2003-06-05 09:14:21 +02:00
|
|
|
/* keydb.h - Key database
|
2006-04-19 13:26:11 +02:00
|
|
|
* Copyright (C) 1998, 1999, 2000, 2001, 2002, 2003, 2004, 2005,
|
2010-02-02 15:06:19 +01:00
|
|
|
* 2006, 2010 Free Software Foundation, Inc.
|
2016-02-19 14:48:56 +01:00
|
|
|
* Copyright (C) 2015, 2016 g10 Code GmbH
|
2003-06-05 09:14:21 +02:00
|
|
|
*
|
|
|
|
* This file is part of GnuPG.
|
|
|
|
*
|
|
|
|
* GnuPG is free software; you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU General Public License as published by
|
2007-07-04 21:49:40 +02:00
|
|
|
* the Free Software Foundation; either version 3 of the License, or
|
2003-06-05 09:14:21 +02:00
|
|
|
* (at your option) any later version.
|
|
|
|
*
|
|
|
|
* GnuPG is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU General Public License
|
2016-11-05 12:02:19 +01:00
|
|
|
* along with this program; if not, see <https://www.gnu.org/licenses/>.
|
2003-06-05 09:14:21 +02:00
|
|
|
*/
|
|
|
|
|
|
|
|
#ifndef G10_KEYDB_H
|
|
|
|
#define G10_KEYDB_H
|
|
|
|
|
2017-03-07 12:21:23 +01:00
|
|
|
#include "../common/types.h"
|
|
|
|
#include "../common/util.h"
|
2003-06-05 09:14:21 +02:00
|
|
|
#include "packet.h"
|
|
|
|
|
2018-04-06 11:01:46 +02:00
|
|
|
/* What qualifies as a certification (key-signature in contrast to a
|
|
|
|
* data signature)? Note that a back signature is special and can be
|
|
|
|
* made by key and data signatures capable subkeys.) */
|
2019-09-05 21:27:13 +02:00
|
|
|
#define IS_CERT(s) (IS_KEY_SIG(s) \
|
|
|
|
|| IS_UID_SIG(s) \
|
|
|
|
|| IS_SUBKEY_SIG(s) \
|
|
|
|
|| IS_KEY_REV(s) \
|
|
|
|
|| IS_UID_REV(s) \
|
|
|
|
|| IS_SUBKEY_REV(s) \
|
|
|
|
|| IS_ATTST_SIGS(s) )
|
2003-06-05 09:14:21 +02:00
|
|
|
#define IS_SIG(s) (!IS_CERT(s))
|
|
|
|
#define IS_KEY_SIG(s) ((s)->sig_class == 0x1f)
|
|
|
|
#define IS_UID_SIG(s) (((s)->sig_class & ~3) == 0x10)
|
2019-09-05 21:27:13 +02:00
|
|
|
#define IS_ATTST_SIGS(s) ((s)->sig_class == 0x16)
|
2003-06-05 09:14:21 +02:00
|
|
|
#define IS_SUBKEY_SIG(s) ((s)->sig_class == 0x18)
|
2018-04-06 10:18:53 +02:00
|
|
|
#define IS_BACK_SIG(s) ((s)->sig_class == 0x19)
|
2003-06-05 09:14:21 +02:00
|
|
|
#define IS_KEY_REV(s) ((s)->sig_class == 0x20)
|
|
|
|
#define IS_UID_REV(s) ((s)->sig_class == 0x30)
|
|
|
|
#define IS_SUBKEY_REV(s) ((s)->sig_class == 0x28)
|
|
|
|
|
|
|
|
struct getkey_ctx_s;
|
|
|
|
typedef struct getkey_ctx_s *GETKEY_CTX;
|
2010-02-02 15:06:19 +01:00
|
|
|
typedef struct getkey_ctx_s *getkey_ctx_t;
|
2003-06-05 09:14:21 +02:00
|
|
|
|
|
|
|
/****************
|
|
|
|
* A Keyblock is all packets which form an entire certificate;
|
|
|
|
* i.e. the public key, certificate, trust packets, user ids,
|
|
|
|
* signatures, and subkey.
|
|
|
|
*
|
|
|
|
* This structure is also used to bind arbitrary packets together.
|
|
|
|
*/
|
|
|
|
|
2019-03-15 19:50:37 +01:00
|
|
|
struct kbnode_struct
|
|
|
|
{
|
|
|
|
kbnode_t next;
|
|
|
|
PACKET *pkt;
|
|
|
|
int flag; /* Local use during keyblock processing (not cloned).*/
|
|
|
|
unsigned int tag; /* Ditto. */
|
|
|
|
int private_flag;
|
2003-06-05 09:14:21 +02:00
|
|
|
};
|
|
|
|
|
|
|
|
#define is_deleted_kbnode(a) ((a)->private_flag & 1)
|
|
|
|
#define is_cloned_kbnode(a) ((a)->private_flag & 2)
|
|
|
|
|
|
|
|
|
2018-07-06 11:40:16 +02:00
|
|
|
/*
|
|
|
|
* A structure to store key identification as well as some stuff
|
|
|
|
* needed for key validation.
|
|
|
|
*/
|
|
|
|
struct key_item {
|
|
|
|
struct key_item *next;
|
|
|
|
unsigned int ownertrust,min_ownertrust;
|
|
|
|
byte trust_depth;
|
|
|
|
byte trust_value;
|
|
|
|
char *trust_regexp;
|
|
|
|
u32 kid[2];
|
|
|
|
};
|
|
|
|
|
|
|
|
|
2015-12-04 08:56:02 +01:00
|
|
|
/* Bit flags used with build_pk_list. */
|
2015-12-17 10:36:27 +01:00
|
|
|
enum
|
|
|
|
{
|
2016-07-06 14:03:50 +02:00
|
|
|
PK_LIST_ENCRYPT_TO = 1, /* This is an encrypt-to recipient. */
|
|
|
|
PK_LIST_HIDDEN = 2, /* This is a hidden recipient. */
|
|
|
|
PK_LIST_CONFIG = 4, /* Specified via config file. */
|
|
|
|
PK_LIST_FROM_FILE = 8 /* Take key from file with that name. */
|
2015-12-17 10:36:27 +01:00
|
|
|
};
|
2017-01-17 12:43:13 +01:00
|
|
|
|
2016-07-06 14:03:50 +02:00
|
|
|
/* To store private data in the flags the private data must be left
|
2017-01-17 12:43:13 +01:00
|
|
|
* shifted by this value. */
|
2015-12-17 10:36:27 +01:00
|
|
|
enum
|
|
|
|
{
|
2016-07-06 14:03:50 +02:00
|
|
|
PK_LIST_SHIFT = 4
|
2015-12-17 10:36:27 +01:00
|
|
|
};
|
2015-12-04 08:56:02 +01:00
|
|
|
|
2003-06-05 09:14:21 +02:00
|
|
|
|
2009-09-30 17:28:38 +02:00
|
|
|
/* Structure to hold a couple of public key certificates. */
|
|
|
|
typedef struct pk_list *PK_LIST; /* Deprecated. */
|
|
|
|
typedef struct pk_list *pk_list_t;
|
2011-02-04 12:57:53 +01:00
|
|
|
struct pk_list
|
2009-09-30 17:28:38 +02:00
|
|
|
{
|
|
|
|
PK_LIST next;
|
|
|
|
PKT_public_key *pk;
|
2016-07-06 14:03:50 +02:00
|
|
|
int flags; /* See PK_LIST_ constants. */
|
2003-06-05 09:14:21 +02:00
|
|
|
};
|
|
|
|
|
2010-02-02 15:06:19 +01:00
|
|
|
/* Structure to hold a list of secret key certificates. */
|
2003-06-05 09:14:21 +02:00
|
|
|
typedef struct sk_list *SK_LIST;
|
2011-02-04 12:57:53 +01:00
|
|
|
struct sk_list
|
2010-02-02 15:06:19 +01:00
|
|
|
{
|
|
|
|
SK_LIST next;
|
|
|
|
PKT_public_key *pk;
|
|
|
|
int mark; /* not used */
|
2003-06-05 09:14:21 +02:00
|
|
|
};
|
|
|
|
|
|
|
|
/* structure to collect all information which can be used to
|
|
|
|
* identify a public key */
|
|
|
|
typedef struct pubkey_find_info *PUBKEY_FIND_INFO;
|
|
|
|
struct pubkey_find_info {
|
|
|
|
u32 keyid[2];
|
|
|
|
unsigned nbits;
|
|
|
|
byte pubkey_algo;
|
|
|
|
byte fingerprint[MAX_FINGERPRINT_LEN];
|
|
|
|
char userid[1];
|
|
|
|
};
|
|
|
|
|
|
|
|
|
2017-04-28 03:06:33 +02:00
|
|
|
/* Helper type for preference functions. */
|
2020-11-13 15:43:30 +01:00
|
|
|
struct pref_hint
|
2006-07-27 16:18:55 +02:00
|
|
|
{
|
2020-11-13 15:43:30 +01:00
|
|
|
int digest_length; /* We want at least this digest length. */
|
|
|
|
int exact; /* We need to use exactly this length. */
|
2006-07-27 16:18:55 +02:00
|
|
|
};
|
|
|
|
|
|
|
|
|
gpg: Revamp reading and writing of ring trust packets.
* g10/parse-packet.c (parse_trust): Rename to ...
(parse_ring_trust): this. Change args and implement new ring trust
packet format.
(parse): Add special ring trust packet handling.
* g10/packet.h (PKT_user_id): New fields KEYUPDATE, UPDATEURL, and
KEYSRC.
(PKT_public_key): Ditto.
(RING_TRUST_SIG, RING_TRUST_KEY, RING_TRUST_UID): New consts.
(PKT_ring_trust): New.
(struct packet_struct): Remove member RING_TRUST.
(strcu parse_packet_ctx_s): Add field SKIP_META.
(init_parse_packet): Init SKIPT_META.
* g10/free-packet.c (release_public_key_parts): Free UDPATEURL.
(free_user_id): Ditto.
* g10/mainproc.c (list_node): Remove printing of non-documented "rtv"
lines.
* g10/build-packet.c (build_packet_and_meta): New.
(do_ring_trust): New.
* g10/export.c (write_keyblock_to_output): Use build_packet_and_meta
in backup mode.
(do_export_one_keyblock): Ditto.
* g10/import.c (read_block): Add arg WITH_META. Skip ring trust
packets if that ism not set.
(import): Call read_block WITH_META in restore mode.
* g10/keydb.h (KEYSRC_UNKNOWN, KEYSRC_FILE, KEYSRC_KS, KEYSRC_PREF_KS)
(KEYSRC_WKD, KEYSRC_WKD_SD, KEYSRC_DANE): New constants. They are not
yet used, though.
* g10/keydb.c (parse_keyblock_image): Allow ring trust packets.
(build_keyblock_image): Ditto. Use build_packet_and_meta.
* g10/keyring.c (keyring_get_keyblock): Remove specila treatment of
ring trust packets.
(write_keyblock): Use build_packet_and_meta. Remove special treatment
of ring trust packets and initialization of the signature caches.
--
This patch introduced the framework to store meta data for keys and
user ids in the keyrings/keyboxes. Ring trust packets are
implementation defined and have always been used in gpg to cache the
signature verification status.
Ring trust packets are only exported with the export option "backup"
and only imported with the import option "restore".
The new code uses a cleaner way to handle the ring trust packets: When
the parser reads a ring trust packet and the previously read packet
matches the type of that ring trust packet, the information is stored
in that previously read packet (signature, user id, or primary key)
and the next packet is read immediately. Thus only the parser sees
the ring trust packets. Ring trust packets are written by using the
new function build_packet_and_meta instead of build_packet. That
function writes a ring trust packet when the needed information is
available.
As a side-effect of this patch the signature status cache works again
and "gpg --check-sigs" is thus much faster.
Signed-off-by: Werner Koch <wk@gnupg.org>
2017-03-30 09:07:02 +02:00
|
|
|
/* Constants to describe from where a key was fetched or updated. */
|
|
|
|
enum
|
|
|
|
{
|
2017-07-13 17:28:32 +02:00
|
|
|
KEYORG_UNKNOWN = 0,
|
|
|
|
KEYORG_KS = 1, /* Public keyserver. */
|
|
|
|
KEYORG_KS_PREF = 2, /* Preferred keysrver. */
|
|
|
|
KEYORG_DANE = 3, /* OpenPGP DANE. */
|
|
|
|
KEYORG_WKD = 4, /* Web Key Directory. */
|
|
|
|
KEYORG_URL = 5, /* Trusted URL. */
|
|
|
|
KEYORG_FILE = 6, /* Trusted file. */
|
2017-07-20 14:49:07 +02:00
|
|
|
KEYORG_SELF = 7 /* We generated it. */
|
gpg: Revamp reading and writing of ring trust packets.
* g10/parse-packet.c (parse_trust): Rename to ...
(parse_ring_trust): this. Change args and implement new ring trust
packet format.
(parse): Add special ring trust packet handling.
* g10/packet.h (PKT_user_id): New fields KEYUPDATE, UPDATEURL, and
KEYSRC.
(PKT_public_key): Ditto.
(RING_TRUST_SIG, RING_TRUST_KEY, RING_TRUST_UID): New consts.
(PKT_ring_trust): New.
(struct packet_struct): Remove member RING_TRUST.
(strcu parse_packet_ctx_s): Add field SKIP_META.
(init_parse_packet): Init SKIPT_META.
* g10/free-packet.c (release_public_key_parts): Free UDPATEURL.
(free_user_id): Ditto.
* g10/mainproc.c (list_node): Remove printing of non-documented "rtv"
lines.
* g10/build-packet.c (build_packet_and_meta): New.
(do_ring_trust): New.
* g10/export.c (write_keyblock_to_output): Use build_packet_and_meta
in backup mode.
(do_export_one_keyblock): Ditto.
* g10/import.c (read_block): Add arg WITH_META. Skip ring trust
packets if that ism not set.
(import): Call read_block WITH_META in restore mode.
* g10/keydb.h (KEYSRC_UNKNOWN, KEYSRC_FILE, KEYSRC_KS, KEYSRC_PREF_KS)
(KEYSRC_WKD, KEYSRC_WKD_SD, KEYSRC_DANE): New constants. They are not
yet used, though.
* g10/keydb.c (parse_keyblock_image): Allow ring trust packets.
(build_keyblock_image): Ditto. Use build_packet_and_meta.
* g10/keyring.c (keyring_get_keyblock): Remove specila treatment of
ring trust packets.
(write_keyblock): Use build_packet_and_meta. Remove special treatment
of ring trust packets and initialization of the signature caches.
--
This patch introduced the framework to store meta data for keys and
user ids in the keyrings/keyboxes. Ring trust packets are
implementation defined and have always been used in gpg to cache the
signature verification status.
Ring trust packets are only exported with the export option "backup"
and only imported with the import option "restore".
The new code uses a cleaner way to handle the ring trust packets: When
the parser reads a ring trust packet and the previously read packet
matches the type of that ring trust packet, the information is stored
in that previously read packet (signature, user id, or primary key)
and the next packet is read immediately. Thus only the parser sees
the ring trust packets. Ring trust packets are written by using the
new function build_packet_and_meta instead of build_packet. That
function writes a ring trust packet when the needed information is
available.
As a side-effect of this patch the signature status cache works again
and "gpg --check-sigs" is thus much faster.
Signed-off-by: Werner Koch <wk@gnupg.org>
2017-03-30 09:07:02 +02:00
|
|
|
};
|
|
|
|
|
|
|
|
|
2018-07-06 11:40:16 +02:00
|
|
|
/*
|
|
|
|
* Check whether the signature SIG is in the klist K.
|
|
|
|
*/
|
|
|
|
static inline struct key_item *
|
|
|
|
is_in_klist (struct key_item *k, PKT_signature *sig)
|
|
|
|
{
|
|
|
|
for (; k; k = k->next)
|
|
|
|
{
|
|
|
|
if (k->kid[0] == sig->keyid[0] && k->kid[1] == sig->keyid[1])
|
|
|
|
return k;
|
|
|
|
}
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2019-09-09 14:34:09 +02:00
|
|
|
/*-- call-keyboxd.c --*/
|
|
|
|
|
2019-09-10 16:05:54 +02:00
|
|
|
/* Release all open contexts to the keyboxd. */
|
|
|
|
void gpg_keyboxd_deinit_session_data (ctrl_t ctrl);
|
|
|
|
|
2019-09-09 14:34:09 +02:00
|
|
|
/* Create a new database handle. Returns NULL on error, sets ERRNO,
|
|
|
|
* and prints an error diagnostic. */
|
|
|
|
KEYDB_HANDLE keydb_new (ctrl_t ctrl);
|
|
|
|
|
|
|
|
/* Release a keydb handle. */
|
|
|
|
void keydb_release (KEYDB_HANDLE hd);
|
|
|
|
|
|
|
|
/* Take a lock if we are not using the keyboxd. */
|
|
|
|
gpg_error_t keydb_lock (KEYDB_HANDLE hd);
|
|
|
|
|
|
|
|
/* Return the keyblock last found by keydb_search. */
|
|
|
|
gpg_error_t keydb_get_keyblock (KEYDB_HANDLE hd, kbnode_t *ret_kb);
|
|
|
|
|
|
|
|
/* Update the keyblock KB. */
|
|
|
|
gpg_error_t keydb_update_keyblock (ctrl_t ctrl, KEYDB_HANDLE hd, kbnode_t kb);
|
|
|
|
|
|
|
|
/* Insert a keyblock into one of the storage system. */
|
|
|
|
gpg_error_t keydb_insert_keyblock (KEYDB_HANDLE hd, kbnode_t kb);
|
|
|
|
|
|
|
|
/* Delete the currently selected keyblock. */
|
|
|
|
gpg_error_t keydb_delete_keyblock (KEYDB_HANDLE hd);
|
|
|
|
|
|
|
|
/* Clears the current search result and resets the handle's position. */
|
|
|
|
gpg_error_t keydb_search_reset (KEYDB_HANDLE hd);
|
|
|
|
|
|
|
|
/* Search the database for keys matching the search description. */
|
|
|
|
gpg_error_t keydb_search (KEYDB_HANDLE hd, KEYDB_SEARCH_DESC *desc,
|
|
|
|
size_t ndesc, size_t *descindex);
|
|
|
|
|
|
|
|
|
2018-07-06 11:40:16 +02:00
|
|
|
|
2003-06-05 09:14:21 +02:00
|
|
|
/*-- keydb.c --*/
|
|
|
|
|
2012-12-27 15:04:29 +01:00
|
|
|
#define KEYDB_RESOURCE_FLAG_PRIMARY 2 /* The primary resource. */
|
|
|
|
#define KEYDB_RESOURCE_FLAG_DEFAULT 4 /* The default one. */
|
|
|
|
#define KEYDB_RESOURCE_FLAG_READONLY 8 /* Open in read only mode. */
|
2015-08-07 15:53:56 +02:00
|
|
|
#define KEYDB_RESOURCE_FLAG_GPGVDEF 16 /* Default file for gpgv. */
|
2012-12-27 15:04:29 +01:00
|
|
|
|
2015-11-17 11:36:38 +01:00
|
|
|
/* Format a search term for debugging output. The caller must free
|
|
|
|
the result. */
|
|
|
|
char *keydb_search_desc_dump (struct keydb_search_desc *desc);
|
|
|
|
|
2016-01-11 11:41:49 +01:00
|
|
|
/* Register a resource (keyring or keybox). */
|
2012-12-27 15:04:29 +01:00
|
|
|
gpg_error_t keydb_add_resource (const char *url, unsigned int flags);
|
|
|
|
|
2015-08-31 11:14:21 +02:00
|
|
|
/* Dump some statistics to the log. */
|
|
|
|
void keydb_dump_stats (void);
|
|
|
|
|
|
|
|
/* Set a flag on the handle to suppress use of cached results. This
|
|
|
|
is required for updating a keyring and for key listings. Fixme:
|
|
|
|
Using a new parameter for keydb_new might be a better solution. */
|
2014-10-13 14:01:29 +02:00
|
|
|
void keydb_disable_caching (KEYDB_HANDLE hd);
|
2015-08-31 11:14:21 +02:00
|
|
|
|
2016-01-11 11:41:49 +01:00
|
|
|
/* Save the last found state and invalidate the current selection. */
|
2015-05-08 15:51:11 +02:00
|
|
|
void keydb_push_found_state (KEYDB_HANDLE hd);
|
2015-08-31 11:14:21 +02:00
|
|
|
|
2016-01-11 11:41:49 +01:00
|
|
|
/* Restore the previous save state. */
|
2015-05-08 15:51:11 +02:00
|
|
|
void keydb_pop_found_state (KEYDB_HANDLE hd);
|
2015-08-31 11:14:21 +02:00
|
|
|
|
2016-01-11 11:41:49 +01:00
|
|
|
/* Return the file name of the resource. */
|
2003-06-05 09:14:21 +02:00
|
|
|
const char *keydb_get_resource_name (KEYDB_HANDLE hd);
|
2015-08-31 11:14:21 +02:00
|
|
|
|
2016-01-11 11:41:49 +01:00
|
|
|
/* Find the first writable resource. */
|
2015-08-28 16:22:59 +02:00
|
|
|
gpg_error_t keydb_locate_writable (KEYDB_HANDLE hd);
|
2015-08-31 11:14:21 +02:00
|
|
|
|
|
|
|
/* Rebuild the on-disk caches of all key resources. */
|
2017-03-31 20:03:52 +02:00
|
|
|
void keydb_rebuild_caches (ctrl_t ctrl, int noisy);
|
2015-08-31 11:14:21 +02:00
|
|
|
|
|
|
|
/* Return the number of skipped blocks (because they were to large to
|
|
|
|
read from a keybox) since the last search reset. */
|
2014-10-09 21:01:49 +02:00
|
|
|
unsigned long keydb_get_skipped_counter (KEYDB_HANDLE hd);
|
2015-08-31 11:14:21 +02:00
|
|
|
|
2016-01-11 11:41:49 +01:00
|
|
|
/* Return the first non-legacy key in the database. */
|
2011-04-29 15:07:11 +02:00
|
|
|
gpg_error_t keydb_search_first (KEYDB_HANDLE hd);
|
2015-08-31 11:14:21 +02:00
|
|
|
|
2016-01-11 11:41:49 +01:00
|
|
|
/* Return the next key (not the next matching key!). */
|
2011-04-29 15:07:11 +02:00
|
|
|
gpg_error_t keydb_search_next (KEYDB_HANDLE hd);
|
2015-08-31 11:14:21 +02:00
|
|
|
|
|
|
|
/* This is a convenience function for searching for keys with a long
|
2016-01-11 11:41:49 +01:00
|
|
|
key id. */
|
2011-04-29 15:07:11 +02:00
|
|
|
gpg_error_t keydb_search_kid (KEYDB_HANDLE hd, u32 *kid);
|
2015-08-31 11:14:21 +02:00
|
|
|
|
2019-03-14 08:54:59 +01:00
|
|
|
/* This is a convenience function for searching for keys by
|
|
|
|
* fingerprint. */
|
|
|
|
gpg_error_t keydb_search_fpr (KEYDB_HANDLE hd, const byte *fpr, size_t fprlen);
|
2003-06-05 09:14:21 +02:00
|
|
|
|
2015-06-20 15:03:32 +02:00
|
|
|
|
2003-06-05 09:14:21 +02:00
|
|
|
/*-- pkclist.c --*/
|
2017-03-31 20:03:52 +02:00
|
|
|
void show_revocation_reason (ctrl_t ctrl, PKT_public_key *pk, int mode );
|
2020-06-08 20:13:25 +02:00
|
|
|
gpg_error_t check_signatures_trust (ctrl_t ctrl, kbnode_t keyblock,
|
|
|
|
PKT_public_key *pk, PKT_signature *sig);
|
2009-09-30 17:28:38 +02:00
|
|
|
|
|
|
|
void release_pk_list (PK_LIST pk_list);
|
2019-02-19 08:14:41 +01:00
|
|
|
int expand_id (const char *id, strlist_t *into, unsigned int flags);
|
2019-09-30 14:08:13 +02:00
|
|
|
strlist_t expand_group (strlist_t input, int prepend_input);
|
2015-12-18 13:26:40 +01:00
|
|
|
int build_pk_list (ctrl_t ctrl, strlist_t rcpts, PK_LIST *ret_pk_list);
|
2010-10-01 22:33:53 +02:00
|
|
|
gpg_error_t find_and_check_key (ctrl_t ctrl,
|
2011-02-04 12:57:53 +01:00
|
|
|
const char *name, unsigned int use,
|
2016-07-06 14:03:50 +02:00
|
|
|
int mark_hidden, int from_file,
|
|
|
|
pk_list_t *pk_list_addr);
|
2009-09-30 17:28:38 +02:00
|
|
|
|
2006-07-27 16:18:55 +02:00
|
|
|
int algo_available( preftype_t preftype, int algo,
|
2020-11-13 15:43:30 +01:00
|
|
|
const struct pref_hint *hint );
|
2003-06-05 09:14:21 +02:00
|
|
|
int select_algo_from_prefs( PK_LIST pk_list, int preftype,
|
2020-11-13 15:43:30 +01:00
|
|
|
int request, const struct pref_hint *hint);
|
2003-06-05 09:14:21 +02:00
|
|
|
int select_mdc_from_pklist (PK_LIST pk_list);
|
2018-01-22 16:23:02 +01:00
|
|
|
aead_algo_t select_aead_from_pklist (pk_list_t pk_list);
|
2018-05-29 12:42:44 +02:00
|
|
|
void warn_missing_aead_from_pklist (PK_LIST pk_list);
|
2006-11-05 16:08:58 +01:00
|
|
|
void warn_missing_aes_from_pklist (PK_LIST pk_list);
|
2003-06-05 09:14:21 +02:00
|
|
|
|
|
|
|
/*-- skclist.c --*/
|
2006-08-21 22:20:23 +02:00
|
|
|
int random_is_faked (void);
|
2003-06-05 09:14:21 +02:00
|
|
|
void release_sk_list( SK_LIST sk_list );
|
2015-11-03 23:15:27 +01:00
|
|
|
gpg_error_t build_sk_list (ctrl_t ctrl, strlist_t locusr,
|
|
|
|
SK_LIST *ret_sk_list, unsigned use);
|
2003-06-05 09:14:21 +02:00
|
|
|
|
|
|
|
/*-- passphrase.h --*/
|
2021-05-17 19:27:54 +02:00
|
|
|
|
|
|
|
/* Flags for passphrase_to_dek */
|
|
|
|
#define GETPASSWORD_FLAG_SYMDECRYPT 1
|
|
|
|
|
2003-06-05 09:14:21 +02:00
|
|
|
int have_static_passphrase(void);
|
2013-02-07 20:37:58 +01:00
|
|
|
const char *get_static_passphrase (void);
|
2006-04-19 13:26:11 +02:00
|
|
|
void set_passphrase_from_string(const char *pass);
|
2003-06-05 09:14:21 +02:00
|
|
|
void read_passphrase_from_fd( int fd );
|
2016-08-08 18:45:29 +02:00
|
|
|
void passphrase_clear_cache (const char *cacheid);
|
|
|
|
DEK *passphrase_to_dek (int cipher_algo, STRING2KEY *s2k,
|
|
|
|
int create, int nocache,
|
2021-05-17 19:27:54 +02:00
|
|
|
const char *tryagain_text, unsigned int flags,
|
|
|
|
int *canceled);
|
2003-06-05 09:14:21 +02:00
|
|
|
void set_next_passphrase( const char *s );
|
|
|
|
char *get_last_passphrase(void);
|
2006-04-19 13:26:11 +02:00
|
|
|
void next_to_last_passphrase(void);
|
2003-06-05 09:14:21 +02:00
|
|
|
|
2017-03-31 20:03:52 +02:00
|
|
|
void emit_status_need_passphrase (ctrl_t ctrl, u32 *keyid,
|
|
|
|
u32 *mainkeyid, int pubkey_algo);
|
2013-02-07 20:37:58 +01:00
|
|
|
|
2014-04-14 14:40:18 +02:00
|
|
|
#define FORMAT_KEYDESC_NORMAL 0
|
|
|
|
#define FORMAT_KEYDESC_IMPORT 1
|
|
|
|
#define FORMAT_KEYDESC_EXPORT 2
|
2014-04-15 16:40:48 +02:00
|
|
|
#define FORMAT_KEYDESC_DELKEY 3
|
2017-03-31 20:03:52 +02:00
|
|
|
char *gpg_format_keydesc (ctrl_t ctrl,
|
|
|
|
PKT_public_key *pk, int mode, int escaped);
|
2010-04-27 16:11:41 +02:00
|
|
|
|
|
|
|
|
2003-06-05 09:14:21 +02:00
|
|
|
/*-- getkey.c --*/
|
2015-09-16 14:01:48 +02:00
|
|
|
|
2016-01-11 11:41:49 +01:00
|
|
|
/* Cache a copy of a public key in the public key cache. */
|
2003-06-05 09:14:21 +02:00
|
|
|
void cache_public_key( PKT_public_key *pk );
|
2015-09-16 14:01:48 +02:00
|
|
|
|
2016-01-11 11:41:49 +01:00
|
|
|
/* Disable and drop the public key cache. */
|
2003-06-05 09:14:21 +02:00
|
|
|
void getkey_disable_caches(void);
|
2015-09-16 14:01:48 +02:00
|
|
|
|
2018-07-05 20:55:32 +02:00
|
|
|
/* Return the public key used for signature SIG and store it at PK. */
|
|
|
|
gpg_error_t get_pubkey_for_sig (ctrl_t ctrl,
|
2020-03-13 17:14:34 +01:00
|
|
|
PKT_public_key *pk, PKT_signature *sig,
|
|
|
|
PKT_public_key *forced_pk);
|
2018-07-05 20:55:32 +02:00
|
|
|
|
2016-01-11 11:41:49 +01:00
|
|
|
/* Return the public key with the key id KEYID and store it at PK. */
|
2017-03-31 20:03:52 +02:00
|
|
|
int get_pubkey (ctrl_t ctrl, PKT_public_key *pk, u32 *keyid);
|
2015-09-16 14:01:48 +02:00
|
|
|
|
2021-04-25 20:03:07 +02:00
|
|
|
/* Same as get_pubkey but with auto LDAP fetch. */
|
|
|
|
gpg_error_t get_pubkey_with_ldap_fallback (ctrl_t ctrl,
|
|
|
|
PKT_public_key *pk, u32 * keyid);
|
|
|
|
|
2015-09-16 14:01:48 +02:00
|
|
|
/* Similar to get_pubkey, but it does not take PK->REQ_USAGE into
|
|
|
|
account nor does it merge in the self-signed data. This function
|
2016-01-11 11:41:49 +01:00
|
|
|
also only considers primary keys. */
|
2019-09-09 14:34:09 +02:00
|
|
|
int get_pubkey_fast (ctrl_t ctrl, PKT_public_key *pk, u32 *keyid);
|
2015-09-16 14:01:48 +02:00
|
|
|
|
2018-07-05 20:55:32 +02:00
|
|
|
/* Return the entire keyblock used to create SIG. This is a
|
|
|
|
* specialized version of get_pubkeyblock. */
|
|
|
|
kbnode_t get_pubkeyblock_for_sig (ctrl_t ctrl, PKT_signature *sig);
|
|
|
|
|
2016-01-11 11:41:49 +01:00
|
|
|
/* Return the key block for the key with KEYID. */
|
2017-03-31 20:03:52 +02:00
|
|
|
kbnode_t get_pubkeyblock (ctrl_t ctrl, u32 *keyid);
|
2015-09-16 14:01:48 +02:00
|
|
|
|
2015-12-22 14:57:53 +01:00
|
|
|
/* A list used by get_pubkeys to gather all of the matches. */
|
2015-12-23 15:45:20 +01:00
|
|
|
struct pubkey_s
|
2015-12-22 14:57:53 +01:00
|
|
|
{
|
2015-12-23 15:45:20 +01:00
|
|
|
struct pubkey_s *next;
|
2015-12-22 14:57:53 +01:00
|
|
|
/* The key to use (either the public key or the subkey). */
|
|
|
|
PKT_public_key *pk;
|
|
|
|
kbnode_t keyblock;
|
|
|
|
};
|
2015-12-23 15:45:20 +01:00
|
|
|
typedef struct pubkey_s *pubkey_t;
|
2015-12-22 14:57:53 +01:00
|
|
|
|
|
|
|
/* Free a list of public keys. */
|
2015-12-23 15:45:20 +01:00
|
|
|
void pubkeys_free (pubkey_t keys);
|
2015-12-22 14:57:53 +01:00
|
|
|
|
2019-07-04 10:42:48 +02:00
|
|
|
|
|
|
|
/* Mode flags for get_pubkey_byname. */
|
|
|
|
enum get_pubkey_modes
|
|
|
|
{
|
|
|
|
GET_PUBKEY_NORMAL = 0,
|
|
|
|
GET_PUBKEY_NO_AKL = 1,
|
|
|
|
GET_PUBKEY_NO_LOCAL = 2
|
|
|
|
};
|
|
|
|
|
2016-01-11 11:41:49 +01:00
|
|
|
/* Find a public key identified by NAME. */
|
2019-07-04 10:42:48 +02:00
|
|
|
int get_pubkey_byname (ctrl_t ctrl, enum get_pubkey_modes mode,
|
2015-09-16 14:01:48 +02:00
|
|
|
GETKEY_CTX *retctx, PKT_public_key *pk,
|
|
|
|
const char *name,
|
2003-06-05 09:14:21 +02:00
|
|
|
KBNODE *ret_keyblock, KEYDB_HANDLE *ret_kdbhd,
|
2019-07-04 10:42:48 +02:00
|
|
|
int include_unusable);
|
2015-09-16 14:01:48 +02:00
|
|
|
|
2016-10-27 18:48:51 +02:00
|
|
|
/* Likewise, but only return the best match if NAME resembles a mail
|
|
|
|
* address. */
|
2019-07-04 15:13:26 +02:00
|
|
|
gpg_error_t get_best_pubkey_byname (ctrl_t ctrl, enum get_pubkey_modes mode,
|
2017-07-28 11:08:32 +02:00
|
|
|
GETKEY_CTX *retctx, PKT_public_key *pk,
|
|
|
|
const char *name, KBNODE *ret_keyblock,
|
2018-08-28 15:11:10 +02:00
|
|
|
int include_unusable);
|
2016-10-27 18:48:51 +02:00
|
|
|
|
2016-07-06 14:03:50 +02:00
|
|
|
/* Get a public key directly from file FNAME. */
|
|
|
|
gpg_error_t get_pubkey_fromfile (ctrl_t ctrl,
|
|
|
|
PKT_public_key *pk, const char *fname);
|
|
|
|
|
2020-03-13 17:14:34 +01:00
|
|
|
/* Get a public key from a buffer. */
|
|
|
|
gpg_error_t get_pubkey_from_buffer (ctrl_t ctrl, PKT_public_key *pkbuf,
|
|
|
|
const void *buffer, size_t buflen,
|
|
|
|
u32 *want_keyid, kbnode_t *r_keyblock);
|
|
|
|
|
2016-01-11 11:41:49 +01:00
|
|
|
/* Return the public key with the key id KEYID iff the secret key is
|
|
|
|
* available and store it at PK. */
|
2017-03-31 20:03:52 +02:00
|
|
|
gpg_error_t get_seckey (ctrl_t ctrl, PKT_public_key *pk, u32 *keyid);
|
2015-09-16 14:01:48 +02:00
|
|
|
|
2016-01-11 11:41:49 +01:00
|
|
|
/* Lookup a key with the specified fingerprint. */
|
2017-03-31 20:03:52 +02:00
|
|
|
int get_pubkey_byfprint (ctrl_t ctrl, PKT_public_key *pk, kbnode_t *r_keyblock,
|
2015-05-07 12:01:12 +02:00
|
|
|
const byte *fprint, size_t fprint_len);
|
2015-09-16 14:01:48 +02:00
|
|
|
|
|
|
|
/* This function is similar to get_pubkey_byfprint, but it doesn't
|
|
|
|
merge the self-signed data into the public key and subkeys or into
|
2016-01-11 11:41:49 +01:00
|
|
|
the user ids. */
|
2019-09-09 14:34:09 +02:00
|
|
|
gpg_error_t get_pubkey_byfprint_fast (ctrl_t ctrl, PKT_public_key *pk,
|
2017-10-18 17:52:41 +02:00
|
|
|
const byte *fprint, size_t fprint_len);
|
|
|
|
|
|
|
|
/* This function is similar to get_pubkey_byfprint, but it doesn't
|
|
|
|
merge the self-signed data into the public key and subkeys or into
|
|
|
|
the user ids. */
|
2019-09-09 14:34:09 +02:00
|
|
|
gpg_error_t get_keyblock_byfprint_fast (ctrl_t ctrl,
|
|
|
|
kbnode_t *r_keyblock,
|
2017-10-18 17:52:41 +02:00
|
|
|
KEYDB_HANDLE *r_hd,
|
|
|
|
const byte *fprint, size_t fprint_len,
|
|
|
|
int lock);
|
|
|
|
|
2006-04-19 13:26:11 +02:00
|
|
|
|
2015-12-03 12:18:32 +01:00
|
|
|
/* Returns true if a secret key is available for the public key with
|
|
|
|
key id KEYID. */
|
2019-09-09 14:34:09 +02:00
|
|
|
int have_secret_key_with_kid (ctrl_t ctrl, u32 *keyid);
|
2010-04-21 18:26:17 +02:00
|
|
|
|
2015-11-03 23:39:46 +01:00
|
|
|
/* Parse the --default-key parameter. Returns the last key (in terms
|
|
|
|
of when the option is given) that is available. */
|
|
|
|
const char *parse_def_secret_key (ctrl_t ctrl);
|
|
|
|
|
2016-01-11 11:41:49 +01:00
|
|
|
/* Look up a secret key. */
|
2015-11-03 23:15:27 +01:00
|
|
|
gpg_error_t get_seckey_default (ctrl_t ctrl, PKT_public_key *pk);
|
2017-05-22 02:27:36 +02:00
|
|
|
gpg_error_t get_seckey_default_or_card (ctrl_t ctrl, PKT_public_key *pk,
|
|
|
|
const byte *fpr, size_t fpr_len);
|
2010-04-21 18:26:17 +02:00
|
|
|
|
2016-01-11 11:41:49 +01:00
|
|
|
/* Search for keys matching some criteria. */
|
2017-03-31 20:03:52 +02:00
|
|
|
gpg_error_t getkey_bynames (ctrl_t ctrl,
|
|
|
|
getkey_ctx_t *retctx, PKT_public_key *pk,
|
2010-02-02 15:06:19 +01:00
|
|
|
strlist_t names, int want_secret,
|
|
|
|
kbnode_t *ret_keyblock);
|
2015-09-16 14:01:48 +02:00
|
|
|
|
2016-01-11 11:41:49 +01:00
|
|
|
/* Search for one key matching some criteria. */
|
2015-11-03 23:15:27 +01:00
|
|
|
gpg_error_t getkey_byname (ctrl_t ctrl,
|
|
|
|
getkey_ctx_t *retctx, PKT_public_key *pk,
|
2010-02-02 15:06:19 +01:00
|
|
|
const char *name, int want_secret,
|
|
|
|
kbnode_t *ret_keyblock);
|
2015-09-16 14:01:48 +02:00
|
|
|
|
2016-01-11 11:41:49 +01:00
|
|
|
/* Return the next search result. */
|
2017-03-31 20:03:52 +02:00
|
|
|
gpg_error_t getkey_next (ctrl_t ctrl, getkey_ctx_t ctx,
|
|
|
|
PKT_public_key *pk, kbnode_t *ret_keyblock);
|
2015-09-16 14:01:48 +02:00
|
|
|
|
2016-01-11 11:41:49 +01:00
|
|
|
/* Release any resources used by a key listing context. */
|
2017-03-31 20:35:28 +02:00
|
|
|
void getkey_end (ctrl_t ctrl, getkey_ctx_t ctx);
|
2010-02-02 15:06:19 +01:00
|
|
|
|
2015-09-16 14:01:48 +02:00
|
|
|
/* Return the database handle used by this context. The context still
|
|
|
|
owns the handle. */
|
|
|
|
KEYDB_HANDLE get_ctx_handle(GETKEY_CTX ctx);
|
|
|
|
|
2016-01-11 11:41:49 +01:00
|
|
|
/* Enumerate some secret keys. */
|
2015-11-03 23:15:27 +01:00
|
|
|
gpg_error_t enum_secret_keys (ctrl_t ctrl, void **context, PKT_public_key *pk);
|
2010-02-02 15:06:19 +01:00
|
|
|
|
2016-01-11 11:41:49 +01:00
|
|
|
/* Set the mainkey_id fields for all keys in KEYBLOCK. */
|
2014-04-15 16:40:48 +02:00
|
|
|
void setup_main_keyids (kbnode_t keyblock);
|
2015-09-16 14:01:48 +02:00
|
|
|
|
2016-01-11 11:41:49 +01:00
|
|
|
/* This function merges information from the self-signed data into the
|
|
|
|
data structures. */
|
2017-03-31 20:03:52 +02:00
|
|
|
void merge_keys_and_selfsig (ctrl_t ctrl, kbnode_t keyblock);
|
2015-09-16 14:01:48 +02:00
|
|
|
|
2018-04-12 17:53:17 +02:00
|
|
|
char *get_user_id_string_native (ctrl_t ctrl, u32 *keyid);
|
|
|
|
char *get_long_user_id_string (ctrl_t ctrl, u32 *keyid);
|
|
|
|
char *get_user_id (ctrl_t ctrl, u32 *keyid, size_t *rn, int *r_nouid);
|
|
|
|
char *get_user_id_native (ctrl_t ctrl, u32 *keyid);
|
2019-04-05 17:02:43 +02:00
|
|
|
char *get_user_id_byfpr_native (ctrl_t ctrl, const byte *fpr, size_t fprlen);
|
2015-09-16 14:01:48 +02:00
|
|
|
|
2006-04-19 13:26:11 +02:00
|
|
|
void release_akl(void);
|
2019-08-23 13:22:15 +02:00
|
|
|
int akl_empty_or_only_local (void);
|
2017-08-04 21:58:46 +02:00
|
|
|
int parse_auto_key_locate(const char *options);
|
2017-07-13 17:28:32 +02:00
|
|
|
int parse_key_origin (char *string);
|
2017-07-20 17:27:48 +02:00
|
|
|
const char *key_origin_string (int origin);
|
2003-06-05 09:14:21 +02:00
|
|
|
|
|
|
|
/*-- keyid.c --*/
|
|
|
|
int pubkey_letter( int algo );
|
2014-02-05 10:37:59 +01:00
|
|
|
char *pubkey_string (PKT_public_key *pk, char *buffer, size_t bufsize);
|
|
|
|
#define PUBKEY_STRING_SIZE 32
|
2006-05-23 18:19:43 +02:00
|
|
|
u32 v3_keyid (gcry_mpi_t a, u32 *ki);
|
2006-04-19 13:26:11 +02:00
|
|
|
void hash_public_key( gcry_md_hd_t md, PKT_public_key *pk );
|
2016-02-08 00:31:35 +01:00
|
|
|
char *format_keyid (u32 *keyid, int format, char *buffer, int len);
|
2016-02-19 14:48:56 +01:00
|
|
|
|
|
|
|
/* Return PK's keyid. The memory is owned by PK. */
|
|
|
|
u32 *pk_keyid (PKT_public_key *pk);
|
|
|
|
|
|
|
|
/* Return the keyid of the primary key associated with PK. The memory
|
|
|
|
is owned by PK. */
|
|
|
|
u32 *pk_main_keyid (PKT_public_key *pk);
|
|
|
|
|
|
|
|
/* Order A and B. If A < B then return -1, if A == B then return 0,
|
|
|
|
and if A > B then return 1. */
|
|
|
|
static int GPGRT_ATTR_UNUSED
|
|
|
|
keyid_cmp (const u32 *a, const u32 *b)
|
|
|
|
{
|
|
|
|
if (a[0] < b[0])
|
|
|
|
return -1;
|
|
|
|
if (a[0] > b[0])
|
|
|
|
return 1;
|
|
|
|
if (a[1] < b[1])
|
|
|
|
return -1;
|
|
|
|
if (a[1] > b[1])
|
|
|
|
return 1;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2016-11-21 16:19:32 +01:00
|
|
|
/* Return whether PK is a primary key. */
|
|
|
|
static int GPGRT_ATTR_UNUSED
|
|
|
|
pk_is_primary (PKT_public_key *pk)
|
|
|
|
{
|
|
|
|
return keyid_cmp (pk_keyid (pk), pk_main_keyid (pk)) == 0;
|
|
|
|
}
|
|
|
|
|
2016-02-19 14:48:56 +01:00
|
|
|
/* Copy the keyid in SRC to DEST and return DEST. */
|
|
|
|
u32 *keyid_copy (u32 *dest, const u32 *src);
|
|
|
|
|
2006-04-19 13:26:11 +02:00
|
|
|
size_t keystrlen(void);
|
|
|
|
const char *keystr(u32 *keyid);
|
2010-08-31 17:58:39 +02:00
|
|
|
const char *keystr_with_sub (u32 *main_kid, u32 *sub_kid);
|
2006-04-19 13:26:11 +02:00
|
|
|
const char *keystr_from_pk(PKT_public_key *pk);
|
2010-08-31 17:58:39 +02:00
|
|
|
const char *keystr_from_pk_with_sub (PKT_public_key *main_pk,
|
|
|
|
PKT_public_key *sub_pk);
|
2016-02-19 14:48:56 +01:00
|
|
|
|
|
|
|
/* Return PK's key id as a string using the default format. PK owns
|
|
|
|
the storage. */
|
|
|
|
const char *pk_keyid_str (PKT_public_key *pk);
|
|
|
|
|
2006-04-19 13:26:11 +02:00
|
|
|
const char *keystr_from_desc(KEYDB_SEARCH_DESC *desc);
|
2003-06-05 09:14:21 +02:00
|
|
|
u32 keyid_from_pk( PKT_public_key *pk, u32 *keyid );
|
2017-03-31 20:03:52 +02:00
|
|
|
u32 keyid_from_sig (PKT_signature *sig, u32 *keyid );
|
|
|
|
u32 keyid_from_fingerprint (ctrl_t ctrl, const byte *fprint, size_t fprint_len,
|
|
|
|
u32 *keyid);
|
2003-06-05 09:14:21 +02:00
|
|
|
byte *namehash_from_uid(PKT_user_id *uid);
|
|
|
|
unsigned nbits_from_pk( PKT_public_key *pk );
|
2017-07-20 13:36:44 +02:00
|
|
|
|
|
|
|
/* Convert an UTC TIMESTAMP into an UTC yyyy-mm-dd string. Return
|
|
|
|
* that string. The caller should pass a buffer with at least a size
|
|
|
|
* of MK_DATESTR_SIZE. */
|
|
|
|
char *mk_datestr (char *buffer, size_t bufsize, u32 timestamp);
|
|
|
|
#define MK_DATESTR_SIZE 11
|
|
|
|
|
2020-02-13 14:01:07 +01:00
|
|
|
const char *dateonlystr_from_pk (PKT_public_key *pk);
|
2003-06-05 09:14:21 +02:00
|
|
|
const char *datestr_from_pk( PKT_public_key *pk );
|
2020-02-13 14:01:07 +01:00
|
|
|
const char *dateonlystr_from_sig( PKT_signature *sig );
|
2003-06-05 09:14:21 +02:00
|
|
|
const char *datestr_from_sig( PKT_signature *sig );
|
|
|
|
const char *expirestr_from_pk( PKT_public_key *pk );
|
|
|
|
const char *expirestr_from_sig( PKT_signature *sig );
|
2006-04-19 13:26:11 +02:00
|
|
|
const char *revokestr_from_pk( PKT_public_key *pk );
|
2014-08-12 10:36:30 +02:00
|
|
|
const char *usagestr_from_pk (PKT_public_key *pk, int fill);
|
2003-06-05 09:14:21 +02:00
|
|
|
const char *colon_strtime (u32 t);
|
|
|
|
const char *colon_datestr_from_pk (PKT_public_key *pk);
|
|
|
|
const char *colon_datestr_from_sig (PKT_signature *sig);
|
|
|
|
const char *colon_expirestr_from_sig (PKT_signature *sig);
|
|
|
|
byte *fingerprint_from_pk( PKT_public_key *pk, byte *buf, size_t *ret_len );
|
2020-08-07 05:46:09 +02:00
|
|
|
void fpr20_from_pk (PKT_public_key *pk, byte array[20]);
|
2015-11-14 09:13:02 +01:00
|
|
|
char *hexfingerprint (PKT_public_key *pk, char *buffer, size_t buflen);
|
|
|
|
char *format_hexfingerprint (const char *fingerprint,
|
|
|
|
char *buffer, size_t buflen);
|
2010-04-20 19:57:50 +02:00
|
|
|
gpg_error_t keygrip_from_pk (PKT_public_key *pk, unsigned char *array);
|
|
|
|
gpg_error_t hexkeygrip_from_pk (PKT_public_key *pk, char **r_grip);
|
|
|
|
|
2003-06-05 09:14:21 +02:00
|
|
|
|
|
|
|
/*-- kbnode.c --*/
|
|
|
|
KBNODE new_kbnode( PACKET *pkt );
|
|
|
|
KBNODE clone_kbnode( KBNODE node );
|
|
|
|
void release_kbnode( KBNODE n );
|
|
|
|
void delete_kbnode( KBNODE node );
|
|
|
|
void add_kbnode( KBNODE root, KBNODE node );
|
|
|
|
void insert_kbnode( KBNODE root, KBNODE node, int pkttype );
|
|
|
|
void move_kbnode( KBNODE *root, KBNODE node, KBNODE where );
|
|
|
|
void remove_kbnode( KBNODE *root, KBNODE node );
|
|
|
|
KBNODE find_prev_kbnode( KBNODE root, KBNODE node, int pkttype );
|
|
|
|
KBNODE find_next_kbnode( KBNODE node, int pkttype );
|
|
|
|
KBNODE find_kbnode( KBNODE node, int pkttype );
|
|
|
|
KBNODE walk_kbnode( KBNODE root, KBNODE *context, int all );
|
|
|
|
void clear_kbnode_flags( KBNODE n );
|
|
|
|
int commit_kbnode( KBNODE *root );
|
|
|
|
void dump_kbnode( KBNODE node );
|
|
|
|
|
|
|
|
#endif /*G10_KEYDB_H*/
|