#include "silc.h"
#include "silcpk_i.h"
#include "silcpkcs1_i.h"
+#include "dsa.h"
+#ifdef SILC_DIST_SSH
+#include "silcssh_pkcs.h"
+#endif /* SILC_DIST_SSH */
#ifndef SILC_SYMBIAN
/* Dynamically registered list of PKCS. */
silc_pkcs_silc_verify,
},
+#ifdef SILC_DIST_SSH
+ /* SSH2 PKCS */
+ {
+ SILC_PKCS_SSH2,
+ silc_pkcs_ssh_get_algorithm,
+ silc_pkcs_ssh_import_public_key_file,
+ silc_pkcs_ssh_import_public_key,
+ silc_pkcs_ssh_export_public_key_file,
+ silc_pkcs_ssh_export_public_key,
+ silc_pkcs_ssh_public_key_bitlen,
+ silc_pkcs_ssh_public_key_copy,
+ silc_pkcs_ssh_public_key_compare,
+ silc_pkcs_ssh_public_key_free,
+ silc_pkcs_ssh_import_private_key_file,
+ silc_pkcs_ssh_import_private_key,
+ silc_pkcs_ssh_export_private_key_file,
+ silc_pkcs_ssh_export_private_key,
+ silc_pkcs_ssh_private_key_bitlen,
+ silc_pkcs_ssh_private_key_free,
+ silc_pkcs_ssh_encrypt,
+ silc_pkcs_ssh_decrypt,
+ silc_pkcs_ssh_sign,
+ silc_pkcs_ssh_verify,
+ },
+#endif /* SILC_DIST_SSH */
+
{
0, NULL, NULL, NULL, NULL, NULL,
NULL, NULL, NULL, NULL, NULL
silc_pkcs1_verify
},
+ /* DSS */
+ {
+ "dsa",
+ "dss",
+ "sha1",
+ silc_dsa_generate_key,
+ silc_dsa_import_public_key,
+ silc_dsa_export_public_key,
+ silc_dsa_public_key_bitlen,
+ silc_dsa_public_key_copy,
+ silc_dsa_public_key_compare,
+ silc_dsa_public_key_free,
+ silc_dsa_import_private_key,
+ silc_dsa_export_private_key,
+ silc_dsa_private_key_bitlen,
+ silc_dsa_private_key_free,
+ silc_dsa_encrypt,
+ silc_dsa_decrypt,
+ silc_dsa_sign,
+ silc_dsa_verify
+ },
+
+#ifdef SILC_DIST_SSH
+ /* PKCS #1, SSH2 style public keys */
+ {
+ "rsa",
+ "ssh",
+ "sha1",
+ silc_pkcs1_generate_key,
+ silc_ssh_rsa_import_public_key,
+ silc_ssh_rsa_export_public_key,
+ silc_pkcs1_public_key_bitlen,
+ silc_pkcs1_public_key_copy,
+ silc_pkcs1_public_key_compare,
+ silc_pkcs1_public_key_free,
+ silc_pkcs1_import_private_key,
+ silc_pkcs1_export_private_key,
+ silc_pkcs1_private_key_bitlen,
+ silc_pkcs1_private_key_free,
+ silc_pkcs1_encrypt,
+ silc_pkcs1_decrypt,
+ silc_pkcs1_sign,
+ silc_pkcs1_verify
+ },
+
+ /* DSS, SSH2 style public keys */
+ {
+ "dsa",
+ "ssh",
+ "sha1",
+ silc_dsa_generate_key,
+ silc_ssh_dsa_import_public_key,
+ silc_ssh_dsa_export_public_key,
+ silc_dsa_public_key_bitlen,
+ silc_dsa_public_key_copy,
+ silc_dsa_public_key_compare,
+ silc_dsa_public_key_free,
+ silc_dsa_import_private_key,
+ silc_dsa_export_private_key,
+ silc_dsa_private_key_bitlen,
+ silc_dsa_private_key_free,
+ silc_dsa_encrypt,
+ silc_dsa_decrypt,
+ silc_dsa_sign,
+ silc_dsa_verify
+ },
+#endif /* SILC_DIST_SSH */
+
{
NULL, NULL, NULL, NULL,
NULL, NULL, NULL, NULL,
}
};
-/* Register a new PKCS into SILC. */
+/* Register a new PKCS */
SilcBool silc_pkcs_register(const SilcPKCSObject *pkcs)
{
return TRUE;
}
-/* Unregister a PKCS from the SILC. */
+/* Unregister a PKCS */
SilcBool silc_pkcs_unregister(SilcPKCSObject *pkcs)
{
SilcBool silc_pkcs_register_default(void)
{
-#ifndef SILC_SYMBIAN
- int i;
-
- for (i = 0; silc_default_pkcs[i].type; i++)
- silc_pkcs_register(&(silc_default_pkcs[i]));
-
- for (i = 0; silc_default_pkcs_alg[i].name; i++)
- silc_pkcs_algorithm_register(&(silc_default_pkcs_alg[i]));
-
-#endif /* SILC_SYMBIAN */
+ /* We use builtin PKCS and algorithms */
return TRUE;
}
+/* Unregister all PKCS and algorithms */
+
SilcBool silc_pkcs_unregister_all(void)
{
#ifndef SILC_SYMBIAN
char *silc_pkcs_get_supported(void)
{
- SilcPKCSAlgorithm *entry;
+ SilcPKCSAlgorithm *entry, *entry2;
char *list = NULL;
- int len = 0;
+ int i, len = 0;
#ifndef SILC_SYMBIAN
if (silc_pkcs_alg_list) {
len++;
}
}
-#else
- {
- int i;
- for (i = 0; silc_default_pkcs_alg[i].name; i++) {
- entry = (SilcPKCSAlgorithm *)&(silc_default_pkcs_alg[i]);
- len += strlen(entry->name);
- list = silc_realloc(list, len + 1);
- if (!list)
- return NULL;
+#endif /* SILC_SYMBIAN */
- memcpy(list + (len - strlen(entry->name)),
- entry->name, strlen(entry->name));
- memcpy(list + len, ",", 1);
- len++;
+ for (i = 0; silc_default_pkcs_alg[i].name; i++) {
+ entry = (SilcPKCSAlgorithm *)&(silc_default_pkcs_alg[i]);
+
+ if (silc_pkcs_alg_list) {
+ silc_dlist_start(silc_pkcs_alg_list);
+ while ((entry2 = silc_dlist_get(silc_pkcs_alg_list)) != SILC_LIST_END) {
+ if (!strcmp(entry2->name, entry->name))
+ break;
+ }
+ if (entry2)
+ continue;
}
+
+ len += strlen(entry->name);
+ list = silc_realloc(list, len + 1);
+ if (!list)
+ return NULL;
+
+ memcpy(list + (len - strlen(entry->name)),
+ entry->name, strlen(entry->name));
+ memcpy(list + len, ",", 1);
+ len++;
}
-#endif /* SILC_SYMBIAN */
list[len - 1] = 0;
const SilcPKCSObject *silc_pkcs_find_pkcs(SilcPKCSType type)
{
SilcPKCSObject *entry;
+ int i;
#ifndef SILC_SYMBIAN
if (silc_pkcs_list) {
return (const SilcPKCSObject *)entry;
}
}
-#else
- {
- int i;
- for (i = 0; silc_default_pkcs[i].type; i++) {
- entry = (SilcPKCSObject *)&(silc_default_pkcs[i]);
- if (entry->type == type)
- return (const SilcPKCSObject *)entry;
- }
- }
#endif /* SILC_SYMBIAN */
+ for (i = 0; silc_default_pkcs[i].type; i++) {
+ entry = (SilcPKCSObject *)&(silc_default_pkcs[i]);
+ if (entry->type == type)
+ return (const SilcPKCSObject *)entry;
+ }
+
return NULL;
}
const char *scheme)
{
SilcPKCSAlgorithm *entry;
+ int i;
#ifndef SILC_SYMBIAN
if (silc_pkcs_alg_list) {
return (const SilcPKCSAlgorithm *)entry;
}
}
-#else
- {
- int i;
- for (i = 0; silc_default_pkcs_alg[i].name; i++) {
- entry = (SilcPKCSAlgorithm *)&(silc_default_pkcs_alg[i]);
- if (!strcmp(entry->name, algorithm) &&
- (!scheme || !entry->scheme || !strcmp(entry->scheme, scheme)))
- return (const SilcPKCSAlgorithm *)entry;
- }
- }
#endif /* SILC_SYMBIAN */
+ for (i = 0; silc_default_pkcs_alg[i].name; i++) {
+ entry = (SilcPKCSAlgorithm *)&(silc_default_pkcs_alg[i]);
+ if (!strcmp(entry->name, algorithm) &&
+ (!scheme || !entry->scheme || !strcmp(entry->scheme, scheme)))
+ return (const SilcPKCSAlgorithm *)entry;
+ }
+
return NULL;
}
const SilcPKCSAlgorithm *silc_pkcs_get_algorithm(void *key)
{
SilcPublicKey public_key = key;
- return public_key->pkcs->get_algorithm(public_key->public_key);
+ return public_key->alg;
}
/* Return algorithm name */
if (!public_key)
return FALSE;
- public_key->pkcs = pkcs = silc_pkcs_find_pkcs(type);
+ pkcs = silc_pkcs_find_pkcs(type);
+ public_key->pkcs = (SilcPKCSObject *)pkcs;
if (!public_key->pkcs) {
silc_free(public_key);
return FALSE;
}
/* Import the PKCS public key */
- if (!pkcs->import_public_key(key, key_len, &public_key->public_key)) {
+ if (!pkcs->import_public_key(pkcs, NULL, key, key_len,
+ &public_key->public_key,
+ &public_key->alg)) {
silc_free(public_key);
return FALSE;
}
void silc_pkcs_public_key_free(SilcPublicKey public_key)
{
- public_key->pkcs->public_key_free(public_key->public_key);
+ public_key->pkcs->public_key_free(public_key->pkcs, public_key->public_key);
+ silc_free(public_key);
}
/* Exports public key */
-unsigned char *silc_pkcs_public_key_encode(SilcPublicKey public_key,
+unsigned char *silc_pkcs_public_key_encode(SilcStack stack,
+ SilcPublicKey public_key,
SilcUInt32 *ret_len)
{
- return public_key->pkcs->export_public_key(public_key->public_key,
- ret_len);
+ return public_key->pkcs->export_public_key(public_key->pkcs, stack,
+ public_key->public_key, ret_len);
}
/* Return key length */
SilcUInt32 silc_pkcs_public_key_get_len(SilcPublicKey public_key)
{
- return public_key->pkcs->public_key_bitlen(public_key->public_key);
+ return public_key->pkcs->public_key_bitlen(public_key->pkcs,
+ public_key->public_key);
}
/* Returns internal PKCS public key context */
-void *silc_pkcs_get_context(SilcPKCSType type, SilcPublicKey public_key)
+void *silc_pkcs_public_key_get_pkcs(SilcPKCSType type,
+ SilcPublicKey public_key)
{
if (public_key->pkcs->type != type)
- return FALSE;
+ return NULL;
return public_key->public_key;
}
+/* Returns internal PKCS private key context */
+
+void *silc_pkcs_private_key_get_pkcs(SilcPKCSType type,
+ SilcPrivateKey private_key)
+{
+ if (private_key->pkcs->type != type)
+ return NULL;
+ return private_key->private_key;
+}
/* Allocates new private key from key data */
if (!private_key)
return FALSE;
- private_key->pkcs = pkcs = silc_pkcs_find_pkcs(type);
+ pkcs = silc_pkcs_find_pkcs(type);
+ private_key->pkcs = (SilcPKCSObject *)pkcs;
if (!private_key->pkcs) {
silc_free(private_key);
return FALSE;
}
/* Import the PKCS private key */
- if (!pkcs->import_private_key(key, key_len, &private_key->private_key)) {
+ if (!pkcs->import_private_key(pkcs, NULL, key, key_len,
+ &private_key->private_key,
+ &private_key->alg)) {
silc_free(private_key);
return FALSE;
}
SilcUInt32 silc_pkcs_private_key_get_len(SilcPrivateKey private_key)
{
- return private_key->pkcs->private_key_bitlen(private_key->private_key);
+ return private_key->pkcs->private_key_bitlen(private_key->pkcs,
+ private_key->private_key);
}
/* Frees the private key */
void silc_pkcs_private_key_free(SilcPrivateKey private_key)
{
- private_key->pkcs->private_key_free(private_key->private_key);
+ private_key->pkcs->private_key_free(private_key->pkcs,
+ private_key->private_key);
+ silc_free(private_key);
}
/* Encrypts */
-SilcBool silc_pkcs_encrypt(SilcPublicKey public_key,
- unsigned char *src, SilcUInt32 src_len,
- unsigned char *dst, SilcUInt32 dst_size,
- SilcUInt32 *dst_len, SilcRng rng)
+SilcAsyncOperation silc_pkcs_encrypt(SilcPublicKey public_key,
+ unsigned char *src, SilcUInt32 src_len,
+ SilcRng rng,
+ SilcPKCSEncryptCb encrypt_cb,
+ void *context)
{
- return public_key->pkcs->encrypt(public_key->public_key, src, src_len,
- dst, dst_size, dst_len, rng);
+ return public_key->pkcs->encrypt(public_key->pkcs,
+ public_key->public_key, src, src_len,
+ rng, encrypt_cb, context);
}
/* Decrypts */
-SilcBool silc_pkcs_decrypt(SilcPrivateKey private_key,
- unsigned char *src, SilcUInt32 src_len,
- unsigned char *dst, SilcUInt32 dst_size,
- SilcUInt32 *dst_len)
+SilcAsyncOperation silc_pkcs_decrypt(SilcPrivateKey private_key,
+ unsigned char *src, SilcUInt32 src_len,
+ SilcPKCSDecryptCb decrypt_cb,
+ void *context)
{
- return private_key->pkcs->decrypt(private_key->private_key, src, src_len,
- dst, dst_size, dst_len);
+ return private_key->pkcs->decrypt(private_key->pkcs,
+ private_key->private_key, src, src_len,
+ decrypt_cb, context);
}
/* Generates signature */
-SilcBool silc_pkcs_sign(SilcPrivateKey private_key,
- unsigned char *src, SilcUInt32 src_len,
- unsigned char *dst, SilcUInt32 dst_size,
- SilcUInt32 *dst_len, SilcBool compute_hash,
- SilcHash hash)
+SilcAsyncOperation silc_pkcs_sign(SilcPrivateKey private_key,
+ unsigned char *src,
+ SilcUInt32 src_len,
+ SilcBool compute_hash,
+ SilcHash hash,
+ SilcRng rng,
+ SilcPKCSSignCb sign_cb,
+ void *context)
{
- return private_key->pkcs->sign(private_key->private_key, src, src_len,
- dst, dst_size, dst_len, compute_hash, hash);
+ return private_key->pkcs->sign(private_key->pkcs,
+ private_key->private_key, src, src_len,
+ compute_hash, hash, rng, sign_cb, context);
}
/* Verifies signature */
-SilcBool silc_pkcs_verify(SilcPublicKey public_key,
- unsigned char *signature,
- SilcUInt32 signature_len,
- unsigned char *data,
- SilcUInt32 data_len, SilcHash hash)
+SilcAsyncOperation silc_pkcs_verify(SilcPublicKey public_key,
+ unsigned char *signature,
+ SilcUInt32 signature_len,
+ unsigned char *data,
+ SilcUInt32 data_len,
+ SilcHash hash,
+ SilcPKCSVerifyCb verify_cb,
+ void *context)
{
- return public_key->pkcs->verify(public_key->public_key, signature,
- signature_len, data, data_len, hash);
+ return public_key->pkcs->verify(public_key->pkcs,
+ public_key->public_key, signature,
+ signature_len, data, data_len, hash, NULL,
+ verify_cb, context);
}
/* Compares two public keys and returns TRUE if they are same key, and
if (key1->pkcs->type != key2->pkcs->type)
return FALSE;
- return key1->pkcs->public_key_compare(key1->public_key, key2->public_key);
+ return key1->pkcs->public_key_compare(key1->pkcs,
+ key1->public_key, key2->public_key);
}
/* Copies the public key indicated by `public_key' and returns new allocated
return NULL;
key->pkcs = public_key->pkcs;
- key->public_key = public_key->pkcs->public_key_copy(public_key->public_key);
+ key->public_key = public_key->pkcs->public_key_copy(public_key->pkcs,
+ public_key->public_key);
if (!key->public_key) {
silc_free(key);
return NULL;
/* Loads any kind of public key */
SilcBool silc_pkcs_load_public_key(const char *filename,
+ SilcPKCSType type,
SilcPublicKey *ret_public_key)
{
unsigned char *data;
SilcUInt32 data_len;
SilcPublicKey public_key;
- SilcPKCSType type;
SILC_LOG_DEBUG(("Loading public key file '%s'", filename));
if (!ret_public_key)
return FALSE;
- data = silc_file_readfile(filename, &data_len);
- if (!data)
+ data = silc_file_readfile(filename, &data_len, NULL);
+ if (!data) {
+ SILC_LOG_ERROR(("No such file: %s", filename));
return FALSE;
+ }
/* Allocate public key context */
*ret_public_key = public_key = silc_calloc(1, sizeof(*public_key));
return FALSE;
}
- /* Try loading all types until one succeeds. */
- for (type = SILC_PKCS_SILC; type <= SILC_PKCS_SPKI; type++) {
- public_key->pkcs = silc_pkcs_find_pkcs(type);
- if (!public_key->pkcs)
- continue;
+ if (type == SILC_PKCS_ANY) {
+ /* Try loading all types until one succeeds. */
+ for (type = SILC_PKCS_SILC; type <= SILC_PKCS_SPKI; type++) {
+ public_key->pkcs = (SilcPKCSObject *)silc_pkcs_find_pkcs(type);
+ if (!public_key->pkcs)
+ continue;
+
+ if (public_key->pkcs->import_public_key_file(public_key->pkcs,
+ data, data_len,
+ SILC_PKCS_FILE_BASE64,
+ &public_key->public_key,
+ &public_key->alg)) {
+ silc_free(data);
+ return TRUE;
+ }
+
+ if (public_key->pkcs->import_public_key_file(public_key->pkcs,
+ data, data_len,
+ SILC_PKCS_FILE_BIN,
+ &public_key->public_key,
+ &public_key->alg)) {
+ silc_free(data);
+ return TRUE;
+ }
+ }
+ } else {
+ /* Load specific type */
+ public_key->pkcs = (SilcPKCSObject *)silc_pkcs_find_pkcs(type);
+ if (!public_key->pkcs) {
+ silc_free(data);
+ silc_free(public_key);
+ *ret_public_key = NULL;
+ SILC_LOG_ERROR(("Unsupported public key type"));
+ return FALSE;
+ }
- if (public_key->pkcs->import_public_key_file(data, data_len,
+ if (public_key->pkcs->import_public_key_file(public_key->pkcs,
+ data, data_len,
SILC_PKCS_FILE_BASE64,
- &public_key->public_key)) {
+ &public_key->public_key,
+ &public_key->alg)) {
silc_free(data);
return TRUE;
}
- if (public_key->pkcs->import_public_key_file(data, data_len,
+ if (public_key->pkcs->import_public_key_file(public_key->pkcs,
+ data, data_len,
SILC_PKCS_FILE_BIN,
- &public_key->public_key)) {
+ &public_key->public_key,
+ &public_key->alg)) {
silc_free(data);
return TRUE;
}
silc_free(data);
silc_free(public_key);
+ *ret_public_key = NULL;
+ SILC_LOG_ERROR(("Unsupported public key type"));
return FALSE;
}
{
unsigned char *data;
SilcUInt32 data_len;
+ SilcStack stack;
+
+ stack = silc_stack_alloc(2048, silc_crypto_stack());
/* Export the public key file */
- data = public_key->pkcs->export_public_key_file(public_key->public_key,
+ data = public_key->pkcs->export_public_key_file(public_key->pkcs,
+ stack,
+ public_key->public_key,
encoding, &data_len);
- if (!data)
+ if (!data) {
+ silc_stack_free(stack);
return FALSE;
+ }
/* Write to file */
if (silc_file_writefile(filename, data, data_len)) {
- silc_free(data);
+ silc_sfree(stack, data);
+ silc_stack_free(stack);
return FALSE;
}
- silc_free(data);
+ silc_sfree(stack, data);
+ silc_stack_free(stack);
return TRUE;
}
SilcBool silc_pkcs_load_private_key(const char *filename,
const unsigned char *passphrase,
SilcUInt32 passphrase_len,
+ SilcPKCSType type,
SilcPrivateKey *ret_private_key)
{
unsigned char *data;
SilcUInt32 data_len;
SilcPrivateKey private_key;
- SilcPKCSType type;
SILC_LOG_DEBUG(("Loading private key file '%s'", filename));
if (!ret_private_key)
return FALSE;
- data = silc_file_readfile(filename, &data_len);
- if (!data)
+ data = silc_file_readfile(filename, &data_len, NULL);
+ if (!data) {
+ SILC_LOG_ERROR(("No such file: %s", filename));
return FALSE;
+ }
/* Allocate private key context */
*ret_private_key = private_key = silc_calloc(1, sizeof(*private_key));
return FALSE;
}
- /* Try loading all types until one succeeds. */
- for (type = SILC_PKCS_SILC; type <= SILC_PKCS_SPKI; type++) {
- private_key->pkcs = silc_pkcs_find_pkcs(type);
- if (!private_key->pkcs)
- continue;
+ if (type == SILC_PKCS_ANY) {
+ /* Try loading all types until one succeeds. */
+ for (type = SILC_PKCS_SILC; type <= SILC_PKCS_SPKI; type++) {
+ private_key->pkcs = (SilcPKCSObject *)silc_pkcs_find_pkcs(type);
+ if (!private_key->pkcs)
+ continue;
+
+ if (private_key->pkcs->import_private_key_file(
+ private_key->pkcs,
+ data, data_len,
+ passphrase,
+ passphrase_len,
+ SILC_PKCS_FILE_BIN,
+ &private_key->private_key,
+ &private_key->alg)) {
+ silc_free(data);
+ return TRUE;
+ }
+
+ if (private_key->pkcs->import_private_key_file(
+ private_key->pkcs,
+ data, data_len,
+ passphrase,
+ passphrase_len,
+ SILC_PKCS_FILE_BASE64,
+ &private_key->private_key,
+ &private_key->alg)) {
+ silc_free(data);
+ return TRUE;
+ }
+ }
+ } else {
+ /* Load specific type */
+ private_key->pkcs = (SilcPKCSObject *)silc_pkcs_find_pkcs(type);
+ if (!private_key->pkcs) {
+ silc_free(data);
+ silc_free(private_key);
+ *ret_private_key = NULL;
+ SILC_LOG_ERROR(("Unsupported private key type"));
+ return FALSE;
+ }
if (private_key->pkcs->import_private_key_file(
+ private_key->pkcs,
data, data_len,
passphrase,
passphrase_len,
SILC_PKCS_FILE_BIN,
- &private_key->private_key)) {
+ &private_key->private_key,
+ &private_key->alg)) {
silc_free(data);
return TRUE;
}
if (private_key->pkcs->import_private_key_file(
+ private_key->pkcs,
data, data_len,
passphrase,
passphrase_len,
SILC_PKCS_FILE_BASE64,
- &private_key->private_key)) {
+ &private_key->private_key,
+ &private_key->alg)) {
silc_free(data);
return TRUE;
}
silc_free(data);
silc_free(private_key);
+ *ret_private_key = NULL;
return FALSE;
}
{
unsigned char *data;
SilcUInt32 data_len;
+ SilcStack stack;
+
+ stack = silc_stack_alloc(2048, silc_crypto_stack());
/* Export the private key file */
- data = private_key->pkcs->export_private_key_file(private_key->private_key,
+ data = private_key->pkcs->export_private_key_file(private_key->pkcs, stack,
+ private_key->private_key,
passphrase,
passphrase_len,
encoding, rng, &data_len);
- if (!data)
+ if (!data) {
+ silc_stack_free(stack);
return FALSE;
+ }
/* Write to file */
if (silc_file_writefile(filename, data, data_len)) {
- silc_free(data);
+ silc_sfree(stack, data);
+ silc_stack_free(stack);
return FALSE;
}
- silc_free(data);
+ silc_sfree(stack, data);
+ silc_stack_free(stack);
return TRUE;
}
+
+/* Hash public key of any type. */
+
+SilcUInt32 silc_hash_public_key(void *key, void *user_context)
+{
+ SilcPublicKey public_key = key;
+ unsigned char *pk;
+ SilcUInt32 pk_len;
+ SilcUInt32 hash = 0;
+ SilcStack stack = NULL;
+
+ if (silc_crypto_stack())
+ stack = silc_stack_alloc(2048, silc_crypto_stack());
+
+ pk = silc_pkcs_public_key_encode(stack, public_key, &pk_len);
+ if (!pk) {
+ silc_stack_free(stack);
+ return hash;
+ }
+
+ hash = silc_hash_data(pk, SILC_32_TO_PTR(pk_len));
+
+ silc_sfree(stack, pk);
+ silc_stack_free(stack);
+
+ return hash;
+}
+
+/* Compares two SILC Public keys. It may be used as SilcHashTable
+ comparison function. */
+
+SilcBool silc_hash_public_key_compare(void *key1, void *key2,
+ void *user_context)
+{
+ return silc_pkcs_public_key_compare(key1, key2);
+}