text
stringlengths
0
357
dc_key_set_from_key(peerstate->public_key, header->public_key);
dc_apeerstate_recalc_fingerprint(peerstate);
peerstate->to_save |= DC_SAVE_ALL;
}
}
}
void dc_apeerstate_apply_gossip(dc_apeerstate_t* peerstate, const dc_aheader_t* gossip_header, time_t message_time)
{
if (peerstate==NULL || gossip_header==NULL
|| peerstate->addr==NULL
|| gossip_header->addr==NULL || gossip_header->public_key->binary==NULL
|| strcasecmp(peerstate->addr, gossip_header->addr)!=0) {
return;
}
if (message_time > peerstate->gossip_timestamp)
{
peerstate->gossip_timestamp = message_time;
peerstate->to_save |= DC_SAVE_TIMESTAMPS;
if (peerstate->gossip_key==NULL) {
peerstate->gossip_key = dc_key_new();
}
if (!dc_key_equals(peerstate->gossip_key, gossip_header->public_key))
{
dc_key_set_from_key(peerstate->gossip_key, gossip_header->public_key);
dc_apeerstate_recalc_fingerprint(peerstate);
peerstate->to_save |= DC_SAVE_ALL;
}
}
}
/**
* Recalculate the fingerprints for the keys.
*
* If the fingerprint has changed, the verified-state is reset.
*
* An explicit call to this function from outside this class is only needed
* for database updates; the dc_apeerstate_init_*() and dc_apeerstate_apply_*()
* functions update the fingerprint automatically as needed.
*
* @memberof dc_apeerstate_t
*/
int dc_apeerstate_recalc_fingerprint(dc_apeerstate_t* peerstate)
{
int success = 0;
char* old_public_fingerprint = NULL;
char* old_gossip_fingerprint = NULL;
if (peerstate==NULL) {
goto cleanup;
}
if (peerstate->public_key)
{
old_public_fingerprint = peerstate->public_key_fingerprint;
peerstate->public_key_fingerprint = dc_key_get_fingerprint(peerstate->public_key); /* returns the empty string for errors, however, this should be saved as well as it represents an erroneous key */
if (old_public_fingerprint==NULL
|| old_public_fingerprint[0]==0
|| peerstate->public_key_fingerprint==NULL
|| peerstate->public_key_fingerprint[0]==0
|| strcasecmp(old_public_fingerprint, peerstate->public_key_fingerprint)!=0)
{
peerstate->to_save |= DC_SAVE_ALL;
if (old_public_fingerprint && old_public_fingerprint[0]) { // no degrade event when we recveive just the initial fingerprint
peerstate->degrade_event |= DC_DE_FINGERPRINT_CHANGED;
}
}
}
if (peerstate->gossip_key)
{
old_gossip_fingerprint = peerstate->gossip_key_fingerprint;
peerstate->gossip_key_fingerprint = dc_key_get_fingerprint(peerstate->gossip_key); /* returns the empty string for errors, however, this should be saved as well as it represents an erroneous key */
if (old_gossip_fingerprint==NULL
|| old_gossip_fingerprint[0]==0
|| peerstate->gossip_key_fingerprint==NULL
|| peerstate->gossip_key_fingerprint[0]==0
|| strcasecmp(old_gossip_fingerprint, peerstate->gossip_key_fingerprint)!=0)
{
peerstate->to_save |= DC_SAVE_ALL;
if (old_gossip_fingerprint && old_gossip_fingerprint[0]) { // no degrade event when we recveive just the initial fingerprint
peerstate->degrade_event |= DC_DE_FINGERPRINT_CHANGED;
}
}
}
success = 1;
cleanup:
free(old_public_fingerprint);
free(old_gossip_fingerprint);