2003-06-18 19:56:13 +00:00
|
|
|
/* pkglue.c - public key operations glue code
|
2011-01-21 12:00:57 +01:00
|
|
|
* Copyright (C) 2000, 2003, 2010 Free Software Foundation, Inc.
|
2003-06-18 19:56:13 +00:00
|
|
|
*
|
|
|
|
* This file is part of GnuPG.
|
|
|
|
*
|
|
|
|
* GnuPG is free software; you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU General Public License as published by
|
2007-07-04 19:49:40 +00:00
|
|
|
* the Free Software Foundation; either version 3 of the License, or
|
2003-06-18 19:56:13 +00:00
|
|
|
* (at your option) any later version.
|
|
|
|
*
|
|
|
|
* GnuPG is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU General Public License
|
2007-07-04 19:49:40 +00:00
|
|
|
* along with this program; if not, see <http://www.gnu.org/licenses/>.
|
2003-06-18 19:56:13 +00:00
|
|
|
*/
|
|
|
|
|
|
|
|
#include <config.h>
|
|
|
|
#include <stdio.h>
|
|
|
|
#include <stdlib.h>
|
|
|
|
#include <string.h>
|
|
|
|
#include <errno.h>
|
|
|
|
#include <assert.h>
|
|
|
|
|
|
|
|
#include "gpg.h"
|
|
|
|
#include "util.h"
|
|
|
|
#include "pkglue.h"
|
2011-01-05 17:33:17 -08:00
|
|
|
#include "main.h"
|
2003-06-18 19:56:13 +00:00
|
|
|
|
2011-01-21 12:00:57 +01:00
|
|
|
/* FIXME: Better chnage the fucntion name because mpi_ is used by
|
|
|
|
gcrypt macros. */
|
2011-01-05 17:33:17 -08:00
|
|
|
gcry_mpi_t
|
2003-08-25 21:12:43 +00:00
|
|
|
mpi_from_sexp (gcry_sexp_t sexp, const char * item)
|
|
|
|
{
|
|
|
|
gcry_sexp_t list;
|
|
|
|
gcry_mpi_t data;
|
|
|
|
|
|
|
|
list = gcry_sexp_find_token (sexp, item, 0);
|
|
|
|
assert (list);
|
|
|
|
data = gcry_sexp_nth_mpi (list, 1, 0);
|
|
|
|
assert (data);
|
|
|
|
gcry_sexp_release (list);
|
|
|
|
return data;
|
|
|
|
}
|
|
|
|
|
2003-06-18 19:56:13 +00:00
|
|
|
|
|
|
|
|
|
|
|
/****************
|
|
|
|
* Emulate our old PK interface here - sometime in the future we might
|
|
|
|
* change the internal design to directly fit to libgcrypt.
|
|
|
|
*/
|
|
|
|
int
|
2011-01-21 12:00:57 +01:00
|
|
|
pk_verify (int algo, gcry_mpi_t hash, gcry_mpi_t *data, gcry_mpi_t *pkey)
|
2003-06-18 19:56:13 +00:00
|
|
|
{
|
|
|
|
gcry_sexp_t s_sig, s_hash, s_pkey;
|
|
|
|
int rc;
|
2011-01-21 12:00:57 +01:00
|
|
|
const int pkalgo = map_pk_openpgp_to_gcry (algo);
|
2003-06-18 19:56:13 +00:00
|
|
|
|
2011-01-21 12:00:57 +01:00
|
|
|
/* Make a sexp from pkey. */
|
|
|
|
if (pkalgo == GCRY_PK_DSA)
|
2003-06-18 19:56:13 +00:00
|
|
|
{
|
|
|
|
rc = gcry_sexp_build (&s_pkey, NULL,
|
|
|
|
"(public-key(dsa(p%m)(q%m)(g%m)(y%m)))",
|
|
|
|
pkey[0], pkey[1], pkey[2], pkey[3]);
|
|
|
|
}
|
2011-01-21 12:00:57 +01:00
|
|
|
else if (pkalgo == GCRY_PK_ELG || pkalgo == GCRY_PK_ELG_E)
|
2003-06-18 19:56:13 +00:00
|
|
|
{
|
|
|
|
rc = gcry_sexp_build (&s_pkey, NULL,
|
|
|
|
"(public-key(elg(p%m)(g%m)(y%m)))",
|
|
|
|
pkey[0], pkey[1], pkey[2]);
|
|
|
|
}
|
2011-01-21 12:00:57 +01:00
|
|
|
else if (pkalgo == GCRY_PK_RSA || pkalgo == GCRY_PK_RSA_S)
|
2003-06-18 19:56:13 +00:00
|
|
|
{
|
|
|
|
rc = gcry_sexp_build (&s_pkey, NULL,
|
|
|
|
"(public-key(rsa(n%m)(e%m)))", pkey[0], pkey[1]);
|
|
|
|
}
|
2011-01-21 12:00:57 +01:00
|
|
|
else if (pkalgo == GCRY_PK_ECDSA) /* Same as GCRY_PK_ECDH */
|
2011-01-05 17:33:17 -08:00
|
|
|
{
|
|
|
|
rc = gcry_sexp_build (&s_pkey, NULL,
|
|
|
|
"(public-key(ecdsa(c%m)(q%m)))", pkey[0], pkey[1]);
|
|
|
|
}
|
2003-06-18 19:56:13 +00:00
|
|
|
else
|
|
|
|
return GPG_ERR_PUBKEY_ALGO;
|
|
|
|
|
|
|
|
if (rc)
|
2009-02-24 11:47:25 +00:00
|
|
|
BUG (); /* gcry_sexp_build should never fail. */
|
2003-06-18 19:56:13 +00:00
|
|
|
|
2011-01-21 12:00:57 +01:00
|
|
|
/* Put hash into a S-Exp s_hash. */
|
2003-06-18 19:56:13 +00:00
|
|
|
if (gcry_sexp_build (&s_hash, NULL, "%m", hash))
|
2009-02-24 11:47:25 +00:00
|
|
|
BUG (); /* gcry_sexp_build should never fail. */
|
2003-06-18 19:56:13 +00:00
|
|
|
|
2009-02-24 11:47:25 +00:00
|
|
|
/* Put data into a S-Exp s_sig. */
|
|
|
|
s_sig = NULL;
|
2011-01-21 12:00:57 +01:00
|
|
|
if (pkalgo == GCRY_PK_DSA)
|
2003-06-18 19:56:13 +00:00
|
|
|
{
|
2003-08-07 07:05:38 +00:00
|
|
|
if (!data[0] || !data[1])
|
|
|
|
rc = gpg_error (GPG_ERR_BAD_MPI);
|
|
|
|
else
|
|
|
|
rc = gcry_sexp_build (&s_sig, NULL,
|
|
|
|
"(sig-val(dsa(r%m)(s%m)))", data[0], data[1]);
|
2003-06-18 19:56:13 +00:00
|
|
|
}
|
2011-01-21 12:00:57 +01:00
|
|
|
else if (pkalgo == GCRY_PK_ECDSA)
|
2011-01-05 17:33:17 -08:00
|
|
|
{
|
|
|
|
if (!data[0] || !data[1])
|
|
|
|
rc = gpg_error (GPG_ERR_BAD_MPI);
|
|
|
|
else
|
|
|
|
rc = gcry_sexp_build (&s_sig, NULL,
|
|
|
|
"(sig-val(ecdsa(r%m)(s%m)))", data[0], data[1]);
|
|
|
|
}
|
2011-01-21 12:00:57 +01:00
|
|
|
else if (pkalgo == GCRY_PK_ELG || pkalgo == GCRY_PK_ELG_E)
|
2003-06-18 19:56:13 +00:00
|
|
|
{
|
2003-08-07 07:05:38 +00:00
|
|
|
if (!data[0] || !data[1])
|
|
|
|
rc = gpg_error (GPG_ERR_BAD_MPI);
|
|
|
|
else
|
|
|
|
rc = gcry_sexp_build (&s_sig, NULL,
|
|
|
|
"(sig-val(elg(r%m)(s%m)))", data[0], data[1]);
|
2003-06-18 19:56:13 +00:00
|
|
|
}
|
2011-01-21 12:00:57 +01:00
|
|
|
else if (pkalgo == GCRY_PK_RSA || pkalgo == GCRY_PK_RSA_S)
|
2003-06-18 19:56:13 +00:00
|
|
|
{
|
2003-08-07 07:05:38 +00:00
|
|
|
if (!data[0])
|
|
|
|
rc = gpg_error (GPG_ERR_BAD_MPI);
|
|
|
|
else
|
|
|
|
rc = gcry_sexp_build (&s_sig, NULL, "(sig-val(rsa(s%m)))", data[0]);
|
2003-06-18 19:56:13 +00:00
|
|
|
}
|
|
|
|
else
|
|
|
|
BUG ();
|
|
|
|
|
2009-02-24 11:47:25 +00:00
|
|
|
if (!rc)
|
|
|
|
rc = gcry_pk_verify (s_sig, s_hash, s_pkey);
|
2003-06-18 19:56:13 +00:00
|
|
|
|
|
|
|
gcry_sexp_release (s_sig);
|
|
|
|
gcry_sexp_release (s_hash);
|
|
|
|
gcry_sexp_release (s_pkey);
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
/****************
|
|
|
|
* Emulate our old PK interface here - sometime in the future we might
|
|
|
|
* change the internal design to directly fit to libgcrypt.
|
|
|
|
*/
|
|
|
|
int
|
2011-01-21 12:00:57 +01:00
|
|
|
pk_encrypt (int algo, gcry_mpi_t *resarr, gcry_mpi_t data,
|
|
|
|
const byte pk_fp[MAX_FINGERPRINT_LEN], gcry_mpi_t *pkey)
|
2003-06-18 19:56:13 +00:00
|
|
|
{
|
|
|
|
gcry_sexp_t s_ciph, s_data, s_pkey;
|
|
|
|
int rc;
|
|
|
|
|
2011-01-21 12:00:57 +01:00
|
|
|
/* Make a sexp from pkey. */
|
2003-06-18 19:56:13 +00:00
|
|
|
if (algo == GCRY_PK_ELG || algo == GCRY_PK_ELG_E)
|
|
|
|
{
|
|
|
|
rc = gcry_sexp_build (&s_pkey, NULL,
|
|
|
|
"(public-key(elg(p%m)(g%m)(y%m)))",
|
|
|
|
pkey[0], pkey[1], pkey[2]);
|
|
|
|
}
|
2009-09-28 14:37:48 +00:00
|
|
|
else if (algo == GCRY_PK_RSA || algo == GCRY_PK_RSA_E)
|
2003-07-03 18:08:16 +00:00
|
|
|
{
|
|
|
|
rc = gcry_sexp_build (&s_pkey, NULL,
|
|
|
|
"(public-key(rsa(n%m)(e%m)))",
|
|
|
|
pkey[0], pkey[1]);
|
|
|
|
}
|
2011-01-05 17:33:17 -08:00
|
|
|
else if (algo == PUBKEY_ALGO_ECDH)
|
|
|
|
{
|
2011-01-21 12:00:57 +01:00
|
|
|
return pk_ecdh_encrypt (resarr, pk_fp, data, pkey);
|
2011-01-05 17:33:17 -08:00
|
|
|
}
|
2003-06-18 19:56:13 +00:00
|
|
|
else
|
|
|
|
return GPG_ERR_PUBKEY_ALGO;
|
|
|
|
|
|
|
|
if (rc)
|
|
|
|
BUG ();
|
|
|
|
|
2011-01-21 12:00:57 +01:00
|
|
|
/* Put the data into a simple list. */
|
2003-06-18 19:56:13 +00:00
|
|
|
if (gcry_sexp_build (&s_data, NULL, "%m", data))
|
|
|
|
BUG ();
|
|
|
|
|
2011-01-21 12:00:57 +01:00
|
|
|
/* Pass it to libgcrypt. */
|
2003-06-18 19:56:13 +00:00
|
|
|
rc = gcry_pk_encrypt (&s_ciph, s_data, s_pkey);
|
|
|
|
gcry_sexp_release (s_data);
|
|
|
|
gcry_sexp_release (s_pkey);
|
|
|
|
|
|
|
|
if (rc)
|
|
|
|
;
|
|
|
|
else
|
2011-01-21 12:00:57 +01:00
|
|
|
{ /* Add better error handling or make gnupg use S-Exp directly. */
|
2003-08-25 21:12:43 +00:00
|
|
|
resarr[0] = mpi_from_sexp (s_ciph, "a");
|
2011-01-21 12:00:57 +01:00
|
|
|
if (algo != GCRY_PK_RSA
|
|
|
|
&& algo != GCRY_PK_RSA_E
|
|
|
|
&& algo != PUBKEY_ALGO_ECDH)
|
2003-08-25 21:12:43 +00:00
|
|
|
resarr[1] = mpi_from_sexp (s_ciph, "b");
|
2003-06-18 19:56:13 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
gcry_sexp_release (s_ciph);
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
2011-01-21 12:00:57 +01:00
|
|
|
|
2011-01-05 17:33:17 -08:00
|
|
|
/* Check whether SKEY is a suitable secret key. */
|
|
|
|
int
|
|
|
|
pk_check_secret_key (int algo, gcry_mpi_t *skey)
|
|
|
|
{
|
|
|
|
gcry_sexp_t s_skey;
|
|
|
|
int rc;
|
|
|
|
const int gcry_pkalgo = map_pk_openpgp_to_gcry( algo );
|
|
|
|
|
|
|
|
if (gcry_pkalgo == GCRY_PK_DSA)
|
|
|
|
{
|
|
|
|
rc = gcry_sexp_build (&s_skey, NULL,
|
|
|
|
"(private-key(dsa(p%m)(q%m)(g%m)(y%m)(x%m)))",
|
|
|
|
skey[0], skey[1], skey[2], skey[3], skey[4]);
|
|
|
|
}
|
|
|
|
else if (gcry_pkalgo == GCRY_PK_ELG || gcry_pkalgo == GCRY_PK_ELG_E)
|
|
|
|
{
|
|
|
|
rc = gcry_sexp_build (&s_skey, NULL,
|
|
|
|
"(private-key(elg(p%m)(g%m)(y%m)(x%m)))",
|
|
|
|
skey[0], skey[1], skey[2], skey[3]);
|
|
|
|
}
|
|
|
|
else if (gcry_pkalgo == GCRY_PK_RSA
|
|
|
|
|| gcry_pkalgo == GCRY_PK_RSA_S || gcry_pkalgo == GCRY_PK_RSA_E)
|
|
|
|
{
|
|
|
|
rc = gcry_sexp_build (&s_skey, NULL,
|
|
|
|
"(private-key(rsa(n%m)(e%m)(d%m)(p%m)(q%m)(u%m)))",
|
|
|
|
skey[0], skey[1], skey[2], skey[3], skey[4],
|
|
|
|
skey[5]);
|
|
|
|
}
|
|
|
|
else if (gcry_pkalgo == GCRY_PK_ECDSA || gcry_pkalgo == GCRY_PK_ECDH)
|
|
|
|
{
|
|
|
|
rc = gcry_sexp_build (&s_skey, NULL,
|
|
|
|
"(private-key(ecdsa(c%m)(q%m)(d%m)))",
|
|
|
|
skey[0], skey[1], skey[2] );
|
|
|
|
}
|
|
|
|
else
|
|
|
|
return GPG_ERR_PUBKEY_ALGO;
|
|
|
|
|
|
|
|
if (!rc)
|
|
|
|
{
|
|
|
|
rc = gcry_pk_testkey (s_skey);
|
|
|
|
gcry_sexp_release (s_skey);
|
|
|
|
}
|
|
|
|
return rc;
|
|
|
|
}
|