2009-12-08 17:30:33 +01:00
|
|
|
/* userids.c - Utility functions for user ids.
|
|
|
|
* Copyright (C) 2001, 2003, 2004, 2006,
|
|
|
|
* 2009 Free Software Foundation, Inc.
|
2015-11-06 12:31:16 +01:00
|
|
|
* Copyright (C) 2015 g10 Code GmbH
|
2009-12-08 17:30:33 +01:00
|
|
|
*
|
|
|
|
* This file is part of GnuPG.
|
|
|
|
*
|
Change license for some files in common to LGPLv3+/GPLv2+.
Having the LGPL on the common GnuPG code helps to share code
between GnuPG and related projects (like GPGME and Libassuan). This
is good for interoperability and to reduces bugs.
* common/asshelp.c, common/asshelp.h, common/asshelp2.c, common/b64dec.c
* common/b64enc.c, common/convert.c, common/dns-cert.c
* common/dns-cert.h common/exechelp-posix.c, common/exechelp-w32.c
* common/exechelp-w32ce.c, common/exechelp.h, common/get-passphrase.c
* common/get-passphrase.h, common/gettime.c, common/gpgrlhelp.c
* common/helpfile.c, common/homedir.c, common/http.c, common/http.h
* common/i18n.c, common/init.c, common/init.h, common/iobuf.c
* common/iobuf.h, common/localename.c, common/membuf.c, common/membuf.h
* common/miscellaneous.c, common/openpgp-oid.c, common/openpgpdefs.h
* common/percent.c, common/pka.c, common/pka.h, common/session-env.c
* common/session-env.h, common/sexp-parse.h, common/sexputil.c
* common/signal.c, common/srv.c, common/srv.h, common/ssh-utils.c
* common/ssh-utils.h, common/sysutils.c, common/sysutils.h
* common/tlv.c, common/tlv.h, common/ttyio.c, common/ttyio.h
* common/userids.c, common/userids.h, common/xasprintf.c: Change
license to LGPLv3+/GPLv2+/
2012-04-20 15:43:06 +02:00
|
|
|
* This file is free software; you can redistribute it and/or modify
|
|
|
|
* it under the terms of either
|
2009-12-08 17:30:33 +01:00
|
|
|
*
|
Change license for some files in common to LGPLv3+/GPLv2+.
Having the LGPL on the common GnuPG code helps to share code
between GnuPG and related projects (like GPGME and Libassuan). This
is good for interoperability and to reduces bugs.
* common/asshelp.c, common/asshelp.h, common/asshelp2.c, common/b64dec.c
* common/b64enc.c, common/convert.c, common/dns-cert.c
* common/dns-cert.h common/exechelp-posix.c, common/exechelp-w32.c
* common/exechelp-w32ce.c, common/exechelp.h, common/get-passphrase.c
* common/get-passphrase.h, common/gettime.c, common/gpgrlhelp.c
* common/helpfile.c, common/homedir.c, common/http.c, common/http.h
* common/i18n.c, common/init.c, common/init.h, common/iobuf.c
* common/iobuf.h, common/localename.c, common/membuf.c, common/membuf.h
* common/miscellaneous.c, common/openpgp-oid.c, common/openpgpdefs.h
* common/percent.c, common/pka.c, common/pka.h, common/session-env.c
* common/session-env.h, common/sexp-parse.h, common/sexputil.c
* common/signal.c, common/srv.c, common/srv.h, common/ssh-utils.c
* common/ssh-utils.h, common/sysutils.c, common/sysutils.h
* common/tlv.c, common/tlv.h, common/ttyio.c, common/ttyio.h
* common/userids.c, common/userids.h, common/xasprintf.c: Change
license to LGPLv3+/GPLv2+/
2012-04-20 15:43:06 +02:00
|
|
|
* - the GNU Lesser General Public License as published by the Free
|
|
|
|
* Software Foundation; either version 3 of the License, or (at
|
|
|
|
* your option) any later version.
|
|
|
|
*
|
|
|
|
* or
|
|
|
|
*
|
|
|
|
* - the GNU General Public License as published by the Free
|
|
|
|
* Software Foundation; either version 2 of the License, or (at
|
|
|
|
* your option) any later version.
|
|
|
|
*
|
|
|
|
* or both in parallel, as here.
|
|
|
|
*
|
|
|
|
* This file is distributed in the hope that it will be useful,
|
2009-12-08 17:30:33 +01:00
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU General Public License
|
2016-11-05 12:02:19 +01:00
|
|
|
* along with this program; if not, see <https://www.gnu.org/licenses/>.
|
2009-12-08 17:30:33 +01:00
|
|
|
*/
|
|
|
|
|
|
|
|
#include <config.h>
|
|
|
|
#include <stdio.h>
|
|
|
|
#include <stdlib.h>
|
|
|
|
#include <string.h>
|
|
|
|
|
|
|
|
#include "util.h"
|
|
|
|
#include "userids.h"
|
|
|
|
|
|
|
|
|
|
|
|
/* Parse the user-id NAME and build a search description for it.
|
2015-03-19 11:14:52 +01:00
|
|
|
* Returns 0 on success or an error code. DESC may be NULL to merely
|
2009-12-08 17:30:33 +01:00
|
|
|
* check the validity of a user-id.
|
|
|
|
*
|
|
|
|
* Some used rules:
|
|
|
|
* - If the username starts with 8,9,16 or 17 hex-digits (the first one
|
|
|
|
* must be in the range 0..9), this is considered a keyid; depending
|
|
|
|
* on the length a short or complete one.
|
|
|
|
* - If the username starts with 32,33,40 or 41 hex-digits (the first one
|
|
|
|
* must be in the range 0..9), this is considered a fingerprint.
|
|
|
|
* - If the username starts with a left angle, we assume it is a complete
|
|
|
|
* email address and look only at this part.
|
2011-02-04 12:57:53 +01:00
|
|
|
* - If the username starts with a colon we assume it is a unified
|
|
|
|
* key specfification.
|
2009-12-08 17:30:33 +01:00
|
|
|
* - If the username starts with a '.', we assume it is the ending
|
|
|
|
* part of an email address
|
|
|
|
* - If the username starts with an '@', we assume it is a part of an
|
|
|
|
* email address
|
|
|
|
* - If the userid start with an '=' an exact compare is done.
|
|
|
|
* - If the userid starts with a '*' a case insensitive substring search is
|
|
|
|
* done (This is the default).
|
|
|
|
* - If the userid starts with a '+' we will compare individual words
|
|
|
|
* and a match requires that all the words are in the userid.
|
|
|
|
* Words are delimited by white space or "()<>[]{}.@-+_,;/&!"
|
|
|
|
* (note that you can't search for these characters). Compare
|
|
|
|
* is not case sensitive.
|
|
|
|
* - If the userid starts with a '&' a 40 hex digits keygrip is expected.
|
2019-09-27 10:05:07 +02:00
|
|
|
* - If the userid starts with a '^' followed by 40 hex digits it describes
|
|
|
|
* a Unique-Blob-ID (UBID) which is the hash of keyblob or certificate as
|
|
|
|
* stored in the database. This is used in the IPC of the keyboxd.
|
2009-12-08 17:30:33 +01:00
|
|
|
*/
|
|
|
|
|
|
|
|
gpg_error_t
|
2011-04-25 23:56:47 +02:00
|
|
|
classify_user_id (const char *name, KEYDB_SEARCH_DESC *desc, int openpgp_hack)
|
2009-12-08 17:30:33 +01:00
|
|
|
{
|
|
|
|
const char *s;
|
2015-11-06 12:31:16 +01:00
|
|
|
char *s2 = NULL;
|
|
|
|
int rc = 0;
|
2009-12-08 17:30:33 +01:00
|
|
|
int hexprefix = 0;
|
|
|
|
int hexlength;
|
2011-02-04 12:57:53 +01:00
|
|
|
int mode = 0;
|
2009-12-08 17:30:33 +01:00
|
|
|
KEYDB_SEARCH_DESC dummy_desc;
|
|
|
|
|
|
|
|
if (!desc)
|
|
|
|
desc = &dummy_desc;
|
2011-02-04 12:57:53 +01:00
|
|
|
|
2009-12-08 17:30:33 +01:00
|
|
|
/* Clear the structure so that the mode field is set to zero unless
|
|
|
|
we set it to the correct value right at the end of this
|
|
|
|
function. */
|
|
|
|
memset (desc, 0, sizeof *desc);
|
|
|
|
|
2015-11-06 12:31:16 +01:00
|
|
|
/* Skip leading and trailing spaces. */
|
2009-12-08 17:30:33 +01:00
|
|
|
for(s = name; *s && spacep (s); s++ )
|
|
|
|
;
|
2015-11-06 13:20:01 +01:00
|
|
|
if (*s && spacep (s + strlen(s) - 1))
|
2015-11-06 12:31:16 +01:00
|
|
|
{
|
2015-11-06 13:20:01 +01:00
|
|
|
s2 = xtrystrdup (s);
|
|
|
|
if (!s2)
|
|
|
|
{
|
|
|
|
rc = gpg_error_from_syserror ();
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
trim_trailing_spaces (s2);
|
2015-11-06 12:31:16 +01:00
|
|
|
s = s2;
|
|
|
|
}
|
2009-12-08 17:30:33 +01:00
|
|
|
|
2011-02-04 12:57:53 +01:00
|
|
|
switch (*s)
|
2009-12-08 17:30:33 +01:00
|
|
|
{
|
|
|
|
case 0: /* Empty string is an error. */
|
2015-11-06 12:31:16 +01:00
|
|
|
rc = gpg_error (GPG_ERR_INV_USER_ID);
|
|
|
|
goto out;
|
2009-12-08 17:30:33 +01:00
|
|
|
|
|
|
|
case '.': /* An email address, compare from end. Note that this
|
|
|
|
has not yet been implemented in the search code. */
|
|
|
|
mode = KEYDB_SEARCH_MODE_MAILEND;
|
|
|
|
s++;
|
|
|
|
desc->u.name = s;
|
|
|
|
break;
|
|
|
|
|
|
|
|
case '<': /* An email address. */
|
|
|
|
mode = KEYDB_SEARCH_MODE_MAIL;
|
2011-04-25 23:56:47 +02:00
|
|
|
/* FIXME: The keyring code in g10 assumes that the mail name is
|
|
|
|
prefixed with an '<'. However the keybox code used for sm/
|
|
|
|
assumes it has been removed. For now we use this simple hack
|
|
|
|
to overcome the problem. */
|
|
|
|
if (!openpgp_hack)
|
|
|
|
s++;
|
2009-12-08 17:30:33 +01:00
|
|
|
desc->u.name = s;
|
|
|
|
break;
|
|
|
|
|
|
|
|
case '@': /* Part of an email address. */
|
|
|
|
mode = KEYDB_SEARCH_MODE_MAILSUB;
|
|
|
|
s++;
|
|
|
|
desc->u.name = s;
|
|
|
|
break;
|
|
|
|
|
|
|
|
case '=': /* Exact compare. */
|
|
|
|
mode = KEYDB_SEARCH_MODE_EXACT;
|
|
|
|
s++;
|
|
|
|
desc->u.name = s;
|
|
|
|
break;
|
|
|
|
|
|
|
|
case '*': /* Case insensitive substring search. */
|
|
|
|
mode = KEYDB_SEARCH_MODE_SUBSTR;
|
|
|
|
s++;
|
|
|
|
desc->u.name = s;
|
|
|
|
break;
|
|
|
|
|
|
|
|
case '+': /* Compare individual words. Note that this has not
|
|
|
|
yet been implemented in the search code. */
|
|
|
|
mode = KEYDB_SEARCH_MODE_WORDS;
|
|
|
|
s++;
|
|
|
|
desc->u.name = s;
|
|
|
|
break;
|
|
|
|
|
|
|
|
case '/': /* Subject's DN. */
|
|
|
|
s++;
|
|
|
|
if (!*s || spacep (s)) /* No DN or prefixed with a space. */
|
2015-11-06 12:31:16 +01:00
|
|
|
{
|
|
|
|
rc = gpg_error (GPG_ERR_INV_USER_ID);
|
|
|
|
goto out;
|
|
|
|
}
|
2009-12-08 17:30:33 +01:00
|
|
|
desc->u.name = s;
|
|
|
|
mode = KEYDB_SEARCH_MODE_SUBJECT;
|
|
|
|
break;
|
|
|
|
|
|
|
|
case '#': /* S/N with optional issuer id or just issuer id. */
|
2011-02-04 12:57:53 +01:00
|
|
|
{
|
2009-12-08 17:30:33 +01:00
|
|
|
const char *si;
|
2011-02-04 12:57:53 +01:00
|
|
|
|
2009-12-08 17:30:33 +01:00
|
|
|
s++;
|
|
|
|
if ( *s == '/')
|
|
|
|
{ /* "#/" indicates an issuer's DN. */
|
|
|
|
s++;
|
|
|
|
if (!*s || spacep (s)) /* No DN or prefixed with a space. */
|
2015-11-06 12:31:16 +01:00
|
|
|
{
|
|
|
|
rc = gpg_error (GPG_ERR_INV_USER_ID);
|
|
|
|
goto out;
|
|
|
|
}
|
2009-12-08 17:30:33 +01:00
|
|
|
desc->u.name = s;
|
|
|
|
mode = KEYDB_SEARCH_MODE_ISSUER;
|
|
|
|
}
|
2011-02-04 12:57:53 +01:00
|
|
|
else
|
2009-12-08 17:30:33 +01:00
|
|
|
{ /* Serialnumber + optional issuer ID. */
|
|
|
|
for (si=s; *si && *si != '/'; si++)
|
|
|
|
{
|
|
|
|
/* Check for an invalid digit in the serial number. */
|
|
|
|
if (!strchr("01234567890abcdefABCDEF", *si))
|
2015-11-06 12:31:16 +01:00
|
|
|
{
|
|
|
|
rc = gpg_error (GPG_ERR_INV_USER_ID);
|
|
|
|
goto out;
|
|
|
|
}
|
2009-12-08 17:30:33 +01:00
|
|
|
}
|
|
|
|
desc->sn = (const unsigned char*)s;
|
2020-09-08 10:05:08 +02:00
|
|
|
desc->snlen = si - s;
|
|
|
|
desc->snhex = 1;
|
2009-12-08 17:30:33 +01:00
|
|
|
if (!*si)
|
|
|
|
mode = KEYDB_SEARCH_MODE_SN;
|
|
|
|
else
|
|
|
|
{
|
|
|
|
s = si+1;
|
|
|
|
if (!*s || spacep (s)) /* No DN or prefixed with a space. */
|
2015-11-06 12:31:16 +01:00
|
|
|
{
|
|
|
|
rc = gpg_error (GPG_ERR_INV_USER_ID);
|
|
|
|
goto out;
|
|
|
|
}
|
2009-12-08 17:30:33 +01:00
|
|
|
desc->u.name = s;
|
|
|
|
mode = KEYDB_SEARCH_MODE_ISSUER_SN;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
|
|
|
|
case ':': /* Unified fingerprint. */
|
2011-02-04 12:57:53 +01:00
|
|
|
{
|
2009-12-08 17:30:33 +01:00
|
|
|
const char *se, *si;
|
|
|
|
int i;
|
2011-02-04 12:57:53 +01:00
|
|
|
|
2009-12-08 17:30:33 +01:00
|
|
|
se = strchr (++s,':');
|
|
|
|
if (!se)
|
2015-11-06 12:31:16 +01:00
|
|
|
{
|
|
|
|
rc = gpg_error (GPG_ERR_INV_USER_ID);
|
|
|
|
goto out;
|
|
|
|
}
|
2009-12-08 17:30:33 +01:00
|
|
|
for (i=0,si=s; si < se; si++, i++ )
|
|
|
|
{
|
|
|
|
if (!strchr("01234567890abcdefABCDEF", *si))
|
2015-11-06 12:31:16 +01:00
|
|
|
{
|
|
|
|
rc = gpg_error (GPG_ERR_INV_USER_ID); /* Invalid digit. */
|
|
|
|
goto out;
|
|
|
|
}
|
2009-12-08 17:30:33 +01:00
|
|
|
}
|
2019-03-14 08:54:59 +01:00
|
|
|
if (i != 32 && i != 40 && i != 64)
|
2015-11-06 12:31:16 +01:00
|
|
|
{
|
|
|
|
rc = gpg_error (GPG_ERR_INV_USER_ID); /* Invalid length of fpr. */
|
|
|
|
goto out;
|
|
|
|
}
|
2011-02-04 12:57:53 +01:00
|
|
|
for (i=0,si=s; si < se; i++, si +=2)
|
2009-12-08 17:30:33 +01:00
|
|
|
desc->u.fpr[i] = hextobyte(si);
|
2019-03-14 08:54:59 +01:00
|
|
|
desc->fprlen = i;
|
|
|
|
for (; i < 32; i++)
|
2009-12-08 17:30:33 +01:00
|
|
|
desc->u.fpr[i]= 0;
|
|
|
|
mode = KEYDB_SEARCH_MODE_FPR;
|
2011-02-04 12:57:53 +01:00
|
|
|
}
|
2009-12-08 17:30:33 +01:00
|
|
|
break;
|
|
|
|
|
|
|
|
case '&': /* Keygrip*/
|
2011-02-04 12:57:53 +01:00
|
|
|
{
|
2009-12-08 17:30:33 +01:00
|
|
|
if (hex2bin (s+1, desc->u.grip, 20) < 0)
|
2015-11-06 12:31:16 +01:00
|
|
|
{
|
|
|
|
rc = gpg_error (GPG_ERR_INV_USER_ID); /* Invalid. */
|
|
|
|
goto out;
|
|
|
|
}
|
2009-12-08 17:30:33 +01:00
|
|
|
mode = KEYDB_SEARCH_MODE_KEYGRIP;
|
2011-02-04 12:57:53 +01:00
|
|
|
}
|
2009-12-08 17:30:33 +01:00
|
|
|
break;
|
|
|
|
|
2019-09-27 10:05:07 +02:00
|
|
|
case '^': /* UBID */
|
|
|
|
{
|
2019-11-28 09:39:35 +01:00
|
|
|
if (hex2bin (s+1, desc->u.ubid, UBID_LEN) < 0)
|
2019-09-27 10:05:07 +02:00
|
|
|
{
|
|
|
|
rc = gpg_error (GPG_ERR_INV_USER_ID); /* Invalid. */
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
mode = KEYDB_SEARCH_MODE_UBID;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
|
2009-12-08 17:30:33 +01:00
|
|
|
default:
|
|
|
|
if (s[0] == '0' && s[1] == 'x')
|
|
|
|
{
|
|
|
|
hexprefix = 1;
|
|
|
|
s += 2;
|
|
|
|
}
|
|
|
|
|
|
|
|
hexlength = strspn(s, "0123456789abcdefABCDEF");
|
|
|
|
if (hexlength >= 8 && s[hexlength] =='!')
|
|
|
|
{
|
|
|
|
desc->exact = 1;
|
|
|
|
hexlength++; /* Just for the following check. */
|
|
|
|
}
|
2011-02-04 12:57:53 +01:00
|
|
|
|
2009-12-08 17:30:33 +01:00
|
|
|
/* Check if a hexadecimal number is terminated by EOS or blank. */
|
2011-02-04 12:57:53 +01:00
|
|
|
if (hexlength && s[hexlength] && !spacep (s+hexlength))
|
2009-12-08 17:30:33 +01:00
|
|
|
{
|
|
|
|
if (hexprefix) /* A "0x" prefix without a correct
|
|
|
|
termination is an error. */
|
2015-11-06 12:31:16 +01:00
|
|
|
{
|
|
|
|
rc = gpg_error (GPG_ERR_INV_USER_ID);
|
|
|
|
goto out;
|
|
|
|
}
|
2009-12-08 17:30:33 +01:00
|
|
|
/* The first characters looked like a hex number, but the
|
|
|
|
entire string is not. */
|
2011-02-04 12:57:53 +01:00
|
|
|
hexlength = 0;
|
2009-12-08 17:30:33 +01:00
|
|
|
}
|
2011-02-04 12:57:53 +01:00
|
|
|
|
2009-12-08 17:30:33 +01:00
|
|
|
if (desc->exact)
|
|
|
|
hexlength--; /* Remove the bang. */
|
|
|
|
|
2015-12-02 11:07:05 +01:00
|
|
|
if ((hexlength == 8
|
|
|
|
&& (s[hexlength] == 0
|
|
|
|
|| (s[hexlength] == '!' && s[hexlength + 1] == 0)))
|
2009-12-08 17:30:33 +01:00
|
|
|
|| (!hexprefix && hexlength == 9 && *s == '0'))
|
2011-02-04 12:57:53 +01:00
|
|
|
{
|
2009-12-08 17:30:33 +01:00
|
|
|
/* Short keyid. */
|
|
|
|
if (hexlength == 9)
|
2011-02-04 12:57:53 +01:00
|
|
|
s++;
|
2009-12-08 17:30:33 +01:00
|
|
|
desc->u.kid[1] = strtoul( s, NULL, 16 );
|
|
|
|
mode = KEYDB_SEARCH_MODE_SHORT_KID;
|
|
|
|
}
|
2015-12-02 11:07:05 +01:00
|
|
|
else if ((hexlength == 16
|
|
|
|
&& (s[hexlength] == 0
|
|
|
|
|| (s[hexlength] == '!' && s[hexlength + 1] == 0)))
|
2009-12-08 17:30:33 +01:00
|
|
|
|| (!hexprefix && hexlength == 17 && *s == '0'))
|
2011-02-04 12:57:53 +01:00
|
|
|
{
|
2009-12-08 17:30:33 +01:00
|
|
|
/* Long keyid. */
|
|
|
|
char buf[9];
|
|
|
|
if (hexlength == 17)
|
|
|
|
s++;
|
|
|
|
mem2str (buf, s, 9);
|
|
|
|
desc->u.kid[0] = strtoul (buf, NULL, 16);
|
|
|
|
desc->u.kid[1] = strtoul (s+8, NULL, 16);
|
|
|
|
mode = KEYDB_SEARCH_MODE_LONG_KID;
|
|
|
|
}
|
2015-12-02 11:07:05 +01:00
|
|
|
else if ((hexlength == 32
|
|
|
|
&& (s[hexlength] == 0
|
|
|
|
|| (s[hexlength] == '!' && s[hexlength + 1] == 0)))
|
2009-12-08 17:30:33 +01:00
|
|
|
|| (!hexprefix && hexlength == 33 && *s == '0'))
|
2011-02-04 12:57:53 +01:00
|
|
|
{
|
2009-12-08 17:30:33 +01:00
|
|
|
/* MD5 fingerprint. */
|
|
|
|
int i;
|
|
|
|
if (hexlength == 33)
|
|
|
|
s++;
|
2011-02-04 12:57:53 +01:00
|
|
|
memset (desc->u.fpr+16, 0, 4);
|
|
|
|
for (i=0; i < 16; i++, s+=2)
|
2009-12-08 17:30:33 +01:00
|
|
|
{
|
|
|
|
int c = hextobyte(s);
|
|
|
|
if (c == -1)
|
2015-11-06 12:31:16 +01:00
|
|
|
{
|
|
|
|
rc = gpg_error (GPG_ERR_INV_USER_ID);
|
|
|
|
goto out;
|
|
|
|
}
|
2009-12-08 17:30:33 +01:00
|
|
|
desc->u.fpr[i] = c;
|
|
|
|
}
|
2019-03-14 14:55:06 +01:00
|
|
|
desc->fprlen = 16;
|
2019-03-14 08:54:59 +01:00
|
|
|
for (; i < 32; i++)
|
|
|
|
desc->u.fpr[i]= 0;
|
2019-03-14 14:55:06 +01:00
|
|
|
mode = KEYDB_SEARCH_MODE_FPR;
|
2009-12-08 17:30:33 +01:00
|
|
|
}
|
2015-12-02 11:07:05 +01:00
|
|
|
else if ((hexlength == 40
|
|
|
|
&& (s[hexlength] == 0
|
|
|
|
|| (s[hexlength] == '!' && s[hexlength + 1] == 0)))
|
2009-12-08 17:30:33 +01:00
|
|
|
|| (!hexprefix && hexlength == 41 && *s == '0'))
|
2011-02-04 12:57:53 +01:00
|
|
|
{
|
2019-03-14 08:54:59 +01:00
|
|
|
/* SHA1 fingerprint. */
|
2009-12-08 17:30:33 +01:00
|
|
|
int i;
|
|
|
|
if (hexlength == 41)
|
|
|
|
s++;
|
2011-02-04 12:57:53 +01:00
|
|
|
for (i=0; i < 20; i++, s+=2)
|
2009-12-08 17:30:33 +01:00
|
|
|
{
|
|
|
|
int c = hextobyte(s);
|
|
|
|
if (c == -1)
|
2015-11-06 12:31:16 +01:00
|
|
|
{
|
|
|
|
rc = gpg_error (GPG_ERR_INV_USER_ID);
|
|
|
|
goto out;
|
|
|
|
}
|
2009-12-08 17:30:33 +01:00
|
|
|
desc->u.fpr[i] = c;
|
|
|
|
}
|
2019-03-14 14:55:06 +01:00
|
|
|
desc->fprlen = 20;
|
2019-03-14 08:54:59 +01:00
|
|
|
for (; i < 32; i++)
|
|
|
|
desc->u.fpr[i]= 0;
|
2019-03-14 14:55:06 +01:00
|
|
|
mode = KEYDB_SEARCH_MODE_FPR;
|
2009-12-08 17:30:33 +01:00
|
|
|
}
|
2019-03-14 08:54:59 +01:00
|
|
|
else if ((hexlength == 64
|
|
|
|
&& (s[hexlength] == 0
|
|
|
|
|| (s[hexlength] == '!' && s[hexlength + 1] == 0)))
|
|
|
|
|| (!hexprefix && hexlength == 65 && *s == '0'))
|
|
|
|
{
|
|
|
|
/* SHA256 fingerprint. */
|
|
|
|
int i;
|
|
|
|
if (hexlength == 65)
|
|
|
|
s++;
|
|
|
|
for (i=0; i < 32; i++, s+=2)
|
|
|
|
{
|
|
|
|
int c = hextobyte(s);
|
|
|
|
if (c == -1)
|
|
|
|
{
|
|
|
|
rc = gpg_error (GPG_ERR_INV_USER_ID);
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
desc->u.fpr[i] = c;
|
|
|
|
}
|
2019-03-14 14:55:06 +01:00
|
|
|
desc->fprlen = 32;
|
|
|
|
mode = KEYDB_SEARCH_MODE_FPR;
|
2019-03-14 08:54:59 +01:00
|
|
|
}
|
2009-12-08 17:30:33 +01:00
|
|
|
else if (!hexprefix)
|
2011-02-04 12:57:53 +01:00
|
|
|
{
|
2019-05-27 10:40:38 +02:00
|
|
|
/* The fingerprint of an X.509 listing is often delimited by
|
|
|
|
* colons, so we try to single this case out. Note that the
|
|
|
|
* OpenPGP bang suffix is not supported here. */
|
|
|
|
desc->exact = 0;
|
2009-12-08 17:30:33 +01:00
|
|
|
mode = 0;
|
|
|
|
hexlength = strspn (s, ":0123456789abcdefABCDEF");
|
2011-02-04 12:57:53 +01:00
|
|
|
if (hexlength == 59 && (!s[hexlength] || spacep (s+hexlength)))
|
2009-12-08 17:30:33 +01:00
|
|
|
{
|
|
|
|
int i;
|
|
|
|
|
2011-02-04 12:57:53 +01:00
|
|
|
for (i=0; i < 20; i++, s += 3)
|
2009-12-08 17:30:33 +01:00
|
|
|
{
|
|
|
|
int c = hextobyte(s);
|
|
|
|
if (c == -1 || (i < 19 && s[2] != ':'))
|
|
|
|
break;
|
|
|
|
desc->u.fpr[i] = c;
|
|
|
|
}
|
|
|
|
if (i == 20)
|
2019-03-14 14:55:06 +01:00
|
|
|
{
|
|
|
|
desc->fprlen = 20;
|
|
|
|
mode = KEYDB_SEARCH_MODE_FPR;
|
|
|
|
}
|
2019-03-14 08:54:59 +01:00
|
|
|
for (; i < 32; i++)
|
|
|
|
desc->u.fpr[i]= 0;
|
2009-12-08 17:30:33 +01:00
|
|
|
}
|
2012-01-06 13:33:10 +01:00
|
|
|
if (!mode)
|
|
|
|
{
|
|
|
|
/* Still not found. Now check for a space separated
|
2019-03-14 08:54:59 +01:00
|
|
|
* OpenPGP v4 fingerprint like:
|
|
|
|
* 8061 5870 F5BA D690 3336 86D0 F2AD 85AC 1E42 B367
|
|
|
|
* or
|
|
|
|
* 8061 5870 F5BA D690 3336 86D0 F2AD 85AC 1E42 B367
|
|
|
|
* FIXME: Support OpenPGP v5 fingerprint
|
2012-01-06 13:33:10 +01:00
|
|
|
*/
|
|
|
|
hexlength = strspn (s, " 0123456789abcdefABCDEF");
|
|
|
|
if (s[hexlength] && s[hexlength] != ' ')
|
|
|
|
hexlength = 0; /* Followed by non-space. */
|
|
|
|
while (hexlength && s[hexlength-1] == ' ')
|
|
|
|
hexlength--; /* Trim trailing spaces. */
|
2012-01-06 15:17:49 +01:00
|
|
|
if ((hexlength == 49 || hexlength == 50)
|
|
|
|
&& (!s[hexlength] || s[hexlength] == ' '))
|
2012-01-06 13:33:10 +01:00
|
|
|
{
|
|
|
|
int i, c;
|
|
|
|
|
|
|
|
for (i=0; i < 20; i++)
|
|
|
|
{
|
|
|
|
if (i && !(i % 2))
|
|
|
|
{
|
|
|
|
if (*s != ' ')
|
|
|
|
break;
|
|
|
|
s++;
|
2012-01-06 15:17:49 +01:00
|
|
|
/* Skip the double space in the middle but
|
|
|
|
don't require it to help copying
|
|
|
|
fingerprints from sources which fold
|
|
|
|
multiple space to one. */
|
|
|
|
if (i == 10 && *s == ' ')
|
|
|
|
s++;
|
2012-01-06 13:33:10 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
c = hextobyte(s);
|
|
|
|
if (c == -1)
|
|
|
|
break;
|
|
|
|
desc->u.fpr[i] = c;
|
|
|
|
s += 2;
|
|
|
|
}
|
|
|
|
if (i == 20)
|
2019-03-14 14:55:06 +01:00
|
|
|
{
|
|
|
|
desc->fprlen = 20;
|
|
|
|
mode = KEYDB_SEARCH_MODE_FPR;
|
|
|
|
}
|
2019-03-14 08:54:59 +01:00
|
|
|
for (; i < 32; i++)
|
|
|
|
desc->u.fpr[i]= 0;
|
2012-01-06 13:33:10 +01:00
|
|
|
}
|
|
|
|
}
|
2009-12-08 17:30:33 +01:00
|
|
|
if (!mode) /* Default to substring search. */
|
2011-02-04 12:57:53 +01:00
|
|
|
{
|
2009-12-08 17:30:33 +01:00
|
|
|
desc->u.name = s;
|
2011-02-04 12:57:53 +01:00
|
|
|
mode = KEYDB_SEARCH_MODE_SUBSTR;
|
2009-12-08 17:30:33 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
else
|
2011-02-04 12:57:53 +01:00
|
|
|
{
|
2009-12-08 17:30:33 +01:00
|
|
|
/* Hex number with a prefix but with a wrong length. */
|
2015-11-06 12:31:16 +01:00
|
|
|
rc = gpg_error (GPG_ERR_INV_USER_ID);
|
|
|
|
goto out;
|
2009-12-08 17:30:33 +01:00
|
|
|
}
|
|
|
|
}
|
2011-02-04 12:57:53 +01:00
|
|
|
|
2009-12-08 17:30:33 +01:00
|
|
|
desc->mode = mode;
|
2015-11-06 12:31:16 +01:00
|
|
|
out:
|
|
|
|
xfree (s2);
|
|
|
|
return rc;
|
2009-12-08 17:30:33 +01:00
|
|
|
}
|