From: Niels Möller Date: Tue, 30 Oct 2001 19:46:10 +0000 (+0100) Subject: Bug fixes. X-Git-Tag: nettle_1.5_release_20020131~111 X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=4045691d58ba11c0cbee74b759a03a304103099a;p=thirdparty%2Fnettle.git Bug fixes. Rev: src/nettle/rsa-compat.c:1.2 --- diff --git a/rsa-compat.c b/rsa-compat.c index eaec3dbb..3141f0d1 100644 --- a/rsa-compat.c +++ b/rsa-compat.c @@ -25,6 +25,7 @@ #include "rsa-compat.h" +#include "bignum.h" #include "md5.h" int @@ -75,10 +76,10 @@ R_SignFinal(R_SIGNATURE_CTX *ctx, nettle_mpz_init_set_str_256(k.c, MAX_RSA_MODULUS_LEN, key->coefficient); - if (rsa_init_private_key(&k) && (k.size <= MAX_RSA_MODULUS_LEN)) + if (rsa_init_private_key(&k) && (k.pub.size <= MAX_RSA_MODULUS_LEN)) { - *length = k->size; - rsa_md5_sign(&key, &ctx->hash, signature); + *length = k.pub.size; + rsa_md5_sign(&k, &ctx->hash, signature); res = RE_SUCCESS; } else @@ -124,9 +125,9 @@ R_VerifyFinal(R_SIGNATURE_CTX *ctx, nettle_mpz_init_set_str_256(k.n, MAX_RSA_MODULUS_LEN, key->modulus); nettle_mpz_init_set_str_256(k.e, - MAX_RSA_MODULUS_LEN, key->publicExponent); + MAX_RSA_MODULUS_LEN, key->exponent); - if (rsa_init_private_key(&k) && (k.size == length)) + if (rsa_init_public_key(&k) && (k.size == length)) res = rsa_md5_verify(&k, &ctx->hash, signature) ? RE_SUCCESS : RE_SIGNATURE; else