rpm 5.3.12
|
typedef struct DIGEST_CTX_s* DIGEST_CTX |
Definition at line 69 of file rpmiotypes.h.
typedef enum pgpArmor_e pgpArmor |
typedef enum pgpArmorKey_e pgpArmorKey |
typedef enum pgpCompressAlgo_e pgpCompressAlgo |
9.3.
Compression Algorithms
ID Algorithm -- --------- 0 - Uncompressed 1 - ZIP (RFC 1951) 2 - ZLIB (RFC 1950) 100 to 110 - Private/Experimental algorithm.
Implementations MUST implement uncompressed data. Implementations SHOULD implement ZIP. Implementations MAY implement ZLIB.
typedef struct pgpDig_s* pgpDig |
Definition at line 77 of file rpmiotypes.h.
typedef struct pgpDigParams_s* pgpDigParams |
Definition at line 81 of file rpmiotypes.h.
typedef enum pgpHashAlgo_e pgpHashAlgo |
9.4.
Hash Algorithms
ID Algorithm Text Name -- --------- ---- ---- 1 - MD5 "MD5" 2 - SHA-1 "SHA1" 3 - RIPE-MD/160 "RIPEMD160" 4 - Reserved for double-width SHA (experimental) 5 - MD2 "MD2" 6 - Reserved for TIGER/192 "TIGER192" 7 - Reserved for HAVAL (5 pass, 160-bit) "HAVAL-5-160" 100 to 110 - Private/Experimental algorithm.
Implementations MUST implement SHA-1. Implementations SHOULD implement MD5.
typedef rpmuint8_t pgpKeyID_t[8] |
Definition at line 85 of file rpmiotypes.h.
typedef struct pgpPkt_s* pgpPkt |
Definition at line 73 of file rpmiotypes.h.
typedef struct pgpPktCdata_s pgpPktCdata |
5.6.
Compressed Data Packet (Tag 8)
The Compressed Data packet contains compressed data. Typically, this packet is found as the contents of an encrypted packet, or following a Signature or One-Pass Signature packet, and contains literal data packets.
The body of this packet consists of:
A Compressed Data Packet's body contains an block that compresses some set of packets. See section "Packet Composition" for details on how messages are formed.
ZIP-compressed packets are compressed with raw RFC 1951 DEFLATE blocks. Note that PGP V2.6 uses 13 bits of compression. If an implementation uses more bits of compression, PGP V2.6 cannot decompress it.
ZLIB-compressed packets are compressed with RFC 1950 ZLIB-style blocks.
typedef struct pgpPktEdata_s pgpPktEdata |
5.7.
Symmetrically Encrypted Data Packet (Tag 9)
The Symmetrically Encrypted Data packet contains data encrypted with a symmetric-key algorithm. When it has been decrypted, it will typically contain other packets (often literal data packets or compressed data packets).
The body of this packet consists of:
The symmetric cipher used may be specified in an Public-Key or Symmetric-Key Encrypted Session Key packet that precedes the Symmetrically Encrypted Data Packet. In that case, the cipher algorithm octet is prefixed to the session key before it is encrypted. If no packets of these types precede the encrypted data, the IDEA algorithm is used with the session key calculated as the MD5 hash of the passphrase.
The data is encrypted in CFB mode, with a CFB shift size equal to the cipher's block size. The Initial Vector (IV) is specified as all zeros. Instead of using an IV, OpenPGP prefixes a 10-octet string to the data before it is encrypted. The first eight octets are random, and the 9th and 10th octets are copies of the 7th and 8th octets, respectively. After encrypting the first 10 octets, the CFB state is resynchronized if the cipher block size is 8 octets or less. The last 8 octets of ciphertext are passed through the cipher and the block boundary is reset.
The repetition of 16 bits in the 80 bits of random data prefixed to the message allows the receiver to immediately check whether the session key is incorrect.
typedef union pgpPktKey_u pgpPktKey |
5.5.3.
Secret Key Packet Formats
The Secret Key and Secret Subkey packets contain all the data of the Public Key and Public Subkey packets, with additional algorithm- specific secret key data appended, in encrypted form.
The packet contains:
Algorithm Specific Fields for RSA secret keys:
Algorithm Specific Fields for DSA secret keys:
Algorithm Specific Fields for Elgamal secret keys:
Secret MPI values can be encrypted using a passphrase. If a string- to-key specifier is given, that describes the algorithm for converting the passphrase to a key, else a simple MD5 hash of the passphrase is used. Implementations SHOULD use a string-to-key specifier; the simple hash is for backward compatibility. The cipher for encrypting the MPIs is specified in the secret key packet.
Encryption/decryption of the secret data is done in CFB mode using the key created from the passphrase and the Initial Vector from the packet. A different mode is used with V3 keys (which are only RSA) than with other key formats. With V3 keys, the MPI bit count prefix (i.e., the first two octets) is not encrypted. Only the MPI non- prefix data is encrypted. Furthermore, the CFB state is resynchronized at the beginning of each new MPI value, so that the CFB block boundary is aligned with the start of the MPI data.
With V4 keys, a simpler method is used. All secret MPI values are encrypted in CFB mode, including the MPI bitcount prefix.
The 16-bit checksum that follows the algorithm-specific portion is the algebraic sum, mod 65536, of the plaintext of all the algorithm- specific octets (including MPI prefix and data). With V3 keys, the checksum is stored in the clear. With V4 keys, the checksum is encrypted like the algorithm-specific data. This value is used to check that the passphrase was correct.
typedef struct pgpPktKeyV3_s * pgpPktKeyV3 |
5.5.1.
Key Packet Variants
5.5.1.1. Public Key Packet (Tag 6)
A Public Key packet starts a series of packets that forms an OpenPGP key (sometimes called an OpenPGP certificate).
5.5.1.2. Public Subkey Packet (Tag 14)
A Public Subkey packet (tag 14) has exactly the same format as a Public Key packet, but denotes a subkey. One or more subkeys may be associated with a top-level key. By convention, the top-level key provides signature services, and the subkeys provide encryption services.
Note: in PGP 2.6.x, tag 14 was intended to indicate a comment packet. This tag was selected for reuse because no previous version of PGP ever emitted comment packets but they did properly ignore them. Public Subkey packets are ignored by PGP 2.6.x and do not cause it to fail, providing a limited degree of backward compatibility.
5.5.1.3. Secret Key Packet (Tag 5)
A Secret Key packet contains all the information that is found in a Public Key packet, including the public key material, but also includes the secret key material after all the public key fields.
5.5.1.4. Secret Subkey Packet (Tag 7)
A Secret Subkey packet (tag 7) is the subkey analog of the Secret Key packet, and has exactly the same format.
5.5.2. Public Key Packet Formats
There are two versions of key-material packets. Version 3 packets were first generated by PGP 2.6. Version 2 packets are identical in format to Version 3 packets, but are generated by PGP 2.5 or before. V2 packets are deprecated and they MUST NOT be generated. PGP 5.0 introduced version 4 packets, with new fields and semantics. PGP 2.6.x will not accept key-material packets with versions greater than 3.
OpenPGP implementations SHOULD create keys with version 4 format. An implementation MAY generate a V3 key to ensure interoperability with old software; note, however, that V4 keys correct some security deficiencies in V3 keys. These deficiencies are described below. An implementation MUST NOT create a V3 key with a public key algorithm other than RSA.
A version 3 public key or public subkey packet contains:
V3 keys SHOULD only be used for backward compatibility because of three weaknesses in them. First, it is relatively easy to construct a V3 key that has the same key ID as any other key because the key ID is simply the low 64 bits of the public modulus. Secondly, because the fingerprint of a V3 key hashes the key material, but not its length, which increases the opportunity for fingerprint collisions. Third, there are minor weaknesses in the MD5 hash algorithm that make developers prefer other algorithms. See below for a fuller discussion of key IDs and fingerprints.
typedef struct pgpPktKeyV4_s * pgpPktKeyV4 |
The version 4 format is similar to the version 3 format except for the absence of a validity period.
This has been moved to the signature packet. In addition, fingerprints of version 4 keys are calculated differently from version 3 keys, as described in section "Enhanced Key Formats."
A version 4 packet contains:
Algorithm Specific Fields for RSA public keys:
Algorithm Specific Fields for DSA public keys:
Algorithm Specific Fields for Elgamal public keys:
typedef struct pgpPktLdata_s pgpPktLdata |
5.8.
Marker Packet (Obsolete Literal Packet) (Tag 10)
An experimental version of PGP used this packet as the Literal packet, but no released version of PGP generated Literal packets with this tag. With PGP 5.x, this packet has been re-assigned and is reserved for use as the Marker packet.
The body of this packet consists of:
Such a packet MUST be ignored when received. It may be placed at the beginning of a message that uses features not available in PGP 2.6.x in order to cause that version to report that newer software is necessary to process the message.
typedef struct pgpPktOnepass_s * pgpPktOnepass |
5.4.
One-Pass Signature Packets (Tag 4)
The One-Pass Signature packet precedes the signed data and contains enough information to allow the receiver to begin calculating any hashes needed to verify the signature. It allows the Signature Packet to be placed at the end of the message, so that the signer can compute the entire signed message in one pass.
A One-Pass Signature does not interoperate with PGP 2.6.x or earlier.
The body of this packet consists of:
Note that if a message contains more than one one-pass signature, then the signature packets bracket the message; that is, the first signature packet after the message corresponds to the last one-pass packet and the final signature packet corresponds to the first one- pass packet.
typedef struct pgpPktPubkey_s pgpPktPubkey |
5.1.
Public-Key Encrypted Session Key Packets (Tag 1)
A Public-Key Encrypted Session Key packet holds the session key used to encrypt a message. Zero or more Encrypted Session Key packets (either Public-Key or Symmetric-Key) may precede a Symmetrically Encrypted Data Packet, which holds an encrypted message. The message is encrypted with the session key, and the session key is itself encrypted and stored in the Encrypted Session Key packet(s). The Symmetrically Encrypted Data Packet is preceded by one Public-Key Encrypted Session Key packet for each OpenPGP key to which the message is encrypted. The recipient of the message finds a session key that is encrypted to their public key, decrypts the session key, and then uses the session key to decrypt the message.
The body of this packet consists of:
Algorithm Specific Fields for RSA encryption
Algorithm Specific Fields for Elgamal encryption:
typedef union pgpPktSig_u * pgpPktSig |
5.2.
Signature Packet (Tag 2)
A signature packet describes a binding between some public key and some data. The most common signatures are a signature of a file or a block of text, and a signature that is a certification of a user ID.
Two versions of signature packets are defined. Version 3 provides basic signature information, while version 4 provides an expandable format with subpackets that can specify more information about the signature. PGP 2.6.x only accepts version 3 signatures.
Implementations MUST accept V3 signatures. Implementations SHOULD generate V4 signatures. Implementations MAY generate a V3 signature that can be verified by PGP 2.6.x.
Note that if an implementation is creating an encrypted and signed message that is encrypted to a V3 key, it is reasonable to create a V3 signature.
typedef struct pgpPktSigV3_s * pgpPktSigV3 |
5.2.2.
Version 3 Signature Packet Format
The body of a version 3 Signature Packet contains:
Algorithm Specific Fields for RSA signatures:
Algorithm Specific Fields for DSA signatures:
typedef struct pgpPktSigV4_s * pgpPktSigV4 |
5.2.3.
Version 4 Signature Packet Format
The body of a version 4 Signature Packet contains:
typedef struct pgpPktSymkey_s pgpPktSymkey |
5.3.
Symmetric-Key Encrypted Session-Key Packets (Tag 3)
The Symmetric-Key Encrypted Session Key packet holds the symmetric- key encryption of a session key used to encrypt a message. Zero or more Encrypted Session Key packets and/or Symmetric-Key Encrypted Session Key packets may precede a Symmetrically Encrypted Data Packet that holds an encrypted message. The message is encrypted with a session key, and the session key is itself encrypted and stored in the Encrypted Session Key packet or the Symmetric-Key Encrypted Session Key packet.
If the Symmetrically Encrypted Data Packet is preceded by one or more Symmetric-Key Encrypted Session Key packets, each specifies a passphrase that may be used to decrypt the message. This allows a message to be encrypted to a number of public keys, and also to one or more pass phrases. This packet type is new, and is not generated by PGP 2.x or PGP 5.0.
The body of this packet consists of:
typedef struct pgpPktTrust_s pgpPktTrust |
5.10.
Trust Packet (Tag 12)
The Trust packet is used only within keyrings and is not normally exported. Trust packets contain data that record the user's specifications of which key holders are trustworthy introducers, along with other information that implementing software uses for trust information.
Trust packets SHOULD NOT be emitted to output streams that are transferred to other users, and they SHOULD be ignored on any input other than local keyring files.
typedef struct pgpPktUid_s pgpPktUid |
5.11.
User ID Packet (Tag 13)
A User ID packet consists of data that is intended to represent the name and email address of the key holder. By convention, it includes an RFC 822 mail name, but there are no restrictions on its content. The packet length in the header specifies the length of the user id. If it is text, it is encoded in UTF-8.
typedef enum pgpPubkeyAlgo_e pgpPubkeyAlgo |
9.1.
Public Key Algorithms
ID Algorithm -- --------- 1 - RSA (Encrypt or Sign) 2 - RSA Encrypt-Only 3 - RSA Sign-Only 16 - Elgamal (Encrypt-Only), see [ELGAMAL] 17 - DSA (Digital Signature Standard) 18 - Reserved for Elliptic Curve 19 - Reserved for ECDSA 20 - Elgamal (Encrypt or Sign) 21 - Reserved for Diffie-Hellman (X9.42, as defined for IETF-S/MIME) 100 to 110 - Private/Experimental algorithm.
Implementations MUST implement DSA for signatures, and Elgamal for encryption. Implementations SHOULD implement RSA keys. Implementations MAY implement any other algorithm.
typedef enum pgpSigType_e pgpSigType |
5.2.1.
Signature Types
There are a number of possible meanings for a signature, which are specified in a signature type octet in any given signature.
typedef enum pgpSubType_e pgpSubType |
5.2.3.1.
Signature Subpacket Specification
The subpacket fields consist of zero or more signature subpackets. Each set of subpackets is preceded by a two-octet scalar count of the length of the set of subpackets.
Each subpacket consists of a subpacket header and a body. The header consists of:
The length includes the type octet but not this length. Its format is similar to the "new" format packet header lengths, but cannot have partial body lengths. That is:
if the 1st octet < 192, then lengthOfLength = 1 subpacketLen = 1st_octet if the 1st octet >= 192 and < 255, then lengthOfLength = 2 subpacketLen = ((1st_octet - 192) << 8) + (2nd_octet) + 192 if the 1st octet = 255, then lengthOfLength = 5 subpacket length = [four-octet scalar starting at 2nd_octet]
The value of the subpacket type octet may be:
0 = reserved 1 = reserved 2 = signature creation time 3 = signature expiration time 4 = exportable certification 5 = trust signature 6 = regular expression 7 = revocable 8 = reserved 9 = key expiration time 10 = placeholder for backward compatibility 11 = preferred symmetric algorithms 12 = revocation key 13 = reserved 14 = reserved 15 = reserved 16 = issuer key ID 17 = reserved 18 = reserved 19 = reserved 20 = notation data 21 = preferred hash algorithms 22 = preferred compression algorithms 23 = key server preferences 24 = preferred key server 25 = primary user id 26 = policy URL 27 = key flags 28 = signer's user id 29 = reason for revocation 30 = features 31 = signature target 32 = embedded signature 100 to 110 = internal or user-defined
An implementation SHOULD ignore any subpacket of a type that it does not recognize.
Bit 7 of the subpacket type is the "critical" bit. If set, it denotes that the subpacket is one that is critical for the evaluator of the signature to recognize. If a subpacket is encountered that is marked critical but is unknown to the evaluating software, the evaluator SHOULD consider the signature to be in error.
typedef enum pgpSymkeyAlgo_e pgpSymkeyAlgo |
9.2.
Symmetric Key Algorithms
ID Algorithm -- --------- 0 - Plaintext or unencrypted data 1 - IDEA [IDEA] 2 - Triple-DES (DES-EDE, as per spec - 168 bit key derived from 192) 3 - CAST5 (128 bit key, as per RFC 2144) 4 - Blowfish (128 bit key, 16 rounds) [BLOWFISH] 5 - SAFER-SK128 (13 rounds) [SAFER] 6 - Reserved for DES/SK 7 - AES with 128-bit key 8 - AES with 192-bit key 9 - AES with 256-bit key 10 - Twofish with 256-bit key 100 to 110 - Private/Experimental algorithm.
Implementations MUST implement Triple-DES. Implementations SHOULD implement IDEA and CAST5. Implementations MAY implement any other algorithm.
4.3.
Packet Tags
The packet tag denotes what type of packet the body holds. Note that old format headers can only have tags less than 16, whereas new format headers can have tags as great as 63.
typedef rpmuint8_t pgpTime_t[4] |
Definition at line 89 of file rpmiotypes.h.
typedef enum pgpVSFlags_e pgpVSFlags |
Bit(s) to control digest and signature verification.
typedef enum rpmDigestFlags_e rpmDigestFlags |
Bit(s) to control digest operation.
enum pgpArmor_e |
enum pgpArmorKey_e |
enum pgpCompressAlgo_e |
9.3.
Compression Algorithms
ID Algorithm -- --------- 0 - Uncompressed 1 - ZIP (RFC 1951) 2 - ZLIB (RFC 1950) 100 to 110 - Private/Experimental algorithm.
Implementations MUST implement uncompressed data. Implementations SHOULD implement ZIP. Implementations MAY implement ZLIB.
enum pgpHashAlgo_e |
9.4.
Hash Algorithms
ID Algorithm Text Name -- --------- ---- ---- 1 - MD5 "MD5" 2 - SHA-1 "SHA1" 3 - RIPE-MD/160 "RIPEMD160" 4 - Reserved for double-width SHA (experimental) 5 - MD2 "MD2" 6 - Reserved for TIGER/192 "TIGER192" 7 - Reserved for HAVAL (5 pass, 160-bit) "HAVAL-5-160" 100 to 110 - Private/Experimental algorithm.
Implementations MUST implement SHA-1. Implementations SHOULD implement MD5.
PGPHASHALGO_ERROR | |
PGPHASHALGO_NONE | |
PGPHASHALGO_MD5 |
MD5 |
PGPHASHALGO_SHA1 |
SHA-1 |
PGPHASHALGO_RIPEMD160 |
RIPEMD-160 |
PGPHASHALGO_MD2 |
MD2 |
PGPHASHALGO_TIGER192 |
TIGER-192 |
PGPHASHALGO_HAVAL_5_160 |
HAVAL-5-160 |
PGPHASHALGO_SHA256 |
SHA-256 |
PGPHASHALGO_SHA384 |
SHA-384 |
PGPHASHALGO_SHA512 |
SHA-512 |
PGPHASHALGO_SHA224 |
SHA-224 |
PGPHASHALGO_MD4 |
(private) MD4 |
PGPHASHALGO_RIPEMD128 |
(private) RIPEMD-128 |
PGPHASHALGO_CRC32 |
(private) CRC-32 |
PGPHASHALGO_ADLER32 |
(private) ADLER-32 |
PGPHASHALGO_CRC64 |
(private) CRC-64 |
PGPHASHALGO_JLU32 |
(private) Jenkins lookup3.c |
PGPHASHALGO_RIPEMD256 |
(private) RIPEMD-256 |
PGPHASHALGO_RIPEMD320 |
(private) RIPEMD-320 |
PGPHASHALGO_SALSA10 |
(private) SALSA-10 |
PGPHASHALGO_SALSA20 |
(private) SALSA-20 |
PGPHASHALGO_MD6_224 |
(private) MD6-224 |
PGPHASHALGO_MD6_256 |
(private) MD6-256 |
PGPHASHALGO_MD6_384 |
(private) MD6-384 |
PGPHASHALGO_MD6_512 |
(private) MD6-512 |
PGPHASHALGO_CUBEHASH_224 |
(private) CUBEHASH-224 |
PGPHASHALGO_CUBEHASH_256 |
(private) CUBEHASH-256 |
PGPHASHALGO_CUBEHASH_384 |
(private) CUBEHASH-384 |
PGPHASHALGO_CUBEHASH_512 |
(private) CUBEHASH-512 |
PGPHASHALGO_KECCAK_224 |
(private) KECCAK-224 |
PGPHASHALGO_KECCAK_256 |
(private) KECCAK-256 |
PGPHASHALGO_KECCAK_384 |
(private) KECCAK-384 |
PGPHASHALGO_KECCAK_512 |
(private) KECCAK-384 |
PGPHASHALGO_ECHO_224 |
(private) ECHO-224 |
PGPHASHALGO_ECHO_256 |
(private) ECHO-256 |
PGPHASHALGO_ECHO_384 |
(private) ECHO-384 |
PGPHASHALGO_ECHO_512 |
(private) ECHO-384 |
PGPHASHALGO_EDONR_224 |
(private) EDON-R-224 |
PGPHASHALGO_EDONR_256 |
(private) EDON-R-256 |
PGPHASHALGO_EDONR_384 |
(private) EDON-R-384 |
PGPHASHALGO_EDONR_512 |
(private) EDON-R-512 |
PGPHASHALGO_FUGUE_224 |
(private) FUGUE-224 |
PGPHASHALGO_FUGUE_256 |
(private) FUGUE-256 |
PGPHASHALGO_FUGUE_384 |
(private) FUGUE-384 |
PGPHASHALGO_FUGUE_512 |
(private) FUGUE-512 |
PGPHASHALGO_SKEIN_224 |
(private) SKEIN-224 |
PGPHASHALGO_SKEIN_256 |
(private) SKEIN-256 |
PGPHASHALGO_SKEIN_384 |
(private) SKEIN-384 |
PGPHASHALGO_SKEIN_512 |
(private) SKEIN-512 |
PGPHASHALGO_SKEIN_1024 |
(private) SKEIN-1024 |
PGPHASHALGO_BMW_224 |
(private) BMW-224 |
PGPHASHALGO_BMW_256 |
(private) BMW-256 |
PGPHASHALGO_BMW_384 |
(private) BMW-384 |
PGPHASHALGO_BMW_512 |
(private) BMW-512 |
PGPHASHALGO_SHABAL_224 |
(private) SHABAL-224 |
PGPHASHALGO_SHABAL_256 |
(private) SHABAL-256 |
PGPHASHALGO_SHABAL_384 |
(private) SHABAL-384 |
PGPHASHALGO_SHABAL_512 |
(private) SHABAL-512 |
PGPHASHALGO_SHAVITE3_224 |
(private) SHAVITE3-224 |
PGPHASHALGO_SHAVITE3_256 |
(private) SHAVITE3-256 |
PGPHASHALGO_SHAVITE3_384 |
(private) SHAVITE3-384 |
PGPHASHALGO_SHAVITE3_512 |
(private) SHAVITE3-512 |
PGPHASHALGO_BLAKE_224 |
(private) BLAKE-224 |
PGPHASHALGO_BLAKE_256 |
(private) BLAKE-256 |
PGPHASHALGO_BLAKE_384 |
(private) BLAKE-384 |
PGPHASHALGO_BLAKE_512 |
(private) BLAKE-512 |
PGPHASHALGO_TIB3_224 |
(private) TIB3-224 |
PGPHASHALGO_TIB3_256 |
(private) TIB3-256 |
PGPHASHALGO_TIB3_384 |
(private) TIB3-384 |
PGPHASHALGO_TIB3_512 |
(private) TIB3-512 |
PGPHASHALGO_SIMD_224 |
(private) SIMD-224 |
PGPHASHALGO_SIMD_256 |
(private) SIMD-256 |
PGPHASHALGO_SIMD_384 |
(private) SIMD-384 |
PGPHASHALGO_SIMD_512 |
(private) SIMD-512 |
PGPHASHALGO_ARIRANG_224 |
(private) ARIRANG-224 |
PGPHASHALGO_ARIRANG_256 |
(private) ARIRANG-256 |
PGPHASHALGO_ARIRANG_384 |
(private) ARIRANG-384 |
PGPHASHALGO_ARIRANG_512 |
(private) ARIRANG-512 |
PGPHASHALGO_LANE_224 |
(private) LANE-224 |
PGPHASHALGO_LANE_256 |
(private) LANE-256 |
PGPHASHALGO_LANE_384 |
(private) LANE-384 |
PGPHASHALGO_LANE_512 |
(private) LANE-512 |
PGPHASHALGO_LUFFA_224 |
(private) LUFFA-224 |
PGPHASHALGO_LUFFA_256 |
(private) LUFFA-256 |
PGPHASHALGO_LUFFA_384 |
(private) LUFFA-384 |
PGPHASHALGO_LUFFA_512 |
(private) LUFFA-512 |
PGPHASHALGO_CHI_224 |
(private) CHI-224 |
PGPHASHALGO_CHI_256 |
(private) CHI-256 |
PGPHASHALGO_CHI_384 |
(private) CHI-384 |
PGPHASHALGO_CHI_512 |
(private) CHI-512 |
PGPHASHALGO_JH_224 |
(private) JH-224 |
PGPHASHALGO_JH_256 |
(private) JH-256 |
PGPHASHALGO_JH_384 |
(private) JH-384 |
PGPHASHALGO_JH_512 |
(private) JH-512 |
PGPHASHALGO_GROESTL_224 |
(private) GROESTL-224 |
PGPHASHALGO_GROESTL_256 |
(private) GROESTL-256 |
PGPHASHALGO_GROESTL_384 |
(private) GROESTL-384 |
PGPHASHALGO_GROESTL_512 |
(private) GROESTL-512 |
PGPHASHALGO_HAMSI_224 |
(private) HAMSI-224 |
PGPHASHALGO_HAMSI_256 |
(private) HAMSI-256 |
PGPHASHALGO_HAMSI_384 |
(private) HAMSI-384 |
PGPHASHALGO_HAMSI_512 |
(private) HAMSI-512 |
Definition at line 186 of file rpmiotypes.h.
enum pgpPubkeyAlgo_e |
9.1.
Public Key Algorithms
ID Algorithm -- --------- 1 - RSA (Encrypt or Sign) 2 - RSA Encrypt-Only 3 - RSA Sign-Only 16 - Elgamal (Encrypt-Only), see [ELGAMAL] 17 - DSA (Digital Signature Standard) 18 - Reserved for Elliptic Curve 19 - Reserved for ECDSA 20 - Elgamal (Encrypt or Sign) 21 - Reserved for Diffie-Hellman (X9.42, as defined for IETF-S/MIME) 100 to 110 - Private/Experimental algorithm.
Implementations MUST implement DSA for signatures, and Elgamal for encryption. Implementations SHOULD implement RSA keys. Implementations MAY implement any other algorithm.
enum pgpSigType_e |
5.2.1.
Signature Types
There are a number of possible meanings for a signature, which are specified in a signature type octet in any given signature.
enum pgpSubType_e |
5.2.3.1.
Signature Subpacket Specification
The subpacket fields consist of zero or more signature subpackets. Each set of subpackets is preceded by a two-octet scalar count of the length of the set of subpackets.
Each subpacket consists of a subpacket header and a body. The header consists of:
The length includes the type octet but not this length. Its format is similar to the "new" format packet header lengths, but cannot have partial body lengths. That is:
if the 1st octet < 192, then lengthOfLength = 1 subpacketLen = 1st_octet if the 1st octet >= 192 and < 255, then lengthOfLength = 2 subpacketLen = ((1st_octet - 192) << 8) + (2nd_octet) + 192 if the 1st octet = 255, then lengthOfLength = 5 subpacket length = [four-octet scalar starting at 2nd_octet]
The value of the subpacket type octet may be:
0 = reserved 1 = reserved 2 = signature creation time 3 = signature expiration time 4 = exportable certification 5 = trust signature 6 = regular expression 7 = revocable 8 = reserved 9 = key expiration time 10 = placeholder for backward compatibility 11 = preferred symmetric algorithms 12 = revocation key 13 = reserved 14 = reserved 15 = reserved 16 = issuer key ID 17 = reserved 18 = reserved 19 = reserved 20 = notation data 21 = preferred hash algorithms 22 = preferred compression algorithms 23 = key server preferences 24 = preferred key server 25 = primary user id 26 = policy URL 27 = key flags 28 = signer's user id 29 = reason for revocation 30 = features 31 = signature target 32 = embedded signature 100 to 110 = internal or user-defined
An implementation SHOULD ignore any subpacket of a type that it does not recognize.
Bit 7 of the subpacket type is the "critical" bit. If set, it denotes that the subpacket is one that is critical for the evaluator of the signature to recognize. If a subpacket is encountered that is marked critical but is unknown to the evaluating software, the evaluator SHOULD consider the signature to be in error.
enum pgpSymkeyAlgo_e |
9.2.
Symmetric Key Algorithms
ID Algorithm -- --------- 0 - Plaintext or unencrypted data 1 - IDEA [IDEA] 2 - Triple-DES (DES-EDE, as per spec - 168 bit key derived from 192) 3 - CAST5 (128 bit key, as per RFC 2144) 4 - Blowfish (128 bit key, 16 rounds) [BLOWFISH] 5 - SAFER-SK128 (13 rounds) [SAFER] 6 - Reserved for DES/SK 7 - AES with 128-bit key 8 - AES with 192-bit key 9 - AES with 256-bit key 10 - Twofish with 256-bit key 100 to 110 - Private/Experimental algorithm.
Implementations MUST implement Triple-DES. Implementations SHOULD implement IDEA and CAST5. Implementations MAY implement any other algorithm.
enum pgpTag_e |
4.3.
Packet Tags
The packet tag denotes what type of packet the body holds. Note that old format headers can only have tags less than 16, whereas new format headers can have tags as great as 63.
enum pgpVSFlags_e |
Bit(s) to control digest and signature verification.
RPMVSF_DEFAULT | |
RPMVSF_NOHDRCHK | |
RPMVSF_NEEDPAYLOAD | |
RPMVSF_NOSHA1HEADER | |
RPMVSF_NOMD5HEADER | |
RPMVSF_NODSAHEADER | |
RPMVSF_NORSAHEADER | |
RPMVSF_NOSHA1 | |
RPMVSF_NOMD5 | |
RPMVSF_NODSA | |
RPMVSF_NORSA |
Definition at line 94 of file rpmiotypes.h.
enum rpmDigestFlags_e |
Bit(s) to control digest operation.
Definition at line 318 of file rpmiotypes.h.
pgpArmor pgpArmorUnwrap | ( | rpmiob | iob, |
rpmuint8_t ** | pkt, | ||
size_t * | pktlen | ||
) |
Parse armored OpenPGP packets from an iob.
iob | I/O buffer |
pkt | dearmored OpenPGP packet(s) |
pktlen | dearmored OpenPGP packet(s) length in bytes |
Definition at line 1394 of file rpmpgp.c.
References _free(), alloca(), crc(), PGPARMOR_ERR_BODY_DECODE, PGPARMOR_ERR_CRC_CHECK, PGPARMOR_ERR_CRC_DECODE, PGPARMOR_ERR_NO_BEGIN_PGP, PGPARMOR_ERR_NO_END_PGP, PGPARMOR_ERR_UNKNOWN_ARMOR_TYPE, pgpCRC(), pgpGrab(), pgpIsPkt(), pgpPktLen(), PGPTAG_PUBLIC_KEY, PGPTAG_SECRET_KEY, PGPTAG_SIGNATURE, pgpValTok(), and TOKEQ.
Referenced by pgpReadPkts(), readFile(), and rpmReadPackageFile().
char* pgpArmorWrap | ( | rpmuint8_t | atype, |
const unsigned char * | s, | ||
size_t | ns | ||
) |
Wrap a OpenPGP packets in ascii armor for transport.
atype | type of armor |
s | binary pkt data |
ns | binary pkt data length |
Definition at line 1571 of file rpmpgp.c.
References _free(), pgpValStr(), stpcpy(), pgpValTbl_s::val, VERSION, and xmalloc().
Referenced by armorFormat(), processMetadataFile(), and writeRPM().
static unsigned int pgpCRC | ( | const rpmuint8_t * | octets, |
size_t | len | ||
) | [inline, static] |
Return CRC of a buffer.
octets | bytes |
len | no. of bytes |
Definition at line 1657 of file rpmpgp.h.
References crc(), CRC24_INIT, and CRC24_POLY.
Referenced by pgpArmorUnwrap().
void pgpDigClean | ( | pgpDig | dig | ) |
Release (malloc'd) data from container.
dig | signature parameters container |
Definition at line 1104 of file rpmpgp.c.
References _free(), and pgpImplClean().
Referenced by pgpDigFini(), and rpmVerifySignatures().
Destroy a container for parsed OpenPGP packates.
dig | signature parameters container |
Referenced by fdFini(), fdSetDig(), getSignid(), makeGPGSignature(), pgpPrtPkts(), pgpsigFormat(), rpmcliImportPubkey(), rpmReadHeader(), rpmts_HdrCheck(), rpmtsCleanDig(), and specFini().
Reference a signature parameters instance.
dig | signature parameters |
Referenced by fdSetDig(), pgpDigNew(), pgpPrtPkts(), and rpmReadHeader().
pgpDig pgpDigNew | ( | pgpVSFlags | vsflags, |
pgpPubkeyAlgo | pubkey_algo | ||
) |
Create a container for parsed OpenPGP packates.
Generate a keypair (if requested).
vsflags | verify signature flags (usually 0) |
pubkey_algo | pubkey algorithm (0 disables) |
Definition at line 1203 of file rpmpgp.c.
References digGetPool(), pgpDigLink(), pgpDigVSFlags, pgpGetPubkey(), pgpImplGenerate(), pgpImplInit(), rpmbcExportPubkey(), rpmbcImplVecs, and RPMVSF_DEFAULT.
Referenced by buildSpec(), getSignid(), makeGPGSignature(), pgpsigFormat(), rpmcliImportPubkey(), rpmReadHeader(), rpmts_HdrCheck(), and rpmtsDig().
Unreference a signature parameters instance.
dig | signature parameters |
int pgpExtractPubkeyFingerprint | ( | const char * | b64pkt, |
rpmuint8_t * | keyid | ||
) |
Extract OpenPGP public key fingerprint from base64 encoded packet.
b64pkt | base64 encoded openpgp packet |
keyid[8] | public key fingerprint |
Definition at line 1026 of file rpmpgp.c.
References _free(), and pgpPubkeyFingerprint().
Referenced by loadDBT().
int pgpFindPubkey | ( | pgpDig | dig | ) |
Call find pubkey vector.
dig | signature parameters container |
Definition at line 1296 of file rpmpgp.c.
Referenced by rpmnsProbeSignature(), verifyDSA(), and verifyRSA().
pgpDigParams pgpGetPubkey | ( | const pgpDig | dig | ) |
Return OpenPGP pubkey parameters.
dig | signature parameters container |
Definition at line 1229 of file rpmpgp.c.
Referenced by pgpDigNew(), rpmbcExportPubkey(), rpmbcExportSignature(), rpmbcGenerate(), rpmbcSetDSA(), rpmbcSetECDSA(), rpmbcSetELG(), rpmbcSetRSA(), rpmbcSign(), rpmbcVerify(), rpmcliImportPubkey(), rpmnsProbeSignature(), rpmtsFindPubkey(), and rpmtsPubkey().
const void* pgpGetSig | ( | const pgpDig | dig | ) |
Get signature tag data, i.e.
from header.
dig | signature parameters container |
Definition at line 1244 of file rpmpgp.c.
Referenced by headerCheck(), pgpStashKeyid(), rpmVerifySignature(), verifyDSA(), verifyMD5(), verifyRSA(), verifySHA1(), and verifySize().
rpmuint32_t pgpGetSiglen | ( | const pgpDig | dig | ) |
Get signature tag data length, i.e.
no. of bytes of data.
dig | signature parameters container |
Definition at line 1249 of file rpmpgp.c.
Referenced by rpmVerifySignature(), verifyDSA(), verifyMD5(), verifyRSA(), and verifySHA1().
pgpDigParams pgpGetSignature | ( | const pgpDig | dig | ) |
Return OpenPGP signature parameters.
dig | signature parameters container |
Definition at line 1224 of file rpmpgp.c.
Referenced by makeGPGSignature(), pgpsigFormat(), pgpStashKeyid(), rpmbcExportSignature(), rpmbcGenerate(), rpmbcSign(), rpmbcVerify(), rpmnsProbeSignature(), rpmtsFindPubkey(), rpmVerifySignatures(), verifyDSA(), verifyRSA(), and writeRPM().
rpmuint32_t pgpGetSigtag | ( | const pgpDig | dig | ) |
Get signature tag.
dig | signature parameters container |
Definition at line 1234 of file rpmpgp.c.
Referenced by rpmVerifySignature(), verifyDSA(), and verifyRSA().
rpmuint32_t pgpGetSigtype | ( | const pgpDig | dig | ) |
static unsigned int pgpGrab | ( | const rpmuint8_t * | s, |
size_t | nbytes | ||
) | [inline, static] |
Return (native-endian) integer from big-endian representation.
s | pointer to big-endian integer |
nbytes | no. of bytes |
Definition at line 1076 of file rpmpgp.h.
Referenced by pgpArmorUnwrap(), pgpLen(), pgpMpiStr(), pgpPktLen(), pgpPrtKey(), pgpPrtSig(), pgpPrtSubType(), pgpsigFormat(), pgpStashKeyid(), rpmkuFindPubkey(), rpmkuStorePubkey(), rpmnsProbeSignature(), and rpmtsFindPubkey().
int pgpGrabPkts | ( | const rpmuint8_t * | pkts, |
size_t | pktlen, | ||
rpmuint8_t *** | pppkts, | ||
int * | pnpkts | ||
) |
Return array of packet pointers.
pkts | OpenPGP packet(s) |
pktlen | OpenPGP packet(s) length (no. of bytes) |
*pppkts | array of packet pointers |
*pnpkts | no. of packets |
Definition at line 1304 of file rpmpgp.c.
References _free(), alloca(), pgpPktLen(), and xcalloc().
Referenced by pgpPrtPkts(), rpmcliImportPubkey(), rpmnsProbeSignature(), and rpmtsFindPubkey().
pgpHashAlgo pgpHashAlgoStringToNumber | ( | const char * | name, |
size_t | name_len | ||
) |
Convert a hash algorithm "foo" to the internal PGPHASHALGO_FOO number.
name | name of hash algorithm |
name_len | length of name or 0 for strlen(name) |
Definition at line 1620 of file rpmpgp.c.
References PGPHASHALGO_ERROR, pgpHashTbl, pgpValTbl_s::str, pgpValTbl_s::val, and xstrncasecmp().
Referenced by unsatisfiedDepend().
static char* pgpHexCvt | ( | char * | t, |
const rpmuint8_t * | s, | ||
size_t | nbytes | ||
) | [inline, static] |
Convert to hex.
t | target buffer (returned) |
s | source bytes |
nbytes | no. of bytes |
Definition at line 1142 of file rpmpgp.h.
Referenced by pgpHexStr(), pgpMpiHex(), pgpMpiStr(), verifyDSA(), verifyMD5(), and verifyRSA().
static char* pgpHexStr | ( | const rpmuint8_t * | p, |
size_t | plen | ||
) | [inline, static] |
Return hex formatted representation of bytes.
p | bytes |
plen | no. of bytes |
Definition at line 1164 of file rpmpgp.h.
References pgpHexCvt().
Referenced by pgpPrtHex(), pgpPrtSig(), pgpsigFormat(), rpmcliImportPubkey(), rpmReSign(), and rpmtsFindPubkey().
static int pgpIsPkt | ( | const rpmuint8_t * | p, |
pgpTag * | tagp | ||
) | [inline, static] |
Is buffer at beginning of an OpenPGP packet?
p | buffer |
*tagp | OpenPGP tag |
Definition at line 1596 of file rpmpgp.h.
References PGPTAG_COMMENT, PGPTAG_COMMENT_OLD, PGPTAG_COMPRESSED_DATA, PGPTAG_CONTROL, PGPTAG_ENCRYPTED_MDC, PGPTAG_LITERAL_DATA, PGPTAG_MARKER, PGPTAG_MDC, PGPTAG_ONEPASS_SIGNATURE, PGPTAG_PHOTOID, PGPTAG_PRIVATE_60, PGPTAG_PRIVATE_62, PGPTAG_PUBLIC_KEY, PGPTAG_PUBLIC_SESSION_KEY, PGPTAG_PUBLIC_SUBKEY, PGPTAG_RESERVED, PGPTAG_SECRET_KEY, PGPTAG_SECRET_SUBKEY, PGPTAG_SIGNATURE, PGPTAG_SYMMETRIC_DATA, PGPTAG_SYMMETRIC_SESSION_KEY, PGPTAG_TRUST, and PGPTAG_USER_ID.
Referenced by pgpArmorUnwrap().
static unsigned int pgpLen | ( | const rpmuint8_t * | s, |
unsigned int * | lenp | ||
) | [inline, static] |
Return length of an OpenPGP packet.
s | pointer to packet |
*lenp | no. of bytes in packet |
Definition at line 1093 of file rpmpgp.h.
References pgpGrab().
Referenced by pgpPktLen(), pgpPrtSubType(), and pgpsigFormat().
static unsigned int pgpMpiBits | ( | const rpmuint8_t * | p | ) | [inline, static] |
Return no.
of bits in a multiprecision integer.
p | pointer to multiprecision integer |
Definition at line 1114 of file rpmpgp.h.
Referenced by pgpMpiLen(), and pgpMpiSet().
static unsigned int pgpMpiLen | ( | const rpmuint8_t * | p | ) | [inline, static] |
Return no.
of bytes in a multiprecision integer.
p | pointer to multiprecision integer |
Definition at line 1127 of file rpmpgp.h.
References pgpMpiBits().
Referenced by pgpMpiHex(), pgpMpiStr(), pgpPrtPubkeyParams(), pgpPrtSeckeyParams(), pgpPrtSigParams(), and pgpPubkeyFingerprint().
static const char* pgpMpiStr | ( | const rpmuint8_t * | p | ) | [inline, static] |
Return hex formatted representation of a multiprecision integer.
p | bytes |
Definition at line 1180 of file rpmpgp.h.
References pgpGrab(), pgpHexCvt(), and pgpMpiLen().
Referenced by pgpPrtPubkeyParams(), pgpPrtSeckeyParams(), and pgpPrtSigParams().
int pgpPrtPkt | ( | const rpmuint8_t * | pkt, |
size_t | pleft | ||
) |
Return lenth of a OpenPGP packet.
pkt | OpenPGP packet (i.e. PGPTAG_PUBLIC_KEY) |
pleft | OpenPGP packet length (no. of bytes) |
pp | packet tag/ptr/len |
pkt | OpenPGP packet |
pleft | no. bytes remaining |
Definition at line 1038 of file rpmpgp.c.
References _digp, alloca(), pgpPktLen(), pgpPrtComment(), pgpPrtHex(), pgpPrtKey(), pgpPrtNL(), pgpPrtSig(), pgpPrtUserID(), pgpPrtVal(), pgpPubkeyFingerprint(), PGPTAG_COMMENT, PGPTAG_COMMENT_OLD, PGPTAG_COMPRESSED_DATA, PGPTAG_CONTROL, PGPTAG_ENCRYPTED_MDC, PGPTAG_LITERAL_DATA, PGPTAG_MARKER, PGPTAG_MDC, PGPTAG_PHOTOID, PGPTAG_PRIVATE_60, PGPTAG_PRIVATE_62, PGPTAG_PUBLIC_KEY, PGPTAG_PUBLIC_SESSION_KEY, PGPTAG_PUBLIC_SUBKEY, PGPTAG_RESERVED, PGPTAG_SECRET_KEY, PGPTAG_SECRET_SUBKEY, PGPTAG_SIGNATURE, PGPTAG_SYMMETRIC_DATA, PGPTAG_SYMMETRIC_SESSION_KEY, PGPTAG_TRUST, and PGPTAG_USER_ID.
Referenced by pgpPrtPkts().
int pgpPrtPkts | ( | const rpmuint8_t * | pkts, |
size_t | pktlen, | ||
pgpDig | dig, | ||
int | printing | ||
) |
Print/parse a OpenPGP packet(s).
pkts | OpenPGP packet(s) |
pktlen | OpenPGP packet(s) length (no. of bytes) |
dig | parsed output of signature/pubkey packet parameters |
printing | should packets be printed? |
Definition at line 1348 of file rpmpgp.c.
References _digp, _free(), _pgp_print, alloca(), pgpDigFree(), pgpDigLink(), pgpGrabPkts(), pgpPktLen(), pgpPrtPkt(), PGPTAG_SIGNATURE, and pgpValTbl_s::val.
Referenced by makeGPGSignature(), pgpsigFormat(), and rpmts_PgpPrtPkts().
void pgpPrtVal | ( | const char * | pre, |
pgpValTbl | vs, | ||
rpmuint8_t | val | ||
) |
Print an OpenPGP value.
pre | output prefix |
vs | table of (string,value) pairs |
val | byte value to print |
Definition at line 287 of file rpmpgp.c.
References _pgp_print, and pgpValStr().
Referenced by pgpPrtComment(), pgpPrtKey(), pgpPrtPkt(), pgpPrtSeckeyParams(), pgpPrtSig(), pgpPrtSubType(), and pgpPrtUserID().
int pgpPubkeyFingerprint | ( | const rpmuint8_t * | pkt, |
size_t | pktlen, | ||
rpmuint8_t * | keyid | ||
) |
Print/parse an OpenPGP subtype packet.
h | packet |
hlen | packet length (no. of bytes) |
sigtype | signature type |
pp | packet tag/ptr/len |
pp | packet tag/ptr/len |
pp | packet tag/ptr/len |
pp | packet tag/ptr/len |
pkt | OpenPGP packet (i.e. PGPTAG_PUBLIC_KEY) |
pktlen | OpenPGP packet length (no. of bytes) |
keyid | publick key fingerprint |
Definition at line 967 of file rpmpgp.c.
References _free(), alloca(), PGPHASHALGO_SHA1, pgpMpiLen(), pgpPktLen(), PGPPUBKEYALGO_DSA, PGPPUBKEYALGO_ECDSA, PGPPUBKEYALGO_RSA, PGPTAG_PUBLIC_KEY, PGPTAG_PUBLIC_SUBKEY, pgpPktKeyV4_s::pubkey_algo, pgpPktKeyV3_s::pubkey_algo, RPMDIGEST_NONE, rpmDigestFinal(), rpmDigestInit(), and rpmDigestUpdate().
Referenced by pgpExtractPubkeyFingerprint(), pgpPrtPkt(), rpmbcExportPubkey(), rpmcliImportPubkey(), rpmnsProbeSignature(), and rpmtsFindPubkey().
pgpArmor pgpReadPkts | ( | const char * | fn, |
rpmuint8_t ** | pkt, | ||
size_t * | pktlen | ||
) |
Parse armored OpenPGP packets from a file.
fn | file name |
pkt | dearmored OpenPGP packet(s) |
pktlen | dearmored OpenPGP packet(s) length in bytes |
Definition at line 1561 of file rpmpgp.c.
References PGPARMOR_ERR_NO_BEGIN_PGP, pgpArmorUnwrap(), rpmiobFree(), and rpmiobSlurp().
Referenced by processMetadataFile(), rpmcliImportPubkeys(), rpmnsProbeSignature(), and rpmtsFindPubkey().
int pgpSetFindPubkey | ( | pgpDig | dig, |
int(*)(void *ts, void *dig) | findPubkey, | ||
void * | _ts | ||
) |
Set find pubkey vector.
dig | signature parameters container |
findPubkey | routine to find a pubkey. |
_ts | argument to (*findPubkey) (ts, ...) |
Definition at line 1282 of file rpmpgp.c.
Referenced by rpmtsDig().
int pgpSetSig | ( | pgpDig | dig, |
rpmuint32_t | sigtag, | ||
rpmuint32_t | sigtype, | ||
const void * | sig, | ||
rpmuint32_t | siglen | ||
) |
Set signature tag info, i.e.
from header.
dig | signature parameters container |
sigtag | signature tag |
sigtype | signature tag type |
sig | signature tag data |
siglen | signature tag data length |
Definition at line 1254 of file rpmpgp.c.
Referenced by headerCheck(), rpmReadPackageFile(), and rpmVerifySignatures().
void* pgpStatsAccumulator | ( | pgpDig | dig, |
int | opx | ||
) |
Return pgpDig container accumulator structure.
dig | signature parameters container |
opx | per-container accumulator index (aka rpmtsOpX) |
Definition at line 1268 of file rpmpgp.c.
Referenced by headerCheck(), rpmReadPackageFile(), rpmtsCleanDig(), verifyDSA(), verifyMD5(), verifyRSA(), and verifySHA1().
static const char* pgpValStr | ( | pgpValTbl | vs, |
rpmuint8_t | val | ||
) | [inline, static] |
Return string representation of am OpenPGP value.
vs | table of (string,value) pairs |
val | byte value to lookup |
Definition at line 1199 of file rpmpgp.h.
References pgpValTbl_s::str, and pgpValTbl_s::val.
Referenced by _pgpHashAlgo2Name(), _pgpPubkeyAlgo2Name(), pgpArmorWrap(), and pgpPrtVal().
static int pgpValTok | ( | pgpValTbl | vs, |
const char * | s, | ||
const char * | se | ||
) | [inline, static] |
Return value of an OpenPGP string.
vs | table of (string,value) pairs |
s | string token to lookup |
se | end-of-string address |
Definition at line 1217 of file rpmpgp.h.
References pgpValTbl_s::str, and pgpValTbl_s::val.
Referenced by pgpArmorUnwrap().
pgpHashAlgo rpmDigestAlgo | ( | DIGEST_CTX | ctx | ) |
Return digest algorithm identifier.
ctx | digest context |
Definition at line 185 of file digest.c.
References DIGEST_CTX_s::hashalgo, and PGPHASHALGO_NONE.
Referenced by fdFiniDigest(), fdStealDigest(), rpmbcSetDSA(), rpmbcSetECDSA(), rpmbcSetELG(), rpmbcSetRSA(), verifyDSA(), and verifyRSA().
const char* rpmDigestASN1 | ( | DIGEST_CTX | ctx | ) |
Return digest ASN1 oid string.
Values from PKCS#1 v2.1 (aka RFC-3447).
ctx | digest context |
Definition at line 200 of file digest.c.
References DIGEST_CTX_s::asn1.
Referenced by rpmbcSetRSA().
DIGEST_CTX rpmDigestDup | ( | DIGEST_CTX | octx | ) |
Duplicate a digest context.
octx | existing digest context |
Definition at line 206 of file digest.c.
References DIGEST_CTX_s::asn1, DIGEST_CTX_s::blocksize, ctxGetPool(), DIGEST_CTX_s::Digest, DIGEST_CTX_s::digestsize, DIGEST_CTX_s::flags, DIGEST_CTX_s::hashalgo, DIGEST_CTX_s::name, DIGEST_CTX_s::param, DIGEST_CTX_s::paramsize, DIGEST_CTX_s::Reset, rpmioLinkPoolItem(), DIGEST_CTX_s::salt, DIGEST_CTX_s::Update, and xmalloc().
Referenced by verifyDSA(), verifyMD5(), verifyRSA(), verifySHA1(), and writeRPM().
rpmDigestFlags rpmDigestF | ( | DIGEST_CTX | ctx | ) |
Return digest flags.
ctx | digest context |
Definition at line 190 of file digest.c.
References DIGEST_CTX_s::flags, and RPMDIGEST_NONE.
int rpmDigestFinal | ( | DIGEST_CTX | ctx, |
void * | datap, | ||
size_t * | lenp, | ||
int | asAscii | ||
) |
Return digest and destroy context.
ctx | digest context |
*datap | digest |
*lenp | no. bytes of digest |
asAscii | return digest as ascii string? |
Definition at line 918 of file digest.c.
References _free(), DIGEST_CTX_s::blocksize, DIGEST_CTX_s::Digest, DIGEST_CTX_s::digestsize, DPRINTF, DIGEST_CTX_s::hashalgo, HMAC_OPAD, DIGEST_CTX_s::name, DIGEST_CTX_s::param, RPMDIGEST_NONE, rpmDigestFinal(), rpmDigestInit(), rpmDigestUpdate(), rpmioFreePoolItem(), DIGEST_CTX_s::salt, and xmalloc().
Referenced by _tagGenerate(), digestFormat(), dodigest(), fdFini(), fdFiniDigest(), makeHDRSignature(), pgpDigFini(), pgpPubkeyFingerprint(), rpmbcSetDSA(), rpmbcSetECDSA(), rpmbcSetELG(), rpmbcSetRSA(), rpmcliImportPubkey(), rpmdcParseZeroInstall(), rpmDigestFinal(), rpmHmacInit(), rpmrepoRfileDigest(), unsatisfiedDepend(), verifyMD5(), and verifySHA1().
DIGEST_CTX rpmDigestInit | ( | pgpHashAlgo | hashalgo, |
rpmDigestFlags | flags | ||
) |
Initialize digest.
Set bit count to 0 and buffer to mysterious initialization constants.
hashalgo | type of digest |
flags | bit(s) to control digest operation |
Definition at line 241 of file digest.c.
References __adler32(), __adler32_combine(), __crc32(), __crc32_combine(), __crc64(), __crc64_combine(), DIGEST_CTX_s::asn1, DIGEST_CTX_s::blocksize, sum64Param::combine, sum32Param::combine, ctxGetPool(), DIGEST_CTX_s::Digest, DIGEST_CTX_s::digestsize, DPRINTF, DIGEST_CTX_s::flags, DIGEST_CTX_s::hashalgo, L, md6_Update(), DIGEST_CTX_s::name, noopReset(), DIGEST_CTX_s::param, DIGEST_CTX_s::paramsize, PGPHASHALGO_ADLER32, PGPHASHALGO_ARIRANG_224, PGPHASHALGO_ARIRANG_256, PGPHASHALGO_ARIRANG_384, PGPHASHALGO_ARIRANG_512, PGPHASHALGO_BLAKE_224, PGPHASHALGO_BLAKE_256, PGPHASHALGO_BLAKE_384, PGPHASHALGO_BLAKE_512, PGPHASHALGO_BMW_224, PGPHASHALGO_BMW_256, PGPHASHALGO_BMW_384, PGPHASHALGO_BMW_512, PGPHASHALGO_CHI_224, PGPHASHALGO_CHI_256, PGPHASHALGO_CHI_384, PGPHASHALGO_CHI_512, PGPHASHALGO_CRC32, PGPHASHALGO_CRC64, PGPHASHALGO_CUBEHASH_224, PGPHASHALGO_CUBEHASH_256, PGPHASHALGO_CUBEHASH_384, PGPHASHALGO_CUBEHASH_512, PGPHASHALGO_ECHO_224, PGPHASHALGO_ECHO_256, PGPHASHALGO_ECHO_384, PGPHASHALGO_ECHO_512, PGPHASHALGO_EDONR_224, PGPHASHALGO_EDONR_256, PGPHASHALGO_EDONR_384, PGPHASHALGO_EDONR_512, PGPHASHALGO_FUGUE_224, PGPHASHALGO_FUGUE_256, PGPHASHALGO_FUGUE_384, PGPHASHALGO_FUGUE_512, PGPHASHALGO_GROESTL_224, PGPHASHALGO_GROESTL_256, PGPHASHALGO_GROESTL_384, PGPHASHALGO_GROESTL_512, PGPHASHALGO_HAMSI_224, PGPHASHALGO_HAMSI_256, PGPHASHALGO_HAMSI_384, PGPHASHALGO_HAMSI_512, PGPHASHALGO_HAVAL_5_160, PGPHASHALGO_JH_224, PGPHASHALGO_JH_256, PGPHASHALGO_JH_384, PGPHASHALGO_JH_512, PGPHASHALGO_JLU32, PGPHASHALGO_KECCAK_224, PGPHASHALGO_KECCAK_256, PGPHASHALGO_KECCAK_384, PGPHASHALGO_KECCAK_512, PGPHASHALGO_LANE_224, PGPHASHALGO_LANE_256, PGPHASHALGO_LANE_384, PGPHASHALGO_LANE_512, PGPHASHALGO_LUFFA_224, PGPHASHALGO_LUFFA_256, PGPHASHALGO_LUFFA_384, PGPHASHALGO_LUFFA_512, PGPHASHALGO_MD2, PGPHASHALGO_MD4, PGPHASHALGO_MD5, PGPHASHALGO_MD6_224, PGPHASHALGO_MD6_256, PGPHASHALGO_MD6_384, PGPHASHALGO_MD6_512, PGPHASHALGO_RIPEMD128, PGPHASHALGO_RIPEMD160, PGPHASHALGO_RIPEMD256, PGPHASHALGO_RIPEMD320, PGPHASHALGO_SALSA10, PGPHASHALGO_SALSA20, PGPHASHALGO_SHA1, PGPHASHALGO_SHA224, PGPHASHALGO_SHA256, PGPHASHALGO_SHA384, PGPHASHALGO_SHA512, PGPHASHALGO_SHABAL_224, PGPHASHALGO_SHABAL_256, PGPHASHALGO_SHABAL_384, PGPHASHALGO_SHABAL_512, PGPHASHALGO_SHAVITE3_224, PGPHASHALGO_SHAVITE3_256, PGPHASHALGO_SHAVITE3_384, PGPHASHALGO_SHAVITE3_512, PGPHASHALGO_SIMD_224, PGPHASHALGO_SIMD_256, PGPHASHALGO_SIMD_384, PGPHASHALGO_SIMD_512, PGPHASHALGO_SKEIN_1024, PGPHASHALGO_SKEIN_224, PGPHASHALGO_SKEIN_256, PGPHASHALGO_SKEIN_384, PGPHASHALGO_SKEIN_512, PGPHASHALGO_TIB3_224, PGPHASHALGO_TIB3_256, PGPHASHALGO_TIB3_384, PGPHASHALGO_TIB3_512, PGPHASHALGO_TIGER192, DIGEST_CTX_s::Reset, rpmioFreePoolItem(), rpmioLinkPoolItem(), DIGEST_CTX_s::salt, sum32Digest(), sum32Reset(), sum32Update(), sum64Digest(), sum64Reset(), sum64Update(), sum64Param::update, sum32Param::update, DIGEST_CTX_s::Update, and xcalloc().
Referenced by _tagGenerate(), digestFormat(), dodigest(), fdInitDigest(), headerCheck(), makeHDRSignature(), pgpPubkeyFingerprint(), readFile(), rpmcliImportPubkey(), rpmdcParseZeroInstall(), rpmDigestFinal(), rpmHmacInit(), rpmnsProbeSignature(), rpmReadPackageFile(), rpmrepoRfileDigest(), and unsatisfiedDepend().
const char* rpmDigestName | ( | DIGEST_CTX | ctx | ) |
Return digest name.
ctx | digest context |
Definition at line 195 of file digest.c.
References DIGEST_CTX_s::name.
Referenced by verifyDSA(), verifyMD5(), verifyRSA(), and verifySHA1().
int rpmDigestUpdate | ( | DIGEST_CTX | ctx, |
const void * | data, | ||
size_t | len | ||
) |
Update context with next plain text buffer.
ctx | digest context |
data | next data buffer |
len | no. bytes of data |
Definition at line 904 of file digest.c.
References DPRINTF, DIGEST_CTX_s::name, DIGEST_CTX_s::param, and DIGEST_CTX_s::Update.
Referenced by _tagGenerate(), digestFormat(), dodigest(), fdUpdateDigests(), headerCheck(), makeHDRSignature(), pgpPubkeyFingerprint(), readFile(), rpmbcExportSignature(), rpmcliImportPubkey(), rpmdcParseZeroInstall(), rpmDigestFinal(), rpmHmacInit(), rpmnsProbeSignature(), rpmReadPackageFile(), rpmrepoRfileDigest(), unsatisfiedDepend(), verifyDSA(), and verifyRSA().
int rpmHmacInit | ( | DIGEST_CTX | ctx, |
const void * | key, | ||
size_t | keylen | ||
) |
Compute key material and add to digest context.
ctx | digest context |
key | HMAC key (NULL does digest instead) |
keylen | HMAC key length(bytes) (0 uses strlen(key)) |
Definition at line 980 of file digest.c.
References _free(), DIGEST_CTX_s::blocksize, DPRINTF, DIGEST_CTX_s::hashalgo, HMAC_IPAD, DIGEST_CTX_s::name, RPMDIGEST_NONE, rpmDigestFinal(), rpmDigestInit(), rpmDigestUpdate(), DIGEST_CTX_s::salt, and xcalloc().
Referenced by dodigest(), fdInitHmac(), and rpmdcParseZeroInstall().
struct pgpValTbl_s pgpArmorKeyTbl[] |
struct pgpValTbl_s pgpArmorTbl[] |
struct pgpValTbl_s pgpCompressionTbl[] |
struct pgpValTbl_s pgpHashTbl[] |
Hash (string, value) pairs.
Definition at line 141 of file rpmpgp.c.
Referenced by _pgpHashAlgo2Name(), and pgpHashAlgoStringToNumber().
struct pgpValTbl_s pgpPubkeyTbl[] |
Definition at line 100 of file rpmpgp.c.
Referenced by _pgpPubkeyAlgo2Name().
struct pgpValTbl_s pgpSigTypeTbl[] |
struct pgpValTbl_s pgpSubTypeTbl[] |
struct pgpValTbl_s pgpSymkeyTbl[] |
struct pgpValTbl_s pgpTagTbl[] |
Referenced by rpmioAllArgCallback().