return DH_new();
}
-DH *tr_create_dh_params(unsigned char *priv_key,
+DH *tr_create_dh_params(unsigned char *priv_key,
size_t keylen) {
DH *dh = NULL;
(NULL == (dh->p = BN_new())) ||
(NULL == (dh->q = BN_new()))) {
DH_free(dh);
+ return NULL;
}
BN_set_word(dh->g, 2);
return out;
}
-int tr_compute_dh_key(unsigned char **pbuf,
- BIGNUM *pub_key,
+int tr_compute_dh_key(unsigned char **pbuf,
+ BIGNUM *pub_key,
DH *priv_dh) {
size_t buflen;
unsigned char *buf = NULL;;
int rc = 0;
-
- if ((!pbuf) ||
- (!pub_key) ||
+
+ if ((!pbuf) ||
+ (!pub_key) ||
(!priv_dh)) {
tr_debug("tr_compute_dh_key: Invalid parameters.");
return(-1);
return -1;
}
-
+
rc = DH_compute_key(buf, pub_key, priv_dh);
if (0 <= rc) {
*pbuf = buf;
unsigned char *bn_bytes = talloc_zero_size(request, BN_num_bytes(pub));
unsigned char *digest = talloc_zero_size(request, SHA_DIGEST_LENGTH+1);
assert(bn_bytes && digest);
- BN_bn2bin(pub, bn_bytes);
- SHA1(bn_bytes, BN_num_bytes(pub), digest);
- *out_digest = digest;
- *out_len = SHA_DIGEST_LENGTH;
- return 0;
+ BN_bn2bin(pub, bn_bytes);
+ SHA1(bn_bytes, BN_num_bytes(pub), digest);
+ *out_digest = digest;
+ *out_len = SHA_DIGEST_LENGTH;
+
+ talloc_free(bn_bytes);
+ return 0;
+}
+
+void tr_dh_free(unsigned char *dh_buf)
+{
+ free(dh_buf);
}
-void tr_dh_free(DH *dh)
+void tr_dh_destroy(DH *dh)
{
DH_free(dh);
}