]> the.earth.li Git - onak.git/blobdiff - keyindex.c
Fix compilation with later versions of Nettle
[onak.git] / keyindex.c
index bef41f42c41abcd1621834efd54c469b2acbed74..eeac56cac47d238c7c3c3e270a7178e535418095 100644 (file)
@@ -13,8 +13,7 @@
  * more details.
  *
  * You should have received a copy of the GNU General Public License along with
- * this program; if not, write to the Free Software Foundation, Inc., 51
- * Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
+ * this program.  If not, see <https://www.gnu.org/licenses/>.
  */
 
 #include <inttypes.h>
 
 #include "decodekey.h"
 #include "getcgi.h"
-#include "hash.h"
 #include "keydb.h"
 #include "keyid.h"
 #include "keyindex.h"
 #include "keystructs.h"
 #include "log.h"
 #include "onak.h"
-#include "onak-conf.h"
 #include "openpgp.h"
 
 /*
@@ -83,6 +80,8 @@ char pkalgo2char(uint8_t algo)
 unsigned int keylength(struct openpgp_packet *keydata)
 {
        unsigned int length;
+       uint8_t keyofs;
+       enum onak_oid oid;
 
        switch (keydata->data[0]) {
        case 2:
@@ -91,93 +90,33 @@ unsigned int keylength(struct openpgp_packet *keydata)
                                keydata->data[9];
                break;
        case 4:
+       case 5:
+               /* v5 has an additional 4 bytes of key length data */
+               keyofs = (keydata->data[0] == 4) ? 6 : 10;
                switch (keydata->data[5]) {
                case OPENPGP_PKALGO_EC:
                case OPENPGP_PKALGO_ECDSA:
                case OPENPGP_PKALGO_EDDSA:
                        /* Elliptic curve key size is based on OID */
-                       /* Ed25519 / 1.3.6.1.4.1.11591.15.1 */
-                       if ((keydata->data[6] == 9) &&
-                                       (keydata->data[7] == 0x2B) &&
-                                       (keydata->data[8] == 0x06) &&
-                                       (keydata->data[9] == 0x01) &&
-                                       (keydata->data[10] == 0x04) &&
-                                       (keydata->data[11] == 0x01) &&
-                                       (keydata->data[12] == 0xDA) &&
-                                       (keydata->data[13] == 0x47) &&
-                                       (keydata->data[14] == 0x0F) &&
-                                       (keydata->data[15] == 0x01)) {
+                       oid = onak_parse_oid(&keydata->data[keyofs],
+                                       keydata->length - keyofs);
+                       if (oid == ONAK_OID_CURVE25519) {
                                length = 255;
-                       /* nistp256 / 1.2.840.10045.3.1.7 */
-                       } else if ((keydata->data[6] == 8) &&
-                                       (keydata->data[7] == 0x2A) &&
-                                       (keydata->data[8] == 0x86) &&
-                                       (keydata->data[9] == 0x48) &&
-                                       (keydata->data[10] == 0xCE) &&
-                                       (keydata->data[11] == 0x3D) &&
-                                       (keydata->data[12] == 0x03) &&
-                                       (keydata->data[13] == 0x01) &&
-                                       (keydata->data[14] == 0x07)) {
+                       } else if (oid == ONAK_OID_ED25519) {
+                               length = 255;
+                       } else if (oid == ONAK_OID_NISTP256) {
                                length = 256;
-                       /* nistp384 / 1.3.132.0.34 */
-                       } else if ((keydata->data[6] == 5) &&
-                                       (keydata->data[7] == 0x2B) &&
-                                       (keydata->data[8] == 0x81) &&
-                                       (keydata->data[9] == 0x04) &&
-                                       (keydata->data[10] == 0x00) &&
-                                       (keydata->data[11] == 0x22)) {
+                       } else if (oid == ONAK_OID_NISTP384) {
                                length = 384;
-                       /* nistp521 / 1.3.132.0.35 */
-                       } else if ((keydata->data[6] == 5) &&
-                                       (keydata->data[7] == 0x2B) &&
-                                       (keydata->data[8] == 0x81) &&
-                                       (keydata->data[9] == 0x04) &&
-                                       (keydata->data[10] == 0x00) &&
-                                       (keydata->data[11] == 0x23)) {
+                       } else if (oid == ONAK_OID_NISTP521) {
                                length = 521;
-                       /* brainpoolP256r1 / 1.3.36.3.3.2.8.1.1.7 */
-                       } else if ((keydata->data[6] == 9) &&
-                                       (keydata->data[7] == 0x2B) &&
-                                       (keydata->data[8] == 0x24) &&
-                                       (keydata->data[9] == 0x03) &&
-                                       (keydata->data[10] == 0x03) &&
-                                       (keydata->data[11] == 0x02) &&
-                                       (keydata->data[12] == 0x08) &&
-                                       (keydata->data[13] == 0x01) &&
-                                       (keydata->data[14] == 0x01) &&
-                                       (keydata->data[15] == 0x07)) {
+                       } else if (oid == ONAK_OID_BRAINPOOLP256R1) {
                                length = 256;
-                       /* brainpoolP384r1 / 1.3.36.3.3.2.8.1.1.11 */
-                       } else if ((keydata->data[6] == 9) &&
-                                       (keydata->data[7] == 0x2B) &&
-                                       (keydata->data[8] == 0x24) &&
-                                       (keydata->data[9] == 0x03) &&
-                                       (keydata->data[10] == 0x03) &&
-                                       (keydata->data[11] == 0x02) &&
-                                       (keydata->data[12] == 0x08) &&
-                                       (keydata->data[13] == 0x01) &&
-                                       (keydata->data[14] == 0x01) &&
-                                       (keydata->data[15] == 0x0B)) {
+                       } else if (oid == ONAK_OID_BRAINPOOLP384R1) {
                                length = 384;
-                       /* brainpoolP512r1 / 1.3.36.3.3.2.8.1.1.13 */
-                       } else if ((keydata->data[6] == 9) &&
-                                       (keydata->data[7] == 0x2B) &&
-                                       (keydata->data[8] == 0x24) &&
-                                       (keydata->data[9] == 0x03) &&
-                                       (keydata->data[10] == 0x03) &&
-                                       (keydata->data[11] == 0x02) &&
-                                       (keydata->data[12] == 0x08) &&
-                                       (keydata->data[13] == 0x01) &&
-                                       (keydata->data[14] == 0x01) &&
-                                       (keydata->data[15] == 0x0D)) {
+                       } else if (oid == ONAK_OID_BRAINPOOLP512R1) {
                                length = 512;
-                       /* secp256k1 / 1.3.132.0.10 */
-                       } else if ((keydata->data[6] == 5) &&
-                                       (keydata->data[7] == 0x2B) &&
-                                       (keydata->data[8] == 0x81) &&
-                                       (keydata->data[9] == 0x04) &&
-                                       (keydata->data[10] == 0x00) &&
-                                       (keydata->data[11] == 0x0A)) {
+                       } else if (oid == ONAK_OID_SECP256K1) {
                                length = 256;
                        } else {
                                logthing(LOGTHING_ERROR,
@@ -186,8 +125,8 @@ unsigned int keylength(struct openpgp_packet *keydata)
                        }
                        break;
                default:
-                       length = (keydata->data[6] << 8) +
-                               keydata->data[7];
+                       length = (keydata->data[keyofs] << 8) +
+                               keydata->data[keyofs + 1];
                }
                break;
        default:
@@ -208,7 +147,9 @@ int list_sigs(struct onak_dbctx *dbctx,
 
        while (sigs != NULL) {
                sigid = sig_keyid(sigs->packet);
-               uid = dbctx->keyid2uid(dbctx, sigid);
+               if (dbctx) {
+                       uid = dbctx->keyid2uid(dbctx, sigid);
+               }
                if (sigs->packet->data[0] == 4 &&
                                sigs->packet->data[1] == 0x30) {
                        /* It's a Type 4 sig revocation */
@@ -218,25 +159,25 @@ int list_sigs(struct onak_dbctx *dbctx,
                }
                if (html && uid != NULL) {
                        printf("%s         <a href=\"lookup?op=get&"
-                               "search=0x%016" PRIX64 "\">%08" PRIX64
+                               "search=0x%016" PRIX64 "\">0x%016" PRIX64
                                "</a>             "
                                "<a href=\"lookup?op=vindex&search=0x%016"
                                PRIX64 "\">%s</a>\n",
                                sig,
                                sigid,
-                               sigid & 0xFFFFFFFF,
+                               sigid,
                                sigid,
                                txt2html(uid));
                } else if (html && uid == NULL) {
-                       printf("%s         %08" PRIX64 "             "
+                       printf("%s         0x%016" PRIX64 "             "
                                "[User id not found]\n",
                                sig,
-                               sigid & 0xFFFFFFFF);
+                               sigid);
                } else {
-                       printf("%s         %08" PRIX64
+                       printf("%s         0x%016" PRIX64
                                "             %s\n",
                                sig,
-                               sigid & 0xFFFFFFFF,
+                               sigid,
                                (uid != NULL) ? uid :
                                "[User id not found]");
                }
@@ -311,11 +252,12 @@ int list_subkeys(struct onak_dbctx *dbctx,
                                type = subkeys->packet->data[7];
                                break;
                        case 4:
+                       case 5:
                                type = subkeys->packet->data[5];
                                break;
                        default:
                                logthing(LOGTHING_ERROR,
-                                       "Unknown key type: %d",
+                                       "Unknown key version: %d",
                                        subkeys->packet->data[0]);
                        }
                        length = keylength(subkeys->packet);
@@ -324,10 +266,10 @@ int list_subkeys(struct onak_dbctx *dbctx,
                                        &keyid) != ONAK_E_OK) {
                                logthing(LOGTHING_ERROR, "Couldn't get keyid.");
                        }
-                       printf("sub  %5d%c/%08X %04d/%02d/%02d\n",
+                       printf("sub  %5d%c/0x%016" PRIX64 " %04d/%02d/%02d\n",
                                length,
                                pkalgo2char(type),
-                               (uint32_t) (keyid & 0xFFFFFFFF),
+                               keyid,
                                created->tm_year + 1900,
                                created->tm_mon + 1,
                                created->tm_mday);
@@ -430,10 +372,11 @@ int key_index(struct onak_dbctx *dbctx,
                        type = keys->publickey->data[7];
                        break;
                case 4:
+               case 5:
                        type = keys->publickey->data[5];
                        break;
                default:
-                       logthing(LOGTHING_ERROR, "Unknown key type: %d",
+                       logthing(LOGTHING_ERROR, "Unknown key version: %d",
                                keys->publickey->data[0]);
                }
                length = keylength(keys->publickey);
@@ -444,20 +387,20 @@ int key_index(struct onak_dbctx *dbctx,
 
                if (html) {
                        printf("pub  %5d%c/<a href=\"lookup?op=get&"
-                               "search=0x%016" PRIX64 "\">%08" PRIX64
+                               "search=0x%016" PRIX64 "\">0x%016" PRIX64
                                "</a> %04d/%02d/%02d ",
                                length,
                                pkalgo2char(type),
                                keyid,
-                               keyid & 0xFFFFFFFF,
+                               keyid,
                                created->tm_year + 1900,
                                created->tm_mon + 1,
                                created->tm_mday);
                } else {
-                       printf("pub  %5d%c/%08" PRIX64 " %04d/%02d/%02d ",
+                       printf("pub  %5d%c/0x%016" PRIX64 " %04d/%02d/%02d ",
                                length,
                                pkalgo2char(type),
-                               keyid & 0xFFFFFFFF,
+                               keyid,
                                created->tm_year + 1900,
                                created->tm_mon + 1,
                                created->tm_mday);
@@ -547,6 +490,7 @@ int mrkey_index(struct openpgp_publickey *keys)
                        type = keys->publickey->data[7];
                        break;
                case 4:
+               case 5:
                        (void) get_fingerprint(keys->publickey, &fingerprint);
 
                        for (i = 0; i < fingerprint.length; i++) {
@@ -556,7 +500,7 @@ int mrkey_index(struct openpgp_publickey *keys)
                        type = keys->publickey->data[5];
                        break;
                default:
-                       logthing(LOGTHING_ERROR, "Unknown key type: %d",
+                       logthing(LOGTHING_ERROR, "Unknown key version: %d",
                                keys->publickey->data[0]);
                }
                length = keylength(keys->publickey);