/*******************************************************************************
* Copyright 2003-2018 Intel Corporation
* All Rights Reserved.
*
* If this software was obtained under the Intel Simplified Software License,
* the following terms apply:
*
* The source code, information and material ("Material") contained herein is
* owned by Intel Corporation or its suppliers or licensors, and title to such
* Material remains with Intel Corporation or its suppliers or licensors. The
* Material contains proprietary information of Intel or its suppliers and
* licensors. The Material is protected by worldwide copyright laws and treaty
* provisions. No part of the Material may be used, copied, reproduced,
* modified, published, uploaded, posted, transmitted, distributed or disclosed
* in any way without Intel's prior express written permission. No license under
* any patent, copyright or other intellectual property rights in the Material
* is granted to or conferred upon you, either expressly, by implication,
* inducement, estoppel or otherwise. Any license under such intellectual
* property rights must be express and approved by Intel in writing.
*
* Unless otherwise agreed by Intel in writing, you may not remove or alter this
* notice or any other notice embedded in Materials by Intel or Intel's
* suppliers or licensors in any way.
*
*
* If this software was obtained under the Apache License, Version 2.0 (the
* "License"), the following terms apply:
*
* You may not use this file except in compliance with the License. You may
* obtain a copy of the License at http://www.apache.org/licenses/LICENSE-2.0
*
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
* WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
*
* See the License for the specific language governing permissions and
* limitations under the License.
*******************************************************************************/
/*
//
// Purpose:
// Cryptography Primitive.
// EC over Prime Finite Field (setup/retrieve domain parameters)
//
// Contents:
// ECCPSetDP()
//
*/
#include "owndefs.h"
#include "owncp.h"
#include "pcpeccp.h"
/*F*
// Name: ippsECCPSet
//
// Purpose: Set EC Domain Parameters.
//
// Returns: Reason:
// ippStsNullPtrErr NULL == pPrime
// NULL == pA
// NULL == pB
// NULL == pGX
// NULL == pGY
// NULL == pOrder
// NULL == pECC
//
// ippStsContextMatchErr illegal pPrime->idCtx
// illegal pA->idCtx
// illegal pB->idCtx
// illegal pGX->idCtx
// illegal pGY->idCtx
// illegal pOrder->idCtx
// illegal pECC->idCtx
//
// ippStsRangeErr not enough room for:
// pPrime
// pA, pB,
// pGX,pGY
// pOrder
//
// ippStsRangeErr 0>= cofactor
//
// ippStsNoErr no errors
//
// Parameters:
// pPrime pointer to the prime (specify FG(p))
// pA pointer to the A coefficient of EC equation
// pB pointer to the B coefficient of EC equation
// pGX,pGY pointer to the Base Point (x and y coordinates) of EC
// pOrder pointer to the Base Point order
// cofactor cofactor value
// pECC pointer to the ECC context
//
*F*/
IppStatus ECCPSetDP(const IppsGFpMethod* method,
int pLen, const BNU_CHUNK_T* pP,
int aLen, const BNU_CHUNK_T* pA,
int bLen, const BNU_CHUNK_T* pB,
int xLen, const BNU_CHUNK_T* pX,
int yLen, const BNU_CHUNK_T* pY,
int rLen, const BNU_CHUNK_T* pR,
BNU_CHUNK_T h,
IppsGFpECState* pEC)
{
IPP_BADARG_RET(!ECP_TEST_ID(pEC), ippStsContextMatchErr);
{
IppsGFpState * pGF = ECP_GFP(pEC);
IppStatus sts = ippStsNoErr;
IppsBigNumState P, H;
int primeBitSize = BITSIZE_BNU(pP, pLen);
//cpConstructBN(&P, pLen, (BNU_CHUNK_T*)pP, NULL);
//sts = cpGFpSetGFp(&P, primeBitSize, method, pGF);
cpGFpSetGFp(pP, primeBitSize, method, pGF);
if(ippStsNoErr==sts) {
gsModEngine* pGFE = GFP_PMA(pGF);
do {
int elemLen = GFP_FELEN(pGFE);
IppsGFpElement elmA, elmB;
/* convert A ans B coeffs into GF elements */
cpGFpElementConstruct(&elmA, cpGFpGetPool(1, pGFE), elemLen);
cpGFpElementConstruct(&elmB, cpGFpGetPool(1, pGFE), elemLen);
sts = ippsGFpSetElement((Ipp32u*)pA, BITS2WORD32_SIZE(BITSIZE_BNU(pA,aLen)), &elmA, pGF);
if(ippStsNoErr!=sts) break;
sts = ippsGFpSetElement((Ipp32u*)pB, BITS2WORD32_SIZE(BITSIZE_BNU(pB,bLen)), &elmB, pGF);
if(ippStsNoErr!=sts) break;
/* and set EC */
sts = ippsGFpECSet(&elmA, &elmB, pEC);
if(ippStsNoErr!=sts) break;
/* convert GX ans GY coeffs into GF elements */
cpConstructBN(&P, rLen, (BNU_CHUNK_T*)pR, NULL);
cpConstructBN(&H, 1, &h, NULL);
sts = ippsGFpSetElement((Ipp32u*)pX, BITS2WORD32_SIZE(BITSIZE_BNU(pX,xLen)), &elmA, pGF);
if(ippStsNoErr!=sts) break;
sts = ippsGFpSetElement((Ipp32u*)pY, BITS2WORD32_SIZE(BITSIZE_BNU(pY,yLen)), &elmB, pGF);
if(ippStsNoErr!=sts) break;
/* and init EC subgroup */
sts = ippsGFpECSetSubgroup(&elmA, &elmB, &P, &H, pEC);
} while(0);
cpGFpReleasePool(2, pGFE);
}
return sts;
}
}