|
|
|
@ -410,6 +410,9 @@ pgp_validate_key_cb(const pgp_packet_t *pkt, pgp_cbdata_t *cbinfo)
|
|
|
|
|
case PGP_CERT_POSITIVE:
|
|
|
|
|
case PGP_SIG_REV_CERT:
|
|
|
|
|
if(vdata->last_seen == LS_ID){
|
|
|
|
|
if(strcmp((const char*)vdata->userid,"Volker Birk (Testkey - don't use) <volker.birk@digitalekho.com>") == 0){
|
|
|
|
|
printf("XXXXXXXXXXXXXX %d %s\n", valid, vdata->userid);
|
|
|
|
|
}
|
|
|
|
|
valid = pgp_check_useridcert_sig(
|
|
|
|
|
primary_pubkey,
|
|
|
|
|
vdata->userid,
|
|
|
|
@ -584,8 +587,6 @@ validate_data_cb(const pgp_packet_t *pkt, pgp_cbdata_t *cbinfo)
|
|
|
|
|
hexdump(io->outs, "signer id", content->sig.info.signer_id,
|
|
|
|
|
sizeof(content->sig.info.signer_id));
|
|
|
|
|
}
|
|
|
|
|
hexdump(io->outs, "LOOOOOOOOOOK signer id", content->sig.info.signer_id,
|
|
|
|
|
sizeof(content->sig.info.signer_id));
|
|
|
|
|
from = 0;
|
|
|
|
|
sigkey = NULL;
|
|
|
|
|
signer = pgp_getkeybyid(io, data->keyring,
|
|
|
|
@ -754,17 +755,6 @@ validate_result_status(FILE *errs, const char *f, pgp_validation_t *val)
|
|
|
|
|
return val->validc && !val->invalidc && !val->unknownc;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void printtime(time_t t)
|
|
|
|
|
{
|
|
|
|
|
struct tm *tm;
|
|
|
|
|
|
|
|
|
|
tm = gmtime(&t);
|
|
|
|
|
(void) printf("%04d-%02d-%02d\n",
|
|
|
|
|
tm->tm_year + 1900,
|
|
|
|
|
tm->tm_mon + 1,
|
|
|
|
|
tm->tm_mday);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
typedef struct key_filter_cb_t{
|
|
|
|
|
pgp_keyring_t *destpubring;
|
|
|
|
|
pgp_keyring_t *destsecring;
|
|
|
|
@ -798,12 +788,9 @@ static pgp_cb_ret_t key_filter_cb (
|
|
|
|
|
vdata->pubkeyid))==NULL){
|
|
|
|
|
return PGP_RELEASE_MEMORY;
|
|
|
|
|
}
|
|
|
|
|
printf("SECRET ");
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
printf("New key ************************************** \n");
|
|
|
|
|
hexdump(stdout, "pubkey ID", vdata->pubkeyid,
|
|
|
|
|
sizeof(vdata->pubkeyid));
|
|
|
|
|
/* TODO get seckey by ID id even if given key is public
|
|
|
|
|
* in order to update uids an attributes from pubkey */
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
pubkey = filter->pubkey;
|
|
|
|
@ -816,7 +803,6 @@ static pgp_cb_ret_t key_filter_cb (
|
|
|
|
|
|
|
|
|
|
switch(vdata->last_seen){
|
|
|
|
|
case LS_PRIMARY:
|
|
|
|
|
printf("PRIMARY DIRECT SIG\n");
|
|
|
|
|
|
|
|
|
|
pgp_add_directsig(pubkey, sigpkt, &vdata->valid_sig_info);
|
|
|
|
|
|
|
|
|
@ -825,7 +811,6 @@ static pgp_cb_ret_t key_filter_cb (
|
|
|
|
|
}
|
|
|
|
|
break;
|
|
|
|
|
case LS_ID:
|
|
|
|
|
printf("ID %s\n", vdata->userid);
|
|
|
|
|
|
|
|
|
|
pgp_update_userid(pubkey, vdata->userid, sigpkt, &vdata->valid_sig_info);
|
|
|
|
|
if (seckey) {
|
|
|
|
@ -834,7 +819,6 @@ static pgp_cb_ret_t key_filter_cb (
|
|
|
|
|
|
|
|
|
|
break;
|
|
|
|
|
case LS_ATTRIBUTE:
|
|
|
|
|
printf("ATTRIBUTE -- IGNORED\n");
|
|
|
|
|
/* TODO */
|
|
|
|
|
break;
|
|
|
|
|
case LS_SUBKEY:
|
|
|
|
@ -849,10 +833,8 @@ static pgp_cb_ret_t key_filter_cb (
|
|
|
|
|
|
|
|
|
|
break;
|
|
|
|
|
default:
|
|
|
|
|
printf("no_last_seen\n");
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
printtime(vdata->valid_sig_info.birthtime);
|
|
|
|
|
return PGP_RELEASE_MEMORY;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|