-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathsignature.c
74 lines (62 loc) · 1.73 KB
/
signature.c
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
/* --*- c -*--
* Copyright (C) 2012 Enrico Scholz <[email protected]>
*
* This program is free software; you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation; version 3 of the License.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program. If not, see <http://www.gnu.org/licenses/>.
*/
#ifdef HAVE_CONFIG_H
# include <config.h>
#endif
#include "signature.h"
#include <unistd.h>
#include <string.h>
#include <stdio.h>
#include <errno.h>
bool _signature_pipein(struct signature_algorithm *alg, int fd, size_t len)
{
while (len > 0) {
unsigned char buf[64 * 1024];
size_t tlen = len > sizeof buf ? sizeof buf : len;
ssize_t l = read(fd, buf, tlen);
if (l > 0) {
len -= l;
} else if (l == 0) {
fprintf(stderr, "failed to read piped sig data\n");
break;
} else if (errno == EINTR) {
continue;
} else {
perror("read(<signature-pipe>)");
break;
}
alg->update(alg, buf, tlen);
}
return len == 0;
}
bool _signature_verify(struct signature_algorithm *alg, void const *sig,
size_t len)
{
void const *exp;
size_t exp_len;
if (!alg->finish(alg, &exp, &exp_len))
return false;
if (len != exp_len) {
fprintf(stderr, "unexpected sig len (%zu vs. %zu)\n",
len, exp_len);
return false;
}
if (memcmp(sig, exp, len) != 0) {
fprintf(stderr, "signature mismatch\n");
return false;
}
return true;
}