#include "i18n.h"
-static void
-store_cert (KsbaCert cert)
-{
- KEYDB_HANDLE kh;
- int rc;
-
- kh = keydb_new (0);
- if (!kh)
- {
- log_error (_("failed to allocated keyDB handle\n"));
- return;
- }
- rc = keydb_locate_writable (kh, 0);
- if (rc)
- log_error (_("error finding writable keyDB: %s\n"), gnupg_strerror (rc));
-
- rc = keydb_insert_cert (kh, cert);
- if (rc)
- {
- log_error (_("error storing certificate: %s\n"), gnupg_strerror (rc));
- }
- keydb_release (kh);
-}
-
-
-
\f
int
gpgsm_import (CTRL ctrl, int in_fd)
Base64Context b64reader = NULL;
KsbaReader reader;
KsbaCert cert = NULL;
+ KsbaCMS cms = NULL;
FILE *fp = NULL;
+ KsbaContentType ct;
fp = fdopen ( dup (in_fd), "rb");
if (!fp)
goto leave;
}
- cert = ksba_cert_new ();
- if (!cert)
- {
- rc = seterr (Out_Of_Core);
- goto leave;
- }
+ ct = ksba_cms_identify (reader);
+ if (ct == KSBA_CT_SIGNED_DATA)
+ { /* This is probably a signed-only message - import the certs */
+ KsbaStopReason stopreason;
+ int i;
+
+ cms = ksba_cms_new ();
+ if (!cms)
+ {
+ rc = seterr (Out_Of_Core);
+ goto leave;
+ }
+
+ rc = ksba_cms_set_reader_writer (cms, reader, NULL);
+ if (rc)
+ {
+ log_error ("ksba_cms_set_reader_writer failed: %s\n",
+ ksba_strerror (rc));
+ rc = map_ksba_err (rc);
+ goto leave;
+ }
+
+
+ do
+ {
+ rc = ksba_cms_parse (cms, &stopreason);
+ if (rc)
+ {
+ log_error ("ksba_cms_parse failed: %s\n", ksba_strerror (rc));
+ rc = map_ksba_err (rc);
+ goto leave;
+ }
+
+ if (stopreason == KSBA_SR_BEGIN_DATA)
+ log_info ("not a certs-only message\n");
+ }
+ while (stopreason != KSBA_SR_READY);
+
+ for (i=0; (cert=ksba_cms_get_cert (cms, i)); i++)
+ {
+ if ( !gpgsm_basic_cert_check (cert) )
+ {
+ if (!keydb_store_cert (cert))
+ {
+ if (opt.verbose)
+ log_info ("certificate imported\n");
+ }
+ }
+ ksba_cert_release (cert);
+ cert = NULL;
+ }
- rc = ksba_cert_read_der (cert, reader);
- if (rc)
+ }
+ else if (ct == KSBA_CT_NONE)
+ { /* Failed to identify this message - assume a certificate */
+
+ cert = ksba_cert_new ();
+ if (!cert)
+ {
+ rc = seterr (Out_Of_Core);
+ goto leave;
+ }
+
+ rc = ksba_cert_read_der (cert, reader);
+ if (rc)
+ {
+ rc = map_ksba_err (rc);
+ goto leave;
+ }
+
+ if ( !gpgsm_basic_cert_check (cert) )
+ {
+ if (!keydb_store_cert (cert))
+ {
+ if (opt.verbose)
+ log_info ("certificate imported\n");
+ }
+ }
+ }
+ else
{
- rc = map_ksba_err (rc);
- goto leave;
+ log_error ("can't extract certificates from input\n");
+ rc = GNUPG_No_Data;
}
-
- if ( !gpgsm_validate_path (cert) )
- store_cert (cert);
+
leave:
+ ksba_cms_release (cms);
ksba_cert_release (cert);
gpgsm_destroy_reader (b64reader);
if (fp)
}
+
+