X-Git-Url: https://git.distorted.org.uk/~mdw/catacomb-python/blobdiff_plain/c41d03718b8dc50076405c3d0f3136cfaa1cb21b..2dd9cb9cdfcec3238c9fb75e3fe7abd122132c5c:/pubkey.c diff --git a/pubkey.c b/pubkey.c index 9c43ca7..ad3bcd4 100644 --- a/pubkey.c +++ b/pubkey.c @@ -86,8 +86,7 @@ static PyObject *dsa_setup(PyTypeObject *ty, PyObject *G, PyObject *u, g->rng = rng; Py_INCREF(rng); g->hash = hash; Py_INCREF(hash); return ((PyObject *)g); end: - if (p) Py_DECREF(p); - FREEOBJ(g); + Py_XDECREF(p); FREEOBJ(g); return (0); } @@ -191,16 +190,16 @@ end: static PyMethodDef dsapub_pymethods[] = { #define METHNAME(name) dsameth_##name - METH (beginhash, "D.beginhash() -> hash object") - METH (endhash, "D.endhash(H) -> BYTES") - METH (verify, "D.verify(MSG, (R, S)) -> true/false") + METH (beginhash, "D.beginhash() -> hash object") + METH (endhash, "D.endhash(H) -> BYTES") + METH (verify, "D.verify(MSG, (R, S)) -> true/false") #undef METHNAME { 0 } }; static PyMethodDef dsapriv_pymethods[] = { #define METHNAME(name) dsameth_##name - KWMETH(sign, "D.sign(MSG, k = K) -> R, S") + KWMETH(sign, "D.sign(MSG, [k = K]) -> R, S") #undef METHNAME { 0 } }; @@ -247,7 +246,7 @@ static PyTypeObject dsapub_pytype_skel = { Py_TPFLAGS_BASETYPE, /* @tp_doc@ */ -"DSAPub(GROUP, P, [hash = sha], [rng = rand]): DSA public key.", + "DSAPub(GROUP, P, [hash = sha], [rng = rand]): DSA public key.", 0, /* @tp_traverse@ */ 0, /* @tp_clear@ */ @@ -295,7 +294,8 @@ static PyTypeObject dsapriv_pytype_skel = { Py_TPFLAGS_BASETYPE, /* @tp_doc@ */ -"DSAPriv(GROUP, U, [p = u G], [hash = sha], [rng = rand]): DSA private key.", + "DSAPriv(GROUP, U, [p = u G], [hash = sha], [rng = rand]): " + "DSA private key.", 0, /* @tp_traverse@ */ 0, /* @tp_clear@ */ @@ -428,16 +428,16 @@ end: static PyMethodDef kcdsapub_pymethods[] = { #define METHNAME(name) kcdsameth_##name - METH (beginhash, "D.beginhash() -> hash object") - METH (endhash, "D.endhash(H) -> BYTES") - METH (verify, "D.verify(MSG, (R, S)) -> true/false") + METH (beginhash, "D.beginhash() -> hash object") + METH (endhash, "D.endhash(H) -> BYTES") + METH (verify, "D.verify(MSG, (R, S)) -> true/false") #undef METHNAME { 0 } }; static PyMethodDef kcdsapriv_pymethods[] = { #define METHNAME(name) kcdsameth_##name - KWMETH(sign, "D.sign(MSG, k = K) -> R, S") + KWMETH(sign, "D.sign(MSG, [k = K]) -> R, S") #undef METHNAME { 0 } }; @@ -467,7 +467,7 @@ static PyTypeObject kcdsapub_pytype_skel = { Py_TPFLAGS_BASETYPE, /* @tp_doc@ */ -"KCDSAPub(GROUP, P, [hash = sha], [rng = rand]): KCDSA public key.", + "KCDSAPub(GROUP, P, [hash = sha], [rng = rand]): KCDSA public key.", 0, /* @tp_traverse@ */ 0, /* @tp_clear@ */ @@ -515,7 +515,8 @@ static PyTypeObject kcdsapriv_pytype_skel = { Py_TPFLAGS_BASETYPE, /* @tp_doc@ */ -"KCDSAPriv(GROUP, U, [p = u G], [hash = sha], [rng = rand]): KCDSA private key.", + "KCDSAPriv(GROUP, U, [p = u G], [hash = sha], [rng = rand]): " + "KCDSA private key.", 0, /* @tp_traverse@ */ 0, /* @tp_clear@ */ @@ -649,7 +650,7 @@ static PyObject *rsapriv_pynew(PyTypeObject *ty, goto end; if ((rp.n && !MP_ODDP(rp.n)) || (rp.p && !MP_ODDP(rp.p)) || - (rp.p && !MP_ODDP(rp.q))) + (rp.q && !MP_ODDP(rp.q))) VALERR("RSA modulus and factors must be odd"); if (rsa_recover(&rp)) VALERR("couldn't construct private key"); if (rng != Py_None && !GRAND_PYCHECK(rng)) @@ -733,11 +734,13 @@ static PyObject *meth__RSAPriv_generate(PyObject *me, unsigned n = 0; rsa_priv rp; mp *e = 0; - pgev evt = { 0 }; + struct excinfo exc = EXCINFO_INIT; + pypgev evt = { { 0 } }; static const char *const kwlist[] = { "class", "nbits", "event", "rng", "nsteps", "e", 0 }; PyObject *rc = 0; + evt.exc = &exc; if (!PyArg_ParseTupleAndKeywords(arg, kw, "OO&|O&O&O&O&:generate", KWLIST, &me, convuint, &nbits, convpgev, &evt, convgrand, &r, convuint, &n, @@ -745,8 +748,8 @@ static PyObject *meth__RSAPriv_generate(PyObject *me, goto end; if (e) MP_COPY(e); else e = mp_fromulong(MP_NEW, 65537); - if (rsa_gen_e(&rp, nbits, e, r, n, evt.proc, evt.ctx)) - PGENERR; + if (rsa_gen_e(&rp, nbits, e, r, n, evt.ev.proc, evt.ev.ctx)) + PGENERR(&exc); rc = rsapriv_pywrap(&rp); end: droppgev(&evt); @@ -756,35 +759,35 @@ end: static PyGetSetDef rsapub_pygetset[] = { #define GETSETNAME(op, name) rsa##op##_##name - GET (n, "R.n -> N") - GET (e, "R.e -> E") + GET (n, "R.n -> N") + GET (e, "R.e -> E") #undef GETSETNAME { 0 } }; static PyMethodDef rsapub_pymethods[] = { #define METHNAME(name) rsameth_##name - METH (pubop, "R.pubop(X) -> X^E (mod N)") + METH (pubop, "R.pubop(X) -> X^E (mod N)") #undef METHNAME { 0 } }; static PyGetSetDef rsapriv_pygetset[] = { #define GETSETNAME(op, name) rsa##op##_##name - GET (d, "R.d -> D") - GET (p, "R.p -> P") - GET (q, "R.q -> Q") - GET (dp, "R.dp -> D mod (P - 1)") - GET (dq, "R.dq -> D mod (Q - 1)") - GET (q_inv, "R.q_inv -> Q^{-1} mod P") - GETSET(rng, "R.rng -> random number source for blinding") + GET (d, "R.d -> D") + GET (p, "R.p -> P") + GET (q, "R.q -> Q") + GET (dp, "R.dp -> D mod (P - 1)") + GET (dq, "R.dq -> D mod (Q - 1)") + GET (q_inv, "R.q_inv -> Q^{-1} mod P") + GETSET(rng, "R.rng -> random number source for blinding") #undef GETSETNAME { 0 } }; static PyMethodDef rsapriv_pymethods[] = { #define METHNAME(name) rsameth_##name - KWMETH(privop, "R.privop(X, rng = None) -> X^D (mod N)") + KWMETH(privop, "R.privop(X, [rng = None]) -> X^D (mod N)") #undef METHNAME { 0 } }; @@ -814,7 +817,7 @@ static PyTypeObject rsapub_pytype_skel = { Py_TPFLAGS_BASETYPE, /* @tp_doc@ */ -"RSAPub(N, E): RSA public key.", + "RSAPub(N, E): RSA public key.", 0, /* @tp_traverse@ */ 0, /* @tp_clear@ */ @@ -862,8 +865,8 @@ static PyTypeObject rsapriv_pytype_skel = { Py_TPFLAGS_BASETYPE, /* @tp_doc@ */ -"RSAPriv(..., [rng = rand]): RSA private key.\n\ - Keywords: n, e, d, p, q, dp, dq, q_inv; must provide enough", + "RSAPriv(..., [rng = rand]): RSA private key.\n" + " Keywords: n, e, d, p, q, dp, dq, q_inv; must provide enough", 0, /* @tp_traverse@ */ 0, /* @tp_clear@ */ @@ -1260,30 +1263,26 @@ EDDSAS(DEFEDDSA) static PyMethodDef methods[] = { #define METHNAME(name) meth_##name - KWMETH(_p1crypt_encode, 0) - KWMETH(_p1crypt_decode, 0) - KWMETH(_p1sig_encode, 0) - KWMETH(_p1sig_decode, 0) - KWMETH(_oaep_encode, 0) - KWMETH(_oaep_decode, 0) - KWMETH(_pss_encode, 0) - KWMETH(_pss_decode, 0) - KWMETH(_RSAPriv_generate, "\ -generate(NBITS, [event = pgen_nullev, rng = rand, nsteps = 0]) -> R") + KWMETH(_p1crypt_encode, 0) + KWMETH(_p1crypt_decode, 0) + KWMETH(_p1sig_encode, 0) + KWMETH(_p1sig_decode, 0) + KWMETH(_oaep_encode, 0) + KWMETH(_oaep_decode, 0) + KWMETH(_pss_encode, 0) + KWMETH(_pss_decode, 0) + KWMETH(_RSAPriv_generate, "generate(NBITS, [event = pgen_nullev], " + "[rng = rand], [nsteps = 0]) -> R") #define DEFMETH(X, x) \ - METH (x, "\ -" #x "(KEY, PUBLIC) -> SHARED") + METH (x, "" #x "(KEY, PUBLIC) -> SHARED") XDHS(DEFMETH) #undef DEFMETH #define DEFMETH(ED, ed, phdflt, sigver) \ - METH (ed##_pubkey, "\ -" #ed "_pubkey(KEY) -> PUBLIC") \ - KWMETH(ed##_sign, "\ -" #ed "_sign(KEY, MSG, [pub = PUBLIC, " \ - "perso = STRING, phflag = BOOL]) -> SIG") \ - KWMETH(ed##_verify, "\ -" #ed "_verify(PUBLIC, MSG, SIG, " \ - "[perso = STRING, phflag = BOOL]) -> BOOL") + METH (ed##_pubkey, "" #ed "_pubkey(KEY) -> PUBLIC") \ + KWMETH(ed##_sign, "" #ed "_sign(KEY, MSG, [pub = PUBLIC], " \ + "[perso = STRING], [phflag = BOOL]) -> SIG") \ + KWMETH(ed##_verify, "" #ed "_verify(PUBLIC, MSG, SIG, " \ + "[perso = STRING], [phflag = BOOL]) -> BOOL") EDDSAS(DEFMETH) #undef DEFMETH #undef METHNAME