mirror of
git://git.gnupg.org/gnupg.git
synced 2025-02-22 19:58:29 +01:00
gpg: Fix mixed invocation with --trusted-keys and --no-options.
* g10/trustdb.c: Move some definitions around. (user_utk_list): Rename to trusted_key_list. Change all users. (any_trusted_key_seen): New. (tdb_register_trusted_key): Set it here. Handle the new value "none". (verify_own_keys): Do not delete a trusted key from the trustdb if a trusted-key option was not used. -- GnuPG-bug-id: 7025
This commit is contained in:
parent
f50c543326
commit
8cd920f6aa
@ -1711,7 +1711,9 @@ useful if you don't want to keep your secret keys (or one of them)
|
|||||||
online but still want to be able to check the validity of a given
|
online but still want to be able to check the validity of a given
|
||||||
recipient's or signator's key. If the given key is not locally
|
recipient's or signator's key. If the given key is not locally
|
||||||
available but an LDAP keyserver is configured the missing key is
|
available but an LDAP keyserver is configured the missing key is
|
||||||
imported from that server.
|
imported from that server. The value "none" is explicitly allowed to
|
||||||
|
distinguish between the use of any trusted-key option and no use of
|
||||||
|
this option at all (e.g. due to the @option{--no-options} option).
|
||||||
|
|
||||||
@item --add-desig-revoker [sensitive:]@var{fingerprint}
|
@item --add-desig-revoker [sensitive:]@var{fingerprint}
|
||||||
@opindex add-desig-revoker
|
@opindex add-desig-revoker
|
||||||
|
@ -39,16 +39,14 @@
|
|||||||
#include "tofu.h"
|
#include "tofu.h"
|
||||||
#include "key-clean.h"
|
#include "key-clean.h"
|
||||||
|
|
||||||
static void write_record (ctrl_t ctrl, TRUSTREC *rec);
|
|
||||||
static void do_sync(void);
|
|
||||||
|
|
||||||
|
|
||||||
typedef struct key_item **KeyHashTable; /* see new_key_hash_table() */
|
typedef struct key_item **KeyHashTable; /* see new_key_hash_table() */
|
||||||
|
|
||||||
/*
|
/*
|
||||||
* Structure to keep track of keys, this is used as an array wherre
|
* Structure to keep track of keys, this is used as an array where the
|
||||||
* the item right after the last one has a keyblock set to NULL.
|
* item right after the last one has a keyblock set to NULL. Maybe we
|
||||||
* Maybe we can drop this thing and replace it by key_item
|
* can drop this thing and replace it by key_item
|
||||||
*/
|
*/
|
||||||
struct key_array
|
struct key_array
|
||||||
{
|
{
|
||||||
@ -65,12 +63,22 @@ static struct
|
|||||||
int no_trustdb;
|
int no_trustdb;
|
||||||
} trustdb_args;
|
} trustdb_args;
|
||||||
|
|
||||||
|
|
||||||
/* Some globals. */
|
/* Some globals. */
|
||||||
static struct key_item *user_utk_list; /* temp. used to store --trusted-keys */
|
|
||||||
static struct key_item *utk_list; /* all ultimately trusted keys */
|
static struct key_item *utk_list; /* all ultimately trusted keys */
|
||||||
|
|
||||||
|
/* A list used to temporary store trusted keys and a flag indicated
|
||||||
|
* whether any --trusted-key option has been seen. */
|
||||||
|
static struct key_item *trusted_key_list;
|
||||||
|
static int any_trusted_key_seen;
|
||||||
|
|
||||||
|
/* Flag whether a trustdb check is pending. */
|
||||||
static int pending_check_trustdb;
|
static int pending_check_trustdb;
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
static void write_record (ctrl_t ctrl, TRUSTREC *rec);
|
||||||
|
static void do_sync (void);
|
||||||
static int validate_keys (ctrl_t ctrl, int interactive);
|
static int validate_keys (ctrl_t ctrl, int interactive);
|
||||||
|
|
||||||
|
|
||||||
@ -200,11 +208,19 @@ tdb_register_trusted_keyid (u32 *keyid)
|
|||||||
k = new_key_item ();
|
k = new_key_item ();
|
||||||
k->kid[0] = keyid[0];
|
k->kid[0] = keyid[0];
|
||||||
k->kid[1] = keyid[1];
|
k->kid[1] = keyid[1];
|
||||||
k->next = user_utk_list;
|
k->next = trusted_key_list;
|
||||||
user_utk_list = k;
|
trusted_key_list = k;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
|
/* This is called for the option --trusted-key to register these keys
|
||||||
|
* for later syncing them into the trustdb. The special value "none"
|
||||||
|
* may be used to indicate that there is a trusted-key option but no
|
||||||
|
* key shall be inserted for it. This "none" value is helpful to
|
||||||
|
* distinguish between changing the gpg.conf from a trusted-key to no
|
||||||
|
* trusted-key options at all. Simply not specify the option would
|
||||||
|
* not allow to distinguish this case from the --no-options case as
|
||||||
|
* used for certain calls of gpg for example by gpg-wks-client. */
|
||||||
void
|
void
|
||||||
tdb_register_trusted_key (const char *string)
|
tdb_register_trusted_key (const char *string)
|
||||||
{
|
{
|
||||||
@ -212,6 +228,9 @@ tdb_register_trusted_key (const char *string)
|
|||||||
KEYDB_SEARCH_DESC desc;
|
KEYDB_SEARCH_DESC desc;
|
||||||
u32 kid[2];
|
u32 kid[2];
|
||||||
|
|
||||||
|
any_trusted_key_seen = 1;
|
||||||
|
if (!strcmp (string, "none"))
|
||||||
|
return;
|
||||||
err = classify_user_id (string, &desc, 1);
|
err = classify_user_id (string, &desc, 1);
|
||||||
if (!err)
|
if (!err)
|
||||||
{
|
{
|
||||||
@ -333,13 +352,14 @@ verify_own_keys (ctrl_t ctrl)
|
|||||||
fprlen = (!fpr[16] && !fpr[17] && !fpr[18] && !fpr[19])? 16:20;
|
fprlen = (!fpr[16] && !fpr[17] && !fpr[18] && !fpr[19])? 16:20;
|
||||||
keyid_from_fingerprint (ctrl, fpr, fprlen, kid);
|
keyid_from_fingerprint (ctrl, fpr, fprlen, kid);
|
||||||
if (!add_utk (kid))
|
if (!add_utk (kid))
|
||||||
log_info(_("key %s occurs more than once in the trustdb\n"),
|
log_info (_("key %s occurs more than once in the trustdb\n"),
|
||||||
keystr(kid));
|
keystr(kid));
|
||||||
else if ((rec.r.trust.flags & 1))
|
else if ((rec.r.trust.flags & 1)
|
||||||
|
&& any_trusted_key_seen)
|
||||||
{
|
{
|
||||||
/* Record marked as inserted via --trusted-key. Is this
|
/* Record marked as inserted via --trusted-key. Is this
|
||||||
* still the case? */
|
* still the case? */
|
||||||
for (k2 = user_utk_list; k2; k2 = k2->next)
|
for (k2 = trusted_key_list; k2; k2 = k2->next)
|
||||||
if (k2->kid[0] == kid[0] && k2->kid[1] == kid[1])
|
if (k2->kid[0] == kid[0] && k2->kid[1] == kid[1])
|
||||||
break;
|
break;
|
||||||
if (!k2) /* No - clear the flag. */
|
if (!k2) /* No - clear the flag. */
|
||||||
@ -363,7 +383,7 @@ verify_own_keys (ctrl_t ctrl)
|
|||||||
}
|
}
|
||||||
|
|
||||||
/* Put any --trusted-key keys into the trustdb */
|
/* Put any --trusted-key keys into the trustdb */
|
||||||
for (k = user_utk_list; k; k = k->next)
|
for (k = trusted_key_list; k; k = k->next)
|
||||||
{
|
{
|
||||||
if ( add_utk (k->kid) )
|
if ( add_utk (k->kid) )
|
||||||
{ /* not yet in trustDB as ultimately trusted */
|
{ /* not yet in trustDB as ultimately trusted */
|
||||||
@ -388,9 +408,9 @@ verify_own_keys (ctrl_t ctrl)
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
/* release the helper table table */
|
/* Release the helper table. */
|
||||||
release_key_items (user_utk_list);
|
release_key_items (trusted_key_list);
|
||||||
user_utk_list = NULL;
|
trusted_key_list = NULL;
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
Loading…
x
Reference in New Issue
Block a user