Mercurial > urweb
annotate src/c/mhash.c @ 1104:72670131dace
Basis.serialize; separate file for mhash; run transactional finishers in reverse order; set needs_sig properly
author | Adam Chlipala <adamc@hcoop.net> |
---|---|
date | Thu, 31 Dec 2009 11:41:57 -0500 |
parents | |
children | 6249df767d4c |
rev | line source |
---|---|
adamc@1104 | 1 #include <mhash.h> |
adamc@1104 | 2 |
adamc@1104 | 3 #define KEYSIZE 16 |
adamc@1104 | 4 #define PASSSIZE 4 |
adamc@1104 | 5 |
adamc@1104 | 6 #define HASH_ALGORITHM MHASH_SHA256 |
adamc@1104 | 7 #define HASH_BLOCKSIZE 32 |
adamc@1104 | 8 #define KEYGEN_ALGORITHM KEYGEN_MCRYPT |
adamc@1104 | 9 |
adamc@1104 | 10 int uw_hash_blocksize = HASH_BLOCKSIZE; |
adamc@1104 | 11 |
adamc@1104 | 12 static int password[PASSSIZE]; |
adamc@1104 | 13 static unsigned char private_key[KEYSIZE]; |
adamc@1104 | 14 |
adamc@1104 | 15 void uw_init_crypto() { |
adamc@1104 | 16 KEYGEN kg = {{HASH_ALGORITHM, HASH_ALGORITHM}}; |
adamc@1104 | 17 int i; |
adamc@1104 | 18 |
adamc@1104 | 19 assert(mhash_get_block_size(HASH_ALGORITHM) == HASH_BLOCKSIZE); |
adamc@1104 | 20 |
adamc@1104 | 21 for (i = 0; i < PASSSIZE; ++i) |
adamc@1104 | 22 password[i] = rand(); |
adamc@1104 | 23 |
adamc@1104 | 24 if (mhash_keygen_ext(KEYGEN_ALGORITHM, kg, |
adamc@1104 | 25 private_key, sizeof(private_key), |
adamc@1104 | 26 (unsigned char*)password, sizeof(password)) < 0) { |
adamc@1104 | 27 fprintf(stderr, "Key generation failed\n"); |
adamc@1104 | 28 exit(1); |
adamc@1104 | 29 } |
adamc@1104 | 30 } |
adamc@1104 | 31 |
adamc@1104 | 32 void uw_sign(const char *in, char *out) { |
adamc@1104 | 33 MHASH td; |
adamc@1104 | 34 |
adamc@1104 | 35 td = mhash_hmac_init(HASH_ALGORITHM, private_key, sizeof(private_key), |
adamc@1104 | 36 mhash_get_hash_pblock(HASH_ALGORITHM)); |
adamc@1104 | 37 |
adamc@1104 | 38 mhash(td, in, strlen(in)); |
adamc@1104 | 39 if (mhash_hmac_deinit(td, out) < 0) |
adamc@1104 | 40 fprintf(stderr, "Signing failed\n"); |
adamc@1104 | 41 } |