comparison src/pk/dsa/dsa_import.c @ 210:4768b55c5240 libtomcrypt

propagate from branch 'au.asn.ucc.matt.ltc-orig' (head 33c416b902f1a44913d825bae7ad9a160f703ed3) to branch 'au.asn.ucc.matt.dropbear.ltc' (head 4d6aec6e6121e13f68c11c149b6579c41cb63e74)
author Matt Johnston <matt@ucc.asn.au>
date Wed, 06 Jul 2005 12:10:23 +0000
parents 39d5d58461d6
children
comparison
equal deleted inserted replaced
199:8be64e2c86f4 210:4768b55c5240
24 @param key [out] Where to store the imported key 24 @param key [out] Where to store the imported key
25 @return CRYPT_OK if successful, upon error this function will free all allocated memory 25 @return CRYPT_OK if successful, upon error this function will free all allocated memory
26 */ 26 */
27 int dsa_import(const unsigned char *in, unsigned long inlen, dsa_key *key) 27 int dsa_import(const unsigned char *in, unsigned long inlen, dsa_key *key)
28 { 28 {
29 unsigned long x, y; 29 unsigned char flags[1];
30 int err; 30 int err;
31 31
32 LTC_ARGCHK(in != NULL); 32 LTC_ARGCHK(in != NULL);
33 LTC_ARGCHK(key != NULL); 33 LTC_ARGCHK(key != NULL);
34
35 /* check length */
36 if ((1+2+PACKET_SIZE) > inlen) {
37 return CRYPT_INVALID_PACKET;
38 }
39
40 /* check type */
41 if ((err = packet_valid_header((unsigned char *)in, PACKET_SECT_DSA, PACKET_SUB_KEY)) != CRYPT_OK) {
42 return err;
43 }
44 y = PACKET_SIZE;
45 34
46 /* init key */ 35 /* init key */
47 if (mp_init_multi(&key->p, &key->g, &key->q, &key->x, &key->y, NULL) != MP_OKAY) { 36 if (mp_init_multi(&key->p, &key->g, &key->q, &key->x, &key->y, NULL) != MP_OKAY) {
48 return CRYPT_MEM; 37 return CRYPT_MEM;
49 } 38 }
50 39
51 /* read type/qord */ 40 /* get key type */
52 key->type = in[y++]; 41 if ((err = der_decode_sequence_multi(in, inlen,
53 key->qord = ((unsigned)in[y]<<8)|((unsigned)in[y+1]); 42 LTC_ASN1_BIT_STRING, 1UL, flags,
54 y += 2; 43 LTC_ASN1_EOL, 0UL, NULL)) != CRYPT_OK) {
55 44 goto error;
56 /* input publics */
57 INPUT_BIGNUM(&key->g,in,x,y, inlen);
58 INPUT_BIGNUM(&key->p,in,x,y, inlen);
59 INPUT_BIGNUM(&key->q,in,x,y, inlen);
60 INPUT_BIGNUM(&key->y,in,x,y, inlen);
61 if (key->type == PK_PRIVATE) {
62 INPUT_BIGNUM(&key->x,in,x,y, inlen);
63 } 45 }
64 46
65 return CRYPT_OK; 47 if (flags[0] == 1) {
48 if ((err = der_decode_sequence_multi(in, inlen,
49 LTC_ASN1_BIT_STRING, 1UL, flags,
50 LTC_ASN1_INTEGER, 1UL, &key->g,
51 LTC_ASN1_INTEGER, 1UL, &key->p,
52 LTC_ASN1_INTEGER, 1UL, &key->q,
53 LTC_ASN1_INTEGER, 1UL, &key->y,
54 LTC_ASN1_INTEGER, 1UL, &key->x,
55 LTC_ASN1_EOL, 0UL, NULL)) != CRYPT_OK) {
56 goto error;
57 }
58 key->type = PK_PRIVATE;
59 } else {
60 if ((err = der_decode_sequence_multi(in, inlen,
61 LTC_ASN1_BIT_STRING, 1UL, flags,
62 LTC_ASN1_INTEGER, 1UL, &key->g,
63 LTC_ASN1_INTEGER, 1UL, &key->p,
64 LTC_ASN1_INTEGER, 1UL, &key->q,
65 LTC_ASN1_INTEGER, 1UL, &key->y,
66 LTC_ASN1_EOL, 0UL, NULL)) != CRYPT_OK) {
67 goto error;
68 }
69 key->type = PK_PUBLIC;
70 }
71 key->qord = mp_unsigned_bin_size(&key->q);
72
73 if (key->qord >= MDSA_MAX_GROUP || key->qord <= 15 ||
74 key->qord >= mp_unsigned_bin_size(&key->p) || (mp_unsigned_bin_size(&key->p) - key->qord) >= MDSA_DELTA) {
75 err = CRYPT_INVALID_PACKET;
76 goto error;
77 }
78
79 return CRYPT_OK;
66 error: 80 error:
67 mp_clear_multi(&key->p, &key->g, &key->q, &key->x, &key->y, NULL); 81 mp_clear_multi(&key->p, &key->g, &key->q, &key->x, &key->y, NULL);
68 return err; 82 return err;
69 } 83 }
70 84
71 #endif 85 #endif
86
87 /* $Source: /cvs/libtom/libtomcrypt/src/pk/dsa/dsa_import.c,v $ */
88 /* $Revision: 1.7 $ */
89 /* $Date: 2005/06/08 23:31:17 $ */