Very experimental Ed480-Ridinghood support is now in. It's not fully optimized, but in general the current build is 8-15% slower than Goldilocks. It only works on arch_x86_64, though arch_ref64 support ought to be easy. Support on other arches will be trickier, which is of course why I chose Goldilocks over Ridinghood in the first place. Next up, E-521. Hopefully. The code is starting to get spread out over a lot of files. Some are per field*arch, some per field, some per curve, some global. It's hard to do much about this, though, with a rather ugly .c.inc system. There's currently no way to make a Ridinghood eBAT. In fact, I haven't tested eBAT support in this commit. I also haven't tested NEON, but at least ARCH_32 works on Intel.master
@@ -1,3 +1,44 @@ | |||
October 23, 2014: | |||
Pushing through changes for curve flexibility. First up is | |||
Ed480-Ridinghood, because it has the same number of words. Next | |||
is E-521. | |||
Experimental support for Ed480-Ridinghood. To use, compile with | |||
make ... FIELD=p480 -XCFLAGS=-DGOLDI_FIELD_BITS=480 | |||
I still need to figure out what to do about the fact that the library | |||
is called "goldilocks", but in will soon support curves that are not | |||
ed448-goldilocks, at least experimentally. | |||
Currently the whole system's header "goldilocks.h" doesn't have | |||
a simpler way to override field size, but it does work (as a hack) | |||
with -DGOLDI_FIELD_BITS=... | |||
There is no support yet for coexistence of multiple fields in one | |||
library. The field routines will have unique names, but scalarmul* | |||
won't, and the top-level goldilocks routines have fixed names. | |||
Current timings on Haswell: | |||
Goldilocks: 178kcy keygen, 536kcy ecdh | |||
Ridinghood: 193kcy keygen, 617kcy ecdh | |||
Note that Ridinghood ECDH does worse than 480/448. This is at least | |||
in part because I haven't calculated the overflow handling limits yet | |||
in ec_point.h (this is a disadvantage of dropping the automated | |||
tool for generating that file). So I'm reducing much more often | |||
than I need to. (There's a really loud TODO in ec_point.h for that.) | |||
Also, I haven't tested the limits on these reductions in a while, so | |||
it could be that there are actual (security-critical) bugs in this | |||
area, at least for p448. Now that there's field flexibility, it's | |||
probably a good idea to make a field impl with extra words to check | |||
this. | |||
Furthermore, field_mulw_scc will perform differently on these two | |||
curves based on whether the curve constant is positive or negative. | |||
I should probably go optimize the "hot" routines like montgomery_step | |||
to have separate cases for positive and negative. | |||
September 29, 2014: | |||
Yesterday I put in some more architecture detection, but it should | |||
really be based on the arch directory, because what's in there really | |||
@@ -20,12 +20,13 @@ else | |||
ARCH ?= arch_arm_32 | |||
endif | |||
FIELD ?= p448 | |||
WARNFLAGS = -pedantic -Wall -Wextra -Werror -Wunreachable-code \ | |||
-Wmissing-declarations -Wunused-function -Wno-overlength-strings $(EXWARN) | |||
INCFLAGS = -Isrc/include -Iinclude -Isrc/$(ARCH) | |||
INCFLAGS = -Isrc/include -Iinclude -Isrc/$(FIELD) -Isrc/$(FIELD)/$(ARCH) | |||
LANGFLAGS = -std=c99 -fno-strict-aliasing | |||
GENFLAGS = -ffunction-sections -fdata-sections -fvisibility=hidden -fomit-frame-pointer -fPIC | |||
OFLAGS = -O3 | |||
@@ -63,7 +64,8 @@ ASFLAGS = $(ARCHFLAGS) | |||
HEADERS= Makefile $(shell find . -name "*.h") build/timestamp | |||
LIBCOMPONENTS= build/goldilocks.o build/barrett_field.o build/crandom.o \ | |||
build/p448.o build/ec_point.o build/scalarmul.o build/sha512.o build/magic.o build/arithmetic.o | |||
build/$(FIELD).o build/ec_point.o build/scalarmul.o build/sha512.o build/magic.o \ | |||
build/f_arithmetic.o build/arithmetic.o | |||
TESTCOMPONENTS=build/test.o build/test_scalarmul.o build/test_sha512.o \ | |||
build/test_pointops.o build/test_arithmetic.o build/test_goldilocks.o build/magic.o | |||
@@ -113,7 +115,10 @@ build/%.s: src/%.c $(HEADERS) | |||
build/%.s: test/%.c $(HEADERS) | |||
$(CC) $(CFLAGS) -S -c -o $@ $< | |||
build/%.s: src/$(ARCH)/%.c $(HEADERS) | |||
build/%.s: src/$(FIELD)/$(ARCH)/%.c $(HEADERS) | |||
$(CC) $(CFLAGS) -S -c -o $@ $< | |||
build/%.s: src/$(FIELD)/%.c $(HEADERS) | |||
$(CC) $(CFLAGS) -S -c -o $@ $< | |||
doc/timestamp: | |||
@@ -131,7 +136,7 @@ $(BATNAME): include/* src/* src/*/* test/batarch.map | |||
targ="$@/crypto_$$prim/ed448goldilocks"; \ | |||
(while read arch where; do \ | |||
mkdir -p $$targ/`basename $$arch`; \ | |||
cp include/*.h src/*.c src/include/*.h src/bat/$$prim.c src/$$where/*.c src/$$where/*.h $$targ/`basename $$arch`; \ | |||
cp include/*.h src/*.c src/include/*.h src/bat/$$prim.c src/p448/$$where/*.c src/p448/$$where/*.h src/p448/*.c src/p448/*.h $$targ/`basename $$arch`; \ | |||
cp src/bat/api_$$prim.h $$targ/`basename $$arch`/api.h; \ | |||
perl -p -i -e 's/.*endif.*GOLDILOCKS_CONFIG_H/#define SUPERCOP_WONT_LET_ME_OPEN_FILES 1\n\n$$&/' $$targ/`basename $$arch`/config.h; \ | |||
perl -p -i -e 's/SYSNAME/'`basename $(BATNAME)`_`basename $$arch`'/g' $$targ/`basename $$arch`/api.h; \ | |||
@@ -22,14 +22,18 @@ | |||
#define GOLDI_IMPLEMENT_SIGNATURES 1 | |||
#endif | |||
/** The size of the Goldilocks field, in bits. */ | |||
/** The size of the Goldilocks field, in bits. | |||
* Ifdef'd so you can override when testing experimental Ed480-Ridinghood or E-521. | |||
*/ | |||
#ifndef GOLDI_FIELD_BITS | |||
#define GOLDI_FIELD_BITS 448 | |||
#endif | |||
/** The size of the Goldilocks scalars, in bits. */ | |||
#define GOLDI_SCALAR_BITS 446 | |||
#define GOLDI_SCALAR_BITS (GOLDI_FIELD_BITS-2) | |||
/** The same size, in bytes. */ | |||
#define GOLDI_FIELD_BYTES (GOLDI_FIELD_BITS/8) | |||
#define GOLDI_FIELD_BYTES ((GOLDI_FIELD_BITS+7)/8) | |||
/** The size of a Goldilocks public key, in bytes. */ | |||
#define GOLDI_PUBLIC_KEY_BYTES GOLDI_FIELD_BYTES | |||
@@ -0,0 +1,376 @@ | |||
/* Copyright (c) 2014 Cryptography Research, Inc. | |||
* Released under the MIT License. See LICENSE.txt for license information. | |||
*/ | |||
/** | |||
* @file goldilocks.h | |||
* @author Mike Hamburg | |||
* @brief Goldilocks high-level functions. | |||
*/ | |||
#ifndef __GOLDILOCKS_H__ | |||
#define __GOLDILOCKS_H__ 1 | |||
#include <stdint.h> | |||
#ifndef GOLDI_IMPLEMENT_PRECOMPUTED_KEYS | |||
/** If nonzero, implement precomputation for verify and ECDH. */ | |||
#define GOLDI_IMPLEMENT_PRECOMPUTED_KEYS 1 | |||
#endif | |||
#ifndef GOLDI_IMPLEMENT_SIGNATURES | |||
/** If nonzero, implement signatures. */ | |||
#define GOLDI_IMPLEMENT_SIGNATURES 1 | |||
#endif | |||
/** The size of the Goldilocks field, in bits. */ | |||
#define GOLDI_FIELD_BITS 448 | |||
/** The size of the Goldilocks scalars, in bits. */ | |||
#define GOLDI_SCALAR_BITS 446 | |||
/** The same size, in bytes. */ | |||
#define GOLDI_FIELD_BYTES (GOLDI_FIELD_BITS/8) | |||
/** The size of a Goldilocks public key, in bytes. */ | |||
#define GOLDI_PUBLIC_KEY_BYTES GOLDI_FIELD_BYTES | |||
/** The extra bytes in a Goldilocks private key for the symmetric key. */ | |||
#define GOLDI_SYMKEY_BYTES 32 | |||
/** The size of a shared secret. */ | |||
#define GOLDI_SHARED_SECRET_BYTES 64 | |||
/** The size of a Goldilocks private key, in bytes. */ | |||
#define GOLDI_PRIVATE_KEY_BYTES (2*GOLDI_FIELD_BYTES + GOLDI_SYMKEY_BYTES) | |||
/** The size of a Goldilocks signature, in bytes. */ | |||
#define GOLDI_SIGNATURE_BYTES (2*GOLDI_FIELD_BYTES) | |||
/** | |||
* @brief Serialized form of a Goldilocks public key. | |||
* | |||
* @warning This isn't even my final form! | |||
*/ | |||
struct goldilocks_public_key_t { | |||
uint8_t opaque[GOLDI_PUBLIC_KEY_BYTES]; /**< Serialized data. */ | |||
}; | |||
/** | |||
* @brief Serialized form of a Goldilocks private key. | |||
* | |||
* Contains 56 bytes of actual private key, 56 bytes of | |||
* public key, and 32 bytes of symmetric key for randomization. | |||
* | |||
* @warning This isn't even my final form! | |||
*/ | |||
struct goldilocks_private_key_t { | |||
uint8_t opaque[GOLDI_PRIVATE_KEY_BYTES]; /**< Serialized data. */ | |||
}; | |||
#ifdef __cplusplus | |||
extern "C" { | |||
#endif | |||
/** @brief No error. */ | |||
static const int GOLDI_EOK = 0; | |||
/** @brief Error: your key or other state is corrupt. */ | |||
static const int GOLDI_ECORRUPT = 44801; | |||
/** @brief Error: other party's key is corrupt. */ | |||
static const int GOLDI_EINVAL = 44802; | |||
/** @brief Error: not enough entropy. */ | |||
static const int GOLDI_ENODICE = 44804; | |||
/** @brief Error: you need to initialize the library first. */ | |||
static const int GOLDI_EUNINIT = 44805; | |||
/** @brief Error: called init() but we are already initialized. */ | |||
static const int GOLDI_EALREADYINIT = 44805; | |||
/** | |||
* @brief Initialize Goldilocks' precomputed tables and | |||
* random number generator. This function must be called before | |||
* any of the other Goldilocks routines (except | |||
* goldilocks_shared_secret in the current version) and should be | |||
* called only once per process. | |||
* | |||
* There is currently no way to tear down this state. It is possible | |||
* that a future version of this library will not require this function. | |||
* | |||
* @retval GOLDI_EOK Success. | |||
* @retval GOLDI_EALREADYINIT Already initialized. | |||
* @retval GOLDI_ECORRUPT Memory is corrupted, or another thread is already init'ing. | |||
* @retval Nonzero An error occurred. | |||
*/ | |||
int | |||
goldilocks_init (void) | |||
__attribute__((warn_unused_result,visibility ("default"))); | |||
/** | |||
* @brief Generate a new random keypair. | |||
* @param [out] privkey The generated private key. | |||
* @param [out] pubkey The generated public key. | |||
* | |||
* @warning This isn't even my final form! | |||
* | |||
* @retval GOLDI_EOK Success. | |||
* @retval GOLDI_ENODICE Insufficient entropy. | |||
* @retval GOLDI_EUNINIT You must call goldilocks_init() first. | |||
*/ | |||
int | |||
goldilocks_keygen ( | |||
struct goldilocks_private_key_t *privkey, | |||
struct goldilocks_public_key_t *pubkey | |||
) __attribute__((warn_unused_result,nonnull(1,2),visibility ("default"))); | |||
/** | |||
* @brief Derive a key from its compressed form. | |||
* @param [out] privkey The derived private key. | |||
* @param [in] proto The compressed or proto-key, which must be 32 random bytes. | |||
* | |||
* @warning This isn't even my final form! | |||
* | |||
* @retval GOLDI_EOK Success. | |||
* @retval GOLDI_EUNINIT You must call goldilocks_init() first. | |||
*/ | |||
int | |||
goldilocks_derive_private_key ( | |||
struct goldilocks_private_key_t *privkey, | |||
const unsigned char proto[GOLDI_SYMKEY_BYTES] | |||
) __attribute__((nonnull(1,2),visibility ("default"))); | |||
/** | |||
* @brief Compress a private key (by copying out the proto-key) | |||
* @param [out] proto The proto-key. | |||
* @param [in] privkey The private key. | |||
* | |||
* @warning This isn't even my final form! | |||
* @todo test. | |||
* | |||
* @retval GOLDI_EOK Success. | |||
* @retval GOLDI_EUNINIT You must call goldilocks_init() first. | |||
*/ | |||
void | |||
goldilocks_underive_private_key ( | |||
unsigned char proto[GOLDI_SYMKEY_BYTES], | |||
const struct goldilocks_private_key_t *privkey | |||
) __attribute__((nonnull(1,2),visibility ("default"))); | |||
/** | |||
* @brief Extract the public key from a private key. | |||
* | |||
* This is essentially a memcpy from the public part of the privkey. | |||
* | |||
* @param [out] pubkey The extracted private key. | |||
* @param [in] privkey The private key. | |||
* | |||
* @retval GOLDI_EOK Success. | |||
* @retval GOLDI_ECORRUPT The private key is corrupt. | |||
*/ | |||
int | |||
goldilocks_private_to_public ( | |||
struct goldilocks_public_key_t *pubkey, | |||
const struct goldilocks_private_key_t *privkey | |||
) __attribute__((nonnull(1,2),visibility ("default"))); | |||
/** | |||
* @brief Generate a Diffie-Hellman shared secret in constant time. | |||
* | |||
* This function uses some compile-time flags whose merit remains to | |||
* be decided. | |||
* | |||
* If the flag EXPERIMENT_ECDH_OBLITERATE_CT is set, prepend 40 bytes | |||
* of zeros to the secret before hashing. In the case that the other | |||
* party's key is detectably corrupt, instead the symmetric part | |||
* of the secret key is used to produce a pseudorandom value. | |||
* | |||
* If EXPERIMENT_ECDH_STIR_IN_PUBKEYS is set, the sum and product of | |||
* the two parties' public keys is prepended to the hash. | |||
* | |||
* In the current version, this function can safely be run even without | |||
* goldilocks_init(). But this property is not guaranteed for future | |||
* versions, so call it anyway. | |||
* | |||
* @warning This isn't even my final form! | |||
* | |||
* @param [out] shared The shared secret established with the other party. | |||
* @param [in] my_privkey My private key. | |||
* @param [in] your_pubkey The other party's public key. | |||
* | |||
* @retval GOLDI_EOK Success. | |||
* @retval GOLDI_ECORRUPT My key is corrupt. | |||
* @retval GOLDI_EINVAL The other party's key is corrupt. | |||
* @retval GOLDI_EUNINIT You must call goldilocks_init() first. | |||
*/ | |||
int | |||
goldilocks_shared_secret ( | |||
uint8_t shared[GOLDI_SHARED_SECRET_BYTES], | |||
const struct goldilocks_private_key_t *my_privkey, | |||
const struct goldilocks_public_key_t *your_pubkey | |||
) __attribute__((warn_unused_result,nonnull(1,2,3),visibility ("default"))); | |||
#if GOLDI_IMPLEMENT_SIGNATURES | |||
/** | |||
* @brief Sign a message. | |||
* | |||
* The signature is deterministic, using the symmetric secret found in the | |||
* secret key to form a nonce. | |||
* | |||
* The technique used in signing is a modified Schnorr system, like EdDSA. | |||
* | |||
* @warning This isn't even my final form! | |||
* | |||
* @param [out] signature_out Space for the output signature. | |||
* @param [in] message The message to be signed. | |||
* @param [in] message_len The length of the message to be signed. | |||
* @param [in] privkey My private key. | |||
* | |||
* @retval GOLDI_EOK Success. | |||
* @retval GOLDI_ECORRUPT My key is corrupt. | |||
* @retval GOLDI_EUNINIT You must call goldilocks_init() first. | |||
*/ | |||
int | |||
goldilocks_sign ( | |||
uint8_t signature_out[GOLDI_SIGNATURE_BYTES], | |||
const uint8_t *message, | |||
uint64_t message_len, | |||
const struct goldilocks_private_key_t *privkey | |||
) __attribute__((nonnull(1,2,4),visibility ("default"))); | |||
/** | |||
* @brief Verify a signature. | |||
* | |||
* This function is fairly strict. It will correctly detect when | |||
* the signature has the wrong cofactor component, or when the sig | |||
* values aren't less than p or q. | |||
* | |||
* Currently this function does not detect when the public key is weird, | |||
* eg 0, has cofactor, etc. As a result, a party with a bogus public | |||
* key could create signatures that succeed on some systems and fail on | |||
* others. | |||
* | |||
* @warning This isn't even my final form! | |||
* | |||
* @param [in] signature The signature. | |||
* @param [in] message The message to be verified. | |||
* @param [in] message_len The length of the message to be verified. | |||
* @param [in] pubkey The signer's public key. | |||
* | |||
* @retval GOLDI_EOK Success. | |||
* @retval GOLDI_EINVAL The public key or signature is corrupt. | |||
* @retval GOLDI_EUNINIT You must call goldilocks_init() first. | |||
*/ | |||
int | |||
goldilocks_verify ( | |||
const uint8_t signature[GOLDI_SIGNATURE_BYTES], | |||
const uint8_t *message, | |||
uint64_t message_len, | |||
const struct goldilocks_public_key_t *pubkey | |||
) __attribute__((warn_unused_result,nonnull(1,2,4),visibility ("default"))); | |||
#endif | |||
#if GOLDI_IMPLEMENT_PRECOMPUTED_KEYS | |||
/** A public key which has been expanded by precomputation for higher speed. */ | |||
struct goldilocks_precomputed_public_key_t; | |||
/** | |||
* @brief Expand a public key by precomputation. | |||
* | |||
* @todo Give actual error returns, instead of ambiguous NULL. | |||
* | |||
* @warning This isn't even my final form! | |||
* | |||
* @param [in] pub The public key. | |||
* @retval NULL We ran out of memory, or the | |||
*/ | |||
struct goldilocks_precomputed_public_key_t * | |||
goldilocks_precompute_public_key ( | |||
const struct goldilocks_public_key_t *pub | |||
) __attribute__((warn_unused_result,nonnull(1),visibility ("default"))); | |||
/** | |||
* @brief Overwrite an expanded public key with zeros, then destroy it. | |||
* | |||
* If the input is NULL, this function does nothing. | |||
* | |||
* @param [in] precom The public key. | |||
*/ | |||
void | |||
goldilocks_destroy_precomputed_public_key ( | |||
struct goldilocks_precomputed_public_key_t *precom | |||
) __attribute__((visibility ("default"))); | |||
/** | |||
* @brief Verify a signature. | |||
* | |||
* This function is fairly strict. It will correctly detect when | |||
* the signature has the wrong cofactor component, or when the sig | |||
* values aren't less than p or q. | |||
* | |||
* @warning This isn't even my final form! | |||
* | |||
* @param [in] signature The signature. | |||
* @param [in] message The message to be verified. | |||
* @param [in] message_len The length of the message to be verified. | |||
* @param [in] pubkey The signer's public key, expanded by precomputation. | |||
* | |||
* @retval GOLDI_EOK Success. | |||
* @retval GOLDI_EINVAL The public key or signature is corrupt. | |||
* @retval GOLDI_EUNINIT You must call goldilocks_init() first. | |||
*/ | |||
int | |||
goldilocks_verify_precomputed ( | |||
const uint8_t signature[GOLDI_SIGNATURE_BYTES], | |||
const uint8_t *message, | |||
uint64_t message_len, | |||
const struct goldilocks_precomputed_public_key_t *pubkey | |||
) __attribute__((warn_unused_result,nonnull(1,2,4),visibility ("default"))); | |||
/** | |||
* @brief Generate a Diffie-Hellman shared secret in constant time. | |||
* Uses a precomputation on the other party's public key for efficiency. | |||
* | |||
* This function uses some compile-time flags whose merit remains to | |||
* be decided. | |||
* | |||
* If the flag EXPERIMENT_ECDH_OBLITERATE_CT is set, prepend 40 bytes | |||
* of zeros to the secret before hashing. In the case that the other | |||
* party's key is detectably corrupt, instead the symmetric part | |||
* of the secret key is used to produce a pseudorandom value. | |||
* | |||
* If EXPERIMENT_ECDH_STIR_IN_PUBKEYS is set, the sum and product of | |||
* the two parties' public keys is prepended to the hash. | |||
* | |||
* In the current version, this function can safely be run even without | |||
* goldilocks_init(). But this property is not guaranteed for future | |||
* versions, so call it anyway. | |||
* | |||
* @warning This isn't even my final form! | |||
* | |||
* @param [out] shared The shared secret established with the other party. | |||
* @param [in] my_privkey My private key. | |||
* @param [in] your_pubkey The other party's precomputed public key. | |||
* | |||
* @retval GOLDI_EOK Success. | |||
* @retval GOLDI_ECORRUPT My key is corrupt. | |||
* @retval GOLDI_EINVAL The other party's key is corrupt. | |||
* @retval GOLDI_EUNINIT You must call goldilocks_init() first. | |||
*/ | |||
int | |||
goldilocks_shared_secret_precomputed ( | |||
uint8_t shared[GOLDI_SHARED_SECRET_BYTES], | |||
const struct goldilocks_private_key_t *my_privkey, | |||
const struct goldilocks_precomputed_public_key_t *your_pubkey | |||
) __attribute__((warn_unused_result,nonnull(1,2,3),visibility ("default"))); | |||
#endif /* GOLDI_IMPLEMENT_PRECOMPUTED_KEYS */ | |||
#ifdef __cplusplus | |||
}; /* extern "C" */ | |||
#endif | |||
#endif /* __GOLDILOCKS_H__ */ |
@@ -12,7 +12,8 @@ | |||
#include "ec_point.h" | |||
#include "magic.h" | |||
#define is32 (GOLDI_BITS == 32) | |||
#define is32 (GOLDI_BITS == 32 || FIELD_BITS == 480) | |||
/* TODO XXX PERF FIXME: better detection of overflow conditions */ | |||
/* I wanted to just use if (is32) | |||
* But clang's -Wunreachable-code flags it. | |||
@@ -52,60 +53,6 @@ field_mulw_scc_wr ( | |||
field_weak_reduce(out); | |||
} | |||
static __inline__ void | |||
field_sqrn ( | |||
field_t *__restrict__ y, | |||
const field_t *x, | |||
int n | |||
) { | |||
field_t tmp; | |||
assert(n>0); | |||
if (n&1) { | |||
field_sqr(y,x); | |||
n--; | |||
} else { | |||
field_sqr(&tmp,x); | |||
field_sqr(y,&tmp); | |||
n-=2; | |||
} | |||
for (; n; n-=2) { | |||
field_sqr(&tmp,y); | |||
field_sqr(y,&tmp); | |||
} | |||
} | |||
void | |||
field_isr ( /* TODO: MAGIC */ | |||
struct field_t* a, | |||
const struct field_t* x | |||
) { | |||
struct field_t L0, L1, L2; | |||
field_sqr ( &L1, x ); | |||
field_mul ( &L2, x, &L1 ); | |||
field_sqr ( &L1, &L2 ); | |||
field_mul ( &L2, x, &L1 ); | |||
field_sqrn ( &L1, &L2, 3 ); | |||
field_mul ( &L0, &L2, &L1 ); | |||
field_sqrn ( &L1, &L0, 3 ); | |||
field_mul ( &L0, &L2, &L1 ); | |||
field_sqrn ( &L2, &L0, 9 ); | |||
field_mul ( &L1, &L0, &L2 ); | |||
field_sqr ( &L0, &L1 ); | |||
field_mul ( &L2, x, &L0 ); | |||
field_sqrn ( &L0, &L2, 18 ); | |||
field_mul ( &L2, &L1, &L0 ); | |||
field_sqrn ( &L0, &L2, 37 ); | |||
field_mul ( &L1, &L2, &L0 ); | |||
field_sqrn ( &L0, &L1, 37 ); | |||
field_mul ( &L1, &L2, &L0 ); | |||
field_sqrn ( &L0, &L1, 111 ); | |||
field_mul ( &L2, &L1, &L0 ); | |||
field_sqr ( &L0, &L2 ); | |||
field_mul ( &L1, x, &L0 ); | |||
field_sqrn ( &L0, &L1, 223 ); | |||
field_mul ( a, &L2, &L0 ); | |||
} | |||
void | |||
add_tw_niels_to_tw_extensible ( | |||
struct tw_extensible_t* d, | |||
@@ -396,7 +343,7 @@ montgomery_step ( | |||
field_sqr ( &a->za, &a->zd ); | |||
field_sqr ( &a->xd, &L0 ); | |||
field_sqr ( &L0, &L1 ); | |||
field_mulw ( &a->zd, &a->xd, 1-EDWARDS_D ); | |||
field_mulw_scc ( &a->zd, &a->xd, 1-EDWARDS_D ); /* FIXME PERF MULW */ | |||
field_sub ( &L1, &a->xd, &L0 ); | |||
field_bias ( &L1, 2 ); | |||
IF32( field_weak_reduce( &L1 ) ); | |||
@@ -444,11 +391,9 @@ serialize_montgomery ( | |||
field_mul ( &L3, &L1, &L2 ); | |||
field_copy ( &L2, &a->z0 ); | |||
field_addw ( &L2, 1 ); | |||
field_sqr ( &L1, &L2 ); | |||
field_mulw ( &L2, &L1, 1-EDWARDS_D ); | |||
field_neg ( &L1, &L2 ); | |||
field_sqr ( &L0, &L2 ); | |||
field_mulw_scc_wr ( &L1, &L0, EDWARDS_D-1 ); | |||
field_add ( &L2, &a->z0, &a->z0 ); | |||
field_bias ( &L2, 1 ); | |||
field_add ( &L0, &L2, &L2 ); | |||
field_add ( &L2, &L0, &L1 ); | |||
IF32( field_weak_reduce( &L2 ) ); | |||
@@ -512,13 +457,9 @@ untwist_and_double_and_serialize ( | |||
IF32( field_weak_reduce( b ) ); | |||
field_sqr ( &L2, &a->z ); | |||
field_sqr ( &L1, &L2 ); | |||
field_add ( &L2, b, b ); | |||
field_mulw ( b, &L2, 1-EDWARDS_D ); | |||
field_neg ( &L2, b ); | |||
field_bias ( &L2, 2 ); | |||
field_mulw ( &L0, &L2, 1-EDWARDS_D ); | |||
field_neg ( b, &L0 ); | |||
field_bias ( b, 2 ); | |||
field_add ( b, b, b ); | |||
field_mulw_scc ( &L2, b, EDWARDS_D-1 ); | |||
field_mulw_scc ( b, &L2, EDWARDS_D-1 ); | |||
field_mul ( &L0, &L2, &L1 ); | |||
field_mul ( &L2, b, &L0 ); | |||
field_isr ( &L0, &L2 ); | |||
@@ -654,10 +595,8 @@ deserialize_affine ( | |||
field_copy ( &L3, &L1 ); | |||
field_addw ( &L3, 1 ); | |||
field_sqr ( &L2, &L3 ); | |||
field_mulw ( &L3, &L2, 1-EDWARDS_D ); | |||
field_neg ( &a->x, &L3 ); | |||
field_add ( &L3, &L1, &L1 ); | |||
field_bias ( &L3, 1 ); | |||
field_mulw_scc ( &a->x, &L2, EDWARDS_D-1 ); /* PERF MULW */ | |||
field_add ( &L3, &L1, &L1 ); /* FIXME: i adjusted the bias here, was it right? */ | |||
field_add ( &a->y, &L3, &L3 ); | |||
field_add ( &L3, &a->y, &a->x ); | |||
IF32( field_weak_reduce( &L3 ) ); | |||
@@ -694,11 +633,9 @@ deserialize_and_twist_approx ( | |||
field_sqr ( &a->z, sz ); | |||
field_copy ( &a->y, &a->z ); | |||
field_addw ( &a->y, 1 ); | |||
field_sqr ( &a->x, &a->y ); | |||
field_mulw ( &a->y, &a->x, 1-EDWARDS_D ); | |||
field_neg ( &a->x, &a->y ); | |||
field_sqr ( &L0, &a->y ); | |||
field_mulw_scc ( &a->x, &L0, EDWARDS_D-1 ); | |||
field_add ( &a->y, &a->z, &a->z ); | |||
field_bias ( &a->y, 1 ); | |||
field_add ( &a->u, &a->y, &a->y ); | |||
field_add ( &a->y, &a->u, &a->x ); | |||
IF32( field_weak_reduce( &a->y ) ); | |||
@@ -543,8 +543,6 @@ copy_tw_pniels ( | |||
field_copy ( &a->z, &ds->z ); | |||
} | |||
#ifdef __cplusplus | |||
}; /* extern "C" */ | |||
#endif | |||
@@ -1,40 +1,16 @@ | |||
/** | |||
* @file field.h | |||
* @brief Field switch code. | |||
* @brief Generic field header. | |||
* @copyright | |||
* Copyright (c) 2014 Cryptography Research, Inc. \n | |||
* Released under the MIT License. See LICENSE.txt for license information. | |||
* @author Mike Hamburg | |||
*/ | |||
#ifndef __FIELD_H__ | |||
#define __FIELD_H__ | |||
#include <string.h> | |||
#include "constant_time.h" | |||
#include "p448.h" | |||
#define FIELD_BITS 448 | |||
#define field_t p448_t | |||
#define field_mul p448_mul | |||
#define field_sqr p448_sqr | |||
#define field_add p448_add | |||
#define field_sub p448_sub | |||
#define field_mulw p448_mulw | |||
#define field_addw p448_addw | |||
#define field_subw p448_subw | |||
#define field_neg p448_neg | |||
#define field_set_ui p448_set_ui | |||
#define field_bias p448_bias | |||
#define field_cond_neg p448_cond_neg | |||
#define field_inverse p448_inverse | |||
#define field_eq p448_eq | |||
#define field_isr p448_isr | |||
#define field_simultaneous_invert p448_simultaneous_invert | |||
#define field_weak_reduce p448_weak_reduce | |||
#define field_strong_reduce p448_strong_reduce | |||
#define field_serialize p448_serialize | |||
#define field_deserialize p448_deserialize | |||
#define field_is_zero p448_is_zero | |||
#include "f_field.h" | |||
/** @brief Bytes in a field element */ | |||
#define FIELD_BYTES (1+(FIELD_BITS-1)/8) | |||
@@ -42,6 +18,22 @@ | |||
/** @brief Words in a field element */ | |||
#define FIELD_WORDS (1+(FIELD_BITS-1)/sizeof(word_t)) | |||
/* TODO: standardize notation */ | |||
/** @brief The number of words in the Goldilocks field. */ | |||
#define GOLDI_FIELD_WORDS DIV_CEIL(FIELD_BITS,WORD_BITS) | |||
/** @brief The number of bits in the Goldilocks curve's cofactor (cofactor=4). */ | |||
#define COFACTOR_BITS 2 | |||
/** @brief The number of bits in a Goldilocks scalar. */ | |||
#define SCALAR_BITS (FIELD_BITS - COFACTOR_BITS) | |||
/** @brief The number of bytes in a Goldilocks scalar. */ | |||
#define SCALAR_BYTES (1+(SCALAR_BITS)/8) | |||
/** @brief The number of words in the Goldilocks field. */ | |||
#define SCALAR_WORDS WORDS_FOR_BITS(SCALAR_BITS) | |||
/** | |||
* @brief For GMP tests: little-endian representation of the field modulus. | |||
*/ | |||
@@ -119,5 +111,31 @@ field_eq ( | |||
const struct field_t *a, | |||
const struct field_t *b | |||
); | |||
/** | |||
* Square x, n times. | |||
*/ | |||
static __inline__ void | |||
__attribute__((unused,always_inline)) | |||
field_sqrn ( | |||
field_t *__restrict__ y, | |||
const field_t *x, | |||
int n | |||
) { | |||
field_t tmp; | |||
assert(n>0); | |||
if (n&1) { | |||
field_sqr(y,x); | |||
n--; | |||
} else { | |||
field_sqr(&tmp,x); | |||
field_sqr(y,&tmp); | |||
n-=2; | |||
} | |||
for (; n; n-=2) { | |||
field_sqr(&tmp,y); | |||
field_sqr(y,&tmp); | |||
} | |||
} | |||
#endif /* __FIELD_H__ */ | |||
#endif // __FIELD_H__ |
@@ -4,16 +4,24 @@ | |||
* Copyright (c) 2014 Cryptography Research, Inc. \n | |||
* Released under the MIT License. See LICENSE.txt for license information. | |||
* @author Mike Hamburg | |||
* @brief Goldilocks magic numbers (group orders, coefficients, algo params etc). | |||
* @brief Curve-independent declarations of magic numbers. | |||
*/ | |||
#ifndef __GOLDI_MAGIC_H__ | |||
#define __GOLDI_MAGIC_H__ 1 | |||
#include "word.h" | |||
#include "p448.h" | |||
#include "ec_point.h" | |||
/** | |||
* @brief If true, use wider tables for the precomputed combs. | |||
*/ | |||
#ifndef USE_BIG_COMBS | |||
#if defined(__ARM_NEON__) | |||
#define USE_BIG_COMBS 1 | |||
#else | |||
#define USE_BIG_COMBS (WORD_BITS==64) | |||
#endif | |||
#endif | |||
/* TODO: standardize notation */ | |||
@@ -32,16 +40,13 @@ | |||
/** @brief The number of words in the Goldilocks field. */ | |||
#define SCALAR_WORDS WORDS_FOR_BITS(SCALAR_BITS) | |||
#include "f_magic.h" | |||
/** | |||
* @brief sqrt(d-1), used for point formats and twisting. | |||
*/ | |||
extern const struct field_t sqrt_d_minus_1; | |||
/** | |||
* @brief The Edwards "d" term for this curve. | |||
*/ | |||
static const int64_t EDWARDS_D = -39081; | |||
/** | |||
* @brief The base point for Goldilocks. | |||
*/ | |||
@@ -76,34 +81,10 @@ extern const word_t SCALARMUL_FIXED_WINDOW_ADJUSTMENT[2*SCALAR_WORDS]; | |||
*/ | |||
#define SCALARMUL_WNAF_COMBO_TABLE_BITS 4 | |||
/** | |||
* @brief If true, use wider tables for the precomputed combs. | |||
*/ | |||
#ifndef USE_BIG_COMBS | |||
#if defined(__ARM_NEON__) | |||
#define USE_BIG_COMBS 1 | |||
#else | |||
#define USE_BIG_COMBS (WORD_BITS==64) | |||
#endif | |||
#endif | |||
/** @brief The number of combs to use for signed comb algo */ | |||
#define COMB_N (USE_BIG_COMBS ? 5 : 8) | |||
/** @brief The number of teeth of the combs for signed comb algo */ | |||
#define COMB_T (USE_BIG_COMBS ? 5 : 4) | |||
/** @brief The spacing the of combs for signed comb algo */ | |||
#define COMB_S (USE_BIG_COMBS ? 18 : 14) | |||
/** | |||
* @brief The bit width of the precomputed WNAF tables. Size is 2^this elements. | |||
*/ | |||
#define WNAF_PRECMP_BITS 5 | |||
/** | |||
* @brief crandom magic structure guard constant = "return 4", cf xkcd #221 | |||
*/ | |||
#define CRANDOM_MAGIC 0x72657475726e2034ull | |||
#endif /* __GOLDI_MAGIC_H__ */ |
@@ -37,9 +37,12 @@ typedef int64_t sword_t; | |||
typedef __int128_t dsword_t; | |||
#define PRIxWORD PRIx64 | |||
#define PRIxWORDfull "%016" PRIx64 | |||
#define PRIxWORD58 "%014" PRIx64 | |||
#define PRIxWORD56 "%014" PRIx64 | |||
#define PRIxWORD60 "%015" PRIx60 | |||
#define U64LE(x) x##ull | |||
#define U58LE(x) x##ull | |||
#define U56LE(x) x##ull | |||
#define U60LE(x) x##ull | |||
#define letohWORD letoh64 | |||
#define GOLDI_BITS 64 | |||
#else | |||
@@ -51,9 +54,11 @@ typedef int32_t sword_t; | |||
typedef int64_t dsword_t; | |||
#define PRIxWORD PRIx32 | |||
#define PRIxWORDfull "%08" PRIx32 | |||
#define PRIxWORD58 "%07" PRIx32 | |||
#define PRIxWORD56 "%07" PRIx32 | |||
#define U64LE(x) (x##ull)&((1ull<<32)-1), (x##ull)>>32 | |||
#define U58LE(x) (x##ull)&((1ull<<28)-1), (x##ull)>>28 | |||
#define U58LE(x) (x##ull)&((1ull<<29)-1), (x##ull)>>29 | |||
#define U56LE(x) (x##ull)&((1ull<<28)-1), (x##ull)>>28 | |||
#define U60LE(x) (x##ull)&((1ull<<30)-1), (x##ull)>>30 | |||
#define letohWORD letoh32 | |||
#define GOLDI_BITS 32 | |||
#endif | |||
@@ -0,0 +1,43 @@ | |||
/** | |||
* @cond internal | |||
* @file f_arithmetic.c | |||
* @copyright | |||
* Copyright (c) 2014 Cryptography Research, Inc. \n | |||
* Released under the MIT License. See LICENSE.txt for license information. | |||
* @author Mike Hamburg | |||
* @brief Field-specific arithmetic. | |||
*/ | |||
#include "ec_point.h" | |||
void | |||
field_isr ( | |||
struct field_t* a, | |||
const struct field_t* x | |||
) { | |||
struct field_t L0, L1, L2; | |||
field_sqr ( &L1, x ); | |||
field_mul ( &L2, x, &L1 ); | |||
field_sqr ( &L1, &L2 ); | |||
field_mul ( &L2, x, &L1 ); | |||
field_sqrn ( &L1, &L2, 3 ); | |||
field_mul ( &L0, &L2, &L1 ); | |||
field_sqrn ( &L1, &L0, 3 ); | |||
field_mul ( &L0, &L2, &L1 ); | |||
field_sqrn ( &L2, &L0, 9 ); | |||
field_mul ( &L1, &L0, &L2 ); | |||
field_sqr ( &L0, &L1 ); | |||
field_mul ( &L2, x, &L0 ); | |||
field_sqrn ( &L0, &L2, 18 ); | |||
field_mul ( &L2, &L1, &L0 ); | |||
field_sqrn ( &L0, &L2, 37 ); | |||
field_mul ( &L1, &L2, &L0 ); | |||
field_sqrn ( &L0, &L1, 37 ); | |||
field_mul ( &L1, &L2, &L0 ); | |||
field_sqrn ( &L0, &L1, 111 ); | |||
field_mul ( &L2, &L1, &L0 ); | |||
field_sqr ( &L0, &L2 ); | |||
field_mul ( &L1, x, &L0 ); | |||
field_sqrn ( &L0, &L1, 223 ); | |||
field_mul ( a, &L2, &L0 ); | |||
} |
@@ -0,0 +1,39 @@ | |||
/** | |||
* @file f_field.h | |||
* @brief Field-specific code. | |||
* @copyright | |||
* Copyright (c) 2014 Cryptography Research, Inc. \n | |||
* Released under the MIT License. See LICENSE.txt for license information. | |||
* @author Mike Hamburg | |||
*/ | |||
#ifndef __F_FIELD_H__ | |||
#define __F_FIELD_H__ 1 | |||
#include <string.h> | |||
#include "constant_time.h" | |||
#include "p448.h" | |||
#define FIELD_BITS 448 | |||
#define field_t p448_t | |||
#define field_mul p448_mul | |||
#define field_sqr p448_sqr | |||
#define field_add p448_add | |||
#define field_sub p448_sub | |||
#define field_mulw p448_mulw | |||
#define field_addw p448_addw | |||
#define field_subw p448_subw | |||
#define field_neg p448_neg | |||
#define field_set_ui p448_set_ui | |||
#define field_bias p448_bias | |||
#define field_cond_neg p448_cond_neg | |||
#define field_inverse p448_inverse | |||
#define field_eq p448_eq | |||
#define field_isr p448_isr | |||
#define field_simultaneous_invert p448_simultaneous_invert | |||
#define field_weak_reduce p448_weak_reduce | |||
#define field_strong_reduce p448_strong_reduce | |||
#define field_serialize p448_serialize | |||
#define field_deserialize p448_deserialize | |||
#define field_is_zero p448_is_zero | |||
#endif /* __F_FIELD_H__ */ |
@@ -0,0 +1,35 @@ | |||
/** | |||
* @file f_magic.h | |||
* @copyright | |||
* Copyright (c) 2014 Cryptography Research, Inc. \n | |||
* Released under the MIT License. See LICENSE.txt for license information. | |||
* @author Mike Hamburg | |||
* @brief Goldilocks magic numbers (group orders, coefficients, algo params etc). | |||
*/ | |||
#ifndef __GOLDI_F_MAGIC_H__ | |||
#define __GOLDI_F_MAGIC_H__ 1 | |||
#include "field.h" | |||
#include "ec_point.h" | |||
/** | |||
* @brief The Edwards "d" term for this curve. | |||
*/ | |||
static const int64_t EDWARDS_D = -39081; | |||
/** @brief The number of combs to use for signed comb algo */ | |||
#define COMB_N (USE_BIG_COMBS ? 5 : 8) | |||
/** @brief The number of teeth of the combs for signed comb algo */ | |||
#define COMB_T (USE_BIG_COMBS ? 5 : 4) | |||
/** @brief The spacing the of combs for signed comb algo */ | |||
#define COMB_S (USE_BIG_COMBS ? 18 : 14) | |||
/** | |||
* @brief crandom magic structure guard constant = "return 4", cf xkcd #221 | |||
*/ | |||
#define CRANDOM_MAGIC 0x72657475726e2034ull | |||
#endif /* __GOLDI_F_MAGIC_H__ */ |
@@ -0,0 +1,123 @@ | |||
/** | |||
* @file field.h | |||
* @brief Field switch code. | |||
* @copyright | |||
* Copyright (c) 2014 Cryptography Research, Inc. \n | |||
* Released under the MIT License. See LICENSE.txt for license information. | |||
* @author Mike Hamburg | |||
*/ | |||
#ifndef __FIELD_H__ | |||
#define __FIELD_H__ | |||
#include <string.h> | |||
#include "constant_time.h" | |||
#include "p448.h" | |||
#define FIELD_BITS 448 | |||
#define field_t p448_t | |||
#define field_mul p448_mul | |||
#define field_sqr p448_sqr | |||
#define field_add p448_add | |||
#define field_sub p448_sub | |||
#define field_mulw p448_mulw | |||
#define field_addw p448_addw | |||
#define field_subw p448_subw | |||
#define field_neg p448_neg | |||
#define field_set_ui p448_set_ui | |||
#define field_bias p448_bias | |||
#define field_cond_neg p448_cond_neg | |||
#define field_inverse p448_inverse | |||
#define field_eq p448_eq | |||
#define field_isr p448_isr | |||
#define field_simultaneous_invert p448_simultaneous_invert | |||
#define field_weak_reduce p448_weak_reduce | |||
#define field_strong_reduce p448_strong_reduce | |||
#define field_serialize p448_serialize | |||
#define field_deserialize p448_deserialize | |||
#define field_is_zero p448_is_zero | |||
/** @brief Bytes in a field element */ | |||
#define FIELD_BYTES (1+(FIELD_BITS-1)/8) | |||
/** @brief Words in a field element */ | |||
#define FIELD_WORDS (1+(FIELD_BITS-1)/sizeof(word_t)) | |||
/** | |||
* @brief For GMP tests: little-endian representation of the field modulus. | |||
*/ | |||
extern const uint8_t FIELD_MODULUS[FIELD_BYTES]; | |||
/** | |||
* Copy one field element to another. | |||
*/ | |||
static inline void | |||
__attribute__((unused,always_inline)) | |||
field_copy ( | |||
struct field_t *__restrict__ a, | |||
const struct field_t *__restrict__ b | |||
) { | |||
memcpy(a,b,sizeof(*a)); | |||
} | |||
/** | |||
* Negate a in place if doNegate. | |||
*/ | |||
static inline void | |||
__attribute__((unused,always_inline)) | |||
field_cond_neg( | |||
field_t *a, | |||
mask_t doNegate | |||
) { | |||
struct field_t negated; | |||
field_neg(&negated, a); | |||
field_bias(&negated, 2); | |||
constant_time_select(a, &negated, a, sizeof(negated), doNegate); | |||
} | |||
/** | |||
* Returns 1/sqrt(+- x). | |||
* | |||
* The Legendre symbol of the result is the same as that of the | |||
* input. | |||
* | |||
* If x=0, returns 0. | |||
*/ | |||
void | |||
field_isr ( | |||
struct field_t* a, | |||
const struct field_t* x | |||
); | |||
/** | |||
* Batch inverts out[i] = 1/in[i] | |||
* | |||
* If any input is zero, all the outputs will be zero. | |||
*/ | |||
void | |||
field_simultaneous_invert ( | |||
struct field_t *__restrict__ out, | |||
const struct field_t *in, | |||
unsigned int n | |||
); | |||
/** | |||
* Returns 1/x. | |||
* | |||
* If x=0, returns 0. | |||
*/ | |||
void | |||
field_inverse ( | |||
struct field_t* a, | |||
const struct field_t* x | |||
); | |||
/** | |||
* Returns -1 if a==b, 0 otherwise. | |||
*/ | |||
mask_t | |||
field_eq ( | |||
const struct field_t *a, | |||
const struct field_t *b | |||
); | |||
#endif /* __FIELD_H__ */ |
@@ -39,10 +39,10 @@ const struct affine_t goldilocks_base_point = { | |||
0x4c63d96,0x4609845,0xf3932d9,0x1b4faff, 0x6147eaa,0xa2692ff,0x9cecfa9,0x297ea0e | |||
}}, | |||
#else | |||
{{ U58LE(0xf0de840aed939f), U58LE(0xc170033f4ba0c7), | |||
U58LE(0xf3932d94c63d96), U58LE(0x9cecfa96147eaa), | |||
U58LE(0x5f065c3c59d070), U58LE(0x3a6a26adf73324), | |||
U58LE(0x1b4faff4609845), U58LE(0x297ea0ea2692ff) | |||
{{ U56LE(0xf0de840aed939f), U56LE(0xc170033f4ba0c7), | |||
U56LE(0xf3932d94c63d96), U56LE(0x9cecfa96147eaa), | |||
U56LE(0x5f065c3c59d070), U56LE(0x3a6a26adf73324), | |||
U56LE(0x1b4faff4609845), U56LE(0x297ea0ea2692ff) | |||
}}, | |||
#endif | |||
{{ 19 }} | |||
@@ -69,13 +69,13 @@ sqrt_d_minus_1 = {{ | |||
0xbdeea38,0x748734a,0x5a189aa,0x49443b8, | |||
0x6f14c06,0x0b25b7a,0x51e65ca,0x12fec0c | |||
#else | |||
U58LE(0xd2e21836749f46), | |||
U58LE(0x888db42b4f0179), | |||
U58LE(0x5a189aabdeea38), | |||
U58LE(0x51e65ca6f14c06), | |||
U58LE(0xa49f7b424d9770), | |||
U58LE(0xdcac4628c5f656), | |||
U58LE(0x49443b8748734a), | |||
U58LE(0x12fec0c0b25b7a) | |||
U56LE(0xd2e21836749f46), | |||
U56LE(0x888db42b4f0179), | |||
U56LE(0x5a189aabdeea38), | |||
U56LE(0x51e65ca6f14c06), | |||
U56LE(0xa49f7b424d9770), | |||
U56LE(0xdcac4628c5f656), | |||
U56LE(0x49443b8748734a), | |||
U56LE(0x12fec0c0b25b7a) | |||
#endif | |||
}}; |
@@ -0,0 +1 @@ | |||
#define WORD_BITS 64 |
@@ -0,0 +1,435 @@ | |||
/* Copyright (c) 2014 Cryptography Research, Inc. | |||
* Released under the MIT License. See LICENSE.txt for license information. | |||
*/ | |||
#include "p480.h" | |||
#include "x86-64-arith.h" | |||
void | |||
p480_mul ( | |||
p480_t *__restrict__ cs, | |||
const p480_t *as, | |||
const p480_t *bs | |||
) { | |||
const uint64_t *a = as->limb, *b = bs->limb; | |||
uint64_t *c = cs->limb; | |||
__uint128_t accum0 = 0, accum1 = 0, accum2; | |||
uint64_t mask = (1ull<<60) - 1; | |||
uint64_t aa[4] __attribute__((aligned(32))), bb[4] __attribute__((aligned(32))), bbb[4] __attribute__((aligned(32))); | |||
/* For some reason clang doesn't vectorize this without prompting? */ | |||
unsigned int i; | |||
for (i=0; i<sizeof(aa)/sizeof(uint64xn_t); i++) { | |||
((uint64xn_t*)aa)[i] = ((const uint64xn_t*)a)[i] + ((const uint64xn_t*)(&a[4]))[i]; | |||
((uint64xn_t*)bb)[i] = ((const uint64xn_t*)b)[i] + ((const uint64xn_t*)(&b[4]))[i]; | |||
((uint64xn_t*)bbb)[i] = ((const uint64xn_t*)bb)[i] + ((const uint64xn_t*)(&b[4]))[i]; | |||
} | |||
/* | |||
for (int i=0; i<4; i++) { | |||
aa[i] = a[i] + a[i+4]; | |||
bb[i] = b[i] + b[i+4]; | |||
} | |||
*/ | |||
accum2 = widemul(&a[0],&b[3]); | |||
accum0 = widemul(&aa[0],&bb[3]); | |||
accum1 = widemul(&a[4],&b[7]); | |||
mac(&accum2, &a[1], &b[2]); | |||
mac(&accum0, &aa[1], &bb[2]); | |||
mac(&accum1, &a[5], &b[6]); | |||
mac(&accum2, &a[2], &b[1]); | |||
mac(&accum0, &aa[2], &bb[1]); | |||
mac(&accum1, &a[6], &b[5]); | |||
mac(&accum2, &a[3], &b[0]); | |||
mac(&accum0, &aa[3], &bb[0]); | |||
mac(&accum1, &a[7], &b[4]); | |||
accum0 -= accum2; | |||
accum1 += accum2; | |||
c[3] = ((uint64_t)(accum1)) & mask; | |||
c[7] = ((uint64_t)(accum0)) & mask; | |||
accum0 >>= 60; | |||
accum1 >>= 60; | |||
mac(&accum0, &aa[1],&bb[3]); | |||
mac(&accum1, &a[5], &b[7]); | |||
mac(&accum0, &aa[2], &bb[2]); | |||
mac(&accum1, &a[6], &b[6]); | |||
mac(&accum0, &aa[3], &bb[1]); | |||
accum1 += accum0; | |||
accum2 = widemul(&a[0],&b[0]); | |||
accum1 -= accum2; | |||
accum0 += accum2; | |||
msb(&accum0, &a[1], &b[3]); | |||
msb(&accum0, &a[2], &b[2]); | |||
mac(&accum1, &a[7], &b[5]); | |||
msb(&accum0, &a[3], &b[1]); | |||
mac(&accum1, &aa[0], &bb[0]); | |||
mac(&accum0, &a[4], &b[4]); | |||
c[0] = ((uint64_t)(accum0)) & mask; | |||
c[4] = ((uint64_t)(accum1)) & mask; | |||
accum0 >>= 60; | |||
accum1 >>= 60; | |||
accum2 = widemul(&a[2],&b[7]); | |||
mac(&accum0, &a[6], &bb[3]); | |||
mac(&accum1, &aa[2], &bbb[3]); | |||
mac(&accum2, &a[3], &b[6]); | |||
mac(&accum0, &a[7], &bb[2]); | |||
mac(&accum1, &aa[3], &bbb[2]); | |||
mac(&accum2, &a[0],&b[1]); | |||
mac(&accum1, &aa[0], &bb[1]); | |||
mac(&accum0, &a[4], &b[5]); | |||
mac(&accum2, &a[1], &b[0]); | |||
mac(&accum1, &aa[1], &bb[0]); | |||
mac(&accum0, &a[5], &b[4]); | |||
accum1 -= accum2; | |||
accum0 += accum2; | |||
c[1] = ((uint64_t)(accum0)) & mask; | |||
c[5] = ((uint64_t)(accum1)) & mask; | |||
accum0 >>= 60; | |||
accum1 >>= 60; | |||
accum2 = widemul(&a[3],&b[7]); | |||
mac(&accum0, &a[7], &bb[3]); | |||
mac(&accum1, &aa[3], &bbb[3]); | |||
mac(&accum2, &a[0],&b[2]); | |||
mac(&accum1, &aa[0], &bb[2]); | |||
mac(&accum0, &a[4], &b[6]); | |||
mac(&accum2, &a[1], &b[1]); | |||
mac(&accum1, &aa[1], &bb[1]); | |||
mac(&accum0, &a[5], &b[5]); | |||
mac(&accum2, &a[2], &b[0]); | |||
mac(&accum1, &aa[2], &bb[0]); | |||
mac(&accum0, &a[6], &b[4]); | |||
accum1 -= accum2; | |||
accum0 += accum2; | |||
c[2] = ((uint64_t)(accum0)) & mask; | |||
c[6] = ((uint64_t)(accum1)) & mask; | |||
accum0 >>= 60; | |||
accum1 >>= 60; | |||
accum0 += c[3]; | |||
accum1 += c[7]; | |||
c[3] = ((uint64_t)(accum0)) & mask; | |||
c[7] = ((uint64_t)(accum1)) & mask; | |||
/* we could almost stop here, but it wouldn't be stable, so... */ | |||
accum0 >>= 60; | |||
accum1 >>= 60; | |||
c[4] += ((uint64_t)(accum0)) + ((uint64_t)(accum1)); | |||
c[0] += ((uint64_t)(accum1)); | |||
} | |||
void | |||
p480_mulw ( | |||
p480_t *__restrict__ cs, | |||
const p480_t *as, | |||
uint64_t b | |||
) { | |||
const uint64_t *a = as->limb; | |||
uint64_t *c = cs->limb; | |||
__uint128_t accum0, accum4; | |||
uint64_t mask = (1ull<<60) - 1; | |||
accum0 = widemul_rm(b, &a[0]); | |||
accum4 = widemul_rm(b, &a[4]); | |||
c[0] = accum0 & mask; accum0 >>= 60; | |||
c[4] = accum4 & mask; accum4 >>= 60; | |||
mac_rm(&accum0, b, &a[1]); | |||
mac_rm(&accum4, b, &a[5]); | |||
c[1] = accum0 & mask; accum0 >>= 60; | |||
c[5] = accum4 & mask; accum4 >>= 60; | |||
mac_rm(&accum0, b, &a[2]); | |||
mac_rm(&accum4, b, &a[6]); | |||
c[2] = accum0 & mask; accum0 >>= 60; | |||
c[6] = accum4 & mask; accum4 >>= 60; | |||
mac_rm(&accum0, b, &a[3]); | |||
mac_rm(&accum4, b, &a[7]); | |||
c[3] = accum0 & mask; accum0 >>= 60; | |||
c[7] = accum4 & mask; accum4 >>= 60; | |||
accum0 += accum4 + c[4]; | |||
c[4] = accum0 & mask; | |||
c[5] += accum0 >> 60; | |||
accum4 += c[0]; | |||
c[0] = accum4 & mask; | |||
c[1] += accum4 >> 60; | |||
} | |||
void | |||
p480_sqr ( | |||
p480_t *__restrict__ cs, | |||
const p480_t *as | |||
) { | |||
const uint64_t *a = as->limb; | |||
uint64_t *c = cs->limb; | |||
__uint128_t accum0 = 0, accum1 = 0, accum2; | |||
uint64_t mask = (1ull<<60) - 1; | |||
uint64_t aa[4] __attribute__((aligned(32))); | |||
/* For some reason clang doesn't vectorize this without prompting? */ | |||
unsigned int i; | |||
for (i=0; i<sizeof(aa)/sizeof(uint64xn_t); i++) { | |||
((uint64xn_t*)aa)[i] = ((const uint64xn_t*)a)[i] + ((const uint64xn_t*)(&a[4]))[i]; | |||
} | |||
accum2 = widemul(&a[0],&a[3]); | |||
accum0 = widemul(&aa[0],&aa[3]); | |||
accum1 = widemul(&a[4],&a[7]); | |||
mac(&accum2, &a[1], &a[2]); | |||
mac(&accum0, &aa[1], &aa[2]); | |||
mac(&accum1, &a[5], &a[6]); | |||
accum0 -= accum2; | |||
accum1 += accum2; | |||
c[3] = ((uint64_t)(accum1))<<1 & mask; | |||
c[7] = ((uint64_t)(accum0))<<1 & mask; | |||
accum0 >>= 59; | |||
accum1 >>= 59; | |||
mac2(&accum0, &aa[1],&aa[3]); | |||
mac2(&accum1, &a[5], &a[7]); | |||
mac(&accum0, &aa[2], &aa[2]); | |||
accum1 += accum0; | |||
msb2(&accum0, &a[1], &a[3]); | |||
mac(&accum1, &a[6], &a[6]); | |||
accum2 = widemul(&a[0],&a[0]); | |||
accum1 -= accum2; | |||
accum0 += accum2; | |||
msb(&accum0, &a[2], &a[2]); | |||
mac(&accum1, &aa[0], &aa[0]); | |||
mac(&accum0, &a[4], &a[4]); | |||
c[0] = ((uint64_t)(accum0)) & mask; | |||
c[4] = ((uint64_t)(accum1)) & mask; | |||
accum0 >>= 60; | |||
accum1 >>= 60; | |||
accum2 = widemul2(&aa[2],&aa[3]); | |||
msb2(&accum0, &a[2], &a[3]); | |||
mac2(&accum1, &a[6], &a[7]); | |||
accum1 += accum2; | |||
accum0 += accum2; | |||
accum2 = widemul2(&a[0],&a[1]); | |||
mac2(&accum1, &aa[0], &aa[1]); | |||
mac2(&accum0, &a[4], &a[5]); | |||
accum1 -= accum2; | |||
accum0 += accum2; | |||
c[1] = ((uint64_t)(accum0)) & mask; | |||
c[5] = ((uint64_t)(accum1)) & mask; | |||
accum0 >>= 60; | |||
accum1 >>= 60; | |||
accum2 = widemul(&aa[3],&aa[3]); | |||
msb(&accum0, &a[3], &a[3]); | |||
mac(&accum1, &a[7], &a[7]); | |||
accum1 += accum2; | |||
accum0 += accum2; | |||
accum2 = widemul2(&a[0],&a[2]); | |||
mac2(&accum1, &aa[0], &aa[2]); | |||
mac2(&accum0, &a[4], &a[6]); | |||
mac(&accum2, &a[1], &a[1]); | |||
mac(&accum1, &aa[1], &aa[1]); | |||
mac(&accum0, &a[5], &a[5]); | |||
accum1 -= accum2; | |||
accum0 += accum2; | |||
c[2] = ((uint64_t)(accum0)) & mask; | |||
c[6] = ((uint64_t)(accum1)) & mask; | |||
accum0 >>= 60; | |||
accum1 >>= 60; | |||
accum0 += c[3]; | |||
accum1 += c[7]; | |||
c[3] = ((uint64_t)(accum0)) & mask; | |||
c[7] = ((uint64_t)(accum1)) & mask; | |||
/* we could almost stop here, but it wouldn't be stable, so... */ | |||
accum0 >>= 60; | |||
accum1 >>= 60; | |||
c[4] += ((uint64_t)(accum0)) + ((uint64_t)(accum1)); | |||
c[0] += ((uint64_t)(accum1)); | |||
} | |||
void | |||
p480_strong_reduce ( | |||
p480_t *a | |||
) { | |||
uint64_t mask = (1ull<<60)-1; | |||
/* first, clear high */ | |||
a->limb[4] += a->limb[7]>>60; | |||
a->limb[0] += a->limb[7]>>60; | |||
a->limb[7] &= mask; | |||
/* now the total is less than 2^480 - 2^(480-60) + 2^(480-60+8) < 2p */ | |||
/* compute total_value - p. No need to reduce mod p. */ | |||
__int128_t scarry = 0; | |||
int i; | |||
for (i=0; i<8; i++) { | |||
scarry = scarry + a->limb[i] - ((i==4)?mask-1:mask); | |||
a->limb[i] = scarry & mask; | |||
scarry >>= 60; | |||
} | |||
/* uncommon case: it was >= p, so now scarry = 0 and this = x | |||
* common case: it was < p, so now scarry = -1 and this = x - p + 2^480 | |||
* so let's add back in p. will carry back off the top for 2^480. | |||
*/ | |||
assert(is_zero(scarry) | is_zero(scarry+1)); | |||
uint64_t scarry_mask = scarry & mask; | |||
__uint128_t carry = 0; | |||
/* add it back */ | |||
for (i=0; i<8; i++) { | |||
carry = carry + a->limb[i] + ((i==4)?(scarry_mask&~1):scarry_mask); | |||
a->limb[i] = carry & mask; | |||
carry >>= 60; | |||
} | |||
assert(is_zero(carry + scarry)); | |||
} | |||
mask_t | |||
p480_is_zero ( | |||
const struct p480_t *a | |||
) { | |||
struct p480_t b; | |||
p480_copy(&b,a); | |||
p480_strong_reduce(&b); | |||
uint64_t any = 0; | |||
int i; | |||
for (i=0; i<8; i++) { | |||
any |= b.limb[i]; | |||
} | |||
return is_zero(any); | |||
} | |||
void | |||
p480_serialize ( | |||
uint8_t *serial, | |||
const struct p480_t *x | |||
) { | |||
int i,j,k=0; | |||
p480_t red; | |||
p480_copy(&red, x); | |||
p480_strong_reduce(&red); | |||
word_t r = 0; | |||
for (i=0; i<8; i+=2) { | |||
r = red.limb[i]; | |||
for (j=0; j<7; j++) { | |||
serial[k++] = r; | |||
r >>= 8; | |||
} | |||
assert(r<16); | |||
r += red.limb[i+1]<<4; | |||
for (j=0; j<8; j++) { | |||
serial[k++] = r; | |||
r >>= 8; | |||
} | |||
assert(r==0); | |||
} | |||
} | |||
mask_t | |||
p480_deserialize ( | |||
p480_t *x, | |||
const uint8_t serial[60] | |||
) { | |||
int i,j,k=0; | |||
for (i=0; i<8; i+=2) { | |||
word_t r = 0; | |||
for (j=0; j<8; j++) { | |||
r |= ((word_t)serial[k++])<<(8*j); | |||
} | |||
x->limb[i] = r & ((1ull<<60)-1); | |||
r >>= 60; | |||
for (j=0; j<7; j++) { | |||
r |= ((word_t)serial[k++])<<(8*j+4); | |||
} | |||
x->limb[i+1] = r; | |||
} | |||
/* Check for reduction. | |||
* | |||
* The idea is to create a variable ge which is all ones (rather, 60 ones) | |||
* if and only if the low $i$ words of $x$ are >= those of p. | |||
* | |||
* Remember p = little_endian(1111,1111,1111,1111,1110,1111,1111,1111) | |||
*/ | |||
word_t ge = -1, mask = (1ull<<60)-1; | |||
for (i=0; i<4; i++) { | |||
ge &= x->limb[i]; | |||
} | |||
/* At this point, ge = 1111 iff bottom are all 1111. Now propagate if 1110, or set if 1111 */ | |||
ge = (ge & (x->limb[4] + 1)) | is_zero(x->limb[4] ^ mask); | |||
/* Propagate the rest */ | |||
for (i=5; i<8; i++) { | |||
ge &= x->limb[i]; | |||
} | |||
return ~is_zero(ge ^ mask); | |||
} | |||
@@ -0,0 +1,257 @@ | |||
/* Copyright (c) 2014 Cryptography Research, Inc. | |||
* Released under the MIT License. See LICENSE.txt for license information. | |||
*/ | |||
#ifndef __p480_H__ | |||
#define __p480_H__ 1 | |||
#include <stdint.h> | |||
#include <assert.h> | |||
#include "word.h" | |||
typedef struct p480_t { | |||
uint64_t limb[8]; | |||
} __attribute__((aligned(32))) p480_t; | |||
#ifdef __cplusplus | |||
extern "C" { | |||
#endif | |||
static __inline__ void | |||
p480_set_ui ( | |||
p480_t *out, | |||
uint64_t x | |||
) __attribute__((unused,always_inline)); | |||
static __inline__ void | |||
p480_add ( | |||
p480_t *out, | |||
const p480_t *a, | |||
const p480_t *b | |||
) __attribute__((unused,always_inline)); | |||
static __inline__ void | |||
p480_sub ( | |||
p480_t *out, | |||
const p480_t *a, | |||
const p480_t *b | |||
) __attribute__((unused,always_inline)); | |||
static __inline__ void | |||
p480_neg ( | |||
p480_t *out, | |||
const p480_t *a | |||
) __attribute__((unused,always_inline)); | |||
static __inline__ void | |||
p480_addw ( | |||
p480_t *a, | |||
uint64_t x | |||
) __attribute__((unused,always_inline)); | |||
static __inline__ void | |||
p480_subw ( | |||
p480_t *a, | |||
uint64_t x | |||
) __attribute__((unused,always_inline)); | |||
static __inline__ void | |||
p480_copy ( | |||
p480_t *out, | |||
const p480_t *a | |||
) __attribute__((unused,always_inline)); | |||
static __inline__ void | |||
p480_weak_reduce ( | |||
p480_t *inout | |||
) __attribute__((unused,always_inline)); | |||
void | |||
p480_strong_reduce ( | |||
p480_t *inout | |||
); | |||
mask_t | |||
p480_is_zero ( | |||
const p480_t *in | |||
); | |||
static __inline__ void | |||
p480_bias ( | |||
p480_t *inout, | |||
int amount | |||
) __attribute__((unused,always_inline)); | |||
void | |||
p480_mul ( | |||
p480_t *__restrict__ out, | |||
const p480_t *a, | |||
const p480_t *b | |||
); | |||
void | |||
p480_mulw ( | |||
p480_t *__restrict__ out, | |||
const p480_t *a, | |||
uint64_t b | |||
); | |||
void | |||
p480_sqr ( | |||
p480_t *__restrict__ out, | |||
const p480_t *a | |||
); | |||
void | |||
p480_serialize ( | |||
uint8_t *serial, | |||
const struct p480_t *x | |||
); | |||
mask_t | |||
p480_deserialize ( | |||
p480_t *x, | |||
const uint8_t serial[60] | |||
); | |||
/* -------------- Inline functions begin here -------------- */ | |||
void | |||
p480_set_ui ( | |||
p480_t *out, | |||
uint64_t x | |||
) { | |||
int i; | |||
out->limb[0] = x; | |||
for (i=1; i<8; i++) { | |||
out->limb[i] = 0; | |||
} | |||
} | |||
void | |||
p480_add ( | |||
p480_t *out, | |||
const p480_t *a, | |||
const p480_t *b | |||
) { | |||
unsigned int i; | |||
for (i=0; i<sizeof(*out)/sizeof(uint64xn_t); i++) { | |||
((uint64xn_t*)out)[i] = ((const uint64xn_t*)a)[i] + ((const uint64xn_t*)b)[i]; | |||
} | |||
/* | |||
unsigned int i; | |||
for (i=0; i<sizeof(*out)/sizeof(out->limb[0]); i++) { | |||
out->limb[i] = a->limb[i] + b->limb[i]; | |||
} | |||
*/ | |||
} | |||
void | |||
p480_sub ( | |||
p480_t *out, | |||
const p480_t *a, | |||
const p480_t *b | |||
) { | |||
unsigned int i; | |||
for (i=0; i<sizeof(*out)/sizeof(uint64xn_t); i++) { | |||
((uint64xn_t*)out)[i] = ((const uint64xn_t*)a)[i] - ((const uint64xn_t*)b)[i]; | |||
} | |||
/* | |||
unsigned int i; | |||
for (i=0; i<sizeof(*out)/sizeof(out->limb[0]); i++) { | |||
out->limb[i] = a->limb[i] - b->limb[i]; | |||
} | |||
*/ | |||
} | |||
void | |||
p480_neg ( | |||
struct p480_t *out, | |||
const p480_t *a | |||
) { | |||
unsigned int i; | |||
for (i=0; i<sizeof(*out)/sizeof(uint64xn_t); i++) { | |||
((uint64xn_t*)out)[i] = -((const uint64xn_t*)a)[i]; | |||
} | |||
/* | |||
unsigned int i; | |||
for (i=0; i<sizeof(*out)/sizeof(out->limb[0]); i++) { | |||
out->limb[i] = -a->limb[i]; | |||
} | |||
*/ | |||
} | |||
void | |||
p480_addw ( | |||
p480_t *a, | |||
uint64_t x | |||
) { | |||
a->limb[0] += x; | |||
} | |||
void | |||
p480_subw ( | |||
p480_t *a, | |||
uint64_t x | |||
) { | |||
a->limb[0] -= x; | |||
} | |||
void | |||
p480_copy ( | |||
p480_t *out, | |||
const p480_t *a | |||
) { | |||
unsigned int i; | |||
for (i=0; i<sizeof(*out)/sizeof(big_register_t); i++) { | |||
((big_register_t *)out)[i] = ((const big_register_t *)a)[i]; | |||
} | |||
} | |||
void | |||
p480_bias ( | |||
p480_t *a, | |||
int amt | |||
) { | |||
uint64_t co1 = ((1ull<<60)-1)*amt, co2 = co1-amt; | |||
#if __AVX2__ | |||
uint64x4_t lo = {co1,co1,co1,co1}, hi = {co2,co1,co1,co1}; | |||
uint64x4_t *aa = (uint64x4_t*) a; | |||
aa[0] += lo; | |||
aa[1] += hi; | |||
#elif __SSE2__ | |||
uint64x2_t lo = {co1,co1}, hi = {co2,co1}; | |||
uint64x2_t *aa = (uint64x2_t*) a; | |||
aa[0] += lo; | |||
aa[1] += lo; | |||
aa[2] += hi; | |||
aa[3] += lo; | |||
#else | |||
unsigned int i; | |||
for (i=0; i<sizeof(*a)/sizeof(uint64_t); i++) { | |||
a->limb[i] += (i==4) ? co2 : co1; | |||
} | |||
#endif | |||
} | |||
void | |||
p480_weak_reduce ( | |||
p480_t *a | |||
) { | |||
/* PERF: use pshufb/palignr if anyone cares about speed of this */ | |||
uint64_t mask = (1ull<<60) - 1; | |||
uint64_t tmp = a->limb[7] >> 60; | |||
int i; | |||
a->limb[4] += tmp; | |||
for (i=7; i>0; i--) { | |||
a->limb[i] = (a->limb[i] & mask) + (a->limb[i-1]>>60); | |||
} | |||
a->limb[0] = (a->limb[0] & mask) + tmp; | |||
} | |||
#ifdef __cplusplus | |||
}; /* extern "C" */ | |||
#endif | |||
#endif /* __p480_H__ */ |
@@ -0,0 +1,279 @@ | |||
/* Copyright (c) 2014 Cryptography Research, Inc. | |||
* Released under the MIT License. See LICENSE.txt for license information. | |||
*/ | |||
#ifndef __X86_64_ARITH_H__ | |||
#define __X86_64_ARITH_H__ | |||
#include <stdint.h> | |||
/* TODO: non x86-64 versions of these. | |||
* FUTURE: autogenerate | |||
*/ | |||
static __inline__ __uint128_t widemul(const uint64_t *a, const uint64_t *b) { | |||
#ifndef __BMI2__ | |||
uint64_t c,d; | |||
__asm__ volatile | |||
("movq %[a], %%rax;" | |||
"mulq %[b];" | |||
: [c]"=a"(c), [d]"=d"(d) | |||
: [b]"m"(*b), [a]"m"(*a) | |||
: "cc"); | |||
return (((__uint128_t)(d))<<64) | c; | |||
#else | |||
uint64_t c,d; | |||
__asm__ volatile | |||
("movq %[a], %%rdx;" | |||
"mulx %[b], %[c], %[d];" | |||
: [c]"=r"(c), [d]"=r"(d) | |||
: [b]"m"(*b), [a]"m"(*a) | |||
: "rdx"); | |||
return (((__uint128_t)(d))<<64) | c; | |||
#endif | |||
} | |||
static __inline__ __uint128_t widemul_rm(uint64_t a, const uint64_t *b) { | |||
#ifndef __BMI2__ | |||
uint64_t c,d; | |||
__asm__ volatile | |||
("movq %[a], %%rax;" | |||
"mulq %[b];" | |||
: [c]"=a"(c), [d]"=d"(d) | |||
: [b]"m"(*b), [a]"r"(a) | |||
: "cc"); | |||
return (((__uint128_t)(d))<<64) | c; | |||
#else | |||
uint64_t c,d; | |||
__asm__ volatile | |||
("mulx %[b], %[c], %[d];" | |||
: [c]"=r"(c), [d]"=r"(d) | |||
: [b]"m"(*b), [a]"d"(a)); | |||
return (((__uint128_t)(d))<<64) | c; | |||
#endif | |||
} | |||
static __inline__ __uint128_t widemul2(const uint64_t *a, const uint64_t *b) { | |||
#ifndef __BMI2__ | |||
uint64_t c,d; | |||
__asm__ volatile | |||
("movq %[a], %%rax; " | |||
"addq %%rax, %%rax; " | |||
"mulq %[b];" | |||
: [c]"=a"(c), [d]"=d"(d) | |||
: [b]"m"(*b), [a]"m"(*a) | |||
: "cc"); | |||
return (((__uint128_t)(d))<<64) | c; | |||
#else | |||
uint64_t c,d; | |||
__asm__ volatile | |||
("movq %[a], %%rdx;" | |||
"leaq (,%%rdx,2), %%rdx;" | |||
"mulx %[b], %[c], %[d];" | |||
: [c]"=r"(c), [d]"=r"(d) | |||
: [b]"m"(*b), [a]"m"(*a) | |||
: "rdx"); | |||
return (((__uint128_t)(d))<<64) | c; | |||
#endif | |||
} | |||
static __inline__ void mac(__uint128_t *acc, const uint64_t *a, const uint64_t *b) { | |||
uint64_t lo = *acc, hi = *acc>>64; | |||
#ifdef __BMI2__ | |||
uint64_t c,d; | |||
__asm__ volatile | |||
("movq %[a], %%rdx; " | |||
"mulx %[b], %[c], %[d]; " | |||
"addq %[c], %[lo]; " | |||
"adcq %[d], %[hi]; " | |||
: [c]"=r"(c), [d]"=r"(d), [lo]"+r"(lo), [hi]"+r"(hi) | |||
: [b]"m"(*b), [a]"m"(*a) | |||
: "rdx", "cc"); | |||
#else | |||
__asm__ volatile | |||
("movq %[a], %%rax; " | |||
"mulq %[b]; " | |||
"addq %%rax, %[lo]; " | |||
"adcq %%rdx, %[hi]; " | |||
: [lo]"+r"(lo), [hi]"+r"(hi) | |||
: [b]"m"(*b), [a]"m"(*a) | |||
: "rax", "rdx", "cc"); | |||
#endif | |||
*acc = (((__uint128_t)(hi))<<64) | lo; | |||
} | |||
static __inline__ void macac(__uint128_t *acc, __uint128_t *acc2, const uint64_t *a, const uint64_t *b) { | |||
uint64_t lo = *acc, hi = *acc>>64; | |||
uint64_t lo2 = *acc2, hi2 = *acc2>>64; | |||
#ifdef __BMI2__ | |||
uint64_t c,d; | |||
__asm__ volatile | |||
("movq %[a], %%rdx; " | |||
"mulx %[b], %[c], %[d]; " | |||
"addq %[c], %[lo]; " | |||
"adcq %[d], %[hi]; " | |||
"addq %[c], %[lo2]; " | |||
"adcq %[d], %[hi2]; " | |||
: [c]"=r"(c), [d]"=r"(d), [lo]"+r"(lo), [hi]"+r"(hi), [lo2]"+r"(lo2), [hi2]"+r"(hi2) | |||
: [b]"m"(*b), [a]"m"(*a) | |||
: "rdx", "cc"); | |||
#else | |||
__asm__ volatile | |||
("movq %[a], %%rax; " | |||
"mulq %[b]; " | |||
"addq %%rax, %[lo]; " | |||
"adcq %%rdx, %[hi]; " | |||
"addq %%rax, %[lo2]; " | |||
"adcq %%rdx, %[hi2]; " | |||
: [lo]"+r"(lo), [hi]"+r"(hi), [lo2]"+r"(lo2), [hi2]"+r"(hi2) | |||
: [b]"m"(*b), [a]"m"(*a) | |||
: "rax", "rdx", "cc"); | |||
#endif | |||
*acc = (((__uint128_t)(hi))<<64) | lo; | |||
*acc2 = (((__uint128_t)(hi2))<<64) | lo2; | |||
} | |||
static __inline__ void mac_rm(__uint128_t *acc, uint64_t a, const uint64_t *b) { | |||
uint64_t lo = *acc, hi = *acc>>64; | |||
#ifdef __BMI2__ | |||
uint64_t c,d; | |||
__asm__ volatile | |||
("mulx %[b], %[c], %[d]; " | |||
"addq %[c], %[lo]; " | |||
"adcq %[d], %[hi]; " | |||
: [c]"=r"(c), [d]"=r"(d), [lo]"+r"(lo), [hi]"+r"(hi) | |||
: [b]"m"(*b), [a]"d"(a) | |||
: "cc"); | |||
#else | |||
__asm__ volatile | |||
("movq %[a], %%rax; " | |||
"mulq %[b]; " | |||
"addq %%rax, %[lo]; " | |||
"adcq %%rdx, %[hi]; " | |||
: [lo]"+r"(lo), [hi]"+r"(hi) | |||
: [b]"m"(*b), [a]"r"(a) | |||
: "rax", "rdx", "cc"); | |||
#endif | |||
*acc = (((__uint128_t)(hi))<<64) | lo; | |||
} | |||
static __inline__ void mac2(__uint128_t *acc, const uint64_t *a, const uint64_t *b) { | |||
uint64_t lo = *acc, hi = *acc>>64; | |||
#ifdef __BMI2__ | |||
uint64_t c,d; | |||
__asm__ volatile | |||
("movq %[a], %%rdx; " | |||
"addq %%rdx, %%rdx; " | |||
"mulx %[b], %[c], %[d]; " | |||
"addq %[c], %[lo]; " | |||
"adcq %[d], %[hi]; " | |||
: [c]"=r"(c), [d]"=r"(d), [lo]"+r"(lo), [hi]"+r"(hi) | |||
: [b]"m"(*b), [a]"m"(*a) | |||
: "rdx", "cc"); | |||
#else | |||
__asm__ volatile | |||
("movq %[a], %%rax; " | |||
"addq %%rax, %%rax; " | |||
"mulq %[b]; " | |||
"addq %%rax, %[lo]; " | |||
"adcq %%rdx, %[hi]; " | |||
: [lo]"+r"(lo), [hi]"+r"(hi) | |||
: [b]"m"(*b), [a]"m"(*a) | |||
: "rax", "rdx", "cc"); | |||
#endif | |||
*acc = (((__uint128_t)(hi))<<64) | lo; | |||
} | |||
static __inline__ void msb(__uint128_t *acc, const uint64_t *a, const uint64_t *b) { | |||
uint64_t lo = *acc, hi = *acc>>64; | |||
#ifdef __BMI2__ | |||
uint64_t c,d; | |||
__asm__ volatile | |||
("movq %[a], %%rdx; " | |||
"mulx %[b], %[c], %[d]; " | |||
"subq %[c], %[lo]; " | |||
"sbbq %[d], %[hi]; " | |||
: [c]"=r"(c), [d]"=r"(d), [lo]"+r"(lo), [hi]"+r"(hi) | |||
: [b]"m"(*b), [a]"m"(*a) | |||
: "rdx", "cc"); | |||
#else | |||
__asm__ volatile | |||
("movq %[a], %%rax; " | |||
"mulq %[b]; " | |||
"subq %%rax, %[lo]; " | |||
"sbbq %%rdx, %[hi]; " | |||
: [lo]"+r"(lo), [hi]"+r"(hi) | |||
: [b]"m"(*b), [a]"m"(*a) | |||
: "rax", "rdx", "cc"); | |||
#endif | |||
*acc = (((__uint128_t)(hi))<<64) | lo; | |||
} | |||
static __inline__ void msb2(__uint128_t *acc, const uint64_t *a, const uint64_t *b) { | |||
uint64_t lo = *acc, hi = *acc>>64; | |||
#ifdef __BMI2__ | |||
uint64_t c,d; | |||
__asm__ volatile | |||
("movq %[a], %%rdx; " | |||
"addq %%rdx, %%rdx; " | |||
"mulx %[b], %[c], %[d]; " | |||
"subq %[c], %[lo]; " | |||
"sbbq %[d], %[hi]; " | |||
: [c]"=r"(c), [d]"=r"(d), [lo]"+r"(lo), [hi]"+r"(hi) | |||
: [b]"m"(*b), [a]"m"(*a) | |||
: "rdx", "cc"); | |||
#else | |||
__asm__ volatile | |||
("movq %[a], %%rax; " | |||
"addq %%rax, %%rax; " | |||
"mulq %[b]; " | |||
"subq %%rax, %[lo]; " | |||
"sbbq %%rdx, %[hi]; " | |||
: [lo]"+r"(lo), [hi]"+r"(hi) | |||
: [b]"m"(*b), [a]"m"(*a) | |||
: "rax", "rdx", "cc"); | |||
#endif | |||
*acc = (((__uint128_t)(hi))<<64) | lo; | |||
} | |||
static __inline__ void mrs(__uint128_t *acc, const uint64_t *a, const uint64_t *b) { | |||
uint64_t c,d, lo = *acc, hi = *acc>>64; | |||
__asm__ volatile | |||
("movq %[a], %%rdx; " | |||
"mulx %[b], %[c], %[d]; " | |||
"subq %[lo], %[c]; " | |||
"sbbq %[hi], %[d]; " | |||
: [c]"=r"(c), [d]"=r"(d), [lo]"+r"(lo), [hi]"+r"(hi) | |||
: [b]"m"(*b), [a]"m"(*a) | |||
: "rdx", "cc"); | |||
*acc = (((__uint128_t)(d))<<64) | c; | |||
} | |||
static __inline__ __uint128_t widemulu(uint64_t a, uint64_t b) { | |||
return ((__uint128_t)(a)) * b; | |||
} | |||
static __inline__ __int128_t widemuls(int64_t a, int64_t b) { | |||
return ((__int128_t)(a)) * b; | |||
} | |||
static __inline__ uint64_t opacify(uint64_t x) { | |||
__asm__ volatile("" : "+r"(x)); | |||
return x; | |||
} | |||
static __inline__ mask_t is_zero(uint64_t x) { | |||
__asm__ volatile("neg %0; sbb %0, %0;" : "+r"(x)); | |||
return ~x; | |||
} | |||
#endif /* __X86_64_ARITH_H__ */ |
@@ -0,0 +1,43 @@ | |||
/** | |||
* @cond internal | |||
* @file f_arithmetic.c | |||
* @copyright | |||
* Copyright (c) 2014 Cryptography Research, Inc. \n | |||
* Released under the MIT License. See LICENSE.txt for license information. | |||
* @author Mike Hamburg | |||
* @brief Field-specific arithmetic. | |||
*/ | |||
#include "ec_point.h" | |||
void | |||
field_isr ( | |||
struct field_t* a, | |||
const struct field_t* x | |||
) { | |||
struct field_t L0, L1, L2, L3; | |||
field_sqr ( &L2, x ); | |||
field_mul ( &L1, x, &L2 ); | |||
field_sqrn ( &L0, &L1, 2 ); | |||
field_mul ( &L2, &L1, &L0 ); | |||
field_sqrn ( &L0, &L2, 4 ); | |||
field_mul ( &L1, &L2, &L0 ); | |||
field_sqr ( &L0, &L1 ); | |||
field_mul ( &L2, x, &L0 ); | |||
field_sqrn ( &L0, &L2, 8 ); | |||
field_mul ( &L2, &L1, &L0 ); | |||
field_sqrn ( &L0, &L2, 17 ); | |||
field_mul ( &L1, &L2, &L0 ); | |||
field_sqrn ( &L0, &L1, 17 ); | |||
field_mul ( &L1, &L2, &L0 ); | |||
field_sqrn ( &L3, &L1, 17 ); | |||
field_mul ( &L0, &L2, &L3 ); | |||
field_sqrn ( &L2, &L0, 51 ); | |||
field_mul ( &L0, &L1, &L2 ); | |||
field_sqrn ( &L1, &L0, 119 ); | |||
field_mul ( &L2, &L0, &L1 ); | |||
field_sqr ( &L0, &L2 ); | |||
field_mul ( &L1, x, &L0 ); | |||
field_sqrn ( &L0, &L1, 239 ); | |||
field_mul ( a, &L2, &L0 ); | |||
} |
@@ -0,0 +1,39 @@ | |||
/** | |||
* @file f_field.h | |||
* @brief Field-specific code. | |||
* @copyright | |||
* Copyright (c) 2014 Cryptography Research, Inc. \n | |||
* Released under the MIT License. See LICENSE.txt for license information. | |||
* @author Mike Hamburg | |||
*/ | |||
#ifndef __F_FIELD_H__ | |||
#define __F_FIELD_H__ 1 | |||
#include <string.h> | |||
#include "constant_time.h" | |||
#include "p480.h" | |||
#define FIELD_BITS 480 | |||
#define field_t p480_t | |||
#define field_mul p480_mul | |||
#define field_sqr p480_sqr | |||
#define field_add p480_add | |||
#define field_sub p480_sub | |||
#define field_mulw p480_mulw | |||
#define field_addw p480_addw | |||
#define field_subw p480_subw | |||
#define field_neg p480_neg | |||
#define field_set_ui p480_set_ui | |||
#define field_bias p480_bias | |||
#define field_cond_neg p480_cond_neg | |||
#define field_inverse p480_inverse | |||
#define field_eq p480_eq | |||
#define field_isr p480_isr | |||
#define field_simultaneous_invert p480_simultaneous_invert | |||
#define field_weak_reduce p480_weak_reduce | |||
#define field_strong_reduce p480_strong_reduce | |||
#define field_serialize p480_serialize | |||
#define field_deserialize p480_deserialize | |||
#define field_is_zero p480_is_zero | |||
#endif /* __F_FIELD_H__ */ |
@@ -0,0 +1,35 @@ | |||
/** | |||
* @file f_magic.h | |||
* @copyright | |||
* Copyright (c) 2014 Cryptography Research, Inc. \n | |||
* Released under the MIT License. See LICENSE.txt for license information. | |||
* @author Mike Hamburg | |||
* @brief Goldilocks magic numbers (group orders, coefficients, algo params etc). | |||
*/ | |||
#ifndef __GOLDI_F_MAGIC_H__ | |||
#define __GOLDI_F_MAGIC_H__ 1 | |||
#include "field.h" | |||
#include "ec_point.h" | |||
/** | |||
* @brief The Edwards "d" term for this curve. | |||
*/ | |||
static const int64_t EDWARDS_D = 53825; | |||
/** @brief The number of combs to use for signed comb algo */ | |||
#define COMB_N (USE_BIG_COMBS ? 6 : 5) | |||
/** @brief The number of teeth of the combs for signed comb algo */ | |||
#define COMB_T (USE_BIG_COMBS ? 5 : 4) | |||
/** @brief The spacing the of combs for signed comb algo */ | |||
#define COMB_S (USE_BIG_COMBS ? 16 : 24) | |||
/** | |||
* @brief crandom magic structure guard constant = "return 4", cf xkcd #221 | |||
*/ | |||
#define CRANDOM_MAGIC 0x72657475726e2034ull | |||
#endif /* __GOLDI_F_MAGIC_H__ */ |
@@ -0,0 +1,68 @@ | |||
/* Copyright (c) 2014 Cryptography Research, Inc. | |||
* Released under the MIT License. See LICENSE.txt for license information. | |||
*/ | |||
#include "field.h" | |||
#include "magic.h" | |||
#include "barrett_field.h" | |||
/* FUTURE: automatically generate this file? */ | |||
const uint8_t FIELD_MODULUS[FIELD_BYTES] = { | |||
0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, | |||
0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, | |||
/*!*/ 0xfe, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, | |||
0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF | |||
}; | |||
const word_t SCALARMUL_FIXED_WINDOW_ADJUSTMENT[2*SCALAR_WORDS] = { | |||
U64LE(0x58b51bc56ea8f0c4), | |||
U64LE(0xd361f6a2348b50c9), | |||
U64LE(0x08089c139c0002ae), | |||
U64LE(0x0001d2ac3d9503a0), | |||
U64LE(0x0000000000000000), | |||
U64LE(0x0000000000000000), | |||
U64LE(0x0000000000000000), | |||
0x40000000, | |||
U64LE(0xcb9c25073e36965b), | |||
U64LE(0x6f2d48d8460f1661), | |||
U64LE(0x0ab6256f7aaaae3e), | |||
U64LE(0x00026e3afcc6af80), | |||
U64LE(0x0000000000000000), | |||
U64LE(0x0000000000000000), | |||
U64LE(0x0000000000000000), | |||
0x00000000 | |||
}; | |||
const struct affine_t goldilocks_base_point = { | |||
{{ | |||
U60LE(0x849ff7f845c30d3), | |||
U60LE(0x7dda488553a4c5b), | |||
U60LE(0x1d3a2d9844831ea), | |||
U60LE(0xb33ecf6ade470a2), | |||
U60LE(0x8b3cb95210bd3c3), | |||
U60LE(0xfc955e59aeefa65), | |||
U60LE(0x3ab247cd530013c), | |||
U60LE(0x7ca42af3d564280) | |||
}}, | |||
{{ 5 }} | |||
}; | |||
static const word_t curve_prime_order_lo[(240+WORD_BITS-1)/WORD_BITS] = { | |||
U64LE(0x72e70941cf8da597), | |||
U64LE(0x9bcb52361183c598), | |||
U64LE(0x02ad895bdeaaab8f), | |||
U64LE(0x9b8ebf31abe0) | |||
}; | |||
const struct barrett_prime_t curve_prime_order = { | |||
GOLDI_FIELD_WORDS, | |||
30 % WORD_BITS, | |||
sizeof(curve_prime_order_lo)/sizeof(curve_prime_order_lo[0]), | |||
curve_prime_order_lo | |||
}; | |||
const struct field_t | |||
sqrt_d_minus_1 = {{ | |||
232 /* Whoa, it comes out even. */ | |||
}}; |
@@ -0,0 +1,43 @@ | |||
/** | |||
* @cond internal | |||
* @file f_arithmetic.c | |||
* @copyright | |||
* Copyright (c) 2014 Cryptography Research, Inc. \n | |||
* Released under the MIT License. See LICENSE.txt for license information. | |||
* @author Mike Hamburg | |||
* @brief Field-specific arithmetic. | |||
*/ | |||
#include "ec_point.h" | |||
void | |||
field_isr ( | |||
struct field_t* a, | |||
const struct field_t* x | |||
) { | |||
struct field_t L0, L1, L2; | |||
field_sqr ( &L1, x ); | |||
field_mul ( &L0, x, &L1 ); | |||
field_sqrn ( &L2, &L0, 2 ); | |||
field_mul ( &L1, &L0, &L2 ); | |||
field_sqrn ( &L2, &L1, 4 ); | |||
field_mul ( &L0, &L1, &L2 ); | |||
field_sqrn ( &L2, &L0, 8 ); | |||
field_mul ( &L1, &L0, &L2 ); | |||
field_sqrn ( &L2, &L1, 16 ); | |||
field_mul ( &L0, &L1, &L2 ); | |||
field_sqrn ( &L2, &L0, 32 ); | |||
field_mul ( &L1, &L0, &L2 ); | |||
field_sqr ( &L2, &L1 ); | |||
field_mul ( &L0, x, &L2 ); | |||
field_sqrn ( &L2, &L0, 64 ); | |||
field_mul ( &L0, &L1, &L2 ); | |||
field_sqrn ( &L2, &L0, 129 ); | |||
field_mul ( &L1, &L0, &L2 ); | |||
field_sqr ( &L2, &L1 ); | |||
field_mul ( &L0, x, &L2 ); | |||
field_sqrn ( &L2, &L0, 259 ); | |||
field_mul ( &L1, &L0, &L2 ); | |||
field_sqr ( &L0, &L1 ); | |||
field_mul ( a, x, &L0 ); | |||
} |
@@ -0,0 +1,39 @@ | |||
/** | |||
* @file f_field.h | |||
* @brief Field-specific code. | |||
* @copyright | |||
* Copyright (c) 2014 Cryptography Research, Inc. \n | |||
* Released under the MIT License. See LICENSE.txt for license information. | |||
* @author Mike Hamburg | |||
*/ | |||
#ifndef __F_FIELD_H__ | |||
#define __F_FIELD_H__ 1 | |||
#include <string.h> | |||
#include "constant_time.h" | |||
#include "p521.h" | |||
#define FIELD_BITS 521 | |||
#define field_t p521_t | |||
#define field_mul p521_mul | |||
#define field_sqr p521_sqr | |||
#define field_add p521_add | |||
#define field_sub p521_sub | |||
#define field_mulw p521_mulw | |||
#define field_addw p521_addw | |||
#define field_subw p521_subw | |||
#define field_neg p521_neg | |||
#define field_set_ui p521_set_ui | |||
#define field_bias p521_bias | |||
#define field_cond_neg p521_cond_neg | |||
#define field_inverse p521_inverse | |||
#define field_eq p521_eq | |||
#define field_isr p521_isr | |||
#define field_simultaneous_invert p521_simultaneous_invert | |||
#define field_weak_reduce p521_weak_reduce | |||
#define field_strong_reduce p521_strong_reduce | |||
#define field_serialize p521_serialize | |||
#define field_deserialize p521_deserialize | |||
#define field_is_zero p521_is_zero | |||
#endif /* __F_FIELD_H__ */ |
@@ -39,13 +39,12 @@ static void q448_randomize( struct crandom_state_t *crand, word_t sk[SCALAR_WORD | |||
} | |||
static void field_print( const char *descr, const struct field_t *a ) { | |||
field_t b; | |||
field_copy(&b, a); | |||
field_strong_reduce(&b); | |||
int j; | |||
unsigned char ser[FIELD_BYTES]; | |||
field_serialize(ser,a); | |||
printf("%s = 0x", descr); | |||
for (j=sizeof(*a)/sizeof(a->limb[0])-1; j>=0; j--) { | |||
printf(PRIxWORD58, b.limb[j]); | |||
for (j=FIELD_BYTES - 1; j>=0; j--) { | |||
printf("%02x", ser[j]); | |||
} | |||
printf("\n"); | |||
} | |||
@@ -58,7 +57,7 @@ field_print_full ( | |||
int j; | |||
printf("%s = 0x", descr); | |||
for (j=15; j>=0; j--) { | |||
printf("%02" PRIxWORD "_" PRIxWORD58 " ", | |||
printf("%02" PRIxWORD "_" PRIxWORD56 " ", | |||
a->limb[j]>>28, a->limb[j]&((1<<28)-1)); | |||
} | |||
printf("\n"); | |||
@@ -84,13 +84,12 @@ void field_print ( | |||
const char *descr, | |||
const struct field_t *a | |||
) { | |||
field_t b; | |||
field_copy(&b, a); | |||
field_strong_reduce(&b); | |||
int j; | |||
unsigned char ser[FIELD_BYTES]; | |||
field_serialize(ser,a); | |||
printf("%s = 0x", descr); | |||
for (j=FIELD_WORDS - 1; j>=0; j--) { | |||
printf(PRIxWORD58, b.limb[LIMBPERM(j)]); | |||
for (j=FIELD_BYTES - 1; j>=0; j--) { | |||
printf("%02x", ser[j]); | |||
} | |||
printf("\n"); | |||
} | |||
@@ -22,6 +22,8 @@ static mask_t mpz_to_field ( | |||
static mask_t field_assert_eq_gmp( | |||
const char *descr, | |||
const struct field_t *a, | |||
const struct field_t *b, | |||
const struct field_t *x, | |||
const mpz_t y, | |||
float lowBound, | |||
@@ -40,7 +42,7 @@ static mask_t field_assert_eq_gmp( | |||
unsigned int i; | |||
for (i=0; i<sizeof(*x)/sizeof(x->limb[0]); i++) { | |||
int radix_bits = sizeof(x->limb[0]) * 448 / sizeof(*x); | |||
int radix_bits = sizeof(x->limb[0]) * FIELD_BITS / sizeof(*x); | |||
word_t yardstick = (i==sizeof(*x)/sizeof(x->limb[0])/2) ? | |||
(1ull<<radix_bits) - 2 : (1ull<<radix_bits) - 1; // FIELD_MAGIC | |||
if (x->limb[i] < yardstick * lowBound || x->limb[i] > yardstick * highBound) { | |||
@@ -54,6 +56,8 @@ static mask_t field_assert_eq_gmp( | |||
if (memcmp(xser,yser,FIELD_BYTES)) { | |||
youfail(); | |||
printf(" Failed arithmetic test %s\n", descr); | |||
field_print(" a", a); | |||
field_print(" b", b); | |||
field_print(" goldi", x); | |||
printf(" gmp = 0x"); | |||
int j; | |||
@@ -82,28 +86,30 @@ static mask_t test_add_sub ( | |||
field_add(&tt,&xx,&yy); | |||
mpz_add(t,x,y); | |||
succ &= field_assert_eq_gmp("add",&tt,t,0,2.1); | |||
succ &= field_assert_eq_gmp("add",&xx,&yy,&tt,t,0,2.1); | |||
field_sub(&tt,&xx,&yy); | |||
field_bias(&tt,2); | |||
mpz_sub(t,x,y); | |||
succ &= field_assert_eq_gmp("sub",&tt,t,0,3.1); | |||
succ &= field_assert_eq_gmp("sub",&xx,&yy,&tt,t,0,3.1); | |||
field_copy(&tt,&xx); | |||
field_addw(&tt,word); | |||
mpz_add_ui(t,x,word); | |||
succ &= field_assert_eq_gmp("addw",&tt,t,0,2.1); | |||
succ &= field_assert_eq_gmp("addw",&xx,&yy,&tt,t,0,2.1); | |||
field_copy(&tt,&xx); | |||
field_subw(&tt,word); | |||
field_bias(&tt,1); | |||
mpz_sub_ui(t,x,word); | |||
succ &= field_assert_eq_gmp("subw",&tt,t,0,2.1); | |||
succ &= field_assert_eq_gmp("subw",&xx,&yy,&tt,t,0,2.1); | |||
/* | |||
if (!succ) { | |||
field_print(" x", &xx); | |||
field_print(" y", &yy); | |||
} | |||
*/ | |||
mpz_clear(t); | |||
@@ -124,19 +130,19 @@ static mask_t test_mul_sqr ( | |||
field_mul(&tt,&xx,&yy); | |||
mpz_mul(t,x,y); | |||
succ &= field_assert_eq_gmp("mul",&tt,t,0,1.1); | |||
succ &= field_assert_eq_gmp("mul",&xx,&yy,&tt,t,0,1.1); | |||
field_mulw(&tt,&xx,word); | |||
mpz_mul_ui(t,x,word); | |||
succ &= field_assert_eq_gmp("mulw",&tt,t,0,1.1); | |||
succ &= field_assert_eq_gmp("mulw",&xx,&yy,&tt,t,0,1.1); | |||
field_sqr(&tt,&xx); | |||
mpz_mul(t,x,x); | |||
succ &= field_assert_eq_gmp("sqrx",&tt,t,0,1.1); | |||
succ &= field_assert_eq_gmp("sqrx",&xx,&yy,&tt,t,0,1.1); | |||
field_sqr(&tt,&yy); | |||
mpz_mul(t,y,y); | |||
succ &= field_assert_eq_gmp("sqy",&tt,t,0,1.1); | |||
succ &= field_assert_eq_gmp("sqy",&xx,&yy,&tt,t,0,1.1); | |||
if (!succ) { | |||
field_print(" x", &xx); | |||
@@ -148,6 +154,36 @@ static mask_t test_mul_sqr ( | |||
return succ; | |||
} | |||
static mask_t test_isr ( | |||
const mpz_t x | |||
) { | |||
struct field_t xx,yy,ss,tt; | |||
mask_t succ = 0; | |||
succ = mpz_to_field(&xx,x); | |||
field_isr(&ss,&xx); | |||
field_sqr(&tt,&ss); | |||
field_mul(&yy,&xx,&tt); | |||
field_addw(&tt,1); | |||
succ |= field_is_zero(&tt); | |||
field_subw(&tt,2); | |||
field_bias(&tt,1); | |||
succ |= field_is_zero(&tt); | |||
field_addw(&tt,1); | |||
if (~succ) { | |||
youfail(); | |||
printf("ISR failure.\n"); | |||
field_print(" x", &xx); | |||
field_print(" s", &ss); | |||
field_print(" t", &tt); | |||
} | |||
return succ; | |||
} | |||
int test_arithmetic (void) { | |||
int j, ntests = 100000; | |||
@@ -168,8 +204,8 @@ int test_arithmetic (void) { | |||
if (j<256) { | |||
mpz_set_ui(x,0); | |||
mpz_set_ui(y,0); | |||
mpz_setbit(x,(j%16)*28); // FIELD_MAGIC | |||
mpz_setbit(y,(j/16)*28); // FIELD_MAGIC | |||
mpz_setbit(x,(j%16)*28); | |||
mpz_setbit(y,(j/16)*28); | |||
} else if (j&1) { | |||
mpz_rrandomb(x, state, FIELD_BITS); | |||
mpz_rrandomb(y, state, FIELD_BITS); | |||
@@ -183,6 +219,9 @@ int test_arithmetic (void) { | |||
succ &= test_add_sub(x,y,word); | |||
succ &= test_mul_sqr(x,y,word); | |||
if (j < 1000) | |||
succ &= test_isr(x); | |||
// TODO: test neg, cond_neg, set_ui, wrd, srd, inv, ...? | |||
} | |||
@@ -3,6 +3,7 @@ | |||
#include <stdio.h> | |||
#include "ec_point.h" | |||
#include "magic.h" | |||
#include "field.h" | |||
#include "crandom.h" | |||
@@ -256,6 +257,15 @@ int test_pointops (void) { | |||
struct crandom_state_t crand; | |||
crandom_init_from_buffer(&crand, "test_pointops random initializer"); | |||
struct extensible_t ext_base; | |||
if (!validate_affine(&goldilocks_base_point)) { | |||
youfail(); | |||
printf(" Base point isn't on the curve.\n"); | |||
return -1; | |||
} | |||
convert_affine_to_extensible(&ext_base, &goldilocks_base_point); | |||
if (!validate_ext(&ext_base, 2, "base")) return -1; | |||
int i, ret; | |||
for (i=0; i<1000; i++) { | |||
uint8_t ser[FIELD_BYTES]; | |||
@@ -39,8 +39,14 @@ single_scalarmul_compatibility_test ( | |||
if (!succ) { | |||
return 1; | |||
} | |||
struct { int n,t,s; } params[] = {{5,5,18},{3,5,30},{4,4,28},{1,2,224}}; // FIELD_MAGIC | |||
#if FIELD_BITS == 448 | |||
struct { int n,t,s; } params[] = {{5,5,18},{3,5,30},{4,4,28},{1,2,224}}; | |||
#elif FIELD_BITS == 480 | |||
struct { int n,t,s; } params[] = {{5,6,16},{6,5,16},{4,5,24},{4,4,30},{1,2,240}}; | |||
#else | |||
struct { int n,t,s; } params[] = {{5,5,(SCALAR_BITS+24)/25},{1,2,(SCALAR_BITS+1)/2}}; | |||
#endif | |||
const int nparams = sizeof(params)/sizeof(params[0]); | |||
struct fixed_base_table_t fbt; | |||
const int nsizes = 6; | |||