/* LibTomCrypt, modular cryptographic library -- Tom St Denis */ /* SPDX-License-Identifier: Unlicense */ #include "tomcrypt_private.h" #if defined(LTC_MECC) && defined(LTC_SSH) /** @file ecc_verify_hash.c ECC Crypto, Tom St Denis */ /** Verify an ECC signature (RFC5656 / SSH format) @param sig The signature to verify @param siglen The length of the signature (octets) @param hash The hash (message digest) that was signed @param hashlen The length of the hash (octets) @param stat [out] Result of signature, 1==valid, 0==invalid @param key The corresponding public ECC key @return CRYPT_OK if successful (even if the signature is not valid) */ int ecc_verify_hash_rfc5656(const unsigned char *sig, unsigned long siglen, const unsigned char *hash, unsigned long hashlen, int *stat, const ecc_key *key) { void *r, *s; int err; char name[64], name2[64]; unsigned long namelen = sizeof(name); unsigned long name2len = sizeof(name2); unsigned long slen = siglen; LTC_ARGCHK(sig != NULL); LTC_ARGCHK(key != NULL); if ((err = ltc_mp_init_multi(&r, &s, LTC_NULL)) != CRYPT_OK) return err; /* Decode as SSH data sequence, per RFC4251 */ if ((err = ssh_decode_sequence_multi(sig, &slen, LTC_SSHDATA_STRING, name, &namelen, LTC_SSHDATA_MPINT, r, LTC_SSHDATA_MPINT, s, LTC_SSHDATA_EOL, LTC_NULL)) != CRYPT_OK) goto error; if (slen != siglen) { err = CRYPT_INVALID_PACKET; goto error; } /* Check curve matches identifier string */ if ((err = ecc_ssh_ecdsa_encode_name(name2, &name2len, key)) != CRYPT_OK) goto error; if (XSTRCMP(name,name2) != 0) { err = CRYPT_INVALID_ARG; goto error; } err = ecc_verify_hash_internal(r, s, hash, hashlen, stat, key); error: ltc_mp_deinit_multi(r, s, LTC_NULL); return err; } #endif