Received: by 2002:a05:6a10:f347:0:0:0:0 with SMTP id d7csp450178pxu; Fri, 11 Dec 2020 06:19:13 -0800 (PST) X-Google-Smtp-Source: ABdhPJyV1VtId45rTwD3iLML8yEKaiKTkJ9D+Gxub68xZodgYEsUfgUt+vnfi7FgTIgdGeSOQehv X-Received: by 2002:a17:907:1004:: with SMTP id ox4mr10991793ejb.240.1607696353485; Fri, 11 Dec 2020 06:19:13 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1607696353; cv=none; d=google.com; s=arc-20160816; b=SGTM3xTas7bG7cD0izYzNQD/3TtKJX/1sUAJ05HF7jD+cPI2wi3hoyjpKzxK1edLpf F1uOfRQtm1m4OtsPDPMyPuqx2utnMMgiCWkGWl1V2uQXSPCViACLCY/bGnX7bKm39DXI BMvXL/Kw1ICCPa4frEaGieiJb/I2+w29mi07oHByxgtRvfwjMYGvyHAeRZ3TzijZGfIO Mw6BluQ97taoQPfRuULk5kuKT+CBxNZ01ZtUMfMoN+dn51+89ayaLu0mazBz3m36rBn6 SEVxZJNPnToABOqHbvRQhf1mmd6Pq3TiMiLGf6GfWmf8PlsVsMM2GxJ2/DgzHN9fzXFg B/WA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date; bh=NaVVev02vhLtqbT0O5FRZ6ha5K4fbT7Vi9Wri1wQZ28=; b=c5GwpCv36uUIXNNAKsQoyW6fg/rwXRq26CfQvMGa/jA3V1SqOnKzyOepTWHCxWMEc4 oblc2qeKzx/m16cNPJE8jgtt28JSM/0c0vAiFOSloS60cBaYJaPkVjHheRPOOoigqm/7 O1JxbVwQSyuL8leFOebWFVrrcCW2ipKICnILkUlbYcaYnKj695IwsQVrg+i/CRK/JZBE zAVvL4eh3ujGMdsQ9VhIz8PNBruOK8Zx5jhkltALpcBOTTv3vCdBhRZmkHjMRxEdAKj8 oj+xBWtuRHqXRtrz2q7E1lO2VpPyN6OWWe/a2JQ8crIP3JRqi+9WKDyYF9hWxFanYPQH FPVA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id me13si4460877ejb.582.2020.12.11.06.18.49; Fri, 11 Dec 2020 06:19:13 -0800 (PST) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2404832AbgLKNZ2 (ORCPT + 99 others); Fri, 11 Dec 2020 08:25:28 -0500 Received: from vmicros1.altlinux.org ([194.107.17.57]:58782 "EHLO vmicros1.altlinux.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727476AbgLKNZL (ORCPT ); Fri, 11 Dec 2020 08:25:11 -0500 X-Greylist: delayed 638 seconds by postgrey-1.27 at vger.kernel.org; Fri, 11 Dec 2020 08:25:09 EST Received: from imap.altlinux.org (imap.altlinux.org [194.107.17.38]) by vmicros1.altlinux.org (Postfix) with ESMTP id D09F672C8B1; Fri, 11 Dec 2020 16:13:49 +0300 (MSK) Received: from altlinux.org (sole.flsd.net [185.75.180.6]) by imap.altlinux.org (Postfix) with ESMTPSA id A44284A470A; Fri, 11 Dec 2020 16:13:49 +0300 (MSK) Date: Fri, 11 Dec 2020 16:13:49 +0300 From: Vitaly Chikunov To: Meng Yu Cc: herbert@gondor.apana.org.au, davem@davemloft.net, linux-crypto@vger.kernel.org, xuzaibo@huawei.com, wangzhou1@hisilicon.com, linux-kernel@vger.kernel.org Subject: Re: [PATCH v4 3/5] crypto: expose elliptic curve parameters as Crypto APIs Message-ID: <20201211131349.pe6i5wafg2kq2w35@altlinux.org> References: <1607668234-46130-1-git-send-email-yumeng18@huawei.com> <1607668234-46130-4-git-send-email-yumeng18@huawei.com> MIME-Version: 1.0 Content-Type: text/plain; charset=koi8-r Content-Disposition: inline In-Reply-To: <1607668234-46130-4-git-send-email-yumeng18@huawei.com> Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org Meng, It looks like not just definitions but some static data is moved to includes. Why? Thanks, On Fri, Dec 11, 2020 at 02:30:32PM +0800, Meng Yu wrote: > Move elliptic curves definition to 'include/crypto/ecc_curve_defs.h', > so all can use it, > > Signed-off-by: Meng Yu > Reviewed-by: Zaibo Xu > --- > crypto/ecc.c | 1 - > crypto/ecc.h | 37 +---------------- > crypto/ecc_curve_defs.h | 57 ------------------------- > crypto/ecrdsa_defs.h | 2 +- > include/crypto/ecc_curve_defs.h | 92 +++++++++++++++++++++++++++++++++++++++++ > 5 files changed, 95 insertions(+), 94 deletions(-) > delete mode 100644 crypto/ecc_curve_defs.h > create mode 100644 include/crypto/ecc_curve_defs.h > > diff --git a/crypto/ecc.c b/crypto/ecc.c > index c80aa25..f23efdd 100644 > --- a/crypto/ecc.c > +++ b/crypto/ecc.c > @@ -35,7 +35,6 @@ > #include > > #include "ecc.h" > -#include "ecc_curve_defs.h" > > typedef struct { > u64 m_low; > diff --git a/crypto/ecc.h b/crypto/ecc.h > index d4e546b..e5afaf3 100644 > --- a/crypto/ecc.h > +++ b/crypto/ecc.h > @@ -26,6 +26,8 @@ > #ifndef _CRYPTO_ECC_H > #define _CRYPTO_ECC_H > > +#include > + > /* One digit is u64 qword. */ > #define ECC_CURVE_NIST_P192_DIGITS 3 > #define ECC_CURVE_NIST_P256_DIGITS 4 > @@ -33,44 +35,9 @@ > > #define ECC_DIGITS_TO_BYTES_SHIFT 3 > > -/** > - * struct ecc_point - elliptic curve point in affine coordinates > - * > - * @x: X coordinate in vli form. > - * @y: Y coordinate in vli form. > - * @ndigits: Length of vlis in u64 qwords. > - */ > -struct ecc_point { > - u64 *x; > - u64 *y; > - u8 ndigits; > -}; > - > #define ECC_POINT_INIT(x, y, ndigits) (struct ecc_point) { x, y, ndigits } > > /** > - * struct ecc_curve - definition of elliptic curve > - * > - * @name: Short name of the curve. > - * @g: Generator point of the curve. > - * @p: Prime number, if Barrett's reduction is used for this curve > - * pre-calculated value 'mu' is appended to the @p after ndigits. > - * Use of Barrett's reduction is heuristically determined in > - * vli_mmod_fast(). > - * @n: Order of the curve group. > - * @a: Curve parameter a. > - * @b: Curve parameter b. > - */ > -struct ecc_curve { > - char *name; > - struct ecc_point g; > - u64 *p; > - u64 *n; > - u64 *a; > - u64 *b; > -}; > - > -/** > * ecc_is_key_valid() - Validate a given ECDH private key > * > * @curve_id: id representing the curve to use > diff --git a/crypto/ecc_curve_defs.h b/crypto/ecc_curve_defs.h > deleted file mode 100644 > index 69be6c7..0000000 > --- a/crypto/ecc_curve_defs.h > +++ /dev/null > @@ -1,57 +0,0 @@ > -/* SPDX-License-Identifier: GPL-2.0 */ > -#ifndef _CRYTO_ECC_CURVE_DEFS_H > -#define _CRYTO_ECC_CURVE_DEFS_H > - > -/* NIST P-192: a = p - 3 */ > -static u64 nist_p192_g_x[] = { 0xF4FF0AFD82FF1012ull, 0x7CBF20EB43A18800ull, > - 0x188DA80EB03090F6ull }; > -static u64 nist_p192_g_y[] = { 0x73F977A11E794811ull, 0x631011ED6B24CDD5ull, > - 0x07192B95FFC8DA78ull }; > -static u64 nist_p192_p[] = { 0xFFFFFFFFFFFFFFFFull, 0xFFFFFFFFFFFFFFFEull, > - 0xFFFFFFFFFFFFFFFFull }; > -static u64 nist_p192_n[] = { 0x146BC9B1B4D22831ull, 0xFFFFFFFF99DEF836ull, > - 0xFFFFFFFFFFFFFFFFull }; > -static u64 nist_p192_a[] = { 0xFFFFFFFFFFFFFFFCull, 0xFFFFFFFFFFFFFFFEull, > - 0xFFFFFFFFFFFFFFFFull }; > -static u64 nist_p192_b[] = { 0xFEB8DEECC146B9B1ull, 0x0FA7E9AB72243049ull, > - 0x64210519E59C80E7ull }; > -static struct ecc_curve nist_p192 = { > - .name = "nist_192", > - .g = { > - .x = nist_p192_g_x, > - .y = nist_p192_g_y, > - .ndigits = 3, > - }, > - .p = nist_p192_p, > - .n = nist_p192_n, > - .a = nist_p192_a, > - .b = nist_p192_b > -}; > - > -/* NIST P-256: a = p - 3 */ > -static u64 nist_p256_g_x[] = { 0xF4A13945D898C296ull, 0x77037D812DEB33A0ull, > - 0xF8BCE6E563A440F2ull, 0x6B17D1F2E12C4247ull }; > -static u64 nist_p256_g_y[] = { 0xCBB6406837BF51F5ull, 0x2BCE33576B315ECEull, > - 0x8EE7EB4A7C0F9E16ull, 0x4FE342E2FE1A7F9Bull }; > -static u64 nist_p256_p[] = { 0xFFFFFFFFFFFFFFFFull, 0x00000000FFFFFFFFull, > - 0x0000000000000000ull, 0xFFFFFFFF00000001ull }; > -static u64 nist_p256_n[] = { 0xF3B9CAC2FC632551ull, 0xBCE6FAADA7179E84ull, > - 0xFFFFFFFFFFFFFFFFull, 0xFFFFFFFF00000000ull }; > -static u64 nist_p256_a[] = { 0xFFFFFFFFFFFFFFFCull, 0x00000000FFFFFFFFull, > - 0x0000000000000000ull, 0xFFFFFFFF00000001ull }; > -static u64 nist_p256_b[] = { 0x3BCE3C3E27D2604Bull, 0x651D06B0CC53B0F6ull, > - 0xB3EBBD55769886BCull, 0x5AC635D8AA3A93E7ull }; > -static struct ecc_curve nist_p256 = { > - .name = "nist_256", > - .g = { > - .x = nist_p256_g_x, > - .y = nist_p256_g_y, > - .ndigits = 4, > - }, > - .p = nist_p256_p, > - .n = nist_p256_n, > - .a = nist_p256_a, > - .b = nist_p256_b > -}; > - > -#endif > diff --git a/crypto/ecrdsa_defs.h b/crypto/ecrdsa_defs.h > index 170baf0..2074099 100644 > --- a/crypto/ecrdsa_defs.h > +++ b/crypto/ecrdsa_defs.h > @@ -13,7 +13,7 @@ > #ifndef _CRYTO_ECRDSA_DEFS_H > #define _CRYTO_ECRDSA_DEFS_H > > -#include "ecc.h" > +#include > > #define ECRDSA_MAX_SIG_SIZE (2 * 512 / 8) > #define ECRDSA_MAX_DIGITS (512 / 64) > diff --git a/include/crypto/ecc_curve_defs.h b/include/crypto/ecc_curve_defs.h > new file mode 100644 > index 0000000..1080766 > --- /dev/null > +++ b/include/crypto/ecc_curve_defs.h > @@ -0,0 +1,92 @@ > +/* SPDX-License-Identifier: GPL-2.0 */ > +#ifndef _CRYTO_ECC_CURVE_DEFS_H > +#define _CRYTO_ECC_CURVE_DEFS_H > + > +/** > + * struct ecc_point - elliptic curve point in affine coordinates > + * > + * @x: X coordinate in vli form. > + * @y: Y coordinate in vli form. > + * @ndigits: Length of vlis in u64 qwords. > + */ > +struct ecc_point { > + u64 *x; > + u64 *y; > + u8 ndigits; > +}; > + > +/** > + * struct ecc_curve - definition of elliptic curve > + * > + * @name: Short name of the curve. > + * @g: Generator point of the curve. > + * @p: Prime number, if Barrett's reduction is used for this curve > + * pre-calculated value 'mu' is appended to the @p after ndigits. > + * Use of Barrett's reduction is heuristically determined in > + * vli_mmod_fast(). > + * @n: Order of the curve group. > + * @a: Curve parameter a. > + * @b: Curve parameter b. > + */ > +struct ecc_curve { > + char *name; > + struct ecc_point g; > + u64 *p; > + u64 *n; > + u64 *a; > + u64 *b; > +}; > + > +/* NIST P-192: a = p - 3 */ > +static u64 nist_p192_g_x[] = { 0xF4FF0AFD82FF1012ull, 0x7CBF20EB43A18800ull, > + 0x188DA80EB03090F6ull }; > +static u64 nist_p192_g_y[] = { 0x73F977A11E794811ull, 0x631011ED6B24CDD5ull, > + 0x07192B95FFC8DA78ull }; > +static u64 nist_p192_p[] = { 0xFFFFFFFFFFFFFFFFull, 0xFFFFFFFFFFFFFFFEull, > + 0xFFFFFFFFFFFFFFFFull }; > +static u64 nist_p192_n[] = { 0x146BC9B1B4D22831ull, 0xFFFFFFFF99DEF836ull, > + 0xFFFFFFFFFFFFFFFFull }; > +static u64 nist_p192_a[] = { 0xFFFFFFFFFFFFFFFCull, 0xFFFFFFFFFFFFFFFEull, > + 0xFFFFFFFFFFFFFFFFull }; > +static u64 nist_p192_b[] = { 0xFEB8DEECC146B9B1ull, 0x0FA7E9AB72243049ull, > + 0x64210519E59C80E7ull }; > +static struct ecc_curve nist_p192 = { > + .name = "nist_192", > + .g = { > + .x = nist_p192_g_x, > + .y = nist_p192_g_y, > + .ndigits = 3, > + }, > + .p = nist_p192_p, > + .n = nist_p192_n, > + .a = nist_p192_a, > + .b = nist_p192_b > +}; > + > +/* NIST P-256: a = p - 3 */ > +static u64 nist_p256_g_x[] = { 0xF4A13945D898C296ull, 0x77037D812DEB33A0ull, > + 0xF8BCE6E563A440F2ull, 0x6B17D1F2E12C4247ull }; > +static u64 nist_p256_g_y[] = { 0xCBB6406837BF51F5ull, 0x2BCE33576B315ECEull, > + 0x8EE7EB4A7C0F9E16ull, 0x4FE342E2FE1A7F9Bull }; > +static u64 nist_p256_p[] = { 0xFFFFFFFFFFFFFFFFull, 0x00000000FFFFFFFFull, > + 0x0000000000000000ull, 0xFFFFFFFF00000001ull }; > +static u64 nist_p256_n[] = { 0xF3B9CAC2FC632551ull, 0xBCE6FAADA7179E84ull, > + 0xFFFFFFFFFFFFFFFFull, 0xFFFFFFFF00000000ull }; > +static u64 nist_p256_a[] = { 0xFFFFFFFFFFFFFFFCull, 0x00000000FFFFFFFFull, > + 0x0000000000000000ull, 0xFFFFFFFF00000001ull }; > +static u64 nist_p256_b[] = { 0x3BCE3C3E27D2604Bull, 0x651D06B0CC53B0F6ull, > + 0xB3EBBD55769886BCull, 0x5AC635D8AA3A93E7ull }; > +static struct ecc_curve nist_p256 = { > + .name = "nist_256", > + .g = { > + .x = nist_p256_g_x, > + .y = nist_p256_g_y, > + .ndigits = 4, > + }, > + .p = nist_p256_p, > + .n = nist_p256_n, > + .a = nist_p256_a, > + .b = nist_p256_b > +}; > + > +#endif > -- > 2.8.1