1998-07-09 15:37:17 +02:00
|
|
|
|
/* tdbio.c
|
2000-07-14 19:34:53 +02:00
|
|
|
|
* Copyright (C) 1998, 1999, 2000 Free Software Foundation, Inc.
|
1998-07-09 15:37:17 +02:00
|
|
|
|
*
|
1998-12-23 13:41:40 +01:00
|
|
|
|
* This file is part of GnuPG.
|
1998-07-09 15:37:17 +02:00
|
|
|
|
*
|
1998-12-23 13:41:40 +01:00
|
|
|
|
* GnuPG is free software; you can redistribute it and/or modify
|
1998-07-09 15:37:17 +02:00
|
|
|
|
* it under the terms of the GNU General Public License as published by
|
|
|
|
|
* the Free Software Foundation; either version 2 of the License, or
|
|
|
|
|
* (at your option) any later version.
|
|
|
|
|
*
|
1998-12-23 13:41:40 +01:00
|
|
|
|
* GnuPG is distributed in the hope that it will be useful,
|
1998-07-09 15:37:17 +02:00
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
|
* GNU General Public License for more details.
|
|
|
|
|
*
|
|
|
|
|
* You should have received a copy of the GNU General Public License
|
|
|
|
|
* along with this program; if not, write to the Free Software
|
|
|
|
|
* Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA
|
|
|
|
|
*/
|
|
|
|
|
|
|
|
|
|
#include <config.h>
|
|
|
|
|
#include <stdio.h>
|
|
|
|
|
#include <stdlib.h>
|
|
|
|
|
#include <string.h>
|
|
|
|
|
#include <errno.h>
|
|
|
|
|
#include <assert.h>
|
|
|
|
|
#include <sys/types.h>
|
|
|
|
|
#include <sys/stat.h>
|
|
|
|
|
#include <fcntl.h>
|
|
|
|
|
#include <unistd.h>
|
|
|
|
|
|
|
|
|
|
#include "errors.h"
|
|
|
|
|
#include "iobuf.h"
|
2000-01-24 12:55:49 +01:00
|
|
|
|
#include <gcrypt.h>
|
1998-07-09 15:37:17 +02:00
|
|
|
|
#include "util.h"
|
|
|
|
|
#include "options.h"
|
|
|
|
|
#include "main.h"
|
|
|
|
|
#include "i18n.h"
|
|
|
|
|
#include "trustdb.h"
|
|
|
|
|
#include "tdbio.h"
|
|
|
|
|
|
1998-10-16 18:00:17 +02:00
|
|
|
|
|
|
|
|
|
/****************
|
|
|
|
|
* Yes, this is a very simple implementation. We should really
|
|
|
|
|
* use a page aligned buffer and read complete pages.
|
|
|
|
|
* To implement a simple trannsaction system, this is sufficient.
|
|
|
|
|
*/
|
|
|
|
|
typedef struct cache_ctrl_struct *CACHE_CTRL;
|
|
|
|
|
struct cache_ctrl_struct {
|
|
|
|
|
CACHE_CTRL next;
|
|
|
|
|
struct {
|
|
|
|
|
unsigned used:1;
|
|
|
|
|
unsigned dirty:1;
|
|
|
|
|
} flags;
|
|
|
|
|
ulong recno;
|
|
|
|
|
char data[TRUST_RECORD_LEN];
|
|
|
|
|
};
|
|
|
|
|
|
1999-07-07 13:28:26 +02:00
|
|
|
|
#define MAX_CACHE_ENTRIES_SOFT 200 /* may be increased while in a */
|
|
|
|
|
#define MAX_CACHE_ENTRIES_HARD 10000 /* transaction to this one */
|
1998-10-16 18:00:17 +02:00
|
|
|
|
static CACHE_CTRL cache_list;
|
|
|
|
|
static int cache_entries;
|
1998-10-25 20:00:01 +01:00
|
|
|
|
static int cache_is_dirty;
|
1998-10-16 18:00:17 +02:00
|
|
|
|
|
1998-10-12 22:16:38 +02:00
|
|
|
|
/* a type used to pass infomation to cmp_krec_fpr */
|
|
|
|
|
struct cmp_krec_fpr_struct {
|
|
|
|
|
int pubkey_algo;
|
|
|
|
|
const char *fpr;
|
|
|
|
|
int fprlen;
|
|
|
|
|
};
|
|
|
|
|
|
1999-06-29 21:50:54 +02:00
|
|
|
|
/* a type used to pass infomation to cmp_[s]dir */
|
|
|
|
|
struct cmp_xdir_struct {
|
1998-10-12 22:16:38 +02:00
|
|
|
|
int pubkey_algo;
|
|
|
|
|
u32 keyid[2];
|
|
|
|
|
};
|
1998-07-09 15:37:17 +02:00
|
|
|
|
|
|
|
|
|
|
|
|
|
|
static char *db_name;
|
1999-02-10 17:22:40 +01:00
|
|
|
|
static DOTLOCK lockhandle;
|
|
|
|
|
static int is_locked;
|
1998-07-09 15:37:17 +02:00
|
|
|
|
static int db_fd = -1;
|
1998-10-25 20:00:01 +01:00
|
|
|
|
static int in_transaction;
|
1998-07-09 15:37:17 +02:00
|
|
|
|
|
|
|
|
|
static void open_db(void);
|
|
|
|
|
|
1998-10-16 18:00:17 +02:00
|
|
|
|
|
|
|
|
|
/*************************************
|
|
|
|
|
************* record cache **********
|
|
|
|
|
*************************************/
|
|
|
|
|
|
|
|
|
|
/****************
|
|
|
|
|
* Get the data from therecord cache and return a
|
|
|
|
|
* pointer into that cache. Caller should copy
|
|
|
|
|
* the return data. NULL is returned on a cache miss.
|
|
|
|
|
*/
|
|
|
|
|
static const char *
|
|
|
|
|
get_record_from_cache( ulong recno )
|
|
|
|
|
{
|
|
|
|
|
CACHE_CTRL r;
|
|
|
|
|
|
|
|
|
|
for( r = cache_list; r; r = r->next ) {
|
|
|
|
|
if( r->flags.used && r->recno == recno )
|
|
|
|
|
return r->data;
|
|
|
|
|
}
|
|
|
|
|
return NULL;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
static int
|
|
|
|
|
write_cache_item( CACHE_CTRL r )
|
|
|
|
|
{
|
|
|
|
|
int n;
|
|
|
|
|
|
|
|
|
|
if( lseek( db_fd, r->recno * TRUST_RECORD_LEN, SEEK_SET ) == -1 ) {
|
|
|
|
|
log_error(_("trustdb rec %lu: lseek failed: %s\n"),
|
|
|
|
|
r->recno, strerror(errno) );
|
2000-01-27 17:50:45 +01:00
|
|
|
|
return GPGERR_WRITE_FILE;
|
1998-10-16 18:00:17 +02:00
|
|
|
|
}
|
|
|
|
|
n = write( db_fd, r->data, TRUST_RECORD_LEN);
|
|
|
|
|
if( n != TRUST_RECORD_LEN ) {
|
|
|
|
|
log_error(_("trustdb rec %lu: write failed (n=%d): %s\n"),
|
|
|
|
|
r->recno, n, strerror(errno) );
|
2000-01-27 17:50:45 +01:00
|
|
|
|
return GPGERR_WRITE_FILE;
|
1998-10-16 18:00:17 +02:00
|
|
|
|
}
|
|
|
|
|
r->flags.dirty = 0;
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/****************
|
|
|
|
|
* Put data into the cache. This function may flush the
|
|
|
|
|
* some cache entries if there is not enough space available.
|
|
|
|
|
*/
|
|
|
|
|
int
|
|
|
|
|
put_record_into_cache( ulong recno, const char *data )
|
|
|
|
|
{
|
|
|
|
|
CACHE_CTRL r, unused;
|
|
|
|
|
int dirty_count = 0;
|
|
|
|
|
int clean_count = 0;
|
|
|
|
|
|
|
|
|
|
/* see whether we already cached this one */
|
|
|
|
|
for( unused = NULL, r = cache_list; r; r = r->next ) {
|
|
|
|
|
if( !r->flags.used ) {
|
|
|
|
|
if( !unused )
|
|
|
|
|
unused = r;
|
|
|
|
|
}
|
|
|
|
|
else if( r->recno == recno ) {
|
|
|
|
|
if( !r->flags.dirty ) {
|
|
|
|
|
/* Hmmm: should we use a a copy and compare? */
|
1998-10-25 20:00:01 +01:00
|
|
|
|
if( memcmp(r->data, data, TRUST_RECORD_LEN ) ) {
|
1998-10-16 18:00:17 +02:00
|
|
|
|
r->flags.dirty = 1;
|
1998-10-25 20:00:01 +01:00
|
|
|
|
cache_is_dirty = 1;
|
|
|
|
|
}
|
1998-10-16 18:00:17 +02:00
|
|
|
|
}
|
|
|
|
|
memcpy( r->data, data, TRUST_RECORD_LEN );
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
if( r->flags.used ) {
|
|
|
|
|
if( r->flags.dirty )
|
|
|
|
|
dirty_count++;
|
|
|
|
|
else
|
|
|
|
|
clean_count++;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
/* not in the cache: add a new entry */
|
|
|
|
|
if( unused ) { /* reuse this entry */
|
|
|
|
|
r = unused;
|
|
|
|
|
r->flags.used = 1;
|
|
|
|
|
r->recno = recno;
|
|
|
|
|
memcpy( r->data, data, TRUST_RECORD_LEN );
|
|
|
|
|
r->flags.dirty = 1;
|
1998-10-25 20:00:01 +01:00
|
|
|
|
cache_is_dirty = 1;
|
1998-10-16 18:00:17 +02:00
|
|
|
|
cache_entries++;
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
/* see whether we reached the limit */
|
1998-10-25 20:00:01 +01:00
|
|
|
|
if( cache_entries < MAX_CACHE_ENTRIES_SOFT ) { /* no */
|
2000-01-24 12:55:49 +01:00
|
|
|
|
r = gcry_xmalloc( sizeof *r );
|
1998-10-16 18:00:17 +02:00
|
|
|
|
r->flags.used = 1;
|
|
|
|
|
r->recno = recno;
|
|
|
|
|
memcpy( r->data, data, TRUST_RECORD_LEN );
|
|
|
|
|
r->flags.dirty = 1;
|
|
|
|
|
r->next = cache_list;
|
|
|
|
|
cache_list = r;
|
1998-10-25 20:00:01 +01:00
|
|
|
|
cache_is_dirty = 1;
|
1998-10-16 18:00:17 +02:00
|
|
|
|
cache_entries++;
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
/* cache is full: discard some clean entries */
|
|
|
|
|
if( clean_count ) {
|
|
|
|
|
int n = clean_count / 3; /* discard a third of the clean entries */
|
|
|
|
|
if( !n )
|
|
|
|
|
n = 1;
|
|
|
|
|
for( unused = NULL, r = cache_list; r; r = r->next ) {
|
|
|
|
|
if( r->flags.used && !r->flags.dirty ) {
|
|
|
|
|
if( !unused )
|
|
|
|
|
unused = r;
|
|
|
|
|
r->flags.used = 0;
|
|
|
|
|
cache_entries--;
|
|
|
|
|
if( !--n )
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
assert( unused );
|
|
|
|
|
r = unused;
|
|
|
|
|
r->flags.used = 1;
|
|
|
|
|
r->recno = recno;
|
|
|
|
|
memcpy( r->data, data, TRUST_RECORD_LEN );
|
|
|
|
|
r->flags.dirty = 1;
|
1998-10-25 20:00:01 +01:00
|
|
|
|
cache_is_dirty = 1;
|
1998-10-16 18:00:17 +02:00
|
|
|
|
cache_entries++;
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
/* no clean entries: have to flush some dirty entries */
|
1998-10-25 20:00:01 +01:00
|
|
|
|
if( in_transaction ) {
|
|
|
|
|
/* but we can't do this while in a transaction
|
|
|
|
|
* we increase the cache size instead */
|
|
|
|
|
if( cache_entries < MAX_CACHE_ENTRIES_HARD ) { /* no */
|
1998-11-10 13:59:59 +01:00
|
|
|
|
if( opt.debug && !(cache_entries % 100) )
|
|
|
|
|
log_debug("increasing tdbio cache size\n");
|
2000-01-24 12:55:49 +01:00
|
|
|
|
r = gcry_xmalloc( sizeof *r );
|
1998-10-25 20:00:01 +01:00
|
|
|
|
r->flags.used = 1;
|
|
|
|
|
r->recno = recno;
|
|
|
|
|
memcpy( r->data, data, TRUST_RECORD_LEN );
|
|
|
|
|
r->flags.dirty = 1;
|
|
|
|
|
r->next = cache_list;
|
|
|
|
|
cache_list = r;
|
|
|
|
|
cache_is_dirty = 1;
|
|
|
|
|
cache_entries++;
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
1998-12-29 14:47:31 +01:00
|
|
|
|
log_info(_("trustdb transaction too large\n"));
|
2000-01-27 17:50:45 +01:00
|
|
|
|
return GPGERR_RESOURCE_LIMIT;
|
1998-10-25 20:00:01 +01:00
|
|
|
|
}
|
1998-10-16 18:00:17 +02:00
|
|
|
|
if( dirty_count ) {
|
|
|
|
|
int n = dirty_count / 5; /* discard some dirty entries */
|
|
|
|
|
if( !n )
|
|
|
|
|
n = 1;
|
1999-02-10 17:22:40 +01:00
|
|
|
|
if( !is_locked ) {
|
|
|
|
|
if( make_dotlock( lockhandle, -1 ) )
|
|
|
|
|
log_fatal("can't acquire lock - giving up\n");
|
|
|
|
|
else
|
|
|
|
|
is_locked = 1;
|
|
|
|
|
}
|
1998-10-16 18:00:17 +02:00
|
|
|
|
for( unused = NULL, r = cache_list; r; r = r->next ) {
|
|
|
|
|
if( r->flags.used && r->flags.dirty ) {
|
|
|
|
|
int rc = write_cache_item( r );
|
|
|
|
|
if( rc )
|
|
|
|
|
return rc;
|
|
|
|
|
if( !unused )
|
|
|
|
|
unused = r;
|
|
|
|
|
r->flags.used = 0;
|
|
|
|
|
cache_entries--;
|
|
|
|
|
if( !--n )
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
}
|
1998-11-27 21:40:56 +01:00
|
|
|
|
if( !opt.lock_once ) {
|
1999-02-10 17:22:40 +01:00
|
|
|
|
if( !release_dotlock( lockhandle ) )
|
|
|
|
|
is_locked = 0;
|
1998-11-27 21:40:56 +01:00
|
|
|
|
}
|
1998-10-16 18:00:17 +02:00
|
|
|
|
assert( unused );
|
|
|
|
|
r = unused;
|
|
|
|
|
r->flags.used = 1;
|
|
|
|
|
r->recno = recno;
|
|
|
|
|
memcpy( r->data, data, TRUST_RECORD_LEN );
|
|
|
|
|
r->flags.dirty = 1;
|
1998-10-25 20:00:01 +01:00
|
|
|
|
cache_is_dirty = 1;
|
1998-10-16 18:00:17 +02:00
|
|
|
|
cache_entries++;
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
BUG();
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
1998-10-25 20:00:01 +01:00
|
|
|
|
int
|
|
|
|
|
tdbio_is_dirty()
|
|
|
|
|
{
|
|
|
|
|
return cache_is_dirty;
|
|
|
|
|
}
|
|
|
|
|
|
1998-10-16 18:00:17 +02:00
|
|
|
|
|
|
|
|
|
/****************
|
1998-10-25 20:00:01 +01:00
|
|
|
|
* Flush the cache. This cannot be used while in a transaction.
|
1998-10-16 18:00:17 +02:00
|
|
|
|
*/
|
|
|
|
|
int
|
|
|
|
|
tdbio_sync()
|
|
|
|
|
{
|
|
|
|
|
CACHE_CTRL r;
|
1998-11-27 21:40:56 +01:00
|
|
|
|
int did_lock = 0;
|
1998-10-16 18:00:17 +02:00
|
|
|
|
|
1999-02-10 17:22:40 +01:00
|
|
|
|
if( db_fd == -1 )
|
|
|
|
|
open_db();
|
1998-10-25 20:00:01 +01:00
|
|
|
|
if( in_transaction )
|
|
|
|
|
log_bug("tdbio: syncing while in transaction\n");
|
|
|
|
|
|
|
|
|
|
if( !cache_is_dirty )
|
|
|
|
|
return 0;
|
|
|
|
|
|
1999-02-10 17:22:40 +01:00
|
|
|
|
if( !is_locked ) {
|
|
|
|
|
if( make_dotlock( lockhandle, -1 ) )
|
|
|
|
|
log_fatal("can't acquire lock - giving up\n");
|
|
|
|
|
else
|
|
|
|
|
is_locked = 1;
|
1998-11-27 21:40:56 +01:00
|
|
|
|
did_lock = 1;
|
|
|
|
|
}
|
1998-10-16 18:00:17 +02:00
|
|
|
|
for( r = cache_list; r; r = r->next ) {
|
|
|
|
|
if( r->flags.used && r->flags.dirty ) {
|
|
|
|
|
int rc = write_cache_item( r );
|
|
|
|
|
if( rc )
|
|
|
|
|
return rc;
|
|
|
|
|
}
|
|
|
|
|
}
|
1998-10-25 20:00:01 +01:00
|
|
|
|
cache_is_dirty = 0;
|
1998-11-27 21:40:56 +01:00
|
|
|
|
if( did_lock && !opt.lock_once ) {
|
1999-02-10 17:22:40 +01:00
|
|
|
|
if( !release_dotlock( lockhandle ) )
|
|
|
|
|
is_locked = 0;
|
1998-11-27 21:40:56 +01:00
|
|
|
|
}
|
1999-03-11 16:42:06 +01:00
|
|
|
|
|
1998-10-25 20:00:01 +01:00
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
/****************
|
|
|
|
|
* Simple transactions system:
|
|
|
|
|
* Everything between begin_transaction and end/cancel_transaction
|
|
|
|
|
* is not immediatly written but at the time of end_transaction.
|
|
|
|
|
*
|
|
|
|
|
*/
|
|
|
|
|
int
|
|
|
|
|
tdbio_begin_transaction()
|
|
|
|
|
{
|
|
|
|
|
int rc;
|
|
|
|
|
|
|
|
|
|
if( in_transaction )
|
|
|
|
|
log_bug("tdbio: nested transactions\n");
|
|
|
|
|
/* flush everything out */
|
|
|
|
|
rc = tdbio_sync();
|
|
|
|
|
if( rc )
|
|
|
|
|
return rc;
|
|
|
|
|
in_transaction = 1;
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
int
|
|
|
|
|
tdbio_end_transaction()
|
|
|
|
|
{
|
1998-11-03 20:38:58 +01:00
|
|
|
|
int rc;
|
|
|
|
|
|
1998-10-25 20:00:01 +01:00
|
|
|
|
if( !in_transaction )
|
|
|
|
|
log_bug("tdbio: no active transaction\n");
|
1999-02-10 17:22:40 +01:00
|
|
|
|
if( !is_locked ) {
|
|
|
|
|
if( make_dotlock( lockhandle, -1 ) )
|
|
|
|
|
log_fatal("can't acquire lock - giving up\n");
|
|
|
|
|
else
|
|
|
|
|
is_locked = 1;
|
|
|
|
|
}
|
1998-11-03 20:38:58 +01:00
|
|
|
|
block_all_signals();
|
1998-10-25 20:00:01 +01:00
|
|
|
|
in_transaction = 0;
|
1998-11-03 20:38:58 +01:00
|
|
|
|
rc = tdbio_sync();
|
|
|
|
|
unblock_all_signals();
|
1998-11-27 21:40:56 +01:00
|
|
|
|
if( !opt.lock_once ) {
|
1999-02-10 17:22:40 +01:00
|
|
|
|
if( !release_dotlock( lockhandle ) )
|
|
|
|
|
is_locked = 0;
|
1998-11-27 21:40:56 +01:00
|
|
|
|
}
|
1998-11-03 20:38:58 +01:00
|
|
|
|
return rc;
|
1998-10-25 20:00:01 +01:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
int
|
|
|
|
|
tdbio_cancel_transaction()
|
|
|
|
|
{
|
|
|
|
|
CACHE_CTRL r;
|
|
|
|
|
|
|
|
|
|
if( !in_transaction )
|
|
|
|
|
log_bug("tdbio: no active transaction\n");
|
|
|
|
|
|
|
|
|
|
/* remove all dirty marked entries, so that the original ones
|
|
|
|
|
* are read back the next time */
|
|
|
|
|
if( cache_is_dirty ) {
|
|
|
|
|
for( r = cache_list; r; r = r->next ) {
|
|
|
|
|
if( r->flags.used && r->flags.dirty ) {
|
|
|
|
|
r->flags.used = 0;
|
|
|
|
|
cache_entries--;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
cache_is_dirty = 0;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
in_transaction = 0;
|
1998-10-16 18:00:17 +02:00
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
/********************************************************
|
|
|
|
|
**************** cached I/O functions ******************
|
|
|
|
|
********************************************************/
|
1998-07-09 15:37:17 +02:00
|
|
|
|
|
1999-01-07 18:05:48 +01:00
|
|
|
|
static void
|
|
|
|
|
cleanup(void)
|
|
|
|
|
{
|
1999-02-10 17:22:40 +01:00
|
|
|
|
if( is_locked ) {
|
|
|
|
|
if( !release_dotlock(lockhandle) )
|
|
|
|
|
is_locked = 0;
|
1999-01-07 18:05:48 +01:00
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
1998-07-09 15:37:17 +02:00
|
|
|
|
int
|
|
|
|
|
tdbio_set_dbname( const char *new_dbname, int create )
|
|
|
|
|
{
|
|
|
|
|
char *fname;
|
1999-01-07 18:05:48 +01:00
|
|
|
|
static int initialized = 0;
|
1998-07-09 15:37:17 +02:00
|
|
|
|
|
1999-01-07 18:05:48 +01:00
|
|
|
|
if( !initialized ) {
|
|
|
|
|
atexit( cleanup );
|
|
|
|
|
initialized = 1;
|
|
|
|
|
}
|
2000-01-24 12:55:49 +01:00
|
|
|
|
fname = new_dbname? gcry_xstrdup( new_dbname )
|
1998-07-09 15:37:17 +02:00
|
|
|
|
: make_filename(opt.homedir, "trustdb.gpg", NULL );
|
|
|
|
|
|
|
|
|
|
if( access( fname, R_OK ) ) {
|
|
|
|
|
if( errno != ENOENT ) {
|
1998-10-21 19:34:36 +02:00
|
|
|
|
log_error( _("%s: can't access: %s\n"), fname, strerror(errno) );
|
2000-01-24 12:55:49 +01:00
|
|
|
|
gcry_free(fname);
|
2000-01-27 17:50:45 +01:00
|
|
|
|
return GPGERR_TRUSTDB;
|
1998-07-09 15:37:17 +02:00
|
|
|
|
}
|
|
|
|
|
if( create ) {
|
1998-07-29 21:35:05 +02:00
|
|
|
|
FILE *fp;
|
|
|
|
|
TRUSTREC rec;
|
|
|
|
|
int rc;
|
1998-07-09 15:37:17 +02:00
|
|
|
|
char *p = strrchr( fname, '/' );
|
1998-07-29 21:35:05 +02:00
|
|
|
|
|
1998-07-09 15:37:17 +02:00
|
|
|
|
assert(p);
|
|
|
|
|
*p = 0;
|
|
|
|
|
if( access( fname, F_OK ) ) {
|
2000-07-14 19:34:53 +02:00
|
|
|
|
try_make_homedir( fname );
|
|
|
|
|
log_fatal( _("%s: directory does not exist!\n"), fname );
|
1998-07-09 15:37:17 +02:00
|
|
|
|
}
|
|
|
|
|
*p = '/';
|
1998-07-29 21:35:05 +02:00
|
|
|
|
|
1998-10-06 14:10:02 +02:00
|
|
|
|
fp =fopen( fname, "wb" );
|
1998-07-29 21:35:05 +02:00
|
|
|
|
if( !fp )
|
1998-10-21 19:34:36 +02:00
|
|
|
|
log_fatal( _("%s: can't create: %s\n"), fname, strerror(errno) );
|
1998-07-29 21:35:05 +02:00
|
|
|
|
fclose(fp);
|
2000-01-24 12:55:49 +01:00
|
|
|
|
gcry_free(db_name);
|
1998-07-29 21:35:05 +02:00
|
|
|
|
db_name = fname;
|
1999-02-10 17:22:40 +01:00
|
|
|
|
#ifdef HAVE_DOSISH_SYSTEM
|
1998-10-06 14:10:02 +02:00
|
|
|
|
db_fd = open( db_name, O_RDWR | O_BINARY );
|
|
|
|
|
#else
|
1998-07-29 21:35:05 +02:00
|
|
|
|
db_fd = open( db_name, O_RDWR );
|
1998-10-06 14:10:02 +02:00
|
|
|
|
#endif
|
1998-07-29 21:35:05 +02:00
|
|
|
|
if( db_fd == -1 )
|
1998-10-21 19:34:36 +02:00
|
|
|
|
log_fatal( _("%s: can't open: %s\n"), db_name, strerror(errno) );
|
1998-07-29 21:35:05 +02:00
|
|
|
|
|
1999-02-13 14:17:29 +01:00
|
|
|
|
if( !lockhandle )
|
|
|
|
|
lockhandle = create_dotlock( db_name );
|
|
|
|
|
if( !lockhandle )
|
|
|
|
|
log_fatal( _("%s: can't create lock\n"), db_name );
|
|
|
|
|
|
1998-07-29 21:35:05 +02:00
|
|
|
|
memset( &rec, 0, sizeof rec );
|
|
|
|
|
rec.r.ver.version = 2;
|
|
|
|
|
rec.r.ver.created = make_timestamp();
|
1998-11-13 20:41:41 +01:00
|
|
|
|
rec.r.ver.marginals = opt.marginals_needed;
|
|
|
|
|
rec.r.ver.completes = opt.completes_needed;
|
|
|
|
|
rec.r.ver.cert_depth = opt.max_cert_depth;
|
1998-07-29 21:35:05 +02:00
|
|
|
|
rec.rectype = RECTYPE_VER;
|
|
|
|
|
rec.recnum = 0;
|
|
|
|
|
rc = tdbio_write_record( &rec );
|
1998-10-16 18:00:17 +02:00
|
|
|
|
if( !rc )
|
|
|
|
|
tdbio_sync();
|
1998-07-29 21:35:05 +02:00
|
|
|
|
if( rc )
|
1998-10-21 19:34:36 +02:00
|
|
|
|
log_fatal( _("%s: failed to create version record: %s"),
|
2000-01-27 17:50:45 +01:00
|
|
|
|
fname, gpg_errstr(rc));
|
1998-07-29 21:35:05 +02:00
|
|
|
|
/* and read again to check that we are okay */
|
|
|
|
|
if( tdbio_read_record( 0, &rec, RECTYPE_VER ) )
|
1998-12-29 14:47:31 +01:00
|
|
|
|
log_fatal( _("%s: invalid trustdb created\n"), db_name );
|
1998-10-21 19:34:36 +02:00
|
|
|
|
|
1999-04-18 10:18:52 +02:00
|
|
|
|
if( !opt.quiet )
|
|
|
|
|
log_info(_("%s: trustdb created\n"), db_name);
|
1998-10-21 19:34:36 +02:00
|
|
|
|
|
1998-07-29 21:35:05 +02:00
|
|
|
|
return 0;
|
1998-07-09 15:37:17 +02:00
|
|
|
|
}
|
|
|
|
|
}
|
2000-01-24 12:55:49 +01:00
|
|
|
|
gcry_free(db_name);
|
1998-07-09 15:37:17 +02:00
|
|
|
|
db_name = fname;
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
const char *
|
|
|
|
|
tdbio_get_dbname()
|
|
|
|
|
{
|
|
|
|
|
return db_name;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
static void
|
|
|
|
|
open_db()
|
|
|
|
|
{
|
|
|
|
|
TRUSTREC rec;
|
|
|
|
|
assert( db_fd == -1 );
|
|
|
|
|
|
1999-02-16 14:16:33 +01:00
|
|
|
|
if( !lockhandle )
|
|
|
|
|
lockhandle = create_dotlock( db_name );
|
1999-02-10 17:22:40 +01:00
|
|
|
|
if( !lockhandle )
|
|
|
|
|
log_fatal( _("%s: can't create lock\n"), db_name );
|
|
|
|
|
#ifdef HAVE_DOSISH_SYSTEM
|
1998-10-06 14:10:02 +02:00
|
|
|
|
db_fd = open( db_name, O_RDWR | O_BINARY );
|
|
|
|
|
#else
|
1998-07-09 15:37:17 +02:00
|
|
|
|
db_fd = open( db_name, O_RDWR );
|
1998-10-06 14:10:02 +02:00
|
|
|
|
#endif
|
1998-07-09 15:37:17 +02:00
|
|
|
|
if( db_fd == -1 )
|
1998-10-21 19:34:36 +02:00
|
|
|
|
log_fatal( _("%s: can't open: %s\n"), db_name, strerror(errno) );
|
1998-07-09 15:37:17 +02:00
|
|
|
|
if( tdbio_read_record( 0, &rec, RECTYPE_VER ) )
|
1998-12-29 14:47:31 +01:00
|
|
|
|
log_fatal( _("%s: invalid trustdb\n"), db_name );
|
1998-07-09 15:37:17 +02:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
1998-10-12 22:16:38 +02:00
|
|
|
|
/****************
|
|
|
|
|
* Make a hashtable: type 0 = key hash, 1 = sdir hash
|
|
|
|
|
*/
|
|
|
|
|
static void
|
|
|
|
|
create_hashtable( TRUSTREC *vr, int type )
|
|
|
|
|
{
|
|
|
|
|
TRUSTREC rec;
|
|
|
|
|
off_t offset;
|
|
|
|
|
ulong recnum;
|
|
|
|
|
int i, n, rc;
|
|
|
|
|
|
|
|
|
|
offset = lseek( db_fd, 0, SEEK_END );
|
|
|
|
|
if( offset == -1 )
|
|
|
|
|
log_fatal("trustdb: lseek to end failed: %s\n", strerror(errno) );
|
|
|
|
|
recnum = offset / TRUST_RECORD_LEN;
|
|
|
|
|
assert(recnum); /* this is will never be the first record */
|
|
|
|
|
|
|
|
|
|
if( !type )
|
|
|
|
|
vr->r.ver.keyhashtbl = recnum;
|
|
|
|
|
else
|
|
|
|
|
vr->r.ver.sdirhashtbl = recnum;
|
|
|
|
|
/* Now write the records */
|
|
|
|
|
n = (256+ITEMS_PER_HTBL_RECORD-1) / ITEMS_PER_HTBL_RECORD;
|
|
|
|
|
for(i=0; i < n; i++, recnum++ ) {
|
|
|
|
|
memset( &rec, 0, sizeof rec );
|
1998-10-16 18:00:17 +02:00
|
|
|
|
rec.rectype = RECTYPE_HTBL;
|
1998-10-12 22:16:38 +02:00
|
|
|
|
rec.recnum = recnum;
|
|
|
|
|
rc = tdbio_write_record( &rec );
|
|
|
|
|
if( rc )
|
1998-10-21 19:34:36 +02:00
|
|
|
|
log_fatal( _("%s: failed to create hashtable: %s\n"),
|
2000-01-27 17:50:45 +01:00
|
|
|
|
db_name, gpg_errstr(rc));
|
1998-10-12 22:16:38 +02:00
|
|
|
|
}
|
|
|
|
|
/* update the version record */
|
|
|
|
|
rc = tdbio_write_record( vr );
|
1998-10-16 18:00:17 +02:00
|
|
|
|
if( !rc )
|
|
|
|
|
rc = tdbio_sync();
|
1998-10-12 22:16:38 +02:00
|
|
|
|
if( rc )
|
1998-10-21 19:34:36 +02:00
|
|
|
|
log_fatal( _("%s: error updating version record: %s\n"),
|
2000-01-27 17:50:45 +01:00
|
|
|
|
db_name, gpg_errstr(rc));
|
1998-10-12 22:16:38 +02:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
1998-11-13 20:41:41 +01:00
|
|
|
|
int
|
|
|
|
|
tdbio_db_matches_options()
|
|
|
|
|
{
|
|
|
|
|
static int yes_no = -1;
|
|
|
|
|
|
|
|
|
|
if( yes_no == -1 ) {
|
|
|
|
|
TRUSTREC vr;
|
|
|
|
|
int rc;
|
|
|
|
|
|
|
|
|
|
rc = tdbio_read_record( 0, &vr, RECTYPE_VER );
|
|
|
|
|
if( rc )
|
|
|
|
|
log_fatal( _("%s: error reading version record: %s\n"),
|
2000-01-27 17:50:45 +01:00
|
|
|
|
db_name, gpg_errstr(rc) );
|
1998-11-13 20:41:41 +01:00
|
|
|
|
|
|
|
|
|
if( !vr.r.ver.marginals && !vr.r.ver.completes
|
|
|
|
|
&& !vr.r.ver.cert_depth )
|
|
|
|
|
{ /* special hack for trustdbs created by old versions of GnuPG */
|
|
|
|
|
vr.r.ver.marginals = opt.marginals_needed;
|
|
|
|
|
vr.r.ver.completes = opt.completes_needed;
|
|
|
|
|
vr.r.ver.cert_depth = opt.max_cert_depth;
|
|
|
|
|
rc = tdbio_write_record( &vr );
|
|
|
|
|
if( !rc && !in_transaction )
|
|
|
|
|
rc = tdbio_sync();
|
|
|
|
|
if( rc )
|
|
|
|
|
log_error( _("%s: error writing version record: %s\n"),
|
2000-01-27 17:50:45 +01:00
|
|
|
|
db_name, gpg_errstr(rc) );
|
1998-11-13 20:41:41 +01:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
yes_no = vr.r.ver.marginals == opt.marginals_needed
|
|
|
|
|
&& vr.r.ver.completes == opt.completes_needed
|
|
|
|
|
&& vr.r.ver.cert_depth == opt.max_cert_depth;
|
|
|
|
|
}
|
|
|
|
|
return yes_no;
|
|
|
|
|
}
|
|
|
|
|
|
1998-10-12 22:16:38 +02:00
|
|
|
|
|
1999-03-11 16:42:06 +01:00
|
|
|
|
/****************
|
|
|
|
|
* Return the modifiy stamp.
|
|
|
|
|
* if modify_down is true, the modify_down stamp will be
|
|
|
|
|
* returned, otherwise the modify_up stamp.
|
|
|
|
|
*/
|
|
|
|
|
ulong
|
|
|
|
|
tdbio_read_modify_stamp( int modify_down )
|
|
|
|
|
{
|
|
|
|
|
TRUSTREC vr;
|
|
|
|
|
int rc;
|
|
|
|
|
ulong mod;
|
|
|
|
|
|
|
|
|
|
rc = tdbio_read_record( 0, &vr, RECTYPE_VER );
|
|
|
|
|
if( rc )
|
|
|
|
|
log_fatal( _("%s: error reading version record: %s\n"),
|
2000-01-27 17:50:45 +01:00
|
|
|
|
db_name, gpg_errstr(rc) );
|
1999-03-11 16:42:06 +01:00
|
|
|
|
|
|
|
|
|
mod = modify_down? vr.r.ver.mod_down : vr.r.ver.mod_up;
|
|
|
|
|
|
|
|
|
|
/* Always return at least 1 to make comparison easier;
|
|
|
|
|
* this is still far back in history (before Led Zeppelin III :-) */
|
|
|
|
|
return mod ? mod : 1;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
void
|
1999-03-17 13:13:04 +01:00
|
|
|
|
tdbio_write_modify_stamp( int up, int down )
|
1999-03-11 16:42:06 +01:00
|
|
|
|
{
|
|
|
|
|
TRUSTREC vr;
|
|
|
|
|
int rc;
|
|
|
|
|
ulong stamp;
|
|
|
|
|
|
1999-03-17 13:13:04 +01:00
|
|
|
|
if( !(up || down) )
|
|
|
|
|
return;
|
|
|
|
|
|
1999-03-11 16:42:06 +01:00
|
|
|
|
rc = tdbio_read_record( 0, &vr, RECTYPE_VER );
|
|
|
|
|
if( rc )
|
|
|
|
|
log_fatal( _("%s: error reading version record: %s\n"),
|
2000-01-27 17:50:45 +01:00
|
|
|
|
db_name, gpg_errstr(rc) );
|
1999-03-11 16:42:06 +01:00
|
|
|
|
|
|
|
|
|
stamp = make_timestamp();
|
|
|
|
|
if( down )
|
|
|
|
|
vr.r.ver.mod_down = stamp;
|
|
|
|
|
if( up )
|
|
|
|
|
vr.r.ver.mod_up = stamp;
|
|
|
|
|
|
|
|
|
|
rc = tdbio_write_record( &vr );
|
1999-03-17 13:13:04 +01:00
|
|
|
|
if( rc )
|
1999-03-11 16:42:06 +01:00
|
|
|
|
log_fatal( _("%s: error writing version record: %s\n"),
|
2000-01-27 17:50:45 +01:00
|
|
|
|
db_name, gpg_errstr(rc) );
|
1999-03-11 16:42:06 +01:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
1998-07-29 21:35:05 +02:00
|
|
|
|
/****************
|
|
|
|
|
* Return the record number of the keyhash tbl or create a new one.
|
|
|
|
|
*/
|
|
|
|
|
static ulong
|
1999-02-16 14:16:33 +01:00
|
|
|
|
get_keyhashrec(void)
|
1998-07-29 21:35:05 +02:00
|
|
|
|
{
|
|
|
|
|
static ulong keyhashtbl; /* record number of the key hashtable */
|
|
|
|
|
|
1998-10-16 18:00:17 +02:00
|
|
|
|
if( !keyhashtbl ) {
|
|
|
|
|
TRUSTREC vr;
|
|
|
|
|
int rc;
|
1998-07-29 21:35:05 +02:00
|
|
|
|
|
1998-10-16 18:00:17 +02:00
|
|
|
|
rc = tdbio_read_record( 0, &vr, RECTYPE_VER );
|
|
|
|
|
if( rc )
|
1998-10-21 19:34:36 +02:00
|
|
|
|
log_fatal( _("%s: error reading version record: %s\n"),
|
2000-01-27 17:50:45 +01:00
|
|
|
|
db_name, gpg_errstr(rc) );
|
1998-10-16 18:00:17 +02:00
|
|
|
|
if( !vr.r.ver.keyhashtbl )
|
|
|
|
|
create_hashtable( &vr, 0 );
|
1998-07-29 21:35:05 +02:00
|
|
|
|
|
1998-10-16 18:00:17 +02:00
|
|
|
|
keyhashtbl = vr.r.ver.keyhashtbl;
|
|
|
|
|
}
|
|
|
|
|
return keyhashtbl;
|
1998-10-12 22:16:38 +02:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/****************
|
|
|
|
|
* Return the record number of the shadow direcory hash table
|
|
|
|
|
* or create a new one.
|
|
|
|
|
*/
|
|
|
|
|
static ulong
|
1999-02-16 14:16:33 +01:00
|
|
|
|
get_sdirhashrec(void)
|
1998-10-12 22:16:38 +02:00
|
|
|
|
{
|
|
|
|
|
static ulong sdirhashtbl; /* record number of the hashtable */
|
|
|
|
|
|
1998-10-16 18:00:17 +02:00
|
|
|
|
if( !sdirhashtbl ) {
|
|
|
|
|
TRUSTREC vr;
|
|
|
|
|
int rc;
|
1998-10-12 22:16:38 +02:00
|
|
|
|
|
1998-10-16 18:00:17 +02:00
|
|
|
|
rc = tdbio_read_record( 0, &vr, RECTYPE_VER );
|
|
|
|
|
if( rc )
|
1998-10-21 19:34:36 +02:00
|
|
|
|
log_fatal( _("%s: error reading version record: %s\n"),
|
2000-01-27 17:50:45 +01:00
|
|
|
|
db_name, gpg_errstr(rc) );
|
1998-10-16 18:00:17 +02:00
|
|
|
|
if( !vr.r.ver.sdirhashtbl )
|
|
|
|
|
create_hashtable( &vr, 1 );
|
1998-10-12 22:16:38 +02:00
|
|
|
|
|
1998-10-16 18:00:17 +02:00
|
|
|
|
sdirhashtbl = vr.r.ver.sdirhashtbl;
|
|
|
|
|
}
|
|
|
|
|
return sdirhashtbl;
|
1998-07-29 21:35:05 +02:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
/****************
|
1998-10-12 22:16:38 +02:00
|
|
|
|
* Update a hashtable.
|
|
|
|
|
* table gives the start of the table, key and keylen is the key,
|
|
|
|
|
* newrecnum is the record number to insert.
|
1998-07-29 21:35:05 +02:00
|
|
|
|
*/
|
|
|
|
|
static int
|
1998-10-12 22:16:38 +02:00
|
|
|
|
upd_hashtable( ulong table, byte *key, int keylen, ulong newrecnum )
|
1998-07-29 21:35:05 +02:00
|
|
|
|
{
|
|
|
|
|
TRUSTREC lastrec, rec;
|
|
|
|
|
ulong hashrec, item;
|
|
|
|
|
int msb;
|
|
|
|
|
int level=0;
|
|
|
|
|
int rc, i;
|
|
|
|
|
|
1998-10-12 22:16:38 +02:00
|
|
|
|
hashrec = table;
|
1998-07-29 21:35:05 +02:00
|
|
|
|
next_level:
|
1998-10-12 22:16:38 +02:00
|
|
|
|
msb = key[level];
|
1998-07-29 21:35:05 +02:00
|
|
|
|
hashrec += msb / ITEMS_PER_HTBL_RECORD;
|
|
|
|
|
rc = tdbio_read_record( hashrec, &rec, RECTYPE_HTBL );
|
|
|
|
|
if( rc ) {
|
1998-10-12 22:16:38 +02:00
|
|
|
|
log_error( db_name, "upd_hashtable: read failed: %s\n",
|
2000-01-27 17:50:45 +01:00
|
|
|
|
gpg_errstr(rc) );
|
1998-07-29 21:35:05 +02:00
|
|
|
|
return rc;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
item = rec.r.htbl.item[msb % ITEMS_PER_HTBL_RECORD];
|
1998-10-12 22:16:38 +02:00
|
|
|
|
if( !item ) { /* insert a new item into the hash table */
|
|
|
|
|
rec.r.htbl.item[msb % ITEMS_PER_HTBL_RECORD] = newrecnum;
|
1998-07-29 21:35:05 +02:00
|
|
|
|
rc = tdbio_write_record( &rec );
|
|
|
|
|
if( rc ) {
|
1998-10-12 22:16:38 +02:00
|
|
|
|
log_error( db_name, "upd_hashtable: write htbl failed: %s\n",
|
2000-01-27 17:50:45 +01:00
|
|
|
|
gpg_errstr(rc) );
|
1998-07-29 21:35:05 +02:00
|
|
|
|
return rc;
|
|
|
|
|
}
|
|
|
|
|
}
|
1998-10-12 22:16:38 +02:00
|
|
|
|
else if( item != newrecnum ) { /* must do an update */
|
1998-07-29 21:35:05 +02:00
|
|
|
|
lastrec = rec;
|
|
|
|
|
rc = tdbio_read_record( item, &rec, 0 );
|
|
|
|
|
if( rc ) {
|
1998-10-16 18:00:17 +02:00
|
|
|
|
log_error( "upd_hashtable: read item failed: %s\n",
|
2000-01-27 17:50:45 +01:00
|
|
|
|
gpg_errstr(rc) );
|
1998-07-29 21:35:05 +02:00
|
|
|
|
return rc;
|
|
|
|
|
}
|
1998-10-16 18:00:17 +02:00
|
|
|
|
|
1998-07-29 21:35:05 +02:00
|
|
|
|
if( rec.rectype == RECTYPE_HTBL ) {
|
|
|
|
|
hashrec = item;
|
|
|
|
|
level++;
|
1998-10-12 22:16:38 +02:00
|
|
|
|
if( level >= keylen ) {
|
1998-10-16 18:00:17 +02:00
|
|
|
|
log_error( "hashtable has invalid indirections.\n");
|
2000-01-27 17:50:45 +01:00
|
|
|
|
return GPGERR_TRUSTDB;
|
1998-07-29 21:35:05 +02:00
|
|
|
|
}
|
|
|
|
|
goto next_level;
|
|
|
|
|
}
|
|
|
|
|
else if( rec.rectype == RECTYPE_HLST ) { /* extend list */
|
|
|
|
|
/* see whether the key is already in this list */
|
|
|
|
|
for(;;) {
|
|
|
|
|
for(i=0; i < ITEMS_PER_HLST_RECORD; i++ ) {
|
1998-10-12 22:16:38 +02:00
|
|
|
|
if( rec.r.hlst.rnum[i] == newrecnum ) {
|
|
|
|
|
return 0; /* okay, already in the list */
|
1998-07-29 21:35:05 +02:00
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
if( rec.r.hlst.next ) {
|
|
|
|
|
rc = tdbio_read_record( rec.r.hlst.next,
|
1998-10-12 22:16:38 +02:00
|
|
|
|
&rec, RECTYPE_HLST);
|
1998-07-29 21:35:05 +02:00
|
|
|
|
if( rc ) {
|
1998-10-16 18:00:17 +02:00
|
|
|
|
log_error( "scan keyhashtbl read hlst failed: %s\n",
|
2000-01-27 17:50:45 +01:00
|
|
|
|
gpg_errstr(rc) );
|
1998-07-29 21:35:05 +02:00
|
|
|
|
return rc;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
break; /* not there */
|
|
|
|
|
}
|
|
|
|
|
/* find the next free entry and put it in */
|
|
|
|
|
for(;;) {
|
|
|
|
|
for(i=0; i < ITEMS_PER_HLST_RECORD; i++ ) {
|
|
|
|
|
if( !rec.r.hlst.rnum[i] ) {
|
1998-10-12 22:16:38 +02:00
|
|
|
|
rec.r.hlst.rnum[i] = newrecnum;
|
1998-07-29 21:35:05 +02:00
|
|
|
|
rc = tdbio_write_record( &rec );
|
|
|
|
|
if( rc )
|
1998-10-16 18:00:17 +02:00
|
|
|
|
log_error( "upd_hashtable: write hlst failed: %s\n",
|
2000-01-27 17:50:45 +01:00
|
|
|
|
gpg_errstr(rc) );
|
1998-10-12 22:16:38 +02:00
|
|
|
|
return rc; /* done */
|
1998-07-29 21:35:05 +02:00
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
if( rec.r.hlst.next ) {
|
|
|
|
|
rc = tdbio_read_record( rec.r.hlst.next,
|
|
|
|
|
&rec, RECTYPE_HLST );
|
|
|
|
|
if( rc ) {
|
1998-10-16 18:00:17 +02:00
|
|
|
|
log_error( "upd_hashtable: read hlst failed: %s\n",
|
2000-01-27 17:50:45 +01:00
|
|
|
|
gpg_errstr(rc) );
|
1998-07-29 21:35:05 +02:00
|
|
|
|
return rc;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
else { /* add a new list record */
|
|
|
|
|
rec.r.hlst.next = item = tdbio_new_recnum();
|
|
|
|
|
rc = tdbio_write_record( &rec );
|
|
|
|
|
if( rc ) {
|
1998-10-16 18:00:17 +02:00
|
|
|
|
log_error( "upd_hashtable: write hlst failed: %s\n",
|
2000-01-27 17:50:45 +01:00
|
|
|
|
gpg_errstr(rc) );
|
1998-07-29 21:35:05 +02:00
|
|
|
|
return rc;
|
|
|
|
|
}
|
|
|
|
|
memset( &rec, 0, sizeof rec );
|
|
|
|
|
rec.rectype = RECTYPE_HLST;
|
|
|
|
|
rec.recnum = item;
|
1998-10-12 22:16:38 +02:00
|
|
|
|
rec.r.hlst.rnum[0] = newrecnum;
|
|
|
|
|
rc = tdbio_write_record( &rec );
|
1998-07-29 21:35:05 +02:00
|
|
|
|
if( rc )
|
1998-10-16 18:00:17 +02:00
|
|
|
|
log_error( "upd_hashtable: write ext hlst failed: %s\n",
|
2000-01-27 17:50:45 +01:00
|
|
|
|
gpg_errstr(rc) );
|
1998-10-12 22:16:38 +02:00
|
|
|
|
return rc; /* done */
|
1998-07-29 21:35:05 +02:00
|
|
|
|
}
|
1998-10-12 22:16:38 +02:00
|
|
|
|
} /* end loop over hlst slots */
|
1998-07-29 21:35:05 +02:00
|
|
|
|
}
|
1998-10-12 22:16:38 +02:00
|
|
|
|
else if( rec.rectype == RECTYPE_KEY
|
1998-10-16 18:00:17 +02:00
|
|
|
|
|| rec.rectype == RECTYPE_DIR
|
1998-10-12 22:16:38 +02:00
|
|
|
|
|| rec.rectype == RECTYPE_SDIR ) { /* insert a list record */
|
|
|
|
|
if( rec.recnum == newrecnum ) {
|
1998-07-29 21:35:05 +02:00
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
item = rec.recnum; /* save number of key record */
|
|
|
|
|
memset( &rec, 0, sizeof rec );
|
|
|
|
|
rec.rectype = RECTYPE_HLST;
|
|
|
|
|
rec.recnum = tdbio_new_recnum();
|
|
|
|
|
rec.r.hlst.rnum[0] = item; /* old keyrecord */
|
1998-10-12 22:16:38 +02:00
|
|
|
|
rec.r.hlst.rnum[1] = newrecnum; /* and new one */
|
1998-07-29 21:35:05 +02:00
|
|
|
|
rc = tdbio_write_record( &rec );
|
|
|
|
|
if( rc ) {
|
1998-10-16 18:00:17 +02:00
|
|
|
|
log_error( "upd_hashtable: write new hlst failed: %s\n",
|
2000-01-27 17:50:45 +01:00
|
|
|
|
gpg_errstr(rc) );
|
1998-07-29 21:35:05 +02:00
|
|
|
|
return rc;
|
|
|
|
|
}
|
|
|
|
|
/* update the hashtable record */
|
|
|
|
|
lastrec.r.htbl.item[msb % ITEMS_PER_HTBL_RECORD] = rec.recnum;
|
|
|
|
|
rc = tdbio_write_record( &lastrec );
|
|
|
|
|
if( rc )
|
1998-10-16 18:00:17 +02:00
|
|
|
|
log_error( "upd_hashtable: update htbl failed: %s\n",
|
2000-01-27 17:50:45 +01:00
|
|
|
|
gpg_errstr(rc) );
|
1998-07-29 21:35:05 +02:00
|
|
|
|
return rc; /* ready */
|
|
|
|
|
}
|
|
|
|
|
else {
|
1999-06-29 21:50:54 +02:00
|
|
|
|
log_error( "hashtbl %lu: %lu/%d points to an invalid record %lu\n",
|
|
|
|
|
table, hashrec, (msb % ITEMS_PER_HTBL_RECORD), item);
|
|
|
|
|
list_trustdb(NULL);
|
2000-01-27 17:50:45 +01:00
|
|
|
|
return GPGERR_TRUSTDB;
|
1998-07-29 21:35:05 +02:00
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
1999-06-29 21:50:54 +02:00
|
|
|
|
/****************
|
|
|
|
|
* Drop an entry from a hashtable
|
|
|
|
|
* table gives the start of the table, key and keylen is the key,
|
|
|
|
|
*/
|
|
|
|
|
static int
|
|
|
|
|
drop_from_hashtable( ulong table, byte *key, int keylen, ulong recnum )
|
|
|
|
|
{
|
|
|
|
|
TRUSTREC rec;
|
|
|
|
|
ulong hashrec, item;
|
|
|
|
|
int msb;
|
|
|
|
|
int level=0;
|
|
|
|
|
int rc, i;
|
|
|
|
|
|
|
|
|
|
hashrec = table;
|
|
|
|
|
next_level:
|
|
|
|
|
msb = key[level];
|
|
|
|
|
hashrec += msb / ITEMS_PER_HTBL_RECORD;
|
|
|
|
|
rc = tdbio_read_record( hashrec, &rec, RECTYPE_HTBL );
|
|
|
|
|
if( rc ) {
|
|
|
|
|
log_error( db_name, "drop_from_hashtable: read failed: %s\n",
|
2000-01-27 17:50:45 +01:00
|
|
|
|
gpg_errstr(rc) );
|
1999-06-29 21:50:54 +02:00
|
|
|
|
return rc;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
item = rec.r.htbl.item[msb % ITEMS_PER_HTBL_RECORD];
|
|
|
|
|
if( !item ) /* not found - forget about it */
|
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
|
|
if( item == recnum ) { /* tables points direct to the record */
|
|
|
|
|
rec.r.htbl.item[msb % ITEMS_PER_HTBL_RECORD] = 0;
|
|
|
|
|
rc = tdbio_write_record( &rec );
|
|
|
|
|
if( rc )
|
|
|
|
|
log_error( db_name, "drop_from_hashtable: write htbl failed: %s\n",
|
2000-01-27 17:50:45 +01:00
|
|
|
|
gpg_errstr(rc) );
|
1999-06-29 21:50:54 +02:00
|
|
|
|
return rc;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
rc = tdbio_read_record( item, &rec, 0 );
|
|
|
|
|
if( rc ) {
|
|
|
|
|
log_error( "drop_from_hashtable: read item failed: %s\n",
|
2000-01-27 17:50:45 +01:00
|
|
|
|
gpg_errstr(rc) );
|
1999-06-29 21:50:54 +02:00
|
|
|
|
return rc;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if( rec.rectype == RECTYPE_HTBL ) {
|
|
|
|
|
hashrec = item;
|
|
|
|
|
level++;
|
|
|
|
|
if( level >= keylen ) {
|
|
|
|
|
log_error( "hashtable has invalid indirections.\n");
|
2000-01-27 17:50:45 +01:00
|
|
|
|
return GPGERR_TRUSTDB;
|
1999-06-29 21:50:54 +02:00
|
|
|
|
}
|
|
|
|
|
goto next_level;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if( rec.rectype == RECTYPE_HLST ) {
|
|
|
|
|
for(;;) {
|
|
|
|
|
for(i=0; i < ITEMS_PER_HLST_RECORD; i++ ) {
|
|
|
|
|
if( rec.r.hlst.rnum[i] == recnum ) {
|
|
|
|
|
rec.r.hlst.rnum[i] = 0; /* drop */
|
|
|
|
|
rc = tdbio_write_record( &rec );
|
|
|
|
|
if( rc )
|
|
|
|
|
log_error( db_name, "drop_from_hashtable: write htbl failed: %s\n",
|
2000-01-27 17:50:45 +01:00
|
|
|
|
gpg_errstr(rc) );
|
1999-06-29 21:50:54 +02:00
|
|
|
|
return rc;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
if( rec.r.hlst.next ) {
|
|
|
|
|
rc = tdbio_read_record( rec.r.hlst.next,
|
|
|
|
|
&rec, RECTYPE_HLST);
|
|
|
|
|
if( rc ) {
|
|
|
|
|
log_error( "scan keyhashtbl read hlst failed: %s\n",
|
2000-01-27 17:50:45 +01:00
|
|
|
|
gpg_errstr(rc) );
|
1999-06-29 21:50:54 +02:00
|
|
|
|
return rc;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
return 0; /* key not in table */
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
log_error( "hashtbl %lu: %lu/%d points to wrong record %lu\n",
|
|
|
|
|
table, hashrec, (msb % ITEMS_PER_HTBL_RECORD), item);
|
2000-01-27 17:50:45 +01:00
|
|
|
|
return GPGERR_TRUSTDB;
|
1999-06-29 21:50:54 +02:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
1998-07-29 21:35:05 +02:00
|
|
|
|
|
1998-10-12 22:16:38 +02:00
|
|
|
|
/****************
|
|
|
|
|
* Lookup a record via the hashtable tablewith key/keylen and return the
|
|
|
|
|
* result in rec. cmp() should return if the record is the desired one.
|
|
|
|
|
* Returns -1 if not found, 0 if found or another errocode
|
|
|
|
|
*/
|
|
|
|
|
static int
|
|
|
|
|
lookup_hashtable( ulong table, const byte *key, size_t keylen,
|
|
|
|
|
int (*cmpfnc)(void*, const TRUSTREC *), void *cmpdata,
|
|
|
|
|
TRUSTREC *rec )
|
|
|
|
|
{
|
|
|
|
|
int rc;
|
|
|
|
|
ulong hashrec, item;
|
|
|
|
|
int msb;
|
|
|
|
|
int level=0;
|
|
|
|
|
|
|
|
|
|
hashrec = table;
|
|
|
|
|
next_level:
|
|
|
|
|
msb = key[level];
|
|
|
|
|
hashrec += msb / ITEMS_PER_HTBL_RECORD;
|
|
|
|
|
rc = tdbio_read_record( hashrec, rec, RECTYPE_HTBL );
|
|
|
|
|
if( rc ) {
|
2000-01-27 17:50:45 +01:00
|
|
|
|
log_error( db_name, "lookup_hashtable failed: %s\n", gpg_errstr(rc) );
|
1998-10-12 22:16:38 +02:00
|
|
|
|
return rc;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
item = rec->r.htbl.item[msb % ITEMS_PER_HTBL_RECORD];
|
|
|
|
|
if( !item )
|
|
|
|
|
return -1; /* not found */
|
|
|
|
|
|
|
|
|
|
rc = tdbio_read_record( item, rec, 0 );
|
|
|
|
|
if( rc ) {
|
2000-01-27 17:50:45 +01:00
|
|
|
|
log_error( db_name, "hashtable read failed: %s\n", gpg_errstr(rc) );
|
1998-10-12 22:16:38 +02:00
|
|
|
|
return rc;
|
|
|
|
|
}
|
|
|
|
|
if( rec->rectype == RECTYPE_HTBL ) {
|
|
|
|
|
hashrec = item;
|
|
|
|
|
level++;
|
|
|
|
|
if( level >= keylen ) {
|
|
|
|
|
log_error( db_name, "hashtable has invalid indirections\n");
|
2000-01-27 17:50:45 +01:00
|
|
|
|
return GPGERR_TRUSTDB;
|
1998-10-12 22:16:38 +02:00
|
|
|
|
}
|
|
|
|
|
goto next_level;
|
|
|
|
|
}
|
|
|
|
|
else if( rec->rectype == RECTYPE_HLST ) {
|
|
|
|
|
for(;;) {
|
|
|
|
|
int i;
|
|
|
|
|
|
|
|
|
|
for(i=0; i < ITEMS_PER_HLST_RECORD; i++ ) {
|
|
|
|
|
if( rec->r.hlst.rnum[i] ) {
|
|
|
|
|
TRUSTREC tmp;
|
|
|
|
|
|
|
|
|
|
rc = tdbio_read_record( rec->r.hlst.rnum[i], &tmp, 0 );
|
|
|
|
|
if( rc ) {
|
|
|
|
|
log_error( "lookup_hashtable: read item failed: %s\n",
|
2000-01-27 17:50:45 +01:00
|
|
|
|
gpg_errstr(rc) );
|
1998-10-12 22:16:38 +02:00
|
|
|
|
return rc;
|
|
|
|
|
}
|
|
|
|
|
if( (*cmpfnc)( cmpdata, &tmp ) ) {
|
|
|
|
|
*rec = tmp;
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
if( rec->r.hlst.next ) {
|
|
|
|
|
rc = tdbio_read_record( rec->r.hlst.next, rec, RECTYPE_HLST );
|
|
|
|
|
if( rc ) {
|
|
|
|
|
log_error( "lookup_hashtable: read hlst failed: %s\n",
|
2000-01-27 17:50:45 +01:00
|
|
|
|
gpg_errstr(rc) );
|
1998-10-12 22:16:38 +02:00
|
|
|
|
return rc;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
return -1; /* not found */
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
if( (*cmpfnc)( cmpdata, rec ) )
|
|
|
|
|
return 0; /* really found */
|
|
|
|
|
|
|
|
|
|
return -1; /* no: not found */
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
/****************
|
|
|
|
|
* Update the key hashtbl or create the table if it does not exist
|
|
|
|
|
*/
|
|
|
|
|
static int
|
|
|
|
|
update_keyhashtbl( TRUSTREC *kr )
|
|
|
|
|
{
|
|
|
|
|
return upd_hashtable( get_keyhashrec(),
|
|
|
|
|
kr->r.key.fingerprint,
|
|
|
|
|
kr->r.key.fingerprint_len, kr->recnum );
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/****************
|
|
|
|
|
* Update the shadow dir hashtbl or create the table if it does not exist
|
|
|
|
|
*/
|
|
|
|
|
static int
|
|
|
|
|
update_sdirhashtbl( TRUSTREC *sr )
|
|
|
|
|
{
|
|
|
|
|
byte key[8];
|
|
|
|
|
|
|
|
|
|
u32tobuf( key , sr->r.sdir.keyid[0] );
|
|
|
|
|
u32tobuf( key+4 , sr->r.sdir.keyid[1] );
|
|
|
|
|
return upd_hashtable( get_sdirhashrec(), key, 8, sr->recnum );
|
|
|
|
|
}
|
|
|
|
|
|
1999-06-29 21:50:54 +02:00
|
|
|
|
/****************
|
|
|
|
|
* Drop the records from the key-hashtbl
|
|
|
|
|
*/
|
|
|
|
|
static int
|
|
|
|
|
drop_from_keyhashtbl( TRUSTREC *kr )
|
|
|
|
|
{
|
|
|
|
|
return drop_from_hashtable( get_keyhashrec(),
|
|
|
|
|
kr->r.key.fingerprint,
|
|
|
|
|
kr->r.key.fingerprint_len, kr->recnum );
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/****************
|
|
|
|
|
* Drop record drom the shadow dir hashtbl
|
|
|
|
|
*/
|
|
|
|
|
static int
|
|
|
|
|
drop_from_sdirhashtbl( TRUSTREC *sr )
|
|
|
|
|
{
|
|
|
|
|
byte key[8];
|
|
|
|
|
|
|
|
|
|
u32tobuf( key , sr->r.sdir.keyid[0] );
|
|
|
|
|
u32tobuf( key+4 , sr->r.sdir.keyid[1] );
|
|
|
|
|
return drop_from_hashtable( get_sdirhashrec(), key, 8, sr->recnum );
|
|
|
|
|
}
|
|
|
|
|
|
1998-10-12 22:16:38 +02:00
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1998-07-09 15:37:17 +02:00
|
|
|
|
void
|
1998-07-21 14:53:38 +02:00
|
|
|
|
tdbio_dump_record( TRUSTREC *rec, FILE *fp )
|
1998-07-09 15:37:17 +02:00
|
|
|
|
{
|
1998-07-29 21:35:05 +02:00
|
|
|
|
int i;
|
1998-07-21 14:53:38 +02:00
|
|
|
|
ulong rnum = rec->recnum;
|
1998-08-05 18:51:59 +02:00
|
|
|
|
byte *p;
|
1998-07-09 15:37:17 +02:00
|
|
|
|
|
1998-07-21 14:53:38 +02:00
|
|
|
|
fprintf(fp, "rec %5lu, ", rnum );
|
1998-07-09 15:37:17 +02:00
|
|
|
|
|
|
|
|
|
switch( rec->rectype ) {
|
1998-10-07 15:30:43 +02:00
|
|
|
|
case 0: fprintf(fp, "blank\n");
|
1998-07-09 15:37:17 +02:00
|
|
|
|
break;
|
1998-11-13 20:41:41 +01:00
|
|
|
|
case RECTYPE_VER: fprintf(fp,
|
1999-03-11 16:42:06 +01:00
|
|
|
|
"version, kd=%lu, sd=%lu, free=%lu, m/c/d=%d/%d/%d down=%s",
|
1998-10-12 22:16:38 +02:00
|
|
|
|
rec->r.ver.keyhashtbl, rec->r.ver.sdirhashtbl,
|
1998-11-13 20:41:41 +01:00
|
|
|
|
rec->r.ver.firstfree,
|
|
|
|
|
rec->r.ver.marginals,
|
|
|
|
|
rec->r.ver.completes,
|
1999-03-11 16:42:06 +01:00
|
|
|
|
rec->r.ver.cert_depth,
|
|
|
|
|
strtimestamp(rec->r.ver.mod_down) );
|
|
|
|
|
fprintf(fp, ", up=%s\n", strtimestamp(rec->r.ver.mod_up) );
|
1998-10-07 15:30:43 +02:00
|
|
|
|
break;
|
|
|
|
|
case RECTYPE_FREE: fprintf(fp, "free, next=%lu\n", rec->r.free.next );
|
1998-07-09 15:37:17 +02:00
|
|
|
|
break;
|
|
|
|
|
case RECTYPE_DIR:
|
1998-11-13 20:41:41 +01:00
|
|
|
|
fprintf(fp, "dir %lu, keys=%lu, uids=%lu, t=%02x",
|
1998-07-14 19:10:28 +02:00
|
|
|
|
rec->r.dir.lid,
|
|
|
|
|
rec->r.dir.keylist,
|
|
|
|
|
rec->r.dir.uidlist,
|
|
|
|
|
rec->r.dir.ownertrust );
|
1999-03-11 16:42:06 +01:00
|
|
|
|
if( rec->r.dir.valcheck )
|
|
|
|
|
fprintf( fp, ", v=%02x/%s", rec->r.dir.validity,
|
|
|
|
|
strtimestamp(rec->r.dir.valcheck) );
|
1999-06-29 21:50:54 +02:00
|
|
|
|
if( rec->r.dir.checkat )
|
|
|
|
|
fprintf( fp, ", a=%s", strtimestamp(rec->r.dir.checkat) );
|
1998-10-21 19:34:36 +02:00
|
|
|
|
if( rec->r.dir.dirflags & DIRF_CHECKED ) {
|
|
|
|
|
if( rec->r.dir.dirflags & DIRF_VALID )
|
|
|
|
|
fputs(", valid", fp );
|
|
|
|
|
if( rec->r.dir.dirflags & DIRF_EXPIRED )
|
|
|
|
|
fputs(", expired", fp );
|
|
|
|
|
if( rec->r.dir.dirflags & DIRF_REVOKED )
|
|
|
|
|
fputs(", revoked", fp );
|
2000-07-14 19:34:53 +02:00
|
|
|
|
if( rec->r.dir.dirflags & DIRF_NEWKEYS )
|
|
|
|
|
fputs(", newkeys", fp );
|
1998-10-21 19:34:36 +02:00
|
|
|
|
}
|
1998-07-09 15:37:17 +02:00
|
|
|
|
putc('\n', fp);
|
|
|
|
|
break;
|
1998-07-14 19:10:28 +02:00
|
|
|
|
case RECTYPE_KEY:
|
1998-11-13 20:41:41 +01:00
|
|
|
|
fprintf(fp, "key %lu, n=%lu a=%d ",
|
1998-07-14 19:10:28 +02:00
|
|
|
|
rec->r.key.lid,
|
|
|
|
|
rec->r.key.next,
|
1998-07-29 21:35:05 +02:00
|
|
|
|
rec->r.key.pubkey_algo );
|
|
|
|
|
for(i=0; i < rec->r.key.fingerprint_len; i++ )
|
|
|
|
|
fprintf(fp, "%02X", rec->r.key.fingerprint[i] );
|
1998-10-21 19:34:36 +02:00
|
|
|
|
if( rec->r.key.keyflags & KEYF_CHECKED ) {
|
|
|
|
|
if( rec->r.key.keyflags & KEYF_VALID )
|
|
|
|
|
fputs(", valid", fp );
|
|
|
|
|
if( rec->r.key.keyflags & KEYF_EXPIRED )
|
|
|
|
|
fputs(", expired", fp );
|
|
|
|
|
if( rec->r.key.keyflags & KEYF_REVOKED )
|
|
|
|
|
fputs(", revoked", fp );
|
|
|
|
|
}
|
1998-07-21 14:53:38 +02:00
|
|
|
|
putc('\n', fp);
|
1998-07-09 15:37:17 +02:00
|
|
|
|
break;
|
|
|
|
|
case RECTYPE_UID:
|
1998-07-21 14:53:38 +02:00
|
|
|
|
fprintf(fp, "uid %lu, next=%lu, pref=%lu, sig=%lu, hash=%02X%02X",
|
1998-07-14 19:10:28 +02:00
|
|
|
|
rec->r.uid.lid,
|
|
|
|
|
rec->r.uid.next,
|
|
|
|
|
rec->r.uid.prefrec,
|
|
|
|
|
rec->r.uid.siglist,
|
|
|
|
|
rec->r.uid.namehash[18], rec->r.uid.namehash[19]);
|
1999-03-11 16:42:06 +01:00
|
|
|
|
fprintf( fp, ", v=%02x", rec->r.uid.validity );
|
1998-10-21 19:34:36 +02:00
|
|
|
|
if( rec->r.uid.uidflags & UIDF_CHECKED ) {
|
|
|
|
|
if( rec->r.uid.uidflags & UIDF_VALID )
|
|
|
|
|
fputs(", valid", fp );
|
|
|
|
|
if( rec->r.uid.uidflags & UIDF_REVOKED )
|
|
|
|
|
fputs(", revoked", fp );
|
|
|
|
|
}
|
1998-07-21 14:53:38 +02:00
|
|
|
|
putc('\n', fp);
|
1998-07-09 15:37:17 +02:00
|
|
|
|
break;
|
1998-07-14 19:10:28 +02:00
|
|
|
|
case RECTYPE_PREF:
|
1998-08-05 18:51:59 +02:00
|
|
|
|
fprintf(fp, "pref %lu, next=%lu,",
|
|
|
|
|
rec->r.pref.lid, rec->r.pref.next);
|
|
|
|
|
for(i=0,p=rec->r.pref.data; i < ITEMS_PER_PREF_RECORD; i+=2,p+=2 ) {
|
|
|
|
|
if( *p )
|
|
|
|
|
fprintf(fp, " %c%d", *p == PREFTYPE_SYM ? 'S' :
|
|
|
|
|
*p == PREFTYPE_HASH ? 'H' :
|
|
|
|
|
*p == PREFTYPE_COMPR ? 'Z' : '?', p[1]);
|
|
|
|
|
}
|
|
|
|
|
putc('\n', fp);
|
1998-07-09 15:37:17 +02:00
|
|
|
|
break;
|
|
|
|
|
case RECTYPE_SIG:
|
1998-07-29 21:35:05 +02:00
|
|
|
|
fprintf(fp, "sig %lu, next=%lu,",
|
1998-07-14 19:10:28 +02:00
|
|
|
|
rec->r.sig.lid, rec->r.sig.next );
|
1998-07-29 21:35:05 +02:00
|
|
|
|
for(i=0; i < SIGS_PER_RECORD; i++ ) {
|
1998-10-21 19:34:36 +02:00
|
|
|
|
if( rec->r.sig.sig[i].lid ) {
|
|
|
|
|
fprintf(fp, " %lu:", rec->r.sig.sig[i].lid );
|
|
|
|
|
if( rec->r.sig.sig[i].flag & SIGF_CHECKED ) {
|
|
|
|
|
fprintf(fp,"%c%c%c",
|
1999-06-29 21:50:54 +02:00
|
|
|
|
(rec->r.sig.sig[i].flag & SIGF_VALID) ? 'V':
|
|
|
|
|
(rec->r.sig.sig[i].flag & SIGF_IGNORED) ? 'I':'-',
|
1998-10-21 19:34:36 +02:00
|
|
|
|
(rec->r.sig.sig[i].flag & SIGF_EXPIRED) ? 'E':'-',
|
|
|
|
|
(rec->r.sig.sig[i].flag & SIGF_REVOKED) ? 'R':'-');
|
|
|
|
|
}
|
|
|
|
|
else if( rec->r.sig.sig[i].flag & SIGF_NOPUBKEY)
|
|
|
|
|
fputs("?--", fp);
|
|
|
|
|
else
|
|
|
|
|
fputs("---", fp);
|
|
|
|
|
}
|
1998-07-09 15:37:17 +02:00
|
|
|
|
}
|
1998-07-29 21:35:05 +02:00
|
|
|
|
putc('\n', fp);
|
1998-07-09 15:37:17 +02:00
|
|
|
|
break;
|
1998-10-12 22:16:38 +02:00
|
|
|
|
case RECTYPE_SDIR:
|
|
|
|
|
fprintf(fp, "sdir %lu, keyid=%08lX%08lX, algo=%d, hint=%lu\n",
|
|
|
|
|
rec->r.sdir.lid,
|
|
|
|
|
(ulong)rec->r.sdir.keyid[0],
|
|
|
|
|
(ulong)rec->r.sdir.keyid[1],
|
|
|
|
|
rec->r.sdir.pubkey_algo,
|
|
|
|
|
(ulong)rec->r.sdir.hintlist );
|
|
|
|
|
break;
|
1998-07-14 19:10:28 +02:00
|
|
|
|
case RECTYPE_CACH:
|
|
|
|
|
fprintf(fp, "cach\n");
|
|
|
|
|
break;
|
|
|
|
|
case RECTYPE_HTBL:
|
1998-07-29 21:35:05 +02:00
|
|
|
|
fprintf(fp, "htbl,");
|
|
|
|
|
for(i=0; i < ITEMS_PER_HTBL_RECORD; i++ )
|
|
|
|
|
fprintf(fp, " %lu", rec->r.htbl.item[i] );
|
|
|
|
|
putc('\n', fp);
|
1998-07-14 19:10:28 +02:00
|
|
|
|
break;
|
1998-07-21 14:53:38 +02:00
|
|
|
|
case RECTYPE_HLST:
|
1998-07-29 21:35:05 +02:00
|
|
|
|
fprintf(fp, "hlst, next=%lu,", rec->r.hlst.next );
|
|
|
|
|
for(i=0; i < ITEMS_PER_HLST_RECORD; i++ )
|
|
|
|
|
fprintf(fp, " %lu", rec->r.hlst.rnum[i] );
|
|
|
|
|
putc('\n', fp);
|
1998-07-14 19:10:28 +02:00
|
|
|
|
break;
|
1998-07-09 15:37:17 +02:00
|
|
|
|
default:
|
1998-07-21 14:53:38 +02:00
|
|
|
|
fprintf(fp, "unknown type %d\n", rec->rectype );
|
1998-07-09 15:37:17 +02:00
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/****************
|
|
|
|
|
* read the record with number recnum
|
|
|
|
|
* returns: -1 on error, 0 on success
|
|
|
|
|
*/
|
|
|
|
|
int
|
|
|
|
|
tdbio_read_record( ulong recnum, TRUSTREC *rec, int expected )
|
|
|
|
|
{
|
1998-10-16 18:00:17 +02:00
|
|
|
|
byte readbuf[TRUST_RECORD_LEN];
|
|
|
|
|
const byte *buf, *p;
|
1998-07-09 15:37:17 +02:00
|
|
|
|
int rc = 0;
|
|
|
|
|
int n, i;
|
|
|
|
|
|
|
|
|
|
if( db_fd == -1 )
|
|
|
|
|
open_db();
|
1998-10-16 18:00:17 +02:00
|
|
|
|
buf = get_record_from_cache( recnum );
|
|
|
|
|
if( !buf ) {
|
|
|
|
|
if( lseek( db_fd, recnum * TRUST_RECORD_LEN, SEEK_SET ) == -1 ) {
|
|
|
|
|
log_error(_("trustdb: lseek failed: %s\n"), strerror(errno) );
|
2000-01-27 17:50:45 +01:00
|
|
|
|
return GPGERR_READ_FILE;
|
1998-10-16 18:00:17 +02:00
|
|
|
|
}
|
|
|
|
|
n = read( db_fd, readbuf, TRUST_RECORD_LEN);
|
|
|
|
|
if( !n ) {
|
|
|
|
|
return -1; /* eof */
|
|
|
|
|
}
|
|
|
|
|
else if( n != TRUST_RECORD_LEN ) {
|
|
|
|
|
log_error(_("trustdb: read failed (n=%d): %s\n"), n,
|
|
|
|
|
strerror(errno) );
|
2000-01-27 17:50:45 +01:00
|
|
|
|
return GPGERR_READ_FILE;
|
1998-10-16 18:00:17 +02:00
|
|
|
|
}
|
|
|
|
|
buf = readbuf;
|
1998-07-09 15:37:17 +02:00
|
|
|
|
}
|
1998-07-15 20:05:01 +02:00
|
|
|
|
rec->recnum = recnum;
|
1998-10-12 22:16:38 +02:00
|
|
|
|
rec->dirty = 0;
|
1998-07-09 15:37:17 +02:00
|
|
|
|
p = buf;
|
|
|
|
|
rec->rectype = *p++;
|
|
|
|
|
if( expected && rec->rectype != expected ) {
|
|
|
|
|
log_error("%lu: read expected rec type %d, got %d\n",
|
|
|
|
|
recnum, expected, rec->rectype );
|
2000-01-27 17:50:45 +01:00
|
|
|
|
return GPGERR_TRUSTDB;
|
1998-07-09 15:37:17 +02:00
|
|
|
|
}
|
1998-07-29 21:35:05 +02:00
|
|
|
|
p++; /* skip reserved byte */
|
1998-07-09 15:37:17 +02:00
|
|
|
|
switch( rec->rectype ) {
|
1998-07-29 21:35:05 +02:00
|
|
|
|
case 0: /* unused (free) record */
|
1998-07-09 15:37:17 +02:00
|
|
|
|
break;
|
|
|
|
|
case RECTYPE_VER: /* version record */
|
1998-07-14 19:10:28 +02:00
|
|
|
|
if( memcmp(buf+1, "gpg", 3 ) ) {
|
1998-10-21 19:34:36 +02:00
|
|
|
|
log_error( _("%s: not a trustdb file\n"), db_name );
|
2000-01-27 17:50:45 +01:00
|
|
|
|
rc = GPGERR_TRUSTDB;
|
1998-07-09 15:37:17 +02:00
|
|
|
|
}
|
1998-07-29 21:35:05 +02:00
|
|
|
|
p += 2; /* skip "pgp" */
|
1998-07-09 15:37:17 +02:00
|
|
|
|
rec->r.ver.version = *p++;
|
1998-11-13 20:41:41 +01:00
|
|
|
|
rec->r.ver.marginals = *p++;
|
|
|
|
|
rec->r.ver.completes = *p++;
|
|
|
|
|
rec->r.ver.cert_depth = *p++;
|
1998-07-29 21:35:05 +02:00
|
|
|
|
p += 4; /* lock flags */
|
1998-07-09 15:37:17 +02:00
|
|
|
|
rec->r.ver.created = buftoulong(p); p += 4;
|
1999-03-11 16:42:06 +01:00
|
|
|
|
rec->r.ver.mod_down = buftoulong(p); p += 4;
|
|
|
|
|
rec->r.ver.mod_up = buftoulong(p); p += 4;
|
1998-07-29 21:35:05 +02:00
|
|
|
|
rec->r.ver.keyhashtbl=buftoulong(p); p += 4;
|
1998-10-07 15:30:43 +02:00
|
|
|
|
rec->r.ver.firstfree =buftoulong(p); p += 4;
|
1998-10-12 22:16:38 +02:00
|
|
|
|
rec->r.ver.sdirhashtbl =buftoulong(p); p += 4;
|
1998-07-09 15:37:17 +02:00
|
|
|
|
if( recnum ) {
|
1998-10-21 19:34:36 +02:00
|
|
|
|
log_error( _("%s: version record with recnum %lu\n"), db_name,
|
1998-07-09 15:37:17 +02:00
|
|
|
|
(ulong)recnum );
|
2000-01-27 17:50:45 +01:00
|
|
|
|
rc = GPGERR_TRUSTDB;
|
1998-07-09 15:37:17 +02:00
|
|
|
|
}
|
1998-07-29 21:35:05 +02:00
|
|
|
|
else if( rec->r.ver.version != 2 ) {
|
1998-10-21 19:34:36 +02:00
|
|
|
|
log_error( _("%s: invalid file version %d\n"), db_name,
|
1998-07-09 15:37:17 +02:00
|
|
|
|
rec->r.ver.version );
|
2000-01-27 17:50:45 +01:00
|
|
|
|
rc = GPGERR_TRUSTDB;
|
1998-07-09 15:37:17 +02:00
|
|
|
|
}
|
|
|
|
|
break;
|
1998-10-07 15:30:43 +02:00
|
|
|
|
case RECTYPE_FREE:
|
|
|
|
|
rec->r.free.next = buftoulong(p); p += 4;
|
|
|
|
|
break;
|
1998-07-09 15:37:17 +02:00
|
|
|
|
case RECTYPE_DIR: /*directory record */
|
1998-07-14 19:10:28 +02:00
|
|
|
|
rec->r.dir.lid = buftoulong(p); p += 4;
|
|
|
|
|
rec->r.dir.keylist = buftoulong(p); p += 4;
|
|
|
|
|
rec->r.dir.uidlist = buftoulong(p); p += 4;
|
|
|
|
|
rec->r.dir.cacherec = buftoulong(p); p += 4;
|
|
|
|
|
rec->r.dir.ownertrust = *p++;
|
1998-07-21 14:53:38 +02:00
|
|
|
|
rec->r.dir.dirflags = *p++;
|
1998-11-13 20:41:41 +01:00
|
|
|
|
rec->r.dir.validity = *p++;
|
1999-03-11 16:42:06 +01:00
|
|
|
|
rec->r.dir.valcheck = buftoulong(p); p += 4;
|
1999-06-29 21:50:54 +02:00
|
|
|
|
rec->r.dir.checkat = buftoulong(p); p += 4;
|
1998-11-13 20:41:41 +01:00
|
|
|
|
switch( rec->r.dir.validity ) {
|
|
|
|
|
case 0:
|
|
|
|
|
case TRUST_UNDEFINED:
|
|
|
|
|
case TRUST_NEVER:
|
|
|
|
|
case TRUST_MARGINAL:
|
|
|
|
|
case TRUST_FULLY:
|
|
|
|
|
case TRUST_ULTIMATE:
|
|
|
|
|
break;
|
|
|
|
|
default:
|
|
|
|
|
log_info("lid %lu: invalid validity value - cleared\n", recnum);
|
|
|
|
|
}
|
1998-07-14 19:10:28 +02:00
|
|
|
|
if( rec->r.dir.lid != recnum ) {
|
1998-10-21 19:34:36 +02:00
|
|
|
|
log_error( "%s: dir LID != recnum (%lu,%lu)\n",
|
|
|
|
|
db_name, rec->r.dir.lid, (ulong)recnum );
|
2000-01-27 17:50:45 +01:00
|
|
|
|
rc = GPGERR_TRUSTDB;
|
1998-07-09 15:37:17 +02:00
|
|
|
|
}
|
|
|
|
|
break;
|
|
|
|
|
case RECTYPE_KEY: /* public key record */
|
1998-07-14 19:10:28 +02:00
|
|
|
|
rec->r.key.lid = buftoulong(p); p += 4;
|
|
|
|
|
rec->r.key.next = buftoulong(p); p += 4;
|
1998-07-21 14:53:38 +02:00
|
|
|
|
p += 7;
|
|
|
|
|
rec->r.key.keyflags = *p++;
|
1998-07-09 15:37:17 +02:00
|
|
|
|
rec->r.key.pubkey_algo = *p++;
|
|
|
|
|
rec->r.key.fingerprint_len = *p++;
|
|
|
|
|
if( rec->r.key.fingerprint_len < 1 || rec->r.key.fingerprint_len > 20 )
|
|
|
|
|
rec->r.key.fingerprint_len = 20;
|
1998-07-14 19:10:28 +02:00
|
|
|
|
memcpy( rec->r.key.fingerprint, p, 20);
|
1998-07-09 15:37:17 +02:00
|
|
|
|
break;
|
1998-07-14 19:10:28 +02:00
|
|
|
|
case RECTYPE_UID: /* user id record */
|
|
|
|
|
rec->r.uid.lid = buftoulong(p); p += 4;
|
|
|
|
|
rec->r.uid.next = buftoulong(p); p += 4;
|
|
|
|
|
rec->r.uid.prefrec = buftoulong(p); p += 4;
|
|
|
|
|
rec->r.uid.siglist = buftoulong(p); p += 4;
|
1998-07-21 14:53:38 +02:00
|
|
|
|
rec->r.uid.uidflags = *p++;
|
1999-02-10 17:22:40 +01:00
|
|
|
|
rec->r.uid.validity = *p++;
|
|
|
|
|
switch( rec->r.uid.validity ) {
|
|
|
|
|
case 0:
|
|
|
|
|
case TRUST_UNDEFINED:
|
|
|
|
|
case TRUST_NEVER:
|
|
|
|
|
case TRUST_MARGINAL:
|
|
|
|
|
case TRUST_FULLY:
|
|
|
|
|
case TRUST_ULTIMATE:
|
|
|
|
|
break;
|
|
|
|
|
default:
|
|
|
|
|
log_info("lid %lu: invalid validity value - cleared\n", recnum);
|
|
|
|
|
}
|
1998-07-14 19:10:28 +02:00
|
|
|
|
memcpy( rec->r.uid.namehash, p, 20);
|
|
|
|
|
break;
|
|
|
|
|
case RECTYPE_PREF: /* preference record */
|
|
|
|
|
rec->r.pref.lid = buftoulong(p); p += 4;
|
|
|
|
|
rec->r.pref.next = buftoulong(p); p += 4;
|
1998-08-05 18:51:59 +02:00
|
|
|
|
memcpy( rec->r.pref.data, p, 30 );
|
1998-07-09 15:37:17 +02:00
|
|
|
|
break;
|
|
|
|
|
case RECTYPE_SIG:
|
1998-07-14 19:10:28 +02:00
|
|
|
|
rec->r.sig.lid = buftoulong(p); p += 4;
|
|
|
|
|
rec->r.sig.next = buftoulong(p); p += 4;
|
1998-07-09 15:37:17 +02:00
|
|
|
|
for(i=0; i < SIGS_PER_RECORD; i++ ) {
|
1998-07-14 19:10:28 +02:00
|
|
|
|
rec->r.sig.sig[i].lid = buftoulong(p); p += 4;
|
1998-07-09 15:37:17 +02:00
|
|
|
|
rec->r.sig.sig[i].flag = *p++;
|
|
|
|
|
}
|
|
|
|
|
break;
|
1998-10-12 22:16:38 +02:00
|
|
|
|
case RECTYPE_SDIR: /* shadow directory record */
|
|
|
|
|
rec->r.sdir.lid = buftoulong(p); p += 4;
|
|
|
|
|
rec->r.sdir.keyid[0]= buftou32(p); p += 4;
|
|
|
|
|
rec->r.sdir.keyid[1]= buftou32(p); p += 4;
|
|
|
|
|
rec->r.sdir.pubkey_algo = *p++;
|
|
|
|
|
p += 3;
|
|
|
|
|
rec->r.sdir.hintlist = buftoulong(p);
|
|
|
|
|
if( rec->r.sdir.lid != recnum ) {
|
1998-10-21 19:34:36 +02:00
|
|
|
|
log_error( "%s: sdir LID != recnum (%lu,%lu)\n",
|
|
|
|
|
db_name, rec->r.sdir.lid, (ulong)recnum );
|
2000-01-27 17:50:45 +01:00
|
|
|
|
rc = GPGERR_TRUSTDB;
|
1998-10-12 22:16:38 +02:00
|
|
|
|
}
|
|
|
|
|
break;
|
1998-10-18 17:21:22 +02:00
|
|
|
|
case RECTYPE_CACH: /* cache record */
|
1998-07-14 19:10:28 +02:00
|
|
|
|
rec->r.cache.lid = buftoulong(p); p += 4;
|
|
|
|
|
memcpy(rec->r.cache.blockhash, p, 20); p += 20;
|
|
|
|
|
rec->r.cache.trustlevel = *p++;
|
|
|
|
|
break;
|
1998-07-29 21:35:05 +02:00
|
|
|
|
case RECTYPE_HTBL:
|
|
|
|
|
for(i=0; i < ITEMS_PER_HTBL_RECORD; i++ ) {
|
|
|
|
|
rec->r.htbl.item[i] = buftoulong(p); p += 4;
|
|
|
|
|
}
|
|
|
|
|
break;
|
|
|
|
|
case RECTYPE_HLST:
|
|
|
|
|
rec->r.hlst.next = buftoulong(p); p += 4;
|
|
|
|
|
for(i=0; i < ITEMS_PER_HLST_RECORD; i++ ) {
|
|
|
|
|
rec->r.hlst.rnum[i] = buftoulong(p); p += 4;
|
|
|
|
|
}
|
|
|
|
|
break;
|
1998-07-09 15:37:17 +02:00
|
|
|
|
default:
|
1998-10-21 19:34:36 +02:00
|
|
|
|
log_error( "%s: invalid record type %d at recnum %lu\n",
|
|
|
|
|
db_name, rec->rectype, (ulong)recnum );
|
2000-01-27 17:50:45 +01:00
|
|
|
|
rc = GPGERR_TRUSTDB;
|
1998-07-09 15:37:17 +02:00
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return rc;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/****************
|
|
|
|
|
* Write the record at RECNUM
|
|
|
|
|
*/
|
|
|
|
|
int
|
1998-07-15 20:05:01 +02:00
|
|
|
|
tdbio_write_record( TRUSTREC *rec )
|
1998-07-09 15:37:17 +02:00
|
|
|
|
{
|
|
|
|
|
byte buf[TRUST_RECORD_LEN], *p;
|
|
|
|
|
int rc = 0;
|
1998-10-16 18:00:17 +02:00
|
|
|
|
int i;
|
1998-07-15 20:05:01 +02:00
|
|
|
|
ulong recnum = rec->recnum;
|
1998-07-09 15:37:17 +02:00
|
|
|
|
|
|
|
|
|
if( db_fd == -1 )
|
|
|
|
|
open_db();
|
|
|
|
|
|
|
|
|
|
memset(buf, 0, TRUST_RECORD_LEN);
|
|
|
|
|
p = buf;
|
|
|
|
|
*p++ = rec->rectype; p++;
|
|
|
|
|
switch( rec->rectype ) {
|
|
|
|
|
case 0: /* unused record */
|
|
|
|
|
break;
|
1998-07-29 21:35:05 +02:00
|
|
|
|
case RECTYPE_VER: /* version record */
|
|
|
|
|
if( recnum )
|
|
|
|
|
BUG();
|
|
|
|
|
memcpy(p-1, "gpg", 3 ); p += 2;
|
|
|
|
|
*p++ = rec->r.ver.version;
|
1998-11-13 20:41:41 +01:00
|
|
|
|
*p++ = rec->r.ver.marginals;
|
|
|
|
|
*p++ = rec->r.ver.completes;
|
|
|
|
|
*p++ = rec->r.ver.cert_depth;
|
|
|
|
|
p += 4; /* skip lock flags */
|
1998-07-29 21:35:05 +02:00
|
|
|
|
ulongtobuf(p, rec->r.ver.created); p += 4;
|
1999-03-11 16:42:06 +01:00
|
|
|
|
ulongtobuf(p, rec->r.ver.mod_down); p += 4;
|
|
|
|
|
ulongtobuf(p, rec->r.ver.mod_up); p += 4;
|
1998-07-29 21:35:05 +02:00
|
|
|
|
ulongtobuf(p, rec->r.ver.keyhashtbl); p += 4;
|
1998-10-07 15:30:43 +02:00
|
|
|
|
ulongtobuf(p, rec->r.ver.firstfree ); p += 4;
|
1998-10-12 22:16:38 +02:00
|
|
|
|
ulongtobuf(p, rec->r.ver.sdirhashtbl ); p += 4;
|
1998-10-07 15:30:43 +02:00
|
|
|
|
break;
|
|
|
|
|
|
|
|
|
|
case RECTYPE_FREE:
|
|
|
|
|
ulongtobuf(p, rec->r.free.next); p += 4;
|
1998-07-09 15:37:17 +02:00
|
|
|
|
break;
|
|
|
|
|
|
|
|
|
|
case RECTYPE_DIR: /*directory record */
|
1998-07-14 19:10:28 +02:00
|
|
|
|
ulongtobuf(p, rec->r.dir.lid); p += 4;
|
|
|
|
|
ulongtobuf(p, rec->r.dir.keylist); p += 4;
|
|
|
|
|
ulongtobuf(p, rec->r.dir.uidlist); p += 4;
|
|
|
|
|
ulongtobuf(p, rec->r.dir.cacherec); p += 4;
|
|
|
|
|
*p++ = rec->r.dir.ownertrust;
|
1998-07-21 14:53:38 +02:00
|
|
|
|
*p++ = rec->r.dir.dirflags;
|
1998-11-13 20:41:41 +01:00
|
|
|
|
*p++ = rec->r.dir.validity;
|
1999-03-11 16:42:06 +01:00
|
|
|
|
ulongtobuf(p, rec->r.dir.valcheck); p += 4;
|
1999-06-29 21:50:54 +02:00
|
|
|
|
ulongtobuf(p, rec->r.dir.checkat); p += 4;
|
1998-07-14 19:10:28 +02:00
|
|
|
|
assert( rec->r.dir.lid == recnum );
|
1998-07-09 15:37:17 +02:00
|
|
|
|
break;
|
|
|
|
|
|
|
|
|
|
case RECTYPE_KEY:
|
1998-07-14 19:10:28 +02:00
|
|
|
|
ulongtobuf(p, rec->r.key.lid); p += 4;
|
|
|
|
|
ulongtobuf(p, rec->r.key.next); p += 4;
|
1998-07-21 14:53:38 +02:00
|
|
|
|
p += 7;
|
|
|
|
|
*p++ = rec->r.key.keyflags;
|
1998-07-09 15:37:17 +02:00
|
|
|
|
*p++ = rec->r.key.pubkey_algo;
|
|
|
|
|
*p++ = rec->r.key.fingerprint_len;
|
|
|
|
|
memcpy( p, rec->r.key.fingerprint, 20); p += 20;
|
|
|
|
|
break;
|
|
|
|
|
|
1998-07-14 19:10:28 +02:00
|
|
|
|
case RECTYPE_UID: /* user id record */
|
|
|
|
|
ulongtobuf(p, rec->r.uid.lid); p += 4;
|
|
|
|
|
ulongtobuf(p, rec->r.uid.next); p += 4;
|
|
|
|
|
ulongtobuf(p, rec->r.uid.prefrec); p += 4;
|
|
|
|
|
ulongtobuf(p, rec->r.uid.siglist); p += 4;
|
1998-07-21 14:53:38 +02:00
|
|
|
|
*p++ = rec->r.uid.uidflags;
|
1999-02-10 17:22:40 +01:00
|
|
|
|
*p++ = rec->r.uid.validity;
|
1998-07-14 19:10:28 +02:00
|
|
|
|
memcpy( p, rec->r.uid.namehash, 20 ); p += 20;
|
|
|
|
|
break;
|
|
|
|
|
|
|
|
|
|
case RECTYPE_PREF:
|
|
|
|
|
ulongtobuf(p, rec->r.pref.lid); p += 4;
|
|
|
|
|
ulongtobuf(p, rec->r.pref.next); p += 4;
|
1998-08-05 18:51:59 +02:00
|
|
|
|
memcpy( p, rec->r.pref.data, 30 );
|
1998-07-09 15:37:17 +02:00
|
|
|
|
break;
|
|
|
|
|
|
|
|
|
|
case RECTYPE_SIG:
|
1998-07-14 19:10:28 +02:00
|
|
|
|
ulongtobuf(p, rec->r.sig.lid); p += 4;
|
|
|
|
|
ulongtobuf(p, rec->r.sig.next); p += 4;
|
1998-07-09 15:37:17 +02:00
|
|
|
|
for(i=0; i < SIGS_PER_RECORD; i++ ) {
|
1998-07-14 19:10:28 +02:00
|
|
|
|
ulongtobuf(p, rec->r.sig.sig[i].lid); p += 4;
|
1998-07-09 15:37:17 +02:00
|
|
|
|
*p++ = rec->r.sig.sig[i].flag;
|
|
|
|
|
}
|
|
|
|
|
break;
|
1998-07-14 19:10:28 +02:00
|
|
|
|
|
1998-10-12 22:16:38 +02:00
|
|
|
|
case RECTYPE_SDIR:
|
|
|
|
|
ulongtobuf( p, rec->r.sdir.lid); p += 4;
|
|
|
|
|
u32tobuf( p, rec->r.sdir.keyid[0] ); p += 4;
|
|
|
|
|
u32tobuf( p, rec->r.sdir.keyid[1] ); p += 4;
|
|
|
|
|
*p++ = rec->r.sdir.pubkey_algo;
|
|
|
|
|
p += 3;
|
|
|
|
|
ulongtobuf( p, rec->r.sdir.hintlist );
|
|
|
|
|
break;
|
|
|
|
|
|
1998-10-18 17:21:22 +02:00
|
|
|
|
case RECTYPE_CACH:
|
1998-07-14 19:10:28 +02:00
|
|
|
|
ulongtobuf(p, rec->r.cache.lid); p += 4;
|
|
|
|
|
memcpy(p, rec->r.cache.blockhash, 20); p += 20;
|
|
|
|
|
*p++ = rec->r.cache.trustlevel;
|
|
|
|
|
break;
|
|
|
|
|
|
1998-07-29 21:35:05 +02:00
|
|
|
|
case RECTYPE_HTBL:
|
|
|
|
|
for(i=0; i < ITEMS_PER_HTBL_RECORD; i++ ) {
|
|
|
|
|
ulongtobuf( p, rec->r.htbl.item[i]); p += 4;
|
|
|
|
|
}
|
|
|
|
|
break;
|
|
|
|
|
|
|
|
|
|
case RECTYPE_HLST:
|
|
|
|
|
ulongtobuf( p, rec->r.hlst.next); p += 4;
|
|
|
|
|
for(i=0; i < ITEMS_PER_HLST_RECORD; i++ ) {
|
|
|
|
|
ulongtobuf( p, rec->r.hlst.rnum[i]); p += 4;
|
|
|
|
|
}
|
|
|
|
|
break;
|
|
|
|
|
|
1998-07-09 15:37:17 +02:00
|
|
|
|
default:
|
|
|
|
|
BUG();
|
|
|
|
|
}
|
|
|
|
|
|
1998-10-16 18:00:17 +02:00
|
|
|
|
rc = put_record_into_cache( recnum, buf );
|
|
|
|
|
if( rc )
|
|
|
|
|
;
|
1999-06-29 21:50:54 +02:00
|
|
|
|
else if( rec->rectype == RECTYPE_KEY )
|
1998-07-29 21:35:05 +02:00
|
|
|
|
rc = update_keyhashtbl( rec );
|
1998-10-12 22:16:38 +02:00
|
|
|
|
else if( rec->rectype == RECTYPE_SDIR )
|
|
|
|
|
rc = update_sdirhashtbl( rec );
|
1998-07-09 15:37:17 +02:00
|
|
|
|
|
|
|
|
|
return rc;
|
|
|
|
|
}
|
|
|
|
|
|
1998-07-21 14:53:38 +02:00
|
|
|
|
int
|
|
|
|
|
tdbio_delete_record( ulong recnum )
|
|
|
|
|
{
|
1998-10-07 15:30:43 +02:00
|
|
|
|
TRUSTREC vr, rec;
|
|
|
|
|
int rc;
|
|
|
|
|
|
1999-06-29 21:50:54 +02:00
|
|
|
|
/* Must read the record fist, so we can drop it from the hash tables */
|
|
|
|
|
rc = tdbio_read_record( recnum, &rec, 0 );
|
|
|
|
|
if( rc )
|
|
|
|
|
;
|
|
|
|
|
else if( rec.rectype == RECTYPE_KEY )
|
|
|
|
|
rc = drop_from_keyhashtbl( &rec );
|
|
|
|
|
else if( rec.rectype == RECTYPE_SDIR )
|
|
|
|
|
rc = drop_from_sdirhashtbl( &rec );
|
|
|
|
|
|
|
|
|
|
if( rc )
|
|
|
|
|
return rc;
|
|
|
|
|
|
|
|
|
|
/* now we can chnage it to a free record */
|
1998-10-07 15:30:43 +02:00
|
|
|
|
rc = tdbio_read_record( 0, &vr, RECTYPE_VER );
|
|
|
|
|
if( rc )
|
1998-10-21 19:34:36 +02:00
|
|
|
|
log_fatal( _("%s: error reading version record: %s\n"),
|
2000-01-27 17:50:45 +01:00
|
|
|
|
db_name, gpg_errstr(rc) );
|
1998-07-21 14:53:38 +02:00
|
|
|
|
|
|
|
|
|
rec.recnum = recnum;
|
1998-10-07 15:30:43 +02:00
|
|
|
|
rec.rectype = RECTYPE_FREE;
|
|
|
|
|
rec.r.free.next = vr.r.ver.firstfree;
|
|
|
|
|
vr.r.ver.firstfree = recnum;
|
|
|
|
|
rc = tdbio_write_record( &rec );
|
|
|
|
|
if( !rc )
|
|
|
|
|
rc = tdbio_write_record( &vr );
|
|
|
|
|
return rc;
|
1998-07-21 14:53:38 +02:00
|
|
|
|
}
|
1998-07-09 15:37:17 +02:00
|
|
|
|
|
|
|
|
|
/****************
|
|
|
|
|
* create a new record and return its record number
|
|
|
|
|
*/
|
|
|
|
|
ulong
|
|
|
|
|
tdbio_new_recnum()
|
|
|
|
|
{
|
|
|
|
|
off_t offset;
|
|
|
|
|
ulong recnum;
|
1998-10-07 15:30:43 +02:00
|
|
|
|
TRUSTREC vr, rec;
|
1998-07-09 15:37:17 +02:00
|
|
|
|
int rc;
|
|
|
|
|
|
1998-10-07 15:30:43 +02:00
|
|
|
|
/* look for unused records */
|
|
|
|
|
rc = tdbio_read_record( 0, &vr, RECTYPE_VER );
|
1998-07-09 15:37:17 +02:00
|
|
|
|
if( rc )
|
1998-10-21 19:34:36 +02:00
|
|
|
|
log_fatal( _("%s: error reading version record: %s\n"),
|
2000-01-27 17:50:45 +01:00
|
|
|
|
db_name, gpg_errstr(rc) );
|
1998-10-07 15:30:43 +02:00
|
|
|
|
if( vr.r.ver.firstfree ) {
|
|
|
|
|
recnum = vr.r.ver.firstfree;
|
|
|
|
|
rc = tdbio_read_record( recnum, &rec, RECTYPE_FREE );
|
|
|
|
|
if( rc ) {
|
1998-10-21 19:34:36 +02:00
|
|
|
|
log_error( _("%s: error reading free record: %s\n"),
|
2000-01-27 17:50:45 +01:00
|
|
|
|
db_name, gpg_errstr(rc) );
|
1998-10-07 15:30:43 +02:00
|
|
|
|
return rc;
|
|
|
|
|
}
|
|
|
|
|
/* update dir record */
|
|
|
|
|
vr.r.ver.firstfree = rec.r.free.next;
|
|
|
|
|
rc = tdbio_write_record( &vr );
|
|
|
|
|
if( rc ) {
|
1998-10-21 19:34:36 +02:00
|
|
|
|
log_error( _("%s: error writing dir record: %s\n"),
|
2000-01-27 17:50:45 +01:00
|
|
|
|
db_name, gpg_errstr(rc) );
|
1998-10-07 15:30:43 +02:00
|
|
|
|
return rc;
|
|
|
|
|
}
|
|
|
|
|
/*zero out the new record */
|
|
|
|
|
memset( &rec, 0, sizeof rec );
|
|
|
|
|
rec.rectype = 0; /* unused record */
|
|
|
|
|
rec.recnum = recnum;
|
|
|
|
|
rc = tdbio_write_record( &rec );
|
|
|
|
|
if( rc )
|
1998-10-21 19:34:36 +02:00
|
|
|
|
log_fatal(_("%s: failed to zero a record: %s\n"),
|
2000-01-27 17:50:45 +01:00
|
|
|
|
db_name, gpg_errstr(rc));
|
1998-10-07 15:30:43 +02:00
|
|
|
|
}
|
|
|
|
|
else { /* not found, append a new record */
|
|
|
|
|
offset = lseek( db_fd, 0, SEEK_END );
|
|
|
|
|
if( offset == -1 )
|
|
|
|
|
log_fatal("trustdb: lseek to end failed: %s\n", strerror(errno) );
|
|
|
|
|
recnum = offset / TRUST_RECORD_LEN;
|
|
|
|
|
assert(recnum); /* this is will never be the first record */
|
|
|
|
|
/* we must write a record, so that the next call to this function
|
|
|
|
|
* returns another recnum */
|
|
|
|
|
memset( &rec, 0, sizeof rec );
|
|
|
|
|
rec.rectype = 0; /* unused record */
|
|
|
|
|
rec.recnum = recnum;
|
1998-10-16 18:00:17 +02:00
|
|
|
|
rc = 0;
|
|
|
|
|
if( lseek( db_fd, recnum * TRUST_RECORD_LEN, SEEK_SET ) == -1 ) {
|
|
|
|
|
log_error(_("trustdb rec %lu: lseek failed: %s\n"),
|
|
|
|
|
recnum, strerror(errno) );
|
2000-01-27 17:50:45 +01:00
|
|
|
|
rc = GPGERR_WRITE_FILE;
|
1998-10-16 18:00:17 +02:00
|
|
|
|
}
|
|
|
|
|
else {
|
|
|
|
|
int n = write( db_fd, &rec, TRUST_RECORD_LEN);
|
|
|
|
|
if( n != TRUST_RECORD_LEN ) {
|
|
|
|
|
log_error(_("trustdb rec %lu: write failed (n=%d): %s\n"),
|
|
|
|
|
recnum, n, strerror(errno) );
|
2000-01-27 17:50:45 +01:00
|
|
|
|
rc = GPGERR_WRITE_FILE;
|
1998-10-16 18:00:17 +02:00
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
1998-10-07 15:30:43 +02:00
|
|
|
|
if( rc )
|
1998-10-21 19:34:36 +02:00
|
|
|
|
log_fatal(_("%s: failed to append a record: %s\n"),
|
2000-01-27 17:50:45 +01:00
|
|
|
|
db_name, gpg_errstr(rc));
|
1998-10-07 15:30:43 +02:00
|
|
|
|
}
|
1998-07-09 15:37:17 +02:00
|
|
|
|
return recnum ;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
/****************
|
|
|
|
|
* Search the trustdb for a key which matches PK and return the dir record
|
|
|
|
|
* The local_id of PK is set to the correct value
|
|
|
|
|
*/
|
|
|
|
|
int
|
1998-07-30 19:37:03 +02:00
|
|
|
|
tdbio_search_dir_bypk( PKT_public_key *pk, TRUSTREC *rec )
|
1998-07-09 15:37:17 +02:00
|
|
|
|
{
|
1998-10-12 22:16:38 +02:00
|
|
|
|
byte fingerprint[MAX_FINGERPRINT_LEN];
|
1998-07-09 15:37:17 +02:00
|
|
|
|
size_t fingerlen;
|
1998-07-30 19:37:03 +02:00
|
|
|
|
u32 keyid[2];
|
|
|
|
|
int rc;
|
|
|
|
|
|
|
|
|
|
keyid_from_pk( pk, keyid );
|
1998-10-12 22:16:38 +02:00
|
|
|
|
fingerprint_from_pk( pk, fingerprint, &fingerlen );
|
1998-07-30 19:37:03 +02:00
|
|
|
|
rc = tdbio_search_dir_byfpr( fingerprint, fingerlen,
|
|
|
|
|
pk->pubkey_algo, rec );
|
|
|
|
|
|
|
|
|
|
if( !rc ) {
|
|
|
|
|
if( pk->local_id && pk->local_id != rec->recnum )
|
1998-10-21 19:34:36 +02:00
|
|
|
|
log_error("%s: found record, but LID from memory does "
|
1998-07-30 19:37:03 +02:00
|
|
|
|
"not match recnum (%lu,%lu)\n",
|
1998-10-21 19:34:36 +02:00
|
|
|
|
db_name, pk->local_id, rec->recnum );
|
1998-07-30 19:37:03 +02:00
|
|
|
|
pk->local_id = rec->recnum;
|
|
|
|
|
}
|
|
|
|
|
return rc;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
1998-10-12 22:16:38 +02:00
|
|
|
|
static int
|
|
|
|
|
cmp_krec_fpr( void *dataptr, const TRUSTREC *rec )
|
|
|
|
|
{
|
|
|
|
|
const struct cmp_krec_fpr_struct *d = dataptr;
|
|
|
|
|
|
|
|
|
|
return rec->rectype == RECTYPE_KEY
|
|
|
|
|
&& ( !d->pubkey_algo || rec->r.key.pubkey_algo == d->pubkey_algo )
|
|
|
|
|
&& rec->r.key.fingerprint_len == d->fprlen
|
|
|
|
|
&& !memcmp( rec->r.key.fingerprint, d->fpr, d->fprlen );
|
|
|
|
|
}
|
|
|
|
|
|
1998-07-30 19:37:03 +02:00
|
|
|
|
int
|
|
|
|
|
tdbio_search_dir_byfpr( const byte *fingerprint, size_t fingerlen,
|
|
|
|
|
int pubkey_algo, TRUSTREC *rec )
|
|
|
|
|
{
|
1998-10-12 22:16:38 +02:00
|
|
|
|
struct cmp_krec_fpr_struct cmpdata;
|
1998-07-30 19:37:03 +02:00
|
|
|
|
ulong recnum;
|
1998-07-09 15:37:17 +02:00
|
|
|
|
int rc;
|
|
|
|
|
|
|
|
|
|
assert( fingerlen == 20 || fingerlen == 16 );
|
|
|
|
|
|
1998-07-29 21:35:05 +02:00
|
|
|
|
/* locate the key using the hash table */
|
1998-10-12 22:16:38 +02:00
|
|
|
|
cmpdata.pubkey_algo = pubkey_algo;
|
|
|
|
|
cmpdata.fpr = fingerprint;
|
|
|
|
|
cmpdata.fprlen = fingerlen;
|
|
|
|
|
rc = lookup_hashtable( get_keyhashrec(), fingerprint, fingerlen,
|
|
|
|
|
cmp_krec_fpr, &cmpdata, rec );
|
|
|
|
|
if( !rc ) {
|
|
|
|
|
recnum = rec->r.key.lid;
|
|
|
|
|
/* Now read the dir record */
|
|
|
|
|
rc = tdbio_read_record( recnum, rec, RECTYPE_DIR);
|
|
|
|
|
if( rc )
|
1998-10-21 19:34:36 +02:00
|
|
|
|
log_error("%s: can't read dirrec %lu: %s\n",
|
2000-01-27 17:50:45 +01:00
|
|
|
|
db_name, recnum, gpg_errstr(rc) );
|
1998-07-29 21:35:05 +02:00
|
|
|
|
}
|
1998-07-09 15:37:17 +02:00
|
|
|
|
return rc;
|
|
|
|
|
}
|
|
|
|
|
|
1998-10-12 22:16:38 +02:00
|
|
|
|
|
|
|
|
|
|
1998-08-07 10:53:38 +02:00
|
|
|
|
static int
|
1998-10-12 22:16:38 +02:00
|
|
|
|
cmp_sdir( void *dataptr, const TRUSTREC *rec )
|
1998-08-07 10:53:38 +02:00
|
|
|
|
{
|
1999-06-29 21:50:54 +02:00
|
|
|
|
const struct cmp_xdir_struct *d = dataptr;
|
1998-08-07 10:53:38 +02:00
|
|
|
|
|
1998-10-12 22:16:38 +02:00
|
|
|
|
return rec->rectype == RECTYPE_SDIR
|
|
|
|
|
&& ( !d->pubkey_algo || rec->r.sdir.pubkey_algo == d->pubkey_algo )
|
|
|
|
|
&& rec->r.sdir.keyid[0] == d->keyid[0]
|
|
|
|
|
&& rec->r.sdir.keyid[1] == d->keyid[1];
|
1998-08-07 10:53:38 +02:00
|
|
|
|
}
|
1998-07-09 15:37:17 +02:00
|
|
|
|
|
1998-10-12 22:16:38 +02:00
|
|
|
|
|
1998-07-14 19:10:28 +02:00
|
|
|
|
int
|
1998-10-12 22:16:38 +02:00
|
|
|
|
tdbio_search_sdir( u32 *keyid, int pubkey_algo, TRUSTREC *rec )
|
1998-07-14 19:10:28 +02:00
|
|
|
|
{
|
1999-06-29 21:50:54 +02:00
|
|
|
|
struct cmp_xdir_struct cmpdata;
|
1998-08-07 10:53:38 +02:00
|
|
|
|
int rc;
|
1998-10-12 22:16:38 +02:00
|
|
|
|
byte key[8];
|
|
|
|
|
|
|
|
|
|
/* locate the shadow dir record using the hash table */
|
|
|
|
|
u32tobuf( key , keyid[0] );
|
|
|
|
|
u32tobuf( key+4 , keyid[1] );
|
|
|
|
|
cmpdata.pubkey_algo = pubkey_algo;
|
|
|
|
|
cmpdata.keyid[0] = keyid[0];
|
|
|
|
|
cmpdata.keyid[1] = keyid[1];
|
|
|
|
|
rc = lookup_hashtable( get_sdirhashrec(), key, 8,
|
|
|
|
|
cmp_sdir, &cmpdata, rec );
|
|
|
|
|
return rc;
|
1998-07-14 19:10:28 +02:00
|
|
|
|
}
|
|
|
|
|
|
1998-07-21 14:53:38 +02:00
|
|
|
|
|
1999-03-11 16:42:06 +01:00
|
|
|
|
void
|
|
|
|
|
tdbio_invalid(void)
|
|
|
|
|
{
|
|
|
|
|
log_error(_(
|
1999-06-26 12:23:06 +02:00
|
|
|
|
"the trustdb is corrupted; please run \"gpg --fix-trustdb\".\n") );
|
2000-01-27 17:50:45 +01:00
|
|
|
|
gpg_exit(2);
|
1999-03-11 16:42:06 +01:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|