | if (new_ctx != NULL) | ||
250 | BN_CTX_free(new_ctx); | ||
251 | if (mont != NULL) | ||
252 | BN_MONT_CTX_free(mont); | ||
253 | return ret; | ||
254 | } | ||
255 | |||
256 | |||
257 | int ec_GFp_mont_field_mul(const EC_GROUP *group, BIGNUM *r, const BIGNUM *a, const BIGNUM *b, BN_CTX *ctx) | ||
258 | { | ||
259 | if (group->field_data1 == NULL) | ||
260 | { | ||
261 | ECerr(EC_F_EC_GFP_MONT_FIELD_MUL, EC_R_NOT_INITIALIZED); | ||
262 | return 0; | ||
263 | } | ||
264 | |||
265 | return BN_mod_mul_montgomery(r, a, b, group->field_data1, ctx); | ||
266 | } | ||
267 | |||
268 | |||
269 | int ec_GFp_mont_field_sqr(const EC_GROUP *group, BIGNUM *r, const BIGNUM *a, BN_CTX *ctx) | ||
270 | { | ||
271 | if (group->field_data1 == NULL) | ||
272 | { | ||
273 | ECerr(EC_F_EC_GFP_MONT_FIELD_SQR, EC_R_NOT_INITIALIZED); | ||
274 | return 0; | ||
275 | } | ||
276 | |||
277 | return BN_mod_mul_montgomery(r, a, a, group->field_data1, ctx); | ||
278 | } | ||
279 | |||
280 | |||
281 | int ec_GFp_mont_field_encode(const EC_GROUP *group, BIGNUM *r, const BIGNUM *a, BN_CTX *ctx) | ||
282 | { | ||
283 | if (group->field_data1 == NULL) | ||
284 | { | ||
285 | ECerr(EC_F_EC_GFP_MONT_FIELD_ENCODE, EC_R_NOT_INITIALIZED); | ||
286 | return 0; | ||
287 | } | ||
288 | |||
289 | return BN_to_montgomery(r, a, (BN_MONT_CTX *)group->field_data1, ctx); | ||
290 | } | ||
291 | |||
292 | |||
293 | int ec_GFp_mont_field_decode(const EC_GROUP *group, BIGNUM *r, const BIGNUM *a, BN_CTX *ctx) | ||
294 | { | ||
295 | if (group->field_data1 == NULL) | ||
296 | { | ||
297 | ECerr(EC_F_EC_GFP_MONT_FIELD_DECODE, EC_R_NOT_INITIALIZED); | ||
298 | return 0; | ||
299 | } | ||
300 | |||
301 | return BN_from_montgomery(r, a, group->field_data1, ctx); | ||
302 | } | ||
303 | |||
304 | |||
305 | int ec_GFp_mont_field_set_to_one(const EC_GROUP *group, BIGNUM *r, BN_CTX *ctx) | ||
306 | { | ||
307 | if (group->field_data2 == NULL) | ||
308 | { | ||
309 | ECerr(EC_F_EC_GFP_MONT_FIELD_SET_TO_ONE, EC_R_NOT_INITIALIZED); | ||
310 | return 0; | ||
311 | } | ||
312 | |||
313 | if (!BN_copy(r, group->field_data2)) return 0; | ||
314 | return 1; | ||
315 | } | ||
diff --git a/src/lib/libcrypto/ec/ecp_nist.c b/src/lib/libcrypto/ec/ecp_nist.c deleted file mode 100644 index 71893d5eab..0000000000 --- a/src/lib/libcrypto/ec/ecp_nist.c +++ /dev/null | |||
@@ -1,236 +0,0 @@ | |||
1 | /* crypto/ec/ecp_nist.c */ | ||
2 | /* | ||
3 | * Written by Nils Larsch for the OpenSSL project. | ||
4 | */ | ||
5 | /* ==================================================================== | ||
6 | * Copyright (c) 1998-2003 The OpenSSL Project. All rights reserved. | ||
7 | * | ||
8 | * Redistribution and use in source and binary forms, with or without | ||
9 | * modification, are permitted provided that the following conditions | ||
10 | * are met: | ||
11 | * | ||
12 | * 1. Redistributions of source code must retain the above copyright | ||
13 | * notice, this list of conditions and the following disclaimer. | ||
14 | * | ||
15 | * 2. Redistributions in binary form must reproduce the above copyright | ||
16 | * notice, this list of conditions and the following disclaimer in | ||
17 | * the documentation and/or other materials provided with the | ||
18 | * distribution. | ||
19 | * | ||
20 | * 3. All advertising materials mentioning features or use of this | ||
21 | * software must display the following acknowledgment: | ||
22 | * "This product includes software developed by the OpenSSL Project | ||
23 | * for use in the OpenSSL Toolkit. (http://www.openssl.org/)" | ||
24 | * | ||
25 | * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to | ||
26 | * endorse or promote products derived from this software without | ||
27 | * prior written permission. For written permission, please contact | ||
28 | * openssl-core@openssl.org. | ||
29 | * | ||
30 | * 5. Products derived from this software may not be called "OpenSSL" | ||
31 | * nor may "OpenSSL" appear in their names without prior written | ||
32 | * permission of the OpenSSL Project. | ||
33 | * | ||
34 | * 6. Redistributions of any form whatsoever must retain the following | ||
35 | * acknowledgment: | ||
36 | * "This product includes software developed by the OpenSSL Project | ||
37 | * for use in the OpenSSL Toolkit (http://www.openssl.org/)" | ||
38 | * | ||
39 | * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY | ||
40 | * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | ||
41 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR | ||
42 | * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR | ||
43 | * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, | ||
44 | * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT | ||
45 | * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; | ||
46 | * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | ||
47 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, | ||
48 | * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) | ||
49 | * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | ||
50 | * OF THE POSSIBILITY OF SUCH DAMAGE. | ||
51 | * ==================================================================== | ||
52 | * | ||
53 | * This product includes cryptographic software written by Eric Young | ||
54 | * (eay@cryptsoft.com). This product includes software written by Tim | ||
55 | * Hudson (tjh@cryptsoft.com). | ||
56 | * | ||
57 | */ | ||
58 | /* ==================================================================== | ||
59 | * Copyright 2002 Sun Microsystems, Inc. ALL RIGHTS RESERVED. | ||
60 | * Portions of this software developed by SUN MICROSYSTEMS, INC., | ||
61 | * and contributed to the OpenSSL project. | ||
62 | */ | ||
63 | |||
64 | #include <limits.h> | ||
65 | |||
66 | #include <openssl/err.h> | ||
67 | #include <openssl/obj_mac.h> | ||
68 | #include "ec_lcl.h" | ||
69 | |||
70 | const EC_METHOD *EC_GFp_nist_method(void) | ||
71 | { | ||
72 | static const EC_METHOD ret = { | ||
73 | NID_X9_62_prime_field, | ||
74 | ec_GFp_simple_group_init, | ||
75 | ec_GFp_simple_group_finish, | ||
76 | ec_GFp_simple_group_clear_finish, | ||
77 | ec_GFp_nist_group_copy, | ||
78 | ec_GFp_nist_group_set_curve, | ||
79 | ec_GFp_simple_group_get_curve, | ||
80 | ec_GFp_simple_group_get_degree, | ||
81 | ec_GFp_simple_group_check_discriminant, | ||
82 | ec_GFp_simple_point_init, | ||
83 | ec_GFp_simple_point_finish, | ||
84 | ec_GFp_simple_point_clear_finish, | ||
85 | ec_GFp_simple_point_copy, | ||
86 | ec_GFp_simple_point_set_to_infinity, | ||
87 | ec_GFp_simple_set_Jprojective_coordinates_GFp, | ||
88 | ec_GFp_simple_get_Jprojective_coordinates_GFp, | ||
89 | ec_GFp_simple_point_set_affine_coordinates, | ||
90 | ec_GFp_simple_point_get_affine_coordinates, | ||
91 | ec_GFp_simple_set_compressed_coordinates, | ||
92 | ec_GFp_simple_point2oct, | ||
93 | ec_GFp_simple_oct2point, | ||
94 | ec_GFp_simple_add, | ||
95 | ec_GFp_simple_dbl, | ||
96 | ec_GFp_simple_invert, | ||
97 | ec_GFp_simple_is_at_infinity, | ||
98 | ec_GFp_simple_is_on_curve, | ||
99 | ec_GFp_simple_cmp, | ||
100 | ec_GFp_simple_make_affine, | ||
101 | ec_GFp_simple_points_make_affine, | ||
102 | 0 /* mul */, | ||
103 | 0 /* precompute_mult */, | ||
104 | 0 /* have_precompute_mult */, | ||
105 | ec_GFp_nist_field_mul, | ||
106 | ec_GFp_nist_field_sqr, | ||
107 | 0 /* field_div */, | ||
108 | 0 /* field_encode */, | ||
109 | 0 /* field_decode */, | ||
110 | 0 /* field_set_to_one */ }; | ||
111 | |||
112 | return &ret; | ||
113 | } | ||
114 | |||
115 | #if BN_BITS2 == 64 | ||
116 | #define NO_32_BIT_TYPE | ||
117 | #endif | ||
118 | |||
119 | int ec_GFp_nist_group_copy(EC_GROUP *dest, const EC_GROUP *src) | ||
120 | { | ||
121 | dest->field_mod_func = src->field_mod_func; | ||
122 | |||
123 | return ec_GFp_simple_group_copy(dest, src); | ||
124 | } | ||
125 | |||
126 | int ec_GFp_nist_group_set_curve(EC_GROUP *group, const BIGNUM *p, | ||
127 | const BIGNUM *a, const BIGNUM *b, BN_CTX *ctx) | ||
128 | { | ||
129 | int ret = 0; | ||
130 | BN_CTX *new_ctx = NULL; | ||
131 | BIGNUM *tmp_bn; | ||
132 | |||
133 | if (ctx == NULL) | ||
134 | if ((ctx = new_ctx = BN_CTX_new()) == NULL) return 0; | ||
135 | |||
136 | BN_CTX_start(ctx); | ||
137 | if ((tmp_bn = BN_CTX_get(ctx)) == NULL) goto err; | ||
138 | |||
139 | if (BN_ucmp(BN_get0_nist_prime_192(), p) == 0) | ||
140 | group->field_mod_func = BN_nist_mod_192; | ||
141 | else if (BN_ucmp(BN_get0_nist_prime_224(), p) == 0) | ||
142 | { | ||
143 | #ifndef NO_32_BIT_TYPE | ||
144 | group->field_mod_func = BN_nist_mod_224; | ||
145 | #else | ||
146 | ECerr(EC_F_EC_GFP_NIST_GROUP_SET_CURVE, EC_R_NOT_A_SUPPORTED_NIST_PRIME); | ||
147 | goto err; | ||
148 | #endif | ||
149 | } | ||
150 | else if (BN_ucmp(BN_get0_nist_prime_256(), p) == 0) | ||
151 | { | ||
152 | #ifndef NO_32_BIT_TYPE | ||
153 | group->field_mod_func = BN_nist_mod_256; | ||
154 | #else | ||
155 | ECerr(EC_F_EC_GFP_NIST_GROUP_SET_CURVE, EC_R_NOT_A_SUPPORTED_NIST_PRIME); | ||
156 | goto err; | ||
157 | #endif | ||
158 | } | ||
159 | else if (BN_ucmp(BN_get0_nist_prime_384(), p) == 0) | ||
160 | { | ||
161 | #ifndef NO_32_BIT_TYPE | ||
162 | group->field_mod_func = BN_nist_mod_384; | ||
163 | #else | ||
164 | ECerr(EC_F_EC_GFP_NIST_GROUP_SET_CURVE, EC_R_NOT_A_SUPPORTED_NIST_PRIME); | ||
165 | goto err; | ||
166 | #endif | ||
167 | } | ||
168 | else if (BN_ucmp(BN_get0_nist_prime_521(), p) == 0) | ||
169 | /* this one works in the NO_32_BIT_TYPE case */ | ||
170 | group->field_mod_func = BN_nist_mod_521; | ||
171 | else | ||
172 | { | ||
173 | ECerr(EC_F_EC_GFP_NIST_GROUP_SET_CURVE, EC_R_NOT_A_NIST_PRIME); | ||
174 | goto err; | ||
175 | } | ||
176 | |||
177 | ret = ec_GFp_simple_group_set_curve(group, p, a, b, ctx); | ||
178 | |||
179 | err: | ||
180 | BN_CTX_end(ctx); | ||
181 | if (new_ctx != NULL) | ||
182 | BN_CTX_free(new_ctx); | ||
183 | return ret; | ||
184 | } | ||
185 | |||
186 | |||
187 | int ec_GFp_nist_field_mul(const EC_GROUP *group, BIGNUM *r, const BIGNUM *a, | ||
188 | const BIGNUM *b, BN_CTX *ctx) | ||
189 | { | ||
190 | int ret=0; | ||
191 | BN_CTX *ctx_new=NULL; | ||
192 | |||
193 | if (!group || !r || !a || !b) | ||
194 | { | ||
195 | ECerr(EC_F_EC_GFP_NIST_FIELD_MUL, ERR_R_PASSED_NULL_PARAMETER); | ||
196 | goto err; | ||
197 | } | ||
198 | if (!ctx) | ||
199 | if ((ctx_new = ctx = BN_CTX_new()) == NULL) goto err; | ||
200 | |||
201 | if (!BN_mul(r, a, b, ctx)) goto err; | ||
202 | if (!group->field_mod_func(r, r, &group->field, ctx)) | ||
203 | goto err; | ||
204 | |||
205 | ret=1; | ||
206 | err: | ||
207 | if (ctx_new) | ||
208 | BN_CTX_free(ctx_new); | ||
209 | return ret; | ||
210 | } | ||
211 | |||
212 | |||
213 | int ec_GFp_nist_field_sqr(const EC_GROUP *group, BIGNUM *r, const BIGNUM *a, | ||
214 | BN_CTX *ctx) | ||
215 | { | ||
216 | int ret=0; | ||
217 | BN_CTX *ctx_new=NULL; | ||
218 | |||
219 | if (!group || !r || !a) | ||
220 | { | ||
221 | ECerr(EC_F_EC_GFP_NIST_FIELD_SQR, EC_R_PASSED_NULL_PARAMETER); | ||
222 | goto err; | ||
223 | } | ||
224 | if (!ctx) | ||
225 | if ((ctx_new = ctx = BN_CTX_new()) == NULL) goto err; | ||
226 | |||
227 | if (!BN_sqr(r, a, ctx)) goto err; | ||
228 | if (!group->field_mod_func(r, r, &group->field, ctx)) | ||
229 | goto err; | ||
230 | |||
231 | ret=1; | ||
232 | err: | ||
233 | if (ctx_new) | ||
234 | BN_CTX_free(ctx_new); | ||
235 | return ret; | ||
236 | } | ||
diff --git a/src/lib/libcrypto/ec/ecp_smpl.c b/src/lib/libcrypto/ec/ecp_smpl.c deleted file mode 100644 index 4d26f8bdf6..0000000000 --- a/src/lib/libcrypto/ec/ecp_smpl.c +++ /dev/null | |||
@@ -1,1716 +0,0 @@ | |||
1 | /* crypto/ec/ecp_smpl.c */ | ||
2 | /* Includes code written by Lenka Fibikova <fibikova@exp-math.uni-essen.de> | ||
3 | * for the OpenSSL project. | ||
4 | * Includes code written by Bodo Moeller for the OpenSSL project. | ||
5 | */ | ||
6 | /* ==================================================================== | ||
7 | * Copyright (c) 1998-2002 The OpenSSL Project. All rights reserved. | ||
8 | * | ||
9 | * Redistribution and use in source and binary forms, with or without | ||
10 | * modification, are permitted provided that the following conditions | ||
11 | * are met: | ||
12 | * | ||
13 | * 1. Redistributions of source code must retain the above copyright | ||
14 | * notice, this list of conditions and the following disclaimer. | ||
15 | * | ||
16 | * 2. Redistributions in binary form must reproduce the above copyright | ||
17 | * notice, this list of conditions and the following disclaimer in | ||
18 | * the documentation and/or other materials provided with the | ||
19 | * distribution. | ||
20 | * | ||
21 | * 3. All advertising materials mentioning features or use of this | ||
22 | * software must display the following acknowledgment: | ||
23 | * "This product includes software developed by the OpenSSL Project | ||
24 | * for use in the OpenSSL Toolkit. (http://www.openssl.org/)" | ||
25 | * | ||
26 | * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to | ||
27 | * endorse or promote products derived from this software without | ||
28 | * prior written permission. For written permission, please contact | ||
29 | * openssl-core@openssl.org. | ||
30 | * | ||
31 | * 5. Products derived from this software may not be called "OpenSSL" | ||
32 | * nor may "OpenSSL" appear in their names without prior written | ||
33 | * permission of the OpenSSL Project. | ||
34 | * | ||
35 | * 6. Redistributions of any form whatsoever must retain the following | ||
36 | * acknowledgment: | ||
37 | * "This product includes software developed by the OpenSSL Project | ||
38 | * for use in the OpenSSL Toolkit (http://www.openssl.org/)" | ||
39 | * | ||
40 | * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY | ||
41 | * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | ||
42 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR | ||
43 | * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR | ||
44 | * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, | ||
45 | * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT | ||
46 | * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; | ||
47 | * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | ||
48 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, | ||
49 | * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) | ||
50 | * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | ||
51 | * OF THE POSSIBILITY OF SUCH DAMAGE. | ||
52 | * ==================================================================== | ||
53 | * | ||
54 | * This product includes cryptographic software written by Eric Young | ||
55 | * (eay@cryptsoft.com). This product includes software written by Tim | ||
56 | * Hudson (tjh@cryptsoft.com). | ||
57 | * | ||
58 | */ | ||
59 | /* ==================================================================== | ||
60 | * Copyright 2002 Sun Microsystems, Inc. ALL RIGHTS RESERVED. | ||
61 | * Portions of this software developed by SUN MICROSYSTEMS, INC., | ||
62 | * and contributed to the OpenSSL project. | ||
63 | */ | ||
64 | |||
65 | #include <openssl/err.h> | ||
66 | #include <openssl/symhacks.h> | ||
67 | |||
68 | #include "ec_lcl.h" | ||
69 | |||
70 | const EC_METHOD *EC_GFp_simple_method(void) | ||
71 | { | ||
72 | static const EC_METHOD ret = { | ||
73 | NID_X9_62_prime_field, | ||
74 | ec_GFp_simple_group_init, | ||
75 | ec_GFp_simple_group_finish, | ||
76 | ec_GFp_simple_group_clear_finish, | ||
77 | ec_GFp_simple_group_copy, | ||
78 | ec_GFp_simple_group_set_curve, | ||
79 | ec_GFp_simple_group_get_curve, | ||
80 | ec_GFp_simple_group_get_degree, | ||
81 | ec_GFp_simple_group_check_discriminant, | ||
82 | ec_GFp_simple_point_init, | ||
83 | ec_GFp_simple_point_finish, | ||
84 | ec_GFp_simple_point_clear_finish, | ||
85 | ec_GFp_simple_point_copy, | ||
86 | ec_GFp_simple_point_set_to_infinity, | ||
87 | ec_GFp_simple_set_Jprojective_coordinates_GFp, | ||
88 | ec_GFp_simple_get_Jprojective_coordinates_GFp, | ||
89 | ec_GFp_simple_point_set_affine_coordinates, | ||
90 | ec_GFp_simple_point_get_affine_coordinates, | ||
91 | ec_GFp_simple_set_compressed_coordinates, | ||
92 | ec_GFp_simple_point2oct, | ||
93 | ec_GFp_simple_oct2point, | ||
94 | ec_GFp_simple_add, | ||
95 | ec_GFp_simple_dbl, | ||
96 | ec_GFp_simple_invert, | ||
97 | ec_GFp_simple_is_at_infinity, | ||
98 | ec_GFp_simple_is_on_curve, | ||
99 | ec_GFp_simple_cmp, | ||
100 | ec_GFp_simple_make_affine, | ||
101 | ec_GFp_simple_points_make_affine, | ||
102 | 0 /* mul */, | ||
103 | 0 /* precompute_mult */, | ||
104 | 0 /* have_precompute_mult */, | ||
105 | ec_GFp_simple_field_mul, | ||
106 | ec_GFp_simple_field_sqr, | ||
107 | 0 /* field_div */, | ||
108 | 0 /* field_encode */, | ||
109 | 0 /* field_decode */, | ||
110 | 0 /* field_set_to_one */ }; | ||
111 | |||
112 | return &ret; | ||
113 | } | ||
114 | |||
115 | |||
116 | /* Most method functions in this file are designed to work with | ||
117 | * non-trivial representations of field elements if necessary | ||
118 | * (see ecp_mont.c): while standard modular addition and subtraction | ||
119 | * are used, the field_mul and field_sqr methods will be used for | ||
120 | * multiplication, and field_encode and field_decode (if defined) | ||
121 | * will be used for converting between representations. | ||
122 | |||
123 | * Functions ec_GFp_simple_points_make_affine() and | ||
124 | * ec_GFp_simple_point_get_affine_coordinates() specifically assume | ||
125 | * that if a non-trivial representation is used, it is a Montgomery | ||
126 | * representation (i.e. 'encoding' means multiplying by some factor R). | ||
127 | */ | ||
128 | |||
129 | |||
130 | int ec_GFp_simple_group_init(EC_GROUP *group) | ||
131 | { | ||
132 | BN_init(&group->field); | ||
133 | BN_init(&group->a); | ||
134 | BN_init(&group->b); | ||
135 | group->a_is_minus3 = 0; | ||
136 | return 1; | ||
137 | } | ||
138 | |||
139 | |||
140 | void ec_GFp_simple_group_finish(EC_GROUP *group) | ||
141 | { | ||
142 | BN_free(&group->field); | ||
143 | BN_free(&group->a); | ||
144 | BN_free(&group->b); | ||
145 | } | ||
146 | |||
147 | |||
148 | void ec_GFp_simple_group_clear_finish(EC_GROUP *group) | ||
149 | { | ||
150 | BN_clear_free(&group->field); | ||
151 | BN_clear_free(&group->a); | ||
152 | BN_clear_free(&group->b); | ||
153 | } | ||
154 | |||
155 | |||
156 | int ec_GFp_simple_group_copy(EC_GROUP *dest, const EC_GROUP *src) | ||
157 | { | ||
158 | if (!BN_copy(&dest->field, &src->field)) return 0; | ||
159 | if (!BN_copy(&dest->a, &src->a)) return 0; | ||
160 | if (!BN_copy(&dest->b, &src->b)) return 0; | ||
161 | |||
162 | dest->a_is_minus3 = src->a_is_minus3; | ||
163 | |||
164 | return 1; | ||
165 | } | ||
166 | |||
167 | |||
168 | int ec_GFp_simple_group_set_curve(EC_GROUP *group, | ||
169 | const BIGNUM *p, const BIGNUM *a, const BIGNUM *b, BN_CTX *ctx) | ||
170 | { | ||
171 | int ret = 0; | ||
172 | BN_CTX *new_ctx = NULL; | ||
173 | BIGNUM *tmp_a; | ||
174 | |||
175 | /* p must be a prime > 3 */ | ||
176 | if (BN_num_bits(p) <= 2 || !BN_is_odd(p)) | ||
177 | { | ||
178 | ECerr(EC_F_EC_GFP_SIMPLE_GROUP_SET_CURVE, EC_R_INVALID_FIELD); | ||
179 | return 0; | ||
180 | } | ||
181 | |||
182 | if (ctx == NULL) | ||
183 | { | ||
184 | ctx = new_ctx = BN_CTX_new(); | ||
185 | if (ctx == NULL) | ||
186 | return 0; | ||
187 | } | ||
188 | |||
189 | BN_CTX_start(ctx); | ||
190 | tmp_a = BN_CTX_get(ctx); | ||
191 | if (tmp_a == NULL) goto err; | ||
192 | |||
193 | /* group->field */ | ||
194 | if (!BN_copy(&group->field, p)) goto err; | ||
195 | BN_set_negative(&group->field, 0); | ||
196 | |||
197 | /* group->a */ | ||
198 | if (!BN_nnmod(tmp_a, a, p, ctx)) goto err; | ||
199 | if (group->meth->field_encode) | ||
200 | { if (!group->meth->field_encode(group, &group->a, tmp_a, ctx)) goto err; } | ||
201 | else | ||
202 | if (!BN_copy(&group->a, tmp_a)) goto err; | ||
203 | |||
204 | /* group->b */ | ||
205 | if (!BN_nnmod(&group->b, b, p, ctx)) goto err; | ||
206 | if (group->meth->field_encode) | ||
207 | if (!group->meth->field_encode(group, &group->b, &group->b, ctx)) goto err; | ||
208 | |||
209 | /* group->a_is_minus3 */ | ||
210 | if (!BN_add_word(tmp_a, 3)) goto err; | ||
211 | group->a_is_minus3 = (0 == BN_cmp(tmp_a, &group->field)); | ||
212 | |||
213 | ret = 1; | ||
214 | |||
215 | err: | ||
216 | BN_CTX_end(ctx); | ||
217 | if (new_ctx != NULL) | ||
218 | BN_CTX_free(new_ctx); | ||
219 | return ret; | ||
220 | } | ||
221 | |||
222 | |||
223 | int ec_GFp_simple_group_get_curve(const EC_GROUP *group, BIGNUM *p, BIGNUM *a, BIGNUM *b, BN_CTX *ctx) | ||
224 | { | ||
225 | int ret = 0; | ||
226 | BN_CTX *new_ctx = NULL; | ||
227 | |||
228 | if (p != NULL) | ||
229 | { | ||
230 | if (!BN_copy(p, &group->field)) return 0; | ||
231 | } | ||
232 | |||
233 | if (a != NULL || b != NULL) | ||
234 | { | ||
235 | if (group->meth->field_decode) | ||
236 | { | ||
237 | if (ctx == NULL) | ||
238 | { | ||
239 | ctx = new_ctx = BN_CTX_new(); | ||
240 | if (ctx == NULL) | ||
241 | return 0; | ||
242 | } | ||
243 | if (a != NULL) | ||
244 | { | ||
245 | if (!group->meth->field_decode(group, a, &group->a, ctx)) goto err; | ||
246 | } | ||
247 | if (b != NULL) | ||
248 | { | ||
249 | if (!group->meth->field_decode(group, b, &group->b, ctx)) goto err; | ||
250 | } | ||
251 | } | ||
252 | else | ||
253 | { | ||
254 | if (a != NULL) | ||
255 | { | ||
256 | if (!BN_copy(a, &group->a)) goto err; | ||
257 | } | ||
258 | if (b != NULL) | ||
259 | { | ||
260 | if (!BN_copy(b, &group->b)) goto err; | ||
261 | } | ||
262 | } | ||
263 | } | ||
264 | |||
265 | ret = 1; | ||
266 | |||
267 | err: | ||
268 | if (new_ctx) | ||
269 | BN_CTX_free(new_ctx); | ||
270 | return ret; | ||
271 | } | ||
272 | |||
273 | |||
274 | int ec_GFp_simple_group_get_degree(const EC_GROUP *group) | ||
275 | { | ||
276 | return BN_num_bits(&group->field); | ||
277 | } | ||
278 | |||
279 | |||
280 | int ec_GFp_simple_group_check_discriminant(const EC_GROUP *group, BN_CTX *ctx) | ||
281 | { | ||
282 | int ret = 0; | ||
283 | BIGNUM *a,*b,*order,*tmp_1,*tmp_2; | ||
284 | const BIGNUM *p = &group->field; | ||
285 | BN_CTX *new_ctx = NULL; | ||
286 | |||
287 | if (ctx == NULL) | ||
288 | { | ||
289 | ctx = new_ctx = BN_CTX_new(); | ||
290 | if (ctx == NULL) | ||
291 | { | ||
292 | ECerr(EC_F_EC_GFP_SIMPLE_GROUP_CHECK_DISCRIMINANT, ERR_R_MALLOC_FAILURE); | ||
293 | goto err; | ||
294 | } | ||
295 | } | ||
296 | BN_CTX_start(ctx); | ||
297 | a = BN_CTX_get(ctx); | ||
298 | b = BN_CTX_get(ctx); | ||
299 | tmp_1 = BN_CTX_get(ctx); | ||
300 | tmp_2 = BN_CTX_get(ctx); | ||
301 | order = BN_CTX_get(ctx); | ||
302 | if (order == NULL) goto err; | ||
303 | |||
304 | if (group->meth->field_decode) | ||
305 | { | ||
306 | if (!group->meth->field_decode(group, a, &group->a, ctx)) goto err; | ||
307 | if (!group->meth->field_decode(group, b, &group->b, ctx)) goto err; | ||
308 | } | ||
309 | else | ||
310 | { | ||
311 | if (!BN_copy(a, &group->a)) goto err; | ||
312 | if (!BN_copy(b, &group->b)) goto err; | ||
313 | } | ||
314 | |||
315 | /* check the discriminant: | ||
316 | * y^2 = x^3 + a*x + b is an elliptic curve <=> 4*a^3 + 27*b^2 != 0 (mod p) | ||
317 | * 0 =< a, b < p */ | ||
318 | if (BN_is_zero(a)) | ||
319 | { | ||
320 | if (BN_is_zero(b)) goto err; | ||
321 | } | ||
322 | else if (!BN_is_zero(b)) | ||
323 | { | ||
324 | if (!BN_mod_sqr(tmp_1, a, p, ctx)) goto err; | ||
325 | if (!BN_mod_mul(tmp_2, tmp_1, a, p, ctx)) goto err; | ||
326 | if (!BN_lshift(tmp_1, tmp_2, 2)) goto err; | ||
327 | /* tmp_1 = 4*a^3 */ | ||
328 | |||
329 | if (!BN_mod_sqr(tmp_2, b, p, ctx)) goto err; | ||
330 | if (!BN_mul_word(tmp_2, 27)) goto err; | ||
331 | /* tmp_2 = 27*b^2 */ | ||
332 | |||
333 | if (!BN_mod_add(a, tmp_1, tmp_2, p, ctx)) goto err; | ||
334 | if (BN_is_zero(a)) goto err; | ||
335 | } | ||
336 | ret = 1; | ||
337 | |||
338 | err: | ||
339 | if (ctx != NULL) | ||
340 | BN_CTX_end(ctx); | ||
341 | if (new_ctx != NULL) | ||
342 | BN_CTX_free(new_ctx); | ||
343 | return ret; | ||
344 | } | ||
345 | |||
346 | |||
347 | int ec_GFp_simple_point_init(EC_POINT *point) | ||
348 | { | ||
349 | BN_init(&point->X); | ||
350 | BN_init(&point->Y); | ||
351 | BN_init(&point->Z); | ||
352 | point->Z_is_one = 0; | ||
353 | |||
354 | return 1; | ||
355 | } | ||
356 | |||
357 | |||
358 | void ec_GFp_simple_point_finish(EC_POINT *point) | ||
359 | { | ||
360 | BN_free(&point->X); | ||
361 | BN_free(&point->Y); | ||
362 | BN_free(&point->Z); | ||
363 | } | ||
364 | |||
365 | |||
366 | void ec_GFp_simple_point_clear_finish(EC_POINT *point) | ||
367 | { | ||
368 | BN_clear_free(&point->X); | ||
369 | BN_clear_free(&point->Y); | ||
370 | BN_clear_free(&point->Z); | ||
371 | point->Z_is_one = 0; | ||
372 | } | ||
373 | |||
374 | |||
375 | int ec_GFp_simple_point_copy(EC_POINT *dest, const EC_POINT *src) | ||
376 | { | ||
377 | if (!BN_copy(&dest->X, &src->X)) return 0; | ||
378 | if (!BN_copy(&dest->Y, &src->Y)) return 0; | ||
379 | if (!BN_copy(&dest->Z, &src->Z)) return 0; | ||
380 | dest->Z_is_one = src->Z_is_one; | ||
381 | |||
382 | return 1; | ||
383 | } | ||
384 | |||
385 | |||
386 | int ec_GFp_simple_point_set_to_infinity(const EC_GROUP *group, EC_POINT *point) | ||
387 | { | ||
388 | point->Z_is_one = 0; | ||
389 | BN_zero(&point->Z); | ||
390 | return 1; | ||
391 | } | ||
392 | |||
393 | |||
394 | int ec_GFp_simple_set_Jprojective_coordinates_GFp(const EC_GROUP *group, EC_POINT *point, | ||
395 | const BIGNUM *x, const BIGNUM *y, const BIGNUM *z, BN_CTX *ctx) | ||
396 | { | ||
397 | BN_CTX *new_ctx = NULL; | ||
398 | int ret = 0; | ||
399 | |||
400 | if (ctx == NULL) | ||
401 | { | ||
402 | ctx = new_ctx = BN_CTX_new(); | ||
403 | if (ctx == NULL) | ||
404 | return 0; | ||
405 | } | ||
406 | |||
407 | if (x != NULL) | ||
408 | { | ||
409 | if (!BN_nnmod(&point->X, x, &group->field, ctx)) goto err; | ||
410 | if (group->meth->field_encode) | ||
411 | { | ||
412 | if (!group->meth->field_encode(group, &point->X, &point->X, ctx)) goto err; | ||
413 | } | ||
414 | } | ||
415 | |||
416 | if (y != NULL) | ||
417 | { | ||
418 | if (!BN_nnmod(&point->Y, y, &group->field, ctx)) goto err; | ||
419 | if (group->meth->field_encode) | ||
420 | { | ||
421 | if (!group->meth->field_encode(group, &point->Y, &point->Y, ctx)) goto err; | ||
422 | } | ||
423 | } | ||
424 | |||
425 | if (z != NULL) | ||
426 | { | ||
427 | int Z_is_one; | ||
428 | |||
429 | if (!BN_nnmod(&point->Z, z, &group->field, ctx)) goto err; | ||
430 | Z_is_one = BN_is_one(&point->Z); | ||
431 | if (group->meth->field_encode) | ||
432 | { | ||
433 | if (Z_is_one && (group->meth->field_set_to_one != 0)) | ||
434 | { | ||
435 | if (!group->meth->field_set_to_one(group, &point->Z, ctx)) goto err; | ||
436 | } | ||
437 | else | ||
438 | { | ||
439 | if (!group->meth->field_encode(group, &point->Z, &point->Z, ctx)) goto err; | ||
440 | } | ||
441 | } | ||
442 | point->Z_is_one = Z_is_one; | ||
443 | } | ||
444 | |||
445 | ret = 1; | ||
446 | |||
447 | err: | ||
448 | if (new_ctx != NULL) | ||
449 | BN_CTX_free(new_ctx); | ||
450 | return ret; | ||
451 | } | ||
452 | |||
453 | |||
454 | int ec_GFp_simple_get_Jprojective_coordinates_GFp(const EC_GROUP *group, const EC_POINT *point, | ||
455 | BIGNUM *x, BIGNUM *y, BIGNUM *z, BN_CTX *ctx) | ||
456 | { | ||
457 | BN_CTX *new_ctx = NULL; | ||
458 | int ret = 0; | ||
459 | |||
460 | if (group->meth->field_decode != 0) | ||
461 | { | ||
462 | if (ctx == NULL) | ||
463 | { | ||
464 | ctx = new_ctx = BN_CTX_new(); | ||
465 | if (ctx == NULL) | ||
466 | return 0; | ||
467 | } | ||
468 | |||
469 | if (x != NULL) | ||
470 | { | ||
471 | if (!group->meth->field_decode(group, x, &point->X, ctx)) goto err; | ||
472 | } | ||
473 | if (y != NULL) | ||
474 | { | ||
475 | if (!group->meth->field_decode(group, y, &point->Y, ctx)) goto err; | ||
476 | } | ||
477 | if (z != NULL) | ||
478 | { | ||
479 | if (!group->meth->field_decode(group, z, &point->Z, ctx)) goto err; | ||
480 | } | ||
481 | } | ||
482 | else | ||
483 | { | ||
484 | if (x != NULL) | ||
485 | { | ||
486 | if (!BN_copy(x, &point->X)) goto err; | ||
487 | } | ||
488 | if (y != NULL) | ||
489 | { | ||
490 | if (!BN_copy(y, &point->Y)) goto err; | ||
491 | } | ||
492 | if (z != NULL) | ||
493 | { | ||
494 | if (!BN_copy(z, &point->Z)) goto err; | ||
495 | } | ||
496 | } | ||
497 | |||
498 | ret = 1; | ||
499 | |||
500 | err: | ||
501 | if (new_ctx != NULL) | ||
502 | BN_CTX_free(new_ctx); | ||
503 | return ret; | ||
504 | } | ||
505 | |||
506 | |||
507 | int ec_GFp_simple_point_set_affine_coordinates(const EC_GROUP *group, EC_POINT *point, | ||
508 | const BIGNUM *x, const BIGNUM *y, BN_CTX *ctx) | ||
509 | { | ||
510 | if (x == NULL || y == NULL) | ||
511 | { | ||
512 | /* unlike for projective coordinates, we do not tolerate this */ | ||
513 | ECerr(EC_F_EC_GFP_SIMPLE_POINT_SET_AFFINE_COORDINATES, ERR_R_PASSED_NULL_PARAMETER); | ||
514 | return 0; | ||
515 | } | ||
516 | |||
517 | return EC_POINT_set_Jprojective_coordinates_GFp(group, point, x, y, BN_value_one(), ctx); | ||
518 | } | ||
519 | |||
520 | |||
521 | int ec_GFp_simple_point_get_affine_coordinates(const EC_GROUP *group, const EC_POINT *point, | ||
522 | BIGNUM *x, BIGNUM *y, BN_CTX *ctx) | ||
523 | { | ||
524 | BN_CTX *new_ctx = NULL; | ||
525 | BIGNUM *Z, *Z_1, *Z_2, *Z_3; | ||
526 | const BIGNUM *Z_; | ||
527 | int ret = 0; | ||
528 | |||
529 | if (EC_POINT_is_at_infinity(group, point)) | ||
530 | { | ||
531 | ECerr(EC_F_EC_GFP_SIMPLE_POINT_GET_AFFINE_COORDINATES, EC_R_POINT_AT_INFINITY); | ||
532 | return 0; | ||
533 | } | ||
534 | |||
535 | if (ctx == NULL) | ||
536 | { | ||
537 | ctx = new_ctx = BN_CTX_new(); | ||
538 | if (ctx == NULL) | ||
539 | return 0; | ||
540 | } | ||
541 | |||
542 | BN_CTX_start(ctx); | ||
543 | Z = BN_CTX_get(ctx); | ||
544 | Z_1 = BN_CTX_get(ctx); | ||
545 | Z_2 = BN_CTX_get(ctx); | ||
546 | Z_3 = BN_CTX_get(ctx); | ||
547 | if (Z_3 == NULL) goto err; | ||
548 | |||
549 | /* transform (X, Y, Z) into (x, y) := (X/Z^2, Y/Z^3) */ | ||
550 | |||
551 | if (group->meth->field_decode) | ||
552 | { | ||
553 | if (!group->meth->field_decode(group, Z, &point->Z, ctx)) goto err; | ||
554 | Z_ = Z; | ||
555 | } | ||
556 | else | ||
557 | { | ||
558 | Z_ = &point->Z; | ||
559 | } | ||
560 | |||
561 | if (BN_is_one(Z_)) | ||
562 | { | ||
563 | if (group->meth->field_decode) | ||
564 | { | ||
565 | if (x != NULL) | ||
566 | { | ||
567 | if (!group->meth->field_decode(group, x, &point->X, ctx)) goto err; | ||
568 | } | ||
569 | if (y != NULL) | ||
570 | { | ||
571 | if (!group->meth->field_decode(group, y, &point->Y, ctx)) goto err; | ||
572 | } | ||
573 | } | ||
574 | else | ||
575 | { | ||
576 | if (x != NULL) | ||
577 | { | ||
578 | if (!BN_copy(x, &point->X)) goto err; | ||
579 | } | ||
580 | if (y != NULL) | ||
581 | { | ||
582 | if (!BN_copy(y, &point->Y)) goto err; | ||
583 | } | ||
584 | } | ||
585 | } | ||
586 | else | ||
587 | { | ||
588 | if (!BN_mod_inverse(Z_1, Z_, &group->field, ctx)) | ||
589 | { | ||
590 | ECerr(EC_F_EC_GFP_SIMPLE_POINT_GET_AFFINE_COORDINATES, ERR_R_BN_LIB); | ||
591 | goto err; | ||
592 | } | ||
593 | |||
594 | if (group->meth->field_encode == 0) | ||
595 | { | ||
596 | /* field_sqr works on standard representation */ | ||
597 | if (!group->meth->field_sqr(group, Z_2, Z_1, ctx)) goto err; | ||
598 | } | ||
599 | else | ||
600 | { | ||
601 | if (!BN_mod_sqr(Z_2, Z_1, &group->field, ctx)) goto err; | ||
602 | } | ||
603 | |||
604 | if (x != NULL) | ||
605 | { | ||
606 | /* in the Montgomery case, field_mul will cancel out Montgomery factor in X: */ | ||
607 | if (!group->meth->field_mul(group, x, &point->X, Z_2, ctx)) goto err; | ||
608 | } | ||
609 | |||
610 | if (y != NULL) | ||
611 | { | ||
612 | if (group->meth->field_encode == 0) | ||
613 | { | ||
614 | /* field_mul works on standard representation */ | ||
615 | if (!group->meth->field_mul(group, Z_3, Z_2, Z_1, ctx)) goto err; | ||
616 | } | ||
617 | else | ||
618 | { | ||
619 | if (!BN_mod_mul(Z_3, Z_2, Z_1, &group->field, ctx)) goto err; | ||
620 | } | ||
621 | |||
622 | /* in the Montgomery case, field_mul will cancel out Montgomery factor in Y: */ | ||
623 | if (!group->meth->field_mul(group, y, &point->Y, Z_3, ctx)) goto err; | ||
624 | } | ||
625 | } | ||
626 | |||
627 | ret = 1; | ||
628 | |||
629 | err: | ||
630 | BN_CTX_end(ctx); | ||
631 | if (new_ctx != NULL) | ||
632 | BN_CTX_free(new_ctx); | ||
633 | return ret; | ||
634 | } | ||
635 | |||
636 | |||
637 | int ec_GFp_simple_set_compressed_coordinates(const EC_GROUP *group, EC_POINT *point, | ||
638 | const BIGNUM *x_, int y_bit, BN_CTX *ctx) | ||
639 | { | ||
640 | BN_CTX *new_ctx = NULL; | ||
641 | BIGNUM *tmp1, *tmp2, *x, *y; | ||
642 | int ret = 0; | ||
643 | |||
644 | /* clear error queue*/ | ||
645 | ERR_clear_error(); | ||
646 | |||
647 | if (ctx == NULL) | ||
648 | { | ||
649 | ctx = new_ctx = BN_CTX_new(); | ||
650 | if (ctx == NULL) | ||
651 | return 0; | ||
652 | } | ||
653 | |||
654 | y_bit = (y_bit != 0); | ||
655 | |||
656 | BN_CTX_start(ctx); | ||
657 | tmp1 = BN_CTX_get(ctx); | ||
658 | tmp2 = BN_CTX_get(ctx); | ||
659 | x = BN_CTX_get(ctx); | ||
660 | y = BN_CTX_get(ctx); | ||
661 | if (y == NULL) goto err; | ||
662 | |||
663 | /* Recover y. We have a Weierstrass equation | ||
664 | * y^2 = x^3 + a*x + b, | ||
665 | * so y is one of the square roots of x^3 + a*x + b. | ||
666 | */ | ||
667 | |||
668 | /* tmp1 := x^3 */ | ||
669 | if (!BN_nnmod(x, x_, &group->field,ctx)) goto err; | ||
670 | if (group->meth->field_decode == 0) | ||
671 | { | ||
672 | /* field_{sqr,mul} work on standard representation */ | ||
673 | if (!group->meth->field_sqr(group, tmp2, x_, ctx)) goto err; | ||
674 | if (!group->meth->field_mul(group, tmp1, tmp2, x_, ctx)) goto err; | ||
675 | } | ||
676 | else | ||
677 | { | ||
678 | if (!BN_mod_sqr(tmp2, x_, &group->field, ctx)) goto err; | ||
679 | if (!BN_mod_mul(tmp1, tmp2, x_, &group->field, ctx)) goto err; | ||
680 | } | ||
681 | |||
682 | /* tmp1 := tmp1 + a*x */ | ||
683 | if (group->a_is_minus3) | ||
684 | { | ||
685 | if (!BN_mod_lshift1_quick(tmp2, x, &group->field)) goto err; | ||
686 | if (!BN_mod_add_quick(tmp2, tmp2, x, &group->field)) goto err; | ||
687 | if (!BN_mod_sub_quick(tmp1, tmp1, tmp2, &group->field)) goto err; | ||
688 | } | ||
689 | else | ||
690 | { | ||
691 | if (group->meth->field_decode) | ||
692 | { | ||
693 | if (!group->meth->field_decode(group, tmp2, &group->a, ctx)) goto err; | ||
694 | if (!BN_mod_mul(tmp2, tmp2, x, &group->field, ctx)) goto err; | ||
695 | } | ||
696 | else | ||
697 | { | ||
698 | /* field_mul works on standard representation */ | ||
699 | if (!group->meth->field_mul(group, tmp2, &group->a, x, ctx)) goto err; | ||
700 | } | ||
701 | |||
702 | if (!BN_mod_add_quick(tmp1, tmp1, tmp2, &group->field)) goto err; | ||
703 | } | ||
704 | |||
705 | /* tmp1 := tmp1 + b */ | ||
706 | if (group->meth->field_decode) | ||
707 | { | ||
708 | if (!group->meth->field_decode(group, tmp2, &group->b, ctx)) goto err; | ||
709 | if (!BN_mod_add_quick(tmp1, tmp1, tmp2, &group->field)) goto err; | ||
710 | } | ||
711 | else | ||
712 | { | ||
713 | if (!BN_mod_add_quick(tmp1, tmp1, &group->b, &group->field)) goto err; | ||
714 | } | ||
715 | |||
716 | if (!BN_mod_sqrt(y, tmp1, &group->field, ctx)) | ||
717 | { | ||
718 | unsigned long err = ERR_peek_last_error(); | ||
719 | |||
720 | if (ERR_GET_LIB(err) == ERR_LIB_BN && ERR_GET_REASON(err) == BN_R_NOT_A_SQUARE) | ||
721 | { | ||
722 | ERR_clear_error(); | ||
723 | ECerr(EC_F_EC_GFP_SIMPLE_SET_COMPRESSED_COORDINATES, EC_R_INVALID_COMPRESSED_POINT); | ||
724 | } | ||
725 | else | ||
726 | ECerr(EC_F_EC_GFP_SIMPLE_SET_COMPRESSED_COORDINATES, ERR_R_BN_LIB); | ||
727 | goto err; | ||
728 | } | ||
729 | |||
730 | if (y_bit != BN_is_odd(y)) | ||
731 | { | ||
732 | if (BN_is_zero(y)) | ||
733 | { | ||
734 | int kron; | ||
735 | |||
736 | kron = BN_kronecker(x, &group->field, ctx); | ||
737 | if (kron == -2) goto err; | ||
738 | |||
739 | if (kron == 1) | ||
740 | ECerr(EC_F_EC_GFP_SIMPLE_SET_COMPRESSED_COORDINATES, EC_R_INVALID_COMPRESSION_BIT); | ||
741 | else | ||
742 | /* BN_mod_sqrt() should have cought this error (not a square) */ | ||
743 | ECerr(EC_F_EC_GFP_SIMPLE_SET_COMPRESSED_COORDINATES, EC_R_INVALID_COMPRESSED_POINT); | ||
744 | goto err; | ||
745 | } | ||
746 | if (!BN_usub(y, &group->field, y)) goto err; | ||
747 | } | ||
748 | if (y_bit != BN_is_odd(y)) | ||
749 | { | ||
750 | ECerr(EC_F_EC_GFP_SIMPLE_SET_COMPRESSED_COORDINATES, ERR_R_INTERNAL_ERROR); | ||
751 | goto err; | ||
752 | } | ||
753 | |||
754 | if (!EC_POINT_set_affine_coordinates_GFp(group, point, x, y, ctx)) goto err; | ||
755 | |||
756 | ret = 1; | ||
757 | |||
758 | err: | ||
759 | BN_CTX_end(ctx); | ||
760 | if (new_ctx != NULL) | ||
761 | BN_CTX_free(new_ctx); | ||
762 | return ret; | ||
763 | } | ||
764 | |||
765 | |||
766 | size_t ec_GFp_simple_point2oct(const EC_GROUP *group, const EC_POINT *point, point_conversion_form_t form, | ||
767 | unsigned char *buf, size_t len, BN_CTX *ctx) | ||
768 | { | ||
769 | size_t ret; | ||
770 | BN_CTX *new_ctx = NULL; | ||
771 | int used_ctx = 0; | ||
772 | BIGNUM *x, *y; | ||
773 | size_t field_len, i, skip; | ||
774 | |||
775 | if ((form != POINT_CONVERSION_COMPRESSED) | ||
776 | && (form != POINT_CONVERSION_UNCOMPRESSED) | ||
777 | && (form != POINT_CONVERSION_HYBRID)) | ||
778 | { | ||
779 | ECerr(EC_F_EC_GFP_SIMPLE_POINT2OCT, EC_R_INVALID_FORM); | ||
780 | goto err; | ||
781 | } | ||
782 | |||
783 | if (EC_POINT_is_at_infinity(group, point)) | ||
784 | { | ||
785 | /* encodes to a single 0 octet */ | ||
786 | if (buf != NULL) | ||
787 | { | ||
788 | if (len < 1) | ||
789 | { | ||
790 | ECerr(EC_F_EC_GFP_SIMPLE_POINT2OCT, EC_R_BUFFER_TOO_SMALL); | ||
791 | return 0; | ||
792 | } | ||
793 | buf[0] = 0; | ||
794 | } | ||
795 | return 1; | ||
796 | } | ||
797 | |||
798 | |||
799 | /* ret := required output buffer length */ | ||
800 | field_len = BN_num_bytes(&group->field); | ||
801 | ret = (form == POINT_CONVERSION_COMPRESSED) ? 1 + field_len : 1 + 2*field_len; | ||
802 | |||
803 | /* if 'buf' is NULL, just return required length */ | ||
804 | if (buf != NULL) | ||
805 | { | ||
806 | if (len < ret) | ||
807 | { | ||
808 | ECerr(EC_F_EC_GFP_SIMPLE_POINT2OCT, EC_R_BUFFER_TOO_SMALL); | ||
809 | goto err; | ||
810 | } | ||
811 | |||
812 | if (ctx == NULL) | ||
813 | { | ||
814 | ctx = new_ctx = BN_CTX_new(); | ||
815 | if (ctx == NULL) | ||
816 | return 0; | ||
817 | } | ||
818 | |||
819 | BN_CTX_start(ctx); | ||
820 | used_ctx = 1; | ||
821 | x = BN_CTX_get(ctx); | ||
822 | y = BN_CTX_get(ctx); | ||
823 | if (y == NULL) goto err; | ||
824 | |||
825 | if (!EC_POINT_get_affine_coordinates_GFp(group, point, x, y, ctx)) goto err; | ||
826 | |||
827 | if ((form == POINT_CONVERSION_COMPRESSED || form == POINT_CONVERSION_HYBRID) && BN_is_odd(y)) | ||
828 | buf[0] = form + 1; | ||
829 | else | ||
830 | buf[0] = form; | ||
831 | |||
832 | i = 1; | ||
833 | |||
834 | skip = field_len - BN_num_bytes(x); | ||
835 | if (skip > field_len) | ||
836 | { | ||
837 | ECerr(EC_F_EC_GFP_SIMPLE_POINT2OCT, ERR_R_INTERNAL_ERROR); | ||
838 | goto err; | ||
839 | } | ||
840 | while (skip > 0) | ||
841 | { | ||
842 | buf[i++] = 0; | ||
843 | skip--; | ||
844 | } | ||
845 | skip = BN_bn2bin(x, buf + i); | ||
846 | i += skip; | ||
847 | if (i != 1 + field_len) | ||
848 | { | ||
849 | ECerr(EC_F_EC_GFP_SIMPLE_POINT2OCT, ERR_R_INTERNAL_ERROR); | ||
850 | goto err; | ||
851 | } | ||
852 | |||
853 | if (form == POINT_CONVERSION_UNCOMPRESSED || form == POINT_CONVERSION_HYBRID) | ||
854 | { | ||
855 | skip = field_len - BN_num_bytes(y); | ||
856 | if (skip > field_len) | ||
857 | { | ||
858 | ECerr(EC_F_EC_GFP_SIMPLE_POINT2OCT, ERR_R_INTERNAL_ERROR); | ||
859 | goto err; | ||
860 | } | ||
861 | while (skip > 0) | ||
862 | { | ||
863 | buf[i++] = 0; | ||
864 | skip--; | ||
865 | } | ||
866 | skip = BN_bn2bin(y, buf + i); | ||
867 | i += skip; | ||
868 | } | ||
869 | |||
870 | if (i != ret) | ||
871 | { | ||
872 | ECerr(EC_F_EC_GFP_SIMPLE_POINT2OCT, ERR_R_INTERNAL_ERROR); | ||
873 | goto err; | ||
874 | } | ||
875 | } | ||
876 | |||
877 | if (used_ctx) | ||
878 | BN_CTX_end(ctx); | ||
879 | if (new_ctx != NULL) | ||
880 | BN_CTX_free(new_ctx); | ||
881 | return ret; | ||
882 | |||
883 | err: | ||
884 | if (used_ctx) | ||
885 | BN_CTX_end(ctx); | ||
886 | if (new_ctx != NULL) | ||
887 | BN_CTX_free(new_ctx); | ||
888 | return 0; | ||
889 | } | ||
890 | |||
891 | |||
892 | int ec_GFp_simple_oct2point(const EC_GROUP *group, EC_POINT *point, | ||
893 | const unsigned char *buf, size_t len, BN_CTX *ctx) | ||
894 | { | ||
895 | point_conversion_form_t form; | ||
896 | int y_bit; | ||
897 | BN_CTX *new_ctx = NULL; | ||
898 | BIGNUM *x, *y; | ||
899 | size_t field_len, enc_len; | ||
900 | int ret = 0; | ||
901 | |||
902 | if (len == 0) | ||
903 | { | ||
904 | ECerr(EC_F_EC_GFP_SIMPLE_OCT2POINT, EC_R_BUFFER_TOO_SMALL); | ||
905 | return 0; | ||
906 | } | ||
907 | form = buf[0]; | ||
908 | y_bit = form & 1; | ||
909 | form = form & ~1U; | ||
910 | if ((form != 0) && (form != POINT_CONVERSION_COMPRESSED) | ||
911 | && (form != POINT_CONVERSION_UNCOMPRESSED) | ||
912 | && (form != POINT_CONVERSION_HYBRID)) | ||
913 | { | ||
914 | ECerr(EC_F_EC_GFP_SIMPLE_OCT2POINT, EC_R_INVALID_ENCODING); | ||
915 | return 0; | ||
916 | } | ||
917 | if ((form == 0 || form == POINT_CONVERSION_UNCOMPRESSED) && y_bit) | ||
918 | { | ||
919 | ECerr(EC_F_EC_GFP_SIMPLE_OCT2POINT, EC_R_INVALID_ENCODING); | ||
920 | return 0; | ||
921 | } | ||
922 | |||
923 | if (form == 0) | ||
924 | { | ||
925 | if (len != 1) | ||
926 | { | ||
927 | ECerr(EC_F_EC_GFP_SIMPLE_OCT2POINT, EC_R_INVALID_ENCODING); | ||
928 | return 0; | ||
929 | } | ||
930 | |||
931 | return EC_POINT_set_to_infinity(group, point); | ||
932 | } | ||
933 | |||
934 | field_len = BN_num_bytes(&group->field); | ||
935 | enc_len = (form == POINT_CONVERSION_COMPRESSED) ? 1 + field_len : 1 + 2*field_len; | ||
936 | |||
937 | if (len != enc_len) | ||
938 | { | ||
939 | ECerr(EC_F_EC_GFP_SIMPLE_OCT2POINT, EC_R_INVALID_ENCODING); | ||
940 | return 0; | ||
941 | } | ||
942 | |||
943 | if (ctx == NULL) | ||
944 | { | ||
945 | ctx = new_ctx = BN_CTX_new(); | ||
946 | if (ctx == NULL) | ||
947 | return 0; | ||
948 | } | ||
949 | |||
950 | BN_CTX_start(ctx); | ||
951 | x = BN_CTX_get(ctx); | ||
952 | y = BN_CTX_get(ctx); | ||
953 | if (y == NULL) goto err; | ||
954 | |||
955 | if (!BN_bin2bn(buf + 1, field_len, x)) goto err; | ||
956 | if (BN_ucmp(x, &group->field) >= 0) | ||
957 | { | ||
958 | ECerr(EC_F_EC_GFP_SIMPLE_OCT2POINT, EC_R_INVALID_ENCODING); | ||
959 | goto err; | ||
960 | } | ||
961 | |||
962 | if (form == POINT_CONVERSION_COMPRESSED) | ||
963 | { | ||
964 | if (!EC_POINT_set_compressed_coordinates_GFp(group, point, x, y_bit, ctx)) goto err; | ||
965 | } | ||
966 | else | ||
967 | { | ||
968 | if (!BN_bin2bn(buf + 1 + field_len, field_len, y)) goto err; | ||
969 | if (BN_ucmp(y, &group->field) >= 0) | ||
970 | { | ||
971 | ECerr(EC_F_EC_GFP_SIMPLE_OCT2POINT, EC_R_INVALID_ENCODING); | ||
972 | goto err; | ||
973 | } | ||
974 | if (form == POINT_CONVERSION_HYBRID) | ||
975 | { | ||
976 | if (y_bit != BN_is_odd(y)) | ||
977 | { | ||
978 | ECerr(EC_F_EC_GFP_SIMPLE_OCT2POINT, EC_R_INVALID_ENCODING); | ||
979 | goto err; | ||
980 | } | ||
981 | } | ||
982 | |||
983 | if (!EC_POINT_set_affine_coordinates_GFp(group, point, x, y, ctx)) goto err; | ||
984 | } | ||
985 | |||
986 | if (!EC_POINT_is_on_curve(group, point, ctx)) /* test required by X9.62 */ | ||
987 | { | ||
988 | ECerr(EC_F_EC_GFP_SIMPLE_OCT2POINT, EC_R_POINT_IS_NOT_ON_CURVE); | ||
989 | goto err; | ||
990 | } | ||
991 | |||
992 | ret = 1; | ||
993 | |||
994 | err: | ||
995 | BN_CTX_end(ctx); | ||
996 | if (new_ctx != NULL) | ||
997 | BN_CTX_free(new_ctx); | ||
998 | return ret; | ||
999 | } | ||
1000 | |||
1001 | |||
1002 | int ec_GFp_simple_add(const EC_GROUP *group, EC_POINT *r, const EC_POINT *a, const EC_POINT *b, BN_CTX *ctx) | ||
1003 | { | ||
1004 | int (*field_mul)(const EC_GROUP *, BIGNUM *, const BIGNUM *, const BIGNUM *, BN_CTX *); | ||
1005 | int (*field_sqr)(const EC_GROUP *, BIGNUM *, const BIGNUM *, BN_CTX *); | ||
1006 | const BIGNUM *p; | ||
1007 | BN_CTX *new_ctx = NULL; | ||
1008 | BIGNUM *n0, *n1, *n2, *n3, *n4, *n5, *n6; | ||
1009 | int ret = 0; | ||
1010 | |||
1011 | if (a == b) | ||
1012 | return EC_POINT_dbl(group, r, a, ctx); | ||
1013 | if (EC_POINT_is_at_infinity(group, a)) | ||
1014 | return EC_POINT_copy(r, b); | ||
1015 | if (EC_POINT_is_at_infinity(group, b)) | ||
1016 | return EC_POINT_copy(r, a); | ||
1017 | |||
1018 | field_mul = group->meth->field_mul; | ||
1019 | field_sqr = group->meth->field_sqr; | ||
1020 | p = &group->field; | ||
1021 | |||
1022 | if (ctx == NULL) | ||
1023 | { | ||
1024 | ctx = new_ctx = BN_CTX_new(); | ||
1025 | if (ctx == NULL) | ||
1026 | return 0; | ||
1027 | } | ||
1028 | |||
1029 | BN_CTX_start(ctx); | ||
1030 | n0 = BN_CTX_get(ctx); | ||
1031 | n1 = BN_CTX_get(ctx); | ||
1032 | n2 = BN_CTX_get(ctx); | ||
1033 | n3 = BN_CTX_get(ctx); | ||
1034 | n4 = BN_CTX_get(ctx); | ||
1035 | n5 = BN_CTX_get(ctx); | ||
1036 | n6 = BN_CTX_get(ctx); | ||
1037 | if (n6 == NULL) goto end; | ||
1038 | |||
1039 | /* Note that in this function we must not read components of 'a' or 'b' | ||
1040 | * once we have written the corresponding components of 'r'. | ||
1041 | * ('r' might be one of 'a' or 'b'.) | ||
1042 | */ | ||
1043 | |||
1044 | /* n1, n2 */ | ||
1045 | if (b->Z_is_one) | ||
1046 | { | ||
1047 | if (!BN_copy(n1, &a->X)) goto end; | ||
1048 | if (!BN_copy(n2, &a->Y)) goto end; | ||
1049 | /* n1 = X_a */ | ||
1050 | /* n2 = Y_a */ | ||
1051 | } | ||
1052 | else | ||
1053 | { | ||
1054 | if (!field_sqr(group, n0, &b->Z, ctx)) goto end; | ||
1055 | if (!field_mul(group, n1, &a->X, n0, ctx)) goto end; | ||
1056 | /* n1 = X_a * Z_b^2 */ | ||
1057 | |||
1058 | if (!field_mul(group, n0, n0, &b->Z, ctx)) goto end; | ||
1059 | if (!field_mul(group, n2, &a->Y, n0, ctx)) goto end; | ||
1060 | /* n2 = Y_a * Z_b^3 */ | ||
1061 | } | ||
1062 | |||
1063 | /* n3, n4 */ | ||
1064 | if (a->Z_is_one) | ||
1065 | { | ||
1066 | if (!BN_copy(n3, &b->X)) goto end; | ||
1067 | if (!BN_copy(n4, &b->Y)) goto end; | ||
1068 | /* n3 = X_b */ | ||
1069 | /* n4 = Y_b */ | ||
1070 | } | ||
1071 | else | ||
1072 | { | ||
1073 | if (!field_sqr(group, n0, &a->Z, ctx)) goto end; | ||
1074 | if (!field_mul(group, n3, &b->X, n0, ctx)) goto end; | ||
1075 | /* n3 = X_b * Z_a^2 */ | ||
1076 | |||
1077 | if (!field_mul(group, n0, n0, &a->Z, ctx)) goto end; | ||
1078 | if (!field_mul(group, n4, &b->Y, n0, ctx)) goto end; | ||
1079 | /* n4 = Y_b * Z_a^3 */ | ||
1080 | } | ||
1081 | |||
1082 | /* n5, n6 */ | ||
1083 | if (!BN_mod_sub_quick(n5, n1, n3, p)) goto end; | ||
1084 | if (!BN_mod_sub_quick(n6, n2, n4, p)) goto end; | ||
1085 | /* n5 = n1 - n3 */ | ||
1086 | /* n6 = n2 - n4 */ | ||
1087 | |||
1088 | if (BN_is_zero(n5)) | ||
1089 | { | ||
1090 | if (BN_is_zero(n6)) | ||
1091 | { | ||
1092 | /* a is the same point as b */ | ||
1093 | BN_CTX_end(ctx); | ||
1094 | ret = EC_POINT_dbl(group, r, a, ctx); | ||
1095 | ctx = NULL; | ||
1096 | goto end; | ||
1097 | } | ||
1098 | else | ||
1099 | { | ||
1100 | /* a is the inverse of b */ | ||
1101 | BN_zero(&r->Z); | ||
1102 | r->Z_is_one = 0; | ||
1103 | ret = 1; | ||
1104 | goto end; | ||
1105 | } | ||
1106 | } | ||
1107 | |||
1108 | /* 'n7', 'n8' */ | ||
1109 | if (!BN_mod_add_quick(n1, n1, n3, p)) goto end; | ||
1110 | if (!BN_mod_add_quick(n2, n2, n4, p)) goto end; | ||
1111 | /* 'n7' = n1 + n3 */ | ||
1112 | /* 'n8' = n2 + n4 */ | ||
1113 | |||
1114 | /* Z_r */ | ||
1115 | if (a->Z_is_one && b->Z_is_one) | ||
1116 | { | ||
1117 | if (!BN_copy(&r->Z, n5)) goto end; | ||
1118 | } | ||
1119 | else | ||
1120 | { | ||
1121 | if (a->Z_is_one) | ||
1122 | { if (!BN_copy(n0, &b->Z)) goto end; } | ||
1123 | else if (b->Z_is_one) | ||
1124 | { if (!BN_copy(n0, &a->Z)) goto end; } | ||
1125 | else | ||
1126 | { if (!field_mul(group, n0, &a->Z, &b->Z, ctx)) goto end; } | ||
1127 | if (!field_mul(group, &r->Z, n0, n5, ctx)) goto end; | ||
1128 | } | ||
1129 | r->Z_is_one = 0; | ||
1130 | /* Z_r = Z_a * Z_b * n5 */ | ||
1131 | |||
1132 | /* X_r */ | ||
1133 | if (!field_sqr(group, n0, n6, ctx)) goto end; | ||
1134 | if (!field_sqr(group, n4, n5, ctx)) goto end; | ||
1135 | if (!field_mul(group, n3, n1, n4, ctx)) goto end; | ||
1136 | if (!BN_mod_sub_quick(&r->X, n0, n3, p)) goto end; | ||
1137 | /* X_r = n6^2 - n5^2 * 'n7' */ | ||
1138 | |||
1139 | /* 'n9' */ | ||
1140 | if (!BN_mod_lshift1_quick(n0, &r->X, p)) goto end; | ||
1141 | if (!BN_mod_sub_quick(n0, n3, n0, p)) goto end; | ||
1142 | /* n9 = n5^2 * 'n7' - 2 * X_r */ | ||
1143 | |||
1144 | /* Y_r */ | ||
1145 | if (!field_mul(group, n0, n0, n6, ctx)) goto end; | ||
1146 | if (!field_mul(group, n5, n4, n5, ctx)) goto end; /* now n5 is n5^3 */ | ||
1147 | if (!field_mul(group, n1, n2, n5, ctx)) goto end; | ||
1148 | if (!BN_mod_sub_quick(n0, n0, n1, p)) goto end; | ||
1149 | if (BN_is_odd(n0)) | ||
1150 | if (!BN_add(n0, n0, p)) goto end; | ||
1151 | /* now 0 <= n0 < 2*p, and n0 is even */ | ||
1152 | if (!BN_rshift1(&r->Y, n0)) goto end; | ||
1153 | /* Y_r = (n6 * 'n9' - 'n8' * 'n5^3') / 2 */ | ||
1154 | |||
1155 | ret = 1; | ||
1156 | |||
1157 | end: | ||
1158 | if (ctx) /* otherwise we already called BN_CTX_end */ | ||
1159 | BN_CTX_end(ctx); | ||
1160 | if (new_ctx != NULL) | ||
1161 | BN_CTX_free(new_ctx); | ||
1162 | return ret; | ||
1163 | } | ||
1164 | |||
1165 | |||
1166 | int ec_GFp_simple_dbl(const EC_GROUP *group, EC_POINT *r, const EC_POINT *a, BN_CTX *ctx) | ||
1167 | { | ||
1168 | int (*field_mul)(const EC_GROUP *, BIGNUM *, const BIGNUM *, const BIGNUM *, BN_CTX *); | ||
1169 | int (*field_sqr)(const EC_GROUP *, BIGNUM *, const BIGNUM *, BN_CTX *); | ||
1170 | const BIGNUM *p; | ||
1171 | BN_CTX *new_ctx = NULL; | ||
1172 | BIGNUM *n0, *n1, *n2, *n3; | ||
1173 | int ret = 0; | ||
1174 | |||
1175 | if (EC_POINT_is_at_infinity(group, a)) | ||
1176 | { | ||
1177 | BN_zero(&r->Z); | ||
1178 | r->Z_is_one = 0; | ||
1179 | return 1; | ||
1180 | } | ||
1181 | |||
1182 | field_mul = group->meth->field_mul; | ||
1183 | field_sqr = group->meth->field_sqr; | ||
1184 | p = &group->field; | ||
1185 | |||
1186 | if (ctx == NULL) | ||
1187 | { | ||
1188 | ctx = new_ctx = BN_CTX_new(); | ||
1189 | if (ctx == NULL) | ||
1190 | return 0; | ||
1191 | } | ||
1192 | |||
1193 | BN_CTX_start(ctx); | ||
1194 | n0 = BN_CTX_get(ctx); | ||
1195 | n1 = BN_CTX_get(ctx); | ||
1196 | n2 = BN_CTX_get(ctx); | ||
1197 | n3 = BN_CTX_get(ctx); | ||
1198 | if (n3 == NULL) goto err; | ||
1199 | |||
1200 | /* Note that in this function we must not read components of 'a' | ||
1201 | * once we have written the corresponding components of 'r'. | ||
1202 | * ('r' might the same as 'a'.) | ||
1203 | */ | ||
1204 | |||
1205 | /* n1 */ | ||
1206 | if (a->Z_is_one) | ||
1207 | { | ||
1208 | if (!field_sqr(group, n0, &a->X, ctx)) goto err; | ||
1209 | if (!BN_mod_lshift1_quick(n1, n0, p)) goto err; | ||
1210 | if (!BN_mod_add_quick(n0, n0, n1, p)) goto err; | ||
1211 | if (!BN_mod_add_quick(n1, n0, &group->a, p)) goto err; | ||
1212 | /* n1 = 3 * X_a^2 + a_curve */ | ||
1213 | } | ||
1214 | else if (group->a_is_minus3) | ||
1215 | { | ||
1216 | if (!field_sqr(group, n1, &a->Z, ctx)) goto err; | ||
1217 | if (!BN_mod_add_quick(n0, &a->X, n1, p)) goto err; | ||
1218 | if (!BN_mod_sub_quick(n2, &a->X, n1, p)) goto err; | ||
1219 | if (!field_mul(group, n1, n0, n2, ctx)) goto err; | ||
1220 | if (!BN_mod_lshift1_quick(n0, n1, p)) goto err; | ||
1221 | if (!BN_mod_add_quick(n1, n0, n1, p)) goto err; | ||
1222 | /* n1 = 3 * (X_a + Z_a^2) * (X_a - Z_a^2) | ||
1223 | * = 3 * X_a^2 - 3 * Z_a^4 */ | ||
1224 | } | ||
1225 | else | ||
1226 | { | ||
1227 | if (!field_sqr(group, n0, &a->X, ctx)) goto err; | ||
1228 | if (!BN_mod_lshift1_quick(n1, n0, p)) goto err; | ||
1229 | if (!BN_mod_add_quick(n0, n0, n1, p)) goto err; | ||
1230 | if (!field_sqr(group, n1, &a->Z, ctx)) goto err; | ||
1231 | if (!field_sqr(group, n1, n1, ctx)) goto err; | ||
1232 | if (!field_mul(group, n1, n1, &group->a, ctx)) goto err; | ||
1233 | if (!BN_mod_add_quick(n1, n1, n0, p)) goto err; | ||
1234 | /* n1 = 3 * X_a^2 + a_curve * Z_a^4 */ | ||
1235 | } | ||
1236 | |||
1237 | /* Z_r */ | ||
1238 | if (a->Z_is_one) | ||
1239 | { | ||
1240 | if (!BN_copy(n0, &a->Y)) goto err; | ||
1241 | } | ||
1242 | else | ||
1243 | { | ||
1244 | if (!field_mul(group, n0, &a->Y, &a->Z, ctx)) goto err; | ||
1245 | } | ||
1246 | if (!BN_mod_lshift1_quick(&r->Z, n0, p)) goto err; | ||
1247 | r->Z_is_one = 0; | ||
1248 | /* Z_r = 2 * Y_a * Z_a */ | ||
1249 | |||
1250 | /* n2 */ | ||
1251 | if (!field_sqr(group, n3, &a->Y, ctx)) goto err; | ||
1252 | if (!field_mul(group, n2, &a->X, n3, ctx)) goto err; | ||
1253 | if (!BN_mod_lshift_quick(n2, n2, 2, p)) goto err; | ||
1254 | /* n2 = 4 * X_a * Y_a^2 */ | ||
1255 | |||
1256 | /* X_r */ | ||
1257 | if (!BN_mod_lshift1_quick(n0, n2, p)) goto err; | ||
1258 | if (!field_sqr(group, &r->X, n1, ctx)) goto err; | ||
1259 | if (!BN_mod_sub_quick(&r->X, &r->X, n0, p)) goto err; | ||
1260 | /* X_r = n1^2 - 2 * n2 */ | ||
1261 | |||
1262 | /* n3 */ | ||
1263 | if (!field_sqr(group, n0, n3, ctx)) goto err; | ||
1264 | if (!BN_mod_lshift_quick(n3, n0, 3, p)) goto err; | ||
1265 | /* n3 = 8 * Y_a^4 */ | ||
1266 | |||
1267 | /* Y_r */ | ||
1268 | if (!BN_mod_sub_quick(n0, n2, &r->X, p)) goto err; | ||
1269 | if (!field_mul(group, n0, n1, n0, ctx)) goto err; | ||
1270 | if (!BN_mod_sub_quick(&r->Y, n0, n3, p)) goto err; | ||
1271 | /* Y_r = n1 * (n2 - X_r) - n3 */ | ||
1272 | |||
1273 | ret = 1; | ||
1274 | |||
1275 | err: | ||
1276 | BN_CTX_end(ctx); | ||
1277 | if (new_ctx != NULL) | ||
1278 | BN_CTX_free(new_ctx); | ||
1279 | return ret; | ||
1280 | } | ||
1281 | |||
1282 | |||
1283 | int ec_GFp_simple_invert(const EC_GROUP *group, EC_POINT *point, BN_CTX *ctx) | ||
1284 | { | ||
1285 | if (EC_POINT_is_at_infinity(group, point) || BN_is_zero(&point->Y)) | ||
1286 | /* point is its own inverse */ | ||
1287 | return 1; | ||
1288 | |||
1289 | return BN_usub(&point->Y, &group->field, &point->Y); | ||
1290 | } | ||
1291 | |||
1292 | |||
1293 | int ec_GFp_simple_is_at_infinity(const EC_GROUP *group, const EC_POINT *point) | ||
1294 | { | ||
1295 | return BN_is_zero(&point->Z); | ||
1296 | } | ||
1297 | |||
1298 | |||
1299 | int ec_GFp_simple_is_on_curve(const EC_GROUP *group, const EC_POINT *point, BN_CTX *ctx) | ||
1300 | { | ||
1301 | int (*field_mul)(const EC_GROUP *, BIGNUM *, const BIGNUM *, const BIGNUM *, BN_CTX *); | ||
1302 | int (*field_sqr)(const EC_GROUP *, BIGNUM *, const BIGNUM *, BN_CTX *); | ||
1303 | const BIGNUM *p; | ||
1304 | BN_CTX *new_ctx = NULL; | ||
1305 | BIGNUM *rh, *tmp, *Z4, *Z6; | ||
1306 | int ret = -1; | ||
1307 | |||
1308 | if (EC_POINT_is_at_infinity(group, point)) | ||
1309 | return 1; | ||
1310 | |||
1311 | field_mul = group->meth->field_mul; | ||
1312 | field_sqr = group->meth->field_sqr; | ||
1313 | p = &group->field; | ||
1314 | |||
1315 | if (ctx == NULL) | ||
1316 | { | ||
1317 | ctx = new_ctx = BN_CTX_new(); | ||
1318 | if (ctx == NULL) | ||
1319 | return -1; | ||
1320 | } | ||
1321 | |||
1322 | BN_CTX_start(ctx); | ||
1323 | rh = BN_CTX_get(ctx); | ||
1324 | tmp = BN_CTX_get(ctx); | ||
1325 | Z4 = BN_CTX_get(ctx); | ||
1326 | Z6 = BN_CTX_get(ctx); | ||
1327 | if (Z6 == NULL) goto err; | ||
1328 | |||
1329 | /* We have a curve defined by a Weierstrass equation | ||
1330 | * y^2 = x^3 + a*x + b. | ||
1331 | * The point to consider is given in Jacobian projective coordinates | ||
1332 | * where (X, Y, Z) represents (x, y) = (X/Z^2, Y/Z^3). | ||
1333 | * Substituting this and multiplying by Z^6 transforms the above equation into | ||
1334 | * Y^2 = X^3 + a*X*Z^4 + b*Z^6. | ||
1335 | * To test this, we add up the right-hand side in 'rh'. | ||
1336 | */ | ||
1337 | |||
1338 | /* rh := X^2 */ | ||
1339 | if (!field_sqr(group, rh, &point->X, ctx)) goto err; | ||
1340 | |||
1341 | if (!point->Z_is_one) | ||
1342 | { | ||
1343 | if (!field_sqr(group, tmp, &point->Z, ctx)) goto err; | ||
1344 | if (!field_sqr(group, Z4, tmp, ctx)) goto err; | ||
1345 | if (!field_mul(group, Z6, Z4, tmp, ctx)) goto err; | ||
1346 | |||
1347 | /* rh := (rh + a*Z^4)*X */ | ||
1348 | if (group->a_is_minus3) | ||
1349 | { | ||
1350 | if (!BN_mod_lshift1_quick(tmp, Z4, p)) goto err; | ||
1351 | if (!BN_mod_add_quick(tmp, tmp, Z4, p)) goto err; | ||
1352 | if (!BN_mod_sub_quick(rh, rh, tmp, p)) goto err; | ||
1353 | if (!field_mul(group, rh, rh, &point->X, ctx)) goto err; | ||
1354 | } | ||
1355 | else | ||
1356 | { | ||
1357 | if (!field_mul(group, tmp, Z4, &group->a, ctx)) goto err; | ||
1358 | if (!BN_mod_add_quick(rh, rh, tmp, p)) goto err; | ||
1359 | if (!field_mul(group, rh, rh, &point->X, ctx)) goto err; | ||
1360 | } | ||
1361 | |||
1362 | /* rh := rh + b*Z^6 */ | ||
1363 | if (!field_mul(group, tmp, &group->b, Z6, ctx)) goto err; | ||
1364 | if (!BN_mod_add_quick(rh, rh, tmp, p)) goto err; | ||
1365 | } | ||
1366 | else | ||
1367 | { | ||
1368 | /* point->Z_is_one */ | ||
1369 | |||
1370 | /* rh := (rh + a)*X */ | ||
1371 | if (!BN_mod_add_quick(rh, rh, &group->a, p)) goto err; | ||
1372 | if (!field_mul(group, rh, rh, &point->X, ctx)) goto err; | ||
1373 | /* rh := rh + b */ | ||
1374 | if (!BN_mod_add_quick(rh, rh, &group->b, p)) goto err; | ||
1375 | } | ||
1376 | |||
1377 | /* 'lh' := Y^2 */ | ||
1378 | if (!field_sqr(group, tmp, &point->Y, ctx)) goto err; | ||
1379 | |||
1380 | ret = (0 == BN_ucmp(tmp, rh)); | ||
1381 | |||
1382 | err: | ||
1383 | BN_CTX_end(ctx); | ||
1384 | if (new_ctx != NULL) | ||
1385 | BN_CTX_free(new_ctx); | ||
1386 | return ret; | ||
1387 | } | ||
1388 | |||
1389 | |||
1390 | int ec_GFp_simple_cmp(const EC_GROUP *group, const EC_POINT *a, const EC_POINT *b, BN_CTX *ctx) | ||
1391 | { | ||
1392 | /* return values: | ||
1393 | * -1 error | ||
1394 | * 0 equal (in affine coordinates) | ||
1395 | * 1 not equal | ||
1396 | */ | ||
1397 | |||
1398 | int (*field_mul)(const EC_GROUP *, BIGNUM *, const BIGNUM *, const BIGNUM *, BN_CTX *); | ||
1399 | int (*field_sqr)(const EC_GROUP *, BIGNUM *, const BIGNUM *, BN_CTX *); | ||
1400 | BN_CTX *new_ctx = NULL; | ||
1401 | BIGNUM *tmp1, *tmp2, *Za23, *Zb23; | ||
1402 | const BIGNUM *tmp1_, *tmp2_; | ||
1403 | int ret = -1; | ||
1404 | |||
1405 | if (EC_POINT_is_at_infinity(group, a)) | ||
1406 | { | ||
1407 | return EC_POINT_is_at_infinity(group, b) ? 0 : 1; | ||
1408 | } | ||
1409 | |||
1410 | if (a->Z_is_one && b->Z_is_one) | ||
1411 | { | ||
1412 | return ((BN_cmp(&a->X, &b->X) == 0) && BN_cmp(&a->Y, &b->Y) == 0) ? 0 : 1; | ||
1413 | } | ||
1414 | |||
1415 | field_mul = group->meth->field_mul; | ||
1416 | field_sqr = group->meth->field_sqr; | ||
1417 | |||
1418 | if (ctx == NULL) | ||
1419 | { | ||
1420 | ctx = new_ctx = BN_CTX_new(); | ||
1421 | if (ctx == NULL) | ||
1422 | return -1; | ||
1423 | } | ||
1424 | |||
1425 | BN_CTX_start(ctx); | ||
1426 | tmp1 = BN_CTX_get(ctx); | ||
1427 | tmp2 = BN_CTX_get(ctx); | ||
1428 | Za23 = BN_CTX_get(ctx); | ||
1429 | Zb23 = BN_CTX_get(ctx); | ||
1430 | if (Zb23 == NULL) goto end; | ||
1431 | |||
1432 | /* We have to decide whether | ||
1433 | * (X_a/Z_a^2, Y_a/Z_a^3) = (X_b/Z_b^2, Y_b/Z_b^3), | ||
1434 | * or equivalently, whether | ||
1435 | * (X_a*Z_b^2, Y_a*Z_b^3) = (X_b*Z_a^2, Y_b*Z_a^3). | ||
1436 | */ | ||
1437 | |||
1438 | if (!b->Z_is_one) | ||
1439 | { | ||
1440 | if (!field_sqr(group, Zb23, &b->Z, ctx)) goto end; | ||
1441 | if (!field_mul(group, tmp1, &a->X, Zb23, ctx)) goto end; | ||
1442 | tmp1_ = tmp1; | ||
1443 | } | ||
1444 | else | ||
1445 | tmp1_ = &a->X; | ||
1446 | if (!a->Z_is_one) | ||
1447 | { | ||
1448 | if (!field_sqr(group, Za23, &a->Z, ctx)) goto end; | ||
1449 | if (!field_mul(group, tmp2, &b->X, Za23, ctx)) goto end; | ||
1450 | tmp2_ = tmp2; | ||
1451 | } | ||
1452 | else | ||
1453 | tmp2_ = &b->X; | ||
1454 | |||
1455 | /* compare X_a*Z_b^2 with X_b*Z_a^2 */ | ||
1456 | if (BN_cmp(tmp1_, tmp2_) != 0) | ||
1457 | { | ||
1458 | ret = 1; /* points differ */ | ||
1459 | goto end; | ||
1460 | } | ||
1461 | |||
1462 | |||
1463 | if (!b->Z_is_one) | ||
1464 | { | ||
1465 | if (!field_mul(group, Zb23, Zb23, &b->Z, ctx)) goto end; | ||
1466 | if (!field_mul(group, tmp1, &a->Y, Zb23, ctx)) goto end; | ||
1467 | /* tmp1_ = tmp1 */ | ||
1468 | } | ||
1469 | else | ||
1470 | tmp1_ = &a->Y; | ||
1471 | if (!a->Z_is_one) | ||
1472 | { | ||
1473 | if (!field_mul(group, Za23, Za23, &a->Z, ctx)) goto end; | ||
1474 | if (!field_mul(group, tmp2, &b->Y, Za23, ctx)) goto end; | ||
1475 | /* tmp2_ = tmp2 */ | ||
1476 | } | ||
1477 | else | ||
1478 | tmp2_ = &b->Y; | ||
1479 | |||
1480 | /* compare Y_a*Z_b^3 with Y_b*Z_a^3 */ | ||
1481 | if (BN_cmp(tmp1_, tmp2_) != 0) | ||
1482 | { | ||
1483 | ret = 1; /* points differ */ | ||
1484 | goto end; | ||
1485 | } | ||
1486 | |||
1487 | /* points are equal */ | ||
1488 | ret = 0; | ||
1489 | |||
1490 | end: | ||
1491 | BN_CTX_end(ctx); | ||
1492 | if (new_ctx != NULL) | ||
1493 | BN_CTX_free(new_ctx); | ||
1494 | return ret; | ||
1495 | } | ||
1496 | |||
1497 | |||
1498 | int ec_GFp_simple_make_affine(const EC_GROUP *group, EC_POINT *point, BN_CTX *ctx) | ||
1499 | { | ||
1500 | BN_CTX *new_ctx = NULL; | ||
1501 | BIGNUM *x, *y; | ||
1502 | int ret = 0; | ||
1503 | |||
1504 | if (point->Z_is_one || EC_POINT_is_at_infinity(group, point)) | ||
1505 | return 1; | ||
1506 | |||
1507 | if (ctx == NULL) | ||
1508 | { | ||
1509 | ctx = new_ctx = BN_CTX_new(); | ||
1510 | if (ctx == NULL) | ||
1511 | return 0; | ||
1512 | } | ||
1513 | |||
1514 | BN_CTX_start(ctx); | ||
1515 | x = BN_CTX_get(ctx); | ||
1516 | y = BN_CTX_get(ctx); | ||
1517 | if (y == NULL) goto err; | ||
1518 | |||
1519 | if (!EC_POINT_get_affine_coordinates_GFp(group, point, x, y, ctx)) goto err; | ||
1520 | if (!EC_POINT_set_affine_coordinates_GFp(group, point, x, y, ctx)) goto err; | ||
1521 | if (!point->Z_is_one) | ||
1522 | { | ||
1523 | ECerr(EC_F_EC_GFP_SIMPLE_MAKE_AFFINE, ERR_R_INTERNAL_ERROR); | ||
1524 | goto err; | ||
1525 | } | ||
1526 | |||
1527 | ret = 1; | ||
1528 | |||
1529 | err: | ||
1530 | BN_CTX_end(ctx); | ||
1531 | if (new_ctx != NULL) | ||
1532 | BN_CTX_free(new_ctx); | ||
1533 | return ret; | ||
1534 | } | ||
1535 | |||
1536 | |||
1537 | int ec_GFp_simple_points_make_affine(const EC_GROUP *group, size_t num, EC_POINT *points[], BN_CTX *ctx) | ||
1538 | { | ||
1539 | BN_CTX *new_ctx = NULL; | ||
1540 | BIGNUM *tmp0, *tmp1; | ||
1541 | size_t pow2 = 0; | ||
1542 | BIGNUM **heap = NULL; | ||
1543 | size_t i; | ||
1544 | int ret = 0; | ||
1545 | |||
1546 | if (num == 0) | ||
1547 | return 1; | ||
1548 | |||
1549 | if (ctx == NULL) | ||
1550 | { | ||
1551 | ctx = new_ctx = BN_CTX_new(); | ||
1552 | if (ctx == NULL) | ||
1553 | return 0; | ||
1554 | } | ||
1555 | |||
1556 | BN_CTX_start(ctx); | ||
1557 | tmp0 = BN_CTX_get(ctx); | ||
1558 | tmp1 = BN_CTX_get(ctx); | ||
1559 | if (tmp0 == NULL || tmp1 == NULL) goto err; | ||
1560 | |||
1561 | /* Before converting the individual points, compute inverses of all Z values. | ||
1562 | * Modular inversion is rather slow, but luckily we can do with a single | ||
1563 | * explicit inversion, plus about 3 multiplications per input value. | ||
1564 | */ | ||
1565 | |||
1566 | pow2 = 1; | ||
1567 | while (num > pow2) | ||
1568 | pow2 <<= 1; | ||
1569 | /* Now pow2 is the smallest power of 2 satifsying pow2 >= num. | ||
1570 | * We need twice that. */ | ||
1571 | pow2 <<= 1; | ||
1572 | |||
1573 | heap = OPENSSL_malloc(pow2 * sizeof heap[0]); | ||
1574 | if (heap == NULL) goto err; | ||
1575 | |||
1576 | /* The array is used as a binary tree, exactly as in heapsort: | ||
1577 | * | ||
1578 | * heap[1] | ||
1579 | * heap[2] heap[3] | ||
1580 | * heap[4] heap[5] heap[6] heap[7] | ||
1581 | * heap[8]heap[9] heap[10]heap[11] heap[12]heap[13] heap[14] heap[15] | ||
1582 | * | ||
1583 | * We put the Z's in the last line; | ||
1584 | * then we set each other node to the product of its two child-nodes (where | ||
1585 | * empty or 0 entries are treated as ones); | ||
1586 | * then we invert heap[1]; | ||
1587 | * then we invert each other node by replacing it by the product of its | ||
1588 | * parent (after inversion) and its sibling (before inversion). | ||
1589 | */ | ||
1590 | heap[0] = NULL; | ||
1591 | for (i = pow2/2 - 1; i > 0; i--) | ||
1592 | heap[i] = NULL; | ||
1593 | for (i = 0; i < num; i++) | ||
1594 | heap[pow2/2 + i] = &points[i]->Z; | ||
1595 | for (i = pow2/2 + num; i < pow2; i++) | ||
1596 | heap[i] = NULL; | ||
1597 | |||
1598 | /* set each node to the product of its children */ | ||
1599 | for (i = pow2/2 - 1; i > 0; i--) | ||
1600 | { | ||
1601 | heap[i] = BN_new(); | ||
1602 | if (heap[i] == NULL) goto err; | ||
1603 | |||
1604 | if (heap[2*i] != NULL) | ||
1605 | { | ||
1606 | if ((heap[2*i + 1] == NULL) || BN_is_zero(heap[2*i + 1])) | ||
1607 | { | ||
1608 | if (!BN_copy(heap[i], heap[2*i])) goto err; | ||
1609 | } | ||
1610 | else | ||
1611 | { | ||
1612 | if (BN_is_zero(heap[2*i])) | ||
1613 | { | ||
1614 | if (!BN_copy(heap[i], heap[2*i + 1])) goto err; | ||
1615 | } | ||
1616 | else | ||
1617 | { | ||
1618 | if (!group->meth->field_mul(group, heap[i], | ||
1619 | heap[2*i], heap[2*i + 1], ctx)) goto err; | ||
1620 | } | ||
1621 | } | ||
1622 | } | ||
1623 | } | ||
1624 | |||
1625 | /* invert heap[1] */ | ||
1626 | if (!BN_is_zero(heap[1])) | ||
1627 | { | ||
1628 | if (!BN_mod_inverse(heap[1], heap[1], &group->field, ctx)) | ||
1629 | { | ||
1630 | ECerr(EC_F_EC_GFP_SIMPLE_POINTS_MAKE_AFFINE, ERR_R_BN_LIB); | ||
1631 | goto err; | ||
1632 | } | ||
1633 | } | ||
1634 | if (group->meth->field_encode != 0) | ||
1635 | { | ||
1636 | /* in the Montgomery case, we just turned R*H (representing H) | ||
1637 | * into 1/(R*H), but we need R*(1/H) (representing 1/H); | ||
1638 | * i.e. we have need to multiply by the Montgomery factor twice */ | ||
1639 | if (!group->meth->field_encode(group, heap[1], heap[1], ctx)) goto err; | ||
1640 | if (!group->meth->field_encode(group, heap[1], heap[1], ctx)) goto err; | ||
1641 | } | ||
1642 | |||
1643 | /* set other heap[i]'s to their inverses */ | ||
1644 | for (i = 2; i < pow2/2 + num; i += 2) | ||
1645 | { | ||
1646 | /* i is even */ | ||
1647 | if ((heap[i + 1] != NULL) && !BN_is_zero(heap[i + 1])) | ||
1648 | { | ||
1649 | if (!group->meth->field_mul(group, tmp0, heap[i/2], heap[i + 1], ctx)) goto err; | ||
1650 | if (!group->meth->field_mul(group, tmp1, heap[i/2], heap[i], ctx)) goto err; | ||
1651 | if (!BN_copy(heap[i], tmp0)) goto err; | ||
1652 | if (!BN_copy(heap[i + 1], tmp1)) goto err; | ||
1653 | } | ||
1654 | else | ||
1655 | { | ||
1656 | if (!BN_copy(heap[i], heap[i/2])) goto err; | ||
1657 | } | ||
1658 | } | ||
1659 | |||
1660 | /* we have replaced all non-zero Z's by their inverses, now fix up all the points */ | ||
1661 | for (i = 0; i < num; i++) | ||
1662 | { | ||
1663 | EC_POINT *p = points[i]; | ||
1664 | |||
1665 | if (!BN_is_zero(&p->Z)) | ||
1666 | { | ||
1667 | /* turn (X, Y, 1/Z) into (X/Z^2, Y/Z^3, 1) */ | ||
1668 | |||
1669 | if (!group->meth->field_sqr(group, tmp1, &p->Z, ctx)) goto err; | ||
1670 | if (!group->meth->field_mul(group, &p->X, &p->X, tmp1, ctx)) goto err; | ||
1671 | |||
1672 | if (!group->meth->field_mul(group, tmp1, tmp1, &p->Z, ctx)) goto err; | ||
1673 | if (!group->meth->field_mul(group, &p->Y, &p->Y, tmp1, ctx)) goto err; | ||
1674 | |||
1675 | if (group->meth->field_set_to_one != 0) | ||
1676 | { | ||
1677 | if (!group->meth->field_set_to_one(group, &p->Z, ctx)) goto err; | ||
1678 | } | ||
1679 | else | ||
1680 | { | ||
1681 | if (!BN_one(&p->Z)) goto err; | ||
1682 | } | ||
1683 | p->Z_is_one = 1; | ||
1684 | } | ||
1685 | } | ||
1686 | |||
1687 | ret = 1; | ||
1688 | |||
1689 | err: | ||
1690 | BN_CTX_end(ctx); | ||
1691 | if (new_ctx != NULL) | ||
1692 | BN_CTX_free(new_ctx); | ||
1693 | if (heap != NULL) | ||
1694 | { | ||
1695 | /* heap[pow2/2] .. heap[pow2-1] have not been allocated locally! */ | ||
1696 | for (i = pow2/2 - 1; i > 0; i--) | ||
1697 | { | ||
1698 | if (heap[i] != NULL) | ||
1699 | BN_clear_free(heap[i]); | ||
1700 | } | ||
1701 | OPENSSL_free(heap); | ||
1702 | } | ||
1703 | return ret; | ||
1704 | } | ||
1705 | |||
1706 | |||
1707 | int ec_GFp_simple_field_mul(const EC_GROUP *group, BIGNUM *r, const BIGNUM *a, const BIGNUM *b, BN_CTX *ctx) | ||
1708 | { | ||
1709 | return BN_mod_mul(r, a, b, &group->field, ctx); | ||
1710 | } | ||
1711 | |||
1712 | |||
1713 | int ec_GFp_simple_field_sqr(const EC_GROUP *group, BIGNUM *r, const BIGNUM *a, BN_CTX *ctx) | ||
1714 | { | ||
1715 | return BN_mod_sqr(r, a, &group->field, ctx); | ||
1716 | } | ||
diff --git a/src/lib/libcrypto/ecdh/ecdh.h b/src/lib/libcrypto/ecdh/ecdh.h deleted file mode 100644 index b4b58ee65b..0000000000 --- a/src/lib/libcrypto/ecdh/ecdh.h +++ /dev/null | |||
@@ -1,123 +0,0 @@ | |||
1 | /* crypto/ecdh/ecdh.h */ | ||
2 | /* ==================================================================== | ||
3 | * Copyright 2002 Sun Microsystems, Inc. ALL RIGHTS RESERVED. | ||
4 | * | ||
5 | * The Elliptic Curve Public-Key Crypto Library (ECC Code) included | ||
6 | * herein is developed by SUN MICROSYSTEMS, INC., and is contributed | ||
7 | * to the OpenSSL project. | ||
8 | * | ||
9 | * The ECC Code is licensed pursuant to the OpenSSL open source | ||
10 | * license provided below. | ||
11 | * | ||
12 | * The ECDH software is originally written by Douglas Stebila of | ||
13 | * Sun Microsystems Laboratories. | ||
14 | * | ||
15 | */ | ||
16 | /* ==================================================================== | ||
17 | * Copyright (c) 2000-2002 The OpenSSL Project. All rights reserved. | ||
18 | * | ||
19 | * Redistribution and use in source and binary forms, with or without | ||
20 | * modification, are permitted provided that the following conditions | ||
21 | * are met: | ||
22 | * | ||
23 | * 1. Redistributions of source code must retain the above copyright | ||
24 | * notice, this list of conditions and the following disclaimer. | ||
25 | * | ||
26 | * 2. Redistributions in binary form must reproduce the above copyright | ||
27 | * notice, this list of conditions and the following disclaimer in | ||
28 | * the documentation and/or other materials provided with the | ||
29 | * distribution. | ||
30 | * | ||
31 | * 3. All advertising materials mentioning features or use of this | ||
32 | * software must display the following acknowledgment: | ||
33 | * "This product includes software developed by the OpenSSL Project | ||
34 | * for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)" | ||
35 | * | ||
36 | * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to | ||
37 | * endorse or promote products derived from this software without | ||
38 | * prior written permission. For written permission, please contact | ||
39 | * licensing@OpenSSL.org. | ||
40 | * | ||
41 | * 5. Products derived from this software may not be called "OpenSSL" | ||
42 | * nor may "OpenSSL" appear in their names without prior written | ||
43 | * permission of the OpenSSL Project. | ||
44 | * | ||
45 | * 6. Redistributions of any form whatsoever must retain the following | ||
46 | * acknowledgment: | ||
47 | * "This product includes software developed by the OpenSSL Project | ||
48 | * for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)" | ||
49 | * | ||
50 | * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY | ||
51 | * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | ||
52 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR | ||
53 | * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR | ||
54 | * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, | ||
55 | * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT | ||
56 | * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; | ||
57 | * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | ||
58 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, | ||
59 | * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) | ||
60 | * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | ||
61 | * OF THE POSSIBILITY OF SUCH DAMAGE. | ||
62 | * ==================================================================== | ||
63 | * | ||
64 | * This product includes cryptographic software written by Eric Young | ||
65 | * (eay@cryptsoft.com). This product includes software written by Tim | ||
66 | * Hudson (tjh@cryptsoft.com). | ||
67 | * | ||
68 | */ | ||
69 | #ifndef HEADER_ECDH_H | ||
70 | #define HEADER_ECDH_H | ||
71 | |||
72 | #include <openssl/opensslconf.h> | ||
73 | |||
74 | #ifdef OPENSSL_NO_ECDH | ||
75 | #error ECDH is disabled. | ||
76 | #endif | ||
77 | |||
78 | #include <openssl/ec.h> | ||
79 | #include <openssl/ossl_typ.h> | ||
80 | #ifndef OPENSSL_NO_DEPRECATED | ||
81 | #include <openssl/bn.h> | ||
82 | #endif | ||
83 | |||
84 | #ifdef __cplusplus | ||
85 | extern "C" { | ||
86 | #endif | ||
87 | |||
88 | const ECDH_METHOD *ECDH_OpenSSL(void); | ||
89 | |||
90 | void ECDH_set_default_method(const ECDH_METHOD *); | ||
91 | const ECDH_METHOD *ECDH_get_default_method(void); | ||
92 | int ECDH_set_method(EC_KEY *, const ECDH_METHOD *); | ||
93 | |||
94 | int ECDH_compute_key(void *out, size_t outlen, const EC_POINT *pub_key, EC_KEY *ecdh, | ||
95 | void *(*KDF)(const void *in, size_t inlen, void *out, size_t *outlen)); | ||
96 | |||
97 | int ECDH_get_ex_new_index(long argl, void *argp, CRYPTO_EX_new | ||
98 | *new_func, CRYPTO_EX_dup *dup_func, CRYPTO_EX_free *free_func); | ||
99 | int ECDH_set_ex_data(EC_KEY *d, int idx, void *arg); | ||
100 | void *ECDH_get_ex_data(EC_KEY *d, int idx); | ||
101 | |||
102 | |||
103 | /* BEGIN ERROR CODES */ | ||
104 | /* The following lines are auto generated by the script mkerr.pl. Any changes | ||
105 | * made after this point may be overwritten when the script is next run. | ||
106 | */ | ||
107 | void ERR_load_ECDH_strings(void); | ||
108 | |||
109 | /* Error codes for the ECDH functions. */ | ||
110 | |||
111 | /* Function codes. */ | ||
112 | #define ECDH_F_ECDH_COMPUTE_KEY 100 | ||
113 | #define ECDH_F_ECDH_DATA_NEW_METHOD 101 | ||
114 | |||
115 | /* Reason codes. */ | ||
116 | #define ECDH_R_KDF_FAILED 102 | ||
117 | #define ECDH_R_NO_PRIVATE_VALUE 100 | ||
118 | #define ECDH_R_POINT_ARITHMETIC_FAILURE 101 | ||
119 | |||
120 | #ifdef __cplusplus | ||
121 | } | ||
122 | #endif | ||
123 | #endif | ||
diff --git a/src/lib/libcrypto/ecdh/ech_err.c b/src/lib/libcrypto/ecdh/ech_err.c deleted file mode 100644 index 4d2ede75bd..0000000000 --- a/src/lib/libcrypto/ecdh/ech_err.c +++ /dev/null | |||
@@ -1,98 +0,0 @@ | |||
1 | /* crypto/ecdh/ech_err.c */ | ||
2 | /* ==================================================================== | ||
3 | * Copyright (c) 1999-2005 The OpenSSL Project. All rights reserved. | ||
4 | * | ||
5 | * Redistribution and use in source and binary forms, with or without | ||
6 | * modification, are permitted provided that the following conditions | ||
7 | * are met: | ||
8 | * | ||
9 | * 1. Redistributions of source code must retain the above copyright | ||
10 | * notice, this list of conditions and the following disclaimer. | ||
11 | * | ||
12 | * 2. Redistributions in binary form must reproduce the above copyright | ||
13 | * notice, this list of conditions and the following disclaimer in | ||
14 | * the documentation and/or other materials provided with the | ||
15 | * distribution. | ||
16 | * | ||
17 | * 3. All advertising materials mentioning features or use of this | ||
18 | * software must display the following acknowledgment: | ||
19 | * "This product includes software developed by the OpenSSL Project | ||
20 | * for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)" | ||
21 | * | ||
22 | * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to | ||
23 | * endorse or promote products derived from this software without | ||
24 | * prior written permission. For written permission, please contact | ||
25 | * openssl-core@OpenSSL.org. | ||
26 | * | ||
27 | * 5. Products derived from this software may not be called "OpenSSL" | ||
28 | * nor may "OpenSSL" appear in their names without prior written | ||
29 | * permission of the OpenSSL Project. | ||
30 | * | ||
31 | * 6. Redistributions of any form whatsoever must retain the following | ||
32 | * acknowledgment: | ||
33 | * "This product includes software developed by the OpenSSL Project | ||
34 | * for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)" | ||
35 | * | ||
36 | * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY | ||
37 | * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | ||
38 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR | ||
39 | * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR | ||
40 | * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, | ||
41 | * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT | ||
42 | * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; | ||
43 | * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | ||
44 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, | ||
45 | * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) | ||
46 | * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | ||
47 | * OF THE POSSIBILITY OF SUCH DAMAGE. | ||
48 | * ==================================================================== | ||
49 | * | ||
50 | * This product includes cryptographic software written by Eric Young | ||
51 | * (eay@cryptsoft.com). This product includes software written by Tim | ||
52 | * Hudson (tjh@cryptsoft.com). | ||
53 | * | ||
54 | */ | ||
55 | |||
56 | /* NOTE: this file was auto generated by the mkerr.pl script: any changes | ||
57 | * made to it will be overwritten when the script next updates this file, | ||
58 | * only reason strings will be preserved. | ||
59 | */ | ||
60 | |||
61 | #include <stdio.h> | ||
62 | #include <openssl/err.h> | ||
63 | #include <openssl/ecdh.h> | ||
64 | |||
65 | /* BEGIN ERROR CODES */ | ||
66 | #ifndef OPENSSL_NO_ERR | ||
67 | |||
68 | #define ERR_FUNC(func) ERR_PACK(ERR_LIB_ECDH,func,0) | ||
69 | #define ERR_REASON(reason) ERR_PACK(ERR_LIB_ECDH,0,reason) | ||
70 | |||
71 | static ERR_STRING_DATA ECDH_str_functs[]= | ||
72 | { | ||
73 | {ERR_FUNC(ECDH_F_ECDH_COMPUTE_KEY), "ECDH_compute_key"}, | ||
74 | {ERR_FUNC(ECDH_F_ECDH_DATA_NEW_METHOD), "ECDH_DATA_NEW_METHOD"}, | ||
75 | {0,NULL} | ||
76 | }; | ||
77 | |||
78 | static ERR_STRING_DATA ECDH_str_reasons[]= | ||
79 | { | ||
80 | {ERR_REASON(ECDH_R_KDF_FAILED) ,"KDF failed"}, | ||
81 | {ERR_REASON(ECDH_R_NO_PRIVATE_VALUE) ,"no private value"}, | ||
82 | {ERR_REASON(ECDH_R_POINT_ARITHMETIC_FAILURE),"point arithmetic failure"}, | ||
83 | {0,NULL} | ||
84 | }; | ||
85 | |||
86 | #endif | ||
87 | |||
88 | void ERR_load_ECDH_strings(void) | ||
89 | { | ||
90 | #ifndef OPENSSL_NO_ERR | ||
91 | |||
92 | if (ERR_func_error_string(ECDH_str_functs[0].error) == NULL) | ||
93 | { | ||
94 | ERR_load_strings(0,ECDH_str_functs); | ||
95 | ERR_load_strings(0,ECDH_str_reasons); | ||
96 | } | ||
97 | #endif | ||
98 | } | ||
diff --git a/src/lib/libcrypto/ecdh/ech_key.c b/src/lib/libcrypto/ecdh/ech_key.c deleted file mode 100644 index f44da9298b..0000000000 --- a/src/lib/libcrypto/ecdh/ech_key.c +++ /dev/null | |||
@@ -1,83 +0,0 @@ | |||
1 | /* crypto/ecdh/ecdh_key.c */ | ||
2 | /* ==================================================================== | ||
3 | * Copyright 2002 Sun Microsystems, Inc. ALL RIGHTS RESERVED. | ||
4 | * | ||
5 | * The Elliptic Curve Public-Key Crypto Library (ECC Code) included | ||
6 | * herein is developed by SUN MICROSYSTEMS, INC., and is contributed | ||
7 | * to the OpenSSL project. | ||
8 | * | ||
9 | * The ECC Code is licensed pursuant to the OpenSSL open source | ||
10 | * license provided below. | ||
11 | * | ||
12 | * The ECDH software is originally written by Douglas Stebila of | ||
13 | * Sun Microsystems Laboratories. | ||
14 | * | ||
15 | */ | ||
16 | /* ==================================================================== | ||
17 | * Copyright (c) 1998-2003 The OpenSSL Project. All rights reserved. | ||
18 | * | ||
19 | * Redistribution and use in source and binary forms, with or without | ||
20 | * modification, are permitted provided that the following conditions | ||
21 | * are met: | ||
22 | * | ||
23 | * 1. Redistributions of source code must retain the above copyright | ||
24 | * notice, this list of conditions and the following disclaimer. | ||
25 | * | ||
26 | * 2. Redistributions in binary form must reproduce the above copyright | ||
27 | * notice, this list of conditions and the following disclaimer in | ||
28 | * the documentation and/or other materials provided with the | ||
29 | * distribution. | ||
30 | * | ||
31 | * 3. All advertising materials mentioning features or use of this | ||
32 | * software must display the following acknowledgment: | ||
33 | * "This product includes software developed by the OpenSSL Project | ||
34 | * for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)" | ||
35 | * | ||
36 | * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to | ||
37 | * endorse or promote products derived from this software without | ||
38 | * prior written permission. For written permission, please contact | ||
39 | * openssl-core@OpenSSL.org. | ||
40 | * | ||
41 | * 5. Products derived from this software may not be called "OpenSSL" | ||
42 | * nor may "OpenSSL" appear in their names without prior written | ||
43 | * permission of the OpenSSL Project. | ||
44 | * | ||
45 | * 6. Redistributions of any form whatsoever must retain the following | ||
46 | * acknowledgment: | ||
47 | * "This product includes software developed by the OpenSSL Project | ||
48 | * for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)" | ||
49 | * | ||
50 | * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY | ||
51 | * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | ||
52 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR | ||
53 | * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR | ||
54 | * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, | ||
55 | * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT | ||
56 | * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; | ||
57 | * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | ||
58 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, | ||
59 | * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) | ||
60 | * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | ||
61 | * OF THE POSSIBILITY OF SUCH DAMAGE. | ||
62 | * ==================================================================== | ||
63 | * | ||
64 | * This product includes cryptographic software written by Eric Young | ||
65 | * (eay@cryptsoft.com). This product includes software written by Tim | ||
66 | * Hudson (tjh@cryptsoft.com). | ||
67 | * | ||
68 | */ | ||
69 | |||
70 | #include "ech_locl.h" | ||
71 | #ifndef OPENSSL_NO_ENGINE | ||
72 | #include <openssl/engine.h> | ||
73 | #endif | ||
74 | |||
75 | int ECDH_compute_key(void *out, size_t outlen, const EC_POINT *pub_key, | ||
76 | EC_KEY *eckey, | ||
77 | void *(*KDF)(const void *in, size_t inlen, void *out, size_t *outlen)) | ||
78 | { | ||
79 | ECDH_DATA *ecdh = ecdh_check(eckey); | ||
80 | if (ecdh == NULL) | ||
81 | return 0; | ||
82 | return ecdh->meth->compute_key(out, outlen, pub_key, eckey, KDF); | ||
83 | } | ||
diff --git a/src/lib/libcrypto/ecdh/ech_lib.c b/src/lib/libcrypto/ecdh/ech_lib.c deleted file mode 100644 index e89b1d4772..0000000000 --- a/src/lib/libcrypto/ecdh/ech_lib.c +++ /dev/null | |||
@@ -1,247 +0,0 @@ | |||
1 | /* crypto/ecdh/ech_lib.c */ | ||
2 | /* ==================================================================== | ||
3 | * Copyright 2002 Sun Microsystems, Inc. ALL RIGHTS RESERVED. | ||
4 | * | ||
5 | * The Elliptic Curve Public-Key Crypto Library (ECC Code) included | ||
6 | * herein is developed by SUN MICROSYSTEMS, INC., and is contributed | ||
7 | * to the OpenSSL project. | ||
8 | * | ||
9 | * The ECC Code is licensed pursuant to the OpenSSL open source | ||
10 | * license provided below. | ||
11 | * | ||
12 | * The ECDH software is originally written by Douglas Stebila of | ||
13 | * Sun Microsystems Laboratories. | ||
14 | * | ||
15 | */ | ||
16 | /* ==================================================================== | ||
17 | * Copyright (c) 1998-2003 The OpenSSL Project. All rights reserved. | ||
18 | * | ||
19 | * Redistribution and use in source and binary forms, with or without | ||
20 | * modification, are permitted provided that the following conditions | ||
21 | * are met: | ||
22 | * | ||
23 | * 1. Redistributions of source code must retain the above copyright | ||
24 | * notice, this list of conditions and the following disclaimer. | ||
25 | * | ||
26 | * 2. Redistributions in binary form must reproduce the above copyright | ||
27 | * notice, this list of conditions and the following disclaimer in | ||
28 | * the documentation and/or other materials provided with the | ||
29 | * distribution. | ||
30 | * | ||
31 | * 3. All advertising materials mentioning features or use of this | ||
32 | * software must display the following acknowledgment: | ||
33 | * "This product includes software developed by the OpenSSL Project | ||
34 | * for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)" | ||
35 | * | ||
36 | * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to | ||
37 | * endorse or promote products derived from this software without | ||
38 | * prior written permission. For written permission, please contact | ||
39 | * openssl-core@OpenSSL.org. | ||
40 | * | ||
41 | * 5. Products derived from this software may not be called "OpenSSL" | ||
42 | * nor may "OpenSSL" appear in their names without prior written | ||
43 | * permission of the OpenSSL Project. | ||
44 | * | ||
45 | * 6. Redistributions of any form whatsoever must retain the following | ||
46 | * acknowledgment: | ||
47 | * "This product includes software developed by the OpenSSL Project | ||
48 | * for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)" | ||
49 | * | ||
50 | * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY | ||
51 | * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | ||
52 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR | ||
53 | * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR | ||
54 | * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, | ||
55 | * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT | ||
56 | * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; | ||
57 | * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | ||
58 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, | ||
59 | * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) | ||
60 | * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | ||
61 | * OF THE POSSIBILITY OF SUCH DAMAGE. | ||
62 | * ==================================================================== | ||
63 | * | ||
64 | * This product includes cryptographic software written by Eric Young | ||
65 | * (eay@cryptsoft.com). This product includes software written by Tim | ||
66 | * Hudson (tjh@cryptsoft.com). | ||
67 | * | ||
68 | */ | ||
69 | |||
70 | #include "ech_locl.h" | ||
71 | #include <string.h> | ||
72 | #ifndef OPENSSL_NO_ENGINE | ||
73 | #include <openssl/engine.h> | ||
74 | #endif | ||
75 | #include <openssl/err.h> | ||
76 | |||
77 | const char ECDH_version[]="ECDH" OPENSSL_VERSION_PTEXT; | ||
78 | |||
79 | static const ECDH_METHOD *default_ECDH_method = NULL; | ||
80 | |||
81 | static void *ecdh_data_new(void); | ||
82 | static void *ecdh_data_dup(void *); | ||
83 | static void ecdh_data_free(void *); | ||
84 | |||
85 | void ECDH_set_default_method(const ECDH_METHOD *meth) | ||
86 | { | ||
87 | default_ECDH_method = meth; | ||
88 | } | ||
89 | |||
90 | const ECDH_METHOD *ECDH_get_default_method(void) | ||
91 | { | ||
92 | if(!default_ECDH_method) | ||
93 | default_ECDH_method = ECDH_OpenSSL(); | ||
94 | return default_ECDH_method; | ||
95 | } | ||
96 | |||
97 | int ECDH_set_method(EC_KEY *eckey, const ECDH_METHOD *meth) | ||
98 | { | ||
99 | const ECDH_METHOD *mtmp; | ||
100 | ECDH_DATA *ecdh; | ||
101 | |||
102 | ecdh = ecdh_check(eckey); | ||
103 | |||
104 | if (ecdh == NULL) | ||
105 | return 0; | ||
106 | |||
107 | mtmp = ecdh->meth; | ||
108 | #if 0 | ||
109 | if (mtmp->finish) | ||
110 | mtmp->finish(eckey); | ||
111 | #endif | ||
112 | #ifndef OPENSSL_NO_ENGINE | ||
113 | if (ecdh->engine) | ||
114 | { | ||
115 | ENGINE_finish(ecdh->engine); | ||
116 | ecdh->engine = NULL; | ||
117 | } | ||
118 | #endif | ||
119 | ecdh->meth = meth; | ||
120 | #if 0 | ||
121 | if (meth->init) | ||
122 | meth->init(eckey); | ||
123 | #endif | ||
124 | return 1; | ||
125 | } | ||
126 | |||
127 | static ECDH_DATA *ECDH_DATA_new_method(ENGINE *engine) | ||
128 | { | ||
129 | ECDH_DATA *ret; | ||
130 | |||
131 | ret=(ECDH_DATA *)OPENSSL_malloc(sizeof(ECDH_DATA)); | ||
132 | if (ret == NULL) | ||
133 | { | ||
134 | ECDHerr(ECDH_F_ECDH_DATA_NEW_METHOD, ERR_R_MALLOC_FAILURE); | ||
135 | return(NULL); | ||
136 | } | ||
137 | |||
138 | ret->init = NULL; | ||
139 | |||
140 | ret->meth = ECDH_get_default_method(); | ||
141 | ret->engine = engine; | ||
142 | #ifndef OPENSSL_NO_ENGINE | ||
143 | if (!ret->engine) | ||
144 | ret->engine = ENGINE_get_default_ECDH(); | ||
145 | if (ret->engine) | ||
146 | { | ||
147 | ret->meth = ENGINE_get_ECDH(ret->engine); | ||
148 | if (!ret->meth) | ||
149 | { | ||
150 | ECDHerr(ECDH_F_ECDH_DATA_NEW_METHOD, ERR_R_ENGINE_LIB); | ||
151 | ENGINE_finish(ret->engine); | ||
152 | OPENSSL_free(ret); | ||
153 | return NULL; | ||
154 | } | ||
155 | } | ||
156 | #endif | ||
157 | |||
158 | ret->flags = ret->meth->flags; | ||
159 | CRYPTO_new_ex_data(CRYPTO_EX_INDEX_ECDH, ret, &ret->ex_data); | ||
160 | #if 0 | ||
161 | if ((ret->meth->init != NULL) && !ret->meth->init(ret)) | ||
162 | { | ||
163 | CRYPTO_free_ex_data(CRYPTO_EX_INDEX_ECDH, ret, &ret->ex_data); | ||
164 | OPENSSL_free(ret); | ||
165 | ret=NULL; | ||
166 | } | ||
167 | #endif | ||
168 | return(ret); | ||
169 | } | ||
170 | |||
171 | static void *ecdh_data_new(void) | ||
172 | { | ||
173 | return (void *)ECDH_DATA_new_method(NULL); | ||
174 | } | ||
175 | |||
176 | static void *ecdh_data_dup(void *data) | ||
177 | { | ||
178 | ECDH_DATA *r = (ECDH_DATA *)data; | ||
179 | |||
180 | /* XXX: dummy operation */ | ||
181 | if (r == NULL) | ||
182 | return NULL; | ||
183 | |||
184 | return (void *)ecdh_data_new(); | ||
185 | } | ||
186 | |||
187 | void ecdh_data_free(void *data) | ||
188 | { | ||
189 | ECDH_DATA *r = (ECDH_DATA *)data; | ||
190 | |||
191 | #ifndef OPENSSL_NO_ENGINE | ||
192 | if (r->engine) | ||
193 | ENGINE_finish(r->engine); | ||
194 | #endif | ||
195 | |||
196 | CRYPTO_free_ex_data(CRYPTO_EX_INDEX_ECDH, r, &r->ex_data); | ||
197 | |||
198 | OPENSSL_cleanse((void *)r, sizeof(ECDH_DATA)); | ||
199 | |||
200 | OPENSSL_free(r); | ||
201 | } | ||
202 | |||
203 | ECDH_DATA *ecdh_check(EC_KEY *key) | ||
204 | { | ||
205 | ECDH_DATA *ecdh_data; | ||
206 | |||
207 | void *data = EC_KEY_get_key_method_data(key, ecdh_data_dup, | ||
208 | ecdh_data_free, ecdh_data_free); | ||
209 | if (data == NULL) | ||
210 | { | ||
211 | ecdh_data = (ECDH_DATA *)ecdh_data_new(); | ||
212 | if (ecdh_data == NULL) | ||
213 | return NULL; | ||
214 | EC_KEY_insert_key_method_data(key, (void *)ecdh_data, | ||
215 | ecdh_data_dup, ecdh_data_free, ecdh_data_free); | ||
216 | } | ||
217 | else | ||
218 | ecdh_data = (ECDH_DATA *)data; | ||
219 | |||
220 | |||
221 | return ecdh_data; | ||
222 | } | ||
223 | |||
224 | int ECDH_get_ex_new_index(long argl, void *argp, CRYPTO_EX_new *new_func, | ||
225 | CRYPTO_EX_dup *dup_func, CRYPTO_EX_free *free_func) | ||
226 | { | ||
227 | return CRYPTO_get_ex_new_index(CRYPTO_EX_INDEX_ECDH, argl, argp, | ||
228 | new_func, dup_func, free_func); | ||
229 | } | ||
230 | |||
231 | int ECDH_set_ex_data(EC_KEY *d, int idx, void *arg) | ||
232 | { | ||
233 | ECDH_DATA *ecdh; | ||
234 | ecdh = ecdh_check(d); | ||
235 | if (ecdh == NULL) | ||
236 | return 0; | ||
237 | return(CRYPTO_set_ex_data(&ecdh->ex_data,idx,arg)); | ||
238 | } | ||
239 | |||
240 | void *ECDH_get_ex_data(EC_KEY *d, int idx) | ||
241 | { | ||
242 | ECDH_DATA *ecdh; | ||
243 | ecdh = ecdh_check(d); | ||
244 | if (ecdh == NULL) | ||
245 | return NULL; | ||
246 | return(CRYPTO_get_ex_data(&ecdh->ex_data,idx)); | ||
247 | } | ||
diff --git a/src/lib/libcrypto/ecdh/ech_locl.h b/src/lib/libcrypto/ecdh/ech_locl.h deleted file mode 100644 index f658526a7e..0000000000 --- a/src/lib/libcrypto/ecdh/ech_locl.h +++ /dev/null | |||
@@ -1,94 +0,0 @@ | |||
1 | /* crypto/ecdh/ech_locl.h */ | ||
2 | /* ==================================================================== | ||
3 | * Copyright (c) 2000-2005 The OpenSSL Project. All rights reserved. | ||
4 | * | ||
5 | * Redistribution and use in source and binary forms, with or without | ||
6 | * modification, are permitted provided that the following conditions | ||
7 | * are met: | ||
8 | * | ||
9 | * 1. Redistributions of source code must retain the above copyright | ||
10 | * notice, this list of conditions and the following disclaimer. | ||
11 | * | ||
12 | * 2. Redistributions in binary form must reproduce the above copyright | ||
13 | * notice, this list of conditions and the following disclaimer in | ||
14 | * the documentation and/or other materials provided with the | ||
15 | * distribution. | ||
16 | * | ||
17 | * 3. All advertising materials mentioning features or use of this | ||
18 | * software must display the following acknowledgment: | ||
19 | * "This product includes software developed by the OpenSSL Project | ||
20 | * for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)" | ||
21 | * | ||
22 | * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to | ||
23 | * endorse or promote products derived from this software without | ||
24 | * prior written permission. For written permission, please contact | ||
25 | * licensing@OpenSSL.org. | ||
26 | * | ||
27 | * 5. Products derived from this software may not be called "OpenSSL" | ||
28 | * nor may "OpenSSL" appear in their names without prior written | ||
29 | * permission of the OpenSSL Project. | ||
30 | * | ||
31 | * 6. Redistributions of any form whatsoever must retain the following | ||
32 | * acknowledgment: | ||
33 | * "This product includes software developed by the OpenSSL Project | ||
34 | * for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)" | ||
35 | * | ||
36 | * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY | ||
37 | * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | ||
38 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR | ||
39 | * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR | ||
40 | * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, | ||
41 | * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT | ||
42 | * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; | ||
43 | * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | ||
44 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, | ||
45 | * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) | ||
46 | * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | ||
47 | * OF THE POSSIBILITY OF SUCH DAMAGE. | ||
48 | * ==================================================================== | ||
49 | * | ||
50 | * This product includes cryptographic software written by Eric Young | ||
51 | * (eay@cryptsoft.com). This product includes software written by Tim | ||
52 | * Hudson (tjh@cryptsoft.com). | ||
53 | * | ||
54 | */ | ||
55 | |||
56 | #ifndef HEADER_ECH_LOCL_H | ||
57 | #define HEADER_ECH_LOCL_H | ||
58 | |||
59 | #include <openssl/ecdh.h> | ||
60 | |||
61 | #ifdef __cplusplus | ||
62 | extern "C" { | ||
63 | #endif | ||
64 | |||
65 | struct ecdh_method | ||
66 | { | ||
67 | const char *name; | ||
68 | int (*compute_key)(void *key, size_t outlen, const EC_POINT *pub_key, EC_KEY *ecdh, | ||
69 | void *(*KDF)(const void *in, size_t inlen, void *out, size_t *outlen)); | ||
70 | #if 0 | ||
71 | int (*init)(EC_KEY *eckey); | ||
72 | int (*finish)(EC_KEY *eckey); | ||
73 | #endif | ||
74 | int flags; | ||
75 | char *app_data; | ||
76 | }; | ||
77 | |||
78 | typedef struct ecdh_data_st { | ||
79 | /* EC_KEY_METH_DATA part */ | ||
80 | int (*init)(EC_KEY *); | ||
81 | /* method specific part */ | ||
82 | ENGINE *engine; | ||
83 | int flags; | ||
84 | const ECDH_METHOD *meth; | ||
85 | CRYPTO_EX_DATA ex_data; | ||
86 | } ECDH_DATA; | ||
87 | |||
88 | ECDH_DATA *ecdh_check(EC_KEY *); | ||
89 | |||
90 | #ifdef __cplusplus | ||
91 | } | ||
92 | #endif | ||
93 | |||
94 | #endif /* HEADER_ECH_LOCL_H */ | ||
diff --git a/src/lib/libcrypto/ecdsa/ecdsa.h b/src/lib/libcrypto/ecdsa/ecdsa.h deleted file mode 100644 index f20c8ee738..0000000000 --- a/src/lib/libcrypto/ecdsa/ecdsa.h +++ /dev/null | |||
@@ -1,271 +0,0 @@ | |||
1 | /* crypto/ecdsa/ecdsa.h */ | ||
2 | /** | ||
3 | * \file crypto/ecdsa/ecdsa.h Include file for the OpenSSL ECDSA functions | ||
4 | * \author Written by Nils Larsch for the OpenSSL project | ||
5 | */ | ||
6 | /* ==================================================================== | ||
7 | * Copyright (c) 2000-2003 The OpenSSL Project. All rights reserved. | ||
8 | * | ||
9 | * Redistribution and use in source and binary forms, with or without | ||
10 | * modification, are permitted provided that the following conditions | ||
11 | * are met: | ||
12 | * | ||
13 | * 1. Redistributions of source code must retain the above copyright | ||
14 | * notice, this list of conditions and the following disclaimer. | ||
15 | * | ||
16 | * 2. Redistributions in binary form must reproduce the above copyright | ||
17 | * notice, this list of conditions and the following disclaimer in | ||
18 | * the documentation and/or other materials provided with the | ||
19 | * distribution. | ||
20 | * | ||
21 | * 3. All advertising materials mentioning features or use of this | ||
22 | * software must display the following acknowledgment: | ||
23 | * "This product includes software developed by the OpenSSL Project | ||
24 | * for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)" | ||
25 | * | ||
26 | * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to | ||
27 | * endorse or promote products derived from this software without | ||
28 | * prior written permission. For written permission, please contact | ||
29 | * licensing@OpenSSL.org. | ||
30 | * | ||
31 | * 5. Products derived from this software may not be called "OpenSSL" | ||
32 | * nor may "OpenSSL" appear in their names without prior written | ||
33 | * permission of the OpenSSL Project. | ||
34 | * | ||
35 | * 6. Redistributions of any form whatsoever must retain the following | ||
36 | * acknowledgment: | ||
37 | * "This product includes software developed by the OpenSSL Project | ||
38 | * for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)" | ||
39 | * | ||
40 | * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY | ||
41 | * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | ||
42 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR | ||
43 | * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR | ||
44 | * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, | ||
45 | * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT | ||
46 | * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; | ||
47 | * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | ||
48 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, | ||
49 | * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) | ||
50 | * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | ||
51 | * OF THE POSSIBILITY OF SUCH DAMAGE. | ||
52 | * ==================================================================== | ||
53 | * | ||
54 | * This product includes cryptographic software written by Eric Young | ||
55 | * (eay@cryptsoft.com). This product includes software written by Tim | ||
56 | * Hudson (tjh@cryptsoft.com). | ||
57 | * | ||
58 | */ | ||
59 | #ifndef HEADER_ECDSA_H | ||
60 | #define HEADER_ECDSA_H | ||
61 | |||
62 | #include <openssl/opensslconf.h> | ||
63 | |||
64 | #ifdef OPENSSL_NO_ECDSA | ||
65 | #error ECDSA is disabled. | ||
66 | #endif | ||
67 | |||
68 | #include <openssl/ec.h> | ||
69 | #include <openssl/ossl_typ.h> | ||
70 | #ifndef OPENSSL_NO_DEPRECATED | ||
71 | #include <openssl/bn.h> | ||
72 | #endif | ||
73 | |||
74 | #ifdef __cplusplus | ||
75 | extern "C" { | ||
76 | #endif | ||
77 | |||
78 | typedef struct ECDSA_SIG_st | ||
79 | { | ||
80 | BIGNUM *r; | ||
81 | BIGNUM *s; | ||
82 | } ECDSA_SIG; | ||
83 | |||
84 | /** ECDSA_SIG *ECDSA_SIG_new(void) | ||
85 | * allocates and initialize a ECDSA_SIG structure | ||
86 | * \return pointer to a ECDSA_SIG structure or NULL if an error occurred | ||
87 | */ | ||
88 | ECDSA_SIG *ECDSA_SIG_new(void); | ||
89 | |||
90 | /** ECDSA_SIG_free | ||
91 | * frees a ECDSA_SIG structure | ||
92 | * \param a pointer to the ECDSA_SIG structure | ||
93 | */ | ||
94 | void ECDSA_SIG_free(ECDSA_SIG *a); | ||
95 | |||
96 | /** i2d_ECDSA_SIG | ||
97 | * DER encode content of ECDSA_SIG object (note: this function modifies *pp | ||
98 | * (*pp += length of the DER encoded signature)). | ||
99 | * \param a pointer to the ECDSA_SIG object | ||
100 | * \param pp pointer to a unsigned char pointer for the output or NULL | ||
101 | * \return the length of the DER encoded ECDSA_SIG object or 0 | ||
102 | */ | ||
103 | int i2d_ECDSA_SIG(const ECDSA_SIG *a, unsigned char **pp); | ||
104 | |||
105 | /** d2i_ECDSA_SIG | ||
106 | * decodes a DER encoded ECDSA signature (note: this function changes *pp | ||
107 | * (*pp += len)). | ||
108 | * \param v pointer to ECDSA_SIG pointer (may be NULL) | ||
109 | * \param pp buffer with the DER encoded signature | ||
110 | * \param len bufferlength | ||
111 | * \return pointer to the decoded ECDSA_SIG structure (or NULL) | ||
112 | */ | ||
113 | ECDSA_SIG *d2i_ECDSA_SIG(ECDSA_SIG **v, const unsigned char **pp, long len); | ||
114 | |||
115 | /** ECDSA_do_sign | ||
116 | * computes the ECDSA signature of the given hash value using | ||
117 | * the supplied private key and returns the created signature. | ||
118 | * \param dgst pointer to the hash value | ||
119 | * \param dgst_len length of the hash value | ||
120 | * \param eckey pointer to the EC_KEY object containing a private EC key | ||
121 | * \return pointer to a ECDSA_SIG structure or NULL | ||
122 | */ | ||
123 | ECDSA_SIG *ECDSA_do_sign(const unsigned char *dgst,int dgst_len,EC_KEY *eckey); | ||
124 | |||
125 | /** ECDSA_do_sign_ex | ||
126 | * computes ECDSA signature of a given hash value using the supplied | ||
127 | * private key (note: sig must point to ECDSA_size(eckey) bytes of memory). | ||
128 | * \param dgst pointer to the hash value to sign | ||
129 | * \param dgstlen length of the hash value | ||
130 | * \param kinv optional pointer to a pre-computed inverse k | ||
131 | * \param rp optional pointer to the pre-computed rp value (see | ||
132 | * ECDSA_sign_setup | ||
133 | * \param eckey pointer to the EC_KEY object containing a private EC key | ||
134 | * \return pointer to a ECDSA_SIG structure or NULL | ||
135 | */ | ||
136 | ECDSA_SIG *ECDSA_do_sign_ex(const unsigned char *dgst, int dgstlen, | ||
137 | const BIGNUM *kinv, const BIGNUM *rp, EC_KEY *eckey); | ||
138 | |||
139 | /** ECDSA_do_verify | ||
140 | * verifies that the supplied signature is a valid ECDSA | ||
141 | * signature of the supplied hash value using the supplied public key. | ||
142 | * \param dgst pointer to the hash value | ||
143 | * \param dgst_len length of the hash value | ||
144 | * \param sig pointer to the ECDSA_SIG structure | ||
145 | * \param eckey pointer to the EC_KEY object containing a public EC key | ||
146 | * \return 1 if the signature is valid, 0 if the signature is invalid and -1 on error | ||
147 | */ | ||
148 | int ECDSA_do_verify(const unsigned char *dgst, int dgst_len, | ||
149 | const ECDSA_SIG *sig, EC_KEY* eckey); | ||
150 | |||
151 | const ECDSA_METHOD *ECDSA_OpenSSL(void); | ||
152 | |||
153 | /** ECDSA_set_default_method | ||
154 | * sets the default ECDSA method | ||
155 | * \param meth the new default ECDSA_METHOD | ||
156 | */ | ||
157 | void ECDSA_set_default_method(const ECDSA_METHOD *meth); | ||
158 | |||
159 | /** ECDSA_get_default_method | ||
160 | * returns the default ECDSA method | ||
161 | * \return pointer to ECDSA_METHOD structure containing the default method | ||
162 | */ | ||
163 | const ECDSA_METHOD *ECDSA_get_default_method(void); | ||
164 | |||
165 | /** ECDSA_set_method | ||
166 | * sets method to be used for the ECDSA operations | ||
167 | * \param eckey pointer to the EC_KEY object | ||
168 | * \param meth pointer to the new method | ||
169 | * \return 1 on success and 0 otherwise | ||
170 | */ | ||
171 | int ECDSA_set_method(EC_KEY *eckey, const ECDSA_METHOD *meth); | ||
172 | |||
173 | /** ECDSA_size | ||
174 | * returns the maximum length of the DER encoded signature | ||
175 | * \param eckey pointer to a EC_KEY object | ||
176 | * \return numbers of bytes required for the DER encoded signature | ||
177 | */ | ||
178 | int ECDSA_size(const EC_KEY *eckey); | ||
179 | |||
180 | /** ECDSA_sign_setup | ||
181 | * precompute parts of the signing operation. | ||
182 | * \param eckey pointer to the EC_KEY object containing a private EC key | ||
183 | * \param ctx pointer to a BN_CTX object (may be NULL) | ||
184 | * \param kinv pointer to a BIGNUM pointer for the inverse of k | ||
185 | * \param rp pointer to a BIGNUM pointer for x coordinate of k * generator | ||
186 | * \return 1 on success and 0 otherwise | ||
187 | */ | ||
188 | int ECDSA_sign_setup(EC_KEY *eckey, BN_CTX *ctx, BIGNUM **kinv, | ||
189 | BIGNUM **rp); | ||
190 | |||
191 | /** ECDSA_sign | ||
192 | * computes ECDSA signature of a given hash value using the supplied | ||
193 | * private key (note: sig must point to ECDSA_size(eckey) bytes of memory). | ||
194 | * \param type this parameter is ignored | ||
195 | * \param dgst pointer to the hash value to sign | ||
196 | * \param dgstlen length of the hash value | ||
197 | * \param sig buffer to hold the DER encoded signature | ||
198 | * \param siglen pointer to the length of the returned signature | ||
199 | * \param eckey pointer to the EC_KEY object containing a private EC key | ||
200 | * \return 1 on success and 0 otherwise | ||
201 | */ | ||
202 | int ECDSA_sign(int type, const unsigned char *dgst, int dgstlen, | ||
203 | unsigned char *sig, unsigned int *siglen, EC_KEY *eckey); | ||
204 | |||
205 | |||
206 | /** ECDSA_sign_ex | ||
207 | * computes ECDSA signature of a given hash value using the supplied | ||
208 | * private key (note: sig must point to ECDSA_size(eckey) bytes of memory). | ||
209 | * \param type this parameter is ignored | ||
210 | * \param dgst pointer to the hash value to sign | ||
211 | * \param dgstlen length of the hash value | ||
212 | * \param sig buffer to hold the DER encoded signature | ||
213 | * \param siglen pointer to the length of the returned signature | ||
214 | * \param kinv optional pointer to a pre-computed inverse k | ||
215 | * \param rp optional pointer to the pre-computed rp value (see | ||
216 | * ECDSA_sign_setup | ||
217 | * \param eckey pointer to the EC_KEY object containing a private EC key | ||
218 | * \return 1 on success and 0 otherwise | ||
219 | */ | ||
220 | int ECDSA_sign_ex(int type, const unsigned char *dgst, int dgstlen, | ||
221 | unsigned char *sig, unsigned int *siglen, const BIGNUM *kinv, | ||
222 | const BIGNUM *rp, EC_KEY *eckey); | ||
223 | |||
224 | /** ECDSA_verify | ||
225 | * verifies that the given signature is valid ECDSA signature | ||
226 | * of the supplied hash value using the specified public key. | ||
227 | * \param type this parameter is ignored | ||
228 | * \param dgst pointer to the hash value | ||
229 | * \param dgstlen length of the hash value | ||
230 | * \param sig pointer to the DER encoded signature | ||
231 | * \param siglen length of the DER encoded signature | ||
232 | * \param eckey pointer to the EC_KEY object containing a public EC key | ||
233 | * \return 1 if the signature is valid, 0 if the signature is invalid and -1 on error | ||
234 | */ | ||
235 | int ECDSA_verify(int type, const unsigned char *dgst, int dgstlen, | ||
236 | const unsigned char *sig, int siglen, EC_KEY *eckey); | ||
237 | |||
238 | /* the standard ex_data functions */ | ||
239 | int ECDSA_get_ex_new_index(long argl, void *argp, CRYPTO_EX_new | ||
240 | *new_func, CRYPTO_EX_dup *dup_func, CRYPTO_EX_free *free_func); | ||
241 | int ECDSA_set_ex_data(EC_KEY *d, int idx, void *arg); | ||
242 | void *ECDSA_get_ex_data(EC_KEY *d, int idx); | ||
243 | |||
244 | |||
245 | /* BEGIN ERROR CODES */ | ||
246 | /* The following lines are auto generated by the script mkerr.pl. Any changes | ||
247 | * made after this point may be overwritten when the script is next run. | ||
248 | */ | ||
249 | void ERR_load_ECDSA_strings(void); | ||
250 | |||
251 | /* Error codes for the ECDSA functions. */ | ||
252 | |||
253 | /* Function codes. */ | ||
254 | #define ECDSA_F_ECDSA_DATA_NEW_METHOD 100 | ||
255 | #define ECDSA_F_ECDSA_DO_SIGN 101 | ||
256 | #define ECDSA_F_ECDSA_DO_VERIFY 102 | ||
257 | #define ECDSA_F_ECDSA_SIGN_SETUP 103 | ||
258 | |||
259 | /* Reason codes. */ | ||
260 | #define ECDSA_R_BAD_SIGNATURE 100 | ||
261 | #define ECDSA_R_DATA_TOO_LARGE_FOR_KEY_SIZE 101 | ||
262 | #define ECDSA_R_ERR_EC_LIB 102 | ||
263 | #define ECDSA_R_MISSING_PARAMETERS 103 | ||
264 | #define ECDSA_R_NEED_NEW_SETUP_VALUES 106 | ||
265 | #define ECDSA_R_RANDOM_NUMBER_GENERATION_FAILED 104 | ||
266 | #define ECDSA_R_SIGNATURE_MALLOC_FAILED 105 | ||
267 | |||
268 | #ifdef __cplusplus | ||
269 | } | ||
270 | #endif | ||
271 | #endif | ||
diff --git a/src/lib/libcrypto/ecdsa/ecs_asn1.c b/src/lib/libcrypto/ecdsa/ecs_asn1.c deleted file mode 100644 index b295489400..0000000000 --- a/src/lib/libcrypto/ecdsa/ecs_asn1.c +++ /dev/null | |||
@@ -1,67 +0,0 @@ | |||
1 | /* crypto/ecdsa/ecs_asn1.c */ | ||
2 | /* ==================================================================== | ||
3 | * Copyright (c) 2000-2002 The OpenSSL Project. All rights reserved. | ||
4 | * | ||
5 | * Redistribution and use in source and binary forms, with or without | ||
6 | * modification, are permitted provided that the following conditions | ||
7 | * are met: | ||
8 | * | ||
9 | * 1. Redistributions of source code must retain the above copyright | ||
10 | * notice, this list of conditions and the following disclaimer. | ||
11 | * | ||
12 | * 2. Redistributions in binary form must reproduce the above copyright | ||
13 | * notice, this list of conditions and the following disclaimer in | ||
14 | * the documentation and/or other materials provided with the | ||
15 | * distribution. | ||
16 | * | ||
17 | * 3. All advertising materials mentioning features or use of this | ||
18 | * software must display the following acknowledgment: | ||
19 | * "This product includes software developed by the OpenSSL Project | ||
20 | * for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)" | ||
21 | * | ||
22 | * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to | ||
23 | * endorse or promote products derived from this software without | ||
24 | * prior written permission. For written permission, please contact | ||
25 | * licensing@OpenSSL.org. | ||
26 | * | ||
27 | * 5. Products derived from this software may not be called "OpenSSL" | ||
28 | * nor may "OpenSSL" appear in their names without prior written | ||
29 | * permission of the OpenSSL Project. | ||
30 | * | ||
31 | * 6. Redistributions of any form whatsoever must retain the following | ||
32 | * acknowledgment: | ||
33 | * "This product includes software developed by the OpenSSL Project | ||
34 | * for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)" | ||
35 | * | ||
36 | * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY | ||
37 | * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | ||
38 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR | ||
39 | * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR | ||
40 | * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, | ||
41 | * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT | ||
42 | * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; | ||
43 | * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | ||
44 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, | ||
45 | * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) | ||
46 | * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | ||
47 | * OF THE POSSIBILITY OF SUCH DAMAGE. | ||
48 | * ==================================================================== | ||
49 | * | ||
50 | * This product includes cryptographic software written by Eric Young | ||
51 | * (eay@cryptsoft.com). This product includes software written by Tim | ||
52 | * Hudson (tjh@cryptsoft.com). | ||
53 | * | ||
54 | */ | ||
55 | |||
56 | #include "ecs_locl.h" | ||
57 | #include <openssl/err.h> | ||
58 | #include <openssl/asn1t.h> | ||
59 | |||
60 | ASN1_SEQUENCE(ECDSA_SIG) = { | ||
61 | ASN1_SIMPLE(ECDSA_SIG, r, CBIGNUM), | ||
62 | ASN1_SIMPLE(ECDSA_SIG, s, CBIGNUM) | ||
63 | } ASN1_SEQUENCE_END(ECDSA_SIG) | ||
64 | |||
65 | DECLARE_ASN1_FUNCTIONS_const(ECDSA_SIG) | ||
66 | DECLARE_ASN1_ENCODE_FUNCTIONS_const(ECDSA_SIG, ECDSA_SIG) | ||
67 | IMPLEMENT_ASN1_FUNCTIONS_const(ECDSA_SIG) | ||
diff --git a/src/lib/libcrypto/ecdsa/ecs_err.c b/src/lib/libcrypto/ecdsa/ecs_err.c deleted file mode 100644 index d2a53730ea..0000000000 --- a/src/lib/libcrypto/ecdsa/ecs_err.c +++ /dev/null | |||
@@ -1,104 +0,0 @@ | |||
1 | /* crypto/ecdsa/ecs_err.c */ | ||
2 | /* ==================================================================== | ||
3 | * Copyright (c) 1999-2005 The OpenSSL Project. All rights reserved. | ||
4 | * | ||
5 | * Redistribution and use in source and binary forms, with or without | ||
6 | * modification, are permitted provided that the following conditions | ||
7 | * are met: | ||
8 | * | ||
9 | * 1. Redistributions of source code must retain the above copyright | ||
10 | * notice, this list of conditions and the following disclaimer. | ||
11 | * | ||
12 | * 2. Redistributions in binary form must reproduce the above copyright | ||
13 | * notice, this list of conditions and the following disclaimer in | ||
14 | * the documentation and/or other materials provided with the | ||
15 | * distribution. | ||
16 | * | ||
17 | * 3. All advertising materials mentioning features or use of this | ||
18 | * software must display the following acknowledgment: | ||
19 | * "This product includes software developed by the OpenSSL Project | ||
20 | * for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)" | ||
21 | * | ||
22 | * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to | ||
23 | * endorse or promote products derived from this software without | ||
24 | * prior written permission. For written permission, please contact | ||
25 | * openssl-core@OpenSSL.org. | ||
26 | * | ||
27 | * 5. Products derived from this software may not be called "OpenSSL" | ||
28 | * nor may "OpenSSL" appear in their names without prior written | ||
29 | * permission of the OpenSSL Project. | ||
30 | * | ||
31 | * 6. Redistributions of any form whatsoever must retain the following | ||
32 | * acknowledgment: | ||
33 | * "This product includes software developed by the OpenSSL Project | ||
34 | * for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)" | ||
35 | * | ||
36 | * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY | ||
37 | * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | ||
38 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR | ||
39 | * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR | ||
40 | * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, | ||
41 | * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT | ||
42 | * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; | ||
43 | * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | ||
44 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, | ||
45 | * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) | ||
46 | * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | ||
47 | * OF THE POSSIBILITY OF SUCH DAMAGE. | ||
48 | * ==================================================================== | ||
49 | * | ||
50 | * This product includes cryptographic software written by Eric Young | ||
51 | * (eay@cryptsoft.com). This product includes software written by Tim | ||
52 | * Hudson (tjh@cryptsoft.com). | ||
53 | * | ||
54 | */ | ||
55 | |||
56 | /* NOTE: this file was auto generated by the mkerr.pl script: any changes | ||
57 | * made to it will be overwritten when the script next updates this file, | ||
58 | * only reason strings will be preserved. | ||
59 | */ | ||
60 | |||
61 | #include <stdio.h> | ||
62 | #include <openssl/err.h> | ||
63 | #include <openssl/ecdsa.h> | ||
64 | |||
65 | /* BEGIN ERROR CODES */ | ||
66 | #ifndef OPENSSL_NO_ERR | ||
67 | |||
68 | #define ERR_FUNC(func) ERR_PACK(ERR_LIB_ECDSA,func,0) | ||
69 | #define ERR_REASON(reason) ERR_PACK(ERR_LIB_ECDSA,0,reason) | ||
70 | |||
71 | static ERR_STRING_DATA ECDSA_str_functs[]= | ||
72 | { | ||
73 | {ERR_FUNC(ECDSA_F_ECDSA_DATA_NEW_METHOD), "ECDSA_DATA_NEW_METHOD"}, | ||
74 | {ERR_FUNC(ECDSA_F_ECDSA_DO_SIGN), "ECDSA_do_sign"}, | ||
75 | {ERR_FUNC(ECDSA_F_ECDSA_DO_VERIFY), "ECDSA_do_verify"}, | ||
76 | {ERR_FUNC(ECDSA_F_ECDSA_SIGN_SETUP), "ECDSA_sign_setup"}, | ||
77 | {0,NULL} | ||
78 | }; | ||
79 | |||
80 | static ERR_STRING_DATA ECDSA_str_reasons[]= | ||
81 | { | ||
82 | {ERR_REASON(ECDSA_R_BAD_SIGNATURE) ,"bad signature"}, | ||
83 | {ERR_REASON(ECDSA_R_DATA_TOO_LARGE_FOR_KEY_SIZE),"data too large for key size"}, | ||
84 | {ERR_REASON(ECDSA_R_ERR_EC_LIB) ,"err ec lib"}, | ||
85 | {ERR_REASON(ECDSA_R_MISSING_PARAMETERS) ,"missing parameters"}, | ||
86 | {ERR_REASON(ECDSA_R_NEED_NEW_SETUP_VALUES),"need new setup values"}, | ||
87 | {ERR_REASON(ECDSA_R_RANDOM_NUMBER_GENERATION_FAILED),"random number generation failed"}, | ||
88 | {ERR_REASON(ECDSA_R_SIGNATURE_MALLOC_FAILED),"signature malloc failed"}, | ||
89 | {0,NULL} | ||
90 | }; | ||
91 | |||
92 | #endif | ||
93 | |||
94 | void ERR_load_ECDSA_strings(void) | ||
95 | { | ||
96 | #ifndef OPENSSL_NO_ERR | ||
97 | |||
98 | if (ERR_func_error_string(ECDSA_str_functs[0].error) == NULL) | ||
99 | { | ||
100 | ERR_load_strings(0,ECDSA_str_functs); | ||
101 | ERR_load_strings(0,ECDSA_str_reasons); | ||
102 | } | ||
103 | #endif | ||
104 | } | ||
diff --git a/src/lib/libcrypto/ecdsa/ecs_lib.c b/src/lib/libcrypto/ecdsa/ecs_lib.c deleted file mode 100644 index 85e8a3a7ed..0000000000 --- a/src/lib/libcrypto/ecdsa/ecs_lib.c +++ /dev/null | |||
@@ -1,261 +0,0 @@ | |||
1 | /* crypto/ecdsa/ecs_lib.c */ | ||
2 | /* ==================================================================== | ||
3 | * Copyright (c) 1998-2005 The OpenSSL Project. All rights reserved. | ||
4 | * | ||
5 | * Redistribution and use in source and binary forms, with or without | ||
6 | * modification, are permitted provided that the following conditions | ||
7 | * are met: | ||
8 | * | ||
9 | * 1. Redistributions of source code must retain the above copyright | ||
10 | * notice, this list of conditions and the following disclaimer. | ||
11 | * | ||
12 | * 2. Redistributions in binary form must reproduce the above copyright | ||
13 | * notice, this list of conditions and the following disclaimer in | ||
14 | * the documentation and/or other materials provided with the | ||
15 | * distribution. | ||
16 | * | ||
17 | * 3. All advertising materials mentioning features or use of this | ||
18 | * software must display the following acknowledgment: | ||
19 | * "This product includes software developed by the OpenSSL Project | ||
20 | * for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)" | ||
21 | * | ||
22 | * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to | ||
23 | * endorse or promote products derived from this software without | ||
24 | * prior written permission. For written permission, please contact | ||
25 | * openssl-core@OpenSSL.org. | ||
26 | * | ||
27 | * 5. Products derived from this software may not be called "OpenSSL" | ||
28 | * nor may "OpenSSL" appear in their names without prior written | ||
29 | * permission of the OpenSSL Project. | ||
30 | * | ||
31 | * 6. Redistributions of any form whatsoever must retain the following | ||
32 | * acknowledgment: | ||
33 | * "This product includes software developed by the OpenSSL Project | ||
34 | * for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)" | ||
35 | * | ||
36 | * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY | ||
37 | * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | ||
38 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR | ||
39 | * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR | ||
40 | * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, | ||
41 | * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT | ||
42 | * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; | ||
43 | * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | ||
44 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, | ||
45 | * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) | ||
46 | * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | ||
47 | * OF THE POSSIBILITY OF SUCH DAMAGE. | ||
48 | * ==================================================================== | ||
49 | * | ||
50 | * This product includes cryptographic software written by Eric Young | ||
51 | * (eay@cryptsoft.com). This product includes software written by Tim | ||
52 | * Hudson (tjh@cryptsoft.com). | ||
53 | * | ||
54 | */ | ||
55 | |||
56 | #include <string.h> | ||
57 | #include "ecs_locl.h" | ||
58 | #ifndef OPENSSL_NO_ENGINE | ||
59 | #include <openssl/engine.h> | ||
60 | #endif | ||
61 | #include <openssl/err.h> | ||
62 | #include <openssl/bn.h> | ||
63 | |||
64 | const char ECDSA_version[]="ECDSA" OPENSSL_VERSION_PTEXT; | ||
65 | |||
66 | static const ECDSA_METHOD *default_ECDSA_method = NULL; | ||
67 | |||
68 | static void *ecdsa_data_new(void); | ||
69 | static void *ecdsa_data_dup(void *); | ||
70 | static void ecdsa_data_free(void *); | ||
71 | |||
72 | void ECDSA_set_default_method(const ECDSA_METHOD *meth) | ||
73 | { | ||
74 | default_ECDSA_method = meth; | ||
75 | } | ||
76 | |||
77 | const ECDSA_METHOD *ECDSA_get_default_method(void) | ||
78 | { | ||
79 | if(!default_ECDSA_method) | ||
80 | default_ECDSA_method = ECDSA_OpenSSL(); | ||
81 | return default_ECDSA_method; | ||
82 | } | ||
83 | |||
84 | int ECDSA_set_method(EC_KEY *eckey, const ECDSA_METHOD *meth) | ||
85 | { | ||
86 | const ECDSA_METHOD *mtmp; | ||
87 | ECDSA_DATA *ecdsa; | ||
88 | |||
89 | ecdsa = ecdsa_check(eckey); | ||
90 | |||
91 | if (ecdsa == NULL) | ||
92 | return 0; | ||
93 | |||
94 | mtmp = ecdsa->meth; | ||
95 | #ifndef OPENSSL_NO_ENGINE | ||
96 | if (ecdsa->engine) | ||
97 | { | ||
98 | ENGINE_finish(ecdsa->engine); | ||
99 | ecdsa->engine = NULL; | ||
100 | } | ||
101 | #endif | ||
102 | ecdsa->meth = meth; | ||
103 | |||
104 | return 1; | ||
105 | } | ||
106 | |||
107 | static ECDSA_DATA *ECDSA_DATA_new_method(ENGINE *engine) | ||
108 | { | ||
109 | ECDSA_DATA *ret; | ||
110 | |||
111 | ret=(ECDSA_DATA *)OPENSSL_malloc(sizeof(ECDSA_DATA)); | ||
112 | if (ret == NULL) | ||
113 | { | ||
114 | ECDSAerr(ECDSA_F_ECDSA_DATA_NEW_METHOD, ERR_R_MALLOC_FAILURE); | ||
115 | return(NULL); | ||
116 | } | ||
117 | |||
118 | ret->init = NULL; | ||
119 | |||
120 | ret->meth = ECDSA_get_default_method(); | ||
121 | ret->engine = engine; | ||
122 | #ifndef OPENSSL_NO_ENGINE | ||
123 | if (!ret->engine) | ||
124 | ret->engine = ENGINE_get_default_ECDSA(); | ||
125 | if (ret->engine) | ||
126 | { | ||
127 | ret->meth = ENGINE_get_ECDSA(ret->engine); | ||
128 | if (!ret->meth) | ||
129 | { | ||
130 | ECDSAerr(ECDSA_F_ECDSA_DATA_NEW_METHOD, ERR_R_ENGINE_LIB); | ||
131 | ENGINE_finish(ret->engine); | ||
132 | OPENSSL_free(ret); | ||
133 | return NULL; | ||
134 | } | ||
135 | } | ||
136 | #endif | ||
137 | |||
138 | ret->flags = ret->meth->flags; | ||
139 | CRYPTO_new_ex_data(CRYPTO_EX_INDEX_ECDSA, ret, &ret->ex_data); | ||
140 | #if 0 | ||
141 | if ((ret->meth->init != NULL) && !ret->meth->init(ret)) | ||
142 | { | ||
143 | CRYPTO_free_ex_data(CRYPTO_EX_INDEX_ECDSA, ret, &ret->ex_data); | ||
144 | OPENSSL_free(ret); | ||
145 | ret=NULL; | ||
146 | } | ||
147 | #endif | ||
148 | return(ret); | ||
149 | } | ||
150 | |||
151 | static void *ecdsa_data_new(void) | ||
152 | { | ||
153 | return (void *)ECDSA_DATA_new_method(NULL); | ||
154 | } | ||
155 | |||
156 | static void *ecdsa_data_dup(void *data) | ||
157 | { | ||
158 | ECDSA_DATA *r = (ECDSA_DATA *)data; | ||
159 | |||
160 | /* XXX: dummy operation */ | ||
161 | if (r == NULL) | ||
162 | return NULL; | ||
163 | |||
164 | return ecdsa_data_new(); | ||
165 | } | ||
166 | |||
167 | static void ecdsa_data_free(void *data) | ||
168 | { | ||
169 | ECDSA_DATA *r = (ECDSA_DATA *)data; | ||
170 | |||
171 | #ifndef OPENSSL_NO_ENGINE | ||
172 | if (r->engine) | ||
173 | ENGINE_finish(r->engine); | ||
174 | #endif | ||
175 | CRYPTO_free_ex_data(CRYPTO_EX_INDEX_ECDSA, r, &r->ex_data); | ||
176 | |||
177 | OPENSSL_cleanse((void *)r, sizeof(ECDSA_DATA)); | ||
178 | |||
179 | OPENSSL_free(r); | ||
180 | } | ||
181 | |||
182 | ECDSA_DATA *ecdsa_check(EC_KEY *key) | ||
183 | { | ||
184 | ECDSA_DATA *ecdsa_data; | ||
185 | |||
186 | void *data = EC_KEY_get_key_method_data(key, ecdsa_data_dup, | ||
187 | ecdsa_data_free, ecdsa_data_free); | ||
188 | if (data == NULL) | ||
189 | { | ||
190 | ecdsa_data = (ECDSA_DATA *)ecdsa_data_new(); | ||
191 | if (ecdsa_data == NULL) | ||
192 | return NULL; | ||
193 | EC_KEY_insert_key_method_data(key, (void *)ecdsa_data, | ||
194 | ecdsa_data_dup, ecdsa_data_free, ecdsa_data_free); | ||
195 | } | ||
196 | else | ||
197 | ecdsa_data = (ECDSA_DATA *)data; | ||
198 | |||
199 | |||
200 | return ecdsa_data; | ||
201 | } | ||
202 | |||
203 | int ECDSA_size(const EC_KEY *r) | ||
204 | { | ||
205 | int ret,i; | ||
206 | ASN1_INTEGER bs; | ||
207 | BIGNUM *order=NULL; | ||
208 | unsigned char buf[4]; | ||
209 | const EC_GROUP *group; | ||
210 | |||
211 | if (r == NULL) | ||
212 | return 0; | ||
213 | group = EC_KEY_get0_group(r); | ||
214 | if (group == NULL) | ||
215 | return 0; | ||
216 | |||
217 | if ((order = BN_new()) == NULL) return 0; | ||
218 | if (!EC_GROUP_get_order(group,order,NULL)) | ||
219 | { | ||
220 | BN_clear_free(order); | ||
221 | return 0; | ||
222 | } | ||
223 | i=BN_num_bits(order); | ||
224 | bs.length=(i+7)/8; | ||
225 | bs.data=buf; | ||
226 | bs.type=V_ASN1_INTEGER; | ||
227 | /* If the top bit is set the asn1 encoding is 1 larger. */ | ||
228 | buf[0]=0xff; | ||
229 | |||
230 | i=i2d_ASN1_INTEGER(&bs,NULL); | ||
231 | i+=i; /* r and s */ | ||
232 | ret=ASN1_object_size(1,i,V_ASN1_SEQUENCE); | ||
233 | BN_clear_free(order); | ||
234 | return(ret); | ||
235 | } | ||
236 | |||
237 | |||
238 | int ECDSA_get_ex_new_index(long argl, void *argp, CRYPTO_EX_new *new_func, | ||
239 | CRYPTO_EX_dup *dup_func, CRYPTO_EX_free *free_func) | ||
240 | { | ||
241 | return CRYPTO_get_ex_new_index(CRYPTO_EX_INDEX_ECDSA, argl, argp, | ||
242 | new_func, dup_func, free_func); | ||
243 | } | ||
244 | |||
245 | int ECDSA_set_ex_data(EC_KEY *d, int idx, void *arg) | ||
246 | { | ||
247 | ECDSA_DATA *ecdsa; | ||
248 | ecdsa = ecdsa_check(d); | ||
249 | if (ecdsa == NULL) | ||
250 | return 0; | ||
251 | return(CRYPTO_set_ex_data(&ecdsa->ex_data,idx,arg)); | ||
252 | } | ||
253 | |||
254 | void *ECDSA_get_ex_data(EC_KEY *d, int idx) | ||
255 | { | ||
256 | ECDSA_DATA *ecdsa; | ||
257 | ecdsa = ecdsa_check(d); | ||
258 | if (ecdsa == NULL) | ||
259 | return NULL; | ||
260 | return(CRYPTO_get_ex_data(&ecdsa->ex_data,idx)); | ||
261 | } | ||
diff --git a/src/lib/libcrypto/ecdsa/ecs_locl.h b/src/lib/libcrypto/ecdsa/ecs_locl.h deleted file mode 100644 index 3a69a840e2..0000000000 --- a/src/lib/libcrypto/ecdsa/ecs_locl.h +++ /dev/null | |||
@@ -1,107 +0,0 @@ | |||
1 | /* crypto/ecdsa/ecs_locl.h */ | ||
2 | /* | ||
3 | * Written by Nils Larsch for the OpenSSL project | ||
4 | */ | ||
5 | /* ==================================================================== | ||
6 | * Copyright (c) 2000-2005 The OpenSSL Project. All rights reserved. | ||
7 | * | ||
8 | * Redistribution and use in source and binary forms, with or without | ||
9 | * modification, are permitted provided that the following conditions | ||
10 | * are met: | ||
11 | * | ||
12 | * 1. Redistributions of source code must retain the above copyright | ||
13 | * notice, this list of conditions and the following disclaimer. | ||
14 | * | ||
15 | * 2. Redistributions in binary form must reproduce the above copyright | ||
16 | * notice, this list of conditions and the following disclaimer in | ||
17 | * the documentation and/or other materials provided with the | ||
18 | * distribution. | ||
19 | * | ||
20 | * 3. All advertising materials mentioning features or use of this | ||
21 | * software must display the following acknowledgment: | ||
22 | * "This product includes software developed by the OpenSSL Project | ||
23 | * for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)" | ||
24 | * | ||
25 | * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to | ||
26 | * endorse or promote products derived from this software without | ||
27 | * prior written permission. For written permission, please contact | ||
28 | * licensing@OpenSSL.org. | ||
29 | * | ||
30 | * 5. Products derived from this software may not be called "OpenSSL" | ||
31 | * nor may "OpenSSL" appear in their names without prior written | ||
32 | * permission of the OpenSSL Project. | ||
33 | * | ||
34 | * 6. Redistributions of any form whatsoever must retain the following | ||
35 | * acknowledgment: | ||
36 | * "This product includes software developed by the OpenSSL Project | ||
37 | * for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)" | ||
38 | * | ||
39 | * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY | ||
40 | * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | ||
41 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR | ||
42 | * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR | ||
43 | * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, | ||
44 | * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT | ||
45 | * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; | ||
46 | * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | ||
47 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, | ||
48 | * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) | ||
49 | * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | ||
50 | * OF THE POSSIBILITY OF SUCH DAMAGE. | ||
51 | * ==================================================================== | ||
52 | * | ||
53 | * This product includes cryptographic software written by Eric Young | ||
54 | * (eay@cryptsoft.com). This product includes software written by Tim | ||
55 | * Hudson (tjh@cryptsoft.com). | ||
56 | * | ||
57 | */ | ||
58 | |||
59 | #ifndef HEADER_ECS_LOCL_H | ||
60 | #define HEADER_ECS_LOCL_H | ||
61 | |||
62 | #include <openssl/ecdsa.h> | ||
63 | |||
64 | #ifdef __cplusplus | ||
65 | extern "C" { | ||
66 | #endif | ||
67 | |||
68 | struct ecdsa_method | ||
69 | { | ||
70 | const char *name; | ||
71 | ECDSA_SIG *(*ecdsa_do_sign)(const unsigned char *dgst, int dgst_len, | ||
72 | const BIGNUM *inv, const BIGNUM *rp, EC_KEY *eckey); | ||
73 | int (*ecdsa_sign_setup)(EC_KEY *eckey, BN_CTX *ctx, BIGNUM **kinv, | ||
74 | BIGNUM **r); | ||
75 | int (*ecdsa_do_verify)(const unsigned char *dgst, int dgst_len, | ||
76 | const ECDSA_SIG *sig, EC_KEY *eckey); | ||
77 | #if 0 | ||
78 | int (*init)(EC_KEY *eckey); | ||
79 | int (*finish)(EC_KEY *eckey); | ||
80 | #endif | ||
81 | int flags; | ||
82 | char *app_data; | ||
83 | }; | ||
84 | |||
85 | typedef struct ecdsa_data_st { | ||
86 | /* EC_KEY_METH_DATA part */ | ||
87 | int (*init)(EC_KEY *); | ||
88 | /* method (ECDSA) specific part */ | ||
89 | ENGINE *engine; | ||
90 | int flags; | ||
91 | const ECDSA_METHOD *meth; | ||
92 | CRYPTO_EX_DATA ex_data; | ||
93 | } ECDSA_DATA; | ||
94 | |||
95 | /** ecdsa_check | ||
96 | * checks whether ECKEY->meth_data is a pointer to a ECDSA_DATA structure | ||
97 | * and if not it removes the old meth_data and creates a ECDSA_DATA structure. | ||
98 | * \param eckey pointer to a EC_KEY object | ||
99 | * \return pointer to a ECDSA_DATA structure | ||
100 | */ | ||
101 | ECDSA_DATA *ecdsa_check(EC_KEY *eckey); | ||
102 | |||
103 | #ifdef __cplusplus | ||
104 | } | ||
105 | #endif | ||
106 | |||
107 | #endif /* HEADER_ECS_LOCL_H */ | ||
diff --git a/src/lib/libcrypto/ecdsa/ecs_ossl.c b/src/lib/libcrypto/ecdsa/ecs_ossl.c deleted file mode 100644 index 3ead1af94e..0000000000 --- a/src/lib/libcrypto/ecdsa/ecs_ossl.c +++ /dev/null | |||
@@ -1,478 +0,0 @@ | |||
1 | /* crypto/ecdsa/ecs_ossl.c */ | ||
2 | /* | ||
3 | * Written by Nils Larsch for the OpenSSL project | ||
4 | */ | ||
5 | /* ==================================================================== | ||
6 | * Copyright (c) 1998-2004 The OpenSSL Project. All rights reserved. | ||
7 | * | ||
8 | * Redistribution and use in source and binary forms, with or without | ||
9 | * modification, are permitted provided that the following conditions | ||
10 | * are met: | ||
11 | * | ||
12 | * 1. Redistributions of source code must retain the above copyright | ||
13 | * notice, this list of conditions and the following disclaimer. | ||
14 | * | ||
15 | * 2. Redistributions in binary form must reproduce the above copyright | ||
16 | * notice, this list of conditions and the following disclaimer in | ||
17 | * the documentation and/or other materials provided with the | ||
18 | * distribution. | ||
19 | * | ||
20 | * 3. All advertising materials mentioning features or use of this | ||
21 | * software must display the following acknowledgment: | ||
22 | * "This product includes software developed by the OpenSSL Project | ||
23 | * for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)" | ||
24 | * | ||
25 | * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to | ||
26 | * endorse or promote products derived from this software without | ||
27 | * prior written permission. For written permission, please contact | ||
28 | * openssl-core@OpenSSL.org. | ||
29 | * | ||
30 | * 5. Products derived from this software may not be called "OpenSSL" | ||
31 | * nor may "OpenSSL" appear in their names without prior written | ||
32 | * permission of the OpenSSL Project. | ||
33 | * | ||
34 | * 6. Redistributions of any form whatsoever must retain the following | ||
35 | * acknowledgment: | ||
36 | * "This product includes software developed by the OpenSSL Project | ||
37 | * for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)" | ||
38 | * | ||
39 | * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY | ||
40 | * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | ||
41 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR | ||
42 | * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR | ||
43 | * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, | ||
44 | * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT | ||
45 | * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; | ||
46 | * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | ||
47 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, | ||
48 | * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) | ||
49 | * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | ||
50 | * OF THE POSSIBILITY OF SUCH DAMAGE. | ||
51 | * ==================================================================== | ||
52 | * | ||
53 | * This product includes cryptographic software written by Eric Young | ||
54 | * (eay@cryptsoft.com). This product includes software written by Tim | ||
55 | * Hudson (tjh@cryptsoft.com). | ||
56 | * | ||
57 | */ | ||
58 | |||
59 | #include "ecs_locl.h" | ||
60 | #include <openssl/err.h> | ||
61 | #include <openssl/obj_mac.h> | ||
62 | #include <openssl/bn.h> | ||
63 | |||
64 | static ECDSA_SIG *ecdsa_do_sign(const unsigned char *dgst, int dlen, | ||
65 | const BIGNUM *, const BIGNUM *, EC_KEY *eckey); | ||
66 | static int ecdsa_sign_setup(EC_KEY *eckey, BN_CTX *ctx_in, BIGNUM **kinvp, | ||
67 | BIGNUM **rp); | ||
68 | static int ecdsa_do_verify(const unsigned char *dgst, int dgst_len, | ||
69 | const ECDSA_SIG *sig, EC_KEY *eckey); | ||
70 | |||
71 | static ECDSA_METHOD openssl_ecdsa_meth = { | ||
72 | "OpenSSL ECDSA method", | ||
73 | ecdsa_do_sign, | ||
74 | ecdsa_sign_setup, | ||
75 | ecdsa_do_verify, | ||
76 | #if 0 | ||
77 | NULL, /* init */ | ||
78 | NULL, /* finish */ | ||
79 | #endif | ||
80 | 0, /* flags */ | ||
81 | NULL /* app_data */ | ||
82 | }; | ||
83 | |||
84 | const ECDSA_METHOD *ECDSA_OpenSSL(void) | ||
85 | { | ||
86 | return &openssl_ecdsa_meth; | ||
87 | } | ||
88 | |||
89 | static int ecdsa_sign_setup(EC_KEY *eckey, BN_CTX *ctx_in, BIGNUM **kinvp, | ||
90 | BIGNUM **rp) | ||
91 | { | ||
92 | BN_CTX *ctx = NULL; | ||
93 | BIGNUM *k = NULL, *r = NULL, *order = NULL, *X = NULL; | ||
94 | EC_POINT *tmp_point=NULL; | ||
95 | const EC_GROUP *group; | ||
96 | int ret = 0; | ||
97 | |||
98 | if (eckey == NULL || (group = EC_KEY_get0_group(eckey)) == NULL) | ||
99 | { | ||
100 | ECDSAerr(ECDSA_F_ECDSA_SIGN_SETUP, ERR_R_PASSED_NULL_PARAMETER); | ||
101 | return 0; | ||
102 | } | ||
103 | |||
104 | if (ctx_in == NULL) | ||
105 | { | ||
106 | if ((ctx = BN_CTX_new()) == NULL) | ||
107 | { | ||
108 | ECDSAerr(ECDSA_F_ECDSA_SIGN_SETUP,ERR_R_MALLOC_FAILURE); | ||
109 | return 0; | ||
110 | } | ||
111 | } | ||
112 | else | ||
113 | ctx = ctx_in; | ||
114 | |||
115 | k = BN_new(); /* this value is later returned in *kinvp */ | ||
116 | r = BN_new(); /* this value is later returned in *rp */ | ||
117 | order = BN_new(); | ||
118 | X = BN_new(); | ||
119 | if (!k || !r || !order || !X) | ||
120 | { | ||
121 | ECDSAerr(ECDSA_F_ECDSA_SIGN_SETUP, ERR_R_MALLOC_FAILURE); | ||
122 | goto err; | ||
123 | } | ||
124 | if ((tmp_point = EC_POINT_new(group)) == NULL) | ||
125 | { | ||
126 | ECDSAerr(ECDSA_F_ECDSA_SIGN_SETUP, ERR_R_EC_LIB); | ||
127 | goto err; | ||
128 | } | ||
129 | if (!EC_GROUP_get_order(group, order, ctx)) | ||
130 | { | ||
131 | ECDSAerr(ECDSA_F_ECDSA_SIGN_SETUP, ERR_R_EC_LIB); | ||
132 | goto err; | ||
133 | } | ||
134 | |||
135 | do | ||
136 | { | ||
137 | /* get random k */ | ||
138 | do | ||
139 | if (!BN_rand_range(k, order)) | ||
140 | { | ||
141 | ECDSAerr(ECDSA_F_ECDSA_SIGN_SETUP, | ||
142 | ECDSA_R_RANDOM_NUMBER_GENERATION_FAILED); | ||
143 | goto err; | ||
144 | } | ||
145 | while (BN_is_zero(k)); | ||
146 | |||
147 | /* compute r the x-coordinate of generator * k */ | ||
148 | if (!EC_POINT_mul(group, tmp_point, k, NULL, NULL, ctx)) | ||
149 | { | ||
150 | ECDSAerr(ECDSA_F_ECDSA_SIGN_SETUP, ERR_R_EC_LIB); | ||
151 | goto err; | ||
152 | } | ||
153 | if (EC_METHOD_get_field_type(EC_GROUP_method_of(group)) == NID_X9_62_prime_field) | ||
154 | { | ||
155 | if (!EC_POINT_get_affine_coordinates_GFp(group, | ||
156 | tmp_point, X, NULL, ctx)) | ||
157 | { | ||
158 | ECDSAerr(ECDSA_F_ECDSA_SIGN_SETUP,ERR_R_EC_LIB); | ||
159 | goto err; | ||
160 | } | ||
161 | } | ||
162 | else /* NID_X9_62_characteristic_two_field */ | ||
163 | { | ||
164 | if (!EC_POINT_get_affine_coordinates_GF2m(group, | ||
165 | tmp_point, X, NULL, ctx)) | ||
166 | { | ||
167 | ECDSAerr(ECDSA_F_ECDSA_SIGN_SETUP,ERR_R_EC_LIB); | ||
168 | goto err; | ||
169 | } | ||
170 | } | ||
171 | if (!BN_nnmod(r, X, order, ctx)) | ||
172 | { | ||
173 | ECDSAerr(ECDSA_F_ECDSA_SIGN_SETUP, ERR_R_BN_LIB); | ||
174 | goto err; | ||
175 | } | ||
176 | } | ||
177 | while (BN_is_zero(r)); | ||
178 | |||
179 | /* compute the inverse of k */ | ||
180 | if (!BN_mod_inverse(k, k, order, ctx)) | ||
181 | { | ||
182 | ECDSAerr(ECDSA_F_ECDSA_SIGN_SETUP, ERR_R_BN_LIB); | ||
183 | goto err; | ||
184 | } | ||
185 | /* clear old values if necessary */ | ||
186 | if (*rp != NULL) | ||
187 | BN_clear_free(*rp); | ||
188 | if (*kinvp != NULL) | ||
189 | BN_clear_free(*kinvp); | ||
190 | /* save the pre-computed values */ | ||
191 | *rp = r; | ||
192 | *kinvp = k; | ||
193 | ret = 1; | ||
194 | err: | ||
195 | if (!ret) | ||
196 | { | ||
197 | if (k != NULL) BN_clear_free(k); | ||
198 | if (r != NULL) BN_clear_free(r); | ||
199 | } | ||
200 | if (ctx_in == NULL) | ||
201 | BN_CTX_free(ctx); | ||
202 | if (order != NULL) | ||
203 | BN_free(order); | ||
204 | if (tmp_point != NULL) | ||
205 | EC_POINT_free(tmp_point); | ||
206 | if (X) | ||
207 | BN_clear_free(X); | ||
208 | return(ret); | ||
209 | } | ||
210 | |||
211 | |||
212 | static ECDSA_SIG *ecdsa_do_sign(const unsigned char *dgst, int dgst_len, | ||
213 | const BIGNUM *in_kinv, const BIGNUM *in_r, EC_KEY *eckey) | ||
214 | { | ||
215 | int ok = 0; | ||
216 | BIGNUM *kinv=NULL, *s, *m=NULL,*tmp=NULL,*order=NULL; | ||
217 | const BIGNUM *ckinv; | ||
218 | BN_CTX *ctx = NULL; | ||
219 | const EC_GROUP *group; | ||
220 | ECDSA_SIG *ret; | ||
221 | ECDSA_DATA *ecdsa; | ||
222 | const BIGNUM *priv_key; | ||
223 | |||
224 | ecdsa = ecdsa_check(eckey); | ||
225 | group = EC_KEY_get0_group(eckey); | ||
226 | priv_key = EC_KEY_get0_private_key(eckey); | ||
227 | |||
228 | if (group == NULL || priv_key == NULL || ecdsa == NULL) | ||
229 | { | ||
230 | ECDSAerr(ECDSA_F_ECDSA_DO_SIGN, ERR_R_PASSED_NULL_PARAMETER); | ||
231 | return NULL; | ||
232 | } | ||
233 | |||
234 | ret = ECDSA_SIG_new(); | ||
235 | if (!ret) | ||
236 | { | ||
237 | ECDSAerr(ECDSA_F_ECDSA_DO_SIGN, ERR_R_MALLOC_FAILURE); | ||
238 | return NULL; | ||
239 | } | ||
240 | s = ret->s; | ||
241 | |||
242 | if ((ctx = BN_CTX_new()) == NULL || (order = BN_new()) == NULL || | ||
243 | (tmp = BN_new()) == NULL || (m = BN_new()) == NULL) | ||
244 | { | ||
245 | ECDSAerr(ECDSA_F_ECDSA_DO_SIGN, ERR_R_MALLOC_FAILURE); | ||
246 | goto err; | ||
247 | } | ||
248 | |||
249 | if (!EC_GROUP_get_order(group, order, ctx)) | ||
250 | { | ||
251 | ECDSAerr(ECDSA_F_ECDSA_DO_SIGN, ERR_R_EC_LIB); | ||
252 | goto err; | ||
253 | } | ||
254 | if (8 * dgst_len > BN_num_bits(order)) | ||
255 | { | ||
256 | /* XXX | ||
257 | * | ||
258 | * Should provide for optional hash truncation: | ||
259 | * Keep the BN_num_bits(order) leftmost bits of dgst | ||
260 | * (see March 2006 FIPS 186-3 draft, which has a few | ||
261 | * confusing errors in this part though) | ||
262 | */ | ||
263 | |||
264 | ECDSAerr(ECDSA_F_ECDSA_DO_SIGN, | ||
265 | ECDSA_R_DATA_TOO_LARGE_FOR_KEY_SIZE); | ||
266 | goto err; | ||
267 | } | ||
268 | |||
269 | if (!BN_bin2bn(dgst, dgst_len, m)) | ||
270 | { | ||
271 | ECDSAerr(ECDSA_F_ECDSA_DO_SIGN, ERR_R_BN_LIB); | ||
272 | goto err; | ||
273 | } | ||
274 | do | ||
275 | { | ||
276 | if (in_kinv == NULL || in_r == NULL) | ||
277 | { | ||
278 | if (!ECDSA_sign_setup(eckey, ctx, &kinv, &ret->r)) | ||
279 | { | ||
280 | ECDSAerr(ECDSA_F_ECDSA_DO_SIGN,ERR_R_ECDSA_LIB); | ||
281 | goto err; | ||
282 | } | ||
283 | ckinv = kinv; | ||
284 | } | ||
285 | else | ||
286 | { | ||
287 | ckinv = in_kinv; | ||
288 | if (BN_copy(ret->r, in_r) == NULL) | ||
289 | { | ||
290 | ECDSAerr(ECDSA_F_ECDSA_DO_SIGN, ERR_R_MALLOC_FAILURE); | ||
291 | goto err; | ||
292 | } | ||
293 | } | ||
294 | |||
295 | if (!BN_mod_mul(tmp, priv_key, ret->r, order, ctx)) | ||
296 | { | ||
297 | ECDSAerr(ECDSA_F_ECDSA_DO_SIGN, ERR_R_BN_LIB); | ||
298 | goto err; | ||
299 | } | ||
300 | if (!BN_mod_add_quick(s, tmp, m, order)) | ||
301 | { | ||
302 | ECDSAerr(ECDSA_F_ECDSA_DO_SIGN, ERR_R_BN_LIB); | ||
303 | goto err; | ||
304 | } | ||
305 | if (!BN_mod_mul(s, s, ckinv, order, ctx)) | ||
306 | { | ||
307 | ECDSAerr(ECDSA_F_ECDSA_DO_SIGN, ERR_R_BN_LIB); | ||
308 | goto err; | ||
309 | } | ||
310 | if (BN_is_zero(s)) | ||
311 | { | ||
312 | /* if kinv and r have been supplied by the caller | ||
313 | * don't to generate new kinv and r values */ | ||
314 | if (in_kinv != NULL && in_r != NULL) | ||
315 | { | ||
316 | ECDSAerr(ECDSA_F_ECDSA_DO_SIGN, ECDSA_R_NEED_NEW_SETUP_VALUES); | ||
317 | goto err; | ||
318 | } | ||
319 | } | ||
320 | else | ||
321 | /* s != 0 => we have a valid signature */ | ||
322 | break; | ||
323 | } | ||
324 | while (1); | ||
325 | |||
326 | ok = 1; | ||
327 | err: | ||
328 | if (!ok) | ||
329 | { | ||
330 | ECDSA_SIG_free(ret); | ||
331 | ret = NULL; | ||
332 | } | ||
333 | if (ctx) | ||
334 | BN_CTX_free(ctx); | ||
335 | if (m) | ||
336 | BN_clear_free(m); | ||
337 | if (tmp) | ||
338 | BN_clear_free(tmp); | ||
339 | if (order) | ||
340 | BN_free(order); | ||
341 | if (kinv) | ||
342 | BN_clear_free(kinv); | ||
343 | return ret; | ||
344 | } | ||
345 | |||
346 | static int ecdsa_do_verify(const unsigned char *dgst, int dgst_len, | ||
347 | const ECDSA_SIG *sig, EC_KEY *eckey) | ||
348 | { | ||
349 | int ret = -1; | ||
350 | BN_CTX *ctx; | ||
351 | BIGNUM *order, *u1, *u2, *m, *X; | ||
352 | EC_POINT *point = NULL; | ||
353 | const EC_GROUP *group; | ||
354 | const EC_POINT *pub_key; | ||
355 | |||
356 | /* check input values */ | ||
357 | if (eckey == NULL || (group = EC_KEY_get0_group(eckey)) == NULL || | ||
358 | (pub_key = EC_KEY_get0_public_key(eckey)) == NULL || sig == NULL) | ||
359 | { | ||
360 | ECDSAerr(ECDSA_F_ECDSA_DO_VERIFY, ECDSA_R_MISSING_PARAMETERS); | ||
361 | return -1; | ||
362 | } | ||
363 | |||
364 | ctx = BN_CTX_new(); | ||
365 | if (!ctx) | ||
366 | { | ||
367 | ECDSAerr(ECDSA_F_ECDSA_DO_VERIFY, ERR_R_MALLOC_FAILURE); | ||
368 | return -1; | ||
369 | } | ||
370 | BN_CTX_start(ctx); | ||
371 | order = BN_CTX_get(ctx); | ||
372 | u1 = BN_CTX_get(ctx); | ||
373 | u2 = BN_CTX_get(ctx); | ||
374 | m = BN_CTX_get(ctx); | ||
375 | X = BN_CTX_get(ctx); | ||
376 | if (!X) | ||
377 | { | ||
378 | ECDSAerr(ECDSA_F_ECDSA_DO_VERIFY, ERR_R_BN_LIB); | ||
379 | goto err; | ||
380 | } | ||
381 | |||
382 | if (!EC_GROUP_get_order(group, order, ctx)) | ||
383 | { | ||
384 | ECDSAerr(ECDSA_F_ECDSA_DO_VERIFY, ERR_R_EC_LIB); | ||
385 | goto err; | ||
386 | } | ||
387 | if (8 * dgst_len > BN_num_bits(order)) | ||
388 | { | ||
389 | /* XXX | ||
390 | * | ||
391 | * Should provide for optional hash truncation: | ||
392 | * Keep the BN_num_bits(order) leftmost bits of dgst | ||
393 | * (see March 2006 FIPS 186-3 draft, which has a few | ||
394 | * confusing errors in this part though) | ||
395 | */ | ||
396 | |||
397 | ECDSAerr(ECDSA_F_ECDSA_DO_VERIFY, | ||
398 | ECDSA_R_DATA_TOO_LARGE_FOR_KEY_SIZE); | ||
399 | ret = 0; | ||
400 | goto err; | ||
401 | } | ||
402 | |||
403 | if (BN_is_zero(sig->r) || BN_is_negative(sig->r) || | ||
404 | BN_ucmp(sig->r, order) >= 0 || BN_is_zero(sig->s) || | ||
405 | BN_is_negative(sig->s) || BN_ucmp(sig->s, order) >= 0) | ||
406 | { | ||
407 | ECDSAerr(ECDSA_F_ECDSA_DO_VERIFY, ECDSA_R_BAD_SIGNATURE); | ||
408 | ret = 0; /* signature is invalid */ | ||
409 | goto err; | ||
410 | } | ||
411 | /* calculate tmp1 = inv(S) mod order */ | ||
412 | if (!BN_mod_inverse(u2, sig->s, order, ctx)) | ||
413 | { | ||
414 | ECDSAerr(ECDSA_F_ECDSA_DO_VERIFY, ERR_R_BN_LIB); | ||
415 | goto err; | ||
416 | } | ||
417 | /* digest -> m */ | ||
418 | if (!BN_bin2bn(dgst, dgst_len, m)) | ||
419 | { | ||
420 | ECDSAerr(ECDSA_F_ECDSA_DO_VERIFY, ERR_R_BN_LIB); | ||
421 | goto err; | ||
422 | } | ||
423 | /* u1 = m * tmp mod order */ | ||
424 | if (!BN_mod_mul(u1, m, u2, order, ctx)) | ||
425 | { | ||
426 | ECDSAerr(ECDSA_F_ECDSA_DO_VERIFY, ERR_R_BN_LIB); | ||
427 | goto err; | ||
428 | } | ||
429 | /* u2 = r * w mod q */ | ||
430 | if (!BN_mod_mul(u2, sig->r, u2, order, ctx)) | ||
431 | { | ||
432 | ECDSAerr(ECDSA_F_ECDSA_DO_VERIFY, ERR_R_BN_LIB); | ||
433 | goto err; | ||
434 | } | ||
435 | |||
436 | if ((point = EC_POINT_new(group)) == NULL) | ||
437 | { | ||
438 | ECDSAerr(ECDSA_F_ECDSA_DO_VERIFY, ERR_R_MALLOC_FAILURE); | ||
439 | goto err; | ||
440 | } | ||
441 | if (!EC_POINT_mul(group, point, u1, pub_key, u2, ctx)) | ||
442 | { | ||
443 | ECDSAerr(ECDSA_F_ECDSA_DO_VERIFY, ERR_R_EC_LIB); | ||
444 | goto err; | ||
445 | } | ||
446 | if (EC_METHOD_get_field_type(EC_GROUP_method_of(group)) == NID_X9_62_prime_field) | ||
447 | { | ||
448 | if (!EC_POINT_get_affine_coordinates_GFp(group, | ||
449 | point, X, NULL, ctx)) | ||
450 | { | ||
451 | ECDSAerr(ECDSA_F_ECDSA_DO_VERIFY, ERR_R_EC_LIB); | ||
452 | goto err; | ||
453 | } | ||
454 | } | ||
455 | else /* NID_X9_62_characteristic_two_field */ | ||
456 | { | ||
457 | if (!EC_POINT_get_affine_coordinates_GF2m(group, | ||
458 | point, X, NULL, ctx)) | ||
459 | { | ||
460 | ECDSAerr(ECDSA_F_ECDSA_DO_VERIFY, ERR_R_EC_LIB); | ||
461 | goto err; | ||
462 | } | ||
463 | } | ||
464 | |||
465 | if (!BN_nnmod(u1, X, order, ctx)) | ||
466 | { | ||
467 | ECDSAerr(ECDSA_F_ECDSA_DO_VERIFY, ERR_R_BN_LIB); | ||
468 | goto err; | ||
469 | } | ||
470 | /* if the signature is correct u1 is equal to sig->r */ | ||
471 | ret = (BN_ucmp(u1, sig->r) == 0); | ||
472 | err: | ||
473 | BN_CTX_end(ctx); | ||
474 | BN_CTX_free(ctx); | ||
475 | if (point) | ||
476 | EC_POINT_free(point); | ||
477 | return ret; | ||
478 | } | ||
diff --git a/src/lib/libcrypto/ecdsa/ecs_sign.c b/src/lib/libcrypto/ecdsa/ecs_sign.c deleted file mode 100644 index 74b1fe8caf..0000000000 --- a/src/lib/libcrypto/ecdsa/ecs_sign.c +++ /dev/null | |||
@@ -1,104 +0,0 @@ | |||
1 | /* crypto/ecdsa/ecdsa_sign.c */ | ||
2 | /* ==================================================================== | ||
3 | * Copyright (c) 1998-2002 The OpenSSL Project. All rights reserved. | ||
4 | * | ||
5 | * Redistribution and use in source and binary forms, with or without | ||
6 | * modification, are permitted provided that the following conditions | ||
7 | * are met: | ||
8 | * | ||
9 | * 1. Redistributions of source code must retain the above copyright | ||
10 | * notice, this list of conditions and the following disclaimer. | ||
11 | * | ||
12 | * 2. Redistributions in binary form must reproduce the above copyright | ||
13 | * notice, this list of conditions and the following disclaimer in | ||
14 | * the documentation and/or other materials provided with the | ||
15 | * distribution. | ||
16 | * | ||
17 | * 3. All advertising materials mentioning features or use of this | ||
18 | * software must display the following acknowledgment: | ||
19 | * "This product includes software developed by the OpenSSL Project | ||
20 | * for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)" | ||
21 | * | ||
22 | * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to | ||
23 | * endorse or promote products derived from this software without | ||
24 | * prior written permission. For written permission, please contact | ||
25 | * openssl-core@OpenSSL.org. | ||
26 | * | ||
27 | * 5. Products derived from this software may not be called "OpenSSL" | ||
28 | * nor may "OpenSSL" appear in their names without prior written | ||
29 | * permission of the OpenSSL Project. | ||
30 | * | ||
31 | * 6. Redistributions of any form whatsoever must retain the following | ||
32 | * acknowledgment: | ||
33 | * "This product includes software developed by the OpenSSL Project | ||
34 | * for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)" | ||
35 | * | ||
36 | * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY | ||
37 | * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | ||
38 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR | ||
39 | * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR | ||
40 | * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, | ||
41 | * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT | ||
42 | * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; | ||
43 | * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | ||
44 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, | ||
45 | * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) | ||
46 | * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | ||
47 | * OF THE POSSIBILITY OF SUCH DAMAGE. | ||
48 | * ==================================================================== | ||
49 | * | ||
50 | * This product includes cryptographic software written by Eric Young | ||
51 | * (eay@cryptsoft.com). This product includes software written by Tim | ||
52 | * Hudson (tjh@cryptsoft.com). | ||
53 | * | ||
54 | */ | ||
55 | |||
56 | #include "ecs_locl.h" | ||
57 | #ifndef OPENSSL_NO_ENGINE | ||
58 | #include <openssl/engine.h> | ||
59 | #endif | ||
60 | |||
61 | ECDSA_SIG *ECDSA_do_sign(const unsigned char *dgst, int dlen, EC_KEY *eckey) | ||
62 | { | ||
63 | return ECDSA_do_sign_ex(dgst, dlen, NULL, NULL, eckey); | ||
64 | } | ||
65 | |||
66 | ECDSA_SIG *ECDSA_do_sign_ex(const unsigned char *dgst, int dlen, | ||
67 | const BIGNUM *kinv, const BIGNUM *rp, EC_KEY *eckey) | ||
68 | { | ||
69 | ECDSA_DATA *ecdsa = ecdsa_check(eckey); | ||
70 | if (ecdsa == NULL) | ||
71 | return NULL; | ||
72 | return ecdsa->meth->ecdsa_do_sign(dgst, dlen, kinv, rp, eckey); | ||
73 | } | ||
74 | |||
75 | int ECDSA_sign(int type, const unsigned char *dgst, int dlen, unsigned char | ||
76 | *sig, unsigned int *siglen, EC_KEY *eckey) | ||
77 | { | ||
78 | return ECDSA_sign_ex(type, dgst, dlen, sig, siglen, NULL, NULL, eckey); | ||
79 | } | ||
80 | |||
81 | int ECDSA_sign_ex(int type, const unsigned char *dgst, int dlen, unsigned char | ||
82 | *sig, unsigned int *siglen, const BIGNUM *kinv, const BIGNUM *r, | ||
83 | EC_KEY *eckey) | ||
84 | { | ||
85 | ECDSA_SIG *s; | ||
86 | s = ECDSA_do_sign_ex(dgst, dlen, kinv, r, eckey); | ||
87 | if (s == NULL) | ||
88 | { | ||
89 | *siglen=0; | ||
90 | return 0; | ||
91 | } | ||
92 | *siglen = i2d_ECDSA_SIG(s, &sig); | ||
93 | ECDSA_SIG_free(s); | ||
94 | return 1; | ||
95 | } | ||
96 | |||
97 | int ECDSA_sign_setup(EC_KEY *eckey, BN_CTX *ctx_in, BIGNUM **kinvp, | ||
98 | BIGNUM **rp) | ||
99 | { | ||
100 | ECDSA_DATA *ecdsa = ecdsa_check(eckey); | ||
101 | if (ecdsa == NULL) | ||
102 | return 0; | ||
103 | return ecdsa->meth->ecdsa_sign_setup(eckey, ctx_in, kinvp, rp); | ||
104 | } | ||
diff --git a/src/lib/libcrypto/ecdsa/ecs_vrf.c b/src/lib/libcrypto/ecdsa/ecs_vrf.c deleted file mode 100644 index ef9acf7b61..0000000000 --- a/src/lib/libcrypto/ecdsa/ecs_vrf.c +++ /dev/null | |||
@@ -1,96 +0,0 @@ | |||
1 | /* crypto/ecdsa/ecdsa_vrf.c */ | ||
2 | /* | ||
3 | * Written by Nils Larsch for the OpenSSL project | ||
4 | */ | ||
5 | /* ==================================================================== | ||
6 | * Copyright (c) 1998-2002 The OpenSSL Project. All rights reserved. | ||
7 | * | ||
8 | * Redistribution and use in source and binary forms, with or without | ||
9 | * modification, are permitted provided that the following conditions | ||
10 | * are met: | ||
11 | * | ||
12 | * 1. Redistributions of source code must retain the above copyright | ||
13 | * notice, this list of conditions and the following disclaimer. | ||
14 | * | ||
15 | * 2. Redistributions in binary form must reproduce the above copyright | ||
16 | * notice, this list of conditions and the following disclaimer in | ||
17 | * the documentation and/or other materials provided with the | ||
18 | * distribution. | ||
19 | * | ||
20 | * 3. All advertising materials mentioning features or use of this | ||
21 | * software must display the following acknowledgment: | ||
22 | * "This product includes software developed by the OpenSSL Project | ||
23 | * for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)" | ||
24 | * | ||
25 | * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to | ||
26 | * endorse or promote products derived from this software without | ||
27 | * prior written permission. For written permission, please contact | ||
28 | * openssl-core@OpenSSL.org. | ||
29 | * | ||
30 | * 5. Products derived from this software may not be called "OpenSSL" | ||
31 | * nor may "OpenSSL" appear in their names without prior written | ||
32 | * permission of the OpenSSL Project. | ||
33 | * | ||
34 | * 6. Redistributions of any form whatsoever must retain the following | ||
35 | * acknowledgment: | ||
36 | * "This product includes software developed by the OpenSSL Project | ||
37 | * for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)" | ||
38 | * | ||
39 | * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY | ||
40 | * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | ||
41 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR | ||
42 | * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR | ||
43 | * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, | ||
44 | * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT | ||
45 | * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; | ||
46 | * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | ||
47 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, | ||
48 | * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) | ||
49 | * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | ||
50 | * OF THE POSSIBILITY OF SUCH DAMAGE. | ||
51 | * ==================================================================== | ||
52 | * | ||
53 | * This product includes cryptographic software written by Eric Young | ||
54 | * (eay@cryptsoft.com). This product includes software written by Tim | ||
55 | * Hudson (tjh@cryptsoft.com). | ||
56 | * | ||
57 | */ | ||
58 | |||
59 | #include "ecs_locl.h" | ||
60 | #ifndef OPENSSL_NO_ENGINE | ||
61 | #include <openssl/engine.h> | ||
62 | #endif | ||
63 | |||
64 | /* returns | ||
65 | * 1: correct signature | ||
66 | * 0: incorrect signature | ||
67 | * -1: error | ||
68 | */ | ||
69 | int ECDSA_do_verify(const unsigned char *dgst, int dgst_len, | ||
70 | const ECDSA_SIG *sig, EC_KEY *eckey) | ||
71 | { | ||
72 | ECDSA_DATA *ecdsa = ecdsa_check(eckey); | ||
73 | if (ecdsa == NULL) | ||
74 | return 0; | ||
75 | return ecdsa->meth->ecdsa_do_verify(dgst, dgst_len, sig, eckey); | ||
76 | } | ||
77 | |||
78 | /* returns | ||
79 | * 1: correct signature | ||
80 | * 0: incorrect signature | ||
81 | * -1: error | ||
82 | */ | ||
83 | int ECDSA_verify(int type, const unsigned char *dgst, int dgst_len, | ||
84 | const unsigned char *sigbuf, int sig_len, EC_KEY *eckey) | ||
85 | { | ||
86 | ECDSA_SIG *s; | ||
87 | int ret=-1; | ||
88 | |||
89 | s = ECDSA_SIG_new(); | ||
90 | if (s == NULL) return(ret); | ||
91 | if (d2i_ECDSA_SIG(&s, &sigbuf, sig_len) == NULL) goto err; | ||
92 | ret=ECDSA_do_verify(dgst, dgst_len, s, eckey); | ||
93 | err: | ||
94 | ECDSA_SIG_free(s); | ||
95 | return(ret); | ||
96 | } | ||