Mercurial > dropbear
comparison libtomcrypt/src/pk/pkcs1/pkcs_1_pss_encode.c @ 511:582cb38e4eb5 insecure-nocrypto
propagate from branch 'au.asn.ucc.matt.dropbear' (head cdcc3c729e29544e8b98a408e2dc60e4483dfd2a)
to branch 'au.asn.ucc.matt.dropbear.insecure-nocrypto' (head 0ca38a1cf349f7426ac9de34ebe4c3e3735effab)
author | Matt Johnston <matt@ucc.asn.au> |
---|---|
date | Thu, 06 Nov 2008 13:16:55 +0000 |
parents | 0cbe8f6dbf9e |
children | f849a5ca2efc |
comparison
equal
deleted
inserted
replaced
361:461c4b1fb35f | 511:582cb38e4eb5 |
---|---|
4 * algorithms in a highly modular and flexible manner. | 4 * algorithms in a highly modular and flexible manner. |
5 * | 5 * |
6 * The library is free for all purposes without any express | 6 * The library is free for all purposes without any express |
7 * guarantee it works. | 7 * guarantee it works. |
8 * | 8 * |
9 * Tom St Denis, [email protected], http://libtomcrypt.org | 9 * Tom St Denis, [email protected], http://libtomcrypt.com |
10 */ | 10 */ |
11 #include "tomcrypt.h" | 11 #include "tomcrypt.h" |
12 | 12 |
13 /** | 13 /** |
14 @file pkcs_1_pss_encode.c | 14 @file pkcs_1_pss_encode.c |
116 DB[x++] = 0x01; | 116 DB[x++] = 0x01; |
117 XMEMCPY(DB + x, salt, saltlen); | 117 XMEMCPY(DB + x, salt, saltlen); |
118 x += saltlen; | 118 x += saltlen; |
119 | 119 |
120 /* generate mask of length modulus_len - hLen - 1 from hash */ | 120 /* generate mask of length modulus_len - hLen - 1 from hash */ |
121 if ((err = pkcs_1_mgf1(hash, hLen, hash_idx, mask, modulus_len - hLen - 1)) != CRYPT_OK) { | 121 if ((err = pkcs_1_mgf1(hash_idx, hash, hLen, mask, modulus_len - hLen - 1)) != CRYPT_OK) { |
122 goto LBL_ERR; | 122 goto LBL_ERR; |
123 } | 123 } |
124 | 124 |
125 /* xor against DB */ | 125 /* xor against DB */ |
126 for (y = 0; y < (modulus_len - hLen - 1); y++) { | 126 for (y = 0; y < (modulus_len - hLen - 1); y++) { |
127 DB[y] ^= mask[y]; | 127 DB[y] ^= mask[y]; |
128 } | 128 } |
129 | 129 |
130 /* output is DB || hash || 0xBC */ | 130 /* output is DB || hash || 0xBC */ |
131 if (*outlen < modulus_len) { | 131 if (*outlen < modulus_len) { |
132 *outlen = modulus_len; | |
132 err = CRYPT_BUFFER_OVERFLOW; | 133 err = CRYPT_BUFFER_OVERFLOW; |
133 goto LBL_ERR; | 134 goto LBL_ERR; |
134 } | 135 } |
135 | 136 |
136 /* DB len = modulus_len - hLen - 1 */ | 137 /* DB len = modulus_len - hLen - 1 */ |
168 } | 169 } |
169 | 170 |
170 #endif /* PKCS_1 */ | 171 #endif /* PKCS_1 */ |
171 | 172 |
172 /* $Source: /cvs/libtom/libtomcrypt/src/pk/pkcs1/pkcs_1_pss_encode.c,v $ */ | 173 /* $Source: /cvs/libtom/libtomcrypt/src/pk/pkcs1/pkcs_1_pss_encode.c,v $ */ |
173 /* $Revision: 1.4 $ */ | 174 /* $Revision: 1.7 $ */ |
174 /* $Date: 2005/05/05 14:35:59 $ */ | 175 /* $Date: 2006/06/16 21:53:41 $ */ |