Changed the formats of private keys and shared secrets. Added SHA512 support. It's slow and probably has endian bugs. Signatures are now supported. Renamed a bunch of internal functions to be more readable and consistent. Began documenting functions with Doxygen. See HISTORY.txt for more details.master
@@ -0,0 +1,31 @@ | |||
March 5, 2014: | |||
First revision. | |||
Private keys are now longer. They now store a copy of the public key, and | |||
a secret symmetric key for signing purposes. | |||
Signatures are now supported, though like everything else in this library, | |||
their format is not stable. They use a deterministic Schnorr mode, | |||
similar to EdDSA. Precomputed low-latency signing is not supported (yet?). | |||
The hash function is SHA-512. | |||
The deterministic hashing mode needs to be changed to HMAC (TODO!). It's | |||
currently envelope-MAC. | |||
Probably in the future there will be a distinction between ECDH key and | |||
signing keys (and possibly also MQV keys etc). | |||
Began renaming internal functions. Removing p448_ prefixes from EC point | |||
operations. Trying to put the verb first. For example, | |||
"p448_isogeny_un_to_tw" is now called "twist_and_double". | |||
Began documenting with Doxygen. Use "make doc" to make a very incomplete | |||
documentation directory. | |||
There have been many other internal changes. | |||
Feb 21, 2014: | |||
Initial import and benchmarking scripts. | |||
Keygen and ECDH are implemented, but there's no hash function. |
@@ -3,19 +3,20 @@ | |||
CC = clang | |||
CFLAGS = -O3 -std=c99 -pedantic -Wall -Wextra -Werror \ | |||
-mavx2 -DMUST_HAVE_SSSE3 -mbmi2 \ | |||
-ffunction-sections -fdata-sections -fomit-frame-pointer -fPIC | |||
-mssse3 -maes -mavx2 -DMUST_HAVE_AVX -mbmi2 \ | |||
-ffunction-sections -fdata-sections -fomit-frame-pointer -fPIC \ | |||
-DEXPERIMENT_ECDH_OBLITERATE_CT=1 -DEXPERIMENT_ECDH_STIR_IN_PUBKEYS=1 | |||
.PHONY: clean all runbench | |||
.PHONY: clean all runbench todo doc | |||
.PRECIOUS: build/%.s | |||
HEADERS= Makefile $(shell find . -name "*.h") build/timestamp | |||
LIBCOMPONENTS= build/goldilocks.o build/barrett_field.o build/crandom.o \ | |||
build/p448.o build/ec_point.o build/scalarmul.o | |||
build/p448.o build/ec_point.o build/scalarmul.o build/sha512.o | |||
all: bench | |||
bench: *.h *.c | |||
$(CC) $(CFLAGS) -o $@ *.c | |||
@@ -34,7 +35,26 @@ build/goldilocks.so: $(LIBCOMPONENTS) | |||
libtool -macosx_version_min 10.6 -dynamic -dead_strip -lc -x -o $@ \ | |||
-exported_symbols_list exported.sym \ | |||
$(LIBCOMPONENTS) | |||
doc/timestamp: | |||
mkdir -p doc | |||
touch $@ | |||
doc: Doxyfile doc/timestamp *.c *.h | |||
doxygen | |||
todo:: | |||
@egrep --color=auto -w -i 'hack|todo|fixme|bug|xxx|perf|future|remove' *.h *.c | |||
@echo '=============================' | |||
@(for i in FIXME BUG XXX TODO HACK PERF FUTURE REMOVE; do \ | |||
egrep -w -i $$i *.h *.c > /dev/null || continue; \ | |||
/bin/echo -n $$i' ' | head -c 10; \ | |||
egrep -w -i $$i *.h *.c | wc -l; \ | |||
done) | |||
@echo '=============================' | |||
@echo -n 'Total ' | |||
@egrep -w -i 'hack|todo|fixme|bug|xxx|perf|future|remove' *.h *.c | wc -l | |||
runbench: bench | |||
./$< | |||
@@ -1,15 +1,8 @@ | |||
Important work items for Ed448-Goldilocks: | |||
* Import SHA-512 or SHA-3. | |||
* Decide which. | |||
* Get a public-domain version which is 64-bit and 32-bit clean. | |||
* Update LICENSE and README to reflect that SHA is not my code. | |||
* Incorporate hashing into goldilocks_shared_secret. | |||
* It's a pretty terrible shared secret right now. | |||
* Decide on output size | |||
* Documentation: write high-level API docs, and internal docs to help | |||
other implementors. | |||
* Partial progress on Doxygenating the code. | |||
* Documentation: write a spec or add to Watson's | |||
@@ -37,12 +30,13 @@ Important work items for Ed448-Goldilocks: | |||
* Testing: | |||
* Corner-case testing | |||
* more bulk random testing | |||
* More bulk random testing | |||
* Negative testing. | |||
* SAGE-(auto?)-generated test vectors | |||
* Test the Barrett fields | |||
* Safety: add static analysis attributes for compilers that support them | |||
* EG, warn on ignored return types | |||
* Most functions now have warn on ignored return. | |||
* Safety: | |||
* Check for init() if it's still required once we've done the above | |||
@@ -65,17 +59,19 @@ Important work items for Ed448-Goldilocks: | |||
* Scalarmul with other cofactor modes. | |||
* High-level API: | |||
* Signatures. | |||
* Decide on strictness level. | |||
* SPAKE2 Elligator Edition? Maybe write a paper first. | |||
* Elligator. | |||
* Need to write Elligator inverse. Might not be Elligator-2S. | |||
* FHMQV? Is this patented? | |||
* What low-level APIs to expose? | |||
* Edwards points with add, sub, scalarmul, =, ==, ser/deser? | |||
* Portability: test and make clean with other compilers | |||
* Using a fair amount of __attribute__ code. | |||
* Portability: try to make the vector code as portable as possible | |||
* Currently using clang ext_vector_length. | |||
* I can't get a simple for-loop to autovectorize :-/ | |||
@@ -89,8 +85,7 @@ Important work items for Ed448-Goldilocks: | |||
* Run through the SAGE tool to generate new bias & bound. | |||
* Portability: make the outer layers of the code 32-bit clean. | |||
* I don't think that there are endian bugs, but who knows? | |||
* There are endian bugs in the signing algorithm. | |||
* NEON and vectorless constant-time comparison. | |||
* Performance: write and incorporate some extra routines | |||
@@ -99,6 +94,11 @@ Important work items for Ed448-Goldilocks: | |||
* Performance: fixed parameters? | |||
* Perhaps useful for comb precomputation. | |||
* Performance: Improve SHA512. | |||
* Improve portability. | |||
* Improve speed. | |||
* Decide what things to stir into hashes for various functions. | |||
* Performance: improve the Barrett field code. | |||
* Support other primes? | |||
@@ -109,6 +109,42 @@ widemac( | |||
return carry; | |||
} | |||
void | |||
barrett_negate ( | |||
word_t *a, | |||
int nwords_a, | |||
const word_t *p_lo, | |||
int nwords_p, | |||
int nwords_lo, | |||
int p_shift | |||
) { | |||
int i; | |||
dsword_t carry = 0; | |||
barrett_reduce(a,nwords_a,0,p_lo,nwords_p,nwords_lo,p_shift); | |||
/* Have p = 2^big - p_lo. Want p - a = 2^big - p_lo - a */ | |||
for (i=0; i<nwords_lo; i++) { | |||
a[i] = carry = carry - p_lo[i] - a[i]; | |||
carry >>= WORD_BITS; | |||
} | |||
for (; i<nwords_p; i++) { | |||
a[i] = carry = carry - a[i]; | |||
if (i<nwords_p-1) { | |||
carry >>= WORD_BITS; | |||
} | |||
} | |||
a[nwords_p-1] = carry = carry + (((word_t)1) << p_shift); | |||
for (; i<nwords_a; i++) { | |||
assert(!a[i]); | |||
} | |||
assert(!(carry>>64)); | |||
} | |||
void | |||
barrett_reduce( | |||
word_t *a, | |||
@@ -195,14 +231,6 @@ barrett_mul_or_mac( | |||
tmp[i] = 0; | |||
} | |||
if (doMac) { | |||
for (i=0; i<nwords_accum; i++) { | |||
tmp[i] = accum[i]; | |||
} | |||
barrett_reduce(tmp, nwords_tmp, 0, p_lo, nwords_p, nwords_lo, p_shift); | |||
} | |||
for (bpos=nwords_b-1; bpos >= 0; bpos--) { | |||
/* Invariant at the beginning of the loop: the high word is unused. */ | |||
assert(tmp[nwords_tmp-1] == 0); | |||
@@ -211,6 +239,7 @@ barrett_mul_or_mac( | |||
for (i=nwords_tmp-2; i>=0; i--) { | |||
tmp[i+1] = tmp[i]; | |||
} | |||
tmp[0] = 0; | |||
/* mac and reduce */ | |||
word_t carry = widemac(tmp, nwords_tmp, a, nwords_a, b[bpos], 0); | |||
@@ -223,6 +252,11 @@ barrett_mul_or_mac( | |||
* so the high word is again clear */ | |||
} | |||
if (doMac) { | |||
word_t cout = add_nr_packed(tmp, accum, nwords_accum); | |||
barrett_reduce(tmp, nwords_tmp, cout, p_lo, nwords_p, nwords_lo, p_shift); | |||
} | |||
for (i=0; i<nwords_tmp && i<nwords_accum; i++) { | |||
accum[i] = tmp[i]; | |||
} | |||
@@ -44,6 +44,16 @@ sub_nr_ext_packed( | |||
int nwords_c, | |||
word_t mask | |||
); | |||
void | |||
barrett_negate ( | |||
word_t *a, | |||
int nwords_a, | |||
const word_t *p_lo, | |||
int nwords_p, | |||
int nwords_lo, | |||
int p_shift | |||
); | |||
/* | |||
* If doMac, accum = accum + a*b mod p. | |||
@@ -14,6 +14,7 @@ | |||
#include "barrett_field.h" | |||
#include "crandom.h" | |||
#include "goldilocks.h" | |||
#include "sha512.h" | |||
word_t q448_lo[4] = { | |||
0xdc873d6d54a7bb0dull, | |||
@@ -129,6 +130,23 @@ int main(int argc, char **argv) { | |||
when = now() - when; | |||
printf("rand448: %5.1fns\n", when * 1e9 / i); | |||
struct sha512_ctx_t sha; | |||
uint8_t hashout[128]; | |||
when = now(); | |||
for (i=0; i<10000; i++) { | |||
sha512_init(&sha); | |||
sha512_final(&sha, hashout); | |||
} | |||
when = now() - when; | |||
printf("sha512 1blk: %5.1fns\n", when * 1e9 / i); | |||
when = now(); | |||
for (i=0; i<10000; i++) { | |||
sha512_update(&sha, hashout, 128); | |||
} | |||
when = now() - when; | |||
printf("sha512 blk: %5.1fns (%0.2f MB/s)\n", when * 1e9 / i, 128*i/when/1e6); | |||
when = now(); | |||
for (i=0; i<10000; i++) { | |||
p448_isr(&c, &a); | |||
@@ -161,7 +179,7 @@ int main(int argc, char **argv) { | |||
for (i=0; i<100; i++) { | |||
p448_randomize(&crand, &a); | |||
elligator_2s_inject(&affine, &a); | |||
if (!p448_affine_validate(&affine)) { | |||
if (!validate_affine(&affine)) { | |||
printf("Elligator validation failure!\n"); | |||
p448_print("a", &a); | |||
p448_print("x", &affine.x); | |||
@@ -171,14 +189,14 @@ int main(int argc, char **argv) { | |||
when = now(); | |||
for (i=0; i<10000; i++) { | |||
affine_deserialize(&affine, &a); | |||
deserialize_affine(&affine, &a); | |||
} | |||
when = now() - when; | |||
printf("decompress: %5.1fµs\n", when * 1e6 / i); | |||
when = now(); | |||
for (i=0; i<10000; i++) { | |||
extensible_serialize(&a, &exta); | |||
serialize_extensible(&a, &exta); | |||
} | |||
when = now() - when; | |||
printf("compress: %5.1fµs\n", when * 1e6 / i); | |||
@@ -186,8 +204,8 @@ int main(int argc, char **argv) { | |||
int goods = 0; | |||
for (i=0; i<100; i++) { | |||
p448_randomize(&crand, &a); | |||
mask_t good = affine_deserialize(&affine, &a); | |||
if (good & !p448_affine_validate(&affine)) { | |||
mask_t good = deserialize_affine(&affine, &a); | |||
if (good & !validate_affine(&affine)) { | |||
printf("Deserialize validation failure!\n"); | |||
p448_print("a", &a); | |||
p448_print("x", &affine.x); | |||
@@ -195,7 +213,7 @@ int main(int argc, char **argv) { | |||
} else if (good) { | |||
goods++; | |||
convert_affine_to_extensible(&exta,&affine); | |||
extensible_serialize(&b, &exta); | |||
serialize_extensible(&b, &exta); | |||
p448_sub(&c,&b,&a); | |||
p448_bias(&c,2); | |||
if (!p448_is_zero(&c)) { | |||
@@ -203,7 +221,7 @@ int main(int argc, char **argv) { | |||
p448_print("a", &a); | |||
p448_print("x", &affine.x); | |||
p448_print("y", &affine.y); | |||
affine_deserialize(&affine, &b); | |||
deserialize_affine(&affine, &b); | |||
p448_print("b", &b); | |||
p448_print("x", &affine.x); | |||
p448_print("y", &affine.y); | |||
@@ -230,52 +248,52 @@ int main(int argc, char **argv) { | |||
} | |||
when = now() - when; | |||
printf("barrett red: %5.1fns\n", when * 1e9 / i); | |||
when = now(); | |||
for (i=0; i<100000; i++) { | |||
barrett_mac(lsk,7,lsk,7,lsk,7,q448_lo,7,4,62); | |||
} | |||
when = now() - when; | |||
printf("barrett mac: %5.1fns\n", when * 1e9 / i); | |||
// | |||
// when = now(); | |||
// for (i=0; i<100000; i++) { | |||
// barrett_mac(lsk,7,lsk,7,lsk,7,q448_lo,7,4,62); | |||
// } | |||
// when = now() - when; | |||
// printf("barrett mac: %5.1fns\n", when * 1e9 / i); | |||
when = now(); | |||
for (i=0; i<1000000; i++) { | |||
p448_tw_extensible_add_niels(&ext, &niels); | |||
add_tw_niels_to_tw_extensible(&ext, &niels); | |||
} | |||
when = now() - when; | |||
printf("exti+niels: %5.1fns\n", when * 1e9 / i); | |||
when = now(); | |||
for (i=0; i<1000000; i++) { | |||
p448_tw_extensible_add_pniels(&ext, &pniels); | |||
add_tw_pniels_to_tw_extensible(&ext, &pniels); | |||
} | |||
when = now() - when; | |||
printf("exti+pniels: %5.1fns\n", when * 1e9 / i); | |||
when = now(); | |||
for (i=0; i<1000000; i++) { | |||
p448_tw_extensible_double(&ext); | |||
double_tw_extensible(&ext); | |||
} | |||
when = now() - when; | |||
printf("exti dbl: %5.1fns\n", when * 1e9 / i); | |||
when = now(); | |||
for (i=0; i<1000000; i++) { | |||
p448_isogeny_tw_to_un(&exta, &ext); | |||
untwist_and_double(&exta, &ext); | |||
} | |||
when = now() - when; | |||
printf("i->a isog: %5.1fns\n", when * 1e9 / i); | |||
when = now(); | |||
for (i=0; i<1000000; i++) { | |||
p448_isogeny_un_to_tw(&ext, &exta); | |||
twist_and_double(&ext, &exta); | |||
} | |||
when = now() - when; | |||
printf("a->i isog: %5.1fns\n", when * 1e9 / i); | |||
when = now(); | |||
for (i=0; i<1000000; i++) { | |||
p448_montgomery_step(&mb); | |||
montgomery_step(&mb); | |||
} | |||
when = now() - when; | |||
printf("monty step: %5.1fns\n", when * 1e9 / i); | |||
@@ -295,14 +313,20 @@ int main(int argc, char **argv) { | |||
printf("edwards smz: %5.1fµs\n", when * 1e6 / i); | |||
when = now(); | |||
int sum = 0; | |||
for (i=0; i<1000; i++) { | |||
edwards_scalar_multiply_vlook(&ext,sk); | |||
untwist_and_double_and_serialize(&a,&ext); | |||
} | |||
when = now() - when; | |||
printf("edwards svl: %5.1fµs\n", when * 1e6 / i); | |||
when = now(); | |||
for (i=0; i<1000; i++) { | |||
q448_randomize(&crand, sk); | |||
sum += edwards_scalar_multiply_vt(&ext,sk); | |||
edwards_scalar_multiply_vt(&ext,sk); | |||
} | |||
when = now() - when; | |||
printf("edwards vtm: %5.1fµs (%0.2f avg bits = 1.5 + 448/%0.2f)\n", | |||
when * 1e6 / i, 1.0*sum/i, 448.0*i/(sum-1.5*i)); | |||
printf("edwards vtm: %5.1fµs\n", when * 1e6 / i); | |||
struct tw_niels_t wnaft[1<<6]; | |||
when = now(); | |||
@@ -351,23 +375,22 @@ int main(int argc, char **argv) { | |||
printf("edwards vt5: %5.1fµs\n", when * 1e6 / i); | |||
when = now(); | |||
sum = 0; | |||
for (i=0; i<1000; i++) { | |||
q448_randomize(&crand, sk); | |||
q448_randomize(&crand, tk); | |||
sum += edwards_combo_var_fixed_vt(&ext,sk,tk,wnaft,5); | |||
edwards_combo_var_fixed_vt(&ext,sk,tk,wnaft,5); | |||
} | |||
when = now() - when; | |||
printf("vt vf combo: %5.1fµs (avg = %0.3f)\n", when * 1e6 / i, 1.0*sum/i); | |||
printf("vt vf combo: %5.1fµs\n", when * 1e6 / i); | |||
when = now(); | |||
for (i=0; i<1000; i++) { | |||
affine_deserialize(&affine, &a); | |||
deserialize_affine(&affine, &a); | |||
convert_affine_to_extensible(&exta,&affine); | |||
p448_isogeny_un_to_tw(&ext,&exta); | |||
twist_and_double(&ext,&exta); | |||
edwards_scalar_multiply(&ext,sk); | |||
p448_isogeny_tw_to_un(&exta,&ext); | |||
extensible_serialize(&b, &exta); | |||
untwist_and_double(&exta,&ext); | |||
serialize_extensible(&b, &exta); | |||
} | |||
when = now() - when; | |||
printf("edwards sm: %5.1fµs\n", when * 1e6 / i); | |||
@@ -376,10 +399,10 @@ int main(int argc, char **argv) { | |||
while (1) { | |||
p448_randomize(&crand, &a); | |||
if (affine_deserialize(&affine, &a)) break; | |||
if (deserialize_affine(&affine, &a)) break; | |||
} | |||
convert_affine_to_extensible(&exta,&affine); | |||
p448_isogeny_un_to_tw(&ext,&exta); | |||
twist_and_double(&ext,&exta); | |||
when = now(); | |||
for (i=0; i<1000; i++) { | |||
precompute_for_combs(table, &ext, 5, 5, 18); | |||
@@ -400,13 +423,6 @@ int main(int argc, char **argv) { | |||
} | |||
when = now() - when; | |||
printf("com(3,5,30): %5.1fµs\n", when * 1e6 / i); | |||
when = now(); | |||
for (i=0; i<10000; i++) { | |||
edwards_comb(&ext, sk, table, 2, 5, 45); | |||
} | |||
when = now() - when; | |||
printf("com(2,5,45): %5.1fµs\n", when * 1e6 / i); | |||
when = now(); | |||
for (i=0; i<10000; i++) { | |||
@@ -419,8 +435,8 @@ int main(int argc, char **argv) { | |||
for (i=0; i<10000; i++) { | |||
q448_randomize(&crand, sk); | |||
edwards_comb(&ext, sk, table, 5, 5, 18); | |||
p448_isogeny_tw_to_un(&exta,&ext); | |||
extensible_serialize(&b, &exta); | |||
untwist_and_double(&exta,&ext); | |||
serialize_extensible(&b, &exta); | |||
} | |||
when = now() - when; | |||
printf("keygen: %5.1fµs\n", when * 1e6 / i); | |||
@@ -430,14 +446,15 @@ int main(int argc, char **argv) { | |||
int res = goldilocks_init(); | |||
assert(!res); | |||
uint8_t gpk[56],gsk[56],hsk[56],hpk[56]; | |||
struct goldilocks_public_key_t gpk,hpk; | |||
struct goldilocks_private_key_t gsk,hsk; | |||
when = now(); | |||
for (i=0; i<10000; i++) { | |||
if (i&1) { | |||
res = goldilocks_keygen(gsk,gpk); | |||
res = goldilocks_keygen(&gsk,&gpk); | |||
} else { | |||
res = goldilocks_keygen(hsk,hpk); | |||
res = goldilocks_keygen(&hsk,&hpk); | |||
} | |||
assert(!res); | |||
} | |||
@@ -449,14 +466,14 @@ int main(int argc, char **argv) { | |||
when = now(); | |||
for (i=0; i<10000; i++) { | |||
if (i&1) { | |||
gres1 = goldilocks_shared_secret(ss1,gsk,hpk); | |||
gres1 = goldilocks_shared_secret(ss1,&gsk,&hpk); | |||
} else { | |||
gres2 = goldilocks_shared_secret(ss2,hsk,gpk); | |||
gres2 = goldilocks_shared_secret(ss2,&hsk,&gpk); | |||
} | |||
} | |||
when = now() - when; | |||
printf("ecdh: %5.1fµs\n", when * 1e6 / i); | |||
if (gres1 || gres2 || memcmp(ss1,ss2,56)) { | |||
if (gres1 || gres2 || memcmp(ss1,ss2,64)) { | |||
printf("[FAIL] %d %d\n",gres1,gres2); | |||
printf("ss1 = "); | |||
@@ -470,9 +487,39 @@ int main(int argc, char **argv) { | |||
printf("\n"); | |||
} | |||
uint8_t sout[56*2]; | |||
const char *message = "hello world"; | |||
uint64_t message_len = strlen(message); | |||
when = now(); | |||
for (i=0; i<10000; i++) { | |||
res = goldilocks_sign(sout,(const unsigned char *)message,message_len,&gsk); | |||
assert(!res); | |||
} | |||
when = now() - when; | |||
printf("sign: %5.1fµs\n", when * 1e6 / i); | |||
when = now(); | |||
for (i=0; i<10000; i++) { | |||
res = goldilocks_verify(sout,(const unsigned char *)message,message_len,&gpk); | |||
} | |||
when = now() - when; | |||
printf("verify: %5.1fµs\n", when * 1e6 / i); | |||
printf("\nTesting...\n"); | |||
int failures=0, successes = 0; | |||
for (i=0; i<1000; i++) { | |||
(void)goldilocks_keygen(&gsk,&gpk); | |||
goldilocks_sign(sout,(const unsigned char *)message,message_len,&gsk); | |||
res = goldilocks_verify(sout,(const unsigned char *)message,message_len,&gpk); | |||
if (res) failures++; | |||
} | |||
if (failures) { | |||
printf("FAIL %d/%d signature checks!\n", failures, i); | |||
} | |||
failures=0; successes = 0; | |||
for (i=0; i<1000; i++) { | |||
p448_randomize(&crand, &a); | |||
uint64_t two = 2; | |||
@@ -501,14 +548,14 @@ int main(int argc, char **argv) { | |||
mask_t good; | |||
do { | |||
p448_randomize(&crand, &a); | |||
good = affine_deserialize(&affine, &a); | |||
good = deserialize_affine(&affine, &a); | |||
} while (!good); | |||
convert_affine_to_extensible(&exta,&affine); | |||
p448_isogeny_un_to_tw(&ext,&exta); | |||
p448_isogeny_tw_to_un(&exta,&ext); | |||
extensible_serialize(&b, &exta); | |||
isogeny_and_serialize(&c, &ext); | |||
twist_and_double(&ext,&exta); | |||
untwist_and_double(&exta,&ext); | |||
serialize_extensible(&b, &exta); | |||
untwist_and_double_and_serialize(&c, &ext); | |||
p448_sub(&d,&b,&c); | |||
p448_bias(&d,2); | |||
@@ -536,12 +583,12 @@ int main(int argc, char **argv) { | |||
mask_t good = p448_montgomery_ladder(&b,&a,&four,3,0); | |||
good &= p448_montgomery_ladder(&c,&b,sk,448,0); | |||
mask_t goodb = affine_deserialize(&affine, &a); | |||
mask_t goodb = deserialize_affine(&affine, &a); | |||
convert_affine_to_extensible(&exta,&affine); | |||
p448_isogeny_un_to_tw(&ext,&exta); | |||
twist_and_double(&ext,&exta); | |||
edwards_scalar_multiply(&ext,sk); | |||
p448_isogeny_tw_to_un(&exta,&ext); | |||
extensible_serialize(&b, &exta); | |||
untwist_and_double(&exta,&ext); | |||
serialize_extensible(&b, &exta); | |||
p448_sub(&d,&b,&c); | |||
p448_bias(&d,2); | |||
@@ -573,14 +620,14 @@ int main(int argc, char **argv) { | |||
good &= p448_montgomery_ladder(&c,&b,sk,448,0); | |||
if (!good) continue; | |||
affine_deserialize(&affine, &a); | |||
deserialize_affine(&affine, &a); | |||
convert_affine_to_extensible(&exta,&affine); | |||
p448_isogeny_un_to_tw(&ext,&exta); | |||
twist_and_double(&ext,&exta); | |||
precompute_for_combs(table, &ext, 5, 5, 18); | |||
edwards_comb(&ext, sk, table, 5, 5, 18); | |||
p448_isogeny_tw_to_un(&exta,&ext); | |||
extensible_serialize(&b, &exta); | |||
untwist_and_double(&exta,&ext); | |||
serialize_extensible(&b, &exta); | |||
p448_sub(&d,&b,&c); | |||
p448_bias(&d,2); | |||
@@ -606,21 +653,21 @@ int main(int argc, char **argv) { | |||
q448_randomize(&crand, sk); | |||
if (!i) bzero(&sk, sizeof(sk)); | |||
mask_t good = affine_deserialize(&affine, &a); | |||
mask_t good = deserialize_affine(&affine, &a); | |||
if (!good) continue; | |||
convert_affine_to_extensible(&exta,&affine); | |||
p448_isogeny_un_to_tw(&ext,&exta); | |||
twist_and_double(&ext,&exta); | |||
struct tw_extensible_t exu; | |||
copy_tw_extensible(&exu, &ext); | |||
edwards_scalar_multiply(&ext,sk); | |||
p448_isogeny_tw_to_un(&exta,&ext); | |||
extensible_serialize(&b, &exta); | |||
untwist_and_double(&exta,&ext); | |||
serialize_extensible(&b, &exta); | |||
edwards_scalar_multiply_vt(&exu,sk); | |||
p448_isogeny_tw_to_un(&exta,&exu); | |||
extensible_serialize(&c, &exta); | |||
untwist_and_double(&exta,&exu); | |||
serialize_extensible(&c, &exta); | |||
p448_sub(&d,&b,&c); | |||
p448_bias(&d,2); | |||
@@ -646,22 +693,22 @@ int main(int argc, char **argv) { | |||
q448_randomize(&crand, sk); | |||
if (!i) bzero(&sk, sizeof(sk)); | |||
mask_t good = affine_deserialize(&affine, &a); | |||
mask_t good = deserialize_affine(&affine, &a); | |||
if (!good) continue; | |||
convert_affine_to_extensible(&exta,&affine); | |||
p448_isogeny_un_to_tw(&ext,&exta); | |||
twist_and_double(&ext,&exta); | |||
struct tw_extensible_t exu; | |||
copy_tw_extensible(&exu, &ext); | |||
edwards_scalar_multiply(&ext,sk); | |||
p448_isogeny_tw_to_un(&exta,&ext); | |||
extensible_serialize(&b, &exta); | |||
untwist_and_double(&exta,&ext); | |||
serialize_extensible(&b, &exta); | |||
precompute_for_wnaf(wnaft,&exu,5); | |||
edwards_scalar_multiply_vt_pre(&exu,sk,wnaft,5); | |||
p448_isogeny_tw_to_un(&exta,&exu); | |||
extensible_serialize(&c, &exta); | |||
untwist_and_double(&exta,&exu); | |||
serialize_extensible(&c, &exta); | |||
p448_sub(&d,&b,&c); | |||
p448_bias(&d,2); | |||
@@ -695,15 +742,15 @@ int main(int argc, char **argv) { | |||
mask_t good; | |||
do { | |||
p448_randomize(&crand, &a); | |||
good = affine_deserialize(&affine, &a); | |||
good = deserialize_affine(&affine, &a); | |||
convert_affine_to_extensible(&exta,&affine); | |||
p448_isogeny_un_to_tw(&ext,&exta); | |||
twist_and_double(&ext,&exta); | |||
} while (!good); | |||
do { | |||
p448_randomize(&crand, &aa); | |||
good = affine_deserialize(&affine, &aa); | |||
good = deserialize_affine(&affine, &aa); | |||
convert_affine_to_extensible(&exta,&affine); | |||
p448_isogeny_un_to_tw(&exu,&exta); | |||
twist_and_double(&exu,&exta); | |||
} while (!good); | |||
p448_randomize(&crand, &aa); | |||
@@ -717,14 +764,14 @@ int main(int argc, char **argv) { | |||
edwards_scalar_multiply(&exv,sk); | |||
edwards_scalar_multiply(&exw,tk); | |||
convert_tw_extensible_to_tw_pniels(&pniels, &exw); | |||
p448_tw_extensible_add_pniels(&exv,&pniels); | |||
p448_isogeny_tw_to_un(&exta,&exv); | |||
extensible_serialize(&b, &exta); | |||
add_tw_pniels_to_tw_extensible(&exv,&pniels); | |||
untwist_and_double(&exta,&exv); | |||
serialize_extensible(&b, &exta); | |||
precompute_for_wnaf(wnaft,&exu,5); | |||
edwards_combo_var_fixed_vt(&ext,sk,tk,wnaft,5); | |||
p448_isogeny_tw_to_un(&exta,&exv); | |||
extensible_serialize(&c, &exta); | |||
untwist_and_double(&exta,&exv); | |||
serialize_extensible(&c, &exta); | |||
p448_sub(&d,&b,&c); | |||
p448_bias(&d,2); | |||
@@ -7,6 +7,7 @@ | |||
#include "intrinsics.h" | |||
#include "crandom.h" | |||
#include <stdio.h> | |||
volatile unsigned int crandom_features = 0; | |||
@@ -26,11 +27,60 @@ unsigned int crandom_detect_features() { | |||
a=0x80000001; __asm__("cpuid" : "+a"(a), "=b"(b), "=c"(c), "=d"(d)); | |||
if (c & 1<<11) out |= XOP; | |||
if (c & 1<<30) out |= RDRAND; | |||
# endif | |||
return out; | |||
} | |||
INTRINSIC u_int64_t rdrand(int abort_on_fail) { | |||
uint64_t out = 0; | |||
int tries = 1000; | |||
if (HAVE(RDRAND)) { | |||
# if defined(__x86_64__) | |||
u_int64_t out, a=0; | |||
for (; tries && !a; tries--) { | |||
__asm__ __volatile__ ( | |||
"rdrand %0\n\tsetc %%al" | |||
: "=r"(out), "+a"(a) :: "cc" | |||
); | |||
} | |||
# elif (defined(__i386__)) | |||
u_int32_t reg, a=0; | |||
uint64_t out; | |||
for (; tries && !a; tries--) { | |||
__asm__ __volatile__ ( | |||
"rdrand %0\n\tsetc %%al" | |||
: "=r"(reg), "+a"(a) :: "cc" | |||
); | |||
} | |||
out = reg; a = 0; | |||
for (; tries && !a; tries--) { | |||
__asm__ __volatile__ ( | |||
"rdrand %0\n\tsetc %%al" | |||
: "=r"(reg), "+a"(a) :: "cc" | |||
); | |||
} | |||
out = out << 32 | reg; | |||
return out; | |||
# else | |||
abort(); // whut | |||
# endif | |||
} else { | |||
tries = 0; | |||
} | |||
if (abort_on_fail && !tries) { | |||
abort(); | |||
} | |||
return out; | |||
} | |||
/* ------------------------------- Vectorized code ------------------------------- */ | |||
#define shuffle(x,i) _mm_shuffle_epi32(x, \ | |||
i + ((i+1)&3)*4 + ((i+2)&3)*16 + ((i+3)&3)*64) | |||
@@ -278,7 +328,7 @@ crandom_init_from_file( | |||
return err ? err : -1; | |||
} | |||
bzero(state->buffer, 96); | |||
memset(state->buffer, 0, 96); | |||
state->magic = CRANDOM_MAGIC; | |||
state->reseeds_mandatory = reseeds_mandatory; | |||
@@ -292,7 +342,7 @@ crandom_init_from_buffer( | |||
const char initial_seed[32] | |||
) { | |||
memcpy(state->seed, initial_seed, 32); | |||
bzero(state->buffer, 96); | |||
memset(state->buffer, 0, 96); | |||
state->reseed_countdown = state->reseed_interval = state->fill = state->ctr = state->reseeds_mandatory = 0; | |||
state->randomfd = -1; | |||
state->magic = CRANDOM_MAGIC; | |||
@@ -305,7 +355,9 @@ crandom_generate( | |||
unsigned long long length | |||
) { | |||
/* the generator isn't seeded; maybe they ignored the return value of init_from_file */ | |||
if (unlikely(state->magic != CRANDOM_MAGIC)) abort(); | |||
if (unlikely(state->magic != CRANDOM_MAGIC)) { | |||
abort(); | |||
} | |||
int ret = 0; | |||
@@ -313,8 +365,13 @@ crandom_generate( | |||
if (unlikely(state->fill <= 0)) { | |||
uint64_t iv = 0; | |||
if (state->reseed_interval) { | |||
/* it's nondeterministic, stir in some rdtsc() */ | |||
iv = rdtsc(); | |||
/* it's nondeterministic, stir in some rdrand() or rdtsc() */ | |||
if (HAVE(RDRAND)) { | |||
iv = rdrand(0); | |||
if (!iv) iv = rdtsc(); | |||
} else { | |||
iv = rdtsc(); | |||
} | |||
state->reseed_countdown--; | |||
if (unlikely(state->reseed_countdown <= 0)) { | |||
@@ -335,11 +392,13 @@ crandom_generate( | |||
* is basically over-engineering for caution. Also, the user might ignore | |||
* the return code, so we still need to fill the request. | |||
* | |||
* Set reseed_countdown = 1 so we'll try again later. If the user's perf | |||
* sucks as a result of ignoring the error code while calling us in a loop, | |||
* well, he gets what he deserves. | |||
* Set reseed_countdown = 1 so we'll try again later. If the user's | |||
* performance sucks as a result of ignoring the error code while calling | |||
* us in a loop, well, that's life. | |||
*/ | |||
if (state->reseeds_mandatory) abort(); | |||
if (state->reseeds_mandatory) { | |||
abort(); | |||
} | |||
ret = errno; | |||
if (ret == 0) ret = -1; | |||
@@ -361,7 +420,7 @@ crandom_generate( | |||
unsigned long long copy = (length > state->fill) ? state->fill : length; | |||
state->fill -= copy; | |||
memcpy(output, state->buffer + state->fill, copy); | |||
bzero(state->buffer + state->fill, copy); | |||
memset(state->buffer + state->fill, 0, copy); | |||
output += copy; length -= copy; | |||
} | |||
@@ -371,11 +430,13 @@ crandom_generate( | |||
void | |||
crandom_destroy( | |||
struct crandom_state_t *state | |||
) { | |||
if (state->randomfd) close(state->randomfd); | |||
/* Ignore the return value, because what would it mean? | |||
* "Your random device, which you were reading over NFS, lost some data"? | |||
*/ | |||
) { | |||
if (state->magic == CRANDOM_MAGIC && state->randomfd) { | |||
(void) close(state->randomfd); | |||
/* Ignore the return value from close(), because what would it mean? | |||
* "Your random device, which you were reading over NFS, lost some data"? | |||
*/ | |||
} | |||
bzero(state, sizeof(*state)); | |||
memset(state, 0, sizeof(*state)); | |||
} |
@@ -3,7 +3,11 @@ | |||
* Released under the MIT License. See LICENSE.txt for license information. | |||
*/ | |||
/* A miniature version of the (as of yet incomplete) crandom project. */ | |||
/** | |||
* @file crandom.h | |||
* @author Mike Hamburg | |||
* @brief A miniature version of the (as of yet incomplete) crandom project. | |||
*/ | |||
#ifndef __GOLDI_CRANDOM_H__ | |||
#define __GOLDI_CRANDOM_H__ 1 | |||
@@ -16,7 +20,14 @@ | |||
#include <strings.h> /* for bzero */ | |||
#include <unistd.h> /* for read */ | |||
/** | |||
* @brief The state of a crandom generator. | |||
* | |||
* This object is opaque. It is not protected by a lock, and so must | |||
* not be accessed by multiple threads at the same time. | |||
*/ | |||
struct crandom_state_t { | |||
/** @privatesection */ | |||
unsigned char seed[32]; | |||
unsigned char buffer[96]; | |||
uint64_t ctr; | |||
@@ -32,30 +43,93 @@ struct crandom_state_t { | |||
extern "C" { | |||
#endif | |||
/** | |||
* Initialize a crandom state from the chosen file. | |||
* | |||
* This function initializes a state from a given state file, or | |||
* from a random device (eg. /dev/random or /dev/urandom). | |||
* | |||
* You must check the return value of this function. | |||
* | |||
* @param [out] state The crandom state variable to initalize. | |||
* @param [in] filename The name of the seed file or random device. | |||
* @param [in] reseed_interval The number of 96-byte blocks which can be | |||
* generated without reseeding. Suggest 10000. | |||
* @param [in] reseeds_mandatory If nonzero, call abort() if a reseed fails. | |||
* Suggest 1. | |||
* | |||
* @retval 0 Success. | |||
* @retval Nonzero An error to be interpreted by strerror(). | |||
*/ | |||
int | |||
crandom_init_from_file( | |||
crandom_init_from_file ( | |||
struct crandom_state_t *state, | |||
const char *filename, | |||
int reseed_interval, | |||
int reseeds_mandatory | |||
) __attribute__((warn_unused_result)); | |||
/** | |||
* Initialize a crandom state from a buffer, for deterministic operation. | |||
* | |||
* This function is used to initialize a crandom state deterministically, | |||
* mainly for testing purposes. It can also be used to expand a secret | |||
* random value deterministically. | |||
* | |||
* @warning The crandom implementation is not guaranteed to be stable. | |||
* That is, a later release might produce a different random stream from | |||
* the same seed. | |||
* | |||
* @param [out] state The crandom state variable to initalize. | |||
* @param [in] initial_seed The seed value. | |||
*/ | |||
void | |||
crandom_init_from_buffer( | |||
crandom_init_from_buffer ( | |||
struct crandom_state_t *state, | |||
const char initial_seed[32] | |||
); | |||
/* TODO : attribute warn for not checking return type? */ | |||
/** | |||
* Fill the output buffer with random data. | |||
* | |||
* This function uses the given crandom state to produce pseudorandom data | |||
* in the output buffer. | |||
* | |||
* This function may perform reads from the state's random device if it needs | |||
* to reseed. This could block if that file is a blocking source, such as | |||
* a pipe or /dev/random on Linux. If reseeding fails and the state has | |||
* reseeds_mandatory set, this function will call abort(). Otherwise, it will | |||
* return an error code, but it will still randomize the buffer. | |||
* | |||
* If called on a corrupted, uninitialized or destroyed state, this function | |||
* will abort(). | |||
* | |||
* @warning This function is not thread-safe with respect to the state. Don't | |||
* call it from multiple threads with the same state at the same time. | |||
* | |||
* @param [inout] state The crandom state to use for generation. | |||
* @param [out] output The buffer to fill with random data. | |||
* @param [in] length The length of the buffer. | |||
* | |||
* @retval 0 Success. | |||
* @retval Nonezero A non-mandatory reseed operation failed. | |||
*/ | |||
int | |||
crandom_generate( | |||
crandom_generate ( | |||
struct crandom_state_t *state, | |||
unsigned char *output, | |||
unsigned long long length | |||
); | |||
/** | |||
* Destroy the random state. Further calls to crandom_generate() on that state | |||
* will abort(). | |||
* | |||
* @param [inout] state The state to be destroyed. | |||
*/ | |||
void | |||
crandom_destroy( | |||
crandom_destroy ( | |||
struct crandom_state_t *state | |||
); | |||
@@ -1,8 +1,13 @@ | |||
/* Copyright (c) 2014 Cryptography Research, Inc. | |||
* Released under the MIT License. See LICENSE.txt for license information. | |||
/** | |||
* @cond internal | |||
* @file ec_point.c | |||
* @copyright | |||
* Copyright (c) 2014 Cryptography Research, Inc. \n | |||
* Released under the MIT License. See LICENSE.txt for license information. | |||
* @author Mike Hamburg | |||
* @warning This file was automatically generated. | |||
*/ | |||
/* This file was generated with the assistance of a tool written in SAGE. */ | |||
#include "ec_point.h" | |||
@@ -51,7 +56,7 @@ p448_inverse ( | |||
} | |||
void | |||
p448_tw_extensible_add_niels ( | |||
add_tw_niels_to_tw_extensible ( | |||
struct tw_extensible_t* d, | |||
const struct tw_niels_t* e | |||
) { | |||
@@ -75,18 +80,53 @@ p448_tw_extensible_add_niels ( | |||
} | |||
void | |||
p448_tw_extensible_add_pniels ( | |||
sub_tw_niels_from_tw_extensible ( | |||
struct tw_extensible_t* d, | |||
const struct tw_niels_t* e | |||
) { | |||
struct p448_t L0, L1; | |||
p448_bias ( &d->y, 2 ); | |||
p448_bias ( &d->z, 2 ); | |||
p448_sub ( &L1, &d->y, &d->x ); | |||
p448_mul ( &L0, &e->b, &L1 ); | |||
p448_add ( &L1, &d->x, &d->y ); | |||
p448_mul ( &d->y, &e->a, &L1 ); | |||
p448_bias ( &d->y, 2 ); | |||
p448_mul ( &L1, &d->u, &d->t ); | |||
p448_mul ( &d->x, &e->c, &L1 ); | |||
p448_add ( &d->u, &L0, &d->y ); | |||
p448_sub ( &d->t, &d->y, &L0 ); | |||
p448_add ( &d->y, &d->x, &d->z ); | |||
p448_sub ( &L0, &d->z, &d->x ); | |||
p448_mul ( &d->z, &L0, &d->y ); | |||
p448_mul ( &d->x, &d->y, &d->t ); | |||
p448_mul ( &d->y, &L0, &d->u ); | |||
} | |||
void | |||
add_tw_pniels_to_tw_extensible ( | |||
struct tw_extensible_t* e, | |||
const struct tw_pniels_t* a | |||
) { | |||
struct p448_t L0; | |||
p448_mul ( &L0, &e->z, &a->z ); | |||
p448_copy ( &e->z, &L0 ); | |||
p448_tw_extensible_add_niels( e, &a->n ); | |||
add_tw_niels_to_tw_extensible( e, &a->n ); | |||
} | |||
void | |||
p448_tw_extensible_double ( | |||
sub_tw_pniels_from_tw_extensible ( | |||
struct tw_extensible_t* e, | |||
const struct tw_pniels_t* a | |||
) { | |||
struct p448_t L0; | |||
p448_mul ( &L0, &e->z, &a->z ); | |||
p448_copy ( &e->z, &L0 ); | |||
sub_tw_niels_from_tw_extensible( e, &a->n ); | |||
} | |||
void | |||
double_tw_extensible ( | |||
struct tw_extensible_t* a | |||
) { | |||
struct p448_t L0, L1, L2; | |||
@@ -109,7 +149,7 @@ p448_tw_extensible_double ( | |||
} | |||
void | |||
p448_extensible_double ( | |||
double_extensible ( | |||
struct extensible_t* a | |||
) { | |||
struct p448_t L0, L1, L2; | |||
@@ -132,7 +172,7 @@ p448_extensible_double ( | |||
} | |||
void | |||
p448_isogeny_un_to_tw ( | |||
twist_and_double ( | |||
struct tw_extensible_t* b, | |||
const struct extensible_t* a | |||
) { | |||
@@ -156,7 +196,7 @@ p448_isogeny_un_to_tw ( | |||
} | |||
void | |||
p448_isogeny_tw_to_un ( | |||
untwist_and_double ( | |||
struct extensible_t* b, | |||
const struct tw_extensible_t* a | |||
) { | |||
@@ -269,7 +309,7 @@ convert_tw_niels_to_tw_extensible ( | |||
} | |||
void | |||
p448_montgomery_step ( | |||
montgomery_step ( | |||
struct montgomery_t* a | |||
) { | |||
struct p448_t L0, L1; | |||
@@ -299,7 +339,7 @@ p448_montgomery_step ( | |||
} | |||
void | |||
p448_montgomery_serialize ( | |||
serialize_montgomery ( | |||
struct p448_t* sign, | |||
struct p448_t* ser, | |||
const struct montgomery_t* a, | |||
@@ -330,7 +370,7 @@ p448_montgomery_serialize ( | |||
} | |||
void | |||
extensible_serialize ( | |||
serialize_extensible ( | |||
struct p448_t* b, | |||
const struct extensible_t* a | |||
) { | |||
@@ -350,37 +390,70 @@ extensible_serialize ( | |||
} | |||
void | |||
isogeny_and_serialize ( | |||
untwist_and_double_and_serialize ( | |||
struct p448_t* b, | |||
const struct tw_extensible_t* a | |||
) { | |||
struct p448_t L0, L1, L2, L3; | |||
p448_mul ( &L3, &a->y, &a->x ); | |||
p448_add ( &L1, &a->y, &a->x ); | |||
p448_sqr ( b, &L1 ); | |||
p448_add ( b, &a->y, &a->x ); | |||
p448_sqr ( &L1, b ); | |||
p448_add ( &L2, &L3, &L3 ); | |||
p448_sub ( &L1, b, &L2 ); | |||
p448_bias ( &L1, 3 ); | |||
p448_sub ( b, &L1, &L2 ); | |||
p448_bias ( b, 3 ); | |||
p448_sqr ( &L2, &a->z ); | |||
p448_sqr ( b, &L2 ); | |||
p448_add ( &L2, &L1, &L1 ); | |||
p448_mulw ( &L1, &L2, 39082 ); | |||
p448_neg ( &L2, &L1 ); | |||
p448_sqr ( &L1, &L2 ); | |||
p448_add ( &L2, b, b ); | |||
p448_mulw ( b, &L2, 39082 ); | |||
p448_neg ( &L2, b ); | |||
p448_bias ( &L2, 2 ); | |||
p448_mulw ( &L0, &L2, 39082 ); | |||
p448_neg ( &L1, &L0 ); | |||
p448_bias ( &L1, 2 ); | |||
p448_neg ( b, &L0 ); | |||
p448_bias ( b, 2 ); | |||
p448_mul ( &L0, &L2, &L1 ); | |||
p448_mul ( &L2, b, &L0 ); | |||
p448_isr ( &L0, &L2 ); | |||
p448_mul ( &L1, b, &L0 ); | |||
p448_sqr ( b, &L0 ); | |||
p448_mul ( &L0, &L2, b ); | |||
p448_mul ( b, &L1, &L0 ); | |||
p448_isr ( &L0, b ); | |||
p448_mul ( &L2, &L1, &L0 ); | |||
p448_sqr ( &L1, &L0 ); | |||
p448_mul ( &L0, b, &L1 ); | |||
p448_mul ( b, &L2, &L3 ); | |||
p448_mul ( b, &L1, &L3 ); | |||
} | |||
void | |||
twist ( | |||
struct tw_extensible_t* b, | |||
const struct extensible_t* a | |||
) { | |||
mask_t L0, L1; | |||
p448_sqr ( &b->y, &a->z ); | |||
p448_sqr ( &b->z, &a->x ); | |||
p448_sub ( &b->u, &b->y, &b->z ); | |||
p448_bias ( &b->u, 2 ); | |||
p448_sub ( &b->z, &a->z, &a->x ); | |||
p448_bias ( &b->z, 2 ); | |||
p448_mul ( &b->y, &b->z, &a->y ); | |||
p448_sub ( &b->z, &a->z, &a->y ); | |||
p448_bias ( &b->z, 2 ); | |||
p448_mul ( &b->x, &b->z, &b->y ); | |||
p448_mul ( &b->t, &b->x, &b->u ); | |||
p448_mul ( &b->y, &b->x, &b->t ); | |||
p448_isr ( &b->t, &b->y ); | |||
p448_mul ( &b->u, &b->x, &b->t ); | |||
p448_sqr ( &b->x, &b->t ); | |||
p448_mul ( &b->t, &b->y, &b->x ); | |||
p448_mul ( &b->x, &a->x, &b->u ); | |||
p448_mul ( &b->y, &a->y, &b->u ); | |||
L1 = p448_is_zero( &b->z ); | |||
L0 = - L1; | |||
p448_addw ( &b->y, L0 ); | |||
p448_weak_reduce( &b->y ); | |||
p448_set_ui( &b->z, 1 ); | |||
p448_copy ( &b->t, &b->x ); | |||
p448_copy ( &b->u, &b->y ); | |||
} | |||
mask_t | |||
affine_deserialize ( | |||
deserialize_affine ( | |||
struct affine_t* a, | |||
const struct p448_t* sz | |||
) { | |||
@@ -417,6 +490,57 @@ affine_deserialize ( | |||
return p448_is_zero( &L0 ); | |||
} | |||
mask_t | |||
deserialize_and_twist_approx ( | |||
struct tw_extensible_t* a, | |||
const struct p448_t* sdm1, | |||
const struct p448_t* sz | |||
) { | |||
struct p448_t L0, L1; | |||
p448_sqr ( &a->z, sz ); | |||
p448_copy ( &a->y, &a->z ); | |||
p448_addw ( &a->y, 1 ); | |||
p448_sqr ( &a->x, &a->y ); | |||
p448_mulw ( &a->y, &a->x, 39082 ); | |||
p448_neg ( &a->x, &a->y ); | |||
p448_add ( &a->y, &a->z, &a->z ); | |||
p448_bias ( &a->y, 1 ); | |||
p448_add ( &a->u, &a->y, &a->y ); | |||
p448_add ( &a->y, &a->u, &a->x ); | |||
p448_sqr ( &a->x, &a->z ); | |||
p448_subw ( &a->x, 1 ); | |||
p448_neg ( &a->u, &a->x ); | |||
p448_bias ( &a->u, 2 ); | |||
p448_mul ( &a->x, sdm1, &a->u ); | |||
p448_mul ( &L0, &a->x, &a->y ); | |||
p448_mul ( &a->t, &L0, &a->y ); | |||
p448_mul ( &a->u, &a->x, &a->t ); | |||
p448_mul ( &a->t, &a->u, &L0 ); | |||
p448_mul ( &a->y, &a->x, &a->t ); | |||
p448_isr ( &L0, &a->y ); | |||
p448_mul ( &a->y, &a->u, &L0 ); | |||
p448_sqr ( &L1, &L0 ); | |||
p448_mul ( &a->u, &a->t, &L1 ); | |||
p448_mul ( &a->t, &a->x, &a->u ); | |||
p448_bias ( &a->t, 1 ); | |||
p448_add ( &a->x, sz, sz ); | |||
p448_mul ( &L0, &a->u, &a->x ); | |||
p448_copy ( &a->x, &a->z ); | |||
p448_subw ( &a->x, 1 ); | |||
p448_neg ( &L1, &a->x ); | |||
p448_bias ( &L1, 2 ); | |||
p448_mul ( &a->x, &L1, &L0 ); | |||
p448_mul ( &L0, &a->u, &a->y ); | |||
p448_addw ( &a->z, 1 ); | |||
p448_mul ( &a->y, &a->z, &L0 ); | |||
p448_subw ( &a->t, 1 ); | |||
mask_t ret = p448_is_zero( &a->t ); | |||
p448_set_ui( &a->z, 1 ); | |||
p448_copy ( &a->t, &a->x ); | |||
p448_copy ( &a->u, &a->y ); | |||
return ret; | |||
} | |||
void | |||
set_identity_extensible ( | |||
struct extensible_t* a | |||
@@ -452,15 +576,15 @@ eq_affine ( | |||
const struct affine_t* a, | |||
const struct affine_t* b | |||
) { | |||
mask_t L0, L1; | |||
struct p448_t L2; | |||
p448_sub ( &L2, &a->x, &b->x ); | |||
p448_bias ( &L2, 2 ); | |||
L1 = p448_is_zero( &L2 ); | |||
p448_sub ( &L2, &a->y, &b->y ); | |||
p448_bias ( &L2, 2 ); | |||
L0 = p448_is_zero( &L2 ); | |||
return L1 & L0; | |||
mask_t L1, L2; | |||
struct p448_t L0; | |||
p448_sub ( &L0, &a->x, &b->x ); | |||
p448_bias ( &L0, 2 ); | |||
L2 = p448_is_zero( &L0 ); | |||
p448_sub ( &L0, &a->y, &b->y ); | |||
p448_bias ( &L0, 2 ); | |||
L1 = p448_is_zero( &L0 ); | |||
return L2 & L1; | |||
} | |||
mask_t | |||
@@ -468,19 +592,19 @@ eq_extensible ( | |||
const struct extensible_t* a, | |||
const struct extensible_t* b | |||
) { | |||
mask_t L0, L1; | |||
struct p448_t L2, L3, L4; | |||
p448_mul ( &L4, &b->z, &a->x ); | |||
p448_mul ( &L3, &a->z, &b->x ); | |||
p448_sub ( &L2, &L4, &L3 ); | |||
p448_bias ( &L2, 2 ); | |||
L1 = p448_is_zero( &L2 ); | |||
p448_mul ( &L4, &b->z, &a->y ); | |||
p448_mul ( &L3, &a->z, &b->y ); | |||
p448_sub ( &L2, &L4, &L3 ); | |||
p448_bias ( &L2, 2 ); | |||
L0 = p448_is_zero( &L2 ); | |||
return L1 & L0; | |||
mask_t L3, L4; | |||
struct p448_t L0, L1, L2; | |||
p448_mul ( &L2, &b->z, &a->x ); | |||
p448_mul ( &L1, &a->z, &b->x ); | |||
p448_sub ( &L0, &L2, &L1 ); | |||
p448_bias ( &L0, 2 ); | |||
L4 = p448_is_zero( &L0 ); | |||
p448_mul ( &L2, &b->z, &a->y ); | |||
p448_mul ( &L1, &a->z, &b->y ); | |||
p448_sub ( &L0, &L2, &L1 ); | |||
p448_bias ( &L0, 2 ); | |||
L3 = p448_is_zero( &L0 ); | |||
return L4 & L3; | |||
} | |||
mask_t | |||
@@ -488,19 +612,19 @@ eq_tw_extensible ( | |||
const struct tw_extensible_t* a, | |||
const struct tw_extensible_t* b | |||
) { | |||
mask_t L0, L1; | |||
struct p448_t L2, L3, L4; | |||
p448_mul ( &L4, &b->z, &a->x ); | |||
p448_mul ( &L3, &a->z, &b->x ); | |||
p448_sub ( &L2, &L4, &L3 ); | |||
p448_bias ( &L2, 2 ); | |||
L1 = p448_is_zero( &L2 ); | |||
p448_mul ( &L4, &b->z, &a->y ); | |||
p448_mul ( &L3, &a->z, &b->y ); | |||
p448_sub ( &L2, &L4, &L3 ); | |||
p448_bias ( &L2, 2 ); | |||
L0 = p448_is_zero( &L2 ); | |||
return L1 & L0; | |||
mask_t L3, L4; | |||
struct p448_t L0, L1, L2; | |||
p448_mul ( &L2, &b->z, &a->x ); | |||
p448_mul ( &L1, &a->z, &b->x ); | |||
p448_sub ( &L0, &L2, &L1 ); | |||
p448_bias ( &L0, 2 ); | |||
L4 = p448_is_zero( &L0 ); | |||
p448_mul ( &L2, &b->z, &a->y ); | |||
p448_mul ( &L1, &a->z, &b->y ); | |||
p448_sub ( &L0, &L2, &L1 ); | |||
p448_bias ( &L0, 2 ); | |||
L3 = p448_is_zero( &L0 ); | |||
return L4 & L3; | |||
} | |||
void | |||
@@ -559,7 +683,7 @@ elligator_2s_inject ( | |||
} | |||
mask_t | |||
p448_affine_validate ( | |||
validate_affine ( | |||
const struct affine_t* a | |||
) { | |||
struct p448_t L0, L1, L2, L3; | |||
@@ -577,45 +701,45 @@ p448_affine_validate ( | |||
} | |||
mask_t | |||
p448_tw_extensible_validate ( | |||
validate_tw_extensible ( | |||
const struct tw_extensible_t* ext | |||
) { | |||
mask_t L0, L1; | |||
struct p448_t L2, L3, L4, L5; | |||
mask_t L4, L5; | |||
struct p448_t L0, L1, L2, L3; | |||
/* | |||
* Check invariant: | |||
* 0 = -x*y + z*t*u | |||
*/ | |||
p448_mul ( &L2, &ext->t, &ext->u ); | |||
p448_mul ( &L4, &ext->z, &L2 ); | |||
p448_addw ( &L4, 0 ); | |||
p448_mul ( &L3, &ext->x, &ext->y ); | |||
p448_neg ( &L2, &L3 ); | |||
p448_add ( &L3, &L2, &L4 ); | |||
p448_bias ( &L3, 2 ); | |||
L1 = p448_is_zero( &L3 ); | |||
p448_mul ( &L0, &ext->t, &ext->u ); | |||
p448_mul ( &L2, &ext->z, &L0 ); | |||
p448_addw ( &L2, 0 ); | |||
p448_mul ( &L1, &ext->x, &ext->y ); | |||
p448_neg ( &L0, &L1 ); | |||
p448_add ( &L1, &L0, &L2 ); | |||
p448_bias ( &L1, 2 ); | |||
L5 = p448_is_zero( &L1 ); | |||
/* | |||
* Check invariant: | |||
* 0 = d*t^2*u^2 + x^2 - y^2 + z^2 - t^2*u^2 | |||
*/ | |||
p448_sqr ( &L4, &ext->y ); | |||
p448_neg ( &L2, &L4 ); | |||
p448_addw ( &L2, 0 ); | |||
p448_sqr ( &L3, &ext->x ); | |||
p448_bias ( &L3, 4 ); | |||
p448_add ( &L4, &L3, &L2 ); | |||
p448_sqr ( &L5, &ext->u ); | |||
p448_sqr ( &L3, &ext->t ); | |||
p448_mul ( &L2, &L3, &L5 ); | |||
p448_mulw ( &L3, &L2, 39081 ); | |||
p448_neg ( &L5, &L3 ); | |||
p448_add ( &L3, &L5, &L4 ); | |||
p448_neg ( &L5, &L2 ); | |||
p448_add ( &L4, &L5, &L3 ); | |||
p448_sqr ( &L3, &ext->z ); | |||
p448_add ( &L2, &L3, &L4 ); | |||
L0 = p448_is_zero( &L2 ); | |||
return L1 & L0; | |||
p448_sqr ( &L2, &ext->y ); | |||
p448_neg ( &L0, &L2 ); | |||
p448_addw ( &L0, 0 ); | |||
p448_sqr ( &L1, &ext->x ); | |||
p448_bias ( &L1, 4 ); | |||
p448_add ( &L2, &L1, &L0 ); | |||
p448_sqr ( &L3, &ext->u ); | |||
p448_sqr ( &L1, &ext->t ); | |||
p448_mul ( &L0, &L1, &L3 ); | |||
p448_mulw ( &L1, &L0, 39081 ); | |||
p448_neg ( &L3, &L1 ); | |||
p448_add ( &L1, &L3, &L2 ); | |||
p448_neg ( &L3, &L0 ); | |||
p448_add ( &L2, &L3, &L1 ); | |||
p448_sqr ( &L1, &ext->z ); | |||
p448_add ( &L0, &L1, &L2 ); | |||
L4 = p448_is_zero( &L0 ); | |||
return L5 & L4; | |||
} | |||
@@ -1,10 +1,14 @@ | |||
/* Copyright (c) 2014 Cryptography Research, Inc. | |||
* Released under the MIT License. See LICENSE.txt for license information. | |||
/** | |||
* @file ec_point.h | |||
* @copyright | |||
* Copyright (c) 2014 Cryptography Research, Inc. \n | |||
* Released under the MIT License. See LICENSE.txt for license information. | |||
* @author Mike Hamburg | |||
* @warning This file was automatically generated. | |||
*/ | |||
/* This file was generated with the assistance of a tool written in SAGE. */ | |||
#ifndef __CC_INCLUDED_P448_EDWARDS_H__ | |||
#define __CC_INCLUDED_P448_EDWARDS_H__ | |||
#ifndef __CC_INCLUDED_EC_POINT_H__ | |||
#define __CC_INCLUDED_EC_POINT_H__ | |||
#include "p448.h" | |||
@@ -12,28 +16,28 @@ | |||
extern "C" { | |||
#endif | |||
/* | |||
/** | |||
* Affine point on an Edwards curve. | |||
*/ | |||
struct affine_t { | |||
struct p448_t x, y; | |||
}; | |||
/* | |||
/** | |||
* Affine point on a twisted Edwards curve. | |||
*/ | |||
struct tw_affine_t { | |||
struct p448_t x, y; | |||
}; | |||
/* | |||
/** | |||
* Montgomery buffer. | |||
*/ | |||
struct montgomery_t { | |||
struct p448_t z0, xd, zd, xa, za; | |||
}; | |||
/* | |||
/** | |||
* Extensible coordinates for Edwards curves, suitable for | |||
* accumulators. | |||
* | |||
@@ -55,7 +59,7 @@ struct extensible_t { | |||
struct p448_t x, y, z, t, u; | |||
}; | |||
/* | |||
/** | |||
* Extensible coordinates for twisted Edwards curves, | |||
* suitable for accumulators. | |||
*/ | |||
@@ -63,16 +67,18 @@ struct tw_extensible_t { | |||
struct p448_t x, y, z, t, u; | |||
}; | |||
/* | |||
* Niels coordinates for twisted Edwards curves. Good for | |||
* mixed readdition; suitable for fixed tables. | |||
/** | |||
* Niels coordinates for twisted Edwards curves. | |||
* | |||
* Good for mixed readdition; suitable for fixed tables. | |||
*/ | |||
struct tw_niels_t { | |||
struct p448_t a, b, c; | |||
}; | |||
/* | |||
/** | |||
* Projective niels coordinates for twisted Edwards curves. | |||
* | |||
* Good for readdition; suitable for temporary tables. | |||
*/ | |||
struct tw_pniels_t { | |||
@@ -81,7 +87,7 @@ struct tw_pniels_t { | |||
}; | |||
/* | |||
/** | |||
* Auto-generated copy method. | |||
*/ | |||
static __inline__ void | |||
@@ -90,7 +96,7 @@ copy_affine ( | |||
const struct affine_t* ds | |||
) __attribute__((unused,always_inline)); | |||
/* | |||
/** | |||
* Auto-generated copy method. | |||
*/ | |||
static __inline__ void | |||
@@ -99,7 +105,7 @@ copy_tw_affine ( | |||
const struct tw_affine_t* ds | |||
) __attribute__((unused,always_inline)); | |||
/* | |||
/** | |||
* Auto-generated copy method. | |||
*/ | |||
static __inline__ void | |||
@@ -108,7 +114,7 @@ copy_montgomery ( | |||
const struct montgomery_t* ds | |||
) __attribute__((unused,always_inline)); | |||
/* | |||
/** | |||
* Auto-generated copy method. | |||
*/ | |||
static __inline__ void | |||
@@ -117,7 +123,7 @@ copy_extensible ( | |||
const struct extensible_t* ds | |||
) __attribute__((unused,always_inline)); | |||
/* | |||
/** | |||
* Auto-generated copy method. | |||
*/ | |||
static __inline__ void | |||
@@ -126,7 +132,7 @@ copy_tw_extensible ( | |||
const struct tw_extensible_t* ds | |||
) __attribute__((unused,always_inline)); | |||
/* | |||
/** | |||
* Auto-generated copy method. | |||
*/ | |||
static __inline__ void | |||
@@ -135,7 +141,7 @@ copy_tw_niels ( | |||
const struct tw_niels_t* ds | |||
) __attribute__((unused,always_inline)); | |||
/* | |||
/** | |||
* Auto-generated copy method. | |||
*/ | |||
static __inline__ void | |||
@@ -144,7 +150,7 @@ copy_tw_pniels ( | |||
const struct tw_pniels_t* ds | |||
) __attribute__((unused,always_inline)); | |||
/* | |||
/** | |||
* Returns 1/sqrt(+- x). | |||
* | |||
* The Legendre symbol of the result is the same as that of the | |||
@@ -158,7 +164,7 @@ p448_isr ( | |||
const struct p448_t* x | |||
); | |||
/* | |||
/** | |||
* Returns 1/x. | |||
* | |||
* If x=0, returns 0. | |||
@@ -169,56 +175,80 @@ p448_inverse ( | |||
const struct p448_t* x | |||
); | |||
/* | |||
/** | |||
* Add two points on a twisted Edwards curve, one in Extensible form | |||
* and the other in half-Niels form. | |||
*/ | |||
void | |||
add_tw_niels_to_tw_extensible ( | |||
struct tw_extensible_t* d, | |||
const struct tw_niels_t* e | |||
); | |||
/** | |||
* Add two points on a twisted Edwards curve, one in Extensible form | |||
* and the other in half-Niels form. | |||
*/ | |||
void | |||
p448_tw_extensible_add_niels ( | |||
sub_tw_niels_from_tw_extensible ( | |||
struct tw_extensible_t* d, | |||
const struct tw_niels_t* e | |||
); | |||
/* | |||
/** | |||
* Add two points on a twisted Edwards curve, one in Extensible form | |||
* and the other in projective Niels form. | |||
*/ | |||
void | |||
p448_tw_extensible_add_pniels ( | |||
add_tw_pniels_to_tw_extensible ( | |||
struct tw_extensible_t* e, | |||
const struct tw_pniels_t* a | |||
); | |||
/* | |||
/** | |||
* Add two points on a twisted Edwards curve, one in Extensible form | |||
* and the other in projective Niels form. | |||
*/ | |||
void | |||
sub_tw_pniels_from_tw_extensible ( | |||
struct tw_extensible_t* e, | |||
const struct tw_pniels_t* a | |||
); | |||
/** | |||
* Double a point on a twisted Edwards curve, in "extensible" coordinates. | |||
*/ | |||
void | |||
p448_tw_extensible_double ( | |||
double_tw_extensible ( | |||
struct tw_extensible_t* a | |||
); | |||
/* | |||
/** | |||
* Double a point on an Edwards curve, in "extensible" coordinates. | |||
*/ | |||
void | |||
p448_extensible_double ( | |||
double_extensible ( | |||
struct extensible_t* a | |||
); | |||
/* | |||
* 4-isogeny from untwisted to twisted. | |||
/** | |||
* Double a point, and transfer it to the twisted curve. | |||
* | |||
* That is, apply the 4-isogeny. | |||
*/ | |||
void | |||
p448_isogeny_un_to_tw ( | |||
twist_and_double ( | |||
struct tw_extensible_t* b, | |||
const struct extensible_t* a | |||
); | |||
/* | |||
* Dual 4-isogeny from twisted to untwisted. | |||
/** | |||
* Double a point, and transfer it to the untwisted curve. | |||
* | |||
* That is, apply the dual isogeny. | |||
*/ | |||
void | |||
p448_isogeny_tw_to_un ( | |||
untwist_and_double ( | |||
struct extensible_t* b, | |||
const struct tw_extensible_t* a | |||
); | |||
@@ -260,49 +290,82 @@ convert_tw_niels_to_tw_extensible ( | |||
); | |||
void | |||
p448_montgomery_step ( | |||
montgomery_step ( | |||
struct montgomery_t* a | |||
); | |||
void | |||
p448_montgomery_serialize ( | |||
serialize_montgomery ( | |||
struct p448_t* sign, | |||
struct p448_t* ser, | |||
const struct montgomery_t* a, | |||
const struct p448_t* sbz | |||
); | |||
/* | |||
* Serialize a point on an Edwards curve | |||
* The serialized form would be sqrt((z-y)/(z+y)) with sign of xz | |||
/** | |||
* Serialize a point on an Edwards curve. | |||
* | |||
* The serialized form would be sqrt((z-y)/(z+y)) with sign of xz. | |||
* | |||
* It would be on 4y^2/(1-d) = x^3 + 2(1+d)/(1-d) * x^2 + x. | |||
* | |||
* But 4/(1-d) isn't square, so we need to twist it: | |||
* | |||
* -x is on 4y^2/(d-1) = x^3 + 2(d+1)/(d-1) * x^2 + x | |||
*/ | |||
void | |||
extensible_serialize ( | |||
serialize_extensible ( | |||
struct p448_t* b, | |||
const struct extensible_t* a | |||
); | |||
/* | |||
/** | |||
* | |||
*/ | |||
void | |||
isogeny_and_serialize ( | |||
untwist_and_double_and_serialize ( | |||
struct p448_t* b, | |||
const struct tw_extensible_t* a | |||
); | |||
/* | |||
* Deserialize a point to an untwisted affine curve | |||
/** | |||
* Expensive transfer from untwisted to twisted. Roughly equivalent to halve and isogeny. | |||
* Correctly transfers point of order 2. | |||
* | |||
* Can't have x=+1 (it's not even). There is code to fix the exception that would otherwise | |||
* occur at (0,1). | |||
* | |||
* Input point must be even. | |||
*/ | |||
void | |||
twist ( | |||
struct tw_extensible_t* b, | |||
const struct extensible_t* a | |||
); | |||
/** | |||
* Deserialize a point to an untwisted affine curve. | |||
*/ | |||
mask_t | |||
affine_deserialize ( | |||
deserialize_affine ( | |||
struct affine_t* a, | |||
const struct p448_t* sz | |||
); | |||
/** | |||
* Deserialize a point and transfer it to the twist. | |||
* | |||
* Not guaranteed to preserve the 4-torsion component. | |||
* | |||
* Refuses to deserialize +-1, which are the points of order 2. | |||
*/ | |||
mask_t | |||
deserialize_and_twist_approx ( | |||
struct tw_extensible_t* a, | |||
const struct p448_t* sdm1, | |||
const struct p448_t* sz | |||
); | |||
void | |||
set_identity_extensible ( | |||
struct extensible_t* a | |||
@@ -343,17 +406,17 @@ elligator_2s_inject ( | |||
); | |||
mask_t | |||
p448_affine_validate ( | |||
validate_affine ( | |||
const struct affine_t* a | |||
); | |||
/* | |||
/** | |||
* Check the invariants for struct tw_extensible_t. | |||
* PERF: This function was automatically generated | |||
* with no regard for speed. | |||
*/ | |||
mask_t | |||
p448_tw_extensible_validate ( | |||
validate_tw_extensible ( | |||
const struct tw_extensible_t* ext | |||
); | |||
@@ -437,4 +500,4 @@ copy_tw_pniels ( | |||
}; /* extern "C" */ | |||
#endif | |||
#endif /* __CC_INCLUDED_P448_EDWARDS_H__ */ | |||
#endif /* __CC_INCLUDED_EC_POINT_H__ */ |
@@ -1,3 +1,5 @@ | |||
_goldilocks_init | |||
_goldilocks_keygen | |||
_goldilocks_shared_secret | |||
_goldilocks_sign | |||
_goldilocks_verify |
@@ -1,11 +1,14 @@ | |||
/* Copyright (c) 2014 Cryptography Research, Inc. | |||
* Released under the MIT License. See LICENSE.txt for license information. | |||
*/ | |||
#include <errno.h> | |||
#include "goldilocks.h" | |||
#include "ec_point.h" | |||
#include "scalarmul.h" | |||
#include "barrett_field.h" | |||
#include "crandom.h" | |||
#include "sha512.h" | |||
#ifndef GOLDILOCKS_RANDOM_INIT_FILE | |||
#define GOLDILOCKS_RANDOM_INIT_FILE "/dev/urandom" | |||
@@ -28,6 +31,14 @@ const struct affine_t goldilocks_base_point = { | |||
{{ 19, 0, 0, 0, 0, 0, 0, 0 }} | |||
}; | |||
// /* TODO: direct */ | |||
// void | |||
// transfer_and_serialize(struct p448_t *out, const struct tw_extensible_t *twext) { | |||
// struct extensible_t ext; | |||
// transfer_tw_to_un(&ext, twext); | |||
// serialize_extensible(out, &ext); | |||
// } | |||
// FIXME: threading | |||
// TODO: autogen instead of init | |||
struct { | |||
@@ -37,16 +48,17 @@ struct { | |||
} goldilocks_global; | |||
int | |||
goldilocks_init() { | |||
goldilocks_init () { | |||
struct extensible_t ext; | |||
struct tw_extensible_t text; | |||
/* Sanity check: the base point is on the curve. */ | |||
assert(p448_affine_validate(&goldilocks_base_point)); | |||
assert(validate_affine(&goldilocks_base_point)); | |||
/* Convert it to twisted Edwards. */ | |||
convert_affine_to_extensible(&ext, &goldilocks_base_point); | |||
p448_isogeny_un_to_tw(&text, &ext); | |||
twist(&text, &ext); | |||
//p448_transfer_un_to_tw(&text, &ext); | |||
/* Precompute the tables. */ | |||
precompute_for_combs(goldilocks_global.combs, &text, 5, 5, 18); | |||
@@ -58,61 +70,6 @@ goldilocks_init() { | |||
GOLDILOCKS_RANDOM_RESEEDS_MANDATORY); | |||
} | |||
// TODO: move to a better place | |||
// TODO: word size | |||
void | |||
p448_serialize(uint8_t *serial, const struct p448_t *x) { | |||
int i,j; | |||
p448_t red; | |||
p448_copy(&red, x); | |||
p448_strong_reduce(&red); | |||
for (i=0; i<8; i++) { | |||
for (j=0; j<7; j++) { | |||
serial[7*i+j] = red.limb[i]; | |||
red.limb[i] >>= 8; | |||
} | |||
assert(red.limb[i] == 0); | |||
} | |||
} | |||
void | |||
q448_serialize(uint8_t *serial, const word_t x[7]) { | |||
int i,j; | |||
for (i=0; i<7; i++) { | |||
for (j=0; j<8; j++) { | |||
serial[8*i+j] = x[i]>>(8*j); | |||
} | |||
} | |||
} | |||
mask_t | |||
q448_deserialize(word_t x[7], const uint8_t serial[56]) { | |||
int i,j; | |||
for (i=0; i<7; i++) { | |||
word_t out = 0; | |||
for (j=0; j<8; j++) { | |||
out |= ((word_t)serial[8*i+j])<<(8*j); | |||
} | |||
x[i] = out; | |||
} | |||
// TODO: check for reduction | |||
return MASK_SUCCESS; | |||
} | |||
mask_t | |||
p448_deserialize(p448_t *x, const uint8_t serial[56]) { | |||
int i,j; | |||
for (i=0; i<8; i++) { | |||
word_t out = 0; | |||
for (j=0; j<7; j++) { | |||
out |= ((word_t)serial[7*i+j])<<(8*j); | |||
} | |||
x->limb[i] = out; | |||
} | |||
// TODO: check for reduction | |||
return MASK_SUCCESS; | |||
} | |||
static word_t | |||
q448_lo[4] = { | |||
0xdc873d6d54a7bb0dull, | |||
@@ -121,10 +78,22 @@ q448_lo[4] = { | |||
0x000000008335dc16ull | |||
}; | |||
static const struct p448_t | |||
sqrt_d_minus_1 = {{ | |||
0xd2e21836749f46ull, | |||
0x888db42b4f0179ull, | |||
0x5a189aabdeea38ull, | |||
0x51e65ca6f14c06ull, | |||
0xa49f7b424d9770ull, | |||
0xdcac4628c5f656ull, | |||
0x49443b8748734aull, | |||
0x12fec0c0b25b7aull | |||
}}; | |||
int | |||
goldilocks_keygen( | |||
uint8_t private[56], | |||
uint8_t public[56] | |||
goldilocks_keygen ( | |||
struct goldilocks_private_key_t *privkey, | |||
struct goldilocks_public_key_t *pubkey | |||
) { | |||
// TODO: check for init. Also maybe take CRANDOM object? API... | |||
word_t sk[448*2/WORD_BITS]; | |||
@@ -134,35 +103,197 @@ goldilocks_keygen( | |||
int ret = crandom_generate(&goldilocks_global.rand, (unsigned char *)sk, sizeof(sk)); | |||
barrett_reduce(sk,sizeof(sk)/sizeof(sk[0]),0,q448_lo,7,4,62); // TODO word size | |||
q448_serialize(private, sk); | |||
q448_serialize(privkey->opaque, sk); | |||
edwards_comb(&exta, sk, goldilocks_global.combs, 5, 5, 18); | |||
isogeny_and_serialize(&pk, &exta); | |||
p448_serialize(public, &pk); | |||
//transfer_and_serialize_qtor(&pk, &sqrt_d_minus_1, &exta); | |||
untwist_and_double_and_serialize(&pk, &exta); | |||
p448_serialize(pubkey->opaque, &pk); | |||
memcpy(&privkey->opaque[56], pubkey->opaque, 56); | |||
int ret2 = crandom_generate(&goldilocks_global.rand, &privkey->opaque[112], 32); | |||
if (!ret) ret = ret2; | |||
return ret; | |||
return ret ? GOLDI_ENODICE : GOLDI_EOK; | |||
} | |||
int | |||
goldilocks_shared_secret( | |||
uint8_t shared[56], | |||
const uint8_t private[56], | |||
const uint8_t public[56] | |||
goldilocks_shared_secret ( | |||
uint8_t shared[64], | |||
const struct goldilocks_private_key_t *my_privkey, | |||
const struct goldilocks_public_key_t *your_pubkey | |||
) { | |||
// TODO: SHA | |||
word_t sk[448/WORD_BITS]; | |||
struct p448_t pk; | |||
mask_t succ = p448_deserialize(&pk,public); | |||
succ &= q448_deserialize(sk,private); | |||
mask_t succ = p448_deserialize(&pk,your_pubkey->opaque), msucc = -1; | |||
#ifdef EXPERIMENT_ECDH_STIR_IN_PUBKEYS | |||
struct p448_t sum, prod; | |||
msucc &= p448_deserialize(&sum,&my_privkey->opaque[56]); | |||
p448_mul(&prod,&pk,&sum); | |||
p448_add(&sum,&pk,&sum); | |||
#endif | |||
msucc &= q448_deserialize(sk,my_privkey->opaque); | |||
succ &= p448_montgomery_ladder(&pk,&pk,sk,446,2); | |||
p448_serialize(shared,&pk); | |||
// TODO: hash | |||
if (succ) { | |||
return 0; | |||
} else { | |||
return -1; | |||
/* obliterate records of our failure by adjusting with obliteration key */ | |||
struct sha512_ctx_t ctx; | |||
sha512_init(&ctx); | |||
#ifdef EXPERIMENT_ECDH_OBLITERATE_CT | |||
uint8_t oblit[40]; | |||
unsigned i; | |||
for (i=0; i<8; i++) { | |||
oblit[i] = "noshared"[i] & ~(succ&msucc); | |||
} | |||
for (i=0; i<32; i++) { | |||
oblit[8+i] = my_privkey->opaque[112+i] & ~(succ&msucc); | |||
} | |||
sha512_update(&ctx, oblit, 40); | |||
#endif | |||
#ifdef EXPERIMENT_ECDH_STIR_IN_PUBKEYS | |||
/* stir in the sum and product of the pubkeys. */ | |||
uint8_t a_pk[56]; | |||
p448_serialize(a_pk, &sum); | |||
sha512_update(&ctx, a_pk, 56); | |||
p448_serialize(a_pk, &prod); | |||
sha512_update(&ctx, a_pk, 56); | |||
#endif | |||
/* stir in the shared key and finish */ | |||
sha512_update(&ctx, shared, 56); | |||
sha512_final(&ctx, shared); | |||
return (GOLDI_ECORRUPT & ~msucc) | |||
| (GOLDI_EINVAL & msucc &~ succ) | |||
| (GOLDI_EOK & msucc & succ); | |||
} | |||
int | |||
goldilocks_sign ( | |||
uint8_t signature_out[56*2], | |||
const uint8_t *message, | |||
uint64_t message_len, | |||
const struct goldilocks_private_key_t *privkey | |||
) { | |||
/* challenge = H(pk, [nonceG], message). FIXME: endian. */ | |||
word_t skw[448/WORD_BITS]; | |||
mask_t succ = q448_deserialize(skw,privkey->opaque); | |||
if (!succ) { | |||
memset(skw,0,sizeof(skw)); | |||
return GOLDI_ECORRUPT; | |||
} | |||
/* Derive a nonce. TODO: use HMAC. FIXME: endian. FUTURE: factor. */ | |||
word_t tk[512/WORD_BITS]; | |||
struct sha512_ctx_t ctx; | |||
sha512_init(&ctx); | |||
sha512_update(&ctx, (const unsigned char *)"signonce", 8); | |||
sha512_update(&ctx, &privkey->opaque[112], 32); | |||
sha512_update(&ctx, message, message_len); | |||
sha512_update(&ctx, &privkey->opaque[112], 32); | |||
sha512_final(&ctx, (unsigned char *)tk); | |||
barrett_reduce(tk,512/WORD_BITS,0,q448_lo,7,4,62); // TODO word size | |||
/* 4[nonce]G */ | |||
uint8_t signature_tmp[56]; | |||
struct tw_extensible_t exta; | |||
struct p448_t gsk; | |||
edwards_comb(&exta, tk, goldilocks_global.combs, 5, 5, 18); | |||
double_tw_extensible(&exta); | |||
untwist_and_double_and_serialize(&gsk, &exta); | |||
p448_serialize(signature_tmp, &gsk); | |||
word_t challenge[512/WORD_BITS]; | |||
sha512_update(&ctx, &privkey->opaque[56], 56); | |||
sha512_update(&ctx, signature_tmp, 56); | |||
sha512_update(&ctx, message, message_len); | |||
sha512_final(&ctx, (unsigned char *)challenge); | |||
// reduce challenge and sub. | |||
barrett_negate(challenge,512/WORD_BITS,q448_lo,7,4,62); | |||
barrett_mac( | |||
tk,512/WORD_BITS, | |||
challenge,512/WORD_BITS, | |||
skw,448/WORD_BITS, | |||
q448_lo,7,4,62 | |||
); | |||
word_t carry = add_nr_ext_packed(tk,tk,512/WORD_BITS,tk,512/WORD_BITS,-1); | |||
barrett_reduce(tk,512/WORD_BITS,carry,q448_lo,7,4,62); | |||
memcpy(signature_out, signature_tmp, 56); | |||
q448_serialize(signature_out+56, tk); | |||
memset((unsigned char *)tk,0,sizeof(tk)); | |||
memset((unsigned char *)skw,0,sizeof(skw)); | |||
memset((unsigned char *)challenge,0,sizeof(challenge)); | |||
/* response = 2(nonce_secret - sk*challenge) | |||
* Nonce = 8[nonce_secret]*G | |||
* PK = 2[sk]*G, except doubled (TODO) | |||
* so [2] ( [response]G + 2[challenge]PK ) = Nonce | |||
*/ | |||
return 0; | |||
} | |||
int | |||
goldilocks_verify ( | |||
const uint8_t signature[56*2], | |||
const uint8_t *message, | |||
uint64_t message_len, | |||
const struct goldilocks_public_key_t *pubkey | |||
) { | |||
struct p448_t pk; | |||
word_t s[448/WORD_BITS]; | |||
mask_t succ = p448_deserialize(&pk,pubkey->opaque); | |||
if (!succ) return EINVAL; | |||
succ = q448_deserialize(s, &signature[56]); | |||
if (!succ) return EINVAL; | |||
/* challenge = H(pk, [nonceG], message). FIXME: endian. */ | |||
word_t challenge[512/WORD_BITS]; | |||
struct sha512_ctx_t ctx; | |||
sha512_init(&ctx); | |||
sha512_update(&ctx, pubkey->opaque, 56); | |||
sha512_update(&ctx, signature, 56); | |||
sha512_update(&ctx, message, message_len); | |||
sha512_final(&ctx, (unsigned char *)challenge); | |||
barrett_reduce(challenge,512/WORD_BITS,0,q448_lo,7,4,62); | |||
struct p448_t eph; | |||
struct tw_extensible_t pk_text; | |||
/* deserialize [nonce]G */ | |||
succ = p448_deserialize(&eph, signature); | |||
if (!succ) return EINVAL; | |||
// succ = affine_deserialize(&pk_aff,&pk); | |||
// if (!succ) return EINVAL; | |||
// | |||
// convert_affine_to_extensible(&pk_ext,&pk_aff); | |||
// transfer_un_to_tw(&pk_text,&pk_ext); | |||
succ = deserialize_and_twist_approx(&pk_text, &sqrt_d_minus_1, &pk); | |||
if (!succ) return EINVAL; | |||
edwards_combo_var_fixed_vt( &pk_text, challenge, s, goldilocks_global.wnafs, 5 ); | |||
untwist_and_double_and_serialize( &pk, &pk_text ); | |||
p448_sub(&eph, &eph, &pk); | |||
p448_bias(&eph, 2); | |||
succ = p448_is_zero(&eph); | |||
return succ ? 0 : GOLDI_EINVAL; | |||
} |
@@ -2,30 +2,167 @@ | |||
* Released under the MIT License. See LICENSE.txt for license information. | |||
*/ | |||
/** | |||
* @file goldilocks.h | |||
* @author Mike Hamburg | |||
* @brief Goldilocks high-level functions. | |||
*/ | |||
#ifndef __GOLDILOCKS_H__ | |||
#define __GOLDILOCKS_H__ 1 | |||
#include <stdint.h> | |||
/** | |||
* @brief Serialized form of a Goldilocks public key. | |||
* | |||
* @warning This isn't even my final form! | |||
*/ | |||
struct goldilocks_public_key_t { | |||
uint8_t opaque[56]; /**< Serialized data. */ | |||
}; | |||
/** | |||
* @brief Serialized form of a Goldilocks private key. | |||
* | |||
* Contains 56 bytes of actual private key, 56 bytes of | |||
* public key, and 32 bytes of symmetric key for randomization. | |||
* | |||
* @warning This isn't even my final form! | |||
*/ | |||
struct goldilocks_private_key_t { | |||
uint8_t opaque[144]; /**< Serialized data. */ | |||
}; | |||
#ifdef __cplusplus | |||
extern "C" { | |||
#endif | |||
/** @brief No error. */ | |||
static const int GOLDI_EOK = 0; | |||
/** @brief Error: your key is corrupt. */ | |||
static const int GOLDI_ECORRUPT = 44801; | |||
/** @brief Error: other party's key is corrupt. */ | |||
static const int GOLDI_EINVAL = 44802; | |||
/** @brief Error: not enough entropy. */ | |||
static const int GOLDI_ENODICE = 44804; | |||
/** | |||
* @brief Initialize Goldilocks' precomputed tables and | |||
* random number generator. | |||
* @retval GOLDI_EOK Success. | |||
* @retval Nonzero An error occurred. | |||
*/ | |||
int | |||
goldilocks_init(); | |||
/** | |||
* @brief Generate a new random keypair. | |||
* @param [out] privkey The generated private key. | |||
* @param [out] pubkey The generated public key. | |||
* | |||
* @warning This isn't even my final form! | |||
* | |||
* @retval GOLDI_EOK Success. | |||
* @retval GOLDI_ENODICE Insufficient entropy. | |||
*/ | |||
int | |||
goldilocks_keygen( | |||
uint8_t private[56], | |||
uint8_t public[56] | |||
); | |||
goldilocks_keygen ( | |||
struct goldilocks_private_key_t *privkey, | |||
struct goldilocks_public_key_t *pubkey | |||
) __attribute__((warn_unused_result)); | |||
/** | |||
* @brief Generate a Diffie-Hellman shared secret in constant time. | |||
* | |||
* This function uses some compile-time flags whose merit remains to | |||
* be decided. | |||
* | |||
* If the flag EXPERIMENT_ECDH_OBLITERATE_CT is set, prepend 40 bytes | |||
* of zeros to the secret before hashing. In the case that the other | |||
* party's key is detectably corrupt, instead the symmetric part | |||
* of the secret key is used to produce a pseudorandom value. | |||
* | |||
* If EXPERIMENT_ECDH_STIR_IN_PUBKEYS is set, the sum and product of | |||
* the two parties' public keys is prepended to the hash. | |||
* | |||
* @warning This isn't even my final form! | |||
* | |||
* @param [out] shared The shared secret established with the other party. | |||
* @param [in] my_privkey My private key. | |||
* @param [in] your_pubkey The other party's public key. | |||
* | |||
* @retval GOLDI_EOK Success. | |||
* @retval GOLDI_ECORRUPT My key is corrupt. | |||
* @retval GOLDI_EINVAL The other party's key is corrupt. | |||
*/ | |||
int | |||
goldilocks_shared_secret( | |||
uint8_t shared[56], | |||
const uint8_t private[56], | |||
const uint8_t public[56] | |||
goldilocks_shared_secret ( | |||
uint8_t shared[64], | |||
const struct goldilocks_private_key_t *my_privkey, | |||
const struct goldilocks_public_key_t *your_pubkey | |||
) __attribute__((warn_unused_result)); | |||
/** | |||
* @brief Sign a message. | |||
* | |||
* The signature is deterministic, using the symmetric secret found in the | |||
* secret key to form a nonce. | |||
* | |||
* The technique used in signing is a modified Schnorr system, like EdDSA. | |||
* | |||
* @warning This isn't even my final form! | |||
* @warning This function contains endian bugs. (TODO) | |||
* | |||
* @param [out] signature_out Space for the output signature. | |||
* @param [in] message The message to be signed. | |||
* @param [in] message_len The length of the message to be signed. | |||
* @param [in] privkey My private key. | |||
* | |||
* @retval GOLDI_EOK Success. | |||
* @retval GOLDI_ECORRUPT My key is corrupt. | |||
*/ | |||
int | |||
goldilocks_sign ( | |||
uint8_t signature_out[56*2], | |||
const uint8_t *message, | |||
uint64_t message_len, | |||
const struct goldilocks_private_key_t *privkey | |||
); | |||
/** | |||
* @brief Verify a signature. | |||
* | |||
* This function is fairly strict. It will correctly detect when | |||
* the signature has the wrong cofactor companent. Once deserialization | |||
* of numbers is strictified (TODO) it will limit the response to being | |||
* less than q as well. | |||
* | |||
* Currently this function does not detect when the public key is weird, | |||
* eg 0, has cofactor, etc. As a result, a party with a bogus public | |||
* key could create signatures that succeed on some systems and fail on | |||
* others. | |||
* | |||
* @warning This isn't even my final form! | |||
* @warning This function contains endian bugs. (TODO) | |||
* | |||
* @param [out] signature_out Space for the output signature. | |||
* @param [in] message The message to be signed. | |||
* @param [in] message_len The length of the message to be signed. | |||
* @param [in] privkey My private key. | |||
* | |||
* @retval GOLDI_EOK Success. | |||
* @retval GOLDI_ECORRUPT My key is corrupt. | |||
*/ | |||
int | |||
goldilocks_verify ( | |||
const uint8_t signature[56*2], | |||
const uint8_t *message, | |||
uint64_t message_len, | |||
const struct goldilocks_public_key_t *pubkey | |||
) __attribute__((warn_unused_result)); | |||
#ifdef __cplusplus | |||
}; /* extern "C" */ | |||
@@ -3,7 +3,9 @@ | |||
* Released under the MIT License. See LICENSE.txt for license information. | |||
*/ | |||
/* cRandom intrinsics header. */ | |||
/** @file crandom.h | |||
* @brief cRandom intrinsics header. | |||
*/ | |||
#ifndef __CRANDOM_INTRINSICS_H__ | |||
#define __CRANDOM_INTRINSICS_H__ 1 | |||
@@ -22,6 +24,7 @@ | |||
#define XOP 16 | |||
#define AVX 32 | |||
#define AVX2 64 | |||
#define RDRAND 128 | |||
INTRINSIC u_int64_t rdtsc() { | |||
u_int64_t out = 0; | |||
@@ -31,6 +34,15 @@ INTRINSIC u_int64_t rdtsc() { | |||
return out; | |||
} | |||
/** | |||
* Return x unchanged, but confuse the compiler. | |||
* | |||
* This is mainly for use in test scripts, to prevent the value from | |||
* being constant-folded or removed by dead code elimination. | |||
* | |||
* @param x A 64-bit number. | |||
* @return The same number in a register. | |||
*/ | |||
INTRINSIC u_int64_t opacify(u_int64_t x) { | |||
__asm__ volatile("mov %0, %0" : "+r"(x)); | |||
return x; | |||
@@ -87,6 +99,12 @@ INTRINSIC ssereg sse2_rotate(int r, ssereg a) { | |||
#ifdef __AES__ | |||
/* don't include intrinsics file, because not all platforms have it */ | |||
# define MIGHT_HAVE_AESNI 1 | |||
# ifndef MIGHT_HAVE_RDRAND | |||
# define MIGHT_HAVE_RDRAND 1 | |||
# endif | |||
# ifndef MUST_HAVE_RDRAND | |||
# define MUST_HAVE_RDRAND 0 | |||
# endif | |||
# ifndef MUST_HAVE_AESNI | |||
# define MUST_HAVE_AESNI 0 | |||
# endif | |||
@@ -112,6 +130,8 @@ INTRINSIC ssereg aesenclast(ssereg subkey, ssereg block) { | |||
#else | |||
# define MIGHT_HAVE_AESNI 0 | |||
# define MUST_HAVE_AESNI 0 | |||
# define MIGHT_HAVE_RDRAND 0 | |||
# define MUST_HAVE_RDRAND 0 | |||
#endif | |||
#ifdef __XOP__ | |||
@@ -131,20 +151,22 @@ INTRINSIC ssereg xop_rotate(int amount, ssereg x) { | |||
#endif | |||
#define MIGHT_MASK \ | |||
( SSE2 * MIGHT_HAVE_SSE2 \ | |||
| SSSE3 * MIGHT_HAVE_SSSE3 \ | |||
| AESNI * MIGHT_HAVE_AESNI \ | |||
| XOP * MIGHT_HAVE_XOP \ | |||
| AVX * MIGHT_HAVE_AVX \ | |||
| AVX2 * MIGHT_HAVE_AVX2) | |||
( SSE2 * MIGHT_HAVE_SSE2 \ | |||
| SSSE3 * MIGHT_HAVE_SSSE3 \ | |||
| AESNI * MIGHT_HAVE_AESNI \ | |||
| XOP * MIGHT_HAVE_XOP \ | |||
| AVX * MIGHT_HAVE_AVX \ | |||
| RDRAND * MIGHT_HAVE_RDRAND \ | |||
| AVX2 * MIGHT_HAVE_AVX2) | |||
#define MUST_MASK \ | |||
( SSE2 * MUST_HAVE_SSE2 \ | |||
| SSSE3 * MUST_HAVE_SSSE3 \ | |||
| AESNI * MUST_HAVE_AESNI \ | |||
| XOP * MUST_HAVE_XOP \ | |||
| AVX * MUST_HAVE_AVX \ | |||
| AVX2 * MUST_HAVE_AVX2 ) | |||
( SSE2 * MUST_HAVE_SSE2 \ | |||
| SSSE3 * MUST_HAVE_SSSE3 \ | |||
| AESNI * MUST_HAVE_AESNI \ | |||
| XOP * MUST_HAVE_XOP \ | |||
| AVX * MUST_HAVE_AVX \ | |||
| RDRAND * MUST_HAVE_RDRAND \ | |||
| AVX2 * MUST_HAVE_AVX2 ) | |||
#define MIGHT_HAVE(feature) ((MIGHT_MASK & feature) == feature) | |||
#define MUST_HAVE(feature) ((MUST_MASK & feature) == feature) | |||
@@ -5,383 +5,442 @@ | |||
#include "p448.h" | |||
#include "x86-64-arith.h" | |||
void p448_mul(p448_t *__restrict__ cs, const p448_t *as, const p448_t *bs) { | |||
const uint64_t *a = as->limb, *b = bs->limb; | |||
uint64_t *c = cs->limb; | |||
void | |||
p448_mul ( | |||
p448_t *__restrict__ cs, | |||
const p448_t *as, | |||
const p448_t *bs | |||
) { | |||
const uint64_t *a = as->limb, *b = bs->limb; | |||
uint64_t *c = cs->limb; | |||
__uint128_t accum0 = 0, accum1 = 0, accum2; | |||
uint64_t mask = (1ull<<56) - 1; | |||
uint64_t aa[4], bb[4]; | |||
/* For some reason clang doesn't vectorize this without prompting? */ | |||
unsigned int i; | |||
for (i=0; i<sizeof(aa)/sizeof(uint64xn_t); i++) { | |||
((uint64xn_t*)aa)[i] = ((const uint64xn_t*)a)[i] + ((const uint64xn_t*)(&a[4]))[i]; | |||
((uint64xn_t*)bb)[i] = ((const uint64xn_t*)b)[i] + ((const uint64xn_t*)(&b[4]))[i]; | |||
} | |||
/* | |||
for (int i=0; i<4; i++) { | |||
uint64_t mask = (1ull<<56) - 1; | |||
uint64_t aa[4], bb[4]; | |||
/* For some reason clang doesn't vectorize this without prompting? */ | |||
unsigned int i; | |||
for (i=0; i<sizeof(aa)/sizeof(uint64xn_t); i++) { | |||
((uint64xn_t*)aa)[i] = ((const uint64xn_t*)a)[i] + ((const uint64xn_t*)(&a[4]))[i]; | |||
((uint64xn_t*)bb)[i] = ((const uint64xn_t*)b)[i] + ((const uint64xn_t*)(&b[4]))[i]; | |||
} | |||
/* | |||
for (int i=0; i<4; i++) { | |||
aa[i] = a[i] + a[i+4]; | |||
bb[i] = b[i] + b[i+4]; | |||
} | |||
*/ | |||
accum2 = widemul(&a[0],&b[3]); | |||
accum1 = widemul(&aa[0],&bb[3]); | |||
accum0 = widemul(&a[4],&b[7]); | |||
mac(&accum2, &a[1], &b[2]); | |||
mac(&accum1, &aa[1], &bb[2]); | |||
mac(&accum0, &a[5], &b[6]); | |||
mac(&accum2, &a[2], &b[1]); | |||
mac(&accum1, &aa[2], &bb[1]); | |||
mac(&accum0, &a[6], &b[5]); | |||
mac(&accum2, &a[3], &b[0]); | |||
mac(&accum1, &aa[3], &bb[0]); | |||
mac(&accum0, &a[7], &b[4]); | |||
accum1 -= accum2; | |||
accum0 += accum2; | |||
c[3] = ((uint64_t)(accum0)) & mask; | |||
c[7] = ((uint64_t)(accum1)) & mask; | |||
accum0 >>= 56; | |||
accum1 >>= 56; | |||
{ | |||
accum2 = accum1; | |||
accum1 += accum0; | |||
accum0 = accum2; | |||
} | |||
accum2 = widemul(&a[0],&b[0]); | |||
accum1 -= accum2; | |||
accum0 += accum2; | |||
accum2 = widemul(&aa[1],&bb[3]); | |||
msb(&accum0, &a[1], &b[3]); | |||
mac(&accum1, &a[5], &b[7]); | |||
msb(&accum0, &a[2], &b[2]); | |||
mac(&accum2, &aa[2], &bb[2]); | |||
mac(&accum1, &a[6], &b[6]); | |||
msb(&accum0, &a[3], &b[1]); | |||
mac(&accum1, &a[7], &b[5]); | |||
mac(&accum2, &aa[3], &bb[1]); | |||
accum0 += accum2; | |||
accum1 += accum2; | |||
mac(&accum0, &a[4], &b[4]); | |||
mac(&accum1, &aa[0], &bb[0]); | |||
c[0] = ((uint64_t)(accum0)) & mask; | |||
c[4] = ((uint64_t)(accum1)) & mask; | |||
accum0 >>= 56; | |||
accum1 >>= 56; | |||
accum2 = widemul(&aa[2],&bb[3]); | |||
msb(&accum0, &a[2], &b[3]); | |||
mac(&accum1, &a[6], &b[7]); | |||
mac(&accum2, &aa[3], &bb[2]); | |||
msb(&accum0, &a[3], &b[2]); | |||
mac(&accum1, &a[7], &b[6]); | |||
accum1 += accum2; | |||
accum0 += accum2; | |||
accum2 = widemul(&a[0],&b[1]); | |||
mac(&accum1, &aa[0], &bb[1]); | |||
mac(&accum0, &a[4], &b[5]); | |||
mac(&accum2, &a[1], &b[0]); | |||
mac(&accum1, &aa[1], &bb[0]); | |||
mac(&accum0, &a[5], &b[4]); | |||
accum1 -= accum2; | |||
accum0 += accum2; | |||
c[1] = ((uint64_t)(accum0)) & mask; | |||
c[5] = ((uint64_t)(accum1)) & mask; | |||
accum0 >>= 56; | |||
accum1 >>= 56; | |||
accum2 = widemul(&aa[3],&bb[3]); | |||
msb(&accum0, &a[3], &b[3]); | |||
mac(&accum1, &a[7], &b[7]); | |||
accum1 += accum2; | |||
accum0 += accum2; | |||
accum2 = widemul(&a[0],&b[2]); | |||
mac(&accum1, &aa[0], &bb[2]); | |||
mac(&accum0, &a[4], &b[6]); | |||
mac(&accum2, &a[1], &b[1]); | |||
mac(&accum1, &aa[1], &bb[1]); | |||
mac(&accum0, &a[5], &b[5]); | |||
mac(&accum2, &a[2], &b[0]); | |||
mac(&accum1, &aa[2], &bb[0]); | |||
mac(&accum0, &a[6], &b[4]); | |||
accum1 -= accum2; | |||
accum0 += accum2; | |||
c[2] = ((uint64_t)(accum0)) & mask; | |||
c[6] = ((uint64_t)(accum1)) & mask; | |||
accum0 >>= 56; | |||
accum1 >>= 56; | |||
accum0 += c[3]; | |||
accum1 += c[7]; | |||
c[3] = ((uint64_t)(accum0)) & mask; | |||
c[7] = ((uint64_t)(accum1)) & mask; | |||
/* we could almost stop here, but it wouldn't be stable, so... */ | |||
accum0 >>= 56; | |||
accum1 >>= 56; | |||
c[4] += ((uint64_t)(accum0)) + ((uint64_t)(accum1)); | |||
c[0] += ((uint64_t)(accum1)); | |||
} | |||
*/ | |||
accum2 = widemul(&a[0],&b[3]); | |||
accum1 = widemul(&aa[0],&bb[3]); | |||
accum0 = widemul(&a[4],&b[7]); | |||
mac(&accum2, &a[1], &b[2]); | |||
mac(&accum1, &aa[1], &bb[2]); | |||
mac(&accum0, &a[5], &b[6]); | |||
mac(&accum2, &a[2], &b[1]); | |||
mac(&accum1, &aa[2], &bb[1]); | |||
mac(&accum0, &a[6], &b[5]); | |||
mac(&accum2, &a[3], &b[0]); | |||
mac(&accum1, &aa[3], &bb[0]); | |||
mac(&accum0, &a[7], &b[4]); | |||
accum1 -= accum2; | |||
accum0 += accum2; | |||
c[3] = ((uint64_t)(accum0)) & mask; | |||
c[7] = ((uint64_t)(accum1)) & mask; | |||
accum0 >>= 56; | |||
accum1 >>= 56; | |||
{ | |||
accum2 = accum1; | |||
accum1 += accum0; | |||
accum0 = accum2; | |||
} | |||
accum2 = widemul(&a[0],&b[0]); | |||
accum1 -= accum2; | |||
accum0 += accum2; | |||
accum2 = widemul(&aa[1],&bb[3]); | |||
msb(&accum0, &a[1], &b[3]); | |||
mac(&accum1, &a[5], &b[7]); | |||
msb(&accum0, &a[2], &b[2]); | |||
mac(&accum2, &aa[2], &bb[2]); | |||
mac(&accum1, &a[6], &b[6]); | |||
msb(&accum0, &a[3], &b[1]); | |||
mac(&accum1, &a[7], &b[5]); | |||
mac(&accum2, &aa[3], &bb[1]); | |||
accum0 += accum2; | |||
accum1 += accum2; | |||
mac(&accum0, &a[4], &b[4]); | |||
mac(&accum1, &aa[0], &bb[0]); | |||
c[0] = ((uint64_t)(accum0)) & mask; | |||
c[4] = ((uint64_t)(accum1)) & mask; | |||
accum0 >>= 56; | |||
accum1 >>= 56; | |||
accum2 = widemul(&aa[2],&bb[3]); | |||
msb(&accum0, &a[2], &b[3]); | |||
mac(&accum1, &a[6], &b[7]); | |||
mac(&accum2, &aa[3], &bb[2]); | |||
msb(&accum0, &a[3], &b[2]); | |||
mac(&accum1, &a[7], &b[6]); | |||
accum1 += accum2; | |||
accum0 += accum2; | |||
accum2 = widemul(&a[0],&b[1]); | |||
mac(&accum1, &aa[0], &bb[1]); | |||
mac(&accum0, &a[4], &b[5]); | |||
mac(&accum2, &a[1], &b[0]); | |||
mac(&accum1, &aa[1], &bb[0]); | |||
mac(&accum0, &a[5], &b[4]); | |||
accum1 -= accum2; | |||
accum0 += accum2; | |||
c[1] = ((uint64_t)(accum0)) & mask; | |||
c[5] = ((uint64_t)(accum1)) & mask; | |||
accum0 >>= 56; | |||
accum1 >>= 56; | |||
accum2 = widemul(&aa[3],&bb[3]); | |||
msb(&accum0, &a[3], &b[3]); | |||
mac(&accum1, &a[7], &b[7]); | |||
accum1 += accum2; | |||
accum0 += accum2; | |||
accum2 = widemul(&a[0],&b[2]); | |||
mac(&accum1, &aa[0], &bb[2]); | |||
mac(&accum0, &a[4], &b[6]); | |||
mac(&accum2, &a[1], &b[1]); | |||
mac(&accum1, &aa[1], &bb[1]); | |||
mac(&accum0, &a[5], &b[5]); | |||
mac(&accum2, &a[2], &b[0]); | |||
mac(&accum1, &aa[2], &bb[0]); | |||
mac(&accum0, &a[6], &b[4]); | |||
accum1 -= accum2; | |||
accum0 += accum2; | |||
c[2] = ((uint64_t)(accum0)) & mask; | |||
c[6] = ((uint64_t)(accum1)) & mask; | |||
accum0 >>= 56; | |||
accum1 >>= 56; | |||
accum0 += c[3]; | |||
accum1 += c[7]; | |||
c[3] = ((uint64_t)(accum0)) & mask; | |||
c[7] = ((uint64_t)(accum1)) & mask; | |||
/* we could almost stop here, but it wouldn't be stable, so... */ | |||
accum0 >>= 56; | |||
accum1 >>= 56; | |||
c[4] += ((uint64_t)(accum0)) + ((uint64_t)(accum1)); | |||
c[0] += ((uint64_t)(accum1)); | |||
} | |||
void p448_mulw(p448_t *__restrict__ cs, const p448_t *as, uint64_t b) { | |||
const uint64_t *a = as->limb; | |||
uint64_t *c = cs->limb; | |||
__uint128_t accum0, accum4; | |||
uint64_t mask = (1ull<<56) - 1; | |||
accum0 = widemul_rm(b, &a[0]); | |||
accum4 = widemul_rm(b, &a[4]); | |||
c[0] = accum0 & mask; accum0 >>= 56; | |||
c[4] = accum4 & mask; accum4 >>= 56; | |||
mac_rm(&accum0, b, &a[1]); | |||
mac_rm(&accum4, b, &a[5]); | |||
c[1] = accum0 & mask; accum0 >>= 56; | |||
c[5] = accum4 & mask; accum4 >>= 56; | |||
mac_rm(&accum0, b, &a[2]); | |||
mac_rm(&accum4, b, &a[6]); | |||
c[2] = accum0 & mask; accum0 >>= 56; | |||
c[6] = accum4 & mask; accum4 >>= 56; | |||
mac_rm(&accum0, b, &a[3]); | |||
mac_rm(&accum4, b, &a[7]); | |||
c[3] = accum0 & mask; accum0 >>= 56; | |||
c[7] = accum4 & mask; accum4 >>= 56; | |||
c[4] += accum0 + accum4; | |||
c[0] += accum4; | |||
void | |||
p448_mulw ( | |||
p448_t *__restrict__ cs, | |||
const p448_t *as, | |||
uint64_t b | |||
) { | |||
const uint64_t *a = as->limb; | |||
uint64_t *c = cs->limb; | |||
__uint128_t accum0, accum4; | |||
uint64_t mask = (1ull<<56) - 1; | |||
accum0 = widemul_rm(b, &a[0]); | |||
accum4 = widemul_rm(b, &a[4]); | |||
c[0] = accum0 & mask; accum0 >>= 56; | |||
c[4] = accum4 & mask; accum4 >>= 56; | |||
mac_rm(&accum0, b, &a[1]); | |||
mac_rm(&accum4, b, &a[5]); | |||
c[1] = accum0 & mask; accum0 >>= 56; | |||
c[5] = accum4 & mask; accum4 >>= 56; | |||
mac_rm(&accum0, b, &a[2]); | |||
mac_rm(&accum4, b, &a[6]); | |||
c[2] = accum0 & mask; accum0 >>= 56; | |||
c[6] = accum4 & mask; accum4 >>= 56; | |||
mac_rm(&accum0, b, &a[3]); | |||
mac_rm(&accum4, b, &a[7]); | |||
c[3] = accum0 & mask; accum0 >>= 56; | |||
c[7] = accum4 & mask; accum4 >>= 56; | |||
c[4] += accum0 + accum4; | |||
c[0] += accum4; | |||
} | |||
void p448_sqr(p448_t *__restrict__ cs, const p448_t *as) { | |||
const uint64_t *a = as->limb; | |||
uint64_t *c = cs->limb; | |||
__uint128_t accum0 = 0, accum1 = 0, accum2; | |||
uint64_t mask = (1ull<<56) - 1; | |||
uint64_t aa[4]; | |||
/* For some reason clang doesn't vectorize this without prompting? */ | |||
unsigned int i; | |||
for (i=0; i<sizeof(aa)/sizeof(uint64xn_t); i++) { | |||
void | |||
p448_sqr ( | |||
p448_t *__restrict__ cs, | |||
const p448_t *as | |||
) { | |||
const uint64_t *a = as->limb; | |||
uint64_t *c = cs->limb; | |||
__uint128_t accum0 = 0, accum1 = 0, accum2; | |||
uint64_t mask = (1ull<<56) - 1; | |||
uint64_t aa[4]; | |||
/* For some reason clang doesn't vectorize this without prompting? */ | |||
unsigned int i; | |||
for (i=0; i<sizeof(aa)/sizeof(uint64xn_t); i++) { | |||
((uint64xn_t*)aa)[i] = ((const uint64xn_t*)a)[i] + ((const uint64xn_t*)(&a[4]))[i]; | |||
} | |||
accum2 = widemul(&a[0],&a[3]); | |||
accum1 = widemul(&aa[0],&aa[3]); | |||
accum0 = widemul(&a[4],&a[7]); | |||
mac(&accum2, &a[1], &a[2]); | |||
mac(&accum1, &aa[1], &aa[2]); | |||
mac(&accum0, &a[5], &a[6]); | |||
accum1 -= accum2; | |||
accum0 += accum2; | |||
c[3] = ((uint64_t)(accum0))<<1 & mask; | |||
c[7] = ((uint64_t)(accum1))<<1 & mask; | |||
accum0 >>= 55; | |||
accum1 >>= 55; | |||
{ | |||
accum2 = accum1; | |||
accum1 += accum0; | |||
accum0 = accum2; | |||
} | |||
accum2 = widemul(&a[0],&a[0]); | |||
accum1 -= accum2; | |||
accum0 += accum2; | |||
accum2 = widemul2(&aa[1],&aa[3]); | |||
msb2(&accum0, &a[1], &a[3]); | |||
mac2(&accum1, &a[5], &a[7]); | |||
msb(&accum0, &a[2], &a[2]); | |||
mac(&accum2, &aa[2], &aa[2]); | |||
mac(&accum1, &a[6], &a[6]); | |||
accum0 += accum2; | |||
accum1 += accum2; | |||
mac(&accum0, &a[4], &a[4]); | |||
mac(&accum1, &aa[0], &aa[0]); | |||
c[0] = ((uint64_t)(accum0)) & mask; | |||
c[4] = ((uint64_t)(accum1)) & mask; | |||
accum0 >>= 56; | |||
accum1 >>= 56; | |||
accum2 = widemul2(&aa[2],&aa[3]); | |||
msb2(&accum0, &a[2], &a[3]); | |||
mac2(&accum1, &a[6], &a[7]); | |||
accum1 += accum2; | |||
accum0 += accum2; | |||
accum2 = widemul2(&a[0],&a[1]); | |||
mac2(&accum1, &aa[0], &aa[1]); | |||
mac2(&accum0, &a[4], &a[5]); | |||
accum1 -= accum2; | |||
accum0 += accum2; | |||
c[1] = ((uint64_t)(accum0)) & mask; | |||
c[5] = ((uint64_t)(accum1)) & mask; | |||
accum0 >>= 56; | |||
accum1 >>= 56; | |||
accum2 = widemul(&aa[3],&aa[3]); | |||
msb(&accum0, &a[3], &a[3]); | |||
mac(&accum1, &a[7], &a[7]); | |||
accum1 += accum2; | |||
accum0 += accum2; | |||
accum2 = widemul2(&a[0],&a[2]); | |||
mac2(&accum1, &aa[0], &aa[2]); | |||
mac2(&accum0, &a[4], &a[6]); | |||
mac(&accum2, &a[1], &a[1]); | |||
mac(&accum1, &aa[1], &aa[1]); | |||
mac(&accum0, &a[5], &a[5]); | |||
accum1 -= accum2; | |||
accum0 += accum2; | |||
c[2] = ((uint64_t)(accum0)) & mask; | |||
c[6] = ((uint64_t)(accum1)) & mask; | |||
accum0 >>= 56; | |||
accum1 >>= 56; | |||
accum0 += c[3]; | |||
accum1 += c[7]; | |||
c[3] = ((uint64_t)(accum0)) & mask; | |||
c[7] = ((uint64_t)(accum1)) & mask; | |||
/* we could almost stop here, but it wouldn't be stable, so... */ | |||
accum0 >>= 56; | |||
accum1 >>= 56; | |||
c[4] += ((uint64_t)(accum0)) + ((uint64_t)(accum1)); | |||
c[0] += ((uint64_t)(accum1)); | |||
} | |||
accum2 = widemul(&a[0],&a[3]); | |||
accum1 = widemul(&aa[0],&aa[3]); | |||
accum0 = widemul(&a[4],&a[7]); | |||
mac(&accum2, &a[1], &a[2]); | |||
mac(&accum1, &aa[1], &aa[2]); | |||
mac(&accum0, &a[5], &a[6]); | |||
accum1 -= accum2; | |||
accum0 += accum2; | |||
c[3] = ((uint64_t)(accum0))<<1 & mask; | |||
c[7] = ((uint64_t)(accum1))<<1 & mask; | |||
accum0 >>= 55; | |||
accum1 >>= 55; | |||
{ | |||
accum2 = accum1; | |||
accum1 += accum0; | |||
accum0 = accum2; | |||
} | |||
accum2 = widemul(&a[0],&a[0]); | |||
accum1 -= accum2; | |||
accum0 += accum2; | |||
accum2 = widemul2(&aa[1],&aa[3]); | |||
msb2(&accum0, &a[1], &a[3]); | |||
mac2(&accum1, &a[5], &a[7]); | |||
msb(&accum0, &a[2], &a[2]); | |||
mac(&accum2, &aa[2], &aa[2]); | |||
mac(&accum1, &a[6], &a[6]); | |||
accum0 += accum2; | |||
accum1 += accum2; | |||
mac(&accum0, &a[4], &a[4]); | |||
mac(&accum1, &aa[0], &aa[0]); | |||
c[0] = ((uint64_t)(accum0)) & mask; | |||
c[4] = ((uint64_t)(accum1)) & mask; | |||
accum0 >>= 56; | |||
accum1 >>= 56; | |||
accum2 = widemul2(&aa[2],&aa[3]); | |||
msb2(&accum0, &a[2], &a[3]); | |||
mac2(&accum1, &a[6], &a[7]); | |||
accum1 += accum2; | |||
accum0 += accum2; | |||
accum2 = widemul2(&a[0],&a[1]); | |||
mac2(&accum1, &aa[0], &aa[1]); | |||
mac2(&accum0, &a[4], &a[5]); | |||
accum1 -= accum2; | |||
accum0 += accum2; | |||
c[1] = ((uint64_t)(accum0)) & mask; | |||
c[5] = ((uint64_t)(accum1)) & mask; | |||
accum0 >>= 56; | |||
accum1 >>= 56; | |||
accum2 = widemul(&aa[3],&aa[3]); | |||
msb(&accum0, &a[3], &a[3]); | |||
mac(&accum1, &a[7], &a[7]); | |||
accum1 += accum2; | |||
accum0 += accum2; | |||
accum2 = widemul2(&a[0],&a[2]); | |||
mac2(&accum1, &aa[0], &aa[2]); | |||
mac2(&accum0, &a[4], &a[6]); | |||
mac(&accum2, &a[1], &a[1]); | |||
mac(&accum1, &aa[1], &aa[1]); | |||
mac(&accum0, &a[5], &a[5]); | |||
accum1 -= accum2; | |||
accum0 += accum2; | |||
c[2] = ((uint64_t)(accum0)) & mask; | |||
c[6] = ((uint64_t)(accum1)) & mask; | |||
accum0 >>= 56; | |||
accum1 >>= 56; | |||
accum0 += c[3]; | |||
accum1 += c[7]; | |||
c[3] = ((uint64_t)(accum0)) & mask; | |||
c[7] = ((uint64_t)(accum1)) & mask; | |||
/* we could almost stop here, but it wouldn't be stable, so... */ | |||
accum0 >>= 56; | |||
accum1 >>= 56; | |||
c[4] += ((uint64_t)(accum0)) + ((uint64_t)(accum1)); | |||
c[0] += ((uint64_t)(accum1)); | |||
} | |||
static __inline__ void p448_sqr_inplace(p448_t *x) { | |||
p448_t y; | |||
p448_sqr(&y,x); | |||
*x = y; | |||
void | |||
p448_strong_reduce ( | |||
p448_t *a | |||
) { | |||
uint64_t mask = (1ull<<56)-1; | |||
/* first, clear high */ | |||
a->limb[4] += a->limb[7]>>56; | |||
a->limb[0] += a->limb[7]>>56; | |||
a->limb[7] &= mask; | |||
/* now the total is less than 2^448 - 2^(448-56) + 2^(448-56+8) < 2p */ | |||
/* compute total_value - p. No need to reduce mod p. */ | |||
__int128_t scarry = 0; | |||
int i; | |||
for (i=0; i<8; i++) { | |||
scarry = scarry + a->limb[i] - ((i==4)?mask-1:mask); | |||
a->limb[i] = scarry & mask; | |||
scarry >>= 56; | |||
} | |||
/* uncommon case: it was >= p, so now scarry = 0 and this = x | |||
* common case: it was < p, so now scarry = -1 and this = x - p + 2^448 | |||
* so let's add back in p. will carry back off the top for 2^448. | |||
*/ | |||
assert(is_zero(scarry) | is_zero(scarry+1)); | |||
uint64_t scarry_mask = scarry & mask; | |||
__uint128_t carry = 0; | |||
/* add it back */ | |||
for (i=0; i<8; i++) { | |||
carry = carry + a->limb[i] + ((i==4)?(scarry_mask&~1):scarry_mask); | |||
a->limb[i] = carry & mask; | |||
carry >>= 56; | |||
} | |||
assert(is_zero(carry + scarry)); | |||
} | |||
static __inline__ void p448_mul_inplace(p448_t *x, const p448_t *z) { | |||
p448_t y; | |||
p448_mul(&y,x,z); | |||
*x = y; | |||
mask_t | |||
p448_is_zero ( | |||
const struct p448_t *a | |||
) { | |||
struct p448_t b; | |||
p448_copy(&b,a); | |||
p448_strong_reduce(&b); | |||
uint64_t any = 0; | |||
int i; | |||
for (i=0; i<8; i++) { | |||
any |= b.limb[i]; | |||
} | |||
return is_zero(any); | |||
} | |||
static __inline__ void p448_repunit(p448_t *x, int space, int teeth) { | |||
int i,j; | |||
p448_t working = *x; | |||
for (i=0; i<teeth-1; i++) { | |||
for (j=0; j<space-(i?0:1); j++) | |||
p448_sqr_inplace(&working); | |||
if (i==teeth-2) | |||
p448_mul_inplace(x,&working); | |||
else | |||
p448_mul_inplace(&working,x); | |||
} | |||
void | |||
p448_serialize ( | |||
uint8_t *serial, | |||
const struct p448_t *x | |||
) { | |||
int i,j; | |||
p448_t red; | |||
p448_copy(&red, x); | |||
p448_strong_reduce(&red); | |||
for (i=0; i<8; i++) { | |||
for (j=0; j<7; j++) { | |||
serial[7*i+j] = red.limb[i]; | |||
red.limb[i] >>= 8; | |||
} | |||
assert(red.limb[i] == 0); | |||
} | |||
} | |||
void | |||
p448_strong_reduce(p448_t *a) { | |||
uint64_t mask = (1ull<<56)-1; | |||
/* first, clear high */ | |||
a->limb[4] += a->limb[7]>>56; | |||
a->limb[0] += a->limb[7]>>56; | |||
a->limb[7] &= mask; | |||
/* now the total is less than 2^448 - 2^(448-56) + 2^(448-56+8) < 2p */ | |||
/* compute total_value - p. No need to reduce mod p. */ | |||
__int128_t scarry = 0; | |||
int i; | |||
for (i=0; i<8; i++) { | |||
scarry = scarry + a->limb[i] - ((i==4)?mask-1:mask); | |||
a->limb[i] = scarry & mask; | |||
scarry >>= 56; | |||
} | |||
/* uncommon case: it was >= p, so now scarry = 0 and this = x | |||
* common case: it was < p, so now scarry = -1 and this = x - p + 2^448 | |||
* so let's add back in p. will carry back off the top for 2^448. | |||
*/ | |||
assert(is_zero(scarry) | is_zero(scarry+1)); | |||
uint64_t scarry_mask = scarry & mask; | |||
__uint128_t carry = 0; | |||
/* add it back */ | |||
for (i=0; i<8; i++) { | |||
carry = carry + a->limb[i] + ((i==4)?(scarry_mask&~1):scarry_mask); | |||
a->limb[i] = carry & mask; | |||
carry >>= 56; | |||
} | |||
assert(is_zero(carry + scarry)); | |||
q448_serialize ( | |||
uint8_t *serial, | |||
const word_t x[7] | |||
) { | |||
int i,j; | |||
for (i=0; i<7; i++) { | |||
for (j=0; j<8; j++) { | |||
serial[8*i+j] = x[i]>>(8*j); | |||
} | |||
} | |||
} | |||
mask_t | |||
q448_deserialize ( | |||
word_t x[7], | |||
const uint8_t serial[56] | |||
) { | |||
int i,j; | |||
for (i=0; i<7; i++) { | |||
word_t out = 0; | |||
for (j=0; j<8; j++) { | |||
out |= ((word_t)serial[8*i+j])<<(8*j); | |||
} | |||
x[i] = out; | |||
} | |||
/* TODO: check for reduction */ | |||
return MASK_SUCCESS; | |||
} | |||
mask_t p448_is_zero(const struct p448_t *a) { | |||
struct p448_t b; | |||
p448_copy(&b,a); | |||
p448_strong_reduce(&b); | |||
uint64_t any = 0; | |||
int i; | |||
for (i=0; i<8; i++) { | |||
any |= b.limb[i]; | |||
} | |||
return is_zero(any); | |||
mask_t | |||
p448_deserialize ( | |||
p448_t *x, | |||
const uint8_t serial[56] | |||
) { | |||
int i,j; | |||
for (i=0; i<8; i++) { | |||
word_t out = 0; | |||
for (j=0; j<7; j++) { | |||
out |= ((word_t)serial[7*i+j])<<(8*j); | |||
} | |||
x->limb[i] = out; | |||
} | |||
/* TODO: check for reduction */ | |||
return MASK_SUCCESS; | |||
} |
@@ -18,87 +18,141 @@ extern "C" { | |||
#endif | |||
static __inline__ void | |||
p448_set_ui(p448_t *out, | |||
uint64_t x) | |||
__attribute__((unused,always_inline)); | |||
p448_set_ui ( | |||
p448_t *out, | |||
uint64_t x | |||
) __attribute__((unused,always_inline)); | |||
static __inline__ void | |||
p448_cond_swap(p448_t *a, | |||
p448_t *b, | |||
mask_t do_swap) | |||
__attribute__((unused,always_inline)); | |||
p448_cond_swap ( | |||
p448_t *a, | |||
p448_t *b, | |||
mask_t do_swap | |||
) __attribute__((unused,always_inline)); | |||
static __inline__ void | |||
p448_add(p448_t *out, | |||
const p448_t *a, | |||
const p448_t *b) | |||
__attribute__((unused,always_inline)); | |||
p448_add ( | |||
p448_t *out, | |||
const p448_t *a, | |||
const p448_t *b | |||
) __attribute__((unused,always_inline)); | |||
static __inline__ void | |||
p448_sub(p448_t *out, | |||
const p448_t *a, | |||
const p448_t *b) | |||
__attribute__((unused,always_inline)); | |||
p448_sub ( | |||
p448_t *out, | |||
const p448_t *a, | |||
const p448_t *b | |||
) __attribute__((unused,always_inline)); | |||
static __inline__ void | |||
p448_neg(p448_t *out, | |||
const p448_t *a) | |||
__attribute__((unused,always_inline)); | |||
p448_neg ( | |||
p448_t *out, | |||
const p448_t *a | |||
) __attribute__((unused,always_inline)); | |||
static __inline__ void | |||
p448_cond_neg(p448_t *a, | |||
mask_t doNegate) | |||
__attribute__((unused,always_inline)); | |||
p448_cond_neg ( | |||
p448_t *a, | |||
mask_t doNegate | |||
) __attribute__((unused,always_inline)); | |||
static __inline__ void | |||
p448_addw(p448_t *a, | |||
uint64_t x) | |||
__attribute__((unused,always_inline)); | |||
p448_addw ( | |||
p448_t *a, | |||
uint64_t x | |||
) __attribute__((unused,always_inline)); | |||
static __inline__ void | |||
p448_subw(p448_t *a, | |||
uint64_t x) | |||
__attribute__((unused,always_inline)); | |||
p448_subw ( | |||
p448_t *a, | |||
uint64_t x | |||
) __attribute__((unused,always_inline)); | |||
static __inline__ void | |||
p448_copy(p448_t *out, const p448_t *a) | |||
__attribute__((unused,always_inline)); | |||
p448_copy ( | |||
p448_t *out, | |||
const p448_t *a | |||
) __attribute__((unused,always_inline)); | |||
static __inline__ void | |||
p448_weak_reduce(p448_t *inout) | |||
__attribute__((unused,always_inline)); | |||
p448_weak_reduce ( | |||
p448_t *inout | |||
) __attribute__((unused,always_inline)); | |||
void | |||
p448_strong_reduce(p448_t *inout); | |||
p448_strong_reduce ( | |||
p448_t *inout | |||
); | |||
mask_t | |||
p448_is_zero(const p448_t *in); | |||
p448_is_zero ( | |||
const p448_t *in | |||
); | |||
static __inline__ void | |||
p448_bias(p448_t *inout, int amount) | |||
__attribute__((unused,always_inline)); | |||
p448_bias ( | |||
p448_t *inout, | |||
int amount | |||
) __attribute__((unused,always_inline)); | |||
void | |||
p448_mul(p448_t *__restrict__ out, | |||
const p448_t *a, | |||
const p448_t *b); | |||
p448_mul ( | |||
p448_t *__restrict__ out, | |||
const p448_t *a, | |||
const p448_t *b | |||
); | |||
void | |||
p448_mulw(p448_t *__restrict__ out, | |||
const p448_t *a, | |||
uint64_t b); | |||
p448_mulw ( | |||
p448_t *__restrict__ out, | |||
const p448_t *a, | |||
uint64_t b | |||
); | |||
void | |||
p448_sqr(p448_t *__restrict__ out, | |||
const p448_t *a); | |||
p448_sqr ( | |||
p448_t *__restrict__ out, | |||
const p448_t *a | |||
); | |||
static __inline__ void | |||
p448_sqrn(p448_t *__restrict__ y, const p448_t *x, int n) | |||
__attribute__((unused,always_inline)); | |||
p448_sqrn ( | |||
p448_t *__restrict__ y, | |||
const p448_t *x, | |||
int n | |||
) __attribute__((unused,always_inline)); | |||
void | |||
p448_set_ui(p448_t *out, | |||
uint64_t x) { | |||
p448_serialize ( | |||
uint8_t *serial, | |||
const struct p448_t *x | |||
); | |||
void | |||
q448_serialize ( | |||
uint8_t *serial, | |||
const word_t x[7] | |||
); | |||
mask_t | |||
q448_deserialize ( | |||
word_t x[7], | |||
const uint8_t serial[56] | |||
); | |||
mask_t | |||
p448_deserialize ( | |||
p448_t *x, | |||
const uint8_t serial[56] | |||
); | |||
/* -------------- Inline functions begin here -------------- */ | |||
void | |||
p448_set_ui ( | |||
p448_t *out, | |||
uint64_t x | |||
) { | |||
int i; | |||
out->limb[0] = x; | |||
for (i=1; i<8; i++) { | |||
@@ -107,21 +161,29 @@ p448_set_ui(p448_t *out, | |||
} | |||
void | |||
p448_cond_swap(p448_t *a, p448_t *b, mask_t doswap) { | |||
big_register_t *aa = (big_register_t*)a; | |||
big_register_t *bb = (big_register_t*)b; | |||
big_register_t m = doswap; | |||
unsigned int i; | |||
for (i=0; i<sizeof(*a)/sizeof(*aa); i++) { | |||
big_register_t x = m & (aa[i]^bb[i]); | |||
aa[i] ^= x; | |||
bb[i] ^= x; | |||
} | |||
p448_cond_swap ( | |||
p448_t *a, | |||
p448_t *b, | |||
mask_t doswap | |||
) { | |||
big_register_t *aa = (big_register_t*)a; | |||
big_register_t *bb = (big_register_t*)b; | |||
big_register_t m = doswap; | |||
unsigned int i; | |||
for (i=0; i<sizeof(*a)/sizeof(*aa); i++) { | |||
big_register_t x = m & (aa[i]^bb[i]); | |||
aa[i] ^= x; | |||
bb[i] ^= x; | |||
} | |||
} | |||
void | |||
p448_add(p448_t *out, const p448_t *a, const p448_t *b) { | |||
p448_add ( | |||
p448_t *out, | |||
const p448_t *a, | |||
const p448_t *b | |||
) { | |||
unsigned int i; | |||
for (i=0; i<sizeof(*out)/sizeof(uint64xn_t); i++) { | |||
((uint64xn_t*)out)[i] = ((const uint64xn_t*)a)[i] + ((const uint64xn_t*)b)[i]; | |||
@@ -135,7 +197,11 @@ p448_add(p448_t *out, const p448_t *a, const p448_t *b) { | |||
} | |||
void | |||
p448_sub(p448_t *out, const p448_t *a, const p448_t *b) { | |||
p448_sub ( | |||
p448_t *out, | |||
const p448_t *a, | |||
const p448_t *b | |||
) { | |||
unsigned int i; | |||
for (i=0; i<sizeof(*out)/sizeof(uint64xn_t); i++) { | |||
((uint64xn_t*)out)[i] = ((const uint64xn_t*)a)[i] - ((const uint64xn_t*)b)[i]; | |||
@@ -149,7 +215,10 @@ p448_sub(p448_t *out, const p448_t *a, const p448_t *b) { | |||
} | |||
void | |||
p448_neg(p448_t *out, const p448_t *a) { | |||
p448_neg ( | |||
p448_t *out, | |||
const p448_t *a | |||
) { | |||
unsigned int i; | |||
for (i=0; i<sizeof(*out)/sizeof(uint64xn_t); i++) { | |||
((uint64xn_t*)out)[i] = -((const uint64xn_t*)a)[i]; | |||
@@ -182,22 +251,34 @@ p448_cond_neg( | |||
} | |||
void | |||
p448_addw(p448_t *a, uint64_t x) { | |||
p448_addw ( | |||
p448_t *a, | |||
uint64_t x | |||
) { | |||
a->limb[0] += x; | |||
} | |||
void | |||
p448_subw(p448_t *a, uint64_t x) { | |||
p448_subw ( | |||
p448_t *a, | |||
uint64_t x | |||
) { | |||
a->limb[0] -= x; | |||
} | |||
void | |||
p448_copy(p448_t *out, const p448_t *a) { | |||
p448_copy ( | |||
p448_t *out, | |||
const p448_t *a | |||
) { | |||
*out = *a; | |||
} | |||
void | |||
p448_bias(p448_t *a, int amt) { | |||
p448_bias ( | |||
p448_t *a, | |||
int amt | |||
) { | |||
uint64_t co1 = ((1ull<<56)-1)*amt, co2 = co1-amt; | |||
uint64x4_t lo = {co1,co1,co1,co1}, hi = {co2,co1,co1,co1}; | |||
uint64x4_t *aa = (uint64x4_t*) a; | |||
@@ -206,8 +287,10 @@ p448_bias(p448_t *a, int amt) { | |||
} | |||
void | |||
p448_weak_reduce(p448_t *a) { | |||
/* TODO: use pshufb/palignr if anyone cares about speed of this */ | |||
p448_weak_reduce ( | |||
p448_t *a | |||
) { | |||
/* PERF: use pshufb/palignr if anyone cares about speed of this */ | |||
uint64_t mask = (1ull<<56) - 1; | |||
uint64_t tmp = a->limb[7] >> 56; | |||
int i; | |||
@@ -218,7 +301,12 @@ p448_weak_reduce(p448_t *a) { | |||
a->limb[0] = (a->limb[0] & mask) + tmp; | |||
} | |||
void p448_sqrn(p448_t *__restrict__ y, const p448_t *x, int n) { | |||
void | |||
p448_sqrn ( | |||
p448_t *__restrict__ y, | |||
const p448_t *x, | |||
int n | |||
) { | |||
p448_t tmp; | |||
assert(n>0); | |||
if (n&1) { | |||
@@ -30,7 +30,7 @@ p448_montgomery_ladder( | |||
mask_t flip = -((w>>i)&1); | |||
p448_cond_swap(&mont.xa,&mont.xd,flip^pflip); | |||
p448_cond_swap(&mont.za,&mont.zd,flip^pflip); | |||
p448_montgomery_step(&mont); | |||
montgomery_step(&mont); | |||
pflip = flip; | |||
} | |||
n = 63; | |||
@@ -39,35 +39,35 @@ p448_montgomery_ladder( | |||
p448_cond_swap(&mont.za,&mont.zd,pflip); | |||
for (j=0; j<n_extra_doubles; j++) { | |||
p448_montgomery_step(&mont); | |||
montgomery_step(&mont); | |||
} | |||
struct p448_t sign; | |||
p448_montgomery_serialize(&sign, out, &mont, in); | |||
serialize_montgomery(&sign, out, &mont, in); | |||
p448_addw(&sign,1); | |||
return ~p448_is_zero(&sign); | |||
} | |||
static __inline__ void | |||
niels_cond_negate( | |||
cond_negate_tw_niels( | |||
struct tw_niels_t *n, | |||
mask_t doNegate | |||
) { | |||
p448_cond_swap(&n->a, &n->b, doNegate); | |||
p448_cond_neg(&n->c, doNegate); /* TODO: bias amt? */ | |||
p448_cond_neg(&n->c, doNegate); | |||
} | |||
static __inline__ void | |||
pniels_cond_negate( | |||
cond_negate_tw_pniels( | |||
struct tw_pniels_t *n, | |||
mask_t doNegate | |||
) { | |||
niels_cond_negate(&n->n, doNegate); | |||
cond_negate_tw_niels(&n->n, doNegate); | |||
} | |||
void | |||
constant_time_lookup_pniels( | |||
constant_time_lookup_tw_pniels( | |||
struct tw_pniels_t *out, | |||
const struct tw_pniels_t *in, | |||
int nin, | |||
@@ -89,7 +89,7 @@ constant_time_lookup_pniels( | |||
} | |||
static __inline__ void | |||
constant_time_lookup_niels( | |||
constant_time_lookup_tw_niels( | |||
struct tw_niels_t *out, | |||
const struct tw_niels_t *in, | |||
int nin, | |||
@@ -165,7 +165,7 @@ edwards_scalar_multiply( | |||
struct tw_extensible_t tabulator; | |||
copy_tw_extensible(&tabulator, working); | |||
p448_tw_extensible_double(&tabulator); | |||
double_tw_extensible(&tabulator); | |||
struct tw_pniels_t pn, multiples[8]; | |||
convert_tw_extensible_to_tw_pniels(&pn, &tabulator); | |||
@@ -173,7 +173,7 @@ edwards_scalar_multiply( | |||
int i; | |||
for (i=1; i<8; i++) { | |||
p448_tw_extensible_add_pniels(working, &pn); | |||
add_tw_pniels_to_tw_extensible(working, &pn); | |||
convert_tw_extensible_to_tw_pniels(&multiples[i], working); | |||
} | |||
@@ -182,24 +182,92 @@ edwards_scalar_multiply( | |||
inv = (bits>>3)-1; | |||
bits ^= inv; | |||
constant_time_lookup_pniels(&pn, multiples, 8, bits&7); | |||
pniels_cond_negate(&pn, inv); | |||
constant_time_lookup_tw_pniels(&pn, multiples, 8, bits&7); | |||
cond_negate_tw_pniels(&pn, inv); | |||
convert_tw_pniels_to_tw_extensible(working, &pn); | |||
for (i-=4; i>=0; i-=4) { | |||
p448_tw_extensible_double(working); | |||
p448_tw_extensible_double(working); | |||
p448_tw_extensible_double(working); | |||
p448_tw_extensible_double(working); | |||
double_tw_extensible(working); | |||
double_tw_extensible(working); | |||
double_tw_extensible(working); | |||
double_tw_extensible(working); | |||
bits = scalar2[i/64] >> (i%64) & 0xF; | |||
inv = (bits>>3)-1; | |||
bits ^= inv; | |||
constant_time_lookup_pniels(&pn, multiples, 8, bits&7); | |||
pniels_cond_negate(&pn, inv); | |||
p448_tw_extensible_add_pniels(working, &pn); | |||
constant_time_lookup_tw_pniels(&pn, multiples, 8, bits&7); | |||
cond_negate_tw_pniels(&pn, inv); | |||
add_tw_pniels_to_tw_extensible(working, &pn); | |||
} | |||
} | |||
void | |||
edwards_scalar_multiply_vlook( | |||
struct tw_extensible_t *working, | |||
const uint64_t scalar[7] | |||
) { | |||
const int nbits=448; /* HACK? */ | |||
word_t prepared_data[14] = { | |||
0x9595b847fdf73126ull, | |||
0x9bb9b8a856af5200ull, | |||
0xb3136e22f37d5c4full, | |||
0x0000000189a19442ull, | |||
0x0000000000000000ull, | |||
0x0000000000000000ull, | |||
0x4000000000000000ull, | |||
0x721cf5b5529eec33ull, | |||
0x7a4cf635c8e9c2abull, | |||
0xeec492d944a725bfull, | |||
0x000000020cd77058ull, | |||
0x0000000000000000ull, | |||
0x0000000000000000ull, | |||
0x0000000000000000ull | |||
}; /* TODO: split off */ | |||
uint64_t scalar2[7]; | |||
convert_to_signed_window_form(scalar2,scalar,prepared_data,7); | |||
struct tw_extensible_t tabulator; | |||
copy_tw_extensible(&tabulator, working); | |||
double_tw_extensible(&tabulator); | |||
struct tw_pniels_t pn, multiples[8]; | |||
convert_tw_extensible_to_tw_pniels(&pn, &tabulator); | |||
convert_tw_extensible_to_tw_pniels(&multiples[0], working); | |||
int i; | |||
for (i=1; i<8; i++) { | |||
add_tw_pniels_to_tw_extensible(working, &pn); | |||
convert_tw_extensible_to_tw_pniels(&multiples[i], working); | |||
} | |||
i = nbits - 4; | |||
int bits = scalar2[i/64] >> (i%64) & 0xF, | |||
inv = (bits>>3)-1; | |||
bits ^= inv; | |||
copy_tw_pniels(&pn, &multiples[bits&7]); | |||
cond_negate_tw_pniels(&pn, inv); | |||
convert_tw_pniels_to_tw_extensible(working, &pn); | |||
for (i-=4; i>=0; i-=4) { | |||
double_tw_extensible(working); | |||
double_tw_extensible(working); | |||
double_tw_extensible(working); | |||
double_tw_extensible(working); | |||
bits = scalar2[i/64] >> (i%64) & 0xF; | |||
inv = (bits>>3)-1; | |||
bits ^= inv; | |||
copy_tw_pniels(&pn, &multiples[bits&7]); | |||
cond_negate_tw_pniels(&pn, inv); | |||
add_tw_pniels_to_tw_extensible(working, &pn); | |||
} | |||
} | |||
@@ -240,7 +308,7 @@ edwards_comb( | |||
struct tw_niels_t ni; | |||
for (i=0; i<s; i++) { | |||
if (i) p448_tw_extensible_double(working); | |||
if (i) double_tw_extensible(working); | |||
for (j=0; j<n; j++) { | |||
int tab = 0; | |||
@@ -260,10 +328,10 @@ edwards_comb( | |||
tab ^= invert; | |||
tab &= (1<<(t-1)) - 1; | |||
constant_time_lookup_niels(&ni, table + (j<<(t-1)), 1<<(t-1), tab); | |||
niels_cond_negate(&ni, invert); | |||
constant_time_lookup_tw_niels(&ni, table + (j<<(t-1)), 1<<(t-1), tab); | |||
cond_negate_tw_niels(&ni, invert); | |||
if (i||j) { | |||
p448_tw_extensible_add_niels(working, &ni); | |||
add_tw_niels_to_tw_extensible(working, &ni); | |||
} else { | |||
convert_tw_niels_to_tw_extensible(working, &ni); | |||
} | |||
@@ -334,7 +402,7 @@ precompute_for_combs( | |||
for (j=0; j<t; j++) { | |||
if (j) { | |||
convert_tw_extensible_to_tw_pniels(&pn_tmp, &working); | |||
p448_tw_extensible_add_pniels(&start, &pn_tmp); | |||
add_tw_pniels_to_tw_extensible(&start, &pn_tmp); | |||
} else { | |||
copy_tw_extensible(&start, &working); | |||
} | |||
@@ -343,13 +411,13 @@ precompute_for_combs( | |||
break; | |||
} | |||
p448_tw_extensible_double(&working); | |||
double_tw_extensible(&working); | |||
if (j<t-1) { | |||
convert_tw_extensible_to_tw_pniels(&doubles[j], &working); | |||
} | |||
for (k=0; k<s-1; k++) { | |||
p448_tw_extensible_double(&working); | |||
double_tw_extensible(&working); | |||
} | |||
} | |||
@@ -370,13 +438,10 @@ precompute_for_combs( | |||
if (gray & (1<<k)) { | |||
/* start += doubles[k] */ | |||
p448_tw_extensible_add_pniels(&start, &doubles[k]); | |||
add_tw_pniels_to_tw_extensible(&start, &doubles[k]); | |||
} else { | |||
/* start -= doubles[k] */ | |||
/* PERF: uncond negate */ | |||
copy_tw_pniels(&pn_tmp, &doubles[k]); | |||
pniels_cond_negate(&pn_tmp, -1); | |||
p448_tw_extensible_add_pniels(&start, &pn_tmp); | |||
sub_tw_pniels_from_tw_extensible(&start, &doubles[k]); | |||
} | |||
@@ -435,16 +500,16 @@ precompute_for_wnaf( | |||
copy_tw_niels(&out[0], &tmp.n); | |||
if (tbits > 0) { | |||
p448_tw_extensible_double(&base); | |||
double_tw_extensible(&base); | |||
convert_tw_extensible_to_tw_pniels(&twop, &base); | |||
p448_tw_extensible_add_pniels(&base, &tmp); | |||
add_tw_pniels_to_tw_extensible(&base, &tmp); | |||
convert_tw_extensible_to_tw_pniels(&tmp, &base); | |||
p448_copy(&zs[1], &tmp.z); | |||
copy_tw_niels(&out[1], &tmp.n); | |||
for (i=2; i < 1<<tbits; i++) { | |||
p448_tw_extensible_add_pniels(&base, &twop); | |||
add_tw_pniels_to_tw_extensible(&base, &twop); | |||
convert_tw_extensible_to_tw_pniels(&tmp, &base); | |||
p448_copy(&zs[i], &tmp.z); | |||
copy_tw_niels(&out[i], &tmp.n); | |||
@@ -474,6 +539,10 @@ precompute_for_wnaf( | |||
return -1; | |||
} | |||
/** | |||
* @cond internal | |||
* Control for variable-time scalar multiply algorithms. | |||
*/ | |||
struct smvt_control { | |||
int power, addend; | |||
}; | |||
@@ -537,20 +606,20 @@ prepare_wnaf_table( | |||
if (tbits == 0) return; | |||
p448_tw_extensible_double(working); | |||
double_tw_extensible(working); | |||
struct tw_pniels_t twop; | |||
convert_tw_extensible_to_tw_pniels(&twop, working); | |||
p448_tw_extensible_add_pniels(working, &output[0]); | |||
add_tw_pniels_to_tw_extensible(working, &output[0]); | |||
convert_tw_extensible_to_tw_pniels(&output[1], working); | |||
for (int i=2; i < 1<<tbits; i++) { | |||
p448_tw_extensible_add_pniels(working, &twop); | |||
add_tw_pniels_to_tw_extensible(working, &twop); | |||
convert_tw_extensible_to_tw_pniels(&output[i], working); | |||
} | |||
} | |||
int | |||
void | |||
edwards_scalar_multiply_vt( | |||
struct tw_extensible_t *working, | |||
const uint64_t scalar[7] | |||
@@ -570,31 +639,25 @@ edwards_scalar_multiply_vt( | |||
convert_tw_pniels_to_tw_extensible(working, &precmp[control[0].addend >> 1]); | |||
} else { | |||
set_identity_tw_extensible(working); | |||
return control_bits; | |||
return; | |||
} | |||
int conti = 1, i; | |||
struct tw_pniels_t neg; | |||
for (i = control[0].power - 1; i >= 0; i--) { | |||
p448_tw_extensible_double(working); | |||
double_tw_extensible(working); | |||
if (i == control[conti].power) { | |||
assert(control[conti].addend); | |||
if (control[conti].addend > 0) { | |||
p448_tw_extensible_add_pniels(working, &precmp[control[conti].addend >> 1]); | |||
add_tw_pniels_to_tw_extensible(working, &precmp[control[conti].addend >> 1]); | |||
} else { | |||
/* PERF: uncond negate */ | |||
copy_tw_pniels(&neg, &precmp[(-control[conti].addend) >> 1]); | |||
pniels_cond_negate(&neg, -1); | |||
p448_tw_extensible_add_pniels(working, &neg); | |||
sub_tw_pniels_from_tw_extensible(working, &precmp[(-control[conti].addend) >> 1]); | |||
} | |||
conti++; | |||
assert(conti <= control_bits); | |||
} | |||
} | |||
return control_bits; /* TODO: don't return anything, this is just for testing */ | |||
} | |||
void | |||
@@ -620,21 +683,16 @@ edwards_scalar_multiply_vt_pre( | |||
} | |||
int conti = 1, i; | |||
struct tw_niels_t neg; | |||
for (i = control[0].power - 1; i >= 0; i--) { | |||
p448_tw_extensible_double(working); | |||
double_tw_extensible(working); | |||
if (i == control[conti].power) { | |||
assert(control[conti].addend); | |||
if (control[conti].addend > 0) { | |||
p448_tw_extensible_add_niels(working, &precmp[control[conti].addend >> 1]); | |||
add_tw_niels_to_tw_extensible(working, &precmp[control[conti].addend >> 1]); | |||
} else { | |||
/* PERF: uncond negate */ | |||
copy_tw_niels(&neg, &precmp[(-control[conti].addend) >> 1]); | |||
niels_cond_negate(&neg, -1); | |||
p448_tw_extensible_add_niels(working, &neg); | |||
sub_tw_niels_from_tw_extensible(working, &precmp[(-control[conti].addend) >> 1]); | |||
} | |||
conti++; | |||
assert(conti <= control_bits); | |||
@@ -642,7 +700,7 @@ edwards_scalar_multiply_vt_pre( | |||
} | |||
} | |||
int | |||
void | |||
edwards_combo_var_fixed_vt( | |||
struct tw_extensible_t *working, | |||
const uint64_t scalar_var[7], | |||
@@ -671,7 +729,7 @@ edwards_combo_var_fixed_vt( | |||
contv++; | |||
} else if (i == control_pre[0].power && i >=0 ) { | |||
convert_tw_pniels_to_tw_extensible(working, &precmp_var[control_var[0].addend >> 1]); | |||
p448_tw_extensible_add_niels(working, &precmp[control_pre[0].addend >> 1]); | |||
add_tw_niels_to_tw_extensible(working, &precmp[control_pre[0].addend >> 1]); | |||
contv++; contp++; | |||
} else { | |||
i = control_pre[0].power; | |||
@@ -681,24 +739,19 @@ edwards_combo_var_fixed_vt( | |||
if (i < 0) { | |||
set_identity_tw_extensible(working); | |||
return ncb_pre; | |||
return; | |||
} | |||
struct tw_pniels_t pneg; | |||
struct tw_niels_t neg; | |||
for (i--; i >= 0; i--) { | |||
p448_tw_extensible_double(working); | |||
double_tw_extensible(working); | |||
if (i == control_var[contv].power) { | |||
assert(control_var[contv].addend); | |||
if (control_var[contv].addend > 0) { | |||
p448_tw_extensible_add_pniels(working, &precmp_var[control_var[contv].addend >> 1]); | |||
add_tw_pniels_to_tw_extensible(working, &precmp_var[control_var[contv].addend >> 1]); | |||
} else { | |||
/* PERF: uncond negate */ | |||
copy_tw_pniels(&pneg, &precmp_var[(-control_var[contv].addend) >> 1]); | |||
pniels_cond_negate(&pneg, -1); | |||
p448_tw_extensible_add_pniels(working, &pneg); | |||
sub_tw_pniels_from_tw_extensible(working, &precmp_var[(-control_var[contv].addend) >> 1]); | |||
} | |||
contv++; | |||
} | |||
@@ -707,12 +760,9 @@ edwards_combo_var_fixed_vt( | |||
assert(control_pre[contp].addend); | |||
if (control_pre[contp].addend > 0) { | |||
p448_tw_extensible_add_niels(working, &precmp[control_pre[contp].addend >> 1]); | |||
add_tw_niels_to_tw_extensible(working, &precmp[control_pre[contp].addend >> 1]); | |||
} else { | |||
/* PERF: uncond negate */ | |||
copy_tw_niels(&neg, &precmp[(-control_pre[contp].addend) >> 1]); | |||
niels_cond_negate(&neg, -1); | |||
p448_tw_extensible_add_niels(working, &neg); | |||
sub_tw_niels_from_tw_extensible(working, &precmp[(-control_pre[contp].addend) >> 1]); | |||
} | |||
contp++; | |||
} | |||
@@ -720,8 +770,6 @@ edwards_combo_var_fixed_vt( | |||
assert(contv == ncb_var); | |||
assert(contp == ncb_pre); | |||
return ncb_pre; | |||
} | |||
@@ -53,6 +53,13 @@ edwards_scalar_multiply( | |||
const uint64_t scalar[7] | |||
/* TODO? int nbits */ | |||
); | |||
void | |||
edwards_scalar_multiply_vlook( | |||
struct tw_extensible_t *working, | |||
const uint64_t scalar[7] | |||
/* TODO? int nbits */ | |||
); | |||
mask_t | |||
precompute_for_combs( | |||
@@ -73,8 +80,7 @@ edwards_comb( | |||
int s | |||
); | |||
/* TODO: void. int is just for diagnostic purposes. */ | |||
int | |||
void | |||
edwards_scalar_multiply_vt( | |||
struct tw_extensible_t *working, | |||
const uint64_t scalar[7] | |||
@@ -95,8 +101,7 @@ precompute_for_wnaf( | |||
int tbits | |||
); /* TODO: attr don't ignore... */ | |||
/* TODO: void. int is just for diagnostic purposes. */ | |||
int | |||
void | |||
edwards_combo_var_fixed_vt( | |||
struct tw_extensible_t *working, | |||
const uint64_t scalar_var[7], | |||
@@ -0,0 +1,182 @@ | |||
/* Copyright (c) 2011 Stanford University. | |||
* Copyright (c) 2014 Cryptography Research, Inc. | |||
* Released under the MIT License. See LICENSE.txt for license information. | |||
*/ | |||
#include "sha512.h" | |||
#include <string.h> | |||
#include <assert.h> | |||
static inline uint64_t | |||
rotate_r ( | |||
uint64_t x, | |||
int d | |||
) { | |||
return (x >> d) | (x << (64-d)); | |||
} | |||
/* TODO: get from headers */ | |||
static inline uint64_t | |||
htobe64 (uint64_t x) { | |||
__asm__ ("bswapq %0" : "+r"(x)); | |||
return x; | |||
} | |||
static const uint64_t | |||
sha512_init_state[8] = { | |||
0x6a09e667f3bcc908, 0xbb67ae8584caa73b, 0x3c6ef372fe94f82b, 0xa54ff53a5f1d36f1, | |||
0x510e527fade682d1, 0x9b05688c2b3e6c1f, 0x1f83d9abfb41bd6b, 0x5be0cd19137e2179 | |||
}; | |||
static const uint64_t | |||
sha512_k[80] = { | |||
0x428a2f98d728ae22, 0x7137449123ef65cd, 0xb5c0fbcfec4d3b2f, 0xe9b5dba58189dbbc, | |||
0x3956c25bf348b538, 0x59f111f1b605d019, 0x923f82a4af194f9b, 0xab1c5ed5da6d8118, | |||
0xd807aa98a3030242, 0x12835b0145706fbe, 0x243185be4ee4b28c, 0x550c7dc3d5ffb4e2, | |||
0x72be5d74f27b896f, 0x80deb1fe3b1696b1, 0x9bdc06a725c71235, 0xc19bf174cf692694, | |||
0xe49b69c19ef14ad2, 0xefbe4786384f25e3, 0x0fc19dc68b8cd5b5, 0x240ca1cc77ac9c65, | |||
0x2de92c6f592b0275, 0x4a7484aa6ea6e483, 0x5cb0a9dcbd41fbd4, 0x76f988da831153b5, | |||
0x983e5152ee66dfab, 0xa831c66d2db43210, 0xb00327c898fb213f, 0xbf597fc7beef0ee4, | |||
0xc6e00bf33da88fc2, 0xd5a79147930aa725, 0x06ca6351e003826f, 0x142929670a0e6e70, | |||
0x27b70a8546d22ffc, 0x2e1b21385c26c926, 0x4d2c6dfc5ac42aed, 0x53380d139d95b3df, | |||
0x650a73548baf63de, 0x766a0abb3c77b2a8, 0x81c2c92e47edaee6, 0x92722c851482353b, | |||
0xa2bfe8a14cf10364, 0xa81a664bbc423001, 0xc24b8b70d0f89791, 0xc76c51a30654be30, | |||
0xd192e819d6ef5218, 0xd69906245565a910, 0xf40e35855771202a, 0x106aa07032bbd1b8, | |||
0x19a4c116b8d2d0c8, 0x1e376c085141ab53, 0x2748774cdf8eeb99, 0x34b0bcb5e19b48a8, | |||
0x391c0cb3c5c95a63, 0x4ed8aa4ae3418acb, 0x5b9cca4f7763e373, 0x682e6ff3d6b2b8a3, | |||
0x748f82ee5defb2fc, 0x78a5636f43172f60, 0x84c87814a1f0ab72, 0x8cc702081a6439ec, | |||
0x90befffa23631e28, 0xa4506cebde82bde9, 0xbef9a3f7b2c67915, 0xc67178f2e372532b, | |||
0xca273eceea26619c, 0xd186b8c721c0c207, 0xeada7dd6cde0eb1e, 0xf57d4f7fee6ed178, | |||
0x06f067aa72176fba, 0x0a637dc5a2c898a6, 0x113f9804bef90dae, 0x1b710b35131c471b, | |||
0x28db77f523047d84, 0x32caab7b40c72493, 0x3c9ebe0a15c9bebc, 0x431d67c49c100d4c, | |||
0x4cc5d4becb3e42b6, 0x597f299cfc657e2a, 0x5fcb6fab3ad6faec, 0x6c44198c4a475817 | |||
}; | |||
static inline uint64_t S0 (uint64_t h1) { | |||
return rotate_r(h1, 28) ^ rotate_r(h1, 34) ^ rotate_r(h1, 39); | |||
} | |||
static inline uint64_t S1 (uint64_t h4) { | |||
return rotate_r(h4,14) ^ rotate_r(h4,18) ^ rotate_r(h4,41); | |||
} | |||
static inline uint64_t s0 (uint64_t a) { | |||
return rotate_r(a,1) ^ rotate_r(a,8) ^ a>>7; | |||
} | |||
static inline uint64_t s1 (uint64_t b) { | |||
return rotate_r(b,19) ^ rotate_r(b,61) ^ b>>6; | |||
} | |||
static inline uint64_t ch (uint64_t h4, uint64_t h5, uint64_t h6) { | |||
return h6^(h4 & (h6^h5)); | |||
} | |||
static inline uint64_t maj(uint64_t h1, uint64_t h2, uint64_t h3) { | |||
return (h1&h2) ^ (h3&(h1^h2)); | |||
} | |||
static void | |||
sha512_process_block ( | |||
struct sha512_ctx_t *ctx | |||
) { | |||
uint64_t i, tmp, a, b, | |||
*w = (uint64_t *) ctx->block, | |||
*state = ctx->chain, | |||
h0 = state[0], h1 = state[1], h2 = state[2], h3 = state[3], | |||
h4 = state[4], h5 = state[5], h6 = state[6], h7 = state[7]; | |||
/* Clang doesn't unswitch this automatically */ | |||
for (i=0; i<16; i++) { | |||
/* load up the input word for this round */ | |||
tmp = w[i] = htobe64(w[i]); | |||
tmp = tmp + h7 + S1(h4) + ch(h4,h5,h6) + sha512_k[i]; | |||
/* shift register */ | |||
h7 = h6; h6 = h5; h5 = h4; | |||
h4 = h3 + tmp; | |||
h3 = h2; h2 = h1; h1 = h0; | |||
h0 = tmp + maj(h1,h2,h3) + S0(h1); | |||
} | |||
for (; i<80; i++) { | |||
/* load up the input word for this round */ | |||
a = w[(i+1 ) & 15]; | |||
b = w[(i+14) & 15]; | |||
tmp = w[i&15] = s0(a) + s1(b) + w[i&15] + w[(i+9) & 15]; | |||
tmp = tmp + h7 + S1(h4) + ch(h4,h5,h6) + sha512_k[i]; | |||
/* shift register */ | |||
h7 = h6; h6 = h5; h5 = h4; | |||
h4 = h3 + tmp; | |||
h3 = h2; h2 = h1; h1 = h0; | |||
h0 = tmp + maj(h1,h2,h3) + S0(h1); | |||
} | |||
state[0] += h0; | |||
state[1] += h1; | |||
state[2] += h2; | |||
state[3] += h3; | |||
state[4] += h4; | |||
state[5] += h5; | |||
state[6] += h6; | |||
state[7] += h7; | |||
} | |||
void | |||
sha512_init ( | |||
struct sha512_ctx_t *ctx | |||
) { | |||
ctx->nbytes = 0; | |||
memcpy(ctx->chain, sha512_init_state, sizeof(sha512_init_state)); | |||
memset(ctx->block, 0, sizeof(ctx->block)); | |||
} | |||
void | |||
sha512_update ( | |||
struct sha512_ctx_t *ctx, | |||
const unsigned char *data, | |||
uint64_t bytes | |||
) { | |||
assert(ctx->nbytes < 1ull<<56); | |||
assert(bytes < 1ull<<56); | |||
while (bytes) { | |||
uint64_t fill = ctx->nbytes % 128, accept = 128 - fill; | |||
if (accept > bytes) accept = bytes; | |||
ctx->nbytes += accept; | |||
memcpy(ctx->block + fill, data, accept); | |||
if (fill+accept == 128) | |||
sha512_process_block(ctx); | |||
bytes -= accept; | |||
data += accept; | |||
} | |||
assert(ctx->nbytes < 1ull<<56); | |||
} | |||
void | |||
sha512_final ( | |||
struct sha512_ctx_t *ctx, | |||
uint8_t result[64] | |||
) { | |||
uint64_t fill = ctx->nbytes % 128, i; | |||
ctx->block[fill++] = 0x80; | |||
if (fill > 112) { | |||
memset(ctx->block + fill, 0, 128-fill); | |||
sha512_process_block(ctx); | |||
fill = 0; | |||
} | |||
memset(ctx->block + fill, 0, 112-fill); | |||
*((uint64_t *)&ctx->block[112]) = 0; | |||
*((uint64_t *)&ctx->block[120]) = htobe64((ctx->nbytes * 8)); | |||
sha512_process_block(ctx); | |||
for (i=0; i<8; i++) { | |||
ctx->chain[i] = htobe64(ctx->chain[i]); | |||
} | |||
memcpy(result, ctx->chain, sizeof(ctx->chain)); | |||
sha512_init(ctx); | |||
} |
@@ -0,0 +1,49 @@ | |||
/* Copyright (c) 2014 Cryptography Research, Inc. | |||
* Released under the MIT License. See LICENSE.txt for license information. | |||
*/ | |||
#ifndef __GOLDI_SHA512_H__ | |||
#define __GOLDI_SHA512_H__ 1 | |||
#include <stdint.h> | |||
#ifdef __cplusplus | |||
extern "C" { | |||
#endif | |||
/* TODO: KAT */ | |||
/** | |||
* SHA512 hashing context. | |||
* | |||
* This structure is opaque. | |||
*/ | |||
struct sha512_ctx_t { | |||
/** @privatesection */ | |||
uint64_t chain[8]; | |||
uint8_t block[128]; | |||
uint64_t nbytes; | |||
}; | |||
void | |||
sha512_init ( | |||
struct sha512_ctx_t *ctx | |||
); | |||
void | |||
sha512_update ( | |||
struct sha512_ctx_t *ctx, | |||
const unsigned char *data, | |||
uint64_t bytes | |||
); | |||
void | |||
sha512_final ( | |||
struct sha512_ctx_t *ctx, | |||
uint8_t result[64] | |||
); | |||
#ifdef __cplusplus | |||
}; /* extern "C" */ | |||
#endif | |||
#endif /* __GOLDI_SHA512_H__ */ |
@@ -49,7 +49,7 @@ br_is_zero(big_register_t x) { | |||
return (big_register_t)(x == (big_register_t)0); | |||
} | |||
#else | |||
#error "Todo: constant-time equality on vectorless platforms" | |||
#error "TODO: constant-time equality on vectorless platforms" | |||
#endif | |||
#endif /* __WORD_H__ */ |