1 /******************************************************************************* 2 * Copyright 2016-2018 Intel Corporation 3 * All Rights Reserved. 4 * 5 * If this software was obtained under the Intel Simplified Software License, 6 * the following terms apply: 7 * 8 * The source code, information and material ("Material") contained herein is 9 * owned by Intel Corporation or its suppliers or licensors, and title to such 10 * Material remains with Intel Corporation or its suppliers or licensors. The 11 * Material contains proprietary information of Intel or its suppliers and 12 * licensors. The Material is protected by worldwide copyright laws and treaty 13 * provisions. No part of the Material may be used, copied, reproduced, 14 * modified, published, uploaded, posted, transmitted, distributed or disclosed 15 * in any way without Intel's prior express written permission. No license under 16 * any patent, copyright or other intellectual property rights in the Material 17 * is granted to or conferred upon you, either expressly, by implication, 18 * inducement, estoppel or otherwise. Any license under such intellectual 19 * property rights must be express and approved by Intel in writing. 20 * 21 * Unless otherwise agreed by Intel in writing, you may not remove or alter this 22 * notice or any other notice embedded in Materials by Intel or Intel's 23 * suppliers or licensors in any way. 24 * 25 * 26 * If this software was obtained under the Apache License, Version 2.0 (the 27 * "License"), the following terms apply: 28 * 29 * You may not use this file except in compliance with the License. You may 30 * obtain a copy of the License at http://www.apache.org/licenses/LICENSE-2.0 31 * 32 * 33 * Unless required by applicable law or agreed to in writing, software 34 * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT 35 * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 36 * 37 * See the License for the specific language governing permissions and 38 * limitations under the License. 39 *******************************************************************************/ 40 41 /* 42 // Intel(R) Integrated Performance Primitives. Cryptography Primitives. 43 // 44 // Context: 45 // ippsGFpECTstKeyPair() 46 // 47 */ 48 49 #include "owndefs.h" 50 #include "owncp.h" 51 #include "pcpgfpecstuff.h" 52 53 54 55 /*F* 56 // Name: ippsGFpECTstKeyPair 57 // 58 // Purpose: Test Key Pair 59 // 60 // Returns: Reason: 61 // ippStsNullPtrErr NULL == pEC 62 // NULL == pPrivate 63 // NULL == pPublic 64 // NULL == pResult 65 // NULL == pScratchBuffer 66 // 67 // ippStsContextMatchErr illegal pEC->idCtx 68 // pEC->subgroup == NULL 69 // illegal pPrivate->idCtx 70 // illegal pPublic->idCtx 71 // 72 // ippStsRangeErr ECP_POINT_FELEN(pPublic)<GFP_FELEN() 73 // 74 // ippStsNoErr no errors 75 // 76 // Parameters: 77 // pPrivate pointer to the private key 78 // pPublic pointer to the public key 79 // pResult pointer to the result: 80 // ippECValid/ippECInvalidPrivateKey/ippECPointIsAtInfinite/ippECInvalidPublicKey 81 // pEC pointer to the EC context 82 // pScratchBuffer pointer to buffer (1 mul_point operation) 83 // 84 *F*/ 85 IPPFUN(IppStatus, ippsGFpECTstKeyPair, (const IppsBigNumState* pPrivate, const IppsGFpECPoint* pPublic, IppECResult* pResult, 86 IppsGFpECState* pEC, Ipp8u* pScratchBuffer)) 87 { 88 /* EC context and buffer */ 89 IPP_BAD_PTR2_RET(pEC, pScratchBuffer); 90 pEC = (IppsGFpECState*)( IPP_ALIGNED_PTR(pEC, ECGFP_ALIGNMENT) ); 91 IPP_BADARG_RET(!ECP_TEST_ID(pEC), ippStsContextMatchErr); 92 IPP_BADARG_RET(!ECP_SUBGROUP(pEC), ippStsContextMatchErr); 93 94 /* test result */ 95 IPP_BAD_PTR1_RET(pResult); 96 *pResult = ippECValid; 97 98 /* private key validation request */ 99 if( pPrivate ) { 100 pPrivate = (IppsBigNumState*)( IPP_ALIGNED_PTR(pPrivate, ALIGN_VAL) ); 101 IPP_BADARG_RET(!BN_VALID_ID(pPrivate), ippStsContextMatchErr); 102 103 { 104 BNU_CHUNK_T* pS = BN_NUMBER(pPrivate); 105 int nsS = BN_SIZE(pPrivate); 106 107 BNU_CHUNK_T* pOrder = MOD_MODULUS(ECP_MONT_R(pEC)); 108 int orderLen = BITS_BNU_CHUNK(ECP_ORDBITSIZE(pEC)); 109 110 /* check private key */ 111 if(cpEqu_BNU_CHUNK(pS, nsS, 0) || 0<=cpCmp_BNU(pS, nsS, pOrder, orderLen)) { 112 *pResult = ippECInvalidPrivateKey; 113 return ippStsNoErr; 114 } 115 } 116 } 117 118 /* public key validation request */ 119 if( pPublic ) { 120 IPP_BADARG_RET( !ECP_POINT_TEST_ID(pPublic), ippStsContextMatchErr ); 121 IPP_BADARG_RET(ECP_POINT_FELEN(pPublic)<GFP_FELEN(GFP_PMA(ECP_GFP(pEC))), ippStsRangeErr); 122 123 { 124 IppsGFpECPoint T; 125 cpEcGFpInitPoint(&T, cpEcGFpGetPool(1, pEC),0, pEC); 126 127 do { 128 /* public != point_at_Infinity */ 129 if( gfec_IsPointAtInfinity(pPublic) ) { 130 *pResult = ippECPointIsAtInfinite; 131 break; 132 } 133 /* order*public == point_at_Infinity */ 134 gfec_MulPoint(&T, pPublic, MOD_MODULUS(ECP_MONT_R(pEC)), BITS_BNU_CHUNK(ECP_ORDBITSIZE(pEC)), /*0,*/ pEC, pScratchBuffer); 135 if( !gfec_IsPointAtInfinity(&T) ) { 136 *pResult = ippECInvalidPublicKey; 137 break; 138 } 139 /* addition test: private*BasePoint == public */ 140 if(pPrivate) { 141 gfec_MulBasePoint(&T, BN_NUMBER(pPrivate), BN_SIZE(pPrivate), pEC, pScratchBuffer); 142 if(!gfec_ComparePoint(&T, pPublic, pEC)) 143 *pResult = ippECInvalidKeyPair; 144 } 145 } while(0); 146 147 cpEcGFpReleasePool(1, pEC); 148 } 149 } 150 151 return ippStsNoErr; 152 } 153