Blame SOURCES/gnupg-2.2.20-file-is-digest.patch

8a904a
diff -up gnupg-2.2.20/g10/gpg.c.file-is-digest gnupg-2.2.20/g10/gpg.c
8a904a
--- gnupg-2.2.20/g10/gpg.c.file-is-digest	2020-04-14 16:33:42.630269318 +0200
8a904a
+++ gnupg-2.2.20/g10/gpg.c	2020-04-14 16:34:46.455100086 +0200
8a904a
@@ -380,6 +380,7 @@ enum cmd_and_opt_values
e4fdbb
     oTTYtype,
e4fdbb
     oLCctype,
e4fdbb
     oLCmessages,
e4fdbb
+    oFileIsDigest,
e4fdbb
     oXauthority,
e4fdbb
     oGroup,
e4fdbb
     oUnGroup,
8a904a
@@ -831,6 +832,7 @@ static ARGPARSE_OPTS opts[] = {
e4fdbb
   ARGPARSE_s_s (oPersonalCompressPreferences,
e4fdbb
                                          "personal-compress-preferences", "@"),
e4fdbb
   ARGPARSE_s_s (oFakedSystemTime, "faked-system-time", "@"),
e4fdbb
+  ARGPARSE_s_n (oFileIsDigest, "file-is-digest", "@"),
e4fdbb
   ARGPARSE_s_s (oWeakDigest, "weak-digest","@"),
e4fdbb
   ARGPARSE_s_n (oUnwrap, "unwrap", "@"),
e4fdbb
   ARGPARSE_s_n (oOnlySignTextIDs, "only-sign-text-ids", "@"),
8a904a
@@ -2419,6 +2421,7 @@ main (int argc, char **argv)
e4fdbb
     opt.keyid_format = KF_NONE;
e4fdbb
     opt.def_sig_expire = "0";
e4fdbb
     opt.def_cert_expire = "0";
e4fdbb
+    opt.file_is_digest = 0;
e4fdbb
     gnupg_set_homedir (NULL);
e4fdbb
     opt.passphrase_repeat = 1;
e4fdbb
     opt.emit_version = 0;
8a904a
@@ -2997,6 +3000,7 @@ main (int argc, char **argv)
e4fdbb
 	    opt.verify_options&=~VERIFY_SHOW_PHOTOS;
e4fdbb
 	    break;
e4fdbb
 	  case oPhotoViewer: opt.photo_viewer = pargs.r.ret_str; break;
e4fdbb
+	  case oFileIsDigest: opt.file_is_digest = 1; break;
e4fdbb
 
e4fdbb
           case oDisableSignerUID: opt.flags.disable_signer_uid = 1; break;
8a904a
           case oIncludeKeyBlock:  opt.flags.include_key_block = 1; break;
8a904a
diff -up gnupg-2.2.20/g10/options.h.file-is-digest gnupg-2.2.20/g10/options.h
8a904a
--- gnupg-2.2.20/g10/options.h.file-is-digest	2020-03-14 19:54:05.000000000 +0100
8a904a
+++ gnupg-2.2.20/g10/options.h	2020-04-14 16:33:42.634269245 +0200
8a904a
@@ -202,6 +202,7 @@ struct
e4fdbb
   int no_auto_check_trustdb;
e4fdbb
   int preserve_permissions;
e4fdbb
   int no_homedir_creation;
e4fdbb
+  int file_is_digest;
e4fdbb
   struct groupitem *grouplist;
e4fdbb
   int mangle_dos_filenames;
e4fdbb
   int enable_progress_filter;
8a904a
diff -up gnupg-2.2.20/g10/sign.c.file-is-digest gnupg-2.2.20/g10/sign.c
8a904a
--- gnupg-2.2.20/g10/sign.c.file-is-digest	2020-03-14 19:35:46.000000000 +0100
8a904a
+++ gnupg-2.2.20/g10/sign.c	2020-04-14 16:36:54.661751422 +0200
e4fdbb
@@ -40,6 +40,7 @@
e4fdbb
 #include "pkglue.h"
e4fdbb
 #include "../common/sysutils.h"
e4fdbb
 #include "call-agent.h"
e4fdbb
+#include "../common/host2net.h"
e4fdbb
 #include "../common/mbox-util.h"
e4fdbb
 #include "../common/compliance.h"
e4fdbb
 
8a904a
@@ -834,6 +835,8 @@ write_signature_packets (ctrl_t ctrl,
e4fdbb
       if (duration || opt.sig_policy_url
e4fdbb
           || opt.sig_notations || opt.sig_keyserver_url)
e4fdbb
         sig->version = 4;
e4fdbb
+	  else if (opt.file_is_digest)
e4fdbb
+        sig->version = 3;
e4fdbb
       else
e4fdbb
         sig->version = pk->version;
e4fdbb
 
8a904a
@@ -860,8 +863,11 @@ write_signature_packets (ctrl_t ctrl,
8a904a
           else
8a904a
             err = 0;
e4fdbb
         }
e4fdbb
-      hash_sigversion_to_magic (md, sig);
e4fdbb
-      gcry_md_final (md);
8a904a
+
e4fdbb
+      if (!opt.file_is_digest) {
e4fdbb
+	hash_sigversion_to_magic (md, sig);
e4fdbb
+	gcry_md_final (md);
e4fdbb
+      }
e4fdbb
 
8a904a
       if (!err)
8a904a
         err = do_sign (ctrl, pk, sig, md, hash_for (pk), cache_nonce, 0);
8a904a
@@ -924,6 +930,8 @@ sign_file (ctrl_t ctrl, strlist_t filena
e4fdbb
     SK_LIST sk_rover = NULL;
e4fdbb
     int multifile = 0;
e4fdbb
     u32 duration=0;
e4fdbb
+    int sigclass = 0x00;
e4fdbb
+    u32 timestamp = 0;
e4fdbb
 
e4fdbb
     pfx = new_progress_context ();
e4fdbb
     afx = new_armor_context ();
8a904a
@@ -941,7 +949,16 @@ sign_file (ctrl_t ctrl, strlist_t filena
e4fdbb
 	fname = NULL;
e4fdbb
 
e4fdbb
     if( fname && filenames->next && (!detached || encryptflag) )
e4fdbb
-	log_bug("multiple files can only be detached signed");
e4fdbb
+	log_bug("multiple files can only be detached signed\n");
e4fdbb
+
e4fdbb
+    if (opt.file_is_digest && (multifile || !fname))
e4fdbb
+	log_bug("file-is-digest only works with one file\n");
e4fdbb
+    if (opt.file_is_digest && !detached)
e4fdbb
+	log_bug("file-is-digest can only write detached signatures\n");
e4fdbb
+    if (opt.file_is_digest && !opt.def_digest_algo)
e4fdbb
+	log_bug("file-is-digest needs --digest-algo\n");
e4fdbb
+    if (opt.file_is_digest && opt.textmode)
e4fdbb
+	log_bug("file-is-digest doesn't work with --textmode\n");
e4fdbb
 
e4fdbb
     if(encryptflag==2
e4fdbb
        && (rc=setup_symkey(&efx.symkey_s2k,&efx.symkey_dek)))
8a904a
@@ -962,7 +979,7 @@ sign_file (ctrl_t ctrl, strlist_t filena
e4fdbb
       goto leave;
e4fdbb
 
e4fdbb
     /* prepare iobufs */
e4fdbb
-    if( multifile )  /* have list of filenames */
e4fdbb
+    if( multifile || opt.file_is_digest)  /* have list of filenames */
e4fdbb
 	inp = NULL; /* we do it later */
e4fdbb
     else {
e4fdbb
       inp = iobuf_open(fname);
8a904a
@@ -1100,7 +1117,7 @@ sign_file (ctrl_t ctrl, strlist_t filena
e4fdbb
     for (sk_rover = sk_list; sk_rover; sk_rover = sk_rover->next)
e4fdbb
       gcry_md_enable (mfx.md, hash_for (sk_rover->pk));
e4fdbb
 
e4fdbb
-    if( !multifile )
e4fdbb
+    if( !multifile && !opt.file_is_digest )
e4fdbb
 	iobuf_push_filter( inp, md_filter, &mfx );
e4fdbb
 
e4fdbb
     if( detached && !encryptflag)
8a904a
@@ -1155,6 +1172,8 @@ sign_file (ctrl_t ctrl, strlist_t filena
e4fdbb
 
e4fdbb
     write_status_begin_signing (mfx.md);
e4fdbb
 
e4fdbb
+    sigclass = opt.textmode && !outfile? 0x01 : 0x00;
e4fdbb
+
e4fdbb
     /* Setup the inner packet. */
e4fdbb
     if( detached ) {
e4fdbb
 	if( multifile ) {
8a904a
@@ -1195,6 +1214,45 @@ sign_file (ctrl_t ctrl, strlist_t filena
e4fdbb
 	    if( opt.verbose )
e4fdbb
               log_printf ("\n");
e4fdbb
 	}
e4fdbb
+	else if (opt.file_is_digest) {
e4fdbb
+	    byte *mdb, ts[5];
e4fdbb
+	    size_t mdlen;
e4fdbb
+	    const char *fp;
e4fdbb
+	    int c, d;
e4fdbb
+
e4fdbb
+	    gcry_md_final(mfx.md);
e4fdbb
+	    /* this assumes gcry_md_read returns the same buffer */
e4fdbb
+	    mdb = gcry_md_read(mfx.md, opt.def_digest_algo);
e4fdbb
+		mdlen = gcry_md_get_algo_dlen(opt.def_digest_algo);
e4fdbb
+	    if (strlen(fname) != mdlen * 2 + 11)
e4fdbb
+	        log_bug("digests must be %zu + @ + 5 bytes\n", mdlen);
e4fdbb
+	    d = -1;
e4fdbb
+	    for (fp = fname ; *fp; ) {
e4fdbb
+		c = *fp++;
e4fdbb
+		if (c >= '0' && c <= '9')
e4fdbb
+		    c -= '0';
e4fdbb
+		else if (c >= 'a' && c <= 'f')
e4fdbb
+		    c -= 'a' - 10;
e4fdbb
+		else if (c >= 'A' && c <= 'F')
e4fdbb
+		    c -= 'A' - 10;
e4fdbb
+		else
e4fdbb
+		    log_bug("filename is not hex\n");
e4fdbb
+		if (d >= 0) {
e4fdbb
+		    *mdb++ = d << 4 | c;
e4fdbb
+		    c = -1;
e4fdbb
+		    if (--mdlen == 0) {
e4fdbb
+			mdb = ts;
e4fdbb
+			if (*fp++ != '@')
e4fdbb
+			    log_bug("missing time separator\n");
e4fdbb
+		    }
e4fdbb
+		}
e4fdbb
+		d = c;
e4fdbb
+	    }
e4fdbb
+	    sigclass = ts[0];
e4fdbb
+	    if (sigclass != 0x00 && sigclass != 0x01)
e4fdbb
+		log_bug("bad cipher class\n");
e4fdbb
+	    timestamp = buf32_to_u32(ts + 1);
e4fdbb
+	}
e4fdbb
 	else {
e4fdbb
 	    /* read, so that the filter can calculate the digest */
e4fdbb
 	    while( iobuf_get(inp) != -1 )
8a904a
@@ -1213,8 +1271,8 @@ sign_file (ctrl_t ctrl, strlist_t filena
e4fdbb
 
e4fdbb
     /* write the signatures */
e4fdbb
     rc = write_signature_packets (ctrl, sk_list, out, mfx.md,
e4fdbb
-                                  opt.textmode && !outfile? 0x01 : 0x00,
e4fdbb
-				  0, duration, detached ? 'D':'S', NULL);
e4fdbb
+                                  sigclass,
e4fdbb
+				  timestamp, duration, detached ? 'D':'S', NULL);
e4fdbb
     if( rc )
e4fdbb
         goto leave;
e4fdbb