mirror of
https://git.proxmox.com/git/efi-boot-shim
synced 2025-07-23 09:17:57 +00:00

OpenSSL changes quite a bit of the key validation, and most of the keys I can find in the wild aren't marked as trusted by the new checker. Intel noticed this too: https://github.com/vathpela/edk2/commit/f536d7c3ed but instead of fixing the compatibility error, they switched their test data to match the bug. So that's pretty broken. For now, I'm reverting OpenSSL 1.1.0e, because we need those certs in the wild to work. This reverts commit513cbe2aea
. This reverts commite9cc33d6f2
. This reverts commit80d49f758e
. This reverts commit9bc647e2b2
. This reverts commitae75df6232
. This reverts commite883479f35
. This reverts commit97469449fd
. This reverts commite39692647f
. This reverts commit0f3dfc01e2
. This reverts commit4da6ac8195
. This reverts commitd064bd7eef
. This reverts commit9bc86cfd6f
. This reverts commitab9a05a10f
. Signed-off-by: Peter Jones <pjones@redhat.com>
1263 lines
39 KiB
C
1263 lines
39 KiB
C
/* crypto/bn/bn_nist.c */
|
|
/*
|
|
* Written by Nils Larsch for the OpenSSL project
|
|
*/
|
|
/* ====================================================================
|
|
* Copyright (c) 1998-2005 The OpenSSL Project. All rights reserved.
|
|
*
|
|
* Redistribution and use in source and binary forms, with or without
|
|
* modification, are permitted provided that the following conditions
|
|
* are met:
|
|
*
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
* notice, this list of conditions and the following disclaimer.
|
|
*
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
* notice, this list of conditions and the following disclaimer in
|
|
* the documentation and/or other materials provided with the
|
|
* distribution.
|
|
*
|
|
* 3. All advertising materials mentioning features or use of this
|
|
* software must display the following acknowledgment:
|
|
* "This product includes software developed by the OpenSSL Project
|
|
* for use in the OpenSSL Toolkit. (http://www.openssl.org/)"
|
|
*
|
|
* 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
|
|
* endorse or promote products derived from this software without
|
|
* prior written permission. For written permission, please contact
|
|
* openssl-core@openssl.org.
|
|
*
|
|
* 5. Products derived from this software may not be called "OpenSSL"
|
|
* nor may "OpenSSL" appear in their names without prior written
|
|
* permission of the OpenSSL Project.
|
|
*
|
|
* 6. Redistributions of any form whatsoever must retain the following
|
|
* acknowledgment:
|
|
* "This product includes software developed by the OpenSSL Project
|
|
* for use in the OpenSSL Toolkit (http://www.openssl.org/)"
|
|
*
|
|
* THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
|
|
* EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
|
|
* PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR
|
|
* ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
|
|
* SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
|
|
* NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
|
|
* LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
|
|
* STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
|
|
* ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
|
|
* OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
* ====================================================================
|
|
*
|
|
* This product includes cryptographic software written by Eric Young
|
|
* (eay@cryptsoft.com). This product includes software written by Tim
|
|
* Hudson (tjh@cryptsoft.com).
|
|
*
|
|
*/
|
|
|
|
#include "bn_lcl.h"
|
|
#include "cryptlib.h"
|
|
|
|
#define BN_NIST_192_TOP (192+BN_BITS2-1)/BN_BITS2
|
|
#define BN_NIST_224_TOP (224+BN_BITS2-1)/BN_BITS2
|
|
#define BN_NIST_256_TOP (256+BN_BITS2-1)/BN_BITS2
|
|
#define BN_NIST_384_TOP (384+BN_BITS2-1)/BN_BITS2
|
|
#define BN_NIST_521_TOP (521+BN_BITS2-1)/BN_BITS2
|
|
|
|
/* pre-computed tables are "carry-less" values of modulus*(i+1) */
|
|
#if BN_BITS2 == 64
|
|
static const BN_ULONG _nist_p_192[][BN_NIST_192_TOP] = {
|
|
{0xFFFFFFFFFFFFFFFFULL, 0xFFFFFFFFFFFFFFFEULL, 0xFFFFFFFFFFFFFFFFULL},
|
|
{0xFFFFFFFFFFFFFFFEULL, 0xFFFFFFFFFFFFFFFDULL, 0xFFFFFFFFFFFFFFFFULL},
|
|
{0xFFFFFFFFFFFFFFFDULL, 0xFFFFFFFFFFFFFFFCULL, 0xFFFFFFFFFFFFFFFFULL}
|
|
};
|
|
|
|
static const BN_ULONG _nist_p_192_sqr[] = {
|
|
0x0000000000000001ULL, 0x0000000000000002ULL, 0x0000000000000001ULL,
|
|
0xFFFFFFFFFFFFFFFEULL, 0xFFFFFFFFFFFFFFFDULL, 0xFFFFFFFFFFFFFFFFULL
|
|
};
|
|
|
|
static const BN_ULONG _nist_p_224[][BN_NIST_224_TOP] = {
|
|
{0x0000000000000001ULL, 0xFFFFFFFF00000000ULL,
|
|
0xFFFFFFFFFFFFFFFFULL, 0x00000000FFFFFFFFULL},
|
|
{0x0000000000000002ULL, 0xFFFFFFFE00000000ULL,
|
|
0xFFFFFFFFFFFFFFFFULL, 0x00000001FFFFFFFFULL} /* this one is
|
|
* "carry-full" */
|
|
};
|
|
|
|
static const BN_ULONG _nist_p_224_sqr[] = {
|
|
0x0000000000000001ULL, 0xFFFFFFFE00000000ULL,
|
|
0xFFFFFFFFFFFFFFFFULL, 0x0000000200000000ULL,
|
|
0x0000000000000000ULL, 0xFFFFFFFFFFFFFFFEULL,
|
|
0xFFFFFFFFFFFFFFFFULL
|
|
};
|
|
|
|
static const BN_ULONG _nist_p_256[][BN_NIST_256_TOP] = {
|
|
{0xFFFFFFFFFFFFFFFFULL, 0x00000000FFFFFFFFULL,
|
|
0x0000000000000000ULL, 0xFFFFFFFF00000001ULL},
|
|
{0xFFFFFFFFFFFFFFFEULL, 0x00000001FFFFFFFFULL,
|
|
0x0000000000000000ULL, 0xFFFFFFFE00000002ULL},
|
|
{0xFFFFFFFFFFFFFFFDULL, 0x00000002FFFFFFFFULL,
|
|
0x0000000000000000ULL, 0xFFFFFFFD00000003ULL},
|
|
{0xFFFFFFFFFFFFFFFCULL, 0x00000003FFFFFFFFULL,
|
|
0x0000000000000000ULL, 0xFFFFFFFC00000004ULL},
|
|
{0xFFFFFFFFFFFFFFFBULL, 0x00000004FFFFFFFFULL,
|
|
0x0000000000000000ULL, 0xFFFFFFFB00000005ULL},
|
|
};
|
|
|
|
static const BN_ULONG _nist_p_256_sqr[] = {
|
|
0x0000000000000001ULL, 0xFFFFFFFE00000000ULL,
|
|
0xFFFFFFFFFFFFFFFFULL, 0x00000001FFFFFFFEULL,
|
|
0x00000001FFFFFFFEULL, 0x00000001FFFFFFFEULL,
|
|
0xFFFFFFFE00000001ULL, 0xFFFFFFFE00000002ULL
|
|
};
|
|
|
|
static const BN_ULONG _nist_p_384[][BN_NIST_384_TOP] = {
|
|
{0x00000000FFFFFFFFULL, 0xFFFFFFFF00000000ULL, 0xFFFFFFFFFFFFFFFEULL,
|
|
0xFFFFFFFFFFFFFFFFULL, 0xFFFFFFFFFFFFFFFFULL, 0xFFFFFFFFFFFFFFFFULL},
|
|
{0x00000001FFFFFFFEULL, 0xFFFFFFFE00000000ULL, 0xFFFFFFFFFFFFFFFDULL,
|
|
0xFFFFFFFFFFFFFFFFULL, 0xFFFFFFFFFFFFFFFFULL, 0xFFFFFFFFFFFFFFFFULL},
|
|
{0x00000002FFFFFFFDULL, 0xFFFFFFFD00000000ULL, 0xFFFFFFFFFFFFFFFCULL,
|
|
0xFFFFFFFFFFFFFFFFULL, 0xFFFFFFFFFFFFFFFFULL, 0xFFFFFFFFFFFFFFFFULL},
|
|
{0x00000003FFFFFFFCULL, 0xFFFFFFFC00000000ULL, 0xFFFFFFFFFFFFFFFBULL,
|
|
0xFFFFFFFFFFFFFFFFULL, 0xFFFFFFFFFFFFFFFFULL, 0xFFFFFFFFFFFFFFFFULL},
|
|
{0x00000004FFFFFFFBULL, 0xFFFFFFFB00000000ULL, 0xFFFFFFFFFFFFFFFAULL,
|
|
0xFFFFFFFFFFFFFFFFULL, 0xFFFFFFFFFFFFFFFFULL, 0xFFFFFFFFFFFFFFFFULL},
|
|
};
|
|
|
|
static const BN_ULONG _nist_p_384_sqr[] = {
|
|
0xFFFFFFFE00000001ULL, 0x0000000200000000ULL, 0xFFFFFFFE00000000ULL,
|
|
0x0000000200000000ULL, 0x0000000000000001ULL, 0x0000000000000000ULL,
|
|
0x00000001FFFFFFFEULL, 0xFFFFFFFE00000000ULL, 0xFFFFFFFFFFFFFFFDULL,
|
|
0xFFFFFFFFFFFFFFFFULL, 0xFFFFFFFFFFFFFFFFULL, 0xFFFFFFFFFFFFFFFFULL
|
|
};
|
|
|
|
static const BN_ULONG _nist_p_521[] =
|
|
{ 0xFFFFFFFFFFFFFFFFULL, 0xFFFFFFFFFFFFFFFFULL,
|
|
0xFFFFFFFFFFFFFFFFULL, 0xFFFFFFFFFFFFFFFFULL,
|
|
0xFFFFFFFFFFFFFFFFULL, 0xFFFFFFFFFFFFFFFFULL,
|
|
0xFFFFFFFFFFFFFFFFULL, 0xFFFFFFFFFFFFFFFFULL,
|
|
0x00000000000001FFULL
|
|
};
|
|
|
|
static const BN_ULONG _nist_p_521_sqr[] = {
|
|
0x0000000000000001ULL, 0x0000000000000000ULL, 0x0000000000000000ULL,
|
|
0x0000000000000000ULL, 0x0000000000000000ULL, 0x0000000000000000ULL,
|
|
0x0000000000000000ULL, 0x0000000000000000ULL, 0xFFFFFFFFFFFFFC00ULL,
|
|
0xFFFFFFFFFFFFFFFFULL, 0xFFFFFFFFFFFFFFFFULL, 0xFFFFFFFFFFFFFFFFULL,
|
|
0xFFFFFFFFFFFFFFFFULL, 0xFFFFFFFFFFFFFFFFULL, 0xFFFFFFFFFFFFFFFFULL,
|
|
0xFFFFFFFFFFFFFFFFULL, 0x000000000003FFFFULL
|
|
};
|
|
#elif BN_BITS2 == 32
|
|
static const BN_ULONG _nist_p_192[][BN_NIST_192_TOP] = {
|
|
{0xFFFFFFFF, 0xFFFFFFFF, 0xFFFFFFFE, 0xFFFFFFFF, 0xFFFFFFFF, 0xFFFFFFFF},
|
|
{0xFFFFFFFE, 0xFFFFFFFF, 0xFFFFFFFD, 0xFFFFFFFF, 0xFFFFFFFF, 0xFFFFFFFF},
|
|
{0xFFFFFFFD, 0xFFFFFFFF, 0xFFFFFFFC, 0xFFFFFFFF, 0xFFFFFFFF, 0xFFFFFFFF}
|
|
};
|
|
|
|
static const BN_ULONG _nist_p_192_sqr[] = {
|
|
0x00000001, 0x00000000, 0x00000002, 0x00000000, 0x00000001, 0x00000000,
|
|
0xFFFFFFFE, 0xFFFFFFFF, 0xFFFFFFFD, 0xFFFFFFFF, 0xFFFFFFFF, 0xFFFFFFFF
|
|
};
|
|
|
|
static const BN_ULONG _nist_p_224[][BN_NIST_224_TOP] = {
|
|
{0x00000001, 0x00000000, 0x00000000, 0xFFFFFFFF,
|
|
0xFFFFFFFF, 0xFFFFFFFF, 0xFFFFFFFF},
|
|
{0x00000002, 0x00000000, 0x00000000, 0xFFFFFFFE,
|
|
0xFFFFFFFF, 0xFFFFFFFF, 0xFFFFFFFF}
|
|
};
|
|
|
|
static const BN_ULONG _nist_p_224_sqr[] = {
|
|
0x00000001, 0x00000000, 0x00000000, 0xFFFFFFFE,
|
|
0xFFFFFFFF, 0xFFFFFFFF, 0x00000000, 0x00000002,
|
|
0x00000000, 0x00000000, 0xFFFFFFFE, 0xFFFFFFFF,
|
|
0xFFFFFFFF, 0xFFFFFFFF
|
|
};
|
|
|
|
static const BN_ULONG _nist_p_256[][BN_NIST_256_TOP] = {
|
|
{0xFFFFFFFF, 0xFFFFFFFF, 0xFFFFFFFF, 0x00000000,
|
|
0x00000000, 0x00000000, 0x00000001, 0xFFFFFFFF},
|
|
{0xFFFFFFFE, 0xFFFFFFFF, 0xFFFFFFFF, 0x00000001,
|
|
0x00000000, 0x00000000, 0x00000002, 0xFFFFFFFE},
|
|
{0xFFFFFFFD, 0xFFFFFFFF, 0xFFFFFFFF, 0x00000002,
|
|
0x00000000, 0x00000000, 0x00000003, 0xFFFFFFFD},
|
|
{0xFFFFFFFC, 0xFFFFFFFF, 0xFFFFFFFF, 0x00000003,
|
|
0x00000000, 0x00000000, 0x00000004, 0xFFFFFFFC},
|
|
{0xFFFFFFFB, 0xFFFFFFFF, 0xFFFFFFFF, 0x00000004,
|
|
0x00000000, 0x00000000, 0x00000005, 0xFFFFFFFB},
|
|
};
|
|
|
|
static const BN_ULONG _nist_p_256_sqr[] = {
|
|
0x00000001, 0x00000000, 0x00000000, 0xFFFFFFFE,
|
|
0xFFFFFFFF, 0xFFFFFFFF, 0xFFFFFFFE, 0x00000001,
|
|
0xFFFFFFFE, 0x00000001, 0xFFFFFFFE, 0x00000001,
|
|
0x00000001, 0xFFFFFFFE, 0x00000002, 0xFFFFFFFE
|
|
};
|
|
|
|
static const BN_ULONG _nist_p_384[][BN_NIST_384_TOP] = {
|
|
{0xFFFFFFFF, 0x00000000, 0x00000000, 0xFFFFFFFF, 0xFFFFFFFE, 0xFFFFFFFF,
|
|
0xFFFFFFFF, 0xFFFFFFFF, 0xFFFFFFFF, 0xFFFFFFFF, 0xFFFFFFFF, 0xFFFFFFFF},
|
|
{0xFFFFFFFE, 0x00000001, 0x00000000, 0xFFFFFFFE, 0xFFFFFFFD, 0xFFFFFFFF,
|
|
0xFFFFFFFF, 0xFFFFFFFF, 0xFFFFFFFF, 0xFFFFFFFF, 0xFFFFFFFF, 0xFFFFFFFF},
|
|
{0xFFFFFFFD, 0x00000002, 0x00000000, 0xFFFFFFFD, 0xFFFFFFFC, 0xFFFFFFFF,
|
|
0xFFFFFFFF, 0xFFFFFFFF, 0xFFFFFFFF, 0xFFFFFFFF, 0xFFFFFFFF, 0xFFFFFFFF},
|
|
{0xFFFFFFFC, 0x00000003, 0x00000000, 0xFFFFFFFC, 0xFFFFFFFB, 0xFFFFFFFF,
|
|
0xFFFFFFFF, 0xFFFFFFFF, 0xFFFFFFFF, 0xFFFFFFFF, 0xFFFFFFFF, 0xFFFFFFFF},
|
|
{0xFFFFFFFB, 0x00000004, 0x00000000, 0xFFFFFFFB, 0xFFFFFFFA, 0xFFFFFFFF,
|
|
0xFFFFFFFF, 0xFFFFFFFF, 0xFFFFFFFF, 0xFFFFFFFF, 0xFFFFFFFF, 0xFFFFFFFF},
|
|
};
|
|
|
|
static const BN_ULONG _nist_p_384_sqr[] = {
|
|
0x00000001, 0xFFFFFFFE, 0x00000000, 0x00000002, 0x00000000, 0xFFFFFFFE,
|
|
0x00000000, 0x00000002, 0x00000001, 0x00000000, 0x00000000, 0x00000000,
|
|
0xFFFFFFFE, 0x00000001, 0x00000000, 0xFFFFFFFE, 0xFFFFFFFD, 0xFFFFFFFF,
|
|
0xFFFFFFFF, 0xFFFFFFFF, 0xFFFFFFFF, 0xFFFFFFFF, 0xFFFFFFFF, 0xFFFFFFFF
|
|
};
|
|
|
|
static const BN_ULONG _nist_p_521[] = { 0xFFFFFFFF, 0xFFFFFFFF, 0xFFFFFFFF,
|
|
0xFFFFFFFF, 0xFFFFFFFF, 0xFFFFFFFF, 0xFFFFFFFF, 0xFFFFFFFF, 0xFFFFFFFF,
|
|
0xFFFFFFFF, 0xFFFFFFFF, 0xFFFFFFFF, 0xFFFFFFFF, 0xFFFFFFFF, 0xFFFFFFFF,
|
|
0xFFFFFFFF, 0x000001FF
|
|
};
|
|
|
|
static const BN_ULONG _nist_p_521_sqr[] = {
|
|
0x00000001, 0x00000000, 0x00000000, 0x00000000, 0x00000000, 0x00000000,
|
|
0x00000000, 0x00000000, 0x00000000, 0x00000000, 0x00000000, 0x00000000,
|
|
0x00000000, 0x00000000, 0x00000000, 0x00000000, 0xFFFFFC00, 0xFFFFFFFF,
|
|
0xFFFFFFFF, 0xFFFFFFFF, 0xFFFFFFFF, 0xFFFFFFFF, 0xFFFFFFFF, 0xFFFFFFFF,
|
|
0xFFFFFFFF, 0xFFFFFFFF, 0xFFFFFFFF, 0xFFFFFFFF, 0xFFFFFFFF, 0xFFFFFFFF,
|
|
0xFFFFFFFF, 0xFFFFFFFF, 0x0003FFFF
|
|
};
|
|
#else
|
|
# error "unsupported BN_BITS2"
|
|
#endif
|
|
|
|
static const BIGNUM _bignum_nist_p_192 = {
|
|
(BN_ULONG *)_nist_p_192[0],
|
|
BN_NIST_192_TOP,
|
|
BN_NIST_192_TOP,
|
|
0,
|
|
BN_FLG_STATIC_DATA
|
|
};
|
|
|
|
static const BIGNUM _bignum_nist_p_224 = {
|
|
(BN_ULONG *)_nist_p_224[0],
|
|
BN_NIST_224_TOP,
|
|
BN_NIST_224_TOP,
|
|
0,
|
|
BN_FLG_STATIC_DATA
|
|
};
|
|
|
|
static const BIGNUM _bignum_nist_p_256 = {
|
|
(BN_ULONG *)_nist_p_256[0],
|
|
BN_NIST_256_TOP,
|
|
BN_NIST_256_TOP,
|
|
0,
|
|
BN_FLG_STATIC_DATA
|
|
};
|
|
|
|
static const BIGNUM _bignum_nist_p_384 = {
|
|
(BN_ULONG *)_nist_p_384[0],
|
|
BN_NIST_384_TOP,
|
|
BN_NIST_384_TOP,
|
|
0,
|
|
BN_FLG_STATIC_DATA
|
|
};
|
|
|
|
static const BIGNUM _bignum_nist_p_521 = {
|
|
(BN_ULONG *)_nist_p_521,
|
|
BN_NIST_521_TOP,
|
|
BN_NIST_521_TOP,
|
|
0,
|
|
BN_FLG_STATIC_DATA
|
|
};
|
|
|
|
const BIGNUM *BN_get0_nist_prime_192(void)
|
|
{
|
|
return &_bignum_nist_p_192;
|
|
}
|
|
|
|
const BIGNUM *BN_get0_nist_prime_224(void)
|
|
{
|
|
return &_bignum_nist_p_224;
|
|
}
|
|
|
|
const BIGNUM *BN_get0_nist_prime_256(void)
|
|
{
|
|
return &_bignum_nist_p_256;
|
|
}
|
|
|
|
const BIGNUM *BN_get0_nist_prime_384(void)
|
|
{
|
|
return &_bignum_nist_p_384;
|
|
}
|
|
|
|
const BIGNUM *BN_get0_nist_prime_521(void)
|
|
{
|
|
return &_bignum_nist_p_521;
|
|
}
|
|
|
|
static void nist_cp_bn_0(BN_ULONG *dst, const BN_ULONG *src, int top, int max)
|
|
{
|
|
int i;
|
|
|
|
#ifdef BN_DEBUG
|
|
OPENSSL_assert(top <= max);
|
|
#endif
|
|
for (i = 0; i < top; i++)
|
|
dst[i] = src[i];
|
|
for (; i < max; i++)
|
|
dst[i] = 0;
|
|
}
|
|
|
|
static void nist_cp_bn(BN_ULONG *dst, const BN_ULONG *src, int top)
|
|
{
|
|
int i;
|
|
|
|
for (i = 0; i < top; i++)
|
|
dst[i] = src[i];
|
|
}
|
|
|
|
#if BN_BITS2 == 64
|
|
# define bn_cp_64(to, n, from, m) (to)[n] = (m>=0)?((from)[m]):0;
|
|
# define bn_64_set_0(to, n) (to)[n] = (BN_ULONG)0;
|
|
/*
|
|
* two following macros are implemented under assumption that they
|
|
* are called in a sequence with *ascending* n, i.e. as they are...
|
|
*/
|
|
# define bn_cp_32_naked(to, n, from, m) (((n)&1)?(to[(n)/2]|=((m)&1)?(from[(m)/2]&BN_MASK2h):(from[(m)/2]<<32))\
|
|
:(to[(n)/2] =((m)&1)?(from[(m)/2]>>32):(from[(m)/2]&BN_MASK2l)))
|
|
# define bn_32_set_0(to, n) (((n)&1)?(to[(n)/2]&=BN_MASK2l):(to[(n)/2]=0));
|
|
# define bn_cp_32(to,n,from,m) ((m)>=0)?bn_cp_32_naked(to,n,from,m):bn_32_set_0(to,n)
|
|
# if defined(L_ENDIAN)
|
|
# if defined(__arch64__)
|
|
# define NIST_INT64 long
|
|
# else
|
|
# define NIST_INT64 long long
|
|
# endif
|
|
# endif
|
|
#else
|
|
# define bn_cp_64(to, n, from, m) \
|
|
{ \
|
|
bn_cp_32(to, (n)*2, from, (m)*2); \
|
|
bn_cp_32(to, (n)*2+1, from, (m)*2+1); \
|
|
}
|
|
# define bn_64_set_0(to, n) \
|
|
{ \
|
|
bn_32_set_0(to, (n)*2); \
|
|
bn_32_set_0(to, (n)*2+1); \
|
|
}
|
|
# define bn_cp_32(to, n, from, m) (to)[n] = (m>=0)?((from)[m]):0;
|
|
# define bn_32_set_0(to, n) (to)[n] = (BN_ULONG)0;
|
|
# if defined(_WIN32) && !defined(__GNUC__)
|
|
# define NIST_INT64 __int64
|
|
# elif defined(BN_LLONG)
|
|
# define NIST_INT64 long long
|
|
# endif
|
|
#endif /* BN_BITS2 != 64 */
|
|
|
|
#define nist_set_192(to, from, a1, a2, a3) \
|
|
{ \
|
|
bn_cp_64(to, 0, from, (a3) - 3) \
|
|
bn_cp_64(to, 1, from, (a2) - 3) \
|
|
bn_cp_64(to, 2, from, (a1) - 3) \
|
|
}
|
|
|
|
int BN_nist_mod_192(BIGNUM *r, const BIGNUM *a, const BIGNUM *field,
|
|
BN_CTX *ctx)
|
|
{
|
|
int top = a->top, i;
|
|
int carry;
|
|
register BN_ULONG *r_d, *a_d = a->d;
|
|
union {
|
|
BN_ULONG bn[BN_NIST_192_TOP];
|
|
unsigned int ui[BN_NIST_192_TOP * sizeof(BN_ULONG) /
|
|
sizeof(unsigned int)];
|
|
} buf;
|
|
BN_ULONG c_d[BN_NIST_192_TOP], *res;
|
|
PTR_SIZE_INT mask;
|
|
static const BIGNUM _bignum_nist_p_192_sqr = {
|
|
(BN_ULONG *)_nist_p_192_sqr,
|
|
sizeof(_nist_p_192_sqr) / sizeof(_nist_p_192_sqr[0]),
|
|
sizeof(_nist_p_192_sqr) / sizeof(_nist_p_192_sqr[0]),
|
|
0, BN_FLG_STATIC_DATA
|
|
};
|
|
|
|
field = &_bignum_nist_p_192; /* just to make sure */
|
|
|
|
if (BN_is_negative(a) || BN_ucmp(a, &_bignum_nist_p_192_sqr) >= 0)
|
|
return BN_nnmod(r, a, field, ctx);
|
|
|
|
i = BN_ucmp(field, a);
|
|
if (i == 0) {
|
|
BN_zero(r);
|
|
return 1;
|
|
} else if (i > 0)
|
|
return (r == a) ? 1 : (BN_copy(r, a) != NULL);
|
|
|
|
if (r != a) {
|
|
if (!bn_wexpand(r, BN_NIST_192_TOP))
|
|
return 0;
|
|
r_d = r->d;
|
|
nist_cp_bn(r_d, a_d, BN_NIST_192_TOP);
|
|
} else
|
|
r_d = a_d;
|
|
|
|
nist_cp_bn_0(buf.bn, a_d + BN_NIST_192_TOP, top - BN_NIST_192_TOP,
|
|
BN_NIST_192_TOP);
|
|
|
|
#if defined(NIST_INT64)
|
|
{
|
|
NIST_INT64 acc; /* accumulator */
|
|
unsigned int *rp = (unsigned int *)r_d;
|
|
const unsigned int *bp = (const unsigned int *)buf.ui;
|
|
|
|
acc = rp[0];
|
|
acc += bp[3 * 2 - 6];
|
|
acc += bp[5 * 2 - 6];
|
|
rp[0] = (unsigned int)acc;
|
|
acc >>= 32;
|
|
|
|
acc += rp[1];
|
|
acc += bp[3 * 2 - 5];
|
|
acc += bp[5 * 2 - 5];
|
|
rp[1] = (unsigned int)acc;
|
|
acc >>= 32;
|
|
|
|
acc += rp[2];
|
|
acc += bp[3 * 2 - 6];
|
|
acc += bp[4 * 2 - 6];
|
|
acc += bp[5 * 2 - 6];
|
|
rp[2] = (unsigned int)acc;
|
|
acc >>= 32;
|
|
|
|
acc += rp[3];
|
|
acc += bp[3 * 2 - 5];
|
|
acc += bp[4 * 2 - 5];
|
|
acc += bp[5 * 2 - 5];
|
|
rp[3] = (unsigned int)acc;
|
|
acc >>= 32;
|
|
|
|
acc += rp[4];
|
|
acc += bp[4 * 2 - 6];
|
|
acc += bp[5 * 2 - 6];
|
|
rp[4] = (unsigned int)acc;
|
|
acc >>= 32;
|
|
|
|
acc += rp[5];
|
|
acc += bp[4 * 2 - 5];
|
|
acc += bp[5 * 2 - 5];
|
|
rp[5] = (unsigned int)acc;
|
|
|
|
carry = (int)(acc >> 32);
|
|
}
|
|
#else
|
|
{
|
|
BN_ULONG t_d[BN_NIST_192_TOP];
|
|
|
|
nist_set_192(t_d, buf.bn, 0, 3, 3);
|
|
carry = (int)bn_add_words(r_d, r_d, t_d, BN_NIST_192_TOP);
|
|
nist_set_192(t_d, buf.bn, 4, 4, 0);
|
|
carry += (int)bn_add_words(r_d, r_d, t_d, BN_NIST_192_TOP);
|
|
nist_set_192(t_d, buf.bn, 5, 5, 5)
|
|
carry += (int)bn_add_words(r_d, r_d, t_d, BN_NIST_192_TOP);
|
|
}
|
|
#endif
|
|
if (carry > 0)
|
|
carry =
|
|
(int)bn_sub_words(r_d, r_d, _nist_p_192[carry - 1],
|
|
BN_NIST_192_TOP);
|
|
else
|
|
carry = 1;
|
|
|
|
/*
|
|
* we need 'if (carry==0 || result>=modulus) result-=modulus;'
|
|
* as comparison implies subtraction, we can write
|
|
* 'tmp=result-modulus; if (!carry || !borrow) result=tmp;'
|
|
* this is what happens below, but without explicit if:-) a.
|
|
*/
|
|
mask =
|
|
0 - (PTR_SIZE_INT) bn_sub_words(c_d, r_d, _nist_p_192[0],
|
|
BN_NIST_192_TOP);
|
|
mask &= 0 - (PTR_SIZE_INT) carry;
|
|
res = c_d;
|
|
res = (BN_ULONG *)
|
|
(((PTR_SIZE_INT) res & ~mask) | ((PTR_SIZE_INT) r_d & mask));
|
|
nist_cp_bn(r_d, res, BN_NIST_192_TOP);
|
|
r->top = BN_NIST_192_TOP;
|
|
bn_correct_top(r);
|
|
|
|
return 1;
|
|
}
|
|
|
|
typedef BN_ULONG (*bn_addsub_f) (BN_ULONG *, const BN_ULONG *,
|
|
const BN_ULONG *, int);
|
|
|
|
#define nist_set_224(to, from, a1, a2, a3, a4, a5, a6, a7) \
|
|
{ \
|
|
bn_cp_32(to, 0, from, (a7) - 7) \
|
|
bn_cp_32(to, 1, from, (a6) - 7) \
|
|
bn_cp_32(to, 2, from, (a5) - 7) \
|
|
bn_cp_32(to, 3, from, (a4) - 7) \
|
|
bn_cp_32(to, 4, from, (a3) - 7) \
|
|
bn_cp_32(to, 5, from, (a2) - 7) \
|
|
bn_cp_32(to, 6, from, (a1) - 7) \
|
|
}
|
|
|
|
int BN_nist_mod_224(BIGNUM *r, const BIGNUM *a, const BIGNUM *field,
|
|
BN_CTX *ctx)
|
|
{
|
|
int top = a->top, i;
|
|
int carry;
|
|
BN_ULONG *r_d, *a_d = a->d;
|
|
union {
|
|
BN_ULONG bn[BN_NIST_224_TOP];
|
|
unsigned int ui[BN_NIST_224_TOP * sizeof(BN_ULONG) /
|
|
sizeof(unsigned int)];
|
|
} buf;
|
|
BN_ULONG c_d[BN_NIST_224_TOP], *res;
|
|
PTR_SIZE_INT mask;
|
|
union {
|
|
bn_addsub_f f;
|
|
PTR_SIZE_INT p;
|
|
} u;
|
|
static const BIGNUM _bignum_nist_p_224_sqr = {
|
|
(BN_ULONG *)_nist_p_224_sqr,
|
|
sizeof(_nist_p_224_sqr) / sizeof(_nist_p_224_sqr[0]),
|
|
sizeof(_nist_p_224_sqr) / sizeof(_nist_p_224_sqr[0]),
|
|
0, BN_FLG_STATIC_DATA
|
|
};
|
|
|
|
field = &_bignum_nist_p_224; /* just to make sure */
|
|
|
|
if (BN_is_negative(a) || BN_ucmp(a, &_bignum_nist_p_224_sqr) >= 0)
|
|
return BN_nnmod(r, a, field, ctx);
|
|
|
|
i = BN_ucmp(field, a);
|
|
if (i == 0) {
|
|
BN_zero(r);
|
|
return 1;
|
|
} else if (i > 0)
|
|
return (r == a) ? 1 : (BN_copy(r, a) != NULL);
|
|
|
|
if (r != a) {
|
|
if (!bn_wexpand(r, BN_NIST_224_TOP))
|
|
return 0;
|
|
r_d = r->d;
|
|
nist_cp_bn(r_d, a_d, BN_NIST_224_TOP);
|
|
} else
|
|
r_d = a_d;
|
|
|
|
#if BN_BITS2==64
|
|
/* copy upper 256 bits of 448 bit number ... */
|
|
nist_cp_bn_0(c_d, a_d + (BN_NIST_224_TOP - 1),
|
|
top - (BN_NIST_224_TOP - 1), BN_NIST_224_TOP);
|
|
/* ... and right shift by 32 to obtain upper 224 bits */
|
|
nist_set_224(buf.bn, c_d, 14, 13, 12, 11, 10, 9, 8);
|
|
/* truncate lower part to 224 bits too */
|
|
r_d[BN_NIST_224_TOP - 1] &= BN_MASK2l;
|
|
#else
|
|
nist_cp_bn_0(buf.bn, a_d + BN_NIST_224_TOP, top - BN_NIST_224_TOP,
|
|
BN_NIST_224_TOP);
|
|
#endif
|
|
|
|
#if defined(NIST_INT64) && BN_BITS2!=64
|
|
{
|
|
NIST_INT64 acc; /* accumulator */
|
|
unsigned int *rp = (unsigned int *)r_d;
|
|
const unsigned int *bp = (const unsigned int *)buf.ui;
|
|
|
|
acc = rp[0];
|
|
acc -= bp[7 - 7];
|
|
acc -= bp[11 - 7];
|
|
rp[0] = (unsigned int)acc;
|
|
acc >>= 32;
|
|
|
|
acc += rp[1];
|
|
acc -= bp[8 - 7];
|
|
acc -= bp[12 - 7];
|
|
rp[1] = (unsigned int)acc;
|
|
acc >>= 32;
|
|
|
|
acc += rp[2];
|
|
acc -= bp[9 - 7];
|
|
acc -= bp[13 - 7];
|
|
rp[2] = (unsigned int)acc;
|
|
acc >>= 32;
|
|
|
|
acc += rp[3];
|
|
acc += bp[7 - 7];
|
|
acc += bp[11 - 7];
|
|
acc -= bp[10 - 7];
|
|
rp[3] = (unsigned int)acc;
|
|
acc >>= 32;
|
|
|
|
acc += rp[4];
|
|
acc += bp[8 - 7];
|
|
acc += bp[12 - 7];
|
|
acc -= bp[11 - 7];
|
|
rp[4] = (unsigned int)acc;
|
|
acc >>= 32;
|
|
|
|
acc += rp[5];
|
|
acc += bp[9 - 7];
|
|
acc += bp[13 - 7];
|
|
acc -= bp[12 - 7];
|
|
rp[5] = (unsigned int)acc;
|
|
acc >>= 32;
|
|
|
|
acc += rp[6];
|
|
acc += bp[10 - 7];
|
|
acc -= bp[13 - 7];
|
|
rp[6] = (unsigned int)acc;
|
|
|
|
carry = (int)(acc >> 32);
|
|
# if BN_BITS2==64
|
|
rp[7] = carry;
|
|
# endif
|
|
}
|
|
#else
|
|
{
|
|
BN_ULONG t_d[BN_NIST_224_TOP];
|
|
|
|
nist_set_224(t_d, buf.bn, 10, 9, 8, 7, 0, 0, 0);
|
|
carry = (int)bn_add_words(r_d, r_d, t_d, BN_NIST_224_TOP);
|
|
nist_set_224(t_d, buf.bn, 0, 13, 12, 11, 0, 0, 0);
|
|
carry += (int)bn_add_words(r_d, r_d, t_d, BN_NIST_224_TOP);
|
|
nist_set_224(t_d, buf.bn, 13, 12, 11, 10, 9, 8, 7);
|
|
carry -= (int)bn_sub_words(r_d, r_d, t_d, BN_NIST_224_TOP);
|
|
nist_set_224(t_d, buf.bn, 0, 0, 0, 0, 13, 12, 11);
|
|
carry -= (int)bn_sub_words(r_d, r_d, t_d, BN_NIST_224_TOP);
|
|
|
|
# if BN_BITS2==64
|
|
carry = (int)(r_d[BN_NIST_224_TOP - 1] >> 32);
|
|
# endif
|
|
}
|
|
#endif
|
|
u.f = bn_sub_words;
|
|
if (carry > 0) {
|
|
carry =
|
|
(int)bn_sub_words(r_d, r_d, _nist_p_224[carry - 1],
|
|
BN_NIST_224_TOP);
|
|
#if BN_BITS2==64
|
|
carry = (int)(~(r_d[BN_NIST_224_TOP - 1] >> 32)) & 1;
|
|
#endif
|
|
} else if (carry < 0) {
|
|
/*
|
|
* it's a bit more comlicated logic in this case. if bn_add_words
|
|
* yields no carry, then result has to be adjusted by unconditionally
|
|
* *adding* the modulus. but if it does, then result has to be
|
|
* compared to the modulus and conditionally adjusted by
|
|
* *subtracting* the latter.
|
|
*/
|
|
carry =
|
|
(int)bn_add_words(r_d, r_d, _nist_p_224[-carry - 1],
|
|
BN_NIST_224_TOP);
|
|
mask = 0 - (PTR_SIZE_INT) carry;
|
|
u.p = ((PTR_SIZE_INT) bn_sub_words & mask) |
|
|
((PTR_SIZE_INT) bn_add_words & ~mask);
|
|
} else
|
|
carry = 1;
|
|
|
|
/* otherwise it's effectively same as in BN_nist_mod_192... */
|
|
mask =
|
|
0 - (PTR_SIZE_INT) (*u.f) (c_d, r_d, _nist_p_224[0], BN_NIST_224_TOP);
|
|
mask &= 0 - (PTR_SIZE_INT) carry;
|
|
res = c_d;
|
|
res = (BN_ULONG *)(((PTR_SIZE_INT) res & ~mask) |
|
|
((PTR_SIZE_INT) r_d & mask));
|
|
nist_cp_bn(r_d, res, BN_NIST_224_TOP);
|
|
r->top = BN_NIST_224_TOP;
|
|
bn_correct_top(r);
|
|
|
|
return 1;
|
|
}
|
|
|
|
#define nist_set_256(to, from, a1, a2, a3, a4, a5, a6, a7, a8) \
|
|
{ \
|
|
bn_cp_32(to, 0, from, (a8) - 8) \
|
|
bn_cp_32(to, 1, from, (a7) - 8) \
|
|
bn_cp_32(to, 2, from, (a6) - 8) \
|
|
bn_cp_32(to, 3, from, (a5) - 8) \
|
|
bn_cp_32(to, 4, from, (a4) - 8) \
|
|
bn_cp_32(to, 5, from, (a3) - 8) \
|
|
bn_cp_32(to, 6, from, (a2) - 8) \
|
|
bn_cp_32(to, 7, from, (a1) - 8) \
|
|
}
|
|
|
|
int BN_nist_mod_256(BIGNUM *r, const BIGNUM *a, const BIGNUM *field,
|
|
BN_CTX *ctx)
|
|
{
|
|
int i, top = a->top;
|
|
int carry = 0;
|
|
register BN_ULONG *a_d = a->d, *r_d;
|
|
union {
|
|
BN_ULONG bn[BN_NIST_256_TOP];
|
|
unsigned int ui[BN_NIST_256_TOP * sizeof(BN_ULONG) /
|
|
sizeof(unsigned int)];
|
|
} buf;
|
|
BN_ULONG c_d[BN_NIST_256_TOP], *res;
|
|
PTR_SIZE_INT mask;
|
|
union {
|
|
bn_addsub_f f;
|
|
PTR_SIZE_INT p;
|
|
} u;
|
|
static const BIGNUM _bignum_nist_p_256_sqr = {
|
|
(BN_ULONG *)_nist_p_256_sqr,
|
|
sizeof(_nist_p_256_sqr) / sizeof(_nist_p_256_sqr[0]),
|
|
sizeof(_nist_p_256_sqr) / sizeof(_nist_p_256_sqr[0]),
|
|
0, BN_FLG_STATIC_DATA
|
|
};
|
|
|
|
field = &_bignum_nist_p_256; /* just to make sure */
|
|
|
|
if (BN_is_negative(a) || BN_ucmp(a, &_bignum_nist_p_256_sqr) >= 0)
|
|
return BN_nnmod(r, a, field, ctx);
|
|
|
|
i = BN_ucmp(field, a);
|
|
if (i == 0) {
|
|
BN_zero(r);
|
|
return 1;
|
|
} else if (i > 0)
|
|
return (r == a) ? 1 : (BN_copy(r, a) != NULL);
|
|
|
|
if (r != a) {
|
|
if (!bn_wexpand(r, BN_NIST_256_TOP))
|
|
return 0;
|
|
r_d = r->d;
|
|
nist_cp_bn(r_d, a_d, BN_NIST_256_TOP);
|
|
} else
|
|
r_d = a_d;
|
|
|
|
nist_cp_bn_0(buf.bn, a_d + BN_NIST_256_TOP, top - BN_NIST_256_TOP,
|
|
BN_NIST_256_TOP);
|
|
|
|
#if defined(NIST_INT64)
|
|
{
|
|
NIST_INT64 acc; /* accumulator */
|
|
unsigned int *rp = (unsigned int *)r_d;
|
|
const unsigned int *bp = (const unsigned int *)buf.ui;
|
|
|
|
acc = rp[0];
|
|
acc += bp[8 - 8];
|
|
acc += bp[9 - 8];
|
|
acc -= bp[11 - 8];
|
|
acc -= bp[12 - 8];
|
|
acc -= bp[13 - 8];
|
|
acc -= bp[14 - 8];
|
|
rp[0] = (unsigned int)acc;
|
|
acc >>= 32;
|
|
|
|
acc += rp[1];
|
|
acc += bp[9 - 8];
|
|
acc += bp[10 - 8];
|
|
acc -= bp[12 - 8];
|
|
acc -= bp[13 - 8];
|
|
acc -= bp[14 - 8];
|
|
acc -= bp[15 - 8];
|
|
rp[1] = (unsigned int)acc;
|
|
acc >>= 32;
|
|
|
|
acc += rp[2];
|
|
acc += bp[10 - 8];
|
|
acc += bp[11 - 8];
|
|
acc -= bp[13 - 8];
|
|
acc -= bp[14 - 8];
|
|
acc -= bp[15 - 8];
|
|
rp[2] = (unsigned int)acc;
|
|
acc >>= 32;
|
|
|
|
acc += rp[3];
|
|
acc += bp[11 - 8];
|
|
acc += bp[11 - 8];
|
|
acc += bp[12 - 8];
|
|
acc += bp[12 - 8];
|
|
acc += bp[13 - 8];
|
|
acc -= bp[15 - 8];
|
|
acc -= bp[8 - 8];
|
|
acc -= bp[9 - 8];
|
|
rp[3] = (unsigned int)acc;
|
|
acc >>= 32;
|
|
|
|
acc += rp[4];
|
|
acc += bp[12 - 8];
|
|
acc += bp[12 - 8];
|
|
acc += bp[13 - 8];
|
|
acc += bp[13 - 8];
|
|
acc += bp[14 - 8];
|
|
acc -= bp[9 - 8];
|
|
acc -= bp[10 - 8];
|
|
rp[4] = (unsigned int)acc;
|
|
acc >>= 32;
|
|
|
|
acc += rp[5];
|
|
acc += bp[13 - 8];
|
|
acc += bp[13 - 8];
|
|
acc += bp[14 - 8];
|
|
acc += bp[14 - 8];
|
|
acc += bp[15 - 8];
|
|
acc -= bp[10 - 8];
|
|
acc -= bp[11 - 8];
|
|
rp[5] = (unsigned int)acc;
|
|
acc >>= 32;
|
|
|
|
acc += rp[6];
|
|
acc += bp[14 - 8];
|
|
acc += bp[14 - 8];
|
|
acc += bp[15 - 8];
|
|
acc += bp[15 - 8];
|
|
acc += bp[14 - 8];
|
|
acc += bp[13 - 8];
|
|
acc -= bp[8 - 8];
|
|
acc -= bp[9 - 8];
|
|
rp[6] = (unsigned int)acc;
|
|
acc >>= 32;
|
|
|
|
acc += rp[7];
|
|
acc += bp[15 - 8];
|
|
acc += bp[15 - 8];
|
|
acc += bp[15 - 8];
|
|
acc += bp[8 - 8];
|
|
acc -= bp[10 - 8];
|
|
acc -= bp[11 - 8];
|
|
acc -= bp[12 - 8];
|
|
acc -= bp[13 - 8];
|
|
rp[7] = (unsigned int)acc;
|
|
|
|
carry = (int)(acc >> 32);
|
|
}
|
|
#else
|
|
{
|
|
BN_ULONG t_d[BN_NIST_256_TOP];
|
|
|
|
/*
|
|
* S1
|
|
*/
|
|
nist_set_256(t_d, buf.bn, 15, 14, 13, 12, 11, 0, 0, 0);
|
|
/*
|
|
* S2
|
|
*/
|
|
nist_set_256(c_d, buf.bn, 0, 15, 14, 13, 12, 0, 0, 0);
|
|
carry = (int)bn_add_words(t_d, t_d, c_d, BN_NIST_256_TOP);
|
|
/* left shift */
|
|
{
|
|
register BN_ULONG *ap, t, c;
|
|
ap = t_d;
|
|
c = 0;
|
|
for (i = BN_NIST_256_TOP; i != 0; --i) {
|
|
t = *ap;
|
|
*(ap++) = ((t << 1) | c) & BN_MASK2;
|
|
c = (t & BN_TBIT) ? 1 : 0;
|
|
}
|
|
carry <<= 1;
|
|
carry |= c;
|
|
}
|
|
carry += (int)bn_add_words(r_d, r_d, t_d, BN_NIST_256_TOP);
|
|
/*
|
|
* S3
|
|
*/
|
|
nist_set_256(t_d, buf.bn, 15, 14, 0, 0, 0, 10, 9, 8);
|
|
carry += (int)bn_add_words(r_d, r_d, t_d, BN_NIST_256_TOP);
|
|
/*
|
|
* S4
|
|
*/
|
|
nist_set_256(t_d, buf.bn, 8, 13, 15, 14, 13, 11, 10, 9);
|
|
carry += (int)bn_add_words(r_d, r_d, t_d, BN_NIST_256_TOP);
|
|
/*
|
|
* D1
|
|
*/
|
|
nist_set_256(t_d, buf.bn, 10, 8, 0, 0, 0, 13, 12, 11);
|
|
carry -= (int)bn_sub_words(r_d, r_d, t_d, BN_NIST_256_TOP);
|
|
/*
|
|
* D2
|
|
*/
|
|
nist_set_256(t_d, buf.bn, 11, 9, 0, 0, 15, 14, 13, 12);
|
|
carry -= (int)bn_sub_words(r_d, r_d, t_d, BN_NIST_256_TOP);
|
|
/*
|
|
* D3
|
|
*/
|
|
nist_set_256(t_d, buf.bn, 12, 0, 10, 9, 8, 15, 14, 13);
|
|
carry -= (int)bn_sub_words(r_d, r_d, t_d, BN_NIST_256_TOP);
|
|
/*
|
|
* D4
|
|
*/
|
|
nist_set_256(t_d, buf.bn, 13, 0, 11, 10, 9, 0, 15, 14);
|
|
carry -= (int)bn_sub_words(r_d, r_d, t_d, BN_NIST_256_TOP);
|
|
|
|
}
|
|
#endif
|
|
/* see BN_nist_mod_224 for explanation */
|
|
u.f = bn_sub_words;
|
|
if (carry > 0)
|
|
carry =
|
|
(int)bn_sub_words(r_d, r_d, _nist_p_256[carry - 1],
|
|
BN_NIST_256_TOP);
|
|
else if (carry < 0) {
|
|
carry =
|
|
(int)bn_add_words(r_d, r_d, _nist_p_256[-carry - 1],
|
|
BN_NIST_256_TOP);
|
|
mask = 0 - (PTR_SIZE_INT) carry;
|
|
u.p = ((PTR_SIZE_INT) bn_sub_words & mask) |
|
|
((PTR_SIZE_INT) bn_add_words & ~mask);
|
|
} else
|
|
carry = 1;
|
|
|
|
mask =
|
|
0 - (PTR_SIZE_INT) (*u.f) (c_d, r_d, _nist_p_256[0], BN_NIST_256_TOP);
|
|
mask &= 0 - (PTR_SIZE_INT) carry;
|
|
res = c_d;
|
|
res = (BN_ULONG *)(((PTR_SIZE_INT) res & ~mask) |
|
|
((PTR_SIZE_INT) r_d & mask));
|
|
nist_cp_bn(r_d, res, BN_NIST_256_TOP);
|
|
r->top = BN_NIST_256_TOP;
|
|
bn_correct_top(r);
|
|
|
|
return 1;
|
|
}
|
|
|
|
#define nist_set_384(to,from,a1,a2,a3,a4,a5,a6,a7,a8,a9,a10,a11,a12) \
|
|
{ \
|
|
bn_cp_32(to, 0, from, (a12) - 12) \
|
|
bn_cp_32(to, 1, from, (a11) - 12) \
|
|
bn_cp_32(to, 2, from, (a10) - 12) \
|
|
bn_cp_32(to, 3, from, (a9) - 12) \
|
|
bn_cp_32(to, 4, from, (a8) - 12) \
|
|
bn_cp_32(to, 5, from, (a7) - 12) \
|
|
bn_cp_32(to, 6, from, (a6) - 12) \
|
|
bn_cp_32(to, 7, from, (a5) - 12) \
|
|
bn_cp_32(to, 8, from, (a4) - 12) \
|
|
bn_cp_32(to, 9, from, (a3) - 12) \
|
|
bn_cp_32(to, 10, from, (a2) - 12) \
|
|
bn_cp_32(to, 11, from, (a1) - 12) \
|
|
}
|
|
|
|
int BN_nist_mod_384(BIGNUM *r, const BIGNUM *a, const BIGNUM *field,
|
|
BN_CTX *ctx)
|
|
{
|
|
int i, top = a->top;
|
|
int carry = 0;
|
|
register BN_ULONG *r_d, *a_d = a->d;
|
|
union {
|
|
BN_ULONG bn[BN_NIST_384_TOP];
|
|
unsigned int ui[BN_NIST_384_TOP * sizeof(BN_ULONG) /
|
|
sizeof(unsigned int)];
|
|
} buf;
|
|
BN_ULONG c_d[BN_NIST_384_TOP], *res;
|
|
PTR_SIZE_INT mask;
|
|
union {
|
|
bn_addsub_f f;
|
|
PTR_SIZE_INT p;
|
|
} u;
|
|
static const BIGNUM _bignum_nist_p_384_sqr = {
|
|
(BN_ULONG *)_nist_p_384_sqr,
|
|
sizeof(_nist_p_384_sqr) / sizeof(_nist_p_384_sqr[0]),
|
|
sizeof(_nist_p_384_sqr) / sizeof(_nist_p_384_sqr[0]),
|
|
0, BN_FLG_STATIC_DATA
|
|
};
|
|
|
|
field = &_bignum_nist_p_384; /* just to make sure */
|
|
|
|
if (BN_is_negative(a) || BN_ucmp(a, &_bignum_nist_p_384_sqr) >= 0)
|
|
return BN_nnmod(r, a, field, ctx);
|
|
|
|
i = BN_ucmp(field, a);
|
|
if (i == 0) {
|
|
BN_zero(r);
|
|
return 1;
|
|
} else if (i > 0)
|
|
return (r == a) ? 1 : (BN_copy(r, a) != NULL);
|
|
|
|
if (r != a) {
|
|
if (!bn_wexpand(r, BN_NIST_384_TOP))
|
|
return 0;
|
|
r_d = r->d;
|
|
nist_cp_bn(r_d, a_d, BN_NIST_384_TOP);
|
|
} else
|
|
r_d = a_d;
|
|
|
|
nist_cp_bn_0(buf.bn, a_d + BN_NIST_384_TOP, top - BN_NIST_384_TOP,
|
|
BN_NIST_384_TOP);
|
|
|
|
#if defined(NIST_INT64)
|
|
{
|
|
NIST_INT64 acc; /* accumulator */
|
|
unsigned int *rp = (unsigned int *)r_d;
|
|
const unsigned int *bp = (const unsigned int *)buf.ui;
|
|
|
|
acc = rp[0];
|
|
acc += bp[12 - 12];
|
|
acc += bp[21 - 12];
|
|
acc += bp[20 - 12];
|
|
acc -= bp[23 - 12];
|
|
rp[0] = (unsigned int)acc;
|
|
acc >>= 32;
|
|
|
|
acc += rp[1];
|
|
acc += bp[13 - 12];
|
|
acc += bp[22 - 12];
|
|
acc += bp[23 - 12];
|
|
acc -= bp[12 - 12];
|
|
acc -= bp[20 - 12];
|
|
rp[1] = (unsigned int)acc;
|
|
acc >>= 32;
|
|
|
|
acc += rp[2];
|
|
acc += bp[14 - 12];
|
|
acc += bp[23 - 12];
|
|
acc -= bp[13 - 12];
|
|
acc -= bp[21 - 12];
|
|
rp[2] = (unsigned int)acc;
|
|
acc >>= 32;
|
|
|
|
acc += rp[3];
|
|
acc += bp[15 - 12];
|
|
acc += bp[12 - 12];
|
|
acc += bp[20 - 12];
|
|
acc += bp[21 - 12];
|
|
acc -= bp[14 - 12];
|
|
acc -= bp[22 - 12];
|
|
acc -= bp[23 - 12];
|
|
rp[3] = (unsigned int)acc;
|
|
acc >>= 32;
|
|
|
|
acc += rp[4];
|
|
acc += bp[21 - 12];
|
|
acc += bp[21 - 12];
|
|
acc += bp[16 - 12];
|
|
acc += bp[13 - 12];
|
|
acc += bp[12 - 12];
|
|
acc += bp[20 - 12];
|
|
acc += bp[22 - 12];
|
|
acc -= bp[15 - 12];
|
|
acc -= bp[23 - 12];
|
|
acc -= bp[23 - 12];
|
|
rp[4] = (unsigned int)acc;
|
|
acc >>= 32;
|
|
|
|
acc += rp[5];
|
|
acc += bp[22 - 12];
|
|
acc += bp[22 - 12];
|
|
acc += bp[17 - 12];
|
|
acc += bp[14 - 12];
|
|
acc += bp[13 - 12];
|
|
acc += bp[21 - 12];
|
|
acc += bp[23 - 12];
|
|
acc -= bp[16 - 12];
|
|
rp[5] = (unsigned int)acc;
|
|
acc >>= 32;
|
|
|
|
acc += rp[6];
|
|
acc += bp[23 - 12];
|
|
acc += bp[23 - 12];
|
|
acc += bp[18 - 12];
|
|
acc += bp[15 - 12];
|
|
acc += bp[14 - 12];
|
|
acc += bp[22 - 12];
|
|
acc -= bp[17 - 12];
|
|
rp[6] = (unsigned int)acc;
|
|
acc >>= 32;
|
|
|
|
acc += rp[7];
|
|
acc += bp[19 - 12];
|
|
acc += bp[16 - 12];
|
|
acc += bp[15 - 12];
|
|
acc += bp[23 - 12];
|
|
acc -= bp[18 - 12];
|
|
rp[7] = (unsigned int)acc;
|
|
acc >>= 32;
|
|
|
|
acc += rp[8];
|
|
acc += bp[20 - 12];
|
|
acc += bp[17 - 12];
|
|
acc += bp[16 - 12];
|
|
acc -= bp[19 - 12];
|
|
rp[8] = (unsigned int)acc;
|
|
acc >>= 32;
|
|
|
|
acc += rp[9];
|
|
acc += bp[21 - 12];
|
|
acc += bp[18 - 12];
|
|
acc += bp[17 - 12];
|
|
acc -= bp[20 - 12];
|
|
rp[9] = (unsigned int)acc;
|
|
acc >>= 32;
|
|
|
|
acc += rp[10];
|
|
acc += bp[22 - 12];
|
|
acc += bp[19 - 12];
|
|
acc += bp[18 - 12];
|
|
acc -= bp[21 - 12];
|
|
rp[10] = (unsigned int)acc;
|
|
acc >>= 32;
|
|
|
|
acc += rp[11];
|
|
acc += bp[23 - 12];
|
|
acc += bp[20 - 12];
|
|
acc += bp[19 - 12];
|
|
acc -= bp[22 - 12];
|
|
rp[11] = (unsigned int)acc;
|
|
|
|
carry = (int)(acc >> 32);
|
|
}
|
|
#else
|
|
{
|
|
BN_ULONG t_d[BN_NIST_384_TOP];
|
|
|
|
/*
|
|
* S1
|
|
*/
|
|
nist_set_256(t_d, buf.bn, 0, 0, 0, 0, 0, 23 - 4, 22 - 4, 21 - 4);
|
|
/* left shift */
|
|
{
|
|
register BN_ULONG *ap, t, c;
|
|
ap = t_d;
|
|
c = 0;
|
|
for (i = 3; i != 0; --i) {
|
|
t = *ap;
|
|
*(ap++) = ((t << 1) | c) & BN_MASK2;
|
|
c = (t & BN_TBIT) ? 1 : 0;
|
|
}
|
|
*ap = c;
|
|
}
|
|
carry =
|
|
(int)bn_add_words(r_d + (128 / BN_BITS2), r_d + (128 / BN_BITS2),
|
|
t_d, BN_NIST_256_TOP);
|
|
/*
|
|
* S2
|
|
*/
|
|
carry += (int)bn_add_words(r_d, r_d, buf.bn, BN_NIST_384_TOP);
|
|
/*
|
|
* S3
|
|
*/
|
|
nist_set_384(t_d, buf.bn, 20, 19, 18, 17, 16, 15, 14, 13, 12, 23, 22,
|
|
21);
|
|
carry += (int)bn_add_words(r_d, r_d, t_d, BN_NIST_384_TOP);
|
|
/*
|
|
* S4
|
|
*/
|
|
nist_set_384(t_d, buf.bn, 19, 18, 17, 16, 15, 14, 13, 12, 20, 0, 23,
|
|
0);
|
|
carry += (int)bn_add_words(r_d, r_d, t_d, BN_NIST_384_TOP);
|
|
/*
|
|
* S5
|
|
*/
|
|
nist_set_384(t_d, buf.bn, 0, 0, 0, 0, 23, 22, 21, 20, 0, 0, 0, 0);
|
|
carry += (int)bn_add_words(r_d, r_d, t_d, BN_NIST_384_TOP);
|
|
/*
|
|
* S6
|
|
*/
|
|
nist_set_384(t_d, buf.bn, 0, 0, 0, 0, 0, 0, 23, 22, 21, 0, 0, 20);
|
|
carry += (int)bn_add_words(r_d, r_d, t_d, BN_NIST_384_TOP);
|
|
/*
|
|
* D1
|
|
*/
|
|
nist_set_384(t_d, buf.bn, 22, 21, 20, 19, 18, 17, 16, 15, 14, 13, 12,
|
|
23);
|
|
carry -= (int)bn_sub_words(r_d, r_d, t_d, BN_NIST_384_TOP);
|
|
/*
|
|
* D2
|
|
*/
|
|
nist_set_384(t_d, buf.bn, 0, 0, 0, 0, 0, 0, 0, 23, 22, 21, 20, 0);
|
|
carry -= (int)bn_sub_words(r_d, r_d, t_d, BN_NIST_384_TOP);
|
|
/*
|
|
* D3
|
|
*/
|
|
nist_set_384(t_d, buf.bn, 0, 0, 0, 0, 0, 0, 0, 23, 23, 0, 0, 0);
|
|
carry -= (int)bn_sub_words(r_d, r_d, t_d, BN_NIST_384_TOP);
|
|
|
|
}
|
|
#endif
|
|
/* see BN_nist_mod_224 for explanation */
|
|
u.f = bn_sub_words;
|
|
if (carry > 0)
|
|
carry =
|
|
(int)bn_sub_words(r_d, r_d, _nist_p_384[carry - 1],
|
|
BN_NIST_384_TOP);
|
|
else if (carry < 0) {
|
|
carry =
|
|
(int)bn_add_words(r_d, r_d, _nist_p_384[-carry - 1],
|
|
BN_NIST_384_TOP);
|
|
mask = 0 - (PTR_SIZE_INT) carry;
|
|
u.p = ((PTR_SIZE_INT) bn_sub_words & mask) |
|
|
((PTR_SIZE_INT) bn_add_words & ~mask);
|
|
} else
|
|
carry = 1;
|
|
|
|
mask =
|
|
0 - (PTR_SIZE_INT) (*u.f) (c_d, r_d, _nist_p_384[0], BN_NIST_384_TOP);
|
|
mask &= 0 - (PTR_SIZE_INT) carry;
|
|
res = c_d;
|
|
res = (BN_ULONG *)(((PTR_SIZE_INT) res & ~mask) |
|
|
((PTR_SIZE_INT) r_d & mask));
|
|
nist_cp_bn(r_d, res, BN_NIST_384_TOP);
|
|
r->top = BN_NIST_384_TOP;
|
|
bn_correct_top(r);
|
|
|
|
return 1;
|
|
}
|
|
|
|
#define BN_NIST_521_RSHIFT (521%BN_BITS2)
|
|
#define BN_NIST_521_LSHIFT (BN_BITS2-BN_NIST_521_RSHIFT)
|
|
#define BN_NIST_521_TOP_MASK ((BN_ULONG)BN_MASK2>>BN_NIST_521_LSHIFT)
|
|
|
|
int BN_nist_mod_521(BIGNUM *r, const BIGNUM *a, const BIGNUM *field,
|
|
BN_CTX *ctx)
|
|
{
|
|
int top = a->top, i;
|
|
BN_ULONG *r_d, *a_d = a->d, t_d[BN_NIST_521_TOP], val, tmp, *res;
|
|
PTR_SIZE_INT mask;
|
|
static const BIGNUM _bignum_nist_p_521_sqr = {
|
|
(BN_ULONG *)_nist_p_521_sqr,
|
|
sizeof(_nist_p_521_sqr) / sizeof(_nist_p_521_sqr[0]),
|
|
sizeof(_nist_p_521_sqr) / sizeof(_nist_p_521_sqr[0]),
|
|
0, BN_FLG_STATIC_DATA
|
|
};
|
|
|
|
field = &_bignum_nist_p_521; /* just to make sure */
|
|
|
|
if (BN_is_negative(a) || BN_ucmp(a, &_bignum_nist_p_521_sqr) >= 0)
|
|
return BN_nnmod(r, a, field, ctx);
|
|
|
|
i = BN_ucmp(field, a);
|
|
if (i == 0) {
|
|
BN_zero(r);
|
|
return 1;
|
|
} else if (i > 0)
|
|
return (r == a) ? 1 : (BN_copy(r, a) != NULL);
|
|
|
|
if (r != a) {
|
|
if (!bn_wexpand(r, BN_NIST_521_TOP))
|
|
return 0;
|
|
r_d = r->d;
|
|
nist_cp_bn(r_d, a_d, BN_NIST_521_TOP);
|
|
} else
|
|
r_d = a_d;
|
|
|
|
/* upper 521 bits, copy ... */
|
|
nist_cp_bn_0(t_d, a_d + (BN_NIST_521_TOP - 1),
|
|
top - (BN_NIST_521_TOP - 1), BN_NIST_521_TOP);
|
|
/* ... and right shift */
|
|
for (val = t_d[0], i = 0; i < BN_NIST_521_TOP - 1; i++) {
|
|
t_d[i] = (val >> BN_NIST_521_RSHIFT |
|
|
(tmp = t_d[i + 1]) << BN_NIST_521_LSHIFT) & BN_MASK2;
|
|
val = tmp;
|
|
}
|
|
t_d[i] = val >> BN_NIST_521_RSHIFT;
|
|
/* lower 521 bits */
|
|
r_d[i] &= BN_NIST_521_TOP_MASK;
|
|
|
|
bn_add_words(r_d, r_d, t_d, BN_NIST_521_TOP);
|
|
mask =
|
|
0 - (PTR_SIZE_INT) bn_sub_words(t_d, r_d, _nist_p_521,
|
|
BN_NIST_521_TOP);
|
|
res = t_d;
|
|
res = (BN_ULONG *)(((PTR_SIZE_INT) res & ~mask) |
|
|
((PTR_SIZE_INT) r_d & mask));
|
|
nist_cp_bn(r_d, res, BN_NIST_521_TOP);
|
|
r->top = BN_NIST_521_TOP;
|
|
bn_correct_top(r);
|
|
|
|
return 1;
|
|
}
|