/******************************************************************************* * Copyright 2003-2018 Intel Corporation * All Rights Reserved. * * If this software was obtained under the Intel Simplified Software License, * the following terms apply: * * The source code, information and material ("Material") contained herein is * owned by Intel Corporation or its suppliers or licensors, and title to such * Material remains with Intel Corporation or its suppliers or licensors. The * Material contains proprietary information of Intel or its suppliers and * licensors. The Material is protected by worldwide copyright laws and treaty * provisions. No part of the Material may be used, copied, reproduced, * modified, published, uploaded, posted, transmitted, distributed or disclosed * in any way without Intel's prior express written permission. No license under * any patent, copyright or other intellectual property rights in the Material * is granted to or conferred upon you, either expressly, by implication, * inducement, estoppel or otherwise. Any license under such intellectual * property rights must be express and approved by Intel in writing. * * Unless otherwise agreed by Intel in writing, you may not remove or alter this * notice or any other notice embedded in Materials by Intel or Intel's * suppliers or licensors in any way. * * * If this software was obtained under the Apache License, Version 2.0 (the * "License"), the following terms apply: * * You may not use this file except in compliance with the License. You may * obtain a copy of the License at http://www.apache.org/licenses/LICENSE-2.0 * * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * * See the License for the specific language governing permissions and * limitations under the License. *******************************************************************************/ /* // // Purpose: // Cryptography Primitive. // EC over Prime Finite Field (setup/retrieve domain parameters) // // Contents: // ippsECCPSet() // */ #include "owndefs.h" #include "owncp.h" #include "pcpeccp.h" /*F* // Name: ippsECCPInitStdSM2 // // Purpose: Sets up the elliptic curve domain parameters // over a prime finite field GF(p) // // Returns: Reason: // ippStsNullPtrErr NULL == pPrime // NULL == pA // NULL == pB // NULL == pGX // NULL == pGY // NULL == pOrder // NULL == cofactor // NULL == pEC // // ippStsContextMatchErr illegal pPrime->idCtx // illegal pA->idCtx // illegal pB->idCtx // illegal pGX->idCtx // illegal pGY->idCtx // illegal pOrder->idCtx // illegal pEC->idCtx // // ippStsRangeErr not enough room for: // pPrime // pA, pB, // pGX, pGY // pOrder // // ippStsNoErr no errors // // Parameters: // pPrime pointer to the retrieval prime (specify FG(p)) // pA pointer to the retrieval A coefficient of EC equation // pB pointer to the retrieval B coefficient of EC equation // pGX,pGY pointer to the retrieval Base Point (x and y coordinates) of EC // pOrder pointer to the retrieval Base Point order // cofactor pointer to the retrieval cofactor value // pEC pointer to the ECC context // *F*/ IPPFUN(IppStatus, ippsECCPSet, (const IppsBigNumState* pPrime, const IppsBigNumState* pA, const IppsBigNumState* pB, const IppsBigNumState* pGX,const IppsBigNumState* pGY, const IppsBigNumState* pOrder, int cofactor, IppsECCPState* pEC)) { /* test pEC */ IPP_BAD_PTR1_RET(pEC); /* use aligned EC context */ pEC = (IppsGFpECState*)( IPP_ALIGNED_PTR(pEC, ECGFP_ALIGNMENT) ); IPP_BADARG_RET(!ECP_TEST_ID(pEC), ippStsContextMatchErr); /* test pPrime */ IPP_BAD_PTR1_RET(pPrime); pPrime = (IppsBigNumState*)( IPP_ALIGNED_PTR(pPrime, BN_ALIGNMENT) ); IPP_BADARG_RET(!BN_VALID_ID(pPrime), ippStsContextMatchErr); IPP_BADARG_RET((cpBN_bitsize(pPrime)>GFP_FEBITLEN(GFP_PMA(ECP_GFP(pEC)))), ippStsRangeErr); /* test pA and pB */ IPP_BAD_PTR2_RET(pA,pB); pA = (IppsBigNumState*)( IPP_ALIGNED_PTR(pA, ALIGN_VAL) ); pB = (IppsBigNumState*)( IPP_ALIGNED_PTR(pB, ALIGN_VAL) ); IPP_BADARG_RET(!BN_VALID_ID(pA), ippStsContextMatchErr); IPP_BADARG_RET(!BN_VALID_ID(pB), ippStsContextMatchErr); IPP_BADARG_RET(BN_NEGATIVE(pA) || 0<=cpBN_cmp(pA,pPrime), ippStsRangeErr); IPP_BADARG_RET(BN_NEGATIVE(pB) || 0<=cpBN_cmp(pB,pPrime), ippStsRangeErr); /* test pG and pGorder pointers */ IPP_BAD_PTR3_RET(pGX,pGY, pOrder); pGX = (IppsBigNumState*)( IPP_ALIGNED_PTR(pGX, ALIGN_VAL) ); pGY = (IppsBigNumState*)( IPP_ALIGNED_PTR(pGY, ALIGN_VAL) ); pOrder = (IppsBigNumState*)( IPP_ALIGNED_PTR(pOrder, ALIGN_VAL) ); IPP_BADARG_RET(!BN_VALID_ID(pGX), ippStsContextMatchErr); IPP_BADARG_RET(!BN_VALID_ID(pGY), ippStsContextMatchErr); IPP_BADARG_RET(!BN_VALID_ID(pOrder), ippStsContextMatchErr); IPP_BADARG_RET(BN_NEGATIVE(pGX) || 0<=cpBN_cmp(pGX,pPrime), ippStsRangeErr); IPP_BADARG_RET(BN_NEGATIVE(pGY) || 0<=cpBN_cmp(pGY,pPrime), ippStsRangeErr); IPP_BADARG_RET((cpBN_bitsize(pOrder)>ECP_ORDBITSIZE(pEC)), ippStsRangeErr); /* test cofactor */ IPP_BADARG_RET(!(0<cofactor), ippStsRangeErr); return ECCPSetDP(ippsGFpMethod_pArb(), BN_SIZE(pPrime), BN_NUMBER(pPrime), BN_SIZE(pA), BN_NUMBER(pA), BN_SIZE(pB), BN_NUMBER(pB), BN_SIZE(pGX), BN_NUMBER(pGX), BN_SIZE(pGY), BN_NUMBER(pGY), BN_SIZE(pOrder), BN_NUMBER(pOrder), (BNU_CHUNK_T)cofactor, pEC); }