re-factor dh_export_radix() to dh_export_key()
This commit is contained in:
parent
f226efc9a9
commit
c493a2a0a3
@ -236,9 +236,8 @@ int dh_shared_secret(dh_key *private_key, dh_key *public_key,
|
|||||||
|
|
||||||
void dh_free(dh_key *key);
|
void dh_free(dh_key *key);
|
||||||
|
|
||||||
int dh_export_radix(int radix,
|
int dh_export_key(void *out, unsigned long *outlen,
|
||||||
void *out, unsigned long *outlen,
|
int type, dh_key *key);
|
||||||
int type, dh_key *key);
|
|
||||||
|
|
||||||
#ifdef LTC_SOURCE
|
#ifdef LTC_SOURCE
|
||||||
/* internal helper functions */
|
/* internal helper functions */
|
||||||
|
@ -11,35 +11,15 @@
|
|||||||
|
|
||||||
#ifdef LTC_MDH
|
#ifdef LTC_MDH
|
||||||
|
|
||||||
static unsigned long _count_digits(int radix, void *num)
|
|
||||||
{
|
|
||||||
void *r, *t;
|
|
||||||
unsigned long digits = 0;
|
|
||||||
|
|
||||||
if (mp_iszero(num) == LTC_MP_YES) return 1;
|
|
||||||
if (mp_init_multi(&t, &r, NULL) != CRYPT_OK) return 0;
|
|
||||||
mp_copy(num, t);
|
|
||||||
mp_set_int(r, radix);
|
|
||||||
while (mp_iszero(t) == LTC_MP_NO) {
|
|
||||||
if (mp_div(t, r, t, NULL) != CRYPT_OK) {
|
|
||||||
mp_clear_multi(t, r, NULL);
|
|
||||||
return 0;
|
|
||||||
}
|
|
||||||
digits++;
|
|
||||||
}
|
|
||||||
mp_clear_multi(t, r, NULL);
|
|
||||||
return digits;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
Export a DH key to a binary packet
|
Binary export a DH key to a buffer
|
||||||
@param out [out] The destination for the key
|
@param out [out] The destination for the key
|
||||||
@param outlen [in/out] The max size and resulting size of the DH key
|
@param outlen [in/out] The max size and resulting size of the DH key
|
||||||
@param type Which type of key (PK_PRIVATE or PK_PUBLIC)
|
@param type Which type of key (PK_PRIVATE or PK_PUBLIC)
|
||||||
@param key The key you wish to export
|
@param key The key you wish to export
|
||||||
@return CRYPT_OK if successful
|
@return CRYPT_OK if successful
|
||||||
*/
|
*/
|
||||||
int dh_export_radix(int radix, void *out, unsigned long *outlen, int type, dh_key *key)
|
int dh_export_key(void *out, unsigned long *outlen, int type, dh_key *key)
|
||||||
{
|
{
|
||||||
unsigned long len;
|
unsigned long len;
|
||||||
void *k;
|
void *k;
|
||||||
@ -47,10 +27,9 @@ int dh_export_radix(int radix, void *out, unsigned long *outlen, int type, dh_ke
|
|||||||
LTC_ARGCHK(out != NULL);
|
LTC_ARGCHK(out != NULL);
|
||||||
LTC_ARGCHK(outlen != NULL);
|
LTC_ARGCHK(outlen != NULL);
|
||||||
LTC_ARGCHK(key != NULL);
|
LTC_ARGCHK(key != NULL);
|
||||||
LTC_ARGCHK((radix >= 2 && radix <= 64) || radix == 256);
|
|
||||||
|
|
||||||
k = (type == PK_PRIVATE) ? key->x : key->y;
|
k = (type == PK_PRIVATE) ? key->x : key->y;
|
||||||
len = (radix == 256) ? mp_unsigned_bin_size(k) : _count_digits(radix, k) + 1;
|
len = mp_unsigned_bin_size(k);
|
||||||
|
|
||||||
if (*outlen < len) {
|
if (*outlen < len) {
|
||||||
*outlen = len;
|
*outlen = len;
|
||||||
@ -58,7 +37,7 @@ int dh_export_radix(int radix, void *out, unsigned long *outlen, int type, dh_ke
|
|||||||
}
|
}
|
||||||
*outlen = len;
|
*outlen = len;
|
||||||
|
|
||||||
return (radix == 256) ? mp_to_unsigned_bin(k, out) : mp_toradix(k, out, radix);
|
return mp_to_unsigned_bin(k, out);
|
||||||
}
|
}
|
||||||
|
|
||||||
#endif /* LTC_MDH */
|
#endif /* LTC_MDH */
|
||||||
|
@ -350,33 +350,19 @@ static int _radix_test(void)
|
|||||||
return CRYPT_ERROR;
|
return CRYPT_ERROR;
|
||||||
}
|
}
|
||||||
len = sizeof(buf);
|
len = sizeof(buf);
|
||||||
DO(dh_export_radix(256, buf, &len, PK_PRIVATE, &k1));
|
DO(dh_export_key(buf, &len, PK_PRIVATE, &k1));
|
||||||
if (compare_testvector(buf, len, xbin, sizeof(xbin), "radix_test", i*10 + 2)) {
|
if (compare_testvector(buf, len, xbin, sizeof(xbin), "radix_test", i*10 + 2)) {
|
||||||
printf("radix_test: dh_export+PK_PRIVATE mismatch\n");
|
printf("radix_test: dh_export+PK_PRIVATE mismatch\n");
|
||||||
dh_free(&k1);
|
dh_free(&k1);
|
||||||
return CRYPT_ERROR;
|
return CRYPT_ERROR;
|
||||||
}
|
}
|
||||||
len = sizeof(buf);
|
len = sizeof(buf);
|
||||||
DO(dh_export_radix(256, buf, &len, PK_PUBLIC, &k1));
|
DO(dh_export_key(buf, &len, PK_PUBLIC, &k1));
|
||||||
if (compare_testvector(buf, len, ybin, sizeof(ybin), "radix_test", i*10 + 3)) {
|
if (compare_testvector(buf, len, ybin, sizeof(ybin), "radix_test", i*10 + 3)) {
|
||||||
printf("radix_test: dh_export+PK_PUBLIC mismatch\n");
|
printf("radix_test: dh_export+PK_PUBLIC mismatch\n");
|
||||||
dh_free(&k1);
|
dh_free(&k1);
|
||||||
return CRYPT_ERROR;
|
return CRYPT_ERROR;
|
||||||
}
|
}
|
||||||
len = sizeof(buf);
|
|
||||||
DO(dh_export_radix(47, buf, &len, PK_PRIVATE, &k1));
|
|
||||||
if (compare_testvector(buf, len, xr47, strlen(xr47)+1, "radix_test", i*10 + 4)) {
|
|
||||||
printf("radix_test: dh_export+PK_PRIVATE mismatch\n");
|
|
||||||
dh_free(&k1);
|
|
||||||
return CRYPT_ERROR;
|
|
||||||
}
|
|
||||||
len = sizeof(buf);
|
|
||||||
DO(dh_export_radix(47, buf, &len, PK_PUBLIC, &k1));
|
|
||||||
if (compare_testvector(buf, len, yr47, strlen(yr47)+1, "radix_test", i*10 + 5)) {
|
|
||||||
printf("radix_test: dh_export+PK_PUBLIC mismatch\n");
|
|
||||||
dh_free(&k1);
|
|
||||||
return CRYPT_ERROR;
|
|
||||||
}
|
|
||||||
dh_free(&k1);
|
dh_free(&k1);
|
||||||
|
|
||||||
if(test[i].radix != 256) {
|
if(test[i].radix != 256) {
|
||||||
@ -396,7 +382,7 @@ static int _radix_test(void)
|
|||||||
return CRYPT_ERROR;
|
return CRYPT_ERROR;
|
||||||
}
|
}
|
||||||
len = sizeof(buf);
|
len = sizeof(buf);
|
||||||
DO(dh_export_radix(256, buf, &len, PK_PUBLIC, &k2));
|
DO(dh_export_key(buf, &len, PK_PUBLIC, &k2));
|
||||||
if (compare_testvector(buf, len, ybin, sizeof(ybin), "radix_test", i*10 + 7)) {
|
if (compare_testvector(buf, len, ybin, sizeof(ybin), "radix_test", i*10 + 7)) {
|
||||||
printf("radix_test: dh_export+PK_PUBLIC mismatch\n");
|
printf("radix_test: dh_export+PK_PUBLIC mismatch\n");
|
||||||
dh_free(&k2);
|
dh_free(&k2);
|
||||||
|
Loading…
Reference in New Issue
Block a user