more cert info

This commit is contained in:
Steffen Hansen 2002-05-31 15:34:39 +00:00
parent 3fa6cef5ca
commit 0848c32e0f
2 changed files with 353 additions and 2 deletions

View File

@ -1713,7 +1713,23 @@ struct DnPair {
struct CertificateInfo { struct CertificateInfo {
char** userid; char** userid;
char* serial;
char* fingerprint;
char* issuer; char* issuer;
char* chainid;
char* caps;
unsigned long created;
unsigned long expire;
int secret : 1;
int invalid : 1;
int expired : 1;
int disabled : 1;
struct DnPair *dnarray; /* parsed values from userid[0] */ struct DnPair *dnarray; /* parsed values from userid[0] */
}; };

View File

@ -1700,8 +1700,8 @@ bool requestDecentralCertificate( const char* certparms,
} }
gpgme_set_protocol (ctx, GPGME_PROTOCOL_CMS); gpgme_set_protocol (ctx, GPGME_PROTOCOL_CMS);
// Don't ASCII-armor, the MUA will use base64 encoding /* Don't ASCII-armor, the MUA will use base64 encoding */
// gpgme_set_armor (ctx, 1); /* gpgme_set_armor (ctx, 1); */
err = gpgme_op_genkey (ctx, certparms, pub, NULL ); err = gpgme_op_genkey (ctx, certparms, pub, NULL );
fprintf( stderr, "3: gpgme returned %d\n", err ); fprintf( stderr, "3: gpgme returned %d\n", err );
if( err != GPGME_No_Error ) { if( err != GPGME_No_Error ) {
@ -1740,3 +1740,338 @@ bool archiveCertificate( const char* certificate ){ return true; }
const char* displayCRL(){ return 0; } const char* displayCRL(){ return 0; }
void updateCRL(){} void updateCRL(){}
/*
* Copyright (C) 2002 g10 Code GmbH
*
* This program is free software; you can redistribute it
* and/or modify it under the terms of the GNU General Public
* License as published by the Free Software Foundation; either
* version 2 of the License, or (at your option) any later
* version.
*
* This program is distributed in the hope that it will be
* useful, but WITHOUT ANY WARRANTY; without even the implied
* warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR
* PURPOSE. See the GNU General Public License for more
* details.
*
* You should have received a copy of the GNU General Public
* License along with this program; if not, write to the Free
* Software Foundation, Inc., 59 Temple Place - Suite 330,
* Boston, MA 02111, USA.
*/
/* some macros to replace ctype ones and avoid locale problems */
#define spacep(p) (*(p) == ' ' || *(p) == '\t')
#define digitp(p) (*(p) >= '0' && *(p) <= '9')
#define hexdigitp(a) (digitp (a) \
|| (*(a) >= 'A' && *(a) <= 'F') \
|| (*(a) >= 'a' && *(a) <= 'f'))
/* the atoi macros assume that the buffer has only valid digits */
#define atoi_1(p) (*(p) - '0' )
#define atoi_2(p) ((atoi_1(p) * 10) + atoi_1((p)+1))
#define atoi_4(p) ((atoi_2(p) * 100) + atoi_2((p)+2))
#define xtoi_1(p) (*(p) <= '9'? (*(p)- '0'): \
*(p) <= 'F'? (*(p)-'A'+10):(*(p)-'a'+10))
#define xtoi_2(p) ((xtoi_1(p) * 16) + xtoi_1((p)+1))
#define safe_malloc( x ) malloc( x )
static void safe_free( void** x )
{
free( *x );
*x = 0;
}
/*#define safe_free( x ) free( x )*/
/* Parse a DN and return an array-ized one. This is not a validating
parser and it does not support any old-stylish syntax; gpgme is
expected to return only rfc2253 compatible strings. */
static const unsigned char *
parse_dn_part (struct DnPair *array, const unsigned char *string)
{
const unsigned char *s, *s1;
size_t n;
unsigned char *p;
/* parse attributeType */
for (s = string+1; *s && *s != '='; s++)
;
if (!*s)
return NULL; /* error */
n = s - string;
if (!n)
return NULL; /* empty key */
array->key = p = safe_malloc (n+1);
memcpy (p, string, n); /* fixme: trim trailing spaces */
p[n] = 0;
string = s + 1;
if (*string == '#')
{ /* hexstring */
string++;
for (s=string; hexdigitp (s); s++)
s++;
n = s - string;
if (!n || (n & 1))
return NULL; /* empty or odd number of digits */
n /= 2;
array->value = p = safe_malloc (n+1);
for (s1=string; n; s1 += 2, n--)
*p++ = xtoi_2 (s1);
*p = 0;
}
else
{ /* regular v3 quoted string */
for (n=0, s=string; *s; s++)
{
if (*s == '\\')
{ /* pair */
s++;
if (*s == ',' || *s == '=' || *s == '+'
|| *s == '<' || *s == '>' || *s == '#' || *s == ';'
|| *s == '\\' || *s == '\"' || *s == ' ')
n++;
else if (hexdigitp (s) && hexdigitp (s+1))
{
s++;
n++;
}
else
return NULL; /* invalid escape sequence */
}
else if (*s == '\"')
return NULL; /* invalid encoding */
else if (*s == ',' || *s == '=' || *s == '+'
|| *s == '<' || *s == '>' || *s == '#' || *s == ';' )
break;
else
n++;
}
array->value = p = safe_malloc (n+1);
for (s=string; n; s++, n--)
{
if (*s == '\\')
{
s++;
if (hexdigitp (s))
{
*p++ = xtoi_2 (s);
s++;
}
else
*p++ = *s;
}
else
*p++ = *s;
}
*p = 0;
}
return s;
}
/* Parse a DN and return an array-ized one. This is not a validating
parser and it does not support any old-stylish syntax; gpgme is
expected to return only rfc2253 compatible strings. */
static struct DnPair *
parse_dn (const unsigned char *string)
{
struct DnPair *array;
size_t arrayidx, arraysize;
int i;
arraysize = 7; /* C,ST,L,O,OU,CN,email */
array = safe_malloc ((arraysize+1) * sizeof *array);
arrayidx = 0;
while (*string)
{
while (*string == ' ')
string++;
if (!*string)
break; /* ready */
if (arrayidx >= arraysize)
{ /* mutt lacks a real safe_realoc - so we need to copy */
struct DnPair *a2;
arraysize += 5;
a2 = safe_malloc ((arraysize+1) * sizeof *array);
for (i=0; i < arrayidx; i++)
{
a2[i].key = array[i].key;
a2[i].value = array[i].value;
}
safe_free ((void **)&array);
array = a2;
}
array[arrayidx].key = NULL;
array[arrayidx].value = NULL;
string = parse_dn_part (array+arrayidx, string);
arrayidx++;
if (!string)
goto failure;
while (*string == ' ')
string++;
if (*string && *string != ',' && *string != ';' && *string != '+')
goto failure; /* invalid delimiter */
if (*string)
string++;
}
array[arrayidx].key = NULL;
array[arrayidx].value = NULL;
return array;
failure:
for (i=0; i < arrayidx; i++)
{
safe_free ((void**)&array[i].key);
safe_free ((void**)&array[i].value);
}
safe_free ((void**)&array);
return NULL;
}
struct CertIterator {
GpgmeCtx ctx;
struct CertificateInfo info;
};
struct CertIterator* startListCertificates( void )
{
GpgmeError err;
struct CertIterator* it;
/*fprintf( stderr, "startListCertificates()" );*/
it = (struct CertIterator*)safe_malloc( sizeof( struct CertIterator ) );
err = gpgme_new (&(it->ctx));
/*fprintf( stderr, "2: gpgme returned %d\n", err );*/
if( err != GPGME_No_Error ) {
free( it );
return NULL;
}
gpgme_set_protocol (it->ctx, GPGME_PROTOCOL_CMS);
err = gpgme_op_keylist_start ( it->ctx, NULL, 0);
if( err != GPGME_No_Error ) {
endListCertificates( it );
return NULL;
}
memset( &(it->info), 0, sizeof( struct CertificateInfo ) );
return it;
}
#define MAX_GPGME_IDX 20
static void freeStringArray( char** c )
{
char** _c = c;
while( c && *c ) {
/*fprintf( stderr, "freeing \"%s\"\n", *c );*/
safe_free( (void**)&(*c) );
++c;
}
safe_free( (void**)&_c );
}
static void freeInfo( struct CertificateInfo* info )
{
struct DnPair* a = info->dnarray;
assert( info );
if( info->userid ) freeStringArray( info->userid );
if( info->serial ) safe_free( (void**)&(info->serial) );
if( info->fingerprint ) safe_free( (void**)&(info->fingerprint) );
if( info->issuer ) safe_free( (void**)&(info->issuer) );
if( info->chainid ) safe_free( (void**)&(info->chainid) );
if( info->caps ) safe_free( (void**)&(info->caps) );
while( a && a->key && a->value ) {
safe_free ((void**)&(a->key));
safe_free ((void**)&(a->value));
++a;
}
if( info->dnarray ) safe_free ((void**)&(info->dnarray));
memset( info, 0, sizeof( *info ) );
}
#define xstrdup( x ) (x)?strdup(x):0
struct CertificateInfo* nextCertificate( struct CertIterator* it )
{
GpgmeError err;
GpgmeKey key;
assert( it );
err = gpgme_op_keylist_next ( it->ctx, &key);
if( err != GPGME_EOF ) {
int idx;
const char* s;
unsigned long u;
char* names[MAX_GPGME_IDX+1];
memset( names, 0, sizeof( names ) );
freeInfo( &(it->info) );
for( idx = 0; (s = gpgme_key_get_string_attr (key, GPGME_ATTR_USERID, 0, idx)) && idx < MAX_GPGME_IDX;
++idx ) {
names[idx] = xstrdup( s );
}
it->info.userid = safe_malloc( sizeof( char* ) * (idx+1) );
memset( it->info.userid, 0, sizeof( char* ) * (idx+1) );
it->info.dnarray = 0;
for( idx = 0; names[idx] != 0; ++idx ) {
struct DnPair* a = parse_dn( names[idx] );
it->info.userid[idx] = names[idx];
it->info.dnarray = a;
}
it->info.userid[idx] = 0;
s = gpgme_key_get_string_attr (key, GPGME_ATTR_SERIAL, 0, 0);
it->info.serial = xstrdup(s);
s = gpgme_key_get_string_attr (key, GPGME_ATTR_FPR, 0, 0);
it->info.fingerprint = xstrdup(s);
s = gpgme_key_get_string_attr (key, GPGME_ATTR_ISSUER, 0, 0);
it->info.issuer = xstrdup(s);
s = gpgme_key_get_string_attr (key, GPGME_ATTR_CHAINID, 0, 0);
it->info.chainid = xstrdup(s);
s = gpgme_key_get_string_attr (key, GPGME_ATTR_KEY_CAPS, 0, 0);
it->info.caps = xstrdup(s);
u = gpgme_key_get_ulong_attr (key, GPGME_ATTR_CREATED, 0, 0);
it->info.created = u;
u = gpgme_key_get_ulong_attr (key, GPGME_ATTR_EXPIRE, 0, 0);
it->info.expire = u;
u = gpgme_key_get_ulong_attr (key, GPGME_ATTR_IS_SECRET, 0, 0);
it->info.secret = u;
u = gpgme_key_get_ulong_attr (key, GPGME_ATTR_UID_INVALID, 0, 0);
it->info.invalid = u;
u = gpgme_key_get_ulong_attr (key, GPGME_ATTR_KEY_EXPIRED, 0, 0);
it->info.expired = u;
u = gpgme_key_get_ulong_attr (key, GPGME_ATTR_KEY_DISABLED, 0, 0);
it->info.disabled = u;
gpgme_key_release (key);
return &(it->info);
} else return NULL;
}
void endListCertificates( struct CertIterator* it )
{
/*fprintf( stderr, "endListCertificates()\n" );*/
assert(it);
freeInfo( &(it->info) );
gpgme_op_keylist_end(it->ctx);
gpgme_release (it->ctx);
free( it );
}