|
@@ -130,7 +130,7 @@ static int _ecc_issue108(void)
|
|
Result = ltc_ecc_new_point();
|
|
Result = ltc_ecc_new_point();
|
|
|
|
|
|
/* ECC-224 AKA SECP224R1 */
|
|
/* ECC-224 AKA SECP224R1 */
|
|
- if ((err = ecc_get_curve("SECP224R1", &dp)) != CRYPT_OK) { goto done; }
|
|
|
|
|
|
+ if ((err = ecc_find_curve("SECP224R1", &dp)) != CRYPT_OK) { goto done; }
|
|
/* read A */
|
|
/* read A */
|
|
if ((err = mp_read_radix(a, (char *)dp->A, 16)) != CRYPT_OK) { goto done; }
|
|
if ((err = mp_read_radix(a, (char *)dp->A, 16)) != CRYPT_OK) { goto done; }
|
|
/* read modulus */
|
|
/* read modulus */
|
|
@@ -446,7 +446,7 @@ int _ecc_new_api(void)
|
|
unsigned long len16;
|
|
unsigned long len16;
|
|
|
|
|
|
for (i = 0; i < (int)(sizeof(names)/sizeof(names[0])); i++) {
|
|
for (i = 0; i < (int)(sizeof(names)/sizeof(names[0])); i++) {
|
|
- DO(ecc_get_curve(names[i], &dp));
|
|
|
|
|
|
+ DO(ecc_find_curve(names[i], &dp));
|
|
/* make new key */
|
|
/* make new key */
|
|
DO(ecc_make_key_ex(&yarrow_prng, find_prng ("yarrow"), &key, dp));
|
|
DO(ecc_make_key_ex(&yarrow_prng, find_prng ("yarrow"), &key, dp));
|
|
len = sizeof(buf);
|
|
len = sizeof(buf);
|
|
@@ -798,7 +798,7 @@ int _ecc_import_export(void) {
|
|
|
|
|
|
DO(ecc_import_openssl(short_pub, sizeof(short_pub), &pub));
|
|
DO(ecc_import_openssl(short_pub, sizeof(short_pub), &pub));
|
|
DO(ecc_import_openssl(short_pri, sizeof(short_pri), &pri));
|
|
DO(ecc_import_openssl(short_pri, sizeof(short_pri), &pri));
|
|
- DO(ecc_get_curve("SECP256K1", &cu));
|
|
|
|
|
|
+ DO(ecc_find_curve("SECP256K1", &cu));
|
|
|
|
|
|
/* import - raw keys */
|
|
/* import - raw keys */
|
|
DO(ecc_set_curve(cu, &key));
|
|
DO(ecc_set_curve(cu, &key));
|