Skip to content
体验新版
项目
组织
正在加载...
登录
切换导航
打开侧边栏
OpenHarmony
Third Party Openssl
提交
8dee9f84
T
Third Party Openssl
项目概览
OpenHarmony
/
Third Party Openssl
8 个月 前同步成功
通知
8
Star
18
Fork
1
代码
文件
提交
分支
Tags
贡献者
分支图
Diff
Issue
0
列表
看板
标记
里程碑
合并请求
0
Wiki
0
Wiki
分析
仓库
DevOps
项目成员
Pages
T
Third Party Openssl
项目概览
项目概览
详情
发布
仓库
仓库
文件
提交
分支
标签
贡献者
分支图
比较
Issue
0
Issue
0
列表
看板
标记
里程碑
合并请求
0
合并请求
0
Pages
分析
分析
仓库分析
DevOps
Wiki
0
Wiki
成员
成员
收起侧边栏
关闭侧边栏
动态
分支图
创建新Issue
提交
Issue看板
前往新版Gitcode,体验更适合开发者的 AI 搜索 >>
提交
8dee9f84
编写于
11月 15, 2005
作者:
B
Bodo Möller
浏览文件
操作
浏览文件
下载
电子邮件补丁
差异文件
deFUDify: don't require OPENSSL_EC_BIN_PT_COMP
上级
963ba100
变更
3
隐藏空白更改
内联
并排
Showing
3 changed file
with
91 addition
and
21 deletion
+91
-21
CHANGES
CHANGES
+5
-0
crypto/ec/Makefile
crypto/ec/Makefile
+2
-3
crypto/ec/ec2_smpl.c
crypto/ec/ec2_smpl.c
+84
-18
未找到文件。
CHANGES
浏览文件 @
8dee9f84
...
...
@@ -4,6 +4,11 @@
Changes between 0.9.8a and 0.9.9 [xx XXX xxxx]
*) Move code previously exiled into file crypto/ec/ec2_smpt.c
to ec2_smpl.c, and no longer require the OPENSSL_EC_BIN_PT_COMP
macro.
[Bodo Moeller]
*) New candidate for BIGNUM assembler implementation, bn_mul_mont,
dedicated Montgomery multiplication procedure, is introduced.
BN_MONT_CTX is modified to allow bn_mul_mont to reach for higher
...
...
crypto/ec/Makefile
浏览文件 @
8dee9f84
...
...
@@ -19,7 +19,7 @@ APPS=
LIB
=
$(TOP)
/libcrypto.a
LIBSRC
=
ec_lib.c ecp_smpl.c ecp_mont.c ecp_nist.c ec_cvt.c ec_mult.c
\
ec_err.c ec_curve.c ec_check.c ec_print.c ec_asn1.c ec_key.c
\
ec2_smpl.c ec2_
smpt.c ec2_
mult.c
ec2_smpl.c ec2_mult.c
LIBOBJ
=
ec_lib.o ecp_smpl.o ecp_mont.o ecp_nist.o ec_cvt.o ec_mult.o
\
ec_err.o ec_curve.o ec_check.o ec_print.o ec_asn1.o ec_key.o
\
...
...
@@ -94,8 +94,7 @@ ec2_smpl.o: ../../include/openssl/err.h ../../include/openssl/lhash.h
ec2_smpl.o
:
../../include/openssl/obj_mac.h ../../include/openssl/opensslconf.h
ec2_smpl.o
:
../../include/openssl/opensslv.h ../../include/openssl/ossl_typ.h
ec2_smpl.o
:
../../include/openssl/safestack.h ../../include/openssl/stack.h
ec2_smpl.o
:
../../include/openssl/symhacks.h ec2_smpl.c ec2_smpt.c ec_lcl.h
ec2_smpt.o
:
ec2_smpt.c
ec2_smpl.o
:
../../include/openssl/symhacks.h ec2_smpl.c ec_lcl.h
ec_asn1.o
:
../../include/openssl/asn1.h ../../include/openssl/asn1t.h
ec_asn1.o
:
../../include/openssl/bio.h ../../include/openssl/bn.h
ec_asn1.o
:
../../include/openssl/crypto.h ../../include/openssl/e_os2.h
...
...
crypto/ec/ec2_smpl.c
浏览文件 @
8dee9f84
...
...
@@ -14,7 +14,7 @@
*
*/
/* ====================================================================
* Copyright (c) 1998-200
3
The OpenSSL Project. All rights reserved.
* Copyright (c) 1998-200
5
The OpenSSL Project. All rights reserved.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions
...
...
@@ -403,18 +403,94 @@ int ec_GF2m_simple_point_get_affine_coordinates(const EC_GROUP *group, const EC_
}
/* Include patented algorithms. */
#include "ec2_smpt.c"
/* Calculates and sets the affine coordinates of an EC_POINT from the given
* compressed coordinates. Uses algorithm 2.3.4 of SEC 1.
* Note that the simple implementation only uses affine coordinates.
*
* The method is from the following publication:
*
* Harper, Menezes, Vanstone:
* "Public-Key Cryptosystems with Very Small Key Lengths",
* EUROCRYPT '92, Springer-Verlag LNCS 658,
* published February 1993
*
* US Patents 6,141,420 and 6,618,483 (Vanstone, Mullin, Agnew) describe
* the same method, but claim no priority date earlier than July 29, 1994
* (and additionally fail to cite the EUROCRYPT '92 publication as prior art).
*/
int
ec_GF2m_simple_set_compressed_coordinates
(
const
EC_GROUP
*
group
,
EC_POINT
*
point
,
const
BIGNUM
*
x_
,
int
y_bit
,
BN_CTX
*
ctx
)
{
BN_CTX
*
new_ctx
=
NULL
;
BIGNUM
*
tmp
,
*
x
,
*
y
,
*
z
;
int
ret
=
0
,
z0
;
/* clear error queue */
ERR_clear_error
();
if
(
ctx
==
NULL
)
{
ctx
=
new_ctx
=
BN_CTX_new
();
if
(
ctx
==
NULL
)
return
0
;
}
y_bit
=
(
y_bit
!=
0
)
?
1
:
0
;
BN_CTX_start
(
ctx
);
tmp
=
BN_CTX_get
(
ctx
);
x
=
BN_CTX_get
(
ctx
);
y
=
BN_CTX_get
(
ctx
);
z
=
BN_CTX_get
(
ctx
);
if
(
z
==
NULL
)
goto
err
;
if
(
!
BN_GF2m_mod_arr
(
x
,
x_
,
group
->
poly
))
goto
err
;
if
(
BN_is_zero
(
x
))
{
if
(
!
BN_GF2m_mod_sqrt_arr
(
y
,
&
group
->
b
,
group
->
poly
,
ctx
))
goto
err
;
}
else
{
if
(
!
group
->
meth
->
field_sqr
(
group
,
tmp
,
x
,
ctx
))
goto
err
;
if
(
!
group
->
meth
->
field_div
(
group
,
tmp
,
&
group
->
b
,
tmp
,
ctx
))
goto
err
;
if
(
!
BN_GF2m_add
(
tmp
,
&
group
->
a
,
tmp
))
goto
err
;
if
(
!
BN_GF2m_add
(
tmp
,
x
,
tmp
))
goto
err
;
if
(
!
BN_GF2m_mod_solve_quad_arr
(
z
,
tmp
,
group
->
poly
,
ctx
))
{
unsigned
long
err
=
ERR_peek_last_error
();
if
(
ERR_GET_LIB
(
err
)
==
ERR_LIB_BN
&&
ERR_GET_REASON
(
err
)
==
BN_R_NO_SOLUTION
)
{
ERR_clear_error
();
ECerr
(
EC_F_EC_GF2M_SIMPLE_SET_COMPRESSED_COORDINATES
,
EC_R_INVALID_COMPRESSED_POINT
);
}
else
ECerr
(
EC_F_EC_GF2M_SIMPLE_SET_COMPRESSED_COORDINATES
,
ERR_R_BN_LIB
);
goto
err
;
}
z0
=
(
BN_is_odd
(
z
))
?
1
:
0
;
if
(
!
group
->
meth
->
field_mul
(
group
,
y
,
x
,
z
,
ctx
))
goto
err
;
if
(
z0
!=
y_bit
)
{
if
(
!
BN_GF2m_add
(
y
,
y
,
x
))
goto
err
;
}
}
if
(
!
EC_POINT_set_affine_coordinates_GF2m
(
group
,
point
,
x
,
y
,
ctx
))
goto
err
;
ret
=
1
;
err:
BN_CTX_end
(
ctx
);
if
(
new_ctx
!=
NULL
)
BN_CTX_free
(
new_ctx
);
return
ret
;
}
/* Converts an EC_POINT to an octet string.
* If buf is NULL, the encoded length will be returned.
* If the length len of buf is smaller than required an error will be returned.
*
* The point compression section of this function is patented by Certicom Corp.
* under US Patent 6,141,420. Point compression is disabled by default and can
* be enabled by defining the preprocessor macro OPENSSL_EC_BIN_PT_COMP at
* Configure-time.
*/
size_t
ec_GF2m_simple_point2oct
(
const
EC_GROUP
*
group
,
const
EC_POINT
*
point
,
point_conversion_form_t
form
,
unsigned
char
*
buf
,
size_t
len
,
BN_CTX
*
ctx
)
...
...
@@ -425,14 +501,6 @@ size_t ec_GF2m_simple_point2oct(const EC_GROUP *group, const EC_POINT *point, po
BIGNUM
*
x
,
*
y
,
*
yxi
;
size_t
field_len
,
i
,
skip
;
#ifndef OPENSSL_EC_BIN_PT_COMP
if
((
form
==
POINT_CONVERSION_COMPRESSED
)
||
(
form
==
POINT_CONVERSION_HYBRID
))
{
ECerr
(
EC_F_EC_GF2M_SIMPLE_POINT2OCT
,
ERR_R_DISABLED
);
goto
err
;
}
#endif
if
((
form
!=
POINT_CONVERSION_COMPRESSED
)
&&
(
form
!=
POINT_CONVERSION_UNCOMPRESSED
)
&&
(
form
!=
POINT_CONVERSION_HYBRID
))
...
...
@@ -487,13 +555,11 @@ size_t ec_GF2m_simple_point2oct(const EC_GROUP *group, const EC_POINT *point, po
if
(
!
EC_POINT_get_affine_coordinates_GF2m
(
group
,
point
,
x
,
y
,
ctx
))
goto
err
;
buf
[
0
]
=
form
;
#ifdef OPENSSL_EC_BIN_PT_COMP
if
((
form
!=
POINT_CONVERSION_UNCOMPRESSED
)
&&
!
BN_is_zero
(
x
))
{
if
(
!
group
->
meth
->
field_div
(
group
,
yxi
,
y
,
x
,
ctx
))
goto
err
;
if
(
BN_is_odd
(
yxi
))
buf
[
0
]
++
;
}
#endif
i
=
1
;
...
...
编辑
预览
Markdown
is supported
0%
请重试
或
添加新附件
.
添加附件
取消
You are about to add
0
people
to the discussion. Proceed with caution.
先完成此消息的编辑!
取消
想要评论请
注册
或
登录