diff options
author | Werner Koch <wk@gnupg.org> | 2010-04-20 19:57:50 +0200 |
---|---|---|
committer | Werner Koch <wk@gnupg.org> | 2010-04-20 19:57:50 +0200 |
commit | 21b0a955be63dc69625194ece8557e79b6ad60c2 (patch) | |
tree | 97de4727b46f1f2b5dac30142e5a408c898d48fc /g10/pkglue.c | |
parent | Add missing file. (diff) | |
download | gnupg2-21b0a955be63dc69625194ece8557e79b6ad60c2.tar.xz gnupg2-21b0a955be63dc69625194ece8557e79b6ad60c2.zip |
Generating an OpenPGP key cia gpg-agent basically works.
Diffstat (limited to 'g10/pkglue.c')
-rw-r--r-- | g10/pkglue.c | 59 |
1 files changed, 1 insertions, 58 deletions
diff --git a/g10/pkglue.c b/g10/pkglue.c index cbfe21ea8..f3001f549 100644 --- a/g10/pkglue.c +++ b/g10/pkglue.c @@ -44,63 +44,6 @@ mpi_from_sexp (gcry_sexp_t sexp, const char * item) } -/**************** - * Emulate our old PK interface here - sometime in the future we might - * change the internal design to directly fit to libgcrypt. - */ -int -pk_sign (int algo, gcry_mpi_t * data, gcry_mpi_t hash, gcry_mpi_t * skey) -{ - gcry_sexp_t s_sig, s_hash, s_skey; - int rc; - - /* make a sexp from skey */ - if (algo == GCRY_PK_DSA) - { - rc = gcry_sexp_build (&s_skey, NULL, - "(private-key(dsa(p%m)(q%m)(g%m)(y%m)(x%m)))", - skey[0], skey[1], skey[2], skey[3], skey[4]); - } - else if (algo == GCRY_PK_RSA || algo == GCRY_PK_RSA_S) - { - rc = gcry_sexp_build (&s_skey, NULL, - "(private-key(rsa(n%m)(e%m)(d%m)(p%m)(q%m)(u%m)))", - skey[0], skey[1], skey[2], skey[3], skey[4], - skey[5]); - } - else if (algo == GCRY_PK_ELG || algo == GCRY_PK_ELG_E) - { - rc = gcry_sexp_build (&s_skey, NULL, - "(private-key(elg(p%m)(g%m)(y%m)(x%m)))", - skey[0], skey[1], skey[2], skey[3]); - } - else - return GPG_ERR_PUBKEY_ALGO; - - if (rc) - BUG (); - - /* put hash into a S-Exp s_hash */ - if (gcry_sexp_build (&s_hash, NULL, "%m", hash)) - BUG (); - - rc = gcry_pk_sign (&s_sig, s_hash, s_skey); - gcry_sexp_release (s_hash); - gcry_sexp_release (s_skey); - - if (rc) - ; - else if (algo == GCRY_PK_RSA || algo == GCRY_PK_RSA_S) - data[0] = mpi_from_sexp (s_sig, "s"); - else - { - data[0] = mpi_from_sexp (s_sig, "r"); - data[1] = mpi_from_sexp (s_sig, "s"); - } - - gcry_sexp_release (s_sig); - return rc; -} /**************** * Emulate our old PK interface here - sometime in the future we might @@ -304,7 +247,7 @@ pk_decrypt (int algo, gcry_mpi_t * result, gcry_mpi_t * data, /* Check whether SKEY is a suitable secret key. */ int -pk_check_secret_key (int algo, gcry_mpi_t *skey) +REMOVE_ME_pk_check_secret_key (int algo, gcry_mpi_t *skey) { gcry_sexp_t s_skey; int rc; |