Coverage Report

Created: 2026-01-09 06:46

next uncovered line (L), next uncovered region (R), next uncovered branch (B)
/src/gnupg/g10/misc.c
Line
Count
Source
1
/* misc.c - miscellaneous functions
2
 * Copyright (C) 1998, 1999, 2000, 2001, 2002, 2003, 2004, 2005, 2006, 2007,
3
 *               2008, 2009, 2010 Free Software Foundation, Inc.
4
 * Copyright (C) 2014 Werner Koch
5
 *
6
 * This file is part of GnuPG.
7
 *
8
 * GnuPG is free software; you can redistribute it and/or modify
9
 * it under the terms of the GNU General Public License as published by
10
 * the Free Software Foundation; either version 3 of the License, or
11
 * (at your option) any later version.
12
 *
13
 * GnuPG is distributed in the hope that it will be useful,
14
 * but WITHOUT ANY WARRANTY; without even the implied warranty of
15
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
16
 * GNU General Public License for more details.
17
 *
18
 * You should have received a copy of the GNU General Public License
19
 * along with this program; if not, see <https://www.gnu.org/licenses/>.
20
 */
21
22
#include <config.h>
23
#include <stdio.h>
24
#include <stdlib.h>
25
#include <string.h>
26
#include <unistd.h>
27
#include <errno.h>
28
#if defined(__linux__) && defined(__alpha__) && __GLIBC__ < 2
29
#include <asm/sysinfo.h>
30
#include <asm/unistd.h>
31
#endif
32
#ifdef HAVE_SETRLIMIT
33
#include <time.h>
34
#include <sys/time.h>
35
#include <sys/resource.h>
36
#endif
37
#ifdef ENABLE_SELINUX_HACKS
38
#include <sys/stat.h>
39
#endif
40
41
#ifdef HAVE_W32_SYSTEM
42
#include <time.h>
43
#include <process.h>
44
#ifdef HAVE_WINSOCK2_H
45
# define WIN32_LEAN_AND_MEAN 1
46
# include <winsock2.h>
47
#endif
48
#include <windows.h>
49
#include <shlobj.h>
50
#ifndef CSIDL_APPDATA
51
#define CSIDL_APPDATA 0x001a
52
#endif
53
#ifndef CSIDL_LOCAL_APPDATA
54
#define CSIDL_LOCAL_APPDATA 0x001c
55
#endif
56
#ifndef CSIDL_FLAG_CREATE
57
#define CSIDL_FLAG_CREATE 0x8000
58
#endif
59
#endif /*HAVE_W32_SYSTEM*/
60
61
#include "gpg.h"
62
#ifdef HAVE_W32_SYSTEM
63
# include "../common/status.h"
64
#endif /*HAVE_W32_SYSTEM*/
65
#include "../common/util.h"
66
#include "main.h"
67
#include "photoid.h"
68
#include "options.h"
69
#include "call-agent.h"
70
#include "../common/i18n.h"
71
#include "../common/zb32.h"
72
73
74
/* FIXME: Libgcrypt 1.9 will support EAX.  Until we name this a
75
 * requirement we hardwire the enum used for EAX.  */
76
0
#define MY_GCRY_CIPHER_MODE_EAX 14
77
78
79
#ifdef ENABLE_SELINUX_HACKS
80
/* A object and a global variable to keep track of files marked as
81
   secured. */
82
struct secured_file_item
83
{
84
  struct secured_file_item *next;
85
  ino_t ino;
86
  dev_t dev;
87
};
88
static struct secured_file_item *secured_files;
89
#endif /*ENABLE_SELINUX_HACKS*/
90
91
92
93
94
/* For the sake of SELinux we want to restrict access through gpg to
95
   certain files we keep under our own control.  This function
96
   registers such a file and is_secured_file may then be used to
97
   check whether a file has ben registered as secured. */
98
void
99
register_secured_file (const char *fname)
100
0
{
101
#ifdef ENABLE_SELINUX_HACKS
102
  struct stat buf;
103
  struct secured_file_item *sf;
104
105
  /* Note that we stop immediately if something goes wrong here. */
106
  if (gnupg_stat (fname, &buf))
107
    log_fatal (_("fstat of '%s' failed in %s: %s\n"), fname,
108
               "register_secured_file", strerror (errno));
109
/*   log_debug ("registering '%s' i=%lu.%lu\n", fname, */
110
/*              (unsigned long)buf.st_dev, (unsigned long)buf.st_ino); */
111
  for (sf=secured_files; sf; sf = sf->next)
112
    {
113
      if (sf->ino == buf.st_ino && sf->dev == buf.st_dev)
114
        return; /* Already registered.  */
115
    }
116
117
  sf = xmalloc (sizeof *sf);
118
  sf->ino = buf.st_ino;
119
  sf->dev = buf.st_dev;
120
  sf->next = secured_files;
121
  secured_files = sf;
122
#else /*!ENABLE_SELINUX_HACKS*/
123
0
  (void)fname;
124
0
#endif /*!ENABLE_SELINUX_HACKS*/
125
0
}
126
127
/* Remove a file registered as secure. */
128
void
129
unregister_secured_file (const char *fname)
130
0
{
131
#ifdef ENABLE_SELINUX_HACKS
132
  struct stat buf;
133
  struct secured_file_item *sf, *sfprev;
134
135
  if (gnupg_stat (fname, &buf))
136
    {
137
      log_error (_("fstat of '%s' failed in %s: %s\n"), fname,
138
                 "unregister_secured_file", strerror (errno));
139
      return;
140
    }
141
/*   log_debug ("unregistering '%s' i=%lu.%lu\n", fname,  */
142
/*              (unsigned long)buf.st_dev, (unsigned long)buf.st_ino); */
143
  for (sfprev=NULL,sf=secured_files; sf; sfprev=sf, sf = sf->next)
144
    {
145
      if (sf->ino == buf.st_ino && sf->dev == buf.st_dev)
146
        {
147
          if (sfprev)
148
            sfprev->next = sf->next;
149
          else
150
            secured_files = sf->next;
151
          xfree (sf);
152
          return;
153
        }
154
    }
155
#else /*!ENABLE_SELINUX_HACKS*/
156
0
  (void)fname;
157
0
#endif /*!ENABLE_SELINUX_HACKS*/
158
0
}
159
160
/* Return true if FD is corresponds to a secured file.  Using -1 for
161
   FS is allowed and will return false. */
162
int
163
is_secured_file (gnupg_fd_t fd)
164
16.8k
{
165
#ifdef ENABLE_SELINUX_HACKS
166
  struct stat buf;
167
  struct secured_file_item *sf;
168
169
  if (fd == -1)
170
    return 0; /* No file descriptor so it can't be secured either.  */
171
172
  /* Note that we print out a error here and claim that a file is
173
     secure if something went wrong. */
174
  if (fstat (fd, &buf))
175
    {
176
      log_error (_("fstat(%d) failed in %s: %s\n"), fd,
177
                 "is_secured_file", strerror (errno));
178
      return 1;
179
    }
180
/*   log_debug ("is_secured_file (%d) i=%lu.%lu\n", fd, */
181
/*              (unsigned long)buf.st_dev, (unsigned long)buf.st_ino); */
182
  for (sf=secured_files; sf; sf = sf->next)
183
    {
184
      if (sf->ino == buf.st_ino && sf->dev == buf.st_dev)
185
        return 1; /* Yes.  */
186
    }
187
#else /*!ENABLE_SELINUX_HACKS*/
188
16.8k
  (void)fd;
189
16.8k
#endif /*!ENABLE_SELINUX_HACKS*/
190
16.8k
  return 0; /* No. */
191
16.8k
}
192
193
/* Return true if FNAME is corresponds to a secured file.  Using NULL,
194
   "" or "-" for FS is allowed and will return false. This function is
195
   used before creating a file, thus it won't fail if the file does
196
   not exist. */
197
int
198
is_secured_filename (const char *fname)
199
2
{
200
#ifdef ENABLE_SELINUX_HACKS
201
  struct stat buf;
202
  struct secured_file_item *sf;
203
204
  if (iobuf_is_pipe_filename (fname) || !*fname)
205
    return 0;
206
207
  /* Note that we print out a error here and claim that a file is
208
     secure if something went wrong. */
209
  if (gnupg_stat (fname, &buf))
210
    {
211
      if (errno == ENOENT || errno == EPERM || errno == EACCES)
212
        return 0;
213
      log_error (_("fstat of '%s' failed in %s: %s\n"), fname,
214
                 "is_secured_filename", strerror (errno));
215
      return 1;
216
    }
217
/*   log_debug ("is_secured_filename (%s) i=%lu.%lu\n", fname, */
218
/*              (unsigned long)buf.st_dev, (unsigned long)buf.st_ino); */
219
  for (sf=secured_files; sf; sf = sf->next)
220
    {
221
      if (sf->ino == buf.st_ino && sf->dev == buf.st_dev)
222
        return 1; /* Yes.  */
223
    }
224
#else /*!ENABLE_SELINUX_HACKS*/
225
2
  (void)fname;
226
2
#endif /*!ENABLE_SELINUX_HACKS*/
227
2
  return 0; /* No. */
228
2
}
229
230
231
232
u16
233
checksum_u16( unsigned n )
234
0
{
235
0
    u16 a;
236
237
0
    a  = (n >> 8) & 0xff;
238
0
    a += n & 0xff;
239
0
    return a;
240
0
}
241
242
243
u16
244
checksum (const byte *p, unsigned n)
245
0
{
246
0
    u16 a;
247
248
0
    for(a=0; n; n-- )
249
0
  a += *p++;
250
0
    return a;
251
0
}
252
253
u16
254
checksum_mpi (gcry_mpi_t a)
255
0
{
256
0
  u16 csum;
257
0
  byte *buffer;
258
0
  size_t nbytes;
259
260
  /*
261
   * This code can be skipped when gcry_mpi_print
262
   * supports opaque MPI.
263
   */
264
0
  if (gcry_mpi_get_flag (a, GCRYMPI_FLAG_OPAQUE))
265
0
    {
266
0
      const byte *p;
267
0
      unsigned int nbits;
268
269
0
      p = gcry_mpi_get_opaque (a, &nbits);
270
0
      if (!p)
271
0
        return 0;
272
273
0
      csum = nbits >> 8;
274
0
      csum += (nbits & 0xff);
275
0
      csum += checksum (p, (nbits+7)/8);
276
0
      return csum;
277
0
    }
278
279
0
  if ( gcry_mpi_print (GCRYMPI_FMT_PGP, NULL, 0, &nbytes, a) )
280
0
    BUG ();
281
  /* Fixme: For numbers not in secure memory we should use a stack
282
   * based buffer and only allocate a larger one if mpi_print returns
283
   * an error. */
284
0
  buffer = (gcry_is_secure(a)?
285
0
            gcry_xmalloc_secure (nbytes) : gcry_xmalloc (nbytes));
286
0
  if ( gcry_mpi_print (GCRYMPI_FMT_PGP, buffer, nbytes, NULL, a) )
287
0
    BUG ();
288
0
  csum = checksum (buffer, nbytes);
289
0
  xfree (buffer);
290
0
  return csum;
291
0
}
292
293
294
void
295
print_pubkey_algo_note (pubkey_algo_t algo)
296
0
{
297
0
  if(algo >= 100 && algo <= 110)
298
0
    {
299
0
      static int warn=0;
300
0
      if(!warn)
301
0
  {
302
0
    warn=1;
303
0
          es_fflush (es_stdout);
304
0
    log_info (_("WARNING: using experimental public key algorithm %s\n"),
305
0
        openpgp_pk_algo_name (algo));
306
0
  }
307
0
    }
308
0
  else if (algo == PUBKEY_ALGO_ELGAMAL)
309
0
    {
310
0
      es_fflush (es_stdout);
311
0
      log_info (_("WARNING: Elgamal sign+encrypt keys are deprecated\n"));
312
0
    }
313
0
}
314
315
void
316
print_cipher_algo_note (cipher_algo_t algo)
317
0
{
318
0
  if(algo >= 100 && algo <= 110)
319
0
    {
320
0
      static int warn=0;
321
0
      if(!warn)
322
0
  {
323
0
    warn=1;
324
0
          es_fflush (es_stdout);
325
0
    log_info (_("WARNING: using experimental cipher algorithm %s\n"),
326
0
                    openpgp_cipher_algo_name (algo));
327
0
  }
328
0
    }
329
0
}
330
331
void
332
print_digest_algo_note (digest_algo_t algo)
333
0
{
334
0
  if(algo >= 100 && algo <= 110)
335
0
    {
336
0
      static int warn=0;
337
0
      const enum gcry_md_algos galgo = map_md_openpgp_to_gcry (algo);
338
339
0
      if(!warn)
340
0
  {
341
0
    warn=1;
342
0
          es_fflush (es_stdout);
343
0
    log_info (_("WARNING: using experimental digest algorithm %s\n"),
344
0
                    gcry_md_algo_name (galgo));
345
0
  }
346
0
    }
347
0
  else if (is_weak_digest (algo))
348
0
    {
349
0
      const enum gcry_md_algos galgo = map_md_openpgp_to_gcry (algo);
350
0
      es_fflush (es_stdout);
351
0
      log_info (_("WARNING: digest algorithm %s is deprecated\n"),
352
0
                gcry_md_algo_name (galgo));
353
0
    }
354
0
}
355
356
357
void
358
print_digest_rejected_note (enum gcry_md_algos algo)
359
0
{
360
0
  struct weakhash* weak;
361
0
  int show = 1;
362
363
0
  if (opt.quiet)
364
0
    return;
365
366
0
  for (weak = opt.weak_digests; weak; weak = weak->next)
367
0
    if (weak->algo == algo)
368
0
      {
369
0
        if (weak->rejection_shown)
370
0
          show = 0;
371
0
        else
372
0
          weak->rejection_shown = 1;
373
0
        break;
374
0
      }
375
376
0
  if (show)
377
0
    {
378
0
      es_fflush (es_stdout);
379
0
      log_info
380
0
        (_("Note: signatures using the %s algorithm are rejected\n"),
381
0
         gcry_md_algo_name(algo));
382
0
    }
383
0
}
384
385
386
void
387
print_sha1_keysig_rejected_note (void)
388
0
{
389
0
  static int shown;
390
391
0
  if (shown || opt.quiet)
392
0
    return;
393
394
0
  shown = 1;
395
0
  es_fflush (es_stdout);
396
0
  log_info (_("Note: third-party key signatures using"
397
0
              " the %s algorithm are rejected\n"),
398
0
            gcry_md_algo_name (GCRY_MD_SHA1));
399
0
  if (!opt.quiet)
400
0
    log_info (_("(use option \"%s\" to override)\n"),
401
0
              "--allow-weak-key-signatures");
402
0
}
403
404
405
/* Print a message
406
 *  "(reported error: %s)\n
407
 * in verbose mode to further explain an error.  If the error code has
408
 * the value IGNORE_EC no message is printed.  A message is also not
409
 * printed if ERR is 0.  */
410
void
411
print_reported_error (gpg_error_t err, gpg_err_code_t ignore_ec)
412
0
{
413
0
  if (!opt.verbose)
414
0
    return;
415
416
0
  if (!gpg_err_code (err))
417
0
    ;
418
0
  else if (gpg_err_code (err) == ignore_ec)
419
0
    ;
420
0
  else if (gpg_err_source (err) == GPG_ERR_SOURCE_DEFAULT)
421
0
    log_info (_("(reported error: %s)\n"),
422
0
              gpg_strerror (err));
423
0
  else
424
0
    log_info (_("(reported error: %s <%s>)\n"),
425
0
              gpg_strerror (err), gpg_strsource (err));
426
427
0
}
428
429
430
/* Print a message
431
 *   "(further info: %s)\n
432
 * in verbose mode to further explain an error.  That message is
433
 * intended to help debug a problem and should not be translated.
434
 */
435
void
436
print_further_info (const char *format, ...)
437
0
{
438
0
  va_list arg_ptr;
439
440
0
  if (!opt.verbose)
441
0
    return;
442
443
0
  log_info (_("(further info: "));
444
0
  va_start (arg_ptr, format);
445
0
  log_logv (GPGRT_LOGLVL_CONT, format, arg_ptr);
446
0
  va_end (arg_ptr);
447
0
  log_printf (")\n");
448
0
}
449
450
451
/* Map OpenPGP algo numbers to those used by Libgcrypt.  We need to do
452
   this for algorithms we implemented in Libgcrypt after they become
453
   part of OpenPGP.  */
454
enum gcry_cipher_algos
455
map_cipher_openpgp_to_gcry (cipher_algo_t algo)
456
0
{
457
0
  switch (algo)
458
0
    {
459
0
    case CIPHER_ALGO_NONE:        return GCRY_CIPHER_NONE;
460
461
0
#ifdef GPG_USE_IDEA
462
0
    case CIPHER_ALGO_IDEA:        return GCRY_CIPHER_IDEA;
463
#else
464
    case CIPHER_ALGO_IDEA:        return 0;
465
#endif
466
467
0
    case CIPHER_ALGO_3DES:    return GCRY_CIPHER_3DES;
468
469
0
#ifdef GPG_USE_CAST5
470
0
    case CIPHER_ALGO_CAST5:   return GCRY_CIPHER_CAST5;
471
#else
472
    case CIPHER_ALGO_CAST5:   return 0;
473
#endif
474
475
0
#ifdef GPG_USE_BLOWFISH
476
0
    case CIPHER_ALGO_BLOWFISH:    return GCRY_CIPHER_BLOWFISH;
477
#else
478
    case CIPHER_ALGO_BLOWFISH:    return 0;
479
#endif
480
481
0
#ifdef GPG_USE_AES128
482
0
    case CIPHER_ALGO_AES:         return GCRY_CIPHER_AES;
483
#else
484
    case CIPHER_ALGO_AES:         return 0;
485
#endif
486
487
0
#ifdef GPG_USE_AES192
488
0
    case CIPHER_ALGO_AES192:      return GCRY_CIPHER_AES192;
489
#else
490
    case CIPHER_ALGO_AES192:      return 0;
491
#endif
492
493
0
#ifdef GPG_USE_AES256
494
0
    case CIPHER_ALGO_AES256:      return GCRY_CIPHER_AES256;
495
#else
496
    case CIPHER_ALGO_AES256:      return 0;
497
#endif
498
499
0
#ifdef GPG_USE_TWOFISH
500
0
    case CIPHER_ALGO_TWOFISH:     return GCRY_CIPHER_TWOFISH;
501
#else
502
    case CIPHER_ALGO_TWOFISH:     return 0;
503
#endif
504
505
0
#ifdef GPG_USE_CAMELLIA128
506
0
    case CIPHER_ALGO_CAMELLIA128: return GCRY_CIPHER_CAMELLIA128;
507
#else
508
    case CIPHER_ALGO_CAMELLIA128: return 0;
509
#endif
510
511
0
#ifdef GPG_USE_CAMELLIA192
512
0
    case CIPHER_ALGO_CAMELLIA192: return GCRY_CIPHER_CAMELLIA192;
513
#else
514
    case CIPHER_ALGO_CAMELLIA192: return 0;
515
#endif
516
517
0
#ifdef GPG_USE_CAMELLIA256
518
0
    case CIPHER_ALGO_CAMELLIA256: return GCRY_CIPHER_CAMELLIA256;
519
#else
520
    case CIPHER_ALGO_CAMELLIA256: return 0;
521
#endif
522
0
    default: return 0;
523
0
    }
524
0
}
525
526
/* The inverse function of above.  */
527
static cipher_algo_t
528
map_cipher_gcry_to_openpgp (enum gcry_cipher_algos algo)
529
0
{
530
0
  switch (algo)
531
0
    {
532
0
    case GCRY_CIPHER_NONE:        return CIPHER_ALGO_NONE;
533
0
    case GCRY_CIPHER_IDEA:        return CIPHER_ALGO_IDEA;
534
0
    case GCRY_CIPHER_3DES:        return CIPHER_ALGO_3DES;
535
0
    case GCRY_CIPHER_CAST5:       return CIPHER_ALGO_CAST5;
536
0
    case GCRY_CIPHER_BLOWFISH:    return CIPHER_ALGO_BLOWFISH;
537
0
    case GCRY_CIPHER_AES:         return CIPHER_ALGO_AES;
538
0
    case GCRY_CIPHER_AES192:      return CIPHER_ALGO_AES192;
539
0
    case GCRY_CIPHER_AES256:      return CIPHER_ALGO_AES256;
540
0
    case GCRY_CIPHER_TWOFISH:     return CIPHER_ALGO_TWOFISH;
541
0
    case GCRY_CIPHER_CAMELLIA128: return CIPHER_ALGO_CAMELLIA128;
542
0
    case GCRY_CIPHER_CAMELLIA192: return CIPHER_ALGO_CAMELLIA192;
543
0
    case GCRY_CIPHER_CAMELLIA256: return CIPHER_ALGO_CAMELLIA256;
544
0
    default: return 0;
545
0
    }
546
0
}
547
548
549
/* Return the block length of an OpenPGP cipher algorithm.  */
550
int
551
openpgp_cipher_blocklen (cipher_algo_t algo)
552
11.4k
{
553
  /* We use the numbers from OpenPGP to be sure that we get the right
554
     block length.  This is so that the packet parsing code works even
555
     for unknown algorithms (for which we assume 8 due to tradition).
556
557
     NOTE: If you change the returned blocklen above 16, check
558
     the callers because they may use a fixed size buffer of that
559
     size. */
560
11.4k
  switch (algo)
561
11.4k
    {
562
8
    case CIPHER_ALGO_AES:
563
28
    case CIPHER_ALGO_AES192:
564
28
    case CIPHER_ALGO_AES256:
565
28
    case CIPHER_ALGO_TWOFISH:
566
28
    case CIPHER_ALGO_CAMELLIA128:
567
396
    case CIPHER_ALGO_CAMELLIA192:
568
400
    case CIPHER_ALGO_CAMELLIA256:
569
400
      return 16;
570
571
11.0k
    default:
572
11.0k
      return 8;
573
11.4k
    }
574
11.4k
}
575
576
/****************
577
 * Wrapper around the libgcrypt function with additional checks on
578
 * the OpenPGP constraints for the algo ID.
579
 */
580
int
581
openpgp_cipher_test_algo (cipher_algo_t algo)
582
0
{
583
0
  enum gcry_cipher_algos ga;
584
585
0
  ga = map_cipher_openpgp_to_gcry (algo);
586
0
  if (!ga)
587
0
    return gpg_error (GPG_ERR_CIPHER_ALGO);
588
589
0
  return gcry_cipher_test_algo (ga);
590
0
}
591
592
/* Map the OpenPGP cipher algorithm whose ID is contained in ALGORITHM to a
593
   string representation of the algorithm name.  For unknown algorithm
594
   IDs this function returns "?".  */
595
const char *
596
openpgp_cipher_algo_name (cipher_algo_t algo)
597
0
{
598
0
  switch (algo)
599
0
    {
600
0
    case CIPHER_ALGO_IDEA:        return "IDEA";
601
0
    case CIPHER_ALGO_3DES:    return "3DES";
602
0
    case CIPHER_ALGO_CAST5:   return "CAST5";
603
0
    case CIPHER_ALGO_BLOWFISH:    return "BLOWFISH";
604
0
    case CIPHER_ALGO_AES:         return "AES";
605
0
    case CIPHER_ALGO_AES192:      return "AES192";
606
0
    case CIPHER_ALGO_AES256:      return "AES256";
607
0
    case CIPHER_ALGO_TWOFISH:     return "TWOFISH";
608
0
    case CIPHER_ALGO_CAMELLIA128: return "CAMELLIA128";
609
0
    case CIPHER_ALGO_CAMELLIA192: return "CAMELLIA192";
610
0
    case CIPHER_ALGO_CAMELLIA256: return "CAMELLIA256";
611
0
    case CIPHER_ALGO_NONE:
612
0
    default: return "?";
613
0
    }
614
0
}
615
616
617
/* Same as openpgp_cipher_algo_name but returns a string in the form
618
 * "ALGO.MODE".  If AEAD is 0 "CFB" is used for the mode.  */
619
const char *
620
openpgp_cipher_algo_mode_name (cipher_algo_t algo, aead_algo_t aead)
621
0
{
622
0
  return map_static_strings ("openpgp_cipher_algo_mode_name", algo, aead,
623
0
                             openpgp_cipher_algo_name (algo),
624
0
                             ".",
625
0
                             aead? openpgp_aead_algo_name (aead) : "CFB",
626
0
                             NULL);
627
0
}
628
629
630
/* Return 0 if ALGO is supported.  Return an error if not. */
631
gpg_error_t
632
openpgp_aead_test_algo (aead_algo_t algo)
633
0
{
634
  /* FIXME: We currently have no easy way to test whether libgcrypt
635
   * implements a mode.  The only way we can do this is to open a
636
   * cipher context with that mode and close it immediately.  That is
637
   * a bit costly.  Thus in case we add another algo we need to look
638
   * at the libgcrypt version and assume nothing has been patched out.  */
639
0
  switch (algo)
640
0
    {
641
0
    case AEAD_ALGO_NONE:
642
0
      break;
643
644
0
    case AEAD_ALGO_EAX:
645
0
    case AEAD_ALGO_OCB:
646
0
      return 0;
647
0
    }
648
649
0
  return gpg_error (GPG_ERR_INV_CIPHER_MODE);
650
0
}
651
652
653
/* Map the OpenPGP AEAD algorithm with ID ALGO to a string
654
 * representation of the algorithm name.  For unknown algorithm IDs
655
 * this function returns "?".  */
656
const char *
657
openpgp_aead_algo_name (aead_algo_t algo)
658
0
{
659
0
  switch (algo)
660
0
    {
661
0
    case AEAD_ALGO_NONE:  break;
662
0
    case AEAD_ALGO_EAX:   return "EAX";
663
0
    case AEAD_ALGO_OCB:   return "OCB";
664
0
    }
665
666
0
  return "?";
667
0
}
668
669
670
/* Return information for the AEAD algorithm ALGO.  The corresponding
671
 * Libgcrypt ciphermode is stored at R_MODE and the required number of
672
 * octets for the nonce at R_NONCELEN.  On error and error code is
673
 * returned.  Note that the taglen is always 128 bits.  */
674
gpg_error_t
675
openpgp_aead_algo_info (aead_algo_t algo, enum gcry_cipher_modes *r_mode,
676
                        unsigned int *r_noncelen)
677
0
{
678
0
  switch (algo)
679
0
    {
680
0
    case AEAD_ALGO_OCB:
681
0
      *r_mode = GCRY_CIPHER_MODE_OCB;
682
0
      *r_noncelen = 15;
683
0
      break;
684
685
0
    case AEAD_ALGO_EAX:
686
0
      *r_mode = MY_GCRY_CIPHER_MODE_EAX;
687
0
      *r_noncelen = 16;
688
0
      break;
689
690
0
    default:
691
0
      log_error ("unsupported AEAD algo %d\n", algo);
692
0
      return gpg_error (GPG_ERR_INV_CIPHER_MODE);
693
0
    }
694
0
  return 0;
695
0
}
696
697
698
/* Return 0 if ALGO is a supported OpenPGP public key algorithm.  */
699
int
700
openpgp_pk_test_algo (pubkey_algo_t algo)
701
22.1k
{
702
22.1k
  return openpgp_pk_test_algo2 (algo, 0);
703
22.1k
}
704
705
706
/* Return 0 if ALGO is a supported OpenPGP public key algorithm and
707
   allows the usage USE.  */
708
int
709
openpgp_pk_test_algo2 (pubkey_algo_t algo, unsigned int use)
710
22.1k
{
711
22.1k
  enum gcry_pk_algos ga = 0;
712
22.1k
  size_t use_buf = use;
713
714
22.1k
  switch (algo)
715
22.1k
    {
716
0
#ifdef GPG_USE_RSA
717
1.11k
    case PUBKEY_ALGO_RSA:       ga = GCRY_PK_RSA;   break;
718
466
    case PUBKEY_ALGO_RSA_E:     ga = GCRY_PK_RSA_E; break;
719
395
    case PUBKEY_ALGO_RSA_S:     ga = GCRY_PK_RSA_S; break;
720
#else
721
    case PUBKEY_ALGO_RSA:       break;
722
    case PUBKEY_ALGO_RSA_E:     break;
723
    case PUBKEY_ALGO_RSA_S:     break;
724
#endif
725
726
2.56k
    case PUBKEY_ALGO_ELGAMAL_E: ga = GCRY_PK_ELG;   break;
727
2
    case PUBKEY_ALGO_DSA:       ga = GCRY_PK_DSA;   break;
728
729
0
#ifdef GPG_USE_ECDH
730
3.99k
    case PUBKEY_ALGO_ECDH:      ga = GCRY_PK_ECC;   break;
731
#else
732
    case PUBKEY_ALGO_ECDH:      break;
733
#endif
734
735
0
#ifdef GPG_USE_ECDSA
736
1.95k
    case PUBKEY_ALGO_ECDSA:     ga = GCRY_PK_ECC;   break;
737
#else
738
    case PUBKEY_ALGO_ECDSA:     break;
739
#endif
740
741
0
#ifdef GPG_USE_EDDSA
742
11.0k
    case PUBKEY_ALGO_EDDSA:     ga = GCRY_PK_ECC;   break;
743
#else
744
    case PUBKEY_ALGO_EDDSA:     break;
745
#endif
746
747
0
    case PUBKEY_ALGO_ELGAMAL:
748
      /* Don't allow type 20 keys unless in rfc2440 mode.  */
749
0
      if (RFC2440)
750
0
        ga = GCRY_PK_ELG;
751
0
      break;
752
753
0
    case PUBKEY_ALGO_KYBER:     ga = GCRY_PK_KEM; break;
754
755
623
    default:
756
623
      break;
757
22.1k
    }
758
22.1k
  if (!ga)
759
623
    return gpg_error (GPG_ERR_PUBKEY_ALGO);
760
761
  /* Elgamal in OpenPGP used to support signing and Libgcrypt still
762
   * does.  However, we removed the signing capability from gpg ages
763
   * ago.  This function should reflect this so that errors are thrown
764
   * early and not only when we try to sign using Elgamal.  */
765
21.5k
  if (ga == GCRY_PK_ELG && (use & (PUBKEY_USAGE_CERT | PUBKEY_USAGE_SIG)))
766
0
    return gpg_error (GPG_ERR_WRONG_PUBKEY_ALGO);
767
768
  /* Now check whether Libgcrypt has support for the algorithm.  */
769
21.5k
  return gcry_pk_algo_info (ga, GCRYCTL_TEST_ALGO, NULL, &use_buf);
770
21.5k
}
771
772
773
int
774
openpgp_pk_algo_usage ( int algo )
775
0
{
776
0
    int use = 0;
777
778
    /* They are hardwired in gpg 1.0. */
779
0
    switch ( algo ) {
780
0
      case PUBKEY_ALGO_RSA:
781
0
          use = (PUBKEY_USAGE_CERT | PUBKEY_USAGE_SIG
782
0
                 | PUBKEY_USAGE_ENC | PUBKEY_USAGE_RENC | PUBKEY_USAGE_AUTH);
783
0
          break;
784
0
      case PUBKEY_ALGO_RSA_E:
785
0
      case PUBKEY_ALGO_ECDH:
786
0
          use = PUBKEY_USAGE_ENC | PUBKEY_USAGE_RENC;
787
0
          break;
788
0
      case PUBKEY_ALGO_RSA_S:
789
0
          use = PUBKEY_USAGE_CERT | PUBKEY_USAGE_SIG;
790
0
          break;
791
0
      case PUBKEY_ALGO_ELGAMAL:
792
0
          if (RFC2440)
793
0
             use = PUBKEY_USAGE_ENC | PUBKEY_USAGE_RENC;
794
0
          break;
795
0
      case PUBKEY_ALGO_ELGAMAL_E:
796
0
          use = PUBKEY_USAGE_ENC | PUBKEY_USAGE_RENC;
797
0
          break;
798
0
      case PUBKEY_ALGO_DSA:
799
0
          use = PUBKEY_USAGE_CERT | PUBKEY_USAGE_SIG | PUBKEY_USAGE_AUTH;
800
0
          break;
801
0
      case PUBKEY_ALGO_ECDSA:
802
0
      case PUBKEY_ALGO_EDDSA:
803
0
          use = PUBKEY_USAGE_CERT | PUBKEY_USAGE_SIG | PUBKEY_USAGE_AUTH;
804
0
          break;
805
806
0
      case PUBKEY_ALGO_KYBER:
807
0
          use = PUBKEY_USAGE_ENC | PUBKEY_USAGE_RENC;
808
0
          break;
809
810
0
      case PUBKEY_ALGO_DIL3_25519:
811
0
      case PUBKEY_ALGO_DIL5_448:
812
0
      case PUBKEY_ALGO_SPHINX_SHA2:
813
0
          use = PUBKEY_USAGE_CERT | PUBKEY_USAGE_SIG;
814
0
          break;
815
816
0
      default:
817
0
          break;
818
0
    }
819
0
    return use;
820
0
}
821
822
/* Map the OpenPGP pubkey algorithm whose ID is contained in ALGO to a
823
   string representation of the algorithm name.  For unknown algorithm
824
   IDs this function returns "?".  */
825
const char *
826
openpgp_pk_algo_name (pubkey_algo_t algo)
827
106k
{
828
106k
  switch (algo)
829
106k
    {
830
1.13k
    case PUBKEY_ALGO_RSA:
831
1.59k
    case PUBKEY_ALGO_RSA_E:
832
1.99k
    case PUBKEY_ALGO_RSA_S:     return "RSA";
833
6
    case PUBKEY_ALGO_ELGAMAL:
834
3.64k
    case PUBKEY_ALGO_ELGAMAL_E: return "ELG";
835
577
    case PUBKEY_ALGO_DSA:       return "DSA";
836
4.01k
    case PUBKEY_ALGO_ECDH:      return "ECDH";
837
1.96k
    case PUBKEY_ALGO_ECDSA:     return "ECDSA";
838
11.0k
    case PUBKEY_ALGO_EDDSA:     return "EDDSA";
839
1
    case PUBKEY_ALGO_KYBER:     return "Kyber";
840
82.8k
    default: return "?";
841
106k
    }
842
106k
}
843
844
845
/* Explicit mapping of OpenPGP digest algos to Libgcrypt.  */
846
/* FIXME: We do not yes use it everywhere.  */
847
enum gcry_md_algos
848
map_md_openpgp_to_gcry (digest_algo_t algo)
849
254k
{
850
254k
  switch (algo)
851
254k
    {
852
0
#ifdef GPG_USE_MD5
853
51.3k
    case DIGEST_ALGO_MD5:    return GCRY_MD_MD5;
854
#else
855
    case DIGEST_ALGO_MD5:    return 0;
856
#endif
857
858
3.29k
    case DIGEST_ALGO_SHA1:   return GCRY_MD_SHA1;
859
860
0
#ifdef GPG_USE_RMD160
861
13.1k
    case DIGEST_ALGO_RMD160: return GCRY_MD_RMD160;
862
#else
863
    case DIGEST_ALGO_RMD160: return 0;
864
#endif
865
866
0
#ifdef GPG_USE_SHA224
867
1.35k
    case DIGEST_ALGO_SHA224: return GCRY_MD_SHA224;
868
#else
869
    case DIGEST_ALGO_SHA224: return 0;
870
#endif
871
872
1.64k
    case DIGEST_ALGO_SHA256: return GCRY_MD_SHA256;
873
874
0
#ifdef GPG_USE_SHA384
875
4.91k
    case DIGEST_ALGO_SHA384: return GCRY_MD_SHA384;
876
#else
877
    case DIGEST_ALGO_SHA384: return 0;
878
#endif
879
880
0
#ifdef GPG_USE_SHA512
881
7.82k
    case DIGEST_ALGO_SHA512: return GCRY_MD_SHA512;
882
#else
883
    case DIGEST_ALGO_SHA512: return 0;
884
#endif
885
171k
    default: return 0;
886
254k
    }
887
254k
}
888
889
890
/* Return 0 if ALGO is suitable and implemented OpenPGP hash
891
   algorithm.  */
892
int
893
openpgp_md_test_algo (digest_algo_t algo)
894
241k
{
895
241k
  enum gcry_md_algos ga;
896
897
241k
  ga = map_md_openpgp_to_gcry (algo);
898
241k
  if (!ga)
899
171k
    return gpg_error (GPG_ERR_DIGEST_ALGO);
900
901
70.3k
  return gcry_md_test_algo (ga);
902
241k
}
903
904
905
/* Map the OpenPGP digest algorithm whose ID is contained in ALGO to a
906
   string representation of the algorithm name.  For unknown algorithm
907
   IDs this function returns "?".  */
908
const char *
909
openpgp_md_algo_name (int algo)
910
0
{
911
0
  switch (algo)
912
0
    {
913
0
    case DIGEST_ALGO_MD5:    return "MD5";
914
0
    case DIGEST_ALGO_SHA1:   return "SHA1";
915
0
    case DIGEST_ALGO_RMD160: return "RIPEMD160";
916
0
    case DIGEST_ALGO_SHA256: return "SHA256";
917
0
    case DIGEST_ALGO_SHA384: return "SHA384";
918
0
    case DIGEST_ALGO_SHA512: return "SHA512";
919
0
    case DIGEST_ALGO_SHA224: return "SHA224";
920
0
    }
921
0
  return "?";
922
0
}
923
924
925
static unsigned long
926
get_signature_count (PKT_public_key *pk)
927
0
{
928
#ifdef ENABLE_CARD_SUPPORT
929
  struct agent_card_info_s info;
930
931
  (void)pk;
932
  if (!agent_scd_getattr ("SIG-COUNTER",&info))
933
    return info.sig_counter;
934
  else
935
    return 0;
936
#else
937
0
  (void)pk;
938
0
  return 0;
939
0
#endif
940
0
}
941
942
/* Expand %-strings.  Returns a string which must be xfreed.  Returns
943
   NULL if the string cannot be expanded (too large). */
944
char *
945
pct_expando (ctrl_t ctrl, const char *string,struct expando_args *args)
946
0
{
947
0
  const char *ch=string;
948
0
  int idx=0,maxlen=0,done=0;
949
0
  u32 pk_keyid[2]={0,0},sk_keyid[2]={0,0};
950
0
  char *ret=NULL;
951
952
  /* The parser below would return NULL for an empty string, thus we
953
   * catch it here.  Also catch NULL here. */
954
0
  if (!string || !*string)
955
0
    return xstrdup ("");
956
957
0
  if(args->pk)
958
0
    keyid_from_pk(args->pk,pk_keyid);
959
960
0
  if(args->pksk)
961
0
    keyid_from_pk (args->pksk, sk_keyid);
962
963
  /* This is used so that %k works in photoid command strings in
964
     --list-secret-keys (which of course has a sk, but no pk). */
965
0
  if(!args->pk && args->pksk)
966
0
    keyid_from_pk (args->pksk, pk_keyid);
967
968
0
  while(*ch!='\0')
969
0
    {
970
0
      if(!done)
971
0
  {
972
    /* 8192 is way bigger than we'll need here */
973
0
    if(maxlen>=8192)
974
0
      goto fail;
975
976
0
    maxlen+=1024;
977
0
    ret=xrealloc(ret,maxlen);
978
0
  }
979
980
0
      done=0;
981
982
0
      if(*ch=='%')
983
0
  {
984
0
    switch(*(ch+1))
985
0
      {
986
0
      case 's': /* short key id */
987
0
        if(idx+8<maxlen)
988
0
    {
989
0
      sprintf(&ret[idx],"%08lX",(ulong)sk_keyid[1]);
990
0
      idx+=8;
991
0
      done=1;
992
0
    }
993
0
        break;
994
995
0
      case 'S': /* long key id */
996
0
        if(idx+16<maxlen)
997
0
    {
998
0
      sprintf(&ret[idx],"%08lX%08lX",
999
0
        (ulong)sk_keyid[0],(ulong)sk_keyid[1]);
1000
0
      idx+=16;
1001
0
      done=1;
1002
0
    }
1003
0
        break;
1004
1005
0
      case 'k': /* short key id */
1006
0
        if(idx+8<maxlen)
1007
0
    {
1008
0
      sprintf(&ret[idx],"%08lX",(ulong)pk_keyid[1]);
1009
0
      idx+=8;
1010
0
      done=1;
1011
0
    }
1012
0
        break;
1013
1014
0
      case 'K': /* long key id */
1015
0
        if(idx+16<maxlen)
1016
0
    {
1017
0
      sprintf(&ret[idx],"%08lX%08lX",
1018
0
        (ulong)pk_keyid[0],(ulong)pk_keyid[1]);
1019
0
      idx+=16;
1020
0
      done=1;
1021
0
    }
1022
0
        break;
1023
1024
0
      case 'U': /* z-base-32 encoded user id hash. */
1025
0
              if (args->namehash)
1026
0
                {
1027
0
                  char *tmp = zb32_encode (args->namehash, 8*20);
1028
0
                  if (tmp)
1029
0
                    {
1030
0
                      if (idx + strlen (tmp) < maxlen)
1031
0
                        {
1032
0
                          strcpy (ret+idx, tmp);
1033
0
                          idx += strlen (tmp);
1034
0
                        }
1035
0
                      xfree (tmp);
1036
0
                      done = 1;
1037
0
                    }
1038
0
                }
1039
0
        break;
1040
1041
0
      case 'c': /* signature count from card, if any. */
1042
0
        if(idx+10<maxlen)
1043
0
    {
1044
0
      sprintf (&ret[idx],"%lu", get_signature_count (args->pksk));
1045
0
      idx+=strlen(&ret[idx]);
1046
0
      done=1;
1047
0
    }
1048
0
        break;
1049
1050
0
      case 'f': /* Fingerprint of key being signed */
1051
0
      case 'p': /* Fingerprint of the primary key making the signature. */
1052
0
      case 'g': /* Fingerprint of the key making the signature.  */
1053
0
        {
1054
0
    byte array[MAX_FINGERPRINT_LEN];
1055
0
    size_t len;
1056
0
    int i;
1057
1058
0
    if ((*(ch+1))=='f' && args->pk)
1059
0
      fingerprint_from_pk (args->pk, array, &len);
1060
0
    else if ((*(ch+1))=='p' && args->pksk)
1061
0
      {
1062
0
        if(args->pksk->flags.primary)
1063
0
          fingerprint_from_pk (args->pksk, array, &len);
1064
0
        else if (args->pksk->main_keyid[0]
1065
0
                             || args->pksk->main_keyid[1])
1066
0
          {
1067
                        /* Not the primary key: Find the fingerprint
1068
                           of the primary key.  */
1069
0
      PKT_public_key *pk=
1070
0
        xmalloc_clear(sizeof(PKT_public_key));
1071
1072
0
      if (!get_pubkey_fast (ctrl, pk,args->pksk->main_keyid))
1073
0
        fingerprint_from_pk (pk, array, &len);
1074
0
      else
1075
0
        memset (array, 0, (len=MAX_FINGERPRINT_LEN));
1076
0
      free_public_key (pk);
1077
0
          }
1078
0
        else /* Oops: info about the primary key missing.  */
1079
0
          memset(array,0,(len=MAX_FINGERPRINT_LEN));
1080
0
      }
1081
0
    else if((*(ch+1))=='g' && args->pksk)
1082
0
      fingerprint_from_pk (args->pksk, array, &len);
1083
0
    else
1084
0
      memset(array,0,(len=MAX_FINGERPRINT_LEN));
1085
1086
0
    if(idx+(len*2)<maxlen)
1087
0
      {
1088
0
        for(i=0;i<len;i++)
1089
0
          {
1090
0
      sprintf(&ret[idx],"%02X",array[i]);
1091
0
      idx+=2;
1092
0
          }
1093
0
        done=1;
1094
0
      }
1095
0
        }
1096
0
        break;
1097
1098
0
      case 'v': /* validity letters */
1099
0
        if(args->validity_info && idx+1<maxlen)
1100
0
    {
1101
0
      ret[idx++]=args->validity_info;
1102
0
      ret[idx]='\0';
1103
0
      done=1;
1104
0
    }
1105
0
        break;
1106
1107
        /* The text string types */
1108
0
      case 't':
1109
0
      case 'T':
1110
0
      case 'V':
1111
0
        {
1112
0
    const char *str=NULL;
1113
1114
0
    switch(*(ch+1))
1115
0
      {
1116
0
      case 't': /* e.g. "jpg" */
1117
0
        str=image_type_to_string(args->imagetype,0);
1118
0
        break;
1119
1120
0
      case 'T': /* e.g. "image/jpeg" */
1121
0
        str=image_type_to_string(args->imagetype,2);
1122
0
        break;
1123
1124
0
      case 'V': /* e.g. "full", "expired", etc. */
1125
0
        str=args->validity_string;
1126
0
        break;
1127
0
      }
1128
1129
0
    if(str && idx+strlen(str)<maxlen)
1130
0
      {
1131
0
        strcpy(&ret[idx],str);
1132
0
        idx+=strlen(str);
1133
0
        done=1;
1134
0
      }
1135
0
        }
1136
0
        break;
1137
1138
0
      case '%':
1139
0
        if(idx+1<maxlen)
1140
0
    {
1141
0
      ret[idx++]='%';
1142
0
      ret[idx]='\0';
1143
0
      done=1;
1144
0
    }
1145
0
        break;
1146
1147
        /* Any unknown %-keys (like %i, %o, %I, and %O) are
1148
     passed through for later expansion.  Note this also
1149
     handles the case where the last character in the
1150
     string is a '%' - the terminating \0 will end up here
1151
     and properly terminate the string. */
1152
0
      default:
1153
0
        if(idx+2<maxlen)
1154
0
    {
1155
0
      ret[idx++]='%';
1156
0
      ret[idx++]=*(ch+1);
1157
0
      ret[idx]='\0';
1158
0
      done=1;
1159
0
    }
1160
0
        break;
1161
0
        }
1162
1163
0
    if(done)
1164
0
      ch++;
1165
0
  }
1166
0
      else
1167
0
  {
1168
0
    if(idx+1<maxlen)
1169
0
      {
1170
0
        ret[idx++]=*ch;
1171
0
        ret[idx]='\0';
1172
0
        done=1;
1173
0
      }
1174
0
  }
1175
1176
0
      if(done)
1177
0
  ch++;
1178
0
    }
1179
1180
0
  return ret;
1181
1182
0
 fail:
1183
0
  xfree(ret);
1184
0
  return NULL;
1185
0
}
1186
1187
void
1188
deprecated_warning(const char *configname,unsigned int configlineno,
1189
       const char *option,const char *repl1,const char *repl2)
1190
0
{
1191
0
  if(configname)
1192
0
    {
1193
0
      if(strncmp("--",option,2)==0)
1194
0
  option+=2;
1195
1196
0
      if(strncmp("--",repl1,2)==0)
1197
0
  repl1+=2;
1198
1199
0
      log_info(_("%s:%d: deprecated option \"%s\"\n"),
1200
0
         configname,configlineno,option);
1201
0
    }
1202
0
  else
1203
0
    log_info(_("WARNING: \"%s\" is a deprecated option\n"),option);
1204
1205
0
  log_info(_("please use \"%s%s\" instead\n"),repl1,repl2);
1206
0
}
1207
1208
1209
void
1210
deprecated_command (const char *name)
1211
0
{
1212
0
  log_info(_("WARNING: \"%s\" is a deprecated command - do not use it\n"),
1213
0
           name);
1214
0
}
1215
1216
1217
void
1218
obsolete_scdaemon_option (const char *configname, unsigned int configlineno,
1219
                          const char *name)
1220
0
{
1221
0
  if (configname)
1222
0
    log_info (_("%s:%u: \"%s\" is obsolete in this file"
1223
0
                " - it only has effect in %s\n"),
1224
0
              configname, configlineno, name, SCDAEMON_NAME EXTSEP_S "conf");
1225
0
  else
1226
0
    log_info (_("WARNING: \"%s%s\" is an obsolete option"
1227
0
                " - it has no effect except on %s\n"),
1228
0
              "--", name, SCDAEMON_NAME);
1229
0
}
1230
1231
1232
/*
1233
 * Wrapper around gcry_cipher_map_name to provide a fallback using the
1234
 * "Sn" syntax as used by the preference strings.  Note that only the
1235
 * second syntax does a check on the actual availibily of the
1236
 * algorithm.  That might make a difference in case Libgcrypt is
1237
 * running in FIPS mode.
1238
 */
1239
int
1240
string_to_cipher_algo (const char *string)
1241
0
{
1242
0
  int val;
1243
1244
0
  val = map_cipher_gcry_to_openpgp (gcry_cipher_map_name (string));
1245
0
  if (!val && string && (string[0]=='S' || string[0]=='s'))
1246
0
    {
1247
0
      char *endptr;
1248
1249
0
      string++;
1250
0
      val = strtol (string, &endptr, 10);
1251
0
      if (!*string || *endptr || openpgp_cipher_test_algo (val))
1252
0
        val = 0;
1253
0
    }
1254
1255
0
  return val;
1256
0
}
1257
1258
1259
/*
1260
 * Map an AEAD mode string to a an AEAD algorithm number as defined by
1261
 * rfc4880bis.  Also support the "An" syntax as used by the preference
1262
 * strings.
1263
 */
1264
aead_algo_t
1265
string_to_aead_algo (const char *string)
1266
0
{
1267
0
  int result;
1268
1269
0
  if (!string)
1270
0
    result = 0;
1271
0
  else if (!ascii_strcasecmp (string, "EAX"))
1272
0
    result = 1;
1273
0
  else if (!ascii_strcasecmp (string, "OCB"))
1274
0
    result = 2;
1275
0
  else if ((string[0]=='A' || string[0]=='a'))
1276
0
    {
1277
0
      char *endptr;
1278
1279
0
      string++;
1280
0
      result = strtol (string, &endptr, 10);
1281
0
      if (!*string || *endptr || result < 1 || result > 2)
1282
0
        result = 0;
1283
0
    }
1284
0
  else
1285
0
    result = 0;
1286
1287
0
  return result;
1288
0
}
1289
1290
1291
/*
1292
 * Wrapper around gcry_md_map_name to provide a fallback using the
1293
 * "Hn" syntax as used by the preference strings.
1294
 */
1295
int
1296
string_to_digest_algo (const char *string)
1297
0
{
1298
0
  int val;
1299
1300
  /* FIXME: We should make use of our wrapper function and not assume
1301
     that there is a 1 to 1 mapping between OpenPGP and Libgcrypt.  */
1302
0
  val = gcry_md_map_name (string);
1303
0
  if (!val && string && (string[0]=='H' || string[0]=='h'))
1304
0
    {
1305
0
      char *endptr;
1306
1307
0
      string++;
1308
0
      val = strtol (string, &endptr, 10);
1309
0
      if (!*string || *endptr || openpgp_md_test_algo (val))
1310
0
        val = 0;
1311
0
    }
1312
1313
0
  return val;
1314
0
}
1315
1316
1317
1318
const char *
1319
compress_algo_to_string(int algo)
1320
0
{
1321
0
  const char *s=NULL;
1322
1323
0
  switch(algo)
1324
0
    {
1325
0
    case COMPRESS_ALGO_NONE:
1326
0
      s=_("Uncompressed");
1327
0
      break;
1328
1329
0
    case COMPRESS_ALGO_ZIP:
1330
0
      s="ZIP";
1331
0
      break;
1332
1333
0
    case COMPRESS_ALGO_ZLIB:
1334
0
      s="ZLIB";
1335
0
      break;
1336
1337
#ifdef HAVE_BZIP2
1338
    case COMPRESS_ALGO_BZIP2:
1339
      s="BZIP2";
1340
      break;
1341
#endif
1342
0
    }
1343
1344
0
  return s;
1345
0
}
1346
1347
int
1348
string_to_compress_algo(const char *string)
1349
0
{
1350
  /* TRANSLATORS: See doc/TRANSLATE about this string. */
1351
0
  if(match_multistr(_("uncompressed|none"),string))
1352
0
    return 0;
1353
0
  else if(ascii_strcasecmp(string,"uncompressed")==0)
1354
0
    return 0;
1355
0
  else if(ascii_strcasecmp(string,"none")==0)
1356
0
    return 0;
1357
0
  else if(ascii_strcasecmp(string,"zip")==0)
1358
0
    return 1;
1359
0
  else if(ascii_strcasecmp(string,"zlib")==0)
1360
0
    return 2;
1361
#ifdef HAVE_BZIP2
1362
  else if(ascii_strcasecmp(string,"bzip2")==0)
1363
    return 3;
1364
#endif
1365
0
  else if(ascii_strcasecmp(string,"z0")==0)
1366
0
    return 0;
1367
0
  else if(ascii_strcasecmp(string,"z1")==0)
1368
0
    return 1;
1369
0
  else if(ascii_strcasecmp(string,"z2")==0)
1370
0
    return 2;
1371
#ifdef HAVE_BZIP2
1372
  else if(ascii_strcasecmp(string,"z3")==0)
1373
    return 3;
1374
#endif
1375
0
  else
1376
0
    return -1;
1377
0
}
1378
1379
int
1380
check_compress_algo(int algo)
1381
496k
{
1382
496k
  switch (algo)
1383
496k
    {
1384
495k
    case 0: return 0;
1385
#ifdef HAVE_ZIP
1386
    case 1:
1387
    case 2: return 0;
1388
#endif
1389
#ifdef HAVE_BZIP2
1390
    case 3: return 0;
1391
#endif
1392
387
    default: return GPG_ERR_COMPR_ALGO;
1393
496k
    }
1394
496k
}
1395
1396
int
1397
default_cipher_algo(void)
1398
0
{
1399
0
  if(opt.def_cipher_algo)
1400
0
    return opt.def_cipher_algo;
1401
0
  else if(opt.personal_cipher_prefs)
1402
0
    return opt.personal_cipher_prefs[0].value;
1403
0
  else
1404
0
    return opt.s2k_cipher_algo;
1405
0
}
1406
1407
1408
/* There is no default_digest_algo function, but see
1409
   sign.c:hash_for() */
1410
1411
int
1412
default_compress_algo(void)
1413
0
{
1414
0
  if(opt.compress_algo!=-1)
1415
0
    return opt.compress_algo;
1416
0
  else if(opt.personal_compress_prefs)
1417
0
    return opt.personal_compress_prefs[0].value;
1418
0
  else
1419
0
    return DEFAULT_COMPRESS_ALGO;
1420
0
}
1421
1422
1423
void
1424
compliance_failure(void)
1425
0
{
1426
0
  char *ver="???";
1427
1428
0
  switch(opt.compliance)
1429
0
    {
1430
0
    case CO_GNUPG:
1431
0
      ver="GnuPG";
1432
0
      break;
1433
1434
0
    case CO_RFC4880:
1435
0
      ver="OpenPGP";
1436
0
      break;
1437
1438
0
    case CO_RFC2440:
1439
0
      ver="OpenPGP (older)";
1440
0
      break;
1441
1442
0
    case CO_PGP7:
1443
0
      ver="PGP 7.x";
1444
0
      break;
1445
1446
0
    case CO_PGP8:
1447
0
      ver="PGP 8.x";
1448
0
      break;
1449
1450
0
    case CO_DE_VS:
1451
0
      ver="DE-VS applications";
1452
0
      break;
1453
0
    }
1454
1455
0
  log_info(_("this message may not be usable by %s\n"),ver);
1456
0
  opt.compliance=CO_GNUPG;
1457
0
}
1458
1459
/* Break a string into successive option pieces.  Accepts single word
1460
   options and key=value argument options. */
1461
char *
1462
optsep(char **stringp)
1463
0
{
1464
0
  char *tok,*end;
1465
1466
0
  tok=*stringp;
1467
0
  if(tok)
1468
0
    {
1469
0
      end=strpbrk(tok," ,=");
1470
0
      if(end)
1471
0
  {
1472
0
    int sawequals=0;
1473
0
    char *ptr=end;
1474
1475
    /* what we need to do now is scan along starting with *end,
1476
       If the next character we see (ignoring spaces) is an =
1477
       sign, then there is an argument. */
1478
1479
0
    while(*ptr)
1480
0
      {
1481
0
        if(*ptr=='=')
1482
0
    sawequals=1;
1483
0
        else if(*ptr!=' ')
1484
0
    break;
1485
0
        ptr++;
1486
0
      }
1487
1488
    /* There is an argument, so grab that too.  At this point,
1489
       ptr points to the first character of the argument. */
1490
0
    if(sawequals)
1491
0
      {
1492
        /* Is it a quoted argument? */
1493
0
        if(*ptr=='"')
1494
0
    {
1495
0
      ptr++;
1496
0
      end=strchr(ptr,'"');
1497
0
      if(end)
1498
0
        end++;
1499
0
    }
1500
0
        else
1501
0
    end=strpbrk(ptr," ,");
1502
0
      }
1503
1504
0
    if(end && *end)
1505
0
      {
1506
0
        *end='\0';
1507
0
        *stringp=end+1;
1508
0
      }
1509
0
    else
1510
0
      *stringp=NULL;
1511
0
  }
1512
0
      else
1513
0
  *stringp=NULL;
1514
0
    }
1515
1516
0
  return tok;
1517
0
}
1518
1519
/* Breaks an option value into key and value.  Returns NULL if there
1520
   is no value.  Note that "string" is modified to remove the =value
1521
   part. */
1522
char *
1523
argsplit(char *string)
1524
0
{
1525
0
  char *equals,*arg=NULL;
1526
1527
0
  equals=strchr(string,'=');
1528
0
  if(equals)
1529
0
    {
1530
0
      char *quote,*space;
1531
1532
0
      *equals='\0';
1533
0
      arg=equals+1;
1534
1535
      /* Quoted arg? */
1536
0
      quote=strchr(arg,'"');
1537
0
      if(quote)
1538
0
  {
1539
0
    arg=quote+1;
1540
1541
0
    quote=strchr(arg,'"');
1542
0
    if(quote)
1543
0
      *quote='\0';
1544
0
  }
1545
0
      else
1546
0
  {
1547
0
    size_t spaces;
1548
1549
    /* Trim leading spaces off of the arg */
1550
0
    spaces=strspn(arg," ");
1551
0
    arg+=spaces;
1552
0
  }
1553
1554
      /* Trim tailing spaces off of the tag */
1555
0
      space=strchr(string,' ');
1556
0
      if(space)
1557
0
  *space='\0';
1558
0
    }
1559
1560
0
  return arg;
1561
0
}
1562
1563
/* Return the length of the initial token, leaving off any
1564
   argument. */
1565
static size_t
1566
optlen(const char *s)
1567
0
{
1568
0
  char *end=strpbrk(s," =");
1569
1570
0
  if(end)
1571
0
    return end-s;
1572
0
  else
1573
0
    return strlen(s);
1574
0
}
1575
1576
1577
/* Note: This function returns true on success.  */
1578
int
1579
parse_options(char *str,unsigned int *options,
1580
        struct parse_options *opts,int noisy)
1581
0
{
1582
0
  char *tok;
1583
1584
0
  if (str && (!strcmp (str, "help")
1585
0
              || !strcmp (str, "full-help") || !strcmp (str, "fullhelp")))
1586
0
    {
1587
0
      int i,maxlen=0;
1588
0
      int full = *str == 'f';
1589
0
      int set;
1590
1591
      /* Figure out the longest option name so we can line these up
1592
   neatly. */
1593
0
      for(i=0;opts[i].name;i++)
1594
0
  if((full || opts[i].help) && maxlen<strlen(opts[i].name))
1595
0
    maxlen=strlen(opts[i].name);
1596
1597
0
      for(i=0;opts[i].name;i++)
1598
0
        if(opts[i].help)
1599
0
          {
1600
0
            set = (*options & opts[i].bit);
1601
0
            es_printf("%s%*s%s%s%s%s\n",opts[i].name,
1602
0
                      maxlen+2-(int)strlen(opts[i].name),"",_(opts[i].help),
1603
0
                      set?"  [":"", set? _("enabled"):"", set?"]":"");
1604
0
          }
1605
1606
0
      if (full)
1607
0
        for (i=0; opts[i].name; i++)
1608
0
          if(!opts[i].help)
1609
0
            {
1610
0
              set = (*options & opts[i].bit);
1611
0
              es_printf("%s%*s%s%s%s\n",opts[i].name,
1612
0
                        set? (maxlen+2-(int)strlen(opts[i].name)):0,"",
1613
0
                        set?"[":"", set? _("enabled"):"", set?"]":"");
1614
0
            }
1615
1616
0
      g10_exit(0);
1617
0
    }
1618
1619
0
  while((tok=optsep(&str)))
1620
0
    {
1621
0
      int i,rev=0;
1622
0
      char *otok=tok;
1623
1624
0
      if(tok[0]=='\0')
1625
0
  continue;
1626
1627
0
      if(ascii_strncasecmp("no-",tok,3)==0)
1628
0
  {
1629
0
    rev=1;
1630
0
    tok+=3;
1631
0
  }
1632
1633
0
      for(i=0;opts[i].name;i++)
1634
0
  {
1635
0
    size_t toklen=optlen(tok);
1636
1637
0
    if(ascii_strncasecmp(opts[i].name,tok,toklen)==0)
1638
0
      {
1639
        /* We have a match, but it might be incomplete */
1640
0
        if(toklen!=strlen(opts[i].name))
1641
0
    {
1642
0
      int j;
1643
1644
0
      for(j=i+1;opts[j].name;j++)
1645
0
        {
1646
0
          if(ascii_strncasecmp(opts[j].name,tok,toklen)==0)
1647
0
      {
1648
0
        if(noisy)
1649
0
          log_info(_("ambiguous option '%s'\n"),otok);
1650
0
        return 0;
1651
0
      }
1652
0
        }
1653
0
    }
1654
1655
0
        if(rev)
1656
0
    {
1657
0
      *options&=~opts[i].bit;
1658
0
      if(opts[i].value)
1659
0
        *opts[i].value=NULL;
1660
0
    }
1661
0
        else
1662
0
    {
1663
0
      *options|=opts[i].bit;
1664
0
      if(opts[i].value)
1665
0
        *opts[i].value=argsplit(tok);
1666
0
    }
1667
0
        break;
1668
0
      }
1669
0
  }
1670
1671
0
      if(!opts[i].name)
1672
0
  {
1673
0
    if(noisy)
1674
0
      log_info(_("unknown option '%s'\n"),otok);
1675
0
    return 0;
1676
0
  }
1677
0
    }
1678
1679
0
  return 1;
1680
0
}
1681
1682
1683
/* Similar to access(2), but uses PATH to find the file. */
1684
int
1685
path_access(const char *file,int mode)
1686
0
{
1687
0
  char *envpath;
1688
0
  int ret=-1;
1689
1690
0
  envpath=getenv("PATH");
1691
1692
0
  if(!envpath
1693
#ifdef HAVE_DRIVE_LETTERS
1694
     || (((file[0]>='A' && file[0]<='Z')
1695
    || (file[0]>='a' && file[0]<='z'))
1696
   && file[1]==':')
1697
#else
1698
0
     || file[0]=='/'
1699
0
#endif
1700
0
     )
1701
0
    return access(file,mode);
1702
0
  else
1703
0
    {
1704
      /* At least as large as, but most often larger than we need. */
1705
0
      char *buffer=xmalloc(strlen(envpath)+1+strlen(file)+1);
1706
0
      char *split,*item,*path=xstrdup(envpath);
1707
1708
0
      split=path;
1709
1710
0
      while((item=strsep(&split,PATHSEP_S)))
1711
0
  {
1712
0
    strcpy(buffer,item);
1713
0
    strcat(buffer,"/");
1714
0
    strcat(buffer,file);
1715
0
    ret=access(buffer,mode);
1716
0
    if(ret==0)
1717
0
      break;
1718
0
  }
1719
1720
0
      xfree(path);
1721
0
      xfree(buffer);
1722
0
    }
1723
1724
0
  return ret;
1725
0
}
1726
1727
1728

1729
/* Return the number of public key parameters as used by OpenPGP.  */
1730
int
1731
pubkey_get_npkey (pubkey_algo_t algo)
1732
278k
{
1733
278k
  switch (algo)
1734
278k
    {
1735
61.2k
    case PUBKEY_ALGO_RSA:
1736
62.3k
    case PUBKEY_ALGO_RSA_E:
1737
62.3k
    case PUBKEY_ALGO_RSA_S:     return 2;
1738
12.6k
    case PUBKEY_ALGO_ELGAMAL_E: return 3;
1739
76
    case PUBKEY_ALGO_DSA:       return 4;
1740
5.16k
    case PUBKEY_ALGO_ECDH:      return 3;
1741
15.4k
    case PUBKEY_ALGO_ECDSA:     return 2;
1742
854
    case PUBKEY_ALGO_ELGAMAL:   return 3;
1743
3.31k
    case PUBKEY_ALGO_EDDSA:     return 2;
1744
208
    case PUBKEY_ALGO_KYBER:     return 3;
1745
178k
    default: return 0;
1746
278k
    }
1747
278k
}
1748
1749
1750
/* Return the number of secret key parameters as used by OpenPGP.  */
1751
int
1752
pubkey_get_nskey (pubkey_algo_t algo)
1753
133k
{
1754
133k
  switch (algo)
1755
133k
    {
1756
89.9k
    case PUBKEY_ALGO_RSA:
1757
92.0k
    case PUBKEY_ALGO_RSA_E:
1758
92.1k
    case PUBKEY_ALGO_RSA_S:     return 6;
1759
3.18k
    case PUBKEY_ALGO_ELGAMAL_E: return 4;
1760
110
    case PUBKEY_ALGO_DSA:       return 5;
1761
503
    case PUBKEY_ALGO_ECDH:      return 4;
1762
13.5k
    case PUBKEY_ALGO_ECDSA:     return 3;
1763
1.69k
    case PUBKEY_ALGO_ELGAMAL:   return 4;
1764
5.49k
    case PUBKEY_ALGO_EDDSA:     return 3;
1765
108
    case PUBKEY_ALGO_KYBER:     return 5;
1766
16.3k
    default: return 0;
1767
133k
    }
1768
133k
}
1769
1770
/* Temporary helper. */
1771
int
1772
pubkey_get_nsig (pubkey_algo_t algo)
1773
794k
{
1774
794k
  switch (algo)
1775
794k
    {
1776
2.95k
    case PUBKEY_ALGO_RSA:
1777
5.23k
    case PUBKEY_ALGO_RSA_E:
1778
6.36k
    case PUBKEY_ALGO_RSA_S:     return 1;
1779
15.2k
    case PUBKEY_ALGO_ELGAMAL_E: return 0;
1780
7.84k
    case PUBKEY_ALGO_DSA:       return 2;
1781
8.77k
    case PUBKEY_ALGO_ECDH:      return 0;
1782
9.31k
    case PUBKEY_ALGO_ECDSA:     return 2;
1783
53
    case PUBKEY_ALGO_ELGAMAL:   return 2;
1784
43.8k
    case PUBKEY_ALGO_EDDSA:     return 2;
1785
702k
    default: return 0;
1786
794k
    }
1787
794k
}
1788
1789
1790
/* Temporary helper. */
1791
int
1792
pubkey_get_nenc (pubkey_algo_t algo)
1793
26.5k
{
1794
26.5k
  switch (algo)
1795
26.5k
    {
1796
52
    case PUBKEY_ALGO_RSA:
1797
70
    case PUBKEY_ALGO_RSA_E:
1798
80
    case PUBKEY_ALGO_RSA_S:     return 1;
1799
8.64k
    case PUBKEY_ALGO_ELGAMAL_E: return 2;
1800
0
    case PUBKEY_ALGO_DSA:       return 0;
1801
5.48k
    case PUBKEY_ALGO_ECDH:      return 2;
1802
4
    case PUBKEY_ALGO_ECDSA:     return 0;
1803
6
    case PUBKEY_ALGO_ELGAMAL:   return 2;
1804
0
    case PUBKEY_ALGO_EDDSA:     return 0;
1805
4
    case PUBKEY_ALGO_KYBER:     return 3;
1806
12.3k
    default: return 0;
1807
26.5k
    }
1808
26.5k
}
1809
1810
1811
/* Temporary helper. */
1812
unsigned int
1813
pubkey_nbits( int algo, gcry_mpi_t *key )
1814
0
{
1815
0
  int rc, nbits;
1816
0
  gcry_sexp_t sexp;
1817
1818
0
  if (algo == PUBKEY_ALGO_DSA
1819
0
      && key[0] && key[1] && key[2] && key[3])
1820
0
    {
1821
0
      rc = gcry_sexp_build (&sexp, NULL,
1822
0
                            "(public-key(dsa(p%m)(q%m)(g%m)(y%m)))",
1823
0
                            key[0], key[1], key[2], key[3] );
1824
0
    }
1825
0
  else if ((algo == PUBKEY_ALGO_ELGAMAL || algo == PUBKEY_ALGO_ELGAMAL_E)
1826
0
           && key[0] && key[1] && key[2])
1827
0
    {
1828
0
      rc = gcry_sexp_build (&sexp, NULL,
1829
0
                            "(public-key(elg(p%m)(g%m)(y%m)))",
1830
0
                            key[0], key[1], key[2] );
1831
0
    }
1832
0
  else if (is_RSA (algo)
1833
0
           && key[0] && key[1])
1834
0
    {
1835
0
      rc = gcry_sexp_build (&sexp, NULL,
1836
0
                            "(public-key(rsa(n%m)(e%m)))",
1837
0
                            key[0], key[1] );
1838
0
    }
1839
0
  else if ((algo == PUBKEY_ALGO_ECDSA || algo == PUBKEY_ALGO_ECDH
1840
0
            || algo == PUBKEY_ALGO_EDDSA)
1841
0
           && key[0] && key[1])
1842
0
    {
1843
0
      char *curve = openpgp_oid_to_str (key[0]);
1844
0
      if (!curve)
1845
0
        rc = gpg_error_from_syserror ();
1846
0
      else
1847
0
        {
1848
0
          rc = gcry_sexp_build (&sexp, NULL,
1849
0
                                "(public-key(ecc(curve%s)(q%m)))",
1850
0
                                curve, key[1]);
1851
0
          xfree (curve);
1852
0
        }
1853
0
    }
1854
0
  else
1855
0
    return 0;
1856
1857
0
  if (rc)
1858
0
    BUG ();
1859
1860
0
  nbits = gcry_pk_get_nbits (sexp);
1861
0
  gcry_sexp_release (sexp);
1862
0
  return nbits;
1863
0
}
1864
1865
1866
1867
int
1868
mpi_print (estream_t fp, gcry_mpi_t a, int mode)
1869
0
{
1870
0
  int n = 0;
1871
0
  size_t nwritten;
1872
1873
0
  if (!a)
1874
0
    return es_fprintf (fp, "[MPI_NULL]");
1875
0
  if (!mode)
1876
0
    {
1877
0
      unsigned int n1;
1878
0
      n1 = gcry_mpi_get_nbits(a);
1879
0
      n += es_fprintf (fp, "[%u bits]", n1);
1880
0
    }
1881
0
  else if (gcry_mpi_get_flag (a, GCRYMPI_FLAG_OPAQUE))
1882
0
    {
1883
0
      unsigned int nbits;
1884
0
      unsigned char *p = gcry_mpi_get_opaque (a, &nbits);
1885
0
      if (!p)
1886
0
        n += es_fprintf (fp, "[invalid opaque value]");
1887
0
      else
1888
0
        {
1889
0
          if (!es_write_hexstring (fp, p, (nbits + 7)/8, 0, &nwritten))
1890
0
            n += nwritten;
1891
0
        }
1892
0
    }
1893
0
  else
1894
0
    {
1895
0
      unsigned char *buffer;
1896
0
      size_t buflen;
1897
1898
0
      if (gcry_mpi_aprint (GCRYMPI_FMT_USG, &buffer, &buflen, a))
1899
0
        BUG ();
1900
0
      if (!es_write_hexstring (fp, buffer, buflen, 0, &nwritten))
1901
0
        n += nwritten;
1902
0
      gcry_free (buffer);
1903
0
    }
1904
0
  return n;
1905
0
}
1906
1907
1908
/* pkey[1] or skey[1] is Q for ECDSA, which is an uncompressed point,
1909
   i.e.  04 <x> <y> */
1910
unsigned int
1911
ecdsa_qbits_from_Q (unsigned int qbits)
1912
0
{
1913
0
  if ((qbits%8) > 3)
1914
0
    {
1915
0
      log_error (_("ECDSA public key is expected to be in SEC encoding "
1916
0
                   "multiple of 8 bits\n"));
1917
0
      return 0;
1918
0
    }
1919
0
  qbits -= qbits%8;
1920
0
  qbits /= 2;
1921
0
  return qbits;
1922
0
}
1923
1924
1925
/* Ignore signatures and certifications made over certain digest
1926
 * algorithms by default, MD5 is considered weak.  This allows users
1927
 * to deprecate support for other algorithms as well.
1928
 */
1929
void
1930
additional_weak_digest (const char* digestname)
1931
0
{
1932
0
  struct weakhash *weak = NULL;
1933
0
  const enum gcry_md_algos algo = string_to_digest_algo(digestname);
1934
1935
0
  if (algo == GCRY_MD_NONE)
1936
0
    {
1937
0
      log_error (_("unknown weak digest '%s'\n"), digestname);
1938
0
      return;
1939
0
    }
1940
1941
  /* Check to ensure it's not already present.  */
1942
0
  for (weak = opt.weak_digests; weak; weak = weak->next)
1943
0
    if (algo == weak->algo)
1944
0
      return;
1945
1946
  /* Add it to the head of the list.  */
1947
0
  weak = xmalloc(sizeof(*weak));
1948
0
  weak->algo = algo;
1949
0
  weak->rejection_shown = 0;
1950
0
  weak->next = opt.weak_digests;
1951
0
  opt.weak_digests = weak;
1952
0
}
1953
1954
1955
/* Return true if ALGO is in the list of weak digests.  */
1956
int
1957
is_weak_digest (digest_algo_t algo)
1958
0
{
1959
0
  const enum gcry_md_algos galgo = map_md_openpgp_to_gcry (algo);
1960
0
  const struct weakhash *weak;
1961
1962
0
  for (weak = opt.weak_digests; weak; weak = weak->next)
1963
0
    if (weak->algo == galgo)
1964
0
      return 1;
1965
0
  return 0;
1966
0
}