summaryrefslogtreecommitdiffstats
path: root/sm
diff options
context:
space:
mode:
authorNIIBE Yutaka <gniibe@fsij.org>2020-03-26 03:30:58 +0100
committerNIIBE Yutaka <gniibe@fsij.org>2020-03-26 03:30:58 +0100
commit238707db8b05a385af5419e606ea5110ace31d2b (patch)
treeda422a941056db736d6eb6b4296d508424d27b91 /sm
parentgpgconf: Take care of --homedir when reading/updating options. (diff)
downloadgnupg2-238707db8b05a385af5419e606ea5110ace31d2b.tar.xz
gnupg2-238707db8b05a385af5419e606ea5110ace31d2b.zip
gpgsm: Remove restriction of key generation (only RSA).
* sm/certreqgen.c (proc_parameters): Remove checking GCRY_PK_RSA. -- This is an initial change to support ECC key generation. GnuPG-bug-id: 4888 Signed-off-by: NIIBE Yutaka <gniibe@fsij.org>
Diffstat (limited to 'sm')
-rw-r--r--sm/certreqgen.c17
1 files changed, 9 insertions, 8 deletions
diff --git a/sm/certreqgen.c b/sm/certreqgen.c
index d5c857b08..364afbef2 100644
--- a/sm/certreqgen.c
+++ b/sm/certreqgen.c
@@ -433,6 +433,7 @@ proc_parameters (ctrl_t ctrl, struct para_data_s *para,
struct para_data_s *r;
const char *s, *string;
int i;
+ int algo;
unsigned int nbits;
char numbuf[20];
unsigned char keyparms[100];
@@ -446,22 +447,22 @@ proc_parameters (ctrl_t ctrl, struct para_data_s *para,
/* Check that we have all required parameters; */
assert (get_parameter (para, pKEYTYPE, 0));
- /* We can only use RSA for now. There is a problem with pkcs-10 on
- how to use ElGamal because it is expected that a PK algorithm can
- always be used for signing. Another problem is that on-card
- generated encryption keys may not be used for signing. */
- i = get_parameter_algo (para, pKEYTYPE);
- if (!i && (s = get_parameter_value (para, pKEYTYPE, 0)) && *s)
+ /* There is a problem with pkcs-10 on how to use ElGamal because it
+ is expected that a PK algorithm can always be used for
+ signing. Another problem is that on-card generated encryption
+ keys may not be used for signing. */
+ algo = get_parameter_algo (para, pKEYTYPE);
+ if (!algo && (s = get_parameter_value (para, pKEYTYPE, 0)) && *s)
{
/* Hack to allow creation of certificates directly from a smart
card. For example: "Key-Type: card:OPENPGP.3". */
if (!strncmp (s, "card:", 5) && s[5])
cardkeyid = xtrystrdup (s+5);
}
- if ( (i < 1 || i != GCRY_PK_RSA) && !cardkeyid )
+ if (algo < 1 && !cardkeyid)
{
r = get_parameter (para, pKEYTYPE, 0);
- log_error (_("line %d: invalid algorithm\n"), r->lnr);
+ log_error (_("line %d: invalid algorithm\n"), r ? r->lnr: -1);
return gpg_error (GPG_ERR_INV_PARAMETER);
}