1998-01-02 20:40:10 +00:00
|
|
|
|
/* trustdb.c
|
2008-11-18 17:15:07 +00:00
|
|
|
|
* Copyright (C) 1998, 1999, 2000, 2001, 2002, 2003, 2004, 2005, 2006, 2007,
|
2012-01-19 22:33:51 -05:00
|
|
|
|
* 2008, 2012 Free Software Foundation, Inc.
|
1998-01-02 20:40:10 +00:00
|
|
|
|
*
|
1998-12-23 12:41:40 +00:00
|
|
|
|
* This file is part of GnuPG.
|
1998-01-02 20:40:10 +00:00
|
|
|
|
*
|
1998-12-23 12:41:40 +00:00
|
|
|
|
* GnuPG is free software; you can redistribute it and/or modify
|
1998-01-02 20:40:10 +00:00
|
|
|
|
* it under the terms of the GNU General Public License as published by
|
2007-10-23 10:48:09 +00:00
|
|
|
|
* the Free Software Foundation; either version 3 of the License, or
|
1998-01-02 20:40:10 +00:00
|
|
|
|
* (at your option) any later version.
|
|
|
|
|
*
|
1998-12-23 12:41:40 +00:00
|
|
|
|
* GnuPG is distributed in the hope that it will be useful,
|
1998-01-02 20:40:10 +00:00
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
|
* GNU General Public License for more details.
|
|
|
|
|
*
|
|
|
|
|
* You should have received a copy of the GNU General Public License
|
2007-10-23 10:48:09 +00:00
|
|
|
|
* along with this program; if not, see <http://www.gnu.org/licenses/>.
|
1998-01-02 20:40:10 +00:00
|
|
|
|
*/
|
|
|
|
|
|
|
|
|
|
#include <config.h>
|
|
|
|
|
#include <stdio.h>
|
|
|
|
|
#include <stdlib.h>
|
|
|
|
|
#include <string.h>
|
|
|
|
|
#include <assert.h>
|
|
|
|
|
|
2002-10-30 03:11:57 +00:00
|
|
|
|
#ifndef DISABLE_REGEX
|
|
|
|
|
#include <sys/types.h>
|
2005-12-06 20:54:05 +00:00
|
|
|
|
#ifdef USE_INTERNAL_REGEX
|
2002-10-30 03:11:57 +00:00
|
|
|
|
#include "_regex.h"
|
|
|
|
|
#else
|
|
|
|
|
#include <regex.h>
|
|
|
|
|
#endif
|
|
|
|
|
#endif /* !DISABLE_REGEX */
|
|
|
|
|
|
1998-01-02 20:40:10 +00:00
|
|
|
|
#include "errors.h"
|
|
|
|
|
#include "iobuf.h"
|
|
|
|
|
#include "keydb.h"
|
2002-06-29 13:46:34 +00:00
|
|
|
|
#include "memory.h"
|
1998-01-02 20:40:10 +00:00
|
|
|
|
#include "util.h"
|
1998-01-12 10:18:17 +00:00
|
|
|
|
#include "options.h"
|
1998-01-16 21:15:24 +00:00
|
|
|
|
#include "packet.h"
|
|
|
|
|
#include "main.h"
|
1998-04-02 10:30:03 +00:00
|
|
|
|
#include "i18n.h"
|
1998-07-09 13:37:17 +00:00
|
|
|
|
#include "tdbio.h"
|
2002-06-29 13:46:34 +00:00
|
|
|
|
#include "trustdb.h"
|
1998-12-08 12:20:53 +00:00
|
|
|
|
|
1998-01-16 21:15:24 +00:00
|
|
|
|
|
2002-06-29 13:46:34 +00:00
|
|
|
|
/*
|
|
|
|
|
* A structure to store key identification as well as some stuff needed
|
2013-10-11 09:25:58 +02:00
|
|
|
|
* for validation
|
2002-06-29 13:46:34 +00:00
|
|
|
|
*/
|
|
|
|
|
struct key_item {
|
|
|
|
|
struct key_item *next;
|
2002-10-30 03:11:57 +00:00
|
|
|
|
unsigned int ownertrust,min_ownertrust;
|
|
|
|
|
byte trust_depth;
|
|
|
|
|
byte trust_value;
|
|
|
|
|
char *trust_regexp;
|
2002-06-29 13:46:34 +00:00
|
|
|
|
u32 kid[2];
|
1998-11-03 19:38:58 +00:00
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
|
2002-06-29 13:46:34 +00:00
|
|
|
|
typedef struct key_item **KeyHashTable; /* see new_key_hash_table() */
|
1998-11-03 19:38:58 +00:00
|
|
|
|
|
2002-06-29 13:46:34 +00:00
|
|
|
|
/*
|
|
|
|
|
* Structure to keep track of keys, this is used as an array wherre
|
2013-10-11 09:25:58 +02:00
|
|
|
|
* the item right after the last one has a keyblock set to NULL.
|
2002-06-29 13:46:34 +00:00
|
|
|
|
* Maybe we can drop this thing and replace it by key_item
|
|
|
|
|
*/
|
|
|
|
|
struct key_array {
|
|
|
|
|
KBNODE keyblock;
|
1999-03-08 19:50:18 +00:00
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
|
2002-06-29 13:46:34 +00:00
|
|
|
|
/* control information for the trust DB */
|
1999-02-24 10:12:32 +00:00
|
|
|
|
static struct {
|
|
|
|
|
int init;
|
|
|
|
|
int level;
|
|
|
|
|
char *dbname;
|
2013-10-11 09:25:58 +02:00
|
|
|
|
int no_trustdb; /* Set if a trustdb file is not available. */
|
1999-02-24 10:12:32 +00:00
|
|
|
|
} trustdb_args;
|
1998-10-07 13:30:43 +00:00
|
|
|
|
|
2002-06-29 13:46:34 +00:00
|
|
|
|
/* some globals */
|
|
|
|
|
static struct key_item *user_utk_list; /* temp. used to store --trusted-keys */
|
|
|
|
|
static struct key_item *utk_list; /* all ultimately trusted keys */
|
1998-10-07 13:30:43 +00:00
|
|
|
|
|
2002-06-29 13:46:34 +00:00
|
|
|
|
static int pending_check_trustdb;
|
1998-10-16 16:00:17 +00:00
|
|
|
|
|
2002-06-29 13:46:34 +00:00
|
|
|
|
static int validate_keys (int interactive);
|
1998-10-07 13:30:43 +00:00
|
|
|
|
|
1998-09-28 19:25:31 +00:00
|
|
|
|
|
1998-01-30 20:25:31 +00:00
|
|
|
|
/**********************************************
|
2002-06-29 13:46:34 +00:00
|
|
|
|
************* some helpers *******************
|
1998-01-30 20:25:31 +00:00
|
|
|
|
**********************************************/
|
|
|
|
|
|
2002-06-29 13:46:34 +00:00
|
|
|
|
static struct key_item *
|
|
|
|
|
new_key_item (void)
|
1998-01-30 20:25:31 +00:00
|
|
|
|
{
|
2002-06-29 13:46:34 +00:00
|
|
|
|
struct key_item *k;
|
2013-10-11 09:25:58 +02:00
|
|
|
|
|
2005-07-27 18:10:56 +00:00
|
|
|
|
k = xmalloc_clear (sizeof *k);
|
2002-06-29 13:46:34 +00:00
|
|
|
|
return k;
|
1998-01-30 20:25:31 +00:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void
|
2002-06-29 13:46:34 +00:00
|
|
|
|
release_key_items (struct key_item *k)
|
1998-01-30 20:25:31 +00:00
|
|
|
|
{
|
2002-06-29 13:46:34 +00:00
|
|
|
|
struct key_item *k2;
|
2000-07-14 17:34:53 +00:00
|
|
|
|
|
2002-06-29 13:46:34 +00:00
|
|
|
|
for (; k; k = k2)
|
|
|
|
|
{
|
|
|
|
|
k2 = k->next;
|
2005-07-27 18:10:56 +00:00
|
|
|
|
xfree (k->trust_regexp);
|
|
|
|
|
xfree (k);
|
2000-07-14 17:34:53 +00:00
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2002-06-29 13:46:34 +00:00
|
|
|
|
/*
|
|
|
|
|
* For fast keylook up we need a hash table. Each byte of a KeyIDs
|
|
|
|
|
* should be distributed equally over the 256 possible values (except
|
|
|
|
|
* for v3 keyIDs but we consider them as not important here). So we
|
2013-10-11 09:25:58 +02:00
|
|
|
|
* can just use 10 bits to index a table of 1024 key items.
|
2002-06-29 13:46:34 +00:00
|
|
|
|
* Possible optimization: Don not use key_items but other hash_table when the
|
2013-10-11 09:25:58 +02:00
|
|
|
|
* duplicates lists gets too large.
|
1998-01-30 20:25:31 +00:00
|
|
|
|
*/
|
2013-10-11 09:25:58 +02:00
|
|
|
|
static KeyHashTable
|
2002-06-29 13:46:34 +00:00
|
|
|
|
new_key_hash_table (void)
|
1998-01-30 20:25:31 +00:00
|
|
|
|
{
|
2002-06-29 13:46:34 +00:00
|
|
|
|
struct key_item **tbl;
|
|
|
|
|
|
2005-07-27 18:10:56 +00:00
|
|
|
|
tbl = xmalloc_clear (1024 * sizeof *tbl);
|
2002-06-29 13:46:34 +00:00
|
|
|
|
return tbl;
|
1998-01-30 20:25:31 +00:00
|
|
|
|
}
|
|
|
|
|
|
2002-06-29 13:46:34 +00:00
|
|
|
|
static void
|
|
|
|
|
release_key_hash_table (KeyHashTable tbl)
|
1998-01-30 20:25:31 +00:00
|
|
|
|
{
|
2002-06-29 13:46:34 +00:00
|
|
|
|
int i;
|
1998-01-30 20:25:31 +00:00
|
|
|
|
|
2002-06-29 13:46:34 +00:00
|
|
|
|
if (!tbl)
|
|
|
|
|
return;
|
|
|
|
|
for (i=0; i < 1024; i++)
|
|
|
|
|
release_key_items (tbl[i]);
|
2005-07-27 18:10:56 +00:00
|
|
|
|
xfree (tbl);
|
1998-01-30 20:25:31 +00:00
|
|
|
|
}
|
|
|
|
|
|
2013-10-11 09:25:58 +02:00
|
|
|
|
/*
|
2002-06-29 13:46:34 +00:00
|
|
|
|
* Returns: True if the keyID is in the given hash table
|
|
|
|
|
*/
|
|
|
|
|
static int
|
|
|
|
|
test_key_hash_table (KeyHashTable tbl, u32 *kid)
|
1999-03-11 15:42:06 +00:00
|
|
|
|
{
|
2002-06-29 13:46:34 +00:00
|
|
|
|
struct key_item *k;
|
1999-03-11 15:42:06 +00:00
|
|
|
|
|
2002-06-29 13:46:34 +00:00
|
|
|
|
for (k = tbl[(kid[1] & 0x03ff)]; k; k = k->next)
|
|
|
|
|
if (k->kid[0] == kid[0] && k->kid[1] == kid[1])
|
|
|
|
|
return 1;
|
|
|
|
|
return 0;
|
1999-03-11 15:42:06 +00:00
|
|
|
|
}
|
|
|
|
|
|
2002-06-29 13:46:34 +00:00
|
|
|
|
/*
|
|
|
|
|
* Add a new key to the hash table. The key is identified by its key ID.
|
|
|
|
|
*/
|
1999-03-11 15:42:06 +00:00
|
|
|
|
static void
|
2002-06-29 13:46:34 +00:00
|
|
|
|
add_key_hash_table (KeyHashTable tbl, u32 *kid)
|
1999-03-11 15:42:06 +00:00
|
|
|
|
{
|
2002-06-29 13:46:34 +00:00
|
|
|
|
struct key_item *k, *kk;
|
1999-03-11 15:42:06 +00:00
|
|
|
|
|
2002-06-29 13:46:34 +00:00
|
|
|
|
for (k = tbl[(kid[1] & 0x03ff)]; k; k = k->next)
|
|
|
|
|
if (k->kid[0] == kid[0] && k->kid[1] == kid[1])
|
|
|
|
|
return; /* already in table */
|
2013-10-11 09:25:58 +02:00
|
|
|
|
|
2002-06-29 13:46:34 +00:00
|
|
|
|
kk = new_key_item ();
|
|
|
|
|
kk->kid[0] = kid[0];
|
|
|
|
|
kk->kid[1] = kid[1];
|
|
|
|
|
kk->next = tbl[(kid[1] & 0x03ff)];
|
|
|
|
|
tbl[(kid[1] & 0x03ff)] = kk;
|
|
|
|
|
}
|
1999-03-11 15:42:06 +00:00
|
|
|
|
|
2002-06-29 13:46:34 +00:00
|
|
|
|
/*
|
|
|
|
|
* Release a key_array
|
|
|
|
|
*/
|
1999-03-11 15:42:06 +00:00
|
|
|
|
static void
|
2002-06-29 13:46:34 +00:00
|
|
|
|
release_key_array ( struct key_array *keys )
|
1999-03-11 15:42:06 +00:00
|
|
|
|
{
|
2002-06-29 13:46:34 +00:00
|
|
|
|
struct key_array *k;
|
1999-03-11 15:42:06 +00:00
|
|
|
|
|
2002-06-29 13:46:34 +00:00
|
|
|
|
if (keys) {
|
|
|
|
|
for (k=keys; k->keyblock; k++)
|
|
|
|
|
release_kbnode (k->keyblock);
|
2005-07-27 18:10:56 +00:00
|
|
|
|
xfree (keys);
|
1999-03-11 15:42:06 +00:00
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2002-06-29 13:46:34 +00:00
|
|
|
|
|
|
|
|
|
/*********************************************
|
|
|
|
|
********** Initialization *****************
|
|
|
|
|
*********************************************/
|
1999-03-11 15:42:06 +00:00
|
|
|
|
|
|
|
|
|
|
1998-01-30 20:25:31 +00:00
|
|
|
|
|
2002-06-29 13:46:34 +00:00
|
|
|
|
/*
|
|
|
|
|
* Used to register extra ultimately trusted keys - this has to be done
|
|
|
|
|
* before initializing the validation module.
|
|
|
|
|
* FIXME: Should be replaced by a function to add those keys to the trustdb.
|
1998-07-21 12:53:38 +00:00
|
|
|
|
*/
|
2002-06-29 13:46:34 +00:00
|
|
|
|
void
|
2003-11-01 01:13:16 +00:00
|
|
|
|
register_trusted_keyid(u32 *keyid)
|
1998-01-30 20:25:31 +00:00
|
|
|
|
{
|
2002-06-29 13:46:34 +00:00
|
|
|
|
struct key_item *k;
|
1998-01-16 21:15:24 +00:00
|
|
|
|
|
2002-06-29 13:46:34 +00:00
|
|
|
|
k = new_key_item ();
|
2003-11-01 01:13:16 +00:00
|
|
|
|
k->kid[0] = keyid[0];
|
|
|
|
|
k->kid[1] = keyid[1];
|
2002-06-29 13:46:34 +00:00
|
|
|
|
k->next = user_utk_list;
|
|
|
|
|
user_utk_list = k;
|
1998-10-12 20:16:38 +00:00
|
|
|
|
}
|
|
|
|
|
|
2003-11-01 01:13:16 +00:00
|
|
|
|
void
|
|
|
|
|
register_trusted_key( const char *string )
|
|
|
|
|
{
|
|
|
|
|
KEYDB_SEARCH_DESC desc;
|
|
|
|
|
|
|
|
|
|
if (classify_user_id (string, &desc) != KEYDB_SEARCH_MODE_LONG_KID )
|
|
|
|
|
{
|
|
|
|
|
log_error(_("`%s' is not a valid long keyID\n"), string );
|
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
register_trusted_keyid(desc.u.kid);
|
|
|
|
|
}
|
|
|
|
|
|
2002-06-29 13:46:34 +00:00
|
|
|
|
/*
|
|
|
|
|
* Helper to add a key to the global list of ultimately trusted keys.
|
|
|
|
|
* Retruns: true = inserted, false = already in in list.
|
|
|
|
|
*/
|
1999-03-11 15:42:06 +00:00
|
|
|
|
static int
|
2002-06-29 13:46:34 +00:00
|
|
|
|
add_utk (u32 *kid)
|
1999-03-11 15:42:06 +00:00
|
|
|
|
{
|
2002-06-29 13:46:34 +00:00
|
|
|
|
struct key_item *k;
|
1999-03-11 15:42:06 +00:00
|
|
|
|
|
2013-10-11 09:25:58 +02:00
|
|
|
|
for (k = utk_list; k; k = k->next)
|
2002-06-29 13:46:34 +00:00
|
|
|
|
{
|
|
|
|
|
if (k->kid[0] == kid[0] && k->kid[1] == kid[1])
|
|
|
|
|
{
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
1999-03-11 15:42:06 +00:00
|
|
|
|
}
|
|
|
|
|
|
2002-06-29 13:46:34 +00:00
|
|
|
|
k = new_key_item ();
|
|
|
|
|
k->kid[0] = kid[0];
|
|
|
|
|
k->kid[1] = kid[1];
|
|
|
|
|
k->ownertrust = TRUST_ULTIMATE;
|
|
|
|
|
k->next = utk_list;
|
|
|
|
|
utk_list = k;
|
|
|
|
|
if( opt.verbose > 1 )
|
2004-03-15 23:15:57 +00:00
|
|
|
|
log_info(_("key %s: accepted as trusted key\n"), keystr(kid));
|
2002-06-29 13:46:34 +00:00
|
|
|
|
return 1;
|
1999-06-29 19:50:54 +00:00
|
|
|
|
}
|
1998-01-12 10:18:17 +00:00
|
|
|
|
|
1998-01-16 21:15:24 +00:00
|
|
|
|
|
2002-06-29 13:46:34 +00:00
|
|
|
|
/****************
|
|
|
|
|
* Verify that all our secret keys are usable and put them into the utk_list.
|
|
|
|
|
*/
|
|
|
|
|
static void
|
|
|
|
|
verify_own_keys(void)
|
2000-09-18 14:35:34 +00:00
|
|
|
|
{
|
2002-06-29 13:46:34 +00:00
|
|
|
|
TRUSTREC rec;
|
|
|
|
|
ulong recnum;
|
|
|
|
|
int rc;
|
|
|
|
|
struct key_item *k;
|
|
|
|
|
|
|
|
|
|
if (utk_list)
|
|
|
|
|
return;
|
2000-09-18 14:35:34 +00:00
|
|
|
|
|
2002-06-29 13:46:34 +00:00
|
|
|
|
/* scan the trustdb to find all ultimately trusted keys */
|
2013-10-11 09:25:58 +02:00
|
|
|
|
for (recnum=1; !tdbio_read_record (recnum, &rec, 0); recnum++ )
|
2002-06-29 13:46:34 +00:00
|
|
|
|
{
|
2013-10-11 09:25:58 +02:00
|
|
|
|
if ( rec.rectype == RECTYPE_TRUST
|
2002-06-29 13:46:34 +00:00
|
|
|
|
&& (rec.r.trust.ownertrust & TRUST_MASK) == TRUST_ULTIMATE)
|
|
|
|
|
{
|
|
|
|
|
byte *fpr = rec.r.trust.fingerprint;
|
|
|
|
|
int fprlen;
|
|
|
|
|
u32 kid[2];
|
2013-10-11 09:25:58 +02:00
|
|
|
|
|
2002-06-29 13:46:34 +00:00
|
|
|
|
/* Problem: We do only use fingerprints in the trustdb but
|
|
|
|
|
* we need the keyID here to indetify the key; we can only
|
|
|
|
|
* use that ugly hack to distinguish between 16 and 20
|
|
|
|
|
* butes fpr - it does not work always so we better change
|
|
|
|
|
* the whole validation code to only work with
|
|
|
|
|
* fingerprints */
|
|
|
|
|
fprlen = (!fpr[16] && !fpr[17] && !fpr[18] && !fpr[19])? 16:20;
|
|
|
|
|
keyid_from_fingerprint (fpr, fprlen, kid);
|
|
|
|
|
if (!add_utk (kid))
|
2004-03-15 23:15:57 +00:00
|
|
|
|
log_info(_("key %s occurs more than once in the trustdb\n"),
|
|
|
|
|
keystr(kid));
|
2002-06-29 13:46:34 +00:00
|
|
|
|
}
|
|
|
|
|
}
|
2003-01-06 22:56:08 +00:00
|
|
|
|
|
|
|
|
|
/* Put any --trusted-key keys into the trustdb */
|
2013-10-11 09:25:58 +02:00
|
|
|
|
for (k = user_utk_list; k; k = k->next)
|
2002-06-29 13:46:34 +00:00
|
|
|
|
{
|
2013-10-11 09:25:58 +02:00
|
|
|
|
if ( add_utk (k->kid) )
|
2002-06-29 13:46:34 +00:00
|
|
|
|
{ /* not yet in trustDB as ultimately trusted */
|
|
|
|
|
PKT_public_key pk;
|
|
|
|
|
|
|
|
|
|
memset (&pk, 0, sizeof pk);
|
|
|
|
|
rc = get_pubkey (&pk, k->kid);
|
2004-03-15 23:15:57 +00:00
|
|
|
|
if (rc)
|
|
|
|
|
log_info(_("key %s: no public key for trusted key - skipped\n"),
|
|
|
|
|
keystr(k->kid));
|
|
|
|
|
else
|
|
|
|
|
{
|
|
|
|
|
update_ownertrust (&pk,
|
|
|
|
|
((get_ownertrust (&pk) & ~TRUST_MASK)
|
|
|
|
|
| TRUST_ULTIMATE ));
|
|
|
|
|
release_public_key_parts (&pk);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
log_info (_("key %s marked as ultimately trusted\n"),keystr(k->kid));
|
2002-06-29 13:46:34 +00:00
|
|
|
|
}
|
2000-09-18 14:35:34 +00:00
|
|
|
|
}
|
|
|
|
|
|
2002-06-29 13:46:34 +00:00
|
|
|
|
/* release the helper table table */
|
|
|
|
|
release_key_items (user_utk_list);
|
|
|
|
|
user_utk_list = NULL;
|
|
|
|
|
return;
|
|
|
|
|
}
|
2000-09-18 14:35:34 +00:00
|
|
|
|
|
2002-06-29 13:46:34 +00:00
|
|
|
|
|
|
|
|
|
/*********************************************
|
|
|
|
|
*********** TrustDB stuff *******************
|
|
|
|
|
*********************************************/
|
2000-09-18 14:35:34 +00:00
|
|
|
|
|
2002-06-29 13:46:34 +00:00
|
|
|
|
/*
|
|
|
|
|
* Read a record but die if it does not exist
|
|
|
|
|
*/
|
2000-09-18 14:35:34 +00:00
|
|
|
|
static void
|
2002-06-29 13:46:34 +00:00
|
|
|
|
read_record (ulong recno, TRUSTREC *rec, int rectype )
|
2000-09-18 14:35:34 +00:00
|
|
|
|
{
|
2002-06-29 13:46:34 +00:00
|
|
|
|
int rc = tdbio_read_record (recno, rec, rectype);
|
|
|
|
|
if (rc)
|
|
|
|
|
{
|
|
|
|
|
log_error(_("trust record %lu, req type %d: read failed: %s\n"),
|
|
|
|
|
recno, rec->rectype, g10_errstr(rc) );
|
|
|
|
|
tdbio_invalid();
|
2000-09-18 14:35:34 +00:00
|
|
|
|
}
|
2002-06-29 13:46:34 +00:00
|
|
|
|
if (rectype != rec->rectype)
|
|
|
|
|
{
|
|
|
|
|
log_error(_("trust record %lu is not of requested type %d\n"),
|
|
|
|
|
rec->recnum, rectype);
|
|
|
|
|
tdbio_invalid();
|
2000-09-18 14:35:34 +00:00
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2002-06-29 13:46:34 +00:00
|
|
|
|
/*
|
|
|
|
|
* Write a record and die on error
|
1998-01-13 19:04:23 +00:00
|
|
|
|
*/
|
2002-06-29 13:46:34 +00:00
|
|
|
|
static void
|
|
|
|
|
write_record (TRUSTREC *rec)
|
1998-01-13 19:04:23 +00:00
|
|
|
|
{
|
2002-06-29 13:46:34 +00:00
|
|
|
|
int rc = tdbio_write_record (rec);
|
|
|
|
|
if (rc)
|
|
|
|
|
{
|
|
|
|
|
log_error(_("trust record %lu, type %d: write failed: %s\n"),
|
|
|
|
|
rec->recnum, rec->rectype, g10_errstr(rc) );
|
|
|
|
|
tdbio_invalid();
|
1998-01-13 19:04:23 +00:00
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2002-06-29 13:46:34 +00:00
|
|
|
|
/*
|
|
|
|
|
* sync the TrustDb and die on error
|
|
|
|
|
*/
|
|
|
|
|
static void
|
|
|
|
|
do_sync(void)
|
|
|
|
|
{
|
|
|
|
|
int rc = tdbio_sync ();
|
|
|
|
|
if(rc)
|
|
|
|
|
{
|
|
|
|
|
log_error (_("trustdb: sync failed: %s\n"), g10_errstr(rc) );
|
|
|
|
|
g10_exit(2);
|
|
|
|
|
}
|
|
|
|
|
}
|
2000-09-18 14:35:34 +00:00
|
|
|
|
|
2003-04-26 20:38:16 +00:00
|
|
|
|
static const char *
|
|
|
|
|
trust_model_string(void)
|
|
|
|
|
{
|
|
|
|
|
switch(opt.trust_model)
|
|
|
|
|
{
|
2003-11-15 00:19:49 +00:00
|
|
|
|
case TM_CLASSIC: return "classic";
|
|
|
|
|
case TM_PGP: return "PGP";
|
|
|
|
|
case TM_EXTERNAL: return "external";
|
|
|
|
|
case TM_ALWAYS: return "always";
|
2004-10-13 15:34:52 +00:00
|
|
|
|
case TM_DIRECT: return "direct";
|
2003-11-15 00:19:49 +00:00
|
|
|
|
default: return "unknown";
|
2003-04-26 20:38:16 +00:00
|
|
|
|
}
|
|
|
|
|
}
|
2000-09-18 14:35:34 +00:00
|
|
|
|
|
1999-03-11 15:42:06 +00:00
|
|
|
|
/****************
|
|
|
|
|
* Perform some checks over the trustdb
|
|
|
|
|
* level 0: only open the db
|
|
|
|
|
* 1: used for initial program startup
|
|
|
|
|
*/
|
|
|
|
|
int
|
|
|
|
|
setup_trustdb( int level, const char *dbname )
|
|
|
|
|
{
|
|
|
|
|
/* just store the args */
|
|
|
|
|
if( trustdb_args.init )
|
|
|
|
|
return 0;
|
|
|
|
|
trustdb_args.level = level;
|
2005-07-27 18:10:56 +00:00
|
|
|
|
trustdb_args.dbname = dbname? xstrdup(dbname): NULL;
|
1999-03-11 15:42:06 +00:00
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
2009-07-23 08:00:39 +00:00
|
|
|
|
void
|
|
|
|
|
how_to_fix_the_trustdb ()
|
|
|
|
|
{
|
|
|
|
|
const char *name = trustdb_args.dbname;
|
|
|
|
|
|
|
|
|
|
if (!name)
|
|
|
|
|
name = "trustdb.gpg";
|
|
|
|
|
|
|
|
|
|
log_info (_("You may try to re-create the trustdb using the commands:\n"));
|
|
|
|
|
log_info (" cd %s\n", default_homedir ());
|
|
|
|
|
log_info (" gpg2 --export-ownertrust > otrust.tmp\n");
|
|
|
|
|
#ifdef HAVE_W32_SYSTEM
|
|
|
|
|
log_info (" del %s\n", name);
|
|
|
|
|
#else
|
|
|
|
|
log_info (" rm %s\n", name);
|
|
|
|
|
#endif
|
|
|
|
|
log_info (" gpg2 --import-ownertrust < otrust.tmp\n");
|
|
|
|
|
log_info (_("If that does not work, please consult the manual\n"));
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
1999-03-11 15:42:06 +00:00
|
|
|
|
void
|
|
|
|
|
init_trustdb()
|
|
|
|
|
{
|
2002-06-29 13:46:34 +00:00
|
|
|
|
int level = trustdb_args.level;
|
|
|
|
|
const char* dbname = trustdb_args.dbname;
|
1999-03-11 15:42:06 +00:00
|
|
|
|
|
2002-06-29 13:46:34 +00:00
|
|
|
|
if( trustdb_args.init )
|
|
|
|
|
return;
|
1999-03-11 15:42:06 +00:00
|
|
|
|
|
2002-06-29 13:46:34 +00:00
|
|
|
|
trustdb_args.init = 1;
|
1999-03-11 15:42:06 +00:00
|
|
|
|
|
2003-09-30 15:30:39 +00:00
|
|
|
|
if(level==0 || level==1)
|
2002-06-29 13:46:34 +00:00
|
|
|
|
{
|
2013-10-11 09:25:58 +02:00
|
|
|
|
int rc = tdbio_set_dbname (dbname, !!level, &trustdb_args.no_trustdb);
|
2003-09-30 15:30:39 +00:00
|
|
|
|
if( rc )
|
|
|
|
|
log_fatal("can't init trustdb: %s\n", g10_errstr(rc) );
|
1999-03-11 15:42:06 +00:00
|
|
|
|
}
|
2002-06-29 13:46:34 +00:00
|
|
|
|
else
|
|
|
|
|
BUG();
|
2002-12-04 06:06:56 +00:00
|
|
|
|
|
2003-04-26 20:38:16 +00:00
|
|
|
|
if(opt.trust_model==TM_AUTO)
|
|
|
|
|
{
|
|
|
|
|
/* Try and set the trust model off of whatever the trustdb says
|
|
|
|
|
it is. */
|
|
|
|
|
opt.trust_model=tdbio_read_model();
|
* g10.c (main): Add --no-textmode.
* export.c (do_export_stream), keyedit.c (show_key_with_all_names,
menu_addrevoker), mainproc.c (check_sig_and_print), photoid.c
(show_photos), sign.c (mk_notation_and_policy), trustdb.c (get_validity,
reset_trust_records, validate_keys): Make some strings translatable.
* mainproc.c (check_sig_and_print): Show digest algorithm and sig class
when verifying a sig with --verbose on, and add version, pk and hash
algorithms and sig class to VALIDSIG.
* parse-packet.c (enum_sig_subpkt): Make a warning message a --verbose
warning message since we don't need to warn every time we see an unknown
critical (we only need to invalidate the signature).
* trustdb.c (init_trustdb): Check the trustdb options even with TM_AUTO
since the auto may become TM_CLASSIC or TM_OPENPGP.
2003-04-27 20:22:09 +00:00
|
|
|
|
|
|
|
|
|
/* Sanity check this ;) */
|
2003-11-15 00:19:49 +00:00
|
|
|
|
if(opt.trust_model!=TM_CLASSIC
|
|
|
|
|
&& opt.trust_model!=TM_PGP
|
|
|
|
|
&& opt.trust_model!=TM_EXTERNAL)
|
2003-04-26 20:38:16 +00:00
|
|
|
|
{
|
|
|
|
|
log_info(_("unable to use unknown trust model (%d) - "
|
* tdbio.c (create_version_record): Only create new trustdbs with
TM_CLASSIC or TM_PGP.
* trustdb.h, trustdb.c (trust_string, get_ownertrust_string,
get_validity_string, ask_ownertrust, validate_keys), pkclist.c
(do_edit_ownertrust): Rename trust_string to trust_value_to_string for
naming consistency.
* trustdb.h, trustdb.c (string_to_trust_value): New function to translate
a string to a trust value.
* g10.c (main): Use string_to_trust_value here for --force-ownertrust.
* options.h, g10.c (main), trustdb.c (trust_model_string, init_trustdb,
check_trustdb, update_trustdb, get_validity, validate_one_keyblock): An
"OpenPGP" trust model is misleading since there is no official OpenPGP
trust model. Use "PGP" instead.
2003-05-01 21:37:08 +00:00
|
|
|
|
"assuming %s trust model\n"),opt.trust_model,"PGP");
|
|
|
|
|
opt.trust_model=TM_PGP;
|
2003-04-26 20:38:16 +00:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if(opt.verbose)
|
2006-03-07 20:14:20 +00:00
|
|
|
|
log_info(_("using %s trust model\n"),trust_model_string());
|
2003-04-26 20:38:16 +00:00
|
|
|
|
}
|
* g10.c (main): Add --no-textmode.
* export.c (do_export_stream), keyedit.c (show_key_with_all_names,
menu_addrevoker), mainproc.c (check_sig_and_print), photoid.c
(show_photos), sign.c (mk_notation_and_policy), trustdb.c (get_validity,
reset_trust_records, validate_keys): Make some strings translatable.
* mainproc.c (check_sig_and_print): Show digest algorithm and sig class
when verifying a sig with --verbose on, and add version, pk and hash
algorithms and sig class to VALIDSIG.
* parse-packet.c (enum_sig_subpkt): Make a warning message a --verbose
warning message since we don't need to warn every time we see an unknown
critical (we only need to invalidate the signature).
* trustdb.c (init_trustdb): Check the trustdb options even with TM_AUTO
since the auto may become TM_CLASSIC or TM_OPENPGP.
2003-04-27 20:22:09 +00:00
|
|
|
|
|
2003-09-30 15:30:39 +00:00
|
|
|
|
if(opt.trust_model==TM_PGP || opt.trust_model==TM_CLASSIC)
|
|
|
|
|
{
|
|
|
|
|
/* Verify the list of ultimately trusted keys and move the
|
|
|
|
|
--trusted-keys list there as well. */
|
|
|
|
|
if(level==1)
|
|
|
|
|
verify_own_keys();
|
1999-03-11 15:42:06 +00:00
|
|
|
|
|
2003-09-30 15:30:39 +00:00
|
|
|
|
if(!tdbio_db_matches_options())
|
|
|
|
|
pending_check_trustdb=1;
|
|
|
|
|
}
|
|
|
|
|
}
|
1999-03-11 15:42:06 +00:00
|
|
|
|
|
|
|
|
|
|
|
|
|
|
/***********************************************
|
|
|
|
|
************* Print helpers ****************
|
|
|
|
|
***********************************************/
|
1998-07-09 13:37:17 +00:00
|
|
|
|
|
1999-07-01 10:53:35 +00:00
|
|
|
|
/****************
|
|
|
|
|
* This function returns a letter for a trustvalue Trust flags
|
|
|
|
|
* are ignore.
|
|
|
|
|
*/
|
* armor.c (armor_filter): Comment about PGP's end of line tab problem.
* trustdb.h, trustdb.c (trust_letter): Make static. (get_ownertrust_info,
get_validity_info): Don't mask the trust level twice.
* trustdb.h, gpgv.c, trustdb.c (get_validity, get_validity_info),
keylist.c (list_keyblock_colon), keyedit.c (show_key_with_all_names_colon,
menu_revuid): Pass a user ID in rather than a namehash, so we only have to
do the hashing in one place.
* packet.h, pkclist.c (build_pk_list), free-packet.c
(release_public_key_parts): Remove unused namehash element for public
keys.
2003-01-11 03:57:00 +00:00
|
|
|
|
static int
|
2002-06-29 13:46:34 +00:00
|
|
|
|
trust_letter (unsigned int value)
|
1998-01-16 21:15:24 +00:00
|
|
|
|
{
|
2013-10-11 09:25:58 +02:00
|
|
|
|
switch( (value & TRUST_MASK) )
|
2002-06-29 13:46:34 +00:00
|
|
|
|
{
|
|
|
|
|
case TRUST_UNKNOWN: return '-';
|
|
|
|
|
case TRUST_EXPIRED: return 'e';
|
|
|
|
|
case TRUST_UNDEFINED: return 'q';
|
|
|
|
|
case TRUST_NEVER: return 'n';
|
|
|
|
|
case TRUST_MARGINAL: return 'm';
|
|
|
|
|
case TRUST_FULLY: return 'f';
|
|
|
|
|
case TRUST_ULTIMATE: return 'u';
|
2003-01-11 21:13:41 +00:00
|
|
|
|
default: return '?';
|
1998-01-16 21:15:24 +00:00
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2012-08-05 18:22:46 -04:00
|
|
|
|
const char *
|
|
|
|
|
uid_trust_string_fixed(PKT_public_key *key,PKT_user_id *uid)
|
|
|
|
|
{
|
|
|
|
|
if(!key && !uid)
|
|
|
|
|
/* TRANSLATORS: these strings are similar to those in
|
2004-11-24 05:25:03 +00:00
|
|
|
|
trust_value_to_string(), but are a fixed length. This is needed to
|
|
|
|
|
make attractive information listings where columns line up
|
|
|
|
|
properly. The value "10" should be the length of the strings you
|
2004-11-25 03:48:34 +00:00
|
|
|
|
choose to translate to. This is the length in printable columns.
|
|
|
|
|
It gets passed to atoi() so everything after the number is
|
2004-12-14 14:42:41 +00:00
|
|
|
|
essentially a comment and need not be translated. Either key and
|
|
|
|
|
uid are both NULL, or neither are NULL. */
|
2004-11-25 03:48:34 +00:00
|
|
|
|
return _("10 translator see trustdb.c:uid_trust_string_fixed");
|
2004-12-15 05:16:53 +00:00
|
|
|
|
else if(uid->is_revoked || (key && key->is_revoked))
|
2004-11-24 05:25:03 +00:00
|
|
|
|
return _("[ revoked]");
|
|
|
|
|
else if(uid->is_expired)
|
|
|
|
|
return _("[ expired]");
|
2004-12-15 05:16:53 +00:00
|
|
|
|
else if(key)
|
2004-11-24 05:25:03 +00:00
|
|
|
|
switch(get_validity(key,uid)&TRUST_MASK)
|
|
|
|
|
{
|
|
|
|
|
case TRUST_UNKNOWN: return _("[ unknown]");
|
2004-12-11 04:47:33 +00:00
|
|
|
|
case TRUST_EXPIRED: return _("[ expired]");
|
2004-11-24 05:25:03 +00:00
|
|
|
|
case TRUST_UNDEFINED: return _("[ undef ]");
|
|
|
|
|
case TRUST_MARGINAL: return _("[marginal]");
|
|
|
|
|
case TRUST_FULLY: return _("[ full ]");
|
|
|
|
|
case TRUST_ULTIMATE: return _("[ultimate]");
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return "err";
|
|
|
|
|
}
|
|
|
|
|
|
2002-10-30 03:11:57 +00:00
|
|
|
|
/* The strings here are similar to those in
|
|
|
|
|
pkclist.c:do_edit_ownertrust() */
|
|
|
|
|
const char *
|
* tdbio.c (create_version_record): Only create new trustdbs with
TM_CLASSIC or TM_PGP.
* trustdb.h, trustdb.c (trust_string, get_ownertrust_string,
get_validity_string, ask_ownertrust, validate_keys), pkclist.c
(do_edit_ownertrust): Rename trust_string to trust_value_to_string for
naming consistency.
* trustdb.h, trustdb.c (string_to_trust_value): New function to translate
a string to a trust value.
* g10.c (main): Use string_to_trust_value here for --force-ownertrust.
* options.h, g10.c (main), trustdb.c (trust_model_string, init_trustdb,
check_trustdb, update_trustdb, get_validity, validate_one_keyblock): An
"OpenPGP" trust model is misleading since there is no official OpenPGP
trust model. Use "PGP" instead.
2003-05-01 21:37:08 +00:00
|
|
|
|
trust_value_to_string (unsigned int value)
|
2002-10-30 03:11:57 +00:00
|
|
|
|
{
|
2013-10-11 09:25:58 +02:00
|
|
|
|
switch( (value & TRUST_MASK) )
|
2002-10-30 03:11:57 +00:00
|
|
|
|
{
|
2003-01-11 21:13:41 +00:00
|
|
|
|
case TRUST_UNKNOWN: return _("unknown");
|
2002-10-30 03:11:57 +00:00
|
|
|
|
case TRUST_EXPIRED: return _("expired");
|
2003-01-11 21:13:41 +00:00
|
|
|
|
case TRUST_UNDEFINED: return _("undefined");
|
|
|
|
|
case TRUST_NEVER: return _("never");
|
|
|
|
|
case TRUST_MARGINAL: return _("marginal");
|
|
|
|
|
case TRUST_FULLY: return _("full");
|
|
|
|
|
case TRUST_ULTIMATE: return _("ultimate");
|
2002-10-30 03:11:57 +00:00
|
|
|
|
default: return "err";
|
|
|
|
|
}
|
|
|
|
|
}
|
1999-03-11 15:42:06 +00:00
|
|
|
|
|
* tdbio.c (create_version_record): Only create new trustdbs with
TM_CLASSIC or TM_PGP.
* trustdb.h, trustdb.c (trust_string, get_ownertrust_string,
get_validity_string, ask_ownertrust, validate_keys), pkclist.c
(do_edit_ownertrust): Rename trust_string to trust_value_to_string for
naming consistency.
* trustdb.h, trustdb.c (string_to_trust_value): New function to translate
a string to a trust value.
* g10.c (main): Use string_to_trust_value here for --force-ownertrust.
* options.h, g10.c (main), trustdb.c (trust_model_string, init_trustdb,
check_trustdb, update_trustdb, get_validity, validate_one_keyblock): An
"OpenPGP" trust model is misleading since there is no official OpenPGP
trust model. Use "PGP" instead.
2003-05-01 21:37:08 +00:00
|
|
|
|
int
|
|
|
|
|
string_to_trust_value (const char *str)
|
|
|
|
|
{
|
|
|
|
|
if(ascii_strcasecmp(str,"undefined")==0)
|
|
|
|
|
return TRUST_UNDEFINED;
|
|
|
|
|
else if(ascii_strcasecmp(str,"never")==0)
|
|
|
|
|
return TRUST_NEVER;
|
|
|
|
|
else if(ascii_strcasecmp(str,"marginal")==0)
|
|
|
|
|
return TRUST_MARGINAL;
|
|
|
|
|
else if(ascii_strcasecmp(str,"full")==0)
|
|
|
|
|
return TRUST_FULLY;
|
|
|
|
|
else if(ascii_strcasecmp(str,"ultimate")==0)
|
|
|
|
|
return TRUST_ULTIMATE;
|
|
|
|
|
else
|
|
|
|
|
return -1;
|
|
|
|
|
}
|
|
|
|
|
|
2002-06-29 13:46:34 +00:00
|
|
|
|
/****************
|
|
|
|
|
* Recreate the WoT but do not ask for new ownertrusts. Special
|
|
|
|
|
* feature: In batch mode and without a forced yes, this is only done
|
|
|
|
|
* when a check is due. This can be used to run the check from a crontab
|
|
|
|
|
*/
|
|
|
|
|
void
|
|
|
|
|
check_trustdb ()
|
|
|
|
|
{
|
2003-04-26 20:38:16 +00:00
|
|
|
|
init_trustdb();
|
* tdbio.c (create_version_record): Only create new trustdbs with
TM_CLASSIC or TM_PGP.
* trustdb.h, trustdb.c (trust_string, get_ownertrust_string,
get_validity_string, ask_ownertrust, validate_keys), pkclist.c
(do_edit_ownertrust): Rename trust_string to trust_value_to_string for
naming consistency.
* trustdb.h, trustdb.c (string_to_trust_value): New function to translate
a string to a trust value.
* g10.c (main): Use string_to_trust_value here for --force-ownertrust.
* options.h, g10.c (main), trustdb.c (trust_model_string, init_trustdb,
check_trustdb, update_trustdb, get_validity, validate_one_keyblock): An
"OpenPGP" trust model is misleading since there is no official OpenPGP
trust model. Use "PGP" instead.
2003-05-01 21:37:08 +00:00
|
|
|
|
if(opt.trust_model==TM_PGP || opt.trust_model==TM_CLASSIC)
|
2002-06-29 13:46:34 +00:00
|
|
|
|
{
|
2002-11-04 17:30:38 +00:00
|
|
|
|
if (opt.batch && !opt.answer_yes)
|
|
|
|
|
{
|
|
|
|
|
ulong scheduled;
|
|
|
|
|
|
|
|
|
|
scheduled = tdbio_read_nextcheck ();
|
|
|
|
|
if (!scheduled)
|
|
|
|
|
{
|
|
|
|
|
log_info (_("no need for a trustdb check\n"));
|
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (scheduled > make_timestamp ())
|
|
|
|
|
{
|
|
|
|
|
log_info (_("next trustdb check due at %s\n"),
|
|
|
|
|
strtimestamp (scheduled));
|
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
}
|
1998-07-21 12:53:38 +00:00
|
|
|
|
|
2002-11-04 17:30:38 +00:00
|
|
|
|
validate_keys (0);
|
1999-03-17 12:13:04 +00:00
|
|
|
|
}
|
2002-11-04 17:30:38 +00:00
|
|
|
|
else
|
2004-10-11 21:08:37 +00:00
|
|
|
|
log_info (_("no need for a trustdb check with `%s' trust model\n"),
|
2002-11-04 17:30:38 +00:00
|
|
|
|
trust_model_string());
|
1999-03-17 12:13:04 +00:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
2002-06-29 13:46:34 +00:00
|
|
|
|
/*
|
2013-10-11 09:25:58 +02:00
|
|
|
|
* Recreate the WoT.
|
2002-06-29 13:46:34 +00:00
|
|
|
|
*/
|
|
|
|
|
void
|
|
|
|
|
update_trustdb()
|
1999-03-11 15:42:06 +00:00
|
|
|
|
{
|
2003-04-26 20:38:16 +00:00
|
|
|
|
init_trustdb();
|
* tdbio.c (create_version_record): Only create new trustdbs with
TM_CLASSIC or TM_PGP.
* trustdb.h, trustdb.c (trust_string, get_ownertrust_string,
get_validity_string, ask_ownertrust, validate_keys), pkclist.c
(do_edit_ownertrust): Rename trust_string to trust_value_to_string for
naming consistency.
* trustdb.h, trustdb.c (string_to_trust_value): New function to translate
a string to a trust value.
* g10.c (main): Use string_to_trust_value here for --force-ownertrust.
* options.h, g10.c (main), trustdb.c (trust_model_string, init_trustdb,
check_trustdb, update_trustdb, get_validity, validate_one_keyblock): An
"OpenPGP" trust model is misleading since there is no official OpenPGP
trust model. Use "PGP" instead.
2003-05-01 21:37:08 +00:00
|
|
|
|
if(opt.trust_model==TM_PGP || opt.trust_model==TM_CLASSIC)
|
2003-04-26 20:38:16 +00:00
|
|
|
|
validate_keys (1);
|
2002-11-04 17:30:38 +00:00
|
|
|
|
else
|
2004-10-11 21:08:37 +00:00
|
|
|
|
log_info (_("no need for a trustdb update with `%s' trust model\n"),
|
2002-11-04 17:30:38 +00:00
|
|
|
|
trust_model_string());
|
1999-03-17 12:13:04 +00:00
|
|
|
|
}
|
|
|
|
|
|
2002-06-29 13:46:34 +00:00
|
|
|
|
void
|
|
|
|
|
revalidation_mark (void)
|
1999-03-17 12:13:04 +00:00
|
|
|
|
{
|
2002-06-29 13:46:34 +00:00
|
|
|
|
init_trustdb();
|
2013-10-11 09:25:58 +02:00
|
|
|
|
if (trustdb_args.no_trustdb && opt.trust_model == TM_ALWAYS)
|
|
|
|
|
return;
|
|
|
|
|
|
2002-06-29 13:46:34 +00:00
|
|
|
|
/* we simply set the time for the next check to 1 (far back in 1970)
|
|
|
|
|
* so that a --update-trustdb will be scheduled */
|
|
|
|
|
if (tdbio_write_nextcheck (1))
|
|
|
|
|
do_sync ();
|
|
|
|
|
pending_check_trustdb = 1;
|
1998-07-21 12:53:38 +00:00
|
|
|
|
}
|
|
|
|
|
|
2002-12-13 21:10:53 +00:00
|
|
|
|
int
|
|
|
|
|
trustdb_pending_check(void)
|
|
|
|
|
{
|
|
|
|
|
return pending_check_trustdb;
|
|
|
|
|
}
|
|
|
|
|
|
2005-02-06 17:38:43 +00:00
|
|
|
|
/* If the trustdb is dirty, and we're interactive, update it.
|
|
|
|
|
Otherwise, check it unless no-auto-check-trustdb is set. */
|
|
|
|
|
void
|
|
|
|
|
trustdb_check_or_update(void)
|
|
|
|
|
{
|
|
|
|
|
if(trustdb_pending_check())
|
|
|
|
|
{
|
|
|
|
|
if(opt.interactive)
|
|
|
|
|
update_trustdb();
|
|
|
|
|
else if(!opt.no_auto_check_trustdb)
|
|
|
|
|
check_trustdb();
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2003-07-21 23:19:15 +00:00
|
|
|
|
void
|
|
|
|
|
read_trust_options(byte *trust_model,ulong *created,ulong *nextcheck,
|
2012-01-19 22:33:51 -05:00
|
|
|
|
byte *marginals,byte *completes,byte *cert_depth,
|
|
|
|
|
byte *min_cert_level)
|
2003-07-21 23:19:15 +00:00
|
|
|
|
{
|
|
|
|
|
TRUSTREC opts;
|
|
|
|
|
|
|
|
|
|
init_trustdb();
|
2013-10-11 09:25:58 +02:00
|
|
|
|
if (trustdb_args.no_trustdb && opt.trust_model == TM_ALWAYS)
|
|
|
|
|
memset (&opts, 0, sizeof opts);
|
|
|
|
|
else
|
|
|
|
|
read_record(0,&opts,RECTYPE_VER);
|
2003-07-21 23:19:15 +00:00
|
|
|
|
|
|
|
|
|
if(trust_model)
|
|
|
|
|
*trust_model=opts.r.ver.trust_model;
|
|
|
|
|
if(created)
|
|
|
|
|
*created=opts.r.ver.created;
|
|
|
|
|
if(nextcheck)
|
|
|
|
|
*nextcheck=opts.r.ver.nextcheck;
|
|
|
|
|
if(marginals)
|
|
|
|
|
*marginals=opts.r.ver.marginals;
|
|
|
|
|
if(completes)
|
|
|
|
|
*completes=opts.r.ver.completes;
|
|
|
|
|
if(cert_depth)
|
|
|
|
|
*cert_depth=opts.r.ver.cert_depth;
|
2012-01-19 22:33:51 -05:00
|
|
|
|
if(min_cert_level)
|
|
|
|
|
*min_cert_level=opts.r.ver.min_cert_level;
|
2003-07-21 23:19:15 +00:00
|
|
|
|
}
|
|
|
|
|
|
1999-03-11 15:42:06 +00:00
|
|
|
|
/***********************************************
|
2002-06-29 13:46:34 +00:00
|
|
|
|
*********** Ownertrust et al. ****************
|
1999-03-11 15:42:06 +00:00
|
|
|
|
***********************************************/
|
1998-01-16 21:15:24 +00:00
|
|
|
|
|
2013-10-11 09:25:58 +02:00
|
|
|
|
static int
|
2002-06-29 13:46:34 +00:00
|
|
|
|
read_trust_record (PKT_public_key *pk, TRUSTREC *rec)
|
|
|
|
|
{
|
|
|
|
|
int rc;
|
2013-10-11 09:25:58 +02:00
|
|
|
|
|
2002-06-29 13:46:34 +00:00
|
|
|
|
init_trustdb();
|
|
|
|
|
rc = tdbio_search_trust_bypk (pk, rec);
|
|
|
|
|
if (rc == -1)
|
|
|
|
|
return -1; /* no record yet */
|
2013-10-11 09:25:58 +02:00
|
|
|
|
if (rc)
|
2002-06-29 13:46:34 +00:00
|
|
|
|
{
|
|
|
|
|
log_error ("trustdb: searching trust record failed: %s\n",
|
|
|
|
|
g10_errstr (rc));
|
2013-10-11 09:25:58 +02:00
|
|
|
|
return rc;
|
2002-06-29 13:46:34 +00:00
|
|
|
|
}
|
2013-10-11 09:25:58 +02:00
|
|
|
|
|
2002-06-29 13:46:34 +00:00
|
|
|
|
if (rec->rectype != RECTYPE_TRUST)
|
|
|
|
|
{
|
|
|
|
|
log_error ("trustdb: record %lu is not a trust record\n",
|
|
|
|
|
rec->recnum);
|
2013-10-11 09:25:58 +02:00
|
|
|
|
return G10ERR_TRUSTDB;
|
|
|
|
|
}
|
|
|
|
|
|
2002-06-29 13:46:34 +00:00
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
1998-11-03 19:38:58 +00:00
|
|
|
|
/****************
|
2002-06-29 13:46:34 +00:00
|
|
|
|
* Return the assigned ownertrust value for the given public key.
|
|
|
|
|
* The key should be the primary key.
|
1998-11-03 19:38:58 +00:00
|
|
|
|
*/
|
2013-10-11 09:25:58 +02:00
|
|
|
|
unsigned int
|
2002-06-29 13:46:34 +00:00
|
|
|
|
get_ownertrust ( PKT_public_key *pk)
|
1998-01-24 16:32:27 +00:00
|
|
|
|
{
|
2002-06-29 13:46:34 +00:00
|
|
|
|
TRUSTREC rec;
|
|
|
|
|
int rc;
|
2013-10-11 09:25:58 +02:00
|
|
|
|
|
|
|
|
|
if (trustdb_args.no_trustdb && opt.trust_model == TM_ALWAYS)
|
|
|
|
|
return TRUST_UNKNOWN;
|
|
|
|
|
|
2002-06-29 13:46:34 +00:00
|
|
|
|
rc = read_trust_record (pk, &rec);
|
|
|
|
|
if (rc == -1)
|
|
|
|
|
return TRUST_UNKNOWN; /* no record yet */
|
2013-10-11 09:25:58 +02:00
|
|
|
|
if (rc)
|
2002-06-29 13:46:34 +00:00
|
|
|
|
{
|
|
|
|
|
tdbio_invalid ();
|
|
|
|
|
return rc; /* actually never reached */
|
1999-03-11 15:42:06 +00:00
|
|
|
|
}
|
2002-10-30 03:11:57 +00:00
|
|
|
|
|
2002-06-29 13:46:34 +00:00
|
|
|
|
return rec.r.trust.ownertrust;
|
1998-11-03 19:38:58 +00:00
|
|
|
|
}
|
1998-10-25 19:00:01 +00:00
|
|
|
|
|
2013-10-11 09:25:58 +02:00
|
|
|
|
unsigned int
|
2002-10-30 03:11:57 +00:00
|
|
|
|
get_min_ownertrust (PKT_public_key *pk)
|
|
|
|
|
{
|
|
|
|
|
TRUSTREC rec;
|
|
|
|
|
int rc;
|
2013-10-11 09:25:58 +02:00
|
|
|
|
|
|
|
|
|
if (trustdb_args.no_trustdb && opt.trust_model == TM_ALWAYS)
|
|
|
|
|
return TRUST_UNKNOWN;
|
|
|
|
|
|
2002-10-30 03:11:57 +00:00
|
|
|
|
rc = read_trust_record (pk, &rec);
|
|
|
|
|
if (rc == -1)
|
|
|
|
|
return TRUST_UNKNOWN; /* no record yet */
|
2013-10-11 09:25:58 +02:00
|
|
|
|
if (rc)
|
2002-10-30 03:11:57 +00:00
|
|
|
|
{
|
|
|
|
|
tdbio_invalid ();
|
|
|
|
|
return rc; /* actually never reached */
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return rec.r.trust.min_ownertrust;
|
|
|
|
|
}
|
|
|
|
|
|
2002-06-29 13:46:34 +00:00
|
|
|
|
/*
|
2003-01-11 21:13:41 +00:00
|
|
|
|
* Same as get_ownertrust but this takes the minimum ownertrust value
|
|
|
|
|
* into into account, and will bump up the value as needed.
|
2002-06-29 13:46:34 +00:00
|
|
|
|
*/
|
2003-01-11 21:13:41 +00:00
|
|
|
|
static int
|
|
|
|
|
get_ownertrust_with_min (PKT_public_key *pk)
|
1998-01-13 19:04:23 +00:00
|
|
|
|
{
|
2003-01-11 21:13:41 +00:00
|
|
|
|
unsigned int otrust,otrust_min;
|
1998-01-30 20:25:31 +00:00
|
|
|
|
|
2003-03-04 15:24:12 +00:00
|
|
|
|
otrust = (get_ownertrust (pk) & TRUST_MASK);
|
2003-01-11 21:13:41 +00:00
|
|
|
|
otrust_min = get_min_ownertrust (pk);
|
|
|
|
|
if(otrust<otrust_min)
|
|
|
|
|
{
|
|
|
|
|
/* If the trust that the user has set is less than the trust
|
|
|
|
|
that was calculated from a trust signature chain, use the
|
|
|
|
|
higher of the two. We do this here and not in
|
|
|
|
|
get_ownertrust since the underlying ownertrust should not
|
|
|
|
|
really be set - just the appearance of the ownertrust. */
|
2002-10-30 03:11:57 +00:00
|
|
|
|
|
2003-01-11 21:13:41 +00:00
|
|
|
|
otrust=otrust_min;
|
|
|
|
|
}
|
2002-10-30 03:11:57 +00:00
|
|
|
|
|
2003-01-11 21:13:41 +00:00
|
|
|
|
return otrust;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/*
|
|
|
|
|
* Same as get_ownertrust but return a trust letter instead of an
|
|
|
|
|
* value. This takes the minimum ownertrust value into account.
|
|
|
|
|
*/
|
|
|
|
|
int
|
|
|
|
|
get_ownertrust_info (PKT_public_key *pk)
|
|
|
|
|
{
|
|
|
|
|
return trust_letter(get_ownertrust_with_min(pk));
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/*
|
|
|
|
|
* Same as get_ownertrust but return a trust string instead of an
|
|
|
|
|
* value. This takes the minimum ownertrust value into account.
|
|
|
|
|
*/
|
|
|
|
|
const char *
|
|
|
|
|
get_ownertrust_string (PKT_public_key *pk)
|
|
|
|
|
{
|
* tdbio.c (create_version_record): Only create new trustdbs with
TM_CLASSIC or TM_PGP.
* trustdb.h, trustdb.c (trust_string, get_ownertrust_string,
get_validity_string, ask_ownertrust, validate_keys), pkclist.c
(do_edit_ownertrust): Rename trust_string to trust_value_to_string for
naming consistency.
* trustdb.h, trustdb.c (string_to_trust_value): New function to translate
a string to a trust value.
* g10.c (main): Use string_to_trust_value here for --force-ownertrust.
* options.h, g10.c (main), trustdb.c (trust_model_string, init_trustdb,
check_trustdb, update_trustdb, get_validity, validate_one_keyblock): An
"OpenPGP" trust model is misleading since there is no official OpenPGP
trust model. Use "PGP" instead.
2003-05-01 21:37:08 +00:00
|
|
|
|
return trust_value_to_string(get_ownertrust_with_min(pk));
|
1998-01-30 20:25:31 +00:00
|
|
|
|
}
|
|
|
|
|
|
2002-06-29 13:46:34 +00:00
|
|
|
|
/*
|
|
|
|
|
* Set the trust value of the given public key to the new value.
|
|
|
|
|
* The key should be a primary one.
|
1999-06-29 19:50:54 +00:00
|
|
|
|
*/
|
2002-06-29 13:46:34 +00:00
|
|
|
|
void
|
|
|
|
|
update_ownertrust (PKT_public_key *pk, unsigned int new_trust )
|
|
|
|
|
{
|
|
|
|
|
TRUSTREC rec;
|
|
|
|
|
int rc;
|
2013-10-11 09:25:58 +02:00
|
|
|
|
|
|
|
|
|
if (trustdb_args.no_trustdb && opt.trust_model == TM_ALWAYS)
|
|
|
|
|
return;
|
|
|
|
|
|
2002-06-29 13:46:34 +00:00
|
|
|
|
rc = read_trust_record (pk, &rec);
|
|
|
|
|
if (!rc)
|
|
|
|
|
{
|
|
|
|
|
if (DBG_TRUST)
|
|
|
|
|
log_debug ("update ownertrust from %u to %u\n",
|
|
|
|
|
(unsigned int)rec.r.trust.ownertrust, new_trust );
|
|
|
|
|
if (rec.r.trust.ownertrust != new_trust)
|
|
|
|
|
{
|
|
|
|
|
rec.r.trust.ownertrust = new_trust;
|
|
|
|
|
write_record( &rec );
|
|
|
|
|
revalidation_mark ();
|
|
|
|
|
do_sync ();
|
|
|
|
|
}
|
1999-06-29 19:50:54 +00:00
|
|
|
|
}
|
2002-06-29 13:46:34 +00:00
|
|
|
|
else if (rc == -1)
|
|
|
|
|
{ /* no record yet - create a new one */
|
|
|
|
|
size_t dummy;
|
1999-06-29 19:50:54 +00:00
|
|
|
|
|
2002-06-29 13:46:34 +00:00
|
|
|
|
if (DBG_TRUST)
|
|
|
|
|
log_debug ("insert ownertrust %u\n", new_trust );
|
1999-06-29 19:50:54 +00:00
|
|
|
|
|
2002-06-29 13:46:34 +00:00
|
|
|
|
memset (&rec, 0, sizeof rec);
|
|
|
|
|
rec.recnum = tdbio_new_recnum ();
|
|
|
|
|
rec.rectype = RECTYPE_TRUST;
|
|
|
|
|
fingerprint_from_pk (pk, rec.r.trust.fingerprint, &dummy);
|
|
|
|
|
rec.r.trust.ownertrust = new_trust;
|
|
|
|
|
write_record (&rec);
|
|
|
|
|
revalidation_mark ();
|
|
|
|
|
do_sync ();
|
|
|
|
|
rc = 0;
|
1999-06-29 19:50:54 +00:00
|
|
|
|
}
|
2013-10-11 09:25:58 +02:00
|
|
|
|
else
|
2002-06-29 13:46:34 +00:00
|
|
|
|
{
|
|
|
|
|
tdbio_invalid ();
|
1999-06-29 19:50:54 +00:00
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2002-10-30 03:11:57 +00:00
|
|
|
|
static void
|
|
|
|
|
update_min_ownertrust (u32 *kid, unsigned int new_trust )
|
|
|
|
|
{
|
|
|
|
|
PKT_public_key *pk;
|
|
|
|
|
TRUSTREC rec;
|
|
|
|
|
int rc;
|
|
|
|
|
|
2013-10-11 09:25:58 +02:00
|
|
|
|
if (trustdb_args.no_trustdb && opt.trust_model == TM_ALWAYS)
|
|
|
|
|
return;
|
|
|
|
|
|
2005-07-27 18:10:56 +00:00
|
|
|
|
pk = xmalloc_clear (sizeof *pk);
|
2002-10-30 03:11:57 +00:00
|
|
|
|
rc = get_pubkey (pk, kid);
|
|
|
|
|
if (rc)
|
|
|
|
|
{
|
2004-03-15 23:15:57 +00:00
|
|
|
|
log_error(_("public key %s not found: %s\n"),keystr(kid),g10_errstr(rc));
|
2002-10-30 03:11:57 +00:00
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
rc = read_trust_record (pk, &rec);
|
|
|
|
|
if (!rc)
|
|
|
|
|
{
|
|
|
|
|
if (DBG_TRUST)
|
2004-03-19 23:15:27 +00:00
|
|
|
|
log_debug ("key %08lX%08lX: update min_ownertrust from %u to %u\n",
|
|
|
|
|
(ulong)kid[0],(ulong)kid[1],
|
|
|
|
|
(unsigned int)rec.r.trust.min_ownertrust,
|
2002-10-30 03:11:57 +00:00
|
|
|
|
new_trust );
|
|
|
|
|
if (rec.r.trust.min_ownertrust != new_trust)
|
|
|
|
|
{
|
|
|
|
|
rec.r.trust.min_ownertrust = new_trust;
|
|
|
|
|
write_record( &rec );
|
|
|
|
|
revalidation_mark ();
|
|
|
|
|
do_sync ();
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
else if (rc == -1)
|
|
|
|
|
{ /* no record yet - create a new one */
|
|
|
|
|
size_t dummy;
|
|
|
|
|
|
|
|
|
|
if (DBG_TRUST)
|
|
|
|
|
log_debug ("insert min_ownertrust %u\n", new_trust );
|
|
|
|
|
|
|
|
|
|
memset (&rec, 0, sizeof rec);
|
|
|
|
|
rec.recnum = tdbio_new_recnum ();
|
|
|
|
|
rec.rectype = RECTYPE_TRUST;
|
|
|
|
|
fingerprint_from_pk (pk, rec.r.trust.fingerprint, &dummy);
|
|
|
|
|
rec.r.trust.min_ownertrust = new_trust;
|
|
|
|
|
write_record (&rec);
|
|
|
|
|
revalidation_mark ();
|
|
|
|
|
do_sync ();
|
|
|
|
|
rc = 0;
|
|
|
|
|
}
|
2013-10-11 09:25:58 +02:00
|
|
|
|
else
|
2002-10-30 03:11:57 +00:00
|
|
|
|
{
|
|
|
|
|
tdbio_invalid ();
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* Clear the ownertrust and min_ownertrust values. Return true if a
|
|
|
|
|
change actually happened. */
|
2002-06-29 13:46:34 +00:00
|
|
|
|
int
|
2002-10-30 03:11:57 +00:00
|
|
|
|
clear_ownertrusts (PKT_public_key *pk)
|
2002-06-29 13:46:34 +00:00
|
|
|
|
{
|
|
|
|
|
TRUSTREC rec;
|
|
|
|
|
int rc;
|
2013-10-11 09:25:58 +02:00
|
|
|
|
|
2014-03-06 16:11:34 +01:00
|
|
|
|
init_trustdb ();
|
2013-10-11 09:25:58 +02:00
|
|
|
|
if (trustdb_args.no_trustdb && opt.trust_model == TM_ALWAYS)
|
|
|
|
|
return 0;
|
|
|
|
|
|
2002-06-29 13:46:34 +00:00
|
|
|
|
rc = read_trust_record (pk, &rec);
|
|
|
|
|
if (!rc)
|
|
|
|
|
{
|
|
|
|
|
if (DBG_TRUST)
|
2002-10-30 03:11:57 +00:00
|
|
|
|
{
|
|
|
|
|
log_debug ("clearing ownertrust (old value %u)\n",
|
|
|
|
|
(unsigned int)rec.r.trust.ownertrust);
|
|
|
|
|
log_debug ("clearing min_ownertrust (old value %u)\n",
|
|
|
|
|
(unsigned int)rec.r.trust.min_ownertrust);
|
|
|
|
|
}
|
|
|
|
|
if (rec.r.trust.ownertrust || rec.r.trust.min_ownertrust)
|
2002-06-29 13:46:34 +00:00
|
|
|
|
{
|
|
|
|
|
rec.r.trust.ownertrust = 0;
|
2002-10-30 03:11:57 +00:00
|
|
|
|
rec.r.trust.min_ownertrust = 0;
|
2002-06-29 13:46:34 +00:00
|
|
|
|
write_record( &rec );
|
|
|
|
|
revalidation_mark ();
|
|
|
|
|
do_sync ();
|
|
|
|
|
return 1;
|
|
|
|
|
}
|
1999-03-11 15:42:06 +00:00
|
|
|
|
}
|
2002-06-29 13:46:34 +00:00
|
|
|
|
else if (rc != -1)
|
|
|
|
|
{
|
|
|
|
|
tdbio_invalid ();
|
1998-11-13 19:41:41 +00:00
|
|
|
|
}
|
2002-06-29 13:46:34 +00:00
|
|
|
|
return 0;
|
1999-06-29 19:50:54 +00:00
|
|
|
|
}
|
|
|
|
|
|
2013-10-11 09:25:58 +02:00
|
|
|
|
/*
|
|
|
|
|
* Note: Caller has to do a sync
|
1999-06-29 19:50:54 +00:00
|
|
|
|
*/
|
2002-06-29 13:46:34 +00:00
|
|
|
|
static void
|
2003-01-06 22:56:08 +00:00
|
|
|
|
update_validity (PKT_public_key *pk, PKT_user_id *uid,
|
2002-06-29 13:46:34 +00:00
|
|
|
|
int depth, int validity)
|
|
|
|
|
{
|
|
|
|
|
TRUSTREC trec, vrec;
|
|
|
|
|
int rc;
|
|
|
|
|
ulong recno;
|
2003-01-06 22:56:08 +00:00
|
|
|
|
|
2003-01-14 18:13:22 +00:00
|
|
|
|
namehash_from_uid(uid);
|
2003-01-06 22:56:08 +00:00
|
|
|
|
|
2002-06-29 13:46:34 +00:00
|
|
|
|
rc = read_trust_record (pk, &trec);
|
|
|
|
|
if (rc && rc != -1)
|
|
|
|
|
{
|
|
|
|
|
tdbio_invalid ();
|
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
if (rc == -1) /* no record yet - create a new one */
|
2013-10-11 09:25:58 +02:00
|
|
|
|
{
|
2002-06-29 13:46:34 +00:00
|
|
|
|
size_t dummy;
|
|
|
|
|
|
|
|
|
|
rc = 0;
|
|
|
|
|
memset (&trec, 0, sizeof trec);
|
|
|
|
|
trec.recnum = tdbio_new_recnum ();
|
|
|
|
|
trec.rectype = RECTYPE_TRUST;
|
|
|
|
|
fingerprint_from_pk (pk, trec.r.trust.fingerprint, &dummy);
|
|
|
|
|
trec.r.trust.ownertrust = 0;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* locate an existing one */
|
|
|
|
|
recno = trec.r.trust.validlist;
|
|
|
|
|
while (recno)
|
|
|
|
|
{
|
|
|
|
|
read_record (recno, &vrec, RECTYPE_VALID);
|
2003-01-14 18:13:22 +00:00
|
|
|
|
if ( !memcmp (vrec.r.valid.namehash, uid->namehash, 20) )
|
2002-06-29 13:46:34 +00:00
|
|
|
|
break;
|
|
|
|
|
recno = vrec.r.valid.next;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (!recno) /* insert a new validity record */
|
|
|
|
|
{
|
|
|
|
|
memset (&vrec, 0, sizeof vrec);
|
|
|
|
|
vrec.recnum = tdbio_new_recnum ();
|
|
|
|
|
vrec.rectype = RECTYPE_VALID;
|
2003-01-14 18:13:22 +00:00
|
|
|
|
memcpy (vrec.r.valid.namehash, uid->namehash, 20);
|
2002-06-29 13:46:34 +00:00
|
|
|
|
vrec.r.valid.next = trec.r.trust.validlist;
|
2003-04-30 05:33:52 +00:00
|
|
|
|
trec.r.trust.validlist = vrec.recnum;
|
2002-06-29 13:46:34 +00:00
|
|
|
|
}
|
|
|
|
|
vrec.r.valid.validity = validity;
|
2003-01-06 22:56:08 +00:00
|
|
|
|
vrec.r.valid.full_count = uid->help_full_count;
|
|
|
|
|
vrec.r.valid.marginal_count = uid->help_marginal_count;
|
2002-06-29 13:46:34 +00:00
|
|
|
|
write_record (&vrec);
|
|
|
|
|
trec.r.trust.depth = depth;
|
|
|
|
|
write_record (&trec);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
/***********************************************
|
|
|
|
|
********* Query trustdb values **************
|
|
|
|
|
***********************************************/
|
1999-07-07 11:28:26 +00:00
|
|
|
|
|
2002-12-26 22:22:50 +00:00
|
|
|
|
/* Return true if key is disabled */
|
|
|
|
|
int
|
* trustdb.h, trustdb.c (is_disabled), gpgv.c (is_disabled): Rename
is_disabled to cache_disabled_value, which now takes a pk and not just the
keyid. This is for speed since there is no need to re-fetch a key when we
already have that key handy. Cache the result of the check so we don't
need to hit the trustdb more than once.
* getkey.c (skip_disabled): New function to get a pk and call is_disabled
on it. (key_byname): Use it here.
* packet.h, getkey.c (skip_disabled), keylist.c (print_capabilities): New
"pk_is_disabled" macro to retrieve the cached disabled value if available,
and fill it in via cache_disabled_value if not available.
* trustdb.c (get_validity): Cache the disabled value since we have it
handy and it might be useful later.
* parse-packet.c (parse_key): Clear disabled flag when parsing a new key.
Just in case someone forgets to clear the whole key.
* getkey.c (merge_selfsigs_main): Add an "if all else fails" path for
setting a single user ID primary when there are multiple set primaries all
at the same second, or no primaries set and the most recent user IDs are
at the same second, or no signed user IDs at all. This is arbitrary, but
deterministic.
* exec.h, photoid.h: Add copyright message.
* keylist.c (list_keyblock_print): Don't dump attribs for
revoked/expired/etc uids for non-colon key listings. This is for
consistency with --show-photos.
* main.h, keylist.c (dump_attribs), mainproc.c (check_sig_and_print): Dump
attribs if --attrib-fd is set when verifying signatures.
* g10.c (main): New --gnupg option to disable the various --openpgp,
--pgpX, etc. options. This is the same as --no-XXXX for those options.
* revoke.c (ask_revocation_reason): Clear old reason if user elects to
repeat question. This is bug 153.
* keyedit.c (sign_uids): Show keyid of the key making the signature.
2003-05-21 16:42:22 +00:00
|
|
|
|
cache_disabled_value(PKT_public_key *pk)
|
2002-12-26 22:22:50 +00:00
|
|
|
|
{
|
|
|
|
|
int rc;
|
|
|
|
|
TRUSTREC trec;
|
* trustdb.h, trustdb.c (is_disabled), gpgv.c (is_disabled): Rename
is_disabled to cache_disabled_value, which now takes a pk and not just the
keyid. This is for speed since there is no need to re-fetch a key when we
already have that key handy. Cache the result of the check so we don't
need to hit the trustdb more than once.
* getkey.c (skip_disabled): New function to get a pk and call is_disabled
on it. (key_byname): Use it here.
* packet.h, getkey.c (skip_disabled), keylist.c (print_capabilities): New
"pk_is_disabled" macro to retrieve the cached disabled value if available,
and fill it in via cache_disabled_value if not available.
* trustdb.c (get_validity): Cache the disabled value since we have it
handy and it might be useful later.
* parse-packet.c (parse_key): Clear disabled flag when parsing a new key.
Just in case someone forgets to clear the whole key.
* getkey.c (merge_selfsigs_main): Add an "if all else fails" path for
setting a single user ID primary when there are multiple set primaries all
at the same second, or no primaries set and the most recent user IDs are
at the same second, or no signed user IDs at all. This is arbitrary, but
deterministic.
* exec.h, photoid.h: Add copyright message.
* keylist.c (list_keyblock_print): Don't dump attribs for
revoked/expired/etc uids for non-colon key listings. This is for
consistency with --show-photos.
* main.h, keylist.c (dump_attribs), mainproc.c (check_sig_and_print): Dump
attribs if --attrib-fd is set when verifying signatures.
* g10.c (main): New --gnupg option to disable the various --openpgp,
--pgpX, etc. options. This is the same as --no-XXXX for those options.
* revoke.c (ask_revocation_reason): Clear old reason if user elects to
repeat question. This is bug 153.
* keyedit.c (sign_uids): Show keyid of the key making the signature.
2003-05-21 16:42:22 +00:00
|
|
|
|
int disabled=0;
|
2002-12-26 22:22:50 +00:00
|
|
|
|
|
* trustdb.h, trustdb.c (is_disabled), gpgv.c (is_disabled): Rename
is_disabled to cache_disabled_value, which now takes a pk and not just the
keyid. This is for speed since there is no need to re-fetch a key when we
already have that key handy. Cache the result of the check so we don't
need to hit the trustdb more than once.
* getkey.c (skip_disabled): New function to get a pk and call is_disabled
on it. (key_byname): Use it here.
* packet.h, getkey.c (skip_disabled), keylist.c (print_capabilities): New
"pk_is_disabled" macro to retrieve the cached disabled value if available,
and fill it in via cache_disabled_value if not available.
* trustdb.c (get_validity): Cache the disabled value since we have it
handy and it might be useful later.
* parse-packet.c (parse_key): Clear disabled flag when parsing a new key.
Just in case someone forgets to clear the whole key.
* getkey.c (merge_selfsigs_main): Add an "if all else fails" path for
setting a single user ID primary when there are multiple set primaries all
at the same second, or no primaries set and the most recent user IDs are
at the same second, or no signed user IDs at all. This is arbitrary, but
deterministic.
* exec.h, photoid.h: Add copyright message.
* keylist.c (list_keyblock_print): Don't dump attribs for
revoked/expired/etc uids for non-colon key listings. This is for
consistency with --show-photos.
* main.h, keylist.c (dump_attribs), mainproc.c (check_sig_and_print): Dump
attribs if --attrib-fd is set when verifying signatures.
* g10.c (main): New --gnupg option to disable the various --openpgp,
--pgpX, etc. options. This is the same as --no-XXXX for those options.
* revoke.c (ask_revocation_reason): Clear old reason if user elects to
repeat question. This is bug 153.
* keyedit.c (sign_uids): Show keyid of the key making the signature.
2003-05-21 16:42:22 +00:00
|
|
|
|
if(pk->is_disabled)
|
|
|
|
|
return (pk->is_disabled==2);
|
|
|
|
|
|
|
|
|
|
init_trustdb();
|
2013-10-11 09:25:58 +02:00
|
|
|
|
if (trustdb_args.no_trustdb)
|
|
|
|
|
return 0; /* No trustdb => not disabled. */
|
2002-12-26 22:22:50 +00:00
|
|
|
|
|
|
|
|
|
rc = read_trust_record (pk, &trec);
|
|
|
|
|
if (rc && rc != -1)
|
|
|
|
|
{
|
|
|
|
|
tdbio_invalid ();
|
|
|
|
|
goto leave;
|
|
|
|
|
}
|
|
|
|
|
if (rc == -1) /* no record found, so assume not disabled */
|
|
|
|
|
goto leave;
|
2013-10-11 09:25:58 +02:00
|
|
|
|
|
2002-12-26 22:22:50 +00:00
|
|
|
|
if(trec.r.trust.ownertrust & TRUST_FLAG_DISABLED)
|
|
|
|
|
disabled=1;
|
2013-10-11 09:25:58 +02:00
|
|
|
|
|
* trustdb.h, trustdb.c (is_disabled), gpgv.c (is_disabled): Rename
is_disabled to cache_disabled_value, which now takes a pk and not just the
keyid. This is for speed since there is no need to re-fetch a key when we
already have that key handy. Cache the result of the check so we don't
need to hit the trustdb more than once.
* getkey.c (skip_disabled): New function to get a pk and call is_disabled
on it. (key_byname): Use it here.
* packet.h, getkey.c (skip_disabled), keylist.c (print_capabilities): New
"pk_is_disabled" macro to retrieve the cached disabled value if available,
and fill it in via cache_disabled_value if not available.
* trustdb.c (get_validity): Cache the disabled value since we have it
handy and it might be useful later.
* parse-packet.c (parse_key): Clear disabled flag when parsing a new key.
Just in case someone forgets to clear the whole key.
* getkey.c (merge_selfsigs_main): Add an "if all else fails" path for
setting a single user ID primary when there are multiple set primaries all
at the same second, or no primaries set and the most recent user IDs are
at the same second, or no signed user IDs at all. This is arbitrary, but
deterministic.
* exec.h, photoid.h: Add copyright message.
* keylist.c (list_keyblock_print): Don't dump attribs for
revoked/expired/etc uids for non-colon key listings. This is for
consistency with --show-photos.
* main.h, keylist.c (dump_attribs), mainproc.c (check_sig_and_print): Dump
attribs if --attrib-fd is set when verifying signatures.
* g10.c (main): New --gnupg option to disable the various --openpgp,
--pgpX, etc. options. This is the same as --no-XXXX for those options.
* revoke.c (ask_revocation_reason): Clear old reason if user elects to
repeat question. This is bug 153.
* keyedit.c (sign_uids): Show keyid of the key making the signature.
2003-05-21 16:42:22 +00:00
|
|
|
|
/* Cache it for later so we don't need to look at the trustdb every
|
|
|
|
|
time */
|
|
|
|
|
if(disabled)
|
|
|
|
|
pk->is_disabled=2;
|
|
|
|
|
else
|
|
|
|
|
pk->is_disabled=1;
|
|
|
|
|
|
2002-12-26 22:22:50 +00:00
|
|
|
|
leave:
|
* trustdb.h, trustdb.c (is_disabled), gpgv.c (is_disabled): Rename
is_disabled to cache_disabled_value, which now takes a pk and not just the
keyid. This is for speed since there is no need to re-fetch a key when we
already have that key handy. Cache the result of the check so we don't
need to hit the trustdb more than once.
* getkey.c (skip_disabled): New function to get a pk and call is_disabled
on it. (key_byname): Use it here.
* packet.h, getkey.c (skip_disabled), keylist.c (print_capabilities): New
"pk_is_disabled" macro to retrieve the cached disabled value if available,
and fill it in via cache_disabled_value if not available.
* trustdb.c (get_validity): Cache the disabled value since we have it
handy and it might be useful later.
* parse-packet.c (parse_key): Clear disabled flag when parsing a new key.
Just in case someone forgets to clear the whole key.
* getkey.c (merge_selfsigs_main): Add an "if all else fails" path for
setting a single user ID primary when there are multiple set primaries all
at the same second, or no primaries set and the most recent user IDs are
at the same second, or no signed user IDs at all. This is arbitrary, but
deterministic.
* exec.h, photoid.h: Add copyright message.
* keylist.c (list_keyblock_print): Don't dump attribs for
revoked/expired/etc uids for non-colon key listings. This is for
consistency with --show-photos.
* main.h, keylist.c (dump_attribs), mainproc.c (check_sig_and_print): Dump
attribs if --attrib-fd is set when verifying signatures.
* g10.c (main): New --gnupg option to disable the various --openpgp,
--pgpX, etc. options. This is the same as --no-XXXX for those options.
* revoke.c (ask_revocation_reason): Clear old reason if user elects to
repeat question. This is bug 153.
* keyedit.c (sign_uids): Show keyid of the key making the signature.
2003-05-21 16:42:22 +00:00
|
|
|
|
return disabled;
|
2002-12-26 22:22:50 +00:00
|
|
|
|
}
|
|
|
|
|
|
2003-09-30 15:30:39 +00:00
|
|
|
|
void
|
|
|
|
|
check_trustdb_stale(void)
|
2002-06-29 13:46:34 +00:00
|
|
|
|
{
|
2003-09-30 15:30:39 +00:00
|
|
|
|
static int did_nextcheck=0;
|
2003-04-30 05:33:52 +00:00
|
|
|
|
|
2002-06-29 13:46:34 +00:00
|
|
|
|
init_trustdb ();
|
2013-10-11 09:25:58 +02:00
|
|
|
|
if (trustdb_args.no_trustdb)
|
|
|
|
|
return; /* No trustdb => can't be stale. */
|
|
|
|
|
|
2003-01-15 17:07:54 +00:00
|
|
|
|
if (!did_nextcheck
|
* tdbio.c (create_version_record): Only create new trustdbs with
TM_CLASSIC or TM_PGP.
* trustdb.h, trustdb.c (trust_string, get_ownertrust_string,
get_validity_string, ask_ownertrust, validate_keys), pkclist.c
(do_edit_ownertrust): Rename trust_string to trust_value_to_string for
naming consistency.
* trustdb.h, trustdb.c (string_to_trust_value): New function to translate
a string to a trust value.
* g10.c (main): Use string_to_trust_value here for --force-ownertrust.
* options.h, g10.c (main), trustdb.c (trust_model_string, init_trustdb,
check_trustdb, update_trustdb, get_validity, validate_one_keyblock): An
"OpenPGP" trust model is misleading since there is no official OpenPGP
trust model. Use "PGP" instead.
2003-05-01 21:37:08 +00:00
|
|
|
|
&& (opt.trust_model==TM_PGP || opt.trust_model==TM_CLASSIC))
|
2002-06-29 13:46:34 +00:00
|
|
|
|
{
|
|
|
|
|
ulong scheduled;
|
|
|
|
|
|
|
|
|
|
did_nextcheck = 1;
|
|
|
|
|
scheduled = tdbio_read_nextcheck ();
|
2012-01-19 22:33:51 -05:00
|
|
|
|
if ((scheduled && scheduled <= make_timestamp ())
|
|
|
|
|
|| pending_check_trustdb)
|
2002-06-29 13:46:34 +00:00
|
|
|
|
{
|
2013-10-11 09:25:58 +02:00
|
|
|
|
if (opt.no_auto_check_trustdb)
|
2002-06-29 13:46:34 +00:00
|
|
|
|
{
|
|
|
|
|
pending_check_trustdb = 1;
|
* g10.c (main): Add --no-textmode.
* export.c (do_export_stream), keyedit.c (show_key_with_all_names,
menu_addrevoker), mainproc.c (check_sig_and_print), photoid.c
(show_photos), sign.c (mk_notation_and_policy), trustdb.c (get_validity,
reset_trust_records, validate_keys): Make some strings translatable.
* mainproc.c (check_sig_and_print): Show digest algorithm and sig class
when verifying a sig with --verbose on, and add version, pk and hash
algorithms and sig class to VALIDSIG.
* parse-packet.c (enum_sig_subpkt): Make a warning message a --verbose
warning message since we don't need to warn every time we see an unknown
critical (we only need to invalidate the signature).
* trustdb.c (init_trustdb): Check the trustdb options even with TM_AUTO
since the auto may become TM_CLASSIC or TM_OPENPGP.
2003-04-27 20:22:09 +00:00
|
|
|
|
log_info (_("please do a --check-trustdb\n"));
|
2002-06-29 13:46:34 +00:00
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
|
|
|
|
log_info (_("checking the trustdb\n"));
|
|
|
|
|
validate_keys (0);
|
|
|
|
|
}
|
|
|
|
|
}
|
1999-07-07 11:28:26 +00:00
|
|
|
|
}
|
2003-09-30 15:30:39 +00:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/*
|
|
|
|
|
* Return the validity information for PK. If the namehash is not
|
|
|
|
|
* NULL, the validity of the corresponsing user ID is returned,
|
2013-10-11 09:25:58 +02:00
|
|
|
|
* otherwise, a reasonable value for the entire key is returned.
|
2003-09-30 15:30:39 +00:00
|
|
|
|
*/
|
|
|
|
|
unsigned int
|
|
|
|
|
get_validity (PKT_public_key *pk, PKT_user_id *uid)
|
|
|
|
|
{
|
|
|
|
|
TRUSTREC trec, vrec;
|
|
|
|
|
int rc;
|
|
|
|
|
ulong recno;
|
|
|
|
|
unsigned int validity;
|
|
|
|
|
u32 kid[2];
|
|
|
|
|
PKT_public_key *main_pk;
|
|
|
|
|
|
|
|
|
|
if(uid)
|
|
|
|
|
namehash_from_uid(uid);
|
|
|
|
|
|
|
|
|
|
init_trustdb ();
|
2013-10-11 09:25:58 +02:00
|
|
|
|
|
|
|
|
|
/* If we have no trustdb (which also means it has not been created)
|
|
|
|
|
and the trust-model is always, we don't know the validity -
|
|
|
|
|
return immediately. If we won't do that the tdbio code would try
|
|
|
|
|
to open the trustdb and run into a fatal error. */
|
|
|
|
|
if (trustdb_args.no_trustdb && opt.trust_model == TM_ALWAYS)
|
|
|
|
|
return TRUST_UNKNOWN;
|
|
|
|
|
|
2003-09-30 15:30:39 +00:00
|
|
|
|
check_trustdb_stale();
|
1999-06-29 19:50:54 +00:00
|
|
|
|
|
2002-06-29 13:46:34 +00:00
|
|
|
|
keyid_from_pk (pk, kid);
|
|
|
|
|
if (pk->main_keyid[0] != kid[0] || pk->main_keyid[1] != kid[1])
|
|
|
|
|
{ /* this is a subkey - get the mainkey */
|
2005-07-27 18:10:56 +00:00
|
|
|
|
main_pk = xmalloc_clear (sizeof *main_pk);
|
2002-06-29 13:46:34 +00:00
|
|
|
|
rc = get_pubkey (main_pk, pk->main_keyid);
|
|
|
|
|
if (rc)
|
|
|
|
|
{
|
2005-07-27 18:10:56 +00:00
|
|
|
|
char *tempkeystr=xstrdup(keystr(pk->main_keyid));
|
2004-03-15 23:15:57 +00:00
|
|
|
|
log_error ("error getting main key %s of subkey %s: %s\n",
|
|
|
|
|
tempkeystr, keystr(kid), g10_errstr(rc));
|
2005-07-27 18:10:56 +00:00
|
|
|
|
xfree(tempkeystr);
|
2013-10-11 09:25:58 +02:00
|
|
|
|
validity = TRUST_UNKNOWN;
|
2002-06-29 13:46:34 +00:00
|
|
|
|
goto leave;
|
1999-07-07 11:28:26 +00:00
|
|
|
|
}
|
1999-06-29 19:50:54 +00:00
|
|
|
|
}
|
2002-06-29 13:46:34 +00:00
|
|
|
|
else
|
|
|
|
|
main_pk = pk;
|
|
|
|
|
|
2004-10-13 15:34:52 +00:00
|
|
|
|
if(opt.trust_model==TM_DIRECT)
|
|
|
|
|
{
|
|
|
|
|
/* Note that this happens BEFORE any user ID stuff is checked.
|
|
|
|
|
The direct trust model applies to keys as a whole. */
|
|
|
|
|
validity=get_ownertrust(main_pk);
|
|
|
|
|
goto leave;
|
|
|
|
|
}
|
|
|
|
|
|
2002-06-29 13:46:34 +00:00
|
|
|
|
rc = read_trust_record (main_pk, &trec);
|
|
|
|
|
if (rc && rc != -1)
|
|
|
|
|
{
|
|
|
|
|
tdbio_invalid ();
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
if (rc == -1) /* no record found */
|
|
|
|
|
{
|
2013-10-11 09:25:58 +02:00
|
|
|
|
validity = TRUST_UNKNOWN;
|
2002-06-29 13:46:34 +00:00
|
|
|
|
goto leave;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* loop over all user IDs */
|
|
|
|
|
recno = trec.r.trust.validlist;
|
|
|
|
|
validity = 0;
|
|
|
|
|
while (recno)
|
|
|
|
|
{
|
|
|
|
|
read_record (recno, &vrec, RECTYPE_VALID);
|
2003-04-30 05:33:52 +00:00
|
|
|
|
|
|
|
|
|
if(uid)
|
|
|
|
|
{
|
|
|
|
|
/* If a user ID is given we return the validity for that
|
|
|
|
|
user ID ONLY. If the namehash is not found, then there
|
|
|
|
|
is no validity at all (i.e. the user ID wasn't
|
|
|
|
|
signed). */
|
|
|
|
|
if(memcmp(vrec.r.valid.namehash,uid->namehash,20)==0)
|
|
|
|
|
{
|
|
|
|
|
validity=(vrec.r.valid.validity & TRUST_MASK);
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
|
|
|
|
/* If no namehash is given, we take the maximum validity
|
|
|
|
|
over all user IDs */
|
|
|
|
|
if ( validity < (vrec.r.valid.validity & TRUST_MASK) )
|
|
|
|
|
validity = (vrec.r.valid.validity & TRUST_MASK);
|
|
|
|
|
}
|
|
|
|
|
|
2002-06-29 13:46:34 +00:00
|
|
|
|
recno = vrec.r.valid.next;
|
|
|
|
|
}
|
2013-10-11 09:25:58 +02:00
|
|
|
|
|
2002-06-29 13:46:34 +00:00
|
|
|
|
if ( (trec.r.trust.ownertrust & TRUST_FLAG_DISABLED) )
|
* trustdb.h, trustdb.c (is_disabled), gpgv.c (is_disabled): Rename
is_disabled to cache_disabled_value, which now takes a pk and not just the
keyid. This is for speed since there is no need to re-fetch a key when we
already have that key handy. Cache the result of the check so we don't
need to hit the trustdb more than once.
* getkey.c (skip_disabled): New function to get a pk and call is_disabled
on it. (key_byname): Use it here.
* packet.h, getkey.c (skip_disabled), keylist.c (print_capabilities): New
"pk_is_disabled" macro to retrieve the cached disabled value if available,
and fill it in via cache_disabled_value if not available.
* trustdb.c (get_validity): Cache the disabled value since we have it
handy and it might be useful later.
* parse-packet.c (parse_key): Clear disabled flag when parsing a new key.
Just in case someone forgets to clear the whole key.
* getkey.c (merge_selfsigs_main): Add an "if all else fails" path for
setting a single user ID primary when there are multiple set primaries all
at the same second, or no primaries set and the most recent user IDs are
at the same second, or no signed user IDs at all. This is arbitrary, but
deterministic.
* exec.h, photoid.h: Add copyright message.
* keylist.c (list_keyblock_print): Don't dump attribs for
revoked/expired/etc uids for non-colon key listings. This is for
consistency with --show-photos.
* main.h, keylist.c (dump_attribs), mainproc.c (check_sig_and_print): Dump
attribs if --attrib-fd is set when verifying signatures.
* g10.c (main): New --gnupg option to disable the various --openpgp,
--pgpX, etc. options. This is the same as --no-XXXX for those options.
* revoke.c (ask_revocation_reason): Clear old reason if user elects to
repeat question. This is bug 153.
* keyedit.c (sign_uids): Show keyid of the key making the signature.
2003-05-21 16:42:22 +00:00
|
|
|
|
{
|
|
|
|
|
validity |= TRUST_FLAG_DISABLED;
|
|
|
|
|
pk->is_disabled=2;
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
pk->is_disabled=1;
|
2002-06-29 13:46:34 +00:00
|
|
|
|
|
|
|
|
|
leave:
|
|
|
|
|
/* set some flags direct from the key */
|
|
|
|
|
if (main_pk->is_revoked)
|
|
|
|
|
validity |= TRUST_FLAG_REVOKED;
|
|
|
|
|
if (main_pk != pk && pk->is_revoked)
|
|
|
|
|
validity |= TRUST_FLAG_SUB_REVOKED;
|
|
|
|
|
/* Note: expiration is a trust value and not a flag - don't know why
|
|
|
|
|
* I initially designed it that way */
|
|
|
|
|
if (main_pk->has_expired || pk->has_expired)
|
|
|
|
|
validity = (validity & ~TRUST_MASK) | TRUST_EXPIRED;
|
2013-10-11 09:25:58 +02:00
|
|
|
|
|
2002-06-29 13:46:34 +00:00
|
|
|
|
if (pending_check_trustdb)
|
|
|
|
|
validity |= TRUST_FLAG_PENDING_CHECK;
|
|
|
|
|
|
|
|
|
|
if (main_pk != pk)
|
|
|
|
|
free_public_key (main_pk);
|
|
|
|
|
return validity;
|
1998-12-17 17:36:05 +00:00
|
|
|
|
}
|
|
|
|
|
|
1999-03-11 15:42:06 +00:00
|
|
|
|
int
|
* armor.c (armor_filter): Comment about PGP's end of line tab problem.
* trustdb.h, trustdb.c (trust_letter): Make static. (get_ownertrust_info,
get_validity_info): Don't mask the trust level twice.
* trustdb.h, gpgv.c, trustdb.c (get_validity, get_validity_info),
keylist.c (list_keyblock_colon), keyedit.c (show_key_with_all_names_colon,
menu_revuid): Pass a user ID in rather than a namehash, so we only have to
do the hashing in one place.
* packet.h, pkclist.c (build_pk_list), free-packet.c
(release_public_key_parts): Remove unused namehash element for public
keys.
2003-01-11 03:57:00 +00:00
|
|
|
|
get_validity_info (PKT_public_key *pk, PKT_user_id *uid)
|
1998-01-24 16:32:27 +00:00
|
|
|
|
{
|
2002-06-29 13:46:34 +00:00
|
|
|
|
int trustlevel;
|
1998-01-24 16:32:27 +00:00
|
|
|
|
|
2009-09-28 17:11:32 +00:00
|
|
|
|
if (!pk)
|
|
|
|
|
return '?'; /* Just in case a NULL PK is passed. */
|
|
|
|
|
|
* armor.c (armor_filter): Comment about PGP's end of line tab problem.
* trustdb.h, trustdb.c (trust_letter): Make static. (get_ownertrust_info,
get_validity_info): Don't mask the trust level twice.
* trustdb.h, gpgv.c, trustdb.c (get_validity, get_validity_info),
keylist.c (list_keyblock_colon), keyedit.c (show_key_with_all_names_colon,
menu_revuid): Pass a user ID in rather than a namehash, so we only have to
do the hashing in one place.
* packet.h, pkclist.c (build_pk_list), free-packet.c
(release_public_key_parts): Remove unused namehash element for public
keys.
2003-01-11 03:57:00 +00:00
|
|
|
|
trustlevel = get_validity (pk, uid);
|
2002-06-29 13:46:34 +00:00
|
|
|
|
if( trustlevel & TRUST_FLAG_REVOKED )
|
|
|
|
|
return 'r';
|
2003-01-11 21:13:41 +00:00
|
|
|
|
return trust_letter ( trustlevel );
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
const char *
|
|
|
|
|
get_validity_string (PKT_public_key *pk, PKT_user_id *uid)
|
|
|
|
|
{
|
|
|
|
|
int trustlevel;
|
|
|
|
|
|
2009-09-28 17:11:32 +00:00
|
|
|
|
if (!pk)
|
|
|
|
|
return "err"; /* Just in case a NULL PK is passed. */
|
|
|
|
|
|
2003-01-11 21:13:41 +00:00
|
|
|
|
trustlevel = get_validity (pk, uid);
|
|
|
|
|
if( trustlevel & TRUST_FLAG_REVOKED )
|
|
|
|
|
return _("revoked");
|
* tdbio.c (create_version_record): Only create new trustdbs with
TM_CLASSIC or TM_PGP.
* trustdb.h, trustdb.c (trust_string, get_ownertrust_string,
get_validity_string, ask_ownertrust, validate_keys), pkclist.c
(do_edit_ownertrust): Rename trust_string to trust_value_to_string for
naming consistency.
* trustdb.h, trustdb.c (string_to_trust_value): New function to translate
a string to a trust value.
* g10.c (main): Use string_to_trust_value here for --force-ownertrust.
* options.h, g10.c (main), trustdb.c (trust_model_string, init_trustdb,
check_trustdb, update_trustdb, get_validity, validate_one_keyblock): An
"OpenPGP" trust model is misleading since there is no official OpenPGP
trust model. Use "PGP" instead.
2003-05-01 21:37:08 +00:00
|
|
|
|
return trust_value_to_string(trustlevel);
|
1999-07-07 11:28:26 +00:00
|
|
|
|
}
|
|
|
|
|
|
2003-01-06 22:56:08 +00:00
|
|
|
|
static void
|
|
|
|
|
get_validity_counts (PKT_public_key *pk, PKT_user_id *uid)
|
|
|
|
|
{
|
|
|
|
|
TRUSTREC trec, vrec;
|
|
|
|
|
ulong recno;
|
|
|
|
|
|
|
|
|
|
if(pk==NULL || uid==NULL)
|
|
|
|
|
BUG();
|
|
|
|
|
|
2003-01-14 18:13:22 +00:00
|
|
|
|
namehash_from_uid(uid);
|
1998-10-01 07:23:00 +00:00
|
|
|
|
|
2003-01-06 22:56:08 +00:00
|
|
|
|
uid->help_marginal_count=uid->help_full_count=0;
|
1998-10-01 07:23:00 +00:00
|
|
|
|
|
2003-01-06 22:56:08 +00:00
|
|
|
|
init_trustdb ();
|
|
|
|
|
|
|
|
|
|
if(read_trust_record (pk, &trec)!=0)
|
|
|
|
|
return;
|
|
|
|
|
|
|
|
|
|
/* loop over all user IDs */
|
|
|
|
|
recno = trec.r.trust.validlist;
|
|
|
|
|
while (recno)
|
|
|
|
|
{
|
|
|
|
|
read_record (recno, &vrec, RECTYPE_VALID);
|
|
|
|
|
|
2003-01-14 18:13:22 +00:00
|
|
|
|
if(memcmp(vrec.r.valid.namehash,uid->namehash,20)==0)
|
2003-01-06 22:56:08 +00:00
|
|
|
|
{
|
|
|
|
|
uid->help_marginal_count=vrec.r.valid.marginal_count;
|
|
|
|
|
uid->help_full_count=vrec.r.valid.full_count;
|
|
|
|
|
/* printf("Fetched marginal %d, full %d\n",uid->help_marginal_count,uid->help_full_count); */
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
recno = vrec.r.valid.next;
|
|
|
|
|
}
|
|
|
|
|
}
|
1999-06-29 19:50:54 +00:00
|
|
|
|
|
2002-06-29 13:46:34 +00:00
|
|
|
|
void
|
|
|
|
|
list_trust_path( const char *username )
|
1998-10-12 20:16:38 +00:00
|
|
|
|
{
|
|
|
|
|
}
|
|
|
|
|
|
1999-07-01 10:53:35 +00:00
|
|
|
|
/****************
|
2002-06-29 13:46:34 +00:00
|
|
|
|
* Enumerate all keys, which are needed to build all trust paths for
|
|
|
|
|
* the given key. This function does not return the key itself or
|
|
|
|
|
* the ultimate key (the last point in cerificate chain). Only
|
|
|
|
|
* certificate chains which ends up at an ultimately trusted key
|
|
|
|
|
* are listed. If ownertrust or validity is not NULL, the corresponding
|
|
|
|
|
* value for the returned LID is also returned in these variable(s).
|
|
|
|
|
*
|
|
|
|
|
* 1) create a void pointer and initialize it to NULL
|
|
|
|
|
* 2) pass this void pointer by reference to this function.
|
|
|
|
|
* Set lid to the key you want to enumerate and pass it by reference.
|
|
|
|
|
* 3) call this function as long as it does not return -1
|
|
|
|
|
* to indicate EOF. LID does contain the next key used to build the web
|
|
|
|
|
* 4) Always call this function a last time with LID set to NULL,
|
|
|
|
|
* so that it can free its context.
|
|
|
|
|
*
|
|
|
|
|
* Returns: -1 on EOF or the level of the returned LID
|
1999-07-01 10:53:35 +00:00
|
|
|
|
*/
|
|
|
|
|
int
|
2002-06-29 13:46:34 +00:00
|
|
|
|
enum_cert_paths( void **context, ulong *lid,
|
|
|
|
|
unsigned *ownertrust, unsigned *validity )
|
1999-07-07 11:28:26 +00:00
|
|
|
|
{
|
2002-06-29 13:46:34 +00:00
|
|
|
|
return -1;
|
1999-07-07 11:28:26 +00:00
|
|
|
|
}
|
|
|
|
|
|
1998-10-12 20:16:38 +00:00
|
|
|
|
|
1999-06-29 19:50:54 +00:00
|
|
|
|
/****************
|
2002-06-29 13:46:34 +00:00
|
|
|
|
* Print the current path
|
1999-06-29 19:50:54 +00:00
|
|
|
|
*/
|
|
|
|
|
void
|
2002-06-29 13:46:34 +00:00
|
|
|
|
enum_cert_paths_print( void **context, FILE *fp,
|
|
|
|
|
int refresh, ulong selected_lid )
|
1999-06-29 19:50:54 +00:00
|
|
|
|
{
|
2002-06-29 13:46:34 +00:00
|
|
|
|
return;
|
1999-06-29 19:50:54 +00:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
2002-06-29 13:46:34 +00:00
|
|
|
|
|
|
|
|
|
/****************************************
|
|
|
|
|
*********** NEW NEW NEW ****************
|
|
|
|
|
****************************************/
|
1999-06-29 19:50:54 +00:00
|
|
|
|
|
2002-06-29 13:46:34 +00:00
|
|
|
|
static int
|
2002-10-30 03:11:57 +00:00
|
|
|
|
ask_ownertrust (u32 *kid,int minimum)
|
1999-06-29 19:50:54 +00:00
|
|
|
|
{
|
2002-06-29 13:46:34 +00:00
|
|
|
|
PKT_public_key *pk;
|
|
|
|
|
int rc;
|
|
|
|
|
int ot;
|
1999-06-29 19:50:54 +00:00
|
|
|
|
|
2005-07-27 18:10:56 +00:00
|
|
|
|
pk = xmalloc_clear (sizeof *pk);
|
2002-06-29 13:46:34 +00:00
|
|
|
|
rc = get_pubkey (pk, kid);
|
|
|
|
|
if (rc)
|
|
|
|
|
{
|
2004-03-15 23:15:57 +00:00
|
|
|
|
log_error (_("public key %s not found: %s\n"),
|
|
|
|
|
keystr(kid), g10_errstr(rc) );
|
2002-06-29 13:46:34 +00:00
|
|
|
|
return TRUST_UNKNOWN;
|
1999-06-29 19:50:54 +00:00
|
|
|
|
}
|
2013-10-11 09:25:58 +02:00
|
|
|
|
|
2002-11-07 04:37:27 +00:00
|
|
|
|
if(opt.force_ownertrust)
|
|
|
|
|
{
|
2004-03-15 23:15:57 +00:00
|
|
|
|
log_info("force trust for key %s to %s\n",
|
|
|
|
|
keystr(kid),trust_value_to_string(opt.force_ownertrust));
|
2002-11-07 04:37:27 +00:00
|
|
|
|
update_ownertrust(pk,opt.force_ownertrust);
|
|
|
|
|
ot=opt.force_ownertrust;
|
|
|
|
|
}
|
2002-06-29 13:46:34 +00:00
|
|
|
|
else
|
2002-11-07 04:37:27 +00:00
|
|
|
|
{
|
|
|
|
|
ot=edit_ownertrust(pk,0);
|
|
|
|
|
if(ot>0)
|
|
|
|
|
ot = get_ownertrust (pk);
|
|
|
|
|
else if(ot==0)
|
|
|
|
|
ot = minimum?minimum:TRUST_UNDEFINED;
|
|
|
|
|
else
|
|
|
|
|
ot = -1; /* quit */
|
|
|
|
|
}
|
|
|
|
|
|
2002-06-29 13:46:34 +00:00
|
|
|
|
free_public_key( pk );
|
2002-10-30 03:11:57 +00:00
|
|
|
|
|
2002-06-29 13:46:34 +00:00
|
|
|
|
return ot;
|
1999-06-29 19:50:54 +00:00
|
|
|
|
}
|
|
|
|
|
|
1999-03-11 15:42:06 +00:00
|
|
|
|
|
2002-06-29 13:46:34 +00:00
|
|
|
|
static void
|
|
|
|
|
mark_keyblock_seen (KeyHashTable tbl, KBNODE node)
|
1998-10-12 20:16:38 +00:00
|
|
|
|
{
|
2002-06-29 13:46:34 +00:00
|
|
|
|
for ( ;node; node = node->next )
|
|
|
|
|
if (node->pkt->pkttype == PKT_PUBLIC_KEY
|
2003-01-06 22:56:08 +00:00
|
|
|
|
|| node->pkt->pkttype == PKT_PUBLIC_SUBKEY)
|
2002-06-29 13:46:34 +00:00
|
|
|
|
{
|
|
|
|
|
u32 aki[2];
|
1999-07-07 11:28:26 +00:00
|
|
|
|
|
2002-06-29 13:46:34 +00:00
|
|
|
|
keyid_from_pk (node->pkt->pkt.public_key, aki);
|
|
|
|
|
add_key_hash_table (tbl, aki);
|
|
|
|
|
}
|
1998-10-25 19:00:01 +00:00
|
|
|
|
}
|
|
|
|
|
|
1998-10-12 20:16:38 +00:00
|
|
|
|
|
1999-03-17 12:13:04 +00:00
|
|
|
|
static void
|
2002-06-29 13:46:34 +00:00
|
|
|
|
dump_key_array (int depth, struct key_array *keys)
|
|
|
|
|
{
|
|
|
|
|
struct key_array *kar;
|
|
|
|
|
|
|
|
|
|
for (kar=keys; kar->keyblock; kar++)
|
|
|
|
|
{
|
|
|
|
|
KBNODE node = kar->keyblock;
|
|
|
|
|
u32 kid[2];
|
|
|
|
|
|
|
|
|
|
keyid_from_pk(node->pkt->pkt.public_key, kid);
|
|
|
|
|
printf ("%d:%08lX%08lX:K::%c::::\n",
|
|
|
|
|
depth, (ulong)kid[0], (ulong)kid[1], '?');
|
|
|
|
|
|
|
|
|
|
for (; node; node = node->next)
|
|
|
|
|
{
|
|
|
|
|
if (node->pkt->pkttype == PKT_USER_ID)
|
|
|
|
|
{
|
|
|
|
|
int len = node->pkt->pkt.user_id->len;
|
|
|
|
|
|
|
|
|
|
if (len > 30)
|
|
|
|
|
len = 30;
|
|
|
|
|
printf ("%d:%08lX%08lX:U:::%c:::",
|
|
|
|
|
depth, (ulong)kid[0], (ulong)kid[1],
|
|
|
|
|
(node->flag & 4)? 'f':
|
|
|
|
|
(node->flag & 2)? 'm':
|
|
|
|
|
(node->flag & 1)? 'q':'-');
|
|
|
|
|
print_string (stdout, node->pkt->pkt.user_id->name, len, ':');
|
|
|
|
|
putchar (':');
|
|
|
|
|
putchar ('\n');
|
|
|
|
|
}
|
|
|
|
|
}
|
1999-03-17 12:13:04 +00:00
|
|
|
|
}
|
2013-10-11 09:25:58 +02:00
|
|
|
|
}
|
1999-07-01 10:53:35 +00:00
|
|
|
|
|
1999-03-11 15:42:06 +00:00
|
|
|
|
|
1998-10-12 20:16:38 +00:00
|
|
|
|
static void
|
2003-01-06 22:56:08 +00:00
|
|
|
|
store_validation_status (int depth, KBNODE keyblock, KeyHashTable stored)
|
2002-06-29 13:46:34 +00:00
|
|
|
|
{
|
|
|
|
|
KBNODE node;
|
|
|
|
|
int status;
|
|
|
|
|
int any = 0;
|
|
|
|
|
|
|
|
|
|
for (node=keyblock; node; node = node->next)
|
|
|
|
|
{
|
|
|
|
|
if (node->pkt->pkttype == PKT_USER_ID)
|
|
|
|
|
{
|
|
|
|
|
PKT_user_id *uid = node->pkt->pkt.user_id;
|
|
|
|
|
if (node->flag & 4)
|
|
|
|
|
status = TRUST_FULLY;
|
|
|
|
|
else if (node->flag & 2)
|
|
|
|
|
status = TRUST_MARGINAL;
|
|
|
|
|
else if (node->flag & 1)
|
|
|
|
|
status = TRUST_UNDEFINED;
|
|
|
|
|
else
|
|
|
|
|
status = 0;
|
2013-10-11 09:25:58 +02:00
|
|
|
|
|
2002-06-29 13:46:34 +00:00
|
|
|
|
if (status)
|
|
|
|
|
{
|
|
|
|
|
update_validity (keyblock->pkt->pkt.public_key,
|
2003-01-06 22:56:08 +00:00
|
|
|
|
uid, depth, status);
|
|
|
|
|
|
|
|
|
|
mark_keyblock_seen(stored,keyblock);
|
|
|
|
|
|
2002-06-29 13:46:34 +00:00
|
|
|
|
any = 1;
|
|
|
|
|
}
|
|
|
|
|
}
|
1999-03-17 12:13:04 +00:00
|
|
|
|
}
|
|
|
|
|
|
2002-06-29 13:46:34 +00:00
|
|
|
|
if (any)
|
|
|
|
|
do_sync ();
|
2013-10-11 09:25:58 +02:00
|
|
|
|
}
|
2002-06-29 13:46:34 +00:00
|
|
|
|
|
|
|
|
|
/*
|
|
|
|
|
* check whether the signature sig is in the klist k
|
1999-03-17 12:13:04 +00:00
|
|
|
|
*/
|
2002-06-29 13:46:34 +00:00
|
|
|
|
static struct key_item *
|
|
|
|
|
is_in_klist (struct key_item *k, PKT_signature *sig)
|
1998-10-12 20:16:38 +00:00
|
|
|
|
{
|
2002-06-29 13:46:34 +00:00
|
|
|
|
for (; k; k = k->next)
|
|
|
|
|
{
|
|
|
|
|
if (k->kid[0] == sig->keyid[0] && k->kid[1] == sig->keyid[1])
|
|
|
|
|
return k;
|
1999-03-11 15:42:06 +00:00
|
|
|
|
}
|
2002-06-29 13:46:34 +00:00
|
|
|
|
return NULL;
|
1999-03-11 15:42:06 +00:00
|
|
|
|
}
|
1998-11-05 18:00:08 +00:00
|
|
|
|
|
2002-06-29 13:46:34 +00:00
|
|
|
|
/*
|
|
|
|
|
* Mark the signature of the given UID which are used to certify it.
|
|
|
|
|
* To do this, we first revmove all signatures which are not valid and
|
|
|
|
|
* from the remain ones we look for the latest one. If this is not a
|
|
|
|
|
* certification revocation signature we mark the signature by setting
|
2005-04-24 18:35:30 +00:00
|
|
|
|
* node flag bit 8. Revocations are marked with flag 11, and sigs
|
|
|
|
|
* from unavailable keys are marked with flag 12. Note that flag bits
|
|
|
|
|
* 9 and 10 are used for internal purposes.
|
1999-03-11 15:42:06 +00:00
|
|
|
|
*/
|
2002-06-29 13:46:34 +00:00
|
|
|
|
static void
|
|
|
|
|
mark_usable_uid_certs (KBNODE keyblock, KBNODE uidnode,
|
|
|
|
|
u32 *main_kid, struct key_item *klist,
|
|
|
|
|
u32 curtime, u32 *next_expire)
|
|
|
|
|
{
|
|
|
|
|
KBNODE node;
|
|
|
|
|
PKT_signature *sig;
|
2013-10-11 09:25:58 +02:00
|
|
|
|
|
2002-06-29 13:46:34 +00:00
|
|
|
|
/* first check all signatures */
|
|
|
|
|
for (node=uidnode->next; node; node = node->next)
|
|
|
|
|
{
|
2005-04-24 18:35:30 +00:00
|
|
|
|
int rc;
|
|
|
|
|
|
|
|
|
|
node->flag &= ~(1<<8 | 1<<9 | 1<<10 | 1<<11 | 1<<12);
|
2002-06-29 13:46:34 +00:00
|
|
|
|
if (node->pkt->pkttype == PKT_USER_ID
|
|
|
|
|
|| node->pkt->pkttype == PKT_PUBLIC_SUBKEY)
|
|
|
|
|
break; /* ready */
|
|
|
|
|
if (node->pkt->pkttype != PKT_SIGNATURE)
|
|
|
|
|
continue;
|
|
|
|
|
sig = node->pkt->pkt.signature;
|
2005-04-24 18:35:30 +00:00
|
|
|
|
if (main_kid
|
|
|
|
|
&& sig->keyid[0] == main_kid[0] && sig->keyid[1] == main_kid[1])
|
|
|
|
|
continue; /* ignore self-signatures if we pass in a main_kid */
|
2002-06-29 13:46:34 +00:00
|
|
|
|
if (!IS_UID_SIG(sig) && !IS_UID_REV(sig))
|
|
|
|
|
continue; /* we only look at these signature classes */
|
2004-02-23 04:00:51 +00:00
|
|
|
|
if(sig->sig_class>=0x11 && sig->sig_class<=0x13 &&
|
2004-02-24 23:37:18 +00:00
|
|
|
|
sig->sig_class-0x10<opt.min_cert_level)
|
2005-04-24 18:35:30 +00:00
|
|
|
|
continue; /* treat anything under our min_cert_level as an
|
|
|
|
|
invalid signature */
|
|
|
|
|
if (klist && !is_in_klist (klist, sig))
|
2002-06-29 13:46:34 +00:00
|
|
|
|
continue; /* no need to check it then */
|
2005-04-24 18:35:30 +00:00
|
|
|
|
if ((rc=check_key_signature (keyblock, node, NULL)))
|
|
|
|
|
{
|
|
|
|
|
/* we ignore anything that won't verify, but tag the
|
|
|
|
|
no_pubkey case */
|
|
|
|
|
if(rc==G10ERR_NO_PUBKEY)
|
|
|
|
|
node->flag |= 1<<12;
|
|
|
|
|
continue;
|
|
|
|
|
}
|
2002-06-29 13:46:34 +00:00
|
|
|
|
node->flag |= 1<<9;
|
2013-10-11 09:25:58 +02:00
|
|
|
|
}
|
2002-06-29 13:46:34 +00:00
|
|
|
|
/* reset the remaining flags */
|
|
|
|
|
for (; node; node = node->next)
|
2005-04-24 18:35:30 +00:00
|
|
|
|
node->flag &= ~(1<<8 | 1<<9 | 1<<10 | 1<<11 | 1<<12);
|
2002-06-29 13:46:34 +00:00
|
|
|
|
|
|
|
|
|
/* kbnode flag usage: bit 9 is here set for signatures to consider,
|
|
|
|
|
* bit 10 will be set by the loop to keep track of keyIDs already
|
2005-04-24 18:35:30 +00:00
|
|
|
|
* processed, bit 8 will be set for the usable signatures, and bit
|
|
|
|
|
* 11 will be set for usable revocations. */
|
2002-06-29 13:46:34 +00:00
|
|
|
|
|
|
|
|
|
/* for each cert figure out the latest valid one */
|
|
|
|
|
for (node=uidnode->next; node; node = node->next)
|
|
|
|
|
{
|
|
|
|
|
KBNODE n, signode;
|
|
|
|
|
u32 kid[2];
|
|
|
|
|
u32 sigdate;
|
2005-04-24 18:35:30 +00:00
|
|
|
|
|
2002-06-29 13:46:34 +00:00
|
|
|
|
if (node->pkt->pkttype == PKT_PUBLIC_SUBKEY)
|
|
|
|
|
break;
|
|
|
|
|
if ( !(node->flag & (1<<9)) )
|
|
|
|
|
continue; /* not a node to look at */
|
|
|
|
|
if ( (node->flag & (1<<10)) )
|
|
|
|
|
continue; /* signature with a keyID already processed */
|
|
|
|
|
node->flag |= (1<<10); /* mark this node as processed */
|
|
|
|
|
sig = node->pkt->pkt.signature;
|
|
|
|
|
signode = node;
|
|
|
|
|
sigdate = sig->timestamp;
|
|
|
|
|
kid[0] = sig->keyid[0]; kid[1] = sig->keyid[1];
|
2005-04-24 18:35:30 +00:00
|
|
|
|
|
|
|
|
|
/* Now find the latest and greatest signature */
|
2002-06-29 13:46:34 +00:00
|
|
|
|
for (n=uidnode->next; n; n = n->next)
|
|
|
|
|
{
|
|
|
|
|
if (n->pkt->pkttype == PKT_PUBLIC_SUBKEY)
|
|
|
|
|
break;
|
|
|
|
|
if ( !(n->flag & (1<<9)) )
|
|
|
|
|
continue;
|
|
|
|
|
if ( (n->flag & (1<<10)) )
|
|
|
|
|
continue; /* shortcut already processed signatures */
|
|
|
|
|
sig = n->pkt->pkt.signature;
|
|
|
|
|
if (kid[0] != sig->keyid[0] || kid[1] != sig->keyid[1])
|
|
|
|
|
continue;
|
|
|
|
|
n->flag |= (1<<10); /* mark this node as processed */
|
|
|
|
|
|
|
|
|
|
/* If signode is nonrevocable and unexpired and n isn't,
|
|
|
|
|
then take signode (skip). It doesn't matter which is
|
|
|
|
|
older: if signode was older then we don't want to take n
|
|
|
|
|
as signode is nonrevocable. If n was older then we're
|
|
|
|
|
automatically fine. */
|
2013-10-11 09:25:58 +02:00
|
|
|
|
|
2002-06-29 13:46:34 +00:00
|
|
|
|
if(((IS_UID_SIG(signode->pkt->pkt.signature) &&
|
|
|
|
|
!signode->pkt->pkt.signature->flags.revocable &&
|
|
|
|
|
(signode->pkt->pkt.signature->expiredate==0 ||
|
|
|
|
|
signode->pkt->pkt.signature->expiredate>curtime))) &&
|
|
|
|
|
(!(IS_UID_SIG(n->pkt->pkt.signature) &&
|
|
|
|
|
!n->pkt->pkt.signature->flags.revocable &&
|
|
|
|
|
(n->pkt->pkt.signature->expiredate==0 ||
|
|
|
|
|
n->pkt->pkt.signature->expiredate>curtime))))
|
|
|
|
|
continue;
|
1999-03-11 15:42:06 +00:00
|
|
|
|
|
2002-06-29 13:46:34 +00:00
|
|
|
|
/* If n is nonrevocable and unexpired and signode isn't,
|
|
|
|
|
then take n. Again, it doesn't matter which is older: if
|
|
|
|
|
n was older then we don't want to take signode as n is
|
|
|
|
|
nonrevocable. If signode was older then we're
|
|
|
|
|
automatically fine. */
|
2013-10-11 09:25:58 +02:00
|
|
|
|
|
2002-06-29 13:46:34 +00:00
|
|
|
|
if((!(IS_UID_SIG(signode->pkt->pkt.signature) &&
|
|
|
|
|
!signode->pkt->pkt.signature->flags.revocable &&
|
|
|
|
|
(signode->pkt->pkt.signature->expiredate==0 ||
|
|
|
|
|
signode->pkt->pkt.signature->expiredate>curtime))) &&
|
|
|
|
|
((IS_UID_SIG(n->pkt->pkt.signature) &&
|
|
|
|
|
!n->pkt->pkt.signature->flags.revocable &&
|
|
|
|
|
(n->pkt->pkt.signature->expiredate==0 ||
|
|
|
|
|
n->pkt->pkt.signature->expiredate>curtime))))
|
|
|
|
|
{
|
|
|
|
|
signode = n;
|
|
|
|
|
sigdate = sig->timestamp;
|
|
|
|
|
continue;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* At this point, if it's newer, it goes in as the only
|
|
|
|
|
remaining possibilities are signode and n are both either
|
|
|
|
|
revocable or expired or both nonrevocable and unexpired.
|
|
|
|
|
If the timestamps are equal take the later ordered
|
|
|
|
|
packet, presuming that the key packets are hopefully in
|
|
|
|
|
their original order. */
|
|
|
|
|
|
|
|
|
|
if (sig->timestamp >= sigdate)
|
|
|
|
|
{
|
|
|
|
|
signode = n;
|
|
|
|
|
sigdate = sig->timestamp;
|
|
|
|
|
}
|
|
|
|
|
}
|
2005-04-24 18:35:30 +00:00
|
|
|
|
|
2002-06-29 13:46:34 +00:00
|
|
|
|
sig = signode->pkt->pkt.signature;
|
|
|
|
|
if (IS_UID_SIG (sig))
|
2013-10-11 09:25:58 +02:00
|
|
|
|
{ /* this seems to be a usable one which is not revoked.
|
2002-06-29 13:46:34 +00:00
|
|
|
|
* Just need to check whether there is an expiration time,
|
|
|
|
|
* We do the expired certification after finding a suitable
|
|
|
|
|
* certification, the assumption is that a signator does not
|
|
|
|
|
* want that after the expiration of his certificate the
|
|
|
|
|
* system falls back to an older certification which has a
|
|
|
|
|
* different expiration time */
|
|
|
|
|
const byte *p;
|
|
|
|
|
u32 expire;
|
2013-10-11 09:25:58 +02:00
|
|
|
|
|
2002-06-29 13:46:34 +00:00
|
|
|
|
p = parse_sig_subpkt (sig->hashed, SIGSUBPKT_SIG_EXPIRE, NULL );
|
2015-02-21 23:10:32 -05:00
|
|
|
|
expire = p? sig->timestamp + buf32_to_u32 (p) : 0;
|
2002-06-29 13:46:34 +00:00
|
|
|
|
|
|
|
|
|
if (expire==0 || expire > curtime )
|
|
|
|
|
{
|
|
|
|
|
signode->flag |= (1<<8); /* yeah, found a good cert */
|
2005-04-24 18:35:30 +00:00
|
|
|
|
if (next_expire && expire && expire < *next_expire)
|
2002-06-29 13:46:34 +00:00
|
|
|
|
*next_expire = expire;
|
|
|
|
|
}
|
|
|
|
|
}
|
2005-04-24 18:35:30 +00:00
|
|
|
|
else
|
|
|
|
|
signode->flag |= (1<<11);
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2005-11-18 04:25:07 +00:00
|
|
|
|
static int
|
2005-11-10 21:18:49 +00:00
|
|
|
|
clean_sigs_from_uid(KBNODE keyblock,KBNODE uidnode,int noisy,int self_only)
|
2005-04-24 18:35:30 +00:00
|
|
|
|
{
|
|
|
|
|
int deleted=0;
|
|
|
|
|
KBNODE node;
|
2005-11-10 21:18:49 +00:00
|
|
|
|
u32 keyid[2];
|
2005-04-24 18:35:30 +00:00
|
|
|
|
|
|
|
|
|
assert(keyblock->pkt->pkttype==PKT_PUBLIC_KEY);
|
|
|
|
|
|
2005-11-10 21:18:49 +00:00
|
|
|
|
keyid_from_pk(keyblock->pkt->pkt.public_key,keyid);
|
|
|
|
|
|
2005-04-24 18:35:30 +00:00
|
|
|
|
/* Passing in a 0 for current time here means that we'll never weed
|
|
|
|
|
out an expired sig. This is correct behavior since we want to
|
|
|
|
|
keep the most recent expired sig in a series. */
|
|
|
|
|
mark_usable_uid_certs(keyblock,uidnode,NULL,NULL,0,NULL);
|
|
|
|
|
|
|
|
|
|
/* What we want to do here is remove signatures that are not
|
|
|
|
|
considered as part of the trust calculations. Thus, all invalid
|
|
|
|
|
signatures are out, as are any signatures that aren't the last of
|
|
|
|
|
a series of uid sigs or revocations It breaks down like this:
|
|
|
|
|
coming out of mark_usable_uid_certs, if a sig is unflagged, it is
|
|
|
|
|
not even a candidate. If a sig has flag 9 or 10, that means it
|
|
|
|
|
was selected as a candidate and vetted. If a sig has flag 8 it
|
|
|
|
|
is a usable signature. If a sig has flag 11 it is a usable
|
|
|
|
|
revocation. If a sig has flag 12 it was issued by an unavailable
|
|
|
|
|
key. "Usable" here means the most recent valid
|
|
|
|
|
signature/revocation in a series from a particular signer.
|
|
|
|
|
|
|
|
|
|
Delete everything that isn't a usable uid sig (which might be
|
|
|
|
|
expired), a usable revocation, or a sig from an unavailable
|
|
|
|
|
key. */
|
|
|
|
|
|
|
|
|
|
for(node=uidnode->next;
|
|
|
|
|
node && node->pkt->pkttype==PKT_SIGNATURE;
|
|
|
|
|
node=node->next)
|
|
|
|
|
{
|
2005-11-10 21:18:49 +00:00
|
|
|
|
int keep=self_only?(node->pkt->pkt.signature->keyid[0]==keyid[0]
|
|
|
|
|
&& node->pkt->pkt.signature->keyid[1]==keyid[1]):1;
|
|
|
|
|
|
2005-04-24 18:35:30 +00:00
|
|
|
|
/* Keep usable uid sigs ... */
|
2005-11-10 21:18:49 +00:00
|
|
|
|
if((node->flag & (1<<8)) && keep)
|
2005-04-24 18:35:30 +00:00
|
|
|
|
continue;
|
|
|
|
|
|
|
|
|
|
/* ... and usable revocations... */
|
2005-11-10 21:18:49 +00:00
|
|
|
|
if((node->flag & (1<<11)) && keep)
|
2005-04-24 18:35:30 +00:00
|
|
|
|
continue;
|
|
|
|
|
|
|
|
|
|
/* ... and sigs from unavailable keys. */
|
2005-11-02 16:47:02 +00:00
|
|
|
|
/* disabled for now since more people seem to want sigs from
|
|
|
|
|
unavailable keys removed altogether. */
|
|
|
|
|
/*
|
|
|
|
|
if(node->flag & (1<<12))
|
2005-04-24 18:35:30 +00:00
|
|
|
|
continue;
|
2005-11-02 16:47:02 +00:00
|
|
|
|
*/
|
2005-04-24 18:35:30 +00:00
|
|
|
|
|
|
|
|
|
/* Everything else we delete */
|
|
|
|
|
|
2005-11-02 16:47:02 +00:00
|
|
|
|
/* At this point, if 12 is set, the signing key was unavailable.
|
2009-12-21 15:58:06 +00:00
|
|
|
|
If 9 or 10 is set, it's superseded. Otherwise, it's
|
2005-11-02 16:47:02 +00:00
|
|
|
|
invalid. */
|
2005-04-24 18:35:30 +00:00
|
|
|
|
|
|
|
|
|
if(noisy)
|
2005-11-02 16:47:02 +00:00
|
|
|
|
log_info("removing signature from key %s on user ID \"%s\": %s\n",
|
2005-04-24 18:35:30 +00:00
|
|
|
|
keystr(node->pkt->pkt.signature->keyid),
|
2005-06-14 03:55:19 +00:00
|
|
|
|
uidnode->pkt->pkt.user_id->name,
|
2005-11-02 16:47:02 +00:00
|
|
|
|
node->flag&(1<<12)?"key unavailable":
|
2009-12-21 15:58:06 +00:00
|
|
|
|
node->flag&(1<<9)?"signature superseded":"invalid signature");
|
2005-04-24 18:35:30 +00:00
|
|
|
|
|
|
|
|
|
delete_kbnode(node);
|
|
|
|
|
deleted++;
|
1998-11-03 19:38:58 +00:00
|
|
|
|
}
|
2013-10-11 09:25:58 +02:00
|
|
|
|
|
2005-04-24 18:35:30 +00:00
|
|
|
|
return deleted;
|
1998-10-12 20:16:38 +00:00
|
|
|
|
}
|
|
|
|
|
|
2005-05-30 03:43:30 +00:00
|
|
|
|
/* This is substantially easier than clean_sigs_from_uid since we just
|
|
|
|
|
have to establish if the uid has a valid self-sig, is not revoked,
|
|
|
|
|
and is not expired. Note that this does not take into account
|
|
|
|
|
whether the uid has a trust path to it - just whether the keyholder
|
2005-11-12 03:48:02 +00:00
|
|
|
|
themselves has certified the uid. Returns true if the uid was
|
|
|
|
|
compacted. To "compact" a user ID, we simply remove ALL signatures
|
2005-06-09 02:53:18 +00:00
|
|
|
|
except the self-sig that caused the user ID to be remove-worthy.
|
|
|
|
|
We don't actually remove the user ID packet itself since it might
|
2005-11-12 03:48:02 +00:00
|
|
|
|
be ressurected in a later merge. Note that this function requires
|
|
|
|
|
that the caller has already done a merge_keys_and_selfsig().
|
2005-06-10 02:52:41 +00:00
|
|
|
|
|
|
|
|
|
TODO: change the import code to allow importing a uid with only a
|
|
|
|
|
revocation if the uid already exists on the keyring. */
|
2005-11-12 03:48:02 +00:00
|
|
|
|
|
|
|
|
|
static int
|
|
|
|
|
clean_uid_from_key(KBNODE keyblock,KBNODE uidnode,int noisy)
|
2005-05-30 03:43:30 +00:00
|
|
|
|
{
|
2005-11-10 23:16:34 +00:00
|
|
|
|
KBNODE node;
|
2005-11-12 03:48:02 +00:00
|
|
|
|
PKT_user_id *uid=uidnode->pkt->pkt.user_id;
|
2005-11-12 04:53:03 +00:00
|
|
|
|
int deleted=0;
|
2005-05-30 03:43:30 +00:00
|
|
|
|
|
|
|
|
|
assert(keyblock->pkt->pkttype==PKT_PUBLIC_KEY);
|
2005-11-12 03:48:02 +00:00
|
|
|
|
assert(uidnode->pkt->pkttype==PKT_USER_ID);
|
2005-05-30 03:43:30 +00:00
|
|
|
|
|
2005-11-12 04:53:03 +00:00
|
|
|
|
/* Skip valid user IDs, compacted user IDs, and non-self-signed user
|
|
|
|
|
IDs if --allow-non-selfsigned-uid is set. */
|
|
|
|
|
if(uid->created || uid->flags.compacted
|
|
|
|
|
|| (!uid->is_expired && !uid->is_revoked
|
|
|
|
|
&& opt.allow_non_selfsigned_uid))
|
2005-11-12 03:48:02 +00:00
|
|
|
|
return 0;
|
2005-05-30 03:43:30 +00:00
|
|
|
|
|
2005-11-12 03:48:02 +00:00
|
|
|
|
for(node=uidnode->next;
|
|
|
|
|
node && node->pkt->pkttype==PKT_SIGNATURE;
|
2005-05-30 03:43:30 +00:00
|
|
|
|
node=node->next)
|
2005-11-12 03:48:02 +00:00
|
|
|
|
if(!node->pkt->pkt.signature->flags.chosen_selfsig)
|
2005-11-12 04:53:03 +00:00
|
|
|
|
{
|
|
|
|
|
delete_kbnode(node);
|
|
|
|
|
deleted=1;
|
|
|
|
|
uidnode->pkt->pkt.user_id->flags.compacted=1;
|
|
|
|
|
}
|
2005-11-12 03:48:02 +00:00
|
|
|
|
|
|
|
|
|
if(noisy)
|
2005-05-30 03:43:30 +00:00
|
|
|
|
{
|
2005-11-12 03:48:02 +00:00
|
|
|
|
const char *reason;
|
|
|
|
|
char *user=utf8_to_native(uid->name,uid->len,0);
|
2005-06-10 02:52:41 +00:00
|
|
|
|
|
2005-11-12 03:48:02 +00:00
|
|
|
|
if(uid->is_revoked)
|
|
|
|
|
reason=_("revoked");
|
|
|
|
|
else if(uid->is_expired)
|
|
|
|
|
reason=_("expired");
|
|
|
|
|
else
|
|
|
|
|
reason=_("invalid");
|
2005-06-10 02:52:41 +00:00
|
|
|
|
|
2005-11-12 03:48:02 +00:00
|
|
|
|
log_info("compacting user ID \"%s\" on key %s: %s\n",
|
|
|
|
|
user,keystr_from_pk(keyblock->pkt->pkt.public_key),
|
|
|
|
|
reason);
|
|
|
|
|
|
|
|
|
|
xfree(user);
|
2005-05-30 03:43:30 +00:00
|
|
|
|
}
|
2005-06-10 02:52:41 +00:00
|
|
|
|
|
2005-11-12 04:53:03 +00:00
|
|
|
|
return deleted;
|
2005-11-12 03:48:02 +00:00
|
|
|
|
}
|
|
|
|
|
|
2005-11-18 04:25:07 +00:00
|
|
|
|
/* Needs to be called after a merge_keys_and_selfsig() */
|
|
|
|
|
void
|
|
|
|
|
clean_one_uid(KBNODE keyblock,KBNODE uidnode,int noisy,int self_only,
|
|
|
|
|
int *uids_cleaned,int *sigs_cleaned)
|
2005-11-12 03:48:02 +00:00
|
|
|
|
{
|
2005-11-18 04:25:07 +00:00
|
|
|
|
int dummy;
|
2005-11-12 03:48:02 +00:00
|
|
|
|
|
2005-11-18 04:25:07 +00:00
|
|
|
|
assert(keyblock->pkt->pkttype==PKT_PUBLIC_KEY);
|
|
|
|
|
assert(uidnode->pkt->pkttype==PKT_USER_ID);
|
2005-11-12 03:48:02 +00:00
|
|
|
|
|
2005-11-18 04:25:07 +00:00
|
|
|
|
if(!uids_cleaned)
|
|
|
|
|
uids_cleaned=&dummy;
|
2005-11-12 03:48:02 +00:00
|
|
|
|
|
2005-11-18 04:25:07 +00:00
|
|
|
|
if(!sigs_cleaned)
|
|
|
|
|
sigs_cleaned=&dummy;
|
|
|
|
|
|
|
|
|
|
/* Do clean_uid_from_key first since if it fires off, we don't
|
|
|
|
|
have to bother with the other */
|
|
|
|
|
*uids_cleaned+=clean_uid_from_key(keyblock,uidnode,noisy);
|
|
|
|
|
if(!uidnode->pkt->pkt.user_id->flags.compacted)
|
|
|
|
|
*sigs_cleaned+=clean_sigs_from_uid(keyblock,uidnode,noisy,self_only);
|
2005-05-30 03:43:30 +00:00
|
|
|
|
}
|
|
|
|
|
|
2005-11-12 04:53:03 +00:00
|
|
|
|
void
|
|
|
|
|
clean_key(KBNODE keyblock,int noisy,int self_only,
|
|
|
|
|
int *uids_cleaned,int *sigs_cleaned)
|
|
|
|
|
{
|
|
|
|
|
KBNODE uidnode;
|
|
|
|
|
|
|
|
|
|
merge_keys_and_selfsig(keyblock);
|
|
|
|
|
|
|
|
|
|
for(uidnode=keyblock->next;
|
|
|
|
|
uidnode && uidnode->pkt->pkttype!=PKT_PUBLIC_SUBKEY;
|
|
|
|
|
uidnode=uidnode->next)
|
|
|
|
|
if(uidnode->pkt->pkttype==PKT_USER_ID)
|
2005-11-18 04:25:07 +00:00
|
|
|
|
clean_one_uid(keyblock,uidnode,noisy,self_only,
|
|
|
|
|
uids_cleaned,sigs_cleaned);
|
2005-11-12 04:53:03 +00:00
|
|
|
|
}
|
|
|
|
|
|
2007-12-12 16:38:23 +00:00
|
|
|
|
/* Returns a sanitized copy of the regexp (which might be "", but not
|
|
|
|
|
NULL). */
|
|
|
|
|
static char *
|
|
|
|
|
sanitize_regexp(const char *old)
|
|
|
|
|
{
|
|
|
|
|
size_t start=0,len=strlen(old),idx=0;
|
|
|
|
|
int escaped=0,standard_bracket=0;
|
|
|
|
|
char *new=xmalloc((len*2)+1); /* enough to \-escape everything if we
|
|
|
|
|
have to */
|
|
|
|
|
|
|
|
|
|
/* There are basically two commonly-used regexps here. GPG and most
|
|
|
|
|
versions of PGP use "<[^>]+[@.]example\.com>$" and PGP (9)
|
|
|
|
|
command line uses "example.com" (i.e. whatever the user specfies,
|
|
|
|
|
and we can't expect users know to use "\." instead of "."). So
|
|
|
|
|
here are the rules: we're allowed to start with "<[^>]+[@.]" and
|
|
|
|
|
end with ">$" or start and end with nothing. In between, the
|
|
|
|
|
only legal regex character is ".", and everything else gets
|
|
|
|
|
escaped. Part of the gotcha here is that some regex packages
|
|
|
|
|
allow more than RFC-4880 requires. For example, 4880 has no "{}"
|
|
|
|
|
operator, but GNU regex does. Commenting removes these operators
|
|
|
|
|
from consideration. A possible future enhancement is to use
|
|
|
|
|
commenting to effectively back off a given regex to the Henry
|
|
|
|
|
Spencer syntax in 4880. -dshaw */
|
|
|
|
|
|
|
|
|
|
/* Are we bracketed between "<[^>]+[@.]" and ">$" ? */
|
|
|
|
|
if(len>=12 && strncmp(old,"<[^>]+[@.]",10)==0
|
|
|
|
|
&& old[len-2]=='>' && old[len-1]=='$')
|
|
|
|
|
{
|
|
|
|
|
strcpy(new,"<[^>]+[@.]");
|
|
|
|
|
idx=strlen(new);
|
|
|
|
|
standard_bracket=1;
|
|
|
|
|
start+=10;
|
|
|
|
|
len-=2;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* Walk the remaining characters and ensure that everything that is
|
|
|
|
|
left is not an operational regex character. */
|
|
|
|
|
for(;start<len;start++)
|
|
|
|
|
{
|
|
|
|
|
if(!escaped && old[start]=='\\')
|
|
|
|
|
escaped=1;
|
|
|
|
|
else if(!escaped && old[start]!='.')
|
|
|
|
|
new[idx++]='\\';
|
|
|
|
|
else
|
|
|
|
|
escaped=0;
|
|
|
|
|
|
|
|
|
|
new[idx++]=old[start];
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
new[idx]='\0';
|
|
|
|
|
|
|
|
|
|
/* Note that the (sub)string we look at might end with a bare "\".
|
|
|
|
|
If it does, leave it that way. If the regexp actually ended with
|
|
|
|
|
">$", then it was escaping the ">" and is fine. If the regexp
|
|
|
|
|
actually ended with the bare "\", then it's an illegal regexp and
|
|
|
|
|
regcomp should kick it out. */
|
|
|
|
|
|
|
|
|
|
if(standard_bracket)
|
|
|
|
|
strcat(new,">$");
|
|
|
|
|
|
|
|
|
|
return new;
|
|
|
|
|
}
|
|
|
|
|
|
2002-10-30 03:11:57 +00:00
|
|
|
|
/* Used by validate_one_keyblock to confirm a regexp within a trust
|
|
|
|
|
signature. Returns 1 for match, and 0 for no match or regex
|
|
|
|
|
error. */
|
|
|
|
|
static int
|
2004-05-22 11:33:47 +00:00
|
|
|
|
check_regexp(const char *expr,const char *string)
|
2002-10-30 03:11:57 +00:00
|
|
|
|
{
|
2003-03-24 20:05:53 +00:00
|
|
|
|
#ifdef DISABLE_REGEX
|
|
|
|
|
/* When DISABLE_REGEX is defined, assume all regexps do not
|
2002-10-30 03:11:57 +00:00
|
|
|
|
match. */
|
|
|
|
|
return 0;
|
|
|
|
|
#else
|
|
|
|
|
int ret;
|
2007-12-12 16:38:23 +00:00
|
|
|
|
char *regexp;
|
2002-10-30 03:11:57 +00:00
|
|
|
|
|
2007-12-12 16:38:23 +00:00
|
|
|
|
regexp=sanitize_regexp(expr);
|
2002-10-30 03:11:57 +00:00
|
|
|
|
|
2007-12-12 16:38:23 +00:00
|
|
|
|
#ifdef __riscos__
|
|
|
|
|
ret=riscos_check_regexp(expr, string, DBG_TRUST);
|
|
|
|
|
#else
|
|
|
|
|
{
|
|
|
|
|
regex_t pat;
|
2002-10-30 03:11:57 +00:00
|
|
|
|
|
2007-12-12 16:38:23 +00:00
|
|
|
|
ret=regcomp(&pat,regexp,REG_ICASE|REG_NOSUB|REG_EXTENDED);
|
|
|
|
|
if(ret==0)
|
|
|
|
|
{
|
|
|
|
|
ret=regexec(&pat,string,0,NULL,0);
|
|
|
|
|
regfree(&pat);
|
|
|
|
|
ret=(ret==0);
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
#endif
|
2002-10-30 03:11:57 +00:00
|
|
|
|
|
|
|
|
|
if(DBG_TRUST)
|
2007-12-12 16:38:23 +00:00
|
|
|
|
log_debug("regexp `%s' (`%s') on `%s': %s\n",
|
|
|
|
|
regexp,expr,string,ret==0?"YES":"NO");
|
|
|
|
|
|
|
|
|
|
xfree(regexp);
|
2002-10-30 03:11:57 +00:00
|
|
|
|
|
2007-12-12 16:38:23 +00:00
|
|
|
|
return ret;
|
2002-10-30 03:11:57 +00:00
|
|
|
|
#endif
|
|
|
|
|
}
|
1998-10-12 20:16:38 +00:00
|
|
|
|
|
2002-06-29 13:46:34 +00:00
|
|
|
|
/*
|
|
|
|
|
* Return true if the key is signed by one of the keys in the given
|
|
|
|
|
* key ID list. User IDs with a valid signature are marked by node
|
|
|
|
|
* flags as follows:
|
|
|
|
|
* flag bit 0: There is at least one signature
|
|
|
|
|
* 1: There is marginal confidence that this is a legitimate uid
|
|
|
|
|
* 2: There is full confidence that this is a legitimate uid.
|
|
|
|
|
* 8: Used for internal purposes.
|
|
|
|
|
* 9: Ditto (in mark_usable_uid_certs())
|
|
|
|
|
* 10: Ditto (ditto)
|
|
|
|
|
* This function assumes that all kbnode flags are cleared on entry.
|
1998-11-03 19:38:58 +00:00
|
|
|
|
*/
|
1999-03-11 15:42:06 +00:00
|
|
|
|
static int
|
2002-06-29 13:46:34 +00:00
|
|
|
|
validate_one_keyblock (KBNODE kb, struct key_item *klist,
|
|
|
|
|
u32 curtime, u32 *next_expire)
|
|
|
|
|
{
|
|
|
|
|
struct key_item *kr;
|
|
|
|
|
KBNODE node, uidnode=NULL;
|
2003-01-06 22:56:08 +00:00
|
|
|
|
PKT_user_id *uid=NULL;
|
2002-06-29 13:46:34 +00:00
|
|
|
|
PKT_public_key *pk = kb->pkt->pkt.public_key;
|
|
|
|
|
u32 main_kid[2];
|
2003-01-06 22:56:08 +00:00
|
|
|
|
int issigned=0, any_signed = 0;
|
2002-06-29 13:46:34 +00:00
|
|
|
|
|
|
|
|
|
keyid_from_pk(pk, main_kid);
|
|
|
|
|
for (node=kb; node; node = node->next)
|
|
|
|
|
{
|
2003-04-30 05:33:52 +00:00
|
|
|
|
/* A bit of discussion here: is it better for the web of trust
|
|
|
|
|
to be built among only self-signed uids? On the one hand, a
|
|
|
|
|
self-signed uid is a statement that the key owner definitely
|
|
|
|
|
intended that uid to be there, but on the other hand, a
|
|
|
|
|
signed (but not self-signed) uid does carry trust, of a sort,
|
|
|
|
|
even if it is a statement being made by people other than the
|
|
|
|
|
key owner "through" the uids on the key owner's key. I'm
|
* parse-packet.c (parse_signature): No need to reserve 8 bytes for the
unhashed signature cache any longer.
* misc.c (pct_expando): Add two new expandos - signer's fingerprint (%g),
and signer's primary fingerprint (%p).
* Makefile.am: Include W32LIBS where appropriate.
* g10.c (main): Add --rfc2440 alias for --openpgp since in a few months,
they won't be the same thing.
* keyserver.c (parse_keyserver_uri): Accept "http" as an alias for "hkp",
since it is occasionally written that way. (keyserver_spawn): Use
ascii_isspace to avoid locale issues.
* keygen.c (ask_user_id): Make --allow-freeform-uid apply to the email
field as well as the name field, and allow mixing fields when it is set.
* options.skel: Use subkeys.pgp.net as the default keyserver.
* trustdb.c (validate_one_keyblock): Certifications on revoked or expired
uids do not count in the web of trust.
* signal.c (init_one_signal, pause_on_sigusr, do_block): Only use
sigprocmask() if we have sigset_t, and only use sigaction() if we have
struct sigaction. This is for Forte c89 on Solaris which seems to define
only the function call half of the two pairs by default.
(pause_on_sigusr): Typo. (do_block): If we can't use sigprocmask() and
sigset_t, try to get the number of signals from NSIG as well as MAXSIG,
and if we can't, fail with an explanation.
* signal.c, tdbio.c: Comment out the transaction code. It was not used in
this version, and was causing some build problems on quasi-posix platforms
(Solaris and Forte c89).
* keylist.c (list_keyblock_colon): Don't include validity values when
listing secret keys since they can be incorrect and/or misleading. This
is a temporary kludge, and will be handled properly in 1.9/2.0.
* mainproc.c (check_sig_and_print): Only show the "key available from"
preferred keyserver line if the key is not currently present.
* keyedit.c (sign_uids): Do not sign expired uids without --expert (same
behavior as revoked uids). Do not allow signing a user ID without a
self-signature. --expert overrides. Add additional prompt to the
signature level question. (menu_expire): When changing expiration dates,
don't replace selfsigs on revoked uids since this would effectively
unrevoke them. There is also no point in replacing expired selfsigs.
This is bug #181
* g10.c (add_notation_data): Make sure that only ascii is passed to
iscntrl. Noted by Christian Biere.
* getkey.c (classify_user_id2): Replaced isspace by spacep
* keygen.c (ask_user_id): Ditto. (get_parameter_algo): Ditto.
* keyedit.c (keyedit_menu): Ditto.
* tdbdump.c (import_ownertrust): Ditto. s/isxdigit/hexdigitp/.
* revoke.c (ask_revocation_reason):
* keyserver.c (keyserver_spawn): Dito.
2003-07-10 14:30:07 +00:00
|
|
|
|
going with the latter. However, if the user ID was
|
|
|
|
|
explicitly revoked, or passively allowed to expire, that
|
|
|
|
|
should stop validity through the user ID until it is
|
|
|
|
|
resigned. -dshaw */
|
2003-04-30 05:33:52 +00:00
|
|
|
|
|
* parse-packet.c (parse_signature): No need to reserve 8 bytes for the
unhashed signature cache any longer.
* misc.c (pct_expando): Add two new expandos - signer's fingerprint (%g),
and signer's primary fingerprint (%p).
* Makefile.am: Include W32LIBS where appropriate.
* g10.c (main): Add --rfc2440 alias for --openpgp since in a few months,
they won't be the same thing.
* keyserver.c (parse_keyserver_uri): Accept "http" as an alias for "hkp",
since it is occasionally written that way. (keyserver_spawn): Use
ascii_isspace to avoid locale issues.
* keygen.c (ask_user_id): Make --allow-freeform-uid apply to the email
field as well as the name field, and allow mixing fields when it is set.
* options.skel: Use subkeys.pgp.net as the default keyserver.
* trustdb.c (validate_one_keyblock): Certifications on revoked or expired
uids do not count in the web of trust.
* signal.c (init_one_signal, pause_on_sigusr, do_block): Only use
sigprocmask() if we have sigset_t, and only use sigaction() if we have
struct sigaction. This is for Forte c89 on Solaris which seems to define
only the function call half of the two pairs by default.
(pause_on_sigusr): Typo. (do_block): If we can't use sigprocmask() and
sigset_t, try to get the number of signals from NSIG as well as MAXSIG,
and if we can't, fail with an explanation.
* signal.c, tdbio.c: Comment out the transaction code. It was not used in
this version, and was causing some build problems on quasi-posix platforms
(Solaris and Forte c89).
* keylist.c (list_keyblock_colon): Don't include validity values when
listing secret keys since they can be incorrect and/or misleading. This
is a temporary kludge, and will be handled properly in 1.9/2.0.
* mainproc.c (check_sig_and_print): Only show the "key available from"
preferred keyserver line if the key is not currently present.
* keyedit.c (sign_uids): Do not sign expired uids without --expert (same
behavior as revoked uids). Do not allow signing a user ID without a
self-signature. --expert overrides. Add additional prompt to the
signature level question. (menu_expire): When changing expiration dates,
don't replace selfsigs on revoked uids since this would effectively
unrevoke them. There is also no point in replacing expired selfsigs.
This is bug #181
* g10.c (add_notation_data): Make sure that only ascii is passed to
iscntrl. Noted by Christian Biere.
* getkey.c (classify_user_id2): Replaced isspace by spacep
* keygen.c (ask_user_id): Ditto. (get_parameter_algo): Ditto.
* keyedit.c (keyedit_menu): Ditto.
* tdbdump.c (import_ownertrust): Ditto. s/isxdigit/hexdigitp/.
* revoke.c (ask_revocation_reason):
* keyserver.c (keyserver_spawn): Dito.
2003-07-10 14:30:07 +00:00
|
|
|
|
if (node->pkt->pkttype == PKT_USER_ID
|
|
|
|
|
&& !node->pkt->pkt.user_id->is_revoked
|
|
|
|
|
&& !node->pkt->pkt.user_id->is_expired)
|
2002-06-29 13:46:34 +00:00
|
|
|
|
{
|
|
|
|
|
if (uidnode && issigned)
|
|
|
|
|
{
|
2003-01-06 22:56:08 +00:00
|
|
|
|
if (uid->help_full_count >= opt.completes_needed
|
|
|
|
|
|| uid->help_marginal_count >= opt.marginals_needed )
|
2013-10-11 09:25:58 +02:00
|
|
|
|
uidnode->flag |= 4;
|
2003-01-06 22:56:08 +00:00
|
|
|
|
else if (uid->help_full_count || uid->help_marginal_count)
|
2002-06-29 13:46:34 +00:00
|
|
|
|
uidnode->flag |= 2;
|
|
|
|
|
uidnode->flag |= 1;
|
|
|
|
|
any_signed = 1;
|
|
|
|
|
}
|
|
|
|
|
uidnode = node;
|
2003-01-06 22:56:08 +00:00
|
|
|
|
uid=uidnode->pkt->pkt.user_id;
|
* parse-packet.c (parse_signature): No need to reserve 8 bytes for the
unhashed signature cache any longer.
* misc.c (pct_expando): Add two new expandos - signer's fingerprint (%g),
and signer's primary fingerprint (%p).
* Makefile.am: Include W32LIBS where appropriate.
* g10.c (main): Add --rfc2440 alias for --openpgp since in a few months,
they won't be the same thing.
* keyserver.c (parse_keyserver_uri): Accept "http" as an alias for "hkp",
since it is occasionally written that way. (keyserver_spawn): Use
ascii_isspace to avoid locale issues.
* keygen.c (ask_user_id): Make --allow-freeform-uid apply to the email
field as well as the name field, and allow mixing fields when it is set.
* options.skel: Use subkeys.pgp.net as the default keyserver.
* trustdb.c (validate_one_keyblock): Certifications on revoked or expired
uids do not count in the web of trust.
* signal.c (init_one_signal, pause_on_sigusr, do_block): Only use
sigprocmask() if we have sigset_t, and only use sigaction() if we have
struct sigaction. This is for Forte c89 on Solaris which seems to define
only the function call half of the two pairs by default.
(pause_on_sigusr): Typo. (do_block): If we can't use sigprocmask() and
sigset_t, try to get the number of signals from NSIG as well as MAXSIG,
and if we can't, fail with an explanation.
* signal.c, tdbio.c: Comment out the transaction code. It was not used in
this version, and was causing some build problems on quasi-posix platforms
(Solaris and Forte c89).
* keylist.c (list_keyblock_colon): Don't include validity values when
listing secret keys since they can be incorrect and/or misleading. This
is a temporary kludge, and will be handled properly in 1.9/2.0.
* mainproc.c (check_sig_and_print): Only show the "key available from"
preferred keyserver line if the key is not currently present.
* keyedit.c (sign_uids): Do not sign expired uids without --expert (same
behavior as revoked uids). Do not allow signing a user ID without a
self-signature. --expert overrides. Add additional prompt to the
signature level question. (menu_expire): When changing expiration dates,
don't replace selfsigs on revoked uids since this would effectively
unrevoke them. There is also no point in replacing expired selfsigs.
This is bug #181
* g10.c (add_notation_data): Make sure that only ascii is passed to
iscntrl. Noted by Christian Biere.
* getkey.c (classify_user_id2): Replaced isspace by spacep
* keygen.c (ask_user_id): Ditto. (get_parameter_algo): Ditto.
* keyedit.c (keyedit_menu): Ditto.
* tdbdump.c (import_ownertrust): Ditto. s/isxdigit/hexdigitp/.
* revoke.c (ask_revocation_reason):
* keyserver.c (keyserver_spawn): Dito.
2003-07-10 14:30:07 +00:00
|
|
|
|
|
|
|
|
|
/* If the selfsig is going to expire... */
|
2003-04-30 05:33:52 +00:00
|
|
|
|
if(uid->expiredate && uid->expiredate<*next_expire)
|
|
|
|
|
*next_expire = uid->expiredate;
|
* parse-packet.c (parse_signature): No need to reserve 8 bytes for the
unhashed signature cache any longer.
* misc.c (pct_expando): Add two new expandos - signer's fingerprint (%g),
and signer's primary fingerprint (%p).
* Makefile.am: Include W32LIBS where appropriate.
* g10.c (main): Add --rfc2440 alias for --openpgp since in a few months,
they won't be the same thing.
* keyserver.c (parse_keyserver_uri): Accept "http" as an alias for "hkp",
since it is occasionally written that way. (keyserver_spawn): Use
ascii_isspace to avoid locale issues.
* keygen.c (ask_user_id): Make --allow-freeform-uid apply to the email
field as well as the name field, and allow mixing fields when it is set.
* options.skel: Use subkeys.pgp.net as the default keyserver.
* trustdb.c (validate_one_keyblock): Certifications on revoked or expired
uids do not count in the web of trust.
* signal.c (init_one_signal, pause_on_sigusr, do_block): Only use
sigprocmask() if we have sigset_t, and only use sigaction() if we have
struct sigaction. This is for Forte c89 on Solaris which seems to define
only the function call half of the two pairs by default.
(pause_on_sigusr): Typo. (do_block): If we can't use sigprocmask() and
sigset_t, try to get the number of signals from NSIG as well as MAXSIG,
and if we can't, fail with an explanation.
* signal.c, tdbio.c: Comment out the transaction code. It was not used in
this version, and was causing some build problems on quasi-posix platforms
(Solaris and Forte c89).
* keylist.c (list_keyblock_colon): Don't include validity values when
listing secret keys since they can be incorrect and/or misleading. This
is a temporary kludge, and will be handled properly in 1.9/2.0.
* mainproc.c (check_sig_and_print): Only show the "key available from"
preferred keyserver line if the key is not currently present.
* keyedit.c (sign_uids): Do not sign expired uids without --expert (same
behavior as revoked uids). Do not allow signing a user ID without a
self-signature. --expert overrides. Add additional prompt to the
signature level question. (menu_expire): When changing expiration dates,
don't replace selfsigs on revoked uids since this would effectively
unrevoke them. There is also no point in replacing expired selfsigs.
This is bug #181
* g10.c (add_notation_data): Make sure that only ascii is passed to
iscntrl. Noted by Christian Biere.
* getkey.c (classify_user_id2): Replaced isspace by spacep
* keygen.c (ask_user_id): Ditto. (get_parameter_algo): Ditto.
* keyedit.c (keyedit_menu): Ditto.
* tdbdump.c (import_ownertrust): Ditto. s/isxdigit/hexdigitp/.
* revoke.c (ask_revocation_reason):
* keyserver.c (keyserver_spawn): Dito.
2003-07-10 14:30:07 +00:00
|
|
|
|
|
2002-06-29 13:46:34 +00:00
|
|
|
|
issigned = 0;
|
2003-01-06 22:56:08 +00:00
|
|
|
|
get_validity_counts(pk,uid);
|
2013-10-11 09:25:58 +02:00
|
|
|
|
mark_usable_uid_certs (kb, uidnode, main_kid, klist,
|
2002-06-29 13:46:34 +00:00
|
|
|
|
curtime, next_expire);
|
|
|
|
|
}
|
2003-04-30 05:33:52 +00:00
|
|
|
|
else if (node->pkt->pkttype == PKT_SIGNATURE
|
|
|
|
|
&& (node->flag & (1<<8)) && uid)
|
2002-06-29 13:46:34 +00:00
|
|
|
|
{
|
2002-10-30 03:11:57 +00:00
|
|
|
|
/* Note that we are only seeing unrevoked sigs here */
|
2002-06-29 13:46:34 +00:00
|
|
|
|
PKT_signature *sig = node->pkt->pkt.signature;
|
2013-10-11 09:25:58 +02:00
|
|
|
|
|
2002-06-29 13:46:34 +00:00
|
|
|
|
kr = is_in_klist (klist, sig);
|
2002-10-30 03:11:57 +00:00
|
|
|
|
/* If the trust_regexp does not match, it's as if the sig
|
|
|
|
|
did not exist. This is safe for non-trust sigs as well
|
|
|
|
|
since we don't accept a regexp on the sig unless it's a
|
|
|
|
|
trust sig. */
|
* tdbio.c (create_version_record): Only create new trustdbs with
TM_CLASSIC or TM_PGP.
* trustdb.h, trustdb.c (trust_string, get_ownertrust_string,
get_validity_string, ask_ownertrust, validate_keys), pkclist.c
(do_edit_ownertrust): Rename trust_string to trust_value_to_string for
naming consistency.
* trustdb.h, trustdb.c (string_to_trust_value): New function to translate
a string to a trust value.
* g10.c (main): Use string_to_trust_value here for --force-ownertrust.
* options.h, g10.c (main), trustdb.c (trust_model_string, init_trustdb,
check_trustdb, update_trustdb, get_validity, validate_one_keyblock): An
"OpenPGP" trust model is misleading since there is no official OpenPGP
trust model. Use "PGP" instead.
2003-05-01 21:37:08 +00:00
|
|
|
|
if (kr && (kr->trust_regexp==NULL || opt.trust_model!=TM_PGP ||
|
2002-10-30 03:11:57 +00:00
|
|
|
|
(uidnode && check_regexp(kr->trust_regexp,
|
|
|
|
|
uidnode->pkt->pkt.user_id->name))))
|
2002-06-29 13:46:34 +00:00
|
|
|
|
{
|
2002-10-30 03:11:57 +00:00
|
|
|
|
/* Are we part of a trust sig chain? We always favor
|
|
|
|
|
the latest trust sig, rather than the greater or
|
|
|
|
|
lesser trust sig or value. I could make a decent
|
|
|
|
|
argument for any of these cases, but this seems to be
|
|
|
|
|
what PGP does, and I'd like to be compatible. -dms */
|
2008-11-18 17:15:07 +00:00
|
|
|
|
if(opt.trust_model==TM_PGP
|
|
|
|
|
&& sig->trust_depth
|
|
|
|
|
&& pk->trust_timestamp<=sig->timestamp)
|
2002-10-30 03:11:57 +00:00
|
|
|
|
{
|
2008-11-18 17:15:07 +00:00
|
|
|
|
byte depth;
|
|
|
|
|
|
|
|
|
|
/* If the depth on the signature is less than the
|
|
|
|
|
chain currently has, then use the signature depth
|
|
|
|
|
so we don't increase the depth beyond what the
|
|
|
|
|
signer wanted. If the depth on the signature is
|
|
|
|
|
more than the chain currently has, then use the
|
|
|
|
|
chain depth so we use as much of the signature
|
|
|
|
|
depth as the chain will permit. An ultimately
|
|
|
|
|
trusted signature can restart the depth to
|
|
|
|
|
whatever level it likes. */
|
|
|
|
|
|
|
|
|
|
if(sig->trust_depth<kr->trust_depth
|
|
|
|
|
|| kr->ownertrust==TRUST_ULTIMATE)
|
|
|
|
|
depth=sig->trust_depth;
|
|
|
|
|
else
|
|
|
|
|
depth=kr->trust_depth;
|
|
|
|
|
|
|
|
|
|
if(depth)
|
|
|
|
|
{
|
|
|
|
|
if(DBG_TRUST)
|
|
|
|
|
log_debug("trust sig on %s, sig depth is %d,"
|
|
|
|
|
" kr depth is %d\n",
|
|
|
|
|
uidnode->pkt->pkt.user_id->name,
|
|
|
|
|
sig->trust_depth,
|
|
|
|
|
kr->trust_depth);
|
|
|
|
|
|
|
|
|
|
/* If we got here, we know that:
|
|
|
|
|
|
|
|
|
|
this is a trust sig.
|
|
|
|
|
|
|
|
|
|
it's a newer trust sig than any previous trust
|
|
|
|
|
sig on this key (not uid).
|
|
|
|
|
|
|
|
|
|
it is legal in that it was either generated by an
|
|
|
|
|
ultimate key, or a key that was part of a trust
|
|
|
|
|
chain, and the depth does not violate the
|
|
|
|
|
original trust sig.
|
|
|
|
|
|
|
|
|
|
if there is a regexp attached, it matched
|
|
|
|
|
successfully.
|
|
|
|
|
*/
|
|
|
|
|
|
|
|
|
|
if(DBG_TRUST)
|
|
|
|
|
log_debug("replacing trust value %d with %d and "
|
|
|
|
|
"depth %d with %d\n",
|
|
|
|
|
pk->trust_value,sig->trust_value,
|
|
|
|
|
pk->trust_depth,depth);
|
|
|
|
|
|
|
|
|
|
pk->trust_value=sig->trust_value;
|
|
|
|
|
pk->trust_depth=depth-1;
|
|
|
|
|
|
|
|
|
|
/* If the trust sig contains a regexp, record it
|
|
|
|
|
on the pk for the next round. */
|
|
|
|
|
if(sig->trust_regexp)
|
|
|
|
|
pk->trust_regexp=sig->trust_regexp;
|
|
|
|
|
}
|
2002-10-30 03:11:57 +00:00
|
|
|
|
}
|
|
|
|
|
|
2003-01-06 22:56:08 +00:00
|
|
|
|
if (kr->ownertrust == TRUST_ULTIMATE)
|
|
|
|
|
uid->help_full_count = opt.completes_needed;
|
2002-06-29 13:46:34 +00:00
|
|
|
|
else if (kr->ownertrust == TRUST_FULLY)
|
2003-01-06 22:56:08 +00:00
|
|
|
|
uid->help_full_count++;
|
2002-06-29 13:46:34 +00:00
|
|
|
|
else if (kr->ownertrust == TRUST_MARGINAL)
|
2003-01-06 22:56:08 +00:00
|
|
|
|
uid->help_marginal_count++;
|
2002-06-29 13:46:34 +00:00
|
|
|
|
issigned = 1;
|
2002-10-30 03:11:57 +00:00
|
|
|
|
}
|
2002-06-29 13:46:34 +00:00
|
|
|
|
}
|
1998-10-12 20:16:38 +00:00
|
|
|
|
}
|
1998-11-05 18:00:08 +00:00
|
|
|
|
|
2002-06-29 13:46:34 +00:00
|
|
|
|
if (uidnode && issigned)
|
|
|
|
|
{
|
2003-01-06 22:56:08 +00:00
|
|
|
|
if (uid->help_full_count >= opt.completes_needed
|
|
|
|
|
|| uid->help_marginal_count >= opt.marginals_needed )
|
2013-10-11 09:25:58 +02:00
|
|
|
|
uidnode->flag |= 4;
|
2003-01-06 22:56:08 +00:00
|
|
|
|
else if (uid->help_full_count || uid->help_marginal_count)
|
2002-06-29 13:46:34 +00:00
|
|
|
|
uidnode->flag |= 2;
|
|
|
|
|
uidnode->flag |= 1;
|
|
|
|
|
any_signed = 1;
|
1999-03-17 12:13:04 +00:00
|
|
|
|
}
|
|
|
|
|
|
2002-06-29 13:46:34 +00:00
|
|
|
|
return any_signed;
|
1998-10-12 20:16:38 +00:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
2002-06-29 13:46:34 +00:00
|
|
|
|
static int
|
2003-09-23 23:14:03 +00:00
|
|
|
|
search_skipfnc (void *opaque, u32 *kid, PKT_user_id *dummy)
|
1998-10-25 19:00:01 +00:00
|
|
|
|
{
|
2002-06-29 13:46:34 +00:00
|
|
|
|
return test_key_hash_table ((KeyHashTable)opaque, kid);
|
1999-03-11 15:42:06 +00:00
|
|
|
|
}
|
1998-10-25 19:00:01 +00:00
|
|
|
|
|
1999-03-08 19:50:18 +00:00
|
|
|
|
|
2002-06-29 13:46:34 +00:00
|
|
|
|
/*
|
|
|
|
|
* Scan all keys and return a key_array of all suitable keys from
|
|
|
|
|
* kllist. The caller has to pass keydb handle so that we don't use
|
|
|
|
|
* to create our own. Returns either a key_array or NULL in case of
|
|
|
|
|
* an error. No results found are indicated by an empty array.
|
2013-10-11 09:25:58 +02:00
|
|
|
|
* Caller hast to release the returned array.
|
1999-03-11 15:42:06 +00:00
|
|
|
|
*/
|
2002-06-29 13:46:34 +00:00
|
|
|
|
static struct key_array *
|
2003-01-06 22:56:08 +00:00
|
|
|
|
validate_key_list (KEYDB_HANDLE hd, KeyHashTable full_trust,
|
2002-06-29 13:46:34 +00:00
|
|
|
|
struct key_item *klist, u32 curtime, u32 *next_expire)
|
|
|
|
|
{
|
|
|
|
|
KBNODE keyblock = NULL;
|
|
|
|
|
struct key_array *keys = NULL;
|
|
|
|
|
size_t nkeys, maxkeys;
|
|
|
|
|
int rc;
|
|
|
|
|
KEYDB_SEARCH_DESC desc;
|
2013-10-11 09:25:58 +02:00
|
|
|
|
|
2002-06-29 13:46:34 +00:00
|
|
|
|
maxkeys = 1000;
|
2005-07-27 18:10:56 +00:00
|
|
|
|
keys = xmalloc ((maxkeys+1) * sizeof *keys);
|
2002-06-29 13:46:34 +00:00
|
|
|
|
nkeys = 0;
|
2013-10-11 09:25:58 +02:00
|
|
|
|
|
2002-06-29 13:46:34 +00:00
|
|
|
|
rc = keydb_search_reset (hd);
|
|
|
|
|
if (rc)
|
|
|
|
|
{
|
|
|
|
|
log_error ("keydb_search_reset failed: %s\n", g10_errstr(rc));
|
2005-07-27 18:10:56 +00:00
|
|
|
|
xfree (keys);
|
2002-06-29 13:46:34 +00:00
|
|
|
|
return NULL;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
memset (&desc, 0, sizeof desc);
|
|
|
|
|
desc.mode = KEYDB_SEARCH_MODE_FIRST;
|
|
|
|
|
desc.skipfnc = search_skipfnc;
|
2003-01-06 22:56:08 +00:00
|
|
|
|
desc.skipfncvalue = full_trust;
|
2002-06-29 13:46:34 +00:00
|
|
|
|
rc = keydb_search (hd, &desc, 1);
|
|
|
|
|
if (rc == -1)
|
|
|
|
|
{
|
|
|
|
|
keys[nkeys].keyblock = NULL;
|
|
|
|
|
return keys;
|
|
|
|
|
}
|
|
|
|
|
if (rc)
|
|
|
|
|
{
|
|
|
|
|
log_error ("keydb_search_first failed: %s\n", g10_errstr(rc));
|
2005-07-27 18:10:56 +00:00
|
|
|
|
xfree (keys);
|
2002-06-29 13:46:34 +00:00
|
|
|
|
return NULL;
|
|
|
|
|
}
|
2013-10-11 09:25:58 +02:00
|
|
|
|
|
2002-06-29 13:46:34 +00:00
|
|
|
|
desc.mode = KEYDB_SEARCH_MODE_NEXT; /* change mode */
|
|
|
|
|
do
|
|
|
|
|
{
|
|
|
|
|
PKT_public_key *pk;
|
2013-10-11 09:25:58 +02:00
|
|
|
|
|
2002-06-29 13:46:34 +00:00
|
|
|
|
rc = keydb_get_keyblock (hd, &keyblock);
|
2013-10-11 09:25:58 +02:00
|
|
|
|
if (rc)
|
2002-06-29 13:46:34 +00:00
|
|
|
|
{
|
|
|
|
|
log_error ("keydb_get_keyblock failed: %s\n", g10_errstr(rc));
|
2005-07-27 18:10:56 +00:00
|
|
|
|
xfree (keys);
|
2002-06-29 13:46:34 +00:00
|
|
|
|
return NULL;
|
|
|
|
|
}
|
2013-10-11 09:25:58 +02:00
|
|
|
|
|
|
|
|
|
if ( keyblock->pkt->pkttype != PKT_PUBLIC_KEY)
|
2002-06-29 13:46:34 +00:00
|
|
|
|
{
|
|
|
|
|
log_debug ("ooops: invalid pkttype %d encountered\n",
|
|
|
|
|
keyblock->pkt->pkttype);
|
|
|
|
|
dump_kbnode (keyblock);
|
|
|
|
|
release_kbnode(keyblock);
|
|
|
|
|
continue;
|
|
|
|
|
}
|
2000-07-14 17:34:53 +00:00
|
|
|
|
|
2002-06-29 13:46:34 +00:00
|
|
|
|
/* prepare the keyblock for further processing */
|
2013-10-11 09:25:58 +02:00
|
|
|
|
merge_keys_and_selfsig (keyblock);
|
2002-06-29 13:46:34 +00:00
|
|
|
|
clear_kbnode_flags (keyblock);
|
|
|
|
|
pk = keyblock->pkt->pkt.public_key;
|
|
|
|
|
if (pk->has_expired || pk->is_revoked)
|
|
|
|
|
{
|
|
|
|
|
/* it does not make sense to look further at those keys */
|
2003-01-06 22:56:08 +00:00
|
|
|
|
mark_keyblock_seen (full_trust, keyblock);
|
2002-06-29 13:46:34 +00:00
|
|
|
|
}
|
|
|
|
|
else if (validate_one_keyblock (keyblock, klist, curtime, next_expire))
|
|
|
|
|
{
|
2003-01-06 22:56:08 +00:00
|
|
|
|
KBNODE node;
|
|
|
|
|
|
2002-06-29 13:46:34 +00:00
|
|
|
|
if (pk->expiredate && pk->expiredate >= curtime
|
|
|
|
|
&& pk->expiredate < *next_expire)
|
|
|
|
|
*next_expire = pk->expiredate;
|
|
|
|
|
|
|
|
|
|
if (nkeys == maxkeys) {
|
|
|
|
|
maxkeys += 1000;
|
2005-07-27 18:10:56 +00:00
|
|
|
|
keys = xrealloc (keys, (maxkeys+1) * sizeof *keys);
|
2002-06-29 13:46:34 +00:00
|
|
|
|
}
|
|
|
|
|
keys[nkeys++].keyblock = keyblock;
|
2003-01-06 22:56:08 +00:00
|
|
|
|
|
|
|
|
|
/* Optimization - if all uids are fully trusted, then we
|
|
|
|
|
never need to consider this key as a candidate again. */
|
|
|
|
|
|
|
|
|
|
for (node=keyblock; node; node = node->next)
|
|
|
|
|
if (node->pkt->pkttype == PKT_USER_ID && !(node->flag & 4))
|
|
|
|
|
break;
|
|
|
|
|
|
|
|
|
|
if(node==NULL)
|
|
|
|
|
mark_keyblock_seen (full_trust, keyblock);
|
|
|
|
|
|
2002-06-29 13:46:34 +00:00
|
|
|
|
keyblock = NULL;
|
|
|
|
|
}
|
1998-10-25 19:00:01 +00:00
|
|
|
|
|
2002-06-29 13:46:34 +00:00
|
|
|
|
release_kbnode (keyblock);
|
|
|
|
|
keyblock = NULL;
|
2013-10-11 09:25:58 +02:00
|
|
|
|
}
|
2002-06-29 13:46:34 +00:00
|
|
|
|
while ( !(rc = keydb_search (hd, &desc, 1)) );
|
2013-10-11 09:25:58 +02:00
|
|
|
|
if (rc && rc != -1)
|
2002-06-29 13:46:34 +00:00
|
|
|
|
{
|
|
|
|
|
log_error ("keydb_search_next failed: %s\n", g10_errstr(rc));
|
2005-07-27 18:10:56 +00:00
|
|
|
|
xfree (keys);
|
2002-06-29 13:46:34 +00:00
|
|
|
|
return NULL;
|
1999-05-06 12:26:10 +00:00
|
|
|
|
}
|
|
|
|
|
|
2002-06-29 13:46:34 +00:00
|
|
|
|
keys[nkeys].keyblock = NULL;
|
|
|
|
|
return keys;
|
2013-10-11 09:25:58 +02:00
|
|
|
|
}
|
1998-10-25 19:00:01 +00:00
|
|
|
|
|
2003-01-06 22:56:08 +00:00
|
|
|
|
/* Caller must sync */
|
2000-07-14 17:34:53 +00:00
|
|
|
|
static void
|
2004-01-21 03:19:13 +00:00
|
|
|
|
reset_trust_records(void)
|
2002-06-29 13:46:34 +00:00
|
|
|
|
{
|
2004-01-21 03:19:13 +00:00
|
|
|
|
TRUSTREC rec;
|
|
|
|
|
ulong recnum;
|
2002-06-29 13:46:34 +00:00
|
|
|
|
int count = 0, nreset = 0;
|
|
|
|
|
|
2013-10-11 09:25:58 +02:00
|
|
|
|
for (recnum=1; !tdbio_read_record (recnum, &rec, 0); recnum++ )
|
2002-06-29 13:46:34 +00:00
|
|
|
|
{
|
2004-01-21 03:19:13 +00:00
|
|
|
|
if(rec.rectype==RECTYPE_TRUST)
|
|
|
|
|
{
|
|
|
|
|
count++;
|
|
|
|
|
if(rec.r.trust.min_ownertrust)
|
|
|
|
|
{
|
|
|
|
|
rec.r.trust.min_ownertrust=0;
|
|
|
|
|
write_record(&rec);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
}
|
|
|
|
|
else if(rec.rectype==RECTYPE_VALID
|
|
|
|
|
&& ((rec.r.valid.validity&TRUST_MASK)
|
|
|
|
|
|| rec.r.valid.marginal_count
|
|
|
|
|
|| rec.r.valid.full_count))
|
|
|
|
|
{
|
|
|
|
|
rec.r.valid.validity &= ~TRUST_MASK;
|
|
|
|
|
rec.r.valid.marginal_count=rec.r.valid.full_count=0;
|
|
|
|
|
nreset++;
|
|
|
|
|
write_record(&rec);
|
|
|
|
|
}
|
2002-06-29 13:46:34 +00:00
|
|
|
|
|
1998-11-03 19:38:58 +00:00
|
|
|
|
}
|
2004-01-21 03:19:13 +00:00
|
|
|
|
|
2002-06-29 13:46:34 +00:00
|
|
|
|
if (opt.verbose)
|
* g10.c (main): Add --no-textmode.
* export.c (do_export_stream), keyedit.c (show_key_with_all_names,
menu_addrevoker), mainproc.c (check_sig_and_print), photoid.c
(show_photos), sign.c (mk_notation_and_policy), trustdb.c (get_validity,
reset_trust_records, validate_keys): Make some strings translatable.
* mainproc.c (check_sig_and_print): Show digest algorithm and sig class
when verifying a sig with --verbose on, and add version, pk and hash
algorithms and sig class to VALIDSIG.
* parse-packet.c (enum_sig_subpkt): Make a warning message a --verbose
warning message since we don't need to warn every time we see an unknown
critical (we only need to invalidate the signature).
* trustdb.c (init_trustdb): Check the trustdb options even with TM_AUTO
since the auto may become TM_CLASSIC or TM_OPENPGP.
2003-04-27 20:22:09 +00:00
|
|
|
|
log_info (_("%d keys processed (%d validity counts cleared)\n"),
|
2004-01-21 03:19:13 +00:00
|
|
|
|
count, nreset);
|
2003-01-06 22:56:08 +00:00
|
|
|
|
}
|
1999-03-11 15:42:06 +00:00
|
|
|
|
|
2002-06-29 13:46:34 +00:00
|
|
|
|
/*
|
|
|
|
|
* Run the key validation procedure.
|
1999-03-11 15:42:06 +00:00
|
|
|
|
*
|
2002-06-29 13:46:34 +00:00
|
|
|
|
* This works this way:
|
|
|
|
|
* Step 1: Find all ultimately trusted keys (UTK).
|
|
|
|
|
* mark them all as seen and put them into klist.
|
|
|
|
|
* Step 2: loop max_cert_times
|
|
|
|
|
* Step 3: if OWNERTRUST of any key in klist is undefined
|
|
|
|
|
* ask user to assign ownertrust
|
2013-10-11 09:25:58 +02:00
|
|
|
|
* Step 4: Loop over all keys in the keyDB which are not marked seen
|
2002-06-29 13:46:34 +00:00
|
|
|
|
* Step 5: if key is revoked or expired
|
|
|
|
|
* mark key as seen
|
|
|
|
|
* continue loop at Step 4
|
|
|
|
|
* Step 6: For each user ID of that key signed by a key in klist
|
|
|
|
|
* Calculate validity by counting trusted signatures.
|
|
|
|
|
* Set validity of user ID
|
|
|
|
|
* Step 7: If any signed user ID was found
|
|
|
|
|
* mark key as seen
|
|
|
|
|
* End Loop
|
|
|
|
|
* Step 8: Build a new klist from all fully trusted keys from step 6
|
|
|
|
|
* End Loop
|
2013-10-11 09:25:58 +02:00
|
|
|
|
* Ready
|
1999-03-11 15:42:06 +00:00
|
|
|
|
*
|
1998-01-13 19:04:23 +00:00
|
|
|
|
*/
|
2002-06-29 13:46:34 +00:00
|
|
|
|
static int
|
|
|
|
|
validate_keys (int interactive)
|
|
|
|
|
{
|
|
|
|
|
int rc = 0;
|
|
|
|
|
int quit=0;
|
|
|
|
|
struct key_item *klist = NULL;
|
|
|
|
|
struct key_item *k;
|
|
|
|
|
struct key_array *keys = NULL;
|
|
|
|
|
struct key_array *kar;
|
|
|
|
|
KEYDB_HANDLE kdb = NULL;
|
|
|
|
|
KBNODE node;
|
|
|
|
|
int depth;
|
|
|
|
|
int ot_unknown, ot_undefined, ot_never, ot_marginal, ot_full, ot_ultimate;
|
2003-01-06 22:56:08 +00:00
|
|
|
|
KeyHashTable stored,used,full_trust;
|
2002-06-29 13:46:34 +00:00
|
|
|
|
u32 start_time, next_expire;
|
|
|
|
|
|
2004-01-20 16:09:38 +00:00
|
|
|
|
/* Make sure we have all sigs cached. TODO: This is going to
|
|
|
|
|
require some architectual re-thinking, as it is agonizingly slow.
|
|
|
|
|
Perhaps combine this with reset_trust_records(), or only check
|
|
|
|
|
the caches on keys that are actually involved in the web of
|
|
|
|
|
trust. */
|
|
|
|
|
keydb_rebuild_caches(0);
|
|
|
|
|
|
2002-06-29 13:46:34 +00:00
|
|
|
|
start_time = make_timestamp ();
|
|
|
|
|
next_expire = 0xffffffff; /* set next expire to the year 2106 */
|
2003-01-06 22:56:08 +00:00
|
|
|
|
stored = new_key_hash_table ();
|
|
|
|
|
used = new_key_hash_table ();
|
|
|
|
|
full_trust = new_key_hash_table ();
|
2003-11-30 00:33:27 +00:00
|
|
|
|
|
|
|
|
|
kdb = keydb_new (0);
|
2004-01-21 03:19:13 +00:00
|
|
|
|
reset_trust_records();
|
2003-11-30 00:33:27 +00:00
|
|
|
|
|
2002-06-29 13:46:34 +00:00
|
|
|
|
/* Fixme: Instead of always building a UTK list, we could just build it
|
|
|
|
|
* here when needed */
|
|
|
|
|
if (!utk_list)
|
|
|
|
|
{
|
2005-12-20 20:19:16 +00:00
|
|
|
|
if (!opt.quiet)
|
|
|
|
|
log_info (_("no ultimately trusted keys found\n"));
|
2002-06-29 13:46:34 +00:00
|
|
|
|
goto leave;
|
|
|
|
|
}
|
|
|
|
|
|
2003-01-06 22:56:08 +00:00
|
|
|
|
/* mark all UTKs as used and fully_trusted and set validity to
|
|
|
|
|
ultimate */
|
2002-06-29 13:46:34 +00:00
|
|
|
|
for (k=utk_list; k; k = k->next)
|
|
|
|
|
{
|
|
|
|
|
KBNODE keyblock;
|
|
|
|
|
PKT_public_key *pk;
|
|
|
|
|
|
|
|
|
|
keyblock = get_pubkeyblock (k->kid);
|
|
|
|
|
if (!keyblock)
|
|
|
|
|
{
|
|
|
|
|
log_error (_("public key of ultimately"
|
2004-03-15 23:15:57 +00:00
|
|
|
|
" trusted key %s not found\n"), keystr(k->kid));
|
2002-06-29 13:46:34 +00:00
|
|
|
|
continue;
|
|
|
|
|
}
|
2003-01-06 22:56:08 +00:00
|
|
|
|
mark_keyblock_seen (used, keyblock);
|
|
|
|
|
mark_keyblock_seen (stored, keyblock);
|
|
|
|
|
mark_keyblock_seen (full_trust, keyblock);
|
2002-06-29 13:46:34 +00:00
|
|
|
|
pk = keyblock->pkt->pkt.public_key;
|
|
|
|
|
for (node=keyblock; node; node = node->next)
|
|
|
|
|
{
|
|
|
|
|
if (node->pkt->pkttype == PKT_USER_ID)
|
2003-01-06 22:56:08 +00:00
|
|
|
|
update_validity (pk, node->pkt->pkt.user_id, 0, TRUST_ULTIMATE);
|
2002-06-29 13:46:34 +00:00
|
|
|
|
}
|
|
|
|
|
if ( pk->expiredate && pk->expiredate >= start_time
|
|
|
|
|
&& pk->expiredate < next_expire)
|
|
|
|
|
next_expire = pk->expiredate;
|
2013-10-11 09:25:58 +02:00
|
|
|
|
|
2002-06-29 13:46:34 +00:00
|
|
|
|
release_kbnode (keyblock);
|
|
|
|
|
do_sync ();
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
klist = utk_list;
|
|
|
|
|
|
2002-12-04 06:06:56 +00:00
|
|
|
|
log_info(_("%d marginal(s) needed, %d complete(s) needed, %s trust model\n"),
|
2003-04-26 20:38:16 +00:00
|
|
|
|
opt.marginals_needed,opt.completes_needed,trust_model_string());
|
2002-12-04 06:06:56 +00:00
|
|
|
|
|
2002-06-29 13:46:34 +00:00
|
|
|
|
for (depth=0; depth < opt.max_cert_depth; depth++)
|
|
|
|
|
{
|
2003-09-24 03:48:55 +00:00
|
|
|
|
int valids=0,key_count;
|
2002-06-29 13:46:34 +00:00
|
|
|
|
/* See whether we should assign ownertrust values to the keys in
|
2003-09-24 03:48:55 +00:00
|
|
|
|
klist. */
|
2002-06-29 13:46:34 +00:00
|
|
|
|
ot_unknown = ot_undefined = ot_never = 0;
|
|
|
|
|
ot_marginal = ot_full = ot_ultimate = 0;
|
|
|
|
|
for (k=klist; k; k = k->next)
|
|
|
|
|
{
|
2002-10-30 03:11:57 +00:00
|
|
|
|
int min=0;
|
|
|
|
|
|
|
|
|
|
/* 120 and 60 are as per RFC2440 */
|
|
|
|
|
if(k->trust_value>=120)
|
|
|
|
|
min=TRUST_FULLY;
|
|
|
|
|
else if(k->trust_value>=60)
|
|
|
|
|
min=TRUST_MARGINAL;
|
|
|
|
|
|
|
|
|
|
if(min!=k->min_ownertrust)
|
|
|
|
|
update_min_ownertrust(k->kid,min);
|
|
|
|
|
|
2002-06-29 13:46:34 +00:00
|
|
|
|
if (interactive && k->ownertrust == TRUST_UNKNOWN)
|
|
|
|
|
{
|
2002-10-30 03:11:57 +00:00
|
|
|
|
k->ownertrust = ask_ownertrust (k->kid,min);
|
|
|
|
|
|
2010-10-20 06:51:11 +00:00
|
|
|
|
if (k->ownertrust == (unsigned int)(-1))
|
2002-10-30 03:11:57 +00:00
|
|
|
|
{
|
|
|
|
|
quit=1;
|
|
|
|
|
goto leave;
|
|
|
|
|
}
|
1999-03-11 15:42:06 +00:00
|
|
|
|
}
|
2002-10-30 03:11:57 +00:00
|
|
|
|
|
|
|
|
|
/* This can happen during transition from an old trustdb
|
|
|
|
|
before trust sigs. It can also happen if a user uses two
|
2002-11-03 20:18:56 +00:00
|
|
|
|
different versions of GnuPG or changes the --trust-model
|
|
|
|
|
setting. */
|
2002-10-30 03:11:57 +00:00
|
|
|
|
if(k->ownertrust<min)
|
|
|
|
|
{
|
|
|
|
|
if(DBG_TRUST)
|
2004-03-19 23:15:27 +00:00
|
|
|
|
log_debug("key %08lX%08lX:"
|
2004-10-11 21:08:37 +00:00
|
|
|
|
" overriding ownertrust `%s' with `%s'\n",
|
2004-03-19 23:15:27 +00:00
|
|
|
|
(ulong)k->kid[0],(ulong)k->kid[1],
|
* tdbio.c (create_version_record): Only create new trustdbs with
TM_CLASSIC or TM_PGP.
* trustdb.h, trustdb.c (trust_string, get_ownertrust_string,
get_validity_string, ask_ownertrust, validate_keys), pkclist.c
(do_edit_ownertrust): Rename trust_string to trust_value_to_string for
naming consistency.
* trustdb.h, trustdb.c (string_to_trust_value): New function to translate
a string to a trust value.
* g10.c (main): Use string_to_trust_value here for --force-ownertrust.
* options.h, g10.c (main), trustdb.c (trust_model_string, init_trustdb,
check_trustdb, update_trustdb, get_validity, validate_one_keyblock): An
"OpenPGP" trust model is misleading since there is no official OpenPGP
trust model. Use "PGP" instead.
2003-05-01 21:37:08 +00:00
|
|
|
|
trust_value_to_string(k->ownertrust),
|
|
|
|
|
trust_value_to_string(min));
|
2002-10-30 03:11:57 +00:00
|
|
|
|
|
|
|
|
|
k->ownertrust=min;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (k->ownertrust == TRUST_UNKNOWN)
|
2002-06-29 13:46:34 +00:00
|
|
|
|
ot_unknown++;
|
|
|
|
|
else if (k->ownertrust == TRUST_UNDEFINED)
|
|
|
|
|
ot_undefined++;
|
|
|
|
|
else if (k->ownertrust == TRUST_NEVER)
|
|
|
|
|
ot_never++;
|
|
|
|
|
else if (k->ownertrust == TRUST_MARGINAL)
|
|
|
|
|
ot_marginal++;
|
|
|
|
|
else if (k->ownertrust == TRUST_FULLY)
|
|
|
|
|
ot_full++;
|
|
|
|
|
else if (k->ownertrust == TRUST_ULTIMATE)
|
|
|
|
|
ot_ultimate++;
|
2003-09-24 03:48:55 +00:00
|
|
|
|
|
|
|
|
|
valids++;
|
2002-06-29 13:46:34 +00:00
|
|
|
|
}
|
1999-03-08 19:50:18 +00:00
|
|
|
|
|
2002-06-29 13:46:34 +00:00
|
|
|
|
/* Find all keys which are signed by a key in kdlist */
|
2003-01-06 22:56:08 +00:00
|
|
|
|
keys = validate_key_list (kdb, full_trust, klist,
|
|
|
|
|
start_time, &next_expire);
|
2013-10-11 09:25:58 +02:00
|
|
|
|
if (!keys)
|
2002-06-29 13:46:34 +00:00
|
|
|
|
{
|
|
|
|
|
log_error ("validate_key_list failed\n");
|
|
|
|
|
rc = G10ERR_GENERAL;
|
|
|
|
|
goto leave;
|
|
|
|
|
}
|
1998-10-16 16:00:17 +00:00
|
|
|
|
|
2002-06-29 13:46:34 +00:00
|
|
|
|
for (key_count=0, kar=keys; kar->keyblock; kar++, key_count++)
|
|
|
|
|
;
|
|
|
|
|
|
|
|
|
|
/* Store the calculated valididation status somewhere */
|
2015-05-08 16:30:04 +02:00
|
|
|
|
if (opt.verbose > 1 && DBG_TRUST)
|
2002-06-29 13:46:34 +00:00
|
|
|
|
dump_key_array (depth, keys);
|
|
|
|
|
|
2003-01-06 22:56:08 +00:00
|
|
|
|
for (kar=keys; kar->keyblock; kar++)
|
|
|
|
|
store_validation_status (depth, kar->keyblock, stored);
|
|
|
|
|
|
2003-09-24 03:48:55 +00:00
|
|
|
|
log_info (_("depth: %d valid: %3d signed: %3d"
|
2013-10-11 09:25:58 +02:00
|
|
|
|
" trust: %d-, %dq, %dn, %dm, %df, %du\n"),
|
2003-09-24 03:48:55 +00:00
|
|
|
|
depth, valids, key_count, ot_unknown, ot_undefined,
|
2013-10-11 09:25:58 +02:00
|
|
|
|
ot_never, ot_marginal, ot_full, ot_ultimate );
|
2002-06-29 13:46:34 +00:00
|
|
|
|
|
|
|
|
|
/* Build a new kdlist from all fully valid keys in KEYS */
|
|
|
|
|
if (klist != utk_list)
|
|
|
|
|
release_key_items (klist);
|
|
|
|
|
klist = NULL;
|
|
|
|
|
for (kar=keys; kar->keyblock; kar++)
|
|
|
|
|
{
|
|
|
|
|
for (node=kar->keyblock; node; node = node->next)
|
|
|
|
|
{
|
|
|
|
|
if (node->pkt->pkttype == PKT_USER_ID && (node->flag & 4))
|
|
|
|
|
{
|
2003-01-06 22:56:08 +00:00
|
|
|
|
u32 kid[2];
|
|
|
|
|
|
|
|
|
|
/* have we used this key already? */
|
|
|
|
|
keyid_from_pk (kar->keyblock->pkt->pkt.public_key, kid);
|
|
|
|
|
if(test_key_hash_table(used,kid)==0)
|
|
|
|
|
{
|
|
|
|
|
/* Normally we add both the primary and subkey
|
|
|
|
|
ids to the hash via mark_keyblock_seen, but
|
|
|
|
|
since we aren't using this hash as a skipfnc,
|
|
|
|
|
that doesn't matter here. */
|
|
|
|
|
add_key_hash_table (used,kid);
|
|
|
|
|
k = new_key_item ();
|
|
|
|
|
k->kid[0]=kid[0];
|
|
|
|
|
k->kid[1]=kid[1];
|
|
|
|
|
k->ownertrust =
|
2003-03-04 15:24:12 +00:00
|
|
|
|
(get_ownertrust (kar->keyblock->pkt->pkt.public_key)
|
|
|
|
|
& TRUST_MASK);
|
2003-01-06 22:56:08 +00:00
|
|
|
|
k->min_ownertrust =
|
|
|
|
|
get_min_ownertrust(kar->keyblock->pkt->pkt.public_key);
|
|
|
|
|
k->trust_depth=
|
|
|
|
|
kar->keyblock->pkt->pkt.public_key->trust_depth;
|
|
|
|
|
k->trust_value=
|
|
|
|
|
kar->keyblock->pkt->pkt.public_key->trust_value;
|
|
|
|
|
if(kar->keyblock->pkt->pkt.public_key->trust_regexp)
|
|
|
|
|
k->trust_regexp=
|
2005-07-27 18:10:56 +00:00
|
|
|
|
xstrdup(kar->keyblock->pkt->
|
2003-01-06 22:56:08 +00:00
|
|
|
|
pkt.public_key->trust_regexp);
|
|
|
|
|
k->next = klist;
|
|
|
|
|
klist = k;
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
2002-06-29 13:46:34 +00:00
|
|
|
|
release_key_array (keys);
|
|
|
|
|
keys = NULL;
|
|
|
|
|
if (!klist)
|
|
|
|
|
break; /* no need to dive in deeper */
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
leave:
|
|
|
|
|
keydb_release (kdb);
|
|
|
|
|
release_key_array (keys);
|
|
|
|
|
release_key_items (klist);
|
2003-01-06 22:56:08 +00:00
|
|
|
|
release_key_hash_table (full_trust);
|
|
|
|
|
release_key_hash_table (used);
|
|
|
|
|
release_key_hash_table (stored);
|
2002-06-29 13:46:34 +00:00
|
|
|
|
if (!rc && !quit) /* mark trustDB as checked */
|
|
|
|
|
{
|
|
|
|
|
if (next_expire == 0xffffffff || next_expire < start_time )
|
2013-10-11 09:25:58 +02:00
|
|
|
|
tdbio_write_nextcheck (0);
|
2002-06-29 13:46:34 +00:00
|
|
|
|
else
|
|
|
|
|
{
|
2013-10-11 09:25:58 +02:00
|
|
|
|
tdbio_write_nextcheck (next_expire);
|
2002-06-29 13:46:34 +00:00
|
|
|
|
log_info (_("next trustdb check due at %s\n"),
|
|
|
|
|
strtimestamp (next_expire));
|
|
|
|
|
}
|
2002-12-04 06:06:56 +00:00
|
|
|
|
|
|
|
|
|
if(tdbio_update_version_record()!=0)
|
|
|
|
|
{
|
|
|
|
|
log_error(_("unable to update trustdb version record: "
|
|
|
|
|
"write failed: %s\n"), g10_errstr(rc));
|
|
|
|
|
tdbio_invalid();
|
|
|
|
|
}
|
|
|
|
|
|
2002-06-29 13:46:34 +00:00
|
|
|
|
do_sync ();
|
|
|
|
|
pending_check_trustdb = 0;
|
1998-07-21 12:53:38 +00:00
|
|
|
|
}
|
2003-03-04 15:24:12 +00:00
|
|
|
|
|
2002-06-29 13:46:34 +00:00
|
|
|
|
return rc;
|
1998-01-13 19:04:23 +00:00
|
|
|
|
}
|