exchange

Base system with REST service to issue digital coins, run by the payment service provider
Log | Files | Refs | Submodules | README | LICENSE

commit 52591a77f01fadfd748b01a4fd101e50bd473661
parent ae917eeee0a3100538cf71972a0cadcc80098d80
Author: Christian Grothoff <christian@grothoff.org>
Date:   Mon, 26 Jan 2015 12:22:56 +0100

intermediary commit, breaking the build by starting to move towards variable-size GNUnet signatures instead of fixed-size signatures; much broken now

Diffstat:
Msrc/lib/Makefile.am | 7+------
Msrc/util/test_rsa.c | 26+++++++++++++++++---------
2 files changed, 18 insertions(+), 15 deletions(-)

diff --git a/src/lib/Makefile.am b/src/lib/Makefile.am @@ -1,10 +1,9 @@ -AM_CPPFLAGS = -I$(top_srcdir)/src/include $(POSTGRESQL_CPPFLAGS) +AM_CPPFLAGS = -I$(top_srcdir)/src/include lib_LTLIBRARIES = \ libtalermint.la libtalermint_la_LDFLAGS = \ - $(POSTGRESQL_LDFLAGS) \ -version-info 0:0:0 \ -no-undefined @@ -16,10 +15,6 @@ libtalermint_la_LIBADD = \ -ljansson \ -lcurl -libtalermint_la_LDFLAGS = \ - -version-info 0:0:0 \ - -no-undefined - check_PROGRAMS = \ test_mint_api diff --git a/src/util/test_rsa.c b/src/util/test_rsa.c @@ -38,7 +38,7 @@ int main (int argc, char *argv[]) { -#define RND_BLK_SIZE 4096 +#define RND_BLK_SIZE 16524 unsigned char rnd_blk[RND_BLK_SIZE]; struct TALER_RSA_PrivateKey *priv; struct TALER_RSA_PrivateKeyBinaryEncoded *priv_enc; @@ -69,11 +69,13 @@ main (int argc, char *argv[]) ntohs (priv_enc->len)))); GNUNET_free (priv_enc); priv_enc = NULL; - EXITIF (GNUNET_OK != TALER_RSA_hash_verify (&hash, - &sig, - &pubkey)); - EXITIF (GNUNET_OK != TALER_RSA_verify (rnd_blk, - RND_BLK_SIZE, + EXITIF (GNUNET_OK != TALER_RSA_verify (&hash, sizeof (hash), + &sig, + &pubkey)); + /* corrupt our hash and see if the signature is still valid */ + GNUNET_CRYPTO_random_block (GNUNET_CRYPTO_QUALITY_WEAK, &hash, + sizeof (struct GNUNET_HashCode)); + EXITIF (GNUNET_OK == TALER_RSA_verify (&hash, sizeof (hash), &sig, &pubkey)); @@ -93,9 +95,15 @@ main (int argc, char *argv[]) EXITIF (GNUNET_OK != TALER_RSA_unblind (&sig, bkey, &pubkey)); - EXITIF (GNUNET_OK != TALER_RSA_hash_verify (&hash, - &sig, - &pubkey)); + EXITIF (GNUNET_OK != TALER_RSA_verify (&hash, sizeof (hash), + &sig, + &pubkey)); + /* corrupt our hash and see if the signature is still valid */ + GNUNET_CRYPTO_random_block (GNUNET_CRYPTO_QUALITY_WEAK, &hash, + sizeof (struct GNUNET_HashCode)); + EXITIF (GNUNET_OK == TALER_RSA_verify (&hash, sizeof (hash), + &sig, + &pubkey)); ret = 0; /* all OK */ EXITIF_exit: