summaryrefslogtreecommitdiff
path: root/ecdsa.c
blob: b29ef1f618a8dcfd7dd72dece75827905f86fee1 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
#include "includes.h"
#include "dbutil.h"
#include "crypto_desc.h"

#ifdef DROPBEAR_ECDSA

ecc_key *gen_ecdsa_priv_key(unsigned int bit_size) {
	const ltc_ecc_set_type *dp = NULL; // curve domain parameters
	// TODO: use raw bytes for the dp rather than the hex strings in libtomcrypt's ecc.c
	switch (bit_size) {
#ifdef DROPBEAR_ECC_256
		case 256:
			dp = &ltc_ecc_sets[0];
			break;
#endif
#ifdef DROPBEAR_ECC_384
		case 384:
			dp = &ltc_ecc_sets[0];
			break;
#endif
#ifdef DROPBEAR_ECC_521
		case 521:
			dp = &ltc_ecc_sets[0];
			break;
#endif
	}
	if (!dp) {
		dropbear_exit("Key size %d isn't valid. Try "
#ifdef DROPBEAR_ECC_256
			"256 "
#endif
#ifdef DROPBEAR_ECC_384
			"384 "
#endif
#ifdef DROPBEAR_ECC_521
			"521 "
#endif
			, bit_size);
	}

	ecc_key *new_key = m_malloc(sizeof(*new_key));
	if (ecc_make_key_ex(NULL, dropbear_ltc_prng, new_key, dp) != CRYPT_OK) {
		dropbear_exit("ECC error");
	}
	return new_key;
}

int buf_get_ecdsa_pub_key(buffer* buf, ecc_key *key) {

}


#endif // DROPBEAR_ECDSA