35d9ad5ae7
The output produced by DumpPublicKey now has a version tag on each line (ie, each key). The existing keys are retroactively dubbed "version 1", and we add a version 2 for 2048-bit e=65537 keys. Change-Id: I204ec615c8f2346670220a1aeb99269e4abd5f81
54 lines
2.3 KiB
C
54 lines
2.3 KiB
C
/* rsa.c
|
|
**
|
|
** Copyright 2012, The Android Open Source Project
|
|
**
|
|
** Redistribution and use in source and binary forms, with or without
|
|
** modification, are permitted provided that the following conditions are met:
|
|
** * Redistributions of source code must retain the above copyright
|
|
** notice, this list of conditions and the following disclaimer.
|
|
** * Redistributions in binary form must reproduce the above copyright
|
|
** notice, this list of conditions and the following disclaimer in the
|
|
** documentation and/or other materials provided with the distribution.
|
|
** * Neither the name of Google Inc. nor the names of its contributors may
|
|
** be used to endorse or promote products derived from this software
|
|
** without specific prior written permission.
|
|
**
|
|
** THIS SOFTWARE IS PROVIDED BY Google Inc. ``AS IS'' AND ANY EXPRESS OR
|
|
** IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
|
|
** MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO
|
|
** EVENT SHALL Google Inc. BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
|
|
** SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
|
|
** PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS;
|
|
** OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
|
|
** WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
|
|
** OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF
|
|
** ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
*/
|
|
|
|
#include "mincrypt/rsa.h"
|
|
|
|
int RSA_e_f4_verify(const RSAPublicKey* key,
|
|
const uint8_t* signature,
|
|
const int len,
|
|
const uint8_t* sha);
|
|
|
|
int RSA_e_3_verify(const RSAPublicKey *key,
|
|
const uint8_t *signature,
|
|
const int len,
|
|
const uint8_t *sha);
|
|
|
|
int RSA_verify(const RSAPublicKey *key,
|
|
const uint8_t *signature,
|
|
const int len,
|
|
const uint8_t *sha) {
|
|
switch (key->exponent) {
|
|
case 3:
|
|
return RSA_e_3_verify(key, signature, len, sha);
|
|
break;
|
|
case 65537:
|
|
return RSA_e_f4_verify(key, signature, len, sha);
|
|
break;
|
|
default:
|
|
return 0;
|
|
}
|
|
}
|