mirror of
git://git.gnupg.org/gnupg.git
synced 2024-12-22 10:19:57 +01:00
539 lines
14 KiB
C
539 lines
14 KiB
C
/* gpgtar.c - A simple TAR implementation mainly useful for Windows.
|
||
* Copyright (C) 2010 Free Software Foundation, Inc.
|
||
*
|
||
* This file is part of GnuPG.
|
||
*
|
||
* GnuPG is free software; you can redistribute it and/or modify
|
||
* it under the terms of the GNU General Public License as published by
|
||
* the Free Software Foundation; either version 3 of the License, or
|
||
* (at your option) any later version.
|
||
*
|
||
* GnuPG is distributed in the hope that it will be useful,
|
||
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||
* GNU General Public License for more details.
|
||
*
|
||
* You should have received a copy of the GNU General Public License
|
||
* along with this program; if not, see <http://www.gnu.org/licenses/>.
|
||
*/
|
||
|
||
/* GnuPG comes with a shell script gpg-zip which creates archive files
|
||
in the same format as PGP Zip, which is actually a USTAR format.
|
||
That is fine and works nicely on all Unices but for Windows we
|
||
don't have a compatible shell and the supply of tar programs is
|
||
limited. Given that we need just a few tar option and it is an
|
||
open question how many Unix concepts are to be mapped to Windows,
|
||
we might as well write our own little tar customized for use with
|
||
gpg. So here we go. */
|
||
|
||
#include <config.h>
|
||
#include <errno.h>
|
||
#include <stdio.h>
|
||
#include <stdlib.h>
|
||
#include <string.h>
|
||
#include <assert.h>
|
||
#ifdef HAVE_STAT
|
||
# include <sys/stat.h>
|
||
#endif
|
||
|
||
#include "util.h"
|
||
#include "i18n.h"
|
||
#include "sysutils.h"
|
||
#include "../common/openpgpdefs.h"
|
||
|
||
#include "gpgtar.h"
|
||
|
||
|
||
/* Constants to identify the commands and options. */
|
||
enum cmd_and_opt_values
|
||
{
|
||
aNull = 0,
|
||
aEncrypt = 'e',
|
||
aDecrypt = 'd',
|
||
aSign = 's',
|
||
aList = 't',
|
||
|
||
oSymmetric = 'c',
|
||
oRecipient = 'r',
|
||
oUser = 'u',
|
||
oOutput = 'o',
|
||
oQuiet = 'q',
|
||
oVerbose = 'v',
|
||
oFilesFrom = 'T',
|
||
oNoVerbose = 500,
|
||
|
||
aSignEncrypt,
|
||
oSkipCrypto,
|
||
oOpenPGP,
|
||
oCMS,
|
||
oSetFilename,
|
||
oNull
|
||
};
|
||
|
||
|
||
/* The list of commands and options. */
|
||
static ARGPARSE_OPTS opts[] = {
|
||
ARGPARSE_group (300, N_("@Commands:\n ")),
|
||
|
||
ARGPARSE_c (aEncrypt, "encrypt", N_("create an archive")),
|
||
ARGPARSE_c (aDecrypt, "decrypt", N_("extract an archive")),
|
||
ARGPARSE_c (aSign, "sign", N_("create a signed archive")),
|
||
ARGPARSE_c (aList, "list-archive", N_("list an archive")),
|
||
|
||
ARGPARSE_group (301, N_("@\nOptions:\n ")),
|
||
|
||
ARGPARSE_s_n (oSymmetric, "symmetric", N_("use symmetric encryption")),
|
||
ARGPARSE_s_s (oRecipient, "recipient", N_("|USER-ID|encrypt for USER-ID")),
|
||
ARGPARSE_s_s (oUser, "local-user",
|
||
N_("|USER-ID|use USER-ID to sign or decrypt")),
|
||
ARGPARSE_s_s (oOutput, "output", N_("|FILE|write output to FILE")),
|
||
ARGPARSE_s_n (oVerbose, "verbose", N_("verbose")),
|
||
ARGPARSE_s_n (oQuiet, "quiet", N_("be somewhat more quiet")),
|
||
ARGPARSE_s_n (oSkipCrypto, "skip-crypto", N_("skip the crypto processing")),
|
||
ARGPARSE_s_s (oSetFilename, "set-filename", "@"),
|
||
ARGPARSE_s_s (oFilesFrom, "files-from",
|
||
N_("|FILE|get names to create from FILE")),
|
||
ARGPARSE_s_n (oNull, "null", N_("-T reads null-terminated names")),
|
||
ARGPARSE_s_n (oOpenPGP, "openpgp", "@"),
|
||
ARGPARSE_s_n (oCMS, "cms", "@"),
|
||
|
||
ARGPARSE_end ()
|
||
};
|
||
|
||
|
||
|
||
static void tar_and_encrypt (char **inpattern);
|
||
static void decrypt_and_untar (const char *fname);
|
||
static void decrypt_and_list (const char *fname);
|
||
|
||
|
||
|
||
|
||
/* Print usage information and and provide strings for help. */
|
||
static const char *
|
||
my_strusage( int level )
|
||
{
|
||
const char *p;
|
||
|
||
switch (level)
|
||
{
|
||
case 11: p = "gpgtar (GnuPG)";
|
||
break;
|
||
case 13: p = VERSION; break;
|
||
case 17: p = PRINTABLE_OS_NAME; break;
|
||
case 19: p = _("Please report bugs to <@EMAIL@>.\n"); break;
|
||
|
||
case 1:
|
||
case 40:
|
||
p = _("Usage: gpgtar [options] [files] [directories] (-h for help)");
|
||
break;
|
||
case 41:
|
||
p = _("Syntax: gpgtar [options] [files] [directories]\n"
|
||
"Encrypt or sign files into an archive\n");
|
||
break;
|
||
|
||
default: p = NULL; break;
|
||
}
|
||
return p;
|
||
}
|
||
|
||
|
||
static void
|
||
set_cmd (enum cmd_and_opt_values *ret_cmd, enum cmd_and_opt_values new_cmd)
|
||
{
|
||
enum cmd_and_opt_values cmd = *ret_cmd;
|
||
|
||
if (!cmd || cmd == new_cmd)
|
||
cmd = new_cmd;
|
||
else if (cmd == aSign && new_cmd == aEncrypt)
|
||
cmd = aSignEncrypt;
|
||
else if (cmd == aEncrypt && new_cmd == aSign)
|
||
cmd = aSignEncrypt;
|
||
else
|
||
{
|
||
log_error (_("conflicting commands\n"));
|
||
exit (2);
|
||
}
|
||
|
||
*ret_cmd = cmd;
|
||
}
|
||
|
||
|
||
|
||
/* gpgtar main. */
|
||
int
|
||
main (int argc, char **argv)
|
||
{
|
||
ARGPARSE_ARGS pargs;
|
||
const char *fname;
|
||
int no_more_options = 0;
|
||
enum cmd_and_opt_values cmd = 0;
|
||
int skip_crypto = 0;
|
||
const char *files_from = NULL;
|
||
int null_names = 0;
|
||
|
||
assert (sizeof (struct ustar_raw_header) == 512);
|
||
|
||
gnupg_reopen_std ("gpgtar");
|
||
set_strusage (my_strusage);
|
||
log_set_prefix ("gpgtar", 1);
|
||
|
||
/* Make sure that our subsystems are ready. */
|
||
i18n_init();
|
||
init_common_subsystems ();
|
||
|
||
/* Parse the command line. */
|
||
pargs.argc = &argc;
|
||
pargs.argv = &argv;
|
||
pargs.flags = ARGPARSE_FLAG_KEEP;
|
||
while (!no_more_options && optfile_parse (NULL, NULL, NULL, &pargs, opts))
|
||
{
|
||
switch (pargs.r_opt)
|
||
{
|
||
case oOutput: opt.outfile = pargs.r.ret_str; break;
|
||
case oSetFilename: opt.filename = pargs.r.ret_str; break;
|
||
case oQuiet: opt.quiet = 1; break;
|
||
case oVerbose: opt.verbose++; break;
|
||
case oNoVerbose: opt.verbose = 0; break;
|
||
case oFilesFrom: files_from = pargs.r.ret_str; break;
|
||
case oNull: null_names = 1; break;
|
||
|
||
case aList:
|
||
case aDecrypt:
|
||
case aEncrypt:
|
||
case aSign:
|
||
set_cmd (&cmd, pargs.r_opt);
|
||
break;
|
||
|
||
case oSymmetric:
|
||
set_cmd (&cmd, aEncrypt);
|
||
opt.symmetric = 1;
|
||
break;
|
||
|
||
case oSkipCrypto:
|
||
skip_crypto = 1;
|
||
break;
|
||
|
||
case oOpenPGP: /* Dummy option for now. */ break;
|
||
case oCMS: /* Dummy option for now. */ break;
|
||
|
||
default: pargs.err = 2; break;
|
||
}
|
||
}
|
||
|
||
if ((files_from && !null_names) || (!files_from && null_names))
|
||
log_error ("--files-from and --null may only be used in conjunction\n");
|
||
if (files_from && strcmp (files_from, "-"))
|
||
log_error ("--files-from only supports argument \"-\"\n");
|
||
|
||
if (log_get_errorcount (0))
|
||
exit (2);
|
||
|
||
switch (cmd)
|
||
{
|
||
case aList:
|
||
if (argc > 1)
|
||
usage (1);
|
||
fname = argc ? *argv : NULL;
|
||
if (opt.filename)
|
||
log_info ("note: ignoring option --set-filename\n");
|
||
if (files_from)
|
||
log_info ("note: ignoring option --files-from\n");
|
||
if (skip_crypto)
|
||
gpgtar_list (fname);
|
||
else
|
||
decrypt_and_list (fname);
|
||
break;
|
||
|
||
case aEncrypt:
|
||
if ((!argc && !null_names)
|
||
|| (argc && null_names))
|
||
usage (1);
|
||
if (opt.filename)
|
||
log_info ("note: ignoring option --set-filename\n");
|
||
if (skip_crypto)
|
||
gpgtar_create (null_names? NULL :argv);
|
||
else
|
||
tar_and_encrypt (null_names? NULL : argv);
|
||
break;
|
||
|
||
case aDecrypt:
|
||
if (argc != 1)
|
||
usage (1);
|
||
if (opt.outfile)
|
||
log_info ("note: ignoring option --output\n");
|
||
if (files_from)
|
||
log_info ("note: ignoring option --files-from\n");
|
||
fname = argc ? *argv : NULL;
|
||
if (skip_crypto)
|
||
gpgtar_extract (fname);
|
||
else
|
||
decrypt_and_untar (fname);
|
||
break;
|
||
|
||
default:
|
||
log_error (_("invalid command (there is no implicit command)\n"));
|
||
break;
|
||
}
|
||
|
||
return log_get_errorcount (0)? 1:0;
|
||
}
|
||
|
||
|
||
/* Read the next record from STREAM. RECORD is a buffer provided by
|
||
the caller and must be at leadt of size RECORDSIZE. The function
|
||
return 0 on success and and error code on failure; a diagnostic
|
||
printed as well. Note that there is no need for an EOF indicator
|
||
because a tarball has an explicit EOF record. */
|
||
gpg_error_t
|
||
read_record (estream_t stream, void *record)
|
||
{
|
||
gpg_error_t err;
|
||
size_t nread;
|
||
|
||
nread = es_fread (record, 1, RECORDSIZE, stream);
|
||
if (nread != RECORDSIZE)
|
||
{
|
||
err = gpg_error_from_syserror ();
|
||
if (es_ferror (stream))
|
||
log_error ("error reading `%s': %s\n",
|
||
es_fname_get (stream), gpg_strerror (err));
|
||
else
|
||
log_error ("error reading `%s': premature EOF "
|
||
"(size of last record: %zu)\n",
|
||
es_fname_get (stream), nread);
|
||
}
|
||
else
|
||
err = 0;
|
||
|
||
return err;
|
||
}
|
||
|
||
|
||
/* Write the RECORD of size RECORDSIZE to STREAM. FILENAME is the
|
||
name of the file used for diagnostics. */
|
||
gpg_error_t
|
||
write_record (estream_t stream, const void *record)
|
||
{
|
||
gpg_error_t err;
|
||
size_t nwritten;
|
||
|
||
nwritten = es_fwrite (record, 1, RECORDSIZE, stream);
|
||
if (nwritten != RECORDSIZE)
|
||
{
|
||
err = gpg_error_from_syserror ();
|
||
log_error ("error writing `%s': %s\n",
|
||
es_fname_get (stream), gpg_strerror (err));
|
||
}
|
||
else
|
||
err = 0;
|
||
|
||
return err;
|
||
}
|
||
|
||
|
||
/* Return true if FP is an unarmored OpenPGP message. Note that this
|
||
fucntion reads a few bytes from FP but pushes them back. */
|
||
#if 0
|
||
static int
|
||
openpgp_message_p (estream_t fp)
|
||
{
|
||
int ctb;
|
||
|
||
ctb = es_getc (fp);
|
||
if (ctb != EOF)
|
||
{
|
||
if (es_ungetc (ctb, fp))
|
||
log_fatal ("error ungetting first byte: %s\n",
|
||
gpg_strerror (gpg_error_from_syserror ()));
|
||
|
||
if ((ctb & 0x80))
|
||
{
|
||
switch ((ctb & 0x40) ? (ctb & 0x3f) : ((ctb>>2)&0xf))
|
||
{
|
||
case PKT_MARKER:
|
||
case PKT_SYMKEY_ENC:
|
||
case PKT_ONEPASS_SIG:
|
||
case PKT_PUBKEY_ENC:
|
||
case PKT_SIGNATURE:
|
||
case PKT_COMMENT:
|
||
case PKT_OLD_COMMENT:
|
||
case PKT_PLAINTEXT:
|
||
case PKT_COMPRESSED:
|
||
case PKT_ENCRYPTED:
|
||
return 1; /* Yes, this seems to be an OpenPGP message. */
|
||
default:
|
||
break;
|
||
}
|
||
}
|
||
}
|
||
return 0;
|
||
}
|
||
#endif
|
||
|
||
|
||
|
||
|
||
static void
|
||
tar_and_encrypt (char **inpattern)
|
||
{
|
||
(void)inpattern;
|
||
log_error ("tar_and_encrypt has not yet been implemented\n");
|
||
}
|
||
|
||
|
||
|
||
static void
|
||
decrypt_and_untar (const char *fname)
|
||
{
|
||
(void)fname;
|
||
log_error ("decrypt_and_untar has not yet been implemented\n");
|
||
}
|
||
|
||
|
||
|
||
static void
|
||
decrypt_and_list (const char *fname)
|
||
{
|
||
(void)fname;
|
||
log_error ("decrypt_and_list has not yet been implemented\n");
|
||
}
|
||
|
||
|
||
|
||
|
||
/* A wrapper around mkdir which takes a string for the mode argument.
|
||
This makes it easier to handle the mode argument which is not
|
||
defined on all systems. The format of the modestring is
|
||
|
||
"-rwxrwxrwx"
|
||
|
||
'-' is a don't care or not set. 'r', 'w', 'x' are read allowed,
|
||
write allowed, execution allowed with the first group for the user,
|
||
the second for the group and the third for all others. If the
|
||
string is shorter than above the missing mode characters are meant
|
||
to be not set. */
|
||
int
|
||
gnupg_mkdir (const char *name, const char *modestr)
|
||
{
|
||
#ifdef HAVE_W32CE_SYSTEM
|
||
wchar_t *wname;
|
||
(void)modestr;
|
||
|
||
wname = utf8_to_wchar (name);
|
||
if (!wname)
|
||
return -1;
|
||
if (!CreateDirectoryW (wname, NULL))
|
||
{
|
||
xfree (wname);
|
||
return -1; /* ERRNO is automagically provided by gpg-error.h. */
|
||
}
|
||
xfree (wname);
|
||
return 0;
|
||
#elif MKDIR_TAKES_ONE_ARG
|
||
(void)modestr;
|
||
/* Note: In the case of W32 we better use CreateDirectory and try to
|
||
set appropriate permissions. However using mkdir is easier
|
||
because this sets ERRNO. */
|
||
return mkdir (name);
|
||
#else
|
||
mode_t mode = 0;
|
||
|
||
if (modestr && *modestr)
|
||
{
|
||
modestr++;
|
||
if (*modestr && *modestr++ == 'r')
|
||
mode |= S_IRUSR;
|
||
if (*modestr && *modestr++ == 'w')
|
||
mode |= S_IWUSR;
|
||
if (*modestr && *modestr++ == 'x')
|
||
mode |= S_IXUSR;
|
||
if (*modestr && *modestr++ == 'r')
|
||
mode |= S_IRGRP;
|
||
if (*modestr && *modestr++ == 'w')
|
||
mode |= S_IWGRP;
|
||
if (*modestr && *modestr++ == 'x')
|
||
mode |= S_IXGRP;
|
||
if (*modestr && *modestr++ == 'r')
|
||
mode |= S_IROTH;
|
||
if (*modestr && *modestr++ == 'w')
|
||
mode |= S_IWOTH;
|
||
if (*modestr && *modestr++ == 'x')
|
||
mode |= S_IXOTH;
|
||
}
|
||
return mkdir (name, mode);
|
||
#endif
|
||
}
|
||
|
||
#ifdef HAVE_W32_SYSTEM
|
||
/* Return a malloced string encoded in UTF-8 from the wide char input
|
||
string STRING. Caller must free this value. Returns NULL and sets
|
||
ERRNO on failure. Calling this function with STRING set to NULL is
|
||
not defined. */
|
||
char *
|
||
wchar_to_utf8 (const wchar_t *string)
|
||
{
|
||
int n;
|
||
char *result;
|
||
|
||
n = WideCharToMultiByte (CP_UTF8, 0, string, -1, NULL, 0, NULL, NULL);
|
||
if (n < 0)
|
||
{
|
||
errno = EINVAL;
|
||
return NULL;
|
||
}
|
||
|
||
result = xtrymalloc (n+1);
|
||
if (!result)
|
||
return NULL;
|
||
|
||
n = WideCharToMultiByte (CP_UTF8, 0, string, -1, result, n, NULL, NULL);
|
||
if (n < 0)
|
||
{
|
||
xfree (result);
|
||
errno = EINVAL;
|
||
result = NULL;
|
||
}
|
||
return result;
|
||
}
|
||
|
||
|
||
/* Return a malloced wide char string from an UTF-8 encoded input
|
||
string STRING. Caller must free this value. Returns NULL and sets
|
||
ERRNO on failure. Calling this function with STRING set to NULL is
|
||
not defined. */
|
||
wchar_t *
|
||
utf8_to_wchar (const char *string)
|
||
{
|
||
int n;
|
||
size_t nbytes;
|
||
wchar_t *result;
|
||
|
||
n = MultiByteToWideChar (CP_UTF8, 0, string, -1, NULL, 0);
|
||
if (n < 0)
|
||
{
|
||
errno = EINVAL;
|
||
return NULL;
|
||
}
|
||
|
||
nbytes = (size_t)(n+1) * sizeof(*result);
|
||
if (nbytes / sizeof(*result) != (n+1))
|
||
{
|
||
errno = ENOMEM;
|
||
return NULL;
|
||
}
|
||
result = xtrymalloc (nbytes);
|
||
if (!result)
|
||
return NULL;
|
||
|
||
n = MultiByteToWideChar (CP_UTF8, 0, string, -1, result, n);
|
||
if (n < 0)
|
||
{
|
||
free (result);
|
||
errno = EINVAL;
|
||
result = NULL;
|
||
}
|
||
return result;
|
||
}
|
||
#endif /*HAVE_W32_SYSTEM*/
|