text stringlengths 0 357 |
|---|
pgp_subkey_t* p = &pubkey.subkeys[pubkey.subkeyc++]; |
pgp_pubkey_dup(&p->key.pubkey, &subkey.key.pubkey); |
pgp_keyid(subkeyid, PGP_KEY_ID_SIZE, &pubkey.key.pubkey, PGP_HASH_SHA1); |
memcpy(p->id, subkeyid, PGP_KEY_ID_SIZE); |
} |
EXPAND_ARRAY((&pubkey), subkeysig); |
add_subkey_binding_signature(&pubkey.subkeysigs[pubkey.subkeysigc++], &pubkey, &subkey, &seckey); |
/* Create secret key, bind secret subkey to secret key |
------------------------------------------------------------------------ */ |
EXPAND_ARRAY((&seckey), subkey); |
{ |
pgp_subkey_t* p = &seckey.subkeys[seckey.subkeyc++]; |
pgp_seckey_dup(&p->key.seckey, &subkey.key.seckey); |
pgp_keyid(subkeyid, PGP_KEY_ID_SIZE, &seckey.key.pubkey, PGP_HASH_SHA1); |
memcpy(p->id, subkeyid, PGP_KEY_ID_SIZE); |
} |
EXPAND_ARRAY((&seckey), subkeysig); |
add_subkey_binding_signature(&seckey.subkeysigs[seckey.subkeysigc++], &seckey, &subkey, &seckey); |
/* Done with key generation, write binary keys to memory |
------------------------------------------------------------------------ */ |
pgp_writer_set_memory(pubout, pubmem); |
if (!pgp_write_xfer_key(pubout, &pubkey, 0/*armored*/) |
|| pubmem->buf==NULL || pubmem->length <= 0) { |
goto cleanup; |
} |
pgp_writer_set_memory(secout, secmem); |
if (!pgp_write_xfer_key(secout, &seckey, 0/*armored*/) |
|| secmem->buf==NULL || secmem->length <= 0) { |
goto cleanup; |
} |
dc_key_set_from_binary(ret_public_key, pubmem->buf, pubmem->length, DC_KEY_PUBLIC); |
dc_key_set_from_binary(ret_private_key, secmem->buf, secmem->length, DC_KEY_PRIVATE); |
success = 1; |
cleanup: |
if (pubout) { pgp_output_delete(pubout); } |
if (secout) { pgp_output_delete(secout); } |
if (pubmem) { pgp_memory_free(pubmem); } |
if (secmem) { pgp_memory_free(secmem); } |
pgp_key_free(&seckey); /* not: pgp_keydata_free() which will also free the pointer itself (we created it on the stack) */ |
pgp_key_free(&pubkey); |
pgp_key_free(&subkey); |
free(user_id); |
return success; |
} |
#endif // !DC_USE_RPGP |
/******************************************************************************* |
* Check keys |
******************************************************************************/ |
#ifdef DC_USE_RPGP |
int dc_pgp_is_valid_key(dc_context_t* context, const dc_key_t* raw_key) |
{ |
int key_is_valid = 0; |
rpgp_public_or_secret_key* key = NULL; |
if (context==NULL || raw_key==NULL || raw_key->binary==NULL || raw_key->bytes <= 0) { |
goto cleanup; |
} |
key = rpgp_key_from_bytes(raw_key->binary, raw_key->bytes); |
if (dc_pgp_handle_rpgp_error(context)) { |
goto cleanup; |
} |
if (raw_key->type==DC_KEY_PUBLIC && rpgp_key_is_public(key)) { |
key_is_valid = 1; |
} |
else if (raw_key->type==DC_KEY_PRIVATE && rpgp_key_is_secret(key)) { |
key_is_valid = 1; |
} |
cleanup: |
if (key) { rpgp_key_drop(key); } |
return key_is_valid; |
} |
#else // !DC_USE_RPGP |
int dc_pgp_is_valid_key(dc_context_t* context, const dc_key_t* raw_key) |
{ |
int key_is_valid = 0; |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.