This repository has been archived on 2023-10-09. You can view files and clone it, but cannot push or open issues or pull requests.
Files
blender-archive/source/blender/sign/intern/BLO_sign.c
Kent Mein d0e346d544 updated .c files to include:
#ifdef HAVE_CONFIG_H
#include <config.h>
#endif

Just need to finish cpp files now :)

Kent
--
mein@cs.umn.edu
2002-11-25 12:02:15 +00:00

232 lines
6.1 KiB
C

/**
* $Id$
*
* ***** BEGIN GPL/BL DUAL LICENSE BLOCK *****
*
* This program is free software; you can redistribute it and/or
* modify it under the terms of the GNU General Public License
* as published by the Free Software Foundation; either version 2
* of the License, or (at your option) any later version. The Blender
* Foundation also sells licenses for use in proprietary software under
* the Blender License. See http://www.blender.org/BL/ for information
* about this.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program; if not, write to the Free Software Foundation,
* Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
*
* The Original Code is Copyright (C) 2001-2002 by NaN Holding BV.
* All rights reserved.
*
* The Original Code is: all of this file.
*
* Contributor(s): none yet.
*
* ***** END GPL/BL DUAL LICENSE BLOCK *****
* openssl/crypt RSA signature wrapper library
*/
#include <stdio.h>
#include <stdlib.h>
#ifdef HAVE_CONFIG_H
#include <config.h>
#endif
#ifdef _WIN32
#include <winsock2.h>
#include <windows.h>
#endif
#include "openssl/rsa.h"
#include "openssl/ripemd.h"
#include "openssl/objects.h"
#include "zlib.h"
#include "GEN_messaging.h"
#include "BLO_keyStore.h"
#include "BLO_writeStreamGlue.h"
#include "BLO_sign_verify_Header.h"
#include "BLO_sign.h"
int
BLO_sign(
unsigned char *data2,
unsigned int dataIn,
struct streamGlueHeaderStruct *streamGlueHeader)
{
int err = 0;
struct writeStreamGlueStruct *streamGlue = NULL;
struct BLO_sign_verify_HeaderStruct BLO_sign_verify_Header;
struct BLO_SignerHeaderStruct BLO_SignerHeader;
unsigned char *sigret = NULL;
unsigned int siglen = 0;
unsigned char *digest = NULL;
byte *pubKey = NULL, *privKey = NULL;
int pubKeyLen = 0, privKeyLen = 0;
RSA *rsa = NULL;
static unsigned char rsa_e[] = "\x01\x00\x01";
int signSuccess = 0;
unsigned char *data = NULL;
// Update streamGlueHeader that initiated us and write it away
streamGlueHeader->totalStreamLength =
htonl(SIGNVERIFYHEADERSTRUCTSIZE + SIGNERHEADERSTRUCTSIZE + dataIn);
streamGlueHeader->crc = htonl(crc32(0L,
(const Bytef *) streamGlueHeader, STREAMGLUEHEADERSIZE - 4));
err = writeStreamGlue(
Global_streamGlueControl,
&streamGlue,
(unsigned char *) streamGlueHeader,
STREAMGLUEHEADERSIZE,
0);
if (err) return err;
#ifndef NDEBUG
fprintf(GEN_errorstream,
"BLO_sign writes streamGlueHeader of %u bytes\n",
STREAMGLUEHEADERSIZE);
#endif
pubKeyLen = keyStoreGetPubKey(&pubKey);
privKeyLen = keyStoreGetPrivKey(&privKey);
if ((pubKeyLen == 0) || (privKeyLen == 0)) {
err = BWS_SETFUNCTION(BWS_SIGN) |
BWS_SETGENERR(BWS_RSA);
return err;
}
rsa = RSA_new();
if (rsa == NULL) {
#ifndef NDEBUG
fprintf(GEN_errorstream,
"Error in RSA_new\n");
#endif
err = BWS_SETFUNCTION(BWS_SIGN) |
BWS_SETSPECERR(BWS_RSANEWERROR);
return err;
}
// static exponent
rsa->e = BN_bin2bn(rsa_e, sizeof(rsa_e)-1, rsa->e);
// public part into rsa->n
rsa->n = BN_bin2bn(pubKey, pubKeyLen, rsa->n);
//rsa->n = BN_bin2bn(rsa_n, sizeof(rsa_n)-1, rsa->n);
// private part into rsa->d
rsa->d = BN_bin2bn(privKey, privKeyLen, rsa->d);
//rsa->d = BN_bin2bn(rsa_d, sizeof(rsa_d)-1, rsa->d);
//DEBUG RSA_print_fp(stdout, rsa, 0);
sigret = malloc(RSA_size(rsa) * sizeof(byte));
if (!sigret) {
err = BWS_SETFUNCTION(BWS_SIGN) |
BWS_SETGENERR(BWS_MALLOC);
RSA_free(rsa);
return err;
}
digest = malloc(RIPEMD160_DIGEST_LENGTH);
if (!digest) {
err = BWS_SETFUNCTION(BWS_SIGN) |
BWS_SETGENERR(BWS_MALLOC);
free(sigret);
RSA_free(rsa);
return err;
}
// Fill BLO_SignerHeader
strcpy(BLO_SignerHeader.name, keyStoreGetUserName());
strcpy(BLO_SignerHeader.email, keyStoreGetEmail());
BLO_SignerHeader.homeUrl[0] = '\0';
BLO_SignerHeader.text[0] = '\0';
BLO_SignerHeader.pubKeyUrl1[0] = '\0';
BLO_SignerHeader.pubKeyUrl2[0] = '\0';
// prepend BLO_SignerStruct to data
data = malloc(SIGNERHEADERSTRUCTSIZE + dataIn);
if (!data) {
err = BWS_SETFUNCTION(BWS_SIGN) |
BWS_SETGENERR(BWS_MALLOC);
free(sigret);
free(digest);
RSA_free(rsa);
return err;
}
memcpy(data, &BLO_SignerHeader, SIGNERHEADERSTRUCTSIZE);
memcpy(data + SIGNERHEADERSTRUCTSIZE, data2, dataIn);
dataIn += SIGNERHEADERSTRUCTSIZE;
RIPEMD160(data, dataIn, digest);
signSuccess = RSA_sign(NID_ripemd160, digest,
RIPEMD160_DIGEST_LENGTH, sigret, &siglen, rsa);
if (signSuccess != 1) {
err = BWS_SETFUNCTION(BWS_SIGN) |
BWS_SETSPECERR(BWS_SIGNERROR);
free(data);
free(sigret);
free(digest);
RSA_free(rsa);
return err;
}
#ifndef NDEBUG
fprintf(GEN_errorstream,
"BLO_sign writes BLO_sign_verify_Header of %u bytes\n",
SIGNVERIFYHEADERSTRUCTSIZE);
#endif
// write out our header
BLO_sign_verify_Header.magic = 'A';
BLO_sign_verify_Header.length = htonl(dataIn);
memcpy(BLO_sign_verify_Header.pubKey, pubKey, pubKeyLen);
BLO_sign_verify_Header.pubKeyLen = htonl(pubKeyLen);
memcpy(BLO_sign_verify_Header.signature, sigret, siglen);
BLO_sign_verify_Header.signatureLen = htonl(siglen);
BLO_sign_verify_Header.datacrc = htonl(crc32(0L,
(const Bytef *) data, dataIn));
BLO_sign_verify_Header.headercrc = htonl(crc32(0L,
(const Bytef *) &BLO_sign_verify_Header, SIGNVERIFYHEADERSTRUCTSIZE-4));
err = writeStreamGlue(
Global_streamGlueControl,
&streamGlue,
(unsigned char *) &BLO_sign_verify_Header,
SIGNVERIFYHEADERSTRUCTSIZE,
0);
if (err) {
free(data);
free(sigret);
free(digest);
RSA_free(rsa);
return err;
}
#ifndef NDEBUG
fprintf(GEN_errorstream,
"BLO_sign writes %u bytes raw data (plus its 2 headers totals to %u)\n",
dataIn, STREAMGLUEHEADERSIZE + SIGNVERIFYHEADERSTRUCTSIZE + dataIn);
#endif
// finally write all signed data
err = writeStreamGlue(
Global_streamGlueControl,
&streamGlue,
(unsigned char *) data,
dataIn,
1);
free(data); // NOTE: we must release because we made a copy
free(digest);
free(sigret);
RSA_free(rsa);
return err;
}