usign-exec.c 5.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246
  1. /*
  2. * wrapper functions around the usign executable
  3. * Copyright (C) 2018 Daniel Golle <daniel@makrotopia.org>
  4. *
  5. * This program is free software; you can redistribute it and/or modify
  6. * it under the terms of the GNU General Public License version 3
  7. * as published by the Free Software Foundation
  8. *
  9. * This program is distributed in the hope that it will be useful,
  10. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  11. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  12. * GNU General Public License for more details.
  13. */
  14. #include <stdbool.h>
  15. #include <stdio.h>
  16. #include <string.h>
  17. #include <unistd.h>
  18. #include <sys/wait.h>
  19. #include "usign.h"
  20. #ifdef UCERT_HOST_BUILD
  21. #define USIGN_EXEC "usign"
  22. #else
  23. #define USIGN_EXEC "/usr/bin/usign"
  24. #endif
  25. /*
  26. * check for revoker deadlink in pubkeydir
  27. * return true if a revoker exists, false otherwise
  28. */
  29. int _usign_key_is_revoked(const char *fingerprint, const char *pubkeydir) {
  30. char tml[64] = {0};
  31. char rfname[256] = {0};
  32. snprintf(rfname, sizeof(rfname)-1, "%s/%s", pubkeydir, fingerprint);
  33. if (readlink(rfname, tml, sizeof(tml)) > 0 &&
  34. !strcmp(tml, ".revoked.")) {
  35. return true;
  36. };
  37. return false;
  38. }
  39. #ifdef UCERT_FULL
  40. /*
  41. * call usign -S ...
  42. * return WEXITSTATUS or -1 if fork fails
  43. */
  44. int usign_s(const char *msgfile, const char *seckeyfile, const char *sigfile, bool quiet) {
  45. pid_t pid;
  46. int status;
  47. const char *usign_argv[16] = {0};
  48. unsigned int usign_argc = 0;
  49. usign_argv[usign_argc++] = USIGN_EXEC;
  50. usign_argv[usign_argc++] = "-S";
  51. usign_argv[usign_argc++] = "-m";
  52. usign_argv[usign_argc++] = msgfile;
  53. usign_argv[usign_argc++] = "-s";
  54. usign_argv[usign_argc++] = seckeyfile;
  55. usign_argv[usign_argc++] = "-x";
  56. usign_argv[usign_argc++] = sigfile;
  57. if (quiet)
  58. usign_argv[usign_argc++] = "-q";
  59. pid = fork();
  60. switch (pid) {
  61. case -1:
  62. return -1;
  63. case 0:
  64. execvp(usign_argv[0], (char *const *)usign_argv);
  65. if (!quiet)
  66. perror("Failed to execute usign");
  67. _exit(1);
  68. }
  69. waitpid(pid, &status, 0);
  70. return WIFEXITED(status) ? WEXITSTATUS(status) : -1;
  71. }
  72. #else
  73. int usign_s(const char *msgfile, const char *seckeyfile, const char *sigfile, bool quiet) {
  74. return -1;
  75. };
  76. #endif
  77. /*
  78. * call usign -F ... and set fingerprint returned
  79. * return WEXITSTATUS or -1 if fork fails
  80. */
  81. static int usign_f(char fingerprint[17], const char *pubkeyfile, const char *seckeyfile, const char *sigfile, bool quiet) {
  82. int fds[2];
  83. FILE *f;
  84. pid_t pid;
  85. int status;
  86. const char *usign_argv[16] = {0};
  87. unsigned int usign_argc = 0;
  88. if (pipe(fds))
  89. return -1;
  90. usign_argv[usign_argc++] = USIGN_EXEC;
  91. usign_argv[usign_argc++] = "-F";
  92. if (pubkeyfile) {
  93. usign_argv[usign_argc++] = "-p";
  94. usign_argv[usign_argc++] = pubkeyfile;
  95. }
  96. if (seckeyfile) {
  97. usign_argv[usign_argc++] = "-s";
  98. usign_argv[usign_argc++] = seckeyfile;
  99. }
  100. if (sigfile) {
  101. usign_argv[usign_argc++] = "-x";
  102. usign_argv[usign_argc++] = sigfile;
  103. }
  104. pid = fork();
  105. switch (pid) {
  106. case -1:
  107. return -1;
  108. case 0:
  109. dup2(fds[1], 1);
  110. close(fds[0]);
  111. close(fds[1]);
  112. execvp(usign_argv[0], (char *const *)usign_argv);
  113. if (!quiet)
  114. perror("Failed to execute usign");
  115. _exit(1);
  116. }
  117. close(fds[1]);
  118. waitpid(pid, &status, 0);
  119. status = WIFEXITED(status) ? WEXITSTATUS(status) : -1;
  120. if (!fingerprint || status) {
  121. close(fds[0]);
  122. return status;
  123. }
  124. f = fdopen(fds[0], "r");
  125. if (fread(fingerprint, 1, 16, f) != 16)
  126. status = -1;
  127. fclose(f);
  128. if (status)
  129. return status;
  130. fingerprint[16] = '\0';
  131. if (strspn(fingerprint, "0123456789abcdefABCDEF") != 16)
  132. status = -1;
  133. return status;
  134. }
  135. /*
  136. * call usign -F -p ...
  137. */
  138. int usign_f_pubkey(char fingerprint[17], const char *pubkeyfile, bool quiet) {
  139. return usign_f(fingerprint, pubkeyfile, NULL, NULL, quiet);
  140. }
  141. /*
  142. * call usign -F -s ...
  143. */
  144. int usign_f_seckey(char fingerprint[17], const char *seckeyfile, bool quiet) {
  145. return usign_f(fingerprint, NULL, seckeyfile, NULL, quiet);
  146. }
  147. /*
  148. * call usign -F -x ...
  149. */
  150. int usign_f_sig(char fingerprint[17], const char *sigfile, bool quiet) {
  151. return usign_f(fingerprint, NULL, NULL, sigfile, quiet);
  152. }
  153. /*
  154. * call usign -V ...
  155. * return WEXITSTATUS or -1 if fork fails
  156. */
  157. int usign_v(const char *msgfile, const char *pubkeyfile,
  158. const char *pubkeydir, const char *sigfile, bool quiet) {
  159. pid_t pid;
  160. int status;
  161. const char *usign_argv[16] = {0};
  162. unsigned int usign_argc = 0;
  163. char fingerprint[17];
  164. if (usign_f_sig(fingerprint, sigfile, quiet)) {
  165. if (!quiet)
  166. fprintf(stderr, "cannot get signing key fingerprint\n");
  167. return 1;
  168. }
  169. if (pubkeydir && _usign_key_is_revoked(fingerprint, pubkeydir)) {
  170. if (!quiet)
  171. fprintf(stderr, "key %s has been revoked!\n", fingerprint);
  172. return 1;
  173. }
  174. usign_argv[usign_argc++] = USIGN_EXEC;
  175. usign_argv[usign_argc++] = "-V";
  176. usign_argv[usign_argc++] = "-m";
  177. usign_argv[usign_argc++] = msgfile;
  178. if (quiet)
  179. usign_argv[usign_argc++] = "-q";
  180. if (pubkeyfile) {
  181. usign_argv[usign_argc++] = "-p";
  182. usign_argv[usign_argc++] = pubkeyfile;
  183. }
  184. if (pubkeydir) {
  185. usign_argv[usign_argc++] = "-P";
  186. usign_argv[usign_argc++] = pubkeydir;
  187. }
  188. if (sigfile) {
  189. usign_argv[usign_argc++] = "-x";
  190. usign_argv[usign_argc++] = sigfile;
  191. }
  192. pid = fork();
  193. switch (pid) {
  194. case -1:
  195. return -1;
  196. case 0:
  197. execvp(usign_argv[0], (char *const *)usign_argv);
  198. if (!quiet)
  199. perror("Failed to execute usign");
  200. _exit(1);
  201. }
  202. waitpid(pid, &status, 0);
  203. return WIFEXITED(status) ? WEXITSTATUS(status) : -1;
  204. }