#include "ecdsa.h"
#include "utils.h"
-// Set ECDSA keys
-
+// Get and set ECDSA keys
+//
bool ecdsa_set_base64_public_key(ecdsa_t *ecdsa, const char *p) {
*ecdsa = EC_KEY_new_by_curve_name(NID_secp521r1);
return true;
}
+char *ecdsa_get_base64_public_key(ecdsa_t *ecdsa) {
+ unsigned char *pubkey = NULL;
+ int len = i2o_ECPublicKey(*ecdsa, &pubkey);
+
+ char *base64 = malloc(len * 4 / 3 + 5);
+ b64encode(pubkey, base64, len);
+
+ free(pubkey);
+
+ return base64;
+}
+
// Read PEM ECDSA keys
bool ecdsa_read_pem_public_key(ecdsa_t *ecdsa, FILE *fp) {
return ECDSA_size(*ecdsa);
}
+// TODO: standardise output format?
+
bool ecdsa_sign(ecdsa_t *ecdsa, const void *in, size_t len, void *sig) {
- logger(LOG_ERR, "Unable to perform ECDSA signature: %s", ERR_error_string(ERR_get_error(), NULL));
- return false;
+ unsigned int siglen = ECDSA_size(*ecdsa);
+
+ char hash[SHA512_DIGEST_LENGTH];
+ SHA512(in, len, hash);
+
+ memset(sig, 0, siglen);
+
+ if(!ECDSA_sign(0, hash, sizeof hash, sig, &siglen, *ecdsa)) {
+ logger(LOG_DEBUG, "ECDSA_sign() failed: %s", ERR_error_string(ERR_get_error(), NULL));
+ return false;
+ }
+
+ if(siglen != ECDSA_size(*ecdsa)) {
+ logger(LOG_ERR, "Signature length %d != %d", siglen, ECDSA_size(*ecdsa));
+ }
+
+ return true;
}
bool ecdsa_verify(ecdsa_t *ecdsa, const void *in, size_t len, const void *sig) {
- logger(LOG_ERR, "Unable to perform ECDSA verification: %s", ERR_error_string(ERR_get_error(), NULL));
- return false;
+ unsigned int siglen = ECDSA_size(*ecdsa);
+
+ char hash[SHA512_DIGEST_LENGTH];
+ SHA512(in, len, hash);
+
+ if(!ECDSA_verify(0, hash, sizeof hash, sig, siglen, *ecdsa)) {
+ logger(LOG_DEBUG, "ECDSA_verify() failed: %s", ERR_error_string(ERR_get_error(), NULL));
+ return false;
+ }
+
+ return true;
+}
+
+bool ecdsa_active(ecdsa_t *ecdsa) {
+ return *ecdsa;
+}
+
+void ecdsa_free(ecdsa_t *ecdsa) {
+ if(*ecdsa) {
+ EC_KEY_free(*ecdsa);
+ *ecdsa = NULL;
+ }
}