@ -298,6 +298,8 @@ pgp_validate_key_cb(const pgp_packet_t *pkt, pgp_cbdata_t *cbinfo)
vdata - > last_seen = LS_SUBKEY ;
return PGP_KEEP_MEMORY ;
} else {
( void ) fprintf ( io - > errs ,
" pgp_validate_key_cb: unexpected public subkey packet " ) ;
vdata - > last_seen = LS_UNKNOWN ;
return PGP_RELEASE_MEMORY ;
}
@ -313,6 +315,8 @@ pgp_validate_key_cb(const pgp_packet_t *pkt, pgp_cbdata_t *cbinfo)
vdata - > last_seen = LS_SUBKEY ;
return PGP_KEEP_MEMORY ;
} else {
( void ) fprintf ( io - > errs ,
" pgp_validate_key_cb: unexpected secret subkey packet " ) ;
vdata - > last_seen = LS_UNKNOWN ;
return PGP_RELEASE_MEMORY ;
}
@ -328,9 +332,10 @@ pgp_validate_key_cb(const pgp_packet_t *pkt, pgp_cbdata_t *cbinfo)
vdata - > last_seen = LS_ID ;
return PGP_KEEP_MEMORY ;
} else {
( void ) fprintf ( io - > errs ,
" pgp_validate_key_cb: unexpected userID \n " ) ;
return PGP_FINISHED ;
( void ) fprintf ( io - > errs ,
" pgp_validate_key_cb: unexpected userID packet " ) ;
vdata - > last_seen = LS_UNKNOWN ;
return PGP_RELEASE_MEMORY ;
}
case PGP_PTAG_CT_USER_ATTR :
@ -339,8 +344,9 @@ pgp_validate_key_cb(const pgp_packet_t *pkt, pgp_cbdata_t *cbinfo)
vdata - > last_seen = = LS_ID ) {
if ( content - > userattr . len = = 0 ) {
( void ) fprintf ( io - > errs ,
" pgp_validate_key_cb: user attribute length 0 " ) ;
return PGP_FINISHED ;
" pgp_validate_key_cb: user attribute length 0 " ) ;
vdata - > last_seen = LS_UNKNOWN ;
return PGP_RELEASE_MEMORY ;
}
( void ) fprintf ( io - > outs , " user attribute, length=%d \n " ,
( int ) content - > userattr . len ) ;
@ -353,7 +359,8 @@ pgp_validate_key_cb(const pgp_packet_t *pkt, pgp_cbdata_t *cbinfo)
} else {
( void ) fprintf ( io - > errs ,
" pgp_validate_key_cb: unexpected user attribute \n " ) ;
return PGP_FINISHED ;
vdata - > last_seen = LS_UNKNOWN ;
return PGP_RELEASE_MEMORY ;
}
case PGP_PTAG_CT_SIGNATURE : /* V3 sigs */
case PGP_PTAG_CT_SIGNATURE_FOOTER : { /* V4 sigs */
@ -499,26 +506,18 @@ pgp_validate_key_cb(const pgp_packet_t *pkt, pgp_cbdata_t *cbinfo)
/* ignore these */
case PGP_PARSER_PTAG :
case PGP_PTAG_CT_SIGNATURE_HEADER :
break ;
case PGP_GET_PASSPHRASE :
if ( vdata - > getpassphrase ) {
return vdata - > getpassphrase ( pkt , cbinfo ) ;
}
break ;
case PGP_PTAG_CT_TRUST :
/* 1 byte for level (depth), 1 byte for trust amount */
printf ( " trust dump \n " ) ;
printf ( " Got trust \n " ) ;
//hexdump(stdout, (const uint8_t *)content->trust.data, 10, " ");
//hexdump(stdout, (const uint8_t *)&content->ss_trust, 2, " ");
//printf("Trust level %d, amount %d\n", vdata->trust.level, vdata->trust.amount);
break ;
// case PGP_GET_PASSPHRASE:
// if (vdata->getpassphrase) {
// return vdata->getpassphrase(pkt, cbinfo);
// }
// break;
default :
( void ) fprintf ( stderr , " unexpected tag=0x%x \n " , pkt - > tag ) ;
return PGP_FINISHED ;
return PGP_RELEASE_MEMORY ;
}
return PGP_RELEASE_MEMORY ;
}