Mercurial > dropbear
comparison libtomcrypt/src/pk/ecc/ecc_make_key.c @ 478:d4f32c3443ac dbclient-netcat-alike
propagate from branch 'au.asn.ucc.matt.dropbear' (head f21045c791002d81fc6b8dde6537ea481e513eb2)
to branch 'au.asn.ucc.matt.dropbear.dbclient-netcat-alike' (head d1f69334581dc4c35f9ca16aa5355074c9dd315d)
author | Matt Johnston <matt@ucc.asn.au> |
---|---|
date | Sun, 14 Sep 2008 06:47:51 +0000 |
parents | 0cbe8f6dbf9e |
children | f849a5ca2efc |
comparison
equal
deleted
inserted
replaced
296:6b41e2cbf071 | 478:d4f32c3443ac |
---|---|
1 /* LibTomCrypt, modular cryptographic library -- Tom St Denis | |
2 * | |
3 * LibTomCrypt is a library that provides various cryptographic | |
4 * algorithms in a highly modular and flexible manner. | |
5 * | |
6 * The library is free for all purposes without any express | |
7 * guarantee it works. | |
8 * | |
9 * Tom St Denis, [email protected], http://libtomcrypt.com | |
10 */ | |
11 | |
12 /* Implements ECC over Z/pZ for curve y^2 = x^3 - 3x + b | |
13 * | |
14 * All curves taken from NIST recommendation paper of July 1999 | |
15 * Available at http://csrc.nist.gov/cryptval/dss.htm | |
16 */ | |
17 #include "tomcrypt.h" | |
18 | |
19 /** | |
20 @file ecc_make_key.c | |
21 ECC Crypto, Tom St Denis | |
22 */ | |
23 | |
24 #ifdef MECC | |
25 | |
26 /** | |
27 Make a new ECC key | |
28 @param prng An active PRNG state | |
29 @param wprng The index of the PRNG you wish to use | |
30 @param keysize The keysize for the new key (in octets from 20 to 65 bytes) | |
31 @param key [out] Destination of the newly created key | |
32 @return CRYPT_OK if successful, upon error all allocated memory will be freed | |
33 */ | |
34 int ecc_make_key(prng_state *prng, int wprng, int keysize, ecc_key *key) | |
35 { | |
36 int x, err; | |
37 | |
38 /* find key size */ | |
39 for (x = 0; (keysize > ltc_ecc_sets[x].size) && (ltc_ecc_sets[x].size != 0); x++); | |
40 keysize = ltc_ecc_sets[x].size; | |
41 | |
42 if (keysize > ECC_MAXSIZE || ltc_ecc_sets[x].size == 0) { | |
43 return CRYPT_INVALID_KEYSIZE; | |
44 } | |
45 err = ecc_make_key_ex(prng, wprng, key, <c_ecc_sets[x]); | |
46 key->idx = x; | |
47 return err; | |
48 } | |
49 | |
50 int ecc_make_key_ex(prng_state *prng, int wprng, ecc_key *key, const ltc_ecc_set_type *dp) | |
51 { | |
52 int err; | |
53 ecc_point *base; | |
54 void *prime; | |
55 unsigned char *buf; | |
56 int keysize; | |
57 | |
58 LTC_ARGCHK(key != NULL); | |
59 LTC_ARGCHK(ltc_mp.name != NULL); | |
60 LTC_ARGCHK(dp != NULL); | |
61 | |
62 /* good prng? */ | |
63 if ((err = prng_is_valid(wprng)) != CRYPT_OK) { | |
64 return err; | |
65 } | |
66 | |
67 key->idx = -1; | |
68 key->dp = dp; | |
69 keysize = dp->size; | |
70 | |
71 /* allocate ram */ | |
72 base = NULL; | |
73 buf = XMALLOC(ECC_MAXSIZE); | |
74 if (buf == NULL) { | |
75 return CRYPT_MEM; | |
76 } | |
77 | |
78 /* make up random string */ | |
79 if (prng_descriptor[wprng].read(buf, (unsigned long)keysize, prng) != (unsigned long)keysize) { | |
80 err = CRYPT_ERROR_READPRNG; | |
81 goto ERR_BUF; | |
82 } | |
83 | |
84 /* setup the key variables */ | |
85 if ((err = mp_init_multi(&key->pubkey.x, &key->pubkey.y, &key->pubkey.z, &key->k, &prime, NULL)) != CRYPT_OK) { | |
86 goto ERR_BUF; | |
87 } | |
88 base = ltc_ecc_new_point(); | |
89 if (base == NULL) { | |
90 err = CRYPT_MEM; | |
91 goto errkey; | |
92 } | |
93 | |
94 /* read in the specs for this key */ | |
95 if ((err = mp_read_radix(prime, (char *)key->dp->prime, 16)) != CRYPT_OK) { goto errkey; } | |
96 if ((err = mp_read_radix(base->x, (char *)key->dp->Gx, 16)) != CRYPT_OK) { goto errkey; } | |
97 if ((err = mp_read_radix(base->y, (char *)key->dp->Gy, 16)) != CRYPT_OK) { goto errkey; } | |
98 if ((err = mp_set(base->z, 1)) != CRYPT_OK) { goto errkey; } | |
99 if ((err = mp_read_unsigned_bin(key->k, (unsigned char *)buf, keysize)) != CRYPT_OK) { goto errkey; } | |
100 | |
101 /* make the public key */ | |
102 if ((err = ltc_mp.ecc_ptmul(key->k, base, &key->pubkey, prime, 1)) != CRYPT_OK) { goto errkey; } | |
103 key->type = PK_PRIVATE; | |
104 | |
105 /* free up ram */ | |
106 err = CRYPT_OK; | |
107 goto cleanup; | |
108 errkey: | |
109 mp_clear_multi(key->pubkey.x, key->pubkey.y, key->pubkey.z, key->k, NULL); | |
110 cleanup: | |
111 ltc_ecc_del_point(base); | |
112 mp_clear(prime); | |
113 ERR_BUF: | |
114 #ifdef LTC_CLEAN_STACK | |
115 zeromem(buf, ECC_MAXSIZE); | |
116 #endif | |
117 XFREE(buf); | |
118 return err; | |
119 } | |
120 | |
121 #endif | |
122 /* $Source: /cvs/libtom/libtomcrypt/src/pk/ecc/ecc_make_key.c,v $ */ | |
123 /* $Revision: 1.9 $ */ | |
124 /* $Date: 2006/12/04 02:50:11 $ */ | |
125 |