2003-06-05 07:14:21 +00:00
|
|
|
/* build-packet.c - assemble packets and write them
|
2006-04-19 11:26:11 +00:00
|
|
|
* Copyright (C) 1998, 1999, 2000, 2001, 2002, 2003, 2004, 2005,
|
2011-01-31 09:27:06 +01:00
|
|
|
* 2006, 2010, 2011 Free Software Foundation, Inc.
|
2003-06-05 07:14:21 +00:00
|
|
|
*
|
|
|
|
* This file is part of GnuPG.
|
|
|
|
*
|
|
|
|
* GnuPG is free software; you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU General Public License as published by
|
2007-07-04 19:49:40 +00:00
|
|
|
* the Free Software Foundation; either version 3 of the License, or
|
2003-06-05 07:14:21 +00:00
|
|
|
* (at your option) any later version.
|
|
|
|
*
|
|
|
|
* GnuPG is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU General Public License
|
2007-07-04 19:49:40 +00:00
|
|
|
* along with this program; if not, see <http://www.gnu.org/licenses/>.
|
2003-06-05 07:14:21 +00:00
|
|
|
*/
|
|
|
|
|
|
|
|
#include <config.h>
|
|
|
|
#include <stdio.h>
|
|
|
|
#include <stdlib.h>
|
|
|
|
#include <string.h>
|
|
|
|
#include <assert.h>
|
2006-04-19 11:26:11 +00:00
|
|
|
#include <ctype.h>
|
2003-06-05 07:14:21 +00:00
|
|
|
|
2003-06-18 19:56:13 +00:00
|
|
|
#include "gpg.h"
|
2010-10-01 20:33:53 +00:00
|
|
|
#include "util.h"
|
2003-06-05 07:14:21 +00:00
|
|
|
#include "packet.h"
|
2007-11-19 16:03:50 +00:00
|
|
|
#include "status.h"
|
2003-06-05 07:14:21 +00:00
|
|
|
#include "iobuf.h"
|
2006-04-19 11:26:11 +00:00
|
|
|
#include "i18n.h"
|
2003-06-05 07:14:21 +00:00
|
|
|
#include "options.h"
|
|
|
|
|
2006-04-19 11:26:11 +00:00
|
|
|
static int do_user_id( IOBUF out, int ctb, PKT_user_id *uid );
|
2010-09-06 19:57:42 +00:00
|
|
|
static int do_key (iobuf_t out, int ctb, PKT_public_key *pk);
|
2006-04-19 11:26:11 +00:00
|
|
|
static int do_symkey_enc( IOBUF out, int ctb, PKT_symkey_enc *enc );
|
|
|
|
static int do_pubkey_enc( IOBUF out, int ctb, PKT_pubkey_enc *enc );
|
2003-06-05 07:14:21 +00:00
|
|
|
static u32 calc_plaintext( PKT_plaintext *pt );
|
2006-04-19 11:26:11 +00:00
|
|
|
static int do_plaintext( IOBUF out, int ctb, PKT_plaintext *pt );
|
|
|
|
static int do_encrypted( IOBUF out, int ctb, PKT_encrypted *ed );
|
|
|
|
static int do_encrypted_mdc( IOBUF out, int ctb, PKT_encrypted *ed );
|
|
|
|
static int do_compressed( IOBUF out, int ctb, PKT_compressed *cd );
|
|
|
|
static int do_signature( IOBUF out, int ctb, PKT_signature *sig );
|
|
|
|
static int do_onepass_sig( IOBUF out, int ctb, PKT_onepass_sig *ops );
|
2003-06-05 07:14:21 +00:00
|
|
|
|
|
|
|
static int calc_header_length( u32 len, int new_ctb );
|
2006-04-19 11:26:11 +00:00
|
|
|
static int write_16(IOBUF inp, u16 a);
|
|
|
|
static int write_32(IOBUF inp, u32 a);
|
|
|
|
static int write_header( IOBUF out, int ctb, u32 len );
|
|
|
|
static int write_sign_packet_header( IOBUF out, int ctb, u32 len );
|
|
|
|
static int write_header2( IOBUF out, int ctb, u32 len, int hdrlen );
|
|
|
|
static int write_new_header( IOBUF out, int ctb, u32 len, int hdrlen );
|
|
|
|
static int write_version( IOBUF out, int ctb );
|
2003-06-05 07:14:21 +00:00
|
|
|
|
|
|
|
/****************
|
|
|
|
* Build a packet and write it to INP
|
|
|
|
* Returns: 0 := okay
|
|
|
|
* >0 := error
|
|
|
|
* Note: Caller must free the packet
|
|
|
|
*/
|
|
|
|
int
|
2006-04-19 11:26:11 +00:00
|
|
|
build_packet( IOBUF out, PACKET *pkt )
|
2003-06-05 07:14:21 +00:00
|
|
|
{
|
|
|
|
int new_ctb=0, rc=0, ctb;
|
|
|
|
int pkttype;
|
|
|
|
|
|
|
|
if( DBG_PACKET )
|
|
|
|
log_debug("build_packet() type=%d\n", pkt->pkttype );
|
|
|
|
assert( pkt->pkt.generic );
|
|
|
|
|
2010-10-01 20:33:53 +00:00
|
|
|
switch ((pkttype = pkt->pkttype))
|
2006-04-19 11:26:11 +00:00
|
|
|
{
|
2010-10-01 20:33:53 +00:00
|
|
|
case PKT_PUBLIC_KEY:
|
|
|
|
if (pkt->pkt.public_key->seckey_info)
|
|
|
|
pkttype = PKT_SECRET_KEY;
|
|
|
|
break;
|
|
|
|
case PKT_PUBLIC_SUBKEY:
|
|
|
|
if (pkt->pkt.public_key->seckey_info)
|
|
|
|
pkttype = PKT_SECRET_SUBKEY;
|
|
|
|
break;
|
2003-06-05 07:14:21 +00:00
|
|
|
case PKT_PLAINTEXT: new_ctb = pkt->pkt.plaintext->new_ctb; break;
|
|
|
|
case PKT_ENCRYPTED:
|
|
|
|
case PKT_ENCRYPTED_MDC: new_ctb = pkt->pkt.encrypted->new_ctb; break;
|
|
|
|
case PKT_COMPRESSED:new_ctb = pkt->pkt.compressed->new_ctb; break;
|
|
|
|
case PKT_USER_ID:
|
2006-04-19 11:26:11 +00:00
|
|
|
if( pkt->pkt.user_id->attrib_data )
|
|
|
|
pkttype = PKT_ATTRIBUTE;
|
|
|
|
break;
|
2003-06-05 07:14:21 +00:00
|
|
|
default: break;
|
2006-04-19 11:26:11 +00:00
|
|
|
}
|
2003-06-05 07:14:21 +00:00
|
|
|
|
|
|
|
if( new_ctb || pkttype > 15 ) /* new format */
|
|
|
|
ctb = 0xc0 | (pkttype & 0x3f);
|
|
|
|
else
|
|
|
|
ctb = 0x80 | ((pkttype & 15)<<2);
|
2006-04-19 11:26:11 +00:00
|
|
|
switch( pkttype )
|
|
|
|
{
|
2003-06-05 07:14:21 +00:00
|
|
|
case PKT_ATTRIBUTE:
|
|
|
|
case PKT_USER_ID:
|
|
|
|
rc = do_user_id( out, ctb, pkt->pkt.user_id );
|
|
|
|
break;
|
2006-04-19 11:26:11 +00:00
|
|
|
case PKT_OLD_COMMENT:
|
2003-06-05 07:14:21 +00:00
|
|
|
case PKT_COMMENT:
|
2006-04-19 11:26:11 +00:00
|
|
|
/*
|
|
|
|
Ignore these. Theoretically, this will never be called as
|
|
|
|
we have no way to output comment packets any longer, but
|
|
|
|
just in case there is some code path that would end up
|
|
|
|
outputting a comment that was written before comments were
|
|
|
|
dropped (in the public key?) this is a no-op.
|
|
|
|
*/
|
2003-06-05 07:14:21 +00:00
|
|
|
break;
|
|
|
|
case PKT_PUBLIC_SUBKEY:
|
|
|
|
case PKT_PUBLIC_KEY:
|
|
|
|
case PKT_SECRET_SUBKEY:
|
|
|
|
case PKT_SECRET_KEY:
|
2010-09-06 19:57:42 +00:00
|
|
|
rc = do_key (out, ctb, pkt->pkt.public_key);
|
2003-06-05 07:14:21 +00:00
|
|
|
break;
|
|
|
|
case PKT_SYMKEY_ENC:
|
|
|
|
rc = do_symkey_enc( out, ctb, pkt->pkt.symkey_enc );
|
|
|
|
break;
|
|
|
|
case PKT_PUBKEY_ENC:
|
|
|
|
rc = do_pubkey_enc( out, ctb, pkt->pkt.pubkey_enc );
|
|
|
|
break;
|
|
|
|
case PKT_PLAINTEXT:
|
|
|
|
rc = do_plaintext( out, ctb, pkt->pkt.plaintext );
|
|
|
|
break;
|
|
|
|
case PKT_ENCRYPTED:
|
|
|
|
rc = do_encrypted( out, ctb, pkt->pkt.encrypted );
|
|
|
|
break;
|
|
|
|
case PKT_ENCRYPTED_MDC:
|
|
|
|
rc = do_encrypted_mdc( out, ctb, pkt->pkt.encrypted );
|
|
|
|
break;
|
|
|
|
case PKT_COMPRESSED:
|
|
|
|
rc = do_compressed( out, ctb, pkt->pkt.compressed );
|
|
|
|
break;
|
|
|
|
case PKT_SIGNATURE:
|
|
|
|
rc = do_signature( out, ctb, pkt->pkt.signature );
|
|
|
|
break;
|
|
|
|
case PKT_ONEPASS_SIG:
|
|
|
|
rc = do_onepass_sig( out, ctb, pkt->pkt.onepass_sig );
|
|
|
|
break;
|
|
|
|
case PKT_RING_TRUST:
|
|
|
|
break; /* ignore it (keyring.c does write it directly)*/
|
|
|
|
case PKT_MDC: /* we write it directly, so we should never see it here. */
|
|
|
|
default:
|
|
|
|
log_bug("invalid packet type in build_packet()\n");
|
|
|
|
break;
|
2006-04-19 11:26:11 +00:00
|
|
|
}
|
2003-06-05 07:14:21 +00:00
|
|
|
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
2006-04-19 11:26:11 +00:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Write the mpi A to OUT.
|
|
|
|
*/
|
2011-01-31 15:44:24 +01:00
|
|
|
gpg_error_t
|
|
|
|
gpg_mpi_write (iobuf_t out, gcry_mpi_t a)
|
2006-04-19 11:26:11 +00:00
|
|
|
{
|
|
|
|
int rc;
|
|
|
|
|
2011-01-31 09:27:06 +01:00
|
|
|
if (gcry_mpi_get_flag (a, GCRYMPI_FLAG_OPAQUE))
|
2006-10-18 14:28:52 +00:00
|
|
|
{
|
2011-06-01 21:43:30 +02:00
|
|
|
unsigned int nbits;
|
2011-01-31 09:27:06 +01:00
|
|
|
const void *p;
|
2013-11-15 08:59:45 +01:00
|
|
|
unsigned int lenhdr[2];
|
2011-01-31 09:27:06 +01:00
|
|
|
|
|
|
|
p = gcry_mpi_get_opaque (a, &nbits);
|
2013-11-15 08:59:45 +01:00
|
|
|
lenhdr[0] = nbits >> 8;
|
|
|
|
lenhdr[1] = nbits;
|
|
|
|
rc = iobuf_write (out, lenhdr, 2);
|
|
|
|
if (!rc)
|
|
|
|
rc = iobuf_write (out, p, (nbits+7)/8);
|
2011-01-31 09:27:06 +01:00
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
char buffer[(MAX_EXTERN_MPI_BITS+7)/8+2]; /* 2 is for the mpi length. */
|
|
|
|
size_t nbytes;
|
|
|
|
|
|
|
|
nbytes = DIM(buffer);
|
|
|
|
rc = gcry_mpi_print (GCRYMPI_FMT_PGP, buffer, nbytes, &nbytes, a );
|
|
|
|
if( !rc )
|
|
|
|
rc = iobuf_write( out, buffer, nbytes );
|
|
|
|
else if (gpg_err_code(rc) == GPG_ERR_TOO_SHORT )
|
|
|
|
{
|
|
|
|
log_info ("mpi too large (%u bits)\n", gcry_mpi_get_nbits (a));
|
|
|
|
/* The buffer was too small. We better tell the user about the MPI. */
|
|
|
|
rc = gpg_error (GPG_ERR_TOO_LARGE);
|
|
|
|
}
|
2006-10-18 14:28:52 +00:00
|
|
|
}
|
|
|
|
|
2006-04-19 11:26:11 +00:00
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
2011-01-21 12:00:57 +01:00
|
|
|
|
2013-11-15 08:59:45 +01:00
|
|
|
/*
|
|
|
|
* Write an opaque MPI to the output stream without length info.
|
|
|
|
*/
|
|
|
|
gpg_error_t
|
|
|
|
gpg_mpi_write_nohdr (iobuf_t out, gcry_mpi_t a)
|
|
|
|
{
|
|
|
|
int rc;
|
|
|
|
|
|
|
|
if (gcry_mpi_get_flag (a, GCRYMPI_FLAG_OPAQUE))
|
|
|
|
{
|
|
|
|
unsigned int nbits;
|
|
|
|
const void *p;
|
|
|
|
|
|
|
|
p = gcry_mpi_get_opaque (a, &nbits);
|
|
|
|
rc = iobuf_write (out, p, (nbits+7)/8);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
rc = gpg_error (GPG_ERR_BAD_MPI);
|
|
|
|
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2011-01-21 12:00:57 +01:00
|
|
|
/* Calculate the length of a packet described by PKT. */
|
2003-06-05 07:14:21 +00:00
|
|
|
u32
|
|
|
|
calc_packet_length( PACKET *pkt )
|
|
|
|
{
|
|
|
|
u32 n=0;
|
|
|
|
int new_ctb = 0;
|
|
|
|
|
|
|
|
assert( pkt->pkt.generic );
|
|
|
|
switch( pkt->pkttype ) {
|
|
|
|
case PKT_PLAINTEXT:
|
|
|
|
n = calc_plaintext( pkt->pkt.plaintext );
|
|
|
|
new_ctb = pkt->pkt.plaintext->new_ctb;
|
|
|
|
break;
|
|
|
|
case PKT_ATTRIBUTE:
|
|
|
|
case PKT_USER_ID:
|
|
|
|
case PKT_COMMENT:
|
|
|
|
case PKT_PUBLIC_KEY:
|
|
|
|
case PKT_SECRET_KEY:
|
|
|
|
case PKT_SYMKEY_ENC:
|
|
|
|
case PKT_PUBKEY_ENC:
|
|
|
|
case PKT_ENCRYPTED:
|
|
|
|
case PKT_SIGNATURE:
|
|
|
|
case PKT_ONEPASS_SIG:
|
|
|
|
case PKT_RING_TRUST:
|
|
|
|
case PKT_COMPRESSED:
|
|
|
|
default:
|
|
|
|
log_bug("invalid packet type in calc_packet_length()");
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
n += calc_header_length(n, new_ctb);
|
|
|
|
return n;
|
|
|
|
}
|
|
|
|
|
2011-01-31 09:27:06 +01:00
|
|
|
|
|
|
|
static gpg_error_t
|
2006-04-19 11:26:11 +00:00
|
|
|
write_fake_data (IOBUF out, gcry_mpi_t a)
|
2003-06-05 07:14:21 +00:00
|
|
|
{
|
2011-01-31 09:27:06 +01:00
|
|
|
unsigned int n;
|
|
|
|
void *p;
|
2011-01-26 17:17:43 +01:00
|
|
|
|
2011-01-31 09:27:06 +01:00
|
|
|
if (!a)
|
|
|
|
return 0;
|
|
|
|
p = gcry_mpi_get_opaque ( a, &n);
|
|
|
|
return iobuf_write (out, p, (n+7)/8 );
|
2003-06-05 07:14:21 +00:00
|
|
|
}
|
|
|
|
|
2011-01-31 09:27:06 +01:00
|
|
|
|
2003-06-05 07:14:21 +00:00
|
|
|
static int
|
2006-04-19 11:26:11 +00:00
|
|
|
do_user_id( IOBUF out, int ctb, PKT_user_id *uid )
|
2003-06-05 07:14:21 +00:00
|
|
|
{
|
2011-08-10 14:11:30 +02:00
|
|
|
int rc;
|
2003-06-18 19:56:13 +00:00
|
|
|
|
2011-08-10 14:11:30 +02:00
|
|
|
if (uid->attrib_data)
|
|
|
|
{
|
|
|
|
write_header(out, ctb, uid->attrib_len);
|
|
|
|
rc = iobuf_write( out, uid->attrib_data, uid->attrib_len );
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
write_header2( out, ctb, uid->len, 2 );
|
|
|
|
rc = iobuf_write( out, uid->name, uid->len );
|
|
|
|
}
|
|
|
|
return rc;
|
2003-06-05 07:14:21 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static int
|
2010-09-06 19:57:42 +00:00
|
|
|
do_key (iobuf_t out, int ctb, PKT_public_key *pk)
|
2003-06-05 07:14:21 +00:00
|
|
|
{
|
2010-09-06 19:57:42 +00:00
|
|
|
gpg_error_t err = 0;
|
2006-10-18 14:28:52 +00:00
|
|
|
int i, nskey, npkey;
|
2010-09-06 19:57:42 +00:00
|
|
|
iobuf_t a = iobuf_temp(); /* Build in a self-enlarging buffer. */
|
2003-06-05 07:14:21 +00:00
|
|
|
|
2006-10-18 14:28:52 +00:00
|
|
|
/* Write the version number - if none is specified, use 3 */
|
2010-09-06 19:57:42 +00:00
|
|
|
if ( !pk->version )
|
2006-10-18 14:28:52 +00:00
|
|
|
iobuf_put ( a, 3 );
|
|
|
|
else
|
2010-09-06 19:57:42 +00:00
|
|
|
iobuf_put ( a, pk->version );
|
|
|
|
write_32 (a, pk->timestamp );
|
2003-06-05 07:14:21 +00:00
|
|
|
|
2006-10-18 14:28:52 +00:00
|
|
|
/* v3 needs the expiration time. */
|
2010-09-06 19:57:42 +00:00
|
|
|
if ( pk->version < 4 )
|
2006-10-18 14:28:52 +00:00
|
|
|
{
|
|
|
|
u16 ndays;
|
2010-09-06 19:57:42 +00:00
|
|
|
if ( pk->expiredate )
|
|
|
|
ndays = (u16)((pk->expiredate - pk->timestamp) / 86400L);
|
2006-10-18 14:28:52 +00:00
|
|
|
else
|
|
|
|
ndays = 0;
|
|
|
|
write_16(a, ndays);
|
|
|
|
}
|
2011-01-26 17:17:43 +01:00
|
|
|
|
2010-09-06 19:57:42 +00:00
|
|
|
iobuf_put (a, pk->pubkey_algo );
|
2011-01-26 17:17:43 +01:00
|
|
|
|
2006-10-18 14:28:52 +00:00
|
|
|
/* Get number of secret and public parameters. They are held in one
|
|
|
|
array first the public ones, then the secret ones. */
|
2010-09-06 19:57:42 +00:00
|
|
|
nskey = pubkey_get_nskey (pk->pubkey_algo);
|
|
|
|
npkey = pubkey_get_npkey (pk->pubkey_algo);
|
2011-01-26 17:17:43 +01:00
|
|
|
|
2006-10-18 14:28:52 +00:00
|
|
|
/* If we don't have any public parameters - which is the case if we
|
|
|
|
don't know the algorithm used - the parameters are stored as one
|
|
|
|
blob in a faked (opaque) MPI. */
|
2011-01-26 17:17:43 +01:00
|
|
|
if (!npkey)
|
2006-10-18 14:28:52 +00:00
|
|
|
{
|
2010-09-06 19:57:42 +00:00
|
|
|
write_fake_data (a, pk->pkey[0]);
|
2006-10-18 14:28:52 +00:00
|
|
|
goto leave;
|
2003-06-05 07:14:21 +00:00
|
|
|
}
|
2010-09-06 19:57:42 +00:00
|
|
|
assert (npkey < nskey);
|
2006-10-18 14:28:52 +00:00
|
|
|
|
2011-01-31 09:27:06 +01:00
|
|
|
for (i=0; i < npkey; i++ )
|
2011-01-05 17:33:17 -08:00
|
|
|
{
|
gpg: Use only OpenPGP public key algo ids and add the EdDSA algo id.
* common/sexputil.c (get_pk_algo_from_canon_sexp): Change to return a
string.
* g10/keygen.c (check_keygrip): Adjust for change.
* sm/certreqgen-ui.c (check_keygrip): Likewise.
* agent/pksign.c (do_encode_dsa): Remove bogus map_pk_openpgp_to_gcry.
* g10/misc.c (map_pk_openpgp_to_gcry): Remove.
(openpgp_pk_test_algo): Change to a wrapper for openpgp_pk_test_algo2.
(openpgp_pk_test_algo2): Rewrite.
(openpgp_pk_algo_usage, pubkey_nbits): Add support for EdDSA.
(openpgp_pk_algo_name): Rewrite to remove need for gcry calls.
(pubkey_get_npkey, pubkey_get_nskey): Ditto.
(pubkey_get_nsig, pubkey_get_nenc): Ditto.
* g10/keygen.c(do_create_from_keygrip): Support EdDSA.
(common_gen, gen_ecc, ask_keysize, generate_keypair): Ditto.
* g10/build-packet.c (do_key): Ditto.
* g10/export.c (transfer_format_to_openpgp): Ditto.
* g10/getkey.c (cache_public_key): Ditto.
* g10/import.c (transfer_secret_keys): Ditto.
* g10/keylist.c (list_keyblock_print, list_keyblock_colon): Ditto.
* g10/mainproc.c (proc_pubkey_enc): Ditto.
* g10/parse-packet.c (parse_key): Ditto,
* g10/sign.c (hash_for, sign_file, make_keysig_packet): Ditto.
* g10/keyserver.c (print_keyrec): Use openpgp_pk_algo_name.
* g10/pkglue.c (pk_verify, pk_encrypt, pk_check_secret_key): Use only
OpenPGP algo ids and support EdDSA.
* g10/pubkey-enc.c (get_it): Use only OpenPGP algo ids.
* g10/seskey.c (encode_md_value): Ditto.
--
This patch separates Libgcrypt and OpenPGP public key algorithms ids
and in most cases completely removes the Libgcrypt ones. This is
useful because for Libgcrypt we specify the algorithm in the
S-expressions and the public key ids are not anymore needed.
This patch also adds some support for PUBKEY_ALGO_EDDSA which will
eventually be used instead of merging EdDSA with ECDSA. As of now an
experimental algorithm id is used but the plan is to write an I-D so
that we can get a new id from the IETF. Note that EdDSA (Ed25519)
does not yet work and that more changes are required.
The ECC support is still broken right now. Needs to be fixed.
Signed-off-by: Werner Koch <wk@gnupg.org>
2014-01-30 18:48:37 +01:00
|
|
|
if ( (pk->pubkey_algo == PUBKEY_ALGO_ECDSA && (i == 0))
|
|
|
|
|| (pk->pubkey_algo == PUBKEY_ALGO_EDDSA && (i == 0))
|
|
|
|
|| (pk->pubkey_algo == PUBKEY_ALGO_ECDH && (i == 0 || i == 2)))
|
2013-11-15 08:59:45 +01:00
|
|
|
err = gpg_mpi_write_nohdr (a, pk->pkey[i]);
|
|
|
|
else
|
|
|
|
err = gpg_mpi_write (a, pk->pkey[i]);
|
2011-01-21 12:00:57 +01:00
|
|
|
if (err)
|
|
|
|
goto leave;
|
2011-01-05 17:33:17 -08:00
|
|
|
}
|
2011-01-21 12:00:57 +01:00
|
|
|
|
2011-01-26 17:17:43 +01:00
|
|
|
|
2010-09-06 19:57:42 +00:00
|
|
|
if (pk->seckey_info)
|
2006-10-18 14:28:52 +00:00
|
|
|
{
|
2010-09-06 19:57:42 +00:00
|
|
|
/* This is a secret key packet. */
|
|
|
|
struct seckey_info *ski = pk->seckey_info;
|
|
|
|
|
|
|
|
/* Build the header for protected (encrypted) secret parameters. */
|
2011-01-26 17:17:43 +01:00
|
|
|
if (ski->is_protected)
|
2006-10-18 14:28:52 +00:00
|
|
|
{
|
2010-09-06 19:57:42 +00:00
|
|
|
if ( is_RSA (pk->pubkey_algo) && pk->version < 4 && !ski->s2k.mode )
|
2006-10-18 14:28:52 +00:00
|
|
|
{
|
2010-09-06 19:57:42 +00:00
|
|
|
/* The simple rfc1991 (v3) way. */
|
|
|
|
iobuf_put (a, ski->algo );
|
|
|
|
iobuf_write (a, ski->iv, ski->ivlen);
|
|
|
|
}
|
|
|
|
else
|
2006-10-18 14:28:52 +00:00
|
|
|
{
|
2010-09-06 19:57:42 +00:00
|
|
|
/* OpenPGP protection according to rfc2440. */
|
|
|
|
iobuf_put (a, ski->sha1chk? 0xfe : 0xff);
|
|
|
|
iobuf_put (a, ski->algo);
|
|
|
|
if (ski->s2k.mode >= 1000)
|
|
|
|
{
|
|
|
|
/* These modes are not possible in OpenPGP, we use
|
|
|
|
them to implement our extensions, 101 can be
|
|
|
|
viewed as a private/experimental extension (this
|
|
|
|
is not specified in rfc2440 but the same scheme
|
|
|
|
is used for all other algorithm identifiers). */
|
2011-01-26 17:17:43 +01:00
|
|
|
iobuf_put (a, 101);
|
2010-09-06 19:57:42 +00:00
|
|
|
iobuf_put (a, ski->s2k.hash_algo);
|
|
|
|
iobuf_write (a, "GNU", 3 );
|
|
|
|
iobuf_put (a, ski->s2k.mode - 1000);
|
|
|
|
}
|
2011-01-26 17:17:43 +01:00
|
|
|
else
|
2010-09-06 19:57:42 +00:00
|
|
|
{
|
|
|
|
iobuf_put (a, ski->s2k.mode);
|
|
|
|
iobuf_put (a, ski->s2k.hash_algo);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (ski->s2k.mode == 1 || ski->s2k.mode == 3)
|
|
|
|
iobuf_write (a, ski->s2k.salt, 8);
|
|
|
|
|
|
|
|
if (ski->s2k.mode == 3)
|
2011-01-26 17:17:43 +01:00
|
|
|
iobuf_put (a, ski->s2k.count);
|
2010-09-06 19:57:42 +00:00
|
|
|
|
|
|
|
/* For our special modes 1001, 1002 we do not need an IV. */
|
|
|
|
if (ski->s2k.mode != 1001 && ski->s2k.mode != 1002)
|
|
|
|
iobuf_write (a, ski->iv, ski->ivlen);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
else /* Not protected. */
|
|
|
|
iobuf_put (a, 0 );
|
|
|
|
|
|
|
|
if (ski->s2k.mode == 1001)
|
2011-01-26 17:17:43 +01:00
|
|
|
; /* GnuPG extension - don't write a secret key at all. */
|
2010-09-06 19:57:42 +00:00
|
|
|
else if (ski->s2k.mode == 1002)
|
2011-01-26 17:17:43 +01:00
|
|
|
{
|
|
|
|
/* GnuPG extension - divert to OpenPGP smartcard. */
|
2010-09-06 19:57:42 +00:00
|
|
|
/* Length of the serial number or 0 for no serial number. */
|
|
|
|
iobuf_put (a, ski->ivlen );
|
|
|
|
/* The serial number gets stored in the IV field. */
|
|
|
|
iobuf_write (a, ski->iv, ski->ivlen);
|
|
|
|
}
|
|
|
|
else if (ski->is_protected && pk->version >= 4)
|
2006-10-18 14:28:52 +00:00
|
|
|
{
|
2010-09-06 19:57:42 +00:00
|
|
|
/* The secret key is protected - write it out as it is. */
|
2006-10-18 14:28:52 +00:00
|
|
|
byte *p;
|
|
|
|
unsigned int ndatabits;
|
2011-01-26 17:17:43 +01:00
|
|
|
|
2010-09-06 19:57:42 +00:00
|
|
|
assert (gcry_mpi_get_flag (pk->pkey[npkey], GCRYMPI_FLAG_OPAQUE));
|
|
|
|
p = gcry_mpi_get_opaque (pk->pkey[npkey], &ndatabits);
|
|
|
|
iobuf_write (a, p, (ndatabits+7)/8 );
|
|
|
|
}
|
2011-01-26 17:17:43 +01:00
|
|
|
else if (ski->is_protected)
|
2010-09-06 19:57:42 +00:00
|
|
|
{
|
|
|
|
/* The secret key is protected the old v4 way. */
|
2011-01-26 17:17:43 +01:00
|
|
|
for ( ; i < nskey; i++ )
|
2010-09-06 19:57:42 +00:00
|
|
|
{
|
|
|
|
byte *p;
|
|
|
|
unsigned int ndatabits;
|
2011-01-26 17:17:43 +01:00
|
|
|
|
2010-09-06 19:57:42 +00:00
|
|
|
assert (gcry_mpi_get_flag (pk->pkey[i], GCRYMPI_FLAG_OPAQUE));
|
|
|
|
p = gcry_mpi_get_opaque (pk->pkey[i], &ndatabits);
|
|
|
|
iobuf_write (a, p, (ndatabits+7)/8);
|
|
|
|
}
|
|
|
|
write_16 (a, ski->csum );
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
/* Non-protected key. */
|
|
|
|
for ( ; i < nskey; i++ )
|
2011-01-31 15:44:24 +01:00
|
|
|
if ( (err = gpg_mpi_write (a, pk->pkey[i])))
|
2010-09-06 19:57:42 +00:00
|
|
|
goto leave;
|
|
|
|
write_16 (a, ski->csum );
|
2003-06-05 07:14:21 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2006-10-18 14:28:52 +00:00
|
|
|
leave:
|
2010-09-06 19:57:42 +00:00
|
|
|
if (!err)
|
2006-10-18 14:28:52 +00:00
|
|
|
{
|
|
|
|
/* Build the header of the packet - which we must do after
|
|
|
|
writing all the other stuff, so that we know the length of
|
|
|
|
the packet */
|
2010-09-06 19:57:42 +00:00
|
|
|
write_header2 (out, ctb, iobuf_get_temp_length(a), pk->hdrbytes);
|
|
|
|
/* And finally write it out to the real stream. */
|
|
|
|
err = iobuf_write_temp (out, a);
|
2006-10-18 14:28:52 +00:00
|
|
|
}
|
2003-06-05 07:14:21 +00:00
|
|
|
|
2010-09-06 19:57:42 +00:00
|
|
|
iobuf_close (a); /* Close the temporary buffer */
|
|
|
|
return err;
|
2003-06-05 07:14:21 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
2006-04-19 11:26:11 +00:00
|
|
|
do_symkey_enc( IOBUF out, int ctb, PKT_symkey_enc *enc )
|
2003-06-05 07:14:21 +00:00
|
|
|
{
|
|
|
|
int rc = 0;
|
2006-04-19 11:26:11 +00:00
|
|
|
IOBUF a = iobuf_temp();
|
2003-06-05 07:14:21 +00:00
|
|
|
|
|
|
|
assert( enc->version == 4 );
|
|
|
|
switch( enc->s2k.mode ) {
|
|
|
|
case 0: case 1: case 3: break;
|
|
|
|
default: log_bug("do_symkey_enc: s2k=%d\n", enc->s2k.mode );
|
|
|
|
}
|
|
|
|
iobuf_put( a, enc->version );
|
|
|
|
iobuf_put( a, enc->cipher_algo );
|
|
|
|
iobuf_put( a, enc->s2k.mode );
|
|
|
|
iobuf_put( a, enc->s2k.hash_algo );
|
|
|
|
if( enc->s2k.mode == 1 || enc->s2k.mode == 3 ) {
|
|
|
|
iobuf_write(a, enc->s2k.salt, 8 );
|
|
|
|
if( enc->s2k.mode == 3 )
|
|
|
|
iobuf_put(a, enc->s2k.count);
|
|
|
|
}
|
|
|
|
if( enc->seskeylen )
|
|
|
|
iobuf_write(a, enc->seskey, enc->seskeylen );
|
|
|
|
|
|
|
|
write_header(out, ctb, iobuf_get_temp_length(a) );
|
2006-04-19 11:26:11 +00:00
|
|
|
rc = iobuf_write_temp( out, a );
|
2003-06-05 07:14:21 +00:00
|
|
|
|
|
|
|
iobuf_close(a);
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static int
|
2006-04-19 11:26:11 +00:00
|
|
|
do_pubkey_enc( IOBUF out, int ctb, PKT_pubkey_enc *enc )
|
2003-06-05 07:14:21 +00:00
|
|
|
{
|
2006-10-18 14:28:52 +00:00
|
|
|
int rc = 0;
|
|
|
|
int n, i;
|
|
|
|
IOBUF a = iobuf_temp();
|
2011-01-26 17:17:43 +01:00
|
|
|
|
2006-10-18 14:28:52 +00:00
|
|
|
write_version( a, ctb );
|
2011-01-26 17:17:43 +01:00
|
|
|
if ( enc->throw_keyid )
|
2006-10-18 14:28:52 +00:00
|
|
|
{
|
|
|
|
write_32(a, 0 ); /* Don't tell Eve who can decrypt the message. */
|
|
|
|
write_32(a, 0 );
|
2003-06-05 07:14:21 +00:00
|
|
|
}
|
2006-10-18 14:28:52 +00:00
|
|
|
else
|
|
|
|
{
|
|
|
|
write_32(a, enc->keyid[0] );
|
|
|
|
write_32(a, enc->keyid[1] );
|
2003-06-05 07:14:21 +00:00
|
|
|
}
|
2006-10-18 14:28:52 +00:00
|
|
|
iobuf_put(a,enc->pubkey_algo );
|
|
|
|
n = pubkey_get_nenc( enc->pubkey_algo );
|
|
|
|
if ( !n )
|
|
|
|
write_fake_data( a, enc->data[0] );
|
2011-01-05 17:33:17 -08:00
|
|
|
|
2011-01-31 09:27:06 +01:00
|
|
|
for (i=0; i < n && !rc ; i++ )
|
2013-11-15 08:59:45 +01:00
|
|
|
{
|
|
|
|
if (enc->pubkey_algo == PUBKEY_ALGO_ECDH && i == 1)
|
|
|
|
rc = gpg_mpi_write_nohdr (a, enc->data[i]);
|
|
|
|
else
|
|
|
|
rc = gpg_mpi_write (a, enc->data[i]);
|
|
|
|
}
|
2006-10-18 14:28:52 +00:00
|
|
|
|
|
|
|
if (!rc)
|
|
|
|
{
|
2011-01-21 12:00:57 +01:00
|
|
|
write_header (out, ctb, iobuf_get_temp_length(a) );
|
|
|
|
rc = iobuf_write_temp (out, a);
|
2006-10-18 14:28:52 +00:00
|
|
|
}
|
|
|
|
iobuf_close(a);
|
|
|
|
return rc;
|
2003-06-05 07:14:21 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static u32
|
|
|
|
calc_plaintext( PKT_plaintext *pt )
|
|
|
|
{
|
2006-04-19 11:26:11 +00:00
|
|
|
/* Truncate namelen to the maximum 255 characters. Note this means
|
|
|
|
that a function that calls build_packet with an illegal literal
|
|
|
|
packet will get it back legalized. */
|
|
|
|
|
|
|
|
if(pt->namelen>255)
|
|
|
|
pt->namelen=255;
|
|
|
|
|
|
|
|
return pt->len? (1 + 1 + pt->namelen + 4 + pt->len) : 0;
|
2003-06-05 07:14:21 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
2006-04-19 11:26:11 +00:00
|
|
|
do_plaintext( IOBUF out, int ctb, PKT_plaintext *pt )
|
2003-06-05 07:14:21 +00:00
|
|
|
{
|
|
|
|
int i, rc = 0;
|
|
|
|
u32 n;
|
|
|
|
byte buf[1000]; /* this buffer has the plaintext! */
|
|
|
|
int nbytes;
|
|
|
|
|
|
|
|
write_header(out, ctb, calc_plaintext( pt ) );
|
|
|
|
iobuf_put(out, pt->mode );
|
|
|
|
iobuf_put(out, pt->namelen );
|
|
|
|
for(i=0; i < pt->namelen; i++ )
|
|
|
|
iobuf_put(out, pt->name[i] );
|
2006-04-19 11:26:11 +00:00
|
|
|
rc = write_32(out, pt->timestamp );
|
2011-01-26 17:17:43 +01:00
|
|
|
if (rc)
|
2006-04-19 11:26:11 +00:00
|
|
|
return rc;
|
2003-06-05 07:14:21 +00:00
|
|
|
|
|
|
|
n = 0;
|
|
|
|
while( (nbytes=iobuf_read(pt->buf, buf, 1000)) != -1 ) {
|
2006-04-19 11:26:11 +00:00
|
|
|
rc = iobuf_write (out, buf, nbytes);
|
|
|
|
if (rc)
|
|
|
|
break;
|
|
|
|
n += nbytes;
|
2003-06-05 07:14:21 +00:00
|
|
|
}
|
|
|
|
wipememory(buf,1000); /* burn the buffer */
|
2006-04-19 11:26:11 +00:00
|
|
|
if( (ctb&0x40) && !pt->len )
|
|
|
|
iobuf_set_partial_block_mode(out, 0 ); /* turn off partial */
|
|
|
|
if( pt->len && n != pt->len )
|
|
|
|
log_error("do_plaintext(): wrote %lu bytes but expected %lu bytes\n",
|
|
|
|
(ulong)n, (ulong)pt->len );
|
2003-06-05 07:14:21 +00:00
|
|
|
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
static int
|
2006-04-19 11:26:11 +00:00
|
|
|
do_encrypted( IOBUF out, int ctb, PKT_encrypted *ed )
|
2003-06-05 07:14:21 +00:00
|
|
|
{
|
|
|
|
int rc = 0;
|
|
|
|
u32 n;
|
|
|
|
|
|
|
|
n = ed->len ? (ed->len + ed->extralen) : 0;
|
|
|
|
write_header(out, ctb, n );
|
|
|
|
|
|
|
|
/* This is all. The caller has to write the real data */
|
|
|
|
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
2006-04-19 11:26:11 +00:00
|
|
|
do_encrypted_mdc( IOBUF out, int ctb, PKT_encrypted *ed )
|
2003-06-05 07:14:21 +00:00
|
|
|
{
|
|
|
|
int rc = 0;
|
|
|
|
u32 n;
|
|
|
|
|
|
|
|
assert( ed->mdc_method );
|
|
|
|
|
|
|
|
/* Take version number and the following MDC packet in account. */
|
|
|
|
n = ed->len ? (ed->len + ed->extralen + 1 + 22) : 0;
|
|
|
|
write_header(out, ctb, n );
|
|
|
|
iobuf_put(out, 1 ); /* version */
|
|
|
|
|
|
|
|
/* This is all. The caller has to write the real data */
|
|
|
|
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static int
|
2006-04-19 11:26:11 +00:00
|
|
|
do_compressed( IOBUF out, int ctb, PKT_compressed *cd )
|
2003-06-05 07:14:21 +00:00
|
|
|
{
|
|
|
|
int rc = 0;
|
|
|
|
|
2008-06-13 16:18:59 +00:00
|
|
|
/* We must use the old convention and don't use blockmode for the
|
2003-06-05 07:14:21 +00:00
|
|
|
sake of PGP 2 compatibility. However if the new_ctb flag was
|
|
|
|
set, CTB is already formatted as new style and write_header2
|
|
|
|
does create a partial length encoding using new the new
|
|
|
|
style. */
|
2006-04-19 11:26:11 +00:00
|
|
|
write_header2(out, ctb, 0, 0);
|
2003-06-05 07:14:21 +00:00
|
|
|
iobuf_put(out, cd->algorithm );
|
|
|
|
|
|
|
|
/* This is all. The caller has to write the real data */
|
|
|
|
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/****************
|
|
|
|
* Delete all subpackets of type REQTYPE and return a bool whether a packet
|
|
|
|
* was deleted.
|
|
|
|
*/
|
|
|
|
int
|
|
|
|
delete_sig_subpkt (subpktarea_t *area, sigsubpkttype_t reqtype )
|
|
|
|
{
|
|
|
|
int buflen;
|
|
|
|
sigsubpkttype_t type;
|
|
|
|
byte *buffer, *bufstart;
|
|
|
|
size_t n;
|
|
|
|
size_t unused = 0;
|
|
|
|
int okay = 0;
|
|
|
|
|
|
|
|
if( !area )
|
|
|
|
return 0;
|
|
|
|
buflen = area->len;
|
|
|
|
buffer = area->data;
|
|
|
|
for(;;) {
|
|
|
|
if( !buflen ) {
|
|
|
|
okay = 1;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
bufstart = buffer;
|
|
|
|
n = *buffer++; buflen--;
|
|
|
|
if( n == 255 ) {
|
|
|
|
if( buflen < 4 )
|
|
|
|
break;
|
|
|
|
n = (buffer[0] << 24) | (buffer[1] << 16)
|
|
|
|
| (buffer[2] << 8) | buffer[3];
|
|
|
|
buffer += 4;
|
|
|
|
buflen -= 4;
|
|
|
|
}
|
|
|
|
else if( n >= 192 ) {
|
|
|
|
if( buflen < 2 )
|
|
|
|
break;
|
|
|
|
n = (( n - 192 ) << 8) + *buffer + 192;
|
|
|
|
buffer++;
|
|
|
|
buflen--;
|
|
|
|
}
|
|
|
|
if( buflen < n )
|
|
|
|
break;
|
2011-01-26 17:17:43 +01:00
|
|
|
|
2003-06-05 07:14:21 +00:00
|
|
|
type = *buffer & 0x7f;
|
|
|
|
if( type == reqtype ) {
|
|
|
|
buffer++;
|
|
|
|
buflen--;
|
|
|
|
n--;
|
|
|
|
if( n > buflen )
|
|
|
|
break;
|
|
|
|
buffer += n; /* point to next subpkt */
|
|
|
|
buflen -= n;
|
|
|
|
memmove (bufstart, buffer, buflen); /* shift */
|
|
|
|
unused += buffer - bufstart;
|
|
|
|
buffer = bufstart;
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
buffer += n; buflen -=n;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!okay)
|
|
|
|
log_error ("delete_subpkt: buffer shorter than subpacket\n");
|
|
|
|
assert (unused <= area->len);
|
|
|
|
area->len -= unused;
|
|
|
|
return !!unused;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/****************
|
|
|
|
* Create or update a signature subpacket for SIG of TYPE. This
|
|
|
|
* functions knows where to put the data (hashed or unhashed). The
|
|
|
|
* function may move data from the unhashed part to the hashed one.
|
|
|
|
* Note: All pointers into sig->[un]hashed (e.g. returned by
|
|
|
|
* parse_sig_subpkt) are not valid after a call to this function. The
|
|
|
|
* data to put into the subpaket should be in a buffer with a length
|
2011-01-26 17:17:43 +01:00
|
|
|
* of buflen.
|
2003-06-05 07:14:21 +00:00
|
|
|
*/
|
|
|
|
void
|
|
|
|
build_sig_subpkt (PKT_signature *sig, sigsubpkttype_t type,
|
|
|
|
const byte *buffer, size_t buflen )
|
|
|
|
{
|
|
|
|
byte *p;
|
|
|
|
int critical, hashed;
|
|
|
|
subpktarea_t *oldarea, *newarea;
|
|
|
|
size_t nlen, n, n0;
|
|
|
|
|
|
|
|
critical = (type & SIGSUBPKT_FLAG_CRITICAL);
|
|
|
|
type &= ~SIGSUBPKT_FLAG_CRITICAL;
|
|
|
|
|
|
|
|
/* Sanity check buffer sizes */
|
|
|
|
if(parse_one_sig_subpkt(buffer,buflen,type)<0)
|
|
|
|
BUG();
|
|
|
|
|
|
|
|
switch(type)
|
|
|
|
{
|
|
|
|
case SIGSUBPKT_NOTATION:
|
|
|
|
case SIGSUBPKT_POLICY:
|
|
|
|
case SIGSUBPKT_REV_KEY:
|
2006-04-19 11:26:11 +00:00
|
|
|
case SIGSUBPKT_SIGNATURE:
|
2003-06-05 07:14:21 +00:00
|
|
|
/* we do allow multiple subpackets */
|
|
|
|
break;
|
|
|
|
|
|
|
|
default:
|
|
|
|
/* we don't allow multiple subpackets */
|
|
|
|
delete_sig_subpkt(sig->hashed,type);
|
|
|
|
delete_sig_subpkt(sig->unhashed,type);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Any special magic that needs to be done for this type so the
|
|
|
|
packet doesn't need to be reparsed? */
|
|
|
|
switch(type)
|
|
|
|
{
|
|
|
|
case SIGSUBPKT_NOTATION:
|
|
|
|
sig->flags.notation=1;
|
|
|
|
break;
|
|
|
|
|
|
|
|
case SIGSUBPKT_POLICY:
|
|
|
|
sig->flags.policy_url=1;
|
|
|
|
break;
|
|
|
|
|
2003-09-23 17:48:33 +00:00
|
|
|
case SIGSUBPKT_PREF_KS:
|
|
|
|
sig->flags.pref_ks=1;
|
|
|
|
break;
|
|
|
|
|
2003-06-05 07:14:21 +00:00
|
|
|
case SIGSUBPKT_EXPORTABLE:
|
|
|
|
if(buffer[0])
|
|
|
|
sig->flags.exportable=1;
|
|
|
|
else
|
|
|
|
sig->flags.exportable=0;
|
|
|
|
break;
|
|
|
|
|
|
|
|
case SIGSUBPKT_REVOCABLE:
|
|
|
|
if(buffer[0])
|
|
|
|
sig->flags.revocable=1;
|
|
|
|
else
|
|
|
|
sig->flags.revocable=0;
|
|
|
|
break;
|
|
|
|
|
|
|
|
case SIGSUBPKT_TRUST:
|
|
|
|
sig->trust_depth=buffer[0];
|
|
|
|
sig->trust_value=buffer[1];
|
|
|
|
break;
|
|
|
|
|
|
|
|
case SIGSUBPKT_REGEXP:
|
|
|
|
sig->trust_regexp=buffer;
|
|
|
|
break;
|
|
|
|
|
|
|
|
/* This should never happen since we don't currently allow
|
|
|
|
creating such a subpacket, but just in case... */
|
|
|
|
case SIGSUBPKT_SIG_EXPIRE:
|
|
|
|
if(buffer_to_u32(buffer)+sig->timestamp<=make_timestamp())
|
|
|
|
sig->flags.expired=1;
|
|
|
|
else
|
|
|
|
sig->flags.expired=0;
|
|
|
|
break;
|
|
|
|
|
|
|
|
default:
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
if( (buflen+1) >= 8384 )
|
|
|
|
nlen = 5; /* write 5 byte length header */
|
|
|
|
else if( (buflen+1) >= 192 )
|
|
|
|
nlen = 2; /* write 2 byte length header */
|
|
|
|
else
|
|
|
|
nlen = 1; /* just a 1 byte length header */
|
|
|
|
|
2006-04-19 11:26:11 +00:00
|
|
|
switch( type )
|
|
|
|
{
|
2003-06-05 07:14:21 +00:00
|
|
|
/* The issuer being unhashed is a historical oddity. It
|
|
|
|
should work equally as well hashed. Of course, if even an
|
|
|
|
unhashed issuer is tampered with, it makes it awfully hard
|
|
|
|
to verify the sig... */
|
|
|
|
case SIGSUBPKT_ISSUER:
|
2006-04-19 11:26:11 +00:00
|
|
|
case SIGSUBPKT_SIGNATURE:
|
2003-06-05 07:14:21 +00:00
|
|
|
hashed = 0;
|
|
|
|
break;
|
2011-01-26 17:17:43 +01:00
|
|
|
default:
|
2003-06-05 07:14:21 +00:00
|
|
|
hashed = 1;
|
|
|
|
break;
|
2006-04-19 11:26:11 +00:00
|
|
|
}
|
2003-06-05 07:14:21 +00:00
|
|
|
|
|
|
|
if( critical )
|
|
|
|
type |= SIGSUBPKT_FLAG_CRITICAL;
|
|
|
|
|
|
|
|
oldarea = hashed? sig->hashed : sig->unhashed;
|
|
|
|
|
|
|
|
/* Calculate new size of the area and allocate */
|
|
|
|
n0 = oldarea? oldarea->len : 0;
|
|
|
|
n = n0 + nlen + 1 + buflen; /* length, type, buffer */
|
|
|
|
if (oldarea && n <= oldarea->size) { /* fits into the unused space */
|
|
|
|
newarea = oldarea;
|
|
|
|
/*log_debug ("updating area for type %d\n", type );*/
|
|
|
|
}
|
|
|
|
else if (oldarea) {
|
2003-06-18 19:56:13 +00:00
|
|
|
newarea = xrealloc (oldarea, sizeof (*newarea) + n - 1);
|
2003-06-05 07:14:21 +00:00
|
|
|
newarea->size = n;
|
|
|
|
/*log_debug ("reallocating area for type %d\n", type );*/
|
|
|
|
}
|
|
|
|
else {
|
2003-06-18 19:56:13 +00:00
|
|
|
newarea = xmalloc (sizeof (*newarea) + n - 1);
|
2003-06-05 07:14:21 +00:00
|
|
|
newarea->size = n;
|
|
|
|
/*log_debug ("allocating area for type %d\n", type );*/
|
|
|
|
}
|
|
|
|
newarea->len = n;
|
|
|
|
|
|
|
|
p = newarea->data + n0;
|
|
|
|
if (nlen == 5) {
|
|
|
|
*p++ = 255;
|
|
|
|
*p++ = (buflen+1) >> 24;
|
|
|
|
*p++ = (buflen+1) >> 16;
|
|
|
|
*p++ = (buflen+1) >> 8;
|
|
|
|
*p++ = (buflen+1);
|
|
|
|
*p++ = type;
|
|
|
|
memcpy (p, buffer, buflen);
|
|
|
|
}
|
|
|
|
else if (nlen == 2) {
|
|
|
|
*p++ = (buflen+1-192) / 256 + 192;
|
|
|
|
*p++ = (buflen+1-192) % 256;
|
|
|
|
*p++ = type;
|
|
|
|
memcpy (p, buffer, buflen);
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
*p++ = buflen+1;
|
|
|
|
*p++ = type;
|
|
|
|
memcpy (p, buffer, buflen);
|
|
|
|
}
|
|
|
|
|
2011-01-26 17:17:43 +01:00
|
|
|
if (hashed)
|
2003-06-05 07:14:21 +00:00
|
|
|
sig->hashed = newarea;
|
|
|
|
else
|
|
|
|
sig->unhashed = newarea;
|
|
|
|
}
|
|
|
|
|
|
|
|
/****************
|
|
|
|
* Put all the required stuff from SIG into subpackets of sig.
|
|
|
|
* Hmmm, should we delete those subpackets which are in a wrong area?
|
|
|
|
*/
|
|
|
|
void
|
|
|
|
build_sig_subpkt_from_sig( PKT_signature *sig )
|
|
|
|
{
|
|
|
|
u32 u;
|
|
|
|
byte buf[8];
|
|
|
|
|
|
|
|
u = sig->keyid[0];
|
|
|
|
buf[0] = (u >> 24) & 0xff;
|
|
|
|
buf[1] = (u >> 16) & 0xff;
|
|
|
|
buf[2] = (u >> 8) & 0xff;
|
|
|
|
buf[3] = u & 0xff;
|
|
|
|
u = sig->keyid[1];
|
|
|
|
buf[4] = (u >> 24) & 0xff;
|
|
|
|
buf[5] = (u >> 16) & 0xff;
|
|
|
|
buf[6] = (u >> 8) & 0xff;
|
|
|
|
buf[7] = u & 0xff;
|
|
|
|
build_sig_subpkt( sig, SIGSUBPKT_ISSUER, buf, 8 );
|
|
|
|
|
|
|
|
u = sig->timestamp;
|
|
|
|
buf[0] = (u >> 24) & 0xff;
|
|
|
|
buf[1] = (u >> 16) & 0xff;
|
|
|
|
buf[2] = (u >> 8) & 0xff;
|
|
|
|
buf[3] = u & 0xff;
|
|
|
|
build_sig_subpkt( sig, SIGSUBPKT_SIG_CREATED, buf, 4 );
|
|
|
|
|
|
|
|
if(sig->expiredate)
|
|
|
|
{
|
|
|
|
if(sig->expiredate>sig->timestamp)
|
|
|
|
u=sig->expiredate-sig->timestamp;
|
|
|
|
else
|
2006-06-27 14:30:59 +00:00
|
|
|
u=1; /* A 1-second expiration time is the shortest one
|
|
|
|
OpenPGP has */
|
2003-06-05 07:14:21 +00:00
|
|
|
|
|
|
|
buf[0] = (u >> 24) & 0xff;
|
|
|
|
buf[1] = (u >> 16) & 0xff;
|
|
|
|
buf[2] = (u >> 8) & 0xff;
|
|
|
|
buf[3] = u & 0xff;
|
|
|
|
|
|
|
|
/* Mark this CRITICAL, so if any implementation doesn't
|
|
|
|
understand sigs that can expire, it'll just disregard this
|
|
|
|
sig altogether. */
|
|
|
|
|
|
|
|
build_sig_subpkt( sig, SIGSUBPKT_SIG_EXPIRE | SIGSUBPKT_FLAG_CRITICAL,
|
|
|
|
buf, 4 );
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
build_attribute_subpkt(PKT_user_id *uid,byte type,
|
|
|
|
const void *buf,u32 buflen,
|
|
|
|
const void *header,u32 headerlen)
|
|
|
|
{
|
|
|
|
byte *attrib;
|
|
|
|
int idx;
|
|
|
|
|
|
|
|
if(1+headerlen+buflen>8383)
|
|
|
|
idx=5;
|
|
|
|
else if(1+headerlen+buflen>191)
|
|
|
|
idx=2;
|
|
|
|
else
|
|
|
|
idx=1;
|
|
|
|
|
|
|
|
/* realloc uid->attrib_data to the right size */
|
|
|
|
|
2003-06-18 19:56:13 +00:00
|
|
|
uid->attrib_data=xrealloc(uid->attrib_data,
|
2003-06-05 07:14:21 +00:00
|
|
|
uid->attrib_len+idx+1+headerlen+buflen);
|
|
|
|
|
|
|
|
attrib=&uid->attrib_data[uid->attrib_len];
|
|
|
|
|
|
|
|
if(idx==5)
|
|
|
|
{
|
|
|
|
attrib[0]=255;
|
|
|
|
attrib[1]=(1+headerlen+buflen) >> 24;
|
|
|
|
attrib[2]=(1+headerlen+buflen) >> 16;
|
|
|
|
attrib[3]=(1+headerlen+buflen) >> 8;
|
|
|
|
attrib[4]=1+headerlen+buflen;
|
|
|
|
}
|
|
|
|
else if(idx==2)
|
|
|
|
{
|
|
|
|
attrib[0]=(1+headerlen+buflen-192) / 256 + 192;
|
|
|
|
attrib[1]=(1+headerlen+buflen-192) % 256;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
attrib[0]=1+headerlen+buflen; /* Good luck finding a JPEG this small! */
|
|
|
|
|
|
|
|
attrib[idx++]=type;
|
|
|
|
|
|
|
|
/* Tack on our data at the end */
|
|
|
|
|
|
|
|
if(headerlen>0)
|
|
|
|
memcpy(&attrib[idx],header,headerlen);
|
|
|
|
memcpy(&attrib[idx+headerlen],buf,buflen);
|
|
|
|
uid->attrib_len+=idx+headerlen+buflen;
|
|
|
|
}
|
|
|
|
|
2006-04-19 11:26:11 +00:00
|
|
|
struct notation *
|
|
|
|
string_to_notation(const char *string,int is_utf8)
|
|
|
|
{
|
|
|
|
const char *s;
|
|
|
|
int saw_at=0;
|
|
|
|
struct notation *notation;
|
|
|
|
|
|
|
|
notation=xmalloc_clear(sizeof(*notation));
|
|
|
|
|
|
|
|
if(*string=='-')
|
|
|
|
{
|
|
|
|
notation->flags.ignore=1;
|
|
|
|
string++;
|
|
|
|
}
|
|
|
|
|
|
|
|
if(*string=='!')
|
|
|
|
{
|
|
|
|
notation->flags.critical=1;
|
|
|
|
string++;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* If and when the IETF assigns some official name tags, we'll have
|
|
|
|
to add them here. */
|
|
|
|
|
|
|
|
for( s=string ; *s != '='; s++ )
|
|
|
|
{
|
|
|
|
if( *s=='@')
|
|
|
|
saw_at++;
|
|
|
|
|
|
|
|
/* -notationname is legal without an = sign */
|
|
|
|
if(!*s && notation->flags.ignore)
|
|
|
|
break;
|
|
|
|
|
|
|
|
if( !*s || !isascii (*s) || (!isgraph(*s) && !isspace(*s)) )
|
|
|
|
{
|
|
|
|
log_error(_("a notation name must have only printable characters"
|
|
|
|
" or spaces, and end with an '='\n") );
|
|
|
|
goto fail;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
notation->name=xmalloc((s-string)+1);
|
|
|
|
strncpy(notation->name,string,s-string);
|
|
|
|
notation->name[s-string]='\0';
|
|
|
|
|
|
|
|
if(!saw_at && !opt.expert)
|
|
|
|
{
|
|
|
|
log_error(_("a user notation name must contain the '@' character\n"));
|
|
|
|
goto fail;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (saw_at > 1)
|
|
|
|
{
|
|
|
|
log_error(_("a notation name must not contain more than"
|
|
|
|
" one '@' character\n"));
|
|
|
|
goto fail;
|
|
|
|
}
|
|
|
|
|
|
|
|
if(*s)
|
|
|
|
{
|
|
|
|
const char *i=s+1;
|
|
|
|
int highbit=0;
|
|
|
|
|
|
|
|
/* we only support printable text - therefore we enforce the use
|
|
|
|
of only printable characters (an empty value is valid) */
|
|
|
|
for(s++; *s ; s++ )
|
|
|
|
{
|
|
|
|
if ( !isascii (*s) )
|
|
|
|
highbit=1;
|
|
|
|
else if (iscntrl(*s))
|
|
|
|
{
|
|
|
|
log_error(_("a notation value must not use any"
|
|
|
|
" control characters\n"));
|
|
|
|
goto fail;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if(!highbit || is_utf8)
|
|
|
|
notation->value=xstrdup(i);
|
|
|
|
else
|
|
|
|
notation->value=native_to_utf8(i);
|
|
|
|
}
|
|
|
|
|
|
|
|
return notation;
|
|
|
|
|
|
|
|
fail:
|
|
|
|
free_notation(notation);
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
struct notation *
|
|
|
|
sig_to_notation(PKT_signature *sig)
|
|
|
|
{
|
|
|
|
const byte *p;
|
|
|
|
size_t len;
|
|
|
|
int seq=0,crit;
|
|
|
|
struct notation *list=NULL;
|
|
|
|
|
|
|
|
while((p=enum_sig_subpkt(sig->hashed,SIGSUBPKT_NOTATION,&len,&seq,&crit)))
|
|
|
|
{
|
|
|
|
int n1,n2;
|
|
|
|
struct notation *n=NULL;
|
|
|
|
|
|
|
|
if(len<8)
|
|
|
|
{
|
|
|
|
log_info(_("WARNING: invalid notation data found\n"));
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
n1=(p[4]<<8)|p[5];
|
|
|
|
n2=(p[6]<<8)|p[7];
|
|
|
|
|
|
|
|
if(8+n1+n2!=len)
|
|
|
|
{
|
|
|
|
log_info(_("WARNING: invalid notation data found\n"));
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
n=xmalloc_clear(sizeof(*n));
|
|
|
|
n->name=xmalloc(n1+1);
|
|
|
|
|
|
|
|
memcpy(n->name,&p[8],n1);
|
|
|
|
n->name[n1]='\0';
|
|
|
|
|
|
|
|
if(p[0]&0x80)
|
|
|
|
{
|
|
|
|
n->value=xmalloc(n2+1);
|
|
|
|
memcpy(n->value,&p[8+n1],n2);
|
|
|
|
n->value[n2]='\0';
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
n->bdat=xmalloc(n2);
|
|
|
|
n->blen=n2;
|
|
|
|
memcpy(n->bdat,&p[8+n1],n2);
|
|
|
|
|
|
|
|
n->value=xmalloc(2+strlen(_("not human readable"))+2+1);
|
|
|
|
strcpy(n->value,"[ ");
|
|
|
|
strcat(n->value,_("not human readable"));
|
|
|
|
strcat(n->value," ]");
|
|
|
|
}
|
|
|
|
|
|
|
|
n->flags.critical=crit;
|
|
|
|
|
|
|
|
n->next=list;
|
|
|
|
list=n;
|
|
|
|
}
|
|
|
|
|
|
|
|
return list;
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
free_notation(struct notation *notation)
|
|
|
|
{
|
|
|
|
while(notation)
|
|
|
|
{
|
|
|
|
struct notation *n=notation;
|
|
|
|
|
|
|
|
xfree(n->name);
|
|
|
|
xfree(n->value);
|
|
|
|
xfree(n->altvalue);
|
|
|
|
xfree(n->bdat);
|
|
|
|
notation=n->next;
|
|
|
|
xfree(n);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2003-06-05 07:14:21 +00:00
|
|
|
static int
|
2006-04-19 11:26:11 +00:00
|
|
|
do_signature( IOBUF out, int ctb, PKT_signature *sig )
|
2003-06-05 07:14:21 +00:00
|
|
|
{
|
2006-10-18 14:28:52 +00:00
|
|
|
int rc = 0;
|
|
|
|
int n, i;
|
|
|
|
IOBUF a = iobuf_temp();
|
2003-06-05 07:14:21 +00:00
|
|
|
|
2006-10-18 14:28:52 +00:00
|
|
|
if ( !sig->version )
|
|
|
|
iobuf_put( a, 3 );
|
|
|
|
else
|
|
|
|
iobuf_put( a, sig->version );
|
|
|
|
if ( sig->version < 4 )
|
|
|
|
iobuf_put (a, 5 ); /* Constant */
|
|
|
|
iobuf_put (a, sig->sig_class );
|
2011-01-26 17:17:43 +01:00
|
|
|
if ( sig->version < 4 )
|
2006-10-18 14:28:52 +00:00
|
|
|
{
|
|
|
|
write_32(a, sig->timestamp );
|
|
|
|
write_32(a, sig->keyid[0] );
|
|
|
|
write_32(a, sig->keyid[1] );
|
2003-06-05 07:14:21 +00:00
|
|
|
}
|
2006-10-18 14:28:52 +00:00
|
|
|
iobuf_put(a, sig->pubkey_algo );
|
|
|
|
iobuf_put(a, sig->digest_algo );
|
2011-01-26 17:17:43 +01:00
|
|
|
if ( sig->version >= 4 )
|
2006-10-18 14:28:52 +00:00
|
|
|
{
|
|
|
|
size_t nn;
|
|
|
|
/* Timestamp and keyid must have been packed into the subpackets
|
|
|
|
prior to the call of this function, because these subpackets
|
|
|
|
are hashed. */
|
|
|
|
nn = sig->hashed? sig->hashed->len : 0;
|
|
|
|
write_16(a, nn);
|
|
|
|
if (nn)
|
|
|
|
iobuf_write( a, sig->hashed->data, nn );
|
|
|
|
nn = sig->unhashed? sig->unhashed->len : 0;
|
|
|
|
write_16(a, nn);
|
|
|
|
if (nn)
|
|
|
|
iobuf_write( a, sig->unhashed->data, nn );
|
|
|
|
}
|
|
|
|
iobuf_put(a, sig->digest_start[0] );
|
|
|
|
iobuf_put(a, sig->digest_start[1] );
|
|
|
|
n = pubkey_get_nsig( sig->pubkey_algo );
|
|
|
|
if ( !n )
|
|
|
|
write_fake_data( a, sig->data[0] );
|
|
|
|
for (i=0; i < n && !rc ; i++ )
|
2011-01-31 15:44:24 +01:00
|
|
|
rc = gpg_mpi_write (a, sig->data[i] );
|
2006-10-18 14:28:52 +00:00
|
|
|
|
|
|
|
if (!rc)
|
|
|
|
{
|
|
|
|
if ( is_RSA(sig->pubkey_algo) && sig->version < 4 )
|
|
|
|
write_sign_packet_header(out, ctb, iobuf_get_temp_length(a) );
|
|
|
|
else
|
|
|
|
write_header(out, ctb, iobuf_get_temp_length(a) );
|
|
|
|
rc = iobuf_write_temp( out, a );
|
2003-06-05 07:14:21 +00:00
|
|
|
}
|
|
|
|
|
2006-10-18 14:28:52 +00:00
|
|
|
iobuf_close(a);
|
|
|
|
return rc;
|
2003-06-05 07:14:21 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static int
|
2006-04-19 11:26:11 +00:00
|
|
|
do_onepass_sig( IOBUF out, int ctb, PKT_onepass_sig *ops )
|
2003-06-05 07:14:21 +00:00
|
|
|
{
|
|
|
|
int rc = 0;
|
2006-04-19 11:26:11 +00:00
|
|
|
IOBUF a = iobuf_temp();
|
2003-06-05 07:14:21 +00:00
|
|
|
|
|
|
|
write_version( a, ctb );
|
|
|
|
iobuf_put(a, ops->sig_class );
|
|
|
|
iobuf_put(a, ops->digest_algo );
|
|
|
|
iobuf_put(a, ops->pubkey_algo );
|
|
|
|
write_32(a, ops->keyid[0] );
|
|
|
|
write_32(a, ops->keyid[1] );
|
|
|
|
iobuf_put(a, ops->last );
|
|
|
|
|
|
|
|
write_header(out, ctb, iobuf_get_temp_length(a) );
|
2006-04-19 11:26:11 +00:00
|
|
|
rc = iobuf_write_temp( out, a );
|
2003-06-05 07:14:21 +00:00
|
|
|
|
|
|
|
iobuf_close(a);
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static int
|
2006-04-19 11:26:11 +00:00
|
|
|
write_16(IOBUF out, u16 a)
|
2003-06-05 07:14:21 +00:00
|
|
|
{
|
|
|
|
iobuf_put(out, a>>8);
|
2006-04-19 11:26:11 +00:00
|
|
|
if( iobuf_put(out,a) )
|
|
|
|
return -1;
|
|
|
|
return 0;
|
2003-06-05 07:14:21 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
2006-04-19 11:26:11 +00:00
|
|
|
write_32(IOBUF out, u32 a)
|
2003-06-05 07:14:21 +00:00
|
|
|
{
|
|
|
|
iobuf_put(out, a>> 24);
|
|
|
|
iobuf_put(out, a>> 16);
|
|
|
|
iobuf_put(out, a>> 8);
|
2006-04-19 11:26:11 +00:00
|
|
|
return iobuf_put(out, a);
|
2003-06-05 07:14:21 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/****************
|
|
|
|
* calculate the length of a header
|
|
|
|
*/
|
|
|
|
static int
|
|
|
|
calc_header_length( u32 len, int new_ctb )
|
|
|
|
{
|
|
|
|
if( !len )
|
|
|
|
return 1; /* only the ctb */
|
|
|
|
|
|
|
|
if( new_ctb ) {
|
|
|
|
if( len < 192 )
|
|
|
|
return 2;
|
|
|
|
if( len < 8384 )
|
|
|
|
return 3;
|
|
|
|
else
|
|
|
|
return 6;
|
|
|
|
}
|
|
|
|
if( len < 256 )
|
|
|
|
return 2;
|
|
|
|
if( len < 65536 )
|
|
|
|
return 3;
|
|
|
|
|
|
|
|
return 5;
|
|
|
|
}
|
|
|
|
|
|
|
|
/****************
|
|
|
|
* Write the CTB and the packet length
|
|
|
|
*/
|
|
|
|
static int
|
2006-04-19 11:26:11 +00:00
|
|
|
write_header( IOBUF out, int ctb, u32 len )
|
2003-06-05 07:14:21 +00:00
|
|
|
{
|
2006-04-19 11:26:11 +00:00
|
|
|
return write_header2( out, ctb, len, 0 );
|
2003-06-05 07:14:21 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static int
|
2008-10-20 13:53:23 +00:00
|
|
|
write_sign_packet_header (IOBUF out, int ctb, u32 len)
|
2003-06-05 07:14:21 +00:00
|
|
|
{
|
2008-10-20 13:53:23 +00:00
|
|
|
(void)ctb;
|
|
|
|
|
|
|
|
/* Work around a bug in the pgp read function for signature packets,
|
|
|
|
which are not correctly coded and silently assume at some point 2
|
|
|
|
byte length headers.*/
|
|
|
|
iobuf_put (out, 0x89 );
|
|
|
|
iobuf_put (out, len >> 8 );
|
|
|
|
return iobuf_put (out, len) == -1 ? -1:0;
|
2003-06-05 07:14:21 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/****************
|
2006-04-19 11:26:11 +00:00
|
|
|
* If HDRLEN is > 0, try to build a header of this length. We need
|
|
|
|
* this so that we can hash packets without reading them again. If
|
|
|
|
* len is 0, write a partial or indeterminate length header, unless
|
|
|
|
* hdrlen is specified in which case write an actual zero length
|
|
|
|
* (using the specified hdrlen).
|
2003-06-05 07:14:21 +00:00
|
|
|
*/
|
|
|
|
static int
|
2006-04-19 11:26:11 +00:00
|
|
|
write_header2( IOBUF out, int ctb, u32 len, int hdrlen )
|
2003-06-05 07:14:21 +00:00
|
|
|
{
|
2006-04-19 11:26:11 +00:00
|
|
|
if( ctb & 0x40 )
|
|
|
|
return write_new_header( out, ctb, len, hdrlen );
|
|
|
|
|
|
|
|
if( hdrlen )
|
|
|
|
{
|
|
|
|
if( hdrlen == 2 && len < 256 )
|
|
|
|
;
|
|
|
|
else if( hdrlen == 3 && len < 65536 )
|
|
|
|
ctb |= 1;
|
|
|
|
else
|
|
|
|
ctb |= 2;
|
2003-06-05 07:14:21 +00:00
|
|
|
}
|
2006-04-19 11:26:11 +00:00
|
|
|
else
|
|
|
|
{
|
|
|
|
if( !len )
|
|
|
|
ctb |= 3;
|
|
|
|
else if( len < 256 )
|
|
|
|
;
|
|
|
|
else if( len < 65536 )
|
|
|
|
ctb |= 1;
|
|
|
|
else
|
|
|
|
ctb |= 2;
|
2003-06-05 07:14:21 +00:00
|
|
|
}
|
2006-04-19 11:26:11 +00:00
|
|
|
|
|
|
|
if( iobuf_put(out, ctb ) )
|
|
|
|
return -1;
|
|
|
|
|
|
|
|
if( len || hdrlen )
|
|
|
|
{
|
|
|
|
if( ctb & 2 )
|
|
|
|
{
|
|
|
|
if(iobuf_put(out, len >> 24 ))
|
|
|
|
return -1;
|
|
|
|
if(iobuf_put(out, len >> 16 ))
|
2003-06-05 07:14:21 +00:00
|
|
|
return -1;
|
2006-04-19 11:26:11 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
if( ctb & 3 )
|
|
|
|
if(iobuf_put(out, len >> 8 ))
|
|
|
|
return -1;
|
|
|
|
|
|
|
|
if( iobuf_put(out, len ) )
|
|
|
|
return -1;
|
2003-06-05 07:14:21 +00:00
|
|
|
}
|
2006-04-19 11:26:11 +00:00
|
|
|
|
|
|
|
return 0;
|
2003-06-05 07:14:21 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static int
|
2006-04-19 11:26:11 +00:00
|
|
|
write_new_header( IOBUF out, int ctb, u32 len, int hdrlen )
|
2003-06-05 07:14:21 +00:00
|
|
|
{
|
|
|
|
if( hdrlen )
|
|
|
|
log_bug("can't cope with hdrlen yet\n");
|
|
|
|
|
|
|
|
if( iobuf_put(out, ctb ) )
|
|
|
|
return -1;
|
|
|
|
if( !len ) {
|
|
|
|
iobuf_set_partial_block_mode(out, 512 );
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
if( len < 192 ) {
|
|
|
|
if( iobuf_put(out, len ) )
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
else if( len < 8384 ) {
|
|
|
|
len -= 192;
|
|
|
|
if( iobuf_put( out, (len / 256) + 192) )
|
|
|
|
return -1;
|
|
|
|
if( iobuf_put( out, (len % 256) ) )
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
if( iobuf_put( out, 0xff ) )
|
|
|
|
return -1;
|
|
|
|
if( iobuf_put( out, (len >> 24)&0xff ) )
|
|
|
|
return -1;
|
|
|
|
if( iobuf_put( out, (len >> 16)&0xff ) )
|
|
|
|
return -1;
|
|
|
|
if( iobuf_put( out, (len >> 8)&0xff ) )
|
|
|
|
return -1;
|
|
|
|
if( iobuf_put( out, len & 0xff ) )
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
2008-10-20 13:53:23 +00:00
|
|
|
write_version (IOBUF out, int ctb)
|
2003-06-05 07:14:21 +00:00
|
|
|
{
|
2008-10-20 13:53:23 +00:00
|
|
|
(void)ctb;
|
|
|
|
|
|
|
|
if (iobuf_put (out, 3))
|
|
|
|
return -1;
|
|
|
|
return 0;
|
2003-06-05 07:14:21 +00:00
|
|
|
}
|