1998-01-16 21:15:24 +00:00
|
|
|
/* import.c
|
2001-03-08 14:33:24 +00:00
|
|
|
* Copyright (C) 1998, 1999, 2000, 2001 Free Software Foundation, Inc.
|
1998-01-16 21:15:24 +00:00
|
|
|
*
|
1998-12-08 12:20:53 +00:00
|
|
|
* This file is part of GnuPG.
|
1998-01-16 21:15:24 +00:00
|
|
|
*
|
1998-12-08 12:20:53 +00:00
|
|
|
* GnuPG is free software; you can redistribute it and/or modify
|
1998-01-16 21:15:24 +00:00
|
|
|
* it under the terms of the GNU General Public License as published by
|
|
|
|
* the Free Software Foundation; either version 2 of the License, or
|
|
|
|
* (at your option) any later version.
|
|
|
|
*
|
1998-12-08 12:20:53 +00:00
|
|
|
* GnuPG is distributed in the hope that it will be useful,
|
1998-01-16 21:15:24 +00:00
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU General Public License
|
|
|
|
* along with this program; if not, write to the Free Software
|
|
|
|
* Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA
|
|
|
|
*/
|
|
|
|
|
|
|
|
#include <config.h>
|
|
|
|
#include <stdio.h>
|
|
|
|
#include <stdlib.h>
|
|
|
|
#include <string.h>
|
|
|
|
#include <errno.h>
|
|
|
|
#include <assert.h>
|
|
|
|
|
|
|
|
#include "options.h"
|
|
|
|
#include "packet.h"
|
|
|
|
#include "errors.h"
|
|
|
|
#include "keydb.h"
|
|
|
|
#include "memory.h"
|
|
|
|
#include "util.h"
|
|
|
|
#include "trustdb.h"
|
1998-02-16 20:05:02 +00:00
|
|
|
#include "main.h"
|
1998-07-08 09:29:43 +00:00
|
|
|
#include "i18n.h"
|
1999-07-14 17:47:23 +00:00
|
|
|
#include "status.h"
|
2002-03-07 19:44:57 +00:00
|
|
|
#include "keyserver-internal.h"
|
1998-02-16 20:05:02 +00:00
|
|
|
|
2001-09-19 14:25:05 +00:00
|
|
|
struct stats_s {
|
1999-10-04 19:27:02 +00:00
|
|
|
ulong count;
|
1998-10-25 19:00:01 +00:00
|
|
|
ulong no_user_id;
|
|
|
|
ulong imported;
|
|
|
|
ulong imported_rsa;
|
|
|
|
ulong n_uids;
|
|
|
|
ulong n_sigs;
|
|
|
|
ulong n_subk;
|
|
|
|
ulong unchanged;
|
|
|
|
ulong n_revoc;
|
|
|
|
ulong secret_read;
|
|
|
|
ulong secret_imported;
|
|
|
|
ulong secret_dups;
|
2000-07-27 15:33:37 +00:00
|
|
|
ulong skipped_new_keys;
|
2001-09-19 14:25:05 +00:00
|
|
|
};
|
1998-10-25 19:00:01 +00:00
|
|
|
|
|
|
|
|
2001-09-19 14:25:05 +00:00
|
|
|
static int import( IOBUF inp, int fast, const char* fname,
|
2001-09-25 15:20:59 +00:00
|
|
|
struct stats_s *stats );
|
1999-02-19 14:54:00 +00:00
|
|
|
static int read_block( IOBUF a, PACKET **pending_pkt, KBNODE *ret_root );
|
2002-03-07 19:44:57 +00:00
|
|
|
static void revocation_present(KBNODE keyblock);
|
2001-03-05 13:59:16 +00:00
|
|
|
static void remove_bad_stuff (KBNODE keyblock);
|
2001-09-19 14:25:05 +00:00
|
|
|
static int import_one( const char *fname, KBNODE keyblock, int fast,
|
|
|
|
struct stats_s *stats);
|
|
|
|
static int import_secret_one( const char *fname, KBNODE keyblock,
|
2001-09-25 15:20:59 +00:00
|
|
|
struct stats_s *stats );
|
2001-09-19 14:25:05 +00:00
|
|
|
static int import_revoke_cert( const char *fname, KBNODE node,
|
|
|
|
struct stats_s *stats);
|
1998-02-16 20:05:02 +00:00
|
|
|
static int chk_self_sigs( const char *fname, KBNODE keyblock,
|
1998-06-29 12:30:57 +00:00
|
|
|
PKT_public_key *pk, u32 *keyid );
|
1998-02-16 20:05:02 +00:00
|
|
|
static int delete_inv_parts( const char *fname, KBNODE keyblock, u32 *keyid );
|
1998-02-17 20:48:52 +00:00
|
|
|
static int merge_blocks( const char *fname, KBNODE keyblock_orig,
|
1998-05-26 13:38:00 +00:00
|
|
|
KBNODE keyblock, u32 *keyid,
|
|
|
|
int *n_uids, int *n_sigs, int *n_subk );
|
1998-02-17 20:48:52 +00:00
|
|
|
static int append_uid( KBNODE keyblock, KBNODE node, int *n_sigs,
|
|
|
|
const char *fname, u32 *keyid );
|
1998-12-08 12:20:53 +00:00
|
|
|
static int append_key( KBNODE keyblock, KBNODE node, int *n_sigs,
|
|
|
|
const char *fname, u32 *keyid );
|
1998-02-17 20:48:52 +00:00
|
|
|
static int merge_sigs( KBNODE dst, KBNODE src, int *n_sigs,
|
|
|
|
const char *fname, u32 *keyid );
|
1998-12-08 12:20:53 +00:00
|
|
|
static int merge_keysigs( KBNODE dst, KBNODE src, int *n_sigs,
|
|
|
|
const char *fname, u32 *keyid );
|
1998-01-16 21:15:24 +00:00
|
|
|
|
|
|
|
|
2001-09-19 14:25:05 +00:00
|
|
|
void *
|
|
|
|
import_new_stats_handle (void)
|
|
|
|
{
|
|
|
|
return m_alloc_clear ( sizeof (struct stats_s) );
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
import_release_stats_handle (void *p)
|
|
|
|
{
|
|
|
|
m_free (p);
|
|
|
|
}
|
|
|
|
|
1998-01-16 21:15:24 +00:00
|
|
|
/****************
|
1998-02-13 20:58:50 +00:00
|
|
|
* Import the public keys from the given filename. Input may be armored.
|
1998-04-14 17:51:16 +00:00
|
|
|
* This function rejects all keys which are not validly self signed on at
|
1998-02-13 20:58:50 +00:00
|
|
|
* least one userid. Only user ids which are self signed will be imported.
|
1998-04-14 17:51:16 +00:00
|
|
|
* Other signatures are not checked.
|
1998-02-13 20:58:50 +00:00
|
|
|
*
|
1998-10-25 19:00:01 +00:00
|
|
|
* Actually this function does a merge. It works like this:
|
1998-02-13 20:58:50 +00:00
|
|
|
*
|
|
|
|
* - get the keyblock
|
1998-02-16 20:05:02 +00:00
|
|
|
* - check self-signatures and remove all userids and their signatures
|
1998-02-13 20:58:50 +00:00
|
|
|
* without/invalid self-signatures.
|
|
|
|
* - reject the keyblock, if we have no valid userid.
|
1998-04-14 17:51:16 +00:00
|
|
|
* - See whether we have this key already in one of our pubrings.
|
1998-02-13 20:58:50 +00:00
|
|
|
* If not, simply add it to the default keyring.
|
|
|
|
* - Compare the key and the self-signatures of the new and the one in
|
1998-04-14 17:51:16 +00:00
|
|
|
* our keyring. If they are different something weird is going on;
|
1998-02-13 20:58:50 +00:00
|
|
|
* ask what to do.
|
1998-04-14 17:51:16 +00:00
|
|
|
* - See whether we have only non-self-signature on one user id; if not
|
1998-02-13 20:58:50 +00:00
|
|
|
* ask the user what to do.
|
|
|
|
* - compare the signatures: If we already have this signature, check
|
1998-02-16 20:05:02 +00:00
|
|
|
* that they compare okay; if not, issue a warning and ask the user.
|
1998-04-14 17:51:16 +00:00
|
|
|
* (consider looking at the timestamp and use the newest?)
|
1998-02-13 20:58:50 +00:00
|
|
|
* - Simply add the signature. Can't verify here because we may not have
|
1998-04-14 17:51:16 +00:00
|
|
|
* the signature's public key yet; verification is done when putting it
|
1998-02-13 20:58:50 +00:00
|
|
|
* into the trustdb, which is done automagically as soon as this pubkey
|
|
|
|
* is used.
|
|
|
|
* - Proceed with next signature.
|
1998-01-16 21:15:24 +00:00
|
|
|
*
|
1998-04-14 17:51:16 +00:00
|
|
|
* Key revocation certificates have special handling.
|
1998-02-18 13:58:46 +00:00
|
|
|
*
|
1998-01-16 21:15:24 +00:00
|
|
|
*/
|
1999-10-04 19:27:02 +00:00
|
|
|
void
|
2001-09-19 14:25:05 +00:00
|
|
|
import_keys( char **fnames, int nnames, int fast, void *stats_handle )
|
1999-01-16 08:29:29 +00:00
|
|
|
{
|
1999-10-04 19:27:02 +00:00
|
|
|
int i;
|
2001-09-19 14:25:05 +00:00
|
|
|
struct stats_s *stats = stats_handle;
|
1999-01-16 08:29:29 +00:00
|
|
|
|
2001-09-19 14:25:05 +00:00
|
|
|
if (!stats)
|
|
|
|
stats = import_new_stats_handle ();
|
1999-01-16 08:29:29 +00:00
|
|
|
|
2000-02-15 07:51:01 +00:00
|
|
|
if( !fnames && !nnames )
|
|
|
|
nnames = 1; /* Ohh what a ugly hack to jump into the loop */
|
|
|
|
|
1999-10-04 19:27:02 +00:00
|
|
|
for(i=0; i < nnames; i++ ) {
|
|
|
|
const char *fname = fnames? fnames[i] : NULL;
|
|
|
|
IOBUF inp = iobuf_open(fname);
|
|
|
|
if( !fname )
|
|
|
|
fname = "[stdin]";
|
|
|
|
if( !inp )
|
|
|
|
log_error(_("can't open `%s': %s\n"), fname, strerror(errno) );
|
|
|
|
else {
|
2001-09-25 15:20:59 +00:00
|
|
|
int rc = import( inp, fast, fname, stats );
|
1999-10-04 19:27:02 +00:00
|
|
|
iobuf_close(inp);
|
|
|
|
if( rc )
|
|
|
|
log_error("import from `%s' failed: %s\n", fname,
|
|
|
|
g10_errstr(rc) );
|
|
|
|
}
|
|
|
|
if( !fname )
|
|
|
|
break;
|
|
|
|
}
|
2001-09-19 14:25:05 +00:00
|
|
|
if (!stats_handle) {
|
|
|
|
import_print_stats (stats);
|
|
|
|
import_release_stats_handle (stats);
|
|
|
|
}
|
2001-09-24 16:03:14 +00:00
|
|
|
|
1999-01-16 08:29:29 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
int
|
2001-09-19 14:25:05 +00:00
|
|
|
import_keys_stream( IOBUF inp, int fast, void *stats_handle )
|
1999-01-16 08:29:29 +00:00
|
|
|
{
|
1999-10-04 19:27:02 +00:00
|
|
|
int rc = 0;
|
2001-09-19 14:25:05 +00:00
|
|
|
struct stats_s *stats = stats_handle;
|
|
|
|
|
|
|
|
if (!stats)
|
|
|
|
stats = import_new_stats_handle ();
|
1999-10-04 19:27:02 +00:00
|
|
|
|
2001-09-25 15:20:59 +00:00
|
|
|
rc = import( inp, fast, "[stream]", stats);
|
2001-09-19 14:25:05 +00:00
|
|
|
if (!stats_handle) {
|
|
|
|
import_print_stats (stats);
|
|
|
|
import_release_stats_handle (stats);
|
|
|
|
}
|
2001-09-24 16:03:14 +00:00
|
|
|
|
1999-10-04 19:27:02 +00:00
|
|
|
return rc;
|
1999-01-16 08:29:29 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
2001-09-25 15:20:59 +00:00
|
|
|
import( IOBUF inp, int fast, const char* fname, struct stats_s *stats )
|
1998-02-16 20:05:02 +00:00
|
|
|
{
|
|
|
|
PACKET *pending_pkt = NULL;
|
|
|
|
KBNODE keyblock;
|
|
|
|
int rc = 0;
|
1998-10-25 19:00:01 +00:00
|
|
|
|
1998-12-23 12:41:40 +00:00
|
|
|
getkey_disable_caches();
|
|
|
|
|
1999-02-19 14:54:00 +00:00
|
|
|
if( !opt.no_armor ) { /* armored reading is not disabled */
|
|
|
|
armor_filter_context_t *afx = m_alloc_clear( sizeof *afx );
|
|
|
|
afx->only_keyblocks = 1;
|
|
|
|
iobuf_push_filter2( inp, armor_filter, afx, 1 );
|
|
|
|
}
|
1998-02-16 20:05:02 +00:00
|
|
|
|
1999-02-19 14:54:00 +00:00
|
|
|
while( !(rc = read_block( inp, &pending_pkt, &keyblock) )) {
|
2001-03-05 13:59:16 +00:00
|
|
|
remove_bad_stuff (keyblock);
|
1998-06-29 12:30:57 +00:00
|
|
|
if( keyblock->pkt->pkttype == PKT_PUBLIC_KEY )
|
2001-09-19 14:25:05 +00:00
|
|
|
rc = import_one( fname, keyblock, fast, stats );
|
2000-12-07 10:55:10 +00:00
|
|
|
else if( keyblock->pkt->pkttype == PKT_SECRET_KEY )
|
2001-09-25 15:20:59 +00:00
|
|
|
rc = import_secret_one( fname, keyblock, stats );
|
1998-02-18 13:58:46 +00:00
|
|
|
else if( keyblock->pkt->pkttype == PKT_SIGNATURE
|
|
|
|
&& keyblock->pkt->pkt.signature->sig_class == 0x20 )
|
2001-09-19 14:25:05 +00:00
|
|
|
rc = import_revoke_cert( fname, keyblock, stats );
|
1998-07-08 09:29:43 +00:00
|
|
|
else {
|
1999-05-22 20:54:54 +00:00
|
|
|
log_info( _("skipping block of type %d\n"),
|
1998-07-08 09:29:43 +00:00
|
|
|
keyblock->pkt->pkttype );
|
|
|
|
}
|
1998-02-16 20:05:02 +00:00
|
|
|
release_kbnode(keyblock);
|
|
|
|
if( rc )
|
|
|
|
break;
|
2001-09-19 14:25:05 +00:00
|
|
|
if( !(++stats->count % 100) && !opt.quiet )
|
|
|
|
log_info(_("%lu keys so far processed\n"), stats->count );
|
1998-02-16 20:05:02 +00:00
|
|
|
}
|
|
|
|
if( rc == -1 )
|
|
|
|
rc = 0;
|
1998-07-06 10:23:57 +00:00
|
|
|
else if( rc && rc != G10ERR_INV_KEYRING )
|
1999-05-22 20:54:54 +00:00
|
|
|
log_error( _("error reading `%s': %s\n"), fname, g10_errstr(rc));
|
1998-02-16 20:05:02 +00:00
|
|
|
|
1999-10-04 19:27:02 +00:00
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2001-09-19 14:25:05 +00:00
|
|
|
void
|
|
|
|
import_print_stats (void *hd)
|
1999-10-04 19:27:02 +00:00
|
|
|
{
|
2001-09-19 14:25:05 +00:00
|
|
|
struct stats_s *stats = hd;
|
|
|
|
|
1999-04-18 08:18:52 +00:00
|
|
|
if( !opt.quiet ) {
|
2001-09-19 14:25:05 +00:00
|
|
|
log_info(_("Total number processed: %lu\n"), stats->count );
|
|
|
|
if( stats->skipped_new_keys )
|
2000-07-27 15:33:37 +00:00
|
|
|
log_info(_(" skipped new keys: %lu\n"),
|
2001-09-19 14:25:05 +00:00
|
|
|
stats->skipped_new_keys );
|
|
|
|
if( stats->no_user_id )
|
|
|
|
log_info(_(" w/o user IDs: %lu\n"), stats->no_user_id );
|
|
|
|
if( stats->imported || stats->imported_rsa ) {
|
|
|
|
log_info(_(" imported: %lu"), stats->imported );
|
|
|
|
if( stats->imported_rsa )
|
|
|
|
fprintf(stderr, " (RSA: %lu)", stats->imported_rsa );
|
1999-04-18 08:18:52 +00:00
|
|
|
putc('\n', stderr);
|
|
|
|
}
|
2001-09-19 14:25:05 +00:00
|
|
|
if( stats->unchanged )
|
|
|
|
log_info(_(" unchanged: %lu\n"), stats->unchanged );
|
|
|
|
if( stats->n_uids )
|
|
|
|
log_info(_(" new user IDs: %lu\n"), stats->n_uids );
|
|
|
|
if( stats->n_subk )
|
|
|
|
log_info(_(" new subkeys: %lu\n"), stats->n_subk );
|
|
|
|
if( stats->n_sigs )
|
|
|
|
log_info(_(" new signatures: %lu\n"), stats->n_sigs );
|
|
|
|
if( stats->n_revoc )
|
|
|
|
log_info(_(" new key revocations: %lu\n"), stats->n_revoc );
|
|
|
|
if( stats->secret_read )
|
|
|
|
log_info(_(" secret keys read: %lu\n"), stats->secret_read );
|
|
|
|
if( stats->secret_imported )
|
|
|
|
log_info(_(" secret keys imported: %lu\n"), stats->secret_imported );
|
|
|
|
if( stats->secret_dups )
|
|
|
|
log_info(_(" secret keys unchanged: %lu\n"), stats->secret_dups );
|
1998-10-25 19:00:01 +00:00
|
|
|
}
|
|
|
|
|
1999-07-14 17:47:23 +00:00
|
|
|
if( is_status_enabled() ) {
|
2000-07-27 15:33:37 +00:00
|
|
|
char buf[13*20];
|
|
|
|
sprintf(buf, "%lu %lu %lu %lu %lu %lu %lu %lu %lu %lu %lu %lu %lu",
|
2001-09-19 14:25:05 +00:00
|
|
|
stats->count,
|
|
|
|
stats->no_user_id,
|
|
|
|
stats->imported,
|
|
|
|
stats->imported_rsa,
|
|
|
|
stats->unchanged,
|
|
|
|
stats->n_uids,
|
|
|
|
stats->n_subk,
|
|
|
|
stats->n_sigs,
|
|
|
|
stats->n_revoc,
|
|
|
|
stats->secret_read,
|
|
|
|
stats->secret_imported,
|
|
|
|
stats->secret_dups,
|
|
|
|
stats->skipped_new_keys );
|
1999-07-14 17:47:23 +00:00
|
|
|
write_status_text( STATUS_IMPORT_RES, buf );
|
|
|
|
}
|
1998-02-16 20:05:02 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/****************
|
1999-02-19 14:54:00 +00:00
|
|
|
* Read the next keyblock from stream A.
|
|
|
|
* PENDING_PKT should be initialzed to NULL
|
1998-02-16 20:05:02 +00:00
|
|
|
* and not chnaged form the caller.
|
|
|
|
* Retunr: 0 = okay, -1 no more blocks or another errorcode.
|
|
|
|
*/
|
|
|
|
static int
|
1999-02-19 14:54:00 +00:00
|
|
|
read_block( IOBUF a, PACKET **pending_pkt, KBNODE *ret_root )
|
1998-01-16 21:15:24 +00:00
|
|
|
{
|
1998-02-16 20:05:02 +00:00
|
|
|
int rc;
|
|
|
|
PACKET *pkt;
|
|
|
|
KBNODE root = NULL;
|
1998-02-17 20:48:52 +00:00
|
|
|
int in_cert;
|
1998-02-16 20:05:02 +00:00
|
|
|
|
|
|
|
if( *pending_pkt ) {
|
|
|
|
root = new_kbnode( *pending_pkt );
|
|
|
|
*pending_pkt = NULL;
|
1998-02-17 20:48:52 +00:00
|
|
|
in_cert = 1;
|
1998-02-16 20:05:02 +00:00
|
|
|
}
|
1998-02-17 20:48:52 +00:00
|
|
|
else
|
|
|
|
in_cert = 0;
|
1998-02-16 20:05:02 +00:00
|
|
|
pkt = m_alloc( sizeof *pkt );
|
|
|
|
init_packet(pkt);
|
|
|
|
while( (rc=parse_packet(a, pkt)) != -1 ) {
|
|
|
|
if( rc ) { /* ignore errors */
|
1998-07-02 19:31:46 +00:00
|
|
|
if( rc != G10ERR_UNKNOWN_PACKET ) {
|
1998-02-16 20:05:02 +00:00
|
|
|
log_error("read_block: read error: %s\n", g10_errstr(rc) );
|
|
|
|
rc = G10ERR_INV_KEYRING;
|
|
|
|
goto ready;
|
|
|
|
}
|
|
|
|
free_packet( pkt );
|
|
|
|
init_packet(pkt);
|
|
|
|
continue;
|
|
|
|
}
|
1998-02-18 13:58:46 +00:00
|
|
|
|
|
|
|
if( !root && pkt->pkttype == PKT_SIGNATURE
|
|
|
|
&& pkt->pkt.signature->sig_class == 0x20 ) {
|
|
|
|
/* this is a revocation certificate which is handled
|
|
|
|
* in a special way */
|
|
|
|
root = new_kbnode( pkt );
|
|
|
|
pkt = NULL;
|
|
|
|
goto ready;
|
|
|
|
}
|
|
|
|
|
1998-02-16 20:05:02 +00:00
|
|
|
/* make a linked list of all packets */
|
|
|
|
switch( pkt->pkttype ) {
|
|
|
|
case PKT_COMPRESSED:
|
1998-05-15 18:49:19 +00:00
|
|
|
if( pkt->pkt.compressed->algorithm < 1
|
|
|
|
|| pkt->pkt.compressed->algorithm > 2 ) {
|
1998-02-16 20:05:02 +00:00
|
|
|
rc = G10ERR_COMPR_ALGO;
|
|
|
|
goto ready;
|
|
|
|
}
|
1999-02-19 14:54:00 +00:00
|
|
|
{
|
|
|
|
compress_filter_context_t *cfx = m_alloc_clear( sizeof *cfx );
|
|
|
|
cfx->algo = pkt->pkt.compressed->algorithm;
|
|
|
|
pkt->pkt.compressed->buf = NULL;
|
|
|
|
iobuf_push_filter2( a, compress_filter, cfx, 1 );
|
|
|
|
}
|
1998-02-16 20:05:02 +00:00
|
|
|
free_packet( pkt );
|
|
|
|
init_packet(pkt);
|
|
|
|
break;
|
|
|
|
|
2001-09-25 15:20:59 +00:00
|
|
|
case PKT_RING_TRUST:
|
|
|
|
/* skip those packets */
|
|
|
|
free_packet( pkt );
|
|
|
|
init_packet(pkt);
|
|
|
|
break;
|
1998-02-17 20:48:52 +00:00
|
|
|
|
1998-06-29 12:30:57 +00:00
|
|
|
case PKT_PUBLIC_KEY:
|
|
|
|
case PKT_SECRET_KEY:
|
1998-02-16 20:05:02 +00:00
|
|
|
if( in_cert ) { /* store this packet */
|
|
|
|
*pending_pkt = pkt;
|
|
|
|
pkt = NULL;
|
|
|
|
goto ready;
|
|
|
|
}
|
|
|
|
in_cert = 1;
|
|
|
|
default:
|
1998-02-17 20:48:52 +00:00
|
|
|
if( in_cert ) {
|
|
|
|
if( !root )
|
|
|
|
root = new_kbnode( pkt );
|
|
|
|
else
|
|
|
|
add_kbnode( root, new_kbnode( pkt ) );
|
|
|
|
pkt = m_alloc( sizeof *pkt );
|
|
|
|
}
|
1998-02-16 20:05:02 +00:00
|
|
|
init_packet(pkt);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
ready:
|
|
|
|
if( rc == -1 && root )
|
|
|
|
rc = 0;
|
|
|
|
|
|
|
|
if( rc )
|
|
|
|
release_kbnode( root );
|
|
|
|
else
|
|
|
|
*ret_root = root;
|
|
|
|
free_packet( pkt );
|
|
|
|
m_free( pkt );
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2001-03-05 13:59:16 +00:00
|
|
|
static void
|
|
|
|
remove_bad_stuff (KBNODE keyblock)
|
|
|
|
{
|
|
|
|
KBNODE node;
|
|
|
|
|
|
|
|
for (node=keyblock; node; node = node->next ) {
|
|
|
|
if( node->pkt->pkttype == PKT_SIGNATURE ) {
|
2001-09-25 15:20:59 +00:00
|
|
|
/* delete the subpackets we used to use for the
|
|
|
|
verification cache */
|
2001-08-09 09:34:25 +00:00
|
|
|
delete_sig_subpkt (node->pkt->pkt.signature->unhashed,
|
2001-03-05 13:59:16 +00:00
|
|
|
SIGSUBPKT_PRIV_VERIFY_CACHE);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
1998-02-16 20:05:02 +00:00
|
|
|
/****************
|
|
|
|
* Try to import one keyblock. Return an error only in serious cases, but
|
|
|
|
* never for an invalid keyblock. It uses log_error to increase the
|
|
|
|
* internal errorcount, so that invalid input can be detected by programs
|
|
|
|
* which called g10.
|
|
|
|
*/
|
|
|
|
static int
|
2001-09-19 14:25:05 +00:00
|
|
|
import_one( const char *fname, KBNODE keyblock, int fast,
|
|
|
|
struct stats_s *stats )
|
1998-02-16 20:05:02 +00:00
|
|
|
{
|
1998-06-29 12:30:57 +00:00
|
|
|
PKT_public_key *pk;
|
|
|
|
PKT_public_key *pk_orig;
|
1998-02-16 20:05:02 +00:00
|
|
|
KBNODE node, uidnode;
|
1998-02-17 20:48:52 +00:00
|
|
|
KBNODE keyblock_orig = NULL;
|
1998-02-16 20:05:02 +00:00
|
|
|
u32 keyid[2];
|
|
|
|
int rc = 0;
|
1998-08-11 17:29:34 +00:00
|
|
|
int new_key = 0;
|
1998-09-29 16:15:15 +00:00
|
|
|
int mod_key = 0;
|
1998-02-16 20:05:02 +00:00
|
|
|
|
1998-04-14 17:51:16 +00:00
|
|
|
/* get the key and print some info about it */
|
1998-06-29 12:30:57 +00:00
|
|
|
node = find_kbnode( keyblock, PKT_PUBLIC_KEY );
|
|
|
|
if( !node )
|
|
|
|
BUG();
|
1998-02-16 20:05:02 +00:00
|
|
|
|
1998-06-29 12:30:57 +00:00
|
|
|
pk = node->pkt->pkt.public_key;
|
|
|
|
keyid_from_pk( pk, keyid );
|
1998-02-16 20:05:02 +00:00
|
|
|
uidnode = find_next_kbnode( keyblock, PKT_USER_ID );
|
|
|
|
|
|
|
|
if( opt.verbose ) {
|
1999-05-22 20:54:54 +00:00
|
|
|
log_info( "pub %4u%c/%08lX %s ",
|
1998-06-29 12:30:57 +00:00
|
|
|
nbits_from_pk( pk ),
|
|
|
|
pubkey_letter( pk->pubkey_algo ),
|
|
|
|
(ulong)keyid[1], datestr_from_pk(pk) );
|
1998-02-16 20:05:02 +00:00
|
|
|
if( uidnode )
|
2000-03-22 12:45:04 +00:00
|
|
|
print_utf8_string( stderr, uidnode->pkt->pkt.user_id->name,
|
|
|
|
uidnode->pkt->pkt.user_id->len );
|
1998-02-16 20:05:02 +00:00
|
|
|
putc('\n', stderr);
|
|
|
|
}
|
|
|
|
if( !uidnode ) {
|
1999-09-01 13:40:07 +00:00
|
|
|
log_error( _("key %08lX: no user ID\n"), (ulong)keyid[1]);
|
1998-02-16 20:05:02 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
clear_kbnode_flags( keyblock );
|
1998-06-29 12:30:57 +00:00
|
|
|
rc = chk_self_sigs( fname, keyblock , pk, keyid );
|
1998-02-16 20:05:02 +00:00
|
|
|
if( rc )
|
|
|
|
return rc== -1? 0:rc;
|
1998-02-17 20:48:52 +00:00
|
|
|
|
2002-03-17 23:47:32 +00:00
|
|
|
/* If we allow such a thing, mark unsigned uids as valid */
|
1999-07-22 18:11:55 +00:00
|
|
|
if( opt.allow_non_selfsigned_uid )
|
2002-03-17 23:47:32 +00:00
|
|
|
for( node=keyblock; node; node = node->next )
|
|
|
|
if( node->pkt->pkttype == PKT_USER_ID && !(node->flag & 1) )
|
|
|
|
{
|
|
|
|
char *user=utf8_to_native(node->pkt->pkt.user_id->name,
|
|
|
|
node->pkt->pkt.user_id->len,0);
|
|
|
|
node->flag |= 1;
|
|
|
|
log_info( _("key %08lX: accepted non self-signed user ID '%s'\n"),
|
|
|
|
(ulong)keyid[1],user);
|
|
|
|
m_free(user);
|
|
|
|
}
|
1999-07-22 18:11:55 +00:00
|
|
|
|
1998-02-16 20:05:02 +00:00
|
|
|
if( !delete_inv_parts( fname, keyblock, keyid ) ) {
|
1998-10-25 19:00:01 +00:00
|
|
|
if( !opt.quiet ) {
|
1999-09-01 13:40:07 +00:00
|
|
|
log_info( _("key %08lX: no valid user IDs\n"),
|
1998-10-25 19:00:01 +00:00
|
|
|
(ulong)keyid[1]);
|
|
|
|
log_info(_("this may be caused by a missing self-signature\n"));
|
|
|
|
}
|
2001-09-19 14:25:05 +00:00
|
|
|
stats->no_user_id++;
|
1998-02-16 20:05:02 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
1998-09-29 16:15:15 +00:00
|
|
|
|
1998-02-16 20:05:02 +00:00
|
|
|
/* do we have this key already in one of our pubrings ? */
|
1998-06-29 12:30:57 +00:00
|
|
|
pk_orig = m_alloc_clear( sizeof *pk_orig );
|
|
|
|
rc = get_pubkey( pk_orig, keyid );
|
2001-03-03 16:17:55 +00:00
|
|
|
if( rc && rc != G10ERR_NO_PUBKEY && rc != G10ERR_UNU_PUBKEY ) {
|
1999-05-22 20:54:54 +00:00
|
|
|
log_error( _("key %08lX: public key not found: %s\n"),
|
1998-07-08 09:29:43 +00:00
|
|
|
(ulong)keyid[1], g10_errstr(rc));
|
1998-02-16 20:05:02 +00:00
|
|
|
}
|
2000-07-27 15:33:37 +00:00
|
|
|
else if ( rc && opt.merge_only ) {
|
|
|
|
if( opt.verbose )
|
|
|
|
log_info( _("key %08lX: new key - skipped\n"), (ulong)keyid[1] );
|
|
|
|
rc = 0;
|
|
|
|
fast = 1; /* so that we don't get into the trustdb update */
|
2001-09-19 14:25:05 +00:00
|
|
|
stats->skipped_new_keys++;
|
2000-07-27 15:33:37 +00:00
|
|
|
}
|
1998-02-17 20:48:52 +00:00
|
|
|
else if( rc ) { /* insert this key */
|
2001-09-06 17:10:00 +00:00
|
|
|
KEYDB_HANDLE hd = keydb_new (0);
|
|
|
|
|
|
|
|
rc = keydb_locate_writable (hd, NULL);
|
|
|
|
if (rc) {
|
|
|
|
log_error (_("no writable keyring found: %s\n"), g10_errstr (rc));
|
2001-09-19 14:25:05 +00:00
|
|
|
keydb_release (hd);
|
1998-02-16 20:05:02 +00:00
|
|
|
return G10ERR_GENERAL;
|
|
|
|
}
|
|
|
|
if( opt.verbose > 1 )
|
2001-09-06 17:10:00 +00:00
|
|
|
log_info (_("writing to `%s'\n"), keydb_get_resource_name (hd) );
|
|
|
|
rc = keydb_insert_keyblock (hd, keyblock );
|
|
|
|
if (rc)
|
|
|
|
log_error (_("error writing keyring `%s': %s\n"),
|
|
|
|
keydb_get_resource_name (hd), g10_errstr(rc));
|
|
|
|
keydb_release (hd);
|
1998-02-16 20:05:02 +00:00
|
|
|
/* we are ready */
|
1998-10-25 19:00:01 +00:00
|
|
|
if( !opt.quiet )
|
1999-05-22 20:54:54 +00:00
|
|
|
log_info( _("key %08lX: public key imported\n"), (ulong)keyid[1]);
|
1999-07-14 17:47:23 +00:00
|
|
|
if( is_status_enabled() ) {
|
|
|
|
char *us = get_long_user_id_string( keyid );
|
|
|
|
write_status_text( STATUS_IMPORTED, us );
|
|
|
|
m_free(us);
|
|
|
|
}
|
2001-09-19 14:25:05 +00:00
|
|
|
stats->imported++;
|
1998-10-25 19:00:01 +00:00
|
|
|
if( is_RSA( pk->pubkey_algo ) )
|
2001-09-19 14:25:05 +00:00
|
|
|
stats->imported_rsa++;
|
1998-08-11 17:29:34 +00:00
|
|
|
new_key = 1;
|
1998-02-16 20:05:02 +00:00
|
|
|
}
|
1998-02-17 20:48:52 +00:00
|
|
|
else { /* merge */
|
2001-09-06 17:10:00 +00:00
|
|
|
KEYDB_HANDLE hd;
|
1998-05-26 13:38:00 +00:00
|
|
|
int n_uids, n_sigs, n_subk;
|
1998-02-17 20:48:52 +00:00
|
|
|
|
2001-09-06 17:10:00 +00:00
|
|
|
|
1998-02-17 20:48:52 +00:00
|
|
|
/* Compare the original against the new key; just to be sure nothing
|
|
|
|
* weird is going on */
|
1998-06-29 12:30:57 +00:00
|
|
|
if( cmp_public_keys( pk_orig, pk ) ) {
|
1999-05-22 20:54:54 +00:00
|
|
|
log_error( _("key %08lX: doesn't match our copy\n"),
|
1998-07-08 09:29:43 +00:00
|
|
|
(ulong)keyid[1]);
|
1998-02-17 20:48:52 +00:00
|
|
|
rc = G10ERR_GENERAL;
|
|
|
|
goto leave;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* now read the original keyblock */
|
2001-09-06 17:10:00 +00:00
|
|
|
hd = keydb_new (0);
|
|
|
|
{
|
|
|
|
byte afp[MAX_FINGERPRINT_LEN];
|
|
|
|
size_t an;
|
|
|
|
|
|
|
|
fingerprint_from_pk (pk_orig, afp, &an);
|
|
|
|
while (an < MAX_FINGERPRINT_LEN)
|
|
|
|
afp[an++] = 0;
|
|
|
|
rc = keydb_search_fpr (hd, afp);
|
|
|
|
}
|
1998-02-17 20:48:52 +00:00
|
|
|
if( rc ) {
|
2001-09-06 17:10:00 +00:00
|
|
|
log_error (_("key %08lX: can't locate original keyblock: %s\n"),
|
1998-07-08 09:29:43 +00:00
|
|
|
(ulong)keyid[1], g10_errstr(rc));
|
2001-09-06 17:10:00 +00:00
|
|
|
keydb_release (hd);
|
1998-02-17 20:48:52 +00:00
|
|
|
goto leave;
|
|
|
|
}
|
2001-09-06 17:10:00 +00:00
|
|
|
rc = keydb_get_keyblock (hd, &keyblock_orig );
|
|
|
|
if (rc) {
|
|
|
|
log_error (_("key %08lX: can't read original keyblock: %s\n"),
|
1998-07-08 09:29:43 +00:00
|
|
|
(ulong)keyid[1], g10_errstr(rc));
|
2001-09-06 17:10:00 +00:00
|
|
|
keydb_release (hd);
|
1998-02-17 20:48:52 +00:00
|
|
|
goto leave;
|
|
|
|
}
|
1999-05-22 20:54:54 +00:00
|
|
|
|
|
|
|
collapse_uids( &keyblock );
|
1998-02-17 20:48:52 +00:00
|
|
|
/* and try to merge the block */
|
|
|
|
clear_kbnode_flags( keyblock_orig );
|
1999-05-19 14:12:26 +00:00
|
|
|
clear_kbnode_flags( keyblock );
|
1999-05-22 20:54:54 +00:00
|
|
|
n_uids = n_sigs = n_subk = 0;
|
1998-02-17 20:48:52 +00:00
|
|
|
rc = merge_blocks( fname, keyblock_orig, keyblock,
|
1998-05-26 13:38:00 +00:00
|
|
|
keyid, &n_uids, &n_sigs, &n_subk );
|
2001-09-06 17:10:00 +00:00
|
|
|
if( rc ) {
|
|
|
|
keydb_release (hd);
|
1998-02-17 20:48:52 +00:00
|
|
|
goto leave;
|
2001-09-06 17:10:00 +00:00
|
|
|
}
|
1998-05-26 13:38:00 +00:00
|
|
|
if( n_uids || n_sigs || n_subk ) {
|
1998-09-29 16:15:15 +00:00
|
|
|
mod_key = 1;
|
1998-05-26 13:38:00 +00:00
|
|
|
/* keyblock_orig has been updated; write */
|
2001-09-06 17:10:00 +00:00
|
|
|
rc = keydb_update_keyblock (hd, keyblock_orig);
|
|
|
|
if (rc)
|
|
|
|
log_error (_("error writing keyring `%s': %s\n"),
|
|
|
|
keydb_get_resource_name (hd), g10_errstr(rc) );
|
1998-02-17 20:48:52 +00:00
|
|
|
/* we are ready */
|
1998-10-25 19:00:01 +00:00
|
|
|
if( !opt.quiet ) {
|
|
|
|
if( n_uids == 1 )
|
1999-09-01 13:40:07 +00:00
|
|
|
log_info( _("key %08lX: 1 new user ID\n"),
|
1998-10-25 19:00:01 +00:00
|
|
|
(ulong)keyid[1]);
|
|
|
|
else if( n_uids )
|
1999-09-01 13:40:07 +00:00
|
|
|
log_info( _("key %08lX: %d new user IDs\n"),
|
1998-10-25 19:00:01 +00:00
|
|
|
(ulong)keyid[1], n_uids );
|
|
|
|
if( n_sigs == 1 )
|
1999-05-22 20:54:54 +00:00
|
|
|
log_info( _("key %08lX: 1 new signature\n"),
|
1998-10-25 19:00:01 +00:00
|
|
|
(ulong)keyid[1]);
|
|
|
|
else if( n_sigs )
|
1999-05-22 20:54:54 +00:00
|
|
|
log_info( _("key %08lX: %d new signatures\n"),
|
1998-10-25 19:00:01 +00:00
|
|
|
(ulong)keyid[1], n_sigs );
|
|
|
|
if( n_subk == 1 )
|
1999-05-22 20:54:54 +00:00
|
|
|
log_info( _("key %08lX: 1 new subkey\n"),
|
1998-10-25 19:00:01 +00:00
|
|
|
(ulong)keyid[1]);
|
|
|
|
else if( n_subk )
|
1999-05-22 20:54:54 +00:00
|
|
|
log_info( _("key %08lX: %d new subkeys\n"),
|
1998-10-25 19:00:01 +00:00
|
|
|
(ulong)keyid[1], n_subk );
|
|
|
|
}
|
|
|
|
|
2001-09-19 14:25:05 +00:00
|
|
|
stats->n_uids +=n_uids;
|
|
|
|
stats->n_sigs +=n_sigs;
|
|
|
|
stats->n_subk +=n_subk;
|
1998-10-25 19:00:01 +00:00
|
|
|
}
|
|
|
|
else {
|
|
|
|
if( !opt.quiet )
|
1999-05-22 20:54:54 +00:00
|
|
|
log_info( _("key %08lX: not changed\n"), (ulong)keyid[1] );
|
2001-09-19 14:25:05 +00:00
|
|
|
stats->unchanged++;
|
1998-02-17 20:48:52 +00:00
|
|
|
}
|
2001-09-19 14:25:05 +00:00
|
|
|
keydb_release (hd); hd = NULL;
|
1998-02-16 20:05:02 +00:00
|
|
|
}
|
2001-09-24 16:03:14 +00:00
|
|
|
if (!rc)
|
|
|
|
revalidation_mark ();
|
1998-02-16 20:05:02 +00:00
|
|
|
|
1998-02-17 20:48:52 +00:00
|
|
|
leave:
|
|
|
|
release_kbnode( keyblock_orig );
|
1998-06-29 12:30:57 +00:00
|
|
|
free_public_key( pk_orig );
|
2002-03-07 19:44:57 +00:00
|
|
|
|
|
|
|
revocation_present(keyblock);
|
|
|
|
|
1998-06-29 12:30:57 +00:00
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/****************
|
|
|
|
* Ditto for secret keys. Handling is simpler than for public keys.
|
2000-12-07 10:55:10 +00:00
|
|
|
* We allow secret key importing only when allow is true, this is so
|
|
|
|
* that a secret key can not be imported accidently and thereby tampering
|
|
|
|
* with the trust calculation.
|
1998-06-29 12:30:57 +00:00
|
|
|
*/
|
|
|
|
static int
|
2001-09-25 15:20:59 +00:00
|
|
|
import_secret_one( const char *fname, KBNODE keyblock,
|
2001-09-19 14:25:05 +00:00
|
|
|
struct stats_s *stats)
|
1998-06-29 12:30:57 +00:00
|
|
|
{
|
|
|
|
PKT_secret_key *sk;
|
|
|
|
KBNODE node, uidnode;
|
|
|
|
u32 keyid[2];
|
|
|
|
int rc = 0;
|
|
|
|
|
|
|
|
/* get the key and print some info about it */
|
|
|
|
node = find_kbnode( keyblock, PKT_SECRET_KEY );
|
|
|
|
if( !node )
|
|
|
|
BUG();
|
|
|
|
|
|
|
|
sk = node->pkt->pkt.secret_key;
|
|
|
|
keyid_from_sk( sk, keyid );
|
|
|
|
uidnode = find_next_kbnode( keyblock, PKT_USER_ID );
|
|
|
|
|
|
|
|
if( opt.verbose ) {
|
1999-05-22 20:54:54 +00:00
|
|
|
log_info( "sec %4u%c/%08lX %s ",
|
1998-06-29 12:30:57 +00:00
|
|
|
nbits_from_sk( sk ),
|
|
|
|
pubkey_letter( sk->pubkey_algo ),
|
|
|
|
(ulong)keyid[1], datestr_from_sk(sk) );
|
|
|
|
if( uidnode )
|
2000-03-22 12:45:04 +00:00
|
|
|
print_utf8_string( stderr, uidnode->pkt->pkt.user_id->name,
|
|
|
|
uidnode->pkt->pkt.user_id->len );
|
1998-06-29 12:30:57 +00:00
|
|
|
putc('\n', stderr);
|
|
|
|
}
|
2001-09-19 14:25:05 +00:00
|
|
|
stats->secret_read++;
|
2000-12-07 10:55:10 +00:00
|
|
|
|
1998-06-29 12:30:57 +00:00
|
|
|
if( !uidnode ) {
|
1999-09-01 13:40:07 +00:00
|
|
|
log_error( _("key %08lX: no user ID\n"), (ulong)keyid[1]);
|
1998-06-29 12:30:57 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
clear_kbnode_flags( keyblock );
|
|
|
|
|
|
|
|
/* do we have this key already in one of our secrings ? */
|
|
|
|
rc = seckey_available( keyid );
|
2000-07-27 15:33:37 +00:00
|
|
|
if( rc == G10ERR_NO_SECKEY && !opt.merge_only ) { /* simply insert this key */
|
2001-09-06 17:10:00 +00:00
|
|
|
KEYDB_HANDLE hd = keydb_new (1);
|
|
|
|
|
1998-06-29 12:30:57 +00:00
|
|
|
/* get default resource */
|
2001-09-06 17:10:00 +00:00
|
|
|
rc = keydb_locate_writable (hd, NULL);
|
|
|
|
if (rc) {
|
|
|
|
log_error (_("no default secret keyring: %s\n"), g10_errstr (rc));
|
|
|
|
keydb_release (hd);
|
1998-06-29 12:30:57 +00:00
|
|
|
return G10ERR_GENERAL;
|
|
|
|
}
|
2001-09-06 17:10:00 +00:00
|
|
|
rc = keydb_insert_keyblock (hd, keyblock );
|
|
|
|
if (rc)
|
|
|
|
log_error (_("error writing keyring `%s': %s\n"),
|
|
|
|
keydb_get_resource_name (hd), g10_errstr(rc) );
|
|
|
|
keydb_release (hd);
|
1998-06-29 12:30:57 +00:00
|
|
|
/* we are ready */
|
1999-04-18 08:18:52 +00:00
|
|
|
if( !opt.quiet )
|
1999-05-22 20:54:54 +00:00
|
|
|
log_info( _("key %08lX: secret key imported\n"), (ulong)keyid[1]);
|
2001-09-19 14:25:05 +00:00
|
|
|
stats->secret_imported++;
|
1998-06-29 12:30:57 +00:00
|
|
|
}
|
|
|
|
else if( !rc ) { /* we can't merge secret keys */
|
1999-05-22 20:54:54 +00:00
|
|
|
log_error( _("key %08lX: already in secret keyring\n"),
|
|
|
|
(ulong)keyid[1]);
|
2001-09-19 14:25:05 +00:00
|
|
|
stats->secret_dups++;
|
1998-06-29 12:30:57 +00:00
|
|
|
}
|
|
|
|
else
|
1999-05-22 20:54:54 +00:00
|
|
|
log_error( _("key %08lX: secret key not found: %s\n"),
|
1998-07-08 09:29:43 +00:00
|
|
|
(ulong)keyid[1], g10_errstr(rc));
|
1998-06-29 12:30:57 +00:00
|
|
|
|
1998-02-16 20:05:02 +00:00
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
1998-02-17 20:48:52 +00:00
|
|
|
|
1998-02-18 13:58:46 +00:00
|
|
|
/****************
|
1998-04-14 17:51:16 +00:00
|
|
|
* Import a revocation certificate; this is a single signature packet.
|
1998-02-18 13:58:46 +00:00
|
|
|
*/
|
|
|
|
static int
|
2001-09-19 14:25:05 +00:00
|
|
|
import_revoke_cert( const char *fname, KBNODE node, struct stats_s *stats )
|
1998-02-18 13:58:46 +00:00
|
|
|
{
|
1998-06-29 12:30:57 +00:00
|
|
|
PKT_public_key *pk=NULL;
|
1998-02-18 13:58:46 +00:00
|
|
|
KBNODE onode, keyblock = NULL;
|
2001-09-06 17:10:00 +00:00
|
|
|
KEYDB_HANDLE hd = NULL;
|
1998-02-18 13:58:46 +00:00
|
|
|
u32 keyid[2];
|
|
|
|
int rc = 0;
|
|
|
|
|
|
|
|
assert( !node->next );
|
|
|
|
assert( node->pkt->pkttype == PKT_SIGNATURE );
|
|
|
|
assert( node->pkt->pkt.signature->sig_class == 0x20 );
|
|
|
|
|
|
|
|
keyid[0] = node->pkt->pkt.signature->keyid[0];
|
|
|
|
keyid[1] = node->pkt->pkt.signature->keyid[1];
|
|
|
|
|
1998-06-29 12:30:57 +00:00
|
|
|
pk = m_alloc_clear( sizeof *pk );
|
|
|
|
rc = get_pubkey( pk, keyid );
|
1998-02-18 13:58:46 +00:00
|
|
|
if( rc == G10ERR_NO_PUBKEY ) {
|
1999-05-22 20:54:54 +00:00
|
|
|
log_info( _("key %08lX: no public key - "
|
1998-07-08 09:29:43 +00:00
|
|
|
"can't apply revocation certificate\n"), (ulong)keyid[1]);
|
1998-02-18 13:58:46 +00:00
|
|
|
rc = 0;
|
|
|
|
goto leave;
|
|
|
|
}
|
|
|
|
else if( rc ) {
|
1999-05-22 20:54:54 +00:00
|
|
|
log_error( _("key %08lX: public key not found: %s\n"),
|
1998-07-08 09:29:43 +00:00
|
|
|
(ulong)keyid[1], g10_errstr(rc));
|
1998-02-18 13:58:46 +00:00
|
|
|
goto leave;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* read the original keyblock */
|
2001-09-06 17:10:00 +00:00
|
|
|
hd = keydb_new (0);
|
|
|
|
{
|
|
|
|
byte afp[MAX_FINGERPRINT_LEN];
|
|
|
|
size_t an;
|
|
|
|
|
|
|
|
fingerprint_from_pk (pk, afp, &an);
|
|
|
|
while (an < MAX_FINGERPRINT_LEN)
|
|
|
|
afp[an++] = 0;
|
|
|
|
rc = keydb_search_fpr (hd, afp);
|
|
|
|
}
|
|
|
|
if (rc) {
|
|
|
|
log_error (_("key %08lX: can't locate original keyblock: %s\n"),
|
|
|
|
(ulong)keyid[1], g10_errstr(rc));
|
1998-02-18 13:58:46 +00:00
|
|
|
goto leave;
|
|
|
|
}
|
2001-09-06 17:10:00 +00:00
|
|
|
rc = keydb_get_keyblock (hd, &keyblock );
|
|
|
|
if (rc) {
|
|
|
|
log_error (_("key %08lX: can't read original keyblock: %s\n"),
|
|
|
|
(ulong)keyid[1], g10_errstr(rc));
|
1998-02-18 13:58:46 +00:00
|
|
|
goto leave;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/* it is okay, that node is not in keyblock because
|
|
|
|
* check_key_signature works fine for sig_class 0x20 in this
|
|
|
|
* special case. */
|
|
|
|
rc = check_key_signature( keyblock, node, NULL);
|
|
|
|
if( rc ) {
|
1999-05-22 20:54:54 +00:00
|
|
|
log_error( _("key %08lX: invalid revocation certificate"
|
1998-07-08 09:29:43 +00:00
|
|
|
": %s - rejected\n"), (ulong)keyid[1], g10_errstr(rc));
|
2002-02-28 21:01:25 +00:00
|
|
|
goto leave;
|
1998-02-18 13:58:46 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
1998-04-14 17:51:16 +00:00
|
|
|
/* check whether we already have this */
|
1998-02-18 13:58:46 +00:00
|
|
|
for(onode=keyblock->next; onode; onode=onode->next ) {
|
|
|
|
if( onode->pkt->pkttype == PKT_USER_ID )
|
|
|
|
break;
|
|
|
|
else if( onode->pkt->pkttype == PKT_SIGNATURE
|
|
|
|
&& onode->pkt->pkt.signature->sig_class == 0x20
|
|
|
|
&& keyid[0] == onode->pkt->pkt.signature->keyid[0]
|
|
|
|
&& keyid[1] == onode->pkt->pkt.signature->keyid[1] ) {
|
|
|
|
rc = 0;
|
|
|
|
goto leave; /* yes, we already know about it */
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/* insert it */
|
|
|
|
insert_kbnode( keyblock, clone_kbnode(node), 0 );
|
|
|
|
|
|
|
|
/* and write the keyblock back */
|
2001-09-06 17:10:00 +00:00
|
|
|
rc = keydb_update_keyblock (hd, keyblock );
|
|
|
|
if (rc)
|
|
|
|
log_error (_("error writing keyring `%s': %s\n"),
|
|
|
|
keydb_get_resource_name (hd), g10_errstr(rc) );
|
|
|
|
keydb_release (hd); hd = NULL;
|
1998-02-18 13:58:46 +00:00
|
|
|
/* we are ready */
|
1998-10-25 19:00:01 +00:00
|
|
|
if( !opt.quiet )
|
1999-05-22 20:54:54 +00:00
|
|
|
log_info( _("key %08lX: revocation certificate imported\n"),
|
1998-07-08 09:29:43 +00:00
|
|
|
(ulong)keyid[1]);
|
2001-09-19 14:25:05 +00:00
|
|
|
stats->n_revoc++;
|
2001-09-24 16:03:14 +00:00
|
|
|
revalidation_mark ();
|
1998-02-18 13:58:46 +00:00
|
|
|
|
|
|
|
leave:
|
2001-09-06 17:10:00 +00:00
|
|
|
keydb_release (hd);
|
1998-02-18 13:58:46 +00:00
|
|
|
release_kbnode( keyblock );
|
1998-06-29 12:30:57 +00:00
|
|
|
free_public_key( pk );
|
1998-02-18 13:58:46 +00:00
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
1998-02-16 20:05:02 +00:00
|
|
|
/****************
|
1998-04-14 17:51:16 +00:00
|
|
|
* loop over the keyblock and check all self signatures.
|
1998-02-16 20:05:02 +00:00
|
|
|
* Mark all user-ids with a self-signature by setting flag bit 0.
|
|
|
|
* Mark all user-ids with an invalid self-signature by setting bit 1.
|
1999-07-22 18:11:55 +00:00
|
|
|
* This works also for subkeys, here the subkey is marked.
|
1998-02-16 20:05:02 +00:00
|
|
|
*/
|
|
|
|
static int
|
|
|
|
chk_self_sigs( const char *fname, KBNODE keyblock,
|
1998-06-29 12:30:57 +00:00
|
|
|
PKT_public_key *pk, u32 *keyid )
|
1998-02-16 20:05:02 +00:00
|
|
|
{
|
1999-01-12 10:20:24 +00:00
|
|
|
KBNODE n;
|
1998-02-16 20:05:02 +00:00
|
|
|
PKT_signature *sig;
|
|
|
|
int rc;
|
|
|
|
|
|
|
|
for( n=keyblock; (n = find_next_kbnode(n, 0)); ) {
|
|
|
|
if( n->pkt->pkttype != PKT_SIGNATURE )
|
|
|
|
continue;
|
|
|
|
sig = n->pkt->pkt.signature;
|
|
|
|
if( keyid[0] == sig->keyid[0] && keyid[1] == sig->keyid[1] ) {
|
1999-01-12 10:20:24 +00:00
|
|
|
if( (sig->sig_class&~3) == 0x10 ) {
|
|
|
|
KBNODE unode = find_prev_kbnode( keyblock, n, PKT_USER_ID );
|
|
|
|
if( !unode ) {
|
1999-09-01 13:40:07 +00:00
|
|
|
log_error( _("key %08lX: no user ID for signature\n"),
|
1999-01-12 10:20:24 +00:00
|
|
|
(ulong)keyid[1]);
|
|
|
|
return -1; /* the complete keyblock is invalid */
|
|
|
|
}
|
|
|
|
|
2002-03-13 13:28:18 +00:00
|
|
|
/* If it hasn't been marked valid yet, keep trying */
|
|
|
|
if(!(unode->flag&1)) {
|
|
|
|
rc = check_key_signature( keyblock, n, NULL);
|
|
|
|
if( rc )
|
2002-03-13 20:20:14 +00:00
|
|
|
{
|
|
|
|
char *p=utf8_to_native(unode->pkt->pkt.user_id->name,
|
|
|
|
strlen(unode->pkt->pkt.user_id->name),0);
|
|
|
|
log_info( rc == G10ERR_PUBKEY_ALGO ?
|
|
|
|
_("key %08lX: unsupported public key "
|
|
|
|
"algorithm on user id \"%s\"\n"):
|
|
|
|
_("key %08lX: invalid self-signature "
|
|
|
|
"on user id \"%s\"\n"),
|
|
|
|
(ulong)keyid[1],p);
|
|
|
|
m_free(p);
|
|
|
|
}
|
2002-03-13 13:28:18 +00:00
|
|
|
else
|
|
|
|
unode->flag |= 1; /* mark that signature checked */
|
1999-01-12 10:20:24 +00:00
|
|
|
}
|
1998-02-16 20:05:02 +00:00
|
|
|
}
|
1999-01-12 10:20:24 +00:00
|
|
|
else if( sig->sig_class == 0x18 ) {
|
|
|
|
KBNODE knode = find_prev_kbnode( keyblock,
|
|
|
|
n, PKT_PUBLIC_SUBKEY );
|
|
|
|
if( !knode )
|
|
|
|
knode = find_prev_kbnode( keyblock,
|
|
|
|
n, PKT_SECRET_SUBKEY );
|
|
|
|
|
1999-07-22 18:11:55 +00:00
|
|
|
if( !knode ) {
|
1999-08-30 18:48:57 +00:00
|
|
|
log_info( _("key %08lX: no subkey for key binding\n"),
|
1999-01-12 10:20:24 +00:00
|
|
|
(ulong)keyid[1]);
|
1999-02-19 14:54:00 +00:00
|
|
|
n->flag |= 4; /* delete this */
|
1999-01-12 10:20:24 +00:00
|
|
|
}
|
|
|
|
else {
|
2002-03-13 13:28:18 +00:00
|
|
|
/* If it hasn't been marked valid yet, keep trying */
|
|
|
|
if(!(knode->flag&1)) {
|
1999-01-12 10:20:24 +00:00
|
|
|
rc = check_key_signature( keyblock, n, NULL);
|
2002-03-13 13:28:18 +00:00
|
|
|
if( rc )
|
1999-08-30 18:48:57 +00:00
|
|
|
log_info( rc == G10ERR_PUBKEY_ALGO ?
|
1999-01-12 10:20:24 +00:00
|
|
|
_("key %08lX: unsupported public key algorithm\n"):
|
|
|
|
_("key %08lX: invalid subkey binding\n"),
|
|
|
|
(ulong)keyid[1]);
|
2002-03-13 13:28:18 +00:00
|
|
|
else
|
|
|
|
knode->flag |= 1; /* mark that signature checked */
|
|
|
|
}
|
1999-01-12 10:20:24 +00:00
|
|
|
}
|
1998-02-16 20:05:02 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
1998-01-19 18:54:44 +00:00
|
|
|
return 0;
|
1998-01-16 21:15:24 +00:00
|
|
|
}
|
|
|
|
|
1998-02-16 20:05:02 +00:00
|
|
|
/****************
|
1998-04-14 17:51:16 +00:00
|
|
|
* delete all parts which are invalid and those signatures whose
|
|
|
|
* public key algorithm is not available in this implemenation;
|
1998-02-17 20:48:52 +00:00
|
|
|
* but consider RSA as valid, because parse/build_packets knows
|
|
|
|
* about it.
|
1998-02-16 20:05:02 +00:00
|
|
|
* returns: true if at least one valid user-id is left over.
|
|
|
|
*/
|
|
|
|
static int
|
|
|
|
delete_inv_parts( const char *fname, KBNODE keyblock, u32 *keyid )
|
|
|
|
{
|
|
|
|
KBNODE node;
|
1998-02-18 13:58:46 +00:00
|
|
|
int nvalid=0, uid_seen=0;
|
1998-01-16 21:15:24 +00:00
|
|
|
|
1998-02-16 20:05:02 +00:00
|
|
|
for(node=keyblock->next; node; node = node->next ) {
|
|
|
|
if( node->pkt->pkttype == PKT_USER_ID ) {
|
1998-02-18 13:58:46 +00:00
|
|
|
uid_seen = 1;
|
1998-02-16 20:05:02 +00:00
|
|
|
if( (node->flag & 2) || !(node->flag & 1) ) {
|
1998-02-17 20:48:52 +00:00
|
|
|
if( opt.verbose ) {
|
1999-09-01 13:40:07 +00:00
|
|
|
log_info( _("key %08lX: skipped user ID '"),
|
1998-07-08 09:29:43 +00:00
|
|
|
(ulong)keyid[1]);
|
2000-03-22 12:45:04 +00:00
|
|
|
print_utf8_string( stderr, node->pkt->pkt.user_id->name,
|
|
|
|
node->pkt->pkt.user_id->len );
|
1998-02-17 20:48:52 +00:00
|
|
|
fputs("'\n", stderr );
|
|
|
|
}
|
1998-02-16 20:05:02 +00:00
|
|
|
delete_kbnode( node ); /* the user-id */
|
|
|
|
/* and all following packets up to the next user-id */
|
1999-04-07 18:58:34 +00:00
|
|
|
while( node->next
|
|
|
|
&& node->next->pkt->pkttype != PKT_USER_ID
|
|
|
|
&& node->next->pkt->pkttype != PKT_PUBLIC_SUBKEY
|
|
|
|
&& node->next->pkt->pkttype != PKT_SECRET_SUBKEY ){
|
1998-02-16 20:05:02 +00:00
|
|
|
delete_kbnode( node->next );
|
|
|
|
node = node->next;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
else
|
|
|
|
nvalid++;
|
|
|
|
}
|
1999-01-12 10:20:24 +00:00
|
|
|
else if( node->pkt->pkttype == PKT_PUBLIC_SUBKEY
|
|
|
|
|| node->pkt->pkttype == PKT_SECRET_SUBKEY ) {
|
|
|
|
if( (node->flag & 2) || !(node->flag & 1) ) {
|
|
|
|
if( opt.verbose ) {
|
1999-05-22 20:54:54 +00:00
|
|
|
log_info( _("key %08lX: skipped subkey\n"),
|
1999-01-12 10:20:24 +00:00
|
|
|
(ulong)keyid[1]);
|
|
|
|
}
|
|
|
|
delete_kbnode( node ); /* the subkey */
|
|
|
|
/* and all following signature packets */
|
|
|
|
while( node->next
|
|
|
|
&& node->next->pkt->pkttype == PKT_SIGNATURE ) {
|
|
|
|
delete_kbnode( node->next );
|
|
|
|
node = node->next;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
1998-02-17 20:48:52 +00:00
|
|
|
else if( node->pkt->pkttype == PKT_SIGNATURE
|
|
|
|
&& check_pubkey_algo( node->pkt->pkt.signature->pubkey_algo)
|
|
|
|
&& node->pkt->pkt.signature->pubkey_algo != PUBKEY_ALGO_RSA )
|
|
|
|
delete_kbnode( node ); /* build_packet() can't handle this */
|
2001-12-28 16:34:01 +00:00
|
|
|
else if( node->pkt->pkttype == PKT_SIGNATURE &&
|
|
|
|
!node->pkt->pkt.signature->flags.exportable &&
|
|
|
|
seckey_available( node->pkt->pkt.signature->keyid ) ) {
|
1999-04-06 18:04:55 +00:00
|
|
|
/* here we violate the rfc a bit by still allowing
|
|
|
|
* to import non-exportable signature when we have the
|
|
|
|
* the secret key used to create this signature - it
|
|
|
|
* seems that this makes sense */
|
1999-05-22 20:54:54 +00:00
|
|
|
log_info( _("key %08lX: non exportable signature "
|
1999-03-11 15:42:06 +00:00
|
|
|
"(class %02x) - skipped\n"),
|
|
|
|
(ulong)keyid[1],
|
|
|
|
node->pkt->pkt.signature->sig_class );
|
|
|
|
delete_kbnode( node );
|
|
|
|
}
|
1998-02-18 13:58:46 +00:00
|
|
|
else if( node->pkt->pkttype == PKT_SIGNATURE
|
|
|
|
&& node->pkt->pkt.signature->sig_class == 0x20 ) {
|
|
|
|
if( uid_seen ) {
|
1999-05-22 20:54:54 +00:00
|
|
|
log_error( _("key %08lX: revocation certificate "
|
1998-09-28 19:25:31 +00:00
|
|
|
"at wrong place - skipped\n"),
|
|
|
|
(ulong)keyid[1]);
|
1998-02-18 13:58:46 +00:00
|
|
|
delete_kbnode( node );
|
|
|
|
}
|
|
|
|
else {
|
2002-02-28 21:01:25 +00:00
|
|
|
/* If the revocation cert is from a different key than
|
|
|
|
the one we're working on don't check it - it's
|
|
|
|
probably from a revocation key and won't be
|
|
|
|
verifiable with this key anyway. */
|
|
|
|
|
|
|
|
if(node->pkt->pkt.signature->keyid[0]==keyid[0] &&
|
|
|
|
node->pkt->pkt.signature->keyid[1]==keyid[1])
|
|
|
|
{
|
|
|
|
int rc = check_key_signature( keyblock, node, NULL);
|
|
|
|
if( rc )
|
|
|
|
{
|
|
|
|
log_error( _("key %08lX: invalid revocation "
|
|
|
|
"certificate: %s - skipped\n"),
|
|
|
|
(ulong)keyid[1], g10_errstr(rc));
|
|
|
|
delete_kbnode( node );
|
|
|
|
}
|
1998-02-18 13:58:46 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
1999-02-19 14:54:00 +00:00
|
|
|
else if( (node->flag & 4) ) /* marked for deletion */
|
|
|
|
delete_kbnode( node );
|
1998-02-16 20:05:02 +00:00
|
|
|
}
|
|
|
|
|
1998-02-17 20:48:52 +00:00
|
|
|
/* note: because keyblock is the public key, it is never marked
|
|
|
|
* for deletion and so keyblock cannot change */
|
1998-02-16 20:05:02 +00:00
|
|
|
commit_kbnode( &keyblock );
|
|
|
|
return nvalid;
|
|
|
|
}
|
1998-02-17 20:48:52 +00:00
|
|
|
|
|
|
|
|
1999-05-19 14:12:26 +00:00
|
|
|
/****************
|
|
|
|
* It may happen that the imported keyblock has duplicated user IDs.
|
|
|
|
* We check this here and collapse those user IDs together with their
|
|
|
|
* sigs into one.
|
1999-05-22 20:54:54 +00:00
|
|
|
* Returns: True if the keyblock hash changed.
|
1999-05-19 14:12:26 +00:00
|
|
|
*/
|
1999-05-22 20:54:54 +00:00
|
|
|
int
|
|
|
|
collapse_uids( KBNODE *keyblock )
|
1999-05-19 14:12:26 +00:00
|
|
|
{
|
1999-05-22 20:54:54 +00:00
|
|
|
KBNODE n, n2;
|
|
|
|
int in_uid;
|
|
|
|
int any=0;
|
|
|
|
u32 kid1;
|
1999-05-19 14:12:26 +00:00
|
|
|
|
1999-05-22 20:54:54 +00:00
|
|
|
restart:
|
|
|
|
for( n = *keyblock; n; n = n->next ) {
|
|
|
|
if( n->pkt->pkttype != PKT_USER_ID )
|
|
|
|
continue;
|
|
|
|
for( n2 = n->next; n2; n2 = n2->next ) {
|
|
|
|
if( n2->pkt->pkttype == PKT_USER_ID
|
|
|
|
&& !cmp_user_ids( n->pkt->pkt.user_id,
|
|
|
|
n2->pkt->pkt.user_id ) ) {
|
|
|
|
/* found a duplicate */
|
|
|
|
any = 1;
|
|
|
|
if( !n2->next
|
|
|
|
|| n2->next->pkt->pkttype == PKT_USER_ID
|
|
|
|
|| n2->next->pkt->pkttype == PKT_PUBLIC_SUBKEY
|
|
|
|
|| n2->next->pkt->pkttype == PKT_SECRET_SUBKEY ) {
|
|
|
|
/* no more signatures: delete the user ID
|
|
|
|
* and start over */
|
|
|
|
remove_kbnode( keyblock, n2 );
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
/* The simple approach: Move one signature and
|
|
|
|
* then start over to delete the next one :-( */
|
|
|
|
move_kbnode( keyblock, n2->next, n->next );
|
1999-05-19 14:12:26 +00:00
|
|
|
}
|
1999-05-22 20:54:54 +00:00
|
|
|
goto restart;
|
1999-05-19 14:12:26 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
1999-05-22 20:54:54 +00:00
|
|
|
if( !any )
|
|
|
|
return 0;
|
1999-05-19 14:12:26 +00:00
|
|
|
|
1999-05-22 20:54:54 +00:00
|
|
|
restart_sig:
|
|
|
|
/* now we may have duplicate signatures on one user ID: fix this */
|
|
|
|
for( in_uid = 0, n = *keyblock; n; n = n->next ) {
|
|
|
|
if( n->pkt->pkttype == PKT_USER_ID )
|
|
|
|
in_uid = 1;
|
|
|
|
else if( n->pkt->pkttype == PKT_PUBLIC_SUBKEY
|
|
|
|
|| n->pkt->pkttype == PKT_SECRET_SUBKEY )
|
|
|
|
in_uid = 0;
|
|
|
|
else if( in_uid ) {
|
|
|
|
n2 = n;
|
|
|
|
do {
|
|
|
|
KBNODE ncmp = NULL;
|
|
|
|
for( ; n2; n2 = n2->next ) {
|
|
|
|
if( n2->pkt->pkttype == PKT_USER_ID
|
|
|
|
|| n2->pkt->pkttype == PKT_PUBLIC_SUBKEY
|
|
|
|
|| n2->pkt->pkttype == PKT_SECRET_SUBKEY )
|
|
|
|
break;
|
|
|
|
if( n2->pkt->pkttype != PKT_SIGNATURE )
|
|
|
|
;
|
|
|
|
else if( !ncmp )
|
|
|
|
ncmp = n2;
|
|
|
|
else if( !cmp_signatures( ncmp->pkt->pkt.signature,
|
|
|
|
n2->pkt->pkt.signature )) {
|
|
|
|
remove_kbnode( keyblock, n2 );
|
|
|
|
goto restart_sig;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
n2 = ncmp? ncmp->next : NULL;
|
|
|
|
} while( n2 );
|
|
|
|
}
|
|
|
|
}
|
1999-05-19 14:12:26 +00:00
|
|
|
|
1999-05-22 20:54:54 +00:00
|
|
|
if( (n = find_kbnode( *keyblock, PKT_PUBLIC_KEY )) )
|
|
|
|
kid1 = keyid_from_pk( n->pkt->pkt.public_key, NULL );
|
|
|
|
else if( (n = find_kbnode( *keyblock, PKT_SECRET_KEY )) )
|
|
|
|
kid1 = keyid_from_sk( n->pkt->pkt.secret_key, NULL );
|
|
|
|
else
|
|
|
|
kid1 = 0;
|
|
|
|
log_info(_("key %08lX: duplicated user ID detected - merged\n"),
|
|
|
|
(ulong)kid1);
|
1999-05-19 14:12:26 +00:00
|
|
|
|
1999-05-22 20:54:54 +00:00
|
|
|
return 1;
|
1999-05-19 14:12:26 +00:00
|
|
|
}
|
|
|
|
|
2002-03-07 19:44:57 +00:00
|
|
|
/* Check for a 0x20 revocation from a revocation key that is not
|
|
|
|
present. This gets called without the benefit of merge_xxxx so you
|
|
|
|
can't rely on pk->revkey and friends. */
|
|
|
|
static void
|
|
|
|
revocation_present(KBNODE keyblock)
|
|
|
|
{
|
|
|
|
KBNODE onode,inode;
|
|
|
|
PKT_public_key *pk=keyblock->pkt->pkt.public_key;
|
1999-05-19 14:12:26 +00:00
|
|
|
|
2002-03-07 19:44:57 +00:00
|
|
|
for(onode=keyblock->next;onode;onode=onode->next)
|
|
|
|
{
|
|
|
|
/* If we reach user IDs, we're done. */
|
|
|
|
if(onode->pkt->pkttype==PKT_USER_ID)
|
|
|
|
break;
|
|
|
|
|
|
|
|
if(onode->pkt->pkttype==PKT_SIGNATURE &&
|
|
|
|
onode->pkt->pkt.signature->sig_class==0x1F &&
|
|
|
|
onode->pkt->pkt.signature->revkey)
|
|
|
|
{
|
|
|
|
int idx;
|
|
|
|
PKT_signature *sig=onode->pkt->pkt.signature;
|
|
|
|
|
|
|
|
for(idx=0;idx<sig->numrevkeys;idx++)
|
|
|
|
{
|
|
|
|
u32 keyid[2];
|
|
|
|
|
|
|
|
keyid_from_fingerprint(sig->revkey[idx]->fpr,
|
|
|
|
MAX_FINGERPRINT_LEN,keyid);
|
|
|
|
|
|
|
|
for(inode=keyblock->next;inode;inode=inode->next)
|
|
|
|
{
|
|
|
|
/* If we reach user IDs, we're done. */
|
|
|
|
if(inode->pkt->pkttype==PKT_USER_ID)
|
|
|
|
break;
|
|
|
|
|
|
|
|
if(inode->pkt->pkttype==PKT_SIGNATURE &&
|
|
|
|
inode->pkt->pkt.signature->sig_class==0x20 &&
|
|
|
|
inode->pkt->pkt.signature->keyid[0]==keyid[0] &&
|
|
|
|
inode->pkt->pkt.signature->keyid[1]==keyid[1])
|
|
|
|
{
|
|
|
|
/* Okay, we have a revocation key, and a
|
|
|
|
revocation issued by it. Do we have the key
|
|
|
|
itself? */
|
|
|
|
int rc;
|
|
|
|
|
|
|
|
rc=get_pubkey_byfprint(NULL,sig->revkey[idx]->fpr,
|
|
|
|
MAX_FINGERPRINT_LEN);
|
|
|
|
if(rc==G10ERR_NO_PUBKEY || rc==G10ERR_UNU_PUBKEY)
|
|
|
|
{
|
|
|
|
/* No, so try and get it */
|
|
|
|
if(opt.keyserver_scheme &&
|
|
|
|
opt.keyserver_options.auto_key_retrieve)
|
|
|
|
{
|
|
|
|
log_info(_("Warning: key %08lX may be revoked: "
|
|
|
|
"fetching revocation key %08lX\n"),
|
|
|
|
(ulong)keyid_from_pk(pk,NULL),
|
|
|
|
(ulong)keyid[1]);
|
|
|
|
keyserver_import_fprint(sig->revkey[idx]->fpr,
|
|
|
|
MAX_FINGERPRINT_LEN);
|
|
|
|
|
|
|
|
/* Do we have it now? */
|
|
|
|
rc=get_pubkey_byfprint(NULL,
|
|
|
|
sig->revkey[idx]->fpr,
|
|
|
|
MAX_FINGERPRINT_LEN);
|
|
|
|
}
|
|
|
|
|
|
|
|
if(rc==G10ERR_NO_PUBKEY || rc==G10ERR_UNU_PUBKEY)
|
|
|
|
log_info(_("Warning: key %08lX may be revoked: "
|
|
|
|
"revocation key %08lX not present.\n"),
|
|
|
|
(ulong)keyid_from_pk(pk,NULL),
|
|
|
|
(ulong)keyid[1]);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
1999-05-19 14:12:26 +00:00
|
|
|
|
1998-02-17 20:48:52 +00:00
|
|
|
/****************
|
|
|
|
* compare and merge the blocks
|
|
|
|
*
|
|
|
|
* o compare the signatures: If we already have this signature, check
|
|
|
|
* that they compare okay; if not, issue a warning and ask the user.
|
|
|
|
* o Simply add the signature. Can't verify here because we may not have
|
1998-04-14 17:51:16 +00:00
|
|
|
* the signature's public key yet; verification is done when putting it
|
1998-02-17 20:48:52 +00:00
|
|
|
* into the trustdb, which is done automagically as soon as this pubkey
|
|
|
|
* is used.
|
|
|
|
* Note: We indicate newly inserted packets with flag bit 0
|
|
|
|
*/
|
|
|
|
static int
|
|
|
|
merge_blocks( const char *fname, KBNODE keyblock_orig, KBNODE keyblock,
|
1998-05-26 13:38:00 +00:00
|
|
|
u32 *keyid, int *n_uids, int *n_sigs, int *n_subk )
|
1998-02-17 20:48:52 +00:00
|
|
|
{
|
1998-02-18 13:58:46 +00:00
|
|
|
KBNODE onode, node;
|
|
|
|
int rc, found;
|
|
|
|
|
|
|
|
/* 1st: handle revocation certificates */
|
|
|
|
for(node=keyblock->next; node; node=node->next ) {
|
|
|
|
if( node->pkt->pkttype == PKT_USER_ID )
|
|
|
|
break;
|
|
|
|
else if( node->pkt->pkttype == PKT_SIGNATURE
|
|
|
|
&& node->pkt->pkt.signature->sig_class == 0x20 ) {
|
1998-04-14 17:51:16 +00:00
|
|
|
/* check whether we already have this */
|
1998-02-18 13:58:46 +00:00
|
|
|
found = 0;
|
|
|
|
for(onode=keyblock_orig->next; onode; onode=onode->next ) {
|
|
|
|
if( onode->pkt->pkttype == PKT_USER_ID )
|
|
|
|
break;
|
|
|
|
else if( onode->pkt->pkttype == PKT_SIGNATURE
|
|
|
|
&& onode->pkt->pkt.signature->sig_class == 0x20
|
|
|
|
&& node->pkt->pkt.signature->keyid[0]
|
|
|
|
== onode->pkt->pkt.signature->keyid[0]
|
|
|
|
&& node->pkt->pkt.signature->keyid[1]
|
|
|
|
== onode->pkt->pkt.signature->keyid[1] ) {
|
|
|
|
found = 1;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if( !found ) {
|
|
|
|
KBNODE n2 = clone_kbnode(node);
|
|
|
|
insert_kbnode( keyblock_orig, n2, 0 );
|
|
|
|
n2->flag |= 1;
|
2000-12-06 12:06:19 +00:00
|
|
|
++*n_sigs;
|
1999-05-22 20:54:54 +00:00
|
|
|
log_info( _("key %08lX: revocation certificate added\n"),
|
1998-07-08 09:29:43 +00:00
|
|
|
(ulong)keyid[1]);
|
1998-02-18 13:58:46 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
1998-02-17 20:48:52 +00:00
|
|
|
|
2002-02-28 21:01:25 +00:00
|
|
|
/* 2nd: merge in any direct key (0x1F) sigs */
|
|
|
|
for(node=keyblock->next; node; node=node->next ) {
|
|
|
|
if( node->pkt->pkttype == PKT_USER_ID )
|
|
|
|
break;
|
|
|
|
else if( node->pkt->pkttype == PKT_SIGNATURE
|
|
|
|
&& node->pkt->pkt.signature->sig_class == 0x1F ) {
|
|
|
|
/* check whether we already have this */
|
|
|
|
found = 0;
|
|
|
|
for(onode=keyblock_orig->next; onode; onode=onode->next ) {
|
|
|
|
if( onode->pkt->pkttype == PKT_USER_ID )
|
|
|
|
break;
|
|
|
|
else if( onode->pkt->pkttype == PKT_SIGNATURE
|
|
|
|
&& onode->pkt->pkt.signature->sig_class == 0x1F
|
|
|
|
&& !cmp_signatures(onode->pkt->pkt.signature,
|
|
|
|
node->pkt->pkt.signature)) {
|
|
|
|
found = 1;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if( !found ) {
|
|
|
|
KBNODE n2 = clone_kbnode(node);
|
|
|
|
insert_kbnode( keyblock_orig, n2, 0 );
|
|
|
|
n2->flag |= 1;
|
|
|
|
++*n_sigs;
|
|
|
|
log_info( _("key %08lX: direct key signature added\n"),
|
|
|
|
(ulong)keyid[1]);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/* 3rd: try to merge new certificates in */
|
1998-02-18 13:58:46 +00:00
|
|
|
for(onode=keyblock_orig->next; onode; onode=onode->next ) {
|
|
|
|
if( !(onode->flag & 1) && onode->pkt->pkttype == PKT_USER_ID) {
|
1998-02-17 20:48:52 +00:00
|
|
|
/* find the user id in the imported keyblock */
|
|
|
|
for(node=keyblock->next; node; node=node->next )
|
1998-12-08 12:20:53 +00:00
|
|
|
if( node->pkt->pkttype == PKT_USER_ID
|
1998-02-18 13:58:46 +00:00
|
|
|
&& !cmp_user_ids( onode->pkt->pkt.user_id,
|
1998-02-17 20:48:52 +00:00
|
|
|
node->pkt->pkt.user_id ) )
|
|
|
|
break;
|
|
|
|
if( node ) { /* found: merge */
|
1998-02-18 13:58:46 +00:00
|
|
|
rc = merge_sigs( onode, node, n_sigs, fname, keyid );
|
1998-02-17 20:48:52 +00:00
|
|
|
if( rc )
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2002-02-28 21:01:25 +00:00
|
|
|
/* 4th: add new user-ids */
|
1998-02-17 20:48:52 +00:00
|
|
|
for(node=keyblock->next; node; node=node->next ) {
|
1998-12-08 12:20:53 +00:00
|
|
|
if( node->pkt->pkttype == PKT_USER_ID) {
|
1998-02-17 20:48:52 +00:00
|
|
|
/* do we have this in the original keyblock */
|
1998-02-18 13:58:46 +00:00
|
|
|
for(onode=keyblock_orig->next; onode; onode=onode->next )
|
1998-12-08 12:20:53 +00:00
|
|
|
if( onode->pkt->pkttype == PKT_USER_ID
|
|
|
|
&& !cmp_user_ids( onode->pkt->pkt.user_id,
|
|
|
|
node->pkt->pkt.user_id ) )
|
1998-02-17 20:48:52 +00:00
|
|
|
break;
|
1998-12-08 12:20:53 +00:00
|
|
|
if( !onode ) { /* this is a new user id: append */
|
1998-02-17 20:48:52 +00:00
|
|
|
rc = append_uid( keyblock_orig, node, n_sigs, fname, keyid);
|
|
|
|
if( rc )
|
|
|
|
return rc;
|
|
|
|
++*n_uids;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2002-02-28 21:01:25 +00:00
|
|
|
/* 5th: add new subkeys */
|
1998-12-08 12:20:53 +00:00
|
|
|
for(node=keyblock->next; node; node=node->next ) {
|
|
|
|
onode = NULL;
|
|
|
|
if( node->pkt->pkttype == PKT_PUBLIC_SUBKEY ) {
|
|
|
|
/* do we have this in the original keyblock? */
|
|
|
|
for(onode=keyblock_orig->next; onode; onode=onode->next )
|
|
|
|
if( onode->pkt->pkttype == PKT_PUBLIC_SUBKEY
|
|
|
|
&& !cmp_public_keys( onode->pkt->pkt.public_key,
|
|
|
|
node->pkt->pkt.public_key ) )
|
|
|
|
break;
|
|
|
|
if( !onode ) { /* this is a new subkey: append */
|
|
|
|
rc = append_key( keyblock_orig, node, n_sigs, fname, keyid);
|
|
|
|
if( rc )
|
|
|
|
return rc;
|
|
|
|
++*n_subk;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
else if( node->pkt->pkttype == PKT_SECRET_SUBKEY ) {
|
|
|
|
/* do we have this in the original keyblock? */
|
|
|
|
for(onode=keyblock_orig->next; onode; onode=onode->next )
|
|
|
|
if( onode->pkt->pkttype == PKT_SECRET_SUBKEY
|
|
|
|
&& !cmp_secret_keys( onode->pkt->pkt.secret_key,
|
|
|
|
node->pkt->pkt.secret_key ) )
|
|
|
|
break;
|
|
|
|
if( !onode ) { /* this is a new subkey: append */
|
|
|
|
rc = append_key( keyblock_orig, node, n_sigs, fname, keyid);
|
|
|
|
if( rc )
|
|
|
|
return rc;
|
|
|
|
++*n_subk;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
1998-05-26 13:38:00 +00:00
|
|
|
|
2002-02-28 21:01:25 +00:00
|
|
|
/* 6th: merge subkey certificates */
|
1999-09-02 14:50:38 +00:00
|
|
|
for(onode=keyblock_orig->next; onode; onode=onode->next ) {
|
|
|
|
if( !(onode->flag & 1)
|
|
|
|
&& ( onode->pkt->pkttype == PKT_PUBLIC_SUBKEY
|
|
|
|
|| onode->pkt->pkttype == PKT_SECRET_SUBKEY) ) {
|
|
|
|
/* find the subkey in the imported keyblock */
|
|
|
|
for(node=keyblock->next; node; node=node->next ) {
|
|
|
|
if( node->pkt->pkttype == PKT_PUBLIC_SUBKEY
|
|
|
|
&& !cmp_public_keys( onode->pkt->pkt.public_key,
|
|
|
|
node->pkt->pkt.public_key ) )
|
|
|
|
break;
|
|
|
|
else if( node->pkt->pkttype == PKT_SECRET_SUBKEY
|
|
|
|
&& !cmp_secret_keys( onode->pkt->pkt.secret_key,
|
|
|
|
node->pkt->pkt.secret_key ) )
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
if( node ) { /* found: merge */
|
|
|
|
rc = merge_keysigs( onode, node, n_sigs, fname, keyid );
|
|
|
|
if( rc )
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
1998-02-17 20:48:52 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/****************
|
|
|
|
* append the userid starting with NODE and all signatures to KEYBLOCK.
|
|
|
|
*/
|
|
|
|
static int
|
|
|
|
append_uid( KBNODE keyblock, KBNODE node, int *n_sigs,
|
|
|
|
const char *fname, u32 *keyid )
|
|
|
|
{
|
1998-12-08 12:20:53 +00:00
|
|
|
KBNODE n, n_where=NULL;
|
1998-02-17 20:48:52 +00:00
|
|
|
|
|
|
|
assert(node->pkt->pkttype == PKT_USER_ID );
|
|
|
|
|
1998-12-08 12:20:53 +00:00
|
|
|
/* find the position */
|
|
|
|
for( n = keyblock; n; n_where = n, n = n->next ) {
|
|
|
|
if( n->pkt->pkttype == PKT_PUBLIC_SUBKEY
|
|
|
|
|| n->pkt->pkttype == PKT_SECRET_SUBKEY )
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
if( !n )
|
|
|
|
n_where = NULL;
|
|
|
|
|
|
|
|
/* and append/insert */
|
|
|
|
while( node ) {
|
1998-02-17 20:48:52 +00:00
|
|
|
/* we add a clone to the original keyblock, because this
|
|
|
|
* one is released first */
|
|
|
|
n = clone_kbnode(node);
|
1998-12-08 12:20:53 +00:00
|
|
|
if( n_where ) {
|
|
|
|
insert_kbnode( n_where, n, 0 );
|
|
|
|
n_where = n;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
add_kbnode( keyblock, n );
|
1998-02-17 20:48:52 +00:00
|
|
|
n->flag |= 1;
|
1998-12-08 12:20:53 +00:00
|
|
|
node->flag |= 1;
|
1998-02-17 20:48:52 +00:00
|
|
|
if( n->pkt->pkttype == PKT_SIGNATURE )
|
|
|
|
++*n_sigs;
|
1998-12-08 12:20:53 +00:00
|
|
|
|
|
|
|
node = node->next;
|
|
|
|
if( node && node->pkt->pkttype != PKT_SIGNATURE )
|
|
|
|
break;
|
1998-02-17 20:48:52 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/****************
|
|
|
|
* Merge the sigs from SRC onto DST. SRC and DST are both a PKT_USER_ID.
|
|
|
|
* (how should we handle comment packets here?)
|
|
|
|
*/
|
|
|
|
static int
|
|
|
|
merge_sigs( KBNODE dst, KBNODE src, int *n_sigs,
|
|
|
|
const char *fname, u32 *keyid )
|
|
|
|
{
|
|
|
|
KBNODE n, n2;
|
|
|
|
int found=0;
|
|
|
|
|
|
|
|
assert(dst->pkt->pkttype == PKT_USER_ID );
|
|
|
|
assert(src->pkt->pkttype == PKT_USER_ID );
|
|
|
|
|
|
|
|
for(n=src->next; n && n->pkt->pkttype != PKT_USER_ID; n = n->next ) {
|
|
|
|
if( n->pkt->pkttype != PKT_SIGNATURE )
|
|
|
|
continue;
|
1999-09-02 14:50:38 +00:00
|
|
|
if( n->pkt->pkt.signature->sig_class == 0x18
|
|
|
|
|| n->pkt->pkt.signature->sig_class == 0x28 )
|
|
|
|
continue; /* skip signatures which are only valid on subkeys */
|
1998-02-17 20:48:52 +00:00
|
|
|
found = 0;
|
1998-12-08 12:20:53 +00:00
|
|
|
for(n2=dst->next; n2 && n2->pkt->pkttype != PKT_USER_ID; n2 = n2->next){
|
1998-02-17 20:48:52 +00:00
|
|
|
if( n2->pkt->pkttype == PKT_SIGNATURE
|
|
|
|
&& n->pkt->pkt.signature->keyid[0]
|
|
|
|
== n2->pkt->pkt.signature->keyid[0]
|
|
|
|
&& n->pkt->pkt.signature->keyid[1]
|
1998-12-08 12:20:53 +00:00
|
|
|
== n2->pkt->pkt.signature->keyid[1]
|
|
|
|
&& n->pkt->pkt.signature->timestamp
|
|
|
|
<= n2->pkt->pkt.signature->timestamp
|
|
|
|
&& n->pkt->pkt.signature->sig_class
|
|
|
|
== n2->pkt->pkt.signature->sig_class ) {
|
|
|
|
found++;
|
|
|
|
break;
|
|
|
|
}
|
1998-02-17 20:48:52 +00:00
|
|
|
}
|
1998-12-08 12:20:53 +00:00
|
|
|
if( !found ) {
|
|
|
|
/* This signature is new or newer, append N to DST.
|
|
|
|
* We add a clone to the original keyblock, because this
|
|
|
|
* one is released first */
|
|
|
|
n2 = clone_kbnode(n);
|
|
|
|
insert_kbnode( dst, n2, PKT_SIGNATURE );
|
|
|
|
n2->flag |= 1;
|
|
|
|
n->flag |= 1;
|
|
|
|
++*n_sigs;
|
|
|
|
}
|
|
|
|
}
|
1998-02-17 20:48:52 +00:00
|
|
|
|
1998-12-08 12:20:53 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/****************
|
|
|
|
* Merge the sigs from SRC onto DST. SRC and DST are both a PKT_xxx_SUBKEY.
|
|
|
|
*/
|
|
|
|
static int
|
|
|
|
merge_keysigs( KBNODE dst, KBNODE src, int *n_sigs,
|
|
|
|
const char *fname, u32 *keyid )
|
|
|
|
{
|
|
|
|
KBNODE n, n2;
|
|
|
|
int found=0;
|
|
|
|
|
|
|
|
assert( dst->pkt->pkttype == PKT_PUBLIC_SUBKEY
|
|
|
|
|| dst->pkt->pkttype == PKT_SECRET_SUBKEY );
|
|
|
|
|
|
|
|
for(n=src->next; n ; n = n->next ) {
|
|
|
|
if( n->pkt->pkttype == PKT_PUBLIC_SUBKEY
|
|
|
|
|| n->pkt->pkttype == PKT_PUBLIC_KEY )
|
|
|
|
break;
|
|
|
|
if( n->pkt->pkttype != PKT_SIGNATURE )
|
1998-02-17 20:48:52 +00:00
|
|
|
continue;
|
1998-12-08 12:20:53 +00:00
|
|
|
found = 0;
|
|
|
|
for(n2=dst->next; n2; n2 = n2->next){
|
|
|
|
if( n2->pkt->pkttype == PKT_PUBLIC_SUBKEY
|
|
|
|
|| n2->pkt->pkttype == PKT_PUBLIC_KEY )
|
|
|
|
break;
|
|
|
|
if( n2->pkt->pkttype == PKT_SIGNATURE
|
|
|
|
&& n->pkt->pkt.signature->keyid[0]
|
|
|
|
== n2->pkt->pkt.signature->keyid[0]
|
|
|
|
&& n->pkt->pkt.signature->keyid[1]
|
|
|
|
== n2->pkt->pkt.signature->keyid[1]
|
|
|
|
&& n->pkt->pkt.signature->timestamp
|
|
|
|
<= n2->pkt->pkt.signature->timestamp
|
|
|
|
&& n->pkt->pkt.signature->sig_class
|
|
|
|
== n2->pkt->pkt.signature->sig_class ) {
|
|
|
|
found++;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if( !found ) {
|
|
|
|
/* This signature is new or newer, append N to DST.
|
|
|
|
* We add a clone to the original keyblock, because this
|
|
|
|
* one is released first */
|
|
|
|
n2 = clone_kbnode(n);
|
|
|
|
insert_kbnode( dst, n2, PKT_SIGNATURE );
|
|
|
|
n2->flag |= 1;
|
|
|
|
n->flag |= 1;
|
|
|
|
++*n_sigs;
|
1998-02-17 20:48:52 +00:00
|
|
|
}
|
1998-12-08 12:20:53 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
1998-02-17 20:48:52 +00:00
|
|
|
|
1998-12-08 12:20:53 +00:00
|
|
|
/****************
|
|
|
|
* append the subkey starting with NODE and all signatures to KEYBLOCK.
|
|
|
|
* Mark all new and copied packets by setting flag bit 0.
|
|
|
|
*/
|
|
|
|
static int
|
|
|
|
append_key( KBNODE keyblock, KBNODE node, int *n_sigs,
|
|
|
|
const char *fname, u32 *keyid )
|
|
|
|
{
|
|
|
|
KBNODE n;
|
|
|
|
|
|
|
|
assert( node->pkt->pkttype == PKT_PUBLIC_SUBKEY
|
|
|
|
|| node->pkt->pkttype == PKT_SECRET_SUBKEY );
|
|
|
|
|
|
|
|
while( node ) {
|
|
|
|
/* we add a clone to the original keyblock, because this
|
1998-02-17 20:48:52 +00:00
|
|
|
* one is released first */
|
1998-12-08 12:20:53 +00:00
|
|
|
n = clone_kbnode(node);
|
|
|
|
add_kbnode( keyblock, n );
|
1998-02-17 20:48:52 +00:00
|
|
|
n->flag |= 1;
|
1998-12-08 12:20:53 +00:00
|
|
|
node->flag |= 1;
|
|
|
|
if( n->pkt->pkttype == PKT_SIGNATURE )
|
|
|
|
++*n_sigs;
|
|
|
|
|
|
|
|
node = node->next;
|
|
|
|
if( node && node->pkt->pkttype != PKT_SIGNATURE )
|
|
|
|
break;
|
1998-02-17 20:48:52 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|