Leaked source code of windows server 2003
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 
 
 

203 lines
4.6 KiB

#include <bignum.h>
#include "cryptdsa.h"
#include <crtdbg.h>
inline void WINAPI BN_ResetError(void)
{
SetMpErrno(MP_ERRNO_NO_ERROR);
}
inline DWORD WINAPI BN_MapError(BOOL fSts)
{
DWORD dwRet = ERROR_INTERNAL_ERROR;
if (MP_ERRNO_NO_MEMORY == GetMpErrno())
dwRet = ERROR_NOT_ENOUGH_MEMORY;
else if (fSts)
dwRet = ERROR_SUCCESS;
else
dwRet = (DWORD)NTE_FAIL;
return dwRet;
}
// extern digit_t Stdcall86 sub_same(digit_tc a[], digit_tc b[], digit_t c[], DWORDC d);
inline DWORD
BN_DSA_verify_j(
dsa_public_tc *pPubkey,
dsa_precomputed_tc *pPrecomputed)
{
BOOL fSts;
BN_ResetError();
fSts = DSA_verify_j(pPubkey, pPrecomputed);
return BN_MapError(fSts);
}
inline DWORD
BN_DSA_check_g(
DWORDC lngp_digits, // In
digit_tc *pGModular, // In
mp_modulus_t *pPModulo, // In
DWORDC lngq_digits, // In
digit_tc *pQDigit) // In
{
BOOL fSts;
BN_ResetError();
fSts = DSA_check_g(lngp_digits, pGModular, pPModulo, lngq_digits, pQDigit);
return BN_MapError(fSts);
}
inline DWORD
BN_DSA_parameter_verification(
dsa_public_tc *pPubkey,
dsa_precomputed_tc *pPrecomputed)
{
BOOL fSts;
BN_ResetError();
fSts = DSA_parameter_verification(pPubkey, pPrecomputed);
return BN_MapError(fSts);
}
inline DWORD
BN_DSA_precompute(
dsa_public_tc *pubkey, // In
dsa_precomputed_t *precomputed, // Out
const BOOL checkSC) // In
{
BOOL fSts;
BN_ResetError();
fSts = DSA_precompute(pubkey, precomputed, checkSC);
return BN_MapError(fSts);
}
inline DWORD
BN_from_modular(
digit_tc a[],
digit_t b[],
mp_modulus_tc *modulo)
{
DWORD dwSts;
BN_ResetError();
dwSts = from_modular(a, b, modulo);
if (ERROR_SUCCESS != BN_MapError(0 != dwSts))
dwSts = 0;
return dwSts;
}
inline DWORD
BN_mod_exp(
digit_tc base[],
digit_tc exponent[],
DWORDC lngexpon,
digit_t answer[],
mp_modulus_tc *modulo)
{
BN_ResetError();
mod_exp(base, exponent, lngexpon, answer, modulo);
return BN_MapError(TRUE);
}
inline DWORD
BN_to_modular(
digit_tc a[],
DWORDC lnga,
digit_t b[],
mp_modulus_tc *modulo)
{
DWORD dwSts;
BN_ResetError();
dwSts = to_modular(a, lnga, b, modulo);
if (ERROR_SUCCESS != BN_MapError(0 != dwSts))
dwSts = 0;
return dwSts;
}
inline DWORD
BN_DSA_gen_x_and_y(
BOOL fUseQ, // In
dsa_other_info *pOtherInfo, // In
dsa_private_t *privkey) // Out
{
BOOL fSts;
BN_ResetError();
fSts = DSA_gen_x_and_y(fUseQ, pOtherInfo, privkey);
return BN_MapError(fSts);
}
inline DWORD
BN_DSA_precompute_pgy(
dsa_public_tc *pubkey, // In
dsa_precomputed_t *precomputed) // Out
{
BOOL fSts;
BN_ResetError();
fSts = DSA_precompute_pgy(pubkey, precomputed);
return BN_MapError(fSts);
}
inline DWORD
BN_DSA_key_generation(
DWORDC nbitp, // In
DWORDC nbitq, // In
dsa_other_info *pOtherInfo, // In
dsa_private_t *privkey) // Out
{
BOOL fSts;
BN_ResetError();
fSts = DSA_key_generation(nbitp, nbitq, pOtherInfo, privkey);
return BN_MapError(fSts);
}
inline DWORD
BN_DSA_signature_verification(
DWORDC message_hash[SHA_DWORDS],
dsa_public_tc *pubkey,
dsa_precomputed_tc *precomputed_argument,
dsa_signature_tc *signature,
dsa_other_info *pOtherInfo)
{
BOOL fSts;
BN_ResetError();
fSts = DSA_signature_verification(message_hash, pubkey,
precomputed_argument,
signature, pOtherInfo);
return BN_MapError(fSts);
}
inline DWORD
BN_DSA_sign(
DWORDC message_hash[SHA_DWORDS], /* TBD */
dsa_private_tc *privkey,
dsa_signature_t *signature,
dsa_other_info *pOtherInfo)
{
BOOL fSts;
BN_ResetError();
fSts = DSA_sign(message_hash, privkey, signature, pOtherInfo);
return BN_MapError(fSts);
}
inline DWORD
BN_create_modulus(
digit_tc a[],
DWORDC lnga,
reddir_tc reddir,
mp_modulus_t *modulo)
{
BOOL fSts;
BN_ResetError();
fSts = create_modulus(a, lnga, reddir, modulo);
return BN_MapError(fSts);
}
inline DWORD
BN_DSA_key_import_fillin(
dsa_private_t *privkey)
{
BOOL fSts;
BN_ResetError();
fSts = DSA_key_import_fillin(privkey);
return BN_MapError(fSts);
}