ops_boolean_t ops_write_keyring_to_file(const ops_keyring_t *keyring,ops_boolean_t armoured,const char *filename,ops_boolean_t write_all_packets) { ops_create_info_t *info; int fd = ops_setup_file_write(&info, filename, ops_true); if (fd < 0) { fprintf(stderr,"ops_write_keyring(): ERROR: Cannot write to %s\n",filename ) ; return ops_false ; } int i; for(i=0;i<keyring->nkeys;++i) // if(keyring->keys[i].key.pkey.algorithm == OPS_PKA_RSA) if(write_all_packets) ops_write_transferable_public_key_from_packet_data(&keyring->keys[i],armoured,info) ; else ops_write_transferable_public_key(&keyring->keys[i],armoured,info) ; // else // { // fprintf(stdout, "ops_write_keyring: not writing key. Algorithm not handled: ") ; // ops_print_public_keydata(&keyring->keys[i]); // fprintf(stdout, "\n") ; // } ops_writer_close(info); ops_create_info_delete(info); return ops_true ; }
/** \ingroup Core_Writers \brief Closes writer, frees info, closes fd \param cinfo \param fd */ void ops_teardown_file_write(ops_create_info_t *cinfo, int fd) { ops_writer_close(cinfo); close(fd); ops_create_info_delete(cinfo); }
/** \ingroup HighLevel_KeyGenerate \brief Generates an RSA keypair \param numbits Modulus size \param e Public Exponent \param keydata Pointer to keydata struct to hold new key \return ops_true if key generated successfully; otherwise ops_false \note It is the caller's responsibility to call ops_keydata_free(keydata) */ ops_boolean_t ops_rsa_generate_keypair(const int numbits, const unsigned long e, ops_keydata_t* keydata) { ops_secret_key_t *skey=NULL; RSA *rsa=RSA_new(); BN_CTX *ctx=BN_CTX_new(); BIGNUM *ebn=BN_new(); ops_keydata_init(keydata,OPS_PTAG_CT_SECRET_KEY); skey=ops_get_writable_secret_key_from_data(keydata); // generate the key pair BN_set_word(ebn,e); RSA_generate_key_ex(rsa,numbits,ebn,NULL); // populate ops key from ssl key skey->public_key.version=4; skey->public_key.creation_time=time(NULL); skey->public_key.days_valid=0; skey->public_key.algorithm= OPS_PKA_RSA; skey->public_key.key.rsa.n=BN_dup(rsa->n); skey->public_key.key.rsa.e=BN_dup(rsa->e); skey->s2k_usage=OPS_S2KU_ENCRYPTED_AND_HASHED; skey->s2k_specifier=OPS_S2KS_SALTED; //skey->s2k_specifier=OPS_S2KS_SIMPLE; skey->algorithm=OPS_SA_CAST5; // \todo make param skey->hash_algorithm=OPS_HASH_SHA1; // \todo make param skey->octet_count=0; skey->checksum=0; skey->key.rsa.d=BN_dup(rsa->d); skey->key.rsa.p=BN_dup(rsa->p); skey->key.rsa.q=BN_dup(rsa->q); skey->key.rsa.u=BN_mod_inverse(NULL,rsa->p, rsa->q, ctx); assert(skey->key.rsa.u); BN_CTX_free(ctx); RSA_free(rsa); ops_keyid(keydata->key_id, &keydata->key.skey.public_key); ops_fingerprint(&keydata->fingerprint, &keydata->key.skey.public_key); // Generate checksum ops_create_info_t *cinfo=NULL; ops_memory_t *mem=NULL; ops_setup_memory_write(&cinfo, &mem, 128); ops_push_skey_checksum_writer(cinfo, skey); switch(skey->public_key.algorithm) { // case OPS_PKA_DSA: // return ops_write_mpi(key->key.dsa.x,info); case OPS_PKA_RSA: case OPS_PKA_RSA_ENCRYPT_ONLY: case OPS_PKA_RSA_SIGN_ONLY: if(!ops_write_mpi(skey->key.rsa.d,cinfo) || !ops_write_mpi(skey->key.rsa.p,cinfo) || !ops_write_mpi(skey->key.rsa.q,cinfo) || !ops_write_mpi(skey->key.rsa.u,cinfo)) return ops_false; break; // case OPS_PKA_ELGAMAL: // return ops_write_mpi(key->key.elgamal.x,info); default: assert(0); break; } // close rather than pop, since its the only one on the stack ops_writer_close(cinfo); ops_teardown_memory_write(cinfo, mem); // should now have checksum in skey struct // test if (debug) test_secret_key(skey); return ops_true; }
/** \ingroup Core_Writers \brief Closes writer and frees cinfo and mem \param cinfo \param mem \sa ops_setup_memory_write() */ void ops_teardown_memory_write(ops_create_info_t *cinfo, ops_memory_t *mem) { ops_writer_close(cinfo); // new ops_create_info_delete(cinfo); ops_memory_free(mem); }