1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
|
/* LibTomCrypt, modular cryptographic library -- Tom St Denis
*
* LibTomCrypt is a library that provides various cryptographic
* algorithms in a highly modular and flexible manner.
*
* The library is free for all purposes without any express
* guarantee it works.
*
*/
/* Implements ECC over Z/pZ for curve y^2 = x^3 + a*x + b
*
*/
#include "tomcrypt.h"
#include <errno.h>
#ifdef LTC_MECC
int ecc_dp_set(ltc_ecc_set_type *dp, char *ch_prime, char *ch_A, char *ch_B, char *ch_order, char *ch_Gx, char *ch_Gy, unsigned long cofactor, char *ch_name, char *oid)
{
unsigned long l_name, l_prime, l_A, l_B, l_order, l_Gx, l_Gy;
if (!dp || !ch_prime || !ch_A || !ch_B || !ch_order || !ch_Gx || !ch_Gy || cofactor==0) return CRYPT_INVALID_ARG;
l_prime = (unsigned long)strlen(ch_prime);
l_A = (unsigned long)strlen(ch_A);
l_B = (unsigned long)strlen(ch_B);
l_order = (unsigned long)strlen(ch_order);
l_Gx = (unsigned long)strlen(ch_Gx);
l_Gy = (unsigned long)strlen(ch_Gy);
dp->cofactor = cofactor;
{ /* calculate size */
void *p_num;
mp_init(&p_num);
mp_read_radix(p_num, ch_prime, 16);
dp->size = mp_unsigned_bin_size(p_num);
mp_clear(p_num);
}
if (dp->name != NULL) { XFREE(dp->name ); dp->name = NULL; }
if (dp->prime != NULL) { XFREE(dp->prime); dp->prime = NULL; }
if (dp->A != NULL) { XFREE(dp->A ); dp->A = NULL; }
if (dp->B != NULL) { XFREE(dp->B ); dp->B = NULL; }
if (dp->order != NULL) { XFREE(dp->order); dp->order = NULL; }
if (dp->Gx != NULL) { XFREE(dp->Gx ); dp->Gx = NULL; }
if (dp->Gy != NULL) { XFREE(dp->Gy ); dp->Gy = NULL; }
dp->prime = XMALLOC(1+l_prime); strncpy(dp->prime, ch_prime, 1+l_prime);
dp->A = XMALLOC(1+l_A); strncpy(dp->A, ch_A, 1+l_A);
dp->B = XMALLOC(1+l_B); strncpy(dp->B, ch_B, 1+l_B);
dp->order = XMALLOC(1+l_order); strncpy(dp->order, ch_order, 1+l_order);
dp->Gx = XMALLOC(1+l_Gx); strncpy(dp->Gx, ch_Gx, 1+l_Gx);
dp->Gy = XMALLOC(1+l_Gy); strncpy(dp->Gy, ch_Gy, 1+l_Gy);
/* optional parameters */
if (ch_name == NULL && oid == NULL) {
(void)ecc_dp_fill_from_sets(dp);
}
else {
if (ch_name != NULL) {
l_name = (unsigned long)strlen(ch_name);
dp->name = XMALLOC(1+l_name);
strncpy(dp->name, ch_name, 1+l_name);
}
if (oid != NULL) {
char *end_ptr;
unsigned int i = 0;
unsigned long val;
end_ptr = oid;
while (i < sizeof(dp->oid.OID)/sizeof(dp->oid.OID[0]) && *oid != '\0') {
errno = 0;
val = strtoul(oid, &end_ptr, 10);
if (errno != 0 || oid == end_ptr) break; /* parsing failed */
if (val > 0xFFFFFFFF) break; /* x64 check */
dp->oid.OID[i++] = val;
oid = end_ptr;
if (*oid != '.') break;
oid++;
}
if (i == 0 || *end_ptr != '\0') return CRYPT_INVALID_ARG;
dp->oid.OIDlen = i;
}
}
/* in case the parameters are really custom (unlikely) */
if (dp->name == NULL) {
dp->name = XMALLOC(7);
strcpy(dp->name, "custom");
dp->oid.OIDlen = 0;
}
return CRYPT_OK;
}
#endif
|