Skip to content

Commit

Permalink
style: fix file indentation
Browse files Browse the repository at this point in the history
  • Loading branch information
matteo-cristino authored and jaromil committed Jul 22, 2024
1 parent 904f491 commit b0e4b0c
Show file tree
Hide file tree
Showing 2 changed files with 77 additions and 77 deletions.
86 changes: 43 additions & 43 deletions src/lua/zencode_rsa.lua
Original file line number Diff line number Diff line change
Expand Up @@ -21,65 +21,65 @@
local RSA = require'rsa'

local function rsa_public_key_f(obj)
local res = schema_get(obj, '.')
zencode_assert(
RSA.pubcheck(res),
'rsa public key length is not correct'
)
return res
end
local res = schema_get(obj, '.')
zencode_assert(
RSA.pubcheck(res),
'rsa public key length is not correct'
)
return res
end

local function rsa_signature_f(obj)
local res = schema_get(obj, '.')
zencode_assert(
RSA.signature_check(res),
'rsa signature length is not correct'
)
return res
end
local function rsa_signature_f(obj)
local res = schema_get(obj, '.')
zencode_assert(
RSA.signature_check(res),
'rsa signature length is not correct'
)
return res
end

ZEN:add_schema(
{
rsa_public_key = {import=rsa_public_key_f},
rsa_signature = {import=rsa_signature_f}
}
ZEN:add_schema(
{
rsa_public_key = {import=rsa_public_key_f},
rsa_signature = {import=rsa_signature_f}
}
)

When("create rsa key",function()
initkeyring'rsa'
ACK.keyring.rsa = RSA.keygen().private
initkeyring'rsa'
ACK.keyring.rsa = RSA.keygen().private
end)

-- generate the public key
When("create rsa public key",function()
empty'rsa public key'
local sk = havekey'rsa'
ACK.rsa_public_key = RSA.pubgen(sk)
new_codec('rsa public key')
empty'rsa public key'
local sk = havekey'rsa'
ACK.rsa_public_key = RSA.pubgen(sk)
new_codec('rsa public key')
end)

When("create rsa public key with secret key ''",function(sec)
local sk = have(sec)
empty'rsa public key'
ACK.rsa_public_key = RSA.pubgen(sk)
new_codec('rsa public key')
local sk = have(sec)
empty'rsa public key'
ACK.rsa_public_key = RSA.pubgen(sk)
new_codec('rsa public key')
end)

-- generate the sign for a msg and verify
When("create rsa signature of ''",function(doc)
local sk = havekey'rsa'
local obj = have(doc)
empty'rsa signature'
ACK.rsa_signature = RSA.sign(sk, zencode_serialize(obj))
new_codec('rsa signature')
local sk = havekey'rsa'
local obj = have(doc)
empty'rsa signature'
ACK.rsa_signature = RSA.sign(sk, zencode_serialize(obj))
new_codec('rsa signature')
end)

IfWhen("verify '' has a rsa signature in '' by ''",function(msg, sig, by)
local pk = load_pubkey_compat(by, 'rsa')
local m = have(msg)
local s = have(sig)
zencode_assert(
RSA.verify(pk, zencode_serialize(m), s),
'The rsa signature by '..by..' is not authentic'
)
end)
local pk = load_pubkey_compat(by, 'rsa')
local m = have(msg)
local s = have(sig)
zencode_assert(
RSA.verify(pk, zencode_serialize(m), s),
'The rsa signature by '..by..' is not authentic'
)
end)
68 changes: 34 additions & 34 deletions src/zen_rsa.c
Original file line number Diff line number Diff line change
Expand Up @@ -17,17 +17,17 @@
#define RSA_4096_PUBLIC_EXPONENT (int32_t) 65537

void RSA_sk_to_octet(lua_State *L, rsa_private_key_4096 *sk, octet *o) {
octet *x = o_alloc(L,RSA_4096_PRIVATE_KEY_BIG_BYTES);
FF_4096_toOctet(x, sk->p, RSA_4096_PRIVATE_KEY_BIG_SIZE);
OCT_copy(o, x);
FF_4096_toOctet(x, sk->q, RSA_4096_PRIVATE_KEY_BIG_SIZE);
OCT_joctet(o, x);
FF_4096_toOctet(x, sk->dp, RSA_4096_PRIVATE_KEY_BIG_SIZE);
OCT_joctet(o, x);
FF_4096_toOctet(x, sk->dq, RSA_4096_PRIVATE_KEY_BIG_SIZE);
OCT_joctet(o, x);
FF_4096_toOctet(x, sk->c, RSA_4096_PRIVATE_KEY_BIG_SIZE);
OCT_joctet(o, x);
octet *x = o_alloc(L,RSA_4096_PRIVATE_KEY_BIG_BYTES);
FF_4096_toOctet(x, sk->p, RSA_4096_PRIVATE_KEY_BIG_SIZE);
OCT_copy(o, x);
FF_4096_toOctet(x, sk->q, RSA_4096_PRIVATE_KEY_BIG_SIZE);
OCT_joctet(o, x);
FF_4096_toOctet(x, sk->dp, RSA_4096_PRIVATE_KEY_BIG_SIZE);
OCT_joctet(o, x);
FF_4096_toOctet(x, sk->dq, RSA_4096_PRIVATE_KEY_BIG_SIZE);
OCT_joctet(o, x);
FF_4096_toOctet(x, sk->c, RSA_4096_PRIVATE_KEY_BIG_SIZE);
OCT_joctet(o, x);
o_free(L, x);
}

Expand All @@ -43,9 +43,9 @@ void RSA_octet_to_pk(lua_State *L, octet *o, rsa_public_key_4096 *pk){
FF_4096_fromOctet(pk->n, x, FFLEN_4096);
OCT_shl(x, MODBYTES_512_29 * FFLEN_4096);
pk->e = ((uint32_t)x->val[3] & 0xFF) |
((uint32_t)x->val[2] << 8 & 0xFF00) |
((uint32_t)x->val[1] << 16 & 0xFF0000) |
((uint32_t)x->val[0] << 24 & 0xFF000000);
((uint32_t)x->val[2] << 8 & 0xFF00) |
((uint32_t)x->val[1] << 16 & 0xFF0000) |
((uint32_t)x->val[0] << 24 & 0xFF000000);
o_free(L,x);
}

Expand Down Expand Up @@ -180,7 +180,7 @@ static int rsa_pubgen(lua_State *L){

FF_4096_invmodp(e, (&sk)->dp, p, HFLEN_4096);
if (FF_4096_parity(e)==0) FF_4096_add(e,e,p,HFLEN_4096);
FF_4096_norm(e,HFLEN_4096);
FF_4096_norm(e,HFLEN_4096);

octet *e_octet =o_alloc(L, RFS_4096);
FF_4096_toOctet(e_octet,e, HFLEN_4096);
Expand Down Expand Up @@ -255,16 +255,16 @@ static int rsa_encrypt(lua_State *L) {
failed_msg = "failed to allocate space for the messsage text";
goto end;
}
/* convert octet of public key into struct rsa_public_key_4096 */
rsa_public_key_4096 pk;
RSA_octet_to_pk(L, octet_pk, &pk);
octet *padmsg = o_alloc(L, RFS_4096);
/* convert octet of public key into struct rsa_public_key_4096 */
rsa_public_key_4096 pk;
RSA_octet_to_pk(L, octet_pk, &pk);
octet *padmsg = o_alloc(L, RFS_4096);
Z(L);
csprng *RNG = Z-> random_generator;

OAEP_ENCODE(HASH_TYPE_RSA_4096, msg, RNG, NULL, padmsg);
octet *c = o_new(L, RFS_4096);
RSA_4096_ENCRYPT(&pk, padmsg, c);
OAEP_ENCODE(HASH_TYPE_RSA_4096, msg, RNG, NULL, padmsg);
octet *c = o_new(L, RFS_4096);
RSA_4096_ENCRYPT(&pk, padmsg, c);
end:
o_free(L, padmsg);
o_free(L, octet_pk);
Expand Down Expand Up @@ -295,11 +295,11 @@ static int rsa_decrypt(lua_State *L) {
goto end;
}

rsa_private_key_4096 sk;
rsa_private_key_4096 sk;
RSA_octet_to_sk(octet_sk, &sk);
octet *p = o_new(L, RFS_4096);
RSA_4096_DECRYPT(&sk, c, p);
OAEP_DECODE(HASH_TYPE_RSA_4096,NULL,p);
octet *p = o_new(L, RFS_4096);
RSA_4096_DECRYPT(&sk, c, p);
OAEP_DECODE(HASH_TYPE_RSA_4096,NULL,p);



Expand Down Expand Up @@ -334,12 +334,12 @@ static int rsa_sign(lua_State *L) {
}


rsa_private_key_4096 sk;
rsa_private_key_4096 sk;
RSA_octet_to_sk(octet_sk, &sk);
octet *p = o_alloc(L, RFS_4096);
octet *p = o_alloc(L, RFS_4096);
octet *sig = o_new(L,RFS_4096);
PKCS15(HASH_TYPE_RSA_4096,msg,p);
RSA_4096_DECRYPT(&sk, p, sig);
RSA_4096_DECRYPT(&sk, p, sig);

end:
RSA_4096_PRIVATE_KEY_KILL(&sk);
Expand Down Expand Up @@ -378,14 +378,14 @@ static int rsa_verify(lua_State *L) {
goto end;
}

rsa_public_key_4096 pk;
RSA_octet_to_pk(L, octet_pk, &pk);
rsa_public_key_4096 pk;
RSA_octet_to_pk(L, octet_pk, &pk);

octet* p = o_alloc(L, RFS_4096);
PKCS15(HASH_TYPE_RSA_4096,msg,p);

octet *c = o_alloc(L, RFS_4096);
RSA_4096_ENCRYPT(&pk, sig, c);
octet *c = o_alloc(L, RFS_4096);
RSA_4096_ENCRYPT(&pk, sig, c);

lua_pushboolean(L, OCT_comp(c,p));
end:
Expand Down Expand Up @@ -420,4 +420,4 @@ int luaopen_rsa(lua_State *L) {

zen_add_class(L, "rsa", rsa_class, rsa_methods);
return 1;
}
}

0 comments on commit b0e4b0c

Please sign in to comment.