Blame src/keylist.c

Packit d7e8d0
/* keylist.c - Listing keys.
Packit Service 30b792
 * Copyright (C) 2000 Werner Koch (dd9jn)
Packit Service 30b792
 * Copyright (C) 2001, 2002, 2003, 2004, 2006, 2007,
Packit Service 30b792
 *               2008, 2009  g10 Code GmbH
Packit Service 30b792
 *
Packit Service 30b792
 * This file is part of GPGME.
Packit Service 30b792
 *
Packit Service 30b792
 * GPGME is free software; you can redistribute it and/or modify it
Packit Service 30b792
 * under the terms of the GNU Lesser General Public License as
Packit Service 30b792
 * published by the Free Software Foundation; either version 2.1 of
Packit Service 30b792
 * the License, or (at your option) any later version.
Packit Service 30b792
 *
Packit Service 30b792
 * GPGME is distributed in the hope that it will be useful, but
Packit Service 30b792
 * WITHOUT ANY WARRANTY; without even the implied warranty of
Packit Service 30b792
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
Packit Service 30b792
 * Lesser General Public License for more details.
Packit Service 30b792
 *
Packit Service 30b792
 * You should have received a copy of the GNU Lesser General Public
Packit Service 30b792
 * License along with this program; if not, see <https://gnu.org/licenses/>.
Packit Service 30b792
 * SPDX-License-Identifier: LGPL-2.1-or-later
Packit d7e8d0
 */
Packit d7e8d0
Packit d7e8d0
#if HAVE_CONFIG_H
Packit d7e8d0
#include <config.h>
Packit d7e8d0
#endif
Packit d7e8d0
#include <stdio.h>
Packit d7e8d0
#include <stdlib.h>
Packit d7e8d0
#include <string.h>
Packit d7e8d0
#ifdef HAVE_SYS_TYPES_H
Packit d7e8d0
  /* Solaris 8 needs sys/types.h before time.h.  */
Packit d7e8d0
# include <sys/types.h>
Packit d7e8d0
#endif
Packit d7e8d0
#include <time.h>
Packit d7e8d0
#include <assert.h>
Packit d7e8d0
#include <ctype.h>
Packit d7e8d0
#include <errno.h>
Packit d7e8d0
#include <limits.h>
Packit d7e8d0
Packit d7e8d0
/* Suppress warning for accessing deprecated member "class".  */
Packit d7e8d0
#define _GPGME_IN_GPGME
Packit d7e8d0
#include "gpgme.h"
Packit d7e8d0
#include "util.h"
Packit d7e8d0
#include "context.h"
Packit d7e8d0
#include "ops.h"
Packit d7e8d0
#include "debug.h"
Packit d7e8d0
Packit d7e8d0

Packit d7e8d0
struct key_queue_item_s
Packit d7e8d0
{
Packit d7e8d0
  struct key_queue_item_s *next;
Packit d7e8d0
  gpgme_key_t key;
Packit d7e8d0
};
Packit d7e8d0
Packit d7e8d0
typedef struct
Packit d7e8d0
{
Packit d7e8d0
  struct _gpgme_op_keylist_result result;
Packit d7e8d0
Packit d7e8d0
  /* The error code from ERROR keydb_search. */
Packit d7e8d0
  gpgme_error_t keydb_search_err;
Packit d7e8d0
Packit d7e8d0
  gpgme_key_t tmp_key;
Packit d7e8d0
Packit d7e8d0
  /* This points to the last uid in tmp_key.  */
Packit d7e8d0
  gpgme_user_id_t tmp_uid;
Packit d7e8d0
Packit d7e8d0
  /* This points to the last sig in tmp_uid.  */
Packit d7e8d0
  gpgme_key_sig_t tmp_keysig;
Packit d7e8d0
Packit d7e8d0
  /* Something new is available.  */
Packit d7e8d0
  int key_cond;
Packit d7e8d0
  struct key_queue_item_s *key_queue;
Packit d7e8d0
} *op_data_t;
Packit d7e8d0
Packit d7e8d0
Packit d7e8d0
static void
Packit d7e8d0
release_op_data (void *hook)
Packit d7e8d0
{
Packit d7e8d0
  op_data_t opd = (op_data_t) hook;
Packit d7e8d0
  struct key_queue_item_s *key = opd->key_queue;
Packit d7e8d0
Packit d7e8d0
  if (opd->tmp_key)
Packit d7e8d0
    gpgme_key_unref (opd->tmp_key);
Packit d7e8d0
Packit d7e8d0
  /* opd->tmp_uid and opd->tmp_keysig are actually part of opd->tmp_key,
Packit d7e8d0
     so we do not need to release them here.  */
Packit d7e8d0
Packit d7e8d0
  while (key)
Packit d7e8d0
    {
Packit d7e8d0
      struct key_queue_item_s *next = key->next;
Packit d7e8d0
Packit d7e8d0
      gpgme_key_unref (key->key);
Packit d7e8d0
      key = next;
Packit d7e8d0
    }
Packit d7e8d0
}
Packit d7e8d0
Packit d7e8d0
Packit d7e8d0
gpgme_keylist_result_t
Packit d7e8d0
gpgme_op_keylist_result (gpgme_ctx_t ctx)
Packit d7e8d0
{
Packit d7e8d0
  void *hook;
Packit d7e8d0
  op_data_t opd;
Packit d7e8d0
  gpgme_error_t err;
Packit d7e8d0
Packit Service 30b792
  TRACE_BEG (DEBUG_CTX, "gpgme_op_keylist_result", ctx, "");
Packit d7e8d0
Packit d7e8d0
  err = _gpgme_op_data_lookup (ctx, OPDATA_KEYLIST, &hook, -1, NULL);
Packit d7e8d0
  opd = hook;
Packit d7e8d0
  if (err || !opd)
Packit d7e8d0
    {
Packit Service 30b792
      TRACE_SUC ("result=(null)");
Packit d7e8d0
      return NULL;
Packit d7e8d0
    }
Packit d7e8d0
Packit Service 30b792
  TRACE_LOG  ("truncated = %i", opd->result.truncated);
Packit d7e8d0
Packit Service 30b792
  TRACE_SUC ("result=%p", &opd->result);
Packit d7e8d0
  return &opd->result;
Packit d7e8d0
}
Packit d7e8d0
Packit d7e8d0

Packit d7e8d0
static gpgme_error_t
Packit d7e8d0
keylist_status_handler (void *priv, gpgme_status_code_t code, char *args)
Packit d7e8d0
{
Packit d7e8d0
  gpgme_ctx_t ctx = (gpgme_ctx_t) priv;
Packit d7e8d0
  gpgme_error_t err;
Packit d7e8d0
  void *hook;
Packit d7e8d0
  op_data_t opd;
Packit d7e8d0
Packit d7e8d0
  (void)args;
Packit d7e8d0
Packit d7e8d0
  err = _gpgme_op_data_lookup (ctx, OPDATA_KEYLIST, &hook, -1, NULL);
Packit d7e8d0
  opd = hook;
Packit d7e8d0
  if (err)
Packit d7e8d0
    return err;
Packit d7e8d0
Packit d7e8d0
  switch (code)
Packit d7e8d0
    {
Packit d7e8d0
    case GPGME_STATUS_TRUNCATED:
Packit d7e8d0
      opd->result.truncated = 1;
Packit d7e8d0
      break;
Packit d7e8d0
Packit d7e8d0
    case GPGME_STATUS_ERROR:
Packit d7e8d0
      err = _gpgme_parse_failure (args);
Packit d7e8d0
      if (!opd->keydb_search_err && !strcmp (args, "keydb_search"))
Packit d7e8d0
        opd->keydb_search_err = err;
Packit d7e8d0
      err = 0;
Packit d7e8d0
      break;
Packit d7e8d0
Packit d7e8d0
    default:
Packit d7e8d0
      break;
Packit d7e8d0
    }
Packit d7e8d0
  return err;
Packit d7e8d0
}
Packit d7e8d0
Packit d7e8d0

Packit d7e8d0
static void
Packit d7e8d0
set_subkey_trust_info (gpgme_subkey_t subkey, const char *src)
Packit d7e8d0
{
Packit d7e8d0
  while (*src && !isdigit (*src))
Packit d7e8d0
    {
Packit d7e8d0
      switch (*src)
Packit d7e8d0
	{
Packit d7e8d0
	case 'e':
Packit d7e8d0
	  subkey->expired = 1;
Packit d7e8d0
	  break;
Packit d7e8d0
Packit d7e8d0
	case 'r':
Packit d7e8d0
	  subkey->revoked = 1;
Packit d7e8d0
	  break;
Packit d7e8d0
Packit d7e8d0
	case 'd':
Packit d7e8d0
          /* Note that gpg 1.3 won't print that anymore but only uses
Packit d7e8d0
             the capabilities field. */
Packit d7e8d0
	  subkey->disabled = 1;
Packit d7e8d0
	  break;
Packit d7e8d0
Packit d7e8d0
	case 'i':
Packit d7e8d0
	  subkey->invalid = 1;
Packit d7e8d0
	  break;
Packit d7e8d0
        }
Packit d7e8d0
      src++;
Packit d7e8d0
    }
Packit d7e8d0
}
Packit d7e8d0
Packit d7e8d0
Packit d7e8d0
static void
Packit d7e8d0
set_mainkey_trust_info (gpgme_key_t key, const char *src)
Packit d7e8d0
{
Packit d7e8d0
  /* First set the trust info of the main key (the first subkey).  */
Packit d7e8d0
  set_subkey_trust_info (key->subkeys, src);
Packit d7e8d0
Packit d7e8d0
  /* Now set the summarized trust info.  */
Packit d7e8d0
  while (*src && !isdigit (*src))
Packit d7e8d0
    {
Packit d7e8d0
      switch (*src)
Packit d7e8d0
	{
Packit d7e8d0
	case 'e':
Packit d7e8d0
	  key->expired = 1;
Packit d7e8d0
	  break;
Packit d7e8d0
Packit d7e8d0
	case 'r':
Packit d7e8d0
	  key->revoked = 1;
Packit d7e8d0
	  break;
Packit d7e8d0
Packit d7e8d0
	case 'd':
Packit d7e8d0
          /* Note that gpg 1.3 won't print that anymore but only uses
Packit d7e8d0
             the capabilities field.  However, it is still used for
Packit d7e8d0
             external key listings.  */
Packit d7e8d0
	  key->disabled = 1;
Packit d7e8d0
	  break;
Packit d7e8d0
Packit d7e8d0
	case 'i':
Packit d7e8d0
	  key->invalid = 1;
Packit d7e8d0
	  break;
Packit d7e8d0
        }
Packit d7e8d0
      src++;
Packit d7e8d0
    }
Packit d7e8d0
}
Packit d7e8d0
Packit d7e8d0
Packit d7e8d0
static void
Packit d7e8d0
set_userid_flags (gpgme_key_t key, const char *src)
Packit d7e8d0
{
Packit d7e8d0
  gpgme_user_id_t uid = key->_last_uid;
Packit d7e8d0
Packit d7e8d0
  assert (uid);
Packit d7e8d0
  /* Look at letters and stop at the first digit.  */
Packit d7e8d0
  while (*src && !isdigit (*src))
Packit d7e8d0
    {
Packit d7e8d0
      switch (*src)
Packit d7e8d0
	{
Packit d7e8d0
	case 'r':
Packit d7e8d0
	  uid->revoked = 1;
Packit d7e8d0
	  break;
Packit d7e8d0
Packit d7e8d0
	case 'i':
Packit d7e8d0
	  uid->invalid = 1;
Packit d7e8d0
	  break;
Packit d7e8d0
Packit d7e8d0
	case 'n':
Packit d7e8d0
	  uid->validity = GPGME_VALIDITY_NEVER;
Packit d7e8d0
	  break;
Packit d7e8d0
Packit d7e8d0
	case 'm':
Packit d7e8d0
	  uid->validity = GPGME_VALIDITY_MARGINAL;
Packit d7e8d0
	  break;
Packit d7e8d0
Packit d7e8d0
	case 'f':
Packit d7e8d0
	  uid->validity = GPGME_VALIDITY_FULL;
Packit d7e8d0
	  break;
Packit d7e8d0
Packit d7e8d0
	case 'u':
Packit d7e8d0
	  uid->validity = GPGME_VALIDITY_ULTIMATE;
Packit d7e8d0
	  break;
Packit d7e8d0
        }
Packit d7e8d0
      src++;
Packit d7e8d0
    }
Packit d7e8d0
}
Packit d7e8d0
Packit d7e8d0
Packit d7e8d0
static void
Packit d7e8d0
set_subkey_capability (gpgme_subkey_t subkey, const char *src)
Packit d7e8d0
{
Packit d7e8d0
  while (*src)
Packit d7e8d0
    {
Packit d7e8d0
      switch (*src)
Packit d7e8d0
	{
Packit d7e8d0
	case 'e':
Packit d7e8d0
	  subkey->can_encrypt = 1;
Packit d7e8d0
	  break;
Packit d7e8d0
Packit d7e8d0
	case 's':
Packit d7e8d0
	  subkey->can_sign = 1;
Packit d7e8d0
	  break;
Packit d7e8d0
Packit d7e8d0
	case 'c':
Packit d7e8d0
	  subkey->can_certify = 1;
Packit d7e8d0
	  break;
Packit d7e8d0
Packit d7e8d0
	case 'a':
Packit d7e8d0
	  subkey->can_authenticate = 1;
Packit d7e8d0
	  break;
Packit d7e8d0
Packit d7e8d0
	case 'q':
Packit d7e8d0
	  subkey->is_qualified = 1;
Packit d7e8d0
	  break;
Packit d7e8d0
Packit d7e8d0
	case 'd':
Packit d7e8d0
	  subkey->disabled = 1;
Packit d7e8d0
	  break;
Packit d7e8d0
        }
Packit d7e8d0
      src++;
Packit d7e8d0
    }
Packit d7e8d0
}
Packit d7e8d0
Packit d7e8d0
Packit d7e8d0
static void
Packit d7e8d0
set_mainkey_capability (gpgme_key_t key, const char *src)
Packit d7e8d0
{
Packit d7e8d0
  /* First set the capabilities of the main key (the first subkey).  */
Packit d7e8d0
  set_subkey_capability (key->subkeys, src);
Packit d7e8d0
Packit d7e8d0
  while (*src)
Packit d7e8d0
    {
Packit d7e8d0
      switch (*src)
Packit d7e8d0
	{
Packit d7e8d0
	case 'd':
Packit d7e8d0
        case 'D':
Packit d7e8d0
          /* Note, that this flag is also set using the key validity
Packit d7e8d0
             field for backward compatibility with gpg 1.2.  We use d
Packit d7e8d0
             and D, so that a future gpg version will be able to
Packit d7e8d0
             disable certain subkeys. Currently it is expected that
Packit d7e8d0
             gpg sets this for the primary key. */
Packit d7e8d0
       	  key->disabled = 1;
Packit d7e8d0
          break;
Packit d7e8d0
Packit d7e8d0
	case 'e':
Packit d7e8d0
	case 'E':
Packit d7e8d0
	  key->can_encrypt = 1;
Packit d7e8d0
	  break;
Packit d7e8d0
Packit d7e8d0
	case 's':
Packit d7e8d0
	case 'S':
Packit d7e8d0
	  key->can_sign = 1;
Packit d7e8d0
	  break;
Packit d7e8d0
Packit d7e8d0
	case 'c':
Packit d7e8d0
	case 'C':
Packit d7e8d0
	  key->can_certify = 1;
Packit d7e8d0
	  break;
Packit d7e8d0
Packit d7e8d0
	case 'a':
Packit d7e8d0
	case 'A':
Packit d7e8d0
	  key->can_authenticate = 1;
Packit d7e8d0
	  break;
Packit d7e8d0
Packit d7e8d0
	case 'q':
Packit d7e8d0
	case 'Q':
Packit d7e8d0
	  key->is_qualified = 1;
Packit d7e8d0
	  break;
Packit d7e8d0
        }
Packit d7e8d0
      src++;
Packit d7e8d0
    }
Packit d7e8d0
}
Packit d7e8d0
Packit d7e8d0
Packit d7e8d0
static void
Packit d7e8d0
set_ownertrust (gpgme_key_t key, const char *src)
Packit d7e8d0
{
Packit d7e8d0
  /* Look at letters and stop at the first digit.  */
Packit d7e8d0
  while (*src && !isdigit (*src))
Packit d7e8d0
    {
Packit d7e8d0
      switch (*src)
Packit d7e8d0
	{
Packit d7e8d0
	case 'n':
Packit d7e8d0
	  key->owner_trust = GPGME_VALIDITY_NEVER;
Packit d7e8d0
	  break;
Packit d7e8d0
Packit d7e8d0
	case 'm':
Packit d7e8d0
	  key->owner_trust = GPGME_VALIDITY_MARGINAL;
Packit d7e8d0
	  break;
Packit d7e8d0
Packit d7e8d0
	case 'f':
Packit d7e8d0
	  key->owner_trust = GPGME_VALIDITY_FULL;
Packit d7e8d0
	  break;
Packit d7e8d0
Packit d7e8d0
	case 'u':
Packit d7e8d0
	  key->owner_trust = GPGME_VALIDITY_ULTIMATE;
Packit d7e8d0
	  break;
Packit d7e8d0
Packit d7e8d0
        default:
Packit d7e8d0
	  key->owner_trust = GPGME_VALIDITY_UNKNOWN;
Packit d7e8d0
	  break;
Packit d7e8d0
        }
Packit d7e8d0
      src++;
Packit d7e8d0
    }
Packit d7e8d0
}
Packit d7e8d0
Packit d7e8d0
Packit d7e8d0
static gpgme_keyorg_t
Packit d7e8d0
parse_keyorg (const char *string)
Packit d7e8d0
{
Packit d7e8d0
  switch (atoi (string))
Packit d7e8d0
    {
Packit d7e8d0
    case 0: return GPGME_KEYORG_UNKNOWN;
Packit d7e8d0
    case 1:
Packit d7e8d0
    case 2:
Packit d7e8d0
      return GPGME_KEYORG_KS;
Packit d7e8d0
    case 3: return GPGME_KEYORG_DANE;
Packit d7e8d0
    case 4: return GPGME_KEYORG_WKD;
Packit d7e8d0
    case 5: return GPGME_KEYORG_URL;
Packit d7e8d0
    case 6: return GPGME_KEYORG_FILE;
Packit d7e8d0
    case 7: return GPGME_KEYORG_SELF;
Packit d7e8d0
    default: return GPGME_KEYORG_OTHER;
Packit d7e8d0
    }
Packit d7e8d0
}
Packit d7e8d0
Packit d7e8d0
Packit d7e8d0
/* Parse field 15 of a secret key or subkey.  This fields holds a
Packit d7e8d0
   reference to smartcards.  FIELD is the content of the field and we
Packit d7e8d0
   are allowed to modify it.  */
Packit d7e8d0
static gpg_error_t
Packit d7e8d0
parse_sec_field15 (gpgme_key_t key, gpgme_subkey_t subkey, char *field)
Packit d7e8d0
{
Packit d7e8d0
  if (!*field)
Packit d7e8d0
    ; /* Empty.  */
Packit d7e8d0
  else if (*field == '#')
Packit d7e8d0
    {
Packit d7e8d0
      /* This is a stub for an offline key.  We reset the SECRET flag
Packit d7e8d0
         of the subkey here.  Note that the secret flag of the entire
Packit d7e8d0
         key will be true even then.  We even explicitly set
Packit d7e8d0
         key->secret to make it works for GPGME_KEYLIST_MODE_WITH_SECRET. */
Packit d7e8d0
      subkey->secret = 0;
Packit d7e8d0
      key->secret = 1;
Packit d7e8d0
    }
Packit d7e8d0
  else if (strchr ("01234567890ABCDEFabcdef", *field))
Packit d7e8d0
    {
Packit d7e8d0
      /* Fields starts with a hex digit; thus it is a serial number.  */
Packit d7e8d0
      key->secret = 1;
Packit d7e8d0
      subkey->is_cardkey = 1;
Packit d7e8d0
      subkey->card_number = strdup (field);
Packit d7e8d0
      if (!subkey->card_number)
Packit d7e8d0
        return gpg_error_from_syserror ();
Packit d7e8d0
    }
Packit d7e8d0
  else if (*field == '+')
Packit d7e8d0
    {
Packit d7e8d0
      key->secret = 1;
Packit d7e8d0
      subkey->secret = 1;
Packit d7e8d0
    }
Packit d7e8d0
  else
Packit d7e8d0
    {
Packit d7e8d0
      /* RFU.  */
Packit d7e8d0
    }
Packit d7e8d0
Packit d7e8d0
  return 0;
Packit d7e8d0
}
Packit d7e8d0
Packit d7e8d0
Packit d7e8d0
/* Parse a tfs record.  */
Packit d7e8d0
static gpg_error_t
Packit d7e8d0
parse_tfs_record (gpgme_user_id_t uid, char **field, int nfield)
Packit d7e8d0
{
Packit d7e8d0
  gpg_error_t err;
Packit d7e8d0
  gpgme_tofu_info_t ti;
Packit d7e8d0
  unsigned long uval;
Packit d7e8d0
Packit d7e8d0
  /* We add only the first TOFU record in case future versions emit
Packit d7e8d0
   * several.  */
Packit d7e8d0
  if (uid->tofu)
Packit d7e8d0
    return 0;
Packit d7e8d0
Packit d7e8d0
  /* Check that we have enough fields and that the version is supported.  */
Packit d7e8d0
  if (nfield < 8 || atoi(field[1]) != 1)
Packit d7e8d0
    return trace_gpg_error (GPG_ERR_INV_ENGINE);
Packit d7e8d0
Packit d7e8d0
  ti = calloc (1, sizeof *ti);
Packit d7e8d0
  if (!ti)
Packit d7e8d0
    return gpg_error_from_syserror ();
Packit d7e8d0
Packit d7e8d0
  /* Note that we allow a value of up to 7 which is what we can store
Packit d7e8d0
   * in the ti->validity.  */
Packit d7e8d0
  err = _gpgme_strtoul_field (field[2], &uval);
Packit d7e8d0
  if (err || uval > 7)
Packit d7e8d0
    goto inv_engine;
Packit d7e8d0
  ti->validity = uval;
Packit d7e8d0
Packit d7e8d0
  /* Parse the sign-count.  */
Packit d7e8d0
  err = _gpgme_strtoul_field (field[3], &uval);
Packit d7e8d0
  if (err)
Packit d7e8d0
    goto inv_engine;
Packit d7e8d0
  if (uval > USHRT_MAX)
Packit d7e8d0
    uval = USHRT_MAX;
Packit d7e8d0
  ti->signcount = uval;
Packit d7e8d0
Packit d7e8d0
  /* Parse the encr-count.  */
Packit d7e8d0
  err = _gpgme_strtoul_field (field[4], &uval);
Packit d7e8d0
  if (err)
Packit d7e8d0
    goto inv_engine;
Packit d7e8d0
  if (uval > USHRT_MAX)
Packit d7e8d0
    uval = USHRT_MAX;
Packit d7e8d0
  ti->encrcount = uval;
Packit d7e8d0
Packit d7e8d0
  /* Parse the policy.  */
Packit d7e8d0
  if (!strcmp (field[5], "none"))
Packit d7e8d0
    ti->policy = GPGME_TOFU_POLICY_NONE;
Packit d7e8d0
  else if (!strcmp (field[5], "auto"))
Packit d7e8d0
    ti->policy = GPGME_TOFU_POLICY_AUTO;
Packit d7e8d0
  else if (!strcmp (field[5], "good"))
Packit d7e8d0
    ti->policy = GPGME_TOFU_POLICY_GOOD;
Packit d7e8d0
  else if (!strcmp (field[5], "bad"))
Packit d7e8d0
    ti->policy = GPGME_TOFU_POLICY_BAD;
Packit d7e8d0
  else if (!strcmp (field[5], "ask"))
Packit d7e8d0
    ti->policy = GPGME_TOFU_POLICY_ASK;
Packit d7e8d0
  else /* "unknown" and invalid policy strings.  */
Packit d7e8d0
    ti->policy = GPGME_TOFU_POLICY_UNKNOWN;
Packit d7e8d0
Packit d7e8d0
  /* Parse first and last seen timestamps.  */
Packit d7e8d0
  err = _gpgme_strtoul_field (field[6], &uval);
Packit d7e8d0
  if (err)
Packit d7e8d0
    goto inv_engine;
Packit d7e8d0
  ti->signfirst = uval;
Packit d7e8d0
  err = _gpgme_strtoul_field (field[7], &uval);
Packit d7e8d0
  if (err)
Packit d7e8d0
    goto inv_engine;
Packit d7e8d0
  ti->signlast = uval;
Packit d7e8d0
Packit d7e8d0
  if (nfield > 9)
Packit d7e8d0
    {
Packit d7e8d0
      /* This condition is only to allow for gpg 2.1.15 - can
Packit d7e8d0
       * eventually be removed.  */
Packit d7e8d0
      err = _gpgme_strtoul_field (field[8], &uval);
Packit d7e8d0
      if (err)
Packit d7e8d0
        goto inv_engine;
Packit d7e8d0
      ti->encrfirst = uval;
Packit d7e8d0
      err = _gpgme_strtoul_field (field[9], &uval);
Packit d7e8d0
      if (err)
Packit d7e8d0
        goto inv_engine;
Packit d7e8d0
      ti->encrlast = uval;
Packit d7e8d0
    }
Packit d7e8d0
Packit d7e8d0
  /* Ready.  */
Packit d7e8d0
  uid->tofu = ti;
Packit d7e8d0
  return 0;
Packit d7e8d0
Packit d7e8d0
 inv_engine:
Packit d7e8d0
  free (ti);
Packit d7e8d0
  return trace_gpg_error (GPG_ERR_INV_ENGINE);
Packit d7e8d0
}
Packit d7e8d0
Packit d7e8d0
Packit d7e8d0
/* We have read an entire key into tmp_key and should now finish it.
Packit d7e8d0
   It is assumed that this releases tmp_key.  */
Packit d7e8d0
static void
Packit d7e8d0
finish_key (gpgme_ctx_t ctx, op_data_t opd)
Packit d7e8d0
{
Packit d7e8d0
  gpgme_key_t key = opd->tmp_key;
Packit d7e8d0
Packit d7e8d0
  opd->tmp_key = NULL;
Packit d7e8d0
  opd->tmp_uid = NULL;
Packit d7e8d0
  opd->tmp_keysig = NULL;
Packit d7e8d0
Packit d7e8d0
  if (key)
Packit d7e8d0
    _gpgme_engine_io_event (ctx->engine, GPGME_EVENT_NEXT_KEY, key);
Packit d7e8d0
}
Packit d7e8d0
Packit d7e8d0
Packit d7e8d0
/* Note: We are allowed to modify LINE.  */
Packit d7e8d0
static gpgme_error_t
Packit d7e8d0
keylist_colon_handler (void *priv, char *line)
Packit d7e8d0
{
Packit d7e8d0
  gpgme_ctx_t ctx = (gpgme_ctx_t) priv;
Packit d7e8d0
  enum
Packit d7e8d0
    {
Packit d7e8d0
      RT_NONE, RT_SIG, RT_UID, RT_TFS, RT_SUB, RT_PUB, RT_FPR, RT_GRP,
Packit d7e8d0
      RT_SSB, RT_SEC, RT_CRT, RT_CRS, RT_REV, RT_SPK
Packit d7e8d0
    }
Packit d7e8d0
  rectype = RT_NONE;
Packit d7e8d0
#define NR_FIELDS 20
Packit d7e8d0
  char *field[NR_FIELDS];
Packit d7e8d0
  int fields = 0;
Packit d7e8d0
  void *hook;
Packit d7e8d0
  op_data_t opd;
Packit d7e8d0
  gpgme_error_t err;
Packit d7e8d0
  gpgme_key_t key;
Packit d7e8d0
  gpgme_subkey_t subkey = NULL;
Packit d7e8d0
  gpgme_key_sig_t keysig = NULL;
Packit d7e8d0
Packit d7e8d0
  err = _gpgme_op_data_lookup (ctx, OPDATA_KEYLIST, &hook, -1, NULL);
Packit d7e8d0
  opd = hook;
Packit d7e8d0
  if (err)
Packit d7e8d0
    return err;
Packit d7e8d0
Packit d7e8d0
  key = opd->tmp_key;
Packit d7e8d0
Packit Service 30b792
  TRACE (DEBUG_CTX, "gpgme:keylist_colon_handler", ctx,
Packit d7e8d0
	  "key = %p, line = %s", key, line ? line : "(null)");
Packit d7e8d0
Packit d7e8d0
  if (!line)
Packit d7e8d0
    {
Packit d7e8d0
      /* End Of File.  */
Packit d7e8d0
      finish_key (ctx, opd);
Packit d7e8d0
      return 0;
Packit d7e8d0
    }
Packit d7e8d0
Packit d7e8d0
  while (line && fields < NR_FIELDS)
Packit d7e8d0
    {
Packit d7e8d0
      field[fields++] = line;
Packit d7e8d0
      line = strchr (line, ':');
Packit d7e8d0
      if (line)
Packit d7e8d0
	*(line++) = '\0';
Packit d7e8d0
    }
Packit d7e8d0
Packit d7e8d0
  if (!strcmp (field[0], "sig"))
Packit d7e8d0
    rectype = RT_SIG;
Packit d7e8d0
  else if (!strcmp (field[0], "rev"))
Packit d7e8d0
    rectype = RT_REV;
Packit d7e8d0
  else if (!strcmp (field[0], "pub"))
Packit d7e8d0
    rectype = RT_PUB;
Packit d7e8d0
  else if (!strcmp (field[0], "sec"))
Packit d7e8d0
    rectype = RT_SEC;
Packit d7e8d0
  else if (!strcmp (field[0], "crt"))
Packit d7e8d0
    rectype = RT_CRT;
Packit d7e8d0
  else if (!strcmp (field[0], "crs"))
Packit d7e8d0
    rectype = RT_CRS;
Packit d7e8d0
  else if (!strcmp (field[0], "fpr") && key)
Packit d7e8d0
    rectype = RT_FPR;
Packit d7e8d0
  else if (!strcmp (field[0], "grp") && key)
Packit d7e8d0
    rectype = RT_GRP;
Packit d7e8d0
  else if (!strcmp (field[0], "uid") && key)
Packit d7e8d0
    rectype = RT_UID;
Packit d7e8d0
  else if (!strcmp (field[0], "tfs") && key)
Packit d7e8d0
    rectype = RT_TFS;
Packit d7e8d0
  else if (!strcmp (field[0], "sub") && key)
Packit d7e8d0
    rectype = RT_SUB;
Packit d7e8d0
  else if (!strcmp (field[0], "ssb") && key)
Packit d7e8d0
    rectype = RT_SSB;
Packit d7e8d0
  else if (!strcmp (field[0], "spk") && key)
Packit d7e8d0
    rectype = RT_SPK;
Packit d7e8d0
  else
Packit d7e8d0
    rectype = RT_NONE;
Packit d7e8d0
Packit d7e8d0
  /* Only look at signature and trust info records immediately
Packit d7e8d0
     following a user ID.  For this, clear the user ID pointer when
Packit d7e8d0
     encountering anything but a signature or trust record.  */
Packit d7e8d0
  if (rectype != RT_SIG && rectype != RT_REV && rectype != RT_TFS)
Packit d7e8d0
    opd->tmp_uid = NULL;
Packit d7e8d0
Packit d7e8d0
  /* Only look at subpackets immediately following a signature.  For
Packit d7e8d0
     this, clear the signature pointer when encountering anything but
Packit d7e8d0
     a subpacket.  */
Packit d7e8d0
  if (rectype != RT_SPK)
Packit d7e8d0
    opd->tmp_keysig = NULL;
Packit d7e8d0
Packit d7e8d0
  switch (rectype)
Packit d7e8d0
    {
Packit d7e8d0
    case RT_PUB:
Packit d7e8d0
    case RT_SEC:
Packit d7e8d0
    case RT_CRT:
Packit d7e8d0
    case RT_CRS:
Packit d7e8d0
      /* Start a new keyblock.  */
Packit d7e8d0
      err = _gpgme_key_new (&key);
Packit d7e8d0
      if (err)
Packit d7e8d0
	return err;
Packit d7e8d0
      key->keylist_mode = ctx->keylist_mode;
Packit d7e8d0
      err = _gpgme_key_add_subkey (key, &subkey);
Packit d7e8d0
      if (err)
Packit d7e8d0
	{
Packit d7e8d0
	  gpgme_key_unref (key);
Packit d7e8d0
	  return err;
Packit d7e8d0
	}
Packit d7e8d0
Packit d7e8d0
      if (rectype == RT_SEC || rectype == RT_CRS)
Packit d7e8d0
	key->secret = subkey->secret = 1;
Packit d7e8d0
      if (rectype == RT_CRT || rectype == RT_CRS)
Packit d7e8d0
	key->protocol = GPGME_PROTOCOL_CMS;
Packit d7e8d0
      finish_key (ctx, opd);
Packit d7e8d0
      opd->tmp_key = key;
Packit d7e8d0
Packit d7e8d0
      /* Field 2 has the trust info.  */
Packit d7e8d0
      if (fields >= 2)
Packit d7e8d0
	set_mainkey_trust_info (key, field[1]);
Packit d7e8d0
Packit d7e8d0
      /* Field 3 has the key length.  */
Packit d7e8d0
      if (fields >= 3)
Packit d7e8d0
	{
Packit d7e8d0
	  int i = atoi (field[2]);
Packit d7e8d0
	  /* Ignore invalid values.  */
Packit d7e8d0
	  if (i > 1)
Packit d7e8d0
	    subkey->length = i;
Packit d7e8d0
	}
Packit d7e8d0
Packit d7e8d0
      /* Field 4 has the public key algorithm.  */
Packit d7e8d0
      if (fields >= 4)
Packit d7e8d0
	{
Packit d7e8d0
	  int i = atoi (field[3]);
Packit d7e8d0
	  if (i >= 1 && i < 128)
Packit d7e8d0
	    subkey->pubkey_algo = _gpgme_map_pk_algo (i, ctx->protocol);
Packit d7e8d0
	}
Packit d7e8d0
Packit d7e8d0
      /* Field 5 has the long keyid.  Allow short key IDs for the
Packit d7e8d0
	 output of an external keyserver listing.  */
Packit d7e8d0
      if (fields >= 5 && strlen (field[4]) <= DIM(subkey->_keyid) - 1)
Packit d7e8d0
	strcpy (subkey->_keyid, field[4]);
Packit d7e8d0
Packit d7e8d0
      /* Field 6 has the timestamp (seconds).  */
Packit d7e8d0
      if (fields >= 6)
Packit d7e8d0
	subkey->timestamp = _gpgme_parse_timestamp (field[5], NULL);
Packit d7e8d0
Packit d7e8d0
      /* Field 7 has the expiration time (seconds).  */
Packit d7e8d0
      if (fields >= 7)
Packit d7e8d0
	subkey->expires = _gpgme_parse_timestamp (field[6], NULL);
Packit d7e8d0
Packit d7e8d0
      /* Field 8 has the X.509 serial number.  */
Packit d7e8d0
      if (fields >= 8 && (rectype == RT_CRT || rectype == RT_CRS))
Packit d7e8d0
	{
Packit d7e8d0
	  key->issuer_serial = strdup (field[7]);
Packit d7e8d0
	  if (!key->issuer_serial)
Packit d7e8d0
	    return gpg_error_from_syserror ();
Packit d7e8d0
	}
Packit d7e8d0
Packit d7e8d0
      /* Field 9 has the ownertrust.  */
Packit d7e8d0
      if (fields >= 9)
Packit d7e8d0
	set_ownertrust (key, field[8]);
Packit d7e8d0
Packit d7e8d0
      /* Field 10 is not used for gpg due to --fixed-list-mode option
Packit d7e8d0
	 but GPGSM stores the issuer name.  */
Packit d7e8d0
      if (fields >= 10 && (rectype == RT_CRT || rectype == RT_CRS))
Packit d7e8d0
	if (_gpgme_decode_c_string (field[9], &key->issuer_name, 0))
Packit d7e8d0
	  return gpg_error (GPG_ERR_ENOMEM);	/* FIXME */
Packit d7e8d0
Packit d7e8d0
      /* Field 11 has the signature class.  */
Packit d7e8d0
Packit d7e8d0
      /* Field 12 has the capabilities.  */
Packit d7e8d0
      if (fields >= 12)
Packit d7e8d0
	set_mainkey_capability (key, field[11]);
Packit d7e8d0
Packit d7e8d0
      /* Field 15 carries special flags of a secret key.  */
Packit d7e8d0
      if (fields >= 15
Packit d7e8d0
          && (key->secret
Packit d7e8d0
              || (ctx->keylist_mode & GPGME_KEYLIST_MODE_WITH_SECRET)))
Packit d7e8d0
        {
Packit d7e8d0
          err = parse_sec_field15 (key, subkey, field[14]);
Packit d7e8d0
          if (err)
Packit d7e8d0
            return err;
Packit d7e8d0
        }
Packit d7e8d0
Packit d7e8d0
      /* Field 17 has the curve name for ECC.  */
Packit d7e8d0
      if (fields >= 17 && *field[16])
Packit d7e8d0
        {
Packit d7e8d0
          subkey->curve = strdup (field[16]);
Packit d7e8d0
          if (!subkey->curve)
Packit d7e8d0
            return gpg_error_from_syserror ();
Packit d7e8d0
        }
Packit d7e8d0
Packit d7e8d0
      /* Field 18 has the compliance flags.  */
Packit d7e8d0
      if (fields >= 17 && *field[17])
Packit d7e8d0
        PARSE_COMPLIANCE_FLAGS (field[17], subkey);
Packit d7e8d0
Packit d7e8d0
      if (fields >= 20)
Packit d7e8d0
        {
Packit d7e8d0
          key->last_update = _gpgme_parse_timestamp_ul (field[18]);
Packit d7e8d0
          key->origin = parse_keyorg (field[19]);
Packit d7e8d0
        }
Packit d7e8d0
Packit d7e8d0
      break;
Packit d7e8d0
Packit d7e8d0
    case RT_SUB:
Packit d7e8d0
    case RT_SSB:
Packit d7e8d0
      /* Start a new subkey.  */
Packit d7e8d0
      err = _gpgme_key_add_subkey (key, &subkey);
Packit d7e8d0
      if (err)
Packit d7e8d0
	return err;
Packit d7e8d0
Packit d7e8d0
      if (rectype == RT_SSB)
Packit d7e8d0
	subkey->secret = 1;
Packit d7e8d0
Packit d7e8d0
      /* Field 2 has the trust info.  */
Packit d7e8d0
      if (fields >= 2)
Packit d7e8d0
	set_subkey_trust_info (subkey, field[1]);
Packit d7e8d0
Packit d7e8d0
      /* Field 3 has the key length.  */
Packit d7e8d0
      if (fields >= 3)
Packit d7e8d0
	{
Packit d7e8d0
	  int i = atoi (field[2]);
Packit d7e8d0
	  /* Ignore invalid values.  */
Packit d7e8d0
	  if (i > 1)
Packit d7e8d0
	    subkey->length = i;
Packit d7e8d0
	}
Packit d7e8d0
Packit d7e8d0
      /* Field 4 has the public key algorithm.  */
Packit d7e8d0
      if (fields >= 4)
Packit d7e8d0
	{
Packit d7e8d0
	  int i = atoi (field[3]);
Packit d7e8d0
	  if (i >= 1 && i < 128)
Packit d7e8d0
	    subkey->pubkey_algo = _gpgme_map_pk_algo (i, ctx->protocol);
Packit d7e8d0
	}
Packit d7e8d0
Packit d7e8d0
      /* Field 5 has the long keyid.  */
Packit d7e8d0
      if (fields >= 5 && strlen (field[4]) == DIM(subkey->_keyid) - 1)
Packit d7e8d0
	strcpy (subkey->_keyid, field[4]);
Packit d7e8d0
Packit d7e8d0
      /* Field 6 has the timestamp (seconds).  */
Packit d7e8d0
      if (fields >= 6)
Packit d7e8d0
	subkey->timestamp = _gpgme_parse_timestamp (field[5], NULL);
Packit d7e8d0
Packit d7e8d0
      /* Field 7 has the expiration time (seconds).  */
Packit d7e8d0
      if (fields >= 7)
Packit d7e8d0
	subkey->expires = _gpgme_parse_timestamp (field[6], NULL);
Packit d7e8d0
Packit d7e8d0
      /* Field 8 is reserved (LID).  */
Packit d7e8d0
      /* Field 9 has the ownertrust.  */
Packit d7e8d0
      /* Field 10, the user ID, is n/a for a subkey.  */
Packit d7e8d0
Packit d7e8d0
      /* Field 11 has the signature class.  */
Packit d7e8d0
Packit d7e8d0
      /* Field 12 has the capabilities.  */
Packit d7e8d0
      if (fields >= 12)
Packit d7e8d0
	set_subkey_capability (subkey, field[11]);
Packit d7e8d0
Packit d7e8d0
      /* Field 15 carries special flags of a secret key. */
Packit d7e8d0
      if (fields >= 15
Packit d7e8d0
          && (key->secret
Packit d7e8d0
              || (ctx->keylist_mode & GPGME_KEYLIST_MODE_WITH_SECRET)))
Packit d7e8d0
        {
Packit d7e8d0
          err = parse_sec_field15 (key, subkey, field[14]);
Packit d7e8d0
          if (err)
Packit d7e8d0
            return err;
Packit d7e8d0
        }
Packit d7e8d0
Packit d7e8d0
      /* Field 17 has the curve name for ECC.  */
Packit d7e8d0
      if (fields >= 17 && *field[16])
Packit d7e8d0
        {
Packit d7e8d0
          subkey->curve = strdup (field[16]);
Packit d7e8d0
          if (!subkey->curve)
Packit d7e8d0
            return gpg_error_from_syserror ();
Packit d7e8d0
        }
Packit d7e8d0
Packit d7e8d0
      /* Field 18 has the compliance flags.  */
Packit d7e8d0
      if (fields >= 17 && *field[17])
Packit d7e8d0
        PARSE_COMPLIANCE_FLAGS (field[17], subkey);
Packit d7e8d0
Packit d7e8d0
      break;
Packit d7e8d0
Packit d7e8d0
    case RT_UID:
Packit d7e8d0
      /* Field 2 has the trust info, and field 10 has the user ID.  */
Packit d7e8d0
      if (fields >= 10)
Packit d7e8d0
	{
Packit d7e8d0
	  if (_gpgme_key_append_name (key, field[9], 1))
Packit d7e8d0
	    return gpg_error (GPG_ERR_ENOMEM);	/* FIXME */
Packit d7e8d0
Packit d7e8d0
          if (field[1])
Packit d7e8d0
            set_userid_flags (key, field[1]);
Packit d7e8d0
          opd->tmp_uid = key->_last_uid;
Packit d7e8d0
          if (fields >= 20)
Packit d7e8d0
            {
Packit d7e8d0
              opd->tmp_uid->last_update = _gpgme_parse_timestamp_ul (field[18]);
Packit d7e8d0
              opd->tmp_uid->origin = parse_keyorg (field[19]);
Packit d7e8d0
            }
Packit d7e8d0
	}
Packit d7e8d0
      break;
Packit d7e8d0
Packit d7e8d0
    case RT_TFS:
Packit d7e8d0
      if (opd->tmp_uid)
Packit d7e8d0
	{
Packit d7e8d0
          err = parse_tfs_record (opd->tmp_uid, field, fields);
Packit d7e8d0
          if (err)
Packit d7e8d0
            return err;
Packit d7e8d0
        }
Packit d7e8d0
      break;
Packit d7e8d0
Packit d7e8d0
    case RT_FPR:
Packit d7e8d0
      /* Field 10 has the fingerprint (take only the first one).  */
Packit d7e8d0
      if (fields >= 10 && field[9] && *field[9])
Packit d7e8d0
	{
Packit d7e8d0
          /* Need to apply it to the last subkey because all subkeys
Packit d7e8d0
             do have fingerprints. */
Packit d7e8d0
          subkey = key->_last_subkey;
Packit d7e8d0
          if (!subkey->fpr)
Packit d7e8d0
            {
Packit d7e8d0
              subkey->fpr = strdup (field[9]);
Packit d7e8d0
              if (!subkey->fpr)
Packit d7e8d0
                return gpg_error_from_syserror ();
Packit d7e8d0
            }
Packit d7e8d0
          /* If this is the first subkey, store the fingerprint also
Packit d7e8d0
             in the KEY object.  */
Packit d7e8d0
          if (subkey == key->subkeys)
Packit d7e8d0
            {
Packit d7e8d0
              if (key->fpr && strcmp (key->fpr, subkey->fpr))
Packit d7e8d0
                {
Packit d7e8d0
                  /* FPR already set but mismatch: Should never happen.  */
Packit d7e8d0
                  return trace_gpg_error (GPG_ERR_INTERNAL);
Packit d7e8d0
                }
Packit d7e8d0
              if (!key->fpr)
Packit d7e8d0
                {
Packit d7e8d0
                  key->fpr = strdup (subkey->fpr);
Packit d7e8d0
                  if (!key->fpr)
Packit d7e8d0
                    return gpg_error_from_syserror ();
Packit d7e8d0
                }
Packit d7e8d0
            }
Packit d7e8d0
	}
Packit d7e8d0
Packit d7e8d0
      /* Field 13 has the gpgsm chain ID (take only the first one).  */
Packit d7e8d0
      if (fields >= 13 && !key->chain_id && *field[12])
Packit d7e8d0
	{
Packit d7e8d0
	  key->chain_id = strdup (field[12]);
Packit d7e8d0
	  if (!key->chain_id)
Packit d7e8d0
	    return gpg_error_from_syserror ();
Packit d7e8d0
	}
Packit d7e8d0
      break;
Packit d7e8d0
Packit d7e8d0
    case RT_GRP:
Packit d7e8d0
      /* Field 10 has the keygrip.  */
Packit d7e8d0
      if (fields >= 10 && field[9] && *field[9])
Packit d7e8d0
	{
Packit d7e8d0
          /* Need to apply it to the last subkey because all subkeys
Packit d7e8d0
             have a keygrip. */
Packit d7e8d0
          subkey = key->_last_subkey;
Packit d7e8d0
          if (!subkey->keygrip)
Packit d7e8d0
            {
Packit d7e8d0
              subkey->keygrip = strdup (field[9]);
Packit d7e8d0
              if (!subkey->keygrip)
Packit d7e8d0
                return gpg_error_from_syserror ();
Packit d7e8d0
            }
Packit d7e8d0
	}
Packit d7e8d0
      break;
Packit d7e8d0
Packit d7e8d0
    case RT_SIG:
Packit d7e8d0
    case RT_REV:
Packit d7e8d0
      if (!opd->tmp_uid)
Packit d7e8d0
	return 0;
Packit d7e8d0
Packit d7e8d0
      /* Start a new (revoked) signature.  */
Packit d7e8d0
      assert (opd->tmp_uid == key->_last_uid);
Packit d7e8d0
      keysig = _gpgme_key_add_sig (key, (fields >= 10) ? field[9] : NULL);
Packit d7e8d0
      if (!keysig)
Packit d7e8d0
	return gpg_error (GPG_ERR_ENOMEM);	/* FIXME */
Packit d7e8d0
Packit d7e8d0
      /* Field 2 has the calculated trust ('!', '-', '?', '%').  */
Packit d7e8d0
      if (fields >= 2)
Packit d7e8d0
	switch (field[1][0])
Packit d7e8d0
	  {
Packit d7e8d0
	  case '!':
Packit d7e8d0
	    keysig->status = gpg_error (GPG_ERR_NO_ERROR);
Packit d7e8d0
	    break;
Packit d7e8d0
Packit d7e8d0
	  case '-':
Packit d7e8d0
	    keysig->status = gpg_error (GPG_ERR_BAD_SIGNATURE);
Packit d7e8d0
	    break;
Packit d7e8d0
Packit d7e8d0
	  case '?':
Packit d7e8d0
	    keysig->status = gpg_error (GPG_ERR_NO_PUBKEY);
Packit d7e8d0
	    break;
Packit d7e8d0
Packit d7e8d0
	  case '%':
Packit d7e8d0
	    keysig->status = gpg_error (GPG_ERR_GENERAL);
Packit d7e8d0
	    break;
Packit d7e8d0
Packit d7e8d0
	  default:
Packit d7e8d0
	    keysig->status = gpg_error (GPG_ERR_NO_ERROR);
Packit d7e8d0
	    break;
Packit d7e8d0
	  }
Packit d7e8d0
Packit d7e8d0
      /* Field 4 has the public key algorithm.  */
Packit d7e8d0
      if (fields >= 4)
Packit d7e8d0
	{
Packit d7e8d0
	  int i = atoi (field[3]);
Packit d7e8d0
	  if (i >= 1 && i < 128)
Packit d7e8d0
	    keysig->pubkey_algo = _gpgme_map_pk_algo (i, ctx->protocol);
Packit d7e8d0
	}
Packit d7e8d0
Packit d7e8d0
      /* Field 5 has the long keyid.  */
Packit d7e8d0
      if (fields >= 5 && strlen (field[4]) == DIM(keysig->_keyid) - 1)
Packit d7e8d0
	strcpy (keysig->_keyid, field[4]);
Packit d7e8d0
Packit d7e8d0
      /* Field 6 has the timestamp (seconds).  */
Packit d7e8d0
      if (fields >= 6)
Packit d7e8d0
	keysig->timestamp = _gpgme_parse_timestamp (field[5], NULL);
Packit d7e8d0
Packit d7e8d0
      /* Field 7 has the expiration time (seconds).  */
Packit d7e8d0
      if (fields >= 7)
Packit d7e8d0
	keysig->expires = _gpgme_parse_timestamp (field[6], NULL);
Packit d7e8d0
Packit d7e8d0
      /* Field 11 has the signature class (eg, 0x30 means revoked).  */
Packit d7e8d0
      if (fields >= 11)
Packit d7e8d0
	if (field[10][0] && field[10][1])
Packit d7e8d0
	  {
Packit d7e8d0
	    int sig_class = _gpgme_hextobyte (field[10]);
Packit d7e8d0
	    if (sig_class >= 0)
Packit d7e8d0
	      {
Packit d7e8d0
		keysig->sig_class = sig_class;
Packit d7e8d0
		keysig->class = keysig->sig_class;
Packit d7e8d0
		if (sig_class == 0x30)
Packit d7e8d0
		  keysig->revoked = 1;
Packit d7e8d0
	      }
Packit d7e8d0
	    if (field[10][2] == 'x')
Packit d7e8d0
	      keysig->exportable = 1;
Packit d7e8d0
	  }
Packit d7e8d0
Packit d7e8d0
      opd->tmp_keysig = keysig;
Packit d7e8d0
      break;
Packit d7e8d0
Packit d7e8d0
    case RT_SPK:
Packit d7e8d0
      if (!opd->tmp_keysig)
Packit d7e8d0
	return 0;
Packit d7e8d0
      assert (opd->tmp_keysig == key->_last_uid->_last_keysig);
Packit d7e8d0
Packit d7e8d0
      if (fields >= 4)
Packit d7e8d0
	{
Packit d7e8d0
	  /* Field 2 has the subpacket type.  */
Packit d7e8d0
	  int type = atoi (field[1]);
Packit d7e8d0
Packit d7e8d0
	  /* Field 3 has the flags.  */
Packit d7e8d0
	  int flags = atoi (field[2]);
Packit d7e8d0
Packit d7e8d0
	  /* Field 4 has the length.  */
Packit d7e8d0
	  int len = atoi (field[3]);
Packit d7e8d0
Packit d7e8d0
	  /* Field 5 has the data.  */
Packit d7e8d0
	  char *data = field[4];
Packit d7e8d0
Packit d7e8d0
	  /* Type 20: Notation data.  */
Packit d7e8d0
	  /* Type 26: Policy URL.  */
Packit d7e8d0
	  if (type == 20 || type == 26)
Packit d7e8d0
	    {
Packit d7e8d0
	      gpgme_sig_notation_t notation;
Packit d7e8d0
Packit d7e8d0
	      keysig = opd->tmp_keysig;
Packit d7e8d0
Packit d7e8d0
	      /* At this time, any error is serious.  */
Packit d7e8d0
	      err = _gpgme_parse_notation (&notation, type, flags, len, data);
Packit d7e8d0
	      if (err)
Packit d7e8d0
		return err;
Packit d7e8d0
Packit d7e8d0
	      /* Add a new notation.  FIXME: Could be factored out.  */
Packit d7e8d0
	      if (!keysig->notations)
Packit d7e8d0
		keysig->notations = notation;
Packit d7e8d0
	      if (keysig->_last_notation)
Packit d7e8d0
		keysig->_last_notation->next = notation;
Packit d7e8d0
	      keysig->_last_notation = notation;
Packit d7e8d0
	    }
Packit d7e8d0
	}
Packit d7e8d0
Packit d7e8d0
    case RT_NONE:
Packit d7e8d0
      /* Unknown record.  */
Packit d7e8d0
      break;
Packit d7e8d0
    }
Packit d7e8d0
  return 0;
Packit d7e8d0
}
Packit d7e8d0
Packit d7e8d0
Packit d7e8d0
void
Packit d7e8d0
_gpgme_op_keylist_event_cb (void *data, gpgme_event_io_t type, void *type_data)
Packit d7e8d0
{
Packit d7e8d0
  gpgme_error_t err;
Packit d7e8d0
  gpgme_ctx_t ctx = (gpgme_ctx_t) data;
Packit d7e8d0
  gpgme_key_t key = (gpgme_key_t) type_data;
Packit d7e8d0
  void *hook;
Packit d7e8d0
  op_data_t opd;
Packit d7e8d0
  struct key_queue_item_s *q, *q2;
Packit d7e8d0
Packit d7e8d0
  assert (type == GPGME_EVENT_NEXT_KEY);
Packit d7e8d0
Packit d7e8d0
  err = _gpgme_op_data_lookup (ctx, OPDATA_KEYLIST, &hook, -1, NULL);
Packit d7e8d0
  opd = hook;
Packit d7e8d0
  if (err)
Packit d7e8d0
    return;
Packit d7e8d0
Packit d7e8d0
  q = malloc (sizeof *q);
Packit d7e8d0
  if (!q)
Packit d7e8d0
    {
Packit d7e8d0
      gpgme_key_unref (key);
Packit d7e8d0
      /* FIXME       return GPGME_Out_Of_Core; */
Packit d7e8d0
      return;
Packit d7e8d0
    }
Packit d7e8d0
  q->key = key;
Packit d7e8d0
  q->next = NULL;
Packit d7e8d0
  /* FIXME: Use a tail pointer?  */
Packit d7e8d0
  if (!(q2 = opd->key_queue))
Packit d7e8d0
    opd->key_queue = q;
Packit d7e8d0
  else
Packit d7e8d0
    {
Packit d7e8d0
      for (; q2->next; q2 = q2->next)
Packit d7e8d0
	;
Packit d7e8d0
      q2->next = q;
Packit d7e8d0
    }
Packit d7e8d0
  opd->key_cond = 1;
Packit d7e8d0
}
Packit d7e8d0
Packit d7e8d0
Packit d7e8d0
/* Start a keylist operation within CTX, searching for keys which
Packit d7e8d0
   match PATTERN.  If SECRET_ONLY is true, only secret keys are
Packit d7e8d0
   returned.  */
Packit d7e8d0
gpgme_error_t
Packit d7e8d0
gpgme_op_keylist_start (gpgme_ctx_t ctx, const char *pattern, int secret_only)
Packit d7e8d0
{
Packit d7e8d0
  gpgme_error_t err;
Packit d7e8d0
  void *hook;
Packit d7e8d0
  op_data_t opd;
Packit d7e8d0
  int flags = 0;
Packit d7e8d0
Packit Service 30b792
  TRACE_BEG  (DEBUG_CTX, "gpgme_op_keylist_start", ctx,
Packit d7e8d0
	      "pattern=%s, secret_only=%i", pattern, secret_only);
Packit d7e8d0
Packit d7e8d0
  if (!ctx)
Packit d7e8d0
    return TRACE_ERR (gpg_error (GPG_ERR_INV_VALUE));
Packit d7e8d0
Packit d7e8d0
  err = _gpgme_op_reset (ctx, 2);
Packit d7e8d0
  if (err)
Packit d7e8d0
    return TRACE_ERR (err);
Packit d7e8d0
Packit d7e8d0
  err = _gpgme_op_data_lookup (ctx, OPDATA_KEYLIST, &hook,
Packit d7e8d0
			       sizeof (*opd), release_op_data);
Packit d7e8d0
  opd = hook;
Packit d7e8d0
  if (err)
Packit d7e8d0
    return TRACE_ERR (err);
Packit d7e8d0
Packit d7e8d0
  _gpgme_engine_set_status_handler (ctx->engine, keylist_status_handler, ctx);
Packit d7e8d0
Packit d7e8d0
  err = _gpgme_engine_set_colon_line_handler (ctx->engine,
Packit d7e8d0
					      keylist_colon_handler, ctx);
Packit d7e8d0
  if (err)
Packit d7e8d0
    return TRACE_ERR (err);
Packit d7e8d0
Packit d7e8d0
  if (ctx->offline)
Packit d7e8d0
    flags |= GPGME_ENGINE_FLAG_OFFLINE;
Packit d7e8d0
Packit d7e8d0
  err = _gpgme_engine_op_keylist (ctx->engine, pattern, secret_only,
Packit d7e8d0
				  ctx->keylist_mode, flags);
Packit d7e8d0
  return TRACE_ERR (err);
Packit d7e8d0
}
Packit d7e8d0
Packit d7e8d0
Packit d7e8d0
/* Start a keylist operation within CTX, searching for keys which
Packit d7e8d0
   match PATTERN.  If SECRET_ONLY is true, only secret keys are
Packit d7e8d0
   returned.  */
Packit d7e8d0
gpgme_error_t
Packit d7e8d0
gpgme_op_keylist_ext_start (gpgme_ctx_t ctx, const char *pattern[],
Packit d7e8d0
			    int secret_only, int reserved)
Packit d7e8d0
{
Packit d7e8d0
  gpgme_error_t err;
Packit d7e8d0
  void *hook;
Packit d7e8d0
  op_data_t opd;
Packit d7e8d0
  int flags = 0;
Packit d7e8d0
Packit Service 30b792
  TRACE_BEG  (DEBUG_CTX, "gpgme_op_keylist_ext_start", ctx,
Packit d7e8d0
	      "secret_only=%i, reserved=0x%x", secret_only, reserved);
Packit d7e8d0
Packit d7e8d0
  if (!ctx)
Packit d7e8d0
    return TRACE_ERR (gpg_error (GPG_ERR_INV_VALUE));
Packit d7e8d0
Packit d7e8d0
  err = _gpgme_op_reset (ctx, 2);
Packit d7e8d0
  if (err)
Packit d7e8d0
    return TRACE_ERR (err);
Packit d7e8d0
Packit d7e8d0
  err = _gpgme_op_data_lookup (ctx, OPDATA_KEYLIST, &hook,
Packit d7e8d0
			       sizeof (*opd), release_op_data);
Packit d7e8d0
  opd = hook;
Packit d7e8d0
  if (err)
Packit d7e8d0
    return TRACE_ERR (err);
Packit d7e8d0
Packit d7e8d0
  _gpgme_engine_set_status_handler (ctx->engine, keylist_status_handler, ctx);
Packit d7e8d0
  err = _gpgme_engine_set_colon_line_handler (ctx->engine,
Packit d7e8d0
					      keylist_colon_handler, ctx);
Packit d7e8d0
  if (err)
Packit d7e8d0
    return TRACE_ERR (err);
Packit d7e8d0
Packit d7e8d0
  if (ctx->offline)
Packit d7e8d0
    flags |= GPGME_ENGINE_FLAG_OFFLINE;
Packit d7e8d0
Packit d7e8d0
  err = _gpgme_engine_op_keylist_ext (ctx->engine, pattern, secret_only,
Packit d7e8d0
				      reserved, ctx->keylist_mode,
Packit d7e8d0
				      flags);
Packit d7e8d0
  return TRACE_ERR (err);
Packit d7e8d0
}
Packit d7e8d0
Packit d7e8d0
Packit d7e8d0
/* Start a keylist operation within CTX to show keys contained
Packit d7e8d0
 * in DATA.  */
Packit d7e8d0
gpgme_error_t
Packit d7e8d0
gpgme_op_keylist_from_data_start (gpgme_ctx_t ctx, gpgme_data_t data,
Packit d7e8d0
                                  int reserved)
Packit d7e8d0
{
Packit d7e8d0
  gpgme_error_t err;
Packit d7e8d0
  void *hook;
Packit d7e8d0
  op_data_t opd;
Packit d7e8d0
Packit Service 30b792
  TRACE_BEG (DEBUG_CTX, "gpgme_op_keylist_from_data_start", ctx, "");
Packit d7e8d0
Packit d7e8d0
  if (!ctx || !data || reserved)
Packit d7e8d0
    return TRACE_ERR (gpg_error (GPG_ERR_INV_VALUE));
Packit d7e8d0
Packit d7e8d0
  err = _gpgme_op_reset (ctx, 2);
Packit d7e8d0
  if (err)
Packit d7e8d0
    return TRACE_ERR (err);
Packit d7e8d0
Packit d7e8d0
  err = _gpgme_op_data_lookup (ctx, OPDATA_KEYLIST, &hook,
Packit d7e8d0
                               sizeof (*opd), release_op_data);
Packit d7e8d0
  opd = hook;
Packit d7e8d0
  if (err)
Packit d7e8d0
    return TRACE_ERR (err);
Packit d7e8d0
Packit d7e8d0
  _gpgme_engine_set_status_handler (ctx->engine, keylist_status_handler, ctx);
Packit d7e8d0
  err = _gpgme_engine_set_colon_line_handler (ctx->engine,
Packit d7e8d0
                                              keylist_colon_handler, ctx);
Packit d7e8d0
  if (err)
Packit d7e8d0
    return TRACE_ERR (err);
Packit d7e8d0
Packit d7e8d0
  err = _gpgme_engine_op_keylist_data (ctx->engine, data);
Packit d7e8d0
  return TRACE_ERR (err);
Packit d7e8d0
}
Packit d7e8d0
Packit d7e8d0
Packit d7e8d0
/* Return the next key from the keylist in R_KEY.  */
Packit d7e8d0
gpgme_error_t
Packit d7e8d0
gpgme_op_keylist_next (gpgme_ctx_t ctx, gpgme_key_t *r_key)
Packit d7e8d0
{
Packit d7e8d0
  gpgme_error_t err;
Packit d7e8d0
  struct key_queue_item_s *queue_item;
Packit d7e8d0
  void *hook;
Packit d7e8d0
  op_data_t opd;
Packit d7e8d0
Packit Service 30b792
  TRACE_BEG (DEBUG_CTX, "gpgme_op_keylist_next", ctx, "");
Packit d7e8d0
Packit d7e8d0
  if (!ctx || !r_key)
Packit d7e8d0
    return TRACE_ERR (gpg_error (GPG_ERR_INV_VALUE));
Packit d7e8d0
  *r_key = NULL;
Packit d7e8d0
  if (!ctx)
Packit d7e8d0
    return TRACE_ERR (gpg_error (GPG_ERR_INV_VALUE));
Packit d7e8d0
Packit d7e8d0
  err = _gpgme_op_data_lookup (ctx, OPDATA_KEYLIST, &hook, -1, NULL);
Packit d7e8d0
  opd = hook;
Packit d7e8d0
  if (err)
Packit d7e8d0
    return TRACE_ERR (err);
Packit d7e8d0
  if (opd == NULL)
Packit d7e8d0
    return TRACE_ERR (gpg_error (GPG_ERR_INV_VALUE));
Packit d7e8d0
Packit d7e8d0
  if (!opd->key_queue)
Packit d7e8d0
    {
Packit d7e8d0
      err = _gpgme_wait_on_condition (ctx, &opd->key_cond, NULL);
Packit d7e8d0
      if (err)
Packit d7e8d0
	return TRACE_ERR (err);
Packit d7e8d0
Packit d7e8d0
      if (!opd->key_cond)
Packit d7e8d0
	return TRACE_ERR (opd->keydb_search_err? opd->keydb_search_err
Packit d7e8d0
                          /**/                 : gpg_error (GPG_ERR_EOF));
Packit d7e8d0
Packit d7e8d0
      opd->key_cond = 0;
Packit d7e8d0
      assert (opd->key_queue);
Packit d7e8d0
    }
Packit d7e8d0
  queue_item = opd->key_queue;
Packit d7e8d0
  opd->key_queue = queue_item->next;
Packit d7e8d0
  if (!opd->key_queue)
Packit d7e8d0
    opd->key_cond = 0;
Packit d7e8d0
Packit d7e8d0
  *r_key = queue_item->key;
Packit d7e8d0
  free (queue_item);
Packit d7e8d0
Packit Service 30b792
  TRACE_SUC ("key=%p (%s)", *r_key,
Packit Service 30b792
             ((*r_key)->subkeys && (*r_key)->subkeys->fpr) ?
Packit Service 30b792
             (*r_key)->subkeys->fpr : "invalid");
Packit Service 30b792
  return 0;
Packit d7e8d0
}
Packit d7e8d0
Packit d7e8d0
Packit d7e8d0
/* Terminate a pending keylist operation within CTX.  */
Packit d7e8d0
gpgme_error_t
Packit d7e8d0
gpgme_op_keylist_end (gpgme_ctx_t ctx)
Packit d7e8d0
{
Packit Service 30b792
  TRACE (DEBUG_CTX, "gpgme_op_keylist_end", ctx, "");
Packit d7e8d0
Packit d7e8d0
  if (!ctx)
Packit d7e8d0
    return gpg_error (GPG_ERR_INV_VALUE);
Packit d7e8d0
Packit d7e8d0
  return 0;
Packit d7e8d0
}
Packit d7e8d0
Packit d7e8d0

Packit d7e8d0
/* Get the key with the fingerprint FPR from the crypto backend.  If
Packit d7e8d0
   SECRET is true, get the secret key.  */
Packit d7e8d0
gpgme_error_t
Packit d7e8d0
gpgme_get_key (gpgme_ctx_t ctx, const char *fpr, gpgme_key_t *r_key,
Packit d7e8d0
	       int secret)
Packit d7e8d0
{
Packit d7e8d0
  gpgme_ctx_t listctx;
Packit d7e8d0
  gpgme_error_t err;
Packit Service 30b792
  gpgme_key_t result, key;
Packit d7e8d0
Packit Service 30b792
  TRACE_BEG  (DEBUG_CTX, "gpgme_get_key", ctx,
Packit d7e8d0
	      "fpr=%s, secret=%i", fpr, secret);
Packit d7e8d0
Packit Service 30b792
  if (r_key)
Packit Service 30b792
    *r_key = NULL;
Packit Service 30b792
Packit d7e8d0
  if (!ctx || !r_key || !fpr)
Packit d7e8d0
    return TRACE_ERR (gpg_error (GPG_ERR_INV_VALUE));
Packit d7e8d0
Packit d7e8d0
  if (strlen (fpr) < 8)	/* We have at least a key ID.  */
Packit d7e8d0
    return TRACE_ERR (gpg_error (GPG_ERR_INV_VALUE));
Packit d7e8d0
Packit d7e8d0
  /* FIXME: We use our own context because we have to avoid the user's
Packit d7e8d0
     I/O callback handlers.  */
Packit d7e8d0
  err = gpgme_new (&listctx);
Packit d7e8d0
  if (err)
Packit d7e8d0
    return TRACE_ERR (err);
Packit d7e8d0
  {
Packit d7e8d0
    gpgme_protocol_t proto;
Packit d7e8d0
    gpgme_engine_info_t info;
Packit d7e8d0
Packit d7e8d0
    /* Clone the relevant state.  */
Packit d7e8d0
    proto = gpgme_get_protocol (ctx);
Packit d7e8d0
    gpgme_set_protocol (listctx, proto);
Packit d7e8d0
    gpgme_set_keylist_mode (listctx, gpgme_get_keylist_mode (ctx));
Packit d7e8d0
    info = gpgme_ctx_get_engine_info (ctx);
Packit d7e8d0
    while (info && info->protocol != proto)
Packit d7e8d0
      info = info->next;
Packit d7e8d0
    if (info)
Packit d7e8d0
      gpgme_ctx_set_engine_info (listctx, proto,
Packit d7e8d0
				 info->file_name, info->home_dir);
Packit d7e8d0
  }
Packit d7e8d0
Packit d7e8d0
  err = gpgme_op_keylist_start (listctx, fpr, secret);
Packit d7e8d0
  if (!err)
Packit Service 30b792
    err = gpgme_op_keylist_next (listctx, &result);
Packit d7e8d0
  if (!err)
Packit d7e8d0
    {
Packit d7e8d0
    try_next_key:
Packit d7e8d0
      err = gpgme_op_keylist_next (listctx, &key);
Packit d7e8d0
      if (gpgme_err_code (err) == GPG_ERR_EOF)
Packit d7e8d0
	err = 0;
Packit d7e8d0
      else
Packit d7e8d0
	{
Packit d7e8d0
          if (!err
Packit Service 30b792
              && result && result->subkeys && result->subkeys->fpr
Packit d7e8d0
              && key && key->subkeys && key->subkeys->fpr
Packit Service 30b792
              && !strcmp (result->subkeys->fpr, key->subkeys->fpr))
Packit d7e8d0
            {
Packit d7e8d0
              /* The fingerprint is identical.  We assume that this is
Packit d7e8d0
                 the same key and don't mark it as an ambiguous.  This
Packit d7e8d0
                 problem may occur with corrupted keyrings and has
Packit d7e8d0
                 been noticed often with gpgsm.  In fact gpgsm uses a
Packit d7e8d0
                 similar hack to sort out such duplicates but it can't
Packit d7e8d0
                 do that while listing keys.  */
Packit d7e8d0
              gpgme_key_unref (key);
Packit Service 014d7f
              key = NULL;
Packit d7e8d0
              goto try_next_key;
Packit d7e8d0
            }
Packit d7e8d0
	  if (!err)
Packit d7e8d0
	    {
Packit d7e8d0
	      gpgme_key_unref (key);
Packit d7e8d0
	      err = gpg_error (GPG_ERR_AMBIGUOUS_NAME);
Packit d7e8d0
	    }
Packit Service 30b792
	  gpgme_key_unref (result);
Packit Service 30b792
          result = NULL;
Packit d7e8d0
	}
Packit d7e8d0
    }
Packit d7e8d0
  gpgme_release (listctx);
Packit d7e8d0
  if (! err)
Packit d7e8d0
    {
Packit Service 30b792
      *r_key = result;
Packit Service 30b792
      TRACE_LOG  ("key=%p (%s)", *r_key,
Packit d7e8d0
		  ((*r_key)->subkeys && (*r_key)->subkeys->fpr) ?
Packit d7e8d0
		  (*r_key)->subkeys->fpr : "invalid");
Packit d7e8d0
    }
Packit d7e8d0
  return TRACE_ERR (err);
Packit d7e8d0
}