2003-06-05 07:14:21 +00:00
|
|
|
/* openfile.c
|
2010-03-08 18:19:21 +00:00
|
|
|
* Copyright (C) 1998, 1999, 2000, 2001, 2002, 2003, 2004, 2005, 2009,
|
|
|
|
* 2010 Free Software Foundation, Inc.
|
2003-06-05 07:14:21 +00:00
|
|
|
*
|
|
|
|
* This file is part of GnuPG.
|
|
|
|
*
|
|
|
|
* GnuPG is free software; you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU General Public License as published by
|
2007-07-04 19:49:40 +00:00
|
|
|
* the Free Software Foundation; either version 3 of the License, or
|
2003-06-05 07:14:21 +00:00
|
|
|
* (at your option) any later version.
|
|
|
|
*
|
|
|
|
* GnuPG is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU General Public License
|
2016-11-05 12:02:19 +01:00
|
|
|
* along with this program; if not, see <https://www.gnu.org/licenses/>.
|
2003-06-05 07:14:21 +00:00
|
|
|
*/
|
|
|
|
|
|
|
|
#include <config.h>
|
|
|
|
#include <stdio.h>
|
|
|
|
#include <stdlib.h>
|
|
|
|
#include <string.h>
|
|
|
|
#include <errno.h>
|
|
|
|
#include <sys/types.h>
|
|
|
|
#include <sys/stat.h>
|
|
|
|
#include <fcntl.h>
|
|
|
|
#include <unistd.h>
|
2003-06-18 19:56:13 +00:00
|
|
|
|
|
|
|
#include "gpg.h"
|
2017-03-07 20:21:23 +09:00
|
|
|
#include "../common/util.h"
|
|
|
|
#include "../common/ttyio.h"
|
2003-06-05 07:14:21 +00:00
|
|
|
#include "options.h"
|
|
|
|
#include "main.h"
|
2017-03-07 20:21:23 +09:00
|
|
|
#include "../common/status.h"
|
|
|
|
#include "../common/i18n.h"
|
2003-06-05 07:14:21 +00:00
|
|
|
|
2009-09-30 15:28:38 +00:00
|
|
|
#ifdef HAVE_W32_SYSTEM
|
|
|
|
#define NAME_OF_DEV_NULL "nul"
|
|
|
|
#else
|
|
|
|
#define NAME_OF_DEV_NULL "/dev/null"
|
|
|
|
#endif
|
|
|
|
|
|
|
|
|
2003-06-05 07:14:21 +00:00
|
|
|
#if defined (HAVE_DRIVE_LETTERS) || defined (__riscos__)
|
|
|
|
#define CMP_FILENAME(a,b) ascii_strcasecmp( (a), (b) )
|
|
|
|
#else
|
|
|
|
#define CMP_FILENAME(a,b) strcmp( (a), (b) )
|
|
|
|
#endif
|
|
|
|
|
|
|
|
|
|
|
|
/* FIXME: Implement opt.interactive. */
|
|
|
|
|
2014-11-13 13:00:46 +01:00
|
|
|
/*
|
2003-06-05 07:14:21 +00:00
|
|
|
* Check whether FNAME exists and ask if it's okay to overwrite an
|
|
|
|
* existing one.
|
|
|
|
* Returns: True: it's okay to overwrite or the file does not exist
|
|
|
|
* False: Do not overwrite
|
|
|
|
*/
|
|
|
|
int
|
|
|
|
overwrite_filep( const char *fname )
|
|
|
|
{
|
2009-09-30 15:28:38 +00:00
|
|
|
if ( iobuf_is_pipe_filename (fname) )
|
|
|
|
return 1; /* Writing to stdout is always okay. */
|
2011-02-04 12:57:53 +01:00
|
|
|
|
2021-05-25 13:39:59 +02:00
|
|
|
if ( gnupg_access( fname, F_OK ) )
|
2009-09-30 15:28:38 +00:00
|
|
|
return 1; /* Does not exist. */
|
2011-02-04 12:57:53 +01:00
|
|
|
|
2009-09-30 15:28:38 +00:00
|
|
|
if ( !compare_filenames (fname, NAME_OF_DEV_NULL) )
|
|
|
|
return 1; /* Does not do any harm. */
|
2003-06-05 07:14:21 +00:00
|
|
|
|
2009-09-30 15:28:38 +00:00
|
|
|
if (opt.answer_yes)
|
|
|
|
return 1;
|
|
|
|
if (opt.answer_no || opt.batch)
|
|
|
|
return 0; /* Do not overwrite. */
|
2003-06-05 07:14:21 +00:00
|
|
|
|
2012-06-05 19:29:22 +02:00
|
|
|
tty_printf (_("File '%s' exists. "), fname);
|
2009-09-30 15:28:38 +00:00
|
|
|
if (cpr_enabled ())
|
|
|
|
tty_printf ("\n");
|
|
|
|
if (cpr_get_answer_is_yes ("openfile.overwrite.okay",
|
|
|
|
_("Overwrite? (y/N) ")) )
|
|
|
|
return 1;
|
|
|
|
return 0;
|
2003-06-05 07:14:21 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2014-11-13 13:00:46 +01:00
|
|
|
/*
|
2006-11-27 16:41:32 +00:00
|
|
|
* Strip known extensions from iname and return a newly allocated
|
2003-06-05 07:14:21 +00:00
|
|
|
* filename. Return NULL if we can't do that.
|
|
|
|
*/
|
|
|
|
char *
|
2014-11-13 13:00:46 +01:00
|
|
|
make_outfile_name (const char *iname)
|
2003-06-05 07:14:21 +00:00
|
|
|
{
|
2014-11-13 13:00:46 +01:00
|
|
|
size_t n;
|
|
|
|
|
|
|
|
if (iobuf_is_pipe_filename (iname))
|
|
|
|
return xstrdup ("-");
|
|
|
|
|
|
|
|
n = strlen (iname);
|
|
|
|
if (n > 4 && (!CMP_FILENAME(iname+n-4, EXTSEP_S GPGEXT_GPG)
|
|
|
|
|| !CMP_FILENAME(iname+n-4, EXTSEP_S "pgp")
|
|
|
|
|| !CMP_FILENAME(iname+n-4, EXTSEP_S "sig")
|
|
|
|
|| !CMP_FILENAME(iname+n-4, EXTSEP_S "asc")))
|
|
|
|
{
|
|
|
|
char *buf = xstrdup (iname);
|
|
|
|
buf[n-4] = 0;
|
|
|
|
return buf;
|
2003-06-05 07:14:21 +00:00
|
|
|
}
|
2014-11-13 13:00:46 +01:00
|
|
|
else if (n > 5 && !CMP_FILENAME(iname+n-5, EXTSEP_S "sign"))
|
|
|
|
{
|
|
|
|
char *buf = xstrdup (iname);
|
|
|
|
buf[n-5] = 0;
|
|
|
|
return buf;
|
2003-06-05 07:14:21 +00:00
|
|
|
}
|
|
|
|
|
2014-11-13 13:00:46 +01:00
|
|
|
log_info (_("%s: unknown suffix\n"), iname);
|
|
|
|
return NULL;
|
2003-06-05 07:14:21 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2006-11-27 16:41:32 +00:00
|
|
|
/* Ask for an output filename; use the given one as default. Return
|
|
|
|
NULL if no file has been given or if it is not possible to ask the
|
2017-04-28 10:06:33 +09:00
|
|
|
user. NAME is the template len which might contain enbedded Nuls.
|
2006-11-27 16:41:32 +00:00
|
|
|
NAMELEN is its actual length.
|
2003-06-05 07:14:21 +00:00
|
|
|
*/
|
|
|
|
char *
|
|
|
|
ask_outfile_name( const char *name, size_t namelen )
|
|
|
|
{
|
2006-11-27 16:41:32 +00:00
|
|
|
size_t n;
|
|
|
|
const char *s;
|
|
|
|
char *prompt;
|
|
|
|
char *fname;
|
|
|
|
char *defname;
|
|
|
|
|
|
|
|
if ( opt.batch )
|
|
|
|
return NULL;
|
2011-02-04 12:57:53 +01:00
|
|
|
|
2006-11-27 16:41:32 +00:00
|
|
|
defname = name && namelen? make_printable_string (name, namelen, 0) : NULL;
|
|
|
|
|
|
|
|
s = _("Enter new filename");
|
|
|
|
n = strlen(s) + (defname?strlen (defname):0) + 10;
|
|
|
|
prompt = xmalloc (n);
|
|
|
|
if (defname)
|
Fix use cases of snprintf.
* agent/call-pinentry.c, agent/call-scd.c, agent/command.c,
build-aux/speedo/w32/g4wihelp.c, common/get-passphrase.c,
dirmngr/dirmngr.c, g10/call-agent.c, g10/cpr.c, g10/keygen.c,
g10/openfile.c, g10/passphrase.c, scd/app-openpgp.c, scd/scdaemon.c,
sm/call-agent.c, sm/call-dirmngr.c, sm/certreqgen.c: Fix assuming C99.
--
Signed-off-by: NIIBE Yutaka <gniibe@fsij.org>
2016-10-21 12:04:46 +09:00
|
|
|
snprintf (prompt, n, "%s [%s]: ", s, defname );
|
2006-11-27 16:41:32 +00:00
|
|
|
else
|
Fix use cases of snprintf.
* agent/call-pinentry.c, agent/call-scd.c, agent/command.c,
build-aux/speedo/w32/g4wihelp.c, common/get-passphrase.c,
dirmngr/dirmngr.c, g10/call-agent.c, g10/cpr.c, g10/keygen.c,
g10/openfile.c, g10/passphrase.c, scd/app-openpgp.c, scd/scdaemon.c,
sm/call-agent.c, sm/call-dirmngr.c, sm/certreqgen.c: Fix assuming C99.
--
Signed-off-by: NIIBE Yutaka <gniibe@fsij.org>
2016-10-21 12:04:46 +09:00
|
|
|
snprintf (prompt, n, "%s: ", s );
|
2006-11-27 16:41:32 +00:00
|
|
|
tty_enable_completion(NULL);
|
|
|
|
fname = cpr_get ("openfile.askoutname", prompt );
|
|
|
|
cpr_kill_prompt ();
|
|
|
|
tty_disable_completion ();
|
|
|
|
xfree (prompt);
|
2011-02-04 12:57:53 +01:00
|
|
|
if ( !*fname )
|
2006-11-27 16:41:32 +00:00
|
|
|
{
|
2011-02-04 12:57:53 +01:00
|
|
|
xfree (fname);
|
2006-11-27 16:41:32 +00:00
|
|
|
fname = defname;
|
|
|
|
defname = NULL;
|
2003-06-05 07:14:21 +00:00
|
|
|
}
|
2006-11-27 16:41:32 +00:00
|
|
|
xfree (defname);
|
|
|
|
if (fname)
|
|
|
|
trim_spaces (fname);
|
|
|
|
return fname;
|
2003-06-05 07:14:21 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2014-11-13 13:00:46 +01:00
|
|
|
/*
|
2003-06-05 07:14:21 +00:00
|
|
|
* Make an output filename for the inputfile INAME.
|
2024-09-09 16:41:35 +02:00
|
|
|
* Returns an IOBUF at A and an errorcode
|
2003-06-05 07:14:21 +00:00
|
|
|
* Mode 0 = use ".gpg"
|
|
|
|
* 1 = use ".asc"
|
|
|
|
* 2 = use ".sig"
|
2014-06-25 20:25:28 +02:00
|
|
|
* 3 = use ".rev"
|
2009-10-02 14:57:55 +00:00
|
|
|
*
|
2018-01-28 18:59:18 +01:00
|
|
|
* With RESTRICTEDPERM a file will be created with mode 700 if
|
|
|
|
* possible.
|
|
|
|
*
|
|
|
|
* If OUT_FD is not -1 the function simply creates an IOBUF for that
|
|
|
|
* file descriptor and ignores INAME and MODE. Note that OUT_FD won't
|
|
|
|
* be closed if the returned IOBUF is closed. This is used for gpg's
|
|
|
|
* --server mode. */
|
2003-06-05 07:14:21 +00:00
|
|
|
int
|
2023-07-05 09:36:00 +09:00
|
|
|
open_outfile (gnupg_fd_t out_fd, const char *iname, int mode,
|
|
|
|
int restrictedperm, iobuf_t *a)
|
2003-06-05 07:14:21 +00:00
|
|
|
{
|
|
|
|
int rc = 0;
|
|
|
|
|
|
|
|
*a = NULL;
|
2023-07-05 09:36:00 +09:00
|
|
|
if (out_fd != GNUPG_INVALID_FD)
|
2009-09-30 15:28:38 +00:00
|
|
|
{
|
|
|
|
char xname[64];
|
2011-02-04 12:57:53 +01:00
|
|
|
|
2018-01-28 18:59:18 +01:00
|
|
|
*a = iobuf_fdopen_nc (out_fd, "wb");
|
2009-09-30 15:28:38 +00:00
|
|
|
if (!*a)
|
|
|
|
{
|
|
|
|
rc = gpg_error_from_syserror ();
|
2023-07-18 11:54:16 +09:00
|
|
|
snprintf (xname, sizeof xname, "[fd %d]", FD_DBG (out_fd));
|
2012-06-05 19:29:22 +02:00
|
|
|
log_error (_("can't open '%s': %s\n"), xname, gpg_strerror (rc));
|
2009-09-30 15:28:38 +00:00
|
|
|
}
|
|
|
|
else if (opt.verbose)
|
|
|
|
{
|
2023-07-18 11:54:16 +09:00
|
|
|
snprintf (xname, sizeof xname, "[fd %d]", FD_DBG (out_fd));
|
2012-06-05 19:29:22 +02:00
|
|
|
log_info (_("writing to '%s'\n"), xname);
|
2009-09-30 15:28:38 +00:00
|
|
|
}
|
|
|
|
}
|
2017-08-01 19:08:16 +02:00
|
|
|
else if (iobuf_is_pipe_filename (iname) && !opt.outfile)
|
2009-09-30 15:28:38 +00:00
|
|
|
{
|
2014-06-25 20:25:28 +02:00
|
|
|
*a = iobuf_create (NULL, 0);
|
2009-09-30 15:28:38 +00:00
|
|
|
if ( !*a )
|
|
|
|
{
|
|
|
|
rc = gpg_error_from_syserror ();
|
2012-06-05 19:29:22 +02:00
|
|
|
log_error (_("can't open '%s': %s\n"), "[stdout]", strerror(errno) );
|
2009-09-30 15:28:38 +00:00
|
|
|
}
|
|
|
|
else if ( opt.verbose )
|
|
|
|
log_info (_("writing to stdout\n"));
|
2003-06-05 07:14:21 +00:00
|
|
|
}
|
2009-09-30 15:28:38 +00:00
|
|
|
else
|
|
|
|
{
|
|
|
|
char *buf = NULL;
|
|
|
|
const char *name;
|
2011-02-04 12:57:53 +01:00
|
|
|
|
2009-09-30 15:28:38 +00:00
|
|
|
if (opt.dry_run)
|
|
|
|
name = NAME_OF_DEV_NULL;
|
2017-08-01 19:08:16 +02:00
|
|
|
else if (opt.outfile)
|
|
|
|
name = opt.outfile;
|
2011-02-04 12:57:53 +01:00
|
|
|
else
|
2003-06-05 07:14:21 +00:00
|
|
|
{
|
2009-09-30 15:28:38 +00:00
|
|
|
#ifdef USE_ONLY_8DOT3
|
|
|
|
if (opt.mangle_dos_filenames)
|
|
|
|
{
|
|
|
|
/* It is quite common for DOS systems to have only one
|
|
|
|
dot in a filename. If we have something like this,
|
|
|
|
we simple replace the suffix except in cases where
|
|
|
|
the suffix is larger than 3 characters and not the
|
|
|
|
same as the new one. We don't map the filenames to
|
|
|
|
8.3 because this is a duty of the file system. */
|
|
|
|
char *dot;
|
|
|
|
const char *newsfx;
|
|
|
|
|
|
|
|
newsfx = (mode==1 ? ".asc" :
|
2014-06-25 20:25:28 +02:00
|
|
|
mode==2 ? ".sig" :
|
|
|
|
mode==3 ? ".rev" : ".gpg");
|
2011-02-04 12:57:53 +01:00
|
|
|
|
2009-09-30 15:28:38 +00:00
|
|
|
buf = xmalloc (strlen(iname)+4+1);
|
|
|
|
strcpy (buf, iname);
|
|
|
|
dot = strchr (buf, '.' );
|
|
|
|
if ( dot && dot > buf && dot[1] && strlen(dot) <= 4
|
|
|
|
&& CMP_FILENAME (newsfx, dot) )
|
|
|
|
strcpy (dot, newsfx);
|
|
|
|
else if (dot && !dot[1]) /* Do not duplicate a dot. */
|
|
|
|
strcpy (dot, newsfx+1);
|
|
|
|
else
|
|
|
|
strcat (buf, newsfx);
|
|
|
|
}
|
|
|
|
if (!buf)
|
|
|
|
#endif /* USE_ONLY_8DOT3 */
|
2003-06-05 07:14:21 +00:00
|
|
|
{
|
2011-02-04 12:57:53 +01:00
|
|
|
buf = xstrconcat (iname,
|
2009-09-30 15:28:38 +00:00
|
|
|
(mode==1 ? EXTSEP_S "asc" :
|
2013-11-18 14:09:47 +01:00
|
|
|
mode==2 ? EXTSEP_S "sig" :
|
2014-06-25 20:25:28 +02:00
|
|
|
mode==3 ? EXTSEP_S "rev" :
|
2013-11-18 14:09:47 +01:00
|
|
|
/* */ EXTSEP_S GPGEXT_GPG),
|
2009-09-30 15:28:38 +00:00
|
|
|
NULL);
|
2003-06-05 07:14:21 +00:00
|
|
|
}
|
2009-09-30 15:28:38 +00:00
|
|
|
name = buf;
|
2003-06-05 07:14:21 +00:00
|
|
|
}
|
2011-02-04 12:57:53 +01:00
|
|
|
|
2009-09-30 15:28:38 +00:00
|
|
|
rc = 0;
|
|
|
|
while ( !overwrite_filep (name) )
|
|
|
|
{
|
|
|
|
char *tmp = ask_outfile_name (NULL, 0);
|
|
|
|
if ( !tmp || !*tmp )
|
|
|
|
{
|
|
|
|
xfree (tmp);
|
|
|
|
rc = gpg_error (GPG_ERR_EEXIST);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
xfree (buf);
|
|
|
|
name = buf = tmp;
|
|
|
|
}
|
2011-02-04 12:57:53 +01:00
|
|
|
|
2009-09-30 15:28:38 +00:00
|
|
|
if ( !rc )
|
2003-06-05 07:14:21 +00:00
|
|
|
{
|
2009-09-30 15:28:38 +00:00
|
|
|
if (is_secured_filename (name) )
|
|
|
|
{
|
|
|
|
*a = NULL;
|
2010-04-01 13:24:55 +00:00
|
|
|
gpg_err_set_errno (EPERM);
|
2009-09-30 15:28:38 +00:00
|
|
|
}
|
|
|
|
else
|
2014-06-25 20:25:28 +02:00
|
|
|
*a = iobuf_create (name, restrictedperm);
|
2009-09-30 15:28:38 +00:00
|
|
|
if (!*a)
|
|
|
|
{
|
|
|
|
rc = gpg_error_from_syserror ();
|
2012-06-05 19:29:22 +02:00
|
|
|
log_error(_("can't create '%s': %s\n"), name, strerror(errno) );
|
2009-09-30 15:28:38 +00:00
|
|
|
}
|
|
|
|
else if( opt.verbose )
|
2012-06-05 19:29:22 +02:00
|
|
|
log_info (_("writing to '%s'\n"), name );
|
2003-06-05 07:14:21 +00:00
|
|
|
}
|
2009-09-30 15:28:38 +00:00
|
|
|
xfree(buf);
|
2003-06-05 07:14:21 +00:00
|
|
|
}
|
2011-02-04 12:57:53 +01:00
|
|
|
|
2006-04-19 11:26:11 +00:00
|
|
|
if (*a)
|
2010-03-08 17:05:37 +00:00
|
|
|
iobuf_ioctl (*a, IOBUF_IOCTL_NO_CACHE, 1, NULL);
|
2006-04-19 11:26:11 +00:00
|
|
|
|
2003-06-05 07:14:21 +00:00
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2014-11-13 17:39:31 +01:00
|
|
|
/* Find a matching data file for the signature file SIGFILENAME and
|
|
|
|
return it as a malloced string. If no matching data file is found,
|
|
|
|
return NULL. */
|
|
|
|
char *
|
|
|
|
get_matching_datafile (const char *sigfilename)
|
|
|
|
{
|
|
|
|
char *fname = NULL;
|
|
|
|
size_t len;
|
|
|
|
|
|
|
|
if (iobuf_is_pipe_filename (sigfilename))
|
|
|
|
return NULL;
|
|
|
|
|
|
|
|
len = strlen (sigfilename);
|
|
|
|
if (len > 4
|
|
|
|
&& (!strcmp (sigfilename + len - 4, EXTSEP_S "sig")
|
|
|
|
|| (len > 5 && !strcmp(sigfilename + len - 5, EXTSEP_S "sign"))
|
|
|
|
|| !strcmp(sigfilename + len - 4, EXTSEP_S "asc")))
|
|
|
|
{
|
|
|
|
|
|
|
|
fname = xstrdup (sigfilename);
|
|
|
|
fname[len-(fname[len-1]=='n'?5:4)] = 0 ;
|
2020-10-20 10:43:55 +02:00
|
|
|
if (gnupg_access (fname, R_OK ))
|
2014-11-13 17:39:31 +01:00
|
|
|
{
|
|
|
|
/* Not found or other error. */
|
|
|
|
xfree (fname);
|
|
|
|
fname = NULL;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return fname;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2014-11-13 13:00:46 +01:00
|
|
|
/*
|
2003-06-05 07:14:21 +00:00
|
|
|
* Try to open a file without the extension ".sig" or ".asc"
|
|
|
|
* Return NULL if such a file is not available.
|
|
|
|
*/
|
2014-11-13 17:39:31 +01:00
|
|
|
iobuf_t
|
|
|
|
open_sigfile (const char *sigfilename, progress_filter_context_t *pfx)
|
2003-06-05 07:14:21 +00:00
|
|
|
{
|
2014-11-13 17:39:31 +01:00
|
|
|
iobuf_t a = NULL;
|
|
|
|
char *buf;
|
2014-11-13 13:00:46 +01:00
|
|
|
|
2014-11-13 17:39:31 +01:00
|
|
|
buf = get_matching_datafile (sigfilename);
|
|
|
|
if (buf)
|
2014-11-13 13:00:46 +01:00
|
|
|
{
|
2014-11-13 17:39:31 +01:00
|
|
|
a = iobuf_open (buf);
|
|
|
|
if (a && is_secured_file (iobuf_get_fd (a)))
|
2014-11-13 13:00:46 +01:00
|
|
|
{
|
2014-11-13 17:39:31 +01:00
|
|
|
iobuf_close (a);
|
|
|
|
a = NULL;
|
|
|
|
gpg_err_set_errno (EPERM);
|
|
|
|
}
|
|
|
|
if (a)
|
|
|
|
log_info (_("assuming signed data in '%s'\n"), buf);
|
|
|
|
if (a && pfx)
|
|
|
|
handle_progress (pfx, a, buf);
|
|
|
|
xfree (buf);
|
2003-06-05 07:14:21 +00:00
|
|
|
}
|
2014-11-13 13:00:46 +01:00
|
|
|
|
|
|
|
return a;
|
2003-06-05 07:14:21 +00:00
|
|
|
}
|
|
|
|
|
2014-11-13 13:00:46 +01:00
|
|
|
|
2020-11-04 15:36:52 +01:00
|
|
|
/* Create the directory only if the supplied directory name is the
|
|
|
|
same as the default one. This way we avoid to create arbitrary
|
|
|
|
directories when a non-default home directory is used. To cope
|
|
|
|
with HOME, we do compare only the suffix if we see that the default
|
|
|
|
homedir does start with a tilde. */
|
2003-06-05 07:14:21 +00:00
|
|
|
void
|
2007-06-26 13:48:44 +00:00
|
|
|
try_make_homedir (const char *fname)
|
2003-06-05 07:14:21 +00:00
|
|
|
{
|
2007-06-26 13:48:44 +00:00
|
|
|
if ( opt.dry_run || opt.no_homedir_creation )
|
|
|
|
return;
|
2003-06-05 07:14:21 +00:00
|
|
|
|
2020-11-04 15:36:52 +01:00
|
|
|
gnupg_maybe_make_homedir (fname, opt.quiet);
|
2003-06-05 07:14:21 +00:00
|
|
|
}
|
2014-06-25 20:25:28 +02:00
|
|
|
|
|
|
|
|
|
|
|
/* Get and if needed create a string with the directory used to store
|
|
|
|
openpgp revocations. */
|
|
|
|
char *
|
|
|
|
get_openpgp_revocdir (const char *home)
|
|
|
|
{
|
|
|
|
char *fname;
|
|
|
|
struct stat statbuf;
|
|
|
|
|
|
|
|
fname = make_filename (home, GNUPG_OPENPGP_REVOC_DIR, NULL);
|
2020-10-20 16:38:06 +02:00
|
|
|
if (gnupg_stat (fname, &statbuf) && errno == ENOENT)
|
2014-06-25 20:25:28 +02:00
|
|
|
{
|
|
|
|
if (gnupg_mkdir (fname, "-rwx"))
|
|
|
|
log_error (_("can't create directory '%s': %s\n"),
|
|
|
|
fname, strerror (errno) );
|
|
|
|
else if (!opt.quiet)
|
|
|
|
log_info (_("directory '%s' created\n"), fname);
|
|
|
|
}
|
|
|
|
return fname;
|
|
|
|
}
|