gnunet-svn
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[GNUnet-SVN] r7938 - libmicrohttpd/src/daemon/https/tls


From: gnunet
Subject: [GNUnet-SVN] r7938 - libmicrohttpd/src/daemon/https/tls
Date: Mon, 17 Nov 2008 01:28:54 -0700 (MST)

Author: grothoff
Date: 2008-11-17 01:28:54 -0700 (Mon, 17 Nov 2008)
New Revision: 7938

Modified:
   libmicrohttpd/src/daemon/https/tls/gnutls_pk.c
   libmicrohttpd/src/daemon/https/tls/gnutls_pk.h
Log:
dce

Modified: libmicrohttpd/src/daemon/https/tls/gnutls_pk.c
===================================================================
--- libmicrohttpd/src/daemon/https/tls/gnutls_pk.c      2008-11-17 08:22:58 UTC 
(rev 7937)
+++ libmicrohttpd/src/daemon/https/tls/gnutls_pk.c      2008-11-17 08:28:54 UTC 
(rev 7938)
@@ -44,8 +44,6 @@
                                    mpi_t * pkey, int pkey_len);
 static int MHD__gnutls_pk_sign (int algo, mpi_t * data, mpi_t hash,
                                 mpi_t * pkey, int);
-static int MHD__gnutls_pk_verify (int algo, mpi_t hash, mpi_t * data,
-                                  mpi_t * pkey, int);
 static int MHD__gnutls_pk_decrypt (int algo, mpi_t * resarr, mpi_t data,
                                    mpi_t * pkey, int);
 
@@ -381,202 +379,7 @@
   return 0;                     /* ok */
 }
 
-/* encodes the Dss-Sig-Value structure
- */
-static int
-encode_ber_rs (MHD_gnutls_datum_t * sig_value, mpi_t r, mpi_t s)
-{
-  ASN1_TYPE sig;
-  int result, tot_len;
 
-  if ((result =
-       MHD__asn1_create_element (MHD__gnutls_getMHD__gnutls_asn (),
-                                 "GNUTLS.DSASignatureValue",
-                                 &sig)) != ASN1_SUCCESS)
-    {
-      MHD_gnutls_assert ();
-      return MHD_gtls_asn2err (result);
-    }
-
-  result = MHD__gnutls_x509_write_int (sig, "r", r, 1);
-  if (result < 0)
-    {
-      MHD_gnutls_assert ();
-      MHD__asn1_delete_structure (&sig);
-      return result;
-    }
-
-  result = MHD__gnutls_x509_write_int (sig, "s", s, 1);
-  if (result < 0)
-    {
-      MHD_gnutls_assert ();
-      MHD__asn1_delete_structure (&sig);
-      return result;
-    }
-
-  tot_len = 0;
-
-  result = MHD__gnutls_x509_der_encode (sig, "", sig_value, 0);
-
-  MHD__asn1_delete_structure (&sig);
-
-  if (result < 0)
-    {
-      MHD_gnutls_assert ();
-      return result;
-    }
-
-  return 0;
-}
-
-
-/* Do DSA signature calculation. params is p, q, g, y, x in that order.
- */
-int
-MHD_gtls_dsa_sign (MHD_gnutls_datum_t * signature,
-                   const MHD_gnutls_datum_t * hash, mpi_t * params,
-                   unsigned params_len)
-{
-  mpi_t rs[2], mdata;
-  int ret;
-  size_t k;
-
-  k = hash->size;
-  if (k < 20)
-    {                           /* SHA1 or better only */
-      MHD_gnutls_assert ();
-      return GNUTLS_E_PK_SIGN_FAILED;
-    }
-
-  if (MHD_gtls_mpi_scan_nz (&mdata, hash->data, &k) != 0)
-    {
-      MHD_gnutls_assert ();
-      return GNUTLS_E_MPI_SCAN_FAILED;
-    }
-
-  ret = MHD__gnutls_pk_sign (GCRY_PK_DSA, rs, mdata, params, params_len);
-  /* rs[0], rs[1] now hold r,s */
-  MHD_gtls_mpi_release (&mdata);
-
-  if (ret < 0)
-    {
-      MHD_gnutls_assert ();
-      return ret;
-    }
-
-  ret = encode_ber_rs (signature, rs[0], rs[1]);
-
-  /* free r,s */
-  MHD_gtls_mpi_release (&rs[0]);
-  MHD_gtls_mpi_release (&rs[1]);
-
-  if (ret != 0)
-    {
-      MHD_gnutls_assert ();
-      return GNUTLS_E_MEMORY_ERROR;
-    }
-
-  return 0;
-}
-
-/* decodes the Dss-Sig-Value structure
- */
-static int
-decode_ber_rs (const MHD_gnutls_datum_t * sig_value, mpi_t * r, mpi_t * s)
-{
-  ASN1_TYPE sig;
-  int result;
-
-  if ((result =
-       MHD__asn1_create_element (MHD__gnutls_getMHD__gnutls_asn (),
-                                 "GNUTLS.DSASignatureValue",
-                                 &sig)) != ASN1_SUCCESS)
-    {
-      MHD_gnutls_assert ();
-      return MHD_gtls_asn2err (result);
-    }
-
-  result =
-    MHD__asn1_der_decoding (&sig, sig_value->data, sig_value->size, NULL);
-  if (result != ASN1_SUCCESS)
-    {
-      MHD_gnutls_assert ();
-      MHD__asn1_delete_structure (&sig);
-      return MHD_gtls_asn2err (result);
-    }
-
-  result = MHD__gnutls_x509_read_int (sig, "r", r);
-  if (result < 0)
-    {
-      MHD_gnutls_assert ();
-      MHD__asn1_delete_structure (&sig);
-      return result;
-    }
-
-  result = MHD__gnutls_x509_read_int (sig, "s", s);
-  if (result < 0)
-    {
-      MHD_gnutls_assert ();
-      MHD_gtls_mpi_release (s);
-      MHD__asn1_delete_structure (&sig);
-      return result;
-    }
-
-  MHD__asn1_delete_structure (&sig);
-
-  return 0;
-}
-
-/* params is p, q, g, y in that order
- */
-int
-MHD_gtls_dsa_verify (const MHD_gnutls_datum_t * vdata,
-                     const MHD_gnutls_datum_t * sig_value, mpi_t * params,
-                     int params_len)
-{
-
-  mpi_t mdata;
-  int ret;
-  size_t k;
-  mpi_t rs[2];
-
-  if (vdata->size != 20)
-    {                           /* sha-1 only */
-      MHD_gnutls_assert ();
-      return GNUTLS_E_PK_SIG_VERIFY_FAILED;
-    }
-
-  if (decode_ber_rs (sig_value, &rs[0], &rs[1]) != 0)
-    {
-      MHD_gnutls_assert ();
-      return GNUTLS_E_MPI_SCAN_FAILED;
-    }
-
-  k = vdata->size;
-  if (MHD_gtls_mpi_scan_nz (&mdata, vdata->data, &k) != 0)
-    {
-      MHD_gnutls_assert ();
-      MHD_gtls_mpi_release (&rs[0]);
-      MHD_gtls_mpi_release (&rs[1]);
-      return GNUTLS_E_MPI_SCAN_FAILED;
-    }
-
-  /* decrypt signature */
-  ret = MHD__gnutls_pk_verify (GCRY_PK_DSA, mdata, rs, params, params_len);
-  MHD_gtls_mpi_release (&mdata);
-  MHD_gtls_mpi_release (&rs[0]);
-  MHD_gtls_mpi_release (&rs[1]);
-
-  if (ret < 0)
-    {
-      MHD_gnutls_assert ();
-      return ret;
-    }
-
-  return 0;                     /* ok */
-}
-
-
 /* this is taken from gnupg
  */
 
@@ -833,84 +636,3 @@
 }
 
 
-static int
-MHD__gnutls_pk_verify (int algo, mpi_t hash, mpi_t * data,
-                       mpi_t * pkey, int pkey_len)
-{
-  gcry_sexp_t s_sig, s_hash, s_pkey;
-  int rc = -1;
-
-  /* make a sexp from pkey */
-  switch (algo)
-    {
-    case GCRY_PK_DSA:
-      if (pkey_len >= 4)
-        rc = gcry_sexp_build (&s_pkey, NULL,
-                              "(public-key(dsa(p%m)(q%m)(g%m)(y%m)))",
-                              pkey[0], pkey[1], pkey[2], pkey[3]);
-      break;
-    case GCRY_PK_RSA:
-      if (pkey_len >= 2)
-        rc = gcry_sexp_build (&s_pkey, NULL,
-                              "(public-key(rsa(n%m)(e%m)))",
-                              pkey[0], pkey[1]);
-      break;
-
-    default:
-      MHD_gnutls_assert ();
-      return GNUTLS_E_INTERNAL_ERROR;
-    }
-
-  if (rc != 0)
-    {
-      MHD_gnutls_assert ();
-      return GNUTLS_E_INTERNAL_ERROR;
-    }
-
-  /* put the data into a simple list */
-  if (gcry_sexp_build (&s_hash, NULL, "%m", hash))
-    {
-      MHD_gnutls_assert ();
-      gcry_sexp_release (s_pkey);
-      return GNUTLS_E_INTERNAL_ERROR;
-    }
-
-  switch (algo)
-    {
-    case GCRY_PK_DSA:
-      rc = gcry_sexp_build (&s_sig, NULL,
-                            "(sig-val(dsa(r%m)(s%m)))", data[0], data[1]);
-      break;
-    case GCRY_PK_RSA:
-      rc = gcry_sexp_build (&s_sig, NULL, "(sig-val(rsa(s%m)))", data[0]);
-      break;
-
-    default:
-      MHD_gnutls_assert ();
-      gcry_sexp_release (s_pkey);
-      gcry_sexp_release (s_hash);
-      return GNUTLS_E_INTERNAL_ERROR;
-    }
-
-  if (rc != 0)
-    {
-      MHD_gnutls_assert ();
-      gcry_sexp_release (s_pkey);
-      gcry_sexp_release (s_hash);
-      return GNUTLS_E_INTERNAL_ERROR;
-    }
-
-  rc = gcry_pk_verify (s_sig, s_hash, s_pkey);
-
-  gcry_sexp_release (s_sig);
-  gcry_sexp_release (s_hash);
-  gcry_sexp_release (s_pkey);
-
-  if (rc != 0)
-    {
-      MHD_gnutls_assert ();
-      return GNUTLS_E_PK_SIG_VERIFY_FAILED;
-    }
-
-  return 0;
-}

Modified: libmicrohttpd/src/daemon/https/tls/gnutls_pk.h
===================================================================
--- libmicrohttpd/src/daemon/https/tls/gnutls_pk.h      2008-11-17 08:22:58 UTC 
(rev 7937)
+++ libmicrohttpd/src/daemon/https/tls/gnutls_pk.h      2008-11-17 08:28:54 UTC 
(rev 7938)
@@ -29,9 +29,6 @@
                                 const MHD_gnutls_datum_t * plaintext,
                                 mpi_t * params, unsigned params_len,
                                 unsigned btype);
-int MHD_gtls_dsa_sign (MHD_gnutls_datum_t * signature,
-                       const MHD_gnutls_datum_t * plaintext, mpi_t * params,
-                       unsigned params_len);
 int MHD_gtls_pkcs1_rsa_decrypt (MHD_gnutls_datum_t * plaintext,
                                 const MHD_gnutls_datum_t * ciphertext,
                                 mpi_t * params, unsigned params_len,
@@ -39,8 +36,5 @@
 int MHD_gtls_rsa_verify (const MHD_gnutls_datum_t * vdata,
                          const MHD_gnutls_datum_t * ciphertext,
                          mpi_t * params, int params_len, int btype);
-int MHD_gtls_dsa_verify (const MHD_gnutls_datum_t * vdata,
-                         const MHD_gnutls_datum_t * sig_value, mpi_t * params,
-                         int params_len);
 
 #endif /* GNUTLS_PK_H */





reply via email to

[Prev in Thread] Current Thread [Next in Thread]