#include <wolfssl/wolfcrypt/libwolfssl_sources.h>
#ifdef HAVE_CURVE448
#include <wolfssl/wolfcrypt/curve448.h>
#ifdef NO_INLINE
#include <wolfssl/wolfcrypt/misc.h>
#else
#define WOLFSSL_MISC_INCLUDED
#include <wolfcrypt/src/misc.c>
#endif
int wc_curve448_make_pub(int public_size, byte* pub, int private_size,
const byte* priv)
{
int ret;
unsigned char basepoint[CURVE448_KEY_SIZE] = {5};
if ((pub == NULL) || (priv == NULL)) {
return ECC_BAD_ARG_E;
}
if ((public_size != CURVE448_PUB_KEY_SIZE) ||
(private_size != CURVE448_KEY_SIZE)) {
return ECC_BAD_ARG_E;
}
fe448_init();
ret = curve448(pub, priv, basepoint);
return ret;
}
int wc_curve448_make_key(WC_RNG* rng, int keysize, curve448_key* key)
{
int ret = 0;
if ((key == NULL) || (rng == NULL)) {
ret = BAD_FUNC_ARG;
}
if ((ret == 0) && (keysize != CURVE448_KEY_SIZE)) {
ret = ECC_BAD_ARG_E;
}
if (ret == 0) {
ret = wc_RNG_GenerateBlock(rng, key->k, (word32)keysize);
}
if (ret == 0) {
key->privSet = 1;
key->k[0] &= 0xfc;
key->k[CURVE448_KEY_SIZE-1] |= 0x80;
ret = wc_curve448_make_pub((int)sizeof(key->p), key->p,
(int)sizeof(key->k), key->k);
if (ret == 0) {
key->pubSet = 1;
}
else {
ForceZero(key->k, sizeof(key->k));
XMEMSET(key->p, 0, sizeof(key->p));
}
}
return ret;
}
#ifdef HAVE_CURVE448_SHARED_SECRET
int wc_curve448_shared_secret(curve448_key* private_key,
curve448_key* public_key,
byte* out, word32* outLen)
{
return wc_curve448_shared_secret_ex(private_key, public_key, out, outLen,
EC448_BIG_ENDIAN);
}
int wc_curve448_shared_secret_ex(curve448_key* private_key,
curve448_key* public_key,
byte* out, word32* outLen, int endian)
{
unsigned char o[CURVE448_PUB_KEY_SIZE];
int ret = 0;
int i;
if ((private_key == NULL) || (public_key == NULL) || (out == NULL) ||
(outLen == NULL) || (*outLen < CURVE448_PUB_KEY_SIZE)) {
ret = BAD_FUNC_ARG;
}
if (ret == 0 && (!private_key->privSet || !public_key->pubSet)) {
ret = ECC_BAD_ARG_E;
}
if (ret == 0) {
ret = curve448(o, private_key->k, public_key->p);
}
#ifdef WOLFSSL_ECDHX_SHARED_NOT_ZERO
if (ret == 0) {
byte t = 0;
for (i = 0; i < CURVE448_PUB_KEY_SIZE; i++) {
t |= o[i];
}
if (t == 0) {
ret = ECC_OUT_OF_RANGE_E;
}
}
#endif
if (ret == 0) {
if (endian == EC448_BIG_ENDIAN) {
for (i = 0; i < CURVE448_PUB_KEY_SIZE; i++) {
out[i] = o[CURVE448_PUB_KEY_SIZE - i -1];
}
}
else {
XMEMCPY(out, o, CURVE448_PUB_KEY_SIZE);
}
*outLen = CURVE448_PUB_KEY_SIZE;
}
ForceZero(o, CURVE448_PUB_KEY_SIZE);
return ret;
}
#endif
#ifdef HAVE_CURVE448_KEY_EXPORT
int wc_curve448_export_public(curve448_key* key, byte* out, word32* outLen)
{
return wc_curve448_export_public_ex(key, out, outLen, EC448_BIG_ENDIAN);
}
int wc_curve448_export_public_ex(curve448_key* key, byte* out, word32* outLen,
int endian)
{
int ret = 0;
if ((key == NULL) || (out == NULL) || (outLen == NULL)) {
ret = BAD_FUNC_ARG;
}
if ((ret == 0) && (*outLen < CURVE448_PUB_KEY_SIZE)) {
*outLen = CURVE448_PUB_KEY_SIZE;
ret = ECC_BAD_ARG_E;
}
if (ret == 0) {
if (!key->pubSet) {
ret = wc_curve448_make_pub((int)sizeof(key->p), key->p,
(int)sizeof(key->k), key->k);
key->pubSet = (ret == 0);
}
}
if (ret == 0) {
*outLen = CURVE448_PUB_KEY_SIZE;
if (endian == EC448_BIG_ENDIAN) {
int i;
for (i = 0; i < CURVE448_PUB_KEY_SIZE; i++) {
out[i] = key->p[CURVE448_PUB_KEY_SIZE - i - 1];
}
}
else {
XMEMCPY(out, key->p, CURVE448_PUB_KEY_SIZE);
}
}
return ret;
}
#endif
#ifdef HAVE_CURVE448_KEY_IMPORT
int wc_curve448_import_public(const byte* in, word32 inLen, curve448_key* key)
{
return wc_curve448_import_public_ex(in, inLen, key, EC448_BIG_ENDIAN);
}
int wc_curve448_import_public_ex(const byte* in, word32 inLen,
curve448_key* key, int endian)
{
int ret = 0;
if ((key == NULL) || (in == NULL)) {
ret = BAD_FUNC_ARG;
}
if ((ret == 0) && (inLen != CURVE448_PUB_KEY_SIZE)) {
ret = ECC_BAD_ARG_E;
}
if (ret == 0) {
if (endian == EC448_BIG_ENDIAN) {
int i;
for (i = 0; i < CURVE448_PUB_KEY_SIZE; i++) {
key->p[i] = in[CURVE448_PUB_KEY_SIZE - i - 1];
}
}
else
XMEMCPY(key->p, in, inLen);
key->pubSet = 1;
}
return ret;
}
int wc_curve448_check_public(const byte* pub, word32 pubSz, int endian)
{
int ret = 0;
if (pub == NULL) {
ret = BAD_FUNC_ARG;
}
if ((ret == 0) && (pubSz == 0)) {
ret = BUFFER_E;
}
if ((ret == 0) && (pubSz != CURVE448_PUB_KEY_SIZE)) {
ret = ECC_BAD_ARG_E;
}
if (ret == 0) {
word32 i;
if (endian == EC448_LITTLE_ENDIAN) {
for (i = CURVE448_PUB_KEY_SIZE - 1; i > 0; i--) {
if (pub[i] != 0) {
break;
}
}
if ((i == 0) && (pub[0] == 0 || pub[0] == 1)) {
return ECC_BAD_ARG_E;
}
for (i = CURVE448_PUB_KEY_SIZE - 1; i > 28; i--) {
if (pub[i] != 0xff) {
break;
}
}
if ((i == 28) && (pub[i] == 0xff)) {
return ECC_BAD_ARG_E;
}
if ((i == 28) && (pub[i] == 0xfe)) {
for (--i; i > 0; i--) {
if (pub[i] != 0xff) {
break;
}
}
if ((i == 0) && (pub[i] >= 0xfe)) {
return ECC_BAD_ARG_E;
}
}
}
else {
for (i = 0; i < CURVE448_PUB_KEY_SIZE-1; i++) {
if (pub[i] != 0) {
break;
}
}
if ((i == CURVE448_PUB_KEY_SIZE - 1) &&
(pub[i] == 0 || pub[i] == 1)) {
ret = ECC_BAD_ARG_E;
}
for (i = 0; i < 27; i++) {
if (pub[i] != 0xff) {
break;
}
}
if ((i == 27) && (pub[i] == 0xff)) {
return ECC_BAD_ARG_E;
}
if ((i == 27) && (pub[i] == 0xfe)) {
for (++i; i < CURVE448_PUB_KEY_SIZE - 1; i++) {
if (pub[i] != 0xff) {
break;
}
}
if ((i == CURVE448_PUB_KEY_SIZE - 1) && (pub[i] >= 0xfe)) {
return ECC_BAD_ARG_E;
}
}
}
}
return ret;
}
#endif
#ifdef HAVE_CURVE448_KEY_EXPORT
int wc_curve448_export_private_raw(curve448_key* key, byte* out, word32* outLen)
{
return wc_curve448_export_private_raw_ex(key, out, outLen,
EC448_BIG_ENDIAN);
}
int wc_curve448_export_private_raw_ex(curve448_key* key, byte* out,
word32* outLen, int endian)
{
int ret = 0;
if ((key == NULL) || (out == NULL) || (outLen == NULL)) {
ret = BAD_FUNC_ARG;
}
if ((ret == 0) && (*outLen < CURVE448_KEY_SIZE)) {
*outLen = CURVE448_KEY_SIZE;
ret = ECC_BAD_ARG_E;
}
if (ret == 0) {
*outLen = CURVE448_KEY_SIZE;
if (endian == EC448_BIG_ENDIAN) {
int i;
for (i = 0; i < CURVE448_KEY_SIZE; i++) {
out[i] = key->k[CURVE448_KEY_SIZE - i - 1];
}
}
else {
XMEMCPY(out, key->k, CURVE448_KEY_SIZE);
}
}
return ret;
}
int wc_curve448_export_key_raw(curve448_key* key, byte* priv, word32 *privSz,
byte* pub, word32 *pubSz)
{
return wc_curve448_export_key_raw_ex(key, priv, privSz, pub, pubSz,
EC448_BIG_ENDIAN);
}
int wc_curve448_export_key_raw_ex(curve448_key* key, byte* priv, word32 *privSz,
byte* pub, word32 *pubSz, int endian)
{
int ret;
ret = wc_curve448_export_private_raw_ex(key, priv, privSz, endian);
if (ret == 0) {
ret = wc_curve448_export_public_ex(key, pub, pubSz, endian);
}
return ret;
}
#endif
#ifdef HAVE_CURVE448_KEY_IMPORT
int wc_curve448_import_private_raw(const byte* priv, word32 privSz,
const byte* pub, word32 pubSz,
curve448_key* key)
{
return wc_curve448_import_private_raw_ex(priv, privSz, pub, pubSz, key,
EC448_BIG_ENDIAN);
}
int wc_curve448_import_private_raw_ex(const byte* priv, word32 privSz,
const byte* pub, word32 pubSz,
curve448_key* key, int endian)
{
int ret;
ret = wc_curve448_import_private_ex(priv, privSz, key, endian);
if (ret == 0) {
return wc_curve448_import_public_ex(pub, pubSz, key, endian);
}
return ret;
}
int wc_curve448_import_private(const byte* priv, word32 privSz,
curve448_key* key)
{
return wc_curve448_import_private_ex(priv, privSz, key, EC448_BIG_ENDIAN);
}
int wc_curve448_import_private_ex(const byte* priv, word32 privSz,
curve448_key* key, int endian)
{
int ret = 0;
if ((key == NULL) || (priv == NULL)) {
ret = BAD_FUNC_ARG;
}
if ((ret == 0) && ((int)privSz != CURVE448_KEY_SIZE)) {
ret = ECC_BAD_ARG_E;
}
if (ret == 0) {
if (endian == EC448_BIG_ENDIAN) {
int i;
for (i = 0; i < CURVE448_KEY_SIZE; i++) {
key->k[i] = priv[CURVE448_KEY_SIZE - i - 1];
}
}
else {
XMEMCPY(key->k, priv, CURVE448_KEY_SIZE);
}
key->k[0] &= 0xfc;
key->k[CURVE448_KEY_SIZE-1] |= 0x80;
key->privSet = 1;
}
return ret;
}
#endif
int wc_curve448_init(curve448_key* key)
{
int ret = 0;
if (key == NULL) {
ret = BAD_FUNC_ARG;
}
if (ret == 0) {
XMEMSET(key, 0, sizeof(*key));
fe448_init();
#ifdef WOLFSSL_CHECK_MEM_ZERO
wc_MemZero_Add("wc_curve448_init key->k", &key->k, CURVE448_KEY_SIZE);
#endif
}
return ret;
}
void wc_curve448_free(curve448_key* key)
{
if (key != NULL) {
ForceZero(key->k, sizeof(key->k));
XMEMSET(key->p, 0, sizeof(key->p));
key->pubSet = 0;
key->privSet = 0;
#ifdef WOLFSSL_CHECK_MEM_ZERO
wc_MemZero_Check(key, sizeof(curve448_key));
#endif
}
}
int wc_curve448_size(curve448_key* key)
{
int ret = 0;
if (key != NULL) {
ret = CURVE448_KEY_SIZE;
}
return ret;
}
#endif