X-Git-Url: https://git.sommitrealweird.co.uk/onak.git/blobdiff_plain/32851537d44f08b08ed317cbc4281ce003f84fa4..4843efc642ddcfe524bb6ba37b01154e57489ff7:/parsekey.c?ds=sidebyside diff --git a/parsekey.c b/parsekey.c index a98e8cc..b492937 100644 --- a/parsekey.c +++ b/parsekey.c @@ -5,7 +5,7 @@ * * Copyright 2002 Project Purple * - * $Id: parsekey.c,v 1.9 2003/09/28 21:07:49 noodles Exp $ + * $Id: parsekey.c,v 1.14 2003/09/30 21:59:33 noodles Exp $ */ #include @@ -162,6 +162,7 @@ int debug_packet(struct openpgp_packet *packet) * @getchar_func: The function to get the next character from the stream. * @ctx: A pointer to the context structure for getchar_func. * @packets: The outputted list of packets. + * @maxnum: The maximum number of keys to read. 0 means unlimited. * * This function uses getchar_func to read characters from an OpenPGP * packet stream and reads the packets into a linked list of packets @@ -170,17 +171,26 @@ int debug_packet(struct openpgp_packet *packet) int read_openpgp_stream(int (*getchar_func)(void *ctx, size_t count, unsigned char *c), void *ctx, - struct openpgp_packet_list **packets) + struct openpgp_packet_list **packets, + int maxnum) { unsigned char curchar = 0; unsigned long count = 0; struct openpgp_packet_list *curpacket = NULL; int rc = 0; + int keys = 0; bool inpacket = false; assert(packets != NULL); + curpacket = *packets; + if (curpacket != NULL) { + while (curpacket->next != NULL) { + curpacket = curpacket->next; + } + } - while (!rc && !getchar_func(ctx, 1, &curchar)) { + while (!rc && !getchar_func(ctx, 1, &curchar) && + (maxnum == 0 || keys < maxnum)) { if (!inpacket && (curchar & 0x80)) { /* * New packet. Record the fact we're in a packet and @@ -219,7 +229,9 @@ int read_openpgp_stream(int (*getchar_func)(void *ctx, size_t count, curpacket->packet->length += 192; } else if (curpacket->packet->length > 223 && curpacket->packet->length < 255) { - printf("Partial length; not supported.\n"); + logthing(LOGTHING_NOTICE, + "Partial length;" + " not supported."); } else if (curpacket->packet->length == 255) { /* * 5 byte length; ie 255 followed by 3 @@ -275,6 +287,9 @@ int read_openpgp_stream(int (*getchar_func)(void *ctx, size_t count, } if (rc == 0) { + if (curpacket->packet->tag == 6) { + keys++; + } curpacket->packet->data = malloc(curpacket->packet->length * sizeof(unsigned char));