root/crypto/libecc/src/sig/eddsa.c
/*
 *  Copyright (C) 2021 - This file is part of libecc project
 *
 *  Authors:
 *      Ryad BENADJILA <ryadbenadjila@gmail.com>
 *      Arnaud EBALARD <arnaud.ebalard@ssi.gouv.fr>
 *
 *  This software is licensed under a dual BSD and GPL v2 license.
 *  See LICENSE file at the root folder of the project.
 */
#include <libecc/lib_ecc_config.h>
#if defined(WITH_SIG_EDDSA25519) || defined(WITH_SIG_EDDSA448)

/*
 * XXX: EdDSA is incompatible with small stack devices for now ...
 */
#if defined(USE_SMALL_STACK)
#error "Error: EDDSA25519 and EDDSA448 are incompatible with USE_SMALL_STACK (devices low on memory)"
#endif

/*
 * Sanity checks on the hash functions and curves depending on the EdDSA variant.
 */
/* EDDSA25519 used SHA-512 as a fixed hash function and WEI25519 as a fixed
 * curve.
 */
#if defined(WITH_SIG_EDDSA25519)
#if !defined(WITH_HASH_SHA512) || !defined(WITH_CURVE_WEI25519)
#error "Error: EDDSA25519 needs SHA-512 and WEI25519 to be defined! Please define them in libecc config file"
#endif
#endif
/* EDDSA448 used SHAKE256 as a fixed hash function and WEI448 as a fixed
 * curve.
 */
#if defined(WITH_SIG_EDDSA448)
#if !defined(WITH_HASH_SHAKE256) || !defined(WITH_CURVE_WEI448)
#error "Error: EDDSA25519 needs SHAKE256 and WEI448 to be defined! Please define them in libecc config file"
#endif
#endif

#include <libecc/nn/nn_rand.h>
#include <libecc/nn/nn_mul_public.h>
#include <libecc/nn/nn_logical.h>
#include <libecc/fp/fp.h>
#include <libecc/fp/fp_sqrt.h>
/* Include the "internal" header as we use non public API here */
#include "../nn/nn_div.h"


#include <libecc/sig/sig_algs_internal.h>
#include <libecc/sig/sig_algs.h>
#include <libecc/sig/ec_key.h>
#include <libecc/utils/utils.h>
#ifdef VERBOSE_INNER_VALUES
#define EC_SIG_ALG "EDDSA"
#endif
#include <libecc/utils/dbg_sig.h>


ATTRIBUTE_WARN_UNUSED_RET static inline int dom(u16 x, const u8 *y, u16 olen_y, const hash_mapping *h,
                      hash_context *h_ctx, u8 dom_type){
        u8 tmp[2];
        int ret;

        MUST_HAVE((h != NULL) && (h_ctx != NULL), ret, err);
        /* Sanity check on ancillary data len, its size must not exceed 255 bytes as per RFC8032 */
        MUST_HAVE((x <= 255) && (olen_y <= 255), ret, err);

        if(dom_type == 2){
                ret = h->hfunc_update(h_ctx, (const u8*)"SigEd25519 no Ed25519 collisions", 32); EG(ret, err);
        }
        else if(dom_type == 4){
                ret = h->hfunc_update(h_ctx, (const u8*)"SigEd448", 8); EG(ret, err);
        }
        else{
                ret = -1;
                goto err;
        }
        tmp[0] = (u8)x;
        tmp[1] = (u8)olen_y;
        ret = h->hfunc_update(h_ctx, tmp, 2); EG(ret, err);
        if(y != NULL){
                ret = h->hfunc_update(h_ctx, y, olen_y); EG(ret, err);
        }

err:
        return ret;
}

#if defined(WITH_SIG_EDDSA25519)
/* Helper for dom2(x, y).
 *
 * See RFC8032:
 *
 * dom2(x, y)     The blank octet string when signing or verifying
 *                Ed25519.  Otherwise, the octet string: "SigEd25519 no
 *                Ed25519 collisions" || octet(x) || octet(OLEN(y)) ||
 *                y, where x is in range 0-255 and y is an octet string
 *                of at most 255 octets.  "SigEd25519 no Ed25519
 *                collisions" is in ASCII (32 octets).
 */
ATTRIBUTE_WARN_UNUSED_RET static inline int dom2(u16 x, const u8 *y, u16 olen_y, const hash_mapping *h,
                       hash_context *h_ctx){
        return dom(x, y, olen_y, h, h_ctx, 2);
}
#endif /* defined(WITH_SIG_EDDSA25519) */

#if defined(WITH_SIG_EDDSA448)
/* Helper for dom4(x, y).
 *
 * See RFC8032:
 *
 * dom4(x, y)     The octet string "SigEd448" || octet(x) ||
 *                octet(OLEN(y)) || y, where x is in range 0-255 and y
 *                is an octet string of at most 255 octets.  "SigEd448"
 *                is in ASCII (8 octets).
 */
ATTRIBUTE_WARN_UNUSED_RET static inline int dom4(u16 x, const u8 *y, u16 olen_y, const hash_mapping *h,
                       hash_context *h_ctx){
        return dom(x, y, olen_y, h, h_ctx, 4);
}
#endif /* defined(WITH_SIG_EDDSA448) */

/* EdDSA sanity check on keys.
 * EDDSA25519 and variants only support WEI25519 as a curve, and SHA-512 as a hash function.
 * EDDSA448 and variants only support WEI448 as a curve, and SHAKE256 as a "hash function".
 */
ATTRIBUTE_WARN_UNUSED_RET static inline hash_alg_type get_eddsa_hash_type(ec_alg_type sig_type){
        hash_alg_type hash_type = UNKNOWN_HASH_ALG;

        switch (sig_type) {
#if defined(WITH_SIG_EDDSA25519)
                case EDDSA25519:
                case EDDSA25519PH:
                case EDDSA25519CTX:{
                        hash_type = SHA512;
                        break;
                }
#endif
#if defined(WITH_SIG_EDDSA448)
                case EDDSA448:
                case EDDSA448PH:{
                        hash_type = SHAKE256;
                        break;
                }
#endif
                default:{
                        hash_type = UNKNOWN_HASH_ALG;
                        break;
                }
        }
        return hash_type;
}

/*
 * Check given EdDSA key type does match given curve type. Returns 0 on success,
 * and -1 on error.
 */
ATTRIBUTE_WARN_UNUSED_RET static int eddsa_key_type_check_curve(ec_alg_type key_type,
                                      ec_curve_type curve_type)
{
        int ret;

        switch (key_type) {
#if defined(WITH_SIG_EDDSA25519)
                case EDDSA25519:
                case EDDSA25519PH:
                case EDDSA25519CTX:{
                        /* Check curve */
                        ret = (curve_type == WEI25519) ? 0 : -1;
                        break;
                }
#endif
#if defined(WITH_SIG_EDDSA448)
                case EDDSA448:
                case EDDSA448PH:{
                        /* Check curve */
                        ret = (curve_type == WEI448) ? 0 : -1;
                        break;
                }
#endif
                default:{
                        ret = -1;
                        break;
                }
        }

        return ret;
}

ATTRIBUTE_WARN_UNUSED_RET static int eddsa_priv_key_sanity_check(const ec_priv_key *in_priv)
{
        int ret;

        ret = priv_key_check_initialized(in_priv); EG(ret, err);
        ret = eddsa_key_type_check_curve(in_priv->key_type,
                               in_priv->params->curve_type);

err:
        return ret;
}

ATTRIBUTE_WARN_UNUSED_RET static int eddsa_pub_key_sanity_check(const ec_pub_key *in_pub)
{
        int ret;


        ret = pub_key_check_initialized(in_pub); EG(ret, err);
        ret = eddsa_key_type_check_curve(in_pub->key_type,
                               in_pub->params->curve_type);

err:
        return ret;
}

ATTRIBUTE_WARN_UNUSED_RET static int eddsa_key_pair_sanity_check(const ec_key_pair *key_pair)
{
        int ret;

        MUST_HAVE((key_pair != NULL), ret, err);
        ret = eddsa_priv_key_sanity_check(&(key_pair->priv_key)); EG(ret, err);
        ret = eddsa_pub_key_sanity_check(&(key_pair->pub_key)); EG(ret, err);
        MUST_HAVE((key_pair->priv_key.key_type == key_pair->pub_key.key_type), ret, err);

err:
        return ret;
}

/*
 * EdDSA decode an integer from a buffer using little endian format.
 */
ATTRIBUTE_WARN_UNUSED_RET static int eddsa_decode_integer(nn_t nn_out, const u8 *buf, u16 buf_size)
{
        u16 i;
        u8 buf_little_endian[MAX_DIGEST_SIZE];
        int ret;

        MUST_HAVE((buf != NULL), ret, err);
        MUST_HAVE((sizeof(buf_little_endian) >= buf_size), ret, err);

        ret = nn_init(nn_out, 0); EG(ret, err);

        ret = local_memset(buf_little_endian, 0, sizeof(buf_little_endian)); EG(ret, err);
        if(buf_size > 1){
                /* Inverse endianness of our input buffer */
                for(i = 0; i < buf_size; i++){
                        buf_little_endian[i] = buf[buf_size - 1 - i];
                }
        }

        /* Compute an integer from the buffer */
        ret = nn_init_from_buf(nn_out, buf_little_endian, buf_size);

err:
        return ret;
}

/*
 * EdDSA encode an integer to a buffer using little endian format.
 */
ATTRIBUTE_WARN_UNUSED_RET static int eddsa_encode_integer(nn_src_t nn_in, u8 *buf, u16 buf_size)
{
        u16 i;
        u8 tmp;
        int ret;
        bitcnt_t blen;

        MUST_HAVE((buf != NULL), ret, err);
        ret = nn_check_initialized(nn_in); EG(ret, err);

        /* Sanity check that we do not lose information */
        ret = nn_bitlen(nn_in, &blen); EG(ret, err);
        MUST_HAVE((((u32)blen) <= (8 * (u32)buf_size)), ret, err);

        /* Export the number to our buffer */
        ret = nn_export_to_buf(buf, buf_size, nn_in); EG(ret, err);

        /* Now reverse endianness in place */
        if(buf_size > 1){
                for(i = 0; i < (buf_size / 2); i++){
                        tmp = buf[i];
                        buf[i] = buf[buf_size - 1 - i];
                        buf[buf_size - 1 - i] = tmp;
                }
        }

err:
        return ret;
}

/*
 * EdDSA encoding of scalar s.
 */
ATTRIBUTE_WARN_UNUSED_RET static int eddsa_compute_s(nn_t s, const u8 *digest, u16 digest_size)
{
        int ret;

        MUST_HAVE((digest != NULL), ret, err);
        MUST_HAVE(((digest_size % 2) == 0), ret, err);

        /* s is half of the digest size encoded in little endian format */
        ret = eddsa_decode_integer(s, digest, (digest_size / 2)); EG(ret, err);

err:
        return ret;
}

/* Extract the digest from the encoded private key */
ATTRIBUTE_WARN_UNUSED_RET static int eddsa_get_digest_from_priv_key(u8 *digest, u8 *digest_size, const ec_priv_key *in_priv)
{
        int ret;
        hash_alg_type hash_type;
        const hash_mapping *hash;

        MUST_HAVE(((digest != NULL) && (digest_size != NULL)), ret, err);
        ret = eddsa_priv_key_sanity_check(in_priv); EG(ret, err);

        MUST_HAVE(((hash_type = get_eddsa_hash_type(in_priv->key_type)) != UNKNOWN_HASH_ALG), ret, err);
        ret = get_hash_by_type(hash_type, &hash); EG(ret, err);
        MUST_HAVE((hash != NULL), ret, err);

        /* Check real digest size */
        MUST_HAVE(((*digest_size) >= hash->digest_size), ret, err);

        (*digest_size) = hash->digest_size;
        ret = nn_export_to_buf(digest, *digest_size, &(in_priv->x));

err:
        return ret;
}

/* Encode an Edwards curve affine point in canonical form */
ATTRIBUTE_WARN_UNUSED_RET static int eddsa_encode_point(aff_pt_edwards_src_t in,
                                                        fp_src_t alpha_edwards,
                                                        u8 *buf, u16 buflen,
                                                        ec_alg_type sig_alg)
{
        nn out_reduced;
        u8 lsb = 0;
        int ret;
        out_reduced.magic = WORD(0);

        /* Sanity checks */
        MUST_HAVE((buf != NULL), ret, err);
        ret = aff_pt_edwards_check_initialized(in); EG(ret, err);
        ret = fp_check_initialized(alpha_edwards); EG(ret, err);

        /* Zeroize the buffer */
        ret = local_memset(buf, 0, buflen); EG(ret, err);
        ret = nn_init(&out_reduced, 0); EG(ret, err);

        /* Note: we should be reduced modulo Fp for canonical encoding here as
         * coordinate elements are in Fp ...
         */
#if defined(WITH_SIG_EDDSA448)
        if((sig_alg == EDDSA448) || (sig_alg == EDDSA448PH)){
                /*
                 * In case of EDDSA448, we apply the 4-isogeny to transfer from
                 * Ed448 to Edwards448.
                 * The isogeny maps (x, y) on Ed448 to (x1, y1) on Edwards448
                 * using:
                 *      x1 = (4*x*y/c) / (y^2-x^2)
                 *      y1 = (2-x^2-y^2) / (x^2+y^2) = (2 - (x^2+y^2)) / (x^2 + y^2)
                 * and (0, 1) as well as (0, -1) are mapped to (0, 1)
                 * We only need to encode our y1 here, but x1 computation is
                 * unfortunately needed to get its LSB that is necessary for
                 * the encoding.
                 */
                fp tmp_x, tmp_y, y1;
                tmp_x.magic = tmp_y.magic = y1.magic = WORD(0);
                /* Compute x1 to get our LSB */
                ret = fp_init(&y1, in->y.ctx); EG(ret, err1);
                ret = fp_copy(&tmp_x, &(in->x)); EG(ret, err1);
                ret = fp_sqr(&tmp_x, &tmp_x); EG(ret, err1);
                ret = fp_copy(&tmp_y, &(in->y)); EG(ret, err1);
                ret = fp_sqr(&tmp_y, &tmp_y); EG(ret, err1);
                ret = fp_sub(&tmp_y, &tmp_y, &tmp_x); EG(ret, err1);
                /* NOTE: inversion by zero should be caught by lower layers */
                ret = fp_inv(&tmp_y, &tmp_y); EG(ret, err1);
                ret = fp_set_word_value(&tmp_x, WORD(4)); EG(ret, err1);
                ret = fp_mul(&tmp_x, &tmp_x, &(in->x)); EG(ret, err1);
                ret = fp_mul(&tmp_x, &tmp_x, &(in->y)); EG(ret, err1);
                ret = fp_mul(&tmp_x, &tmp_x, &tmp_y); EG(ret, err1);
                ret = fp_inv(&tmp_y, alpha_edwards); EG(ret, err1);
                ret = fp_mul(&tmp_x, &tmp_x, &tmp_y); EG(ret, err1);
                ret = nn_getbit(&(tmp_x.fp_val), 0, &lsb); EG(ret, err1);
                /* Compute y1 */
                ret = fp_copy(&tmp_x, &(in->x)); EG(ret, err1);
                ret = fp_sqr(&tmp_x, &tmp_x); EG(ret, err1);
                ret = fp_copy(&tmp_y, &(in->y)); EG(ret, err1);
                ret = fp_sqr(&tmp_y, &tmp_y); EG(ret, err1);
                ret = fp_set_word_value(&y1, WORD(2)); EG(ret, err1);
                ret = fp_sub(&y1, &y1, &tmp_x); EG(ret, err1);
                ret = fp_sub(&y1, &y1, &tmp_y); EG(ret, err1);
                ret = fp_add(&tmp_x, &tmp_x, &tmp_y); EG(ret, err1);
                /* NOTE: inversion by zero should be caught by lower layers */
                ret = fp_inv(&tmp_x, &tmp_x); EG(ret, err1);
                ret = fp_mul(&y1, &y1, &tmp_x); EG(ret, err1);
                ret = eddsa_encode_integer(&(y1.fp_val), buf, buflen);
err1:
                fp_uninit(&tmp_x);
                fp_uninit(&tmp_y);
                fp_uninit(&y1);
                EG(ret, err);
        }
        else
#endif /* !defined(WITH_SIG_EDDSA448) */
        {       /* EDDSA25519 and other cases */
                FORCE_USED_VAR(sig_alg); /* To avoid unused variable error */
                ret = nn_getbit(&(in->x.fp_val), 0, &lsb); EG(ret, err);
                ret = eddsa_encode_integer(&(in->y.fp_val), buf, buflen); EG(ret, err);
        }
        /*
         * Now deal with the sign for the last bit: copy the least significant
         * bit of the x coordinate in the MSB of the last octet.
         */
        MUST_HAVE((buflen > 1), ret, err);
        buf[buflen - 1] |= (u8)(lsb << 7);

err:
        nn_uninit(&out_reduced);

        return ret;
}

/* Decode an Edwards curve affine point from canonical form */
ATTRIBUTE_WARN_UNUSED_RET static int eddsa_decode_point(aff_pt_edwards_t out, ec_edwards_crv_src_t edwards_curve,
                              fp_src_t alpha_edwards, const u8 *buf, u16 buflen,
                              ec_alg_type sig_type)
{
        fp x, y;
        fp sqrt1, sqrt2;
        u8 x_0, lsb;
        u8 buf_little_endian[MAX_DIGEST_SIZE];
        u16 i;
        int ret, iszero;

#if defined(WITH_SIG_EDDSA448)
        fp tmp;
        tmp.magic = WORD(0);
#endif
        x.magic = y.magic = sqrt1.magic = sqrt2.magic = WORD(0);

        MUST_HAVE((buf != NULL), ret, err);

        ret = ec_edwards_crv_check_initialized(edwards_curve); EG(ret, err);

        ret = fp_check_initialized(alpha_edwards); EG(ret, err);

        /* Extract the sign */
        x_0 = ((buf[buflen - 1] & 0x80) >> 7);
        /* Extract the value by reversing endianness */
        MUST_HAVE((sizeof(buf_little_endian) >= buflen), ret, err);

        /* Inverse endianness of our input buffer and mask the sign bit */
        MUST_HAVE((buflen > 1), ret, err);

        for(i = 0; i < buflen; i++){
                buf_little_endian[i] = buf[buflen - 1 - i];
                if(i == 0){
                        /* Mask the sign bit */
                        buf_little_endian[i] &= 0x7f;
                }
        }
        /* Try to decode the y coordinate */
        ret = fp_init_from_buf(&y, edwards_curve->a.ctx, buf_little_endian, buflen); EG(ret, err);
        /*
         * If we suceed, try to find our x coordinate that is the square root of
         * (y^2 - 1) / (d y^2 + 1) or (y^2 - 1) / (d y^2 - 1) depending on the
         * algorithm (EDDSA25519 our EDDSA448).
         */
        ret = fp_init(&sqrt1, edwards_curve->a.ctx); EG(ret, err);
        ret = fp_init(&sqrt2, edwards_curve->a.ctx); EG(ret, err);
        ret = fp_init(&x, edwards_curve->a.ctx); EG(ret, err);
#if defined(WITH_SIG_EDDSA448)
        if((sig_type == EDDSA448) || (sig_type == EDDSA448PH)){
                const u8 d_edwards448_buff[] = {
                        0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
                        0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
                        0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
                        0xff, 0xff, 0xff, 0xfe, 0xff, 0xff, 0xff, 0xff,
                        0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
                        0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
                        0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x67, 0x56
                };
                ec_edwards_crv edwards_curve_edwards448;

                ret = fp_init(&tmp, edwards_curve->a.ctx); EG(ret, err);
                /*
                 * If we deal with EDDSA448 we must handle the point on
                 * Edwards448 so we use the dedicated d.
                 */
                ret = fp_init_from_buf(&tmp, edwards_curve->a.ctx,
                                (const u8*)d_edwards448_buff, sizeof(d_edwards448_buff)); EG(ret, err);
                ret = ec_edwards_crv_init(&edwards_curve_edwards448, &(edwards_curve->a), &tmp, &(edwards_curve->order)); EG(ret, err);
                /* Compute x from y using the dedicated primitive */
                ret = aff_pt_edwards_x_from_y(&sqrt1, &sqrt2, &y, &edwards_curve_edwards448); EG(ret, err); /* Error or no square root found, this should not happen! */
                ec_edwards_crv_uninit(&edwards_curve_edwards448);
        }
        else
#endif
        {
                /* Compute x from y using the dedicated primitive */
                ret = aff_pt_edwards_x_from_y(&sqrt1, &sqrt2, &y, edwards_curve); EG(ret, err); /* Error or no square root found, this should not happen! */
        }
        /* Now select the square root of the proper sign */
        ret = nn_getbit(&(sqrt1.fp_val), 0, &lsb); EG(ret, err);
        if(lsb == x_0){
                ret = fp_copy(&x, &sqrt1); EG(ret, err);
        }
        else{
                ret = fp_copy(&x, &sqrt2); EG(ret, err);
        }
        /* If x = 0 and the sign bit is 1, this is an error */
        ret = fp_iszero(&x, &iszero); EG(ret, err);
        MUST_HAVE(!(iszero && (x_0 == 1)), ret, err);
        /*
         * In case of EDDSA448, we apply the 4-isogeny to transfer from
         * Edwards448 to Ed448.
         * The isogeny maps (x1, y1) on Edwards448 to (x, y) on Ed448 using:
         *      x = alpha_edwards * (x1*y1) / (2-x1^2-y1^2)
         *      y = (x1^2+y1^2) / (y1^2-x1^2)
         */
#if defined(WITH_SIG_EDDSA448)
        if((sig_type == EDDSA448) || (sig_type == EDDSA448PH)){
                /*
                 * Use sqrt1 and sqrt2 as temporary buffers for x and y, and
                 * tmp as scratch pad buffer
                 */
                ret = fp_copy(&sqrt1, &x); EG(ret, err);
                ret = fp_copy(&sqrt2, &y); EG(ret, err);

                ret = fp_set_word_value(&x, WORD(2)); EG(ret, err);
                ret = fp_sqr(&tmp, &sqrt1); EG(ret, err);
                ret = fp_sub(&x, &x, &tmp); EG(ret, err);
                ret = fp_sqr(&tmp, &sqrt2); EG(ret, err);
                ret = fp_sub(&x, &x, &tmp); EG(ret, err);
                /* NOTE: inversion by zero should be caught by lower layers */
                ret = fp_inv(&x, &x); EG(ret, err);
                ret = fp_mul(&x, &x, &sqrt1); EG(ret, err);
                ret = fp_mul(&x, &x, &sqrt2); EG(ret, err);
                ret = fp_mul(&x, &x, alpha_edwards); EG(ret, err);

                ret = fp_sqr(&sqrt1, &sqrt1); EG(ret, err);
                ret = fp_sqr(&sqrt2, &sqrt2); EG(ret, err);
                ret = fp_sub(&y, &sqrt2, &sqrt1); EG(ret, err);
                /* NOTE: inversion by zero should be caught by lower layers */
                ret = fp_inv(&y, &y); EG(ret, err);
                ret = fp_add(&sqrt1, &sqrt1, &sqrt2); EG(ret, err);
                ret = fp_mul(&y, &y, &sqrt1); EG(ret, err);
        }
#endif /* !defined(WITH_SIG_EDDSA448) */

        /* Initialize our point */
        ret = aff_pt_edwards_init_from_coords(out, edwards_curve, &x, &y);

err:
        fp_uninit(&sqrt1);
        fp_uninit(&sqrt2);
        fp_uninit(&x);
        fp_uninit(&y);
#if defined(WITH_SIG_EDDSA448)
        fp_uninit(&tmp);
#endif

        return ret;
}


/*
 * Derive hash from private key.
 */
ATTRIBUTE_WARN_UNUSED_RET static int eddsa_derive_priv_key_hash(const ec_priv_key *in_priv,
                                                                u8 *buf, u16 buflen)
{
        hash_alg_type hash_type = UNKNOWN_HASH_ALG;
        const hash_mapping *hash;
        u8 x_buf[EC_PRIV_KEY_MAX_SIZE];
        int ret;
        const u8 *in[2];
        u32 in_len[2];

        MUST_HAVE((buf != NULL), ret, err);
        ret = eddsa_priv_key_sanity_check(in_priv); EG(ret, err);

        MUST_HAVE(((hash_type = get_eddsa_hash_type(in_priv->key_type)) != UNKNOWN_HASH_ALG), ret, err);
        ret = get_hash_by_type(hash_type, &hash); EG(ret, err);
        MUST_HAVE((hash != NULL), ret, err);

        /* Get the private key as a buffer and hash it */
        ret = local_memset(x_buf, 0, sizeof(x_buf)); EG(ret, err);
        MUST_HAVE((sizeof(x_buf) >= (hash->digest_size / 2)), ret, err);

        ret = ec_priv_key_export_to_buf(in_priv, x_buf, (hash->digest_size / 2)); EG(ret, err);

        ret = hash_mapping_callbacks_sanity_check(hash); EG(ret, err);

        MUST_HAVE((buflen >= hash->digest_size), ret, err);

        in[0] = x_buf; in[1] = NULL;
        in_len[0] = (hash->digest_size / 2); in_len[1] = 0;
        ret = hash->hfunc_scattered(in, in_len, buf);

err:
        PTR_NULLIFY(hash);

        return ret;
}

/*
 * Derive an EdDSA private key.
 *
 */
int eddsa_derive_priv_key(ec_priv_key *priv_key)
{
        int ret, cmp;
        u8 digest_size;
        u8 digest[MAX_DIGEST_SIZE];
        hash_alg_type hash_type = UNKNOWN_HASH_ALG;
        word_t cofactor = WORD(0);

        /* Check if private key is initialized. */
        ret = eddsa_priv_key_sanity_check(priv_key); EG(ret, err);

        /* Check hash function compatibility:
         *   We must have 2**(b-1) > p with (2*b) the size of the hash function.
         */
        MUST_HAVE(((hash_type = get_eddsa_hash_type(priv_key->key_type)) != UNKNOWN_HASH_ALG), ret, err);

        digest_size = 0;
        ret = get_hash_sizes(hash_type, &digest_size, NULL); EG(ret, err);

        MUST_HAVE(((2 * priv_key->params->ec_fp.p_bitlen) < (8 * (bitcnt_t)digest_size)), ret, err);
        MUST_HAVE(((digest_size % 2) == 0), ret, err);
        MUST_HAVE((digest_size <= sizeof(digest)), ret, err);

        /*
         * Now that we have our private scalar, derive the hash value of secret
         * key
         */
        /* Hash the private key */
        ret = eddsa_derive_priv_key_hash(priv_key, digest, digest_size); EG(ret, err);

        /* Get the cofactor as an integer */
        cofactor = priv_key->params->ec_gen_cofactor.val[0];
        ret = nn_cmp_word(&(priv_key->params->ec_gen_cofactor), cofactor, &cmp); EG(ret, err);
        MUST_HAVE((cmp == 0), ret, err);
        /* Cofactor must be 2**2 or 2**3 as per RFC8032 standard */
        MUST_HAVE((cofactor == (0x1 << 2)) || (cofactor == (0x1 << 3)), ret, err);

        /* Now clear the low bits related to cofactor */
        digest[0] &= (u8)(~(cofactor - 1));
#if defined(WITH_SIG_EDDSA25519)
        if ((priv_key->key_type == EDDSA25519) ||
            (priv_key->key_type == EDDSA25519CTX) ||
            (priv_key->key_type == EDDSA25519PH)){
                /*
                 * MSB of highest octet of half must be cleared, second MSB must
                 * be set
                 */
                digest[(digest_size / 2) - 1] &= 0x7f;
                digest[(digest_size / 2) - 1] |= 0x40;
        }
#endif
#if defined(WITH_SIG_EDDSA448)
        if ((priv_key->key_type == EDDSA448) || (priv_key->key_type == EDDSA448PH)) {
                MUST_HAVE((digest_size / 2) >= 2, ret, err);
                /*
                 * All eight bits of the last octet are cleared, highest bit
                 * of the second to last octet is set.
                 */
                digest[(digest_size / 2) - 1] = 0;
                digest[(digest_size / 2) - 2] |= 0x80;
        }
#endif
#if !defined(WITH_SIG_EDDSA25519) && !defined(WITH_SIG_EDDSA448)
        ret = -1;
        goto err;
#endif
        /*
         * Now that we have derived our hash, store it in place of our secret
         * value NOTE: we do not need the secret value anymore since only the
         * hash is needed.
         */
        ret = nn_init_from_buf(&(priv_key->x), digest, digest_size);

err:
        VAR_ZEROIFY(digest_size);

        return ret;
}

/*
 * Generate an EdDSA private key.
 *
 */
int eddsa_gen_priv_key(ec_priv_key *priv_key)
{
        int ret;
        u8 digest_size;
        hash_alg_type hash_type = UNKNOWN_HASH_ALG;

        /* Check if private key is initialized. */
        ret = eddsa_priv_key_sanity_check(priv_key); EG(ret, err);

        /* Check hash function compatibility:
         *   We must have 2**(b-1) > p with (2*b) the size of the hash function.
         */
        MUST_HAVE(((hash_type = get_eddsa_hash_type(priv_key->key_type)) != UNKNOWN_HASH_ALG), ret, err);

        digest_size = 0;
        ret = get_hash_sizes(hash_type, &digest_size, NULL); EG(ret, err);

        MUST_HAVE(((2 * priv_key->params->ec_fp.p_bitlen) < (8 * (bitcnt_t)digest_size)), ret, err);
        MUST_HAVE(((digest_size % 2) == 0), ret, err);

        /* Generate a random private key
         * An EdDSA secret scalar is a b bit string with (2*b) the size of the hash function
         */
        ret = nn_get_random_len(&(priv_key->x), (digest_size / 2)); EG(ret, err);

        /* Derive the private key */
        ret = eddsa_derive_priv_key(priv_key);

err:
        VAR_ZEROIFY(digest_size);

        return ret;
}


/* Import an EdDSA private key from a raw buffer.
 * NOTE: the private key must be a big number associated to the curve that
 * depends on the flavor of EdDSA (Ed25519 or Ed448), and the result is a
 * derived private key that can be used by the internal EdDSA functions.
 * The derived key is a hash of the private key: we mainly perform this
 * derivation early to prevent side-channel attacks and other leaks on the
 * "root" private key.
 */
int eddsa_import_priv_key(ec_priv_key *priv_key, const u8 *buf, u16 buflen,
                          const ec_params *shortw_curve_params,
                          ec_alg_type sig_type)
{
        int ret;
        hash_alg_type hash_type = UNKNOWN_HASH_ALG;
        u8 digest_size;
        bitcnt_t blen;

        /* Some sanity checks */
        MUST_HAVE((priv_key != NULL) && (buf != NULL) && (shortw_curve_params != NULL), ret, err);

        /* Import the big number from our buffer */
        ret = nn_init_from_buf(&(priv_key->x), buf, buflen); EG(ret, err);
        /* The bit length of our big number must be <= b, half the digest size */
        hash_type = get_eddsa_hash_type(sig_type);
        MUST_HAVE((hash_type != UNKNOWN_HASH_ALG), ret, err);

        digest_size = 0;
        ret = get_hash_sizes(hash_type, &digest_size, NULL); EG(ret, err);

        ret = nn_bitlen(&(priv_key->x), &blen); EG(ret, err);
        MUST_HAVE((blen <= (8 * ((bitcnt_t)digest_size / 2))), ret, err);

        /* Initialize stuff */
        priv_key->key_type = sig_type;
        priv_key->params = shortw_curve_params;
        priv_key->magic = PRIV_KEY_MAGIC;

        /* Now derive the private key.
         * NOTE: sanity check on the private key is performed during derivation.
         */
        ret = eddsa_derive_priv_key(priv_key);

err:
        if((priv_key != NULL) && ret){
                IGNORE_RET_VAL(local_memset(priv_key, 0, sizeof(ec_priv_key)));
        }
        VAR_ZEROIFY(digest_size);
        VAR_ZEROIFY(blen);

        return ret;
}

/* NOTE: we perform EDDSA public key computation on the short Weierstrass
 * form of the curve thanks to the birational equivalence of curve
 * models (the isomorphism allows to perform the scalar multiplication
 * on the equivalent curve).
 */
int eddsa_init_pub_key(ec_pub_key *out_pub, const ec_priv_key *in_priv)
{
        prj_pt_src_t G;
        u8 digest_size;
        u8 digest[MAX_DIGEST_SIZE];
        /* Secret scalar used for public generation */
        nn s;
        hash_alg_type hash_type;
        u8 digest_size_;
        int ret;
        s.magic = WORD(0);

        MUST_HAVE(out_pub != NULL, ret, err);
        ret = eddsa_priv_key_sanity_check(in_priv); EG(ret, err);

        ret = nn_init(&s, 0); EG(ret, err);

        /* Zero init public key to be generated */
        ret = local_memset(out_pub, 0, sizeof(ec_pub_key)); EG(ret, err);

        /* Get the generator G */
        G = &(in_priv->params->ec_gen);

        /* Get the digest in proper format */
        MUST_HAVE(((hash_type = get_eddsa_hash_type(in_priv->key_type)) != UNKNOWN_HASH_ALG), ret, err);

        digest_size_ = 0;
        ret = get_hash_sizes(hash_type, &digest_size_, NULL); EG(ret, err);

        /* Extract the digest */
        digest_size = sizeof(digest);
        ret = eddsa_get_digest_from_priv_key(digest, &digest_size, in_priv); EG(ret, err);

        /* Sanity check */
        MUST_HAVE((digest_size == digest_size_), ret, err);

        /* Encode the scalar s from the digest */
        ret = eddsa_compute_s(&s, digest, digest_size); EG(ret, err);

        /* Compute s x G where G is the base point */
        /*
         * Use blinding when computing point scalar multiplication as we
         * manipulate a fixed secret.
         */
#if defined(WITH_SIG_EDDSA448)
        if((in_priv->key_type == EDDSA448) || (in_priv->key_type == EDDSA448PH)){
                /*
                 * NOTE: because of the 4-isogeny between Ed448 and Edwards448,
                 * we actually multiply by (s/4) since the base point of
                 * Edwards448 is four times the one of Ed448.
                 * Here, s/4 can be simply computed by right shifting by 2 as
                 * we are ensured that our scalar is a multiple of 4 by
                 * construction.
                 */
                ret = nn_rshift(&s, &s, 2); EG(ret, err);
        }
#endif
        ret = prj_pt_mul_blind(&(out_pub->y), &s, G); EG(ret, err);

        out_pub->key_type = in_priv->key_type;
        out_pub->params = in_priv->params;
        out_pub->magic = PUB_KEY_MAGIC;

err:
        PTR_NULLIFY(G);
        VAR_ZEROIFY(digest_size);
        nn_uninit(&s);

        return ret;
}

/*
 * Import a public key in canonical form.
 * (imports a public key from a buffer and checks its canonical form.)
 *
 */
int eddsa_import_pub_key(ec_pub_key *pub_key, const u8 *buf, u16 buflen,
                         const ec_params *shortw_curve_params,
                         ec_alg_type sig_type)
{
        aff_pt_edwards _Tmp;
        ec_edwards_crv edwards_curve;
        int ret;
        ec_shortw_crv_src_t shortw_curve;
        fp_src_t alpha_montgomery;
        fp_src_t gamma_montgomery;
        fp_src_t alpha_edwards;
        prj_pt_t pub_key_y;
        _Tmp.magic = edwards_curve.magic = WORD(0);

#if defined(WITH_SIG_EDDSA25519) && defined(WITH_SIG_EDDSA448)
        if((sig_type != EDDSA25519) && (sig_type != EDDSA25519CTX) && (sig_type != EDDSA25519PH) && \
           (sig_type != EDDSA448) && (sig_type != EDDSA448PH)){
#endif
#if defined(WITH_SIG_EDDSA25519) && !defined(WITH_SIG_EDDSA448)
        if((sig_type != EDDSA25519) && (sig_type != EDDSA25519CTX) && (sig_type != EDDSA25519PH)){
#endif
#if !defined(WITH_SIG_EDDSA25519) && defined(WITH_SIG_EDDSA448)
        if((sig_type != EDDSA448) && (sig_type != EDDSA448PH)){
#endif
                ret = -1;
                goto err;
        }

        MUST_HAVE((pub_key != NULL) && (shortw_curve_params != NULL) && (buf != NULL), ret, err);

        /* Check for sizes on the buffer for strict size depending on EdDSA types */
#if defined(WITH_SIG_EDDSA25519)
        if((sig_type == EDDSA25519) || (sig_type == EDDSA25519CTX) || (sig_type == EDDSA25519PH)){
                MUST_HAVE((buflen == EDDSA25519_PUB_KEY_ENCODED_LEN), ret, err);
        }
#endif
#if defined(WITH_SIG_EDDSA448)
        if((sig_type == EDDSA448) || (sig_type == EDDSA448PH)){
                MUST_HAVE((buflen == EDDSA448_PUB_KEY_ENCODED_LEN), ret, err);
        }
#endif

        /* Make things more readable */
        shortw_curve = &(shortw_curve_params->ec_curve);
        alpha_montgomery = &(shortw_curve_params->ec_alpha_montgomery);
        gamma_montgomery = &(shortw_curve_params->ec_gamma_montgomery);
        alpha_edwards = &(shortw_curve_params->ec_alpha_edwards);
        pub_key_y = &(pub_key->y);

        /* Get the isogenic Edwards curve */
        ret = curve_shortw_to_edwards(shortw_curve, &edwards_curve, alpha_montgomery,
                                gamma_montgomery, alpha_edwards); EG(ret, err);

        /* Decode the point in Edwards */
        ret = eddsa_decode_point(&_Tmp, &edwards_curve, alpha_edwards, buf, buflen,
                              sig_type); EG(ret, err);
        /* Then transfer to short Weierstrass in our public key */
        ret = aff_pt_edwards_to_prj_pt_shortw(&_Tmp, shortw_curve, pub_key_y,
                                        alpha_edwards); EG(ret, err);
#if defined(WITH_SIG_EDDSA448)
        if((sig_type == EDDSA448) || (sig_type == EDDSA448PH)){
                nn_src_t gen_order = &(shortw_curve_params->ec_gen_order);
                nn tmp;
                tmp.magic = WORD(0);

                /*
                 * NOTE: because of the 4-isogeny between Ed448 and Edwards448,
                 * we actually multiply by (s/4) since the base point of
                 * Edwards448 is four times the one of Ed448.
                 * Here, s/4 is computed by multiplying s by the modular
                 * inverse of 4.
                 */
                ret = nn_init(&tmp, 0); EG(ret, err1);
                ret = nn_modinv_word(&tmp, WORD(4), gen_order); EG(ret, err1);
                ret = prj_pt_mul(&(pub_key->y), &tmp, pub_key_y); EG(ret, err1);
err1:
                nn_uninit(&tmp);
                PTR_NULLIFY(gen_order);
                EG(ret, err);
        }
#endif
        /* Mark the public key as initialized */
        pub_key->key_type = sig_type;
        pub_key->params = shortw_curve_params;
        pub_key->magic = PUB_KEY_MAGIC;

        /* Now sanity check our public key before validating the import */
        ret = eddsa_pub_key_sanity_check(pub_key);

err:
        if((pub_key != NULL) && ret){
                IGNORE_RET_VAL(local_memset(pub_key, 0, sizeof(ec_pub_key)));
        }
        PTR_NULLIFY(shortw_curve);
        PTR_NULLIFY(alpha_montgomery);
        PTR_NULLIFY(gamma_montgomery);
        PTR_NULLIFY(alpha_edwards);
        PTR_NULLIFY(pub_key_y);
        aff_pt_edwards_uninit(&_Tmp);
        ec_edwards_crv_uninit(&edwards_curve);

        return ret;
}

/*
 * Export a public key in canonical form.
 * (exports a public key to a buffer in canonical form.)
 */
int eddsa_export_pub_key(const ec_pub_key *in_pub, u8 *buf, u16 buflen)
{
        aff_pt_edwards _Tmp;
        ec_edwards_crv edwards_curve;
        ec_alg_type sig_type;
        int ret;
        ec_shortw_crv_src_t shortw_curve;
        fp_src_t alpha_montgomery;
        fp_src_t gamma_montgomery;
        fp_src_t alpha_edwards;
        prj_pt_src_t pub_key_y;
        _Tmp.magic = edwards_curve.magic = WORD(0);

        ret = pub_key_check_initialized(in_pub); EG(ret, err);
        MUST_HAVE((buf != NULL), ret, err);

        /* Make things more readable */
        shortw_curve = &(in_pub->params->ec_curve);
        alpha_montgomery = &(in_pub->params->ec_alpha_montgomery);
        gamma_montgomery = &(in_pub->params->ec_gamma_montgomery);
        alpha_edwards = &(in_pub->params->ec_alpha_edwards);
        pub_key_y = &(in_pub->y);
        sig_type = in_pub->key_type;

        /* Check for sizes on the buffer for strict size depending on EdDSA types */
#if defined(WITH_SIG_EDDSA25519)
        if((sig_type == EDDSA25519) || (sig_type == EDDSA25519CTX) || (sig_type == EDDSA25519PH)){
                MUST_HAVE((buflen == EDDSA25519_PUB_KEY_ENCODED_LEN), ret, err);
        }
#endif
#if defined(WITH_SIG_EDDSA448)
        if((sig_type == EDDSA448) || (sig_type == EDDSA448PH)){
                MUST_HAVE((buflen == EDDSA448_PUB_KEY_ENCODED_LEN), ret, err);
        }
#endif

        /* Transfer our short Weierstrass to Edwards representation */
        ret = curve_shortw_to_edwards(shortw_curve, &edwards_curve, alpha_montgomery,
                                gamma_montgomery, alpha_edwards); EG(ret, err);
        ret = prj_pt_shortw_to_aff_pt_edwards(pub_key_y, &edwards_curve, &_Tmp,
                                        alpha_edwards); EG(ret, err);
        /* Export to buffer canonical form */
        ret = eddsa_encode_point(&_Tmp, alpha_edwards, buf,
                              buflen, in_pub->key_type);

err:
        PTR_NULLIFY(shortw_curve);
        PTR_NULLIFY(alpha_montgomery);
        PTR_NULLIFY(gamma_montgomery);
        PTR_NULLIFY(alpha_edwards);
        PTR_NULLIFY(pub_key_y);
        aff_pt_edwards_uninit(&_Tmp);
        ec_edwards_crv_uninit(&edwards_curve);

        return ret;
}

/* Import an EdDSA key pair from a private key buffer */
int eddsa_import_key_pair_from_priv_key_buf(ec_key_pair *kp,
                                            const u8 *buf, u16 buflen,
                                            const ec_params *shortw_curve_params,
                                            ec_alg_type sig_type)
{
        int ret;

        MUST_HAVE((kp != NULL), ret, err);

        /* Try to import the private key */
        ret = eddsa_import_priv_key(&(kp->priv_key), buf, buflen,
                                 shortw_curve_params, sig_type); EG(ret, err);

        /* Now derive the public key */
        ret = eddsa_init_pub_key(&(kp->pub_key), &(kp->priv_key));

err:
        return ret;
}

/* Compute PH(M) with PH being the hash depending on the key type */
ATTRIBUTE_WARN_UNUSED_RET static int eddsa_compute_pre_hash(const u8 *message, u32 message_size,
                                  u8 *digest, u8 *digest_size,
                                  ec_alg_type sig_type)
{
        hash_alg_type hash_type;
        const hash_mapping *hash;
        hash_context hash_ctx;
        int ret;

        MUST_HAVE((message != NULL) && (digest != NULL) && (digest_size != NULL), ret, err);

        MUST_HAVE(((hash_type = get_eddsa_hash_type(sig_type)) != UNKNOWN_HASH_ALG), ret, err);

        ret = get_hash_by_type(hash_type, &hash); EG(ret, err);
        MUST_HAVE((hash != NULL), ret, err);

        /* Sanity check on the size */
        MUST_HAVE(((*digest_size) >= hash->digest_size), ret, err);

        (*digest_size) = hash->digest_size;
        /* Hash the message */
        ret = hash_mapping_callbacks_sanity_check(hash); EG(ret, err);
        ret = hash->hfunc_init(&hash_ctx); EG(ret, err);
        ret = hash->hfunc_update(&hash_ctx, message, message_size); EG(ret, err);
        ret = hash->hfunc_finalize(&hash_ctx, digest); EG(ret, err);

err:
        return ret;
}

/*****************/

/* EdDSA signature length */
int eddsa_siglen(u16 p_bit_len, u16 q_bit_len, u8 hsize, u8 blocksize, u8 *siglen)
{
        int ret;

        MUST_HAVE((siglen != NULL), ret, err);
        MUST_HAVE((p_bit_len <= CURVES_MAX_P_BIT_LEN) &&
                  (q_bit_len <= CURVES_MAX_Q_BIT_LEN) &&
                  (hsize <= MAX_DIGEST_SIZE) && (blocksize <= MAX_BLOCK_SIZE), ret, err);

        (*siglen) = (u8)EDDSA_SIGLEN(hsize);
        ret = 0;
err:
        return ret;
}

/*
 * Generic *internal* EdDSA signature functions (init, update and finalize).
 *
 * Global EdDSA signature process is as follows (I,U,F provides
 * information in which function(s) (init(), update() or finalize())
 * a specific step is performed):
 *
 */

#define EDDSA_SIGN_MAGIC ((word_t)(0x7632542bf630972bULL))
#define EDDSA_SIGN_CHECK_INITIALIZED(A, ret, err) \
        MUST_HAVE((((void *)(A)) != NULL) && ((A)->magic == EDDSA_SIGN_MAGIC), ret, err)

int _eddsa_sign_init_pre_hash(struct ec_sign_context *ctx)
{
        int ret;
        bitcnt_t blen;
        u8 use_message_pre_hash = 0;
        ec_alg_type key_type = UNKNOWN_ALG;
        const ec_key_pair *key_pair;
        const hash_mapping *h;

        /* First, verify context has been initialized */
        ret = sig_sign_check_initialized(ctx); EG(ret, err);

        /* Make things more readable */
        key_pair = ctx->key_pair;
        h = ctx->h;
        key_type = ctx->key_pair->priv_key.key_type;

        /* Sanity check: this function is only supported in PH mode */
#if defined(WITH_SIG_EDDSA25519)
        if(key_type == EDDSA25519PH){
                use_message_pre_hash = 1;
        }
#endif
#if defined(WITH_SIG_EDDSA448)
        if(key_type == EDDSA448PH){
                use_message_pre_hash = 1;
        }
#endif
        MUST_HAVE((use_message_pre_hash == 1), ret, err);

        /* Additional sanity checks on input params from context */
        ret = eddsa_key_pair_sanity_check(key_pair); EG(ret, err);

        MUST_HAVE((h != NULL) && (h->digest_size <= MAX_DIGEST_SIZE) && (h->block_size <= MAX_BLOCK_SIZE), ret, err);

        /* Sanity check on hash types */
        MUST_HAVE((key_type == key_pair->pub_key.key_type) && (h->type == get_eddsa_hash_type(key_type)), ret, err);

        /*
         * Sanity check on hash size versus private key size
         */
        ret = nn_bitlen(&(key_pair->priv_key.x), &blen); EG(ret, err);
        MUST_HAVE(blen <= (8 * h->digest_size), ret, err);

        /*
         * Initialize hash context stored in our private part of context
         * and record data init has been done
         */
        /* Since we call a callback, sanity check our mapping */
        ret = hash_mapping_callbacks_sanity_check(h); EG(ret, err);
        ret = h->hfunc_init(&(ctx->sign_data.eddsa.h_ctx)); EG(ret, err);

        /* Initialize other elements in the context */
        ctx->sign_data.eddsa.magic = EDDSA_SIGN_MAGIC;

err:
        PTR_NULLIFY(key_pair);
        PTR_NULLIFY(h);
        VAR_ZEROIFY(use_message_pre_hash);

        return ret;
}

int _eddsa_sign_update_pre_hash(struct ec_sign_context *ctx,
                       const u8 *chunk, u32 chunklen)
{
        int ret;
        ec_alg_type key_type = UNKNOWN_ALG;
        u8 use_message_pre_hash = 0;

        /*
         * First, verify context has been initialized and public
         * part too. This guarantees the context is an EDDSA
         * verification one and we do not update() or finalize()
         * before init().
         */
        ret = sig_sign_check_initialized(ctx); EG(ret, err);
        EDDSA_SIGN_CHECK_INITIALIZED(&(ctx->sign_data.eddsa), ret, err);
        MUST_HAVE((chunk != NULL), ret, err);

        key_type = ctx->key_pair->priv_key.key_type;

        /* Sanity check: this function is only supported in PH mode */
#if defined(WITH_SIG_EDDSA25519)
        if(key_type == EDDSA25519PH){
                use_message_pre_hash = 1;
        }
#endif
#if defined(WITH_SIG_EDDSA448)
        if(key_type == EDDSA448PH){
                use_message_pre_hash = 1;
        }
#endif
        MUST_HAVE(use_message_pre_hash == 1, ret, err);

        /* Sanity check on hash types */
        MUST_HAVE((ctx->h->type == get_eddsa_hash_type(key_type)), ret, err);

        /* 2. Compute h = H(m) */
        /* Since we call a callback, sanity check our mapping */
        ret = hash_mapping_callbacks_sanity_check(ctx->h); EG(ret, err);

        ret = ctx->h->hfunc_update(&(ctx->sign_data.eddsa.h_ctx), chunk, chunklen);

err:
        VAR_ZEROIFY(use_message_pre_hash);

        return ret;

}

int _eddsa_sign_finalize_pre_hash(struct ec_sign_context *ctx, u8 *sig, u8 siglen)
{
        const ec_priv_key *priv_key;
        const ec_pub_key *pub_key;
        prj_pt_src_t G;
        u8 hash[MAX_DIGEST_SIZE];
        u8 ph_hash[MAX_DIGEST_SIZE];
        prj_pt R;
        ec_edwards_crv crv_edwards;
        aff_pt_edwards Tmp_edwards;
        nn_src_t q;
        u8 hsize, hash_size;
        int ret;
        ec_shortw_crv_src_t shortw_curve;
        fp_src_t alpha_montgomery;
        fp_src_t gamma_montgomery;
        fp_src_t alpha_edwards;
        prj_pt_src_t pub_key_y;
        u8 use_message_pre_hash = 0;
        u16 use_message_pre_hash_hsize = 0;
        ec_alg_type key_type = UNKNOWN_ALG;
        u8 r_len, s_len;
        const hash_mapping *h;

        nn r, s, S;
#ifdef USE_SIG_BLINDING
        /* b is the blinding mask */
        nn b, binv;
        b.magic = binv.magic = WORD(0);
#endif /* !USE_SIG_BLINDING */
        r.magic = s.magic = S.magic = WORD(0);
        R.magic = crv_edwards.magic = Tmp_edwards.magic = WORD(0);

        /*
         * First, verify context has been initialized and private
         * part too. This guarantees the context is an EDDSA
         * signature one and we do not update() or finalize()
         * before init().
         */
        ret = sig_sign_check_initialized(ctx); EG(ret, err);
        EDDSA_SIGN_CHECK_INITIALIZED(&(ctx->sign_data.eddsa), ret, err);
        MUST_HAVE((sig != NULL), ret, err);

        /* Zero init out points and data */
        ret = local_memset(&R, 0, sizeof(prj_pt)); EG(ret, err);
        ret = local_memset(&Tmp_edwards, 0, sizeof(aff_pt_edwards)); EG(ret, err);
        ret = local_memset(&crv_edwards, 0, sizeof(ec_edwards_crv)); EG(ret, err);
        ret = local_memset(hash, 0, sizeof(hash)); EG(ret, err);
        ret = local_memset(ph_hash, 0, sizeof(ph_hash)); EG(ret, err);

        /* Key type */
        key_type = ctx->key_pair->priv_key.key_type;
        /* Sanity check on hash types */
        MUST_HAVE((key_type == ctx->key_pair->pub_key.key_type) && (ctx->h->type == get_eddsa_hash_type(key_type)), ret, err);

        /* Make things more readable */
        priv_key = &(ctx->key_pair->priv_key);
        pub_key = &(ctx->key_pair->pub_key);
        q = &(priv_key->params->ec_gen_order);
        G = &(priv_key->params->ec_gen);
        h = ctx->h;
        hsize = h->digest_size;
        r_len = EDDSA_R_LEN(hsize);
        s_len = EDDSA_S_LEN(hsize);

        shortw_curve = &(priv_key->params->ec_curve);
        alpha_montgomery = &(priv_key->params->ec_alpha_montgomery);
        gamma_montgomery = &(priv_key->params->ec_gamma_montgomery);
        alpha_edwards = &(priv_key->params->ec_alpha_edwards);
        pub_key_y = &(pub_key->y);

        dbg_nn_print("p", &(priv_key->params->ec_fp.p));
        dbg_nn_print("q", &(priv_key->params->ec_gen_order));
        dbg_priv_key_print("x", priv_key);
        dbg_ec_point_print("G", &(priv_key->params->ec_gen));
        dbg_pub_key_print("Y", &(ctx->key_pair->pub_key));

        /* Check provided signature length */
        MUST_HAVE((siglen == EDDSA_SIGLEN(hsize)) && (siglen == (r_len + s_len)), ret, err);

        /* Is it indeed a PH version of the algorithm? */
#if defined(WITH_SIG_EDDSA25519)
        if(key_type == EDDSA25519PH){
                use_message_pre_hash = 1;
                use_message_pre_hash_hsize = hsize;
        }
#endif
#if defined(WITH_SIG_EDDSA448)
        if(key_type == EDDSA448PH){
                use_message_pre_hash = 1;
                /* NOTE: as per RFC8032, EDDSA448PH uses
                 * SHAKE256 with 64 bytes output.
                 */
                use_message_pre_hash_hsize = 64;
        }
#endif
        /* Sanity check: this function is only supported in PH mode */
        MUST_HAVE((use_message_pre_hash == 1), ret, err);

        /* Finish the message hash session */
        /* Since we call a callback, sanity check our mapping */
        ret = hash_mapping_callbacks_sanity_check(h); EG(ret, err);

        ret = h->hfunc_finalize(&(ctx->sign_data.eddsa.h_ctx), ph_hash); EG(ret, err);

        /* 1. Finish computing the nonce r = H(h256 || ... || h511 || m) */
        /* Update our hash context with half of the secret key */
        hash_size = sizeof(hash);
        ret = eddsa_get_digest_from_priv_key(hash, &hash_size, priv_key); EG(ret, err);

        /* Sanity check */
        MUST_HAVE((hash_size == hsize), ret, err);

        /* Hash half the digest */
        ret = h->hfunc_init(&(ctx->sign_data.eddsa.h_ctx)); EG(ret, err);

        /* At this point, we are ensured that we have PH versions of the algorithms */
#if defined(WITH_SIG_EDDSA25519)
        if(key_type == EDDSA25519PH){
                ret = dom2(1, ctx->adata, ctx->adata_len, h,
                        &(ctx->sign_data.eddsa.h_ctx)); EG(ret, err);
        }
#endif
#if defined(WITH_SIG_EDDSA448)
        if(key_type == EDDSA448PH){
                ret = dom4(1, ctx->adata, ctx->adata_len, h,
                        &(ctx->sign_data.eddsa.h_ctx)); EG(ret, err);
        }
#endif
        ret = h->hfunc_update(&(ctx->sign_data.eddsa.h_ctx), &hash[hsize / 2], hsize / 2); EG(ret, err);

        /* Update hash h with message hash PH(m) */
        MUST_HAVE((use_message_pre_hash_hsize <= hsize), ret, err);

        ret = h->hfunc_update(&(ctx->sign_data.eddsa.h_ctx), ph_hash,
                        use_message_pre_hash_hsize); EG(ret, err);

        /* 1. Finish computing the nonce r = H(h256 || ... || h511 || PH(m)) */
        ret = h->hfunc_finalize(&(ctx->sign_data.eddsa.h_ctx), hash); EG(ret, err);
        dbg_buf_print("h(h || m)", hash, hsize);

        /* Import r as the hash scalar */
        ret = eddsa_decode_integer(&r, hash, hsize); EG(ret, err);

#ifdef USE_SIG_BLINDING
        /* Get a random b for blinding the r modular operations before the
         * scalar multiplication as we do not want it to leak.
         */
        ret = nn_get_random_mod(&b, q); EG(ret, err);
        dbg_nn_print("b", &b);
        /* NOTE: we use Fermat's little theorem inversion for
         * constant time here. This is possible since q is prime.
         */
        ret = nn_modinv_fermat(&binv, &b, q); EG(ret, err);

        /* Blind r */
        ret = nn_mul(&r, &r, &b); EG(ret, err);
#endif /* USE_SIG_BLINDING */

        /* Reduce r modulo q for the next computation.
         * (this is a blind reduction if USE_SIG_BLINDING).
         */
        ret = nn_mod_notrim(&r, &r, q); EG(ret, err);

        /* Now perform our scalar multiplication.
         */
#if defined(WITH_SIG_EDDSA448)
        if(key_type == EDDSA448PH){
                /*
                 * NOTE: in case of EDDSA448, because of the 4-isogeny we must
                 * divide our scalar by 4.
                 */
                nn r_tmp;
                r_tmp.magic = WORD(0);

                ret = nn_init(&r_tmp, 0); EG(ret, err1);
                ret = nn_modinv_word(&r_tmp, WORD(4), q); EG(ret, err1);
                ret = nn_mod_mul(&r_tmp, &r_tmp, &r, q); EG(ret, err1);

#ifdef USE_SIG_BLINDING
                /* Unblind r_tmp */
                ret = nn_mod_mul(&r_tmp, &r_tmp, &binv, q); EG(ret, err1);
                ret = prj_pt_mul_blind(&R, &r_tmp, G);
#else
                ret = prj_pt_mul(&R, &r_tmp, G);
#endif /* !USE_SIG_BLINDING */
err1:
                nn_uninit(&r_tmp);
                EG(ret, err);
        }
        else
#endif /* !defined(WITH_SIG_EDDSA448) */
        {
#ifdef USE_SIG_BLINDING
                nn r_tmp;
                r_tmp.magic = WORD(0);

                ret = nn_init(&r_tmp, 0); EG(ret, err2);
                ret = nn_copy(&r_tmp, &r); EG(ret, err2);

                /* Unblind r_tmp */
                ret = nn_mod_mul(&r_tmp, &r_tmp, &binv, q); EG(ret, err2);
                ret = prj_pt_mul_blind(&R, &r_tmp, G); EG(ret, err2);
err2:
                nn_uninit(&r_tmp);
                EG(ret, err);
#else
                ret = prj_pt_mul(&R, &r, G); EG(ret, err);
#endif /* !USE_SIG_BLINDING */
        }

        /* Now compute S = (r + H(R || PubKey || PH(m)) * secret) mod q */
        ret = h->hfunc_init(&(ctx->sign_data.eddsa.h_ctx)); EG(ret, err);
        /* Transfer R to Edwards */
        ret = curve_shortw_to_edwards(shortw_curve, &crv_edwards, alpha_montgomery,
                                gamma_montgomery, alpha_edwards); EG(ret, err);
        ret = prj_pt_shortw_to_aff_pt_edwards(&R, &crv_edwards, &Tmp_edwards,
                                        alpha_edwards); EG(ret, err);
        dbg_ec_edwards_point_print("R", &Tmp_edwards);

        MUST_HAVE((r_len <= siglen), ret, err);
        /* Encode R and update */
        ret = eddsa_encode_point(&Tmp_edwards, alpha_edwards, &sig[0],
                              r_len, key_type); EG(ret, err);
        /* At this point, we are ensured that we have PH versions of the algorithms */
#if defined(WITH_SIG_EDDSA25519)
        if(key_type == EDDSA25519PH){
                ret = dom2(1, ctx->adata, ctx->adata_len, h,
                        &(ctx->sign_data.eddsa.h_ctx)); EG(ret, err);
        }
#endif
#if defined(WITH_SIG_EDDSA448)
        if(key_type == EDDSA448PH){
                ret = dom4(1, ctx->adata, ctx->adata_len, h,
                        &(ctx->sign_data.eddsa.h_ctx)); EG(ret, err);
        }
#endif
        /* Update the hash with the encoded R point */
        ret = h->hfunc_update(&(ctx->sign_data.eddsa.h_ctx), &sig[0], r_len); EG(ret, err);
        /* Encode the public key */
        /* Transfer the public key to Edwards */
        ret = prj_pt_shortw_to_aff_pt_edwards(pub_key_y, &crv_edwards,
                                        &Tmp_edwards, alpha_edwards); EG(ret, err);
        dbg_ec_edwards_point_print("A", &Tmp_edwards);
        MUST_HAVE(r_len <= sizeof(hash), ret, err);

        /* NOTE: we use the hash buffer as a temporary buffer */
        ret = eddsa_encode_point(&Tmp_edwards, alpha_edwards, hash,
                              r_len, key_type); EG(ret, err);

        /* Update the hash with the encoded public key point */
        ret = h->hfunc_update(&(ctx->sign_data.eddsa.h_ctx), hash, r_len); EG(ret, err);
        /* Update the hash with PH(m) */
        ret = h->hfunc_update(&(ctx->sign_data.eddsa.h_ctx), ph_hash,
                        use_message_pre_hash_hsize); EG(ret, err);
        /* Finalize the hash */
        ret = h->hfunc_finalize(&(ctx->sign_data.eddsa.h_ctx), hash); EG(ret, err);
        dbg_buf_print("h(R || PubKey || PH(m))", hash, hsize);
        /* Import our resulting hash as an integer in S */
        ret = eddsa_decode_integer(&S, hash, hsize); EG(ret, err);
        ret = nn_mod(&S, &S, q); EG(ret, err);
        /* Extract the digest */
        hsize = sizeof(hash);
        ret = eddsa_get_digest_from_priv_key(hash, &hsize, priv_key); EG(ret, err);
        /* Encode the scalar s from the digest */
        ret = eddsa_compute_s(&s, hash, hsize); EG(ret, err);
        ret = nn_mod(&s, &s, q); EG(ret, err);

#ifdef USE_SIG_BLINDING
        /* If we use blinding, multiply by b */
        ret = nn_mod_mul(&S, &S, &b, q); EG(ret, err);
#endif /* !USE_SIG_BLINDING */
        /* Multiply by the secret */
        ret = nn_mod_mul(&S, &S, &s, q); EG(ret, err);
        /* The secret is not needed anymore */
        nn_uninit(&s);
        /* Add to r */
        ret = nn_mod_add(&S, &S, &r, q); EG(ret, err);
#ifdef USE_SIG_BLINDING
        /* Unblind the result */
        ret = nn_mod_mul(&S, &S, &binv, q); EG(ret, err);
#endif /* !USE_SIG_BLINDING */
        /* Store our S in the context as an encoded buffer */
        MUST_HAVE((s_len <= (siglen - r_len)), ret, err);
        ret = eddsa_encode_integer(&S, &sig[r_len], s_len);

 err:
        /* Clean what remains on the stack */
        PTR_NULLIFY(h);
        PTR_NULLIFY(priv_key);
        PTR_NULLIFY(pub_key);
        PTR_NULLIFY(G);
        PTR_NULLIFY(q);
        PTR_NULLIFY(shortw_curve);
        PTR_NULLIFY(alpha_montgomery);
        PTR_NULLIFY(gamma_montgomery);
        PTR_NULLIFY(alpha_edwards);
        PTR_NULLIFY(pub_key_y);
        VAR_ZEROIFY(hsize);
        VAR_ZEROIFY(hash_size);
        VAR_ZEROIFY(use_message_pre_hash);
        VAR_ZEROIFY(use_message_pre_hash_hsize);
        VAR_ZEROIFY(r_len);
        VAR_ZEROIFY(s_len);

        prj_pt_uninit(&R);
        ec_edwards_crv_uninit(&crv_edwards);
        aff_pt_edwards_uninit(&Tmp_edwards);
        nn_uninit(&s);
        nn_uninit(&r);
        nn_uninit(&S);

#ifdef USE_SIG_BLINDING
        nn_uninit(&b);
        nn_uninit(&binv);
#endif /* !USE_SIG_BLINDING */

        /*
         * We can now clear data part of the context. This will clear
         * magic and avoid further reuse of the whole context.
         */
        if(ctx != NULL){
                IGNORE_RET_VAL(local_memset(&(ctx->sign_data.eddsa), 0, sizeof(eddsa_sign_data)));
        }
        IGNORE_RET_VAL(local_memset(ph_hash, 0, sizeof(ph_hash)));

        return ret;
}


/******** Signature function specific to pure EdDSA where the message
********* streaming mode via init/update/finalize is not supported.
 */
int _eddsa_sign(u8 *sig, u8 siglen, const ec_key_pair *key_pair,
                const u8 *m, u32 mlen, int (*rand) (nn_t out, nn_src_t q),
                ec_alg_type sig_type, hash_alg_type hash_type,
                const u8 *adata, u16 adata_len)
{
        int ret;
        ec_alg_type key_type = UNKNOWN_ALG;
        ec_shortw_crv_src_t shortw_curve;
        fp_src_t alpha_montgomery;
        fp_src_t gamma_montgomery;
        fp_src_t alpha_edwards;
        prj_pt_src_t pub_key_y;
        u8 use_message_pre_hash = 0;
        u16 use_message_pre_hash_hsize = 0;
        prj_pt_src_t G;
        prj_pt R;
        aff_pt_edwards Tmp_edwards;
        ec_edwards_crv crv_edwards;
        u8 hash[MAX_DIGEST_SIZE];
        u8 ph_hash[MAX_DIGEST_SIZE];
        const ec_priv_key *priv_key;
        const ec_pub_key *pub_key;
        nn_src_t q;
        u8 hsize, hash_size;
        hash_context h_ctx;
        u8 r_len, s_len;
        bitcnt_t blen;
        const hash_mapping *h;

        nn r, s, S;
#ifdef USE_SIG_BLINDING
        /* b is the blinding mask */
        nn b, binv;
        b.magic = binv.magic = WORD(0);
#endif

        r.magic = s.magic = S.magic = WORD(0);
        R.magic = Tmp_edwards.magic = crv_edwards.magic = WORD(0);

        /*
         * NOTE: EdDSA does not use any notion of random Nonce, so no need
         * to use 'rand' here: we strictly check that NULL is provided.
         */
        MUST_HAVE((rand == NULL), ret, err);

        /* Zero init out points and data */
        ret = local_memset(&R, 0, sizeof(prj_pt)); EG(ret, err);
        ret = local_memset(&Tmp_edwards, 0, sizeof(aff_pt_edwards)); EG(ret, err);
        ret = local_memset(&crv_edwards, 0, sizeof(ec_edwards_crv)); EG(ret, err);
        ret = local_memset(hash, 0, sizeof(hash)); EG(ret, err);
        ret = local_memset(ph_hash, 0, sizeof(ph_hash)); EG(ret, err);

        /* Sanity check on the key pair */
        ret = eddsa_key_pair_sanity_check(key_pair); EG(ret, err);

        /* Make things more readable */
        ret = get_hash_by_type(hash_type, &h); EG(ret, err);
        key_type = key_pair->priv_key.key_type;

        /* Sanity check on the hash type */
        MUST_HAVE((h != NULL), ret, err);
        MUST_HAVE((get_eddsa_hash_type(sig_type) == hash_type), ret, err);
        /* Sanity check on the key type */
        MUST_HAVE(key_type == sig_type, ret, err);
        MUST_HAVE((h != NULL) && (h->digest_size <= MAX_DIGEST_SIZE) && (h->block_size <= MAX_BLOCK_SIZE), ret, err);
        /*
         * Sanity check on hash size versus private key size
         */
        ret = nn_bitlen(&(key_pair->priv_key.x), &blen); EG(ret, err);
        MUST_HAVE((blen <= (8 * h->digest_size)), ret, err);

        /* Make things more readable */
        priv_key = &(key_pair->priv_key);
        pub_key = &(key_pair->pub_key);
        q = &(priv_key->params->ec_gen_order);
        G = &(priv_key->params->ec_gen);
        hsize = h->digest_size;
        r_len = EDDSA_R_LEN(hsize);
        s_len = EDDSA_S_LEN(hsize);

        shortw_curve = &(priv_key->params->ec_curve);
        alpha_montgomery = &(priv_key->params->ec_alpha_montgomery);
        gamma_montgomery = &(priv_key->params->ec_gamma_montgomery);
        alpha_edwards = &(priv_key->params->ec_alpha_edwards);
        pub_key_y = &(pub_key->y);

        dbg_nn_print("p", &(priv_key->params->ec_fp.p));
        dbg_nn_print("q", &(priv_key->params->ec_gen_order));
        dbg_priv_key_print("x", priv_key);
        dbg_ec_point_print("G", &(priv_key->params->ec_gen));
        dbg_pub_key_print("Y", pub_key);

        /* Check provided signature length */
        MUST_HAVE((siglen == EDDSA_SIGLEN(hsize)) && (siglen == (r_len + s_len)), ret, err);

        /* Do we use the raw message or its PH(M) hashed version? */
#if defined(WITH_SIG_EDDSA25519)
        if(key_type == EDDSA25519PH){
                use_message_pre_hash = 1;
                use_message_pre_hash_hsize = hsize;
        }
#endif
#if defined(WITH_SIG_EDDSA448)
        if(key_type == EDDSA448PH){
                use_message_pre_hash = 1;
                /* NOTE: as per RFC8032, EDDSA448PH uses
                 * SHAKE256 with 64 bytes output.
                 */
                use_message_pre_hash_hsize = 64;
        }
#endif
        /* First of all, compute the message hash if necessary */
        if(use_message_pre_hash){
                hash_size = sizeof(ph_hash);
                ret = eddsa_compute_pre_hash(m, mlen, ph_hash, &hash_size, sig_type); EG(ret, err);
                MUST_HAVE(use_message_pre_hash_hsize <= hash_size, ret, err);
        }
        /* Initialize our hash context */
        /* Compute half of the secret key */
        hash_size = sizeof(hash);
        ret = eddsa_get_digest_from_priv_key(hash, &hash_size, &(key_pair->priv_key)); EG(ret, err);
        /* Sanity check */
        MUST_HAVE((hash_size == hsize), ret, err);
        /* Since we call a callback, sanity check our mapping */
        ret = hash_mapping_callbacks_sanity_check(h); EG(ret, err);
        ret = h->hfunc_init(&h_ctx); EG(ret, err);
#if defined(WITH_SIG_EDDSA25519)
        if(key_type == EDDSA25519CTX){
                /* As per RFC8032, for EDDSA25519CTX the context SHOULD NOT be empty */
                MUST_HAVE(adata != NULL, ret, err);
                ret = dom2(0, adata, adata_len, h, &h_ctx); EG(ret, err);
        }
        if(key_type == EDDSA25519PH){
                ret = dom2(1, adata, adata_len, h, &h_ctx); EG(ret, err);
        }
#endif
#if defined(WITH_SIG_EDDSA448)
        if(key_type == EDDSA448){
                ret = dom4(0, adata, adata_len, h, &h_ctx); EG(ret, err);
        }
        if(key_type == EDDSA448PH){
                ret = dom4(1, adata, adata_len, h, &h_ctx); EG(ret, err);
        }
#endif
        ret = h->hfunc_update(&h_ctx, &hash[hsize / 2], hsize / 2); EG(ret, err);

        /* Now finish computing the scalar r */
        if(use_message_pre_hash){
                ret = h->hfunc_update(&h_ctx, ph_hash, use_message_pre_hash_hsize); EG(ret, err);
        }
        else{
                ret = h->hfunc_update(&h_ctx, m, mlen); EG(ret, err);
        }
        ret = h->hfunc_finalize(&h_ctx, hash); EG(ret, err);
        dbg_buf_print("h(h || PH(m))", hash, hsize);

        /* Import r as the hash scalar */
        ret = eddsa_decode_integer(&r, hash, hsize); EG(ret, err);

#ifdef USE_SIG_BLINDING
        /* Get a random b for blinding the r modular operations before the
         * scalar multiplication as we do not want it to leak.
         */
        ret = nn_get_random_mod(&b, q); EG(ret, err);
        dbg_nn_print("b", &b);
        /* NOTE: we use Fermat's little theorem inversion for
         * constant time here. This is possible since q is prime.
         */
        ret = nn_modinv_fermat(&binv, &b, q); EG(ret, err);

        /* Blind r */
        ret = nn_mul(&r, &r, &b); EG(ret, err);
#endif /* !USE_SIG_BLINDING */

        /* Reduce r modulo q for the next computation.
         * (this is a blind reduction if USE_SIG_BLINDING).
         */
        ret = nn_mod_notrim(&r, &r, q); EG(ret, err);

        /* Now perform our scalar multiplication.
         */
#if defined(WITH_SIG_EDDSA448)
        if((key_type == EDDSA448) || (key_type == EDDSA448PH)){
                /*
                 * NOTE: in case of EDDSA448, because of the 4-isogeny we must
                 * divide our scalar by 4.
                 */
                nn r_tmp;
                r_tmp.magic = WORD(0);

                ret = nn_init(&r_tmp, 0); EG(ret, err1);
                ret = nn_modinv_word(&r_tmp, WORD(4), q); EG(ret, err1);
                ret = nn_mod_mul(&r_tmp, &r_tmp, &r, q); EG(ret, err1);

#ifdef USE_SIG_BLINDING
                /* Unblind r_tmp */
                ret = nn_mod_mul(&r_tmp, &r_tmp, &binv, q); EG(ret, err1);
                ret = prj_pt_mul_blind(&R, &r_tmp, G);
#else
                ret = prj_pt_mul(&R, &r_tmp, G);
#endif /* !USE_SIG_BLINDING */
err1:
                nn_uninit(&r_tmp);
                EG(ret, err);
        }
        else
#endif /* !defined(WITH_SIG_EDDSA448) */
        {
#ifdef USE_SIG_BLINDING
                nn r_tmp;
                r_tmp.magic = WORD(0);

                ret = nn_init(&r_tmp, 0); EG(ret, err2);
                ret = nn_copy(&r_tmp, &r); EG(ret, err2);

                /* Unblind r_tmp */
                ret = nn_mod_mul(&r_tmp, &r_tmp, &binv, q); EG(ret, err2);
                ret = prj_pt_mul_blind(&R, &r_tmp, G); EG(ret, err2);
err2:
                nn_uninit(&r_tmp);
                EG(ret, err);
#else
                ret = prj_pt_mul(&R, &r, G); EG(ret, err);
#endif /* !USE_SIG_BLINDING */
        }

        /* Now compute S = (r + H(R || PubKey || PH(m)) * secret) mod q */
        ret = hash_mapping_callbacks_sanity_check(h); EG(ret, err);
        ret = h->hfunc_init(&h_ctx); EG(ret, err);
        /* Transfer R to Edwards */
        ret = curve_shortw_to_edwards(shortw_curve, &crv_edwards, alpha_montgomery,
                                gamma_montgomery, alpha_edwards); EG(ret, err);
        ret = prj_pt_shortw_to_aff_pt_edwards(&R, &crv_edwards, &Tmp_edwards,
                                        alpha_edwards); EG(ret, err);
        dbg_ec_edwards_point_print("R", &Tmp_edwards);
        MUST_HAVE((r_len <= siglen), ret, err);
        /* Encode R and update */
        ret = eddsa_encode_point(&Tmp_edwards, alpha_edwards, &sig[0],
                              r_len, key_type); EG(ret, err);
#if defined(WITH_SIG_EDDSA25519)
        if(key_type == EDDSA25519CTX){
                /*
                 * As per RFC8032, for EDDSA25519CTX the context
                 * SHOULD NOT be empty
                 */
                MUST_HAVE((adata != NULL), ret, err);
                ret = dom2(0, adata, adata_len, h, &h_ctx); EG(ret, err);
        }
        if(key_type == EDDSA25519PH){
                ret = dom2(1, adata, adata_len, h, &h_ctx); EG(ret, err);
        }
#endif
#if defined(WITH_SIG_EDDSA448)
        if(key_type == EDDSA448){
                ret = dom4(0, adata, adata_len, h, &h_ctx); EG(ret, err);
        }
        if(key_type == EDDSA448PH){
                ret = dom4(1, adata, adata_len, h, &h_ctx); EG(ret, err);
        }
#endif
        /* Update the hash with the encoded R point */
        ret = h->hfunc_update(&h_ctx, &sig[0], r_len); EG(ret, err);
        /* Transfer the public key to Edwards */
        ret = prj_pt_shortw_to_aff_pt_edwards(pub_key_y, &crv_edwards, &Tmp_edwards,
                                        alpha_edwards); EG(ret, err);
        dbg_ec_edwards_point_print("A", &Tmp_edwards);
        MUST_HAVE((r_len <= sizeof(hash)), ret, err);
        /* Encode the public key */
        /* NOTE: we use the hash buffer as a temporary buffer */
        ret = eddsa_encode_point(&Tmp_edwards, alpha_edwards,
                              hash, r_len, key_type); EG(ret, err);
        /* Update the hash with the encoded public key point */
        ret = h->hfunc_update(&h_ctx, hash, r_len); EG(ret, err);
        /* Update the hash with the message or its hash for the PH versions */
        if(use_message_pre_hash){
                ret = h->hfunc_update(&h_ctx, ph_hash, use_message_pre_hash_hsize); EG(ret, err);
        }
        else{
                ret = h->hfunc_update(&h_ctx, m, mlen); EG(ret, err);
        }
        /* Finalize the hash */
        ret = h->hfunc_finalize(&h_ctx, hash); EG(ret, err);
        dbg_buf_print("h(R || PubKey || PH(m))", hash, hsize);
        /* Import our resulting hash as an integer in S */
        ret = eddsa_decode_integer(&S, hash, hsize); EG(ret, err);
        ret = nn_mod(&S, &S, q); EG(ret, err);
        /* Extract the digest */
        hsize = sizeof(hash);
        ret = eddsa_get_digest_from_priv_key(hash, &hsize, priv_key); EG(ret, err);
        ret = eddsa_compute_s(&s, hash, hsize); EG(ret, err);
        ret = nn_mod(&s, &s, q); EG(ret, err);
#ifdef USE_SIG_BLINDING
        /* If we use blinding, multiply by b */
        ret = nn_mod_mul(&S, &S, &b, q); EG(ret, err);
#endif /* !USE_SIG_BLINDING */
        /* Multiply by the secret */
        ret = nn_mod_mul(&S, &S, &s, q); EG(ret, err);
        /* The secret is not needed anymore */
        nn_uninit(&s);
        /* Add to r */
        ret = nn_mod_add(&S, &S, &r, q); EG(ret, err);
#ifdef USE_SIG_BLINDING
        /* Unblind the result */
        ret = nn_mod_mul(&S, &S, &binv, q); EG(ret, err);
#endif /* !USE_SIG_BLINDING */
        /* Store our S in the context as an encoded buffer */
        MUST_HAVE((s_len <= (siglen - r_len)), ret, err);
        /* Encode the scalar s from the digest */
        ret = eddsa_encode_integer(&S, &sig[r_len], s_len);

err:
        /* Clean what remains on the stack */
        PTR_NULLIFY(priv_key);
        PTR_NULLIFY(pub_key);
        PTR_NULLIFY(G);
        PTR_NULLIFY(q);
        PTR_NULLIFY(shortw_curve);
        PTR_NULLIFY(alpha_montgomery);
        PTR_NULLIFY(gamma_montgomery);
        PTR_NULLIFY(alpha_edwards);
        PTR_NULLIFY(pub_key_y);
        PTR_NULLIFY(h);
        VAR_ZEROIFY(hsize);
        VAR_ZEROIFY(hash_size);
        VAR_ZEROIFY(use_message_pre_hash);
        VAR_ZEROIFY(use_message_pre_hash_hsize);
        VAR_ZEROIFY(r_len);
        VAR_ZEROIFY(s_len);
        VAR_ZEROIFY(blen);
        IGNORE_RET_VAL(local_memset(&h_ctx, 0, sizeof(h_ctx)));
        IGNORE_RET_VAL(local_memset(hash, 0, sizeof(hash)));
        IGNORE_RET_VAL(local_memset(ph_hash, 0, sizeof(ph_hash)));

        prj_pt_uninit(&R);
        ec_edwards_crv_uninit(&crv_edwards);
        aff_pt_edwards_uninit(&Tmp_edwards);
        nn_uninit(&s);
        nn_uninit(&r);
        nn_uninit(&S);

#ifdef USE_SIG_BLINDING
        nn_uninit(&b);
        nn_uninit(&binv);
#endif /* USE_SIG_BLINDING */

        return ret;
}

/******************************************************************************/
/*
 * Generic *internal* EDDSA verification functions (init, update and finalize).
 *
 */

#define EDDSA_VERIFY_MAGIC ((word_t)(0x3298fe87e77151beULL))
#define EDDSA_VERIFY_CHECK_INITIALIZED(A, ret, err) \
        MUST_HAVE((((void *)(A)) != NULL) && ((A)->magic == EDDSA_VERIFY_MAGIC), ret, err)

int _eddsa_verify_init(struct ec_verify_context *ctx, const u8 *sig, u8 siglen)
{
        nn_src_t q;
        ec_edwards_crv crv_edwards;
        aff_pt_edwards R;
        prj_pt _Tmp;
        prj_pt_t _R;
        aff_pt_edwards A;
        nn *S;
        u8 buff[MAX_DIGEST_SIZE];
        int ret, iszero, cmp;
        u16 hsize;
        const ec_pub_key *pub_key;
        ec_shortw_crv_src_t shortw_curve;
        fp_src_t alpha_montgomery;
        fp_src_t gamma_montgomery;
        fp_src_t alpha_edwards;
        nn_src_t gen_cofactor;
        prj_pt_src_t pub_key_y;
        hash_context *h_ctx;
        hash_context *h_ctx_pre_hash;
        ec_alg_type key_type = UNKNOWN_ALG;

        R.magic = crv_edwards.magic = _Tmp.magic = A.magic = WORD(0);

        /* First, verify context has been initialized */
        ret = sig_verify_check_initialized(ctx); EG(ret, err);
        MUST_HAVE((sig != NULL), ret, err);

        /* Zero init our local data */
        ret = local_memset(&A, 0, sizeof(aff_pt_edwards)); EG(ret, err);
        ret = local_memset(&crv_edwards, 0, sizeof(ec_edwards_crv)); EG(ret, err);
        ret = local_memset(buff, 0, sizeof(buff)); EG(ret, err);
        ret = local_memset(&R, 0, sizeof(R)); EG(ret, err);
        ret = local_memset(&_Tmp, 0, sizeof(_Tmp)); EG(ret, err);

        /* Do some sanity checks on input params */
        ret = eddsa_pub_key_sanity_check(ctx->pub_key); EG(ret, err);
        MUST_HAVE((ctx->h != NULL) && (ctx->h->digest_size <= MAX_DIGEST_SIZE) && (ctx->h->block_size <= MAX_BLOCK_SIZE), ret, err);

        /* Make things more readable */
        q = &(ctx->pub_key->params->ec_gen_order);
        _R = &(ctx->verify_data.eddsa._R);
        S = &(ctx->verify_data.eddsa.S);
        hsize = ctx->h->digest_size;

        pub_key = ctx->pub_key;
        shortw_curve = &(pub_key->params->ec_curve);
        alpha_montgomery = &(pub_key->params->ec_alpha_montgomery);
        gamma_montgomery = &(pub_key->params->ec_gamma_montgomery);
        alpha_edwards = &(pub_key->params->ec_alpha_edwards);
        gen_cofactor = &(pub_key->params->ec_gen_cofactor);
        pub_key_y = &(pub_key->y);
        key_type = pub_key->key_type;
        h_ctx = &(ctx->verify_data.eddsa.h_ctx);
        h_ctx_pre_hash = &(ctx->verify_data.eddsa.h_ctx_pre_hash);

        /* Sanity check on hash types */
        MUST_HAVE((ctx->h->type == get_eddsa_hash_type(key_type)), ret, err);

        /* Check given signature length is the expected one */
        MUST_HAVE((siglen == EDDSA_SIGLEN(hsize)), ret, err);
        MUST_HAVE((siglen == (EDDSA_R_LEN(hsize) + EDDSA_S_LEN(hsize))), ret, err);

        /* Initialize the hash context */
        /* Since we call a callback, sanity check our mapping */
        ret = hash_mapping_callbacks_sanity_check(ctx->h); EG(ret, err);
        ret = ctx->h->hfunc_init(h_ctx); EG(ret, err);
        ret = ctx->h->hfunc_init(h_ctx_pre_hash); EG(ret, err);
#if defined(WITH_SIG_EDDSA25519)
        if(key_type == EDDSA25519CTX){
                /* As per RFC8032, for EDDSA25519CTX the context SHOULD NOT be empty */
                MUST_HAVE((ctx->adata != NULL), ret, err);
                ret = dom2(0, ctx->adata, ctx->adata_len, ctx->h, h_ctx); EG(ret, err);
        }
        if(key_type == EDDSA25519PH){
                ret = dom2(1, ctx->adata, ctx->adata_len, ctx->h, h_ctx); EG(ret, err);
        }
#endif
#if defined(WITH_SIG_EDDSA448)
        if(key_type == EDDSA448){
                ret = dom4(0, ctx->adata, ctx->adata_len, ctx->h, h_ctx); EG(ret, err);
        }
        if(key_type == EDDSA448PH){
                ret = dom4(1, ctx->adata, ctx->adata_len, ctx->h, h_ctx); EG(ret, err);
        }
#endif
        /* Import R and S values from signature buffer */
        /*******************************/
        /* Import R as an Edwards point */
        ret = curve_shortw_to_edwards(shortw_curve, &crv_edwards, alpha_montgomery,
                                gamma_montgomery, alpha_edwards); EG(ret, err);
        /* NOTE: non canonical R are checked and rejected here */
        ret = eddsa_decode_point(&R, &crv_edwards, alpha_edwards, &sig[0],
                              EDDSA_R_LEN(hsize), key_type); EG(ret, err);
        dbg_ec_edwards_point_print("R", &R);
        /* Transfer our public point R to Weierstrass */
        ret = aff_pt_edwards_to_prj_pt_shortw(&R, shortw_curve, _R, alpha_edwards); EG(ret, err);
        /* Update the hash with the encoded R */
        ret = ctx->h->hfunc_update(h_ctx, &sig[0], EDDSA_R_LEN(hsize)); EG(ret, err);

        /*******************************/
        /* Import S as an integer */
        ret = eddsa_decode_integer(S, &sig[EDDSA_R_LEN(hsize)], EDDSA_S_LEN(hsize)); EG(ret, err);
        /* Reject S if it is not reduced modulo q */
        ret = nn_cmp(S, q, &cmp); EG(ret, err);
        MUST_HAVE((cmp < 0), ret, err);
        dbg_nn_print("S", S);

        /*******************************/
        /* Encode the public key
         * NOTE: since we deal with a public key transfered to Weierstrass,
         * encoding checking has been handled elsewhere.
         */
        /* Reject the signature if the public key is one of small order points.
         * We multiply by the cofactor: since this is a public verification,
         * we use a basic double and add algorithm.
         */
        ret = _prj_pt_unprotected_mult(&_Tmp, gen_cofactor, pub_key_y); EG(ret, err);
        /* Reject the signature if we have point at infinity here as this means
         * that the public key is of small order.
         */
        ret = prj_pt_iszero(&_Tmp, &iszero); EG(ret, err);
        MUST_HAVE((!iszero), ret, err);

        /* Transfer the public key to Edwards */
        ret = prj_pt_shortw_to_aff_pt_edwards(pub_key_y, &crv_edwards, &A, alpha_edwards); EG(ret, err);
        dbg_ec_edwards_point_print("A", &A);
        MUST_HAVE((EDDSA_R_LEN(hsize) <= sizeof(buff)), ret, err);
        /* NOTE: we use the hash buffer as a temporary buffer */
        ret = eddsa_encode_point(&A, alpha_edwards, buff, EDDSA_R_LEN(hsize), key_type); EG(ret, err);

        /* Update the hash with the encoded public key */
        ret = ctx->h->hfunc_update(h_ctx, buff, EDDSA_R_LEN(hsize)); EG(ret, err);

        /* Context magic set */
        ctx->verify_data.eddsa.magic = EDDSA_VERIFY_MAGIC;

 err:
        PTR_NULLIFY(q);
        PTR_NULLIFY(_R);
        PTR_NULLIFY(S);
        PTR_NULLIFY(pub_key);
        PTR_NULLIFY(shortw_curve);
        PTR_NULLIFY(alpha_montgomery);
        PTR_NULLIFY(gamma_montgomery);
        PTR_NULLIFY(alpha_edwards);
        PTR_NULLIFY(gen_cofactor);
        PTR_NULLIFY(pub_key_y);

        ec_edwards_crv_uninit(&crv_edwards);
        aff_pt_edwards_uninit(&A);
        aff_pt_edwards_uninit(&R);
        prj_pt_uninit(&_Tmp);

        return ret;
}

int _eddsa_verify_update(struct ec_verify_context *ctx,
                         const u8 *chunk, u32 chunklen)
{
        int ret;
        ec_alg_type key_type = UNKNOWN_ALG;
        u8 use_message_pre_hash = 0;
        hash_context *h_ctx;
        hash_context *h_ctx_pre_hash;

        /*
         * First, verify context has been initialized and public
         * part too. This guarantees the context is an EDDSA
         * verification one and we do not update() or finalize()
         * before init().
         */
        ret = sig_verify_check_initialized(ctx); EG(ret, err);
        EDDSA_VERIFY_CHECK_INITIALIZED(&(ctx->verify_data.eddsa), ret, err);

        key_type = ctx->pub_key->key_type;
        h_ctx = &(ctx->verify_data.eddsa.h_ctx);
        h_ctx_pre_hash = &(ctx->verify_data.eddsa.h_ctx_pre_hash);

        /* Sanity check on hash types */
        MUST_HAVE(ctx->h->type == get_eddsa_hash_type(key_type), ret, err);

        /* Do we use the raw message or its PH(M) hashed version? */
#if defined(WITH_SIG_EDDSA25519)
        if(key_type == EDDSA25519PH){
                use_message_pre_hash = 1;
        }
#endif
#if defined(WITH_SIG_EDDSA448)
        if(key_type == EDDSA448PH){
                use_message_pre_hash = 1;
        }
#endif
        /* 2. Compute h = H(m) */
        /* Since we call a callback, sanity check our mapping */
        ret = hash_mapping_callbacks_sanity_check(ctx->h); EG(ret, err);
        if(use_message_pre_hash == 1){
                /* In PH mode, update the dedicated hash context */
                ret = ctx->h->hfunc_update(h_ctx_pre_hash,
                                     chunk, chunklen); EG(ret, err);
        }
        else{
                /* In normal mode, update the nominal hash context */
                ret = ctx->h->hfunc_update(h_ctx, chunk, chunklen); EG(ret, err);
        }

err:
        VAR_ZEROIFY(use_message_pre_hash);

        return ret;
}

int _eddsa_verify_finalize(struct ec_verify_context *ctx)
{
        prj_pt_src_t G, _R, A;
        prj_pt _Tmp1, _Tmp2;
        nn_src_t q, S;
        nn h;
        u16 hsize;
        u8 hash[MAX_DIGEST_SIZE];
        nn_src_t gen_cofactor;
        int ret, iszero, cmp;
        ec_alg_type key_type = UNKNOWN_ALG;
        u8 use_message_pre_hash = 0;
        u16 use_message_pre_hash_hsize = 0;
        hash_context *h_ctx;
        hash_context *h_ctx_pre_hash;

        _Tmp1.magic = _Tmp2.magic = h.magic = WORD(0);

        /*
         * First, verify context has been initialized and public
         * part too. This guarantees the context is an EDDSA
         * verification one and we do not finalize() before init().
         */
        ret = sig_verify_check_initialized(ctx); EG(ret, err);
        EDDSA_VERIFY_CHECK_INITIALIZED(&(ctx->verify_data.eddsa), ret, err);

        /* Zero init points */
        ret = local_memset(&_Tmp1, 0, sizeof(prj_pt)); EG(ret, err);
        ret = local_memset(&_Tmp2, 0, sizeof(prj_pt)); EG(ret, err);
        ret = local_memset(hash, 0, sizeof(hash)); EG(ret, err);

        /* Make things more readable */
        G = &(ctx->pub_key->params->ec_gen);
        A = &(ctx->pub_key->y);
        q = &(ctx->pub_key->params->ec_gen_order);
        hsize = ctx->h->digest_size;
        S = &(ctx->verify_data.eddsa.S);
        _R = &(ctx->verify_data.eddsa._R);
        gen_cofactor = &(ctx->pub_key->params->ec_gen_cofactor);
        key_type = ctx->pub_key->key_type;
        h_ctx = &(ctx->verify_data.eddsa.h_ctx);
        h_ctx_pre_hash = &(ctx->verify_data.eddsa.h_ctx_pre_hash);

        /* Sanity check on hash types */
        MUST_HAVE((ctx->h->type == get_eddsa_hash_type(key_type)), ret, err);

        /* Do we use the raw message or its PH(M) hashed version? */
#if defined(WITH_SIG_EDDSA25519)
        if(key_type == EDDSA25519PH){
                use_message_pre_hash = 1;
                use_message_pre_hash_hsize = hsize;
        }
#endif
#if defined(WITH_SIG_EDDSA448)
        if(key_type == EDDSA448PH){
                use_message_pre_hash = 1;
                /* NOTE: as per RFC8032, EDDSA448PH uses
                 * SHAKE256 with 64 bytes output.
                 */
                use_message_pre_hash_hsize = 64;
        }
#endif

        /* Reject S if it is not reduced modulo q */
        ret = nn_cmp(S, q, &cmp); EG(ret, err);
        MUST_HAVE((cmp < 0), ret, err);

        MUST_HAVE((hsize <= sizeof(hash)), ret, err);

        /* 2. Finish our computation of h = H(R || A || M) */
        /* Since we call a callback, sanity check our mapping */
        ret = hash_mapping_callbacks_sanity_check(ctx->h); EG(ret, err);
        /* Update the hash with the message or its hash for the PH versions */
        if(use_message_pre_hash == 1){
                ret = ctx->h->hfunc_finalize(h_ctx_pre_hash, hash); EG(ret, err);
                MUST_HAVE((use_message_pre_hash_hsize <= hsize), ret, err);
                ret = ctx->h->hfunc_update(h_ctx, hash, use_message_pre_hash_hsize); EG(ret, err);
        }
        ret = ctx->h->hfunc_finalize(h_ctx, hash); EG(ret, err);
        dbg_buf_print("hash = H(R || A || PH(M))", hash, hsize);

        /* 3. Import our hash as a NN and reduce it modulo q */
        ret = eddsa_decode_integer(&h, hash, hsize); EG(ret, err);
        ret = nn_mod(&h, &h, q); EG(ret, err);
        dbg_nn_print("h = ", &h);

#if defined(WITH_SIG_EDDSA448)
        if((key_type == EDDSA448) || (key_type == EDDSA448PH)){
                /* When dealing with EDDSA448, because of our 4-isogeny between Edwars448 and Ed448
                 * mapping base point to four times base point, we actually multiply our public key by 4 here
                 * to be inline with the other computations (the public key stored in Weierstrass )
                 */
                ret = nn_lshift(&h, &h, 2); EG(ret, err);
                ret = nn_mod(&h, &h, q); EG(ret, err);
        }
#endif
        /* 4. Compute (S * G) - R - (h * A)  */
        ret = prj_pt_mul(&_Tmp1, S, G); EG(ret, err);
        ret = prj_pt_neg(&_Tmp2, _R); EG(ret, err);
        ret = prj_pt_add(&_Tmp1, &_Tmp1, &_Tmp2); EG(ret, err);
        ret = prj_pt_mul(&_Tmp2, &h, A); EG(ret, err);
        ret = prj_pt_neg(&_Tmp2, &_Tmp2); EG(ret, err);
        ret = prj_pt_add(&_Tmp1, &_Tmp1, &_Tmp2); EG(ret, err);

        /* 5. We use cofactored multiplication, so multiply by the cofactor:
         *    since this is a public verification, we use a basic double and add
         *    algorithm.
         */
        ret = _prj_pt_unprotected_mult(&_Tmp2, gen_cofactor, &_Tmp1); EG(ret, err);

        /* Reject the signature if we do not have point at infinity here */
        ret = prj_pt_iszero(&_Tmp2, &iszero); EG(ret, err);
        ret = iszero ? 0 : -1;

err:
        /*
         * We can now clear data part of the context. This will clear
         * magic and avoid further reuse of the whole context.
         */
        if(ctx != NULL){
                IGNORE_RET_VAL(local_memset(&(ctx->verify_data.eddsa), 0, sizeof(eddsa_verify_data)));
        }

        /* Clean what remains on the stack */
        PTR_NULLIFY(G);
        PTR_NULLIFY(A);
        PTR_NULLIFY(q);
        PTR_NULLIFY(S);
        PTR_NULLIFY(_R);
        PTR_NULLIFY(gen_cofactor);
        VAR_ZEROIFY(hsize);
        VAR_ZEROIFY(use_message_pre_hash);
        VAR_ZEROIFY(use_message_pre_hash_hsize);

        nn_uninit(&h);
        prj_pt_uninit(&_Tmp1);
        prj_pt_uninit(&_Tmp2);

        return ret;
}

/* Batch verification function:
 * This function takes multiple signatures/messages/public keys, and
 * checks all the signatures.
 *
 * This returns 0 if *all* the signatures are correct, and -1 if at least
 * one signature is not correct.
 *
 * NOTE: the "no_memory" version is not optimized and straightforwardly
 * checks for the signature using naive sums. See below for an optimized
 * Bos-Coster version (but requiring additional memory to work).
 *
 */
ATTRIBUTE_WARN_UNUSED_RET static int _eddsa_verify_batch_no_memory(const u8 **s, const u8 *s_len, const ec_pub_key **pub_keys,
                                         const u8 **m, const u32 *m_len, u32 num, ec_alg_type sig_type,
                                         hash_alg_type hash_type, const u8 **adata, const u16 *adata_len)
{
        nn_src_t q = NULL;
        ec_edwards_crv crv_edwards;
        aff_pt_edwards R, A;
        prj_pt_src_t G = NULL;
        prj_pt _Tmp, _R_sum, _A_sum;
        nn S, S_sum, z, h;
        u8 hash[MAX_DIGEST_SIZE];
        int ret, iszero, cmp;
        u16 hsize;
        const ec_pub_key *pub_key, *pub_key0;
        ec_shortw_crv_src_t shortw_curve;
        fp_src_t alpha_montgomery;
        fp_src_t gamma_montgomery;
        fp_src_t alpha_edwards;
        nn_src_t gen_cofactor = NULL;
        prj_pt_src_t pub_key_y;
        hash_context h_ctx;
        hash_context h_ctx_pre_hash;
        u8 use_message_pre_hash = 0;
        u16 use_message_pre_hash_hsize = 0;
        const hash_mapping *hm;
        ec_alg_type key_type = UNKNOWN_ALG;
        u32 i;

        R.magic = S.magic = S_sum.magic = crv_edwards.magic = WORD(0);
        _Tmp.magic = _R_sum.magic = _A_sum.magic = WORD(0);
        z.magic = h.magic = WORD(0);

        /* First, some sanity checks */
        MUST_HAVE((s != NULL) && (pub_keys != NULL) && (m != NULL) && (adata != NULL), ret, err);
        /* We need at least one element in our batch data bags */
        MUST_HAVE((num > 0), ret, err);


        /* Zero init our local data */
        ret = local_memset(&crv_edwards, 0, sizeof(ec_edwards_crv)); EG(ret, err);
        ret = local_memset(hash, 0, sizeof(hash)); EG(ret, err);
        ret = local_memset(&A, 0, sizeof(aff_pt_edwards)); EG(ret, err);
        ret = local_memset(&R, 0, sizeof(aff_pt_edwards)); EG(ret, err);
        ret = local_memset(&_R_sum, 0, sizeof(prj_pt)); EG(ret, err);
        ret = local_memset(&_A_sum, 0, sizeof(prj_pt)); EG(ret, err);
        ret = local_memset(&_Tmp, 0, sizeof(prj_pt)); EG(ret, err);

        pub_key0 = pub_keys[0];
        MUST_HAVE((pub_key0 != NULL), ret, err);

        /* Get our hash mapping */
        ret = get_hash_by_type(hash_type, &hm); EG(ret, err);
        hsize = hm->digest_size;
        MUST_HAVE((hm != NULL), ret, err);

        /* Do we use the raw message or its PH(M) hashed version? */
#if defined(WITH_SIG_EDDSA25519)
        if(sig_type == EDDSA25519PH){
                use_message_pre_hash = 1;
                use_message_pre_hash_hsize = hsize;
        }
#endif
#if defined(WITH_SIG_EDDSA448)
        if(sig_type == EDDSA448PH){
                use_message_pre_hash = 1;
                /* NOTE: as per RFC8032, EDDSA448PH uses
                 * SHAKE256 with 64 bytes output.
                 */
                use_message_pre_hash_hsize = 64;
        }
#endif

        for(i = 0; i < num; i++){
                u8 siglen;
                const u8 *sig = NULL;

                ret = eddsa_pub_key_sanity_check(pub_keys[i]); EG(ret, err);

                /* Make things more readable */
                pub_key = pub_keys[i];

                /* Sanity check that all our public keys have the same parameters */
                MUST_HAVE((pub_key->params) == (pub_key0->params), ret, err);

                q = &(pub_key->params->ec_gen_order);
                shortw_curve = &(pub_key->params->ec_curve);
                alpha_montgomery = &(pub_key->params->ec_alpha_montgomery);
                gamma_montgomery = &(pub_key->params->ec_gamma_montgomery);
                alpha_edwards = &(pub_key->params->ec_alpha_edwards);
                gen_cofactor = &(pub_key->params->ec_gen_cofactor);
                pub_key_y = &(pub_key->y);
                key_type = pub_key->key_type;
                G = &(pub_key->params->ec_gen);

                /* Check the key type versus the algorithm */
                MUST_HAVE((key_type == sig_type), ret, err);

                if(i == 0){
                        /* Initialize our sums to zero/point at infinity */
                        ret = nn_init(&S_sum, 0); EG(ret, err);
                        ret = prj_pt_init(&_R_sum, shortw_curve); EG(ret, err);
                        ret = prj_pt_zero(&_R_sum); EG(ret, err);
                        ret = prj_pt_init(&_A_sum, shortw_curve); EG(ret, err);
                        ret = prj_pt_zero(&_A_sum); EG(ret, err);
                        ret = nn_init(&z, 0); EG(ret, err);
                        ret = nn_init(&h, 0); EG(ret, err);
                }

gen_z_again:
                /* Get a random z for randomizing the linear combination */
                ret = nn_get_random_len(&z, (hsize / 4)); EG(ret, err);
                ret = nn_iszero(&z, &iszero); EG(ret, err);
                if(iszero){
                        goto gen_z_again;
                }

                /* Sanity check on hash types */
                MUST_HAVE((hash_type == get_eddsa_hash_type(key_type)), ret, err);

                /* Check given signature length is the expected one */
                siglen = s_len[i];
                sig = s[i];
                MUST_HAVE((siglen == EDDSA_SIGLEN(hsize)), ret, err);
                MUST_HAVE((siglen == (EDDSA_R_LEN(hsize) + EDDSA_S_LEN(hsize))), ret, err);

                /* Initialize the hash context */
                /* Since we call a callback, sanity check our mapping */
                ret = hash_mapping_callbacks_sanity_check(hm); EG(ret, err);
                ret = hm->hfunc_init(&h_ctx); EG(ret, err);
                ret = hm->hfunc_init(&h_ctx_pre_hash); EG(ret, err);
#if defined(WITH_SIG_EDDSA25519)
                if(key_type == EDDSA25519CTX){
                        /* As per RFC8032, for EDDSA25519CTX the context SHOULD NOT be empty */
                        MUST_HAVE((adata[i] != NULL), ret, err);
                        ret = dom2(0, adata[i], adata_len[i], hm, &h_ctx); EG(ret, err);
                }
                if(key_type == EDDSA25519PH){
                        ret = dom2(1, adata[i], adata_len[i], hm, &h_ctx); EG(ret, err);
                }
#endif
#if defined(WITH_SIG_EDDSA448)
                if(key_type == EDDSA448){
                        ret = dom4(0, adata[i], adata_len[i], hm, &h_ctx); EG(ret, err);
                }
                if(key_type == EDDSA448PH){
                        ret = dom4(1, adata[i], adata_len[i], hm, &h_ctx); EG(ret, err);
                }
#endif
                /* Import R and S values from signature buffer */
                /*******************************/
                /* Import R as an Edwards point */
                ret = curve_shortw_to_edwards(shortw_curve, &crv_edwards, alpha_montgomery,
                                        gamma_montgomery, alpha_edwards); EG(ret, err);
                /* NOTE: non canonical R are checked and rejected here */
                ret = eddsa_decode_point(&R, &crv_edwards, alpha_edwards, &sig[0],
                                      EDDSA_R_LEN(hsize), key_type); EG(ret, err);
                dbg_ec_edwards_point_print("R", &R);
                /* Transfer our public point R to Weierstrass */
                ret = aff_pt_edwards_to_prj_pt_shortw(&R, shortw_curve, &_Tmp, alpha_edwards); EG(ret, err);
                /* Update the hash with the encoded R */
                ret = hm->hfunc_update(&h_ctx, &sig[0], EDDSA_R_LEN(hsize)); EG(ret, err);
                /* Multiply by z.
                 */
                ret = _prj_pt_unprotected_mult(&_Tmp, &z, &_Tmp); EG(ret, err);
                /* Add to the sum */
                ret = prj_pt_add(&_R_sum, &_R_sum, &_Tmp); EG(ret, err);

                /*******************************/
                /* Import S as an integer */
                ret = eddsa_decode_integer(&S, &sig[EDDSA_R_LEN(hsize)], EDDSA_S_LEN(hsize)); EG(ret, err);
                /* Reject S if it is not reduced modulo q */
                ret = nn_cmp(&S, q, &cmp); EG(ret, err);
                MUST_HAVE((cmp < 0), ret, err);
                dbg_nn_print("S", &S);

                /* Add z S to the sum */
                ret = nn_mul(&S, &S, &z); EG(ret, err);
                ret = nn_mod(&S, &S, q); EG(ret, err);
                ret = nn_mod_add(&S_sum, &S_sum, &S, q); EG(ret, err);

                /*******************************/
                /* Encode the public key
                 * NOTE: since we deal with a public key transfered to Weierstrass,
                 * encoding checking has been handled elsewhere.
                 */
                /* Reject the signature if the public key is one of small order points.
                 * We multiply by the cofactor: since this is a public verification,
                 * we use a basic double and add algorithm.
                 */
                ret = _prj_pt_unprotected_mult(&_Tmp, gen_cofactor, pub_key_y); EG(ret, err);
                /* Reject the signature if we have point at infinity here as this means
                 * that the public key is of small order.
                 */
                ret = prj_pt_iszero(&_Tmp, &iszero); EG(ret, err);
                MUST_HAVE((!iszero), ret, err);

                /* Transfer the public key to Edwards */
                ret = prj_pt_shortw_to_aff_pt_edwards(pub_key_y, &crv_edwards, &A, alpha_edwards); EG(ret, err);
                dbg_ec_edwards_point_print("A", &A);
                MUST_HAVE((EDDSA_R_LEN(hsize) <= sizeof(hash)), ret, err);
                /* NOTE: we use the hash buffer as a temporary buffer */
                ret = eddsa_encode_point(&A, alpha_edwards, hash, EDDSA_R_LEN(hsize), key_type); EG(ret, err);

                /* Update the hash with the encoded public key */
                ret = hm->hfunc_update(&h_ctx, hash, EDDSA_R_LEN(hsize)); EG(ret, err);
                /* Finish our computation of h = H(R || A || M) */
                /* Update the hash with the message or its hash for the PH versions */
                if(use_message_pre_hash == 1){
                        ret = hm->hfunc_update(&h_ctx_pre_hash, m[i], m_len[i]); EG(ret, err);
                        ret = hm->hfunc_finalize(&h_ctx_pre_hash, hash); EG(ret, err);
                        MUST_HAVE((use_message_pre_hash_hsize <= hsize), ret, err);
                        ret = hm->hfunc_update(&h_ctx, hash, use_message_pre_hash_hsize); EG(ret, err);
                }
                else{
                        ret = hm->hfunc_update(&h_ctx, m[i], m_len[i]); EG(ret, err);
                }
                ret = hm->hfunc_finalize(&h_ctx, hash); EG(ret, err);
                dbg_buf_print("hash = H(R || A || PH(M))", hash, hsize);

                /* Import our hash as a NN and reduce it modulo q */
                ret = eddsa_decode_integer(&h, hash, hsize); EG(ret, err);
                ret = nn_mod(&h, &h, q); EG(ret, err);
                dbg_nn_print("h = ", &h);
#if defined(WITH_SIG_EDDSA448)
                if((key_type == EDDSA448) || (key_type == EDDSA448PH)){
                        /* When dealing with EDDSA448, because of our 4-isogeny between Edwars448 and Ed448
                         * mapping base point to four times base point, we actually multiply our public key by 4 here
                         * to be inline with the other computations (the public key stored in Weierstrass )
                         */
                        ret = nn_lshift(&h, &h, 2); EG(ret, err);
                        ret = nn_mod(&h, &h, q); EG(ret, err);
                }
#endif

                /* Multiply by (z * h) mod q.
                 * NOTE: we use unprotected scalar multiplication since this is a
                 * public operation.
                 */
                ret = nn_mul(&z, &z, &h); EG(ret, err);
                ret = nn_mod(&z, &z, q); EG(ret, err);
                ret = _prj_pt_unprotected_mult(&_Tmp, &z, &_Tmp); EG(ret, err);
                /* Add to the sum */
                ret = prj_pt_add(&_A_sum, &_A_sum, &_Tmp); EG(ret, err);
        }

        /* Sanity check */
        MUST_HAVE((gen_cofactor != NULL) && (q != NULL) && (G != NULL), ret, err);

        /* Multiply the S sum by the cofactor */
        ret = nn_mul(&S_sum, &S_sum, gen_cofactor); EG(ret, err);
        ret = nn_mod(&S_sum, &S_sum, q); EG(ret, err);
        /* Negate it. NOTE: -x mod q is (q - x) mod q, i.e. (q - x) when x is reduced */
        ret = nn_mod_neg(&S_sum, &S_sum, q); EG(ret, err);
        /* Multiply this by the generator */
        ret = _prj_pt_unprotected_mult(&_Tmp, &S_sum, G); EG(ret, err);

        /* Multiply the R sum by the cofactor */
        ret = _prj_pt_unprotected_mult(&_R_sum, gen_cofactor, &_R_sum); EG(ret, err);

        /* Now add the three sums */
        ret = prj_pt_add(&_Tmp, &_Tmp, &_A_sum);
        ret = prj_pt_add(&_Tmp, &_Tmp, &_R_sum);

        /* Reject the signature if we do not have point at infinity here */
        ret = prj_pt_iszero(&_Tmp, &iszero); EG(ret, err);
        ret = iszero ? 0 : -1;

err:
        PTR_NULLIFY(q);
        PTR_NULLIFY(pub_key);
        PTR_NULLIFY(pub_key0);
        PTR_NULLIFY(shortw_curve);
        PTR_NULLIFY(alpha_montgomery);
        PTR_NULLIFY(gamma_montgomery);
        PTR_NULLIFY(alpha_edwards);
        PTR_NULLIFY(gen_cofactor);
        PTR_NULLIFY(pub_key_y);
        PTR_NULLIFY(G);

        ec_edwards_crv_uninit(&crv_edwards);
        aff_pt_edwards_uninit(&A);
        aff_pt_edwards_uninit(&R);
        prj_pt_uninit(&_R_sum);
        prj_pt_uninit(&_A_sum);
        prj_pt_uninit(&_Tmp);
        nn_uninit(&S);
        nn_uninit(&S_sum);
        nn_uninit(&z);
        nn_uninit(&h);

        return ret;

}

/*
 * The following batch verification uses the Bos-Coster algorithm, presented e.g. in
 * https://ed25519.cr.yp.to/ed25519-20110705.pdf
 *
 * The Bos-Coster algorithm allows to optimize a sum of scalar multiplications using
 * addition chains.
 *
 */
ATTRIBUTE_WARN_UNUSED_RET static int _eddsa_verify_batch(const u8 **s, const u8 *s_len, const ec_pub_key **pub_keys,
                               const u8 **m, const u32 *m_len, u32 num, ec_alg_type sig_type,
                               hash_alg_type hash_type, const u8 **adata, const u16 *adata_len,
                               verify_batch_scratch_pad *scratch_pad_area, u32 *scratch_pad_area_len)
{
        nn_src_t q = NULL;
        ec_edwards_crv crv_edwards;
        aff_pt_edwards R, A;
        prj_pt_src_t G = NULL;
        nn S, z;
        u8 hash[MAX_DIGEST_SIZE];
        int ret, iszero, cmp;
        u16 hsize;
        const ec_pub_key *pub_key, *pub_key0;
        ec_shortw_crv_src_t shortw_curve;
        fp_src_t alpha_montgomery;
        fp_src_t gamma_montgomery;
        fp_src_t alpha_edwards;
        nn_src_t gen_cofactor = NULL;
        prj_pt_src_t pub_key_y;
        hash_context h_ctx;
        hash_context h_ctx_pre_hash;
        u8 use_message_pre_hash = 0;
        u16 use_message_pre_hash_hsize = 0;
        const hash_mapping *hm;
        ec_alg_type key_type = UNKNOWN_ALG;
        /* NN numbers and points pointers */
        verify_batch_scratch_pad *elements = scratch_pad_area;
        u32 i;
        u64 expected_len;
        bitcnt_t q_bit_len = 0;

        S.magic = z.magic = crv_edwards.magic = WORD(0);

        /* First, some sanity checks */
        MUST_HAVE((s != NULL) && (pub_keys != NULL) && (m != NULL) && (adata != NULL), ret, err);
        MUST_HAVE((scratch_pad_area_len != NULL), ret, err);
        MUST_HAVE(((2 * num) >= num), ret, err);
        MUST_HAVE(((2 * num) + 1) >= num, ret, err);

        /* In oder to apply the algorithm, we must have at least two
         * elements to verify. If this is not the case, we fallback to
         * the regular "no memory" version.
         */
        if(num <= 1){
                if(scratch_pad_area == NULL){
                        /* We do not require any memory in this case */
                        (*scratch_pad_area_len) = 0;
                        ret = 0;
                        goto err;
                }
                else{
                        ret = _eddsa_verify_batch_no_memory(s, s_len, pub_keys, m, m_len, num, sig_type,
                                                            hash_type, adata, adata_len);
                        goto err;
                }
        }

        expected_len = ((2 * num) + 1) * sizeof(verify_batch_scratch_pad);
        MUST_HAVE((expected_len < 0xffffffff), ret, err);

        if(scratch_pad_area == NULL){
                /* Return the needed size: we need to keep track of (2 * num) + 1 NN numbers
                 * and (2 * num) + 1 projective points, plus (2 * num) + 1 indices
                 */
                (*scratch_pad_area_len) = (u32)expected_len;
                ret = 0;
                goto err;
        }
        else{
                MUST_HAVE((*scratch_pad_area_len) >= expected_len, ret, err);
        }

        /********************************************/
        /****** Initialize elements *****************/
        /* Zero init our local data */
        ret = local_memset(&crv_edwards, 0, sizeof(ec_edwards_crv)); EG(ret, err);
        ret = local_memset(hash, 0, sizeof(hash)); EG(ret, err);
        ret = local_memset(&A, 0, sizeof(aff_pt_edwards)); EG(ret, err);
        ret = local_memset(&R, 0, sizeof(aff_pt_edwards)); EG(ret, err);

        pub_key0 = pub_keys[0];
        MUST_HAVE((pub_key0 != NULL), ret, err);

        /* Get our hash mapping */
        ret = get_hash_by_type(hash_type, &hm); EG(ret, err);
        hsize = hm->digest_size;
        MUST_HAVE((hm != NULL), ret, err);

        /* Do we use the raw message or its PH(M) hashed version? */
#if defined(WITH_SIG_EDDSA25519)
        if(sig_type == EDDSA25519PH){
                use_message_pre_hash = 1;
                use_message_pre_hash_hsize = hsize;
        }
#endif
#if defined(WITH_SIG_EDDSA448)
        if(sig_type == EDDSA448PH){
                use_message_pre_hash = 1;
                /* NOTE: as per RFC8032, EDDSA448PH uses
                 * SHAKE256 with 64 bytes output.
                 */
                use_message_pre_hash_hsize = 64;
        }
#endif

        /* Compute our original numbers and points */
        MUST_HAVE((num >= 1), ret, err);
        for(i = 0; i < num; i++){
                u8 siglen;
                const u8 *sig = NULL;

                ret = eddsa_pub_key_sanity_check(pub_keys[i]); EG(ret, err);

                /* Make things more readable */
                pub_key = pub_keys[i];

                /* Sanity check that all our public keys have the same parameters */
                MUST_HAVE((pub_key->params) == (pub_key0->params), ret, err);

                q = &(pub_key->params->ec_gen_order);
                shortw_curve = &(pub_key->params->ec_curve);
                alpha_montgomery = &(pub_key->params->ec_alpha_montgomery);
                gamma_montgomery = &(pub_key->params->ec_gamma_montgomery);
                alpha_edwards = &(pub_key->params->ec_alpha_edwards);
                gen_cofactor = &(pub_key->params->ec_gen_cofactor);
                pub_key_y = &(pub_key->y);
                key_type = pub_key->key_type;
                G = &(pub_key->params->ec_gen);
                q_bit_len = pub_key->params->ec_gen_order_bitlen;

                /* Check the key type versus the algorithm */
                MUST_HAVE((key_type == sig_type), ret, err);

                if(i == 0){
                        /* Initialize our numbers */
                        ret = nn_init(&z, 0); EG(ret, err);
                        ret = nn_init(&S, 0); EG(ret, err);
                        ret = nn_init(&elements[(2 * num)].number, 0); EG(ret, err);
                        ret = _prj_pt_unprotected_mult(&elements[(2 * num)].point, gen_cofactor, G); EG(ret, err);
                }

gen_z_again:
                /* Get a random z for randomizing the linear combination */
                ret = nn_get_random_len(&z, (hsize / 4)); EG(ret, err);
                ret = nn_iszero(&z, &iszero); EG(ret, err);
                if(iszero){
                        goto gen_z_again;
                }

                /* Sanity check on hash types */
                MUST_HAVE((hash_type == get_eddsa_hash_type(key_type)), ret, err);

                /* Check given signature length is the expected one */
                siglen = s_len[i];
                sig = s[i];
                MUST_HAVE((siglen == EDDSA_SIGLEN(hsize)), ret, err);
                MUST_HAVE((siglen == (EDDSA_R_LEN(hsize) + EDDSA_S_LEN(hsize))), ret, err);

                /* Initialize the hash context */
                /* Since we call a callback, sanity check our mapping */
                ret = hash_mapping_callbacks_sanity_check(hm); EG(ret, err);
                ret = hm->hfunc_init(&h_ctx); EG(ret, err);
                ret = hm->hfunc_init(&h_ctx_pre_hash); EG(ret, err);
#if defined(WITH_SIG_EDDSA25519)
                if(key_type == EDDSA25519CTX){
                        /* As per RFC8032, for EDDSA25519CTX the context SHOULD NOT be empty */
                        MUST_HAVE((adata[i] != NULL), ret, err);
                        ret = dom2(0, adata[i], adata_len[i], hm, &h_ctx); EG(ret, err);
                }
                if(key_type == EDDSA25519PH){
                        ret = dom2(1, adata[i], adata_len[i], hm, &h_ctx); EG(ret, err);
                }
#endif
#if defined(WITH_SIG_EDDSA448)
                if(key_type == EDDSA448){
                        ret = dom4(0, adata[i], adata_len[i], hm, &h_ctx); EG(ret, err);
                }
                if(key_type == EDDSA448PH){
                        ret = dom4(1, adata[i], adata_len[i], hm, &h_ctx); EG(ret, err);
                }
#endif
                /* Import R and S values from signature buffer */
                /*******************************/
                /* Import R as an Edwards point */
                ret = curve_shortw_to_edwards(shortw_curve, &crv_edwards, alpha_montgomery,
                                        gamma_montgomery, alpha_edwards); EG(ret, err);
                /* NOTE: non canonical R are checked and rejected here */
                ret = eddsa_decode_point(&R, &crv_edwards, alpha_edwards, &sig[0],
                                      EDDSA_R_LEN(hsize), key_type); EG(ret, err);
                dbg_ec_edwards_point_print("R", &R);
                /* Transfer our public point R to Weierstrass */
                ret = aff_pt_edwards_to_prj_pt_shortw(&R, shortw_curve, &elements[i].point, alpha_edwards); EG(ret, err);
                /* Update the hash with the encoded R */
                ret = hm->hfunc_update(&h_ctx, &sig[0], EDDSA_R_LEN(hsize)); EG(ret, err);
                /* Store 8 * z in our number to be multiplied with R */
                ret = nn_init(&elements[i].number, 0); EG(ret, err);
                ret = nn_mul(&elements[i].number, gen_cofactor, &z); EG(ret, err);
                ret = nn_mod(&elements[i].number, &elements[i].number, q); EG(ret, err);

                /*******************************/
                /* Import S as an integer */
                ret = eddsa_decode_integer(&S, &sig[EDDSA_R_LEN(hsize)], EDDSA_S_LEN(hsize)); EG(ret, err);
                /* Reject S if it is not reduced modulo q */
                ret = nn_cmp(&S, q, &cmp); EG(ret, err);
                MUST_HAVE((cmp < 0), ret, err);
                dbg_nn_print("S", &S);

                /* Add (- z S) to the sum */
                ret = nn_mul(&S, &S, &z); EG(ret, err);
                ret = nn_mod(&S, &S, q); EG(ret, err);
                ret = nn_mod_neg(&S, &S, q); EG(ret, err); /* Negate S */
                ret = nn_mod_add(&elements[(2 * num)].number, &elements[(2 * num)].number, &S, q); EG(ret, err);

                /*******************************/
                /* Encode the public key
                 * NOTE: since we deal with a public key transfered to Weierstrass,
                 * encoding checking has been handled elsewhere.
                 */
                /* Reject the signature if the public key is one of small order points.
                 * We multiply by the cofactor: since this is a public verification,
                 * we use a basic double and add algorithm.
                 */
                ret = _prj_pt_unprotected_mult(&elements[num + i].point, gen_cofactor, pub_key_y); EG(ret, err);
                /* Reject the signature if we have point at infinity here as this means
                 * that the public key is of small order.
                 */
                ret = prj_pt_iszero(&elements[num + i].point, &iszero); EG(ret, err);
                MUST_HAVE((!iszero), ret, err);

                /* Transfer the public key to Edwards */
                ret = prj_pt_shortw_to_aff_pt_edwards(pub_key_y, &crv_edwards, &A, alpha_edwards); EG(ret, err);
                dbg_ec_edwards_point_print("A", &A);
                MUST_HAVE((EDDSA_R_LEN(hsize) <= sizeof(hash)), ret, err);
                /* NOTE: we use the hash buffer as a temporary buffer */
                ret = eddsa_encode_point(&A, alpha_edwards, hash, EDDSA_R_LEN(hsize), key_type); EG(ret, err);

                /* Update the hash with the encoded public key */
                ret = hm->hfunc_update(&h_ctx, hash, EDDSA_R_LEN(hsize)); EG(ret, err);
                /* Finish our computation of h = H(R || A || M) */
                /* Update the hash with the message or its hash for the PH versions */
                if(use_message_pre_hash == 1){
                        ret = hm->hfunc_update(&h_ctx_pre_hash, m[i], m_len[i]); EG(ret, err);
                        ret = hm->hfunc_finalize(&h_ctx_pre_hash, hash); EG(ret, err);
                        MUST_HAVE((use_message_pre_hash_hsize <= hsize), ret, err);
                        ret = hm->hfunc_update(&h_ctx, hash, use_message_pre_hash_hsize); EG(ret, err);
                }
                else{
                        ret = hm->hfunc_update(&h_ctx, m[i], m_len[i]); EG(ret, err);
                }
                ret = hm->hfunc_finalize(&h_ctx, hash); EG(ret, err);
                dbg_buf_print("hash = H(R || A || PH(M))", hash, hsize);

                /* Import our hash as a NN and reduce it modulo q */
                ret = eddsa_decode_integer(&elements[num + i].number, hash, hsize); EG(ret, err);
                ret = nn_mod(&elements[num + i].number, &elements[num + i].number, q); EG(ret, err);
                dbg_nn_print("h = ", &elements[num + i].number);
#if defined(WITH_SIG_EDDSA448)
                if((key_type == EDDSA448) || (key_type == EDDSA448PH)){
                        /* When dealing with EDDSA448, because of our 4-isogeny between Edwars448 and Ed448
                         * mapping base point to four times base point, we actually multiply our public key by 4 here
                         * to be inline with the other computations (the public key stored in Weierstrass )
                         */
                        ret = nn_lshift(&elements[num + i].number, &elements[num + i].number, 2); EG(ret, err);
                        ret = nn_mod(&elements[num + i].number, &elements[num + i].number, q); EG(ret, err);
                }
#endif
                /* Compute by (z * h) mod q.
                 */
                ret = nn_mul(&elements[num + i].number, &elements[num + i].number, &z); EG(ret, err);
                ret = nn_mod(&elements[num + i].number, &elements[num + i].number, q); EG(ret, err);
        }

        /* Sanity check */
        MUST_HAVE((gen_cofactor != NULL) && (q != NULL) && (G != NULL) && (q_bit_len != 0), ret, err);

        /********************************************/
        /****** Bos-Coster algorithm ****************/
        ret = ec_verify_bos_coster(elements, (2 * num) + 1, q_bit_len);
        if(ret){
                if(ret == -2){
                        /* In case of Bos-Coster time out, we fall back to the
                         * slower regular batch verification.
                         */
                        ret = _eddsa_verify_batch_no_memory(s, s_len, pub_keys, m, m_len, num, sig_type,
                                                            hash_type, adata, adata_len); EG(ret, err);
                }
                goto err;
        }

        /* The first element should contain the sum: it should
         * be equal to zero. Reject the signature if this is not
         * the case.
         */
        ret = prj_pt_iszero(&elements[elements[0].index].point, &iszero); EG(ret, err);
        ret = iszero ? 0 : -1;

err:
        PTR_NULLIFY(q);
        PTR_NULLIFY(pub_key);
        PTR_NULLIFY(pub_key0);
        PTR_NULLIFY(shortw_curve);
        PTR_NULLIFY(alpha_montgomery);
        PTR_NULLIFY(gamma_montgomery);
        PTR_NULLIFY(alpha_edwards);
        PTR_NULLIFY(gen_cofactor);
        PTR_NULLIFY(pub_key_y);
        PTR_NULLIFY(G);
        PTR_NULLIFY(elements);

        /* Unitialize all our scratch_pad_area */
        if((scratch_pad_area != NULL) && (scratch_pad_area_len != NULL)){
                IGNORE_RET_VAL(local_memset((u8*)scratch_pad_area, 0, (*scratch_pad_area_len)));
        }

        ec_edwards_crv_uninit(&crv_edwards);
        aff_pt_edwards_uninit(&A);
        aff_pt_edwards_uninit(&R);
        nn_uninit(&S);
        nn_uninit(&z);

        return ret;
}

int eddsa_verify_batch(const u8 **s, const u8 *s_len, const ec_pub_key **pub_keys,
                       const u8 **m, const u32 *m_len, u32 num, ec_alg_type sig_type,
                       hash_alg_type hash_type, const u8 **adata, const u16 *adata_len,
                       verify_batch_scratch_pad *scratch_pad_area, u32 *scratch_pad_area_len)
{
        int ret;

        if(scratch_pad_area != NULL){
                MUST_HAVE((scratch_pad_area_len != NULL), ret, err);
                ret = _eddsa_verify_batch(s, s_len, pub_keys, m, m_len, num, sig_type,
                                          hash_type, adata, adata_len,
                                          scratch_pad_area, scratch_pad_area_len); EG(ret, err);
        }
        else{
                ret = _eddsa_verify_batch_no_memory(s, s_len, pub_keys, m, m_len, num, sig_type,
                                                    hash_type, adata, adata_len); EG(ret, err);
        }

err:
        return ret;
}

#else /* !(defined(WITH_SIG_EDDSA25519) || defined(WITH_SIG_EDDSA448)) */

/*
 * Dummy definition to avoid the empty translation unit ISO C warning
 */
typedef int dummy;
#endif /* defined(WITH_SIG_EDDSA25519) || defined(WITH_SIG_EDDSA448) */