summaryrefslogtreecommitdiff
path: root/crypto/ec/ec_lib.c
diff options
context:
space:
mode:
authorBilly Brumley <bbrumley@gmail.com>2018-04-27 17:45:51 +0300
committerMatt Caswell <matt@openssl.org>2018-06-21 18:08:56 +0100
commitc11d372b3b7080dc153902f14a0d4b402e2dfc92 (patch)
treef99909a4e617f3bf4b98c1ee194c9cc79af19dd5 /crypto/ec/ec_lib.c
parent91860165820daf7a17836597f18752f094b887c8 (diff)
downloadopenssl-new-c11d372b3b7080dc153902f14a0d4b402e2dfc92.tar.gz
make EC_GROUP_do_inverse_ord more robust
Reviewed-by: Andy Polyakov <appro@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/6116)
Diffstat (limited to 'crypto/ec/ec_lib.c')
-rw-r--r--crypto/ec/ec_lib.c69
1 files changed, 68 insertions, 1 deletions
diff --git a/crypto/ec/ec_lib.c b/crypto/ec/ec_lib.c
index d0393e8bad..76f05a040a 100644
--- a/crypto/ec/ec_lib.c
+++ b/crypto/ec/ec_lib.c
@@ -1017,13 +1017,80 @@ int ec_group_simple_order_bits(const EC_GROUP *group)
return BN_num_bits(group->order);
}
+static int ec_field_inverse_mod_ord(const EC_GROUP *group, BIGNUM *r,
+ BIGNUM *x, BN_CTX *ctx)
+{
+ BIGNUM *exp = NULL;
+ BN_CTX *new_ctx = NULL;
+ int ret = 0;
+
+ if (ctx == NULL && (ctx = new_ctx = BN_CTX_secure_new()) == NULL)
+ return 0;
+
+ BN_CTX_start(ctx);
+ exp = BN_CTX_get(ctx);
+ if (exp == NULL)
+ goto err;
+
+ /* Check if optimized inverse is implemented */
+ if (group->mont_data != NULL) {
+ /*-
+ * We want inverse in constant time, therefore we utilize the fact
+ * order must be prime and use Fermats Little Theorem instead.
+ */
+ if (!BN_set_word(exp, 2))
+ goto err;
+ if (!BN_sub(exp, group->order, exp))
+ goto err;
+ /*-
+ * Exponent X is public.
+ * No need for scatter-gather or BN_FLG_CONSTTIME.
+ */
+ if (!BN_mod_exp_mont(r, x, exp, group->order, ctx, group->mont_data))
+ goto err;
+ /* Inverse of zero doesn't exist. Let the fallback catch it. */
+ if (BN_is_zero(r))
+ ret = 0;
+ else
+ ret = 1;
+ }
+
+ /*-
+ * Fallback to classic inverse, blinded.
+ * BN_FLG_CONSTTIME is a don't care here.
+ */
+ if (ret == 0) {
+ do {
+ if (!BN_priv_rand_range(exp, group->order))
+ goto err;
+ } while (BN_is_zero(exp));
+
+ /* r := x * exp */
+ if (!BN_mod_mul(r, x, exp, group->order, ctx))
+ goto err;
+ /* r := 1/(x * exp) */
+ if (!BN_mod_inverse(r, r, group->order, ctx))
+ goto err;
+ /* r := exp/(x * exp) = 1/x */
+ if (!BN_mod_mul(r, r, exp, group->order, ctx))
+ goto err;
+
+ ret = 1;
+ }
+
+ err:
+ BN_CTX_end(ctx);
+ BN_CTX_free(new_ctx);
+ return ret;
+}
+
int EC_GROUP_do_inverse_ord(const EC_GROUP *group, BIGNUM *res,
BIGNUM *x, BN_CTX *ctx)
{
if (group->meth->field_inverse_mod_ord != NULL)
return group->meth->field_inverse_mod_ord(group, res, x, ctx);
else
- return 0;
+ return ec_field_inverse_mod_ord(group, res, x, ctx);
}
/*-