[svn] GnuPG - r5316 - trunk/g10

svn author wk cvs at cvs.gnupg.org
Wed Apr 21 19:30:07 CEST 2010


Author: wk
Date: 2010-04-21 19:30:07 +0200 (Wed, 21 Apr 2010)
New Revision: 5316

Modified:
   trunk/g10/gpgv.c
   trunk/g10/packet.h
   trunk/g10/pubkey-enc.c
Log:
Re-indent and changed return type.


Modified: trunk/g10/gpgv.c
===================================================================
--- trunk/g10/gpgv.c	2010-04-21 16:26:17 UTC (rev 5315)
+++ trunk/g10/gpgv.c	2010-04-21 17:30:07 UTC (rev 5316)
@@ -358,7 +358,7 @@
 /* Stub:
  * No encryption here but mainproc links to these functions.
  */
-int
+gpg_error_t
 get_session_key (PKT_pubkey_enc *k, DEK *dek)
 {
   (void)k;
@@ -367,7 +367,7 @@
 }
 
 /* Stub: */
-int
+gpg_error_t
 get_override_session_key (DEK *dek, const char *string)
 {
   (void)dek;

Modified: trunk/g10/packet.h
===================================================================
--- trunk/g10/packet.h	2010-04-21 16:26:17 UTC (rev 5315)
+++ trunk/g10/packet.h	2010-04-21 17:30:07 UTC (rev 5316)
@@ -480,8 +480,8 @@
 int is_secret_key_protected (PKT_public_key *pk);
 
 /*-- pubkey-enc.c --*/
-int get_session_key( PKT_pubkey_enc *k, DEK *dek );
-int get_override_session_key( DEK *dek, const char *string );
+gpg_error_t get_session_key (PKT_pubkey_enc *k, DEK *dek);
+gpg_error_t get_override_session_key (DEK *dek, const char *string);
 
 /*-- compress.c --*/
 int handle_compressed( void *ctx, PKT_compressed *cd,

Modified: trunk/g10/pubkey-enc.c
===================================================================
--- trunk/g10/pubkey-enc.c	2010-04-21 16:26:17 UTC (rev 5315)
+++ trunk/g10/pubkey-enc.c	2010-04-21 17:30:07 UTC (rev 5316)
@@ -1,6 +1,6 @@
-/* pubkey-enc.c -  public key encoded packet handling
- * Copyright (C) 1998, 1999, 2000, 2001, 2002,
- *               2006, 2009 Free Software Foundation, Inc.
+/* pubkey-enc.c - Process a public key encoded packet.
+ * Copyright (C) 1998, 1999, 2000, 2001, 2002, 2006, 2009,
+ *               2010 Free Software Foundation, Inc.
  *
  * This file is part of GnuPG.
  *
@@ -38,131 +38,136 @@
 #include "call-agent.h"
 
 
-static int get_it( PKT_pubkey_enc *k,
-		   DEK *dek, PKT_secret_key *sk, u32 *keyid );
+static gpg_error_t get_it (PKT_pubkey_enc *k,
+                           DEK *dek, PKT_secret_key *sk, u32 *keyid);
 
 
-/* check that the given algo is mentioned in one of the valid user IDs */
+/* Check that the given algo is mentioned in one of the valid user-ids. */
 static int
-is_algo_in_prefs ( KBNODE keyblock, preftype_t type, int algo )
+is_algo_in_prefs (kbnode_t keyblock, preftype_t type, int algo)
 {
-    KBNODE k;
+  kbnode_t k;
 
-    for (k=keyblock; k; k=k->next) {
-        if (k->pkt->pkttype == PKT_USER_ID) {
-            PKT_user_id *uid = k->pkt->pkt.user_id;
-            prefitem_t *prefs = uid->prefs;
-            
-            if (uid->created && prefs &&
-		!uid->is_revoked && !uid->is_expired ) {
-                for (; prefs->type; prefs++ )
-                    if (prefs->type == type && prefs->value == algo)
-                        return 1;
+  for (k = keyblock; k; k = k->next)
+    {
+      if (k->pkt->pkttype == PKT_USER_ID)
+        {
+          PKT_user_id *uid = k->pkt->pkt.user_id;
+          prefitem_t *prefs = uid->prefs;
+
+          if (uid->created && prefs && !uid->is_revoked && !uid->is_expired)
+            {
+              for (; prefs->type; prefs++)
+                if (prefs->type == type && prefs->value == algo)
+                  return 1;
             }
         }
     }
-    return 0;
+  return 0;
 }
 
 
-/****************
- * Get the session key from a pubkey enc packet and return
- * it in DEK, which should have been allocated in secure memory.
+/*
+ * Get the session key from a pubkey enc packet and return it in DEK,
+ * which should have been allocated in secure memory by the caller.
  */
-int
-get_session_key( PKT_pubkey_enc *k, DEK *dek )
+gpg_error_t
+get_session_key (PKT_pubkey_enc * k, DEK * dek)
 {
-    PKT_secret_key *sk = NULL;
-    int rc;
+  PKT_secret_key *sk = NULL;
+  int rc;
 
-    rc = openpgp_pk_test_algo2 (k->pubkey_algo, PUBKEY_USAGE_ENC);
-    if( rc )
-	goto leave;
+  rc = openpgp_pk_test_algo2 (k->pubkey_algo, PUBKEY_USAGE_ENC);
+  if (rc)
+    goto leave;
 
-    if( (k->keyid[0] || k->keyid[1]) && !opt.try_all_secrets ) {
-	sk = xmalloc_clear( sizeof *sk );
-	sk->pubkey_algo = k->pubkey_algo; /* we want a pubkey with this algo*/
-	if( !(rc = get_seckey( sk, k->keyid )) )
-	    rc = get_it( k, dek, sk, k->keyid );
+  if ((k->keyid[0] || k->keyid[1]) && !opt.try_all_secrets)
+    {
+      sk = xmalloc_clear (sizeof *sk);
+      sk->pubkey_algo = k->pubkey_algo; /* We want a pubkey with this algo */
+      if (!(rc = get_seckey (sk, k->keyid)))
+        rc = get_it (k, dek, sk, k->keyid);
     }
-    else if (opt.skip_hidden_recipients)
-      rc = gpg_error (GPG_ERR_NO_SECKEY);
-    else { /* anonymous receiver: Try all available secret keys */
-	void *enum_context = NULL;
-	u32 keyid[2];
-	char *p;
+  else if (opt.skip_hidden_recipients)
+    rc = gpg_error (GPG_ERR_NO_SECKEY);
+  else  /* Anonymous receiver: Try all available secret keys.  */
+    {
+      void *enum_context = NULL;
+      u32 keyid[2];
+      char *p;
 
-	for(;;) {
-	    if( sk )
-		free_secret_key( sk );
-	    sk = xmalloc_clear( sizeof *sk );
-	    rc=enum_secret_keys( &enum_context, sk, 1, 0);
-	    if( rc ) {
-		rc = G10ERR_NO_SECKEY;
-		break;
-	    }
-	    if( sk->pubkey_algo != k->pubkey_algo )
-		continue;
-	    keyid_from_sk( sk, keyid );
-	    log_info(_("anonymous recipient; trying secret key %s ...\n"),
-                     keystr(keyid));
+      for (;;)
+        {
+          if (sk)
+            free_secret_key (sk);
+          sk = xmalloc_clear (sizeof *sk);
+          rc = enum_secret_keys (&enum_context, sk, 1, 0);
+          if (rc)
+            {
+              rc = G10ERR_NO_SECKEY;
+              break;
+            }
+          if (sk->pubkey_algo != k->pubkey_algo)
+            continue;
+          keyid_from_sk (sk, keyid);
+          log_info (_("anonymous recipient; trying secret key %s ...\n"),
+                    keystr (keyid));
 
-	    if(!opt.try_all_secrets && !is_status_enabled())
-	      {
-		p=get_last_passphrase();
-		set_next_passphrase(p);
-		xfree(p);
-	      }
+          if (!opt.try_all_secrets && !is_status_enabled ())
+            {
+              p = get_last_passphrase ();
+              set_next_passphrase (p);
+              xfree (p);
+            }
 
-	    /* rc = check_secret_key( sk, opt.try_all_secrets?1:-1 ); /\* ask */
-	    /*     						      only */
-	    /*     						      once *\/ */
-	    /* if( !rc ) */
-	      {
-		rc = get_it( k, dek, sk, keyid );
-		/* Successfully checked the secret key (either it was
-		   a card, had no passphrase, or had the right
-		   passphrase) but couldn't decrypt the session key,
-		   so thus that key is not the anonymous recipient.
-		   Move the next passphrase into last for the next
-		   round.  We only do this if the secret key was
-		   successfully checked as in the normal case,
-		   check_secret_key handles this for us via
-		   passphrase_to_dek */
-		if(rc)
-		  next_to_last_passphrase();
-	      }
+          /* rc = check_secret_key( sk, opt.try_all_secrets?1:-1 ); /\* ask */
+          /*                                                        only */
+          /*                                                        once *\/ */
+          /* if( !rc ) */
+          {
+            rc = get_it (k, dek, sk, keyid);
+            /* Successfully checked the secret key (either it was a
+               card, had no passphrase, or had the right passphrase)
+               but couldn't decrypt the session key, so thus that key
+               is not the anonymous recipient.  Move the next
+               passphrase into last for the next round.  We only do
+               this if the secret key was successfully checked as in
+               the normal case, check_secret_key handles this for us
+               via passphrase_to_dek.  */
+            if (rc)
+              next_to_last_passphrase ();
+          }
 
-	    if( !rc )
-	      {
-		log_info(_("okay, we are the anonymous recipient.\n") );
-		break;
-	      }
-	}
-	enum_secret_keys( &enum_context, NULL, 0, 0 ); /* free context */
+          if (!rc)
+            {
+              log_info (_("okay, we are the anonymous recipient.\n"));
+              break;
+            }
+        }
+      enum_secret_keys (&enum_context, NULL, 0, 0);     /* free context */
     }
 
-  leave:
-    if( sk )
-	free_secret_key( sk );
-    return rc;
+leave:
+  if (sk)
+    free_secret_key (sk);
+  return rc;
 }
 
 
-static int
-get_it( PKT_pubkey_enc *enc, DEK *dek, PKT_secret_key *sk, u32 *keyid )
+static gpg_error_t
+get_it (PKT_pubkey_enc *enc, DEK *dek, PKT_secret_key *sk, u32 *keyid)
 {
   int rc;
-  gcry_mpi_t plain_dek  = NULL;
+  gcry_mpi_t plain_dek = NULL;
   byte *frame = NULL;
   unsigned int n;
   size_t nframe;
   u16 csum, csum2;
-  
+
   int card = 0;
 
   if (sk->is_protected && sk->protect.s2k.mode == 1002)
-    { /* Note, that we only support RSA for now. */
+    {   /* Note, that we only support RSA for now. */
 #ifdef ENABLE_CARD_SUPPORT
       unsigned char *rbuf;
       size_t rbuflen;
@@ -170,9 +175,11 @@
       unsigned char *indata = NULL;
       size_t indatalen;
 
-      snbuf = serialno_and_fpr_from_sk (sk->protect.iv, sk->protect.ivlen, sk);
+      snbuf =
+        serialno_and_fpr_from_sk (sk->protect.iv, sk->protect.ivlen, sk);
 
-      if (gcry_mpi_aprint (GCRYMPI_FMT_USG, &indata, &indatalen, enc->data[0]))
+      if (gcry_mpi_aprint
+          (GCRYMPI_FMT_USG, &indata, &indatalen, enc->data[0]))
         BUG ();
 
       rc = agent_scd_pkdecrypt (snbuf, indata, indatalen, &rbuf, &rbuflen);
@@ -187,173 +194,197 @@
 #else
       rc = gpg_error (GPG_ERR_NOT_SUPPORTED);
       goto leave;
-#endif /*!ENABLE_CARD_SUPPORT*/
+#endif /*!ENABLE_CARD_SUPPORT */
     }
   else
     {
-      rc = pk_decrypt (sk->pubkey_algo, &plain_dek, enc->data, sk->skey );
-      if( rc )
-	goto leave;
+      rc = pk_decrypt (sk->pubkey_algo, &plain_dek, enc->data, sk->skey);
+      if (rc)
+        goto leave;
       if (gcry_mpi_aprint (GCRYMPI_FMT_USG, &frame, &nframe, plain_dek))
-        BUG();
-      gcry_mpi_release (plain_dek); plain_dek = NULL;
+        BUG ();
+      gcry_mpi_release (plain_dek);
+      plain_dek = NULL;
     }
 
-    /* Now get the DEK (data encryption key) from the frame
-     *
-     * Old versions encode the DEK in in this format (msb is left):
-     *
-     *	   0  1  DEK(16 bytes)	CSUM(2 bytes)  0  RND(n bytes) 2
-     *
-     * Later versions encode the DEK like this:
-     *
-     *	   0  2  RND(n bytes)  0  A  DEK(k bytes)  CSUM(2 bytes)
-     *
-     * (mpi_get_buffer already removed the leading zero).
-     *
-     * RND are non-zero randow bytes.
-     * A   is the cipher algorithm
-     * DEK is the encryption key (session key) with length k
-     * CSUM
-     */
-    if (DBG_CIPHER)
-      log_printhex ("DEK frame:", frame, nframe );
-    n=0;
-    if (!card)
-      {
-        if( n + 7 > nframe )
-          { rc = G10ERR_WRONG_SECKEY; goto leave; }
-        if( frame[n] == 1 && frame[nframe-1] == 2 ) {
-          log_info(_("old encoding of the DEK is not supported\n"));
+  /* Now get the DEK (data encryption key) from the frame
+   *
+   * Old versions encode the DEK in in this format (msb is left):
+   *
+   *     0  1  DEK(16 bytes)  CSUM(2 bytes)  0  RND(n bytes) 2
+   *
+   * Later versions encode the DEK like this:
+   *
+   *     0  2  RND(n bytes)  0  A  DEK(k bytes)  CSUM(2 bytes)
+   *
+   * (mpi_get_buffer already removed the leading zero).
+   *
+   * RND are non-zero randow bytes.
+   * A   is the cipher algorithm
+   * DEK is the encryption key (session key) with length k
+   * CSUM
+   */
+  if (DBG_CIPHER)
+    log_printhex ("DEK frame:", frame, nframe);
+  n = 0;
+  if (!card)
+    {
+      if (n + 7 > nframe)
+        {
+          rc = G10ERR_WRONG_SECKEY;
+          goto leave;
+        }
+      if (frame[n] == 1 && frame[nframe - 1] == 2)
+        {
+          log_info (_("old encoding of the DEK is not supported\n"));
           rc = G10ERR_CIPHER_ALGO;
           goto leave;
         }
-        if( frame[n] != 2 )  /* somethink is wrong */
-          { rc = G10ERR_WRONG_SECKEY; goto leave; }
-        for(n++; n < nframe && frame[n]; n++ ) /* skip the random bytes */
-          ;
-        n++; /* and the zero byte */
-      }
+      if (frame[n] != 2) /* Somethink is wrong.  */
+        {
+          rc = G10ERR_WRONG_SECKEY;
+          goto leave;
+        }
+      for (n++; n < nframe && frame[n]; n++) /* Skip the random bytes.  */
+        ;
+      n++; /* Skip the zero byte.  */
+    }
 
-    if( n + 4 > nframe )
-	{ rc = G10ERR_WRONG_SECKEY; goto leave; }
+  if (n + 4 > nframe)
+    {
+      rc = G10ERR_WRONG_SECKEY;
+      goto leave;
+    }
 
-    dek->keylen = nframe - (n+1) - 2;
-    dek->algo = frame[n++];
-    if( dek->algo ==  CIPHER_ALGO_IDEA )
-	write_status(STATUS_RSA_OR_IDEA);
-    rc = openpgp_cipher_test_algo (dek->algo);
-    if( rc ) {
-	if( !opt.quiet && gpg_err_code (rc) == GPG_ERR_CIPHER_ALGO ) {
-	    log_info(_("cipher algorithm %d%s is unknown or disabled\n"),
-                     dek->algo, dek->algo == CIPHER_ALGO_IDEA? " (IDEA)":"");
-	    if(dek->algo==CIPHER_ALGO_IDEA)
-	      idea_cipher_warn (0);
-	}
-	dek->algo = 0;
-	goto leave;
+  dek->keylen = nframe - (n + 1) - 2;
+  dek->algo = frame[n++];
+  if (dek->algo == CIPHER_ALGO_IDEA)
+    write_status (STATUS_RSA_OR_IDEA);
+  rc = openpgp_cipher_test_algo (dek->algo);
+  if (rc)
+    {
+      if (!opt.quiet && gpg_err_code (rc) == GPG_ERR_CIPHER_ALGO)
+        {
+          log_info (_("cipher algorithm %d%s is unknown or disabled\n"),
+                    dek->algo,
+                    dek->algo == CIPHER_ALGO_IDEA ? " (IDEA)" : "");
+          if (dek->algo == CIPHER_ALGO_IDEA)
+            idea_cipher_warn (0);
+        }
+      dek->algo = 0;
+      goto leave;
     }
-    if ( dek->keylen != openpgp_cipher_get_algo_keylen (dek->algo) ) {
-	rc = GPG_ERR_WRONG_SECKEY;
-	goto leave;
+  if (dek->keylen != openpgp_cipher_get_algo_keylen (dek->algo))
+    {
+      rc = GPG_ERR_WRONG_SECKEY;
+      goto leave;
     }
 
-    /* copy the key to DEK and compare the checksum */
-    csum  = frame[nframe-2] << 8;
-    csum |= frame[nframe-1];
-    memcpy( dek->key, frame+n, dek->keylen );
-    for( csum2=0, n=0; n < dek->keylen; n++ )
-	csum2 += dek->key[n];
-    if( csum != csum2 ) {
-	rc = G10ERR_WRONG_SECKEY;
-	goto leave;
+  /* Copy the key to DEK and compare the checksum.  */
+  csum = frame[nframe - 2] << 8;
+  csum |= frame[nframe - 1];
+  memcpy (dek->key, frame + n, dek->keylen);
+  for (csum2 = 0, n = 0; n < dek->keylen; n++)
+    csum2 += dek->key[n];
+  if (csum != csum2)
+    {
+      rc = G10ERR_WRONG_SECKEY;
+      goto leave;
     }
-    if( DBG_CIPHER )
-        log_printhex ("DEK is:", dek->key, dek->keylen );
-    /* check that the algo is in the preferences and whether it has expired */
-    {
-	PKT_public_key *pk = NULL;
-        KBNODE pkb = get_pubkeyblock (keyid);
+  if (DBG_CIPHER)
+    log_printhex ("DEK is:", dek->key, dek->keylen);
 
-	if( !pkb ) {
-            rc = -1;
-	    log_error("oops: public key not found for preference check\n");
-        }
-	else if(pkb->pkt->pkt.public_key->selfsigversion > 3
-		&& dek->algo != CIPHER_ALGO_3DES
-		&& !opt.quiet
-		&& !is_algo_in_prefs( pkb, PREFTYPE_SYM, dek->algo ))
-	  log_info (_("WARNING: cipher algorithm %s not found in recipient"
-                      " preferences\n"), openpgp_cipher_algo_name (dek->algo));
-        if (!rc) {
-            KBNODE k;
-            
-            for (k=pkb; k; k = k->next) {
-                if (k->pkt->pkttype == PKT_PUBLIC_KEY 
-                    || k->pkt->pkttype == PKT_PUBLIC_SUBKEY){
-                    u32 aki[2];
-        	    keyid_from_pk(k->pkt->pkt.public_key, aki);
+  /* Check that the algo is in the preferences and whether it has expired.  */
+  {
+    PKT_public_key *pk = NULL;
+    KBNODE pkb = get_pubkeyblock (keyid);
 
-                    if (aki[0]==keyid[0] && aki[1]==keyid[1]) {
-                        pk = k->pkt->pkt.public_key;
-                        break;
-                    }
-                }
-            }
-            if (!pk)
-                BUG ();
-            if ( pk->expiredate && pk->expiredate <= make_timestamp() ) {
-                log_info(_("NOTE: secret key %s expired at %s\n"),
-                         keystr(keyid), asctimestamp( pk->expiredate) );
-            }
-        }
+    if (!pkb)
+      {
+        rc = -1;
+        log_error ("oops: public key not found for preference check\n");
+      }
+    else if (pkb->pkt->pkt.public_key->selfsigversion > 3
+             && dek->algo != CIPHER_ALGO_3DES
+             && !opt.quiet
+             && !is_algo_in_prefs (pkb, PREFTYPE_SYM, dek->algo))
+      log_info (_("WARNING: cipher algorithm %s not found in recipient"
+                  " preferences\n"), openpgp_cipher_algo_name (dek->algo));
+    if (!rc)
+      {
+        KBNODE k;
 
-        if ( pk &&  pk->is_revoked ) {
-            log_info( _("NOTE: key has been revoked") );
-            log_printf ("\n");
-            show_revocation_reason( pk, 1 );
-        }
+        for (k = pkb; k; k = k->next)
+          {
+            if (k->pkt->pkttype == PKT_PUBLIC_KEY
+                || k->pkt->pkttype == PKT_PUBLIC_SUBKEY)
+              {
+                u32 aki[2];
+                keyid_from_pk (k->pkt->pkt.public_key, aki);
 
-	release_kbnode (pkb);
-	rc = 0;
-    }
+                if (aki[0] == keyid[0] && aki[1] == keyid[1])
+                  {
+                    pk = k->pkt->pkt.public_key;
+                    break;
+                  }
+              }
+          }
+        if (!pk)
+          BUG ();
+        if (pk->expiredate && pk->expiredate <= make_timestamp ())
+          {
+            log_info (_("NOTE: secret key %s expired at %s\n"),
+                      keystr (keyid), asctimestamp (pk->expiredate));
+          }
+      }
 
+    if (pk && pk->is_revoked)
+      {
+        log_info (_("NOTE: key has been revoked"));
+        log_printf ("\n");
+        show_revocation_reason (pk, 1);
+      }
 
-  leave:
-    gcry_mpi_release (plain_dek);
-    xfree (frame);
-    return rc;
+    release_kbnode (pkb);
+    rc = 0;
+  }
+
+
+leave:
+  gcry_mpi_release (plain_dek);
+  xfree (frame);
+  return rc;
 }
 
 
-/****************
+/*
  * Get the session key from the given string.
  * String is supposed to be formatted as this:
  *  <algo-id>:<even-number-of-hex-digits>
  */
-int
-get_override_session_key( DEK *dek, const char *string )
+gpg_error_t
+get_override_session_key (DEK *dek, const char *string)
 {
-    const char *s;
-    int i;
+  const char *s;
+  int i;
 
-    if ( !string )
-	return G10ERR_BAD_KEY;
-    dek->algo = atoi(string);
-    if ( dek->algo < 1 )
-	return G10ERR_BAD_KEY;
-    if ( !(s = strchr ( string, ':' )) )
-	return G10ERR_BAD_KEY;
-    s++;
-    for(i=0; i < DIM(dek->key) && *s; i++, s +=2 ) {
-	int c = hextobyte ( s );
-	if (c == -1)
-	    return G10ERR_BAD_KEY;
-	dek->key[i] = c;
+  if (!string)
+    return G10ERR_BAD_KEY;
+  dek->algo = atoi (string);
+  if (dek->algo < 1)
+    return G10ERR_BAD_KEY;
+  if (!(s = strchr (string, ':')))
+    return G10ERR_BAD_KEY;
+  s++;
+  for (i = 0; i < DIM (dek->key) && *s; i++, s += 2)
+    {
+      int c = hextobyte (s);
+      if (c == -1)
+        return G10ERR_BAD_KEY;
+      dek->key[i] = c;
     }
-    if ( *s )
-	return G10ERR_BAD_KEY;
-    dek->keylen = i;
-    return 0;
+  if (*s)
+    return G10ERR_BAD_KEY;
+  dek->keylen = i;
+  return 0;
 }
-




More information about the Gnupg-commits mailing list