diff options
author | Andreas Schneider <asn@cryptomilk.org> | 2011-08-07 16:56:33 +0200 |
---|---|---|
committer | Andreas Schneider <asn@cryptomilk.org> | 2011-08-08 15:28:31 +0200 |
commit | 36ee2d3332cd44de5ea9916a82f26d9ac5134d42 (patch) | |
tree | 14ef0e455d40805c9de0cd390fbb402974a29f51 /src/pki_crypto.c | |
parent | f55cd7de431018bc1799aa9616006569d90f0fcc (diff) | |
download | libssh-36ee2d3332cd44de5ea9916a82f26d9ac5134d42.tar.gz libssh-36ee2d3332cd44de5ea9916a82f26d9ac5134d42.tar.xz libssh-36ee2d3332cd44de5ea9916a82f26d9ac5134d42.zip |
pki: Create pki_publickey_from_privatekey().
Diffstat (limited to 'src/pki_crypto.c')
-rw-r--r-- | src/pki_crypto.c | 57 |
1 files changed, 57 insertions, 0 deletions
diff --git a/src/pki_crypto.c b/src/pki_crypto.c index 4d095220..532e1ea9 100644 --- a/src/pki_crypto.c +++ b/src/pki_crypto.c @@ -161,4 +161,61 @@ fail: return NULL; } +ssh_key pki_publickey_from_privatekey(ssh_key privkey) { + ssh_key pubkey = NULL; + + if (privkey == NULL || !ssh_key_is_private(privkey)) { + return NULL; + } + + pubkey = ssh_key_new(); + if (pubkey == NULL) { + return NULL; + } + pubkey->type = privkey->type; + + switch (pubkey->type) { + case SSH_KEYTYPE_DSS: + pubkey->dsa = DSA_new(); + if (pubkey->dsa == NULL) { + goto fail; + } + pubkey->dsa->p = BN_dup(privkey->dsa->p); + pubkey->dsa->q = BN_dup(privkey->dsa->q); + pubkey->dsa->g = BN_dup(privkey->dsa->g); + pubkey->dsa->pub_key = BN_dup(privkey->dsa->pub_key); + if (pubkey->dsa->p == NULL || + pubkey->dsa->q == NULL || + pubkey->dsa->g == NULL || + pubkey->dsa->pub_key == NULL) { + goto fail; + } + break; + case SSH_KEYTYPE_RSA: + case SSH_KEYTYPE_RSA1: + pubkey->rsa = RSA_new(); + if (pubkey->rsa == NULL) { + goto fail; + } + pubkey->rsa->e = BN_dup(privkey->rsa->e); + pubkey->rsa->n = BN_dup(privkey->rsa->n); + if (pubkey->rsa->e == NULL || + pubkey->rsa->n == NULL) { + goto fail; + } + break; + case SSH_KEYTYPE_ECDSA: + case SSH_KEYTYPE_UNKNOWN: + ssh_key_free(pubkey); + return NULL; + } + pubkey->type_c = ssh_key_type_to_char(privkey->type); + + return pubkey; +fail: + ssh_key_free(pubkey); + + return NULL; +} + #endif /* _PKI_CRYPTO_H */ |