diff options
author | jbj <devnull@localhost> | 2001-10-20 20:28:56 +0000 |
---|---|---|
committer | jbj <devnull@localhost> | 2001-10-20 20:28:56 +0000 |
commit | 00a348f332021405f90b86748fe209bf1e820830 (patch) | |
tree | a8e8a82a88fca8e1d1129d043e19b644fa028726 /rpmio/tring.c | |
parent | d589b29c7fd3fa9c77f4ba6810fe8654cf67e2a1 (diff) | |
download | librpm-tizen-00a348f332021405f90b86748fe209bf1e820830.tar.gz librpm-tizen-00a348f332021405f90b86748fe209bf1e820830.tar.bz2 librpm-tizen-00a348f332021405f90b86748fe209bf1e820830.zip |
- add :base64 and :armor format extensions, dump binary tags in hex.
- proof-of-concept pubkey retrieval from RPM-{PGP,GPG}-KEY.
CVS patchset: 5126
CVS date: 2001/10/20 20:28:56
Diffstat (limited to 'rpmio/tring.c')
-rw-r--r-- | rpmio/tring.c | 215 |
1 files changed, 215 insertions, 0 deletions
diff --git a/rpmio/tring.c b/rpmio/tring.c new file mode 100644 index 000000000..8a231d244 --- /dev/null +++ b/rpmio/tring.c @@ -0,0 +1,215 @@ +#include "system.h" +#include "rpmio_internal.h" +#include "misc.h" +#include "popt.h" +#include "debug.h" + +static int rpmSlurp(const char * fn, const byte ** bp, ssize_t * blenp) +{ + static ssize_t blenmax = (8 * BUFSIZ); + ssize_t blen = 0; + byte * b = NULL; + ssize_t size; + FD_t fd; + int rc = 0; + + fd = Fopen(fn, "r.ufdio"); + if (fd == NULL || Ferror(fd)) { + rc = 2; + goto exit; + } + + size = fdSize(fd); + blen = (size >= 0 ? size : blenmax); + if (blen) { + int nb; + b = xmalloc(blen+1); + b[0] = '\0'; + nb = Fread(b, sizeof(*b), blen, fd); + if (Ferror(fd) || (size > 0 && nb != blen)) { + rc = 1; + goto exit; + } + if (blen == blenmax && nb < blen) { + blen = nb; + b = xrealloc(b, blen+1); + } + b[blen] = '\0'; + } + +exit: + if (fd) (void) Fclose(fd); + + if (rc) { + if (b) free(b); + b = NULL; + blen = 0; + } + + if (bp) *bp = b; + else if (b) free(b); + + if (blenp) *blenp = blen; + + return rc; +} + +static int rpmReadPgpPkt(const char * fn, const byte ** pkt, size_t * pktlen) +{ + const byte * b = NULL; + ssize_t blen; + const char * enc = NULL; + const char * crcenc = NULL; + byte * dec; + byte * crcdec; + size_t declen; + size_t crclen; + uint32 crcpkt, crc; + const char * armortype = NULL; + char * t, * te; + int pstate = 0; + int ec = 1; /* XXX assume failure */ + int rc; + + rc = rpmSlurp(fn, &b, &blen); + if (rc || b == NULL || blen <= 0) + goto exit; + + if (pgpIsPkt(b)) { + ec = 0; + goto exit; + } + +#define TOKEQ(_s, _tok) (!strncmp((_s), (_tok), sizeof(_tok)-1)) + + for (t = (char *)b; t && *t; t = te) { + if ((te = strchr(t, '\n')) == NULL) + te = t + strlen(t); + else + te++; + + switch (pstate) { + case 0: + armortype = NULL; + if (!TOKEQ(t, "-----BEGIN PGP ")) + continue; + t += sizeof("-----BEGIN PGP ")-1; + + rc = pgpValTok(pgpArmorTbl, t, te); + if (rc < 0) + goto exit; + armortype = t; + + t = te - (sizeof("-----\n")-1); + if (!TOKEQ(t, "-----\n")) + continue; + *t = '\0'; + pstate++; + break; + case 1: + enc = NULL; + rc = pgpValTok(pgpArmorKeyTbl, t, te); + if (rc >= 0) + continue; + if (*t != '\n') { + pstate = 0; + continue; + } + enc = te; /* Start of encoded packets */ + pstate++; + break; + case 2: + crcenc = NULL; + if (*t != '=') + continue; + *t++ = '\0'; /* Terminate encoded packets */ + crcenc = t; /* Start of encoded crc */ + pstate++; + break; + case 3: + pstate = 0; + if (!TOKEQ(t, "-----END PGP ")) + goto exit; + *t = '\0'; /* Terminate encoded crc */ + t += sizeof("-----END PGP ")-1; + + if (armortype == NULL) /* XXX can't happen */ + continue; + rc = strncmp(t, armortype, strlen(armortype)); + if (rc) + continue; + + t = te - (sizeof("-----\n")-1); + if (!TOKEQ(t, "-----\n")) + goto exit; + + if (b64decode(crcenc, (void **)&crcdec, &crclen) != 0) + continue; + crcpkt = pgpGrab(crcdec, crclen); + free(crcdec); + if (b64decode(enc, (void **)&dec, &declen) != 0) + goto exit; + crc = pgpCRC(dec, declen); + if (crcpkt != crc) + goto exit; + free((void *)b); + b = dec; + blen = declen; + ec = 0; + goto exit; + /*@notreached@*/ break; + } + } + +exit: + if (ec == 0 && pkt) + *pkt = b; + else if (b != NULL) + free((void *)b); + if (pktlen) + *pktlen = blen; + return rc; +} + +static int printing = 0; +static int _debug = 0; + +static struct poptOption optionsTable[] = { + { "print", 'p', POPT_ARG_VAL, &printing, 1, NULL, NULL }, + { "noprint", 'n', POPT_ARG_VAL, &printing, 0, NULL, NULL }, + { "debug", 'd', POPT_ARG_VAL, &_debug, -1, NULL, NULL }, + POPT_AUTOHELP + POPT_TABLEEND +}; + +int +main (int argc, const char *argv[]) +{ + poptContext optCon = poptGetContext(argv[0], argc, argv, optionsTable, 0); + rpmDigest dig; + const byte * pkt = NULL; + ssize_t pktlen; + const char ** args; + const char * fn; + int rc = 0; + + while ((rc = poptGetNextOpt(optCon)) > 0) + ; + + if ((args = poptGetArgs(optCon)) != NULL) + while ((fn = *args++) != NULL) { + rc = rpmReadPgpPkt(fn, &pkt, &pktlen); + if (rc || pkt == NULL || pktlen <= 0) + continue; + +fprintf(stderr, "===================== %s\n", fn); + dig = xcalloc(1, sizeof(*dig)); + (void) pgpPrtPkts(pkt, pktlen, dig, printing); + free((void *)pkt); + pkt = NULL; + free((void *)dig); + dig = NULL; + } + + return rc; +} |