// *F*/ IPPFUN(IppStatus, ippsECCPPublicKey, (const IppsBigNumState* pPrivate, IppsECCPPointState* pPublic, IppsECCPState* pECC)) { /* test pECC */ IPP_BAD_PTR1_RET(pECC); /* use aligned EC context */ pECC = (IppsECCPState*)( IPP_ALIGNED_PTR(pECC, ALIGN_VAL) ); /* test ID */ IPP_BADARG_RET(!ECP_VALID_ID(pECC), ippStsContextMatchErr); /* test public key */ IPP_BAD_PTR1_RET(pPublic); pPublic = (IppsECCPPointState*)( IPP_ALIGNED_PTR(pPublic, ALIGN_VAL) ); IPP_BADARG_RET(!ECP_POINT_VALID_ID(pPublic), ippStsContextMatchErr); /* test private keys */ IPP_BAD_PTR1_RET(pPrivate); pPrivate = (IppsBigNumState*)( IPP_ALIGNED_PTR(pPrivate, ALIGN_VAL) ); IPP_BADARG_RET(!BN_VALID_ID(pPrivate), ippStsContextMatchErr); IPP_BADARG_RET(!((0<cpBN_tst(pPrivate)) && (0>cpBN_cmp(pPrivate, ECP_ORDER(pECC))) ), ippStsIvalidPrivateKey); /* calculates public key */ //ECP_METHOD(pECC)->MulPoint(ECP_GENC(pECC), pPrivate, pPublic, pECC, ECP_BNCTX(pECC)); ECP_METHOD(pECC)->MulBasePoint(pPrivate, pPublic, pECC, ECP_BNCTX(pECC)); return ippStsNoErr; }
// // ippStsNoErr no errors // // Parameters: // pOctStr pointer to the source octet string // strLen octet string length // pBN pointer to the target BN // *F*/ IPPFUN(IppStatus, ippsSetOctString_BN,(const Ipp8u* pOctStr, cpSize strLen, IppsBigNumState* pBN)) { IPP_BAD_PTR2_RET(pOctStr, pBN); pBN = (IppsBigNumState*)( IPP_ALIGNED_PTR(pBN, BN_ALIGNMENT) ); IPP_BADARG_RET(!BN_VALID_ID(pBN), ippStsContextMatchErr); IPP_BADARG_RET((0>strLen), ippStsLengthErr); /* remove leading zeros */ while(strLen && (0==pOctStr[0])) { strLen--; pOctStr++; } /* test BN size */ IPP_BADARG_RET((int)(sizeof(BNU_CHUNK_T)*BN_ROOM(pBN))<strLen, ippStsSizeErr); if(strLen) BN_SIZE(pBN) = cpFromOctStr_BNU(BN_NUMBER(pBN), pOctStr, strLen); else { BN_NUMBER(pBN)[0] = (BNU_CHUNK_T)0;