X-Git-Url: https://git.distorted.org.uk/u/mdw/catacomb/blobdiff_plain/8b810a45dec25017a6256e4ef134236444a00921..2685767a6125c1620719c7de6234aedf41857b7e:/dsa-verify.c diff --git a/dsa-verify.c b/dsa-verify.c index 217cede..3f77039 100644 --- a/dsa-verify.c +++ b/dsa-verify.c @@ -1,6 +1,6 @@ /* -*-c-*- * - * $Id: dsa-verify.c,v 1.1 1999/11/19 19:28:00 mdw Exp $ + * $Id: dsa-verify.c,v 1.5 2000/10/08 12:13:17 mdw Exp $ * * DSA signature verification * @@ -30,6 +30,18 @@ /*----- Revision history --------------------------------------------------* * * $Log: dsa-verify.c,v $ + * Revision 1.5 2000/10/08 12:13:17 mdw + * Use @MP_EQ@ instead of @MP_CMP@. + * + * Revision 1.4 2000/06/17 10:53:35 mdw + * Typesetting fixes. + * + * Revision 1.3 1999/12/10 23:18:38 mdw + * Change interface for suggested destinations. + * + * Revision 1.2 1999/11/23 00:20:04 mdw + * Remove stray debugging code. + * * Revision 1.1 1999/11/19 19:28:00 mdw * Implementation of the Digital Signature Algorithm. * @@ -46,19 +58,16 @@ /* --- @dsa_vrfy@ --- * * * Arguments: @const dsa_param *dp@ = pointer to DSA parameters - * @const mp *y@ = public verification key - * @const mp *m@ = message which was signed - * @const mp *r, *s@ = the signature + * @mp *y@ = public verification key + * @mp *m@ = message which was signed + * @mp *r, *s@ = the signature * * Returns: Zero if the signature is a forgery, nonzero if it's valid. * * Use: Verifies a DSA digital signature. */ -#define SHOW(x) do { fputs(#x " = ", stdout); mp_writefile(x, stdout, 16); fputc('\n', stdout); } while (0) - -int dsa_vrfy(const dsa_param *dp, const mp *y, - const mp *m, const mp *r, const mp *s) +int dsa_vrfy(const dsa_param *dp, mp *y, mp *m, mp *r, mp *s) { mpmont pm, qm; mp *w; @@ -80,13 +89,13 @@ int dsa_vrfy(const dsa_param *dp, const mp *y, /* --- Compute %$w = s^{-1} \bmod q$% --- */ { - mp *z; - mp_gcd(0, 0, &z, dp->q, (mp *)s); + mp *z = MP_NEW; + mp_gcd(0, 0, &z, dp->q, s); w = mpmont_mul(&qm, MP_NEW, z, qm.r2); mp_drop(z); } - /* --- Compute %$wr%$ and %$wm$% --- */ + /* --- Compute %$wr$% and %$wm$% --- */ f[0].exp = mpmont_mul(&qm, MP_NEW, w, m); f[1].exp = mpmont_mul(&qm, MP_NEW, w, r); @@ -96,10 +105,10 @@ int dsa_vrfy(const dsa_param *dp, const mp *y, /* --- Do the exponentiation and take residue mod @q@ --- */ f[0].base = dp->g; - f[1].base = (mp *)y; - w = mpmont_mexp(&pm, f, 2); + f[1].base = y; + w = mpmont_mexp(&pm, MP_NEW, f, 2); mp_div(0, &w, w, dp->q); - ok = MP_CMP(w, ==, r); + ok = MP_EQ(w, r); /* --- Tidy up --- */ @@ -113,7 +122,7 @@ int dsa_vrfy(const dsa_param *dp, const mp *y, /* --- @dsa_verify@ --- * * * Arguments: @const dsa_param *dp@ = pointer to DSA parameters - * @const mp *y@ = public verification key + * @mp *y@ = public verification key * @const void *m@ = pointer to message block * @size_t msz@ = size of message block * @const void *r@ = pointer to @r@ signature half @@ -126,7 +135,7 @@ int dsa_vrfy(const dsa_param *dp, const mp *y, * Use: Verifies a DSA digital signature. */ -int dsa_verify(const dsa_param *dp, const mp *y, +int dsa_verify(const dsa_param *dp, mp *y, const void *m, size_t msz, const void *r, size_t rsz, const void *s, size_t ssz) @@ -190,6 +199,7 @@ static int verify(int good, dstr *v) mp_drop(dp.q); mp_drop(dp.g); mp_drop(y); + assert(mparena_count(MPARENA_GLOBAL) == 0); return (ok); }