/* ecdsa.c */ /* This file is part of the AVR-Crypto-Lib. Copyright (C) 2006-2012 Daniel Otte (daniel.otte@rub.de) This program is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this program. If not, see . */ #include #include #include "bigint.h" #include "ecc.h" #include "random_dummy.h" #include "ecdsa.h" #include "hfal-basic.h" uint8_t ecdsa_signature_alloc(ecdsa_signature_t* s, size_t length_B){ if(!(s->r.wordv = malloc(length_B))){ return 1; } if(!(s->s.wordv = malloc(length_B))){ free(s->r.wordv); return 1; } bigint_set_zero(&s->r); bigint_set_zero(&s->s); return 0; } void ecdsa_signature_free(ecdsa_signature_t* s){ free(s->r.wordv); free(s->s.wordv); } uint8_t ecdsa_sign_bigint(ecdsa_signature_t* s, const bigint_t* m, const ecdsa_ctx_t* ctx, const bigint_t* k){ bigint_t t; ecc_combi_point_t q; if(!(t.wordv = malloc(ctx->curve->p->length_W * 2 * sizeof(bigint_word_t)))){ return 1; } if(!ecc_chudnovsky_point_alloc(&q.chudnovsky, ctx->curve->p->length_W * sizeof(bigint_word_t))){ free(t.wordv); return 1; } ecc_chudnovsky_multiplication(&q.chudnovsky, k, ctx->basepoint, ctx->curve); if(q.chudnovsky.x.length_W == 0){ return 2; } ecc_chudnovsky_to_affine_point(&q.affine, &q.chudnovsky, ctx->curve); bigint_inverse(&s->r, k, ctx->curve->p); bigint_mul_u(&t, &q.affine.x, ctx->priv); ctx->curve->reduce_p(&t); bigint_add_u(&t, &t, m); ctx->curve->reduce_p(&t); bigint_mul_u(&t, &t, &s->r); ctx->curve->reduce_p(&t); if(t.length_W == 0){ return 2; } bigint_copy(&s->r, &q.affine.x); bigint_copy(&s->s, &t); ecc_chudnovsky_point_free(&q.chudnovsky); free(t.wordv); return 0; } uint8_t ecdsa_sign_message(ecdsa_signature_t* s, const void* m, uint16_t m_len_b, const hfdesc_t* hash_desc, const ecdsa_ctx_t* ctx, const void *rand_in){ bigint_t m_int; bigint_t r_int; uint8_t r; if(rand_in == NULL){ if(!(r_int.wordv = malloc(ctx->curve->p->length_W * sizeof(bigint_word_t)))){ return 1; } } if(!(m_int.wordv = malloc(hfal_hash_getHashsize(hash_desc) / 8))){ if(rand_in == NULL){ free(r_int.wordv); } return 1; } hfal_hash_mem(hash_desc, m_int.wordv, m, m_len_b); do{ if(rand_in == NULL){ size_t i; do{ i = ctx->curve->p->length_W * sizeof(bigint_word_t) - 1; r_int.length_W = ctx->curve->p->length_W; do{ ((uint8_t*)r_int.wordv)[i] = prng_get_byte(); }while(i--); bigint_adjust(&r_int); }while(bigint_cmp_u(&r_int, ctx->curve->p) >= 0); } }while((r = ecdsa_sign_bigint(s, &m_int, ctx, &r_int)) == 2 && (rand_in == NULL)); return r; }