📄 ecc.c
字号:
if ((err = add_point(R, tG, R, modulus, &mu)) != CRYPT_OK) { goto done; } } } } } err = CRYPT_OK; goto done;error: err = mpi_to_ltc_error(err);done: del_point(tG); for (i = 0; i < 8; i++) { del_point(M[i]); } mp_clear(&mu); return err;}#undef WINSIZE/** Perform on the ECC system @return CRYPT_OK if successful*/int ecc_test(void){ mp_int modulus, order; ecc_point *G, *GG; int i, err, primality; if ((err = mp_init_multi(&modulus, &order, NULL)) != MP_OKAY) { return mpi_to_ltc_error(err); } G = new_point(); GG = new_point(); if (G == NULL || GG == NULL) { mp_clear_multi(&modulus, &order, NULL); del_point(G); del_point(GG); return CRYPT_MEM; } for (i = 0; sets[i].size; i++) { #if 0 printf("Testing %d\n", sets[i].size); #endif if ((err = mp_read_radix(&modulus, (char *)sets[i].prime, 64)) != MP_OKAY) { goto error; } if ((err = mp_read_radix(&order, (char *)sets[i].order, 64)) != MP_OKAY) { goto error; } /* is prime actually prime? */ if ((err = is_prime(&modulus, &primality)) != CRYPT_OK) { goto done; } if (primality == 0) { err = CRYPT_FAIL_TESTVECTOR; goto done; } /* is order prime ? */ if ((err = is_prime(&order, &primality)) != CRYPT_OK) { goto done; } if (primality == 0) { err = CRYPT_FAIL_TESTVECTOR; goto done; } if ((err = mp_read_radix(&G->x, (char *)sets[i].Gx, 64)) != MP_OKAY) { goto error; } if ((err = mp_read_radix(&G->y, (char *)sets[i].Gy, 64)) != MP_OKAY) { goto error; } /* then we should have G == (order + 1)G */ if ((err = mp_add_d(&order, 1, &order)) != MP_OKAY) { goto error; } if ((err = ecc_mulmod(&order, G, GG, &modulus)) != CRYPT_OK) { goto done; } if (mp_cmp(&G->x, &GG->x) != 0 || mp_cmp(&G->y, &GG->y) != 0) { err = CRYPT_FAIL_TESTVECTOR; goto done; } } err = CRYPT_OK; goto done;error: err = mpi_to_ltc_error(err);done: del_point(GG); del_point(G); mp_clear_multi(&order, &modulus, NULL); return err;}void ecc_sizes(int *low, int *high){ int i; LTC_ARGCHK(low != NULL); LTC_ARGCHK(high != NULL); *low = INT_MAX; *high = 0; for (i = 0; sets[i].size != 0; i++) { if (sets[i].size < *low) { *low = sets[i].size; } if (sets[i].size > *high) { *high = sets[i].size; } }}/** Make a new ECC key @param prng An active PRNG state @param wprng The index of the PRNG you wish to use @param keysize The keysize for the new key (in octets from 20 to 65 bytes) @param key [out] Destination of the newly created key @return CRYPT_OK if successful, upon error all allocated memory will be freed*/int ecc_make_key(prng_state *prng, int wprng, int keysize, ecc_key *key){ int x, err; ecc_point *base; mp_int prime; unsigned char *buf; LTC_ARGCHK(key != NULL); /* good prng? */ if ((err = prng_is_valid(wprng)) != CRYPT_OK) { return err; } /* find key size */ for (x = 0; (keysize > sets[x].size) && (sets[x].size != 0); x++); keysize = sets[x].size; LTC_ARGCHK(keysize <= ECC_MAXSIZE); if (sets[x].size == 0) { return CRYPT_INVALID_KEYSIZE; } key->idx = x; /* allocate ram */ base = NULL; buf = XMALLOC(ECC_MAXSIZE); if (buf == NULL) { return CRYPT_MEM; } /* make up random string */ if (prng_descriptor[wprng].read(buf, (unsigned long)keysize, prng) != (unsigned long)keysize) { err = CRYPT_ERROR_READPRNG; goto LBL_ERR2; } /* setup the key variables */ if ((err = mp_init_multi(&key->pubkey.x, &key->pubkey.y, &key->k, &prime, NULL)) != MP_OKAY) { err = mpi_to_ltc_error(err); goto LBL_ERR; } base = new_point(); if (base == NULL) { mp_clear_multi(&key->pubkey.x, &key->pubkey.y, &key->k, &prime, NULL); err = CRYPT_MEM; goto LBL_ERR; } /* read in the specs for this key */ if ((err = mp_read_radix(&prime, (char *)sets[key->idx].prime, 64)) != MP_OKAY) { goto error; } if ((err = mp_read_radix(&base->x, (char *)sets[key->idx].Gx, 64)) != MP_OKAY) { goto error; } if ((err = mp_read_radix(&base->y, (char *)sets[key->idx].Gy, 64)) != MP_OKAY) { goto error; } if ((err = mp_read_unsigned_bin(&key->k, (unsigned char *)buf, keysize)) != MP_OKAY) { goto error; } /* make the public key */ if ((err = ecc_mulmod(&key->k, base, &key->pubkey, &prime)) != CRYPT_OK) { goto LBL_ERR; } key->type = PK_PRIVATE; /* shrink key */ if ((err = mp_shrink(&key->k)) != MP_OKAY) { goto error; } if ((err = mp_shrink(&key->pubkey.x)) != MP_OKAY) { goto error; } if ((err = mp_shrink(&key->pubkey.y)) != MP_OKAY) { goto error; } /* free up ram */ err = CRYPT_OK; goto LBL_ERR;error: err = mpi_to_ltc_error(err);LBL_ERR: del_point(base); mp_clear(&prime);LBL_ERR2:#ifdef LTC_CLEAN_STACK zeromem(buf, ECC_MAXSIZE);#endif XFREE(buf); return err;}/** Free an ECC key from memory @param key The key you wish to free*/void ecc_free(ecc_key *key){ LTC_ARGCHK(key != NULL); mp_clear_multi(&key->pubkey.x, &key->pubkey.y, &key->k, NULL);}static int compress_y_point(ecc_point *pt, int idx, int *result){ mp_int tmp, tmp2, p; int err; LTC_ARGCHK(pt != NULL); LTC_ARGCHK(result != NULL); if ((err = mp_init_multi(&tmp, &tmp2, &p, NULL)) != MP_OKAY) { return mpi_to_ltc_error(err); } /* get x^3 - 3x + b */ if ((err = mp_read_radix(&p, (char *)sets[idx].B, 64)) != MP_OKAY) { goto error; } /* p = B */ if ((err = mp_expt_d(&pt->x, 3, &tmp)) != MP_OKAY) { goto error; } /* tmp = pX^3 */ if ((err = mp_mul_d(&pt->x, 3, &tmp2)) != MP_OKAY) { goto error; } /* tmp2 = 3*pX^3 */ if ((err = mp_sub(&tmp, &tmp2, &tmp)) != MP_OKAY) { goto error; } /* tmp = tmp - tmp2 */ if ((err = mp_add(&tmp, &p, &tmp)) != MP_OKAY) { goto error; } /* tmp = tmp + p */ if ((err = mp_read_radix(&p, (char *)sets[idx].prime, 64)) != MP_OKAY) { goto error; } /* p = prime */ if ((err = mp_mod(&tmp, &p, &tmp)) != MP_OKAY) { goto error; } /* tmp = tmp mod p */ /* now find square root */ if ((err = mp_add_d(&p, 1, &tmp2)) != MP_OKAY) { goto error; } /* tmp2 = p + 1 */ if ((err = mp_div_2d(&tmp2, 2, &tmp2, NULL)) != MP_OKAY) { goto error; } /* tmp2 = (p+1)/4 */ if ((err = mp_exptmod(&tmp, &tmp2, &p, &tmp)) != MP_OKAY) { goto error; } /* tmp = (x^3 - 3x + b)^((p+1)/4) mod p */ /* if tmp equals the y point give a 0, otherwise 1 */ if (mp_cmp(&tmp, &pt->y) == 0) { *result = 0; } else { *result = 1; } err = CRYPT_OK; goto done;error: err = mpi_to_ltc_error(err);done: mp_clear_multi(&p, &tmp, &tmp2, NULL); return err;}static int expand_y_point(ecc_point *pt, int idx, int result){ mp_int tmp, tmp2, p; int err; LTC_ARGCHK(pt != NULL); if ((err = mp_init_multi(&tmp, &tmp2, &p, NULL)) != MP_OKAY) { return CRYPT_MEM; } /* get x^3 - 3x + b */ if ((err = mp_read_radix(&p, (char *)sets[idx].B, 64)) != MP_OKAY) { goto error; } /* p = B */ if ((err = mp_expt_d(&pt->x, 3, &tmp)) != MP_OKAY) { goto error; } /* tmp = pX^3 */ if ((err = mp_mul_d(&pt->x, 3, &tmp2)) != MP_OKAY) { goto error; } /* tmp2 = 3*pX^3 */ if ((err = mp_sub(&tmp, &tmp2, &tmp)) != MP_OKAY) { goto error; } /* tmp = tmp - tmp2 */ if ((err = mp_add(&tmp, &p, &tmp)) != MP_OKAY) { goto error; } /* tmp = tmp + p */ if ((err = mp_read_radix(&p, (char *)sets[idx].prime, 64)) != MP_OKAY) { goto error; } /* p = prime */ if ((err = mp_mod(&tmp, &p, &tmp)) != MP_OKAY) { goto error; } /* tmp = tmp mod p */ /* now find square root */ if ((err = mp_add_d(&p, 1, &tmp2)) != MP_OKAY) { goto error; } /* tmp2 = p + 1 */ if ((err = mp_div_2d(&tmp2, 2, &tmp2, NULL)) != MP_OKAY) { goto error; } /* tmp2 = (p+1)/4 */ if ((err = mp_exptmod(&tmp, &tmp2, &p, &tmp)) != MP_OKAY) { goto error; } /* tmp = (x^3 - 3x + b)^((p+1)/4) mod p */ /* if result==0, then y==tmp, otherwise y==p-tmp */ if (result == 0) { if ((err = mp_copy(&tmp, &pt->y) != MP_OKAY)) { goto error; } } else { if ((err = mp_sub(&p, &tmp, &pt->y) != MP_OKAY)) { goto error; } } err = CRYPT_OK; goto done;error: err = mpi_to_ltc_error(err);done: mp_clear_multi(&p, &tmp, &tmp2, NULL); return err;}/** Export an ECC key as a binary packet @param out [out] Destination for the key @param outlen [in/out] Max size and resulting size of the exported key @param type The type of key you want to export (PK_PRIVATE or PK_PUBLIC) @param key The key to export @return CRYPT_OK if successful*/int ecc_export(unsigned char *out, unsigned long *outlen, int type, ecc_key *key){ unsigned long y, z; int cp, err; LTC_ARGCHK(out != NULL); LTC_ARGCHK(outlen != NULL); LTC_ARGCHK(key != NULL); /* can we store the static header? */ if (*outlen < (PACKET_SIZE + 3)) { return CRYPT_BUFFER_OVERFLOW; } /* type valid? */ if (key->type != PK_PRIVATE && type == PK_PRIVATE) { return CRYPT_PK_TYPE_MISMATCH; } /* output type and magic byte */ y = PACKET_SIZE; out[y++] = (unsigned char)type; out[y++] = (unsigned char)sets[key->idx].size; /* output x coordinate */ OUTPUT_BIGNUM(&(key->pubkey.x), out, y, z); /* compress y and output it */ if ((err = compress_y_point(&key->pubkey, key->idx, &cp)) != CRYPT_OK) { return err; } out[y++] = (unsigned char)cp; if (type == PK_PRIVATE) { OUTPUT_BIGNUM(&key->k, out, y, z); } /* store header */ packet_store_header(out, PACKET_SECT_ECC, PACKET_SUB_KEY); *outlen = y; return CRYPT_OK;}/** Import an ECC key from a binary packet @param in The packet to import @param inlen The length of the packet @param key [out] The destination of the import @return CRYPT_OK if successful, upon error all allocated memory will be freed*/int ecc_import(const unsigned char *in, unsigned long inlen, ecc_key *key){ unsigned long x, y, s; int err; LTC_ARGCHK(in != NULL); LTC_ARGCHK(key != NULL); /* check length */ if ((3+PACKET_SIZE) > inlen) { return CRYPT_INVALID_PACKET; } /* check type */ if ((err = packet_valid_header((unsigned char *)in, PACKET_SECT_ECC, PACKET_SUB_KEY)) != CRYPT_OK) { return err; } /* init key */ if (mp_init_multi(&key->pubkey.x, &key->pubkey.y, &key->k, NULL) != MP_OKAY) { return CRYPT_MEM; } y = PACKET_SIZE; key->type = (int)in[y++]; s = (unsigned long)in[y++]; for (x = 0; (s > (unsigned long)sets[x].size) && (sets[x].size != 0); x++); if (sets[x].size == 0) { err = CRYPT_INVALID_KEYSIZE; goto error; } key->idx = (int)x; /* type check both values */ if ((key->type != PK_PUBLIC) && (key->type != PK_PRIVATE)) { err = CRYPT_INVALID_PACKET; goto error; } /* is the key idx valid? */ if (is_valid_idx(key->idx) != 1) { err = CRYPT_INVALID_PACKET; goto error; } /* load x coordinate */ INPUT_BIGNUM(&key->pubkey.x, in, x, y, inlen); /* load y */ x = (unsigned long)in[y++]; if ((err = expand_y_point(&key->pubkey, key->idx, (int)x)) != CRYPT_OK) { goto error; } if (key->type == PK_PRIVATE) { /* load private key */ INPUT_BIGNUM(&key->k, in, x, y, inlen); } /* eliminate private key if public */ if (key->type == PK_PUBLIC) { mp_clear(&key->k); } return CRYPT_OK;error: mp_clear_multi(&key->pubkey.x, &key->pubkey.y, &key->k, NULL); return err;}/** Create an ECC shared secret between two keys @param private_key The private ECC key @param public_key The public key @param out [out] Destination of the shared secret @param outlen [in/out] The max size and resulting size of the shared secret @return CRYPT_OK if successful*/int ecc_shared_secret(ecc_key *private_key, ecc_key *public_key, unsigned char *out, unsigned long *outlen){ unsigned long x, y; ecc_point *result; mp_int prime; int err; LTC_ARGCHK(private_key != NULL); LTC_ARGCHK(public_key != NULL); LTC_ARGCHK(out != NULL); LTC_ARGCHK(outlen != NULL); /* type valid? */ if (private_key->type != PK_PRIVATE) { return CRYPT_PK_NOT_PRIVATE; } if (private_key->idx != public_key->idx) { return CRYPT_PK_TYPE_MISMATCH; } /* make new point */ result = new_point(); if (result == NULL) { return CRYPT_MEM; } if ((err = mp_init(&prime)) != MP_OKAY) { del_point(result); return mpi_to_ltc_error(err); } if ((err = mp_read_radix(&prime, (char *)sets[private_key->idx].prime, 64)) != MP_OKAY) { goto error; } if ((err = ecc_mulmod(&private_key->k, &public_key->pubkey, result, &prime)) != CRYPT_OK) { goto done1; } x = (unsigned long)mp_unsigned_bin_size(&result->x); y = (unsigned long)mp_unsigned_bin_size(&result->y); if (*outlen < (x+y)) { err = CRYPT_BUFFER_OVERFLOW; goto done1; } *outlen = x+y; if ((err = mp_to_unsigned_bin(&result->x, out)) != MP_OKAY) { goto error; } if ((err = mp_to_unsigned_bin(&result->y, out+x)) != MP_OKAY) { goto error; } err = CRYPT_OK; goto done1;error: err = mpi_to_ltc_error(err);done1: mp_clear(&prime); del_point(result); return err;}/** Get the size of an ECC key @param key The key to get the size of @return The size (octets) of the key or INT_MAX on error*/int ecc_get_size(ecc_key *key){ LTC_ARGCHK(key != NULL); if (is_valid_idx(key->idx)) return sets[key->idx].size; else return INT_MAX; /* large value known to cause it to fail when passed to ecc_make_key() */}#include "ecc_sys.c"#endif
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -