/* rsa.c * Copyright (c) 1997 by Werner Koch (dd9jn) * * This file is part of G10. * * G10 is free software; you can redistribute it and/or modify * it under the terms of the GNU General Public License as published by * the Free Software Foundation; either version 2 of the License, or * (at your option) any later version. * * G10 is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU General Public License for more details. * * You should have received a copy of the GNU General Public License * along with this program; if not, write to the Free Software * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA */ #include #include #include #include #include #include #include "options.h" #include "packet.h" #include "errors.h" #include "iobuf.h" #include "keydb.h" #include "memory.h" #include "util.h" #include "main.h" void g10_rsa_encrypt( PKT_public_cert *pkc, PKT_pubkey_enc *enc, DEK *dek ) { #ifdef HAVE_RSA_CIPHER RSA_public_key pkey; assert( enc->pubkey_algo == PUBKEY_ALGO_RSA ); keyid_from_pkc( pkc, enc->keyid ); enc->d.rsa.rsa_integer = encode_session_key( dek, mpi_get_nbits(pkc->d.rsa.rsa_n) ); pkey.n = pkc->d.rsa.rsa_n; pkey.e = pkc->d.rsa.rsa_e; if( DBG_CIPHER ) log_mpidump("Plain DEK frame: ", enc->d.rsa.rsa_integer); rsa_public( enc->d.rsa.rsa_integer, enc->d.rsa.rsa_integer, &pkey); if( DBG_CIPHER ) log_mpidump("Encry DEK frame: ", enc->d.rsa.rsa_integer); if( opt.verbose ) { char *ustr = get_user_id_string( enc->keyid ); log_info("RSA encrypted for: %s\n", ustr ); m_free(ustr); } #else log_bug(NULL); #endif/* ! HAVE_RSA_CIPHER*/ } void g10_rsa_sign( PKT_secret_cert *skc, PKT_signature *sig, MD_HANDLE md ) { #ifdef HAVE_RSA_CIPHER RSA_secret_key skey; byte *dp; assert( sig->pubkey_algo == PUBKEY_ALGO_RSA ); md_final( md ); dp = md_read( md, 0 ); keyid_from_skc( skc, sig->keyid ); sig->d.rsa.digest_algo = md_get_algo( md ); sig->d.rsa.digest_start[0] = dp[0]; sig->d.rsa.digest_start[1] = dp[1]; sig->d.rsa.rsa_integer = encode_md_value( md, mpi_get_nbits(skc->d.rsa.rsa_n)); skey.e = skc->d.rsa.rsa_e; skey.n = skc->d.rsa.rsa_n; skey.p = skc->d.rsa.rsa_p; skey.q = skc->d.rsa.rsa_q; skey.d = skc->d.rsa.rsa_d; skey.u = skc->d.rsa.rsa_u; rsa_secret( sig->d.rsa.rsa_integer, sig->d.rsa.rsa_integer, &skey); memset( &skey, 0, sizeof skey ); if( opt.verbose ) { char *ustr = get_user_id_string( sig->keyid ); log_info("RSA signature from: %s\n", ustr ); m_free(ustr); } #else log_bug(NULL); #endif/* ! HAVE_RSA_CIPHER*/ }