diff options
author | Werner Koch <[email protected]> | 2014-02-10 16:05:54 +0000 |
---|---|---|
committer | Werner Koch <[email protected]> | 2014-02-10 16:46:40 +0000 |
commit | 62fb86c6589f7f74dad4741db31b3aefa0848420 (patch) | |
tree | d076e3a6f23760a10509f918b384a3d6897b67c2 /g10/trustdb.h | |
parent | tests: Handle disabled algorithms. (diff) | |
download | gnupg-62fb86c6589f7f74dad4741db31b3aefa0848420.tar.gz gnupg-62fb86c6589f7f74dad4741db31b3aefa0848420.zip |
gpg: Allow building without any trust model support.
* configure.ac: Add option --disable-trust-models
(NO_TRUST_MODELS): New ac_define and am_conditional.
* g10/Makefile.am (trust_source): New.
(gpg2_SOURCES): Factor some files out to above. Add trust.c.
* g10/gpg.c [NO_TRUST_MODELS]: Disable options --export-ownertrust,
--import-ownertrust, --update-trustdb, --check-trustdb, --fix-trustdb,
--list-trustdb, --trustdb-name, --auto-check-trustdb,
--no-auto-check-trustdb, and --force-ownertrust.
(parse_trust_model) [NO_TRUST_MODELS]: Do not build.
(main) [NO_TRUST_MODELS]: Set trust_model to always and exclude all
trustdb related option code.
* g10/keyedit.c (cmds) [NO_TRUST_MODELS]: Remove menu items "trust",
"enable", and "disable".
* g10/keylist.c (public_key_list) [NO_TRUST_MODELS]: Do not print
"tru" record.
* g10/trust.c: New.
* g10/trustdb.c (struct key_item): Move to trustdb.h.
(register_trusted_keyid): Rename to tdb_register_trusted_keyid.
(register_trusted_key): Rename to tdb_register_trusted_key.
(trust_letter, uid_trust_string_fixed, trust_value_to_string)
(string_to_trust_value, get_ownertrust_with_min, get_ownertrust_info)
(get_ownertrust_string, get_validity_info, get_validity_string)
(clean_sigs_from_uid, clean_uid_from_key, clean_key): Move to trust.c.
(mark_usable_uid_certs): Move to trust.c and make global.
(is_in_klist): Move as inline to trustdb.h.
(trustdb_check_or_update): Rename to tdb_check_or_update
(revalidation_mark): Rename to tdb_revalidation_mark.
(get_ownertrust): Rename to tdb_get_ownertrust.
(get_min_ownertrust): Rename to tdb_get_min_ownertrust.
(update_ownertrust): Rename to tdb_update_ownertrust.
(clear_ownertrusts): Rename to tdb_clear_ownertrusts.
(cache_disabled_value): Rename to tdb_cache_disabled_value.
(check_trustdb_stale): Rename to tdb_check_trustdb_stale.
(get_validity): Rename to tdb_get_validity_core, add arg MAIN_PK and
factor some code out to ...
* trust.c (get_validity): ...new.
(check_or_update_trustdb): New wrapper.
(revalidation_mark): New wrapper.
(get_ownertrust): New wrapper.
(get_ownertrust_with_min): New wrapper.
(update_ownertrust): New wrapper.
(clear_ownertrusts): New wrapper.
(cache_disabled_value): New wrapper.
(check_trustdb_stale): New wrapper.
* tests/openpgp/defs.inc (opt_always): New. Use in all tests instead
of --always-trust.
Diffstat (limited to 'g10/trustdb.h')
-rw-r--r-- | g10/trustdb.h | 98 |
1 files changed, 76 insertions, 22 deletions
diff --git a/g10/trustdb.h b/g10/trustdb.h index 0a9ce335a..f190f72c1 100644 --- a/g10/trustdb.h +++ b/g10/trustdb.h @@ -38,30 +38,89 @@ #define NAMEHASH_LEN 20 + +/* + * A structure to store key identification as well as some stuff needed + * for validation + */ +struct key_item { + struct key_item *next; + unsigned int ownertrust,min_ownertrust; + byte trust_depth; + byte trust_value; + char *trust_regexp; + u32 kid[2]; +}; + + +/* + * Check whether the signature SIG is in the klist K. + */ +static inline struct key_item * +is_in_klist (struct key_item *k, PKT_signature *sig) +{ + for (; k; k = k->next) + { + if (k->kid[0] == sig->keyid[0] && k->kid[1] == sig->keyid[1]) + return k; + } + return NULL; +} + + + +/*-- trust.c --*/ +int cache_disabled_value (PKT_public_key *pk); +void register_trusted_keyid (u32 *keyid); +void register_trusted_key (const char *string); + +const char *trust_value_to_string (unsigned int value); +int string_to_trust_value (const char *str); +const char *uid_trust_string_fixed (PKT_public_key *key, PKT_user_id *uid); + +unsigned int get_ownertrust (PKT_public_key *pk); +void update_ownertrust (PKT_public_key *pk, unsigned int new_trust); +int clear_ownertrusts (PKT_public_key *pk); + +void revalidation_mark (void); +void check_trustdb_stale (void); +void check_or_update_trustdb (void); + +unsigned int get_validity (PKT_public_key *pk, PKT_user_id *uid); +int get_validity_info (PKT_public_key *pk, PKT_user_id *uid); +const char *get_validity_string (PKT_public_key *pk, PKT_user_id *uid); + +void mark_usable_uid_certs (kbnode_t keyblock, kbnode_t uidnode, + u32 *main_kid, struct key_item *klist, + u32 curtime, u32 *next_expire); + +void clean_one_uid (kbnode_t keyblock, kbnode_t uidnode, + int noisy, int self_only, + int *uids_cleaned, int *sigs_cleaned); +void clean_key (kbnode_t keyblock, int noisy, int self_only, + int *uids_cleaned,int *sigs_cleaned); + + + /*-- trustdb.c --*/ -void register_trusted_keyid(u32 *keyid); -void register_trusted_key( const char *string ); +void tdb_register_trusted_keyid (u32 *keyid); +void tdb_register_trusted_key (const char *string); void check_trustdb (void); void update_trustdb (void); int setup_trustdb( int level, const char *dbname ); void how_to_fix_the_trustdb (void); void init_trustdb( void ); -void check_trustdb_stale(void); +void tdb_check_trustdb_stale (void); void sync_trustdb( void ); -const char *uid_trust_string_fixed(PKT_public_key *key,PKT_user_id *uid); -const char *trust_value_to_string (unsigned int value); -int string_to_trust_value (const char *str); - -void revalidation_mark (void); +void tdb_revalidation_mark (void); int trustdb_pending_check(void); -void trustdb_check_or_update(void); +void tdb_check_or_update (void); -int cache_disabled_value(PKT_public_key *pk); +int tdb_cache_disabled_value (PKT_public_key *pk); -unsigned int get_validity (PKT_public_key *pk, PKT_user_id *uid); -int get_validity_info (PKT_public_key *pk, PKT_user_id *uid); -const char *get_validity_string (PKT_public_key *pk, PKT_user_id *uid); +unsigned int tdb_get_validity_core (PKT_public_key *pk, PKT_user_id *uid, + PKT_public_key *main_pk); void list_trust_path( const char *username ); int enum_cert_paths( void **context, ulong *lid, @@ -73,18 +132,13 @@ void read_trust_options(byte *trust_model,ulong *created,ulong *nextcheck, byte *marginals,byte *completes,byte *cert_depth, byte *min_cert_level); -unsigned int get_ownertrust (PKT_public_key *pk); -unsigned int get_min_ownertrust (PKT_public_key *pk); +unsigned int tdb_get_ownertrust (PKT_public_key *pk); +unsigned int tdb_get_min_ownertrust (PKT_public_key *pk); int get_ownertrust_info (PKT_public_key *pk); const char *get_ownertrust_string (PKT_public_key *pk); -void update_ownertrust (PKT_public_key *pk, unsigned int new_trust ); -int clear_ownertrusts (PKT_public_key *pk); - -void clean_one_uid(KBNODE keyblock,KBNODE uidnode,int noisy,int self_only, - int *uids_cleaned,int *sigs_cleaned); -void clean_key(KBNODE keyblock,int noisy,int self_only, - int *uids_cleaned,int *sigs_cleaned); +void tdb_update_ownertrust (PKT_public_key *pk, unsigned int new_trust); +int tdb_clear_ownertrusts (PKT_public_key *pk); /*-- tdbdump.c --*/ void list_trustdb(const char *username); |