mirror of
git://git.gnupg.org/gnupg.git
synced 2024-10-31 20:08:43 +01:00
afe5c1a370
Returning -1 as an error code is not very clean given that gpg error has more descriptive error codes. Thus we now return GPG_ERR_NOT_FOUND for all search operations and adjusted all callers.
1643 lines
42 KiB
C
1643 lines
42 KiB
C
/* keylist.c - Print information about OpenPGP keys
|
|
* Copyright (C) 1998, 1999, 2000, 2001, 2002, 2003, 2004, 2005, 2006,
|
|
* 2008, 2010 Free Software Foundation, Inc.
|
|
*
|
|
* This file is part of GnuPG.
|
|
*
|
|
* GnuPG is free software; you can redistribute it and/or modify
|
|
* it under the terms of the GNU General Public License as published by
|
|
* the Free Software Foundation; either version 3 of the License, or
|
|
* (at your option) any later version.
|
|
*
|
|
* GnuPG is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
* GNU General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU General Public License
|
|
* along with this program; if not, see <http://www.gnu.org/licenses/>.
|
|
*/
|
|
|
|
#include <config.h>
|
|
#include <stdio.h>
|
|
#include <stdlib.h>
|
|
#include <string.h>
|
|
#include <errno.h>
|
|
#include <assert.h>
|
|
#ifdef HAVE_DOSISH_SYSTEM
|
|
#include <fcntl.h> /* for setmode() */
|
|
#endif
|
|
|
|
#include "gpg.h"
|
|
#include "options.h"
|
|
#include "packet.h"
|
|
#include "status.h"
|
|
#include "keydb.h"
|
|
#include "photoid.h"
|
|
#include "util.h"
|
|
#include "ttyio.h"
|
|
#include "trustdb.h"
|
|
#include "main.h"
|
|
#include "i18n.h"
|
|
#include "status.h"
|
|
#include "call-agent.h"
|
|
|
|
static void list_all (int);
|
|
static void list_one (strlist_t names, int secret);
|
|
static void locate_one (ctrl_t ctrl, strlist_t names);
|
|
static void print_card_serialno (const char *serialno);
|
|
|
|
struct sig_stats
|
|
{
|
|
int inv_sigs;
|
|
int no_key;
|
|
int oth_err;
|
|
};
|
|
|
|
/* The stream used to write attribute packets to. */
|
|
static estream_t attrib_fp;
|
|
|
|
|
|
/* List the keys. If list is NULL, all available keys are listed.
|
|
With LOCATE_MODE set the locate algorithm is used to find a
|
|
key. */
|
|
void
|
|
public_key_list (ctrl_t ctrl, strlist_t list, int locate_mode)
|
|
{
|
|
if (opt.with_colons)
|
|
{
|
|
byte trust_model, marginals, completes, cert_depth;
|
|
ulong created, nextcheck;
|
|
|
|
read_trust_options (&trust_model, &created, &nextcheck,
|
|
&marginals, &completes, &cert_depth);
|
|
|
|
es_fprintf (es_stdout, "tru:");
|
|
|
|
if (nextcheck && nextcheck <= make_timestamp ())
|
|
es_fprintf (es_stdout, "o");
|
|
if (trust_model != opt.trust_model)
|
|
es_fprintf (es_stdout, "t");
|
|
if (opt.trust_model == TM_PGP || opt.trust_model == TM_CLASSIC)
|
|
{
|
|
if (marginals != opt.marginals_needed)
|
|
es_fprintf (es_stdout, "m");
|
|
if (completes != opt.completes_needed)
|
|
es_fprintf (es_stdout, "c");
|
|
if (cert_depth != opt.max_cert_depth)
|
|
es_fprintf (es_stdout, "d");
|
|
}
|
|
|
|
es_fprintf (es_stdout, ":%d:%lu:%lu", trust_model, created, nextcheck);
|
|
|
|
/* Only show marginals, completes, and cert_depth in the classic
|
|
or PGP trust models since they are not meaningful
|
|
otherwise. */
|
|
|
|
if (trust_model == TM_PGP || trust_model == TM_CLASSIC)
|
|
es_fprintf (es_stdout, ":%d:%d:%d", marginals, completes, cert_depth);
|
|
|
|
es_fprintf (es_stdout, "\n");
|
|
}
|
|
|
|
/* We need to do the stale check right here because it might need to
|
|
update the keyring while we already have the keyring open. This
|
|
is very bad for W32 because of a sharing violation. For real OSes
|
|
it might lead to false results if we are later listing a keyring
|
|
which is associated with the inode of a deleted file. */
|
|
check_trustdb_stale ();
|
|
|
|
if (locate_mode)
|
|
locate_one (ctrl, list);
|
|
else if (!list)
|
|
list_all (0);
|
|
else
|
|
list_one (list, 0);
|
|
}
|
|
|
|
|
|
void
|
|
secret_key_list (ctrl_t ctrl, strlist_t list)
|
|
{
|
|
(void)ctrl;
|
|
|
|
check_trustdb_stale ();
|
|
|
|
if (!list)
|
|
list_all (1);
|
|
else /* List by user id */
|
|
list_one (list, 1);
|
|
}
|
|
|
|
void
|
|
print_seckey_info (PKT_public_key *pk)
|
|
{
|
|
u32 keyid[2];
|
|
char *p;
|
|
|
|
keyid_from_pk (pk, keyid);
|
|
p = get_user_id_native (keyid);
|
|
|
|
tty_printf ("\nsec %4u%c/%s %s %s\n",
|
|
nbits_from_pk (pk),
|
|
pubkey_letter (pk->pubkey_algo),
|
|
keystr (keyid), datestr_from_pk (pk), p);
|
|
|
|
xfree (p);
|
|
}
|
|
|
|
/* Print information about the public key. With FP passed as NULL,
|
|
the tty output interface is used, otherwise output is directted to
|
|
the given stream. */
|
|
void
|
|
print_pubkey_info (estream_t fp, PKT_public_key * pk)
|
|
{
|
|
u32 keyid[2];
|
|
char *p;
|
|
|
|
keyid_from_pk (pk, keyid);
|
|
|
|
/* If the pk was chosen by a particular user ID, that is the one to
|
|
print. */
|
|
if (pk->user_id)
|
|
p = utf8_to_native (pk->user_id->name, pk->user_id->len, 0);
|
|
else
|
|
p = get_user_id_native (keyid);
|
|
|
|
if (fp)
|
|
tty_printf ("\n");
|
|
tty_fprintf (fp, "pub %4u%c/%s %s %s\n",
|
|
nbits_from_pk (pk),
|
|
pubkey_letter (pk->pubkey_algo),
|
|
keystr (keyid), datestr_from_pk (pk), p);
|
|
xfree (p);
|
|
}
|
|
|
|
|
|
/* Print basic information of a secret key including the card serial
|
|
number information. */
|
|
#ifdef ENABLE_CARD_SUPPORT
|
|
void
|
|
print_card_key_info (estream_t fp, kbnode_t keyblock)
|
|
{
|
|
kbnode_t node;
|
|
char *hexgrip;
|
|
char *serialno;
|
|
int s2k_char;
|
|
|
|
for (node = keyblock; node; node = node->next)
|
|
{
|
|
if (node->pkt->pkttype == PKT_PUBLIC_KEY
|
|
|| node->pkt->pkttype == PKT_PUBLIC_SUBKEY)
|
|
{
|
|
int rc;
|
|
PKT_public_key *pk = node->pkt->pkt.public_key;
|
|
|
|
serialno = NULL;
|
|
rc = hexkeygrip_from_pk (pk, &hexgrip);
|
|
if (rc)
|
|
{
|
|
log_error ("error computing a keygrip: %s\n", gpg_strerror (rc));
|
|
s2k_char = '?';
|
|
}
|
|
else if (!agent_get_keyinfo (NULL, hexgrip, &serialno))
|
|
s2k_char = serialno? '>':' ';
|
|
else
|
|
s2k_char = '#'; /* Key not found. */
|
|
|
|
tty_fprintf (fp, "%s%c %4u%c/%s ",
|
|
node->pkt->pkttype == PKT_PUBLIC_KEY ? "sec" : "ssb",
|
|
s2k_char, nbits_from_pk (pk),
|
|
pubkey_letter (pk->pubkey_algo), keystr_from_pk (pk));
|
|
tty_fprintf (fp, _("created: %s"), datestr_from_pk (pk));
|
|
tty_fprintf (fp, " ");
|
|
tty_fprintf (fp, _("expires: %s"), expirestr_from_pk (pk));
|
|
if (serialno)
|
|
{
|
|
tty_fprintf (fp, "\n ");
|
|
tty_fprintf (fp, _("card-no: "));
|
|
if (strlen (serialno) == 32
|
|
&& !strncmp (serialno, "D27600012401", 12))
|
|
{
|
|
/* This is an OpenPGP card. Print the relevant part. */
|
|
/* Example: D2760001240101010001000003470000 */
|
|
/* xxxxyyyyyyyy */
|
|
tty_fprintf (fp, "%.*s %.*s", 4, serialno+16, 8, serialno+20);
|
|
}
|
|
else
|
|
tty_fprintf (fp, "%s", serialno);
|
|
}
|
|
tty_fprintf (fp, "\n");
|
|
xfree (hexgrip);
|
|
xfree (serialno);
|
|
}
|
|
}
|
|
}
|
|
#endif /*ENABLE_CARD_SUPPORT*/
|
|
|
|
|
|
/* Flags = 0x01 hashed 0x02 critical. */
|
|
static void
|
|
status_one_subpacket (sigsubpkttype_t type, size_t len, int flags,
|
|
const byte * buf)
|
|
{
|
|
char status[40];
|
|
|
|
/* Don't print these. */
|
|
if (len > 256)
|
|
return;
|
|
|
|
snprintf (status, sizeof status,
|
|
"%d %u %u ", type, flags, (unsigned int) len);
|
|
|
|
write_status_text_and_buffer (STATUS_SIG_SUBPACKET, status, buf, len, 0);
|
|
}
|
|
|
|
|
|
/* Print a policy URL. Allowed values for MODE are:
|
|
* 0 - print to stdout.
|
|
* 1 - use log_info and emit status messages.
|
|
* 2 - emit only status messages.
|
|
*/
|
|
void
|
|
show_policy_url (PKT_signature * sig, int indent, int mode)
|
|
{
|
|
const byte *p;
|
|
size_t len;
|
|
int seq = 0, crit;
|
|
estream_t fp = mode ? log_get_stream () : es_stdout;
|
|
|
|
while ((p =
|
|
enum_sig_subpkt (sig->hashed, SIGSUBPKT_POLICY, &len, &seq, &crit)))
|
|
{
|
|
if (mode != 2)
|
|
{
|
|
int i;
|
|
const char *str;
|
|
|
|
for (i = 0; i < indent; i++)
|
|
es_putc (' ', fp);
|
|
|
|
if (crit)
|
|
str = _("Critical signature policy: ");
|
|
else
|
|
str = _("Signature policy: ");
|
|
if (mode)
|
|
log_info ("%s", str);
|
|
else
|
|
es_fprintf (fp, "%s", str);
|
|
print_utf8_buffer (fp, p, len);
|
|
es_fprintf (fp, "\n");
|
|
}
|
|
|
|
if (mode)
|
|
write_status_buffer (STATUS_POLICY_URL, p, len, 0);
|
|
}
|
|
}
|
|
|
|
|
|
/*
|
|
mode=0 for stdout.
|
|
mode=1 for log_info + status messages
|
|
mode=2 for status messages only
|
|
*/
|
|
/* TODO: use this */
|
|
void
|
|
show_keyserver_url (PKT_signature * sig, int indent, int mode)
|
|
{
|
|
const byte *p;
|
|
size_t len;
|
|
int seq = 0, crit;
|
|
estream_t fp = mode ? log_get_stream () : es_stdout;
|
|
|
|
while ((p =
|
|
enum_sig_subpkt (sig->hashed, SIGSUBPKT_PREF_KS, &len, &seq,
|
|
&crit)))
|
|
{
|
|
if (mode != 2)
|
|
{
|
|
int i;
|
|
const char *str;
|
|
|
|
for (i = 0; i < indent; i++)
|
|
es_putc (' ', es_stdout);
|
|
|
|
if (crit)
|
|
str = _("Critical preferred keyserver: ");
|
|
else
|
|
str = _("Preferred keyserver: ");
|
|
if (mode)
|
|
log_info ("%s", str);
|
|
else
|
|
es_fprintf (es_stdout, "%s", str);
|
|
print_utf8_buffer (fp, p, len);
|
|
es_fprintf (fp, "\n");
|
|
}
|
|
|
|
if (mode)
|
|
status_one_subpacket (SIGSUBPKT_PREF_KS, len,
|
|
(crit ? 0x02 : 0) | 0x01, p);
|
|
}
|
|
}
|
|
|
|
/*
|
|
mode=0 for stdout.
|
|
mode=1 for log_info + status messages
|
|
mode=2 for status messages only
|
|
|
|
Defined bits in WHICH:
|
|
1 == standard notations
|
|
2 == user notations
|
|
*/
|
|
void
|
|
show_notation (PKT_signature * sig, int indent, int mode, int which)
|
|
{
|
|
estream_t fp = mode ? log_get_stream () : es_stdout;
|
|
struct notation *nd, *notations;
|
|
|
|
if (which == 0)
|
|
which = 3;
|
|
|
|
notations = sig_to_notation (sig);
|
|
|
|
/* There may be multiple notations in the same sig. */
|
|
for (nd = notations; nd; nd = nd->next)
|
|
{
|
|
if (mode != 2)
|
|
{
|
|
int has_at = !!strchr (nd->name, '@');
|
|
|
|
if ((which & 1 && !has_at) || (which & 2 && has_at))
|
|
{
|
|
int i;
|
|
const char *str;
|
|
|
|
for (i = 0; i < indent; i++)
|
|
es_putc (' ', es_stdout);
|
|
|
|
if (nd->flags.critical)
|
|
str = _("Critical signature notation: ");
|
|
else
|
|
str = _("Signature notation: ");
|
|
if (mode)
|
|
log_info ("%s", str);
|
|
else
|
|
es_fprintf (es_stdout, "%s", str);
|
|
/* This is all UTF8 */
|
|
print_utf8_buffer (fp, nd->name, strlen (nd->name));
|
|
es_fprintf (fp, "=");
|
|
print_utf8_buffer (fp, nd->value, strlen (nd->value));
|
|
es_fprintf (fp, "\n");
|
|
}
|
|
}
|
|
|
|
if (mode)
|
|
{
|
|
write_status_buffer (STATUS_NOTATION_NAME,
|
|
nd->name, strlen (nd->name), 0);
|
|
write_status_buffer (STATUS_NOTATION_DATA,
|
|
nd->value, strlen (nd->value), 50);
|
|
}
|
|
}
|
|
|
|
free_notation (notations);
|
|
}
|
|
|
|
static void
|
|
print_signature_stats (struct sig_stats *s)
|
|
{
|
|
if (s->inv_sigs == 1)
|
|
tty_printf (_("1 bad signature\n"));
|
|
else if (s->inv_sigs)
|
|
tty_printf (_("%d bad signatures\n"), s->inv_sigs);
|
|
if (s->no_key == 1)
|
|
tty_printf (_("1 signature not checked due to a missing key\n"));
|
|
else if (s->no_key)
|
|
tty_printf (_("%d signatures not checked due to missing keys\n"),
|
|
s->no_key);
|
|
if (s->oth_err == 1)
|
|
tty_printf (_("1 signature not checked due to an error\n"));
|
|
else if (s->oth_err)
|
|
tty_printf (_("%d signatures not checked due to errors\n"), s->oth_err);
|
|
}
|
|
|
|
static void
|
|
list_all (int secret)
|
|
{
|
|
KEYDB_HANDLE hd;
|
|
KBNODE keyblock = NULL;
|
|
int rc = 0;
|
|
const char *lastresname, *resname;
|
|
struct sig_stats stats;
|
|
|
|
memset (&stats, 0, sizeof (stats));
|
|
|
|
hd = keydb_new ();
|
|
if (!hd)
|
|
rc = gpg_error (GPG_ERR_GENERAL);
|
|
else
|
|
rc = keydb_search_first (hd);
|
|
if (rc)
|
|
{
|
|
if (gpg_err_code (rc) != GPG_ERR_NOT_FOUND)
|
|
log_error ("keydb_search_first failed: %s\n", g10_errstr (rc));
|
|
goto leave;
|
|
}
|
|
|
|
lastresname = NULL;
|
|
do
|
|
{
|
|
rc = keydb_get_keyblock (hd, &keyblock);
|
|
if (rc)
|
|
{
|
|
log_error ("keydb_get_keyblock failed: %s\n", g10_errstr (rc));
|
|
goto leave;
|
|
}
|
|
if (secret && agent_probe_any_secret_key (NULL, keyblock))
|
|
; /* Secret key listing requested but this isn't one. */
|
|
else
|
|
{
|
|
if (!opt.with_colons)
|
|
{
|
|
resname = keydb_get_resource_name (hd);
|
|
if (lastresname != resname)
|
|
{
|
|
int i;
|
|
|
|
es_fprintf (es_stdout, "%s\n", resname);
|
|
for (i = strlen (resname); i; i--)
|
|
es_putc ('-', es_stdout);
|
|
es_putc ('\n', es_stdout);
|
|
lastresname = resname;
|
|
}
|
|
}
|
|
merge_keys_and_selfsig (keyblock);
|
|
list_keyblock (keyblock, secret, opt.fingerprint,
|
|
opt.check_sigs ? &stats : NULL);
|
|
}
|
|
release_kbnode (keyblock);
|
|
keyblock = NULL;
|
|
}
|
|
while (!(rc = keydb_search_next (hd)));
|
|
if (rc && gpg_err_code (rc) != GPG_ERR_NOT_FOUND)
|
|
log_error ("keydb_search_next failed: %s\n", g10_errstr (rc));
|
|
|
|
if (opt.check_sigs && !opt.with_colons)
|
|
print_signature_stats (&stats);
|
|
|
|
leave:
|
|
release_kbnode (keyblock);
|
|
keydb_release (hd);
|
|
}
|
|
|
|
|
|
static void
|
|
list_one (strlist_t names, int secret)
|
|
{
|
|
int rc = 0;
|
|
KBNODE keyblock = NULL;
|
|
GETKEY_CTX ctx;
|
|
const char *resname;
|
|
const char *keyring_str = _("Keyring");
|
|
int i;
|
|
struct sig_stats stats;
|
|
|
|
memset (&stats, 0, sizeof (stats));
|
|
|
|
/* fixme: using the bynames function has the disadvantage that we
|
|
* don't know wether one of the names given was not found. OTOH,
|
|
* this function has the advantage to list the names in the
|
|
* sequence as defined by the keyDB and does not duplicate
|
|
* outputs. A solution could be do test whether all given have
|
|
* been listed (this needs a way to use the keyDB search
|
|
* functions) or to have the search function return indicators for
|
|
* found names. Yet another way is to use the keydb search
|
|
* facilities directly. */
|
|
rc = getkey_bynames (&ctx, NULL, names, secret, &keyblock);
|
|
if (rc)
|
|
{
|
|
log_error ("error reading key: %s\n", g10_errstr (rc));
|
|
get_pubkey_end (ctx);
|
|
return;
|
|
}
|
|
|
|
do
|
|
{
|
|
if ((opt.list_options & LIST_SHOW_KEYRING) && !opt.with_colons)
|
|
{
|
|
resname = keydb_get_resource_name (get_ctx_handle (ctx));
|
|
es_fprintf (es_stdout, "%s: %s\n", keyring_str, resname);
|
|
for (i = strlen (resname) + strlen (keyring_str) + 2; i; i--)
|
|
es_putc ('-', es_stdout);
|
|
es_putc ('\n', es_stdout);
|
|
}
|
|
list_keyblock (keyblock, secret, opt.fingerprint,
|
|
(!secret && opt.check_sigs)? &stats : NULL);
|
|
release_kbnode (keyblock);
|
|
}
|
|
while (!getkey_next (ctx, NULL, &keyblock));
|
|
getkey_end (ctx);
|
|
|
|
if (opt.check_sigs && !opt.with_colons)
|
|
print_signature_stats (&stats);
|
|
}
|
|
|
|
|
|
static void
|
|
locate_one (ctrl_t ctrl, strlist_t names)
|
|
{
|
|
int rc = 0;
|
|
strlist_t sl;
|
|
GETKEY_CTX ctx = NULL;
|
|
KBNODE keyblock = NULL;
|
|
struct sig_stats stats;
|
|
|
|
memset (&stats, 0, sizeof (stats));
|
|
|
|
for (sl = names; sl; sl = sl->next)
|
|
{
|
|
rc = get_pubkey_byname (ctrl, &ctx, NULL, sl->d, &keyblock, NULL, 1, 0);
|
|
if (rc)
|
|
{
|
|
if (gpg_err_code (rc) != GPG_ERR_NO_PUBKEY)
|
|
log_error ("error reading key: %s\n", g10_errstr (rc));
|
|
}
|
|
else
|
|
{
|
|
do
|
|
{
|
|
list_keyblock (keyblock, 0, opt.fingerprint,
|
|
opt.check_sigs ? &stats : NULL);
|
|
release_kbnode (keyblock);
|
|
}
|
|
while (ctx && !get_pubkey_next (ctx, NULL, &keyblock));
|
|
get_pubkey_end (ctx);
|
|
ctx = NULL;
|
|
}
|
|
}
|
|
|
|
if (opt.check_sigs && !opt.with_colons)
|
|
print_signature_stats (&stats);
|
|
}
|
|
|
|
|
|
static void
|
|
print_key_data (PKT_public_key * pk)
|
|
{
|
|
int n = pk ? pubkey_get_npkey (pk->pubkey_algo) : 0;
|
|
int i;
|
|
|
|
for (i = 0; i < n; i++)
|
|
{
|
|
es_fprintf (es_stdout, "pkd:%d:%u:", i, mpi_get_nbits (pk->pkey[i]));
|
|
mpi_print (es_stdout, pk->pkey[i], 1);
|
|
es_putc (':', es_stdout);
|
|
es_putc ('\n', es_stdout);
|
|
}
|
|
}
|
|
|
|
static void
|
|
print_capabilities (PKT_public_key *pk, KBNODE keyblock)
|
|
{
|
|
unsigned int use = pk->pubkey_usage;
|
|
int c_printed = 0;
|
|
|
|
if (use & PUBKEY_USAGE_ENC)
|
|
es_putc ('e', es_stdout);
|
|
|
|
if (use & PUBKEY_USAGE_SIG)
|
|
{
|
|
es_putc ('s', es_stdout);
|
|
if (pk->flags.primary)
|
|
{
|
|
es_putc ('c', es_stdout);
|
|
/* The PUBKEY_USAGE_CERT flag was introduced later and we
|
|
used to always print 'c' for a primary key. To avoid any
|
|
regression here we better track whether we printed 'c'
|
|
already. */
|
|
c_printed = 1;
|
|
}
|
|
}
|
|
|
|
if ((use & PUBKEY_USAGE_CERT) && !c_printed)
|
|
es_putc ('c', es_stdout);
|
|
|
|
if ((use & PUBKEY_USAGE_AUTH))
|
|
es_putc ('a', es_stdout);
|
|
|
|
if (keyblock)
|
|
{
|
|
/* Figure out the usable capabilities. */
|
|
KBNODE k;
|
|
int enc = 0, sign = 0, cert = 0, auth = 0, disabled = 0;
|
|
|
|
for (k = keyblock; k; k = k->next)
|
|
{
|
|
if (k->pkt->pkttype == PKT_PUBLIC_KEY
|
|
|| k->pkt->pkttype == PKT_PUBLIC_SUBKEY)
|
|
{
|
|
pk = k->pkt->pkt.public_key;
|
|
|
|
if (pk->flags.primary)
|
|
disabled = pk_is_disabled (pk);
|
|
|
|
if (pk->flags.valid && !pk->flags.revoked && !pk->has_expired)
|
|
{
|
|
if (pk->pubkey_usage & PUBKEY_USAGE_ENC)
|
|
enc = 1;
|
|
if (pk->pubkey_usage & PUBKEY_USAGE_SIG)
|
|
{
|
|
sign = 1;
|
|
if (pk->flags.primary)
|
|
cert = 1;
|
|
}
|
|
if (pk->pubkey_usage & PUBKEY_USAGE_CERT)
|
|
cert = 1;
|
|
if ((pk->pubkey_usage & PUBKEY_USAGE_AUTH))
|
|
auth = 1;
|
|
}
|
|
}
|
|
}
|
|
if (enc)
|
|
es_putc ('E', es_stdout);
|
|
if (sign)
|
|
es_putc ('S', es_stdout);
|
|
if (cert)
|
|
es_putc ('C', es_stdout);
|
|
if (auth)
|
|
es_putc ('A', es_stdout);
|
|
if (disabled)
|
|
es_putc ('D', es_stdout);
|
|
}
|
|
|
|
es_putc (':', es_stdout);
|
|
}
|
|
|
|
|
|
/* FLAGS: 0x01 hashed
|
|
0x02 critical */
|
|
static void
|
|
print_one_subpacket (sigsubpkttype_t type, size_t len, int flags,
|
|
const byte * buf)
|
|
{
|
|
size_t i;
|
|
|
|
es_fprintf (es_stdout, "spk:%d:%u:%u:", type, flags, (unsigned int) len);
|
|
|
|
for (i = 0; i < len; i++)
|
|
{
|
|
/* printable ascii other than : and % */
|
|
if (buf[i] >= 32 && buf[i] <= 126 && buf[i] != ':' && buf[i] != '%')
|
|
es_fprintf (es_stdout, "%c", buf[i]);
|
|
else
|
|
es_fprintf (es_stdout, "%%%02X", buf[i]);
|
|
}
|
|
|
|
es_fprintf (es_stdout, "\n");
|
|
}
|
|
|
|
|
|
void
|
|
print_subpackets_colon (PKT_signature * sig)
|
|
{
|
|
byte *i;
|
|
|
|
assert (opt.show_subpackets);
|
|
|
|
for (i = opt.show_subpackets; *i; i++)
|
|
{
|
|
const byte *p;
|
|
size_t len;
|
|
int seq, crit;
|
|
|
|
seq = 0;
|
|
|
|
while ((p = enum_sig_subpkt (sig->hashed, *i, &len, &seq, &crit)))
|
|
print_one_subpacket (*i, len, 0x01 | (crit ? 0x02 : 0), p);
|
|
|
|
seq = 0;
|
|
|
|
while ((p = enum_sig_subpkt (sig->unhashed, *i, &len, &seq, &crit)))
|
|
print_one_subpacket (*i, len, 0x00 | (crit ? 0x02 : 0), p);
|
|
}
|
|
}
|
|
|
|
|
|
void
|
|
dump_attribs (const PKT_user_id *uid, PKT_public_key *pk)
|
|
{
|
|
int i;
|
|
|
|
if (!attrib_fp)
|
|
return;
|
|
|
|
for (i = 0; i < uid->numattribs; i++)
|
|
{
|
|
if (is_status_enabled ())
|
|
{
|
|
byte array[MAX_FINGERPRINT_LEN], *p;
|
|
char buf[(MAX_FINGERPRINT_LEN * 2) + 90];
|
|
size_t j, n;
|
|
|
|
if (!pk)
|
|
BUG ();
|
|
fingerprint_from_pk (pk, array, &n);
|
|
|
|
p = array;
|
|
for (j = 0; j < n; j++, p++)
|
|
sprintf (buf + 2 * j, "%02X", *p);
|
|
|
|
sprintf (buf + strlen (buf), " %lu %u %u %u %lu %lu %u",
|
|
(ulong) uid->attribs[i].len, uid->attribs[i].type, i + 1,
|
|
uid->numattribs, (ulong) uid->created,
|
|
(ulong) uid->expiredate,
|
|
((uid->is_primary ? 0x01 : 0) | (uid->
|
|
is_revoked ? 0x02 : 0) |
|
|
(uid->is_expired ? 0x04 : 0)));
|
|
write_status_text (STATUS_ATTRIBUTE, buf);
|
|
}
|
|
|
|
es_fwrite (uid->attribs[i].data, uid->attribs[i].len, 1, attrib_fp);
|
|
es_fflush (attrib_fp);
|
|
}
|
|
}
|
|
|
|
|
|
static void
|
|
list_keyblock_print (KBNODE keyblock, int secret, int fpr, void *opaque)
|
|
{
|
|
int rc;
|
|
KBNODE kbctx;
|
|
KBNODE node;
|
|
PKT_public_key *pk;
|
|
struct sig_stats *stats = opaque;
|
|
int skip_sigs = 0;
|
|
int s2k_char;
|
|
char *hexgrip = NULL;
|
|
char *serialno = NULL;
|
|
|
|
/* Get the keyid from the keyblock. */
|
|
node = find_kbnode (keyblock, PKT_PUBLIC_KEY);
|
|
if (!node)
|
|
{
|
|
log_error ("Oops; key lost!\n");
|
|
dump_kbnode (keyblock);
|
|
return;
|
|
}
|
|
|
|
pk = node->pkt->pkt.public_key;
|
|
|
|
if (secret || opt.with_keygrip)
|
|
{
|
|
rc = hexkeygrip_from_pk (pk, &hexgrip);
|
|
if (rc)
|
|
log_error ("error computing a keygrip: %s\n", gpg_strerror (rc));
|
|
}
|
|
|
|
if (secret)
|
|
{
|
|
if (!agent_get_keyinfo (NULL, hexgrip, &serialno))
|
|
s2k_char = serialno? '>':' ';
|
|
else
|
|
s2k_char = '#'; /* Key not found. */
|
|
}
|
|
else
|
|
s2k_char = ' ';
|
|
|
|
check_trustdb_stale ();
|
|
|
|
es_fprintf (es_stdout, "%s%c %4u%c/%s %s",
|
|
secret? "sec":"pub",
|
|
s2k_char,
|
|
nbits_from_pk (pk), pubkey_letter (pk->pubkey_algo),
|
|
keystr_from_pk (pk), datestr_from_pk (pk));
|
|
|
|
if (pk->flags.revoked)
|
|
{
|
|
es_fprintf (es_stdout, " [");
|
|
es_fprintf (es_stdout, _("revoked: %s"), revokestr_from_pk (pk));
|
|
es_fprintf (es_stdout, "]");
|
|
}
|
|
else if (pk->has_expired)
|
|
{
|
|
es_fprintf (es_stdout, " [");
|
|
es_fprintf (es_stdout, _("expired: %s"), expirestr_from_pk (pk));
|
|
es_fprintf (es_stdout, "]");
|
|
}
|
|
else if (pk->expiredate)
|
|
{
|
|
es_fprintf (es_stdout, " [");
|
|
es_fprintf (es_stdout, _("expires: %s"), expirestr_from_pk (pk));
|
|
es_fprintf (es_stdout, "]");
|
|
}
|
|
|
|
#if 0
|
|
/* I need to think about this some more. It's easy enough to
|
|
include, but it looks sort of confusing in the listing... */
|
|
if (opt.list_options & LIST_SHOW_VALIDITY)
|
|
{
|
|
int validity = get_validity (pk, NULL);
|
|
es_fprintf (es_stdout, " [%s]", trust_value_to_string (validity));
|
|
}
|
|
#endif
|
|
|
|
es_fprintf (es_stdout, "\n");
|
|
|
|
if (fpr)
|
|
print_fingerprint (pk, 0);
|
|
|
|
if (opt.with_keygrip && hexgrip)
|
|
es_fprintf (es_stdout, " Keygrip = %s\n", hexgrip);
|
|
|
|
if (serialno)
|
|
print_card_serialno (serialno);
|
|
|
|
if (opt.with_key_data)
|
|
print_key_data (pk);
|
|
|
|
for (kbctx = NULL; (node = walk_kbnode (keyblock, &kbctx, 0));)
|
|
{
|
|
if (node->pkt->pkttype == PKT_USER_ID && !opt.fast_list_mode)
|
|
{
|
|
PKT_user_id *uid = node->pkt->pkt.user_id;
|
|
|
|
if (pk && (uid->is_expired || uid->is_revoked)
|
|
&& !(opt.list_options & LIST_SHOW_UNUSABLE_UIDS))
|
|
{
|
|
skip_sigs = 1;
|
|
continue;
|
|
}
|
|
else
|
|
skip_sigs = 0;
|
|
|
|
if (attrib_fp && uid->attrib_data != NULL)
|
|
dump_attribs (uid, pk);
|
|
|
|
if ((uid->is_revoked || uid->is_expired)
|
|
|| ((opt.list_options & LIST_SHOW_UID_VALIDITY) && pk))
|
|
{
|
|
const char *validity;
|
|
int indent;
|
|
|
|
validity = uid_trust_string_fixed (pk, uid);
|
|
indent =
|
|
(keystrlen () + 9) -
|
|
atoi (uid_trust_string_fixed (NULL, NULL));
|
|
|
|
if (indent < 0 || indent > 40)
|
|
indent = 0;
|
|
|
|
es_fprintf (es_stdout, "uid%*s%s ", indent, "", validity);
|
|
}
|
|
else
|
|
es_fprintf (es_stdout, "uid%*s", (int) keystrlen () + 10, "");
|
|
|
|
print_utf8_buffer (es_stdout, uid->name, uid->len);
|
|
es_putc ('\n', es_stdout);
|
|
|
|
if ((opt.list_options & LIST_SHOW_PHOTOS) && uid->attribs != NULL)
|
|
show_photos (uid->attribs, uid->numattribs, pk, uid);
|
|
}
|
|
else if (node->pkt->pkttype == PKT_PUBLIC_SUBKEY)
|
|
{
|
|
PKT_public_key *pk2 = node->pkt->pkt.public_key;
|
|
|
|
if ((pk2->flags.revoked || pk2->has_expired)
|
|
&& !(opt.list_options & LIST_SHOW_UNUSABLE_SUBKEYS))
|
|
{
|
|
skip_sigs = 1;
|
|
continue;
|
|
}
|
|
else
|
|
skip_sigs = 0;
|
|
|
|
xfree (serialno); serialno = NULL;
|
|
xfree (hexgrip); hexgrip = NULL;
|
|
if (secret || opt.with_keygrip)
|
|
{
|
|
rc = hexkeygrip_from_pk (pk2, &hexgrip);
|
|
if (rc)
|
|
log_error ("error computing a keygrip: %s\n",
|
|
gpg_strerror (rc));
|
|
}
|
|
if (secret)
|
|
{
|
|
if (!agent_get_keyinfo (NULL, hexgrip, &serialno))
|
|
s2k_char = serialno? '>':' ';
|
|
else
|
|
s2k_char = '#'; /* Key not found. */
|
|
}
|
|
else
|
|
s2k_char = ' ';
|
|
|
|
es_fprintf (es_stdout, "%s%c %4u%c/%s %s",
|
|
secret? "ssb":"sub",
|
|
s2k_char,
|
|
nbits_from_pk (pk2), pubkey_letter (pk2->pubkey_algo),
|
|
keystr_from_pk (pk2), datestr_from_pk (pk2));
|
|
if (pk2->flags.revoked)
|
|
{
|
|
es_fprintf (es_stdout, " [");
|
|
es_fprintf (es_stdout, _("revoked: %s"), revokestr_from_pk (pk2));
|
|
es_fprintf (es_stdout, "]");
|
|
}
|
|
else if (pk2->has_expired)
|
|
{
|
|
es_fprintf (es_stdout, " [");
|
|
es_fprintf (es_stdout, _("expired: %s"), expirestr_from_pk (pk2));
|
|
es_fprintf (es_stdout, "]");
|
|
}
|
|
else if (pk2->expiredate)
|
|
{
|
|
es_fprintf (es_stdout, " [");
|
|
es_fprintf (es_stdout, _("expires: %s"), expirestr_from_pk (pk2));
|
|
es_fprintf (es_stdout, "]");
|
|
}
|
|
es_putc ('\n', es_stdout);
|
|
if (fpr > 1)
|
|
{
|
|
print_fingerprint (pk2, 0);
|
|
if (serialno)
|
|
print_card_serialno (serialno);
|
|
}
|
|
if (opt.with_keygrip && hexgrip)
|
|
es_fprintf (es_stdout, " Keygrip = %s\n", hexgrip);
|
|
if (opt.with_key_data)
|
|
print_key_data (pk2);
|
|
}
|
|
else if (opt.list_sigs
|
|
&& node->pkt->pkttype == PKT_SIGNATURE && !skip_sigs)
|
|
{
|
|
PKT_signature *sig = node->pkt->pkt.signature;
|
|
int sigrc;
|
|
char *sigstr;
|
|
|
|
if (stats)
|
|
{
|
|
rc = check_key_signature (keyblock, node, NULL);
|
|
switch (gpg_err_code (rc))
|
|
{
|
|
case 0:
|
|
sigrc = '!';
|
|
break;
|
|
case GPG_ERR_BAD_SIGNATURE:
|
|
stats->inv_sigs++;
|
|
sigrc = '-';
|
|
break;
|
|
case GPG_ERR_NO_PUBKEY:
|
|
case GPG_ERR_UNUSABLE_PUBKEY:
|
|
stats->no_key++;
|
|
continue;
|
|
default:
|
|
stats->oth_err++;
|
|
sigrc = '%';
|
|
break;
|
|
}
|
|
|
|
/* TODO: Make sure a cached sig record here still has
|
|
the pk that issued it. See also
|
|
keyedit.c:print_and_check_one_sig */
|
|
}
|
|
else
|
|
{
|
|
rc = 0;
|
|
sigrc = ' ';
|
|
}
|
|
|
|
if (sig->sig_class == 0x20 || sig->sig_class == 0x28
|
|
|| sig->sig_class == 0x30)
|
|
sigstr = "rev";
|
|
else if ((sig->sig_class & ~3) == 0x10)
|
|
sigstr = "sig";
|
|
else if (sig->sig_class == 0x18)
|
|
sigstr = "sig";
|
|
else if (sig->sig_class == 0x1F)
|
|
sigstr = "sig";
|
|
else
|
|
{
|
|
es_fprintf (es_stdout, "sig "
|
|
"[unexpected signature class 0x%02x]\n",
|
|
sig->sig_class);
|
|
continue;
|
|
}
|
|
|
|
es_fputs (sigstr, es_stdout);
|
|
es_fprintf (es_stdout, "%c%c %c%c%c%c%c%c %s %s",
|
|
sigrc, (sig->sig_class - 0x10 > 0 &&
|
|
sig->sig_class - 0x10 <
|
|
4) ? '0' + sig->sig_class - 0x10 : ' ',
|
|
sig->flags.exportable ? ' ' : 'L',
|
|
sig->flags.revocable ? ' ' : 'R',
|
|
sig->flags.policy_url ? 'P' : ' ',
|
|
sig->flags.notation ? 'N' : ' ',
|
|
sig->flags.expired ? 'X' : ' ',
|
|
(sig->trust_depth > 9) ? 'T' : (sig->trust_depth >
|
|
0) ? '0' +
|
|
sig->trust_depth : ' ', keystr (sig->keyid),
|
|
datestr_from_sig (sig));
|
|
if (opt.list_options & LIST_SHOW_SIG_EXPIRE)
|
|
es_fprintf (es_stdout, " %s", expirestr_from_sig (sig));
|
|
es_fprintf (es_stdout, " ");
|
|
if (sigrc == '%')
|
|
es_fprintf (es_stdout, "[%s] ", g10_errstr (rc));
|
|
else if (sigrc == '?')
|
|
;
|
|
else if (!opt.fast_list_mode)
|
|
{
|
|
size_t n;
|
|
char *p = get_user_id (sig->keyid, &n);
|
|
print_utf8_buffer (es_stdout, p, n);
|
|
xfree (p);
|
|
}
|
|
es_putc ('\n', es_stdout);
|
|
|
|
if (sig->flags.policy_url
|
|
&& (opt.list_options & LIST_SHOW_POLICY_URLS))
|
|
show_policy_url (sig, 3, 0);
|
|
|
|
if (sig->flags.notation && (opt.list_options & LIST_SHOW_NOTATIONS))
|
|
show_notation (sig, 3, 0,
|
|
((opt.
|
|
list_options & LIST_SHOW_STD_NOTATIONS) ? 1 : 0)
|
|
+
|
|
((opt.
|
|
list_options & LIST_SHOW_USER_NOTATIONS) ? 2 :
|
|
0));
|
|
|
|
if (sig->flags.pref_ks
|
|
&& (opt.list_options & LIST_SHOW_KEYSERVER_URLS))
|
|
show_keyserver_url (sig, 3, 0);
|
|
|
|
/* fixme: check or list other sigs here */
|
|
}
|
|
}
|
|
es_putc ('\n', es_stdout);
|
|
xfree (serialno);
|
|
xfree (hexgrip);
|
|
}
|
|
|
|
void
|
|
print_revokers (PKT_public_key * pk)
|
|
{
|
|
/* print the revoker record */
|
|
if (!pk->revkey && pk->numrevkeys)
|
|
BUG ();
|
|
else
|
|
{
|
|
int i, j;
|
|
|
|
for (i = 0; i < pk->numrevkeys; i++)
|
|
{
|
|
byte *p;
|
|
|
|
es_fprintf (es_stdout, "rvk:::%d::::::", pk->revkey[i].algid);
|
|
p = pk->revkey[i].fpr;
|
|
for (j = 0; j < 20; j++, p++)
|
|
es_fprintf (es_stdout, "%02X", *p);
|
|
es_fprintf (es_stdout, ":%02x%s:\n", pk->revkey[i].class,
|
|
(pk->revkey[i].class & 0x40) ? "s" : "");
|
|
}
|
|
}
|
|
}
|
|
|
|
static void
|
|
list_keyblock_colon (KBNODE keyblock, int secret, int fpr)
|
|
{
|
|
int rc;
|
|
KBNODE kbctx;
|
|
KBNODE node;
|
|
PKT_public_key *pk;
|
|
u32 keyid[2];
|
|
int trustletter = 0;
|
|
int ulti_hack = 0;
|
|
int i;
|
|
char *p;
|
|
char *hexgrip = NULL;
|
|
char *serialno = NULL;
|
|
int stubkey;
|
|
|
|
/* Get the keyid from the keyblock. */
|
|
node = find_kbnode (keyblock, PKT_PUBLIC_KEY);
|
|
if (!node)
|
|
{
|
|
log_error ("Oops; key lost!\n");
|
|
dump_kbnode (keyblock);
|
|
return;
|
|
}
|
|
|
|
pk = node->pkt->pkt.public_key;
|
|
if (secret || opt.with_keygrip || opt.with_key_data)
|
|
{
|
|
rc = hexkeygrip_from_pk (pk, &hexgrip);
|
|
if (rc)
|
|
log_error ("error computing a keygrip: %s\n", gpg_strerror (rc));
|
|
}
|
|
stubkey = 0;
|
|
if (secret && agent_get_keyinfo (NULL, hexgrip, &serialno))
|
|
stubkey = 1; /* Key not found. */
|
|
|
|
keyid_from_pk (pk, keyid);
|
|
es_fputs (secret? "sec:":"pub:", es_stdout);
|
|
if (!pk->flags.valid)
|
|
es_putc ('i', es_stdout);
|
|
else if (pk->flags.revoked)
|
|
es_putc ('r', es_stdout);
|
|
else if (pk->has_expired)
|
|
es_putc ('e', es_stdout);
|
|
else if (opt.fast_list_mode || opt.no_expensive_trust_checks)
|
|
;
|
|
else
|
|
{
|
|
trustletter = get_validity_info (pk, NULL);
|
|
if (trustletter == 'u')
|
|
ulti_hack = 1;
|
|
es_putc (trustletter, es_stdout);
|
|
}
|
|
|
|
es_fprintf (es_stdout, ":%u:%d:%08lX%08lX:%s:%s::",
|
|
nbits_from_pk (pk),
|
|
pk->pubkey_algo,
|
|
(ulong) keyid[0], (ulong) keyid[1],
|
|
colon_datestr_from_pk (pk), colon_strtime (pk->expiredate));
|
|
|
|
if (!opt.fast_list_mode && !opt.no_expensive_trust_checks)
|
|
es_putc (get_ownertrust_info (pk), es_stdout);
|
|
es_putc (':', es_stdout);
|
|
|
|
es_putc (':', es_stdout);
|
|
es_putc (':', es_stdout);
|
|
print_capabilities (pk, keyblock);
|
|
if (secret)
|
|
{
|
|
es_putc (':', es_stdout); /* End of field 13. */
|
|
es_putc (':', es_stdout); /* End of field 14. */
|
|
if (stubkey)
|
|
es_putc ('#', es_stdout);
|
|
else if (serialno)
|
|
es_fputs(serialno, es_stdout);
|
|
es_putc (':', es_stdout); /* End of field 15. */
|
|
}
|
|
es_putc ('\n', es_stdout);
|
|
|
|
print_revokers (pk);
|
|
if (fpr)
|
|
print_fingerprint (pk, 0);
|
|
if (opt.with_key_data || opt.with_keygrip)
|
|
{
|
|
if (hexgrip)
|
|
es_fprintf (es_stdout, "grp:::::::::%s:\n", hexgrip);
|
|
if (opt.with_key_data)
|
|
print_key_data (pk);
|
|
}
|
|
|
|
for (kbctx = NULL; (node = walk_kbnode (keyblock, &kbctx, 0));)
|
|
{
|
|
if (node->pkt->pkttype == PKT_USER_ID && !opt.fast_list_mode)
|
|
{
|
|
char *str;
|
|
PKT_user_id *uid = node->pkt->pkt.user_id;
|
|
|
|
if (attrib_fp && node->pkt->pkt.user_id->attrib_data != NULL)
|
|
dump_attribs (node->pkt->pkt.user_id, pk);
|
|
/*
|
|
* Fixme: We need a valid flag here too
|
|
*/
|
|
str = uid->attrib_data ? "uat" : "uid";
|
|
if (uid->is_revoked)
|
|
es_fprintf (es_stdout, "%s:r::::", str);
|
|
else if (uid->is_expired)
|
|
es_fprintf (es_stdout, "%s:e::::", str);
|
|
else if (opt.no_expensive_trust_checks)
|
|
es_fprintf (es_stdout, "%s:::::", str);
|
|
else
|
|
{
|
|
int uid_validity;
|
|
|
|
if (pk && !ulti_hack)
|
|
uid_validity = get_validity_info (pk, uid);
|
|
else
|
|
uid_validity = 'u';
|
|
es_fprintf (es_stdout, "%s:%c::::", str, uid_validity);
|
|
}
|
|
|
|
es_fprintf (es_stdout, "%s:", colon_strtime (uid->created));
|
|
es_fprintf (es_stdout, "%s:", colon_strtime (uid->expiredate));
|
|
|
|
namehash_from_uid (uid);
|
|
|
|
for (i = 0; i < 20; i++)
|
|
es_fprintf (es_stdout, "%02X", uid->namehash[i]);
|
|
|
|
es_fprintf (es_stdout, "::");
|
|
|
|
if (uid->attrib_data)
|
|
es_fprintf (es_stdout, "%u %lu", uid->numattribs, uid->attrib_len);
|
|
else
|
|
es_write_sanitized (es_stdout, uid->name, uid->len, ":", NULL);
|
|
es_putc (':', es_stdout);
|
|
es_putc ('\n', es_stdout);
|
|
}
|
|
else if (node->pkt->pkttype == PKT_PUBLIC_SUBKEY)
|
|
{
|
|
u32 keyid2[2];
|
|
PKT_public_key *pk2;
|
|
|
|
pk2 = node->pkt->pkt.public_key;
|
|
xfree (hexgrip); hexgrip = NULL;
|
|
xfree (serialno); serialno = NULL;
|
|
if (secret || opt.with_keygrip || opt.with_key_data)
|
|
{
|
|
rc = hexkeygrip_from_pk (pk2, &hexgrip);
|
|
if (rc)
|
|
log_error ("error computing a keygrip: %s\n",
|
|
gpg_strerror (rc));
|
|
}
|
|
stubkey = 0;
|
|
if (secret && agent_get_keyinfo (NULL, hexgrip, &serialno))
|
|
stubkey = 1; /* Key not found. */
|
|
|
|
keyid_from_pk (pk2, keyid2);
|
|
es_fputs (secret? "ssb:":"sub:", es_stdout);
|
|
if (!pk2->flags.valid)
|
|
es_putc ('i', es_stdout);
|
|
else if (pk2->flags.revoked)
|
|
es_putc ('r', es_stdout);
|
|
else if (pk2->has_expired)
|
|
es_putc ('e', es_stdout);
|
|
else if (opt.fast_list_mode || opt.no_expensive_trust_checks)
|
|
;
|
|
else
|
|
{
|
|
/* TRUSTLETTER should always be defined here. */
|
|
if (trustletter)
|
|
es_fprintf (es_stdout, "%c", trustletter);
|
|
}
|
|
es_fprintf (es_stdout, ":%u:%d:%08lX%08lX:%s:%s:::::",
|
|
nbits_from_pk (pk2),
|
|
pk2->pubkey_algo,
|
|
(ulong) keyid2[0], (ulong) keyid2[1],
|
|
colon_datestr_from_pk (pk2), colon_strtime (pk2->expiredate)
|
|
/* fixme: add LID and ownertrust here */
|
|
);
|
|
print_capabilities (pk2, NULL);
|
|
if (secret)
|
|
{
|
|
es_putc (':', es_stdout); /* End of field 13. */
|
|
es_putc (':', es_stdout); /* End of field 14. */
|
|
if (stubkey)
|
|
es_putc ('#', es_stdout);
|
|
else if (serialno)
|
|
es_fputs (serialno, es_stdout);
|
|
es_putc (':', es_stdout); /* End of field 15. */
|
|
}
|
|
es_putc ('\n', es_stdout);
|
|
if (fpr > 1)
|
|
print_fingerprint (pk2, 0);
|
|
if (opt.with_key_data || opt.with_keygrip)
|
|
{
|
|
if (hexgrip)
|
|
es_fprintf (es_stdout, "grp:::::::::%s:\n", hexgrip);
|
|
if (opt.with_key_data)
|
|
print_key_data (pk2);
|
|
}
|
|
}
|
|
else if (opt.list_sigs && node->pkt->pkttype == PKT_SIGNATURE)
|
|
{
|
|
PKT_signature *sig = node->pkt->pkt.signature;
|
|
int sigrc, fprokay = 0;
|
|
char *sigstr;
|
|
size_t fplen;
|
|
byte fparray[MAX_FINGERPRINT_LEN];
|
|
|
|
if (sig->sig_class == 0x20 || sig->sig_class == 0x28
|
|
|| sig->sig_class == 0x30)
|
|
sigstr = "rev";
|
|
else if ((sig->sig_class & ~3) == 0x10)
|
|
sigstr = "sig";
|
|
else if (sig->sig_class == 0x18)
|
|
sigstr = "sig";
|
|
else if (sig->sig_class == 0x1F)
|
|
sigstr = "sig";
|
|
else
|
|
{
|
|
es_fprintf (es_stdout, "sig::::::::::%02x%c:\n",
|
|
sig->sig_class, sig->flags.exportable ? 'x' : 'l');
|
|
continue;
|
|
}
|
|
|
|
if (opt.check_sigs)
|
|
{
|
|
PKT_public_key *signer_pk = NULL;
|
|
|
|
fflush (stdout);
|
|
if (opt.no_sig_cache)
|
|
signer_pk = xmalloc_clear (sizeof (PKT_public_key));
|
|
|
|
rc = check_key_signature2 (keyblock, node, NULL, signer_pk,
|
|
NULL, NULL, NULL);
|
|
switch (gpg_err_code (rc))
|
|
{
|
|
case 0:
|
|
sigrc = '!';
|
|
break;
|
|
case GPG_ERR_BAD_SIGNATURE:
|
|
sigrc = '-';
|
|
break;
|
|
case GPG_ERR_NO_PUBKEY:
|
|
case GPG_ERR_UNUSABLE_PUBKEY:
|
|
sigrc = '?';
|
|
break;
|
|
default:
|
|
sigrc = '%';
|
|
break;
|
|
}
|
|
|
|
if (opt.no_sig_cache)
|
|
{
|
|
if (!rc)
|
|
{
|
|
fingerprint_from_pk (signer_pk, fparray, &fplen);
|
|
fprokay = 1;
|
|
}
|
|
free_public_key (signer_pk);
|
|
}
|
|
}
|
|
else
|
|
{
|
|
rc = 0;
|
|
sigrc = ' ';
|
|
}
|
|
es_fputs (sigstr, es_stdout);
|
|
es_putc (':', es_stdout);
|
|
if (sigrc != ' ')
|
|
es_putc (sigrc, es_stdout);
|
|
es_fprintf (es_stdout, "::%d:%08lX%08lX:%s:%s:", sig->pubkey_algo,
|
|
(ulong) sig->keyid[0], (ulong) sig->keyid[1],
|
|
colon_datestr_from_sig (sig),
|
|
colon_expirestr_from_sig (sig));
|
|
|
|
if (sig->trust_depth || sig->trust_value)
|
|
es_fprintf (es_stdout, "%d %d", sig->trust_depth, sig->trust_value);
|
|
es_fprintf (es_stdout, ":");
|
|
|
|
if (sig->trust_regexp)
|
|
es_write_sanitized (es_stdout, sig->trust_regexp,
|
|
strlen (sig->trust_regexp), ":", NULL);
|
|
es_fprintf (es_stdout, ":");
|
|
|
|
if (sigrc == '%')
|
|
es_fprintf (es_stdout, "[%s] ", g10_errstr (rc));
|
|
else if (sigrc == '?')
|
|
;
|
|
else if (!opt.fast_list_mode)
|
|
{
|
|
size_t n;
|
|
p = get_user_id (sig->keyid, &n);
|
|
es_write_sanitized (es_stdout, p, n, ":", NULL);
|
|
xfree (p);
|
|
}
|
|
es_fprintf (es_stdout, ":%02x%c:", sig->sig_class,
|
|
sig->flags.exportable ? 'x' : 'l');
|
|
|
|
if (opt.no_sig_cache && opt.check_sigs && fprokay)
|
|
{
|
|
es_putc (':', es_stdout);
|
|
|
|
for (i = 0; i < fplen; i++)
|
|
es_fprintf (es_stdout, "%02X", fparray[i]);
|
|
|
|
es_putc (':', es_stdout);
|
|
}
|
|
|
|
es_fprintf (es_stdout, "\n");
|
|
|
|
if (opt.show_subpackets)
|
|
print_subpackets_colon (sig);
|
|
|
|
/* fixme: check or list other sigs here */
|
|
}
|
|
}
|
|
|
|
xfree (hexgrip);
|
|
xfree (serialno);
|
|
}
|
|
|
|
/*
|
|
* Reorder the keyblock so that the primary user ID (and not attribute
|
|
* packet) comes first. Fixme: Replace this by a generic sort
|
|
* function. */
|
|
static void
|
|
do_reorder_keyblock (KBNODE keyblock, int attr)
|
|
{
|
|
KBNODE primary = NULL, primary0 = NULL, primary2 = NULL;
|
|
KBNODE last, node;
|
|
|
|
for (node = keyblock; node; primary0 = node, node = node->next)
|
|
{
|
|
if (node->pkt->pkttype == PKT_USER_ID &&
|
|
((attr && node->pkt->pkt.user_id->attrib_data) ||
|
|
(!attr && !node->pkt->pkt.user_id->attrib_data)) &&
|
|
node->pkt->pkt.user_id->is_primary)
|
|
{
|
|
primary = primary2 = node;
|
|
for (node = node->next; node; primary2 = node, node = node->next)
|
|
{
|
|
if (node->pkt->pkttype == PKT_USER_ID
|
|
|| node->pkt->pkttype == PKT_PUBLIC_SUBKEY
|
|
|| node->pkt->pkttype == PKT_SECRET_SUBKEY)
|
|
{
|
|
break;
|
|
}
|
|
}
|
|
break;
|
|
}
|
|
}
|
|
if (!primary)
|
|
return; /* No primary key flag found (should not happen). */
|
|
|
|
for (last = NULL, node = keyblock; node; last = node, node = node->next)
|
|
{
|
|
if (node->pkt->pkttype == PKT_USER_ID)
|
|
break;
|
|
}
|
|
assert (node);
|
|
assert (last); /* The user ID is never the first packet. */
|
|
assert (primary0); /* Ditto (this is the node before primary). */
|
|
if (node == primary)
|
|
return; /* Already the first one. */
|
|
|
|
last->next = primary;
|
|
primary0->next = primary2->next;
|
|
primary2->next = node;
|
|
}
|
|
|
|
void
|
|
reorder_keyblock (KBNODE keyblock)
|
|
{
|
|
do_reorder_keyblock (keyblock, 1);
|
|
do_reorder_keyblock (keyblock, 0);
|
|
}
|
|
|
|
void
|
|
list_keyblock (KBNODE keyblock, int secret, int fpr, void *opaque)
|
|
{
|
|
reorder_keyblock (keyblock);
|
|
if (opt.with_colons)
|
|
list_keyblock_colon (keyblock, secret, fpr);
|
|
else
|
|
list_keyblock_print (keyblock, secret, fpr, opaque);
|
|
}
|
|
|
|
/*
|
|
* Function to print the finperprint.
|
|
* mode 0: as used in key listings, opt.with_colons is honored
|
|
* 1: print using log_info ()
|
|
* 2: direct use of tty
|
|
* 3: direct use of tty but only primary key.
|
|
*
|
|
* Modes 1 and 2 will try and print both subkey and primary key
|
|
* fingerprints. A MODE with bit 7 set is used internally.
|
|
*/
|
|
void
|
|
print_fingerprint (PKT_public_key *pk, int mode)
|
|
{
|
|
byte array[MAX_FINGERPRINT_LEN], *p;
|
|
size_t i, n;
|
|
estream_t fp;
|
|
const char *text;
|
|
int primary = 0;
|
|
|
|
if (pk->main_keyid[0] == pk->keyid[0]
|
|
&& pk->main_keyid[1] == pk->keyid[1])
|
|
primary = 1;
|
|
|
|
/* Just to be safe */
|
|
if ((mode & 0x80) && !primary)
|
|
{
|
|
log_error ("primary key is not really primary!\n");
|
|
return;
|
|
}
|
|
|
|
mode &= ~0x80;
|
|
|
|
if (!primary && (mode == 1 || mode == 2))
|
|
{
|
|
PKT_public_key *primary_pk = xmalloc_clear (sizeof (*primary_pk));
|
|
get_pubkey (primary_pk, pk->main_keyid);
|
|
print_fingerprint (primary_pk, mode | 0x80);
|
|
free_public_key (primary_pk);
|
|
}
|
|
|
|
if (mode == 1)
|
|
{
|
|
fp = log_get_stream ();
|
|
if (primary)
|
|
text = _("Primary key fingerprint:");
|
|
else
|
|
text = _(" Subkey fingerprint:");
|
|
}
|
|
else if (mode == 2)
|
|
{
|
|
fp = NULL; /* Use tty. */
|
|
if (primary)
|
|
/* TRANSLATORS: this should fit into 24 bytes to that the
|
|
* fingerprint data is properly aligned with the user ID */
|
|
text = _(" Primary key fingerprint:");
|
|
else
|
|
text = _(" Subkey fingerprint:");
|
|
}
|
|
else if (mode == 3)
|
|
{
|
|
fp = NULL; /* Use tty. */
|
|
text = _(" Key fingerprint =");
|
|
}
|
|
else
|
|
{
|
|
fp = es_stdout;
|
|
text = _(" Key fingerprint =");
|
|
}
|
|
|
|
fingerprint_from_pk (pk, array, &n);
|
|
p = array;
|
|
if (opt.with_colons && !mode)
|
|
{
|
|
es_fprintf (fp, "fpr:::::::::");
|
|
for (i = 0; i < n; i++, p++)
|
|
es_fprintf (fp, "%02X", *p);
|
|
es_putc (':', fp);
|
|
}
|
|
else
|
|
{
|
|
tty_fprintf (fp, "%s", text);
|
|
if (n == 20)
|
|
{
|
|
for (i = 0; i < n; i++, i++, p += 2)
|
|
tty_fprintf (fp, "%s %02X%02X", i==10? " ":"", *p, p[1]);
|
|
}
|
|
else
|
|
{
|
|
for (i = 0; i < n; i++, p++)
|
|
tty_fprintf (fp, "%s %02X", (i && !(i % 8))? " ":"", *p);
|
|
}
|
|
}
|
|
tty_fprintf (fp, "\n");
|
|
}
|
|
|
|
/* Print the serial number of an OpenPGP card if available. */
|
|
static void
|
|
print_card_serialno (const char *serialno)
|
|
{
|
|
if (!serialno)
|
|
return;
|
|
if (opt.with_colons)
|
|
return; /* Handled elsewhere. */
|
|
|
|
es_fputs (_(" Card serial no. ="), es_stdout);
|
|
es_putc (' ', es_stdout);
|
|
if (strlen (serialno) == 32 && !strncmp (serialno, "D27600012401", 12))
|
|
{
|
|
/* This is an OpenPGP card. Print the relevant part. */
|
|
/* Example: D2760001240101010001000003470000 */
|
|
/* xxxxyyyyyyyy */
|
|
es_fprintf (es_stdout, "%.*s %.*s", 4, serialno+16, 8, serialno+20);
|
|
}
|
|
else
|
|
es_fputs (serialno, es_stdout);
|
|
es_putc ('\n', es_stdout);
|
|
}
|
|
|
|
|
|
|
|
void
|
|
set_attrib_fd (int fd)
|
|
{
|
|
static int last_fd = -1;
|
|
|
|
if (fd != -1 && last_fd == fd)
|
|
return;
|
|
|
|
/* Fixme: Do we need to check for the log stream here? */
|
|
if (attrib_fp && attrib_fp != log_get_stream ())
|
|
es_fclose (attrib_fp);
|
|
attrib_fp = NULL;
|
|
if (fd == -1)
|
|
return;
|
|
|
|
#ifdef HAVE_DOSISH_SYSTEM
|
|
setmode (fd, O_BINARY);
|
|
#endif
|
|
if (fd == 1)
|
|
attrib_fp = es_stdout;
|
|
else if (fd == 2)
|
|
attrib_fp = es_stderr;
|
|
else
|
|
attrib_fp = es_fdopen (fd, "wb");
|
|
if (!attrib_fp)
|
|
{
|
|
log_fatal ("can't open fd %d for attribute output: %s\n",
|
|
fd, strerror (errno));
|
|
}
|
|
|
|
last_fd = fd;
|
|
}
|