diff options
Diffstat (limited to 'external/nettle-3.3/nettle/pkcs1-rsa-sha256.c')
-rw-r--r-- | external/nettle-3.3/nettle/pkcs1-rsa-sha256.c | 120 |
1 files changed, 120 insertions, 0 deletions
diff --git a/external/nettle-3.3/nettle/pkcs1-rsa-sha256.c b/external/nettle-3.3/nettle/pkcs1-rsa-sha256.c new file mode 100644 index 0000000..2c2b5c0 --- /dev/null +++ b/external/nettle-3.3/nettle/pkcs1-rsa-sha256.c @@ -0,0 +1,120 @@ +/* pkcs1-rsa-sha256.c + + PKCS stuff for rsa-sha256. + + Copyright (C) 2001, 2003, 2006 Niels Möller + + This file is part of GNU Nettle. + + GNU Nettle is free software: you can redistribute it and/or + modify it under the terms of either: + + * the GNU Lesser General Public License as published by the Free + Software Foundation; either version 3 of the License, or (at your + option) any later version. + + or + + * the GNU General Public License as published by the Free + Software Foundation; either version 3 of the License, or (at your + option) any later version. + + or both in parallel, as here. + + GNU Nettle is distributed in the hope that it will be useful, + but WITHOUT ANY WARRANTY; without even the implied warranty of + MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU + General Public License for more details. + + You should have received copies of the GNU General Public License and + the GNU Lesser General Public License along with this program. If + not, see http://www.gnu.org/licenses/. +*/ + +#if HAVE_CONFIG_H +# include "config.h" +#endif + +#include <assert.h> +#include <stdlib.h> +#include <string.h> + +#include "rsa.h" + +#include "bignum.h" +#include "pkcs1.h" + +#include "gmp-glue.h" + +/* From RFC 3447, Public-Key Cryptography Standards (PKCS) #1: RSA + * Cryptography Specifications Version 2.1. + * + * id-sha256 OBJECT IDENTIFIER ::= + * {joint-iso-itu-t(2) country(16) us(840) organization(1) + * gov(101) csor(3) nistalgorithm(4) hashalgs(2) 1} + */ + +static const uint8_t +sha256_prefix[] = +{ + /* 19 octets prefix, 32 octets hash, total 51 */ + 0x30, 49, /* SEQUENCE */ + 0x30, 13, /* SEQUENCE */ + 0x06, 9, /* OBJECT IDENTIFIER */ + 0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x02, 0x01, + 0x05, 0, /* NULL */ + 0x04, 32 /* OCTET STRING */ + /* Here comes the raw hash value */ +}; + +int +pkcs1_rsa_sha256_encode(mpz_t m, size_t key_size, struct sha256_ctx *hash) +{ + uint8_t *p; + TMP_GMP_DECL(em, uint8_t); + + TMP_GMP_ALLOC(em, key_size); + + p = _pkcs1_signature_prefix(key_size, em, + sizeof(sha256_prefix), + sha256_prefix, + SHA256_DIGEST_SIZE); + if (p) + { + sha256_digest(hash, SHA256_DIGEST_SIZE, p); + nettle_mpz_set_str_256_u(m, key_size, em); + TMP_GMP_FREE(em); + return 1; + } + else + { + TMP_GMP_FREE(em); + return 0; + } +} + +int +pkcs1_rsa_sha256_encode_digest(mpz_t m, size_t key_size, const uint8_t *digest) +{ + uint8_t *p; + TMP_GMP_DECL(em, uint8_t); + + TMP_GMP_ALLOC(em, key_size); + + p = _pkcs1_signature_prefix(key_size, em, + sizeof(sha256_prefix), + sha256_prefix, + SHA256_DIGEST_SIZE); + if (p) + { + memcpy(p, digest, SHA256_DIGEST_SIZE); + nettle_mpz_set_str_256_u(m, key_size, em); + TMP_GMP_FREE(em); + return 1; + } + else + { + TMP_GMP_FREE(em); + return 0; + } +} |