#ifdef HAVE_NETTLE
#include <nettle/md5.h>
+#include <nettle/ripemd160.h>
#include <nettle/sha.h>
#else
#include "md5.h"
size_t siglen, unhashedlen;
struct sha1_ctx sha1_context;
struct md5_ctx md5_context;
+#ifdef NETTLE_WITH_RIPEMD160
+ struct ripemd160_ctx ripemd160_context;
+#endif
#ifdef NETTLE_WITH_SHA224
struct sha224_ctx sha224_context;
#endif
uint8_t keyheader[3];
uint8_t packetheader[5];
uint8_t v4trailer[6];
- uint8_t hash[20];
+ uint8_t hash[64];
uint8_t *hashdata[8];
size_t hashlen[8];
int chunks, i;
}
sha1_digest(&sha1_context, 20, hash);
break;
+ case OPENPGP_HASH_RIPEMD160:
+#ifdef NETTLE_WITH_RIPEMD160
+ ripemd160_init(&ripemd160_context);
+ for (i = 0; i < chunks; i++) {
+ ripemd160_update(&ripemd160_context, hashlen[i],
+ hashdata[i]);
+ }
+ ripemd160_digest(&ripemd160_context, RIPEMD160_DIGEST_SIZE,
+ hash);
+#else
+ logthing(LOGTHING_INFO, "RIPEMD160 support not available.");
+ return -1;
+#endif
case OPENPGP_HASH_SHA224:
#ifdef NETTLE_WITH_SHA224
sha224_init(&sha224_context);
hashdata[i]);
}
sha224_digest(&sha224_context, SHA224_DIGEST_SIZE, hash);
+ break;
#else
logthing(LOGTHING_INFO, "SHA224 support not available.");
+ return -1;
#endif
- break;
case OPENPGP_HASH_SHA256:
#ifdef NETTLE_WITH_SHA256
sha256_init(&sha256_context);
hashdata[i]);
}
sha256_digest(&sha256_context, SHA256_DIGEST_SIZE, hash);
+ break;
#else
logthing(LOGTHING_INFO, "SHA256 support not available.");
+ return -1;
#endif
- break;
case OPENPGP_HASH_SHA384:
#ifdef NETTLE_WITH_SHA384
sha384_init(&sha384_context);
hashdata[i]);
}
sha384_digest(&sha384_context, SHA384_DIGEST_SIZE, hash);
+ break;
#else
logthing(LOGTHING_INFO, "SHA384 support not available.");
+ return -1;
#endif
- break;
case OPENPGP_HASH_SHA512:
#ifdef NETTLE_WITH_SHA512
sha512_init(&sha512_context);
hashdata[i]);
}
sha512_digest(&sha512_context, SHA512_DIGEST_SIZE, hash);
+ break;
#else
logthing(LOGTHING_INFO, "SHA512 support not available.");
+ return -1;
#endif
- break;
default:
logthing(LOGTHING_ERROR, "Unsupported signature hash type %d",
hashtype);