Blame src/keylist.c

Packit Service 672cf4
/* keylist.c - Listing keys.
Packit Service 0ef63b
 * Copyright (C) 2000 Werner Koch (dd9jn)
Packit Service 0ef63b
 * Copyright (C) 2001, 2002, 2003, 2004, 2006, 2007,
Packit Service 0ef63b
 *               2008, 2009  g10 Code GmbH
Packit Service 0ef63b
 *
Packit Service 0ef63b
 * This file is part of GPGME.
Packit Service 0ef63b
 *
Packit Service 0ef63b
 * GPGME is free software; you can redistribute it and/or modify it
Packit Service 0ef63b
 * under the terms of the GNU Lesser General Public License as
Packit Service 0ef63b
 * published by the Free Software Foundation; either version 2.1 of
Packit Service 0ef63b
 * the License, or (at your option) any later version.
Packit Service 0ef63b
 *
Packit Service 0ef63b
 * GPGME is distributed in the hope that it will be useful, but
Packit Service 0ef63b
 * WITHOUT ANY WARRANTY; without even the implied warranty of
Packit Service 0ef63b
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
Packit Service 0ef63b
 * Lesser General Public License for more details.
Packit Service 0ef63b
 *
Packit Service 0ef63b
 * You should have received a copy of the GNU Lesser General Public
Packit Service 0ef63b
 * License along with this program; if not, see <https://gnu.org/licenses/>.
Packit Service 0ef63b
 * SPDX-License-Identifier: LGPL-2.1-or-later
Packit Service 672cf4
 */
Packit Service 672cf4
Packit Service 672cf4
#if HAVE_CONFIG_H
Packit Service 672cf4
#include <config.h>
Packit Service 672cf4
#endif
Packit Service 672cf4
#include <stdio.h>
Packit Service 672cf4
#include <stdlib.h>
Packit Service 672cf4
#include <string.h>
Packit Service 672cf4
#ifdef HAVE_SYS_TYPES_H
Packit Service 672cf4
  /* Solaris 8 needs sys/types.h before time.h.  */
Packit Service 672cf4
# include <sys/types.h>
Packit Service 672cf4
#endif
Packit Service 672cf4
#include <time.h>
Packit Service 672cf4
#include <assert.h>
Packit Service 672cf4
#include <ctype.h>
Packit Service 672cf4
#include <errno.h>
Packit Service 672cf4
#include <limits.h>
Packit Service 672cf4
Packit Service 672cf4
/* Suppress warning for accessing deprecated member "class".  */
Packit Service 672cf4
#define _GPGME_IN_GPGME
Packit Service 672cf4
#include "gpgme.h"
Packit Service 672cf4
#include "util.h"
Packit Service 672cf4
#include "context.h"
Packit Service 672cf4
#include "ops.h"
Packit Service 672cf4
#include "debug.h"
Packit Service 672cf4
Packit Service 672cf4

Packit Service 672cf4
struct key_queue_item_s
Packit Service 672cf4
{
Packit Service 672cf4
  struct key_queue_item_s *next;
Packit Service 672cf4
  gpgme_key_t key;
Packit Service 672cf4
};
Packit Service 672cf4
Packit Service 672cf4
typedef struct
Packit Service 672cf4
{
Packit Service 672cf4
  struct _gpgme_op_keylist_result result;
Packit Service 672cf4
Packit Service 672cf4
  /* The error code from ERROR keydb_search. */
Packit Service 672cf4
  gpgme_error_t keydb_search_err;
Packit Service 672cf4
Packit Service 672cf4
  gpgme_key_t tmp_key;
Packit Service 672cf4
Packit Service 672cf4
  /* This points to the last uid in tmp_key.  */
Packit Service 672cf4
  gpgme_user_id_t tmp_uid;
Packit Service 672cf4
Packit Service 672cf4
  /* This points to the last sig in tmp_uid.  */
Packit Service 672cf4
  gpgme_key_sig_t tmp_keysig;
Packit Service 672cf4
Packit Service 672cf4
  /* Something new is available.  */
Packit Service 672cf4
  int key_cond;
Packit Service 672cf4
  struct key_queue_item_s *key_queue;
Packit Service 672cf4
} *op_data_t;
Packit Service 672cf4
Packit Service 672cf4
Packit Service 672cf4
static void
Packit Service 672cf4
release_op_data (void *hook)
Packit Service 672cf4
{
Packit Service 672cf4
  op_data_t opd = (op_data_t) hook;
Packit Service 672cf4
  struct key_queue_item_s *key = opd->key_queue;
Packit Service 672cf4
Packit Service 672cf4
  if (opd->tmp_key)
Packit Service 672cf4
    gpgme_key_unref (opd->tmp_key);
Packit Service 672cf4
Packit Service 672cf4
  /* opd->tmp_uid and opd->tmp_keysig are actually part of opd->tmp_key,
Packit Service 672cf4
     so we do not need to release them here.  */
Packit Service 672cf4
Packit Service 672cf4
  while (key)
Packit Service 672cf4
    {
Packit Service 672cf4
      struct key_queue_item_s *next = key->next;
Packit Service 672cf4
Packit Service 672cf4
      gpgme_key_unref (key->key);
Packit Service 672cf4
      key = next;
Packit Service 672cf4
    }
Packit Service 672cf4
}
Packit Service 672cf4
Packit Service 672cf4
Packit Service 672cf4
gpgme_keylist_result_t
Packit Service 672cf4
gpgme_op_keylist_result (gpgme_ctx_t ctx)
Packit Service 672cf4
{
Packit Service 672cf4
  void *hook;
Packit Service 672cf4
  op_data_t opd;
Packit Service 672cf4
  gpgme_error_t err;
Packit Service 672cf4
Packit Service 0ef63b
  TRACE_BEG (DEBUG_CTX, "gpgme_op_keylist_result", ctx, "");
Packit Service 672cf4
Packit Service 672cf4
  err = _gpgme_op_data_lookup (ctx, OPDATA_KEYLIST, &hook, -1, NULL);
Packit Service 672cf4
  opd = hook;
Packit Service 672cf4
  if (err || !opd)
Packit Service 672cf4
    {
Packit Service 0ef63b
      TRACE_SUC ("result=(null)");
Packit Service 672cf4
      return NULL;
Packit Service 672cf4
    }
Packit Service 672cf4
Packit Service 0ef63b
  TRACE_LOG  ("truncated = %i", opd->result.truncated);
Packit Service 672cf4
Packit Service 0ef63b
  TRACE_SUC ("result=%p", &opd->result);
Packit Service 672cf4
  return &opd->result;
Packit Service 672cf4
}
Packit Service 672cf4
Packit Service 672cf4

Packit Service 672cf4
static gpgme_error_t
Packit Service 672cf4
keylist_status_handler (void *priv, gpgme_status_code_t code, char *args)
Packit Service 672cf4
{
Packit Service 672cf4
  gpgme_ctx_t ctx = (gpgme_ctx_t) priv;
Packit Service 672cf4
  gpgme_error_t err;
Packit Service 672cf4
  void *hook;
Packit Service 672cf4
  op_data_t opd;
Packit Service 672cf4
Packit Service 672cf4
  (void)args;
Packit Service 672cf4
Packit Service 672cf4
  err = _gpgme_op_data_lookup (ctx, OPDATA_KEYLIST, &hook, -1, NULL);
Packit Service 672cf4
  opd = hook;
Packit Service 672cf4
  if (err)
Packit Service 672cf4
    return err;
Packit Service 672cf4
Packit Service 672cf4
  switch (code)
Packit Service 672cf4
    {
Packit Service 672cf4
    case GPGME_STATUS_TRUNCATED:
Packit Service 672cf4
      opd->result.truncated = 1;
Packit Service 672cf4
      break;
Packit Service 672cf4
Packit Service 672cf4
    case GPGME_STATUS_ERROR:
Packit Service 672cf4
      err = _gpgme_parse_failure (args);
Packit Service 672cf4
      if (!opd->keydb_search_err && !strcmp (args, "keydb_search"))
Packit Service 672cf4
        opd->keydb_search_err = err;
Packit Service 672cf4
      err = 0;
Packit Service 672cf4
      break;
Packit Service 672cf4
Packit Service 672cf4
    default:
Packit Service 672cf4
      break;
Packit Service 672cf4
    }
Packit Service 672cf4
  return err;
Packit Service 672cf4
}
Packit Service 672cf4
Packit Service 672cf4

Packit Service 672cf4
static void
Packit Service 672cf4
set_subkey_trust_info (gpgme_subkey_t subkey, const char *src)
Packit Service 672cf4
{
Packit Service 672cf4
  while (*src && !isdigit (*src))
Packit Service 672cf4
    {
Packit Service 672cf4
      switch (*src)
Packit Service 672cf4
	{
Packit Service 672cf4
	case 'e':
Packit Service 672cf4
	  subkey->expired = 1;
Packit Service 672cf4
	  break;
Packit Service 672cf4
Packit Service 672cf4
	case 'r':
Packit Service 672cf4
	  subkey->revoked = 1;
Packit Service 672cf4
	  break;
Packit Service 672cf4
Packit Service 672cf4
	case 'd':
Packit Service 672cf4
          /* Note that gpg 1.3 won't print that anymore but only uses
Packit Service 672cf4
             the capabilities field. */
Packit Service 672cf4
	  subkey->disabled = 1;
Packit Service 672cf4
	  break;
Packit Service 672cf4
Packit Service 672cf4
	case 'i':
Packit Service 672cf4
	  subkey->invalid = 1;
Packit Service 672cf4
	  break;
Packit Service 672cf4
        }
Packit Service 672cf4
      src++;
Packit Service 672cf4
    }
Packit Service 672cf4
}
Packit Service 672cf4
Packit Service 672cf4
Packit Service 672cf4
static void
Packit Service 672cf4
set_mainkey_trust_info (gpgme_key_t key, const char *src)
Packit Service 672cf4
{
Packit Service 672cf4
  /* First set the trust info of the main key (the first subkey).  */
Packit Service 672cf4
  set_subkey_trust_info (key->subkeys, src);
Packit Service 672cf4
Packit Service 672cf4
  /* Now set the summarized trust info.  */
Packit Service 672cf4
  while (*src && !isdigit (*src))
Packit Service 672cf4
    {
Packit Service 672cf4
      switch (*src)
Packit Service 672cf4
	{
Packit Service 672cf4
	case 'e':
Packit Service 672cf4
	  key->expired = 1;
Packit Service 672cf4
	  break;
Packit Service 672cf4
Packit Service 672cf4
	case 'r':
Packit Service 672cf4
	  key->revoked = 1;
Packit Service 672cf4
	  break;
Packit Service 672cf4
Packit Service 672cf4
	case 'd':
Packit Service 672cf4
          /* Note that gpg 1.3 won't print that anymore but only uses
Packit Service 672cf4
             the capabilities field.  However, it is still used for
Packit Service 672cf4
             external key listings.  */
Packit Service 672cf4
	  key->disabled = 1;
Packit Service 672cf4
	  break;
Packit Service 672cf4
Packit Service 672cf4
	case 'i':
Packit Service 672cf4
	  key->invalid = 1;
Packit Service 672cf4
	  break;
Packit Service 672cf4
        }
Packit Service 672cf4
      src++;
Packit Service 672cf4
    }
Packit Service 672cf4
}
Packit Service 672cf4
Packit Service 672cf4
Packit Service 672cf4
static void
Packit Service 672cf4
set_userid_flags (gpgme_key_t key, const char *src)
Packit Service 672cf4
{
Packit Service 672cf4
  gpgme_user_id_t uid = key->_last_uid;
Packit Service 672cf4
Packit Service 672cf4
  assert (uid);
Packit Service 672cf4
  /* Look at letters and stop at the first digit.  */
Packit Service 672cf4
  while (*src && !isdigit (*src))
Packit Service 672cf4
    {
Packit Service 672cf4
      switch (*src)
Packit Service 672cf4
	{
Packit Service 672cf4
	case 'r':
Packit Service 672cf4
	  uid->revoked = 1;
Packit Service 672cf4
	  break;
Packit Service 672cf4
Packit Service 672cf4
	case 'i':
Packit Service 672cf4
	  uid->invalid = 1;
Packit Service 672cf4
	  break;
Packit Service 672cf4
Packit Service 672cf4
	case 'n':
Packit Service 672cf4
	  uid->validity = GPGME_VALIDITY_NEVER;
Packit Service 672cf4
	  break;
Packit Service 672cf4
Packit Service 672cf4
	case 'm':
Packit Service 672cf4
	  uid->validity = GPGME_VALIDITY_MARGINAL;
Packit Service 672cf4
	  break;
Packit Service 672cf4
Packit Service 672cf4
	case 'f':
Packit Service 672cf4
	  uid->validity = GPGME_VALIDITY_FULL;
Packit Service 672cf4
	  break;
Packit Service 672cf4
Packit Service 672cf4
	case 'u':
Packit Service 672cf4
	  uid->validity = GPGME_VALIDITY_ULTIMATE;
Packit Service 672cf4
	  break;
Packit Service 672cf4
        }
Packit Service 672cf4
      src++;
Packit Service 672cf4
    }
Packit Service 672cf4
}
Packit Service 672cf4
Packit Service 672cf4
Packit Service 672cf4
static void
Packit Service 672cf4
set_subkey_capability (gpgme_subkey_t subkey, const char *src)
Packit Service 672cf4
{
Packit Service 672cf4
  while (*src)
Packit Service 672cf4
    {
Packit Service 672cf4
      switch (*src)
Packit Service 672cf4
	{
Packit Service 672cf4
	case 'e':
Packit Service 672cf4
	  subkey->can_encrypt = 1;
Packit Service 672cf4
	  break;
Packit Service 672cf4
Packit Service 672cf4
	case 's':
Packit Service 672cf4
	  subkey->can_sign = 1;
Packit Service 672cf4
	  break;
Packit Service 672cf4
Packit Service 672cf4
	case 'c':
Packit Service 672cf4
	  subkey->can_certify = 1;
Packit Service 672cf4
	  break;
Packit Service 672cf4
Packit Service 672cf4
	case 'a':
Packit Service 672cf4
	  subkey->can_authenticate = 1;
Packit Service 672cf4
	  break;
Packit Service 672cf4
Packit Service 672cf4
	case 'q':
Packit Service 672cf4
	  subkey->is_qualified = 1;
Packit Service 672cf4
	  break;
Packit Service 672cf4
Packit Service 672cf4
	case 'd':
Packit Service 672cf4
	  subkey->disabled = 1;
Packit Service 672cf4
	  break;
Packit Service 672cf4
        }
Packit Service 672cf4
      src++;
Packit Service 672cf4
    }
Packit Service 672cf4
}
Packit Service 672cf4
Packit Service 672cf4
Packit Service 672cf4
static void
Packit Service 672cf4
set_mainkey_capability (gpgme_key_t key, const char *src)
Packit Service 672cf4
{
Packit Service 672cf4
  /* First set the capabilities of the main key (the first subkey).  */
Packit Service 672cf4
  set_subkey_capability (key->subkeys, src);
Packit Service 672cf4
Packit Service 672cf4
  while (*src)
Packit Service 672cf4
    {
Packit Service 672cf4
      switch (*src)
Packit Service 672cf4
	{
Packit Service 672cf4
	case 'd':
Packit Service 672cf4
        case 'D':
Packit Service 672cf4
          /* Note, that this flag is also set using the key validity
Packit Service 672cf4
             field for backward compatibility with gpg 1.2.  We use d
Packit Service 672cf4
             and D, so that a future gpg version will be able to
Packit Service 672cf4
             disable certain subkeys. Currently it is expected that
Packit Service 672cf4
             gpg sets this for the primary key. */
Packit Service 672cf4
       	  key->disabled = 1;
Packit Service 672cf4
          break;
Packit Service 672cf4
Packit Service 672cf4
	case 'e':
Packit Service 672cf4
	case 'E':
Packit Service 672cf4
	  key->can_encrypt = 1;
Packit Service 672cf4
	  break;
Packit Service 672cf4
Packit Service 672cf4
	case 's':
Packit Service 672cf4
	case 'S':
Packit Service 672cf4
	  key->can_sign = 1;
Packit Service 672cf4
	  break;
Packit Service 672cf4
Packit Service 672cf4
	case 'c':
Packit Service 672cf4
	case 'C':
Packit Service 672cf4
	  key->can_certify = 1;
Packit Service 672cf4
	  break;
Packit Service 672cf4
Packit Service 672cf4
	case 'a':
Packit Service 672cf4
	case 'A':
Packit Service 672cf4
	  key->can_authenticate = 1;
Packit Service 672cf4
	  break;
Packit Service 672cf4
Packit Service 672cf4
	case 'q':
Packit Service 672cf4
	case 'Q':
Packit Service 672cf4
	  key->is_qualified = 1;
Packit Service 672cf4
	  break;
Packit Service 672cf4
        }
Packit Service 672cf4
      src++;
Packit Service 672cf4
    }
Packit Service 672cf4
}
Packit Service 672cf4
Packit Service 672cf4
Packit Service 672cf4
static void
Packit Service 672cf4
set_ownertrust (gpgme_key_t key, const char *src)
Packit Service 672cf4
{
Packit Service 672cf4
  /* Look at letters and stop at the first digit.  */
Packit Service 672cf4
  while (*src && !isdigit (*src))
Packit Service 672cf4
    {
Packit Service 672cf4
      switch (*src)
Packit Service 672cf4
	{
Packit Service 672cf4
	case 'n':
Packit Service 672cf4
	  key->owner_trust = GPGME_VALIDITY_NEVER;
Packit Service 672cf4
	  break;
Packit Service 672cf4
Packit Service 672cf4
	case 'm':
Packit Service 672cf4
	  key->owner_trust = GPGME_VALIDITY_MARGINAL;
Packit Service 672cf4
	  break;
Packit Service 672cf4
Packit Service 672cf4
	case 'f':
Packit Service 672cf4
	  key->owner_trust = GPGME_VALIDITY_FULL;
Packit Service 672cf4
	  break;
Packit Service 672cf4
Packit Service 672cf4
	case 'u':
Packit Service 672cf4
	  key->owner_trust = GPGME_VALIDITY_ULTIMATE;
Packit Service 672cf4
	  break;
Packit Service 672cf4
Packit Service 672cf4
        default:
Packit Service 672cf4
	  key->owner_trust = GPGME_VALIDITY_UNKNOWN;
Packit Service 672cf4
	  break;
Packit Service 672cf4
        }
Packit Service 672cf4
      src++;
Packit Service 672cf4
    }
Packit Service 672cf4
}
Packit Service 672cf4
Packit Service 672cf4
Packit Service 672cf4
static gpgme_keyorg_t
Packit Service 672cf4
parse_keyorg (const char *string)
Packit Service 672cf4
{
Packit Service 672cf4
  switch (atoi (string))
Packit Service 672cf4
    {
Packit Service 672cf4
    case 0: return GPGME_KEYORG_UNKNOWN;
Packit Service 672cf4
    case 1:
Packit Service 672cf4
    case 2:
Packit Service 672cf4
      return GPGME_KEYORG_KS;
Packit Service 672cf4
    case 3: return GPGME_KEYORG_DANE;
Packit Service 672cf4
    case 4: return GPGME_KEYORG_WKD;
Packit Service 672cf4
    case 5: return GPGME_KEYORG_URL;
Packit Service 672cf4
    case 6: return GPGME_KEYORG_FILE;
Packit Service 672cf4
    case 7: return GPGME_KEYORG_SELF;
Packit Service 672cf4
    default: return GPGME_KEYORG_OTHER;
Packit Service 672cf4
    }
Packit Service 672cf4
}
Packit Service 672cf4
Packit Service 672cf4
Packit Service 672cf4
/* Parse field 15 of a secret key or subkey.  This fields holds a
Packit Service 672cf4
   reference to smartcards.  FIELD is the content of the field and we
Packit Service 672cf4
   are allowed to modify it.  */
Packit Service 672cf4
static gpg_error_t
Packit Service 672cf4
parse_sec_field15 (gpgme_key_t key, gpgme_subkey_t subkey, char *field)
Packit Service 672cf4
{
Packit Service 672cf4
  if (!*field)
Packit Service 672cf4
    ; /* Empty.  */
Packit Service 672cf4
  else if (*field == '#')
Packit Service 672cf4
    {
Packit Service 672cf4
      /* This is a stub for an offline key.  We reset the SECRET flag
Packit Service 672cf4
         of the subkey here.  Note that the secret flag of the entire
Packit Service 672cf4
         key will be true even then.  We even explicitly set
Packit Service 672cf4
         key->secret to make it works for GPGME_KEYLIST_MODE_WITH_SECRET. */
Packit Service 672cf4
      subkey->secret = 0;
Packit Service 672cf4
      key->secret = 1;
Packit Service 672cf4
    }
Packit Service 672cf4
  else if (strchr ("01234567890ABCDEFabcdef", *field))
Packit Service 672cf4
    {
Packit Service 672cf4
      /* Fields starts with a hex digit; thus it is a serial number.  */
Packit Service 672cf4
      key->secret = 1;
Packit Service 672cf4
      subkey->is_cardkey = 1;
Packit Service 672cf4
      subkey->card_number = strdup (field);
Packit Service 672cf4
      if (!subkey->card_number)
Packit Service 672cf4
        return gpg_error_from_syserror ();
Packit Service 672cf4
    }
Packit Service 672cf4
  else if (*field == '+')
Packit Service 672cf4
    {
Packit Service 672cf4
      key->secret = 1;
Packit Service 672cf4
      subkey->secret = 1;
Packit Service 672cf4
    }
Packit Service 672cf4
  else
Packit Service 672cf4
    {
Packit Service 672cf4
      /* RFU.  */
Packit Service 672cf4
    }
Packit Service 672cf4
Packit Service 672cf4
  return 0;
Packit Service 672cf4
}
Packit Service 672cf4
Packit Service 672cf4
Packit Service 672cf4
/* Parse a tfs record.  */
Packit Service 672cf4
static gpg_error_t
Packit Service 672cf4
parse_tfs_record (gpgme_user_id_t uid, char **field, int nfield)
Packit Service 672cf4
{
Packit Service 672cf4
  gpg_error_t err;
Packit Service 672cf4
  gpgme_tofu_info_t ti;
Packit Service 672cf4
  unsigned long uval;
Packit Service 672cf4
Packit Service 672cf4
  /* We add only the first TOFU record in case future versions emit
Packit Service 672cf4
   * several.  */
Packit Service 672cf4
  if (uid->tofu)
Packit Service 672cf4
    return 0;
Packit Service 672cf4
Packit Service 672cf4
  /* Check that we have enough fields and that the version is supported.  */
Packit Service 672cf4
  if (nfield < 8 || atoi(field[1]) != 1)
Packit Service 672cf4
    return trace_gpg_error (GPG_ERR_INV_ENGINE);
Packit Service 672cf4
Packit Service 672cf4
  ti = calloc (1, sizeof *ti);
Packit Service 672cf4
  if (!ti)
Packit Service 672cf4
    return gpg_error_from_syserror ();
Packit Service 672cf4
Packit Service 672cf4
  /* Note that we allow a value of up to 7 which is what we can store
Packit Service 672cf4
   * in the ti->validity.  */
Packit Service 672cf4
  err = _gpgme_strtoul_field (field[2], &uval);
Packit Service 672cf4
  if (err || uval > 7)
Packit Service 672cf4
    goto inv_engine;
Packit Service 672cf4
  ti->validity = uval;
Packit Service 672cf4
Packit Service 672cf4
  /* Parse the sign-count.  */
Packit Service 672cf4
  err = _gpgme_strtoul_field (field[3], &uval);
Packit Service 672cf4
  if (err)
Packit Service 672cf4
    goto inv_engine;
Packit Service 672cf4
  if (uval > USHRT_MAX)
Packit Service 672cf4
    uval = USHRT_MAX;
Packit Service 672cf4
  ti->signcount = uval;
Packit Service 672cf4
Packit Service 672cf4
  /* Parse the encr-count.  */
Packit Service 672cf4
  err = _gpgme_strtoul_field (field[4], &uval);
Packit Service 672cf4
  if (err)
Packit Service 672cf4
    goto inv_engine;
Packit Service 672cf4
  if (uval > USHRT_MAX)
Packit Service 672cf4
    uval = USHRT_MAX;
Packit Service 672cf4
  ti->encrcount = uval;
Packit Service 672cf4
Packit Service 672cf4
  /* Parse the policy.  */
Packit Service 672cf4
  if (!strcmp (field[5], "none"))
Packit Service 672cf4
    ti->policy = GPGME_TOFU_POLICY_NONE;
Packit Service 672cf4
  else if (!strcmp (field[5], "auto"))
Packit Service 672cf4
    ti->policy = GPGME_TOFU_POLICY_AUTO;
Packit Service 672cf4
  else if (!strcmp (field[5], "good"))
Packit Service 672cf4
    ti->policy = GPGME_TOFU_POLICY_GOOD;
Packit Service 672cf4
  else if (!strcmp (field[5], "bad"))
Packit Service 672cf4
    ti->policy = GPGME_TOFU_POLICY_BAD;
Packit Service 672cf4
  else if (!strcmp (field[5], "ask"))
Packit Service 672cf4
    ti->policy = GPGME_TOFU_POLICY_ASK;
Packit Service 672cf4
  else /* "unknown" and invalid policy strings.  */
Packit Service 672cf4
    ti->policy = GPGME_TOFU_POLICY_UNKNOWN;
Packit Service 672cf4
Packit Service 672cf4
  /* Parse first and last seen timestamps.  */
Packit Service 672cf4
  err = _gpgme_strtoul_field (field[6], &uval);
Packit Service 672cf4
  if (err)
Packit Service 672cf4
    goto inv_engine;
Packit Service 672cf4
  ti->signfirst = uval;
Packit Service 672cf4
  err = _gpgme_strtoul_field (field[7], &uval);
Packit Service 672cf4
  if (err)
Packit Service 672cf4
    goto inv_engine;
Packit Service 672cf4
  ti->signlast = uval;
Packit Service 672cf4
Packit Service 672cf4
  if (nfield > 9)
Packit Service 672cf4
    {
Packit Service 672cf4
      /* This condition is only to allow for gpg 2.1.15 - can
Packit Service 672cf4
       * eventually be removed.  */
Packit Service 672cf4
      err = _gpgme_strtoul_field (field[8], &uval);
Packit Service 672cf4
      if (err)
Packit Service 672cf4
        goto inv_engine;
Packit Service 672cf4
      ti->encrfirst = uval;
Packit Service 672cf4
      err = _gpgme_strtoul_field (field[9], &uval);
Packit Service 672cf4
      if (err)
Packit Service 672cf4
        goto inv_engine;
Packit Service 672cf4
      ti->encrlast = uval;
Packit Service 672cf4
    }
Packit Service 672cf4
Packit Service 672cf4
  /* Ready.  */
Packit Service 672cf4
  uid->tofu = ti;
Packit Service 672cf4
  return 0;
Packit Service 672cf4
Packit Service 672cf4
 inv_engine:
Packit Service 672cf4
  free (ti);
Packit Service 672cf4
  return trace_gpg_error (GPG_ERR_INV_ENGINE);
Packit Service 672cf4
}
Packit Service 672cf4
Packit Service 672cf4
Packit Service 672cf4
/* We have read an entire key into tmp_key and should now finish it.
Packit Service 672cf4
   It is assumed that this releases tmp_key.  */
Packit Service 672cf4
static void
Packit Service 672cf4
finish_key (gpgme_ctx_t ctx, op_data_t opd)
Packit Service 672cf4
{
Packit Service 672cf4
  gpgme_key_t key = opd->tmp_key;
Packit Service 672cf4
Packit Service 672cf4
  opd->tmp_key = NULL;
Packit Service 672cf4
  opd->tmp_uid = NULL;
Packit Service 672cf4
  opd->tmp_keysig = NULL;
Packit Service 672cf4
Packit Service 672cf4
  if (key)
Packit Service 672cf4
    _gpgme_engine_io_event (ctx->engine, GPGME_EVENT_NEXT_KEY, key);
Packit Service 672cf4
}
Packit Service 672cf4
Packit Service 672cf4
Packit Service 672cf4
/* Note: We are allowed to modify LINE.  */
Packit Service 672cf4
static gpgme_error_t
Packit Service 672cf4
keylist_colon_handler (void *priv, char *line)
Packit Service 672cf4
{
Packit Service 672cf4
  gpgme_ctx_t ctx = (gpgme_ctx_t) priv;
Packit Service 672cf4
  enum
Packit Service 672cf4
    {
Packit Service 672cf4
      RT_NONE, RT_SIG, RT_UID, RT_TFS, RT_SUB, RT_PUB, RT_FPR, RT_GRP,
Packit Service 672cf4
      RT_SSB, RT_SEC, RT_CRT, RT_CRS, RT_REV, RT_SPK
Packit Service 672cf4
    }
Packit Service 672cf4
  rectype = RT_NONE;
Packit Service 672cf4
#define NR_FIELDS 20
Packit Service 672cf4
  char *field[NR_FIELDS];
Packit Service 672cf4
  int fields = 0;
Packit Service 672cf4
  void *hook;
Packit Service 672cf4
  op_data_t opd;
Packit Service 672cf4
  gpgme_error_t err;
Packit Service 672cf4
  gpgme_key_t key;
Packit Service 672cf4
  gpgme_subkey_t subkey = NULL;
Packit Service 672cf4
  gpgme_key_sig_t keysig = NULL;
Packit Service 672cf4
Packit Service 672cf4
  err = _gpgme_op_data_lookup (ctx, OPDATA_KEYLIST, &hook, -1, NULL);
Packit Service 672cf4
  opd = hook;
Packit Service 672cf4
  if (err)
Packit Service 672cf4
    return err;
Packit Service 672cf4
Packit Service 672cf4
  key = opd->tmp_key;
Packit Service 672cf4
Packit Service 0ef63b
  TRACE (DEBUG_CTX, "gpgme:keylist_colon_handler", ctx,
Packit Service 672cf4
	  "key = %p, line = %s", key, line ? line : "(null)");
Packit Service 672cf4
Packit Service 672cf4
  if (!line)
Packit Service 672cf4
    {
Packit Service 672cf4
      /* End Of File.  */
Packit Service 672cf4
      finish_key (ctx, opd);
Packit Service 672cf4
      return 0;
Packit Service 672cf4
    }
Packit Service 672cf4
Packit Service 672cf4
  while (line && fields < NR_FIELDS)
Packit Service 672cf4
    {
Packit Service 672cf4
      field[fields++] = line;
Packit Service 672cf4
      line = strchr (line, ':');
Packit Service 672cf4
      if (line)
Packit Service 672cf4
	*(line++) = '\0';
Packit Service 672cf4
    }
Packit Service 672cf4
Packit Service 672cf4
  if (!strcmp (field[0], "sig"))
Packit Service 672cf4
    rectype = RT_SIG;
Packit Service 672cf4
  else if (!strcmp (field[0], "rev"))
Packit Service 672cf4
    rectype = RT_REV;
Packit Service 672cf4
  else if (!strcmp (field[0], "pub"))
Packit Service 672cf4
    rectype = RT_PUB;
Packit Service 672cf4
  else if (!strcmp (field[0], "sec"))
Packit Service 672cf4
    rectype = RT_SEC;
Packit Service 672cf4
  else if (!strcmp (field[0], "crt"))
Packit Service 672cf4
    rectype = RT_CRT;
Packit Service 672cf4
  else if (!strcmp (field[0], "crs"))
Packit Service 672cf4
    rectype = RT_CRS;
Packit Service 672cf4
  else if (!strcmp (field[0], "fpr") && key)
Packit Service 672cf4
    rectype = RT_FPR;
Packit Service 672cf4
  else if (!strcmp (field[0], "grp") && key)
Packit Service 672cf4
    rectype = RT_GRP;
Packit Service 672cf4
  else if (!strcmp (field[0], "uid") && key)
Packit Service 672cf4
    rectype = RT_UID;
Packit Service 672cf4
  else if (!strcmp (field[0], "tfs") && key)
Packit Service 672cf4
    rectype = RT_TFS;
Packit Service 672cf4
  else if (!strcmp (field[0], "sub") && key)
Packit Service 672cf4
    rectype = RT_SUB;
Packit Service 672cf4
  else if (!strcmp (field[0], "ssb") && key)
Packit Service 672cf4
    rectype = RT_SSB;
Packit Service 672cf4
  else if (!strcmp (field[0], "spk") && key)
Packit Service 672cf4
    rectype = RT_SPK;
Packit Service 672cf4
  else
Packit Service 672cf4
    rectype = RT_NONE;
Packit Service 672cf4
Packit Service 672cf4
  /* Only look at signature and trust info records immediately
Packit Service 672cf4
     following a user ID.  For this, clear the user ID pointer when
Packit Service 672cf4
     encountering anything but a signature or trust record.  */
Packit Service 672cf4
  if (rectype != RT_SIG && rectype != RT_REV && rectype != RT_TFS)
Packit Service 672cf4
    opd->tmp_uid = NULL;
Packit Service 672cf4
Packit Service 672cf4
  /* Only look at subpackets immediately following a signature.  For
Packit Service 672cf4
     this, clear the signature pointer when encountering anything but
Packit Service 672cf4
     a subpacket.  */
Packit Service 672cf4
  if (rectype != RT_SPK)
Packit Service 672cf4
    opd->tmp_keysig = NULL;
Packit Service 672cf4
Packit Service 672cf4
  switch (rectype)
Packit Service 672cf4
    {
Packit Service 672cf4
    case RT_PUB:
Packit Service 672cf4
    case RT_SEC:
Packit Service 672cf4
    case RT_CRT:
Packit Service 672cf4
    case RT_CRS:
Packit Service 672cf4
      /* Start a new keyblock.  */
Packit Service 672cf4
      err = _gpgme_key_new (&key);
Packit Service 672cf4
      if (err)
Packit Service 672cf4
	return err;
Packit Service 672cf4
      key->keylist_mode = ctx->keylist_mode;
Packit Service 672cf4
      err = _gpgme_key_add_subkey (key, &subkey);
Packit Service 672cf4
      if (err)
Packit Service 672cf4
	{
Packit Service 672cf4
	  gpgme_key_unref (key);
Packit Service 672cf4
	  return err;
Packit Service 672cf4
	}
Packit Service 672cf4
Packit Service 672cf4
      if (rectype == RT_SEC || rectype == RT_CRS)
Packit Service 672cf4
	key->secret = subkey->secret = 1;
Packit Service 672cf4
      if (rectype == RT_CRT || rectype == RT_CRS)
Packit Service 672cf4
	key->protocol = GPGME_PROTOCOL_CMS;
Packit Service 672cf4
      finish_key (ctx, opd);
Packit Service 672cf4
      opd->tmp_key = key;
Packit Service 672cf4
Packit Service 672cf4
      /* Field 2 has the trust info.  */
Packit Service 672cf4
      if (fields >= 2)
Packit Service 672cf4
	set_mainkey_trust_info (key, field[1]);
Packit Service 672cf4
Packit Service 672cf4
      /* Field 3 has the key length.  */
Packit Service 672cf4
      if (fields >= 3)
Packit Service 672cf4
	{
Packit Service 672cf4
	  int i = atoi (field[2]);
Packit Service 672cf4
	  /* Ignore invalid values.  */
Packit Service 672cf4
	  if (i > 1)
Packit Service 672cf4
	    subkey->length = i;
Packit Service 672cf4
	}
Packit Service 672cf4
Packit Service 672cf4
      /* Field 4 has the public key algorithm.  */
Packit Service 672cf4
      if (fields >= 4)
Packit Service 672cf4
	{
Packit Service 672cf4
	  int i = atoi (field[3]);
Packit Service 672cf4
	  if (i >= 1 && i < 128)
Packit Service 672cf4
	    subkey->pubkey_algo = _gpgme_map_pk_algo (i, ctx->protocol);
Packit Service 672cf4
	}
Packit Service 672cf4
Packit Service 672cf4
      /* Field 5 has the long keyid.  Allow short key IDs for the
Packit Service 672cf4
	 output of an external keyserver listing.  */
Packit Service 672cf4
      if (fields >= 5 && strlen (field[4]) <= DIM(subkey->_keyid) - 1)
Packit Service 672cf4
	strcpy (subkey->_keyid, field[4]);
Packit Service 672cf4
Packit Service 672cf4
      /* Field 6 has the timestamp (seconds).  */
Packit Service 672cf4
      if (fields >= 6)
Packit Service 672cf4
	subkey->timestamp = _gpgme_parse_timestamp (field[5], NULL);
Packit Service 672cf4
Packit Service 672cf4
      /* Field 7 has the expiration time (seconds).  */
Packit Service 672cf4
      if (fields >= 7)
Packit Service 672cf4
	subkey->expires = _gpgme_parse_timestamp (field[6], NULL);
Packit Service 672cf4
Packit Service 672cf4
      /* Field 8 has the X.509 serial number.  */
Packit Service 672cf4
      if (fields >= 8 && (rectype == RT_CRT || rectype == RT_CRS))
Packit Service 672cf4
	{
Packit Service 672cf4
	  key->issuer_serial = strdup (field[7]);
Packit Service 672cf4
	  if (!key->issuer_serial)
Packit Service 672cf4
	    return gpg_error_from_syserror ();
Packit Service 672cf4
	}
Packit Service 672cf4
Packit Service 672cf4
      /* Field 9 has the ownertrust.  */
Packit Service 672cf4
      if (fields >= 9)
Packit Service 672cf4
	set_ownertrust (key, field[8]);
Packit Service 672cf4
Packit Service 672cf4
      /* Field 10 is not used for gpg due to --fixed-list-mode option
Packit Service 672cf4
	 but GPGSM stores the issuer name.  */
Packit Service 672cf4
      if (fields >= 10 && (rectype == RT_CRT || rectype == RT_CRS))
Packit Service 672cf4
	if (_gpgme_decode_c_string (field[9], &key->issuer_name, 0))
Packit Service 672cf4
	  return gpg_error (GPG_ERR_ENOMEM);	/* FIXME */
Packit Service 672cf4
Packit Service 672cf4
      /* Field 11 has the signature class.  */
Packit Service 672cf4
Packit Service 672cf4
      /* Field 12 has the capabilities.  */
Packit Service 672cf4
      if (fields >= 12)
Packit Service 672cf4
	set_mainkey_capability (key, field[11]);
Packit Service 672cf4
Packit Service 672cf4
      /* Field 15 carries special flags of a secret key.  */
Packit Service 672cf4
      if (fields >= 15
Packit Service 672cf4
          && (key->secret
Packit Service 672cf4
              || (ctx->keylist_mode & GPGME_KEYLIST_MODE_WITH_SECRET)))
Packit Service 672cf4
        {
Packit Service 672cf4
          err = parse_sec_field15 (key, subkey, field[14]);
Packit Service 672cf4
          if (err)
Packit Service 672cf4
            return err;
Packit Service 672cf4
        }
Packit Service 672cf4
Packit Service 672cf4
      /* Field 17 has the curve name for ECC.  */
Packit Service 672cf4
      if (fields >= 17 && *field[16])
Packit Service 672cf4
        {
Packit Service 672cf4
          subkey->curve = strdup (field[16]);
Packit Service 672cf4
          if (!subkey->curve)
Packit Service 672cf4
            return gpg_error_from_syserror ();
Packit Service 672cf4
        }
Packit Service 672cf4
Packit Service 672cf4
      /* Field 18 has the compliance flags.  */
Packit Service 672cf4
      if (fields >= 17 && *field[17])
Packit Service 672cf4
        PARSE_COMPLIANCE_FLAGS (field[17], subkey);
Packit Service 672cf4
Packit Service 672cf4
      if (fields >= 20)
Packit Service 672cf4
        {
Packit Service 672cf4
          key->last_update = _gpgme_parse_timestamp_ul (field[18]);
Packit Service 672cf4
          key->origin = parse_keyorg (field[19]);
Packit Service 672cf4
        }
Packit Service 672cf4
Packit Service 672cf4
      break;
Packit Service 672cf4
Packit Service 672cf4
    case RT_SUB:
Packit Service 672cf4
    case RT_SSB:
Packit Service 672cf4
      /* Start a new subkey.  */
Packit Service 672cf4
      err = _gpgme_key_add_subkey (key, &subkey);
Packit Service 672cf4
      if (err)
Packit Service 672cf4
	return err;
Packit Service 672cf4
Packit Service 672cf4
      if (rectype == RT_SSB)
Packit Service 672cf4
	subkey->secret = 1;
Packit Service 672cf4
Packit Service 672cf4
      /* Field 2 has the trust info.  */
Packit Service 672cf4
      if (fields >= 2)
Packit Service 672cf4
	set_subkey_trust_info (subkey, field[1]);
Packit Service 672cf4
Packit Service 672cf4
      /* Field 3 has the key length.  */
Packit Service 672cf4
      if (fields >= 3)
Packit Service 672cf4
	{
Packit Service 672cf4
	  int i = atoi (field[2]);
Packit Service 672cf4
	  /* Ignore invalid values.  */
Packit Service 672cf4
	  if (i > 1)
Packit Service 672cf4
	    subkey->length = i;
Packit Service 672cf4
	}
Packit Service 672cf4
Packit Service 672cf4
      /* Field 4 has the public key algorithm.  */
Packit Service 672cf4
      if (fields >= 4)
Packit Service 672cf4
	{
Packit Service 672cf4
	  int i = atoi (field[3]);
Packit Service 672cf4
	  if (i >= 1 && i < 128)
Packit Service 672cf4
	    subkey->pubkey_algo = _gpgme_map_pk_algo (i, ctx->protocol);
Packit Service 672cf4
	}
Packit Service 672cf4
Packit Service 672cf4
      /* Field 5 has the long keyid.  */
Packit Service 672cf4
      if (fields >= 5 && strlen (field[4]) == DIM(subkey->_keyid) - 1)
Packit Service 672cf4
	strcpy (subkey->_keyid, field[4]);
Packit Service 672cf4
Packit Service 672cf4
      /* Field 6 has the timestamp (seconds).  */
Packit Service 672cf4
      if (fields >= 6)
Packit Service 672cf4
	subkey->timestamp = _gpgme_parse_timestamp (field[5], NULL);
Packit Service 672cf4
Packit Service 672cf4
      /* Field 7 has the expiration time (seconds).  */
Packit Service 672cf4
      if (fields >= 7)
Packit Service 672cf4
	subkey->expires = _gpgme_parse_timestamp (field[6], NULL);
Packit Service 672cf4
Packit Service 672cf4
      /* Field 8 is reserved (LID).  */
Packit Service 672cf4
      /* Field 9 has the ownertrust.  */
Packit Service 672cf4
      /* Field 10, the user ID, is n/a for a subkey.  */
Packit Service 672cf4
Packit Service 672cf4
      /* Field 11 has the signature class.  */
Packit Service 672cf4
Packit Service 672cf4
      /* Field 12 has the capabilities.  */
Packit Service 672cf4
      if (fields >= 12)
Packit Service 672cf4
	set_subkey_capability (subkey, field[11]);
Packit Service 672cf4
Packit Service 672cf4
      /* Field 15 carries special flags of a secret key. */
Packit Service 672cf4
      if (fields >= 15
Packit Service 672cf4
          && (key->secret
Packit Service 672cf4
              || (ctx->keylist_mode & GPGME_KEYLIST_MODE_WITH_SECRET)))
Packit Service 672cf4
        {
Packit Service 672cf4
          err = parse_sec_field15 (key, subkey, field[14]);
Packit Service 672cf4
          if (err)
Packit Service 672cf4
            return err;
Packit Service 672cf4
        }
Packit Service 672cf4
Packit Service 672cf4
      /* Field 17 has the curve name for ECC.  */
Packit Service 672cf4
      if (fields >= 17 && *field[16])
Packit Service 672cf4
        {
Packit Service 672cf4
          subkey->curve = strdup (field[16]);
Packit Service 672cf4
          if (!subkey->curve)
Packit Service 672cf4
            return gpg_error_from_syserror ();
Packit Service 672cf4
        }
Packit Service 672cf4
Packit Service 672cf4
      /* Field 18 has the compliance flags.  */
Packit Service 672cf4
      if (fields >= 17 && *field[17])
Packit Service 672cf4
        PARSE_COMPLIANCE_FLAGS (field[17], subkey);
Packit Service 672cf4
Packit Service 672cf4
      break;
Packit Service 672cf4
Packit Service 672cf4
    case RT_UID:
Packit Service 672cf4
      /* Field 2 has the trust info, and field 10 has the user ID.  */
Packit Service 672cf4
      if (fields >= 10)
Packit Service 672cf4
	{
Packit Service 672cf4
	  if (_gpgme_key_append_name (key, field[9], 1))
Packit Service 672cf4
	    return gpg_error (GPG_ERR_ENOMEM);	/* FIXME */
Packit Service 672cf4
Packit Service 672cf4
          if (field[1])
Packit Service 672cf4
            set_userid_flags (key, field[1]);
Packit Service 672cf4
          opd->tmp_uid = key->_last_uid;
Packit Service 672cf4
          if (fields >= 20)
Packit Service 672cf4
            {
Packit Service 672cf4
              opd->tmp_uid->last_update = _gpgme_parse_timestamp_ul (field[18]);
Packit Service 672cf4
              opd->tmp_uid->origin = parse_keyorg (field[19]);
Packit Service 672cf4
            }
Packit Service 672cf4
	}
Packit Service 672cf4
      break;
Packit Service 672cf4
Packit Service 672cf4
    case RT_TFS:
Packit Service 672cf4
      if (opd->tmp_uid)
Packit Service 672cf4
	{
Packit Service 672cf4
          err = parse_tfs_record (opd->tmp_uid, field, fields);
Packit Service 672cf4
          if (err)
Packit Service 672cf4
            return err;
Packit Service 672cf4
        }
Packit Service 672cf4
      break;
Packit Service 672cf4
Packit Service 672cf4
    case RT_FPR:
Packit Service 672cf4
      /* Field 10 has the fingerprint (take only the first one).  */
Packit Service 672cf4
      if (fields >= 10 && field[9] && *field[9])
Packit Service 672cf4
	{
Packit Service 672cf4
          /* Need to apply it to the last subkey because all subkeys
Packit Service 672cf4
             do have fingerprints. */
Packit Service 672cf4
          subkey = key->_last_subkey;
Packit Service 672cf4
          if (!subkey->fpr)
Packit Service 672cf4
            {
Packit Service 672cf4
              subkey->fpr = strdup (field[9]);
Packit Service 672cf4
              if (!subkey->fpr)
Packit Service 672cf4
                return gpg_error_from_syserror ();
Packit Service 672cf4
            }
Packit Service 672cf4
          /* If this is the first subkey, store the fingerprint also
Packit Service 672cf4
             in the KEY object.  */
Packit Service 672cf4
          if (subkey == key->subkeys)
Packit Service 672cf4
            {
Packit Service 672cf4
              if (key->fpr && strcmp (key->fpr, subkey->fpr))
Packit Service 672cf4
                {
Packit Service 672cf4
                  /* FPR already set but mismatch: Should never happen.  */
Packit Service 672cf4
                  return trace_gpg_error (GPG_ERR_INTERNAL);
Packit Service 672cf4
                }
Packit Service 672cf4
              if (!key->fpr)
Packit Service 672cf4
                {
Packit Service 672cf4
                  key->fpr = strdup (subkey->fpr);
Packit Service 672cf4
                  if (!key->fpr)
Packit Service 672cf4
                    return gpg_error_from_syserror ();
Packit Service 672cf4
                }
Packit Service 672cf4
            }
Packit Service 672cf4
	}
Packit Service 672cf4
Packit Service 672cf4
      /* Field 13 has the gpgsm chain ID (take only the first one).  */
Packit Service 672cf4
      if (fields >= 13 && !key->chain_id && *field[12])
Packit Service 672cf4
	{
Packit Service 672cf4
	  key->chain_id = strdup (field[12]);
Packit Service 672cf4
	  if (!key->chain_id)
Packit Service 672cf4
	    return gpg_error_from_syserror ();
Packit Service 672cf4
	}
Packit Service 672cf4
      break;
Packit Service 672cf4
Packit Service 672cf4
    case RT_GRP:
Packit Service 672cf4
      /* Field 10 has the keygrip.  */
Packit Service 672cf4
      if (fields >= 10 && field[9] && *field[9])
Packit Service 672cf4
	{
Packit Service 672cf4
          /* Need to apply it to the last subkey because all subkeys
Packit Service 672cf4
             have a keygrip. */
Packit Service 672cf4
          subkey = key->_last_subkey;
Packit Service 672cf4
          if (!subkey->keygrip)
Packit Service 672cf4
            {
Packit Service 672cf4
              subkey->keygrip = strdup (field[9]);
Packit Service 672cf4
              if (!subkey->keygrip)
Packit Service 672cf4
                return gpg_error_from_syserror ();
Packit Service 672cf4
            }
Packit Service 672cf4
	}
Packit Service 672cf4
      break;
Packit Service 672cf4
Packit Service 672cf4
    case RT_SIG:
Packit Service 672cf4
    case RT_REV:
Packit Service 672cf4
      if (!opd->tmp_uid)
Packit Service 672cf4
	return 0;
Packit Service 672cf4
Packit Service 672cf4
      /* Start a new (revoked) signature.  */
Packit Service 672cf4
      assert (opd->tmp_uid == key->_last_uid);
Packit Service 672cf4
      keysig = _gpgme_key_add_sig (key, (fields >= 10) ? field[9] : NULL);
Packit Service 672cf4
      if (!keysig)
Packit Service 672cf4
	return gpg_error (GPG_ERR_ENOMEM);	/* FIXME */
Packit Service 672cf4
Packit Service 672cf4
      /* Field 2 has the calculated trust ('!', '-', '?', '%').  */
Packit Service 672cf4
      if (fields >= 2)
Packit Service 672cf4
	switch (field[1][0])
Packit Service 672cf4
	  {
Packit Service 672cf4
	  case '!':
Packit Service 672cf4
	    keysig->status = gpg_error (GPG_ERR_NO_ERROR);
Packit Service 672cf4
	    break;
Packit Service 672cf4
Packit Service 672cf4
	  case '-':
Packit Service 672cf4
	    keysig->status = gpg_error (GPG_ERR_BAD_SIGNATURE);
Packit Service 672cf4
	    break;
Packit Service 672cf4
Packit Service 672cf4
	  case '?':
Packit Service 672cf4
	    keysig->status = gpg_error (GPG_ERR_NO_PUBKEY);
Packit Service 672cf4
	    break;
Packit Service 672cf4
Packit Service 672cf4
	  case '%':
Packit Service 672cf4
	    keysig->status = gpg_error (GPG_ERR_GENERAL);
Packit Service 672cf4
	    break;
Packit Service 672cf4
Packit Service 672cf4
	  default:
Packit Service 672cf4
	    keysig->status = gpg_error (GPG_ERR_NO_ERROR);
Packit Service 672cf4
	    break;
Packit Service 672cf4
	  }
Packit Service 672cf4
Packit Service 672cf4
      /* Field 4 has the public key algorithm.  */
Packit Service 672cf4
      if (fields >= 4)
Packit Service 672cf4
	{
Packit Service 672cf4
	  int i = atoi (field[3]);
Packit Service 672cf4
	  if (i >= 1 && i < 128)
Packit Service 672cf4
	    keysig->pubkey_algo = _gpgme_map_pk_algo (i, ctx->protocol);
Packit Service 672cf4
	}
Packit Service 672cf4
Packit Service 672cf4
      /* Field 5 has the long keyid.  */
Packit Service 672cf4
      if (fields >= 5 && strlen (field[4]) == DIM(keysig->_keyid) - 1)
Packit Service 672cf4
	strcpy (keysig->_keyid, field[4]);
Packit Service 672cf4
Packit Service 672cf4
      /* Field 6 has the timestamp (seconds).  */
Packit Service 672cf4
      if (fields >= 6)
Packit Service 672cf4
	keysig->timestamp = _gpgme_parse_timestamp (field[5], NULL);
Packit Service 672cf4
Packit Service 672cf4
      /* Field 7 has the expiration time (seconds).  */
Packit Service 672cf4
      if (fields >= 7)
Packit Service 672cf4
	keysig->expires = _gpgme_parse_timestamp (field[6], NULL);
Packit Service 672cf4
Packit Service 672cf4
      /* Field 11 has the signature class (eg, 0x30 means revoked).  */
Packit Service 672cf4
      if (fields >= 11)
Packit Service 672cf4
	if (field[10][0] && field[10][1])
Packit Service 672cf4
	  {
Packit Service 672cf4
	    int sig_class = _gpgme_hextobyte (field[10]);
Packit Service 672cf4
	    if (sig_class >= 0)
Packit Service 672cf4
	      {
Packit Service 672cf4
		keysig->sig_class = sig_class;
Packit Service 672cf4
		keysig->class = keysig->sig_class;
Packit Service 672cf4
		if (sig_class == 0x30)
Packit Service 672cf4
		  keysig->revoked = 1;
Packit Service 672cf4
	      }
Packit Service 672cf4
	    if (field[10][2] == 'x')
Packit Service 672cf4
	      keysig->exportable = 1;
Packit Service 672cf4
	  }
Packit Service 672cf4
Packit Service 672cf4
      opd->tmp_keysig = keysig;
Packit Service 672cf4
      break;
Packit Service 672cf4
Packit Service 672cf4
    case RT_SPK:
Packit Service 672cf4
      if (!opd->tmp_keysig)
Packit Service 672cf4
	return 0;
Packit Service 672cf4
      assert (opd->tmp_keysig == key->_last_uid->_last_keysig);
Packit Service 672cf4
Packit Service 672cf4
      if (fields >= 4)
Packit Service 672cf4
	{
Packit Service 672cf4
	  /* Field 2 has the subpacket type.  */
Packit Service 672cf4
	  int type = atoi (field[1]);
Packit Service 672cf4
Packit Service 672cf4
	  /* Field 3 has the flags.  */
Packit Service 672cf4
	  int flags = atoi (field[2]);
Packit Service 672cf4
Packit Service 672cf4
	  /* Field 4 has the length.  */
Packit Service 672cf4
	  int len = atoi (field[3]);
Packit Service 672cf4
Packit Service 672cf4
	  /* Field 5 has the data.  */
Packit Service 672cf4
	  char *data = field[4];
Packit Service 672cf4
Packit Service 672cf4
	  /* Type 20: Notation data.  */
Packit Service 672cf4
	  /* Type 26: Policy URL.  */
Packit Service 672cf4
	  if (type == 20 || type == 26)
Packit Service 672cf4
	    {
Packit Service 672cf4
	      gpgme_sig_notation_t notation;
Packit Service 672cf4
Packit Service 672cf4
	      keysig = opd->tmp_keysig;
Packit Service 672cf4
Packit Service 672cf4
	      /* At this time, any error is serious.  */
Packit Service 672cf4
	      err = _gpgme_parse_notation (&notation, type, flags, len, data);
Packit Service 672cf4
	      if (err)
Packit Service 672cf4
		return err;
Packit Service 672cf4
Packit Service 672cf4
	      /* Add a new notation.  FIXME: Could be factored out.  */
Packit Service 672cf4
	      if (!keysig->notations)
Packit Service 672cf4
		keysig->notations = notation;
Packit Service 672cf4
	      if (keysig->_last_notation)
Packit Service 672cf4
		keysig->_last_notation->next = notation;
Packit Service 672cf4
	      keysig->_last_notation = notation;
Packit Service 672cf4
	    }
Packit Service 672cf4
	}
Packit Service 672cf4
Packit Service 672cf4
    case RT_NONE:
Packit Service 672cf4
      /* Unknown record.  */
Packit Service 672cf4
      break;
Packit Service 672cf4
    }
Packit Service 672cf4
  return 0;
Packit Service 672cf4
}
Packit Service 672cf4
Packit Service 672cf4
Packit Service 672cf4
void
Packit Service 672cf4
_gpgme_op_keylist_event_cb (void *data, gpgme_event_io_t type, void *type_data)
Packit Service 672cf4
{
Packit Service 672cf4
  gpgme_error_t err;
Packit Service 672cf4
  gpgme_ctx_t ctx = (gpgme_ctx_t) data;
Packit Service 672cf4
  gpgme_key_t key = (gpgme_key_t) type_data;
Packit Service 672cf4
  void *hook;
Packit Service 672cf4
  op_data_t opd;
Packit Service 672cf4
  struct key_queue_item_s *q, *q2;
Packit Service 672cf4
Packit Service 672cf4
  assert (type == GPGME_EVENT_NEXT_KEY);
Packit Service 672cf4
Packit Service 672cf4
  err = _gpgme_op_data_lookup (ctx, OPDATA_KEYLIST, &hook, -1, NULL);
Packit Service 672cf4
  opd = hook;
Packit Service 672cf4
  if (err)
Packit Service 672cf4
    return;
Packit Service 672cf4
Packit Service 672cf4
  q = malloc (sizeof *q);
Packit Service 672cf4
  if (!q)
Packit Service 672cf4
    {
Packit Service 672cf4
      gpgme_key_unref (key);
Packit Service 672cf4
      /* FIXME       return GPGME_Out_Of_Core; */
Packit Service 672cf4
      return;
Packit Service 672cf4
    }
Packit Service 672cf4
  q->key = key;
Packit Service 672cf4
  q->next = NULL;
Packit Service 672cf4
  /* FIXME: Use a tail pointer?  */
Packit Service 672cf4
  if (!(q2 = opd->key_queue))
Packit Service 672cf4
    opd->key_queue = q;
Packit Service 672cf4
  else
Packit Service 672cf4
    {
Packit Service 672cf4
      for (; q2->next; q2 = q2->next)
Packit Service 672cf4
	;
Packit Service 672cf4
      q2->next = q;
Packit Service 672cf4
    }
Packit Service 672cf4
  opd->key_cond = 1;
Packit Service 672cf4
}
Packit Service 672cf4
Packit Service 672cf4
Packit Service 672cf4
/* Start a keylist operation within CTX, searching for keys which
Packit Service 672cf4
   match PATTERN.  If SECRET_ONLY is true, only secret keys are
Packit Service 672cf4
   returned.  */
Packit Service 672cf4
gpgme_error_t
Packit Service 672cf4
gpgme_op_keylist_start (gpgme_ctx_t ctx, const char *pattern, int secret_only)
Packit Service 672cf4
{
Packit Service 672cf4
  gpgme_error_t err;
Packit Service 672cf4
  void *hook;
Packit Service 672cf4
  op_data_t opd;
Packit Service 672cf4
  int flags = 0;
Packit Service 672cf4
Packit Service 0ef63b
  TRACE_BEG  (DEBUG_CTX, "gpgme_op_keylist_start", ctx,
Packit Service 672cf4
	      "pattern=%s, secret_only=%i", pattern, secret_only);
Packit Service 672cf4
Packit Service 672cf4
  if (!ctx)
Packit Service 672cf4
    return TRACE_ERR (gpg_error (GPG_ERR_INV_VALUE));
Packit Service 672cf4
Packit Service 672cf4
  err = _gpgme_op_reset (ctx, 2);
Packit Service 672cf4
  if (err)
Packit Service 672cf4
    return TRACE_ERR (err);
Packit Service 672cf4
Packit Service 672cf4
  err = _gpgme_op_data_lookup (ctx, OPDATA_KEYLIST, &hook,
Packit Service 672cf4
			       sizeof (*opd), release_op_data);
Packit Service 672cf4
  opd = hook;
Packit Service 672cf4
  if (err)
Packit Service 672cf4
    return TRACE_ERR (err);
Packit Service 672cf4
Packit Service 672cf4
  _gpgme_engine_set_status_handler (ctx->engine, keylist_status_handler, ctx);
Packit Service 672cf4
Packit Service 672cf4
  err = _gpgme_engine_set_colon_line_handler (ctx->engine,
Packit Service 672cf4
					      keylist_colon_handler, ctx);
Packit Service 672cf4
  if (err)
Packit Service 672cf4
    return TRACE_ERR (err);
Packit Service 672cf4
Packit Service 672cf4
  if (ctx->offline)
Packit Service 672cf4
    flags |= GPGME_ENGINE_FLAG_OFFLINE;
Packit Service 672cf4
Packit Service 672cf4
  err = _gpgme_engine_op_keylist (ctx->engine, pattern, secret_only,
Packit Service 672cf4
				  ctx->keylist_mode, flags);
Packit Service 672cf4
  return TRACE_ERR (err);
Packit Service 672cf4
}
Packit Service 672cf4
Packit Service 672cf4
Packit Service 672cf4
/* Start a keylist operation within CTX, searching for keys which
Packit Service 672cf4
   match PATTERN.  If SECRET_ONLY is true, only secret keys are
Packit Service 672cf4
   returned.  */
Packit Service 672cf4
gpgme_error_t
Packit Service 672cf4
gpgme_op_keylist_ext_start (gpgme_ctx_t ctx, const char *pattern[],
Packit Service 672cf4
			    int secret_only, int reserved)
Packit Service 672cf4
{
Packit Service 672cf4
  gpgme_error_t err;
Packit Service 672cf4
  void *hook;
Packit Service 672cf4
  op_data_t opd;
Packit Service 672cf4
  int flags = 0;
Packit Service 672cf4
Packit Service 0ef63b
  TRACE_BEG  (DEBUG_CTX, "gpgme_op_keylist_ext_start", ctx,
Packit Service 672cf4
	      "secret_only=%i, reserved=0x%x", secret_only, reserved);
Packit Service 672cf4
Packit Service 672cf4
  if (!ctx)
Packit Service 672cf4
    return TRACE_ERR (gpg_error (GPG_ERR_INV_VALUE));
Packit Service 672cf4
Packit Service 672cf4
  err = _gpgme_op_reset (ctx, 2);
Packit Service 672cf4
  if (err)
Packit Service 672cf4
    return TRACE_ERR (err);
Packit Service 672cf4
Packit Service 672cf4
  err = _gpgme_op_data_lookup (ctx, OPDATA_KEYLIST, &hook,
Packit Service 672cf4
			       sizeof (*opd), release_op_data);
Packit Service 672cf4
  opd = hook;
Packit Service 672cf4
  if (err)
Packit Service 672cf4
    return TRACE_ERR (err);
Packit Service 672cf4
Packit Service 672cf4
  _gpgme_engine_set_status_handler (ctx->engine, keylist_status_handler, ctx);
Packit Service 672cf4
  err = _gpgme_engine_set_colon_line_handler (ctx->engine,
Packit Service 672cf4
					      keylist_colon_handler, ctx);
Packit Service 672cf4
  if (err)
Packit Service 672cf4
    return TRACE_ERR (err);
Packit Service 672cf4
Packit Service 672cf4
  if (ctx->offline)
Packit Service 672cf4
    flags |= GPGME_ENGINE_FLAG_OFFLINE;
Packit Service 672cf4
Packit Service 672cf4
  err = _gpgme_engine_op_keylist_ext (ctx->engine, pattern, secret_only,
Packit Service 672cf4
				      reserved, ctx->keylist_mode,
Packit Service 672cf4
				      flags);
Packit Service 672cf4
  return TRACE_ERR (err);
Packit Service 672cf4
}
Packit Service 672cf4
Packit Service 672cf4
Packit Service 672cf4
/* Start a keylist operation within CTX to show keys contained
Packit Service 672cf4
 * in DATA.  */
Packit Service 672cf4
gpgme_error_t
Packit Service 672cf4
gpgme_op_keylist_from_data_start (gpgme_ctx_t ctx, gpgme_data_t data,
Packit Service 672cf4
                                  int reserved)
Packit Service 672cf4
{
Packit Service 672cf4
  gpgme_error_t err;
Packit Service 672cf4
  void *hook;
Packit Service 672cf4
  op_data_t opd;
Packit Service 672cf4
Packit Service 0ef63b
  TRACE_BEG (DEBUG_CTX, "gpgme_op_keylist_from_data_start", ctx, "");
Packit Service 672cf4
Packit Service 672cf4
  if (!ctx || !data || reserved)
Packit Service 672cf4
    return TRACE_ERR (gpg_error (GPG_ERR_INV_VALUE));
Packit Service 672cf4
Packit Service 672cf4
  err = _gpgme_op_reset (ctx, 2);
Packit Service 672cf4
  if (err)
Packit Service 672cf4
    return TRACE_ERR (err);
Packit Service 672cf4
Packit Service 672cf4
  err = _gpgme_op_data_lookup (ctx, OPDATA_KEYLIST, &hook,
Packit Service 672cf4
                               sizeof (*opd), release_op_data);
Packit Service 672cf4
  opd = hook;
Packit Service 672cf4
  if (err)
Packit Service 672cf4
    return TRACE_ERR (err);
Packit Service 672cf4
Packit Service 672cf4
  _gpgme_engine_set_status_handler (ctx->engine, keylist_status_handler, ctx);
Packit Service 672cf4
  err = _gpgme_engine_set_colon_line_handler (ctx->engine,
Packit Service 672cf4
                                              keylist_colon_handler, ctx);
Packit Service 672cf4
  if (err)
Packit Service 672cf4
    return TRACE_ERR (err);
Packit Service 672cf4
Packit Service 672cf4
  err = _gpgme_engine_op_keylist_data (ctx->engine, data);
Packit Service 672cf4
  return TRACE_ERR (err);
Packit Service 672cf4
}
Packit Service 672cf4
Packit Service 672cf4
Packit Service 672cf4
/* Return the next key from the keylist in R_KEY.  */
Packit Service 672cf4
gpgme_error_t
Packit Service 672cf4
gpgme_op_keylist_next (gpgme_ctx_t ctx, gpgme_key_t *r_key)
Packit Service 672cf4
{
Packit Service 672cf4
  gpgme_error_t err;
Packit Service 672cf4
  struct key_queue_item_s *queue_item;
Packit Service 672cf4
  void *hook;
Packit Service 672cf4
  op_data_t opd;
Packit Service 672cf4
Packit Service 0ef63b
  TRACE_BEG (DEBUG_CTX, "gpgme_op_keylist_next", ctx, "");
Packit Service 672cf4
Packit Service 672cf4
  if (!ctx || !r_key)
Packit Service 672cf4
    return TRACE_ERR (gpg_error (GPG_ERR_INV_VALUE));
Packit Service 672cf4
  *r_key = NULL;
Packit Service 672cf4
  if (!ctx)
Packit Service 672cf4
    return TRACE_ERR (gpg_error (GPG_ERR_INV_VALUE));
Packit Service 672cf4
Packit Service 672cf4
  err = _gpgme_op_data_lookup (ctx, OPDATA_KEYLIST, &hook, -1, NULL);
Packit Service 672cf4
  opd = hook;
Packit Service 672cf4
  if (err)
Packit Service 672cf4
    return TRACE_ERR (err);
Packit Service 672cf4
  if (opd == NULL)
Packit Service 672cf4
    return TRACE_ERR (gpg_error (GPG_ERR_INV_VALUE));
Packit Service 672cf4
Packit Service 672cf4
  if (!opd->key_queue)
Packit Service 672cf4
    {
Packit Service 672cf4
      err = _gpgme_wait_on_condition (ctx, &opd->key_cond, NULL);
Packit Service 672cf4
      if (err)
Packit Service 672cf4
	return TRACE_ERR (err);
Packit Service 672cf4
Packit Service 672cf4
      if (!opd->key_cond)
Packit Service 672cf4
	return TRACE_ERR (opd->keydb_search_err? opd->keydb_search_err
Packit Service 672cf4
                          /**/                 : gpg_error (GPG_ERR_EOF));
Packit Service 672cf4
Packit Service 672cf4
      opd->key_cond = 0;
Packit Service 672cf4
      assert (opd->key_queue);
Packit Service 672cf4
    }
Packit Service 672cf4
  queue_item = opd->key_queue;
Packit Service 672cf4
  opd->key_queue = queue_item->next;
Packit Service 672cf4
  if (!opd->key_queue)
Packit Service 672cf4
    opd->key_cond = 0;
Packit Service 672cf4
Packit Service 672cf4
  *r_key = queue_item->key;
Packit Service 672cf4
  free (queue_item);
Packit Service 672cf4
Packit Service 0ef63b
  TRACE_SUC ("key=%p (%s)", *r_key,
Packit Service 0ef63b
             ((*r_key)->subkeys && (*r_key)->subkeys->fpr) ?
Packit Service 0ef63b
             (*r_key)->subkeys->fpr : "invalid");
Packit Service 0ef63b
  return 0;
Packit Service 672cf4
}
Packit Service 672cf4
Packit Service 672cf4
Packit Service 672cf4
/* Terminate a pending keylist operation within CTX.  */
Packit Service 672cf4
gpgme_error_t
Packit Service 672cf4
gpgme_op_keylist_end (gpgme_ctx_t ctx)
Packit Service 672cf4
{
Packit Service 0ef63b
  TRACE (DEBUG_CTX, "gpgme_op_keylist_end", ctx, "");
Packit Service 672cf4
Packit Service 672cf4
  if (!ctx)
Packit Service 672cf4
    return gpg_error (GPG_ERR_INV_VALUE);
Packit Service 672cf4
Packit Service 672cf4
  return 0;
Packit Service 672cf4
}
Packit Service 672cf4
Packit Service 672cf4

Packit Service 672cf4
/* Get the key with the fingerprint FPR from the crypto backend.  If
Packit Service 672cf4
   SECRET is true, get the secret key.  */
Packit Service 672cf4
gpgme_error_t
Packit Service 672cf4
gpgme_get_key (gpgme_ctx_t ctx, const char *fpr, gpgme_key_t *r_key,
Packit Service 672cf4
	       int secret)
Packit Service 672cf4
{
Packit Service 672cf4
  gpgme_ctx_t listctx;
Packit Service 672cf4
  gpgme_error_t err;
Packit Service 0ef63b
  gpgme_key_t result, key;
Packit Service 672cf4
Packit Service 0ef63b
  TRACE_BEG  (DEBUG_CTX, "gpgme_get_key", ctx,
Packit Service 672cf4
	      "fpr=%s, secret=%i", fpr, secret);
Packit Service 672cf4
Packit Service 0ef63b
  if (r_key)
Packit Service 0ef63b
    *r_key = NULL;
Packit Service 0ef63b
Packit Service 672cf4
  if (!ctx || !r_key || !fpr)
Packit Service 672cf4
    return TRACE_ERR (gpg_error (GPG_ERR_INV_VALUE));
Packit Service 672cf4
Packit Service 672cf4
  if (strlen (fpr) < 8)	/* We have at least a key ID.  */
Packit Service 672cf4
    return TRACE_ERR (gpg_error (GPG_ERR_INV_VALUE));
Packit Service 672cf4
Packit Service 672cf4
  /* FIXME: We use our own context because we have to avoid the user's
Packit Service 672cf4
     I/O callback handlers.  */
Packit Service 672cf4
  err = gpgme_new (&listctx);
Packit Service 672cf4
  if (err)
Packit Service 672cf4
    return TRACE_ERR (err);
Packit Service 672cf4
  {
Packit Service 672cf4
    gpgme_protocol_t proto;
Packit Service 672cf4
    gpgme_engine_info_t info;
Packit Service 672cf4
Packit Service 672cf4
    /* Clone the relevant state.  */
Packit Service 672cf4
    proto = gpgme_get_protocol (ctx);
Packit Service 672cf4
    gpgme_set_protocol (listctx, proto);
Packit Service 672cf4
    gpgme_set_keylist_mode (listctx, gpgme_get_keylist_mode (ctx));
Packit Service 672cf4
    info = gpgme_ctx_get_engine_info (ctx);
Packit Service 672cf4
    while (info && info->protocol != proto)
Packit Service 672cf4
      info = info->next;
Packit Service 672cf4
    if (info)
Packit Service 672cf4
      gpgme_ctx_set_engine_info (listctx, proto,
Packit Service 672cf4
				 info->file_name, info->home_dir);
Packit Service 672cf4
  }
Packit Service 672cf4
Packit Service 672cf4
  err = gpgme_op_keylist_start (listctx, fpr, secret);
Packit Service 672cf4
  if (!err)
Packit Service 0ef63b
    err = gpgme_op_keylist_next (listctx, &result);
Packit Service 672cf4
  if (!err)
Packit Service 672cf4
    {
Packit Service 672cf4
    try_next_key:
Packit Service 672cf4
      err = gpgme_op_keylist_next (listctx, &key);
Packit Service 672cf4
      if (gpgme_err_code (err) == GPG_ERR_EOF)
Packit Service 672cf4
	err = 0;
Packit Service 672cf4
      else
Packit Service 672cf4
	{
Packit Service 672cf4
          if (!err
Packit Service 0ef63b
              && result && result->subkeys && result->subkeys->fpr
Packit Service 672cf4
              && key && key->subkeys && key->subkeys->fpr
Packit Service 0ef63b
              && !strcmp (result->subkeys->fpr, key->subkeys->fpr))
Packit Service 672cf4
            {
Packit Service 672cf4
              /* The fingerprint is identical.  We assume that this is
Packit Service 672cf4
                 the same key and don't mark it as an ambiguous.  This
Packit Service 672cf4
                 problem may occur with corrupted keyrings and has
Packit Service 672cf4
                 been noticed often with gpgsm.  In fact gpgsm uses a
Packit Service 672cf4
                 similar hack to sort out such duplicates but it can't
Packit Service 672cf4
                 do that while listing keys.  */
Packit Service 672cf4
              gpgme_key_unref (key);
Packit Service 672cf4
              goto try_next_key;
Packit Service 672cf4
            }
Packit Service 672cf4
	  if (!err)
Packit Service 672cf4
	    {
Packit Service 672cf4
	      gpgme_key_unref (key);
Packit Service 672cf4
	      err = gpg_error (GPG_ERR_AMBIGUOUS_NAME);
Packit Service 672cf4
	    }
Packit Service 0ef63b
	  gpgme_key_unref (result);
Packit Service 0ef63b
          result = NULL;
Packit Service 672cf4
	}
Packit Service 672cf4
    }
Packit Service 672cf4
  gpgme_release (listctx);
Packit Service 672cf4
  if (! err)
Packit Service 672cf4
    {
Packit Service 0ef63b
      *r_key = result;
Packit Service 0ef63b
      TRACE_LOG  ("key=%p (%s)", *r_key,
Packit Service 672cf4
		  ((*r_key)->subkeys && (*r_key)->subkeys->fpr) ?
Packit Service 672cf4
		  (*r_key)->subkeys->fpr : "invalid");
Packit Service 672cf4
    }
Packit Service 672cf4
  return TRACE_ERR (err);
Packit Service 672cf4
}