chiark / gitweb /
*.c: Split the constant definitions into the various submodules.
[catacomb-python] / pubkey.c
1 /* -*-c-*-
2  *
3  * Public-key cryptography
4  *
5  * (c) 2004 Straylight/Edgeware
6  */
7
8 /*----- Licensing notice --------------------------------------------------*
9  *
10  * This file is part of the Python interface to Catacomb.
11  *
12  * Catacomb/Python is free software; you can redistribute it and/or modify
13  * it under the terms of the GNU General Public License as published by
14  * the Free Software Foundation; either version 2 of the License, or
15  * (at your option) any later version.
16  *
17  * Catacomb/Python is distributed in the hope that it will be useful,
18  * but WITHOUT ANY WARRANTY; without even the implied warranty of
19  * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
20  * GNU General Public License for more details.
21  *
22  * You should have received a copy of the GNU General Public License
23  * along with Catacomb/Python; if not, write to the Free Software Foundation,
24  * Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
25  */
26
27 /*----- Header files ------------------------------------------------------*/
28
29 #include "catacomb-python.h"
30
31 /*----- DSA and similar ---------------------------------------------------*/
32
33 typedef struct dsa_pyobj {
34   PyObject_HEAD
35   PyObject *G, *u, *p, *rng, *hash;
36   gdsa d;
37 } dsa_pyobj;
38
39 static PyTypeObject *dsapub_pytype, *dsapriv_pytype;
40 static PyTypeObject *kcdsapub_pytype, *kcdsapriv_pytype;
41 #define DSA_D(o) (&((dsa_pyobj *)(o))->d)
42 #define DSA_G(o) (((dsa_pyobj *)(o))->G)
43 #define DSA_U(o) (((dsa_pyobj *)(o))->u)
44 #define DSA_P(o) (((dsa_pyobj *)(o))->p)
45 #define DSA_RNG(o) (((dsa_pyobj *)(o))->rng)
46 #define DSA_HASH(o) (((dsa_pyobj *)(o))->hash)
47
48 static void dsa_pydealloc(PyObject *me)
49 {
50   dsa_pyobj *g = (dsa_pyobj *)me;
51   Py_DECREF(g->G); Py_DECREF(g->u); Py_DECREF(g->p);
52   Py_DECREF(g->rng); Py_DECREF(g->hash);
53   FREEOBJ(me);
54 }
55
56 static PyObject *dsa_setup(PyTypeObject *ty, PyObject *G, PyObject *u,
57                            PyObject *p, PyObject *rng, PyObject *hash,
58                            void (*calcpub)(group *, ge *, mp *))
59 {
60   dsa_pyobj *g;
61   ge *pp;
62
63   g = PyObject_New(dsa_pyobj, ty);
64   if (p) Py_INCREF(p);
65   if (!u) {
66     g->d.u = 0;
67     u = Py_None;
68   } else {
69     if ((g->d.u = getmp(u)) == 0)
70       goto end;
71     if (MP_PYCHECK(u)) Py_INCREF(u);
72     else u = mp_pywrap(g->d.u);
73   }
74   if (!p) {
75     assert(g->d.u); assert(calcpub);
76     pp = G_CREATE(GROUP_G(G));
77     calcpub(GROUP_G(G), pp, g->d.u);
78     p = ge_pywrap(G, pp);
79   } else if (GROUP_G(G) != GE_G(p) && !group_samep(GROUP_G(G), GE_G(p)))
80     TYERR("public key not from group");
81   g->d.g = GROUP_G(G);
82   g->d.p = GE_X(p);
83   g->d.r = GRAND_R(rng);
84   g->d.h = GCHASH_CH(hash);
85   g->G = G; Py_INCREF(G); g->u = u; g->p = p;
86   g->rng = rng; Py_INCREF(rng); g->hash = hash; Py_INCREF(hash);
87   return ((PyObject *)g);
88 end:
89   Py_XDECREF(p); FREEOBJ(g);
90   return (0);
91 }
92
93 static PyObject *dsapub_pynew(PyTypeObject *ty,
94                               PyObject *arg, PyObject *kw)
95 {
96   PyObject *G, *p, *rng = rand_pyobj, *hash = sha_pyobj;
97   PyObject *rc = 0;
98   static const char *const kwlist[] = { "G", "p", "hash", "rng", 0 };
99
100   if (!PyArg_ParseTupleAndKeywords(arg, kw, "O!O!|O!O!:new", KWLIST,
101                                    group_pytype, &G,
102                                    ge_pytype, &p,
103                                    gchash_pytype, &hash,
104                                    grand_pytype, &rng) ||
105       (rc = dsa_setup(dsapub_pytype, G, 0, p, rng, hash, 0)) == 0)
106     goto end;
107 end:
108   return (rc);
109 }
110
111 static PyObject *dsameth_beginhash(PyObject *me)
112   { return (ghash_pywrap(DSA_HASH(me), gdsa_beginhash(DSA_D(me)))); }
113
114 static PyObject *dsameth_endhash(PyObject *me, PyObject *arg)
115 {
116   ghash *h;
117   PyObject *rc;
118   if (!PyArg_ParseTuple(arg, "O&:endhash", convghash, &h)) return (0);
119   gdsa_endhash(DSA_D(me), h);
120   h = GH_COPY(h);
121   rc = bytestring_pywrap(0, GH_CLASS(h)->hashsz);
122   GH_DONE(h, PyString_AS_STRING(rc));
123   GH_DESTROY(h);
124   return (rc);
125 }
126
127 static PyObject *dsameth_sign(PyObject *me, PyObject *arg, PyObject *kw)
128 {
129   gdsa_sig s = GDSA_SIG_INIT;
130   char *p;
131   Py_ssize_t n;
132   mp *k = 0;
133   PyObject *rc = 0;
134   static const char *const kwlist[] = { "msg", "k", 0 };
135
136   if (!PyArg_ParseTupleAndKeywords(arg, kw, "s#|O&:sign", KWLIST,
137                                    &p, &n, convmp, &k))
138     goto end;
139   if (n != DSA_D(me)->h->hashsz)
140     VALERR("bad message length (doesn't match hash size)");
141   gdsa_sign(DSA_D(me), &s, p, k);
142   rc = Py_BuildValue("(NN)", mp_pywrap(s.r), mp_pywrap(s.s));
143 end:
144   mp_drop(k);
145   return (rc);
146 }
147
148 static PyObject *dsameth_verify(PyObject *me, PyObject *arg)
149 {
150   char *p;
151   Py_ssize_t n;
152   gdsa_sig s = GDSA_SIG_INIT;
153   PyObject *rc = 0;
154
155   if (!PyArg_ParseTuple(arg, "s#(O&O&):verify",
156                         &p, &n, convmp, &s.r, convmp, &s.s))
157     goto end;
158   if (n != DSA_D(me)->h->hashsz)
159     VALERR("bad message length (doesn't match hash size)");
160   rc = getbool(!gdsa_verify(DSA_D(me), &s, p));
161 end:
162   mp_drop(s.r);
163   mp_drop(s.s);
164   return (rc);
165 }
166
167 static void dsa_calcpub(group *g, ge *p, mp *u) { G_EXP(g, p, g->g, u); }
168
169 static PyObject *dsapriv_pynew(PyTypeObject *ty,
170                                PyObject *arg, PyObject *kw)
171 {
172   PyObject *G, *p = 0, *u, *rng = rand_pyobj, *hash = sha_pyobj;
173   PyObject *rc = 0;
174   static const char *const kwlist[] = { "G", "u", "p", "hash", "rng", 0 };
175
176   if (!PyArg_ParseTupleAndKeywords(arg, kw, "O!O|O!O!O!:new", KWLIST,
177                                    group_pytype, &G,
178                                    &u,
179                                    ge_pytype, &p,
180                                    gchash_pytype, &hash,
181                                    grand_pytype, &rng) ||
182       (rc = dsa_setup(dsapriv_pytype, G, u, p, rng, hash, dsa_calcpub)) == 0)
183     goto end;
184 end:
185   return (rc);
186 }
187
188 static const PyMethodDef dsapub_pymethods[] = {
189 #define METHNAME(name) dsameth_##name
190   NAMETH(beginhash,     "D.beginhash() -> hash object")
191   METH  (endhash,       "D.endhash(H) -> BYTES")
192   METH  (verify,        "D.verify(MSG, (R, S)) -> true/false")
193 #undef METHNAME
194   { 0 }
195 };
196
197 static const PyMethodDef dsapriv_pymethods[] = {
198 #define METHNAME(name) dsameth_##name
199   KWMETH(sign,          "D.sign(MSG, [k = K]) -> R, S")
200 #undef METHNAME
201   { 0 }
202 };
203
204 static const PyMemberDef dsapub_pymembers[] = {
205 #define MEMBERSTRUCT dsa_pyobj
206   MEMBER(G,     T_OBJECT, READONLY, "D.G -> group to work in")
207   MEMBER(p,     T_OBJECT, READONLY, "D.p -> public key (group element")
208   MEMBER(rng,   T_OBJECT, READONLY, "D.rng -> random number generator")
209   MEMBER(hash,  T_OBJECT, READONLY, "D.hash -> hash class")
210 #undef MEMBERSTRUCT
211   { 0 }
212 };
213
214 static const PyMemberDef dsapriv_pymembers[] = {
215 #define MEMBERSTRUCT dsa_pyobj
216   MEMBER(u,     T_OBJECT, READONLY, "D.u -> private key (exponent)")
217 #undef MEMBERSTRUCT
218   { 0 }
219 };
220
221 static const PyTypeObject dsapub_pytype_skel = {
222   PyObject_HEAD_INIT(0) 0,              /* Header */
223   "DSAPub",                             /* @tp_name@ */
224   sizeof(dsa_pyobj),                    /* @tp_basicsize@ */
225   0,                                    /* @tp_itemsize@ */
226
227   dsa_pydealloc,                        /* @tp_dealloc@ */
228   0,                                    /* @tp_print@ */
229   0,                                    /* @tp_getattr@ */
230   0,                                    /* @tp_setattr@ */
231   0,                                    /* @tp_compare@ */
232   0,                                    /* @tp_repr@ */
233   0,                                    /* @tp_as_number@ */
234   0,                                    /* @tp_as_sequence@ */
235   0,                                    /* @tp_as_mapping@ */
236   0,                                    /* @tp_hash@ */
237   0,                                    /* @tp_call@ */
238   0,                                    /* @tp_str@ */
239   0,                                    /* @tp_getattro@ */
240   0,                                    /* @tp_setattro@ */
241   0,                                    /* @tp_as_buffer@ */
242   Py_TPFLAGS_DEFAULT |                  /* @tp_flags@ */
243     Py_TPFLAGS_BASETYPE,
244
245   /* @tp_doc@ */
246   "DSAPub(GROUP, P, [hash = sha], [rng = rand]): DSA public key.",
247
248   0,                                    /* @tp_traverse@ */
249   0,                                    /* @tp_clear@ */
250   0,                                    /* @tp_richcompare@ */
251   0,                                    /* @tp_weaklistoffset@ */
252   0,                                    /* @tp_iter@ */
253   0,                                    /* @tp_iternext@ */
254   PYMETHODS(dsapub),                    /* @tp_methods@ */
255   PYMEMBERS(dsapub),                    /* @tp_members@ */
256   0,                                    /* @tp_getset@ */
257   0,                                    /* @tp_base@ */
258   0,                                    /* @tp_dict@ */
259   0,                                    /* @tp_descr_get@ */
260   0,                                    /* @tp_descr_set@ */
261   0,                                    /* @tp_dictoffset@ */
262   0,                                    /* @tp_init@ */
263   PyType_GenericAlloc,                  /* @tp_alloc@ */
264   dsapub_pynew,                         /* @tp_new@ */
265   0,                                    /* @tp_free@ */
266   0                                     /* @tp_is_gc@ */
267 };
268
269 static const PyTypeObject dsapriv_pytype_skel = {
270   PyObject_HEAD_INIT(0) 0,              /* Header */
271   "DSAPriv",                            /* @tp_name@ */
272   sizeof(dsa_pyobj),                    /* @tp_basicsize@ */
273   0,                                    /* @tp_itemsize@ */
274
275   0,                                    /* @tp_dealloc@ */
276   0,                                    /* @tp_print@ */
277   0,                                    /* @tp_getattr@ */
278   0,                                    /* @tp_setattr@ */
279   0,                                    /* @tp_compare@ */
280   0,                                    /* @tp_repr@ */
281   0,                                    /* @tp_as_number@ */
282   0,                                    /* @tp_as_sequence@ */
283   0,                                    /* @tp_as_mapping@ */
284   0,                                    /* @tp_hash@ */
285   0,                                    /* @tp_call@ */
286   0,                                    /* @tp_str@ */
287   0,                                    /* @tp_getattro@ */
288   0,                                    /* @tp_setattro@ */
289   0,                                    /* @tp_as_buffer@ */
290   Py_TPFLAGS_DEFAULT |                  /* @tp_flags@ */
291     Py_TPFLAGS_BASETYPE,
292
293   /* @tp_doc@ */
294   "DSAPriv(GROUP, U, [p = u G], [hash = sha], [rng = rand]): "
295                                                           "DSA private key.",
296
297   0,                                    /* @tp_traverse@ */
298   0,                                    /* @tp_clear@ */
299   0,                                    /* @tp_richcompare@ */
300   0,                                    /* @tp_weaklistoffset@ */
301   0,                                    /* @tp_iter@ */
302   0,                                    /* @tp_iternext@ */
303   PYMETHODS(dsapriv),                   /* @tp_methods@ */
304   PYMEMBERS(dsapriv),                   /* @tp_members@ */
305   0,                                    /* @tp_getset@ */
306   0,                                    /* @tp_base@ */
307   0,                                    /* @tp_dict@ */
308   0,                                    /* @tp_descr_get@ */
309   0,                                    /* @tp_descr_set@ */
310   0,                                    /* @tp_dictoffset@ */
311   0,                                    /* @tp_init@ */
312   PyType_GenericAlloc,                  /* @tp_alloc@ */
313   dsapriv_pynew,                        /* @tp_new@ */
314   0,                                    /* @tp_free@ */
315   0                                     /* @tp_is_gc@ */
316 };
317
318 static PyObject *kcdsapub_pynew(PyTypeObject *ty,
319                                 PyObject *arg, PyObject *kw)
320 {
321   PyObject *G, *p, *rng = rand_pyobj, *hash = has160_pyobj;
322   PyObject *rc = 0;
323   static const char *const kwlist[] = { "G", "p", "hash", "rng", 0 };
324
325   if (!PyArg_ParseTupleAndKeywords(arg, kw, "O!O!|O!O!:new", KWLIST,
326                                    group_pytype, &G,
327                                    ge_pytype, &p,
328                                    gchash_pytype, &hash,
329                                    grand_pytype, &rng) ||
330       (rc = dsa_setup(kcdsapub_pytype, G, 0, p, rng, hash, 0)) == 0)
331     goto end;
332 end:
333   return (rc);
334 }
335
336 static void kcdsa_calcpub(group *g, ge *p, mp *u)
337 {
338   mp *uinv = mp_modinv(MP_NEW, u, g->r);
339   G_EXP(g, p, g->g, uinv);
340   mp_drop(uinv);
341 }
342
343 static PyObject *kcdsapriv_pynew(PyTypeObject *ty,
344                                  PyObject *arg, PyObject *kw)
345 {
346   PyObject *G, *u, *p = 0, *rng = rand_pyobj, *hash = has160_pyobj;
347   PyObject *rc = 0;
348   static const char *const kwlist[] = { "G", "u", "p", "hash", "rng", 0 };
349
350   if (!PyArg_ParseTupleAndKeywords(arg, kw, "O!O|O!O!O!:new", KWLIST,
351                                    group_pytype, &G,
352                                    &u,
353                                    ge_pytype, &p,
354                                    gchash_pytype, &hash,
355                                    grand_pytype, &rng) ||
356       (rc = dsa_setup(kcdsapriv_pytype, G, u, p,
357                       rng, hash, kcdsa_calcpub)) == 0)
358     goto end;
359 end:
360   return (rc);
361 }
362
363 static PyObject *kcdsameth_beginhash(PyObject *me)
364   { return (ghash_pywrap(DSA_HASH(me), gkcdsa_beginhash(DSA_D(me)))); }
365
366 static PyObject *kcdsameth_endhash(PyObject *me, PyObject *arg)
367 {
368   ghash *h;
369   PyObject *rc;
370   if (!PyArg_ParseTuple(arg, "O&:endhash", convghash, &h)) return (0);
371   gkcdsa_endhash(DSA_D(me), h);
372   h = GH_COPY(h);
373   rc = bytestring_pywrap(0, GH_CLASS(h)->hashsz);
374   GH_DONE(h, PyString_AS_STRING(rc));
375   GH_DESTROY(h);
376   return (rc);
377 }
378
379 static PyObject *kcdsameth_sign(PyObject *me, PyObject *arg, PyObject *kw)
380 {
381   gkcdsa_sig s = GKCDSA_SIG_INIT;
382   char *p;
383   Py_ssize_t n;
384   mp *k = 0;
385   PyObject *r = 0, *rc = 0;
386   static const char *const kwlist[] = { "msg", "k", 0 };
387
388   if (!PyArg_ParseTupleAndKeywords(arg, kw, "s#|O&:sign", KWLIST,
389                                    &p, &n, convmp, &k))
390     goto end;
391   if (n != DSA_D(me)->h->hashsz)
392     VALERR("bad message length (doesn't match hash size)");
393   r = bytestring_pywrap(0, DSA_D(me)->h->hashsz);
394   s.r = (octet *)PyString_AS_STRING(r);
395   gkcdsa_sign(DSA_D(me), &s, p, k);
396   rc = Py_BuildValue("(ON)", r, mp_pywrap(s.s));
397 end:
398   Py_XDECREF(r);
399   mp_drop(k);
400   return (rc);
401 }
402
403 static PyObject *kcdsameth_verify(PyObject *me, PyObject *arg)
404 {
405   char *p;
406   Py_ssize_t n, rn;
407   gkcdsa_sig s = GKCDSA_SIG_INIT;
408   PyObject *rc = 0;
409
410   if (!PyArg_ParseTuple(arg, "s#(s#O&):verify",
411                         &p, &n, &s.r, &rn, convmp, &s.s))
412     goto end;
413   if (n != DSA_D(me)->h->hashsz)
414     VALERR("bad message length (doesn't match hash size)");
415   if (rn != DSA_D(me)->h->hashsz)
416     VALERR("bad signature `r' length (doesn't match hash size)");
417   rc = getbool(!gkcdsa_verify(DSA_D(me), &s, p));
418 end:
419   mp_drop(s.s);
420   return (rc);
421 }
422
423 static const PyMethodDef kcdsapub_pymethods[] = {
424 #define METHNAME(name) kcdsameth_##name
425   NAMETH(beginhash,     "D.beginhash() -> hash object")
426   METH  (endhash,       "D.endhash(H) -> BYTES")
427   METH  (verify,        "D.verify(MSG, (R, S)) -> true/false")
428 #undef METHNAME
429   { 0 }
430 };
431
432 static const PyMethodDef kcdsapriv_pymethods[] = {
433 #define METHNAME(name) kcdsameth_##name
434   KWMETH(sign,          "D.sign(MSG, [k = K]) -> R, S")
435 #undef METHNAME
436   { 0 }
437 };
438
439 static const PyTypeObject kcdsapub_pytype_skel = {
440   PyObject_HEAD_INIT(0) 0,              /* Header */
441   "KCDSAPub",                           /* @tp_name@ */
442   sizeof(dsa_pyobj),                    /* @tp_basicsize@ */
443   0,                                    /* @tp_itemsize@ */
444
445   dsa_pydealloc,                        /* @tp_dealloc@ */
446   0,                                    /* @tp_print@ */
447   0,                                    /* @tp_getattr@ */
448   0,                                    /* @tp_setattr@ */
449   0,                                    /* @tp_compare@ */
450   0,                                    /* @tp_repr@ */
451   0,                                    /* @tp_as_number@ */
452   0,                                    /* @tp_as_sequence@ */
453   0,                                    /* @tp_as_mapping@ */
454   0,                                    /* @tp_hash@ */
455   0,                                    /* @tp_call@ */
456   0,                                    /* @tp_str@ */
457   0,                                    /* @tp_getattro@ */
458   0,                                    /* @tp_setattro@ */
459   0,                                    /* @tp_as_buffer@ */
460   Py_TPFLAGS_DEFAULT |                  /* @tp_flags@ */
461     Py_TPFLAGS_BASETYPE,
462
463   /* @tp_doc@ */
464   "KCDSAPub(GROUP, P, [hash = sha], [rng = rand]): KCDSA public key.",
465
466   0,                                    /* @tp_traverse@ */
467   0,                                    /* @tp_clear@ */
468   0,                                    /* @tp_richcompare@ */
469   0,                                    /* @tp_weaklistoffset@ */
470   0,                                    /* @tp_iter@ */
471   0,                                    /* @tp_iternext@ */
472   PYMETHODS(kcdsapub),                  /* @tp_methods@ */
473   PYMEMBERS(dsapub),                    /* @tp_members@ */
474   0,                                    /* @tp_getset@ */
475   0,                                    /* @tp_base@ */
476   0,                                    /* @tp_dict@ */
477   0,                                    /* @tp_descr_get@ */
478   0,                                    /* @tp_descr_set@ */
479   0,                                    /* @tp_dictoffset@ */
480   0,                                    /* @tp_init@ */
481   PyType_GenericAlloc,                  /* @tp_alloc@ */
482   kcdsapub_pynew,                       /* @tp_new@ */
483   0,                                    /* @tp_free@ */
484   0                                     /* @tp_is_gc@ */
485 };
486
487 static const PyTypeObject kcdsapriv_pytype_skel = {
488   PyObject_HEAD_INIT(0) 0,              /* Header */
489   "KCDSAPriv",                          /* @tp_name@ */
490   sizeof(dsa_pyobj),                    /* @tp_basicsize@ */
491   0,                                    /* @tp_itemsize@ */
492
493   0,                                    /* @tp_dealloc@ */
494   0,                                    /* @tp_print@ */
495   0,                                    /* @tp_getattr@ */
496   0,                                    /* @tp_setattr@ */
497   0,                                    /* @tp_compare@ */
498   0,                                    /* @tp_repr@ */
499   0,                                    /* @tp_as_number@ */
500   0,                                    /* @tp_as_sequence@ */
501   0,                                    /* @tp_as_mapping@ */
502   0,                                    /* @tp_hash@ */
503   0,                                    /* @tp_call@ */
504   0,                                    /* @tp_str@ */
505   0,                                    /* @tp_getattro@ */
506   0,                                    /* @tp_setattro@ */
507   0,                                    /* @tp_as_buffer@ */
508   Py_TPFLAGS_DEFAULT |                  /* @tp_flags@ */
509     Py_TPFLAGS_BASETYPE,
510
511   /* @tp_doc@ */
512   "KCDSAPriv(GROUP, U, [p = u G], [hash = sha], [rng = rand]): "
513                                                         "KCDSA private key.",
514
515   0,                                    /* @tp_traverse@ */
516   0,                                    /* @tp_clear@ */
517   0,                                    /* @tp_richcompare@ */
518   0,                                    /* @tp_weaklistoffset@ */
519   0,                                    /* @tp_iter@ */
520   0,                                    /* @tp_iternext@ */
521   PYMETHODS(kcdsapriv),                 /* @tp_methods@ */
522   PYMEMBERS(dsapriv),                   /* @tp_members@ */
523   0,                                    /* @tp_getset@ */
524   0,                                    /* @tp_base@ */
525   0,                                    /* @tp_dict@ */
526   0,                                    /* @tp_descr_get@ */
527   0,                                    /* @tp_descr_set@ */
528   0,                                    /* @tp_dictoffset@ */
529   0,                                    /* @tp_init@ */
530   PyType_GenericAlloc,                  /* @tp_alloc@ */
531   kcdsapriv_pynew,                      /* @tp_new@ */
532   0,                                    /* @tp_free@ */
533   0                                     /* @tp_is_gc@ */
534 };
535
536 /*----- RSA ---------------------------------------------------------------*/
537
538 typedef struct rsapub_pyobj {
539   PyObject_HEAD
540   rsa_pub pub;
541   rsa_pubctx pubctx;
542 } rsapub_pyobj;
543
544 #define RSA_PUB(o) (&((rsapub_pyobj *)(o))->pub)
545 #define RSA_PUBCTX(o) (&((rsapub_pyobj *)(o))->pubctx)
546
547 typedef struct rsapriv_pyobj {
548   PyObject_HEAD
549   rsa_pub pub;
550   rsa_pubctx pubctx;
551   rsa_priv priv;
552   rsa_privctx privctx;
553   PyObject *rng;
554 } rsapriv_pyobj;
555
556 #define RSA_PRIV(o) (&((rsapriv_pyobj *)(o))->priv)
557 #define RSA_PRIVCTX(o) (&((rsapriv_pyobj *)(o))->privctx)
558 #define RSA_RNG(o) (((rsapriv_pyobj *)(o))->rng)
559
560 static PyTypeObject *rsapub_pytype, *rsapriv_pytype;
561
562 static PyObject *rsapub_pynew(PyTypeObject *ty,
563                               PyObject *arg, PyObject *kw)
564 {
565   rsa_pub rp = { 0 };
566   rsapub_pyobj *o;
567   static const char *const kwlist[] = { "n", "e", 0 };
568
569   if (!PyArg_ParseTupleAndKeywords(arg, kw, "O&O&:new", KWLIST,
570                                    convmp, &rp.n, convmp, &rp.e))
571     goto end;
572   if (!MP_ODDP(rp.n)) VALERR("RSA modulus must be even");
573   o = (rsapub_pyobj *)ty->tp_alloc(ty, 0);
574   o->pub = rp;
575   rsa_pubcreate(&o->pubctx, &o->pub);
576   return ((PyObject *)o);
577 end:
578   rsa_pubfree(&rp);
579   return (0);
580 }
581
582 static void rsapub_pydealloc(PyObject *me)
583 {
584   rsa_pubdestroy(RSA_PUBCTX(me));
585   rsa_pubfree(RSA_PUB(me));
586   FREEOBJ(me);
587 }
588
589 static PyObject *rsaget_n(PyObject *me, void *hunoz)
590   { return mp_pywrap(MP_COPY(RSA_PUB(me)->n)); }
591
592 static PyObject *rsaget_e(PyObject *me, void *hunoz)
593   { return mp_pywrap(MP_COPY(RSA_PUB(me)->e)); }
594
595 static PyObject *rsameth_pubop(PyObject *me, PyObject *arg)
596 {
597   mp *x = 0;
598   PyObject *rc = 0;
599
600   if (!PyArg_ParseTuple(arg, "O&:pubop", convmp, &x)) goto end;
601   rc = mp_pywrap(rsa_pubop(RSA_PUBCTX(me), MP_NEW, x));
602 end:
603   mp_drop(x);
604   return (rc);
605 }
606
607 static PyObject *rsapriv_dopywrap(PyTypeObject *ty,
608                                   rsa_priv *rp, PyObject *rng)
609 {
610   rsapriv_pyobj *o;
611
612   o = (rsapriv_pyobj *)ty->tp_alloc(ty, 0);
613   o->priv = *rp;
614   o->pub.n = rp->n;
615   o->pub.e = rp->e;
616   rsa_privcreate(&o->privctx, &o->priv, &rand_global);
617   rsa_pubcreate(&o->pubctx, &o->pub);
618   if (!rng) {
619     rng = Py_None;
620     Py_INCREF(rng);
621   }
622   o->rng = rng;
623   return ((PyObject *)o);
624 }
625
626 PyObject *rsapriv_pywrap(rsa_priv *rp)
627   { return rsapriv_dopywrap(rsapriv_pytype, rp, 0); }
628
629 static PyObject *rsapriv_pynew(PyTypeObject *ty,
630                                PyObject *arg, PyObject *kw)
631 {
632   rsa_priv rp = { 0 };
633   PyObject *rng = Py_None;
634   static const char *const kwlist[] =
635     { "n", "e", "d", "p", "q", "dp", "dq", "q_inv", "rng", 0 };
636
637   if (!PyArg_ParseTupleAndKeywords(arg, kw, "|O&O&O&O&O&O&O&O&O:new", KWLIST,
638                                    convmp, &rp.n, convmp, &rp.e,
639                                    convmp, &rp.d,
640                                    convmp, &rp.p, convmp, &rp.q,
641                                    convmp, &rp.dp, convmp, &rp.dq,
642                                    convmp, &rp.q_inv,
643                                    &rng))
644     goto end;
645   if ((rp.n && !MP_ODDP(rp.n)) ||
646       (rp.p && !MP_ODDP(rp.p)) ||
647       (rp.q && !MP_ODDP(rp.q)))
648     VALERR("RSA modulus and factors must be odd");
649   if (rsa_recover(&rp)) VALERR("couldn't construct private key");
650   if (rng != Py_None && !GRAND_PYCHECK(rng))
651     TYERR("not a random number source");
652   Py_INCREF(rng);
653   return (rsapriv_dopywrap(ty, &rp, rng));
654 end:
655   rsa_privfree(&rp);
656   return (0);
657 }
658
659 static void rsapriv_pydealloc(PyObject *me)
660 {
661   RSA_PRIVCTX(me)->r = &rand_global;
662   rsa_privdestroy(RSA_PRIVCTX(me));
663   rsa_privfree(RSA_PRIV(me));
664   Py_DECREF(RSA_RNG(me));
665   FREEOBJ(me);
666 }
667
668 static PyObject *rsaget_d(PyObject *me, void *hunoz)
669   { return mp_pywrap(MP_COPY(RSA_PRIV(me)->d)); }
670
671 static PyObject *rsaget_p(PyObject *me, void *hunoz)
672   { return mp_pywrap(MP_COPY(RSA_PRIV(me)->p)); }
673
674 static PyObject *rsaget_q(PyObject *me, void *hunoz)
675   { return mp_pywrap(MP_COPY(RSA_PRIV(me)->q)); }
676
677 static PyObject *rsaget_dp(PyObject *me, void *hunoz)
678   { return mp_pywrap(MP_COPY(RSA_PRIV(me)->dp)); }
679
680 static PyObject *rsaget_dq(PyObject *me, void *hunoz)
681   { return mp_pywrap(MP_COPY(RSA_PRIV(me)->dq)); }
682
683 static PyObject *rsaget_q_inv(PyObject *me, void *hunoz)
684   { return mp_pywrap(MP_COPY(RSA_PRIV(me)->q_inv)); }
685
686 static PyObject *rsaget_rng(PyObject *me, void *hunoz)
687   { RETURN_OBJ(RSA_RNG(me)); }
688
689 static int rsaset_rng(PyObject *me, PyObject *val, void *hunoz)
690 {
691   int rc = -1;
692   if (!val)
693     val = Py_None;
694   else if (val != Py_None && !GRAND_PYCHECK(val))
695     TYERR("expected grand or None");
696   Py_DECREF(RSA_RNG(me));
697   RSA_RNG(me) = val;
698   Py_INCREF(val);
699   rc = 0;
700 end:
701   return (rc);
702 }
703
704 static PyObject *rsameth_privop(PyObject *me, PyObject *arg, PyObject *kw)
705 {
706   PyObject *rng = RSA_RNG(me);
707   mp *x = 0;
708   PyObject *rc = 0;
709   static const char *const kwlist[] = { "x", "rng", 0 };
710
711   if (!PyArg_ParseTupleAndKeywords(arg, kw, "O&|O:privop", KWLIST,
712                                    convmp, &x, &rng))
713     goto end;
714   if (rng != Py_None && !GRAND_PYCHECK(rng))
715     TYERR("not a random number source");
716   RSA_PRIVCTX(me)->r = (rng == Py_None) ? 0 : GRAND_R(rng);
717   rc = mp_pywrap(rsa_privop(RSA_PRIVCTX(me), MP_NEW, x));
718 end:
719   mp_drop(x);
720   return (rc);
721 }
722
723 static PyObject *rsameth_generate(PyObject *me, PyObject *arg, PyObject *kw)
724 {
725   grand *r = &rand_global;
726   unsigned nbits;
727   unsigned n = 0;
728   rsa_priv rp;
729   mp *e = 0;
730   struct excinfo exc = EXCINFO_INIT;
731   pypgev evt = { { 0 } };
732   static const char *const kwlist[] =
733     { "nbits", "event", "rng", "nsteps", "e", 0 };
734   PyObject *rc = 0;
735
736   evt.exc = &exc;
737   if (!PyArg_ParseTupleAndKeywords(arg, kw, "O&|O&O&O&O&:generate", KWLIST,
738                                    convuint, &nbits, convpgev, &evt,
739                                    convgrand, &r, convuint, &n,
740                                    convmp, &e))
741     goto end;
742   if (e) MP_COPY(e);
743   else e = mp_fromulong(MP_NEW, 65537);
744   if (rsa_gen_e(&rp, nbits, e, r, n, evt.ev.proc, evt.ev.ctx))
745     PGENERR(&exc);
746   rc = rsapriv_pywrap(&rp);
747 end:
748   droppgev(&evt);
749   mp_drop(e);
750   return (rc);
751 }
752
753 static const PyGetSetDef rsapub_pygetset[] = {
754 #define GETSETNAME(op, name) rsa##op##_##name
755   GET   (n,             "R.n -> N")
756   GET   (e,             "R.e -> E")
757 #undef GETSETNAME
758   { 0 }
759 };
760
761 static const PyMethodDef rsapub_pymethods[] = {
762 #define METHNAME(name) rsameth_##name
763   METH  (pubop,         "R.pubop(X) -> X^E (mod N)")
764 #undef METHNAME
765   { 0 }
766 };
767
768 static const PyGetSetDef rsapriv_pygetset[] = {
769 #define GETSETNAME(op, name) rsa##op##_##name
770   GET   (d,             "R.d -> D")
771   GET   (p,             "R.p -> P")
772   GET   (q,             "R.q -> Q")
773   GET   (dp,            "R.dp -> D mod (P - 1)")
774   GET   (dq,            "R.dq -> D mod (Q - 1)")
775   GET   (q_inv,         "R.q_inv -> Q^{-1} mod P")
776   GETSET(rng,           "R.rng -> random number source for blinding")
777 #undef GETSETNAME
778   { 0 }
779 };
780
781 static const PyMethodDef rsapriv_pymethods[] = {
782 #define METHNAME(name) rsameth_##name
783   KWMETH(privop,        "R.privop(X, [rng = None]) -> X^D (mod N)")
784   KWSMTH(generate, "generate(NBITS, [event = pgen_nullev], [rng = rand], "
785                                                         "[nsteps = 0]) -> R")
786 #undef METHNAME
787   { 0 }
788 };
789
790 static const PyTypeObject rsapub_pytype_skel = {
791   PyObject_HEAD_INIT(0) 0,              /* Header */
792   "RSAPub",                             /* @tp_name@ */
793   sizeof(rsapub_pyobj),                 /* @tp_basicsize@ */
794   0,                                    /* @tp_itemsize@ */
795
796   rsapub_pydealloc,                     /* @tp_dealloc@ */
797   0,                                    /* @tp_print@ */
798   0,                                    /* @tp_getattr@ */
799   0,                                    /* @tp_setattr@ */
800   0,                                    /* @tp_compare@ */
801   0,                                    /* @tp_repr@ */
802   0,                                    /* @tp_as_number@ */
803   0,                                    /* @tp_as_sequence@ */
804   0,                                    /* @tp_as_mapping@ */
805   0,                                    /* @tp_hash@ */
806   0,                                    /* @tp_call@ */
807   0,                                    /* @tp_str@ */
808   0,                                    /* @tp_getattro@ */
809   0,                                    /* @tp_setattro@ */
810   0,                                    /* @tp_as_buffer@ */
811   Py_TPFLAGS_DEFAULT |                  /* @tp_flags@ */
812     Py_TPFLAGS_BASETYPE,
813
814   /* @tp_doc@ */
815   "RSAPub(N, E): RSA public key.",
816
817   0,                                    /* @tp_traverse@ */
818   0,                                    /* @tp_clear@ */
819   0,                                    /* @tp_richcompare@ */
820   0,                                    /* @tp_weaklistoffset@ */
821   0,                                    /* @tp_iter@ */
822   0,                                    /* @tp_iternext@ */
823   PYMETHODS(rsapub),                    /* @tp_methods@ */
824   0,                                    /* @tp_members@ */
825   PYGETSET(rsapub),                     /* @tp_getset@ */
826   0,                                    /* @tp_base@ */
827   0,                                    /* @tp_dict@ */
828   0,                                    /* @tp_descr_get@ */
829   0,                                    /* @tp_descr_set@ */
830   0,                                    /* @tp_dictoffset@ */
831   0,                                    /* @tp_init@ */
832   PyType_GenericAlloc,                  /* @tp_alloc@ */
833   rsapub_pynew,                         /* @tp_new@ */
834   0,                                    /* @tp_free@ */
835   0                                     /* @tp_is_gc@ */
836 };
837
838 static const PyTypeObject rsapriv_pytype_skel = {
839   PyObject_HEAD_INIT(0) 0,              /* Header */
840   "RSAPriv",                            /* @tp_name@ */
841   sizeof(rsapriv_pyobj),                /* @tp_basicsize@ */
842   0,                                    /* @tp_itemsize@ */
843
844   rsapriv_pydealloc,                    /* @tp_dealloc@ */
845   0,                                    /* @tp_print@ */
846   0,                                    /* @tp_getattr@ */
847   0,                                    /* @tp_setattr@ */
848   0,                                    /* @tp_compare@ */
849   0,                                    /* @tp_repr@ */
850   0,                                    /* @tp_as_number@ */
851   0,                                    /* @tp_as_sequence@ */
852   0,                                    /* @tp_as_mapping@ */
853   0,                                    /* @tp_hash@ */
854   0,                                    /* @tp_call@ */
855   0,                                    /* @tp_str@ */
856   0,                                    /* @tp_getattro@ */
857   0,                                    /* @tp_setattro@ */
858   0,                                    /* @tp_as_buffer@ */
859   Py_TPFLAGS_DEFAULT |                  /* @tp_flags@ */
860     Py_TPFLAGS_BASETYPE,
861
862   /* @tp_doc@ */
863   "RSAPriv(..., [rng = rand]): RSA private key.\n"
864   "  Keywords: n, e, d, p, q, dp, dq, q_inv; must provide enough",
865
866   0,                                    /* @tp_traverse@ */
867   0,                                    /* @tp_clear@ */
868   0,                                    /* @tp_richcompare@ */
869   0,                                    /* @tp_weaklistoffset@ */
870   0,                                    /* @tp_iter@ */
871   0,                                    /* @tp_iternext@ */
872   PYMETHODS(rsapriv),                   /* @tp_methods@ */
873   0,                                    /* @tp_members@ */
874   PYGETSET(rsapriv),                    /* @tp_getset@ */
875   0,                                    /* @tp_base@ */
876   0,                                    /* @tp_dict@ */
877   0,                                    /* @tp_descr_get@ */
878   0,                                    /* @tp_descr_set@ */
879   0,                                    /* @tp_dictoffset@ */
880   0,                                    /* @tp_init@ */
881   PyType_GenericAlloc,                  /* @tp_alloc@ */
882   rsapriv_pynew,                        /* @tp_new@ */
883   0,                                    /* @tp_free@ */
884   0                                     /* @tp_is_gc@ */
885 };
886
887 /*----- RSA padding schemes -----------------------------------------------*/
888
889 static PyObject *meth__p1crypt_encode(PyObject *me,
890                                       PyObject *arg, PyObject *kw)
891 {
892   pkcs1 p1;
893   char *m, *ep;
894   Py_ssize_t msz, epsz;
895   unsigned long nbits;
896   PyObject *rc = 0;
897   octet *b = 0;
898   size_t sz;
899   mp *x;
900   static const char *const kwlist[] = { "msg", "nbits", "ep", "rng", 0 };
901
902   p1.r = &rand_global; ep = 0; epsz = 0;
903   if (!PyArg_ParseTupleAndKeywords(arg, kw, "s#O&|s#O&:encode", KWLIST,
904                                    &m, &msz, convulong, &nbits,
905                                    &ep, &epsz, convgrand, &p1.r))
906     goto end;
907   sz = (nbits + 7)/8;
908   p1.ep = ep; p1.epsz = epsz;
909   if (epsz + msz + 11 > sz) VALERR("buffer underflow");
910   b = xmalloc(sz);
911   x = pkcs1_cryptencode(MP_NEW, m, msz, b, sz, nbits, &p1);
912   rc = mp_pywrap(x);
913 end:
914   xfree(b);
915   return (rc);
916 }
917
918 static PyObject *meth__p1crypt_decode(PyObject *me,
919                                       PyObject *arg, PyObject *kw)
920 {
921   pkcs1 p1;
922   char *ep;
923   Py_ssize_t epsz;
924   unsigned long nbits;
925   int n;
926   PyObject *rc = 0;
927   octet *b = 0;
928   size_t sz;
929   mp *x = 0;
930   static const char *const kwlist[] = { "ct", "nbits", "ep", "rng", 0 };
931
932   p1.r = &rand_global; ep = 0; epsz = 0;
933   if (!PyArg_ParseTupleAndKeywords(arg, kw, "O&O&|s#O&:decode", KWLIST,
934                                    convmp, &x, convulong, &nbits,
935                                    &ep, &epsz, convgrand, &p1.r))
936     goto end;
937   sz = (nbits + 7)/8;
938   p1.ep = ep; p1.epsz = epsz;
939   if (epsz + 11 > sz) VALERR("buffer underflow");
940   b = xmalloc(sz);
941   if ((n = pkcs1_cryptdecode(x, b, sz, nbits, &p1)) < 0)
942     VALERR("decryption failed");
943   rc = bytestring_pywrap(b, n);
944 end:
945   mp_drop(x);
946   xfree(b);
947   return (rc);
948 }
949
950 static PyObject *meth__p1sig_encode(PyObject *me,
951                                     PyObject *arg, PyObject *kw)
952 {
953   pkcs1 p1;
954   char *m, *ep;
955   Py_ssize_t msz, epsz;
956   unsigned long nbits;
957   PyObject *rc = 0;
958   octet *b = 0;
959   size_t sz;
960   mp *x;
961   static const char *const kwlist[] = { "msg", "nbits", "ep", "rng", 0 };
962
963   p1.r = &rand_global; ep = 0; epsz = 0;
964   if (!PyArg_ParseTupleAndKeywords(arg, kw, "s#O&|s#O&:encode", KWLIST,
965                                    &m, &msz, convulong, &nbits,
966                                    &ep, &epsz, convgrand, &p1.r))
967     goto end;
968   sz = (nbits + 7)/8;
969   p1.ep = ep; p1.epsz = epsz;
970   if (epsz + msz + 11 > sz) VALERR("buffer underflow");
971   b = xmalloc(sz);
972   x = pkcs1_sigencode(MP_NEW, m, msz, b, sz, nbits, &p1);
973   rc = mp_pywrap(x);
974 end:
975   xfree(b);
976   return (rc);
977 }
978
979 static PyObject *meth__p1sig_decode(PyObject *me,
980                                     PyObject *arg, PyObject *kw)
981 {
982   pkcs1 p1;
983   char *ep;
984   Py_ssize_t epsz;
985   unsigned long nbits;
986   int n;
987   PyObject *hukairz;
988   PyObject *rc = 0;
989   octet *b = 0;
990   size_t sz;
991   mp *x = 0;
992   static const char *const kwlist[] =
993     { "msg", "sig", "nbits", "ep", "rng", 0 };
994
995   p1.r = &rand_global; ep = 0; epsz = 0;
996   if (!PyArg_ParseTupleAndKeywords(arg, kw, "OO&O&|s#O&:decode", KWLIST,
997                                    &hukairz, convmp, &x, convulong, &nbits,
998                                    &ep, &epsz, convgrand, &p1.r))
999     goto end;
1000   sz = (nbits + 7)/8;
1001   p1.ep = ep; p1.epsz = epsz;
1002   if (epsz + 10 > sz) VALERR("buffer underflow");
1003   b = xmalloc(sz);
1004   if ((n = pkcs1_sigdecode(x, 0, 0, b, sz, nbits, &p1)) < 0)
1005     VALERR("verification failed");
1006   rc = bytestring_pywrap(b, n);
1007 end:
1008   mp_drop(x);
1009   xfree(b);
1010   return (rc);
1011 }
1012
1013 static PyObject *meth__oaep_encode(PyObject *me,
1014                                    PyObject *arg, PyObject *kw)
1015 {
1016   oaep o;
1017   char *m, *ep;
1018   Py_ssize_t msz, epsz;
1019   unsigned long nbits;
1020   PyObject *rc = 0;
1021   octet *b = 0;
1022   size_t sz;
1023   mp *x;
1024   static const char *const kwlist[] =
1025     { "msg", "nbits", "mgf", "hash", "ep", "rng", 0 };
1026
1027   o.r = &rand_global; o.cc = &sha_mgf; o.ch = &sha; ep = 0; epsz = 0;
1028   if (!PyArg_ParseTupleAndKeywords(arg, kw, "s#O&|O&O&s#O&:encode", KWLIST,
1029                                    &m, &msz, convulong, &nbits,
1030                                    convgccipher, &o.cc,
1031                                    convgchash, &o.ch,
1032                                    &ep, &epsz,
1033                                    convgrand, &o.r))
1034     goto end;
1035   sz = (nbits + 7)/8;
1036   o.ep = ep; o.epsz = epsz;
1037   if (2 * o.ch->hashsz + 2 + msz > sz) VALERR("buffer underflow");
1038   b = xmalloc(sz);
1039   x = oaep_encode(MP_NEW, m, msz, b, sz, nbits, &o);
1040   rc = mp_pywrap(x);
1041 end:
1042   xfree(b);
1043   return (rc);
1044 }
1045
1046 static PyObject *meth__oaep_decode(PyObject *me,
1047                                    PyObject *arg, PyObject *kw)
1048 {
1049   oaep o;
1050   char *ep;
1051   Py_ssize_t epsz;
1052   unsigned long nbits;
1053   int n;
1054   PyObject *rc = 0;
1055   octet *b = 0;
1056   size_t sz;
1057   mp *x = 0;
1058   static const char *const kwlist[] =
1059     { "ct", "nbits", "mgf", "hash", "ep", "rng", 0 };
1060
1061   o.r = &rand_global; o.cc = &sha_mgf; o.ch = &sha; ep = 0; epsz = 0;
1062   if (!PyArg_ParseTupleAndKeywords(arg, kw, "O&O&|O&O&s#O&:decode", KWLIST,
1063                                    convmp, &x, convulong, &nbits,
1064                                    convgccipher, &o.cc,
1065                                    convgchash, &o.ch,
1066                                    &ep, &epsz,
1067                                    convgrand, &o.r))
1068     goto end;
1069   sz = (nbits + 7)/8;
1070   o.ep = ep; o.epsz = epsz;
1071   if (2 * o.ch->hashsz > sz) VALERR("buffer underflow");
1072   b = xmalloc(sz);
1073   if ((n = oaep_decode(x, b, sz, nbits, &o)) < 0)
1074     VALERR("decryption failed");
1075   rc = bytestring_pywrap(b, n);
1076 end:
1077   mp_drop(x);
1078   xfree(b);
1079   return (rc);
1080 }
1081
1082 static PyObject *meth__pss_encode(PyObject *me,
1083                                   PyObject *arg, PyObject *kw)
1084 {
1085   pss p;
1086   char *m;
1087   Py_ssize_t msz;
1088   unsigned long nbits;
1089   PyObject *rc = 0;
1090   octet *b = 0;
1091   size_t sz;
1092   mp *x = 0;
1093   static const char *const kwlist[] =
1094     { "msg", "nbits", "mgf", "hash", "saltsz", "rng", 0 };
1095
1096   p.cc = &sha_mgf; p.ch = &sha; p.r = &rand_global; p.ssz = (size_t)-1;
1097   if (!PyArg_ParseTupleAndKeywords(arg, kw, "s#O&|O&O&O&O&:encode", KWLIST,
1098                                    &m, &msz, convulong, &nbits,
1099                                    convgccipher, &p.cc,
1100                                    convgchash, &p.ch,
1101                                    convszt, &p.ssz,
1102                                    convgrand, &p.r))
1103     goto end;
1104   sz = (nbits + 7)/8;
1105   if (p.ssz == (size_t)-1) p.ssz = p.ch->hashsz;
1106   if (p.ch->hashsz + p.ssz + 2 > sz) VALERR("buffer underflow");
1107   b = xmalloc(sz);
1108   x = pss_encode(MP_NEW, m, msz, b, sz, nbits, &p);
1109   rc = mp_pywrap(x);
1110 end:
1111   xfree(b);
1112   return (rc);
1113 }
1114
1115 static PyObject *meth__pss_decode(PyObject *me,
1116                                   PyObject *arg, PyObject *kw)
1117 {
1118   pss p;
1119   char *m;
1120   Py_ssize_t msz;
1121   unsigned long nbits;
1122   PyObject *rc = 0;
1123   octet *b = 0;
1124   size_t sz;
1125   int n;
1126   mp *x = 0;
1127   static const char *const kwlist[] =
1128     { "msg", "sig", "nbits", "mgf", "hash", "saltsz", "rng", 0 };
1129
1130   p.cc = &sha_mgf; p.ch = &sha; p.r = &rand_global; p.ssz = (size_t)-1;
1131   if (!PyArg_ParseTupleAndKeywords(arg, kw, "s#O&O&|O&O&O&O&:decode", KWLIST,
1132                                    &m, &msz, convmp, &x, convulong, &nbits,
1133                                    convgccipher, &p.cc,
1134                                    convgchash, &p.ch,
1135                                    convszt, &p.ssz,
1136                                    convgrand, &p.r))
1137     goto end;
1138   sz = (nbits + 7)/8;
1139   if (p.ssz == (size_t)-1) p.ssz = p.ch->hashsz;
1140   if (p.ch->hashsz + p.ssz + 2 > sz) VALERR("buffer underflow");
1141   b = xmalloc(sz);
1142   if ((n = pss_decode(x, m, msz, b, sz, nbits, &p)) < 0)
1143     VALERR("verification failed");
1144   rc = Py_None; Py_INCREF(rc);
1145 end:
1146   mp_drop(x);
1147   xfree(b);
1148   return (rc);
1149 }
1150
1151 /*----- X25519 and related algorithms -------------------------------------*/
1152
1153 #define XDHS(_)                                                         \
1154   _(X25519, x25519)                                                     \
1155   _(X448, x448)
1156
1157 #define DEFXDH(X, x)                                                    \
1158   static PyObject *meth_##x(PyObject *me, PyObject *arg)                \
1159   {                                                                     \
1160     const char *k, *p;                                                  \
1161     Py_ssize_t ksz, psz;                                                \
1162     PyObject *rc = 0;                                                   \
1163     if (!PyArg_ParseTuple(arg, "s#s#:" #x, &k, &ksz, &p, &psz))         \
1164       goto end;                                                         \
1165     if (ksz != X##_KEYSZ) VALERR("bad key length");                     \
1166     if (psz != X##_PUBSZ) VALERR("bad public length");                  \
1167     rc = bytestring_pywrap(0, X##_OUTSZ);                               \
1168     x((octet *)PyString_AS_STRING(rc),                                  \
1169       (const octet *)k, (const octet *)p);                              \
1170     return (rc);                                                        \
1171   end:                                                                  \
1172     return (0);                                                         \
1173   }
1174 XDHS(DEFXDH)
1175 #undef DEFXDH
1176
1177 /*----- Ed25519 and related algorithms ------------------------------------*/
1178
1179 #define EDDSAS(_)                                                       \
1180   _(ED25519, ed25519, -1, ctx)                                          \
1181   _(ED448, ed448, 0, )
1182
1183 #define DEFEDDSA(ED, ed, phdflt, sigver)                                \
1184                                                                         \
1185   static PyObject *meth_##ed##_pubkey(PyObject *me, PyObject *arg)      \
1186   {                                                                     \
1187     const char *k;                                                      \
1188     Py_ssize_t ksz;                                                     \
1189     PyObject *rc = 0;                                                   \
1190     if (!PyArg_ParseTuple(arg, "s#:" #ed "_pubkey", &k, &ksz))          \
1191       goto end;                                                         \
1192     rc = bytestring_pywrap(0, ED##_PUBSZ);                              \
1193     ed##_pubkey((octet *)PyString_AS_STRING(rc), k, ksz);               \
1194     return (rc);                                                        \
1195   end:                                                                  \
1196     return (0);                                                         \
1197   }                                                                     \
1198                                                                         \
1199   static PyObject *meth_##ed##_sign(PyObject *me, PyObject *arg,        \
1200                                     PyObject *kw)                       \
1201   {                                                                     \
1202     const char *k, *p = 0, *c = 0, *m;                                  \
1203     Py_ssize_t ksz, psz, csz = 0, msz;                                  \
1204     int ph = phdflt;                                                    \
1205     PyObject *rc = 0;                                                   \
1206     octet pp[ED##_PUBSZ];                                               \
1207     static const char *const kwlist[] =                                 \
1208       { "key", "msg", "pub", "perso", "phflag", 0 };                    \
1209     if (!PyArg_ParseTupleAndKeywords(arg, kw,                           \
1210                                      "s#s#|s#s#O&:" #ed "_sign",        \
1211                                      KWLIST,                            \
1212                                      &k, &ksz, &m, &msz, &p, &psz,      \
1213                                      &c, &csz, convbool, &ph))          \
1214       goto end;                                                         \
1215     if (p && psz != ED##_PUBSZ) VALERR("bad public length");            \
1216     if (c && csz > ED##_MAXPERSOSZ)                                     \
1217       VALERR("personalization string too long");                        \
1218     if (c && ph == -1) ph = 0;                                          \
1219     if (!p) { p = (const char *)pp; ed##_pubkey(pp, k, ksz); }          \
1220     rc = bytestring_pywrap(0, ED##_SIGSZ);                              \
1221     ed##sigver##_sign((octet *)PyString_AS_STRING(rc), k, ksz,          \
1222                       (const octet *)p, ph, c, csz, m, msz);            \
1223     return (rc);                                                        \
1224   end:                                                                  \
1225     return (0);                                                         \
1226   }                                                                     \
1227                                                                         \
1228   static PyObject *meth_##ed##_verify(PyObject *me,                     \
1229                                       PyObject *arg, PyObject *kw)      \
1230   {                                                                     \
1231     const char *p, *c = 0, *m, *s;                                      \
1232     Py_ssize_t psz, csz = 0, msz, ssz;                                  \
1233     int ph = phdflt;                                                    \
1234     PyObject *rc = 0;                                                   \
1235     static const char *const kwlist[] =                                 \
1236       { "pub", "msg", "sig", "perso", "phflag", 0 };                    \
1237     if (!PyArg_ParseTupleAndKeywords(arg, kw,                           \
1238                                      "s#s#s#|s#O&:" #ed "_verify",      \
1239                                      KWLIST,                            \
1240                                      &p, &psz, &m, &msz, &s, &ssz,      \
1241                                      &c, &csz, convbool, &ph))          \
1242       goto end;                                                         \
1243     if (psz != ED##_PUBSZ) VALERR("bad public length");                 \
1244     if (ssz != ED##_SIGSZ) VALERR("bad signature length");              \
1245     if (c && csz > ED##_MAXPERSOSZ)                                     \
1246       VALERR("personalization string too long");                        \
1247     if (c && ph == -1) ph = 0;                                          \
1248     rc = getbool(!ed##sigver##_verify((const octet *)p, ph, c, csz,     \
1249                                       m, msz, (const octet *)s));       \
1250     return (rc);                                                        \
1251   end:                                                                  \
1252     return (0);                                                         \
1253   }
1254 EDDSAS(DEFEDDSA)
1255 #undef DEFEDDSA
1256
1257 /*----- Global stuff ------------------------------------------------------*/
1258
1259 static const struct nameval consts[] = {
1260   CONST(X25519_KEYSZ), CONST(X25519_PUBSZ), CONST(X25519_OUTSZ),
1261   CONST(X448_KEYSZ), CONST(X448_PUBSZ), CONST(X448_OUTSZ),
1262   CONST(ED25519_KEYSZ), CONST(ED25519_PUBSZ), CONST(ED25519_SIGSZ),
1263     CONST(ED25519_MAXPERSOSZ),
1264   CONST(ED448_KEYSZ), CONST(ED448_PUBSZ), CONST(ED448_SIGSZ),
1265     CONST(ED448_MAXPERSOSZ),
1266   { 0 }
1267 };
1268
1269 static const PyMethodDef methods[] = {
1270 #define METHNAME(name) meth_##name
1271   KWMETH(_p1crypt_encode, 0)
1272   KWMETH(_p1crypt_decode, 0)
1273   KWMETH(_p1sig_encode, 0)
1274   KWMETH(_p1sig_decode, 0)
1275   KWMETH(_oaep_encode,  0)
1276   KWMETH(_oaep_decode,  0)
1277   KWMETH(_pss_encode,   0)
1278   KWMETH(_pss_decode,   0)
1279 #define DEFMETH(X, x)                                                   \
1280   METH  (x,             "" #x "(KEY, PUBLIC) -> SHARED")
1281   XDHS(DEFMETH)
1282 #undef DEFMETH
1283 #define DEFMETH(ED, ed, phdflt, sigver)                                 \
1284   METH  (ed##_pubkey,   "" #ed "_pubkey(KEY) -> PUBLIC")                \
1285   KWMETH(ed##_sign,     "" #ed "_sign(KEY, MSG, [pub = PUBLIC], "       \
1286                            "[perso = STRING], [phflag = BOOL]) -> SIG") \
1287   KWMETH(ed##_verify,   "" #ed "_verify(PUBLIC, MSG, SIG, "             \
1288                           "[perso = STRING], [phflag = BOOL]) -> BOOL")
1289   EDDSAS(DEFMETH)
1290 #undef DEFMETH
1291 #undef METHNAME
1292   { 0 }
1293 };
1294
1295 void pubkey_pyinit(void)
1296 {
1297   INITTYPE(dsapub, root);
1298   INITTYPE(dsapriv, dsapub);
1299   INITTYPE(kcdsapub, root);
1300   INITTYPE(kcdsapriv, kcdsapub);
1301   INITTYPE(rsapub, root);
1302   INITTYPE(rsapriv, rsapub);
1303   addmethods(methods);
1304 }
1305
1306 void pubkey_pyinsert(PyObject *mod)
1307 {
1308   INSERT("DSAPub", dsapub_pytype);
1309   INSERT("DSAPriv", dsapriv_pytype);
1310   INSERT("KCDSAPub", kcdsapub_pytype);
1311   INSERT("KCDSAPriv", kcdsapriv_pytype);
1312   INSERT("RSAPub", rsapub_pytype);
1313   INSERT("RSAPriv", rsapriv_pytype);
1314   setconstants(mod, consts);
1315 }
1316
1317 /*----- That's all, folks -------------------------------------------------*/