mirror of
https://github.com/wolfSSL/wolfssl.git
synced 2025-07-30 18:57:27 +02:00
Fixes for RSA with NXP LTC. The invmod function must reduce if A > B. Added RSA Key Generation acceleration.
This commit is contained in:
@ -1450,7 +1450,7 @@ int mp_is_bit_set (mp_int *a, mp_digit b)
|
||||
mp_digit s = b % DIGIT_BIT; /* bit index */
|
||||
|
||||
if ((mp_digit)a->used <= i) {
|
||||
/* no words avaialable at that bit count */
|
||||
/* no words available at that bit count */
|
||||
return 0;
|
||||
}
|
||||
|
||||
|
@ -142,8 +142,9 @@ int mp_mul(mp_int *A, mp_int *B, mp_int *C)
|
||||
if (res == MP_OKAY) {
|
||||
XMEMSET(ptrC, 0xFF, LTC_MAX_INT_BYTES);
|
||||
|
||||
LTC_PKHA_ModMul(LTC_BASE, ptrA, sizeA, ptrB, sizeB, ptrC, LTC_MAX_INT_BYTES, ptrB, &sizeB,
|
||||
kLTC_PKHA_IntegerArith, kLTC_PKHA_NormalValue, kLTC_PKHA_NormalValue,
|
||||
LTC_PKHA_ModMul(LTC_BASE, ptrA, sizeA, ptrB, sizeB, ptrC,
|
||||
LTC_MAX_INT_BYTES, ptrB, &sizeB, kLTC_PKHA_IntegerArith,
|
||||
kLTC_PKHA_NormalValue, kLTC_PKHA_NormalValue,
|
||||
kLTC_PKHA_TimingEqualized);
|
||||
|
||||
ltc_reverse_array(ptrB, sizeB);
|
||||
@ -203,7 +204,8 @@ int mp_mod(mp_int *a, mp_int *b, mp_int *c)
|
||||
res = ltc_get_lsb_bin_from_mp_int(ptrB, b, &sizeB);
|
||||
if (res == MP_OKAY) {
|
||||
if (kStatus_Success ==
|
||||
LTC_PKHA_ModRed(LTC_BASE, ptrA, sizeA, ptrB, sizeB, ptrC, &sizeC, kLTC_PKHA_IntegerArith))
|
||||
LTC_PKHA_ModRed(LTC_BASE, ptrA, sizeA, ptrB, sizeB, ptrC,
|
||||
&sizeC, kLTC_PKHA_IntegerArith))
|
||||
{
|
||||
ltc_reverse_array(ptrC, sizeC);
|
||||
res = mp_read_unsigned_bin(c, ptrC, sizeC);
|
||||
@ -261,10 +263,18 @@ int mp_invmod(mp_int *a, mp_int *b, mp_int *c)
|
||||
res = ltc_get_lsb_bin_from_mp_int(ptrA, a, &sizeA);
|
||||
if (res == MP_OKAY)
|
||||
res = ltc_get_lsb_bin_from_mp_int(ptrB, b, &sizeB);
|
||||
|
||||
/* if a >= b then reduce */
|
||||
if (res == MP_OKAY && LTC_PKHA_CompareBigNum(ptrA, sizeA, ptrB,
|
||||
sizeB) >= 0) {
|
||||
if (LTC_PKHA_ModRed(LTC_BASE, ptrA, sizeA, ptrB, sizeB,
|
||||
ptrA, &sizeA, kLTC_PKHA_IntegerArith) != kStatus_Success) {
|
||||
res = MP_VAL;
|
||||
}
|
||||
}
|
||||
if (res == MP_OKAY) {
|
||||
if (kStatus_Success ==
|
||||
LTC_PKHA_ModInv(LTC_BASE, ptrA, sizeA, ptrB, sizeB, ptrC, &sizeC, kLTC_PKHA_IntegerArith))
|
||||
{
|
||||
if (LTC_PKHA_ModInv(LTC_BASE, ptrA, sizeA, ptrB, sizeB, ptrC,
|
||||
&sizeC, kLTC_PKHA_IntegerArith) == kStatus_Success) {
|
||||
ltc_reverse_array(ptrC, sizeC);
|
||||
res = mp_read_unsigned_bin(c, ptrC, sizeC);
|
||||
}
|
||||
@ -308,7 +318,9 @@ int mp_mulmod(mp_int *a, mp_int *b, mp_int *c, mp_int *d)
|
||||
szA = mp_unsigned_bin_size(a);
|
||||
szB = mp_unsigned_bin_size(b);
|
||||
szC = mp_unsigned_bin_size(c);
|
||||
if ((szA <= LTC_MAX_INT_BYTES) && (szB <= LTC_MAX_INT_BYTES) && (szC <= LTC_MAX_INT_BYTES)) {
|
||||
if ((szA <= LTC_MAX_INT_BYTES) && (szB <= LTC_MAX_INT_BYTES) &&
|
||||
(szC <= LTC_MAX_INT_BYTES))
|
||||
{
|
||||
mp_int t;
|
||||
|
||||
uint8_t *ptrA = (uint8_t*)XMALLOC(LTC_MAX_INT_BYTES, NULL, DYNAMIC_TYPE_BIGINT);
|
||||
@ -344,7 +356,8 @@ int mp_mulmod(mp_int *a, mp_int *b, mp_int *c, mp_int *d)
|
||||
res = ltc_get_lsb_bin_from_mp_int(ptrC, c, &sizeC);
|
||||
|
||||
/* (A*B)mod C = ((A mod C) * (B mod C)) mod C */
|
||||
if (res == MP_OKAY && LTC_PKHA_CompareBigNum(ptrA, sizeA, ptrC, sizeC) >= 0) {
|
||||
if (res == MP_OKAY && LTC_PKHA_CompareBigNum(ptrA, sizeA, ptrC,
|
||||
sizeC) >= 0) {
|
||||
if (kStatus_Success !=
|
||||
LTC_PKHA_ModRed(LTC_BASE, ptrA, sizeA, ptrC, sizeC, ptrA,
|
||||
&sizeA, kLTC_PKHA_IntegerArith))
|
||||
@ -352,8 +365,8 @@ int mp_mulmod(mp_int *a, mp_int *b, mp_int *c, mp_int *d)
|
||||
res = MP_VAL;
|
||||
}
|
||||
}
|
||||
if (res == MP_OKAY && (LTC_PKHA_CompareBigNum(ptrB, sizeB, ptrC, sizeC) >= 0))
|
||||
{
|
||||
if (res == MP_OKAY && (LTC_PKHA_CompareBigNum(ptrB, sizeB, ptrC,
|
||||
sizeC) >= 0)) {
|
||||
if (kStatus_Success !=
|
||||
LTC_PKHA_ModRed(LTC_BASE, ptrB, sizeB, ptrC, sizeC, ptrB,
|
||||
&sizeB, kLTC_PKHA_IntegerArith))
|
||||
@ -413,7 +426,9 @@ int mp_exptmod(mp_int *G, mp_int *X, mp_int *P, mp_int *Y)
|
||||
{
|
||||
int res = MP_OKAY;
|
||||
int szA, szB, szC;
|
||||
#if defined(FREESCALE_LTC_TFM_RSA_4096_ENABLE)
|
||||
mp_int tmp;
|
||||
#endif
|
||||
|
||||
/* if G cannot fit into LTC_PKHA, reduce it */
|
||||
szA = mp_unsigned_bin_size(G);
|
||||
@ -432,7 +447,8 @@ int mp_exptmod(mp_int *G, mp_int *X, mp_int *P, mp_int *Y)
|
||||
szB = mp_unsigned_bin_size(X);
|
||||
szC = mp_unsigned_bin_size(P);
|
||||
|
||||
if ((szA <= LTC_MAX_INT_BYTES) && (szB <= LTC_MAX_INT_BYTES) &&
|
||||
if ((szA <= LTC_MAX_INT_BYTES) &&
|
||||
(szB <= LTC_MAX_INT_BYTES) &&
|
||||
(szC <= LTC_MAX_INT_BYTES))
|
||||
{
|
||||
mp_int t;
|
||||
@ -460,29 +476,27 @@ int mp_exptmod(mp_int *G, mp_int *X, mp_int *P, mp_int *Y)
|
||||
if (res == MP_OKAY)
|
||||
res = ltc_get_lsb_bin_from_mp_int(ptrP, P, &sizeP);
|
||||
|
||||
/* if number if greater that modulo, we must first reduce due to
|
||||
LTC requirement on modular exponentiation */
|
||||
/* if number if greater that modulo, we must first reduce due to LTC
|
||||
requirement on modular exponentiation */
|
||||
/* it needs number less than modulus. */
|
||||
/* we can take advantage of modular arithmetic rule that: A^B mod C = ( (A mod C)^B ) mod C
|
||||
and so we do first (A mod N) : LTC does not give size requirement on A versus N,
|
||||
and then the modular exponentiation.
|
||||
/* we can take advantage of modular arithmetic rule that:
|
||||
A^B mod C = ( (A mod C)^B ) mod C
|
||||
and so we do first (A mod N) : LTC does not give size requirement
|
||||
on A versus N, and then the modular exponentiation.
|
||||
*/
|
||||
/* if G >= P then */
|
||||
if (res == MP_OKAY && LTC_PKHA_CompareBigNum(ptrG, sizeG, ptrP, sizeP) >= 0) {
|
||||
res = (int)LTC_PKHA_ModRed(LTC_BASE, ptrG, sizeG, ptrP, sizeP,
|
||||
ptrG, &sizeG, kLTC_PKHA_IntegerArith);
|
||||
|
||||
if (res != kStatus_Success) {
|
||||
/* if G >= P then reduce */
|
||||
if (res == MP_OKAY && LTC_PKHA_CompareBigNum(ptrG, sizeG, ptrP,
|
||||
sizeP) >= 0) {
|
||||
if (LTC_PKHA_ModRed(LTC_BASE, ptrG, sizeG, ptrP, sizeP,
|
||||
ptrG, &sizeG, kLTC_PKHA_IntegerArith) != kStatus_Success) {
|
||||
res = MP_VAL;
|
||||
}
|
||||
}
|
||||
|
||||
if (res == MP_OKAY) {
|
||||
res = (int)LTC_PKHA_ModExp(LTC_BASE, ptrG, sizeG, ptrP, sizeP,
|
||||
ptrX, sizeX, ptrP, &sizeP, kLTC_PKHA_IntegerArith,
|
||||
kLTC_PKHA_NormalValue, kLTC_PKHA_TimingEqualized);
|
||||
|
||||
if (res != kStatus_Success) {
|
||||
if (LTC_PKHA_ModExp(LTC_BASE, ptrG, sizeG, ptrP, sizeP, ptrX, sizeX,
|
||||
ptrP, &sizeP, kLTC_PKHA_IntegerArith, kLTC_PKHA_NormalValue,
|
||||
kLTC_PKHA_TimingEqualized) != kStatus_Success) {
|
||||
res = MP_VAL;
|
||||
}
|
||||
else {
|
||||
@ -524,6 +538,79 @@ int mp_exptmod(mp_int *G, mp_int *X, mp_int *P, mp_int *Y)
|
||||
return res;
|
||||
}
|
||||
|
||||
int mp_exptmod_nct (mp_int * G, mp_int * X, mp_int * P, mp_int * Y)
|
||||
{
|
||||
/* use hardware implementation even for non-constant time operations */
|
||||
return mp_exptmod(G, X, P, Y);
|
||||
}
|
||||
|
||||
#if !defined(NO_DH) || !defined(NO_DSA) || !defined(NO_RSA) || \
|
||||
defined(WOLFSSL_KEY_GEN)
|
||||
int mp_prime_is_prime_ex(mp_int* a, int t, int* result, WC_RNG* rng)
|
||||
{
|
||||
int res = MP_OKAY;
|
||||
int szA;
|
||||
|
||||
szA = mp_unsigned_bin_size(a);
|
||||
if (szA <= LTC_MAX_INT_BYTES) {
|
||||
uint16_t sizeA, sizeB;
|
||||
uint8_t *ptrA, *ptrB;
|
||||
|
||||
sizeB = mp_count_bits(a);
|
||||
/* The base size is the number of bits / 8. One is added if the number
|
||||
* of bits isn't an even 8. */
|
||||
sizeB = (sizeB / 8) + ((sizeB % 8) ? 1 : 0);
|
||||
|
||||
ptrA = (uint8_t*)XMALLOC(LTC_MAX_INT_BYTES, NULL, DYNAMIC_TYPE_BIGINT);
|
||||
ptrB = (uint8_t*)XMALLOC(sizeB, NULL, DYNAMIC_TYPE_BIGINT);
|
||||
if (ptrA == NULL || ptrB == NULL) {
|
||||
res = MEMORY_E;
|
||||
}
|
||||
|
||||
#ifndef WC_NO_RNG
|
||||
if (res == MP_OKAY && rng != NULL) {
|
||||
res = wc_RNG_GenerateBlock(rng, ptrB, sizeB);
|
||||
}
|
||||
#else
|
||||
res = NOT_COMPILED_IN;
|
||||
#endif
|
||||
|
||||
if (res == MP_OKAY) {
|
||||
res = ltc_get_lsb_bin_from_mp_int(ptrA, a, &sizeA);
|
||||
}
|
||||
if (res == MP_OKAY) {
|
||||
if (LTC_PKHA_PrimalityTest(LTC_BASE,
|
||||
ptrB, sizeB, /* seed */
|
||||
(uint8_t*)&t, sizeof(t), /* trials */
|
||||
ptrA, sizeA, /* candidate */
|
||||
(bool*)result) != kStatus_Success) {
|
||||
res = MP_MEM;
|
||||
}
|
||||
}
|
||||
|
||||
if (ptrB) {
|
||||
XFREE(ptrB, NULL, DYNAMIC_TYPE_BIGINT);
|
||||
}
|
||||
if (ptrA) {
|
||||
XFREE(ptrA, NULL, DYNAMIC_TYPE_BIGINT);
|
||||
}
|
||||
}
|
||||
else {
|
||||
#if defined(FREESCALE_LTC_TFM_RSA_4096_ENABLE)
|
||||
res = mp_prime_is_prime_ex(a, t, result, rng);
|
||||
#else
|
||||
res = NOT_COMPILED_IN;
|
||||
#endif
|
||||
}
|
||||
return res;
|
||||
}
|
||||
|
||||
int mp_prime_is_prime(mp_int* a, int t, int* result)
|
||||
{
|
||||
return mp_prime_is_prime_ex(a, t, result, NULL);
|
||||
}
|
||||
#endif /* !NO_RSA || !NO_DSA || !NO_DH || WOLFSSL_KEY_GEN */
|
||||
|
||||
#endif /* FREESCALE_LTC_TFM */
|
||||
|
||||
|
||||
@ -567,7 +654,8 @@ static int ltc_get_from_mp_int(uint8_t *dst, mp_int *a, int sz)
|
||||
return res;
|
||||
}
|
||||
|
||||
/* ECC specs in lsbyte at lowest address format for direct use by LTC PKHA driver functions */
|
||||
/* ECC specs in lsbyte at lowest address format for direct use by LTC PKHA
|
||||
* driver functions */
|
||||
#if defined(HAVE_ECC192) || defined(HAVE_ALL_CURVES)
|
||||
#define ECC192
|
||||
#endif
|
||||
|
@ -397,7 +397,7 @@ int wc_InitRsaKey_Label(RsaKey* key, const char* label, void* heap, int devId)
|
||||
*/
|
||||
int wc_InitRsaHw(RsaKey* key)
|
||||
{
|
||||
unsigned char* m; /* RSA modulous */
|
||||
unsigned char* m; /* RSA modulus */
|
||||
word32 e = 0; /* RSA public exponent */
|
||||
int mSz;
|
||||
int eSz;
|
||||
@ -673,7 +673,7 @@ int wc_CheckRsaKey(RsaKey* key)
|
||||
break;
|
||||
#endif /* WOLFSSL_SP_4096 */
|
||||
default:
|
||||
/* If using only single precsision math then issue key size
|
||||
/* If using only single precision math then issue key size
|
||||
* error, otherwise fall-back to multi-precision math
|
||||
* calculation */
|
||||
#if defined(WOLFSSL_SP_MATH)
|
||||
|
@ -4275,7 +4275,11 @@ int mp_exptmod_ex (mp_int * G, mp_int * X, int digits, mp_int * P, mp_int * Y)
|
||||
return fp_exptmod_ex(G, X, digits, P, Y);
|
||||
}
|
||||
|
||||
#if defined(FREESCALE_LTC_TFM)
|
||||
int wolfcrypt_mp_exptmod_nct (mp_int * G, mp_int * X, mp_int * P, mp_int * Y)
|
||||
#else
|
||||
int mp_exptmod_nct (mp_int * G, mp_int * X, mp_int * P, mp_int * Y)
|
||||
#endif
|
||||
{
|
||||
return fp_exptmod_nct(G, X, P, Y);
|
||||
}
|
||||
@ -4724,8 +4728,11 @@ int mp_mod_d(fp_int *a, fp_digit b, fp_digit *c)
|
||||
|
||||
static int fp_isprime_ex(fp_int *a, int t, int* result);
|
||||
|
||||
|
||||
#if defined(FREESCALE_LTC_TFM)
|
||||
int wolfcrypt_mp_prime_is_prime(mp_int* a, int t, int* result)
|
||||
#else
|
||||
int mp_prime_is_prime(mp_int* a, int t, int* result)
|
||||
#endif
|
||||
{
|
||||
return fp_isprime_ex(a, t, result);
|
||||
}
|
||||
@ -4960,7 +4967,11 @@ int fp_isprime_ex(fp_int *a, int t, int* result)
|
||||
}
|
||||
|
||||
|
||||
#if defined(FREESCALE_LTC_TFM)
|
||||
int wolfcrypt_mp_prime_is_prime_ex(mp_int* a, int t, int* result, WC_RNG* rng)
|
||||
#else
|
||||
int mp_prime_is_prime_ex(mp_int* a, int t, int* result, WC_RNG* rng)
|
||||
#endif
|
||||
{
|
||||
int ret = FP_YES;
|
||||
fp_digit d;
|
||||
|
@ -14705,7 +14705,8 @@ static int rsa_keygen_test(WC_RNG* rng)
|
||||
#if !defined(HAVE_FAST_RSA) && !defined(HAVE_USER_RSA) && \
|
||||
(!defined(HAVE_FIPS) || \
|
||||
(defined(HAVE_FIPS_VERSION) && (HAVE_FIPS_VERSION >= 2))) && \
|
||||
!defined(HAVE_SELFTEST) && !defined(HAVE_INTEL_QA)
|
||||
!defined(HAVE_SELFTEST) && !defined(HAVE_INTEL_QA) \
|
||||
&& !defined(WOLFSSL_NO_RSA_KEY_CHECK)
|
||||
ret = wc_CheckRsaKey(genKey);
|
||||
if (ret != 0) {
|
||||
ERROR_OUT(-7872, exit_rsa);
|
||||
|
Reference in New Issue
Block a user