Skip to content
GitLab
Explore
Sign in
Register
Primary navigation
Search or go to…
Project
N
nettle
Manage
Activity
Members
Labels
Plan
Issues
Issue boards
Milestones
Wiki
Code
Merge requests
Repository
Branches
Commits
Tags
Repository graph
Compare revisions
Deploy
Releases
Model registry
Monitor
Incidents
Analyze
Value stream analytics
Contributor analytics
Repository analytics
Model experiments
Help
Help
Support
GitLab documentation
Compare GitLab plans
Community forum
Contribute to GitLab
Provide feedback
Keyboard shortcuts
?
Snippets
Groups
Projects
Show more breadcrumbs
Brian Smith
nettle
Commits
00df073c
Commit
00df073c
authored
22 years ago
by
Niels Möller
Browse files
Options
Downloads
Patches
Plain Diff
Ran ispell on the document.
Rev: src/nettle/nettle.texinfo:1.20
parent
342659df
No related branches found
No related tags found
No related merge requests found
Changes
1
Hide whitespace changes
Inline
Side-by-side
Showing
1 changed file
nettle.texinfo
+13
-12
13 additions, 12 deletions
nettle.texinfo
with
13 additions
and
12 deletions
nettle.texinfo
+
13
−
12
View file @
00df073c
...
...
@@ -1187,8 +1187,9 @@ nettle_hash} describing the underlying hash function. The last two
arguments specify where the digest is written.
@end deffn
Note that there is no @code
{
HMAC
_
UPDATE
}
macro; simply call hmac
_
update
function directly, or the update function of the underlying hash function.
Note that there is no @code
{
HMAC
_
UPDATE
}
macro; simply call
@code
{
hmac
_
update
}
function directly, or the update function of the
underlying hash function.
@subsection Concrete @acronym
{
HMAC
}
functions
Now we come to the specialized @acronym
{
HMAC
}
functions, which are
...
...
@@ -1446,7 +1447,7 @@ deallocated by calling one of
Calls @code
{
mpz
_
clear
}
on all numbers in the key struct.
@end deftypefun
In general, Nettle's @acronym
{
rsa
}
functions deviates from Nettle's "no
In general, Nettle's @acronym
{
RSA
}
functions deviates from Nettle's "no
memory allocation"-policy. Space for all the numbers, both in the key structs
above, and temporaries, are allocated dynamically. For information on how
to customize allocation, see
...
...
@@ -1464,9 +1465,9 @@ than the minimum size specified by PKCS#1.
Before signing or verifying a message, you first hash it with the
appropriate hash function. You pass the hash function's context struct
to the
rsa
function, and it will extract the message
digest and do the
rest of the work. There are also alternative functions
that take the
@acronym
{
md
5
}
or @acronym
{
sha
1
}
hash digest as argument.
to the
@acronym
{
RSA
}
signature
function, and it will extract the message
digest and do the
rest of the work. There are also alternative functions
that take the
@acronym
{
MD
5
}
or @acronym
{
SHA
1
}
hash digest as argument.
Creation and verification of signatures is done with the following functions:
...
...
@@ -1492,8 +1493,7 @@ the hash context is reset so that it can be used for new messages.
@end deftypefun
@deftypefun int rsa
_
md5
_
verify
_
digest (const struct rsa
_
public
_
key *@var
{
key
}
, const uint8
_
t *@var
{
digest
}
, const mpz
_
t @var
{
signature
}
)
@deftypefunx int rsa
_
sha1
_
verify
_
digest (const struct rsa
_
public
_
key
*@var
{
key
}
, const uint8
_
t *@var
{
digest
}
, const mpz
_
t @var
{
signature
}
)
@deftypefunx int rsa
_
sha1
_
verify
_
digest (const struct rsa
_
public
_
key *@var
{
key
}
, const uint8
_
t *@var
{
digest
}
, const mpz
_
t @var
{
signature
}
)
Returns 1 if the signature is valid, or 0 if it isn't. @var
{
digest
}
should
point to a digest of size @code
{
MD5
_
DIGEST
_
SIZE
}
or
@code
{
SHA1
_
DIGEST
_
SIZE
}
, respectively.
...
...
@@ -1542,9 +1542,9 @@ example if if @var{n_size} is too small, or if @var{e_size} is zero and
The @acronym
{
DSA
}
digital signature algorithm is more complex than
@acronym
{
RSA
}
. It was specified during the early 1990s, and in 1994 NIST
published FIPS 186 which is the authoritative specification.
Sometimes
@acronym
{
DSA
}
is referred to using the acronym @acronym
{
DSS
}
,
for
Digital Signature Standard.
published
@acronym
{
FIPS
}
186 which is the authoritative specification.
Sometimes
@acronym
{
DSA
}
is referred to using the acronym @acronym
{
DSS
}
,
for
Digital Signature Standard.
For @acronym
{
DSA
}
, the underlying mathematical problem is the
computation of discreet logarithms. The public key consists of a large
...
...
@@ -2196,4 +2196,5 @@ End:
@c LocalWords: RSA Daemen Rijnmen Schneier DES's ede structs oddnesses HMAC
@c LocalWords: NIST Alice's GMP bignum Diffie Adi Shamir Adleman Euclid's ASN
@c LocalWords: PKCS callbacks Young's urtica dioica autoconf automake SSH tad
@c LocalWords: unguessability reseeding reseed alternatingly keysym
@c LocalWords: unguessability reseeding reseed alternatingly keysym subkeys
@c LocalWords: DSA gmp FIPS DSS libdes OpenSSL
This diff is collapsed.
Click to expand it.
Preview
0%
Loading
Try again
or
attach a new file
.
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Save comment
Cancel
Please
register
or
sign in
to comment