2 * Copyright (C) 1998, 1999, 2000, 2001, 2002, 2003, 2004, 2005, 2006, 2007,
3 * 2008, 2009, 2010 Free Software Foundation, Inc.
5 * This file is part of GnuPG.
7 * GnuPG is free software; you can redistribute it and/or modify
8 * it under the terms of the GNU General Public License as published by
9 * the Free Software Foundation; either version 3 of the License, or
10 * (at your option) any later version.
12 * GnuPG is distributed in the hope that it will be useful,
13 * but WITHOUT ANY WARRANTY; without even the implied warranty of
14 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 * GNU General Public License for more details.
17 * You should have received a copy of the GNU General Public License
18 * along with this program; if not, see <https://www.gnu.org/licenses/>.
23 #include "../common/types.h"
24 #include "../common/iobuf.h"
25 #include "../common/util.h"
29 /* It could be argued that the default cipher should be 3DES rather
30 than AES128, and the default compression should be 0
31 (i.e. uncompressed) rather than 1 (zip). However, the real world
32 issues of speed and size come into play here. */
35 # define DEFAULT_CIPHER_ALGO CIPHER_ALGO_AES256
37 # define DEFAULT_CIPHER_ALGO CIPHER_ALGO_AES
39 # define DEFAULT_CIPHER_ALGO CIPHER_ALGO_CAST5
41 # define DEFAULT_CIPHER_ALGO CIPHER_ALGO_3DES
44 #define DEFAULT_DIGEST_ALGO ((GNUPG)? DIGEST_ALGO_SHA256:DIGEST_ALGO_SHA1)
45 #define DEFAULT_S2K_DIGEST_ALGO DEFAULT_DIGEST_ALGO
47 # define DEFAULT_COMPRESS_ALGO COMPRESS_ALGO_ZIP
49 # define DEFAULT_COMPRESS_ALGO COMPRESS_ALGO_NONE
53 #define S2K_DIGEST_ALGO (opt.s2k_digest_algo?opt.s2k_digest_algo:DEFAULT_S2K_DIGEST_ALGO)
56 /* Various data objects. */
64 STRING2KEY *symkey_s2k;
65 cipher_filter_context_t cfx;
66 } encrypt_filter_context_t;
73 struct groupitem *next;
78 enum gcry_md_algos algo;
80 struct weakhash *next;
85 extern int g10_errors_seen;
86 extern int assert_signer_true;
88 #if __GNUC__ > 2 || (__GNUC__ == 2 && __GNUC_MINOR__ >= 5 )
89 void g10_exit(int rc) __attribute__ ((__noreturn__));
91 void g10_exit(int rc);
93 void print_pubkey_algo_note (pubkey_algo_t algo);
94 void print_cipher_algo_note (cipher_algo_t algo);
95 void print_digest_algo_note (digest_algo_t algo);
96 void print_digest_rejected_note (enum gcry_md_algos algo);
97 void print_sha1_keysig_rejected_note (void);
98 void print_reported_error (gpg_error_t err, gpg_err_code_t skip_if_ec);
99 void print_further_info (const char *format, ...) GPGRT_ATTR_PRINTF(1,2);
100 void additional_weak_digest (const char* digestname);
101 int is_weak_digest (digest_algo_t algo);
104 char *make_radix64_string( const byte *data, size_t len );
107 void trap_unaligned(void);
108 void register_secured_file (const char *fname);
109 void unregister_secured_file (const char *fname);
110 int is_secured_file (int fd);
111 int is_secured_filename (const char *fname);
112 u16 checksum_u16( unsigned n );
113 u16 checksum( const byte *p, unsigned n );
114 u16 checksum_mpi( gcry_mpi_t a );
115 u32 buffer_to_u32( const byte *buffer );
116 const byte *get_session_marker( size_t *rlen );
118 enum gcry_cipher_algos map_cipher_openpgp_to_gcry (cipher_algo_t algo);
119 #define openpgp_cipher_open(_a,_b,_c,_d) \
120 gcry_cipher_open((_a),map_cipher_openpgp_to_gcry((_b)),(_c),(_d))
121 #define openpgp_cipher_get_algo_keylen(_a) \
122 gcry_cipher_get_algo_keylen(map_cipher_openpgp_to_gcry((_a)))
123 #define openpgp_cipher_get_algo_blklen(_a) \
124 gcry_cipher_get_algo_blklen(map_cipher_openpgp_to_gcry((_a)))
125 int openpgp_cipher_blocklen (cipher_algo_t algo);
126 int openpgp_cipher_test_algo(cipher_algo_t algo);
127 const char *openpgp_cipher_algo_name (cipher_algo_t algo);
128 const char *openpgp_cipher_algo_mode_name (cipher_algo_t algo,
131 gpg_error_t openpgp_aead_test_algo (aead_algo_t algo);
132 const char *openpgp_aead_algo_name (aead_algo_t algo);
133 gpg_error_t openpgp_aead_algo_info (aead_algo_t algo,
134 enum gcry_cipher_modes *r_mode,
135 unsigned int *r_noncelen);
137 int openpgp_pk_test_algo (pubkey_algo_t algo);
138 int openpgp_pk_test_algo2 (pubkey_algo_t algo, unsigned int use);
139 int openpgp_pk_algo_usage ( int algo );
140 const char *openpgp_pk_algo_name (pubkey_algo_t algo);
142 enum gcry_md_algos map_md_openpgp_to_gcry (digest_algo_t algo);
143 int openpgp_md_test_algo (digest_algo_t algo);
144 const char *openpgp_md_algo_name (int algo);
149 PKT_public_key *pksk;
152 const char *validity_string;
153 const byte *namehash;
156 char *pct_expando (ctrl_t ctrl, const char *string,struct expando_args *args);
157 void deprecated_warning(const char *configname,unsigned int configlineno,
158 const char *option,const char *repl1,const char *repl2);
159 void deprecated_command (const char *name);
160 void obsolete_scdaemon_option (const char *configname,
161 unsigned int configlineno, const char *name);
163 int string_to_cipher_algo (const char *string);
164 aead_algo_t string_to_aead_algo (const char *string);
165 int string_to_digest_algo (const char *string);
167 const char *compress_algo_to_string(int algo);
168 int string_to_compress_algo(const char *string);
169 int check_compress_algo(int algo);
170 int default_cipher_algo(void);
171 int default_compress_algo(void);
172 void compliance_failure(void);
182 char *optsep(char **stringp);
183 char *argsplit(char *string);
184 int parse_options(char *str,unsigned int *options,
185 struct parse_options *opts,int noisy);
186 const char *get_libexecdir (void);
187 int path_access(const char *file,int mode);
189 int pubkey_get_npkey (pubkey_algo_t algo);
190 int pubkey_get_nskey (pubkey_algo_t algo);
191 int pubkey_get_nsig (pubkey_algo_t algo);
192 int pubkey_get_nenc (pubkey_algo_t algo);
194 /* Temporary helpers. */
195 unsigned int pubkey_nbits( int algo, gcry_mpi_t *pkey );
196 int mpi_print (estream_t stream, gcry_mpi_t a, int mode);
197 unsigned int ecdsa_qbits_from_Q (unsigned int qbits);
201 void set_status_fd ( int fd );
202 int is_status_enabled ( void );
203 void write_status ( int no );
204 void write_status_error (const char *where, gpg_error_t err);
205 void write_status_errcode (const char *where, int errcode);
206 void write_status_failure (const char *where, gpg_error_t err);
207 void write_status_text ( int no, const char *text );
208 void write_status_printf (int no, const char *format,
209 ...) GPGRT_ATTR_PRINTF(2,3);
210 void write_status_strings (int no, const char *text,
211 ...) GPGRT_ATTR_SENTINEL(0);
212 gpg_error_t write_status_strings2 (ctrl_t dummy, int no,
213 ...) GPGRT_ATTR_SENTINEL(0);
214 void write_status_buffer ( int no,
215 const char *buffer, size_t len, int wrap );
216 void write_status_text_and_buffer ( int no, const char *text,
217 const char *buffer, size_t len, int wrap );
219 void write_status_begin_signing (gcry_md_hd_t md);
222 int cpr_enabled(void);
223 char *cpr_get( const char *keyword, const char *prompt );
224 char *cpr_get_no_help( const char *keyword, const char *prompt );
225 char *cpr_get_utf8( const char *keyword, const char *prompt );
226 char *cpr_get_hidden( const char *keyword, const char *prompt );
227 void cpr_kill_prompt(void);
228 int cpr_get_answer_is_yes_def (const char *keyword, const char *prompt,
230 int cpr_get_answer_is_yes( const char *keyword, const char *prompt );
231 int cpr_get_answer_yes_no_quit( const char *keyword, const char *prompt );
232 int cpr_get_answer_okay_cancel (const char *keyword,
237 void display_online_help( const char *keyword );
240 gpg_error_t setup_symkey (STRING2KEY **symkey_s2k,DEK **symkey_dek);
241 aead_algo_t use_aead (pk_list_t pk_list, int algo);
242 int use_mdc (pk_list_t pk_list,int algo);
243 int encrypt_symmetric (const char *filename );
244 int encrypt_store (const char *filename );
245 int encrypt_crypt (ctrl_t ctrl, int filefd, const char *filename,
246 strlist_t remusr, int use_symkey, pk_list_t provided_keys,
248 void encrypt_crypt_files (ctrl_t ctrl,
249 int nfiles, char **files, strlist_t remusr);
250 int encrypt_filter (void *opaque, int control,
251 iobuf_t a, byte *buf, size_t *ret_len);
253 int write_pubkey_enc (ctrl_t ctrl, PKT_public_key *pk, int throw_keyid,
254 DEK *dek, iobuf_t out);
257 int sign_file (ctrl_t ctrl, strlist_t filenames, int detached, strlist_t locusr,
258 int do_encrypt, strlist_t remusr, const char *outfile );
259 int clearsign_file (ctrl_t ctrl,
260 const char *fname, strlist_t locusr, const char *outfile);
261 int sign_symencrypt_file (ctrl_t ctrl, const char *fname, strlist_t locusr);
263 /*-- sig-check.c --*/
264 void sig_check_dump_stats (void);
266 /* SIG is a revocation signature. Check if any of PK's designated
267 revokers generated it. If so, return 0. Note: this function
268 (correctly) doesn't care if the designated revoker is revoked. */
269 int check_revocation_keys (ctrl_t ctrl, PKT_public_key *pk, PKT_signature *sig);
270 /* Check that the backsig BACKSIG from the subkey SUB_PK to its
271 primary key MAIN_PK is valid. */
272 int check_backsig(PKT_public_key *main_pk,PKT_public_key *sub_pk,
273 PKT_signature *backsig);
274 /* Check that the signature SIG over a key (e.g., a key binding or a
275 key revocation) is valid. (To check signatures over data, use
277 int check_key_signature (ctrl_t ctrl, kbnode_t root, kbnode_t sig,
279 /* Like check_key_signature, but with the ability to specify some
280 additional parameters and get back additional information. See the
281 documentation for the implementation for details. */
282 int check_key_signature2 (ctrl_t ctrl, kbnode_t root, kbnode_t node,
283 PKT_public_key *check_pk, PKT_public_key *ret_pk,
284 int *is_selfsig, u32 *r_expiredate, int *r_expired);
286 /* Returns whether SIGNER generated the signature SIG over the packet
287 PACKET, which is a key, subkey or uid, and comes from the key block
288 KB. If SIGNER is NULL, it is looked up based on the information in
289 SIG. If not NULL, sets *IS_SELFSIG to indicate whether the
290 signature is a self-signature and *RET_PK to a copy of the signer's
292 gpg_error_t check_signature_over_key_or_uid (ctrl_t ctrl,
293 PKT_public_key *signer,
295 KBNODE kb, PACKET *packet,
297 PKT_public_key *ret_pk);
301 gpg_error_t delete_keys (ctrl_t ctrl,
302 strlist_t names, int secret, int allow_both);
305 const char *get_default_pubkey_algo (void);
306 u32 parse_expire_string(const char *string);
307 u32 ask_expire_interval(int object,const char *def_expire);
308 u32 ask_expiredate(void);
309 unsigned int ask_key_flags (int algo, int subkey, unsigned int current);
310 const char *ask_curve (int *algo, int *subkey_algo, const char *current);
311 void quick_generate_keypair (ctrl_t ctrl, const char *uid, const char *algostr,
312 const char *usagestr, const char *expirestr);
313 void generate_keypair (ctrl_t ctrl, int full, const char *fname,
314 const char *card_serialno, int card_backup_key);
315 int keygen_set_std_prefs (const char *string,int personal);
316 PKT_user_id *keygen_get_std_prefs (void);
317 int keygen_add_key_expire( PKT_signature *sig, void *opaque );
318 int keygen_add_key_flags (PKT_signature *sig, void *opaque);
319 int keygen_add_key_flags_and_expire (PKT_signature *sig, void *opaque);
320 int keygen_add_std_prefs( PKT_signature *sig, void *opaque );
321 int keygen_upd_std_prefs( PKT_signature *sig, void *opaque );
322 int keygen_add_keyserver_url(PKT_signature *sig, void *opaque);
323 int keygen_add_notations(PKT_signature *sig,void *opaque);
324 int keygen_add_revkey(PKT_signature *sig, void *opaque);
325 gpg_error_t make_backsig (ctrl_t ctrl,
326 PKT_signature *sig, PKT_public_key *pk,
327 PKT_public_key *sub_pk, PKT_public_key *sub_psk,
328 u32 timestamp, const char *cache_nonce);
329 gpg_error_t generate_subkeypair (ctrl_t ctrl, kbnode_t keyblock,
331 const char *usagestr,
332 const char *expirestr);
333 #ifdef ENABLE_CARD_SUPPORT
334 gpg_error_t generate_card_subkeypair (ctrl_t ctrl, kbnode_t pub_keyblock,
335 int keyno, const char *serialno);
340 int overwrite_filep( const char *fname );
341 char *make_outfile_name( const char *iname );
342 char *ask_outfile_name( const char *name, size_t namelen );
343 int open_outfile (int out_fd, const char *iname, int mode,
344 int restrictedperm, iobuf_t *a);
345 char *get_matching_datafile (const char *sigfilename);
346 iobuf_t open_sigfile (const char *sigfilename, progress_filter_context_t *pfx);
347 void try_make_homedir( const char *fname );
348 char *get_openpgp_revocdir (const char *home);
351 void make_session_key( DEK *dek );
352 gcry_mpi_t encode_session_key( int openpgp_pk_algo, DEK *dek, unsigned nbits );
353 gcry_mpi_t encode_md_value (PKT_public_key *pk,
354 gcry_md_hd_t md, int hash_algo );
357 struct import_stats_s;
358 typedef struct import_stats_s *import_stats_t;
359 struct import_filter_s;
360 typedef struct import_filter_s *import_filter_t;
361 typedef gpg_error_t (*import_screener_t)(kbnode_t keyblock, void *arg);
363 int parse_import_options(char *str,unsigned int *options,int noisy);
365 gpg_error_t parse_and_set_import_filter (const char *string);
366 import_filter_t save_and_clear_import_filter (void);
367 void restore_import_filter (import_filter_t filt);
369 gpg_error_t read_key_from_file_or_buffer (ctrl_t ctrl, const char *fname,
370 const void *buffer, size_t buflen,
371 kbnode_t *r_keyblock);
372 gpg_error_t import_included_key_block (ctrl_t ctrl, kbnode_t keyblock);
373 void import_keys (ctrl_t ctrl, char **fnames, int nnames,
374 import_stats_t stats_hd, unsigned int options,
375 int origin, const char *url);
376 gpg_error_t import_keys_es_stream (ctrl_t ctrl, estream_t fp,
377 import_stats_t stats_handle,
378 unsigned char **fpr, size_t *fpr_len,
379 unsigned int options,
380 import_screener_t screener, void *screener_arg,
381 int origin, const char *url);
382 gpg_error_t import_old_secring (ctrl_t ctrl, const char *fname);
383 import_stats_t import_new_stats_handle (void);
384 void import_release_stats_handle (import_stats_t hd);
385 void import_print_stats (import_stats_t hd);
386 /* Communication for impex_filter_getval */
387 struct impex_filter_parm_s
391 char hexfpr[2*MAX_FINGERPRINT_LEN + 1];
394 const char *impex_filter_getval (void *cookie, const char *propname);
395 gpg_error_t transfer_secret_keys (ctrl_t ctrl, struct import_stats_s *stats,
396 kbnode_t sec_keyblock, int batch, int force,
399 int collapse_uids (kbnode_t *keyblock);
400 int collapse_subkeys (kbnode_t *keyblock);
402 int get_revocation_reason (PKT_signature *sig, char **r_reason,
403 char **r_comment, size_t *r_commentlen);
407 struct export_stats_s;
408 typedef struct export_stats_s *export_stats_t;
410 export_stats_t export_new_stats (void);
411 void export_release_stats (export_stats_t stats);
412 void export_print_stats (export_stats_t stats);
414 int parse_export_options(char *str,unsigned int *options,int noisy);
415 gpg_error_t parse_and_set_export_filter (const char *string);
416 void push_export_filters (void);
417 void pop_export_filters (void);
419 int exact_subkey_match_p (KEYDB_SEARCH_DESC *desc, kbnode_t node);
421 int export_pubkeys (ctrl_t ctrl, strlist_t users, unsigned int options,
422 export_stats_t stats);
423 int export_seckeys (ctrl_t ctrl, strlist_t users, unsigned int options,
424 export_stats_t stats);
425 int export_secsubkeys (ctrl_t ctrl, strlist_t users, unsigned int options,
426 export_stats_t stats);
428 gpg_error_t export_pubkey_buffer (ctrl_t ctrl, const char *keyspec,
429 unsigned int options,
430 const void *prefix, size_t prefixlen,
431 export_stats_t stats,
432 kbnode_t *r_keyblock,
433 void **r_data, size_t *r_datalen);
435 gpg_error_t receive_seckey_from_agent (ctrl_t ctrl, gcry_cipher_hd_t cipherhd,
436 int cleartext, int mode1003,
437 char **cache_nonce_addr,
439 PKT_public_key *pk, gcry_sexp_t *r_key);
441 gpg_error_t write_keyblock_to_output (kbnode_t keyblock,
442 int with_armor, unsigned int options);
444 gpg_error_t export_ssh_key (ctrl_t ctrl, const char *userid);
445 gpg_error_t export_secret_ssh_key (ctrl_t ctrl, const char *userid);
448 int dearmor_file( const char *fname );
449 int enarmor_file( const char *fname );
452 struct revocation_reason_info;
454 int gen_standard_revoke (ctrl_t ctrl,
455 PKT_public_key *psk, const char *cache_nonce);
456 int gen_revoke (ctrl_t ctrl, const char *uname);
457 int gen_desig_revoke (ctrl_t ctrl, const char *uname, strlist_t locusr);
458 int revocation_reason_build_cb( PKT_signature *sig, void *opaque );
459 struct revocation_reason_info *
460 ask_revocation_reason( int key_rev, int cert_rev, int hint );
461 struct revocation_reason_info * get_default_uid_revocation_reason (void);
462 struct revocation_reason_info * get_default_sig_revocation_reason (void);
463 void release_revocation_reason_info (struct revocation_reason_info *reason);
466 void public_key_list (ctrl_t ctrl, strlist_t list,
467 int locate_mode, int no_local);
468 void secret_key_list (ctrl_t ctrl, strlist_t list );
469 gpg_error_t parse_and_set_list_filter (const char *string);
470 void print_subpackets_colon(PKT_signature *sig);
471 void reorder_keyblock (KBNODE keyblock);
472 void list_keyblock_direct (ctrl_t ctrl, kbnode_t keyblock, int secret,
473 int has_secret, int fpr, int no_validity);
474 int cmp_signodes (const void *av, const void *bv);
475 void print_fingerprint (ctrl_t ctrl, estream_t fp,
476 PKT_public_key *pk, int mode);
477 void print_revokers (estream_t fp, PKT_public_key *pk);
478 void show_preferences (PKT_user_id *uid, int indent, int mode, int verbose);
479 void show_policy_url(PKT_signature *sig,int indent,int mode);
480 void show_keyserver_url(PKT_signature *sig,int indent,int mode);
481 void show_notation(PKT_signature *sig,int indent,int mode,int which);
482 void dump_attribs (const PKT_user_id *uid, PKT_public_key *pk);
483 void set_attrib_fd(int fd);
484 void print_key_info (ctrl_t ctrl, estream_t fp, int indent,
485 PKT_public_key *pk, int secret);
486 void print_key_info_log (ctrl_t ctrl, int loglevel, int indent,
487 PKT_public_key *pk, int secret);
488 void print_card_key_info (estream_t fp, KBNODE keyblock);
489 void print_key_line (ctrl_t ctrl, estream_t fp, PKT_public_key *pk, int secret);
492 void print_file_status( int status, const char *name, int what );
493 int verify_signatures (ctrl_t ctrl, int nfiles, char **files );
494 int verify_files (ctrl_t ctrl, int nfiles, char **files );
495 int gpg_verify (ctrl_t ctrl, int sig_fd, int data_fd, estream_t out_fp);
496 void check_assert_signer_list (const char *mainpkhex, const char *pkhex);
499 int decrypt_message (ctrl_t ctrl, const char *filename );
500 gpg_error_t decrypt_message_fd (ctrl_t ctrl, int input_fd, int output_fd);
501 void decrypt_messages (ctrl_t ctrl, int nfiles, char *files[]);
503 /*-- plaintext.c --*/
504 int hash_datafiles( gcry_md_hd_t md, gcry_md_hd_t md2,
505 strlist_t files, const char *sigfilename, int textmode);
506 int hash_datafile_by_fd ( gcry_md_hd_t md, gcry_md_hd_t md2, int data_fd,
508 PKT_plaintext *setup_plaintext_name(const char *filename,IOBUF iobuf);
511 int gpg_server (ctrl_t);
512 gpg_error_t gpg_proxy_pinentry_notify (ctrl_t ctrl,
513 const unsigned char *line);
515 #ifdef ENABLE_CARD_SUPPORT
516 /*-- card-util.c --*/
517 void change_pin (int no, int allow_admin);
518 void card_status (ctrl_t ctrl, estream_t fp, const char *serialno);
519 void card_edit (ctrl_t ctrl, strlist_t commands);
520 gpg_error_t card_generate_subkey (ctrl_t ctrl, kbnode_t pub_keyblock);
521 int card_store_subkey (KBNODE node, int use, strlist_t *processed_keys);
525 void migrate_secring (ctrl_t ctrl);
528 #endif /*G10_MAIN_H*/