Mercurial > dropbear
comparison libtomcrypt/src/pk/rsa/rsa_import.c @ 1439:8d24733026c5 coverity
merge
author | Matt Johnston <matt@ucc.asn.au> |
---|---|
date | Sat, 24 Jun 2017 23:33:16 +0800 |
parents | f849a5ca2efc |
children | 6dba84798cd5 |
comparison
equal
deleted
inserted
replaced
1400:238a439670f5 | 1439:8d24733026c5 |
---|---|
4 * algorithms in a highly modular and flexible manner. | 4 * algorithms in a highly modular and flexible manner. |
5 * | 5 * |
6 * The library is free for all purposes without any express | 6 * The library is free for all purposes without any express |
7 * guarantee it works. | 7 * guarantee it works. |
8 * | 8 * |
9 * Tom St Denis, [email protected], http://libtomcrypt.com | 9 * Tom St Denis, [email protected], http://libtom.org |
10 */ | 10 */ |
11 #include "tomcrypt.h" | 11 #include "tomcrypt.h" |
12 | 12 |
13 /** | 13 /** |
14 @file rsa_import.c | 14 @file rsa_import.c |
15 Import a PKCS RSA key, Tom St Denis | 15 Import a LTC_PKCS RSA key, Tom St Denis |
16 */ | 16 */ |
17 | 17 |
18 #ifdef MRSA | 18 #ifdef LTC_MRSA |
19 | 19 |
20 /** | 20 /** |
21 Import an RSAPublicKey or RSAPrivateKey [two-prime only, only support >= 1024-bit keys, defined in PKCS #1 v2.1] | 21 Import an RSAPublicKey or RSAPrivateKey [two-prime only, only support >= 1024-bit keys, defined in LTC_PKCS #1 v2.1] |
22 @param in The packet to import from | 22 @param in The packet to import from |
23 @param inlen It's length (octets) | 23 @param inlen It's length (octets) |
24 @param key [out] Destination for newly imported key | 24 @param key [out] Destination for newly imported key |
25 @return CRYPT_OK if successful, upon error allocated memory is freed | 25 @return CRYPT_OK if successful, upon error allocated memory is freed |
26 */ | 26 */ |
85 key->type = PK_PUBLIC; | 85 key->type = PK_PUBLIC; |
86 return CRYPT_OK; | 86 return CRYPT_OK; |
87 } | 87 } |
88 XFREE(tmpbuf); | 88 XFREE(tmpbuf); |
89 | 89 |
90 /* not SSL public key, try to match against PKCS #1 standards */ | 90 /* not SSL public key, try to match against LTC_PKCS #1 standards */ |
91 if ((err = der_decode_sequence_multi(in, inlen, | 91 if ((err = der_decode_sequence_multi(in, inlen, |
92 LTC_ASN1_INTEGER, 1UL, key->N, | 92 LTC_ASN1_INTEGER, 1UL, key->N, |
93 LTC_ASN1_EOL, 0UL, NULL)) != CRYPT_OK) { | 93 LTC_ASN1_EOL, 0UL, NULL)) != CRYPT_OK) { |
94 goto LBL_ERR; | 94 goto LBL_ERR; |
95 } | 95 } |
133 LBL_ERR: | 133 LBL_ERR: |
134 mp_clear_multi(key->d, key->e, key->N, key->dQ, key->dP, key->qP, key->p, key->q, NULL); | 134 mp_clear_multi(key->d, key->e, key->N, key->dQ, key->dP, key->qP, key->p, key->q, NULL); |
135 return err; | 135 return err; |
136 } | 136 } |
137 | 137 |
138 #endif /* MRSA */ | 138 #endif /* LTC_MRSA */ |
139 | 139 |
140 | 140 |
141 /* $Source: /cvs/libtom/libtomcrypt/src/pk/rsa/rsa_import.c,v $ */ | 141 /* $Source$ */ |
142 /* $Revision: 1.21 $ */ | 142 /* $Revision$ */ |
143 /* $Date: 2006/12/04 22:23:27 $ */ | 143 /* $Date$ */ |