diff options
author | Werner Koch <[email protected]> | 1997-12-31 12:32:54 +0000 |
---|---|---|
committer | Werner Koch <[email protected]> | 1997-12-31 12:32:54 +0000 |
commit | 4d2636eafe40bc11f2f08254ad9f5a5d376cb268 (patch) | |
tree | f3e5a05befb494ba699d8607802370b9576dcd20 /g10/rsa.c | |
parent | changed configuration stuff, replaced some Makefile.am by distfiles. (diff) | |
download | gnupg-4d2636eafe40bc11f2f08254ad9f5a5d376cb268.tar.gz gnupg-4d2636eafe40bc11f2f08254ad9f5a5d376cb268.zip |
Sylvester Version
Diffstat (limited to '')
-rw-r--r-- | g10/rsa.c | 100 |
1 files changed, 100 insertions, 0 deletions
diff --git a/g10/rsa.c b/g10/rsa.c new file mode 100644 index 000000000..fe4ba2eb0 --- /dev/null +++ b/g10/rsa.c @@ -0,0 +1,100 @@ +/* rsa.c + * Copyright (c) 1997 by Werner Koch (dd9jn) + * + * This file is part of G10. + * + * G10 is free software; you can redistribute it and/or modify + * it under the terms of the GNU General Public License as published by + * the Free Software Foundation; either version 2 of the License, or + * (at your option) any later version. + * + * G10 is distributed in the hope that it will be useful, + * but WITHOUT ANY WARRANTY; without even the implied warranty of + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + * GNU General Public License for more details. + * + * You should have received a copy of the GNU General Public License + * along with this program; if not, write to the Free Software + * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA + */ + +#include <config.h> +#include <stdio.h> +#include <stdlib.h> +#include <string.h> +#include <errno.h> +#include <assert.h> + +#include "options.h" +#include "packet.h" +#include "errors.h" +#include "iobuf.h" +#include "keydb.h" +#include "memory.h" +#include "util.h" +#include "main.h" + +void +g10_rsa_encrypt( PKT_public_cert *pkc, PKT_pubkey_enc *enc, DEK *dek ) +{ + #ifdef HAVE_RSA_CIPHER + RSA_public_key pkey; + + assert( enc->pubkey_algo == PUBKEY_ALGO_RSA ); + + keyid_from_pkc( pkc, enc->keyid ); + enc->d.rsa.rsa_integer = encode_session_key( dek, + mpi_get_nbits(pkc->d.rsa.rsa_n) ); + pkey.n = pkc->d.rsa.rsa_n; + pkey.e = pkc->d.rsa.rsa_e; + if( DBG_CIPHER ) + log_mpidump("Plain DEK frame: ", enc->d.rsa.rsa_integer); + rsa_public( enc->d.rsa.rsa_integer, enc->d.rsa.rsa_integer, &pkey); + if( DBG_CIPHER ) + log_mpidump("Encry DEK frame: ", enc->d.rsa.rsa_integer); + if( opt.verbose ) { + char *ustr = get_user_id_string( enc->keyid ); + log_info("RSA encrypted for: %s\n", ustr ); + m_free(ustr); + } + #else + log_bug(NULL); + #endif/* ! HAVE_RSA_CIPHER*/ +} + + +void +g10_rsa_sign( PKT_secret_cert *skc, PKT_signature *sig, MD_HANDLE *md ) +{ + #ifdef HAVE_RSA_CIPHER + RSA_secret_key skey; + byte *dp; + + assert( sig->pubkey_algo == PUBKEY_ALGO_RSA ); + + dp = md_final( md ); + + keyid_from_skc( skc, sig->keyid ); + sig->d.rsa.digest_algo = md->algo; + sig->d.rsa.digest_start[0] = dp[0]; + sig->d.rsa.digest_start[1] = dp[1]; + sig->d.rsa.rsa_integer = + encode_md_value( md, mpi_get_nbits(skc->d.rsa.rsa_n)); + skey.e = skc->d.rsa.rsa_e; + skey.n = skc->d.rsa.rsa_n; + skey.p = skc->d.rsa.rsa_p; + skey.q = skc->d.rsa.rsa_q; + skey.d = skc->d.rsa.rsa_d; + skey.u = skc->d.rsa.rsa_u; + rsa_secret( sig->d.rsa.rsa_integer, sig->d.rsa.rsa_integer, &skey); + memset( &skey, 0, sizeof skey ); + if( opt.verbose ) { + char *ustr = get_user_id_string( sig->keyid ); + log_info("RSA signature from: %s\n", ustr ); + m_free(ustr); + } + #else + log_bug(NULL); + #endif/* ! HAVE_RSA_CIPHER*/ +} + |