1
0
mirror of https://github.com/trezor/trezor-firmware.git synced 2024-12-18 04:18:10 +00:00

fix(crypto): reduce digest in RFC6979 to match specification

This commit is contained in:
Ondřej Vejpustek 2022-01-26 17:53:04 +01:00
parent ea5886026f
commit 53d522a1fd
3 changed files with 71 additions and 2 deletions

View File

@ -21,14 +21,30 @@
* ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR
* OTHER DEALINGS IN THE SOFTWARE.
*/
#include <assert.h>
#include "rfc6979.h"
#include "hmac_drbg.h"
#include "memzero.h"
#include "rfc6979.h"
void init_rfc6979(const uint8_t *priv_key, const uint8_t *hash,
const ecdsa_curve *curve, rfc6979_state *state) {
if (curve) {
bignum256 hash_bn = {0};
bn_read_be(hash, &hash_bn);
// Make sure hash is partly reduced modulo order
assert(bn_bitcount(&curve->order) >= 256);
bn_mod(&hash_bn, &curve->order);
uint8_t hash_reduced[32] = {0};
bn_write_be(&hash_bn, hash_reduced);
memzero(&hash_bn, sizeof(hash_bn));
hmac_drbg_init(state, priv_key, 32, hash_reduced, 32);
memzero(hash_reduced, sizeof(hash_reduced));
} else {
hmac_drbg_init(state, priv_key, 32, hash, 32);
}
}
// generate next number from deterministic random number generator

View File

@ -27,6 +27,7 @@
#include <stdint.h>
#include "bignum.h"
#include "ecdsa.h"
#include "hmac_drbg.h"
// rfc6979 pseudo random number generator state

View File

@ -3802,6 +3802,54 @@ START_TEST(test_rfc6979) {
}
END_TEST
static void test_ecdsa_sign_digest_deterministic_helper(
int (*ecdsa_sign_digest_fn)(const ecdsa_curve *, const uint8_t *,
const uint8_t *, uint8_t *, uint8_t *,
int (*)(uint8_t by, uint8_t sig[64]))) {
static struct {
const char *priv_key;
const char *digest;
const char *sig;
} tests[] = {
{"312155017c70a204106e034520e0cdf17b3e54516e2ece38e38e38e38e38e38e",
"ffffffffffffffffffffffffffffffff20202020202020202020202020202020",
"e3d70248ea2fc771fc8d5e62d76b9cfd5402c96990333549eaadce1ae9f737eb"
"5cfbdc7d1e0ec18cc9b57bbb18f0a57dc929ec3c4dfac9073c581705015f6a8a"},
{"312155017c70a204106e034520e0cdf17b3e54516e2ece38e38e38e38e38e38e",
"2020202020202020202020202020202020202020202020202020202020202020",
"40666188895430715552a7e4c6b53851f37a93030fb94e043850921242db78e8"
"75aa2ac9fd7e5a19402973e60e64382cdc29a09ebf6cb37e92f23be5b9251aee"},
};
const ecdsa_curve *curve = &secp256k1;
uint8_t priv_key[32] = {0};
uint8_t digest[32] = {0};
uint8_t expected_sig[64] = {0};
uint8_t computed_sig[64] = {0};
int res = 0;
for (size_t i = 0; i < sizeof(tests) / sizeof(*tests); i++) {
memcpy(priv_key, fromhex(tests[i].priv_key), 32);
memcpy(digest, fromhex(tests[i].digest), 32);
memcpy(expected_sig, fromhex(tests[i].sig), 64);
res =
ecdsa_sign_digest_fn(curve, priv_key, digest, computed_sig, NULL, NULL);
ck_assert_int_eq(res, 0);
ck_assert_mem_eq(expected_sig, computed_sig, 64);
}
}
START_TEST(test_ecdsa_sign_digest_deterministic) {
test_ecdsa_sign_digest_deterministic_helper(ecdsa_sign_digest);
}
END_TEST
START_TEST(test_zkp_ecdsa_sign_digest_deterministic) {
test_ecdsa_sign_digest_deterministic_helper(zkp_ecdsa_sign_digest);
}
END_TEST
// test vectors from
// http://www.inconteam.com/software-development/41-encryption/55-aes-test-vectors
START_TEST(test_aes) {
@ -9461,6 +9509,10 @@ Suite *test_suite(void) {
tcase_add_test(tc, test_zkp_ecdsa_get_public_key65);
tcase_add_test(tc, test_zkp_ecdsa_recover_pub_from_sig);
tcase_add_test(tc, test_zkp_ecdsa_verify_digest);
#if USE_RFC6979
tcase_add_test(tc, test_ecdsa_sign_digest_deterministic);
tcase_add_test(tc, test_zkp_ecdsa_sign_digest_deterministic);
#endif
suite_add_tcase(s, tc);
tc = tcase_create("rfc6979");