Merge pull request #3963 from dgarske/nxp_ltc_rsa

Fixes for NXP LTC ECC/RSA
This commit is contained in:
Sean Parkinson
2021-06-14 08:29:24 +10:00
committed by GitHub
7 changed files with 418 additions and 198 deletions

View File

@ -2288,7 +2288,7 @@ int ecc_projective_dbl_point(ecc_point *P, ecc_point *R, mp_int* a,
#endif #endif
} }
#if !defined(FREESCALE_LTC_ECC) && !defined(WOLFSSL_STM32_PKA)
/** /**
Map a projective Jacobian point back to affine space Map a projective Jacobian point back to affine space
P [in/out] The point to map P [in/out] The point to map
@ -2507,6 +2507,7 @@ done:
return ECC_BAD_ARG_E; return ECC_BAD_ARG_E;
#endif #endif
} }
#endif /* !FREESCALE_LTC_ECC && !WOLFSSL_STM32_PKA */
int ecc_map(ecc_point* P, mp_int* modulus, mp_digit mp) int ecc_map(ecc_point* P, mp_int* modulus, mp_digit mp)
{ {
@ -4473,14 +4474,10 @@ static int ecc_make_pub_ex(ecc_key* key, ecc_curve_spec* curveIn,
err = MEMORY_E; err = MEMORY_E;
} }
} }
#ifndef FREESCALE_LTC_ECC /* this is done in hardware */
if (err == MP_OKAY) { if (err == MP_OKAY) {
/* Use constant time map if compiled in */ /* Use constant time map if compiled in */
err = ecc_map_ex(pub, curve->prime, mp, 1); err = ecc_map_ex(pub, curve->prime, mp, 1);
} }
#else
(void)mp;
#endif
wc_ecc_del_point_ex(base, key->heap); wc_ecc_del_point_ex(base, key->heap);
} }

View File

@ -1451,7 +1451,7 @@ int mp_is_bit_set (mp_int *a, mp_digit b)
mp_digit s = b % DIGIT_BIT; /* bit index */ mp_digit s = b % DIGIT_BIT; /* bit index */
if ((mp_digit)a->used <= i) { if ((mp_digit)a->used <= i) {
/* no words avaialable at that bit count */ /* no words available at that bit count */
return 0; return 0;
} }

View File

@ -127,7 +127,7 @@ static int Transform(wc_Md5* md5, const byte* data)
#ifdef FREESCALE_MMCAU_CLASSIC_SHA #ifdef FREESCALE_MMCAU_CLASSIC_SHA
cau_md5_hash_n((byte*)data, 1, (unsigned char*)md5->digest); cau_md5_hash_n((byte*)data, 1, (unsigned char*)md5->digest);
#else #else
MMCAU_MD5_HashN((byte*)data, 1, (word32*)md5->digest); MMCAU_MD5_HashN((byte*)data, 1, (uint32_t*)md5->digest);
#endif #endif
wolfSSL_CryptHwMutexUnLock(); wolfSSL_CryptHwMutexUnLock();
} }
@ -148,7 +148,7 @@ static int Transform_Len(wc_Md5* md5, const byte* data, word32 len)
#ifdef FREESCALE_MMCAU_CLASSIC_SHA #ifdef FREESCALE_MMCAU_CLASSIC_SHA
cau_md5_hash_n(local, 1, (unsigned char*)md5->digest); cau_md5_hash_n(local, 1, (unsigned char*)md5->digest);
#else #else
MMCAU_MD5_HashN(local, 1, (word32*)md5->digest); MMCAU_MD5_HashN(local, 1, (uint32_t*)md5->digest);
#endif #endif
data += WC_MD5_BLOCK_SIZE; data += WC_MD5_BLOCK_SIZE;
len -= WC_MD5_BLOCK_SIZE; len -= WC_MD5_BLOCK_SIZE;
@ -162,7 +162,7 @@ static int Transform_Len(wc_Md5* md5, const byte* data, word32 len)
(unsigned char*)md5->digest); (unsigned char*)md5->digest);
#else #else
MMCAU_MD5_HashN((byte*)data, len / WC_MD5_BLOCK_SIZE, MMCAU_MD5_HashN((byte*)data, len / WC_MD5_BLOCK_SIZE,
(word32*)md5->digest); (uint32_t*)md5->digest);
#endif #endif
} }
wolfSSL_CryptHwMutexUnLock(); wolfSSL_CryptHwMutexUnLock();

View File

@ -42,6 +42,11 @@
#define ERROR_OUT(res) { ret = (res); goto done; } #define ERROR_OUT(res) { ret = (res); goto done; }
/* For debugging only - Enable this to do software tests of each operation */
/* #define ENABLE_NXPLTC_TESTS */
#ifdef ENABLE_NXPLTC_TESTS
static int doLtcTest = 0;
#endif
int ksdk_port_init(void) int ksdk_port_init(void)
{ {
@ -95,7 +100,8 @@ static int ltc_get_lsb_bin_from_mp_int(uint8_t *dst, mp_int *A, uint16_t *psz)
sz = mp_unsigned_bin_size(A); sz = mp_unsigned_bin_size(A);
#ifndef WOLFSSL_SP_MATH #ifndef WOLFSSL_SP_MATH
res = mp_to_unsigned_lsb_bin(A, dst); /* result is lsbyte at lowest addr as required by LTC */ /* result is lsbyte at lowest addr as required by LTC */
res = mp_to_unsigned_lsb_bin(A, dst);
#else #else
res = mp_to_unsigned_bin(A, dst); res = mp_to_unsigned_bin(A, dst);
if (res == MP_OKAY) { if (res == MP_OKAY) {
@ -109,58 +115,86 @@ static int ltc_get_lsb_bin_from_mp_int(uint8_t *dst, mp_int *A, uint16_t *psz)
/* LTC TFM */ /* LTC TFM */
#if defined(FREESCALE_LTC_TFM) #if defined(FREESCALE_LTC_TFM)
/* these function are used by wolfSSL upper layers (like RSA) */ /* these function are used by wolfSSL upper layers (like RSA) */
/* c = a * b */ /* c = a * b */
int mp_mul(mp_int *A, mp_int *B, mp_int *C) int mp_mul(mp_int *A, mp_int *B, mp_int *C)
{ {
int res = MP_OKAY; int res = MP_OKAY;
status_t status;
int szA, szB; int szA, szB;
#ifdef ENABLE_NXPLTC_TESTS
mp_int t;
mp_init(&t);
if (doLtcTest)
wolfcrypt_mp_mul(A, B, &t);
#endif
szA = mp_unsigned_bin_size(A); szA = mp_unsigned_bin_size(A);
szB = mp_unsigned_bin_size(B); szB = mp_unsigned_bin_size(B);
/* if unsigned mul can fit into LTC PKHA let's use it, otherwise call software mul */ /* if unsigned mul can fit into LTC PKHA let's use it, otherwise call
* software mul */
if ((szA <= LTC_MAX_INT_BYTES / 2) && (szB <= LTC_MAX_INT_BYTES / 2)) { if ((szA <= LTC_MAX_INT_BYTES / 2) && (szB <= LTC_MAX_INT_BYTES / 2)) {
int neg = 0; uint8_t *ptrA = (uint8_t*)XMALLOC(LTC_MAX_INT_BYTES, NULL,
DYNAMIC_TYPE_BIGINT);
#ifndef WOLFSSL_SP_MATH uint8_t *ptrB = (uint8_t*)XMALLOC(LTC_MAX_INT_BYTES, NULL,
neg = (A->sign == B->sign) ? MP_ZPOS : MP_NEG; DYNAMIC_TYPE_BIGINT);
#endif uint8_t *ptrN = (uint8_t*)XMALLOC(LTC_MAX_INT_BYTES, NULL,
DYNAMIC_TYPE_BIGINT);
uint8_t *ptrC = (uint8_t*)XMALLOC(LTC_MAX_INT_BYTES, NULL,
DYNAMIC_TYPE_BIGINT);
/* unsigned multiply */ /* unsigned multiply */
uint8_t *ptrA = (uint8_t *)XMALLOC(LTC_MAX_INT_BYTES, NULL, DYNAMIC_TYPE_BIGINT); #if (!defined(WOLFSSL_SP_MATH) && !defined(WOLFSSL_SP_MATH_ALL)) || \
uint8_t *ptrB = (uint8_t *)XMALLOC(LTC_MAX_INT_BYTES, NULL, DYNAMIC_TYPE_BIGINT); defined(WOLFSSL_SP_INT_NEGATIVE)
uint8_t *ptrC = (uint8_t *)XMALLOC(LTC_MAX_INT_BYTES, NULL, DYNAMIC_TYPE_BIGINT); int neg = (A->sign == B->sign) ? MP_ZPOS : MP_NEG;
#endif
if (ptrA && ptrB && ptrC) { if (ptrA && ptrB && ptrN && ptrC) {
uint16_t sizeA, sizeB; uint16_t sizeA, sizeB, sizeN, sizeC = 0;
res = ltc_get_lsb_bin_from_mp_int(ptrA, A, &sizeA); res = ltc_get_lsb_bin_from_mp_int(ptrA, A, &sizeA);
if (res == MP_OKAY) if (res == MP_OKAY)
res = ltc_get_lsb_bin_from_mp_int(ptrB, B, &sizeB); res = ltc_get_lsb_bin_from_mp_int(ptrB, B, &sizeB);
if (res == MP_OKAY) { if (res == MP_OKAY) {
XMEMSET(ptrC, 0xFF, LTC_MAX_INT_BYTES); sizeN = sizeA + sizeB;
XMEMSET(ptrN, 0xFF, sizeN);
XMEMSET(ptrC, 0, LTC_MAX_INT_BYTES);
LTC_PKHA_ModMul(LTC_BASE, ptrA, sizeA, ptrB, sizeB, ptrC, LTC_MAX_INT_BYTES, ptrB, &sizeB, status = LTC_PKHA_ModMul(LTC_BASE,
kLTC_PKHA_IntegerArith, kLTC_PKHA_NormalValue, kLTC_PKHA_NormalValue, ptrA, sizeA, /* first integer */
kLTC_PKHA_TimingEqualized); ptrB, sizeB, /* second integer */
ptrN, sizeN, /* modulus */
ptrC, &sizeC, /* out */
kLTC_PKHA_IntegerArith, kLTC_PKHA_NormalValue,
kLTC_PKHA_NormalValue, kLTC_PKHA_TimingEqualized);
if (status == kStatus_Success) {
ltc_reverse_array(ptrC, sizeC);
res = mp_read_unsigned_bin(C, ptrC, sizeC);
ltc_reverse_array(ptrB, sizeB); #if (!defined(WOLFSSL_SP_MATH) && !defined(WOLFSSL_SP_MATH_ALL)) || \
res = mp_read_unsigned_bin(C, ptrB, sizeB); defined(WOLFSSL_SP_INT_NEGATIVE)
/* fix sign */
C->sign = neg;
#endif
}
else {
res = MP_VAL;
}
} }
} }
#ifndef WOLFSSL_SP_MATH
/* fix sign */
C->sign = neg;
#endif
if (ptrA) { if (ptrA) {
XFREE(ptrA, NULL, DYNAMIC_TYPE_BIGINT); XFREE(ptrA, NULL, DYNAMIC_TYPE_BIGINT);
} }
if (ptrB) { if (ptrB) {
XFREE(ptrB, NULL, DYNAMIC_TYPE_BIGINT); XFREE(ptrB, NULL, DYNAMIC_TYPE_BIGINT);
} }
if (ptrN) {
XFREE(ptrN, NULL, DYNAMIC_TYPE_BIGINT);
}
if (ptrC) { if (ptrC) {
XFREE(ptrC, NULL, DYNAMIC_TYPE_BIGINT); XFREE(ptrC, NULL, DYNAMIC_TYPE_BIGINT);
} }
@ -172,6 +206,18 @@ int mp_mul(mp_int *A, mp_int *B, mp_int *C)
res = wolfcrypt_mp_mul(A, B, C); res = wolfcrypt_mp_mul(A, B, C);
#endif #endif
} }
#ifdef ENABLE_NXPLTC_TESTS
/* compare hardware vs software */
if (doLtcTest && mp_cmp(&t, C) != MP_EQ) {
printf("mp_mul test fail!\n");
mp_dump("C", C, 0);
mp_dump("C soft", &t, 0);
}
mp_clear(&t);
#endif
return res; return res;
} }
@ -180,18 +226,28 @@ int mp_mod(mp_int *a, mp_int *b, mp_int *c)
{ {
int res = MP_OKAY; int res = MP_OKAY;
int szA, szB; int szA, szB;
#ifdef ENABLE_NXPLTC_TESTS
mp_int t;
mp_init(&t);
if (doLtcTest)
wolfcrypt_mp_mod(a, b, &t);
#endif
szA = mp_unsigned_bin_size(a); szA = mp_unsigned_bin_size(a);
szB = mp_unsigned_bin_size(b); szB = mp_unsigned_bin_size(b);
if ((szA <= LTC_MAX_INT_BYTES) && (szB <= LTC_MAX_INT_BYTES)) if ((szA <= LTC_MAX_INT_BYTES) && (szB <= LTC_MAX_INT_BYTES)) {
{ uint8_t *ptrA = (uint8_t*)XMALLOC(LTC_MAX_INT_BYTES, NULL,
int neg = 0; DYNAMIC_TYPE_BIGINT);
uint8_t *ptrA = (uint8_t *)XMALLOC(LTC_MAX_INT_BYTES, NULL, DYNAMIC_TYPE_BIGINT); uint8_t *ptrB = (uint8_t*)XMALLOC(LTC_MAX_INT_BYTES, NULL,
uint8_t *ptrB = (uint8_t *)XMALLOC(LTC_MAX_INT_BYTES, NULL, DYNAMIC_TYPE_BIGINT); DYNAMIC_TYPE_BIGINT);
uint8_t *ptrC = (uint8_t *)XMALLOC(LTC_MAX_INT_BYTES, NULL, DYNAMIC_TYPE_BIGINT); uint8_t *ptrC = (uint8_t*)XMALLOC(LTC_MAX_INT_BYTES, NULL,
DYNAMIC_TYPE_BIGINT);
#ifndef WOLFSSL_SP_MATH #if (!defined(WOLFSSL_SP_MATH) && !defined(WOLFSSL_SP_MATH_ALL)) || \
defined(WOLFSSL_SP_INT_NEGATIVE)
/* get sign for the result */ /* get sign for the result */
neg = (a->sign == b->sign) ? MP_ZPOS : MP_NEG; int neg = (a->sign == b->sign) ? MP_ZPOS : MP_NEG;
#endif #endif
/* get remainder of unsigned a divided by unsigned b */ /* get remainder of unsigned a divided by unsigned b */
@ -203,10 +259,17 @@ int mp_mod(mp_int *a, mp_int *b, mp_int *c)
res = ltc_get_lsb_bin_from_mp_int(ptrB, b, &sizeB); res = ltc_get_lsb_bin_from_mp_int(ptrB, b, &sizeB);
if (res == MP_OKAY) { if (res == MP_OKAY) {
if (kStatus_Success == if (kStatus_Success ==
LTC_PKHA_ModRed(LTC_BASE, ptrA, sizeA, ptrB, sizeB, ptrC, &sizeC, kLTC_PKHA_IntegerArith)) LTC_PKHA_ModRed(LTC_BASE, ptrA, sizeA, ptrB, sizeB, ptrC,
&sizeC, kLTC_PKHA_IntegerArith))
{ {
ltc_reverse_array(ptrC, sizeC); ltc_reverse_array(ptrC, sizeC);
res = mp_read_unsigned_bin(c, ptrC, sizeC); res = mp_read_unsigned_bin(c, ptrC, sizeC);
#if (!defined(WOLFSSL_SP_MATH) && !defined(WOLFSSL_SP_MATH_ALL)) || \
defined(WOLFSSL_SP_INT_NEGATIVE)
/* fix sign */
c->sign = neg;
#endif
} }
else { else {
res = MP_VAL; res = MP_VAL;
@ -217,11 +280,6 @@ int mp_mod(mp_int *a, mp_int *b, mp_int *c)
res = MP_MEM; res = MP_MEM;
} }
#ifndef WOLFSSL_SP_MATH
/* fix sign */
c->sign = neg;
#endif
if (ptrA) { if (ptrA) {
XFREE(ptrA, NULL, DYNAMIC_TYPE_BIGINT); XFREE(ptrA, NULL, DYNAMIC_TYPE_BIGINT);
} }
@ -240,6 +298,17 @@ int mp_mod(mp_int *a, mp_int *b, mp_int *c)
#endif #endif
} }
#ifdef ENABLE_NXPLTC_TESTS
/* compare hardware vs software */
if (doLtcTest && mp_cmp(&t, c) != MP_EQ) {
printf("mp_mod test fail!\n");
mp_dump("C", c, 0);
mp_dump("C soft", &t, 0);
}
mp_clear(&t);
#endif
return res; return res;
} }
@ -248,12 +317,23 @@ int mp_invmod(mp_int *a, mp_int *b, mp_int *c)
{ {
int res = MP_OKAY; int res = MP_OKAY;
int szA, szB; int szA, szB;
#ifdef ENABLE_NXPLTC_TESTS
mp_int t;
mp_init(&t);
if (doLtcTest)
wolfcrypt_mp_invmod(a, b, &t);
#endif
szA = mp_unsigned_bin_size(a); szA = mp_unsigned_bin_size(a);
szB = mp_unsigned_bin_size(b); szB = mp_unsigned_bin_size(b);
if ((szA <= LTC_MAX_INT_BYTES) && (szB <= LTC_MAX_INT_BYTES)) { if ((szA <= LTC_MAX_INT_BYTES) && (szB <= LTC_MAX_INT_BYTES)) {
uint8_t *ptrA = (uint8_t *)XMALLOC(LTC_MAX_INT_BYTES, NULL, DYNAMIC_TYPE_BIGINT); uint8_t *ptrA = (uint8_t*)XMALLOC(LTC_MAX_INT_BYTES, NULL,
uint8_t *ptrB = (uint8_t *)XMALLOC(LTC_MAX_INT_BYTES, NULL, DYNAMIC_TYPE_BIGINT); DYNAMIC_TYPE_BIGINT);
uint8_t *ptrC = (uint8_t *)XMALLOC(LTC_MAX_INT_BYTES, NULL, DYNAMIC_TYPE_BIGINT); uint8_t *ptrB = (uint8_t*)XMALLOC(LTC_MAX_INT_BYTES, NULL,
DYNAMIC_TYPE_BIGINT);
uint8_t *ptrC = (uint8_t*)XMALLOC(LTC_MAX_INT_BYTES, NULL,
DYNAMIC_TYPE_BIGINT);
if (ptrA && ptrB && ptrC) { if (ptrA && ptrB && ptrC) {
uint16_t sizeA, sizeB, sizeC; uint16_t sizeA, sizeB, sizeC;
@ -261,12 +341,27 @@ int mp_invmod(mp_int *a, mp_int *b, mp_int *c)
res = ltc_get_lsb_bin_from_mp_int(ptrA, a, &sizeA); res = ltc_get_lsb_bin_from_mp_int(ptrA, a, &sizeA);
if (res == MP_OKAY) if (res == MP_OKAY)
res = ltc_get_lsb_bin_from_mp_int(ptrB, b, &sizeB); res = ltc_get_lsb_bin_from_mp_int(ptrB, b, &sizeB);
/* if a >= b then reduce */
/* TODO: Perhaps always do mod reduce depending on hardware performance */
if (res == MP_OKAY &&
LTC_PKHA_CompareBigNum(ptrA, sizeA, ptrB, sizeB) >= 0) {
if (LTC_PKHA_ModRed(LTC_BASE, ptrA, sizeA, ptrB, sizeB,
ptrA, &sizeA, kLTC_PKHA_IntegerArith) != kStatus_Success) {
res = MP_VAL;
}
}
if (res == MP_OKAY) { if (res == MP_OKAY) {
if (kStatus_Success == if (LTC_PKHA_ModInv(LTC_BASE, ptrA, sizeA, ptrB, sizeB, ptrC,
LTC_PKHA_ModInv(LTC_BASE, ptrA, sizeA, ptrB, sizeB, ptrC, &sizeC, kLTC_PKHA_IntegerArith)) &sizeC, kLTC_PKHA_IntegerArith) == kStatus_Success) {
{
ltc_reverse_array(ptrC, sizeC); ltc_reverse_array(ptrC, sizeC);
res = mp_read_unsigned_bin(c, ptrC, sizeC); res = mp_read_unsigned_bin(c, ptrC, sizeC);
#if (!defined(WOLFSSL_SP_MATH) && !defined(WOLFSSL_SP_MATH_ALL)) || \
defined(WOLFSSL_SP_INT_NEGATIVE)
c->sign = a->sign;
#endif
} }
else { else {
res = MP_VAL; res = MP_VAL;
@ -277,9 +372,6 @@ int mp_invmod(mp_int *a, mp_int *b, mp_int *c)
res = MP_MEM; res = MP_MEM;
} }
#ifndef WOLFSSL_SP_MATH
c->sign = a->sign;
#endif
if (ptrA) { if (ptrA) {
XFREE(ptrA, NULL, DYNAMIC_TYPE_BIGINT); XFREE(ptrA, NULL, DYNAMIC_TYPE_BIGINT);
} }
@ -297,6 +389,18 @@ int mp_invmod(mp_int *a, mp_int *b, mp_int *c)
res = NOT_COMPILED_IN; res = NOT_COMPILED_IN;
#endif #endif
} }
#ifdef ENABLE_NXPLTC_TESTS
/* compare hardware vs software */
if (doLtcTest && mp_cmp(&t, c) != MP_EQ) {
printf("mp_invmod test fail!\n");
mp_dump("C", c, 0);
mp_dump("C soft", &t, 0);
}
mp_clear(&t);
#endif
return res; return res;
} }
@ -304,77 +408,81 @@ int mp_invmod(mp_int *a, mp_int *b, mp_int *c)
int mp_mulmod(mp_int *a, mp_int *b, mp_int *c, mp_int *d) int mp_mulmod(mp_int *a, mp_int *b, mp_int *c, mp_int *d)
{ {
int res = MP_OKAY; int res = MP_OKAY;
status_t status;
int szA, szB, szC; int szA, szB, szC;
#ifdef ENABLE_NXPLTC_TESTS
mp_int t;
mp_init(&t);
if (doLtcTest)
wolfcrypt_mp_mulmod(a, b, c, &t);
#endif
szA = mp_unsigned_bin_size(a); szA = mp_unsigned_bin_size(a);
szB = mp_unsigned_bin_size(b); szB = mp_unsigned_bin_size(b);
szC = mp_unsigned_bin_size(c); szC = mp_unsigned_bin_size(c);
if ((szA <= LTC_MAX_INT_BYTES) && (szB <= LTC_MAX_INT_BYTES) && (szC <= LTC_MAX_INT_BYTES)) {
mp_int t;
uint8_t *ptrA = (uint8_t *)XMALLOC(LTC_MAX_INT_BYTES, NULL, DYNAMIC_TYPE_BIGINT); if ((szA <= LTC_MAX_INT_BYTES) && (szB <= LTC_MAX_INT_BYTES) &&
uint8_t *ptrB = (uint8_t *)XMALLOC(LTC_MAX_INT_BYTES, NULL, DYNAMIC_TYPE_BIGINT); (szC <= LTC_MAX_INT_BYTES))
uint8_t *ptrC = (uint8_t *)XMALLOC(LTC_MAX_INT_BYTES, NULL, DYNAMIC_TYPE_BIGINT); {
uint8_t *ptrD = (uint8_t *)XMALLOC(LTC_MAX_INT_BYTES, NULL, DYNAMIC_TYPE_BIGINT); uint8_t *ptrA, *ptrB, *ptrC, *ptrD;
/* if A or B is negative, subtract abs(A) or abs(B) from modulus to get ptrA = (uint8_t*)XMALLOC(LTC_MAX_INT_BYTES, NULL, DYNAMIC_TYPE_BIGINT);
* positive integer representation of the same number */ ptrB = (uint8_t*)XMALLOC(LTC_MAX_INT_BYTES, NULL, DYNAMIC_TYPE_BIGINT);
res = mp_init(&t); ptrC = (uint8_t*)XMALLOC(LTC_MAX_INT_BYTES, NULL, DYNAMIC_TYPE_BIGINT);
#ifndef WOLFSSL_SP_MATH ptrD = (uint8_t*)XMALLOC(LTC_MAX_INT_BYTES, NULL, DYNAMIC_TYPE_BIGINT);
if (a->sign) {
if (res == MP_OKAY) /* unsigned multiply */
res = mp_add(a, c, &t); #if (!defined(WOLFSSL_SP_MATH) && !defined(WOLFSSL_SP_MATH_ALL)) || \
if (res == MP_OKAY) defined(WOLFSSL_SP_INT_NEGATIVE)
res = mp_copy(&t, a); int neg = (a->sign == b->sign) ? MP_ZPOS : MP_NEG;
}
if (b->sign) {
if (res == MP_OKAY)
res = mp_add(b, c, &t);
if (res == MP_OKAY)
res = mp_copy(&t, b);
}
#endif #endif
if (res == MP_OKAY && ptrA && ptrB && ptrC && ptrD) { if (ptrA && ptrB && ptrC && ptrD) {
uint16_t sizeA, sizeB, sizeC, sizeD; uint16_t sizeA, sizeB, sizeC, sizeD = 0;
/* Multiply A * B = D */
res = ltc_get_lsb_bin_from_mp_int(ptrA, a, &sizeA); res = ltc_get_lsb_bin_from_mp_int(ptrA, a, &sizeA);
if (res == MP_OKAY) if (res == MP_OKAY)
res = ltc_get_lsb_bin_from_mp_int(ptrB, b, &sizeB); res = ltc_get_lsb_bin_from_mp_int(ptrB, b, &sizeB);
if (res == MP_OKAY) {
/* modulus C is all F's for integer multiply */
sizeC = sizeA + sizeB;
XMEMSET(ptrC, 0xFF, sizeC);
XMEMSET(ptrD, 0, LTC_MAX_INT_BYTES);
status = LTC_PKHA_ModMul(LTC_BASE,
ptrA, sizeA, /* first integer */
ptrB, sizeB, /* second integer */
ptrC, sizeC, /* modulus */
ptrD, &sizeD, /* out */
kLTC_PKHA_IntegerArith, kLTC_PKHA_NormalValue,
kLTC_PKHA_NormalValue, kLTC_PKHA_TimingEqualized);
if (status != kStatus_Success)
res = MP_VAL;
}
/* load modulus */
if (res == MP_OKAY) if (res == MP_OKAY)
res = ltc_get_lsb_bin_from_mp_int(ptrC, c, &sizeC); res = ltc_get_lsb_bin_from_mp_int(ptrC, c, &sizeC);
/* perform D mod C = D */
/* (A*B)mod C = ((A mod C) * (B mod C)) mod C */
if (res == MP_OKAY && LTC_PKHA_CompareBigNum(ptrA, sizeA, ptrC, sizeC) >= 0) {
if (kStatus_Success !=
LTC_PKHA_ModRed(LTC_BASE, ptrA, sizeA, ptrC, sizeC, ptrA,
&sizeA, kLTC_PKHA_IntegerArith))
{
res = MP_VAL;
}
}
if (res == MP_OKAY && (LTC_PKHA_CompareBigNum(ptrB, sizeB, ptrC, sizeC) >= 0))
{
if (kStatus_Success !=
LTC_PKHA_ModRed(LTC_BASE, ptrB, sizeB, ptrC, sizeC, ptrB,
&sizeB, kLTC_PKHA_IntegerArith))
{
res = MP_VAL;
}
}
if (res == MP_OKAY) { if (res == MP_OKAY) {
if (kStatus_Success != LTC_PKHA_ModMul(LTC_BASE, ptrA, sizeA, status = LTC_PKHA_ModRed(LTC_BASE,
ptrB, sizeB, ptrC, sizeC, ptrD, &sizeD, ptrD, sizeD,
kLTC_PKHA_IntegerArith, kLTC_PKHA_NormalValue, ptrC, sizeC,
kLTC_PKHA_NormalValue, kLTC_PKHA_TimingEqualized)) ptrD, &sizeD,
{ kLTC_PKHA_IntegerArith);
if (status != kStatus_Success)
res = MP_VAL; res = MP_VAL;
}
} }
if (res == MP_OKAY) { if (res == MP_OKAY) {
ltc_reverse_array(ptrD, sizeD); ltc_reverse_array(ptrD, sizeD);
res = mp_read_unsigned_bin(d, ptrD, sizeD); res = mp_read_unsigned_bin(d, ptrD, sizeD);
#if (!defined(WOLFSSL_SP_MATH) && !defined(WOLFSSL_SP_MATH_ALL)) || \
defined(WOLFSSL_SP_INT_NEGATIVE)
/* fix sign */
d->sign = neg;
#endif
} }
} }
else { else {
@ -393,9 +501,6 @@ int mp_mulmod(mp_int *a, mp_int *b, mp_int *c, mp_int *d)
if (ptrD) { if (ptrD) {
XFREE(ptrD, NULL, DYNAMIC_TYPE_BIGINT); XFREE(ptrD, NULL, DYNAMIC_TYPE_BIGINT);
} }
#ifndef USE_FAST_MATH
mp_clear(&t);
#endif
} }
else { else {
#if defined(FREESCALE_LTC_TFM_RSA_4096_ENABLE) #if defined(FREESCALE_LTC_TFM_RSA_4096_ENABLE)
@ -405,108 +510,97 @@ int mp_mulmod(mp_int *a, mp_int *b, mp_int *c, mp_int *d)
#endif #endif
} }
#ifdef ENABLE_NXPLTC_TESTS
/* compare hardware vs software */
if (doLtcTest && mp_cmp(&t, d) != MP_EQ) {
printf("mp_mulmod test fail!\n");
mp_dump("D", d, 0);
mp_dump("D soft", &t, 0);
}
mp_clear(&t);
#endif
return res; return res;
} }
/* Y = G^X mod P */ /* Y = G^X mod P */
int mp_exptmod(mp_int *G, mp_int *X, mp_int *P, mp_int *Y) int ltc_mp_exptmod(mp_int *G, mp_int *X, mp_int *P, mp_int *Y, int useConstTime)
{ {
int res = MP_OKAY; int res = MP_OKAY;
int szA, szB, szC; int szG, szX, szP;
mp_int tmp;
/* if G cannot fit into LTC_PKHA, reduce it */ #ifdef ENABLE_NXPLTC_TESTS
szA = mp_unsigned_bin_size(G); mp_int t;
#if defined(FREESCALE_LTC_TFM_RSA_4096_ENABLE) mp_init(&t);
if (szA > LTC_MAX_INT_BYTES) { if (doLtcTest)
res = mp_init(&tmp); wolfcrypt_mp_exptmod(G, X, P, &t);
if (res != MP_OKAY)
return res;
if ((res = mp_mod(G, P, &tmp)) != MP_OKAY) {
return res;
}
G = &tmp;
szA = mp_unsigned_bin_size(G);
}
#endif #endif
szB = mp_unsigned_bin_size(X);
szC = mp_unsigned_bin_size(P);
if ((szA <= LTC_MAX_INT_BYTES) && (szB <= LTC_MAX_INT_BYTES) && szG = mp_unsigned_bin_size(G);
(szC <= LTC_MAX_INT_BYTES)) szX = mp_unsigned_bin_size(X);
szP = mp_unsigned_bin_size(P);
if ((szG <= LTC_MAX_INT_BYTES) &&
(szX <= LTC_MAX_INT_BYTES) &&
(szP <= LTC_MAX_INT_BYTES))
{ {
mp_int t; uint16_t sizeG, sizeX, sizeP, sizeY;
uint8_t *ptrG, *ptrX, *ptrP, *ptrY;
uint16_t sizeG, sizeX, sizeP; ptrG = (uint8_t*)XMALLOC(LTC_MAX_INT_BYTES, NULL, DYNAMIC_TYPE_BIGINT);
uint8_t *ptrG = (uint8_t *)XMALLOC(LTC_MAX_INT_BYTES, NULL, DYNAMIC_TYPE_BIGINT); ptrX = (uint8_t*)XMALLOC(LTC_MAX_INT_BYTES, NULL, DYNAMIC_TYPE_BIGINT);
uint8_t *ptrX = (uint8_t *)XMALLOC(LTC_MAX_INT_BYTES, NULL, DYNAMIC_TYPE_BIGINT); ptrP = (uint8_t*)XMALLOC(LTC_MAX_INT_BYTES, NULL, DYNAMIC_TYPE_BIGINT);
uint8_t *ptrP = (uint8_t *)XMALLOC(LTC_MAX_INT_BYTES, NULL, DYNAMIC_TYPE_BIGINT); ptrY = (uint8_t*)XMALLOC(LTC_MAX_INT_BYTES, NULL, DYNAMIC_TYPE_BIGINT);
if (ptrG && ptrX && ptrP && ptrY) {
/* if G is negative, add modulus to convert to positive number for LTC */
res = mp_init(&t);
#ifndef WOLFSSL_SP_MATH
if (G->sign) {
if (res == MP_OKAY)
res = mp_add(G, P, &t);
if (res == MP_OKAY)
res = mp_copy(&t, G);
}
#endif
if (res == MP_OKAY && ptrG && ptrX && ptrP) {
res = ltc_get_lsb_bin_from_mp_int(ptrG, G, &sizeG); res = ltc_get_lsb_bin_from_mp_int(ptrG, G, &sizeG);
if (res == MP_OKAY) if (res == MP_OKAY)
res = ltc_get_lsb_bin_from_mp_int(ptrX, X, &sizeX); res = ltc_get_lsb_bin_from_mp_int(ptrX, X, &sizeX);
if (res == MP_OKAY) if (res == MP_OKAY)
res = ltc_get_lsb_bin_from_mp_int(ptrP, P, &sizeP); res = ltc_get_lsb_bin_from_mp_int(ptrP, P, &sizeP);
/* if number if greater that modulo, we must first reduce due to /* if G >= P then reduce */
LTC requirement on modular exponentiation */ /* TODO: Perhaps always do mod reduce depending on hardware performance */
/* it needs number less than modulus. */ if (res == MP_OKAY &&
/* we can take advantage of modular arithmetic rule that: A^B mod C = ( (A mod C)^B ) mod C LTC_PKHA_CompareBigNum(ptrG, sizeG, ptrP, sizeP) >= 0) {
and so we do first (A mod N) : LTC does not give size requirement on A versus N, res = LTC_PKHA_ModRed(LTC_BASE,
and then the modular exponentiation. ptrG, sizeG,
*/ ptrP, sizeP,
/* if G >= P then */
if (res == MP_OKAY && LTC_PKHA_CompareBigNum(ptrG, sizeG, ptrP, sizeP) >= 0) {
res = (int)LTC_PKHA_ModRed(LTC_BASE, ptrG, sizeG, ptrP, sizeP,
ptrG, &sizeG, kLTC_PKHA_IntegerArith); ptrG, &sizeG, kLTC_PKHA_IntegerArith);
res = (res == kStatus_Success) ? MP_OKAY: MP_VAL;
if (res != kStatus_Success) {
res = MP_VAL;
}
} }
if (res == MP_OKAY) { if (res == MP_OKAY) {
res = (int)LTC_PKHA_ModExp(LTC_BASE, ptrG, sizeG, ptrP, sizeP, res = LTC_PKHA_ModExp(LTC_BASE,
ptrX, sizeX, ptrP, &sizeP, kLTC_PKHA_IntegerArith, ptrG, sizeG, /* integer input */
kLTC_PKHA_NormalValue, kLTC_PKHA_TimingEqualized); ptrP, sizeP, /* modulus */
ptrX, sizeX, /* expenoent */
if (res != kStatus_Success) { ptrY, &sizeY, /* out */
res = MP_VAL; kLTC_PKHA_IntegerArith, kLTC_PKHA_NormalValue,
} useConstTime ? kLTC_PKHA_TimingEqualized :
else { kLTC_PKHA_NoTimingEqualized);
ltc_reverse_array(ptrP, sizeP); res = (res == kStatus_Success) ? MP_OKAY: MP_VAL;
res = mp_read_unsigned_bin(Y, ptrP, sizeP); }
} if (res == MP_OKAY) {
ltc_reverse_array(ptrY, sizeY);
res = mp_read_unsigned_bin(Y, ptrY, sizeY);
} }
} }
else { else {
res = MP_MEM; res = MP_MEM;
} }
if (ptrG) { if (ptrY) {
XFREE(ptrG, NULL, DYNAMIC_TYPE_BIGINT); XFREE(ptrY, NULL, DYNAMIC_TYPE_BIGINT);
}
if (ptrX) {
XFREE(ptrX, NULL, DYNAMIC_TYPE_BIGINT);
} }
if (ptrP) { if (ptrP) {
XFREE(ptrP, NULL, DYNAMIC_TYPE_BIGINT); XFREE(ptrP, NULL, DYNAMIC_TYPE_BIGINT);
} }
#ifndef USE_FAST_MATH if (ptrX) {
mp_clear(&t); XFREE(ptrX, NULL, DYNAMIC_TYPE_BIGINT);
#endif }
if (ptrG) {
XFREE(ptrG, NULL, DYNAMIC_TYPE_BIGINT);
}
} }
else { else {
#if defined(FREESCALE_LTC_TFM_RSA_4096_ENABLE) #if defined(FREESCALE_LTC_TFM_RSA_4096_ENABLE)
@ -516,14 +610,113 @@ int mp_exptmod(mp_int *G, mp_int *X, mp_int *P, mp_int *Y)
#endif #endif
} }
#ifndef USE_FAST_MATH #ifdef ENABLE_NXPLTC_TESTS
if (szA > LTC_MAX_INT_BYTES) /* compare hardware vs software */
mp_clear(&tmp); if (doLtcTest && mp_cmp(&t, Y) != MP_EQ) {
printf("mp_exptmod test fail!\n");
mp_dump("Y", Y, 0);
mp_dump("Y soft", &t, 0);
}
mp_clear(&t);
#endif #endif
return res; return res;
} }
int mp_exptmod(mp_int *G, mp_int *X, mp_int *P, mp_int *Y)
{
return ltc_mp_exptmod(G, X, P, Y, 1);
}
int mp_exptmod_nct(mp_int * G, mp_int * X, mp_int * P, mp_int * Y)
{
return ltc_mp_exptmod(G, X, P, Y, 0);
}
#if !defined(NO_DH) || !defined(NO_DSA) || !defined(NO_RSA) || \
defined(WOLFSSL_KEY_GEN)
int mp_prime_is_prime_ex(mp_int* a, int t, int* result, WC_RNG* rng)
{
int res = MP_OKAY;
int szA;
#ifdef ENABLE_NXPLTC_TESTS
int result_soft = 0;
if (doLtcTest)
mp_prime_is_prime_ex(a, t, &result_soft, rng);
#endif
szA = mp_unsigned_bin_size(a);
if (szA <= LTC_MAX_INT_BYTES) {
uint16_t sizeA, sizeB;
uint8_t *ptrA, *ptrB;
sizeB = mp_count_bits(a);
/* The base size is the number of bits / 8. One is added if the number
* of bits isn't an even 8. */
sizeB = (sizeB / 8) + ((sizeB % 8) ? 1 : 0);
ptrA = (uint8_t*)XMALLOC(LTC_MAX_INT_BYTES, NULL, DYNAMIC_TYPE_BIGINT);
ptrB = (uint8_t*)XMALLOC(sizeB, NULL, DYNAMIC_TYPE_BIGINT);
if (ptrA == NULL || ptrB == NULL) {
res = MEMORY_E;
}
if (res == MP_OKAY) {
#ifndef WC_NO_RNG
/* A NULL rng will return as bad function arg */
res = wc_RNG_GenerateBlock(rng, ptrB, sizeB);
#else
res = NOT_COMPILED_IN;
#endif
}
if (res == MP_OKAY) {
res = ltc_get_lsb_bin_from_mp_int(ptrA, a, &sizeA);
}
if (res == MP_OKAY) {
if (LTC_PKHA_PrimalityTest(LTC_BASE,
ptrB, sizeB, /* seed */
(uint8_t*)&t, sizeof(t), /* trials */
ptrA, sizeA, /* candidate */
(bool*)result) != kStatus_Success) {
res = MP_MEM;
}
}
if (ptrB) {
XFREE(ptrB, NULL, DYNAMIC_TYPE_BIGINT);
}
if (ptrA) {
XFREE(ptrA, NULL, DYNAMIC_TYPE_BIGINT);
}
}
else {
#if defined(FREESCALE_LTC_TFM_RSA_4096_ENABLE)
res = wolfcrypt_mp_prime_is_prime_ex(a, t, result, rng);
#else
res = NOT_COMPILED_IN;
#endif
}
#ifdef ENABLE_NXPLTC_TESTS
/* compare hardware vs software */
if (doLtcTest && *result != result_soft) {
printf("Fail! mp_prime_is_prime_ex %d != %d\n", *result, result_soft);
}
#endif
return res;
}
int mp_prime_is_prime(mp_int* a, int t, int* result)
{
/* the NXP LTC prime check requires an RNG, so use software version */
return wolfcrypt_mp_prime_is_prime_ex(a, t, result, NULL);
}
#endif /* !NO_RSA || !NO_DSA || !NO_DH || WOLFSSL_KEY_GEN */
#endif /* FREESCALE_LTC_TFM */ #endif /* FREESCALE_LTC_TFM */
@ -531,7 +724,8 @@ int mp_exptmod(mp_int *G, mp_int *X, mp_int *P, mp_int *Y)
#if defined(HAVE_ECC) && defined(FREESCALE_LTC_ECC) #if defined(HAVE_ECC) && defined(FREESCALE_LTC_ECC)
/* convert from mp_int to LTC integer, as array of bytes of size sz. /* convert from mp_int to LTC integer, as array of bytes of size sz.
* if mp_int has less bytes than sz, add zero bytes at most significant byte positions. * if mp_int has less bytes than sz, add zero bytes at most significant byte
* positions.
* This is when for example modulus is 32 bytes (P-256 curve) * This is when for example modulus is 32 bytes (P-256 curve)
* and mp_int has only 31 bytes, we add leading zeros * and mp_int has only 31 bytes, we add leading zeros
* so that result array has 32 bytes, same as modulus (sz). * so that result array has 32 bytes, same as modulus (sz).
@ -567,7 +761,8 @@ static int ltc_get_from_mp_int(uint8_t *dst, mp_int *a, int sz)
return res; return res;
} }
/* ECC specs in lsbyte at lowest address format for direct use by LTC PKHA driver functions */ /* ECC specs in lsbyte at lowest address format for direct use by LTC PKHA
* driver functions */
#if defined(HAVE_ECC192) || defined(HAVE_ALL_CURVES) #if defined(HAVE_ECC192) || defined(HAVE_ALL_CURVES)
#define ECC192 #define ECC192
#endif #endif
@ -754,7 +949,8 @@ int wc_ecc_mulmod_ex(const mp_int *k, ecc_point *G, ecc_point *R, mp_int* a,
size = szModulus; size = szModulus;
/* find LTC friendly parameters for the selected curve */ /* find LTC friendly parameters for the selected curve */
if (ltc_get_ecc_specs(&modbin, &r2modn, &aCurveParam, &bCurveParam, size) != 0) { if (ltc_get_ecc_specs(&modbin, &r2modn, &aCurveParam, &bCurveParam,
size) != 0) {
return ECC_BAD_ARG_E; return ECC_BAD_ARG_E;
} }
@ -776,7 +972,8 @@ int wc_ecc_mulmod_ex(const mp_int *k, ecc_point *G, ecc_point *R, mp_int* a,
/* if k is negative, we compute the multiplication with abs(-k) /* if k is negative, we compute the multiplication with abs(-k)
* with result (x, y) and modify the result to (x, -y) * with result (x, y) and modify the result to (x, -y)
*/ */
#ifndef WOLFSSL_SP_MATH #if (!defined(WOLFSSL_SP_MATH) && !defined(WOLFSSL_SP_MATH_ALL)) || \
defined(WOLFSSL_SP_INT_NEGATIVE)
R->y->sign = k->sign; R->y->sign = k->sign;
#endif #endif
} }
@ -795,6 +992,16 @@ int wc_ecc_mulmod_ex2(const mp_int* k, ecc_point *G, ecc_point *R, mp_int* a,
return wc_ecc_mulmod_ex(k, G, R, a, modulus, map, heap); return wc_ecc_mulmod_ex(k, G, R, a, modulus, map, heap);
} }
int ecc_map_ex(ecc_point* P, mp_int* modulus, mp_digit mp, int ct)
{
/* this is handled in hardware, so no projective mapping needed */
(void)P;
(void)modulus;
(void)mp;
(void)ct;
return MP_OKAY;
}
int wc_ecc_point_add(ecc_point *mG, ecc_point *mQ, ecc_point *mR, mp_int *m) int wc_ecc_point_add(ecc_point *mG, ecc_point *mQ, ecc_point *mR, mp_int *m)
{ {
int res; int res;
@ -814,7 +1021,8 @@ int wc_ecc_point_add(ecc_point *mG, ecc_point *mQ, ecc_point *mR, mp_int *m)
size = mp_unsigned_bin_size(m); size = mp_unsigned_bin_size(m);
/* find LTC friendly parameters for the selected curve */ /* find LTC friendly parameters for the selected curve */
if (ltc_get_ecc_specs(&modbin, &r2modn, &aCurveParam, &bCurveParam, size) != 0) { if (ltc_get_ecc_specs(&modbin, &r2modn, &aCurveParam, &bCurveParam,
size) != 0) {
res = ECC_BAD_ARG_E; res = ECC_BAD_ARG_E;
} }
else { else {
@ -874,7 +1082,8 @@ static const uint8_t invThree[32] = {
/* /*
* *
* finds square root in finite field when modulus congruent to 5 modulo 8 * finds square root in finite field when modulus congruent to 5 modulo 8
* this is fixed to curve25519 modulus 2^255 - 19 which is congruent to 5 modulo 8 * this is fixed to curve25519 modulus 2^255 - 19 which is congruent to
* 5 modulo 8.
* *
* This function solves equation: res^2 = a mod (2^255 - 19) * This function solves equation: res^2 = a mod (2^255 - 19)
* *
@ -936,8 +1145,9 @@ status_t LTC_PKHA_Prime25519SquareRootMod(const uint8_t *A, size_t sizeA,
} }
/* I = I - 1 */ /* I = I - 1 */
XMEMSET(VV, 0xff, sizeof(VV)); /* just temp for maximum integer - for non-modular subtract */ /* just temp for maximum integer - for non-modular subtract */
if (0 <= LTC_PKHA_CompareBigNum(I, szI, &one, sizeof(one))) { XMEMSET(VV, 0xff, sizeof(VV));
if (LTC_PKHA_CompareBigNum(I, szI, &one, sizeof(one)) >= 0) {
if (status == kStatus_Success) { if (status == kStatus_Success) {
status = LTC_PKHA_ModSub1(LTC_BASE, I, szI, &one, sizeof(one), status = LTC_PKHA_ModSub1(LTC_BASE, I, szI, &one, sizeof(one),
VV, sizeof(VV), I, &szI); VV, sizeof(VV), I, &szI);
@ -1590,7 +1800,8 @@ status_t LTC_PKHA_Ed25519_PointDecompress(const uint8_t *pubkey,
return status; return status;
} }
/* LSByte first of Ed25519 parameter l = 2^252 + 27742317777372353535851937790883648493 */ /* LSByte first of Ed25519 parameter l = 2^252 +
* 27742317777372353535851937790883648493 */
static const uint8_t l_coefEdDSA[] = { static const uint8_t l_coefEdDSA[] = {
0xed, 0xd3, 0xf5, 0x5c, 0x1a, 0x63, 0x12, 0x58, 0xd6, 0x9c, 0xf7, 0xed, 0xd3, 0xf5, 0x5c, 0x1a, 0x63, 0x12, 0x58, 0xd6, 0x9c, 0xf7,
0xa2, 0xde, 0xf9, 0xde, 0x14, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xa2, 0xde, 0xf9, 0xde, 0x14, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,

View File

@ -397,7 +397,7 @@ int wc_InitRsaKey_Label(RsaKey* key, const char* label, void* heap, int devId)
*/ */
int wc_InitRsaHw(RsaKey* key) int wc_InitRsaHw(RsaKey* key)
{ {
unsigned char* m; /* RSA modulous */ unsigned char* m; /* RSA modulus */
word32 e = 0; /* RSA public exponent */ word32 e = 0; /* RSA public exponent */
int mSz; int mSz;
int eSz; int eSz;
@ -673,7 +673,7 @@ int wc_CheckRsaKey(RsaKey* key)
break; break;
#endif /* WOLFSSL_SP_4096 */ #endif /* WOLFSSL_SP_4096 */
default: default:
/* If using only single precsision math then issue key size /* If using only single precision math then issue key size
* error, otherwise fall-back to multi-precision math * error, otherwise fall-back to multi-precision math
* calculation */ * calculation */
#if defined(WOLFSSL_SP_MATH) #if defined(WOLFSSL_SP_MATH)

View File

@ -4275,7 +4275,11 @@ int mp_exptmod_ex (mp_int * G, mp_int * X, int digits, mp_int * P, mp_int * Y)
return fp_exptmod_ex(G, X, digits, P, Y); return fp_exptmod_ex(G, X, digits, P, Y);
} }
#if defined(FREESCALE_LTC_TFM)
int wolfcrypt_mp_exptmod_nct (mp_int * G, mp_int * X, mp_int * P, mp_int * Y)
#else
int mp_exptmod_nct (mp_int * G, mp_int * X, mp_int * P, mp_int * Y) int mp_exptmod_nct (mp_int * G, mp_int * X, mp_int * P, mp_int * Y)
#endif
{ {
return fp_exptmod_nct(G, X, P, Y); return fp_exptmod_nct(G, X, P, Y);
} }
@ -4724,8 +4728,11 @@ int mp_mod_d(fp_int *a, fp_digit b, fp_digit *c)
static int fp_isprime_ex(fp_int *a, int t, int* result); static int fp_isprime_ex(fp_int *a, int t, int* result);
#if defined(FREESCALE_LTC_TFM)
int wolfcrypt_mp_prime_is_prime(mp_int* a, int t, int* result)
#else
int mp_prime_is_prime(mp_int* a, int t, int* result) int mp_prime_is_prime(mp_int* a, int t, int* result)
#endif
{ {
return fp_isprime_ex(a, t, result); return fp_isprime_ex(a, t, result);
} }
@ -4964,7 +4971,11 @@ int fp_isprime_ex(fp_int *a, int t, int* result)
} }
#if defined(FREESCALE_LTC_TFM)
int wolfcrypt_mp_prime_is_prime_ex(mp_int* a, int t, int* result, WC_RNG* rng)
#else
int mp_prime_is_prime_ex(mp_int* a, int t, int* result, WC_RNG* rng) int mp_prime_is_prime_ex(mp_int* a, int t, int* result, WC_RNG* rng)
#endif
{ {
int ret = FP_YES; int ret = FP_YES;
fp_digit d; fp_digit d;
@ -5382,7 +5393,7 @@ int mp_add_d(fp_int *a, fp_digit b, fp_int *c)
/* chars used in radix conversions */ /* chars used in radix conversions */
static wcchar fp_s_rmap = "0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZ" static wcchar fp_s_rmap = "0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZ"
"abcdefghijklmnopqrstuvwxyz+/"; "abcdefghijklmnopqrstuvwxyz+/";
#endif #endif
#if !defined(NO_DSA) || defined(HAVE_ECC) #if !defined(NO_DSA) || defined(HAVE_ECC)

View File

@ -14703,7 +14703,8 @@ static int rsa_keygen_test(WC_RNG* rng)
#if !defined(HAVE_FAST_RSA) && !defined(HAVE_USER_RSA) && \ #if !defined(HAVE_FAST_RSA) && !defined(HAVE_USER_RSA) && \
(!defined(HAVE_FIPS) || \ (!defined(HAVE_FIPS) || \
(defined(HAVE_FIPS_VERSION) && (HAVE_FIPS_VERSION >= 2))) && \ (defined(HAVE_FIPS_VERSION) && (HAVE_FIPS_VERSION >= 2))) && \
!defined(HAVE_SELFTEST) && !defined(HAVE_INTEL_QA) !defined(HAVE_SELFTEST) && !defined(HAVE_INTEL_QA) \
&& !defined(WOLFSSL_NO_RSA_KEY_CHECK)
ret = wc_CheckRsaKey(genKey); ret = wc_CheckRsaKey(genKey);
if (ret != 0) { if (ret != 0) {
ERROR_OUT(-7872, exit_rsa); ERROR_OUT(-7872, exit_rsa);