summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authornagendra modadugu <ngm@google.com>2016-07-14 05:33:57 -0700
committerchrome-bot <chrome-bot@chromium.org>2016-07-21 17:32:15 -0700
commit76ab8e6f448a3fa3f216b1c54e8a0ca4ff282a08 (patch)
tree6fa11ae7c8147ef0afe058400516b2f439f0dfd5
parent5de5f2fded79fa22aebc106866ed43c1d1a01ac9 (diff)
downloadchrome-ec-76ab8e6f448a3fa3f216b1c54e8a0ca4ff282a08.tar.gz
CR50: bn_modinv_vartime - don't reduce on carry condition
The modinv logic shouldn't reduce modulo MOD on a carry condition. Instead, just use more space to hold the carry bit. Also use full size buffers for all variables. BRANCH=none BUG=chrome-os-partner:43025,chrome-os-partner:47524,chrome-os-partner:50115 TEST=unit tested Signed-off-by: nagendra modadugu <ngm@google.com> Reviewed-on: https://chromium-review.googlesource.com/360248 Reviewed-by: Marius Schilder <mschilder@chromium.org> Tested-by: Marius Schilder <mschilder@chromium.org> Reviewed-by: Vadim Bendebury <vbendeb@chromium.org> (cherry picked from commit 3f4e131daef04db5c990bb4532bb67ee9e58c02b) (cherry picked from commit 485b02a17ecdd3c52210fd90ff29b4f1b829a47a) Change-Id: I8d4f78966bfe15f0739c9de23f5a12685a65aabb Reviewed-on: https://chromium-review.googlesource.com/362113 Commit-Ready: Vadim Bendebury <vbendeb@chromium.org> Tested-by: Vadim Bendebury <vbendeb@chromium.org>
-rw-r--r--chip/g/dcrypto/bn.c37
1 files changed, 16 insertions, 21 deletions
diff --git a/chip/g/dcrypto/bn.c b/chip/g/dcrypto/bn.c
index 26a8533839..7d108a0d44 100644
--- a/chip/g/dcrypto/bn.c
+++ b/chip/g/dcrypto/bn.c
@@ -449,11 +449,11 @@ int bn_modinv_vartime(struct LITE_BIGNUM *d, const struct LITE_BIGNUM *e,
const struct LITE_BIGNUM *MOD)
{
/* Buffers for B, D, and U must be as large as e. */
- uint32_t A_buf[RSA_MAX_WORDS];
- uint32_t B_buf[RSA_MAX_WORDS / 2];
- uint32_t C_buf[RSA_MAX_WORDS];
- uint32_t D_buf[RSA_MAX_WORDS / 2];
- uint32_t U_buf[RSA_MAX_WORDS / 2];
+ uint32_t A_buf[RSA_MAX_WORDS + 1];
+ uint32_t B_buf[RSA_MAX_WORDS + 1];
+ uint32_t C_buf[RSA_MAX_WORDS + 1];
+ uint32_t D_buf[RSA_MAX_WORDS + 1];
+ uint32_t U_buf[RSA_MAX_WORDS];
uint32_t V_buf[RSA_MAX_WORDS];
int a_neg = 0;
int b_neg = 0;
@@ -473,17 +473,16 @@ int bn_modinv_vartime(struct LITE_BIGNUM *d, const struct LITE_BIGNUM *e,
if (bn_size(e) > sizeof(U_buf))
return 0;
- bn_init(&A, A_buf, bn_size(MOD));
+ bn_init(&A, A_buf, bn_size(MOD) + sizeof(uint32_t));
+ bn_init(&B, B_buf, bn_size(MOD) + sizeof(uint32_t));
+ bn_init(&C, C_buf, bn_size(MOD) + sizeof(uint32_t));
+ bn_init(&D, D_buf, bn_size(MOD) + sizeof(uint32_t));
+ bn_init(&U, U_buf, bn_size(MOD));
+ bn_init(&V, V_buf, bn_size(MOD));
+
BN_DIGIT(&A, 0) = 1;
- bn_init(&B, B_buf, bn_size(MOD) / 2);
- bn_init(&C, C_buf, bn_size(MOD));
- bn_init(&D, D_buf, bn_size(MOD) / 2);
BN_DIGIT(&D, 0) = 1;
-
- bn_init(&U, U_buf, bn_size(e));
memcpy(U_buf, e->d, bn_size(e));
-
- bn_init(&V, V_buf, bn_size(MOD));
memcpy(V_buf, MOD->d, bn_size(MOD));
/* Binary extended GCD, as per Handbook of Applied
@@ -510,18 +509,14 @@ int bn_modinv_vartime(struct LITE_BIGNUM *d, const struct LITE_BIGNUM *e,
} else { /* U, V both odd. */
if (bn_gte(&U, &V)) {
assert(!bn_sub(&U, &V));
- if (bn_signed_sub(&A, &a_neg, &C, c_neg))
- bn_signed_add(&A, &a_neg, MOD, 0);
- if (bn_signed_sub(&B, &b_neg, &D, d_neg))
- bn_signed_add(&B, &b_neg, MOD, 0);
+ bn_signed_sub(&A, &a_neg, &C, c_neg);
+ bn_signed_sub(&B, &b_neg, &D, d_neg);
if (bn_is_zero(&U))
break; /* done. */
} else {
assert(!bn_sub(&V, &U));
- if (bn_signed_sub(&C, &c_neg, &A, a_neg))
- bn_signed_add(&C, &c_neg, MOD, 0);
- if (bn_signed_sub(&D, &d_neg, &B, b_neg))
- bn_signed_add(&D, &d_neg, MOD, 0);
+ bn_signed_sub(&C, &c_neg, &A, a_neg);
+ bn_signed_sub(&D, &d_neg, &B, b_neg);
}
}
if ((i + 1) % 1000 == 0)