mirror of
https://github.com/wolfSSL/wolfssl.git
synced 2026-01-27 09:12:21 +01:00
1459 lines
43 KiB
C
1459 lines
43 KiB
C
/* ed448.c
|
|
*
|
|
* Copyright (C) 2006-2025 wolfSSL Inc.
|
|
*
|
|
* This file is part of wolfSSL.
|
|
*
|
|
* wolfSSL is free software; you can redistribute it and/or modify
|
|
* it under the terms of the GNU General Public License as published by
|
|
* the Free Software Foundation; either version 3 of the License, or
|
|
* (at your option) any later version.
|
|
*
|
|
* wolfSSL is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
* GNU General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU General Public License
|
|
* along with this program; if not, write to the Free Software
|
|
* Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1335, USA
|
|
*/
|
|
|
|
/* Implemented to: RFC 8032 */
|
|
|
|
/* Based On Daniel J Bernstein's ed25519 Public Domain ref10 work.
|
|
* Reworked for curve448 by Sean Parkinson.
|
|
*/
|
|
|
|
/* Possible Ed448 enable options:
|
|
* WOLFSSL_EDDSA_CHECK_PRIV_ON_SIGN Default: OFF
|
|
* Check that the private key didn't change during the signing operations.
|
|
*/
|
|
|
|
#include <wolfssl/wolfcrypt/libwolfssl_sources.h>
|
|
|
|
#ifdef HAVE_ED448
|
|
#if FIPS_VERSION3_GE(6,0,0)
|
|
/* set NO_WRAPPERS before headers, use direct internal f()s not wrappers */
|
|
#define FIPS_NO_WRAPPERS
|
|
|
|
#ifdef USE_WINDOWS_API
|
|
#pragma code_seg(".fipsA$f")
|
|
#pragma const_seg(".fipsB$f")
|
|
#endif
|
|
#endif
|
|
|
|
#include <wolfssl/wolfcrypt/ed448.h>
|
|
#include <wolfssl/wolfcrypt/hash.h>
|
|
#ifdef NO_INLINE
|
|
#include <wolfssl/wolfcrypt/misc.h>
|
|
#else
|
|
#define WOLFSSL_MISC_INCLUDED
|
|
#include <wolfcrypt/src/misc.c>
|
|
#endif
|
|
|
|
#if defined(HAVE_ED448_SIGN) || defined(HAVE_ED448_VERIFY)
|
|
/* Size of context bytes to use with hash when signing and verifying. */
|
|
#define ED448CTX_SIZE 8
|
|
/* Context to pass to hash when signing and verifying. */
|
|
static const byte ed448Ctx[ED448CTX_SIZE+1] = "SigEd448";
|
|
#endif
|
|
|
|
#if FIPS_VERSION3_GE(6,0,0)
|
|
const unsigned int wolfCrypt_FIPS_ed448_ro_sanity[2] =
|
|
{ 0x1a2b3c4d, 0x00000007 };
|
|
int wolfCrypt_FIPS_ED448_sanity(void)
|
|
{
|
|
return 0;
|
|
}
|
|
#endif
|
|
|
|
static int ed448_hash_init(ed448_key* key, wc_Shake *sha)
|
|
{
|
|
int ret;
|
|
|
|
ret = wc_InitShake256(sha, key->heap,
|
|
#if defined(WOLF_CRYPTO_CB)
|
|
key->devId
|
|
#else
|
|
INVALID_DEVID
|
|
#endif
|
|
);
|
|
|
|
#ifdef WOLFSSL_ED448_PERSISTENT_SHA
|
|
if (ret == 0)
|
|
key->sha_clean_flag = 1;
|
|
#endif
|
|
|
|
return ret;
|
|
}
|
|
|
|
#ifdef WOLFSSL_ED448_PERSISTENT_SHA
|
|
static int ed448_hash_reset(ed448_key* key)
|
|
{
|
|
int ret;
|
|
|
|
if (key->sha_clean_flag)
|
|
ret = 0;
|
|
else {
|
|
wc_Shake256_Free(&key->sha);
|
|
ret = wc_InitShake256(&key->sha, key->heap,
|
|
#if defined(WOLF_CRYPTO_CB)
|
|
key->devId
|
|
#else
|
|
INVALID_DEVID
|
|
#endif
|
|
);
|
|
if (ret == 0)
|
|
key->sha_clean_flag = 1;
|
|
}
|
|
return ret;
|
|
}
|
|
#endif /* WOLFSSL_ED448_PERSISTENT_SHA */
|
|
|
|
static int ed448_hash_update(ed448_key* key, wc_Shake *sha, const byte* data,
|
|
word32 len)
|
|
{
|
|
#ifdef WOLFSSL_ED448_PERSISTENT_SHA
|
|
if (key->sha_clean_flag)
|
|
key->sha_clean_flag = 0;
|
|
#else
|
|
(void)key;
|
|
#endif
|
|
return wc_Shake256_Update(sha, data, len);
|
|
}
|
|
|
|
static int ed448_hash_final(ed448_key* key, wc_Shake *sha, byte* hash,
|
|
word32 hashLen)
|
|
{
|
|
int ret = wc_Shake256_Final(sha, hash, hashLen);
|
|
#ifdef WOLFSSL_ED448_PERSISTENT_SHA
|
|
if (ret == 0)
|
|
key->sha_clean_flag = 1;
|
|
#else
|
|
(void)key;
|
|
#endif
|
|
return ret;
|
|
}
|
|
|
|
static void ed448_hash_free(ed448_key* key, wc_Shake *sha)
|
|
{
|
|
wc_Shake256_Free(sha);
|
|
#ifdef WOLFSSL_ED448_PERSISTENT_SHA
|
|
key->sha_clean_flag = 0;
|
|
#else
|
|
(void)key;
|
|
#endif
|
|
}
|
|
|
|
|
|
static int ed448_hash(ed448_key* key, const byte* in, word32 inLen,
|
|
byte* hash, word32 hashLen)
|
|
{
|
|
int ret;
|
|
#ifndef WOLFSSL_ED448_PERSISTENT_SHA
|
|
wc_Shake sha[1];
|
|
#else
|
|
wc_Shake *sha;
|
|
#endif
|
|
|
|
if (key == NULL || (in == NULL && inLen > 0) || hash == NULL) {
|
|
return BAD_FUNC_ARG;
|
|
}
|
|
|
|
#ifdef WOLFSSL_ED448_PERSISTENT_SHA
|
|
sha = &key->sha;
|
|
ret = ed448_hash_reset(key);
|
|
#else
|
|
ret = ed448_hash_init(key, sha);
|
|
#endif
|
|
if (ret < 0)
|
|
return ret;
|
|
|
|
ret = ed448_hash_update(key, sha, in, inLen);
|
|
if (ret == 0)
|
|
ret = ed448_hash_final(key, sha, hash, hashLen);
|
|
|
|
#ifndef WOLFSSL_ED448_PERSISTENT_SHA
|
|
ed448_hash_free(key, sha);
|
|
#endif
|
|
|
|
return ret;
|
|
}
|
|
|
|
#if FIPS_VERSION3_GE(6,0,0)
|
|
/* Performs a Pairwise Consistency Test on an Ed448 key pair.
|
|
*
|
|
* @param [in] key Ed448 key to test.
|
|
* @param [in] rng Random number generator to use to create random digest.
|
|
* @return 0 on success.
|
|
* @return ECC_PCT_E when signing or verification fail.
|
|
* @return Other -ve when random number generation fails.
|
|
*/
|
|
static int ed448_pairwise_consistency_test(ed448_key* key, WC_RNG* rng)
|
|
{
|
|
int err = 0;
|
|
byte digest[WC_SHA256_DIGEST_SIZE];
|
|
word32 digestLen = WC_SHA256_DIGEST_SIZE;
|
|
byte sig[ED448_SIG_SIZE];
|
|
word32 sigLen = ED448_SIG_SIZE;
|
|
int res = 0;
|
|
|
|
/* Generate a random digest to sign. */
|
|
err = wc_RNG_GenerateBlock(rng, digest, digestLen);
|
|
if (err == 0) {
|
|
/* Sign digest without context. */
|
|
err = wc_ed448_sign_msg_ex(digest, digestLen, sig, &sigLen, key, Ed448,
|
|
NULL, 0);
|
|
if (err != 0) {
|
|
/* Any sign failure means test failed. */
|
|
err = ECC_PCT_E;
|
|
}
|
|
}
|
|
if (err == 0) {
|
|
/* Verify digest without context. */
|
|
err = wc_ed448_verify_msg_ex(sig, sigLen, digest, digestLen, &res, key,
|
|
Ed448, NULL, 0);
|
|
if (err != 0) {
|
|
/* Any verification operation failure means test failed. */
|
|
err = ECC_PCT_E;
|
|
}
|
|
/* Check whether the signature verified. */
|
|
else if (res == 0) {
|
|
/* Test failed. */
|
|
err = ECC_PCT_E;
|
|
}
|
|
}
|
|
|
|
ForceZero(sig, sigLen);
|
|
|
|
return err;
|
|
}
|
|
#endif
|
|
|
|
/* Derive the public key for the private key.
|
|
*
|
|
* key [in] Ed448 key object.
|
|
* pubKey [in] Byte array to hold the public key.
|
|
* pubKeySz [in] Size of the array in bytes.
|
|
* returns BAD_FUNC_ARG when key is NULL or pubKeySz is not equal to
|
|
* ED448_PUB_KEY_SIZE,
|
|
* other -ve value on hash failure,
|
|
* 0 otherwise.
|
|
*/
|
|
int wc_ed448_make_public(ed448_key* key, unsigned char* pubKey, word32 pubKeySz)
|
|
{
|
|
int ret = 0;
|
|
byte az[ED448_PRV_KEY_SIZE];
|
|
ge448_p2 A;
|
|
|
|
if ((key == NULL) || (pubKey == NULL) || (pubKeySz != ED448_PUB_KEY_SIZE)) {
|
|
ret = BAD_FUNC_ARG;
|
|
}
|
|
|
|
if ((ret == 0) && (!key->privKeySet)) {
|
|
ret = ECC_PRIV_KEY_E;
|
|
}
|
|
|
|
if (ret == 0)
|
|
ret = ed448_hash(key, key->k, ED448_KEY_SIZE, az, sizeof(az));
|
|
|
|
if (ret == 0) {
|
|
/* apply clamp */
|
|
az[0] &= 0xfc;
|
|
az[55] |= 0x80;
|
|
az[56] = 0x00;
|
|
|
|
ret = ge448_scalarmult_base(&A, az);
|
|
}
|
|
|
|
if (ret == 0) {
|
|
ge448_to_bytes(pubKey, &A);
|
|
|
|
key->pubKeySet = 1;
|
|
}
|
|
|
|
return ret;
|
|
}
|
|
|
|
/* Make a new ed448 private/public key.
|
|
*
|
|
* rng [in] Random number generator.
|
|
* keysize [in] Size of the key to generate.
|
|
* key [in] Ed448 key object.
|
|
* returns BAD_FUNC_ARG when rng or key is NULL or keySz is not equal to
|
|
* ED448_KEY_SIZE,
|
|
* other -ve value on random number or hash failure,
|
|
* 0 otherwise.
|
|
*/
|
|
int wc_ed448_make_key(WC_RNG* rng, int keySz, ed448_key* key)
|
|
{
|
|
int ret = 0;
|
|
|
|
if ((rng == NULL) || (key == NULL)) {
|
|
ret = BAD_FUNC_ARG;
|
|
}
|
|
|
|
/* ed448 has 57 byte key sizes */
|
|
if ((ret == 0) && (keySz != ED448_KEY_SIZE)) {
|
|
ret = BAD_FUNC_ARG;
|
|
}
|
|
|
|
if (ret == 0) {
|
|
key->pubKeySet = 0;
|
|
key->privKeySet = 0;
|
|
|
|
ret = wc_RNG_GenerateBlock(rng, key->k, ED448_KEY_SIZE);
|
|
}
|
|
if (ret == 0) {
|
|
key->privKeySet = 1;
|
|
ret = wc_ed448_make_public(key, key->p, ED448_PUB_KEY_SIZE);
|
|
if (ret != 0) {
|
|
key->privKeySet = 0;
|
|
ForceZero(key->k, ED448_KEY_SIZE);
|
|
}
|
|
}
|
|
if (ret == 0) {
|
|
/* put public key after private key, on the same buffer */
|
|
XMEMMOVE(key->k + ED448_KEY_SIZE, key->p, ED448_PUB_KEY_SIZE);
|
|
|
|
#if FIPS_VERSION3_GE(6,0,0)
|
|
ret = wc_ed448_check_key(key);
|
|
if (ret == 0) {
|
|
ret = ed448_pairwise_consistency_test(key, rng);
|
|
}
|
|
#endif
|
|
}
|
|
|
|
return ret;
|
|
}
|
|
|
|
#ifdef HAVE_ED448_SIGN
|
|
/* Sign the message using the ed448 private key.
|
|
*
|
|
* in [in] Message to sign.
|
|
* inLen [in] Length of the message in bytes.
|
|
* out [in] Buffer to write signature into.
|
|
* outLen [in/out] On in, size of buffer.
|
|
* On out, the length of the signature in bytes.
|
|
* key [in] Ed448 key to use when signing
|
|
* type [in] Type of signature to perform: Ed448 or Ed448ph
|
|
* context [in] Context of signing.
|
|
* contextLen [in] Length of context in bytes.
|
|
* returns BAD_FUNC_ARG when a parameter is NULL or contextLen is zero when and
|
|
* context is not NULL or public key not set,
|
|
* BUFFER_E when outLen is less than ED448_SIG_SIZE,
|
|
* other -ve values when hash fails,
|
|
* 0 otherwise.
|
|
*/
|
|
int wc_ed448_sign_msg_ex(const byte* in, word32 inLen, byte* out,
|
|
word32 *outLen, ed448_key* key, byte type,
|
|
const byte* context, byte contextLen)
|
|
{
|
|
ge448_p2 R;
|
|
byte nonce[ED448_SIG_SIZE];
|
|
byte hram[ED448_SIG_SIZE];
|
|
byte az[ED448_PRV_KEY_SIZE];
|
|
int ret = 0;
|
|
#ifdef WOLFSSL_EDDSA_CHECK_PRIV_ON_SIGN
|
|
byte orig_k[ED448_KEY_SIZE];
|
|
#endif
|
|
|
|
/* sanity check on arguments */
|
|
if ((in == NULL) || (out == NULL) || (outLen == NULL) || (key == NULL) ||
|
|
((context == NULL) && (contextLen != 0))) {
|
|
ret = BAD_FUNC_ARG;
|
|
}
|
|
if ((ret == 0) && (!key->pubKeySet)) {
|
|
ret = BAD_FUNC_ARG;
|
|
}
|
|
|
|
/* check and set up out length */
|
|
if ((ret == 0) && (*outLen < ED448_SIG_SIZE)) {
|
|
*outLen = ED448_SIG_SIZE;
|
|
ret = BUFFER_E;
|
|
}
|
|
|
|
if (ret == 0) {
|
|
*outLen = ED448_SIG_SIZE;
|
|
|
|
#ifdef WOLFSSL_EDDSA_CHECK_PRIV_ON_SIGN
|
|
XMEMCPY(orig_k, key->k, ED448_KEY_SIZE);
|
|
#endif
|
|
|
|
/* step 1: create nonce to use where nonce is r in
|
|
r = H(h_b, ... ,h_2b-1,M) */
|
|
ret = ed448_hash(key, key->k, ED448_KEY_SIZE, az, sizeof(az));
|
|
}
|
|
if (ret == 0) {
|
|
#ifdef WOLFSSL_ED448_PERSISTENT_SHA
|
|
wc_Shake *sha = &key->sha;
|
|
#else
|
|
wc_Shake sha[1];
|
|
ret = ed448_hash_init(key, sha);
|
|
if (ret < 0)
|
|
return ret;
|
|
#endif
|
|
/* apply clamp */
|
|
az[0] &= 0xfc;
|
|
az[55] |= 0x80;
|
|
az[56] = 0x00;
|
|
|
|
ret = ed448_hash_update(key, sha, ed448Ctx, ED448CTX_SIZE);
|
|
|
|
if (ret == 0) {
|
|
ret = ed448_hash_update(key, sha, &type, sizeof(type));
|
|
}
|
|
if (ret == 0) {
|
|
ret = ed448_hash_update(key, sha, &contextLen, sizeof(contextLen));
|
|
}
|
|
if ((ret == 0) && (context != NULL)) {
|
|
ret = ed448_hash_update(key, sha, context, contextLen);
|
|
}
|
|
if (ret == 0) {
|
|
ret = ed448_hash_update(key, sha, az + ED448_KEY_SIZE, ED448_KEY_SIZE);
|
|
}
|
|
if (ret == 0) {
|
|
ret = ed448_hash_update(key, sha, in, inLen);
|
|
}
|
|
if (ret == 0) {
|
|
ret = ed448_hash_final(key, sha, nonce, sizeof(nonce));
|
|
}
|
|
#ifndef WOLFSSL_ED448_PERSISTENT_SHA
|
|
ed448_hash_free(key, sha);
|
|
#endif
|
|
}
|
|
if (ret == 0) {
|
|
#ifdef WOLFSSL_ED448_PERSISTENT_SHA
|
|
wc_Shake *sha = &key->sha;
|
|
#else
|
|
wc_Shake sha[1];
|
|
ret = ed448_hash_init(key, sha);
|
|
if (ret < 0)
|
|
return ret;
|
|
#endif
|
|
sc448_reduce(nonce);
|
|
|
|
/* step 2: computing R = rB where rB is the scalar multiplication of
|
|
r and B */
|
|
ret = ge448_scalarmult_base(&R,nonce);
|
|
|
|
/* step 3: hash R + public key + message getting H(R,A,M) then
|
|
creating S = (r + H(R,A,M)a) mod l */
|
|
if (ret == 0) {
|
|
ge448_to_bytes(out,&R);
|
|
|
|
ret = ed448_hash_update(key, sha, ed448Ctx, ED448CTX_SIZE);
|
|
}
|
|
if (ret == 0) {
|
|
ret = ed448_hash_update(key, sha, &type, sizeof(type));
|
|
}
|
|
if (ret == 0) {
|
|
ret = ed448_hash_update(key, sha, &contextLen, sizeof(contextLen));
|
|
}
|
|
if ((ret == 0) && (context != NULL)) {
|
|
ret = ed448_hash_update(key, sha, context, contextLen);
|
|
}
|
|
if (ret == 0) {
|
|
ret = ed448_hash_update(key, sha, out, ED448_SIG_SIZE/2);
|
|
}
|
|
if (ret == 0) {
|
|
ret = ed448_hash_update(key, sha, key->p, ED448_PUB_KEY_SIZE);
|
|
}
|
|
if (ret == 0) {
|
|
ret = ed448_hash_update(key, sha, in, inLen);
|
|
}
|
|
if (ret == 0) {
|
|
ret = ed448_hash_final(key, sha, hram, sizeof(hram));
|
|
}
|
|
#ifndef WOLFSSL_ED448_PERSISTENT_SHA
|
|
ed448_hash_free(key, sha);
|
|
#endif
|
|
}
|
|
|
|
if (ret == 0) {
|
|
sc448_reduce(hram);
|
|
sc448_muladd(out + (ED448_SIG_SIZE/2), hram, az, nonce);
|
|
}
|
|
|
|
#ifdef WOLFSSL_EDDSA_CHECK_PRIV_ON_SIGN
|
|
if (ret == 0) {
|
|
int i;
|
|
byte c = 0;
|
|
for (i = 0; i < ED448_KEY_SIZE; i++) {
|
|
c |= key->k[i] ^ orig_k[i];
|
|
}
|
|
ret = ctMaskGT(c, 0) & SIG_VERIFY_E;
|
|
}
|
|
#endif
|
|
|
|
return ret;
|
|
}
|
|
|
|
/* Sign the message using the ed448 private key.
|
|
* Signature type is Ed448.
|
|
*
|
|
* in [in] Message to sign.
|
|
* inLen [in] Length of the message in bytes.
|
|
* out [in] Buffer to write signature into.
|
|
* outLen [in/out] On in, size of buffer.
|
|
* On out, the length of the signature in bytes.
|
|
* key [in] Ed448 key to use when signing
|
|
* context [in] Context of signing.
|
|
* contextLen [in] Length of context in bytes.
|
|
* returns BAD_FUNC_ARG when a parameter is NULL or contextLen is zero when and
|
|
* context is not NULL or public key not set,
|
|
* BUFFER_E when outLen is less than ED448_SIG_SIZE,
|
|
* other -ve values when hash fails,
|
|
* 0 otherwise.
|
|
*/
|
|
int wc_ed448_sign_msg(const byte* in, word32 inLen, byte* out, word32 *outLen,
|
|
ed448_key* key, const byte* context, byte contextLen)
|
|
{
|
|
return wc_ed448_sign_msg_ex(in, inLen, out, outLen, key, Ed448, context,
|
|
contextLen);
|
|
}
|
|
|
|
/* Sign the hash using the ed448 private key.
|
|
* Signature type is Ed448ph.
|
|
*
|
|
* hash [in] Hash of message to sign.
|
|
* hashLen [in] Length of hash of message in bytes.
|
|
* out [in] Buffer to write signature into.
|
|
* outLen [in/out] On in, size of buffer.
|
|
* On out, the length of the signature in bytes.
|
|
* key [in] Ed448 key to use when signing
|
|
* context [in] Context of signing.
|
|
* contextLen [in] Length of context in bytes.
|
|
* returns BAD_FUNC_ARG when a parameter is NULL or contextLen is zero when and
|
|
* context is not NULL or public key not set,
|
|
* BUFFER_E when outLen is less than ED448_SIG_SIZE,
|
|
* other -ve values when hash fails,
|
|
* 0 otherwise.
|
|
*/
|
|
int wc_ed448ph_sign_hash(const byte* hash, word32 hashLen, byte* out,
|
|
word32 *outLen, ed448_key* key,
|
|
const byte* context, byte contextLen)
|
|
{
|
|
return wc_ed448_sign_msg_ex(hash, hashLen, out, outLen, key, Ed448ph,
|
|
context, contextLen);
|
|
}
|
|
|
|
/* Sign the message using the ed448 private key.
|
|
* Signature type is Ed448ph.
|
|
*
|
|
* in [in] Message to sign.
|
|
* inLen [in] Length of the message to sign in bytes.
|
|
* out [in] Buffer to write signature into.
|
|
* outLen [in/out] On in, size of buffer.
|
|
* On out, the length of the signature in bytes.
|
|
* key [in] Ed448 key to use when signing
|
|
* context [in] Context of signing.
|
|
* contextLen [in] Length of context in bytes.
|
|
* returns BAD_FUNC_ARG when a parameter is NULL or contextLen is zero when and
|
|
* context is not NULL or public key not set,
|
|
* BUFFER_E when outLen is less than ED448_SIG_SIZE,
|
|
* other -ve values when hash fails,
|
|
* 0 otherwise.
|
|
*/
|
|
int wc_ed448ph_sign_msg(const byte* in, word32 inLen, byte* out, word32 *outLen,
|
|
ed448_key* key, const byte* context, byte contextLen)
|
|
{
|
|
int ret;
|
|
byte hash[ED448_PREHASH_SIZE];
|
|
|
|
ret = ed448_hash(key, in, inLen, hash, sizeof(hash));
|
|
|
|
if (ret == 0) {
|
|
ret = wc_ed448ph_sign_hash(hash, sizeof(hash), out, outLen, key,
|
|
context, contextLen);
|
|
}
|
|
|
|
return ret;
|
|
}
|
|
#endif /* HAVE_ED448_SIGN */
|
|
|
|
#ifdef HAVE_ED448_VERIFY
|
|
|
|
/* Verify the message using the ed448 public key.
|
|
*
|
|
* sig [in] Signature to verify.
|
|
* sigLen [in] Size of signature in bytes.
|
|
* key [in] Ed448 key to use to verify.
|
|
* type [in] Type of signature to verify: Ed448 or Ed448ph
|
|
* context [in] Context of verification.
|
|
* contextLen [in] Length of context in bytes.
|
|
* returns BAD_FUNC_ARG when a parameter is NULL or contextLen is zero when and
|
|
* context is not NULL or public key not set,
|
|
* BUFFER_E when sigLen is less than ED448_SIG_SIZE,
|
|
* other -ve values when hash fails,
|
|
* 0 otherwise.
|
|
*/
|
|
|
|
static int ed448_verify_msg_init_with_sha(const byte* sig, word32 sigLen,
|
|
ed448_key* key, wc_Shake *sha, byte type,
|
|
const byte* context, byte contextLen)
|
|
{
|
|
int ret;
|
|
|
|
/* sanity check on arguments */
|
|
if ((sig == NULL) || (key == NULL) ||
|
|
((context == NULL) && (contextLen != 0))) {
|
|
return BAD_FUNC_ARG;
|
|
}
|
|
|
|
/* check on basics needed to verify signature */
|
|
if (sigLen != ED448_SIG_SIZE) {
|
|
return BAD_FUNC_ARG;
|
|
}
|
|
|
|
/* find H(R,A,M) and store it as h */
|
|
#ifdef WOLFSSL_ED448_PERSISTENT_SHA
|
|
ret = ed448_hash_reset(key);
|
|
if (ret < 0)
|
|
return ret;
|
|
#endif
|
|
|
|
ret = ed448_hash_update(key, sha, ed448Ctx, ED448CTX_SIZE);
|
|
if (ret == 0) {
|
|
ret = ed448_hash_update(key, sha, &type, sizeof(type));
|
|
}
|
|
if (ret == 0) {
|
|
ret = ed448_hash_update(key, sha, &contextLen, sizeof(contextLen));
|
|
}
|
|
if ((ret == 0) && (context != NULL)) {
|
|
ret = ed448_hash_update(key, sha, context, contextLen);
|
|
}
|
|
if (ret == 0) {
|
|
ret = ed448_hash_update(key, sha, sig, ED448_SIG_SIZE/2);
|
|
}
|
|
if (ret == 0) {
|
|
ret = ed448_hash_update(key, sha, key->p, ED448_PUB_KEY_SIZE);
|
|
}
|
|
|
|
return ret;
|
|
}
|
|
|
|
/*
|
|
msgSegment an array of bytes containing a message segment
|
|
msgSegmentLen length of msgSegment
|
|
key Ed448 public key
|
|
return 0 on success
|
|
*/
|
|
static int ed448_verify_msg_update_with_sha(const byte* msgSegment,
|
|
word32 msgSegmentLen,
|
|
ed448_key* key,
|
|
wc_Shake *sha)
|
|
{
|
|
/* sanity check on arguments */
|
|
if (msgSegment == NULL || key == NULL)
|
|
return BAD_FUNC_ARG;
|
|
|
|
return ed448_hash_update(key, sha, msgSegment, msgSegmentLen);
|
|
}
|
|
|
|
/* Order of the ed448 curve - little endian. */
|
|
static const byte ed448_order[] = {
|
|
0xf3, 0x44, 0x58, 0xab, 0x92, 0xc2, 0x78, 0x23,
|
|
0x55, 0x8f, 0xc5, 0x8d, 0x72, 0xc2, 0x6c, 0x21,
|
|
0x90, 0x36, 0xd6, 0xae, 0x49, 0xdb, 0x4e, 0xc4,
|
|
0xe9, 0x23, 0xca, 0x7c, 0xff, 0xff, 0xff, 0xff,
|
|
0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
|
|
0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
|
|
0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x3f,
|
|
0x00
|
|
};
|
|
|
|
/* Verify the message using the ed448 public key.
|
|
*
|
|
* sig [in] Signature to verify.
|
|
* sigLen [in] Size of signature in bytes.
|
|
* res [out] *res is set to 1 on successful verification.
|
|
* key [in] Ed448 key to use to verify.
|
|
* returns BAD_FUNC_ARG when a parameter is NULL or public key not set,
|
|
* BUFFER_E when sigLen is less than ED448_SIG_SIZE,
|
|
* other -ve values when hash fails,
|
|
* 0 otherwise.
|
|
*/
|
|
static int ed448_verify_msg_final_with_sha(const byte* sig, word32 sigLen,
|
|
int* res, ed448_key* key, wc_Shake *sha)
|
|
{
|
|
byte rcheck[ED448_KEY_SIZE];
|
|
byte h[ED448_SIG_SIZE];
|
|
ge448_p2 A;
|
|
ge448_p2 R;
|
|
int ret;
|
|
int i;
|
|
|
|
/* sanity check on arguments */
|
|
if ((sig == NULL) || (res == NULL) || (key == NULL))
|
|
return BAD_FUNC_ARG;
|
|
|
|
/* set verification failed by default */
|
|
*res = 0;
|
|
|
|
/* check on basics needed to verify signature */
|
|
if (sigLen != ED448_SIG_SIZE)
|
|
return BAD_FUNC_ARG;
|
|
/* Check S is not larger than or equal to order. */
|
|
for (i = (int)sizeof(ed448_order) - 1; i >= 0; i--) {
|
|
/* Bigger than order. */
|
|
if (sig[ED448_SIG_SIZE/2 + i] > ed448_order[i])
|
|
return BAD_FUNC_ARG;
|
|
/* Less than order. */
|
|
if (sig[ED448_SIG_SIZE/2 + i] < ed448_order[i])
|
|
break;
|
|
}
|
|
/* Same value as order. */
|
|
if (i == -1)
|
|
return BAD_FUNC_ARG;
|
|
|
|
/* uncompress A (public key), test if valid, and negate it */
|
|
if (ge448_from_bytes_negate_vartime(&A, key->p) != 0)
|
|
return BAD_FUNC_ARG;
|
|
|
|
ret = ed448_hash_final(key, sha, h, sizeof(h));
|
|
if (ret != 0)
|
|
return ret;
|
|
|
|
sc448_reduce(h);
|
|
|
|
/* Uses a fast single-signature verification SB = R + H(R,A,M)A becomes
|
|
* SB - H(R,A,M)A saving decompression of R
|
|
*/
|
|
ret = ge448_double_scalarmult_vartime(&R, h, &A,
|
|
sig + (ED448_SIG_SIZE/2));
|
|
if (ret != 0)
|
|
return ret;
|
|
|
|
ge448_to_bytes(rcheck, &R);
|
|
|
|
/* comparison of R created to R in sig */
|
|
if (ConstantCompare(rcheck, sig, ED448_SIG_SIZE/2) != 0) {
|
|
ret = SIG_VERIFY_E;
|
|
}
|
|
else {
|
|
/* set the verification status */
|
|
*res = 1;
|
|
}
|
|
|
|
return ret;
|
|
}
|
|
|
|
#ifdef WOLFSSL_ED448_STREAMING_VERIFY
|
|
int wc_ed448_verify_msg_init(const byte* sig, word32 sigLen, ed448_key* key,
|
|
byte type, const byte* context, byte contextLen)
|
|
{
|
|
return ed448_verify_msg_init_with_sha(sig, sigLen, key, &key->sha, type,
|
|
context, contextLen);
|
|
}
|
|
|
|
int wc_ed448_verify_msg_update(const byte* msgSegment, word32 msgSegmentLen,
|
|
ed448_key* key)
|
|
{
|
|
return ed448_verify_msg_update_with_sha(msgSegment, msgSegmentLen, key,
|
|
&key->sha);
|
|
}
|
|
|
|
int wc_ed448_verify_msg_final(const byte* sig, word32 sigLen,
|
|
int* res, ed448_key* key)
|
|
{
|
|
return ed448_verify_msg_final_with_sha(sig, sigLen, res, key, &key->sha);
|
|
}
|
|
#endif
|
|
|
|
/* Verify the message using the ed448 public key.
|
|
*
|
|
* sig [in] Signature to verify.
|
|
* sigLen [in] Size of signature in bytes.
|
|
* msg [in] Message to verify.
|
|
* msgLen [in] Length of the message in bytes.
|
|
* res [out] *res is set to 1 on successful verification.
|
|
* key [in] Ed448 key to use to verify.
|
|
* type [in] Type of signature to verify: Ed448 or Ed448ph
|
|
* context [in] Context of verification.
|
|
* contextLen [in] Length of context in bytes.
|
|
* returns BAD_FUNC_ARG when a parameter is NULL or contextLen is zero when and
|
|
* context is not NULL or public key not set,
|
|
* BUFFER_E when sigLen is less than ED448_SIG_SIZE,
|
|
* other -ve values when hash fails,
|
|
* 0 otherwise.
|
|
*/
|
|
int wc_ed448_verify_msg_ex(const byte* sig, word32 sigLen, const byte* msg,
|
|
word32 msgLen, int* res, ed448_key* key,
|
|
byte type, const byte* context, byte contextLen)
|
|
{
|
|
int ret;
|
|
#ifdef WOLFSSL_ED448_PERSISTENT_SHA
|
|
wc_Shake *sha;
|
|
#else
|
|
wc_Shake sha[1];
|
|
#endif
|
|
|
|
if (key == NULL)
|
|
return BAD_FUNC_ARG;
|
|
|
|
#ifdef WOLFSSL_ED448_PERSISTENT_SHA
|
|
sha = &key->sha;
|
|
#else
|
|
ret = ed448_hash_init(key, sha);
|
|
if (ret < 0)
|
|
return ret;
|
|
#endif
|
|
|
|
ret = ed448_verify_msg_init_with_sha(sig, sigLen, key, sha,
|
|
type, context, contextLen);
|
|
if (ret == 0)
|
|
ret = ed448_verify_msg_update_with_sha(msg, msgLen, key, sha);
|
|
if (ret == 0)
|
|
ret = ed448_verify_msg_final_with_sha(sig, sigLen, res, key, sha);
|
|
|
|
#ifndef WOLFSSL_ED448_PERSISTENT_SHA
|
|
ed448_hash_free(key, sha);
|
|
#endif
|
|
|
|
return ret;
|
|
}
|
|
|
|
/* Verify the message using the ed448 public key.
|
|
* Signature type is Ed448.
|
|
*
|
|
* sig [in] Signature to verify.
|
|
* sigLen [in] Size of signature in bytes.
|
|
* msg [in] Message to verify.
|
|
* msgLen [in] Length of the message in bytes.
|
|
* key [in] Ed448 key to use to verify.
|
|
* context [in] Context of verification.
|
|
* contextLen [in] Length of context in bytes.
|
|
* returns BAD_FUNC_ARG when a parameter is NULL or contextLen is zero when and
|
|
* context is not NULL or public key not set,
|
|
* BUFFER_E when sigLen is less than ED448_SIG_SIZE,
|
|
* other -ve values when hash fails,
|
|
* 0 otherwise.
|
|
*/
|
|
int wc_ed448_verify_msg(const byte* sig, word32 sigLen, const byte* msg,
|
|
word32 msgLen, int* res, ed448_key* key,
|
|
const byte* context, byte contextLen)
|
|
{
|
|
return wc_ed448_verify_msg_ex(sig, sigLen, msg, msgLen, res, key, Ed448,
|
|
context, contextLen);
|
|
}
|
|
|
|
/* Verify the hash using the ed448 public key.
|
|
* Signature type is Ed448ph.
|
|
*
|
|
* sig [in] Signature to verify.
|
|
* sigLen [in] Size of signature in bytes.
|
|
* hash [in] Hash of message to verify.
|
|
* hashLen [in] Length of the hash in bytes.
|
|
* key [in] Ed448 key to use to verify.
|
|
* context [in] Context of verification.
|
|
* contextLen [in] Length of context in bytes.
|
|
* returns BAD_FUNC_ARG when a parameter is NULL or contextLen is zero when and
|
|
* context is not NULL or public key not set,
|
|
* BUFFER_E when sigLen is less than ED448_SIG_SIZE,
|
|
* other -ve values when hash fails,
|
|
* 0 otherwise.
|
|
*/
|
|
int wc_ed448ph_verify_hash(const byte* sig, word32 sigLen, const byte* hash,
|
|
word32 hashLen, int* res, ed448_key* key,
|
|
const byte* context, byte contextLen)
|
|
{
|
|
return wc_ed448_verify_msg_ex(sig, sigLen, hash, hashLen, res, key, Ed448ph,
|
|
context, contextLen);
|
|
}
|
|
|
|
/* Verify the message using the ed448 public key.
|
|
* Signature type is Ed448ph.
|
|
*
|
|
* sig [in] Signature to verify.
|
|
* sigLen [in] Size of signature in bytes.
|
|
* msg [in] Message to verify.
|
|
* msgLen [in] Length of the message in bytes.
|
|
* key [in] Ed448 key to use to verify.
|
|
* context [in] Context of verification.
|
|
* contextLen [in] Length of context in bytes.
|
|
* returns BAD_FUNC_ARG when a parameter is NULL or contextLen is zero when and
|
|
* context is not NULL or public key not set,
|
|
* BUFFER_E when sigLen is less than ED448_SIG_SIZE,
|
|
* other -ve values when hash fails,
|
|
* 0 otherwise.
|
|
*/
|
|
int wc_ed448ph_verify_msg(const byte* sig, word32 sigLen, const byte* msg,
|
|
word32 msgLen, int* res, ed448_key* key,
|
|
const byte* context, byte contextLen)
|
|
{
|
|
int ret = 0;
|
|
byte hash[ED448_PREHASH_SIZE];
|
|
|
|
ret = ed448_hash(key, msg, msgLen, hash, sizeof(hash));
|
|
|
|
if (ret == 0) {
|
|
ret = wc_ed448ph_verify_hash(sig, sigLen, hash, sizeof(hash), res, key,
|
|
context, contextLen);
|
|
}
|
|
|
|
return ret;
|
|
}
|
|
#endif /* HAVE_ED448_VERIFY */
|
|
|
|
/* Initialize the ed448 private/public key.
|
|
*
|
|
* key [in] Ed448 key.
|
|
* heap [in] heap pointer to pass to wc_InitShake256().
|
|
* returns BAD_FUNC_ARG when key is NULL
|
|
*/
|
|
int wc_ed448_init_ex(ed448_key* key, void *heap, int devId)
|
|
{
|
|
if (key == NULL)
|
|
return BAD_FUNC_ARG;
|
|
|
|
XMEMSET(key, 0, sizeof(ed448_key));
|
|
|
|
#ifdef WOLF_CRYPTO_CB
|
|
key->devId = devId;
|
|
#else
|
|
(void)devId;
|
|
#endif
|
|
key->heap = heap;
|
|
|
|
fe448_init();
|
|
|
|
#ifdef WOLFSSL_CHECK_MEM_ZERO
|
|
wc_MemZero_Add("wc_ed448_init_ex key->k", &key->k, sizeof(key->k));
|
|
#endif
|
|
|
|
#ifdef WOLFSSL_ED448_PERSISTENT_SHA
|
|
return ed448_hash_init(key, &key->sha);
|
|
#else /* !WOLFSSL_ED448_PERSISTENT_SHA */
|
|
return 0;
|
|
#endif /* WOLFSSL_ED448_PERSISTENT_SHA */
|
|
}
|
|
|
|
/* Initialize the ed448 private/public key.
|
|
*
|
|
* key [in] Ed448 key.
|
|
* returns BAD_FUNC_ARG when key is NULL
|
|
*/
|
|
int wc_ed448_init(ed448_key* key) {
|
|
return wc_ed448_init_ex(key, NULL, INVALID_DEVID);
|
|
}
|
|
|
|
/* Clears the ed448 key data
|
|
*
|
|
* key [in] Ed448 key.
|
|
*/
|
|
void wc_ed448_free(ed448_key* key)
|
|
{
|
|
if (key != NULL) {
|
|
#ifdef WOLFSSL_ED448_PERSISTENT_SHA
|
|
ed448_hash_free(key, &key->sha);
|
|
#endif
|
|
ForceZero(key, sizeof(ed448_key));
|
|
#ifdef WOLFSSL_CHECK_MEM_ZERO
|
|
wc_MemZero_Check(key, sizeof(ed448_key));
|
|
#endif
|
|
}
|
|
}
|
|
|
|
|
|
#ifdef HAVE_ED448_KEY_EXPORT
|
|
|
|
/* Export the ed448 public key.
|
|
*
|
|
* key [in] Ed448 public key.
|
|
* out [in] Array to hold public key.
|
|
* outLen [in/out] On in, the number of bytes in array.
|
|
* On out, the number bytes put into array.
|
|
* returns BAD_FUNC_ARG when a parameter is NULL,
|
|
* ECC_BAD_ARG_E when outLen is less than ED448_PUB_KEY_SIZE,
|
|
* 0 otherwise.
|
|
*/
|
|
int wc_ed448_export_public(const ed448_key* key, byte* out, word32* outLen)
|
|
{
|
|
int ret = 0;
|
|
|
|
/* sanity check on arguments */
|
|
if ((key == NULL) || (out == NULL) || (outLen == NULL)) {
|
|
ret = BAD_FUNC_ARG;
|
|
}
|
|
|
|
if ((ret == 0) && (*outLen < ED448_PUB_KEY_SIZE)) {
|
|
*outLen = ED448_PUB_KEY_SIZE;
|
|
ret = BUFFER_E;
|
|
}
|
|
|
|
if (ret == 0) {
|
|
*outLen = ED448_PUB_KEY_SIZE;
|
|
XMEMCPY(out, key->p, ED448_PUB_KEY_SIZE);
|
|
}
|
|
|
|
return ret;
|
|
}
|
|
|
|
#endif /* HAVE_ED448_KEY_EXPORT */
|
|
|
|
|
|
#ifdef HAVE_ED448_KEY_IMPORT
|
|
/* Import a compressed or uncompressed ed448 public key from a byte array.
|
|
* Public key encoded in big-endian.
|
|
*
|
|
* in [in] Array holding public key.
|
|
* inLen [in] Number of bytes of data in array.
|
|
* key [in] Ed448 public key.
|
|
* trusted [in] Indicates whether the public key data is trusted.
|
|
* When 0, checks public key matches private key.
|
|
* When 1, doesn't check public key matches private key.
|
|
* returns BAD_FUNC_ARG when a parameter is NULL or key format is not supported,
|
|
* 0 otherwise.
|
|
*/
|
|
int wc_ed448_import_public_ex(const byte* in, word32 inLen, ed448_key* key,
|
|
int trusted)
|
|
{
|
|
int ret = 0;
|
|
|
|
/* sanity check on arguments */
|
|
if ((in == NULL) || (key == NULL)) {
|
|
ret = BAD_FUNC_ARG;
|
|
}
|
|
|
|
if ((inLen != ED448_PUB_KEY_SIZE) &&
|
|
(inLen != ED448_PUB_KEY_SIZE + 1) &&
|
|
(inLen != 2 * ED448_PUB_KEY_SIZE + 1)) {
|
|
ret = BAD_FUNC_ARG;
|
|
}
|
|
|
|
if (ret == 0) {
|
|
/* compressed prefix according to draft
|
|
* https://tools.ietf.org/html/draft-ietf-openpgp-rfc4880bis-06 */
|
|
if (in[0] == 0x40 && inLen > ED448_PUB_KEY_SIZE) {
|
|
/* key is stored in compressed format so just copy in */
|
|
XMEMCPY(key->p, (in + 1), ED448_PUB_KEY_SIZE);
|
|
}
|
|
/* importing uncompressed public key */
|
|
else if (in[0] == 0x04 && inLen > 2*ED448_PUB_KEY_SIZE) {
|
|
/* pass in (x,y) and store compressed key */
|
|
ret = ge448_compress_key(key->p, in+1, in+1+ED448_PUB_KEY_SIZE);
|
|
}
|
|
else if (inLen == ED448_PUB_KEY_SIZE) {
|
|
/* if not specified compressed or uncompressed check key size
|
|
* if key size is equal to compressed key size copy in key */
|
|
XMEMCPY(key->p, in, ED448_PUB_KEY_SIZE);
|
|
}
|
|
else {
|
|
/* bad public key format */
|
|
ret = BAD_FUNC_ARG;
|
|
}
|
|
}
|
|
|
|
if (ret == 0) {
|
|
key->pubKeySet = 1;
|
|
if (!trusted) {
|
|
/* Check untrusted public key data matches private key. */
|
|
ret = wc_ed448_check_key(key);
|
|
}
|
|
}
|
|
|
|
if ((ret != 0) && (key != NULL)) {
|
|
/* No public key set on failure. */
|
|
key->pubKeySet = 0;
|
|
}
|
|
|
|
return ret;
|
|
}
|
|
|
|
/* Import a compressed or uncompressed ed448 public key from a byte array.
|
|
*
|
|
* Public key encoded in big-endian.
|
|
* Public key is not trusted and is checked against private key if set.
|
|
*
|
|
* in [in] Array holding public key.
|
|
* inLen [in] Number of bytes of data in array.
|
|
* key [in] Ed448 public key.
|
|
* returns BAD_FUNC_ARG when a parameter is NULL or key format is not supported,
|
|
* 0 otherwise.
|
|
*/
|
|
int wc_ed448_import_public(const byte* in, word32 inLen, ed448_key* key)
|
|
{
|
|
return wc_ed448_import_public_ex(in, inLen, key, 0);
|
|
}
|
|
|
|
/* Import an ed448 private key from a byte array.
|
|
*
|
|
* priv [in] Array holding private key.
|
|
* privSz [in] Number of bytes of data in array.
|
|
* key [in] Ed448 private key.
|
|
* returns BAD_FUNC_ARG when a parameter is NULL or privSz is less than
|
|
* ED448_KEY_SIZE,
|
|
* 0 otherwise.
|
|
*/
|
|
int wc_ed448_import_private_only(const byte* priv, word32 privSz,
|
|
ed448_key* key)
|
|
{
|
|
int ret = 0;
|
|
|
|
/* sanity check on arguments */
|
|
if ((priv == NULL) || (key == NULL)) {
|
|
ret = BAD_FUNC_ARG;
|
|
}
|
|
|
|
/* key size check */
|
|
if ((ret == 0) && (privSz != ED448_KEY_SIZE)) {
|
|
ret = BAD_FUNC_ARG;
|
|
}
|
|
|
|
if (ret == 0) {
|
|
XMEMCPY(key->k, priv, ED448_KEY_SIZE);
|
|
key->privKeySet = 1;
|
|
}
|
|
|
|
if ((ret == 0) && key->pubKeySet) {
|
|
/* Validate loaded public key */
|
|
ret = wc_ed448_check_key(key);
|
|
}
|
|
|
|
if ((ret != 0) && (key != NULL)) {
|
|
/* No private key set on error. */
|
|
key->privKeySet = 0;
|
|
ForceZero(key->k, ED448_KEY_SIZE);
|
|
}
|
|
|
|
return ret;
|
|
}
|
|
|
|
|
|
/* Import an ed448 private and public keys from byte array(s).
|
|
*
|
|
* priv [in] Array holding private key from wc_ed448_export_private_only(),
|
|
* or private+public keys from wc_ed448_export_private().
|
|
* privSz [in] Number of bytes of data in private key array.
|
|
* pub [in] Array holding public key (or NULL).
|
|
* pubSz [in] Number of bytes of data in public key array (or 0).
|
|
* key [in] Ed448 private/public key.
|
|
* trusted [in] Indicates whether the public key data is trusted.
|
|
* When 0, checks public key matches private key.
|
|
* When 1, doesn't check public key matches private key.
|
|
* returns BAD_FUNC_ARG when a required parameter is NULL or an invalid
|
|
* combination of keys/lengths is supplied, 0 otherwise.
|
|
*/
|
|
int wc_ed448_import_private_key_ex(const byte* priv, word32 privSz,
|
|
const byte* pub, word32 pubSz, ed448_key* key, int trusted)
|
|
{
|
|
int ret;
|
|
|
|
/* sanity check on arguments */
|
|
if (priv == NULL || key == NULL)
|
|
return BAD_FUNC_ARG;
|
|
|
|
/* key size check */
|
|
if (privSz != ED448_KEY_SIZE && privSz != ED448_PRV_KEY_SIZE)
|
|
return BAD_FUNC_ARG;
|
|
|
|
if (pub == NULL) {
|
|
if (pubSz != 0)
|
|
return BAD_FUNC_ARG;
|
|
if (privSz != ED448_PRV_KEY_SIZE)
|
|
return BAD_FUNC_ARG;
|
|
pub = priv + ED448_KEY_SIZE;
|
|
pubSz = ED448_PUB_KEY_SIZE;
|
|
}
|
|
else if (pubSz < ED448_PUB_KEY_SIZE) {
|
|
return BAD_FUNC_ARG;
|
|
}
|
|
|
|
XMEMCPY(key->k, priv, ED448_KEY_SIZE);
|
|
key->privKeySet = 1;
|
|
|
|
/* import public key */
|
|
ret = wc_ed448_import_public_ex(pub, pubSz, key, trusted);
|
|
if (ret != 0) {
|
|
key->privKeySet = 0;
|
|
ForceZero(key->k, ED448_KEY_SIZE);
|
|
return ret;
|
|
}
|
|
|
|
/* make the private key (priv + pub) */
|
|
XMEMCPY(key->k + ED448_KEY_SIZE, key->p, ED448_PUB_KEY_SIZE);
|
|
|
|
return ret;
|
|
}
|
|
|
|
/* Import an ed448 private and public keys from byte array(s).
|
|
*
|
|
* Public key is not trusted and is checked against private key.
|
|
*
|
|
* priv [in] Array holding private key from wc_ed448_export_private_only(),
|
|
* or private+public keys from wc_ed448_export_private().
|
|
* privSz [in] Number of bytes of data in private key array.
|
|
* pub [in] Array holding public key (or NULL).
|
|
* pubSz [in] Number of bytes of data in public key array (or 0).
|
|
* key [in] Ed448 private/public key.
|
|
* returns BAD_FUNC_ARG when a required parameter is NULL or an invalid
|
|
* combination of keys/lengths is supplied, 0 otherwise.
|
|
*/
|
|
int wc_ed448_import_private_key(const byte* priv, word32 privSz,
|
|
const byte* pub, word32 pubSz, ed448_key* key)
|
|
{
|
|
return wc_ed448_import_private_key_ex(priv, privSz, pub, pubSz, key, 0);
|
|
}
|
|
|
|
#endif /* HAVE_ED448_KEY_IMPORT */
|
|
|
|
|
|
#ifdef HAVE_ED448_KEY_EXPORT
|
|
|
|
/* Export the ed448 private key.
|
|
*
|
|
* key [in] Ed448 private key.
|
|
* out [in] Array to hold private key.
|
|
* outLen [in/out] On in, the number of bytes in array.
|
|
* On out, the number bytes put into array.
|
|
* returns BAD_FUNC_ARG when a parameter is NULL,
|
|
* ECC_BAD_ARG_E when outLen is less than ED448_KEY_SIZE,
|
|
* 0 otherwise.
|
|
*/
|
|
int wc_ed448_export_private_only(const ed448_key* key, byte* out, word32* outLen)
|
|
{
|
|
int ret = 0;
|
|
|
|
/* sanity checks on arguments */
|
|
if ((key == NULL) || (out == NULL) || (outLen == NULL)) {
|
|
ret = BAD_FUNC_ARG;
|
|
}
|
|
|
|
if ((ret == 0) && (*outLen < ED448_KEY_SIZE)) {
|
|
*outLen = ED448_KEY_SIZE;
|
|
ret = BUFFER_E;
|
|
}
|
|
|
|
if (ret == 0) {
|
|
*outLen = ED448_KEY_SIZE;
|
|
XMEMCPY(out, key->k, ED448_KEY_SIZE);
|
|
}
|
|
|
|
return ret;
|
|
}
|
|
|
|
/* Export the ed448 private and public key.
|
|
*
|
|
* key [in] Ed448 private/public key.
|
|
* out [in] Array to hold private and public key.
|
|
* outLen [in/out] On in, the number of bytes in array.
|
|
* On out, the number bytes put into array.
|
|
* returns BAD_FUNC_ARG when a parameter is NULL,
|
|
* BUFFER_E when outLen is less than ED448_PRV_KEY_SIZE,
|
|
* 0 otherwise.
|
|
*/
|
|
int wc_ed448_export_private(const ed448_key* key, byte* out, word32* outLen)
|
|
{
|
|
int ret = 0;
|
|
|
|
/* sanity checks on arguments */
|
|
if ((key == NULL) || (out == NULL) || (outLen == NULL)) {
|
|
ret = BAD_FUNC_ARG;
|
|
}
|
|
|
|
if ((ret == 0) && (*outLen < ED448_PRV_KEY_SIZE)) {
|
|
*outLen = ED448_PRV_KEY_SIZE;
|
|
ret = BUFFER_E;
|
|
}
|
|
|
|
if (ret == 0) {
|
|
*outLen = ED448_PRV_KEY_SIZE;
|
|
XMEMCPY(out, key->k, ED448_PRV_KEY_SIZE);
|
|
}
|
|
|
|
return ret;
|
|
}
|
|
|
|
/* Export the ed448 private and public key.
|
|
*
|
|
* key [in] Ed448 private/public key.
|
|
* priv [in] Array to hold private key.
|
|
* privSz [in/out] On in, the number of bytes in private key array.
|
|
* pub [in] Array to hold public key.
|
|
* pubSz [in/out] On in, the number of bytes in public key array.
|
|
* On out, the number bytes put into array.
|
|
* returns BAD_FUNC_ARG when a parameter is NULL,
|
|
* BUFFER_E when privSz is less than ED448_PRV_KEY_SIZE or pubSz is less
|
|
* than ED448_PUB_KEY_SIZE,
|
|
* 0 otherwise.
|
|
*/
|
|
int wc_ed448_export_key(const ed448_key* key, byte* priv, word32 *privSz,
|
|
byte* pub, word32 *pubSz)
|
|
{
|
|
int ret = 0;
|
|
|
|
/* export 'full' private part */
|
|
ret = wc_ed448_export_private(key, priv, privSz);
|
|
if (ret == 0) {
|
|
/* export public part */
|
|
ret = wc_ed448_export_public(key, pub, pubSz);
|
|
}
|
|
|
|
return ret;
|
|
}
|
|
|
|
#endif /* HAVE_ED448_KEY_EXPORT */
|
|
|
|
/* Check the public key is valid.
|
|
*
|
|
* When private key available, check the calculated public key matches.
|
|
* When no private key, check Y is in range and an X is able to be calculated.
|
|
*
|
|
* @param [in] key Ed448 private/public key.
|
|
* @return 0 otherwise.
|
|
* @return BAD_FUNC_ARG when key is NULL.
|
|
* @return PUBLIC_KEY_E when the public key is not set, doesn't match or is
|
|
* invalid.
|
|
* @return other -ve value on hash failure.
|
|
*/
|
|
int wc_ed448_check_key(ed448_key* key)
|
|
{
|
|
int ret = 0;
|
|
unsigned char pubKey[ED448_PUB_KEY_SIZE];
|
|
|
|
/* Validate parameter. */
|
|
if (key == NULL) {
|
|
ret = BAD_FUNC_ARG;
|
|
}
|
|
|
|
/* Check we have a public key to check. */
|
|
if (ret == 0 && !key->pubKeySet) {
|
|
ret = PUBLIC_KEY_E;
|
|
}
|
|
|
|
/* If we have a private key just make the public key and compare. */
|
|
if ((ret == 0) && key->privKeySet) {
|
|
ret = wc_ed448_make_public(key, pubKey, sizeof(pubKey));
|
|
if ((ret == 0) && (XMEMCMP(pubKey, key->p, ED448_PUB_KEY_SIZE) != 0)) {
|
|
ret = PUBLIC_KEY_E;
|
|
}
|
|
}
|
|
/* No private key, check Y is valid. */
|
|
else if ((ret == 0) && (!key->privKeySet)) {
|
|
/* Verify that Q is not identity element 0.
|
|
* 0 has no representation for Ed448. */
|
|
|
|
/* Verify that xQ and yQ are integers in the interval [0, p - 1].
|
|
* Only have yQ so check that ordinate.
|
|
* p = 2^448-2^224-1 = 0xff..fe..ff
|
|
*/
|
|
{
|
|
int i;
|
|
ret = PUBLIC_KEY_E;
|
|
|
|
/* Check top part before 0xFE. */
|
|
for (i = ED448_PUB_KEY_SIZE - 1; i > ED448_PUB_KEY_SIZE/2; i--) {
|
|
if (key->p[i] < 0xff) {
|
|
ret = 0;
|
|
break;
|
|
}
|
|
}
|
|
if (ret == WC_NO_ERR_TRACE(PUBLIC_KEY_E)) {
|
|
/* Check against 0xFE. */
|
|
if (key->p[ED448_PUB_KEY_SIZE/2] < 0xfe) {
|
|
ret = 0;
|
|
}
|
|
else if (key->p[ED448_PUB_KEY_SIZE/2] == 0xfe) {
|
|
/* Check bottom part before last byte. */
|
|
for (i = ED448_PUB_KEY_SIZE/2 - 1; i > 0; i--) {
|
|
if (key->p[i] != 0xff) {
|
|
ret = 0;
|
|
break;
|
|
}
|
|
}
|
|
/* Check last byte. */
|
|
if ((ret == WC_NO_ERR_TRACE(PUBLIC_KEY_E)) &&
|
|
(key->p[0] < 0xff)) {
|
|
ret = 0;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
if (ret == 0) {
|
|
/* Verify that Q is on the curve.
|
|
* Uncompressing the public key will validate yQ. */
|
|
ge448_p2 A;
|
|
|
|
if (ge448_from_bytes_negate_vartime(&A, key->p) != 0) {
|
|
ret = PUBLIC_KEY_E;
|
|
}
|
|
}
|
|
}
|
|
|
|
return ret;
|
|
}
|
|
|
|
/* Returns the size of an ed448 private key.
|
|
*
|
|
* key [in] Ed448 private/public key.
|
|
* returns BAD_FUNC_ARG when key is NULL,
|
|
* ED448_KEY_SIZE otherwise.
|
|
*/
|
|
int wc_ed448_size(const ed448_key* key)
|
|
{
|
|
int ret = ED448_KEY_SIZE;
|
|
|
|
if (key == NULL) {
|
|
ret = BAD_FUNC_ARG;
|
|
}
|
|
|
|
return ret;
|
|
}
|
|
|
|
/* Returns the size of an ed448 private plus public key.
|
|
*
|
|
* key [in] Ed448 private/public key.
|
|
* returns BAD_FUNC_ARG when key is NULL,
|
|
* ED448_PRV_KEY_SIZE otherwise.
|
|
*/
|
|
int wc_ed448_priv_size(const ed448_key* key)
|
|
{
|
|
int ret = ED448_PRV_KEY_SIZE;
|
|
|
|
if (key == NULL) {
|
|
ret = BAD_FUNC_ARG;
|
|
}
|
|
|
|
return ret;
|
|
}
|
|
|
|
/* Returns the size of an ed448 public key.
|
|
*
|
|
* key [in] Ed448 private/public key.
|
|
* returns BAD_FUNC_ARG when key is NULL,
|
|
* ED448_PUB_KEY_SIZE otherwise.
|
|
*/
|
|
int wc_ed448_pub_size(const ed448_key* key)
|
|
{
|
|
int ret = ED448_PUB_KEY_SIZE;
|
|
|
|
if (key == NULL) {
|
|
ret = BAD_FUNC_ARG;
|
|
}
|
|
|
|
return ret;
|
|
}
|
|
|
|
/* Returns the size of an ed448 signature.
|
|
*
|
|
* key [in] Ed448 private/public key.
|
|
* returns BAD_FUNC_ARG when key is NULL,
|
|
* ED448_SIG_SIZE otherwise.
|
|
*/
|
|
int wc_ed448_sig_size(const ed448_key* key)
|
|
{
|
|
int ret = ED448_SIG_SIZE;
|
|
|
|
if (key == NULL) {
|
|
ret = BAD_FUNC_ARG;
|
|
}
|
|
|
|
return ret;
|
|
}
|
|
|
|
#endif /* HAVE_ED448 */
|
|
|