aboutsummaryrefslogtreecommitdiffstats
path: root/g10/keyedit.c
diff options
context:
space:
mode:
Diffstat (limited to 'g10/keyedit.c')
-rw-r--r--g10/keyedit.c237
1 files changed, 236 insertions, 1 deletions
diff --git a/g10/keyedit.c b/g10/keyedit.c
index 01de7bb48..2b0e378ba 100644
--- a/g10/keyedit.c
+++ b/g10/keyedit.c
@@ -73,6 +73,8 @@ static int menu_delsig (ctrl_t ctrl, kbnode_t pub_keyblock);
static int menu_clean (ctrl_t ctrl, kbnode_t keyblock, int self_only);
static void menu_delkey (KBNODE pub_keyblock);
static int menu_addrevoker (ctrl_t ctrl, kbnode_t pub_keyblock, int sensitive);
+static int menu_addadsk (ctrl_t ctrl, kbnode_t pub_keyblock,
+ const char *adskfpr);
static gpg_error_t menu_expire (ctrl_t ctrl, kbnode_t pub_keyblock,
int unattended, u32 newexpiration);
static int menu_changeusage (ctrl_t ctrl, kbnode_t keyblock);
@@ -1240,7 +1242,7 @@ enum cmdids
cmdREVSIG, cmdREVKEY, cmdREVUID, cmdDELSIG, cmdPRIMARY, cmdDEBUG,
cmdSAVE, cmdADDUID, cmdADDPHOTO, cmdDELUID, cmdADDKEY, cmdDELKEY,
cmdADDREVOKER, cmdTOGGLE, cmdSELKEY, cmdPASSWD, cmdTRUST, cmdPREF,
- cmdEXPIRE, cmdCHANGEUSAGE, cmdBACKSIGN,
+ cmdEXPIRE, cmdCHANGEUSAGE, cmdBACKSIGN, cmdADDADSK,
#ifndef NO_TRUST_MODELS
cmdENABLEKEY, cmdDISABLEKEY,
#endif /*!NO_TRUST_MODELS*/
@@ -1303,6 +1305,8 @@ static struct
{ "delkey", cmdDELKEY, 0, N_("delete selected subkeys")},
{ "addrevoker", cmdADDREVOKER, KEYEDIT_NEED_SK,
N_("add a revocation key")},
+ { "addadsk", cmdADDADSK, KEYEDIT_NEED_SK,
+ N_("add additional decryption subkeys")},
{ "delsig", cmdDELSIG, 0,
N_("delete signatures from the selected user IDs")},
{ "expire", cmdEXPIRE, KEYEDIT_NEED_SK | KEYEDIT_NEED_SUBSK,
@@ -1966,6 +1970,15 @@ keyedit_menu (ctrl_t ctrl, const char *username, strlist_t locusr,
}
break;
+ case cmdADDADSK:
+ if (menu_addadsk (ctrl, keyblock, NULL))
+ {
+ redisplay = 1;
+ modified = 1;
+ merge_keys_and_selfsig (ctrl, keyblock);
+ }
+ break;
+
case cmdREVUID:
{
int n1;
@@ -4639,6 +4652,228 @@ fail:
}
+/* Core function to add an ADSK to the KEYBLOCK. Returns 0 on success
+ * or an error code. */
+gpg_error_t
+append_adsk_to_key (ctrl_t ctrl, kbnode_t keyblock, PKT_public_key *adsk)
+{
+ gpg_error_t err;
+ PKT_public_key *main_pk; /* The primary key. */
+ PKT_signature *sig = NULL;
+ kbnode_t adsknode = NULL;
+ PACKET *pkt; /* (temp. use; will be put into a kbnode_t) */
+
+ /* First get a copy. */
+ adsk = copy_public_key_basics (NULL, adsk);
+
+ /* Check compliance. */
+ if (!gnupg_pk_is_compliant (opt.compliance, adsk->pubkey_algo, 0,
+ adsk->pkey, nbits_from_pk (adsk), NULL))
+ {
+ char pkhex[MAX_FINGERPRINT_LEN*2+1];
+
+ hexfingerprint (adsk, pkhex, sizeof pkhex);
+ log_error (_("WARNING: key %s is not suitable for encryption"
+ " in %s mode\n"),
+ pkhex, gnupg_compliance_option_string (opt.compliance));
+ err = gpg_error (GPG_ERR_FORBIDDEN);
+ goto leave;
+ }
+
+ /* Get the primary key. */
+ log_assert (keyblock->pkt->pkttype == PKT_PUBLIC_KEY);
+ main_pk = keyblock->pkt->pkt.public_key;
+
+ /* Prepare and append the adsk. */
+ keyid_from_pk (main_pk, adsk->main_keyid); /* Fixup main keyid. */
+ log_assert ((adsk->pubkey_usage & PUBKEY_USAGE_ENC));
+ adsk->pubkey_usage = PUBKEY_USAGE_RENC; /* 'e' -> 'r' */
+ pkt = xtrycalloc (1, sizeof *pkt);
+ if (!pkt)
+ {
+ err = gpg_error_from_syserror ();
+ goto leave;
+ }
+ pkt->pkttype = PKT_PUBLIC_SUBKEY; /* Make sure it is a subkey. */
+ pkt->pkt.public_key = adsk;
+ adsknode = new_kbnode (pkt);
+
+ /* Make the signature. */
+ err = make_keysig_packet (ctrl, &sig, main_pk, NULL, adsk, main_pk, 0x18, 0,
+ adsk->timestamp, 0,
+ keygen_add_key_flags_and_expire, adsk, NULL);
+ adsk = NULL; /* (owned by adsknode - avoid double free.) */
+ if (err)
+ {
+ write_status_error ("keysig", err);
+ log_error ("creating key binding failed: %s\n", gpg_strerror (err));
+ goto leave;
+ }
+
+ /* Append the subkey packet and the binding signature. */
+ add_kbnode (keyblock, adsknode);
+ adsknode = NULL;
+ pkt = xtrycalloc (1, sizeof *pkt);
+ if (!pkt)
+ {
+ err = gpg_error_from_syserror ();
+ goto leave;
+ }
+ pkt->pkttype = PKT_SIGNATURE;
+ pkt->pkt.signature = sig;
+ add_kbnode (keyblock, new_kbnode (pkt));
+
+ leave:
+ release_kbnode (adsknode);
+ free_public_key (adsk); /* Release our copy. */
+ return err;
+}
+
+
+/*
+ * Ask for a new additional decryption subkey and add it to the key
+ * block. Returns true if the keyblock was changed and false
+ * otherwise. If ADSKFPR is not NULL, this function has been called
+ * by quick_addadsk and gives the fingerprint of the to be added key.
+ */
+static int
+menu_addadsk (ctrl_t ctrl, kbnode_t pub_keyblock, const char *adskfpr)
+{
+ PKT_public_key *pk;
+ PKT_public_key *adsk_pk = NULL;
+ kbnode_t adsk_keyblock = NULL;
+ char *answer = NULL;
+ gpg_error_t err;
+ KEYDB_SEARCH_DESC desc;
+ byte fpr[MAX_FINGERPRINT_LEN];
+ size_t fprlen;
+ kbnode_t node, node2;
+
+ log_assert (pub_keyblock->pkt->pkttype == PKT_PUBLIC_KEY);
+
+ for (;;)
+ {
+ xfree (answer);
+ if (adskfpr)
+ answer = xstrdup (adskfpr);
+ else
+ {
+ answer = cpr_get_utf8
+ ("keyedit.addadsk",
+ _("Enter the fingerprint of the additional decryption subkey: "));
+ if (answer[0] == '\0' || answer[0] == CONTROL_D)
+ {
+ err = gpg_error (GPG_ERR_CANCELED);
+ goto leave;
+ }
+ }
+ if (classify_user_id (answer, &desc, 1)
+ || !(desc.mode == KEYDB_SEARCH_MODE_FPR
+ || desc.mode == KEYDB_SEARCH_MODE_FPR20))
+ {
+ log_info (_("\"%s\" is not a fingerprint\n"), answer);
+ err = gpg_error (GPG_ERR_INV_USER_ID);
+ if (adskfpr)
+ goto leave;
+ continue;
+ }
+
+ /* Force searching for that exact fingerprint and for any key
+ * which has a key with that fingerprint. */
+ if (!strchr (answer, '!'))
+ {
+ char *tmpstr = xstrconcat (answer, "!", NULL);
+ xfree (answer);
+ answer = tmpstr;
+ }
+
+ free_public_key (adsk_pk);
+ adsk_pk = xcalloc (1, sizeof *adsk_pk);
+ adsk_pk->req_usage = PUBKEY_USAGE_ENC;
+ release_kbnode (adsk_keyblock);
+ adsk_keyblock = NULL;
+ err = get_pubkey_byname (ctrl, GET_PUBKEY_NO_AKL,
+ NULL, adsk_pk, answer, &adsk_keyblock, NULL, 1);
+ if (err)
+ {
+ log_info (_("key \"%s\" not found: %s\n"), answer,
+ gpg_strerror (err));
+ if ((!opt.batch || adskfpr) && !opt.quiet
+ && gpg_err_code (err) == GPG_ERR_UNUSABLE_PUBKEY)
+ log_info (_("Did you specify the fingerprint of a subkey?\n"));
+ if (adskfpr)
+ goto leave;
+ continue;
+ }
+
+ for (node = adsk_keyblock; node; node = node->next)
+ {
+ if (node->pkt->pkttype == PKT_PUBLIC_KEY
+ || node->pkt->pkttype == PKT_PUBLIC_SUBKEY)
+ {
+ pk = node->pkt->pkt.public_key;
+ fingerprint_from_pk (pk, fpr, &fprlen);
+ if (fprlen == 20
+ && !memcmp (fpr, desc.u.fpr, 20)
+ && (pk->pubkey_usage & PUBKEY_USAGE_ENC))
+ break;
+ }
+ }
+ if (!node)
+ {
+ err = gpg_error (GPG_ERR_WRONG_KEY_USAGE);
+ log_info (_("key \"%s\" not found: %s\n"), answer,
+ gpg_strerror (err));
+ if ((!opt.batch || adskfpr) && !opt.quiet)
+ log_info (_("Did you specify the fingerprint of a subkey?\n"));
+ if (adskfpr)
+ goto leave;
+ continue;
+ }
+
+ /* Check that the selected subkey is not yet on our keyblock. */
+ for (node2 = pub_keyblock; node2; node2 = node2->next)
+ {
+ if (node2->pkt->pkttype == PKT_PUBLIC_KEY
+ || node2->pkt->pkttype == PKT_PUBLIC_SUBKEY)
+ {
+ pk = node2->pkt->pkt.public_key;
+ fingerprint_from_pk (pk, fpr, &fprlen);
+ if (fprlen == 20
+ && !memcmp (fpr, desc.u.fpr, 20))
+ break;
+ }
+ }
+ if (node2)
+ {
+ log_info (_("key \"%s\" is already on this keyblock\n"), answer);
+ err = gpg_error (GPG_ERR_DUP_KEY);
+ if (adskfpr)
+ goto leave;
+ continue;
+ }
+
+ break;
+ }
+
+ /* Append the subkey. */
+ log_assert (node->pkt->pkttype == PKT_PUBLIC_KEY
+ || node->pkt->pkttype == PKT_PUBLIC_SUBKEY);
+ err = append_adsk_to_key (ctrl, pub_keyblock, node->pkt->pkt.public_key);
+
+
+ leave:
+ xfree (answer);
+ free_public_key (adsk_pk);
+ release_kbnode (adsk_keyblock);
+ if (!err)
+ return 1; /* The keyblock was modified. */
+ else
+ return 0; /* Not modified. */
+
+}
+
+
/* With FORCE_MAINKEY cleared this function handles the interactive
* menu option "expire". With UNATTENDED set to 1 this function only
* sets the expiration date of the primary key to NEWEXPIRATION and