text
stringlengths
0
357
pgp_subkey_t* p = &pubkey.subkeys[pubkey.subkeyc++];
pgp_pubkey_dup(&p->key.pubkey, &subkey.key.pubkey);
pgp_keyid(subkeyid, PGP_KEY_ID_SIZE, &pubkey.key.pubkey, PGP_HASH_SHA1);
memcpy(p->id, subkeyid, PGP_KEY_ID_SIZE);
}
EXPAND_ARRAY((&pubkey), subkeysig);
add_subkey_binding_signature(&pubkey.subkeysigs[pubkey.subkeysigc++], &pubkey, &subkey, &seckey);
/* Create secret key, bind secret subkey to secret key
------------------------------------------------------------------------ */
EXPAND_ARRAY((&seckey), subkey);
{
pgp_subkey_t* p = &seckey.subkeys[seckey.subkeyc++];
pgp_seckey_dup(&p->key.seckey, &subkey.key.seckey);
pgp_keyid(subkeyid, PGP_KEY_ID_SIZE, &seckey.key.pubkey, PGP_HASH_SHA1);
memcpy(p->id, subkeyid, PGP_KEY_ID_SIZE);
}
EXPAND_ARRAY((&seckey), subkeysig);
add_subkey_binding_signature(&seckey.subkeysigs[seckey.subkeysigc++], &seckey, &subkey, &seckey);
/* Done with key generation, write binary keys to memory
------------------------------------------------------------------------ */
pgp_writer_set_memory(pubout, pubmem);
if (!pgp_write_xfer_key(pubout, &pubkey, 0/*armored*/)
|| pubmem->buf==NULL || pubmem->length <= 0) {
goto cleanup;
}
pgp_writer_set_memory(secout, secmem);
if (!pgp_write_xfer_key(secout, &seckey, 0/*armored*/)
|| secmem->buf==NULL || secmem->length <= 0) {
goto cleanup;
}
dc_key_set_from_binary(ret_public_key, pubmem->buf, pubmem->length, DC_KEY_PUBLIC);
dc_key_set_from_binary(ret_private_key, secmem->buf, secmem->length, DC_KEY_PRIVATE);
success = 1;
cleanup:
if (pubout) { pgp_output_delete(pubout); }
if (secout) { pgp_output_delete(secout); }
if (pubmem) { pgp_memory_free(pubmem); }
if (secmem) { pgp_memory_free(secmem); }
pgp_key_free(&seckey); /* not: pgp_keydata_free() which will also free the pointer itself (we created it on the stack) */
pgp_key_free(&pubkey);
pgp_key_free(&subkey);
free(user_id);
return success;
}
#endif // !DC_USE_RPGP
/*******************************************************************************
* Check keys
******************************************************************************/
#ifdef DC_USE_RPGP
int dc_pgp_is_valid_key(dc_context_t* context, const dc_key_t* raw_key)
{
int key_is_valid = 0;
rpgp_public_or_secret_key* key = NULL;
if (context==NULL || raw_key==NULL || raw_key->binary==NULL || raw_key->bytes <= 0) {
goto cleanup;
}
key = rpgp_key_from_bytes(raw_key->binary, raw_key->bytes);
if (dc_pgp_handle_rpgp_error(context)) {
goto cleanup;
}
if (raw_key->type==DC_KEY_PUBLIC && rpgp_key_is_public(key)) {
key_is_valid = 1;
}
else if (raw_key->type==DC_KEY_PRIVATE && rpgp_key_is_secret(key)) {
key_is_valid = 1;
}
cleanup:
if (key) { rpgp_key_drop(key); }
return key_is_valid;
}
#else // !DC_USE_RPGP
int dc_pgp_is_valid_key(dc_context_t* context, const dc_key_t* raw_key)
{
int key_is_valid = 0;