|
@@ -130,7 +130,7 @@ static int _ecc_issue108(void)
|
|
Result = ltc_ecc_new_point();
|
|
Result = ltc_ecc_new_point();
|
|
|
|
|
|
/* ECC-224 AKA SECP224R1 */
|
|
/* ECC-224 AKA SECP224R1 */
|
|
- if ((err = ecc_get_curve("SECP224R1", &dp)) != CRYPT_OK) { goto done; }
|
|
|
|
|
|
+ if ((err = ecc_find_curve("SECP224R1", &dp)) != CRYPT_OK) { goto done; }
|
|
/* read A */
|
|
/* read A */
|
|
if ((err = mp_read_radix(a, (char *)dp->A, 16)) != CRYPT_OK) { goto done; }
|
|
if ((err = mp_read_radix(a, (char *)dp->A, 16)) != CRYPT_OK) { goto done; }
|
|
/* read modulus */
|
|
/* read modulus */
|
|
@@ -446,7 +446,7 @@ int _ecc_new_api(void)
|
|
unsigned long len16;
|
|
unsigned long len16;
|
|
|
|
|
|
for (i = 0; i < (int)(sizeof(names)/sizeof(names[0])); i++) {
|
|
for (i = 0; i < (int)(sizeof(names)/sizeof(names[0])); i++) {
|
|
- DO(ecc_get_curve(names[i], &dp));
|
|
|
|
|
|
+ DO(ecc_find_curve(names[i], &dp));
|
|
/* make new key */
|
|
/* make new key */
|
|
DO(ecc_make_key_ex(&yarrow_prng, find_prng ("yarrow"), &key, dp));
|
|
DO(ecc_make_key_ex(&yarrow_prng, find_prng ("yarrow"), &key, dp));
|
|
len = sizeof(buf);
|
|
len = sizeof(buf);
|
|
@@ -464,14 +464,14 @@ int _ecc_new_api(void)
|
|
ecc_free(&pubkey);
|
|
ecc_free(&pubkey);
|
|
|
|
|
|
/* generate new key */
|
|
/* generate new key */
|
|
- DO(ecc_set_dp(dp, &key));
|
|
|
|
|
|
+ DO(ecc_set_curve(dp, &key));
|
|
DO(ecc_generate_key(&yarrow_prng, find_prng ("yarrow"), &key));
|
|
DO(ecc_generate_key(&yarrow_prng, find_prng ("yarrow"), &key));
|
|
len = sizeof(buf);
|
|
len = sizeof(buf);
|
|
DO(ecc_get_key(buf, &len, PK_PRIVATE, &key));
|
|
DO(ecc_get_key(buf, &len, PK_PRIVATE, &key));
|
|
ecc_free(&key);
|
|
ecc_free(&key);
|
|
|
|
|
|
/* load exported private key */
|
|
/* load exported private key */
|
|
- DO(ecc_set_dp(dp, &privkey));
|
|
|
|
|
|
+ DO(ecc_set_curve(dp, &privkey));
|
|
DO(ecc_set_key(buf, len, PK_PRIVATE, &privkey));
|
|
DO(ecc_set_key(buf, len, PK_PRIVATE, &privkey));
|
|
|
|
|
|
#ifndef USE_TFM
|
|
#ifndef USE_TFM
|
|
@@ -481,7 +481,7 @@ int _ecc_new_api(void)
|
|
DO(ecc_get_key(buf, &len, PK_PUBLIC|PK_COMPRESSED, &privkey));
|
|
DO(ecc_get_key(buf, &len, PK_PUBLIC|PK_COMPRESSED, &privkey));
|
|
if (len != 1 + (unsigned)ecc_get_size(&privkey)) return CRYPT_FAIL_TESTVECTOR;
|
|
if (len != 1 + (unsigned)ecc_get_size(&privkey)) return CRYPT_FAIL_TESTVECTOR;
|
|
/* load exported public+compressed key */
|
|
/* load exported public+compressed key */
|
|
- DO(ecc_set_dp(dp, &pubkey));
|
|
|
|
|
|
+ DO(ecc_set_curve(dp, &pubkey));
|
|
DO(ecc_set_key(buf, len, PK_PUBLIC, &pubkey));
|
|
DO(ecc_set_key(buf, len, PK_PUBLIC, &pubkey));
|
|
ecc_free(&pubkey);
|
|
ecc_free(&pubkey);
|
|
#endif
|
|
#endif
|
|
@@ -491,7 +491,7 @@ int _ecc_new_api(void)
|
|
DO(ecc_get_key(buf, &len, PK_PUBLIC, &privkey));
|
|
DO(ecc_get_key(buf, &len, PK_PUBLIC, &privkey));
|
|
if (len != 1 + 2 * (unsigned)ecc_get_size(&privkey)) return CRYPT_FAIL_TESTVECTOR;
|
|
if (len != 1 + 2 * (unsigned)ecc_get_size(&privkey)) return CRYPT_FAIL_TESTVECTOR;
|
|
/* load exported public key */
|
|
/* load exported public key */
|
|
- DO(ecc_set_dp(dp, &pubkey));
|
|
|
|
|
|
+ DO(ecc_set_curve(dp, &pubkey));
|
|
DO(ecc_set_key(buf, len, PK_PUBLIC, &pubkey));
|
|
DO(ecc_set_key(buf, len, PK_PUBLIC, &pubkey));
|
|
|
|
|
|
/* test signature */
|
|
/* test signature */
|
|
@@ -798,18 +798,18 @@ int _ecc_import_export(void) {
|
|
|
|
|
|
DO(ecc_import_openssl(short_pub, sizeof(short_pub), &pub));
|
|
DO(ecc_import_openssl(short_pub, sizeof(short_pub), &pub));
|
|
DO(ecc_import_openssl(short_pri, sizeof(short_pri), &pri));
|
|
DO(ecc_import_openssl(short_pri, sizeof(short_pri), &pri));
|
|
- DO(ecc_get_curve("SECP256K1", &cu));
|
|
|
|
|
|
+ DO(ecc_find_curve("SECP256K1", &cu));
|
|
|
|
|
|
/* import - raw keys */
|
|
/* import - raw keys */
|
|
- DO(ecc_set_dp(cu, &key));
|
|
|
|
|
|
+ DO(ecc_set_curve(cu, &key));
|
|
DO(ecc_set_key(raw_pri, sizeof(raw_pri), PK_PRIVATE, &key));
|
|
DO(ecc_set_key(raw_pri, sizeof(raw_pri), PK_PRIVATE, &key));
|
|
DO(_ecc_key_cmp(PK_PRIVATE, &pri, &key));
|
|
DO(_ecc_key_cmp(PK_PRIVATE, &pri, &key));
|
|
ecc_free(&key);
|
|
ecc_free(&key);
|
|
- DO(ecc_set_dp(cu, &key));
|
|
|
|
|
|
+ DO(ecc_set_curve(cu, &key));
|
|
DO(ecc_set_key(raw_pub, sizeof(raw_pub), PK_PUBLIC, &key));
|
|
DO(ecc_set_key(raw_pub, sizeof(raw_pub), PK_PUBLIC, &key));
|
|
DO(_ecc_key_cmp(PK_PUBLIC, &pub, &key));
|
|
DO(_ecc_key_cmp(PK_PUBLIC, &pub, &key));
|
|
ecc_free(&key);
|
|
ecc_free(&key);
|
|
- DO(ecc_set_dp(cu, &key));
|
|
|
|
|
|
+ DO(ecc_set_curve(cu, &key));
|
|
DO(ecc_set_key(raw_pubc, sizeof(raw_pubc), PK_PUBLIC, &key));
|
|
DO(ecc_set_key(raw_pubc, sizeof(raw_pubc), PK_PUBLIC, &key));
|
|
DO(_ecc_key_cmp(PK_PUBLIC, &pub, &key));
|
|
DO(_ecc_key_cmp(PK_PUBLIC, &pub, &key));
|
|
ecc_free(&key);
|
|
ecc_free(&key);
|