aboutsummaryrefslogtreecommitdiffstats
path: root/g10/mainproc.c
diff options
context:
space:
mode:
Diffstat (limited to 'g10/mainproc.c')
-rw-r--r--g10/mainproc.c481
1 files changed, 258 insertions, 223 deletions
diff --git a/g10/mainproc.c b/g10/mainproc.c
index c056ac0af..9e34fbd0e 100644
--- a/g10/mainproc.c
+++ b/g10/mainproc.c
@@ -32,8 +32,21 @@
#include "filter.h"
#include "main.h"
+
+typedef struct {
+ PKT_pubkey_cert *last_pubkey;
+ PKT_seckey_cert *last_seckey;
+ PKT_user_id *last_user_id;
+ md_filter_context_t mfx;
+ DEK *dek;
+ int last_was_pubkey_enc;
+} *CTX;
+
+
+
+
static int opt_list=1; /* and list the data packets to stdout */
-#if 0
+#if 1
static void
do_free_last_user_id( CTX c )
{
@@ -62,10 +75,15 @@ do_free_last_seckey( CTX c )
static void
proc_pubkey_cert( CTX c, PACKET *pkt )
{
+ u32 keyid[2];
+ char *ustr;
+ int lvl0 = opt.check_sigs? 1:0; /* stdout or /dev/null */
+
do_free_last_user_id( c );
do_free_last_seckey( c );
if( opt.check_sigs ) {
- char *ustr = get_user_id_string(sig->keyid); /* sig ???? */
+ keyid_from_pkc( pkt->pkt.pubkey_cert, keyid );
+ ustr = get_user_id_string(keyid);
printstr(lvl0, "pub: %s\n", ustr );
m_free(ustr);
}
@@ -104,36 +122,246 @@ proc_seckey_cert( CTX c, PACKET *pkt )
}
+static void
+proc_user_id( CTX c, PACKET *pkt )
+{
+ u32 keyid[2];
+
+ do_free_last_user_id( c );
+ if( opt_list ) {
+ printf("uid: '%.*s'\n", pkt->pkt.user_id->len,
+ pkt->pkt.user_id->name );
+ if( !pkt->pkc_parent && !pkt->skc_parent )
+ puts(" (orphaned)");
+ }
+ if( pkt->pkc_parent ) {
+ if( pkt->pkc_parent->pubkey_algo == PUBKEY_ALGO_ELGAMAL
+ || pkt->pkc_parent->pubkey_algo == PUBKEY_ALGO_RSA ) {
+ keyid_from_pkc( pkt->pkc_parent, keyid );
+ cache_user_id( pkt->pkt.user_id, keyid );
+ }
+ }
+
+ c->last_user_id = pkt->pkt.user_id; /* save */
+ pkt->pkt.user_id = NULL;
+ free_packet(pkt);
+ pkt->user_parent = c->last_user_id; /* and set this as user */
+}
+
+
+static void
+proc_signature( CTX c, PACKET *pkt )
+{
+ PKT_signature *sig;
+ MD_HANDLE md_handle; /* union to pass handles down */
+ char *ustr;
+ int result = -1;
+ int lvl0 = opt.check_sigs? 1:0; /* stdout or /dev/null */
+ int lvl1 = opt.check_sigs? 1:3; /* stdout or error */
+
+ sig = pkt->pkt.signature;
+ ustr = get_user_id_string(sig->keyid);
+ if( sig->sig_class == 0x00 ) {
+ if( c->mfx.rmd160 )
+ result = 0;
+ else
+ printstr(lvl1,"sig?: %s: no plaintext for signature\n", ustr);
+ }
+ else if( sig->sig_class != 0x10 )
+ printstr(lvl1,"sig?: %s: unknown signature class %02x\n",
+ ustr, sig->sig_class);
+ else if( !pkt->pkc_parent || !pkt->user_parent )
+ printstr(lvl1,"sig?: %s: orphaned encoded packet\n", ustr);
+ else
+ result = 0;
+
+ if( result )
+ ;
+ else if( !opt.check_sigs && sig->sig_class != 0x00 ) {
+ result = -1;
+ printstr(lvl0, "sig: from %s\n", ustr );
+ }
+ else if(sig->pubkey_algo == PUBKEY_ALGO_ELGAMAL ) {
+ md_handle.algo = sig->d.elg.digest_algo;
+ if( sig->d.elg.digest_algo == DIGEST_ALGO_RMD160 ) {
+ if( sig->sig_class == 0x00 )
+ md_handle.u.rmd = rmd160_copy( c->mfx.rmd160 );
+ else {
+ md_handle.u.rmd = rmd160_copy(pkt->pkc_parent->mfx.rmd160);
+ rmd160_write(md_handle.u.rmd, pkt->user_parent->name,
+ pkt->user_parent->len);
+ }
+ result = signature_check( sig, md_handle );
+ rmd160_close(md_handle.u.rmd);
+ }
+ else if( sig->d.elg.digest_algo == DIGEST_ALGO_MD5
+ && sig->sig_class != 0x00 ) {
+ md_handle.u.md5 = md5_copy(pkt->pkc_parent->mfx.md5);
+ md5_write(md_handle.u.md5, pkt->user_parent->name,
+ pkt->user_parent->len);
+ result = signature_check( sig, md_handle );
+ md5_close(md_handle.u.md5);
+ }
+ else
+ result = G10ERR_DIGEST_ALGO;
+ }
+ else if(sig->pubkey_algo == PUBKEY_ALGO_RSA ) {
+ md_handle.algo = sig->d.rsa.digest_algo;
+ if( sig->d.rsa.digest_algo == DIGEST_ALGO_RMD160 ) {
+ if( sig->sig_class == 0x00 )
+ md_handle.u.rmd = rmd160_copy( c->mfx.rmd160 );
+ else {
+ md_handle.u.rmd = rmd160_copy(pkt->pkc_parent->mfx.rmd160);
+ rmd160_write(md_handle.u.rmd, pkt->user_parent->name,
+ pkt->user_parent->len);
+ }
+ result = signature_check( sig, md_handle );
+ rmd160_close(md_handle.u.rmd);
+ }
+ else if( sig->d.rsa.digest_algo == DIGEST_ALGO_MD5
+ && sig->sig_class != 0x00 ) {
+ md_handle.u.md5 = md5_copy(pkt->pkc_parent->mfx.md5);
+ md5_write(md_handle.u.md5, pkt->user_parent->name,
+ pkt->user_parent->len);
+ result = signature_check( sig, md_handle );
+ md5_close(md_handle.u.md5);
+ }
+ else
+ result = G10ERR_DIGEST_ALGO;
+ }
+ else
+ result = G10ERR_PUBKEY_ALGO;
+
+ if( result == -1 )
+ ;
+ else if( !result && sig->sig_class == 0x00 )
+ printstr(1, "sig: good signature from %s\n", ustr );
+ else if( !result )
+ printstr(lvl0, "sig: good signature from %s\n", ustr );
+ else
+ printstr(lvl1, "sig? %s: %s\n", ustr, g10_errstr(result));
+ free_packet(pkt);
+ m_free(ustr);
+}
+
+
+static void
+proc_pubkey_enc( CTX c, PACKET *pkt )
+{
+ PKT_pubkey_enc *enc;
+ int result = 0;
+
+ c->last_was_pubkey_enc = 1;
+ enc = pkt->pkt.pubkey_enc;
+ printf("enc: encrypted by a pubkey with keyid %08lX\n", enc->keyid[1] );
+ if( enc->pubkey_algo == PUBKEY_ALGO_ELGAMAL
+ || enc->pubkey_algo == PUBKEY_ALGO_RSA ) {
+ m_free(c->dek ); /* paranoid: delete a pending DEK */
+ c->dek = m_alloc_secure( sizeof *c->dek );
+ if( (result = get_session_key( enc, c->dek )) ) {
+ /* error: delete the DEK */
+ m_free(c->dek); c->dek = NULL;
+ }
+ }
+ else
+ result = G10ERR_PUBKEY_ALGO;
+
+ if( result == -1 )
+ ;
+ else if( !result )
+ fputs( " DEK is good", stdout );
+ else
+ printf( " %s", g10_errstr(result));
+ putchar('\n');
+ free_packet(pkt);
+}
+
+
+
+static void
+proc_encr_data( CTX c, PACKET *pkt )
+{
+ int result = 0;
+
+ printf("dat: %sencrypted data\n", c->dek?"":"conventional ");
+ if( !c->dek && !c->last_was_pubkey_enc ) {
+ /* assume this is conventional encrypted data */
+ c->dek = m_alloc_secure( sizeof *c->dek );
+ c->dek->algo = DEFAULT_CIPHER_ALGO;
+ result = make_dek_from_passphrase( c->dek, 0 );
+ }
+ else if( !c->dek )
+ result = G10ERR_NO_SECKEY;
+ if( !result )
+ result = decrypt_data( pkt->pkt.encr_data, c->dek );
+ m_free(c->dek); c->dek = NULL;
+ if( result == -1 )
+ ;
+ else if( !result )
+ fputs( " encryption okay",stdout);
+ else
+ printf( " %s", g10_errstr(result));
+ putchar('\n');
+ free_packet(pkt);
+ c->last_was_pubkey_enc = 0;
+}
+
+
+static void
+proc_plaintext( CTX c, PACKET *pkt )
+{
+ PKT_plaintext *pt = pkt->pkt.plaintext;
+ int result;
+
+ printf("txt: plain text data name='%.*s'\n", pt->namelen, pt->name);
+ free_md_filter_context( &c->mfx );
+ c->mfx.rmd160 = rmd160_open(0);
+ result = handle_plaintext( pt, &c->mfx );
+ if( !result )
+ fputs( " okay", stdout);
+ else
+ printf( " %s", g10_errstr(result));
+ putchar('\n');
+ free_packet(pkt);
+ c->last_was_pubkey_enc = 0;
+}
+
+
+static void
+proc_compr_data( CTX c, PACKET *pkt )
+{
+ PKT_compressed *zd = pkt->pkt.compressed;
+ int result;
+
+ printf("zip: compressed data packet\n");
+ result = handle_compressed( zd );
+ if( !result )
+ fputs( " okay", stdout);
+ else
+ printf( " %s", g10_errstr(result));
+ putchar('\n');
+ free_packet(pkt);
+ c->last_was_pubkey_enc = 0;
+}
int
proc_packets( IOBUF a )
{
- PACKET *pkt;
- PKT_pubkey_cert *last_pubkey = NULL;
- PKT_seckey_cert *last_seckey = NULL;
- PKT_user_id *last_user_id = NULL;
- DEK *dek = NULL;
- PKT_signature *sig; /* CHECK: "might be used uninitialied" */
+ CTX c = m_alloc_clear( sizeof *c );
+ PACKET *pkt = m_alloc( sizeof *pkt );
int rc, result;
- MD_HANDLE md_handle; /* union to pass handles */
char *ustr;
int lvl0, lvl1;
- int last_was_pubkey_enc = 0;
u32 keyid[2];
- md_filter_context_t mfx;
- memset( &mfx, 0, sizeof mfx );
- lvl0 = opt.check_sigs? 1:0; /* stdout or /dev/null */
- lvl1 = opt.check_sigs? 1:3; /* stdout or error */
- pkt = m_alloc( sizeof *pkt );
init_packet(pkt);
while( (rc=parse_packet(a, pkt)) != -1 ) {
/* cleanup if we have an illegal data structure */
- if( dek && pkt->pkttype != PKT_ENCR_DATA ) {
+ if( c->dek && pkt->pkttype != PKT_ENCR_DATA ) {
log_error("oops: valid pubkey enc packet not followed by data\n");
- m_free(dek); dek = NULL; /* burn it */
+ m_free(c->dek); c->dek = NULL; /* burn it */
}
if( rc ) {
@@ -143,217 +371,24 @@ proc_packets( IOBUF a )
switch( pkt->pkttype ) {
case PKT_PUBKEY_CERT: proc_pubkey_cert( c, pkt ); break;
case PKT_SECKEY_CERT: proc_seckey_cert( c, pkt ); break;
- case PKT_USER_ID:
- if( last_user_id ) {
- free_user_id( last_user_id );
- last_user_id = NULL;
- }
- if( opt_list ) {
- printf("uid: '%.*s'\n", pkt->pkt.user_id->len,
- pkt->pkt.user_id->name );
- if( !pkt->pkc_parent && !pkt->skc_parent )
- puts(" (orphaned)");
- }
- if( pkt->pkc_parent ) {
- if( pkt->pkc_parent->pubkey_algo == PUBKEY_ALGO_ELGAMAL
- || pkt->pkc_parent->pubkey_algo == PUBKEY_ALGO_RSA ) {
- keyid_from_pkc( pkt->pkc_parent, keyid );
- cache_user_id( pkt->pkt.user_id, keyid );
- }
- }
-
- last_user_id = pkt->pkt.user_id; /* save */
- pkt->pkt.user_id = NULL;
- free_packet(pkt); /* fixme: free_packet is not a good name */
- pkt->user_parent = last_user_id; /* and set this as user */
- break;
-
- case PKT_SIGNATURE:
- sig = pkt->pkt.signature;
- ustr = get_user_id_string(sig->keyid);
- result = -1;
- if( sig->sig_class == 0x00 ) {
- if( mfx.rmd160 )
- result = 0;
- else
- printstr(lvl1,"sig?: %s: no plaintext for signature\n",
- ustr);
- }
- else if( sig->sig_class != 0x10 )
- printstr(lvl1,"sig?: %s: unknown signature class %02x\n",
- ustr, sig->sig_class);
- else if( !pkt->pkc_parent || !pkt->user_parent )
- printstr(lvl1,"sig?: %s: orphaned encoded packet\n", ustr);
- else
- result = 0;
-
- if( result )
- ;
- else if( !opt.check_sigs && sig->sig_class != 0x00 ) {
- result = -1;
- printstr(lvl0, "sig: from %s\n", ustr );
- }
- else if(sig->pubkey_algo == PUBKEY_ALGO_ELGAMAL ) {
- md_handle.algo = sig->d.elg.digest_algo;
- if( sig->d.elg.digest_algo == DIGEST_ALGO_RMD160 ) {
- if( sig->sig_class == 0x00 )
- md_handle.u.rmd = rmd160_copy( mfx.rmd160 );
- else {
- md_handle.u.rmd = rmd160_copy(pkt->pkc_parent->mfx.rmd160);
- rmd160_write(md_handle.u.rmd, pkt->user_parent->name,
- pkt->user_parent->len);
- }
- result = signature_check( sig, md_handle );
- rmd160_close(md_handle.u.rmd);
- }
- else if( sig->d.elg.digest_algo == DIGEST_ALGO_MD5
- && sig->sig_class != 0x00 ) {
- md_handle.u.md5 = md5_copy(pkt->pkc_parent->mfx.md5);
- md5_write(md_handle.u.md5, pkt->user_parent->name,
- pkt->user_parent->len);
- result = signature_check( sig, md_handle );
- md5_close(md_handle.u.md5);
- }
- else
- result = G10ERR_DIGEST_ALGO;
- }
- else if(sig->pubkey_algo == PUBKEY_ALGO_RSA ) {
- md_handle.algo = sig->d.rsa.digest_algo;
- if( sig->d.rsa.digest_algo == DIGEST_ALGO_RMD160 ) {
- if( sig->sig_class == 0x00 )
- md_handle.u.rmd = rmd160_copy( mfx.rmd160 );
- else {
- md_handle.u.rmd = rmd160_copy(pkt->pkc_parent->mfx.rmd160);
- rmd160_write(md_handle.u.rmd, pkt->user_parent->name,
- pkt->user_parent->len);
- }
- result = signature_check( sig, md_handle );
- rmd160_close(md_handle.u.rmd);
- }
- else if( sig->d.rsa.digest_algo == DIGEST_ALGO_MD5
- && sig->sig_class != 0x00 ) {
- md_handle.u.md5 = md5_copy(pkt->pkc_parent->mfx.md5);
- md5_write(md_handle.u.md5, pkt->user_parent->name,
- pkt->user_parent->len);
- result = signature_check( sig, md_handle );
- md5_close(md_handle.u.md5);
- }
- else
- result = G10ERR_DIGEST_ALGO;
- }
- else
- result = G10ERR_PUBKEY_ALGO;
-
- if( result == -1 )
- ;
- else if( !result && sig->sig_class == 0x00 )
- printstr(1, "sig: good signature from %s\n", ustr );
- else if( !result )
- printstr(lvl0, "sig: good signature from %s\n", ustr );
- else
- printstr(lvl1, "sig? %s: %s\n", ustr, g10_errstr(result));
- free_packet(pkt);
- m_free(ustr);
- break;
-
- case PKT_PUBKEY_ENC:
- PKT_pubkey_enc *enc;
-
- last_was_pubkey_enc = 1;
- result = 0;
- enc = pkt->pkt.pubkey_enc;
- printf("enc: encrypted by a pubkey with keyid %08lX\n",
- enc->keyid[1] );
- if( enc->pubkey_algo == PUBKEY_ALGO_ELGAMAL
- || enc->pubkey_algo == PUBKEY_ALGO_RSA ) {
- m_free(dek ); /* paranoid: delete a pending DEK */
- dek = m_alloc_secure( sizeof *dek );
- if( (result = get_session_key( enc, dek )) ) {
- /* error: delete the DEK */
- m_free(dek); dek = NULL;
- }
- }
- else
- result = G10ERR_PUBKEY_ALGO;
-
- if( result == -1 )
- ;
- else if( !result )
- fputs( " DEK is good", stdout );
- else
- printf( " %s", g10_errstr(result));
- putchar('\n');
- free_packet(pkt);
- break;
-
- case PKT_ENCR_DATA:
- result = 0;
- printf("dat: %sencrypted data\n", dek?"":"conventional ");
- if( !dek && !last_was_pubkey_enc ) {
- /* assume this is conventional encrypted data */
- dek = m_alloc_secure( sizeof *dek );
- dek->algo = DEFAULT_CIPHER_ALGO;
- result = make_dek_from_passphrase( dek, 0 );
- }
- else if( !dek )
- result = G10ERR_NO_SECKEY;
- if( !result )
- result = decrypt_data( pkt->pkt.encr_data, dek );
- m_free(dek); dek = NULL;
- if( result == -1 )
- ;
- else if( !result )
- fputs( " encryption okay",stdout);
- else
- printf( " %s", g10_errstr(result));
- putchar('\n');
- free_packet(pkt);
- last_was_pubkey_enc = 0;
- break;
-
- case PKT_PLAINTEXT:
- PKT_plaintext *pt = pkt->pkt.plaintext;
- printf("txt: plain text data name='%.*s'\n", pt->namelen, pt->name);
- free_md_filter_context( &mfx );
- mfx.rmd160 = rmd160_open(0);
- result = handle_plaintext( pt, &mfx );
- if( !result )
- fputs( " okay",stdout);
- else
- printf( " %s", g10_errstr(result));
- putchar('\n');
- free_packet(pkt);
- last_was_pubkey_enc = 0;
- break;
-
- case PKT_COMPR_DATA:
- PKT_compressed *zd = pkt->pkt.compressed;
- printf("zip: compressed data packet\n");
- result = handle_compressed( zd );
- if( !result )
- fputs( " okay",stdout);
- else
- printf( " %s", g10_errstr(result));
- putchar('\n');
- free_packet(pkt);
- last_was_pubkey_enc = 0;
- break;
-
- default:
- free_packet(pkt);
+ case PKT_USER_ID: proc_user_id( c, pkt ); break;
+ case PKT_SIGNATURE: proc_signature( c, pkt ); break;
+ case PKT_PUBKEY_ENC: proc_pubkey_enc( c, pkt ); break;
+ case PKT_ENCR_DATA: proc_encr_data( c, pkt ); break;
+ case PKT_PLAINTEXT: proc_plaintext( c, pkt ); break;
+ case PKT_COMPR_DATA: proc_compr_data( c, pkt ); break;
+ default: free_packet(pkt);
}
}
- if( last_user_id )
- free_user_id( last_user_id );
- if( last_seckey )
- free_seckey_cert( last_seckey );
- if( last_pubkey )
- free_pubkey_cert( last_pubkey );
- m_free(dek);
+ do_free_last_user_id( c );
+ do_free_last_seckey( c );
+ do_free_last_pubkey( c );
+ m_free(c->dek);
free_packet( pkt );
m_free( pkt );
- free_md_filter_context( &mfx );
+ free_md_filter_context( &c->mfx );
+ m_free( c );
return 0;
}