2003-06-05 09:14:21 +02:00
|
|
|
|
/* getkey.c - Get a key from the database
|
2008-04-16 18:11:41 +02:00
|
|
|
|
* Copyright (C) 1998, 1999, 2000, 2001, 2002, 2003, 2004, 2005, 2006,
|
2010-01-09 20:00:46 +01:00
|
|
|
|
* 2007, 2008, 2010 Free Software Foundation, Inc.
|
2016-07-06 14:03:50 +02:00
|
|
|
|
* Copyright (C) 2015, 2016 g10 Code GmbH
|
2003-06-05 09:14:21 +02:00
|
|
|
|
*
|
|
|
|
|
* This file is part of GnuPG.
|
|
|
|
|
*
|
|
|
|
|
* GnuPG is free software; you can redistribute it and/or modify
|
|
|
|
|
* it under the terms of the GNU General Public License as published by
|
2007-07-04 21:49:40 +02:00
|
|
|
|
* the Free Software Foundation; either version 3 of the License, or
|
2003-06-05 09:14:21 +02:00
|
|
|
|
* (at your option) any later version.
|
|
|
|
|
*
|
|
|
|
|
* GnuPG is distributed in the hope that it will be useful,
|
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
|
* GNU General Public License for more details.
|
|
|
|
|
*
|
|
|
|
|
* You should have received a copy of the GNU General Public License
|
2016-11-05 12:02:19 +01:00
|
|
|
|
* along with this program; if not, see <https://www.gnu.org/licenses/>.
|
2003-06-05 09:14:21 +02:00
|
|
|
|
*/
|
|
|
|
|
|
|
|
|
|
#include <config.h>
|
|
|
|
|
#include <stdio.h>
|
|
|
|
|
#include <stdlib.h>
|
|
|
|
|
#include <string.h>
|
|
|
|
|
#include <ctype.h>
|
2003-06-18 21:56:13 +02:00
|
|
|
|
|
|
|
|
|
#include "gpg.h"
|
2017-03-07 12:21:23 +01:00
|
|
|
|
#include "../common/util.h"
|
2003-06-05 09:14:21 +02:00
|
|
|
|
#include "packet.h"
|
2017-03-07 12:21:23 +01:00
|
|
|
|
#include "../common/iobuf.h"
|
2003-06-05 09:14:21 +02:00
|
|
|
|
#include "keydb.h"
|
|
|
|
|
#include "options.h"
|
|
|
|
|
#include "main.h"
|
|
|
|
|
#include "trustdb.h"
|
2017-03-07 12:21:23 +01:00
|
|
|
|
#include "../common/i18n.h"
|
2006-04-19 13:26:11 +02:00
|
|
|
|
#include "keyserver-internal.h"
|
2010-04-21 18:26:17 +02:00
|
|
|
|
#include "call-agent.h"
|
2019-04-13 11:48:58 +02:00
|
|
|
|
#include "objcache.h"
|
2017-03-07 12:21:23 +01:00
|
|
|
|
#include "../common/host2net.h"
|
|
|
|
|
#include "../common/mbox-util.h"
|
|
|
|
|
#include "../common/status.h"
|
2003-06-05 09:14:21 +02:00
|
|
|
|
|
2006-04-19 13:26:11 +02:00
|
|
|
|
#define MAX_PK_CACHE_ENTRIES PK_UID_CACHE_SIZE
|
|
|
|
|
#define MAX_UID_CACHE_ENTRIES PK_UID_CACHE_SIZE
|
2003-06-05 09:14:21 +02:00
|
|
|
|
|
|
|
|
|
#if MAX_PK_CACHE_ENTRIES < 2
|
|
|
|
|
#error We need the cache for key creation
|
|
|
|
|
#endif
|
|
|
|
|
|
2016-05-13 16:24:59 +02:00
|
|
|
|
/* Flags values returned by the lookup code. Note that the values are
|
|
|
|
|
* directly used by the KEY_CONSIDERED status line. */
|
|
|
|
|
#define LOOKUP_NOT_SELECTED (1<<0)
|
|
|
|
|
#define LOOKUP_ALL_SUBKEYS_EXPIRED (1<<1) /* or revoked */
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
/* A context object used by the lookup functions. */
|
2010-01-09 20:00:46 +01:00
|
|
|
|
struct getkey_ctx_s
|
|
|
|
|
{
|
2015-09-16 14:01:48 +02:00
|
|
|
|
/* Part of the search criteria: whether the search is an exact
|
|
|
|
|
search or not. A search that is exact requires that a key or
|
|
|
|
|
subkey meet all of the specified criteria. A search that is not
|
|
|
|
|
exact allows selecting a different key or subkey from the
|
2018-10-24 21:56:18 +02:00
|
|
|
|
keyblock that matched the criteria. Further, an exact search
|
2015-09-16 14:01:48 +02:00
|
|
|
|
returns the key or subkey that matched whereas a non-exact search
|
|
|
|
|
typically returns the primary key. See finish_lookup for
|
|
|
|
|
details. */
|
2010-01-09 20:00:46 +01:00
|
|
|
|
int exact;
|
2015-09-16 14:01:48 +02:00
|
|
|
|
|
|
|
|
|
/* Part of the search criteria: Whether the caller only wants keys
|
|
|
|
|
with an available secret key. This is used by getkey_next to get
|
|
|
|
|
the next result with the same initial criteria. */
|
|
|
|
|
int want_secret;
|
|
|
|
|
|
|
|
|
|
/* Part of the search criteria: The type of the requested key. A
|
|
|
|
|
mask of PUBKEY_USAGE_SIG, PUBKEY_USAGE_ENC and PUBKEY_USAGE_CERT.
|
|
|
|
|
If non-zero, then for a key to match, it must implement one of
|
|
|
|
|
the required uses. */
|
2010-01-09 20:00:46 +01:00
|
|
|
|
int req_usage;
|
2015-09-16 14:01:48 +02:00
|
|
|
|
|
|
|
|
|
/* The database handle. */
|
2010-01-09 20:00:46 +01:00
|
|
|
|
KEYDB_HANDLE kr_handle;
|
2015-09-16 14:01:48 +02:00
|
|
|
|
|
|
|
|
|
/* Whether we should call xfree() on the context when the context is
|
|
|
|
|
released using getkey_end()). */
|
2010-01-09 20:00:46 +01:00
|
|
|
|
int not_allocated;
|
2015-09-16 14:01:48 +02:00
|
|
|
|
|
2015-11-13 12:56:13 +01:00
|
|
|
|
/* This variable is used as backing store for strings which have
|
|
|
|
|
their address used in ITEMS. */
|
|
|
|
|
strlist_t extra_list;
|
|
|
|
|
|
2018-08-28 15:22:35 +02:00
|
|
|
|
/* Hack to return the mechanism (AKL_foo) used to find the key. */
|
|
|
|
|
int found_via_akl;
|
|
|
|
|
|
2015-09-16 14:01:48 +02:00
|
|
|
|
/* Part of the search criteria: The low-level search specification
|
|
|
|
|
as passed to keydb_search. */
|
2010-01-09 20:00:46 +01:00
|
|
|
|
int nitems;
|
2015-09-16 14:01:48 +02:00
|
|
|
|
/* This must be the last element in the structure. When we allocate
|
|
|
|
|
the structure, we allocate it so that ITEMS can hold NITEMS. */
|
2010-01-09 20:00:46 +01:00
|
|
|
|
KEYDB_SEARCH_DESC items[1];
|
2003-06-05 09:14:21 +02:00
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
#if 0
|
2010-01-09 20:00:46 +01:00
|
|
|
|
static struct
|
|
|
|
|
{
|
|
|
|
|
int any;
|
|
|
|
|
int okay_count;
|
|
|
|
|
int nokey_count;
|
|
|
|
|
int error_count;
|
2003-06-05 09:14:21 +02:00
|
|
|
|
} lkup_stats[21];
|
|
|
|
|
#endif
|
|
|
|
|
|
2010-01-09 20:00:46 +01:00
|
|
|
|
typedef struct keyid_list
|
|
|
|
|
{
|
|
|
|
|
struct keyid_list *next;
|
2019-04-05 17:02:43 +02:00
|
|
|
|
byte fprlen;
|
2014-10-13 14:54:26 +02:00
|
|
|
|
char fpr[MAX_FINGERPRINT_LEN];
|
2010-01-09 20:00:46 +01:00
|
|
|
|
u32 keyid[2];
|
2003-06-05 09:14:21 +02:00
|
|
|
|
} *keyid_list_t;
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
#if MAX_PK_CACHE_ENTRIES
|
2010-01-09 20:00:46 +01:00
|
|
|
|
typedef struct pk_cache_entry
|
|
|
|
|
{
|
|
|
|
|
struct pk_cache_entry *next;
|
|
|
|
|
u32 keyid[2];
|
|
|
|
|
PKT_public_key *pk;
|
|
|
|
|
} *pk_cache_entry_t;
|
|
|
|
|
static pk_cache_entry_t pk_cache;
|
|
|
|
|
static int pk_cache_entries; /* Number of entries in pk cache. */
|
|
|
|
|
static int pk_cache_disabled;
|
2003-06-05 09:14:21 +02:00
|
|
|
|
#endif
|
|
|
|
|
|
|
|
|
|
#if MAX_UID_CACHE_ENTRIES < 5
|
|
|
|
|
#error we really need the userid cache
|
|
|
|
|
#endif
|
|
|
|
|
|
2017-03-31 20:03:52 +02:00
|
|
|
|
static void merge_selfsigs (ctrl_t ctrl, kbnode_t keyblock);
|
|
|
|
|
static int lookup (ctrl_t ctrl, getkey_ctx_t ctx, int want_secret,
|
|
|
|
|
kbnode_t *ret_keyblock, kbnode_t *ret_found_key);
|
2016-07-06 14:03:50 +02:00
|
|
|
|
static kbnode_t finish_lookup (kbnode_t keyblock,
|
|
|
|
|
unsigned int req_usage, int want_exact,
|
2017-09-26 04:02:05 +02:00
|
|
|
|
int want_secret, unsigned int *r_flags);
|
2016-07-06 14:03:50 +02:00
|
|
|
|
static void print_status_key_considered (kbnode_t keyblock, unsigned int flags);
|
|
|
|
|
|
2003-06-05 09:14:21 +02:00
|
|
|
|
|
|
|
|
|
#if 0
|
|
|
|
|
static void
|
2010-01-09 20:00:46 +01:00
|
|
|
|
print_stats ()
|
2003-06-05 09:14:21 +02:00
|
|
|
|
{
|
2010-01-09 20:00:46 +01:00
|
|
|
|
int i;
|
|
|
|
|
for (i = 0; i < DIM (lkup_stats); i++)
|
|
|
|
|
{
|
|
|
|
|
if (lkup_stats[i].any)
|
2015-02-19 17:22:27 +01:00
|
|
|
|
es_fprintf (es_stderr,
|
2010-01-09 20:00:46 +01:00
|
|
|
|
"lookup stats: mode=%-2d ok=%-6d nokey=%-6d err=%-6d\n",
|
|
|
|
|
i,
|
|
|
|
|
lkup_stats[i].okay_count,
|
|
|
|
|
lkup_stats[i].nokey_count, lkup_stats[i].error_count);
|
2003-06-05 09:14:21 +02:00
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
#endif
|
|
|
|
|
|
|
|
|
|
|
2016-01-11 11:41:49 +01:00
|
|
|
|
/* Cache a copy of a public key in the public key cache. PK is not
|
|
|
|
|
* cached if caching is disabled (via getkey_disable_caches), if
|
|
|
|
|
* PK->FLAGS.DONT_CACHE is set, we don't know how to derive a key id
|
|
|
|
|
* from the public key (e.g., unsupported algorithm), or a key with
|
|
|
|
|
* the key id is already in the cache.
|
|
|
|
|
*
|
|
|
|
|
* The public key packet is copied into the cache using
|
|
|
|
|
* copy_public_key. Thus, any secret parts are not copied, for
|
|
|
|
|
* instance.
|
|
|
|
|
*
|
|
|
|
|
* This cache is filled by get_pubkey and is read by get_pubkey and
|
|
|
|
|
* get_pubkey_fast. */
|
2003-06-05 09:14:21 +02:00
|
|
|
|
void
|
2010-01-09 20:00:46 +01:00
|
|
|
|
cache_public_key (PKT_public_key * pk)
|
2003-06-05 09:14:21 +02:00
|
|
|
|
{
|
|
|
|
|
#if MAX_PK_CACHE_ENTRIES
|
2013-01-07 15:37:50 +01:00
|
|
|
|
pk_cache_entry_t ce, ce2;
|
2010-01-09 20:00:46 +01:00
|
|
|
|
u32 keyid[2];
|
2003-06-05 09:14:21 +02:00
|
|
|
|
|
2010-01-09 20:00:46 +01:00
|
|
|
|
if (pk_cache_disabled)
|
|
|
|
|
return;
|
2003-06-05 09:14:21 +02:00
|
|
|
|
|
2010-10-20 13:33:50 +02:00
|
|
|
|
if (pk->flags.dont_cache)
|
2010-01-09 20:00:46 +01:00
|
|
|
|
return;
|
2003-06-05 09:14:21 +02:00
|
|
|
|
|
2010-01-09 20:00:46 +01:00
|
|
|
|
if (is_ELGAMAL (pk->pubkey_algo)
|
2011-01-06 02:33:17 +01:00
|
|
|
|
|| pk->pubkey_algo == PUBKEY_ALGO_DSA
|
|
|
|
|
|| pk->pubkey_algo == PUBKEY_ALGO_ECDSA
|
gpg: Use only OpenPGP public key algo ids and add the EdDSA algo id.
* common/sexputil.c (get_pk_algo_from_canon_sexp): Change to return a
string.
* g10/keygen.c (check_keygrip): Adjust for change.
* sm/certreqgen-ui.c (check_keygrip): Likewise.
* agent/pksign.c (do_encode_dsa): Remove bogus map_pk_openpgp_to_gcry.
* g10/misc.c (map_pk_openpgp_to_gcry): Remove.
(openpgp_pk_test_algo): Change to a wrapper for openpgp_pk_test_algo2.
(openpgp_pk_test_algo2): Rewrite.
(openpgp_pk_algo_usage, pubkey_nbits): Add support for EdDSA.
(openpgp_pk_algo_name): Rewrite to remove need for gcry calls.
(pubkey_get_npkey, pubkey_get_nskey): Ditto.
(pubkey_get_nsig, pubkey_get_nenc): Ditto.
* g10/keygen.c(do_create_from_keygrip): Support EdDSA.
(common_gen, gen_ecc, ask_keysize, generate_keypair): Ditto.
* g10/build-packet.c (do_key): Ditto.
* g10/export.c (transfer_format_to_openpgp): Ditto.
* g10/getkey.c (cache_public_key): Ditto.
* g10/import.c (transfer_secret_keys): Ditto.
* g10/keylist.c (list_keyblock_print, list_keyblock_colon): Ditto.
* g10/mainproc.c (proc_pubkey_enc): Ditto.
* g10/parse-packet.c (parse_key): Ditto,
* g10/sign.c (hash_for, sign_file, make_keysig_packet): Ditto.
* g10/keyserver.c (print_keyrec): Use openpgp_pk_algo_name.
* g10/pkglue.c (pk_verify, pk_encrypt, pk_check_secret_key): Use only
OpenPGP algo ids and support EdDSA.
* g10/pubkey-enc.c (get_it): Use only OpenPGP algo ids.
* g10/seskey.c (encode_md_value): Ditto.
--
This patch separates Libgcrypt and OpenPGP public key algorithms ids
and in most cases completely removes the Libgcrypt ones. This is
useful because for Libgcrypt we specify the algorithm in the
S-expressions and the public key ids are not anymore needed.
This patch also adds some support for PUBKEY_ALGO_EDDSA which will
eventually be used instead of merging EdDSA with ECDSA. As of now an
experimental algorithm id is used but the plan is to write an I-D so
that we can get a new id from the IETF. Note that EdDSA (Ed25519)
does not yet work and that more changes are required.
The ECC support is still broken right now. Needs to be fixed.
Signed-off-by: Werner Koch <wk@gnupg.org>
2014-01-30 18:48:37 +01:00
|
|
|
|
|| pk->pubkey_algo == PUBKEY_ALGO_EDDSA
|
2011-01-06 02:33:17 +01:00
|
|
|
|
|| pk->pubkey_algo == PUBKEY_ALGO_ECDH
|
|
|
|
|
|| is_RSA (pk->pubkey_algo))
|
2010-01-09 20:00:46 +01:00
|
|
|
|
{
|
|
|
|
|
keyid_from_pk (pk, keyid);
|
2003-06-05 09:14:21 +02:00
|
|
|
|
}
|
2010-01-09 20:00:46 +01:00
|
|
|
|
else
|
|
|
|
|
return; /* Don't know how to get the keyid. */
|
2003-06-05 09:14:21 +02:00
|
|
|
|
|
2010-01-09 20:00:46 +01:00
|
|
|
|
for (ce = pk_cache; ce; ce = ce->next)
|
|
|
|
|
if (ce->keyid[0] == keyid[0] && ce->keyid[1] == keyid[1])
|
|
|
|
|
{
|
|
|
|
|
if (DBG_CACHE)
|
|
|
|
|
log_debug ("cache_public_key: already in cache\n");
|
2003-06-05 09:14:21 +02:00
|
|
|
|
return;
|
2010-01-09 20:00:46 +01:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (pk_cache_entries >= MAX_PK_CACHE_ENTRIES)
|
|
|
|
|
{
|
2013-01-07 15:37:50 +01:00
|
|
|
|
int n;
|
|
|
|
|
|
|
|
|
|
/* Remove the last 50% of the entries. */
|
|
|
|
|
for (ce = pk_cache, n = 0; ce && n < pk_cache_entries/2; n++)
|
|
|
|
|
ce = ce->next;
|
2016-01-07 19:05:35 +01:00
|
|
|
|
if (ce && ce != pk_cache && ce->next)
|
2013-01-07 15:37:50 +01:00
|
|
|
|
{
|
|
|
|
|
ce2 = ce->next;
|
|
|
|
|
ce->next = NULL;
|
|
|
|
|
ce = ce2;
|
|
|
|
|
for (; ce; ce = ce2)
|
|
|
|
|
{
|
|
|
|
|
ce2 = ce->next;
|
|
|
|
|
free_public_key (ce->pk);
|
|
|
|
|
xfree (ce);
|
|
|
|
|
pk_cache_entries--;
|
|
|
|
|
}
|
|
|
|
|
}
|
2016-04-29 11:05:24 +02:00
|
|
|
|
log_assert (pk_cache_entries < MAX_PK_CACHE_ENTRIES);
|
2003-06-05 09:14:21 +02:00
|
|
|
|
}
|
2010-01-09 20:00:46 +01:00
|
|
|
|
pk_cache_entries++;
|
|
|
|
|
ce = xmalloc (sizeof *ce);
|
|
|
|
|
ce->next = pk_cache;
|
|
|
|
|
pk_cache = ce;
|
|
|
|
|
ce->pk = copy_public_key (NULL, pk);
|
|
|
|
|
ce->keyid[0] = keyid[0];
|
|
|
|
|
ce->keyid[1] = keyid[1];
|
2003-06-05 09:14:21 +02:00
|
|
|
|
#endif
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
2006-04-19 13:26:11 +02:00
|
|
|
|
/* Return a const utf-8 string with the text "[User ID not found]".
|
2010-01-09 20:00:46 +01:00
|
|
|
|
This function is required so that we don't need to switch gettext's
|
|
|
|
|
encoding temporary. */
|
2006-04-19 13:26:11 +02:00
|
|
|
|
static const char *
|
|
|
|
|
user_id_not_found_utf8 (void)
|
|
|
|
|
{
|
|
|
|
|
static char *text;
|
|
|
|
|
|
|
|
|
|
if (!text)
|
|
|
|
|
text = native_to_utf8 (_("[User ID not found]"));
|
|
|
|
|
return text;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
2003-06-05 09:14:21 +02:00
|
|
|
|
|
2016-01-11 11:41:49 +01:00
|
|
|
|
/* Disable and drop the public key cache (which is filled by
|
|
|
|
|
cache_public_key and get_pubkey). Note: there is currently no way
|
2017-04-28 03:06:33 +02:00
|
|
|
|
to re-enable this cache. */
|
2003-06-05 09:14:21 +02:00
|
|
|
|
void
|
2022-09-13 09:34:00 +02:00
|
|
|
|
getkey_disable_caches (void)
|
2003-06-05 09:14:21 +02:00
|
|
|
|
{
|
|
|
|
|
#if MAX_PK_CACHE_ENTRIES
|
2010-01-09 20:00:46 +01:00
|
|
|
|
{
|
|
|
|
|
pk_cache_entry_t ce, ce2;
|
2003-06-05 09:14:21 +02:00
|
|
|
|
|
2010-01-09 20:00:46 +01:00
|
|
|
|
for (ce = pk_cache; ce; ce = ce2)
|
|
|
|
|
{
|
|
|
|
|
ce2 = ce->next;
|
|
|
|
|
free_public_key (ce->pk);
|
|
|
|
|
xfree (ce);
|
|
|
|
|
}
|
|
|
|
|
pk_cache_disabled = 1;
|
|
|
|
|
pk_cache_entries = 0;
|
|
|
|
|
pk_cache = NULL;
|
|
|
|
|
}
|
2003-06-05 09:14:21 +02:00
|
|
|
|
#endif
|
2010-01-09 20:00:46 +01:00
|
|
|
|
/* fixme: disable user id cache ? */
|
2003-06-05 09:14:21 +02:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
2018-08-29 11:53:59 +02:00
|
|
|
|
/* Free a list of pubkey_t objects. */
|
2015-12-22 14:57:53 +01:00
|
|
|
|
void
|
2015-12-23 15:45:20 +01:00
|
|
|
|
pubkeys_free (pubkey_t keys)
|
2015-12-22 14:57:53 +01:00
|
|
|
|
{
|
|
|
|
|
while (keys)
|
|
|
|
|
{
|
2015-12-23 15:45:20 +01:00
|
|
|
|
pubkey_t next = keys->next;
|
2018-08-29 11:53:59 +02:00
|
|
|
|
xfree (keys->pk);
|
|
|
|
|
release_kbnode (keys->keyblock);
|
|
|
|
|
xfree (keys);
|
2015-12-22 14:57:53 +01:00
|
|
|
|
keys = next;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
2003-06-05 09:14:21 +02:00
|
|
|
|
static void
|
2016-07-06 08:46:14 +02:00
|
|
|
|
pk_from_block (PKT_public_key *pk, kbnode_t keyblock, kbnode_t found_key)
|
2003-06-05 09:14:21 +02:00
|
|
|
|
{
|
2016-07-06 08:46:14 +02:00
|
|
|
|
kbnode_t a = found_key ? found_key : keyblock;
|
2010-01-09 20:00:46 +01:00
|
|
|
|
|
2016-04-29 11:05:24 +02:00
|
|
|
|
log_assert (a->pkt->pkttype == PKT_PUBLIC_KEY
|
|
|
|
|
|| a->pkt->pkttype == PKT_PUBLIC_SUBKEY);
|
2003-06-05 09:14:21 +02:00
|
|
|
|
|
2010-01-09 20:00:46 +01:00
|
|
|
|
copy_public_key (pk, a->pkt->pkt.public_key);
|
2003-06-05 09:14:21 +02:00
|
|
|
|
}
|
|
|
|
|
|
2015-09-16 14:01:48 +02:00
|
|
|
|
|
2018-07-05 20:55:32 +02:00
|
|
|
|
/* Specialized version of get_pubkey which retrieves the key based on
|
2020-03-13 17:14:34 +01:00
|
|
|
|
* information in SIG. In contrast to get_pubkey PK is required. IF
|
|
|
|
|
* FORCED_PK is not NULL, this public key is used and copied to PK. */
|
2018-07-05 20:55:32 +02:00
|
|
|
|
gpg_error_t
|
2020-03-13 17:14:34 +01:00
|
|
|
|
get_pubkey_for_sig (ctrl_t ctrl, PKT_public_key *pk, PKT_signature *sig,
|
|
|
|
|
PKT_public_key *forced_pk)
|
2018-07-05 20:55:32 +02:00
|
|
|
|
{
|
|
|
|
|
const byte *fpr;
|
|
|
|
|
size_t fprlen;
|
|
|
|
|
|
2020-03-13 17:14:34 +01:00
|
|
|
|
if (forced_pk)
|
|
|
|
|
{
|
|
|
|
|
copy_public_key (pk, forced_pk);
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
2020-06-08 15:22:28 +02:00
|
|
|
|
/* First try the ISSUER_FPR info. */
|
2018-07-05 20:55:32 +02:00
|
|
|
|
fpr = issuer_fpr_raw (sig, &fprlen);
|
|
|
|
|
if (fpr && !get_pubkey_byfprint (ctrl, pk, NULL, fpr, fprlen))
|
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
|
|
/* Fallback to use the ISSUER_KEYID. */
|
|
|
|
|
return get_pubkey (ctrl, pk, sig->keyid);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
2016-01-11 11:41:49 +01:00
|
|
|
|
/* Return the public key with the key id KEYID and store it at PK.
|
|
|
|
|
* The resources in *PK should be released using
|
|
|
|
|
* release_public_key_parts(). This function also stores a copy of
|
|
|
|
|
* the public key in the user id cache (see cache_public_key).
|
|
|
|
|
*
|
|
|
|
|
* If PK is NULL, this function just stores the public key in the
|
|
|
|
|
* cache and returns the usual return code.
|
|
|
|
|
*
|
|
|
|
|
* PK->REQ_USAGE (which is a mask of PUBKEY_USAGE_SIG,
|
|
|
|
|
* PUBKEY_USAGE_ENC and PUBKEY_USAGE_CERT) is passed through to the
|
|
|
|
|
* lookup function. If this is non-zero, only keys with the specified
|
|
|
|
|
* usage will be returned. As such, it is essential that
|
|
|
|
|
* PK->REQ_USAGE be correctly initialized!
|
|
|
|
|
*
|
|
|
|
|
* Returns 0 on success, GPG_ERR_NO_PUBKEY if there is no public key
|
|
|
|
|
* with the specified key id, or another error code if an error
|
|
|
|
|
* occurs.
|
|
|
|
|
*
|
|
|
|
|
* If the data was not read from the cache, then the self-signed data
|
|
|
|
|
* has definitely been merged into the public key using
|
|
|
|
|
* merge_selfsigs. */
|
2003-06-05 09:14:21 +02:00
|
|
|
|
int
|
2017-03-31 20:03:52 +02:00
|
|
|
|
get_pubkey (ctrl_t ctrl, PKT_public_key * pk, u32 * keyid)
|
2003-06-05 09:14:21 +02:00
|
|
|
|
{
|
2010-01-09 20:00:46 +01:00
|
|
|
|
int internal = 0;
|
|
|
|
|
int rc = 0;
|
2003-06-05 09:14:21 +02:00
|
|
|
|
|
|
|
|
|
#if MAX_PK_CACHE_ENTRIES
|
2010-01-09 20:00:46 +01:00
|
|
|
|
if (pk)
|
|
|
|
|
{
|
|
|
|
|
/* Try to get it from the cache. We don't do this when pk is
|
|
|
|
|
NULL as it does not guarantee that the user IDs are
|
|
|
|
|
cached. */
|
|
|
|
|
pk_cache_entry_t ce;
|
|
|
|
|
for (ce = pk_cache; ce; ce = ce->next)
|
|
|
|
|
{
|
|
|
|
|
if (ce->keyid[0] == keyid[0] && ce->keyid[1] == keyid[1])
|
2015-09-16 14:01:48 +02:00
|
|
|
|
/* XXX: We don't check PK->REQ_USAGE here, but if we don't
|
|
|
|
|
read from the cache, we do check it! */
|
2010-01-09 20:00:46 +01:00
|
|
|
|
{
|
|
|
|
|
copy_public_key (pk, ce->pk);
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
#endif
|
|
|
|
|
/* More init stuff. */
|
|
|
|
|
if (!pk)
|
|
|
|
|
{
|
|
|
|
|
internal++;
|
2017-12-13 10:06:37 +01:00
|
|
|
|
pk = xtrycalloc (1, sizeof *pk);
|
|
|
|
|
if (!pk)
|
|
|
|
|
{
|
|
|
|
|
rc = gpg_error_from_syserror ();
|
|
|
|
|
goto leave;
|
|
|
|
|
}
|
2010-01-09 20:00:46 +01:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
/* Do a lookup. */
|
|
|
|
|
{
|
|
|
|
|
struct getkey_ctx_s ctx;
|
2018-07-05 20:55:32 +02:00
|
|
|
|
kbnode_t kb = NULL;
|
|
|
|
|
kbnode_t found_key = NULL;
|
|
|
|
|
|
2010-01-09 20:00:46 +01:00
|
|
|
|
memset (&ctx, 0, sizeof ctx);
|
|
|
|
|
ctx.exact = 1; /* Use the key ID exactly as given. */
|
|
|
|
|
ctx.not_allocated = 1;
|
2017-03-31 20:44:05 +02:00
|
|
|
|
|
|
|
|
|
if (ctrl && ctrl->cached_getkey_kdb)
|
|
|
|
|
{
|
|
|
|
|
ctx.kr_handle = ctrl->cached_getkey_kdb;
|
|
|
|
|
ctrl->cached_getkey_kdb = NULL;
|
|
|
|
|
keydb_search_reset (ctx.kr_handle);
|
|
|
|
|
}
|
|
|
|
|
else
|
2015-12-03 12:18:32 +01:00
|
|
|
|
{
|
2019-09-09 14:34:09 +02:00
|
|
|
|
ctx.kr_handle = keydb_new (ctrl);
|
2017-03-31 20:44:05 +02:00
|
|
|
|
if (!ctx.kr_handle)
|
|
|
|
|
{
|
|
|
|
|
rc = gpg_error_from_syserror ();
|
|
|
|
|
goto leave;
|
|
|
|
|
}
|
2015-12-03 12:18:32 +01:00
|
|
|
|
}
|
2010-01-09 20:00:46 +01:00
|
|
|
|
ctx.nitems = 1;
|
|
|
|
|
ctx.items[0].mode = KEYDB_SEARCH_MODE_LONG_KID;
|
|
|
|
|
ctx.items[0].u.kid[0] = keyid[0];
|
|
|
|
|
ctx.items[0].u.kid[1] = keyid[1];
|
|
|
|
|
ctx.req_usage = pk->req_usage;
|
2017-03-31 20:03:52 +02:00
|
|
|
|
rc = lookup (ctrl, &ctx, 0, &kb, &found_key);
|
2010-01-09 20:00:46 +01:00
|
|
|
|
if (!rc)
|
2006-04-19 13:26:11 +02:00
|
|
|
|
{
|
2016-07-06 08:46:14 +02:00
|
|
|
|
pk_from_block (pk, kb, found_key);
|
2006-04-19 13:26:11 +02:00
|
|
|
|
}
|
2017-03-31 20:35:28 +02:00
|
|
|
|
getkey_end (ctrl, &ctx);
|
2010-01-09 20:00:46 +01:00
|
|
|
|
release_kbnode (kb);
|
|
|
|
|
}
|
|
|
|
|
if (!rc)
|
|
|
|
|
goto leave;
|
2003-06-05 09:14:21 +02:00
|
|
|
|
|
2015-01-22 12:06:11 +01:00
|
|
|
|
rc = GPG_ERR_NO_PUBKEY;
|
2003-06-05 09:14:21 +02:00
|
|
|
|
|
2010-01-09 20:00:46 +01:00
|
|
|
|
leave:
|
|
|
|
|
if (!rc)
|
|
|
|
|
cache_public_key (pk);
|
|
|
|
|
if (internal)
|
|
|
|
|
free_public_key (pk);
|
|
|
|
|
return rc;
|
2003-06-05 09:14:21 +02:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
2021-04-25 20:03:07 +02:00
|
|
|
|
/* Same as get_pubkey but if the key was not found the function tries
|
|
|
|
|
* to import it from LDAP. FIXME: We should not need this but swicth
|
|
|
|
|
* to a fingerprint lookup. */
|
|
|
|
|
gpg_error_t
|
|
|
|
|
get_pubkey_with_ldap_fallback (ctrl_t ctrl, PKT_public_key *pk, u32 *keyid)
|
|
|
|
|
{
|
|
|
|
|
gpg_error_t err;
|
|
|
|
|
|
|
|
|
|
err = get_pubkey (ctrl, pk, keyid);
|
|
|
|
|
if (!err)
|
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
|
|
if (gpg_err_code (err) != GPG_ERR_NO_PUBKEY)
|
|
|
|
|
return err;
|
|
|
|
|
|
|
|
|
|
/* Note that this code does not handle the case for two readers
|
|
|
|
|
* having both openpgp encryption keys. Only one will be tried. */
|
|
|
|
|
if (opt.debug)
|
|
|
|
|
log_debug ("using LDAP to find a public key\n");
|
|
|
|
|
err = keyserver_import_keyid (ctrl, keyid,
|
|
|
|
|
opt.keyserver, KEYSERVER_IMPORT_FLAG_LDAP);
|
|
|
|
|
if (gpg_err_code (err) == GPG_ERR_NO_DATA
|
|
|
|
|
|| gpg_err_code (err) == GPG_ERR_NO_KEYSERVER)
|
|
|
|
|
{
|
|
|
|
|
/* Dirmngr returns NO DATA is the selected keyserver
|
|
|
|
|
* does not have the requested key. It returns NO
|
|
|
|
|
* KEYSERVER if no LDAP keyservers are configured. */
|
|
|
|
|
err = gpg_error (GPG_ERR_NO_PUBKEY);
|
|
|
|
|
}
|
|
|
|
|
if (err)
|
|
|
|
|
return err;
|
|
|
|
|
|
|
|
|
|
return get_pubkey (ctrl, pk, keyid);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
2016-01-11 11:41:49 +01:00
|
|
|
|
/* Similar to get_pubkey, but it does not take PK->REQ_USAGE into
|
|
|
|
|
* account nor does it merge in the self-signed data. This function
|
|
|
|
|
* also only considers primary keys. It is intended to be used as a
|
|
|
|
|
* quick check of the key to avoid recursion. It should only be used
|
|
|
|
|
* in very certain cases. Like get_pubkey and unlike any of the other
|
|
|
|
|
* lookup functions, this function also consults the user id cache
|
|
|
|
|
* (see cache_public_key).
|
|
|
|
|
*
|
|
|
|
|
* Return the public key in *PK. The resources in *PK should be
|
|
|
|
|
* released using release_public_key_parts(). */
|
2003-06-05 09:14:21 +02:00
|
|
|
|
int
|
2019-09-09 14:34:09 +02:00
|
|
|
|
get_pubkey_fast (ctrl_t ctrl, PKT_public_key * pk, u32 * keyid)
|
2003-06-05 09:14:21 +02:00
|
|
|
|
{
|
|
|
|
|
int rc = 0;
|
|
|
|
|
KEYDB_HANDLE hd;
|
|
|
|
|
KBNODE keyblock;
|
2006-04-19 13:26:11 +02:00
|
|
|
|
u32 pkid[2];
|
2010-01-09 20:00:46 +01:00
|
|
|
|
|
2016-04-29 11:05:24 +02:00
|
|
|
|
log_assert (pk);
|
2003-06-05 09:14:21 +02:00
|
|
|
|
#if MAX_PK_CACHE_ENTRIES
|
2010-01-09 20:00:46 +01:00
|
|
|
|
{
|
|
|
|
|
/* Try to get it from the cache */
|
2003-06-05 09:14:21 +02:00
|
|
|
|
pk_cache_entry_t ce;
|
|
|
|
|
|
|
|
|
|
for (ce = pk_cache; ce; ce = ce->next)
|
|
|
|
|
{
|
2015-09-16 13:13:46 +02:00
|
|
|
|
if (ce->keyid[0] == keyid[0] && ce->keyid[1] == keyid[1]
|
|
|
|
|
/* Only consider primary keys. */
|
|
|
|
|
&& ce->pk->keyid[0] == ce->pk->main_keyid[0]
|
|
|
|
|
&& ce->pk->keyid[1] == ce->pk->main_keyid[1])
|
2010-01-09 20:00:46 +01:00
|
|
|
|
{
|
|
|
|
|
if (pk)
|
|
|
|
|
copy_public_key (pk, ce->pk);
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
2003-06-05 09:14:21 +02:00
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
#endif
|
|
|
|
|
|
2019-09-09 14:34:09 +02:00
|
|
|
|
hd = keydb_new (ctrl);
|
2015-12-03 12:18:32 +01:00
|
|
|
|
if (!hd)
|
|
|
|
|
return gpg_error_from_syserror ();
|
2003-06-05 09:14:21 +02:00
|
|
|
|
rc = keydb_search_kid (hd, keyid);
|
2011-04-29 15:07:11 +02:00
|
|
|
|
if (gpg_err_code (rc) == GPG_ERR_NOT_FOUND)
|
2003-06-05 09:14:21 +02:00
|
|
|
|
{
|
|
|
|
|
keydb_release (hd);
|
2015-01-22 12:06:11 +01:00
|
|
|
|
return GPG_ERR_NO_PUBKEY;
|
2003-06-05 09:14:21 +02:00
|
|
|
|
}
|
|
|
|
|
rc = keydb_get_keyblock (hd, &keyblock);
|
|
|
|
|
keydb_release (hd);
|
2010-01-09 20:00:46 +01:00
|
|
|
|
if (rc)
|
2003-06-05 09:14:21 +02:00
|
|
|
|
{
|
2015-01-22 12:06:11 +01:00
|
|
|
|
log_error ("keydb_get_keyblock failed: %s\n", gpg_strerror (rc));
|
|
|
|
|
return GPG_ERR_NO_PUBKEY;
|
2003-06-05 09:14:21 +02:00
|
|
|
|
}
|
2006-04-19 13:26:11 +02:00
|
|
|
|
|
2016-04-29 11:05:24 +02:00
|
|
|
|
log_assert (keyblock && keyblock->pkt
|
|
|
|
|
&& keyblock->pkt->pkttype == PKT_PUBLIC_KEY);
|
2006-04-19 13:26:11 +02:00
|
|
|
|
|
2015-09-16 13:13:46 +02:00
|
|
|
|
/* We return the primary key. If KEYID matched a subkey, then we
|
|
|
|
|
return an error. */
|
2010-01-09 20:00:46 +01:00
|
|
|
|
keyid_from_pk (keyblock->pkt->pkt.public_key, pkid);
|
|
|
|
|
if (keyid[0] == pkid[0] && keyid[1] == pkid[1])
|
|
|
|
|
copy_public_key (pk, keyblock->pkt->pkt.public_key);
|
2006-04-19 13:26:11 +02:00
|
|
|
|
else
|
2015-01-22 12:06:11 +01:00
|
|
|
|
rc = GPG_ERR_NO_PUBKEY;
|
2006-04-19 13:26:11 +02:00
|
|
|
|
|
2003-06-05 09:14:21 +02:00
|
|
|
|
release_kbnode (keyblock);
|
|
|
|
|
|
|
|
|
|
/* Not caching key here since it won't have all of the fields
|
|
|
|
|
properly set. */
|
|
|
|
|
|
2006-04-19 13:26:11 +02:00
|
|
|
|
return rc;
|
2003-06-05 09:14:21 +02:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
2018-07-05 20:55:32 +02:00
|
|
|
|
/* Return the entire keyblock used to create SIG. This is a
|
|
|
|
|
* specialized version of get_pubkeyblock.
|
|
|
|
|
*
|
|
|
|
|
* FIXME: This is a hack because get_pubkey_for_sig was already called
|
|
|
|
|
* and it could have used a cache to hold the key. */
|
|
|
|
|
kbnode_t
|
|
|
|
|
get_pubkeyblock_for_sig (ctrl_t ctrl, PKT_signature *sig)
|
|
|
|
|
{
|
|
|
|
|
const byte *fpr;
|
|
|
|
|
size_t fprlen;
|
|
|
|
|
kbnode_t keyblock;
|
|
|
|
|
|
2020-06-08 15:22:28 +02:00
|
|
|
|
/* First try the ISSUER_FPR info. */
|
2018-07-05 20:55:32 +02:00
|
|
|
|
fpr = issuer_fpr_raw (sig, &fprlen);
|
|
|
|
|
if (fpr && !get_pubkey_byfprint (ctrl, NULL, &keyblock, fpr, fprlen))
|
|
|
|
|
return keyblock;
|
|
|
|
|
|
|
|
|
|
/* Fallback to use the ISSUER_KEYID. */
|
|
|
|
|
return get_pubkeyblock (ctrl, sig->keyid);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
2016-01-11 11:41:49 +01:00
|
|
|
|
/* Return the key block for the key with key id KEYID or NULL, if an
|
|
|
|
|
* error occurs. Use release_kbnode() to release the key block.
|
|
|
|
|
*
|
|
|
|
|
* The self-signed data has already been merged into the public key
|
|
|
|
|
* using merge_selfsigs. */
|
|
|
|
|
kbnode_t
|
2017-03-31 20:03:52 +02:00
|
|
|
|
get_pubkeyblock (ctrl_t ctrl, u32 * keyid)
|
2003-06-05 09:14:21 +02:00
|
|
|
|
{
|
2010-01-09 20:00:46 +01:00
|
|
|
|
struct getkey_ctx_s ctx;
|
|
|
|
|
int rc = 0;
|
|
|
|
|
KBNODE keyblock = NULL;
|
2003-06-05 09:14:21 +02:00
|
|
|
|
|
2010-01-09 20:00:46 +01:00
|
|
|
|
memset (&ctx, 0, sizeof ctx);
|
|
|
|
|
/* No need to set exact here because we want the entire block. */
|
|
|
|
|
ctx.not_allocated = 1;
|
2019-09-09 14:34:09 +02:00
|
|
|
|
ctx.kr_handle = keydb_new (ctrl);
|
2015-12-03 12:18:32 +01:00
|
|
|
|
if (!ctx.kr_handle)
|
|
|
|
|
return NULL;
|
2010-01-09 20:00:46 +01:00
|
|
|
|
ctx.nitems = 1;
|
|
|
|
|
ctx.items[0].mode = KEYDB_SEARCH_MODE_LONG_KID;
|
|
|
|
|
ctx.items[0].u.kid[0] = keyid[0];
|
|
|
|
|
ctx.items[0].u.kid[1] = keyid[1];
|
2017-03-31 20:03:52 +02:00
|
|
|
|
rc = lookup (ctrl, &ctx, 0, &keyblock, NULL);
|
2017-03-31 20:35:28 +02:00
|
|
|
|
getkey_end (ctrl, &ctx);
|
2003-06-05 09:14:21 +02:00
|
|
|
|
|
2010-01-09 20:00:46 +01:00
|
|
|
|
return rc ? NULL : keyblock;
|
2003-06-05 09:14:21 +02:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
2016-01-11 11:41:49 +01:00
|
|
|
|
/* Return the public key with the key id KEYID iff the secret key is
|
|
|
|
|
* available and store it at PK. The resources should be released
|
|
|
|
|
* using release_public_key_parts().
|
|
|
|
|
*
|
|
|
|
|
* Unlike other lookup functions, PK may not be NULL. PK->REQ_USAGE
|
|
|
|
|
* is passed through to the lookup function and is a mask of
|
|
|
|
|
* PUBKEY_USAGE_SIG, PUBKEY_USAGE_ENC and PUBKEY_USAGE_CERT. Thus, it
|
|
|
|
|
* must be valid! If this is non-zero, only keys with the specified
|
|
|
|
|
* usage will be returned.
|
|
|
|
|
*
|
|
|
|
|
* Returns 0 on success. If a public key with the specified key id is
|
|
|
|
|
* not found or a secret key is not available for that public key, an
|
|
|
|
|
* error code is returned. Note: this function ignores legacy keys.
|
|
|
|
|
* An error code is also return if an error occurs.
|
|
|
|
|
*
|
|
|
|
|
* The self-signed data has already been merged into the public key
|
|
|
|
|
* using merge_selfsigs. */
|
2010-04-21 18:26:17 +02:00
|
|
|
|
gpg_error_t
|
2017-03-31 20:03:52 +02:00
|
|
|
|
get_seckey (ctrl_t ctrl, PKT_public_key *pk, u32 *keyid)
|
2003-06-05 09:14:21 +02:00
|
|
|
|
{
|
2010-04-21 18:26:17 +02:00
|
|
|
|
gpg_error_t err;
|
2010-01-09 20:00:46 +01:00
|
|
|
|
struct getkey_ctx_s ctx;
|
2010-04-21 18:26:17 +02:00
|
|
|
|
kbnode_t keyblock = NULL;
|
2015-09-09 21:04:57 +02:00
|
|
|
|
kbnode_t found_key = NULL;
|
2003-06-05 09:14:21 +02:00
|
|
|
|
|
2010-01-09 20:00:46 +01:00
|
|
|
|
memset (&ctx, 0, sizeof ctx);
|
|
|
|
|
ctx.exact = 1; /* Use the key ID exactly as given. */
|
|
|
|
|
ctx.not_allocated = 1;
|
2019-09-09 14:34:09 +02:00
|
|
|
|
ctx.kr_handle = keydb_new (ctrl);
|
2015-12-03 12:18:32 +01:00
|
|
|
|
if (!ctx.kr_handle)
|
|
|
|
|
return gpg_error_from_syserror ();
|
2010-01-09 20:00:46 +01:00
|
|
|
|
ctx.nitems = 1;
|
|
|
|
|
ctx.items[0].mode = KEYDB_SEARCH_MODE_LONG_KID;
|
|
|
|
|
ctx.items[0].u.kid[0] = keyid[0];
|
|
|
|
|
ctx.items[0].u.kid[1] = keyid[1];
|
2010-04-21 18:26:17 +02:00
|
|
|
|
ctx.req_usage = pk->req_usage;
|
2017-03-31 20:03:52 +02:00
|
|
|
|
err = lookup (ctrl, &ctx, 1, &keyblock, &found_key);
|
2010-04-21 18:26:17 +02:00
|
|
|
|
if (!err)
|
2010-01-09 20:00:46 +01:00
|
|
|
|
{
|
2016-07-06 08:46:14 +02:00
|
|
|
|
pk_from_block (pk, keyblock, found_key);
|
2003-06-05 09:14:21 +02:00
|
|
|
|
}
|
2017-03-31 20:35:28 +02:00
|
|
|
|
getkey_end (ctrl, &ctx);
|
2010-04-21 18:26:17 +02:00
|
|
|
|
release_kbnode (keyblock);
|
2003-06-05 09:14:21 +02:00
|
|
|
|
|
2010-04-21 18:26:17 +02:00
|
|
|
|
if (!err)
|
2015-09-16 14:03:50 +02:00
|
|
|
|
{
|
2020-01-17 07:11:02 +01:00
|
|
|
|
if (!agent_probe_secret_key (/*ctrl*/NULL, pk))
|
|
|
|
|
{
|
|
|
|
|
release_public_key_parts (pk);
|
|
|
|
|
err = gpg_error (GPG_ERR_NO_SECKEY);
|
|
|
|
|
}
|
2015-09-16 14:03:50 +02:00
|
|
|
|
}
|
2003-06-05 09:14:21 +02:00
|
|
|
|
|
2010-04-21 18:26:17 +02:00
|
|
|
|
return err;
|
2003-06-05 09:14:21 +02:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
2015-09-16 14:01:48 +02:00
|
|
|
|
/* Skip unusable keys. A key is unusable if it is revoked, expired or
|
|
|
|
|
disabled or if the selected user id is revoked or expired. */
|
2003-06-05 09:14:21 +02:00
|
|
|
|
static int
|
2017-03-31 20:03:52 +02:00
|
|
|
|
skip_unusable (void *opaque, u32 * keyid, int uid_no)
|
2003-06-05 09:14:21 +02:00
|
|
|
|
{
|
2017-03-31 20:03:52 +02:00
|
|
|
|
ctrl_t ctrl = opaque;
|
2010-01-09 20:00:46 +01:00
|
|
|
|
int unusable = 0;
|
2006-04-19 13:26:11 +02:00
|
|
|
|
KBNODE keyblock;
|
2015-09-14 11:27:43 +02:00
|
|
|
|
PKT_public_key *pk;
|
2003-06-05 09:14:21 +02:00
|
|
|
|
|
2017-03-31 20:03:52 +02:00
|
|
|
|
keyblock = get_pubkeyblock (ctrl, keyid);
|
2010-01-09 20:00:46 +01:00
|
|
|
|
if (!keyblock)
|
2003-06-05 09:14:21 +02:00
|
|
|
|
{
|
2010-01-09 20:00:46 +01:00
|
|
|
|
log_error ("error checking usability status of %s\n", keystr (keyid));
|
2003-06-05 09:14:21 +02:00
|
|
|
|
goto leave;
|
|
|
|
|
}
|
2006-04-19 13:26:11 +02:00
|
|
|
|
|
2015-09-14 11:27:43 +02:00
|
|
|
|
pk = keyblock->pkt->pkt.public_key;
|
|
|
|
|
|
2015-09-16 14:05:03 +02:00
|
|
|
|
/* Is the key revoked or expired? */
|
2023-05-09 08:17:30 +02:00
|
|
|
|
if (pk->flags.revoked || (pk->has_expired && !opt.ignore_expiration))
|
2015-09-16 14:05:03 +02:00
|
|
|
|
unusable = 1;
|
|
|
|
|
|
|
|
|
|
/* Is the user ID in question revoked or expired? */
|
|
|
|
|
if (!unusable && uid_no)
|
2006-04-19 13:26:11 +02:00
|
|
|
|
{
|
|
|
|
|
KBNODE node;
|
2015-09-14 11:27:43 +02:00
|
|
|
|
int uids_seen = 0;
|
2006-04-19 13:26:11 +02:00
|
|
|
|
|
2010-01-09 20:00:46 +01:00
|
|
|
|
for (node = keyblock; node; node = node->next)
|
2006-04-19 13:26:11 +02:00
|
|
|
|
{
|
2010-01-09 20:00:46 +01:00
|
|
|
|
if (node->pkt->pkttype == PKT_USER_ID)
|
2006-04-19 13:26:11 +02:00
|
|
|
|
{
|
2015-09-14 11:27:43 +02:00
|
|
|
|
PKT_user_id *user_id = node->pkt->pkt.user_id;
|
|
|
|
|
|
|
|
|
|
uids_seen ++;
|
|
|
|
|
if (uids_seen != uid_no)
|
|
|
|
|
continue;
|
|
|
|
|
|
2023-05-09 08:17:30 +02:00
|
|
|
|
if (user_id->flags.revoked
|
|
|
|
|
|| (user_id->flags.expired && !opt.ignore_expiration))
|
2015-09-14 11:27:43 +02:00
|
|
|
|
unusable = 1;
|
|
|
|
|
|
|
|
|
|
break;
|
2006-04-19 13:26:11 +02:00
|
|
|
|
}
|
|
|
|
|
}
|
2015-09-14 11:27:43 +02:00
|
|
|
|
|
|
|
|
|
/* If UID_NO is non-zero, then the keyblock better have at least
|
|
|
|
|
that many UIDs. */
|
2016-04-29 11:05:24 +02:00
|
|
|
|
log_assert (uids_seen == uid_no);
|
2006-04-19 13:26:11 +02:00
|
|
|
|
}
|
|
|
|
|
|
2010-01-09 20:00:46 +01:00
|
|
|
|
if (!unusable)
|
2015-09-14 11:27:43 +02:00
|
|
|
|
unusable = pk_is_disabled (pk);
|
2003-06-05 09:14:21 +02:00
|
|
|
|
|
2010-01-09 20:00:46 +01:00
|
|
|
|
leave:
|
|
|
|
|
release_kbnode (keyblock);
|
2006-04-19 13:26:11 +02:00
|
|
|
|
return unusable;
|
2003-06-05 09:14:21 +02:00
|
|
|
|
}
|
|
|
|
|
|
2010-01-09 20:00:46 +01:00
|
|
|
|
|
2015-09-16 14:01:48 +02:00
|
|
|
|
/* Search for keys matching some criteria.
|
|
|
|
|
|
|
|
|
|
If RETCTX is not NULL, then the constructed context is returned in
|
|
|
|
|
*RETCTX so that getpubkey_next can be used to get subsequent
|
|
|
|
|
results. In this case, getkey_end() must be used to free the
|
|
|
|
|
search context. If RETCTX is not NULL, then RET_KDBHD must be
|
|
|
|
|
NULL.
|
|
|
|
|
|
|
|
|
|
If NAMELIST is not NULL, then a search query is constructed using
|
|
|
|
|
classify_user_id on each of the strings in the list. (Recall: the
|
|
|
|
|
database does an OR of the terms, not an AND.) If NAMELIST is
|
|
|
|
|
NULL, then all results are returned.
|
|
|
|
|
|
|
|
|
|
If PK is not NULL, the public key of the first result is returned
|
|
|
|
|
in *PK. Note: PK->REQ_USAGE must be valid!!! If PK->REQ_USAGE is
|
|
|
|
|
set, it is used to filter the search results. See the
|
|
|
|
|
documentation for finish_lookup to understand exactly how this is
|
|
|
|
|
used. Note: The self-signed data has already been merged into the
|
|
|
|
|
public key using merge_selfsigs. Free *PK by calling
|
|
|
|
|
release_public_key_parts (or, if PK was allocated using xfree, you
|
|
|
|
|
can use free_public_key, which calls release_public_key_parts(PK)
|
|
|
|
|
and then xfree(PK)).
|
|
|
|
|
|
|
|
|
|
If WANT_SECRET is set, then only keys with an available secret key
|
|
|
|
|
(either locally or via key registered on a smartcard) are returned.
|
|
|
|
|
|
|
|
|
|
If INCLUDE_UNUSABLE is set, then unusable keys (see the
|
|
|
|
|
documentation for skip_unusable for an exact definition) are
|
|
|
|
|
skipped unless they are looked up by key id or by fingerprint.
|
|
|
|
|
|
|
|
|
|
If RET_KB is not NULL, the keyblock is returned in *RET_KB. This
|
|
|
|
|
should be freed using release_kbnode().
|
|
|
|
|
|
|
|
|
|
If RET_KDBHD is not NULL, then the new database handle used to
|
|
|
|
|
conduct the search is returned in *RET_KDBHD. This can be used to
|
|
|
|
|
get subsequent results using keydb_search_next. Note: in this
|
|
|
|
|
case, no advanced filtering is done for subsequent results (e.g.,
|
|
|
|
|
WANT_SECRET and PK->REQ_USAGE are not respected).
|
|
|
|
|
|
|
|
|
|
This function returns 0 on success. Otherwise, an error code is
|
|
|
|
|
returned. In particular, GPG_ERR_NO_PUBKEY or GPG_ERR_NO_SECKEY
|
|
|
|
|
(if want_secret is set) is returned if the key is not found. */
|
2003-06-05 09:14:21 +02:00
|
|
|
|
static int
|
2017-03-31 20:03:52 +02:00
|
|
|
|
key_byname (ctrl_t ctrl, GETKEY_CTX *retctx, strlist_t namelist,
|
2010-04-21 18:26:17 +02:00
|
|
|
|
PKT_public_key *pk,
|
2010-02-02 15:06:19 +01:00
|
|
|
|
int want_secret, int include_unusable,
|
2010-01-09 20:00:46 +01:00
|
|
|
|
KBNODE * ret_kb, KEYDB_HANDLE * ret_kdbhd)
|
2003-06-05 09:14:21 +02:00
|
|
|
|
{
|
2010-01-09 20:00:46 +01:00
|
|
|
|
int rc = 0;
|
|
|
|
|
int n;
|
2019-09-30 14:08:13 +02:00
|
|
|
|
strlist_t r;
|
|
|
|
|
strlist_t namelist_expanded = NULL;
|
2010-01-09 20:00:46 +01:00
|
|
|
|
GETKEY_CTX ctx;
|
|
|
|
|
KBNODE help_kb = NULL;
|
2015-09-09 21:04:57 +02:00
|
|
|
|
KBNODE found_key = NULL;
|
2003-06-05 09:14:21 +02:00
|
|
|
|
|
2010-01-09 20:00:46 +01:00
|
|
|
|
if (retctx)
|
|
|
|
|
{
|
|
|
|
|
/* Reset the returned context in case of error. */
|
2016-04-29 11:05:24 +02:00
|
|
|
|
log_assert (!ret_kdbhd); /* Not allowed because the handle is stored
|
|
|
|
|
in the context. */
|
2010-01-09 20:00:46 +01:00
|
|
|
|
*retctx = NULL;
|
|
|
|
|
}
|
|
|
|
|
if (ret_kdbhd)
|
|
|
|
|
*ret_kdbhd = NULL;
|
2006-04-19 13:26:11 +02:00
|
|
|
|
|
2010-01-09 20:00:46 +01:00
|
|
|
|
if (!namelist)
|
2015-09-16 14:01:48 +02:00
|
|
|
|
/* No search terms: iterate over the whole DB. */
|
2010-01-09 20:00:46 +01:00
|
|
|
|
{
|
|
|
|
|
ctx = xmalloc_clear (sizeof *ctx);
|
|
|
|
|
ctx->nitems = 1;
|
|
|
|
|
ctx->items[0].mode = KEYDB_SEARCH_MODE_FIRST;
|
|
|
|
|
if (!include_unusable)
|
2017-03-31 20:03:52 +02:00
|
|
|
|
{
|
|
|
|
|
ctx->items[0].skipfnc = skip_unusable;
|
|
|
|
|
ctx->items[0].skipfncvalue = ctrl;
|
|
|
|
|
}
|
2010-01-09 20:00:46 +01:00
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
2019-09-30 14:08:13 +02:00
|
|
|
|
namelist_expanded = expand_group (namelist, 1);
|
|
|
|
|
namelist = namelist_expanded;
|
2019-02-19 08:14:41 +01:00
|
|
|
|
|
2010-01-09 20:00:46 +01:00
|
|
|
|
/* Build the search context. */
|
|
|
|
|
for (n = 0, r = namelist; r; r = r->next)
|
|
|
|
|
n++;
|
2009-12-08 17:30:33 +01:00
|
|
|
|
|
2015-09-16 14:01:48 +02:00
|
|
|
|
/* CTX has space for a single search term at the end. Thus, we
|
|
|
|
|
need to allocate sizeof *CTX plus (n - 1) sizeof
|
|
|
|
|
CTX->ITEMS. */
|
2010-01-09 20:00:46 +01:00
|
|
|
|
ctx = xmalloc_clear (sizeof *ctx + (n - 1) * sizeof ctx->items);
|
|
|
|
|
ctx->nitems = n;
|
|
|
|
|
|
|
|
|
|
for (n = 0, r = namelist; r; r = r->next, n++)
|
|
|
|
|
{
|
|
|
|
|
gpg_error_t err;
|
|
|
|
|
|
2011-04-25 23:56:47 +02:00
|
|
|
|
err = classify_user_id (r->d, &ctx->items[n], 1);
|
2010-01-09 20:00:46 +01:00
|
|
|
|
|
|
|
|
|
if (ctx->items[n].exact)
|
|
|
|
|
ctx->exact = 1;
|
|
|
|
|
if (err)
|
|
|
|
|
{
|
|
|
|
|
xfree (ctx);
|
2019-02-19 08:14:41 +01:00
|
|
|
|
rc = gpg_err_code (err); /* FIXME: remove gpg_err_code. */
|
|
|
|
|
goto leave;
|
2010-01-09 20:00:46 +01:00
|
|
|
|
}
|
|
|
|
|
if (!include_unusable
|
|
|
|
|
&& ctx->items[n].mode != KEYDB_SEARCH_MODE_SHORT_KID
|
|
|
|
|
&& ctx->items[n].mode != KEYDB_SEARCH_MODE_LONG_KID
|
|
|
|
|
&& ctx->items[n].mode != KEYDB_SEARCH_MODE_FPR)
|
2017-03-31 20:03:52 +02:00
|
|
|
|
{
|
|
|
|
|
ctx->items[n].skipfnc = skip_unusable;
|
|
|
|
|
ctx->items[n].skipfncvalue = ctrl;
|
|
|
|
|
}
|
2010-01-09 20:00:46 +01:00
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2010-02-02 15:06:19 +01:00
|
|
|
|
ctx->want_secret = want_secret;
|
2019-09-09 14:34:09 +02:00
|
|
|
|
ctx->kr_handle = keydb_new (ctrl);
|
2015-12-03 12:18:32 +01:00
|
|
|
|
if (!ctx->kr_handle)
|
|
|
|
|
{
|
|
|
|
|
rc = gpg_error_from_syserror ();
|
2017-03-31 20:35:28 +02:00
|
|
|
|
getkey_end (ctrl, ctx);
|
2019-02-19 08:14:41 +01:00
|
|
|
|
goto leave;
|
2015-12-03 12:18:32 +01:00
|
|
|
|
}
|
|
|
|
|
|
2010-01-09 20:00:46 +01:00
|
|
|
|
if (!ret_kb)
|
|
|
|
|
ret_kb = &help_kb;
|
|
|
|
|
|
2010-02-02 15:06:19 +01:00
|
|
|
|
if (pk)
|
2010-01-09 20:00:46 +01:00
|
|
|
|
{
|
2010-02-02 15:06:19 +01:00
|
|
|
|
ctx->req_usage = pk->req_usage;
|
2010-01-09 20:00:46 +01:00
|
|
|
|
}
|
2010-04-21 18:26:17 +02:00
|
|
|
|
|
2017-03-31 20:03:52 +02:00
|
|
|
|
rc = lookup (ctrl, ctx, want_secret, ret_kb, &found_key);
|
2010-02-02 15:06:19 +01:00
|
|
|
|
if (!rc && pk)
|
|
|
|
|
{
|
2016-07-06 08:46:14 +02:00
|
|
|
|
pk_from_block (pk, *ret_kb, found_key);
|
2010-01-09 20:00:46 +01:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
release_kbnode (help_kb);
|
|
|
|
|
|
|
|
|
|
if (retctx) /* Caller wants the context. */
|
2019-09-30 14:08:13 +02:00
|
|
|
|
{
|
|
|
|
|
if (ctx->extra_list)
|
|
|
|
|
{
|
|
|
|
|
for (r=ctx->extra_list; r->next; r = r->next)
|
|
|
|
|
;
|
|
|
|
|
r->next = namelist_expanded;
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
ctx->extra_list = namelist_expanded;
|
|
|
|
|
namelist_expanded = NULL;
|
|
|
|
|
*retctx = ctx;
|
|
|
|
|
}
|
2010-01-09 20:00:46 +01:00
|
|
|
|
else
|
|
|
|
|
{
|
|
|
|
|
if (ret_kdbhd)
|
|
|
|
|
{
|
|
|
|
|
*ret_kdbhd = ctx->kr_handle;
|
|
|
|
|
ctx->kr_handle = NULL;
|
|
|
|
|
}
|
2017-03-31 20:35:28 +02:00
|
|
|
|
getkey_end (ctrl, ctx);
|
2010-01-09 20:00:46 +01:00
|
|
|
|
}
|
2003-06-05 09:14:21 +02:00
|
|
|
|
|
2019-09-30 14:08:13 +02:00
|
|
|
|
leave:
|
|
|
|
|
free_strlist (namelist_expanded);
|
2010-01-09 20:00:46 +01:00
|
|
|
|
return rc;
|
2003-06-05 09:14:21 +02:00
|
|
|
|
}
|
|
|
|
|
|
2006-04-19 13:26:11 +02:00
|
|
|
|
|
2016-01-11 11:41:49 +01:00
|
|
|
|
/* Find a public key identified by NAME.
|
|
|
|
|
*
|
2019-07-04 10:42:48 +02:00
|
|
|
|
* If name appears to be a valid RFC822 mailbox (i.e., email address)
|
|
|
|
|
* and auto key lookup is enabled (mode != GET_PUBKEY_NO_AKL), then
|
|
|
|
|
* the specified auto key lookup methods (--auto-key-lookup) are used
|
|
|
|
|
* to import the key into the local keyring. Otherwise, just the
|
|
|
|
|
* local keyring is consulted.
|
|
|
|
|
*
|
|
|
|
|
* MODE can be one of:
|
|
|
|
|
* GET_PUBKEY_NORMAL - The standard mode
|
|
|
|
|
* GET_PUBKEY_NO_AKL - The auto key locate functionality is
|
|
|
|
|
* disabled and only the local key ring is
|
|
|
|
|
* considered. Note: the local key ring is
|
|
|
|
|
* consulted even if local is not in the
|
|
|
|
|
* auto-key-locate option list!
|
Spelling cleanup.
No functional changes, just fixing minor spelling issues.
---
Most of these were identified from the command line by running:
codespell \
--ignore-words-list fpr,stati,keyserver,keyservers,asign,cas,iff,ifset \
--skip '*.po,ChangeLog*,help.*.txt,*.jpg,*.eps,*.pdf,*.png,*.gpg,*.asc' \
doc g13 g10 kbx agent artwork scd tests tools am common dirmngr sm \
NEWS README README.maint TODO
Signed-off-by: Daniel Kahn Gillmor <dkg@fifthhorseman.net>
2020-02-18 15:34:42 +01:00
|
|
|
|
* GET_PUBKEY_NO_LOCAL - Only the auto key locate functionality is
|
2019-07-04 10:42:48 +02:00
|
|
|
|
* used and no local search is done.
|
2016-01-11 11:41:49 +01:00
|
|
|
|
*
|
|
|
|
|
* If RETCTX is not NULL, then the constructed context is returned in
|
|
|
|
|
* *RETCTX so that getpubkey_next can be used to get subsequent
|
|
|
|
|
* results. In this case, getkey_end() must be used to free the
|
|
|
|
|
* search context. If RETCTX is not NULL, then RET_KDBHD must be
|
|
|
|
|
* NULL.
|
|
|
|
|
*
|
|
|
|
|
* If PK is not NULL, the public key of the first result is returned
|
|
|
|
|
* in *PK. Note: PK->REQ_USAGE must be valid!!! PK->REQ_USAGE is
|
|
|
|
|
* passed through to the lookup function and is a mask of
|
|
|
|
|
* PUBKEY_USAGE_SIG, PUBKEY_USAGE_ENC and PUBKEY_USAGE_CERT. If this
|
|
|
|
|
* is non-zero, only keys with the specified usage will be returned.
|
|
|
|
|
* Note: The self-signed data has already been merged into the public
|
|
|
|
|
* key using merge_selfsigs. Free *PK by calling
|
|
|
|
|
* release_public_key_parts (or, if PK was allocated using xfree, you
|
|
|
|
|
* can use free_public_key, which calls release_public_key_parts(PK)
|
|
|
|
|
* and then xfree(PK)).
|
|
|
|
|
*
|
|
|
|
|
* NAME is a string, which is turned into a search query using
|
|
|
|
|
* classify_user_id.
|
|
|
|
|
*
|
|
|
|
|
* If RET_KEYBLOCK is not NULL, the keyblock is returned in
|
|
|
|
|
* *RET_KEYBLOCK. This should be freed using release_kbnode().
|
|
|
|
|
*
|
|
|
|
|
* If RET_KDBHD is not NULL, then the new database handle used to
|
|
|
|
|
* conduct the search is returned in *RET_KDBHD. This can be used to
|
|
|
|
|
* get subsequent results using keydb_search_next or to modify the
|
|
|
|
|
* returned record. Note: in this case, no advanced filtering is done
|
|
|
|
|
* for subsequent results (e.g., PK->REQ_USAGE is not respected).
|
|
|
|
|
* Unlike RETCTX, this is always returned.
|
|
|
|
|
*
|
|
|
|
|
* If INCLUDE_UNUSABLE is set, then unusable keys (see the
|
|
|
|
|
* documentation for skip_unusable for an exact definition) are
|
|
|
|
|
* skipped unless they are looked up by key id or by fingerprint.
|
|
|
|
|
*
|
|
|
|
|
* This function returns 0 on success. Otherwise, an error code is
|
|
|
|
|
* returned. In particular, GPG_ERR_NO_PUBKEY or GPG_ERR_NO_SECKEY
|
|
|
|
|
* (if want_secret is set) is returned if the key is not found. */
|
2003-06-05 09:14:21 +02:00
|
|
|
|
int
|
2019-07-04 10:42:48 +02:00
|
|
|
|
get_pubkey_byname (ctrl_t ctrl, enum get_pubkey_modes mode,
|
|
|
|
|
GETKEY_CTX * retctx, PKT_public_key * pk,
|
2010-01-09 20:00:46 +01:00
|
|
|
|
const char *name, KBNODE * ret_keyblock,
|
2019-07-04 10:42:48 +02:00
|
|
|
|
KEYDB_HANDLE * ret_kdbhd, int include_unusable)
|
2003-06-05 09:14:21 +02:00
|
|
|
|
{
|
2006-04-19 13:26:11 +02:00
|
|
|
|
int rc;
|
2006-10-02 13:54:35 +02:00
|
|
|
|
strlist_t namelist = NULL;
|
2008-04-08 13:04:16 +02:00
|
|
|
|
struct akl *akl;
|
2021-04-21 18:32:21 +02:00
|
|
|
|
int is_mbox, is_fpr;
|
|
|
|
|
KEYDB_SEARCH_DESC fprbuf;
|
2008-04-08 13:04:16 +02:00
|
|
|
|
int nodefault = 0;
|
2008-05-07 20:19:41 +02:00
|
|
|
|
int anylocalfirst = 0;
|
2018-08-28 15:22:35 +02:00
|
|
|
|
int mechanism_type = AKL_NODEFAULT;
|
2016-10-27 14:43:29 +02:00
|
|
|
|
|
2021-04-21 18:32:21 +02:00
|
|
|
|
|
2016-10-27 14:43:29 +02:00
|
|
|
|
/* If RETCTX is not NULL, then RET_KDBHD must be NULL. */
|
|
|
|
|
log_assert (retctx == NULL || ret_kdbhd == NULL);
|
2008-05-07 20:19:41 +02:00
|
|
|
|
|
|
|
|
|
if (retctx)
|
|
|
|
|
*retctx = NULL;
|
2003-06-05 09:14:21 +02:00
|
|
|
|
|
2015-09-16 14:01:48 +02:00
|
|
|
|
/* Does NAME appear to be a mailbox (mail address)? */
|
2008-05-07 17:40:36 +02:00
|
|
|
|
is_mbox = is_valid_mailbox (name);
|
2019-12-04 14:39:42 +01:00
|
|
|
|
if (!is_mbox && *name == '<' && name[1] && name[strlen(name)-1]=='>'
|
|
|
|
|
&& name[1] != '>'
|
|
|
|
|
&& is_valid_mailbox_mem (name+1, strlen (name)-2))
|
|
|
|
|
{
|
|
|
|
|
/* The mailbox is in the form "<foo@example.org>" which is not
|
|
|
|
|
* detected by is_valid_mailbox. Set the flag but keep name as
|
|
|
|
|
* it is because the bracketed name is actual the better
|
|
|
|
|
* specification for a local search and the other methods
|
|
|
|
|
* extract the mail address anyway. */
|
|
|
|
|
is_mbox = 1;
|
|
|
|
|
}
|
2008-05-07 17:40:36 +02:00
|
|
|
|
|
2021-04-21 18:32:21 +02:00
|
|
|
|
/* If we are called due to --locate-external-key Check whether NAME
|
|
|
|
|
* is a fingerprint and then try to lookup that key by configured
|
|
|
|
|
* method which support lookup by fingerprint. FPRBUF carries the
|
|
|
|
|
* parsed fingerpint iff IS_FPR is true. */
|
|
|
|
|
is_fpr = 0;
|
|
|
|
|
if (!is_mbox && mode == GET_PUBKEY_NO_LOCAL)
|
|
|
|
|
{
|
|
|
|
|
if (!classify_user_id (name, &fprbuf, 1)
|
|
|
|
|
&& fprbuf.mode == KEYDB_SEARCH_MODE_FPR)
|
|
|
|
|
is_fpr = 1;
|
|
|
|
|
}
|
|
|
|
|
|
2015-09-16 14:01:48 +02:00
|
|
|
|
/* The auto-key-locate feature works as follows: there are a number
|
2016-11-04 14:51:19 +01:00
|
|
|
|
* of methods to look up keys. By default, the local keyring is
|
|
|
|
|
* tried first. Then, each method listed in the --auto-key-locate is
|
|
|
|
|
* tried in the order it appears.
|
|
|
|
|
*
|
|
|
|
|
* This can be changed as follows:
|
|
|
|
|
*
|
|
|
|
|
* - if nodefault appears anywhere in the list of options, then
|
|
|
|
|
* the local keyring is not tried first, or,
|
|
|
|
|
*
|
|
|
|
|
* - if local appears anywhere in the list of options, then the
|
|
|
|
|
* local keyring is not tried first, but in the order in which
|
|
|
|
|
* it was listed in the --auto-key-locate option.
|
|
|
|
|
*
|
|
|
|
|
* Note: we only save the search context in RETCTX if the local
|
|
|
|
|
* method is the first method tried (either explicitly or
|
|
|
|
|
* implicitly). */
|
2019-07-04 15:13:26 +02:00
|
|
|
|
if (mode == GET_PUBKEY_NO_LOCAL)
|
|
|
|
|
nodefault = 1; /* Auto-key-locate but ignore "local". */
|
|
|
|
|
else if (mode != GET_PUBKEY_NO_AKL)
|
2008-04-08 13:04:16 +02:00
|
|
|
|
{
|
2016-11-04 14:51:19 +01:00
|
|
|
|
/* auto-key-locate is enabled. */
|
|
|
|
|
|
2015-09-16 14:01:48 +02:00
|
|
|
|
/* nodefault is true if "nodefault" or "local" appear. */
|
2010-01-09 20:00:46 +01:00
|
|
|
|
for (akl = opt.auto_key_locate; akl; akl = akl->next)
|
|
|
|
|
if (akl->type == AKL_NODEFAULT || akl->type == AKL_LOCAL)
|
|
|
|
|
{
|
|
|
|
|
nodefault = 1;
|
|
|
|
|
break;
|
|
|
|
|
}
|
2015-09-16 14:01:48 +02:00
|
|
|
|
/* anylocalfirst is true if "local" appears before any other
|
|
|
|
|
search methods (except "nodefault"). */
|
2010-01-09 20:00:46 +01:00
|
|
|
|
for (akl = opt.auto_key_locate; akl; akl = akl->next)
|
|
|
|
|
if (akl->type != AKL_NODEFAULT)
|
|
|
|
|
{
|
|
|
|
|
if (akl->type == AKL_LOCAL)
|
|
|
|
|
anylocalfirst = 1;
|
|
|
|
|
break;
|
|
|
|
|
}
|
2008-04-08 13:04:16 +02:00
|
|
|
|
}
|
2006-04-19 13:26:11 +02:00
|
|
|
|
|
2008-05-07 20:19:41 +02:00
|
|
|
|
if (!nodefault)
|
2016-11-04 14:51:19 +01:00
|
|
|
|
{
|
|
|
|
|
/* "nodefault" didn't occur. Thus, "local" is implicitly the
|
|
|
|
|
* first method to try. */
|
|
|
|
|
anylocalfirst = 1;
|
|
|
|
|
}
|
2008-05-07 20:19:41 +02:00
|
|
|
|
|
2019-07-04 15:13:26 +02:00
|
|
|
|
if (mode == GET_PUBKEY_NO_LOCAL)
|
|
|
|
|
{
|
|
|
|
|
/* Force using the AKL. If IS_MBOX is not set this is the final
|
|
|
|
|
* error code. */
|
|
|
|
|
rc = GPG_ERR_NO_PUBKEY;
|
|
|
|
|
}
|
|
|
|
|
else if (nodefault && is_mbox)
|
2008-05-07 17:40:36 +02:00
|
|
|
|
{
|
2016-11-04 14:51:19 +01:00
|
|
|
|
/* Either "nodefault" or "local" (explicitly) appeared in the
|
|
|
|
|
* auto key locate list and NAME appears to be an email address.
|
|
|
|
|
* Don't try the local keyring. */
|
2015-01-22 12:06:11 +01:00
|
|
|
|
rc = GPG_ERR_NO_PUBKEY;
|
2008-05-07 17:40:36 +02:00
|
|
|
|
}
|
2008-04-08 13:04:16 +02:00
|
|
|
|
else
|
|
|
|
|
{
|
2016-11-04 14:51:19 +01:00
|
|
|
|
/* Either "nodefault" and "local" don't appear in the auto key
|
|
|
|
|
* locate list (in which case we try the local keyring first) or
|
|
|
|
|
* NAME does not appear to be an email address (in which case we
|
|
|
|
|
* only try the local keyring). In this case, lookup NAME in
|
|
|
|
|
* the local keyring. */
|
2008-04-08 13:04:16 +02:00
|
|
|
|
add_to_strlist (&namelist, name);
|
2017-03-31 20:03:52 +02:00
|
|
|
|
rc = key_byname (ctrl, retctx, namelist, pk, 0,
|
2010-01-09 20:00:46 +01:00
|
|
|
|
include_unusable, ret_keyblock, ret_kdbhd);
|
2008-04-08 13:04:16 +02:00
|
|
|
|
}
|
2006-04-19 13:26:11 +02:00
|
|
|
|
|
|
|
|
|
/* If the requested name resembles a valid mailbox and automatic
|
|
|
|
|
retrieval has been enabled, we try to import the key. */
|
2019-07-04 10:42:48 +02:00
|
|
|
|
if (gpg_err_code (rc) == GPG_ERR_NO_PUBKEY
|
|
|
|
|
&& mode != GET_PUBKEY_NO_AKL
|
2021-04-21 18:32:21 +02:00
|
|
|
|
&& (is_mbox || is_fpr))
|
2006-04-19 13:26:11 +02:00
|
|
|
|
{
|
2016-11-04 14:51:19 +01:00
|
|
|
|
/* NAME wasn't present in the local keyring (or we didn't try
|
|
|
|
|
* the local keyring). Since the auto key locate feature is
|
|
|
|
|
* enabled and NAME appears to be an email address, try the auto
|
|
|
|
|
* locate feature. */
|
2010-01-09 20:00:46 +01:00
|
|
|
|
for (akl = opt.auto_key_locate; akl; akl = akl->next)
|
2006-04-19 13:26:11 +02:00
|
|
|
|
{
|
2008-04-08 13:04:16 +02:00
|
|
|
|
unsigned char *fpr = NULL;
|
2006-04-19 13:26:11 +02:00
|
|
|
|
size_t fpr_len;
|
2016-04-27 08:34:29 +02:00
|
|
|
|
int did_akl_local = 0;
|
2010-01-09 20:00:46 +01:00
|
|
|
|
int no_fingerprint = 0;
|
2018-08-28 15:22:35 +02:00
|
|
|
|
const char *mechanism_string = "?";
|
2010-01-09 20:00:46 +01:00
|
|
|
|
|
2018-08-28 15:22:35 +02:00
|
|
|
|
mechanism_type = akl->type;
|
|
|
|
|
switch (mechanism_type)
|
2006-04-19 13:26:11 +02:00
|
|
|
|
{
|
2010-01-09 20:00:46 +01:00
|
|
|
|
case AKL_NODEFAULT:
|
|
|
|
|
/* This is a dummy mechanism. */
|
2019-07-04 15:21:39 +02:00
|
|
|
|
mechanism_string = "";
|
2015-01-22 12:06:11 +01:00
|
|
|
|
rc = GPG_ERR_NO_PUBKEY;
|
2010-01-09 20:00:46 +01:00
|
|
|
|
break;
|
|
|
|
|
|
|
|
|
|
case AKL_LOCAL:
|
2019-07-04 15:13:26 +02:00
|
|
|
|
if (mode == GET_PUBKEY_NO_LOCAL)
|
|
|
|
|
{
|
2021-04-21 18:32:21 +02:00
|
|
|
|
/* Note that we get here in is_fpr more, so there is
|
|
|
|
|
* no extra check for it required. */
|
2019-07-04 15:21:39 +02:00
|
|
|
|
mechanism_string = "";
|
2019-07-04 15:13:26 +02:00
|
|
|
|
rc = GPG_ERR_NO_PUBKEY;
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
|
|
|
|
mechanism_string = "Local";
|
|
|
|
|
did_akl_local = 1;
|
|
|
|
|
if (retctx)
|
|
|
|
|
{
|
|
|
|
|
getkey_end (ctrl, *retctx);
|
|
|
|
|
*retctx = NULL;
|
|
|
|
|
}
|
|
|
|
|
add_to_strlist (&namelist, name);
|
|
|
|
|
rc = key_byname (ctrl, anylocalfirst ? retctx : NULL,
|
|
|
|
|
namelist, pk, 0,
|
|
|
|
|
include_unusable, ret_keyblock, ret_kdbhd);
|
|
|
|
|
}
|
2010-01-09 20:00:46 +01:00
|
|
|
|
break;
|
2008-04-08 13:04:16 +02:00
|
|
|
|
|
2006-04-19 13:26:11 +02:00
|
|
|
|
case AKL_CERT:
|
2021-04-21 18:32:21 +02:00
|
|
|
|
if (is_fpr)
|
|
|
|
|
{
|
|
|
|
|
mechanism_string = "";
|
|
|
|
|
rc = GPG_ERR_NO_PUBKEY;
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
|
|
|
|
mechanism_string = "DNS CERT";
|
|
|
|
|
glo_ctrl.in_auto_key_retrieve++;
|
|
|
|
|
rc = keyserver_import_cert (ctrl, name, 0, &fpr, &fpr_len);
|
|
|
|
|
glo_ctrl.in_auto_key_retrieve--;
|
|
|
|
|
}
|
|
|
|
|
break;
|
2006-04-19 13:26:11 +02:00
|
|
|
|
|
|
|
|
|
case AKL_PKA:
|
2021-02-02 19:53:21 +01:00
|
|
|
|
/* This is now obsolete. */
|
2006-04-19 13:26:11 +02:00
|
|
|
|
break;
|
|
|
|
|
|
2015-10-06 20:31:43 +02:00
|
|
|
|
case AKL_DANE:
|
2021-04-21 18:32:21 +02:00
|
|
|
|
if (is_fpr)
|
|
|
|
|
{
|
|
|
|
|
mechanism_string = "";
|
|
|
|
|
rc = GPG_ERR_NO_PUBKEY;
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
|
|
|
|
mechanism_string = "DANE";
|
|
|
|
|
glo_ctrl.in_auto_key_retrieve++;
|
|
|
|
|
rc = keyserver_import_cert (ctrl, name, 1, &fpr, &fpr_len);
|
|
|
|
|
glo_ctrl.in_auto_key_retrieve--;
|
|
|
|
|
}
|
2015-10-06 20:31:43 +02:00
|
|
|
|
break;
|
|
|
|
|
|
2016-04-27 08:34:29 +02:00
|
|
|
|
case AKL_WKD:
|
2021-04-21 18:32:21 +02:00
|
|
|
|
if (is_fpr)
|
|
|
|
|
{
|
|
|
|
|
mechanism_string = "";
|
|
|
|
|
rc = GPG_ERR_NO_PUBKEY;
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
|
|
|
|
mechanism_string = "WKD";
|
|
|
|
|
glo_ctrl.in_auto_key_retrieve++;
|
|
|
|
|
rc = keyserver_import_wkd (ctrl, name, 0, &fpr, &fpr_len);
|
|
|
|
|
glo_ctrl.in_auto_key_retrieve--;
|
|
|
|
|
}
|
2016-04-27 08:34:29 +02:00
|
|
|
|
break;
|
|
|
|
|
|
2006-04-19 13:26:11 +02:00
|
|
|
|
case AKL_LDAP:
|
2021-04-21 18:32:21 +02:00
|
|
|
|
if (is_fpr)
|
|
|
|
|
{
|
|
|
|
|
mechanism_string = "";
|
|
|
|
|
rc = GPG_ERR_NO_PUBKEY;
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
|
|
|
|
mechanism_string = "LDAP";
|
|
|
|
|
glo_ctrl.in_auto_key_retrieve++;
|
|
|
|
|
rc = keyserver_import_ldap (ctrl, name, &fpr, &fpr_len);
|
|
|
|
|
glo_ctrl.in_auto_key_retrieve--;
|
|
|
|
|
}
|
|
|
|
|
break;
|
2006-04-19 13:26:11 +02:00
|
|
|
|
|
2020-12-17 18:18:52 +01:00
|
|
|
|
case AKL_NTDS:
|
|
|
|
|
mechanism_string = "NTDS";
|
|
|
|
|
glo_ctrl.in_auto_key_retrieve++;
|
2021-04-21 18:32:21 +02:00
|
|
|
|
if (is_fpr)
|
|
|
|
|
rc = keyserver_import_fprint_ntds (ctrl,
|
|
|
|
|
fprbuf.u.fpr, fprbuf.fprlen);
|
|
|
|
|
else
|
|
|
|
|
rc = keyserver_import_ntds (ctrl, name, &fpr, &fpr_len);
|
2020-12-17 18:18:52 +01:00
|
|
|
|
glo_ctrl.in_auto_key_retrieve--;
|
|
|
|
|
break;
|
|
|
|
|
|
2006-04-19 13:26:11 +02:00
|
|
|
|
case AKL_KEYSERVER:
|
|
|
|
|
/* Strictly speaking, we don't need to only use a valid
|
2016-11-04 14:51:19 +01:00
|
|
|
|
* mailbox for the getname search, but it helps cut down
|
|
|
|
|
* on the problem of searching for something like "john"
|
|
|
|
|
* and getting a whole lot of keys back. */
|
2016-01-21 11:49:27 +01:00
|
|
|
|
if (keyserver_any_configured (ctrl))
|
2006-04-19 13:26:11 +02:00
|
|
|
|
{
|
2018-08-28 15:22:35 +02:00
|
|
|
|
mechanism_string = "keyserver";
|
2006-04-19 13:26:11 +02:00
|
|
|
|
glo_ctrl.in_auto_key_retrieve++;
|
2021-04-21 18:32:21 +02:00
|
|
|
|
if (is_fpr)
|
|
|
|
|
{
|
|
|
|
|
rc = keyserver_import_fprint (ctrl,
|
|
|
|
|
fprbuf.u.fpr, fprbuf.fprlen,
|
|
|
|
|
opt.keyserver,
|
|
|
|
|
KEYSERVER_IMPORT_FLAG_LDAP);
|
|
|
|
|
/* Map error codes because Dirmngr returns NO
|
|
|
|
|
* DATA if the keyserver does not have the
|
|
|
|
|
* requested key. It returns NO KEYSERVER if no
|
|
|
|
|
* LDAP keyservers are configured. */
|
|
|
|
|
if (gpg_err_code (rc) == GPG_ERR_NO_DATA
|
|
|
|
|
|| gpg_err_code (rc) == GPG_ERR_NO_KEYSERVER)
|
|
|
|
|
rc = gpg_error (GPG_ERR_NO_PUBKEY);
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
2021-04-26 15:32:51 +02:00
|
|
|
|
rc = keyserver_import_mbox (ctrl, name, &fpr, &fpr_len,
|
2021-04-21 18:32:21 +02:00
|
|
|
|
opt.keyserver);
|
|
|
|
|
}
|
2006-04-19 13:26:11 +02:00
|
|
|
|
glo_ctrl.in_auto_key_retrieve--;
|
|
|
|
|
}
|
2010-01-09 20:00:46 +01:00
|
|
|
|
else
|
|
|
|
|
{
|
2018-08-28 15:22:35 +02:00
|
|
|
|
mechanism_string = "Unconfigured keyserver";
|
2015-01-22 12:06:11 +01:00
|
|
|
|
rc = GPG_ERR_NO_PUBKEY;
|
2010-01-09 20:00:46 +01:00
|
|
|
|
}
|
2006-04-19 13:26:11 +02:00
|
|
|
|
break;
|
|
|
|
|
|
|
|
|
|
case AKL_SPEC:
|
|
|
|
|
{
|
|
|
|
|
struct keyserver_spec *keyserver;
|
|
|
|
|
|
2018-08-28 15:22:35 +02:00
|
|
|
|
mechanism_string = akl->spec->uri;
|
2010-01-09 20:00:46 +01:00
|
|
|
|
keyserver = keyserver_match (akl->spec);
|
2006-04-19 13:26:11 +02:00
|
|
|
|
glo_ctrl.in_auto_key_retrieve++;
|
2021-04-21 18:32:21 +02:00
|
|
|
|
if (is_fpr)
|
|
|
|
|
{
|
|
|
|
|
rc = keyserver_import_fprint (ctrl,
|
|
|
|
|
fprbuf.u.fpr, fprbuf.fprlen,
|
|
|
|
|
opt.keyserver,
|
|
|
|
|
KEYSERVER_IMPORT_FLAG_LDAP);
|
|
|
|
|
if (gpg_err_code (rc) == GPG_ERR_NO_DATA
|
|
|
|
|
|| gpg_err_code (rc) == GPG_ERR_NO_KEYSERVER)
|
|
|
|
|
rc = gpg_error (GPG_ERR_NO_PUBKEY);
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
2021-04-26 15:32:51 +02:00
|
|
|
|
rc = keyserver_import_mbox (ctrl, name,
|
2021-04-21 18:32:21 +02:00
|
|
|
|
&fpr, &fpr_len, keyserver);
|
|
|
|
|
}
|
2006-04-19 13:26:11 +02:00
|
|
|
|
glo_ctrl.in_auto_key_retrieve--;
|
|
|
|
|
}
|
|
|
|
|
break;
|
|
|
|
|
}
|
2010-01-09 20:00:46 +01:00
|
|
|
|
|
2006-04-19 13:26:11 +02:00
|
|
|
|
/* Use the fingerprint of the key that we actually fetched.
|
2016-11-04 14:51:19 +01:00
|
|
|
|
* This helps prevent problems where the key that we fetched
|
|
|
|
|
* doesn't have the same name that we used to fetch it. In
|
2021-02-02 19:53:21 +01:00
|
|
|
|
* the case of CERT, this is an actual security
|
2016-11-04 14:51:19 +01:00
|
|
|
|
* requirement as the URL might point to a key put in by an
|
|
|
|
|
* attacker. By forcing the use of the fingerprint, we
|
|
|
|
|
* won't use the attacker's key here. */
|
2021-04-21 18:32:21 +02:00
|
|
|
|
if (!rc && (fpr || is_fpr))
|
2006-04-19 13:26:11 +02:00
|
|
|
|
{
|
2010-01-09 20:00:46 +01:00
|
|
|
|
char fpr_string[MAX_FINGERPRINT_LEN * 2 + 1];
|
|
|
|
|
|
2021-04-21 18:32:21 +02:00
|
|
|
|
if (is_fpr)
|
|
|
|
|
{
|
|
|
|
|
log_assert (fprbuf.fprlen <= MAX_FINGERPRINT_LEN);
|
|
|
|
|
bin2hex (fprbuf.u.fpr, fprbuf.fprlen, fpr_string);
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
|
|
|
|
log_assert (fpr_len <= MAX_FINGERPRINT_LEN);
|
|
|
|
|
bin2hex (fpr, fpr_len, fpr_string);
|
|
|
|
|
}
|
2006-04-19 13:26:11 +02:00
|
|
|
|
|
2010-01-09 20:00:46 +01:00
|
|
|
|
if (opt.verbose)
|
|
|
|
|
log_info ("auto-key-locate found fingerprint %s\n",
|
|
|
|
|
fpr_string);
|
2006-04-19 13:26:11 +02:00
|
|
|
|
|
2021-04-21 18:32:21 +02:00
|
|
|
|
free_strlist (namelist);
|
|
|
|
|
namelist = NULL;
|
2010-01-09 20:00:46 +01:00
|
|
|
|
add_to_strlist (&namelist, fpr_string);
|
|
|
|
|
}
|
2016-04-27 08:34:29 +02:00
|
|
|
|
else if (!rc && !fpr && !did_akl_local)
|
|
|
|
|
{ /* The acquisition method said no failure occurred, but
|
2016-11-04 14:51:19 +01:00
|
|
|
|
* it didn't return a fingerprint. That's a failure. */
|
2016-04-27 08:34:29 +02:00
|
|
|
|
no_fingerprint = 1;
|
2015-01-22 12:06:11 +01:00
|
|
|
|
rc = GPG_ERR_NO_PUBKEY;
|
2010-01-09 20:00:46 +01:00
|
|
|
|
}
|
|
|
|
|
xfree (fpr);
|
|
|
|
|
fpr = NULL;
|
|
|
|
|
|
2016-04-27 08:34:29 +02:00
|
|
|
|
if (!rc && !did_akl_local)
|
|
|
|
|
{ /* There was no error and we didn't do a local lookup.
|
2016-11-04 14:51:19 +01:00
|
|
|
|
* This means that we imported a key into the local
|
|
|
|
|
* keyring. Try to read the imported key from the
|
|
|
|
|
* keyring. */
|
2010-01-09 20:00:46 +01:00
|
|
|
|
if (retctx)
|
|
|
|
|
{
|
2017-03-31 20:35:28 +02:00
|
|
|
|
getkey_end (ctrl, *retctx);
|
2010-01-09 20:00:46 +01:00
|
|
|
|
*retctx = NULL;
|
|
|
|
|
}
|
2017-03-31 20:03:52 +02:00
|
|
|
|
rc = key_byname (ctrl, anylocalfirst ? retctx : NULL,
|
2010-04-21 18:26:17 +02:00
|
|
|
|
namelist, pk, 0,
|
2010-01-09 20:00:46 +01:00
|
|
|
|
include_unusable, ret_keyblock, ret_kdbhd);
|
2006-04-19 13:26:11 +02:00
|
|
|
|
}
|
2008-04-08 13:04:16 +02:00
|
|
|
|
if (!rc)
|
2010-01-09 20:00:46 +01:00
|
|
|
|
{
|
|
|
|
|
/* Key found. */
|
2017-11-15 08:47:32 +01:00
|
|
|
|
if (opt.verbose)
|
|
|
|
|
log_info (_("automatically retrieved '%s' via %s\n"),
|
2018-08-28 15:22:35 +02:00
|
|
|
|
name, mechanism_string);
|
2010-01-09 20:00:46 +01:00
|
|
|
|
break;
|
|
|
|
|
}
|
2019-07-04 15:21:39 +02:00
|
|
|
|
if ((gpg_err_code (rc) != GPG_ERR_NO_PUBKEY
|
|
|
|
|
|| opt.verbose || no_fingerprint) && *mechanism_string)
|
2012-06-05 19:29:22 +02:00
|
|
|
|
log_info (_("error retrieving '%s' via %s: %s\n"),
|
2018-08-28 15:22:35 +02:00
|
|
|
|
name, mechanism_string,
|
2015-01-22 12:06:11 +01:00
|
|
|
|
no_fingerprint ? _("No fingerprint") : gpg_strerror (rc));
|
2006-04-19 13:26:11 +02:00
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2008-05-07 20:19:41 +02:00
|
|
|
|
if (rc && retctx)
|
|
|
|
|
{
|
2017-03-31 20:35:28 +02:00
|
|
|
|
getkey_end (ctrl, *retctx);
|
2008-05-07 20:19:41 +02:00
|
|
|
|
*retctx = NULL;
|
|
|
|
|
}
|
|
|
|
|
|
2015-11-13 12:56:13 +01:00
|
|
|
|
if (retctx && *retctx)
|
|
|
|
|
{
|
2019-09-30 14:08:13 +02:00
|
|
|
|
GETKEY_CTX ctx = *retctx;
|
|
|
|
|
strlist_t sl;
|
|
|
|
|
|
|
|
|
|
if (ctx->extra_list)
|
|
|
|
|
{
|
|
|
|
|
for (sl=ctx->extra_list; sl->next; sl = sl->next)
|
|
|
|
|
;
|
|
|
|
|
sl->next = namelist;
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
ctx->extra_list = namelist;
|
2018-08-28 15:22:35 +02:00
|
|
|
|
(*retctx)->found_via_akl = mechanism_type;
|
2015-11-13 12:56:13 +01:00
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
free_strlist (namelist);
|
|
|
|
|
|
2006-04-19 13:26:11 +02:00
|
|
|
|
return rc;
|
2003-06-05 09:14:21 +02:00
|
|
|
|
}
|
|
|
|
|
|
2016-11-04 14:51:19 +01:00
|
|
|
|
|
2016-10-27 18:48:51 +02:00
|
|
|
|
|
|
|
|
|
|
|
|
|
|
/* Comparison machinery for get_best_pubkey_byname. */
|
|
|
|
|
|
|
|
|
|
/* First we have a struct to cache computed information about the key
|
|
|
|
|
* in question. */
|
|
|
|
|
struct pubkey_cmp_cookie
|
|
|
|
|
{
|
|
|
|
|
int valid; /* Is this cookie valid? */
|
|
|
|
|
PKT_public_key key; /* The key. */
|
|
|
|
|
PKT_user_id *uid; /* The matching UID packet. */
|
|
|
|
|
unsigned int validity; /* Computed validity of (KEY, UID). */
|
|
|
|
|
u32 creation_time; /* Creation time of the newest subkey
|
|
|
|
|
capable of encryption. */
|
|
|
|
|
};
|
|
|
|
|
|
2016-11-04 14:51:19 +01:00
|
|
|
|
|
2016-10-27 18:48:51 +02:00
|
|
|
|
/* Then we have a series of helper functions. */
|
|
|
|
|
static int
|
|
|
|
|
key_is_ok (const PKT_public_key *key)
|
|
|
|
|
{
|
2016-11-04 14:51:19 +01:00
|
|
|
|
return (! key->has_expired && ! key->flags.revoked
|
|
|
|
|
&& key->flags.valid && ! key->flags.disabled);
|
2016-10-27 18:48:51 +02:00
|
|
|
|
}
|
|
|
|
|
|
2016-11-04 14:51:19 +01:00
|
|
|
|
|
2016-10-27 18:48:51 +02:00
|
|
|
|
static int
|
|
|
|
|
uid_is_ok (const PKT_public_key *key, const PKT_user_id *uid)
|
|
|
|
|
{
|
2017-03-08 11:01:22 +01:00
|
|
|
|
return key_is_ok (key) && ! uid->flags.revoked;
|
2016-10-27 18:48:51 +02:00
|
|
|
|
}
|
|
|
|
|
|
2016-11-04 14:51:19 +01:00
|
|
|
|
|
2016-10-27 18:48:51 +02:00
|
|
|
|
static int
|
|
|
|
|
subkey_is_ok (const PKT_public_key *sub)
|
|
|
|
|
{
|
|
|
|
|
return ! sub->flags.revoked && sub->flags.valid && ! sub->flags.disabled;
|
|
|
|
|
}
|
|
|
|
|
|
2020-09-21 09:11:33 +02:00
|
|
|
|
/* Return true if KEYBLOCK has only expired encryption subkeys. Note
|
2018-08-28 15:22:35 +02:00
|
|
|
|
* that the function returns false if the key has no encryption
|
2019-04-01 18:12:35 +02:00
|
|
|
|
* subkeys at all or the subkeys are revoked. */
|
2018-08-28 15:22:35 +02:00
|
|
|
|
static int
|
|
|
|
|
only_expired_enc_subkeys (kbnode_t keyblock)
|
|
|
|
|
{
|
|
|
|
|
kbnode_t node;
|
|
|
|
|
PKT_public_key *sub;
|
|
|
|
|
int any = 0;
|
|
|
|
|
|
|
|
|
|
for (node = find_next_kbnode (keyblock, PKT_PUBLIC_SUBKEY);
|
|
|
|
|
node; node = find_next_kbnode (node, PKT_PUBLIC_SUBKEY))
|
|
|
|
|
{
|
|
|
|
|
sub = node->pkt->pkt.public_key;
|
|
|
|
|
|
|
|
|
|
if (!(sub->pubkey_usage & PUBKEY_USAGE_ENC))
|
|
|
|
|
continue;
|
|
|
|
|
|
|
|
|
|
if (!subkey_is_ok (sub))
|
|
|
|
|
continue;
|
|
|
|
|
|
|
|
|
|
any = 1;
|
|
|
|
|
if (!sub->has_expired)
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return any? 1 : 0;
|
|
|
|
|
}
|
2016-11-04 14:51:19 +01:00
|
|
|
|
|
2016-10-27 18:48:51 +02:00
|
|
|
|
/* Finally this function compares a NEW key to the former candidate
|
|
|
|
|
* OLD. Returns < 0 if the old key is worse, > 0 if the old key is
|
|
|
|
|
* better, == 0 if it is a tie. */
|
|
|
|
|
static int
|
|
|
|
|
pubkey_cmp (ctrl_t ctrl, const char *name, struct pubkey_cmp_cookie *old,
|
|
|
|
|
struct pubkey_cmp_cookie *new, KBNODE new_keyblock)
|
|
|
|
|
{
|
2016-11-04 14:51:19 +01:00
|
|
|
|
kbnode_t n;
|
2016-10-27 18:48:51 +02:00
|
|
|
|
|
2019-10-17 02:23:26 +02:00
|
|
|
|
if ((new->key.pubkey_usage & PUBKEY_USAGE_ENC) == 0)
|
|
|
|
|
new->creation_time = 0;
|
|
|
|
|
else
|
|
|
|
|
new->creation_time = new->key.timestamp;
|
|
|
|
|
|
2016-10-27 18:48:51 +02:00
|
|
|
|
for (n = find_next_kbnode (new_keyblock, PKT_PUBLIC_SUBKEY);
|
|
|
|
|
n; n = find_next_kbnode (n, PKT_PUBLIC_SUBKEY))
|
|
|
|
|
{
|
|
|
|
|
PKT_public_key *sub = n->pkt->pkt.public_key;
|
|
|
|
|
|
|
|
|
|
if ((sub->pubkey_usage & PUBKEY_USAGE_ENC) == 0)
|
|
|
|
|
continue;
|
|
|
|
|
|
|
|
|
|
if (! subkey_is_ok (sub))
|
|
|
|
|
continue;
|
|
|
|
|
|
|
|
|
|
if (sub->timestamp > new->creation_time)
|
|
|
|
|
new->creation_time = sub->timestamp;
|
|
|
|
|
}
|
|
|
|
|
|
2019-10-17 02:23:26 +02:00
|
|
|
|
/* When new key has no encryption key, use OLD key. */
|
|
|
|
|
if (new->creation_time == 0)
|
|
|
|
|
return 1;
|
|
|
|
|
|
2016-10-27 18:48:51 +02:00
|
|
|
|
for (n = find_next_kbnode (new_keyblock, PKT_USER_ID);
|
|
|
|
|
n; n = find_next_kbnode (n, PKT_USER_ID))
|
|
|
|
|
{
|
|
|
|
|
PKT_user_id *uid = n->pkt->pkt.user_id;
|
2018-11-12 07:44:33 +01:00
|
|
|
|
char *mbox = mailbox_from_userid (uid->name, 0);
|
2016-10-27 18:48:51 +02:00
|
|
|
|
int match = mbox ? strcasecmp (name, mbox) == 0 : 0;
|
|
|
|
|
|
|
|
|
|
xfree (mbox);
|
|
|
|
|
if (! match)
|
|
|
|
|
continue;
|
|
|
|
|
|
2016-11-15 15:06:28 +01:00
|
|
|
|
new->uid = scopy_user_id (uid);
|
2016-10-27 18:48:51 +02:00
|
|
|
|
new->validity =
|
2016-11-23 12:29:22 +01:00
|
|
|
|
get_validity (ctrl, new_keyblock, &new->key, uid, NULL, 0) & TRUST_MASK;
|
2016-10-27 18:48:51 +02:00
|
|
|
|
new->valid = 1;
|
|
|
|
|
|
|
|
|
|
if (! old->valid)
|
|
|
|
|
return -1; /* No OLD key. */
|
|
|
|
|
|
|
|
|
|
if (! uid_is_ok (&old->key, old->uid) && uid_is_ok (&new->key, uid))
|
|
|
|
|
return -1; /* Validity of the NEW key is better. */
|
|
|
|
|
|
2021-02-05 05:49:10 +01:00
|
|
|
|
if (new->validity != TRUST_EXPIRED && old->validity < new->validity)
|
|
|
|
|
return -1; /* Validity of the NEW key is better. */
|
|
|
|
|
if (old->validity == TRUST_EXPIRED && new->validity != TRUST_EXPIRED)
|
2016-10-27 18:48:51 +02:00
|
|
|
|
return -1; /* Validity of the NEW key is better. */
|
|
|
|
|
|
|
|
|
|
if (old->validity == new->validity && uid_is_ok (&new->key, uid)
|
|
|
|
|
&& old->creation_time < new->creation_time)
|
|
|
|
|
return -1; /* Both keys are of the same validity, but the
|
|
|
|
|
NEW key is newer. */
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* Stick with the OLD key. */
|
|
|
|
|
return 1;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
/* This function works like get_pubkey_byname, but if the name
|
|
|
|
|
* resembles a mail address, the results are ranked and only the best
|
|
|
|
|
* result is returned. */
|
2017-07-28 11:08:32 +02:00
|
|
|
|
gpg_error_t
|
2019-07-04 15:13:26 +02:00
|
|
|
|
get_best_pubkey_byname (ctrl_t ctrl, enum get_pubkey_modes mode,
|
|
|
|
|
GETKEY_CTX *retctx, PKT_public_key *pk,
|
2016-10-27 18:48:51 +02:00
|
|
|
|
const char *name, KBNODE *ret_keyblock,
|
2018-08-28 15:11:10 +02:00
|
|
|
|
int include_unusable)
|
2016-10-27 18:48:51 +02:00
|
|
|
|
{
|
2017-07-28 11:08:32 +02:00
|
|
|
|
gpg_error_t err;
|
2016-10-27 18:48:51 +02:00
|
|
|
|
struct getkey_ctx_s *ctx = NULL;
|
2019-12-04 14:39:42 +01:00
|
|
|
|
int is_mbox;
|
2018-08-28 15:22:35 +02:00
|
|
|
|
int wkd_tried = 0;
|
2019-10-16 08:58:26 +02:00
|
|
|
|
PKT_public_key pk0;
|
2016-10-27 18:48:51 +02:00
|
|
|
|
|
2019-10-09 02:45:11 +02:00
|
|
|
|
log_assert (ret_keyblock != NULL);
|
|
|
|
|
|
2016-11-07 12:53:17 +01:00
|
|
|
|
if (retctx)
|
|
|
|
|
*retctx = NULL;
|
|
|
|
|
|
2019-10-16 08:58:26 +02:00
|
|
|
|
memset (&pk0, 0, sizeof pk0);
|
|
|
|
|
pk0.req_usage = pk? pk->req_usage : 0;
|
|
|
|
|
|
2019-12-04 14:39:42 +01:00
|
|
|
|
is_mbox = is_valid_mailbox (name);
|
|
|
|
|
if (!is_mbox && *name == '<' && name[1] && name[strlen(name)-1]=='>'
|
|
|
|
|
&& name[1] != '>'
|
|
|
|
|
&& is_valid_mailbox_mem (name+1, strlen (name)-2))
|
|
|
|
|
{
|
|
|
|
|
/* The mailbox is in the form "<foo@example.org>" which is not
|
|
|
|
|
* detected by is_valid_mailbox. Set the flag but keep name as
|
|
|
|
|
* it is because get_pubkey_byname does an is_valid_mailbox_mem
|
|
|
|
|
* itself. */
|
|
|
|
|
is_mbox = 1;
|
|
|
|
|
}
|
|
|
|
|
|
2018-08-28 15:22:35 +02:00
|
|
|
|
start_over:
|
|
|
|
|
if (ctx) /* Clear in case of a start over. */
|
|
|
|
|
{
|
2019-10-15 12:18:26 +02:00
|
|
|
|
release_kbnode (*ret_keyblock);
|
|
|
|
|
*ret_keyblock = NULL;
|
2018-08-28 15:22:35 +02:00
|
|
|
|
getkey_end (ctrl, ctx);
|
|
|
|
|
ctx = NULL;
|
|
|
|
|
}
|
2019-07-04 15:13:26 +02:00
|
|
|
|
err = get_pubkey_byname (ctrl, mode,
|
2019-10-16 08:58:26 +02:00
|
|
|
|
&ctx, &pk0, name, ret_keyblock,
|
2019-07-04 10:42:48 +02:00
|
|
|
|
NULL, include_unusable);
|
2017-07-28 11:08:32 +02:00
|
|
|
|
if (err)
|
2016-10-27 18:48:51 +02:00
|
|
|
|
{
|
2019-12-04 14:39:42 +01:00
|
|
|
|
goto leave;
|
2016-10-27 18:48:51 +02:00
|
|
|
|
}
|
|
|
|
|
|
2018-08-28 15:22:35 +02:00
|
|
|
|
/* If the keyblock was retrieved from the local database and the key
|
|
|
|
|
* has expired, do further checks. However, we can do this only if
|
|
|
|
|
* the caller requested a keyblock. */
|
2019-10-15 12:18:26 +02:00
|
|
|
|
if (is_mbox && ctx && ctx->found_via_akl == AKL_LOCAL)
|
2018-08-28 15:22:35 +02:00
|
|
|
|
{
|
|
|
|
|
u32 now = make_timestamp ();
|
|
|
|
|
int found;
|
|
|
|
|
|
|
|
|
|
/* If the key has expired and its origin was the WKD then try to
|
|
|
|
|
* get a fresh key from the WKD. We also try this if the key
|
|
|
|
|
* has any only expired encryption subkeys. In case we checked
|
|
|
|
|
* for a fresh copy in the last 3 hours we won't do that again.
|
|
|
|
|
* Unfortunately that does not yet work because KEYUPDATE is
|
|
|
|
|
* only updated during import iff the key has actually changed
|
|
|
|
|
* (see import.c:import_one). */
|
2019-10-16 08:58:26 +02:00
|
|
|
|
if (!wkd_tried && pk0.keyorg == KEYORG_WKD
|
|
|
|
|
&& (pk0.keyupdate + 3*3600) < now
|
|
|
|
|
&& (pk0.has_expired || only_expired_enc_subkeys (*ret_keyblock)))
|
2018-08-28 15:22:35 +02:00
|
|
|
|
{
|
|
|
|
|
if (opt.verbose)
|
|
|
|
|
log_info (_("checking for a fresh copy of an expired key via %s\n"),
|
|
|
|
|
"WKD");
|
|
|
|
|
wkd_tried = 1;
|
|
|
|
|
glo_ctrl.in_auto_key_retrieve++;
|
|
|
|
|
found = !keyserver_import_wkd (ctrl, name, 0, NULL, NULL);
|
|
|
|
|
glo_ctrl.in_auto_key_retrieve--;
|
|
|
|
|
if (found)
|
2019-10-16 08:58:26 +02:00
|
|
|
|
{
|
|
|
|
|
release_public_key_parts (&pk0);
|
|
|
|
|
goto start_over;
|
|
|
|
|
}
|
2018-08-28 15:22:35 +02:00
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (is_mbox && ctx)
|
2016-10-27 18:48:51 +02:00
|
|
|
|
{
|
2019-10-17 02:23:26 +02:00
|
|
|
|
/* Rank results and return only the most relevant key for encryption. */
|
2017-03-05 23:24:15 +01:00
|
|
|
|
struct pubkey_cmp_cookie best = { 0 };
|
2017-07-28 10:58:59 +02:00
|
|
|
|
struct pubkey_cmp_cookie new = { 0 };
|
2017-03-05 23:24:15 +01:00
|
|
|
|
kbnode_t new_keyblock;
|
|
|
|
|
|
2019-10-16 08:58:26 +02:00
|
|
|
|
copy_public_key (&new.key, &pk0);
|
|
|
|
|
if (pubkey_cmp (ctrl, name, &best, &new, *ret_keyblock) >= 0)
|
|
|
|
|
{
|
|
|
|
|
release_public_key_parts (&new.key);
|
|
|
|
|
free_user_id (new.uid);
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
best = new;
|
|
|
|
|
new.uid = NULL;
|
2019-10-09 02:45:11 +02:00
|
|
|
|
|
2019-10-15 12:18:26 +02:00
|
|
|
|
while (getkey_next (ctrl, ctx, &new.key, &new_keyblock) == 0)
|
2016-10-27 18:48:51 +02:00
|
|
|
|
{
|
|
|
|
|
int diff = pubkey_cmp (ctrl, name, &best, &new, new_keyblock);
|
|
|
|
|
release_kbnode (new_keyblock);
|
|
|
|
|
if (diff < 0)
|
|
|
|
|
{
|
|
|
|
|
/* New key is better. */
|
|
|
|
|
release_public_key_parts (&best.key);
|
2016-11-15 16:23:41 +01:00
|
|
|
|
free_user_id (best.uid);
|
2016-10-27 18:48:51 +02:00
|
|
|
|
best = new;
|
|
|
|
|
}
|
|
|
|
|
else if (diff > 0)
|
|
|
|
|
{
|
|
|
|
|
/* Old key is better. */
|
|
|
|
|
release_public_key_parts (&new.key);
|
2016-11-15 16:23:41 +01:00
|
|
|
|
free_user_id (new.uid);
|
2016-10-27 18:48:51 +02:00
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
|
|
|
|
/* A tie. Keep the old key. */
|
|
|
|
|
release_public_key_parts (&new.key);
|
2016-11-15 16:23:41 +01:00
|
|
|
|
free_user_id (new.uid);
|
2016-10-27 18:48:51 +02:00
|
|
|
|
}
|
2019-04-18 13:19:05 +02:00
|
|
|
|
new.uid = NULL;
|
2016-10-27 18:48:51 +02:00
|
|
|
|
}
|
2019-10-09 02:45:11 +02:00
|
|
|
|
|
2017-03-31 20:35:28 +02:00
|
|
|
|
getkey_end (ctrl, ctx);
|
2016-10-27 18:48:51 +02:00
|
|
|
|
ctx = NULL;
|
2016-11-15 16:23:41 +01:00
|
|
|
|
free_user_id (best.uid);
|
2017-03-05 23:24:15 +01:00
|
|
|
|
best.uid = NULL;
|
2016-10-27 18:48:51 +02:00
|
|
|
|
|
|
|
|
|
if (best.valid)
|
|
|
|
|
{
|
2019-10-17 02:23:26 +02:00
|
|
|
|
ctx = xtrycalloc (1, sizeof **retctx);
|
|
|
|
|
if (! ctx)
|
|
|
|
|
err = gpg_error_from_syserror ();
|
|
|
|
|
else
|
2016-10-27 18:48:51 +02:00
|
|
|
|
{
|
2019-10-17 02:23:26 +02:00
|
|
|
|
ctx->kr_handle = keydb_new (ctrl);
|
|
|
|
|
if (! ctx->kr_handle)
|
|
|
|
|
{
|
|
|
|
|
err = gpg_error_from_syserror ();
|
|
|
|
|
xfree (ctx);
|
|
|
|
|
ctx = NULL;
|
|
|
|
|
if (retctx)
|
|
|
|
|
*retctx = NULL;
|
|
|
|
|
}
|
2016-10-27 18:48:51 +02:00
|
|
|
|
else
|
|
|
|
|
{
|
2019-10-17 02:23:26 +02:00
|
|
|
|
u32 *keyid = pk_keyid (&best.key);
|
|
|
|
|
ctx->exact = 1;
|
|
|
|
|
ctx->nitems = 1;
|
|
|
|
|
ctx->items[0].mode = KEYDB_SEARCH_MODE_LONG_KID;
|
|
|
|
|
ctx->items[0].u.kid[0] = keyid[0];
|
|
|
|
|
ctx->items[0].u.kid[1] = keyid[1];
|
|
|
|
|
|
|
|
|
|
release_kbnode (*ret_keyblock);
|
|
|
|
|
*ret_keyblock = NULL;
|
|
|
|
|
err = getkey_next (ctrl, ctx, NULL, ret_keyblock);
|
2016-10-27 18:48:51 +02:00
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (pk)
|
2019-10-16 08:58:26 +02:00
|
|
|
|
*pk = best.key;
|
2016-10-27 18:48:51 +02:00
|
|
|
|
else
|
|
|
|
|
release_public_key_parts (&best.key);
|
2019-10-16 08:58:26 +02:00
|
|
|
|
release_public_key_parts (&pk0);
|
2016-10-27 18:48:51 +02:00
|
|
|
|
}
|
2019-10-16 08:58:26 +02:00
|
|
|
|
else
|
|
|
|
|
{
|
|
|
|
|
if (pk)
|
|
|
|
|
*pk = pk0;
|
|
|
|
|
else
|
|
|
|
|
release_public_key_parts (&pk0);
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
|
|
|
|
if (pk)
|
|
|
|
|
*pk = pk0;
|
|
|
|
|
else
|
|
|
|
|
release_public_key_parts (&pk0);
|
2016-10-27 18:48:51 +02:00
|
|
|
|
}
|
|
|
|
|
|
2017-07-28 11:08:32 +02:00
|
|
|
|
if (err && ctx)
|
2016-10-27 18:48:51 +02:00
|
|
|
|
{
|
2017-03-31 20:35:28 +02:00
|
|
|
|
getkey_end (ctrl, ctx);
|
2016-10-27 18:48:51 +02:00
|
|
|
|
ctx = NULL;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (retctx && ctx)
|
2019-12-04 14:39:42 +01:00
|
|
|
|
{
|
|
|
|
|
*retctx = ctx;
|
|
|
|
|
ctx = NULL;
|
|
|
|
|
}
|
2016-10-27 18:48:51 +02:00
|
|
|
|
|
2019-12-04 14:39:42 +01:00
|
|
|
|
leave:
|
|
|
|
|
getkey_end (ctrl, ctx);
|
2017-07-28 11:08:32 +02:00
|
|
|
|
return err;
|
2016-10-27 18:48:51 +02:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
2008-05-07 20:19:41 +02:00
|
|
|
|
|
2016-07-06 14:03:50 +02:00
|
|
|
|
/* Get a public key from a file.
|
|
|
|
|
*
|
|
|
|
|
* PK is the buffer to store the key. The caller needs to make sure
|
|
|
|
|
* that PK->REQ_USAGE is valid. PK->REQ_USAGE is passed through to
|
|
|
|
|
* the lookup function and is a mask of PUBKEY_USAGE_SIG,
|
|
|
|
|
* PUBKEY_USAGE_ENC and PUBKEY_USAGE_CERT. If this is non-zero, only
|
|
|
|
|
* keys with the specified usage will be returned.
|
|
|
|
|
*
|
|
|
|
|
* FNAME is the file name. That file should contain exactly one
|
|
|
|
|
* keyblock.
|
|
|
|
|
*
|
|
|
|
|
* This function returns 0 on success. Otherwise, an error code is
|
|
|
|
|
* returned. In particular, GPG_ERR_NO_PUBKEY is returned if the key
|
2023-03-01 18:56:29 +01:00
|
|
|
|
* is not found. If R_KEYBLOCK is not NULL and a key was found the
|
|
|
|
|
* keyblock is stored there; otherwiese NULL is stored there.
|
2016-07-06 14:03:50 +02:00
|
|
|
|
*
|
|
|
|
|
* The self-signed data has already been merged into the public key
|
|
|
|
|
* using merge_selfsigs. The caller must release the content of PK by
|
|
|
|
|
* calling release_public_key_parts (or, if PK was malloced, using
|
|
|
|
|
* free_public_key).
|
|
|
|
|
*/
|
|
|
|
|
gpg_error_t
|
2023-03-01 18:56:29 +01:00
|
|
|
|
get_pubkey_fromfile (ctrl_t ctrl, PKT_public_key *pk, const char *fname,
|
|
|
|
|
kbnode_t *r_keyblock)
|
2016-07-06 14:03:50 +02:00
|
|
|
|
{
|
|
|
|
|
gpg_error_t err;
|
|
|
|
|
kbnode_t keyblock;
|
|
|
|
|
kbnode_t found_key;
|
|
|
|
|
unsigned int infoflags;
|
|
|
|
|
|
2023-03-01 18:56:29 +01:00
|
|
|
|
if (r_keyblock)
|
|
|
|
|
*r_keyblock = NULL;
|
|
|
|
|
|
2020-03-13 17:14:34 +01:00
|
|
|
|
err = read_key_from_file_or_buffer (ctrl, fname, NULL, 0, &keyblock);
|
2016-07-06 14:03:50 +02:00
|
|
|
|
if (!err)
|
|
|
|
|
{
|
|
|
|
|
/* Warning: node flag bits 0 and 1 should be preserved by
|
|
|
|
|
* merge_selfsigs. FIXME: Check whether this still holds. */
|
2017-03-31 20:03:52 +02:00
|
|
|
|
merge_selfsigs (ctrl, keyblock);
|
2017-09-26 04:02:05 +02:00
|
|
|
|
found_key = finish_lookup (keyblock, pk->req_usage, 0, 0, &infoflags);
|
2016-07-06 14:03:50 +02:00
|
|
|
|
print_status_key_considered (keyblock, infoflags);
|
|
|
|
|
if (found_key)
|
|
|
|
|
pk_from_block (pk, keyblock, found_key);
|
|
|
|
|
else
|
|
|
|
|
err = gpg_error (GPG_ERR_UNUSABLE_PUBKEY);
|
|
|
|
|
}
|
|
|
|
|
|
2023-03-01 18:56:29 +01:00
|
|
|
|
if (!err && r_keyblock)
|
|
|
|
|
*r_keyblock = keyblock;
|
|
|
|
|
else
|
|
|
|
|
release_kbnode (keyblock);
|
2016-07-06 14:03:50 +02:00
|
|
|
|
return err;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
2020-03-13 17:14:34 +01:00
|
|
|
|
/* Return a public key from the buffer (BUFFER, BUFLEN). The key is
|
|
|
|
|
* onlyretruned if it matches the keyid given in WANT_KEYID. On
|
|
|
|
|
* success the key is stored at the caller provided PKBUF structure.
|
|
|
|
|
* The caller must release the content of PK by calling
|
|
|
|
|
* release_public_key_parts (or, if PKBUF was malloced, using
|
|
|
|
|
* free_public_key). If R_KEYBLOCK is not NULL the full keyblock is
|
|
|
|
|
* also stored there. */
|
|
|
|
|
gpg_error_t
|
|
|
|
|
get_pubkey_from_buffer (ctrl_t ctrl, PKT_public_key *pkbuf,
|
|
|
|
|
const void *buffer, size_t buflen, u32 *want_keyid,
|
|
|
|
|
kbnode_t *r_keyblock)
|
|
|
|
|
{
|
|
|
|
|
gpg_error_t err;
|
|
|
|
|
kbnode_t keyblock;
|
|
|
|
|
kbnode_t node;
|
|
|
|
|
PKT_public_key *pk;
|
|
|
|
|
|
|
|
|
|
if (r_keyblock)
|
|
|
|
|
*r_keyblock = NULL;
|
|
|
|
|
|
|
|
|
|
err = read_key_from_file_or_buffer (ctrl, NULL, buffer, buflen, &keyblock);
|
|
|
|
|
if (!err)
|
|
|
|
|
{
|
|
|
|
|
merge_selfsigs (ctrl, keyblock);
|
|
|
|
|
for (node = keyblock; node; node = node->next)
|
|
|
|
|
{
|
|
|
|
|
if (node->pkt->pkttype == PKT_PUBLIC_KEY
|
|
|
|
|
|| node->pkt->pkttype == PKT_PUBLIC_SUBKEY)
|
|
|
|
|
{
|
|
|
|
|
pk = node->pkt->pkt.public_key;
|
|
|
|
|
keyid_from_pk (pk, NULL);
|
|
|
|
|
if (pk->keyid[0] == want_keyid[0]
|
|
|
|
|
&& pk->keyid[1] == want_keyid[1])
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
if (node)
|
|
|
|
|
copy_public_key (pkbuf, pk);
|
|
|
|
|
else
|
|
|
|
|
err = gpg_error (GPG_ERR_NO_PUBKEY);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (!err && r_keyblock)
|
|
|
|
|
*r_keyblock = keyblock;
|
|
|
|
|
else
|
|
|
|
|
release_kbnode (keyblock);
|
|
|
|
|
return err;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
2016-01-11 11:41:49 +01:00
|
|
|
|
/* Lookup a key with the specified fingerprint.
|
|
|
|
|
*
|
|
|
|
|
* If PK is not NULL, the public key of the first result is returned
|
|
|
|
|
* in *PK. Note: this function does an exact search and thus the
|
|
|
|
|
* returned public key may be a subkey rather than the primary key.
|
|
|
|
|
* Note: The self-signed data has already been merged into the public
|
|
|
|
|
* key using merge_selfsigs. Free *PK by calling
|
2023-03-01 17:22:20 +01:00
|
|
|
|
* release_public_key_parts (or, if PK was allocated using xmalloc, you
|
2016-01-11 11:41:49 +01:00
|
|
|
|
* can use free_public_key, which calls release_public_key_parts(PK)
|
|
|
|
|
* and then xfree(PK)).
|
|
|
|
|
*
|
|
|
|
|
* If PK->REQ_USAGE is set, it is used to filter the search results.
|
2023-03-01 17:22:20 +01:00
|
|
|
|
* Thus, if PK is not NULL, PK->REQ_USAGE must be valid! See the
|
2016-01-11 11:41:49 +01:00
|
|
|
|
* documentation for finish_lookup to understand exactly how this is
|
|
|
|
|
* used.
|
|
|
|
|
*
|
|
|
|
|
* If R_KEYBLOCK is not NULL, then the first result's keyblock is
|
|
|
|
|
* returned in *R_KEYBLOCK. This should be freed using
|
|
|
|
|
* release_kbnode().
|
|
|
|
|
*
|
|
|
|
|
* FPRINT is a byte array whose contents is the fingerprint to use as
|
|
|
|
|
* the search term. FPRINT_LEN specifies the length of the
|
2019-04-05 17:02:43 +02:00
|
|
|
|
* fingerprint (in bytes). Currently, only 16, 20, and 32-byte
|
2016-01-11 11:41:49 +01:00
|
|
|
|
* fingerprints are supported.
|
|
|
|
|
*
|
|
|
|
|
* FIXME: We should replace this with the _byname function. This can
|
|
|
|
|
* be done by creating a userID conforming to the unified fingerprint
|
|
|
|
|
* style. */
|
2003-06-05 09:14:21 +02:00
|
|
|
|
int
|
2017-03-31 20:03:52 +02:00
|
|
|
|
get_pubkey_byfprint (ctrl_t ctrl, PKT_public_key *pk, kbnode_t *r_keyblock,
|
2010-01-09 20:00:46 +01:00
|
|
|
|
const byte * fprint, size_t fprint_len)
|
2003-06-05 09:14:21 +02:00
|
|
|
|
{
|
2010-01-09 20:00:46 +01:00
|
|
|
|
int rc;
|
|
|
|
|
|
2015-05-07 12:01:12 +02:00
|
|
|
|
if (r_keyblock)
|
|
|
|
|
*r_keyblock = NULL;
|
|
|
|
|
|
2019-03-14 08:54:59 +01:00
|
|
|
|
if (fprint_len == 32 || fprint_len == 20 || fprint_len == 16)
|
2010-01-09 20:00:46 +01:00
|
|
|
|
{
|
|
|
|
|
struct getkey_ctx_s ctx;
|
|
|
|
|
KBNODE kb = NULL;
|
2015-09-09 21:04:57 +02:00
|
|
|
|
KBNODE found_key = NULL;
|
2010-01-09 20:00:46 +01:00
|
|
|
|
|
|
|
|
|
memset (&ctx, 0, sizeof ctx);
|
|
|
|
|
ctx.exact = 1;
|
|
|
|
|
ctx.not_allocated = 1;
|
2018-07-05 20:55:32 +02:00
|
|
|
|
/* FIXME: We should get the handle from the cache like we do in
|
|
|
|
|
* get_pubkey. */
|
2019-09-09 14:34:09 +02:00
|
|
|
|
ctx.kr_handle = keydb_new (ctrl);
|
2015-12-03 12:18:32 +01:00
|
|
|
|
if (!ctx.kr_handle)
|
|
|
|
|
return gpg_error_from_syserror ();
|
|
|
|
|
|
2010-01-09 20:00:46 +01:00
|
|
|
|
ctx.nitems = 1;
|
2019-03-14 08:54:59 +01:00
|
|
|
|
ctx.items[0].mode = KEYDB_SEARCH_MODE_FPR;
|
2010-01-09 20:00:46 +01:00
|
|
|
|
memcpy (ctx.items[0].u.fpr, fprint, fprint_len);
|
2019-03-14 08:54:59 +01:00
|
|
|
|
ctx.items[0].fprlen = fprint_len;
|
2018-04-02 10:41:50 +02:00
|
|
|
|
if (pk)
|
|
|
|
|
ctx.req_usage = pk->req_usage;
|
2017-03-31 20:03:52 +02:00
|
|
|
|
rc = lookup (ctrl, &ctx, 0, &kb, &found_key);
|
2010-01-09 20:00:46 +01:00
|
|
|
|
if (!rc && pk)
|
2016-07-06 08:46:14 +02:00
|
|
|
|
pk_from_block (pk, kb, found_key);
|
2015-09-14 20:38:07 +02:00
|
|
|
|
if (!rc && r_keyblock)
|
|
|
|
|
{
|
|
|
|
|
*r_keyblock = kb;
|
|
|
|
|
kb = NULL;
|
|
|
|
|
}
|
2010-01-09 20:00:46 +01:00
|
|
|
|
release_kbnode (kb);
|
2017-03-31 20:35:28 +02:00
|
|
|
|
getkey_end (ctrl, &ctx);
|
2010-01-09 20:00:46 +01:00
|
|
|
|
}
|
|
|
|
|
else
|
2015-01-22 12:06:11 +01:00
|
|
|
|
rc = GPG_ERR_GENERAL; /* Oops */
|
2010-01-09 20:00:46 +01:00
|
|
|
|
return rc;
|
2003-06-05 09:14:21 +02:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
2016-01-11 11:41:49 +01:00
|
|
|
|
/* This function is similar to get_pubkey_byfprint, but it doesn't
|
|
|
|
|
* merge the self-signed data into the public key and subkeys or into
|
|
|
|
|
* the user ids. It also doesn't add the key to the user id cache.
|
|
|
|
|
* Further, this function ignores PK->REQ_USAGE.
|
|
|
|
|
*
|
|
|
|
|
* This function is intended to avoid recursion and, as such, should
|
|
|
|
|
* only be used in very specific situations.
|
|
|
|
|
*
|
|
|
|
|
* Like get_pubkey_byfprint, PK may be NULL. In that case, this
|
|
|
|
|
* function effectively just checks for the existence of the key. */
|
2017-10-18 17:52:41 +02:00
|
|
|
|
gpg_error_t
|
2019-09-09 14:34:09 +02:00
|
|
|
|
get_pubkey_byfprint_fast (ctrl_t ctrl, PKT_public_key * pk,
|
2010-01-09 20:00:46 +01:00
|
|
|
|
const byte * fprint, size_t fprint_len)
|
2003-06-05 09:14:21 +02:00
|
|
|
|
{
|
2017-10-18 17:52:41 +02:00
|
|
|
|
gpg_error_t err;
|
2003-06-05 09:14:21 +02:00
|
|
|
|
KBNODE keyblock;
|
2017-10-18 17:52:41 +02:00
|
|
|
|
|
2019-09-09 14:34:09 +02:00
|
|
|
|
err = get_keyblock_byfprint_fast (ctrl,
|
|
|
|
|
&keyblock, NULL, fprint, fprint_len, 0);
|
2017-10-18 17:52:41 +02:00
|
|
|
|
if (!err)
|
|
|
|
|
{
|
|
|
|
|
if (pk)
|
|
|
|
|
copy_public_key (pk, keyblock->pkt->pkt.public_key);
|
|
|
|
|
release_kbnode (keyblock);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return err;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
/* This function is similar to get_pubkey_byfprint_fast but returns a
|
|
|
|
|
* keydb handle at R_HD and the keyblock at R_KEYBLOCK. R_KEYBLOCK or
|
|
|
|
|
* R_HD may be NULL. If LOCK is set the handle has been opend in
|
|
|
|
|
* locked mode and keydb_disable_caching () has been called. On error
|
|
|
|
|
* R_KEYBLOCK is set to NULL but R_HD must be released by the caller;
|
|
|
|
|
* it may have a value of NULL, though. This allows one to do an insert
|
|
|
|
|
* operation on a locked keydb handle. */
|
|
|
|
|
gpg_error_t
|
2019-09-09 14:34:09 +02:00
|
|
|
|
get_keyblock_byfprint_fast (ctrl_t ctrl,
|
|
|
|
|
kbnode_t *r_keyblock, KEYDB_HANDLE *r_hd,
|
2017-10-18 17:52:41 +02:00
|
|
|
|
const byte *fprint, size_t fprint_len, int lock)
|
|
|
|
|
{
|
|
|
|
|
gpg_error_t err;
|
|
|
|
|
KEYDB_HANDLE hd;
|
|
|
|
|
kbnode_t keyblock;
|
2003-06-05 09:14:21 +02:00
|
|
|
|
byte fprbuf[MAX_FINGERPRINT_LEN];
|
|
|
|
|
int i;
|
2010-01-09 20:00:46 +01:00
|
|
|
|
|
2017-10-18 17:52:41 +02:00
|
|
|
|
if (r_keyblock)
|
|
|
|
|
*r_keyblock = NULL;
|
|
|
|
|
if (r_hd)
|
|
|
|
|
*r_hd = NULL;
|
|
|
|
|
|
2010-01-09 20:00:46 +01:00
|
|
|
|
for (i = 0; i < MAX_FINGERPRINT_LEN && i < fprint_len; i++)
|
2003-06-05 09:14:21 +02:00
|
|
|
|
fprbuf[i] = fprint[i];
|
|
|
|
|
|
2019-09-09 14:34:09 +02:00
|
|
|
|
hd = keydb_new (ctrl);
|
2015-12-03 12:18:32 +01:00
|
|
|
|
if (!hd)
|
|
|
|
|
return gpg_error_from_syserror ();
|
|
|
|
|
|
2017-10-18 17:52:41 +02:00
|
|
|
|
if (lock)
|
2003-06-05 09:14:21 +02:00
|
|
|
|
{
|
2017-10-18 18:28:52 +02:00
|
|
|
|
err = keydb_lock (hd);
|
|
|
|
|
if (err)
|
|
|
|
|
{
|
|
|
|
|
/* If locking did not work, we better don't return a handle
|
|
|
|
|
* at all - there was a reason that locking has been
|
|
|
|
|
* requested. */
|
|
|
|
|
keydb_release (hd);
|
|
|
|
|
return err;
|
|
|
|
|
}
|
2017-10-18 17:52:41 +02:00
|
|
|
|
keydb_disable_caching (hd);
|
2003-06-05 09:14:21 +02:00
|
|
|
|
}
|
2017-10-18 17:52:41 +02:00
|
|
|
|
|
Spelling cleanup.
No functional changes, just fixing minor spelling issues.
---
Most of these were identified from the command line by running:
codespell \
--ignore-words-list fpr,stati,keyserver,keyservers,asign,cas,iff,ifset \
--skip '*.po,ChangeLog*,help.*.txt,*.jpg,*.eps,*.pdf,*.png,*.gpg,*.asc' \
doc g13 g10 kbx agent artwork scd tests tools am common dirmngr sm \
NEWS README README.maint TODO
Signed-off-by: Daniel Kahn Gillmor <dkg@fifthhorseman.net>
2020-02-18 15:34:42 +01:00
|
|
|
|
/* For all other errors we return the handle. */
|
2017-10-18 18:28:52 +02:00
|
|
|
|
if (r_hd)
|
|
|
|
|
*r_hd = hd;
|
|
|
|
|
|
2019-03-14 08:54:59 +01:00
|
|
|
|
err = keydb_search_fpr (hd, fprbuf, fprint_len);
|
2017-10-18 17:52:41 +02:00
|
|
|
|
if (gpg_err_code (err) == GPG_ERR_NOT_FOUND)
|
2003-06-05 09:14:21 +02:00
|
|
|
|
{
|
2017-10-18 17:52:41 +02:00
|
|
|
|
if (!r_hd)
|
|
|
|
|
keydb_release (hd);
|
|
|
|
|
return gpg_error (GPG_ERR_NO_PUBKEY);
|
|
|
|
|
}
|
|
|
|
|
err = keydb_get_keyblock (hd, &keyblock);
|
|
|
|
|
if (err)
|
|
|
|
|
{
|
|
|
|
|
log_error ("keydb_get_keyblock failed: %s\n", gpg_strerror (err));
|
|
|
|
|
if (!r_hd)
|
|
|
|
|
keydb_release (hd);
|
|
|
|
|
return gpg_error (GPG_ERR_NO_PUBKEY);
|
2003-06-05 09:14:21 +02:00
|
|
|
|
}
|
2010-01-09 20:00:46 +01:00
|
|
|
|
|
2016-04-29 11:05:24 +02:00
|
|
|
|
log_assert (keyblock->pkt->pkttype == PKT_PUBLIC_KEY
|
|
|
|
|
|| keyblock->pkt->pkttype == PKT_PUBLIC_SUBKEY);
|
2003-06-05 09:14:21 +02:00
|
|
|
|
|
|
|
|
|
/* Not caching key here since it won't have all of the fields
|
|
|
|
|
properly set. */
|
|
|
|
|
|
2017-10-18 17:52:41 +02:00
|
|
|
|
if (r_keyblock)
|
|
|
|
|
*r_keyblock = keyblock;
|
|
|
|
|
else
|
|
|
|
|
release_kbnode (keyblock);
|
|
|
|
|
|
|
|
|
|
if (!r_hd)
|
|
|
|
|
keydb_release (hd);
|
|
|
|
|
|
2003-06-05 09:14:21 +02:00
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
2017-10-18 17:52:41 +02:00
|
|
|
|
|
2015-11-03 23:39:46 +01:00
|
|
|
|
const char *
|
2015-11-03 23:15:27 +01:00
|
|
|
|
parse_def_secret_key (ctrl_t ctrl)
|
|
|
|
|
{
|
|
|
|
|
KEYDB_HANDLE hd = NULL;
|
|
|
|
|
strlist_t t;
|
|
|
|
|
static int warned;
|
|
|
|
|
|
|
|
|
|
for (t = opt.def_secret_key; t; t = t->next)
|
|
|
|
|
{
|
|
|
|
|
gpg_error_t err;
|
|
|
|
|
KEYDB_SEARCH_DESC desc;
|
2024-01-11 15:54:27 +01:00
|
|
|
|
kbnode_t kb;
|
|
|
|
|
kbnode_t node;
|
|
|
|
|
int any_revoked, any_expired, any_disabled;
|
2015-11-03 23:15:27 +01:00
|
|
|
|
|
|
|
|
|
err = classify_user_id (t->d, &desc, 1);
|
|
|
|
|
if (err)
|
|
|
|
|
{
|
2016-01-04 12:41:21 +01:00
|
|
|
|
log_error (_("secret key \"%s\" not found: %s\n"),
|
2015-12-03 10:39:29 +01:00
|
|
|
|
t->d, gpg_strerror (err));
|
|
|
|
|
if (!opt.quiet)
|
|
|
|
|
log_info (_("(check argument of option '%s')\n"), "--default-key");
|
2015-11-03 23:15:27 +01:00
|
|
|
|
continue;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (! hd)
|
2015-12-03 12:18:32 +01:00
|
|
|
|
{
|
2019-09-09 14:34:09 +02:00
|
|
|
|
hd = keydb_new (ctrl);
|
2015-12-03 12:18:32 +01:00
|
|
|
|
if (!hd)
|
|
|
|
|
return NULL;
|
|
|
|
|
}
|
2015-11-03 23:15:27 +01:00
|
|
|
|
else
|
|
|
|
|
keydb_search_reset (hd);
|
|
|
|
|
|
2015-12-03 12:18:32 +01:00
|
|
|
|
|
2015-11-03 23:15:27 +01:00
|
|
|
|
err = keydb_search (hd, &desc, 1, NULL);
|
|
|
|
|
if (gpg_err_code (err) == GPG_ERR_NOT_FOUND)
|
|
|
|
|
continue;
|
|
|
|
|
|
|
|
|
|
if (err)
|
|
|
|
|
{
|
2015-12-03 10:39:29 +01:00
|
|
|
|
log_error (_("key \"%s\" not found: %s\n"), t->d, gpg_strerror (err));
|
2015-11-03 23:15:27 +01:00
|
|
|
|
t = NULL;
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
err = keydb_get_keyblock (hd, &kb);
|
|
|
|
|
if (err)
|
|
|
|
|
{
|
|
|
|
|
log_error (_("error reading keyblock: %s\n"),
|
|
|
|
|
gpg_strerror (err));
|
|
|
|
|
continue;
|
|
|
|
|
}
|
|
|
|
|
|
2017-03-31 20:03:52 +02:00
|
|
|
|
merge_selfsigs (ctrl, kb);
|
2015-12-14 12:05:29 +01:00
|
|
|
|
|
2024-01-11 15:54:27 +01:00
|
|
|
|
any_revoked = any_expired = any_disabled = 0;
|
2015-12-14 12:05:29 +01:00
|
|
|
|
err = gpg_error (GPG_ERR_NO_SECKEY);
|
|
|
|
|
node = kb;
|
|
|
|
|
do
|
|
|
|
|
{
|
|
|
|
|
PKT_public_key *pk = node->pkt->pkt.public_key;
|
|
|
|
|
|
|
|
|
|
/* Check if the key is valid. */
|
|
|
|
|
if (pk->flags.revoked)
|
|
|
|
|
{
|
2024-01-11 15:54:27 +01:00
|
|
|
|
any_revoked = 1;
|
2015-12-14 12:05:29 +01:00
|
|
|
|
if (DBG_LOOKUP)
|
2015-12-23 15:13:21 +01:00
|
|
|
|
log_debug ("not using %s as default key, %s",
|
2015-12-17 10:55:29 +01:00
|
|
|
|
keystr_from_pk (pk), "revoked");
|
2015-12-14 12:05:29 +01:00
|
|
|
|
continue;
|
|
|
|
|
}
|
|
|
|
|
if (pk->has_expired)
|
|
|
|
|
{
|
2024-01-11 15:54:27 +01:00
|
|
|
|
any_expired = 1;
|
2015-12-14 12:05:29 +01:00
|
|
|
|
if (DBG_LOOKUP)
|
2015-12-23 15:13:21 +01:00
|
|
|
|
log_debug ("not using %s as default key, %s",
|
2015-12-17 10:55:29 +01:00
|
|
|
|
keystr_from_pk (pk), "expired");
|
2015-12-14 12:05:29 +01:00
|
|
|
|
continue;
|
|
|
|
|
}
|
|
|
|
|
if (pk_is_disabled (pk))
|
|
|
|
|
{
|
2024-01-11 15:54:27 +01:00
|
|
|
|
any_disabled = 1;
|
2015-12-14 12:05:29 +01:00
|
|
|
|
if (DBG_LOOKUP)
|
2015-12-23 15:13:21 +01:00
|
|
|
|
log_debug ("not using %s as default key, %s",
|
2015-12-17 10:55:29 +01:00
|
|
|
|
keystr_from_pk (pk), "disabled");
|
2015-12-14 12:05:29 +01:00
|
|
|
|
continue;
|
|
|
|
|
}
|
|
|
|
|
|
2020-01-17 07:11:02 +01:00
|
|
|
|
if (agent_probe_secret_key (ctrl, pk))
|
|
|
|
|
{
|
|
|
|
|
/* This is a valid key. */
|
|
|
|
|
err = 0;
|
|
|
|
|
break;
|
|
|
|
|
}
|
2015-12-14 12:05:29 +01:00
|
|
|
|
}
|
|
|
|
|
while ((node = find_next_kbnode (node, PKT_PUBLIC_SUBKEY)));
|
|
|
|
|
|
2015-11-03 23:15:27 +01:00
|
|
|
|
release_kbnode (kb);
|
2015-12-14 12:05:29 +01:00
|
|
|
|
if (err)
|
|
|
|
|
{
|
|
|
|
|
if (! warned && ! opt.quiet)
|
|
|
|
|
{
|
2024-01-11 15:54:27 +01:00
|
|
|
|
gpg_err_code_t ec;
|
|
|
|
|
|
|
|
|
|
/* Try to get a better error than no secret key if we
|
|
|
|
|
* only know that the public key is not usable. */
|
|
|
|
|
if (any_revoked)
|
|
|
|
|
ec = GPG_ERR_CERT_REVOKED;
|
|
|
|
|
else if (any_expired)
|
|
|
|
|
ec = GPG_ERR_KEY_EXPIRED;
|
|
|
|
|
else if (any_disabled)
|
|
|
|
|
ec = GPG_ERR_KEY_DISABLED;
|
|
|
|
|
else
|
|
|
|
|
ec = GPG_ERR_NO_SECKEY;
|
|
|
|
|
|
2015-12-14 20:12:55 +01:00
|
|
|
|
log_info (_("Warning: not using '%s' as default key: %s\n"),
|
2024-01-11 15:54:27 +01:00
|
|
|
|
t->d, gpg_strerror (ec));
|
|
|
|
|
print_reported_error (err, ec);
|
2015-12-14 12:05:29 +01:00
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
else
|
2015-11-03 23:15:27 +01:00
|
|
|
|
{
|
2016-03-10 12:41:06 +01:00
|
|
|
|
if (! warned && ! opt.quiet)
|
2015-12-14 12:05:29 +01:00
|
|
|
|
log_info (_("using \"%s\" as default secret key for signing\n"),
|
|
|
|
|
t->d);
|
2015-11-03 23:15:27 +01:00
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2015-12-14 12:05:29 +01:00
|
|
|
|
if (! warned && opt.def_secret_key && ! t)
|
2015-12-14 20:12:55 +01:00
|
|
|
|
log_info (_("all values passed to '%s' ignored\n"),
|
2015-12-14 12:05:29 +01:00
|
|
|
|
"--default-key");
|
|
|
|
|
|
2015-11-03 23:15:27 +01:00
|
|
|
|
warned = 1;
|
|
|
|
|
|
|
|
|
|
if (hd)
|
|
|
|
|
keydb_release (hd);
|
|
|
|
|
|
|
|
|
|
if (t)
|
|
|
|
|
return t->d;
|
|
|
|
|
return NULL;
|
|
|
|
|
}
|
2010-01-09 20:00:46 +01:00
|
|
|
|
|
2016-01-11 11:41:49 +01:00
|
|
|
|
|
|
|
|
|
/* Look up a secret key.
|
|
|
|
|
*
|
|
|
|
|
* If PK is not NULL, the public key of the first result is returned
|
|
|
|
|
* in *PK. Note: PK->REQ_USAGE must be valid!!! If PK->REQ_USAGE is
|
|
|
|
|
* set, it is used to filter the search results. See the
|
|
|
|
|
* documentation for finish_lookup to understand exactly how this is
|
|
|
|
|
* used. Note: The self-signed data has already been merged into the
|
|
|
|
|
* public key using merge_selfsigs. Free *PK by calling
|
|
|
|
|
* release_public_key_parts (or, if PK was allocated using xfree, you
|
|
|
|
|
* can use free_public_key, which calls release_public_key_parts(PK)
|
|
|
|
|
* and then xfree(PK)).
|
|
|
|
|
*
|
|
|
|
|
* If --default-key was set, then the specified key is looked up. (In
|
|
|
|
|
* this case, the default key is returned even if it is considered
|
|
|
|
|
* unusable. See the documentation for skip_unusable for exactly what
|
|
|
|
|
* this means.)
|
|
|
|
|
*
|
|
|
|
|
* Otherwise, this initiates a DB scan that returns all keys that are
|
|
|
|
|
* usable (see previous paragraph for exactly what usable means) and
|
|
|
|
|
* for which a secret key is available.
|
|
|
|
|
*
|
|
|
|
|
* This function returns the first match. Additional results can be
|
|
|
|
|
* returned using getkey_next. */
|
2010-04-21 18:26:17 +02:00
|
|
|
|
gpg_error_t
|
2015-11-03 23:15:27 +01:00
|
|
|
|
get_seckey_default (ctrl_t ctrl, PKT_public_key *pk)
|
2003-06-05 09:14:21 +02:00
|
|
|
|
{
|
2010-04-21 18:26:17 +02:00
|
|
|
|
gpg_error_t err;
|
2006-10-02 13:54:35 +02:00
|
|
|
|
strlist_t namelist = NULL;
|
2010-04-21 18:26:17 +02:00
|
|
|
|
int include_unusable = 1;
|
2003-06-05 09:14:21 +02:00
|
|
|
|
|
2015-11-03 23:15:27 +01:00
|
|
|
|
|
|
|
|
|
const char *def_secret_key = parse_def_secret_key (ctrl);
|
|
|
|
|
if (def_secret_key)
|
|
|
|
|
add_to_strlist (&namelist, def_secret_key);
|
2006-04-19 13:26:11 +02:00
|
|
|
|
else
|
2010-01-09 20:00:46 +01:00
|
|
|
|
include_unusable = 0;
|
2003-06-05 09:14:21 +02:00
|
|
|
|
|
2017-03-31 20:03:52 +02:00
|
|
|
|
err = key_byname (ctrl, NULL, namelist, pk, 1, include_unusable, NULL, NULL);
|
2003-06-05 09:14:21 +02:00
|
|
|
|
|
2010-01-09 20:00:46 +01:00
|
|
|
|
free_strlist (namelist);
|
2003-06-05 09:14:21 +02:00
|
|
|
|
|
2010-04-21 18:26:17 +02:00
|
|
|
|
return err;
|
2003-06-05 09:14:21 +02:00
|
|
|
|
}
|
2016-01-11 11:41:49 +01:00
|
|
|
|
|
|
|
|
|
|
2003-06-05 09:14:21 +02:00
|
|
|
|
|
2016-01-11 11:41:49 +01:00
|
|
|
|
/* Search for keys matching some criteria.
|
|
|
|
|
*
|
|
|
|
|
* If RETCTX is not NULL, then the constructed context is returned in
|
|
|
|
|
* *RETCTX so that getpubkey_next can be used to get subsequent
|
|
|
|
|
* results. In this case, getkey_end() must be used to free the
|
|
|
|
|
* search context. If RETCTX is not NULL, then RET_KDBHD must be
|
|
|
|
|
* NULL.
|
|
|
|
|
*
|
|
|
|
|
* If PK is not NULL, the public key of the first result is returned
|
|
|
|
|
* in *PK. Note: PK->REQ_USAGE must be valid!!! If PK->REQ_USAGE is
|
|
|
|
|
* set, it is used to filter the search results. See the
|
|
|
|
|
* documentation for finish_lookup to understand exactly how this is
|
|
|
|
|
* used. Note: The self-signed data has already been merged into the
|
|
|
|
|
* public key using merge_selfsigs. Free *PK by calling
|
|
|
|
|
* release_public_key_parts (or, if PK was allocated using xfree, you
|
|
|
|
|
* can use free_public_key, which calls release_public_key_parts(PK)
|
|
|
|
|
* and then xfree(PK)).
|
|
|
|
|
*
|
|
|
|
|
* If NAMES is not NULL, then a search query is constructed using
|
|
|
|
|
* classify_user_id on each of the strings in the list. (Recall: the
|
|
|
|
|
* database does an OR of the terms, not an AND.) If NAMES is
|
|
|
|
|
* NULL, then all results are returned.
|
|
|
|
|
*
|
|
|
|
|
* If WANT_SECRET is set, then only keys with an available secret key
|
|
|
|
|
* (either locally or via key registered on a smartcard) are returned.
|
|
|
|
|
*
|
|
|
|
|
* This function does not skip unusable keys (see the documentation
|
|
|
|
|
* for skip_unusable for an exact definition).
|
|
|
|
|
*
|
|
|
|
|
* If RET_KEYBLOCK is not NULL, the keyblock is returned in
|
|
|
|
|
* *RET_KEYBLOCK. This should be freed using release_kbnode().
|
|
|
|
|
*
|
|
|
|
|
* This function returns 0 on success. Otherwise, an error code is
|
|
|
|
|
* returned. In particular, GPG_ERR_NO_PUBKEY or GPG_ERR_NO_SECKEY
|
|
|
|
|
* (if want_secret is set) is returned if the key is not found. */
|
2010-02-02 15:06:19 +01:00
|
|
|
|
gpg_error_t
|
2017-03-31 20:03:52 +02:00
|
|
|
|
getkey_bynames (ctrl_t ctrl, getkey_ctx_t *retctx, PKT_public_key *pk,
|
2010-02-02 15:06:19 +01:00
|
|
|
|
strlist_t names, int want_secret, kbnode_t *ret_keyblock)
|
|
|
|
|
{
|
2017-03-31 20:03:52 +02:00
|
|
|
|
return key_byname (ctrl, retctx, names, pk, want_secret, 1,
|
2010-02-02 15:06:19 +01:00
|
|
|
|
ret_keyblock, NULL);
|
|
|
|
|
}
|
2003-06-05 09:14:21 +02:00
|
|
|
|
|
2010-01-09 20:00:46 +01:00
|
|
|
|
|
2016-01-11 11:41:49 +01:00
|
|
|
|
/* Search for one key matching some criteria.
|
|
|
|
|
*
|
|
|
|
|
* If RETCTX is not NULL, then the constructed context is returned in
|
|
|
|
|
* *RETCTX so that getpubkey_next can be used to get subsequent
|
|
|
|
|
* results. In this case, getkey_end() must be used to free the
|
|
|
|
|
* search context. If RETCTX is not NULL, then RET_KDBHD must be
|
|
|
|
|
* NULL.
|
|
|
|
|
*
|
|
|
|
|
* If PK is not NULL, the public key of the first result is returned
|
|
|
|
|
* in *PK. Note: PK->REQ_USAGE must be valid!!! If PK->REQ_USAGE is
|
|
|
|
|
* set, it is used to filter the search results. See the
|
|
|
|
|
* documentation for finish_lookup to understand exactly how this is
|
|
|
|
|
* used. Note: The self-signed data has already been merged into the
|
|
|
|
|
* public key using merge_selfsigs. Free *PK by calling
|
|
|
|
|
* release_public_key_parts (or, if PK was allocated using xfree, you
|
|
|
|
|
* can use free_public_key, which calls release_public_key_parts(PK)
|
|
|
|
|
* and then xfree(PK)).
|
|
|
|
|
*
|
|
|
|
|
* If NAME is not NULL, then a search query is constructed using
|
|
|
|
|
* classify_user_id on the string. In this case, even unusable keys
|
|
|
|
|
* (see the documentation for skip_unusable for an exact definition of
|
|
|
|
|
* unusable) are returned. Otherwise, if --default-key was set, then
|
|
|
|
|
* that key is returned (even if it is unusable). If neither of these
|
|
|
|
|
* conditions holds, then the first usable key is returned.
|
|
|
|
|
*
|
|
|
|
|
* If WANT_SECRET is set, then only keys with an available secret key
|
|
|
|
|
* (either locally or via key registered on a smartcard) are returned.
|
|
|
|
|
*
|
|
|
|
|
* This function does not skip unusable keys (see the documentation
|
|
|
|
|
* for skip_unusable for an exact definition).
|
|
|
|
|
*
|
|
|
|
|
* If RET_KEYBLOCK is not NULL, the keyblock is returned in
|
|
|
|
|
* *RET_KEYBLOCK. This should be freed using release_kbnode().
|
|
|
|
|
*
|
|
|
|
|
* This function returns 0 on success. Otherwise, an error code is
|
|
|
|
|
* returned. In particular, GPG_ERR_NO_PUBKEY or GPG_ERR_NO_SECKEY
|
|
|
|
|
* (if want_secret is set) is returned if the key is not found.
|
|
|
|
|
*
|
|
|
|
|
* FIXME: We also have the get_pubkey_byname function which has a
|
|
|
|
|
* different semantic. Should be merged with this one. */
|
2010-02-02 15:06:19 +01:00
|
|
|
|
gpg_error_t
|
2015-11-03 23:15:27 +01:00
|
|
|
|
getkey_byname (ctrl_t ctrl, getkey_ctx_t *retctx, PKT_public_key *pk,
|
2010-02-02 15:06:19 +01:00
|
|
|
|
const char *name, int want_secret, kbnode_t *ret_keyblock)
|
2003-06-05 09:14:21 +02:00
|
|
|
|
{
|
2010-02-02 15:06:19 +01:00
|
|
|
|
gpg_error_t err;
|
|
|
|
|
strlist_t namelist = NULL;
|
|
|
|
|
int with_unusable = 1;
|
2015-11-03 23:15:27 +01:00
|
|
|
|
const char *def_secret_key = NULL;
|
|
|
|
|
|
|
|
|
|
if (want_secret && !name)
|
|
|
|
|
def_secret_key = parse_def_secret_key (ctrl);
|
2010-01-09 20:00:46 +01:00
|
|
|
|
|
2015-11-03 23:15:27 +01:00
|
|
|
|
if (want_secret && !name && def_secret_key)
|
|
|
|
|
add_to_strlist (&namelist, def_secret_key);
|
2010-02-02 15:06:19 +01:00
|
|
|
|
else if (name)
|
|
|
|
|
add_to_strlist (&namelist, name);
|
|
|
|
|
else
|
|
|
|
|
with_unusable = 0;
|
2010-01-09 20:00:46 +01:00
|
|
|
|
|
2017-03-31 20:03:52 +02:00
|
|
|
|
err = key_byname (ctrl, retctx, namelist, pk, want_secret, with_unusable,
|
2010-02-02 15:06:19 +01:00
|
|
|
|
ret_keyblock, NULL);
|
2011-02-04 12:57:53 +01:00
|
|
|
|
|
2010-02-02 15:06:19 +01:00
|
|
|
|
/* FIXME: Check that we really return GPG_ERR_NO_SECKEY if
|
|
|
|
|
WANT_SECRET has been used. */
|
2010-01-09 20:00:46 +01:00
|
|
|
|
|
2010-02-02 15:06:19 +01:00
|
|
|
|
free_strlist (namelist);
|
2003-06-05 09:14:21 +02:00
|
|
|
|
|
2010-02-02 15:06:19 +01:00
|
|
|
|
return err;
|
|
|
|
|
}
|
2003-06-05 09:14:21 +02:00
|
|
|
|
|
2010-02-02 15:06:19 +01:00
|
|
|
|
|
2016-01-11 11:41:49 +01:00
|
|
|
|
/* Return the next search result.
|
|
|
|
|
*
|
|
|
|
|
* If PK is not NULL, the public key of the next result is returned in
|
|
|
|
|
* *PK. Note: The self-signed data has already been merged into the
|
|
|
|
|
* public key using merge_selfsigs. Free *PK by calling
|
2016-10-27 15:31:30 +02:00
|
|
|
|
* release_public_key_parts (or, if PK was allocated using xmalloc, you
|
2016-01-11 11:41:49 +01:00
|
|
|
|
* can use free_public_key, which calls release_public_key_parts(PK)
|
|
|
|
|
* and then xfree(PK)).
|
|
|
|
|
*
|
|
|
|
|
* RET_KEYBLOCK can be given as NULL; if it is not NULL it the entire
|
2016-10-27 14:58:01 +02:00
|
|
|
|
* found keyblock is returned which must be released with
|
2016-01-11 11:41:49 +01:00
|
|
|
|
* release_kbnode. If the function returns an error NULL is stored at
|
|
|
|
|
* RET_KEYBLOCK.
|
|
|
|
|
*
|
|
|
|
|
* The self-signed data has already been merged into the public key
|
|
|
|
|
* using merge_selfsigs. */
|
2010-02-02 15:06:19 +01:00
|
|
|
|
gpg_error_t
|
2017-03-31 20:03:52 +02:00
|
|
|
|
getkey_next (ctrl_t ctrl, getkey_ctx_t ctx,
|
|
|
|
|
PKT_public_key *pk, kbnode_t *ret_keyblock)
|
2010-02-02 15:06:19 +01:00
|
|
|
|
{
|
|
|
|
|
int rc; /* Fixme: Make sure this is proper gpg_error */
|
2016-11-15 15:08:54 +01:00
|
|
|
|
KBNODE keyblock = NULL;
|
2015-09-09 21:04:57 +02:00
|
|
|
|
KBNODE found_key = NULL;
|
2010-02-02 15:06:19 +01:00
|
|
|
|
|
2014-11-02 16:36:40 +01:00
|
|
|
|
/* We need to disable the caching so that for an exact key search we
|
|
|
|
|
won't get the result back from the cache and thus end up in an
|
2015-09-16 14:01:48 +02:00
|
|
|
|
endless loop. The endless loop can occur, because the cache is
|
|
|
|
|
used without respecting the current file pointer! */
|
2014-11-02 16:36:40 +01:00
|
|
|
|
keydb_disable_caching (ctx->kr_handle);
|
|
|
|
|
|
2016-11-15 15:08:54 +01:00
|
|
|
|
/* FOUND_KEY is only valid as long as RET_KEYBLOCK is. If the
|
|
|
|
|
* caller wants PK, but not RET_KEYBLOCK, we need hand in our own
|
|
|
|
|
* keyblock. */
|
|
|
|
|
if (pk && ret_keyblock == NULL)
|
|
|
|
|
ret_keyblock = &keyblock;
|
|
|
|
|
|
2017-03-31 20:03:52 +02:00
|
|
|
|
rc = lookup (ctrl, ctx, ctx->want_secret,
|
|
|
|
|
ret_keyblock, pk ? &found_key : NULL);
|
2016-10-27 15:31:30 +02:00
|
|
|
|
if (!rc && pk)
|
|
|
|
|
{
|
|
|
|
|
log_assert (found_key);
|
|
|
|
|
pk_from_block (pk, NULL, found_key);
|
2016-11-15 15:08:54 +01:00
|
|
|
|
release_kbnode (keyblock);
|
2016-10-27 15:31:30 +02:00
|
|
|
|
}
|
2010-02-02 15:06:19 +01:00
|
|
|
|
|
|
|
|
|
return rc;
|
2003-06-05 09:14:21 +02:00
|
|
|
|
}
|
|
|
|
|
|
2010-02-02 15:06:19 +01:00
|
|
|
|
|
2016-01-11 11:41:49 +01:00
|
|
|
|
/* Release any resources used by a key listing context. This must be
|
|
|
|
|
* called on the context returned by, e.g., getkey_byname. */
|
2010-02-02 15:06:19 +01:00
|
|
|
|
void
|
2017-03-31 20:35:28 +02:00
|
|
|
|
getkey_end (ctrl_t ctrl, getkey_ctx_t ctx)
|
2010-02-02 15:06:19 +01:00
|
|
|
|
{
|
2014-11-02 16:31:30 +01:00
|
|
|
|
if (ctx)
|
|
|
|
|
{
|
2017-06-13 09:05:40 +02:00
|
|
|
|
#ifdef HAVE_W32_SYSTEM
|
|
|
|
|
|
|
|
|
|
/* FIXME: This creates a big regression for Windows because the
|
|
|
|
|
* keyring is only released after the global ctrl is released.
|
|
|
|
|
* So if an operation does a getkey and then tries to modify the
|
|
|
|
|
* keyring it will fail on Windows with a sharing violation. We
|
|
|
|
|
* need to modify all keyring write operations to also take the
|
|
|
|
|
* ctrl and close the cached_getkey_kdb handle to make writing
|
|
|
|
|
* work. See: GnuPG-bug-id: 3097 */
|
|
|
|
|
(void)ctrl;
|
|
|
|
|
keydb_release (ctx->kr_handle);
|
|
|
|
|
|
|
|
|
|
#else /*!HAVE_W32_SYSTEM*/
|
2017-05-30 10:22:35 +02:00
|
|
|
|
|
2017-03-31 20:44:05 +02:00
|
|
|
|
if (ctrl && !ctrl->cached_getkey_kdb)
|
|
|
|
|
ctrl->cached_getkey_kdb = ctx->kr_handle;
|
|
|
|
|
else
|
2017-06-13 09:05:40 +02:00
|
|
|
|
keydb_release (ctx->kr_handle);
|
|
|
|
|
|
|
|
|
|
#endif /*!HAVE_W32_SYSTEM*/
|
|
|
|
|
|
2015-11-13 12:56:13 +01:00
|
|
|
|
free_strlist (ctx->extra_list);
|
2014-11-02 16:31:30 +01:00
|
|
|
|
if (!ctx->not_allocated)
|
|
|
|
|
xfree (ctx);
|
|
|
|
|
}
|
2010-02-02 15:06:19 +01:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
/************************************************
|
|
|
|
|
************* Merging stuff ********************
|
|
|
|
|
************************************************/
|
|
|
|
|
|
2016-01-11 11:41:49 +01:00
|
|
|
|
/* Set the mainkey_id fields for all keys in KEYBLOCK. This is
|
|
|
|
|
* usually done by merge_selfsigs but at some places we only need the
|
|
|
|
|
* main_kid not a full merge. The function also guarantees that all
|
|
|
|
|
* pk->keyids are computed. */
|
2014-04-15 16:40:48 +02:00
|
|
|
|
void
|
|
|
|
|
setup_main_keyids (kbnode_t keyblock)
|
|
|
|
|
{
|
|
|
|
|
u32 kid[2], mainkid[2];
|
|
|
|
|
kbnode_t kbctx, node;
|
|
|
|
|
PKT_public_key *pk;
|
|
|
|
|
|
|
|
|
|
if (keyblock->pkt->pkttype != PKT_PUBLIC_KEY)
|
|
|
|
|
BUG ();
|
|
|
|
|
pk = keyblock->pkt->pkt.public_key;
|
|
|
|
|
|
|
|
|
|
keyid_from_pk (pk, mainkid);
|
|
|
|
|
for (kbctx=NULL; (node = walk_kbnode (keyblock, &kbctx, 0)); )
|
|
|
|
|
{
|
|
|
|
|
if (!(node->pkt->pkttype == PKT_PUBLIC_KEY
|
|
|
|
|
|| node->pkt->pkttype == PKT_PUBLIC_SUBKEY))
|
|
|
|
|
continue;
|
|
|
|
|
pk = node->pkt->pkt.public_key;
|
|
|
|
|
keyid_from_pk (pk, kid); /* Make sure pk->keyid is set. */
|
|
|
|
|
if (!pk->main_keyid[0] && !pk->main_keyid[1])
|
|
|
|
|
{
|
|
|
|
|
pk->main_keyid[0] = mainkid[0];
|
|
|
|
|
pk->main_keyid[1] = mainkid[1];
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
2016-01-11 11:41:49 +01:00
|
|
|
|
/* KEYBLOCK corresponds to a public key block. This function merges
|
|
|
|
|
* much of the information from the self-signed data into the public
|
|
|
|
|
* key, public subkey and user id data structures. If you use the
|
|
|
|
|
* high-level search API (e.g., get_pubkey) for looking up key blocks,
|
|
|
|
|
* then you don't need to call this function. This function is
|
|
|
|
|
* useful, however, if you change the keyblock, e.g., by adding or
|
|
|
|
|
* removing a self-signed data packet. */
|
2010-02-02 15:06:19 +01:00
|
|
|
|
void
|
2017-03-31 20:03:52 +02:00
|
|
|
|
merge_keys_and_selfsig (ctrl_t ctrl, kbnode_t keyblock)
|
2010-02-02 15:06:19 +01:00
|
|
|
|
{
|
|
|
|
|
if (!keyblock)
|
|
|
|
|
;
|
|
|
|
|
else if (keyblock->pkt->pkttype == PKT_PUBLIC_KEY)
|
2017-03-31 20:03:52 +02:00
|
|
|
|
merge_selfsigs (ctrl, keyblock);
|
2010-02-02 15:06:19 +01:00
|
|
|
|
else
|
|
|
|
|
log_debug ("FIXME: merging secret key blocks is not anymore available\n");
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
2023-03-01 17:22:20 +01:00
|
|
|
|
/* This function parses the key flags and returns PUBKEY_USAGE_ flags. */
|
|
|
|
|
unsigned int
|
2010-01-09 20:00:46 +01:00
|
|
|
|
parse_key_usage (PKT_signature * sig)
|
2006-04-19 13:26:11 +02:00
|
|
|
|
{
|
2010-01-09 20:00:46 +01:00
|
|
|
|
int key_usage = 0;
|
2006-04-19 13:26:11 +02:00
|
|
|
|
const byte *p;
|
|
|
|
|
size_t n;
|
|
|
|
|
byte flags;
|
|
|
|
|
|
2019-09-05 20:36:38 +02:00
|
|
|
|
p = parse_sig_subpkt (sig, 1, SIGSUBPKT_KEY_FLAGS, &n);
|
2010-01-09 20:00:46 +01:00
|
|
|
|
if (p && n)
|
2006-04-19 13:26:11 +02:00
|
|
|
|
{
|
2010-01-09 20:00:46 +01:00
|
|
|
|
/* First octet of the keyflags. */
|
|
|
|
|
flags = *p;
|
2006-04-19 13:26:11 +02:00
|
|
|
|
|
2010-01-09 20:00:46 +01:00
|
|
|
|
if (flags & 1)
|
2006-04-19 13:26:11 +02:00
|
|
|
|
{
|
|
|
|
|
key_usage |= PUBKEY_USAGE_CERT;
|
2010-01-09 20:00:46 +01:00
|
|
|
|
flags &= ~1;
|
2006-04-19 13:26:11 +02:00
|
|
|
|
}
|
|
|
|
|
|
2010-01-09 20:00:46 +01:00
|
|
|
|
if (flags & 2)
|
2006-04-19 13:26:11 +02:00
|
|
|
|
{
|
|
|
|
|
key_usage |= PUBKEY_USAGE_SIG;
|
2010-01-09 20:00:46 +01:00
|
|
|
|
flags &= ~2;
|
2006-04-19 13:26:11 +02:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* We do not distinguish between encrypting communications and
|
2010-01-09 20:00:46 +01:00
|
|
|
|
encrypting storage. */
|
|
|
|
|
if (flags & (0x04 | 0x08))
|
2006-04-19 13:26:11 +02:00
|
|
|
|
{
|
|
|
|
|
key_usage |= PUBKEY_USAGE_ENC;
|
2010-01-09 20:00:46 +01:00
|
|
|
|
flags &= ~(0x04 | 0x08);
|
2006-04-19 13:26:11 +02:00
|
|
|
|
}
|
|
|
|
|
|
2010-01-09 20:00:46 +01:00
|
|
|
|
if (flags & 0x20)
|
2006-04-19 13:26:11 +02:00
|
|
|
|
{
|
|
|
|
|
key_usage |= PUBKEY_USAGE_AUTH;
|
2010-01-09 20:00:46 +01:00
|
|
|
|
flags &= ~0x20;
|
2006-04-19 13:26:11 +02:00
|
|
|
|
}
|
|
|
|
|
|
2022-09-07 10:34:05 +02:00
|
|
|
|
if ((flags & 0x80))
|
|
|
|
|
{
|
|
|
|
|
key_usage |= PUBKEY_USAGE_GROUP;
|
|
|
|
|
flags &= ~0x80;
|
|
|
|
|
}
|
|
|
|
|
|
2010-01-09 20:00:46 +01:00
|
|
|
|
if (flags)
|
2006-04-19 13:26:11 +02:00
|
|
|
|
key_usage |= PUBKEY_USAGE_UNKNOWN;
|
2013-03-15 15:46:03 +01:00
|
|
|
|
|
2022-09-07 10:34:05 +02:00
|
|
|
|
n--;
|
|
|
|
|
p++;
|
|
|
|
|
if (n)
|
|
|
|
|
{
|
|
|
|
|
flags = *p;
|
|
|
|
|
if ((flags & 0x04))
|
|
|
|
|
key_usage |= PUBKEY_USAGE_RENC;
|
|
|
|
|
if ((flags & 0x08))
|
|
|
|
|
key_usage |= PUBKEY_USAGE_TIME;
|
|
|
|
|
}
|
|
|
|
|
|
2013-03-15 15:46:03 +01:00
|
|
|
|
if (!key_usage)
|
|
|
|
|
key_usage |= PUBKEY_USAGE_NONE;
|
2022-09-07 10:34:05 +02:00
|
|
|
|
|
2006-04-19 13:26:11 +02:00
|
|
|
|
}
|
2013-03-15 15:46:03 +01:00
|
|
|
|
else if (p) /* Key flags of length zero. */
|
|
|
|
|
key_usage |= PUBKEY_USAGE_NONE;
|
2006-04-19 13:26:11 +02:00
|
|
|
|
|
|
|
|
|
/* We set PUBKEY_USAGE_UNKNOWN to indicate that this key has a
|
|
|
|
|
capability that we do not handle. This serves to distinguish
|
|
|
|
|
between a zero key usage which we handle as the default
|
|
|
|
|
capabilities for that algorithm, and a usage that we do not
|
2013-03-15 15:46:03 +01:00
|
|
|
|
handle. Likewise we use PUBKEY_USAGE_NONE to indicate that
|
|
|
|
|
key_flags have been given but they do not specify any usage. */
|
2006-04-19 13:26:11 +02:00
|
|
|
|
|
|
|
|
|
return key_usage;
|
|
|
|
|
}
|
|
|
|
|
|
2010-01-09 20:00:46 +01:00
|
|
|
|
|
|
|
|
|
/* Apply information from SIGNODE (which is the valid self-signature
|
2003-06-05 09:14:21 +02:00
|
|
|
|
* associated with that UID) to the UIDNODE:
|
2020-03-18 12:30:06 +01:00
|
|
|
|
* - wether the UID has been revoked
|
2003-06-05 09:14:21 +02:00
|
|
|
|
* - assumed creation date of the UID
|
|
|
|
|
* - temporary store the keyflags here
|
|
|
|
|
* - temporary store the key expiration time here
|
|
|
|
|
* - mark whether the primary user ID flag hat been set.
|
|
|
|
|
* - store the preferences
|
|
|
|
|
*/
|
|
|
|
|
static void
|
2010-01-09 20:00:46 +01:00
|
|
|
|
fixup_uidnode (KBNODE uidnode, KBNODE signode, u32 keycreated)
|
2003-06-05 09:14:21 +02:00
|
|
|
|
{
|
2010-01-09 20:00:46 +01:00
|
|
|
|
PKT_user_id *uid = uidnode->pkt->pkt.user_id;
|
|
|
|
|
PKT_signature *sig = signode->pkt->pkt.signature;
|
2018-01-23 12:50:11 +01:00
|
|
|
|
const byte *p, *sym, *aead, *hash, *zip;
|
|
|
|
|
size_t n, nsym, naead, nhash, nzip;
|
2010-01-09 20:00:46 +01:00
|
|
|
|
|
|
|
|
|
sig->flags.chosen_selfsig = 1;/* We chose this one. */
|
|
|
|
|
uid->created = 0; /* Not created == invalid. */
|
|
|
|
|
if (IS_UID_REV (sig))
|
|
|
|
|
{
|
2017-03-08 11:01:22 +01:00
|
|
|
|
uid->flags.revoked = 1;
|
2010-01-09 20:00:46 +01:00
|
|
|
|
return; /* Has been revoked. */
|
|
|
|
|
}
|
|
|
|
|
else
|
2017-03-08 11:01:22 +01:00
|
|
|
|
uid->flags.revoked = 0;
|
2003-06-05 09:14:21 +02:00
|
|
|
|
|
2010-01-09 20:00:46 +01:00
|
|
|
|
uid->expiredate = sig->expiredate;
|
2006-04-19 13:26:11 +02:00
|
|
|
|
|
2010-01-09 20:00:46 +01:00
|
|
|
|
if (sig->flags.expired)
|
|
|
|
|
{
|
2017-03-08 11:01:22 +01:00
|
|
|
|
uid->flags.expired = 1;
|
2010-01-09 20:00:46 +01:00
|
|
|
|
return; /* Has expired. */
|
|
|
|
|
}
|
|
|
|
|
else
|
2017-03-08 11:01:22 +01:00
|
|
|
|
uid->flags.expired = 0;
|
2003-06-05 09:14:21 +02:00
|
|
|
|
|
2010-01-09 20:00:46 +01:00
|
|
|
|
uid->created = sig->timestamp; /* This one is okay. */
|
|
|
|
|
uid->selfsigversion = sig->version;
|
|
|
|
|
/* If we got this far, it's not expired :) */
|
2017-03-08 11:01:22 +01:00
|
|
|
|
uid->flags.expired = 0;
|
2010-01-09 20:00:46 +01:00
|
|
|
|
|
|
|
|
|
/* Store the key flags in the helper variable for later processing. */
|
|
|
|
|
uid->help_key_usage = parse_key_usage (sig);
|
|
|
|
|
|
|
|
|
|
/* Ditto for the key expiration. */
|
2019-09-05 20:36:38 +02:00
|
|
|
|
p = parse_sig_subpkt (sig, 1, SIGSUBPKT_KEY_EXPIRE, NULL);
|
2015-02-11 10:27:57 +01:00
|
|
|
|
if (p && buf32_to_u32 (p))
|
|
|
|
|
uid->help_key_expire = keycreated + buf32_to_u32 (p);
|
2010-01-09 20:00:46 +01:00
|
|
|
|
else
|
|
|
|
|
uid->help_key_expire = 0;
|
|
|
|
|
|
|
|
|
|
/* Set the primary user ID flag - we will later wipe out some
|
|
|
|
|
* of them to only have one in our keyblock. */
|
2017-03-08 11:01:22 +01:00
|
|
|
|
uid->flags.primary = 0;
|
2019-09-05 20:36:38 +02:00
|
|
|
|
p = parse_sig_subpkt (sig, 1, SIGSUBPKT_PRIMARY_UID, NULL);
|
2010-01-09 20:00:46 +01:00
|
|
|
|
if (p && *p)
|
2017-03-08 11:01:22 +01:00
|
|
|
|
uid->flags.primary = 2;
|
2010-01-09 20:00:46 +01:00
|
|
|
|
|
|
|
|
|
/* We could also query this from the unhashed area if it is not in
|
|
|
|
|
* the hased area and then later try to decide which is the better
|
|
|
|
|
* there should be no security problem with this.
|
|
|
|
|
* For now we only look at the hashed one. */
|
|
|
|
|
|
|
|
|
|
/* Now build the preferences list. These must come from the
|
|
|
|
|
hashed section so nobody can modify the ciphers a key is
|
|
|
|
|
willing to accept. */
|
2019-09-05 20:36:38 +02:00
|
|
|
|
p = parse_sig_subpkt (sig, 1, SIGSUBPKT_PREF_SYM, &n);
|
2010-01-09 20:00:46 +01:00
|
|
|
|
sym = p;
|
|
|
|
|
nsym = p ? n : 0;
|
2019-09-05 20:36:38 +02:00
|
|
|
|
p = parse_sig_subpkt (sig, 1, SIGSUBPKT_PREF_AEAD, &n);
|
2018-01-23 12:50:11 +01:00
|
|
|
|
aead = p;
|
|
|
|
|
naead = p ? n : 0;
|
2019-09-05 20:36:38 +02:00
|
|
|
|
p = parse_sig_subpkt (sig, 1, SIGSUBPKT_PREF_HASH, &n);
|
2010-01-09 20:00:46 +01:00
|
|
|
|
hash = p;
|
|
|
|
|
nhash = p ? n : 0;
|
2019-09-05 20:36:38 +02:00
|
|
|
|
p = parse_sig_subpkt (sig, 1, SIGSUBPKT_PREF_COMPR, &n);
|
2010-01-09 20:00:46 +01:00
|
|
|
|
zip = p;
|
|
|
|
|
nzip = p ? n : 0;
|
|
|
|
|
if (uid->prefs)
|
|
|
|
|
xfree (uid->prefs);
|
2018-01-23 12:50:11 +01:00
|
|
|
|
n = nsym + naead + nhash + nzip;
|
2010-01-09 20:00:46 +01:00
|
|
|
|
if (!n)
|
|
|
|
|
uid->prefs = NULL;
|
|
|
|
|
else
|
|
|
|
|
{
|
|
|
|
|
uid->prefs = xmalloc (sizeof (*uid->prefs) * (n + 1));
|
|
|
|
|
n = 0;
|
|
|
|
|
for (; nsym; nsym--, n++)
|
|
|
|
|
{
|
|
|
|
|
uid->prefs[n].type = PREFTYPE_SYM;
|
|
|
|
|
uid->prefs[n].value = *sym++;
|
|
|
|
|
}
|
2018-01-23 12:50:11 +01:00
|
|
|
|
for (; naead; naead--, n++)
|
|
|
|
|
{
|
|
|
|
|
uid->prefs[n].type = PREFTYPE_AEAD;
|
|
|
|
|
uid->prefs[n].value = *aead++;
|
|
|
|
|
}
|
2010-01-09 20:00:46 +01:00
|
|
|
|
for (; nhash; nhash--, n++)
|
|
|
|
|
{
|
|
|
|
|
uid->prefs[n].type = PREFTYPE_HASH;
|
|
|
|
|
uid->prefs[n].value = *hash++;
|
|
|
|
|
}
|
|
|
|
|
for (; nzip; nzip--, n++)
|
|
|
|
|
{
|
|
|
|
|
uid->prefs[n].type = PREFTYPE_ZIP;
|
|
|
|
|
uid->prefs[n].value = *zip++;
|
|
|
|
|
}
|
|
|
|
|
uid->prefs[n].type = PREFTYPE_NONE; /* End of list marker */
|
|
|
|
|
uid->prefs[n].value = 0;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* See whether we have the MDC feature. */
|
|
|
|
|
uid->flags.mdc = 0;
|
2019-09-05 20:36:38 +02:00
|
|
|
|
p = parse_sig_subpkt (sig, 1, SIGSUBPKT_FEATURES, &n);
|
2010-01-09 20:00:46 +01:00
|
|
|
|
if (p && n && (p[0] & 0x01))
|
|
|
|
|
uid->flags.mdc = 1;
|
|
|
|
|
|
2018-01-10 11:42:38 +01:00
|
|
|
|
/* See whether we have the AEAD feature. */
|
|
|
|
|
uid->flags.aead = 0;
|
2019-09-05 20:36:38 +02:00
|
|
|
|
p = parse_sig_subpkt (sig, 1, SIGSUBPKT_FEATURES, &n);
|
2018-05-29 12:24:19 +02:00
|
|
|
|
if (p && n && (p[0] & 0x02))
|
2018-01-10 11:42:38 +01:00
|
|
|
|
uid->flags.aead = 1;
|
|
|
|
|
|
2010-01-09 20:00:46 +01:00
|
|
|
|
/* And the keyserver modify flag. */
|
|
|
|
|
uid->flags.ks_modify = 1;
|
2019-09-05 20:36:38 +02:00
|
|
|
|
p = parse_sig_subpkt (sig, 1, SIGSUBPKT_KS_FLAGS, &n);
|
2010-01-09 20:00:46 +01:00
|
|
|
|
if (p && n && (p[0] & 0x80))
|
|
|
|
|
uid->flags.ks_modify = 0;
|
2006-04-19 13:26:11 +02:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void
|
2010-01-09 20:00:46 +01:00
|
|
|
|
sig_to_revoke_info (PKT_signature * sig, struct revoke_info *rinfo)
|
2006-04-19 13:26:11 +02:00
|
|
|
|
{
|
|
|
|
|
rinfo->date = sig->timestamp;
|
|
|
|
|
rinfo->algo = sig->pubkey_algo;
|
|
|
|
|
rinfo->keyid[0] = sig->keyid[0];
|
|
|
|
|
rinfo->keyid[1] = sig->keyid[1];
|
2003-06-05 09:14:21 +02:00
|
|
|
|
}
|
|
|
|
|
|
2010-10-20 13:33:50 +02:00
|
|
|
|
|
2015-09-16 14:01:48 +02:00
|
|
|
|
/* Given a keyblock, parse the key block and extract various pieces of
|
2017-07-20 18:35:46 +02:00
|
|
|
|
* information and save them with the primary key packet and the user
|
|
|
|
|
* id packets. For instance, some information is stored in signature
|
|
|
|
|
* packets. We find the latest such valid packet (since the user can
|
|
|
|
|
* change that information) and copy its contents into the
|
|
|
|
|
* PKT_public_key.
|
|
|
|
|
*
|
|
|
|
|
* Note that R_REVOKED may be set to 0, 1 or 2.
|
|
|
|
|
*
|
|
|
|
|
* This function fills in the following fields in the primary key's
|
|
|
|
|
* keyblock:
|
|
|
|
|
*
|
|
|
|
|
* main_keyid (computed)
|
|
|
|
|
* revkey / numrevkeys (derived from self signed key data)
|
|
|
|
|
* flags.valid (whether we have at least 1 self-sig)
|
|
|
|
|
* flags.maybe_revoked (whether a designed revoked the key, but
|
|
|
|
|
* we are missing the key to check the sig)
|
|
|
|
|
* selfsigversion (highest version of any valid self-sig)
|
|
|
|
|
* pubkey_usage (derived from most recent self-sig or most
|
|
|
|
|
* recent user id)
|
|
|
|
|
* has_expired (various sources)
|
|
|
|
|
* expiredate (various sources)
|
|
|
|
|
*
|
|
|
|
|
* See the documentation for fixup_uidnode for how the user id packets
|
|
|
|
|
* are modified. In addition to that the primary user id's is_primary
|
|
|
|
|
* field is set to 1 and the other user id's is_primary are set to 0.
|
|
|
|
|
*/
|
2003-06-05 09:14:21 +02:00
|
|
|
|
static void
|
2017-03-31 20:03:52 +02:00
|
|
|
|
merge_selfsigs_main (ctrl_t ctrl, kbnode_t keyblock, int *r_revoked,
|
2010-01-09 20:00:46 +01:00
|
|
|
|
struct revoke_info *rinfo)
|
2003-06-05 09:14:21 +02:00
|
|
|
|
{
|
2010-01-09 20:00:46 +01:00
|
|
|
|
PKT_public_key *pk = NULL;
|
|
|
|
|
KBNODE k;
|
|
|
|
|
u32 kid[2];
|
|
|
|
|
u32 sigdate, uiddate, uiddate2;
|
|
|
|
|
KBNODE signode, uidnode, uidnode2;
|
|
|
|
|
u32 curtime = make_timestamp ();
|
|
|
|
|
unsigned int key_usage = 0;
|
2020-03-18 12:30:06 +01:00
|
|
|
|
u32 keytimestamp = 0; /* Creation time of the key. */
|
2010-01-09 20:00:46 +01:00
|
|
|
|
u32 key_expire = 0;
|
|
|
|
|
int key_expire_seen = 0;
|
|
|
|
|
byte sigversion = 0;
|
|
|
|
|
|
|
|
|
|
*r_revoked = 0;
|
|
|
|
|
memset (rinfo, 0, sizeof (*rinfo));
|
|
|
|
|
|
2015-09-16 14:01:48 +02:00
|
|
|
|
/* Section 11.1 of RFC 4880 determines the order of packets within a
|
2017-07-20 18:35:46 +02:00
|
|
|
|
* message. There are three sections, which must occur in the
|
|
|
|
|
* following order: the public key, the user ids and user attributes
|
|
|
|
|
* and the subkeys. Within each section, each primary packet (e.g.,
|
|
|
|
|
* a user id packet) is followed by one or more signature packets,
|
|
|
|
|
* which modify that packet. */
|
2015-09-16 14:01:48 +02:00
|
|
|
|
|
|
|
|
|
/* According to Section 11.1 of RFC 4880, the public key must be the
|
2017-07-20 18:35:46 +02:00
|
|
|
|
first packet. Note that parse_keyblock_image ensures that the
|
|
|
|
|
first packet is the public key. */
|
2010-01-09 20:00:46 +01:00
|
|
|
|
if (keyblock->pkt->pkttype != PKT_PUBLIC_KEY)
|
|
|
|
|
BUG ();
|
|
|
|
|
pk = keyblock->pkt->pkt.public_key;
|
|
|
|
|
keytimestamp = pk->timestamp;
|
|
|
|
|
|
|
|
|
|
keyid_from_pk (pk, kid);
|
|
|
|
|
pk->main_keyid[0] = kid[0];
|
|
|
|
|
pk->main_keyid[1] = kid[1];
|
|
|
|
|
|
|
|
|
|
if (pk->version < 4)
|
|
|
|
|
{
|
|
|
|
|
/* Before v4 the key packet itself contains the expiration date
|
|
|
|
|
* and there was no way to change it, so we start with the one
|
2020-03-18 12:30:06 +01:00
|
|
|
|
* from the key packet. We do not support v3 keys anymore but
|
|
|
|
|
* we keep the code in case a future key versions introduces a
|
2023-02-16 13:14:30 +01:00
|
|
|
|
* hard expire time again. */
|
2010-01-09 20:00:46 +01:00
|
|
|
|
key_expire = pk->max_expiredate;
|
|
|
|
|
key_expire_seen = 1;
|
|
|
|
|
}
|
|
|
|
|
|
2015-09-16 14:01:48 +02:00
|
|
|
|
/* First pass:
|
2017-07-20 18:35:46 +02:00
|
|
|
|
*
|
|
|
|
|
* - Find the latest direct key self-signature. We assume that the
|
|
|
|
|
* newest one overrides all others.
|
|
|
|
|
*
|
|
|
|
|
* - Determine whether the key has been revoked.
|
|
|
|
|
*
|
|
|
|
|
* - Gather all revocation keys (unlike other data, we don't just
|
|
|
|
|
* take them from the latest self-signed packet).
|
|
|
|
|
*
|
|
|
|
|
* - Determine max (sig[...]->version).
|
2015-09-16 14:01:48 +02:00
|
|
|
|
*/
|
|
|
|
|
|
|
|
|
|
/* Reset this in case this key was already merged. */
|
2010-01-09 20:00:46 +01:00
|
|
|
|
xfree (pk->revkey);
|
|
|
|
|
pk->revkey = NULL;
|
|
|
|
|
pk->numrevkeys = 0;
|
|
|
|
|
|
|
|
|
|
signode = NULL;
|
|
|
|
|
sigdate = 0; /* Helper variable to find the latest signature. */
|
2015-09-16 15:01:45 +02:00
|
|
|
|
|
|
|
|
|
/* According to Section 11.1 of RFC 4880, the public key comes first
|
2017-07-20 18:35:46 +02:00
|
|
|
|
* and is immediately followed by any signature packets that modify
|
|
|
|
|
* it. */
|
2015-09-16 15:01:45 +02:00
|
|
|
|
for (k = keyblock;
|
|
|
|
|
k && k->pkt->pkttype != PKT_USER_ID
|
|
|
|
|
&& k->pkt->pkttype != PKT_ATTRIBUTE
|
|
|
|
|
&& k->pkt->pkttype != PKT_PUBLIC_SUBKEY;
|
|
|
|
|
k = k->next)
|
2010-01-09 20:00:46 +01:00
|
|
|
|
{
|
|
|
|
|
if (k->pkt->pkttype == PKT_SIGNATURE)
|
|
|
|
|
{
|
|
|
|
|
PKT_signature *sig = k->pkt->pkt.signature;
|
|
|
|
|
if (sig->keyid[0] == kid[0] && sig->keyid[1] == kid[1])
|
2017-07-20 18:35:46 +02:00
|
|
|
|
{ /* Self sig. */
|
|
|
|
|
|
2017-03-31 20:03:52 +02:00
|
|
|
|
if (check_key_signature (ctrl, keyblock, k, NULL))
|
2010-01-09 20:00:46 +01:00
|
|
|
|
; /* Signature did not verify. */
|
|
|
|
|
else if (IS_KEY_REV (sig))
|
|
|
|
|
{
|
|
|
|
|
/* Key has been revoked - there is no way to
|
|
|
|
|
* override such a revocation, so we theoretically
|
|
|
|
|
* can stop now. We should not cope with expiration
|
|
|
|
|
* times for revocations here because we have to
|
|
|
|
|
* assume that an attacker can generate all kinds of
|
|
|
|
|
* signatures. However due to the fact that the key
|
|
|
|
|
* has been revoked it does not harm either and by
|
|
|
|
|
* continuing we gather some more info on that
|
|
|
|
|
* key. */
|
|
|
|
|
*r_revoked = 1;
|
|
|
|
|
sig_to_revoke_info (sig, rinfo);
|
|
|
|
|
}
|
|
|
|
|
else if (IS_KEY_SIG (sig))
|
|
|
|
|
{
|
2015-09-16 14:01:48 +02:00
|
|
|
|
/* Add the indicated revocations keys from all
|
2017-07-20 18:35:46 +02:00
|
|
|
|
* signatures not just the latest. We do this
|
|
|
|
|
* because you need multiple 1F sigs to properly
|
|
|
|
|
* handle revocation keys (PGP does it this way, and
|
|
|
|
|
* a revocation key could be sensitive and hence in
|
|
|
|
|
* a different signature). */
|
2010-01-09 20:00:46 +01:00
|
|
|
|
if (sig->revkey)
|
|
|
|
|
{
|
|
|
|
|
int i;
|
2003-06-05 09:14:21 +02:00
|
|
|
|
|
2010-01-09 20:00:46 +01:00
|
|
|
|
pk->revkey =
|
|
|
|
|
xrealloc (pk->revkey, sizeof (struct revocation_key) *
|
|
|
|
|
(pk->numrevkeys + sig->numrevkeys));
|
2003-06-05 09:14:21 +02:00
|
|
|
|
|
2018-12-04 15:43:19 +01:00
|
|
|
|
for (i = 0; i < sig->numrevkeys; i++, pk->numrevkeys++)
|
|
|
|
|
{
|
|
|
|
|
pk->revkey[pk->numrevkeys].class
|
|
|
|
|
= sig->revkey[i].class;
|
|
|
|
|
pk->revkey[pk->numrevkeys].algid
|
|
|
|
|
= sig->revkey[i].algid;
|
|
|
|
|
pk->revkey[pk->numrevkeys].fprlen
|
|
|
|
|
= sig->revkey[i].fprlen;
|
|
|
|
|
memcpy (pk->revkey[pk->numrevkeys].fpr,
|
|
|
|
|
sig->revkey[i].fpr, sig->revkey[i].fprlen);
|
|
|
|
|
memset (pk->revkey[pk->numrevkeys].fpr
|
|
|
|
|
+ sig->revkey[i].fprlen,
|
|
|
|
|
0,
|
|
|
|
|
sizeof (sig->revkey[i].fpr)
|
|
|
|
|
- sig->revkey[i].fprlen);
|
|
|
|
|
}
|
2010-01-09 20:00:46 +01:00
|
|
|
|
}
|
2003-06-05 09:14:21 +02:00
|
|
|
|
|
2010-01-09 20:00:46 +01:00
|
|
|
|
if (sig->timestamp >= sigdate)
|
2017-07-20 18:35:46 +02:00
|
|
|
|
{ /* This is the latest signature so far. */
|
|
|
|
|
|
2010-01-09 20:00:46 +01:00
|
|
|
|
if (sig->flags.expired)
|
|
|
|
|
; /* Signature has expired - ignore it. */
|
|
|
|
|
else
|
|
|
|
|
{
|
|
|
|
|
sigdate = sig->timestamp;
|
|
|
|
|
signode = k;
|
|
|
|
|
if (sig->version > sigversion)
|
|
|
|
|
sigversion = sig->version;
|
|
|
|
|
|
|
|
|
|
}
|
2003-06-05 09:14:21 +02:00
|
|
|
|
}
|
2010-01-09 20:00:46 +01:00
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
2003-06-05 09:14:21 +02:00
|
|
|
|
}
|
|
|
|
|
|
2010-01-09 20:00:46 +01:00
|
|
|
|
/* Remove dupes from the revocation keys. */
|
|
|
|
|
if (pk->revkey)
|
|
|
|
|
{
|
|
|
|
|
int i, j, x, changed = 0;
|
|
|
|
|
|
|
|
|
|
for (i = 0; i < pk->numrevkeys; i++)
|
|
|
|
|
{
|
|
|
|
|
for (j = i + 1; j < pk->numrevkeys; j++)
|
|
|
|
|
{
|
|
|
|
|
if (memcmp (&pk->revkey[i], &pk->revkey[j],
|
|
|
|
|
sizeof (struct revocation_key)) == 0)
|
|
|
|
|
{
|
|
|
|
|
/* remove j */
|
|
|
|
|
|
|
|
|
|
for (x = j; x < pk->numrevkeys - 1; x++)
|
|
|
|
|
pk->revkey[x] = pk->revkey[x + 1];
|
2003-06-05 09:14:21 +02:00
|
|
|
|
|
2010-01-09 20:00:46 +01:00
|
|
|
|
pk->numrevkeys--;
|
|
|
|
|
j--;
|
|
|
|
|
changed = 1;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (changed)
|
|
|
|
|
pk->revkey = xrealloc (pk->revkey,
|
|
|
|
|
pk->numrevkeys *
|
|
|
|
|
sizeof (struct revocation_key));
|
|
|
|
|
}
|
|
|
|
|
|
2020-03-18 12:30:06 +01:00
|
|
|
|
/* SIGNODE is the direct key signature packet (sigclass 0x1f) with
|
|
|
|
|
* the latest creation time. Extract some information from it. */
|
2010-01-09 20:00:46 +01:00
|
|
|
|
if (signode)
|
|
|
|
|
{
|
|
|
|
|
/* Some information from a direct key signature take precedence
|
|
|
|
|
* over the same information given in UID sigs. */
|
|
|
|
|
PKT_signature *sig = signode->pkt->pkt.signature;
|
|
|
|
|
const byte *p;
|
|
|
|
|
|
|
|
|
|
key_usage = parse_key_usage (sig);
|
|
|
|
|
|
2019-09-05 20:36:38 +02:00
|
|
|
|
p = parse_sig_subpkt (sig, 1, SIGSUBPKT_KEY_EXPIRE, NULL);
|
2015-02-11 10:27:57 +01:00
|
|
|
|
if (p && buf32_to_u32 (p))
|
2010-01-09 20:00:46 +01:00
|
|
|
|
{
|
2015-02-11 10:27:57 +01:00
|
|
|
|
key_expire = keytimestamp + buf32_to_u32 (p);
|
2010-01-09 20:00:46 +01:00
|
|
|
|
key_expire_seen = 1;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* Mark that key as valid: One direct key signature should
|
|
|
|
|
* render a key as valid. */
|
2010-10-20 13:33:50 +02:00
|
|
|
|
pk->flags.valid = 1;
|
2010-01-09 20:00:46 +01:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* Pass 1.5: Look for key revocation signatures that were not made
|
2017-07-20 18:35:46 +02:00
|
|
|
|
* by the key (i.e. did a revocation key issue a revocation for
|
|
|
|
|
* us?). Only bother to do this if there is a revocation key in the
|
|
|
|
|
* first place and we're not revoked already. */
|
2010-01-09 20:00:46 +01:00
|
|
|
|
|
|
|
|
|
if (!*r_revoked && pk->revkey)
|
|
|
|
|
for (k = keyblock; k && k->pkt->pkttype != PKT_USER_ID; k = k->next)
|
|
|
|
|
{
|
|
|
|
|
if (k->pkt->pkttype == PKT_SIGNATURE)
|
2003-06-05 09:14:21 +02:00
|
|
|
|
{
|
2010-01-09 20:00:46 +01:00
|
|
|
|
PKT_signature *sig = k->pkt->pkt.signature;
|
|
|
|
|
|
|
|
|
|
if (IS_KEY_REV (sig) &&
|
|
|
|
|
(sig->keyid[0] != kid[0] || sig->keyid[1] != kid[1]))
|
2003-06-05 09:14:21 +02:00
|
|
|
|
{
|
2017-03-31 20:03:52 +02:00
|
|
|
|
int rc = check_revocation_keys (ctrl, pk, sig);
|
2010-01-09 20:00:46 +01:00
|
|
|
|
if (rc == 0)
|
2003-06-05 09:14:21 +02:00
|
|
|
|
{
|
2010-01-09 20:00:46 +01:00
|
|
|
|
*r_revoked = 2;
|
|
|
|
|
sig_to_revoke_info (sig, rinfo);
|
|
|
|
|
/* Don't continue checking since we can't be any
|
2017-07-20 18:35:46 +02:00
|
|
|
|
* more revoked than this. */
|
2010-01-09 20:00:46 +01:00
|
|
|
|
break;
|
|
|
|
|
}
|
2015-01-22 12:06:11 +01:00
|
|
|
|
else if (gpg_err_code (rc) == GPG_ERR_NO_PUBKEY)
|
2010-10-20 13:33:50 +02:00
|
|
|
|
pk->flags.maybe_revoked = 1;
|
2003-06-05 09:14:21 +02:00
|
|
|
|
|
2010-01-09 20:00:46 +01:00
|
|
|
|
/* A failure here means the sig did not verify, was
|
2017-07-20 18:35:46 +02:00
|
|
|
|
* not issued by a revocation key, or a revocation
|
|
|
|
|
* key loop was broken. If a revocation key isn't
|
|
|
|
|
* findable, however, the key might be revoked and
|
|
|
|
|
* we don't know it. */
|
2003-06-05 09:14:21 +02:00
|
|
|
|
|
2017-07-20 18:35:46 +02:00
|
|
|
|
/* Fixme: In the future handle subkey and cert
|
|
|
|
|
* revocations? PGP doesn't, but it's in 2440. */
|
2003-06-05 09:14:21 +02:00
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2010-01-09 20:00:46 +01:00
|
|
|
|
/* Second pass: Look at the self-signature of all user IDs. */
|
2015-09-16 15:01:45 +02:00
|
|
|
|
|
|
|
|
|
/* According to RFC 4880 section 11.1, user id and attribute packets
|
2017-07-20 18:35:46 +02:00
|
|
|
|
* are in the second section, after the public key packet and before
|
|
|
|
|
* the subkey packets. */
|
2010-01-09 20:00:46 +01:00
|
|
|
|
signode = uidnode = NULL;
|
|
|
|
|
sigdate = 0; /* Helper variable to find the latest signature in one UID. */
|
|
|
|
|
for (k = keyblock; k && k->pkt->pkttype != PKT_PUBLIC_SUBKEY; k = k->next)
|
|
|
|
|
{
|
2015-09-16 15:01:45 +02:00
|
|
|
|
if (k->pkt->pkttype == PKT_USER_ID || k->pkt->pkttype == PKT_ATTRIBUTE)
|
2017-07-20 18:35:46 +02:00
|
|
|
|
{ /* New user id packet. */
|
|
|
|
|
|
|
|
|
|
/* Apply the data from the most recent self-signed packet to
|
|
|
|
|
* the preceding user id packet. */
|
2010-01-09 20:00:46 +01:00
|
|
|
|
if (uidnode && signode)
|
|
|
|
|
{
|
|
|
|
|
fixup_uidnode (uidnode, signode, keytimestamp);
|
2010-10-20 13:33:50 +02:00
|
|
|
|
pk->flags.valid = 1;
|
2010-01-09 20:00:46 +01:00
|
|
|
|
}
|
2017-07-20 18:35:46 +02:00
|
|
|
|
|
2015-09-16 15:01:45 +02:00
|
|
|
|
/* Clear SIGNODE. The only relevant self-signed data for
|
2017-07-20 18:35:46 +02:00
|
|
|
|
* UIDNODE follows it. */
|
2015-09-16 15:01:45 +02:00
|
|
|
|
if (k->pkt->pkttype == PKT_USER_ID)
|
|
|
|
|
uidnode = k;
|
|
|
|
|
else
|
|
|
|
|
uidnode = NULL;
|
2017-07-20 18:35:46 +02:00
|
|
|
|
|
2010-01-09 20:00:46 +01:00
|
|
|
|
signode = NULL;
|
|
|
|
|
sigdate = 0;
|
|
|
|
|
}
|
|
|
|
|
else if (k->pkt->pkttype == PKT_SIGNATURE && uidnode)
|
|
|
|
|
{
|
|
|
|
|
PKT_signature *sig = k->pkt->pkt.signature;
|
|
|
|
|
if (sig->keyid[0] == kid[0] && sig->keyid[1] == kid[1])
|
|
|
|
|
{
|
2017-03-31 20:03:52 +02:00
|
|
|
|
if (check_key_signature (ctrl, keyblock, k, NULL))
|
2010-01-09 20:00:46 +01:00
|
|
|
|
; /* signature did not verify */
|
|
|
|
|
else if ((IS_UID_SIG (sig) || IS_UID_REV (sig))
|
|
|
|
|
&& sig->timestamp >= sigdate)
|
|
|
|
|
{
|
More cleanup of "allow to".
* README, agent/command.c, agent/keyformat.txt, common/i18n.c,
common/iobuf.c, common/keyserver.h, dirmngr/cdblib.c,
dirmngr/ldap-wrapper.c, doc/DETAILS, doc/TRANSLATE,
doc/announce-2.1.txt, doc/gpg.texi, doc/gpgsm.texi,
doc/scdaemon.texi, doc/tools.texi, doc/whats-new-in-2.1.txt,
g10/export.c, g10/getkey.c, g10/import.c, g10/keyedit.c, m4/ksba.m4,
m4/libgcrypt.m4, m4/ntbtls.m4, po/ca.po, po/cs.po, po/da.po,
po/de.po, po/el.po, po/eo.po, po/es.po, po/et.po, po/fi.po,
po/fr.po, po/gl.po, po/hu.po, po/id.po, po/it.po, po/ja.po,
po/nb.po, po/pl.po, po/pt.po, po/ro.po, po/ru.po, po/sk.po,
po/sv.po, po/tr.po, po/uk.po, po/zh_CN.po, po/zh_TW.po,
scd/app-p15.c, scd/ccid-driver.c, scd/command.c, sm/gpgsm.c,
sm/sign.c, tools/gpgconf-comp.c, tools/gpgtar.h: replace "Allow to"
with clearer text.
In standard English, the normal construction is "${XXX} allows ${YYY}
to" -- that is, the subject (${XXX}) of the sentence is allowing the
object (${YYY}) to do something. When the object is missing, the
phrasing sounds awkward, even if the object is implied by context.
There's almost always a better construction that isn't as awkward.
These changes should make the language a bit clearer.
Signed-off-by: Daniel Kahn Gillmor <dkg@fifthhorseman.net>
2016-08-02 04:19:17 +02:00
|
|
|
|
/* Note: we allow invalidation of cert revocations
|
2010-01-09 20:00:46 +01:00
|
|
|
|
* by a newer signature. An attacker can't use this
|
2015-09-16 14:01:48 +02:00
|
|
|
|
* because a key should be revoked with a key revocation.
|
2010-01-09 20:00:46 +01:00
|
|
|
|
* The reason why we have to allow for that is that at
|
|
|
|
|
* one time an email address may become invalid but later
|
|
|
|
|
* the same email address may become valid again (hired,
|
|
|
|
|
* fired, hired again). */
|
|
|
|
|
|
|
|
|
|
sigdate = sig->timestamp;
|
|
|
|
|
signode = k;
|
|
|
|
|
signode->pkt->pkt.signature->flags.chosen_selfsig = 0;
|
|
|
|
|
if (sig->version > sigversion)
|
|
|
|
|
sigversion = sig->version;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
if (uidnode && signode)
|
|
|
|
|
{
|
|
|
|
|
fixup_uidnode (uidnode, signode, keytimestamp);
|
2010-10-20 13:33:50 +02:00
|
|
|
|
pk->flags.valid = 1;
|
2010-01-09 20:00:46 +01:00
|
|
|
|
}
|
2003-06-05 09:14:21 +02:00
|
|
|
|
|
2010-01-09 20:00:46 +01:00
|
|
|
|
/* If the key isn't valid yet, and we have
|
2017-07-20 18:35:46 +02:00
|
|
|
|
* --allow-non-selfsigned-uid set, then force it valid. */
|
2010-10-20 13:33:50 +02:00
|
|
|
|
if (!pk->flags.valid && opt.allow_non_selfsigned_uid)
|
2010-01-09 20:00:46 +01:00
|
|
|
|
{
|
|
|
|
|
if (opt.verbose)
|
|
|
|
|
log_info (_("Invalid key %s made valid by"
|
|
|
|
|
" --allow-non-selfsigned-uid\n"), keystr_from_pk (pk));
|
2010-10-20 13:33:50 +02:00
|
|
|
|
pk->flags.valid = 1;
|
2010-01-09 20:00:46 +01:00
|
|
|
|
}
|
2003-06-05 09:14:21 +02:00
|
|
|
|
|
2010-01-09 20:00:46 +01:00
|
|
|
|
/* The key STILL isn't valid, so try and find an ultimately
|
2017-07-20 18:35:46 +02:00
|
|
|
|
* trusted signature. */
|
2010-10-20 13:33:50 +02:00
|
|
|
|
if (!pk->flags.valid)
|
2010-01-09 20:00:46 +01:00
|
|
|
|
{
|
|
|
|
|
uidnode = NULL;
|
2003-06-05 09:14:21 +02:00
|
|
|
|
|
2010-01-09 20:00:46 +01:00
|
|
|
|
for (k = keyblock; k && k->pkt->pkttype != PKT_PUBLIC_SUBKEY;
|
|
|
|
|
k = k->next)
|
2003-06-05 09:14:21 +02:00
|
|
|
|
{
|
2010-01-09 20:00:46 +01:00
|
|
|
|
if (k->pkt->pkttype == PKT_USER_ID)
|
|
|
|
|
uidnode = k;
|
|
|
|
|
else if (k->pkt->pkttype == PKT_SIGNATURE && uidnode)
|
2003-06-05 09:14:21 +02:00
|
|
|
|
{
|
|
|
|
|
PKT_signature *sig = k->pkt->pkt.signature;
|
|
|
|
|
|
2010-01-09 20:00:46 +01:00
|
|
|
|
if (sig->keyid[0] != kid[0] || sig->keyid[1] != kid[1])
|
|
|
|
|
{
|
|
|
|
|
PKT_public_key *ultimate_pk;
|
|
|
|
|
|
|
|
|
|
ultimate_pk = xmalloc_clear (sizeof (*ultimate_pk));
|
|
|
|
|
|
2017-07-20 18:35:46 +02:00
|
|
|
|
/* We don't want to use the full get_pubkey to avoid
|
|
|
|
|
* infinite recursion in certain cases. There is no
|
|
|
|
|
* reason to check that an ultimately trusted key is
|
|
|
|
|
* still valid - if it has been revoked the user
|
|
|
|
|
* should also remove the ultimate trust flag. */
|
2019-09-09 14:34:09 +02:00
|
|
|
|
if (get_pubkey_fast (ctrl, ultimate_pk, sig->keyid) == 0
|
2017-03-31 20:03:52 +02:00
|
|
|
|
&& check_key_signature2 (ctrl,
|
|
|
|
|
keyblock, k, ultimate_pk,
|
2010-01-09 20:00:46 +01:00
|
|
|
|
NULL, NULL, NULL, NULL) == 0
|
2017-03-31 20:03:52 +02:00
|
|
|
|
&& get_ownertrust (ctrl, ultimate_pk) == TRUST_ULTIMATE)
|
2006-04-19 13:26:11 +02:00
|
|
|
|
{
|
2010-01-09 20:00:46 +01:00
|
|
|
|
free_public_key (ultimate_pk);
|
2010-10-20 13:33:50 +02:00
|
|
|
|
pk->flags.valid = 1;
|
2006-04-19 13:26:11 +02:00
|
|
|
|
break;
|
|
|
|
|
}
|
2003-06-05 09:14:21 +02:00
|
|
|
|
|
2010-01-09 20:00:46 +01:00
|
|
|
|
free_public_key (ultimate_pk);
|
2003-06-05 09:14:21 +02:00
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
2010-01-09 20:00:46 +01:00
|
|
|
|
}
|
2003-06-05 09:14:21 +02:00
|
|
|
|
|
2017-07-20 18:35:46 +02:00
|
|
|
|
/* Record the highest selfsig version so we know if this is a v3 key
|
|
|
|
|
* through and through, or a v3 key with a v4 selfsig somewhere.
|
|
|
|
|
* This is useful in a few places to know if the key must be treated
|
|
|
|
|
* as PGP2-style or OpenPGP-style. Note that a selfsig revocation
|
|
|
|
|
* with a higher version number will also raise this value. This is
|
|
|
|
|
* okay since such a revocation must be issued by the user (i.e. it
|
|
|
|
|
* cannot be issued by someone else to modify the key behavior.) */
|
2010-01-09 20:00:46 +01:00
|
|
|
|
|
|
|
|
|
pk->selfsigversion = sigversion;
|
|
|
|
|
|
2017-07-20 18:35:46 +02:00
|
|
|
|
/* Now that we had a look at all user IDs we can now get some
|
|
|
|
|
* information from those user IDs. */
|
2010-01-09 20:00:46 +01:00
|
|
|
|
|
|
|
|
|
if (!key_usage)
|
|
|
|
|
{
|
|
|
|
|
/* Find the latest user ID with key flags set. */
|
|
|
|
|
uiddate = 0; /* Helper to find the latest user ID. */
|
|
|
|
|
for (k = keyblock; k && k->pkt->pkttype != PKT_PUBLIC_SUBKEY;
|
|
|
|
|
k = k->next)
|
|
|
|
|
{
|
|
|
|
|
if (k->pkt->pkttype == PKT_USER_ID)
|
|
|
|
|
{
|
|
|
|
|
PKT_user_id *uid = k->pkt->pkt.user_id;
|
2017-07-20 18:35:46 +02:00
|
|
|
|
|
2020-03-18 12:30:06 +01:00
|
|
|
|
if (uid->help_key_usage
|
|
|
|
|
&& (uid->created > uiddate || (!uid->created && !uiddate)))
|
2010-01-09 20:00:46 +01:00
|
|
|
|
{
|
|
|
|
|
key_usage = uid->help_key_usage;
|
|
|
|
|
uiddate = uid->created;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
2003-06-05 09:14:21 +02:00
|
|
|
|
}
|
2017-07-20 18:35:46 +02:00
|
|
|
|
|
2010-01-09 20:00:46 +01:00
|
|
|
|
if (!key_usage)
|
|
|
|
|
{
|
|
|
|
|
/* No key flags at all: get it from the algo. */
|
|
|
|
|
key_usage = openpgp_pk_algo_usage (pk->pubkey_algo);
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
|
|
|
|
/* Check that the usage matches the usage as given by the algo. */
|
|
|
|
|
int x = openpgp_pk_algo_usage (pk->pubkey_algo);
|
|
|
|
|
if (x) /* Mask it down to the actual allowed usage. */
|
|
|
|
|
key_usage &= x;
|
2003-06-05 09:14:21 +02:00
|
|
|
|
}
|
|
|
|
|
|
2010-01-09 20:00:46 +01:00
|
|
|
|
/* Whatever happens, it's a primary key, so it can certify. */
|
|
|
|
|
pk->pubkey_usage = key_usage | PUBKEY_USAGE_CERT;
|
2003-06-05 09:14:21 +02:00
|
|
|
|
|
2010-01-09 20:00:46 +01:00
|
|
|
|
if (!key_expire_seen)
|
|
|
|
|
{
|
2020-03-18 12:30:06 +01:00
|
|
|
|
/* Find the latest valid user ID with a key expiration set.
|
|
|
|
|
* This may be a different one than from usage computation above
|
|
|
|
|
* because some user IDs may have no expiration date set. */
|
2010-01-09 20:00:46 +01:00
|
|
|
|
uiddate = 0;
|
|
|
|
|
for (k = keyblock; k && k->pkt->pkttype != PKT_PUBLIC_SUBKEY;
|
|
|
|
|
k = k->next)
|
|
|
|
|
{
|
|
|
|
|
if (k->pkt->pkttype == PKT_USER_ID)
|
|
|
|
|
{
|
|
|
|
|
PKT_user_id *uid = k->pkt->pkt.user_id;
|
2020-03-18 12:30:06 +01:00
|
|
|
|
if (uid->help_key_expire
|
|
|
|
|
&& (uid->created > uiddate || (!uid->created && !uiddate)))
|
2010-01-09 20:00:46 +01:00
|
|
|
|
{
|
|
|
|
|
key_expire = uid->help_key_expire;
|
|
|
|
|
uiddate = uid->created;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
2003-06-05 09:14:21 +02:00
|
|
|
|
|
2020-03-18 12:30:06 +01:00
|
|
|
|
/* Currently only the not anymore supported v3 keys have a maximum
|
|
|
|
|
* expiration date, but future key versions may get this feature again. */
|
2010-01-09 20:00:46 +01:00
|
|
|
|
if (key_expire == 0
|
|
|
|
|
|| (pk->max_expiredate && key_expire > pk->max_expiredate))
|
|
|
|
|
key_expire = pk->max_expiredate;
|
2003-06-05 09:14:21 +02:00
|
|
|
|
|
2010-01-09 20:00:46 +01:00
|
|
|
|
pk->has_expired = key_expire >= curtime ? 0 : key_expire;
|
|
|
|
|
pk->expiredate = key_expire;
|
2003-06-05 09:14:21 +02:00
|
|
|
|
|
2017-07-20 18:35:46 +02:00
|
|
|
|
/* Fixme: we should see how to get rid of the expiretime fields but
|
|
|
|
|
* this needs changes at other places too. */
|
2010-01-09 20:00:46 +01:00
|
|
|
|
|
|
|
|
|
/* And now find the real primary user ID and delete all others. */
|
|
|
|
|
uiddate = uiddate2 = 0;
|
|
|
|
|
uidnode = uidnode2 = NULL;
|
|
|
|
|
for (k = keyblock; k && k->pkt->pkttype != PKT_PUBLIC_SUBKEY; k = k->next)
|
|
|
|
|
{
|
|
|
|
|
if (k->pkt->pkttype == PKT_USER_ID && !k->pkt->pkt.user_id->attrib_data)
|
|
|
|
|
{
|
|
|
|
|
PKT_user_id *uid = k->pkt->pkt.user_id;
|
2017-03-08 11:01:22 +01:00
|
|
|
|
if (uid->flags.primary)
|
2010-01-09 20:00:46 +01:00
|
|
|
|
{
|
|
|
|
|
if (uid->created > uiddate)
|
|
|
|
|
{
|
|
|
|
|
uiddate = uid->created;
|
|
|
|
|
uidnode = k;
|
|
|
|
|
}
|
|
|
|
|
else if (uid->created == uiddate && uidnode)
|
|
|
|
|
{
|
2017-07-20 18:35:46 +02:00
|
|
|
|
/* The dates are equal, so we need to do a different
|
|
|
|
|
* (and arbitrary) comparison. This should rarely,
|
|
|
|
|
* if ever, happen. It's good to try and guarantee
|
|
|
|
|
* that two different GnuPG users with two different
|
|
|
|
|
* keyrings at least pick the same primary. */
|
2010-01-09 20:00:46 +01:00
|
|
|
|
if (cmp_user_ids (uid, uidnode->pkt->pkt.user_id) > 0)
|
2003-06-05 09:14:21 +02:00
|
|
|
|
uidnode = k;
|
2010-01-09 20:00:46 +01:00
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
|
|
|
|
if (uid->created > uiddate2)
|
|
|
|
|
{
|
|
|
|
|
uiddate2 = uid->created;
|
|
|
|
|
uidnode2 = k;
|
|
|
|
|
}
|
|
|
|
|
else if (uid->created == uiddate2 && uidnode2)
|
|
|
|
|
{
|
|
|
|
|
if (cmp_user_ids (uid, uidnode2->pkt->pkt.user_id) > 0)
|
2003-06-05 09:14:21 +02:00
|
|
|
|
uidnode2 = k;
|
2010-01-09 20:00:46 +01:00
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
if (uidnode)
|
|
|
|
|
{
|
|
|
|
|
for (k = keyblock; k && k->pkt->pkttype != PKT_PUBLIC_SUBKEY;
|
|
|
|
|
k = k->next)
|
|
|
|
|
{
|
|
|
|
|
if (k->pkt->pkttype == PKT_USER_ID &&
|
|
|
|
|
!k->pkt->pkt.user_id->attrib_data)
|
|
|
|
|
{
|
|
|
|
|
PKT_user_id *uid = k->pkt->pkt.user_id;
|
|
|
|
|
if (k != uidnode)
|
2017-03-08 11:01:22 +01:00
|
|
|
|
uid->flags.primary = 0;
|
2010-01-09 20:00:46 +01:00
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
else if (uidnode2)
|
|
|
|
|
{
|
|
|
|
|
/* None is flagged primary - use the latest user ID we have,
|
2017-07-20 18:35:46 +02:00
|
|
|
|
* and disambiguate with the arbitrary packet comparison. */
|
2017-03-08 11:01:22 +01:00
|
|
|
|
uidnode2->pkt->pkt.user_id->flags.primary = 1;
|
2010-01-09 20:00:46 +01:00
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
|
|
|
|
/* None of our uids were self-signed, so pick the one that
|
2017-07-20 18:35:46 +02:00
|
|
|
|
* sorts first to be the primary. This is the best we can do
|
|
|
|
|
* here since there are no self sigs to date the uids. */
|
2003-06-05 09:14:21 +02:00
|
|
|
|
|
2010-01-09 20:00:46 +01:00
|
|
|
|
uidnode = NULL;
|
2003-06-05 09:14:21 +02:00
|
|
|
|
|
2010-01-09 20:00:46 +01:00
|
|
|
|
for (k = keyblock; k && k->pkt->pkttype != PKT_PUBLIC_SUBKEY;
|
|
|
|
|
k = k->next)
|
|
|
|
|
{
|
|
|
|
|
if (k->pkt->pkttype == PKT_USER_ID
|
|
|
|
|
&& !k->pkt->pkt.user_id->attrib_data)
|
|
|
|
|
{
|
|
|
|
|
if (!uidnode)
|
|
|
|
|
{
|
|
|
|
|
uidnode = k;
|
2017-03-08 11:01:22 +01:00
|
|
|
|
uidnode->pkt->pkt.user_id->flags.primary = 1;
|
2010-01-09 20:00:46 +01:00
|
|
|
|
continue;
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
|
|
|
|
if (cmp_user_ids (k->pkt->pkt.user_id,
|
|
|
|
|
uidnode->pkt->pkt.user_id) > 0)
|
|
|
|
|
{
|
2017-03-08 11:01:22 +01:00
|
|
|
|
uidnode->pkt->pkt.user_id->flags.primary = 0;
|
2010-01-09 20:00:46 +01:00
|
|
|
|
uidnode = k;
|
2017-03-08 11:01:22 +01:00
|
|
|
|
uidnode->pkt->pkt.user_id->flags.primary = 1;
|
2010-01-09 20:00:46 +01:00
|
|
|
|
}
|
|
|
|
|
else
|
2017-07-20 18:35:46 +02:00
|
|
|
|
{
|
|
|
|
|
/* just to be safe: */
|
|
|
|
|
k->pkt->pkt.user_id->flags.primary = 0;
|
|
|
|
|
}
|
2010-01-09 20:00:46 +01:00
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
2003-06-05 09:14:21 +02:00
|
|
|
|
}
|
|
|
|
|
|
2017-07-20 18:35:46 +02:00
|
|
|
|
|
2008-04-16 10:23:23 +02:00
|
|
|
|
/* Convert a buffer to a signature. Useful for 0x19 embedded sigs.
|
2017-07-20 18:35:46 +02:00
|
|
|
|
* Caller must free the signature when they are done. */
|
2008-04-16 10:23:23 +02:00
|
|
|
|
static PKT_signature *
|
2010-01-09 20:00:46 +01:00
|
|
|
|
buf_to_sig (const byte * buf, size_t len)
|
2008-04-16 10:23:23 +02:00
|
|
|
|
{
|
2010-01-09 20:00:46 +01:00
|
|
|
|
PKT_signature *sig = xmalloc_clear (sizeof (PKT_signature));
|
|
|
|
|
IOBUF iobuf = iobuf_temp_with_content (buf, len);
|
|
|
|
|
int save_mode = set_packet_list_mode (0);
|
2008-04-16 10:23:23 +02:00
|
|
|
|
|
2010-01-09 20:00:46 +01:00
|
|
|
|
if (parse_signature (iobuf, PKT_SIGNATURE, len, sig) != 0)
|
2008-04-16 10:23:23 +02:00
|
|
|
|
{
|
2018-07-03 02:07:03 +02:00
|
|
|
|
free_seckey_enc (sig);
|
2010-01-09 20:00:46 +01:00
|
|
|
|
sig = NULL;
|
2008-04-16 10:23:23 +02:00
|
|
|
|
}
|
|
|
|
|
|
2010-01-09 20:00:46 +01:00
|
|
|
|
set_packet_list_mode (save_mode);
|
|
|
|
|
iobuf_close (iobuf);
|
2008-04-16 10:23:23 +02:00
|
|
|
|
|
|
|
|
|
return sig;
|
|
|
|
|
}
|
2003-06-05 09:14:21 +02:00
|
|
|
|
|
2015-09-16 14:01:48 +02:00
|
|
|
|
|
2017-07-20 18:35:46 +02:00
|
|
|
|
/* Use the self-signed data to fill in various fields in subkeys.
|
|
|
|
|
*
|
|
|
|
|
* KEYBLOCK is the whole keyblock. SUBNODE is the subkey to fill in.
|
|
|
|
|
*
|
|
|
|
|
* Sets the following fields on the subkey:
|
|
|
|
|
*
|
|
|
|
|
* main_keyid
|
|
|
|
|
* flags.valid if the subkey has a valid self-sig binding
|
|
|
|
|
* flags.revoked
|
|
|
|
|
* flags.backsig
|
|
|
|
|
* pubkey_usage
|
|
|
|
|
* has_expired
|
|
|
|
|
* expired_date
|
|
|
|
|
*
|
2023-02-07 14:25:58 +01:00
|
|
|
|
* On this subkey's most recent valid self-signed packet, the
|
2017-07-20 18:35:46 +02:00
|
|
|
|
* following field is set:
|
|
|
|
|
*
|
|
|
|
|
* flags.chosen_selfsig
|
|
|
|
|
*/
|
2003-06-05 09:14:21 +02:00
|
|
|
|
static void
|
2017-03-31 20:03:52 +02:00
|
|
|
|
merge_selfsigs_subkey (ctrl_t ctrl, kbnode_t keyblock, kbnode_t subnode)
|
2003-06-05 09:14:21 +02:00
|
|
|
|
{
|
2010-01-09 20:00:46 +01:00
|
|
|
|
PKT_public_key *mainpk = NULL, *subpk = NULL;
|
|
|
|
|
PKT_signature *sig;
|
|
|
|
|
KBNODE k;
|
|
|
|
|
u32 mainkid[2];
|
|
|
|
|
u32 sigdate = 0;
|
|
|
|
|
KBNODE signode;
|
|
|
|
|
u32 curtime = make_timestamp ();
|
|
|
|
|
unsigned int key_usage = 0;
|
|
|
|
|
u32 keytimestamp = 0;
|
|
|
|
|
u32 key_expire = 0;
|
|
|
|
|
const byte *p;
|
|
|
|
|
|
|
|
|
|
if (subnode->pkt->pkttype != PKT_PUBLIC_SUBKEY)
|
|
|
|
|
BUG ();
|
|
|
|
|
mainpk = keyblock->pkt->pkt.public_key;
|
|
|
|
|
if (mainpk->version < 4)
|
|
|
|
|
return;/* (actually this should never happen) */
|
|
|
|
|
keyid_from_pk (mainpk, mainkid);
|
|
|
|
|
subpk = subnode->pkt->pkt.public_key;
|
|
|
|
|
keytimestamp = subpk->timestamp;
|
|
|
|
|
|
2010-10-20 13:33:50 +02:00
|
|
|
|
subpk->flags.valid = 0;
|
2016-01-08 15:16:12 +01:00
|
|
|
|
subpk->flags.exact = 0;
|
2010-01-09 20:00:46 +01:00
|
|
|
|
subpk->main_keyid[0] = mainpk->main_keyid[0];
|
|
|
|
|
subpk->main_keyid[1] = mainpk->main_keyid[1];
|
|
|
|
|
|
|
|
|
|
/* Find the latest key binding self-signature. */
|
|
|
|
|
signode = NULL;
|
|
|
|
|
sigdate = 0; /* Helper to find the latest signature. */
|
|
|
|
|
for (k = subnode->next; k && k->pkt->pkttype != PKT_PUBLIC_SUBKEY;
|
|
|
|
|
k = k->next)
|
|
|
|
|
{
|
|
|
|
|
if (k->pkt->pkttype == PKT_SIGNATURE)
|
|
|
|
|
{
|
|
|
|
|
sig = k->pkt->pkt.signature;
|
|
|
|
|
if (sig->keyid[0] == mainkid[0] && sig->keyid[1] == mainkid[1])
|
|
|
|
|
{
|
2017-03-31 20:03:52 +02:00
|
|
|
|
if (check_key_signature (ctrl, keyblock, k, NULL))
|
2010-01-09 20:00:46 +01:00
|
|
|
|
; /* Signature did not verify. */
|
|
|
|
|
else if (IS_SUBKEY_REV (sig))
|
|
|
|
|
{
|
2003-06-05 09:14:21 +02:00
|
|
|
|
/* Note that this means that the date on a
|
2017-07-20 18:35:46 +02:00
|
|
|
|
* revocation sig does not matter - even if the
|
|
|
|
|
* binding sig is dated after the revocation sig,
|
|
|
|
|
* the subkey is still marked as revoked. This
|
|
|
|
|
* seems ok, as it is just as easy to make new
|
|
|
|
|
* subkeys rather than re-sign old ones as the
|
|
|
|
|
* problem is in the distribution. Plus, PGP (7)
|
|
|
|
|
* does this the same way. */
|
2010-10-20 13:33:50 +02:00
|
|
|
|
subpk->flags.revoked = 1;
|
2010-01-09 20:00:46 +01:00
|
|
|
|
sig_to_revoke_info (sig, &subpk->revoked);
|
|
|
|
|
/* Although we could stop now, we continue to
|
|
|
|
|
* figure out other information like the old expiration
|
|
|
|
|
* time. */
|
|
|
|
|
}
|
|
|
|
|
else if (IS_SUBKEY_SIG (sig) && sig->timestamp >= sigdate)
|
|
|
|
|
{
|
|
|
|
|
if (sig->flags.expired)
|
|
|
|
|
; /* Signature has expired - ignore it. */
|
|
|
|
|
else
|
|
|
|
|
{
|
|
|
|
|
sigdate = sig->timestamp;
|
|
|
|
|
signode = k;
|
|
|
|
|
signode->pkt->pkt.signature->flags.chosen_selfsig = 0;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
2003-06-05 09:14:21 +02:00
|
|
|
|
}
|
|
|
|
|
|
2010-01-09 20:00:46 +01:00
|
|
|
|
/* No valid key binding. */
|
|
|
|
|
if (!signode)
|
|
|
|
|
return;
|
2003-06-05 09:14:21 +02:00
|
|
|
|
|
2010-01-09 20:00:46 +01:00
|
|
|
|
sig = signode->pkt->pkt.signature;
|
|
|
|
|
sig->flags.chosen_selfsig = 1; /* So we know which selfsig we chose later. */
|
2006-04-19 13:26:11 +02:00
|
|
|
|
|
2010-01-09 20:00:46 +01:00
|
|
|
|
key_usage = parse_key_usage (sig);
|
|
|
|
|
if (!key_usage)
|
|
|
|
|
{
|
|
|
|
|
/* No key flags at all: get it from the algo. */
|
|
|
|
|
key_usage = openpgp_pk_algo_usage (subpk->pubkey_algo);
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
|
|
|
|
/* Check that the usage matches the usage as given by the algo. */
|
|
|
|
|
int x = openpgp_pk_algo_usage (subpk->pubkey_algo);
|
|
|
|
|
if (x) /* Mask it down to the actual allowed usage. */
|
|
|
|
|
key_usage &= x;
|
|
|
|
|
}
|
2006-04-19 13:26:11 +02:00
|
|
|
|
|
2010-01-09 20:00:46 +01:00
|
|
|
|
subpk->pubkey_usage = key_usage;
|
2006-04-19 13:26:11 +02:00
|
|
|
|
|
2019-09-05 20:36:38 +02:00
|
|
|
|
p = parse_sig_subpkt (sig, 1, SIGSUBPKT_KEY_EXPIRE, NULL);
|
2015-02-11 10:27:57 +01:00
|
|
|
|
if (p && buf32_to_u32 (p))
|
|
|
|
|
key_expire = keytimestamp + buf32_to_u32 (p);
|
2010-01-09 20:00:46 +01:00
|
|
|
|
else
|
|
|
|
|
key_expire = 0;
|
2017-07-20 18:35:46 +02:00
|
|
|
|
|
2010-01-09 20:00:46 +01:00
|
|
|
|
subpk->has_expired = key_expire >= curtime ? 0 : key_expire;
|
|
|
|
|
subpk->expiredate = key_expire;
|
2006-04-19 13:26:11 +02:00
|
|
|
|
|
2010-01-09 20:00:46 +01:00
|
|
|
|
/* Algo doesn't exist. */
|
|
|
|
|
if (openpgp_pk_test_algo (subpk->pubkey_algo))
|
|
|
|
|
return;
|
2008-04-16 10:23:23 +02:00
|
|
|
|
|
2010-10-20 13:33:50 +02:00
|
|
|
|
subpk->flags.valid = 1;
|
2006-04-19 13:26:11 +02:00
|
|
|
|
|
2010-01-09 20:00:46 +01:00
|
|
|
|
/* Find the most recent 0x19 embedded signature on our self-sig. */
|
2010-10-20 13:33:50 +02:00
|
|
|
|
if (!subpk->flags.backsig)
|
2010-01-09 20:00:46 +01:00
|
|
|
|
{
|
|
|
|
|
int seq = 0;
|
|
|
|
|
size_t n;
|
|
|
|
|
PKT_signature *backsig = NULL;
|
2008-04-16 10:23:23 +02:00
|
|
|
|
|
2010-01-09 20:00:46 +01:00
|
|
|
|
sigdate = 0;
|
2006-04-19 13:26:11 +02:00
|
|
|
|
|
2010-01-09 20:00:46 +01:00
|
|
|
|
/* We do this while() since there may be other embedded
|
2017-07-20 18:35:46 +02:00
|
|
|
|
* signatures in the future. We only want 0x19 here. */
|
2006-04-19 13:26:11 +02:00
|
|
|
|
|
2019-09-05 20:36:38 +02:00
|
|
|
|
while ((p = enum_sig_subpkt (sig, 1, SIGSUBPKT_SIGNATURE,
|
|
|
|
|
&n, &seq, NULL)))
|
2021-09-29 04:30:00 +02:00
|
|
|
|
if (n > 3
|
|
|
|
|
&& ((p[0] == 3 && p[2] == 0x19) || (p[0] == 4 && p[1] == 0x19)
|
|
|
|
|
|| (p[0] == 5 && p[1] == 0x19)))
|
|
|
|
|
{
|
2010-01-09 20:00:46 +01:00
|
|
|
|
PKT_signature *tempsig = buf_to_sig (p, n);
|
|
|
|
|
if (tempsig)
|
|
|
|
|
{
|
|
|
|
|
if (tempsig->timestamp > sigdate)
|
|
|
|
|
{
|
|
|
|
|
if (backsig)
|
|
|
|
|
free_seckey_enc (backsig);
|
2006-04-19 13:26:11 +02:00
|
|
|
|
|
2010-01-09 20:00:46 +01:00
|
|
|
|
backsig = tempsig;
|
|
|
|
|
sigdate = backsig->timestamp;
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
free_seckey_enc (tempsig);
|
|
|
|
|
}
|
|
|
|
|
}
|
2006-04-19 13:26:11 +02:00
|
|
|
|
|
2010-01-09 20:00:46 +01:00
|
|
|
|
seq = 0;
|
2008-04-16 10:23:23 +02:00
|
|
|
|
|
2010-01-09 20:00:46 +01:00
|
|
|
|
/* It is safe to have this in the unhashed area since the 0x19
|
2017-07-20 18:35:46 +02:00
|
|
|
|
* is located on the selfsig for convenience, not security. */
|
2019-09-05 20:36:38 +02:00
|
|
|
|
while ((p = enum_sig_subpkt (sig, 0, SIGSUBPKT_SIGNATURE,
|
2010-01-09 20:00:46 +01:00
|
|
|
|
&n, &seq, NULL)))
|
2021-09-29 04:30:00 +02:00
|
|
|
|
if (n > 3
|
|
|
|
|
&& ((p[0] == 3 && p[2] == 0x19) || (p[0] == 4 && p[1] == 0x19)
|
|
|
|
|
|| (p[0] == 5 && p[1] == 0x19)))
|
|
|
|
|
{
|
2010-01-09 20:00:46 +01:00
|
|
|
|
PKT_signature *tempsig = buf_to_sig (p, n);
|
|
|
|
|
if (tempsig)
|
|
|
|
|
{
|
|
|
|
|
if (tempsig->timestamp > sigdate)
|
|
|
|
|
{
|
|
|
|
|
if (backsig)
|
|
|
|
|
free_seckey_enc (backsig);
|
2007-03-10 03:05:54 +01:00
|
|
|
|
|
2010-01-09 20:00:46 +01:00
|
|
|
|
backsig = tempsig;
|
|
|
|
|
sigdate = backsig->timestamp;
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
free_seckey_enc (tempsig);
|
|
|
|
|
}
|
2006-04-19 13:26:11 +02:00
|
|
|
|
}
|
2010-01-09 20:00:46 +01:00
|
|
|
|
|
|
|
|
|
if (backsig)
|
|
|
|
|
{
|
2015-11-16 12:41:46 +01:00
|
|
|
|
/* At this point, backsig contains the most recent 0x19 sig.
|
2017-07-20 18:35:46 +02:00
|
|
|
|
* Let's see if it is good. */
|
2010-01-09 20:00:46 +01:00
|
|
|
|
|
|
|
|
|
/* 2==valid, 1==invalid, 0==didn't check */
|
|
|
|
|
if (check_backsig (mainpk, subpk, backsig) == 0)
|
2010-10-20 13:33:50 +02:00
|
|
|
|
subpk->flags.backsig = 2;
|
2010-01-09 20:00:46 +01:00
|
|
|
|
else
|
2010-10-20 13:33:50 +02:00
|
|
|
|
subpk->flags.backsig = 1;
|
2010-01-09 20:00:46 +01:00
|
|
|
|
|
|
|
|
|
free_seckey_enc (backsig);
|
|
|
|
|
}
|
|
|
|
|
}
|
2006-04-19 13:26:11 +02:00
|
|
|
|
}
|
2003-06-05 09:14:21 +02:00
|
|
|
|
|
|
|
|
|
|
2015-09-16 14:01:48 +02:00
|
|
|
|
/* Merge information from the self-signatures with the public key,
|
2017-07-20 18:35:46 +02:00
|
|
|
|
* subkeys and user ids to make using them more easy.
|
|
|
|
|
*
|
|
|
|
|
* See documentation for merge_selfsigs_main, merge_selfsigs_subkey
|
|
|
|
|
* and fixup_uidnode for exactly which fields are updated. */
|
2003-06-05 09:14:21 +02:00
|
|
|
|
static void
|
2017-03-31 20:03:52 +02:00
|
|
|
|
merge_selfsigs (ctrl_t ctrl, kbnode_t keyblock)
|
2003-06-05 09:14:21 +02:00
|
|
|
|
{
|
2010-01-09 20:00:46 +01:00
|
|
|
|
KBNODE k;
|
|
|
|
|
int revoked;
|
|
|
|
|
struct revoke_info rinfo;
|
|
|
|
|
PKT_public_key *main_pk;
|
|
|
|
|
prefitem_t *prefs;
|
2010-10-20 13:33:50 +02:00
|
|
|
|
unsigned int mdc_feature;
|
2018-01-10 11:42:38 +01:00
|
|
|
|
unsigned int aead_feature;
|
2010-01-09 20:00:46 +01:00
|
|
|
|
|
|
|
|
|
if (keyblock->pkt->pkttype != PKT_PUBLIC_KEY)
|
|
|
|
|
{
|
|
|
|
|
if (keyblock->pkt->pkttype == PKT_SECRET_KEY)
|
|
|
|
|
{
|
|
|
|
|
log_error ("expected public key but found secret key "
|
|
|
|
|
"- must stop\n");
|
|
|
|
|
/* We better exit here because a public key is expected at
|
2017-07-20 18:35:46 +02:00
|
|
|
|
* other places too. FIXME: Figure this out earlier and
|
|
|
|
|
* don't get to here at all */
|
2010-01-09 20:00:46 +01:00
|
|
|
|
g10_exit (1);
|
2003-06-05 09:14:21 +02:00
|
|
|
|
}
|
2010-01-09 20:00:46 +01:00
|
|
|
|
BUG ();
|
2003-06-05 09:14:21 +02:00
|
|
|
|
}
|
|
|
|
|
|
2017-03-31 20:03:52 +02:00
|
|
|
|
merge_selfsigs_main (ctrl, keyblock, &revoked, &rinfo);
|
2010-01-09 20:00:46 +01:00
|
|
|
|
|
|
|
|
|
/* Now merge in the data from each of the subkeys. */
|
|
|
|
|
for (k = keyblock; k; k = k->next)
|
|
|
|
|
{
|
|
|
|
|
if (k->pkt->pkttype == PKT_PUBLIC_SUBKEY)
|
|
|
|
|
{
|
2017-03-31 20:03:52 +02:00
|
|
|
|
merge_selfsigs_subkey (ctrl, keyblock, k);
|
2010-01-09 20:00:46 +01:00
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
main_pk = keyblock->pkt->pkt.public_key;
|
2010-10-20 13:33:50 +02:00
|
|
|
|
if (revoked || main_pk->has_expired || !main_pk->flags.valid)
|
2010-01-09 20:00:46 +01:00
|
|
|
|
{
|
|
|
|
|
/* If the primary key is revoked, expired, or invalid we
|
|
|
|
|
* better set the appropriate flags on that key and all
|
|
|
|
|
* subkeys. */
|
|
|
|
|
for (k = keyblock; k; k = k->next)
|
|
|
|
|
{
|
|
|
|
|
if (k->pkt->pkttype == PKT_PUBLIC_KEY
|
|
|
|
|
|| k->pkt->pkttype == PKT_PUBLIC_SUBKEY)
|
|
|
|
|
{
|
|
|
|
|
PKT_public_key *pk = k->pkt->pkt.public_key;
|
2010-10-20 13:33:50 +02:00
|
|
|
|
if (!main_pk->flags.valid)
|
|
|
|
|
pk->flags.valid = 0;
|
|
|
|
|
if (revoked && !pk->flags.revoked)
|
2010-01-09 20:00:46 +01:00
|
|
|
|
{
|
2010-10-20 13:33:50 +02:00
|
|
|
|
pk->flags.revoked = revoked;
|
2010-01-09 20:00:46 +01:00
|
|
|
|
memcpy (&pk->revoked, &rinfo, sizeof (rinfo));
|
|
|
|
|
}
|
|
|
|
|
if (main_pk->has_expired)
|
2019-05-23 02:40:01 +02:00
|
|
|
|
{
|
|
|
|
|
pk->has_expired = main_pk->has_expired;
|
|
|
|
|
if (!pk->expiredate || pk->expiredate > main_pk->expiredate)
|
|
|
|
|
pk->expiredate = main_pk->expiredate;
|
|
|
|
|
}
|
2010-01-09 20:00:46 +01:00
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* Set the preference list of all keys to those of the primary real
|
|
|
|
|
* user ID. Note: we use these preferences when we don't know by
|
|
|
|
|
* which user ID the key has been selected.
|
|
|
|
|
* fixme: we should keep atoms of commonly used preferences or
|
|
|
|
|
* use reference counting to optimize the preference lists storage.
|
|
|
|
|
* FIXME: it might be better to use the intersection of
|
|
|
|
|
* all preferences.
|
|
|
|
|
* Do a similar thing for the MDC feature flag. */
|
|
|
|
|
prefs = NULL;
|
2018-01-10 11:42:38 +01:00
|
|
|
|
mdc_feature = aead_feature = 0;
|
2010-01-09 20:00:46 +01:00
|
|
|
|
for (k = keyblock; k && k->pkt->pkttype != PKT_PUBLIC_SUBKEY; k = k->next)
|
|
|
|
|
{
|
|
|
|
|
if (k->pkt->pkttype == PKT_USER_ID
|
|
|
|
|
&& !k->pkt->pkt.user_id->attrib_data
|
2017-03-08 11:01:22 +01:00
|
|
|
|
&& k->pkt->pkt.user_id->flags.primary)
|
2010-01-09 20:00:46 +01:00
|
|
|
|
{
|
|
|
|
|
prefs = k->pkt->pkt.user_id->prefs;
|
|
|
|
|
mdc_feature = k->pkt->pkt.user_id->flags.mdc;
|
2018-01-10 11:42:38 +01:00
|
|
|
|
aead_feature = k->pkt->pkt.user_id->flags.aead;
|
2010-01-09 20:00:46 +01:00
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
for (k = keyblock; k; k = k->next)
|
|
|
|
|
{
|
|
|
|
|
if (k->pkt->pkttype == PKT_PUBLIC_KEY
|
|
|
|
|
|| k->pkt->pkttype == PKT_PUBLIC_SUBKEY)
|
|
|
|
|
{
|
|
|
|
|
PKT_public_key *pk = k->pkt->pkt.public_key;
|
|
|
|
|
if (pk->prefs)
|
|
|
|
|
xfree (pk->prefs);
|
|
|
|
|
pk->prefs = copy_prefs (prefs);
|
2010-10-20 13:33:50 +02:00
|
|
|
|
pk->flags.mdc = mdc_feature;
|
2018-01-10 11:42:38 +01:00
|
|
|
|
pk->flags.aead = aead_feature;
|
2010-01-09 20:00:46 +01:00
|
|
|
|
}
|
2003-06-05 09:14:21 +02:00
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
2015-09-16 14:01:48 +02:00
|
|
|
|
/* See whether the key satisfies any additional requirements specified
|
2016-07-06 08:53:49 +02:00
|
|
|
|
* in CTX. If so, return the node of an appropriate key or subkey.
|
|
|
|
|
* Otherwise, return NULL if there was no appropriate key.
|
2016-05-13 16:24:59 +02:00
|
|
|
|
*
|
2016-11-15 15:11:39 +01:00
|
|
|
|
* Note that we do not return a reference, i.e. the result must not be
|
|
|
|
|
* freed using 'release_kbnode'.
|
|
|
|
|
*
|
2016-05-13 16:24:59 +02:00
|
|
|
|
* In case the primary key is not required, select a suitable subkey.
|
2016-07-06 08:53:49 +02:00
|
|
|
|
* We need the primary key if PUBKEY_USAGE_CERT is set in REQ_USAGE or
|
2018-05-29 13:01:12 +02:00
|
|
|
|
* we are in PGP7 mode and PUBKEY_USAGE_SIG is set in
|
2016-07-06 08:53:49 +02:00
|
|
|
|
* REQ_USAGE.
|
2016-05-13 16:24:59 +02:00
|
|
|
|
*
|
|
|
|
|
* If any of PUBKEY_USAGE_SIG, PUBKEY_USAGE_ENC and PUBKEY_USAGE_CERT
|
2016-07-06 08:53:49 +02:00
|
|
|
|
* are set in REQ_USAGE, we filter by the key's function. Concretely,
|
|
|
|
|
* if PUBKEY_USAGE_SIG and PUBKEY_USAGE_CERT are set, then we only
|
|
|
|
|
* return a key if it is (at least) either a signing or a
|
2016-05-13 16:24:59 +02:00
|
|
|
|
* certification key.
|
|
|
|
|
*
|
2016-07-06 08:53:49 +02:00
|
|
|
|
* If REQ_USAGE is set, then we reject any keys that are not good
|
2016-05-13 16:24:59 +02:00
|
|
|
|
* (i.e., valid, not revoked, not expired, etc.). This allows the
|
|
|
|
|
* getkey functions to be used for plain key listings.
|
|
|
|
|
*
|
|
|
|
|
* Sets the matched key's user id field (pk->user_id) to the user id
|
2016-07-06 08:53:49 +02:00
|
|
|
|
* that matched the low-level search criteria or NULL.
|
|
|
|
|
*
|
|
|
|
|
* If R_FLAGS is not NULL set certain flags for more detailed error
|
|
|
|
|
* reporting. Used flags are:
|
|
|
|
|
*
|
2016-05-13 16:24:59 +02:00
|
|
|
|
* - LOOKUP_ALL_SUBKEYS_EXPIRED :: All Subkeys are expired or have
|
|
|
|
|
* been revoked.
|
2016-07-06 08:53:49 +02:00
|
|
|
|
* - LOOKUP_NOT_SELECTED :: No suitable key found
|
2016-05-13 16:24:59 +02:00
|
|
|
|
*
|
|
|
|
|
* This function needs to handle several different cases:
|
|
|
|
|
*
|
|
|
|
|
* 1. No requested usage and no primary key requested
|
|
|
|
|
* Examples for this case are that we have a keyID to be used
|
2018-10-24 21:56:18 +02:00
|
|
|
|
* for decryption or verification.
|
2016-05-13 16:24:59 +02:00
|
|
|
|
* 2. No usage but primary key requested
|
|
|
|
|
* This is the case for all functions which work on an
|
|
|
|
|
* entire keyblock, e.g. for editing or listing
|
|
|
|
|
* 3. Usage and primary key requested
|
|
|
|
|
* FIXME
|
|
|
|
|
* 4. Usage but no primary key requested
|
|
|
|
|
* FIXME
|
|
|
|
|
*
|
2015-09-16 14:01:48 +02:00
|
|
|
|
*/
|
2016-05-13 16:24:59 +02:00
|
|
|
|
static kbnode_t
|
2016-07-06 08:53:49 +02:00
|
|
|
|
finish_lookup (kbnode_t keyblock, unsigned int req_usage, int want_exact,
|
2017-09-26 04:02:05 +02:00
|
|
|
|
int want_secret, unsigned int *r_flags)
|
2003-06-05 09:14:21 +02:00
|
|
|
|
{
|
2016-05-13 16:24:59 +02:00
|
|
|
|
kbnode_t k;
|
2015-09-16 14:01:48 +02:00
|
|
|
|
|
2016-07-06 08:53:49 +02:00
|
|
|
|
/* If WANT_EXACT is set, the key or subkey that actually matched the
|
2015-09-16 14:01:48 +02:00
|
|
|
|
low-level search criteria. */
|
2016-05-13 16:24:59 +02:00
|
|
|
|
kbnode_t foundk = NULL;
|
2015-09-16 14:01:48 +02:00
|
|
|
|
/* The user id (if any) that matched the low-level search criteria. */
|
2010-01-09 20:00:46 +01:00
|
|
|
|
PKT_user_id *foundu = NULL;
|
2015-09-16 14:01:48 +02:00
|
|
|
|
|
2010-01-09 20:00:46 +01:00
|
|
|
|
u32 latest_date;
|
2016-05-13 16:24:59 +02:00
|
|
|
|
kbnode_t latest_key;
|
2016-01-08 15:16:12 +01:00
|
|
|
|
PKT_public_key *pk;
|
2016-07-06 08:53:49 +02:00
|
|
|
|
int req_prim;
|
|
|
|
|
u32 curtime = make_timestamp ();
|
2010-01-09 20:00:46 +01:00
|
|
|
|
|
2016-05-13 16:24:59 +02:00
|
|
|
|
if (r_flags)
|
|
|
|
|
*r_flags = 0;
|
|
|
|
|
|
2016-07-06 08:53:49 +02:00
|
|
|
|
#define USAGE_MASK (PUBKEY_USAGE_SIG|PUBKEY_USAGE_ENC|PUBKEY_USAGE_CERT)
|
|
|
|
|
req_usage &= USAGE_MASK;
|
|
|
|
|
|
|
|
|
|
/* Request the primary if we're certifying another key, and also if
|
2018-05-29 13:01:12 +02:00
|
|
|
|
* signing data while --pgp7 is on since pgp 7 do
|
2016-07-06 08:53:49 +02:00
|
|
|
|
* not understand signatures made by a signing subkey. PGP 8 does. */
|
|
|
|
|
req_prim = ((req_usage & PUBKEY_USAGE_CERT)
|
2018-05-29 13:01:12 +02:00
|
|
|
|
|| (PGP7 && (req_usage & PUBKEY_USAGE_SIG)));
|
2016-07-06 08:53:49 +02:00
|
|
|
|
|
|
|
|
|
|
|
|
|
|
log_assert (keyblock->pkt->pkttype == PKT_PUBLIC_KEY);
|
|
|
|
|
|
2016-05-13 16:24:59 +02:00
|
|
|
|
/* For an exact match mark the primary or subkey that matched the
|
2023-05-25 16:43:37 +02:00
|
|
|
|
* low-level search criteria. Use this loop also to sort our keys
|
|
|
|
|
* found using an ADSK fingerprint. */
|
|
|
|
|
for (k = keyblock; k; k = k->next)
|
2010-01-09 20:00:46 +01:00
|
|
|
|
{
|
2023-05-25 16:43:37 +02:00
|
|
|
|
if ((k->flag & 1) && (k->pkt->pkttype == PKT_PUBLIC_KEY
|
|
|
|
|
|| k->pkt->pkttype == PKT_PUBLIC_SUBKEY))
|
|
|
|
|
{
|
|
|
|
|
if (want_exact)
|
|
|
|
|
{
|
|
|
|
|
if (DBG_LOOKUP)
|
|
|
|
|
log_debug ("finish_lookup: exact search requested and found\n");
|
|
|
|
|
foundk = k;
|
2016-01-08 15:16:12 +01:00
|
|
|
|
pk = k->pkt->pkt.public_key;
|
|
|
|
|
pk->flags.exact = 1;
|
2023-05-25 16:43:37 +02:00
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
else if ((k->pkt->pkt.public_key->pubkey_usage == PUBKEY_USAGE_RENC))
|
|
|
|
|
{
|
|
|
|
|
if (DBG_LOOKUP)
|
|
|
|
|
log_debug ("finish_lookup: found via ADSK - not selected\n");
|
|
|
|
|
if (r_flags)
|
|
|
|
|
*r_flags |= LOOKUP_NOT_SELECTED;
|
|
|
|
|
return NULL; /* Not found. */
|
|
|
|
|
}
|
|
|
|
|
}
|
2010-01-09 20:00:46 +01:00
|
|
|
|
}
|
|
|
|
|
|
2015-09-16 14:01:48 +02:00
|
|
|
|
/* Get the user id that matched that low-level search criteria. */
|
2010-01-09 20:00:46 +01:00
|
|
|
|
for (k = keyblock; k; k = k->next)
|
|
|
|
|
{
|
|
|
|
|
if ((k->flag & 2))
|
|
|
|
|
{
|
2016-04-29 11:05:24 +02:00
|
|
|
|
log_assert (k->pkt->pkttype == PKT_USER_ID);
|
2010-01-09 20:00:46 +01:00
|
|
|
|
foundu = k->pkt->pkt.user_id;
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2015-04-06 13:27:26 +02:00
|
|
|
|
if (DBG_LOOKUP)
|
2010-01-09 20:00:46 +01:00
|
|
|
|
log_debug ("finish_lookup: checking key %08lX (%s)(req_usage=%x)\n",
|
|
|
|
|
(ulong) keyid_from_pk (keyblock->pkt->pkt.public_key, NULL),
|
|
|
|
|
foundk ? "one" : "all", req_usage);
|
|
|
|
|
|
|
|
|
|
if (!req_usage)
|
|
|
|
|
{
|
|
|
|
|
latest_key = foundk ? foundk : keyblock;
|
|
|
|
|
goto found;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
latest_date = 0;
|
|
|
|
|
latest_key = NULL;
|
2016-05-13 16:24:59 +02:00
|
|
|
|
/* Set LATEST_KEY to the latest (the one with the most recent
|
|
|
|
|
* timestamp) good (valid, not revoked, not expired, etc.) subkey.
|
|
|
|
|
*
|
|
|
|
|
* Don't bother if we are only looking for a primary key or we need
|
|
|
|
|
* an exact match and the exact match is not a subkey. */
|
2015-09-16 14:11:56 +02:00
|
|
|
|
if (req_prim || (foundk && foundk->pkt->pkttype != PKT_PUBLIC_SUBKEY))
|
|
|
|
|
;
|
|
|
|
|
else
|
2010-01-09 20:00:46 +01:00
|
|
|
|
{
|
2016-05-13 16:24:59 +02:00
|
|
|
|
kbnode_t nextk;
|
|
|
|
|
int n_subkeys = 0;
|
|
|
|
|
int n_revoked_or_expired = 0;
|
2020-01-17 08:03:53 +01:00
|
|
|
|
int last_secret_key_avail = 0;
|
2015-09-16 14:11:56 +02:00
|
|
|
|
|
2010-02-02 15:06:19 +01:00
|
|
|
|
/* Either start a loop or check just this one subkey. */
|
2010-01-09 20:00:46 +01:00
|
|
|
|
for (k = foundk ? foundk : keyblock; k; k = nextk)
|
|
|
|
|
{
|
2015-09-16 14:11:56 +02:00
|
|
|
|
if (foundk)
|
2016-05-13 16:24:59 +02:00
|
|
|
|
{
|
|
|
|
|
/* If FOUNDK is not NULL, then only consider that exact
|
|
|
|
|
key, i.e., don't iterate. */
|
|
|
|
|
nextk = NULL;
|
|
|
|
|
}
|
2015-09-16 14:11:56 +02:00
|
|
|
|
else
|
|
|
|
|
nextk = k->next;
|
|
|
|
|
|
2010-01-09 20:00:46 +01:00
|
|
|
|
if (k->pkt->pkttype != PKT_PUBLIC_SUBKEY)
|
|
|
|
|
continue;
|
2015-09-16 14:11:56 +02:00
|
|
|
|
|
2010-01-09 20:00:46 +01:00
|
|
|
|
pk = k->pkt->pkt.public_key;
|
2015-04-06 13:27:26 +02:00
|
|
|
|
if (DBG_LOOKUP)
|
2010-01-09 20:00:46 +01:00
|
|
|
|
log_debug ("\tchecking subkey %08lX\n",
|
|
|
|
|
(ulong) keyid_from_pk (pk, NULL));
|
2016-05-13 16:24:59 +02:00
|
|
|
|
|
2010-10-20 13:33:50 +02:00
|
|
|
|
if (!pk->flags.valid)
|
2010-01-09 20:00:46 +01:00
|
|
|
|
{
|
2015-04-06 13:27:26 +02:00
|
|
|
|
if (DBG_LOOKUP)
|
2010-01-09 20:00:46 +01:00
|
|
|
|
log_debug ("\tsubkey not valid\n");
|
|
|
|
|
continue;
|
|
|
|
|
}
|
2016-05-13 16:24:59 +02:00
|
|
|
|
if (!((pk->pubkey_usage & USAGE_MASK) & req_usage))
|
|
|
|
|
{
|
|
|
|
|
if (DBG_LOOKUP)
|
|
|
|
|
log_debug ("\tusage does not match: want=%x have=%x\n",
|
|
|
|
|
req_usage, pk->pubkey_usage);
|
|
|
|
|
continue;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
n_subkeys++;
|
2010-10-20 13:33:50 +02:00
|
|
|
|
if (pk->flags.revoked)
|
2010-01-09 20:00:46 +01:00
|
|
|
|
{
|
2015-04-06 13:27:26 +02:00
|
|
|
|
if (DBG_LOOKUP)
|
2010-01-09 20:00:46 +01:00
|
|
|
|
log_debug ("\tsubkey has been revoked\n");
|
2016-05-13 16:24:59 +02:00
|
|
|
|
n_revoked_or_expired++;
|
2010-01-09 20:00:46 +01:00
|
|
|
|
continue;
|
|
|
|
|
}
|
2023-05-09 08:17:30 +02:00
|
|
|
|
if (pk->has_expired && !opt.ignore_expiration)
|
2010-01-09 20:00:46 +01:00
|
|
|
|
{
|
2015-04-06 13:27:26 +02:00
|
|
|
|
if (DBG_LOOKUP)
|
2010-01-09 20:00:46 +01:00
|
|
|
|
log_debug ("\tsubkey has expired\n");
|
2016-05-13 16:24:59 +02:00
|
|
|
|
n_revoked_or_expired++;
|
2010-01-09 20:00:46 +01:00
|
|
|
|
continue;
|
|
|
|
|
}
|
|
|
|
|
if (pk->timestamp > curtime && !opt.ignore_valid_from)
|
|
|
|
|
{
|
2015-04-06 13:27:26 +02:00
|
|
|
|
if (DBG_LOOKUP)
|
2010-01-09 20:00:46 +01:00
|
|
|
|
log_debug ("\tsubkey not yet valid\n");
|
|
|
|
|
continue;
|
|
|
|
|
}
|
|
|
|
|
|
2020-01-17 08:03:53 +01:00
|
|
|
|
if (want_secret)
|
2017-09-26 04:02:05 +02:00
|
|
|
|
{
|
2020-01-17 08:03:53 +01:00
|
|
|
|
int secret_key_avail = agent_probe_secret_key (NULL, pk);
|
|
|
|
|
|
|
|
|
|
if (!secret_key_avail)
|
|
|
|
|
{
|
|
|
|
|
if (DBG_LOOKUP)
|
|
|
|
|
log_debug ("\tno secret key\n");
|
|
|
|
|
continue;
|
|
|
|
|
}
|
|
|
|
|
|
2024-01-02 10:13:16 +01:00
|
|
|
|
if (secret_key_avail < last_secret_key_avail)
|
|
|
|
|
{
|
|
|
|
|
if (DBG_LOOKUP)
|
|
|
|
|
log_debug ("\tskipping secret key with lower avail\n");
|
|
|
|
|
continue;
|
|
|
|
|
}
|
|
|
|
|
|
2020-01-17 08:03:53 +01:00
|
|
|
|
if (secret_key_avail > last_secret_key_avail)
|
|
|
|
|
{
|
|
|
|
|
/* Use this key. */
|
|
|
|
|
last_secret_key_avail = secret_key_avail;
|
|
|
|
|
latest_date = 0;
|
|
|
|
|
}
|
2017-09-26 04:02:05 +02:00
|
|
|
|
}
|
|
|
|
|
|
2015-04-06 13:27:26 +02:00
|
|
|
|
if (DBG_LOOKUP)
|
2010-01-09 20:00:46 +01:00
|
|
|
|
log_debug ("\tsubkey might be fine\n");
|
|
|
|
|
/* In case a key has a timestamp of 0 set, we make sure
|
|
|
|
|
that it is used. A better change would be to compare
|
|
|
|
|
">=" but that might also change the selected keys and
|
|
|
|
|
is as such a more intrusive change. */
|
|
|
|
|
if (pk->timestamp > latest_date || (!pk->timestamp && !latest_date))
|
|
|
|
|
{
|
|
|
|
|
latest_date = pk->timestamp;
|
|
|
|
|
latest_key = k;
|
|
|
|
|
}
|
|
|
|
|
}
|
2016-05-13 16:24:59 +02:00
|
|
|
|
if (n_subkeys == n_revoked_or_expired && r_flags)
|
|
|
|
|
*r_flags |= LOOKUP_ALL_SUBKEYS_EXPIRED;
|
2010-01-09 20:00:46 +01:00
|
|
|
|
}
|
|
|
|
|
|
2015-09-16 14:11:56 +02:00
|
|
|
|
/* Check if the primary key is ok (valid, not revoke, not expire,
|
2016-05-13 16:24:59 +02:00
|
|
|
|
* matches requested usage) if:
|
|
|
|
|
*
|
|
|
|
|
* - we didn't find an appropriate subkey and we're not doing an
|
|
|
|
|
* exact search,
|
|
|
|
|
*
|
|
|
|
|
* - we're doing an exact match and the exact match was the
|
|
|
|
|
* primary key, or,
|
|
|
|
|
*
|
|
|
|
|
* - we're just considering the primary key. */
|
2016-07-06 08:53:49 +02:00
|
|
|
|
if ((!latest_key && !want_exact) || foundk == keyblock || req_prim)
|
2010-01-09 20:00:46 +01:00
|
|
|
|
{
|
2015-04-06 13:27:26 +02:00
|
|
|
|
if (DBG_LOOKUP && !foundk && !req_prim)
|
2010-01-09 20:00:46 +01:00
|
|
|
|
log_debug ("\tno suitable subkeys found - trying primary\n");
|
|
|
|
|
pk = keyblock->pkt->pkt.public_key;
|
2010-10-20 13:33:50 +02:00
|
|
|
|
if (!pk->flags.valid)
|
2010-01-09 20:00:46 +01:00
|
|
|
|
{
|
2015-04-06 13:27:26 +02:00
|
|
|
|
if (DBG_LOOKUP)
|
2010-01-09 20:00:46 +01:00
|
|
|
|
log_debug ("\tprimary key not valid\n");
|
|
|
|
|
}
|
2016-05-13 16:24:59 +02:00
|
|
|
|
else if (!((pk->pubkey_usage & USAGE_MASK) & req_usage))
|
|
|
|
|
{
|
|
|
|
|
if (DBG_LOOKUP)
|
|
|
|
|
log_debug ("\tprimary key usage does not match: "
|
|
|
|
|
"want=%x have=%x\n", req_usage, pk->pubkey_usage);
|
|
|
|
|
}
|
2010-10-20 13:33:50 +02:00
|
|
|
|
else if (pk->flags.revoked)
|
2010-01-09 20:00:46 +01:00
|
|
|
|
{
|
2015-04-06 13:27:26 +02:00
|
|
|
|
if (DBG_LOOKUP)
|
2010-01-09 20:00:46 +01:00
|
|
|
|
log_debug ("\tprimary key has been revoked\n");
|
|
|
|
|
}
|
|
|
|
|
else if (pk->has_expired)
|
|
|
|
|
{
|
2015-04-06 13:27:26 +02:00
|
|
|
|
if (DBG_LOOKUP)
|
2010-01-09 20:00:46 +01:00
|
|
|
|
log_debug ("\tprimary key has expired\n");
|
|
|
|
|
}
|
|
|
|
|
else /* Okay. */
|
|
|
|
|
{
|
2015-04-06 13:27:26 +02:00
|
|
|
|
if (DBG_LOOKUP)
|
2010-01-09 20:00:46 +01:00
|
|
|
|
log_debug ("\tprimary key may be used\n");
|
|
|
|
|
latest_key = keyblock;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (!latest_key)
|
|
|
|
|
{
|
2015-04-06 13:27:26 +02:00
|
|
|
|
if (DBG_LOOKUP)
|
2010-01-09 20:00:46 +01:00
|
|
|
|
log_debug ("\tno suitable key found - giving up\n");
|
2016-07-06 08:53:49 +02:00
|
|
|
|
if (r_flags)
|
|
|
|
|
*r_flags |= LOOKUP_NOT_SELECTED;
|
2015-09-09 21:04:57 +02:00
|
|
|
|
return NULL; /* Not found. */
|
2010-01-09 20:00:46 +01:00
|
|
|
|
}
|
|
|
|
|
|
2016-07-06 08:53:49 +02:00
|
|
|
|
found:
|
2015-04-06 13:27:26 +02:00
|
|
|
|
if (DBG_LOOKUP)
|
2010-01-09 20:00:46 +01:00
|
|
|
|
log_debug ("\tusing key %08lX\n",
|
|
|
|
|
(ulong) keyid_from_pk (latest_key->pkt->pkt.public_key, NULL));
|
|
|
|
|
|
|
|
|
|
if (latest_key)
|
|
|
|
|
{
|
2016-01-08 15:16:12 +01:00
|
|
|
|
pk = latest_key->pkt->pkt.public_key;
|
2016-11-15 16:23:41 +01:00
|
|
|
|
free_user_id (pk->user_id);
|
2010-01-09 20:00:46 +01:00
|
|
|
|
pk->user_id = scopy_user_id (foundu);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (latest_key != keyblock && opt.verbose)
|
|
|
|
|
{
|
|
|
|
|
char *tempkeystr =
|
|
|
|
|
xstrdup (keystr_from_pk (latest_key->pkt->pkt.public_key));
|
|
|
|
|
log_info (_("using subkey %s instead of primary key %s\n"),
|
|
|
|
|
tempkeystr, keystr_from_pk (keyblock->pkt->pkt.public_key));
|
|
|
|
|
xfree (tempkeystr);
|
|
|
|
|
}
|
|
|
|
|
|
2019-04-13 11:48:58 +02:00
|
|
|
|
cache_put_keyblock (keyblock);
|
2010-01-09 20:00:46 +01:00
|
|
|
|
|
2015-09-09 21:04:57 +02:00
|
|
|
|
return latest_key ? latest_key : keyblock; /* Found. */
|
2003-06-05 09:14:21 +02:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
2016-05-13 16:24:59 +02:00
|
|
|
|
/* Print a KEY_CONSIDERED status line. */
|
|
|
|
|
static void
|
|
|
|
|
print_status_key_considered (kbnode_t keyblock, unsigned int flags)
|
|
|
|
|
{
|
|
|
|
|
char hexfpr[2*MAX_FINGERPRINT_LEN + 1];
|
|
|
|
|
kbnode_t node;
|
|
|
|
|
char flagbuf[20];
|
|
|
|
|
|
|
|
|
|
if (!is_status_enabled ())
|
|
|
|
|
return;
|
|
|
|
|
|
|
|
|
|
for (node=keyblock; node; node = node->next)
|
|
|
|
|
if (node->pkt->pkttype == PKT_PUBLIC_KEY
|
|
|
|
|
|| node->pkt->pkttype == PKT_SECRET_KEY)
|
|
|
|
|
break;
|
|
|
|
|
if (!node)
|
|
|
|
|
{
|
|
|
|
|
log_error ("%s: keyblock w/o primary key\n", __func__);
|
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
hexfingerprint (node->pkt->pkt.public_key, hexfpr, sizeof hexfpr);
|
|
|
|
|
snprintf (flagbuf, sizeof flagbuf, " %u", flags);
|
|
|
|
|
write_status_strings (STATUS_KEY_CONSIDERED, hexfpr, flagbuf, NULL);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
2015-09-16 14:01:48 +02:00
|
|
|
|
/* A high-level function to lookup keys.
|
2017-07-20 18:35:46 +02:00
|
|
|
|
*
|
|
|
|
|
* This function builds on top of the low-level keydb API. It first
|
|
|
|
|
* searches the database using the description stored in CTX->ITEMS,
|
|
|
|
|
* then it filters the results using CTX and, finally, if WANT_SECRET
|
|
|
|
|
* is set, it ignores any keys for which no secret key is available.
|
|
|
|
|
*
|
|
|
|
|
* Unlike the low-level search functions, this function also merges
|
|
|
|
|
* all of the self-signed data into the keys, subkeys and user id
|
|
|
|
|
* packets (see the merge_selfsigs for details).
|
|
|
|
|
*
|
|
|
|
|
* On success the key's keyblock is stored at *RET_KEYBLOCK, and the
|
|
|
|
|
* specific subkey is stored at *RET_FOUND_KEY. Note that we do not
|
|
|
|
|
* return a reference in *RET_FOUND_KEY, i.e. the result must not be
|
|
|
|
|
* freed using 'release_kbnode', and it is only valid until
|
|
|
|
|
* *RET_KEYBLOCK is deallocated. Therefore, if RET_FOUND_KEY is not
|
|
|
|
|
* NULL, then RET_KEYBLOCK must not be NULL. */
|
2003-06-05 09:14:21 +02:00
|
|
|
|
static int
|
2017-03-31 20:03:52 +02:00
|
|
|
|
lookup (ctrl_t ctrl, getkey_ctx_t ctx, int want_secret,
|
|
|
|
|
kbnode_t *ret_keyblock, kbnode_t *ret_found_key)
|
2003-06-05 09:14:21 +02:00
|
|
|
|
{
|
2010-01-09 20:00:46 +01:00
|
|
|
|
int rc;
|
|
|
|
|
int no_suitable_key = 0;
|
2015-09-09 20:04:32 +02:00
|
|
|
|
KBNODE keyblock = NULL;
|
2015-09-09 21:04:57 +02:00
|
|
|
|
KBNODE found_key = NULL;
|
2016-05-13 16:24:59 +02:00
|
|
|
|
unsigned int infoflags;
|
2010-01-09 20:00:46 +01:00
|
|
|
|
|
2016-11-15 15:11:39 +01:00
|
|
|
|
log_assert (ret_found_key == NULL || ret_keyblock != NULL);
|
2016-01-11 10:59:13 +01:00
|
|
|
|
if (ret_keyblock)
|
|
|
|
|
*ret_keyblock = NULL;
|
|
|
|
|
|
2015-02-23 16:37:57 +01:00
|
|
|
|
for (;;)
|
|
|
|
|
{
|
|
|
|
|
rc = keydb_search (ctx->kr_handle, ctx->items, ctx->nitems, NULL);
|
|
|
|
|
if (rc)
|
|
|
|
|
break;
|
|
|
|
|
|
2015-09-16 14:01:48 +02:00
|
|
|
|
/* If we are iterating over the entire database, then we need to
|
2017-07-20 18:35:46 +02:00
|
|
|
|
* change from KEYDB_SEARCH_MODE_FIRST, which does an implicit
|
|
|
|
|
* reset, to KEYDB_SEARCH_MODE_NEXT, which gets the next record. */
|
2010-01-09 20:00:46 +01:00
|
|
|
|
if (ctx->nitems && ctx->items->mode == KEYDB_SEARCH_MODE_FIRST)
|
|
|
|
|
ctx->items->mode = KEYDB_SEARCH_MODE_NEXT;
|
|
|
|
|
|
2015-09-09 20:04:32 +02:00
|
|
|
|
rc = keydb_get_keyblock (ctx->kr_handle, &keyblock);
|
2010-01-09 20:00:46 +01:00
|
|
|
|
if (rc)
|
|
|
|
|
{
|
2015-01-22 12:06:11 +01:00
|
|
|
|
log_error ("keydb_get_keyblock failed: %s\n", gpg_strerror (rc));
|
2010-01-09 20:00:46 +01:00
|
|
|
|
goto skip;
|
|
|
|
|
}
|
|
|
|
|
|
2017-07-20 17:41:49 +02:00
|
|
|
|
if (want_secret)
|
|
|
|
|
{
|
2021-05-19 02:32:19 +02:00
|
|
|
|
rc = agent_probe_any_secret_key (ctrl, keyblock);
|
2017-07-20 17:41:49 +02:00
|
|
|
|
if (gpg_err_code(rc) == GPG_ERR_NO_SECKEY)
|
|
|
|
|
goto skip; /* No secret key available. */
|
|
|
|
|
if (rc)
|
|
|
|
|
goto found; /* Unexpected error. */
|
|
|
|
|
}
|
2010-01-09 20:00:46 +01:00
|
|
|
|
|
|
|
|
|
/* Warning: node flag bits 0 and 1 should be preserved by
|
2016-07-06 08:53:49 +02:00
|
|
|
|
* merge_selfsigs. */
|
2017-03-31 20:03:52 +02:00
|
|
|
|
merge_selfsigs (ctrl, keyblock);
|
2016-07-06 08:53:49 +02:00
|
|
|
|
found_key = finish_lookup (keyblock, ctx->req_usage, ctx->exact,
|
2017-09-26 04:02:05 +02:00
|
|
|
|
want_secret, &infoflags);
|
2016-05-13 16:24:59 +02:00
|
|
|
|
print_status_key_considered (keyblock, infoflags);
|
2015-09-09 21:04:57 +02:00
|
|
|
|
if (found_key)
|
2010-01-09 20:00:46 +01:00
|
|
|
|
{
|
|
|
|
|
no_suitable_key = 0;
|
|
|
|
|
goto found;
|
|
|
|
|
}
|
|
|
|
|
else
|
2016-05-13 16:24:59 +02:00
|
|
|
|
{
|
|
|
|
|
no_suitable_key = 1;
|
|
|
|
|
}
|
2010-01-09 20:00:46 +01:00
|
|
|
|
|
|
|
|
|
skip:
|
|
|
|
|
/* Release resources and continue search. */
|
2015-09-09 20:04:32 +02:00
|
|
|
|
release_kbnode (keyblock);
|
|
|
|
|
keyblock = NULL;
|
2015-09-16 14:01:48 +02:00
|
|
|
|
/* The keyblock cache ignores the current "file position".
|
2017-07-20 18:35:46 +02:00
|
|
|
|
* Thus, if we request the next result and the cache matches
|
|
|
|
|
* (and it will since it is what we just looked for), we'll get
|
|
|
|
|
* the same entry back! We can avoid this infinite loop by
|
|
|
|
|
* disabling the cache. */
|
2015-07-31 12:02:08 +02:00
|
|
|
|
keydb_disable_caching (ctx->kr_handle);
|
2010-01-09 20:00:46 +01:00
|
|
|
|
}
|
2011-02-04 12:57:53 +01:00
|
|
|
|
|
2016-05-13 16:24:59 +02:00
|
|
|
|
found:
|
2015-11-17 14:38:03 +01:00
|
|
|
|
if (rc && gpg_err_code (rc) != GPG_ERR_NOT_FOUND)
|
2015-01-22 12:06:11 +01:00
|
|
|
|
log_error ("keydb_search failed: %s\n", gpg_strerror (rc));
|
2010-01-09 20:00:46 +01:00
|
|
|
|
|
|
|
|
|
if (!rc)
|
|
|
|
|
{
|
2016-01-11 10:59:13 +01:00
|
|
|
|
if (ret_keyblock)
|
2016-11-15 15:11:39 +01:00
|
|
|
|
{
|
|
|
|
|
*ret_keyblock = keyblock; /* Return the keyblock. */
|
|
|
|
|
keyblock = NULL;
|
|
|
|
|
}
|
2010-01-09 20:00:46 +01:00
|
|
|
|
}
|
2015-11-17 14:38:03 +01:00
|
|
|
|
else if (gpg_err_code (rc) == GPG_ERR_NOT_FOUND && no_suitable_key)
|
2015-01-22 12:06:11 +01:00
|
|
|
|
rc = want_secret? GPG_ERR_UNUSABLE_SECKEY : GPG_ERR_UNUSABLE_PUBKEY;
|
2011-04-29 15:07:11 +02:00
|
|
|
|
else if (gpg_err_code (rc) == GPG_ERR_NOT_FOUND)
|
2015-01-22 12:06:11 +01:00
|
|
|
|
rc = want_secret? GPG_ERR_NO_SECKEY : GPG_ERR_NO_PUBKEY;
|
2010-01-09 20:00:46 +01:00
|
|
|
|
|
2015-09-09 20:04:32 +02:00
|
|
|
|
release_kbnode (keyblock);
|
2010-01-09 20:00:46 +01:00
|
|
|
|
|
2015-09-09 21:04:57 +02:00
|
|
|
|
if (ret_found_key)
|
|
|
|
|
{
|
|
|
|
|
if (! rc)
|
|
|
|
|
*ret_found_key = found_key;
|
|
|
|
|
else
|
|
|
|
|
*ret_found_key = NULL;
|
|
|
|
|
}
|
|
|
|
|
|
2010-01-09 20:00:46 +01:00
|
|
|
|
return rc;
|
2003-06-05 09:14:21 +02:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
2021-04-12 17:50:17 +02:00
|
|
|
|
/* If a default key has been specified, return that key. If a card
|
|
|
|
|
* based key is also available as indicated by FPR_CARD not being
|
|
|
|
|
* NULL, return that key if suitable. */
|
2017-05-22 02:27:36 +02:00
|
|
|
|
gpg_error_t
|
|
|
|
|
get_seckey_default_or_card (ctrl_t ctrl, PKT_public_key *pk,
|
|
|
|
|
const byte *fpr_card, size_t fpr_len)
|
|
|
|
|
{
|
|
|
|
|
gpg_error_t err;
|
|
|
|
|
strlist_t namelist = NULL;
|
2021-04-12 17:50:17 +02:00
|
|
|
|
const char *def_secret_key;
|
2017-05-22 02:27:36 +02:00
|
|
|
|
|
2021-04-12 17:50:17 +02:00
|
|
|
|
def_secret_key = parse_def_secret_key (ctrl);
|
2017-05-22 02:27:36 +02:00
|
|
|
|
|
|
|
|
|
if (def_secret_key)
|
|
|
|
|
add_to_strlist (&namelist, def_secret_key);
|
|
|
|
|
else if (fpr_card)
|
2020-02-19 03:02:55 +01:00
|
|
|
|
{
|
2021-04-12 17:50:17 +02:00
|
|
|
|
err = get_pubkey_byfprint (ctrl, pk, NULL, fpr_card, fpr_len);
|
2021-04-16 20:21:23 +02:00
|
|
|
|
if (gpg_err_code (err) == GPG_ERR_NO_PUBKEY)
|
|
|
|
|
{
|
|
|
|
|
if (opt.debug)
|
|
|
|
|
log_debug ("using LDAP to find public key for current card\n");
|
|
|
|
|
err = keyserver_import_fprint (ctrl, fpr_card, fpr_len,
|
|
|
|
|
opt.keyserver,
|
|
|
|
|
KEYSERVER_IMPORT_FLAG_LDAP);
|
|
|
|
|
if (!err)
|
|
|
|
|
err = get_pubkey_byfprint (ctrl, pk, NULL, fpr_card, fpr_len);
|
|
|
|
|
else if (gpg_err_code (err) == GPG_ERR_NO_DATA
|
|
|
|
|
|| gpg_err_code (err) == GPG_ERR_NO_KEYSERVER)
|
|
|
|
|
{
|
|
|
|
|
/* Dirmngr returns NO DATA is the selected keyserver
|
|
|
|
|
* does not have the requested key. It returns NO
|
|
|
|
|
* KEYSERVER if no LDAP keyservers are configured. */
|
|
|
|
|
err = gpg_error (GPG_ERR_NO_PUBKEY);
|
|
|
|
|
}
|
|
|
|
|
}
|
2020-02-19 03:02:55 +01:00
|
|
|
|
|
|
|
|
|
/* The key on card can be not suitable for requested usage. */
|
2021-04-12 17:50:17 +02:00
|
|
|
|
if (gpg_err_code (err) == GPG_ERR_UNUSABLE_PUBKEY)
|
2020-02-19 03:02:55 +01:00
|
|
|
|
fpr_card = NULL; /* Fallthrough as no card. */
|
|
|
|
|
else
|
2021-04-12 17:50:17 +02:00
|
|
|
|
return err; /* Success or other error. */
|
2020-02-19 03:02:55 +01:00
|
|
|
|
}
|
2017-05-22 02:27:36 +02:00
|
|
|
|
|
2021-04-12 17:50:17 +02:00
|
|
|
|
if (!fpr_card || (def_secret_key && *def_secret_key
|
|
|
|
|
&& def_secret_key[strlen (def_secret_key)-1] == '!'))
|
|
|
|
|
{
|
|
|
|
|
err = key_byname (ctrl, NULL, namelist, pk, 1, 0, NULL, NULL);
|
|
|
|
|
}
|
2017-05-22 02:27:36 +02:00
|
|
|
|
else
|
|
|
|
|
{ /* Default key is specified and card key is also available. */
|
|
|
|
|
kbnode_t k, keyblock = NULL;
|
|
|
|
|
|
|
|
|
|
err = key_byname (ctrl, NULL, namelist, pk, 1, 0, &keyblock, NULL);
|
2021-04-12 17:50:17 +02:00
|
|
|
|
if (err)
|
|
|
|
|
goto leave;
|
|
|
|
|
for (k = keyblock; k; k = k->next)
|
|
|
|
|
{
|
|
|
|
|
PKT_public_key *pk_candidate;
|
|
|
|
|
char fpr[MAX_FINGERPRINT_LEN];
|
|
|
|
|
|
|
|
|
|
if (k->pkt->pkttype != PKT_PUBLIC_KEY
|
|
|
|
|
&&k->pkt->pkttype != PKT_PUBLIC_SUBKEY)
|
|
|
|
|
continue;
|
|
|
|
|
|
|
|
|
|
pk_candidate = k->pkt->pkt.public_key;
|
|
|
|
|
if (!pk_candidate->flags.valid)
|
|
|
|
|
continue;
|
|
|
|
|
if (!((pk_candidate->pubkey_usage & USAGE_MASK) & pk->req_usage))
|
|
|
|
|
continue;
|
|
|
|
|
fingerprint_from_pk (pk_candidate, fpr, NULL);
|
|
|
|
|
if (!memcmp (fpr_card, fpr, fpr_len))
|
|
|
|
|
{
|
|
|
|
|
release_public_key_parts (pk);
|
|
|
|
|
copy_public_key (pk, pk_candidate);
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
}
|
2017-05-22 02:27:36 +02:00
|
|
|
|
release_kbnode (keyblock);
|
|
|
|
|
}
|
|
|
|
|
|
2021-04-12 17:50:17 +02:00
|
|
|
|
leave:
|
2017-05-22 02:27:36 +02:00
|
|
|
|
free_strlist (namelist);
|
|
|
|
|
return err;
|
|
|
|
|
}
|
2021-04-12 17:50:17 +02:00
|
|
|
|
|
|
|
|
|
|
2010-10-13 17:57:08 +02:00
|
|
|
|
|
2003-06-05 09:14:21 +02:00
|
|
|
|
/*********************************************
|
2010-01-09 20:00:46 +01:00
|
|
|
|
*********** User ID printing helpers *******
|
2003-06-05 09:14:21 +02:00
|
|
|
|
*********************************************/
|
|
|
|
|
|
2010-01-09 20:00:46 +01:00
|
|
|
|
/* Return a string with a printable representation of the user_id.
|
2018-04-12 17:53:17 +02:00
|
|
|
|
* this string must be freed by xfree. If R_NOUID is not NULL it is
|
|
|
|
|
* set to true if a user id was not found; otherwise to false. */
|
2014-10-13 14:54:26 +02:00
|
|
|
|
static char *
|
2019-07-11 05:32:44 +02:00
|
|
|
|
get_user_id_string (ctrl_t ctrl, u32 * keyid, int mode)
|
2003-06-05 09:14:21 +02:00
|
|
|
|
{
|
2019-07-11 05:32:44 +02:00
|
|
|
|
char *name;
|
|
|
|
|
unsigned int namelen;
|
2015-04-06 18:57:05 +02:00
|
|
|
|
char *p;
|
|
|
|
|
|
2019-04-13 11:48:58 +02:00
|
|
|
|
log_assert (mode != 2);
|
2018-04-12 17:53:17 +02:00
|
|
|
|
|
2019-07-11 05:32:44 +02:00
|
|
|
|
name = cache_get_uid_bykid (keyid, &namelen);
|
|
|
|
|
if (!name)
|
2006-04-19 13:26:11 +02:00
|
|
|
|
{
|
2019-07-11 05:32:44 +02:00
|
|
|
|
/* Get it so that the cache will be filled. */
|
|
|
|
|
if (!get_pubkey (ctrl, NULL, keyid))
|
|
|
|
|
name = cache_get_uid_bykid (keyid, &namelen);
|
2010-01-09 20:00:46 +01:00
|
|
|
|
}
|
2015-04-06 18:57:05 +02:00
|
|
|
|
|
2019-07-11 05:32:44 +02:00
|
|
|
|
if (name)
|
|
|
|
|
{
|
|
|
|
|
if (mode)
|
|
|
|
|
p = xasprintf ("%08lX%08lX %.*s",
|
|
|
|
|
(ulong) keyid[0], (ulong) keyid[1], namelen, name);
|
|
|
|
|
else
|
|
|
|
|
p = xasprintf ("%s %.*s", keystr (keyid), namelen, name);
|
|
|
|
|
|
|
|
|
|
xfree (name);
|
|
|
|
|
}
|
2015-04-06 18:57:05 +02:00
|
|
|
|
else
|
2019-07-11 05:32:44 +02:00
|
|
|
|
{
|
|
|
|
|
if (mode)
|
|
|
|
|
p = xasprintf ("%08lX%08lX [?]", (ulong) keyid[0], (ulong) keyid[1]);
|
|
|
|
|
else
|
|
|
|
|
p = xasprintf ("%s [?]", keystr (keyid));
|
|
|
|
|
}
|
2015-04-06 18:57:05 +02:00
|
|
|
|
|
|
|
|
|
return p;
|
2003-06-05 09:14:21 +02:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
2010-01-09 20:00:46 +01:00
|
|
|
|
char *
|
2017-03-31 20:03:52 +02:00
|
|
|
|
get_user_id_string_native (ctrl_t ctrl, u32 * keyid)
|
2003-06-05 09:14:21 +02:00
|
|
|
|
{
|
2019-07-11 05:32:44 +02:00
|
|
|
|
char *p = get_user_id_string (ctrl, keyid, 0);
|
2010-01-09 20:00:46 +01:00
|
|
|
|
char *p2 = utf8_to_native (p, strlen (p), 0);
|
|
|
|
|
xfree (p);
|
2006-04-19 13:26:11 +02:00
|
|
|
|
return p2;
|
2003-06-05 09:14:21 +02:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
2010-01-09 20:00:46 +01:00
|
|
|
|
char *
|
2017-03-31 20:03:52 +02:00
|
|
|
|
get_long_user_id_string (ctrl_t ctrl, u32 * keyid)
|
2003-06-05 09:14:21 +02:00
|
|
|
|
{
|
2019-07-11 05:32:44 +02:00
|
|
|
|
return get_user_id_string (ctrl, keyid, 1);
|
2003-06-05 09:14:21 +02:00
|
|
|
|
}
|
|
|
|
|
|
2014-10-13 14:54:26 +02:00
|
|
|
|
|
2015-04-06 18:57:05 +02:00
|
|
|
|
/* Please try to use get_user_byfpr instead of this one. */
|
2010-01-09 20:00:46 +01:00
|
|
|
|
char *
|
2018-04-12 17:53:17 +02:00
|
|
|
|
get_user_id (ctrl_t ctrl, u32 *keyid, size_t *rn, int *r_nouid)
|
2003-06-05 09:14:21 +02:00
|
|
|
|
{
|
2019-04-13 11:48:58 +02:00
|
|
|
|
char *name;
|
|
|
|
|
unsigned int namelen;
|
|
|
|
|
|
|
|
|
|
if (r_nouid)
|
|
|
|
|
*r_nouid = 0;
|
|
|
|
|
|
|
|
|
|
name = cache_get_uid_bykid (keyid, &namelen);
|
|
|
|
|
if (!name)
|
|
|
|
|
{
|
|
|
|
|
/* Get it so that the cache will be filled. */
|
|
|
|
|
if (!get_pubkey (ctrl, NULL, keyid))
|
|
|
|
|
name = cache_get_uid_bykid (keyid, &namelen);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (!name)
|
|
|
|
|
{
|
|
|
|
|
name = xstrdup (user_id_not_found_utf8 ());
|
|
|
|
|
namelen = strlen (name);
|
|
|
|
|
if (r_nouid)
|
|
|
|
|
*r_nouid = 1;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (rn && name)
|
|
|
|
|
*rn = namelen;
|
|
|
|
|
return name;
|
2003-06-05 09:14:21 +02:00
|
|
|
|
}
|
|
|
|
|
|
2015-04-06 18:57:05 +02:00
|
|
|
|
|
2014-10-13 14:54:26 +02:00
|
|
|
|
/* Please try to use get_user_id_byfpr_native instead of this one. */
|
2010-01-09 20:00:46 +01:00
|
|
|
|
char *
|
2017-03-31 20:03:52 +02:00
|
|
|
|
get_user_id_native (ctrl_t ctrl, u32 *keyid)
|
2003-06-05 09:14:21 +02:00
|
|
|
|
{
|
2006-04-19 13:26:11 +02:00
|
|
|
|
size_t rn;
|
2018-04-12 17:53:17 +02:00
|
|
|
|
char *p = get_user_id (ctrl, keyid, &rn, NULL);
|
2010-01-09 20:00:46 +01:00
|
|
|
|
char *p2 = utf8_to_native (p, rn, 0);
|
|
|
|
|
xfree (p);
|
2006-04-19 13:26:11 +02:00
|
|
|
|
return p2;
|
2003-06-05 09:14:21 +02:00
|
|
|
|
}
|
|
|
|
|
|
2014-10-13 14:54:26 +02:00
|
|
|
|
|
2015-09-16 14:01:48 +02:00
|
|
|
|
/* Return the user id for a key designated by its fingerprint, FPR,
|
|
|
|
|
which must be MAX_FINGERPRINT_LEN bytes in size. Note: the
|
|
|
|
|
returned string, which must be freed using xfree, may not be NUL
|
|
|
|
|
terminated. To determine the length of the string, you must use
|
|
|
|
|
*RN. */
|
2019-04-05 17:02:43 +02:00
|
|
|
|
static char *
|
|
|
|
|
get_user_id_byfpr (ctrl_t ctrl, const byte *fpr, size_t fprlen, size_t *rn)
|
2014-10-13 14:54:26 +02:00
|
|
|
|
{
|
2019-07-11 05:32:44 +02:00
|
|
|
|
char *name;
|
2014-10-13 14:54:26 +02:00
|
|
|
|
|
2019-07-11 05:32:44 +02:00
|
|
|
|
name = cache_get_uid_byfpr (fpr, fprlen, rn);
|
|
|
|
|
if (!name)
|
2014-10-13 14:54:26 +02:00
|
|
|
|
{
|
2019-07-11 05:32:44 +02:00
|
|
|
|
/* Get it so that the cache will be filled. */
|
|
|
|
|
if (!get_pubkey_byfprint (ctrl, NULL, NULL, fpr, fprlen))
|
|
|
|
|
name = cache_get_uid_byfpr (fpr, fprlen, rn);
|
2014-10-13 14:54:26 +02:00
|
|
|
|
}
|
2019-07-11 05:32:44 +02:00
|
|
|
|
|
|
|
|
|
if (!name)
|
|
|
|
|
{
|
|
|
|
|
name = xstrdup (user_id_not_found_utf8 ());
|
|
|
|
|
*rn = strlen (name);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return name;
|
2014-10-13 14:54:26 +02:00
|
|
|
|
}
|
|
|
|
|
|
2015-09-16 14:01:48 +02:00
|
|
|
|
/* Like get_user_id_byfpr, but convert the string to the native
|
|
|
|
|
encoding. The returned string needs to be freed. Unlike
|
|
|
|
|
get_user_id_byfpr, the returned string is NUL terminated. */
|
2014-10-13 14:54:26 +02:00
|
|
|
|
char *
|
2019-04-05 17:02:43 +02:00
|
|
|
|
get_user_id_byfpr_native (ctrl_t ctrl, const byte *fpr, size_t fprlen)
|
2014-10-13 14:54:26 +02:00
|
|
|
|
{
|
|
|
|
|
size_t rn;
|
2019-04-05 17:02:43 +02:00
|
|
|
|
char *p = get_user_id_byfpr (ctrl, fpr, fprlen, &rn);
|
2014-10-13 14:54:26 +02:00
|
|
|
|
char *p2 = utf8_to_native (p, rn, 0);
|
|
|
|
|
xfree (p);
|
|
|
|
|
return p2;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
2016-01-11 11:41:49 +01:00
|
|
|
|
/* Return the database handle used by this context. The context still
|
|
|
|
|
owns the handle. */
|
2003-06-05 09:14:21 +02:00
|
|
|
|
KEYDB_HANDLE
|
2010-01-09 20:00:46 +01:00
|
|
|
|
get_ctx_handle (GETKEY_CTX ctx)
|
2003-06-05 09:14:21 +02:00
|
|
|
|
{
|
|
|
|
|
return ctx->kr_handle;
|
|
|
|
|
}
|
2006-04-19 13:26:11 +02:00
|
|
|
|
|
|
|
|
|
static void
|
2010-01-09 20:00:46 +01:00
|
|
|
|
free_akl (struct akl *akl)
|
2006-04-19 13:26:11 +02:00
|
|
|
|
{
|
2015-07-16 09:57:27 +02:00
|
|
|
|
if (! akl)
|
|
|
|
|
return;
|
|
|
|
|
|
2010-01-09 20:00:46 +01:00
|
|
|
|
if (akl->spec)
|
|
|
|
|
free_keyserver_spec (akl->spec);
|
2006-04-19 13:26:11 +02:00
|
|
|
|
|
2010-01-09 20:00:46 +01:00
|
|
|
|
xfree (akl);
|
2006-04-19 13:26:11 +02:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
void
|
2010-01-09 20:00:46 +01:00
|
|
|
|
release_akl (void)
|
2006-04-19 13:26:11 +02:00
|
|
|
|
{
|
2010-01-09 20:00:46 +01:00
|
|
|
|
while (opt.auto_key_locate)
|
2006-04-19 13:26:11 +02:00
|
|
|
|
{
|
2010-01-09 20:00:46 +01:00
|
|
|
|
struct akl *akl2 = opt.auto_key_locate;
|
|
|
|
|
opt.auto_key_locate = opt.auto_key_locate->next;
|
|
|
|
|
free_akl (akl2);
|
2006-04-19 13:26:11 +02:00
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2019-08-23 13:22:15 +02:00
|
|
|
|
|
|
|
|
|
/* Returns true if the AKL is empty or has only the local method
|
|
|
|
|
* active. */
|
|
|
|
|
int
|
|
|
|
|
akl_empty_or_only_local (void)
|
|
|
|
|
{
|
|
|
|
|
struct akl *akl;
|
|
|
|
|
int any = 0;
|
|
|
|
|
|
|
|
|
|
for (akl = opt.auto_key_locate; akl; akl = akl->next)
|
|
|
|
|
if (akl->type != AKL_NODEFAULT && akl->type != AKL_LOCAL)
|
|
|
|
|
{
|
|
|
|
|
any = 1;
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return !any;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
2008-04-08 13:04:16 +02:00
|
|
|
|
/* Returns false on error. */
|
2006-04-19 13:26:11 +02:00
|
|
|
|
int
|
2017-08-04 21:58:46 +02:00
|
|
|
|
parse_auto_key_locate (const char *options_arg)
|
2006-04-19 13:26:11 +02:00
|
|
|
|
{
|
|
|
|
|
char *tok;
|
2017-08-04 22:46:40 +02:00
|
|
|
|
char *options, *options_buf;
|
2006-04-19 13:26:11 +02:00
|
|
|
|
|
2017-08-04 22:46:40 +02:00
|
|
|
|
options = options_buf = xstrdup (options_arg);
|
2010-01-09 20:00:46 +01:00
|
|
|
|
while ((tok = optsep (&options)))
|
2006-04-19 13:26:11 +02:00
|
|
|
|
{
|
2010-01-09 20:00:46 +01:00
|
|
|
|
struct akl *akl, *check, *last = NULL;
|
|
|
|
|
int dupe = 0;
|
2006-04-19 13:26:11 +02:00
|
|
|
|
|
2010-01-09 20:00:46 +01:00
|
|
|
|
if (tok[0] == '\0')
|
2006-04-19 13:26:11 +02:00
|
|
|
|
continue;
|
|
|
|
|
|
2010-01-09 20:00:46 +01:00
|
|
|
|
akl = xmalloc_clear (sizeof (*akl));
|
2006-04-19 13:26:11 +02:00
|
|
|
|
|
2014-03-17 15:36:15 +01:00
|
|
|
|
if (ascii_strcasecmp (tok, "clear") == 0)
|
|
|
|
|
{
|
|
|
|
|
xfree (akl);
|
|
|
|
|
free_akl (opt.auto_key_locate);
|
|
|
|
|
opt.auto_key_locate = NULL;
|
|
|
|
|
continue;
|
|
|
|
|
}
|
|
|
|
|
else if (ascii_strcasecmp (tok, "nodefault") == 0)
|
2010-01-09 20:00:46 +01:00
|
|
|
|
akl->type = AKL_NODEFAULT;
|
|
|
|
|
else if (ascii_strcasecmp (tok, "local") == 0)
|
|
|
|
|
akl->type = AKL_LOCAL;
|
|
|
|
|
else if (ascii_strcasecmp (tok, "ldap") == 0)
|
|
|
|
|
akl->type = AKL_LDAP;
|
|
|
|
|
else if (ascii_strcasecmp (tok, "keyserver") == 0)
|
|
|
|
|
akl->type = AKL_KEYSERVER;
|
|
|
|
|
else if (ascii_strcasecmp (tok, "cert") == 0)
|
|
|
|
|
akl->type = AKL_CERT;
|
|
|
|
|
else if (ascii_strcasecmp (tok, "pka") == 0)
|
|
|
|
|
akl->type = AKL_PKA;
|
2015-10-06 20:31:43 +02:00
|
|
|
|
else if (ascii_strcasecmp (tok, "dane") == 0)
|
|
|
|
|
akl->type = AKL_DANE;
|
2016-04-27 08:34:29 +02:00
|
|
|
|
else if (ascii_strcasecmp (tok, "wkd") == 0)
|
|
|
|
|
akl->type = AKL_WKD;
|
2020-12-17 18:18:52 +01:00
|
|
|
|
else if (ascii_strcasecmp (tok, "ntds") == 0)
|
|
|
|
|
akl->type = AKL_NTDS;
|
2015-01-05 15:07:23 +01:00
|
|
|
|
else if ((akl->spec = parse_keyserver_uri (tok, 1)))
|
2010-01-09 20:00:46 +01:00
|
|
|
|
akl->type = AKL_SPEC;
|
2006-04-19 13:26:11 +02:00
|
|
|
|
else
|
|
|
|
|
{
|
2010-01-09 20:00:46 +01:00
|
|
|
|
free_akl (akl);
|
2017-08-04 22:46:40 +02:00
|
|
|
|
xfree (options_buf);
|
2006-04-19 13:26:11 +02:00
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* We must maintain the order the user gave us */
|
2010-01-09 20:00:46 +01:00
|
|
|
|
for (check = opt.auto_key_locate; check;
|
|
|
|
|
last = check, check = check->next)
|
2006-04-19 13:26:11 +02:00
|
|
|
|
{
|
|
|
|
|
/* Check for duplicates */
|
2010-01-09 20:00:46 +01:00
|
|
|
|
if (check->type == akl->type
|
|
|
|
|
&& (akl->type != AKL_SPEC
|
|
|
|
|
|| (akl->type == AKL_SPEC
|
|
|
|
|
&& strcmp (check->spec->uri, akl->spec->uri) == 0)))
|
2006-04-19 13:26:11 +02:00
|
|
|
|
{
|
2010-01-09 20:00:46 +01:00
|
|
|
|
dupe = 1;
|
|
|
|
|
free_akl (akl);
|
2006-04-19 13:26:11 +02:00
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2010-01-09 20:00:46 +01:00
|
|
|
|
if (!dupe)
|
2006-04-19 13:26:11 +02:00
|
|
|
|
{
|
2010-01-09 20:00:46 +01:00
|
|
|
|
if (last)
|
|
|
|
|
last->next = akl;
|
2006-04-19 13:26:11 +02:00
|
|
|
|
else
|
2010-01-09 20:00:46 +01:00
|
|
|
|
opt.auto_key_locate = akl;
|
2006-04-19 13:26:11 +02:00
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2017-08-04 22:46:40 +02:00
|
|
|
|
xfree (options_buf);
|
2006-04-19 13:26:11 +02:00
|
|
|
|
return 1;
|
|
|
|
|
}
|
2010-02-02 15:06:19 +01:00
|
|
|
|
|
|
|
|
|
|
2017-07-20 17:27:48 +02:00
|
|
|
|
|
|
|
|
|
/* The list of key origins. */
|
|
|
|
|
static struct {
|
|
|
|
|
const char *name;
|
|
|
|
|
int origin;
|
|
|
|
|
} key_origin_list[] =
|
|
|
|
|
{
|
2017-07-13 17:28:32 +02:00
|
|
|
|
{ "self", KEYORG_SELF },
|
|
|
|
|
{ "file", KEYORG_FILE },
|
|
|
|
|
{ "url", KEYORG_URL },
|
|
|
|
|
{ "wkd", KEYORG_WKD },
|
|
|
|
|
{ "dane", KEYORG_DANE },
|
|
|
|
|
{ "ks-pref", KEYORG_KS_PREF },
|
|
|
|
|
{ "ks", KEYORG_KS },
|
|
|
|
|
{ "unknown", KEYORG_UNKNOWN }
|
|
|
|
|
};
|
2017-07-20 17:27:48 +02:00
|
|
|
|
|
|
|
|
|
/* Parse the argument for --key-origin. Return false on error. */
|
|
|
|
|
int
|
|
|
|
|
parse_key_origin (char *string)
|
|
|
|
|
{
|
2017-07-13 17:28:32 +02:00
|
|
|
|
int i;
|
2017-07-24 21:07:03 +02:00
|
|
|
|
char *comma;
|
|
|
|
|
|
|
|
|
|
comma = strchr (string, ',');
|
|
|
|
|
if (comma)
|
|
|
|
|
*comma = 0;
|
2017-07-13 17:28:32 +02:00
|
|
|
|
|
|
|
|
|
if (!ascii_strcasecmp (string, "help"))
|
|
|
|
|
{
|
|
|
|
|
log_info (_("valid values for option '%s':\n"), "--key-origin");
|
2017-07-20 17:27:48 +02:00
|
|
|
|
for (i=0; i < DIM (key_origin_list); i++)
|
|
|
|
|
log_info (" %s\n", key_origin_list[i].name);
|
2017-07-13 17:28:32 +02:00
|
|
|
|
g10_exit (1);
|
|
|
|
|
}
|
|
|
|
|
|
2017-07-20 17:27:48 +02:00
|
|
|
|
for (i=0; i < DIM (key_origin_list); i++)
|
|
|
|
|
if (!ascii_strcasecmp (string, key_origin_list[i].name))
|
2017-07-13 17:28:32 +02:00
|
|
|
|
{
|
2017-07-20 17:27:48 +02:00
|
|
|
|
opt.key_origin = key_origin_list[i].origin;
|
2017-07-24 21:07:03 +02:00
|
|
|
|
xfree (opt.key_origin_url);
|
|
|
|
|
opt.key_origin_url = NULL;
|
|
|
|
|
if (comma && comma[1])
|
|
|
|
|
{
|
|
|
|
|
opt.key_origin_url = xstrdup (comma+1);
|
|
|
|
|
trim_spaces (opt.key_origin_url);
|
|
|
|
|
}
|
|
|
|
|
|
2017-07-13 17:28:32 +02:00
|
|
|
|
return 1;
|
|
|
|
|
}
|
|
|
|
|
|
2017-07-24 21:07:03 +02:00
|
|
|
|
if (comma)
|
|
|
|
|
*comma = ',';
|
2017-07-13 17:28:32 +02:00
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
2017-07-20 17:27:48 +02:00
|
|
|
|
/* Return a string or "?" for the key ORIGIN. */
|
|
|
|
|
const char *
|
|
|
|
|
key_origin_string (int origin)
|
|
|
|
|
{
|
|
|
|
|
int i;
|
2017-07-13 17:28:32 +02:00
|
|
|
|
|
2017-07-20 17:27:48 +02:00
|
|
|
|
for (i=0; i < DIM (key_origin_list); i++)
|
|
|
|
|
if (key_origin_list[i].origin == origin)
|
|
|
|
|
return key_origin_list[i].name;
|
|
|
|
|
return "?";
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
2015-12-03 12:18:32 +01:00
|
|
|
|
/* Returns true if a secret key is available for the public key with
|
|
|
|
|
key id KEYID; returns false if not. This function ignores legacy
|
|
|
|
|
keys. Note: this is just a fast check and does not tell us whether
|
|
|
|
|
the secret key is valid; this check merely indicates whether there
|
|
|
|
|
is some secret key with the specified key id. */
|
2010-04-21 18:26:17 +02:00
|
|
|
|
int
|
2019-09-09 14:34:09 +02:00
|
|
|
|
have_secret_key_with_kid (ctrl_t ctrl, u32 *keyid)
|
2010-04-21 18:26:17 +02:00
|
|
|
|
{
|
|
|
|
|
gpg_error_t err;
|
|
|
|
|
KEYDB_HANDLE kdbhd;
|
|
|
|
|
KEYDB_SEARCH_DESC desc;
|
|
|
|
|
kbnode_t keyblock;
|
|
|
|
|
kbnode_t node;
|
|
|
|
|
int result = 0;
|
|
|
|
|
|
2019-09-09 14:34:09 +02:00
|
|
|
|
kdbhd = keydb_new (ctrl);
|
2015-12-03 12:18:32 +01:00
|
|
|
|
if (!kdbhd)
|
|
|
|
|
return 0;
|
2010-04-21 18:26:17 +02:00
|
|
|
|
memset (&desc, 0, sizeof desc);
|
|
|
|
|
desc.mode = KEYDB_SEARCH_MODE_LONG_KID;
|
|
|
|
|
desc.u.kid[0] = keyid[0];
|
|
|
|
|
desc.u.kid[1] = keyid[1];
|
2015-08-04 12:28:17 +02:00
|
|
|
|
while (!result)
|
2010-04-21 18:26:17 +02:00
|
|
|
|
{
|
2015-08-04 12:28:17 +02:00
|
|
|
|
err = keydb_search (kdbhd, &desc, 1, NULL);
|
|
|
|
|
if (err)
|
|
|
|
|
break;
|
|
|
|
|
|
2010-04-21 18:26:17 +02:00
|
|
|
|
err = keydb_get_keyblock (kdbhd, &keyblock);
|
|
|
|
|
if (err)
|
|
|
|
|
{
|
2015-01-22 12:06:11 +01:00
|
|
|
|
log_error (_("error reading keyblock: %s\n"), gpg_strerror (err));
|
2010-04-21 18:26:17 +02:00
|
|
|
|
break;
|
|
|
|
|
}
|
2010-02-02 15:06:19 +01:00
|
|
|
|
|
2010-04-21 18:26:17 +02:00
|
|
|
|
for (node = keyblock; node; node = node->next)
|
|
|
|
|
{
|
|
|
|
|
/* Bit 0 of the flags is set if the search found the key
|
2015-09-15 15:21:17 +02:00
|
|
|
|
using that key or subkey. Note: a search will only ever
|
|
|
|
|
match a single key or subkey. */
|
2010-04-21 18:26:17 +02:00
|
|
|
|
if ((node->flag & 1))
|
|
|
|
|
{
|
2016-04-29 11:05:24 +02:00
|
|
|
|
log_assert (node->pkt->pkttype == PKT_PUBLIC_KEY
|
|
|
|
|
|| node->pkt->pkttype == PKT_PUBLIC_SUBKEY);
|
2010-04-21 18:26:17 +02:00
|
|
|
|
|
2020-01-17 07:11:02 +01:00
|
|
|
|
if (agent_probe_secret_key (NULL, node->pkt->pkt.public_key))
|
2015-12-03 12:18:32 +01:00
|
|
|
|
result = 1; /* Secret key available. */
|
2015-09-15 15:21:17 +02:00
|
|
|
|
else
|
|
|
|
|
result = 0;
|
|
|
|
|
|
|
|
|
|
break;
|
2010-04-21 18:26:17 +02:00
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
release_kbnode (keyblock);
|
|
|
|
|
}
|
2015-08-04 12:28:17 +02:00
|
|
|
|
|
2010-04-21 18:26:17 +02:00
|
|
|
|
keydb_release (kdbhd);
|
|
|
|
|
return result;
|
2010-02-02 15:06:19 +01:00
|
|
|
|
}
|