⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 ecc.c

📁 这是一个用来加解密的算法库
💻 C
📖 第 1 页 / 共 2 页
字号:
            if ((err = add_point(R, tG, R, modulus, &mu)) != CRYPT_OK)         { goto done; }         }       }     }   }   err = CRYPT_OK;   goto done;error:   err = mpi_to_ltc_error(err);done:   del_point(tG);   for (i = 0; i < 8; i++) {       del_point(M[i]);   }   mp_clear(&mu);   return err;}#undef WINSIZE/**  Perform on the ECC system  @return CRYPT_OK if successful*/int ecc_test(void){   mp_int     modulus, order;   ecc_point  *G, *GG;   int i, err, primality;   if ((err = mp_init_multi(&modulus, &order, NULL)) != MP_OKAY) {      return mpi_to_ltc_error(err);   }   G   = new_point();   GG  = new_point();   if (G == NULL || GG == NULL) {      mp_clear_multi(&modulus, &order, NULL);      del_point(G);      del_point(GG);      return CRYPT_MEM;   }   for (i = 0; sets[i].size; i++) {       #if 0          printf("Testing %d\n", sets[i].size);       #endif       if ((err = mp_read_radix(&modulus, (char *)sets[i].prime, 64)) != MP_OKAY)   { goto error; }       if ((err = mp_read_radix(&order, (char *)sets[i].order, 64)) != MP_OKAY)     { goto error; }       /* is prime actually prime? */       if ((err = is_prime(&modulus, &primality)) != CRYPT_OK)                      { goto done; }       if (primality == 0) {          err = CRYPT_FAIL_TESTVECTOR;          goto done;       }       /* is order prime ? */       if ((err = is_prime(&order, &primality)) != CRYPT_OK)                        { goto done; }       if (primality == 0) {          err = CRYPT_FAIL_TESTVECTOR;          goto done;       }       if ((err = mp_read_radix(&G->x, (char *)sets[i].Gx, 64)) != MP_OKAY)         { goto error; }       if ((err = mp_read_radix(&G->y, (char *)sets[i].Gy, 64)) != MP_OKAY)         { goto error; }       /* then we should have G == (order + 1)G */       if ((err = mp_add_d(&order, 1, &order)) != MP_OKAY)                          { goto error; }       if ((err = ecc_mulmod(&order, G, GG, &modulus)) != CRYPT_OK)                 { goto done; }       if (mp_cmp(&G->x, &GG->x) != 0 || mp_cmp(&G->y, &GG->y) != 0) {          err = CRYPT_FAIL_TESTVECTOR;          goto done;       }   }   err = CRYPT_OK;   goto done;error:   err = mpi_to_ltc_error(err);done:   del_point(GG);   del_point(G);   mp_clear_multi(&order, &modulus, NULL);   return err;}void ecc_sizes(int *low, int *high){ int i; LTC_ARGCHK(low  != NULL); LTC_ARGCHK(high != NULL); *low = INT_MAX; *high = 0; for (i = 0; sets[i].size != 0; i++) {     if (sets[i].size < *low)  {        *low  = sets[i].size;     }     if (sets[i].size > *high) {        *high = sets[i].size;     } }}/**  Make a new ECC key   @param prng         An active PRNG state  @param wprng        The index of the PRNG you wish to use  @param keysize      The keysize for the new key (in octets from 20 to 65 bytes)  @param key          [out] Destination of the newly created key  @return CRYPT_OK if successful, upon error all allocated memory will be freed*/int ecc_make_key(prng_state *prng, int wprng, int keysize, ecc_key *key){   int            x, err;   ecc_point     *base;   mp_int         prime;   unsigned char *buf;   LTC_ARGCHK(key != NULL);   /* good prng? */   if ((err = prng_is_valid(wprng)) != CRYPT_OK) {      return err;   }   /* find key size */   for (x = 0; (keysize > sets[x].size) && (sets[x].size != 0); x++);   keysize = sets[x].size;   LTC_ARGCHK(keysize <= ECC_MAXSIZE);   if (sets[x].size == 0) {      return CRYPT_INVALID_KEYSIZE;   }   key->idx = x;   /* allocate ram */   base = NULL;   buf  = XMALLOC(ECC_MAXSIZE);   if (buf == NULL) {      return CRYPT_MEM;   }   /* make up random string */   if (prng_descriptor[wprng].read(buf, (unsigned long)keysize, prng) != (unsigned long)keysize) {      err = CRYPT_ERROR_READPRNG;      goto LBL_ERR2;   }   /* setup the key variables */   if ((err = mp_init_multi(&key->pubkey.x, &key->pubkey.y, &key->k, &prime, NULL)) != MP_OKAY) {      err = mpi_to_ltc_error(err);      goto LBL_ERR;   }   base = new_point();   if (base == NULL) {      mp_clear_multi(&key->pubkey.x, &key->pubkey.y, &key->k, &prime, NULL);      err = CRYPT_MEM;      goto LBL_ERR;   }   /* read in the specs for this key */   if ((err = mp_read_radix(&prime, (char *)sets[key->idx].prime, 64)) != MP_OKAY)      { goto error; }   if ((err = mp_read_radix(&base->x, (char *)sets[key->idx].Gx, 64)) != MP_OKAY)       { goto error; }   if ((err = mp_read_radix(&base->y, (char *)sets[key->idx].Gy, 64)) != MP_OKAY)       { goto error; }   if ((err = mp_read_unsigned_bin(&key->k, (unsigned char *)buf, keysize)) != MP_OKAY) { goto error; }   /* make the public key */   if ((err = ecc_mulmod(&key->k, base, &key->pubkey, &prime)) != CRYPT_OK)             { goto LBL_ERR; }   key->type = PK_PRIVATE;   /* shrink key */   if ((err = mp_shrink(&key->k)) != MP_OKAY)                                           { goto error; }   if ((err = mp_shrink(&key->pubkey.x)) != MP_OKAY)                                    { goto error; }   if ((err = mp_shrink(&key->pubkey.y)) != MP_OKAY)                                    { goto error; }   /* free up ram */   err = CRYPT_OK;   goto LBL_ERR;error:   err = mpi_to_ltc_error(err);LBL_ERR:   del_point(base);   mp_clear(&prime);LBL_ERR2:#ifdef LTC_CLEAN_STACK   zeromem(buf, ECC_MAXSIZE);#endif   XFREE(buf);   return err;}/**  Free an ECC key from memory  @param key   The key you wish to free*/void ecc_free(ecc_key *key){   LTC_ARGCHK(key != NULL);   mp_clear_multi(&key->pubkey.x, &key->pubkey.y, &key->k, NULL);}static int compress_y_point(ecc_point *pt, int idx, int *result){   mp_int tmp, tmp2, p;   int err;   LTC_ARGCHK(pt     != NULL);   LTC_ARGCHK(result != NULL);   if ((err = mp_init_multi(&tmp, &tmp2, &p, NULL)) != MP_OKAY) {      return mpi_to_ltc_error(err);   }   /* get x^3 - 3x + b */   if ((err = mp_read_radix(&p, (char *)sets[idx].B, 64)) != MP_OKAY) { goto error; } /* p = B */   if ((err = mp_expt_d(&pt->x, 3, &tmp)) != MP_OKAY)                 { goto error; } /* tmp = pX^3  */   if ((err = mp_mul_d(&pt->x, 3, &tmp2)) != MP_OKAY)                 { goto error; } /* tmp2 = 3*pX^3 */   if ((err = mp_sub(&tmp, &tmp2, &tmp)) != MP_OKAY)                  { goto error; } /* tmp = tmp - tmp2 */   if ((err = mp_add(&tmp, &p, &tmp)) != MP_OKAY)                     { goto error; } /* tmp = tmp + p */   if ((err = mp_read_radix(&p, (char *)sets[idx].prime, 64)) != MP_OKAY)  { goto error; } /* p = prime */   if ((err = mp_mod(&tmp, &p, &tmp)) != MP_OKAY)                     { goto error; } /* tmp = tmp mod p */   /* now find square root */   if ((err = mp_add_d(&p, 1, &tmp2)) != MP_OKAY)                     { goto error; } /* tmp2 = p + 1 */   if ((err = mp_div_2d(&tmp2, 2, &tmp2, NULL)) != MP_OKAY)           { goto error; } /* tmp2 = (p+1)/4 */   if ((err = mp_exptmod(&tmp, &tmp2, &p, &tmp)) != MP_OKAY)          { goto error; } /* tmp  = (x^3 - 3x + b)^((p+1)/4) mod p */   /* if tmp equals the y point give a 0, otherwise 1 */   if (mp_cmp(&tmp, &pt->y) == 0) {      *result = 0;   } else {      *result = 1;   }   err = CRYPT_OK;   goto done;error:   err = mpi_to_ltc_error(err);done:   mp_clear_multi(&p, &tmp, &tmp2, NULL);   return err;}static int expand_y_point(ecc_point *pt, int idx, int result){   mp_int tmp, tmp2, p;   int err;   LTC_ARGCHK(pt != NULL);   if ((err = mp_init_multi(&tmp, &tmp2, &p, NULL)) != MP_OKAY) {      return CRYPT_MEM;   }   /* get x^3 - 3x + b */   if ((err = mp_read_radix(&p, (char *)sets[idx].B, 64)) != MP_OKAY) { goto error; } /* p = B */   if ((err = mp_expt_d(&pt->x, 3, &tmp)) != MP_OKAY)                 { goto error; } /* tmp = pX^3 */   if ((err = mp_mul_d(&pt->x, 3, &tmp2)) != MP_OKAY)                 { goto error; } /* tmp2 = 3*pX^3 */   if ((err = mp_sub(&tmp, &tmp2, &tmp)) != MP_OKAY)                  { goto error; } /* tmp = tmp - tmp2 */   if ((err = mp_add(&tmp, &p, &tmp)) != MP_OKAY)                     { goto error; } /* tmp = tmp + p */   if ((err = mp_read_radix(&p, (char *)sets[idx].prime, 64)) != MP_OKAY)  { goto error; } /* p = prime */   if ((err = mp_mod(&tmp, &p, &tmp)) != MP_OKAY)                     { goto error; } /* tmp = tmp mod p */   /* now find square root */   if ((err = mp_add_d(&p, 1, &tmp2)) != MP_OKAY)                     { goto error; } /* tmp2 = p + 1 */   if ((err = mp_div_2d(&tmp2, 2, &tmp2, NULL)) != MP_OKAY)           { goto error; } /* tmp2 = (p+1)/4 */   if ((err = mp_exptmod(&tmp, &tmp2, &p, &tmp)) != MP_OKAY)          { goto error; } /* tmp  = (x^3 - 3x + b)^((p+1)/4) mod p */   /* if result==0, then y==tmp, otherwise y==p-tmp */   if (result == 0) {      if ((err = mp_copy(&tmp, &pt->y) != MP_OKAY))                   { goto error; }   } else {      if ((err = mp_sub(&p, &tmp, &pt->y) != MP_OKAY))                { goto error; }   }   err = CRYPT_OK;   goto done;error:   err = mpi_to_ltc_error(err);done:   mp_clear_multi(&p, &tmp, &tmp2, NULL);   return err;}/**  Export an ECC key as a binary packet  @param out     [out] Destination for the key  @param outlen  [in/out] Max size and resulting size of the exported key  @param type    The type of key you want to export (PK_PRIVATE or PK_PUBLIC)  @param key     The key to export  @return CRYPT_OK if successful*/int ecc_export(unsigned char *out, unsigned long *outlen, int type, ecc_key *key){   unsigned long y, z;   int cp, err;   LTC_ARGCHK(out    != NULL);   LTC_ARGCHK(outlen != NULL);   LTC_ARGCHK(key    != NULL);      /* can we store the static header?  */   if (*outlen < (PACKET_SIZE + 3)) {      return CRYPT_BUFFER_OVERFLOW;   }   /* type valid? */   if (key->type != PK_PRIVATE && type == PK_PRIVATE) {      return CRYPT_PK_TYPE_MISMATCH;   }   /* output type and magic byte */   y = PACKET_SIZE;   out[y++] = (unsigned char)type;   out[y++] = (unsigned char)sets[key->idx].size;   /* output x coordinate */   OUTPUT_BIGNUM(&(key->pubkey.x), out, y, z);   /* compress y and output it  */   if ((err = compress_y_point(&key->pubkey, key->idx, &cp)) != CRYPT_OK) {      return err;   }   out[y++] = (unsigned char)cp;   if (type == PK_PRIVATE) {      OUTPUT_BIGNUM(&key->k, out, y, z);   }   /* store header */   packet_store_header(out, PACKET_SECT_ECC, PACKET_SUB_KEY);   *outlen = y;   return CRYPT_OK;}/**  Import an ECC key from a binary packet  @param in      The packet to import  @param inlen   The length of the packet  @param key     [out] The destination of the import  @return CRYPT_OK if successful, upon error all allocated memory will be freed*/int ecc_import(const unsigned char *in, unsigned long inlen, ecc_key *key){   unsigned long x, y, s;   int err;   LTC_ARGCHK(in  != NULL);   LTC_ARGCHK(key != NULL);   /* check length */   if ((3+PACKET_SIZE) > inlen) {      return CRYPT_INVALID_PACKET;   }   /* check type */   if ((err = packet_valid_header((unsigned char *)in, PACKET_SECT_ECC, PACKET_SUB_KEY)) != CRYPT_OK) {      return err;   }   /* init key */   if (mp_init_multi(&key->pubkey.x, &key->pubkey.y, &key->k, NULL) != MP_OKAY) {      return CRYPT_MEM;   }   y = PACKET_SIZE;   key->type = (int)in[y++];   s = (unsigned long)in[y++];   for (x = 0; (s > (unsigned long)sets[x].size) && (sets[x].size != 0); x++);   if (sets[x].size == 0) {      err = CRYPT_INVALID_KEYSIZE;      goto error;   }   key->idx = (int)x;   /* type check both values */   if ((key->type != PK_PUBLIC) && (key->type != PK_PRIVATE))  {      err = CRYPT_INVALID_PACKET;      goto error;   }   /* is the key idx valid? */   if (is_valid_idx(key->idx) != 1) {      err = CRYPT_INVALID_PACKET;      goto error;   }   /* load x coordinate */   INPUT_BIGNUM(&key->pubkey.x, in, x, y, inlen);   /* load y */   x = (unsigned long)in[y++];   if ((err = expand_y_point(&key->pubkey, key->idx, (int)x)) != CRYPT_OK) {       goto error;   }   if (key->type == PK_PRIVATE) {      /* load private key */      INPUT_BIGNUM(&key->k, in, x, y, inlen);   }   /* eliminate private key if public */   if (key->type == PK_PUBLIC) {      mp_clear(&key->k);   }   return CRYPT_OK;error:   mp_clear_multi(&key->pubkey.x, &key->pubkey.y, &key->k, NULL);   return err;}/**  Create an ECC shared secret between two keys  @param private_key      The private ECC key  @param public_key       The public key  @param out              [out] Destination of the shared secret  @param outlen           [in/out] The max size and resulting size of the shared secret  @return CRYPT_OK if successful*/int ecc_shared_secret(ecc_key *private_key, ecc_key *public_key,                      unsigned char *out, unsigned long *outlen){   unsigned long x, y;   ecc_point *result;   mp_int prime;   int err;   LTC_ARGCHK(private_key != NULL);   LTC_ARGCHK(public_key  != NULL);   LTC_ARGCHK(out         != NULL);   LTC_ARGCHK(outlen      != NULL);   /* type valid? */   if (private_key->type != PK_PRIVATE) {      return CRYPT_PK_NOT_PRIVATE;   }   if (private_key->idx != public_key->idx) {      return CRYPT_PK_TYPE_MISMATCH;   }   /* make new point */   result = new_point();   if (result == NULL) {      return CRYPT_MEM;   }   if ((err = mp_init(&prime)) != MP_OKAY) {      del_point(result);      return mpi_to_ltc_error(err);   }   if ((err = mp_read_radix(&prime, (char *)sets[private_key->idx].prime, 64)) != MP_OKAY)   { goto error; }   if ((err = ecc_mulmod(&private_key->k, &public_key->pubkey, result, &prime)) != CRYPT_OK) { goto done1; }   x = (unsigned long)mp_unsigned_bin_size(&result->x);   y = (unsigned long)mp_unsigned_bin_size(&result->y);   if (*outlen < (x+y)) {      err = CRYPT_BUFFER_OVERFLOW;      goto done1;   }   *outlen = x+y;   if ((err = mp_to_unsigned_bin(&result->x, out))   != MP_OKAY)          { goto error; }   if ((err = mp_to_unsigned_bin(&result->y, out+x)) != MP_OKAY)          { goto error; }   err = CRYPT_OK;   goto done1;error:   err = mpi_to_ltc_error(err);done1:   mp_clear(&prime);   del_point(result);   return err;}/**  Get the size of an ECC key  @param key    The key to get the size of   @return The size (octets) of the key or INT_MAX on error*/int ecc_get_size(ecc_key *key){   LTC_ARGCHK(key != NULL);   if (is_valid_idx(key->idx))      return sets[key->idx].size;   else      return INT_MAX; /* large value known to cause it to fail when passed to ecc_make_key() */}#include "ecc_sys.c"#endif

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -