diff options
author | NIIBE Yutaka <[email protected]> | 2020-05-19 02:17:02 +0000 |
---|---|---|
committer | NIIBE Yutaka <[email protected]> | 2020-05-19 02:17:02 +0000 |
commit | 705954149b89e55d2319af37ca12ed289fdc761f (patch) | |
tree | 2e03018a30a5f042482a6278bde959e63767eff2 | |
parent | ecc-sos: Fix gpg-agent for SOS handling. (diff) | |
download | gnupg-705954149b89e55d2319af37ca12ed289fdc761f.tar.gz gnupg-705954149b89e55d2319af37ca12ed289fdc761f.zip |
ecc-sos: Fix exporting secret key for SOS.
* g10/export.c (transfer_format_to_openpgp): Use SOS.
Signed-off-by: NIIBE Yutaka <[email protected]>
-rw-r--r-- | g10/export.c | 14 |
1 files changed, 7 insertions, 7 deletions
diff --git a/g10/export.c b/g10/export.c index 458b3a02c..ffd949eb6 100644 --- a/g10/export.c +++ b/g10/export.c @@ -978,15 +978,15 @@ transfer_format_to_openpgp (gcry_sexp_t s_pgp, PKT_public_key *pk) value = gcry_sexp_nth_data (list, ++idx, &valuelen); if (!value || !valuelen) goto bad_seckey; - if (is_enc) + if (is_enc + || pk->pubkey_algo == PUBKEY_ALGO_EDDSA + || pk->pubkey_algo == PUBKEY_ALGO_ECDH) { - void *p = xtrymalloc (valuelen); - if (!p) - goto outofmem; - memcpy (p, value, valuelen); - skey[skeyidx] = gcry_mpi_set_opaque (NULL, p, valuelen*8); + skey[skeyidx] = gcry_mpi_set_opaque_copy (NULL, value, valuelen*8); if (!skey[skeyidx]) goto outofmem; + if (is_enc) + gcry_mpi_set_flag (skey[skeyidx], GCRYMPI_FLAG_USER1); } else { @@ -1144,7 +1144,7 @@ transfer_format_to_openpgp (gcry_sexp_t s_pgp, PKT_public_key *pk) /* Check that the first secret key parameter in SKEY is encrypted and that there are no more secret key parameters. The latter is guaranteed by the v4 packet format. */ - if (!gcry_mpi_get_flag (skey[npkey], GCRYMPI_FLAG_OPAQUE)) + if (!gcry_mpi_get_flag (skey[npkey], GCRYMPI_FLAG_USER1)) goto bad_seckey; if (npkey+1 < DIM (skey) && skey[npkey+1]) goto bad_seckey; |