comparison dcclib/sign.c @ 0:c7f6b056b673

First import of vendor version
author Peter Gervai <grin@grin.hu>
date Tue, 10 Mar 2009 13:49:58 +0100
parents
children
comparison
equal deleted inserted replaced
-1:000000000000 0:c7f6b056b673
1 /* Distributed Checksum Clearinghouse
2 *
3 * message authentication
4 *
5 * Copyright (c) 2008 by Rhyolite Software, LLC
6 *
7 * This agreement is not applicable to any entity which sells anti-spam
8 * solutions to others or provides an anti-spam solution as part of a
9 * security solution sold to other entities, or to a private network
10 * which employs the DCC or uses data provided by operation of the DCC
11 * but does not provide corresponding data to other users.
12 *
13 * Permission to use, copy, modify, and distribute this software without
14 * changes for any purpose with or without fee is hereby granted, provided
15 * that the above copyright notice and this permission notice appear in all
16 * copies and any distributed versions or copies are either unchanged
17 * or not called anything similar to "DCC" or "Distributed Checksum
18 * Clearinghouse".
19 *
20 * Parties not eligible to receive a license under this agreement can
21 * obtain a commercial license to use DCC by contacting Rhyolite Software
22 * at sales@rhyolite.com.
23 *
24 * A commercial license would be for Distributed Checksum and Reputation
25 * Clearinghouse software. That software includes additional features. This
26 * free license for Distributed ChecksumClearinghouse Software does not in any
27 * way grant permision to use Distributed Checksum and Reputation Clearinghouse
28 * software
29 *
30 * THE SOFTWARE IS PROVIDED "AS IS" AND RHYOLITE SOFTWARE, LLC DISCLAIMS ALL
31 * WARRANTIES WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES
32 * OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL RHYOLITE SOFTWARE, LLC
33 * BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES
34 * OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS,
35 * WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION,
36 * ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS
37 * SOFTWARE.
38 *
39 * Rhyolite Software DCC 1.3.103-1.13 $Revision$
40 */
41
42 #include "dcc_defs.h"
43 #include "dcc_md5.h"
44 #include <string.h>
45
46
47 /* sign a DCC packet */
48 void
49 dcc_sign(const char *passwd,
50 int passwd_len,
51 void *pkt,
52 u_int pkt_len) /* including signature */
53 {
54 MD5_CTX ctx;
55
56 MD5Init(&ctx);
57 MD5Update(&ctx, passwd, passwd_len);
58 MD5Update(&ctx, pkt, pkt_len-sizeof(DCC_SIGNATURE));
59 MD5Final(&((u_char*)pkt)[pkt_len-sizeof(DCC_SIGNATURE)], &ctx);
60 }
61
62
63
64 /* check the signature of a DCC packet */
65 u_char /* 0=forgery, 1=good signature */
66 dcc_ck_signature(const char *passwd,
67 int passwd_len,
68 const void *pkt,
69 u_int pkt_len) /* including signature */
70 {
71 MD5_CTX ctx;
72 DCC_SIGNATURE signature;
73
74 MD5Init(&ctx);
75 MD5Update(&ctx, passwd, passwd_len);
76 MD5Update(&ctx, pkt, pkt_len-sizeof(DCC_SIGNATURE));
77 MD5Final(signature, &ctx);
78 return !memcmp(signature, &((char*)pkt)[pkt_len-sizeof(DCC_SIGNATURE)],
79 sizeof(signature));
80 }