<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head> <meta http-equiv="Content-Type" content="text/xhtml;charset=UTF-8"/> <meta http-equiv="X-UA-Compatible" content="IE=9"/> <meta name="generator" content="Doxygen 1.8.5"/> <title>PolarSSL v1.3.8: ecdsa.c Source File</title> <link href="tabs.css" rel="stylesheet" type="text/css"/> <script type="text/javascript" src="jquery.js"></script> <script type="text/javascript" src="dynsections.js"></script> <link href="doxygen.css" rel="stylesheet" type="text/css" /> </head> <body> <div id="top"><!-- do not remove this div, it is closed by doxygen! --> <div id="titlearea"> <table cellspacing="0" cellpadding="0"> <tbody> <tr style="height: 56px;"> <td style="padding-left: 0.5em;"> <div id="projectname">PolarSSL v1.3.8 </div> </td> </tr> </tbody> </table> </div> <!-- end header part --> <!-- Generated by Doxygen 1.8.5 --> <div id="navrow1" class="tabs"> <ul class="tablist"> <li><a href="index.html"><span>Main Page</span></a></li> <li><a href="modules.html"><span>Modules</span></a></li> <li><a href="annotated.html"><span>Data Structures</span></a></li> <li class="current"><a href="files.html"><span>Files</span></a></li> </ul> </div> <div id="navrow2" class="tabs2"> <ul class="tablist"> <li><a href="files.html"><span>File List</span></a></li> <li><a href="globals.html"><span>Globals</span></a></li> </ul> </div> <div id="nav-path" class="navpath"> <ul> <li class="navelem"><a class="el" href="dir_4478130ea462cc4195c75f9e6ba20061.html">library</a></li> </ul> </div> </div><!-- top --> <div class="header"> <div class="headertitle"> <div class="title">ecdsa.c</div> </div> </div><!--header--> <div class="contents"> <a href="ecdsa_8c.html">Go to the documentation of this file.</a><div class="fragment"><div class="line"><a name="l00001"></a><span class="lineno"> 1</span> <span class="comment">/*</span></div> <div class="line"><a name="l00002"></a><span class="lineno"> 2</span> <span class="comment"> * Elliptic curve DSA</span></div> <div class="line"><a name="l00003"></a><span class="lineno"> 3</span> <span class="comment"> *</span></div> <div class="line"><a name="l00004"></a><span class="lineno"> 4</span> <span class="comment"> * Copyright (C) 2006-2014, Brainspark B.V.</span></div> <div class="line"><a name="l00005"></a><span class="lineno"> 5</span> <span class="comment"> *</span></div> <div class="line"><a name="l00006"></a><span class="lineno"> 6</span> <span class="comment"> * This file is part of PolarSSL (http://www.polarssl.org)</span></div> <div class="line"><a name="l00007"></a><span class="lineno"> 7</span> <span class="comment"> * Lead Maintainer: Paul Bakker <polarssl_maintainer at polarssl.org></span></div> <div class="line"><a name="l00008"></a><span class="lineno"> 8</span> <span class="comment"> *</span></div> <div class="line"><a name="l00009"></a><span class="lineno"> 9</span> <span class="comment"> * All rights reserved.</span></div> <div class="line"><a name="l00010"></a><span class="lineno"> 10</span> <span class="comment"> *</span></div> <div class="line"><a name="l00011"></a><span class="lineno"> 11</span> <span class="comment"> * This program is free software; you can redistribute it and/or modify</span></div> <div class="line"><a name="l00012"></a><span class="lineno"> 12</span> <span class="comment"> * it under the terms of the GNU General Public License as published by</span></div> <div class="line"><a name="l00013"></a><span class="lineno"> 13</span> <span class="comment"> * the Free Software Foundation; either version 2 of the License, or</span></div> <div class="line"><a name="l00014"></a><span class="lineno"> 14</span> <span class="comment"> * (at your option) any later version.</span></div> <div class="line"><a name="l00015"></a><span class="lineno"> 15</span> <span class="comment"> *</span></div> <div class="line"><a name="l00016"></a><span class="lineno"> 16</span> <span class="comment"> * This program is distributed in the hope that it will be useful,</span></div> <div class="line"><a name="l00017"></a><span class="lineno"> 17</span> <span class="comment"> * but WITHOUT ANY WARRANTY; without even the implied warranty of</span></div> <div class="line"><a name="l00018"></a><span class="lineno"> 18</span> <span class="comment"> * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the</span></div> <div class="line"><a name="l00019"></a><span class="lineno"> 19</span> <span class="comment"> * GNU General Public License for more details.</span></div> <div class="line"><a name="l00020"></a><span class="lineno"> 20</span> <span class="comment"> *</span></div> <div class="line"><a name="l00021"></a><span class="lineno"> 21</span> <span class="comment"> * You should have received a copy of the GNU General Public License along</span></div> <div class="line"><a name="l00022"></a><span class="lineno"> 22</span> <span class="comment"> * with this program; if not, write to the Free Software Foundation, Inc.,</span></div> <div class="line"><a name="l00023"></a><span class="lineno"> 23</span> <span class="comment"> * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.</span></div> <div class="line"><a name="l00024"></a><span class="lineno"> 24</span> <span class="comment"> */</span></div> <div class="line"><a name="l00025"></a><span class="lineno"> 25</span> </div> <div class="line"><a name="l00026"></a><span class="lineno"> 26</span> <span class="comment">/*</span></div> <div class="line"><a name="l00027"></a><span class="lineno"> 27</span> <span class="comment"> * References:</span></div> <div class="line"><a name="l00028"></a><span class="lineno"> 28</span> <span class="comment"> *</span></div> <div class="line"><a name="l00029"></a><span class="lineno"> 29</span> <span class="comment"> * SEC1 http://www.secg.org/index.php?action=secg,docs_secg</span></div> <div class="line"><a name="l00030"></a><span class="lineno"> 30</span> <span class="comment"> */</span></div> <div class="line"><a name="l00031"></a><span class="lineno"> 31</span> </div> <div class="line"><a name="l00032"></a><span class="lineno"> 32</span> <span class="preprocessor">#if !defined(POLARSSL_CONFIG_FILE)</span></div> <div class="line"><a name="l00033"></a><span class="lineno"> 33</span> <span class="preprocessor"></span><span class="preprocessor">#include "<a class="code" href="config_8h.html">polarssl/config.h</a>"</span></div> <div class="line"><a name="l00034"></a><span class="lineno"> 34</span> <span class="preprocessor">#else</span></div> <div class="line"><a name="l00035"></a><span class="lineno"> 35</span> <span class="preprocessor"></span><span class="preprocessor">#include POLARSSL_CONFIG_FILE</span></div> <div class="line"><a name="l00036"></a><span class="lineno"> 36</span> <span class="preprocessor"></span><span class="preprocessor">#endif</span></div> <div class="line"><a name="l00037"></a><span class="lineno"> 37</span> <span class="preprocessor"></span></div> <div class="line"><a name="l00038"></a><span class="lineno"> 38</span> <span class="preprocessor">#if defined(POLARSSL_ECDSA_C)</span></div> <div class="line"><a name="l00039"></a><span class="lineno"> 39</span> <span class="preprocessor"></span></div> <div class="line"><a name="l00040"></a><span class="lineno"> 40</span> <span class="preprocessor">#include "<a class="code" href="ecdsa_8h.html">polarssl/ecdsa.h</a>"</span></div> <div class="line"><a name="l00041"></a><span class="lineno"> 41</span> <span class="preprocessor">#include "<a class="code" href="asn1write_8h.html">polarssl/asn1write.h</a>"</span></div> <div class="line"><a name="l00042"></a><span class="lineno"> 42</span> </div> <div class="line"><a name="l00043"></a><span class="lineno"> 43</span> <span class="preprocessor">#if defined(POLARSSL_ECDSA_DETERMINISTIC)</span></div> <div class="line"><a name="l00044"></a><span class="lineno"> 44</span> <span class="preprocessor"></span><span class="preprocessor">#include "<a class="code" href="hmac__drbg_8h.html">polarssl/hmac_drbg.h</a>"</span></div> <div class="line"><a name="l00045"></a><span class="lineno"> 45</span> <span class="preprocessor">#endif</span></div> <div class="line"><a name="l00046"></a><span class="lineno"> 46</span> <span class="preprocessor"></span></div> <div class="line"><a name="l00047"></a><span class="lineno"> 47</span> <span class="preprocessor">#if defined(POLARSSL_ECDSA_DETERMINISTIC)</span></div> <div class="line"><a name="l00048"></a><span class="lineno"> 48</span> <span class="preprocessor"></span><span class="comment">/*</span></div> <div class="line"><a name="l00049"></a><span class="lineno"> 49</span> <span class="comment"> * This a hopefully temporary compatibility function.</span></div> <div class="line"><a name="l00050"></a><span class="lineno"> 50</span> <span class="comment"> *</span></div> <div class="line"><a name="l00051"></a><span class="lineno"> 51</span> <span class="comment"> * Since we can't ensure the caller will pass a valid md_alg before the next</span></div> <div class="line"><a name="l00052"></a><span class="lineno"> 52</span> <span class="comment"> * interface change, try to pick up a decent md by size.</span></div> <div class="line"><a name="l00053"></a><span class="lineno"> 53</span> <span class="comment"> *</span></div> <div class="line"><a name="l00054"></a><span class="lineno"> 54</span> <span class="comment"> * Argument is the minimum size in bytes of the MD output.</span></div> <div class="line"><a name="l00055"></a><span class="lineno"> 55</span> <span class="comment"> */</span></div> <div class="line"><a name="l00056"></a><span class="lineno"> 56</span> <span class="keyword">static</span> <span class="keyword">const</span> <a class="code" href="structmd__info__t.html">md_info_t</a> *md_info_by_size( <span class="keywordtype">size_t</span> min_size )</div> <div class="line"><a name="l00057"></a><span class="lineno"> 57</span> {</div> <div class="line"><a name="l00058"></a><span class="lineno"> 58</span>  <span class="keyword">const</span> <a class="code" href="structmd__info__t.html">md_info_t</a> *md_cur, *md_picked = NULL;</div> <div class="line"><a name="l00059"></a><span class="lineno"> 59</span>  <span class="keyword">const</span> <span class="keywordtype">int</span> *md_alg;</div> <div class="line"><a name="l00060"></a><span class="lineno"> 60</span> </div> <div class="line"><a name="l00061"></a><span class="lineno"> 61</span>  <span class="keywordflow">for</span>( md_alg = <a class="code" href="md_8h.html#a5d1f7e44d913c6621403773374b89b3e">md_list</a>(); *md_alg != 0; md_alg++ )</div> <div class="line"><a name="l00062"></a><span class="lineno"> 62</span>  {</div> <div class="line"><a name="l00063"></a><span class="lineno"> 63</span>  <span class="keywordflow">if</span>( ( md_cur = <a class="code" href="md_8h.html#a622c94870533dc68f54b8df520d2c6d9">md_info_from_type</a>( *md_alg ) ) == NULL ||</div> <div class="line"><a name="l00064"></a><span class="lineno"> 64</span>  (<span class="keywordtype">size_t</span>) md_cur-><a class="code" href="structmd__info__t.html#aedb1e12797791c9b7f5545bda6e3172d">size</a> < min_size ||</div> <div class="line"><a name="l00065"></a><span class="lineno"> 65</span>  ( md_picked != NULL && md_cur-><a class="code" href="structmd__info__t.html#aedb1e12797791c9b7f5545bda6e3172d">size</a> > md_picked-><a class="code" href="structmd__info__t.html#aedb1e12797791c9b7f5545bda6e3172d">size</a> ) )</div> <div class="line"><a name="l00066"></a><span class="lineno"> 66</span>  <span class="keywordflow">continue</span>;</div> <div class="line"><a name="l00067"></a><span class="lineno"> 67</span> </div> <div class="line"><a name="l00068"></a><span class="lineno"> 68</span>  md_picked = md_cur;</div> <div class="line"><a name="l00069"></a><span class="lineno"> 69</span>  }</div> <div class="line"><a name="l00070"></a><span class="lineno"> 70</span> </div> <div class="line"><a name="l00071"></a><span class="lineno"> 71</span>  <span class="keywordflow">return</span>( md_picked );</div> <div class="line"><a name="l00072"></a><span class="lineno"> 72</span> }</div> <div class="line"><a name="l00073"></a><span class="lineno"> 73</span> <span class="preprocessor">#endif </span><span class="comment">/* POLARSSL_ECDSA_DETERMINISTIC */</span><span class="preprocessor"></span></div> <div class="line"><a name="l00074"></a><span class="lineno"> 74</span> <span class="preprocessor"></span></div> <div class="line"><a name="l00075"></a><span class="lineno"> 75</span> <span class="comment">/*</span></div> <div class="line"><a name="l00076"></a><span class="lineno"> 76</span> <span class="comment"> * Derive a suitable integer for group grp from a buffer of length len</span></div> <div class="line"><a name="l00077"></a><span class="lineno"> 77</span> <span class="comment"> * SEC1 4.1.3 step 5 aka SEC1 4.1.4 step 3</span></div> <div class="line"><a name="l00078"></a><span class="lineno"> 78</span> <span class="comment"> */</span></div> <div class="line"><a name="l00079"></a><span class="lineno"> 79</span> <span class="keyword">static</span> <span class="keywordtype">int</span> derive_mpi( <span class="keyword">const</span> <a class="code" href="structecp__group.html">ecp_group</a> *grp, <a class="code" href="structmpi.html">mpi</a> *x,</div> <div class="line"><a name="l00080"></a><span class="lineno"> 80</span>  <span class="keyword">const</span> <span class="keywordtype">unsigned</span> <span class="keywordtype">char</span> *buf, <span class="keywordtype">size_t</span> blen )</div> <div class="line"><a name="l00081"></a><span class="lineno"> 81</span> {</div> <div class="line"><a name="l00082"></a><span class="lineno"> 82</span>  <span class="keywordtype">int</span> ret;</div> <div class="line"><a name="l00083"></a><span class="lineno"> 83</span>  <span class="keywordtype">size_t</span> n_size = ( grp-><a class="code" href="structecp__group.html#a372ef0b2cbf3232760e108e5b97c8a3e">nbits</a> + 7 ) / 8;</div> <div class="line"><a name="l00084"></a><span class="lineno"> 84</span>  <span class="keywordtype">size_t</span> use_size = blen > n_size ? n_size : blen;</div> <div class="line"><a name="l00085"></a><span class="lineno"> 85</span> </div> <div class="line"><a name="l00086"></a><span class="lineno"> 86</span>  <a class="code" href="bignum_8h.html#a024b186dd3608bcbcfc9dd36212a18ec">MPI_CHK</a>( <a class="code" href="bignum_8h.html#a0235008cccbf00b8bc03699de8094819">mpi_read_binary</a>( x, buf, use_size ) );</div> <div class="line"><a name="l00087"></a><span class="lineno"> 87</span>  <span class="keywordflow">if</span>( use_size * 8 > grp-><a class="code" href="structecp__group.html#a372ef0b2cbf3232760e108e5b97c8a3e">nbits</a> )</div> <div class="line"><a name="l00088"></a><span class="lineno"> 88</span>  <a class="code" href="bignum_8h.html#a024b186dd3608bcbcfc9dd36212a18ec">MPI_CHK</a>( <a class="code" href="bignum_8h.html#a01de1543da79d0ad0f58916d608f6ff8">mpi_shift_r</a>( x, use_size * 8 - grp-><a class="code" href="structecp__group.html#a372ef0b2cbf3232760e108e5b97c8a3e">nbits</a> ) );</div> <div class="line"><a name="l00089"></a><span class="lineno"> 89</span> </div> <div class="line"><a name="l00090"></a><span class="lineno"> 90</span>  <span class="comment">/* While at it, reduce modulo N */</span></div> <div class="line"><a name="l00091"></a><span class="lineno"> 91</span>  <span class="keywordflow">if</span>( <a class="code" href="bignum_8h.html#aec20dff9d78738e3c80b212df9875b83">mpi_cmp_mpi</a>( x, &grp-><a class="code" href="structecp__group.html#a6b424e0dbad7d3c900375a2ff0154b95">N</a> ) >= 0 )</div> <div class="line"><a name="l00092"></a><span class="lineno"> 92</span>  <a class="code" href="bignum_8h.html#a024b186dd3608bcbcfc9dd36212a18ec">MPI_CHK</a>( <a class="code" href="bignum_8h.html#a149a13ed93fddb432fb5edd3126b1186">mpi_sub_mpi</a>( x, x, &grp-><a class="code" href="structecp__group.html#a6b424e0dbad7d3c900375a2ff0154b95">N</a> ) );</div> <div class="line"><a name="l00093"></a><span class="lineno"> 93</span> </div> <div class="line"><a name="l00094"></a><span class="lineno"> 94</span> cleanup:</div> <div class="line"><a name="l00095"></a><span class="lineno"> 95</span>  <span class="keywordflow">return</span>( ret );</div> <div class="line"><a name="l00096"></a><span class="lineno"> 96</span> }</div> <div class="line"><a name="l00097"></a><span class="lineno"> 97</span> </div> <div class="line"><a name="l00098"></a><span class="lineno"> 98</span> <span class="comment">/*</span></div> <div class="line"><a name="l00099"></a><span class="lineno"> 99</span> <span class="comment"> * Compute ECDSA signature of a hashed message (SEC1 4.1.3)</span></div> <div class="line"><a name="l00100"></a><span class="lineno"> 100</span> <span class="comment"> * Obviously, compared to SEC1 4.1.3, we skip step 4 (hash message)</span></div> <div class="line"><a name="l00101"></a><span class="lineno"> 101</span> <span class="comment"> */</span></div> <div class="line"><a name="l00102"></a><span class="lineno"> 102</span> <span class="keywordtype">int</span> <a class="code" href="ecdsa_8h.html#a5a5858bde5c49005fefbe74883fc9a9d">ecdsa_sign</a>( <a class="code" href="structecp__group.html">ecp_group</a> *grp, <a class="code" href="structmpi.html">mpi</a> *r, <a class="code" href="structmpi.html">mpi</a> *s,</div> <div class="line"><a name="l00103"></a><span class="lineno"> 103</span>  <span class="keyword">const</span> <a class="code" href="structmpi.html">mpi</a> *d, <span class="keyword">const</span> <span class="keywordtype">unsigned</span> <span class="keywordtype">char</span> *buf, <span class="keywordtype">size_t</span> blen,</div> <div class="line"><a name="l00104"></a><span class="lineno"> 104</span>  <span class="keywordtype">int</span> (*f_rng)(<span class="keywordtype">void</span> *, <span class="keywordtype">unsigned</span> <span class="keywordtype">char</span> *, <span class="keywordtype">size_t</span>), <span class="keywordtype">void</span> *p_rng )</div> <div class="line"><a name="l00105"></a><span class="lineno"> 105</span> {</div> <div class="line"><a name="l00106"></a><span class="lineno"> 106</span>  <span class="keywordtype">int</span> ret, key_tries, sign_tries, blind_tries;</div> <div class="line"><a name="l00107"></a><span class="lineno"> 107</span>  <a class="code" href="structecp__point.html">ecp_point</a> R;</div> <div class="line"><a name="l00108"></a><span class="lineno"> 108</span>  <a class="code" href="structmpi.html">mpi</a> k, e, t;</div> <div class="line"><a name="l00109"></a><span class="lineno"> 109</span> </div> <div class="line"><a name="l00110"></a><span class="lineno"> 110</span>  <span class="comment">/* Fail cleanly on curves such as Curve25519 that can't be used for ECDSA */</span></div> <div class="line"><a name="l00111"></a><span class="lineno"> 111</span>  <span class="keywordflow">if</span>( grp-><a class="code" href="structecp__group.html#a6b424e0dbad7d3c900375a2ff0154b95">N</a>.<a class="code" href="structmpi.html#aaeeabe339c1cc40d05bdb026666404f8">p</a> == NULL )</div> <div class="line"><a name="l00112"></a><span class="lineno"> 112</span>  <span class="keywordflow">return</span>( <a class="code" href="ecp_8h.html#a59e5b00eddc35acbb507340379c4d056">POLARSSL_ERR_ECP_BAD_INPUT_DATA</a> );</div> <div class="line"><a name="l00113"></a><span class="lineno"> 113</span> </div> <div class="line"><a name="l00114"></a><span class="lineno"> 114</span>  <a class="code" href="ecp_8h.html#a870fd59435f6519b4027050afe24fc7c">ecp_point_init</a>( &R );</div> <div class="line"><a name="l00115"></a><span class="lineno"> 115</span>  <a class="code" href="bignum_8h.html#a201666869f65225d6535bcc697f95c9b">mpi_init</a>( &k ); <a class="code" href="bignum_8h.html#a201666869f65225d6535bcc697f95c9b">mpi_init</a>( &e ); <a class="code" href="bignum_8h.html#a201666869f65225d6535bcc697f95c9b">mpi_init</a>( &t );</div> <div class="line"><a name="l00116"></a><span class="lineno"> 116</span> </div> <div class="line"><a name="l00117"></a><span class="lineno"> 117</span>  sign_tries = 0;</div> <div class="line"><a name="l00118"></a><span class="lineno"> 118</span>  <span class="keywordflow">do</span></div> <div class="line"><a name="l00119"></a><span class="lineno"> 119</span>  {</div> <div class="line"><a name="l00120"></a><span class="lineno"> 120</span>  <span class="comment">/*</span></div> <div class="line"><a name="l00121"></a><span class="lineno"> 121</span> <span class="comment"> * Steps 1-3: generate a suitable ephemeral keypair</span></div> <div class="line"><a name="l00122"></a><span class="lineno"> 122</span> <span class="comment"> * and set r = xR mod n</span></div> <div class="line"><a name="l00123"></a><span class="lineno"> 123</span> <span class="comment"> */</span></div> <div class="line"><a name="l00124"></a><span class="lineno"> 124</span>  key_tries = 0;</div> <div class="line"><a name="l00125"></a><span class="lineno"> 125</span>  <span class="keywordflow">do</span></div> <div class="line"><a name="l00126"></a><span class="lineno"> 126</span>  {</div> <div class="line"><a name="l00127"></a><span class="lineno"> 127</span>  <a class="code" href="bignum_8h.html#a024b186dd3608bcbcfc9dd36212a18ec">MPI_CHK</a>( <a class="code" href="ecp_8h.html#aaf7e6813178463e3ebb15b0719d1d30a">ecp_gen_keypair</a>( grp, &k, &R, f_rng, p_rng ) );</div> <div class="line"><a name="l00128"></a><span class="lineno"> 128</span>  <a class="code" href="bignum_8h.html#a024b186dd3608bcbcfc9dd36212a18ec">MPI_CHK</a>( <a class="code" href="bignum_8h.html#a075d3cf21cb3733e5f0a872e72b0cd15">mpi_mod_mpi</a>( r, &R.<a class="code" href="structecp__point.html#ad22ad099567064b38af5a1f2f58f0acc">X</a>, &grp-><a class="code" href="structecp__group.html#a6b424e0dbad7d3c900375a2ff0154b95">N</a> ) );</div> <div class="line"><a name="l00129"></a><span class="lineno"> 129</span> </div> <div class="line"><a name="l00130"></a><span class="lineno"> 130</span>  <span class="keywordflow">if</span>( key_tries++ > 10 )</div> <div class="line"><a name="l00131"></a><span class="lineno"> 131</span>  {</div> <div class="line"><a name="l00132"></a><span class="lineno"> 132</span>  ret = <a class="code" href="ecp_8h.html#a8de4c3d074d63c08f314012b604c98c8">POLARSSL_ERR_ECP_RANDOM_FAILED</a>;</div> <div class="line"><a name="l00133"></a><span class="lineno"> 133</span>  <span class="keywordflow">goto</span> cleanup;</div> <div class="line"><a name="l00134"></a><span class="lineno"> 134</span>  }</div> <div class="line"><a name="l00135"></a><span class="lineno"> 135</span>  }</div> <div class="line"><a name="l00136"></a><span class="lineno"> 136</span>  <span class="keywordflow">while</span>( <a class="code" href="bignum_8h.html#aee6dc030f0fa278c1576c457088b4910">mpi_cmp_int</a>( r, 0 ) == 0 );</div> <div class="line"><a name="l00137"></a><span class="lineno"> 137</span> </div> <div class="line"><a name="l00138"></a><span class="lineno"> 138</span>  <span class="comment">/*</span></div> <div class="line"><a name="l00139"></a><span class="lineno"> 139</span> <span class="comment"> * Step 5: derive MPI from hashed message</span></div> <div class="line"><a name="l00140"></a><span class="lineno"> 140</span> <span class="comment"> */</span></div> <div class="line"><a name="l00141"></a><span class="lineno"> 141</span>  <a class="code" href="bignum_8h.html#a024b186dd3608bcbcfc9dd36212a18ec">MPI_CHK</a>( derive_mpi( grp, &e, buf, blen ) );</div> <div class="line"><a name="l00142"></a><span class="lineno"> 142</span> </div> <div class="line"><a name="l00143"></a><span class="lineno"> 143</span>  <span class="comment">/*</span></div> <div class="line"><a name="l00144"></a><span class="lineno"> 144</span> <span class="comment"> * Generate a random value to blind inv_mod in next step,</span></div> <div class="line"><a name="l00145"></a><span class="lineno"> 145</span> <span class="comment"> * avoiding a potential timing leak.</span></div> <div class="line"><a name="l00146"></a><span class="lineno"> 146</span> <span class="comment"> */</span></div> <div class="line"><a name="l00147"></a><span class="lineno"> 147</span>  blind_tries = 0;</div> <div class="line"><a name="l00148"></a><span class="lineno"> 148</span>  <span class="keywordflow">do</span></div> <div class="line"><a name="l00149"></a><span class="lineno"> 149</span>  {</div> <div class="line"><a name="l00150"></a><span class="lineno"> 150</span>  <span class="keywordtype">size_t</span> n_size = ( grp-><a class="code" href="structecp__group.html#a372ef0b2cbf3232760e108e5b97c8a3e">nbits</a> + 7 ) / 8;</div> <div class="line"><a name="l00151"></a><span class="lineno"> 151</span>  <a class="code" href="bignum_8h.html#a024b186dd3608bcbcfc9dd36212a18ec">MPI_CHK</a>( <a class="code" href="bignum_8h.html#a5ac8858041a8d5b49c11d38fd4069975">mpi_fill_random</a>( &t, n_size, f_rng, p_rng ) );</div> <div class="line"><a name="l00152"></a><span class="lineno"> 152</span>  <a class="code" href="bignum_8h.html#a024b186dd3608bcbcfc9dd36212a18ec">MPI_CHK</a>( <a class="code" href="bignum_8h.html#a01de1543da79d0ad0f58916d608f6ff8">mpi_shift_r</a>( &t, 8 * n_size - grp-><a class="code" href="structecp__group.html#a372ef0b2cbf3232760e108e5b97c8a3e">nbits</a> ) );</div> <div class="line"><a name="l00153"></a><span class="lineno"> 153</span> </div> <div class="line"><a name="l00154"></a><span class="lineno"> 154</span>  <span class="comment">/* See ecp_gen_keypair() */</span></div> <div class="line"><a name="l00155"></a><span class="lineno"> 155</span>  <span class="keywordflow">if</span>( ++blind_tries > 30 )</div> <div class="line"><a name="l00156"></a><span class="lineno"> 156</span>  <span class="keywordflow">return</span>( <a class="code" href="ecp_8h.html#a8de4c3d074d63c08f314012b604c98c8">POLARSSL_ERR_ECP_RANDOM_FAILED</a> );</div> <div class="line"><a name="l00157"></a><span class="lineno"> 157</span>  }</div> <div class="line"><a name="l00158"></a><span class="lineno"> 158</span>  <span class="keywordflow">while</span>( <a class="code" href="bignum_8h.html#aee6dc030f0fa278c1576c457088b4910">mpi_cmp_int</a>( &t, 1 ) < 0 ||</div> <div class="line"><a name="l00159"></a><span class="lineno"> 159</span>  <a class="code" href="bignum_8h.html#aec20dff9d78738e3c80b212df9875b83">mpi_cmp_mpi</a>( &t, &grp-><a class="code" href="structecp__group.html#a6b424e0dbad7d3c900375a2ff0154b95">N</a> ) >= 0 );</div> <div class="line"><a name="l00160"></a><span class="lineno"> 160</span> </div> <div class="line"><a name="l00161"></a><span class="lineno"> 161</span>  <span class="comment">/*</span></div> <div class="line"><a name="l00162"></a><span class="lineno"> 162</span> <span class="comment"> * Step 6: compute s = (e + r * d) / k = t (e + rd) / (kt) mod n</span></div> <div class="line"><a name="l00163"></a><span class="lineno"> 163</span> <span class="comment"> */</span></div> <div class="line"><a name="l00164"></a><span class="lineno"> 164</span>  <a class="code" href="bignum_8h.html#a024b186dd3608bcbcfc9dd36212a18ec">MPI_CHK</a>( <a class="code" href="bignum_8h.html#ab63bfb07b27db84268491cd7d68bddc0">mpi_mul_mpi</a>( s, r, d ) );</div> <div class="line"><a name="l00165"></a><span class="lineno"> 165</span>  <a class="code" href="bignum_8h.html#a024b186dd3608bcbcfc9dd36212a18ec">MPI_CHK</a>( <a class="code" href="bignum_8h.html#adf5b20e8d8c0a660e4f59f859a0bee18">mpi_add_mpi</a>( &e, &e, s ) );</div> <div class="line"><a name="l00166"></a><span class="lineno"> 166</span>  <a class="code" href="bignum_8h.html#a024b186dd3608bcbcfc9dd36212a18ec">MPI_CHK</a>( <a class="code" href="bignum_8h.html#ab63bfb07b27db84268491cd7d68bddc0">mpi_mul_mpi</a>( &e, &e, &t ) );</div> <div class="line"><a name="l00167"></a><span class="lineno"> 167</span>  <a class="code" href="bignum_8h.html#a024b186dd3608bcbcfc9dd36212a18ec">MPI_CHK</a>( <a class="code" href="bignum_8h.html#ab63bfb07b27db84268491cd7d68bddc0">mpi_mul_mpi</a>( &k, &k, &t ) );</div> <div class="line"><a name="l00168"></a><span class="lineno"> 168</span>  <a class="code" href="bignum_8h.html#a024b186dd3608bcbcfc9dd36212a18ec">MPI_CHK</a>( <a class="code" href="bignum_8h.html#a090616da16b87653c025874e1675da79">mpi_inv_mod</a>( s, &k, &grp-><a class="code" href="structecp__group.html#a6b424e0dbad7d3c900375a2ff0154b95">N</a> ) );</div> <div class="line"><a name="l00169"></a><span class="lineno"> 169</span>  <a class="code" href="bignum_8h.html#a024b186dd3608bcbcfc9dd36212a18ec">MPI_CHK</a>( <a class="code" href="bignum_8h.html#ab63bfb07b27db84268491cd7d68bddc0">mpi_mul_mpi</a>( s, s, &e ) );</div> <div class="line"><a name="l00170"></a><span class="lineno"> 170</span>  <a class="code" href="bignum_8h.html#a024b186dd3608bcbcfc9dd36212a18ec">MPI_CHK</a>( <a class="code" href="bignum_8h.html#a075d3cf21cb3733e5f0a872e72b0cd15">mpi_mod_mpi</a>( s, s, &grp-><a class="code" href="structecp__group.html#a6b424e0dbad7d3c900375a2ff0154b95">N</a> ) );</div> <div class="line"><a name="l00171"></a><span class="lineno"> 171</span> </div> <div class="line"><a name="l00172"></a><span class="lineno"> 172</span>  <span class="keywordflow">if</span>( sign_tries++ > 10 )</div> <div class="line"><a name="l00173"></a><span class="lineno"> 173</span>  {</div> <div class="line"><a name="l00174"></a><span class="lineno"> 174</span>  ret = <a class="code" href="ecp_8h.html#a8de4c3d074d63c08f314012b604c98c8">POLARSSL_ERR_ECP_RANDOM_FAILED</a>;</div> <div class="line"><a name="l00175"></a><span class="lineno"> 175</span>  <span class="keywordflow">goto</span> cleanup;</div> <div class="line"><a name="l00176"></a><span class="lineno"> 176</span>  }</div> <div class="line"><a name="l00177"></a><span class="lineno"> 177</span>  }</div> <div class="line"><a name="l00178"></a><span class="lineno"> 178</span>  <span class="keywordflow">while</span>( <a class="code" href="bignum_8h.html#aee6dc030f0fa278c1576c457088b4910">mpi_cmp_int</a>( s, 0 ) == 0 );</div> <div class="line"><a name="l00179"></a><span class="lineno"> 179</span> </div> <div class="line"><a name="l00180"></a><span class="lineno"> 180</span> cleanup:</div> <div class="line"><a name="l00181"></a><span class="lineno"> 181</span>  <a class="code" href="ecp_8h.html#a6a949f9b9194bbf02dc83d3aa0c61567">ecp_point_free</a>( &R );</div> <div class="line"><a name="l00182"></a><span class="lineno"> 182</span>  <a class="code" href="bignum_8h.html#ae1f6507671587755e46bbf0afcae6a8c">mpi_free</a>( &k ); <a class="code" href="bignum_8h.html#ae1f6507671587755e46bbf0afcae6a8c">mpi_free</a>( &e ); <a class="code" href="bignum_8h.html#ae1f6507671587755e46bbf0afcae6a8c">mpi_free</a>( &t );</div> <div class="line"><a name="l00183"></a><span class="lineno"> 183</span> </div> <div class="line"><a name="l00184"></a><span class="lineno"> 184</span>  <span class="keywordflow">return</span>( ret );</div> <div class="line"><a name="l00185"></a><span class="lineno"> 185</span> }</div> <div class="line"><a name="l00186"></a><span class="lineno"> 186</span> </div> <div class="line"><a name="l00187"></a><span class="lineno"> 187</span> <span class="preprocessor">#if defined(POLARSSL_ECDSA_DETERMINISTIC)</span></div> <div class="line"><a name="l00188"></a><span class="lineno"> 188</span> <span class="preprocessor"></span><span class="comment">/*</span></div> <div class="line"><a name="l00189"></a><span class="lineno"> 189</span> <span class="comment"> * Deterministic signature wrapper</span></div> <div class="line"><a name="l00190"></a><span class="lineno"> 190</span> <span class="comment"> */</span></div> <div class="line"><a name="l00191"></a><span class="lineno"> 191</span> <span class="keywordtype">int</span> <a class="code" href="ecdsa_8h.html#af633a283f02fb3381354dc857a5cef43">ecdsa_sign_det</a>( <a class="code" href="structecp__group.html">ecp_group</a> *grp, <a class="code" href="structmpi.html">mpi</a> *r, <a class="code" href="structmpi.html">mpi</a> *s,</div> <div class="line"><a name="l00192"></a><span class="lineno"> 192</span>  <span class="keyword">const</span> <a class="code" href="structmpi.html">mpi</a> *d, <span class="keyword">const</span> <span class="keywordtype">unsigned</span> <span class="keywordtype">char</span> *buf, <span class="keywordtype">size_t</span> blen,</div> <div class="line"><a name="l00193"></a><span class="lineno"> 193</span>  <a class="code" href="md_8h.html#af1fbbb67afa0daee4090cde8864e0b68">md_type_t</a> md_alg )</div> <div class="line"><a name="l00194"></a><span class="lineno"> 194</span> {</div> <div class="line"><a name="l00195"></a><span class="lineno"> 195</span>  <span class="keywordtype">int</span> ret;</div> <div class="line"><a name="l00196"></a><span class="lineno"> 196</span>  <a class="code" href="structhmac__drbg__context.html">hmac_drbg_context</a> rng_ctx;</div> <div class="line"><a name="l00197"></a><span class="lineno"> 197</span>  <span class="keywordtype">unsigned</span> <span class="keywordtype">char</span> data[2 * <a class="code" href="ecp_8h.html#a1ef9d88cd3a37a2fef0267d1dfe72510">POLARSSL_ECP_MAX_BYTES</a>];</div> <div class="line"><a name="l00198"></a><span class="lineno"> 198</span>  <span class="keywordtype">size_t</span> grp_len = ( grp-><a class="code" href="structecp__group.html#a372ef0b2cbf3232760e108e5b97c8a3e">nbits</a> + 7 ) / 8;</div> <div class="line"><a name="l00199"></a><span class="lineno"> 199</span>  <span class="keyword">const</span> <a class="code" href="structmd__info__t.html">md_info_t</a> *md_info;</div> <div class="line"><a name="l00200"></a><span class="lineno"> 200</span>  <a class="code" href="structmpi.html">mpi</a> h;</div> <div class="line"><a name="l00201"></a><span class="lineno"> 201</span> </div> <div class="line"><a name="l00202"></a><span class="lineno"> 202</span>  <span class="comment">/* Temporary fallback */</span></div> <div class="line"><a name="l00203"></a><span class="lineno"> 203</span>  <span class="keywordflow">if</span>( md_alg == <a class="code" href="md_8h.html#af1fbbb67afa0daee4090cde8864e0b68a1058b903a7b49716f1b75cca6e80c4e8">POLARSSL_MD_NONE</a> )</div> <div class="line"><a name="l00204"></a><span class="lineno"> 204</span>  md_info = md_info_by_size( blen );</div> <div class="line"><a name="l00205"></a><span class="lineno"> 205</span>  <span class="keywordflow">else</span></div> <div class="line"><a name="l00206"></a><span class="lineno"> 206</span>  md_info = <a class="code" href="md_8h.html#a622c94870533dc68f54b8df520d2c6d9">md_info_from_type</a>( md_alg );</div> <div class="line"><a name="l00207"></a><span class="lineno"> 207</span> </div> <div class="line"><a name="l00208"></a><span class="lineno"> 208</span>  <span class="keywordflow">if</span>( md_info == NULL )</div> <div class="line"><a name="l00209"></a><span class="lineno"> 209</span>  <span class="keywordflow">return</span>( <a class="code" href="ecp_8h.html#a59e5b00eddc35acbb507340379c4d056">POLARSSL_ERR_ECP_BAD_INPUT_DATA</a> );</div> <div class="line"><a name="l00210"></a><span class="lineno"> 210</span> </div> <div class="line"><a name="l00211"></a><span class="lineno"> 211</span>  <a class="code" href="bignum_8h.html#a201666869f65225d6535bcc697f95c9b">mpi_init</a>( &h );</div> <div class="line"><a name="l00212"></a><span class="lineno"> 212</span>  memset( &rng_ctx, 0, <span class="keyword">sizeof</span>( <a class="code" href="structhmac__drbg__context.html">hmac_drbg_context</a> ) );</div> <div class="line"><a name="l00213"></a><span class="lineno"> 213</span> </div> <div class="line"><a name="l00214"></a><span class="lineno"> 214</span>  <span class="comment">/* Use private key and message hash (reduced) to initialize HMAC_DRBG */</span></div> <div class="line"><a name="l00215"></a><span class="lineno"> 215</span>  <a class="code" href="bignum_8h.html#a024b186dd3608bcbcfc9dd36212a18ec">MPI_CHK</a>( <a class="code" href="bignum_8h.html#a5d464b4312859ce4969d114eb5e02741">mpi_write_binary</a>( d, data, grp_len ) );</div> <div class="line"><a name="l00216"></a><span class="lineno"> 216</span>  <a class="code" href="bignum_8h.html#a024b186dd3608bcbcfc9dd36212a18ec">MPI_CHK</a>( derive_mpi( grp, &h, buf, blen ) );</div> <div class="line"><a name="l00217"></a><span class="lineno"> 217</span>  <a class="code" href="bignum_8h.html#a024b186dd3608bcbcfc9dd36212a18ec">MPI_CHK</a>( <a class="code" href="bignum_8h.html#a5d464b4312859ce4969d114eb5e02741">mpi_write_binary</a>( &h, data + grp_len, grp_len ) );</div> <div class="line"><a name="l00218"></a><span class="lineno"> 218</span>  <a class="code" href="hmac__drbg_8h.html#acd163a15df844543ab5b950f4d13d65f">hmac_drbg_init_buf</a>( &rng_ctx, md_info, data, 2 * grp_len );</div> <div class="line"><a name="l00219"></a><span class="lineno"> 219</span> </div> <div class="line"><a name="l00220"></a><span class="lineno"> 220</span>  ret = <a class="code" href="ecdsa_8h.html#a5a5858bde5c49005fefbe74883fc9a9d">ecdsa_sign</a>( grp, r, s, d, buf, blen,</div> <div class="line"><a name="l00221"></a><span class="lineno"> 221</span>  <a class="code" href="hmac__drbg_8h.html#ab2f1d201eaba90dc66b7033fa87c1eb9">hmac_drbg_random</a>, &rng_ctx );</div> <div class="line"><a name="l00222"></a><span class="lineno"> 222</span> </div> <div class="line"><a name="l00223"></a><span class="lineno"> 223</span> cleanup:</div> <div class="line"><a name="l00224"></a><span class="lineno"> 224</span>  <a class="code" href="hmac__drbg_8h.html#a3a0bf86f3afd2e39cbb3c3a08faf5e44">hmac_drbg_free</a>( &rng_ctx );</div> <div class="line"><a name="l00225"></a><span class="lineno"> 225</span>  <a class="code" href="bignum_8h.html#ae1f6507671587755e46bbf0afcae6a8c">mpi_free</a>( &h );</div> <div class="line"><a name="l00226"></a><span class="lineno"> 226</span> </div> <div class="line"><a name="l00227"></a><span class="lineno"> 227</span>  <span class="keywordflow">return</span>( ret );</div> <div class="line"><a name="l00228"></a><span class="lineno"> 228</span> }</div> <div class="line"><a name="l00229"></a><span class="lineno"> 229</span> <span class="preprocessor">#endif </span><span class="comment">/* POLARSSL_ECDSA_DETERMINISTIC */</span><span class="preprocessor"></span></div> <div class="line"><a name="l00230"></a><span class="lineno"> 230</span> <span class="preprocessor"></span></div> <div class="line"><a name="l00231"></a><span class="lineno"> 231</span> <span class="comment">/*</span></div> <div class="line"><a name="l00232"></a><span class="lineno"> 232</span> <span class="comment"> * Verify ECDSA signature of hashed message (SEC1 4.1.4)</span></div> <div class="line"><a name="l00233"></a><span class="lineno"> 233</span> <span class="comment"> * Obviously, compared to SEC1 4.1.3, we skip step 2 (hash message)</span></div> <div class="line"><a name="l00234"></a><span class="lineno"> 234</span> <span class="comment"> */</span></div> <div class="line"><a name="l00235"></a><span class="lineno"> 235</span> <span class="keywordtype">int</span> <a class="code" href="ecdsa_8h.html#a9f54b1d3ff1cef8dec1051016eace9e6">ecdsa_verify</a>( <a class="code" href="structecp__group.html">ecp_group</a> *grp,</div> <div class="line"><a name="l00236"></a><span class="lineno"> 236</span>  <span class="keyword">const</span> <span class="keywordtype">unsigned</span> <span class="keywordtype">char</span> *buf, <span class="keywordtype">size_t</span> blen,</div> <div class="line"><a name="l00237"></a><span class="lineno"> 237</span>  <span class="keyword">const</span> <a class="code" href="structecp__point.html">ecp_point</a> *Q, <span class="keyword">const</span> <a class="code" href="structmpi.html">mpi</a> *r, <span class="keyword">const</span> <a class="code" href="structmpi.html">mpi</a> *s)</div> <div class="line"><a name="l00238"></a><span class="lineno"> 238</span> {</div> <div class="line"><a name="l00239"></a><span class="lineno"> 239</span>  <span class="keywordtype">int</span> ret;</div> <div class="line"><a name="l00240"></a><span class="lineno"> 240</span>  <a class="code" href="structmpi.html">mpi</a> e, s_inv, u1, u2;</div> <div class="line"><a name="l00241"></a><span class="lineno"> 241</span>  <a class="code" href="structecp__point.html">ecp_point</a> R, P;</div> <div class="line"><a name="l00242"></a><span class="lineno"> 242</span> </div> <div class="line"><a name="l00243"></a><span class="lineno"> 243</span>  <a class="code" href="ecp_8h.html#a870fd59435f6519b4027050afe24fc7c">ecp_point_init</a>( &R ); <a class="code" href="ecp_8h.html#a870fd59435f6519b4027050afe24fc7c">ecp_point_init</a>( &P );</div> <div class="line"><a name="l00244"></a><span class="lineno"> 244</span>  <a class="code" href="bignum_8h.html#a201666869f65225d6535bcc697f95c9b">mpi_init</a>( &e ); <a class="code" href="bignum_8h.html#a201666869f65225d6535bcc697f95c9b">mpi_init</a>( &s_inv ); <a class="code" href="bignum_8h.html#a201666869f65225d6535bcc697f95c9b">mpi_init</a>( &u1 ); <a class="code" href="bignum_8h.html#a201666869f65225d6535bcc697f95c9b">mpi_init</a>( &u2 );</div> <div class="line"><a name="l00245"></a><span class="lineno"> 245</span> </div> <div class="line"><a name="l00246"></a><span class="lineno"> 246</span>  <span class="comment">/* Fail cleanly on curves such as Curve25519 that can't be used for ECDSA */</span></div> <div class="line"><a name="l00247"></a><span class="lineno"> 247</span>  <span class="keywordflow">if</span>( grp-><a class="code" href="structecp__group.html#a6b424e0dbad7d3c900375a2ff0154b95">N</a>.<a class="code" href="structmpi.html#aaeeabe339c1cc40d05bdb026666404f8">p</a> == NULL )</div> <div class="line"><a name="l00248"></a><span class="lineno"> 248</span>  <span class="keywordflow">return</span>( <a class="code" href="ecp_8h.html#a59e5b00eddc35acbb507340379c4d056">POLARSSL_ERR_ECP_BAD_INPUT_DATA</a> );</div> <div class="line"><a name="l00249"></a><span class="lineno"> 249</span> </div> <div class="line"><a name="l00250"></a><span class="lineno"> 250</span>  <span class="comment">/*</span></div> <div class="line"><a name="l00251"></a><span class="lineno"> 251</span> <span class="comment"> * Step 1: make sure r and s are in range 1..n-1</span></div> <div class="line"><a name="l00252"></a><span class="lineno"> 252</span> <span class="comment"> */</span></div> <div class="line"><a name="l00253"></a><span class="lineno"> 253</span>  <span class="keywordflow">if</span>( <a class="code" href="bignum_8h.html#aee6dc030f0fa278c1576c457088b4910">mpi_cmp_int</a>( r, 1 ) < 0 || <a class="code" href="bignum_8h.html#aec20dff9d78738e3c80b212df9875b83">mpi_cmp_mpi</a>( r, &grp-><a class="code" href="structecp__group.html#a6b424e0dbad7d3c900375a2ff0154b95">N</a> ) >= 0 ||</div> <div class="line"><a name="l00254"></a><span class="lineno"> 254</span>  <a class="code" href="bignum_8h.html#aee6dc030f0fa278c1576c457088b4910">mpi_cmp_int</a>( s, 1 ) < 0 || <a class="code" href="bignum_8h.html#aec20dff9d78738e3c80b212df9875b83">mpi_cmp_mpi</a>( s, &grp-><a class="code" href="structecp__group.html#a6b424e0dbad7d3c900375a2ff0154b95">N</a> ) >= 0 )</div> <div class="line"><a name="l00255"></a><span class="lineno"> 255</span>  {</div> <div class="line"><a name="l00256"></a><span class="lineno"> 256</span>  ret = <a class="code" href="ecp_8h.html#a250e37c379fd853d666415a8fc308e6e">POLARSSL_ERR_ECP_VERIFY_FAILED</a>;</div> <div class="line"><a name="l00257"></a><span class="lineno"> 257</span>  <span class="keywordflow">goto</span> cleanup;</div> <div class="line"><a name="l00258"></a><span class="lineno"> 258</span>  }</div> <div class="line"><a name="l00259"></a><span class="lineno"> 259</span> </div> <div class="line"><a name="l00260"></a><span class="lineno"> 260</span>  <span class="comment">/*</span></div> <div class="line"><a name="l00261"></a><span class="lineno"> 261</span> <span class="comment"> * Additional precaution: make sure Q is valid</span></div> <div class="line"><a name="l00262"></a><span class="lineno"> 262</span> <span class="comment"> */</span></div> <div class="line"><a name="l00263"></a><span class="lineno"> 263</span>  <a class="code" href="bignum_8h.html#a024b186dd3608bcbcfc9dd36212a18ec">MPI_CHK</a>( <a class="code" href="ecp_8h.html#a2b89dc1f1a90c6bd42fd1f927c2c6a13">ecp_check_pubkey</a>( grp, Q ) );</div> <div class="line"><a name="l00264"></a><span class="lineno"> 264</span> </div> <div class="line"><a name="l00265"></a><span class="lineno"> 265</span>  <span class="comment">/*</span></div> <div class="line"><a name="l00266"></a><span class="lineno"> 266</span> <span class="comment"> * Step 3: derive MPI from hashed message</span></div> <div class="line"><a name="l00267"></a><span class="lineno"> 267</span> <span class="comment"> */</span></div> <div class="line"><a name="l00268"></a><span class="lineno"> 268</span>  <a class="code" href="bignum_8h.html#a024b186dd3608bcbcfc9dd36212a18ec">MPI_CHK</a>( derive_mpi( grp, &e, buf, blen ) );</div> <div class="line"><a name="l00269"></a><span class="lineno"> 269</span> </div> <div class="line"><a name="l00270"></a><span class="lineno"> 270</span>  <span class="comment">/*</span></div> <div class="line"><a name="l00271"></a><span class="lineno"> 271</span> <span class="comment"> * Step 4: u1 = e / s mod n, u2 = r / s mod n</span></div> <div class="line"><a name="l00272"></a><span class="lineno"> 272</span> <span class="comment"> */</span></div> <div class="line"><a name="l00273"></a><span class="lineno"> 273</span>  <a class="code" href="bignum_8h.html#a024b186dd3608bcbcfc9dd36212a18ec">MPI_CHK</a>( <a class="code" href="bignum_8h.html#a090616da16b87653c025874e1675da79">mpi_inv_mod</a>( &s_inv, s, &grp-><a class="code" href="structecp__group.html#a6b424e0dbad7d3c900375a2ff0154b95">N</a> ) );</div> <div class="line"><a name="l00274"></a><span class="lineno"> 274</span> </div> <div class="line"><a name="l00275"></a><span class="lineno"> 275</span>  <a class="code" href="bignum_8h.html#a024b186dd3608bcbcfc9dd36212a18ec">MPI_CHK</a>( <a class="code" href="bignum_8h.html#ab63bfb07b27db84268491cd7d68bddc0">mpi_mul_mpi</a>( &u1, &e, &s_inv ) );</div> <div class="line"><a name="l00276"></a><span class="lineno"> 276</span>  <a class="code" href="bignum_8h.html#a024b186dd3608bcbcfc9dd36212a18ec">MPI_CHK</a>( <a class="code" href="bignum_8h.html#a075d3cf21cb3733e5f0a872e72b0cd15">mpi_mod_mpi</a>( &u1, &u1, &grp-><a class="code" href="structecp__group.html#a6b424e0dbad7d3c900375a2ff0154b95">N</a> ) );</div> <div class="line"><a name="l00277"></a><span class="lineno"> 277</span> </div> <div class="line"><a name="l00278"></a><span class="lineno"> 278</span>  <a class="code" href="bignum_8h.html#a024b186dd3608bcbcfc9dd36212a18ec">MPI_CHK</a>( <a class="code" href="bignum_8h.html#ab63bfb07b27db84268491cd7d68bddc0">mpi_mul_mpi</a>( &u2, r, &s_inv ) );</div> <div class="line"><a name="l00279"></a><span class="lineno"> 279</span>  <a class="code" href="bignum_8h.html#a024b186dd3608bcbcfc9dd36212a18ec">MPI_CHK</a>( <a class="code" href="bignum_8h.html#a075d3cf21cb3733e5f0a872e72b0cd15">mpi_mod_mpi</a>( &u2, &u2, &grp-><a class="code" href="structecp__group.html#a6b424e0dbad7d3c900375a2ff0154b95">N</a> ) );</div> <div class="line"><a name="l00280"></a><span class="lineno"> 280</span> </div> <div class="line"><a name="l00281"></a><span class="lineno"> 281</span>  <span class="comment">/*</span></div> <div class="line"><a name="l00282"></a><span class="lineno"> 282</span> <span class="comment"> * Step 5: R = u1 G + u2 Q</span></div> <div class="line"><a name="l00283"></a><span class="lineno"> 283</span> <span class="comment"> *</span></div> <div class="line"><a name="l00284"></a><span class="lineno"> 284</span> <span class="comment"> * Since we're not using any secret data, no need to pass a RNG to</span></div> <div class="line"><a name="l00285"></a><span class="lineno"> 285</span> <span class="comment"> * ecp_mul() for countermesures.</span></div> <div class="line"><a name="l00286"></a><span class="lineno"> 286</span> <span class="comment"> */</span></div> <div class="line"><a name="l00287"></a><span class="lineno"> 287</span>  <a class="code" href="bignum_8h.html#a024b186dd3608bcbcfc9dd36212a18ec">MPI_CHK</a>( <a class="code" href="ecp_8h.html#a337b0e41153f458872f7f73bad93711c">ecp_mul</a>( grp, &R, &u1, &grp-><a class="code" href="structecp__group.html#adb738e2c6df3c75c4b30b2b1c3e61256">G</a>, NULL, NULL ) );</div> <div class="line"><a name="l00288"></a><span class="lineno"> 288</span>  <a class="code" href="bignum_8h.html#a024b186dd3608bcbcfc9dd36212a18ec">MPI_CHK</a>( <a class="code" href="ecp_8h.html#a337b0e41153f458872f7f73bad93711c">ecp_mul</a>( grp, &P, &u2, Q, NULL, NULL ) );</div> <div class="line"><a name="l00289"></a><span class="lineno"> 289</span>  <a class="code" href="bignum_8h.html#a024b186dd3608bcbcfc9dd36212a18ec">MPI_CHK</a>( <a class="code" href="ecp_8h.html#a59b4740379580218d00c3f0904dda21f">ecp_add</a>( grp, &R, &R, &P ) );</div> <div class="line"><a name="l00290"></a><span class="lineno"> 290</span> </div> <div class="line"><a name="l00291"></a><span class="lineno"> 291</span>  <span class="keywordflow">if</span>( <a class="code" href="ecp_8h.html#ab091c21f839189f606dfad0ef924af35">ecp_is_zero</a>( &R ) )</div> <div class="line"><a name="l00292"></a><span class="lineno"> 292</span>  {</div> <div class="line"><a name="l00293"></a><span class="lineno"> 293</span>  ret = <a class="code" href="ecp_8h.html#a250e37c379fd853d666415a8fc308e6e">POLARSSL_ERR_ECP_VERIFY_FAILED</a>;</div> <div class="line"><a name="l00294"></a><span class="lineno"> 294</span>  <span class="keywordflow">goto</span> cleanup;</div> <div class="line"><a name="l00295"></a><span class="lineno"> 295</span>  }</div> <div class="line"><a name="l00296"></a><span class="lineno"> 296</span> </div> <div class="line"><a name="l00297"></a><span class="lineno"> 297</span>  <span class="comment">/*</span></div> <div class="line"><a name="l00298"></a><span class="lineno"> 298</span> <span class="comment"> * Step 6: convert xR to an integer (no-op)</span></div> <div class="line"><a name="l00299"></a><span class="lineno"> 299</span> <span class="comment"> * Step 7: reduce xR mod n (gives v)</span></div> <div class="line"><a name="l00300"></a><span class="lineno"> 300</span> <span class="comment"> */</span></div> <div class="line"><a name="l00301"></a><span class="lineno"> 301</span>  <a class="code" href="bignum_8h.html#a024b186dd3608bcbcfc9dd36212a18ec">MPI_CHK</a>( <a class="code" href="bignum_8h.html#a075d3cf21cb3733e5f0a872e72b0cd15">mpi_mod_mpi</a>( &R.<a class="code" href="structecp__point.html#ad22ad099567064b38af5a1f2f58f0acc">X</a>, &R.<a class="code" href="structecp__point.html#ad22ad099567064b38af5a1f2f58f0acc">X</a>, &grp-><a class="code" href="structecp__group.html#a6b424e0dbad7d3c900375a2ff0154b95">N</a> ) );</div> <div class="line"><a name="l00302"></a><span class="lineno"> 302</span> </div> <div class="line"><a name="l00303"></a><span class="lineno"> 303</span>  <span class="comment">/*</span></div> <div class="line"><a name="l00304"></a><span class="lineno"> 304</span> <span class="comment"> * Step 8: check if v (that is, R.X) is equal to r</span></div> <div class="line"><a name="l00305"></a><span class="lineno"> 305</span> <span class="comment"> */</span></div> <div class="line"><a name="l00306"></a><span class="lineno"> 306</span>  <span class="keywordflow">if</span>( <a class="code" href="bignum_8h.html#aec20dff9d78738e3c80b212df9875b83">mpi_cmp_mpi</a>( &R.<a class="code" href="structecp__point.html#ad22ad099567064b38af5a1f2f58f0acc">X</a>, r ) != 0 )</div> <div class="line"><a name="l00307"></a><span class="lineno"> 307</span>  {</div> <div class="line"><a name="l00308"></a><span class="lineno"> 308</span>  ret = <a class="code" href="ecp_8h.html#a250e37c379fd853d666415a8fc308e6e">POLARSSL_ERR_ECP_VERIFY_FAILED</a>;</div> <div class="line"><a name="l00309"></a><span class="lineno"> 309</span>  <span class="keywordflow">goto</span> cleanup;</div> <div class="line"><a name="l00310"></a><span class="lineno"> 310</span>  }</div> <div class="line"><a name="l00311"></a><span class="lineno"> 311</span> </div> <div class="line"><a name="l00312"></a><span class="lineno"> 312</span> cleanup:</div> <div class="line"><a name="l00313"></a><span class="lineno"> 313</span>  <a class="code" href="ecp_8h.html#a6a949f9b9194bbf02dc83d3aa0c61567">ecp_point_free</a>( &R ); <a class="code" href="ecp_8h.html#a6a949f9b9194bbf02dc83d3aa0c61567">ecp_point_free</a>( &P );</div> <div class="line"><a name="l00314"></a><span class="lineno"> 314</span>  <a class="code" href="bignum_8h.html#ae1f6507671587755e46bbf0afcae6a8c">mpi_free</a>( &e ); <a class="code" href="bignum_8h.html#ae1f6507671587755e46bbf0afcae6a8c">mpi_free</a>( &s_inv ); <a class="code" href="bignum_8h.html#ae1f6507671587755e46bbf0afcae6a8c">mpi_free</a>( &u1 ); <a class="code" href="bignum_8h.html#ae1f6507671587755e46bbf0afcae6a8c">mpi_free</a>( &u2 );</div> <div class="line"><a name="l00315"></a><span class="lineno"> 315</span> </div> <div class="line"><a name="l00316"></a><span class="lineno"> 316</span>  <span class="keywordflow">return</span>( ret );</div> <div class="line"><a name="l00317"></a><span class="lineno"> 317</span> }</div> <div class="line"><a name="l00318"></a><span class="lineno"> 318</span> </div> <div class="line"><a name="l00319"></a><span class="lineno"> 319</span> <span class="comment">/*</span></div> <div class="line"><a name="l00320"></a><span class="lineno"> 320</span> <span class="comment"> * RFC 4492 page 20:</span></div> <div class="line"><a name="l00321"></a><span class="lineno"> 321</span> <span class="comment"> *</span></div> <div class="line"><a name="l00322"></a><span class="lineno"> 322</span> <span class="comment"> * Ecdsa-Sig-Value ::= SEQUENCE {</span></div> <div class="line"><a name="l00323"></a><span class="lineno"> 323</span> <span class="comment"> * r INTEGER,</span></div> <div class="line"><a name="l00324"></a><span class="lineno"> 324</span> <span class="comment"> * s INTEGER</span></div> <div class="line"><a name="l00325"></a><span class="lineno"> 325</span> <span class="comment"> * }</span></div> <div class="line"><a name="l00326"></a><span class="lineno"> 326</span> <span class="comment"> *</span></div> <div class="line"><a name="l00327"></a><span class="lineno"> 327</span> <span class="comment"> * Size is at most</span></div> <div class="line"><a name="l00328"></a><span class="lineno"> 328</span> <span class="comment"> * 1 (tag) + 1 (len) + 1 (initial 0) + ECP_MAX_BYTES for each of r and s,</span></div> <div class="line"><a name="l00329"></a><span class="lineno"> 329</span> <span class="comment"> * twice that + 1 (tag) + 2 (len) for the sequence</span></div> <div class="line"><a name="l00330"></a><span class="lineno"> 330</span> <span class="comment"> * (assuming ECP_MAX_BYTES is less than 126 for r and s,</span></div> <div class="line"><a name="l00331"></a><span class="lineno"> 331</span> <span class="comment"> * and less than 124 (total len <= 255) for the sequence)</span></div> <div class="line"><a name="l00332"></a><span class="lineno"> 332</span> <span class="comment"> */</span></div> <div class="line"><a name="l00333"></a><span class="lineno"> 333</span> <span class="preprocessor">#if POLARSSL_ECP_MAX_BYTES > 124</span></div> <div class="line"><a name="l00334"></a><span class="lineno"> 334</span> <span class="preprocessor"></span><span class="preprocessor">#error "POLARSSL_ECP_MAX_BYTES bigger than expected, please fix MAX_SIG_LEN"</span></div> <div class="line"><a name="l00335"></a><span class="lineno"> 335</span> <span class="preprocessor"></span><span class="preprocessor">#endif</span></div> <div class="line"><a name="l00336"></a><span class="lineno"> 336</span> <span class="preprocessor"></span><span class="preprocessor">#define MAX_SIG_LEN ( 3 + 2 * ( 2 + POLARSSL_ECP_MAX_BYTES ) )</span></div> <div class="line"><a name="l00337"></a><span class="lineno"> 337</span> <span class="preprocessor"></span></div> <div class="line"><a name="l00338"></a><span class="lineno"> 338</span> <span class="comment">/*</span></div> <div class="line"><a name="l00339"></a><span class="lineno"> 339</span> <span class="comment"> * Convert a signature (given by context) to ASN.1</span></div> <div class="line"><a name="l00340"></a><span class="lineno"> 340</span> <span class="comment"> */</span></div> <div class="line"><a name="l00341"></a><span class="lineno"> 341</span> <span class="keyword">static</span> <span class="keywordtype">int</span> ecdsa_signature_to_asn1( <a class="code" href="structecdsa__context.html">ecdsa_context</a> *ctx,</div> <div class="line"><a name="l00342"></a><span class="lineno"> 342</span>  <span class="keywordtype">unsigned</span> <span class="keywordtype">char</span> *sig, <span class="keywordtype">size_t</span> *slen )</div> <div class="line"><a name="l00343"></a><span class="lineno"> 343</span> {</div> <div class="line"><a name="l00344"></a><span class="lineno"> 344</span>  <span class="keywordtype">int</span> ret;</div> <div class="line"><a name="l00345"></a><span class="lineno"> 345</span>  <span class="keywordtype">unsigned</span> <span class="keywordtype">char</span> buf[MAX_SIG_LEN];</div> <div class="line"><a name="l00346"></a><span class="lineno"> 346</span>  <span class="keywordtype">unsigned</span> <span class="keywordtype">char</span> *p = buf + <span class="keyword">sizeof</span>( buf );</div> <div class="line"><a name="l00347"></a><span class="lineno"> 347</span>  <span class="keywordtype">size_t</span> len = 0;</div> <div class="line"><a name="l00348"></a><span class="lineno"> 348</span> </div> <div class="line"><a name="l00349"></a><span class="lineno"> 349</span>  <a class="code" href="asn1write_8h.html#a31a94e90950151e3f9b47e72bad09c20">ASN1_CHK_ADD</a>( len, <a class="code" href="asn1write_8h.html#acfc669194aa6ee652f09891f70827bc2">asn1_write_mpi</a>( &p, buf, &ctx-><a class="code" href="structecdsa__context.html#a3c84b57b2b3ba1db63fb3a86c447a39d">s</a> ) );</div> <div class="line"><a name="l00350"></a><span class="lineno"> 350</span>  <a class="code" href="asn1write_8h.html#a31a94e90950151e3f9b47e72bad09c20">ASN1_CHK_ADD</a>( len, <a class="code" href="asn1write_8h.html#acfc669194aa6ee652f09891f70827bc2">asn1_write_mpi</a>( &p, buf, &ctx-><a class="code" href="structecdsa__context.html#a9fe28b71d896452366251d3e4755f9d1">r</a> ) );</div> <div class="line"><a name="l00351"></a><span class="lineno"> 351</span> </div> <div class="line"><a name="l00352"></a><span class="lineno"> 352</span>  <a class="code" href="asn1write_8h.html#a31a94e90950151e3f9b47e72bad09c20">ASN1_CHK_ADD</a>( len, <a class="code" href="asn1write_8h.html#a4fc66d40e537079c762ab2df2c2ba3c8">asn1_write_len</a>( &p, buf, len ) );</div> <div class="line"><a name="l00353"></a><span class="lineno"> 353</span>  <a class="code" href="asn1write_8h.html#a31a94e90950151e3f9b47e72bad09c20">ASN1_CHK_ADD</a>( len, <a class="code" href="asn1write_8h.html#a625cc3f39febf33574b80d767d56be7a">asn1_write_tag</a>( &p, buf,</div> <div class="line"><a name="l00354"></a><span class="lineno"> 354</span>  <a class="code" href="group__asn1__module.html#ga799d7b17a9532e1dadc8355f04477e27">ASN1_CONSTRUCTED</a> | <a class="code" href="group__asn1__module.html#ga9321fc9f2a5ef4103008fbe5c4b230df">ASN1_SEQUENCE</a> ) );</div> <div class="line"><a name="l00355"></a><span class="lineno"> 355</span> </div> <div class="line"><a name="l00356"></a><span class="lineno"> 356</span>  memcpy( sig, p, len );</div> <div class="line"><a name="l00357"></a><span class="lineno"> 357</span>  *slen = len;</div> <div class="line"><a name="l00358"></a><span class="lineno"> 358</span> </div> <div class="line"><a name="l00359"></a><span class="lineno"> 359</span>  <span class="keywordflow">return</span>( 0 );</div> <div class="line"><a name="l00360"></a><span class="lineno"> 360</span> }</div> <div class="line"><a name="l00361"></a><span class="lineno"> 361</span> </div> <div class="line"><a name="l00362"></a><span class="lineno"> 362</span> <span class="comment">/*</span></div> <div class="line"><a name="l00363"></a><span class="lineno"> 363</span> <span class="comment"> * Compute and write signature</span></div> <div class="line"><a name="l00364"></a><span class="lineno"> 364</span> <span class="comment"> */</span></div> <div class="line"><a name="l00365"></a><span class="lineno"> 365</span> <span class="keywordtype">int</span> <a class="code" href="ecdsa_8h.html#a8cadaa8ea3f8251adc2249c3108b26cc">ecdsa_write_signature</a>( <a class="code" href="structecdsa__context.html">ecdsa_context</a> *ctx,</div> <div class="line"><a name="l00366"></a><span class="lineno"> 366</span>  <span class="keyword">const</span> <span class="keywordtype">unsigned</span> <span class="keywordtype">char</span> *hash, <span class="keywordtype">size_t</span> hlen,</div> <div class="line"><a name="l00367"></a><span class="lineno"> 367</span>  <span class="keywordtype">unsigned</span> <span class="keywordtype">char</span> *sig, <span class="keywordtype">size_t</span> *slen,</div> <div class="line"><a name="l00368"></a><span class="lineno"> 368</span>  <span class="keywordtype">int</span> (*f_rng)(<span class="keywordtype">void</span> *, <span class="keywordtype">unsigned</span> <span class="keywordtype">char</span> *, <span class="keywordtype">size_t</span>),</div> <div class="line"><a name="l00369"></a><span class="lineno"> 369</span>  <span class="keywordtype">void</span> *p_rng )</div> <div class="line"><a name="l00370"></a><span class="lineno"> 370</span> {</div> <div class="line"><a name="l00371"></a><span class="lineno"> 371</span>  <span class="keywordtype">int</span> ret;</div> <div class="line"><a name="l00372"></a><span class="lineno"> 372</span> </div> <div class="line"><a name="l00373"></a><span class="lineno"> 373</span>  <span class="keywordflow">if</span>( ( ret = <a class="code" href="ecdsa_8h.html#a5a5858bde5c49005fefbe74883fc9a9d">ecdsa_sign</a>( &ctx-><a class="code" href="structecdsa__context.html#a651d70dd9732c8dd3ea043bbc57473a7">grp</a>, &ctx-><a class="code" href="structecdsa__context.html#a9fe28b71d896452366251d3e4755f9d1">r</a>, &ctx-><a class="code" href="structecdsa__context.html#a3c84b57b2b3ba1db63fb3a86c447a39d">s</a>, &ctx-><a class="code" href="structecdsa__context.html#a549d4c4198722471d1ffa8178d46d742">d</a>,</div> <div class="line"><a name="l00374"></a><span class="lineno"> 374</span>  hash, hlen, f_rng, p_rng ) ) != 0 )</div> <div class="line"><a name="l00375"></a><span class="lineno"> 375</span>  {</div> <div class="line"><a name="l00376"></a><span class="lineno"> 376</span>  <span class="keywordflow">return</span>( ret );</div> <div class="line"><a name="l00377"></a><span class="lineno"> 377</span>  }</div> <div class="line"><a name="l00378"></a><span class="lineno"> 378</span> </div> <div class="line"><a name="l00379"></a><span class="lineno"> 379</span>  <span class="keywordflow">return</span>( ecdsa_signature_to_asn1( ctx, sig, slen ) );</div> <div class="line"><a name="l00380"></a><span class="lineno"> 380</span> }</div> <div class="line"><a name="l00381"></a><span class="lineno"> 381</span> </div> <div class="line"><a name="l00382"></a><span class="lineno"> 382</span> <span class="preprocessor">#if defined(POLARSSL_ECDSA_DETERMINISTIC)</span></div> <div class="line"><a name="l00383"></a><span class="lineno"> 383</span> <span class="preprocessor"></span><span class="comment">/*</span></div> <div class="line"><a name="l00384"></a><span class="lineno"> 384</span> <span class="comment"> * Compute and write signature deterministically</span></div> <div class="line"><a name="l00385"></a><span class="lineno"> 385</span> <span class="comment"> */</span></div> <div class="line"><a name="l00386"></a><span class="lineno"> 386</span> <span class="keywordtype">int</span> <a class="code" href="ecdsa_8h.html#ad86d178c1aa2135f398e5a92e860dae4">ecdsa_write_signature_det</a>( <a class="code" href="structecdsa__context.html">ecdsa_context</a> *ctx,</div> <div class="line"><a name="l00387"></a><span class="lineno"> 387</span>  <span class="keyword">const</span> <span class="keywordtype">unsigned</span> <span class="keywordtype">char</span> *hash, <span class="keywordtype">size_t</span> hlen,</div> <div class="line"><a name="l00388"></a><span class="lineno"> 388</span>  <span class="keywordtype">unsigned</span> <span class="keywordtype">char</span> *sig, <span class="keywordtype">size_t</span> *slen,</div> <div class="line"><a name="l00389"></a><span class="lineno"> 389</span>  <a class="code" href="md_8h.html#af1fbbb67afa0daee4090cde8864e0b68">md_type_t</a> md_alg )</div> <div class="line"><a name="l00390"></a><span class="lineno"> 390</span> {</div> <div class="line"><a name="l00391"></a><span class="lineno"> 391</span>  <span class="keywordtype">int</span> ret;</div> <div class="line"><a name="l00392"></a><span class="lineno"> 392</span> </div> <div class="line"><a name="l00393"></a><span class="lineno"> 393</span>  <span class="keywordflow">if</span>( ( ret = <a class="code" href="ecdsa_8h.html#af633a283f02fb3381354dc857a5cef43">ecdsa_sign_det</a>( &ctx-><a class="code" href="structecdsa__context.html#a651d70dd9732c8dd3ea043bbc57473a7">grp</a>, &ctx-><a class="code" href="structecdsa__context.html#a9fe28b71d896452366251d3e4755f9d1">r</a>, &ctx-><a class="code" href="structecdsa__context.html#a3c84b57b2b3ba1db63fb3a86c447a39d">s</a>, &ctx-><a class="code" href="structecdsa__context.html#a549d4c4198722471d1ffa8178d46d742">d</a>,</div> <div class="line"><a name="l00394"></a><span class="lineno"> 394</span>  hash, hlen, md_alg ) ) != 0 )</div> <div class="line"><a name="l00395"></a><span class="lineno"> 395</span>  {</div> <div class="line"><a name="l00396"></a><span class="lineno"> 396</span>  <span class="keywordflow">return</span>( ret );</div> <div class="line"><a name="l00397"></a><span class="lineno"> 397</span>  }</div> <div class="line"><a name="l00398"></a><span class="lineno"> 398</span> </div> <div class="line"><a name="l00399"></a><span class="lineno"> 399</span>  <span class="keywordflow">return</span>( ecdsa_signature_to_asn1( ctx, sig, slen ) );</div> <div class="line"><a name="l00400"></a><span class="lineno"> 400</span> }</div> <div class="line"><a name="l00401"></a><span class="lineno"> 401</span> <span class="preprocessor">#endif </span><span class="comment">/* POLARSSL_ECDSA_DETERMINISTIC */</span><span class="preprocessor"></span></div> <div class="line"><a name="l00402"></a><span class="lineno"> 402</span> <span class="preprocessor"></span></div> <div class="line"><a name="l00403"></a><span class="lineno"> 403</span> <span class="comment">/*</span></div> <div class="line"><a name="l00404"></a><span class="lineno"> 404</span> <span class="comment"> * Read and check signature</span></div> <div class="line"><a name="l00405"></a><span class="lineno"> 405</span> <span class="comment"> */</span></div> <div class="line"><a name="l00406"></a><span class="lineno"> 406</span> <span class="keywordtype">int</span> <a class="code" href="ecdsa_8h.html#a5f77f5b93fce3ef628d7f8de5bf92de8">ecdsa_read_signature</a>( <a class="code" href="structecdsa__context.html">ecdsa_context</a> *ctx,</div> <div class="line"><a name="l00407"></a><span class="lineno"> 407</span>  <span class="keyword">const</span> <span class="keywordtype">unsigned</span> <span class="keywordtype">char</span> *hash, <span class="keywordtype">size_t</span> hlen,</div> <div class="line"><a name="l00408"></a><span class="lineno"> 408</span>  <span class="keyword">const</span> <span class="keywordtype">unsigned</span> <span class="keywordtype">char</span> *sig, <span class="keywordtype">size_t</span> slen )</div> <div class="line"><a name="l00409"></a><span class="lineno"> 409</span> {</div> <div class="line"><a name="l00410"></a><span class="lineno"> 410</span>  <span class="keywordtype">int</span> ret;</div> <div class="line"><a name="l00411"></a><span class="lineno"> 411</span>  <span class="keywordtype">unsigned</span> <span class="keywordtype">char</span> *p = (<span class="keywordtype">unsigned</span> <span class="keywordtype">char</span> *) sig;</div> <div class="line"><a name="l00412"></a><span class="lineno"> 412</span>  <span class="keyword">const</span> <span class="keywordtype">unsigned</span> <span class="keywordtype">char</span> *end = sig + slen;</div> <div class="line"><a name="l00413"></a><span class="lineno"> 413</span>  <span class="keywordtype">size_t</span> len;</div> <div class="line"><a name="l00414"></a><span class="lineno"> 414</span> </div> <div class="line"><a name="l00415"></a><span class="lineno"> 415</span>  <span class="keywordflow">if</span>( ( ret = <a class="code" href="asn1_8h.html#af7d10ad8e91ae5cb4a78f7d7dc1a8ac6">asn1_get_tag</a>( &p, end, &len,</div> <div class="line"><a name="l00416"></a><span class="lineno"> 416</span>  <a class="code" href="group__asn1__module.html#ga799d7b17a9532e1dadc8355f04477e27">ASN1_CONSTRUCTED</a> | <a class="code" href="group__asn1__module.html#ga9321fc9f2a5ef4103008fbe5c4b230df">ASN1_SEQUENCE</a> ) ) != 0 )</div> <div class="line"><a name="l00417"></a><span class="lineno"> 417</span>  {</div> <div class="line"><a name="l00418"></a><span class="lineno"> 418</span>  <span class="keywordflow">return</span>( <a class="code" href="ecp_8h.html#a59e5b00eddc35acbb507340379c4d056">POLARSSL_ERR_ECP_BAD_INPUT_DATA</a> + ret );</div> <div class="line"><a name="l00419"></a><span class="lineno"> 419</span>  }</div> <div class="line"><a name="l00420"></a><span class="lineno"> 420</span> </div> <div class="line"><a name="l00421"></a><span class="lineno"> 421</span>  <span class="keywordflow">if</span>( p + len != end )</div> <div class="line"><a name="l00422"></a><span class="lineno"> 422</span>  <span class="keywordflow">return</span>( <a class="code" href="ecp_8h.html#a59e5b00eddc35acbb507340379c4d056">POLARSSL_ERR_ECP_BAD_INPUT_DATA</a> +</div> <div class="line"><a name="l00423"></a><span class="lineno"> 423</span>  <a class="code" href="group__asn1__module.html#gaffc1c105d348cf2be47a2c8d6ab5ef63">POLARSSL_ERR_ASN1_LENGTH_MISMATCH</a> );</div> <div class="line"><a name="l00424"></a><span class="lineno"> 424</span> </div> <div class="line"><a name="l00425"></a><span class="lineno"> 425</span>  <span class="keywordflow">if</span>( ( ret = <a class="code" href="asn1_8h.html#a9241caf4492b2405e48db346205af62f">asn1_get_mpi</a>( &p, end, &ctx-><a class="code" href="structecdsa__context.html#a9fe28b71d896452366251d3e4755f9d1">r</a> ) ) != 0 ||</div> <div class="line"><a name="l00426"></a><span class="lineno"> 426</span>  ( ret = <a class="code" href="asn1_8h.html#a9241caf4492b2405e48db346205af62f">asn1_get_mpi</a>( &p, end, &ctx-><a class="code" href="structecdsa__context.html#a3c84b57b2b3ba1db63fb3a86c447a39d">s</a> ) ) != 0 )</div> <div class="line"><a name="l00427"></a><span class="lineno"> 427</span>  <span class="keywordflow">return</span>( <a class="code" href="ecp_8h.html#a59e5b00eddc35acbb507340379c4d056">POLARSSL_ERR_ECP_BAD_INPUT_DATA</a> + ret );</div> <div class="line"><a name="l00428"></a><span class="lineno"> 428</span> </div> <div class="line"><a name="l00429"></a><span class="lineno"> 429</span>  <span class="keywordflow">if</span>( ( ret = <a class="code" href="ecdsa_8h.html#a9f54b1d3ff1cef8dec1051016eace9e6">ecdsa_verify</a>( &ctx-><a class="code" href="structecdsa__context.html#a651d70dd9732c8dd3ea043bbc57473a7">grp</a>, hash, hlen,</div> <div class="line"><a name="l00430"></a><span class="lineno"> 430</span>  &ctx-><a class="code" href="structecdsa__context.html#a08c8c8eec4c95e71ad0b2b122f3ae1e1">Q</a>, &ctx-><a class="code" href="structecdsa__context.html#a9fe28b71d896452366251d3e4755f9d1">r</a>, &ctx-><a class="code" href="structecdsa__context.html#a3c84b57b2b3ba1db63fb3a86c447a39d">s</a> ) ) != 0 )</div> <div class="line"><a name="l00431"></a><span class="lineno"> 431</span>  <span class="keywordflow">return</span>( ret );</div> <div class="line"><a name="l00432"></a><span class="lineno"> 432</span> </div> <div class="line"><a name="l00433"></a><span class="lineno"> 433</span>  <span class="keywordflow">if</span>( p != end )</div> <div class="line"><a name="l00434"></a><span class="lineno"> 434</span>  <span class="keywordflow">return</span>( <a class="code" href="ecp_8h.html#a1d2b0f995bf076c5ce5bbc7deb94150c">POLARSSL_ERR_ECP_SIG_LEN_MISMATCH</a> );</div> <div class="line"><a name="l00435"></a><span class="lineno"> 435</span> </div> <div class="line"><a name="l00436"></a><span class="lineno"> 436</span>  <span class="keywordflow">return</span>( 0 );</div> <div class="line"><a name="l00437"></a><span class="lineno"> 437</span> }</div> <div class="line"><a name="l00438"></a><span class="lineno"> 438</span> </div> <div class="line"><a name="l00439"></a><span class="lineno"> 439</span> <span class="comment">/*</span></div> <div class="line"><a name="l00440"></a><span class="lineno"> 440</span> <span class="comment"> * Generate key pair</span></div> <div class="line"><a name="l00441"></a><span class="lineno"> 441</span> <span class="comment"> */</span></div> <div class="line"><a name="l00442"></a><span class="lineno"> 442</span> <span class="keywordtype">int</span> <a class="code" href="ecdsa_8h.html#ac394e13bb4ced90794817d9a127bc776">ecdsa_genkey</a>( <a class="code" href="structecdsa__context.html">ecdsa_context</a> *ctx, <a class="code" href="ecp_8h.html#a751fce96f17826537221248b4ed5cbd2">ecp_group_id</a> gid,</div> <div class="line"><a name="l00443"></a><span class="lineno"> 443</span>  <span class="keywordtype">int</span> (*f_rng)(<span class="keywordtype">void</span> *, <span class="keywordtype">unsigned</span> <span class="keywordtype">char</span> *, <span class="keywordtype">size_t</span>), <span class="keywordtype">void</span> *p_rng )</div> <div class="line"><a name="l00444"></a><span class="lineno"> 444</span> {</div> <div class="line"><a name="l00445"></a><span class="lineno"> 445</span>  <span class="keywordflow">return</span>( <a class="code" href="ecp_8h.html#af245b6e35c32a231e18bf335de7de774">ecp_use_known_dp</a>( &ctx-><a class="code" href="structecdsa__context.html#a651d70dd9732c8dd3ea043bbc57473a7">grp</a>, gid ) ||</div> <div class="line"><a name="l00446"></a><span class="lineno"> 446</span>  <a class="code" href="ecp_8h.html#aaf7e6813178463e3ebb15b0719d1d30a">ecp_gen_keypair</a>( &ctx-><a class="code" href="structecdsa__context.html#a651d70dd9732c8dd3ea043bbc57473a7">grp</a>, &ctx-><a class="code" href="structecdsa__context.html#a549d4c4198722471d1ffa8178d46d742">d</a>, &ctx-><a class="code" href="structecdsa__context.html#a08c8c8eec4c95e71ad0b2b122f3ae1e1">Q</a>, f_rng, p_rng ) );</div> <div class="line"><a name="l00447"></a><span class="lineno"> 447</span> }</div> <div class="line"><a name="l00448"></a><span class="lineno"> 448</span> </div> <div class="line"><a name="l00449"></a><span class="lineno"> 449</span> <span class="comment">/*</span></div> <div class="line"><a name="l00450"></a><span class="lineno"> 450</span> <span class="comment"> * Set context from an ecp_keypair</span></div> <div class="line"><a name="l00451"></a><span class="lineno"> 451</span> <span class="comment"> */</span></div> <div class="line"><a name="l00452"></a><span class="lineno"> 452</span> <span class="keywordtype">int</span> <a class="code" href="ecdsa_8h.html#a186f01f0a428f017b338c43df19c3b0b">ecdsa_from_keypair</a>( <a class="code" href="structecdsa__context.html">ecdsa_context</a> *ctx, <span class="keyword">const</span> <a class="code" href="structecp__keypair.html">ecp_keypair</a> *key )</div> <div class="line"><a name="l00453"></a><span class="lineno"> 453</span> {</div> <div class="line"><a name="l00454"></a><span class="lineno"> 454</span>  <span class="keywordtype">int</span> ret;</div> <div class="line"><a name="l00455"></a><span class="lineno"> 455</span> </div> <div class="line"><a name="l00456"></a><span class="lineno"> 456</span>  <span class="keywordflow">if</span>( ( ret = <a class="code" href="ecp_8h.html#aae1ffdfabe7a58a7d9a1fee29a792051">ecp_group_copy</a>( &ctx-><a class="code" href="structecdsa__context.html#a651d70dd9732c8dd3ea043bbc57473a7">grp</a>, &key-><a class="code" href="structecp__keypair.html#af83ab21de379598f79adade4c3cd376f">grp</a> ) ) != 0 ||</div> <div class="line"><a name="l00457"></a><span class="lineno"> 457</span>  ( ret = <a class="code" href="bignum_8h.html#a6fbcce39a9d92d9e2a560f8aa6a810f4">mpi_copy</a>( &ctx-><a class="code" href="structecdsa__context.html#a549d4c4198722471d1ffa8178d46d742">d</a>, &key-><a class="code" href="structecp__keypair.html#a8531547899526b4e8e6b2427c09e0177">d</a> ) ) != 0 ||</div> <div class="line"><a name="l00458"></a><span class="lineno"> 458</span>  ( ret = <a class="code" href="ecp_8h.html#a4d192c7a9b2f415c40a9ec2dc955ea13">ecp_copy</a>( &ctx-><a class="code" href="structecdsa__context.html#a08c8c8eec4c95e71ad0b2b122f3ae1e1">Q</a>, &key-><a class="code" href="structecp__keypair.html#a3a2bd5744991a7b0fbc76c3649a1e8a1">Q</a> ) ) != 0 )</div> <div class="line"><a name="l00459"></a><span class="lineno"> 459</span>  {</div> <div class="line"><a name="l00460"></a><span class="lineno"> 460</span>  <a class="code" href="ecdsa_8h.html#ab49abcf12ba983d101f500fd85f468da">ecdsa_free</a>( ctx );</div> <div class="line"><a name="l00461"></a><span class="lineno"> 461</span>  }</div> <div class="line"><a name="l00462"></a><span class="lineno"> 462</span> </div> <div class="line"><a name="l00463"></a><span class="lineno"> 463</span>  <span class="keywordflow">return</span>( ret );</div> <div class="line"><a name="l00464"></a><span class="lineno"> 464</span> }</div> <div class="line"><a name="l00465"></a><span class="lineno"> 465</span> </div> <div class="line"><a name="l00466"></a><span class="lineno"> 466</span> <span class="comment">/*</span></div> <div class="line"><a name="l00467"></a><span class="lineno"> 467</span> <span class="comment"> * Initialize context</span></div> <div class="line"><a name="l00468"></a><span class="lineno"> 468</span> <span class="comment"> */</span></div> <div class="line"><a name="l00469"></a><span class="lineno"> 469</span> <span class="keywordtype">void</span> <a class="code" href="ecdsa_8h.html#a70bf12fe3c9062d5ee306378d94f8d67">ecdsa_init</a>( <a class="code" href="structecdsa__context.html">ecdsa_context</a> *ctx )</div> <div class="line"><a name="l00470"></a><span class="lineno"> 470</span> {</div> <div class="line"><a name="l00471"></a><span class="lineno"> 471</span>  <a class="code" href="ecp_8h.html#a9859e0bafd24035307f33c1aee570eef">ecp_group_init</a>( &ctx-><a class="code" href="structecdsa__context.html#a651d70dd9732c8dd3ea043bbc57473a7">grp</a> );</div> <div class="line"><a name="l00472"></a><span class="lineno"> 472</span>  <a class="code" href="bignum_8h.html#a201666869f65225d6535bcc697f95c9b">mpi_init</a>( &ctx-><a class="code" href="structecdsa__context.html#a549d4c4198722471d1ffa8178d46d742">d</a> );</div> <div class="line"><a name="l00473"></a><span class="lineno"> 473</span>  <a class="code" href="ecp_8h.html#a870fd59435f6519b4027050afe24fc7c">ecp_point_init</a>( &ctx-><a class="code" href="structecdsa__context.html#a08c8c8eec4c95e71ad0b2b122f3ae1e1">Q</a> );</div> <div class="line"><a name="l00474"></a><span class="lineno"> 474</span>  <a class="code" href="bignum_8h.html#a201666869f65225d6535bcc697f95c9b">mpi_init</a>( &ctx-><a class="code" href="structecdsa__context.html#a9fe28b71d896452366251d3e4755f9d1">r</a> );</div> <div class="line"><a name="l00475"></a><span class="lineno"> 475</span>  <a class="code" href="bignum_8h.html#a201666869f65225d6535bcc697f95c9b">mpi_init</a>( &ctx-><a class="code" href="structecdsa__context.html#a3c84b57b2b3ba1db63fb3a86c447a39d">s</a> );</div> <div class="line"><a name="l00476"></a><span class="lineno"> 476</span> }</div> <div class="line"><a name="l00477"></a><span class="lineno"> 477</span> </div> <div class="line"><a name="l00478"></a><span class="lineno"> 478</span> <span class="comment">/*</span></div> <div class="line"><a name="l00479"></a><span class="lineno"> 479</span> <span class="comment"> * Free context</span></div> <div class="line"><a name="l00480"></a><span class="lineno"> 480</span> <span class="comment"> */</span></div> <div class="line"><a name="l00481"></a><span class="lineno"> 481</span> <span class="keywordtype">void</span> <a class="code" href="ecdsa_8h.html#ab49abcf12ba983d101f500fd85f468da">ecdsa_free</a>( <a class="code" href="structecdsa__context.html">ecdsa_context</a> *ctx )</div> <div class="line"><a name="l00482"></a><span class="lineno"> 482</span> {</div> <div class="line"><a name="l00483"></a><span class="lineno"> 483</span>  <a class="code" href="ecp_8h.html#acbb816c782b4d903a0f0fac9b9d7e748">ecp_group_free</a>( &ctx-><a class="code" href="structecdsa__context.html#a651d70dd9732c8dd3ea043bbc57473a7">grp</a> );</div> <div class="line"><a name="l00484"></a><span class="lineno"> 484</span>  <a class="code" href="bignum_8h.html#ae1f6507671587755e46bbf0afcae6a8c">mpi_free</a>( &ctx-><a class="code" href="structecdsa__context.html#a549d4c4198722471d1ffa8178d46d742">d</a> );</div> <div class="line"><a name="l00485"></a><span class="lineno"> 485</span>  <a class="code" href="ecp_8h.html#a6a949f9b9194bbf02dc83d3aa0c61567">ecp_point_free</a>( &ctx-><a class="code" href="structecdsa__context.html#a08c8c8eec4c95e71ad0b2b122f3ae1e1">Q</a> );</div> <div class="line"><a name="l00486"></a><span class="lineno"> 486</span>  <a class="code" href="bignum_8h.html#ae1f6507671587755e46bbf0afcae6a8c">mpi_free</a>( &ctx-><a class="code" href="structecdsa__context.html#a9fe28b71d896452366251d3e4755f9d1">r</a> );</div> <div class="line"><a name="l00487"></a><span class="lineno"> 487</span>  <a class="code" href="bignum_8h.html#ae1f6507671587755e46bbf0afcae6a8c">mpi_free</a>( &ctx-><a class="code" href="structecdsa__context.html#a3c84b57b2b3ba1db63fb3a86c447a39d">s</a> );</div> <div class="line"><a name="l00488"></a><span class="lineno"> 488</span> }</div> <div class="line"><a name="l00489"></a><span class="lineno"> 489</span> </div> <div class="line"><a name="l00490"></a><span class="lineno"> 490</span> <span class="preprocessor">#if defined(POLARSSL_SELF_TEST)</span></div> <div class="line"><a name="l00491"></a><span class="lineno"> 491</span> <span class="preprocessor"></span></div> <div class="line"><a name="l00492"></a><span class="lineno"> 492</span> <span class="comment">/*</span></div> <div class="line"><a name="l00493"></a><span class="lineno"> 493</span> <span class="comment"> * Checkup routine</span></div> <div class="line"><a name="l00494"></a><span class="lineno"> 494</span> <span class="comment"> */</span></div> <div class="line"><a name="l00495"></a><span class="lineno"> 495</span> <span class="keywordtype">int</span> <a class="code" href="ecdsa_8h.html#af449415b02ec5ba96d800cbcd9d5f042">ecdsa_self_test</a>( <span class="keywordtype">int</span> verbose )</div> <div class="line"><a name="l00496"></a><span class="lineno"> 496</span> {</div> <div class="line"><a name="l00497"></a><span class="lineno"> 497</span>  ((void) verbose );</div> <div class="line"><a name="l00498"></a><span class="lineno"> 498</span>  <span class="keywordflow">return</span>( 0 );</div> <div class="line"><a name="l00499"></a><span class="lineno"> 499</span> }</div> <div class="line"><a name="l00500"></a><span class="lineno"> 500</span> </div> <div class="line"><a name="l00501"></a><span class="lineno"> 501</span> <span class="preprocessor">#endif </span><span class="comment">/* POLARSSL_SELF_TEST */</span><span class="preprocessor"></span></div> <div class="line"><a name="l00502"></a><span class="lineno"> 502</span> <span class="preprocessor"></span></div> <div class="line"><a name="l00503"></a><span class="lineno"> 503</span> <span class="preprocessor">#endif </span><span class="comment">/* POLARSSL_ECDSA_C */</span><span class="preprocessor"></span></div> <div class="ttc" id="bignum_8h_html_aee6dc030f0fa278c1576c457088b4910"><div class="ttname"><a href="bignum_8h.html#aee6dc030f0fa278c1576c457088b4910">mpi_cmp_int</a></div><div class="ttdeci">int mpi_cmp_int(const mpi *X, t_sint z)</div><div class="ttdoc">Compare signed values. </div></div> <div class="ttc" id="structecdsa__context_html_a549d4c4198722471d1ffa8178d46d742"><div class="ttname"><a href="structecdsa__context.html#a549d4c4198722471d1ffa8178d46d742">ecdsa_context::d</a></div><div class="ttdeci">mpi d</div><div class="ttdef"><b>Definition:</b> <a href="ecdsa_8h_source.html#l00044">ecdsa.h:44</a></div></div> <div class="ttc" id="ecdsa_8h_html_a186f01f0a428f017b338c43df19c3b0b"><div class="ttname"><a href="ecdsa_8h.html#a186f01f0a428f017b338c43df19c3b0b">ecdsa_from_keypair</a></div><div class="ttdeci">int ecdsa_from_keypair(ecdsa_context *ctx, const ecp_keypair *key)</div><div class="ttdoc">Set an ECDSA context from an EC key pair. </div></div> <div class="ttc" id="ecdsa_8h_html_a9f54b1d3ff1cef8dec1051016eace9e6"><div class="ttname"><a href="ecdsa_8h.html#a9f54b1d3ff1cef8dec1051016eace9e6">ecdsa_verify</a></div><div class="ttdeci">int ecdsa_verify(ecp_group *grp, const unsigned char *buf, size_t blen, const ecp_point *Q, const mpi *r, const mpi *s)</div><div class="ttdoc">Verify ECDSA signature of a previously hashed message. </div></div> <div class="ttc" id="ecp_8h_html_a59e5b00eddc35acbb507340379c4d056"><div class="ttname"><a href="ecp_8h.html#a59e5b00eddc35acbb507340379c4d056">POLARSSL_ERR_ECP_BAD_INPUT_DATA</a></div><div class="ttdeci">#define POLARSSL_ERR_ECP_BAD_INPUT_DATA</div><div class="ttdoc">Bad input parameters to function. </div><div class="ttdef"><b>Definition:</b> <a href="ecp_8h_source.html#l00035">ecp.h:35</a></div></div> <div class="ttc" id="ecp_8h_html_aae1ffdfabe7a58a7d9a1fee29a792051"><div class="ttname"><a href="ecp_8h.html#aae1ffdfabe7a58a7d9a1fee29a792051">ecp_group_copy</a></div><div class="ttdeci">int ecp_group_copy(ecp_group *dst, const ecp_group *src)</div><div class="ttdoc">Copy the contents of a group object. </div></div> <div class="ttc" id="hmac__drbg_8h_html_ab2f1d201eaba90dc66b7033fa87c1eb9"><div class="ttname"><a href="hmac__drbg_8h.html#ab2f1d201eaba90dc66b7033fa87c1eb9">hmac_drbg_random</a></div><div class="ttdeci">int hmac_drbg_random(void *p_rng, unsigned char *output, size_t out_len)</div><div class="ttdoc">HMAC_DRBG generate random. </div></div> <div class="ttc" id="group__asn1__module_html_gaffc1c105d348cf2be47a2c8d6ab5ef63"><div class="ttname"><a href="group__asn1__module.html#gaffc1c105d348cf2be47a2c8d6ab5ef63">POLARSSL_ERR_ASN1_LENGTH_MISMATCH</a></div><div class="ttdeci">#define POLARSSL_ERR_ASN1_LENGTH_MISMATCH</div><div class="ttdoc">Actual length differs from expected length. </div><div class="ttdef"><b>Definition:</b> <a href="asn1_8h_source.html#l00057">asn1.h:57</a></div></div> <div class="ttc" id="bignum_8h_html_a5ac8858041a8d5b49c11d38fd4069975"><div class="ttname"><a href="bignum_8h.html#a5ac8858041a8d5b49c11d38fd4069975">mpi_fill_random</a></div><div class="ttdeci">int mpi_fill_random(mpi *X, size_t size, int(*f_rng)(void *, unsigned char *, size_t), void *p_rng)</div><div class="ttdoc">Fill an MPI X with size bytes of random. </div></div> <div class="ttc" id="ecdsa_8h_html_a8cadaa8ea3f8251adc2249c3108b26cc"><div class="ttname"><a href="ecdsa_8h.html#a8cadaa8ea3f8251adc2249c3108b26cc">ecdsa_write_signature</a></div><div class="ttdeci">int ecdsa_write_signature(ecdsa_context *ctx, const unsigned char *hash, size_t hlen, unsigned char *sig, size_t *slen, int(*f_rng)(void *, unsigned char *, size_t), void *p_rng)</div><div class="ttdoc">Compute ECDSA signature and write it to buffer, serialized as defined in RFC 4492 page 20...</div></div> <div class="ttc" id="ecdsa_8h_html"><div class="ttname"><a href="ecdsa_8h.html">ecdsa.h</a></div><div class="ttdoc">Elliptic curve DSA. </div></div> <div class="ttc" id="structecp__keypair_html_af83ab21de379598f79adade4c3cd376f"><div class="ttname"><a href="structecp__keypair.html#af83ab21de379598f79adade4c3cd376f">ecp_keypair::grp</a></div><div class="ttdeci">ecp_group grp</div><div class="ttdef"><b>Definition:</b> <a href="ecp_8h_source.html#l00165">ecp.h:165</a></div></div> <div class="ttc" id="group__asn1__module_html_ga9321fc9f2a5ef4103008fbe5c4b230df"><div class="ttname"><a href="group__asn1__module.html#ga9321fc9f2a5ef4103008fbe5c4b230df">ASN1_SEQUENCE</a></div><div class="ttdeci">#define ASN1_SEQUENCE</div><div class="ttdef"><b>Definition:</b> <a href="asn1_8h_source.html#l00082">asn1.h:82</a></div></div> <div class="ttc" id="ecdsa_8h_html_a5a5858bde5c49005fefbe74883fc9a9d"><div class="ttname"><a href="ecdsa_8h.html#a5a5858bde5c49005fefbe74883fc9a9d">ecdsa_sign</a></div><div class="ttdeci">int ecdsa_sign(ecp_group *grp, mpi *r, mpi *s, const mpi *d, const unsigned char *buf, size_t blen, int(*f_rng)(void *, unsigned char *, size_t), void *p_rng)</div><div class="ttdoc">Compute ECDSA signature of a previously hashed message. </div></div> <div class="ttc" id="structecp__group_html"><div class="ttname"><a href="structecp__group.html">ecp_group</a></div><div class="ttdoc">ECP group structure. </div><div class="ttdef"><b>Definition:</b> <a href="ecp_8h_source.html#l00136">ecp.h:136</a></div></div> <div class="ttc" id="config_8h_html"><div class="ttname"><a href="config_8h.html">config.h</a></div><div class="ttdoc">Configuration options (set of defines) </div></div> <div class="ttc" id="ecdsa_8h_html_af449415b02ec5ba96d800cbcd9d5f042"><div class="ttname"><a href="ecdsa_8h.html#af449415b02ec5ba96d800cbcd9d5f042">ecdsa_self_test</a></div><div class="ttdeci">int ecdsa_self_test(int verbose)</div><div class="ttdoc">Checkup routine. </div></div> <div class="ttc" id="structecdsa__context_html_a651d70dd9732c8dd3ea043bbc57473a7"><div class="ttname"><a href="structecdsa__context.html#a651d70dd9732c8dd3ea043bbc57473a7">ecdsa_context::grp</a></div><div class="ttdeci">ecp_group grp</div><div class="ttdef"><b>Definition:</b> <a href="ecdsa_8h_source.html#l00043">ecdsa.h:43</a></div></div> <div class="ttc" id="group__asn1__module_html_ga799d7b17a9532e1dadc8355f04477e27"><div class="ttname"><a href="group__asn1__module.html#ga799d7b17a9532e1dadc8355f04477e27">ASN1_CONSTRUCTED</a></div><div class="ttdeci">#define ASN1_CONSTRUCTED</div><div class="ttdef"><b>Definition:</b> <a href="asn1_8h_source.html#l00092">asn1.h:92</a></div></div> <div class="ttc" id="structecp__keypair_html"><div class="ttname"><a href="structecp__keypair.html">ecp_keypair</a></div><div class="ttdoc">ECP key pair structure. </div><div class="ttdef"><b>Definition:</b> <a href="ecp_8h_source.html#l00163">ecp.h:163</a></div></div> <div class="ttc" id="structecp__keypair_html_a8531547899526b4e8e6b2427c09e0177"><div class="ttname"><a href="structecp__keypair.html#a8531547899526b4e8e6b2427c09e0177">ecp_keypair::d</a></div><div class="ttdeci">mpi d</div><div class="ttdef"><b>Definition:</b> <a href="ecp_8h_source.html#l00166">ecp.h:166</a></div></div> <div class="ttc" id="structmpi_html"><div class="ttname"><a href="structmpi.html">mpi</a></div><div class="ttdoc">MPI structure. </div><div class="ttdef"><b>Definition:</b> <a href="bignum_8h_source.html#l00182">bignum.h:182</a></div></div> <div class="ttc" id="ecp_8h_html_a337b0e41153f458872f7f73bad93711c"><div class="ttname"><a href="ecp_8h.html#a337b0e41153f458872f7f73bad93711c">ecp_mul</a></div><div class="ttdeci">int ecp_mul(ecp_group *grp, ecp_point *R, const mpi *m, const ecp_point *P, int(*f_rng)(void *, unsigned char *, size_t), void *p_rng)</div><div class="ttdoc">Multiplication by an integer: R = m * P (Not thread-safe to use same group in multiple threads) ...</div></div> <div class="ttc" id="bignum_8h_html_a201666869f65225d6535bcc697f95c9b"><div class="ttname"><a href="bignum_8h.html#a201666869f65225d6535bcc697f95c9b">mpi_init</a></div><div class="ttdeci">void mpi_init(mpi *X)</div><div class="ttdoc">Initialize one MPI. </div></div> <div class="ttc" id="structecp__point_html_ad22ad099567064b38af5a1f2f58f0acc"><div class="ttname"><a href="structecp__point.html#ad22ad099567064b38af5a1f2f58f0acc">ecp_point::X</a></div><div class="ttdeci">mpi X</div><div class="ttdef"><b>Definition:</b> <a href="ecp_8h_source.html#l00106">ecp.h:106</a></div></div> <div class="ttc" id="bignum_8h_html_aec20dff9d78738e3c80b212df9875b83"><div class="ttname"><a href="bignum_8h.html#aec20dff9d78738e3c80b212df9875b83">mpi_cmp_mpi</a></div><div class="ttdeci">int mpi_cmp_mpi(const mpi *X, const mpi *Y)</div><div class="ttdoc">Compare signed values. </div></div> <div class="ttc" id="bignum_8h_html_a01de1543da79d0ad0f58916d608f6ff8"><div class="ttname"><a href="bignum_8h.html#a01de1543da79d0ad0f58916d608f6ff8">mpi_shift_r</a></div><div class="ttdeci">int mpi_shift_r(mpi *X, size_t count)</div><div class="ttdoc">Right-shift: X &gt;&gt;= count. </div></div> <div class="ttc" id="md_8h_html_af1fbbb67afa0daee4090cde8864e0b68"><div class="ttname"><a href="md_8h.html#af1fbbb67afa0daee4090cde8864e0b68">md_type_t</a></div><div class="ttdeci">md_type_t</div><div class="ttdef"><b>Definition:</b> <a href="md_8h_source.html#l00051">md.h:51</a></div></div> <div class="ttc" id="asn1write_8h_html_a4fc66d40e537079c762ab2df2c2ba3c8"><div class="ttname"><a href="asn1write_8h.html#a4fc66d40e537079c762ab2df2c2ba3c8">asn1_write_len</a></div><div class="ttdeci">int asn1_write_len(unsigned char **p, unsigned char *start, size_t len)</div><div class="ttdoc">Write a length field in ASN.1 format Note: function works backwards in data buffer. </div></div> <div class="ttc" id="bignum_8h_html_adf5b20e8d8c0a660e4f59f859a0bee18"><div class="ttname"><a href="bignum_8h.html#adf5b20e8d8c0a660e4f59f859a0bee18">mpi_add_mpi</a></div><div class="ttdeci">int mpi_add_mpi(mpi *X, const mpi *A, const mpi *B)</div><div class="ttdoc">Signed addition: X = A + B. </div></div> <div class="ttc" id="md_8h_html_a622c94870533dc68f54b8df520d2c6d9"><div class="ttname"><a href="md_8h.html#a622c94870533dc68f54b8df520d2c6d9">md_info_from_type</a></div><div class="ttdeci">const md_info_t * md_info_from_type(md_type_t md_type)</div><div class="ttdoc">Returns the message digest information associated with the given digest type. </div></div> <div class="ttc" id="structecdsa__context_html_a9fe28b71d896452366251d3e4755f9d1"><div class="ttname"><a href="structecdsa__context.html#a9fe28b71d896452366251d3e4755f9d1">ecdsa_context::r</a></div><div class="ttdeci">mpi r</div><div class="ttdef"><b>Definition:</b> <a href="ecdsa_8h_source.html#l00046">ecdsa.h:46</a></div></div> <div class="ttc" id="ecp_8h_html_a250e37c379fd853d666415a8fc308e6e"><div class="ttname"><a href="ecp_8h.html#a250e37c379fd853d666415a8fc308e6e">POLARSSL_ERR_ECP_VERIFY_FAILED</a></div><div class="ttdeci">#define POLARSSL_ERR_ECP_VERIFY_FAILED</div><div class="ttdoc">The signature is not valid. </div><div class="ttdef"><b>Definition:</b> <a href="ecp_8h_source.html#l00038">ecp.h:38</a></div></div> <div class="ttc" id="structecp__group_html_adb738e2c6df3c75c4b30b2b1c3e61256"><div class="ttname"><a href="structecp__group.html#adb738e2c6df3c75c4b30b2b1c3e61256">ecp_group::G</a></div><div class="ttdeci">ecp_point G</div><div class="ttdef"><b>Definition:</b> <a href="ecp_8h_source.html#l00142">ecp.h:142</a></div></div> <div class="ttc" id="structecp__point_html"><div class="ttname"><a href="structecp__point.html">ecp_point</a></div><div class="ttdoc">ECP point structure (jacobian coordinates) </div><div class="ttdef"><b>Definition:</b> <a href="ecp_8h_source.html#l00104">ecp.h:104</a></div></div> <div class="ttc" id="ecp_8h_html_ab091c21f839189f606dfad0ef924af35"><div class="ttname"><a href="ecp_8h.html#ab091c21f839189f606dfad0ef924af35">ecp_is_zero</a></div><div class="ttdeci">int ecp_is_zero(ecp_point *pt)</div><div class="ttdoc">Tell if a point is zero. </div></div> <div class="ttc" id="ecp_8h_html_a870fd59435f6519b4027050afe24fc7c"><div class="ttname"><a href="ecp_8h.html#a870fd59435f6519b4027050afe24fc7c">ecp_point_init</a></div><div class="ttdeci">void ecp_point_init(ecp_point *pt)</div><div class="ttdoc">Initialize a point (as zero) </div></div> <div class="ttc" id="structhmac__drbg__context_html"><div class="ttname"><a href="structhmac__drbg__context.html">hmac_drbg_context</a></div><div class="ttdoc">HMAC_DRBG context. </div><div class="ttdef"><b>Definition:</b> <a href="hmac__drbg_8h_source.html#l00076">hmac_drbg.h:76</a></div></div> <div class="ttc" id="structecp__group_html_a6b424e0dbad7d3c900375a2ff0154b95"><div class="ttname"><a href="structecp__group.html#a6b424e0dbad7d3c900375a2ff0154b95">ecp_group::N</a></div><div class="ttdeci">mpi N</div><div class="ttdef"><b>Definition:</b> <a href="ecp_8h_source.html#l00143">ecp.h:143</a></div></div> <div class="ttc" id="hmac__drbg_8h_html_a3a0bf86f3afd2e39cbb3c3a08faf5e44"><div class="ttname"><a href="hmac__drbg_8h.html#a3a0bf86f3afd2e39cbb3c3a08faf5e44">hmac_drbg_free</a></div><div class="ttdeci">void hmac_drbg_free(hmac_drbg_context *ctx)</div><div class="ttdoc">Free an HMAC_DRBG context. </div></div> <div class="ttc" id="bignum_8h_html_a090616da16b87653c025874e1675da79"><div class="ttname"><a href="bignum_8h.html#a090616da16b87653c025874e1675da79">mpi_inv_mod</a></div><div class="ttdeci">int mpi_inv_mod(mpi *X, const mpi *A, const mpi *N)</div><div class="ttdoc">Modular inverse: X = A^-1 mod N. </div></div> <div class="ttc" id="structecdsa__context_html"><div class="ttname"><a href="structecdsa__context.html">ecdsa_context</a></div><div class="ttdoc">ECDSA context structure. </div><div class="ttdef"><b>Definition:</b> <a href="ecdsa_8h_source.html#l00041">ecdsa.h:41</a></div></div> <div class="ttc" id="structecdsa__context_html_a3c84b57b2b3ba1db63fb3a86c447a39d"><div class="ttname"><a href="structecdsa__context.html#a3c84b57b2b3ba1db63fb3a86c447a39d">ecdsa_context::s</a></div><div class="ttdeci">mpi s</div><div class="ttdef"><b>Definition:</b> <a href="ecdsa_8h_source.html#l00047">ecdsa.h:47</a></div></div> <div class="ttc" id="bignum_8h_html_ae1f6507671587755e46bbf0afcae6a8c"><div class="ttname"><a href="bignum_8h.html#ae1f6507671587755e46bbf0afcae6a8c">mpi_free</a></div><div class="ttdeci">void mpi_free(mpi *X)</div><div class="ttdoc">Unallocate one MPI. </div></div> <div class="ttc" id="ecp_8h_html_acbb816c782b4d903a0f0fac9b9d7e748"><div class="ttname"><a href="ecp_8h.html#acbb816c782b4d903a0f0fac9b9d7e748">ecp_group_free</a></div><div class="ttdeci">void ecp_group_free(ecp_group *grp)</div><div class="ttdoc">Free the components of an ECP group. </div></div> <div class="ttc" id="ecdsa_8h_html_a5f77f5b93fce3ef628d7f8de5bf92de8"><div class="ttname"><a href="ecdsa_8h.html#a5f77f5b93fce3ef628d7f8de5bf92de8">ecdsa_read_signature</a></div><div class="ttdeci">int ecdsa_read_signature(ecdsa_context *ctx, const unsigned char *hash, size_t hlen, const unsigned char *sig, size_t slen)</div><div class="ttdoc">Read and verify an ECDSA signature. </div></div> <div class="ttc" id="structecdsa__context_html_a08c8c8eec4c95e71ad0b2b122f3ae1e1"><div class="ttname"><a href="structecdsa__context.html#a08c8c8eec4c95e71ad0b2b122f3ae1e1">ecdsa_context::Q</a></div><div class="ttdeci">ecp_point Q</div><div class="ttdef"><b>Definition:</b> <a href="ecdsa_8h_source.html#l00045">ecdsa.h:45</a></div></div> <div class="ttc" id="ecdsa_8h_html_a70bf12fe3c9062d5ee306378d94f8d67"><div class="ttname"><a href="ecdsa_8h.html#a70bf12fe3c9062d5ee306378d94f8d67">ecdsa_init</a></div><div class="ttdeci">void ecdsa_init(ecdsa_context *ctx)</div><div class="ttdoc">Initialize context. </div></div> <div class="ttc" id="ecp_8h_html_aaf7e6813178463e3ebb15b0719d1d30a"><div class="ttname"><a href="ecp_8h.html#aaf7e6813178463e3ebb15b0719d1d30a">ecp_gen_keypair</a></div><div class="ttdeci">int ecp_gen_keypair(ecp_group *grp, mpi *d, ecp_point *Q, int(*f_rng)(void *, unsigned char *, size_t), void *p_rng)</div><div class="ttdoc">Generate a keypair. </div></div> <div class="ttc" id="md_8h_html_a5d1f7e44d913c6621403773374b89b3e"><div class="ttname"><a href="md_8h.html#a5d1f7e44d913c6621403773374b89b3e">md_list</a></div><div class="ttdeci">const int * md_list(void)</div><div class="ttdoc">Returns the list of digests supported by the generic digest module. </div></div> <div class="ttc" id="ecp_8h_html_a1ef9d88cd3a37a2fef0267d1dfe72510"><div class="ttname"><a href="ecp_8h.html#a1ef9d88cd3a37a2fef0267d1dfe72510">POLARSSL_ECP_MAX_BYTES</a></div><div class="ttdeci">#define POLARSSL_ECP_MAX_BYTES</div><div class="ttdef"><b>Definition:</b> <a href="ecp_8h_source.html#l00186">ecp.h:186</a></div></div> <div class="ttc" id="asn1write_8h_html_acfc669194aa6ee652f09891f70827bc2"><div class="ttname"><a href="asn1write_8h.html#acfc669194aa6ee652f09891f70827bc2">asn1_write_mpi</a></div><div class="ttdeci">int asn1_write_mpi(unsigned char **p, unsigned char *start, mpi *X)</div><div class="ttdoc">Write a big number (ASN1_INTEGER) in ASN.1 format Note: function works backwards in data buffer...</div></div> <div class="ttc" id="ecp_8h_html_af245b6e35c32a231e18bf335de7de774"><div class="ttname"><a href="ecp_8h.html#af245b6e35c32a231e18bf335de7de774">ecp_use_known_dp</a></div><div class="ttdeci">int ecp_use_known_dp(ecp_group *grp, ecp_group_id index)</div><div class="ttdoc">Set a group using well-known domain parameters. </div></div> <div class="ttc" id="ecp_8h_html_a4d192c7a9b2f415c40a9ec2dc955ea13"><div class="ttname"><a href="ecp_8h.html#a4d192c7a9b2f415c40a9ec2dc955ea13">ecp_copy</a></div><div class="ttdeci">int ecp_copy(ecp_point *P, const ecp_point *Q)</div><div class="ttdoc">Copy the contents of point Q into P. </div></div> <div class="ttc" id="structmpi_html_aaeeabe339c1cc40d05bdb026666404f8"><div class="ttname"><a href="structmpi.html#aaeeabe339c1cc40d05bdb026666404f8">mpi::p</a></div><div class="ttdeci">t_uint * p</div><div class="ttdef"><b>Definition:</b> <a href="bignum_8h_source.html#l00186">bignum.h:186</a></div></div> <div class="ttc" id="bignum_8h_html_a0235008cccbf00b8bc03699de8094819"><div class="ttname"><a href="bignum_8h.html#a0235008cccbf00b8bc03699de8094819">mpi_read_binary</a></div><div class="ttdeci">int mpi_read_binary(mpi *X, const unsigned char *buf, size_t buflen)</div><div class="ttdoc">Import X from unsigned binary data, big endian. </div></div> <div class="ttc" id="ecp_8h_html_a751fce96f17826537221248b4ed5cbd2"><div class="ttname"><a href="ecp_8h.html#a751fce96f17826537221248b4ed5cbd2">ecp_group_id</a></div><div class="ttdeci">ecp_group_id</div><div class="ttdoc">Domain parameters (curve, subgroup and generator) identifiers. </div><div class="ttdef"><b>Definition:</b> <a href="ecp_8h_source.html#l00057">ecp.h:57</a></div></div> <div class="ttc" id="asn1write_8h_html_a31a94e90950151e3f9b47e72bad09c20"><div class="ttname"><a href="asn1write_8h.html#a31a94e90950151e3f9b47e72bad09c20">ASN1_CHK_ADD</a></div><div class="ttdeci">#define ASN1_CHK_ADD(g, f)</div><div class="ttdef"><b>Definition:</b> <a href="asn1write_8h_source.html#l00032">asn1write.h:32</a></div></div> <div class="ttc" id="ecdsa_8h_html_ac394e13bb4ced90794817d9a127bc776"><div class="ttname"><a href="ecdsa_8h.html#ac394e13bb4ced90794817d9a127bc776">ecdsa_genkey</a></div><div class="ttdeci">int ecdsa_genkey(ecdsa_context *ctx, ecp_group_id gid, int(*f_rng)(void *, unsigned char *, size_t), void *p_rng)</div><div class="ttdoc">Generate an ECDSA keypair on the given curve. </div></div> <div class="ttc" id="ecp_8h_html_a9859e0bafd24035307f33c1aee570eef"><div class="ttname"><a href="ecp_8h.html#a9859e0bafd24035307f33c1aee570eef">ecp_group_init</a></div><div class="ttdeci">void ecp_group_init(ecp_group *grp)</div><div class="ttdoc">Initialize a group (to something meaningless) </div></div> <div class="ttc" id="structecp__group_html_a372ef0b2cbf3232760e108e5b97c8a3e"><div class="ttname"><a href="structecp__group.html#a372ef0b2cbf3232760e108e5b97c8a3e">ecp_group::nbits</a></div><div class="ttdeci">size_t nbits</div><div class="ttdef"><b>Definition:</b> <a href="ecp_8h_source.html#l00145">ecp.h:145</a></div></div> <div class="ttc" id="ecp_8h_html_a8de4c3d074d63c08f314012b604c98c8"><div class="ttname"><a href="ecp_8h.html#a8de4c3d074d63c08f314012b604c98c8">POLARSSL_ERR_ECP_RANDOM_FAILED</a></div><div class="ttdeci">#define POLARSSL_ERR_ECP_RANDOM_FAILED</div><div class="ttdoc">Generation of random value, such as (ephemeral) key, failed. </div><div class="ttdef"><b>Definition:</b> <a href="ecp_8h_source.html#l00040">ecp.h:40</a></div></div> <div class="ttc" id="bignum_8h_html_a6fbcce39a9d92d9e2a560f8aa6a810f4"><div class="ttname"><a href="bignum_8h.html#a6fbcce39a9d92d9e2a560f8aa6a810f4">mpi_copy</a></div><div class="ttdeci">int mpi_copy(mpi *X, const mpi *Y)</div><div class="ttdoc">Copy the contents of Y into X. </div></div> <div class="ttc" id="bignum_8h_html_a075d3cf21cb3733e5f0a872e72b0cd15"><div class="ttname"><a href="bignum_8h.html#a075d3cf21cb3733e5f0a872e72b0cd15">mpi_mod_mpi</a></div><div class="ttdeci">int mpi_mod_mpi(mpi *R, const mpi *A, const mpi *B)</div><div class="ttdoc">Modulo: R = A mod B. </div></div> <div class="ttc" id="ecdsa_8h_html_af633a283f02fb3381354dc857a5cef43"><div class="ttname"><a href="ecdsa_8h.html#af633a283f02fb3381354dc857a5cef43">ecdsa_sign_det</a></div><div class="ttdeci">int ecdsa_sign_det(ecp_group *grp, mpi *r, mpi *s, const mpi *d, const unsigned char *buf, size_t blen, md_type_t md_alg)</div><div class="ttdoc">Compute ECDSA signature of a previously hashed message (deterministic version) </div></div> <div class="ttc" id="asn1_8h_html_af7d10ad8e91ae5cb4a78f7d7dc1a8ac6"><div class="ttname"><a href="asn1_8h.html#af7d10ad8e91ae5cb4a78f7d7dc1a8ac6">asn1_get_tag</a></div><div class="ttdeci">int asn1_get_tag(unsigned char **p, const unsigned char *end, size_t *len, int tag)</div><div class="ttdoc">Get the tag and length of the tag. </div></div> <div class="ttc" id="bignum_8h_html_a5d464b4312859ce4969d114eb5e02741"><div class="ttname"><a href="bignum_8h.html#a5d464b4312859ce4969d114eb5e02741">mpi_write_binary</a></div><div class="ttdeci">int mpi_write_binary(const mpi *X, unsigned char *buf, size_t buflen)</div><div class="ttdoc">Export X into unsigned binary data, big endian. </div></div> <div class="ttc" id="hmac__drbg_8h_html_acd163a15df844543ab5b950f4d13d65f"><div class="ttname"><a href="hmac__drbg_8h.html#acd163a15df844543ab5b950f4d13d65f">hmac_drbg_init_buf</a></div><div class="ttdeci">int hmac_drbg_init_buf(hmac_drbg_context *ctx, const md_info_t *md_info, const unsigned char *data, size_t data_len)</div><div class="ttdoc">Initilisation of simpified HMAC_DRBG (never reseeds). </div></div> <div class="ttc" id="ecdsa_8h_html_ab49abcf12ba983d101f500fd85f468da"><div class="ttname"><a href="ecdsa_8h.html#ab49abcf12ba983d101f500fd85f468da">ecdsa_free</a></div><div class="ttdeci">void ecdsa_free(ecdsa_context *ctx)</div><div class="ttdoc">Free context. </div></div> <div class="ttc" id="asn1write_8h_html"><div class="ttname"><a href="asn1write_8h.html">asn1write.h</a></div><div class="ttdoc">ASN.1 buffer writing functionality. </div></div> <div class="ttc" id="structecp__keypair_html_a3a2bd5744991a7b0fbc76c3649a1e8a1"><div class="ttname"><a href="structecp__keypair.html#a3a2bd5744991a7b0fbc76c3649a1e8a1">ecp_keypair::Q</a></div><div class="ttdeci">ecp_point Q</div><div class="ttdef"><b>Definition:</b> <a href="ecp_8h_source.html#l00167">ecp.h:167</a></div></div> <div class="ttc" id="structmd__info__t_html_aedb1e12797791c9b7f5545bda6e3172d"><div class="ttname"><a href="structmd__info__t.html#aedb1e12797791c9b7f5545bda6e3172d">md_info_t::size</a></div><div class="ttdeci">int size</div><div class="ttdoc">Output length of the digest function. </div><div class="ttdef"><b>Definition:</b> <a href="md_8h_source.html#l00082">md.h:82</a></div></div> <div class="ttc" id="ecp_8h_html_a2b89dc1f1a90c6bd42fd1f927c2c6a13"><div class="ttname"><a href="ecp_8h.html#a2b89dc1f1a90c6bd42fd1f927c2c6a13">ecp_check_pubkey</a></div><div class="ttdeci">int ecp_check_pubkey(const ecp_group *grp, const ecp_point *pt)</div><div class="ttdoc">Check that a point is a valid public key on this curve. </div></div> <div class="ttc" id="ecp_8h_html_a59b4740379580218d00c3f0904dda21f"><div class="ttname"><a href="ecp_8h.html#a59b4740379580218d00c3f0904dda21f">ecp_add</a></div><div class="ttdeci">int ecp_add(const ecp_group *grp, ecp_point *R, const ecp_point *P, const ecp_point *Q)</div><div class="ttdoc">Addition: R = P + Q. </div></div> <div class="ttc" id="asn1write_8h_html_a625cc3f39febf33574b80d767d56be7a"><div class="ttname"><a href="asn1write_8h.html#a625cc3f39febf33574b80d767d56be7a">asn1_write_tag</a></div><div class="ttdeci">int asn1_write_tag(unsigned char **p, unsigned char *start, unsigned char tag)</div><div class="ttdoc">Write a ASN.1 tag in ASN.1 format Note: function works backwards in data buffer. </div></div> <div class="ttc" id="bignum_8h_html_ab63bfb07b27db84268491cd7d68bddc0"><div class="ttname"><a href="bignum_8h.html#ab63bfb07b27db84268491cd7d68bddc0">mpi_mul_mpi</a></div><div class="ttdeci">int mpi_mul_mpi(mpi *X, const mpi *A, const mpi *B)</div><div class="ttdoc">Baseline multiplication: X = A * B. </div></div> <div class="ttc" id="bignum_8h_html_a149a13ed93fddb432fb5edd3126b1186"><div class="ttname"><a href="bignum_8h.html#a149a13ed93fddb432fb5edd3126b1186">mpi_sub_mpi</a></div><div class="ttdeci">int mpi_sub_mpi(mpi *X, const mpi *A, const mpi *B)</div><div class="ttdoc">Signed subtraction: X = A - B. </div></div> <div class="ttc" id="asn1_8h_html_a9241caf4492b2405e48db346205af62f"><div class="ttname"><a href="asn1_8h.html#a9241caf4492b2405e48db346205af62f">asn1_get_mpi</a></div><div class="ttdeci">int asn1_get_mpi(unsigned char **p, const unsigned char *end, mpi *X)</div><div class="ttdoc">Retrieve a MPI value from an integer ASN.1 tag. </div></div> <div class="ttc" id="structmd__info__t_html"><div class="ttname"><a href="structmd__info__t.html">md_info_t</a></div><div class="ttdoc">Message digest information. </div><div class="ttdef"><b>Definition:</b> <a href="md_8h_source.html#l00074">md.h:74</a></div></div> <div class="ttc" id="ecdsa_8h_html_ad86d178c1aa2135f398e5a92e860dae4"><div class="ttname"><a href="ecdsa_8h.html#ad86d178c1aa2135f398e5a92e860dae4">ecdsa_write_signature_det</a></div><div class="ttdeci">int ecdsa_write_signature_det(ecdsa_context *ctx, const unsigned char *hash, size_t hlen, unsigned char *sig, size_t *slen, md_type_t md_alg)</div><div class="ttdoc">Compute ECDSA signature and write it to buffer, serialized as defined in RFC 4492 page 20...</div></div> <div class="ttc" id="ecp_8h_html_a1d2b0f995bf076c5ce5bbc7deb94150c"><div class="ttname"><a href="ecp_8h.html#a1d2b0f995bf076c5ce5bbc7deb94150c">POLARSSL_ERR_ECP_SIG_LEN_MISMATCH</a></div><div class="ttdeci">#define POLARSSL_ERR_ECP_SIG_LEN_MISMATCH</div><div class="ttdoc">Signature is valid but shorter than the user-supplied length. </div><div class="ttdef"><b>Definition:</b> <a href="ecp_8h_source.html#l00042">ecp.h:42</a></div></div> <div class="ttc" id="md_8h_html_af1fbbb67afa0daee4090cde8864e0b68a1058b903a7b49716f1b75cca6e80c4e8"><div class="ttname"><a href="md_8h.html#af1fbbb67afa0daee4090cde8864e0b68a1058b903a7b49716f1b75cca6e80c4e8">POLARSSL_MD_NONE</a></div><div class="ttdef"><b>Definition:</b> <a href="md_8h_source.html#l00052">md.h:52</a></div></div> <div class="ttc" id="hmac__drbg_8h_html"><div class="ttname"><a href="hmac__drbg_8h.html">hmac_drbg.h</a></div><div class="ttdoc">HMAC_DRBG (NIST SP 800-90A) </div></div> <div class="ttc" id="bignum_8h_html_a024b186dd3608bcbcfc9dd36212a18ec"><div class="ttname"><a href="bignum_8h.html#a024b186dd3608bcbcfc9dd36212a18ec">MPI_CHK</a></div><div class="ttdeci">#define MPI_CHK(f)</div><div class="ttdef"><b>Definition:</b> <a href="bignum_8h_source.html#l00065">bignum.h:65</a></div></div> <div class="ttc" id="ecp_8h_html_a6a949f9b9194bbf02dc83d3aa0c61567"><div class="ttname"><a href="ecp_8h.html#a6a949f9b9194bbf02dc83d3aa0c61567">ecp_point_free</a></div><div class="ttdeci">void ecp_point_free(ecp_point *pt)</div><div class="ttdoc">Free the components of a point. </div></div> </div><!-- fragment --></div><!-- contents --> <!-- start footer part --> <hr class="footer"/><address class="footer"><small> Generated on Thu Jul 31 2014 11:35:51 for PolarSSL v1.3.8 by  <a href="http://www.doxygen.org/index.html"> <img class="footer" src="doxygen.png" alt="doxygen"/> </a> 1.8.5 </small></address> </body> </html>