⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 pgppubkey.c

📁 著名的加密软件的应用于电子邮件中
💻 C
字号:
/*
* pgpPubKey.c
*
* Copyright (C) 1995-1997 Pretty Good Privacy, Inc. All rights reserved.
*
* $Id: pgpPubKey.c,v 1.8.2.6 1997/06/10 04:26:34 hal Exp $
*/

#ifdef HAVE_CONFIG_H
#include "config.h"
#endif

#include "pgpDebug.h"
#include "pgpErr.h"
#include "pgpPubKey.h"
#include "pgpKeyMisc.h"
#include "pgpRSAKey.h"
#include "pgpElGKey.h"
#include "pgpDSAKey.h"
#include "pgpFixedKey.h"

struct PgpPkAlg {
	byte pkAlg;
	int use;
};

static struct PgpPkAlg const pgpKnownPkAlgs[] = {
	{ PGP_PKALG_RSA, PGP_PKUSE_SIGN_ENCRYPT },
	{ PGP_PKALG_RSA_SIG, PGP_PKUSE_SIGN },
	{ PGP_PKALG_RSA_ENC, PGP_PKUSE_ENCRYPT },
	{ PGP_PKALG_ELGAMAL, PGP_PKUSE_ENCRYPT },
	{ PGP_PKALG_DSA, PGP_PKUSE_SIGN }
};

/* Return whether an algorithm can sign, encrypt, or do both */
struct PgpPkAlg const *
pgpPkalgByNumber(byte pkalg)
{
	unsigned i;

	pkalg = ALGMASK(pkalg);
	for (i = 0; i < sizeof(pgpKnownPkAlgs)/sizeof(*pgpKnownPkAlgs); i++) {
		if (pgpKnownPkAlgs[i].pkAlg == pkalg)
			return pgpKnownPkAlgs + i;
	}
	return NULL;
}

int
pgpKeyUse(struct PgpPkAlg const *pkalg)
{
	if (!pkalg)
		return 0;		 /* It's no use... */
	return pkalg->use;
}

struct PgpPubKey *
pgpPubKeyFromBuf(byte pkAlg, byte const *p, size_t len, int *error)
{
	struct PgpPubKey *pub;

	switch (ALGMASK(pkAlg)) {
	case PGP_PKALG_RSA:
	case PGP_PKALG_RSA_SIG:
	case PGP_PKALG_RSA_ENC:
#if(!NO_RSA)
		pub = rsaPubFromBuf(p, len, error);
		if (pub)
			pub->pkAlg = pkAlg;
#else
		pub = NULL;
		*error = PGPERR_KEY_NO_RSA;
		/*Avoid Warnings:*/
		(void) p;
		(void) len;
#endif
		return pub;
	case PGP_PKALG_ELGAMAL:
		pub = elgPubFromBuf(p, len, error);
		if (pub)
			pub->pkAlg = pkAlg;
		return pub;
	case PGP_PKALG_DSA:
		pub = dsaPubFromBuf(p, len, error);
		if (pub)
			pub->pkAlg = pkAlg;
		return pub;
	default:
		*error = PGPERR_KEY_PKALG;
		return 0;
	}
	
}

struct PgpSecKey *
pgpSecKeyFromBuf(byte pkAlg, byte const *p, size_t len, int *error)
{
	struct PgpSecKey *sec;

	switch(ALGMASK(pkAlg)) {
	case PGP_PKALG_RSA:
	case PGP_PKALG_RSA_SIG:
	case PGP_PKALG_RSA_ENC:
#if (!NO_RSA)
		sec = rsaSecFromBuf(p, len, error);
		if (sec)
			sec->pkAlg = pkAlg;
#else
		sec = NULL;
		*error = PGPERR_KEY_NO_RSA;
		/*Avoid Warnings:*/
		(void) p;
		(void) len;
#endif
		return sec;
	case PGP_PKALG_ELGAMAL:
		sec = elgSecFromBuf(p, len, error);
		if (sec)
			sec->pkAlg = pkAlg;
		return sec;
	case PGP_PKALG_DSA:
		sec = dsaSecFromBuf(p, len, error);
		if (sec)
			sec->pkAlg = pkAlg;
		return sec;
	default:
		*error = PGPERR_KEY_PKALG;
		return 0;
	}
}

/*
* Scan a buffer and return the size of the part which corresponds to
* a public key. This is intended to be "lightweight" and not require
* the overhead of instantiating a struct PgpPubKey.
*
* This rturns 0 if the size is unknown.
*/
size_t
pgpPubKeyPrefixSize(byte pkAlg, byte const *p, size_t len)
{
	switch(ALGMASK(pkAlg)) {
	case PGP_PKALG_RSA:
	case PGP_PKALG_RSA_SIG:
	case PGP_PKALG_RSA_ENC:
#if (!NO_RSA)
				return rsaPubKeyPrefixSize(p, len);
#else
				/* We know it is 2 MPI values, just parse past those */
				return pgpBnParse(p, len, 2, NULL, NULL);
#endif
		
	case PGP_PKALG_ELGAMAL:
		return elgPubKeyPrefixSize(p, len);
	case PGP_PKALG_DSA:
		return dsaPubKeyPrefixSize(p, len);
	default:
		return 0;
	}
}

/*
* The "progress" function is called periodically during key
* generation to indicate that *something* is happening.
* The "int c" gives a bit of indication as to *what* is
* happening. In fact, this is just the character that text-mode
* PGP prints! It will do as well as any other sort of enum
* and makes life simple.
*
* The meaning of the character is somewhat type-dependent, but
* the convention so far is:
* '.' - Failed pseudoprimality test
* '/' - Redoing initial setup work
* '-' - Passed pseudoprimality test, further work needed
* '+' - Passed pseudoprimality test, further work needed
* '*' - Passed pseudoprimality test - almost done!
* ' ' - Completed part of key generation, on to next phase.
* (Sorry, no way to know how many phases there are...)
*/

struct PgpSecKey *
pgpSecKeyGenerate(struct PgpPkAlg const *alg, unsigned bits,
	Boolean fastgen,
	struct PgpRandomContext const *rc,
	int (*progress)(void *arg, int c), void *arg, int *error)
{
	struct PgpSecKey *sec;
	byte pkAlg;

	pgpAssert (alg);
	pkAlg = alg->pkAlg;
	switch(ALGMASK(pkAlg)) {
	case PGP_PKALG_RSA:
#if (!NO_RSA && !NO_RSA_KEYGEN)
		sec = rsaSecGenerate(bits, fastgen, rc, progress, arg, error);
		if (sec)
			sec->pkAlg = pkAlg;
		return sec;
#else
		*error = PGPERR_KEY_NO_RSA;
		return(NULL);
#endif
	case PGP_PKALG_ELGAMAL:
		sec = elgSecGenerate(bits, fastgen, rc, progress, arg, error);
		if (sec)
			sec->pkAlg = pkAlg;
		return sec;
	case PGP_PKALG_DSA:
		sec = dsaSecGenerate(bits, fastgen, rc, progress, arg, error);
		if (sec)
			sec->pkAlg = pkAlg;
		return sec;
	default:
		*error = PGPERR_KEY_PKALG;
		return 0;
	}
}

/*
* Return the amount of entropy needed to generate this key.
* Entropy is a security parameter, controlling the amount of
* unpredictability needed in the key.
* We have to be sure to return a value at least as big as the actual
* depletion of the randpool which the keygen creates.
* For simplicity and predictability, we return the non-fastgen values
* throughout, even though they are a bit larger for DSA & ELG keys.
* (The +64 in the RSA case, and +128 in the DSA case, is for the secret
* key encryption IV and salt when the secret key is encrypted with the
* passphrase.)
*/
unsigned
pgpSecKeyEntropy(struct PgpPkAlg const *pkAlg, unsigned bits, Boolean fastgen)
{
	unsigned xbits;

	(void)fastgen;

	pgpAssert (pkAlg);
	switch (ALGMASK(pkAlg->pkAlg)) {
		case PGP_PKALG_RSA:
		case PGP_PKALG_RSA_SIG:
		case PGP_PKALG_RSA_ENC:
			return bits + 64;
		case PGP_PKALG_ELGAMAL:
			xbits = pgpDiscreteLogExponentBits(bits)*3/2 + 128;
			/* Always return fastgen value
			* if (!fastgen || !pgpElGfixed (bits, NULL, NULL, NULL, NULL))
			*/
				xbits += ELGDUMMYBITS;
			return xbits;
		case PGP_PKALG_DSA:
			/*
			* Count the ~160 bits each needed to generate the self signature
			* on the key's userid, and on the subkey, in addition to the
			* secret exponent. That is why the 3* below.
			*/
			xbits = 3*((bits<=1024)?160:pgpDiscreteLogExponentBits(bits)) + 128;
			/* Always return fastgen value
			* if (!fastgen || !pgpDSAfixed (bits, NULL, NULL, NULL, NULL))
			*/
				xbits += DSADUMMYBITS;
			return xbits;
	}
	pgpAssert (0);
	return 0;
}


/*
 * Local Variables:
 * tab-width: 4
 * End:
 * vi: ts=4 sw=4
 * vim: si
 */

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -