+2003-01-27 Niels Möller <nisse@cuckoo.hack.org>
+
+ * sexp2dsa.c (dsa_signature_from_sexp): New function.
+
+ RSA renaming. Updated all callers.
+ * rsa-sign.c (rsa_private_key_init, rsa_private_key_clear)
+ (rsa_private_key_prepare): Renamed functions.
+ * rsa.c (rsa_public_key_init, rsa_public_key_clear)
+ (rsa_public_key_prepare): Renamed functions.
+
2003-01-23 Niels Möller <nisse@cuckoo.hack.org>
* Makefile.am (libnettle_a_SOURCES): Added new rsa and pkcs1
/* Read some data to seed the generator */
simple_random(&yarrow, random_name);
- rsa_init_public_key(&pub);
- rsa_init_private_key(&priv);
+ rsa_public_key_init(&pub);
+ rsa_private_key_init(&priv);
if (!rsa_generate_keypair
(&pub, &priv,
return EXIT_FAILURE;
}
- rsa_init_private_key(&key);
+ rsa_private_key_init(&key);
if (!read_rsa_key(argv[1], NULL, &key))
{
putchar('\n');
mpz_clear(s);
- rsa_clear_private_key(&key);
+ rsa_private_key_clear(&key);
return EXIT_SUCCESS;
}
return EXIT_FAILURE;
}
- rsa_init_public_key(&key);
+ rsa_public_key_init(&key);
if (!read_rsa_key(argv[1], &key, NULL))
{
}
mpz_clear(s);
- rsa_clear_public_key(&key);
+ rsa_public_key_clear(&key);
return EXIT_SUCCESS;
}
nettle_mpz_init_set_str_256_u(k.c,
MAX_RSA_MODULUS_LEN, key->coefficient);
- if (rsa_prepare_private_key(&k) && (k.size <= MAX_RSA_MODULUS_LEN))
+ if (rsa_private_key_prepare(&k) && (k.size <= MAX_RSA_MODULUS_LEN))
{
mpz_t s;
mpz_init(s);
nettle_mpz_init_set_str_256_u(k.e,
MAX_RSA_MODULUS_LEN, key->exponent);
- if (rsa_prepare_public_key(&k) && (k.size == length))
+ if (rsa_public_key_prepare(&k) && (k.size == length))
{
mpz_t s;
GET(priv->b, limit, &values[6]);
GET(priv->c, limit, &values[7]);
- if (!rsa_prepare_private_key(priv))
+ if (!rsa_private_key_prepare(priv))
return 0;
}
GET(pub->n, limit, &values[0]);
GET(pub->e, limit, &values[1]);
- if (!rsa_prepare_public_key(pub))
+ if (!rsa_public_key_prepare(pub))
return 0;
}
mpz_init(expected);
- rsa_init_private_key(&key);
- rsa_init_public_key(&pub);
+ rsa_private_key_init(&key);
+ rsa_public_key_init(&pub);
/* Generate a 1024 bit key with random e */
knuth_lfib_init(&lfib, 13);
test_rsa_sha1(&pub, &key, expected);
- rsa_clear_private_key(&key);
- rsa_clear_public_key(&pub);
+ rsa_private_key_clear(&key);
+ rsa_public_key_clear(&pub);
mpz_clear(expected);
SUCCESS();
mpz_init(expected);
- rsa_init_private_key(&key);
- rsa_init_public_key(&pub);
+ rsa_private_key_init(&key);
+ rsa_public_key_init(&pub);
/* 1000-bit key, generated by
*
"e545fbb4cf", 16);
mpz_set_str(pub.e, "0db2ad57", 16);
- if (!rsa_prepare_public_key(&pub))
+ if (!rsa_public_key_prepare(&pub))
FAIL();
/* d is not used */
"e2df9607cee95fa8" "daec7a389a7d9afc" "8dd21fef9d83805a"
"40d46f49676a2f6b" "2926f70c572c00", 16);
- if (!rsa_prepare_private_key(&key))
+ if (!rsa_private_key_prepare(&key))
FAIL();
if (pub.size != key.size)
mpz_set_str(pub.e, "3f1a012d", 16);
- if (!rsa_prepare_public_key(&pub))
+ if (!rsa_public_key_prepare(&pub))
FAIL();
#if 0
"05e1831619db2f10" "bb9b6a8fd5c95df2" "eb78f303ea0c0cc8"
"06", 16);
- if (!rsa_prepare_private_key(&key))
+ if (!rsa_private_key_prepare(&key))
FAIL();
if (pub.size != key.size)
test_rsa_sha1(&pub, &key, expected);
- rsa_clear_private_key(&key);
- rsa_clear_public_key(&pub);
+ rsa_private_key_clear(&key);
+ rsa_public_key_clear(&pub);
mpz_clear(expected);
SUCCESS();
struct nettle_buffer buffer;
- rsa_init_public_key(&pub);
- rsa_init_private_key(&priv);
+ rsa_public_key_init(&pub);
+ rsa_private_key_init(&priv);
mpz_set_str(pub.n,
"085c3408989acae4faec3cbbad91c90d34c1d259cd74121a"
"cc8b5e9661189b86a7b22239907c25", 16);
mpz_set_str(pub.e, "36ad4b1d", 16);
+ ASSERT(rsa_public_key_prepare(&pub));
+
mpz_set_str(priv.d,
"06ee6d4ff3c239e408150daf8117abfa36a40ad4455d9059"
"a86d52f33a2de07418a0a699594588c64810248c9412d554"
"f8a458ea73a018dc6fa56863e3bc6de405f364f77dee6f09"
"62679ea1a8282e", 16);
+ ASSERT(rsa_private_key_prepare(&priv));
+
nettle_buffer_init(&buffer);
ASSERT(rsa_keypair_to_sexp(&buffer, &pub, &priv));
"77113a6cdafe79dd7d5f2ecc8b5e9661"
"189b86a7b22239907c252928313a6534"
"3a36ad4b1d292929"));
+
+ rsa_public_key_clear(&pub);
+ rsa_private_key_clear(&priv);
SUCCESS();
struct rsa_public_key pub;
struct rsa_private_key priv;
- rsa_init_public_key(&pub);
- rsa_init_private_key(&priv);
+ rsa_public_key_init(&pub);
+ rsa_private_key_init(&priv);
ASSERT(rsa_keypair_from_sexp
(&pub, &priv, 0,
"9ea1a8282e292929")));
test_rsa_key(&pub, &priv);
+
+ rsa_public_key_clear(&pub);
+ rsa_private_key_clear(&priv);
SUCCESS();