diff options
author | Werner Koch <[email protected]> | 2020-05-07 07:45:49 +0000 |
---|---|---|
committer | Werner Koch <[email protected]> | 2020-05-07 07:45:49 +0000 |
commit | 5c29d25e6c7c0a5a63ab4c46d4624217307adb78 (patch) | |
tree | f0db0cd96dba84e83982034af3325320542f33ea /sm/gpgsm.h | |
parent | scd:nks: Support decryption using ECDH. (diff) | |
download | gnupg-5c29d25e6c7c0a5a63ab4c46d4624217307adb78.tar.gz gnupg-5c29d25e6c7c0a5a63ab4c46d4624217307adb78.zip |
sm: Print the key types as standard key algorithm strings.
* sm/fingerprint.c (gpgsm_get_key_algo_info): Factor code out to ...
(gpgsm_get_key_algo_info2): new.
(gpgsm_pubkey_algo_string): New.
* sm/keylist.c (list_cert_colon): Put curve into field 17
(list_cert_raw): Print the unified key algotithm string instead of the
algo and size.
(list_cert_std): Ditto.
--
It is important to known whether a 256 bit ECC uses a NIST or a
Brainpool curve.
Signed-off-by: Werner Koch <[email protected]>
Diffstat (limited to 'sm/gpgsm.h')
-rw-r--r-- | sm/gpgsm.h | 3 |
1 files changed, 3 insertions, 0 deletions
diff --git a/sm/gpgsm.h b/sm/gpgsm.h index 580f2d6f6..c4df8496e 100644 --- a/sm/gpgsm.h +++ b/sm/gpgsm.h @@ -286,6 +286,9 @@ unsigned long gpgsm_get_short_fingerprint (ksba_cert_t cert, unsigned char *gpgsm_get_keygrip (ksba_cert_t cert, unsigned char *array); char *gpgsm_get_keygrip_hexstring (ksba_cert_t cert); int gpgsm_get_key_algo_info (ksba_cert_t cert, unsigned int *nbits); +int gpgsm_get_key_algo_info2 (ksba_cert_t cert, unsigned int *nbits, + char **r_curve); +char *gpgsm_pubkey_algo_string (ksba_cert_t cert, int *r_algoid); gcry_mpi_t gpgsm_get_rsa_modulus (ksba_cert_t cert); char *gpgsm_get_certid (ksba_cert_t cert); |