summaryrefslogtreecommitdiff
path: root/rsa-sha1-verify.c
diff options
context:
space:
mode:
Diffstat (limited to 'rsa-sha1-verify.c')
-rw-r--r--rsa-sha1-verify.c77
1 files changed, 77 insertions, 0 deletions
diff --git a/rsa-sha1-verify.c b/rsa-sha1-verify.c
new file mode 100644
index 00000000..717a392d
--- /dev/null
+++ b/rsa-sha1-verify.c
@@ -0,0 +1,77 @@
+/* rsa-sha1-verify.c
+ *
+ * Verifying signatures created with RSA and SHA1.
+ */
+
+/* nettle, low-level cryptographics library
+ *
+ * Copyright (C) 2001, 2003 Niels Möller
+ *
+ * The nettle library is free software; you can redistribute it and/or modify
+ * it under the terms of the GNU Lesser General Public License as published by
+ * the Free Software Foundation; either version 2.1 of the License, or (at your
+ * option) any later version.
+ *
+ * The nettle library is distributed in the hope that it will be useful, but
+ * WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY
+ * or FITNESS FOR A PARTICULAR PURPOSE. See the GNU Lesser General Public
+ * License for more details.
+ *
+ * You should have received a copy of the GNU Lesser General Public License
+ * along with the nettle library; see the file COPYING.LIB. If not, write to
+ * the Free Software Foundation, Inc., 59 Temple Place - Suite 330, Boston,
+ * MA 02111-1307, USA.
+ */
+
+#if HAVE_CONFIG_H
+#include "config.h"
+#endif
+
+#if WITH_PUBLIC_KEY
+
+#include "rsa.h"
+
+#include "bignum.h"
+#include "pkcs1.h"
+
+#include <assert.h>
+
+int
+rsa_sha1_verify(const struct rsa_public_key *key,
+ struct sha1_ctx *hash,
+ const mpz_t s)
+{
+ int res;
+ mpz_t m;
+
+ assert(key->size >= RSA_MINIMUM_N_OCTETS);
+ mpz_init(m);
+
+ pkcs1_rsa_sha1_encode(m, key->size - 1, hash);
+ res = _rsa_verify(key, m, s);
+
+ mpz_clear(m);
+
+ return res;
+}
+
+int
+rsa_sha1_verify_digest(const struct rsa_public_key *key,
+ const uint8_t *digest,
+ const mpz_t s)
+{
+ int res;
+ mpz_t m;
+
+ assert(key->size >= RSA_MINIMUM_N_OCTETS);
+ mpz_init(m);
+
+ pkcs1_rsa_sha1_encode_digest(m, key->size - 1, digest);
+ res = _rsa_verify(key, m, s);
+
+ mpz_clear(m);
+
+ return res;
+}
+
+#endif /* WITH_PUBLIC_KEY */