git » pacman.git » commit f1fa0dc

pacman 6.1.0 (asignify support)

author Urja (ARMLFS builder)
2024-06-22 10:06:35 UTC
committer Urja (ARMLFS builder)
2024-06-22 14:25:56 UTC
parent e61fae6c4a32b88b262aefe0cf0eca3782fbefe3

pacman 6.1.0 (asignify support)

.gitignore +3 -0
0001-Initial-asignify-support.patch +730 -0
PKGBUILD +16 -4

diff --git a/.gitignore b/.gitignore
new file mode 100644
index 0000000..b11124e
--- /dev/null
+++ b/.gitignore
@@ -0,0 +1,3 @@
+/src/
+/pkg/
+/pacman-release-*/
diff --git a/0001-Initial-asignify-support.patch b/0001-Initial-asignify-support.patch
new file mode 100644
index 0000000..c291e0e
--- /dev/null
+++ b/0001-Initial-asignify-support.patch
@@ -0,0 +1,730 @@
+From e1d126e44f7ec7556414de2befc7c115f7d2da99 Mon Sep 17 00:00:00 2001
+From: "Urja (ARMLFS builder)" <urja+armlfs@urja.dev>
+Date: Sat, 22 Jun 2024 15:29:44 +0300
+Subject: [PATCH] Initial asignify support
+
+---
+ lib/libalpm/alpm.c             |   2 +-
+ lib/libalpm/be_sync.c          |   2 +-
+ lib/libalpm/handle.c           |   6 +-
+ lib/libalpm/meson.build        |   9 +-
+ lib/libalpm/signing_asignify.c | 575 +++++++++++++++++++++++++++++++++
+ meson.build                    |   9 +-
+ meson_options.txt              |   3 +
+ 7 files changed, 598 insertions(+), 8 deletions(-)
+ create mode 100644 lib/libalpm/signing_asignify.c
+
+diff --git a/lib/libalpm/alpm.c b/lib/libalpm/alpm.c
+index 32b93b3..46845af 100644
+--- a/lib/libalpm/alpm.c
++++ b/lib/libalpm/alpm.c
+@@ -119,7 +119,7 @@ int SYMEXPORT alpm_capabilities(void)
+ #ifdef HAVE_LIBCURL
+ 		| ALPM_CAPABILITY_DOWNLOADER
+ #endif
+-#ifdef HAVE_LIBGPGME
++#if (defined HAVE_LIBGPGME) || (defined HAVE_ASIGNIFY)
+ 		| ALPM_CAPABILITY_SIGNATURES
+ #endif
+ 		| 0;
+diff --git a/lib/libalpm/be_sync.c b/lib/libalpm/be_sync.c
+index e47cdef..4191b75 100644
+--- a/lib/libalpm/be_sync.c
++++ b/lib/libalpm/be_sync.c
+@@ -727,7 +727,7 @@ alpm_db_t *_alpm_db_register_sync(alpm_handle_t *handle, const char *treename,
+ 
+ 	_alpm_log(handle, ALPM_LOG_DEBUG, "registering sync database '%s'\n", treename);
+ 
+-#ifndef HAVE_LIBGPGME
++#if !defined(HAVE_LIBGPGME) && !defined(HAVE_ASIGNIFY) 
+ 	if(level != 0 && level != ALPM_SIG_USE_DEFAULT) {
+ 		RET_ERR(handle, ALPM_ERR_MISSING_CAPABILITY_SIGNATURES, NULL);
+ 	}
+diff --git a/lib/libalpm/handle.c b/lib/libalpm/handle.c
+index ff573fb..7309ca1 100644
+--- a/lib/libalpm/handle.c
++++ b/lib/libalpm/handle.c
+@@ -851,7 +851,7 @@ int SYMEXPORT alpm_option_set_default_siglevel(alpm_handle_t *handle,
+ 	if(level == ALPM_SIG_USE_DEFAULT) {
+ 		RET_ERR(handle, ALPM_ERR_WRONG_ARGS, -1);
+ 	}
+-#ifdef HAVE_LIBGPGME
++#if defined HAVE_LIBGPGME || defined HAVE_ASIGNIFY
+ 	handle->siglevel = level;
+ #else
+ 	if(level != 0) {
+@@ -871,7 +871,7 @@ int SYMEXPORT alpm_option_set_local_file_siglevel(alpm_handle_t *handle,
+ 		int level)
+ {
+ 	CHECK_HANDLE(handle, return -1);
+-#ifdef HAVE_LIBGPGME
++#if defined HAVE_LIBGPGME || defined HAVE_ASIGNIFY
+ 	handle->localfilesiglevel = level;
+ #else
+ 	if(level != 0 && level != ALPM_SIG_USE_DEFAULT) {
+@@ -895,7 +895,7 @@ int SYMEXPORT alpm_option_set_remote_file_siglevel(alpm_handle_t *handle,
+ 		int level)
+ {
+ 	CHECK_HANDLE(handle, return -1);
+-#ifdef HAVE_LIBGPGME
++#if defined HAVE_LIBGPGME || defined HAVE_ASIGNIFY
+ 	handle->remotefilesiglevel = level;
+ #else
+ 	if(level != 0 && level != ALPM_SIG_USE_DEFAULT) {
+diff --git a/lib/libalpm/meson.build b/lib/libalpm/meson.build
+index 607e91a..50b4eb3 100644
+--- a/lib/libalpm/meson.build
++++ b/lib/libalpm/meson.build
+@@ -1,3 +1,8 @@
++signing_src = 'signing.c'
++if conf.get('HAVE_ASIGNIFY')
++signing_src = 'signing_asignify.c'
++endif
++
+ libalpm_sources = files('''
+   add.h add.c
+   alpm.h alpm.c
+@@ -24,9 +29,9 @@ libalpm_sources = files('''
+   pkghash.h pkghash.c
+   rawstr.c
+   remove.h remove.c
+-  signing.c signing.h
++  signing.h
+   sync.h sync.c
+   trans.h trans.c
+   util.h util.c
+   version.c
+-'''.split())
++'''.split(), signing_src)
+diff --git a/lib/libalpm/signing_asignify.c b/lib/libalpm/signing_asignify.c
+new file mode 100644
+index 0000000..7e42c1d
+--- /dev/null
++++ b/lib/libalpm/signing_asignify.c
+@@ -0,0 +1,575 @@
++/*
++ *  signing_asignify.c
++ *
++ *  Copyright (c) 2008-2024 Pacman Development Team <pacman-dev@lists.archlinux.org>
++ *
++ *  This program is free software; you can redistribute it and/or modify
++ *  it under the terms of the GNU General Public License as published by
++ *  the Free Software Foundation; either version 2 of the License, or
++ *  (at your option) any later version.
++ *
++ *  This program is distributed in the hope that it will be useful,
++ *  but WITHOUT ANY WARRANTY; without even the implied warranty of
++ *  MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
++ *  GNU General Public License for more details.
++ *
++ *  You should have received a copy of the GNU General Public License
++ *  along with this program.  If not, see <http://www.gnu.org/licenses/>.
++ */
++
++#include <stdlib.h>
++#include <stdio.h>
++#include <string.h>
++#include <dirent.h>
++#include <sys/stat.h>
++
++#include <asignify.h>
++
++/* libalpm */
++#include "signing.h"
++#include "package.h"
++#include "base64.h"
++#include "util.h"
++#include "log.h"
++#include "alpm.h"
++#include "handle.h"
++
++int SYMEXPORT alpm_decode_signature(const char *base64_data,
++		unsigned char **data, size_t *data_len)
++{
++	size_t len = strlen(base64_data);
++	unsigned char *usline = (unsigned char *)base64_data;
++	/* reasonable allocation of expected length is 3/4 of encoded length */
++	size_t destlen = len * 3 / 4;
++	MALLOC(*data, destlen, goto error);
++	if(base64_decode(*data, &destlen, usline, len)) {
++		free(*data);
++		goto error;
++	}
++	*data_len = destlen;
++	return 0;
++
++error:
++	*data = NULL;
++	*data_len = 0;
++	return -1;
++}
++
++/**
++ * Determine if we have a key is known in our local keyring.
++ * @param handle the context handle
++ * @param fpr the fingerprint key ID to look up
++ * @return 1 if key is known, 0 if key is unknown, -1 on error
++ */
++int _alpm_key_in_keychain(alpm_handle_t *handle, const char *fpr)
++{
++	(void)fpr;
++	_alpm_log(handle, ALPM_LOG_DEBUG, "alpm_key_in_keychain: dummy\n");
++	return 0;
++}
++
++/**
++ * Import a key defined by a fingerprint into the local keyring.
++ * @param handle the context handle
++ * @param uid a user ID of the key to import
++ * @param fpr the fingerprint key ID to import
++ * @return 0 on success, -1 on error
++ */
++int _alpm_key_import(alpm_handle_t *handle, const char *uid, const char *fpr)
++{
++	(void)uid; (void)fpr;
++	_alpm_log(handle, ALPM_LOG_DEBUG, "alpm_key_import: dummy\n");
++	return 0;
++}
++
++/* This is not directly used by other files; should have no callers now. */
++int _alpm_gpgme_checksig(alpm_handle_t *handle, const char *path,
++		const char *base64_sig, alpm_siglist_t *siglist)
++{
++	(void)path; (void)base64_sig;
++	_alpm_log(handle, ALPM_LOG_DEBUG, "alpm_gpgme_checksig: dummy\n");
++	siglist->count = 0;
++	handle->pm_errno = ALPM_ERR_MISSING_CAPABILITY_SIGNATURES;
++	return -1;
++}
++
++
++/* This is what we're here for. The rest is fixing the impedance mismatches lol.
++ * Returns -1 for no/bad pubkey, 0 for bad signature/data, 1 for all verified.*/
++static int _alpm_asignify_vfy(alpm_handle_t *handle, const char *pubkey, const char *sigfn, const char *datafn)
++{
++	struct asignify_verify_ctx * vrf;
++	int ret = -1;
++	vrf = asignify_verify_init();
++	
++	/* Load pubkey - this is the expected way out if we don't have a key for this repo. */
++	if (!asignify_verify_load_pubkey(vrf, pubkey)) {
++		_alpm_log(handle, ALPM_LOG_DEBUG, "cannot load pubkey %s (%s)\n", pubkey, asignify_verify_get_error(vrf));
++		goto cleanup;
++	}
++	ret = 0;
++
++	/* Load and verify digests file - this is the expected way out if we have the wrong pubkey. */
++	if (!asignify_verify_load_signature(vrf, sigfn)) {
++		_alpm_log(handle, ALPM_LOG_DEBUG, "cannot verify sigfn %s (%s)\n", sigfn, asignify_verify_get_error(vrf));
++		goto cleanup;
++	}
++
++	/* This is the way out if the data does not match the .sig */
++	if (!asignify_verify_file(vrf, datafn)) {
++		_alpm_log(handle, ALPM_LOG_WARNING, "cannot verify file %s (%s)\n", datafn, asignify_verify_get_error(vrf));
++		goto cleanup;
++	}
++
++	/* All matched, neat. */
++	ret = 1;
++
++cleanup:
++	/* Cleanup */
++	asignify_verify_free(vrf);
++	return ret;
++}
++
++
++static const char _alpm_keybase[] = "/etc/pacman.d/keys/"; // + <db>.pub
++static const char _alpm_keysuffix[] = ".pub";
++
++static int _alpm_pubkey_filter(const struct dirent * de)
++{
++	int l = strlen(de->d_name);
++	int sufl = strlen(_alpm_keysuffix);
++	if (l <= sufl) return 0;
++
++	/* Not .pub? Not pubkey. */
++	if (memcmp(de->d_name+(l-sufl), _alpm_keysuffix, sufl) != 0)
++		return 0;
++
++	return 1;
++
++}
++
++/* This is just to compare the key id between our signature
++ * and a keyfile, to match the right keyfile for verify by asignify */
++/* We compare the raw base64. Should be fine lol. */
++
++static const char _alpm_asig_prefix[] = "asignify-sig:1:";
++static const char _alpm_apub_prefix[] = "asignify-pubkey:1:";
++
++static int _alpm_asignify_cmp(unsigned char *sigdat, char *keyfn)
++{
++	const int previewl = 40;
++	const int sig_i0 = strlen(_alpm_asig_prefix);
++	const int pub_i0 = strlen(_alpm_apub_prefix);
++
++	unsigned char keydat[previewl];
++	int kfd = open(keyfn, O_RDONLY);
++	int rl = 0;
++	if(kfd < 0) {
++		return -1;
++	}
++	do {
++		int rv = read(kfd, keydat+rl, previewl-rl);
++		if (rv <= 0) {
++			close(kfd);
++			return -1;
++		}
++		rl += rv;
++	} while (rl < previewl);
++	close(kfd);
++	if (memcmp(keydat, _alpm_apub_prefix, pub_i0) != 0)
++		return 1;
++	for (int i = 0; i < (previewl - pub_i0); i++) {
++		unsigned char s = sigdat[i + sig_i0];
++		if (s != keydat[i + pub_i0]) return 1;
++		if (s == ':') return 0;
++	}
++	/* ???? */
++	return -1;
++}
++
++/**
++ * Check the signature for the given file path.
++ * If base64_sig is provided, it will be used as the signature data after
++ * decoding. If base64_sig is NULL, expect a signature file next to path
++ * (e.g. "%s.sig").
++ *
++ * The return value will be 0 if nothing abnormal happened during the signature
++ * check, and -1 if an error occurred while checking signatures or if a
++ * signature could not be found; pm_errno will be set. Note that "abnormal"
++ * does not include a failed signature; the value in siglist should be checked
++ * to determine if the signature(s) are good.
++ * @param handle the context handle
++ * @param path the full path to a file
++ * @param base64_sig optional PGP signature data in base64 encoding
++ * @param siglist a pointer to storage for signature results
++ * @return 0 in normal cases, -1 if the something failed in the check process
++ */
++static int _alpm_checksig(alpm_handle_t *handle, const char *path,
++		const char *base64_sig, alpm_siglist_t *siglist)
++{
++	int ret = -1, sigcount, vfr = -1;
++	char *sigpath = NULL;
++	unsigned char *decoded_sigdata = NULL;
++	char tmpsigfn[] = "/tmp/pacman-sig-XXXXXX";
++	char * keypath = NULL;
++	alpm_sigresult_t *result;
++
++	if(!path || _alpm_access(handle, NULL, path, R_OK) != 0) {
++		RET_ERR(handle, ALPM_ERR_NOT_A_FILE, -1);
++	}
++
++	if(!siglist) {
++		RET_ERR(handle, ALPM_ERR_WRONG_ARGS, -1);
++	}
++	siglist->count = 0;
++
++	_alpm_log(handle, ALPM_LOG_DEBUG, "checking signature for %s\n", path);
++
++	const int previewl = 40;
++	if(!base64_sig) {
++		sigpath = _alpm_sigpath(handle, path);
++		int sigfd = open(sigpath, O_RDONLY);
++		int rl = 0;
++
++		if(sigfd < 0) {
++			_alpm_log(handle, ALPM_LOG_DEBUG,
++			"sig path %s could not be opened\n",
++					sigpath);
++			GOTO_ERR(handle, ALPM_ERR_SIG_MISSING, error);
++		}
++		MALLOC(decoded_sigdata, previewl, 
++			GOTO_ERR(handle, ALPM_ERR_MEMORY, error));
++		do {
++			int rv = read(sigfd, decoded_sigdata+rl, previewl-rl);
++			if (rv <= 0) {
++				GOTO_ERR(handle, ALPM_ERR_SYSTEM, error);
++			}
++			rl += rv;
++		} while (rl < previewl);
++		close(sigfd);
++	} else {
++	/* asignify only uses files, toss sig into a file. */
++		size_t data_len;
++		ssize_t wrv;
++		size_t written = 0;
++		int decode_ret = alpm_decode_signature(base64_sig,
++				&decoded_sigdata, &data_len);
++		if ((decode_ret) || (data_len < previewl)) {
++			GOTO_ERR(handle, ALPM_ERR_SIG_INVALID, error);
++		}
++
++		int wfd = mkstemp(tmpsigfn);
++		if (wfd < 0) {
++			GOTO_ERR(handle, ALPM_ERR_SYSTEM, error);
++		}
++		do {
++			wrv = write(wfd, decoded_sigdata+written, data_len-written);
++			if (wrv < 0) {
++				GOTO_ERR(handle, ALPM_ERR_SYSTEM, error);
++			}
++			written += wrv;
++		} while (written < data_len);
++		close(wfd);
++		CALLOC(sigpath, strlen(tmpsigfn)+1, sizeof(char), GOTO_ERR(handle, ALPM_ERR_MEMORY, error));
++		strcpy(sigpath, tmpsigfn);
++	}
++
++	if (memcmp(_alpm_asig_prefix, decoded_sigdata, strlen(_alpm_asig_prefix)) != 0) {
++		GOTO_ERR(handle, ALPM_ERR_SIG_INVALID, error);
++	}
++
++	char *foundkey = NULL;
++	struct dirent **keylist;
++	int n;
++	MALLOC(keypath, strlen(_alpm_keybase) + 256 + 1, GOTO_ERR(handle, ALPM_ERR_MEMORY, error));
++	strcpy(keypath, _alpm_keybase);
++	int baselen = strlen(_alpm_keybase);
++
++	n = scandir(_alpm_keybase, &keylist, _alpm_pubkey_filter, alphasort);
++	if (n >= 0) {
++		int i;
++		for (i = 0; i < n; i++) {
++			strcpy(keypath+baselen, keylist[i]->d_name);
++			if ((!foundkey)&&(_alpm_asignify_cmp(decoded_sigdata, keypath) == 0)) {
++				foundkey = strdup(keylist[i]->d_name);
++				vfr = _alpm_asignify_vfy(handle, keypath, sigpath, path);
++			}
++			free(keylist[i]);
++		}
++		FREE(keylist);
++	}
++	if (!foundkey) foundkey = strdup("(none)");
++
++	/* Synth the signature info */
++	sigcount = 1;
++	CALLOC(siglist->results, sigcount, sizeof(alpm_sigresult_t),
++			GOTO_ERR(handle, ALPM_ERR_MEMORY, error));
++	siglist->count = sigcount;
++	result = siglist->results;
++	
++	
++	result->key.uid = foundkey;
++	switch (vfr) {
++		default:
++		case -1:
++			result->status = ALPM_SIGSTATUS_KEY_UNKNOWN;
++			result->validity = ALPM_SIGVALIDITY_UNKNOWN;
++			break;
++		case 0:
++			result->status = ALPM_SIGSTATUS_INVALID;
++			result->validity = ALPM_SIGVALIDITY_UNKNOWN;
++			break;
++
++		case 1:
++			result->status = ALPM_SIGSTATUS_VALID;
++			result->validity = ALPM_SIGVALIDITY_FULL;
++			break;
++	}
++	ret = 0;
++error:
++	FREE(keypath);
++	if ((base64_sig) && (sigpath)) {
++		unlink(sigpath);
++	}
++	FREE(sigpath);
++	FREE(decoded_sigdata);
++	return ret;
++}
++
++/**
++ * Form a signature path given a file path.
++ * Caller must free the result.
++ * @param handle the context handle
++ * @param path the full path to a file
++ * @return the path with '.sig' appended, NULL on errors
++ */
++char *_alpm_sigpath(alpm_handle_t *handle, const char *path)
++{
++	char *sigpath;
++	size_t len;
++
++	if(!path) {
++		return NULL;
++	}
++	len = strlen(path) + 5;
++	CALLOC(sigpath, len, sizeof(char), RET_ERR(handle, ALPM_ERR_MEMORY, NULL));
++	sprintf(sigpath, "%s.sig", path);
++	return sigpath;
++}
++
++/**
++ * Helper for checking the PGP signature for the given file path.
++ * This wraps #_alpm_gpgme_checksig in a slightly friendlier manner to simplify
++ * handling of optional signatures and marginal/unknown trust levels and
++ * handling the correct error code return values.
++ * @param handle the context handle
++ * @param path the full path to a file
++ * @param base64_sig optional PGP signature data in base64 encoding
++ * @param optional whether signatures are optional (e.g., missing OK)
++ * @param marginal whether signatures with marginal trust are acceptable
++ * @param unknown whether signatures with unknown trust are acceptable
++ * @param sigdata a pointer to storage for signature results
++ * @return 0 on success, -1 on error (consult pm_errno or sigdata)
++ */
++int _alpm_check_pgp_helper(alpm_handle_t *handle, const char *path,
++		const char *base64_sig, int optional, int marginal, int unknown,
++		alpm_siglist_t **sigdata)
++{
++	alpm_siglist_t *siglist;
++	int ret;
++
++	CALLOC(siglist, 1, sizeof(alpm_siglist_t),
++			RET_ERR(handle, ALPM_ERR_MEMORY, -1));
++
++	ret = _alpm_checksig(handle, path, base64_sig, siglist);
++	if(ret && handle->pm_errno == ALPM_ERR_SIG_MISSING) {
++		if(optional) {
++			_alpm_log(handle, ALPM_LOG_DEBUG, "missing optional signature\n");
++			handle->pm_errno = ALPM_ERR_OK;
++			ret = 0;
++		} else {
++			_alpm_log(handle, ALPM_LOG_DEBUG, "missing required signature\n");
++			/* ret will already be -1 */
++		}
++	} else if(ret) {
++		_alpm_log(handle, ALPM_LOG_DEBUG, "signature check failed\n");
++		/* ret will already be -1 */
++	} else {
++		size_t num;
++		for(num = 0; !ret && num < siglist->count; num++) {
++			switch(siglist->results[num].status) {
++				case ALPM_SIGSTATUS_VALID:
++				case ALPM_SIGSTATUS_KEY_EXPIRED:
++					_alpm_log(handle, ALPM_LOG_DEBUG, "signature is valid\n");
++					switch(siglist->results[num].validity) {
++						case ALPM_SIGVALIDITY_FULL:
++							_alpm_log(handle, ALPM_LOG_DEBUG, "signature is fully trusted\n");
++							break;
++						case ALPM_SIGVALIDITY_MARGINAL:
++							_alpm_log(handle, ALPM_LOG_DEBUG, "signature is marginal trust\n");
++							if(!marginal) {
++								ret = -1;
++							}
++							break;
++						case ALPM_SIGVALIDITY_UNKNOWN:
++							_alpm_log(handle, ALPM_LOG_DEBUG, "signature is unknown trust\n");
++							if(!unknown) {
++								ret = -1;
++							}
++							break;
++						case ALPM_SIGVALIDITY_NEVER:
++							_alpm_log(handle, ALPM_LOG_DEBUG, "signature should never be trusted\n");
++							ret = -1;
++							break;
++					}
++					break;
++				case ALPM_SIGSTATUS_SIG_EXPIRED:
++				case ALPM_SIGSTATUS_KEY_UNKNOWN:
++				case ALPM_SIGSTATUS_KEY_DISABLED:
++				case ALPM_SIGSTATUS_INVALID:
++					_alpm_log(handle, ALPM_LOG_DEBUG, "signature is not valid\n");
++					ret = -1;
++					break;
++			}
++		}
++	}
++
++	if(sigdata) {
++		*sigdata = siglist;
++	} else {
++		alpm_siglist_cleanup(siglist);
++		free(siglist);
++	}
++
++	return ret;
++}
++
++/**
++ * Examine a signature result list and take any appropriate or necessary
++ * actions. This may include asking the user to import a key or simply printing
++ * helpful failure messages so the user can take action out of band.
++ * @param handle the context handle
++ * @param identifier a friendly name for the signed resource; usually a
++ * database or package name
++ * @param siglist a pointer to storage for signature results
++ * @param optional whether signatures are optional (e.g., missing OK)
++ * @param marginal whether signatures with marginal trust are acceptable
++ * @param unknown whether signatures with unknown trust are acceptable
++ * @return 0 if all signatures are OK, -1 on errors, 1 if we should retry the
++ * validation process
++ */
++int _alpm_process_siglist(alpm_handle_t *handle, const char *identifier,
++		alpm_siglist_t *siglist, int optional, int marginal, int unknown)
++{
++	size_t i;
++	int retry = 0;
++
++	if(!optional && siglist->count == 0) {
++		_alpm_log(handle, ALPM_LOG_ERROR,
++				_("%s: missing required signature\n"), identifier);
++	}
++
++	for(i = 0; i < siglist->count; i++) {
++		alpm_sigresult_t *result = siglist->results + i;
++		const char *name = result->key.uid ? result->key.uid : result->key.fingerprint;
++		switch(result->status) {
++			case ALPM_SIGSTATUS_VALID:
++			case ALPM_SIGSTATUS_KEY_EXPIRED:
++				switch(result->validity) {
++					case ALPM_SIGVALIDITY_FULL:
++						break;
++					case ALPM_SIGVALIDITY_MARGINAL:
++						if(!marginal) {
++							_alpm_log(handle, ALPM_LOG_ERROR,
++									_("%s: signature from \"%s\" is marginal trust\n"),
++									identifier, name);
++							/* QUESTION(handle, ALPM_QUESTION_EDIT_KEY_TRUST, &result->key, NULL, NULL, &answer); */
++						}
++						break;
++					case ALPM_SIGVALIDITY_UNKNOWN:
++						if(!unknown) {
++							_alpm_log(handle, ALPM_LOG_ERROR,
++									_("%s: signature from \"%s\" is unknown trust\n"),
++									identifier, name);
++							/* QUESTION(handle, ALPM_QUESTION_EDIT_KEY_TRUST, &result->key, NULL, NULL, &answer); */
++						}
++						break;
++					case ALPM_SIGVALIDITY_NEVER:
++						_alpm_log(handle, ALPM_LOG_ERROR,
++								_("%s: signature from \"%s\" should never be trusted\n"),
++								identifier, name);
++						break;
++				}
++				break;
++			case ALPM_SIGSTATUS_KEY_UNKNOWN:
++				/* ensure this key is still actually unknown; we may have imported it
++				 * on an earlier call to this function. */
++				_alpm_log(handle, ALPM_LOG_ERROR,
++						_("%s: key \"%s\" is unknown\n"), identifier, name);
++
++				break;
++			case ALPM_SIGSTATUS_KEY_DISABLED:
++				_alpm_log(handle, ALPM_LOG_ERROR,
++						_("%s: key \"%s\" is disabled\n"), identifier, name);
++				break;
++			case ALPM_SIGSTATUS_SIG_EXPIRED:
++				_alpm_log(handle, ALPM_LOG_ERROR,
++						_("%s: signature from \"%s\" is expired\n"), identifier, name);
++				break;
++			case ALPM_SIGSTATUS_INVALID:
++				_alpm_log(handle, ALPM_LOG_ERROR,
++						_("%s: signature from \"%s\" is invalid\n"),
++						identifier, name);
++				break;
++		}
++	}
++
++	return retry;
++}
++
++int SYMEXPORT alpm_pkg_check_pgp_signature(alpm_pkg_t *pkg,
++		alpm_siglist_t *siglist)
++{
++	/* AFAIK this is only used by pacman for package info dump */
++	ASSERT(pkg != NULL, return -1);
++	ASSERT(siglist != NULL, RET_ERR(pkg->handle, ALPM_ERR_WRONG_ARGS, -1));
++	pkg->handle->pm_errno = ALPM_ERR_OK;
++
++	return _alpm_checksig(pkg->handle, pkg->filename,
++			pkg->base64_sig, siglist);
++}
++
++int SYMEXPORT alpm_db_check_pgp_signature(alpm_db_t *db,
++		alpm_siglist_t *siglist)
++{
++	/* AFAIK this is unused */
++	ASSERT(db != NULL, return -1);
++	ASSERT(siglist != NULL, RET_ERR(db->handle, ALPM_ERR_WRONG_ARGS, -1));
++	db->handle->pm_errno = ALPM_ERR_OK;
++
++	return _alpm_checksig(db->handle, _alpm_db_path(db), NULL, siglist);
++}
++
++int SYMEXPORT alpm_siglist_cleanup(alpm_siglist_t *siglist)
++{
++	ASSERT(siglist != NULL, return -1);
++	size_t num;
++	for(num = 0; num < siglist->count; num++) {
++		alpm_sigresult_t *result = siglist->results + num;
++		FREE(result->key.uid);
++	}
++
++	if(siglist->count) {
++		free(siglist->results);
++	}
++	siglist->results = NULL;
++	siglist->count = 0;
++	return 0;
++}
++
++int SYMEXPORT alpm_extract_keyid(alpm_handle_t *handle, const char *identifier,
++		const unsigned char *sig, const size_t len, alpm_list_t **keys)
++{
++	(void)handle; (void)identifier; (void)sig; (void)len; (void)keys;
++	return 0;
++}
+diff --git a/meson.build b/meson.build
+index 79fc3ef..ca66dbe 100644
+--- a/meson.build
++++ b/meson.build
+@@ -112,6 +112,12 @@ gpgme = dependency('gpgme',
+                    not_found_message : 'gpgme @0@ is needed for GPG signature support'.format(needed_gpgme_version))
+ conf.set('HAVE_LIBGPGME', gpgme.found())
+ 
++asignify = cc.find_library('asignify', has_headers:['asignify.h'],
++	required : get_option('asignify'),
++	static : get_option('buildstatic'))
++conf.set('HAVE_ASIGNIFY', asignify.found())
++
++
+ want_crypto = get_option('crypto')
+ if want_crypto == 'openssl'
+   libcrypto = dependency('libcrypto', static : get_option('buildstatic'),
+@@ -331,7 +337,7 @@ libcommon = static_library(
+   gnu_symbol_visibility : 'hidden',
+   install : false)
+ 
+-alpm_deps = [crypto_provider, libarchive, libcurl, libintl, gpgme]
++alpm_deps = [crypto_provider, libarchive, libcurl, libintl, gpgme, asignify]
+ 
+ libalpm_a = static_library(
+   'alpm_objlib',
+@@ -496,6 +502,7 @@ message('\n    '.join([
+   '  debug build              : @0@'.format(get_option('buildtype') == 'debug'),
+   '  Use libcurl              : @0@'.format(conf.get('HAVE_LIBCURL')),
+   '  Use GPGME                : @0@'.format(conf.get('HAVE_LIBGPGME')),
++  '  Use asignify             : @0@'.format(conf.get('HAVE_ASIGNIFY')),
+   '  Use OpenSSL              : @0@'.format(conf.has('HAVE_LIBSSL') and
+                                             conf.get('HAVE_LIBSSL') == 1),
+   '  Use nettle               : @0@'.format(conf.has('HAVE_LIBNETTLE') and
+diff --git a/meson_options.txt b/meson_options.txt
+index d004002..ce8546c 100644
+--- a/meson_options.txt
++++ b/meson_options.txt
+@@ -51,6 +51,9 @@ option('crypto', type : 'combo', choices : ['openssl', 'nettle'],
+ option('gpgme', type : 'feature', value : 'auto',
+        description : 'use GPGME for PGP signature verification')
+ 
++option('asignify', type : 'feature', value : 'auto',
++       description : 'use asignify for signature verification')
++
+ option('i18n', type : 'boolean', value : true,
+        description : 'enable localization of pacman, libalpm and scripts')
+ 
+-- 
+2.44.0
+
diff --git a/PKGBUILD b/PKGBUILD
index efe1f5f..eaa28fb 100644
--- a/PKGBUILD
+++ b/PKGBUILD
@@ -1,23 +1,34 @@
 pkgname=pacman
 pkgver=6.1.0
-pkgrel=2
+pkgrel=5
 arch=('armv7h')
 license=('unknown')
 source=("$pkgname-release-6.1.x.tar.gz"
+	"0001-Initial-asignify-support.patch"
 	"makepkg.conf"
 	"pacman.conf")
-depends=(bash glibc libarchive curl gettext gawk coreutils grep openssl)
+depends=(bash glibc libarchive curl gettext gawk coreutils grep openssl asignify)
 makedepends=(meson)
 provides=('libalpm.so')
 backup=(etc/pacman.conf
 etc/makepkg.conf)
 
+prepare() {
+	cd "$pkgname-release-6.1.x"
+	patch -Np1 -i ../0001-Initial-asignify-support.patch
+}
+
 build() {
 	cd "$pkgname-release-6.1.x"
 	mkdir -p build
 	cd build
 	meson --prefix=/usr \
-	      -Dcrypto=openssl
+	      -Dcrypto=openssl \
+	      -Dgpgme=disabled \
+	      -Dasignify=enabled \
+	      -Ddebug-suffix=dbginfo 
+	# "-debug-" clashes with some package(s) (ruby-debug IIRC)
+
 	ninja
 }
 
@@ -27,5 +38,6 @@ package() {
 	cp "$srcdir"/{makepkg,pacman}.conf "$pkgdir"/etc
 }
 sha256sums=('b15679b7b751992d8d8f2acfa94f0c381d71d8289e5ac9f89cb6ddb88306c788'
-            '9f384b880aa12a69f80ff3f727f082fbb5a31fb8be3989c470f5661be4f66ee6'
+            '6303db37b0b91953228e8a11d1bf4984b2514cbe9713588da8bd646375ae0e15'
+            '09afbfea3e7f0aa971edbda63633551fc0a332056cae1756f3f60b90dc065ac3'
             'ea7d565cb3bf054af947ba51df2c1567030572755fc8caa66d7f869a97bb27e5')