Correct PPTP server firewall rules chain.
[tomato/davidwu.git] / release / src / router / nettle / pkcs1-rsa-md5.c
blob00514fc427112ab61d22ec0267e1f9f598419360
1 /* pkcs1-rsa-md5.c
3 * PKCS stuff for rsa-md5.
4 */
6 /* nettle, low-level cryptographics library
8 * Copyright (C) 2001, 2003 Niels Möller
9 *
10 * The nettle library is free software; you can redistribute it and/or modify
11 * it under the terms of the GNU Lesser General Public License as published by
12 * the Free Software Foundation; either version 2.1 of the License, or (at your
13 * option) any later version.
15 * The nettle library is distributed in the hope that it will be useful, but
16 * WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY
17 * or FITNESS FOR A PARTICULAR PURPOSE. See the GNU Lesser General Public
18 * License for more details.
20 * You should have received a copy of the GNU Lesser General Public License
21 * along with the nettle library; see the file COPYING.LIB. If not, write to
22 * the Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston,
23 * MA 02111-1301, USA.
26 #if HAVE_CONFIG_H
27 # include "config.h"
28 #endif
30 #include <assert.h>
31 #include <stdlib.h>
32 #include <string.h>
34 #include "rsa.h"
36 #include "bignum.h"
37 #include "pkcs1.h"
39 #include "nettle-internal.h"
41 /* From pkcs-1v2
43 * md5 OBJECT IDENTIFIER ::=
44 * {iso(1) member-body(2) US(840) rsadsi(113549) digestAlgorithm(2) 5}
46 * The parameters part of the algorithm identifier is NULL:
48 * md5Identifier ::= AlgorithmIdentifier {md5, NULL}
51 static const uint8_t
52 md5_prefix[] =
54 /* 18 octets prefix, 16 octets hash, 34 total. */
55 0x30, 32, /* SEQUENCE */
56 0x30, 12, /* SEQUENCE */
57 0x06, 8, /* OBJECT IDENTIFIER */
58 0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x02, 0x05,
59 0x05, 0, /* NULL */
60 0x04, 16 /* OCTET STRING */
61 /* Here comes the raw hash value */
64 int
65 pkcs1_rsa_md5_encode(mpz_t m, unsigned key_size, struct md5_ctx *hash)
67 uint8_t *p;
68 TMP_DECL(em, uint8_t, NETTLE_MAX_BIGNUM_SIZE);
69 TMP_ALLOC(em, key_size);
71 p = _pkcs1_signature_prefix(key_size, em,
72 sizeof(md5_prefix),
73 md5_prefix,
74 MD5_DIGEST_SIZE);
75 if (p)
77 md5_digest(hash, MD5_DIGEST_SIZE, p);
78 nettle_mpz_set_str_256_u(m, key_size, em);
79 return 1;
81 else
82 return 0;
85 int
86 pkcs1_rsa_md5_encode_digest(mpz_t m, unsigned key_size, const uint8_t *digest)
88 uint8_t *p;
89 TMP_DECL(em, uint8_t, NETTLE_MAX_BIGNUM_SIZE);
90 TMP_ALLOC(em, key_size);
92 p = _pkcs1_signature_prefix(key_size, em,
93 sizeof(md5_prefix),
94 md5_prefix,
95 MD5_DIGEST_SIZE);
96 if (p)
98 memcpy(p, digest, MD5_DIGEST_SIZE);
99 nettle_mpz_set_str_256_u(m, key_size, em);
100 return 1;
102 else
103 return 0;