#include "tomcrypt_private.h"
#ifdef LTC_MDSA
int
dsa_decrypt_key(
const
unsigned
char
*in, unsigned
long
inlen,
unsigned
char
*out, unsigned
long
*outlen,
const
dsa_key *key)
{
unsigned
char
*skey, *expt;
void
*g_pub;
unsigned
long
x, y;
unsigned
long
hashOID[32] = { 0 };
int
hash, err;
ltc_asn1_list decode[3];
LTC_ARGCHK(in != NULL);
LTC_ARGCHK(out != NULL);
LTC_ARGCHK(outlen != NULL);
LTC_ARGCHK(key != NULL);
if
(key->type != PK_PRIVATE) {
return
CRYPT_PK_NOT_PRIVATE;
}
LTC_SET_ASN1(decode, 0, LTC_ASN1_OBJECT_IDENTIFIER, hashOID,
sizeof
(hashOID)/
sizeof
(hashOID[0]));
err = der_decode_sequence(in, inlen, decode, 1);
if
(err != CRYPT_OK && err != CRYPT_INPUT_TOO_LONG) {
return
err;
}
hash = find_hash_oid(hashOID, decode[0].size);
if
(hash_is_valid(hash) != CRYPT_OK) {
return
CRYPT_INVALID_PACKET;
}
if
((err = mp_init(&g_pub)) != CRYPT_OK) {
return
err;
}
expt = XMALLOC(mp_unsigned_bin_size(key->p) + 1);
skey = XMALLOC(MAXBLOCKSIZE);
if
(expt == NULL || skey == NULL) {
if
(expt != NULL) {
XFREE(expt);
}
if
(skey != NULL) {
XFREE(skey);
}
mp_clear(g_pub);
return
CRYPT_MEM;
}
LTC_SET_ASN1(decode, 1, LTC_ASN1_INTEGER, g_pub, 1UL);
LTC_SET_ASN1(decode, 2, LTC_ASN1_OCTET_STRING, skey, MAXBLOCKSIZE);
if
((err = der_decode_sequence(in, inlen, decode, 3)) != CRYPT_OK) {
goto
LBL_ERR;
}
x = mp_unsigned_bin_size(key->p) + 1;
if
((err = dsa_shared_secret(key->x, g_pub, key, expt, &x)) != CRYPT_OK) {
goto
LBL_ERR;
}
y = mp_unsigned_bin_size(key->p) + 1;
y = MIN(y, MAXBLOCKSIZE);
if
((err = hash_memory(hash, expt, x, expt, &y)) != CRYPT_OK) {
goto
LBL_ERR;
}
if
(decode[2].size > y) {
err = CRYPT_INVALID_PACKET;
goto
LBL_ERR;
}
if
(*outlen < decode[2].size) {
*outlen = decode[2].size;
err = CRYPT_BUFFER_OVERFLOW;
goto
LBL_ERR;
}
for
(x = 0; x < decode[2].size; x++) {
out[x] = expt[x] ^ skey[x];
}
*outlen = x;
err = CRYPT_OK;
LBL_ERR:
#ifdef LTC_CLEAN_STACK
zeromem(expt, mp_unsigned_bin_size(key->p) + 1);
zeromem(skey, MAXBLOCKSIZE);
#endif
XFREE(expt);
XFREE(skey);
mp_clear(g_pub);
return
err;
}
#endif