Xuyi Wang / wolfSSL

Dependents:   OS

Committer:
wolfSSL
Date:
Thu Apr 28 00:57:21 2016 +0000
Revision:
4:1b0d80432c79
wolfSSL 3.9.0

Who changed what in which revision?

UserRevisionLine numberNew contents of line
wolfSSL 4:1b0d80432c79 1 /* curve25519.c
wolfSSL 4:1b0d80432c79 2 *
wolfSSL 4:1b0d80432c79 3 * Copyright (C) 2006-2016 wolfSSL Inc.
wolfSSL 4:1b0d80432c79 4 *
wolfSSL 4:1b0d80432c79 5 * This file is part of wolfSSL.
wolfSSL 4:1b0d80432c79 6 *
wolfSSL 4:1b0d80432c79 7 * wolfSSL is free software; you can redistribute it and/or modify
wolfSSL 4:1b0d80432c79 8 * it under the terms of the GNU General Public License as published by
wolfSSL 4:1b0d80432c79 9 * the Free Software Foundation; either version 2 of the License, or
wolfSSL 4:1b0d80432c79 10 * (at your option) any later version.
wolfSSL 4:1b0d80432c79 11 *
wolfSSL 4:1b0d80432c79 12 * wolfSSL is distributed in the hope that it will be useful,
wolfSSL 4:1b0d80432c79 13 * but WITHOUT ANY WARRANTY; without even the implied warranty of
wolfSSL 4:1b0d80432c79 14 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
wolfSSL 4:1b0d80432c79 15 * GNU General Public License for more details.
wolfSSL 4:1b0d80432c79 16 *
wolfSSL 4:1b0d80432c79 17 * You should have received a copy of the GNU General Public License
wolfSSL 4:1b0d80432c79 18 * along with this program; if not, write to the Free Software
wolfSSL 4:1b0d80432c79 19 * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1335, USA
wolfSSL 4:1b0d80432c79 20 */
wolfSSL 4:1b0d80432c79 21
wolfSSL 4:1b0d80432c79 22
wolfSSL 4:1b0d80432c79 23 /* Based On Daniel J Bernstein's curve25519 Public Domain ref10 work. */
wolfSSL 4:1b0d80432c79 24
wolfSSL 4:1b0d80432c79 25
wolfSSL 4:1b0d80432c79 26 #ifdef HAVE_CONFIG_H
wolfSSL 4:1b0d80432c79 27 #include <config.h>
wolfSSL 4:1b0d80432c79 28 #endif
wolfSSL 4:1b0d80432c79 29
wolfSSL 4:1b0d80432c79 30 #include <wolfssl/wolfcrypt/settings.h>
wolfSSL 4:1b0d80432c79 31
wolfSSL 4:1b0d80432c79 32 #ifdef HAVE_CURVE25519
wolfSSL 4:1b0d80432c79 33
wolfSSL 4:1b0d80432c79 34 #include <wolfssl/wolfcrypt/curve25519.h>
wolfSSL 4:1b0d80432c79 35 #include <wolfssl/wolfcrypt/error-crypt.h>
wolfSSL 4:1b0d80432c79 36 #ifdef NO_INLINE
wolfSSL 4:1b0d80432c79 37 #include <wolfssl/wolfcrypt/misc.h>
wolfSSL 4:1b0d80432c79 38 #else
wolfSSL 4:1b0d80432c79 39 #include <wolfcrypt/src/misc.c>
wolfSSL 4:1b0d80432c79 40 #endif
wolfSSL 4:1b0d80432c79 41
wolfSSL 4:1b0d80432c79 42 const curve25519_set_type curve25519_sets[] = {
wolfSSL 4:1b0d80432c79 43 {
wolfSSL 4:1b0d80432c79 44 32,
wolfSSL 4:1b0d80432c79 45 "CURVE25519",
wolfSSL 4:1b0d80432c79 46 }
wolfSSL 4:1b0d80432c79 47 };
wolfSSL 4:1b0d80432c79 48
wolfSSL 4:1b0d80432c79 49
wolfSSL 4:1b0d80432c79 50 int wc_curve25519_make_key(WC_RNG* rng, int keysize, curve25519_key* key)
wolfSSL 4:1b0d80432c79 51 {
wolfSSL 4:1b0d80432c79 52 unsigned char basepoint[CURVE25519_KEYSIZE] = {9};
wolfSSL 4:1b0d80432c79 53 int ret;
wolfSSL 4:1b0d80432c79 54
wolfSSL 4:1b0d80432c79 55 if (key == NULL || rng == NULL)
wolfSSL 4:1b0d80432c79 56 return BAD_FUNC_ARG;
wolfSSL 4:1b0d80432c79 57
wolfSSL 4:1b0d80432c79 58 /* currently only a key size of 32 bytes is used */
wolfSSL 4:1b0d80432c79 59 if (keysize != CURVE25519_KEYSIZE)
wolfSSL 4:1b0d80432c79 60 return ECC_BAD_ARG_E;
wolfSSL 4:1b0d80432c79 61
wolfSSL 4:1b0d80432c79 62 /* random number for private key */
wolfSSL 4:1b0d80432c79 63 ret = wc_RNG_GenerateBlock(rng, key->k.point, keysize);
wolfSSL 4:1b0d80432c79 64 if (ret != 0)
wolfSSL 4:1b0d80432c79 65 return ret;
wolfSSL 4:1b0d80432c79 66
wolfSSL 4:1b0d80432c79 67 /* Clamp the private key */
wolfSSL 4:1b0d80432c79 68 key->k.point[0] &= 248;
wolfSSL 4:1b0d80432c79 69 key->k.point[CURVE25519_KEYSIZE-1] &= 63; /* same &=127 because |=64 after */
wolfSSL 4:1b0d80432c79 70 key->k.point[CURVE25519_KEYSIZE-1] |= 64;
wolfSSL 4:1b0d80432c79 71
wolfSSL 4:1b0d80432c79 72 /* compute public key */
wolfSSL 4:1b0d80432c79 73 ret = curve25519(key->p.point, key->k.point, basepoint);
wolfSSL 4:1b0d80432c79 74 if (ret != 0) {
wolfSSL 4:1b0d80432c79 75 ForceZero(key->k.point, keysize);
wolfSSL 4:1b0d80432c79 76 ForceZero(key->p.point, keysize);
wolfSSL 4:1b0d80432c79 77 return ret;
wolfSSL 4:1b0d80432c79 78 }
wolfSSL 4:1b0d80432c79 79
wolfSSL 4:1b0d80432c79 80 return ret;
wolfSSL 4:1b0d80432c79 81 }
wolfSSL 4:1b0d80432c79 82
wolfSSL 4:1b0d80432c79 83 #ifdef HAVE_CURVE25519_SHARED_SECRET
wolfSSL 4:1b0d80432c79 84
wolfSSL 4:1b0d80432c79 85 int wc_curve25519_shared_secret(curve25519_key* private_key,
wolfSSL 4:1b0d80432c79 86 curve25519_key* public_key,
wolfSSL 4:1b0d80432c79 87 byte* out, word32* outlen)
wolfSSL 4:1b0d80432c79 88 {
wolfSSL 4:1b0d80432c79 89 return wc_curve25519_shared_secret_ex(private_key, public_key,
wolfSSL 4:1b0d80432c79 90 out, outlen, EC25519_BIG_ENDIAN);
wolfSSL 4:1b0d80432c79 91 }
wolfSSL 4:1b0d80432c79 92
wolfSSL 4:1b0d80432c79 93 int wc_curve25519_shared_secret_ex(curve25519_key* private_key,
wolfSSL 4:1b0d80432c79 94 curve25519_key* public_key,
wolfSSL 4:1b0d80432c79 95 byte* out, word32* outlen, int endian)
wolfSSL 4:1b0d80432c79 96 {
wolfSSL 4:1b0d80432c79 97 unsigned char o[CURVE25519_KEYSIZE];
wolfSSL 4:1b0d80432c79 98 int ret = 0;
wolfSSL 4:1b0d80432c79 99
wolfSSL 4:1b0d80432c79 100 /* sanity check */
wolfSSL 4:1b0d80432c79 101 if (private_key == NULL || public_key == NULL ||
wolfSSL 4:1b0d80432c79 102 out == NULL || outlen == NULL || *outlen < CURVE25519_KEYSIZE)
wolfSSL 4:1b0d80432c79 103 return BAD_FUNC_ARG;
wolfSSL 4:1b0d80432c79 104
wolfSSL 4:1b0d80432c79 105 /* avoid implementation fingerprinting */
wolfSSL 4:1b0d80432c79 106 if (public_key->p.point[CURVE25519_KEYSIZE-1] > 0x7F)
wolfSSL 4:1b0d80432c79 107 return ECC_BAD_ARG_E;
wolfSSL 4:1b0d80432c79 108
wolfSSL 4:1b0d80432c79 109 ret = curve25519(o, private_key->k.point, public_key->p.point);
wolfSSL 4:1b0d80432c79 110 if (ret != 0) {
wolfSSL 4:1b0d80432c79 111 ForceZero(o, CURVE25519_KEYSIZE);
wolfSSL 4:1b0d80432c79 112 return ret;
wolfSSL 4:1b0d80432c79 113 }
wolfSSL 4:1b0d80432c79 114
wolfSSL 4:1b0d80432c79 115 if (endian == EC25519_BIG_ENDIAN) {
wolfSSL 4:1b0d80432c79 116 int i;
wolfSSL 4:1b0d80432c79 117 /* put shared secret key in Big Endian format */
wolfSSL 4:1b0d80432c79 118 for (i = 0; i < CURVE25519_KEYSIZE; i++)
wolfSSL 4:1b0d80432c79 119 out[i] = o[CURVE25519_KEYSIZE - i -1];
wolfSSL 4:1b0d80432c79 120 }
wolfSSL 4:1b0d80432c79 121 else /* put shared secret key in Little Endian format */
wolfSSL 4:1b0d80432c79 122 XMEMCPY(out, o, CURVE25519_KEYSIZE);
wolfSSL 4:1b0d80432c79 123
wolfSSL 4:1b0d80432c79 124 *outlen = CURVE25519_KEYSIZE;
wolfSSL 4:1b0d80432c79 125
wolfSSL 4:1b0d80432c79 126 ForceZero(o, sizeof(o));
wolfSSL 4:1b0d80432c79 127
wolfSSL 4:1b0d80432c79 128 return ret;
wolfSSL 4:1b0d80432c79 129 }
wolfSSL 4:1b0d80432c79 130
wolfSSL 4:1b0d80432c79 131 #endif /* HAVE_CURVE25519_SHARED_SECRET */
wolfSSL 4:1b0d80432c79 132
wolfSSL 4:1b0d80432c79 133 #ifdef HAVE_CURVE25519_KEY_EXPORT
wolfSSL 4:1b0d80432c79 134
wolfSSL 4:1b0d80432c79 135 /* export curve25519 public key (Big endian)
wolfSSL 4:1b0d80432c79 136 * return 0 on success */
wolfSSL 4:1b0d80432c79 137 int wc_curve25519_export_public(curve25519_key* key, byte* out, word32* outLen)
wolfSSL 4:1b0d80432c79 138 {
wolfSSL 4:1b0d80432c79 139 return wc_curve25519_export_public_ex(key, out, outLen, EC25519_BIG_ENDIAN);
wolfSSL 4:1b0d80432c79 140 }
wolfSSL 4:1b0d80432c79 141
wolfSSL 4:1b0d80432c79 142 /* export curve25519 public key (Big or Little endian)
wolfSSL 4:1b0d80432c79 143 * return 0 on success */
wolfSSL 4:1b0d80432c79 144 int wc_curve25519_export_public_ex(curve25519_key* key, byte* out,
wolfSSL 4:1b0d80432c79 145 word32* outLen, int endian)
wolfSSL 4:1b0d80432c79 146 {
wolfSSL 4:1b0d80432c79 147 word32 keySz;
wolfSSL 4:1b0d80432c79 148
wolfSSL 4:1b0d80432c79 149 if (key == NULL || out == NULL || outLen == NULL)
wolfSSL 4:1b0d80432c79 150 return BAD_FUNC_ARG;
wolfSSL 4:1b0d80432c79 151
wolfSSL 4:1b0d80432c79 152 /* check size of outgoing key */
wolfSSL 4:1b0d80432c79 153 keySz = wc_curve25519_size(key);
wolfSSL 4:1b0d80432c79 154
wolfSSL 4:1b0d80432c79 155 /* check and set outgoing key size */
wolfSSL 4:1b0d80432c79 156 if (*outLen < keySz) {
wolfSSL 4:1b0d80432c79 157 *outLen = keySz;
wolfSSL 4:1b0d80432c79 158 return ECC_BAD_ARG_E;
wolfSSL 4:1b0d80432c79 159 }
wolfSSL 4:1b0d80432c79 160 *outLen = keySz;
wolfSSL 4:1b0d80432c79 161
wolfSSL 4:1b0d80432c79 162 if (endian == EC25519_BIG_ENDIAN) {
wolfSSL 4:1b0d80432c79 163 int i;
wolfSSL 4:1b0d80432c79 164
wolfSSL 4:1b0d80432c79 165 /* read keys in Big Endian format */
wolfSSL 4:1b0d80432c79 166 for (i = 0; i < CURVE25519_KEYSIZE; i++)
wolfSSL 4:1b0d80432c79 167 out[i] = key->p.point[CURVE25519_KEYSIZE - i - 1];
wolfSSL 4:1b0d80432c79 168 }
wolfSSL 4:1b0d80432c79 169 else
wolfSSL 4:1b0d80432c79 170 XMEMCPY(out, key->p.point, keySz);
wolfSSL 4:1b0d80432c79 171
wolfSSL 4:1b0d80432c79 172 return 0;
wolfSSL 4:1b0d80432c79 173 }
wolfSSL 4:1b0d80432c79 174
wolfSSL 4:1b0d80432c79 175 #endif /* HAVE_CURVE25519_KEY_EXPORT */
wolfSSL 4:1b0d80432c79 176
wolfSSL 4:1b0d80432c79 177 #ifdef HAVE_CURVE25519_KEY_IMPORT
wolfSSL 4:1b0d80432c79 178
wolfSSL 4:1b0d80432c79 179 /* import curve25519 public key (Big endian)
wolfSSL 4:1b0d80432c79 180 * return 0 on success */
wolfSSL 4:1b0d80432c79 181 int wc_curve25519_import_public(const byte* in, word32 inLen,
wolfSSL 4:1b0d80432c79 182 curve25519_key* key)
wolfSSL 4:1b0d80432c79 183 {
wolfSSL 4:1b0d80432c79 184 return wc_curve25519_import_public_ex(in, inLen, key, EC25519_BIG_ENDIAN);
wolfSSL 4:1b0d80432c79 185 }
wolfSSL 4:1b0d80432c79 186
wolfSSL 4:1b0d80432c79 187 /* import curve25519 public key (Big or Little endian)
wolfSSL 4:1b0d80432c79 188 * return 0 on success */
wolfSSL 4:1b0d80432c79 189 int wc_curve25519_import_public_ex(const byte* in, word32 inLen,
wolfSSL 4:1b0d80432c79 190 curve25519_key* key, int endian)
wolfSSL 4:1b0d80432c79 191 {
wolfSSL 4:1b0d80432c79 192 word32 keySz;
wolfSSL 4:1b0d80432c79 193
wolfSSL 4:1b0d80432c79 194 /* sanity check */
wolfSSL 4:1b0d80432c79 195 if (key == NULL || in == NULL)
wolfSSL 4:1b0d80432c79 196 return BAD_FUNC_ARG;
wolfSSL 4:1b0d80432c79 197
wolfSSL 4:1b0d80432c79 198 /* check size of incoming keys */
wolfSSL 4:1b0d80432c79 199 keySz = wc_curve25519_size(key);
wolfSSL 4:1b0d80432c79 200 if (inLen != keySz)
wolfSSL 4:1b0d80432c79 201 return ECC_BAD_ARG_E;
wolfSSL 4:1b0d80432c79 202
wolfSSL 4:1b0d80432c79 203 if (endian == EC25519_BIG_ENDIAN) {
wolfSSL 4:1b0d80432c79 204 int i;
wolfSSL 4:1b0d80432c79 205
wolfSSL 4:1b0d80432c79 206 /* read keys in Big Endian format */
wolfSSL 4:1b0d80432c79 207 for (i = 0; i < CURVE25519_KEYSIZE; i++)
wolfSSL 4:1b0d80432c79 208 key->p.point[i] = in[CURVE25519_KEYSIZE - i - 1];
wolfSSL 4:1b0d80432c79 209 }
wolfSSL 4:1b0d80432c79 210 else
wolfSSL 4:1b0d80432c79 211 XMEMCPY(key->p.point, in, inLen);
wolfSSL 4:1b0d80432c79 212
wolfSSL 4:1b0d80432c79 213 key->dp = &curve25519_sets[0];
wolfSSL 4:1b0d80432c79 214
wolfSSL 4:1b0d80432c79 215 return 0;
wolfSSL 4:1b0d80432c79 216 }
wolfSSL 4:1b0d80432c79 217
wolfSSL 4:1b0d80432c79 218 #endif /* HAVE_CURVE25519_KEY_IMPORT */
wolfSSL 4:1b0d80432c79 219
wolfSSL 4:1b0d80432c79 220
wolfSSL 4:1b0d80432c79 221 #ifdef HAVE_CURVE25519_KEY_EXPORT
wolfSSL 4:1b0d80432c79 222
wolfSSL 4:1b0d80432c79 223 /* export curve25519 private key only raw (Big endian)
wolfSSL 4:1b0d80432c79 224 * outLen is in/out size
wolfSSL 4:1b0d80432c79 225 * return 0 on success */
wolfSSL 4:1b0d80432c79 226 int wc_curve25519_export_private_raw(curve25519_key* key, byte* out,
wolfSSL 4:1b0d80432c79 227 word32* outLen)
wolfSSL 4:1b0d80432c79 228 {
wolfSSL 4:1b0d80432c79 229 return wc_curve25519_export_private_raw_ex(key, out, outLen,
wolfSSL 4:1b0d80432c79 230 EC25519_BIG_ENDIAN);
wolfSSL 4:1b0d80432c79 231 }
wolfSSL 4:1b0d80432c79 232
wolfSSL 4:1b0d80432c79 233 /* export curve25519 private key only raw (Big or Little endian)
wolfSSL 4:1b0d80432c79 234 * outLen is in/out size
wolfSSL 4:1b0d80432c79 235 * return 0 on success */
wolfSSL 4:1b0d80432c79 236 int wc_curve25519_export_private_raw_ex(curve25519_key* key, byte* out,
wolfSSL 4:1b0d80432c79 237 word32* outLen, int endian)
wolfSSL 4:1b0d80432c79 238 {
wolfSSL 4:1b0d80432c79 239 word32 keySz;
wolfSSL 4:1b0d80432c79 240
wolfSSL 4:1b0d80432c79 241 /* sanity check */
wolfSSL 4:1b0d80432c79 242 if (key == NULL || out == NULL || outLen == NULL)
wolfSSL 4:1b0d80432c79 243 return BAD_FUNC_ARG;
wolfSSL 4:1b0d80432c79 244
wolfSSL 4:1b0d80432c79 245 /* check size of outgoing buffer */
wolfSSL 4:1b0d80432c79 246 keySz = wc_curve25519_size(key);
wolfSSL 4:1b0d80432c79 247 if (*outLen < keySz) {
wolfSSL 4:1b0d80432c79 248 *outLen = keySz;
wolfSSL 4:1b0d80432c79 249 return ECC_BAD_ARG_E;
wolfSSL 4:1b0d80432c79 250 }
wolfSSL 4:1b0d80432c79 251 *outLen = keySz;
wolfSSL 4:1b0d80432c79 252
wolfSSL 4:1b0d80432c79 253 if (endian == EC25519_BIG_ENDIAN) {
wolfSSL 4:1b0d80432c79 254 int i;
wolfSSL 4:1b0d80432c79 255
wolfSSL 4:1b0d80432c79 256 /* put the key in Big Endian format */
wolfSSL 4:1b0d80432c79 257 for (i = 0; i < CURVE25519_KEYSIZE; i++)
wolfSSL 4:1b0d80432c79 258 out[i] = key->k.point[CURVE25519_KEYSIZE - i - 1];
wolfSSL 4:1b0d80432c79 259 }
wolfSSL 4:1b0d80432c79 260 else
wolfSSL 4:1b0d80432c79 261 XMEMCPY(out, key->k.point, keySz);
wolfSSL 4:1b0d80432c79 262
wolfSSL 4:1b0d80432c79 263 return 0;
wolfSSL 4:1b0d80432c79 264 }
wolfSSL 4:1b0d80432c79 265
wolfSSL 4:1b0d80432c79 266 /* curve25519 key pair export (Big or Little endian)
wolfSSL 4:1b0d80432c79 267 * return 0 on success */
wolfSSL 4:1b0d80432c79 268 int wc_curve25519_export_key_raw(curve25519_key* key,
wolfSSL 4:1b0d80432c79 269 byte* priv, word32 *privSz,
wolfSSL 4:1b0d80432c79 270 byte* pub, word32 *pubSz)
wolfSSL 4:1b0d80432c79 271 {
wolfSSL 4:1b0d80432c79 272 return wc_curve25519_export_key_raw_ex(key, priv, privSz,
wolfSSL 4:1b0d80432c79 273 pub, pubSz, EC25519_BIG_ENDIAN);
wolfSSL 4:1b0d80432c79 274 }
wolfSSL 4:1b0d80432c79 275
wolfSSL 4:1b0d80432c79 276 /* curve25519 key pair export (Big or Little endian)
wolfSSL 4:1b0d80432c79 277 * return 0 on success */
wolfSSL 4:1b0d80432c79 278 int wc_curve25519_export_key_raw_ex(curve25519_key* key,
wolfSSL 4:1b0d80432c79 279 byte* priv, word32 *privSz,
wolfSSL 4:1b0d80432c79 280 byte* pub, word32 *pubSz,
wolfSSL 4:1b0d80432c79 281 int endian)
wolfSSL 4:1b0d80432c79 282 {
wolfSSL 4:1b0d80432c79 283 int ret;
wolfSSL 4:1b0d80432c79 284
wolfSSL 4:1b0d80432c79 285 /* export private part */
wolfSSL 4:1b0d80432c79 286 ret = wc_curve25519_export_private_raw_ex(key, priv, privSz, endian);
wolfSSL 4:1b0d80432c79 287 if (ret != 0)
wolfSSL 4:1b0d80432c79 288 return ret;
wolfSSL 4:1b0d80432c79 289
wolfSSL 4:1b0d80432c79 290 /* export public part */
wolfSSL 4:1b0d80432c79 291 return wc_curve25519_export_public_ex(key, pub, pubSz, endian);
wolfSSL 4:1b0d80432c79 292 }
wolfSSL 4:1b0d80432c79 293
wolfSSL 4:1b0d80432c79 294 #endif /* HAVE_CURVE25519_KEY_EXPORT */
wolfSSL 4:1b0d80432c79 295
wolfSSL 4:1b0d80432c79 296 #ifdef HAVE_CURVE25519_KEY_IMPORT
wolfSSL 4:1b0d80432c79 297
wolfSSL 4:1b0d80432c79 298 /* curve25519 private key import (Big endian)
wolfSSL 4:1b0d80432c79 299 * Public key to match private key needs to be imported too
wolfSSL 4:1b0d80432c79 300 * return 0 on success */
wolfSSL 4:1b0d80432c79 301 int wc_curve25519_import_private_raw(const byte* priv, word32 privSz,
wolfSSL 4:1b0d80432c79 302 const byte* pub, word32 pubSz,
wolfSSL 4:1b0d80432c79 303 curve25519_key* key)
wolfSSL 4:1b0d80432c79 304 {
wolfSSL 4:1b0d80432c79 305 return wc_curve25519_import_private_raw_ex(priv, privSz, pub, pubSz,
wolfSSL 4:1b0d80432c79 306 key, EC25519_BIG_ENDIAN);
wolfSSL 4:1b0d80432c79 307 }
wolfSSL 4:1b0d80432c79 308
wolfSSL 4:1b0d80432c79 309 /* curve25519 private key import (Big or Little endian)
wolfSSL 4:1b0d80432c79 310 * Public key to match private key needs to be imported too
wolfSSL 4:1b0d80432c79 311 * return 0 on success */
wolfSSL 4:1b0d80432c79 312 int wc_curve25519_import_private_raw_ex(const byte* priv, word32 privSz,
wolfSSL 4:1b0d80432c79 313 const byte* pub, word32 pubSz,
wolfSSL 4:1b0d80432c79 314 curve25519_key* key, int endian)
wolfSSL 4:1b0d80432c79 315 {
wolfSSL 4:1b0d80432c79 316 int ret;
wolfSSL 4:1b0d80432c79 317
wolfSSL 4:1b0d80432c79 318 /* import private part */
wolfSSL 4:1b0d80432c79 319 ret = wc_curve25519_import_private_ex(priv, privSz, key, endian);
wolfSSL 4:1b0d80432c79 320 if (ret != 0)
wolfSSL 4:1b0d80432c79 321 return ret;
wolfSSL 4:1b0d80432c79 322
wolfSSL 4:1b0d80432c79 323 /* import public part */
wolfSSL 4:1b0d80432c79 324 return wc_curve25519_import_public_ex(pub, pubSz, key, endian);
wolfSSL 4:1b0d80432c79 325 }
wolfSSL 4:1b0d80432c79 326
wolfSSL 4:1b0d80432c79 327 /* curve25519 private key import only. (Big endian)
wolfSSL 4:1b0d80432c79 328 * return 0 on success */
wolfSSL 4:1b0d80432c79 329 int wc_curve25519_import_private(const byte* priv, word32 privSz,
wolfSSL 4:1b0d80432c79 330 curve25519_key* key)
wolfSSL 4:1b0d80432c79 331 {
wolfSSL 4:1b0d80432c79 332 return wc_curve25519_import_private_ex(priv, privSz,
wolfSSL 4:1b0d80432c79 333 key, EC25519_BIG_ENDIAN);
wolfSSL 4:1b0d80432c79 334 }
wolfSSL 4:1b0d80432c79 335
wolfSSL 4:1b0d80432c79 336 /* curve25519 private key import only. (Big or Little endian)
wolfSSL 4:1b0d80432c79 337 * return 0 on success */
wolfSSL 4:1b0d80432c79 338 int wc_curve25519_import_private_ex(const byte* priv, word32 privSz,
wolfSSL 4:1b0d80432c79 339 curve25519_key* key, int endian)
wolfSSL 4:1b0d80432c79 340 {
wolfSSL 4:1b0d80432c79 341 /* sanity check */
wolfSSL 4:1b0d80432c79 342 if (key == NULL || priv == NULL)
wolfSSL 4:1b0d80432c79 343 return BAD_FUNC_ARG;
wolfSSL 4:1b0d80432c79 344
wolfSSL 4:1b0d80432c79 345 /* check size of incoming keys */
wolfSSL 4:1b0d80432c79 346 if ((int)privSz != wc_curve25519_size(key))
wolfSSL 4:1b0d80432c79 347 return ECC_BAD_ARG_E;
wolfSSL 4:1b0d80432c79 348
wolfSSL 4:1b0d80432c79 349 if (endian == EC25519_BIG_ENDIAN) {
wolfSSL 4:1b0d80432c79 350 int i;
wolfSSL 4:1b0d80432c79 351
wolfSSL 4:1b0d80432c79 352 /* read the key in Big Endian format */
wolfSSL 4:1b0d80432c79 353 for (i = 0; i < CURVE25519_KEYSIZE; i++)
wolfSSL 4:1b0d80432c79 354 key->k.point[i] = priv[CURVE25519_KEYSIZE - i - 1];
wolfSSL 4:1b0d80432c79 355 }
wolfSSL 4:1b0d80432c79 356 else
wolfSSL 4:1b0d80432c79 357 XMEMCPY(key->k.point, priv, privSz);
wolfSSL 4:1b0d80432c79 358
wolfSSL 4:1b0d80432c79 359 key->dp = &curve25519_sets[0];
wolfSSL 4:1b0d80432c79 360
wolfSSL 4:1b0d80432c79 361 /* Clamp the key */
wolfSSL 4:1b0d80432c79 362 key->k.point[0] &= 248;
wolfSSL 4:1b0d80432c79 363 key->k.point[privSz-1] &= 63; /* same &=127 because |=64 after */
wolfSSL 4:1b0d80432c79 364 key->k.point[privSz-1] |= 64;
wolfSSL 4:1b0d80432c79 365
wolfSSL 4:1b0d80432c79 366 return 0;
wolfSSL 4:1b0d80432c79 367 }
wolfSSL 4:1b0d80432c79 368
wolfSSL 4:1b0d80432c79 369 #endif /* HAVE_CURVE25519_KEY_IMPORT */
wolfSSL 4:1b0d80432c79 370
wolfSSL 4:1b0d80432c79 371
wolfSSL 4:1b0d80432c79 372 int wc_curve25519_init(curve25519_key* key)
wolfSSL 4:1b0d80432c79 373 {
wolfSSL 4:1b0d80432c79 374 if (key == NULL)
wolfSSL 4:1b0d80432c79 375 return BAD_FUNC_ARG;
wolfSSL 4:1b0d80432c79 376
wolfSSL 4:1b0d80432c79 377 /* currently the format for curve25519 */
wolfSSL 4:1b0d80432c79 378 key->dp = &curve25519_sets[0];
wolfSSL 4:1b0d80432c79 379
wolfSSL 4:1b0d80432c79 380 XMEMSET(key->k.point, 0, key->dp->size);
wolfSSL 4:1b0d80432c79 381 XMEMSET(key->p.point, 0, key->dp->size);
wolfSSL 4:1b0d80432c79 382
wolfSSL 4:1b0d80432c79 383 return 0;
wolfSSL 4:1b0d80432c79 384 }
wolfSSL 4:1b0d80432c79 385
wolfSSL 4:1b0d80432c79 386
wolfSSL 4:1b0d80432c79 387 /* Clean the memory of a key */
wolfSSL 4:1b0d80432c79 388 void wc_curve25519_free(curve25519_key* key)
wolfSSL 4:1b0d80432c79 389 {
wolfSSL 4:1b0d80432c79 390 if (key == NULL)
wolfSSL 4:1b0d80432c79 391 return;
wolfSSL 4:1b0d80432c79 392
wolfSSL 4:1b0d80432c79 393 key->dp = NULL;
wolfSSL 4:1b0d80432c79 394 ForceZero(key->p.point, sizeof(key->p.point));
wolfSSL 4:1b0d80432c79 395 ForceZero(key->k.point, sizeof(key->k.point));
wolfSSL 4:1b0d80432c79 396 }
wolfSSL 4:1b0d80432c79 397
wolfSSL 4:1b0d80432c79 398
wolfSSL 4:1b0d80432c79 399 /* get key size */
wolfSSL 4:1b0d80432c79 400 int wc_curve25519_size(curve25519_key* key)
wolfSSL 4:1b0d80432c79 401 {
wolfSSL 4:1b0d80432c79 402 if (key == NULL)
wolfSSL 4:1b0d80432c79 403 return 0;
wolfSSL 4:1b0d80432c79 404
wolfSSL 4:1b0d80432c79 405 return key->dp->size;
wolfSSL 4:1b0d80432c79 406 }
wolfSSL 4:1b0d80432c79 407
wolfSSL 4:1b0d80432c79 408 #endif /*HAVE_CURVE25519*/
wolfSSL 4:1b0d80432c79 409
wolfSSL 4:1b0d80432c79 410