/*****************************************************************************
* vlc_update.h: VLC update and plugins download
*****************************************************************************
- * Copyright (C) 2005 the VideoLAN team
+ * Copyright © 2005-2007 the VideoLAN team
* $Id$
*
* Authors: Antoine Cellerier <dionoea -at- videolan -dot- org>
+ * Rafaël Carré <funman@videolanorg>
*
* This program is free software; you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
#error You are not libvlc or one of its plugins. You cannot include this file
#endif
+#ifdef UPDATE_CHECK
+
#ifndef _VLC_UPDATE_H
#define _VLC_UPDATE_H
#include <vlc/vlc.h>
+#include <vlc_stream.h> /* key & signature downloading */
+#include <vlc_strings.h> /* b64 decoding */
+#include <vlc_charset.h> /* utf8_fopen() */
+#include <gcrypt.h> /* cryptography and digest algorithms */
+
/**
* \defgroup update Update
*
* @{
*/
+enum /* Public key algorithms */
+{
+ /* we will only use DSA public keys */
+ PUBLIC_KEY_ALGO_DSA = 0x11
+};
+
+enum /* Digest algorithms */
+{
+ /* and DSA use SHA-1 digest */
+ DIGEST_ALGO_SHA1 = 0x02
+};
+
+enum /* Packet types */
+{
+ SIGNATURE_PACKET = 0x02,
+ PUBLIC_KEY_PACKET = 0x06,
+ USER_ID_PACKET = 0x0d
+};
+
+enum /* Signature types */
+{
+ BINARY_SIGNATURE = 0x00,
+ TEXT_SIGNATURE = 0x01,
+
+ /* Public keys signatures */
+ GENERIC_KEY_SIGNATURE = 0x10, /* No assumption of verification */
+ PERSONA_KEY_SIGNATURE = 0x11, /* No verification has been made */
+ CASUAL_KEY_SIGNATURE = 0x12, /* Some casual verification */
+ POSITIVE_KEY_SIGNATURE = 0x13 /* Substantial verification */
+};
+
+
+enum /* Signature subpacket types */
+{
+ ISSUER_SUBPACKET = 0x10
+};
+
+
+
+struct public_key_packet_t
+{ /* a public key packet (DSA/SHA-1) is 418 bytes */
+
+ uint8_t version; /* we use only version 4 */
+ uint8_t timestamp[4]; /* creation time of the key */
+ uint8_t algo; /* we only use DSA */
+ /* the multi precision integers, with their 2 bytes length header */
+ uint8_t p[2+128];
+ uint8_t q[2+20];
+ uint8_t g[2+128];
+ uint8_t y[2+128];
+};
+
+/* used for public key signatures */
+struct signature_packet_v4_t
+{ /* hashed_data or unhashed_data can be empty, so the signature packet is
+ * theorically at least 54 bytes long, but always more than that. */
+
+ uint8_t version;
+ uint8_t type;
+ uint8_t public_key_algo;
+ uint8_t digest_algo;
+ uint8_t hashed_data_len[2];
+ uint8_t *hashed_data;
+ uint8_t unhashed_data_len[2];
+ uint8_t *unhashed_data;
+ uint8_t hash_verification[2];
+
+ /* The part below is made of consecutive MPIs, their number and size being
+ * public-key-algorithm dependant.
+ * But since we use DSA signatures only, we fix it. */
+ uint8_t r[2+20];
+ uint8_t s[2+20];
+};
+
+/* Used for binary document signatures (to be compatible with older software)
+ * DSA/SHA-1 is always 65 bytes */
+struct signature_packet_v3_t
+{
+ uint8_t header[2];
+ uint8_t version; /* 3 */
+ uint8_t hashed_data_len; /* MUST be 5 */
+ uint8_t type;
+ uint8_t timestamp[4]; /* 4 bytes scalar number */
+ uint8_t issuer_longid[8]; /* The key which signed the document */
+ uint8_t public_key_algo; /* we only know about DSA */
+ uint8_t digest_algo; /* and his little sister SHA-1 */
+ uint8_t hash_verification[2];/* the 2 1st bytes of the SHA-1 hash */
+
+ /* The part below is made of consecutive MPIs, their number and size being
+ * public-key-algorithm dependant.
+ * But since we use DSA signatures only, we fix it. */
+ uint8_t r[2+20];
+ uint8_t s[2+20];
+};
+
+typedef struct public_key_packet_t public_key_packet_t;
+typedef struct signature_packet_v4_t signature_packet_v4_t;
+typedef struct signature_packet_v3_t signature_packet_v3_t;
+
+struct public_key_t
+{
+ uint8_t longid[8]; /* Long id */
+ uint8_t *psz_username; /* USER ID */
+
+ public_key_packet_t key; /* Public key packet */
+
+ signature_packet_v4_t sig; /* Signature packet, by the embedded key */
+};
+
+typedef struct public_key_t public_key_t;
+
+/* We trust this public key, and by extension, also keys signed by it. */
+static uint8_t videolan_public_key_longid[8] = {
+ 0x90, 0x28, 0x17, 0xE4, 0xAA, 0x5F, 0x4D, 0xE6
+};
+
+static uint8_t videolan_public_key[] = {
+"-----BEGIN PGP PUBLIC KEY BLOCK-----\n"
+"Version: GnuPG v2.0.4 (FreeBSD)\n"
+"\n"
+"mQGiBEWbjf8RBAC+4m2yYYzuA0+D5JQatKmoxG4z3+bat08tMz0YvBUp1UU+95i4\n"
+"cP9ndklv3yzhtZ4MIx5yy64FXtPi0/NQiikEVYPYn2KMO4LCfZCwYBEizVWzABya\n"
+"LZcffCP/3VhoR90NUluWyi+zVAn9KNIRlnhnYpDDlI76fCrTTHDCtgpImwCg7VzB\n"
+"4L6O0JpUJBCZOCAPJNYirUkD/3uCZe4vK4kLW+W3HB+grMCI1uFULmVSKMBQZc+p\n"
+"dqDq++u3zYGqiMNaVrLg/J4GSH/P0ossXEtmTVjLHF4nJ7HXfIjqkqdkxq7g9odY\n"
+"/dkA/aC7z4JBgcYfRnDMqfL12C+3b+KSwxQSzPcbvsFYm2KTgteLwG3mRlpL7Dh5\n"
+"S70nBAC1PkIl7mP4OL7vpQk9dkdQCARJLgyn5pu/pZV7He4fDLHkUr/atnYaIHk1\n"
+"15xl/ziHcBql2WmF0Uff9SuuNOi/hFCuWZSwPKsgtIhYZ5ut4FrBAVkqHV2CgxFp\n"
+"aSiA7+FTG91++LDsg2xrHyTRW+fQnPdpf5a4H1fF15azo40h17QjVmlkZW9MQU4g\n"
+"UmVsZWFzZSBTaWduaW5nIEtleSAoMjAwNymIRgQQEQIABgUCRZ41PgAKCRDDZ9i5\n"
+"gcrKhPmUAJ49Krgt6ZPZZ2YkW7fWFwTvSgGongCePDjnFh1g4078f7lycT4wFk/c\n"
+"vPiIRgQQEQIABgUCRZ71NQAKCRD9Ibw7rD4IebztAKCxuyWCjF2JPAe1hdZqNNbE\n"
+"/gWDRACfaBw6mpHh3+jZuNnRk6NctFMbTzWIRgQTEQIABgUCRZuOiQAKCRDD7G2+\n"
+"3W0SvRkEAJ9cCPrbfzoTHKUVlGLAKbx5pcoutQCdENlo4nwXbQHaREDqm+ISBU3p\n"
+"iXeIZgQTEQIAJgUCRZuN/wIbAwUJAeEzgAYLCQgHAwIEFQIIAwQWAgMBAh4BAheA\n"
+"AAoJEJAoF+SqX03m4ZQAoOSj3JzzUuY+n/oS0Y4/yZ4tThNNAJ4h+9FacWApQdNJ\n"
+"+PcydRFEEm203LkCDQRFm44DEAgAlNLlnyIkLJ/Uyncsd5nB46LqQpJDLJ3AalfN\n"
+"44Vy3aOG+aA7JsNL5T5r5WRGnAf41qSOFiuZHwjfrtKb4TWkcfWlpsi8t5uasII9\n"
+"WAVX2aVIbiPMNWUnhQIn8rjCRLm2t/0Hch0HDbXaI/hvub5qhmSHfmqzlkuEUyVu\n"
+"H+beivX8pQwxqpcWXrmwuNzhISR1DsWBn5u0WcOSqUDtFG5Me8AuPFR1oxdYTtvC\n"
+"vqlVnw6ag3QuNqaAgWDU5Ug/U10ZxCZTn5TAcp+1ZDlM/dXIwh8wKXDjiKqHgYg1\n"
+"VLQ4fOsscTJoUDOaobeaVwTcDaSB4yQ3bhB2q5fLKqj+bNrY9wADBQf/Rw92M9b/\n"
+"JRs5IpX3fcrgHetVLHPiRuW8btD6EkmlgyRFOwOCzOSlSzFW6DKFrbOvd01EWkaP\n"
+"4PWJNW7b7OZqzK+UWzlWTgtV/2iUJtHg3+euZRdc5V9gqW17+HIAxjJVE53Syn8u\n"
+"kiJpk7HebtQo/v/pk3jtxdeJU3fY8ZAKJFl8V9aAj7ATFaAhYohzyKTRYc04F0n6\n"
+"VJDtwQkobdhq2//+5hSVrJ9wXRRF6XFVxc32NinqDEYrJUvTVayYu28Ivg4CTlts\n"
+"a+R7x92aDVT2KT+voPIGZxPYjALGa/I2hrlEYD9CiRFNBKAzRiNGAOo67SNI4hDu\n"
+"rFWRmMNOONWpIIhPBBgRAgAPBQJFm44DAhsMBQkB4TOAAAoJEJAoF+SqX03m57kA\n"
+"oMPb2o2D9gSwQFKXhamx2YdrykHOAKDqQ1tHH3ULY5cLLAKVaQtsNhVEtQ==\n"
+"=qrc1\n"
+"-----END PGP PUBLIC KEY BLOCK-----\n"
+};
+
enum
{
UpdateReleaseStatusOlder,
int i_major; ///< Version major
int i_minor; ///< Version minor
int i_revision; ///< Version revision
- char* psz_svnrev; ///< SVN revision
- char* psz_extra; ///< Version extra
+ unsigned char extra;///< Version extra
char* psz_url; ///< Download URL
char* psz_desc; ///< Release description
};
libvlc_int_t *p_libvlc;
vlc_mutex_t lock;
struct update_release_t release; ///< Release (version)
+ public_key_t *p_pkey;
};
-
#define update_New( a ) __update_New( VLC_OBJECT( a ) )
VLC_EXPORT( update_t *, __update_New, ( vlc_object_t * ) );
VLC_EXPORT( void, update_Delete, ( update_t * ) );
-VLC_EXPORT( void, update_Check, ( update_t * ) );
+VLC_EXPORT( void, update_Check, ( update_t *, void (*callback)( void*, vlc_bool_t ), void * ) );
VLC_EXPORT( int, update_CompareReleaseToCurrent, ( update_t * ) );
+VLC_EXPORT( void, update_Download, ( update_t *, char* ) );
/**
* @}
*/
#endif
+
+#endif