release 0.2.3
[gnupg.git] / g10 / seckey-cert.c
index ab10340..855e3d1 100644 (file)
@@ -85,6 +85,9 @@ check_elg( PKT_secret_cert *cert )
            blowfish_decode_cfb( blowfish_ctx,
                                 cert->d.elg.protect.blowfish.iv,
                                 cert->d.elg.protect.blowfish.iv, 8 );
+           mpi_set_secure(cert->d.elg.x );
+           /*fixme: maybe it is better to set the buger secure with a
+            * new get_buffer_secure() function */
            buffer = mpi_get_buffer( cert->d.elg.x, &nbytes, NULL );
            csum = checksum_u16( nbytes*8 );
            blowfish_decode_cfb( blowfish_ctx, buffer, buffer, nbytes );
@@ -196,6 +199,7 @@ check_rsa( PKT_secret_cert *cert )
                                 cert->d.rsa.protect.blowfish.iv, 8 );
            csum = 0;
            #define X(a) do { \
+               mpi_set_secure(cert->d.rsa.rsa_##a); \
                buffer = mpi_get_buffer( cert->d.rsa.rsa_##a, &nbytes, NULL );\
                csum += checksum_u16( nbytes*8 );                            \
                blowfish_decode_cfb( blowfish_ctx, buffer, buffer, nbytes ); \
@@ -313,7 +317,7 @@ protect_secret_key( PKT_secret_cert *cert, DEK *dek )
 
     if( cert->pubkey_algo == PUBKEY_ALGO_ELGAMAL )
        return protect_elg( cert, dek );
-  #ifdef 0 /* noy yet implemented */
+  #if 0 /* noy yet implemented */
     else if( cert->pubkey_algo == PUBKEY_ALGO_RSA )
        return protect_rsa( cert, dek );
   #endif