mirror of
https://github.com/FreeRTOS/FreeRTOS-Kernel.git
synced 2025-10-21 04:07:49 -04:00
Update wolfSSL to the latest version(v.4.4.0) (#186)
* deleted old version wolfSSL before updating * updated wolfSSL to the latest version(v4.4.0) * updated wolfSSL to the latest version(v4.4.0) * added macros for timing resistance Co-authored-by: RichardBarry <3073890+RichardBarry@users.noreply.github.com> Co-authored-by: Ming Yue <mingyue86010@gmail.com>
This commit is contained in:
parent
68518f5866
commit
94aa31c3cb
1185 changed files with 837519 additions and 72138 deletions
|
@ -1,8 +1,8 @@
|
|||
/* curve25519.c
|
||||
*
|
||||
* Copyright (C) 2006-2015 wolfSSL Inc.
|
||||
* Copyright (C) 2006-2020 wolfSSL Inc.
|
||||
*
|
||||
* This file is part of wolfSSL. (formerly known as CyaSSL)
|
||||
* This file is part of wolfSSL.
|
||||
*
|
||||
* wolfSSL is free software; you can redistribute it and/or modify
|
||||
* it under the terms of the GNU General Public License as published by
|
||||
|
@ -16,9 +16,10 @@
|
|||
*
|
||||
* You should have received a copy of the GNU General Public License
|
||||
* along with this program; if not, write to the Free Software
|
||||
* Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA
|
||||
* Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1335, USA
|
||||
*/
|
||||
|
||||
|
||||
/* Based On Daniel J Bernstein's curve25519 Public Domain ref10 work. */
|
||||
|
||||
|
||||
|
@ -35,202 +36,449 @@
|
|||
#ifdef NO_INLINE
|
||||
#include <wolfssl/wolfcrypt/misc.h>
|
||||
#else
|
||||
#define WOLFSSL_MISC_INCLUDED
|
||||
#include <wolfcrypt/src/misc.c>
|
||||
#endif
|
||||
|
||||
#if defined(FREESCALE_LTC_ECC)
|
||||
#include <wolfssl/wolfcrypt/port/nxp/ksdk_port.h>
|
||||
#endif
|
||||
|
||||
const curve25519_set_type curve25519_sets[] = {
|
||||
{
|
||||
32,
|
||||
{
|
||||
CURVE25519_KEYSIZE,
|
||||
"CURVE25519",
|
||||
}
|
||||
}
|
||||
};
|
||||
|
||||
|
||||
|
||||
int wc_curve25519_make_key(RNG* rng, int keysize, curve25519_key* key)
|
||||
int wc_curve25519_make_key(WC_RNG* rng, int keysize, curve25519_key* key)
|
||||
{
|
||||
unsigned char basepoint[CURVE25519_KEYSIZE] = {9};
|
||||
unsigned char n[CURVE25519_KEYSIZE];
|
||||
unsigned char p[CURVE25519_KEYSIZE];
|
||||
int i;
|
||||
int ret;
|
||||
#ifdef FREESCALE_LTC_ECC
|
||||
const ECPoint* basepoint = wc_curve25519_GetBasePoint();
|
||||
#else
|
||||
unsigned char basepoint[CURVE25519_KEYSIZE] = {9};
|
||||
#endif
|
||||
int ret;
|
||||
|
||||
if (key == NULL || rng == NULL)
|
||||
return ECC_BAD_ARG_E;
|
||||
if (key == NULL || rng == NULL)
|
||||
return BAD_FUNC_ARG;
|
||||
|
||||
/* currently only a key size of 32 bytes is used */
|
||||
if (keysize != CURVE25519_KEYSIZE)
|
||||
return ECC_BAD_ARG_E;
|
||||
/* currently only a key size of 32 bytes is used */
|
||||
if (keysize != CURVE25519_KEYSIZE)
|
||||
return ECC_BAD_ARG_E;
|
||||
|
||||
/* get random number from RNG */
|
||||
ret = wc_RNG_GenerateBlock(rng, n, keysize);
|
||||
if (ret != 0)
|
||||
return ret;
|
||||
#ifndef FREESCALE_LTC_ECC
|
||||
fe_init();
|
||||
#endif
|
||||
|
||||
for (i = 0; i < keysize; ++i) key->k.point[i] = n[i];
|
||||
key->k.point[ 0] &= 248;
|
||||
key->k.point[31] &= 127;
|
||||
key->k.point[31] |= 64;
|
||||
/* random number for private key */
|
||||
ret = wc_RNG_GenerateBlock(rng, key->k.point, keysize);
|
||||
if (ret != 0)
|
||||
return ret;
|
||||
|
||||
/* compute public key */
|
||||
ret = curve25519(p, key->k.point, basepoint);
|
||||
/* Clamp the private key */
|
||||
key->k.point[0] &= 248;
|
||||
key->k.point[CURVE25519_KEYSIZE-1] &= 63; /* same &=127 because |=64 after */
|
||||
key->k.point[CURVE25519_KEYSIZE-1] |= 64;
|
||||
|
||||
/* store keys in big endian format */
|
||||
for (i = 0; i < keysize; ++i) n[i] = key->k.point[i];
|
||||
for (i = 0; i < keysize; ++i) {
|
||||
key->p.point[keysize - i - 1] = p[i];
|
||||
key->k.point[keysize - i - 1] = n[i];
|
||||
}
|
||||
/* compute public key */
|
||||
#ifdef FREESCALE_LTC_ECC
|
||||
ret = wc_curve25519(&key->p, key->k.point, basepoint, kLTC_Weierstrass); /* input basepoint on Weierstrass curve */
|
||||
#else
|
||||
ret = curve25519(key->p.point, key->k.point, basepoint);
|
||||
#endif
|
||||
if (ret != 0) {
|
||||
ForceZero(key->k.point, keysize);
|
||||
ForceZero(key->p.point, keysize);
|
||||
return ret;
|
||||
}
|
||||
|
||||
ForceZero(n, keysize);
|
||||
ForceZero(p, keysize);
|
||||
|
||||
return ret;
|
||||
return ret;
|
||||
}
|
||||
|
||||
#ifdef HAVE_CURVE25519_SHARED_SECRET
|
||||
|
||||
int wc_curve25519_shared_secret(curve25519_key* private_key,
|
||||
curve25519_key* public_key,
|
||||
byte* out, word32* outlen)
|
||||
{
|
||||
unsigned char k[CURVE25519_KEYSIZE];
|
||||
unsigned char p[CURVE25519_KEYSIZE];
|
||||
unsigned char o[CURVE25519_KEYSIZE];
|
||||
return wc_curve25519_shared_secret_ex(private_key, public_key,
|
||||
out, outlen, EC25519_BIG_ENDIAN);
|
||||
}
|
||||
|
||||
int wc_curve25519_shared_secret_ex(curve25519_key* private_key,
|
||||
curve25519_key* public_key,
|
||||
byte* out, word32* outlen, int endian)
|
||||
{
|
||||
#ifdef FREESCALE_LTC_ECC
|
||||
ECPoint o = {{0}};
|
||||
#else
|
||||
unsigned char o[CURVE25519_KEYSIZE];
|
||||
#endif
|
||||
int ret = 0;
|
||||
int i;
|
||||
|
||||
/* sanity check */
|
||||
if (private_key == NULL || public_key == NULL || out == NULL ||
|
||||
outlen == NULL)
|
||||
if (private_key == NULL || public_key == NULL ||
|
||||
out == NULL || outlen == NULL || *outlen < CURVE25519_KEYSIZE)
|
||||
return BAD_FUNC_ARG;
|
||||
|
||||
/* avoid implementation fingerprinting */
|
||||
if (public_key->p.point[0] > 0x7F)
|
||||
if (public_key->p.point[CURVE25519_KEYSIZE-1] > 0x7F)
|
||||
return ECC_BAD_ARG_E;
|
||||
|
||||
XMEMSET(p, 0, sizeof(p));
|
||||
XMEMSET(k, 0, sizeof(k));
|
||||
XMEMSET(out, 0, CURVE25519_KEYSIZE);
|
||||
|
||||
for (i = 0; i < CURVE25519_KEYSIZE; ++i) {
|
||||
p[i] = public_key->p.point [CURVE25519_KEYSIZE - i - 1];
|
||||
k[i] = private_key->k.point[CURVE25519_KEYSIZE - i - 1];
|
||||
#ifdef FREESCALE_LTC_ECC
|
||||
ret = wc_curve25519(&o, private_key->k.point, &public_key->p, kLTC_Curve25519 /* input point P on Curve25519 */);
|
||||
#else
|
||||
ret = curve25519(o, private_key->k.point, public_key->p.point);
|
||||
#endif
|
||||
if (ret != 0) {
|
||||
#ifdef FREESCALE_LTC_ECC
|
||||
ForceZero(o.point, CURVE25519_KEYSIZE);
|
||||
ForceZero(o.pointY, CURVE25519_KEYSIZE);
|
||||
#else
|
||||
ForceZero(o, CURVE25519_KEYSIZE);
|
||||
#endif
|
||||
return ret;
|
||||
}
|
||||
|
||||
ret = curve25519(o , k, p);
|
||||
if (endian == EC25519_BIG_ENDIAN) {
|
||||
int i;
|
||||
/* put shared secret key in Big Endian format */
|
||||
for (i = 0; i < CURVE25519_KEYSIZE; i++)
|
||||
#ifdef FREESCALE_LTC_ECC
|
||||
out[i] = o.point[CURVE25519_KEYSIZE - i -1];
|
||||
#else
|
||||
out[i] = o[CURVE25519_KEYSIZE - i -1];
|
||||
#endif
|
||||
}
|
||||
else /* put shared secret key in Little Endian format */
|
||||
#ifdef FREESCALE_LTC_ECC
|
||||
XMEMCPY(out, o.point, CURVE25519_KEYSIZE);
|
||||
#else
|
||||
XMEMCPY(out, o, CURVE25519_KEYSIZE);
|
||||
#endif
|
||||
|
||||
*outlen = CURVE25519_KEYSIZE;
|
||||
|
||||
for (i = 0; i < CURVE25519_KEYSIZE; ++i) {
|
||||
out[i] = o[CURVE25519_KEYSIZE - i -1];
|
||||
}
|
||||
|
||||
ForceZero(p, sizeof(p));
|
||||
ForceZero(k, sizeof(k));
|
||||
ForceZero(o, sizeof(o));
|
||||
#ifdef FREESCALE_LTC_ECC
|
||||
ForceZero(o.point, CURVE25519_KEYSIZE);
|
||||
ForceZero(o.pointY, CURVE25519_KEYSIZE);
|
||||
#else
|
||||
ForceZero(o, CURVE25519_KEYSIZE);
|
||||
#endif
|
||||
|
||||
return ret;
|
||||
}
|
||||
|
||||
#endif /* HAVE_CURVE25519_SHARED_SECRET */
|
||||
|
||||
/* curve25519 uses a serialized string for key representation */
|
||||
#ifdef HAVE_CURVE25519_KEY_EXPORT
|
||||
|
||||
/* export curve25519 public key (Big endian)
|
||||
* return 0 on success */
|
||||
int wc_curve25519_export_public(curve25519_key* key, byte* out, word32* outLen)
|
||||
{
|
||||
word32 keySz;
|
||||
return wc_curve25519_export_public_ex(key, out, outLen, EC25519_BIG_ENDIAN);
|
||||
}
|
||||
|
||||
/* export curve25519 public key (Big or Little endian)
|
||||
* return 0 on success */
|
||||
int wc_curve25519_export_public_ex(curve25519_key* key, byte* out,
|
||||
word32* outLen, int endian)
|
||||
{
|
||||
if (key == NULL || out == NULL || outLen == NULL)
|
||||
return BAD_FUNC_ARG;
|
||||
|
||||
/* check size of outgoing key */
|
||||
keySz = wc_curve25519_size(key);
|
||||
/* check and set outgoing key size */
|
||||
if (*outLen < CURVE25519_KEYSIZE) {
|
||||
*outLen = CURVE25519_KEYSIZE;
|
||||
return ECC_BAD_ARG_E;
|
||||
}
|
||||
*outLen = CURVE25519_KEYSIZE;
|
||||
|
||||
/* copy in public key */
|
||||
XMEMCPY(out, key->p.point, keySz);
|
||||
*outLen = keySz;
|
||||
if (endian == EC25519_BIG_ENDIAN) {
|
||||
int i;
|
||||
|
||||
/* read keys in Big Endian format */
|
||||
for (i = 0; i < CURVE25519_KEYSIZE; i++)
|
||||
out[i] = key->p.point[CURVE25519_KEYSIZE - i - 1];
|
||||
}
|
||||
else
|
||||
XMEMCPY(out, key->p.point, CURVE25519_KEYSIZE);
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
/* import curve25519 public key
|
||||
return 0 on success */
|
||||
#endif /* HAVE_CURVE25519_KEY_EXPORT */
|
||||
|
||||
#ifdef HAVE_CURVE25519_KEY_IMPORT
|
||||
|
||||
/* import curve25519 public key (Big endian)
|
||||
* return 0 on success */
|
||||
int wc_curve25519_import_public(const byte* in, word32 inLen,
|
||||
curve25519_key* key)
|
||||
{
|
||||
word32 keySz;
|
||||
return wc_curve25519_import_public_ex(in, inLen, key, EC25519_BIG_ENDIAN);
|
||||
}
|
||||
|
||||
/* import curve25519 public key (Big or Little endian)
|
||||
* return 0 on success */
|
||||
int wc_curve25519_import_public_ex(const byte* in, word32 inLen,
|
||||
curve25519_key* key, int endian)
|
||||
{
|
||||
/* sanity check */
|
||||
if (key == NULL || in == NULL)
|
||||
return ECC_BAD_ARG_E;
|
||||
return BAD_FUNC_ARG;
|
||||
|
||||
/* check size of incoming keys */
|
||||
keySz = wc_curve25519_size(key);
|
||||
if (inLen != keySz)
|
||||
if (inLen != CURVE25519_KEYSIZE)
|
||||
return ECC_BAD_ARG_E;
|
||||
|
||||
XMEMCPY(key->p.point, in, inLen);
|
||||
if (endian == EC25519_BIG_ENDIAN) {
|
||||
int i;
|
||||
|
||||
/* read keys in Big Endian format */
|
||||
for (i = 0; i < CURVE25519_KEYSIZE; i++)
|
||||
key->p.point[i] = in[CURVE25519_KEYSIZE - i - 1];
|
||||
}
|
||||
else
|
||||
XMEMCPY(key->p.point, in, inLen);
|
||||
|
||||
key->dp = &curve25519_sets[0];
|
||||
|
||||
/* LTC needs also Y coordinate - let's compute it */
|
||||
#ifdef FREESCALE_LTC_ECC
|
||||
ltc_pkha_ecc_point_t ltcPoint;
|
||||
ltcPoint.X = &key->p.point[0];
|
||||
ltcPoint.Y = &key->p.pointY[0];
|
||||
LTC_PKHA_Curve25519ComputeY(<cPoint);
|
||||
#endif
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
/* Check the public key value (big or little endian)
|
||||
*
|
||||
* pub Public key bytes.
|
||||
* pubSz Size of public key in bytes.
|
||||
* endian Public key bytes passed in as big-endian or little-endian.
|
||||
* returns BAD_FUNC_ARGS when pub is NULL,
|
||||
* BUFFER_E when size of public key is zero;
|
||||
* ECC_OUT_OF_RANGE_E if the high bit is set;
|
||||
* ECC_BAD_ARG_E if key length is not 32 bytes, public key value is
|
||||
* zero or one; and
|
||||
* 0 otherwise.
|
||||
*/
|
||||
int wc_curve25519_check_public(const byte* pub, word32 pubSz, int endian)
|
||||
{
|
||||
word32 i;
|
||||
|
||||
/* export curve25519 private key only raw, outLen is in/out size
|
||||
return 0 on success */
|
||||
if (pub == NULL)
|
||||
return BAD_FUNC_ARG;
|
||||
|
||||
/* Check for empty key data */
|
||||
if (pubSz == 0)
|
||||
return BUFFER_E;
|
||||
|
||||
/* Check key length */
|
||||
if (pubSz != CURVE25519_KEYSIZE)
|
||||
return ECC_BAD_ARG_E;
|
||||
|
||||
|
||||
if (endian == EC25519_LITTLE_ENDIAN) {
|
||||
/* Check for value of zero or one */
|
||||
for (i = pubSz - 1; i > 0; i--) {
|
||||
if (pub[i] != 0)
|
||||
break;
|
||||
}
|
||||
if (i == 0 && (pub[0] == 0 || pub[0] == 1))
|
||||
return ECC_BAD_ARG_E;
|
||||
|
||||
/* Check high bit set */
|
||||
if (pub[CURVE25519_KEYSIZE-1] & 0x80)
|
||||
return ECC_OUT_OF_RANGE_E;
|
||||
}
|
||||
else {
|
||||
/* Check for value of zero or one */
|
||||
for (i = 0; i < pubSz-1; i++) {
|
||||
if (pub[i] != 0)
|
||||
break;
|
||||
}
|
||||
if (i == pubSz - 1 && (pub[i] == 0 || pub[i] == 1))
|
||||
return ECC_BAD_ARG_E;
|
||||
|
||||
/* Check high bit set */
|
||||
if (pub[0] & 0x80)
|
||||
return ECC_OUT_OF_RANGE_E;
|
||||
}
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
#endif /* HAVE_CURVE25519_KEY_IMPORT */
|
||||
|
||||
|
||||
#ifdef HAVE_CURVE25519_KEY_EXPORT
|
||||
|
||||
/* export curve25519 private key only raw (Big endian)
|
||||
* outLen is in/out size
|
||||
* return 0 on success */
|
||||
int wc_curve25519_export_private_raw(curve25519_key* key, byte* out,
|
||||
word32* outLen)
|
||||
{
|
||||
word32 keySz;
|
||||
return wc_curve25519_export_private_raw_ex(key, out, outLen,
|
||||
EC25519_BIG_ENDIAN);
|
||||
}
|
||||
|
||||
/* export curve25519 private key only raw (Big or Little endian)
|
||||
* outLen is in/out size
|
||||
* return 0 on success */
|
||||
int wc_curve25519_export_private_raw_ex(curve25519_key* key, byte* out,
|
||||
word32* outLen, int endian)
|
||||
{
|
||||
/* sanity check */
|
||||
if (key == NULL || out == NULL || outLen == NULL)
|
||||
return ECC_BAD_ARG_E;
|
||||
return BAD_FUNC_ARG;
|
||||
|
||||
keySz = wc_curve25519_size(key);
|
||||
*outLen = keySz;
|
||||
XMEMSET(out, 0, keySz);
|
||||
XMEMCPY(out, key->k.point, keySz);
|
||||
/* check size of outgoing buffer */
|
||||
if (*outLen < CURVE25519_KEYSIZE) {
|
||||
*outLen = CURVE25519_KEYSIZE;
|
||||
return ECC_BAD_ARG_E;
|
||||
}
|
||||
*outLen = CURVE25519_KEYSIZE;
|
||||
|
||||
if (endian == EC25519_BIG_ENDIAN) {
|
||||
int i;
|
||||
|
||||
/* put the key in Big Endian format */
|
||||
for (i = 0; i < CURVE25519_KEYSIZE; i++)
|
||||
out[i] = key->k.point[CURVE25519_KEYSIZE - i - 1];
|
||||
}
|
||||
else
|
||||
XMEMCPY(out, key->k.point, CURVE25519_KEYSIZE);
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
|
||||
/* curve25519 private key import.
|
||||
Public key to match private key needs to be imported too */
|
||||
int wc_curve25519_import_private_raw(const byte* priv, word32 privSz,
|
||||
const byte* pub, word32 pubSz, curve25519_key* key)
|
||||
/* curve25519 key pair export (Big or Little endian)
|
||||
* return 0 on success */
|
||||
int wc_curve25519_export_key_raw(curve25519_key* key,
|
||||
byte* priv, word32 *privSz,
|
||||
byte* pub, word32 *pubSz)
|
||||
{
|
||||
int ret = 0;
|
||||
word32 keySz;
|
||||
return wc_curve25519_export_key_raw_ex(key, priv, privSz,
|
||||
pub, pubSz, EC25519_BIG_ENDIAN);
|
||||
}
|
||||
|
||||
/* curve25519 key pair export (Big or Little endian)
|
||||
* return 0 on success */
|
||||
int wc_curve25519_export_key_raw_ex(curve25519_key* key,
|
||||
byte* priv, word32 *privSz,
|
||||
byte* pub, word32 *pubSz,
|
||||
int endian)
|
||||
{
|
||||
int ret;
|
||||
|
||||
/* export private part */
|
||||
ret = wc_curve25519_export_private_raw_ex(key, priv, privSz, endian);
|
||||
if (ret != 0)
|
||||
return ret;
|
||||
|
||||
/* export public part */
|
||||
return wc_curve25519_export_public_ex(key, pub, pubSz, endian);
|
||||
}
|
||||
|
||||
#endif /* HAVE_CURVE25519_KEY_EXPORT */
|
||||
|
||||
#ifdef HAVE_CURVE25519_KEY_IMPORT
|
||||
|
||||
/* curve25519 private key import (Big endian)
|
||||
* Public key to match private key needs to be imported too
|
||||
* return 0 on success */
|
||||
int wc_curve25519_import_private_raw(const byte* priv, word32 privSz,
|
||||
const byte* pub, word32 pubSz,
|
||||
curve25519_key* key)
|
||||
{
|
||||
return wc_curve25519_import_private_raw_ex(priv, privSz, pub, pubSz,
|
||||
key, EC25519_BIG_ENDIAN);
|
||||
}
|
||||
|
||||
/* curve25519 private key import (Big or Little endian)
|
||||
* Public key to match private key needs to be imported too
|
||||
* return 0 on success */
|
||||
int wc_curve25519_import_private_raw_ex(const byte* priv, word32 privSz,
|
||||
const byte* pub, word32 pubSz,
|
||||
curve25519_key* key, int endian)
|
||||
{
|
||||
int ret;
|
||||
|
||||
/* import private part */
|
||||
ret = wc_curve25519_import_private_ex(priv, privSz, key, endian);
|
||||
if (ret != 0)
|
||||
return ret;
|
||||
|
||||
/* import public part */
|
||||
return wc_curve25519_import_public_ex(pub, pubSz, key, endian);
|
||||
}
|
||||
|
||||
/* curve25519 private key import only. (Big endian)
|
||||
* return 0 on success */
|
||||
int wc_curve25519_import_private(const byte* priv, word32 privSz,
|
||||
curve25519_key* key)
|
||||
{
|
||||
return wc_curve25519_import_private_ex(priv, privSz,
|
||||
key, EC25519_BIG_ENDIAN);
|
||||
}
|
||||
|
||||
/* curve25519 private key import only. (Big or Little endian)
|
||||
* return 0 on success */
|
||||
int wc_curve25519_import_private_ex(const byte* priv, word32 privSz,
|
||||
curve25519_key* key, int endian)
|
||||
{
|
||||
/* sanity check */
|
||||
if (key == NULL || priv == NULL || pub == NULL)
|
||||
return ECC_BAD_ARG_E;
|
||||
if (key == NULL || priv == NULL)
|
||||
return BAD_FUNC_ARG;
|
||||
|
||||
/* check size of incoming keys */
|
||||
keySz = wc_curve25519_size(key);
|
||||
if (privSz != keySz || pubSz != keySz)
|
||||
return ECC_BAD_ARG_E;
|
||||
if ((int)privSz != CURVE25519_KEYSIZE)
|
||||
return ECC_BAD_ARG_E;
|
||||
|
||||
XMEMCPY(key->k.point, priv, privSz);
|
||||
XMEMCPY(key->p.point, pub, pubSz);
|
||||
if (endian == EC25519_BIG_ENDIAN) {
|
||||
int i;
|
||||
|
||||
return ret;
|
||||
/* read the key in Big Endian format */
|
||||
for (i = 0; i < CURVE25519_KEYSIZE; i++)
|
||||
key->k.point[i] = priv[CURVE25519_KEYSIZE - i - 1];
|
||||
}
|
||||
else
|
||||
XMEMCPY(key->k.point, priv, CURVE25519_KEYSIZE);
|
||||
|
||||
key->dp = &curve25519_sets[0];
|
||||
|
||||
/* Clamp the key */
|
||||
key->k.point[0] &= 248;
|
||||
key->k.point[privSz-1] &= 63; /* same &=127 because |=64 after */
|
||||
key->k.point[privSz-1] |= 64;
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
#endif /* HAVE_CURVE25519_KEY_IMPORT */
|
||||
|
||||
|
||||
int wc_curve25519_init(curve25519_key* key)
|
||||
{
|
||||
word32 keySz;
|
||||
|
||||
if (key == NULL)
|
||||
return ECC_BAD_ARG_E;
|
||||
return BAD_FUNC_ARG;
|
||||
|
||||
XMEMSET(key, 0, sizeof(*key));
|
||||
|
||||
/* currently the format for curve25519 */
|
||||
key->dp = &curve25519_sets[0];
|
||||
keySz = key->dp->size;
|
||||
|
||||
XMEMSET(key->k.point, 0, keySz);
|
||||
XMEMSET(key->p.point, 0, keySz);
|
||||
#ifndef FREESCALE_LTC_ECC
|
||||
fe_init();
|
||||
#endif
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
@ -245,13 +493,18 @@ void wc_curve25519_free(curve25519_key* key)
|
|||
key->dp = NULL;
|
||||
ForceZero(key->p.point, sizeof(key->p.point));
|
||||
ForceZero(key->k.point, sizeof(key->k.point));
|
||||
#ifdef FREESCALE_LTC_ECC
|
||||
ForceZero(key->p.point, sizeof(key->p.pointY));
|
||||
ForceZero(key->k.point, sizeof(key->k.pointY));
|
||||
#endif
|
||||
}
|
||||
|
||||
|
||||
/* get key size */
|
||||
int wc_curve25519_size(curve25519_key* key)
|
||||
{
|
||||
if (key == NULL) return 0;
|
||||
if (key == NULL)
|
||||
return 0;
|
||||
|
||||
return key->dp->size;
|
||||
}
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue