Skip to content
Snippets Groups Projects
Select Git revision
  • f2b3b7f8259c6e69655d62b2e06b72ba9da3ac3f
  • master default protected
  • hpke
  • ppc-chacha-4core
  • delete-internal-name-mangling
  • master-updates
  • ppc-gcm
  • ppc-chacha-2core
  • refactor-ecc-mod
  • ppc-chacha-core
  • use-mpn_cnd-functions
  • optimize-ecc-invert
  • default-m4-quote-char
  • power-asm-wip
  • test-fat
  • chacha-3core-neon
  • x86_64-salsa20-2core
  • salsa20-2core-neon
  • bcrypt
  • arm-salsa20-chacha-vsra
  • test-shlib-dir
  • nettle_3.6_release_20200429
  • nettle_3.6rc3
  • nettle_3.6rc2
  • nettle_3.6rc1
  • nettle_3.5.1_release_20190627
  • nettle_3.5_release_20190626
  • nettle_3.5rc1
  • nettle_3.4.1_release_20181204
  • nettle_3.4.1rc1
  • nettle_3.4_release_20171119
  • nettle_3.4rc2
  • nettle_3.4rc1
  • nettle_3.3_release_20161001
  • nettle_3.2_release_20160128
  • nettle_3.1.1_release_20150424
  • nettle_3.1_release_20150407
  • nettle_3.1rc3
  • nettle_3.1rc2
  • nettle_3.1rc1
  • nettle_3.0_release_20140607
41 results

arcfour.c

Blame
  • Forked from Nettle / nettle
    Source project has a limited visibility.
    • Niels Möller's avatar
      63241173
      Fixed copyright notice. · 63241173
      Niels Möller authored
      Rev: src/nettle/aes.c:1.3
      Rev: src/nettle/aes.h:1.3
      Rev: src/nettle/arcfour.c:1.2
      Rev: src/nettle/arcfour.h:1.2
      Rev: src/nettle/blowfish.h:1.5
      Rev: src/nettle/cast128.c:1.2
      Rev: src/nettle/cast128.h:1.2
      Rev: src/nettle/des.c:1.3
      Rev: src/nettle/des.h:1.3
      Rev: src/nettle/macros.h:1.3
      Rev: src/nettle/md5.c:1.2
      Rev: src/nettle/md5.h:1.2
      Rev: src/nettle/serpent.h:1.4
      Rev: src/nettle/sha1.c:1.3
      Rev: src/nettle/sha1.h:1.2
      Rev: src/nettle/twofish.c:1.3
      Rev: src/nettle/twofish.h:1.3
      63241173
      History
      Fixed copyright notice.
      Niels Möller authored
      Rev: src/nettle/aes.c:1.3
      Rev: src/nettle/aes.h:1.3
      Rev: src/nettle/arcfour.c:1.2
      Rev: src/nettle/arcfour.h:1.2
      Rev: src/nettle/blowfish.h:1.5
      Rev: src/nettle/cast128.c:1.2
      Rev: src/nettle/cast128.h:1.2
      Rev: src/nettle/des.c:1.3
      Rev: src/nettle/des.h:1.3
      Rev: src/nettle/macros.h:1.3
      Rev: src/nettle/md5.c:1.2
      Rev: src/nettle/md5.h:1.2
      Rev: src/nettle/serpent.h:1.4
      Rev: src/nettle/sha1.c:1.3
      Rev: src/nettle/sha1.h:1.2
      Rev: src/nettle/twofish.c:1.3
      Rev: src/nettle/twofish.h:1.3
    rsa.h 3.59 KiB
    /* rsa.h
     *
     * The RSA publickey algorithm.
     */
    
    /* nettle, low-level cryptographics library
     *
     * Copyright (C) 2001 Niels Mller
     *  
     * The nettle library is free software; you can redistribute it and/or modify
     * it under the terms of the GNU Lesser General Public License as published by
     * the Free Software Foundation; either version 2.1 of the License, or (at your
     * option) any later version.
     * 
     * The nettle library is distributed in the hope that it will be useful, but
     * WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY
     * or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU Lesser General Public
     * License for more details.
     * 
     * You should have received a copy of the GNU Lesser General Public License
     * along with the nettle library; see the file COPYING.LIB.  If not, write to
     * the Free Software Foundation, Inc., 59 Temple Place - Suite 330, Boston,
     * MA 02111-1307, USA.
     */
     
    #ifndef NETTLE_RSA_H_INCLUDED
    #define NETTLE_RSA_H_INCLUDED
    
    #include <inttypes.h>
    #include <gmp.h>
    
    #include "md5.h"
    #include "sha.h"
    
    struct rsa_public_key
    {
      /* Size of the modulo, in octets. This is also the size of all
       * signatures that are created or verified with this key. */
      unsigned size;
      
      /* Modulo */
      mpz_t n;
    
      /* Public exponent */
      mpz_t e;
    };
    
    struct rsa_private_key
    {
      unsigned size;
      
      /* The two factors */
      mpz_t p; mpz_t q;
    
      /* d % (p-1), i.e. a e = 1 (mod (p-1)) */
      mpz_t a;
    
      /* d % (q-1), i.e. b e = 1 (mod (q-1)) */
      mpz_t b;
    
      /* modular inverse of q , i.e. c q = 1 (mod p) */
      mpz_t c;
    };
    
    /* Signing a message works as follows:
     *
     * Store the private key in a rsa_private_key struct.
     *
     * Call rsa_prepare_private_key. This initializes the size attribute
     * to the length of a signature.
     *
     * Initialize a hashing context, by callling
     *   md5_init
     *
     * Hash the message by calling
     *   md5_update
     *
     * Create the signature by calling
     *   rsa_md5_sign
     *
     * The signature is represented as a mpz_t bignum. This call also
     * resets the hashing context.
     *
     * When done with the key and signature, don't forget to call
     * mpz_clear.
     */
    
    /* Calls mpz_init to initialize bignum storage. */
    void
    rsa_init_public_key(struct rsa_public_key *key);
    
    /* Calls mpz_clear to deallocate bignum storage. */
    void
    rsa_clear_public_key(struct rsa_public_key *key);
    
    int
    rsa_prepare_public_key(struct rsa_public_key *key);
    
    /* Calls mpz_init to initialize bignum storage. */
    void
    rsa_init_private_key(struct rsa_private_key *key);
    
    /* Calls mpz_clear to deallocate bignum storage. */
    void
    rsa_clear_private_key(struct rsa_private_key *key);
    
    int
    rsa_prepare_private_key(struct rsa_private_key *key);
    
    
    /* PKCS#1 style signatures */
    void
    rsa_md5_sign(struct rsa_private_key *key,
                 struct md5_ctx *hash,
                 mpz_t signature);
    
    
    int
    rsa_md5_verify(struct rsa_public_key *key,
                   struct md5_ctx *hash,
    	       const mpz_t signature);
    
    void
    rsa_sha1_sign(struct rsa_private_key *key,
                  struct sha1_ctx *hash,
                  mpz_t signature);
    
    int
    rsa_sha1_verify(struct rsa_public_key *key,
                    struct sha1_ctx *hash,
    		const mpz_t signature);
    
    /* Compute x, the d:th root of m. Calling it with x == m is allowed. */
    void
    rsa_compute_root(struct rsa_private_key *key, mpz_t x, const mpz_t m);
    
    #define RSA_SIGN(key, algorithm, ctx, length, data, signature) ( \
      algorithm##_update(ctx, length, data), \
      rsa_##algorithm##_sign(key, ctx, signature) \
    )
    
    #define RSA_VERIFY(key, algorithm, ctx, length, data, signature) ( \
      algorithm##_update(ctx, length, data), \
      rsa_##algorithm##_verify(key, ctx, signature) \
    )
    
    #endif /* NETTLE_RSA_H_INCLUDED */