[svn] GnuPG - r4959 - in trunk: . agent doc

svn author wk cvs at cvs.gnupg.org
Thu Mar 19 11:21:52 CET 2009


Author: wk
Date: 2009-03-19 11:21:51 +0100 (Thu, 19 Mar 2009)
New Revision: 4959

Modified:
   trunk/NEWS
   trunk/agent/ChangeLog
   trunk/agent/agent.h
   trunk/agent/command.c
   trunk/agent/trustlist.c
   trunk/doc/gpg-agent.texi
Log:
Changed order of the confirmation questions for root certificates
and stores negative answers in trustlist.txt.


Modified: trunk/agent/ChangeLog
===================================================================
--- trunk/agent/ChangeLog	2009-03-19 07:09:31 UTC (rev 4958)
+++ trunk/agent/ChangeLog	2009-03-19 10:21:51 UTC (rev 4959)
@@ -1,5 +1,12 @@
 2009-03-19  Werner Koch  <wk at g10code.com>
 
+	* trustlist.c (struct trustitem_s): Add field DISABLED.
+	(read_one_trustfile): Parse the '!' flag.
+	(agent_istrusted, agent_listtrusted): Check flag.
+	(agent_istrusted): Add arg R_DISABLED.  Change all callers.
+	(agent_marktrusted): Do not ask if flagged as disabled.  Reverse
+	the order of the questions.  Store the disabled flag.
+	
 	* gpg-agent.c (main): Save signal mask and open fds.  Restore mask
 	and close all fds prior to the exec.  Fixes bug#1013.
 

Modified: trunk/NEWS
===================================================================
--- trunk/NEWS	2009-03-19 07:09:31 UTC (rev 4958)
+++ trunk/NEWS	2009-03-19 10:21:51 UTC (rev 4959)
@@ -7,10 +7,13 @@
  * New command "KEYINFO" for GPG_AGENT.  GPGSM now also returns
    information about smartcards.
 
- * Make sure not to leak file descriptors if running gpg-agent with a
-   command.  Restore the signal mask to solve a problem in Mono.
+ * Made sure not to leak file descriptors if running gpg-agent with a
+   command.  Restores the signal mask to solve a problem in Mono.
 
+ * Changed order of the confirmation questions for root certificates
+   and stores negative answers in trustlist.txt.
 
+
 Noteworthy changes in version 2.0.11 (2009-03-03)
 -------------------------------------------------
 

Modified: trunk/agent/agent.h
===================================================================
--- trunk/agent/agent.h	2009-03-19 07:09:31 UTC (rev 4958)
+++ trunk/agent/agent.h	2009-03-19 10:21:51 UTC (rev 4959)
@@ -303,7 +303,7 @@
 
 /*-- trustlist.c --*/
 void initialize_module_trustlist (void);
-gpg_error_t agent_istrusted (ctrl_t ctrl, const char *fpr);
+gpg_error_t agent_istrusted (ctrl_t ctrl, const char *fpr, int *r_disabled);
 gpg_error_t agent_listtrusted (void *assuan_context);
 gpg_error_t agent_marktrusted (ctrl_t ctrl, const char *name,
                                const char *fpr, int flag);

Modified: trunk/agent/command.c
===================================================================
--- trunk/agent/command.c	2009-03-19 07:09:31 UTC (rev 4958)
+++ trunk/agent/command.c	2009-03-19 10:21:51 UTC (rev 4959)
@@ -461,7 +461,7 @@
   for (p=line; i < 40; p++, i++)
     fpr[i] = *p >= 'a'? (*p & 0xdf): *p;
   fpr[i] = 0;
-  rc = agent_istrusted (ctrl, fpr);
+  rc = agent_istrusted (ctrl, fpr, NULL);
   if (!rc || gpg_err_code (rc) == GPG_ERR_NOT_TRUSTED)
     return rc;
   else if (rc == -1 || gpg_err_code (rc) == GPG_ERR_EOF )

Modified: trunk/agent/trustlist.c
===================================================================
--- trunk/agent/trustlist.c	2009-03-19 07:09:31 UTC (rev 4958)
+++ trunk/agent/trustlist.c	2009-03-19 10:21:51 UTC (rev 4959)
@@ -1,5 +1,5 @@
 /* trustlist.c - Maintain the list of trusted keys
- * Copyright (C) 2002, 2004, 2006, 2007 Free Software Foundation, Inc.
+ * Copyright (C) 2002, 2004, 2006, 2007, 2009 Free Software Foundation, Inc.
  *
  * This file is part of GnuPG.
  *
@@ -38,6 +38,7 @@
 {
   struct
   {
+    int disabled:1;       /* This entry is disabled.  */
     int for_pgp:1;        /* Set by '*' or 'P' as first flag. */
     int for_smime:1;      /* Set by '*' or 'S' as first flag. */
     int relax:1;          /* Relax checking of root certificate
@@ -59,11 +60,13 @@
 static const char headerblurb[] =
 "# This is the list of trusted keys.  Comment lines, like this one, as\n"
 "# well as empty lines are ignored.  Lines have a length limit but this\n"
-"# is not serious limitation as the format of the entries is fixed and\n"
+"# is not a serious limitation as the format of the entries is fixed and\n"
 "# checked by gpg-agent.  A non-comment line starts with optional white\n"
-"# space, followed by the SHA-1 fingerpint in hex, optionally followed\n"
-"# by a flag character which my either be 'P', 'S' or '*'.  You should\n"
-"# give the gpg-agent a HUP after editing this file.\n"
+"# space, followed by the SHA-1 fingerpint in hex, followed by a flag\n"
+"# which may be one of 'P', 'S' or '*' and optionally followed by a list of\n"
+"# other flags.  The fingerprint may be prefixed with a '!' to mark the\n"
+"# key as not trusted.  You should give the gpg-agent a HUP or run the\n"
+"# command \"gpgconf --reload gpg-agent\" after changing this file.\n"
 "\n\n"
 "# Include the default trust list\n"
 "include-default\n"
@@ -120,7 +123,7 @@
   int tableidx;
   size_t tablesize;
   int lnr = 0;
-
+  
   table = *addr_of_table;
   tablesize = *addr_of_tablesize;
   tableidx = *addr_of_tableidx;
@@ -210,6 +213,15 @@
 
       ti = table + tableidx;
 
+      memset (&ti->flags, 0, sizeof ti->flags);
+      if (*p == '!')
+        {
+          ti->flags.disabled = 1;
+          p++;
+          while (spacep (p))
+            p++;
+        }
+
       n = hexcolon2bin (p, ti->fpr, 20);
       if (n < 0)
         {
@@ -221,7 +233,6 @@
       for (; spacep (p); p++)
         ;
       
-      memset (&ti->flags, 0, sizeof ti->flags);
       /* Process the first flag which needs to be the first for
          backward compatibility. */
       if (!*p || *p == '*' )
@@ -366,13 +377,16 @@
 /* Check whether the given fpr is in our trustdb.  We expect FPR to be
    an all uppercase hexstring of 40 characters. */
 gpg_error_t 
-agent_istrusted (ctrl_t ctrl, const char *fpr)
+agent_istrusted (ctrl_t ctrl, const char *fpr, int *r_disabled)
 {
   gpg_error_t err;
   trustitem_t *ti;
   size_t len;
   unsigned char fprbin[20];
 
+  if (r_disabled)
+    *r_disabled = 0;
+
   if ( hexcolon2bin (fpr, fprbin, 20) < 0 )
     return gpg_error (GPG_ERR_INV_VALUE);
 
@@ -407,7 +421,13 @@
                 if (err)
                   return err;
               }
-            return 0; /* Trusted. */
+            if (ti->flags.disabled)
+              {
+                if (r_disabled)
+                  *r_disabled = 1;
+                return gpg_error (GPG_ERR_NOT_TRUSTED);
+              }
+            return 0; /* Trusted.  */
           }
     }
   return gpg_error (GPG_ERR_NOT_TRUSTED);
@@ -440,6 +460,8 @@
       lock_trusttable ();
       for (ti=trusttable, len = trusttablesize; len; ti++, len--)
         {
+          if (ti->flags.disabled)
+            continue;
           bin2hex (ti->fpr, 20, key);
           key[40] = ' ';
           key[41] = ((ti->flags.for_smime && ti->flags.for_pgp)? '*'
@@ -490,7 +512,7 @@
    This function does first check whether that key has already been put
    into the trustdb and returns success in this case.  Before a FPR
    actually gets inserted, the user is asked by means of the Pinentry
-   whether this is actual wants he want to do.  */
+   whether this is actual want he wants to do.  */
 gpg_error_t
 agent_marktrusted (ctrl_t ctrl, const char *name, const char *fpr, int flag)
 {
@@ -499,8 +521,9 @@
   char *fname;
   FILE *fp;
   char *fprformatted;
+  int is_disabled;
+  int yes_i_trust;
 
-
   /* Check whether we are at all allowed to modify the trustlist.
      This is useful so that the trustlist may be a symlink to a global
      trustlist with only admin priviliges to modify it.  Of course
@@ -514,57 +537,29 @@
     }    
   xfree (fname);
 
-  if (!agent_istrusted (ctrl, fpr))
+  if (!agent_istrusted (ctrl, fpr, &is_disabled))
     {
       return 0; /* We already got this fingerprint.  Silently return
                    success. */
     }
-
+  
   /* This feature must explicitly been enabled. */
   if (!opt.allow_mark_trusted)
     return gpg_error (GPG_ERR_NOT_SUPPORTED);
 
-  /* Insert a new one. */
-  fprformatted = insert_colons (fpr);
-  if (!fprformatted)
-    return out_of_core ();
-  desc = xtryasprintf (
-                /* TRANSLATORS: This prompt is shown by the Pinentry
-                   and has one special property: A "%%0A" is used by
-                   Pinentry to insert a line break.  The double
-                   percent sign is actually needed because it is also
-                   a printf format string.  If you need to insert a
-                   plain % sign, you need to encode it as "%%25".  The
-                   second "%s" gets replaced by a hexdecimal
-                   fingerprint string whereas the first one receives
-                   the name as stored in the certificate. */
-                _("Please verify that the certificate identified as:%%0A"
-                  "  \"%s\"%%0A"
-                  "has the fingerprint:%%0A"
-                  "  %s"), name, fprformatted);
-  if (!desc)
+  if (is_disabled)
     {
-      xfree (fprformatted);
-      return out_of_core ();
+      /* There is an disabled entry in the trustlist.  Return an error
+         so that the user won't be asked again for that one.  Changing
+         this flag with the integrated marktrusted feature is and will
+         not be made possible.  */
+      return gpg_error (GPG_ERR_NOT_TRUSTED);
     }
 
-  /* TRANSLATORS: "Correct" is the label of a button and intended to
-     be hit if the fingerprint matches the one of the CA.  The other
-     button is "the default "Cancel" of the Pinentry. */
-  err = agent_get_confirmation (ctrl, desc, _("Correct"), NULL);
-  xfree (desc);
-  /* If the user did not confirmed this, we return cancel here so that
-     gpgsm may stop asking further questions.  We won't do this for
-     the second question of course. */
-  if (err)
-    {
-      xfree (fprformatted);
-      return (gpg_err_code (err) == GPG_ERR_NOT_CONFIRMED ? 
-              gpg_err_make (gpg_err_source (err), GPG_ERR_CANCELED) : err);
-    }
 
+  /* Insert a new one. */
 
-
+  /* First a general question whether this is trusted.  */
   desc = xtryasprintf (
                 /* TRANSLATORS: This prompt is shown by the Pinentry
                    and has one special property: A "%%0A" is used by
@@ -579,32 +574,77 @@
                   "to correctly certify user certificates?"),
                 name);
   if (!desc)
-    {
-      xfree (fprformatted);
-      return out_of_core ();
-    }
-
+    return out_of_core ();
   err = agent_get_confirmation (ctrl, desc, _("Yes"), _("No"));
   xfree (desc);
-  if (err)
+  if (!err)
+    yes_i_trust = 1;
+  else if (gpg_err_code (err) == GPG_ERR_NOT_CONFIRMED)
+    yes_i_trust = 0;
+  else
+    return err;
+
+
+  fprformatted = insert_colons (fpr);
+  if (!fprformatted)
+    return out_of_core ();
+
+  /* If the user trusts this certificate he has to verify the
+     fingerprint of course.  */
+  if (yes_i_trust)
     {
-      xfree (fprformatted);
-      return err;
+      desc = xtryasprintf 
+        (
+         /* TRANSLATORS: This prompt is shown by the Pinentry and has
+            one special property: A "%%0A" is used by Pinentry to
+            insert a line break.  The double percent sign is actually
+            needed because it is also a printf format string.  If you
+            need to insert a plain % sign, you need to encode it as
+            "%%25".  The second "%s" gets replaced by a hexdecimal
+            fingerprint string whereas the first one receives the name
+            as stored in the certificate. */
+         _("Please verify that the certificate identified as:%%0A"
+           "  \"%s\"%%0A"
+           "has the fingerprint:%%0A"
+           "  %s"), name, fprformatted);
+      if (!desc)
+        {
+          xfree (fprformatted);
+          return out_of_core ();
+        }
+      
+      /* TRANSLATORS: "Correct" is the label of a button and intended
+         to be hit if the fingerprint matches the one of the CA.  The
+         other button is "the default "Cancel" of the Pinentry. */
+      err = agent_get_confirmation (ctrl, desc, _("Correct"), _("Wrong"));
+      xfree (desc);
+      if (gpg_err_code (err) == GPG_ERR_NOT_CONFIRMED)
+        yes_i_trust = 0;
+      else if (err)
+        {
+          xfree (fprformatted);
+          return err;
+        }
     }
 
+
   /* Now check again to avoid duplicates.  We take the lock to make
      sure that nobody else plays with our file.  Frankly we don't work
      with the trusttable but using this lock is just fine for our
      purpose.  */
   lock_trusttable ();
-  if (!agent_istrusted (ctrl, fpr))
-    {
-      unlock_trusttable ();
-      xfree (fprformatted);
-      return 0; 
-    }
+  {
+    int now_disabled;
 
+    if (!agent_istrusted (ctrl, fpr, &now_disabled) || now_disabled)
+      {
+        unlock_trusttable ();
+        xfree (fprformatted);
+        return now_disabled? gpg_error (GPG_ERR_NOT_TRUSTED) : 0; 
+      }
+  }
 
+
   fname = make_filename (opt.homedir, "trustlist.txt", NULL);
   if ( access (fname, F_OK) && errno == ENOENT)
     {
@@ -635,7 +675,7 @@
   /* Append the key. */
   fputs ("\n# ", fp);
   print_sanitized_string (fp, name, 0);
-  fprintf (fp, "\n%s %c\n", fprformatted, flag);
+  fprintf (fp, "\n%s%s %c\n", yes_i_trust?"":"!", fprformatted, flag);
   if (ferror (fp))
     err = gpg_error_from_syserror ();
   

Modified: trunk/doc/gpg-agent.texi
===================================================================
--- trunk/doc/gpg-agent.texi	2009-03-19 07:09:31 UTC (rev 4958)
+++ trunk/doc/gpg-agent.texi	2009-03-19 10:21:51 UTC (rev 4959)
@@ -520,9 +520,11 @@
   you need to enter its fingerprint followed by a space and a capital
   letter @code{S}.  Colons may optionally be used to separate the bytes of
   a fingerprint; this allows to cut and paste the fingerprint from a key
-  listing output.
+  listing output.  If the line is prefixed with a @code{!} the key is
+  explicitly marked as not trusted.
   
-  Here is an example where two keys are marked as ultimately trusted:
+  Here is an example where two keys are marked as ultimately trusted
+  and one as not trusted:
   
   @example
   # CN=Wurzel ZS 3,O=Intevation GmbH,C=DE
@@ -530,6 +532,9 @@
   
   # CN=PCA-1-Verwaltung-02/O=PKI-1-Verwaltung/C=DE
   DC:BD:69:25:48:BD:BB:7E:31:6E:BB:80:D3:00:80:35:D4:F8:A6:CD S 
+
+  # CN=Root-CA/O=Schlapphuete/L=Pullach/C=DE
+  !14:56:98:D3:FE:9C:CA:5A:31:6E:BC:81:D3:11:4E:00:90:A3:44:C2 S
   @end example
   
 Before entering a key into this file, you need to ensure its




More information about the Gnupg-commits mailing list