X-Git-Url: http://the.earth.li/gitweb/?a=blobdiff_plain;f=keyindex.c;h=f3c36aafbf3527408894357ce80c1c7f6ecc2bd0;hb=cab77e4ffc25ba4fb2e5289beaa47c7d915de942;hp=46e778c21b3822f6a48e7228e93a641461849843;hpb=e0dd4d10f385cd19da389ec66622eea8aa66ae59;p=onak.git diff --git a/keyindex.c b/keyindex.c index 46e778c..f3c36aa 100644 --- a/keyindex.c +++ b/keyindex.c @@ -36,6 +36,108 @@ #include "onak-conf.h" #include "openpgp.h" +/* + * Convert a Public Key algorithm to its single character representation. + */ +char pkalgo2char(uint8_t algo) +{ + char typech; + + switch (algo) { + case OPENPGP_PKALGO_DSA: + typech = 'D'; + break; + case OPENPGP_PKALGO_ECDSA: + typech = 'E'; + break; + case OPENPGP_PKALGO_EC: + typech = 'e'; + break; + case OPENPGP_PKALGO_ELGAMAL_SIGN: + typech = 'G'; + break; + case OPENPGP_PKALGO_ELGAMAL_ENC: + typech = 'g'; + break; + case OPENPGP_PKALGO_RSA: + typech = 'R'; + break; + case OPENPGP_PKALGO_RSA_ENC: + typech = 'r'; + break; + case OPENPGP_PKALGO_RSA_SIGN: + typech = 's'; + break; + default: + typech = '?'; + break; + } + + return typech; +} + +/* + * Given a public key/subkey packet return the key length. + */ +unsigned int keylength(struct openpgp_packet *keydata) +{ + unsigned int length; + + switch (keydata->data[0]) { + case 2: + case 3: + length = (keydata->data[8] << 8) + + keydata->data[9]; + break; + case 4: + switch (keydata->data[5]) { + case OPENPGP_PKALGO_EC: + case OPENPGP_PKALGO_ECDSA: + /* Elliptic curve key size is based on OID */ + if ((keydata->data[6] == 8) && + (keydata->data[7] == 0x2A) && + (keydata->data[8] == 0x86) && + (keydata->data[9] == 0x48) && + (keydata->data[10] == 0xCE) && + (keydata->data[11] == 0x3D) && + (keydata->data[12] == 0x03) && + (keydata->data[13] == 0x01) && + (keydata->data[14] == 0x07)) { + length = 256; + } else if ((keydata->data[6] == 5) && + (keydata->data[7] == 0x2B) && + (keydata->data[8] == 0x81) && + (keydata->data[9] == 0x04) && + (keydata->data[10] == 0x00) && + (keydata->data[11] == 0x22)) { + length = 384; + } else if ((keydata->data[6] == 5) && + (keydata->data[7] == 0x2B) && + (keydata->data[8] == 0x81) && + (keydata->data[9] == 0x04) && + (keydata->data[10] == 0x00) && + (keydata->data[11] == 0x23)) { + length = 521; + } else { + logthing(LOGTHING_ERROR, + "Unknown elliptic curve size"); + length = 0; + } + break; + default: + length = (keydata->data[6] << 8) + + keydata->data[7]; + } + break; + default: + logthing(LOGTHING_ERROR, "Unknown key version: %d", + keydata->data[0]); + length = 0; + } + + return length; +} + int list_sigs(struct openpgp_packet_list *sigs, bool html) { char *uid = NULL; @@ -143,19 +245,16 @@ int list_subkeys(struct openpgp_signedpacket_list *subkeys, bool verbose, case 2: case 3: type = subkeys->packet->data[7]; - length = (subkeys->packet->data[8] << 8) + - subkeys->packet->data[9]; break; case 4: type = subkeys->packet->data[5]; - length = (subkeys->packet->data[6] << 8) + - subkeys->packet->data[7]; break; default: logthing(LOGTHING_ERROR, "Unknown key type: %d", subkeys->packet->data[0]); } + length = keylength(subkeys->packet); if (get_packetid(subkeys->packet, &keyid) != ONAK_E_OK) { @@ -163,9 +262,7 @@ int list_subkeys(struct openpgp_signedpacket_list *subkeys, bool verbose, } printf("sub %5d%c/%08X %04d/%02d/%02d\n", length, - (type == OPENPGP_PKALGO_RSA) ? 'R' : - ((type == OPENPGP_PKALGO_ELGAMAL_ENC) ? 'g' : - ((type == OPENPGP_PKALGO_DSA) ? 'D' : '?')), + pkalgo2char(type), (uint32_t) (keyid & 0xFFFFFFFF), created->tm_year + 1900, created->tm_mon + 1, @@ -247,7 +344,6 @@ int key_index(struct openpgp_publickey *keys, bool verbose, bool fingerprint, struct tm *created = NULL; time_t created_time = 0; int type = 0; - char typech; int length = 0; char buf[1024]; uint64_t keyid; @@ -267,47 +363,26 @@ int key_index(struct openpgp_publickey *keys, bool verbose, bool fingerprint, case 2: case 3: type = keys->publickey->data[7]; - length = (keys->publickey->data[8] << 8) + - keys->publickey->data[9]; break; case 4: type = keys->publickey->data[5]; - length = (keys->publickey->data[6] << 8) + - keys->publickey->data[7]; break; default: logthing(LOGTHING_ERROR, "Unknown key type: %d", keys->publickey->data[0]); } - + length = keylength(keys->publickey); + if (get_keyid(keys, &keyid) != ONAK_E_OK) { logthing(LOGTHING_ERROR, "Couldn't get keyid."); } - switch (type) { - case OPENPGP_PKALGO_RSA: - typech = 'R'; - break; - case OPENPGP_PKALGO_ELGAMAL_ENC: - typech = 'g'; - break; - case OPENPGP_PKALGO_DSA: - typech = 'D'; - break; - case OPENPGP_PKALGO_ELGAMAL_SIGN: - typech = 'G'; - break; - default: - typech = '?'; - break; - } - if (html) { printf("pub %5d%c/%08" PRIX64 " %04d/%02d/%02d ", length, - typech, + pkalgo2char(type), keyid, keyid & 0xFFFFFFFF, created->tm_year + 1900, @@ -316,7 +391,7 @@ int key_index(struct openpgp_publickey *keys, bool verbose, bool fingerprint, } else { printf("pub %5d%c/%08" PRIX64 " %04d/%02d/%02d ", length, - typech, + pkalgo2char(type), keyid & 0xFFFFFFFF, created->tm_year + 1900, created->tm_mon + 1, @@ -406,8 +481,6 @@ int mrkey_index(struct openpgp_publickey *keys) } printf("%016" PRIX64, keyid); type = keys->publickey->data[7]; - length = (keys->publickey->data[8] << 8) + - keys->publickey->data[9]; break; case 4: (void) get_fingerprint(keys->publickey, fp, &fplength); @@ -417,13 +490,12 @@ int mrkey_index(struct openpgp_publickey *keys) } type = keys->publickey->data[5]; - length = (keys->publickey->data[6] << 8) + - keys->publickey->data[7]; break; default: logthing(LOGTHING_ERROR, "Unknown key type: %d", keys->publickey->data[0]); } + length = keylength(keys->publickey); printf(":%d:%d:%ld::%s\n", type,