/src/libressl/crypto/bn/bn_exp2.c
Line | Count | Source (jump to first uncovered line) |
1 | | /* $OpenBSD: bn_exp2.c,v 1.13 2022/02/07 19:49:56 tb Exp $ */ |
2 | | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
3 | | * All rights reserved. |
4 | | * |
5 | | * This package is an SSL implementation written |
6 | | * by Eric Young (eay@cryptsoft.com). |
7 | | * The implementation was written so as to conform with Netscapes SSL. |
8 | | * |
9 | | * This library is free for commercial and non-commercial use as long as |
10 | | * the following conditions are aheared to. The following conditions |
11 | | * apply to all code found in this distribution, be it the RC4, RSA, |
12 | | * lhash, DES, etc., code; not just the SSL code. The SSL documentation |
13 | | * included with this distribution is covered by the same copyright terms |
14 | | * except that the holder is Tim Hudson (tjh@cryptsoft.com). |
15 | | * |
16 | | * Copyright remains Eric Young's, and as such any Copyright notices in |
17 | | * the code are not to be removed. |
18 | | * If this package is used in a product, Eric Young should be given attribution |
19 | | * as the author of the parts of the library used. |
20 | | * This can be in the form of a textual message at program startup or |
21 | | * in documentation (online or textual) provided with the package. |
22 | | * |
23 | | * Redistribution and use in source and binary forms, with or without |
24 | | * modification, are permitted provided that the following conditions |
25 | | * are met: |
26 | | * 1. Redistributions of source code must retain the copyright |
27 | | * notice, this list of conditions and the following disclaimer. |
28 | | * 2. Redistributions in binary form must reproduce the above copyright |
29 | | * notice, this list of conditions and the following disclaimer in the |
30 | | * documentation and/or other materials provided with the distribution. |
31 | | * 3. All advertising materials mentioning features or use of this software |
32 | | * must display the following acknowledgement: |
33 | | * "This product includes cryptographic software written by |
34 | | * Eric Young (eay@cryptsoft.com)" |
35 | | * The word 'cryptographic' can be left out if the rouines from the library |
36 | | * being used are not cryptographic related :-). |
37 | | * 4. If you include any Windows specific code (or a derivative thereof) from |
38 | | * the apps directory (application code) you must include an acknowledgement: |
39 | | * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" |
40 | | * |
41 | | * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND |
42 | | * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE |
43 | | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE |
44 | | * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE |
45 | | * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL |
46 | | * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS |
47 | | * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) |
48 | | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT |
49 | | * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY |
50 | | * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF |
51 | | * SUCH DAMAGE. |
52 | | * |
53 | | * The licence and distribution terms for any publically available version or |
54 | | * derivative of this code cannot be changed. i.e. this code cannot simply be |
55 | | * copied and put under another distribution licence |
56 | | * [including the GNU Public Licence.] |
57 | | */ |
58 | | /* ==================================================================== |
59 | | * Copyright (c) 1998-2000 The OpenSSL Project. All rights reserved. |
60 | | * |
61 | | * Redistribution and use in source and binary forms, with or without |
62 | | * modification, are permitted provided that the following conditions |
63 | | * are met: |
64 | | * |
65 | | * 1. Redistributions of source code must retain the above copyright |
66 | | * notice, this list of conditions and the following disclaimer. |
67 | | * |
68 | | * 2. Redistributions in binary form must reproduce the above copyright |
69 | | * notice, this list of conditions and the following disclaimer in |
70 | | * the documentation and/or other materials provided with the |
71 | | * distribution. |
72 | | * |
73 | | * 3. All advertising materials mentioning features or use of this |
74 | | * software must display the following acknowledgment: |
75 | | * "This product includes software developed by the OpenSSL Project |
76 | | * for use in the OpenSSL Toolkit. (http://www.openssl.org/)" |
77 | | * |
78 | | * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to |
79 | | * endorse or promote products derived from this software without |
80 | | * prior written permission. For written permission, please contact |
81 | | * openssl-core@openssl.org. |
82 | | * |
83 | | * 5. Products derived from this software may not be called "OpenSSL" |
84 | | * nor may "OpenSSL" appear in their names without prior written |
85 | | * permission of the OpenSSL Project. |
86 | | * |
87 | | * 6. Redistributions of any form whatsoever must retain the following |
88 | | * acknowledgment: |
89 | | * "This product includes software developed by the OpenSSL Project |
90 | | * for use in the OpenSSL Toolkit (http://www.openssl.org/)" |
91 | | * |
92 | | * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY |
93 | | * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE |
94 | | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR |
95 | | * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR |
96 | | * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, |
97 | | * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT |
98 | | * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; |
99 | | * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) |
100 | | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, |
101 | | * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) |
102 | | * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED |
103 | | * OF THE POSSIBILITY OF SUCH DAMAGE. |
104 | | * ==================================================================== |
105 | | * |
106 | | * This product includes cryptographic software written by Eric Young |
107 | | * (eay@cryptsoft.com). This product includes software written by Tim |
108 | | * Hudson (tjh@cryptsoft.com). |
109 | | * |
110 | | */ |
111 | | |
112 | | #include <stdio.h> |
113 | | |
114 | | #include <openssl/err.h> |
115 | | |
116 | | #include "bn_lcl.h" |
117 | | |
118 | | #define TABLE_SIZE 32 |
119 | | |
120 | | int |
121 | | BN_mod_exp2_mont(BIGNUM *rr, const BIGNUM *a1, const BIGNUM *p1, |
122 | | const BIGNUM *a2, const BIGNUM *p2, const BIGNUM *m, BN_CTX *ctx, |
123 | | BN_MONT_CTX *in_mont) |
124 | 0 | { |
125 | 0 | int i, j, bits, b, bits1, bits2, ret = 0, wpos1, wpos2, window1, window2, wvalue1, wvalue2; |
126 | 0 | int r_is_one = 1; |
127 | 0 | BIGNUM *d, *r; |
128 | 0 | const BIGNUM *a_mod_m; |
129 | | /* Tables of variables obtained from 'ctx' */ |
130 | 0 | BIGNUM *val1[TABLE_SIZE], *val2[TABLE_SIZE]; |
131 | 0 | BN_MONT_CTX *mont = NULL; |
132 | |
|
133 | 0 | bn_check_top(a1); |
134 | 0 | bn_check_top(p1); |
135 | 0 | bn_check_top(a2); |
136 | 0 | bn_check_top(p2); |
137 | 0 | bn_check_top(m); |
138 | |
|
139 | 0 | if (!BN_is_odd(m)) { |
140 | 0 | BNerror(BN_R_CALLED_WITH_EVEN_MODULUS); |
141 | 0 | return (0); |
142 | 0 | } |
143 | 0 | bits1 = BN_num_bits(p1); |
144 | 0 | bits2 = BN_num_bits(p2); |
145 | 0 | if ((bits1 == 0) && (bits2 == 0)) { |
146 | 0 | ret = BN_one(rr); |
147 | 0 | return ret; |
148 | 0 | } |
149 | | |
150 | 0 | bits = (bits1 > bits2) ? bits1 : bits2; |
151 | |
|
152 | 0 | BN_CTX_start(ctx); |
153 | 0 | if ((d = BN_CTX_get(ctx)) == NULL) |
154 | 0 | goto err; |
155 | 0 | if ((r = BN_CTX_get(ctx)) == NULL) |
156 | 0 | goto err; |
157 | 0 | if ((val1[0] = BN_CTX_get(ctx)) == NULL) |
158 | 0 | goto err; |
159 | 0 | if ((val2[0] = BN_CTX_get(ctx)) == NULL) |
160 | 0 | goto err; |
161 | | |
162 | 0 | if (in_mont != NULL) |
163 | 0 | mont = in_mont; |
164 | 0 | else { |
165 | 0 | if ((mont = BN_MONT_CTX_new()) == NULL) |
166 | 0 | goto err; |
167 | 0 | if (!BN_MONT_CTX_set(mont, m, ctx)) |
168 | 0 | goto err; |
169 | 0 | } |
170 | | |
171 | 0 | window1 = BN_window_bits_for_exponent_size(bits1); |
172 | 0 | window2 = BN_window_bits_for_exponent_size(bits2); |
173 | | |
174 | | /* |
175 | | * Build table for a1: val1[i] := a1^(2*i + 1) mod m for i = 0 .. 2^(window1-1) |
176 | | */ |
177 | 0 | if (a1->neg || BN_ucmp(a1, m) >= 0) { |
178 | 0 | if (!BN_mod_ct(val1[0], a1, m, ctx)) |
179 | 0 | goto err; |
180 | 0 | a_mod_m = val1[0]; |
181 | 0 | } else |
182 | 0 | a_mod_m = a1; |
183 | 0 | if (BN_is_zero(a_mod_m)) { |
184 | 0 | BN_zero(rr); |
185 | 0 | ret = 1; |
186 | 0 | goto err; |
187 | 0 | } |
188 | | |
189 | 0 | if (!BN_to_montgomery(val1[0], a_mod_m, mont, ctx)) |
190 | 0 | goto err; |
191 | 0 | if (window1 > 1) { |
192 | 0 | if (!BN_mod_mul_montgomery(d, val1[0], val1[0], mont, ctx)) |
193 | 0 | goto err; |
194 | | |
195 | 0 | j = 1 << (window1 - 1); |
196 | 0 | for (i = 1; i < j; i++) { |
197 | 0 | if (((val1[i] = BN_CTX_get(ctx)) == NULL) || |
198 | 0 | !BN_mod_mul_montgomery(val1[i], val1[i - 1], |
199 | 0 | d, mont, ctx)) |
200 | 0 | goto err; |
201 | 0 | } |
202 | 0 | } |
203 | | |
204 | | |
205 | | /* |
206 | | * Build table for a2: val2[i] := a2^(2*i + 1) mod m for i = 0 .. 2^(window2-1) |
207 | | */ |
208 | 0 | if (a2->neg || BN_ucmp(a2, m) >= 0) { |
209 | 0 | if (!BN_mod_ct(val2[0], a2, m, ctx)) |
210 | 0 | goto err; |
211 | 0 | a_mod_m = val2[0]; |
212 | 0 | } else |
213 | 0 | a_mod_m = a2; |
214 | 0 | if (BN_is_zero(a_mod_m)) { |
215 | 0 | BN_zero(rr); |
216 | 0 | ret = 1; |
217 | 0 | goto err; |
218 | 0 | } |
219 | 0 | if (!BN_to_montgomery(val2[0], a_mod_m, mont, ctx)) |
220 | 0 | goto err; |
221 | 0 | if (window2 > 1) { |
222 | 0 | if (!BN_mod_mul_montgomery(d, val2[0], val2[0], mont, ctx)) |
223 | 0 | goto err; |
224 | | |
225 | 0 | j = 1 << (window2 - 1); |
226 | 0 | for (i = 1; i < j; i++) { |
227 | 0 | if (((val2[i] = BN_CTX_get(ctx)) == NULL) || |
228 | 0 | !BN_mod_mul_montgomery(val2[i], val2[i - 1], |
229 | 0 | d, mont, ctx)) |
230 | 0 | goto err; |
231 | 0 | } |
232 | 0 | } |
233 | | |
234 | | |
235 | | /* Now compute the power product, using independent windows. */ |
236 | 0 | r_is_one = 1; |
237 | 0 | wvalue1 = 0; /* The 'value' of the first window */ |
238 | 0 | wvalue2 = 0; /* The 'value' of the second window */ |
239 | 0 | wpos1 = 0; /* If wvalue1 > 0, the bottom bit of the first window */ |
240 | 0 | wpos2 = 0; /* If wvalue2 > 0, the bottom bit of the second window */ |
241 | |
|
242 | 0 | if (!BN_to_montgomery(r, BN_value_one(), mont, ctx)) |
243 | 0 | goto err; |
244 | 0 | for (b = bits - 1; b >= 0; b--) { |
245 | 0 | if (!r_is_one) { |
246 | 0 | if (!BN_mod_mul_montgomery(r, r,r, mont, ctx)) |
247 | 0 | goto err; |
248 | 0 | } |
249 | | |
250 | 0 | if (!wvalue1) |
251 | 0 | if (BN_is_bit_set(p1, b)) { |
252 | | /* consider bits b-window1+1 .. b for this window */ |
253 | 0 | i = b - window1 + 1; |
254 | 0 | while (!BN_is_bit_set(p1, i)) /* works for i<0 */ |
255 | 0 | i++; |
256 | 0 | wpos1 = i; |
257 | 0 | wvalue1 = 1; |
258 | 0 | for (i = b - 1; i >= wpos1; i--) { |
259 | 0 | wvalue1 <<= 1; |
260 | 0 | if (BN_is_bit_set(p1, i)) |
261 | 0 | wvalue1++; |
262 | 0 | } |
263 | 0 | } |
264 | |
|
265 | 0 | if (!wvalue2) |
266 | 0 | if (BN_is_bit_set(p2, b)) { |
267 | | /* consider bits b-window2+1 .. b for this window */ |
268 | 0 | i = b - window2 + 1; |
269 | 0 | while (!BN_is_bit_set(p2, i)) |
270 | 0 | i++; |
271 | 0 | wpos2 = i; |
272 | 0 | wvalue2 = 1; |
273 | 0 | for (i = b - 1; i >= wpos2; i--) { |
274 | 0 | wvalue2 <<= 1; |
275 | 0 | if (BN_is_bit_set(p2, i)) |
276 | 0 | wvalue2++; |
277 | 0 | } |
278 | 0 | } |
279 | |
|
280 | 0 | if (wvalue1 && b == wpos1) { |
281 | | /* wvalue1 is odd and < 2^window1 */ |
282 | 0 | if (!BN_mod_mul_montgomery(r, r, val1[wvalue1 >> 1], |
283 | 0 | mont, ctx)) |
284 | 0 | goto err; |
285 | 0 | wvalue1 = 0; |
286 | 0 | r_is_one = 0; |
287 | 0 | } |
288 | | |
289 | 0 | if (wvalue2 && b == wpos2) { |
290 | | /* wvalue2 is odd and < 2^window2 */ |
291 | 0 | if (!BN_mod_mul_montgomery(r, r, val2[wvalue2 >> 1], |
292 | 0 | mont, ctx)) |
293 | 0 | goto err; |
294 | 0 | wvalue2 = 0; |
295 | 0 | r_is_one = 0; |
296 | 0 | } |
297 | 0 | } |
298 | 0 | if (!BN_from_montgomery(rr, r,mont, ctx)) |
299 | 0 | goto err; |
300 | 0 | ret = 1; |
301 | |
|
302 | 0 | err: |
303 | 0 | if ((in_mont == NULL) && (mont != NULL)) |
304 | 0 | BN_MONT_CTX_free(mont); |
305 | 0 | BN_CTX_end(ctx); |
306 | 0 | bn_check_top(rr); |
307 | 0 | return (ret); |
308 | 0 | } |