[exim-cvs] cvs commit: exim/exim-src/src/pdkim pdkim.c pdkim…

Startseite
Nachricht löschen
Nachricht beantworten
Autor: Tom Kistner
Datum:  
To: exim-cvs
Betreff: [exim-cvs] cvs commit: exim/exim-src/src/pdkim pdkim.c pdkim.h
tom 2009/03/17 16:20:13 GMT

  Modified files:        (Branch: DEVEL_PDKIM)
    exim-src/src/pdkim   pdkim.c pdkim.h 
  Log:
  more pdkim wip


  Revision  Changes    Path
  1.1.2.8   +40 -36    exim/exim-src/src/pdkim/pdkim.c
  1.1.2.7   +18 -13    exim/exim-src/src/pdkim/pdkim.h


  Index: pdkim.c
  ===================================================================
  RCS file: /home/cvs/exim/exim-src/src/pdkim/Attic/pdkim.c,v
  retrieving revision 1.1.2.7
  retrieving revision 1.1.2.8
  diff -u -r1.1.2.7 -r1.1.2.8
  --- pdkim.c    17 Mar 2009 14:56:55 -0000    1.1.2.7
  +++ pdkim.c    17 Mar 2009 16:20:13 -0000    1.1.2.8
  @@ -1,4 +1,4 @@
  -/* $Cambridge: exim/exim-src/src/pdkim/pdkim.c,v 1.1.2.7 2009/03/17 14:56:55 tom Exp $ */
  +/* $Cambridge: exim/exim-src/src/pdkim/pdkim.c,v 1.1.2.8 2009/03/17 16:20:13 tom Exp $ */
   /* pdkim.c */


   #include <stdlib.h>
  @@ -136,9 +136,8 @@
     pdkim_stringlist *new_entry = malloc(sizeof(pdkim_stringlist));
     if (new_entry == NULL) return NULL;
     memset(new_entry,0,sizeof(pdkim_stringlist));
  -  new_entry->value = malloc(strlen(str)+1);
  +  new_entry->value = strdup(str);
     if (new_entry->value == NULL) return NULL;
  -  strcpy(new_entry->value,str);
     if (base != NULL) {
       pdkim_stringlist *last = base;
       while (last->next != NULL) { last = last->next; };
  @@ -243,15 +242,18 @@
         free(c);
       }


  -    if (sig->sigdata        != NULL) free(sig->sigdata);
  -    if (sig->bodyhash       != NULL) free(sig->bodyhash);
  -    if (sig->selector       != NULL) free(sig->selector);
  -    if (sig->domain         != NULL) free(sig->domain);
  -    if (sig->identity       != NULL) free(sig->identity);
  -    if (sig->headernames    != NULL) free(sig->headernames);
  -    if (sig->copiedheaders  != NULL) free(sig->copiedheaders);
  -    if (sig->rsa_privkey    != NULL) free(sig->rsa_privkey);
  -    if (sig->sign_headers   != NULL) free(sig->sign_headers);
  +    if (sig->sigdata          != NULL) free(sig->sigdata);
  +    if (sig->bodyhash         != NULL) free(sig->bodyhash);
  +    if (sig->selector         != NULL) free(sig->selector);
  +    if (sig->domain           != NULL) free(sig->domain);
  +    if (sig->identity         != NULL) free(sig->identity);
  +    if (sig->headernames      != NULL) free(sig->headernames);
  +    if (sig->copiedheaders    != NULL) free(sig->copiedheaders);
  +    if (sig->rsa_privkey      != NULL) free(sig->rsa_privkey);
  +    if (sig->sign_headers     != NULL) free(sig->sign_headers);
  +    if (sig->signature_header != NULL) free(sig->signature_header);
  +    if (sig->sha1_body        != NULL) free(sig->sha1_body);
  +    if (sig->sha2_body        != NULL) free(sig->sha2_body);


       if (sig->pubkey != NULL) pdkim_free_pubkey(sig->pubkey);


  @@ -291,12 +293,11 @@
     if (hname == NULL) return PDKIM_ERR_OOM;
     memset(hname,0,(hcolon-header)+1);
     strncpy(hname,header,(hcolon-header));
  -  lcopy = malloc(strlen(list)+1);
  +  lcopy = strdup(list);
     if (lcopy == NULL) {
       free(hname);
       return PDKIM_ERR_OOM;
     }
  -  strcpy(lcopy,list);
     p = lcopy;
     q = strchr(p,':');
     while (q != NULL) {
  @@ -1209,7 +1210,7 @@



   /* -------------------------------------------------------------------------- */
  -int pdkim_feed_finish(pdkim_ctx *ctx, char **signature) {
  +int pdkim_feed_finish(pdkim_ctx *ctx, pdkim_signature **return_signatures) {
     pdkim_signature *sig = ctx->sig;
     pdkim_str *headernames = NULL;             /* Collected signed header names */


  @@ -1386,11 +1387,8 @@
         }
         #endif


  -      /* Recreate signature header with b= included, return it to the caller */
  -      if (signature != NULL) {
  -        *signature = pdkim_create_header(ctx->sig,1);
  -        if (*signature == NULL) return PDKIM_ERR_OOM;
  -      }
  +      sig->signature_header = pdkim_create_header(ctx->sig,1);
  +      if (sig->signature_header == NULL) return PDKIM_ERR_OOM;
       }
       /* VERIFICATION ----------------------------------------------------------- */
       else {
  @@ -1500,6 +1498,11 @@
       sig = sig->next;
     }


  +  /* If requested, set return pointer to signature(s) */
  +  if (return_signatures != NULL) {
  +    *return_signatures = ctx->sig;
  +  }
  +
     return PDKIM_OK;
   }


  @@ -1557,20 +1560,27 @@
     ctx->input_mode = input_mode;
     ctx->sig = sig;


- ctx->sig->domain = malloc(strlen(domain)+1);
- ctx->sig->selector = malloc(strlen(selector)+1);
- ctx->sig->rsa_privkey = malloc(strlen(rsa_privkey)+1);
+ ctx->sig->domain = strdup(domain);
+ ctx->sig->selector = strdup(selector);
+ ctx->sig->rsa_privkey = strdup(rsa_privkey);

     if (!ctx->sig->domain || !ctx->sig->selector || !ctx->sig->rsa_privkey) {
       pdkim_free_ctx(ctx);
       return NULL;
     }


  -  strcpy(ctx->sig->domain, domain);
  -  strcpy(ctx->sig->selector, selector);
  -  strcpy(ctx->sig->rsa_privkey, rsa_privkey);
  -
  +  ctx->sig->sha1_body = malloc(sizeof(sha1_context));
  +  if (ctx->sig->sha1_body == NULL) {
  +    pdkim_free_ctx(ctx);
  +    return NULL;
  +  }
     sha1_starts(ctx->sig->sha1_body);
  +
  +  ctx->sig->sha2_body = malloc(sizeof(sha2_context));
  +  if (ctx->sig->sha2_body == NULL) {
  +    pdkim_free_ctx(ctx);
  +    return NULL;
  +  }
     sha2_starts(ctx->sig->sha2_body,0);


     return ctx;
  @@ -1596,19 +1606,13 @@
                          unsigned long expires) {


     if (identity != NULL) {
  -    ctx->sig->identity = malloc(strlen(identity)+1);
  -    if (!ctx->sig->identity) {
  -      return PDKIM_ERR_OOM;
  -    }
  -    strcpy(ctx->sig->identity, identity);
  +    ctx->sig->identity = strdup(identity);
  +    if (ctx->sig->identity == NULL) return PDKIM_ERR_OOM;
     }


     if (sign_headers != NULL) {
  -    ctx->sig->sign_headers = malloc(strlen(sign_headers)+1);
  -    if (!ctx->sig->sign_headers) {
  -      return PDKIM_ERR_OOM;
  -    }
  -    strcpy(ctx->sig->sign_headers, sign_headers);
  +    ctx->sig->sign_headers = strdup(sign_headers);
  +    if (ctx->sig->sign_headers == NULL) return PDKIM_ERR_OOM;
     }


     ctx->sig->canon_headers = canon_headers;


  Index: pdkim.h
  ===================================================================
  RCS file: /home/cvs/exim/exim-src/src/pdkim/Attic/pdkim.h,v
  retrieving revision 1.1.2.6
  retrieving revision 1.1.2.7
  diff -u -r1.1.2.6 -r1.1.2.7
  --- pdkim.h    17 Mar 2009 14:56:55 -0000    1.1.2.6
  +++ pdkim.h    17 Mar 2009 16:20:13 -0000    1.1.2.7
  @@ -1,4 +1,4 @@
  -/* $Cambridge: exim/exim-src/src/pdkim/pdkim.h,v 1.1.2.6 2009/03/17 14:56:55 tom Exp $ */
  +/* $Cambridge: exim/exim-src/src/pdkim/pdkim.h,v 1.1.2.7 2009/03/17 16:20:13 tom Exp $ */
   /* pdkim-api.h */


   /* -------------------------------------------------------------------------- */
  @@ -121,15 +121,21 @@
     /* (z=) */
     char *copiedheaders;


  -  /* (b=) Decoded raw signature data, along with its length in bytes */
  +  /* (b=) Raw signature data, along with its length in bytes */
     char *sigdata;
     int   sigdata_len;


  -  /* (bh=) Decoded raw body hash data, along with its length in bytes */
  +  /* (bh=) Raw body hash data, along with its length in bytes */
     char *bodyhash;
     int   bodyhash_len;


  -  /* The main verification status. One of:
  +  /* Folded DKIM-Signature: header. Singing only, NULL for verifying.
  +     Ready for insertion into the message. Note: Folded using CRLFTB,
  +     but final line terminator is NOT included. Note2: This buffer is
  +     free()d when you call pdkim_free_ctx(). */
  +  char *signature_header;
  +
  +  /* The main verification status. Verification only. One of:


        PDKIM_VERIFY_NONE      Verification was not attempted. This status
                               should not appear.
  @@ -140,16 +146,15 @@


        PDKIM_VERIFY_FAIL      Verification failed because either the body
                               hash did not match, or the signature verification
  -                            failed. This probably means the message was
  -                            modified. Check verify_ext_status for the
  -                            exact reason.
  +                            failed. This means the message was modified.
  +                            Check verify_ext_status for the exact reason.


        PDKIM_VERIFY_PASS      Verification succeeded.
     */
     int verify_status;


  -  /* Extended verification status. Depending on the value of verify_status,
  -     it can contain:
  +  /* Extended verification status. Verification only. Depending on the value
  +     of verify_status, it can contain:


        For verify_status == PDKIM_VERIFY_INVALID:


@@ -178,11 +183,11 @@

     /* Pointer to a public key record that was used to verify the signature.
        See pdkim_pubkey declaration above for more information.
  -     Caution: can be NULL if no record was retrieved. */
  +     Caution: is NULL if signing or if no record was retrieved. */
     pdkim_pubkey *pubkey;


  -  /* Pointer to the next pdkim_signature signature. NULL if this is the
  -     last signature. */
  +  /* Pointer to the next pdkim_signature signature. NULL if signing or if
  +     this is the last signature. */
     void *next;


     /* Properties below this point are used internally only ------------- */
  @@ -202,7 +207,7 @@



   /* -------------------------------------------------------------------------- */
  -/* Context to keep state between all operations */
  +/* Context to keep state between all operations. */
   #define PDKIM_MODE_SIGN     0
   #define PDKIM_MODE_VERIFY   1
   #define PDKIM_INPUT_NORMAL  0
  @@ -257,7 +262,7 @@
                                  unsigned long);


   int   pdkim_feed              (pdkim_ctx *, char *, int);
  -int   pdkim_feed_finish       (pdkim_ctx *, char **);
  +int   pdkim_feed_finish       (pdkim_ctx *, pdkim_signature **);


   void  pdkim_free_ctx          (pdkim_ctx *);