فهرست منبع

removing dead stuff

Christian Grothoff 17 سال پیش
والد
کامیت
2bdfce2c5a
43فایلهای تغییر یافته به همراه3 افزوده شده و 18967 حذف شده
  1. 0 19
      configure.ac
  2. 1 3
      src/daemon/Makefile.am
  3. 1 1
      src/daemon/daemon_test.c
  4. 1 6
      src/daemon/https/Makefile.am
  5. 0 186
      src/daemon/https/extra.h
  6. 0 14
      src/daemon/https/opencdk/Makefile.am
  7. 0 5
      src/daemon/https/opencdk/README
  8. 0 763
      src/daemon/https/opencdk/armor.c
  9. 0 528
      src/daemon/https/opencdk/cipher.c
  10. 0 238
      src/daemon/https/opencdk/compress.c
  11. 0 120
      src/daemon/https/opencdk/context.h
  12. 0 15
      src/daemon/https/opencdk/dummy.c
  13. 0 95
      src/daemon/https/opencdk/filters.h
  14. 0 581
      src/daemon/https/opencdk/kbnode.c
  15. 0 2303
      src/daemon/https/opencdk/keydb.c
  16. 0 307
      src/daemon/https/opencdk/literal.c
  17. 0 779
      src/daemon/https/opencdk/main.c
  18. 0 183
      src/daemon/https/opencdk/main.h
  19. 0 571
      src/daemon/https/opencdk/misc.c
  20. 0 874
      src/daemon/https/opencdk/new-packet.c
  21. 0 1169
      src/daemon/https/opencdk/opencdk.h
  22. 0 40
      src/daemon/https/opencdk/packet.h
  23. 0 1380
      src/daemon/https/opencdk/pubkey.c
  24. 0 1179
      src/daemon/https/opencdk/read-packet.c
  25. 0 717
      src/daemon/https/opencdk/seskey.c
  26. 0 489
      src/daemon/https/opencdk/sig-check.c
  27. 0 1446
      src/daemon/https/opencdk/stream.c
  28. 0 88
      src/daemon/https/opencdk/stream.h
  29. 0 44
      src/daemon/https/opencdk/types.h
  30. 0 306
      src/daemon/https/opencdk/verify.c
  31. 0 947
      src/daemon/https/opencdk/write-packet.c
  32. 0 28
      src/daemon/https/openpgp/Makefile.am
  33. 0 252
      src/daemon/https/openpgp/compat.c
  34. 0 170
      src/daemon/https/openpgp/extras.c
  35. 0 103
      src/daemon/https/openpgp/gnutls_extra.c
  36. 0 50
      src/daemon/https/openpgp/gnutls_extra.h
  37. 0 901
      src/daemon/https/openpgp/gnutls_ia.c
  38. 0 966
      src/daemon/https/openpgp/gnutls_openpgp.c
  39. 0 98
      src/daemon/https/openpgp/gnutls_openpgp.h
  40. 0 182
      src/daemon/https/openpgp/openpgp.h
  41. 0 543
      src/daemon/https/openpgp/pgp.c
  42. 0 134
      src/daemon/https/openpgp/pgp_privkey.c
  43. 0 144
      src/daemon/https/openpgp/pgp_verify.c

+ 0 - 19
configure.ac

@@ -218,24 +218,6 @@ AC_ARG_ENABLE([x509],
 AC_MSG_RESULT($enable_x509)
 
 
-# optional: OpenPGP support
-AC_MSG_CHECKING(--enable-OpenPGP argument)
-AC_ARG_ENABLE([OpenPGP],
-   [AS_HELP_STRING([--enable-OpenPGP],
-               [enable OpenPGP support (default is no)])],
-   [enable_openpgp=$enableval],
-   [enable_openpgp="no"])
-AC_MSG_RESULT($enable_openpgp)
-# currently we ignore this option.
-if test "$enable_openpgp" = "yes"
-then
- AC_DEFINE([ENABLE_OPENPGP],[0],[Include OpenGPG support])
-else
- AC_DEFINE([ENABLE_OPENPGP],[0],[Include OpenGPG support])
-fi
-AM_CONDITIONAL(ENABLE_OPENPGP, test "$enable_openpgp" = "yes")
-
-
 # Libgcrypt linkage : required for HTTPS support 
 AC_CHECK_HEADERS(gcrypt.h,gcrypt=true,gcrypt=false)
 AC_ARG_WITH(libgcrypt,
@@ -342,7 +324,6 @@ AC_MSG_NOTICE([Configured to build curl/libcurl:
   HTTPS support:     ${enable_HTTPS}	
   TLS support:       ${enable_TLS}
   SSLv3 support:     ${enable_SSL}
-  OpenGPG support:   ${enable_openpgp}
   x509 support:      ${enable_x509}
   libgcrypt:         ${MSG_GCRYPT}
   

+ 1 - 3
src/daemon/Makefile.am

@@ -42,9 +42,7 @@ libmicrohttpd_la_LIBADD = \
   https/lgl/liblgl.la \
   https/x509/libx509.la \
   https/tls/libtls.la \
-  https/minitasn1/libasn1.la \
-  https/opencdk/libopencdk.la \
-  https/openpgp/libopenpgp.la 
+  https/minitasn1/libasn1.la 
 endif
 
 

+ 1 - 1
src/daemon/daemon_test.c

@@ -24,7 +24,7 @@
  * @author Christian Grothoff
  */
 
-#include "config.h"
+#include "platform.h"
 #include "platform.h"
 #include "microhttpd.h"
 #include <stdlib.h>

+ 1 - 6
src/daemon/https/Makefile.am

@@ -1,6 +1 @@
-# placing '.' at the end of SUBDIRS having OPENPGP enabled mixes up build order !
-SUBDIRS = minitasn1 lgl x509 tls 
-
-if ENABLE_OPENPGP
-# SUBDIRS += opencdk openpgp
-endif
+SUBDIRS = minitasn1 lgl x509 tls .

+ 0 - 186
src/daemon/https/extra.h

@@ -1,186 +0,0 @@
-/*
- * Copyright (C) 2002, 2003, 2004, 2005, 2007 Free Software Foundation
- *
- * Author: Nikos Mavrogiannopoulos
- *
- * This file is part of GNUTLS-EXTRA.
- *
- * GNUTLS-EXTRA is free software; you can redistribute it and/or
- * modify it under the terms of the GNU General Public License as
- * published by the Free Software Foundation; either version 3 of the
- * License, or (at your option) any later version.
- *
- * GNUTLS-EXTRA is distributed in the hope that it will be useful, but
- * WITHOUT ANY WARRANTY; without even the implied warranty of
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
- * General Public License for more details.
- *
- * You should have received a copy of the GNU General Public License
- * along with GNUTLS-EXTRA; if not, write to the Free Software
- * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA
- * 02110-1301, USA.
- *
- */
-
-/* Note the libgnutls-extra is not a standalone library. It requires
- * to link also against libgnutls.
- */
-
-#ifndef GNUTLS_EXTRA_H
-#define GNUTLS_EXTRA_H
-
-#include "gnutls.h"
-
-#ifdef __cplusplus
-extern "C"
-{
-#endif
-
-#define LIBGNUTLS_EXTRA_VERSION LIBGNUTLS_VERSION
-
-/* Openpgp certificate stuff
- */
-
-  typedef enum gnutls_openpgp_crt_fmt
-  { GNUTLS_OPENPGP_FMT_RAW,
-    GNUTLS_OPENPGP_FMT_BASE64
-  } gnutls_openpgp_crt_fmt_t;
-
-/**
- * mhd_gtls_openpgp_recv_key_func - Callback prototype to get OpenPGP keys
- * @session: a TLS session
- * @keyfpr: key fingerprint
- * @keyfpr_length: length of key fingerprint
- * @key: output key.
- *
- * A callback of this type is used to retrieve OpenPGP keys.  Only
- * useful on the server, and will only be used if the peer send a key
- * fingerprint instead of a full key.  See also
- * gnutls_openpgp_set_recv_key_function().
- *
- */
-  typedef int (*mhd_gtls_openpgp_recv_key_func) (mhd_gtls_session_t session,
-                                                 const unsigned char *keyfpr,
-                                                 unsigned int keyfpr_length,
-                                                 gnutls_datum_t * key);
-
-  void gnutls_openpgp_set_recv_key_function (mhd_gtls_session_t session,
-                                             mhd_gtls_openpgp_recv_key_func
-                                             func);
-
-  int
-    gnutls_certificate_set_openpgp_key_file (mhd_gtls_cert_credentials_t
-                                             res, const char *CERTFILE,
-                                             const char *KEYFILE,
-                                             gnutls_openpgp_crt_fmt_t);
-  int gnutls_certificate_set_openpgp_key_mem (mhd_gtls_cert_credentials_t res,
-                                              const gnutls_datum_t * CERT,
-                                              const gnutls_datum_t * KEY,
-                                              gnutls_openpgp_crt_fmt_t);
-
-  int
-    gnutls_certificate_set_openpgp_keyring_mem
-    (mhd_gtls_cert_credentials_t c, const unsigned char *data,
-     size_t dlen, gnutls_openpgp_crt_fmt_t);
-
-  int
-    gnutls_certificate_set_openpgp_keyring_file
-    (mhd_gtls_cert_credentials_t c, const char *file,
-     gnutls_openpgp_crt_fmt_t);
-
-  /*
-   * TLS/IA stuff
-   */
-  typedef enum
-  {
-    GNUTLS_IA_APPLICATION_PAYLOAD = 0,
-    GNUTLS_IA_INTERMEDIATE_PHASE_FINISHED = 1,
-    GNUTLS_IA_FINAL_PHASE_FINISHED = 2
-  } gnutls_ia_apptype_t;
-
-  /*
-   * TLS/IA credential
-   */
-  typedef int (*gnutls_ia_avp_func) (mhd_gtls_session_t session, void *ptr,
-                                     const char *last, size_t lastlen,
-                                     char **next, size_t * nextlen);
-
-  typedef struct gnutls_ia_server_credentials_st
-    *gnutls_ia_server_credentials_t;
-  typedef struct gnutls_ia_client_credentials_st
-    *gnutls_ia_client_credentials_t;
-
-  /* Allocate and free TLS/IA credentials. */
-  extern void
-    gnutls_ia_free_client_credentials (gnutls_ia_client_credentials_t sc);
-  extern int
-    gnutls_ia_allocate_client_credentials (gnutls_ia_client_credentials_t *
-                                           sc);
-
-  extern void
-    gnutls_ia_free_server_credentials (gnutls_ia_server_credentials_t sc);
-  extern int
-    gnutls_ia_allocate_server_credentials (gnutls_ia_server_credentials_t *
-                                           sc);
-
-  /* Client TLS/IA credential functions. */
-  extern void
-    gnutls_ia_set_client_avp_function (gnutls_ia_client_credentials_t cred,
-                                       gnutls_ia_avp_func avp_func);
-  extern void
-    gnutls_ia_set_client_avp_ptr (gnutls_ia_client_credentials_t cred,
-                                  void *ptr);
-  extern void *gnutls_ia_get_client_avp_ptr (gnutls_ia_client_credentials_t
-                                             cred);
-
-  /* Server TLS/IA credential functions. */
-  extern void
-    gnutls_ia_set_server_avp_function (gnutls_ia_server_credentials_t cred,
-                                       gnutls_ia_avp_func avp_func);
-  extern void
-    gnutls_ia_set_server_avp_ptr (gnutls_ia_server_credentials_t cred,
-                                  void *ptr);
-  extern void *gnutls_ia_get_server_avp_ptr (gnutls_ia_server_credentials_t
-                                             cred);
-
-  /* TLS/IA handshake. */
-  extern int gnutls_ia_handshake_p (mhd_gtls_session_t session);
-
-  extern int gnutls_ia_handshake (mhd_gtls_session_t session);
-
-  /* TLS/IA low level interface. */
-  extern int
-    gnutls_ia_permute_inner_secret (mhd_gtls_session_t session,
-                                    size_t session_keys_size,
-                                    const char *session_keys);
-  extern int gnutls_ia_endphase_send (mhd_gtls_session_t session,
-                                      int final_p);
-
-  extern int gnutls_ia_verify_endphase (mhd_gtls_session_t session,
-                                        const char *checksum);
-
-  extern ssize_t gnutls_ia_send (mhd_gtls_session_t session,
-                                 const char *data, size_t sizeofdata);
-  extern ssize_t gnutls_ia_recv (mhd_gtls_session_t session,
-                                 char *data, size_t sizeofdata);
-
-  /* Utility stuff. */
-  extern int gnutls_ia_generate_challenge (mhd_gtls_session_t session,
-                                           size_t buffer_size, char *buffer);
-  extern void gnutls_ia_extract_inner_secret (mhd_gtls_session_t session,
-                                              char *buffer);
-
-  /* Define whether inner phases are wanted. */
-  extern void gnutls_ia_enable (mhd_gtls_session_t session,
-                                int allow_skip_on_resume);
-
-  int gnutls_global_init_extra (void);
-
-/* returns libgnutls-extra version (call it with a NULL argument)
- */
-  const char *gnutls_extra_check_version (const char *req_version);
-
-#ifdef __cplusplus
-}
-#endif
-#endif

+ 0 - 14
src/daemon/https/opencdk/Makefile.am

@@ -1,14 +0,0 @@
-AM_CPPFLAGS = \
--I$(top_srcdir)/src/include \
--I$(top_srcdir)/lib \
--I$(top_srcdir)/lgl \
--I$(GCRYPT_CPPFLAGS)
-
-noinst_LTLIBRARIES = libopencdk.la
-
-libopencdk_la_LDFLAGS = -lgcrypt 
-
-libopencdk_la_SOURCES = armor.c filters.h main.c seskey.c types.h	\
-	cipher.c kbnode.c main.h packet.h dummy.c sig-check.c verify.c	\
-	compress.c keydb.c misc.c pubkey.c stream.c write-packet.c	\
-	context.h literal.c new-packet.c read-packet.c stream.h opencdk.h

+ 0 - 5
src/daemon/https/opencdk/README

@@ -1,5 +0,0 @@
-This is a stripped down mirror of the files in OpenCDK
-src/. To avoid to link proc-packets.c, dummy.c is included.
-
-In Makefile.am libminiopencdk_la_SOURCES contains the list
-of all needed files.

+ 0 - 763
src/daemon/https/opencdk/armor.c

@@ -1,763 +0,0 @@
-/* armor.c - Armor filters
- *        Copyright (C) 2001, 2002, 2003, 2007 Timo Schulz
- *        Copyright (C) 1998, 1999, 2000, 2001 Free Software Foundation, Inc.
- *
- * This file is part of OpenCDK.
- *
- * OpenCDK is free software; you can redistribute it and/or modify 
- * it under the terms of the GNU General Public License as published by 
- * the Free Software Foundation; either version 2 of the License, or 
- * (at your option) any later version. 
- *  
- * OpenCDK is distributed in the hope that it will be useful, 
- * but WITHOUT ANY WARRANTY; without even the implied warranty of 
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the 
- * GNU General Public License for more details. 
- *
- * ChangeLog for basic BASE64 code (base64_encode, base64_decode):
- * Original author: Eric S. Raymond (Fetchmail)
- * Heavily modified by Brendan Cully <[email protected]> (Mutt)
- * Modify the code for generic use by Timo Schulz <[email protected]>
- */
-
-#ifdef HAVE_CONFIG_H
-# include <config.h>
-#endif
-#include <stdio.h>
-#include <string.h>
-#include <assert.h>
-#include <sys/stat.h>
-
-#include "opencdk.h"
-#include "main.h"
-#include "filters.h"
-
-#ifdef __MINGW32__
-# define LF "\r\n"
-#else
-# define LF "\n"
-#endif
-
-#define CRCINIT 0xB704CE
-
-#define BAD -1
-#define b64val(c) index64[(unsigned int)(c)]
-
-static u32 crc_table[] = {
-  0x000000, 0x864CFB, 0x8AD50D, 0x0C99F6, 0x93E6E1, 0x15AA1A, 0x1933EC,
-  0x9F7F17,
-  0xA18139, 0x27CDC2, 0x2B5434, 0xAD18CF, 0x3267D8, 0xB42B23, 0xB8B2D5,
-  0x3EFE2E,
-  0xC54E89, 0x430272, 0x4F9B84, 0xC9D77F, 0x56A868, 0xD0E493, 0xDC7D65,
-  0x5A319E,
-  0x64CFB0, 0xE2834B, 0xEE1ABD, 0x685646, 0xF72951, 0x7165AA, 0x7DFC5C,
-  0xFBB0A7,
-  0x0CD1E9, 0x8A9D12, 0x8604E4, 0x00481F, 0x9F3708, 0x197BF3, 0x15E205,
-  0x93AEFE,
-  0xAD50D0, 0x2B1C2B, 0x2785DD, 0xA1C926, 0x3EB631, 0xB8FACA, 0xB4633C,
-  0x322FC7,
-  0xC99F60, 0x4FD39B, 0x434A6D, 0xC50696, 0x5A7981, 0xDC357A, 0xD0AC8C,
-  0x56E077,
-  0x681E59, 0xEE52A2, 0xE2CB54, 0x6487AF, 0xFBF8B8, 0x7DB443, 0x712DB5,
-  0xF7614E,
-  0x19A3D2, 0x9FEF29, 0x9376DF, 0x153A24, 0x8A4533, 0x0C09C8, 0x00903E,
-  0x86DCC5,
-  0xB822EB, 0x3E6E10, 0x32F7E6, 0xB4BB1D, 0x2BC40A, 0xAD88F1, 0xA11107,
-  0x275DFC,
-  0xDCED5B, 0x5AA1A0, 0x563856, 0xD074AD, 0x4F0BBA, 0xC94741, 0xC5DEB7,
-  0x43924C,
-  0x7D6C62, 0xFB2099, 0xF7B96F, 0x71F594, 0xEE8A83, 0x68C678, 0x645F8E,
-  0xE21375,
-  0x15723B, 0x933EC0, 0x9FA736, 0x19EBCD, 0x8694DA, 0x00D821, 0x0C41D7,
-  0x8A0D2C,
-  0xB4F302, 0x32BFF9, 0x3E260F, 0xB86AF4, 0x2715E3, 0xA15918, 0xADC0EE,
-  0x2B8C15,
-  0xD03CB2, 0x567049, 0x5AE9BF, 0xDCA544, 0x43DA53, 0xC596A8, 0xC90F5E,
-  0x4F43A5,
-  0x71BD8B, 0xF7F170, 0xFB6886, 0x7D247D, 0xE25B6A, 0x641791, 0x688E67,
-  0xEEC29C,
-  0x3347A4, 0xB50B5F, 0xB992A9, 0x3FDE52, 0xA0A145, 0x26EDBE, 0x2A7448,
-  0xAC38B3,
-  0x92C69D, 0x148A66, 0x181390, 0x9E5F6B, 0x01207C, 0x876C87, 0x8BF571,
-  0x0DB98A,
-  0xF6092D, 0x7045D6, 0x7CDC20, 0xFA90DB, 0x65EFCC, 0xE3A337, 0xEF3AC1,
-  0x69763A,
-  0x578814, 0xD1C4EF, 0xDD5D19, 0x5B11E2, 0xC46EF5, 0x42220E, 0x4EBBF8,
-  0xC8F703,
-  0x3F964D, 0xB9DAB6, 0xB54340, 0x330FBB, 0xAC70AC, 0x2A3C57, 0x26A5A1,
-  0xA0E95A,
-  0x9E1774, 0x185B8F, 0x14C279, 0x928E82, 0x0DF195, 0x8BBD6E, 0x872498,
-  0x016863,
-  0xFAD8C4, 0x7C943F, 0x700DC9, 0xF64132, 0x693E25, 0xEF72DE, 0xE3EB28,
-  0x65A7D3,
-  0x5B59FD, 0xDD1506, 0xD18CF0, 0x57C00B, 0xC8BF1C, 0x4EF3E7, 0x426A11,
-  0xC426EA,
-  0x2AE476, 0xACA88D, 0xA0317B, 0x267D80, 0xB90297, 0x3F4E6C, 0x33D79A,
-  0xB59B61,
-  0x8B654F, 0x0D29B4, 0x01B042, 0x87FCB9, 0x1883AE, 0x9ECF55, 0x9256A3,
-  0x141A58,
-  0xEFAAFF, 0x69E604, 0x657FF2, 0xE33309, 0x7C4C1E, 0xFA00E5, 0xF69913,
-  0x70D5E8,
-  0x4E2BC6, 0xC8673D, 0xC4FECB, 0x42B230, 0xDDCD27, 0x5B81DC, 0x57182A,
-  0xD154D1,
-  0x26359F, 0xA07964, 0xACE092, 0x2AAC69, 0xB5D37E, 0x339F85, 0x3F0673,
-  0xB94A88,
-  0x87B4A6, 0x01F85D, 0x0D61AB, 0x8B2D50, 0x145247, 0x921EBC, 0x9E874A,
-  0x18CBB1,
-  0xE37B16, 0x6537ED, 0x69AE1B, 0xEFE2E0, 0x709DF7, 0xF6D10C, 0xFA48FA,
-  0x7C0401,
-  0x42FA2F, 0xC4B6D4, 0xC82F22, 0x4E63D9, 0xD11CCE, 0x575035, 0x5BC9C3,
-  0xDD8538
-};
-
-static const char *armor_begin[] = {
-  "BEGIN PGP MESSAGE",
-  "BEGIN PGP PUBLIC KEY BLOCK",
-  "BEGIN PGP PRIVATE KEY BLOCK",
-  "BEGIN PGP SIGNATURE",
-  NULL
-};
-
-static const char *armor_end[] = {
-  "END PGP MESSAGE",
-  "END PGP PUBLIC KEY BLOCK",
-  "END PGP PRIVATE KEY BLOCK",
-  "END PGP SIGNATURE",
-  NULL
-};
-
-static const char *valid_headers[] = {
-  "Comment",
-  "Version",
-  "MessageID",
-  "Hash",
-  "Charset",
-  NULL
-};
-
-static char b64chars[] =
-  "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/";
-
-static int index64[128] = {
-  -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1,
-  -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1,
-  -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, 62, -1, -1, -1, 63,
-  52, 53, 54, 55, 56, 57, 58, 59, 60, 61, -1, -1, -1, -1, -1, -1,
-  -1, 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14,
-  15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, -1, -1, -1, -1, -1,
-  -1, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40,
-  41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51, -1, -1, -1, -1, -1
-};
-
-
-/* encode a raw binary buffer to a null-terminated base64 strings */
-static int
-base64_encode (char *out, const byte * in, size_t len, size_t olen)
-{
-  if (!out || !in)
-    return CDK_Inv_Value;
-
-  while (len >= 3 && olen > 10)
-    {
-      *out++ = b64chars[in[0] >> 2];
-      *out++ = b64chars[((in[0] << 4) & 0x30) | (in[1] >> 4)];
-      *out++ = b64chars[((in[1] << 2) & 0x3c) | (in[2] >> 6)];
-      *out++ = b64chars[in[2] & 0x3f];
-      olen -= 4;
-      len -= 3;
-      in += 3;
-    }
-
-  /* clean up remainder */
-  if (len > 0 && olen > 4)
-    {
-      byte fragment = 0;
-      *out++ = b64chars[in[0] >> 2];
-      fragment = (in[0] << 4) & 0x30;
-      if (len > 1)
-        fragment |= in[1] >> 4;
-      *out++ = b64chars[fragment];
-      *out++ = (len < 2) ? '=' : b64chars[(in[1] << 2) & 0x3c];
-      *out++ = '=';
-    }
-  *out = '\0';
-  return 0;
-}
-
-
-/* Convert '\0'-terminated base64 string to raw byte buffer.
-   Returns length of returned buffer, or -1 on error. */
-static int
-base64_decode (byte * out, const char *in)
-{
-  size_t len;
-  byte digit1, digit2, digit3, digit4;
-
-  if (!out || !in)
-    return -1;
-
-  len = 0;
-  do
-    {
-      digit1 = in[0];
-      if (digit1 > 127 || b64val (digit1) == BAD)
-        return -1;
-      digit2 = in[1];
-      if (digit2 > 127 || b64val (digit2) == BAD)
-        return -1;
-      digit3 = in[2];
-      if (digit3 > 127 || ((digit3 != '=') && (b64val (digit3) == BAD)))
-        return -1;
-      digit4 = in[3];
-      if (digit4 > 127 || ((digit4 != '=') && (b64val (digit4) == BAD)))
-        return -1;
-      in += 4;
-
-      /* digits are already sanity-checked */
-      *out++ = (b64val (digit1) << 2) | (b64val (digit2) >> 4);
-      len++;
-      if (digit3 != '=')
-        {
-          *out++ = ((b64val (digit2) << 4) & 0xf0) | (b64val (digit3) >> 2);
-          len++;
-          if (digit4 != '=')
-            {
-              *out++ = ((b64val (digit3) << 6) & 0xc0) | b64val (digit4);
-              len++;
-            }
-        }
-    }
-  while (*in && digit4 != '=');
-
-  return len;
-}
-
-
-/* Return the compression algorithm in @r_zipalgo.
-   If the parameter is not set after execution,
-   the stream is not compressed. */
-static int
-compress_get_algo (cdk_stream_t inp, int *r_zipalgo)
-{
-  byte plain[512];
-  char buf[128];
-  int nread, pkttype;
-
-  *r_zipalgo = 0;
-  cdk_stream_seek (inp, 0);
-  while (!cdk_stream_eof (inp))
-    {
-      nread = _cdk_stream_gets (inp, buf, DIM (buf) - 1);
-      if (!nread || nread == -1)
-        break;
-      if (nread == 1 && !cdk_stream_eof (inp)
-          && (nread = _cdk_stream_gets (inp, buf, DIM (buf) - 1)) > 0)
-        {
-          base64_decode (plain, buf);
-          if (!(*plain & 0x80))
-            break;
-          pkttype = *plain & 0x40 ? (*plain & 0x3f) : ((*plain >> 2) & 0xf);
-          if (pkttype == CDK_PKT_COMPRESSED && r_zipalgo)
-            {
-              _cdk_log_debug ("armor compressed (algo=%d)\n", *(plain + 1));
-              *r_zipalgo = *(plain + 1);
-            }
-          break;
-        }
-    }
-  return 0;
-}
-
-
-static int
-check_armor (cdk_stream_t inp, int *r_zipalgo)
-{
-  char buf[4096];
-  size_t nread;
-  int check;
-
-  check = 0;
-  nread = cdk_stream_read (inp, buf, DIM (buf) - 1);
-  if (nread > 0)
-    {
-      buf[nread] = '\0';
-      if (strstr (buf, "-----BEGIN PGP"))
-        {
-          compress_get_algo (inp, r_zipalgo);
-          check = 1;
-        }
-      cdk_stream_seek (inp, 0);
-    }
-  return check;
-}
-
-
-static int
-is_armored (int ctb)
-{
-  int pkttype = 0;
-
-  if (!(ctb & 0x80))
-    return 1;                   /* invalid packet: assume it is armored */
-  pkttype = ctb & 0x40 ? (ctb & 0x3f) : ((ctb >> 2) & 0xf);
-  switch (pkttype)
-    {
-    case CDK_PKT_MARKER:
-    case CDK_PKT_SYMKEY_ENC:
-    case CDK_PKT_ONEPASS_SIG:
-    case CDK_PKT_PUBLIC_KEY:
-    case CDK_PKT_SECRET_KEY:
-    case CDK_PKT_PUBKEY_ENC:
-    case CDK_PKT_SIGNATURE:
-    case CDK_PKT_LITERAL:
-    case CDK_PKT_COMPRESSED:
-    case CDK_PKT_ENCRYPTED:
-      return 0;                 /* seems to be a regular packet: not armored */
-    }
-  return 1;
-}
-
-
-static u32
-update_crc (u32 crc, const byte * buf, size_t buflen)
-{
-  int j;
-
-  if (!crc)
-    crc = CRCINIT;
-
-  for (j = 0; j < buflen; j++)
-    crc = (crc << 8) ^ crc_table[0xff & ((crc >> 16) ^ buf[j])];
-  crc &= 0xffffff;
-  return crc;
-}
-
-
-static cdk_error_t
-armor_encode (void *opaque, FILE * in, FILE * out)
-{
-  armor_filter_t *afx = opaque;
-  struct stat statbuf;
-  char crcbuf[5], buf[128], raw[49];
-  byte crcbuf2[3];
-  size_t nread = 0;
-  const char *lf;
-
-  if (!afx)
-    return CDK_Inv_Value;
-  if (afx->idx < 0 || afx->idx > DIM (armor_begin) ||
-      afx->idx2 < 0 || afx->idx2 > DIM (armor_end))
-    return CDK_Inv_Value;
-
-  _cdk_log_debug ("armor filter: encode\n");
-
-  memset (crcbuf, 0, sizeof (crcbuf));
-
-  lf = afx->le ? afx->le : LF;
-  fprintf (out, "-----%s-----%s", armor_begin[afx->idx], lf);
-  fprintf (out, "Version: OpenPrivacy " PACKAGE_VERSION "%s", lf);
-  if (afx->hdrlines)
-    fwrite (afx->hdrlines, 1, strlen (afx->hdrlines), out);
-  fprintf (out, "%s", lf);
-
-  if (fstat (fileno (in), &statbuf))
-    return CDK_General_Error;
-
-  while (!feof (in))
-    {
-      nread = fread (raw, 1, DIM (raw) - 1, in);
-      if (!nread)
-        break;
-      if (ferror (in))
-        return CDK_File_Error;
-      afx->crc = update_crc (afx->crc, (byte *) raw, nread);
-      base64_encode (buf, (byte *) raw, nread, DIM (buf) - 1);
-      fprintf (out, "%s%s", buf, lf);
-    }
-
-  crcbuf2[0] = afx->crc >> 16;
-  crcbuf2[1] = afx->crc >> 8;
-  crcbuf2[2] = afx->crc;
-  crcbuf[0] = b64chars[crcbuf2[0] >> 2];
-  crcbuf[1] = b64chars[((crcbuf2[0] << 4) & 0x30) | (crcbuf2[1] >> 4)];
-  crcbuf[2] = b64chars[((crcbuf2[1] << 2) & 0x3c) | (crcbuf2[2] >> 6)];
-  crcbuf[3] = b64chars[crcbuf2[2] & 0x3f];
-  fprintf (out, "=%s%s", crcbuf, lf);
-  fprintf (out, "-----%s-----%s", armor_end[afx->idx2], lf);
-
-  return 0;
-}
-
-
-/**
- * cdk_armor_filter_use:
- * @inp: the stream to check
- *
- * Check if the stream contains armored data.
- **/
-int
-cdk_armor_filter_use (cdk_stream_t inp)
-{
-  int c, check;
-  int zipalgo;
-
-  zipalgo = 0;
-  c = cdk_stream_getc (inp);
-  if (c == EOF)
-    return 0;                   /* EOF, doesn't matter whether armored or not */
-  cdk_stream_seek (inp, 0);
-  check = is_armored (c);
-  if (check)
-    {
-      check = check_armor (inp, &zipalgo);
-      if (zipalgo)
-        _cdk_stream_set_compress_algo (inp, zipalgo);
-    }
-  return check;
-}
-
-
-static int
-search_header (const char *buf, const char **array)
-{
-  const char *s;
-  int i;
-
-  if (strlen (buf) < 5 || strncmp (buf, "-----", 5))
-    return -1;
-  for (i = 0; (s = array[i]); i++)
-    {
-      if (!strncmp (s, buf + 5, strlen (s)))
-        return i;
-    }
-  return -1;
-}
-
-
-const char *
-_cdk_armor_get_lineend (void)
-{
-  return LF;
-}
-
-
-static cdk_error_t
-armor_decode (void *opaque, FILE * in, FILE * out)
-{
-  armor_filter_t *afx = opaque;
-  const char *s;
-  char buf[127];
-  byte raw[128], crcbuf[4];
-  u32 crc2 = 0;
-  size_t nread = 0;
-  int i, pgp_data = 0;
-  cdk_error_t rc = 0;
-
-  if (!afx)
-    return CDK_Inv_Value;
-
-  _cdk_log_debug ("armor filter: decode\n");
-
-  fseek (in, 0, SEEK_SET);
-  /* Search the begin of the message */
-  while (!feof (in) && !pgp_data)
-    {
-      s = fgets (buf, DIM (buf) - 1, in);
-      if (!s)
-        break;
-      afx->idx = search_header (buf, armor_begin);
-      if (afx->idx >= 0)
-        pgp_data = 1;
-    }
-
-  if (feof (in) || !pgp_data)
-    return CDK_Armor_Error;     /* no data found */
-
-  /* Parse header until the empty line is reached */
-  while (!feof (in))
-    {
-      s = fgets (buf, DIM (buf) - 1, in);
-      if (!s)
-        return CDK_EOF;
-      if (strlen (s) == strlen (LF))
-        {
-          rc = 0;
-          break;                /* empty line */
-        }
-      /* From RFC2440: OpenPGP should consider improperly formatted Armor
-         Headers to be corruption of the ASCII Armor. A colon and a single
-         space separate the key and value. */
-      if (!strstr (buf, ": "))
-        return CDK_Armor_Error;
-      rc = CDK_General_Error;
-      for (i = 0; (s = valid_headers[i]); i++)
-        {
-          if (!strncmp (s, buf, strlen (s)))
-            rc = 0;
-        }
-      if (rc)
-        {
-          /* From RFC2440: Unknown keys should be reported to the user,
-             but OpenPGP should continue to process the message. */
-          _cdk_log_info ("unknown header: `%s'\n", buf);
-          rc = 0;
-        }
-    }
-
-  /* Read the data body */
-  while (!feof (in))
-    {
-      s = fgets (buf, DIM (buf) - 1, in);
-      if (!s)
-        break;
-      buf[strlen (buf) - strlen (LF)] = '\0';
-      if (buf[0] == '=' && strlen (s) == 5)
-        {                       /* CRC */
-          memset (crcbuf, 0, sizeof (crcbuf));
-          base64_decode (crcbuf, buf + 1);
-          crc2 = (crcbuf[0] << 16) | (crcbuf[1] << 8) | crcbuf[2];
-          break;                /* stop here */
-        }
-      else
-        {
-          nread = base64_decode (raw, buf);
-          if (nread == -1 || nread == 0)
-            break;
-          afx->crc = update_crc (afx->crc, raw, nread);
-          fwrite (raw, 1, nread, out);
-        }
-    }
-
-  /* Search the tail of the message */
-  s = fgets (buf, DIM (buf) - 1, in);
-  if (s)
-    {
-      buf[strlen (buf) - strlen (LF)] = '\0';
-      rc = CDK_General_Error;
-      afx->idx2 = search_header (buf, armor_end);
-      if (afx->idx2 >= 0)
-        rc = 0;
-    }
-
-  /* This catches error when no tail was found or the header is
-     different then the tail line. */
-  if (rc || afx->idx != afx->idx2)
-    rc = CDK_Armor_Error;
-
-  afx->crc_okay = (afx->crc == crc2) ? 1 : 0;
-  if (!afx->crc_okay && !rc)
-    {
-      _cdk_log_debug ("file crc=%08lX afx_crc=%08lX\n", crc2, afx->crc);
-      rc = CDK_Armor_CRC_Error;
-    }
-
-  return rc;
-}
-
-
-/**
- * cdk_file_armor:
- * @hd: Handle
- * @file: Name of the file to protect.
- * @output: Output filename.
- *
- * Protect a file with ASCII armor.
- **/
-cdk_error_t
-cdk_file_armor (cdk_ctx_t hd, const char *file, const char *output)
-{
-  cdk_stream_t inp, out;
-  cdk_error_t rc;
-
-  rc = _cdk_check_args (hd->opt.overwrite, file, output);
-  if (rc)
-    return rc;
-
-  rc = cdk_stream_open (file, &inp);
-  if (rc)
-    return rc;
-
-  rc = cdk_stream_new (output, &out);
-  if (rc)
-    {
-      cdk_stream_close (inp);
-      return rc;
-    }
-
-  cdk_stream_set_armor_flag (out, CDK_ARMOR_MESSAGE);
-  if (hd->opt.compress)
-    rc = cdk_stream_set_compress_flag (out, hd->compress.algo,
-                                       hd->compress.level);
-  if (!rc)
-    rc = cdk_stream_set_literal_flag (out, 0, file);
-  if (!rc)
-    rc = cdk_stream_kick_off (inp, out);
-  if (!rc)
-    rc = _cdk_stream_get_errno (out);
-
-  cdk_stream_close (out);
-  cdk_stream_close (inp);
-  return rc;
-}
-
-
-/**
- * cdk_file_dearmor:
- * @file: Name of the file to unprotect.
- * @output: Output filename.
- *
- * Remove ASCII armor from a file.
- **/
-cdk_error_t
-cdk_file_dearmor (const char *file, const char *output)
-{
-  cdk_stream_t inp, out;
-  cdk_error_t rc;
-  int zipalgo;
-
-  rc = _cdk_check_args (1, file, output);
-  if (rc)
-    return rc;
-
-  rc = cdk_stream_open (file, &inp);
-  if (rc)
-    return rc;
-
-  rc = cdk_stream_create (output, &out);
-  if (rc)
-    {
-      cdk_stream_close (inp);
-      return rc;
-    }
-
-  if (cdk_armor_filter_use (inp))
-    {
-      rc = cdk_stream_set_literal_flag (inp, 0, NULL);
-      zipalgo = cdk_stream_is_compressed (inp);
-      if (zipalgo)
-        rc = cdk_stream_set_compress_flag (inp, zipalgo, 0);
-      if (!rc)
-        rc = cdk_stream_set_armor_flag (inp, 0);
-      if (!rc)
-        rc = cdk_stream_kick_off (inp, out);
-      if (!rc)
-        rc = _cdk_stream_get_errno (inp);
-    }
-
-  cdk_stream_close (inp);
-  cdk_stream_close (out);
-  return rc;
-}
-
-
-int
-_cdk_filter_armor (void *opaque, int ctl, FILE * in, FILE * out)
-{
-  if (ctl == STREAMCTL_READ)
-    return armor_decode (opaque, in, out);
-  else if (ctl == STREAMCTL_WRITE)
-    return armor_encode (opaque, in, out);
-  else if (ctl == STREAMCTL_FREE)
-    {
-      armor_filter_t *afx = opaque;
-      if (afx)
-        {
-          _cdk_log_debug ("free armor filter\n");
-          afx->idx = afx->idx2 = 0;
-          afx->crc = afx->crc_okay = 0;
-          return 0;
-        }
-    }
-  return CDK_Inv_Mode;
-}
-
-
-/**
- * cdk_armor_encode_buffer:
- * @inbuf: the raw input buffer
- * @inlen: raw buffer len
- * @outbuf: the destination buffer for the base64 output
- * @outlen: destination buffer len
- * @nwritten: actual length of the base64 data
- * @type: the base64 file type.
- * 
- * Encode the given buffer into base64 format.
- **/
-cdk_error_t
-cdk_armor_encode_buffer (const byte * inbuf, size_t inlen,
-                         char *outbuf, size_t outlen,
-                         size_t * nwritten, int type)
-{
-  const char *head, *tail, *le;
-  byte tempbuf[48];
-  char tempout[128];
-  size_t pos, off, len, rest;
-
-  if (!inbuf || !nwritten)
-    return CDK_Inv_Value;
-  if (type > CDK_ARMOR_SIGNATURE)
-    return CDK_Inv_Mode;
-
-  head = armor_begin[type];
-  tail = armor_end[type];
-  le = _cdk_armor_get_lineend ();
-  pos = strlen (head) + 10 + 2 + 2 + strlen (tail) + 10 + 2 + 5 + 2;
-  /* The output data is 4/3 times larger, plus a line end for each line. */
-  pos += (4 * inlen / 3) + 2 * (4 * inlen / 3 / 64);
-
-  if (outbuf && outlen < pos)
-    return CDK_Too_Short;
-
-  /* Only return the size of the output. */
-  if (!outbuf)
-    {
-      *nwritten = pos;
-      return 0;
-    }
-
-  pos = 0;
-  memset (outbuf, 0, outlen);
-  memcpy (outbuf + pos, "-----", 5);
-  pos += 5;
-  memcpy (outbuf + pos, head, strlen (head));
-  pos += strlen (head);
-  memcpy (outbuf + pos, "-----", 5);
-  pos += 5;
-  memcpy (outbuf + pos, le, strlen (le));
-  pos += strlen (le);
-  memcpy (outbuf + pos, le, strlen (le));
-  pos += strlen (le);
-  rest = inlen;
-  for (off = 0; off < inlen;)
-    {
-      if (rest > 48)
-        {
-          memcpy (tempbuf, inbuf + off, 48);
-          off += 48;
-          len = 48;
-        }
-      else
-        {
-          memcpy (tempbuf, inbuf + off, rest);
-          off += rest;
-          len = rest;
-        }
-      rest -= len;
-      base64_encode (tempout, tempbuf, len, DIM (tempout) - 1);
-      memcpy (outbuf + pos, tempout, strlen (tempout));
-      pos += strlen (tempout);
-      memcpy (outbuf + pos, le, strlen (le));
-      pos += strlen (le);
-    }
-
-  memcpy (outbuf + pos, "-----", 5);
-  pos += 5;
-  memcpy (outbuf + pos, tail, strlen (tail));
-  pos += strlen (tail);
-  memcpy (outbuf + pos, "-----", 5);
-  pos += 5;
-  memcpy (outbuf + pos, le, strlen (le));
-  pos += strlen (le);
-  *nwritten = pos;
-  return 0;
-}

+ 0 - 528
src/daemon/https/opencdk/cipher.c

@@ -1,528 +0,0 @@
-/* cipher.c - Cipher filters
- *        Copyright (C) 2002, 2003, 2007 Timo Schulz
- *        Copyright (C) 1998, 1999, 2000, 2001 Free Software Foundation
- *
- * This file is part of OpenCDK.
- *
- * OpenCDK is free software; you can redistribute it and/or modify
- * it under the terms of the GNU General Public License as published by
- * the Free Software Foundation; either version 2 of the License, or
- * (at your option) any later version.
- *
- * OpenCDK is distributed in the hope that it will be useful,
- * but WITHOUT ANY WARRANTY; without even the implied warranty of
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
- * GNU General Public License for more details.
- */
-#ifdef HAVE_CONFIG_H
-# include <config.h>
-#endif
-#include <stdio.h>
-#include <assert.h>
-#include <sys/stat.h>
-
-#include "opencdk.h"
-#include "main.h"
-#include "filters.h"
-
-
-/* The maximal cipher block size in octets. */
-#define MAX_CIPHER_BLKSIZE 16
-
-
-static off_t
-fp_get_length (FILE * fp)
-{
-  struct stat statbuf;
-
-  if (fstat (fileno (fp), &statbuf))
-    return (off_t) - 1;
-  return statbuf.st_size;
-}
-
-
-static cdk_error_t
-hash_encode (void *opaque, FILE * in, FILE * out)
-{
-  md_filter_t *mfx = opaque;
-  byte buf[BUFSIZE];
-  gcry_error_t err;
-  int nread;
-
-  if (!mfx)
-    return CDK_Inv_Value;
-
-  _cdk_log_debug ("hash filter: encode algo=%d\n", mfx->digest_algo);
-
-  if (!mfx->md)
-    {
-      err = gcry_md_open (&mfx->md, mfx->digest_algo, 0);
-      if (err)
-        return map_gcry_error (err);
-    }
-
-  while (!feof (in))
-    {
-      nread = fread (buf, 1, BUFSIZE, in);
-      if (!nread)
-        break;
-      gcry_md_write (mfx->md, buf, nread);
-    }
-
-  wipemem (buf, sizeof (buf));
-  return 0;
-}
-
-
-cdk_error_t
-_cdk_filter_hash (void *opaque, int ctl, FILE * in, FILE * out)
-{
-  if (ctl == STREAMCTL_READ)
-    return hash_encode (opaque, in, out);
-  else if (ctl == STREAMCTL_FREE)
-    {
-      md_filter_t *mfx = opaque;
-      if (mfx)
-        {
-          _cdk_log_debug ("free hash filter\n");
-          gcry_md_close (mfx->md);
-          mfx->md = NULL;
-          return 0;
-        }
-    }
-  return CDK_Inv_Mode;
-}
-
-
-static cdk_error_t
-write_header (cipher_filter_t * cfx, FILE * out)
-{
-  cdk_pkt_encrypted_t ed;
-  cdk_packet_t pkt;
-  cdk_error_t rc;
-  cdk_dek_t dek = cfx->dek;
-  byte temp[MAX_CIPHER_BLKSIZE + 2];
-  size_t blocksize;
-  int use_mdc, nprefix;
-  gcry_error_t err;
-
-  blocksize = gcry_cipher_get_algo_blklen (dek->algo);
-  if (blocksize < 8 || blocksize > 16)
-    return CDK_Inv_Algo;
-
-  /* It might be possible the receiver does not understand the MDC
-     output and thus we offer to supress the MDC packet. */
-  use_mdc = dek->use_mdc;
-  if (blocksize == 8)
-    use_mdc = 0;
-
-  /* We need to increase the data length because the MDC packet will
-     be also included. It has a fixed length of 22 octets. */
-  if (use_mdc && cfx->datalen)
-    cfx->datalen += 22;
-
-  cdk_pkt_alloc (&pkt, CDK_PKT_ENCRYPTED_MDC);
-  ed = pkt->pkt.encrypted;
-  if (!cfx->blkmode.on)
-    {
-      ed->len = cfx->datalen;
-      ed->extralen = blocksize + 2;
-    }
-  else
-    cfx->blkmode.nleft = DEF_BLOCKSIZE;
-
-  if (use_mdc)
-    {
-      ed->mdc_method = GCRY_MD_SHA1;
-      err = gcry_md_open (&cfx->mdc, GCRY_MD_SHA1, 0);
-      if (err)
-        return map_gcry_error (err);
-    }
-
-  /* When we use partial bodies, the MDC feature or a blocksize
-     larger than 8, we force the use of the new packet format. */
-  if (cfx->blkmode.on || use_mdc || blocksize != 8)
-    pkt->old_ctb = 0;
-  else
-    pkt->old_ctb = 1;
-  pkt->pkttype = use_mdc ? CDK_PKT_ENCRYPTED_MDC : CDK_PKT_ENCRYPTED;
-  rc = _cdk_pkt_write_fp (out, pkt);
-  cdk_pkt_release (pkt);
-  if (rc)
-    return rc;
-
-  nprefix = blocksize;
-  gcry_randomize (temp, nprefix, GCRY_STRONG_RANDOM);
-  temp[nprefix] = temp[nprefix - 2];
-  temp[nprefix + 1] = temp[nprefix - 1];
-  err = gcry_cipher_open (&cfx->hd, dek->algo, GCRY_CIPHER_MODE_CFB,
-                          use_mdc ? 0 : GCRY_CIPHER_ENABLE_SYNC);
-  if (err)
-    return map_gcry_error (err);
-  err = gcry_cipher_setiv (cfx->hd, NULL, 0);
-  if (err)
-    return map_gcry_error (err);
-  err = gcry_cipher_setkey (cfx->hd, dek->key, dek->keylen);
-  if (err)
-    return map_gcry_error (err);
-  if (cfx->mdc)
-    gcry_md_write (cfx->mdc, temp, nprefix + 2);
-  gcry_cipher_encrypt (cfx->hd, temp, nprefix + 2, NULL, 0);
-  gcry_cipher_sync (cfx->hd);
-  fwrite (temp, 1, nprefix + 2, out);
-  if (cfx->blkmode.on)
-    {
-      cfx->blkmode.nleft -= (nprefix + 2);
-      if (use_mdc)
-        cfx->blkmode.nleft--;   /* 1 byte version */
-    }
-  return rc;
-}
-
-
-static cdk_error_t
-write_mdc_packet (FILE * out, cipher_filter_t * cfx)
-{
-  byte pktdata[22];
-  int dlen = gcry_md_get_algo_dlen (GCRY_MD_SHA1);
-
-  if (!out || !cfx)
-    return CDK_Inv_Value;
-  if (dlen != 20)
-    return CDK_Inv_Algo;
-
-  /* We must hash the prefix of the MDC packet here */
-  pktdata[0] = 0xD3;
-  pktdata[1] = 0x14;
-  gcry_md_write (cfx->mdc, pktdata, 2);
-  gcry_md_final (cfx->mdc);
-  memcpy (pktdata + 2, gcry_md_read (cfx->mdc, GCRY_MD_SHA1), dlen);
-  gcry_cipher_encrypt (cfx->hd, pktdata, dlen + 2, NULL, 0);
-  fwrite (pktdata, 1, dlen + 2, out);
-  wipemem (pktdata, sizeof (pktdata));
-  return 0;
-}
-
-
-static inline int
-num2bits (size_t n)
-{
-  size_t i;
-
-  for (i = 0; n > 1; i++)
-    n >>= 1;
-  return i;
-}
-
-
-static cdk_error_t
-write_partial_block (FILE * in, FILE * out, off_t * r_len,
-                     cipher_filter_t * cfx)
-{
-  gcry_error_t err;
-  byte buf[DEF_BLOCKSIZE];
-  size_t n;
-  int nread;
-
-  if (!out || !cfx)
-    return CDK_Inv_Value;
-
-  if (!cfx->blkmode.nleft && *r_len > 0)
-    {
-      if (*r_len > DEF_BLOCKSIZE)
-        {
-          /*_cdk_log_debug ("write_partial_block: size %lu block %d\n",
-			  *r_len, DEF_BLOCKSIZE);*/
-          fputc ((0xE0 | DEF_BLOCKBITS), out);
-          cfx->blkmode.nleft = DEF_BLOCKSIZE;
-          (*r_len) -= DEF_BLOCKSIZE;
-        }
-      else if (*r_len > 512)
-        {
-          n = num2bits (*r_len);
-          cfx->blkmode.nleft = (1 << n);
-          /*_cdk_log_debug ("write_partial_block: size %lu bits %d block %d\n",
-			  *r_len, n, (1<<n));*/
-          fputc ((0xE0 | n), out);
-          (*r_len) -= cfx->blkmode.nleft;
-        }
-      else
-        {
-          size_t pktlen = *r_len;
-
-          /* If we use the MDC mode, we need to increase the final
-             partial body length to hold the mdc packet itself. */
-          if (cfx->mdc)
-            pktlen += 22;
-
-          if (pktlen < 192)
-            fputc (pktlen, out);
-          else if (pktlen < 8384)
-            {
-              pktlen -= 192;
-              fputc ((pktlen / 256) + 192, out);
-              fputc ((pktlen % 256), out);
-            }
-          cfx->blkmode.nleft = pktlen;
-          /*_cdk_log_debug ("write_partial_block: end %d block\n", pktlen);*/
-          (*r_len) -= pktlen;
-        }
-    }
-  else
-    (*r_len) -= cfx->blkmode.nleft;
-
-  n = cfx->blkmode.nleft < DIM (buf) ? cfx->blkmode.nleft : DIM (buf);
-  nread = fread (buf, 1, n, in);
-  if (!nread)
-    return CDK_EOF;
-  if (cfx->mdc)
-    gcry_md_write (cfx->mdc, buf, nread);
-  err = gcry_cipher_encrypt (cfx->hd, buf, nread, NULL, 0);
-  if (err)
-    return map_gcry_error (err);
-  fwrite (buf, 1, nread, out);
-  cfx->blkmode.nleft -= nread;
-  return 0;
-}
-
-
-static cdk_error_t
-cipher_encode_file (void *opaque, FILE * in, FILE * out)
-{
-  cipher_filter_t *cfx = opaque;
-  byte buf[BUFSIZE];
-  off_t len, len2;
-  int nread;
-  cdk_error_t rc;
-
-  if (!cfx || !in || !out)
-    return CDK_Inv_Value;
-
-  len = len2 = fp_get_length (in);
-  if (len == (off_t) - 1)
-    return CDK_File_Error;
-  while (!feof (in))
-    {
-      if (cfx->blkmode.on)
-        {
-          rc = write_partial_block (in, out, &len2, cfx);
-          if (rc == CDK_EOF)
-            break;
-          if (rc)
-            {
-              wipemem (buf, sizeof (buf));
-              return rc;
-            }
-          continue;
-        }
-      nread = fread (buf, 1, DIM (buf), in);
-      if (!nread)
-        break;
-      if (cfx->mdc)
-        gcry_md_write (cfx->mdc, buf, nread);
-      gcry_cipher_encrypt (cfx->hd, buf, nread, NULL, 0);
-      fwrite (buf, 1, nread, out);
-    }
-  if (cfx->mdc)
-    rc = write_mdc_packet (out, cfx);
-  else
-    rc = 0;
-
-  wipemem (buf, sizeof (buf));
-  return rc;
-}
-
-
-static cdk_error_t
-read_header (cipher_filter_t * cfx, FILE * in)
-{
-  cdk_dek_t dek;
-  byte temp[32];
-  int blocksize, nprefix;
-  int i, c;
-  gcry_error_t err;
-
-  if (!cfx || !in)
-    return CDK_Inv_Value;
-
-  dek = cfx->dek;
-  blocksize = gcry_cipher_get_algo_blklen (dek->algo);
-  if (blocksize < 8 || blocksize > 16)
-    return CDK_Inv_Algo;
-
-  nprefix = blocksize;
-  if (cfx->datalen > 0 && cfx->datalen < (nprefix + 2))
-    return CDK_Inv_Value;
-  if (cfx->mdc_method)
-    {
-      err = gcry_md_open (&cfx->mdc, cfx->mdc_method, 0);
-      if (err)
-        return map_gcry_error (err);
-    }
-  err = gcry_cipher_open (&cfx->hd, dek->algo, GCRY_CIPHER_MODE_CFB,
-                          cfx->mdc_method ? 0 : GCRY_CIPHER_ENABLE_SYNC);
-  if (err)
-    return map_gcry_error (err);
-  err = gcry_cipher_setiv (cfx->hd, NULL, 0);
-  if (err)
-    return map_gcry_error (err);
-  err = gcry_cipher_setkey (cfx->hd, dek->key, dek->keylen);
-  if (err)
-    return map_gcry_error (err);
-
-  for (i = 0; i < (nprefix + 2); i++)
-    {
-      c = fgetc (in);
-      if (c == EOF)
-        return CDK_File_Error;
-      temp[i] = c;
-    }
-  gcry_cipher_decrypt (cfx->hd, temp, nprefix + 2, NULL, 0);
-  gcry_cipher_sync (cfx->hd);
-  i = nprefix;
-  if (temp[i - 2] != temp[i] || temp[i - 1] != temp[i + 1])
-    return CDK_Chksum_Error;
-  if (cfx->mdc)
-    gcry_md_write (cfx->mdc, temp, nprefix + 2);
-  if (cfx->blkmode.on)
-    cfx->blkmode.size -= (nprefix + 2);
-  return 0;
-}
-
-
-static cdk_error_t
-finalize_mdc (gcry_md_hd_t md, const byte * buf, size_t nread)
-{
-  byte mdcbuf[20];
-  int dlen = gcry_md_get_algo_dlen (GCRY_MD_SHA1);
-  cdk_error_t rc;
-
-  if (dlen != 20)
-    return CDK_Inv_Algo;
-
-  if (buf[nread - dlen - 2] == 0xD3 && buf[nread - dlen - 1] == 0x14)
-    {
-      gcry_md_write (md, buf, nread - dlen);
-      gcry_md_final (md);
-      memcpy (mdcbuf, gcry_md_read (md, GCRY_MD_SHA1), dlen);
-      if (memcmp (mdcbuf, buf + nread - dlen, dlen))
-        rc = CDK_Bad_MDC;
-      else
-        rc = CDK_Success;
-      wipemem (mdcbuf, sizeof (mdcbuf));
-      return rc;
-    }
-
-  return CDK_Inv_Packet;
-}
-
-
-static cdk_error_t
-cipher_decode_file (void *opaque, FILE * in, FILE * out)
-{
-  cipher_filter_t *cfx = opaque;
-  cdk_error_t rc;
-  byte buf[BUFSIZE];
-  int nread, nreq;
-
-  if (!cfx || !in || !out)
-    return CDK_Inv_Value;
-
-  while (!feof (in))
-    {
-      /*_cdk_log_debug ("partial on=%d size=%lu\n",
-		      cfx->blkmode.on, cfx->blkmode.size);*/
-      nreq = cfx->blkmode.on ? cfx->blkmode.size : DIM (buf);
-      nread = fread (buf, 1, nreq, in);
-      if (!nread)
-        break;
-      gcry_cipher_decrypt (cfx->hd, buf, nread, NULL, 0);
-      if (feof (in) && cfx->mdc)
-        {
-          rc = finalize_mdc (cfx->mdc, buf, nread);
-          if (rc)
-            {
-              wipemem (buf, sizeof (buf));
-              return rc;
-            }
-          /* We need to correct the size here to avoid the MDC
-             packet will be written to the output. */
-          nread -= 22;
-        }
-      else if (cfx->mdc)
-        gcry_md_write (cfx->mdc, buf, nread);
-      fwrite (buf, 1, nread, out);
-      if (cfx->blkmode.on)
-        {
-          cfx->blkmode.size = _cdk_pkt_read_len (in, &cfx->blkmode.on);
-          if (cfx->blkmode.size == (size_t) EOF)
-            return CDK_Inv_Packet;
-        }
-    }
-
-  wipemem (buf, sizeof (buf));
-  return 0;
-}
-
-
-static cdk_error_t
-cipher_decode (void *opaque, FILE * in, FILE * out)
-{
-  cipher_filter_t *cfx = opaque;
-  cdk_error_t rc;
-
-  _cdk_log_debug ("cipher filter: decode\n");
-
-  if (!cfx || !in || !out)
-    return CDK_Inv_Value;
-
-  rc = read_header (cfx, in);
-  if (!rc)
-    rc = cipher_decode_file (cfx, in, out);
-  return rc;
-}
-
-
-static cdk_error_t
-cipher_encode (void *opaque, FILE * in, FILE * out)
-{
-  cipher_filter_t *cfx = opaque;
-  cdk_error_t rc;
-
-  _cdk_log_debug ("cipher filter: encode\n");
-
-  if (!cfx || !in || !out)
-    return CDK_Inv_Value;
-
-  cfx->datalen = fp_get_length (in);
-  if (cfx->datalen < BUFSIZE && cfx->blkmode.on)
-    cfx->blkmode.on = 0;
-  rc = write_header (cfx, out);
-  if (!rc)
-    rc = cipher_encode_file (cfx, in, out);
-  return rc;
-}
-
-
-cdk_error_t
-_cdk_filter_cipher (void *opaque, int ctl, FILE * in, FILE * out)
-{
-  if (ctl == STREAMCTL_READ)
-    return cipher_decode (opaque, in, out);
-  else if (ctl == STREAMCTL_WRITE)
-    return cipher_encode (opaque, in, out);
-  else if (ctl == STREAMCTL_FREE)
-    {
-      cipher_filter_t *cfx = opaque;
-      if (cfx)
-        {
-          _cdk_log_debug ("free cipher filter\n");
-          gcry_md_close (cfx->mdc);
-          cfx->mdc = NULL;
-          gcry_cipher_close (cfx->hd);
-          cfx->hd = NULL;
-          return 0;
-        }
-    }
-  return CDK_Inv_Mode;
-}

+ 0 - 238
src/daemon/https/opencdk/compress.c

@@ -1,238 +0,0 @@
-/* compress.c - Compression filters
- *        Copyright (C) 2002, 2003 Timo Schulz
- *        Copyright (C) 1998, 1999, 2000, 2001, 2002 Free Software Foundation
- *
- * This file is part of OpenCDK.
- *
- * OpenCDK is free software; you can redistribute it and/or modify
- * it under the terms of the GNU General Public License as published by
- * the Free Software Foundation; either version 2 of the License, or
- * (at your option) any later version.
- *
- * OpenCDK is distributed in the hope that it will be useful,
- * but WITHOUT ANY WARRANTY; without even the implied warranty of
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
- * GNU General Public License for more details.
- */
-#ifdef HAVE_CONFIG_H
-# include <config.h>
-#endif
-#include <stdio.h>
-#include <time.h>
-#ifdef HAVE_LIBZ
-# include <zlib.h>
-#endif
-
-#include "opencdk.h"
-#include "main.h"
-#include "filters.h"
-
-#ifdef HAVE_LIBZ
-static int
-compress_data (z_stream * zs, int flush, byte * inbuf, size_t insize,
-               FILE * out)
-{
-  int nbytes, zrc;
-  byte buf[4096];
-
-  zs->next_in = inbuf;
-  zs->avail_in = insize;
-
-  do
-    {
-      zs->next_out = buf;
-      zs->avail_out = DIM (buf);
-
-      zrc = deflate (zs, flush);
-      if (zrc == Z_STREAM_END && flush == Z_FINISH)
-        ;
-      else if (zrc != Z_OK)
-        break;
-      nbytes = DIM (buf) - zs->avail_out;
-      fwrite (buf, 1, nbytes, out);
-    }
-  while (zs->avail_out == 0 || (flush == Z_FINISH && zrc != Z_STREAM_END));
-  return zrc;
-}
-
-
-static int
-decompress_data (compress_filter_t * zfx, z_stream * zs,
-                 FILE * in, size_t * ret_len)
-{
-  int nread, nold;
-  int rc, zrc;
-
-  rc = 0;
-  nread = 0;
-  while (zs->avail_out != 0)
-    {
-      if (!zs->avail_in)
-        {
-          nread = fread (zfx->inbuf, 1, zfx->inbufsize, in);
-          zs->next_in = zfx->inbuf;
-          zs->avail_in = nread;
-        }
-      nold = zs->avail_out;
-      zrc = inflate (zs, Z_SYNC_FLUSH);
-      if (zrc != Z_OK && zrc != Z_STREAM_END)
-        {
-          rc = CDK_Zlib_Error;
-          break;
-        }
-      *ret_len = zfx->outbufsize - zs->avail_out;
-      if (nold == zs->avail_out)
-        break;
-      if (zrc == Z_STREAM_END)
-        {
-          rc = EOF;             /* eof */
-          break;
-        }
-    }
-  if (!nread && feof (in))
-    rc = -1;
-  return rc;
-}
-
-
-static cdk_error_t
-compress_decode (void *opaque, FILE * in, FILE * out)
-{
-  compress_filter_t *zfx = opaque;
-  z_stream *zs;
-  size_t nbytes;
-  int zrc;
-  cdk_error_t rc = 0;
-
-  _cdk_log_debug ("compress filter: decode (algo=%d)\n", zfx->algo);
-
-  if (!zfx || !in || !out)
-    return CDK_Inv_Value;
-
-  zs = cdk_calloc (1, sizeof *zs);
-  if (!zs)
-    return CDK_Out_Of_Core;
-  if (zfx->algo == CDK_COMPRESS_ZIP)
-    zrc = inflateInit2 (zs, -13);
-  else
-    zrc = inflateInit (zs);
-  if (zrc != Z_OK)
-    return CDK_Zlib_Error;
-
-  zfx->outbufsize = 8192;
-  zfx->inbufsize = 2048;
-  memset (zfx->inbuf, 0, sizeof zfx->inbuf);
-  zs->avail_in = 0;
-
-  nbytes = 0;
-  while (rc != -1)
-    {
-      zs->next_out = zfx->outbuf;
-      zs->avail_out = 8192;
-      rc = decompress_data (zfx, zs, in, &nbytes);
-      fwrite (zfx->outbuf, 1, nbytes, out);
-    }
-  inflateEnd (zs);
-  cdk_free (zs);
-  if (rc == CDK_EOF)
-    rc = 0;
-  return rc;
-}
-
-
-static cdk_error_t
-compress_encode (void *opaque, FILE * in, FILE * out)
-{
-  compress_filter_t *zfx = opaque;
-  z_stream *zs;
-  struct cdk_pkt_compressed_s cd;
-  struct cdk_packet_s pkt;
-  int zrc, nread;
-  cdk_error_t rc;
-
-  _cdk_log_debug ("compress filter: encode\n");
-
-  if (!zfx || !in || !out)
-    return CDK_Inv_Value;
-
-  if (!zfx->algo)
-    zfx->algo = CDK_COMPRESS_ZIP;
-
-  memset (&cd, 0, sizeof (cd));
-  cd.len = 0;
-  cd.algorithm = zfx->algo;
-  pkt.pkttype = CDK_PKT_COMPRESSED;
-  pkt.pkt.compressed = &cd;
-  rc = _cdk_pkt_write_fp (out, &pkt);
-  if (rc)
-    return rc;
-
-  zs = cdk_calloc (1, sizeof *zs);
-  if (!zs)
-    return CDK_Out_Of_Core;
-  if (zfx->algo == CDK_COMPRESS_ZIP)
-    rc = deflateInit2 (zs, zfx->level, Z_DEFLATED, -13, 8,
-                       Z_DEFAULT_STRATEGY);
-  else
-    rc = deflateInit (zs, zfx->level);
-  if (rc != Z_OK)
-    {
-      cdk_free (zs);
-      return CDK_Zlib_Error;
-    }
-  zfx->outbufsize = 8192;
-  memset (zfx->outbuf, 0, sizeof zfx->outbuf);
-
-  while (!feof (in))
-    {
-      nread = fread (zfx->outbuf, 1, zfx->outbufsize, in);
-      if (!nread)
-        break;
-      zrc = compress_data (zs, Z_NO_FLUSH, zfx->outbuf, nread, out);
-      if (zrc)
-        {
-          rc = CDK_Zlib_Error;
-          break;
-        }
-    }
-  if (!rc)
-    {
-      nread = 0;
-      zrc = compress_data (zs, Z_FINISH, zfx->outbuf, nread, out);
-      if (zrc != Z_STREAM_END)
-        rc = CDK_Zlib_Error;
-    }
-  deflateEnd (zs);
-  cdk_free (zs);
-  return rc;
-}
-
-
-cdk_error_t
-_cdk_filter_compress (void *opaque, int ctl, FILE * in, FILE * out)
-{
-  if (ctl == STREAMCTL_READ)
-    return compress_decode (opaque, in, out);
-  else if (ctl == STREAMCTL_WRITE)
-    return compress_encode (opaque, in, out);
-  else if (ctl == STREAMCTL_FREE)
-    {
-      compress_filter_t *zfx = opaque;
-      if (zfx)
-        {
-          _cdk_log_debug ("free compress filter\n");
-          zfx->level = 0;
-          zfx->algo = 0;
-          return 0;
-        }
-    }
-  return CDK_Inv_Mode;
-}
-
-#else
-cdk_error_t
-_cdk_filter_compress (void *opaque, int ctl, FILE * in, FILE * out)
-{
-  return CDK_Not_Implemented;
-}
-#endif /* HAVE_LIBZ */

+ 0 - 120
src/daemon/https/opencdk/context.h

@@ -1,120 +0,0 @@
-/* context.h
- *       Copyright (C) 2002, 2003, 2007 Timo Schulz
- *
- * This file is part of OpenCDK.
- *
- * OpenCDK is free software; you can redistribute it and/or modify
- * it under the terms of the GNU General Public License as published by
- * the Free Software Foundation; either version 2 of the License, or
- * (at your option) any later version.
- *
- * OpenCDK is distributed in the hope that it will be useful,
- * but WITHOUT ANY WARRANTY; without even the implied warranty of
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
- * GNU General Public License for more details.
- */
-#ifndef CDK_CONTEXT_H
-#define CDK_CONTEXT_H
-
-#include "types.h"
-
-struct cdk_listkey_s {
-  unsigned init:1;
-  cdk_stream_t inp;
-  cdk_keydb_hd_t db;
-  int type;
-  union {
-    char *patt;
-    cdk_strlist_t fpatt;  
-  } u;
-  cdk_strlist_t t;   
-};
-
-
-struct cdk_s2k_s {
-  int mode;
-  byte hash_algo;
-  byte salt[8];
-  u32 count;
-};
-
-
-struct cdk_ctx_s {
-  int cipher_algo;
-  int digest_algo;
-  struct {
-    int algo;
-    int level;
-  } compress;
-  struct {
-    int mode;
-    int digest_algo;
-  } _s2k;
-  struct {
-    unsigned blockmode:1;
-    unsigned armor:1;
-    unsigned textmode:1;
-    unsigned compress:1;
-    unsigned mdc:1;
-    unsigned overwrite;
-    unsigned force_digest:1;
-  } opt;
-  struct {
-    cdk_verify_result_t verify;
-  } result;
-  struct {
-    cdk_pkt_seckey_t sk;
-    unsigned on:1;
-  } cache;
-  cdk_dek_t dek;
-  struct {
-    cdk_keydb_hd_t sec;
-    cdk_keydb_hd_t pub;
-    unsigned int close_db:1;
-  } db;
-  char *(*passphrase_cb) (void *opaque, const char *prompt);
-  void * passphrase_cb_value;
-};
-
-struct cdk_prefitem_s {
-  byte type;
-  byte value;
-};
-
-struct cdk_desig_revoker_s {
-  struct cdk_desig_revoker_s * next;
-  byte r_class;
-  byte algid;
-  byte fpr[KEY_FPR_LEN];
-};
-
-struct cdk_subpkt_s {
-  struct cdk_subpkt_s * next;
-  u32 size;
-  byte type;
-  byte d[1];  
-};
-
-struct cdk_keylist_s {
-  struct cdk_keylist_s * next;
-  union {
-    cdk_pkt_pubkey_t pk;
-    cdk_pkt_seckey_t sk;
-  } key;
-  int version;
-  int type;  
-};
-
-struct cdk_dek_s {
-  int algo;
-  int keylen;
-  int use_mdc;
-  byte key[32]; /* 256-bit */
-};
-
-struct cdk_strlist_s {
-  struct cdk_strlist_s * next;
-  char d[1]; 
-};
-
-#endif /* CDK_CONTEXT_H */

+ 0 - 15
src/daemon/https/opencdk/dummy.c

@@ -1,15 +0,0 @@
-#include <stdio.h>
-#include <string.h>
-
-#include "opencdk.h"
-#include "main.h"
-#include "filters.h"
-#include "packet.h"
-
-cdk_error_t
-_cdk_proc_packets (cdk_ctx_t hd, cdk_stream_t inp, cdk_stream_t data,
-                   const char *output, cdk_stream_t outstream,
-                   gcry_md_hd_t md)
-{
-  return 0;
-}

+ 0 - 95
src/daemon/https/opencdk/filters.h

@@ -1,95 +0,0 @@
-/* filters.h - Filter structs
- *        Copyright (C) 2002, 2003 Timo Schulz
- *
- * This file is part of OpenCDK.
- *
- * OpenCDK is free software; you can redistribute it and/or modify
- * it under the terms of the GNU General Public License as published by
- * the Free Software Foundation; either version 2 of the License, or
- * (at your option) any later version.
- *
- * OpenCDK is distributed in the hope that it will be useful,
- * but WITHOUT ANY WARRANTY; without even the implied warranty of
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
- * GNU General Public License for more details.
- */
-#ifndef CDK_FILTERS_H
-#define CDK_FILTERS_H
-
-enum {
-    STREAMCTL_READ  = 0,
-    STREAMCTL_WRITE = 1,
-    STREAMCTL_FREE  = 2
-};
-
-typedef struct {
-  gcry_cipher_hd_t hd;
-  gcry_md_hd_t mdc;
-  int mdc_method;
-  cdk_dek_t dek;
-  u32 datalen;
-  struct {
-    size_t on;
-    off_t size;
-    off_t nleft;
-  } blkmode;
-  cdk_stream_t s;
-} cipher_filter_t;
-
-typedef struct {
-  int digest_algo;
-  gcry_md_hd_t md;
-} md_filter_t;
-
-typedef struct {
-  const char *le; /* line endings */
-  const char *hdrlines;
-  u32 crc;
-  int crc_okay;
-  int idx, idx2;
-} armor_filter_t;
-
-typedef struct {
-  cdk_lit_format_t mode;
-  char *orig_filename; /* This original name of the input file. */
-  char *filename;
-  gcry_md_hd_t md;
-  struct {
-    size_t on;
-    off_t size;
-  } blkmode;
-} literal_filter_t;
-
-typedef struct {
-  size_t inbufsize;
-  byte inbuf[8192];
-  size_t outbufsize;
-  byte outbuf[8192];
-  int algo; /* compress algo */
-  int level;
-} compress_filter_t;
-
-typedef struct {
-    const char * lf;
-} text_filter_t;
-
-
-/*-- armor.c -*/
-int _cdk_filter_armor( void * opaque, int ctl, FILE * in, FILE * out );
-
-/*-- cipher.c --*/
-cdk_error_t _cdk_filter_hash( void * opaque, int ctl, FILE * in, FILE * out );
-cdk_error_t _cdk_filter_cipher( void * opaque, int ctl,
-                                FILE * in, FILE * out );
-
-/*-- literal.c --*/
-int _cdk_filter_literal( void * opaque, int ctl, FILE * in, FILE * out );
-int _cdk_filter_text( void * opaque, int ctl, FILE * in, FILE * out );
-
-/*-- compress.c --*/
-cdk_error_t _cdk_filter_compress( void * opaque, int ctl,
-                                  FILE * in, FILE * out );
-
-#endif /* CDK_FILTERS_H */
-
-        

+ 0 - 581
src/daemon/https/opencdk/kbnode.c

@@ -1,581 +0,0 @@
-/* kbnode.c -  keyblock node utility functions
- *        Copyright (C) 1998-2001 Free Software Foundation, Inc.
- *        Copyright (C) 2002, 2003, 2007 Timo Schulz
- *
- * This file is part of OpenCDK.
- *
- * OpenCDK is free software; you can redistribute it and/or modify
- * it under the terms of the GNU General Public License as published by
- * the Free Software Foundation; either version 2 of the License, or
- * (at your option) any later version.
- *
- * OpenCDK is distributed in the hope that it will be useful,
- * but WITHOUT ANY WARRANTY; without even the implied warranty of
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
- * GNU General Public License for more details.
- */
-#ifdef HAVE_CONFIG_H
-# include <config.h>
-#endif
-#include <stdio.h>
-#include <stdlib.h>
-#include <string.h>
-#include <assert.h>
-
-#include "opencdk.h"
-#include "main.h"
-#include "packet.h"
-
-
-/**
- * cdk_kbnode_new:
- * @pkt: the packet to add
- *
- * Allocate a new key node and add the packet.
- **/
-cdk_kbnode_t
-cdk_kbnode_new (cdk_packet_t pkt)
-{
-  cdk_kbnode_t n;
-
-  n = cdk_calloc (1, sizeof *n);
-  if (!n)
-    return NULL;
-  n->pkt = pkt;
-  return n;
-}
-
-
-void
-_cdk_kbnode_clone (cdk_kbnode_t node)
-{
-  /* Mark the node as clone which means that the packet
-     will not be freed, just the node itself. */
-  if (node)
-    node->is_cloned = 1;
-}
-
-
-/**
- * cdk_kbnode_release:
- * @n: the key node
- *
- * Release the memory of the node.
- **/
-void
-cdk_kbnode_release (cdk_kbnode_t node)
-{
-  cdk_kbnode_t n2;
-
-  while (node)
-    {
-      n2 = node->next;
-      if (!node->is_cloned)
-        cdk_pkt_release (node->pkt);
-      cdk_free (node);
-      node = n2;
-    }
-}
-
-
-/**
- * cdk_kbnode_delete:
- * @node: the key node
- *
- * Mark the given node as deleted.
- **/
-void
-cdk_kbnode_delete (cdk_kbnode_t node)
-{
-  if (node)
-    node->is_deleted = 1;
-}
-
-
-/* Append NODE to ROOT.  ROOT must exist! */
-void
-_cdk_kbnode_add (cdk_kbnode_t root, cdk_kbnode_t node)
-{
-  cdk_kbnode_t n1;
-
-  for (n1 = root; n1->next; n1 = n1->next)
-    ;
-  n1->next = node;
-}
-
-
-/**
- * cdk_kbnode_insert:
- * @root: the root key node
- * @node: the node to add
- * @pkttype: packet type
- *
- * Insert @node into the list after @root but before a packet which is not of
- * type @pkttype (only if @pkttype != 0).
- **/
-void
-cdk_kbnode_insert (cdk_kbnode_t root, cdk_kbnode_t node, int pkttype)
-{
-  if (!pkttype)
-    {
-      node->next = root->next;
-      root->next = node;
-    }
-  else
-    {
-      cdk_kbnode_t n1;
-
-      for (n1 = root; n1->next; n1 = n1->next)
-        if (pkttype != n1->next->pkt->pkttype)
-          {
-            node->next = n1->next;
-            n1->next = node;
-            return;
-          }
-      /* No such packet, append */
-      node->next = NULL;
-      n1->next = node;
-    }
-}
-
-
-/**
- * cdk_kbnode_find_prev:
- * @root: the root key node
- * @node: the key node
- * @pkttype: packet type
- *
- * Find the previous node (if @pkttype = 0) or the previous node
- * with pkttype @pkttype in the list starting with @root of @node.
- **/
-cdk_kbnode_t
-cdk_kbnode_find_prev (cdk_kbnode_t root, cdk_kbnode_t node, int pkttype)
-{
-  cdk_kbnode_t n1;
-
-  for (n1 = NULL; root && root != node; root = root->next)
-    {
-      if (!pkttype || root->pkt->pkttype == pkttype)
-        n1 = root;
-    }
-  return n1;
-}
-
-
-/**
- * cdk_kbnode_find_next:
- * @node: the key node
- * @pkttype: packet type
- *
- * Ditto, but find the next packet.  The behaviour is trivial if
- * @pkttype is 0 but if it is specified, the next node with a packet
- * of this type is returned.  The function has some knowledge about
- * the valid ordering of packets: e.g. if the next signature packet
- * is requested, the function will not return one if it encounters
- * a user-id.
- **/
-cdk_kbnode_t
-cdk_kbnode_find_next (cdk_kbnode_t node, int pkttype)
-{
-  for (node = node->next; node; node = node->next)
-    {
-      if (!pkttype)
-        return node;
-      else if (pkttype == CDK_PKT_USER_ID &&
-               (node->pkt->pkttype == CDK_PKT_PUBLIC_KEY ||
-                node->pkt->pkttype == CDK_PKT_SECRET_KEY))
-        return NULL;
-      else if (pkttype == CDK_PKT_SIGNATURE &&
-               (node->pkt->pkttype == CDK_PKT_USER_ID ||
-                node->pkt->pkttype == CDK_PKT_PUBLIC_KEY ||
-                node->pkt->pkttype == CDK_PKT_SECRET_KEY))
-        return NULL;
-      else if (node->pkt->pkttype == pkttype)
-        return node;
-    }
-  return NULL;
-}
-
-
-/**
- * cdk_kbnode_find:
- * @node: the key node
- * @pkttype: packet type
- *
- * Try to find the next node with the packettype @pkttype.
- **/
-cdk_kbnode_t
-cdk_kbnode_find (cdk_kbnode_t node, int pkttype)
-{
-  for (; node; node = node->next)
-    {
-      if (node->pkt->pkttype == pkttype)
-        return node;
-    }
-  return NULL;
-}
-
-
-/**
- * cdk_kbnode_find_packet:
- * @node: the key node
- * @pkttype: packet type
- *
- * Same as cdk_kbnode_find but it returns the packet instead of the node.
- **/
-cdk_packet_t
-cdk_kbnode_find_packet (cdk_kbnode_t node, int pkttype)
-{
-  cdk_kbnode_t res;
-
-  res = cdk_kbnode_find (node, pkttype);
-  return res ? res->pkt : NULL;
-}
-
-
-/****************
- * Walk through a list of kbnodes. This function returns
- * the next kbnode for each call; before using the function the first
- * time, the caller must set CONTEXT to NULL (This has simply the effect
- * to start with ROOT).
- */
-cdk_kbnode_t
-cdk_kbnode_walk (cdk_kbnode_t root, cdk_kbnode_t * context, int all)
-{
-  cdk_kbnode_t n;
-
-  do
-    {
-      if (!*context)
-        {
-          *context = root;
-          n = root;
-        }
-      else
-        {
-          n = (*context)->next;
-          *context = n;
-        }
-    }
-  while (!all && n && n->is_deleted);
-  return n;
-}
-
-
-/**
- * cdk_kbnode_commit:
- * @root: the nodes
- * 
- * Commit changes made to the kblist at ROOT. Note that ROOT my change,
- * and it is therefore passed by reference.
- * The function has the effect of removing all nodes marked as deleted.
- * returns true if any node has been changed 
- */
-int
-cdk_kbnode_commit (cdk_kbnode_t * root)
-{
-  cdk_kbnode_t n, nl;
-  int changed = 0;
-
-  for (n = *root, nl = NULL; n; n = nl->next)
-    {
-      if (n->is_deleted)
-        {
-          if (n == *root)
-            *root = nl = n->next;
-          else
-            nl->next = n->next;
-          if (!n->is_cloned)
-            cdk_pkt_release (n->pkt);
-          cdk_free (n);
-          changed = 1;
-        }
-      else
-        nl = n;
-    }
-  return changed;
-}
-
-
-/**
- * cdk_kbnode_remove:
- * @root: the root node
- * @node: the node to delete
- * 
- * Remove a node from the root node.
- */
-void
-cdk_kbnode_remove (cdk_kbnode_t * root, cdk_kbnode_t node)
-{
-  cdk_kbnode_t n, nl;
-
-  for (n = *root, nl = NULL; n; n = nl->next)
-    {
-      if (n == node)
-        {
-          if (n == *root)
-            *root = nl = n->next;
-          else
-            nl->next = n->next;
-          if (!n->is_cloned)
-            cdk_pkt_release (n->pkt);
-          cdk_free (n);
-        }
-      else
-        nl = n;
-    }
-}
-
-
-
-/**
- * cdk_cdknode_move:
- * @root: root node
- * @node: the node to move
- * @where: destination place where to move the node.
- * 
- * Move NODE behind right after WHERE or to the beginning if WHERE is NULL.
- */
-void
-cdk_kbnode_move (cdk_kbnode_t * root, cdk_kbnode_t node, cdk_kbnode_t where)
-{
-  cdk_kbnode_t tmp, prev;
-
-  if (!root || !*root || !node)
-    return;
-  for (prev = *root; prev && prev->next != node; prev = prev->next)
-    ;
-  if (!prev)
-    return;                     /* Node is not in the list */
-
-  if (!where)
-    {                           /* Move node before root */
-      if (node == *root)
-        return;
-      prev->next = node->next;
-      node->next = *root;
-      *root = node;
-      return;
-    }
-  if (node == where)            /* Move it after where. */
-    return;
-  tmp = node->next;
-  node->next = where->next;
-  where->next = node;
-  prev->next = tmp;
-}
-
-
-/**
- * cdk_kbnode_get_packet:
- * @node: the key node
- *
- * Return the packet which is stored inside the node in @node.
- **/
-cdk_packet_t
-cdk_kbnode_get_packet (cdk_kbnode_t node)
-{
-  if (node)
-    return node->pkt;
-  return NULL;
-}
-
-
-/**
- * cdk_kbnode_read_from_mem:
- * @ret_node: the new key node
- * @buf: the buffer which stores the key sequence
- * @buflen: the length of the buffer
- *
- * Try to read a key node from the memory buffer @buf.
- **/
-cdk_error_t
-cdk_kbnode_read_from_mem (cdk_kbnode_t * ret_node,
-                          const byte * buf, size_t buflen)
-{
-  cdk_stream_t inp;
-  cdk_error_t rc;
-
-  if (!buflen || !ret_node || !buf)
-    return CDK_Inv_Value;
-
-  *ret_node = NULL;
-  rc = cdk_stream_tmp_from_mem (buf, buflen, &inp);
-  if (rc)
-    return rc;
-  rc = cdk_keydb_get_keyblock (inp, ret_node);
-  cdk_stream_close (inp);
-  return rc;
-}
-
-/**
- * cdk_kbnode_write_to_mem_alloc:
- * @node: the key node
- * @r_buf: buffer to hold the raw data
- * @r_buflen: buffer length of the allocated raw data.
- * 
- * The function acts similar to cdk_kbnode_write_to_mem but
- * it allocates the buffer to avoid the lengthy second run.
- */
-cdk_error_t
-cdk_kbnode_write_to_mem_alloc (cdk_kbnode_t node,
-                               byte ** r_buf, size_t * r_buflen)
-{
-  cdk_kbnode_t n;
-  cdk_stream_t s;
-  cdk_error_t rc;
-  size_t len;
-
-  if (!node)
-    return CDK_Inv_Value;
-
-  *r_buf = NULL;
-  *r_buflen = 0;
-
-  rc = cdk_stream_tmp_new (&s);
-  if (rc)
-    return rc;
-
-  for (n = node; n; n = n->next)
-    {
-      /* Skip all packets which cannot occur in a key composition. */
-      if (n->pkt->pkttype != CDK_PKT_PUBLIC_KEY &&
-          n->pkt->pkttype != CDK_PKT_PUBLIC_SUBKEY &&
-          n->pkt->pkttype != CDK_PKT_SECRET_KEY &&
-          n->pkt->pkttype != CDK_PKT_SECRET_SUBKEY &&
-          n->pkt->pkttype != CDK_PKT_SIGNATURE &&
-          n->pkt->pkttype != CDK_PKT_USER_ID &&
-          n->pkt->pkttype != CDK_PKT_ATTRIBUTE)
-        continue;
-      rc = cdk_pkt_write (s, n->pkt);
-      if (rc)
-        {
-          cdk_stream_close (s);
-          return rc;
-        }
-    }
-
-  cdk_stream_seek (s, 0);
-  len = cdk_stream_get_length (s);
-  *r_buf = cdk_calloc (1, len);
-  *r_buflen = cdk_stream_read (s, *r_buf, len);
-  cdk_stream_close (s);
-  return 0;
-}
-
-
-/**
- * cdk_kbnode_write_to_mem:
- * @node: the key node
- * @buf: the buffer to store the node data
- * @r_nbytes: the new length of the buffer.
- *
- * Try to write the contents of the key node to the buffer @buf and
- * return the length of it in @r_nbytes. If buf is zero, only the
- * length of the node is calculated and returned in @r_nbytes.
- * Whenever it is possible, the cdk_kbnode_write_to_mem_alloc should be used.
- **/
-cdk_error_t
-cdk_kbnode_write_to_mem (cdk_kbnode_t node, byte * buf, size_t * r_nbytes)
-{
-  cdk_kbnode_t n;
-  cdk_stream_t s;
-  size_t len;
-  cdk_error_t rc;
-
-  if (!node)
-    return CDK_Inv_Value;
-
-  rc = cdk_stream_tmp_new (&s);
-  if (rc)
-    return rc;
-
-  for (n = node; n; n = n->next)
-    {
-      /* Skip all packets which cannot occur in a key composition. */
-      if (n->pkt->pkttype != CDK_PKT_PUBLIC_KEY &&
-          n->pkt->pkttype != CDK_PKT_PUBLIC_SUBKEY &&
-          n->pkt->pkttype != CDK_PKT_SECRET_KEY &&
-          n->pkt->pkttype != CDK_PKT_SECRET_SUBKEY &&
-          n->pkt->pkttype != CDK_PKT_SIGNATURE &&
-          n->pkt->pkttype != CDK_PKT_USER_ID &&
-          n->pkt->pkttype != CDK_PKT_ATTRIBUTE)
-        continue;
-      rc = cdk_pkt_write (s, n->pkt);
-      if (rc)
-        {
-          cdk_stream_close (s);
-          return rc;
-        }
-    }
-
-  cdk_stream_seek (s, 0);
-  len = cdk_stream_get_length (s);
-  if (!buf)
-    {
-      *r_nbytes = len;          /* Only return the length of the buffer */
-      cdk_stream_close (s);
-      return 0;
-    }
-  if (*r_nbytes < len)
-    rc = CDK_Too_Short;
-  if (!rc)
-    *r_nbytes = cdk_stream_read (s, buf, len);
-  cdk_stream_close (s);
-  return rc;
-}
-
-
-/**
- * cdk_kbnode_hash:
- * @node: the key node
- * @hashctx: opaque pointer to the hash context
- * @is_v4: OpenPGP signature (yes=1, no=0)
- * @pkttype: packet type to hash (if zero use the packet type from the node)
- * @flags: flags which depend on the operation
- *
- * Hash the key node contents. Two modes are supported. If the packet
- * type is used (!= 0) then the function searches the first node with
- * this type. Otherwise the node is seen as a single node and the type
- * is extracted from it.
- **/
-cdk_error_t
-cdk_kbnode_hash (cdk_kbnode_t node, gcry_md_hd_t md, int is_v4,
-                 int pkttype, int flags)
-{
-  cdk_packet_t pkt;
-
-  if (!node || !md)
-    return CDK_Inv_Value;
-  if (!pkttype)
-    {
-      pkt = cdk_kbnode_get_packet (node);
-      pkttype = pkt->pkttype;
-    }
-  else
-    {
-      pkt = cdk_kbnode_find_packet (node, pkttype);
-      if (!pkt)
-        return CDK_Inv_Packet;
-    }
-
-  switch (pkttype)
-    {
-    case CDK_PKT_PUBLIC_KEY:
-    case CDK_PKT_PUBLIC_SUBKEY:
-      _cdk_hash_pubkey (pkt->pkt.public_key, md, flags & 1);
-      break;
-
-    case CDK_PKT_USER_ID:
-      _cdk_hash_userid (pkt->pkt.user_id, is_v4, md);
-      break;
-
-    case CDK_PKT_SIGNATURE:
-      _cdk_hash_sig_data (pkt->pkt.signature, md);
-      break;
-
-    default:
-      return CDK_Inv_Mode;
-    }
-  return 0;
-}

+ 0 - 2303
src/daemon/https/opencdk/keydb.c

@@ -1,2303 +0,0 @@
-/* keydb.c - Key database routines
- *        Copyright (C) 2002, 2003, 2007 Timo Schulz
- *
- * This file is part of OpenCDK.
- *
- * OpenCDK is free software; you can redistribute it and/or modify
- * it under the terms of the GNU General Public License as published by
- * the Free Software Foundation; either version 2 of the License, or
- * (at your option) any later version.
- *
- * OpenCDK is distributed in the hope that it will be useful,
- * but WITHOUT ANY WARRANTY; without even the implied warranty of
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
- * GNU General Public License for more details.
- */
-#ifdef HAVE_CONFIG_H
-# include <config.h>
-#endif
-#include <sys/stat.h>
-#include <stdio.h>
-#include <stdlib.h>
-#include <string.h>
-#include <time.h>
-#include <ctype.h>
-
-#include "opencdk.h"
-#include "main.h"
-#include "packet.h"
-#include "filters.h"
-#include "stream.h"
-
-
-#define KEYID_CMP(a, b) ((a[0]) == (b[0]) && (a[1]) == (b[1]))
-#define KEYDB_CACHE_ENTRIES 8
-
-
-/* Internal key index structure. */
-struct key_idx_s
-{
-  off_t offset;
-  u32 keyid[2];
-  byte fpr[KEY_FPR_LEN];
-};
-typedef struct key_idx_s *key_idx_t;
-
-
-/* Internal handle for the search operation. */
-struct cdk_dbsearch_s
-{
-  union
-  {
-    char *pattern;              /* A search is performed by pattern. */
-    u32 keyid[2];               /* A search by keyid. */
-    byte fpr[KEY_FPR_LEN];      /* A search by fingerprint. */
-  } u;
-  int type;
-};
-typedef struct cdk_dbsearch_s *cdk_dbsearch_t;
-
-/* Internal key cache to associate a key with an file offset. */
-struct key_table_s
-{
-  struct key_table_s *next;
-  off_t offset;
-  cdk_dbsearch_t desc;
-};
-typedef struct key_table_s *key_table_t;
-
-/* Internal key database handle. */
-struct cdk_keydb_hd_s
-{
-  int type;                     /* type of the key db handle. */
-  int fp_ref;                   /* 1=means it is a reference and shall not be closed. */
-  cdk_stream_t fp;
-  cdk_stream_t idx;
-  cdk_dbsearch_t dbs;
-  char *name;                   /* name of the underlying file or NULL. */
-  char *idx_name;               /* name of the index file or NULL. */
-  struct key_table_s *cache;
-  size_t ncache;
-  unsigned int secret:1;        /* contain secret keys. */
-  unsigned int isopen:1;        /* the underlying stream is opened. */
-  unsigned int no_cache:1;      /* disable the index cache. */
-  unsigned int search:1;        /* handle is in search mode. */
-
-  /* structure to store some stats about the keydb. */
-  struct
-  {
-    size_t new_keys;            /* amount of new keys that were imported. */
-  } stats;
-};
-
-
-static void keydb_cache_free (key_table_t cache);
-static int keydb_search_copy (cdk_dbsearch_t * r_dst, cdk_dbsearch_t src);
-static void keydb_search_free (cdk_dbsearch_t dbs);
-static int classify_data (const byte * buf, size_t len);
-static cdk_kbnode_t find_selfsig_node (cdk_kbnode_t key, cdk_pkt_pubkey_t pk);
-
-
-static char *
-keydb_idx_mkname (const char *file)
-{
-  char *fname, *fmt;
-
-  fmt = "%s.idx";
-  fname = cdk_calloc (1, strlen (file) + strlen (fmt) + 1);
-  if (!fname)
-    return NULL;
-  sprintf (fname, fmt, file);
-  return fname;
-}
-
-
-/* This functions builds an index of the keyring into a separate file
-   with the name keyring.ext.idx. It contains the offset of all public-
-   and public subkeys. The format of the file is:
-   --------
-    4 octets offset of the packet
-    8 octets keyid
-   20 octets fingerprint
-   --------
-   We store the keyid and the fingerprint due to the fact we can't get
-   the keyid from a v3 fingerprint directly.
-*/
-static cdk_error_t
-keydb_idx_build (const char *file)
-{
-  cdk_packet_t pkt;
-  cdk_stream_t inp, out = NULL;
-  byte buf[4 + 8 + KEY_FPR_LEN];
-  char *idx_name;
-  u32 keyid[2];
-  cdk_error_t rc;
-
-  if (!file)
-    return CDK_Inv_Value;
-
-  rc = cdk_stream_open (file, &inp);
-  if (rc)
-    return rc;
-
-  idx_name = keydb_idx_mkname (file);
-  if (!idx_name)
-    {
-      cdk_stream_close (inp);
-      return CDK_Out_Of_Core;
-    }
-  rc = cdk_stream_create (idx_name, &out);
-  cdk_free (idx_name);
-  if (rc)
-    {
-      cdk_stream_close (inp);
-      return rc;
-    }
-
-  cdk_pkt_new (&pkt);
-  while (!cdk_stream_eof (inp))
-    {
-      off_t pos = cdk_stream_tell (inp);
-
-      rc = cdk_pkt_read (inp, pkt);
-      if (rc)
-        {
-          _cdk_log_debug ("index build failed packet off=%lu\n", pos);
-          /* FIXME: The index is incomplete */
-          break;
-        }
-      if (pkt->pkttype == CDK_PKT_PUBLIC_KEY ||
-          pkt->pkttype == CDK_PKT_PUBLIC_SUBKEY)
-        {
-          _cdk_u32tobuf (pos, buf);
-          cdk_pk_get_keyid (pkt->pkt.public_key, keyid);
-          _cdk_u32tobuf (keyid[0], buf + 4);
-          _cdk_u32tobuf (keyid[1], buf + 8);
-          cdk_pk_get_fingerprint (pkt->pkt.public_key, buf + 12);
-          cdk_stream_write (out, buf, 4 + 8 + KEY_FPR_LEN);
-        }
-      cdk_pkt_free (pkt);
-    }
-
-  cdk_pkt_release (pkt);
-
-  cdk_stream_close (out);
-  cdk_stream_close (inp);
-  return rc;
-}
-
-
-/**
- * cdk_keydb_idx_rebuild:
- * @hd: key database handle
- *
- * Rebuild the key index files for the given key database.
- **/
-cdk_error_t
-cdk_keydb_idx_rebuild (cdk_keydb_hd_t db)
-{
-  struct stat stbuf;
-  char *tmp_idx_name;
-  cdk_error_t rc;
-  int err;
-
-  if (!db || !db->name)
-    return CDK_Inv_Value;
-  if (db->secret)
-    return 0;
-
-  tmp_idx_name = keydb_idx_mkname (db->name);
-  if (!tmp_idx_name)
-    return CDK_Out_Of_Core;
-  err = stat (tmp_idx_name, &stbuf);
-  cdk_free (tmp_idx_name);
-  /* This function expects an existing index which can be rebuild,
-     if no index exists we do not build one and just return. */
-  if (err)
-    return 0;
-
-  cdk_stream_close (db->idx);
-  db->idx = NULL;
-  if (!db->idx_name)
-    {
-      db->idx_name = keydb_idx_mkname (db->name);
-      if (!db->idx_name)
-        return CDK_Out_Of_Core;
-    }
-  rc = keydb_idx_build (db->name);
-  if (!rc)
-    rc = cdk_stream_open (db->idx_name, &db->idx);
-  return rc;
-}
-
-
-static cdk_error_t
-keydb_idx_parse (cdk_stream_t inp, key_idx_t * r_idx)
-{
-  key_idx_t idx;
-  byte buf[4];
-
-  if (!inp || !r_idx)
-    return CDK_Inv_Value;
-
-  idx = cdk_calloc (1, sizeof *idx);
-  if (!idx)
-    return CDK_Out_Of_Core;
-
-  while (!cdk_stream_eof (inp))
-    {
-      if (cdk_stream_read (inp, buf, 4) == CDK_EOF)
-        break;
-      idx->offset = _cdk_buftou32 (buf);
-      cdk_stream_read (inp, buf, 4);
-      idx->keyid[0] = _cdk_buftou32 (buf);
-      cdk_stream_read (inp, buf, 4);
-      idx->keyid[1] = _cdk_buftou32 (buf);
-      cdk_stream_read (inp, idx->fpr, KEY_FPR_LEN);
-      break;
-    }
-  *r_idx = idx;
-  return cdk_stream_eof (inp) ? CDK_EOF : 0;
-}
-
-
-static cdk_error_t
-keydb_idx_search (cdk_stream_t inp, u32 * keyid, const byte * fpr,
-                  off_t * r_off)
-{
-  key_idx_t idx;
-
-  if (!inp || !r_off)
-    return CDK_Inv_Value;
-  if ((keyid && fpr) || (!keyid && !fpr))
-    return CDK_Inv_Mode;
-
-  /* We need an initialize the offset var with a value
-     because it might be possible the returned offset will
-     be 0 and then we cannot differ between the begin and an EOF. */
-  *r_off = 0xFFFFFFFF;
-  cdk_stream_seek (inp, 0);
-  while (keydb_idx_parse (inp, &idx) != CDK_EOF)
-    {
-      if (keyid && KEYID_CMP (keyid, idx->keyid))
-        {
-          *r_off = idx->offset;
-          break;
-        }
-      else if (fpr && !memcmp (idx->fpr, fpr, KEY_FPR_LEN))
-        {
-          *r_off = idx->offset;
-          break;
-        }
-      cdk_free (idx);
-      idx = NULL;
-    }
-  cdk_free (idx);
-  return *r_off != 0xFFFFFFFF ? 0 : CDK_EOF;
-}
-
-
-/**
- * cdk_keydb_new_from_mem:
- * @r_hd: The keydb output handle.
- * @data: The raw key data.
- * @datlen: The length of the raw data.
- * 
- * Create a new keyring db handle from the contents of a buffer.
- */
-cdk_error_t
-cdk_keydb_new_from_mem (cdk_keydb_hd_t * r_db, int secret,
-                        const void *data, size_t datlen)
-{
-  cdk_keydb_hd_t db;
-  cdk_error_t rc;
-
-  if (!r_db)
-    return CDK_Inv_Value;
-  *r_db = NULL;
-  db = calloc (1, sizeof *db);
-  rc = cdk_stream_tmp_from_mem (data, datlen, &db->fp);
-  if (!db->fp)
-    {
-      cdk_free (db);
-      return rc;
-    }
-  if (cdk_armor_filter_use (db->fp))
-    cdk_stream_set_armor_flag (db->fp, 0);
-  db->type = CDK_DBTYPE_DATA;
-  db->secret = secret;
-  *r_db = db;
-  return 0;
-}
-
-
-/**
- * cdk_keydb_new_from_stream:
- * @r_hd: the output keydb handle
- * @secret: does the stream contain secret key data
- * @in: the input stream to use
- * 
- * This function creates a new keydb handle based on the given
- * stream. The stream is not closed in cdk_keydb_free() and it
- * is up to the caller to close it. No decoding is done.
- */
-cdk_error_t
-cdk_keydb_new_from_stream (cdk_keydb_hd_t * r_hd, int secret, cdk_stream_t in)
-{
-  cdk_keydb_hd_t hd;
-
-  if (!r_hd)
-    return CDK_Inv_Value;
-  *r_hd = NULL;
-
-  hd = calloc (1, sizeof *hd);
-  hd->fp = in;
-  hd->fp_ref = 1;
-  hd->type = CDK_DBTYPE_STREAM;
-  hd->secret = secret;
-  *r_hd = hd;
-
-  /* We do not push any filters and thus we expect that the format
-     of the stream has the format the user wanted. */
-
-  return 0;
-}
-
-
-cdk_error_t
-cdk_keydb_new_from_file (cdk_keydb_hd_t * r_hd, int secret, const char *fname)
-{
-  cdk_keydb_hd_t hd;
-
-  if (!r_hd)
-    return CDK_Inv_Value;
-  *r_hd = NULL;
-  hd = calloc (1, sizeof *hd);
-  hd->name = cdk_strdup (fname);
-  if (!hd->name)
-    {
-      cdk_free (hd);
-      return CDK_Out_Of_Core;
-    }
-  hd->type = secret ? CDK_DBTYPE_SK_KEYRING : CDK_DBTYPE_PK_KEYRING;
-  hd->secret = secret;
-  *r_hd = hd;
-  return 0;
-}
-
-
-
-/**
- * cdk_keydb_new:
- * @r_hd: handle to store the new keydb object
- * @type: type of the keyring
- * @data: data which depends on the keyring type
- * @count: length of the data
- *
- * Create a new keydb object
- **/
-cdk_error_t
-cdk_keydb_new (cdk_keydb_hd_t * r_hd, int type, void *data, size_t count)
-{
-  switch (type)
-    {
-    case CDK_DBTYPE_PK_KEYRING:
-    case CDK_DBTYPE_SK_KEYRING:
-      return cdk_keydb_new_from_file (r_hd, type == CDK_DBTYPE_SK_KEYRING,
-                                      (const char *) data);
-
-    case CDK_DBTYPE_DATA:
-      return cdk_keydb_new_from_mem (r_hd, 0, data, count);
-
-    case CDK_DBTYPE_STREAM:
-      return cdk_keydb_new_from_stream (r_hd, 0, (cdk_stream_t) data);
-
-    default:
-      return CDK_Inv_Mode;
-    }
-  return CDK_Inv_Mode;
-}
-
-
-/**
- * cdk_keydb_free:
- * @hd: the keydb object
- *
- * Free the keydb object.
- **/
-void
-cdk_keydb_free (cdk_keydb_hd_t hd)
-{
-  if (!hd)
-    return;
-
-  if (hd->name)
-    {
-      cdk_free (hd->name);
-      hd->name = NULL;
-    }
-
-  if (hd->fp && !hd->fp_ref)
-    {
-      cdk_stream_close (hd->fp);
-      hd->fp = NULL;
-    }
-
-  if (hd->idx)
-    {
-      cdk_stream_close (hd->idx);
-      hd->idx = NULL;
-    }
-
-  hd->isopen = 0;
-  hd->no_cache = 0;
-  hd->secret = 0;
-  keydb_cache_free (hd->cache);
-  hd->cache = NULL;
-  keydb_search_free (hd->dbs);
-  hd->dbs = NULL;
-  cdk_free (hd);
-}
-
-
-cdk_error_t
-_cdk_keydb_open (cdk_keydb_hd_t hd, cdk_stream_t * ret_kr)
-{
-  cdk_error_t rc, ec;
-
-  if (!hd || !ret_kr)
-    return CDK_Inv_Value;
-
-  rc = 0;
-  if ((hd->type == CDK_DBTYPE_DATA || hd->type == CDK_DBTYPE_STREAM)
-      && hd->fp)
-    cdk_stream_seek (hd->fp, 0);
-  else if (hd->type == CDK_DBTYPE_PK_KEYRING ||
-           hd->type == CDK_DBTYPE_SK_KEYRING)
-    {
-      if (!hd->isopen && hd->name)
-        {
-          rc = cdk_stream_open (hd->name, &hd->fp);
-          if (rc)
-            goto leave;
-          if (cdk_armor_filter_use (hd->fp))
-            cdk_stream_set_armor_flag (hd->fp, 0);
-          hd->isopen = 1;
-          /* We disable the index cache for smaller keyrings. */
-          if (cdk_stream_get_length (hd->fp) < 524288)
-            {
-              hd->no_cache = 1;
-              goto leave;
-            }
-          cdk_free (hd->idx_name);
-          hd->idx_name = keydb_idx_mkname (hd->name);
-          if (!hd->idx_name)
-            {
-              rc = CDK_Out_Of_Core;
-              goto leave;
-            }
-          ec = cdk_stream_open (hd->idx_name, &hd->idx);
-          if (ec && !hd->secret)
-            {
-              rc = keydb_idx_build (hd->name);
-              if (!rc)
-                rc = cdk_stream_open (hd->idx_name, &hd->idx);
-              if (!rc)
-                _cdk_log_debug ("create key index table\n");
-              else
-                {
-                  /* This is no real error, it just means we can't create
-                     the index at the given directory. maybe we've no write
-                     access. in this case, we simply disable the index. */
-                  _cdk_log_debug ("disable key index table err=%d\n", rc);
-                  rc = 0;
-                  hd->no_cache = 1;
-                }
-            }
-        }
-      else
-        {
-          /* We use the cache to search keys, so we always rewind the
-             STREAM. Except when the _NEXT search mode is used because
-             this mode is an enumeration and no seeking is needed. */
-          if (!hd->search ||
-              (hd->search && hd->dbs->type != CDK_DBSEARCH_NEXT))
-            cdk_stream_seek (hd->fp, 0);
-        }
-    }
-  else
-    return CDK_Inv_Mode;
-
-leave:
-  if (rc)
-    {
-      cdk_stream_close (hd->fp);
-      hd->fp = NULL;
-    }
-  *ret_kr = hd->fp;
-  return rc;
-}
-
-
-static int
-find_by_keyid (cdk_kbnode_t knode, cdk_dbsearch_t ks)
-{
-  cdk_kbnode_t node;
-  u32 keyid[2];
-
-  for (node = knode; node; node = node->next)
-    {
-      if (node->pkt->pkttype == CDK_PKT_PUBLIC_KEY ||
-          node->pkt->pkttype == CDK_PKT_PUBLIC_SUBKEY ||
-          node->pkt->pkttype == CDK_PKT_SECRET_KEY ||
-          node->pkt->pkttype == CDK_PKT_SECRET_SUBKEY)
-        {
-          _cdk_pkt_get_keyid (node->pkt, keyid);
-          switch (ks->type)
-            {
-            case CDK_DBSEARCH_SHORT_KEYID:
-              if (keyid[1] == ks->u.keyid[1])
-                return 1;
-              break;
-
-            case CDK_DBSEARCH_KEYID:
-              if (KEYID_CMP (keyid, ks->u.keyid))
-                return 1;
-              break;
-
-            default:
-              _cdk_log_debug ("find_by_keyid: invalid mode = %d\n", ks->type);
-              return 0;
-            }
-        }
-    }
-  return 0;
-}
-
-
-static int
-find_by_fpr (cdk_kbnode_t knode, cdk_dbsearch_t ks)
-{
-  cdk_kbnode_t node;
-  byte fpr[KEY_FPR_LEN];
-
-  if (ks->type != CDK_DBSEARCH_FPR)
-    return 0;
-
-  for (node = knode; node; node = node->next)
-    {
-      if (node->pkt->pkttype == CDK_PKT_PUBLIC_KEY ||
-          node->pkt->pkttype == CDK_PKT_PUBLIC_SUBKEY ||
-          node->pkt->pkttype == CDK_PKT_SECRET_KEY ||
-          node->pkt->pkttype == CDK_PKT_SECRET_SUBKEY)
-        {
-          _cdk_pkt_get_fingerprint (node->pkt, fpr);
-          if (!memcmp (ks->u.fpr, fpr, KEY_FPR_LEN))
-            return 1;
-          break;
-        }
-    }
-
-  return 0;
-}
-
-
-static int
-find_by_pattern (cdk_kbnode_t knode, cdk_dbsearch_t ks)
-{
-  cdk_kbnode_t node;
-  size_t uidlen;
-  char *name;
-
-  for (node = knode; node; node = node->next)
-    {
-      if (node->pkt->pkttype != CDK_PKT_USER_ID)
-        continue;
-      if (node->pkt->pkt.user_id->attrib_img != NULL)
-        continue;               /* Skip attribute packets. */
-      uidlen = node->pkt->pkt.user_id->len;
-      name = node->pkt->pkt.user_id->name;
-      switch (ks->type)
-        {
-        case CDK_DBSEARCH_EXACT:
-          if (name &&
-              (strlen (ks->u.pattern) == uidlen &&
-               !strncmp (ks->u.pattern, name, uidlen)))
-            return 1;
-          break;
-
-        case CDK_DBSEARCH_SUBSTR:
-          if (uidlen > 65536)
-            break;
-          if (name && strlen (ks->u.pattern) > uidlen)
-            break;
-          if (name && _cdk_memistr (name, uidlen, ks->u.pattern))
-            return 1;
-          break;
-
-        default:               /* Invalid mode */
-          return 0;
-        }
-    }
-  return 0;
-}
-
-
-static void
-keydb_search_free (cdk_dbsearch_t dbs)
-{
-  if (!dbs)
-    return;
-  if (dbs->type == CDK_DBSEARCH_EXACT || dbs->type == CDK_DBSEARCH_SUBSTR)
-    cdk_free (dbs->u.pattern);
-  dbs->type = 0;
-  cdk_free (dbs);
-}
-
-
-static void
-keydb_cache_free (key_table_t cache)
-{
-  key_table_t c2;
-
-  while (cache)
-    {
-      c2 = cache->next;
-      cache->offset = 0;
-      keydb_search_free (cache->desc);
-      cdk_free (cache);
-      cache = c2;
-    }
-}
-
-
-static key_table_t
-keydb_cache_find (key_table_t cache, cdk_dbsearch_t desc)
-{
-  key_table_t t;
-
-  for (t = cache; t; t = t->next)
-    {
-      if (t->desc->type != desc->type)
-        continue;
-      switch (t->desc->type)
-        {
-        case CDK_DBSEARCH_SHORT_KEYID:
-        case CDK_DBSEARCH_KEYID:
-          if (KEYID_CMP (t->desc->u.keyid, desc->u.keyid))
-            return t;
-          break;
-
-        case CDK_DBSEARCH_EXACT:
-          if (strlen (t->desc->u.pattern) == strlen (desc->u.pattern) &&
-              !strcmp (t->desc->u.pattern, desc->u.pattern))
-            return t;
-          break;
-
-        case CDK_DBSEARCH_SUBSTR:
-          if (strstr (t->desc->u.pattern, desc->u.pattern))
-            return t;
-          break;
-
-        case CDK_DBSEARCH_FPR:
-          if (!memcmp (t->desc->u.fpr, desc->u.fpr, KEY_FPR_LEN))
-            return t;
-          break;
-        }
-    }
-
-  return NULL;
-}
-
-
-static cdk_error_t
-keydb_cache_add (cdk_keydb_hd_t hd, cdk_dbsearch_t dbs, off_t offset)
-{
-  key_table_t k;
-
-  if (!hd)
-    return CDK_Inv_Value;
-
-  if (hd->ncache > KEYDB_CACHE_ENTRIES)
-    return 0;                   /* FIXME: we should replace the last entry. */
-  k = cdk_calloc (1, sizeof *k);
-  if (!k)
-    return CDK_Out_Of_Core;
-  k->offset = offset;
-  keydb_search_copy (&k->desc, dbs);
-  k->next = hd->cache;
-  hd->cache = k;
-  hd->ncache++;
-  _cdk_log_debug ("cache: add entry off=%d type=%d\n", offset, dbs->type);
-  return 0;
-}
-
-
-static cdk_error_t
-keydb_search_copy (cdk_dbsearch_t * r_dst, cdk_dbsearch_t src)
-{
-  cdk_dbsearch_t dst;
-
-  if (!r_dst || !src)
-    return CDK_Inv_Value;
-
-  *r_dst = NULL;
-  dst = cdk_calloc (1, sizeof *dst);
-  if (!dst)
-    return CDK_Out_Of_Core;
-  dst->type = src->type;
-  switch (src->type)
-    {
-    case CDK_DBSEARCH_EXACT:
-    case CDK_DBSEARCH_SUBSTR:
-      dst->u.pattern = cdk_strdup (src->u.pattern);
-      if (!dst->u.pattern)
-        return CDK_Out_Of_Core;
-      break;
-
-    case CDK_DBSEARCH_SHORT_KEYID:
-    case CDK_DBSEARCH_KEYID:
-      dst->u.keyid[0] = src->u.keyid[0];
-      dst->u.keyid[1] = src->u.keyid[1];
-      break;
-
-    case CDK_DBSEARCH_FPR:
-      memcpy (dst->u.fpr, src->u.fpr, KEY_FPR_LEN);
-      break;
-    }
-  *r_dst = dst;
-  return 0;
-}
-
-
-/**
- * cdk_keydb_search_start:
- * @db: key database handle
- * @type: specifies the search type
- * @desc: description which depends on the type
- *
- * Create a new keydb search object.
- **/
-cdk_error_t
-cdk_keydb_search_start (cdk_keydb_hd_t db, int type, void *desc)
-{
-  cdk_dbsearch_t dbs;
-  u32 *keyid;
-  char *p, tmp[3];
-  int i;
-
-  if (!db)
-    return CDK_Inv_Value;
-  if (type != CDK_DBSEARCH_NEXT && !desc)
-    return CDK_Inv_Mode;
-
-  dbs = cdk_calloc (1, sizeof *dbs);
-  if (!dbs)
-    return CDK_Out_Of_Core;
-  dbs->type = type;
-  switch (type)
-    {
-    case CDK_DBSEARCH_EXACT:
-    case CDK_DBSEARCH_SUBSTR:
-      cdk_free (dbs->u.pattern);
-      dbs->u.pattern = cdk_strdup (desc);
-      if (!dbs->u.pattern)
-        {
-          cdk_free (dbs);
-          return CDK_Out_Of_Core;
-        }
-      break;
-
-    case CDK_DBSEARCH_SHORT_KEYID:
-      keyid = desc;
-      dbs->u.keyid[1] = keyid[0];
-      break;
-
-    case CDK_DBSEARCH_KEYID:
-      keyid = desc;
-      dbs->u.keyid[0] = keyid[0];
-      dbs->u.keyid[1] = keyid[1];
-      break;
-
-    case CDK_DBSEARCH_FPR:
-      memcpy (dbs->u.fpr, desc, KEY_FPR_LEN);
-      break;
-
-    case CDK_DBSEARCH_NEXT:
-      break;
-
-    case CDK_DBSEARCH_AUTO:
-      /* Override the type with the actual db search type. */
-      dbs->type = classify_data (desc, strlen (desc));
-      switch (dbs->type)
-        {
-        case CDK_DBSEARCH_SUBSTR:
-        case CDK_DBSEARCH_EXACT:
-          cdk_free (dbs->u.pattern);
-          p = dbs->u.pattern = cdk_strdup (desc);
-          if (!p)
-            {
-              cdk_free (dbs);
-              return CDK_Out_Of_Core;
-            }
-          break;
-
-        case CDK_DBSEARCH_SHORT_KEYID:
-        case CDK_DBSEARCH_KEYID:
-          p = desc;
-          if (!strncmp (p, "0x", 2))
-            p += 2;
-          if (strlen (p) == 8)
-            {
-              dbs->u.keyid[0] = 0;
-              dbs->u.keyid[1] = strtoul (p, NULL, 16);
-            }
-          else if (strlen (p) == 16)
-            {
-              dbs->u.keyid[0] = strtoul (p, NULL, 16);
-              dbs->u.keyid[1] = strtoul (p + 8, NULL, 16);
-            }
-          else
-            {                   /* Invalid key ID object. */
-              cdk_free (dbs);
-              return CDK_Inv_Mode;
-            }
-          break;
-
-        case CDK_DBSEARCH_FPR:
-          p = desc;
-          if (strlen (p) != 2 * KEY_FPR_LEN)
-            {
-              cdk_free (dbs);
-              return CDK_Inv_Mode;
-            }
-          for (i = 0; i < KEY_FPR_LEN; i++)
-            {
-              tmp[0] = p[2 * i];
-              tmp[1] = p[2 * i + 1];
-              tmp[2] = 0x00;
-              dbs->u.fpr[i] = strtoul (tmp, NULL, 16);
-            }
-          break;
-        }
-      break;
-
-    default:
-      cdk_free (dbs);
-      _cdk_log_debug ("cdk_keydb_search_start: invalid mode = %d\n", type);
-      return CDK_Inv_Mode;
-    }
-
-  keydb_search_free (db->dbs);
-  db->dbs = dbs;
-  return 0;
-}
-
-
-static cdk_error_t
-keydb_pos_from_cache (cdk_keydb_hd_t hd, cdk_dbsearch_t ks,
-                      int *r_cache_hit, off_t * r_off)
-{
-  key_table_t c;
-
-  if (!hd || !r_cache_hit || !r_off)
-    return CDK_Inv_Value;
-
-  /* Reset the values. */
-  *r_cache_hit = 0;
-  *r_off = 0;
-
-  c = keydb_cache_find (hd->cache, ks);
-  if (c != NULL)
-    {
-      _cdk_log_debug ("cache: found entry in cache.\n");
-      *r_cache_hit = 1;
-      *r_off = c->offset;
-      return 0;
-    }
-
-  /* No index cache available so we just return here. */
-  if (!hd->idx)
-    return 0;
-
-  if (hd->idx)
-    {
-      if (ks->type == CDK_DBSEARCH_KEYID)
-        {
-          if (keydb_idx_search (hd->idx, ks->u.keyid, NULL, r_off))
-            return CDK_Error_No_Key;
-          _cdk_log_debug ("cache: found keyid entry in idx table.\n");
-          *r_cache_hit = 1;
-        }
-      else if (ks->type == CDK_DBSEARCH_FPR)
-        {
-          if (keydb_idx_search (hd->idx, NULL, ks->u.fpr, r_off))
-            return CDK_Error_No_Key;
-          _cdk_log_debug ("cache: found fpr entry in idx table.\n");
-          *r_cache_hit = 1;
-        }
-    }
-
-  return 0;
-}
-
-
-/**
- * cdk_keydb_search:
- * @hd: the keydb object
- * @ks: the keydb search object
- * @ret_key: kbnode object to store the key
- *
- * Search for a key in the given keyring. The search mode is handled
- * via @ks. If the key was found, @ret_key contains the key data.
- **/
-cdk_error_t
-cdk_keydb_search (cdk_keydb_hd_t hd, cdk_kbnode_t * ret_key)
-{
-  cdk_stream_t kr;
-  cdk_kbnode_t knode;
-  cdk_dbsearch_t ks;
-  cdk_error_t rc = 0;
-  off_t pos = 0, off = 0;
-  int key_found = 0, cache_hit = 0;
-
-  if (!hd || !ret_key)
-    return CDK_Inv_Value;
-
-  *ret_key = NULL;
-  kr = NULL;
-  hd->search = 1;
-  rc = _cdk_keydb_open (hd, &kr);
-  if (rc)
-    return rc;
-
-  if (!hd->no_cache)
-    {
-      /* It is possible the index is not up-to-date and thus we do
-         not find the requesed key. In this case, we reset cache hit
-         and continue our normal search procedure. */
-      rc = keydb_pos_from_cache (hd, hd->dbs, &cache_hit, &off);
-      if (rc)
-        cache_hit = 0;
-    }
-
-  knode = NULL;
-  ks = hd->dbs;
-  while (!key_found && !rc)
-    {
-      if (cache_hit && ks->type != CDK_DBSEARCH_NEXT)
-        cdk_stream_seek (kr, off);
-      pos = cdk_stream_tell (kr);
-      rc = cdk_keydb_get_keyblock (kr, &knode);
-      if (rc)
-        {
-          if (rc == CDK_EOF)
-            break;
-          else
-            return rc;
-        }
-
-      switch (ks->type)
-        {
-        case CDK_DBSEARCH_SHORT_KEYID:
-        case CDK_DBSEARCH_KEYID:
-          key_found = find_by_keyid (knode, ks);
-          break;
-
-        case CDK_DBSEARCH_FPR:
-          key_found = find_by_fpr (knode, ks);
-          break;
-
-        case CDK_DBSEARCH_EXACT:
-        case CDK_DBSEARCH_SUBSTR:
-          key_found = find_by_pattern (knode, ks);
-          break;
-
-        case CDK_DBSEARCH_NEXT:
-          key_found = knode ? 1 : 0;
-          break;
-        }
-
-      if (key_found)
-        {
-          if (!keydb_cache_find (hd->cache, ks))
-            keydb_cache_add (hd, ks, pos);
-          break;
-        }
-
-      cdk_kbnode_release (knode);
-      knode = NULL;
-    }
-
-  hd->search = 0;
-  if (key_found && rc == CDK_EOF)
-    rc = 0;
-  else if (rc == CDK_EOF && !key_found)
-    rc = CDK_Error_No_Key;
-  *ret_key = key_found ? knode : NULL;
-  return rc;
-}
-
-
-cdk_error_t
-cdk_keydb_get_bykeyid (cdk_keydb_hd_t hd, u32 * keyid, cdk_kbnode_t * ret_key)
-{
-  cdk_error_t rc;
-
-  if (!hd || !keyid || !ret_key)
-    return CDK_Inv_Value;
-
-  rc = cdk_keydb_search_start (hd, CDK_DBSEARCH_KEYID, keyid);
-  if (!rc)
-    rc = cdk_keydb_search (hd, ret_key);
-  return rc;
-}
-
-
-cdk_error_t
-cdk_keydb_get_byfpr (cdk_keydb_hd_t hd, const byte * fpr,
-                     cdk_kbnode_t * r_key)
-{
-  cdk_error_t rc;
-
-  if (!hd || !fpr || !r_key)
-    return CDK_Inv_Value;
-
-  rc = cdk_keydb_search_start (hd, CDK_DBSEARCH_FPR, (byte *) fpr);
-  if (!rc)
-    rc = cdk_keydb_search (hd, r_key);
-  return rc;
-}
-
-
-cdk_error_t
-cdk_keydb_get_bypattern (cdk_keydb_hd_t hd, const char *patt,
-                         cdk_kbnode_t * ret_key)
-{
-  cdk_error_t rc;
-
-  if (!hd || !patt || !ret_key)
-    return CDK_Inv_Value;
-
-  rc = cdk_keydb_search_start (hd, CDK_DBSEARCH_SUBSTR, (char *) patt);
-  if (!rc)
-    rc = cdk_keydb_search (hd, ret_key);
-  return rc;
-}
-
-
-static int
-keydb_check_key (cdk_packet_t pkt)
-{
-  cdk_pkt_pubkey_t pk;
-  int is_sk, valid;
-
-  if (pkt->pkttype == CDK_PKT_PUBLIC_KEY ||
-      pkt->pkttype == CDK_PKT_PUBLIC_SUBKEY)
-    {
-      pk = pkt->pkt.public_key;
-      is_sk = 0;
-    }
-  else if (pkt->pkttype == CDK_PKT_SECRET_KEY ||
-           pkt->pkttype == CDK_PKT_SECRET_SUBKEY)
-    {
-      pk = pkt->pkt.secret_key->pk;
-      is_sk = 1;
-    }
-  else                          /* No key object. */
-    return 0;
-  valid = !pk->is_revoked && !pk->has_expired;
-  if (is_sk)
-    return valid;
-  return valid && !pk->is_invalid;
-}
-
-
-/* Find the first kbnode with the requested packet type
-   that represents a valid key. */
-static cdk_kbnode_t
-kbnode_find_valid (cdk_kbnode_t root, int pkttype)
-{
-  cdk_kbnode_t n;
-
-  for (n = root; n; n = n->next)
-    {
-      if (n->pkt->pkttype != pkttype)
-        continue;
-      if (keydb_check_key (n->pkt))
-        return n;
-    }
-
-  return NULL;
-}
-
-
-static cdk_kbnode_t
-keydb_find_byusage (cdk_kbnode_t root, int req_usage, int is_pk)
-{
-  cdk_kbnode_t node, key;
-  int req_type;
-  long timestamp;
-
-  req_type = is_pk ? CDK_PKT_PUBLIC_KEY : CDK_PKT_SECRET_KEY;
-  if (!req_usage)
-    return kbnode_find_valid (root, req_type);
-
-  node = cdk_kbnode_find (root, req_type);
-  if (node && !keydb_check_key (node->pkt))
-    return NULL;
-
-  key = NULL;
-  timestamp = 0;
-  /* We iteratre over the all nodes and search for keys or
-     subkeys which match the usage and which are not invalid.
-     A timestamp is used to figure out the newest valid key. */
-  for (node = root; node; node = node->next)
-    {
-      if (is_pk && (node->pkt->pkttype == CDK_PKT_PUBLIC_KEY ||
-                    node->pkt->pkttype == CDK_PKT_PUBLIC_SUBKEY)
-          && keydb_check_key (node->pkt)
-          && (node->pkt->pkt.public_key->pubkey_usage & req_usage))
-        {
-          if (node->pkt->pkt.public_key->timestamp > timestamp)
-            key = node;
-        }
-      if (!is_pk && (node->pkt->pkttype == CDK_PKT_SECRET_KEY ||
-                     node->pkt->pkttype == CDK_PKT_SECRET_SUBKEY)
-          && keydb_check_key (node->pkt)
-          && (node->pkt->pkt.secret_key->pk->pubkey_usage & req_usage))
-        {
-          if (node->pkt->pkt.secret_key->pk->timestamp > timestamp)
-            key = node;
-        }
-
-    }
-  return key;
-}
-
-
-static cdk_kbnode_t
-keydb_find_bykeyid (cdk_kbnode_t root, const u32 * keyid, int search_mode)
-{
-  cdk_kbnode_t node;
-  u32 kid[2];
-
-  for (node = root; node; node = node->next)
-    {
-      if (!_cdk_pkt_get_keyid (node->pkt, kid))
-        continue;
-      if (search_mode == CDK_DBSEARCH_SHORT_KEYID && kid[1] == keyid[1])
-        return node;
-      else if (kid[0] == keyid[0] && kid[1] == keyid[1])
-        return node;
-    }
-  return NULL;
-}
-
-
-cdk_error_t
-_cdk_keydb_get_sk_byusage (cdk_keydb_hd_t hd, const char *name,
-                           cdk_seckey_t * ret_sk, int usage)
-{
-  cdk_kbnode_t knode = NULL;
-  cdk_kbnode_t node, sk_node, pk_node;
-  cdk_pkt_seckey_t sk;
-  cdk_error_t rc;
-  const char *s;
-  int pkttype;
-
-  if (!ret_sk || !usage)
-    return CDK_Inv_Value;
-  if (!hd)
-    return CDK_Error_No_Keyring;
-
-  *ret_sk = NULL;
-  rc = cdk_keydb_search_start (hd, CDK_DBSEARCH_AUTO, (char *) name);
-  if (rc)
-    return rc;
-
-  rc = cdk_keydb_search (hd, &knode);
-  if (rc)
-    return rc;
-
-  sk_node = keydb_find_byusage (knode, usage, 0);
-  if (!sk_node)
-    {
-      cdk_kbnode_release (knode);
-      return CDK_Unusable_Key;
-    }
-
-  /* We clone the node with the secret key to avoid that the
-     packet will be released. */
-  _cdk_kbnode_clone (sk_node);
-  sk = sk_node->pkt->pkt.secret_key;
-
-  for (node = knode; node; node = node->next)
-    {
-      if (node->pkt->pkttype == CDK_PKT_USER_ID)
-        {
-          s = node->pkt->pkt.user_id->name;
-          if (sk && !sk->pk->uid && _cdk_memistr (s, strlen (s), name))
-            {
-              _cdk_copy_userid (&sk->pk->uid, node->pkt->pkt.user_id);
-              break;
-            }
-        }
-    }
-
-  /* To find the self signature, we need the primary public key because
-     the selected secret key might be different from the primary key. */
-  pk_node = cdk_kbnode_find (knode, CDK_PKT_SECRET_KEY);
-  if (!pk_node)
-    {
-      cdk_kbnode_release (knode);
-      return CDK_Unusable_Key;
-    }
-  node = find_selfsig_node (knode, pk_node->pkt->pkt.secret_key->pk);
-  if (sk->pk->uid && node)
-    _cdk_copy_signature (&sk->pk->uid->selfsig, node->pkt->pkt.signature);
-
-  /* We only release the outer packet. */
-  _cdk_pkt_detach_free (sk_node->pkt, &pkttype, (void *) &sk);
-  cdk_kbnode_release (knode);
-  *ret_sk = sk;
-  return rc;
-}
-
-
-cdk_error_t
-_cdk_keydb_get_pk_byusage (cdk_keydb_hd_t hd, const char *name,
-                           cdk_pubkey_t * ret_pk, int usage)
-{
-  cdk_kbnode_t knode, node, pk_node;
-  cdk_pkt_pubkey_t pk;
-  const char *s;
-  cdk_error_t rc;
-
-  if (!ret_pk || !usage)
-    return CDK_Inv_Value;
-  if (!hd)
-    return CDK_Error_No_Keyring;
-
-  *ret_pk = NULL;
-  rc = cdk_keydb_search_start (hd, CDK_DBSEARCH_AUTO, (char *) name);
-  if (!rc)
-    rc = cdk_keydb_search (hd, &knode);
-  if (rc)
-    return rc;
-
-  node = keydb_find_byusage (knode, usage, 1);
-  if (!node)
-    {
-      cdk_kbnode_release (knode);
-      return CDK_Unusable_Key;
-    }
-
-  pk = NULL;
-  _cdk_copy_pubkey (&pk, node->pkt->pkt.public_key);
-  for (node = knode; node; node = node->next)
-    {
-      if (node->pkt->pkttype == CDK_PKT_USER_ID)
-        {
-          s = node->pkt->pkt.user_id->name;
-          if (pk && !pk->uid && _cdk_memistr (s, strlen (s), name))
-            {
-              _cdk_copy_userid (&pk->uid, node->pkt->pkt.user_id);
-              break;
-            }
-        }
-    }
-
-  /* Same as in the sk code, the selected key can be a sub key 
-     and thus we need the primary key to find the self sig. */
-  pk_node = cdk_kbnode_find (knode, CDK_PKT_PUBLIC_KEY);
-  if (!pk_node)
-    {
-      cdk_kbnode_release (knode);
-      return CDK_Unusable_Key;
-    }
-  node = find_selfsig_node (knode, pk_node->pkt->pkt.public_key);
-  if (pk->uid && node)
-    _cdk_copy_signature (&pk->uid->selfsig, node->pkt->pkt.signature);
-  cdk_kbnode_release (knode);
-
-  *ret_pk = pk;
-  return rc;
-}
-
-
-/**
- * cdk_keydb_get_pk:
- * @hd: key db handle
- * @keyid: keyid of the key
- * @r_pk: the allocated public key
- * 
- * Perform a key database search by keyid and return the raw public
- * key without any signatures or user id's.
- **/
-cdk_error_t
-cdk_keydb_get_pk (cdk_keydb_hd_t hd, u32 * keyid, cdk_pubkey_t * r_pk)
-{
-  cdk_kbnode_t knode = NULL, node;
-  cdk_pubkey_t pk;
-  cdk_error_t rc;
-  size_t s_type;
-  int pkttype;
-
-  if (!keyid || !r_pk)
-    return CDK_Inv_Value;
-  if (!hd)
-    return CDK_Error_No_Keyring;
-
-  *r_pk = NULL;
-  s_type = !keyid[0] ? CDK_DBSEARCH_SHORT_KEYID : CDK_DBSEARCH_KEYID;
-  rc = cdk_keydb_search_start (hd, s_type, keyid);
-  if (rc)
-    return rc;
-  rc = cdk_keydb_search (hd, &knode);
-  if (rc)
-    return rc;
-
-  node = keydb_find_bykeyid (knode, keyid, s_type);
-  if (!node)
-    {
-      cdk_kbnode_release (knode);
-      return CDK_Error_No_Key;
-    }
-
-  /* See comment in cdk_keydb_get_sk() */
-  _cdk_pkt_detach_free (node->pkt, &pkttype, (void *) &pk);
-  *r_pk = pk;
-  _cdk_kbnode_clone (node);
-  cdk_kbnode_release (knode);
-
-  return rc;
-}
-
-
-/**
- * cdk_keydb_get_sk:
- * @hd: key db handle
- * @keyid: the keyid of the key
- * @ret_sk: the allocated secret key
- * 
- * Perform a key database search by keyid and return
- * only the raw secret key without the additional nodes,
- * like the user id or the signatures.
- **/
-cdk_error_t
-cdk_keydb_get_sk (cdk_keydb_hd_t hd, u32 * keyid, cdk_seckey_t * ret_sk)
-{
-  cdk_kbnode_t snode, node;
-  cdk_seckey_t sk;
-  cdk_error_t rc;
-  int pkttype;
-
-  if (!keyid || !ret_sk)
-    return CDK_Inv_Value;
-  if (!hd)
-    return CDK_Error_No_Keyring;
-
-  *ret_sk = NULL;
-  rc = cdk_keydb_get_bykeyid (hd, keyid, &snode);
-  if (rc)
-    return rc;
-
-  node = keydb_find_bykeyid (snode, keyid, CDK_DBSEARCH_KEYID);
-  if (!node)
-    {
-      cdk_kbnode_release (snode);
-      return CDK_Error_No_Key;
-    }
-
-  /* We need to release the packet itself but not its contents
-     and thus we detach the openpgp packet and release the structure. */
-  _cdk_pkt_detach_free (node->pkt, &pkttype, (void *) &sk);
-  _cdk_kbnode_clone (node);
-  cdk_kbnode_release (snode);
-
-  *ret_sk = sk;
-  return 0;
-}
-
-
-static int
-is_selfsig (cdk_kbnode_t node, const u32 * keyid)
-{
-  cdk_pkt_signature_t sig;
-
-  if (node->pkt->pkttype != CDK_PKT_SIGNATURE)
-    return 0;
-  sig = node->pkt->pkt.signature;
-  if ((sig->sig_class >= 0x10 && sig->sig_class <= 0x13) &&
-      sig->keyid[0] == keyid[0] && sig->keyid[1] == keyid[1])
-    return 1;
-
-  return 0;
-}
-
-
-/* Find the newest self signature for the public key @pk
-   and return the signature node. */
-static cdk_kbnode_t
-find_selfsig_node (cdk_kbnode_t key, cdk_pkt_pubkey_t pk)
-{
-  cdk_kbnode_t n, sig;
-  unsigned int ts;
-  u32 keyid[2];
-
-  cdk_pk_get_keyid (pk, keyid);
-  sig = NULL;
-  ts = 0;
-  for (n = key; n; n = n->next)
-    {
-      if (is_selfsig (n, keyid) && n->pkt->pkt.signature->timestamp > ts)
-        {
-          ts = n->pkt->pkt.signature->timestamp;
-          sig = n;
-        }
-    }
-
-  return sig;
-}
-
-
-
-static cdk_error_t
-keydb_merge_selfsig (cdk_kbnode_t key, u32 * keyid)
-{
-  cdk_kbnode_t node, kbnode, unode;
-  cdk_subpkt_t s = NULL;
-  cdk_pkt_signature_t sig = NULL;
-  cdk_pkt_userid_t uid = NULL;
-  const byte *symalg = NULL, *hashalg = NULL, *compalg = NULL;
-  size_t nsymalg = 0, nhashalg = 0, ncompalg = 0, n = 0;
-  size_t key_usage = 0, key_expire = 0;
-
-  if (!key)
-    return CDK_Inv_Value;
-
-  for (node = key; node; node = node->next)
-    {
-      if (!is_selfsig (node, keyid))
-        continue;
-      unode = cdk_kbnode_find_prev (key, node, CDK_PKT_USER_ID);
-      if (!unode)
-        return CDK_Error_No_Key;
-      uid = unode->pkt->pkt.user_id;
-      sig = node->pkt->pkt.signature;
-      s = cdk_subpkt_find (sig->hashed, CDK_SIGSUBPKT_PRIMARY_UID);
-      if (s)
-        uid->is_primary = 1;
-      s = cdk_subpkt_find (sig->hashed, CDK_SIGSUBPKT_FEATURES);
-      if (s && s->size == 1 && s->d[0] & 0x01)
-        uid->mdc_feature = 1;
-      s = cdk_subpkt_find (sig->hashed, CDK_SIGSUBPKT_KEY_EXPIRE);
-      if (s && s->size == 4)
-        key_expire = _cdk_buftou32 (s->d);
-      s = cdk_subpkt_find (sig->hashed, CDK_SIGSUBPKT_KEY_FLAGS);
-      if (s)
-        {
-          if (s->d[0] & 0x03)   /* cert + sign data */
-            key_usage |= CDK_KEY_USG_SIGN;
-          if (s->d[0] & 0x0C)   /* encrypt comm. + storage */
-            key_usage |= CDK_KEY_USG_ENCR;
-          if (s->d[0] & 0x20)
-            key_usage |= CDK_KEY_USG_AUTH;
-        }
-      s = cdk_subpkt_find (sig->hashed, CDK_SIGSUBPKT_PREFS_SYM);
-      if (s)
-        {
-          symalg = s->d;
-          nsymalg = s->size;
-          n += s->size + 1;
-        }
-      s = cdk_subpkt_find (sig->hashed, CDK_SIGSUBPKT_PREFS_HASH);
-      if (s)
-        {
-          hashalg = s->d;
-          nhashalg = s->size;
-          n += s->size + 1;
-        }
-      s = cdk_subpkt_find (sig->hashed, CDK_SIGSUBPKT_PREFS_ZIP);
-      if (s)
-        {
-          compalg = s->d;
-          ncompalg = s->size;
-          n += s->size + 1;
-        }
-      if (uid->prefs != NULL)
-        cdk_free (uid->prefs);
-      if (!n || !hashalg || !compalg || !symalg)
-        uid->prefs = NULL;
-      else
-        {
-          uid->prefs = cdk_calloc (1, sizeof (*uid->prefs) * (n + 1));
-          if (!uid->prefs)
-            return CDK_Out_Of_Core;
-          n = 0;
-          for (; nsymalg; nsymalg--, n++)
-            {
-              uid->prefs[n].type = CDK_PREFTYPE_SYM;
-              uid->prefs[n].value = *symalg++;
-            }
-          for (; nhashalg; nhashalg--, n++)
-            {
-              uid->prefs[n].type = CDK_PREFTYPE_HASH;
-              uid->prefs[n].value = *hashalg++;
-            }
-          for (; ncompalg; ncompalg--, n++)
-            {
-              uid->prefs[n].type = CDK_PREFTYPE_ZIP;
-              uid->prefs[n].value = *compalg++;
-            }
-
-          uid->prefs[n].type = CDK_PREFTYPE_NONE;       /* end of list marker */
-          uid->prefs[n].value = 0;
-          uid->prefs_size = n;
-        }
-    }
-
-  /* Now we add the extracted information to the primary key. */
-  kbnode = cdk_kbnode_find (key, CDK_PKT_PUBLIC_KEY);
-  if (kbnode)
-    {
-      cdk_pkt_pubkey_t pk = kbnode->pkt->pkt.public_key;
-      if (uid && uid->prefs && n)
-        {
-          if (pk->prefs != NULL)
-            cdk_free (pk->prefs);
-          pk->prefs = _cdk_copy_prefs (uid->prefs);
-          pk->prefs_size = n;
-        }
-      if (key_expire)
-        {
-          pk->expiredate = pk->timestamp + key_expire;
-          pk->has_expired = pk->expiredate > (u32) time (NULL) ? 0 : 1;
-        }
-
-      if (key_usage)
-        pk->pubkey_usage = key_usage;
-      pk->is_invalid = 0;
-    }
-
-  return 0;
-}
-
-
-static cdk_error_t
-keydb_parse_allsigs (cdk_kbnode_t knode, cdk_keydb_hd_t hd, int check)
-{
-  cdk_kbnode_t node, kb;
-  cdk_pkt_signature_t sig;
-  cdk_pkt_pubkey_t pk;
-  cdk_subpkt_t s = NULL;
-  u32 expiredate = 0, curtime = (u32) time (NULL);
-  u32 keyid[2];
-
-  if (!knode)
-    return CDK_Inv_Value;
-  if (check && !hd)
-    return CDK_Inv_Mode;
-
-  kb = cdk_kbnode_find (knode, CDK_PKT_SECRET_KEY);
-  if (kb)
-    return 0;
-
-  /* Reset */
-  for (node = knode; node; node = node->next)
-    {
-      if (node->pkt->pkttype == CDK_PKT_USER_ID)
-        node->pkt->pkt.user_id->is_revoked = 0;
-      else if (node->pkt->pkttype == CDK_PKT_PUBLIC_KEY ||
-               node->pkt->pkttype == CDK_PKT_PUBLIC_SUBKEY)
-        node->pkt->pkt.public_key->is_revoked = 0;
-    }
-
-  kb = cdk_kbnode_find (knode, CDK_PKT_PUBLIC_KEY);
-  if (!kb)
-    return CDK_Wrong_Format;
-  cdk_pk_get_keyid (kb->pkt->pkt.public_key, keyid);
-
-  for (node = knode; node; node = node->next)
-    {
-      if (node->pkt->pkttype == CDK_PKT_SIGNATURE)
-        {
-          sig = node->pkt->pkt.signature;
-          /* Revocation certificates for primary keys */
-          if (sig->sig_class == 0x20)
-            {
-              kb = cdk_kbnode_find_prev (knode, node, CDK_PKT_PUBLIC_KEY);
-              if (kb)
-                {
-                  kb->pkt->pkt.public_key->is_revoked = 1;
-                  if (check)
-                    _cdk_pk_check_sig (hd, kb, node, NULL);
-                }
-              else
-                return CDK_Error_No_Key;
-            }
-          /* Revocation certificates for subkeys */
-          else if (sig->sig_class == 0x28)
-            {
-              kb = cdk_kbnode_find_prev (knode, node, CDK_PKT_PUBLIC_SUBKEY);
-              if (kb)
-                {
-                  kb->pkt->pkt.public_key->is_revoked = 1;
-                  if (check)
-                    _cdk_pk_check_sig (hd, kb, node, NULL);
-                }
-              else
-                return CDK_Error_No_Key;
-            }
-          /* Revocation certifcates for user ID's */
-          else if (sig->sig_class == 0x30)
-            {
-              if (sig->keyid[0] != keyid[0] || sig->keyid[1] != keyid[1])
-                continue;       /* revokes an earlier signature, no userID. */
-              kb = cdk_kbnode_find_prev (knode, node, CDK_PKT_USER_ID);
-              if (kb)
-                {
-                  kb->pkt->pkt.user_id->is_revoked = 1;
-                  if (check)
-                    _cdk_pk_check_sig (hd, kb, node, NULL);
-                }
-              else
-                return CDK_Error_No_Key;
-            }
-          /* Direct certificates for primary keys */
-          else if (sig->sig_class == 0x1F)
-            {
-              kb = cdk_kbnode_find_prev (knode, node, CDK_PKT_PUBLIC_KEY);
-              if (kb)
-                {
-                  pk = kb->pkt->pkt.public_key;
-                  pk->is_invalid = 0;
-                  s = cdk_subpkt_find (node->pkt->pkt.signature->hashed,
-                                       CDK_SIGSUBPKT_KEY_EXPIRE);
-                  if (s)
-                    {
-                      expiredate = _cdk_buftou32 (s->d);
-                      pk->expiredate = pk->timestamp + expiredate;
-                      pk->has_expired = pk->expiredate > curtime ? 0 : 1;
-                    }
-                  if (check)
-                    _cdk_pk_check_sig (hd, kb, node, NULL);
-                }
-              else
-                return CDK_Error_No_Key;
-            }
-          /* Direct certificates for subkeys */
-          else if (sig->sig_class == 0x18)
-            {
-              kb = cdk_kbnode_find_prev (knode, node, CDK_PKT_PUBLIC_SUBKEY);
-              if (kb)
-                {
-                  pk = kb->pkt->pkt.public_key;
-                  pk->is_invalid = 0;
-                  s = cdk_subpkt_find (node->pkt->pkt.signature->hashed,
-                                       CDK_SIGSUBPKT_KEY_EXPIRE);
-                  if (s)
-                    {
-                      expiredate = _cdk_buftou32 (s->d);
-                      pk->expiredate = pk->timestamp + expiredate;
-                      pk->has_expired = pk->expiredate > curtime ? 0 : 1;
-                    }
-                  if (check)
-                    _cdk_pk_check_sig (hd, kb, node, NULL);
-                }
-              else
-                return CDK_Error_No_Key;
-            }
-        }
-    }
-  node = cdk_kbnode_find (knode, CDK_PKT_PUBLIC_KEY);
-  if (node && node->pkt->pkt.public_key->version == 3)
-    {
-      /* v3 public keys have no additonal signatures for the key directly.
-         we say the key is valid when we have at least a self signature. */
-      pk = node->pkt->pkt.public_key;
-      for (node = knode; node; node = node->next)
-        {
-          if (is_selfsig (node, keyid))
-            {
-              pk->is_invalid = 0;
-              break;
-            }
-        }
-    }
-  if (node && (node->pkt->pkt.public_key->is_revoked ||
-               node->pkt->pkt.public_key->has_expired))
-    {
-      /* If the primary key has been revoked, mark all subkeys as invalid
-         because without a primary key they are not useable */
-      for (node = knode; node; node = node->next)
-        {
-          if (node->pkt->pkttype == CDK_PKT_PUBLIC_SUBKEY)
-            node->pkt->pkt.public_key->is_invalid = 1;
-        }
-    }
-
-  return 0;
-}
-
-
-cdk_error_t
-cdk_keydb_get_keyblock (cdk_stream_t inp, cdk_kbnode_t * r_knode)
-{
-  cdk_packet_t pkt;
-  cdk_kbnode_t knode, node;
-  cdk_desig_revoker_t revkeys;
-  cdk_error_t rc;
-  u32 keyid[2], main_keyid[2];
-  off_t old_off;
-  int key_seen, got_key;
-
-  if (!inp || !r_knode)
-    return CDK_Inv_Value;
-
-  /* Reset all values. */
-  keyid[0] = keyid[1] = 0;
-  main_keyid[0] = main_keyid[1] = 0;
-  revkeys = NULL;
-  knode = NULL;
-  key_seen = got_key = 0;
-
-  *r_knode = NULL;
-  rc = CDK_EOF;
-  while (!cdk_stream_eof (inp))
-    {
-      cdk_pkt_new (&pkt);
-      old_off = cdk_stream_tell (inp);
-      rc = cdk_pkt_read (inp, pkt);
-      if (rc)
-        {
-          cdk_pkt_release (pkt);
-          if (rc == CDK_EOF)
-            break;
-          else
-            {                   /* Release all packets we reached so far. */
-              _cdk_log_debug ("keydb_get_keyblock: error %d\n", rc);
-              cdk_kbnode_release (knode);
-              return rc;
-            }
-        }
-      if (pkt->pkttype == CDK_PKT_PUBLIC_KEY ||
-          pkt->pkttype == CDK_PKT_PUBLIC_SUBKEY ||
-          pkt->pkttype == CDK_PKT_SECRET_KEY ||
-          pkt->pkttype == CDK_PKT_SECRET_SUBKEY)
-        {
-          if (key_seen && (pkt->pkttype == CDK_PKT_PUBLIC_KEY ||
-                           pkt->pkttype == CDK_PKT_SECRET_KEY))
-            {
-              /* The next key starts here so set the file pointer
-                 and leave the loop. */
-              cdk_stream_seek (inp, old_off);
-              cdk_pkt_release (pkt);
-              break;
-            }
-          if (pkt->pkttype == CDK_PKT_PUBLIC_KEY ||
-              pkt->pkttype == CDK_PKT_SECRET_KEY)
-            {
-              _cdk_pkt_get_keyid (pkt, main_keyid);
-              key_seen = 1;
-            }
-          else if (pkt->pkttype == CDK_PKT_PUBLIC_SUBKEY ||
-                   pkt->pkttype == CDK_PKT_SECRET_SUBKEY)
-            {
-              if (pkt->pkttype == CDK_PKT_PUBLIC_SUBKEY)
-                {
-                  pkt->pkt.public_key->main_keyid[0] = main_keyid[0];
-                  pkt->pkt.public_key->main_keyid[1] = main_keyid[1];
-                }
-              else
-                {
-                  pkt->pkt.secret_key->main_keyid[0] = main_keyid[0];
-                  pkt->pkt.secret_key->main_keyid[1] = main_keyid[1];
-                }
-            }
-          /* We save this for the signature */
-          _cdk_pkt_get_keyid (pkt, keyid);
-          got_key = 1;
-        }
-      else if (pkt->pkttype == CDK_PKT_USER_ID)
-        ;
-      else if (pkt->pkttype == CDK_PKT_SIGNATURE)
-        {
-          pkt->pkt.signature->key[0] = keyid[0];
-          pkt->pkt.signature->key[1] = keyid[1];
-          if (pkt->pkt.signature->sig_class == 0x1F &&
-              pkt->pkt.signature->revkeys)
-            revkeys = pkt->pkt.signature->revkeys;
-        }
-      node = cdk_kbnode_new (pkt);
-      if (!knode)
-        knode = node;
-      else
-        _cdk_kbnode_add (knode, node);
-    }
-
-  if (got_key)
-    {
-      keydb_merge_selfsig (knode, main_keyid);
-      rc = keydb_parse_allsigs (knode, NULL, 0);
-      if (revkeys)
-        {
-          node = cdk_kbnode_find (knode, CDK_PKT_PUBLIC_KEY);
-          if (node)
-            node->pkt->pkt.public_key->revkeys = revkeys;
-        }
-    }
-  else
-    cdk_kbnode_release (knode);
-  *r_knode = got_key ? knode : NULL;
-
-  /* It is possible that we are in an EOF condition after we
-     successfully read a keyblock. For example if the requested
-     key is the last in the file. */
-  if (rc == CDK_EOF && got_key)
-    rc = 0;
-  return rc;
-}
-
-
-/* Return the type of the given data. In case it cannot be classified,
-   a substring search will be performed. */
-static int
-classify_data (const byte * buf, size_t len)
-{
-  int type;
-  int i;
-
-  if (buf[0] == '0' && (buf[1] == 'x' || buf[1] == 'X'))
-    {                           /* Skip hex prefix. */
-      buf += 2;
-      len -= 2;
-    }
-
-  /* The length of the data does not match either a keyid or a fingerprint. */
-  if (len != 8 && len != 16 && len != 40)
-    return CDK_DBSEARCH_SUBSTR;
-
-  for (i = 0; i < len; i++)
-    {
-      if (!isxdigit (buf[i]))
-        return CDK_DBSEARCH_SUBSTR;
-    }
-  if (i != len)
-    return CDK_DBSEARCH_SUBSTR;
-  switch (len)
-    {
-    case 8:
-      type = CDK_DBSEARCH_SHORT_KEYID;
-      break;
-    case 16:
-      type = CDK_DBSEARCH_KEYID;
-      break;
-    case 40:
-      type = CDK_DBSEARCH_FPR;
-      break;
-    default:
-      type = CDK_DBSEARCH_SUBSTR;
-      break;
-    }
-
-  return type;
-}
-
-
-/**
- * cdk_keydb_export:
- * @hd: the keydb handle
- * @out: the output stream
- * @remusr: the list of key pattern to export
- *
- * Export a list of keys to the given output stream.
- * Use string list with names for pattering searching.
- * This procedure strips local signatures.
- **/
-cdk_error_t
-cdk_keydb_export (cdk_keydb_hd_t hd, cdk_stream_t out, cdk_strlist_t remusr)
-{
-  cdk_kbnode_t knode, node;
-  cdk_strlist_t r;
-  cdk_error_t rc;
-  int old_ctb;
-
-  for (r = remusr; r; r = r->next)
-    {
-      rc = cdk_keydb_search_start (hd, CDK_DBSEARCH_AUTO, r->d);
-      if (rc)
-        return rc;
-      rc = cdk_keydb_search (hd, &knode);
-      if (rc)
-        return rc;
-      node = cdk_kbnode_find (knode, CDK_PKT_PUBLIC_KEY);
-      if (!node)
-        return CDK_Error_No_Key;
-
-      /* If the key is a version 3 key, use the old packet
-         format for the output. */
-      if (node->pkt->pkt.public_key->version == 3)
-        old_ctb = 1;
-      else
-        old_ctb = 0;
-
-      for (node = knode; node; node = node->next)
-        {
-          /* No specified format; skip them */
-          if (node->pkt->pkttype == CDK_PKT_RING_TRUST)
-            continue;
-          /* We never export local signed signatures */
-          if (node->pkt->pkttype == CDK_PKT_SIGNATURE &&
-              !node->pkt->pkt.signature->flags.exportable)
-            continue;
-          /* Filter out invalid signatures */
-          if (node->pkt->pkttype == CDK_PKT_SIGNATURE &&
-              !KEY_CAN_SIGN (node->pkt->pkt.signature->pubkey_algo))
-            continue;
-
-          /* Adjust the ctb flag if needed. */
-          node->pkt->old_ctb = old_ctb;
-          rc = cdk_pkt_write (out, node->pkt);
-          if (rc)
-            {
-              cdk_kbnode_release (knode);
-              return rc;
-            }
-        }
-      cdk_kbnode_release (knode);
-      knode = NULL;
-    }
-  return 0;
-}
-
-
-static cdk_packet_t
-find_key_packet (cdk_kbnode_t knode, int *r_is_sk)
-{
-  cdk_packet_t pkt;
-
-  pkt = cdk_kbnode_find_packet (knode, CDK_PKT_PUBLIC_KEY);
-  if (!pkt)
-    {
-      pkt = cdk_kbnode_find_packet (knode, CDK_PKT_SECRET_KEY);
-      if (r_is_sk)
-        *r_is_sk = pkt ? 1 : 0;
-    }
-  return pkt;
-}
-
-
-/* Return 1 if the is allowd in a key node. */
-static int
-is_key_node (cdk_kbnode_t node)
-{
-  switch (node->pkt->pkttype)
-    {
-    case CDK_PKT_SIGNATURE:
-    case CDK_PKT_SECRET_KEY:
-    case CDK_PKT_PUBLIC_KEY:
-    case CDK_PKT_SECRET_SUBKEY:
-    case CDK_PKT_PUBLIC_SUBKEY:
-    case CDK_PKT_USER_ID:
-    case CDK_PKT_ATTRIBUTE:
-      return 1;
-
-    default:
-      return 0;
-    }
-
-  return 0;
-}
-
-
-cdk_error_t
-cdk_keydb_import (cdk_keydb_hd_t hd, cdk_kbnode_t knode)
-{
-  cdk_kbnode_t node, chk;
-  cdk_packet_t pkt;
-  cdk_stream_t out;
-  cdk_error_t rc;
-  u32 keyid[2];
-
-  if (!hd || !knode)
-    return CDK_Inv_Value;
-
-  pkt = find_key_packet (knode, NULL);
-  if (!pkt)
-    return CDK_Inv_Packet;
-
-  _cdk_pkt_get_keyid (pkt, keyid);
-  chk = NULL;
-  cdk_keydb_get_bykeyid (hd, keyid, &chk);
-  if (chk)
-    {                           /* FIXME: search for new signatures */
-      cdk_kbnode_release (chk);
-      return 0;
-    }
-
-  /* We append data to the stream so we need to close
-     the stream here to re-open it later. */
-  if (hd->fp)
-    {
-      cdk_stream_close (hd->fp);
-      hd->fp = NULL;
-    }
-
-  rc = _cdk_stream_append (hd->name, &out);
-  if (rc)
-    return rc;
-
-  for (node = knode; node; node = node->next)
-    {
-      if (node->pkt->pkttype == CDK_PKT_RING_TRUST)
-        continue;               /* No uniformed syntax for this packet */
-      if (node->pkt->pkttype == CDK_PKT_SIGNATURE &&
-          !node->pkt->pkt.signature->flags.exportable)
-        {
-          _cdk_log_debug ("key db import: skip local signature\n");
-          continue;
-        }
-
-      if (!is_key_node (node))
-        {
-          _cdk_log_debug ("key db import: skip invalid node of type %d\n",
-                          node->pkt->pkttype);
-          continue;
-        }
-
-      rc = cdk_pkt_write (out, node->pkt);
-      if (rc)
-        {
-          cdk_stream_close (out);
-          return rc;
-        }
-    }
-
-  cdk_stream_close (out);
-  if (!hd->no_cache)
-    cdk_keydb_idx_rebuild (hd);
-  hd->stats.new_keys++;
-
-  return 0;
-}
-
-
-cdk_error_t
-_cdk_keydb_check_userid (cdk_keydb_hd_t hd, u32 * keyid, const char *id)
-{
-  cdk_kbnode_t knode = NULL, unode = NULL;
-  cdk_error_t rc;
-  int check;
-
-  if (!hd)
-    return CDK_Inv_Value;
-
-  rc = cdk_keydb_search_start (hd, CDK_DBSEARCH_KEYID, keyid);
-  if (rc)
-    return rc;
-  rc = cdk_keydb_search (hd, &knode);
-  if (rc)
-    return rc;
-
-  rc = cdk_keydb_search_start (hd, CDK_DBSEARCH_EXACT, (char *) id);
-  if (!rc)
-    rc = cdk_keydb_search (hd, &unode);
-  if (rc)
-    {
-      cdk_kbnode_release (knode);
-      return rc;
-    }
-
-  check = 0;
-  cdk_keydb_search_start (hd, CDK_DBSEARCH_KEYID, keyid);
-  if (unode && find_by_keyid (unode, hd->dbs))
-    check++;
-  cdk_kbnode_release (unode);
-
-  cdk_keydb_search_start (hd, CDK_DBSEARCH_EXACT, (char *) id);
-  if (knode && find_by_pattern (knode, hd->dbs))
-    check++;
-  cdk_kbnode_release (knode);
-
-  return check == 2 ? 0 : CDK_Inv_Value;
-}
-
-
-/**
- * cdk_keydb_check_sk:
- * @hd: the key db handle
- * @keyid: the 64-bit keyid
- * 
- * Check if a secret key with the given key ID is available
- * in the key database.
- **/
-cdk_error_t
-cdk_keydb_check_sk (cdk_keydb_hd_t hd, u32 * keyid)
-{
-  cdk_stream_t db;
-  cdk_packet_t pkt;
-  cdk_error_t rc;
-  u32 kid[2];
-
-  if (!hd || !keyid)
-    return CDK_Inv_Value;
-  if (!hd->secret)
-    return CDK_Inv_Mode;
-
-  rc = _cdk_keydb_open (hd, &db);
-  if (rc)
-    return rc;
-  cdk_pkt_new (&pkt);
-  while (!cdk_pkt_read (db, pkt))
-    {
-      if (pkt->pkttype != CDK_PKT_SECRET_KEY &&
-          pkt->pkttype != CDK_PKT_SECRET_SUBKEY)
-        {
-          cdk_pkt_free (pkt);
-          continue;
-        }
-      cdk_sk_get_keyid (pkt->pkt.secret_key, kid);
-      if (KEYID_CMP (kid, keyid))
-        {
-          cdk_pkt_release (pkt);
-          return 0;
-        }
-      cdk_pkt_free (pkt);
-    }
-  cdk_pkt_release (pkt);
-  return CDK_Error_No_Key;
-}
-
-
-/**
- * cdk_listkey_start:
- * @r_ctx: pointer to store the new context
- * @db: the key database handle
- * @patt: string pattern
- * @fpatt: recipients from a stringlist to show
- *
- * Prepare a key listing with the given parameters. Two modes are supported.
- * The first mode uses string pattern to determine if the key should be
- * returned or not. The other mode uses a string list to request the key
- * which should be listed.
- **/
-cdk_error_t
-cdk_listkey_start (cdk_listkey_t * r_ctx, cdk_keydb_hd_t db,
-                   const char *patt, cdk_strlist_t fpatt)
-{
-  cdk_listkey_t ctx;
-  cdk_stream_t inp;
-  cdk_error_t rc;
-
-  if (!r_ctx || !db)
-    return CDK_Inv_Value;
-  if ((patt && fpatt) || (!patt && !fpatt))
-    return CDK_Inv_Mode;
-  rc = _cdk_keydb_open (db, &inp);
-  if (rc)
-    return rc;
-  ctx = cdk_calloc (1, sizeof *ctx);
-  if (!ctx)
-    return CDK_Out_Of_Core;
-  ctx->db = db;
-  ctx->inp = inp;
-  if (patt)
-    {
-      ctx->u.patt = cdk_strdup (patt);
-      if (!ctx->u.patt)
-        return CDK_Out_Of_Core;
-    }
-  else if (fpatt)
-    {
-      cdk_strlist_t l;
-      for (l = fpatt; l; l = l->next)
-        cdk_strlist_add (&ctx->u.fpatt, l->d);
-    }
-  ctx->type = patt ? 1 : 0;
-  ctx->init = 1;
-  *r_ctx = ctx;
-  return 0;
-}
-
-
-/**
- * cdk_listkey_close:
- * @ctx: the list key context
- *
- * Free the list key context.
- **/
-void
-cdk_listkey_close (cdk_listkey_t ctx)
-{
-  if (!ctx)
-    return;
-
-  if (ctx->type)
-    cdk_free (ctx->u.patt);
-  else
-    cdk_strlist_free (ctx->u.fpatt);
-  cdk_free (ctx);
-}
-
-
-/**
- * cdk_listkey_next:
- * @ctx: list key context
- * @r_key: the pointer to the new key node object
- *
- * Retrieve the next key from the pattern of the key list context.
- **/
-cdk_error_t
-cdk_listkey_next (cdk_listkey_t ctx, cdk_kbnode_t * ret_key)
-{
-  if (!ctx || !ret_key)
-    return CDK_Inv_Value;
-  if (!ctx->init)
-    return CDK_Inv_Mode;
-
-  if (ctx->type && ctx->u.patt[0] == '*')
-    return cdk_keydb_get_keyblock (ctx->inp, ret_key);
-  else if (ctx->type)
-    {
-      cdk_kbnode_t node;
-      struct cdk_dbsearch_s ks;
-      cdk_error_t rc;
-
-      for (;;)
-        {
-          rc = cdk_keydb_get_keyblock (ctx->inp, &node);
-          if (rc)
-            return rc;
-          memset (&ks, 0, sizeof (ks));
-          ks.type = CDK_DBSEARCH_SUBSTR;
-          ks.u.pattern = ctx->u.patt;
-          if (find_by_pattern (node, &ks))
-            {
-              *ret_key = node;
-              return 0;
-            }
-          cdk_kbnode_release (node);
-          node = NULL;
-        }
-    }
-  else
-    {
-      if (!ctx->t)
-        ctx->t = ctx->u.fpatt;
-      else if (ctx->t->next)
-        ctx->t = ctx->t->next;
-      else
-        return CDK_EOF;
-      return cdk_keydb_get_bypattern (ctx->db, ctx->t->d, ret_key);
-    }
-  return CDK_General_Error;
-}
-
-
-int
-_cdk_keydb_is_secret (cdk_keydb_hd_t db)
-{
-  return db->secret;
-}

+ 0 - 307
src/daemon/https/opencdk/literal.c

@@ -1,307 +0,0 @@
-/* Literal.c - Literal packet filters
- *       Copyright (C) 2002, 2003 Timo Schulz
- *
- * This file is part of OpenCDK.
- *
- * OpenCDK is free software; you can redistribute it and/or modify
- * it under the terms of the GNU General Public License as published by
- * the Free Software Foundation; either version 2 of the License, or
- * (at your option) any later version.
- *
- * OpenCDK is distributed in the hope that it will be useful,
- * but WITHOUT ANY WARRANTY; without even the implied warranty of
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
- * GNU General Public License for more details.
- */
-#ifdef HAVE_CONFIG_H
-# include <config.h>
-#endif
-#include <stdio.h>
-#include <time.h>
-
-#include "opencdk.h"
-#include "main.h"
-#include "filters.h"
-
-
-/* Duplicate the string @s but strip of possible
-   relative folder names of it. */
-static char *
-dup_trim_filename (const char *s)
-{
-  char *p = NULL;
-
-  p = strrchr (s, '/');
-  if (!p)
-    p = strrchr (s, '\\');
-  if (!p)
-    return cdk_strdup (s);
-  return cdk_strdup (p + 1);
-}
-
-
-static cdk_error_t
-literal_decode (void *opaque, FILE * in, FILE * out)
-{
-  literal_filter_t *pfx = opaque;
-  cdk_stream_t si, so;
-  cdk_packet_t pkt;
-  cdk_pkt_literal_t pt;
-  byte buf[BUFSIZE];
-  size_t nread;
-  int bufsize;
-  cdk_error_t rc;
-
-  _cdk_log_debug ("literal filter: decode\n");
-
-  if (!pfx || !in || !out)
-    return CDK_Inv_Value;
-
-  rc = _cdk_stream_fpopen (in, STREAMCTL_READ, &si);
-  if (rc)
-    return rc;
-
-  cdk_pkt_new (&pkt);
-  rc = cdk_pkt_read (si, pkt);
-  if (rc || pkt->pkttype != CDK_PKT_LITERAL)
-    {
-      cdk_pkt_release (pkt);
-      cdk_stream_close (si);
-      return !rc ? CDK_Inv_Packet : rc;
-    }
-
-  rc = _cdk_stream_fpopen (out, STREAMCTL_WRITE, &so);
-  if (rc)
-    {
-      cdk_pkt_release (pkt);
-      cdk_stream_close (si);
-      return rc;
-    }
-
-  pt = pkt->pkt.literal;
-  pfx->mode = pt->mode;
-
-  if (pfx->filename && pt->namelen > 0)
-    {
-      /* The name in the literal packet is more authorative. */
-      cdk_free (pfx->filename);
-      pfx->filename = dup_trim_filename (pt->name);
-    }
-  else if (!pfx->filename && pt->namelen > 0)
-    pfx->filename = dup_trim_filename (pt->name);
-  else if (!pt->namelen && !pfx->filename && pfx->orig_filename)
-    {
-      /* In this case, we need to derrive the output file name
-         from the original name and cut off the OpenPGP extension.
-         If this is not possible, we return an error. */
-      if (!stristr (pfx->orig_filename, ".gpg") &&
-          !stristr (pfx->orig_filename, ".pgp") &&
-          !stristr (pfx->orig_filename, ".asc"))
-        {
-          cdk_pkt_release (pkt);
-          cdk_stream_close (si);
-          cdk_stream_close (so);
-          _cdk_log_debug
-            ("literal filter: no file name and no PGP extension\n");
-          return CDK_Inv_Mode;
-        }
-      _cdk_log_debug ("literal filter: derrive file name from original\n");
-      pfx->filename = dup_trim_filename (pfx->orig_filename);
-      pfx->filename[strlen (pfx->filename) - 4] = '\0';
-    }
-
-  while (!feof (in))
-    {
-      _cdk_log_debug ("literal_decode: part on %d size %lu\n",
-                      pfx->blkmode.on, pfx->blkmode.size);
-      if (pfx->blkmode.on)
-        bufsize = pfx->blkmode.size;
-      else
-        bufsize = pt->len < DIM (buf) ? pt->len : DIM (buf);
-      nread = cdk_stream_read (pt->buf, buf, bufsize);
-      if (nread == EOF)
-        {
-          rc = CDK_File_Error;
-          break;
-        }
-      if (pfx->md)
-        gcry_md_write (pfx->md, buf, nread);
-      cdk_stream_write (so, buf, nread);
-      pt->len -= nread;
-      if (pfx->blkmode.on)
-        {
-          pfx->blkmode.size = _cdk_pkt_read_len (in, &pfx->blkmode.on);
-          if (pfx->blkmode.size == (size_t) EOF)
-            return CDK_Inv_Packet;
-        }
-      if (pt->len <= 0 && !pfx->blkmode.on)
-        break;
-    }
-
-  cdk_stream_close (si);
-  cdk_stream_close (so);
-  cdk_pkt_release (pkt);
-  return rc;
-}
-
-
-static char
-intmode_to_char (int mode)
-{
-  switch (mode)
-    {
-    case CDK_LITFMT_BINARY:
-      return 'b';
-    case CDK_LITFMT_TEXT:
-      return 't';
-    case CDK_LITFMT_UNICODE:
-      return 'u';
-    default:
-      return 'b';
-    }
-
-  return 'b';
-}
-
-
-static cdk_error_t
-literal_encode (void *opaque, FILE * in, FILE * out)
-{
-  literal_filter_t *pfx = opaque;
-  cdk_pkt_literal_t pt;
-  cdk_stream_t si;
-  cdk_packet_t pkt;
-  size_t filelen;
-  cdk_error_t rc;
-
-  _cdk_log_debug ("literal filter: encode\n");
-
-  if (!pfx || !in || !out)
-    return CDK_Inv_Value;
-  if (!pfx->filename)
-    {
-      pfx->filename = cdk_strdup ("_CONSOLE");
-      if (!pfx->filename)
-        return CDK_Out_Of_Core;
-    }
-
-  rc = _cdk_stream_fpopen (in, STREAMCTL_READ, &si);
-  if (rc)
-    return rc;
-
-  filelen = strlen (pfx->filename);
-  cdk_pkt_new (&pkt);
-  pt = pkt->pkt.literal = cdk_calloc (1, sizeof *pt + filelen - 1);
-  if (!pt)
-    {
-      cdk_pkt_release (pkt);
-      cdk_stream_close (si);
-      return CDK_Out_Of_Core;
-    }
-  memcpy (pt->name, pfx->filename, filelen);
-  pt->namelen = filelen;
-  pt->name[pt->namelen] = '\0';
-  pt->timestamp = (u32) time (NULL);
-  pt->mode = intmode_to_char (pfx->mode);
-  pt->len = cdk_stream_get_length (si);
-  pt->buf = si;
-  pkt->old_ctb = 1;
-  pkt->pkttype = CDK_PKT_LITERAL;
-  pkt->pkt.literal = pt;
-  rc = _cdk_pkt_write_fp (out, pkt);
-
-  cdk_pkt_release (pkt);
-  cdk_stream_close (si);
-  return rc;
-}
-
-
-int
-_cdk_filter_literal (void *opaque, int ctl, FILE * in, FILE * out)
-{
-  if (ctl == STREAMCTL_READ)
-    return literal_decode (opaque, in, out);
-  else if (ctl == STREAMCTL_WRITE)
-    return literal_encode (opaque, in, out);
-  else if (ctl == STREAMCTL_FREE)
-    {
-      literal_filter_t *pfx = opaque;
-      if (pfx)
-        {
-          _cdk_log_debug ("free literal filter\n");
-          cdk_free (pfx->filename);
-          pfx->filename = NULL;
-          cdk_free (pfx->orig_filename);
-          pfx->orig_filename = NULL;
-          return 0;
-        }
-    }
-  return CDK_Inv_Mode;
-}
-
-
-static int
-text_encode (void *opaque, FILE * in, FILE * out)
-{
-  const char *s;
-  char buf[2048];
-
-  if (!in || !out)
-    return CDK_Inv_Value;
-
-  /* FIXME: This code does not work for very long lines. */
-  while (!feof (in))
-    {
-      s = fgets (buf, DIM (buf) - 1, in);
-      if (!s)
-        break;
-      _cdk_trim_string (buf, 1);
-      fwrite (buf, 1, strlen (buf), out);
-    }
-
-  return 0;
-}
-
-
-static int
-text_decode (void *opaque, FILE * in, FILE * out)
-{
-  text_filter_t *tfx = opaque;
-  const char *s;
-  char buf[2048];
-
-  if (!tfx || !in || !out)
-    return CDK_Inv_Value;
-
-  while (!feof (in))
-    {
-      s = fgets (buf, DIM (buf) - 1, in);
-      if (!s)
-        break;
-      _cdk_trim_string (buf, 0);
-      fwrite (buf, 1, strlen (buf), out);
-      fwrite (tfx->lf, 1, strlen (tfx->lf), out);
-    }
-
-  return 0;
-}
-
-
-int
-_cdk_filter_text (void *opaque, int ctl, FILE * in, FILE * out)
-{
-  if (ctl == STREAMCTL_READ)
-    return text_encode (opaque, in, out);
-  else if (ctl == STREAMCTL_WRITE)
-    return text_decode (opaque, in, out);
-  else if (ctl == STREAMCTL_FREE)
-    {
-      text_filter_t *tfx = opaque;
-      if (tfx)
-        {
-          _cdk_log_debug ("free text filter\n");
-          tfx->lf = NULL;
-        }
-    }
-  return CDK_Inv_Mode;
-}

+ 0 - 779
src/daemon/https/opencdk/main.c

@@ -1,779 +0,0 @@
-/* main.c
- *       Copyright (C) 2001, 2002, 2003, 2007 Timo Schulz
- *
- * This file is part of OpenCDK.
- *
- * OpenCDK is free software; you can redistribute it and/or modify 
- * it under the terms of the GNU General Public License as published by 
- * the Free Software Foundation; either version 2 of the License, or 
- * (at your option) any later version. 
- *  
- * OpenCDK is distributed in the hope that it will be useful, 
- * but WITHOUT ANY WARRANTY; without even the implied warranty of 
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the 
- * GNU General Public License for more details. 
- */
-#ifdef HAVE_CONFIG_H
-# include <config.h>
-#endif
-#include <stdio.h>
-#include <errno.h>
-#ifdef HAVE_UNISTD_H
-# include <unistd.h>
-#endif
-#ifdef _WIN32
-#include <windows.h>
-#endif
-
-#include "opencdk.h"
-#include "main.h"
-#include "packet.h"
-
-
-/* Set a default cipher algorithm and a digest algorithm.
-   Even if AES and SHA-256 are not 'MUST' in the latest
-   OpenPGP draft, AES seems to be a good choice. */
-#define DEFAULT_CIPHER_ALGO GCRY_CIPHER_AES
-#define DEFAULT_DIGEST_ALGO GCRY_MD_SHA256
-
-/* The site of the secure memory which is allocated in gcrypt. */
-#define SECMEM_SIZE 16384
-
-
-/* Hooks to custom memory allocation functions. */
-static void *(*alloc_func) (size_t n) = gcry_xmalloc;
-static void *(*alloc_secure_func) (size_t n) = gcry_malloc_secure;
-static void *(*realloc_func) (void *p, size_t n) = gcry_realloc;
-static void *(*calloc_func) (size_t m, size_t n) = gcry_calloc;
-static void (*free_func) (void *) = gcry_free;
-static int malloc_hooks = 0;
-static int secmem_init = 0;
-
-/* Global settings for the logging. */
-static cdk_log_fnc_t log_handler = NULL;
-static void *log_handler_value = NULL;
-static int log_level = CDK_LOG_NONE;
-
-
-/**
- * cdk_strerror:
- * @ec: the error number
- *
- * Return an error text for the given id.
- **/
-const char *
-cdk_strerror (int ec)
-{
-  static char buf[20];
-
-  switch (ec)
-    {
-    case CDK_EOF:
-      return "End Of File";
-    case CDK_Success:
-      return "No error";
-    case CDK_General_Error:
-      return "General error";
-    case CDK_File_Error:
-      return strerror (errno);
-    case CDK_Bad_Sig:
-      return "Bad signature";
-    case CDK_Inv_Packet:
-      return "Invalid packet";
-    case CDK_Inv_Algo:
-      return "Invalid algorithm";
-    case CDK_Not_Implemented:
-      return "This is not implemented yet";
-    case CDK_Armor_Error:
-      return "ASCII armor error";
-    case CDK_Armor_CRC_Error:
-      return "ASCII armored damaged (CRC error)";
-    case CDK_MPI_Error:
-      return "Invalid or missformed MPI";
-    case CDK_Inv_Value:
-      return "Invalid parameter or value";
-    case CDK_Error_No_Key:
-      return "No key available or not found";
-    case CDK_Chksum_Error:
-      return "Check for key does not match";
-    case CDK_Time_Conflict:
-      return "Time conflict";
-    case CDK_Zlib_Error:
-      return "ZLIB error";
-    case CDK_Weak_Key:
-      return "Weak key was detected";
-    case CDK_Out_Of_Core:
-      return "Out of core!!";
-    case CDK_Wrong_Seckey:
-      return "Wrong secret key";
-    case CDK_Wrong_Format:
-      return "Data has wrong format";
-    case CDK_Bad_MDC:
-      return "Manipulated MDC detected";
-    case CDK_Inv_Mode:
-      return "Invalid mode";
-    case CDK_Error_No_Keyring:
-      return "No keyring available";
-    case CDK_Inv_Packet_Ver:
-      return "Invalid version for packet";
-    case CDK_Too_Short:
-      return "Buffer or object is too short";
-    case CDK_Unusable_Key:
-      return "Unusable public key";
-    case CDK_No_Data:
-      return "No data";
-    case CDK_No_Passphrase:
-      return "No passphrase supplied";
-    case CDK_Network_Error:
-      return "A network error occurred";
-    default:
-      sprintf (buf, "ec=%d", ec);
-      return buf;
-    }
-  return NULL;
-}
-
-
-static void
-out_of_core (size_t n)
-{
-  fprintf (stderr, "\n ** fatal error: out of memory (%d bytes) **\n", n);
-}
-
-
-/**
- * cdk_set_malloc_hooks: 
- * @new_alloc_func: malloc replacement
- * @new_alloc_secure_func: secure malloc replacement
- * @new_realloc_func: realloc replacement
- * @new_calloc_func: calloc replacement
- * @new_free_func: free replacement
- *
- * Set private memory hooks for the library.
- */
-void
-cdk_set_malloc_hooks (void *(*new_alloc_func) (size_t n),
-                      void *(*new_alloc_secure_func) (size_t n),
-                      void *(*new_realloc_func) (void *p, size_t n),
-                      void *(*new_calloc_func) (size_t m, size_t n),
-                      void (*new_free_func) (void *))
-{
-  alloc_func = new_alloc_func;
-  alloc_secure_func = new_alloc_secure_func;
-  realloc_func = new_realloc_func;
-  calloc_func = new_calloc_func;
-  free_func = new_free_func;
-  malloc_hooks = 1;
-}
-
-
-/**
- * cdk_malloc_hook_initialized:
- *
- * Return if the malloc hooks are already initialized.
- **/
-int
-cdk_malloc_hook_initialized (void)
-{
-  return malloc_hooks;
-}
-
-
-void *
-cdk_malloc (size_t size)
-{
-  void *p = alloc_func (size);
-  if (!p)
-    out_of_core (size);
-  return p;
-}
-
-
-/**
- * cdk_calloc:
- * @n: amount of elements
- * @m: size of one element
- * 
- * Safe wrapper around the c-function calloc.
- **/
-void *
-cdk_calloc (size_t n, size_t m)
-{
-  void *p = calloc_func (n, m);
-  if (!p)
-    out_of_core (m);
-  return p;
-}
-
-
-/* Things which need to  be done after the secure memory initialisation. */
-static void
-_secmem_finish (void)
-{
-  gcry_control (GCRYCTL_DROP_PRIVS);
-}
-
-
-/* Initialize the secure memory. */
-static void
-_secmem_init (size_t size)
-{
-  if (secmem_init == 1)
-    return;
-  if (size >= SECMEM_SIZE)
-    size = SECMEM_SIZE;
-
-  /* Check if no other library has already initialized gcrypt. */
-  if (!gcry_control (GCRYCTL_ANY_INITIALIZATION_P))
-    {
-      _cdk_log_debug ("init: libgcrypt initialize.\n");
-      gcry_control (GCRYCTL_INIT_SECMEM, size, 0);
-      gcry_control (GCRYCTL_USE_SECURE_RNDPOOL);
-      gcry_control (GCRYCTL_DISABLE_SECMEM_WARN);
-      gcry_control (GCRYCTL_INITIALIZATION_FINISHED, NULL, 0);
-      secmem_init = 1;
-    }
-}
-
-
-/* Things which needs to be done to deinit the secure memory. */
-static void
-_secmem_end (void)
-{
-  gcry_control (GCRYCTL_TERM_SECMEM);
-  secmem_init = 0;
-}
-
-
-/* The Windows system needs to startup the Winsock interface first
-   before we can use any socket related function. */
-#ifdef _WIN32
-static void
-init_sockets (void)
-{
-  static int initialized = 0;
-  WSADATA wsdata;
-
-  if (initialized)
-    return;
-  if (WSAStartup (0x202, &wsdata))
-    _cdk_log_debug ("winsock init failed.\n");
-
-  initialized = 1;
-}
-
-static void
-deinit_sockets (void)
-{
-  WSACleanup ();
-}
-#else
-void
-init_sockets (void)
-{
-}
-void
-deinit_sockets (void)
-{
-}
-#endif
-
-
-/**
- * cdk_lib_startup:
- * 
- * Prepare the internal structures of the library.
- * This function should be called before any other CDK function.
- */
-void
-cdk_lib_startup (void)
-{
-  _secmem_init (SECMEM_SIZE);
-  _secmem_finish ();
-  init_sockets ();
-}
-
-
-/**
- * cdk_lib_shutdown:
- * 
- * Shutdown the library and free all internal and globally used
- * memory and structures. This function should be called in the
- * exit handler of the calling program.
- */
-void
-cdk_lib_shutdown (void)
-{
-  deinit_sockets ();
-  _secmem_end ();
-}
-
-/**
- * cdk_salloc:
- * @size: how much bytes should be allocated.
- * @clear: shall the buffer cleared after the allocation?
- * 
- * Allocated the requested amount of bytes in 'secure' memory.
- */
-void *
-cdk_salloc (size_t size, int clear)
-{
-  void *p;
-
-  if (!secmem_init)
-    _secmem_init (SECMEM_SIZE);
-
-  p = alloc_secure_func (size);
-  if (!p)
-    out_of_core (size);
-  if (clear)
-    memset (p, 0, size);
-  return p;
-}
-
-
-void *
-cdk_realloc (void *ptr, size_t size)
-{
-  void *p = realloc_func (ptr, size);
-  if (!p)
-    out_of_core (size);
-  return p;
-}
-
-
-char *
-cdk_strdup (const char *ptr)
-{
-  char *p = cdk_malloc (strlen (ptr) + 1);
-  if (p)
-    strcpy (p, ptr);
-  return p;
-}
-
-
-void
-cdk_free (void *ptr)
-{
-  if (ptr)
-    free_func (ptr);
-}
-
-
-/* Internal logging routine. */
-static void
-_cdk_logv (int level, const char *fmt, va_list arg_ptr)
-{
-
-  if (log_handler)
-    log_handler (log_handler_value, level, fmt, arg_ptr);
-  else
-    {
-      if (level == CDK_LOG_NONE)
-        return;
-      if (level == CDK_LOG_DEBUG)
-        fputs ("DBG: ", stderr);
-      vfprintf (stderr, fmt, arg_ptr);
-    }
-}
-
-
-/**
- * cdk_set_log_handler: 
- * @logfnc: the function pointer
- * @opaque: a private values for the function
- *
- * Set a custom handler for logging.
- **/
-void
-cdk_set_log_handler (cdk_log_fnc_t logfnc, void *opaque)
-{
-  log_handler = logfnc;
-  log_handler_value = opaque;
-}
-
-
-/**
- * cdk_set_log_level: 
- * @lvl: the level
- *
- * Set the verbosity level.
- **/
-void
-cdk_set_log_level (int level)
-{
-  log_level = level;
-}
-
-
-/* Return the current log level of the lib. */
-int
-_cdk_get_log_level (void)
-{
-  return log_level;
-}
-
-
-void
-_cdk_log_info (const char *fmt, ...)
-{
-  va_list arg;
-
-  if (log_level == CDK_LOG_NONE)
-    return;
-  va_start (arg, fmt);
-  _cdk_logv (CDK_LOG_INFO, fmt, arg);
-  va_end (arg);
-}
-
-
-void
-_cdk_log_debug (const char *fmt, ...)
-{
-  va_list arg;
-
-  if (log_level < CDK_LOG_DEBUG)
-    return;
-  va_start (arg, fmt);
-  _cdk_logv (CDK_LOG_DEBUG, fmt, arg);
-  va_end (arg);
-}
-
-
-/* Use the passphrase callback in the handle HD or
-   return NULL if there is no valid callback. */
-char *
-_cdk_passphrase_get (cdk_ctx_t hd, const char *prompt)
-{
-  if (!hd || !hd->passphrase_cb)
-    return NULL;
-  return hd->passphrase_cb (hd->passphrase_cb_value, prompt);
-}
-
-
-static void
-handle_set_cipher (cdk_ctx_t hd, int cipher)
-{
-  if (!hd)
-    return;
-  if (gcry_cipher_test_algo (cipher))
-    cipher = DEFAULT_CIPHER_ALGO;
-  hd->cipher_algo = cipher;
-}
-
-
-static void
-handle_set_digest (cdk_ctx_t hd, int digest)
-{
-  if (!hd)
-    return;
-  if (gcry_md_test_algo (digest))
-    digest = DEFAULT_DIGEST_ALGO;
-  hd->digest_algo = digest;
-}
-
-
-static void
-handle_set_s2k (cdk_ctx_t hd, int mode, int digest, int cipher)
-{
-  if (!hd)
-    return;
-  if (gcry_cipher_test_algo (cipher))
-    cipher = DEFAULT_CIPHER_ALGO;
-  if (gcry_md_test_algo (digest))
-    digest = DEFAULT_DIGEST_ALGO;
-  if (mode != CDK_S2K_SIMPLE &&
-      mode != CDK_S2K_SALTED && mode != CDK_S2K_ITERSALTED)
-    mode = CDK_S2K_ITERSALTED;
-  hd->_s2k.mode = mode;
-  hd->_s2k.digest_algo = digest;
-}
-
-
-static void
-handle_set_compress (cdk_ctx_t hd, int algo, int level)
-{
-  if (!hd)
-    return;
-  if (algo < 0 || algo > 2)
-    algo = 0;
-  hd->compress.algo = algo;
-  if (!algo)
-    hd->opt.compress = 0;
-  else
-    {
-      if (level > 0 && level < 10)
-        hd->compress.level = level;
-      else
-        hd->compress.level = 6;
-    }
-}
-
-
-/**
- * cdk_handle_control:
- * @hd: session handle
- * @action: flag which indicates whether put or get is requested
- * @cmd: command id
- *
- * Perform various control operations for the current session.
- **/
-int
-cdk_handle_control (cdk_ctx_t hd, int action, int cmd, ...)
-{
-  va_list arg_ptr;
-  int set = action == CDK_CTLF_SET, val = 0;
-
-  if (!hd)
-    return -1;
-
-  if (action != CDK_CTLF_SET && action != CDK_CTLF_GET)
-    return -1;
-  va_start (arg_ptr, cmd);
-  switch (cmd)
-    {
-    case CDK_CTL_ARMOR:
-      if (set)
-        hd->opt.armor = va_arg (arg_ptr, int);
-      else
-        val = hd->opt.armor;
-      break;
-
-    case CDK_CTL_CIPHER:
-      if (set)
-        handle_set_cipher (hd, va_arg (arg_ptr, int));
-      else
-        val = hd->cipher_algo;
-      break;
-
-    case CDK_CTL_DIGEST:
-      if (set)
-        handle_set_digest (hd, va_arg (arg_ptr, int));
-      else
-        val = hd->digest_algo;
-      break;
-
-    case CDK_CTL_OVERWRITE:
-      if (set)
-        hd->opt.overwrite = va_arg (arg_ptr, int);
-      else
-        val = hd->opt.overwrite;
-      break;
-
-    case CDK_CTL_COMPRESS:
-      if (set)
-        {
-          int algo = va_arg (arg_ptr, int);
-          int level = va_arg (arg_ptr, int);
-          handle_set_compress (hd, algo, level);
-        }
-      else
-        val = hd->compress.algo;
-      break;
-
-    case CDK_CTL_S2K:
-      if (set)
-        {
-          int mode = va_arg (arg_ptr, int);
-          int digest = va_arg (arg_ptr, int);
-          int cipher = va_arg (arg_ptr, int);
-          handle_set_s2k (hd, mode, digest, cipher);
-        }
-      else
-        val = hd->_s2k.mode;
-      break;
-
-    case CDK_CTL_FORCE_DIGEST:
-      if (set)
-        hd->opt.force_digest = va_arg (arg_ptr, int);
-      else
-        val = hd->opt.force_digest;
-      break;
-
-    case CDK_CTL_BLOCKMODE_ON:
-      if (set)
-        hd->opt.blockmode = va_arg (arg_ptr, int);
-      else
-        val = hd->opt.blockmode;
-      break;
-
-    default:
-      val = -1;
-      break;
-    }
-  va_end (arg_ptr);
-  return val;
-}
-
-
-
-/**
- * cdk_handle_new:
- * @r_ctx: context to store the handle
- *
- * create a new session handle.
- **/
-cdk_error_t
-cdk_handle_new (cdk_ctx_t * r_ctx)
-{
-  cdk_ctx_t c;
-
-  if (!r_ctx)
-    return CDK_Inv_Value;
-
-  c = cdk_calloc (1, sizeof *c);
-  if (!c)
-    return CDK_Out_Of_Core;
-
-  /* For S2K use the iterated and salted mode and use the
-     default digest and cipher algorithms. Because the MDC
-     feature will be used, the default cipher should use a 
-     blocksize of 128 bits. */
-  c->_s2k.mode = CDK_S2K_ITERSALTED;
-  c->_s2k.digest_algo = DEFAULT_DIGEST_ALGO;
-
-  c->opt.mdc = 1;
-  c->opt.compress = 1;
-  c->opt.armor = 0;
-  c->opt.textmode = 0;
-
-  c->digest_algo = DEFAULT_DIGEST_ALGO;
-  c->cipher_algo = DEFAULT_CIPHER_ALGO;
-
-  c->compress.algo = CDK_COMPRESS_ZIP;
-  c->compress.level = 6;
-
-  *r_ctx = c;
-  return 0;
-}
-
-
-/**
- * cdk_handle_set_keyring:
- * @hd: session handle
- * @type: public=0 or secret=1 keyring type
- * @kringname: file name of the keyring which shall be used.
- * 
- * Convenient function to set the keyring for the current session.
- */
-cdk_error_t
-cdk_handle_set_keyring (cdk_ctx_t hd, int type, const char *kringname)
-{
-  cdk_keydb_hd_t db;
-  cdk_error_t err;
-
-  err = cdk_keydb_new_from_file (&db, type, kringname);
-  if (err)
-    return err;
-
-  if (!type)
-    hd->db.pub = db;
-  else
-    hd->db.sec = db;
-  hd->db.close_db = 1;
-  return 0;
-}
-
-
-/**
- * cdk_handle_set_keydb:
- * @hd: session handle
- * @db: the database handle
- *
- * set the key database handle.
- * the function automatically detects whether this is a public or
- * secret keyring and the right handle is set.
- **/
-void
-cdk_handle_set_keydb (cdk_ctx_t hd, cdk_keydb_hd_t db)
-{
-  if (!hd)
-    return;
-  if (_cdk_keydb_is_secret (db))
-    hd->db.sec = db;
-  else
-    hd->db.pub = db;
-}
-
-
-/**
- * cdk_handle_get_keydb:
- * @hd: session handle
- * @type: type of the keyring
- *
- * Return the keydb handle from the session handle.
- * The caller should not free these handles.
- **/
-cdk_keydb_hd_t
-cdk_handle_get_keydb (cdk_ctx_t hd, int type)
-{
-  if (!hd)
-    return NULL;
-  if (type == CDK_DBTYPE_PK_KEYRING)
-    return hd->db.pub;
-  else if (type == CDK_DBTYPE_SK_KEYRING)
-    return hd->db.sec;
-  return NULL;
-}
-
-
-/**
- * cdk_handle_set_passphrase_cb:
- * @hd: session handle
- * @cb: callback function
- * @cb_value: the opaque value for the cb function
- *
- * set the passphrase callback.
- **/
-void
-cdk_handle_set_passphrase_cb (cdk_ctx_t hd,
-                              char *(*cb) (void *opa, const char *prompt),
-                              void *cb_value)
-{
-  if (!hd)
-    return;
-  hd->passphrase_cb = cb;
-  hd->passphrase_cb_value = cb_value;
-}
-
-
-/**
- * cdk_handle_verify_get_result:
- * @hd: the session handle
- * 
- * Return the verify result for the current session.
- * Do not free the pointer.
- **/
-cdk_verify_result_t
-cdk_handle_verify_get_result (cdk_ctx_t hd)
-{
-  return hd->result.verify;
-}
-
-
-/**
- * cdk_handle_free:
- * @hd: the handle
- *
- * Release the main handle.
- **/
-void
-cdk_handle_free (cdk_ctx_t hd)
-{
-  if (!hd)
-    return;
-  _cdk_result_verify_free (hd->result.verify);
-
-  /* If cdk_handle_set_keyring() were used, we need to free the key db
-     handles here because the handles are not controlled by the user. */
-  if (hd->db.close_db)
-    {
-      if (hd->db.pub)
-        cdk_keydb_free (hd->db.pub);
-      if (hd->db.sec)
-        cdk_keydb_free (hd->db.sec);
-      hd->db.pub = hd->db.sec = NULL;
-    }
-  cdk_free (hd->dek);
-  cdk_free (hd);
-}

+ 0 - 183
src/daemon/https/opencdk/main.h

@@ -1,183 +0,0 @@
-/* main.h
- *       Copyright (C) 2002, 2003, 2007 Timo Schulz
- *
- * This file is part of OpenCDK.
- *
- * OpenCDK is free software; you can redistribute it and/or modify
- * it under the terms of the GNU General Public License as published by
- * the Free Software Foundation; either version 2 of the License, or
- * (at your option) any later version.
- *
- * OpenCDK is distributed in the hope that it will be useful,
- * but WITHOUT ANY WARRANTY; without even the implied warranty of
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
- * GNU General Public License for more details.
- */
-#ifndef CDK_MAIN_H
-#define CDK_MAIN_H
-
-#include <gcrypt.h>
-#include "types.h"
-
-/* The general size of a buffer for the variou modules. */
-#define BUFSIZE 8192
-
-/* This is the default block size for the partial length packet mode. */
-#define DEF_BLOCKSIZE 8192
-#define DEF_BLOCKBITS   13 /* 2^13 = 8192 */
-
-/* For now SHA-1 is used to create fingerprint for keys.
-   But if this will ever change, it is a good idea to
-   have a constant for it to avoid to change it in all files. */
-#define KEY_FPR_LEN 20
-
-#include "context.h"
-
-/* The maximal amount of bits a multi precsion integer can have. */
-#define MAX_MPI_BITS 16384
-#define MAX_MPI_BYTES (MAX_MPI_BITS/8)
-
-
-/* Because newer DSA variants are not limited to SHA-1, we must consider 
- that SHA-512 is used and increase the buffer size of the digest. */
-#define MAX_DIGEST_LEN 64
-
-/* Helper to find out if the signature were made over a user ID
-   or if the signature revokes a previous user ID. */
-#define IS_UID_SIG(s) (((s)->sig_class & ~3) == 0x10)
-#define IS_UID_REV(s) ((s)->sig_class == 0x30)
-
-#define DEBUG_PKT (_cdk_get_log_level () == (CDK_LOG_DEBUG+1))
-
-/* Helper to find out if a key has the requested capability. */
-#define KEY_CAN_ENCRYPT(a) (_cdk_pk_algo_usage ((a)) & CDK_KEY_USG_ENCR)
-#define KEY_CAN_SIGN(a)    (_cdk_pk_algo_usage ((a)) & CDK_KEY_USG_SIGN)
-#define KEY_CAN_AUTH(a)    (_cdk_pk_algo_usage ((a)) & CDK_KEY_USG_AUTH)
-
-/* Helper macro to make sure the buffer is overwritten. */
-#define wipemem(_ptr,_len) do { \
-  volatile char *_vptr = (volatile char *)(_ptr); \
-  size_t _vlen = (_len); \
-  while (_vlen) \
-    { \
-      *_vptr = 0; \
-      _vptr++; \
-      _vlen--; \
-    } } while (0)
-
-/*-- armor.c --*/
-const char * _cdk_armor_get_lineend (void);
-     
-/*-- main.c --*/
-int _cdk_get_log_level (void);
-void _cdk_log_info (const char * fmt, ...);
-void _cdk_log_debug (const char * fmt, ...);
-char * _cdk_passphrase_get (cdk_ctx_t hd, const char *prompt);
-
-/*-- misc.c --*/
-int _cdk_check_args( int overwrite, const char * in, const char * out );
-u32 _cdk_buftou32 (const byte * buf);
-void _cdk_u32tobuf (u32 u, byte * buf);
-const char *_cdk_memistr (const char * buf, size_t buflen, const char * sub);
-cdk_error_t _cdk_map_gcry_error (gcry_error_t err);
-#define map_gcry_error(err) _cdk_map_gcry_error (err)
-
-/* Helper to provide case insentensive strstr version. */
-#define stristr(haystack, needle) \
-    _cdk_memistr((haystack), strlen (haystack), (needle))
-
-/*-- proc-packet.c --*/
-cdk_error_t _cdk_proc_packets (cdk_ctx_t hd, cdk_stream_t inp,
-			       cdk_stream_t data,
-			       const char *output, cdk_stream_t outstream,
-			       gcry_md_hd_t md);
-cdk_error_t _cdk_pkt_write2 (cdk_stream_t out, int pkttype, void *pktctx);
-
-/*-- pubkey.c --*/
-u32 _cdk_pkt_get_keyid (cdk_packet_t pkt, u32 * keyid);
-cdk_error_t _cdk_pkt_get_fingerprint (cdk_packet_t pkt, byte *fpr);
-int _cdk_pk_algo_usage (int algo);
-int _cdk_pk_test_algo (int algo, unsigned int usage);
-int _cdk_sk_get_csum (cdk_pkt_seckey_t sk);
-
-/*-- new-packet.c --*/
-byte * _cdk_subpkt_get_array (cdk_subpkt_t s, int count, size_t * r_nbytes);
-cdk_error_t _cdk_subpkt_copy (cdk_subpkt_t * r_dst, cdk_subpkt_t src);
-void _cdk_pkt_detach_free (cdk_packet_t pkt, int *r_pkttype, void **ctx);
-
-/*-- sig-check.c --*/
-cdk_error_t _cdk_sig_check (cdk_pkt_pubkey_t pk, cdk_pkt_signature_t sig,
-			    gcry_md_hd_t digest, int * r_expired);
-cdk_error_t _cdk_hash_sig_data (cdk_pkt_signature_t sig, gcry_md_hd_t hd);
-cdk_error_t _cdk_hash_userid (cdk_pkt_userid_t uid, int sig_version, gcry_md_hd_t md);
-cdk_error_t _cdk_hash_pubkey (cdk_pkt_pubkey_t pk, gcry_md_hd_t md, 
-			      int use_fpr);
-cdk_error_t _cdk_pk_check_sig (cdk_keydb_hd_t hd,
-			       cdk_kbnode_t knode, 
-			       cdk_kbnode_t snode, int *is_selfsig);
-
-/*-- kbnode.c --*/
-void _cdk_kbnode_add (cdk_kbnode_t root, cdk_kbnode_t node);
-void _cdk_kbnode_clone (cdk_kbnode_t node);
-
-/*-- sesskey.c --*/
-cdk_error_t _cdk_digest_encode_pkcs1 (byte **r_md, size_t *r_mdlen, 
-				      int pk_algo,
-				      const byte * md,
-				      int digest_algo, unsigned nbits);
-cdk_error_t _cdk_sk_unprotect_auto (cdk_ctx_t hd, cdk_pkt_seckey_t sk);
-
-/*-- keydb.c --*/
-int _cdk_keydb_is_secret (cdk_keydb_hd_t db);   
-cdk_error_t _cdk_keydb_get_pk_byusage (cdk_keydb_hd_t hd, const char * name,
-                               cdk_pkt_pubkey_t * ret_pk, int usage);
-cdk_error_t _cdk_keydb_get_sk_byusage (cdk_keydb_hd_t hd, const char * name,
-                               cdk_pkt_seckey_t * ret_sk, int usage);
-cdk_error_t _cdk_keydb_check_userid (cdk_keydb_hd_t hd, u32 * keyid, 
-				     const char * id);
-
-/*-- sign.c --*/
-int _cdk_sig_hash_for (cdk_pkt_pubkey_t pk);
-void _cdk_trim_string (char * s, int canon);
-cdk_error_t _cdk_sig_create (cdk_pkt_pubkey_t pk, cdk_pkt_signature_t sig);
-cdk_error_t _cdk_sig_complete (cdk_pkt_signature_t sig, cdk_pkt_seckey_t sk,
-			       gcry_md_hd_t hd);
-
-/*-- stream.c --*/
-void _cdk_stream_set_compress_algo (cdk_stream_t s, int algo);   
-cdk_error_t _cdk_stream_open_mode (const char *file, const char *mode, 
-				   cdk_stream_t *ret_s);   
-void * _cdk_stream_get_opaque( cdk_stream_t s, int fid );
-const char * _cdk_stream_get_fname( cdk_stream_t s );
-FILE * _cdk_stream_get_fp( cdk_stream_t s );
-int _cdk_stream_gets( cdk_stream_t s, char * buf, size_t count );
-cdk_error_t _cdk_stream_append( const char * file, cdk_stream_t * ret_s );
-int _cdk_stream_get_errno( cdk_stream_t s );
-cdk_error_t _cdk_stream_set_blockmode( cdk_stream_t s, size_t nbytes );
-int _cdk_stream_get_blockmode( cdk_stream_t s );
-int _cdk_stream_puts( cdk_stream_t s, const char * buf );
-cdk_error_t _cdk_stream_fpopen (FILE * fp, unsigned write_mode, 
-				cdk_stream_t *ret_out);
-
-/*-- verify.c --*/
-void _cdk_result_verify_free (cdk_verify_result_t res);
-cdk_verify_result_t _cdk_result_verify_new (void);
-
-
-/*-- read-packet.c --*/
-size_t _cdk_pkt_read_len (FILE * inp, size_t *ret_partial);
-
-/*-- write-packet.c --*/
-cdk_error_t _cdk_pkt_write_fp( FILE * out, cdk_packet_t pkt );
-
-/*-- seskey.c --*/
-cdk_error_t _cdk_s2k_copy (cdk_s2k_t *r_dst, cdk_s2k_t src);
-    
-cdk_error_t cdk_dek_encode_pkcs1 (cdk_dek_t dek, size_t nbits, 
-				  gcry_mpi_t *r_enc);
-cdk_error_t cdk_dek_decode_pkcs1 (cdk_dek_t * ret_dek, gcry_mpi_t esk);
-cdk_error_t cdk_dek_extract (cdk_dek_t * ret_dek, cdk_ctx_t hd,
-			     cdk_pkt_pubkey_enc_t enc,
-			     cdk_pkt_seckey_t sk );
-
-#endif /* CDK_MAIN_H */

+ 0 - 571
src/daemon/https/opencdk/misc.c

@@ -1,571 +0,0 @@
-/* misc.c
- *        Copyright (C) 2002, 2003 Timo Schulz
- *        Copyright (C) 1998-2002, 2007 Free Software Foundation, Inc.
- *
- * This file is part of OpenCDK.
- *
- * OpenCDK is free software; you can redistribute it and/or modify
- * it under the terms of the GNU General Public License as published by
- * the Free Software Foundation; either version 2 of the License, or
- * (at your option) any later version.
- *
- * OpenCDK is distributed in the hope that it will be useful,
- * but WITHOUT ANY WARRANTY; without even the implied warranty of
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
- * GNU General Public License for more details.
- */
-#ifdef HAVE_CONFIG_H
-# include <config.h>
-#endif
-#include <stdio.h>
-#include <string.h>
-#include <ctype.h>
-#include <sys/stat.h>
-
-#include "opencdk.h"
-#include "main.h"
-
-
-u32
-_cdk_buftou32 (const byte * buf)
-{
-  u32 u;
-
-  if (!buf)
-    return 0;
-  u = buf[0] << 24;
-  u |= buf[1] << 16;
-  u |= buf[2] << 8;
-  u |= buf[3];
-  return u;
-}
-
-
-void
-_cdk_u32tobuf (u32 u, byte * buf)
-{
-  if (!buf)
-    return;
-  buf[0] = u >> 24;
-  buf[1] = u >> 16;
-  buf[2] = u >> 8;
-  buf[3] = u;
-}
-
-
-static const char *
-parse_version_number (const char *s, int *number)
-{
-  int val = 0;
-
-  if (*s == '0' && isdigit (s[1]))
-    return NULL;
-  /* leading zeros are not allowed */
-  for (; isdigit (*s); s++)
-    {
-      val *= 10;
-      val += *s - '0';
-    }
-  *number = val;
-  return val < 0 ? NULL : s;
-}
-
-
-static const char *
-parse_version_string (const char *s, int *major, int *minor, int *micro)
-{
-  s = parse_version_number (s, major);
-  if (!s || *s != '.')
-    return NULL;
-  s++;
-  s = parse_version_number (s, minor);
-  if (!s || *s != '.')
-    return NULL;
-  s++;
-  s = parse_version_number (s, micro);
-  if (!s)
-    return NULL;
-  return s;                     /* patchlevel */
-}
-
-
-/**
- * cdk_check_version:
- * @req_version: The requested version
- *
- * Check that the the version of the library is at minimum the requested
- * one and return the version string; return NULL if the condition is
- * not satisfied.  If a NULL is passed to this function, no check is done,
- *but the version string is simply returned.
- **/
-const char *
-cdk_check_version (const char *req_version)
-{
-  const char *ver = VERSION;
-  int my_major, my_minor, my_micro;
-  int rq_major, rq_minor, rq_micro;
-  const char *my_plvl, *rq_plvl;
-
-  if (!req_version)
-    return ver;
-  my_plvl = parse_version_string (ver, &my_major, &my_minor, &my_micro);
-  if (!my_plvl)
-    return NULL;
-  /* very strange our own version is bogus */
-  rq_plvl = parse_version_string (req_version, &rq_major, &rq_minor,
-                                  &rq_micro);
-  if (!rq_plvl)
-    return NULL;                /* req version string is invalid */
-  if (my_major > rq_major
-      || (my_major == rq_major && my_minor > rq_minor)
-      || (my_major == rq_major && my_minor == rq_minor
-          && my_micro > rq_micro)
-      || (my_major == rq_major && my_minor == rq_minor
-          && my_micro == rq_micro && strcmp (my_plvl, rq_plvl) >= 0))
-    return ver;
-  return NULL;
-}
-
-
-/**
- * cdk_strlist_free:
- * @sl: the string list
- * 
- * Release the string list object.
- **/
-void
-cdk_strlist_free (cdk_strlist_t sl)
-{
-  cdk_strlist_t sl2;
-
-  for (; sl; sl = sl2)
-    {
-      sl2 = sl->next;
-      cdk_free (sl);
-    }
-}
-
-
-/**
- * cdk_strlist_add:
- * @list: destination string list
- * @string: the string to add
- * 
- * Add the given list to the string list.
- **/
-cdk_strlist_t
-cdk_strlist_add (cdk_strlist_t * list, const char *string)
-{
-  cdk_strlist_t sl;
-
-  if (!string)
-    return NULL;
-
-  sl = cdk_calloc (1, sizeof *sl + strlen (string) + 1);
-  if (!sl)
-    return NULL;
-  strcpy (sl->d, string);
-  sl->next = *list;
-  *list = sl;
-  return sl;
-}
-
-
-/**
- * cdk_strlist_next:
- * @root: the opaque string list.
- * @r_str: optional argument to store the string data.
- * 
- * Return the next string list node from @root. The optional
- * argument @r_str return the data of the current (!) node.
- **/
-cdk_strlist_t
-cdk_strlist_next (cdk_strlist_t root, const char **r_str)
-{
-  cdk_strlist_t node;
-
-  if (root && r_str)
-    *r_str = root->d;
-  for (node = root->next; node; node = node->next)
-    return node;
-
-  return NULL;
-}
-
-
-const char *
-_cdk_memistr (const char *buf, size_t buflen, const char *sub)
-{
-  const byte *t, *s;
-  size_t n;
-
-  for (t = (byte *) buf, n = buflen, s = (byte *) sub; n; t++, n--)
-    {
-      if (toupper (*t) == toupper (*s))
-        {
-          for (buf = t++, buflen = n--, s++;
-               n && toupper (*t) == toupper ((byte) * s); t++, s++, n--)
-            ;
-          if (!*s)
-            return buf;
-          t = (byte *) buf;
-          n = buflen;
-          s = (byte *) sub;
-        }
-    }
-
-  return NULL;
-}
-
-
-/**
- * cdk_utf8_encode:
- * @string:
- * 
- * Encode the given string in utf8 and return it.
- **/
-char *
-cdk_utf8_encode (const char *string)
-{
-  const byte *s;
-  char *buffer;
-  byte *p;
-  size_t length;
-
-  /* FIXME: We should use iconv if possible for utf8 issues. */
-  for (s = (const byte *) string, length = 0; *s; s++)
-    {
-      length++;
-      if (*s & 0x80)
-        length++;
-    }
-
-  buffer = cdk_calloc (1, length + 1);
-  for (p = (byte *) buffer, s = (byte *) string; *s; s++)
-    {
-      if (*s & 0x80)
-        {
-          *p++ = 0xc0 | ((*s >> 6) & 3);
-          *p++ = 0x80 | (*s & 0x3f);
-        }
-      else
-        *p++ = *s;
-    }
-  *p = 0;
-  return buffer;
-}
-
-
-/**
- * cdk_utf8_decode:
- * @string: the string to decode
- * @length: the length of the string
- * @delim: the delimiter
- *
- * Decode the given utf8 string and return the native representation.
- **/
-char *
-cdk_utf8_decode (const char *string, size_t length, int delim)
-{
-  int nleft;
-  int i;
-  byte encbuf[8];
-  int encidx;
-  const byte *s;
-  size_t n;
-  byte *buffer = NULL, *p = NULL;
-  unsigned long val = 0;
-  size_t slen;
-  int resync = 0;
-
-  /* 1. pass (p==NULL): count the extended utf-8 characters */
-  /* 2. pass (p!=NULL): create string */
-  for (;;)
-    {
-      for (slen = length, nleft = encidx = 0, n = 0, s = (byte *) string;
-           slen; s++, slen--)
-        {
-          if (resync)
-            {
-              if (!(*s < 128 || (*s >= 0xc0 && *s <= 0xfd)))
-                {
-                  /* still invalid */
-                  if (p)
-                    {
-                      sprintf ((char *) p, "\\x%02x", *s);
-                      p += 4;
-                    }
-                  n += 4;
-                  continue;
-                }
-              resync = 0;
-            }
-          if (!nleft)
-            {
-              if (!(*s & 0x80))
-                {               /* plain ascii */
-                  if (*s < 0x20 || *s == 0x7f || *s == delim ||
-                      (delim && *s == '\\'))
-                    {
-                      n++;
-                      if (p)
-                        *p++ = '\\';
-                      switch (*s)
-                        {
-                        case '\n':
-                          n++;
-                          if (p)
-                            *p++ = 'n';
-                          break;
-                        case '\r':
-                          n++;
-                          if (p)
-                            *p++ = 'r';
-                          break;
-                        case '\f':
-                          n++;
-                          if (p)
-                            *p++ = 'f';
-                          break;
-                        case '\v':
-                          n++;
-                          if (p)
-                            *p++ = 'v';
-                          break;
-                        case '\b':
-                          n++;
-                          if (p)
-                            *p++ = 'b';
-                          break;
-                        case 0:
-                          n++;
-                          if (p)
-                            *p++ = '0';
-                          break;
-                        default:
-                          n += 3;
-                          if (p)
-                            {
-                              sprintf ((char *) p, "x%02x", *s);
-                              p += 3;
-                            }
-                          break;
-                        }
-                    }
-                  else
-                    {
-                      if (p)
-                        *p++ = *s;
-                      n++;
-                    }
-                }
-              else if ((*s & 0xe0) == 0xc0)
-                {               /* 110x xxxx */
-                  val = *s & 0x1f;
-                  nleft = 1;
-                  encidx = 0;
-                  encbuf[encidx++] = *s;
-                }
-              else if ((*s & 0xf0) == 0xe0)
-                {               /* 1110 xxxx */
-                  val = *s & 0x0f;
-                  nleft = 2;
-                  encidx = 0;
-                  encbuf[encidx++] = *s;
-                }
-              else if ((*s & 0xf8) == 0xf0)
-                {               /* 1111 0xxx */
-                  val = *s & 0x07;
-                  nleft = 3;
-                  encidx = 0;
-                  encbuf[encidx++] = *s;
-                }
-              else if ((*s & 0xfc) == 0xf8)
-                {               /* 1111 10xx */
-                  val = *s & 0x03;
-                  nleft = 4;
-                  encidx = 0;
-                  encbuf[encidx++] = *s;
-                }
-              else if ((*s & 0xfe) == 0xfc)
-                {               /* 1111 110x */
-                  val = *s & 0x01;
-                  nleft = 5;
-                  encidx = 0;
-                  encbuf[encidx++] = *s;
-                }
-              else
-                {               /* invalid encoding: print as \xnn */
-                  if (p)
-                    {
-                      sprintf ((char *) p, "\\x%02x", *s);
-                      p += 4;
-                    }
-                  n += 4;
-                  resync = 1;
-                }
-            }
-          else if (*s < 0x80 || *s >= 0xc0)
-            {                   /* invalid */
-              if (p)
-                {
-                  for (i = 0; i < encidx; i++)
-                    {
-                      sprintf ((char *) p, "\\x%02x", encbuf[i]);
-                      p += 4;
-                    }
-                  sprintf ((char *) p, "\\x%02x", *s);
-                  p += 4;
-                }
-              n += 4 + 4 * encidx;
-              nleft = 0;
-              encidx = 0;
-              resync = 1;
-            }
-          else
-            {
-              encbuf[encidx++] = *s;
-              val <<= 6;
-              val |= *s & 0x3f;
-              if (!--nleft)
-                {               /* ready native set */
-                  if (val >= 0x80 && val < 256)
-                    {
-                      n++;      /* we can simply print this character */
-                      if (p)
-                        *p++ = val;
-                    }
-                  else
-                    {           /* we do not have a translation: print utf8 */
-                      if (p)
-                        {
-                          for (i = 0; i < encidx; i++)
-                            {
-                              sprintf ((char *) p, "\\x%02x", encbuf[i]);
-                              p += 4;
-                            }
-                        }
-                      n += encidx * 4;
-                      encidx = 0;
-                    }
-                }
-            }
-
-        }
-      if (!buffer)              /* allocate the buffer after the first pass */
-        buffer = p = cdk_malloc (n + 1);
-      else
-        {
-          *p = 0;               /* make a string */
-          return (char *) buffer;
-        }
-    }
-}
-
-
-/* Map the gcrypt error to a valid opencdk error constant. */
-cdk_error_t
-_cdk_map_gcry_error (gcry_error_t err)
-{
-  /* FIXME: We need to catch them all. */
-  switch (gpg_err_code (err))
-    {
-    case GPG_ERR_NO_ERROR:
-      return CDK_Success;
-    case GPG_ERR_INV_VALUE:
-      return CDK_Inv_Value;
-    case GPG_ERR_GENERAL:
-      return CDK_General_Error;
-    case GPG_ERR_INV_PACKET:
-      return CDK_Inv_Packet;
-    case GPG_ERR_TOO_SHORT:
-      return CDK_Too_Short;
-    case GPG_ERR_TOO_LARGE:
-      return CDK_Inv_Value;
-    case GPG_ERR_NO_PUBKEY:
-    case GPG_ERR_NO_SECKEY:
-      return CDK_Error_No_Key;
-    case GPG_ERR_BAD_SIGNATURE:
-      return CDK_Bad_Sig;
-    case GPG_ERR_NO_DATA:
-      return CDK_No_Data;
-    default:
-      break;
-    }
-
-  return (cdk_error_t) err;
-}
-
-
-/* Remove all trailing white spaces from the string. */
-void
-_cdk_trim_string (char *s, int canon)
-{
-  while (s && *s &&
-         (s[strlen (s) - 1] == '\t' ||
-          s[strlen (s) - 1] == '\r' ||
-          s[strlen (s) - 1] == '\n' || s[strlen (s) - 1] == ' '))
-    s[strlen (s) - 1] = '\0';
-  if (canon)
-    strcat (s, "\r\n");
-}
-
-
-int
-_cdk_check_args (int overwrite, const char *in, const char *out)
-{
-  struct stat stbuf;
-
-  if (!in || !out)
-    return CDK_Inv_Value;
-  if (strlen (in) == strlen (out) && strcmp (in, out) == 0)
-    return CDK_Inv_Mode;
-  if (!overwrite && !stat (out, &stbuf))
-    return CDK_Inv_Mode;
-  return 0;
-}
-
-#ifdef _WIN32
-#include <io.h>
-#include <fcntl.h>
-
-FILE *
-my_tmpfile (void)
-{
-  /* Because the tmpfile() version of wine is not really useful,
-     we implement our own version to avoid problems with 'make check'. */
-  static const char *letters = "abcdefghijklmnopqrstuvwxyz";
-  char buf[512], rnd[24];
-  FILE *fp;
-  int fd, i;
-
-  gcry_create_nonce (rnd, DIM (rnd));
-  for (i = 0; i < DIM (rnd) - 1; i++)
-    {
-      char c = letters[(unsigned char) rnd[i] % 26];
-      rnd[i] = c;
-    }
-  rnd[DIM (rnd) - 1] = 0;
-  if (!GetTempPath (464, buf))
-    return NULL;
-  strcat (buf, "_cdk_");
-  strcat (buf, rnd);
-
-  /* We need to make sure the file will be deleted when it is closed. */
-  fd = _open (buf, _O_CREAT | _O_EXCL | _O_TEMPORARY |
-              _O_RDWR | _O_BINARY, _S_IREAD | _S_IWRITE);
-  if (fd == -1)
-    return NULL;
-  fp = fdopen (fd, "w+b");
-  if (fp != NULL)
-    return fp;
-  _close (fd);
-  return NULL;
-}
-#else
-FILE *
-my_tmpfile (void)
-{
-  return tmpfile ();
-}
-#endif

+ 0 - 874
src/daemon/https/opencdk/new-packet.c

@@ -1,874 +0,0 @@
-/* new-packet.c - packet handling (freeing, copying, ...)
- *       Copyright (C) 2001, 2002, 2003, 2007 Timo Schulz
- *
- * This file is part of OpenCDK.
- *
- * OpenCDK is free software; you can redistribute it and/or modify 
- * it under the terms of the GNU General Public License as published by 
- * the Free Software Foundation; either version 2 of the License, or 
- * (at your option) any later version. 
- *  
- * OpenCDK is distributed in the hope that it will be useful, 
- * but WITHOUT ANY WARRANTY; without even the implied warranty of 
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the 
- * GNU General Public License for more details. 
- */
-#ifdef HAVE_CONFIG_H
-# include <config.h>
-#endif
-#include <string.h>
-#include <stdio.h>
-#include <assert.h>
-
-#include "opencdk.h"
-#include "main.h"
-#include "packet.h"
-
-
-/* Release an array of MPI values. */
-void
-_cdk_free_mpibuf (size_t n, gcry_mpi_t * array)
-{
-  while (n--)
-    {
-      gcry_mpi_release (array[n]);
-      array[n] = NULL;
-    }
-}
-
-
-/**
- * cdk_pkt_new:
- * @r_pkt: the new packet
- * 
- * Allocate a new packet.
- **/
-cdk_error_t
-cdk_pkt_new (cdk_packet_t * r_pkt)
-{
-  cdk_packet_t pkt;
-
-  if (!r_pkt)
-    return CDK_Inv_Value;
-  pkt = cdk_calloc (1, sizeof *pkt);
-  if (!pkt)
-    return CDK_Out_Of_Core;
-  *r_pkt = pkt;
-  return 0;
-}
-
-
-static void
-free_symkey_enc (cdk_pkt_symkey_enc_t enc)
-{
-  if (!enc)
-    return;
-  cdk_s2k_free (enc->s2k);
-  cdk_free (enc);
-}
-
-
-static void
-free_pubkey_enc (cdk_pkt_pubkey_enc_t enc)
-{
-  size_t nenc;
-
-  if (!enc)
-    return;
-
-  nenc = cdk_pk_get_nenc (enc->pubkey_algo);
-  _cdk_free_mpibuf (nenc, enc->mpi);
-  cdk_free (enc);
-}
-
-
-static void
-free_literal (cdk_pkt_literal_t pt)
-{
-  if (!pt)
-    return;
-  /* The buffer which is referenced in this packet is closed
-     elsewhere. To close it here would cause a double close. */
-  cdk_free (pt);
-}
-
-
-void
-_cdk_free_userid (cdk_pkt_userid_t uid)
-{
-  if (!uid)
-    return;
-
-  cdk_free (uid->prefs);
-  uid->prefs = NULL;
-  cdk_free (uid->attrib_img);
-  uid->attrib_img = NULL;
-  cdk_free (uid);
-}
-
-
-void
-_cdk_free_signature (cdk_pkt_signature_t sig)
-{
-  cdk_desig_revoker_t r;
-  size_t nsig;
-
-  if (!sig)
-    return;
-
-  nsig = cdk_pk_get_nsig (sig->pubkey_algo);
-  _cdk_free_mpibuf (nsig, sig->mpi);
-
-  cdk_subpkt_free (sig->hashed);
-  sig->hashed = NULL;
-  cdk_subpkt_free (sig->unhashed);
-  sig->unhashed = NULL;
-  while (sig->revkeys)
-    {
-      r = sig->revkeys->next;
-      cdk_free (sig->revkeys);
-      sig->revkeys = r;
-    }
-  cdk_free (sig);
-}
-
-
-void
-cdk_pk_release (cdk_pubkey_t pk)
-{
-  size_t npkey;
-
-  if (!pk)
-    return;
-
-  npkey = cdk_pk_get_npkey (pk->pubkey_algo);
-  _cdk_free_userid (pk->uid);
-  pk->uid = NULL;
-  cdk_free (pk->prefs);
-  pk->prefs = NULL;
-  _cdk_free_mpibuf (npkey, pk->mpi);
-  cdk_free (pk);
-}
-
-
-void
-cdk_sk_release (cdk_seckey_t sk)
-{
-  size_t nskey;
-
-  if (!sk)
-    return;
-
-  nskey = cdk_pk_get_nskey (sk->pubkey_algo);
-  _cdk_free_mpibuf (nskey, sk->mpi);
-  cdk_free (sk->encdata);
-  sk->encdata = NULL;
-  cdk_pk_release (sk->pk);
-  sk->pk = NULL;
-  cdk_s2k_free (sk->protect.s2k);
-  sk->protect.s2k = NULL;
-  cdk_free (sk);
-}
-
-
-static void
-free_encrypted (cdk_pkt_encrypted_t enc)
-{
-  if (!enc)
-    return;
-
-  /* This is just a reference for the filters to know where
-     the encrypted data starts and to read from the sream. It
-     us closed elsewhere and to close it here would double close it. */
-  /*cdk_stream_close (enc->buf); */
-  enc->buf = NULL;
-  cdk_free (enc);
-}
-
-
-/* Detach the openpgp packet from the packet structure
-   and release the packet structure itself. */
-void
-_cdk_pkt_detach_free (cdk_packet_t pkt, int *r_pkttype, void **ctx)
-{
-  /* For now we just allow this for keys. */
-  switch (pkt->pkttype)
-    {
-    case CDK_PKT_PUBLIC_KEY:
-    case CDK_PKT_PUBLIC_SUBKEY:
-      *ctx = pkt->pkt.public_key;
-      break;
-
-    case CDK_PKT_SECRET_KEY:
-    case CDK_PKT_SECRET_SUBKEY:
-      *ctx = pkt->pkt.secret_key;
-      break;
-
-    default:
-      *r_pkttype = 0;
-      return;
-    }
-
-  /* The caller might expect a specific packet type and
-     is not interested to store it for later use. */
-  if (r_pkttype)
-    *r_pkttype = pkt->pkttype;
-
-  cdk_free (pkt);
-}
-
-
-void
-cdk_pkt_free (cdk_packet_t pkt)
-{
-  if (!pkt)
-    return;
-
-  switch (pkt->pkttype)
-    {
-    case CDK_PKT_ATTRIBUTE:
-    case CDK_PKT_USER_ID:
-      _cdk_free_userid (pkt->pkt.user_id);
-      break;
-    case CDK_PKT_PUBLIC_KEY:
-    case CDK_PKT_PUBLIC_SUBKEY:
-      cdk_pk_release (pkt->pkt.public_key);
-      break;
-    case CDK_PKT_SECRET_KEY:
-    case CDK_PKT_SECRET_SUBKEY:
-      cdk_sk_release (pkt->pkt.secret_key);
-      break;
-    case CDK_PKT_SIGNATURE:
-      _cdk_free_signature (pkt->pkt.signature);
-      break;
-    case CDK_PKT_PUBKEY_ENC:
-      free_pubkey_enc (pkt->pkt.pubkey_enc);
-      break;
-    case CDK_PKT_SYMKEY_ENC:
-      free_symkey_enc (pkt->pkt.symkey_enc);
-      break;
-    case CDK_PKT_MDC:
-      cdk_free (pkt->pkt.mdc);
-      break;
-    case CDK_PKT_ENCRYPTED:
-    case CDK_PKT_ENCRYPTED_MDC:
-      free_encrypted (pkt->pkt.encrypted);
-      break;
-    case CDK_PKT_ONEPASS_SIG:
-      cdk_free (pkt->pkt.onepass_sig);
-      break;
-    case CDK_PKT_LITERAL:
-      free_literal (pkt->pkt.literal);
-      break;
-    case CDK_PKT_COMPRESSED:
-      cdk_free (pkt->pkt.compressed);
-      break;
-    default:
-      break;
-    }
-
-  /* Reset the packet type to avoid, when cdk_pkt_release() will be
-     used, that the second cdk_pkt_free() call will double free the data. */
-  pkt->pkttype = 0;
-}
-
-
-/**
- * cdk_pkt_release:
- * @pkt: the packet
- * 
- * Free the contents of the given package and
- * release the memory of the structure.
- **/
-void
-cdk_pkt_release (cdk_packet_t pkt)
-{
-  if (!pkt)
-    return;
-  cdk_pkt_free (pkt);
-  cdk_free (pkt);
-}
-
-
-/**
- * cdk_pkt_alloc:
- * @r_pkt: output is the new packet
- * @pkttype: the requested packet type
- * 
- * Allocate a new packet structure with the given packet type.
- **/
-cdk_error_t
-cdk_pkt_alloc (cdk_packet_t * r_pkt, int pkttype)
-{
-  cdk_packet_t pkt;
-  int rc;
-
-  if (!r_pkt)
-    return CDK_Inv_Value;
-
-  rc = cdk_pkt_new (&pkt);
-  if (rc)
-    return rc;
-
-  switch (pkttype)
-    {
-    case CDK_PKT_USER_ID:
-      pkt->pkt.user_id = cdk_calloc (1, sizeof pkt->pkt.user_id);
-      if (!pkt->pkt.user_id)
-        return CDK_Out_Of_Core;
-      break;
-
-    case CDK_PKT_PUBLIC_KEY:
-    case CDK_PKT_PUBLIC_SUBKEY:
-      pkt->pkt.public_key = cdk_calloc (1, sizeof *pkt->pkt.public_key);
-      if (!pkt->pkt.public_key)
-        return CDK_Out_Of_Core;
-      break;
-
-    case CDK_PKT_SECRET_KEY:
-    case CDK_PKT_SECRET_SUBKEY:
-      pkt->pkt.secret_key = cdk_calloc (1, sizeof *pkt->pkt.secret_key);
-      pkt->pkt.secret_key->pk =
-        cdk_calloc (1, sizeof *pkt->pkt.secret_key->pk);
-      if (!pkt->pkt.secret_key || !pkt->pkt.secret_key->pk)
-        return CDK_Out_Of_Core;
-      break;
-
-    case CDK_PKT_SIGNATURE:
-      pkt->pkt.signature = cdk_calloc (1, sizeof *pkt->pkt.signature);
-      if (!pkt->pkt.signature)
-        return CDK_Out_Of_Core;
-      break;
-
-    case CDK_PKT_SYMKEY_ENC:
-      pkt->pkt.symkey_enc = cdk_calloc (1, sizeof *pkt->pkt.symkey_enc);
-      if (!pkt->pkt.symkey_enc)
-        return CDK_Out_Of_Core;
-      break;
-
-    case CDK_PKT_PUBKEY_ENC:
-      pkt->pkt.pubkey_enc = cdk_calloc (1, sizeof *pkt->pkt.pubkey_enc);
-      if (!pkt->pkt.pubkey_enc)
-        return CDK_Out_Of_Core;
-      break;
-
-    case CDK_PKT_MDC:
-      pkt->pkt.mdc = cdk_calloc (1, sizeof *pkt->pkt.mdc);
-      if (!pkt->pkt.mdc)
-        return CDK_Out_Of_Core;
-      break;
-
-    case CDK_PKT_ENCRYPTED_MDC:
-    case CDK_PKT_ENCRYPTED:
-      pkt->pkt.symkey_enc = cdk_calloc (1, sizeof *pkt->pkt.symkey_enc);
-      if (!pkt->pkt.symkey_enc)
-        return CDK_Out_Of_Core;
-      break;
-
-    case CDK_PKT_ONEPASS_SIG:
-      pkt->pkt.onepass_sig = cdk_calloc (1, sizeof *pkt->pkt.onepass_sig);
-      if (!pkt->pkt.onepass_sig)
-        return CDK_Out_Of_Core;
-      break;
-
-    case CDK_PKT_LITERAL:
-      /* FIXME: We would need the size of the file name to allocate extra
-         bytes, otherwise the result would be useless. */
-      pkt->pkt.literal = cdk_calloc (1, sizeof *pkt->pkt.literal);
-      if (!pkt->pkt.literal)
-        return CDK_Out_Of_Core;
-      break;
-    }
-  pkt->pkttype = pkttype;
-  *r_pkt = pkt;
-  return 0;
-}
-
-
-cdk_prefitem_t
-_cdk_copy_prefs (const cdk_prefitem_t prefs)
-{
-  size_t n = 0;
-  struct cdk_prefitem_s *new_prefs;
-
-  if (!prefs)
-    return NULL;
-
-  for (n = 0; prefs[n].type; n++)
-    ;
-  new_prefs = cdk_calloc (1, sizeof *new_prefs * (n + 1));
-  if (!new_prefs)
-    return NULL;
-  for (n = 0; prefs[n].type; n++)
-    {
-      new_prefs[n].type = prefs[n].type;
-      new_prefs[n].value = prefs[n].value;
-    }
-  new_prefs[n].type = CDK_PREFTYPE_NONE;
-  new_prefs[n].value = 0;
-  return new_prefs;
-}
-
-
-cdk_error_t
-_cdk_copy_userid (cdk_pkt_userid_t * dst, cdk_pkt_userid_t src)
-{
-  cdk_pkt_userid_t u;
-
-  if (!dst || !src)
-    return CDK_Inv_Value;
-
-  *dst = NULL;
-  u = cdk_calloc (1, sizeof *u + strlen (src->name) + 1);
-  if (!u)
-    return CDK_Out_Of_Core;
-  memcpy (u, src, sizeof *u);
-  memcpy (u->name, src->name, strlen (src->name));
-  u->prefs = _cdk_copy_prefs (src->prefs);
-  if (src->selfsig)
-    _cdk_copy_signature (&u->selfsig, src->selfsig);
-  *dst = u;
-
-  return 0;
-}
-
-
-cdk_error_t
-_cdk_copy_pubkey (cdk_pkt_pubkey_t * dst, cdk_pkt_pubkey_t src)
-{
-  cdk_pkt_pubkey_t k;
-  int i;
-
-  if (!dst || !src)
-    return CDK_Inv_Value;
-
-  *dst = NULL;
-  k = cdk_calloc (1, sizeof *k);
-  if (!k)
-    return CDK_Out_Of_Core;
-  memcpy (k, src, sizeof *k);
-  if (src->uid)
-    _cdk_copy_userid (&k->uid, src->uid);
-  if (src->prefs)
-    k->prefs = _cdk_copy_prefs (src->prefs);
-  for (i = 0; i < cdk_pk_get_npkey (src->pubkey_algo); i++)
-    k->mpi[i] = gcry_mpi_copy (src->mpi[i]);
-  *dst = k;
-
-  return 0;
-}
-
-
-cdk_error_t
-_cdk_copy_seckey (cdk_pkt_seckey_t * dst, cdk_pkt_seckey_t src)
-{
-  cdk_pkt_seckey_t k;
-  int i;
-
-  if (!dst || !src)
-    return CDK_Inv_Value;
-
-  *dst = NULL;
-  k = cdk_calloc (1, sizeof *k);
-  if (!k)
-    return CDK_Out_Of_Core;
-  memcpy (k, src, sizeof *k);
-  _cdk_copy_pubkey (&k->pk, src->pk);
-
-  if (src->encdata)
-    {
-      k->encdata = cdk_calloc (1, src->enclen + 1);
-      if (!k->encdata)
-        return CDK_Out_Of_Core;
-      memcpy (k->encdata, src->encdata, src->enclen);
-    }
-
-  _cdk_s2k_copy (&k->protect.s2k, src->protect.s2k);
-
-  for (i = 0; i < cdk_pk_get_nskey (src->pubkey_algo); i++)
-    {
-      k->mpi[i] = gcry_mpi_copy (src->mpi[i]);
-      gcry_mpi_set_flag (k->mpi[i], GCRYMPI_FLAG_SECURE);
-    }
-
-  *dst = k;
-  return 0;
-}
-
-
-cdk_error_t
-_cdk_copy_pk_to_sk (cdk_pkt_pubkey_t pk, cdk_pkt_seckey_t sk)
-{
-  if (!pk || !sk)
-    return CDK_Inv_Value;
-
-  sk->version = pk->version;
-  sk->expiredate = pk->expiredate;
-  sk->pubkey_algo = pk->pubkey_algo;
-  sk->has_expired = pk->has_expired;
-  sk->is_revoked = pk->is_revoked;
-  sk->main_keyid[0] = pk->main_keyid[0];
-  sk->main_keyid[1] = pk->main_keyid[1];
-  sk->keyid[0] = pk->keyid[0];
-  sk->keyid[1] = pk->keyid[1];
-
-  return 0;
-}
-
-
-cdk_error_t
-_cdk_copy_signature (cdk_pkt_signature_t * dst, cdk_pkt_signature_t src)
-{
-  cdk_pkt_signature_t s;
-
-  if (!dst || !src)
-    return CDK_Inv_Value;
-
-  *dst = NULL;
-  s = cdk_calloc (1, sizeof *s);
-  if (!s)
-    return CDK_Out_Of_Core;
-  memcpy (s, src, sizeof *src);
-  _cdk_subpkt_copy (&s->hashed, src->hashed);
-  _cdk_subpkt_copy (&s->unhashed, src->unhashed);
-  /* FIXME: Copy MPI parts */
-  *dst = s;
-
-  return 0;
-}
-
-
-cdk_error_t
-_cdk_pubkey_compare (cdk_pkt_pubkey_t a, cdk_pkt_pubkey_t b)
-{
-  int na, nb, i;
-
-  if (a->timestamp != b->timestamp || a->pubkey_algo != b->pubkey_algo)
-    return -1;
-  if (a->version < 4 && a->expiredate != b->expiredate)
-    return -1;
-  na = cdk_pk_get_npkey (a->pubkey_algo);
-  nb = cdk_pk_get_npkey (b->pubkey_algo);
-  if (na != nb)
-    return -1;
-
-  for (i = 0; i < na; i++)
-    {
-      if (gcry_mpi_cmp (a->mpi[i], b->mpi[i]))
-        return -1;
-    }
-
-  return 0;
-}
-
-
-/**
- * cdk_subpkt_free:
- * @ctx: the sub packet node to free
- *
- * Release the context.
- **/
-void
-cdk_subpkt_free (cdk_subpkt_t ctx)
-{
-  cdk_subpkt_t s;
-
-  while (ctx)
-    {
-      s = ctx->next;
-      cdk_free (ctx);
-      ctx = s;
-    }
-}
-
-
-/**
- * cdk_subpkt_find:
- * @ctx: the sub packet node
- * @type: the packet type to find
- *
- * Find the given packet type in the node. If no packet with this
- * type was found, return null otherwise pointer to the node.
- **/
-cdk_subpkt_t
-cdk_subpkt_find (cdk_subpkt_t ctx, size_t type)
-{
-  return cdk_subpkt_find_nth (ctx, type, 0);
-}
-
-/**
- * cdk_subpkt_type_count:
- * @ctx: The sub packet context
- * @type: The sub packet type.
- * 
- * Return the amount of sub packets with this type.
- **/
-size_t
-cdk_subpkt_type_count (cdk_subpkt_t ctx, size_t type)
-{
-  cdk_subpkt_t s;
-  size_t count;
-
-  count = 0;
-  for (s = ctx; s; s = s->next)
-    {
-      if (s->type == type)
-        count++;
-    }
-
-  return count;
-}
-
-
-/**
- * cdk_subpkt_find_nth:
- * @ctx: The sub packet context
- * @type: The sub packet type
- * @index: The nth packet to retrieve, 0 means the first
- * 
- * Return the nth sub packet of the given type.
- **/
-cdk_subpkt_t
-cdk_subpkt_find_nth (cdk_subpkt_t ctx, size_t type, size_t idx)
-{
-  cdk_subpkt_t s;
-  size_t pos;
-
-  pos = 0;
-  for (s = ctx; s; s = s->next)
-    {
-      if (s->type == type && pos++ == idx)
-        return s;
-    }
-
-  return NULL;
-}
-
-
-/**
- * cdk_subpkt_new:
- * @size: the size of the new context
- *
- * Create a new sub packet node with the size of @size.
- **/
-cdk_subpkt_t
-cdk_subpkt_new (size_t size)
-{
-  cdk_subpkt_t s;
-
-  if (!size)
-    return NULL;
-  s = cdk_calloc (1, sizeof *s + size + 1);
-  if (!s)
-    return NULL;
-  return s;
-}
-
-
-/**
- * cdk_subpkt_get_data:
- * @ctx: the sub packet node
- * @r_type: pointer store the packet type
- * @r_nbytes: pointer to store the packet size
- *
- * Extract the data from the given sub packet. The type is returned
- * in @r_type and the size in @r_nbytes.
- **/
-const byte *
-cdk_subpkt_get_data (cdk_subpkt_t ctx, size_t * r_type, size_t * r_nbytes)
-{
-  if (!ctx || !r_nbytes)
-    return NULL;
-  if (r_type)
-    *r_type = ctx->type;
-  *r_nbytes = ctx->size;
-  return ctx->d;
-}
-
-
-/**
- * cdk_subpkt_add:
- * @root: the root node
- * @node: the node to add
- *
- * Add the node in @node to the root node @root.
- **/
-cdk_error_t
-cdk_subpkt_add (cdk_subpkt_t root, cdk_subpkt_t node)
-{
-  cdk_subpkt_t n1;
-
-  if (!root)
-    return CDK_Inv_Value;
-  for (n1 = root; n1->next; n1 = n1->next)
-    ;
-  n1->next = node;
-  return 0;
-}
-
-
-byte *
-_cdk_subpkt_get_array (cdk_subpkt_t s, int count, size_t * r_nbytes)
-{
-  cdk_subpkt_t list;
-  byte *buf;
-  size_t n, nbytes;
-
-  if (!s)
-    {
-      if (r_nbytes)
-        *r_nbytes = 0;
-      return NULL;
-    }
-
-  for (n = 0, list = s; list; list = list->next)
-    {
-      n++;                      /* type */
-      n += list->size;
-      if (list->size < 192)
-        n++;
-      else if (list->size < 8384)
-        n += 2;
-      else
-        n += 5;
-    }
-  buf = cdk_calloc (1, n + 1);
-  if (!buf)
-    return NULL;
-
-  n = 0;
-  for (list = s; list; list = list->next)
-    {
-      nbytes = 1 + list->size;  /* type */
-      if (nbytes < 192)
-        buf[n++] = nbytes;
-      else if (nbytes < 8384)
-        {
-          buf[n++] = nbytes / 256 + 192;
-          buf[n++] = nbytes % 256;
-        }
-      else
-        {
-          buf[n++] = 0xFF;
-          buf[n++] = nbytes >> 24;
-          buf[n++] = nbytes >> 16;
-          buf[n++] = nbytes >> 8;
-          buf[n++] = nbytes;
-        }
-      buf[n++] = list->type;
-      memcpy (buf + n, list->d, list->size);
-      n += list->size;
-    }
-
-  if (count)
-    {
-      cdk_free (buf);
-      buf = NULL;
-    }
-  if (r_nbytes)
-    *r_nbytes = n;
-  return buf;
-}
-
-
-cdk_error_t
-_cdk_subpkt_copy (cdk_subpkt_t * r_dst, cdk_subpkt_t src)
-{
-  cdk_subpkt_t root, p, node;
-
-  if (!src || !r_dst)
-    return CDK_Inv_Value;
-
-  root = NULL;
-  for (p = src; p; p = p->next)
-    {
-      node = cdk_subpkt_new (p->size);
-      if (node)
-        {
-          memcpy (node->d, p->d, p->size);
-          node->type = p->type;
-          node->size = p->size;
-        }
-      if (!root)
-        root = node;
-      else
-        cdk_subpkt_add (root, node);
-    }
-  *r_dst = root;
-  return 0;
-}
-
-
-/**
- * cdk_subpkt_init:
- * @node: the sub packet node
- * @type: type of the packet which data should be initialized
- * @buf: the buffer with the actual data
- * @buflen: the size of the data
- *
- * Set the packet data of the given root and set the type of it.
- **/
-void
-cdk_subpkt_init (cdk_subpkt_t node, size_t type,
-                 const void *buf, size_t buflen)
-{
-  if (!node)
-    return;
-  node->type = type;
-  node->size = buflen;
-  memcpy (node->d, buf, buflen);
-}
-
-
-/* FIXME: We need to think of a public interface for it. */
-const byte *
-cdk_key_desig_revoker_walk (cdk_desig_revoker_t root,
-                            cdk_desig_revoker_t * ctx,
-                            int *r_class, int *r_algid)
-{
-  cdk_desig_revoker_t n;
-
-  if (!*ctx)
-    {
-      *ctx = root;
-      n = root;
-    }
-  else
-    {
-      n = (*ctx)->next;
-      *ctx = n;
-    }
-
-  if (n && r_class && r_algid)
-    {
-      *r_class = n->r_class;
-      *r_algid = n->algid;
-    }
-
-  return n ? n->fpr : NULL;
-}
-
-
-/**
- * cdk_subpkt_find_next:
- * @root: the base where to begin the iteration
- * @type: the type to find or 0 for the next node.
- * 
- * Try to find the next node after @root with type.
- * If type is 0, the next node will be returned.
- **/
-cdk_subpkt_t
-cdk_subpkt_find_next (cdk_subpkt_t root, size_t type)
-{
-  cdk_subpkt_t node;
-
-  for (node = root->next; node; node = node->next)
-    {
-      if (!type)
-        return node;
-      else if (node->type == type)
-        return node;
-    }
-
-  return NULL;
-}

+ 0 - 1169
src/daemon/https/opencdk/opencdk.h

@@ -1,1169 +0,0 @@
-/* opencdk.h - Open Crypto Development Kit (OpenCDK)
- *        Copyright (C) 2001, 2002, 2003, 2007 Timo Schulz
- *        Copyright (C) 2006, 2007 Free Software Foundation, Inc. 
- *
- * This file is part of OpenCDK.
- *
- * OpenCDK is free software; you can redistribute it and/or modify
- * it under the terms of the GNU General Public License as published by
- * the Free Software Foundation; either version 2 of the License, or
- * (at your option) any later version.
- *
- * OpenCDK is distributed in the hope that it will be useful,
- * but WITHOUT ANY WARRANTY; without even the implied warranty of
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
- * GNU General Public License for more details.
- */
-
-#ifndef OPENCDK_H
-#define OPENCDK_H
-
-#include <stddef.h> /* for size_t */
-#include <stdarg.h>
-#include <gcrypt.h>
-
-/* The OpenCDK version as a string. */
-#define OPENCDK_VERSION "0.6.6"
-
-/* The OpenCDK version as integer components major.minor.path */
-#define OPENCDK_VERSION_MAJOR 0
-#define OPENCDK_VERSION_MINOR 6
-#define OPENCDK_VERSION_PATCH 6
-
-#ifdef __cplusplus
-extern "C" {
-#if 0
-}
-#endif
-#endif
-    
-/* General contexts */
-
-/* 'Session' handle to support the various options and run-time
-   information. */
-struct cdk_ctx_s;
-typedef struct cdk_ctx_s *cdk_ctx_t;
-
-/* A generic context to store list of strings. */
-struct cdk_strlist_s;
-typedef struct cdk_strlist_s *cdk_strlist_t;
-
-/* Context used to list keys of a keyring. */
-struct cdk_listkey_s;
-typedef struct cdk_listkey_s *cdk_listkey_t;
-
-/* Opaque Data Encryption Key (DEK) context. */
-struct cdk_dek_s;
-typedef struct cdk_dek_s *cdk_dek_t;
-
-/* Opaque String to Key (S2K) handle. */
-struct cdk_s2k_s;
-typedef struct cdk_s2k_s *cdk_s2k_t;
-
-/* Abstract I/O object, a stream, which is used for most operations. */
-struct cdk_stream_s;
-typedef struct cdk_stream_s *cdk_stream_t;
-
-/* Opaque handle for the user ID preferences. */
-struct cdk_prefitem_s;
-typedef struct cdk_prefitem_s *cdk_prefitem_t;
-
-/* Node to store a single key node packet. */
-struct cdk_kbnode_s;
-typedef struct cdk_kbnode_s *cdk_kbnode_t;
-
-/* Key database handle. */
-struct cdk_keydb_hd_s;
-typedef struct cdk_keydb_hd_s *cdk_keydb_hd_t;
-
-/* Context to store a list of recipient keys. */
-struct cdk_keylist_s;
-typedef struct cdk_keylist_s *cdk_keylist_t;
-
-/* Context to encapsulate a single sub packet of a signature. */
-struct cdk_subpkt_s;
-typedef struct cdk_subpkt_s *cdk_subpkt_t;
-
-/* Context used to generate key pairs. */
-struct cdk_keygen_ctx_s;
-typedef struct cdk_keygen_ctx_s *cdk_keygen_ctx_t;
-
-/* Handle for a single designated revoker. */
-struct cdk_desig_revoker_s;
-typedef struct cdk_desig_revoker_s *cdk_desig_revoker_t;
-
-/* Alias for backward compatibility. */
-typedef gcry_mpi_t cdk_mpi_t;
-
-
-/* All valid error constants. */
-typedef enum {
-    CDK_EOF = -1,
-    CDK_Success = 0,
-    CDK_General_Error = 1,
-    CDK_File_Error = 2,
-    CDK_Bad_Sig = 3,
-    CDK_Inv_Packet = 4,
-    CDK_Inv_Algo = 5,
-    CDK_Not_Implemented = 6,
-    CDK_Armor_Error = 8,
-    CDK_Armor_CRC_Error = 9,
-    CDK_MPI_Error = 10,
-    CDK_Inv_Value = 11,
-    CDK_Error_No_Key = 12,
-    CDK_Chksum_Error = 13,
-    CDK_Time_Conflict = 14,
-    CDK_Zlib_Error = 15,
-    CDK_Weak_Key = 16,
-    CDK_Out_Of_Core = 17,
-    CDK_Wrong_Seckey = 18,
-    CDK_Bad_MDC = 19,
-    CDK_Inv_Mode = 20,
-    CDK_Error_No_Keyring = 21,
-    CDK_Wrong_Format = 22,
-    CDK_Inv_Packet_Ver = 23,
-    CDK_Too_Short = 24,
-    CDK_Unusable_Key = 25,
-    CDK_No_Data = 26,
-    CDK_No_Passphrase = 27,
-    CDK_Network_Error = 28
-} cdk_error_t;
-
-
-enum cdk_control_flags {
-    CDK_CTLF_SET          =  0, /* Value to set an option */
-    CDK_CTLF_GET          =  1, /* Value to get an option */
-    CDK_CTL_DIGEST        = 10, /* Option to set the digest algorithm. */
-    CDK_CTL_CIPHER        = 11, /* Option to set the cipher algorithm. */
-    CDK_CTL_ARMOR         = 12, /* Option to enable armor output. */
-    CDK_CTL_COMPRESS      = 13, /* Option to enable compression. */
-    CDK_CTL_COMPAT        = 14, /* Option to switch in compat mode. */
-    CDK_CTL_OVERWRITE     = 15, /* Option to enable file overwritting. */
-    CDK_CTL_S2K           = 16, /* Option to set S2K values. */
-    CDK_CTL_FORCE_DIGEST  = 19, /* Force the use of a digest algorithm. */
-    CDK_CTL_BLOCKMODE_ON  = 20  /* Enable partial body lengths */
-};
-
-
-/* Specifies all valid log levels. */
-enum cdk_log_level_t {
-    CDK_LOG_NONE  = 0, /* No log message will be shown. */
-    CDK_LOG_INFO  = 1,
-    CDK_LOG_DEBUG = 2,
-    CDK_LOG_DEBUG_PKT = 3
-};
-
-
-/* All valid compression algorithms in OpenPGP */
-enum cdk_compress_algo_t {
-    CDK_COMPRESS_NONE  = 0,
-    CDK_COMPRESS_ZIP   = 1,
-    CDK_COMPRESS_ZLIB  = 2,
-    CDK_COMPRESS_BZIP2 = 3 /* Not supported in this version */
-};
-
-
-/* All valid public key algorithms valid in OpenPGP */
-enum cdk_pubkey_algo_t {
-    CDK_PK_RSA   =  1,
-    CDK_PK_RSA_E =  2, /* RSA-E and RSA-S are deprecated use RSA instead */
-    CDK_PK_RSA_S =  3, /* and use the key flags in the self signatures. */
-    CDK_PK_ELG_E = 16,
-    CDK_PK_DSA   = 17
-};
-
-
-/* All valid message digest algorithms in OpenPGP. */
-enum cdk_digest_algo_t {
-    CDK_MD_NONE    = 0,
-    CDK_MD_MD5     = 1,
-    CDK_MD_SHA1    = 2,
-    CDK_MD_RMD160  = 3,
-    CDK_MD_SHA256  = 8,
-    CDK_MD_SHA384  = 9,
-    CDK_MD_SHA512  = 10,
-    CDK_MD_SHA224  = 11 /* This algorithm is NOT available. */
-};
-
-
-/* All valid symmetric cipher algorithms in OpenPGP */
-enum cdk_cipher_algo_t {
-    CDK_CIPHER_NONE        = 0,
-    CDK_CIPHER_IDEA        = 1, /* This algorithm is NOT available */
-    CDK_CIPHER_3DES        = 2,
-    CDK_CIPHER_CAST5       = 3,
-    CDK_CIPHER_BLOWFISH    = 4,
-    CDK_CIPHER_AES         = 7,
-    CDK_CIPHER_AES192      = 8,
-    CDK_CIPHER_AES256      = 9,
-    CDK_CIPHER_TWOFISH     = 10
-};
-
-
-/* The valid 'String-To-Key' modes */
-enum cdk_s2k_type_t {
-    CDK_S2K_SIMPLE     = 0,
-    CDK_S2K_SALTED     = 1,
-    CDK_S2K_ITERSALTED = 3
-};
-
-
-/* The different kind of user ID preferences. */
-enum cdk_pref_type_t {
-    CDK_PREFTYPE_NONE = 0,
-    CDK_PREFTYPE_SYM  = 1, /* Symmetric ciphers */
-    CDK_PREFTYPE_HASH = 2, /* Message digests */
-    CDK_PREFTYPE_ZIP  = 3  /* Compression algorithms */
-};
-
-
-/* All valid sub packet types. */
-enum cdk_sig_subpacket_t {
-    CDK_SIGSUBPKT_NONE = 0,
-    CDK_SIGSUBPKT_SIG_CREATED = 2,
-    CDK_SIGSUBPKT_SIG_EXPIRE = 3,
-    CDK_SIGSUBPKT_EXPORTABLE = 4,
-    CDK_SIGSUBPKT_TRUST = 5,
-    CDK_SIGSUBPKT_REGEXP = 6,
-    CDK_SIGSUBPKT_REVOCABLE = 7,
-    CDK_SIGSUBPKT_KEY_EXPIRE = 9,
-    CDK_SIGSUBPKT_PREFS_SYM = 11,
-    CDK_SIGSUBPKT_REV_KEY = 12,
-    CDK_SIGSUBPKT_ISSUER = 16,
-    CDK_SIGSUBPKT_NOTATION = 20,
-    CDK_SIGSUBPKT_PREFS_HASH = 21,
-    CDK_SIGSUBPKT_PREFS_ZIP = 22,
-    CDK_SIGSUBPKT_KS_FLAGS = 23,
-    CDK_SIGSUBPKT_PREF_KS = 24,
-    CDK_SIGSUBPKT_PRIMARY_UID = 25,
-    CDK_SIGSUBPKT_POLICY = 26,
-    CDK_SIGSUBPKT_KEY_FLAGS = 27,
-    CDK_SIGSUBPKT_SIGNERS_UID = 28,
-    CDK_SIGSUBPKT_REVOC_REASON = 29,
-    CDK_SIGSUBPKT_FEATURES = 30
-};
-
-
-/* All valid armor types. */
-enum cdk_armor_type_t {
-    CDK_ARMOR_MESSAGE   = 0,
-    CDK_ARMOR_PUBKEY    = 1,
-    CDK_ARMOR_SECKEY    = 2,
-    CDK_ARMOR_SIGNATURE = 3,
-    CDK_ARMOR_CLEARSIG  = 4
-};
-
-enum cdk_keydb_flag_t {
-    /* Valid database search modes */
-    CDK_DBSEARCH_EXACT       =   1, /* Exact string search */
-    CDK_DBSEARCH_SUBSTR      =   2, /* Sub string search */
-    CDK_DBSEARCH_SHORT_KEYID =   3, /* 32-bit keyid search */
-    CDK_DBSEARCH_KEYID       =   4, /* 64-bit keyid search */
-    CDK_DBSEARCH_FPR         =   5, /* 160-bit fingerprint search */
-    CDK_DBSEARCH_NEXT        =   6, /* Enumerate all keys */
-    CDK_DBSEARCH_AUTO        =   7, /* Try to classify the string */
-    /* Valid database types */
-    CDK_DBTYPE_PK_KEYRING    = 100, /* A file with one or more public keys */
-    CDK_DBTYPE_SK_KEYRING    = 101, /* A file with one or more secret keys */
-    CDK_DBTYPE_DATA          = 102, /* A buffer with at least one public key */
-    CDK_DBTYPE_STREAM	     = 103  /* A stream is used to read keys from */
-};
-
-
-/* All valid modes for cdk_data_transform() */
-enum cdk_crypto_mode_t {
-    CDK_CRYPTYPE_NONE    = 0,
-    CDK_CRYPTYPE_ENCRYPT = 1,
-    CDK_CRYPTYPE_DECRYPT = 2,
-    CDK_CRYPTYPE_SIGN    = 3,
-    CDK_CRYPTYPE_VERIFY  = 4,
-    CDK_CRYPTYPE_EXPORT  = 5,
-    CDK_CRYPTYPE_IMPORT  = 6
-};
-
-
-/* A list of valid public key usages. */
-enum cdk_key_usage_t {
-    CDK_KEY_USG_ENCR = 1, /* Key can be used for encryption. */
-    CDK_KEY_USG_SIGN = 2, /* Key can be used for signing and certifying. */
-    CDK_KEY_USG_AUTH = 4  /* Key can be used for authentication. */
-};
-
-
-/* Valid flags for keys. */
-enum cdk_key_flag_t {
-    CDK_KEY_VALID   = 0,
-    CDK_KEY_INVALID = 1, /* Missing or wrong self signature */
-    CDK_KEY_EXPIRED = 2, /* Key is expired. */
-    CDK_KEY_REVOKED = 4, /* Key has been revoked. */
-    CDK_KEY_NOSIGNER = 8
-};
-
-
-/* Trust values and flags for keys and user IDs */
-enum cdk_trust_flag_t {
-    CDK_TRUST_UNKNOWN     =   0,
-    CDK_TRUST_EXPIRED     =   1,
-    CDK_TRUST_UNDEFINED   =   2,
-    CDK_TRUST_NEVER       =   3,
-    CDK_TRUST_MARGINAL    =   4,
-    CDK_TRUST_FULLY       =   5,
-    CDK_TRUST_ULTIMATE    =   6,
-    /* trust flags */
-    CDK_TFLAG_REVOKED     =  32,
-    CDK_TFLAG_SUB_REVOKED =  64,
-    CDK_TFLAG_DISABLED    = 128
-};
-
-
-/* Signature states and the signature modes. */
-enum cdk_signature_stat_t {
-    /* Signature status */
-    CDK_SIGSTAT_NONE  = 0,
-    CDK_SIGSTAT_GOOD  = 1,
-    CDK_SIGSTAT_BAD   = 2,
-    CDK_SIGSTAT_NOKEY = 3,
-    CDK_SIGSTAT_VALID = 4, /* True if made with a valid key. */    
-    /* FIXME: We need indicators for revoked/expires signatures. */
-    
-    /* Signature modes */
-    CDK_SIGMODE_NORMAL   = 100,
-    CDK_SIGMODE_DETACHED = 101,
-    CDK_SIGMODE_CLEAR    = 102
-};
-
-
-/* Key flags. */
-typedef enum {
-    CDK_FLAG_KEY_REVOKED = 256,
-    CDK_FLAG_KEY_EXPIRED = 512,
-    CDK_FLAG_SIG_EXPIRED = 1024
-} cdk_key_flags_t;
-
-
-/* Possible format for the literal data. */
-typedef enum {
-  CDK_LITFMT_BINARY = 0,
-  CDK_LITFMT_TEXT   = 1,
-  CDK_LITFMT_UNICODE= 2
-} cdk_lit_format_t;	
-
-/* Valid OpenPGP packet types and their IDs */
-typedef enum {
-    CDK_PKT_RESERVED      =  0,
-    CDK_PKT_PUBKEY_ENC    =  1,
-    CDK_PKT_SIGNATURE     =  2,
-    CDK_PKT_SYMKEY_ENC    =  3,
-    CDK_PKT_ONEPASS_SIG   =  4,
-    CDK_PKT_SECRET_KEY    =  5,
-    CDK_PKT_PUBLIC_KEY    =  6,
-    CDK_PKT_SECRET_SUBKEY =  7,
-    CDK_PKT_COMPRESSED    =  8,
-    CDK_PKT_ENCRYPTED     =  9,
-    CDK_PKT_MARKER        = 10,
-    CDK_PKT_LITERAL       = 11,
-    CDK_PKT_RING_TRUST    = 12,
-    CDK_PKT_USER_ID       = 13,
-    CDK_PKT_PUBLIC_SUBKEY = 14,
-    CDK_PKT_OLD_COMMENT   = 16,
-    CDK_PKT_ATTRIBUTE     = 17,
-    CDK_PKT_ENCRYPTED_MDC = 18,
-    CDK_PKT_MDC           = 19
-} cdk_packet_type_t;
-
-/* Define the maximal number of multiprecion integers for
-   a public key. */
-#define MAX_CDK_PK_PARTS 4
-
-/* Define the maximal number of multiprecision integers for
-   a signature/encrypted blob issued by a secret key. */
-#define MAX_CDK_DATA_PARTS 2
-
-
-/* Helper macro to figure out if the packet is encrypted */
-#define CDK_PKT_IS_ENCRYPTED(pkttype) (\
-     ((pkttype)==CDK_PKT_ENCRYPTED_MDC) \
-  || ((pkttype)==CDK_PKT_ENCRYPTED))
-  
-
-struct cdk_pkt_signature_s {
-    unsigned char version;
-    unsigned char sig_class;
-    unsigned int timestamp;
-    unsigned int expiredate;
-    unsigned int keyid[2];
-    unsigned char pubkey_algo;
-    unsigned char digest_algo;
-    unsigned char digest_start[2];
-    unsigned short hashed_size;
-    cdk_subpkt_t hashed;
-    unsigned short unhashed_size;
-    cdk_subpkt_t unhashed;
-    gcry_mpi_t mpi[MAX_CDK_DATA_PARTS];
-    cdk_desig_revoker_t revkeys;
-    struct {
-        unsigned exportable:1;
-        unsigned revocable:1;
-        unsigned policy_url:1;
-        unsigned notation:1;
-        unsigned expired:1;
-        unsigned checked:1;
-        unsigned valid:1;
-        unsigned missing_key:1;
-    } flags;
-    unsigned int key[2]; /* only valid for key signatures */
-};
-typedef struct cdk_pkt_signature_s *cdk_pkt_signature_t;
-
-
-struct cdk_pkt_userid_s {
-    unsigned int len;
-    unsigned is_primary:1;
-    unsigned is_revoked:1;
-    unsigned mdc_feature:1;
-    cdk_prefitem_t prefs;
-    size_t prefs_size;
-    unsigned char * attrib_img; /* Tag 17 if not null */
-    size_t attrib_len;
-    cdk_pkt_signature_t selfsig;
-    char name[1];  
-};
-typedef struct cdk_pkt_userid_s *cdk_pkt_userid_t;
-
-
-struct cdk_pkt_pubkey_s {
-    unsigned char version;
-    unsigned char pubkey_algo;
-    unsigned char fpr[20];
-    unsigned int keyid[2];
-    unsigned int main_keyid[2];
-    unsigned int timestamp;
-    unsigned int expiredate;
-    gcry_mpi_t mpi[MAX_CDK_PK_PARTS];
-    unsigned is_revoked:1;
-    unsigned is_invalid:1;
-    unsigned has_expired:1;
-    int pubkey_usage;
-    cdk_pkt_userid_t uid;
-    cdk_prefitem_t prefs;
-    size_t prefs_size;
-    cdk_desig_revoker_t revkeys;
-};
-typedef struct cdk_pkt_pubkey_s *cdk_pkt_pubkey_t;
-
-/* Alias to define a generic public key context. */
-typedef cdk_pkt_pubkey_t cdk_pubkey_t;
-
-
-struct cdk_pkt_seckey_s {
-    cdk_pkt_pubkey_t pk;
-    unsigned int expiredate;
-    int version;
-    int pubkey_algo;
-    unsigned int keyid[2];
-    unsigned int main_keyid[2];
-    unsigned char s2k_usage;
-    struct {
-        unsigned char algo;
-        unsigned char sha1chk; /* SHA1 is used instead of a 16 bit checksum */
-        cdk_s2k_t s2k;
-        unsigned char iv[16];
-        unsigned char ivlen;
-    } protect;
-    unsigned short csum;
-    gcry_mpi_t mpi[MAX_CDK_PK_PARTS];
-    unsigned char * encdata;
-    size_t enclen;
-    unsigned char is_protected;
-    unsigned is_primary:1;
-    unsigned has_expired:1;
-    unsigned is_revoked:1;
-};
-typedef struct cdk_pkt_seckey_s *cdk_pkt_seckey_t;
-
-/* Alias to define a generic secret key context. */
-typedef cdk_pkt_seckey_t cdk_seckey_t;
-
-
-struct cdk_pkt_onepass_sig_s {
-    unsigned char version;
-    unsigned int keyid[2];
-    unsigned char sig_class;
-    unsigned char digest_algo;
-    unsigned char pubkey_algo;
-    unsigned char last;
-};
-typedef struct cdk_pkt_onepass_sig_s * cdk_pkt_onepass_sig_t;
-
-
-struct cdk_pkt_pubkey_enc_s {
-    unsigned char version;
-    unsigned int keyid[2];
-    int throw_keyid;
-    unsigned char pubkey_algo;
-    gcry_mpi_t mpi[MAX_CDK_DATA_PARTS];
-};
-typedef struct cdk_pkt_pubkey_enc_s * cdk_pkt_pubkey_enc_t;
-
-
-struct cdk_pkt_symkey_enc_s {
-    unsigned char version;
-    unsigned char cipher_algo;
-    cdk_s2k_t s2k;
-    unsigned char seskeylen;
-    unsigned char seskey[32];
-};
-typedef struct cdk_pkt_symkey_enc_s *cdk_pkt_symkey_enc_t;
-
-
-struct cdk_pkt_encrypted_s {
-    unsigned int len;
-    int extralen;
-    unsigned char mdc_method;
-    cdk_stream_t buf;
-};
-typedef struct cdk_pkt_encrypted_s *cdk_pkt_encrypted_t;
-
-
-struct cdk_pkt_mdc_s {
-    unsigned char hash[20];
-};
-typedef struct cdk_pkt_mdc_s *cdk_pkt_mdc_t;
-
-
-struct cdk_pkt_literal_s {
-    unsigned int len;
-    cdk_stream_t buf;
-    int mode;
-    unsigned int timestamp;
-    int namelen;
-    char name[1];
-};
-typedef struct cdk_pkt_literal_s *cdk_pkt_literal_t;
-
-
-struct cdk_pkt_compressed_s {
-    unsigned int len;
-    int algorithm;
-    cdk_stream_t buf;
-};
-typedef struct cdk_pkt_compressed_s *cdk_pkt_compressed_t;
-
-
-/* Structure which represents a single OpenPGP packet. */
-struct cdk_packet_s {
-    size_t pktlen; /* real packet length */
-    size_t pktsize; /* length with all headers */
-    int old_ctb;    /* 1 if RFC1991 mode is used */
-    cdk_packet_type_t pkttype;
-    union {
-        cdk_pkt_mdc_t mdc;
-        cdk_pkt_userid_t user_id;
-        cdk_pkt_pubkey_t public_key;
-        cdk_pkt_seckey_t secret_key;
-        cdk_pkt_signature_t signature;
-        cdk_pkt_pubkey_enc_t pubkey_enc;
-        cdk_pkt_symkey_enc_t symkey_enc;
-        cdk_pkt_compressed_t compressed;
-        cdk_pkt_encrypted_t encrypted;
-        cdk_pkt_literal_t literal;
-        cdk_pkt_onepass_sig_t onepass_sig;
-    } pkt;
-};
-typedef struct cdk_packet_s *cdk_packet_t;
-
-/* memory routines */
-typedef void (*cdk_log_fnc_t) (void *, int, const char *, va_list);
-
-/* Set the log level. */
-void cdk_set_log_level (int lvl);
-
-/* Set a custom log handler which is used for logging. */
-void cdk_set_log_handler (cdk_log_fnc_t logfnc, void *opaque);
-
-/* Return a human readable error description of the given error coe. */
-const char* cdk_strerror (int ec);
-
-/* Allow the user to set custom hooks for memory allocation.
-   If this function is not used, the standard allocation functions
-   will be used. Extra care must be taken for the 'secure' alloc
-   function. */
-void cdk_set_malloc_hooks (void *(*new_alloc_func) (size_t n),
-                           void *(*new_alloc_secure_func) (size_t n),
-                           void *(*new_realloc_func) (void *p, size_t n),
-                           void *(*new_calloc_func) (size_t m, size_t n),
-                           void (*new_free_func) (void *));
-			   
-/* Return 1 if the malloc hooks were already set via the function above. */
-int cdk_malloc_hook_initialized (void);
-
-/* Standard memory wrapper. */
-void *cdk_malloc (size_t size);
-void *cdk_calloc (size_t n, size_t m);
-void *cdk_realloc (void * ptr, size_t size);
-void *cdk_salloc (size_t size, int clear);
-char *cdk_strdup (const char * ptr);
-void cdk_free (void * ptr);
-
-/* Startup routines. */
-
-/* This function has to be called before any other 
-   CDK function is executed. */
-void cdk_lib_startup (void);
-
-/* This function should be called before the application exists
-   to allow the lib to cleanup its internal structures. */
-void cdk_lib_shutdown (void);
-
-/* Session handle routines */
-cdk_error_t cdk_handle_new (cdk_ctx_t *r_ctx);
-void cdk_handle_free (cdk_ctx_t c);
-
-/* Set the key database handle for the given session handle.
-   The type of the key db handle (public or secret) decides
-   which session key db handle to use. */
-void cdk_handle_set_keydb (cdk_ctx_t hd, cdk_keydb_hd_t db);
-
-/* Convenient function to avoid to open a key db first.
-   The user can directly use the file name, the rest is
-   done internally. */
-cdk_error_t cdk_handle_set_keyring (cdk_ctx_t hd, int type, 
-	    			    const char *kringname);
-
-/* Return keydb handle stored in the session handle. */
-cdk_keydb_hd_t cdk_handle_get_keydb (cdk_ctx_t hd, int type);
-int cdk_handle_control (cdk_ctx_t hd, int action, int cmd, ...);
-
-/* Set a passphrase callback for the given session handle. */
-void cdk_handle_set_passphrase_cb (cdk_ctx_t hd,
-                                   char *(*cb) (void *opa, const char *prompt),
-                                   void *cb_value);
-
-/* shortcuts for some controls */
-
-/* Enable or disable armor output. */
-#define cdk_handle_set_armor(a, val) \
-  cdk_handle_control ((a), CDK_CTLF_SET, CDK_CTL_ARMOR, (val))
-
-/* Set the compression algorithm and level. 0 means disable compression. */
-#define cdk_handle_set_compress(a, algo, level) \
-  cdk_handle_control ((a), CDK_CTLF_SET, CDK_CTL_COMPRESS, (algo), (level))
-
-/* Activate partial bodies for the output. This is needed if the length
-   of the data is not known in advance or for the use with sockets 
-   or pipes. */
-#define cdk_handle_set_blockmode(a, val) \
-  cdk_handle_control ((a), CDK_CTLF_SET, CDK_CTL_BLOCKMODE_ON, (val))
-
-/* Set the symmetric cipher for encryption. */
-#define cdk_handle_set_cipher(a, val) \
-  cdk_handle_control ((a), CDK_CTLF_SET, CDK_CTL_CIPHER, (val))
-
-/* Set the digest for the PK signing operation. */
-#define cdk_handle_set_digest(a, val) \
-  cdk_handle_control ((a), CDK_CTLF_SET, CDK_CTL_DIGEST, (val))
-
-/* Set the mode and the digest for the S2K operation. */
-#define cdk_handle_set_s2k(a, val1, val2) \
-  cdk_handle_control ((a), CDK_CTLF_SET, CDK_CTL_S2K, (val1), (val2))
-
-
-/* This context holds all information of the verification process. */
-struct cdk_verify_result_s {
-  int sig_ver; /* Version of the signature. */
-  int sig_status; /* The status (GOOD, BAD) of the signature */
-  int sig_flags; /* May contain expired or revoked flags */
-  unsigned int keyid[2]; /* The issuer key ID */
-  unsigned int created; /* Timestamp when the sig was created. */
-  unsigned int expires;
-  int pubkey_algo;
-  int digest_algo;
-  char *user_id;    /* NULL or user ID which issued the signature. */
-  char *policy_url; /* If set, the policy the sig was created under. */
-  size_t sig_len; /* Size of the signature data inbits. */
-  unsigned char *sig_data; /* Raw signature data. */
-};  
-typedef struct cdk_verify_result_s *cdk_verify_result_t;
-
-/* Return the verify result. Do not free the data. */
-cdk_verify_result_t cdk_handle_verify_get_result (cdk_ctx_t hd);
-
-/* Raw packet routines. */
-
-/* Allocate a new packet or a new packet with the given packet type. */
-cdk_error_t cdk_pkt_new (cdk_packet_t *r_pkt);
-cdk_error_t cdk_pkt_alloc (cdk_packet_t *r_pkt, int pkttype);
-
-/* Only release the contents of the packet but not @PKT itself. */
-void cdk_pkt_free (cdk_packet_t pkt);
-
-/* Release the packet contents and the packet structure @PKT itself. */
-void cdk_pkt_release (cdk_packet_t pkt);
-
-/* Read or write the given output from or to the stream. */
-cdk_error_t cdk_pkt_read (cdk_stream_t inp, cdk_packet_t pkt);
-cdk_error_t cdk_pkt_write (cdk_stream_t out, cdk_packet_t pkt);
-
-/* Sub packet routines */
-cdk_subpkt_t cdk_subpkt_new (size_t size);
-void cdk_subpkt_free (cdk_subpkt_t ctx);
-cdk_subpkt_t cdk_subpkt_find (cdk_subpkt_t ctx, size_t type);
-cdk_subpkt_t cdk_subpkt_find_next (cdk_subpkt_t root, size_t type);
-size_t cdk_subpkt_type_count (cdk_subpkt_t ctx, size_t type);
-cdk_subpkt_t cdk_subpkt_find_nth (cdk_subpkt_t ctx, size_t type, size_t index);
-cdk_error_t cdk_subpkt_add (cdk_subpkt_t root, cdk_subpkt_t node);
-const unsigned char * cdk_subpkt_get_data (cdk_subpkt_t ctx,
-					   size_t * r_type, size_t *r_nbytes);
-void cdk_subpkt_init (cdk_subpkt_t node, size_t type,
-		      const void *buf, size_t buflen);
-
-/* Designated Revoker routines */
-const unsigned char* cdk_key_desig_revoker_walk (cdk_desig_revoker_t root,
-                                                 cdk_desig_revoker_t * ctx,
-                                                 int *r_class, int *r_algid);
-
-#define is_RSA(a) ((a) == CDK_PK_RSA \
-                   || (a) == CDK_PK_RSA_E \
-                   || (a) == CDK_PK_RSA_S)
-#define is_ELG(a) ((a) == CDK_PK_ELG_E)
-#define is_DSA(a) ((a) == CDK_PK_DSA)
-
-/* Encrypt the given session key @SK with the public key @PK
-   and write the contents into the packet @PKE. */
-cdk_error_t cdk_pk_encrypt (cdk_pubkey_t pk, cdk_pkt_pubkey_enc_t pke,
-			    gcry_mpi_t sk);
-			    
-/* Decrypt the given encrypted session key in @PKE with the secret key
-   @SK and store it in @R_SK. */
-cdk_error_t cdk_pk_decrypt (cdk_seckey_t sk, cdk_pkt_pubkey_enc_t pke,
-                            gcry_mpi_t *r_sk);
-			    
-/* Sign the given message digest @MD with the secret key @SK and
-   store the signature in the packet @SIG. */
-cdk_error_t cdk_pk_sign (cdk_seckey_t sk, cdk_pkt_signature_t sig,
-                         const unsigned char *md);
-			 
-/* Verify the given signature in @SIG with the public key @PK
-   and compare it against the message digest @MD. */
-cdk_error_t cdk_pk_verify (cdk_pubkey_t pk, cdk_pkt_signature_t sig,
-			   const unsigned char *md);
-			   
-/* Use cdk_pk_get_npkey() and cdk_pk_get_nskey to find out how much
-   multiprecision integers a key consists of. */
-   
-/* Return a multi precision integer of the public key with the index @IDX
-   in the buffer @BUF. @R_NWRITTEN will contain the length in octets.
-   Optional @R_NBITS may contain the size in bits. */
-cdk_error_t cdk_pk_get_mpi (cdk_pubkey_t pk, size_t idx,
-			    unsigned char *buf, size_t buflen,
-			    size_t *r_nwritten, size_t *r_nbits);
-
-/* Same as the function above but of the secret key. */
-cdk_error_t cdk_sk_get_mpi (cdk_seckey_t sk, size_t idx,
-			    unsigned char * buf, size_t buflen,
-			    size_t *r_nwritten, size_t *r_nbits);
-			    
-/* Helper to get the exact number of multi precision integers 
-   for the given object. */
-int cdk_pk_get_nbits (cdk_pubkey_t pk);
-int cdk_pk_get_npkey (int algo);
-int cdk_pk_get_nskey (int algo);
-int cdk_pk_get_nsig (int algo);
-int cdk_pk_get_nenc (int algo);
-
-/* Fingerprint and key ID routines. */
-
-/* Calculate the fingerprint of the given public key.
-   the FPR parameter must be at least 20 octets to hold the SHA1 hash. */
-cdk_error_t cdk_pk_get_fingerprint (cdk_pubkey_t pk, unsigned char *fpr);
-
-/* Same as above, but with additional sanity checks of the buffer size. */
-cdk_error_t cdk_pk_to_fingerprint (cdk_pubkey_t pk,
-		       		   unsigned char *fpr, size_t fprlen, 
-				   size_t *r_nout);
-
-/* Derive the keyid from the fingerprint. This is only possible for
-   modern, version 4 keys. */
-unsigned int cdk_pk_fingerprint_get_keyid (const unsigned char *fpr,
-                                           size_t fprlen,
-                                           unsigned int *keyid);
-					   
-/* Various functions to get the keyid from the specific packet type. */
-unsigned int cdk_pk_get_keyid (cdk_pubkey_t pk, unsigned int *keyid);
-unsigned int cdk_sk_get_keyid (cdk_seckey_t sk, unsigned int *keyid);
-unsigned int cdk_sig_get_keyid (cdk_pkt_signature_t sig,
-                                unsigned int *keyid);
-				 
-/* Key release functions. */
-void cdk_pk_release (cdk_pubkey_t pk);
-void cdk_sk_release (cdk_seckey_t sk);
-				 
-/* Secret key related functions. */				 
-cdk_error_t cdk_sk_unprotect (cdk_seckey_t sk, const char *pw);
-cdk_error_t cdk_sk_protect (cdk_seckey_t sk, const char *pw);
-
-/* Create a public key with the data from the secret key @SK. */
-cdk_error_t cdk_pk_from_secret_key (cdk_seckey_t sk,
-                                    cdk_pubkey_t *ret_pk);
-
-/* Sexp conversion of keys. */
-cdk_error_t cdk_pubkey_to_sexp (cdk_pubkey_t pk, 
-				char **sexp, size_t *len);
-cdk_error_t cdk_seckey_to_sexp (cdk_seckey_t sk, 
-				char **sexp, size_t *len);    
-
-
-/* Data Encryption Key (DEK) routines */
-cdk_error_t cdk_dek_new (cdk_dek_t *r_dek);
-void cdk_dek_free (cdk_dek_t dek);
-
-/* Set the symmetric cipher algorithm which shall be used for this
-   DEK object. */   
-cdk_error_t cdk_dek_set_cipher (cdk_dek_t dek, int cipher_algo);
-
-/* Return the symmetric cipher which is used for this DEK object. */
-cdk_error_t cdk_dek_get_cipher (cdk_dek_t dek, int *r_cipher_algo);
-
-
-/* Set the session key for the given DEK object.
-   If @KEY and @KEYLEN are both NULL/0, a random key will be generated
-   and stored in the DEK object. */
-cdk_error_t cdk_dek_set_key (cdk_dek_t dek, const unsigned char *key,
-                             size_t keylen);
-			     
-/* Enable the MDC feature for the current DEK object. */
-void cdk_dek_set_mdc_flag (cdk_dek_t dek, int val);
-
-/* Return if the MDC feature is enabled for the current DEK object.*/
-int cdk_dek_get_mdc_flag (cdk_dek_t dek);
-			     
-/* Transform the given passphrase into a DEK.
-   If @rndsalt is set, a random salt will be generated. */
-cdk_error_t cdk_dek_from_passphrase (cdk_dek_t *ret_dek, int cipher_algo,
-                                     cdk_s2k_t s2k, int rndsalt, 
-				     const char *passphrase);
-
-/* String to Key routines. */
-cdk_error_t cdk_s2k_new (cdk_s2k_t *ret_s2k, int mode, int digest_algo,
-                         const unsigned char *salt);
-void cdk_s2k_free (cdk_s2k_t s2k);
-
-cdk_error_t cdk_file_armor (cdk_ctx_t hd, const char *file,
-                            const char *output);
-cdk_error_t cdk_file_dearmor (const char * file, const char *output);
-int         cdk_armor_filter_use (cdk_stream_t inp);
-
-/* Protect the inbuf with ASCII armor of the specified type.
-   If @outbuf and @outlen are NULL, the function returns the calculated
-   size of the base64 encoded data in @nwritten. */
-cdk_error_t cdk_armor_encode_buffer (const unsigned char *inbuf, size_t inlen,
-                         	     char *outbuf, size_t outlen,
-			             size_t *nwritten, int type);
-						  
-
-/* This context contain user callbacks for different stream operations.
-   Some of these callbacks might be NULL to indicate that the callback
-   is not used. */
-struct cdk_stream_cbs_s
-{
-  cdk_error_t (*open)(void *);
-  cdk_error_t (*release)(void *);
-  int         (*read)(void *, void *buf, size_t);
-  int         (*write)(void *, const void *buf, size_t);
-  int         (*seek)(void *, off_t);
-};
-typedef struct cdk_stream_cbs_s *cdk_stream_cbs_t;
-
-		
-int cdk_stream_is_compressed (cdk_stream_t s);
-
-/* Return a stream object which is associated to a socket. */
-cdk_error_t cdk_stream_sockopen (const char *host, unsigned short port,
-                                 cdk_stream_t *ret_out);
-				 
-/* Return a stream object which is associated to an existing file. */
-cdk_error_t cdk_stream_open (const char * file, cdk_stream_t * ret_s);
-
-/* Return a stream object which is associated to a file which will
-   be created when the stream is closed. */
-cdk_error_t cdk_stream_new (const char * file, cdk_stream_t * ret_s);
-
-/* Return a stream object with custom callback functions for the
-   various core operations. */
-cdk_error_t cdk_stream_new_from_cbs (cdk_stream_cbs_t cbs, void *opa,
-	    			     cdk_stream_t *ret_s);
-cdk_error_t cdk_stream_create (const char * file, cdk_stream_t * ret_s);
-cdk_error_t cdk_stream_tmp_new (cdk_stream_t *r_out);
-cdk_error_t cdk_stream_tmp_from_mem (const void * buf, size_t buflen,
-	    			     cdk_stream_t *r_out);
-void cdk_stream_tmp_set_mode (cdk_stream_t s, int val);
-cdk_error_t cdk_stream_flush (cdk_stream_t s);
-cdk_error_t cdk_stream_enable_cache (cdk_stream_t s, int val);
-cdk_error_t cdk_stream_filter_disable (cdk_stream_t s, int type);
-cdk_error_t cdk_stream_close (cdk_stream_t s);
-off_t cdk_stream_get_length (cdk_stream_t s);
-int cdk_stream_read (cdk_stream_t s, void * buf, size_t count);
-int cdk_stream_write (cdk_stream_t s, const void * buf, size_t count);
-int cdk_stream_putc (cdk_stream_t s, int c);
-int cdk_stream_getc (cdk_stream_t s);
-int cdk_stream_eof (cdk_stream_t s);
-off_t cdk_stream_tell (cdk_stream_t s);
-cdk_error_t cdk_stream_seek (cdk_stream_t s, off_t offset);
-cdk_error_t cdk_stream_set_armor_flag (cdk_stream_t s, int type);
-
-/* Push the literal filter for the given stream. */
-cdk_error_t cdk_stream_set_literal_flag (cdk_stream_t s, 
-	    				 cdk_lit_format_t mode,
-                                         const char * fname);
-					 
-cdk_error_t cdk_stream_set_cipher_flag (cdk_stream_t s, cdk_dek_t dek,
-                                        int use_mdc);
-cdk_error_t cdk_stream_set_compress_flag (cdk_stream_t s, int algo, int level);
-cdk_error_t cdk_stream_set_hash_flag (cdk_stream_t s, int algo);
-cdk_error_t cdk_stream_set_text_flag (cdk_stream_t s, const char * lf);
-cdk_error_t cdk_stream_kick_off (cdk_stream_t inp, cdk_stream_t out);
-cdk_error_t cdk_stream_mmap (cdk_stream_t s, unsigned char **ret_buf,
-                             size_t *ret_buflen);
-cdk_error_t cdk_stream_mmap_part (cdk_stream_t s, off_t off, size_t len,
-	    			  unsigned char **ret_buf, size_t *ret_buflen);
-			     
-/* Read from the stream but restore the file pointer after reading
-   the requested amount of bytes. */
-int cdk_stream_peek (cdk_stream_t inp, unsigned char *buf, size_t buflen);
-
-/* A wrapper around the various new_from_XXX functions. Because
-   the function does not support all combinations, the dedicated
-   functions should be preferred. */
-cdk_error_t cdk_keydb_new (cdk_keydb_hd_t *r_hd, int type, void *data,
-                           size_t count);
-
-/* Create a new key db handle from a memory buffer. */
-cdk_error_t cdk_keydb_new_from_mem (cdk_keydb_hd_t *r_hd, int secret,
-	    			    const void *data, size_t datlen);
-
-/* Create a new key db which uses an existing file. */
-cdk_error_t cdk_keydb_new_from_file (cdk_keydb_hd_t *r_hd, int secret,
-	    			     const char *fname);
-				     
-/* Uses a stream as the key db input. For searching it is important
-   that the seek function is supported on the stream. Furthermore,
-   the stream is not closed in cdk_keydb_free(). The caller must do it. */
-cdk_error_t cdk_keydb_new_from_stream (cdk_keydb_hd_t *r_hd, int secret,
-	    			       cdk_stream_t in);
-
-/* Check that a secret key with the given key ID is available. */
-cdk_error_t cdk_keydb_check_sk (cdk_keydb_hd_t hd, unsigned int *keyid);
-
-/* Prepare the key db search. */
-cdk_error_t cdk_keydb_search_start (cdk_keydb_hd_t hd, int type, void *desc);
-
-/* Return a key which matches a valid description given in 
-   cdk_keydb_search_start(). */
-cdk_error_t cdk_keydb_search (cdk_keydb_hd_t hd, cdk_kbnode_t *ret_key);
-
-/* Release the key db handle and all its resources. */
-void cdk_keydb_free (cdk_keydb_hd_t hd);
-
-/* The following functions will try to find a key in the given key
-   db handle either by keyid, by fingerprint or by some pattern. */
-cdk_error_t cdk_keydb_get_bykeyid (cdk_keydb_hd_t hd, unsigned int *keyid,
-                                   cdk_kbnode_t *ret_pk);
-cdk_error_t cdk_keydb_get_byfpr (cdk_keydb_hd_t hd, const unsigned char *fpr,
-                                 cdk_kbnode_t *ret_pk);
-cdk_error_t cdk_keydb_get_bypattern (cdk_keydb_hd_t hd, const char *patt,
-                                     cdk_kbnode_t *ret_pk);
-
-/* These function, in contrast to most other key db functions, only
-   return the public or secret key packet without the additional
-   signatures and user IDs. */
-cdk_error_t cdk_keydb_get_pk (cdk_keydb_hd_t khd, unsigned int * keyid,
-                      	      cdk_pubkey_t *ret_pk);
-cdk_error_t cdk_keydb_get_sk (cdk_keydb_hd_t khd, unsigned int * keyid,
-                              cdk_seckey_t *ret_sk);
-			      
-/* Try to read the next key block from the given input stream.
-   The key will be returned in @RET_KEY on success. */
-cdk_error_t cdk_keydb_get_keyblock (cdk_stream_t inp, cdk_kbnode_t * ret_key);
-
-/* Rebuild the key db index if possible. */
-cdk_error_t cdk_keydb_idx_rebuild (cdk_keydb_hd_t hd);
-
-/* Export one or more keys from the given key db handle into
-   the stream @OUT. The export is done by substring search and
-   uses the string list @REMUSR for the pattern. */
-cdk_error_t cdk_keydb_export (cdk_keydb_hd_t hd, cdk_stream_t out,
-                              cdk_strlist_t remusr);
-
-/* Import the given key node @knode into the key db. */
-cdk_error_t cdk_keydb_import (cdk_keydb_hd_t hd, cdk_kbnode_t knode);
-
-
-/* List or enumerate keys from a given key db handle. */
-
-/* Start the key list process. Either use @PATT for a pattern search
-   or @FPATT for a list of pattern. */
-cdk_error_t cdk_listkey_start (cdk_listkey_t *r_ctx, cdk_keydb_hd_t db,
-                               const char *patt, cdk_strlist_t fpatt);
-void cdk_listkey_close (cdk_listkey_t ctx);
-
-/* Return the next key which matches the pattern. */
-cdk_error_t cdk_listkey_next (cdk_listkey_t ctx, cdk_kbnode_t *ret_key);
-
-cdk_kbnode_t cdk_kbnode_new (cdk_packet_t pkt);
-cdk_error_t cdk_kbnode_read_from_mem (cdk_kbnode_t * ret_node,
-                                      const unsigned char * buf,
-                                      size_t buflen);
-cdk_error_t cdk_kbnode_write_to_mem (cdk_kbnode_t node,
-                                     unsigned char * buf, size_t * r_nbytes);
-cdk_error_t cdk_kbnode_write_to_mem_alloc (cdk_kbnode_t node,
-             				   unsigned char **r_buf, 
-					   size_t *r_buflen);
-			       
-void cdk_kbnode_release (cdk_kbnode_t node);
-cdk_kbnode_t cdk_kbnode_walk (cdk_kbnode_t root, cdk_kbnode_t * ctx, int all);
-cdk_packet_t cdk_kbnode_find_packet (cdk_kbnode_t node, int pkttype);
-cdk_packet_t cdk_kbnode_get_packet (cdk_kbnode_t node);
-cdk_kbnode_t cdk_kbnode_find (cdk_kbnode_t node, int pkttype);
-cdk_kbnode_t cdk_kbnode_find_prev (cdk_kbnode_t root, cdk_kbnode_t node,
-                                   int pkttype);
-cdk_kbnode_t cdk_kbnode_find_next (cdk_kbnode_t node, int pkttype);
-cdk_error_t cdk_kbnode_hash (cdk_kbnode_t node, gcry_md_hd_t md, int is_v4,
-                             int pkttype, int flags);
-
-/* Check each signature in the key node and return a summary of the
-   key status in @r_status. Values of cdk_key_flag_t are used. */
-cdk_error_t cdk_pk_check_sigs (cdk_kbnode_t knode, cdk_keydb_hd_t hd,
-                               int *r_status);
-
-/* Check the self signature of the key to make sure it is valid. */
-cdk_error_t cdk_pk_check_self_sig (cdk_kbnode_t knode, int *r_status);
-
-/* Return a matching  algorithm from the given public key list. 
-   @PREFTYPE can be either sym-cipher/compress/digest. */
-int cdk_pklist_select_algo (cdk_keylist_t pkl, int preftype);
-
-/* Return 0 or 1 if the given key list is able to understand the
-   MDC feature. */
-int cdk_pklist_use_mdc (cdk_keylist_t pkl);
-cdk_error_t cdk_pklist_build (cdk_keylist_t *ret_pkl, cdk_keydb_hd_t hd,
-                              cdk_strlist_t remusr, int use);
-void cdk_pklist_release (cdk_keylist_t pkl);
-
-/* Encrypt the given DEK key with the list of public keys given
-   in @PKL. The result will be written to the stream output @OUT. */
-cdk_error_t cdk_pklist_encrypt (cdk_keylist_t pkl, cdk_dek_t dek,
-                                cdk_stream_t out);
-				
-/* Secret key lists */
-cdk_error_t cdk_sklist_build (cdk_keylist_t * ret_skl,
-                              cdk_keydb_hd_t db, cdk_ctx_t hd,
-                              cdk_strlist_t locusr,
-                              int unlock, unsigned int use);
-void cdk_sklist_release (cdk_keylist_t skl);
-cdk_error_t cdk_sklist_write (cdk_keylist_t skl, cdk_stream_t outp,
-                              gcry_md_hd_t mdctx,
-                              int sigclass, int sigver);
-cdk_error_t cdk_sklist_write_onepass (cdk_keylist_t skl, cdk_stream_t outp,
-                                      int sigclass, int mdalgo);
-
-/* Encrypt the given stream @INP with the recipients given in @REMUSR.
-   If @REMUSR is NULL, symmetric encryption will be used. The output
-   will be written to @OUT. */
-cdk_error_t cdk_stream_encrypt (cdk_ctx_t hd, cdk_strlist_t remusr,
-                                cdk_stream_t inp, cdk_stream_t out);
-				
-/* Decrypt the @INP stream into @OUT. */
-cdk_error_t cdk_stream_decrypt (cdk_ctx_t hd, cdk_stream_t inp, 
-				cdk_stream_t out);
-
-/* Same as the function above but it works on files. */
-cdk_error_t cdk_file_encrypt (cdk_ctx_t hd, cdk_strlist_t remusr,
-                      	      const char *file, const char *output);
-cdk_error_t cdk_file_decrypt (cdk_ctx_t hd, const char * file,
-                              const char *output);
-			      
-/* Generic function to transform data. The mode can be either sign,
-   verify, encrypt, decrypt, import or export. The meanings of the
-   parameters are similar to the functions above.
-   @OUTBUF will contain the output and @OUTSIZE the length of it. */
-cdk_error_t cdk_data_transform (cdk_ctx_t hd, enum cdk_crypto_mode_t mode,
-                                cdk_strlist_t locusr, cdk_strlist_t remusr,
-                                const void * inbuf, size_t insize,
-                                unsigned char ** outbuf, size_t * outsize,
-                                int modval);
-
-/* Sign the stream @INP. Optionally, the output will be encrypted
-   if @REMUSR is not NULL and the @ENCRYPTFLAG is set. 
-   The output will be written to @OUT.
-   @LOCUSR contains one ore more pattern for the secret key(s) to use. */
-cdk_error_t cdk_stream_sign (cdk_ctx_t hd, cdk_stream_t inp, cdk_stream_t out,
-                             cdk_strlist_t locusr, cdk_strlist_t remusr,
-                             int encryptflag, int sigmode);
-
-/* Same as the function above but it works on files. */
-cdk_error_t cdk_file_sign (cdk_ctx_t hd, cdk_strlist_t locusr,
-                           cdk_strlist_t remusr,
-                           const char *file, const char *output,
-                           int sigmode, int encryptflag);
-
-cdk_error_t cdk_stream_verify (cdk_ctx_t hd, cdk_stream_t inp,
-	    		       cdk_stream_t data,
-                               cdk_stream_t out);
-			       
-/* Verify the given file @FILE. For a detached signature, @DATA_FILE
-   contains the actual file data and @FILE is only the signature.
-   If the @OUTPUT is not NULL, the plaintext will be written to this file. */
-cdk_error_t cdk_file_verify (cdk_ctx_t hd, const char *file,
-	    		     const char *data_file, const char *output);
-
-int cdk_trustdb_get_validity (cdk_stream_t inp, cdk_pkt_userid_t id,
-                              int *r_val);
-int cdk_trustdb_get_ownertrust (cdk_stream_t inp, cdk_pubkey_t pk,
-                                int *r_val, int *r_flags);
-
-void cdk_strlist_free (cdk_strlist_t sl);
-cdk_strlist_t cdk_strlist_add (cdk_strlist_t * list, const char * string);
-cdk_strlist_t cdk_strlist_next (cdk_strlist_t root, const char **r_str);
-const char * cdk_check_version (const char * req_version);
-/* UTF8 */
-char* cdk_utf8_encode (const char * string);
-char* cdk_utf8_decode (const char * string, size_t length, int delim);
-
-/* Try to receive the key, which has the key ID @KEYID, from the
-   keyserver host @HOST and the port @PORT. */
-cdk_error_t cdk_keyserver_recv_key (const char *host, int port,
-                                    const unsigned char *keyid, int kid_type,
-                                    cdk_kbnode_t *r_key);
-
-cdk_error_t cdk_keygen_new (cdk_keygen_ctx_t * r_hd);
-void cdk_keygen_free (cdk_keygen_ctx_t hd);
-
-/* Set the preferences of the given type for the new key.
-   @ARRAY is an array which list of algorithm IDs. */   
-cdk_error_t cdk_keygen_set_prefs (cdk_keygen_ctx_t hd,
-                                  enum cdk_pref_type_t type,
-                                  const unsigned char * array, size_t n);
-cdk_error_t cdk_keygen_set_algo_info (cdk_keygen_ctx_t hd, int type,
-	    			      int usage, enum cdk_pubkey_algo_t algo, 
-				      unsigned int bits);
-int cdk_keygen_set_keyserver_flags (cdk_keygen_ctx_t hd, int no_modify,
-                                    const char *pref_url);
-int cdk_keygen_set_expire_date (cdk_keygen_ctx_t hd, int type,
-                                long timestamp);
-				
-/* Set the user ID specifc parts for the new key.
-   It is suggested to use a name in the form of 
-   'First Name' 'Last Name' <[email protected]> */
-void cdk_keygen_set_name (cdk_keygen_ctx_t hd, const char * name);
-void cdk_keygen_set_passphrase (cdk_keygen_ctx_t hd, const char * pass);
-cdk_error_t cdk_keygen_start (cdk_keygen_ctx_t hd);
-cdk_error_t cdk_keygen_save (cdk_keygen_ctx_t hd,
-                             const char * pubf,
-                             const char * secf);
-
-#ifdef __cplusplus
-}
-#endif 
-
-#endif /* OPENCDK_H */
-

+ 0 - 40
src/daemon/https/opencdk/packet.h

@@ -1,40 +0,0 @@
-/* packet.h
- *        Copyright (C) 2002, 2003, 2007 Timo Schulz
- *
- * This file is part of OpenCDK.
- *
- * OpenCDK is free software; you can redistribute it and/or modify
- * it under the terms of the GNU General Public License as published by
- * the Free Software Foundation; either version 2 of the License, or
- * (at your option) any later version.
- *
- * OpenCDK is distributed in the hope that it will be useful,
- * but WITHOUT ANY WARRANTY; without even the implied warranty of
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
- * GNU General Public License for more details.
- */
-#ifndef CDK_PACKET_H
-#define CDK_PACKET_H
-
-struct cdk_kbnode_s 
-{
-  struct cdk_kbnode_s *next;
-  cdk_packet_t pkt;
-  unsigned int is_deleted:1;
-  unsigned int is_cloned:1;
-};
-
-/*-- new-packet.c --*/
-void _cdk_free_mpibuf (size_t n, gcry_mpi_t *array);
-void _cdk_free_userid (cdk_pkt_userid_t uid);
-void _cdk_free_signature( cdk_pkt_signature_t sig );
-cdk_prefitem_t _cdk_copy_prefs( const cdk_prefitem_t prefs );
-int _cdk_copy_userid( cdk_pkt_userid_t *dst, cdk_pkt_userid_t src );
-int _cdk_copy_pubkey( cdk_pkt_pubkey_t* dst, cdk_pkt_pubkey_t src );
-int _cdk_copy_seckey( cdk_pkt_seckey_t* dst, cdk_pkt_seckey_t src );
-int _cdk_copy_pk_to_sk( cdk_pkt_pubkey_t pk, cdk_pkt_seckey_t sk );
-int _cdk_copy_signature( cdk_pkt_signature_t* dst, cdk_pkt_signature_t src );
-int _cdk_pubkey_compare( cdk_pkt_pubkey_t a, cdk_pkt_pubkey_t b );
-
-#endif /* CDK_PACKET_H */
-

+ 0 - 1380
src/daemon/https/opencdk/pubkey.c

@@ -1,1380 +0,0 @@
-/* pubkey.c - Public key API
- *        Copyright (C) 2007 Free Software Foundation, Inc.
- *        Copyright (C) 2002, 2003, 2007 Timo Schulz
- *
- * This file is part of OpenCDK.
- *
- * OpenCDK is free software; you can redistribute it and/or modify
- * it under the terms of the GNU General Public License as published by
- * the Free Software Foundation; either version 2 of the License, or
- * (at your option) any later version.
- *
- * OpenCDK is distributed in the hope that it will be useful,
- * but WITHOUT ANY WARRANTY; without even the implied warranty of
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
- * GNU General Public License for more details.
- */
-#ifdef HAVE_CONFIG_H
-#include <config.h>
-#endif
-#include <stdio.h>
-#include <gcrypt.h>
-
-#include "opencdk.h"
-#include "main.h"
-#include "packet.h"
-
-
-/* Convert the given secret key into a gcrypt SEXP object. */
-static int
-seckey_to_sexp (gcry_sexp_t * r_skey, cdk_seckey_t sk)
-{
-  gcry_sexp_t sexp = NULL;
-  gcry_mpi_t *mpk = NULL, *msk = NULL;
-  gcry_error_t err;
-  cdk_pubkey_t pk;
-  const char *fmt;
-
-  if (!r_skey || !sk || !sk->pk)
-    return CDK_Inv_Value;
-
-  pk = sk->pk;
-  mpk = pk->mpi;
-  msk = sk->mpi;
-
-  *r_skey = NULL;
-  if (is_RSA (sk->pubkey_algo))
-    {
-      fmt = "(private-key(openpgp-rsa(n%m)(e%m)(d%m)(p%m)(q%m)(u%m)))";
-      err = gcry_sexp_build (&sexp, NULL, fmt, mpk[0], mpk[1],
-                             msk[0], msk[1], msk[2], msk[3]);
-    }
-  else if (is_ELG (sk->pubkey_algo))
-    {
-      fmt = "(private-key(openpgp-elg(p%m)(g%m)(y%m)(x%m)))";
-      err = gcry_sexp_build (&sexp, NULL, fmt, mpk[0], mpk[1],
-                             mpk[2], msk[0]);
-    }
-  else if (is_DSA (sk->pubkey_algo))
-    {
-      fmt = "(private-key(openpgp-dsa(p%m)(q%m)(g%m)(y%m)(x%m)))";
-      err = gcry_sexp_build (&sexp, NULL, fmt, mpk[0], mpk[1], mpk[2],
-                             mpk[3], msk[0]);
-    }
-  else
-    return CDK_Inv_Algo;
-  if (err)
-    return map_gcry_error (err);
-  *r_skey = sexp;
-  return 0;
-}
-
-
-/* Convert the given public key to a gcrypt SEXP object. */
-static cdk_error_t
-pubkey_to_sexp (gcry_sexp_t * r_key_sexp, cdk_pubkey_t pk)
-{
-  gcry_mpi_t *m;
-  gcry_error_t err;
-  const char *fmt = NULL;
-  cdk_error_t rc = 0;
-
-  if (!r_key_sexp || !pk)
-    return CDK_Inv_Value;
-
-  m = pk->mpi;
-  if (is_RSA (pk->pubkey_algo))
-    {
-      fmt = "(public-key(openpgp-rsa(n%m)(e%m)))";
-      err = gcry_sexp_build (r_key_sexp, NULL, fmt, m[0], m[1]);
-      if (err)
-        rc = map_gcry_error (err);
-    }
-  else if (is_ELG (pk->pubkey_algo))
-    {
-      fmt = "(public-key(openpgp-elg(p%m)(g%m)(y%m)))";
-      err = gcry_sexp_build (r_key_sexp, NULL, fmt, m[0], m[1], m[2]);
-      if (err)
-        rc = map_gcry_error (err);
-    }
-  else if (is_DSA (pk->pubkey_algo))
-    {
-      fmt = "(public-key(openpgp-dsa(p%m)(q%m)(g%m)(y%m)))";
-      err = gcry_sexp_build (r_key_sexp, NULL, fmt, m[0], m[1], m[2], m[3]);
-      if (err)
-        rc = map_gcry_error (err);
-    }
-  else
-    rc = CDK_Inv_Algo;
-  return rc;
-}
-
-
-static cdk_error_t
-enckey_to_sexp (gcry_sexp_t * r_sexp, gcry_mpi_t esk)
-{
-  gcry_error_t err;
-
-  if (!r_sexp || !esk)
-    return CDK_Inv_Value;
-  err = gcry_sexp_build (r_sexp, NULL, "%m", esk);
-  if (err)
-    return map_gcry_error (err);
-  return 0;
-}
-
-
-static cdk_error_t
-digest_to_sexp (gcry_sexp_t * r_md_sexp, int digest_algo,
-                const byte * md, size_t mdlen)
-{
-  gcry_mpi_t m;
-  gcry_error_t err;
-
-  if (!r_md_sexp || !md)
-    return CDK_Inv_Value;
-
-  if (!mdlen)
-    mdlen = gcry_md_get_algo_dlen (digest_algo);
-  if (!mdlen)
-    return CDK_Inv_Algo;
-
-  err = gcry_mpi_scan (&m, GCRYMPI_FMT_USG, md, mdlen, &mdlen);
-  if (err)
-    return map_gcry_error (err);
-
-  err = gcry_sexp_build (r_md_sexp, NULL, "%m", m);
-  gcry_mpi_release (m);
-  if (err)
-    return map_gcry_error (err);
-  return 0;
-}
-
-
-static cdk_error_t
-sexp_to_mpi (gcry_sexp_t sexp, const char *val, gcry_mpi_t * ret_buf)
-{
-  gcry_sexp_t list;
-
-  if (!sexp || !val || !ret_buf)
-    return CDK_Inv_Value;
-
-  list = gcry_sexp_find_token (sexp, val, 0);
-  if (!list)
-    return CDK_Inv_Value;
-
-  *ret_buf = gcry_sexp_nth_mpi (list, 1, 0);
-  gcry_sexp_release (list);
-  if (!*ret_buf)
-    return CDK_Inv_Value;
-  return 0;
-}
-
-
-static cdk_error_t
-sexp_to_sig (cdk_pkt_signature_t sig, gcry_sexp_t sexp)
-{
-  if (!sig || !sexp)
-    return CDK_Inv_Value;
-
-  /* ElGamal signatures are not supported any longer. */
-  if (is_ELG (sig->pubkey_algo))
-    {
-      _cdk_log_debug ("sexp_to_sig: unsupported signature type (ElGamal)\n");
-      return CDK_Not_Implemented;
-    }
-
-  if (is_RSA (sig->pubkey_algo))
-    return sexp_to_mpi (sexp, "s", &sig->mpi[0]);
-  else if (is_DSA (sig->pubkey_algo))
-    {
-      cdk_error_t rc;
-
-      rc = sexp_to_mpi (sexp, "r", &sig->mpi[0]);
-      if (!rc)
-        rc = sexp_to_mpi (sexp, "s", &sig->mpi[1]);
-      return rc;
-    }
-  return CDK_Inv_Algo;
-}
-
-
-static cdk_error_t
-sig_to_sexp (gcry_sexp_t * r_sig_sexp, cdk_pkt_signature_t sig)
-{
-  gcry_error_t err;
-  cdk_error_t rc;
-  const char *fmt;
-
-  if (!r_sig_sexp || !sig)
-    return CDK_Inv_Value;
-  if (is_ELG (sig->pubkey_algo))
-    return CDK_Not_Implemented;
-
-  rc = 0;
-  if (is_RSA (sig->pubkey_algo))
-    {
-      fmt = "(sig-val(openpgp-rsa(s%m)))";
-      err = gcry_sexp_build (r_sig_sexp, NULL, fmt, sig->mpi[0]);
-      if (err)
-        rc = map_gcry_error (err);
-    }
-  else if (is_DSA (sig->pubkey_algo))
-    {
-      fmt = "(sig-val(openpgp-dsa(r%m)(s%m)))";
-      err = gcry_sexp_build (r_sig_sexp, NULL, fmt, sig->mpi[0], sig->mpi[1]);
-      if (err)
-        rc = map_gcry_error (err);
-    }
-  else
-    rc = CDK_Inv_Algo;
-  return rc;
-}
-
-
-static cdk_error_t
-sexp_to_pubenc (cdk_pkt_pubkey_enc_t enc, gcry_sexp_t sexp)
-{
-  if (!sexp || !enc)
-    return CDK_Inv_Value;
-
-  if (is_RSA (enc->pubkey_algo))
-    return sexp_to_mpi (sexp, "a", &enc->mpi[0]);
-  else if (is_ELG (enc->pubkey_algo))
-    {
-      cdk_error_t rc = sexp_to_mpi (sexp, "a", &enc->mpi[0]);
-      if (!rc)
-        rc = sexp_to_mpi (sexp, "b", &enc->mpi[1]);
-      return rc;
-    }
-  return CDK_Inv_Algo;
-}
-
-
-static cdk_error_t
-pubenc_to_sexp (gcry_sexp_t * r_sexp, cdk_pkt_pubkey_enc_t enc)
-{
-  gcry_sexp_t sexp = NULL;
-  gcry_error_t err;
-  const char *fmt;
-
-  if (!r_sexp || !enc)
-    return CDK_Inv_Value;
-
-  *r_sexp = NULL;
-  if (is_RSA (enc->pubkey_algo))
-    {
-      fmt = "(enc-val(openpgp-rsa((a%m))))";
-      err = gcry_sexp_build (&sexp, NULL, fmt, enc->mpi[0]);
-    }
-  else if (is_ELG (enc->pubkey_algo))
-    {
-      fmt = "(enc-val(openpgp-elg((a%m)(b%m))))";
-      err = gcry_sexp_build (&sexp, NULL, fmt, enc->mpi[0], enc->mpi[1]);
-    }
-  else
-    return CDK_Inv_Algo;
-  if (err)
-    return map_gcry_error (err);
-  *r_sexp = sexp;
-  return 0;
-}
-
-
-static int
-is_unprotected (cdk_seckey_t sk)
-{
-  if (sk->is_protected && !sk->mpi[0])
-    return 0;
-  return 1;
-}
-
-
-/**
- * cdk_pk_encrypt:
- * @pk: the public key
- * @pke: the public key encrypted packet
- * @esk: the actual session key
- *
- * Encrypt the session key in @esk and write its encrypted content
- * into the @pke struct.
- **/
-cdk_error_t
-cdk_pk_encrypt (cdk_pubkey_t pk, cdk_pkt_pubkey_enc_t pke, gcry_mpi_t esk)
-{
-  gcry_sexp_t s_data = NULL, s_pkey = NULL, s_ciph = NULL;
-  gcry_error_t err;
-  cdk_error_t rc;
-
-  if (!pk || !esk || !pke)
-    return CDK_Inv_Value;
-
-  if (!KEY_CAN_ENCRYPT (pk->pubkey_algo))
-    return CDK_Inv_Algo;
-
-  rc = enckey_to_sexp (&s_data, esk);
-  if (!rc)
-    rc = pubkey_to_sexp (&s_pkey, pk);
-  if (!rc)
-    {
-      err = gcry_pk_encrypt (&s_ciph, s_data, s_pkey);
-      if (err)
-        return map_gcry_error (err);
-    }
-  if (!rc)
-    rc = sexp_to_pubenc (pke, s_ciph);
-
-  gcry_sexp_release (s_data);
-  gcry_sexp_release (s_pkey);
-  gcry_sexp_release (s_ciph);
-  return rc;
-}
-
-
-/**
- * cdk_pk_decrypt:
- * @sk: the secret key
- * @pke: public key encrypted packet
- * @r_sk: the object to store the plain session key
- *
- * Decrypt the encrypted session key from @pke into @r_sk.
- **/
-cdk_error_t
-cdk_pk_decrypt (cdk_seckey_t sk, cdk_pkt_pubkey_enc_t pke, gcry_mpi_t * r_sk)
-{
-  gcry_sexp_t s_data = NULL, s_skey = NULL, s_plain = NULL;
-  cdk_error_t rc;
-  gcry_error_t err;
-
-  if (!sk || !r_sk || !pke)
-    return CDK_Inv_Value;
-
-  if (!is_unprotected (sk))
-    return CDK_Inv_Mode;
-
-  *r_sk = NULL;
-  rc = seckey_to_sexp (&s_skey, sk);
-  if (rc)
-    return rc;
-
-  rc = pubenc_to_sexp (&s_data, pke);
-  if (rc)
-    {
-      gcry_sexp_release (s_skey);
-      return rc;
-    }
-
-  err = gcry_pk_decrypt (&s_plain, s_data, s_skey);
-  if (err)
-    rc = map_gcry_error (err);
-  else
-    *r_sk = gcry_sexp_nth_mpi (s_plain, 0, 0);
-
-  gcry_sexp_release (s_data);
-  gcry_sexp_release (s_skey);
-  gcry_sexp_release (s_plain);
-  return rc;
-}
-
-
-/**
- * cdk_pk_sign:
- * @sk: secret key
- * @sig: signature
- * @md: the message digest
- *
- * Sign the message digest from @md and write the result into @sig.
- **/
-cdk_error_t
-cdk_pk_sign (cdk_seckey_t sk, cdk_pkt_signature_t sig, const byte * md)
-{
-  gcry_sexp_t s_skey = NULL, s_sig = NULL, s_hash = NULL;
-  byte *encmd = NULL;
-  size_t enclen = 0;
-  int nbits;
-  cdk_error_t rc;
-  gcry_error_t err;
-
-  if (!sk || !sk->pk || !sig || !md)
-    return CDK_Inv_Value;
-
-  if (!is_unprotected (sk))
-    return CDK_Inv_Mode;
-
-  if (!KEY_CAN_SIGN (sig->pubkey_algo))
-    return CDK_Inv_Algo;
-
-  nbits = cdk_pk_get_nbits (sk->pk);
-  rc = _cdk_digest_encode_pkcs1 (&encmd, &enclen, sk->pk->pubkey_algo, md,
-                                 sig->digest_algo, nbits);
-  if (rc)
-    return rc;
-
-  rc = seckey_to_sexp (&s_skey, sk);
-  if (!rc)
-    rc = digest_to_sexp (&s_hash, sig->digest_algo, encmd, enclen);
-  if (rc)
-    {
-      cdk_free (encmd);
-      gcry_sexp_release (s_skey);
-      return rc;
-    }
-
-  err = gcry_pk_sign (&s_sig, s_hash, s_skey);
-  if (err)
-    rc = map_gcry_error (err);
-  else
-    {
-      rc = sexp_to_sig (sig, s_sig);
-      if (!rc)
-        {
-          sig->digest_start[0] = md[0];
-          sig->digest_start[1] = md[1];
-        }
-    }
-
-  gcry_sexp_release (s_skey);
-  gcry_sexp_release (s_hash);
-  gcry_sexp_release (s_sig);
-  cdk_free (encmd);
-  return rc;
-}
-
-
-/**
- * cdk_pk_verify:
- * @pk: the public key
- * @sig: signature
- * @md: the message digest
- *
- * Verify the signature in @sig and compare it with the message digest in @md.
- **/
-cdk_error_t
-cdk_pk_verify (cdk_pubkey_t pk, cdk_pkt_signature_t sig, const byte * md)
-{
-  gcry_sexp_t s_pkey = NULL, s_sig = NULL, s_hash = NULL;
-  byte *encmd = NULL;
-  size_t enclen;
-  cdk_error_t rc;
-
-  if (!pk || !sig || !md)
-    return CDK_Inv_Value;
-
-  rc = pubkey_to_sexp (&s_pkey, pk);
-  if (rc)
-    return rc;
-
-  rc = sig_to_sexp (&s_sig, sig);
-  if (rc)
-    goto leave;
-
-  rc = _cdk_digest_encode_pkcs1 (&encmd, &enclen, pk->pubkey_algo, md,
-                                 sig->digest_algo, cdk_pk_get_nbits (pk));
-  if (rc)
-    goto leave;
-
-  rc = digest_to_sexp (&s_hash, sig->digest_algo, encmd, enclen);
-  if (rc)
-    goto leave;
-
-  if (gcry_pk_verify (s_sig, s_hash, s_pkey))
-    rc = CDK_Bad_Sig;
-
-leave:
-  gcry_sexp_release (s_sig);
-  gcry_sexp_release (s_hash);
-  gcry_sexp_release (s_pkey);
-  cdk_free (encmd);
-  return rc;
-}
-
-
-/**
- * cdk_pk_get_nbits:
- * @pk: the public key
- * 
- * Return the length of the public key in bits.
- * The meaning of length is actually the size of the 'prime'
- * object in the key. For RSA keys the modulus, for ElG/DSA
- * the size of the public prime.
- **/
-int
-cdk_pk_get_nbits (cdk_pubkey_t pk)
-{
-  if (!pk || !pk->mpi[0])
-    return 0;
-  return gcry_mpi_get_nbits (pk->mpi[0]);
-}
-
-
-/**
- * cdk_pk_get_npkey:
- * @algo: The public key algorithm.
- * 
- * Return the number of multiprecison integer forming an public
- * key with the given algorithm.
- */
-int
-cdk_pk_get_npkey (int algo)
-{
-  size_t bytes;
-
-  if (algo == 16)
-    algo = 20;                  /* FIXME: libgcrypt returns 0 for 16 */
-  if (gcry_pk_algo_info (algo, GCRYCTL_GET_ALGO_NPKEY, NULL, &bytes))
-    return 0;
-  return bytes;
-}
-
-
-/**
- * cdk_pk_get_nskey:
- * @algo: the public key algorithm
- * 
- * Return the number of multiprecision integers forming an
- * secret key with the given algorithm.
- **/
-int
-cdk_pk_get_nskey (int algo)
-{
-  size_t bytes;
-
-  if (gcry_pk_algo_info (algo, GCRYCTL_GET_ALGO_NSKEY, NULL, &bytes))
-    return 0;
-  bytes -= cdk_pk_get_npkey (algo);
-  return bytes;
-}
-
-
-/**
- * cdk_pk_get_nbits:
- * @algo: the public key algorithm
- * 
- * Return the number of MPIs a signature consists of.
- **/
-int
-cdk_pk_get_nsig (int algo)
-{
-  size_t bytes;
-
-  if (gcry_pk_algo_info (algo, GCRYCTL_GET_ALGO_NSIGN, NULL, &bytes))
-    return 0;
-  return bytes;
-}
-
-
-/**
- * cdk_pk_get_nenc: 
- * @algo: the public key algorithm
- * 
- * Return the number of MPI's the encrypted data consists of.
- **/
-int
-cdk_pk_get_nenc (int algo)
-{
-  size_t bytes;
-
-  if (gcry_pk_algo_info (algo, GCRYCTL_GET_ALGO_NENCR, NULL, &bytes))
-    return 0;
-  return bytes;
-}
-
-
-int
-_cdk_pk_algo_usage (int algo)
-{
-  int usage;
-
-  /* The ElGamal sign+encrypt algorithm is not supported any longer. */
-  switch (algo)
-    {
-    case CDK_PK_RSA:
-      usage = CDK_KEY_USG_SIGN | CDK_KEY_USG_ENCR;
-      break;
-    case CDK_PK_RSA_E:
-      usage = CDK_KEY_USG_ENCR;
-      break;
-    case CDK_PK_RSA_S:
-      usage = CDK_KEY_USG_SIGN;
-      break;
-    case CDK_PK_ELG_E:
-      usage = CDK_KEY_USG_ENCR;
-      break;
-    case CDK_PK_DSA:
-      usage = CDK_KEY_USG_SIGN;
-      break;
-    default:
-      usage = 0;
-    }
-  return usage;
-}
-
-
-static cdk_error_t
-mpi_to_buffer (gcry_mpi_t a, byte * buf, size_t buflen,
-               size_t * r_nwritten, size_t * r_nbits)
-{
-  size_t nbits;
-
-  if (!a || !buf || !r_nwritten)
-    return CDK_Inv_Value;
-
-  nbits = gcry_mpi_get_nbits (a);
-  if (r_nbits)
-    *r_nbits = nbits;
-  if ((nbits + 7) / 8 + 2 > buflen)
-    return CDK_Too_Short;
-  *r_nwritten = (nbits + 7) / 8 + 2;
-  if (gcry_mpi_print (GCRYMPI_FMT_PGP, buf, buflen, r_nwritten, a))
-    return CDK_Wrong_Format;
-  return 0;
-}
-
-
-/**
- * cdk_pk_get_mpi:
- * @pk: public key
- * @idx: index of the MPI to retrieve
- * @buf: buffer to hold the raw data
- * @r_nwritten: output how large the raw data is
- * @r_nbits: size of the MPI in bits.
- * 
- * Return the MPI with the given index of the public key.
- **/
-cdk_error_t
-cdk_pk_get_mpi (cdk_pubkey_t pk, size_t idx,
-                byte * buf, size_t buflen, size_t * r_nwritten,
-                size_t * r_nbits)
-{
-  if (!pk || !r_nwritten)
-    return CDK_Inv_Value;
-  if (idx > cdk_pk_get_npkey (pk->pubkey_algo))
-    return CDK_Inv_Value;
-  return mpi_to_buffer (pk->mpi[idx], buf, buflen, r_nwritten, r_nbits);
-}
-
-
-/**
- * cdk_sk_get_mpi:
- * @sk: secret key
- * @idx: index of the MPI to retrieve
- * @buf: buffer to hold the raw data
- * @r_nwritten: output length of the raw data
- * @r_nbits: length of the MPI data in bits.
- * 
- * Return the MPI of the given secret key with the
- * index @idx. It is important to check if the key
- * is protected and thus no real MPI data will be returned then.
- **/
-cdk_error_t
-cdk_sk_get_mpi (cdk_pkt_seckey_t sk, size_t idx,
-                byte * buf, size_t buflen, size_t * r_nwritten,
-                size_t * r_nbits)
-{
-  if (!sk || !r_nwritten)
-    return CDK_Inv_Value;
-  if (idx > cdk_pk_get_nskey (sk->pubkey_algo))
-    return CDK_Inv_Value;
-  return mpi_to_buffer (sk->mpi[idx], buf, buflen, r_nwritten, r_nbits);
-}
-
-
-static u16
-checksum_mpi (gcry_mpi_t m)
-{
-  byte buf[MAX_MPI_BYTES + 2];
-  size_t nread;
-  int i;
-  u16 chksum = 0;
-
-  if (!m)
-    return 0;
-  if (gcry_mpi_print (GCRYMPI_FMT_PGP, buf, DIM (buf), &nread, m))
-    return 0;
-  for (i = 0; i < nread; i++)
-    chksum += buf[i];
-  return chksum;
-}
-
-
-/**
- * cdk_sk_unprotect:
- * @sk: the secret key
- * @pw: the passphrase
- * 
- * Unprotect the given secret key with the passphrase.
- **/
-cdk_error_t
-cdk_sk_unprotect (cdk_pkt_seckey_t sk, const char *pw)
-{
-  gcry_cipher_hd_t hd;
-  cdk_dek_t dek = NULL;
-  byte *data = NULL;
-  u16 chksum = 0;
-  size_t ndata, nbits, nbytes;
-  int i, dlen, pos = 0, nskey;
-  cdk_error_t rc;
-  gcry_error_t err;
-
-  if (!sk)
-    return CDK_Inv_Value;
-
-  nskey = cdk_pk_get_nskey (sk->pubkey_algo);
-  if (!sk->is_protected)
-    {
-      chksum = 0;
-      for (i = 0; i < nskey; i++)
-        chksum += checksum_mpi (sk->mpi[i]);
-      if (chksum != sk->csum)
-        return CDK_Chksum_Error;
-    }
-
-  rc = cdk_dek_from_passphrase (&dek, sk->protect.algo,
-                                sk->protect.s2k, 0, pw);
-  if (rc)
-    return rc;
-  err = gcry_cipher_open (&hd, sk->protect.algo, GCRY_CIPHER_MODE_CFB,
-                          GCRY_CIPHER_ENABLE_SYNC);
-  if (!err)
-    err = gcry_cipher_setiv (hd, sk->protect.iv, sk->protect.ivlen);
-  if (!err)
-    err = gcry_cipher_setkey (hd, dek->key, dek->keylen);
-  if (err)
-    {
-      cdk_free (dek);
-      return map_gcry_error (err);
-    }
-  cdk_dek_free (dek);
-  chksum = 0;
-  if (sk->version == 4)
-    {
-      ndata = sk->enclen;
-      data = cdk_salloc (ndata, 1);
-      if (!data)
-        return CDK_Out_Of_Core;
-      gcry_cipher_decrypt (hd, data, ndata, sk->encdata, ndata);
-      if (sk->protect.sha1chk)
-        {
-          /* This is the new SHA1 checksum method to detect tampering
-             with the key as used by the Klima/Rosa attack */
-          sk->csum = 0;
-          chksum = 1;
-          dlen = gcry_md_get_algo_dlen (GCRY_MD_SHA1);
-          if (ndata < dlen)
-            {
-              cdk_free (data);
-              return CDK_Inv_Packet;
-            }
-          else
-            {
-              byte mdcheck[20];
-
-              gcry_md_hash_buffer (GCRY_MD_SHA1, mdcheck, data, ndata - dlen);
-              if (!memcmp (mdcheck, data + ndata - dlen, dlen))
-                chksum = 0;     /* Digest does match */
-            }
-        }
-      else
-        {
-          for (i = 0; i < ndata - 2; i++)
-            chksum += data[i];
-          sk->csum = data[ndata - 2] << 8 | data[ndata - 1];
-        }
-      if (sk->csum == chksum)
-        {
-          for (i = 0; i < nskey; i++)
-            {
-              nbits = data[pos] << 8 | data[pos + 1];
-
-              if (gcry_mpi_scan (&sk->mpi[i], GCRYMPI_FMT_PGP, data,
-                                 (nbits + 7) / 8 + 2, &nbytes))
-                {
-                  wipemem (data, sk->enclen);
-                  cdk_free (data);
-                  return CDK_Wrong_Format;
-                }
-              gcry_mpi_set_flag (sk->mpi[i], GCRYMPI_FLAG_SECURE);
-              pos += (nbits + 7) / 8 + 2;
-            }
-        }
-      wipemem (data, sk->enclen);
-      cdk_free (data);
-    }
-  else
-    {
-      byte buf[MAX_MPI_BYTES + 2];
-
-      chksum = 0;
-      for (i = 0; i < nskey; i++)
-        {
-          gcry_cipher_sync (hd);
-          gcry_mpi_print (GCRYMPI_FMT_PGP, buf, DIM (buf),
-                          &nbytes, sk->mpi[i]);
-          gcry_cipher_decrypt (hd, buf + 2, nbytes - 2, NULL, 0);
-          gcry_mpi_release (sk->mpi[i]);
-          if (gcry_mpi_scan (&sk->mpi[i], GCRYMPI_FMT_PGP,
-                             buf, nbytes, &nbytes))
-            return CDK_Wrong_Format;
-          chksum += checksum_mpi (sk->mpi[i]);
-        }
-    }
-  gcry_cipher_close (hd);
-  if (chksum != sk->csum)
-    return CDK_Chksum_Error;
-  sk->is_protected = 0;
-  return 0;
-}
-
-
-/**
- * cdk_sk_protect:
- * @sk: the secret key
- * @pw: the passphrase to use
- * 
- * Protect the given secret key with a passphrase.
- **/
-cdk_error_t
-cdk_sk_protect (cdk_pkt_seckey_t sk, const char *pw)
-{
-  gcry_cipher_hd_t hd = NULL;
-  cdk_dek_t dek = NULL;
-  cdk_s2k_t s2k;
-  byte *p = NULL, buf[MAX_MPI_BYTES + 2];
-  size_t enclen = 0, nskey, i, nbytes;
-  size_t dlen = gcry_md_get_algo_dlen (GCRY_MD_SHA1);
-  gcry_error_t err;
-  cdk_error_t rc;
-
-  nskey = cdk_pk_get_nskey (sk->pubkey_algo);
-  if (!nskey)
-    return CDK_Inv_Algo;
-
-  rc = cdk_s2k_new (&s2k, CDK_S2K_ITERSALTED, GCRY_MD_SHA256, NULL);
-  if (!rc)
-    rc = cdk_dek_from_passphrase (&dek, GCRY_CIPHER_AES, s2k, 1, pw);
-  if (rc)
-    {
-      cdk_s2k_free (s2k);
-      return rc;
-    }
-
-  for (i = 0; i < nskey; i++)
-    {
-      enclen += 2;
-      enclen += (gcry_mpi_get_nbits (sk->mpi[i]) + 7) / 8;
-    }
-  p = sk->encdata = cdk_calloc (1, enclen + dlen + 1);
-  if (!p)
-    {
-      cdk_s2k_free (s2k);
-      return CDK_Out_Of_Core;
-    }
-
-  enclen = 0;
-  for (i = 0; i < nskey; i++)
-    {
-      if (gcry_mpi_print (GCRYMPI_FMT_PGP, buf,
-                          DIM (buf), &nbytes, sk->mpi[i]))
-        {
-          cdk_free (p);
-          cdk_s2k_free (s2k);
-          return CDK_Wrong_Format;
-        }
-      memcpy (p + enclen, buf, nbytes);
-      enclen += nbytes;
-    }
-
-  enclen += dlen;
-  sk->enclen = enclen;
-  sk->protect.s2k = s2k;
-  sk->protect.algo = GCRY_CIPHER_AES;
-  sk->protect.ivlen = gcry_cipher_get_algo_blklen (sk->protect.algo);
-  gcry_randomize (sk->protect.iv, sk->protect.ivlen, GCRY_STRONG_RANDOM);
-  err = gcry_cipher_open (&hd, sk->protect.algo, GCRY_CIPHER_MODE_CFB,
-                          GCRY_CIPHER_ENABLE_SYNC);
-  if (err)
-    {
-      cdk_dek_free (dek);
-      rc = map_gcry_error (err);
-      goto leave;
-    }
-
-  err = gcry_cipher_setkey (hd, dek->key, dek->keylen);
-  if (!err)
-    err = gcry_cipher_setiv (hd, sk->protect.iv, sk->protect.ivlen);
-  cdk_dek_free (dek);
-  if (err)
-    {
-      rc = map_gcry_error (err);
-      goto leave;
-    }
-
-  sk->protect.sha1chk = 1;
-  sk->is_protected = 1;
-  sk->csum = 0;
-
-  gcry_md_hash_buffer (GCRY_MD_SHA1, buf, p, enclen - dlen);
-  memcpy (p + enclen - dlen, buf, dlen);
-  gcry_cipher_encrypt (hd, p, enclen, NULL, 0);
-
-  /* FIXME: We should release all MPI's and set the elements to NULL. */
-
-leave:
-  gcry_cipher_close (hd);
-  return rc;
-}
-
-
-/**
- * cdk_pk_from_secret_key:
- * @sk: the secret key
- * @ret_pk: the new public key
- *
- * Create a new public key from a secret key.
- **/
-cdk_error_t
-cdk_pk_from_secret_key (cdk_pkt_seckey_t sk, cdk_pubkey_t * ret_pk)
-{
-  if (!sk)
-    return CDK_Inv_Value;
-  return _cdk_copy_pubkey (ret_pk, sk->pk);
-}
-
-
-#if 0                           /* FIXME: Code is not finished yet. */
-cdk_error_t
-cdk_pk_revoke_cert_create (cdk_pkt_seckey_t sk, int code, const char *inf,
-                           char **ret_revcert)
-{
-  gcry_md_hd_t md;
-  cdk_subpkt_t node;
-  cdk_pkt_signature_t sig;
-  char *p = NULL, *dat;
-  gcry_error_t err;
-  cdk_error_t rc = 0;
-  size_t n;
-
-  if (!sk || !ret_revcert)
-    return CDK_Inv_Value;
-  if (code < 0 || code > 3)
-    return CDK_Inv_Value;
-
-  sig = cdk_calloc (1, sizeof *sig);
-  if (!sig)
-    return CDK_Out_Of_Core;
-  _cdk_sig_create (sk->pk, sig);
-  n = 1;
-  if (inf)
-    {
-      n += strlen (p);
-      p = cdk_utf8_encode (inf);
-    }
-  dat = cdk_calloc (1, n + 1);
-  if (!dat)
-    {
-      _cdk_free_signature (sig);
-      return CDK_Out_Of_Core;
-    }
-  dat[0] = code;
-  if (inf)
-    memcpy (dat + 1, p, strlen (p));
-  cdk_free (p);
-
-  node = cdk_subpkt_new (n);
-  if (node)
-    {
-      cdk_subpkt_init (node, CDK_SIGSUBPKT_REVOC_REASON, dat, n);
-      cdk_subpkt_add (sig->hashed, node);
-    }
-  cdk_free (dat);
-
-  err = gcry_md_open (&md, GCRY_MD_SHA1, 0);
-  if (err)
-    rc = map_gcry_error (err);
-  else
-    _cdk_hash_pubkey (sk->pk, md, 0);
-  _cdk_free_signature (sig);
-
-  return rc;
-}
-#endif
-
-int
-_cdk_sk_get_csum (cdk_pkt_seckey_t sk)
-{
-  u16 csum = 0, i;
-
-  if (!sk)
-    return 0;
-  for (i = 0; i < cdk_pk_get_nskey (sk->pubkey_algo); i++)
-    csum += checksum_mpi (sk->mpi[i]);
-  return csum;
-}
-
-
-/**
- * cdk_pk_get_fingerprint:
- * @pk: the public key
- * @fpr: the buffer to hold the fingerprint
- * 
- * Return the fingerprint of the given public key.
- * The buffer must be at least 20 octets.
- * This function should be considered deprecated and
- * the new cdk_pk_to_fingerprint() should be used whenever
- * possible to avoid overflows.
- **/
-cdk_error_t
-cdk_pk_get_fingerprint (cdk_pubkey_t pk, byte * fpr)
-{
-  gcry_md_hd_t hd;
-  int md_algo;
-  int dlen = 0;
-  gcry_error_t err;
-
-  if (!pk || !fpr)
-    return CDK_Inv_Value;
-
-  if (pk->version < 4 && is_RSA (pk->pubkey_algo))
-    md_algo = GCRY_MD_MD5;      /* special */
-  else
-    md_algo = GCRY_MD_SHA1;
-  dlen = gcry_md_get_algo_dlen (md_algo);
-  err = gcry_md_open (&hd, md_algo, 0);
-  if (err)
-    return map_gcry_error (err);
-  _cdk_hash_pubkey (pk, hd, 1);
-  gcry_md_final (hd);
-  memcpy (fpr, gcry_md_read (hd, md_algo), dlen);
-  gcry_md_close (hd);
-  if (dlen == 16)
-    memset (fpr + 16, 0, 4);
-  return 0;
-}
-
-
-/**
- * cdk_pk_to_fingerprint:
- * @pk: the public key
- * @fprbuf: buffer to save the fingerprint
- * @fprbuflen: buffer size
- * @r_nout: actual length of the fingerprint.
- * 
- * Calculate a fingerprint of the given key and
- * return it in the given byte array.
- **/
-cdk_error_t
-cdk_pk_to_fingerprint (cdk_pubkey_t pk,
-                       byte * fprbuf, size_t fprbuflen, size_t * r_nout)
-{
-  size_t key_fprlen;
-  cdk_error_t err;
-
-  if (!pk)
-    return CDK_Inv_Value;
-
-  if (pk->version < 4)
-    key_fprlen = 16;
-  else
-    key_fprlen = 20;
-
-  /* Only return the required buffer size for the fingerprint. */
-  if (!fprbuf && !fprbuflen && r_nout)
-    {
-      *r_nout = key_fprlen;
-      return 0;
-    }
-
-  if (!fprbuf || key_fprlen > fprbuflen)
-    return CDK_Too_Short;
-
-  err = cdk_pk_get_fingerprint (pk, fprbuf);
-  if (r_nout)
-    *r_nout = key_fprlen;
-
-  return err;
-}
-
-
-/**
- * cdk_pk_fingerprint_get_keyid:
- * @fpr: the key fingerprint
- * @fprlen: the length of the fingerprint
- * 
- * Derive the key ID from the key fingerprint.
- * For version 3 keys, this is not working.
- **/
-u32
-cdk_pk_fingerprint_get_keyid (const byte * fpr, size_t fprlen, u32 * keyid)
-{
-  u32 lowbits = 0;
-
-  /* In this case we say the key is a V3 RSA key and we can't
-     use the fingerprint to get the keyid. */
-  if (fpr && fprlen == 16)
-    {
-      keyid[0] = 0;
-      keyid[1] = 0;
-      return 0;
-    }
-  else if (keyid && fpr)
-    {
-      keyid[0] = _cdk_buftou32 (fpr + 12);
-      keyid[1] = _cdk_buftou32 (fpr + 16);
-      lowbits = keyid[1];
-    }
-  else if (fpr)
-    lowbits = _cdk_buftou32 (fpr + 16);
-  return lowbits;
-}
-
-
-/**
- * cdk_pk_get_keyid:
- * @pk: the public key
- * @keyid: buffer to store the key ID
- * 
- * Calculate the key ID of the given public key.
- **/
-u32
-cdk_pk_get_keyid (cdk_pubkey_t pk, u32 * keyid)
-{
-  u32 lowbits = 0;
-  byte buf[24];
-
-  if (pk && (!pk->keyid[0] || !pk->keyid[1]))
-    {
-      if (pk->version < 4 && is_RSA (pk->pubkey_algo))
-        {
-          byte p[MAX_MPI_BYTES];
-          size_t n;
-
-          gcry_mpi_print (GCRYMPI_FMT_USG, p, MAX_MPI_BYTES, &n, pk->mpi[0]);
-          pk->keyid[0] =
-            p[n - 8] << 24 | p[n - 7] << 16 | p[n - 6] << 8 | p[n - 5];
-          pk->keyid[1] =
-            p[n - 4] << 24 | p[n - 3] << 16 | p[n - 2] << 8 | p[n - 1];
-        }
-      else if (pk->version == 4)
-        {
-          cdk_pk_get_fingerprint (pk, buf);
-          pk->keyid[0] = _cdk_buftou32 (buf + 12);
-          pk->keyid[1] = _cdk_buftou32 (buf + 16);
-        }
-    }
-  lowbits = pk ? pk->keyid[1] : 0;
-  if (keyid && pk)
-    {
-      keyid[0] = pk->keyid[0];
-      keyid[1] = pk->keyid[1];
-    }
-
-  return lowbits;
-}
-
-
-/**
- * cdk_sk_get_keyid:
- * @sk: the secret key
- * @keyid: buffer to hold the key ID
- * 
- * Calculate the key ID of the secret key, actually the public key.
- **/
-u32
-cdk_sk_get_keyid (cdk_pkt_seckey_t sk, u32 * keyid)
-{
-  u32 lowbits = 0;
-
-  if (sk && sk->pk)
-    {
-      lowbits = cdk_pk_get_keyid (sk->pk, keyid);
-      sk->keyid[0] = sk->pk->keyid[0];
-      sk->keyid[1] = sk->pk->keyid[1];
-    }
-
-  return lowbits;
-}
-
-
-/**
- * cdk_sig_get_keyid:
- * @sig: the signature
- * @keyid: buffer to hold the key ID
- * 
- * Retrieve the key ID from the given signature.
- **/
-u32
-cdk_sig_get_keyid (cdk_pkt_signature_t sig, u32 * keyid)
-{
-  u32 lowbits = sig ? sig->keyid[1] : 0;
-
-  if (keyid && sig)
-    {
-      keyid[0] = sig->keyid[0];
-      keyid[1] = sig->keyid[1];
-    }
-  return lowbits;
-}
-
-
-/* Return the key ID from the given packet.
-   If this is not possible, 0 is returned */
-u32
-_cdk_pkt_get_keyid (cdk_packet_t pkt, u32 * keyid)
-{
-  u32 lowbits;
-
-  if (!pkt)
-    return 0;
-
-  switch (pkt->pkttype)
-    {
-    case CDK_PKT_PUBLIC_KEY:
-    case CDK_PKT_PUBLIC_SUBKEY:
-      lowbits = cdk_pk_get_keyid (pkt->pkt.public_key, keyid);
-      break;
-
-    case CDK_PKT_SECRET_KEY:
-    case CDK_PKT_SECRET_SUBKEY:
-      lowbits = cdk_sk_get_keyid (pkt->pkt.secret_key, keyid);
-      break;
-
-    case CDK_PKT_SIGNATURE:
-      lowbits = cdk_sig_get_keyid (pkt->pkt.signature, keyid);
-      break;
-
-    default:
-      lowbits = 0;
-      break;
-    }
-
-  return lowbits;
-}
-
-
-/* Get the fingerprint of the packet if possible. */
-int
-_cdk_pkt_get_fingerprint (cdk_packet_t pkt, byte * fpr)
-{
-  if (!pkt || !fpr)
-    return CDK_Inv_Value;
-
-  switch (pkt->pkttype)
-    {
-    case CDK_PKT_PUBLIC_KEY:
-    case CDK_PKT_PUBLIC_SUBKEY:
-      return cdk_pk_get_fingerprint (pkt->pkt.public_key, fpr);
-
-    case CDK_PKT_SECRET_KEY:
-    case CDK_PKT_SECRET_SUBKEY:
-      return cdk_pk_get_fingerprint (pkt->pkt.secret_key->pk, fpr);
-
-    default:
-      return CDK_Inv_Mode;
-    }
-  return 0;
-}
-
-
-/**
- * cdk_pubkey_to_sexp:
- * @pk: the public key
- * @sexp: where to store the S-expression
- * @len: the length of sexp
- *
- * Convert a public key to an S-expression. sexp is allocated by this
- * function, but you have to cdk_free() it yourself.  The S-expression
- * is stored in canonical format as used by libgcrypt
- * (GCRYSEXP_FMT_CANON).
- **/
-cdk_error_t
-cdk_pubkey_to_sexp (cdk_pubkey_t pk, char **sexp, size_t * len)
-{
-  char *buf;
-  size_t sexp_len;
-  gcry_sexp_t pk_sexp;
-  cdk_error_t rc;
-
-  if (!pk || !sexp)
-    return CDK_Inv_Value;
-
-  rc = pubkey_to_sexp (&pk_sexp, pk);
-  if (rc)
-    return rc;
-
-  sexp_len = gcry_sexp_sprint (pk_sexp, GCRYSEXP_FMT_CANON, NULL, 0);
-  if (!sexp_len)
-    return CDK_Wrong_Format;
-
-  buf = (char *) cdk_malloc (sexp_len);
-  if (!buf)
-    {
-      gcry_sexp_release (pk_sexp);
-      return CDK_Out_Of_Core;
-    }
-
-  sexp_len = gcry_sexp_sprint (pk_sexp, GCRYSEXP_FMT_CANON, buf, sexp_len);
-  gcry_sexp_release (pk_sexp);
-  if (!sexp_len)
-    {
-      cdk_free (buf);
-      return CDK_Wrong_Format;
-    }
-
-  if (len)
-    *len = sexp_len;
-  *sexp = buf;
-  return CDK_Success;
-}
-
-
-/**
- * cdk_seckey_to_sexp:
- * @sk: the secret key
- * @sexp: where to store the S-expression
- * @len: the length of sexp
- *
- * Convert a public key to an S-expression. sexp is allocated by this
- * function, but you have to cdk_free() it yourself.  The S-expression
- * is stored in canonical format as used by libgcrypt
- * (GCRYSEXP_FMT_CANON).
- **/
-cdk_error_t
-cdk_seckey_to_sexp (cdk_pkt_seckey_t sk, char **sexp, size_t * len)
-{
-  char *buf;
-  size_t sexp_len;
-  gcry_sexp_t sk_sexp;
-  cdk_error_t rc;
-
-  if (!sk || !sexp)
-    return CDK_Inv_Value;
-
-  rc = seckey_to_sexp (&sk_sexp, sk);
-  if (rc)
-    return rc;
-
-  sexp_len = gcry_sexp_sprint (sk_sexp, GCRYSEXP_FMT_CANON, NULL, 0);
-  if (!sexp_len)
-    return CDK_Wrong_Format;
-
-  buf = (char *) cdk_malloc (sexp_len);
-  if (!buf)
-    {
-      gcry_sexp_release (sk_sexp);
-      return CDK_Out_Of_Core;
-    }
-
-  sexp_len = gcry_sexp_sprint (sk_sexp, GCRYSEXP_FMT_CANON, buf, sexp_len);
-  gcry_sexp_release (sk_sexp);
-  if (!sexp_len)
-    {
-      cdk_free (buf);
-      return CDK_Wrong_Format;
-    }
-
-  if (len)
-    *len = sexp_len;
-  *sexp = buf;
-
-  return CDK_Success;
-}

+ 0 - 1179
src/daemon/https/opencdk/read-packet.c

@@ -1,1179 +0,0 @@
-/* read-packet.c - Read OpenPGP packets
- *        Copyright (C) 2001, 2002, 2003, 2007 Timo Schulz
- *
- * This file is part of OpenCDK.
- *
- * OpenCDK is free software; you can redistribute it and/or modify 
- * it under the terms of the GNU General Public License as published by 
- * the Free Software Foundation; either version 2 of the License, or 
- * (at your option) any later version. 
- *  
- * OpenCDK is distributed in the hope that it will be useful, 
- * but WITHOUT ANY WARRANTY; without even the implied warranty of 
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the 
- * GNU General Public License for more details. 
- */
-#ifdef HAVE_CONFIG_H
-#include <config.h>
-#endif
-#include <string.h>
-#include <stdio.h>
-#include <time.h>
-#include <assert.h>
-
-#include "opencdk.h"
-#include "main.h"
-#include "packet.h"
-#include "types.h"
-
-
-/* The version of the MDC packet considering the lastest OpenPGP draft. */
-#define MDC_PKT_VER 1
-
-static int
-stream_read (cdk_stream_t s, void *buf, size_t buflen, size_t * r_nread)
-{
-  *r_nread = cdk_stream_read (s, buf, buflen);
-  return *r_nread > 0 ? 0 : _cdk_stream_get_errno (s);
-}
-
-
-/* Try to read 4 octets from the stream. */
-static u32
-read_32 (cdk_stream_t s)
-{
-  byte buf[4];
-  size_t nread;
-
-  assert (s != NULL);
-
-  stream_read (s, buf, 4, &nread);
-  if (nread != 4)
-    return (u32) - 1;
-  return buf[0] << 24 | buf[1] << 16 | buf[2] << 8 | buf[3];
-}
-
-
-/* Try to read 2 octets from a stream. */
-static u16
-read_16 (cdk_stream_t s)
-{
-  byte buf[2];
-  size_t nread;
-
-  assert (s != NULL);
-
-  stream_read (s, buf, 2, &nread);
-  if (nread != 2)
-    return (u16) - 1;
-  return buf[0] << 8 | buf[1];
-}
-
-
-static int
-read_s2k (cdk_stream_t inp, cdk_s2k_t s2k)
-{
-  size_t nread;
-
-  if (!inp || !s2k)
-    return CDK_Inv_Value;
-
-  if (DEBUG_PKT)
-    _cdk_log_debug ("read_s2k:\n");
-
-  s2k->mode = cdk_stream_getc (inp);
-  if (cdk_stream_eof (inp))
-    return CDK_Inv_Packet;
-  if (s2k->mode != CDK_S2K_SIMPLE && s2k->mode != CDK_S2K_SALTED &&
-      s2k->mode != CDK_S2K_ITERSALTED)
-    return CDK_Inv_Packet;
-  s2k->hash_algo = cdk_stream_getc (inp);
-  if (s2k->mode == CDK_S2K_SIMPLE)      /* No additional elements. */
-    memset (s2k->salt, 0, sizeof (s2k->salt));
-  else if (s2k->mode == CDK_S2K_SALTED || s2k->mode == CDK_S2K_ITERSALTED)
-    {
-      if (stream_read (inp, s2k->salt, DIM (s2k->salt), &nread))
-        return CDK_Inv_Packet;
-      if (nread != DIM (s2k->salt))
-        return CDK_Inv_Packet;
-      if (s2k->mode == CDK_S2K_ITERSALTED)
-        {
-          s2k->count = cdk_stream_getc (inp);
-          if (cdk_stream_eof (inp))
-            return CDK_Inv_Packet;
-        }
-    }
-  else
-    return CDK_Inv_Mode;
-  return 0;
-}
-
-
-static cdk_error_t
-read_mpi (cdk_stream_t inp, gcry_mpi_t * ret_m, int secure)
-{
-  gcry_mpi_t m;
-  gcry_error_t err;
-  byte buf[MAX_MPI_BYTES + 2];
-  size_t nread, nbits;
-  cdk_error_t rc;
-
-  if (!inp || !ret_m)
-    return CDK_Inv_Value;
-
-  *ret_m = NULL;
-  nbits = read_16 (inp);
-  nread = (nbits + 7) / 8;
-
-  if (nbits > MAX_MPI_BITS || nbits == 0)
-    {
-      _cdk_log_debug ("read_mpi: too large %d bits\n", nbits);
-      return CDK_MPI_Error;     /* Sanity check */
-    }
-
-  rc = stream_read (inp, buf + 2, nread, &nread);
-  if (!rc && nread != ((nbits + 7) / 8))
-    {
-      _cdk_log_debug ("read_mpi: too short %d < %d\n", nread,
-                      (nbits + 7) / 8);
-      return CDK_MPI_Error;
-    }
-
-  buf[0] = nbits >> 8;
-  buf[1] = nbits >> 0;
-  err = gcry_mpi_scan (&m, GCRYMPI_FMT_PGP, buf, nread + 2, &nread);
-  if (err)
-    return map_gcry_error (err);
-  if (secure)
-    gcry_mpi_set_flag (m, GCRYMPI_FLAG_SECURE);
-  *ret_m = m;
-  return rc;
-}
-
-
-/* Read the encoded packet length directly from the file 
-   object INP and return it. Reset RET_PARTIAL if this is
-   the last packet in block mode. */
-size_t
-_cdk_pkt_read_len (FILE * inp, size_t * ret_partial)
-{
-  int c1, c2;
-  size_t pktlen;
-
-  c1 = fgetc (inp);
-  if (c1 == EOF)
-    return (size_t) EOF;
-  if (c1 < 224 || c1 == 255)
-    *ret_partial = 0;           /* End of partial data */
-  if (c1 < 192)
-    pktlen = c1;
-  else if (c1 >= 192 && c1 <= 223)
-    {
-      c2 = fgetc (inp);
-      if (c2 == EOF)
-        return (size_t) EOF;
-      pktlen = ((c1 - 192) << 8) + c2 + 192;
-    }
-  else if (c1 == 255)
-    {
-      pktlen = fgetc (inp) << 24;
-      pktlen |= fgetc (inp) << 16;
-      pktlen |= fgetc (inp) << 8;
-      pktlen |= fgetc (inp) << 0;
-    }
-  else
-    pktlen = 1 << (c1 & 0x1f);
-  return pktlen;
-}
-
-
-static cdk_error_t
-read_encrypted (cdk_stream_t inp, size_t pktlen, cdk_pkt_encrypted_t enc,
-                int is_partial, int is_mdc)
-{
-  if (!inp || !enc)
-    return CDK_Inv_Value;
-
-  if (DEBUG_PKT)
-    _cdk_log_debug ("read_encrypted: %d octets\n", pktlen);
-
-  if (is_mdc)
-    {
-      int version = cdk_stream_getc (inp);
-      if (version != MDC_PKT_VER)
-        return CDK_Inv_Packet;
-      enc->mdc_method = CDK_MD_SHA1;
-      pktlen--;
-    }
-  /* The packet must at least contain blocksize + 2 octets. */
-  if (pktlen < 10)
-    return CDK_Inv_Packet;
-  if (is_partial)
-    _cdk_stream_set_blockmode (inp, pktlen);
-  enc->len = pktlen;
-  enc->buf = inp;
-  return 0;
-}
-
-
-static cdk_error_t
-read_symkey_enc (cdk_stream_t inp, size_t pktlen, cdk_pkt_symkey_enc_t ske)
-{
-  cdk_s2k_t s2k;
-  size_t minlen;
-  size_t nread, nleft;
-
-  if (!inp || !ske)
-    return CDK_Inv_Value;
-
-  if (DEBUG_PKT)
-    _cdk_log_debug ("read_symkey_enc: %d octets\n", pktlen);
-
-  ske->version = cdk_stream_getc (inp);
-  if (ske->version != 4 || cdk_stream_eof (inp))
-    return CDK_Inv_Packet;
-
-  s2k = ske->s2k = cdk_calloc (1, sizeof *ske->s2k);
-  if (!ske->s2k)
-    return CDK_Out_Of_Core;
-
-  ske->cipher_algo = cdk_stream_getc (inp);
-  s2k->mode = cdk_stream_getc (inp);
-  switch (s2k->mode)
-    {
-    case CDK_S2K_SIMPLE:
-      minlen = 0;
-      break;
-    case CDK_S2K_SALTED:
-      minlen = 8;
-      break;
-    case CDK_S2K_ITERSALTED:
-      minlen = 9;
-      break;
-
-    default:
-      /* Invalid S2K mode. */
-      return CDK_Inv_Packet;
-    }
-
-  s2k->hash_algo = cdk_stream_getc (inp);
-  if (s2k->mode == CDK_S2K_SALTED || s2k->mode == CDK_S2K_ITERSALTED)
-    {
-      if (stream_read (inp, s2k->salt, DIM (s2k->salt), &nread))
-        return CDK_Inv_Packet;
-      if (nread != DIM (s2k->salt))
-        return CDK_Inv_Packet;
-
-      if (s2k->mode == CDK_S2K_ITERSALTED)
-        s2k->count = cdk_stream_getc (inp);
-    }
-
-  ske->seskeylen = pktlen - 4 - minlen;
-  /* We check if there is an encrypted session key and if it fits into
-     the buffer. The maximal key length is 256-bit. */
-  if (ske->seskeylen > DIM (ske->seskey))
-    return CDK_Inv_Packet;
-  nleft = ske->seskeylen;
-  for (nread = 0; nread < ske->seskeylen; nread++)
-    {
-      ske->seskey[nread] = cdk_stream_getc (inp);
-      if (cdk_stream_eof (inp) && --nleft > 0)
-        return CDK_Inv_Packet;
-    }
-
-  return 0;
-}
-
-
-static cdk_error_t
-read_pubkey_enc (cdk_stream_t inp, size_t pktlen, cdk_pkt_pubkey_enc_t pke)
-{
-  size_t i, nenc;
-
-  if (!inp || !pke)
-    return CDK_Inv_Value;
-
-  if (DEBUG_PKT)
-    _cdk_log_debug ("read_pubkey_enc: %d octets\n", pktlen);
-
-  if (pktlen < 12)
-    return CDK_Inv_Packet;
-  pke->version = cdk_stream_getc (inp);
-  if (pke->version < 2 || pke->version > 3)
-    return CDK_Inv_Packet;
-  pke->keyid[0] = read_32 (inp);
-  pke->keyid[1] = read_32 (inp);
-  if (!pke->keyid[0] && !pke->keyid[1])
-    pke->throw_keyid = 1;       /* RFC2440 "speculative" keyID */
-  pke->pubkey_algo = cdk_stream_getc (inp);
-  nenc = cdk_pk_get_nenc (pke->pubkey_algo);
-  if (!nenc)
-    return CDK_Inv_Algo;
-  for (i = 0; i < nenc; i++)
-    {
-      cdk_error_t rc = read_mpi (inp, &pke->mpi[i], 0);
-      if (rc)
-        return rc;
-    }
-
-  return 0;
-}
-
-
-
-static cdk_error_t
-read_mdc (cdk_stream_t inp, cdk_pkt_mdc_t mdc)
-{
-  size_t n;
-  cdk_error_t rc;
-
-  if (!inp || !mdc)
-    return CDK_Inv_Value;
-
-  if (DEBUG_PKT)
-    _cdk_log_debug ("read_mdc:\n");
-
-  rc = stream_read (inp, mdc->hash, DIM (mdc->hash), &n);
-  if (rc)
-    return rc;
-
-  return n != DIM (mdc->hash) ? CDK_Inv_Packet : 0;
-}
-
-
-static cdk_error_t
-read_compressed (cdk_stream_t inp, size_t pktlen, cdk_pkt_compressed_t c)
-{
-  if (!inp || !c)
-    return CDK_Inv_Value;
-
-  if (DEBUG_PKT)
-    _cdk_log_debug ("read_compressed: %d octets\n", pktlen);
-
-  c->algorithm = cdk_stream_getc (inp);
-  if (c->algorithm > 3)
-    return CDK_Inv_Packet;
-
-  /* don't know the size, so we read until EOF */
-  if (!pktlen)
-    {
-      c->len = 0;
-      c->buf = inp;
-    }
-
-  /* FIXME: Support partial bodies. */
-  return 0;
-}
-
-
-static cdk_error_t
-read_public_key (cdk_stream_t inp, size_t pktlen, cdk_pkt_pubkey_t pk)
-{
-  size_t i, ndays, npkey;
-
-  if (!inp || !pk)
-    return CDK_Inv_Value;
-
-  if (DEBUG_PKT)
-    _cdk_log_debug ("read_public_key: %d octets\n", pktlen);
-
-  pk->is_invalid = 1;           /* default to detect missing self signatures */
-  pk->is_revoked = 0;
-  pk->has_expired = 0;
-
-  pk->version = cdk_stream_getc (inp);
-  if (pk->version < 2 || pk->version > 4)
-    return CDK_Inv_Packet_Ver;
-  pk->timestamp = read_32 (inp);
-  if (pk->version < 4)
-    {
-      ndays = read_16 (inp);
-      if (ndays)
-        pk->expiredate = pk->timestamp + ndays * 86400L;
-    }
-
-  pk->pubkey_algo = cdk_stream_getc (inp);
-  npkey = cdk_pk_get_npkey (pk->pubkey_algo);
-  if (!npkey)
-    {
-      _cdk_log_debug ("invalid public key algorithm %d\n", pk->pubkey_algo);
-      return CDK_Inv_Algo;
-    }
-  for (i = 0; i < npkey; i++)
-    {
-      cdk_error_t rc = read_mpi (inp, &pk->mpi[i], 0);
-      if (rc)
-        return rc;
-    }
-
-  /* These values are just for the first run and should be
-     replaced with the actual key flags from the self signature. */
-  pk->pubkey_usage = _cdk_pk_algo_usage (pk->pubkey_algo);
-  return 0;
-}
-
-
-static cdk_error_t
-read_public_subkey (cdk_stream_t inp, size_t pktlen, cdk_pkt_pubkey_t pk)
-{
-  if (!inp || !pk)
-    return CDK_Inv_Value;
-  return read_public_key (inp, pktlen, pk);
-}
-
-
-static cdk_error_t
-read_secret_key (cdk_stream_t inp, size_t pktlen, cdk_pkt_seckey_t sk)
-{
-  size_t p1, p2, nread;
-  int i, nskey;
-  int rc;
-
-  if (!inp || !sk || !sk->pk)
-    return CDK_Inv_Value;
-
-  if (DEBUG_PKT)
-    _cdk_log_debug ("read_secret_key: %d octets\n", pktlen);
-
-  p1 = cdk_stream_tell (inp);
-  rc = read_public_key (inp, pktlen, sk->pk);
-  if (rc)
-    return rc;
-
-  sk->s2k_usage = cdk_stream_getc (inp);
-  sk->protect.sha1chk = 0;
-  if (sk->s2k_usage == 254 || sk->s2k_usage == 255)
-    {
-      sk->protect.sha1chk = (sk->s2k_usage == 254);
-      sk->protect.algo = cdk_stream_getc (inp);
-      sk->protect.s2k = cdk_calloc (1, sizeof *sk->protect.s2k);
-      if (!sk->protect.s2k)
-        return CDK_Out_Of_Core;
-      rc = read_s2k (inp, sk->protect.s2k);
-      if (rc)
-        return rc;
-      sk->protect.ivlen = gcry_cipher_get_algo_blklen (sk->protect.algo);
-      if (!sk->protect.ivlen)
-        return CDK_Inv_Packet;
-      rc = stream_read (inp, sk->protect.iv, sk->protect.ivlen, &nread);
-      if (rc)
-        return rc;
-      if (nread != sk->protect.ivlen)
-        return CDK_Inv_Packet;
-    }
-  else
-    sk->protect.algo = sk->s2k_usage;
-  if (sk->protect.algo == GCRY_CIPHER_NONE)
-    {
-      sk->csum = 0;
-      nskey = cdk_pk_get_nskey (sk->pk->pubkey_algo);
-      if (!nskey)
-        return CDK_Inv_Algo;
-      for (i = 0; i < nskey; i++)
-        {
-          rc = read_mpi (inp, &sk->mpi[i], 1);
-          if (rc)
-            return rc;
-        }
-      sk->csum = read_16 (inp);
-      sk->is_protected = 0;
-    }
-  else if (sk->pk->version < 4)
-    {
-      /* The length of each multiprecision integer is stored in plaintext. */
-      nskey = cdk_pk_get_nskey (sk->pk->pubkey_algo);
-      if (!nskey)
-        return CDK_Inv_Algo;
-      for (i = 0; i < nskey; i++)
-        {
-          rc = read_mpi (inp, &sk->mpi[i], 1);
-          if (rc)
-            return rc;
-        }
-      sk->csum = read_16 (inp);
-      sk->is_protected = 1;
-    }
-  else
-    {
-      /* We need to read the rest of the packet because we do not
-         have any information how long the encrypted mpi's are */
-      p2 = cdk_stream_tell (inp);
-      p2 -= p1;
-      sk->enclen = pktlen - p2;
-      if (sk->enclen < 2)
-        return CDK_Inv_Packet;  /* at least 16 bits for the checksum! */
-      sk->encdata = cdk_calloc (1, sk->enclen + 1);
-      if (!sk->encdata)
-        return CDK_Out_Of_Core;
-      if (stream_read (inp, sk->encdata, sk->enclen, &nread))
-        return CDK_Inv_Packet;
-      nskey = cdk_pk_get_nskey (sk->pk->pubkey_algo);
-      if (!nskey)
-        return CDK_Inv_Algo;
-      /* We mark each MPI entry with NULL to indicate a protected key. */
-      for (i = 0; i < nskey; i++)
-        sk->mpi[i] = NULL;
-      sk->is_protected = 1;
-    }
-
-  sk->is_primary = 1;
-  _cdk_copy_pk_to_sk (sk->pk, sk);
-  return 0;
-}
-
-
-static cdk_error_t
-read_secret_subkey (cdk_stream_t inp, size_t pktlen, cdk_pkt_seckey_t sk)
-{
-  cdk_error_t rc;
-
-  if (!inp || !sk || !sk->pk)
-    return CDK_Inv_Value;
-
-  rc = read_secret_key (inp, pktlen, sk);
-  sk->is_primary = 0;
-  return rc;
-}
-
-
-static cdk_error_t
-read_attribute (cdk_stream_t inp, size_t pktlen, cdk_pkt_userid_t attr)
-{
-  const byte *p;
-  byte *buf;
-  size_t len, nread;
-  cdk_error_t rc;
-
-  if (!inp || !attr || !pktlen)
-    return CDK_Inv_Value;
-
-  if (DEBUG_PKT)
-    _cdk_log_debug ("read_attribute: %d octets\n", pktlen);
-
-  strcpy (attr->name, "[attribute]");
-  attr->len = strlen (attr->name);
-  buf = cdk_calloc (1, pktlen);
-  if (!buf)
-    return CDK_Out_Of_Core;
-  rc = stream_read (inp, buf, pktlen, &nread);
-  if (rc)
-    {
-      cdk_free (buf);
-      return CDK_Inv_Packet;
-    }
-  p = buf;
-  len = *p++;
-  pktlen--;
-  if (len == 255)
-    {
-      len = _cdk_buftou32 (p);
-      p += 4;
-      pktlen -= 4;
-    }
-  else if (len >= 192)
-    {
-      if (pktlen < 2)
-        {
-          cdk_free (buf);
-          return CDK_Inv_Packet;
-        }
-      len = ((len - 192) << 8) + *p + 192;
-      p++;
-      pktlen--;
-    }
-
-  if (*p != 1)                  /* Currently only 1, meaning an image, is defined. */
-    {
-      cdk_free (buf);
-      return CDK_Inv_Packet;
-    }
-  p++;
-  len--;
-
-  if (pktlen - (len + 1) > 0)
-    return CDK_Inv_Packet;
-  attr->attrib_img = cdk_calloc (1, len);
-  if (!attr->attrib_img)
-    {
-      cdk_free (buf);
-      return CDK_Out_Of_Core;
-    }
-  attr->attrib_len = len;
-  memcpy (attr->attrib_img, p, len);
-  cdk_free (buf);
-  return rc;
-}
-
-
-static cdk_error_t
-read_user_id (cdk_stream_t inp, size_t pktlen, cdk_pkt_userid_t user_id)
-{
-  size_t nread;
-  cdk_error_t rc;
-
-  if (!inp || !user_id)
-    return CDK_Inv_Value;
-  if (!pktlen)
-    return CDK_Inv_Packet;
-
-  if (DEBUG_PKT)
-    _cdk_log_debug ("read_user_id: %lu octets\n", pktlen);
-
-  user_id->len = pktlen;
-  rc = stream_read (inp, user_id->name, pktlen, &nread);
-  if (rc)
-    return rc;
-  if (nread != pktlen)
-    return CDK_Inv_Packet;
-  user_id->name[nread] = '\0';
-  return rc;
-}
-
-
-static cdk_error_t
-read_subpkt (cdk_stream_t inp, cdk_subpkt_t * r_ctx, size_t * r_nbytes)
-{
-  byte c, c1;
-  size_t size, nread, n;
-  cdk_subpkt_t node;
-  cdk_error_t rc;
-
-  if (!inp || !r_nbytes)
-    return CDK_Inv_Value;
-
-  if (DEBUG_PKT)
-    _cdk_log_debug ("read_subpkt:\n");
-
-  n = 0;
-  *r_nbytes = 0;
-  c = cdk_stream_getc (inp);
-  n++;
-  if (c == 255)
-    {
-      size = read_32 (inp);
-      n += 4;
-    }
-  else if (c >= 192 && c < 255)
-    {
-      c1 = cdk_stream_getc (inp);
-      n++;
-      if (c1 == 0)
-        return 0;
-      size = ((c - 192) << 8) + c1 + 192;
-    }
-  else if (c < 192)
-    size = c;
-  else
-    return CDK_Inv_Packet;
-
-  node = cdk_subpkt_new (size);
-  if (!node)
-    return CDK_Out_Of_Core;
-  node->size = size;
-  node->type = cdk_stream_getc (inp);
-  if (DEBUG_PKT)
-    _cdk_log_debug (" %d octets %d type\n", node->size, node->type);
-  n++;
-  node->size--;
-  rc = stream_read (inp, node->d, node->size, &nread);
-  n += nread;
-  if (rc)
-    return rc;
-  *r_nbytes = n;
-  if (!*r_ctx)
-    *r_ctx = node;
-  else
-    cdk_subpkt_add (*r_ctx, node);
-  return rc;
-}
-
-
-static cdk_error_t
-read_onepass_sig (cdk_stream_t inp, size_t pktlen, cdk_pkt_onepass_sig_t sig)
-{
-  if (!inp || !sig)
-    return CDK_Inv_Value;
-
-  if (DEBUG_PKT)
-    _cdk_log_debug ("read_onepass_sig: %d octets\n", pktlen);
-
-  if (pktlen != 13)
-    return CDK_Inv_Packet;
-  sig->version = cdk_stream_getc (inp);
-  if (sig->version != 3)
-    return CDK_Inv_Packet_Ver;
-  sig->sig_class = cdk_stream_getc (inp);
-  sig->digest_algo = cdk_stream_getc (inp);
-  sig->pubkey_algo = cdk_stream_getc (inp);
-  sig->keyid[0] = read_32 (inp);
-  sig->keyid[1] = read_32 (inp);
-  sig->last = cdk_stream_getc (inp);
-  return 0;
-}
-
-
-static cdk_error_t
-parse_sig_subpackets (cdk_pkt_signature_t sig)
-{
-  cdk_subpkt_t node;
-
-  /* Setup the standard packet entries, so we can use V4
-     signatures similar to V3. */
-  for (node = sig->unhashed; node; node = node->next)
-    {
-      if (node->type == CDK_SIGSUBPKT_ISSUER && node->size >= 8)
-        {
-          sig->keyid[0] = _cdk_buftou32 (node->d);
-          sig->keyid[1] = _cdk_buftou32 (node->d + 4);
-        }
-      else if (node->type == CDK_SIGSUBPKT_EXPORTABLE && node->d[0] == 0)
-        {
-          /* Sometimes this packet might be placed in the unhashed area */
-          sig->flags.exportable = 0;
-        }
-    }
-  for (node = sig->hashed; node; node = node->next)
-    {
-      if (node->type == CDK_SIGSUBPKT_SIG_CREATED && node->size >= 4)
-        sig->timestamp = _cdk_buftou32 (node->d);
-      else if (node->type == CDK_SIGSUBPKT_SIG_EXPIRE && node->size >= 4)
-        {
-          sig->expiredate = _cdk_buftou32 (node->d);
-          if (sig->expiredate > 0 && sig->expiredate < (u32) time (NULL))
-            sig->flags.expired = 1;
-        }
-      else if (node->type == CDK_SIGSUBPKT_POLICY)
-        sig->flags.policy_url = 1;
-      else if (node->type == CDK_SIGSUBPKT_NOTATION)
-        sig->flags.notation = 1;
-      else if (node->type == CDK_SIGSUBPKT_REVOCABLE && node->d[0] == 0)
-        sig->flags.revocable = 0;
-      else if (node->type == CDK_SIGSUBPKT_EXPORTABLE && node->d[0] == 0)
-        sig->flags.exportable = 0;
-    }
-  if (sig->sig_class == 0x1F)
-    {
-      cdk_desig_revoker_t r, rnode;
-
-      for (node = sig->hashed; node; node = node->next)
-        {
-          if (node->type == CDK_SIGSUBPKT_REV_KEY)
-            {
-              if (node->size < 22)
-                continue;
-              rnode = cdk_calloc (1, sizeof *rnode);
-              if (!rnode)
-                return CDK_Out_Of_Core;
-              rnode->r_class = node->d[0];
-              rnode->algid = node->d[1];
-              memcpy (rnode->fpr, node->d + 2, KEY_FPR_LEN);
-              if (!sig->revkeys)
-                sig->revkeys = rnode;
-              else
-                {
-                  for (r = sig->revkeys; r->next; r = r->next)
-                    ;
-                  r->next = rnode;
-                }
-            }
-        }
-    }
-
-  return 0;
-}
-
-
-static cdk_error_t
-read_signature (cdk_stream_t inp, size_t pktlen, cdk_pkt_signature_t sig)
-{
-  size_t nbytes;
-  size_t i, size, nsig;
-  cdk_error_t rc;
-
-  if (!inp || !sig)
-    return CDK_Inv_Value;
-
-  if (DEBUG_PKT)
-    _cdk_log_debug ("read_signature: %d octets\n", pktlen);
-
-  if (pktlen < 16)
-    return CDK_Inv_Packet;
-  sig->version = cdk_stream_getc (inp);
-  if (sig->version < 2 || sig->version > 4)
-    return CDK_Inv_Packet_Ver;
-
-  sig->flags.exportable = 1;
-  sig->flags.revocable = 1;
-
-  if (sig->version < 4)
-    {
-      if (cdk_stream_getc (inp) != 5)
-        return CDK_Inv_Packet;
-      sig->sig_class = cdk_stream_getc (inp);
-      sig->timestamp = read_32 (inp);
-      sig->keyid[0] = read_32 (inp);
-      sig->keyid[1] = read_32 (inp);
-      sig->pubkey_algo = cdk_stream_getc (inp);
-      sig->digest_algo = cdk_stream_getc (inp);
-      sig->digest_start[0] = cdk_stream_getc (inp);
-      sig->digest_start[1] = cdk_stream_getc (inp);
-      nsig = cdk_pk_get_nsig (sig->pubkey_algo);
-      if (!nsig)
-        return CDK_Inv_Algo;
-      for (i = 0; i < nsig; i++)
-        {
-          rc = read_mpi (inp, &sig->mpi[i], 0);
-          if (rc)
-            return rc;
-        }
-    }
-  else
-    {
-      sig->sig_class = cdk_stream_getc (inp);
-      sig->pubkey_algo = cdk_stream_getc (inp);
-      sig->digest_algo = cdk_stream_getc (inp);
-      sig->hashed_size = read_16 (inp);
-      size = sig->hashed_size;
-      sig->hashed = NULL;
-      while (size > 0)
-        {
-          rc = read_subpkt (inp, &sig->hashed, &nbytes);
-          if (rc)
-            return rc;
-          size -= nbytes;
-        }
-      sig->unhashed_size = read_16 (inp);
-      size = sig->unhashed_size;
-      sig->unhashed = NULL;
-      while (size > 0)
-        {
-          rc = read_subpkt (inp, &sig->unhashed, &nbytes);
-          if (rc)
-            return rc;
-          size -= nbytes;
-        }
-
-      rc = parse_sig_subpackets (sig);
-      if (rc)
-        return rc;
-
-      sig->digest_start[0] = cdk_stream_getc (inp);
-      sig->digest_start[1] = cdk_stream_getc (inp);
-      nsig = cdk_pk_get_nsig (sig->pubkey_algo);
-      if (!nsig)
-        return CDK_Inv_Algo;
-      for (i = 0; i < nsig; i++)
-        {
-          rc = read_mpi (inp, &sig->mpi[i], 0);
-          if (rc)
-            return rc;
-        }
-    }
-
-  return 0;
-}
-
-
-static cdk_error_t
-read_literal (cdk_stream_t inp, size_t pktlen,
-              cdk_pkt_literal_t * ret_pt, int is_partial)
-{
-  cdk_pkt_literal_t pt = *ret_pt;
-  size_t nread;
-  cdk_error_t rc;
-
-  if (!inp || !pt)
-    return CDK_Inv_Value;
-
-  if (DEBUG_PKT)
-    _cdk_log_debug ("read_literal: %d octets\n", pktlen);
-
-  pt->mode = cdk_stream_getc (inp);
-  if (pt->mode != 0x62 && pt->mode != 0x74 && pt->mode != 0x75)
-    return CDK_Inv_Packet;
-  if (cdk_stream_eof (inp))
-    return CDK_Inv_Packet;
-
-  pt->namelen = cdk_stream_getc (inp);
-  if (pt->namelen > 0)
-    {
-      *ret_pt = pt = cdk_realloc (pt, sizeof *pt + pt->namelen + 1);
-      if (!pt)
-        return CDK_Out_Of_Core;
-      rc = stream_read (inp, pt->name, pt->namelen, &nread);
-      if (rc)
-        return rc;
-      if (nread != pt->namelen)
-        return CDK_Inv_Packet;
-      pt->name[pt->namelen] = '\0';
-    }
-  pt->timestamp = read_32 (inp);
-  pktlen = pktlen - 6 - pt->namelen;
-  if (is_partial)
-    _cdk_stream_set_blockmode (inp, pktlen);
-  pt->buf = inp;
-  pt->len = pktlen;
-  return 0;
-}
-
-
-/* Read an old packet CTB and return the length of the body. */
-static void
-read_old_length (cdk_stream_t inp, int ctb, size_t * r_len, size_t * r_size)
-{
-  int llen = ctb & 0x03;
-
-  if (llen == 0)
-    {
-      *r_len = cdk_stream_getc (inp);
-      (*r_size)++;
-    }
-  else if (llen == 1)
-    {
-      *r_len = read_16 (inp);
-      (*r_size) += 2;
-    }
-  else if (llen == 2)
-    {
-      *r_len = read_32 (inp);
-      (*r_size) += 4;
-    }
-  else
-    {
-      *r_len = 0;
-      *r_size = 0;
-    }
-}
-
-
-/* Read a new CTB and decode the body length. */
-static void
-read_new_length (cdk_stream_t inp,
-                 size_t * r_len, size_t * r_size, size_t * r_partial)
-{
-  int c, c1;
-
-  c = cdk_stream_getc (inp);
-  (*r_size)++;
-  if (c < 192)
-    *r_len = c;
-  else if (c >= 192 && c <= 223)
-    {
-      c1 = cdk_stream_getc (inp);
-      (*r_size)++;
-      *r_len = ((c - 192) << 8) + c1 + 192;
-    }
-  else if (c == 255)
-    {
-      *r_len = read_32 (inp);
-      (*r_size) += 4;
-    }
-  else
-    {
-      *r_len = 1 << (c & 0x1f);
-      *r_partial = 1;
-    }
-}
-
-
-/* Skip the current packet body. */
-static void
-skip_packet (cdk_stream_t inp, size_t pktlen)
-{
-  byte buf[BUFSIZE];
-  size_t nread, buflen = DIM (buf);
-
-  while (pktlen > 0)
-    {
-      stream_read (inp, buf, pktlen > buflen ? buflen : pktlen, &nread);
-      pktlen -= nread;
-    }
-
-  assert (pktlen == 0);
-}
-
-
-/**
- * cdk_pkt_read:
- * @inp: the input stream
- * @pkt: allocated packet handle to store the packet
- *
- * Parse the next packet on the @inp stream and return its contents in @pkt.
- **/
-cdk_error_t
-cdk_pkt_read (cdk_stream_t inp, cdk_packet_t pkt)
-{
-  int use_mdc = 0;
-  int ctb, is_newctb;
-  int pkttype;
-  size_t pktlen = 0, pktsize = 0, is_partial = 0;
-  cdk_error_t rc;
-
-  if (!inp || !pkt)
-    return CDK_Inv_Value;
-
-  ctb = cdk_stream_getc (inp);
-  if (cdk_stream_eof (inp) || ctb == EOF)
-    return CDK_EOF;
-  else if (!ctb)
-    return CDK_Inv_Packet;
-
-  pktsize++;
-  if (!(ctb & 0x80))
-    {
-      _cdk_log_info ("cdk_pkt_read: no openpgp data found. "
-                     "(ctb=%02X; fpos=%02X)\n", ctb, cdk_stream_tell (inp));
-      return CDK_Inv_Packet;
-    }
-
-  if (ctb & 0x40)               /* RFC2440 packet format. */
-    {
-      pkttype = ctb & 0x3f;
-      is_newctb = 1;
-    }
-  else                          /* the old RFC1991 packet format. */
-    {
-      pkttype = ctb & 0x3f;
-      pkttype >>= 2;
-      is_newctb = 0;
-    }
-
-  if (pkttype > 63)
-    {
-      _cdk_log_info ("cdk_pkt_read: unknown type %d\n", pkttype);
-      return CDK_Inv_Packet;
-    }
-
-  if (is_newctb)
-    read_new_length (inp, &pktlen, &pktsize, &is_partial);
-  else
-    read_old_length (inp, ctb, &pktlen, &pktsize);
-
-  pkt->pkttype = pkttype;
-  pkt->pktlen = pktlen;
-  pkt->pktsize = pktsize + pktlen;
-  pkt->old_ctb = is_newctb ? 0 : 1;
-
-  rc = 0;
-  switch (pkt->pkttype)
-    {
-    case CDK_PKT_ATTRIBUTE:
-      pkt->pkt.user_id = cdk_calloc (1, sizeof *pkt->pkt.user_id
-                                     + pkt->pktlen + 16 + 1);
-      if (!pkt->pkt.user_id)
-        return CDK_Out_Of_Core;
-      rc = read_attribute (inp, pktlen, pkt->pkt.user_id);
-      pkt->pkttype = CDK_PKT_ATTRIBUTE;
-      break;
-
-    case CDK_PKT_USER_ID:
-      pkt->pkt.user_id = cdk_calloc (1, sizeof *pkt->pkt.user_id
-                                     + pkt->pktlen);
-      if (!pkt->pkt.user_id)
-        return CDK_Out_Of_Core;
-      rc = read_user_id (inp, pktlen, pkt->pkt.user_id);
-      break;
-
-    case CDK_PKT_PUBLIC_KEY:
-      pkt->pkt.public_key = cdk_calloc (1, sizeof *pkt->pkt.public_key);
-      if (!pkt->pkt.public_key)
-        return CDK_Out_Of_Core;
-      rc = read_public_key (inp, pktlen, pkt->pkt.public_key);
-      break;
-
-    case CDK_PKT_PUBLIC_SUBKEY:
-      pkt->pkt.public_key = cdk_calloc (1, sizeof *pkt->pkt.public_key);
-      if (!pkt->pkt.public_key)
-        return CDK_Out_Of_Core;
-      rc = read_public_subkey (inp, pktlen, pkt->pkt.public_key);
-      break;
-
-    case CDK_PKT_SECRET_KEY:
-      pkt->pkt.secret_key = cdk_calloc (1, sizeof *pkt->pkt.secret_key);
-      if (!pkt->pkt.secret_key)
-        return CDK_Out_Of_Core;
-      pkt->pkt.secret_key->pk = cdk_calloc (1,
-                                            sizeof *pkt->pkt.secret_key->pk);
-      if (!pkt->pkt.secret_key->pk)
-        return CDK_Out_Of_Core;
-      rc = read_secret_key (inp, pktlen, pkt->pkt.secret_key);
-      break;
-
-    case CDK_PKT_SECRET_SUBKEY:
-      pkt->pkt.secret_key = cdk_calloc (1, sizeof *pkt->pkt.secret_key);
-      if (!pkt->pkt.secret_key)
-        return CDK_Out_Of_Core;
-      pkt->pkt.secret_key->pk = cdk_calloc (1,
-                                            sizeof *pkt->pkt.secret_key->pk);
-      if (!pkt->pkt.secret_key->pk)
-        return CDK_Out_Of_Core;
-      rc = read_secret_subkey (inp, pktlen, pkt->pkt.secret_key);
-      break;
-
-    case CDK_PKT_LITERAL:
-      pkt->pkt.literal = cdk_calloc (1, sizeof *pkt->pkt.literal);
-      if (!pkt->pkt.literal)
-        return CDK_Out_Of_Core;
-      rc = read_literal (inp, pktlen, &pkt->pkt.literal, is_partial);
-      break;
-
-    case CDK_PKT_ONEPASS_SIG:
-      pkt->pkt.onepass_sig = cdk_calloc (1, sizeof *pkt->pkt.onepass_sig);
-      if (!pkt->pkt.onepass_sig)
-        return CDK_Out_Of_Core;
-      rc = read_onepass_sig (inp, pktlen, pkt->pkt.onepass_sig);
-      break;
-
-    case CDK_PKT_SIGNATURE:
-      pkt->pkt.signature = cdk_calloc (1, sizeof *pkt->pkt.signature);
-      if (!pkt->pkt.signature)
-        return CDK_Out_Of_Core;
-      rc = read_signature (inp, pktlen, pkt->pkt.signature);
-      break;
-
-    case CDK_PKT_ENCRYPTED_MDC:
-    case CDK_PKT_ENCRYPTED:
-      pkt->pkt.encrypted = cdk_calloc (1, sizeof *pkt->pkt.encrypted);
-      if (!pkt->pkt.encrypted)
-        return CDK_Out_Of_Core;
-      use_mdc = (pkt->pkttype == CDK_PKT_ENCRYPTED_MDC) ? 1 : 0;
-      rc = read_encrypted (inp, pktlen, pkt->pkt.encrypted,
-                           is_partial, use_mdc);
-      break;
-
-    case CDK_PKT_SYMKEY_ENC:
-      pkt->pkt.symkey_enc = cdk_calloc (1, sizeof *pkt->pkt.symkey_enc);
-      if (!pkt->pkt.symkey_enc)
-        return CDK_Out_Of_Core;
-      rc = read_symkey_enc (inp, pktlen, pkt->pkt.symkey_enc);
-      break;
-
-    case CDK_PKT_PUBKEY_ENC:
-      pkt->pkt.pubkey_enc = cdk_calloc (1, sizeof *pkt->pkt.pubkey_enc);
-      if (!pkt->pkt.pubkey_enc)
-        return CDK_Out_Of_Core;
-      rc = read_pubkey_enc (inp, pktlen, pkt->pkt.pubkey_enc);
-      break;
-
-    case CDK_PKT_COMPRESSED:
-      pkt->pkt.compressed = cdk_calloc (1, sizeof *pkt->pkt.compressed);
-      if (!pkt->pkt.compressed)
-        return CDK_Out_Of_Core;
-      rc = read_compressed (inp, pktlen, pkt->pkt.compressed);
-      break;
-
-    case CDK_PKT_MDC:
-      pkt->pkt.mdc = cdk_calloc (1, sizeof *pkt->pkt.mdc);
-      if (!pkt->pkt.mdc)
-        return CDK_Out_Of_Core;
-      rc = read_mdc (inp, pkt->pkt.mdc);
-      break;
-
-    default:
-      /* Skip all packets we don't understand */
-      skip_packet (inp, pktlen);
-      break;
-    }
-
-  return rc;
-}

+ 0 - 717
src/daemon/https/opencdk/seskey.c

@@ -1,717 +0,0 @@
-/* seskey.c - Session key routines
- *        Copyright (C) 2002, 2003, 2007 Timo Schulz
- *        Copyright (C) 1998-2000, 2002 Free Software Foundation, Inc.
- *
- * This file is part of OpenCDK.
- *
- * OpenCDK is free software; you can redistribute it and/or modify
- * it under the terms of the GNU General Public License as published by
- * the Free Software Foundation; either version 2 of the License, or
- * (at your option) any later version.
- *
- * OpenCDK is distributed in the hope that it will be useful,
- * but WITHOUT ANY WARRANTY; without even the implied warranty of
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
- * GNU General Public License for more details.
- */
-#ifdef HAVE_CONFIG_H
-# include <config.h>
-#endif
-#include <assert.h>
-#include <stdio.h>
-#include <gcrypt.h>
-
-#include "opencdk.h"
-#include "main.h"
-#include "packet.h"
-
-
-/* We encode the MD in this way:
- *
- * 0  1 PAD(n bytes)   0  ASN(asnlen bytes)  MD(len bytes)
- *
- * PAD consists of FF bytes.
- */
-static cdk_error_t
-do_encode_md (byte ** r_frame, size_t * r_flen, const byte * md, int algo,
-              size_t len, unsigned nbits, const byte * asn, size_t asnlen)
-{
-  byte *frame = NULL;
-  size_t nframe = (nbits + 7) / 8;
-  size_t i, n = 0;
-
-  if (!asn || !md || !r_frame || !r_flen)
-    return CDK_Inv_Value;
-
-  if (len + asnlen + 4 > nframe)
-    return CDK_General_Error;
-
-  frame = cdk_calloc (1, nframe);
-  if (!frame)
-    return CDK_Out_Of_Core;
-  frame[n++] = 0;
-  frame[n++] = 1;
-  i = nframe - len - asnlen - 3;
-  if (i < 0)
-    {
-      cdk_free (frame);
-      return CDK_Inv_Value;
-    }
-  memset (frame + n, 0xFF, i);
-  n += i;
-  frame[n++] = 0;
-  memcpy (frame + n, asn, asnlen);
-  n += asnlen;
-  memcpy (frame + n, md, len);
-  n += len;
-  if (n != nframe)
-    {
-      cdk_free (frame);
-      return CDK_Inv_Value;
-    }
-  *r_frame = frame;
-  *r_flen = n;
-  return 0;
-}
-
-
-
-/* RFC2437 format:
- *  
- *  0  2  RND(n bytes)  0  [A  DEK(k bytes)  CSUM(2 bytes)]
- *  
- *  RND - randomized bytes for padding.
- *  A - cipher algorithm.
- *  DEK - random session key.
- *  CKSUM - algebraic checksum of the DEK.
- */
-
-/**
- * cdk_dek_encode_pkcs1
- * @dek: DEK object
- * @nbits: size of the multi precision integer frame
- * @r_enc: output of the encoded multiprecision integer
- * 
- * Encode the given random session key in the DEK object
- * into a multiprecision integer.
- **/
-cdk_error_t
-cdk_dek_encode_pkcs1 (cdk_dek_t dek, size_t nbits, gcry_mpi_t * r_enc)
-{
-  gcry_mpi_t a = NULL;
-  gcry_error_t err;
-  byte *p, *frame;
-  size_t n;
-  size_t nframe;
-  size_t i;
-  u16 chksum;
-
-  if (!r_enc || !dek)
-    return CDK_Inv_Value;
-
-  *r_enc = NULL;
-  chksum = 0;
-  for (i = 0; i < dek->keylen; i++)
-    chksum += dek->key[i];
-  nframe = (nbits + 7) / 8;
-  frame = cdk_salloc (nframe + 1, 1);
-  if (!frame)
-    return CDK_Out_Of_Core;
-  n = 0;
-  frame[n++] = 0x00;
-  frame[n++] = 0x02;
-  i = nframe - 6 - dek->keylen;
-  p = gcry_random_bytes (i, GCRY_STRONG_RANDOM);
-  /* Replace zero bytes by new values */
-  for (;;)
-    {
-      size_t j, k;
-      byte *pp;
-
-      /* count the zero bytes */
-      for (j = k = 0; j < i; j++)
-        {
-          if (!p[j])
-            k++;
-        }
-      if (!k)
-        break;                  /* No zeroes remain. */
-      k += k / 128;             /* better get some more */
-      pp = gcry_random_bytes (k, GCRY_STRONG_RANDOM);
-      for (j = 0; j < i && k; j++)
-        {
-          if (!p[j])
-            p[j] = pp[--k];
-        }
-      cdk_free (pp);
-    }
-  memcpy (frame + n, p, i);
-  cdk_free (p);
-  n += i;
-  frame[n++] = 0;
-  frame[n++] = dek->algo;
-  memcpy (frame + n, dek->key, dek->keylen);
-  n += dek->keylen;
-  frame[n++] = chksum >> 8;
-  frame[n++] = chksum;
-  err = gcry_mpi_scan (&a, GCRYMPI_FMT_USG, frame, nframe, &nframe);
-  cdk_free (frame);
-  if (err)
-    return map_gcry_error (err);
-  *r_enc = a;
-  return 0;
-}
-
-
-/**
- * cdk_dek_decode_pkcs1:
- * @ret_dek: the decoded DEK object
- * @esk: the pkcs#1 encoded session key.
- * 
- * Decode the given multi precision integer in pkcs#1 and
- * store it into the DEK object.
- **/
-cdk_error_t
-cdk_dek_decode_pkcs1 (cdk_dek_t * ret_dek, gcry_mpi_t esk)
-{
-  cdk_dek_t dek;
-  byte frame[MAX_MPI_BYTES + 2 + 1];
-  size_t nframe, n;
-  u16 csum, csum2;
-  gcry_error_t err;
-
-  if (!ret_dek || !esk)
-    return CDK_Inv_Value;
-
-  *ret_dek = NULL;              /* reset */
-  nframe = DIM (frame) - 1;
-  err = gcry_mpi_print (GCRYMPI_FMT_USG, frame, nframe, &nframe, esk);
-  if (err)
-    return map_gcry_error (err);
-  dek = cdk_salloc (sizeof *dek, 1);
-  if (!dek)
-    return CDK_Out_Of_Core;
-
-  /* Now get the DEK (data encryption key) from the frame
-   *
-   *     0  2  RND(n bytes)  0  A  DEK(k bytes)  CSUM(2 bytes)
-   *
-   * (gcry_mpi_print already removed the leading zero).
-   *
-   * RND are non-zero randow bytes.
-   * A   is the cipher algorithm
-   * DEK is the encryption key (session key) with length k
-   * CSUM
-   */
-  n = 0;
-  if (frame[n] != 2)
-    {
-      cdk_free (dek);
-      return CDK_Inv_Mode;
-    }
-  for (n++; n < nframe && frame[n]; n++)
-    ;
-  n++;
-  dek->keylen = nframe - (n + 1) - 2;
-  dek->algo = frame[n++];
-  if (dek->keylen != gcry_cipher_get_algo_keylen (dek->algo))
-    {
-      _cdk_log_debug ("pkcs1 decode: invalid cipher keylen %d\n",
-                      dek->keylen);
-      cdk_free (dek);
-      return CDK_Inv_Algo;
-    }
-  csum = frame[nframe - 2] << 8;
-  csum |= frame[nframe - 1];
-  memcpy (dek->key, frame + n, dek->keylen);
-  csum2 = 0;
-  for (n = 0; n < dek->keylen; n++)
-    csum2 += dek->key[n];
-  if (csum != csum2)
-    {
-      _cdk_log_debug ("pkcs decode: checksum does not match\n");
-      cdk_free (dek);
-      return CDK_Chksum_Error;
-    }
-  *ret_dek = dek;
-  return 0;
-}
-
-
-/* Encode the given digest into a pkcs#1 compatible format. */
-cdk_error_t
-_cdk_digest_encode_pkcs1 (byte ** r_md, size_t * r_mdlen, int pk_algo,
-                          const byte * md, int digest_algo, unsigned nbits)
-{
-  gcry_error_t err;
-  size_t dlen;
-
-  if (!md || !r_md || !r_mdlen)
-    return CDK_Inv_Value;
-
-  dlen = gcry_md_get_algo_dlen (digest_algo);
-  if (!dlen)
-    return CDK_Inv_Algo;
-  if (is_DSA (pk_algo))         /* DSS does not use a special encoding. */
-    {
-      *r_md = cdk_malloc (dlen + 1);
-      if (!*r_md)
-        return CDK_Out_Of_Core;
-      *r_mdlen = dlen;
-      memcpy (*r_md, md, dlen);
-      return 0;
-    }
-  else
-    {
-      byte *asn;
-      size_t asnlen;
-      cdk_error_t rc;
-
-      err = gcry_md_get_asnoid (digest_algo, NULL, &asnlen);
-      if (err)
-        return map_gcry_error (err);
-      asn = cdk_malloc (asnlen + 1);
-      if (!asn)
-        return CDK_Out_Of_Core;
-      err = gcry_md_get_asnoid (digest_algo, asn, &asnlen);
-      if (err)
-        {
-          cdk_free (asn);
-          return map_gcry_error (err);
-        }
-      rc = do_encode_md (r_md, r_mdlen, md, digest_algo, dlen,
-                         nbits, asn, asnlen);
-      cdk_free (asn);
-      return rc;
-    }
-  return 0;
-}
-
-
-/* FIXME: The prompt should be provided in a more generic way.
-   Like: (keyid, algorithm, [user-id]) */
-static char *
-passphrase_prompt (cdk_pkt_seckey_t sk)
-{
-  u32 keyid = cdk_pk_get_keyid (sk->pk, NULL);
-  int bits = cdk_pk_get_nbits (sk->pk), pk_algo = sk->pubkey_algo;
-  const char *algo = "???", *fmt;
-  char *p;
-
-  if (is_RSA (pk_algo))
-    algo = "RSA";
-  else if (is_ELG (pk_algo))
-    algo = "ELG";
-  else if (is_DSA (pk_algo))
-    algo = "DSA";
-
-  fmt = "%d-bit %s key, ID %08lX\nEnter Passphrase: ";
-  p = cdk_calloc (1, 64 + strlen (fmt) + strlen (algo) + 1);
-  if (!p)
-    return NULL;
-  sprintf (p, fmt, bits, algo, keyid);
-  return p;
-}
-
-
-/* Try to unprotect the secret key, if needed, automatically.
-   The passphrase callback is used to get the passphrase directly
-   from the user. */
-cdk_error_t
-_cdk_sk_unprotect_auto (cdk_ctx_t hd, cdk_pkt_seckey_t sk)
-{
-  char *pw, *p;
-  cdk_error_t rc;
-
-  if (!sk->is_protected)
-    return 0;
-
-  p = passphrase_prompt (sk);
-  pw = _cdk_passphrase_get (hd, p);
-  cdk_free (p);
-  if (!pw)
-    return CDK_No_Passphrase;
-
-  rc = cdk_sk_unprotect (sk, pw);
-
-  wipemem (pw, strlen (pw));
-  cdk_free (pw);
-  return rc;
-}
-
-
-/**
- * cdk_dek_extract:
- * @ret_dek: the raw DEK object
- * @hd: the session handle
- * @enc: the public key encrypted packet
- * @sk: the secret key.
- * 
- * Try to extract the DEK from the public key encrypted packet. 
- **/
-cdk_error_t
-cdk_dek_extract (cdk_dek_t * ret_dek, cdk_ctx_t hd,
-                 cdk_pkt_pubkey_enc_t enc, cdk_pkt_seckey_t sk)
-{
-  gcry_mpi_t skey = NULL;
-  cdk_dek_t dek;
-  cdk_error_t rc;
-
-  if (!enc || !sk || !ret_dek)
-    return CDK_Inv_Value;
-
-  /* FIXME: it is not very elegant that we need the session handle here. */
-  if (sk->is_protected)
-    {
-      rc = _cdk_sk_unprotect_auto (hd, sk);
-      if (rc)
-        return rc;
-    }
-
-  rc = cdk_pk_decrypt (sk, enc, &skey);
-  if (rc)
-    return rc;
-
-  rc = cdk_dek_decode_pkcs1 (&dek, skey);
-  gcry_mpi_release (skey);
-  if (rc)
-    {
-      cdk_dek_free (dek);
-      dek = NULL;
-    }
-  *ret_dek = dek;
-  return rc;
-}
-
-
-/**
- * cdk_dek_new:
- * @r_dek: the new DEK object
- * 
- * Create a new DEK object.
- **/
-cdk_error_t
-cdk_dek_new (cdk_dek_t * r_dek)
-{
-  cdk_dek_t dek;
-
-  if (!r_dek)
-    return CDK_Inv_Value;
-  *r_dek = NULL;
-  dek = cdk_salloc (sizeof *dek, 1);
-  if (!dek)
-    return CDK_Out_Of_Core;
-  *r_dek = dek;
-  return 0;
-}
-
-
-/**
- * cdk_dek_set_cipher:
- * @dek: the DEK object
- * @algo: the cipher algorithm to use
- * 
- * Set the cipher for the given DEK object.
- **/
-cdk_error_t
-cdk_dek_set_cipher (cdk_dek_t dek, int algo)
-{
-  if (!dek)
-    return CDK_Inv_Value;
-
-  if (!algo)
-    algo = GCRY_CIPHER_AES128;
-  if (gcry_cipher_test_algo (algo))
-    return CDK_Inv_Algo;
-  dek->algo = algo;
-  dek->keylen = gcry_cipher_get_algo_keylen (dek->algo);
-  return 0;
-}
-
-cdk_error_t
-cdk_dek_get_cipher (cdk_dek_t dek, int *r_algo)
-{
-  if (!dek || !r_algo)
-    return CDK_Inv_Value;
-
-
-  *r_algo = dek->algo;
-  return 0;
-}
-
-
-/**
- * cdk_dek_set_key:
- * @dek: the DEK object
- * @key: the random session key
- * @keylen: the length of the session key.
- * 
- * Set the random session key for the given DEK object.
- * If @key and @keylen is NULL (0) a random key will be generated.
- * In any case, cdk_dek_set_cipher must be called first. 
- **/
-cdk_error_t
-cdk_dek_set_key (cdk_dek_t dek, const byte * key, size_t keylen)
-{
-  gcry_cipher_hd_t hd;
-  size_t i;
-
-  if (!dek)
-    return CDK_Inv_Value;
-
-  /* The given key must be compatible with the symmetric
-     cipher algorithm set before. */
-  if (keylen > 0 && keylen != dek->keylen)
-    return CDK_Inv_Mode;
-
-  if (!key && !keylen)
-    {
-      gcry_error_t err;
-
-      /* Used to generate a random session key. The extra code is used
-         to detect weak keys, if they are possible at all. */
-      err = gcry_cipher_open (&hd, dek->algo, GCRY_CIPHER_MODE_CFB,
-                              GCRY_CIPHER_ENABLE_SYNC);
-      if (err)
-        return map_gcry_error (err);
-      gcry_randomize (dek->key, dek->keylen, GCRY_STRONG_RANDOM);
-      for (i = 0; i < 8; i++)
-        {
-          if (!gcry_cipher_setkey (hd, dek->key, dek->keylen))
-            {
-              gcry_cipher_close (hd);
-              return 0;
-            }
-          gcry_randomize (dek->key, dek->keylen, GCRY_STRONG_RANDOM);
-        }
-      gcry_cipher_close (hd);
-      return CDK_Weak_Key;
-    }
-
-  memcpy (dek->key, key, dek->keylen);
-  return 0;
-}
-
-
-/**
- * cdk_dek_set_mdc_flag:
- * @dek: the DEK object
- * @val: value to enable or disable the use
- * 
- * Enable or disable the MDC flag for the given DEK object.
- **/
-void
-cdk_dek_set_mdc_flag (cdk_dek_t dek, int val)
-{
-  if (dek)
-    dek->use_mdc = val;
-}
-
-
-int
-cdk_dek_get_mdc_flag (cdk_dek_t dek)
-{
-  if (!dek)
-    return 0;
-  return dek->use_mdc;
-}
-
-
-/**
- * cdk_dek_free:
- * @dek: the DEK object
- * 
- * Release the DEK object.
- **/
-void
-cdk_dek_free (cdk_dek_t dek)
-{
-  if (!dek)
-    return;
-
-  /* Make sure sentensive data is overwritten. */
-  wipemem (dek->key, sizeof (dek->key));
-  cdk_free (dek);
-}
-
-
-/* Hash the passphrase to produce the a DEK.
-   If create is set, a random salt will be generated. */
-static cdk_error_t
-hash_passphrase (cdk_dek_t dek, const char *pw, cdk_s2k_t s2k, int create)
-{
-  gcry_md_hd_t md;
-  byte zero[1] = { 0x00 };
-  int pass, i;
-  int used = 0, pwlen;
-  gcry_error_t err;
-
-  if (!dek || !pw || !s2k)
-    return CDK_Inv_Value;
-
-  if (!s2k->hash_algo)
-    s2k->hash_algo = GCRY_MD_SHA1;
-  pwlen = strlen (pw);
-
-  dek->keylen = gcry_cipher_get_algo_keylen (dek->algo);
-  err = gcry_md_open (&md, s2k->hash_algo, 0);
-  if (err)
-    return map_gcry_error (err);
-
-  for (pass = 0; used < dek->keylen; pass++)
-    {
-      if (pass)
-        {
-          gcry_md_reset (md);
-          for (i = 0; i < pass; i++)    /* preset the hash context */
-            gcry_md_write (md, zero, 1);
-        }
-      if (s2k->mode == CDK_S2K_SALTED || s2k->mode == CDK_S2K_ITERSALTED)
-        {
-          int len2 = pwlen + 8;
-          u32 count = len2;
-          if (create && !pass)
-            {
-              gcry_randomize (s2k->salt, 8, GCRY_STRONG_RANDOM);
-              if (s2k->mode == 3)
-                s2k->count = 96;        /* 65536 iterations */
-            }
-          if (s2k->mode == 3)
-            {
-              count = (16ul + (s2k->count & 15)) << ((s2k->count >> 4) + 6);
-              if (count < len2)
-                count = len2;
-            }
-          /* a little bit complicated because we need a ulong for count */
-          while (count > len2)
-            {                   /* maybe iterated+salted */
-              gcry_md_write (md, s2k->salt, 8);
-              gcry_md_write (md, pw, pwlen);
-              count -= len2;
-            }
-          if (count < 8)
-            gcry_md_write (md, s2k->salt, count);
-          else
-            {
-              gcry_md_write (md, s2k->salt, 8);
-              count -= 8;
-              gcry_md_write (md, pw, count);
-            }
-        }
-      else
-        gcry_md_write (md, pw, pwlen);
-      gcry_md_final (md);
-      i = gcry_md_get_algo_dlen (s2k->hash_algo);
-      if (i > dek->keylen - used)
-        i = dek->keylen - used;
-      memcpy (dek->key + used, gcry_md_read (md, s2k->hash_algo), i);
-      used += i;
-    }
-  gcry_md_close (md);
-  return 0;
-}
-
-
-/**
- * cdk_dek_from_passphrase:
- * @ret_dek: the new DEK.
- * @cipher_algo: symmetric key algorithm to use
- * @s2k: the S2K to use
- * @rndsalt: 1=create random salt
- * @pw: the passphrase.
- * 
- * Transform a passphrase into a DEK object.
- */
-cdk_error_t
-cdk_dek_from_passphrase (cdk_dek_t * ret_dek, int cipher_algo, cdk_s2k_t s2k,
-                         int rndsalt, const char *pw)
-{
-  cdk_dek_t dek;
-  cdk_error_t rc;
-
-  if (!ret_dek)
-    return CDK_Inv_Value;
-
-  *ret_dek = NULL;
-  rc = cdk_dek_new (&dek);
-  if (rc)
-    return rc;
-  rc = cdk_dek_set_cipher (dek, cipher_algo);
-  if (!rc)
-    rc = hash_passphrase (dek, pw, s2k, rndsalt);
-  if (rc)
-    {
-      cdk_dek_free (dek);
-      return rc;
-    }
-
-  *ret_dek = dek;
-  return 0;
-}
-
-
-/**
- * cdk_s2k_new:
- * @ret_s2k: output for the new S2K object
- * @mode: the S2K mode (simple, salted, iter+salted)
- * @digest_algo: the hash algorithm
- * @salt: random salt
- * 
- * Create a new S2K object with the given parameter.
- * The @salt parameter must be always 8 octets.
- **/
-cdk_error_t
-cdk_s2k_new (cdk_s2k_t * ret_s2k, int mode, int digest_algo,
-             const byte * salt)
-{
-  cdk_s2k_t s2k;
-
-  if (!ret_s2k)
-    return CDK_Inv_Value;
-
-  if (mode != 0x00 && mode != 0x01 && mode != 0x03)
-    return CDK_Inv_Mode;
-
-  if (gcry_md_test_algo (digest_algo))
-    return CDK_Inv_Algo;
-
-  s2k = cdk_calloc (1, sizeof *s2k);
-  if (!s2k)
-    return CDK_Out_Of_Core;
-  s2k->mode = mode;
-  s2k->hash_algo = digest_algo;
-  if (salt)
-    memcpy (s2k->salt, salt, 8);
-  *ret_s2k = s2k;
-  return 0;
-}
-
-
-/**
- * cdk_s2k_free:
- * @s2k: the S2K object
- * 
- * Release the given S2K object.
- **/
-void
-cdk_s2k_free (cdk_s2k_t s2k)
-{
-  cdk_free (s2k);
-}
-
-
-/* Make a copy of the source s2k into R_DST. */
-cdk_error_t
-_cdk_s2k_copy (cdk_s2k_t * r_dst, cdk_s2k_t src)
-{
-  cdk_s2k_t dst;
-  cdk_error_t err;
-
-  err = cdk_s2k_new (&dst, src->mode, src->hash_algo, src->salt);
-  if (err)
-    return err;
-  dst->count = src->count;
-  *r_dst = dst;
-
-  return 0;
-}

+ 0 - 489
src/daemon/https/opencdk/sig-check.c

@@ -1,489 +0,0 @@
-/* sig-check.c - Check signatures
- *        Copyright (C) 2001, 2002, 2003, 2007 Timo Schulz
- *        Copyright (C) 1998-2002 Free Software Foundation, Inc.
- *
- * This file is part of OpenCDK.
- *
- * OpenCDK is free software; you can redistribute it and/or modify 
- * it under the terms of the GNU General Public License as published by 
- * the Free Software Foundation; either version 2 of the License, or 
- * (at your option) any later version. 
- *  
- * OpenCDK is distributed in the hope that it will be useful, 
- * but WITHOUT ANY WARRANTY; without even the implied warranty of 
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the 
- * GNU General Public License for more details. 
- */
-#ifdef HAVE_CONFIG_H
-# include <config.h>
-#endif
-#include <stdio.h>
-#include <time.h>
-#include <gcrypt.h>
-#include <assert.h>
-
-#include "opencdk.h"
-#include "main.h"
-#include "packet.h"
-
-
-/* Hash all multi precision integers of the key PK with the given
-   message digest context MD. */
-static int
-hash_mpibuf (cdk_pubkey_t pk, gcry_md_hd_t md, int usefpr)
-{
-  byte buf[MAX_MPI_BYTES];      /* FIXME: do not use hardcoded length. */
-  size_t nbytes;
-  size_t i, npkey;
-  gcry_error_t err;
-
-  /* We have to differ between two modes for v3 keys. To form the
-     fingerprint, we hash the MPI values without the length prefix.
-     But if we calculate the hash for verifying/signing we use all data. */
-  npkey = cdk_pk_get_npkey (pk->pubkey_algo);
-  for (i = 0; i < npkey; i++)
-    {
-      err = gcry_mpi_print (GCRYMPI_FMT_PGP, buf, MAX_MPI_BYTES,
-                            &nbytes, pk->mpi[i]);
-      if (err)
-        return map_gcry_error (err);
-      if (!usefpr || pk->version == 4)
-        gcry_md_write (md, buf, nbytes);
-      else                      /* without the prefix. */
-        gcry_md_write (md, buf + 2, nbytes - 2);
-    }
-  return 0;
-}
-
-
-/* Hash an entire public key PK with the given message digest context
-   MD. The @usefpr param is only valid for version 3 keys because of
-   the different way to calculate the fingerprint. */
-cdk_error_t
-_cdk_hash_pubkey (cdk_pubkey_t pk, gcry_md_hd_t md, int usefpr)
-{
-  byte buf[12];
-  size_t i, n, npkey;
-
-  if (!pk || !md)
-    return CDK_Inv_Value;
-
-  if (usefpr && pk->version < 4 && is_RSA (pk->pubkey_algo))
-    return hash_mpibuf (pk, md, 1);
-
-  /* The version 4 public key packet does not have the 2 octets for
-     the expiration date. */
-  n = pk->version < 4 ? 8 : 6;
-  npkey = cdk_pk_get_npkey (pk->pubkey_algo);
-  for (i = 0; i < npkey; i++)
-    n = n + (gcry_mpi_get_nbits (pk->mpi[i]) + 7) / 8 + 2;
-
-  i = 0;
-  buf[i++] = 0x99;
-  buf[i++] = n >> 8;
-  buf[i++] = n >> 0;
-  buf[i++] = pk->version;
-  buf[i++] = pk->timestamp >> 24;
-  buf[i++] = pk->timestamp >> 16;
-  buf[i++] = pk->timestamp >> 8;
-  buf[i++] = pk->timestamp >> 0;
-
-  if (pk->version < 4)
-    {
-      u16 a = 0;
-
-      /* Convert the expiration date into days. */
-      if (pk->expiredate)
-        a = (u16) ((pk->expiredate - pk->timestamp) / 86400L);
-      buf[i++] = a >> 8;
-      buf[i++] = a;
-    }
-  buf[i++] = pk->pubkey_algo;
-  gcry_md_write (md, buf, i);
-  return hash_mpibuf (pk, md, 0);
-}
-
-
-/* Hash the user ID @uid with the given message digest @md.
-   Use openpgp mode if @is_v4 is 1. */
-cdk_error_t
-_cdk_hash_userid (cdk_pkt_userid_t uid, int is_v4, gcry_md_hd_t md)
-{
-  const byte *data;
-  byte buf[5];
-  u32 dlen;
-
-  if (!uid || !md)
-    return CDK_Inv_Value;
-
-  if (!is_v4)
-    {
-      gcry_md_write (md, (byte *) uid->name, uid->len);
-      return 0;
-    }
-
-  dlen = uid->attrib_img ? uid->attrib_len : uid->len;
-  data = uid->attrib_img ? uid->attrib_img : (byte *) uid->name;
-  buf[0] = uid->attrib_img ? 0xD1 : 0xB4;
-  buf[1] = dlen >> 24;
-  buf[2] = dlen >> 16;
-  buf[3] = dlen >> 8;
-  buf[4] = dlen >> 0;
-  gcry_md_write (md, buf, 5);
-  gcry_md_write (md, data, dlen);
-  return 0;
-}
-
-
-/* Hash all parts of the signature which are needed to derive
-   the correct message digest to verify the sig. */
-cdk_error_t
-_cdk_hash_sig_data (cdk_pkt_signature_t sig, gcry_md_hd_t md)
-{
-  byte buf[4];
-
-  if (!sig || !md)
-    return CDK_Inv_Value;
-
-  if (sig->version == 4)
-    gcry_md_putc (md, sig->version);
-  gcry_md_putc (md, sig->sig_class);
-  if (sig->version < 4)
-    {
-      buf[0] = sig->timestamp >> 24;
-      buf[1] = sig->timestamp >> 16;
-      buf[2] = sig->timestamp >> 8;
-      buf[3] = sig->timestamp >> 0;
-      gcry_md_write (md, buf, 4);
-    }
-  else
-    {
-      size_t n;
-
-      gcry_md_putc (md, sig->pubkey_algo);
-      gcry_md_putc (md, sig->digest_algo);
-      if (sig->hashed != NULL)
-        {
-          byte *p = _cdk_subpkt_get_array (sig->hashed, 0, &n);
-          assert (p != NULL);
-          buf[0] = n >> 8;
-          buf[1] = n >> 0;
-          gcry_md_write (md, buf, 2);
-          gcry_md_write (md, p, n);
-          cdk_free (p);
-          sig->hashed_size = n;
-          n = sig->hashed_size + 6;
-        }
-      else
-        {
-          gcry_md_putc (md, 0x00);
-          gcry_md_putc (md, 0x00);
-          n = 6;
-        }
-      gcry_md_putc (md, sig->version);
-      gcry_md_putc (md, 0xFF);
-      buf[0] = n >> 24;
-      buf[1] = n >> 16;
-      buf[2] = n >> 8;
-      buf[3] = n >> 0;
-      gcry_md_write (md, buf, 4);
-    }
-  return 0;
-}
-
-
-/* Cache the signature result and store it inside the sig. */
-static void
-cache_sig_result (cdk_pkt_signature_t sig, int res)
-{
-  sig->flags.checked = 0;
-  sig->flags.valid = 0;
-  if (res == 0)
-    {
-      sig->flags.checked = 1;
-      sig->flags.valid = 1;
-    }
-  else if (res == CDK_Bad_Sig)
-    {
-      sig->flags.checked = 1;
-      sig->flags.valid = 0;
-    }
-}
-
-
-/* Check the given signature @sig with the public key @pk.
-   Use the digest handle @digest. */
-cdk_error_t
-_cdk_sig_check (cdk_pubkey_t pk, cdk_pkt_signature_t sig,
-                gcry_md_hd_t digest, int *r_expired)
-{
-  cdk_error_t rc;
-  byte md[MAX_DIGEST_LEN];
-  time_t cur_time = (u32) time (NULL);
-
-  if (!pk || !sig || !digest)
-    return CDK_Inv_Value;
-
-  if (sig->flags.checked)
-    return sig->flags.valid ? 0 : CDK_Bad_Sig;
-  if (!KEY_CAN_SIGN (pk->pubkey_algo))
-    return CDK_Inv_Algo;
-  if (pk->timestamp > sig->timestamp || pk->timestamp > cur_time)
-    return CDK_Time_Conflict;
-
-  if (r_expired && pk->expiredate
-      && (pk->expiredate + pk->timestamp) > cur_time)
-    *r_expired = 1;
-
-  _cdk_hash_sig_data (sig, digest);
-  gcry_md_final (digest);
-  memcpy (md, gcry_md_read (digest, sig->digest_algo),
-          gcry_md_get_algo_dlen (sig->digest_algo));
-
-  if (md[0] != sig->digest_start[0] || md[1] != sig->digest_start[1])
-    return CDK_Chksum_Error;
-
-  rc = cdk_pk_verify (pk, sig, md);
-  cache_sig_result (sig, rc);
-  return rc;
-}
-
-
-/* Check the given key signature.
-   @knode is the key node and @snode the signature node. */
-cdk_error_t
-_cdk_pk_check_sig (cdk_keydb_hd_t keydb,
-                   cdk_kbnode_t knode, cdk_kbnode_t snode, int *is_selfsig)
-{
-  gcry_md_hd_t md;
-  gcry_error_t err;
-  cdk_pubkey_t pk;
-  cdk_pkt_signature_t sig;
-  cdk_kbnode_t node;
-  cdk_error_t rc = 0;
-  int is_expired;
-
-  if (!knode || !snode)
-    return CDK_Inv_Value;
-
-  if (is_selfsig)
-    *is_selfsig = 0;
-  if (knode->pkt->pkttype != CDK_PKT_PUBLIC_KEY ||
-      snode->pkt->pkttype != CDK_PKT_SIGNATURE)
-    return CDK_Inv_Value;
-  pk = knode->pkt->pkt.public_key;
-  sig = snode->pkt->pkt.signature;
-
-  err = gcry_md_open (&md, sig->digest_algo, 0);
-  if (err)
-    return map_gcry_error (err);
-
-  is_expired = 0;
-  if (sig->sig_class == 0x20)
-    {                           /* key revocation */
-      cdk_kbnode_hash (knode, md, 0, 0, 0);
-      rc = _cdk_sig_check (pk, sig, md, &is_expired);
-    }
-  else if (sig->sig_class == 0x28)
-    {                           /* subkey revocation */
-      node = cdk_kbnode_find_prev (knode, snode, CDK_PKT_PUBLIC_SUBKEY);
-      if (!node)
-        {                       /* no subkey for subkey revocation packet */
-          rc = CDK_Error_No_Key;
-          goto fail;
-        }
-      cdk_kbnode_hash (knode, md, 0, 0, 0);
-      cdk_kbnode_hash (node, md, 0, 0, 0);
-      rc = _cdk_sig_check (pk, sig, md, &is_expired);
-    }
-  else if (sig->sig_class == 0x18 || sig->sig_class == 0x19)
-    {                           /* primary/secondary key binding */
-      node = cdk_kbnode_find_prev (knode, snode, CDK_PKT_PUBLIC_SUBKEY);
-      if (!node)
-        {                       /* no subkey for subkey binding packet */
-          rc = CDK_Error_No_Key;
-          goto fail;
-        }
-      cdk_kbnode_hash (knode, md, 0, 0, 0);
-      cdk_kbnode_hash (node, md, 0, 0, 0);
-      rc = _cdk_sig_check (pk, sig, md, &is_expired);
-    }
-  else if (sig->sig_class == 0x1F)
-    {                           /* direct key signature */
-      cdk_kbnode_hash (knode, md, 0, 0, 0);
-      rc = _cdk_sig_check (pk, sig, md, &is_expired);
-    }
-  else
-    {                           /* all other classes */
-      node = cdk_kbnode_find_prev (knode, snode, CDK_PKT_USER_ID);
-      if (!node)
-        {                       /* no user ID for key signature packet */
-          rc = CDK_Error_No_Key;
-          goto fail;
-        }
-      cdk_kbnode_hash (knode, md, 0, 0, 0);
-      cdk_kbnode_hash (node, md, sig->version == 4, 0, 0);
-      if (pk->keyid[0] == sig->keyid[0] && pk->keyid[1] == sig->keyid[1])
-        {
-          rc = _cdk_sig_check (pk, sig, md, &is_expired);
-          if (is_selfsig)
-            *is_selfsig = 1;
-        }
-      else if (keydb != NULL)
-        {
-          cdk_pubkey_t sig_pk;
-
-          rc = cdk_keydb_get_pk (keydb, sig->keyid, &sig_pk);
-          if (!rc)
-            rc = _cdk_sig_check (sig_pk, sig, md, &is_expired);
-          cdk_pk_release (sig_pk);
-        }
-    }
-fail:
-  gcry_md_close (md);
-  return rc;
-}
-
-
-/**
- * cdk_pk_check_sigs:
- * @key: the public key
- * @hd: an optinal key database handle
- * @r_status: variable to store the status of the key
- *
- * Check all signatures. When no key is available for checking, the
- * sigstat is marked as 'NOKEY'. The @r_status contains the key flags
- * which are or-ed or zero when there are no flags.
- **/
-cdk_error_t
-cdk_pk_check_sigs (cdk_kbnode_t key, cdk_keydb_hd_t keydb, int *r_status)
-{
-  cdk_pkt_signature_t sig;
-  cdk_kbnode_t node;
-  cdk_error_t rc;
-  u32 keyid;
-  int key_status, is_selfsig = 0;
-  int no_signer, n_sigs = 0;
-
-  if (!key || !r_status)
-    return CDK_Inv_Value;
-
-  *r_status = 0;
-  node = cdk_kbnode_find (key, CDK_PKT_PUBLIC_KEY);
-  if (!node)
-    return CDK_Error_No_Key;
-
-  key_status = 0;
-  /* Continue with the signature check but adjust the
-     key status flags accordingly. */
-  if (node->pkt->pkt.public_key->is_revoked)
-    key_status |= CDK_KEY_REVOKED;
-  if (node->pkt->pkt.public_key->has_expired)
-    key_status |= CDK_KEY_EXPIRED;
-
-  rc = 0;
-  no_signer = 0;
-  keyid = cdk_pk_get_keyid (node->pkt->pkt.public_key, NULL);
-  for (node = key; node; node = node->next)
-    {
-      if (node->pkt->pkttype != CDK_PKT_SIGNATURE)
-        continue;
-      sig = node->pkt->pkt.signature;
-      rc = _cdk_pk_check_sig (keydb, key, node, &is_selfsig);
-      if (IS_UID_SIG (sig))
-        {
-          if (is_selfsig == 0)
-            n_sigs++;
-        }
-      if (rc && IS_UID_SIG (sig) && rc == CDK_Error_No_Key)
-        {
-          /* We do not consider it a problem when the signing key
-             is not avaiable. We just mark the signature accordingly
-             and contine. */
-          sig->flags.missing_key = 1;
-          no_signer++;
-        }
-      else if (rc && rc != CDK_Error_No_Key)
-        {
-          /* It might be possible that a single signature has been
-             corrupted, thus we do not consider it a problem when
-             one ore more signatures are bad. But at least the self
-             signature has to be valid. */
-          if (is_selfsig)
-            {
-              key_status |= CDK_KEY_INVALID;
-              break;
-            }
-        }
-      _cdk_log_debug ("signature %s: signer %08lX keyid %08lX\n",
-                      rc == CDK_Bad_Sig ? "BAD" : "good", sig->keyid[1],
-                      keyid);
-    }
-
-  if (n_sigs == no_signer)
-    key_status |= CDK_KEY_NOSIGNER;
-  *r_status = key_status;
-  if (rc == CDK_Error_No_Key)
-    rc = 0;
-  return rc;
-}
-
-
-/**
- * cdk_pk_check_self_sig:
- * @key: the key node
- * @r_status: output the status of the key.
- * 
- * A convenient function to make sure the key is valid.
- * Valid means the self signature is ok.
- **/
-cdk_error_t
-cdk_pk_check_self_sig (cdk_kbnode_t key, int *r_status)
-{
-  cdk_pkt_signature_t sig;
-  cdk_kbnode_t node;
-  cdk_error_t rc;
-  u32 keyid[2], sigid[2];
-  int is_selfsig, sig_ok;
-
-  if (!key || !r_status)
-    return CDK_Inv_Value;
-
-  node = cdk_kbnode_find (key, CDK_PKT_PUBLIC_KEY);
-  if (!node)
-    return CDK_Error_No_Key;
-  /* FIXME: we should set expire/revoke here also but callers
-     expect CDK_KEY_VALID=0 if the key is okay. */
-  cdk_pk_get_keyid (key->pkt->pkt.public_key, keyid);
-  sig_ok = 0;
-  for (node = key; node; node = node->next)
-    {
-      if (node->pkt->pkttype != CDK_PKT_SIGNATURE)
-        continue;
-      sig = node->pkt->pkt.signature;
-      if (!IS_UID_SIG (sig))
-        continue;
-      cdk_sig_get_keyid (sig, sigid);
-      if (sigid[0] != keyid[0] || sigid[1] != keyid[1])
-        continue;
-      /* FIXME: Now we check all self signatures. */
-      rc = _cdk_pk_check_sig (NULL, key, node, &is_selfsig);
-      if (rc)
-        {
-          *r_status = CDK_KEY_INVALID;
-          return rc;
-        }
-      else                      /* For each valid self sig we increase this counter. */
-        sig_ok++;
-    }
-
-  /* A key without a self signature is not valid. */
-  if (!sig_ok)
-    {
-      *r_status = CDK_KEY_INVALID;
-      return CDK_General_Error;
-    }
-  /* No flags indicate a valid key. */
-  *r_status = CDK_KEY_VALID;
-  return 0;
-}

+ 0 - 1446
src/daemon/https/opencdk/stream.c

@@ -1,1446 +0,0 @@
-/* stream.c - The stream implementation
- *        Copyright (C) 2002, 2003, 2007 Timo Schulz
- *
- * This file is part of OpenCDK.
- *
- * OpenCDK is free software; you can redistribute it and/or modify
- * it under the terms of the GNU General Public License as published by
- * the Free Software Foundation; either version 2 of the License, or
- * (at your option) any later version.
- *
- * OpenCDK is distributed in the hope that it will be useful,
- * but WITHOUT ANY WARRANTY; without even the implied warranty of
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
- * GNU General Public License for more details.
- */
-#ifdef HAVE_CONFIG_H
-#include <config.h>
-#endif
-#include <assert.h>
-#include <stdio.h>
-#include <sys/stat.h>
-#include <string.h>
-#include <stdlib.h>
-#include <errno.h>
-#ifdef HAVE_UNISTD_H
-# include <unistd.h>
-#endif
-
-#include "opencdk.h"
-#include "main.h"
-#include "filters.h"
-#include "stream.h"
-#include "types.h"
-
-/* This is the maximal amount of bytes we map. */
-#define MAX_MAP_SIZE 16777216
-
-static int stream_flush (cdk_stream_t s);
-static int stream_filter_write (cdk_stream_t s);
-static int stream_cache_flush (cdk_stream_t s, FILE * fp);
-
-/* Customized tmpfile() version from misc.c */
-FILE *my_tmpfile (void);
-
-
-/* FIXME: The read/write/putc/getc function cannot directly
-          return an error code. It is stored in an error variable
-          inside the string. Right now there is no code to
-          return the error code or to reset it. */
-
-/**
- * cdk_stream_open:
- * @file: The file to open
- * @ret_s: The new STREAM object
- * 
- * Create a new stream based on an existing file. The stream is
- * opened in read-only mode.
- **/
-cdk_error_t
-cdk_stream_open (const char *file, cdk_stream_t * ret_s)
-{
-  return _cdk_stream_open_mode (file, "rb", ret_s);
-}
-
-
-/* Helper function to allow to open a stream in different modes. */
-cdk_error_t
-_cdk_stream_open_mode (const char *file, const char *mode,
-                       cdk_stream_t * ret_s)
-{
-  cdk_stream_t s;
-
-  if (!file || !ret_s)
-    return CDK_Inv_Value;
-
-  _cdk_log_debug ("open stream `%s'\n", file);
-  *ret_s = NULL;
-  s = cdk_calloc (1, sizeof *s);
-  if (!s)
-    return CDK_Out_Of_Core;
-  s->fname = cdk_strdup (file);
-  if (!s->fname)
-    {
-      cdk_free (s);
-      return CDK_Out_Of_Core;
-    }
-  s->fp = fopen (file, mode);
-  if (!s->fp)
-    {
-      cdk_free (s->fname);
-      cdk_free (s);
-      return CDK_File_Error;
-    }
-  _cdk_log_debug ("open stream fd=%d\n", fileno (s->fp));
-  s->flags.write = 0;
-  *ret_s = s;
-  return 0;
-}
-
-
-/**
- * cdk_stream_new_from_cbs:
- * @cbs: the callback context with all user callback functions
- * @opa: opaque handle which is passed to all callbacks.
- * @ret_s: the allocated stream
- * 
- * This function creates a stream which uses user callback
- * for the core operations (open, close, read, write, seek).
- */
-cdk_error_t
-cdk_stream_new_from_cbs (cdk_stream_cbs_t cbs, void *opa,
-                         cdk_stream_t * ret_s)
-{
-  cdk_stream_t s;
-
-  if (!cbs || !opa || !ret_s)
-    return CDK_Inv_Value;
-
-  *ret_s = NULL;
-  s = cdk_calloc (1, sizeof *s);
-  if (!s)
-    return CDK_Out_Of_Core;
-
-  s->cbs.read = cbs->read;
-  s->cbs.write = cbs->write;
-  s->cbs.seek = cbs->seek;
-  s->cbs.release = cbs->release;
-  s->cbs.open = cbs->open;
-  s->cbs_hd = opa;
-  *ret_s = s;
-
-  /* If there is a user callback for open, we need to call it
-     here because read/write expects an open stream. */
-  if (s->cbs.open)
-    return s->cbs.open (s->cbs_hd);
-  return 0;
-}
-
-
-/**
- * cdk_stream_new: Create a new stream into into the given file.
- * @file: The name of the new file
- * @ret_s: The new STREAM object
- **/
-cdk_error_t
-cdk_stream_new (const char *file, cdk_stream_t * ret_s)
-{
-  cdk_stream_t s;
-
-  if (!ret_s)
-    return CDK_Inv_Value;
-
-  _cdk_log_debug ("new stream `%s'\n", file ? file : "[temp]");
-  *ret_s = NULL;
-  s = cdk_calloc (1, sizeof *s);
-  if (!s)
-    return CDK_Out_Of_Core;
-  s->flags.write = 1;
-  if (!file)
-    s->flags.temp = 1;
-  else
-    {
-      s->fname = cdk_strdup (file);
-      if (!s->fname)
-        {
-          cdk_free (s);
-          return CDK_Out_Of_Core;
-        }
-    }
-  s->fp = my_tmpfile ();
-  if (!s->fp)
-    {
-      cdk_free (s->fname);
-      cdk_free (s);
-      return CDK_File_Error;
-    }
-  _cdk_log_debug ("new stream fd=%d\n", fileno (s->fp));
-  *ret_s = s;
-  return 0;
-}
-
-
-/**
- * cdk_stream_create: create a new stream.
- * @file: the filename
- * @ret_s: the object
- *
- * The difference to cdk_stream_new is, that no filtering can be used with
- * this kind of stream and everything is written directly to the stream.
- **/
-cdk_error_t
-cdk_stream_create (const char *file, cdk_stream_t * ret_s)
-{
-  cdk_stream_t s;
-
-  if (!file || !ret_s)
-    return CDK_Inv_Value;
-
-  _cdk_log_debug ("create stream `%s'\n", file);
-  *ret_s = NULL;
-  s = cdk_calloc (1, sizeof *s);
-  if (!s)
-    return CDK_Out_Of_Core;
-  s->flags.write = 1;
-  s->flags.filtrated = 1;
-  s->fname = cdk_strdup (file);
-  if (!s->fname)
-    {
-      cdk_free (s);
-      return CDK_Out_Of_Core;
-    }
-  s->fp = fopen (file, "w+b");
-  if (!s->fp)
-    {
-      cdk_free (s->fname);
-      cdk_free (s);
-      return CDK_File_Error;
-    }
-  _cdk_log_debug ("stream create fd=%d\n", fileno (s->fp));
-  *ret_s = s;
-  return 0;
-}
-
-
-/**
- * cdk_stream_tmp_new:
- * @r_out: the new temp stream.
- * 
- * Allocate a new tempory stream which is not associated with a file.
- */
-cdk_error_t
-cdk_stream_tmp_new (cdk_stream_t * r_out)
-{
-  return cdk_stream_new (NULL, r_out);
-}
-
-
-
-/**
- * cdk_stream_tmp_from_mem:
- * @buf: the buffer which shall be written to the temp stream.
- * @buflen: how large the buffer is
- * @r_out: the new stream with the given contents.
- * 
- * Create a new tempory stream with the given contests.
- */
-cdk_error_t
-cdk_stream_tmp_from_mem (const void *buf, size_t buflen, cdk_stream_t * r_out)
-{
-  cdk_stream_t s;
-  cdk_error_t rc;
-  int nwritten;
-
-  *r_out = NULL;
-  rc = cdk_stream_tmp_new (&s);
-  if (rc)
-    return rc;
-
-  nwritten = cdk_stream_write (s, buf, buflen);
-  if (nwritten == EOF)
-    {
-      cdk_stream_close (s);
-      return s->error;
-    }
-  cdk_stream_seek (s, 0);
-  *r_out = s;
-  return 0;
-}
-
-
-cdk_error_t
-_cdk_stream_fpopen (FILE * fp, unsigned write_mode, cdk_stream_t * ret_out)
-{
-  cdk_stream_t s;
-
-  *ret_out = NULL;
-  s = cdk_calloc (1, sizeof *s);
-  if (!s)
-    return CDK_Out_Of_Core;
-
-  _cdk_log_debug ("stream ref fd=%d\n", fileno (fp));
-  s->fp = fp;
-  s->fp_ref = 1;
-  s->flags.filtrated = 1;
-  s->flags.write = write_mode;
-
-  *ret_out = s;
-  return 0;
-}
-
-
-cdk_error_t
-_cdk_stream_append (const char *file, cdk_stream_t * ret_s)
-{
-  cdk_stream_t s;
-  cdk_error_t rc;
-
-  if (!ret_s)
-    return CDK_Inv_Value;
-  *ret_s = NULL;
-
-  rc = _cdk_stream_open_mode (file, "a+b", &s);
-  if (rc)
-    return rc;
-
-  /* In the append mode, we need to write to the flag. */
-  s->flags.write = 1;
-  *ret_s = s;
-  return 0;
-}
-
-
-/**
- * cdk_stream_is_compressed:
- * @s: the stream
- * 
- * Return 0 if the stream is uncompressed, otherwise the
- * compression algorithm.
- */
-int
-cdk_stream_is_compressed (cdk_stream_t s)
-{
-  if (!s)
-    return 0;
-  return s->flags.compressed;
-}
-
-void
-_cdk_stream_set_compress_algo (cdk_stream_t s, int algo)
-{
-  if (!s)
-    return;
-  s->flags.compressed = algo;
-}
-
-
-cdk_error_t
-cdk_stream_flush (cdk_stream_t s)
-{
-  cdk_error_t rc;
-
-  if (!s)
-    return CDK_Inv_Value;
-
-  /* The user callback does not support flush */
-  if (s->cbs_hd)
-    return 0;
-
-  /* For read-only streams, no flush is needed. */
-  if (!s->flags.write)
-    return 0;
-
-  if (!s->flags.filtrated)
-    {
-      if (!cdk_stream_get_length (s))
-        return 0;
-      rc = cdk_stream_seek (s, 0);
-      if (!rc)
-        rc = stream_flush (s);
-      if (!rc)
-        rc = stream_filter_write (s);
-      s->flags.filtrated = 1;
-      if (rc)
-        {
-          s->error = rc;
-          return rc;
-        }
-    }
-  return 0;
-}
-
-
-void
-cdk_stream_tmp_set_mode (cdk_stream_t s, int val)
-{
-  if (s && s->flags.temp)
-    s->fmode = val;
-}
-
-
-/**
- * cdk_stream_close: Close a stream and flush all buffers.
- * @s: The STREAM object.
- *
- * This function work different for read or write streams. When the
- * stream is for reading, the filtering is already done and we can
- * simply close the file and all buffers.
- * But for the case it's a write stream, we need to apply all registered
- * filters now. The file is closed in the filter function and not here.
- **/
-cdk_error_t
-cdk_stream_close (cdk_stream_t s)
-{
-  struct stream_filter_s *f, *f2;
-  cdk_error_t rc;
-
-  if (!s)
-    return CDK_Inv_Value;
-
-  _cdk_log_debug ("close stream ref=%d `%s'\n",
-                  s->fp_ref, s->fname ? s->fname : "[temp]");
-
-  /* In the user callback mode, we call the release cb if possible
-     and just free the stream. */
-  if (s->cbs_hd)
-    {
-      if (s->cbs.release)
-        rc = s->cbs.release (s->cbs_hd);
-      else
-        rc = 0;
-      cdk_free (s);
-      return rc;
-    }
-
-
-  rc = 0;
-  if (!s->flags.filtrated && !s->error)
-    rc = cdk_stream_flush (s);
-  if (!s->fp_ref && (s->fname || s->flags.temp))
-    {
-      int err;
-
-      _cdk_log_debug ("close stream fd=%d\n", fileno (s->fp));
-      err = fclose (s->fp);
-      s->fp = NULL;
-      if (err)
-        rc = CDK_File_Error;
-    }
-
-  /* Iterate over the filter list and use the cleanup flag to
-     free the allocated internal structures. */
-  f = s->filters;
-  while (f)
-    {
-      f2 = f->next;
-      if (f->fnct)
-        f->fnct (f->opaque, STREAMCTL_FREE, NULL, NULL);
-      cdk_free (f);
-      f = f2;
-    }
-
-  if (s->fname)
-    {
-      cdk_free (s->fname);
-      s->fname = NULL;
-    }
-
-  cdk_free (s->cache.buf);
-  s->cache.alloced = 0;
-
-  cdk_free (s);
-  return rc;
-}
-
-
-/**
- * cdk_stream_eof: Return if the associated file handle was set to EOF.
- * @s: The STREAM object.
- *
- * This function will only work with read streams.
- **/
-int
-cdk_stream_eof (cdk_stream_t s)
-{
-  return s ? s->flags.eof : -1;
-}
-
-
-const char *
-_cdk_stream_get_fname (cdk_stream_t s)
-{
-  if (!s)
-    return NULL;
-  if (s->flags.temp)
-    return NULL;
-  return s->fname ? s->fname : NULL;
-}
-
-
-/* Return the underlying FP of the stream.
-   WARNING: This handle should not be closed. */
-FILE *
-_cdk_stream_get_fp (cdk_stream_t s)
-{
-  return s ? s->fp : NULL;
-}
-
-
-int
-_cdk_stream_get_errno (cdk_stream_t s)
-{
-  return s ? s->error : CDK_Inv_Value;
-}
-
-
-/**
- * cdk_stream_get_length: Return the length of the associated file handle.
- * @s: The STREAM object.
- *
- * This function should work for both read and write streams. For write
- * streams an additional flush is used to write possible pending data.
- **/
-off_t
-cdk_stream_get_length (cdk_stream_t s)
-{
-  struct stat statbuf;
-  cdk_error_t rc;
-
-  if (!s)
-    return (off_t) - 1;
-
-  /* The user callback does not support stat. */
-  if (s->cbs_hd)
-    return 0;
-
-  rc = stream_flush (s);
-  if (rc)
-    {
-      s->error = rc;
-      return (off_t) - 1;
-    }
-
-  if (fstat (fileno (s->fp), &statbuf))
-    {
-      s->error = CDK_File_Error;
-      return (off_t) - 1;
-    }
-
-  return statbuf.st_size;
-}
-
-
-static struct stream_filter_s *
-filter_add2 (cdk_stream_t s)
-{
-  struct stream_filter_s *f;
-
-  assert (s);
-
-  f = cdk_calloc (1, sizeof *f);
-  if (!f)
-    return NULL;
-  f->next = s->filters;
-  s->filters = f;
-  return f;
-}
-
-
-static struct stream_filter_s *
-filter_search (cdk_stream_t s, filter_fnct_t fnc)
-{
-  struct stream_filter_s *f;
-
-  assert (s);
-
-  for (f = s->filters; f; f = f->next)
-    {
-      if (f->fnct == fnc)
-        return f;
-    }
-
-  return NULL;
-}
-
-
-struct stream_filter_s *
-filter_add (cdk_stream_t s, filter_fnct_t fnc, int type)
-{
-  struct stream_filter_s *f;
-
-  assert (s);
-
-  s->flags.filtrated = 0;
-  f = filter_search (s, fnc);
-  if (f)
-    return f;
-  f = filter_add2 (s);
-  if (!f)
-    return NULL;
-  f->fnct = fnc;
-  f->flags.enabled = 1;
-  f->tmp = NULL;
-  f->type = type;
-  switch (type)
-    {
-    case fARMOR:
-      f->opaque = &f->u.afx;
-      break;
-    case fCIPHER:
-      f->opaque = &f->u.cfx;
-      break;
-    case fLITERAL:
-      f->opaque = &f->u.pfx;
-      break;
-    case fCOMPRESS:
-      f->opaque = &f->u.zfx;
-      break;
-    case fHASH:
-      f->opaque = &f->u.mfx;
-      break;
-    case fTEXT:
-      f->opaque = &f->u.tfx;
-      break;
-    default:
-      f->opaque = NULL;
-    }
-
-  return f;
-}
-
-
-static int
-stream_get_mode (cdk_stream_t s)
-{
-  assert (s);
-
-  if (s->flags.temp)
-    return s->fmode;
-  return s->flags.write;
-}
-
-
-static filter_fnct_t
-stream_id_to_filter (int type)
-{
-  switch (type)
-    {
-    case fARMOR:
-      return _cdk_filter_armor;
-    case fLITERAL:
-      return _cdk_filter_literal;
-    case fTEXT:
-      return _cdk_filter_text;
-    case fCIPHER:
-      return _cdk_filter_cipher;
-    case fCOMPRESS:
-      return _cdk_filter_compress;
-    default:
-      return NULL;
-    }
-}
-
-
-/**
- * cdk_stream_filter_disable: Disable the filter with the type 'type'
- * @s: The STREAM object
- * @type: The numberic filter ID.
- *
- **/
-cdk_error_t
-cdk_stream_filter_disable (cdk_stream_t s, int type)
-{
-  struct stream_filter_s *f;
-  filter_fnct_t fnc;
-
-  if (!s)
-    return CDK_Inv_Value;
-
-  fnc = stream_id_to_filter (type);
-  if (!fnc)
-    return CDK_Inv_Value;
-  f = filter_search (s, fnc);
-  if (f)
-    f->flags.enabled = 0;
-  return 0;
-}
-
-
-/* WARNING: tmp should not be closed by the caller. */
-static cdk_error_t
-stream_fp_replace (cdk_stream_t s, FILE ** tmp)
-{
-  int rc;
-
-  assert (s);
-
-  _cdk_log_debug ("replace stream fd=%d with fd=%d\n",
-                  fileno (s->fp), fileno (*tmp));
-  rc = fclose (s->fp);
-  if (rc)
-    return CDK_File_Error;
-  s->fp = *tmp;
-  *tmp = NULL;
-  return 0;
-}
-
-
-/* This function is exactly like filter_read, except the fact that we can't
-   use tmpfile () all the time. That's why we open the real file when there
-   is no last filter. */
-static cdk_error_t
-stream_filter_write (cdk_stream_t s)
-{
-  struct stream_filter_s *f;
-  cdk_error_t rc = 0;
-
-  assert (s);
-
-  if (s->flags.filtrated)
-    return CDK_Inv_Value;
-
-  for (f = s->filters; f; f = f->next)
-    {
-      if (!f->flags.enabled)
-        continue;
-      /* if there is no next filter, create the final output file */
-      _cdk_log_debug ("filter [write]: last filter=%d fname=%s\n",
-                      f->next ? 1 : 0, s->fname);
-      if (!f->next && s->fname)
-        f->tmp = fopen (s->fname, "w+b");
-      else
-        f->tmp = my_tmpfile ();
-      if (!f->tmp)
-        {
-          rc = CDK_File_Error;
-          break;
-        }
-      /* If there is no next filter, flush the cache. We also do this
-         when the next filter is the armor filter because this filter
-         is special and before it starts, all data should be written. */
-      if ((!f->next || f->next->type == fARMOR) && s->cache.size)
-        {
-          rc = stream_cache_flush (s, f->tmp);
-          if (rc)
-            break;
-        }
-      rc = f->fnct (f->opaque, f->ctl, s->fp, f->tmp);
-      _cdk_log_debug ("filter [write]: type=%d rc=%d\n", f->type, rc);
-      if (!rc)
-        rc = stream_fp_replace (s, &f->tmp);
-      if (!rc)
-        rc = cdk_stream_seek (s, 0);
-      if (rc)
-        {
-          _cdk_log_debug ("filter [close]: fd=%d\n", fileno (f->tmp));
-          fclose (f->tmp);
-          break;
-        }
-    }
-  return rc;
-}
-
-
-/* Here all data from the file handle is passed through all filters.
-   The scheme works like this:
-   Create a tempfile and use it for the output of the filter. Then the
-   original file handle will be closed and replace with the temp handle.
-   The file pointer will be set to the begin and the game starts again. */
-static cdk_error_t
-stream_filter_read (cdk_stream_t s)
-{
-  struct stream_filter_s *f;
-  cdk_error_t rc = 0;
-
-  assert (s);
-
-  if (s->flags.filtrated)
-    return 0;
-
-  for (f = s->filters; f; f = f->next)
-    {
-      if (!f->flags.enabled)
-        continue;
-      if (f->flags.error)
-        {
-          _cdk_log_debug ("filter %s [read]: has the error flag; skipped\n",
-                          s->fname ? s->fname : "[temp]");
-          continue;
-        }
-
-      f->tmp = my_tmpfile ();
-      if (!f->tmp)
-        {
-          rc = CDK_File_Error;
-          break;
-        }
-      rc = f->fnct (f->opaque, f->ctl, s->fp, f->tmp);
-      _cdk_log_debug ("filter %s [read]: type=%d rc=%d\n",
-                      s->fname ? s->fname : "[temp]", f->type, rc);
-      if (rc)
-        {
-          f->flags.error = 1;
-          break;
-        }
-
-      f->flags.error = 0;
-      /* If the filter is read-only, do not replace the FP because
-         the contents were not altered in any way. */
-      if (!f->flags.rdonly)
-        {
-          rc = stream_fp_replace (s, &f->tmp);
-          if (rc)
-            break;
-        }
-      else
-        {
-          fclose (f->tmp);
-          f->tmp = NULL;
-        }
-      rc = cdk_stream_seek (s, 0);
-      if (rc)
-        break;
-      /* Disable the filter after it was successfully used. The idea
-         is the following: let's say the armor filter was pushed and
-         later more filters were added. The second time the filter code
-         will be executed, only the new filter should be started but
-         not the old because we already used it. */
-      f->flags.enabled = 0;
-    }
-
-  return rc;
-}
-
-
-void *
-_cdk_stream_get_opaque (cdk_stream_t s, int fid)
-{
-  struct stream_filter_s *f;
-
-  if (!s)
-    return NULL;
-
-  for (f = s->filters; f; f = f->next)
-    {
-      if (f->type == fid)
-        return f->opaque;
-    }
-  return NULL;
-}
-
-
-/**
- * cdk_stream_read: Try to read count bytes from the STREAM object.
- * @s: The STREAM object.
- * @buf: The buffer to insert the readed bytes.
- * @count: Request so much bytes.
- *
- * When this function is called the first time, it can take a while
- * because all filters need to be processed. Please remember that you
- * need to add the filters in reserved order.
- **/
-int
-cdk_stream_read (cdk_stream_t s, void *buf, size_t buflen)
-{
-  int nread;
-  int rc;
-
-  if (!s)
-    {
-      s->error = CDK_Inv_Value;
-      return EOF;
-    }
-
-  if (s->cbs_hd)
-    {
-      if (s->cbs.read)
-        return s->cbs.read (s->cbs_hd, buf, buflen);
-      return 0;
-    }
-
-  if (s->flags.write && !s->flags.temp)
-    {
-      s->error = CDK_Inv_Mode;
-      return EOF;               /* This is a write stream */
-    }
-
-  if (!s->flags.no_filter && !s->cache.on && !s->flags.filtrated)
-    {
-      rc = stream_filter_read (s);
-      if (rc)
-        {
-          s->error = rc;
-          if (feof (s->fp))
-            s->flags.eof = 1;
-          return EOF;
-        }
-      s->flags.filtrated = 1;
-    }
-  if (!buf && !buflen)
-    return 0;
-  nread = fread (buf, 1, buflen, s->fp);
-  if (!nread)
-    nread = EOF;
-  if (feof (s->fp))
-    {
-      s->error = 0;
-      s->flags.eof = 1;
-    }
-  return nread;
-}
-
-
-int
-cdk_stream_getc (cdk_stream_t s)
-{
-  unsigned char buf[2];
-  int nread;
-
-  if (!s)
-    {
-      s->error = CDK_Inv_Value;
-      return EOF;
-    }
-  nread = cdk_stream_read (s, buf, 1);
-  if (nread == EOF)
-    {
-      s->error = CDK_File_Error;
-      return EOF;
-    }
-  return buf[0];
-}
-
-
-/**
- * cdk_stream_write: Try to write count bytes into the stream.
- * @s: The STREAM object
- * @buf: The buffer with the values to write.
- * @count: The size of the buffer.
- *
- * In this function we simply write the bytes to the stream. We can't
- * use the filters here because it would mean they have to support
- * partial flushing.
- **/
-int
-cdk_stream_write (cdk_stream_t s, const void *buf, size_t count)
-{
-  int nwritten;
-
-  if (!s)
-    {
-      s->error = CDK_Inv_Value;
-      return EOF;
-    }
-
-  if (s->cbs_hd)
-    {
-      if (s->cbs.write)
-        return s->cbs.write (s->cbs_hd, buf, count);
-      return 0;
-    }
-
-  if (!s->flags.write)
-    {
-      s->error = CDK_Inv_Mode;  /* this is a read stream */
-      return EOF;
-    }
-
-  if (!buf && !count)
-    return stream_flush (s);
-
-  if (s->cache.on)
-    {
-      /* We need to resize the buffer if the additional data wouldn't
-         fit into it. We allocate more memory to avoid to resize it the
-         next time the function is used. */
-      if (s->cache.size + count > s->cache.alloced)
-        {
-          byte *old = s->cache.buf;
-
-          s->cache.buf =
-            cdk_calloc (1, s->cache.alloced + count + STREAM_BUFSIZE);
-          s->cache.alloced += (count + STREAM_BUFSIZE);
-          memcpy (s->cache.buf, old, s->cache.size);
-          cdk_free (old);
-          _cdk_log_debug ("stream: enlarge cache to %d octets\n",
-                          s->cache.alloced);
-        }
-      memcpy (s->cache.buf + s->cache.size, buf, count);
-      s->cache.size += count;
-      return count;
-    }
-
-  nwritten = fwrite (buf, 1, count, s->fp);
-  if (!nwritten)
-    nwritten = EOF;
-  return nwritten;
-}
-
-
-int
-cdk_stream_putc (cdk_stream_t s, int c)
-{
-  byte buf[2];
-  int nwritten;
-
-  if (!s)
-    {
-      s->error = CDK_Inv_Value;
-      return EOF;
-    }
-  buf[0] = c;
-  nwritten = cdk_stream_write (s, buf, 1);
-  if (nwritten == EOF)
-    return EOF;
-  return 0;
-}
-
-
-off_t
-cdk_stream_tell (cdk_stream_t s)
-{
-  return s ? ftell (s->fp) : (off_t) - 1;
-}
-
-
-cdk_error_t
-cdk_stream_seek (cdk_stream_t s, off_t offset)
-{
-  off_t len;
-
-  if (!s)
-    return CDK_Inv_Value;
-
-  if (s->cbs_hd)
-    {
-      if (s->cbs.seek)
-        return s->cbs.seek (s->cbs_hd, offset);
-      return 0;
-    }
-
-  /* Set or reset the EOF flag. */
-  len = cdk_stream_get_length (s);
-  if (len == offset)
-    s->flags.eof = 1;
-  else
-    s->flags.eof = 0;
-
-  if (fseek (s->fp, offset, SEEK_SET))
-    return CDK_File_Error;
-  return 0;
-}
-
-
-static cdk_error_t
-stream_flush (cdk_stream_t s)
-{
-  assert (s);
-
-  /* For some constellations it cannot be assured that the
-     return value is defined, thus we ignore it for now. */
-  (void) fflush (s->fp);
-  return 0;
-}
-
-
-/**
- * cdk_stream_set_armor_flag:
- * @s: the stream object
- * @type: the type of armor to use
- * 
- * If the file is in read-mode, no armor type needs to be
- * defined (armor_type=0) because the armor filter will be
- * used for decoding existing armor data.
- * For the write mode, @armor_type can be set to any valid
- * armor type (message, key, sig).
- **/
-cdk_error_t
-cdk_stream_set_armor_flag (cdk_stream_t s, int armor_type)
-{
-  struct stream_filter_s *f;
-
-  if (!s)
-    return CDK_Inv_Value;
-  f = filter_add (s, _cdk_filter_armor, fARMOR);
-  if (!f)
-    return CDK_Out_Of_Core;
-  f->u.afx.idx = f->u.afx.idx2 = armor_type;
-  f->ctl = stream_get_mode (s);
-  return 0;
-}
-
-
-/**
- * cdk_stream_set_literal_flag:
- * @s: the stream object
- * @mode: the mode to use (binary, text, unicode)
- * @fname: the file name to store in the packet.
- *
- * In read mode it kicks off the literal decoding routine to
- * unwrap the data from the packet. The @mode parameter is ignored.
- * In write mode the function can be used to wrap the stream data
- * into a literal packet with the given mode and file name.
- **/
-cdk_error_t
-cdk_stream_set_literal_flag (cdk_stream_t s, cdk_lit_format_t mode,
-                             const char *fname)
-{
-  struct stream_filter_s *f;
-  const char *orig_fname;
-
-  _cdk_log_debug ("stream: enable literal mode.\n");
-
-  if (!s)
-    return CDK_Inv_Value;
-
-  orig_fname = _cdk_stream_get_fname (s);
-  f = filter_add (s, _cdk_filter_literal, fLITERAL);
-  if (!f)
-    return CDK_Out_Of_Core;
-  f->u.pfx.mode = mode;
-  f->u.pfx.filename = fname ? cdk_strdup (fname) : NULL;
-  f->u.pfx.orig_filename = orig_fname ? cdk_strdup (orig_fname) : NULL;
-  f->ctl = stream_get_mode (s);
-  if (s->blkmode > 0)
-    {
-      f->u.pfx.blkmode.on = 1;
-      f->u.pfx.blkmode.size = s->blkmode;
-    }
-  return 0;
-}
-
-
-/**
- * cdk_stream_set_cipher_flag:
- * @s: the stream object
- * @dek: the data encryption key
- * @use_mdc: 1 means to use the MDC mode
- * 
- * In read mode it kicks off the cipher filter to decrypt the data
- * from the stream with the key given in @dek.
- * In write mode the stream data will be encrypted with the DEK object
- * and optionally, the @use_mdc parameter can be used to enable the MDC mode.
- **/
-cdk_error_t
-cdk_stream_set_cipher_flag (cdk_stream_t s, cdk_dek_t dek, int use_mdc)
-{
-  struct stream_filter_s *f;
-
-  _cdk_log_debug ("stream: enable cipher mode\n");
-  if (!s)
-    return CDK_Inv_Value;
-  f = filter_add (s, _cdk_filter_cipher, fCIPHER);
-  if (!f)
-    return CDK_Out_Of_Core;
-  dek->use_mdc = use_mdc;
-  f->ctl = stream_get_mode (s);
-  f->u.cfx.dek = dek;
-  f->u.cfx.mdc_method = use_mdc ? GCRY_MD_SHA1 : 0;
-  if (s->blkmode > 0)
-    {
-      f->u.cfx.blkmode.on = 1;
-      f->u.cfx.blkmode.size = s->blkmode;
-    }
-  return 0;
-}
-
-
-/**
- * cdk_stream_set_compress_flag:
- * @s: the stream object
- * @algo: the compression algo
- * @level: level of compression (0..9)
- * 
- * In read mode it kicks off the decompression filter to retrieve
- * the uncompressed data.
- * In write mode the stream data will be compressed with the
- * given algorithm at the given level.
- **/
-cdk_error_t
-cdk_stream_set_compress_flag (cdk_stream_t s, int algo, int level)
-{
-  struct stream_filter_s *f;
-
-  if (!s)
-    return CDK_Inv_Value;
-  f = filter_add (s, _cdk_filter_compress, fCOMPRESS);
-  if (!f)
-    return CDK_Out_Of_Core;
-  f->ctl = stream_get_mode (s);
-  f->u.zfx.algo = algo;
-  f->u.zfx.level = level;
-  return 0;
-}
-
-
-/**
- * cdk_stream_set_text_flag:
- * @s: the stream object
- * @lf: line ending
- * 
- * Pushes the text filter to store the stream data in cannoncial format.
- **/
-cdk_error_t
-cdk_stream_set_text_flag (cdk_stream_t s, const char *lf)
-{
-  struct stream_filter_s *f;
-
-  if (!s)
-    return CDK_Inv_Value;
-  f = filter_add (s, _cdk_filter_text, fTEXT);
-  if (!f)
-    return CDK_Out_Of_Core;
-  f->ctl = stream_get_mode (s);
-  f->u.tfx.lf = lf;
-  return 0;
-}
-
-
-/**
- * cdk_stream_set_hash_flag:
- * @s: the stream object
- * @digest_algo: the digest algorithm to use
- * 
- * This is for read-only streams. It pushes a digest filter to
- * calculate the digest of the given stream data.
- **/
-cdk_error_t
-cdk_stream_set_hash_flag (cdk_stream_t s, int digest_algo)
-{
-  struct stream_filter_s *f;
-
-  if (!s)
-    return CDK_Inv_Value;
-  if (stream_get_mode (s))
-    return CDK_Inv_Mode;
-  f = filter_add (s, _cdk_filter_hash, fHASH);
-  if (!f)
-    return CDK_Out_Of_Core;
-  f->ctl = stream_get_mode (s);
-  f->u.mfx.digest_algo = digest_algo;
-  f->flags.rdonly = 1;
-  return 0;
-}
-
-
-/**
- * cdk_stream_enable_cache:
- * @s: the stream object
- * @val: 1=on, 0=off
- *
- * Enable or disable the cache section of a stream object.
- **/
-cdk_error_t
-cdk_stream_enable_cache (cdk_stream_t s, int val)
-{
-  if (!s)
-    return CDK_Inv_Value;
-  if (!s->flags.write)
-    return CDK_Inv_Mode;
-  s->cache.on = val;
-  if (!s->cache.buf)
-    {
-      s->cache.buf = cdk_calloc (1, STREAM_BUFSIZE);
-      s->cache.alloced = STREAM_BUFSIZE;
-      _cdk_log_debug ("stream: allocate cache of %d octets\n",
-                      STREAM_BUFSIZE);
-    }
-  return 0;
-}
-
-
-static int
-stream_cache_flush (cdk_stream_t s, FILE * fp)
-{
-  int nwritten;
-
-  assert (s);
-
-  /* FIXME: We should find a way to use cdk_stream_write here. */
-  if (s->cache.size > 0)
-    {
-      nwritten = fwrite (s->cache.buf, 1, s->cache.size, fp);
-      if (!nwritten)
-        return CDK_File_Error;
-      s->cache.size = 0;
-      s->cache.on = 0;
-      wipemem (s->cache.buf, s->cache.alloced);
-    }
-  return 0;
-}
-
-
-/**
- * cdk_stream_kick_off:
- * @inp: the input stream
- * @out: the output stream.
- * 
- * Passes the entire data from @inp into the output stream @out
- * with all the activated filters.
- */
-cdk_error_t
-cdk_stream_kick_off (cdk_stream_t inp, cdk_stream_t out)
-{
-  byte buf[BUFSIZE];
-  int nread, nwritten;
-  cdk_error_t rc;
-
-  if (!inp || !out)
-    return CDK_Inv_Value;
-  rc = CDK_Success;
-  while (!cdk_stream_eof (inp))
-    {
-      nread = cdk_stream_read (inp, buf, DIM (buf));
-      if (!nread || nread == EOF)
-        break;
-      nwritten = cdk_stream_write (out, buf, nread);
-      if (!nwritten || nwritten == EOF)
-        {                       /* In case of errors, we leave the loop. */
-          rc = inp->error;
-          break;
-        }
-    }
-
-  wipemem (buf, sizeof (buf));
-  return rc;
-}
-
-
-/**
- * cdk_stream_mmap_part:
- * @s: the stream
- * @off: the offset where to start
- * @len: how much bytes shall be mapped
- * @ret_buf: the buffer to store the content
- * @ret_buflen: length of the buffer
- *
- * Map the data of the given stream into a memory section. @ret_count
- * contains the length of the buffer.
- **/
-cdk_error_t
-cdk_stream_mmap_part (cdk_stream_t s, off_t off, size_t len,
-                      byte ** ret_buf, size_t * ret_buflen)
-{
-  off_t oldpos;
-  int n;
-  cdk_error_t rc;
-
-  if (!s || !ret_buf || !ret_buflen)
-    return CDK_Inv_Value;
-  if (s->cbs_hd)
-    return CDK_Inv_Mode;
-
-  *ret_buflen = 0;
-  *ret_buf = NULL;
-  oldpos = cdk_stream_tell (s);
-  rc = cdk_stream_flush (s);
-  if (!rc)
-    rc = cdk_stream_seek (s, off);
-  if (rc)
-    return rc;
-  if (!len)
-    len = cdk_stream_get_length (s);
-  if (!len || len > MAX_MAP_SIZE)
-    return 0;
-  *ret_buf = cdk_calloc (1, len + 1);
-  *ret_buflen = len;
-  n = cdk_stream_read (s, *ret_buf, len);
-  if (n != len)
-    *ret_buflen = n;
-  rc = cdk_stream_seek (s, oldpos);
-  return rc;
-}
-
-
-cdk_error_t
-cdk_stream_mmap (cdk_stream_t inp, byte ** buf, size_t * buflen)
-{
-  off_t len;
-
-  /* We need to make sure all data is flushed before we retrieve the size. */
-  cdk_stream_flush (inp);
-  len = cdk_stream_get_length (inp);
-  return cdk_stream_mmap_part (inp, 0, len, buf, buflen);
-}
-
-
-/**
- * cdk_stream_peek:
- * @inp: the input stream handle
- * @s: buffer
- * @count: number of bytes to peek
- *
- * The function acts like cdk_stream_read with the difference that
- * the file pointer is moved to the old position after the bytes were read.
- **/
-int
-cdk_stream_peek (cdk_stream_t inp, byte * buf, size_t buflen)
-{
-  off_t off;
-  int nbytes;
-
-  if (!inp || !buf)
-    return 0;
-  if (inp->cbs_hd)
-    return 0;
-
-  off = cdk_stream_tell (inp);
-  nbytes = cdk_stream_read (inp, buf, buflen);
-  if (nbytes == -1)
-    return 0;
-  if (cdk_stream_seek (inp, off))
-    return 0;
-  return nbytes;
-}
-
-
-/* Try to read a line from the given stream. */
-int
-_cdk_stream_gets (cdk_stream_t s, char *buf, size_t count)
-{
-  int c, i;
-
-  assert (s);
-
-  i = 0;
-  while (!cdk_stream_eof (s) && count > 0)
-    {
-      c = cdk_stream_getc (s);
-      if (c == EOF || c == '\r' || c == '\n')
-        {
-          buf[i++] = '\0';
-          break;
-        }
-      buf[i++] = c;
-      count--;
-    }
-  return i;
-}
-
-
-/* Try to write string into the stream @s. */
-int
-_cdk_stream_puts (cdk_stream_t s, const char *buf)
-{
-  return cdk_stream_write (s, buf, strlen (buf));
-}
-
-
-/* Activate the block mode for the given stream. */
-cdk_error_t
-_cdk_stream_set_blockmode (cdk_stream_t s, size_t nbytes)
-{
-  assert (s);
-
-  _cdk_log_debug ("stream: activate block mode with blocksize %d\n", nbytes);
-  s->blkmode = nbytes;
-  return 0;
-}
-
-
-/* Return the block mode state of the given stream. */
-int
-_cdk_stream_get_blockmode (cdk_stream_t s)
-{
-  return s ? s->blkmode : 0;
-}

+ 0 - 88
src/daemon/https/opencdk/stream.h

@@ -1,88 +0,0 @@
-/* stream.h - internal definiton for the STREAM object
- *        Copyright (C) 2002, 2003, 2007 Timo Schulz
- *
- * This file is part of OpenCDK.
- *
- * OpenCDK is free software; you can redistribute it and/or modify
- * it under the terms of the GNU General Public License as published by
- * the Free Software Foundation; either version 2 of the License, or
- * (at your option) any later version.
- *
- * OpenCDK is distributed in the hope that it will be useful,
- * but WITHOUT ANY WARRANTY; without even the implied warranty of
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
- * GNU General Public License for more details.
- */
-#ifndef CDK_STREAM_H
-#define CDK_STREAM_H
-
-/* The default buffer size for the stream. */
-#define STREAM_BUFSIZE 8192
-
-enum {
-    fDUMMY   = 0,
-    fARMOR   = 1,
-    fCIPHER  = 2,
-    fLITERAL = 3,
-    fCOMPRESS= 4,
-    fHASH    = 5,
-    fTEXT    = 6
-};
-
-/* Type definition for the filter function. */
-typedef int (*filter_fnct_t) (void * opaque, int ctl, FILE * in, FILE * out);
-
-/* The stream filter context structure. */
-struct stream_filter_s 
-{
-  struct stream_filter_s *next;
-  filter_fnct_t fnct;
-  void *opaque;
-  FILE *tmp;
-  union {
-    armor_filter_t afx;
-    cipher_filter_t cfx;
-    literal_filter_t pfx;
-    compress_filter_t zfx;
-    text_filter_t tfx;
-    md_filter_t mfx;
-  } u;
-  struct {
-    unsigned enabled:1;
-    unsigned rdonly:1;
-    unsigned error:1;
-  } flags;
-  unsigned type;
-  unsigned ctl;
-};
-
-
-/* The stream context structure. */
-struct cdk_stream_s {
-  struct stream_filter_s *filters;
-  int fmode;
-  int error;
-  size_t blkmode;
-  struct {
-    unsigned filtrated:1;
-    unsigned eof:1;
-    unsigned write:1;
-    unsigned temp:1;
-    unsigned reset:1;
-    unsigned no_filter:1;
-    unsigned compressed:3;
-  } flags;
-  struct {
-    unsigned char *buf;
-    unsigned on:1;
-    size_t size;
-    size_t alloced;
-  } cache;
-  char *fname;
-  FILE *fp;
-  unsigned int fp_ref:1;
-  struct cdk_stream_cbs_s cbs;
-  void *cbs_hd;
-};
-
-#endif /* CDK_STREAM_H */

+ 0 - 44
src/daemon/https/opencdk/types.h

@@ -1,44 +0,0 @@
-/* types.h - Some type definitions
- *        Copyright (C) 2002, 2003, 2007 Timo Schulz
- *
- * This file is part of OpenCDK.
- *
- * OpenCDK is free software; you can redistribute it and/or modify
- * it under the terms of the GNU General Public License as published by
- * the Free Software Foundation; either version 2 of the License, or
- * (at your option) any later version.
- *
- * OpenCDK is distributed in the hope that it will be useful,
- * but WITHOUT ANY WARRANTY; without even the implied warranty of
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
- * GNU General Public License for more details.
- */
-#ifndef CDK_TYPES_H
-#define CDK_TYPES_H
-
-#include <gcrypt.h>
-
-#ifndef HAVE_BYTE_TYPEDEF
-# undef byte
-  typedef unsigned char byte;
-# define HAVE_BYTE_TYPEDEF
-#endif
-
-#ifndef HAVE_U16_TYPEDEF
-# undef u16
-  typedef unsigned short u16;
-# define HAVE_U16_TYPEDEF
-#endif
-
-#ifndef HAVE_U32_TYPEDEF
-# undef u32
-  typedef unsigned int u32;
-# define HAVE_U32_TYPEDEF
-#endif
-
-#ifndef DIM
-# define DIM(v) (sizeof (v)/sizeof ((v)[0]))
-# define DIMof(type, member)   DIM(((type *)0)->member)
-#endif
-
-#endif /* CDK_TYPES_H */

+ 0 - 306
src/daemon/https/opencdk/verify.c

@@ -1,306 +0,0 @@
-/* verify.c - Verify signatures
- *        Copyright (C) 2001, 2002, 2003, 2007 Timo Schulz
- *
- * This file is part of OpenCDK.
- *
- * OpenCDK is free software; you can redistribute it and/or modify 
- * it under the terms of the GNU General Public License as published by 
- * the Free Software Foundation; either version 2 of the License, or 
- * (at your option) any later version. 
- *  
- * OpenCDK is distributed in the hope that it will be useful, 
- * but WITHOUT ANY WARRANTY; without even the implied warranty of 
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the 
- * GNU General Public License for more details. 
- */
-#ifdef HAVE_CONFIG_H
-# include <config.h>
-#endif
-#include <stdio.h>
-#include <string.h>
-#include <assert.h>
-#include <sys/stat.h>
-
-#include "opencdk.h"
-#include "main.h"
-#include "filters.h"
-#include "packet.h"
-
-
-/* Table of all supported digest algorithms and their names. */
-struct
-{
-  const char *name;
-  int algo;
-} digest_table[] =
-{
-  {
-  "MD5", GCRY_MD_MD5},
-  {
-  "SHA1", GCRY_MD_SHA1},
-  {
-  "RIPEMD160", GCRY_MD_RMD160},
-  {
-  "SHA256", GCRY_MD_SHA256},
-  {
-  "SHA384", GCRY_MD_SHA384},
-  {
-  "SHA512", GCRY_MD_SHA512},
-  {
-  NULL, 0}
-};
-
-
-static int file_verify_clearsign (cdk_ctx_t, const char *, const char *);
-
-
-/**
- * cdk_stream_verify:
- * @hd: session handle
- * @inp: the input stream
- * @data: for detached signatures, this is the data stream @inp is the sig
- * @out: where the output shall be written.
- */
-cdk_error_t
-cdk_stream_verify (cdk_ctx_t hd, cdk_stream_t inp, cdk_stream_t data,
-                   cdk_stream_t out)
-{
-  /* FIXME: out is not currently used. */
-  if (cdk_armor_filter_use (inp))
-    cdk_stream_set_armor_flag (inp, 0);
-  return _cdk_proc_packets (hd, inp, data, NULL, NULL, NULL);
-}
-
-
-/**
- * cdk_file_verify:
- * @hd: the session handle
- * @file: the input file
- * @data_file: for detached signature this is the data file and @file is the sig.
- * @output: the output file
- *
- * Verify a signature.
- **/
-cdk_error_t
-cdk_file_verify (cdk_ctx_t hd, const char *file, const char *data_file,
-                 const char *output)
-{
-  struct stat stbuf;
-  cdk_stream_t inp, data;
-  char buf[4096];
-  int n;
-  cdk_error_t rc;
-
-  if (!hd || !file)
-    return CDK_Inv_Value;
-  if (output && !hd->opt.overwrite && !stat (output, &stbuf))
-    return CDK_Inv_Mode;
-
-  rc = cdk_stream_open (file, &inp);
-  if (rc)
-    return rc;
-  if (cdk_armor_filter_use (inp))
-    {
-      n = cdk_stream_peek (inp, (byte *) buf, DIM (buf) - 1);
-      if (!n || n == -1)
-        return CDK_EOF;
-      buf[n] = '\0';
-      if (strstr (buf, "BEGIN PGP SIGNED MESSAGE"))
-        {
-          cdk_stream_close (inp);
-          return file_verify_clearsign (hd, file, output);
-        }
-      cdk_stream_set_armor_flag (inp, 0);
-    }
-
-  if (data_file)
-    {
-      rc = cdk_stream_open (data_file, &data);
-      if (rc)
-        {
-          cdk_stream_close (inp);
-          return rc;
-        }
-    }
-  else
-    data = NULL;
-
-  rc = _cdk_proc_packets (hd, inp, data, NULL, NULL, NULL);
-
-  if (data != NULL)
-    cdk_stream_close (data);
-  cdk_stream_close (inp);
-  return rc;
-}
-
-
-void
-_cdk_result_verify_free (cdk_verify_result_t res)
-{
-  if (!res)
-    return;
-  cdk_free (res->policy_url);
-  cdk_free (res->sig_data);
-  cdk_free (res);
-}
-
-
-cdk_verify_result_t
-_cdk_result_verify_new (void)
-{
-  cdk_verify_result_t res;
-
-  res = cdk_calloc (1, sizeof *res);
-  if (!res)
-    return NULL;
-  return res;
-}
-
-
-static cdk_error_t
-file_verify_clearsign (cdk_ctx_t hd, const char *file, const char *output)
-{
-  cdk_stream_t inp = NULL, out = NULL, tmp = NULL;
-  gcry_md_hd_t md = NULL;
-  char buf[512], chk[512];
-  const char *s;
-  int i, is_signed = 0, nbytes;
-  int digest_algo = 0;
-  gcry_error_t err;
-  cdk_error_t rc;
-
-  if (output)
-    {
-      rc = cdk_stream_create (output, &out);
-      if (rc)
-        return rc;
-    }
-
-  rc = cdk_stream_open (file, &inp);
-  if (rc)
-    {
-      if (output)
-        cdk_stream_close (out);
-      return rc;
-    }
-
-  s = "-----BEGIN PGP SIGNED MESSAGE-----";
-  while (!cdk_stream_eof (inp))
-    {
-      nbytes = _cdk_stream_gets (inp, buf, DIM (buf) - 1);
-      if (!nbytes || nbytes == -1)
-        break;
-      if (!strncmp (buf, s, strlen (s)))
-        {
-          is_signed = 1;
-          break;
-        }
-    }
-
-  if (cdk_stream_eof (inp) && !is_signed)
-    {
-      rc = CDK_Armor_Error;
-      goto leave;
-    }
-
-  while (!cdk_stream_eof (inp))
-    {
-      nbytes = _cdk_stream_gets (inp, buf, DIM (buf) - 1);
-      if (!nbytes || nbytes == -1)
-        break;
-      if (nbytes == 1)          /* Empty line */
-        break;
-      else if (!strncmp (buf, "Hash: ", 6))
-        {
-          for (i = 0; digest_table[i].name; i++)
-            {
-              if (!strcmp (buf + 6, digest_table[i].name))
-                {
-                  digest_algo = digest_table[i].algo;
-                  break;
-                }
-            }
-        }
-    }
-
-  if (digest_algo && gcry_md_test_algo (digest_algo))
-    {
-      rc = CDK_Inv_Algo;
-      goto leave;
-    }
-
-  if (!digest_algo)
-    digest_algo = GCRY_MD_MD5;
-
-  err = gcry_md_open (&md, digest_algo, 0);
-  if (err)
-    {
-      rc = map_gcry_error (err);
-      goto leave;
-    }
-
-  s = "-----BEGIN PGP SIGNATURE-----";
-  while (!cdk_stream_eof (inp))
-    {
-      nbytes = _cdk_stream_gets (inp, buf, DIM (buf) - 1);
-      if (!nbytes || nbytes == -1)
-        break;
-      if (!strncmp (buf, s, strlen (s)))
-        break;
-      else
-        {
-          cdk_stream_peek (inp, (byte *) chk, DIM (chk) - 1);
-          i = strncmp (chk, s, strlen (s));
-          if (strlen (buf) == 0 && i == 0)
-            continue;           /* skip last '\n' */
-          _cdk_trim_string (buf, i == 0 ? 0 : 1);
-          gcry_md_write (md, buf, strlen (buf));
-        }
-      if (!strncmp (buf, "- ", 2))      /* FIXME: handle it recursive. */
-        memmove (buf, buf + 2, nbytes - 2);
-      if (out)
-        {
-          if (strstr (buf, "\r\n"))
-            buf[strlen (buf) - 2] = '\0';
-          cdk_stream_write (out, buf, strlen (buf));
-          _cdk_stream_puts (out, _cdk_armor_get_lineend ());
-        }
-    }
-
-  /* We create a temporary stream object to store the
-     signature data in there. */
-  rc = cdk_stream_tmp_new (&tmp);
-  if (rc)
-    goto leave;
-
-  s = "-----BEGIN PGP SIGNATURE-----\n";
-  _cdk_stream_puts (tmp, s);
-  while (!cdk_stream_eof (inp))
-    {
-      nbytes = _cdk_stream_gets (inp, buf, DIM (buf) - 1);
-      if (!nbytes || nbytes == -1)
-        break;
-      if (nbytes < (DIM (buf) - 3))
-        {
-          buf[nbytes - 1] = '\n';
-          buf[nbytes] = '\0';
-        }
-      cdk_stream_write (tmp, buf, nbytes);
-    }
-
-  /* FIXME: This code is not very elegant. */
-  cdk_stream_tmp_set_mode (tmp, STREAMCTL_READ);
-  cdk_stream_seek (tmp, 0);
-  cdk_stream_set_armor_flag (tmp, 0);
-  cdk_stream_read (tmp, NULL, 0);
-
-  /* the digest handle will be closed there. */
-  rc = _cdk_proc_packets (hd, tmp, NULL, NULL, NULL, md);
-
-leave:
-  gcry_md_close (md);
-  cdk_stream_close (out);
-  cdk_stream_close (tmp);
-  cdk_stream_close (inp);
-  return rc;
-}

+ 0 - 947
src/daemon/https/opencdk/write-packet.c

@@ -1,947 +0,0 @@
-/* write-packet.c - Write OpenPGP packets
- *        Copyright (C) 2001, 2002, 2003, 2007 Timo Schulz
- *
- * This file is part of OpenCDK.
- *
- * OpenCDK is free software; you can redistribute it and/or modify 
- * it under the terms of the GNU General Public License as published by 
- * the Free Software Foundation; either version 2 of the License, or 
- * (at your option) any later version. 
- *  
- * OpenCDK is distributed in the hope that it will be useful, 
- * but WITHOUT ANY WARRANTY; without even the implied warranty of 
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the 
- * GNU General Public License for more details. 
- */
-#ifdef HAVE_CONFIG_H
-#include <config.h>
-#endif
-#include <string.h>
-#include <stdio.h>
-#include <assert.h>
-
-#include "opencdk.h"
-#include "main.h"
-
-
-static int
-stream_write (cdk_stream_t s, const void *buf, size_t buflen)
-{
-  int nwritten;
-
-  nwritten = cdk_stream_write (s, buf, buflen);
-  if (nwritten == EOF)
-    return _cdk_stream_get_errno (s);
-  return 0;
-}
-
-
-static int
-stream_read (cdk_stream_t s, void *buf, size_t buflen, size_t * r_nread)
-{
-  int nread;
-
-  assert (r_nread);
-
-  nread = cdk_stream_read (s, buf, buflen);
-  if (nread == EOF)
-    return _cdk_stream_get_errno (s);
-  *r_nread = nread;
-  return 0;
-}
-
-
-static int
-stream_putc (cdk_stream_t s, int c)
-{
-  int nwritten = cdk_stream_putc (s, c);
-  if (nwritten == EOF)
-    return _cdk_stream_get_errno (s);
-  return 0;
-}
-
-
-static int
-write_32 (cdk_stream_t out, u32 u)
-{
-  byte buf[4];
-
-  buf[0] = u >> 24;
-  buf[1] = u >> 16;
-  buf[2] = u >> 8;
-  buf[3] = u;
-  return stream_write (out, buf, 4);
-}
-
-
-static int
-write_16 (cdk_stream_t out, u16 u)
-{
-  byte buf[2];
-
-  buf[0] = u >> 8;
-  buf[1] = u;
-  return stream_write (out, buf, 2);
-}
-
-
-static size_t
-calc_mpisize (gcry_mpi_t mpi[MAX_CDK_PK_PARTS], size_t ncount)
-{
-  size_t size, i;
-
-  size = 0;
-  for (i = 0; i < ncount; i++)
-    size += (gcry_mpi_get_nbits (mpi[i]) + 7) / 8 + 2;
-  return size;
-}
-
-
-static int
-write_mpi (cdk_stream_t out, gcry_mpi_t m)
-{
-  byte buf[MAX_MPI_BYTES + 2];
-  size_t nbits, nread;
-  gcry_error_t err;
-
-  if (!out || !m)
-    return CDK_Inv_Value;
-  nbits = gcry_mpi_get_nbits (m);
-  if (nbits > MAX_MPI_BITS || nbits < 1)
-    return CDK_MPI_Error;
-  err = gcry_mpi_print (GCRYMPI_FMT_PGP, buf, MAX_MPI_BYTES + 2, &nread, m);
-  if (err)
-    return map_gcry_error (err);
-  return stream_write (out, buf, nread);
-}
-
-
-static cdk_error_t
-write_mpibuf (cdk_stream_t out, gcry_mpi_t mpi[MAX_CDK_PK_PARTS],
-              size_t count)
-{
-  size_t i;
-  cdk_error_t rc;
-
-  for (i = 0; i < count; i++)
-    {
-      rc = write_mpi (out, mpi[i]);
-      if (rc)
-        return rc;
-    }
-  return 0;
-}
-
-
-static cdk_error_t
-pkt_encode_len (cdk_stream_t out, size_t pktlen)
-{
-  cdk_error_t rc;
-
-  assert (out);
-
-  rc = 0;
-  if (!pktlen)
-    {
-      /* Block mode, partial bodies, with 'DEF_BLOCKSIZE' from main.h */
-      rc = stream_putc (out, (0xE0 | DEF_BLOCKBITS));
-    }
-  else if (pktlen < 192)
-    rc = stream_putc (out, pktlen);
-  else if (pktlen < 8384)
-    {
-      pktlen -= 192;
-      rc = stream_putc (out, (pktlen / 256) + 192);
-      if (!rc)
-        rc = stream_putc (out, (pktlen % 256));
-    }
-  else
-    {
-      rc = stream_putc (out, 255);
-      if (!rc)
-        rc = write_32 (out, pktlen);
-    }
-
-  return rc;
-}
-
-
-static cdk_error_t
-write_head_new (cdk_stream_t out, size_t size, int type)
-{
-  cdk_error_t rc;
-
-  assert (out);
-
-  if (type < 0 || type > 63)
-    return CDK_Inv_Packet;
-  rc = stream_putc (out, (0xC0 | type));
-  if (!rc)
-    rc = pkt_encode_len (out, size);
-  return rc;
-}
-
-
-static cdk_error_t
-write_head_old (cdk_stream_t out, size_t size, int type)
-{
-  cdk_error_t rc;
-  int ctb;
-
-  assert (out);
-
-  if (type < 0 || type > 16)
-    return CDK_Inv_Packet;
-  ctb = 0x80 | (type << 2);
-  if (!size)
-    ctb |= 3;
-  else if (size < 256)
-    ;
-  else if (size < 65536)
-    ctb |= 1;
-  else
-    ctb |= 2;
-  rc = stream_putc (out, ctb);
-  if (!size)
-    return rc;
-  if (!rc)
-    {
-      if (size < 256)
-        rc = stream_putc (out, size);
-      else if (size < 65536)
-        rc = write_16 (out, size);
-      else
-        rc = write_32 (out, size);
-    }
-
-  return rc;
-}
-
-
-/* Write special PGP2 packet header. PGP2 (wrongly) uses two byte header
-   length for signatures and keys even if the size is < 256. */
-static cdk_error_t
-pkt_write_head2 (cdk_stream_t out, size_t size, int type)
-{
-  cdk_error_t rc;
-
-  rc = cdk_stream_putc (out, 0x80 | (type << 2) | 1);
-  if (!rc)
-    rc = cdk_stream_putc (out, size >> 8);
-  if (!rc)
-    rc = cdk_stream_putc (out, size & 0xff);
-  return rc;
-}
-
-
-static int
-pkt_write_head (cdk_stream_t out, int old_ctb, size_t size, int type)
-{
-  if (old_ctb)
-    return write_head_old (out, size, type);
-  return write_head_new (out, size, type);
-}
-
-
-static cdk_error_t
-write_encrypted (cdk_stream_t out, cdk_pkt_encrypted_t enc, int old_ctb)
-{
-  size_t nbytes;
-  cdk_error_t rc;
-
-  assert (out);
-  assert (enc);
-
-  if (DEBUG_PKT)
-    _cdk_log_debug ("write_encrypted: %lu bytes\n", enc->len);
-
-  nbytes = enc->len ? (enc->len + enc->extralen) : 0;
-  rc = pkt_write_head (out, old_ctb, nbytes, CDK_PKT_ENCRYPTED);
-  /* The rest of the packet is ciphertext */
-  return rc;
-}
-
-
-static int
-write_encrypted_mdc (cdk_stream_t out, cdk_pkt_encrypted_t enc)
-{
-  size_t nbytes;
-  cdk_error_t rc;
-
-  assert (out);
-  assert (enc);
-
-  if (!enc->mdc_method)
-    return CDK_Inv_Packet;
-
-  if (DEBUG_PKT)
-    _cdk_log_debug ("write_encrypted_mdc: %lu bytes\n", enc->len);
-
-  nbytes = enc->len ? (enc->len + enc->extralen + 1) : 0;
-  rc = pkt_write_head (out, 0, nbytes, CDK_PKT_ENCRYPTED_MDC);
-  if (!rc)
-    rc = stream_putc (out, 1);  /* version */
-  /* The rest of the packet is ciphertext */
-  return rc;
-}
-
-
-static cdk_error_t
-write_symkey_enc (cdk_stream_t out, cdk_pkt_symkey_enc_t ske)
-{
-  cdk_s2k_t s2k;
-  size_t size = 0, s2k_size = 0;
-  cdk_error_t rc;
-
-  assert (out);
-  assert (ske);
-
-  if (ske->version != 4)
-    return CDK_Inv_Packet;
-
-  if (DEBUG_PKT)
-    _cdk_log_debug ("write_symkey_enc:\n");
-
-  s2k = ske->s2k;
-  if (s2k->mode == CDK_S2K_SALTED || s2k->mode == CDK_S2K_ITERSALTED)
-    s2k_size = 8;
-  if (s2k->mode == CDK_S2K_ITERSALTED)
-    s2k_size++;
-  size = 4 + s2k_size + ske->seskeylen;
-  rc = pkt_write_head (out, 0, size, CDK_PKT_SYMKEY_ENC);
-  if (!rc)
-    rc = stream_putc (out, ske->version);
-  if (!rc)
-    rc = stream_putc (out, ske->cipher_algo);
-  if (!rc)
-    rc = stream_putc (out, s2k->mode);
-  if (!rc)
-    rc = stream_putc (out, s2k->hash_algo);
-  if (s2k->mode == CDK_S2K_SALTED || s2k->mode == CDK_S2K_ITERSALTED)
-    {
-      rc = stream_write (out, s2k->salt, 8);
-      if (!rc)
-        {
-          if (s2k->mode == CDK_S2K_ITERSALTED)
-            rc = stream_putc (out, s2k->count);
-        }
-    }
-  return rc;
-}
-
-
-static int
-write_pubkey_enc (cdk_stream_t out, cdk_pkt_pubkey_enc_t pke, int old_ctb)
-{
-  size_t size;
-  int rc, nenc;
-
-  assert (out);
-  assert (pke);
-
-  if (pke->version < 2 || pke->version > 3)
-    return CDK_Inv_Packet;
-  if (!KEY_CAN_ENCRYPT (pke->pubkey_algo))
-    return CDK_Inv_Algo;
-
-  if (DEBUG_PKT)
-    _cdk_log_debug ("write_pubkey_enc:\n");
-
-  nenc = cdk_pk_get_nenc (pke->pubkey_algo);
-  size = 10 + calc_mpisize (pke->mpi, nenc);
-  rc = pkt_write_head (out, old_ctb, size, CDK_PKT_PUBKEY_ENC);
-  if (rc)
-    return rc;
-
-  rc = stream_putc (out, pke->version);
-  if (!rc)
-    rc = write_32 (out, pke->keyid[0]);
-  if (!rc)
-    rc = write_32 (out, pke->keyid[1]);
-  if (!rc)
-    rc = stream_putc (out, pke->pubkey_algo);
-  if (!rc)
-    rc = write_mpibuf (out, pke->mpi, nenc);
-  return rc;
-}
-
-
-static cdk_error_t
-write_mdc (cdk_stream_t out, cdk_pkt_mdc_t mdc)
-{
-  cdk_error_t rc;
-
-  assert (mdc);
-  assert (out);
-
-  if (DEBUG_PKT)
-    _cdk_log_debug ("write_mdc:\n");
-
-  /* This packet requires a fixed header encoding */
-  rc = stream_putc (out, 0xD3); /* packet ID and 1 byte length */
-  if (!rc)
-    rc = stream_putc (out, 0x14);
-  if (!rc)
-    rc = stream_write (out, mdc->hash, DIM (mdc->hash));
-  return rc;
-}
-
-
-static size_t
-calc_subpktsize (cdk_subpkt_t s)
-{
-  size_t nbytes;
-
-  /* In the count mode, no buffer is returned. */
-  _cdk_subpkt_get_array (s, 1, &nbytes);
-  return nbytes;
-}
-
-
-static cdk_error_t
-write_v3_sig (cdk_stream_t out, cdk_pkt_signature_t sig, int nsig)
-{
-  size_t size;
-  cdk_error_t rc;
-
-  size = 19 + calc_mpisize (sig->mpi, nsig);
-  if (is_RSA (sig->pubkey_algo))
-    rc = pkt_write_head2 (out, size, CDK_PKT_SIGNATURE);
-  else
-    rc = pkt_write_head (out, 1, size, CDK_PKT_SIGNATURE);
-  if (!rc)
-    rc = stream_putc (out, sig->version);
-  if (!rc)
-    rc = stream_putc (out, 5);
-  if (!rc)
-    rc = stream_putc (out, sig->sig_class);
-  if (!rc)
-    rc = write_32 (out, sig->timestamp);
-  if (!rc)
-    rc = write_32 (out, sig->keyid[0]);
-  if (!rc)
-    rc = write_32 (out, sig->keyid[1]);
-  if (!rc)
-    rc = stream_putc (out, sig->pubkey_algo);
-  if (!rc)
-    rc = stream_putc (out, sig->digest_algo);
-  if (!rc)
-    rc = stream_putc (out, sig->digest_start[0]);
-  if (!rc)
-    rc = stream_putc (out, sig->digest_start[1]);
-  if (!rc)
-    rc = write_mpibuf (out, sig->mpi, nsig);
-  return rc;
-}
-
-
-static cdk_error_t
-write_signature (cdk_stream_t out, cdk_pkt_signature_t sig, int old_ctb)
-{
-  byte *buf;
-  size_t nbytes, size, nsig;
-  cdk_error_t rc;
-
-  assert (out);
-  assert (sig);
-
-  if (!KEY_CAN_SIGN (sig->pubkey_algo))
-    return CDK_Inv_Algo;
-  if (sig->version < 2 || sig->version > 4)
-    return CDK_Inv_Packet;
-
-  if (DEBUG_PKT)
-    _cdk_log_debug ("write_signature:\n");
-
-  nsig = cdk_pk_get_nsig (sig->pubkey_algo);
-  if (!nsig)
-    return CDK_Inv_Algo;
-  if (sig->version < 4)
-    return write_v3_sig (out, sig, nsig);
-
-  size = 10 + calc_subpktsize (sig->hashed)
-    + calc_subpktsize (sig->unhashed) + calc_mpisize (sig->mpi, nsig);
-  rc = pkt_write_head (out, 0, size, CDK_PKT_SIGNATURE);
-  if (!rc)
-    rc = stream_putc (out, 4);
-  if (!rc)
-    rc = stream_putc (out, sig->sig_class);
-  if (!rc)
-    rc = stream_putc (out, sig->pubkey_algo);
-  if (!rc)
-    rc = stream_putc (out, sig->digest_algo);
-  if (!rc)
-    rc = write_16 (out, sig->hashed_size);
-  if (!rc)
-    {
-      buf = _cdk_subpkt_get_array (sig->hashed, 0, &nbytes);
-      if (!buf)
-        return CDK_Out_Of_Core;
-      rc = stream_write (out, buf, nbytes);
-      cdk_free (buf);
-    }
-  if (!rc)
-    rc = write_16 (out, sig->unhashed_size);
-  if (!rc)
-    {
-      buf = _cdk_subpkt_get_array (sig->unhashed, 0, &nbytes);
-      if (!buf)
-        return CDK_Out_Of_Core;
-      rc = stream_write (out, buf, nbytes);
-      cdk_free (buf);
-    }
-  if (!rc)
-    rc = stream_putc (out, sig->digest_start[0]);
-  if (!rc)
-    rc = stream_putc (out, sig->digest_start[1]);
-  if (!rc)
-    rc = write_mpibuf (out, sig->mpi, nsig);
-  return rc;
-}
-
-
-static cdk_error_t
-write_public_key (cdk_stream_t out, cdk_pkt_pubkey_t pk,
-                  int is_subkey, int old_ctb)
-{
-  int pkttype, ndays = 0;
-  size_t npkey = 0, size = 6;
-  cdk_error_t rc;
-
-  assert (out);
-  assert (pk);
-
-  if (pk->version < 2 || pk->version > 4)
-    return CDK_Inv_Packet;
-
-  if (DEBUG_PKT)
-    _cdk_log_debug ("write_public_key: subkey=%d\n", is_subkey);
-
-  pkttype = is_subkey ? CDK_PKT_PUBLIC_SUBKEY : CDK_PKT_PUBLIC_KEY;
-  npkey = cdk_pk_get_npkey (pk->pubkey_algo);
-  if (!npkey)
-    return CDK_Inv_Algo;
-  if (pk->version < 4)
-    size += 2;                  /* expire date */
-  if (is_subkey)
-    old_ctb = 0;
-  size += calc_mpisize (pk->mpi, npkey);
-  if (old_ctb)
-    rc = pkt_write_head2 (out, size, pkttype);
-  else
-    rc = pkt_write_head (out, old_ctb, size, pkttype);
-  if (!rc)
-    rc = stream_putc (out, pk->version);
-  if (!rc)
-    rc = write_32 (out, pk->timestamp);
-  if (!rc && pk->version < 4)
-    {
-      if (pk->expiredate)
-        ndays = (u16) ((pk->expiredate - pk->timestamp) / 86400L);
-      rc = write_16 (out, ndays);
-    }
-  if (!rc)
-    rc = stream_putc (out, pk->pubkey_algo);
-  if (!rc)
-    rc = write_mpibuf (out, pk->mpi, npkey);
-  return rc;
-}
-
-
-static int
-calc_s2ksize (cdk_pkt_seckey_t sk)
-{
-  size_t nbytes = 0;
-
-  if (!sk->is_protected)
-    return 0;
-  switch (sk->protect.s2k->mode)
-    {
-    case CDK_S2K_SIMPLE:
-      nbytes = 2;
-      break;
-    case CDK_S2K_SALTED:
-      nbytes = 10;
-      break;
-    case CDK_S2K_ITERSALTED:
-      nbytes = 11;
-      break;
-    }
-  nbytes += sk->protect.ivlen;
-  nbytes++;                     /* single cipher byte */
-  return nbytes;
-}
-
-
-static cdk_error_t
-write_secret_key (cdk_stream_t out, cdk_pkt_seckey_t sk,
-                  int is_subkey, int old_ctb)
-{
-  cdk_pkt_pubkey_t pk = NULL;
-  size_t size = 6, npkey, nskey;
-  int pkttype, s2k_mode;
-  cdk_error_t rc;
-
-  assert (out);
-  assert (sk);
-
-  if (!sk->pk)
-    return CDK_Inv_Value;
-  pk = sk->pk;
-  if (pk->version < 2 || pk->version > 4)
-    return CDK_Inv_Packet;
-
-  if (DEBUG_PKT)
-    _cdk_log_debug ("write_secret_key:\n");
-
-  npkey = cdk_pk_get_npkey (pk->pubkey_algo);
-  nskey = cdk_pk_get_nskey (pk->pubkey_algo);
-  if (!npkey || !nskey)
-    return CDK_Inv_Algo;
-  if (pk->version < 4)
-    size += 2;
-  /* If the key is unprotected, the 1 extra byte:
-     1 octet  - cipher algorithm byte (0x00)
-     the other bytes depend on the mode:
-     a) simple checksum -  2 octets
-     b) sha-1 checksum  - 20 octets */
-  size = !sk->is_protected ? size + 1 : size + 1 + calc_s2ksize (sk);
-  size += calc_mpisize (pk->mpi, npkey);
-  if (sk->version == 3 || !sk->is_protected)
-    {
-      if (sk->version == 3)
-        {
-          size += 2;            /* force simple checksum */
-          sk->protect.sha1chk = 0;
-        }
-      else
-        size += sk->protect.sha1chk ? 20 : 2;
-      size += calc_mpisize (sk->mpi, nskey);
-    }
-  else                          /* We do not know anything about the encrypted mpi's so we
-                                   treat the data as opaque. */
-    size += sk->enclen;
-
-  pkttype = is_subkey ? CDK_PKT_SECRET_SUBKEY : CDK_PKT_SECRET_KEY;
-  rc = pkt_write_head (out, old_ctb, size, pkttype);
-  if (!rc)
-    rc = stream_putc (out, pk->version);
-  if (!rc)
-    rc = write_32 (out, pk->timestamp);
-  if (!rc && pk->version < 4)
-    {
-      u16 ndays = 0;
-      if (pk->expiredate)
-        ndays = (u16) ((pk->expiredate - pk->timestamp) / 86400L);
-      rc = write_16 (out, ndays);
-    }
-  if (!rc)
-    rc = stream_putc (out, pk->pubkey_algo);
-  if (!rc)
-    rc = write_mpibuf (out, pk->mpi, npkey);
-  if (sk->is_protected == 0)
-    rc = stream_putc (out, 0x00);
-  else
-    {
-      if (is_RSA (pk->pubkey_algo) && pk->version < 4)
-        stream_putc (out, sk->protect.algo);
-      else if (sk->protect.s2k)
-        {
-          s2k_mode = sk->protect.s2k->mode;
-          rc = stream_putc (out, sk->protect.sha1chk ? 0xFE : 0xFF);
-          if (!rc)
-            rc = stream_putc (out, sk->protect.algo);
-          if (!rc)
-            rc = stream_putc (out, sk->protect.s2k->mode);
-          if (!rc)
-            rc = stream_putc (out, sk->protect.s2k->hash_algo);
-          if (!rc && (s2k_mode == 1 || s2k_mode == 3))
-            {
-              rc = stream_write (out, sk->protect.s2k->salt, 8);
-              if (!rc && s2k_mode == 3)
-                rc = stream_putc (out, sk->protect.s2k->count);
-            }
-        }
-      else
-        return CDK_Inv_Value;
-      rc = stream_write (out, sk->protect.iv, sk->protect.ivlen);
-    }
-  if (!rc && sk->is_protected && pk->version == 4)
-    {
-      if (sk->encdata && sk->enclen)
-        rc = stream_write (out, sk->encdata, sk->enclen);
-    }
-  else
-    {
-      if (!rc)
-        rc = write_mpibuf (out, sk->mpi, nskey);
-      if (!rc)
-        {
-          if (!sk->csum)
-            sk->csum = _cdk_sk_get_csum (sk);
-          rc = write_16 (out, sk->csum);
-        }
-    }
-
-  return rc;
-}
-
-
-static cdk_error_t
-write_compressed (cdk_stream_t out, cdk_pkt_compressed_t cd)
-{
-  cdk_error_t rc;
-
-  assert (out);
-  assert (cd);
-
-  if (DEBUG_PKT)
-    _cdk_log_debug ("packet: write_compressed\n");
-
-  /* Use an old (RFC1991) header for this packet. */
-  rc = pkt_write_head (out, 1, 0, CDK_PKT_COMPRESSED);
-  if (!rc)
-    rc = stream_putc (out, cd->algorithm);
-  return rc;
-}
-
-
-static cdk_error_t
-write_literal (cdk_stream_t out, cdk_pkt_literal_t pt, int old_ctb)
-{
-  byte buf[BUFSIZE];
-  size_t size;
-  cdk_error_t rc;
-
-  assert (out);
-  assert (pt);
-
-  /* We consider a packet without a body as an invalid packet.
-     At least one octet must be present. */
-  if (!pt->len)
-    return CDK_Inv_Packet;
-
-  if (DEBUG_PKT)
-    _cdk_log_debug ("write_literal:\n");
-
-  size = 6 + pt->namelen + pt->len;
-  rc = pkt_write_head (out, old_ctb, size, CDK_PKT_LITERAL);
-  if (rc)
-    return rc;
-
-  rc = stream_putc (out, pt->mode);
-  if (rc)
-    return rc;
-  rc = stream_putc (out, pt->namelen);
-  if (rc)
-    return rc;
-
-  if (pt->namelen > 0)
-    rc = stream_write (out, pt->name, pt->namelen);
-  if (!rc)
-    rc = write_32 (out, pt->timestamp);
-  if (rc)
-    return rc;
-
-  while (!cdk_stream_eof (pt->buf) && !rc)
-    {
-      rc = stream_read (pt->buf, buf, DIM (buf), &size);
-      if (!rc)
-        rc = stream_write (out, buf, size);
-    }
-
-  wipemem (buf, sizeof (buf));
-  return rc;
-}
-
-
-static cdk_error_t
-write_onepass_sig (cdk_stream_t out, cdk_pkt_onepass_sig_t sig)
-{
-  cdk_error_t rc;
-
-  assert (out);
-  assert (sig);
-
-  if (sig->version != 3)
-    return CDK_Inv_Packet;
-
-  if (DEBUG_PKT)
-    _cdk_log_debug ("write_onepass_sig:\n");
-
-  rc = pkt_write_head (out, 0, 13, CDK_PKT_ONEPASS_SIG);
-  if (!rc)
-    rc = stream_putc (out, sig->version);
-  if (!rc)
-    rc = stream_putc (out, sig->sig_class);
-  if (!rc)
-    rc = stream_putc (out, sig->digest_algo);
-  if (!rc)
-    rc = stream_putc (out, sig->pubkey_algo);
-  if (!rc)
-    rc = write_32 (out, sig->keyid[0]);
-  if (!rc)
-    rc = write_32 (out, sig->keyid[1]);
-  if (!rc)
-    rc = stream_putc (out, sig->last);
-  return rc;
-}
-
-
-static cdk_error_t
-write_user_id (cdk_stream_t out, cdk_pkt_userid_t id, int old_ctb,
-               int pkttype)
-{
-  cdk_error_t rc;
-
-  if (!out || !id)
-    return CDK_Inv_Value;
-
-  if (pkttype == CDK_PKT_ATTRIBUTE)
-    {
-      if (!id->attrib_img)
-        return CDK_Inv_Value;
-      rc =
-        pkt_write_head (out, old_ctb, id->attrib_len + 6, CDK_PKT_ATTRIBUTE);
-      if (rc)
-        return rc;
-      /* Write subpacket part. */
-      stream_putc (out, 255);
-      write_32 (out, id->attrib_len + 1);
-      stream_putc (out, 1);
-      rc = stream_write (out, id->attrib_img, id->attrib_len);
-    }
-  else
-    {
-      if (!id->name)
-        return CDK_Inv_Value;
-      rc = pkt_write_head (out, old_ctb, id->len, CDK_PKT_USER_ID);
-      if (!rc)
-        rc = stream_write (out, id->name, id->len);
-    }
-
-  return rc;
-}
-
-
-/**
- * cdk_pkt_write:
- * @out: the output stream handle
- * @pkt: the packet itself
- *
- * Write the contents of @pkt into the @out stream.
- * Return 0 on success.
- **/
-cdk_error_t
-cdk_pkt_write (cdk_stream_t out, cdk_packet_t pkt)
-{
-  cdk_error_t rc;
-
-  if (!out || !pkt)
-    return CDK_Inv_Value;
-
-  _cdk_log_debug ("write packet pkttype=%d\n", pkt->pkttype);
-  switch (pkt->pkttype)
-    {
-    case CDK_PKT_LITERAL:
-      rc = write_literal (out, pkt->pkt.literal, pkt->old_ctb);
-      break;
-    case CDK_PKT_ONEPASS_SIG:
-      rc = write_onepass_sig (out, pkt->pkt.onepass_sig);
-      break;
-    case CDK_PKT_MDC:
-      rc = write_mdc (out, pkt->pkt.mdc);
-      break;
-    case CDK_PKT_SYMKEY_ENC:
-      rc = write_symkey_enc (out, pkt->pkt.symkey_enc);
-      break;
-    case CDK_PKT_ENCRYPTED:
-      rc = write_encrypted (out, pkt->pkt.encrypted, pkt->old_ctb);
-      break;
-    case CDK_PKT_ENCRYPTED_MDC:
-      rc = write_encrypted_mdc (out, pkt->pkt.encrypted);
-      break;
-    case CDK_PKT_PUBKEY_ENC:
-      rc = write_pubkey_enc (out, pkt->pkt.pubkey_enc, pkt->old_ctb);
-      break;
-    case CDK_PKT_SIGNATURE:
-      rc = write_signature (out, pkt->pkt.signature, pkt->old_ctb);
-      break;
-    case CDK_PKT_PUBLIC_KEY:
-      rc = write_public_key (out, pkt->pkt.public_key, 0, pkt->old_ctb);
-      break;
-    case CDK_PKT_PUBLIC_SUBKEY:
-      rc = write_public_key (out, pkt->pkt.public_key, 1, pkt->old_ctb);
-      break;
-    case CDK_PKT_COMPRESSED:
-      rc = write_compressed (out, pkt->pkt.compressed);
-      break;
-    case CDK_PKT_SECRET_KEY:
-      rc = write_secret_key (out, pkt->pkt.secret_key, 0, pkt->old_ctb);
-      break;
-    case CDK_PKT_SECRET_SUBKEY:
-      rc = write_secret_key (out, pkt->pkt.secret_key, 1, pkt->old_ctb);
-      break;
-    case CDK_PKT_USER_ID:
-    case CDK_PKT_ATTRIBUTE:
-      rc = write_user_id (out, pkt->pkt.user_id, pkt->old_ctb, pkt->pkttype);
-      break;
-    default:
-      rc = CDK_Inv_Packet;
-      break;
-    }
-
-  if (DEBUG_PKT)
-    _cdk_log_debug ("write_packet rc=%d pkttype=%d\n", rc, pkt->pkttype);
-  return rc;
-}
-
-
-cdk_error_t
-_cdk_pkt_write2 (cdk_stream_t out, int pkttype, void *pktctx)
-{
-  cdk_packet_t pkt;
-  cdk_error_t rc;
-
-  rc = cdk_pkt_new (&pkt);
-  if (rc)
-    return rc;
-
-  switch (pkttype)
-    {
-    case CDK_PKT_PUBLIC_KEY:
-    case CDK_PKT_PUBLIC_SUBKEY:
-      pkt->pkt.public_key = pktctx;
-      break;
-    case CDK_PKT_SIGNATURE:
-      pkt->pkt.signature = pktctx;
-      break;
-    case CDK_PKT_SECRET_KEY:
-    case CDK_PKT_SECRET_SUBKEY:
-      pkt->pkt.secret_key = pktctx;
-      break;
-
-    case CDK_PKT_USER_ID:
-      pkt->pkt.user_id = pktctx;
-      break;
-    }
-  pkt->pkttype = pkttype;
-  rc = cdk_pkt_write (out, pkt);
-  cdk_free (pkt);
-  return rc;
-}
-
-
-cdk_error_t
-_cdk_pkt_write_fp (FILE * out, cdk_packet_t pkt)
-{
-  cdk_stream_t so;
-  cdk_error_t rc;
-
-  rc = _cdk_stream_fpopen (out, 1, &so);
-  if (rc)
-    return rc;
-  rc = cdk_pkt_write (so, pkt);
-  cdk_stream_close (so);
-  return rc;
-}

+ 0 - 28
src/daemon/https/openpgp/Makefile.am

@@ -1,28 +0,0 @@
-SUBDIRS = .
-
-AM_CPPFLAGS = \
--I$(top_srcdir)/src/include \
--I$(top_srcdir)/src/daemon/https \
--I$(top_srcdir)/src/daemon/https/lgl \
--I$(top_srcdir)/src/daemon/https/x509 \
--I$(top_srcdir)/src/daemon/https/tls \
--I$(top_srcdir)/src/daemon/https/openpgp \
--I$(top_srcdir)/src/daemon/https/opencdk \
--I$(top_srcdir)/src/daemon/https/minitasn1
-
-noinst_LTLIBRARIES = libopenpgp.la
-
-# libopenpgp_la_LDFLAGS = -l$(top_srcdir)/src/daemon/https/libextra/.lib/libextra.la
-
-libopenpgp_la_SOURCES = \
-pgp_privkey.c \
-compat.c \
-pgp_verify.c \
-extras.c \
-pgp.c
-
-# x libextra source list
-libopenpgp_la_SOURCES += \
-gnutls_openpgp.c \
-gnutls_ia.c \
-gnutls_extra.c

+ 0 - 252
src/daemon/https/openpgp/compat.c

@@ -1,252 +0,0 @@
-/*
- * Copyright (C) 2002, 2003, 2004, 2005 Free Software Foundation
- *
- * Author: Timo Schulz, Nikos Mavrogiannopoulos
- *
- * This file is part of GNUTLS-EXTRA.
- *
- * GNUTLS-EXTRA is free software: you can redistribute it and/or modify
- * it under the terms of the GNU General Public License as published by
- * the Free Software Foundation, either version 3 of the License, or
- * (at your option) any later version.
- *               
- * GNUTLS-EXTRA is distributed in the hope that it will be useful,
- * but WITHOUT ANY WARRANTY; without even the implied warranty of
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
- * GNU General Public License for more details.
- *                               
- * You should have received a copy of the GNU General Public License
- * along with this program.  If not, see <http://www.gnu.org/licenses/>.
- */
-
-/* Compatibility functions on OpenPGP key parsing.
- */
-
-#include <gnutls_int.h>
-#include <gnutls_errors.h>
-#include <gnutls_openpgp.h>
-#include "openpgp.h"
-
-/*-
- * gnutls_openpgp_verify_key - Verify all signatures on the key
- * @cert_list: the structure that holds the certificates.
- * @cert_list_lenght: the items in the cert_list.
- * @status: the output of the verification function
- *
- * Verify all signatures in the certificate list. When the key
- * is not available, the signature is skipped.
- *
- * The return value is one of the CertificateStatus entries.
- *
- * NOTE: this function does not verify using any "web of trust". You
- * may use GnuPG for that purpose, or any other external PGP application.
- -*/
-int
-_gnutls_openpgp_verify_key (const mhd_gtls_cert_credentials_t cred,
-                            const gnutls_datum_t * cert_list,
-                            int cert_list_length, unsigned int *status)
-{
-  int ret = 0;
-  gnutls_openpgp_crt_t key = NULL;
-  unsigned int verify = 0, verify_self = 0;
-
-  if (!cert_list || cert_list_length != 1)
-    {
-      gnutls_assert ();
-      return GNUTLS_E_NO_CERTIFICATE_FOUND;
-    }
-
-  ret = gnutls_openpgp_crt_init (&key);
-  if (ret < 0)
-    {
-      gnutls_assert ();
-      return ret;
-    }
-
-  ret =
-    gnutls_openpgp_crt_import (key, &cert_list[0], GNUTLS_OPENPGP_FMT_RAW);
-  if (ret < 0)
-    {
-      gnutls_assert ();
-      goto leave;
-    }
-
-#ifndef KEYRING_HACK
-  if (cred->keyring != NULL)
-    {
-      ret = gnutls_openpgp_crt_verify_ring (key, cred->keyring, 0, &verify);
-      if (ret < 0)
-        {
-          gnutls_assert ();
-          goto leave;
-        }
-    }
-#else
-  {
-    gnutls_openpgp_keyring_t kring;
-
-    ret = gnutls_openpgp_keyring_init (&kring);
-    if (ret < 0)
-      {
-        gnutls_assert ();
-        return ret;
-      }
-
-    ret =
-      gnutls_openpgp_keyring_import (kring, &cred->keyring,
-                                     cred->keyring_format);
-    if (ret < 0)
-      {
-        gnutls_assert ();
-        gnutls_openpgp_keyring_deinit (kring);
-        return ret;
-      }
-
-    ret = gnutls_openpgp_crt_verify_ring (key, kring, 0, &verify);
-    if (ret < 0)
-      {
-        gnutls_assert ();
-        gnutls_openpgp_keyring_deinit (kring);
-        return ret;
-      }
-    gnutls_openpgp_keyring_deinit (kring);
-  }
-#endif
-
-  /* Now try the self signature. */
-  ret = gnutls_openpgp_crt_verify_self (key, 0, &verify_self);
-  if (ret < 0)
-    {
-      gnutls_assert ();
-      goto leave;
-    }
-
-  *status = verify_self | verify;
-
-#ifndef KEYRING_HACK
-  /* If we only checked the self signature. */
-  if (!cred->keyring)
-#else
-  if (!cred->keyring.data || !cred->keyring.size)
-#endif
-    *status |= GNUTLS_CERT_SIGNER_NOT_FOUND;
-
-
-  ret = 0;
-
-leave:
-  gnutls_openpgp_crt_deinit (key);
-
-  return ret;
-}
-
-/*-
- * gnutls_openpgp_fingerprint - Gets the fingerprint
- * @cert: the raw data that contains the OpenPGP public key.
- * @fpr: the buffer to save the fingerprint.
- * @fprlen: the integer to save the length of the fingerprint.
- *
- * Returns the fingerprint of the OpenPGP key. Depence on the algorithm,
- * the fingerprint can be 16 or 20 bytes.
- -*/
-int
-_gnutls_openpgp_fingerprint (const gnutls_datum_t * cert,
-                             unsigned char *fpr, size_t * fprlen)
-{
-  gnutls_openpgp_crt_t key;
-  int ret;
-
-  ret = gnutls_openpgp_crt_init (&key);
-  if (ret < 0)
-    {
-      gnutls_assert ();
-      return ret;
-    }
-
-  ret = gnutls_openpgp_crt_import (key, cert, GNUTLS_OPENPGP_FMT_RAW);
-  if (ret < 0)
-    {
-      gnutls_assert ();
-      return ret;
-    }
-
-  ret = gnutls_openpgp_crt_get_fingerprint (key, fpr, fprlen);
-  gnutls_openpgp_crt_deinit (key);
-  if (ret < 0)
-    {
-      gnutls_assert ();
-      return ret;
-    }
-
-  return 0;
-}
-
-/*-
- * gnutls_openpgp_get_raw_key_creation_time - Extract the timestamp
- * @cert: the raw data that contains the OpenPGP public key.
- *
- * Returns the timestamp when the OpenPGP key was created.
- -*/
-time_t
-_gnutls_openpgp_get_raw_key_creation_time (const gnutls_datum_t * cert)
-{
-  gnutls_openpgp_crt_t key;
-  int ret;
-  time_t tim;
-
-  ret = gnutls_openpgp_crt_init (&key);
-  if (ret < 0)
-    {
-      gnutls_assert ();
-      return ret;
-    }
-
-  ret = gnutls_openpgp_crt_import (key, cert, GNUTLS_OPENPGP_FMT_RAW);
-  if (ret < 0)
-    {
-      gnutls_assert ();
-      return ret;
-    }
-
-  tim = gnutls_openpgp_crt_get_creation_time (key);
-
-  gnutls_openpgp_crt_deinit (key);
-
-  return tim;
-}
-
-
-/*-
- * gnutls_openpgp_get_raw_key_expiration_time - Extract the expire date
- * @cert: the raw data that contains the OpenPGP public key.
- *
- * Returns the time when the OpenPGP key expires. A value of '0' means
- * that the key doesn't expire at all.
- -*/
-time_t
-_gnutls_openpgp_get_raw_key_expiration_time (const gnutls_datum_t * cert)
-{
-  gnutls_openpgp_crt_t key;
-  int ret;
-  time_t tim;
-
-  ret = gnutls_openpgp_crt_init (&key);
-  if (ret < 0)
-    {
-      gnutls_assert ();
-      return ret;
-    }
-
-  ret = gnutls_openpgp_crt_import (key, cert, GNUTLS_OPENPGP_FMT_RAW);
-  if (ret < 0)
-    {
-      gnutls_assert ();
-      return ret;
-    }
-
-  tim = gnutls_openpgp_crt_get_expiration_time (key);
-
-  gnutls_openpgp_crt_deinit (key);
-
-  return tim;
-}

+ 0 - 170
src/daemon/https/openpgp/extras.c

@@ -1,170 +0,0 @@
-/*
- * Copyright (C) 2003, 2004, 2005, 2007 Free Software Foundation
- *
- * Author: Nikos Mavrogiannopoulos, Timo Schulz
- *
- * This file is part of GNUTLS-EXTRA.
- *
- * GNUTLS-EXTRA is free software: you can redistribute it and/or modify
- * it under the terms of the GNU General Public License as published by
- * the Free Software Foundation, either version 3 of the License, or
- * (at your option) any later version.
- *               
- * GNUTLS-EXTRA is distributed in the hope that it will be useful,
- * but WITHOUT ANY WARRANTY; without even the implied warranty of
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
- * GNU General Public License for more details.
- *                               
- * You should have received a copy of the GNU General Public License
- * along with this program.  If not, see <http://www.gnu.org/licenses/>.
- */
-
-/* Functions on OpenPGP keyring parsing
- */
-
-#include <gnutls_int.h>
-#include <gnutls_datum.h>
-#include <gnutls_global.h>
-#include <gnutls_errors.h>
-#include <gnutls_openpgp.h>
-#include <gnutls_num.h>
-#include "openpgp.h"
-
-/* Keyring stuff. */
-
-/**
- * gnutls_openpgp_keyring_init - This function initializes a gnutls_openpgp_keyring_t structure
- * @keyring: The structure to be initialized
- *-
- * This function will initialize an OpenPGP keyring structure. 
- *
- * Returns 0 on success.
- *
- **/
-int
-gnutls_openpgp_keyring_init (gnutls_openpgp_keyring_t * keyring)
-{
-  *keyring = gnutls_calloc (1, sizeof (gnutls_openpgp_keyring_int));
-
-  if (*keyring)
-    return 0;                   /* success */
-  return GNUTLS_E_MEMORY_ERROR;
-}
-
-/**
- * gnutls_openpgp_keyring_deinit - This function deinitializes memory used by a gnutls_openpgp_keyring_t structure
- * @keyring: The structure to be initialized
- *
- * This function will deinitialize a keyring structure. 
- *
- **/
-void
-gnutls_openpgp_keyring_deinit (gnutls_openpgp_keyring_t keyring)
-{
-  if (!keyring)
-    return;
-
-  if (keyring->db)
-    {
-      cdk_keydb_free (keyring->db);
-      keyring->db = NULL;
-    }
-
-  /* In some cases the stream is also stored outside the keydb context
-     and we need to close it here then. */
-  if (keyring->db_stream)
-    {
-      cdk_stream_close (keyring->db_stream);
-      keyring->db_stream = NULL;
-    }
-
-  gnutls_free (keyring);
-}
-
-/**
- * gnutls_openpgp_keyring_check_id - Check if a key id exists in the keyring
- * @ring: holds the keyring to check against
- * @keyid: will hold the keyid to check for.
- * @flags: unused (should be 0)
- *
- * Check if a given key ID exists in the keyring.
- *
- * Returns 0 on success (if keyid exists) and a negative error code
- * on failure.
- **/
-int
-gnutls_openpgp_keyring_check_id (gnutls_openpgp_keyring_t ring,
-                                 const unsigned char keyid[8],
-                                 unsigned int flags)
-{
-  cdk_pkt_pubkey_t pk;
-  uint32_t id[2];
-
-  id[0] = mhd_gtls_read_uint32 (keyid);
-  id[1] = mhd_gtls_read_uint32 (&keyid[4]);
-
-  if (!cdk_keydb_get_pk (ring->db, id, &pk))
-    {
-      cdk_pk_release (pk);
-      return 0;
-    }
-
-  _gnutls_debug_log ("PGP: key not found %08lX\n", (unsigned long) id[1]);
-  return GNUTLS_E_NO_CERTIFICATE_FOUND;
-}
-
-/**
- * gnutls_openpgp_keyring_import - Import a raw- or Base64-encoded OpenPGP keyring
- * @keyring: The structure to store the parsed key.
- * @data: The RAW or BASE64 encoded keyring.
- * @format: One of #gnutls_openpgp_keyring_fmt elements.
- *
- * This function will convert the given RAW or Base64 encoded keyring to the
- * native #gnutls_openpgp_keyring_t format.  The output will be stored in
- * 'keyring'.
- *
- * Returns 0 on success.
- *
- **/
-int
-gnutls_openpgp_keyring_import (gnutls_openpgp_keyring_t keyring,
-                               const gnutls_datum_t * data,
-                               gnutls_openpgp_crt_fmt_t format)
-{
-  cdk_error_t err;
-  cdk_stream_t input;
-
-  _gnutls_debug_log ("PGP: keyring import format '%s'\n",
-                     format == GNUTLS_OPENPGP_FMT_RAW ? "raw" : "base64");
-
-  if (format == GNUTLS_OPENPGP_FMT_RAW)
-    {
-      err
-        =
-        cdk_keydb_new (&keyring->db, CDK_DBTYPE_DATA, data->data, data->size);
-      if (err)
-        gnutls_assert ();
-      return _gnutls_map_cdk_rc (err);
-    }
-
-  /* Create a new stream from the given data, which means to
-     allocate a new stream and to write the data in the stream.
-     Then push the armor filter to decode the data and to store
-     it in the raw format. */
-  err = cdk_stream_tmp_from_mem (data->data, data->size, &input);
-  if (!err)
-    err = cdk_stream_set_armor_flag (input, 0);
-  if (!err)
-    err = cdk_keydb_new_from_stream (&keyring->db, 0, input);
-  if (err)
-    {
-      cdk_stream_close (input);
-      gnutls_assert ();
-    }
-  else
-    /* The keydb function will not close the stream itself, so we need to
-       store it separately to close it later. */
-    keyring->db_stream = input;
-
-  return _gnutls_map_cdk_rc (err);
-}

+ 0 - 103
src/daemon/https/openpgp/gnutls_extra.c

@@ -1,103 +0,0 @@
-/*
- * Copyright (C) 2001, 2004, 2005, 2007 Free Software Foundation
- *
- * Author: Nikos Mavrogiannopoulos
- *
- * This file is part of GNUTLS-EXTRA.
- *
- * GNUTLS-EXTRA is free software: you can redistribute it and/or modify
- * it under the terms of the GNU General Public License as published by
- * the Free Software Foundation, either version 3 of the License, or
- * (at your option) any later version.
- *
- * GNUTLS-EXTRA is distributed in the hope that it will be useful,
- * but WITHOUT ANY WARRANTY; without even the implied warranty of
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
- * GNU General Public License for more details.
- *
- * You should have received a copy of the GNU General Public License
- * along with this program.  If not, see <http://www.gnu.org/licenses/>.
- */
-
-#include <gnutls_int.h>
-#include <gnutls_errors.h>
-#include <gnutls_extensions.h>
-#include <gnutls_openpgp.h>
-#include <gnutls_extra.h>
-#include <gnutls_extra_hooks.h>
-#include <gnutls_algorithms.h>
-
-/* the number of the compression algorithms available in the compression
- * structure.
- */
-extern int _gnutls_comp_algorithms_size;
-
-/* Functions in gnutls that have not been initialized.
- */
-
-static int _gnutls_init_extra = 0;
-
-/**
- * gnutls_global_init_extra - This function initializes the global state of gnutls-extra
- *
- * This function initializes the global state of gnutls-extra library
- * to defaults.  Returns zero on success.
- *
- * Note that MHD_gnutls_global_init() has to be called before this
- * function.  If this function is not called then the gnutls-extra
- * library will not be usable.
- *
- **/
-int
-gnutls_global_init_extra (void)
-{
-  /* If the version of libgnutls != version of
-   * libextra, then do not initialize the library.
-   * This is because it may break things.
-   */
-  _gnutls_init_extra++;
-
-  if (_gnutls_init_extra != 1)
-    {
-      return 0;
-    }
-
-  /* Register the openpgp functions. This is because some
-   * of them are defined to be NULL in the main library.
-   */
-  _gnutls_add_openpgp_functions (_gnutls_openpgp_verify_key,
-                                 _gnutls_openpgp_get_raw_key_creation_time,
-                                 _gnutls_openpgp_get_raw_key_expiration_time,
-                                 _gnutls_openpgp_fingerprint,
-                                 _gnutls_openpgp_request_key,
-                                 _gnutls_openpgp_raw_key_to_gcert,
-                                 _gnutls_openpgp_raw_privkey_to_gkey,
-                                 _gnutls_openpgp_crt_to_gcert,
-                                 _gnutls_openpgp_privkey_to_gkey,
-                                 gnutls_openpgp_crt_deinit,
-                                 gnutls_openpgp_keyring_deinit,
-                                 gnutls_openpgp_privkey_deinit);
-
-  return 0;
-}
-
-#include <strverscmp.h>
-
-/**
- * gnutls_extra_check_version - This function checks the library's version
- * @req_version: the version to check
- *
- * Check that the version of the gnutls-extra library is at minimum
- * the requested one and return the version string; return NULL if the
- * condition is not satisfied.  If a NULL is passed to this function,
- * no check is done, but the version string is simply returned.
- *
- **/
-const char *
-gnutls_extra_check_version (const char *req_version)
-{
-  if (!req_version || strverscmp (req_version, VERSION) <= 0)
-    return VERSION;
-
-  return NULL;
-}

+ 0 - 50
src/daemon/https/openpgp/gnutls_extra.h

@@ -1,50 +0,0 @@
-/*
- * Copyright (C) 2002, 2003, 2004, 2005, 2007 Free Software Foundation
- *
- * Author: Nikos Mavrogiannopoulos
- *
- * This file is part of GNUTLS-EXTRA.
- *
- * GNUTLS-EXTRA is free software; you can redistribute it and/or
- * modify it under the terms of the GNU General Public License as
- * published by the Free Software Foundation; either version 3 of the
- * License, or (at your option) any later version.
- *
- * GNUTLS-EXTRA is distributed in the hope that it will be useful, but
- * WITHOUT ANY WARRANTY; without even the implied warranty of
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
- * General Public License for more details.
- *
- * You should have received a copy of the GNU General Public License
- * along with GNUTLS-EXTRA; if not, write to the Free Software
- * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA
- * 02110-1301, USA.
- *
- */
-
-#include <auth_cert.h>
-
-typedef int (*OPENPGP_VERIFY_KEY_FUNC) (const
-					mhd_gtls_cert_credentials_t,
-					const gnutls_datum_t *, int,
-					unsigned int *);
-
-typedef time_t (*OPENPGP_KEY_CREATION_TIME_FUNC) (const gnutls_datum_t *);
-typedef time_t (*OPENPGP_KEY_EXPIRATION_TIME_FUNC) (const gnutls_datum_t *);
-typedef int (*OPENPGP_KEY_REQUEST) (mhd_gtls_session_t, gnutls_datum_t *,
-				    const mhd_gtls_cert_credentials_t,
-				    opaque *, int);
-
-typedef int (*OPENPGP_FINGERPRINT) (const gnutls_datum_t *,
-				    unsigned char *, size_t *);
-
-typedef int (*OPENPGP_RAW_KEY_TO_GCERT) (gnutls_cert *,
-					 const gnutls_datum_t *);
-typedef int (*OPENPGP_RAW_PRIVKEY_TO_GKEY) (gnutls_privkey *,
-					    const gnutls_datum_t *);
-
-typedef int (*OPENPGP_KEY_TO_GCERT) (gnutls_cert *, gnutls_openpgp_crt_t);
-typedef int (*OPENPGP_PRIVKEY_TO_GKEY) (gnutls_privkey *,
-					gnutls_openpgp_privkey_t);
-typedef void (*OPENPGP_KEY_DEINIT) (gnutls_openpgp_crt_t);
-typedef void (*OPENPGP_PRIVKEY_DEINIT) (gnutls_openpgp_privkey_t);

+ 0 - 901
src/daemon/https/openpgp/gnutls_ia.c

@@ -1,901 +0,0 @@
-/*
- * Copyright (C) 2005, 2006 Free Software Foundation
- *
- * Author: Simon Josefsson
- *
- * This file is part of GNUTLS-EXTRA.
- *
- * GNUTLS-EXTRA is free software: you can redistribute it and/or modify
- * it under the terms of the GNU General Public License as published by
- * the Free Software Foundation, either version 3 of the License, or
- * (at your option) any later version.
- *
- * GNUTLS-EXTRA is distributed in the hope that it will be useful,
- * but WITHOUT ANY WARRANTY; without even the implied warranty of
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
- * GNU General Public License for more details.
- *
- * You should have received a copy of the GNU General Public License
- * along with this program.  If not, see <http://www.gnu.org/licenses/>.
- */
-
-#include "gnutls_int.h"
-#include "gnutls_record.h"
-#include "gnutls_errors.h"
-#include "gnutls_num.h"
-#include "gnutls_state.h"
-
-#define CHECKSUM_SIZE 12
-
-struct gnutls_ia_client_credentials_st
-{
-  gnutls_ia_avp_func avp_func;
-  void *avp_ptr;
-};
-
-struct gnutls_ia_server_credentials_st
-{
-  gnutls_ia_avp_func avp_func;
-  void *avp_ptr;
-};
-
-static const char server_finished_label[] = "server phase finished";
-static const char client_finished_label[] = "client phase finished";
-static const char inner_permutation_label[] = "inner secret permutation";
-static const char challenge_label[] = "inner application challenge";
-
-/*
- * The TLS/IA packet is the InnerApplication token, described as
- * follows in draft-funk-tls-inner-application-extension-01.txt:
- *
- * enum {
- *   application_payload(0), intermediate_phase_finished(1),
- *   final_phase_finished(2), (255)
- * } InnerApplicationType;
- *
- * struct {
- *   InnerApplicationType msg_type;
- *   uint24 length;
- *   select (InnerApplicationType) {
- *     case application_payload:           ApplicationPayload;
- *     case intermediate_phase_finished:   IntermediatePhaseFinished;
- *     case final_phase_finished:          FinalPhaseFinished;
- *   } body;
- * } InnerApplication;
- *
- */
-
-/* Send TLS/IA data.  If data==NULL && sizeofdata==NULL, then the last
-   send was interrupted for some reason, and then we try to send it
-   again.  Returns the number of bytes sent, or an error code.  If
-   this return E_AGAIN and E_INTERRUPTED, call this function again
-   with data==NULL&&sizeofdata=0NULL until it returns successfully. */
-static ssize_t
-_gnutls_send_inner_application (mhd_gtls_session_t session,
-                                gnutls_ia_apptype_t msg_type,
-                                const char *data, size_t sizeofdata)
-{
-  opaque *p = NULL;
-  size_t plen = 0;
-  ssize_t len;
-
-  if (data != NULL)
-    {
-      plen = sizeofdata + 4;
-      p = gnutls_malloc (plen);
-      if (!p)
-        {
-          gnutls_assert ();
-          return GNUTLS_E_MEMORY_ERROR;
-        }
-
-      *(unsigned char *) p = (unsigned char) (msg_type & 0xFF);
-      mhd_gtls_write_uint24 (sizeofdata, p + 1);
-      memcpy (p + 4, data, sizeofdata);
-    }
-
-  len = mhd_gtls_send_int (session, GNUTLS_INNER_APPLICATION, -1, p, plen);
-
-  if (p)
-    gnutls_free (p);
-
-  return len;
-}
-
-/* Receive TLS/IA data.  Store received TLS/IA message type in
-   *MSG_TYPE, and the data in DATA of max SIZEOFDATA size.  Return the
-   number of bytes read, or an error code. */
-static ssize_t
-_gnutls_recv_inner_application (mhd_gtls_session_t session,
-                                gnutls_ia_apptype_t * msg_type,
-                                opaque * data, size_t sizeofdata)
-{
-  ssize_t len;
-  opaque pkt[4];
-
-  len = mhd_gtls_recv_int (session, GNUTLS_INNER_APPLICATION, -1, pkt, 4);
-  if (len != 4)
-    {
-      gnutls_assert ();
-      return GNUTLS_E_UNEXPECTED_PACKET_LENGTH;
-    }
-
-  *msg_type = pkt[0];
-  len = mhd_gtls_read_uint24 (&pkt[1]);
-
-  if (*msg_type != GNUTLS_IA_APPLICATION_PAYLOAD && len != CHECKSUM_SIZE)
-    {
-      gnutls_assert ();
-      return GNUTLS_E_UNEXPECTED_PACKET_LENGTH;
-    }
-
-  if (sizeofdata < len)
-    {
-      /* XXX push back pkt to IA buffer? */
-      gnutls_assert ();
-      return GNUTLS_E_SHORT_MEMORY_BUFFER;
-    }
-
-  if (len > 0)
-    {
-      int tmplen = len;
-
-      len = mhd_gtls_recv_int (session, GNUTLS_INNER_APPLICATION, -1,
-                              data, tmplen);
-      if (len != tmplen)
-        {
-          gnutls_assert ();
-          /* XXX Correct? */
-          return GNUTLS_E_UNEXPECTED_PACKET_LENGTH;
-        }
-    }
-
-  return len;
-}
-
-/* Apply the TLS PRF using the TLS/IA inner secret as keying material,
-   where the seed is the client random concatenated with the server
-   random concatenated EXTRA of EXTRA_SIZE length (which can be NULL/0
-   respectively).  LABEL and LABEL_SIZE is used as the label.  The
-   result is placed in pre-allocated OUT of OUTSIZE length. */
-static int
-_gnutls_ia_prf (mhd_gtls_session_t session,
-                size_t label_size,
-                const char *label,
-                size_t extra_size,
-                const char *extra, size_t outsize, opaque * out)
-{
-  int ret;
-  opaque *seed;
-  size_t seedsize = 2 * TLS_RANDOM_SIZE + extra_size;
-
-  seed = gnutls_malloc (seedsize);
-  if (!seed)
-    {
-      gnutls_assert ();
-      return GNUTLS_E_MEMORY_ERROR;
-    }
-
-  memcpy (seed, session->security_parameters.server_random, TLS_RANDOM_SIZE);
-  memcpy (seed + TLS_RANDOM_SIZE, session->security_parameters.client_random,
-          TLS_RANDOM_SIZE);
-  memcpy (seed + 2 * TLS_RANDOM_SIZE, extra, extra_size);
-
-  ret = mhd_gtls_PRF (session, session->security_parameters.inner_secret,
-                     TLS_MASTER_SIZE,
-                     label, label_size, seed, seedsize, outsize, out);
-
-  gnutls_free (seed);
-
-  return ret;
-}
-
-/**
- * gnutls_ia_permute_inner_secret:
- * @session: is a #mhd_gtls_session_t structure.
- * @session_keys_size: Size of generated session keys (0 if none).
- * @session_keys: Generated session keys, used to permute inner secret
- *                (NULL if none).
- *
- * Permute the inner secret using the generated session keys.
- *
- * This can be called in the TLS/IA AVP callback to mix any generated
- * session keys with the TLS/IA inner secret.
- *
- * Return value: Return zero on success, or a negative error code.
- **/
-int
-gnutls_ia_permute_inner_secret (mhd_gtls_session_t session,
-                                size_t session_keys_size,
-                                const char *session_keys)
-{
-  return _gnutls_ia_prf (session,
-                         sizeof (inner_permutation_label) - 1,
-                         inner_permutation_label,
-                         session_keys_size,
-                         session_keys,
-                         TLS_RANDOM_SIZE,
-                         session->security_parameters.inner_secret);
-}
-
-/**
- * gnutls_ia_generate_challenge:
- * @session: is a #mhd_gtls_session_t structure.
- * @buffer_size: size of output buffer.
- * @buffer: pre-allocated buffer to contain @buffer_size bytes of output.
- *
- * Generate an application challenge that the client cannot control or
- * predict, based on the TLS/IA inner secret.
- *
- * Return value: Returns 0 on success, or an negative error code.
- **/
-int
-gnutls_ia_generate_challenge (mhd_gtls_session_t session,
-                              size_t buffer_size, char *buffer)
-{
-  return _gnutls_ia_prf (session,
-                         sizeof (challenge_label) - 1,
-                         challenge_label, 0, NULL, buffer_size, buffer);
-}
-
-/**
- * gnutls_ia_extract_inner_secret:
- * @session: is a #mhd_gtls_session_t structure.
- * @buffer: pre-allocated buffer to hold 48 bytes of inner secret.
- *
- * Copy the 48 bytes large inner secret into the specified buffer
- *
- * This function is typically used after the TLS/IA handshake has
- * concluded.  The TLS/IA inner secret can be used as input to a PRF
- * to derive session keys.  Do not use the inner secret directly as a
- * session key, because for a resumed session that does not include an
- * application phase, the inner secret will be identical to the inner
- * secret in the original session.  It is important to include, for
- * example, the client and server randomness when deriving a sesssion
- * key from the inner secret.
- **/
-void
-gnutls_ia_extract_inner_secret (mhd_gtls_session_t session, char *buffer)
-{
-  memcpy (buffer, session->security_parameters.inner_secret, TLS_MASTER_SIZE);
-}
-
-/**
- * gnutls_ia_endphase_send:
- * @session: is a #mhd_gtls_session_t structure.
- * @final_p: Set iff this should signal the final phase.
- *
- * Send a TLS/IA end phase message.
- *
- * In the client, this should only be used to acknowledge an end phase
- * message sent by the server.
- *
- * In the server, this can be called instead of gnutls_ia_send() if
- * the server wishes to end an application phase.
- *
- * Return value: Return 0 on success, or an error code.
- **/
-int
-gnutls_ia_endphase_send (mhd_gtls_session_t session, int final_p)
-{
-  opaque local_checksum[CHECKSUM_SIZE];
-  int client = session->security_parameters.entity == GNUTLS_CLIENT;
-  const char *label = client ? client_finished_label : server_finished_label;
-  int size_of_label = client ? sizeof (client_finished_label) :
-    sizeof (server_finished_label);
-  ssize_t len;
-  int ret;
-
-  ret = mhd_gtls_PRF (session, session->security_parameters.inner_secret,
-                     TLS_MASTER_SIZE, label, size_of_label - 1,
-                     /* XXX specification unclear on seed. */
-                     "", 0, CHECKSUM_SIZE, local_checksum);
-  if (ret < 0)
-    return ret;
-
-  len = _gnutls_send_inner_application
-    (session,
-     final_p ? GNUTLS_IA_FINAL_PHASE_FINISHED :
-     GNUTLS_IA_INTERMEDIATE_PHASE_FINISHED, local_checksum, CHECKSUM_SIZE);
-
-  /* XXX  Instead of calling this function over and over...?
-   * while (len == GNUTLS_E_AGAIN || len == GNUTLS_E_INTERRUPTED)
-   *  len = mhd_gtls_io_write_flush(session);
-   */
-
-  if (len < 0)
-    {
-      gnutls_assert ();
-      return len;
-    }
-
-  return 0;
-}
-
-/**
- * gnutls_ia_verify_endphase:
- * @session: is a #mhd_gtls_session_t structure.
- * @checksum: 12-byte checksum data, received from gnutls_ia_recv().
- *
- * Verify TLS/IA end phase checksum data.  If verification fails, the
- * %GNUTLS_A_INNER_APPLICATION_VERIFICATION alert is sent to the other
- * sie.
- *
- * This function is called when gnutls_ia_recv() return
- * %GNUTLS_E_WARNING_IA_IPHF_RECEIVED or
- * %GNUTLS_E_WARNING_IA_FPHF_RECEIVED.
- *
- * Return value: Return 0 on successful verification, or an error
- * code.  If the checksum verification of the end phase message fails,
- * %GNUTLS_E_IA_VERIFY_FAILED is returned.
- **/
-int
-gnutls_ia_verify_endphase (mhd_gtls_session_t session, const char *checksum)
-{
-  char local_checksum[CHECKSUM_SIZE];
-  int client = session->security_parameters.entity == GNUTLS_CLIENT;
-  const char *label = client ? server_finished_label : client_finished_label;
-  int size_of_label = client ? sizeof (server_finished_label) :
-    sizeof (client_finished_label);
-  int ret;
-
-  ret = mhd_gtls_PRF (session, session->security_parameters.inner_secret,
-                     TLS_MASTER_SIZE,
-                     label, size_of_label - 1,
-                     "", 0, CHECKSUM_SIZE, local_checksum);
-  if (ret < 0)
-    {
-      gnutls_assert ();
-      return ret;
-    }
-
-  if (memcmp (local_checksum, checksum, CHECKSUM_SIZE) != 0)
-    {
-      ret = MHD_gnutls_alert_send (session, GNUTLS_AL_FATAL,
-                               GNUTLS_A_INNER_APPLICATION_VERIFICATION);
-      if (ret < 0)
-        {
-          gnutls_assert ();
-          return ret;
-        }
-
-      return GNUTLS_E_IA_VERIFY_FAILED;
-    }
-
-  return 0;
-}
-
-/**
- * gnutls_ia_send: Send peer the specified TLS/IA data.
- * @session: is a #mhd_gtls_session_t structure.
- * @data: contains the data to send
- * @sizeofdata: is the length of the data
- *
- * Send TLS/IA application payload data.  This function has the
- * similar semantics with send(). The only difference is that is
- * accepts a GNUTLS session, and uses different error codes.
- *
- * The TLS/IA protocol is synchronous, so you cannot send more than
- * one packet at a time.  The client always send the first packet.
- *
- * To finish an application phase in the server, use
- * gnutls_ia_endphase_send().  The client cannot end an application
- * phase unilaterally; rather, a client is required to respond with an
- * endphase of its own if gnutls_ia_recv indicates that the server has
- * sent one.
- *
- * If the EINTR is returned by the internal push function (the default
- * is send()} then %GNUTLS_E_INTERRUPTED will be returned.  If
- * %GNUTLS_E_INTERRUPTED or %GNUTLS_E_AGAIN is returned, you must call
- * this function again, with the same parameters; alternatively you
- * could provide a %NULL pointer for data, and 0 for size.
- *
- * Returns the number of bytes sent, or a negative error code.
- **/
-ssize_t
-gnutls_ia_send (mhd_gtls_session_t session, const char *data, size_t sizeofdata)
-{
-  ssize_t len;
-
-  len = _gnutls_send_inner_application (session,
-                                        GNUTLS_IA_APPLICATION_PAYLOAD,
-                                        data, sizeofdata);
-
-  return len;
-}
-
-/**
- * gnutls_ia_recv - read data from the TLS/IA protocol
- * @session: is a #mhd_gtls_session_t structure.
- * @data: the buffer that the data will be read into, must hold >= 12 bytes.
- * @sizeofdata: the number of requested bytes, must be >= 12.
- *
- * Receive TLS/IA data.  This function has the similar semantics with
- * recv(). The only difference is that is accepts a GNUTLS session,
- * and uses different error codes.
- *
- * If the server attempt to finish an application phase, this function
- * will return %GNUTLS_E_WARNING_IA_IPHF_RECEIVED or
- * %GNUTLS_E_WARNING_IA_FPHF_RECEIVED.  The caller should then invoke
- * gnutls_ia_verify_endphase(), and if it runs the client side, also
- * send an endphase message of its own using gnutls_ia_endphase_send.
- *
- * If EINTR is returned by the internal push function (the default is
- * @code{recv()}) then GNUTLS_E_INTERRUPTED will be returned.  If
- * GNUTLS_E_INTERRUPTED or GNUTLS_E_AGAIN is returned, you must call
- * this function again, with the same parameters; alternatively you
- * could provide a NULL pointer for data, and 0 for size.
- *
- * Returns the number of bytes received.  A negative error code is
- * returned in case of an error.  The
- * %GNUTLS_E_WARNING_IA_IPHF_RECEIVED and
- * %GNUTLS_E_WARNING_IA_FPHF_RECEIVED errors are returned when an
- * application phase finished message has been sent by the server.
- **/
-ssize_t
-gnutls_ia_recv (mhd_gtls_session_t session, char *data, size_t sizeofdata)
-{
-  gnutls_ia_apptype_t msg_type;
-  ssize_t len;
-
-  len = _gnutls_recv_inner_application (session, &msg_type, data, sizeofdata);
-
-  if (msg_type == GNUTLS_IA_INTERMEDIATE_PHASE_FINISHED)
-    return GNUTLS_E_WARNING_IA_IPHF_RECEIVED;
-  else if (msg_type == GNUTLS_IA_FINAL_PHASE_FINISHED)
-    return GNUTLS_E_WARNING_IA_FPHF_RECEIVED;
-
-  return len;
-}
-
-int
-_gnutls_ia_client_handshake (mhd_gtls_session_t session)
-{
-  char *buf = NULL;
-  size_t buflen = 0;
-  char tmp[1024];               /* XXX */
-  ssize_t len;
-  int ret;
-  const struct gnutls_ia_client_credentials_st *cred =
-    mhd_gtls_get_cred (session->key, MHD_GNUTLS_CRD_IA, NULL);
-
-  if (cred == NULL)
-    return GNUTLS_E_INTERNAL_ERROR;
-
-  while (1)
-    {
-      char *avp;
-      size_t avplen;
-
-      ret = cred->avp_func (session, cred->avp_ptr,
-                            buf, buflen, &avp, &avplen);
-      if (ret)
-        {
-          int tmpret;
-          tmpret = MHD_gnutls_alert_send (session, GNUTLS_AL_FATAL,
-                                      GNUTLS_A_INNER_APPLICATION_FAILURE);
-          if (tmpret < 0)
-            gnutls_assert ();
-          return ret;
-        }
-
-      len = gnutls_ia_send (session, avp, avplen);
-      gnutls_free (avp);
-      if (len < 0)
-        return len;
-
-      len = gnutls_ia_recv (session, tmp, sizeof (tmp));
-      if (len == GNUTLS_E_WARNING_IA_IPHF_RECEIVED ||
-          len == GNUTLS_E_WARNING_IA_FPHF_RECEIVED)
-        {
-          ret = gnutls_ia_verify_endphase (session, tmp);
-          if (ret < 0)
-            return ret;
-
-          ret = gnutls_ia_endphase_send
-            (session, len == GNUTLS_E_WARNING_IA_FPHF_RECEIVED);
-          if (ret < 0)
-            return ret;
-        }
-
-      if (len == GNUTLS_E_WARNING_IA_IPHF_RECEIVED)
-        {
-          buf = NULL;
-          buflen = 0;
-          continue;
-        }
-      else if (len == GNUTLS_E_WARNING_IA_FPHF_RECEIVED)
-        break;
-
-      if (len < 0)
-        return len;
-
-      buflen = len;
-      buf = tmp;
-    }
-
-  return 0;
-}
-
-int
-_gnutls_ia_server_handshake (mhd_gtls_session_t session)
-{
-  gnutls_ia_apptype_t msg_type;
-  ssize_t len;
-  char buf[1024];
-  int ret;
-  const struct gnutls_ia_server_credentials_st *cred =
-    mhd_gtls_get_cred (session->key, MHD_GNUTLS_CRD_IA, NULL);
-
-  if (cred == NULL)
-    return GNUTLS_E_INTERNAL_ERROR;
-
-  do
-    {
-      char *avp;
-      size_t avplen;
-
-      len = gnutls_ia_recv (session, buf, sizeof (buf));
-      if (len == GNUTLS_E_WARNING_IA_IPHF_RECEIVED ||
-          len == GNUTLS_E_WARNING_IA_FPHF_RECEIVED)
-        {
-          ret = gnutls_ia_verify_endphase (session, buf);
-          if (ret < 0)
-            return ret;
-        }
-
-      if (len == GNUTLS_E_WARNING_IA_IPHF_RECEIVED)
-        continue;
-      else if (len == GNUTLS_E_WARNING_IA_FPHF_RECEIVED)
-        break;
-
-      if (len < 0)
-        return len;
-
-      avp = NULL;
-      avplen = 0;
-
-      ret = cred->avp_func (session, cred->avp_ptr, buf, len, &avp, &avplen);
-      if (ret < 0)
-        {
-          int tmpret;
-          tmpret = MHD_gnutls_alert_send (session, GNUTLS_AL_FATAL,
-                                      GNUTLS_A_INNER_APPLICATION_FAILURE);
-          if (tmpret < 0)
-            gnutls_assert ();
-          return ret;
-        }
-
-      msg_type = ret;
-
-      if (msg_type != GNUTLS_IA_APPLICATION_PAYLOAD)
-        {
-          ret = gnutls_ia_endphase_send (session, msg_type ==
-                                         GNUTLS_IA_FINAL_PHASE_FINISHED);
-          if (ret < 0)
-            return ret;
-        }
-      else
-        {
-          len = gnutls_ia_send (session, avp, avplen);
-          gnutls_free (avp);
-          if (len < 0)
-            return len;
-        }
-    }
-  while (1);
-
-  return 0;
-}
-
-/**
- * gnutls_ia_handshake_p:
- * @session: is a #mhd_gtls_session_t structure.
- *
- * Predicate to be used after MHD_gnutls_handshake() to decide whether to
- * invoke gnutls_ia_handshake().  Usable by both clients and servers.
- *
- * Return value: non-zero if TLS/IA handshake is expected, zero
- *   otherwise.
- **/
-int
-gnutls_ia_handshake_p (mhd_gtls_session_t session)
-{
-  mhd_gtls_ext_st *ext = &session->security_parameters.extensions;
-
-  /* Either local side or peer doesn't do TLS/IA: don't do IA */
-
-  if (!ext->gnutls_ia_enable || !ext->gnutls_ia_peer_enable)
-    return 0;
-
-  /* Not resuming or we don't allow skipping on resumption locally: do IA */
-
-  if (!ext->gnutls_ia_allowskip || !MHD_gtls_session_is_resumed (session))
-    return 1;
-
-  /* If we're resuming and we and the peer both allow skipping on resumption:
-   * don't do IA */
-
-  return !ext->gnutls_ia_peer_allowskip;
-}
-
-
-/**
- * gnutls_ia_handshake:
- * @session: is a #mhd_gtls_session_t structure.
- *
- * Perform a TLS/IA handshake.  This should be called after
- * MHD_gnutls_handshake() iff gnutls_ia_handshake_p().
- *
- * Return 0 on success, or an error code.
- **/
-int
-gnutls_ia_handshake (mhd_gtls_session_t session)
-{
-  int ret;
-
-  if (session->security_parameters.entity == GNUTLS_CLIENT)
-    ret = _gnutls_ia_client_handshake (session);
-  else
-    ret = _gnutls_ia_server_handshake (session);
-
-  return ret;
-}
-
-/**
- * gnutls_ia_allocate_client_credentials - Used to allocate an gnutls_ia_server_credentials_t structure
- * @sc: is a pointer to an #gnutls_ia_server_credentials_t structure.
- *
- * This structure is complex enough to manipulate directly thus this
- * helper function is provided in order to allocate it.
- *
- * Adding this credential to a session will enable TLS/IA, and will
- * require an Application Phase after the TLS handshake (if the server
- * support TLS/IA).  Use gnutls_ia_require_inner_phase() to toggle the
- * TLS/IA mode.
- *
- * Returns 0 on success.
- **/
-int
-gnutls_ia_allocate_client_credentials (gnutls_ia_client_credentials_t * sc)
-{
-  *sc = gnutls_calloc (1, sizeof (**sc));
-
-  if (*sc == NULL)
-    return GNUTLS_E_MEMORY_ERROR;
-
-  return 0;
-}
-
-/**
- * gnutls_ia_free_client_credentials - Used to free an allocated #gnutls_ia_client_credentials_t structure
- * @sc: is an #gnutls_ia_client_credentials_t structure.
- *
- * This structure is complex enough to manipulate directly thus this
- * helper function is provided in order to free (deallocate) it.
- *
- **/
-void
-gnutls_ia_free_client_credentials (gnutls_ia_client_credentials_t sc)
-{
-  gnutls_free (sc);
-}
-
-/**
- * gnutls_ia_set_client_avp_function - Used to set a AVP callback
- * @cred: is a #gnutls_ia_client_credentials_t structure.
- * @avp_func: is the callback function
- *
- * Set the TLS/IA AVP callback handler used for the session.
- *
- * The AVP callback is called to process AVPs received from the
- * server, and to get a new AVP to send to the server.
- *
- * The callback's function form is:
- * int (*avp_func) (mhd_gtls_session_t session, void *ptr,
- *                  const char *last, size_t lastlen,
- *                  char **next, size_t *nextlen);
- *
- * The @session parameter is the #mhd_gtls_session_t structure
- * corresponding to the current session.  The @ptr parameter is the
- * application hook pointer, set through
- * gnutls_ia_set_client_avp_ptr().  The AVP received from the server
- * is present in @last of @lastlen size, which will be %NULL on the
- * first invocation.  The newly allocated output AVP to send to the
- * server should be placed in *@next of *@nextlen size.
- *
- * The callback may invoke gnutls_ia_permute_inner_secret() to mix any
- * generated session keys with the TLS/IA inner secret.
- *
- * Return 0 (%GNUTLS_IA_APPLICATION_PAYLOAD) on success, or a negative
- * error code to abort the TLS/IA handshake.
- *
- * Note that the callback must use allocate the @next parameter using
- * gnutls_malloc(), because it is released via gnutls_free() by the
- * TLS/IA handshake function.
- *
- **/
-void
-gnutls_ia_set_client_avp_function (gnutls_ia_client_credentials_t cred,
-                                   gnutls_ia_avp_func avp_func)
-{
-  cred->avp_func = avp_func;
-}
-
-/**
- * gnutls_ia_set_client_avp_ptr - Sets a pointer to be sent to TLS/IA callback
- * @cred: is a #gnutls_ia_client_credentials_t structure.
- * @ptr: is the pointer
- *
- * Sets the pointer that will be provided to the TLS/IA callback
- * function as the first argument.
- *
- **/
-void
-gnutls_ia_set_client_avp_ptr (gnutls_ia_client_credentials_t cred, void *ptr)
-{
-  cred->avp_ptr = ptr;
-}
-
-/**
- * gnutls_ia_get_client_avp_ptr - Returns the pointer which is sent to TLS/IA callback
- * @cred: is a #gnutls_ia_client_credentials_t structure.
- *
- * Returns the pointer that will be provided to the TLS/IA callback
- * function as the first argument.
- *
- **/
-void *
-gnutls_ia_get_client_avp_ptr (gnutls_ia_client_credentials_t cred)
-{
-  return cred->avp_ptr;
-}
-
-/**
- * gnutls_ia_allocate_server_credentials - Used to allocate an gnutls_ia_server_credentials_t structure
- * @sc: is a pointer to an #gnutls_ia_server_credentials_t structure.
- *
- * This structure is complex enough to manipulate directly thus this
- * helper function is provided in order to allocate it.
- *
- * Adding this credential to a session will enable TLS/IA, and will
- * require an Application Phase after the TLS handshake (if the client
- * support TLS/IA).  Use gnutls_ia_require_inner_phase() to toggle the
- * TLS/IA mode.
- *
- * Returns 0 on success.
- **/
-int
-gnutls_ia_allocate_server_credentials (gnutls_ia_server_credentials_t * sc)
-{
-  *sc = gnutls_calloc (1, sizeof (**sc));
-
-  if (*sc == NULL)
-    return GNUTLS_E_MEMORY_ERROR;
-
-  return 0;
-}
-
-/**
- * gnutls_ia_free_server_credentials - Used to free an allocated #gnutls_ia_server_credentials_t structure
- * @sc: is an #gnutls_ia_server_credentials_t structure.
- *
- * This structure is complex enough to manipulate directly thus this
- * helper function is provided in order to free (deallocate) it.
- *
- **/
-void
-gnutls_ia_free_server_credentials (gnutls_ia_server_credentials_t sc)
-{
-  gnutls_free (sc);
-}
-
-/**
- * gnutls_ia_set_server_credentials_function - Used to set a AVP callback
- * @cred: is a #gnutls_ia_server_credentials_t structure.
- * @func: is the callback function
- *
- * Set the TLS/IA AVP callback handler used for the session.
- *
- * The callback's function form is:
- * int (*avp_func) (mhd_gtls_session_t session, void *ptr,
- *                  const char *last, size_t lastlen,
- *                  char **next, size_t *nextlen);
- *
- * The @session parameter is the #mhd_gtls_session_t structure
- * corresponding to the current session.  The @ptr parameter is the
- * application hook pointer, set through
- * gnutls_ia_set_server_avp_ptr().  The AVP received from the client
- * is present in @last of @lastlen size.  The newly allocated output
- * AVP to send to the client should be placed in *@next of *@nextlen
- * size.
- *
- * The AVP callback is called to process incoming AVPs from the
- * client, and to get a new AVP to send to the client.  It can also be
- * used to instruct the TLS/IA handshake to do go into the
- * Intermediate or Final phases.  It return a negative error code, or
- * an #gnutls_ia_apptype_t message type.
- *
- * The callback may invoke gnutls_ia_permute_inner_secret() to mix any
- * generated session keys with the TLS/IA inner secret.
- *
- * Specifically, return %GNUTLS_IA_APPLICATION_PAYLOAD (0) to send
- * another AVP to the client, return
- * %GNUTLS_IA_INTERMEDIATE_PHASE_FINISHED (1) to indicate that an
- * IntermediatePhaseFinished message should be sent, and return
- * %GNUTLS_IA_FINAL_PHASE_FINISHED (2) to indicate that an
- * FinalPhaseFinished message should be sent.  In the last two cases,
- * the contents of the @next and @nextlen parameter is not used.
- *
- * Note that the callback must use allocate the @next parameter using
- * gnutls_malloc(), because it is released via gnutls_free() by the
- * TLS/IA handshake function.
- **/
-void
-gnutls_ia_set_server_avp_function (gnutls_ia_server_credentials_t cred,
-                                   gnutls_ia_avp_func avp_func)
-{
-  cred->avp_func = avp_func;
-}
-
-/**
- * gnutls_ia_set_server_avp_ptr - Sets a pointer to be sent to TLS/IA callback
- * @cred: is a #gnutls_ia_client_credentials_t structure.
- * @ptr: is the pointer
- *
- * Sets the pointer that will be provided to the TLS/IA callback
- * function as the first argument.
- *
- **/
-void
-gnutls_ia_set_server_avp_ptr (gnutls_ia_server_credentials_t cred, void *ptr)
-{
-  cred->avp_ptr = ptr;
-}
-
-/**
- * gnutls_ia_get_server_avp_ptr - Returns the pointer which is sent to TLS/IA callback
- * @cred: is a #gnutls_ia_client_credentials_t structure.
- *
- * Returns the pointer that will be provided to the TLS/IA callback
- * function as the first argument.
- *
- **/
-void *
-gnutls_ia_get_server_avp_ptr (gnutls_ia_server_credentials_t cred)
-{
-  return cred->avp_ptr;
-}
-
-/**
- * gnutls_ia_enable - Indicate willingness for TLS/IA application phases
- * @session: is a #mhd_gtls_session_t structure.
- * @allow_skip_on_resume: non-zero if local party allows to skip the
- *			  TLS/IA application phases for a resumed session.
- *
- * Specify whether we must advertise support for the TLS/IA extension
- * during the handshake.
- *
- * At the client side, we always advertise TLS/IA if gnutls_ia_enable
- * was called before the handshake; at the server side, we also
- * require that the client has advertised that it wants to run TLS/IA
- * before including the advertisement, as required by the protocol.
- *
- * Similarly, at the client side we always advertise that we allow
- * TLS/IA to be skipped for resumed sessions if @allow_skip_on_resume
- * is non-zero; at the server side, we also require that the session
- * is indeed resumable and that the client has also advertised that it
- * allows TLS/IA to be skipped for resumed sessions.
- *
- * After the TLS handshake, call gnutls_ia_handshake_p() to find out
- * whether both parties agreed to do a TLS/IA handshake, before
- * calling gnutls_ia_handshake() or one of the lower level gnutls_ia_*
- * functions.
- **/
-void
-gnutls_ia_enable (mhd_gtls_session_t session, int allow_skip_on_resume)
-{
-  session->security_parameters.extensions.gnutls_ia_enable = 1;
-  session->security_parameters.extensions.gnutls_ia_allowskip =
-    allow_skip_on_resume;
-}

+ 0 - 966
src/daemon/https/openpgp/gnutls_openpgp.c

@@ -1,966 +0,0 @@
-/*
- * Copyright (C) 2002, 2003, 2004, 2005, 2006, 2007 Free Software Foundation
- *
- * Author: Timo Schulz
- *
- * This file is part of GNUTLS-EXTRA.
- *
- * GNUTLS-EXTRA is free software: you can redistribute it and/or modify
- * it under the terms of the GNU General Public License as published by
- * the Free Software Foundation, either version 3 of the License, or
- * (at your option) any later version.
- *
- * GNUTLS-EXTRA is distributed in the hope that it will be useful,
- * but WITHOUT ANY WARRANTY; without even the implied warranty of
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
- * GNU General Public License for more details.
- *
- * You should have received a copy of the GNU General Public License
- * along with this program.  If not, see <http://www.gnu.org/licenses/>.
- */
-
-#include "gnutls_int.h"
-#include "gnutls_errors.h"
-#include "gnutls_mpi.h"
-#include "gnutls_cert.h"
-#include "gnutls_datum.h"
-#include "gnutls_global.h"
-#include "gnutls_openpgp.h"
-#include "read-file.h"
-#include <gnutls_str.h>
-#include <gnutls_sig.h>
-#include <stdio.h>
-#include <gcrypt.h>
-#include <time.h>
-#include <sys/stat.h>
-
-#define OPENPGP_NAME_SIZE 256
-
-#define datum_append(x, y, z) mhd_gtls_datum_append_m (x, y, z, gnutls_realloc)
-
-static void
-release_mpi_array (mpi_t * arr, size_t n)
-{
-  mpi_t x;
-
-  while (arr && n--)
-    {
-      x = *arr;
-      mhd_gtls_mpi_release (&x);
-      *arr = NULL;
-      arr++;
-    }
-}
-
-
-/* Map an OpenCDK error type to a GnuTLS error type. */
-int
-_gnutls_map_cdk_rc (int rc)
-{
-  switch (rc)
-    {
-    case CDK_Success:
-      return 0;
-    case CDK_Too_Short:
-      return GNUTLS_E_SHORT_MEMORY_BUFFER;
-    case CDK_General_Error:
-      return GNUTLS_E_INTERNAL_ERROR;
-    case CDK_File_Error:
-      return GNUTLS_E_FILE_ERROR;
-    case CDK_MPI_Error:
-      return GNUTLS_E_MPI_SCAN_FAILED;
-    case CDK_Error_No_Key:
-      return GNUTLS_E_OPENPGP_GETKEY_FAILED;
-    case CDK_Armor_Error:
-      return GNUTLS_E_BASE64_DECODING_ERROR;
-    case CDK_Inv_Value:
-      return GNUTLS_E_INVALID_REQUEST;
-    default:
-      return GNUTLS_E_INTERNAL_ERROR;
-    }
-}
-
-static unsigned long
-buftou32 (const uint8_t * buf)
-{
-  unsigned a;
-  a = buf[0] << 24;
-  a |= buf[1] << 16;
-  a |= buf[2] << 8;
-  a |= buf[3];
-  return a;
-}
-
-static int
-openpgp_pk_to_gnutls_cert (gnutls_cert * cert, cdk_pkt_pubkey_t pk)
-{
-  uint8_t buf[512 + 2];
-  size_t nbytes;
-  int algo, i;
-  int rc = 0;
-
-  if (!cert || !pk)
-    {
-      gnutls_assert ();
-      return GNUTLS_E_INVALID_REQUEST;
-    }
-
-  /* GnuTLS OpenPGP does not support ELG keys */
-  if (is_ELG (pk->pubkey_algo))
-    {
-      gnutls_assert ();
-      return GNUTLS_E_UNWANTED_ALGORITHM;
-    }
-
-  algo = MHD_GNUTLS_PK_RSA;
-  cert->subject_pk_algorithm = algo;
-  cert->version = pk->version;
-  cert->cert_type = MHD_GNUTLS_CRT_OPENPGP;
-
-  cert->key_usage = 0;
-  if (pk->pubkey_usage & CDK_KEY_USG_SIGN)
-    cert->key_usage = KEY_DIGITAL_SIGNATURE;
-  if (pk->pubkey_usage & CDK_KEY_USG_ENCR)
-    cert->key_usage = KEY_KEY_ENCIPHERMENT;
-  if (!cert->key_usage)         /* Fallback code. */
-    {
-      if (pk->pubkey_algo == GCRY_PK_DSA || pk->pubkey_algo == GCRY_PK_RSA_S)
-        cert->key_usage = KEY_DIGITAL_SIGNATURE;
-      else if (pk->pubkey_algo == GCRY_PK_RSA_E)
-        cert->key_usage = KEY_KEY_ENCIPHERMENT;
-      else if (pk->pubkey_algo == GCRY_PK_RSA)
-        cert->key_usage = KEY_DIGITAL_SIGNATURE | KEY_KEY_ENCIPHERMENT;
-    }
-
-  cert->params_size = cdk_pk_get_npkey (pk->pubkey_algo);
-  for (i = 0; i < cert->params_size; i++)
-    {
-      nbytes = sizeof (buf) / sizeof (buf[0]);
-      cdk_pk_get_mpi (pk, i, buf, nbytes, &nbytes, NULL);
-      rc = mhd_gtls_mpi_scan_pgp (&cert->params[i], buf, &nbytes);
-      if (rc)
-        {
-          rc = GNUTLS_E_MPI_SCAN_FAILED;
-          break;
-        }
-    }
-
-  if (rc)
-    release_mpi_array (cert->params, i - 1);
-  return rc;
-}
-
-/*-
- * _gnutls_openpgp_raw_privkey_to_gkey - Converts an OpenPGP secret key to GnuTLS
- * @pkey: the GnuTLS private key context to store the key.
- * @raw_key: the raw data which contains the whole key packets.
- * @format: the format of the key packets.
- *
- * The RFC2440 (OpenPGP Message Format) data is converted into the
- * GnuTLS specific data which is need to perform secret key operations.
- *
- * This function can read both BASE64 and RAW keys.
- -*/
-int
-_gnutls_openpgp_raw_privkey_to_gkey (gnutls_privkey * pkey,
-                                     const gnutls_datum_t * raw_key,
-                                     gnutls_openpgp_crt_fmt_t format)
-{
-  cdk_kbnode_t snode = NULL;
-  cdk_packet_t pkt;
-  cdk_stream_t out;
-  cdk_pkt_seckey_t sk = NULL;
-  int pke_algo, i, j;
-  size_t nbytes = 0;
-  uint8_t buf[512];
-  int rc = 0;
-
-  if (!pkey || raw_key->size <= 0)
-    {
-      gnutls_assert ();
-      return GNUTLS_E_CERTIFICATE_ERROR;
-    }
-
-  rc = cdk_stream_tmp_new (&out);
-  if (rc)
-    return GNUTLS_E_CERTIFICATE_ERROR;
-
-  if (format == GNUTLS_OPENPGP_FMT_BASE64)
-    {
-      rc = cdk_stream_set_armor_flag (out, 0);
-      if (rc)
-        {
-          cdk_stream_close (out);
-          rc = _gnutls_map_cdk_rc (rc);
-          gnutls_assert ();
-          goto leave;
-        }
-    }
-
-  cdk_stream_write (out, raw_key->data, raw_key->size);
-  cdk_stream_seek (out, 0);
-
-  rc = cdk_keydb_get_keyblock (out, &snode);
-  cdk_stream_close (out);
-  if (rc)
-    {
-      rc = GNUTLS_E_OPENPGP_GETKEY_FAILED;
-      goto leave;
-    }
-
-  pkt = cdk_kbnode_find_packet (snode, CDK_PKT_SECRET_KEY);
-  if (!pkt)
-    {
-      rc = GNUTLS_E_OPENPGP_GETKEY_FAILED;
-      goto leave;
-    }
-  sk = pkt->pkt.secret_key;
-  pke_algo = sk->pk->pubkey_algo;
-  pkey->params_size = cdk_pk_get_npkey (pke_algo);
-  for (i = 0; i < pkey->params_size; i++)
-    {
-      nbytes = sizeof (buf) / sizeof (buf[0]);
-      cdk_pk_get_mpi (sk->pk, i, buf, nbytes, &nbytes, NULL);
-      rc = mhd_gtls_mpi_scan_pgp (&pkey->params[i], buf, &nbytes);
-      if (rc)
-        {
-          rc = GNUTLS_E_MPI_SCAN_FAILED;
-          release_mpi_array (pkey->params, i - 1);
-          goto leave;
-        }
-    }
-
-  pkey->params_size += cdk_pk_get_nskey (pke_algo);
-  for (j = 0; j < cdk_pk_get_nskey (pke_algo); j++, i++)
-    {
-      nbytes = sizeof (buf) / sizeof (buf[0]);
-      cdk_sk_get_mpi (sk, j, buf, nbytes, &nbytes, NULL);
-      rc = mhd_gtls_mpi_scan_pgp (&pkey->params[i], buf, &nbytes);
-      if (rc)
-        {
-          rc = GNUTLS_E_MPI_SCAN_FAILED;
-          release_mpi_array (pkey->params, i - 1);
-          goto leave;
-        }
-    }
-
-  if (is_ELG (pke_algo))
-    return GNUTLS_E_UNWANTED_ALGORITHM;
-  else if (is_RSA (pke_algo))
-    pkey->pk_algorithm = MHD_GNUTLS_PK_RSA;
-
-leave:
-  cdk_kbnode_release (snode);
-  return rc;
-}
-
-/*-
- * _gnutls_openpgp_raw_key_to_gcert - Converts raw OpenPGP data to GnuTLS certs
- * @cert: the certificate to store the data.
- * @raw: the buffer which contains the whole OpenPGP key packets.
- *
- * The RFC2440 (OpenPGP Message Format) data is converted to a GnuTLS
- * specific certificate.
- -*/
-int
-_gnutls_openpgp_raw_key_to_gcert (gnutls_cert * cert,
-                                  const gnutls_datum_t * raw)
-{
-  cdk_kbnode_t knode = NULL;
-  cdk_packet_t pkt = NULL;
-  int rc;
-
-  if (!cert)
-    {
-      gnutls_assert ();
-      return GNUTLS_E_INVALID_REQUEST;
-    }
-
-  memset (cert, 0, sizeof *cert);
-
-  rc = cdk_kbnode_read_from_mem (&knode, raw->data, raw->size);
-  if (!(rc = _gnutls_map_cdk_rc (rc)))
-    {
-      pkt = cdk_kbnode_find_packet (knode, CDK_PKT_PUBLIC_KEY);
-    }
-  if (!pkt)
-    {
-      gnutls_assert ();
-      rc = _gnutls_map_cdk_rc (rc);
-    }
-  if (!rc)
-    rc = _gnutls_set_datum (&cert->raw, raw->data, raw->size);
-  if (!rc)
-    rc = openpgp_pk_to_gnutls_cert (cert, pkt->pkt.public_key);
-
-  cdk_kbnode_release (knode);
-  return rc;
-}
-
-/**
-  * gnutls_certificate_set_openpgp_key - Used to set keys in a mhd_gtls_cert_credentials_t structure
-  * @res: is an #mhd_gtls_cert_credentials_t structure.
-  * @key: contains an openpgp public key
-  * @pkey: is an openpgp private key
-  *
-  * This function sets a certificate/private key pair in the
-  * mhd_gtls_cert_credentials_t structure. This function may be called
-  * more than once (in case multiple keys/certificates exist for the
-  * server).
-  *
-  **/
-int
-gnutls_certificate_set_openpgp_key (mhd_gtls_cert_credentials_t
-                                    res, gnutls_openpgp_crt_t crt,
-                                    gnutls_openpgp_privkey_t pkey)
-{
-  int ret;
-
-  /* this should be first */
-
-  res->pkey = mhd_gtls_realloc_fast (res->pkey,
-                                   (res->ncerts + 1) *
-                                   sizeof (gnutls_privkey));
-  if (res->pkey == NULL)
-    {
-      gnutls_assert ();
-      return GNUTLS_E_MEMORY_ERROR;
-    }
-
-  ret = _gnutls_openpgp_privkey_to_gkey (&res->pkey[res->ncerts], pkey);
-  if (ret < 0)
-    {
-      gnutls_assert ();
-      return ret;
-    }
-
-  res->cert_list = mhd_gtls_realloc_fast (res->cert_list,
-                                        (1 +
-                                         res->ncerts) *
-                                        sizeof (gnutls_cert *));
-  if (res->cert_list == NULL)
-    {
-      gnutls_assert ();
-      return GNUTLS_E_MEMORY_ERROR;
-    }
-
-  res->cert_list_length = mhd_gtls_realloc_fast (res->cert_list_length,
-                                               (1 +
-                                                res->ncerts) * sizeof (int));
-  if (res->cert_list_length == NULL)
-    {
-      gnutls_assert ();
-      return GNUTLS_E_MEMORY_ERROR;
-    }
-
-  res->cert_list[res->ncerts] = gnutls_calloc (1, sizeof (gnutls_cert));
-  if (res->cert_list[res->ncerts] == NULL)
-    {
-      gnutls_assert ();
-      return GNUTLS_E_MEMORY_ERROR;
-    }
-
-  res->cert_list_length[res->ncerts] = 1;
-
-  ret = _gnutls_openpgp_crt_to_gcert (res->cert_list[res->ncerts], crt);
-  if (ret < 0)
-    {
-      gnutls_assert ();
-      return ret;
-    }
-
-  res->ncerts++;
-
-  /* FIXME: Check if the keys match. */
-
-  return 0;
-}
-
-
-/*-
- * gnutls_openpgp_get_key - Retrieve a key from the keyring.
- * @key: the destination context to save the key.
- * @keyring: the datum struct that contains all keyring information.
- * @attr: The attribute (keyid, fingerprint, ...).
- * @by: What attribute is used.
- *
- * This function can be used to retrieve keys by different pattern
- * from a binary or a file keyring.
- -*/
-int
-gnutls_openpgp_get_key (gnutls_datum_t * key,
-                        gnutls_openpgp_keyring_t keyring, key_attr_t by,
-                        opaque * pattern)
-{
-  cdk_kbnode_t knode = NULL;
-  unsigned long keyid[2];
-  unsigned char *buf;
-  void *desc;
-  size_t len;
-  int rc = 0;
-
-  if (!key || !keyring || by == KEY_ATTR_NONE)
-    {
-      gnutls_assert ();
-      return GNUTLS_E_INVALID_REQUEST;
-    }
-
-  memset (key, 0, sizeof *key);
-
-  if (by == KEY_ATTR_SHORT_KEYID)
-    {
-      keyid[0] = buftou32 (pattern);
-      desc = keyid;
-    }
-  else if (by == KEY_ATTR_KEYID)
-    {
-      keyid[0] = buftou32 (pattern);
-      keyid[1] = buftou32 (pattern + 4);
-      desc = keyid;
-    }
-  else
-    desc = pattern;
-  rc = cdk_keydb_search_start (keyring->db, by, desc);
-  if (!rc)
-    rc = cdk_keydb_search (keyring->db, &knode);
-  if (rc)
-    {
-      rc = _gnutls_map_cdk_rc (rc);
-      goto leave;
-    }
-
-  if (!cdk_kbnode_find (knode, CDK_PKT_PUBLIC_KEY))
-    {
-      rc = GNUTLS_E_OPENPGP_GETKEY_FAILED;
-      goto leave;
-    }
-
-  /* We let the function allocate the buffer to avoid
-     to call the function twice. */
-  rc = cdk_kbnode_write_to_mem_alloc (knode, &buf, &len);
-  if (!rc)
-    datum_append (key, buf, len);
-  cdk_free (buf);
-
-leave:
-  cdk_kbnode_release (knode);
-  return rc;
-}
-
-
-/* Convert the stream to a datum. In this case we use the mmap
-   function to map the entire stream to a buffer. */
-static int
-stream_to_datum (cdk_stream_t inp, gnutls_datum_t * raw)
-{
-  uint8_t *buf;
-  size_t buflen;
-
-  if (!inp || !raw)
-    {
-      gnutls_assert ();
-      return GNUTLS_E_INVALID_REQUEST;
-    }
-
-  cdk_stream_mmap (inp, &buf, &buflen);
-  datum_append (raw, buf, buflen);
-  cdk_free (buf);
-
-  if (!buflen)
-    {
-      gnutls_assert ();
-      return GNUTLS_E_INTERNAL_ERROR;
-    }
-
-  return 0;
-}
-
-
-
-/**
- * gnutls_certificate_set_openpgp_key_mem - Used to set OpenPGP keys
- * @res: the destination context to save the data.
- * @cert: the datum that contains the public key.
- * @key: the datum that contains the secret key.
- *
- * This funtion is used to load OpenPGP keys into the GnuTLS credential
- * structure.
- * It doesn't matter whether the keys are armored or not, but the files
- * should only contain one key which should not be encrypted.
- **/
-int
-gnutls_certificate_set_openpgp_key_mem (mhd_gtls_cert_credentials_t
-                                        res, const gnutls_datum_t * icert,
-                                        const gnutls_datum_t * ikey,
-                                        gnutls_openpgp_crt_fmt_t format)
-{
-  gnutls_openpgp_privkey_t key;
-  gnutls_openpgp_crt_t cert;
-  int ret;
-
-  ret = gnutls_openpgp_privkey_init (&key);
-  if (ret < 0)
-    {
-      gnutls_assert ();
-      return ret;
-    }
-
-  ret = gnutls_openpgp_privkey_import (key, ikey, format, NULL, 0);
-  if (ret < 0)
-    {
-      gnutls_assert ();
-      gnutls_openpgp_privkey_deinit (key);
-      return ret;
-    }
-
-  ret = gnutls_openpgp_crt_init (&cert);
-  if (ret < 0)
-    {
-      gnutls_assert ();
-      gnutls_openpgp_privkey_deinit (key);
-      return ret;
-    }
-
-  ret = gnutls_openpgp_crt_import (cert, icert, format);
-  if (ret < 0)
-    {
-      gnutls_assert ();
-      gnutls_openpgp_privkey_deinit (key);
-      gnutls_openpgp_crt_deinit (cert);
-      return ret;
-    }
-
-
-  ret = gnutls_certificate_set_openpgp_key (res, cert, key);
-
-  gnutls_openpgp_privkey_deinit (key);
-  gnutls_openpgp_crt_deinit (cert);
-
-  return ret;
-}
-
-
-/**
- * gnutls_certificate_set_openpgp_key_file - Used to set OpenPGP keys
- * @res: the destination context to save the data.
- * @certfile: the file that contains the public key.
- * @keyfile: the file that contains the secret key.
- *
- * This funtion is used to load OpenPGP keys into the GnuTLS credentials structure.
- * It doesn't matter whether the keys are armored or not, but the files
- * should only contain one key which should not be encrypted.
- **/
-int
-gnutls_certificate_set_openpgp_key_file (mhd_gtls_cert_credentials_t
-                                         res, const char *certfile,
-                                         const char *keyfile,
-                                         gnutls_openpgp_crt_fmt_t format)
-{
-  struct stat statbuf;
-  gnutls_datum_t key, cert;
-  int rc;
-  size_t size;
-
-  if (!res || !keyfile || !certfile)
-    {
-      gnutls_assert ();
-      return GNUTLS_E_INVALID_REQUEST;
-    }
-
-  if (stat (certfile, &statbuf) || stat (keyfile, &statbuf))
-    {
-      gnutls_assert ();
-      return GNUTLS_E_FILE_ERROR;
-    }
-
-  cert.data = read_binary_file (certfile, &size);
-  cert.size = (unsigned int) size;
-  if (cert.data == NULL)
-    {
-      gnutls_assert ();
-      return GNUTLS_E_FILE_ERROR;
-    }
-
-  key.data = read_binary_file (keyfile, &size);
-  key.size = (unsigned int) size;
-  if (key.data == NULL)
-    {
-      gnutls_assert ();
-      free (cert.data);
-      return GNUTLS_E_FILE_ERROR;
-    }
-
-  rc = gnutls_certificate_set_openpgp_key_mem (res, &cert, &key, format);
-
-  free (cert.data);
-  free (key.data);
-
-  if (rc < 0)
-    {
-      gnutls_assert ();
-      return rc;
-    }
-
-  return 0;
-}
-
-
-int
-gnutls_openpgp_count_key_names (const gnutls_datum_t * cert)
-{
-  cdk_kbnode_t knode, p, ctx;
-  cdk_packet_t pkt;
-  int nuids;
-
-  if (cert == NULL)
-    {
-      gnutls_assert ();
-      return 0;
-    }
-
-  if (cdk_kbnode_read_from_mem (&knode, cert->data, cert->size))
-    {
-      gnutls_assert ();
-      return 0;
-    }
-
-  ctx = NULL;
-  for (nuids = 0;;)
-    {
-      p = cdk_kbnode_walk (knode, &ctx, 0);
-      if (!p)
-        break;
-      pkt = cdk_kbnode_get_packet (p);
-      if (pkt->pkttype == CDK_PKT_USER_ID)
-        nuids++;
-    }
-
-  cdk_kbnode_release (knode);
-  return nuids;
-}
-
-
-/**
- * gnutls_certificate_set_openpgp_keyring_file - Sets a keyring file for OpenPGP
- * @c: A certificate credentials structure
- * @file: filename of the keyring.
- *
- * The function is used to set keyrings that will be used internally
- * by various OpenPGP functions. For example to find a key when it
- * is needed for an operations. The keyring will also be used at the
- * verification functions.
- *
- **/
-int
-gnutls_certificate_set_openpgp_keyring_file (mhd_gtls_cert_credentials_t
-                                             c, const char *file,
-                                             gnutls_openpgp_crt_fmt_t format)
-{
-  gnutls_datum_t ring;
-  size_t size;
-  int rc;
-
-  if (!c || !file)
-    {
-      gnutls_assert ();
-      return GNUTLS_E_INVALID_REQUEST;
-    }
-
-  ring.data = read_binary_file (file, &size);
-  ring.size = (unsigned int) size;
-  if (ring.data == NULL)
-    {
-      gnutls_assert ();
-      return GNUTLS_E_FILE_ERROR;
-    }
-
-  rc =
-    gnutls_certificate_set_openpgp_keyring_mem (c, ring.data, ring.size,
-                                                format);
-
-  free (ring.data);
-
-  return rc;
-}
-
-/**
- * gnutls_certificate_set_openpgp_keyring_mem - Add keyring data for OpenPGP
- * @c: A certificate credentials structure
- * @data: buffer with keyring data.
- * @dlen: length of data buffer.
- *
- * The function is used to set keyrings that will be used internally
- * by various OpenPGP functions. For example to find a key when it
- * is needed for an operations. The keyring will also be used at the
- * verification functions.
- *
- **/
-int
-gnutls_certificate_set_openpgp_keyring_mem (mhd_gtls_cert_credentials_t
-                                            c, const opaque * data,
-                                            size_t dlen,
-                                            gnutls_openpgp_crt_fmt_t format)
-{
-#ifndef KEYRING_HACK
-  cdk_stream_t inp;
-  size_t count;
-  uint8_t *buf;
-  gnutls_datum ddata;
-  int rc;
-
-  ddata.data = (void *) data;
-  ddata.size = dlen;
-
-  if (!c || !data || !dlen)
-    {
-      gnutls_assert ();
-      return GNUTLS_E_INVALID_REQUEST;
-    }
-
-  rc = gnutls_openpgp_keyring_init (&c->keyring);
-  if (rc < 0)
-    {
-      gnutls_assert ();
-      return rc;
-    }
-
-  rc = gnutls_openpgp_keyring_import (c->keyring, &ddata, format);
-  if (rc < 0)
-    {
-      gnutls_assert ();
-      gnutls_openpgp_keyring_deinit (c->keyring);
-      return rc;
-    }
-#else
-  c->keyring_format = format;
-  c->keyring.data = gnutls_malloc (dlen + 1);
-  if (c->keyring.data == NULL)
-    {
-      gnutls_assert ();
-      return GNUTLS_E_MEMORY_ERROR;
-    }
-  memcpy (c->keyring.data, data, dlen);
-  c->keyring.data[dlen] = 0;
-  c->keyring.size = dlen;
-#endif
-  return 0;
-}
-
-/*-
- * _gnutls_openpgp_request_key - Receives a key from a database, key server etc
- * @ret - a pointer to gnutls_datum_t structure.
- * @cred - a mhd_gtls_cert_credentials_t structure.
- * @key_fingerprint - The keyFingerprint
- * @key_fingerprint_size - the size of the fingerprint
- *
- * Retrieves a key from a local database, keyring, or a key server. The
- * return value is locally allocated.
- *
- -*/
-int
-_gnutls_openpgp_request_key (mhd_gtls_session_t session, gnutls_datum_t * ret,
-                             const mhd_gtls_cert_credentials_t cred,
-                             opaque * key_fpr, int key_fpr_size)
-{
-  int rc = 0;
-#ifdef KEYRING_HACK
-  gnutls_openpgp_keyring_t kring;
-#endif
-
-  if (!ret || !cred || !key_fpr)
-    {
-      gnutls_assert ();
-      return GNUTLS_E_INVALID_REQUEST;
-    }
-
-  if (key_fpr_size != 16 && key_fpr_size != 20)
-    return GNUTLS_E_HASH_FAILED;        /* only MD5 and SHA1 are supported */
-
-#ifndef KEYRING_HACK
-  rc = gnutls_openpgp_get_key (ret, cred->keyring, KEY_ATTR_FPR, key_fpr);
-#else
-  rc = gnutls_openpgp_keyring_init (&kring);
-  if (rc < 0)
-    {
-      gnutls_assert ();
-      return rc;
-    }
-
-  rc =
-    gnutls_openpgp_keyring_import (kring, &cred->keyring,
-                                   cred->keyring_format);
-  if (rc < 0)
-    {
-      gnutls_assert ();
-      gnutls_openpgp_keyring_deinit (kring);
-      return rc;
-    }
-#endif
-  if (rc >= 0)                  /* key was found */
-    {
-      rc = 0;
-      goto error;
-    }
-  else
-    rc = GNUTLS_E_OPENPGP_GETKEY_FAILED;
-
-  /* If the callback function was set, then try this one. */
-  if (session->internals.openpgp_recv_key_func != NULL)
-    {
-      rc = session->internals.openpgp_recv_key_func (session,
-                                                     key_fpr,
-                                                     key_fpr_size, ret);
-      if (rc < 0)
-        {
-          gnutls_assert ();
-          rc = GNUTLS_E_OPENPGP_GETKEY_FAILED;
-          goto error;
-        }
-    }
-
-error:
-#ifdef KEYRING_HACK
-  gnutls_openpgp_keyring_deinit (kring);
-#endif
-  return rc;
-}
-
-/**
- * gnutls_openpgp_set_recv_key_function - Used to set a key retrieval callback for PGP keys
- * @session: a TLS session
- * @func: the callback
- *
- * This funtion will set a key retrieval function for OpenPGP keys. This
- * callback is only useful in server side, and will be used if the peer
- * sent a key fingerprint instead of a full key.
- *
- **/
-void
-gnutls_openpgp_set_recv_key_function (mhd_gtls_session_t session,
-                                      mhd_gtls_openpgp_recv_key_func func)
-{
-  session->internals.openpgp_recv_key_func = func;
-}
-
-
-/* Copies a gnutls_openpgp_privkey_t to a gnutls_privkey structure. */
-int
-_gnutls_openpgp_privkey_to_gkey (gnutls_privkey * dest,
-                                 gnutls_openpgp_privkey_t src)
-{
-  int i, ret;
-
-  memset (dest, 0, sizeof (gnutls_privkey));
-
-  for (i = 0; i < src->pkey.params_size; i++)
-    {
-      dest->params[i] = _gnutls_mpi_copy (src->pkey.params[i]);
-      if (dest->params[i] == NULL)
-        {
-          gnutls_assert ();
-          ret = GNUTLS_E_MEMORY_ERROR;
-          goto cleanup;
-        }
-    }
-
-  dest->pk_algorithm = src->pkey.pk_algorithm;
-  dest->params_size = src->pkey.params_size;
-
-  return 0;
-
-cleanup:
-  for (i = 0; i < src->pkey.params_size; i++)
-    mhd_gtls_mpi_release (&dest->params[i]);
-  return ret;
-}
-
-/* Converts a parsed gnutls_openpgp_crt_t to a gnutls_cert structure.
- */
-int
-_gnutls_openpgp_crt_to_gcert (gnutls_cert * gcert, gnutls_openpgp_crt_t cert)
-{
-  opaque *der;
-  size_t der_size = 0;
-  gnutls_datum_t raw;
-  int ret;
-
-  memset (gcert, 0, sizeof (gnutls_cert));
-  gcert->cert_type = MHD_GNUTLS_CRT_OPENPGP;
-
-
-  ret = gnutls_openpgp_crt_export (cert, GNUTLS_OPENPGP_FMT_RAW,
-                                   NULL, &der_size);
-  if (ret != GNUTLS_E_SHORT_MEMORY_BUFFER)
-    {
-      gnutls_assert ();
-      return ret;
-    }
-
-  der = gnutls_malloc (der_size);
-  if (der == NULL)
-    {
-      gnutls_assert ();
-      return GNUTLS_E_MEMORY_ERROR;
-    }
-
-  ret = gnutls_openpgp_crt_export (cert, GNUTLS_OPENPGP_FMT_RAW,
-                                   der, &der_size);
-  if (ret < 0)
-    {
-      gnutls_assert ();
-      gnutls_free (der);
-      return ret;
-    }
-
-  raw.data = der;
-  raw.size = der_size;
-
-  ret = _gnutls_openpgp_raw_key_to_gcert (gcert, &raw);
-  if (ret < 0)
-    {
-      gnutls_assert ();
-      gnutls_free (der);
-      return ret;
-    }
-
-  gnutls_free (der);
-
-  return 0;
-
-}
-
-
-/**
- * gnutls_openpgp_privkey_sign_hash - This function will sign the given data using the private key params
- * @key: Holds the key
- * @hash: holds the data to be signed
- * @signature: will contain newly allocated signature
- *
- * This function will sign the given hash using the private key.
- *
- * Return value: In case of failure a negative value will be returned,
- * and 0 on success.
- **/
-int
-gnutls_openpgp_privkey_sign_hash (gnutls_openpgp_privkey_t key,
-                                  const gnutls_datum_t * hash,
-                                  gnutls_datum_t * signature)
-{
-  int result;
-
-  if (key == NULL)
-    {
-      gnutls_assert ();
-      return GNUTLS_E_INVALID_REQUEST;
-    }
-
-  result = mhd_gtls_sign (key->pkey.pk_algorithm, key->pkey.params,
-                         key->pkey.params_size, hash, signature);
-  if (result < 0)
-    {
-      gnutls_assert ();
-      return result;
-    }
-
-  return 0;
-}

+ 0 - 98
src/daemon/https/openpgp/gnutls_openpgp.h

@@ -1,98 +0,0 @@
-#include <config.h>
-
-#if ENABLE_OPENPGP
-
-#ifndef GNUTLS_OPENPGP_H
-#define GNUTLS_OPENPGP_H
-
-#include <auth_cert.h>
-#include <opencdk.h>
-
-typedef struct
-  {
-    int type;
-    size_t size;
-    uint8_t *data;
-  }keybox_blob;
-
-typedef enum
-  {
-    KBX_BLOB_FILE = 0x00,
-    KBX_BLOB_DATA = 0x01
-  }keyring_blob_types;
-
-/* OpenCDK compatible */
-typedef enum
-  {
-    KEY_ATTR_NONE = 0,
-    KEY_ATTR_SHORT_KEYID = 3,
-    KEY_ATTR_KEYID = 4,
-    KEY_ATTR_FPR = 5
-  }key_attr_t;
-
-int
-gnutls_certificate_set_openpgp_key_file (mhd_gtls_cert_credentials_t
-    res, const char *CERTFILE,
-    const char *KEYFILE, gnutls_openpgp_crt_fmt_t);
-
-int gnutls_openpgp_count_key_names (const gnutls_datum_t * cert);
-
-int gnutls_certificate_set_openpgp_keyring_file
-(mhd_gtls_cert_credentials_t c, const char *file, gnutls_openpgp_crt_fmt_t);
-
-int
-gnutls_certificate_set_openpgp_keyring_mem (mhd_gtls_cert_credentials_t
-    c, const opaque * data,
-    size_t dlen, gnutls_openpgp_crt_fmt_t);
-
-int gnutls_openpgp_get_key (gnutls_datum_t * key,
-    gnutls_openpgp_keyring_t keyring,
-    key_attr_t by, opaque * pattern);
-
-int gnutls_openpgp_recv_key (const char *host,
-    short port, uint32_t keyid,
-    gnutls_datum_t * key);
-
-/* internal */
-int _gnutls_openpgp_raw_key_to_gcert (gnutls_cert * cert,
-    const gnutls_datum_t * raw);
-
-extern int
-_gnutls_openpgp_raw_privkey_to_gkey (gnutls_privkey * pkey,
-    const gnutls_datum_t * raw_key,
-    gnutls_openpgp_crt_fmt_t format);
-
-int
-_gnutls_openpgp_request_key (mhd_gtls_session_t,
-    gnutls_datum_t * ret,
-    const mhd_gtls_cert_credentials_t cred,
-    opaque * key_fpr, int key_fpr_size);
-
-int _gnutls_openpgp_verify_key (const mhd_gtls_cert_credentials_t,
-    const gnutls_datum_t * cert_list,
-    int cert_list_length, unsigned int *status);
-int _gnutls_openpgp_fingerprint (const gnutls_datum_t * cert,
-    unsigned char *fpr, size_t * fprlen);
-time_t _gnutls_openpgp_get_raw_key_creation_time (const gnutls_datum_t *
-    cert);
-time_t _gnutls_openpgp_get_raw_key_expiration_time (const gnutls_datum_t *
-    cert);
-
-int
-gnutls_openpgp_privkey_init (gnutls_openpgp_privkey_t * key);
-
-int
-gnutls_openpgp_privkey_init (gnutls_openpgp_privkey_t * key);
-
-void
-gnutls_openpgp_privkey_deinit (gnutls_openpgp_privkey_t key);
-
-int
-gnutls_openpgp_privkey_import (gnutls_openpgp_privkey_t key,
-    const gnutls_datum_t * data,
-    gnutls_openpgp_crt_fmt_t format,
-    const char *pass, unsigned int flags);
-
-#endif /*GNUTLS_OPENPGP_H */
-
-#endif /*ENABLE_OPENPGP */

+ 0 - 182
src/daemon/https/openpgp/openpgp.h

@@ -1,182 +0,0 @@
-#ifndef OPENPGP_H
-#define OPENPGP_H
-
-#include "config.h"
-
-#if ENABLE_OPENPGP
-
-#ifdef __cplusplus
-extern "C"
-  {
-#endif
-
-#include <gnutls.h>
-#include "opencdk.h"
-#include <gnutls_cert.h>
-
-/* Internal context to store the OpenPGP key. */
-typedef struct gnutls_openpgp_crt_int
-  {
-    cdk_kbnode_t knode;
-  } gnutls_openpgp_crt_int;
-
-/* Internal context to store the private OpenPGP key. */
-typedef struct gnutls_openpgp_privkey_int
-  {
-    gnutls_privkey pkey;
-  } gnutls_openpgp_privkey_int;
-
-typedef struct gnutls_openpgp_keyring_int
-  {
-    cdk_keydb_hd_t db;
-    cdk_stream_t db_stream;
-  } gnutls_openpgp_keyring_int;
-
-typedef struct gnutls_openpgp_keyring_int * gnutls_openpgp_keyring_t;
-/* gnutls_openpgp_cert_t should be defined in gnutls.h */
-
-/* initializes the memory for gnutls_openpgp_crt_t struct */
-int gnutls_openpgp_crt_init(gnutls_openpgp_crt_t * key);
-/* frees all memory */
-void gnutls_openpgp_crt_deinit(gnutls_openpgp_crt_t key);
-
-int gnutls_openpgp_crt_import(gnutls_openpgp_crt_t key,
-                              const gnutls_datum_t * data,
-                              gnutls_openpgp_crt_fmt_t format);
-int gnutls_openpgp_crt_export(gnutls_openpgp_crt_t key,
-                              gnutls_openpgp_crt_fmt_t format,
-                              void *output_data,
-                              size_t * output_data_size);
-
-/* The key_usage flags are defined in gnutls.h. They are
- * the GNUTLS_KEY_* definitions.
- */
-int gnutls_openpgp_crt_get_key_usage(gnutls_openpgp_crt_t cert,
-                                     unsigned int *key_usage);
-int gnutls_openpgp_crt_get_fingerprint(gnutls_openpgp_crt_t key,
-                                       void *fpr,
-                                       size_t * fprlen);
-
-int gnutls_openpgp_crt_get_name(gnutls_openpgp_crt_t key,
-                                int idx,
-                                char *buf,
-                                size_t * sizeof_buf);
-
-gnutls_pk_algorithm_t
-    gnutls_openpgp_crt_get_pk_algorithm(gnutls_openpgp_crt_t key,
-                                        unsigned int *bits);
-
-int gnutls_openpgp_crt_get_version(gnutls_openpgp_crt_t key);
-
-time_t gnutls_openpgp_crt_get_creation_time(gnutls_openpgp_crt_t key);
-time_t gnutls_openpgp_crt_get_expiration_time(gnutls_openpgp_crt_t key);
-
-int gnutls_openpgp_crt_get_id(gnutls_openpgp_crt_t key,
-                              unsigned char keyid[8]);
-
-int gnutls_openpgp_crt_check_hostname(gnutls_openpgp_crt_t key,
-                                      const char *hostname);
-
-/* privkey stuff.  */
-int gnutls_openpgp_privkey_init(gnutls_openpgp_privkey_t * key);
-void gnutls_openpgp_privkey_deinit(gnutls_openpgp_privkey_t key);
-gnutls_pk_algorithm_t
-    gnutls_openpgp_privkey_get_pk_algorithm(gnutls_openpgp_privkey_t key,
-                                            unsigned int *bits);
-int gnutls_openpgp_privkey_import(gnutls_openpgp_privkey_t key,
-                                  const gnutls_datum_t * data,
-                                  gnutls_openpgp_crt_fmt_t format,
-                                  const char *pass,
-                                  unsigned int flags);
-int gnutls_openpgp_privkey_sign_hash(gnutls_openpgp_privkey_t key,
-                                     const gnutls_datum_t * hash,
-                                     gnutls_datum_t * signature);
-
-/* Keyring stuff. */
-
-int gnutls_openpgp_keyring_init(gnutls_openpgp_keyring_t * keyring);
-void gnutls_openpgp_keyring_deinit(gnutls_openpgp_keyring_t keyring);
-
-int gnutls_openpgp_keyring_import(gnutls_openpgp_keyring_t keyring,
-                                  const gnutls_datum_t * data,
-                                  gnutls_openpgp_crt_fmt_t format);
-
-int gnutls_openpgp_keyring_check_id(gnutls_openpgp_keyring_t ring,
-                                    const unsigned char keyid[8],
-                                    unsigned int flags);
-
-int gnutls_openpgp_crt_verify_ring(gnutls_openpgp_crt_t key,
-                                   gnutls_openpgp_keyring_t keyring,
-                                   unsigned int flags,
-                                   unsigned int *verify
-/* the output of the verification */);
-
-int gnutls_openpgp_crt_verify_self(gnutls_openpgp_crt_t key,
-                                   unsigned int flags,
-                                   unsigned int *verify);
-
-/* certificate authentication stuff.
- */
-int gnutls_certificate_set_openpgp_key(mhd_gtls_cert_credentials_t
-                                       res,
-                                       gnutls_openpgp_crt_t key,
-                                       gnutls_openpgp_privkey_t pkey);
-
-#ifdef __cplusplus
-}
-#endif
-
-int _gnutls_map_cdk_rc(int rc);
-int gnutls_openpgp_crt_get_name(gnutls_openpgp_crt_t key,
-                                int idx,
-                                char *buf,
-                                size_t * sizeof_buf);
-int gnutls_openpgp_crt_get_fingerprint(gnutls_openpgp_crt_t key,
-                                       void *fpr,
-                                       size_t * fprlen);
-gnutls_pk_algorithm_t
-    gnutls_openpgp_crt_get_pk_algorithm(gnutls_openpgp_crt_t key,
-                                        unsigned int *bits);
-int gnutls_openpgp_crt_get_version(gnutls_openpgp_crt_t key);
-time_t gnutls_openpgp_crt_get_creation_time(gnutls_openpgp_crt_t key);
-time_t gnutls_openpgp_crt_get_expiration_time(gnutls_openpgp_crt_t key);
-int gnutls_openpgp_crt_get_id(gnutls_openpgp_crt_t key,
-                              unsigned char keyid[8]);
-
-int gnutls_openpgp_crt_init(gnutls_openpgp_crt_t * key);
-void gnutls_openpgp_crt_deinit(gnutls_openpgp_crt_t key);
-int gnutls_openpgp_crt_import(gnutls_openpgp_crt_t key,
-                              const gnutls_datum_t * data,
-                              gnutls_openpgp_crt_fmt_t format);
-int gnutls_openpgp_crt_export(gnutls_openpgp_crt_t key,
-                              gnutls_openpgp_crt_fmt_t format,
-                              void *output_data,
-                              size_t * output_data_size);
-
-void gnutls_openpgp_keyring_deinit(gnutls_openpgp_keyring_t keyring);
-int gnutls_openpgp_keyring_init(gnutls_openpgp_keyring_t * keyring);
-int gnutls_openpgp_keyring_import(gnutls_openpgp_keyring_t keyring,
-                                  const gnutls_datum_t * data,
-                                  gnutls_openpgp_crt_fmt_t format);
-int gnutls_openpgp_keyring_check_id(gnutls_openpgp_keyring_t ring,
-                                    const unsigned char keyid[8],
-                                    unsigned int flags);
-
-int gnutls_openpgp_crt_verify_ring(gnutls_openpgp_crt_t key,
-                                   gnutls_openpgp_keyring_t keyring,
-                                   unsigned int flags,
-                                   unsigned int *verify);
-
-int gnutls_openpgp_crt_verify_self(gnutls_openpgp_crt_t key,
-                                   unsigned int flags,
-                                   unsigned int *verify);
-
-int _gnutls_openpgp_crt_to_gcert(gnutls_cert * gcert,
-                                 gnutls_openpgp_crt_t cert);
-int _gnutls_openpgp_privkey_to_gkey(gnutls_privkey * dest,
-                                    gnutls_openpgp_privkey_t src);
-
-void gnutls_openpgp_privkey_deinit(gnutls_openpgp_privkey_t key);
-
-#endif /* ENABLE_OPENPGP */
-#endif /* OPENPGP_H */

+ 0 - 543
src/daemon/https/openpgp/pgp.c

@@ -1,543 +0,0 @@
-/*
- * Copyright (C) 2002, 2003, 2004, 2005, 2006, 2007, 2008 Free Software Foundation
- *
- * Author: Timo Schulz, Nikos Mavrogiannopoulos
- *
- * This file is part of GNUTLS-EXTRA.
- *
- * GNUTLS-EXTRA is free software: you can redistribute it and/or modify
- * it under the terms of the GNU General Public License as published by
- * the Free Software Foundation, either version 3 of the License, or
- * (at your option) any later version.
- *               
- * GNUTLS-EXTRA is distributed in the hope that it will be useful,
- * but WITHOUT ANY WARRANTY; without even the implied warranty of
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
- * GNU General Public License for more details.
- *                               
- * You should have received a copy of the GNU General Public License
- * along with this program.  If not, see <http://www.gnu.org/licenses/>.
- */
-
-/* Functions on OpenPGP key parsing
- */
-
-#include <gnutls_int.h>
-#include <gnutls_datum.h>
-#include <gnutls_global.h>
-#include <gnutls_errors.h>
-#include "openpgp.h"
-/* x509 */
-#include <rfc2818.h>
-
-/**
- * gnutls_openpgp_crt_init - This function initializes a gnutls_openpgp_crt_t structure
- * @key: The structure to be initialized
- *
- * This function will initialize an OpenPGP key structure. 
- *
- * Returns 0 on success.
- *
- **/
-int
-gnutls_openpgp_crt_init (gnutls_openpgp_crt_t * key)
-{
-  *key = gnutls_calloc (1, sizeof (gnutls_openpgp_crt_int));
-
-  if (*key)
-    return 0;                   /* success */
-  return GNUTLS_E_MEMORY_ERROR;
-}
-
-/**
- * gnutls_openpgp_crt_deinit - This function deinitializes memory used by a gnutls_openpgp_crt_t structure
- * @key: The structure to be initialized
- *
- * This function will deinitialize a key structure. 
- **/
-void
-gnutls_openpgp_crt_deinit (gnutls_openpgp_crt_t key)
-{
-  if (!key)
-    return;
-
-  if (key->knode)
-    {
-      cdk_kbnode_release (key->knode);
-      key->knode = NULL;
-    }
-
-  gnutls_free (key);
-}
-
-/**
- * gnutls_openpgp_crt_import - This function will import a RAW or BASE64 encoded key
- * @key: The structure to store the parsed key.
- * @data: The RAW or BASE64 encoded key.
- * @format: One of gnutls_openpgp_crt_fmt_t elements.
- *
- * This function will convert the given RAW or Base64 encoded key
- * to the native gnutls_openpgp_crt_t format. The output will be stored in 'key'.
- *
- * Returns 0 on success.
- **/
-int
-gnutls_openpgp_crt_import (gnutls_openpgp_crt_t key,
-                           const gnutls_datum_t * data,
-                           gnutls_openpgp_crt_fmt_t format)
-{
-  cdk_stream_t inp;
-  int rc;
-
-  if (format == GNUTLS_OPENPGP_FMT_RAW)
-    rc = cdk_kbnode_read_from_mem (&key->knode, data->data, data->size);
-  else
-    {
-      rc = cdk_stream_tmp_from_mem (data->data, data->size, &inp);
-      if (rc)
-        {
-          rc = _gnutls_map_cdk_rc (rc);
-          gnutls_assert ();
-          return rc;
-        }
-      if (cdk_armor_filter_use (inp))
-        rc = cdk_stream_set_armor_flag (inp, 0);
-      if (!rc)
-        rc = cdk_keydb_get_keyblock (inp, &key->knode);
-      cdk_stream_close (inp);
-      if (rc)
-        {
-          rc = _gnutls_map_cdk_rc (rc);
-          gnutls_assert ();
-          return rc;
-        }
-    }
-
-  return 0;
-}
-
-/**
- * gnutls_openpgp_crt_export - This function will export a RAW or BASE64 encoded key
- * @key: Holds the key.
- * @format: One of gnutls_openpgp_crt_fmt_t elements.
- * @output_data: will contain the key base64 encoded or raw
- * @output_data_size: holds the size of output_data (and will be replaced by the actual size of parameters)
- *
- * This function will convert the given key to RAW or Base64 format.
- * If the buffer provided is not long enough to hold the output, then
- * GNUTLS_E_SHORT_MEMORY_BUFFER will be returned.
- *
- * Returns 0 on success.
- *
- **/
-int
-gnutls_openpgp_crt_export (gnutls_openpgp_crt_t key,
-                           gnutls_openpgp_crt_fmt_t format,
-                           void *output_data, size_t * output_data_size)
-{
-  size_t input_data_size = *output_data_size;
-  size_t calc_size;
-  int rc;
-
-  rc = cdk_kbnode_write_to_mem (key->knode, output_data, output_data_size);
-  if (rc)
-    {
-      rc = _gnutls_map_cdk_rc (rc);
-      gnutls_assert ();
-      return rc;
-    }
-
-  /* FIXME: The first call of this function is with output_data == NULL
-     to figure out the size and the caller expects this error here. */
-  if (!output_data)
-    return GNUTLS_E_SHORT_MEMORY_BUFFER;
-
-  if (format == GNUTLS_OPENPGP_FMT_BASE64)
-    {
-      unsigned char *in = cdk_calloc (1, *output_data_size);
-      memcpy (in, output_data, *output_data_size);
-
-      /* Calculate the size of the encoded data and check if the provided
-         buffer is large enough. */
-      rc = cdk_armor_encode_buffer (in, input_data_size,
-                                    NULL, 0, &calc_size, CDK_ARMOR_PUBKEY);
-      if (rc || calc_size > input_data_size)
-        {
-          cdk_free (in);
-          *output_data_size = calc_size;
-          rc = _gnutls_map_cdk_rc (CDK_Too_Short);
-          gnutls_assert ();
-          return rc;
-        }
-
-      rc = cdk_armor_encode_buffer (in, input_data_size, output_data,
-                                    input_data_size, &calc_size,
-                                    CDK_ARMOR_PUBKEY);
-      cdk_free (in);
-      *output_data_size = calc_size;
-    }
-
-  return 0;
-}
-
-/**
- * gnutls_openpgp_crt_get_fingerprint - Gets the fingerprint
- * @key: the raw data that contains the OpenPGP public key.
- * @fpr: the buffer to save the fingerprint, must hold at least 20 bytes.
- * @fprlen: the integer to save the length of the fingerprint.
- *
- * Returns the fingerprint of the OpenPGP key. Depends on the algorithm,
- * the fingerprint can be 16 or 20 bytes.
- **/
-int
-gnutls_openpgp_crt_get_fingerprint (gnutls_openpgp_crt_t key,
-                                    void *fpr, size_t * fprlen)
-{
-  cdk_packet_t pkt;
-  cdk_pkt_pubkey_t pk = NULL;
-
-  if (!fpr || !fprlen)
-    {
-      gnutls_assert ();
-      return GNUTLS_E_INVALID_REQUEST;
-    }
-
-  *fprlen = 0;
-
-  pkt = cdk_kbnode_find_packet (key->knode, CDK_PKT_PUBLIC_KEY);
-  if (!pkt)
-    return GNUTLS_E_OPENPGP_GETKEY_FAILED;
-
-  pk = pkt->pkt.public_key;
-  *fprlen = 20;
-
-  /* FIXME: Check if the draft allows old PGP keys. */
-  if (is_RSA (pk->pubkey_algo) && pk->version < 4)
-    *fprlen = 16;
-  cdk_pk_get_fingerprint (pk, fpr);
-
-  return 0;
-}
-
-int
-_gnutls_openpgp_count_key_names (gnutls_openpgp_crt_t key)
-{
-  cdk_kbnode_t p, ctx;
-  cdk_packet_t pkt;
-  int nuids;
-
-  if (key == NULL)
-    {
-      gnutls_assert ();
-      return 0;
-    }
-
-  ctx = NULL;
-  nuids = 0;
-  while ((p = cdk_kbnode_walk (key->knode, &ctx, 0)))
-    {
-      pkt = cdk_kbnode_get_packet (p);
-      if (pkt->pkttype == CDK_PKT_USER_ID)
-        nuids++;
-    }
-
-  return nuids;
-}
-
-/**
- * gnutls_openpgp_crt_get_name - Extracts the userID
- * @key: the structure that contains the OpenPGP public key.
- * @idx: the index of the ID to extract
- * @buf: a pointer to a structure to hold the name
- * @sizeof_buf: holds the maximum size of @buf, on return hold the
- *   actual/required size of @buf.
- *
- * Extracts the userID from the parsed OpenPGP key.
- *
- * Returns 0 on success, and GNUTLS_E_REQUESTED_DATA_NOT_AVAILABLE
- * if the index of the ID does not exist.
- *
- **/
-int
-gnutls_openpgp_crt_get_name (gnutls_openpgp_crt_t key,
-                             int idx, char *buf, size_t * sizeof_buf)
-{
-  cdk_kbnode_t ctx = NULL, p;
-  cdk_packet_t pkt = NULL;
-  cdk_pkt_userid_t uid = NULL;
-  int pos = 0;
-
-  if (!key || !buf)
-    {
-      gnutls_assert ();
-      return GNUTLS_E_INVALID_REQUEST;
-    }
-
-  if (idx < 0 || idx > _gnutls_openpgp_count_key_names (key))
-    return GNUTLS_E_REQUESTED_DATA_NOT_AVAILABLE;
-
-  if (!idx)
-    pkt = cdk_kbnode_find_packet (key->knode, CDK_PKT_USER_ID);
-  else
-    {
-      pos = 0;
-      while ((p = cdk_kbnode_walk (key->knode, &ctx, 0)))
-        {
-          pkt = cdk_kbnode_get_packet (p);
-          if (pkt->pkttype == CDK_PKT_USER_ID && ++pos == idx)
-            break;
-        }
-    }
-
-  if (!pkt)
-    {
-      gnutls_assert ();
-      return GNUTLS_E_INTERNAL_ERROR;
-    }
-
-  uid = pkt->pkt.user_id;
-  if (uid->len >= *sizeof_buf)
-    {
-      gnutls_assert ();
-      *sizeof_buf = uid->len + 1;
-      return GNUTLS_E_SHORT_MEMORY_BUFFER;
-    }
-
-  memcpy (buf, uid->name, uid->len);
-  buf[uid->len] = '\0';         /* make sure it's a string */
-  *sizeof_buf = uid->len + 1;
-
-  if (uid->is_revoked)
-    return GNUTLS_E_OPENPGP_UID_REVOKED;
-
-  return 0;
-}
-
-/**
- * gnutls_openpgp_crt_get_pk_algorithm - This function returns the key's PublicKey algorithm
- * @key: is an OpenPGP key
- * @bits: if bits is non null it will hold the size of the parameters' in bits
- *
- * This function will return the public key algorithm of an OpenPGP
- * certificate.
- *
- * If bits is non null, it should have enough size to hold the parameters
- * size in bits. For RSA the bits returned is the modulus. 
- * For DSA the bits returned are of the public exponent.
- *
- * Returns a member of the GNUTLS_PKAlgorithm enumeration on success,
- * or a negative value on error.
- *
- **/
-gnutls_pk_algorithm_t
-gnutls_openpgp_crt_get_pk_algorithm (gnutls_openpgp_crt_t key,
-                                     unsigned int *bits)
-{
-  cdk_packet_t pkt;
-  int algo;
-
-  if (!key)
-    return MHD_GNUTLS_PK_UNKNOWN;
-
-  algo = 0;
-  pkt = cdk_kbnode_find_packet (key->knode, CDK_PKT_PUBLIC_KEY);
-  if (pkt && pkt->pkttype == CDK_PKT_PUBLIC_KEY)
-    {
-      if (bits)
-        *bits = cdk_pk_get_nbits (pkt->pkt.public_key);
-      algo = pkt->pkt.public_key->pubkey_algo;
-      if (is_RSA (algo))
-        algo = MHD_GNUTLS_PK_RSA;
-      else
-        algo = GNUTLS_E_UNKNOWN_PK_ALGORITHM;
-    }
-
-  return algo;
-}
-
-/**
- * gnutls_openpgp_crt_get_version - Extracts the version of the key.
- * @key: the structure that contains the OpenPGP public key.
- *
- * Extract the version of the OpenPGP key.
- **/
-int
-gnutls_openpgp_crt_get_version (gnutls_openpgp_crt_t key)
-{
-  cdk_packet_t pkt;
-  int version;
-
-  if (!key)
-    return -1;
-
-  pkt = cdk_kbnode_find_packet (key->knode, CDK_PKT_PUBLIC_KEY);
-  if (pkt)
-    version = pkt->pkt.public_key->version;
-  else
-    version = 0;
-
-  return version;
-}
-
-/**
- * gnutls_openpgp_crt_get_creation_time - Extract the timestamp
- * @key: the structure that contains the OpenPGP public key.
- *
- * Returns the timestamp when the OpenPGP key was created.
- **/
-time_t
-gnutls_openpgp_crt_get_creation_time (gnutls_openpgp_crt_t key)
-{
-  cdk_packet_t pkt;
-  time_t timestamp;
-
-  if (!key)
-    return (time_t) - 1;
-
-  pkt = cdk_kbnode_find_packet (key->knode, CDK_PKT_PUBLIC_KEY);
-  if (pkt)
-    timestamp = pkt->pkt.public_key->timestamp;
-  else
-    timestamp = 0;
-
-  return timestamp;
-}
-
-/**
- * gnutls_openpgp_crt_get_expiration_time - Extract the expire date
- * @key: the structure that contains the OpenPGP public key.
- *
- * Returns the time when the OpenPGP key expires. A value of '0' means
- * that the key doesn't expire at all.
- **/
-time_t
-gnutls_openpgp_crt_get_expiration_time (gnutls_openpgp_crt_t key)
-{
-  cdk_packet_t pkt;
-  time_t expiredate;
-
-  if (!key)
-    return (time_t) - 1;
-
-  pkt = cdk_kbnode_find_packet (key->knode, CDK_PKT_PUBLIC_KEY);
-  if (pkt)
-    expiredate = pkt->pkt.public_key->expiredate;
-  else
-    expiredate = 0;
-
-  return expiredate;
-}
-
-/**
- * gnutls_openpgp_crt_get_id - Gets the keyID
- * @key: the structure that contains the OpenPGP public key.
- * @keyid: the buffer to save the keyid.
- *
- * Returns the 64-bit keyID of the OpenPGP key.
- **/
-int
-gnutls_openpgp_crt_get_id (gnutls_openpgp_crt_t key, unsigned char keyid[8])
-{
-  cdk_packet_t pkt;
-  uint32_t kid[2];
-
-  if (!key || !keyid)
-    {
-      gnutls_assert ();
-      return GNUTLS_E_INVALID_REQUEST;
-    }
-
-  pkt = cdk_kbnode_find_packet (key->knode, CDK_PKT_PUBLIC_KEY);
-  if (!pkt)
-    return GNUTLS_E_OPENPGP_GETKEY_FAILED;
-
-  cdk_pk_get_keyid (pkt->pkt.public_key, kid);
-  keyid[0] = kid[0] >> 24;
-  keyid[1] = kid[0] >> 16;
-  keyid[2] = kid[0] >> 8;
-  keyid[3] = kid[0];
-  keyid[4] = kid[1] >> 24;
-  keyid[5] = kid[1] >> 16;
-  keyid[6] = kid[1] >> 8;
-  keyid[7] = kid[1];
-
-  return 0;
-}
-
-/**
- * gnutls_openpgp_crt_check_hostname - This function compares the given hostname with the hostname in the key
- * @key: should contain an gnutls_openpgp_crt_t structure
- * @hostname: A null terminated string that contains a DNS name
- *
- * This function will check if the given key's owner matches
- * the given hostname. This is a basic implementation of the matching 
- * described in RFC2818 (HTTPS), which takes into account wildcards.
- *
- * Returns non zero on success, and zero on failure.
- *
- **/
-int
-gnutls_openpgp_crt_check_hostname (gnutls_openpgp_crt_t key,
-                                   const char *hostname)
-{
-  char dnsname[MAX_CN];
-  size_t dnsnamesize;
-  int ret;
-  int i;
-
-  /* Check through all included names. */
-  for (i = 0; !(ret < 0); i++)
-    {
-      dnsnamesize = sizeof (dnsname);
-      ret = gnutls_openpgp_crt_get_name (key, i, dnsname, &dnsnamesize);
-      /* FIXME: ret is not used */
-      if (_gnutls_hostname_compare (dnsname, hostname))
-        return 1;
-    }
-
-  /* not found a matching name */
-  return 0;
-}
-
-/**
- * gnutls_openpgp_crt_get_key_usage - This function returns the key's usage
- * @key: should contain a gnutls_openpgp_crt_t structure
- * @key_usage: where the key usage bits will be stored
- *
- * This function will return certificate's key usage, by checking the
- * key algorithm. The key usage value will ORed values of the:
- * GNUTLS_KEY_DIGITAL_SIGNATURE, GNUTLS_KEY_KEY_ENCIPHERMENT.
- *
- * A negative value may be returned in case of parsing error.
- *
- */
-int
-gnutls_openpgp_crt_get_key_usage (gnutls_openpgp_crt_t key,
-                                  unsigned int *key_usage)
-{
-  cdk_packet_t pkt;
-  int algo = 0;
-
-  if (!key)
-    return GNUTLS_E_INVALID_REQUEST;
-
-  *key_usage = 0;
-
-  pkt = cdk_kbnode_find_packet (key->knode, CDK_PKT_PUBLIC_KEY);
-  if (pkt && pkt->pkttype == CDK_PKT_PUBLIC_KEY)
-    {
-      algo = pkt->pkt.public_key->pubkey_algo;
-
-      /* FIXME: We need to take a look at the key flags because
-         RSA-E and RSA-S are obsolete. Only RSA is used
-         and the flags are used to set the capabilities. */
-      if (is_DSA (algo) || algo == GCRY_PK_RSA_S)
-        *key_usage |= KEY_DIGITAL_SIGNATURE;
-      else if (algo == GCRY_PK_RSA_E)
-        *key_usage |= KEY_KEY_ENCIPHERMENT;
-      else if (algo == GCRY_PK_RSA)
-        *key_usage |= KEY_DIGITAL_SIGNATURE | KEY_KEY_ENCIPHERMENT;
-    }
-
-  return 0;
-}

+ 0 - 134
src/daemon/https/openpgp/pgp_privkey.c

@@ -1,134 +0,0 @@
-/*
- * Copyright (C) 2003, 2004, 2005, 2006, 2007 Free Software Foundation
- *
- * Author: Nikos Mavrogiannopoulos
- *
- * This file is part of GNUTLS-EXTRA.
- *
- * GNUTLS-EXTRA is free software: you can redistribute it and/or modify
- * it under the terms of the GNU General Public License as published by
- * the Free Software Foundation, either version 3 of the License, or
- * (at your option) any later version.
- *               
- * GNUTLS-EXTRA is distributed in the hope that it will be useful,
- * but WITHOUT ANY WARRANTY; without even the implied warranty of
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
- * GNU General Public License for more details.
- *                               
- * You should have received a copy of the GNU General Public License
- * along with this program.  If not, see <http://www.gnu.org/licenses/>.
- */
-
-/* Functions on OpenPGP privkey parsing
- */
-
-#include <gnutls_int.h>
-#include <gnutls_datum.h>
-#include <gnutls_global.h>
-#include <gnutls_errors.h>
-#include "openpgp.h"
-#include <gnutls_openpgp.h>
-#include <gnutls_cert.h>
-/* x509 */
-#include <rfc2818.h>
-
-/**
- * gnutls_openpgp_privkey_init - This function initializes a gnutls_openpgp_privkey_t structure
- * @key: The structure to be initialized
- *
- * This function will initialize an OpenPGP key structure. 
- *
- * Returns 0 on success.
- *
- **/
-int
-gnutls_openpgp_privkey_init (gnutls_openpgp_privkey_t * key)
-{
-  *key = gnutls_calloc (1, sizeof (gnutls_openpgp_privkey_int));
-
-  if (*key)
-    return 0;                   /* success */
-  return GNUTLS_E_MEMORY_ERROR;
-}
-
-/**
- * gnutls_openpgp_privkey_deinit - This function deinitializes memory used by a gnutls_openpgp_privkey_t structure
- * @key: The structure to be initialized
- *
- * This function will deinitialize a key structure. 
- *
- **/
-void
-gnutls_openpgp_privkey_deinit (gnutls_openpgp_privkey_t key)
-{
-  if (!key)
-    return;
-
-  mhd_gtls_gkey_deinit (&key->pkey);
-  gnutls_free (key);
-}
-
-/**
- * gnutls_openpgp_privkey_import - This function will import a RAW or BASE64 encoded key
- * @key: The structure to store the parsed key.
- * @data: The RAW or BASE64 encoded key.
- * @format: One of gnutls_openpgp_crt_fmt_t elements.
- * @pass: Unused for now
- * @flags: should be zero
- *
- * This function will convert the given RAW or Base64 encoded key
- * to the native gnutls_openpgp_privkey_t format. The output will be stored in 'key'.
- *
- * Returns 0 on success.
- *
- **/
-int
-gnutls_openpgp_privkey_import (gnutls_openpgp_privkey_t key,
-                               const gnutls_datum_t * data,
-                               gnutls_openpgp_crt_fmt_t format,
-                               const char *pass, unsigned int flags)
-{
-  int rc;
-
-  rc = _gnutls_openpgp_raw_privkey_to_gkey (&key->pkey, data, format);
-  if (rc)
-    {
-      gnutls_assert ();
-      return rc;
-    }
-
-  return 0;
-}
-
-
-/**
- * gnutls_openpgp_privkey_get_pk_algorithm - This function returns the key's PublicKey algorithm
- * @key: is an OpenPGP key
- * @bits: if bits is non null it will hold the size of the parameters' in bits
- *
- * This function will return the public key algorithm of an OpenPGP
- * certificate.
- *
- * If bits is non null, it should have enough size to hold the parameters
- * size in bits. For RSA the bits returned is the modulus. 
- * For DSA the bits returned are of the public exponent.
- *
- * Returns a member of the GNUTLS_PKAlgorithm enumeration on success,
- * or a negative value on error.
- *
- **/
-gnutls_pk_algorithm_t
-gnutls_openpgp_privkey_get_pk_algorithm (gnutls_openpgp_privkey_t key,
-                                         unsigned int *bits)
-{
-  int pk = key->pkey.pk_algorithm;
-
-  if (bits)
-    {
-      *bits = 0;
-      if (pk == MHD_GNUTLS_PK_RSA)
-        *bits = _gnutls_mpi_get_nbits (key->pkey.params[0]);
-    }
-
-  return pk;
-}

+ 0 - 144
src/daemon/https/openpgp/pgp_verify.c

@@ -1,144 +0,0 @@
-/*
- * Copyright (C) 2002, 2003, 2004, 2005, 2007 Free Software Foundation
- *
- * Author: Timo Schulz, Nikos Mavrogiannopoulos
- *
- * This file is part of GNUTLS-EXTRA.
- *
- * GNUTLS-EXTRA is free software: you can redistribute it and/or modify
- * it under the terms of the GNU General Public License as published by
- * the Free Software Foundation, either version 3 of the License, or
- * (at your option) any later version.
- *               
- * GNUTLS-EXTRA is distributed in the hope that it will be useful,
- * but WITHOUT ANY WARRANTY; without even the implied warranty of
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
- * GNU General Public License for more details.
- *                               
- * You should have received a copy of the GNU General Public License
- * along with this program.  If not, see <http://www.gnu.org/licenses/>.
- */
-
-/* Functions on OpenPGP key parsing
- */
-
-#include <gnutls_int.h>
-#include <gnutls_errors.h>
-#include <gnutls_openpgp.h>
-#include <gnutls_num.h>
-#include "openpgp.h"
-/* x509 */
-#include <verify.h>             /* lib/x509/verify.h */
-
-
-/**
- * gnutls_openpgp_crt_verify_ring - Verify all signatures in the key
- * @key: the structure that holds the key.
- * @keyring: holds the keyring to check against
- * @flags: unused (should be 0)
- * @verify: will hold the certificate verification output.
- *
- * Verify all signatures in the key, using the given set of keys (keyring). 
- *
- * The key verification output will be put in @verify and will be
- * one or more of the gnutls_certificate_status_t enumerated elements bitwise or'd.
- *
- * GNUTLS_CERT_INVALID: A signature on the key is invalid.
- *
- * GNUTLS_CERT_REVOKED: The key has been revoked.
- *
- * Note that this function does not verify using any "web of
- * trust". You may use GnuPG for that purpose, or any other external
- * PGP application.
- *
- * Returns 0 on success.
- **/
-int
-gnutls_openpgp_crt_verify_ring (gnutls_openpgp_crt_t key,
-                                gnutls_openpgp_keyring_t keyring,
-                                unsigned int flags, unsigned int *verify)
-{
-  opaque id[8];
-  cdk_error_t rc;
-  int status;
-
-  if (!key || !keyring)
-    {
-      gnutls_assert ();
-      return GNUTLS_E_NO_CERTIFICATE_FOUND;
-    }
-
-  *verify = 0;
-
-  rc = cdk_pk_check_sigs (key->knode, keyring->db, &status);
-  if (rc == CDK_Error_No_Key)
-    {
-      rc = GNUTLS_E_NO_CERTIFICATE_FOUND;
-      gnutls_assert ();
-      return rc;
-    }
-  else if (rc != CDK_Success)
-    {
-      _gnutls_x509_log ("cdk_pk_check_sigs: error %d\n", rc);
-      rc = _gnutls_map_cdk_rc (rc);
-      gnutls_assert ();
-      return rc;
-    }
-  _gnutls_x509_log ("status: %x\n", status);
-
-  if (status & CDK_KEY_INVALID)
-    *verify |= GNUTLS_CERT_INVALID;
-  if (status & CDK_KEY_REVOKED)
-    *verify |= GNUTLS_CERT_REVOKED;
-  if (status & CDK_KEY_NOSIGNER)
-    *verify |= GNUTLS_CERT_SIGNER_NOT_FOUND;
-
-  /* Check if the key is included in the ring. */
-  if (!(flags & GNUTLS_VERIFY_DO_NOT_ALLOW_SAME))
-    {
-      rc = gnutls_openpgp_crt_get_id (key, id);
-      if (rc < 0)
-        {
-          gnutls_assert ();
-          return rc;
-        }
-
-      rc = gnutls_openpgp_keyring_check_id (keyring, id, 0);
-      /* If it exists in the keyring don't treat it as unknown. */
-      if (rc == 0 && *verify & GNUTLS_CERT_SIGNER_NOT_FOUND)
-        *verify ^= GNUTLS_CERT_SIGNER_NOT_FOUND;
-    }
-
-  return 0;
-}
-
-
-/**
- * gnutls_openpgp_crt_verify_self - Verify the self signature on the key
- * @key: the structure that holds the key.
- * @flags: unused (should be 0)
- * @verify: will hold the key verification output.
- *
- * Verifies the self signature in the key.
- * The key verification output will be put in @verify and will be
- * one or more of the gnutls_certificate_status_t enumerated elements bitwise or'd.
- *
- * GNUTLS_CERT_INVALID: The self signature on the key is invalid.
- *
- * Returns 0 on success.
- **/
-int
-gnutls_openpgp_crt_verify_self (gnutls_openpgp_crt_t key,
-                                unsigned int flags, unsigned int *verify)
-{
-  int status;
-  cdk_error_t rc;
-
-  rc = cdk_pk_check_self_sig (key->knode, &status);
-  if (rc || status != CDK_KEY_VALID)
-    *verify |= GNUTLS_CERT_INVALID;
-  else
-    *verify = 0;
-
-  return 0;
-}