2003-06-18 21:56:13 +02:00
|
|
|
/* pkglue.h - public key operations definitions
|
2011-01-21 12:00:57 +01:00
|
|
|
* Copyright (C) 2003, 2010 Free Software Foundation, Inc.
|
2003-06-18 21:56:13 +02:00
|
|
|
*
|
|
|
|
* This file is part of GnuPG.
|
|
|
|
*
|
|
|
|
* GnuPG is free software; you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU General Public License as published by
|
2007-07-04 21:49:40 +02:00
|
|
|
* the Free Software Foundation; either version 3 of the License, or
|
2003-06-18 21:56:13 +02:00
|
|
|
* (at your option) any later version.
|
|
|
|
*
|
|
|
|
* GnuPG is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU General Public License
|
2016-11-05 12:02:19 +01:00
|
|
|
* along with this program; if not, see <https://www.gnu.org/licenses/>.
|
2003-06-18 21:56:13 +02:00
|
|
|
*/
|
|
|
|
|
|
|
|
#ifndef GNUPG_G10_PKGLUE_H
|
|
|
|
#define GNUPG_G10_PKGLUE_H
|
|
|
|
|
2011-02-02 17:40:32 +01:00
|
|
|
#include "packet.h" /* For PKT_public_key. */
|
|
|
|
|
2011-01-25 17:48:51 +01:00
|
|
|
/*-- pkglue.c --*/
|
2013-11-15 08:59:45 +01:00
|
|
|
gcry_mpi_t get_mpi_from_sexp (gcry_sexp_t sexp, const char *item, int mpifmt);
|
2020-06-09 03:32:47 +02:00
|
|
|
gpg_error_t sexp_extract_param_sos (gcry_sexp_t sexp, const char *param,
|
|
|
|
gcry_mpi_t *r_sos);
|
2021-12-10 07:39:32 +01:00
|
|
|
gpg_error_t sexp_extract_param_sos_nlz (gcry_sexp_t sexp, const char *param,
|
|
|
|
gcry_mpi_t *r_sos);
|
2011-01-06 02:33:17 +01:00
|
|
|
|
gpg: Use only OpenPGP public key algo ids and add the EdDSA algo id.
* common/sexputil.c (get_pk_algo_from_canon_sexp): Change to return a
string.
* g10/keygen.c (check_keygrip): Adjust for change.
* sm/certreqgen-ui.c (check_keygrip): Likewise.
* agent/pksign.c (do_encode_dsa): Remove bogus map_pk_openpgp_to_gcry.
* g10/misc.c (map_pk_openpgp_to_gcry): Remove.
(openpgp_pk_test_algo): Change to a wrapper for openpgp_pk_test_algo2.
(openpgp_pk_test_algo2): Rewrite.
(openpgp_pk_algo_usage, pubkey_nbits): Add support for EdDSA.
(openpgp_pk_algo_name): Rewrite to remove need for gcry calls.
(pubkey_get_npkey, pubkey_get_nskey): Ditto.
(pubkey_get_nsig, pubkey_get_nenc): Ditto.
* g10/keygen.c(do_create_from_keygrip): Support EdDSA.
(common_gen, gen_ecc, ask_keysize, generate_keypair): Ditto.
* g10/build-packet.c (do_key): Ditto.
* g10/export.c (transfer_format_to_openpgp): Ditto.
* g10/getkey.c (cache_public_key): Ditto.
* g10/import.c (transfer_secret_keys): Ditto.
* g10/keylist.c (list_keyblock_print, list_keyblock_colon): Ditto.
* g10/mainproc.c (proc_pubkey_enc): Ditto.
* g10/parse-packet.c (parse_key): Ditto,
* g10/sign.c (hash_for, sign_file, make_keysig_packet): Ditto.
* g10/keyserver.c (print_keyrec): Use openpgp_pk_algo_name.
* g10/pkglue.c (pk_verify, pk_encrypt, pk_check_secret_key): Use only
OpenPGP algo ids and support EdDSA.
* g10/pubkey-enc.c (get_it): Use only OpenPGP algo ids.
* g10/seskey.c (encode_md_value): Ditto.
--
This patch separates Libgcrypt and OpenPGP public key algorithms ids
and in most cases completely removes the Libgcrypt ones. This is
useful because for Libgcrypt we specify the algorithm in the
S-expressions and the public key ids are not anymore needed.
This patch also adds some support for PUBKEY_ALGO_EDDSA which will
eventually be used instead of merging EdDSA with ECDSA. As of now an
experimental algorithm id is used but the plan is to write an I-D so
that we can get a new id from the IETF. Note that EdDSA (Ed25519)
does not yet work and that more changes are required.
The ECC support is still broken right now. Needs to be fixed.
Signed-off-by: Werner Koch <wk@gnupg.org>
2014-01-30 18:48:37 +01:00
|
|
|
int pk_verify (pubkey_algo_t algo, gcry_mpi_t hash, gcry_mpi_t *data,
|
2003-06-18 21:56:13 +02:00
|
|
|
gcry_mpi_t *pkey);
|
2024-04-15 09:23:16 +02:00
|
|
|
gpg_error_t pk_encrypt (PKT_public_key *pk, gcry_mpi_t data, int seskey_algo,
|
2024-04-12 10:43:12 +02:00
|
|
|
gcry_mpi_t *resarr);
|
gpg: Use only OpenPGP public key algo ids and add the EdDSA algo id.
* common/sexputil.c (get_pk_algo_from_canon_sexp): Change to return a
string.
* g10/keygen.c (check_keygrip): Adjust for change.
* sm/certreqgen-ui.c (check_keygrip): Likewise.
* agent/pksign.c (do_encode_dsa): Remove bogus map_pk_openpgp_to_gcry.
* g10/misc.c (map_pk_openpgp_to_gcry): Remove.
(openpgp_pk_test_algo): Change to a wrapper for openpgp_pk_test_algo2.
(openpgp_pk_test_algo2): Rewrite.
(openpgp_pk_algo_usage, pubkey_nbits): Add support for EdDSA.
(openpgp_pk_algo_name): Rewrite to remove need for gcry calls.
(pubkey_get_npkey, pubkey_get_nskey): Ditto.
(pubkey_get_nsig, pubkey_get_nenc): Ditto.
* g10/keygen.c(do_create_from_keygrip): Support EdDSA.
(common_gen, gen_ecc, ask_keysize, generate_keypair): Ditto.
* g10/build-packet.c (do_key): Ditto.
* g10/export.c (transfer_format_to_openpgp): Ditto.
* g10/getkey.c (cache_public_key): Ditto.
* g10/import.c (transfer_secret_keys): Ditto.
* g10/keylist.c (list_keyblock_print, list_keyblock_colon): Ditto.
* g10/mainproc.c (proc_pubkey_enc): Ditto.
* g10/parse-packet.c (parse_key): Ditto,
* g10/sign.c (hash_for, sign_file, make_keysig_packet): Ditto.
* g10/keyserver.c (print_keyrec): Use openpgp_pk_algo_name.
* g10/pkglue.c (pk_verify, pk_encrypt, pk_check_secret_key): Use only
OpenPGP algo ids and support EdDSA.
* g10/pubkey-enc.c (get_it): Use only OpenPGP algo ids.
* g10/seskey.c (encode_md_value): Ditto.
--
This patch separates Libgcrypt and OpenPGP public key algorithms ids
and in most cases completely removes the Libgcrypt ones. This is
useful because for Libgcrypt we specify the algorithm in the
S-expressions and the public key ids are not anymore needed.
This patch also adds some support for PUBKEY_ALGO_EDDSA which will
eventually be used instead of merging EdDSA with ECDSA. As of now an
experimental algorithm id is used but the plan is to write an I-D so
that we can get a new id from the IETF. Note that EdDSA (Ed25519)
does not yet work and that more changes are required.
The ECC support is still broken right now. Needs to be fixed.
Signed-off-by: Werner Koch <wk@gnupg.org>
2014-01-30 18:48:37 +01:00
|
|
|
int pk_check_secret_key (pubkey_algo_t algo, gcry_mpi_t *skey);
|
2003-06-18 21:56:13 +02:00
|
|
|
|
2011-01-25 17:48:51 +01:00
|
|
|
|
|
|
|
/*-- ecdh.c --*/
|
2011-01-31 09:27:06 +01:00
|
|
|
gcry_mpi_t pk_ecdh_default_params (unsigned int qbits);
|
2011-01-25 20:28:25 +01:00
|
|
|
gpg_error_t pk_ecdh_generate_ephemeral_key (gcry_mpi_t *pkey, gcry_mpi_t *r_k);
|
|
|
|
gpg_error_t pk_ecdh_encrypt_with_shared_point
|
2020-06-09 08:45:51 +02:00
|
|
|
/* */ (const char *shared, size_t nshared,
|
2011-01-25 20:28:25 +01:00
|
|
|
const byte pk_fp[MAX_FINGERPRINT_LEN],
|
2020-06-09 08:45:51 +02:00
|
|
|
const byte *data, size_t ndata,
|
|
|
|
gcry_mpi_t *pkey,
|
2011-01-25 20:28:25 +01:00
|
|
|
gcry_mpi_t *out);
|
|
|
|
|
2011-01-21 12:00:57 +01:00
|
|
|
int pk_ecdh_encrypt (gcry_mpi_t *resarr, const byte pk_fp[MAX_FINGERPRINT_LEN],
|
|
|
|
gcry_mpi_t data, gcry_mpi_t * pkey);
|
|
|
|
int pk_ecdh_decrypt (gcry_mpi_t *result, const byte sk_fp[MAX_FINGERPRINT_LEN],
|
2020-06-09 08:45:51 +02:00
|
|
|
gcry_mpi_t data,
|
|
|
|
const byte *frame, size_t nframe,
|
|
|
|
gcry_mpi_t * skey);
|
2011-01-06 02:33:17 +01:00
|
|
|
|
2003-06-18 21:56:13 +02:00
|
|
|
|
|
|
|
#endif /*GNUPG_G10_PKGLUE_H*/
|