mirror of
https://github.com/AGWA/git-crypt.git
synced 2026-01-08 19:33:33 -08:00
Merge branch 'revamp' into 'master'
Conflicts: Makefile
This commit is contained in:
18
Makefile
18
Makefile
@@ -1,14 +1,26 @@
|
||||
CXX := c++
|
||||
CXXFLAGS := -Wall -pedantic -Wno-long-long -O2
|
||||
LDFLAGS := -lcrypto
|
||||
LDFLAGS :=
|
||||
PREFIX := /usr/local
|
||||
|
||||
OBJFILES = git-crypt.o commands.o crypto.o util.o
|
||||
OBJFILES = \
|
||||
git-crypt.o \
|
||||
commands.o \
|
||||
crypto.o \
|
||||
gpg.o \
|
||||
key.o \
|
||||
util.o \
|
||||
parse_options.o
|
||||
|
||||
OBJFILES += crypto-openssl.o
|
||||
LDFLAGS += -lcrypto
|
||||
|
||||
all: git-crypt
|
||||
|
||||
git-crypt: $(OBJFILES)
|
||||
$(CXX) $(CXXFLAGS) -o $@ $^ $(LDFLAGS)
|
||||
$(CXX) $(CXXFLAGS) -o $@ $(OBJFILES) $(LDFLAGS)
|
||||
|
||||
util.o: util.cpp util-unix.cpp util-win32.cpp
|
||||
|
||||
clean:
|
||||
rm -f *.o git-crypt
|
||||
|
||||
1203
commands.cpp
1203
commands.cpp
File diff suppressed because it is too large
Load Diff
29
commands.hpp
29
commands.hpp
@@ -1,5 +1,5 @@
|
||||
/*
|
||||
* Copyright 2012 Andrew Ayer
|
||||
* Copyright 2012, 2014 Andrew Ayer
|
||||
*
|
||||
* This file is part of git-crypt.
|
||||
*
|
||||
@@ -31,12 +31,29 @@
|
||||
#ifndef GIT_CRYPT_COMMANDS_HPP
|
||||
#define GIT_CRYPT_COMMANDS_HPP
|
||||
|
||||
#include <string>
|
||||
|
||||
void clean (const char* keyfile);
|
||||
void smudge (const char* keyfile);
|
||||
void diff (const char* keyfile, const char* filename);
|
||||
void init (const char* argv0, const char* keyfile);
|
||||
void keygen (const char* keyfile);
|
||||
struct Error {
|
||||
std::string message;
|
||||
|
||||
explicit Error (std::string m) : message(m) { }
|
||||
};
|
||||
|
||||
// Plumbing commands:
|
||||
int clean (int argc, const char** argv);
|
||||
int smudge (int argc, const char** argv);
|
||||
int diff (int argc, const char** argv);
|
||||
// Public commands:
|
||||
int init (int argc, const char** argv);
|
||||
int unlock (int argc, const char** argv);
|
||||
int add_gpg_key (int argc, const char** argv);
|
||||
int rm_gpg_key (int argc, const char** argv);
|
||||
int ls_gpg_keys (int argc, const char** argv);
|
||||
int export_key (int argc, const char** argv);
|
||||
int keygen (int argc, const char** argv);
|
||||
int migrate_key (int argc, const char** argv);
|
||||
int refresh (int argc, const char** argv);
|
||||
int status (int argc, const char** argv);
|
||||
|
||||
#endif
|
||||
|
||||
|
||||
115
crypto-openssl.cpp
Normal file
115
crypto-openssl.cpp
Normal file
@@ -0,0 +1,115 @@
|
||||
/*
|
||||
* Copyright 2012, 2014 Andrew Ayer
|
||||
*
|
||||
* This file is part of git-crypt.
|
||||
*
|
||||
* git-crypt is free software: you can redistribute it and/or modify
|
||||
* it under the terms of the GNU General Public License as published by
|
||||
* the Free Software Foundation, either version 3 of the License, or
|
||||
* (at your option) any later version.
|
||||
*
|
||||
* git-crypt is distributed in the hope that it will be useful,
|
||||
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
* GNU General Public License for more details.
|
||||
*
|
||||
* You should have received a copy of the GNU General Public License
|
||||
* along with git-crypt. If not, see <http://www.gnu.org/licenses/>.
|
||||
*
|
||||
* Additional permission under GNU GPL version 3 section 7:
|
||||
*
|
||||
* If you modify the Program, or any covered work, by linking or
|
||||
* combining it with the OpenSSL project's OpenSSL library (or a
|
||||
* modified version of that library), containing parts covered by the
|
||||
* terms of the OpenSSL or SSLeay licenses, the licensors of the Program
|
||||
* grant you additional permission to convey the resulting work.
|
||||
* Corresponding Source for a non-source form of such a combination
|
||||
* shall include the source code for the parts of OpenSSL used as well
|
||||
* as that of the covered work.
|
||||
*/
|
||||
|
||||
#include "crypto.hpp"
|
||||
#include "key.hpp"
|
||||
#include "util.hpp"
|
||||
#include <openssl/aes.h>
|
||||
#include <openssl/sha.h>
|
||||
#include <openssl/hmac.h>
|
||||
#include <openssl/evp.h>
|
||||
#include <openssl/rand.h>
|
||||
#include <openssl/err.h>
|
||||
#include <sstream>
|
||||
#include <cstring>
|
||||
|
||||
void init_crypto ()
|
||||
{
|
||||
ERR_load_crypto_strings();
|
||||
}
|
||||
|
||||
struct Aes_ecb_encryptor::Aes_impl {
|
||||
AES_KEY key;
|
||||
};
|
||||
|
||||
Aes_ecb_encryptor::Aes_ecb_encryptor (const unsigned char* raw_key)
|
||||
: impl(new Aes_impl)
|
||||
{
|
||||
if (AES_set_encrypt_key(raw_key, KEY_LEN * 8, &(impl->key)) != 0) {
|
||||
throw Crypto_error("Aes_ctr_encryptor::Aes_ctr_encryptor", "AES_set_encrypt_key failed");
|
||||
}
|
||||
}
|
||||
|
||||
Aes_ecb_encryptor::~Aes_ecb_encryptor ()
|
||||
{
|
||||
// Note: Explicit destructor necessary because class contains an auto_ptr
|
||||
// which contains an incomplete type when the auto_ptr is declared.
|
||||
|
||||
explicit_memset(&impl->key, '\0', sizeof(impl->key));
|
||||
}
|
||||
|
||||
void Aes_ecb_encryptor::encrypt(const unsigned char* plain, unsigned char* cipher)
|
||||
{
|
||||
AES_encrypt(plain, cipher, &(impl->key));
|
||||
}
|
||||
|
||||
struct Hmac_sha1_state::Hmac_impl {
|
||||
HMAC_CTX ctx;
|
||||
};
|
||||
|
||||
Hmac_sha1_state::Hmac_sha1_state (const unsigned char* key, size_t key_len)
|
||||
: impl(new Hmac_impl)
|
||||
{
|
||||
HMAC_Init(&(impl->ctx), key, key_len, EVP_sha1());
|
||||
}
|
||||
|
||||
Hmac_sha1_state::~Hmac_sha1_state ()
|
||||
{
|
||||
// Note: Explicit destructor necessary because class contains an auto_ptr
|
||||
// which contains an incomplete type when the auto_ptr is declared.
|
||||
|
||||
HMAC_cleanup(&(impl->ctx));
|
||||
}
|
||||
|
||||
void Hmac_sha1_state::add (const unsigned char* buffer, size_t buffer_len)
|
||||
{
|
||||
HMAC_Update(&(impl->ctx), buffer, buffer_len);
|
||||
}
|
||||
|
||||
void Hmac_sha1_state::get (unsigned char* digest)
|
||||
{
|
||||
unsigned int len;
|
||||
HMAC_Final(&(impl->ctx), digest, &len);
|
||||
}
|
||||
|
||||
|
||||
void random_bytes (unsigned char* buffer, size_t len)
|
||||
{
|
||||
if (RAND_bytes(buffer, len) != 1) {
|
||||
std::ostringstream message;
|
||||
while (unsigned long code = ERR_get_error()) {
|
||||
char error_string[120];
|
||||
ERR_error_string_n(code, error_string, sizeof(error_string));
|
||||
message << "OpenSSL Error: " << error_string << "; ";
|
||||
}
|
||||
throw Crypto_error("random_bytes", message.str());
|
||||
}
|
||||
}
|
||||
|
||||
106
crypto.cpp
106
crypto.cpp
@@ -1,5 +1,5 @@
|
||||
/*
|
||||
* Copyright 2012 Andrew Ayer
|
||||
* Copyright 2012, 2014 Andrew Ayer
|
||||
*
|
||||
* This file is part of git-crypt.
|
||||
*
|
||||
@@ -28,102 +28,54 @@
|
||||
* as that of the covered work.
|
||||
*/
|
||||
|
||||
#define _BSD_SOURCE
|
||||
#include "crypto.hpp"
|
||||
#include <openssl/aes.h>
|
||||
#include <openssl/sha.h>
|
||||
#include <openssl/hmac.h>
|
||||
#include <openssl/evp.h>
|
||||
#include <fstream>
|
||||
#include <iostream>
|
||||
#include "util.hpp"
|
||||
#include <cstring>
|
||||
#include <cstdlib>
|
||||
#include <arpa/inet.h>
|
||||
|
||||
void load_keys (const char* filepath, keys_t* keys)
|
||||
Aes_ctr_encryptor::Aes_ctr_encryptor (const unsigned char* raw_key, const unsigned char* nonce)
|
||||
: ecb(raw_key)
|
||||
{
|
||||
std::ifstream file(filepath);
|
||||
if (!file) {
|
||||
perror(filepath);
|
||||
std::exit(1);
|
||||
}
|
||||
char buffer[AES_KEY_BITS/8 + HMAC_KEY_LEN];
|
||||
file.read(buffer, sizeof(buffer));
|
||||
if (file.gcount() != sizeof(buffer)) {
|
||||
std::clog << filepath << ": Premature end of key file\n";
|
||||
std::exit(1);
|
||||
}
|
||||
|
||||
// First comes the AES encryption key
|
||||
if (AES_set_encrypt_key(reinterpret_cast<uint8_t*>(buffer), AES_KEY_BITS, &keys->enc) != 0) {
|
||||
std::clog << filepath << ": Failed to initialize AES encryption key\n";
|
||||
std::exit(1);
|
||||
}
|
||||
|
||||
// Then it's the HMAC key
|
||||
memcpy(keys->hmac, buffer + AES_KEY_BITS/8, HMAC_KEY_LEN);
|
||||
}
|
||||
|
||||
|
||||
aes_ctr_state::aes_ctr_state (const uint8_t* arg_nonce, size_t arg_nonce_len)
|
||||
{
|
||||
memset(nonce, '\0', sizeof(nonce));
|
||||
memcpy(nonce, arg_nonce, std::min(arg_nonce_len, sizeof(nonce)));
|
||||
// Set first 12 bytes of the CTR value to the nonce.
|
||||
// This stays the same for the entirety of this object's lifetime.
|
||||
std::memcpy(ctr_value, nonce, NONCE_LEN);
|
||||
byte_counter = 0;
|
||||
memset(otp, '\0', sizeof(otp));
|
||||
}
|
||||
|
||||
void aes_ctr_state::process (const AES_KEY* key, const uint8_t* in, uint8_t* out, size_t len)
|
||||
Aes_ctr_encryptor::~Aes_ctr_encryptor ()
|
||||
{
|
||||
explicit_memset(pad, '\0', BLOCK_LEN);
|
||||
}
|
||||
|
||||
void Aes_ctr_encryptor::process (const unsigned char* in, unsigned char* out, size_t len)
|
||||
{
|
||||
for (size_t i = 0; i < len; ++i) {
|
||||
if (byte_counter % 16 == 0) {
|
||||
// Generate a new OTP
|
||||
// CTR value:
|
||||
// first 12 bytes - nonce
|
||||
// last 4 bytes - block number (sequentially increasing with each block)
|
||||
uint8_t ctr[16];
|
||||
uint32_t blockno = htonl(byte_counter / 16);
|
||||
memcpy(ctr, nonce, 12);
|
||||
memcpy(ctr + 12, &blockno, 4);
|
||||
AES_encrypt(ctr, otp, key);
|
||||
if (byte_counter % BLOCK_LEN == 0) {
|
||||
// Set last 4 bytes of CTR to the (big-endian) block number (sequentially increasing with each block)
|
||||
store_be32(ctr_value + NONCE_LEN, byte_counter / BLOCK_LEN);
|
||||
|
||||
// Generate a new pad
|
||||
ecb.encrypt(ctr_value, pad);
|
||||
}
|
||||
|
||||
// encrypt one byte
|
||||
out[i] = in[i] ^ otp[byte_counter++ % 16];
|
||||
out[i] = in[i] ^ pad[byte_counter++ % BLOCK_LEN];
|
||||
|
||||
if (byte_counter == 0) {
|
||||
throw Crypto_error("Aes_ctr_encryptor::process", "Too much data to encrypt securely");
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
hmac_sha1_state::hmac_sha1_state (const uint8_t* key, size_t key_len)
|
||||
{
|
||||
HMAC_Init(&ctx, key, key_len, EVP_sha1());
|
||||
}
|
||||
|
||||
hmac_sha1_state::~hmac_sha1_state ()
|
||||
{
|
||||
HMAC_cleanup(&ctx);
|
||||
}
|
||||
|
||||
void hmac_sha1_state::add (const uint8_t* buffer, size_t buffer_len)
|
||||
{
|
||||
HMAC_Update(&ctx, buffer, buffer_len);
|
||||
}
|
||||
|
||||
void hmac_sha1_state::get (uint8_t* digest)
|
||||
{
|
||||
unsigned int len;
|
||||
HMAC_Final(&ctx, digest, &len);
|
||||
}
|
||||
|
||||
|
||||
// Encrypt/decrypt an entire input stream, writing to the given output stream
|
||||
void process_stream (std::istream& in, std::ostream& out, const AES_KEY* enc_key, const uint8_t* nonce)
|
||||
void Aes_ctr_encryptor::process_stream (std::istream& in, std::ostream& out, const unsigned char* key, const unsigned char* nonce)
|
||||
{
|
||||
aes_ctr_state state(nonce, 12);
|
||||
Aes_ctr_encryptor aes(key, nonce);
|
||||
|
||||
uint8_t buffer[1024];
|
||||
unsigned char buffer[1024];
|
||||
while (in) {
|
||||
in.read(reinterpret_cast<char*>(buffer), sizeof(buffer));
|
||||
state.process(enc_key, buffer, buffer, in.gcount());
|
||||
aes.process(buffer, buffer, in.gcount());
|
||||
out.write(reinterpret_cast<char*>(buffer), in.gcount());
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
100
crypto.hpp
100
crypto.hpp
@@ -1,5 +1,5 @@
|
||||
/*
|
||||
* Copyright 2012 Andrew Ayer
|
||||
* Copyright 2012, 2014 Andrew Ayer
|
||||
*
|
||||
* This file is part of git-crypt.
|
||||
*
|
||||
@@ -31,53 +31,87 @@
|
||||
#ifndef GIT_CRYPT_CRYPTO_HPP
|
||||
#define GIT_CRYPT_CRYPTO_HPP
|
||||
|
||||
#include <openssl/aes.h>
|
||||
#include <openssl/hmac.h>
|
||||
#include "key.hpp"
|
||||
#include <stdint.h>
|
||||
#include <stddef.h>
|
||||
#include <iosfwd>
|
||||
#include <string>
|
||||
#include <memory>
|
||||
|
||||
enum {
|
||||
SHA1_LEN = 20,
|
||||
NONCE_LEN = 12,
|
||||
HMAC_KEY_LEN = 64,
|
||||
AES_KEY_BITS = 256,
|
||||
MAX_CRYPT_BYTES = (1ULL<<32)*16 // Don't encrypt more than this or the CTR value will repeat itself
|
||||
void init_crypto ();
|
||||
|
||||
struct Crypto_error {
|
||||
std::string where;
|
||||
std::string message;
|
||||
|
||||
Crypto_error (const std::string& w, const std::string& m) : where(w), message(m) { }
|
||||
};
|
||||
|
||||
struct keys_t {
|
||||
AES_KEY enc;
|
||||
uint8_t hmac[HMAC_KEY_LEN];
|
||||
};
|
||||
void load_keys (const char* filepath, keys_t* keys);
|
||||
class Aes_ecb_encryptor {
|
||||
public:
|
||||
enum {
|
||||
KEY_LEN = AES_KEY_LEN,
|
||||
BLOCK_LEN = 16
|
||||
};
|
||||
|
||||
class aes_ctr_state {
|
||||
char nonce[NONCE_LEN];// First 96 bits of counter
|
||||
uint32_t byte_counter; // How many bytes processed so far?
|
||||
uint8_t otp[16]; // The current OTP that's in use
|
||||
private:
|
||||
struct Aes_impl;
|
||||
|
||||
std::auto_ptr<Aes_impl> impl;
|
||||
|
||||
public:
|
||||
aes_ctr_state (const uint8_t* arg_nonce, size_t arg_nonce_len);
|
||||
|
||||
void process (const AES_KEY* key, const uint8_t* in, uint8_t* out, size_t len);
|
||||
Aes_ecb_encryptor (const unsigned char* key);
|
||||
~Aes_ecb_encryptor ();
|
||||
void encrypt (const unsigned char* plain, unsigned char* cipher);
|
||||
};
|
||||
|
||||
class hmac_sha1_state {
|
||||
HMAC_CTX ctx;
|
||||
|
||||
// disallow copy/assignment:
|
||||
hmac_sha1_state (const hmac_sha1_state&) { }
|
||||
hmac_sha1_state& operator= (const hmac_sha1_state&) { return *this; }
|
||||
class Aes_ctr_encryptor {
|
||||
public:
|
||||
hmac_sha1_state (const uint8_t* key, size_t key_len);
|
||||
~hmac_sha1_state ();
|
||||
enum {
|
||||
NONCE_LEN = 12,
|
||||
KEY_LEN = AES_KEY_LEN,
|
||||
BLOCK_LEN = 16,
|
||||
MAX_CRYPT_BYTES = (1ULL<<32)*16 // Don't encrypt more than this or the CTR value will repeat itself
|
||||
};
|
||||
|
||||
void add (const uint8_t* buffer, size_t buffer_len);
|
||||
void get (uint8_t*);
|
||||
private:
|
||||
Aes_ecb_encryptor ecb;
|
||||
unsigned char ctr_value[BLOCK_LEN]; // Current CTR value (used as input to AES to derive pad)
|
||||
unsigned char pad[BLOCK_LEN]; // Current encryption pad (output of AES)
|
||||
uint32_t byte_counter; // How many bytes processed so far?
|
||||
|
||||
public:
|
||||
Aes_ctr_encryptor (const unsigned char* key, const unsigned char* nonce);
|
||||
~Aes_ctr_encryptor ();
|
||||
|
||||
void process (const unsigned char* in, unsigned char* out, size_t len);
|
||||
|
||||
// Encrypt/decrypt an entire input stream, writing to the given output stream
|
||||
static void process_stream (std::istream& in, std::ostream& out, const unsigned char* key, const unsigned char* nonce);
|
||||
};
|
||||
|
||||
// Encrypt/decrypt an entire input stream, writing to the given output stream
|
||||
void process_stream (std::istream& in, std::ostream& out, const AES_KEY* enc_key, const uint8_t* nonce);
|
||||
typedef Aes_ctr_encryptor Aes_ctr_decryptor;
|
||||
|
||||
class Hmac_sha1_state {
|
||||
public:
|
||||
enum {
|
||||
LEN = 20,
|
||||
KEY_LEN = HMAC_KEY_LEN
|
||||
};
|
||||
|
||||
private:
|
||||
struct Hmac_impl;
|
||||
|
||||
std::auto_ptr<Hmac_impl> impl;
|
||||
|
||||
public:
|
||||
Hmac_sha1_state (const unsigned char* key, size_t key_len);
|
||||
~Hmac_sha1_state ();
|
||||
|
||||
void add (const unsigned char* buffer, size_t buffer_len);
|
||||
void get (unsigned char*);
|
||||
};
|
||||
|
||||
void random_bytes (unsigned char*, size_t);
|
||||
|
||||
#endif
|
||||
|
||||
183
git-crypt.cpp
183
git-crypt.cpp
@@ -1,5 +1,5 @@
|
||||
/*
|
||||
* Copyright 2012 Andrew Ayer
|
||||
* Copyright 2012, 2014 Andrew Ayer
|
||||
*
|
||||
* This file is part of git-crypt.
|
||||
*
|
||||
@@ -28,59 +28,172 @@
|
||||
* as that of the covered work.
|
||||
*/
|
||||
|
||||
#include "git-crypt.hpp"
|
||||
#include "commands.hpp"
|
||||
#include "util.hpp"
|
||||
#include "crypto.hpp"
|
||||
#include "key.hpp"
|
||||
#include "gpg.hpp"
|
||||
#include "parse_options.hpp"
|
||||
#include <cstring>
|
||||
#include <unistd.h>
|
||||
#include <iostream>
|
||||
#include <openssl/err.h>
|
||||
#include <string.h>
|
||||
|
||||
static void print_usage (const char* argv0)
|
||||
const char* argv0;
|
||||
|
||||
static void print_usage (std::ostream& out)
|
||||
{
|
||||
std::clog << "Usage: " << argv0 << " COMMAND [ARGS ...]\n";
|
||||
std::clog << "\n";
|
||||
std::clog << "Valid commands:\n";
|
||||
std::clog << " init KEYFILE - prepare the current git repo to use git-crypt with this key\n";
|
||||
std::clog << " keygen KEYFILE - generate a git-crypt key in the given file\n";
|
||||
std::clog << "\n";
|
||||
std::clog << "Plumbing commands (not to be used directly):\n";
|
||||
std::clog << " clean KEYFILE\n";
|
||||
std::clog << " smudge KEYFILE\n";
|
||||
std::clog << " diff KEYFILE FILE\n";
|
||||
out << "Usage: " << argv0 << " COMMAND [ARGS ...]" << std::endl;
|
||||
out << std::endl;
|
||||
// |--------------------------------------------------------------------------------| 80 characters
|
||||
out << "Common commands:" << std::endl;
|
||||
out << " init generate a key and prepare repo to use git-crypt" << std::endl;
|
||||
out << " status display which files are encrypted" << std::endl;
|
||||
//out << " refresh ensure all files in the repo are properly decrypted" << std::endl;
|
||||
out << std::endl;
|
||||
out << "GPG commands:" << std::endl;
|
||||
out << " add-gpg-key KEYID add the user with the given GPG key ID as a collaborator" << std::endl;
|
||||
//out << " rm-gpg-key KEYID revoke collaborator status from the given GPG key ID" << std::endl;
|
||||
//out << " ls-gpg-keys list the GPG key IDs of collaborators" << std::endl;
|
||||
out << " unlock decrypt this repo using the in-repo GPG-encrypted key" << std::endl;
|
||||
out << std::endl;
|
||||
out << "Symmetric key commands:" << std::endl;
|
||||
out << " export-key FILE export this repo's symmetric key to the given file" << std::endl;
|
||||
out << " unlock KEYFILE decrypt this repo using the given symmetric key" << std::endl;
|
||||
out << std::endl;
|
||||
out << "Legacy commands:" << std::endl;
|
||||
out << " init KEYFILE alias for 'unlock KEYFILE'" << std::endl;
|
||||
out << " keygen KEYFILE generate a git-crypt key in the given file" << std::endl;
|
||||
out << " migrate-key FILE migrate the given legacy key file to the latest format" << std::endl;
|
||||
/*
|
||||
out << std::endl;
|
||||
out << "Plumbing commands (not to be used directly):" << std::endl;
|
||||
out << " clean [LEGACY-KEYFILE]" << std::endl;
|
||||
out << " smudge [LEGACY-KEYFILE]" << std::endl;
|
||||
out << " diff [LEGACY-KEYFILE] FILE" << std::endl;
|
||||
*/
|
||||
/*
|
||||
out << std::endl;
|
||||
out << "See 'git-crypt help COMMAND' for more information on a specific command." << std::endl;
|
||||
*/
|
||||
}
|
||||
|
||||
|
||||
int main (int argc, const char** argv)
|
||||
try {
|
||||
// The following two lines are essential for achieving good performance:
|
||||
std::ios_base::sync_with_stdio(false);
|
||||
std::cin.tie(0);
|
||||
argv0 = argv[0];
|
||||
|
||||
std::cin.exceptions(std::ios_base::badbit);
|
||||
std::cout.exceptions(std::ios_base::badbit);
|
||||
/*
|
||||
* General initialization
|
||||
*/
|
||||
|
||||
if (argc < 3) {
|
||||
print_usage(argv[0]);
|
||||
init_std_streams();
|
||||
init_crypto();
|
||||
|
||||
/*
|
||||
* Parse command line arguments
|
||||
*/
|
||||
int arg_index = 1;
|
||||
while (arg_index < argc && argv[arg_index][0] == '-') {
|
||||
if (std::strcmp(argv[arg_index], "--help") == 0) {
|
||||
print_usage(std::clog);
|
||||
return 0;
|
||||
} else if (std::strcmp(argv[arg_index], "--") == 0) {
|
||||
++arg_index;
|
||||
break;
|
||||
} else {
|
||||
std::clog << argv0 << ": " << argv[arg_index] << ": Unknown option" << std::endl;
|
||||
print_usage(std::clog);
|
||||
return 2;
|
||||
}
|
||||
}
|
||||
|
||||
argc -= arg_index;
|
||||
argv += arg_index;
|
||||
|
||||
if (argc == 0) {
|
||||
print_usage(std::clog);
|
||||
return 2;
|
||||
}
|
||||
|
||||
ERR_load_crypto_strings();
|
||||
/*
|
||||
* Pass off to command handler
|
||||
*/
|
||||
const char* command = argv[0];
|
||||
--argc;
|
||||
++argv;
|
||||
|
||||
if (strcmp(argv[1], "init") == 0 && argc == 3) {
|
||||
init(argv[0], argv[2]);
|
||||
} else if (strcmp(argv[1], "keygen") == 0 && argc == 3) {
|
||||
keygen(argv[2]);
|
||||
} else if (strcmp(argv[1], "clean") == 0 && argc == 3) {
|
||||
clean(argv[2]);
|
||||
} else if (strcmp(argv[1], "smudge") == 0 && argc == 3) {
|
||||
smudge(argv[2]);
|
||||
} else if (strcmp(argv[1], "diff") == 0 && argc == 4) {
|
||||
diff(argv[2], argv[3]);
|
||||
} else {
|
||||
print_usage(argv[0]);
|
||||
return 2;
|
||||
// Public commands:
|
||||
if (std::strcmp(command, "help") == 0) {
|
||||
print_usage(std::clog);
|
||||
return 0;
|
||||
}
|
||||
if (std::strcmp(command, "init") == 0) {
|
||||
return init(argc, argv);
|
||||
}
|
||||
if (std::strcmp(command, "unlock") == 0) {
|
||||
return unlock(argc, argv);
|
||||
}
|
||||
if (std::strcmp(command, "add-gpg-key") == 0) {
|
||||
return add_gpg_key(argc, argv);
|
||||
}
|
||||
if (std::strcmp(command, "rm-gpg-key") == 0) {
|
||||
return rm_gpg_key(argc, argv);
|
||||
}
|
||||
if (std::strcmp(command, "ls-gpg-keys") == 0) {
|
||||
return ls_gpg_keys(argc, argv);
|
||||
}
|
||||
if (std::strcmp(command, "export-key") == 0) {
|
||||
return export_key(argc, argv);
|
||||
}
|
||||
if (std::strcmp(command, "keygen") == 0) {
|
||||
return keygen(argc, argv);
|
||||
}
|
||||
if (std::strcmp(command, "migrate-key") == 0) {
|
||||
return migrate_key(argc, argv);
|
||||
}
|
||||
if (std::strcmp(command, "refresh") == 0) {
|
||||
return refresh(argc, argv);
|
||||
}
|
||||
if (std::strcmp(command, "status") == 0) {
|
||||
return status(argc, argv);
|
||||
}
|
||||
// Plumbing commands (executed by git, not by user):
|
||||
if (std::strcmp(command, "clean") == 0) {
|
||||
return clean(argc, argv);
|
||||
}
|
||||
if (std::strcmp(command, "smudge") == 0) {
|
||||
return smudge(argc, argv);
|
||||
}
|
||||
if (std::strcmp(command, "diff") == 0) {
|
||||
return diff(argc, argv);
|
||||
}
|
||||
|
||||
return 0;
|
||||
print_usage(std::clog);
|
||||
return 2;
|
||||
|
||||
} catch (const Error& e) {
|
||||
std::cerr << "git-crypt: Error: " << e.message << std::endl;
|
||||
return 1;
|
||||
} catch (const Gpg_error& e) {
|
||||
std::cerr << "git-crypt: GPG error: " << e.message << std::endl;
|
||||
return 1;
|
||||
} catch (const System_error& e) {
|
||||
std::cerr << "git-crypt: System error: " << e.message() << std::endl;
|
||||
return 1;
|
||||
} catch (const Crypto_error& e) {
|
||||
std::cerr << "git-crypt: Crypto error: " << e.where << ": " << e.message << std::endl;
|
||||
return 1;
|
||||
} catch (const Option_error& e) {
|
||||
std::cerr << "git-crypt: Error: " << e.option_name << ": " << e.message << std::endl;
|
||||
return 1;
|
||||
} catch (Key_file::Incompatible) {
|
||||
std::cerr << "git-crypt: This repository contains a incompatible key file. Please upgrade git-crypt." << std::endl;
|
||||
return 1;
|
||||
} catch (Key_file::Malformed) {
|
||||
std::cerr << "git-crypt: This repository contains a malformed key file. It may be corrupted." << std::endl;
|
||||
return 1;
|
||||
} catch (const std::ios_base::failure& e) {
|
||||
std::cerr << "git-crypt: I/O error: " << e.what() << std::endl;
|
||||
return 1;
|
||||
|
||||
36
git-crypt.hpp
Normal file
36
git-crypt.hpp
Normal file
@@ -0,0 +1,36 @@
|
||||
/*
|
||||
* Copyright 2014 Andrew Ayer
|
||||
*
|
||||
* This file is part of git-crypt.
|
||||
*
|
||||
* git-crypt is free software: you can redistribute it and/or modify
|
||||
* it under the terms of the GNU General Public License as published by
|
||||
* the Free Software Foundation, either version 3 of the License, or
|
||||
* (at your option) any later version.
|
||||
*
|
||||
* git-crypt is distributed in the hope that it will be useful,
|
||||
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
* GNU General Public License for more details.
|
||||
*
|
||||
* You should have received a copy of the GNU General Public License
|
||||
* along with git-crypt. If not, see <http://www.gnu.org/licenses/>.
|
||||
*
|
||||
* Additional permission under GNU GPL version 3 section 7:
|
||||
*
|
||||
* If you modify the Program, or any covered work, by linking or
|
||||
* combining it with the OpenSSL project's OpenSSL library (or a
|
||||
* modified version of that library), containing parts covered by the
|
||||
* terms of the OpenSSL or SSLeay licenses, the licensors of the Program
|
||||
* grant you additional permission to convey the resulting work.
|
||||
* Corresponding Source for a non-source form of such a combination
|
||||
* shall include the source code for the parts of OpenSSL used as well
|
||||
* as that of the covered work.
|
||||
*/
|
||||
|
||||
#ifndef GIT_CRYPT_GIT_CRYPT_HPP
|
||||
#define GIT_CRYPT_GIT_CRYPT_HPP
|
||||
|
||||
extern const char* argv0; // initialized in main() to argv[0]
|
||||
|
||||
#endif
|
||||
176
gpg.cpp
Normal file
176
gpg.cpp
Normal file
@@ -0,0 +1,176 @@
|
||||
/*
|
||||
* Copyright 2014 Andrew Ayer
|
||||
*
|
||||
* This file is part of git-crypt.
|
||||
*
|
||||
* git-crypt is free software: you can redistribute it and/or modify
|
||||
* it under the terms of the GNU General Public License as published by
|
||||
* the Free Software Foundation, either version 3 of the License, or
|
||||
* (at your option) any later version.
|
||||
*
|
||||
* git-crypt is distributed in the hope that it will be useful,
|
||||
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
* GNU General Public License for more details.
|
||||
*
|
||||
* You should have received a copy of the GNU General Public License
|
||||
* along with git-crypt. If not, see <http://www.gnu.org/licenses/>.
|
||||
*
|
||||
* Additional permission under GNU GPL version 3 section 7:
|
||||
*
|
||||
* If you modify the Program, or any covered work, by linking or
|
||||
* combining it with the OpenSSL project's OpenSSL library (or a
|
||||
* modified version of that library), containing parts covered by the
|
||||
* terms of the OpenSSL or SSLeay licenses, the licensors of the Program
|
||||
* grant you additional permission to convey the resulting work.
|
||||
* Corresponding Source for a non-source form of such a combination
|
||||
* shall include the source code for the parts of OpenSSL used as well
|
||||
* as that of the covered work.
|
||||
*/
|
||||
|
||||
#include "gpg.hpp"
|
||||
#include "util.hpp"
|
||||
#include <sstream>
|
||||
|
||||
static std::string gpg_nth_column (const std::string& line, unsigned int col)
|
||||
{
|
||||
std::string::size_type pos = 0;
|
||||
|
||||
for (unsigned int i = 0; i < col; ++i) {
|
||||
pos = line.find_first_of(':', pos);
|
||||
if (pos == std::string::npos) {
|
||||
throw Gpg_error("Malformed output from gpg");
|
||||
}
|
||||
pos = pos + 1;
|
||||
}
|
||||
|
||||
const std::string::size_type end_pos = line.find_first_of(':', pos);
|
||||
|
||||
return end_pos != std::string::npos ?
|
||||
line.substr(pos, end_pos - pos) :
|
||||
line.substr(pos);
|
||||
}
|
||||
|
||||
// given a key fingerprint, return the last 8 nibbles
|
||||
std::string gpg_shorten_fingerprint (const std::string& fingerprint)
|
||||
{
|
||||
return fingerprint.size() == 40 ? fingerprint.substr(32) : fingerprint;
|
||||
}
|
||||
|
||||
// given a key fingerprint, return the key's UID (e.g. "John Smith <jsmith@example.com>")
|
||||
std::string gpg_get_uid (const std::string& fingerprint)
|
||||
{
|
||||
// gpg --batch --with-colons --fixed-list-mode --list-keys 0x7A399B2DB06D039020CD1CE1D0F3702D61489532
|
||||
std::vector<std::string> command;
|
||||
command.push_back("gpg");
|
||||
command.push_back("--batch");
|
||||
command.push_back("--with-colons");
|
||||
command.push_back("--fixed-list-mode");
|
||||
command.push_back("--list-keys");
|
||||
command.push_back("0x" + fingerprint);
|
||||
std::stringstream command_output;
|
||||
if (!successful_exit(exec_command(command, command_output))) {
|
||||
// This could happen if the keyring does not contain a public key with this fingerprint
|
||||
return "";
|
||||
}
|
||||
|
||||
while (command_output.peek() != -1) {
|
||||
std::string line;
|
||||
std::getline(command_output, line);
|
||||
if (line.substr(0, 4) == "uid:") {
|
||||
// uid:u::::1395975462::AB97D6E3E5D8789988CA55E5F77D9E7397D05229::John Smith <jsmith@example.com>:
|
||||
// want the 9th column (counting from 0)
|
||||
return gpg_nth_column(line, 9);
|
||||
}
|
||||
}
|
||||
|
||||
return "";
|
||||
}
|
||||
|
||||
// return a list of fingerprints of public keys matching the given search query (such as jsmith@example.com)
|
||||
std::vector<std::string> gpg_lookup_key (const std::string& query)
|
||||
{
|
||||
std::vector<std::string> fingerprints;
|
||||
|
||||
// gpg --batch --with-colons --fingerprint --list-keys jsmith@example.com
|
||||
std::vector<std::string> command;
|
||||
command.push_back("gpg");
|
||||
command.push_back("--batch");
|
||||
command.push_back("--with-colons");
|
||||
command.push_back("--fingerprint");
|
||||
command.push_back("--list-keys");
|
||||
command.push_back(query);
|
||||
std::stringstream command_output;
|
||||
if (successful_exit(exec_command(command, command_output))) {
|
||||
while (command_output.peek() != -1) {
|
||||
std::string line;
|
||||
std::getline(command_output, line);
|
||||
if (line.substr(0, 4) == "fpr:") {
|
||||
// fpr:::::::::7A399B2DB06D039020CD1CE1D0F3702D61489532:
|
||||
// want the 9th column (counting from 0)
|
||||
fingerprints.push_back(gpg_nth_column(line, 9));
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
return fingerprints;
|
||||
}
|
||||
|
||||
std::vector<std::string> gpg_list_secret_keys ()
|
||||
{
|
||||
// gpg --batch --with-colons --list-secret-keys --fingerprint
|
||||
std::vector<std::string> command;
|
||||
command.push_back("gpg");
|
||||
command.push_back("--batch");
|
||||
command.push_back("--with-colons");
|
||||
command.push_back("--list-secret-keys");
|
||||
command.push_back("--fingerprint");
|
||||
std::stringstream command_output;
|
||||
if (!successful_exit(exec_command(command, command_output))) {
|
||||
throw Gpg_error("gpg --list-secret-keys failed");
|
||||
}
|
||||
|
||||
std::vector<std::string> secret_keys;
|
||||
|
||||
while (command_output.peek() != -1) {
|
||||
std::string line;
|
||||
std::getline(command_output, line);
|
||||
if (line.substr(0, 4) == "fpr:") {
|
||||
// fpr:::::::::7A399B2DB06D039020CD1CE1D0F3702D61489532:
|
||||
// want the 9th column (counting from 0)
|
||||
secret_keys.push_back(gpg_nth_column(line, 9));
|
||||
}
|
||||
}
|
||||
|
||||
return secret_keys;
|
||||
}
|
||||
|
||||
void gpg_encrypt_to_file (const std::string& filename, const std::string& recipient_fingerprint, const char* p, size_t len)
|
||||
{
|
||||
// gpg --batch -o FILENAME -r RECIPIENT -e
|
||||
std::vector<std::string> command;
|
||||
command.push_back("gpg");
|
||||
command.push_back("--batch");
|
||||
command.push_back("-o");
|
||||
command.push_back(filename);
|
||||
command.push_back("-r");
|
||||
command.push_back("0x" + recipient_fingerprint);
|
||||
command.push_back("-e");
|
||||
if (!successful_exit(exec_command_with_input(command, p, len))) {
|
||||
throw Gpg_error("Failed to encrypt");
|
||||
}
|
||||
}
|
||||
|
||||
void gpg_decrypt_from_file (const std::string& filename, std::ostream& output)
|
||||
{
|
||||
// gpg -q -d FILENAME
|
||||
std::vector<std::string> command;
|
||||
command.push_back("gpg");
|
||||
command.push_back("-q");
|
||||
command.push_back("-d");
|
||||
command.push_back(filename);
|
||||
if (!successful_exit(exec_command(command, output))) {
|
||||
throw Gpg_error("Failed to decrypt");
|
||||
}
|
||||
}
|
||||
|
||||
51
gpg.hpp
Normal file
51
gpg.hpp
Normal file
@@ -0,0 +1,51 @@
|
||||
/*
|
||||
* Copyright 2014 Andrew Ayer
|
||||
*
|
||||
* This file is part of git-crypt.
|
||||
*
|
||||
* git-crypt is free software: you can redistribute it and/or modify
|
||||
* it under the terms of the GNU General Public License as published by
|
||||
* the Free Software Foundation, either version 3 of the License, or
|
||||
* (at your option) any later version.
|
||||
*
|
||||
* git-crypt is distributed in the hope that it will be useful,
|
||||
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
* GNU General Public License for more details.
|
||||
*
|
||||
* You should have received a copy of the GNU General Public License
|
||||
* along with git-crypt. If not, see <http://www.gnu.org/licenses/>.
|
||||
*
|
||||
* Additional permission under GNU GPL version 3 section 7:
|
||||
*
|
||||
* If you modify the Program, or any covered work, by linking or
|
||||
* combining it with the OpenSSL project's OpenSSL library (or a
|
||||
* modified version of that library), containing parts covered by the
|
||||
* terms of the OpenSSL or SSLeay licenses, the licensors of the Program
|
||||
* grant you additional permission to convey the resulting work.
|
||||
* Corresponding Source for a non-source form of such a combination
|
||||
* shall include the source code for the parts of OpenSSL used as well
|
||||
* as that of the covered work.
|
||||
*/
|
||||
|
||||
#ifndef GIT_CRYPT_GPG_HPP
|
||||
#define GIT_CRYPT_GPG_HPP
|
||||
|
||||
#include <string>
|
||||
#include <vector>
|
||||
#include <cstddef>
|
||||
|
||||
struct Gpg_error {
|
||||
std::string message;
|
||||
|
||||
explicit Gpg_error (std::string m) : message(m) { }
|
||||
};
|
||||
|
||||
std::string gpg_shorten_fingerprint (const std::string& fingerprint);
|
||||
std::string gpg_get_uid (const std::string& fingerprint);
|
||||
std::vector<std::string> gpg_lookup_key (const std::string& query);
|
||||
std::vector<std::string> gpg_list_secret_keys ();
|
||||
void gpg_encrypt_to_file (const std::string& filename, const std::string& recipient_fingerprint, const char* p, size_t len);
|
||||
void gpg_decrypt_from_file (const std::string& filename, std::ostream&);
|
||||
|
||||
#endif
|
||||
336
key.cpp
Normal file
336
key.cpp
Normal file
@@ -0,0 +1,336 @@
|
||||
/*
|
||||
* Copyright 2014 Andrew Ayer
|
||||
*
|
||||
* This file is part of git-crypt.
|
||||
*
|
||||
* git-crypt is free software: you can redistribute it and/or modify
|
||||
* it under the terms of the GNU General Public License as published by
|
||||
* the Free Software Foundation, either version 3 of the License, or
|
||||
* (at your option) any later version.
|
||||
*
|
||||
* git-crypt is distributed in the hope that it will be useful,
|
||||
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
* GNU General Public License for more details.
|
||||
*
|
||||
* You should have received a copy of the GNU General Public License
|
||||
* along with git-crypt. If not, see <http://www.gnu.org/licenses/>.
|
||||
*
|
||||
* Additional permission under GNU GPL version 3 section 7:
|
||||
*
|
||||
* If you modify the Program, or any covered work, by linking or
|
||||
* combining it with the OpenSSL project's OpenSSL library (or a
|
||||
* modified version of that library), containing parts covered by the
|
||||
* terms of the OpenSSL or SSLeay licenses, the licensors of the Program
|
||||
* grant you additional permission to convey the resulting work.
|
||||
* Corresponding Source for a non-source form of such a combination
|
||||
* shall include the source code for the parts of OpenSSL used as well
|
||||
* as that of the covered work.
|
||||
*/
|
||||
|
||||
#include "key.hpp"
|
||||
#include "util.hpp"
|
||||
#include "crypto.hpp"
|
||||
#include <sys/types.h>
|
||||
#include <sys/stat.h>
|
||||
#include <stdint.h>
|
||||
#include <fstream>
|
||||
#include <istream>
|
||||
#include <ostream>
|
||||
#include <sstream>
|
||||
#include <cstring>
|
||||
#include <stdexcept>
|
||||
#include <vector>
|
||||
|
||||
Key_file::Entry::Entry ()
|
||||
{
|
||||
version = 0;
|
||||
explicit_memset(aes_key, 0, AES_KEY_LEN);
|
||||
explicit_memset(hmac_key, 0, HMAC_KEY_LEN);
|
||||
}
|
||||
|
||||
void Key_file::Entry::load (std::istream& in)
|
||||
{
|
||||
while (true) {
|
||||
uint32_t field_id;
|
||||
if (!read_be32(in, field_id)) {
|
||||
throw Malformed();
|
||||
}
|
||||
if (field_id == KEY_FIELD_END) {
|
||||
break;
|
||||
}
|
||||
uint32_t field_len;
|
||||
if (!read_be32(in, field_len)) {
|
||||
throw Malformed();
|
||||
}
|
||||
|
||||
if (field_id == KEY_FIELD_VERSION) {
|
||||
if (field_len != 4) {
|
||||
throw Malformed();
|
||||
}
|
||||
if (!read_be32(in, version)) {
|
||||
throw Malformed();
|
||||
}
|
||||
} else if (field_id == KEY_FIELD_AES_KEY) {
|
||||
if (field_len != AES_KEY_LEN) {
|
||||
throw Malformed();
|
||||
}
|
||||
in.read(reinterpret_cast<char*>(aes_key), AES_KEY_LEN);
|
||||
if (in.gcount() != AES_KEY_LEN) {
|
||||
throw Malformed();
|
||||
}
|
||||
} else if (field_id == KEY_FIELD_HMAC_KEY) {
|
||||
if (field_len != HMAC_KEY_LEN) {
|
||||
throw Malformed();
|
||||
}
|
||||
in.read(reinterpret_cast<char*>(hmac_key), HMAC_KEY_LEN);
|
||||
if (in.gcount() != HMAC_KEY_LEN) {
|
||||
throw Malformed();
|
||||
}
|
||||
} else if (field_id & 1) { // unknown critical field
|
||||
throw Incompatible();
|
||||
} else {
|
||||
// unknown non-critical field - safe to ignore
|
||||
if (field_len > MAX_FIELD_LEN) {
|
||||
throw Malformed();
|
||||
}
|
||||
in.ignore(field_len);
|
||||
if (in.gcount() != static_cast<std::streamsize>(field_len)) {
|
||||
throw Malformed();
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
void Key_file::Entry::load_legacy (uint32_t arg_version, std::istream& in)
|
||||
{
|
||||
version = arg_version;
|
||||
|
||||
// First comes the AES key
|
||||
in.read(reinterpret_cast<char*>(aes_key), AES_KEY_LEN);
|
||||
if (in.gcount() != AES_KEY_LEN) {
|
||||
throw Malformed();
|
||||
}
|
||||
|
||||
// Then the HMAC key
|
||||
in.read(reinterpret_cast<char*>(hmac_key), HMAC_KEY_LEN);
|
||||
if (in.gcount() != HMAC_KEY_LEN) {
|
||||
throw Malformed();
|
||||
}
|
||||
|
||||
if (in.peek() != -1) {
|
||||
// Trailing data is a good indication that we are not actually reading a
|
||||
// legacy key file. (This is important to check since legacy key files
|
||||
// did not have any sort of file header.)
|
||||
throw Malformed();
|
||||
}
|
||||
}
|
||||
|
||||
void Key_file::Entry::store (std::ostream& out) const
|
||||
{
|
||||
// Version
|
||||
write_be32(out, KEY_FIELD_VERSION);
|
||||
write_be32(out, 4);
|
||||
write_be32(out, version);
|
||||
|
||||
// AES key
|
||||
write_be32(out, KEY_FIELD_AES_KEY);
|
||||
write_be32(out, AES_KEY_LEN);
|
||||
out.write(reinterpret_cast<const char*>(aes_key), AES_KEY_LEN);
|
||||
|
||||
// HMAC key
|
||||
write_be32(out, KEY_FIELD_HMAC_KEY);
|
||||
write_be32(out, HMAC_KEY_LEN);
|
||||
out.write(reinterpret_cast<const char*>(hmac_key), HMAC_KEY_LEN);
|
||||
|
||||
// End
|
||||
write_be32(out, KEY_FIELD_END);
|
||||
}
|
||||
|
||||
void Key_file::Entry::generate (uint32_t arg_version)
|
||||
{
|
||||
version = arg_version;
|
||||
random_bytes(aes_key, AES_KEY_LEN);
|
||||
random_bytes(hmac_key, HMAC_KEY_LEN);
|
||||
}
|
||||
|
||||
const Key_file::Entry* Key_file::get_latest () const
|
||||
{
|
||||
return is_filled() ? get(latest()) : 0;
|
||||
}
|
||||
|
||||
const Key_file::Entry* Key_file::get (uint32_t version) const
|
||||
{
|
||||
Map::const_iterator it(entries.find(version));
|
||||
return it != entries.end() ? &it->second : 0;
|
||||
}
|
||||
|
||||
void Key_file::add (const Entry& entry)
|
||||
{
|
||||
entries[entry.version] = entry;
|
||||
}
|
||||
|
||||
|
||||
void Key_file::load_legacy (std::istream& in)
|
||||
{
|
||||
entries[0].load_legacy(0, in);
|
||||
}
|
||||
|
||||
void Key_file::load (std::istream& in)
|
||||
{
|
||||
unsigned char preamble[16];
|
||||
in.read(reinterpret_cast<char*>(preamble), 16);
|
||||
if (in.gcount() != 16) {
|
||||
throw Malformed();
|
||||
}
|
||||
if (std::memcmp(preamble, "\0GITCRYPTKEY", 12) != 0) {
|
||||
throw Malformed();
|
||||
}
|
||||
if (load_be32(preamble + 12) != FORMAT_VERSION) {
|
||||
throw Incompatible();
|
||||
}
|
||||
load_header(in);
|
||||
while (in.peek() != -1) {
|
||||
Entry entry;
|
||||
entry.load(in);
|
||||
add(entry);
|
||||
}
|
||||
}
|
||||
|
||||
void Key_file::load_header (std::istream& in)
|
||||
{
|
||||
while (true) {
|
||||
uint32_t field_id;
|
||||
if (!read_be32(in, field_id)) {
|
||||
throw Malformed();
|
||||
}
|
||||
if (field_id == HEADER_FIELD_END) {
|
||||
break;
|
||||
}
|
||||
uint32_t field_len;
|
||||
if (!read_be32(in, field_len)) {
|
||||
throw Malformed();
|
||||
}
|
||||
|
||||
if (field_id == HEADER_FIELD_KEY_NAME) {
|
||||
if (field_len > KEY_NAME_MAX_LEN) {
|
||||
throw Malformed();
|
||||
}
|
||||
if (field_len == 0) {
|
||||
// special case field_len==0 to avoid possible undefined behavior
|
||||
// edge cases with an empty std::vector (particularly, &bytes[0]).
|
||||
key_name.clear();
|
||||
} else {
|
||||
std::vector<char> bytes(field_len);
|
||||
in.read(&bytes[0], field_len);
|
||||
if (in.gcount() != static_cast<std::streamsize>(field_len)) {
|
||||
throw Malformed();
|
||||
}
|
||||
key_name.assign(&bytes[0], field_len);
|
||||
}
|
||||
if (!validate_key_name(key_name.c_str())) {
|
||||
key_name.clear();
|
||||
throw Malformed();
|
||||
}
|
||||
} else if (field_id & 1) { // unknown critical field
|
||||
throw Incompatible();
|
||||
} else {
|
||||
// unknown non-critical field - safe to ignore
|
||||
if (field_len > MAX_FIELD_LEN) {
|
||||
throw Malformed();
|
||||
}
|
||||
in.ignore(field_len);
|
||||
if (in.gcount() != static_cast<std::streamsize>(field_len)) {
|
||||
throw Malformed();
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
void Key_file::store (std::ostream& out) const
|
||||
{
|
||||
out.write("\0GITCRYPTKEY", 12);
|
||||
write_be32(out, FORMAT_VERSION);
|
||||
if (!key_name.empty()) {
|
||||
write_be32(out, HEADER_FIELD_KEY_NAME);
|
||||
write_be32(out, key_name.size());
|
||||
out.write(key_name.data(), key_name.size());
|
||||
}
|
||||
write_be32(out, HEADER_FIELD_END);
|
||||
for (Map::const_iterator it(entries.begin()); it != entries.end(); ++it) {
|
||||
it->second.store(out);
|
||||
}
|
||||
}
|
||||
|
||||
bool Key_file::load_from_file (const char* key_file_name)
|
||||
{
|
||||
std::ifstream key_file_in(key_file_name, std::fstream::binary);
|
||||
if (!key_file_in) {
|
||||
return false;
|
||||
}
|
||||
load(key_file_in);
|
||||
return true;
|
||||
}
|
||||
|
||||
bool Key_file::store_to_file (const char* key_file_name) const
|
||||
{
|
||||
create_protected_file(key_file_name);
|
||||
std::ofstream key_file_out(key_file_name, std::fstream::binary);
|
||||
if (!key_file_out) {
|
||||
return false;
|
||||
}
|
||||
store(key_file_out);
|
||||
key_file_out.close();
|
||||
if (!key_file_out) {
|
||||
return false;
|
||||
}
|
||||
return true;
|
||||
}
|
||||
|
||||
std::string Key_file::store_to_string () const
|
||||
{
|
||||
std::ostringstream ss;
|
||||
store(ss);
|
||||
return ss.str();
|
||||
}
|
||||
|
||||
void Key_file::generate ()
|
||||
{
|
||||
uint32_t version(is_empty() ? 0 : latest() + 1);
|
||||
entries[version].generate(version);
|
||||
}
|
||||
|
||||
uint32_t Key_file::latest () const
|
||||
{
|
||||
if (is_empty()) {
|
||||
throw std::invalid_argument("Key_file::latest");
|
||||
}
|
||||
return entries.begin()->first;
|
||||
}
|
||||
|
||||
bool validate_key_name (const char* key_name, std::string* reason)
|
||||
{
|
||||
if (!*key_name) {
|
||||
if (reason) { *reason = "Key name may not be empty"; }
|
||||
return false;
|
||||
}
|
||||
|
||||
if (std::strcmp(key_name, "default") == 0) {
|
||||
if (reason) { *reason = "`default' is not a legal key name"; }
|
||||
return false;
|
||||
}
|
||||
// Need to be restrictive with key names because they're used as part of a Git filter name
|
||||
size_t len = 0;
|
||||
while (char c = *key_name++) {
|
||||
if (!std::isalnum(c) && c != '-' && c != '_') {
|
||||
if (reason) { *reason = "Key names may contain only A-Z, a-z, 0-9, '-', and '_'"; }
|
||||
return false;
|
||||
}
|
||||
if (++len > KEY_NAME_MAX_LEN) {
|
||||
if (reason) { *reason = "Key name is too long"; }
|
||||
return false;
|
||||
}
|
||||
}
|
||||
return true;
|
||||
}
|
||||
|
||||
116
key.hpp
Normal file
116
key.hpp
Normal file
@@ -0,0 +1,116 @@
|
||||
/*
|
||||
* Copyright 2014 Andrew Ayer
|
||||
*
|
||||
* This file is part of git-crypt.
|
||||
*
|
||||
* git-crypt is free software: you can redistribute it and/or modify
|
||||
* it under the terms of the GNU General Public License as published by
|
||||
* the Free Software Foundation, either version 3 of the License, or
|
||||
* (at your option) any later version.
|
||||
*
|
||||
* git-crypt is distributed in the hope that it will be useful,
|
||||
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
* GNU General Public License for more details.
|
||||
*
|
||||
* You should have received a copy of the GNU General Public License
|
||||
* along with git-crypt. If not, see <http://www.gnu.org/licenses/>.
|
||||
*
|
||||
* Additional permission under GNU GPL version 3 section 7:
|
||||
*
|
||||
* If you modify the Program, or any covered work, by linking or
|
||||
* combining it with the OpenSSL project's OpenSSL library (or a
|
||||
* modified version of that library), containing parts covered by the
|
||||
* terms of the OpenSSL or SSLeay licenses, the licensors of the Program
|
||||
* grant you additional permission to convey the resulting work.
|
||||
* Corresponding Source for a non-source form of such a combination
|
||||
* shall include the source code for the parts of OpenSSL used as well
|
||||
* as that of the covered work.
|
||||
*/
|
||||
|
||||
#ifndef GIT_CRYPT_KEY_HPP
|
||||
#define GIT_CRYPT_KEY_HPP
|
||||
|
||||
#include <map>
|
||||
#include <functional>
|
||||
#include <stdint.h>
|
||||
#include <iosfwd>
|
||||
#include <string>
|
||||
|
||||
enum {
|
||||
HMAC_KEY_LEN = 64,
|
||||
AES_KEY_LEN = 32
|
||||
};
|
||||
|
||||
struct Key_file {
|
||||
public:
|
||||
struct Entry {
|
||||
uint32_t version;
|
||||
unsigned char aes_key[AES_KEY_LEN];
|
||||
unsigned char hmac_key[HMAC_KEY_LEN];
|
||||
|
||||
Entry ();
|
||||
|
||||
void load (std::istream&);
|
||||
void load_legacy (uint32_t version, std::istream&);
|
||||
void store (std::ostream&) const;
|
||||
void generate (uint32_t version);
|
||||
};
|
||||
|
||||
struct Malformed { }; // exception class
|
||||
struct Incompatible { }; // exception class
|
||||
|
||||
const Entry* get_latest () const;
|
||||
|
||||
const Entry* get (uint32_t version) const;
|
||||
void add (const Entry&);
|
||||
|
||||
void load_legacy (std::istream&);
|
||||
void load (std::istream&);
|
||||
void store (std::ostream&) const;
|
||||
|
||||
bool load_from_file (const char* filename);
|
||||
bool store_to_file (const char* filename) const;
|
||||
|
||||
std::string store_to_string () const;
|
||||
|
||||
void generate ();
|
||||
|
||||
bool is_empty () const { return entries.empty(); }
|
||||
bool is_filled () const { return !is_empty(); }
|
||||
|
||||
uint32_t latest () const;
|
||||
|
||||
void set_key_name (const char* k) { key_name = k ? k : ""; }
|
||||
const char* get_key_name () const { return key_name.empty() ? 0 : key_name.c_str(); }
|
||||
private:
|
||||
typedef std::map<uint32_t, Entry, std::greater<uint32_t> > Map;
|
||||
enum { FORMAT_VERSION = 2 };
|
||||
|
||||
Map entries;
|
||||
std::string key_name;
|
||||
|
||||
void load_header (std::istream&);
|
||||
|
||||
enum {
|
||||
HEADER_FIELD_END = 0,
|
||||
HEADER_FIELD_KEY_NAME = 1
|
||||
};
|
||||
enum {
|
||||
KEY_FIELD_END = 0,
|
||||
KEY_FIELD_VERSION = 1,
|
||||
KEY_FIELD_AES_KEY = 3,
|
||||
KEY_FIELD_HMAC_KEY = 5
|
||||
};
|
||||
enum {
|
||||
MAX_FIELD_LEN = 1<<20
|
||||
};
|
||||
};
|
||||
|
||||
enum {
|
||||
KEY_NAME_MAX_LEN = 128
|
||||
};
|
||||
|
||||
bool validate_key_name (const char* key_name, std::string* reason =0);
|
||||
|
||||
#endif
|
||||
118
parse_options.cpp
Normal file
118
parse_options.cpp
Normal file
@@ -0,0 +1,118 @@
|
||||
/*
|
||||
* Copyright 2014 Andrew Ayer
|
||||
*
|
||||
* This file is part of git-crypt.
|
||||
*
|
||||
* git-crypt is free software: you can redistribute it and/or modify
|
||||
* it under the terms of the GNU General Public License as published by
|
||||
* the Free Software Foundation, either version 3 of the License, or
|
||||
* (at your option) any later version.
|
||||
*
|
||||
* git-crypt is distributed in the hope that it will be useful,
|
||||
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
* GNU General Public License for more details.
|
||||
*
|
||||
* You should have received a copy of the GNU General Public License
|
||||
* along with git-crypt. If not, see <http://www.gnu.org/licenses/>.
|
||||
*
|
||||
* Additional permission under GNU GPL version 3 section 7:
|
||||
*
|
||||
* If you modify the Program, or any covered work, by linking or
|
||||
* combining it with the OpenSSL project's OpenSSL library (or a
|
||||
* modified version of that library), containing parts covered by the
|
||||
* terms of the OpenSSL or SSLeay licenses, the licensors of the Program
|
||||
* grant you additional permission to convey the resulting work.
|
||||
* Corresponding Source for a non-source form of such a combination
|
||||
* shall include the source code for the parts of OpenSSL used as well
|
||||
* as that of the covered work.
|
||||
*/
|
||||
|
||||
#include "parse_options.hpp"
|
||||
#include <cstring>
|
||||
|
||||
|
||||
static const Option_def* find_option (const Options_list& options, const std::string& name)
|
||||
{
|
||||
for (Options_list::const_iterator opt(options.begin()); opt != options.end(); ++opt) {
|
||||
if (opt->name == name) {
|
||||
return &*opt;
|
||||
}
|
||||
}
|
||||
return 0;
|
||||
}
|
||||
|
||||
int parse_options (const Options_list& options, int argc, const char** argv)
|
||||
{
|
||||
int argi = 0;
|
||||
|
||||
while (argi < argc && argv[argi][0] == '-') {
|
||||
if (std::strcmp(argv[argi], "--") == 0) {
|
||||
++argi;
|
||||
break;
|
||||
} else if (std::strncmp(argv[argi], "--", 2) == 0) {
|
||||
std::string option_name;
|
||||
const char* option_value = 0;
|
||||
if (const char* eq = std::strchr(argv[argi], '=')) {
|
||||
option_name.assign(argv[argi], eq);
|
||||
option_value = eq + 1;
|
||||
} else {
|
||||
option_name = argv[argi];
|
||||
}
|
||||
++argi;
|
||||
|
||||
const Option_def* opt(find_option(options, option_name));
|
||||
if (!opt) {
|
||||
throw Option_error(option_name, "Invalid option");
|
||||
}
|
||||
|
||||
if (opt->is_set) {
|
||||
*opt->is_set = true;
|
||||
}
|
||||
if (opt->value) {
|
||||
if (option_value) {
|
||||
*opt->value = option_value;
|
||||
} else {
|
||||
if (argi >= argc) {
|
||||
throw Option_error(option_name, "Option requires a value");
|
||||
}
|
||||
*opt->value = argv[argi];
|
||||
++argi;
|
||||
}
|
||||
} else {
|
||||
if (option_value) {
|
||||
throw Option_error(option_name, "Option takes no value");
|
||||
}
|
||||
}
|
||||
} else {
|
||||
const char* arg = argv[argi] + 1;
|
||||
++argi;
|
||||
while (*arg) {
|
||||
std::string option_name("-");
|
||||
option_name.push_back(*arg);
|
||||
++arg;
|
||||
|
||||
const Option_def* opt(find_option(options, option_name));
|
||||
if (!opt) {
|
||||
throw Option_error(option_name, "Invalid option");
|
||||
}
|
||||
if (opt->is_set) {
|
||||
*opt->is_set = true;
|
||||
}
|
||||
if (opt->value) {
|
||||
if (*arg) {
|
||||
*opt->value = arg;
|
||||
} else {
|
||||
if (argi >= argc) {
|
||||
throw Option_error(option_name, "Option requires a value");
|
||||
}
|
||||
*opt->value = argv[argi];
|
||||
++argi;
|
||||
}
|
||||
break;
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
return argi;
|
||||
}
|
||||
60
parse_options.hpp
Normal file
60
parse_options.hpp
Normal file
@@ -0,0 +1,60 @@
|
||||
/*
|
||||
* Copyright 2014 Andrew Ayer
|
||||
*
|
||||
* This file is part of git-crypt.
|
||||
*
|
||||
* git-crypt is free software: you can redistribute it and/or modify
|
||||
* it under the terms of the GNU General Public License as published by
|
||||
* the Free Software Foundation, either version 3 of the License, or
|
||||
* (at your option) any later version.
|
||||
*
|
||||
* git-crypt is distributed in the hope that it will be useful,
|
||||
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
* GNU General Public License for more details.
|
||||
*
|
||||
* You should have received a copy of the GNU General Public License
|
||||
* along with git-crypt. If not, see <http://www.gnu.org/licenses/>.
|
||||
*
|
||||
* Additional permission under GNU GPL version 3 section 7:
|
||||
*
|
||||
* If you modify the Program, or any covered work, by linking or
|
||||
* combining it with the OpenSSL project's OpenSSL library (or a
|
||||
* modified version of that library), containing parts covered by the
|
||||
* terms of the OpenSSL or SSLeay licenses, the licensors of the Program
|
||||
* grant you additional permission to convey the resulting work.
|
||||
* Corresponding Source for a non-source form of such a combination
|
||||
* shall include the source code for the parts of OpenSSL used as well
|
||||
* as that of the covered work.
|
||||
*/
|
||||
|
||||
#ifndef PARSE_OPTIONS_HPP
|
||||
#define PARSE_OPTIONS_HPP
|
||||
|
||||
#include <string>
|
||||
#include <vector>
|
||||
|
||||
struct Option_def {
|
||||
std::string name;
|
||||
bool* is_set;
|
||||
const char** value;
|
||||
|
||||
Option_def () : is_set(0), value(0) { }
|
||||
Option_def (const std::string& arg_name, bool* arg_is_set)
|
||||
: name(arg_name), is_set(arg_is_set), value(0) { }
|
||||
Option_def (const std::string& arg_name, const char** arg_value)
|
||||
: name(arg_name), is_set(0), value(arg_value) { }
|
||||
};
|
||||
|
||||
typedef std::vector<Option_def> Options_list;
|
||||
|
||||
int parse_options (const Options_list& options, int argc, const char** argv);
|
||||
|
||||
struct Option_error {
|
||||
std::string option_name;
|
||||
std::string message;
|
||||
|
||||
Option_error (const std::string& n, const std::string& m) : option_name(n), message(m) { }
|
||||
};
|
||||
|
||||
#endif
|
||||
327
util-unix.cpp
Normal file
327
util-unix.cpp
Normal file
@@ -0,0 +1,327 @@
|
||||
/*
|
||||
* Copyright 2012, 2014 Andrew Ayer
|
||||
*
|
||||
* This file is part of git-crypt.
|
||||
*
|
||||
* git-crypt is free software: you can redistribute it and/or modify
|
||||
* it under the terms of the GNU General Public License as published by
|
||||
* the Free Software Foundation, either version 3 of the License, or
|
||||
* (at your option) any later version.
|
||||
*
|
||||
* git-crypt is distributed in the hope that it will be useful,
|
||||
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
* GNU General Public License for more details.
|
||||
*
|
||||
* You should have received a copy of the GNU General Public License
|
||||
* along with git-crypt. If not, see <http://www.gnu.org/licenses/>.
|
||||
*
|
||||
* Additional permission under GNU GPL version 3 section 7:
|
||||
*
|
||||
* If you modify the Program, or any covered work, by linking or
|
||||
* combining it with the OpenSSL project's OpenSSL library (or a
|
||||
* modified version of that library), containing parts covered by the
|
||||
* terms of the OpenSSL or SSLeay licenses, the licensors of the Program
|
||||
* grant you additional permission to convey the resulting work.
|
||||
* Corresponding Source for a non-source form of such a combination
|
||||
* shall include the source code for the parts of OpenSSL used as well
|
||||
* as that of the covered work.
|
||||
*/
|
||||
|
||||
#include <sys/stat.h>
|
||||
#include <sys/types.h>
|
||||
#include <sys/wait.h>
|
||||
#include <sys/time.h>
|
||||
#include <errno.h>
|
||||
#include <utime.h>
|
||||
#include <unistd.h>
|
||||
#include <stdio.h>
|
||||
#include <limits.h>
|
||||
#include <fcntl.h>
|
||||
#include <stdlib.h>
|
||||
#include <dirent.h>
|
||||
#include <vector>
|
||||
#include <string>
|
||||
#include <cstring>
|
||||
|
||||
std::string System_error::message () const
|
||||
{
|
||||
std::string mesg(action);
|
||||
if (!target.empty()) {
|
||||
mesg += ": ";
|
||||
mesg += target;
|
||||
}
|
||||
if (error) {
|
||||
mesg += ": ";
|
||||
mesg += strerror(error);
|
||||
}
|
||||
return mesg;
|
||||
}
|
||||
|
||||
void temp_fstream::open (std::ios_base::openmode mode)
|
||||
{
|
||||
close();
|
||||
|
||||
const char* tmpdir = getenv("TMPDIR");
|
||||
size_t tmpdir_len = tmpdir ? std::strlen(tmpdir) : 0;
|
||||
if (tmpdir_len == 0 || tmpdir_len > 4096) {
|
||||
// no $TMPDIR or it's excessively long => fall back to /tmp
|
||||
tmpdir = "/tmp";
|
||||
tmpdir_len = 4;
|
||||
}
|
||||
std::vector<char> path_buffer(tmpdir_len + 18);
|
||||
char* path = &path_buffer[0];
|
||||
std::strcpy(path, tmpdir);
|
||||
std::strcpy(path + tmpdir_len, "/git-crypt.XXXXXX");
|
||||
mode_t old_umask = umask(0077);
|
||||
int fd = mkstemp(path);
|
||||
if (fd == -1) {
|
||||
int mkstemp_errno = errno;
|
||||
umask(old_umask);
|
||||
throw System_error("mkstemp", "", mkstemp_errno);
|
||||
}
|
||||
umask(old_umask);
|
||||
std::fstream::open(path, mode);
|
||||
if (!std::fstream::is_open()) {
|
||||
unlink(path);
|
||||
::close(fd);
|
||||
throw System_error("std::fstream::open", path, 0);
|
||||
}
|
||||
unlink(path);
|
||||
::close(fd);
|
||||
}
|
||||
|
||||
void temp_fstream::close ()
|
||||
{
|
||||
if (std::fstream::is_open()) {
|
||||
std::fstream::close();
|
||||
}
|
||||
}
|
||||
|
||||
void mkdir_parent (const std::string& path)
|
||||
{
|
||||
std::string::size_type slash(path.find('/', 1));
|
||||
while (slash != std::string::npos) {
|
||||
std::string prefix(path.substr(0, slash));
|
||||
struct stat status;
|
||||
if (stat(prefix.c_str(), &status) == 0) {
|
||||
// already exists - make sure it's a directory
|
||||
if (!S_ISDIR(status.st_mode)) {
|
||||
throw System_error("mkdir_parent", prefix, ENOTDIR);
|
||||
}
|
||||
} else {
|
||||
if (errno != ENOENT) {
|
||||
throw System_error("mkdir_parent", prefix, errno);
|
||||
}
|
||||
// doesn't exist - mkdir it
|
||||
if (mkdir(prefix.c_str(), 0777) == -1) {
|
||||
throw System_error("mkdir", prefix, errno);
|
||||
}
|
||||
}
|
||||
|
||||
slash = path.find('/', slash + 1);
|
||||
}
|
||||
}
|
||||
|
||||
static std::string readlink (const char* pathname)
|
||||
{
|
||||
std::vector<char> buffer(64);
|
||||
ssize_t len;
|
||||
|
||||
while ((len = ::readlink(pathname, &buffer[0], buffer.size())) == static_cast<ssize_t>(buffer.size())) {
|
||||
// buffer may have been truncated - grow and try again
|
||||
buffer.resize(buffer.size() * 2);
|
||||
}
|
||||
if (len == -1) {
|
||||
throw System_error("readlink", pathname, errno);
|
||||
}
|
||||
|
||||
return std::string(buffer.begin(), buffer.begin() + len);
|
||||
}
|
||||
|
||||
std::string our_exe_path ()
|
||||
{
|
||||
try {
|
||||
return readlink("/proc/self/exe");
|
||||
} catch (const System_error&) {
|
||||
if (argv0[0] == '/') {
|
||||
// argv[0] starts with / => it's an absolute path
|
||||
return argv0;
|
||||
} else if (std::strchr(argv0, '/')) {
|
||||
// argv[0] contains / => it a relative path that should be resolved
|
||||
char* resolved_path_p = realpath(argv0, NULL);
|
||||
std::string resolved_path(resolved_path_p);
|
||||
free(resolved_path_p);
|
||||
return resolved_path;
|
||||
} else {
|
||||
// argv[0] is just a bare filename => not much we can do
|
||||
return argv0;
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
static int execvp (const std::string& file, const std::vector<std::string>& args)
|
||||
{
|
||||
std::vector<const char*> args_c_str;
|
||||
args_c_str.reserve(args.size());
|
||||
for (std::vector<std::string>::const_iterator arg(args.begin()); arg != args.end(); ++arg) {
|
||||
args_c_str.push_back(arg->c_str());
|
||||
}
|
||||
args_c_str.push_back(NULL);
|
||||
return execvp(file.c_str(), const_cast<char**>(&args_c_str[0]));
|
||||
}
|
||||
|
||||
int exec_command (const std::vector<std::string>& command)
|
||||
{
|
||||
pid_t child = fork();
|
||||
if (child == -1) {
|
||||
throw System_error("fork", "", errno);
|
||||
}
|
||||
if (child == 0) {
|
||||
execvp(command[0], command);
|
||||
perror(command[0].c_str());
|
||||
_exit(-1);
|
||||
}
|
||||
int status = 0;
|
||||
if (waitpid(child, &status, 0) == -1) {
|
||||
throw System_error("waitpid", "", errno);
|
||||
}
|
||||
return status;
|
||||
}
|
||||
|
||||
int exec_command (const std::vector<std::string>& command, std::ostream& output)
|
||||
{
|
||||
int pipefd[2];
|
||||
if (pipe(pipefd) == -1) {
|
||||
throw System_error("pipe", "", errno);
|
||||
}
|
||||
pid_t child = fork();
|
||||
if (child == -1) {
|
||||
int fork_errno = errno;
|
||||
close(pipefd[0]);
|
||||
close(pipefd[1]);
|
||||
throw System_error("fork", "", fork_errno);
|
||||
}
|
||||
if (child == 0) {
|
||||
close(pipefd[0]);
|
||||
if (pipefd[1] != 1) {
|
||||
dup2(pipefd[1], 1);
|
||||
close(pipefd[1]);
|
||||
}
|
||||
execvp(command[0], command);
|
||||
perror(command[0].c_str());
|
||||
_exit(-1);
|
||||
}
|
||||
close(pipefd[1]);
|
||||
char buffer[1024];
|
||||
ssize_t bytes_read;
|
||||
while ((bytes_read = read(pipefd[0], buffer, sizeof(buffer))) > 0) {
|
||||
output.write(buffer, bytes_read);
|
||||
}
|
||||
if (bytes_read == -1) {
|
||||
int read_errno = errno;
|
||||
close(pipefd[0]);
|
||||
throw System_error("read", "", read_errno);
|
||||
}
|
||||
close(pipefd[0]);
|
||||
int status = 0;
|
||||
if (waitpid(child, &status, 0) == -1) {
|
||||
throw System_error("waitpid", "", errno);
|
||||
}
|
||||
return status;
|
||||
}
|
||||
|
||||
int exec_command_with_input (const std::vector<std::string>& command, const char* p, size_t len)
|
||||
{
|
||||
int pipefd[2];
|
||||
if (pipe(pipefd) == -1) {
|
||||
throw System_error("pipe", "", errno);
|
||||
}
|
||||
pid_t child = fork();
|
||||
if (child == -1) {
|
||||
int fork_errno = errno;
|
||||
close(pipefd[0]);
|
||||
close(pipefd[1]);
|
||||
throw System_error("fork", "", fork_errno);
|
||||
}
|
||||
if (child == 0) {
|
||||
close(pipefd[1]);
|
||||
if (pipefd[0] != 0) {
|
||||
dup2(pipefd[0], 0);
|
||||
close(pipefd[0]);
|
||||
}
|
||||
execvp(command[0], command);
|
||||
perror(command[0].c_str());
|
||||
_exit(-1);
|
||||
}
|
||||
close(pipefd[0]);
|
||||
while (len > 0) {
|
||||
ssize_t bytes_written = write(pipefd[1], p, len);
|
||||
if (bytes_written == -1) {
|
||||
int write_errno = errno;
|
||||
close(pipefd[1]);
|
||||
throw System_error("write", "", write_errno);
|
||||
}
|
||||
p += bytes_written;
|
||||
len -= bytes_written;
|
||||
}
|
||||
close(pipefd[1]);
|
||||
int status = 0;
|
||||
if (waitpid(child, &status, 0) == -1) {
|
||||
throw System_error("waitpid", "", errno);
|
||||
}
|
||||
return status;
|
||||
}
|
||||
|
||||
bool successful_exit (int status)
|
||||
{
|
||||
return status != -1 && WIFEXITED(status) && WEXITSTATUS(status) == 0;
|
||||
}
|
||||
|
||||
void touch_file (const std::string& filename)
|
||||
{
|
||||
if (utimes(filename.c_str(), NULL) == -1) {
|
||||
throw System_error("utimes", "", errno);
|
||||
}
|
||||
}
|
||||
|
||||
static void init_std_streams_platform ()
|
||||
{
|
||||
}
|
||||
|
||||
void create_protected_file (const char* path)
|
||||
{
|
||||
int fd = open(path, O_WRONLY | O_CREAT, 0600);
|
||||
if (fd == -1) {
|
||||
throw System_error("open", path, errno);
|
||||
}
|
||||
close(fd);
|
||||
}
|
||||
|
||||
int util_rename (const char* from, const char* to)
|
||||
{
|
||||
return rename(from, to);
|
||||
}
|
||||
|
||||
static int dirfilter (const struct dirent* ent)
|
||||
{
|
||||
// filter out . and ..
|
||||
return std::strcmp(ent->d_name, ".") != 0 && std::strcmp(ent->d_name, "..") != 0;
|
||||
}
|
||||
|
||||
std::vector<std::string> get_directory_contents (const char* path)
|
||||
{
|
||||
struct dirent** namelist;
|
||||
int n = scandir(path, &namelist, dirfilter, alphasort);
|
||||
if (n == -1) {
|
||||
throw System_error("scandir", path, errno);
|
||||
}
|
||||
std::vector<std::string> contents(n);
|
||||
for (int i = 0; i < n; ++i) {
|
||||
contents[i] = namelist[i]->d_name;
|
||||
free(namelist[i]);
|
||||
}
|
||||
free(namelist);
|
||||
|
||||
return contents;
|
||||
}
|
||||
386
util-win32.cpp
Normal file
386
util-win32.cpp
Normal file
@@ -0,0 +1,386 @@
|
||||
/*
|
||||
* Copyright 2014 Andrew Ayer
|
||||
*
|
||||
* This file is part of git-crypt.
|
||||
*
|
||||
* git-crypt is free software: you can redistribute it and/or modify
|
||||
* it under the terms of the GNU General Public License as published by
|
||||
* the Free Software Foundation, either version 3 of the License, or
|
||||
* (at your option) any later version.
|
||||
*
|
||||
* git-crypt is distributed in the hope that it will be useful,
|
||||
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
* GNU General Public License for more details.
|
||||
*
|
||||
* You should have received a copy of the GNU General Public License
|
||||
* along with git-crypt. If not, see <http://www.gnu.org/licenses/>.
|
||||
*
|
||||
* Additional permission under GNU GPL version 3 section 7:
|
||||
*
|
||||
* If you modify the Program, or any covered work, by linking or
|
||||
* combining it with the OpenSSL project's OpenSSL library (or a
|
||||
* modified version of that library), containing parts covered by the
|
||||
* terms of the OpenSSL or SSLeay licenses, the licensors of the Program
|
||||
* grant you additional permission to convey the resulting work.
|
||||
* Corresponding Source for a non-source form of such a combination
|
||||
* shall include the source code for the parts of OpenSSL used as well
|
||||
* as that of the covered work.
|
||||
*/
|
||||
|
||||
#include <io.h>
|
||||
#include <stdio.h>
|
||||
#include <fcntl.h>
|
||||
#include <windows.h>
|
||||
#include <vector>
|
||||
#include <cstring>
|
||||
|
||||
std::string System_error::message () const
|
||||
{
|
||||
std::string mesg(action);
|
||||
if (!target.empty()) {
|
||||
mesg += ": ";
|
||||
mesg += target;
|
||||
}
|
||||
if (error) {
|
||||
LPTSTR error_message;
|
||||
FormatMessageA(
|
||||
FORMAT_MESSAGE_ALLOCATE_BUFFER | FORMAT_MESSAGE_FROM_SYSTEM | FORMAT_MESSAGE_IGNORE_INSERTS,
|
||||
NULL,
|
||||
error,
|
||||
MAKELANGID(LANG_NEUTRAL, SUBLANG_DEFAULT),
|
||||
reinterpret_cast<LPTSTR>(&error_message),
|
||||
0,
|
||||
NULL);
|
||||
mesg += error_message;
|
||||
LocalFree(error_message);
|
||||
}
|
||||
return mesg;
|
||||
}
|
||||
|
||||
void temp_fstream::open (std::ios_base::openmode mode)
|
||||
{
|
||||
close();
|
||||
|
||||
char tmpdir[MAX_PATH + 1];
|
||||
|
||||
DWORD ret = GetTempPath(sizeof(tmpdir), tmpdir);
|
||||
if (ret == 0) {
|
||||
throw System_error("GetTempPath", "", GetLastError());
|
||||
} else if (ret > sizeof(tmpdir) - 1) {
|
||||
throw System_error("GetTempPath", "", ERROR_BUFFER_OVERFLOW);
|
||||
}
|
||||
|
||||
char tmpfilename[MAX_PATH + 1];
|
||||
if (GetTempFileName(tmpdir, TEXT("git-crypt"), 0, tmpfilename) == 0) {
|
||||
throw System_error("GetTempFileName", "", GetLastError());
|
||||
}
|
||||
|
||||
filename = tmpfilename;
|
||||
|
||||
std::fstream::open(filename.c_str(), mode);
|
||||
if (!std::fstream::is_open()) {
|
||||
DeleteFile(filename.c_str());
|
||||
throw System_error("std::fstream::open", filename, 0);
|
||||
}
|
||||
}
|
||||
|
||||
void temp_fstream::close ()
|
||||
{
|
||||
if (std::fstream::is_open()) {
|
||||
std::fstream::close();
|
||||
DeleteFile(filename.c_str());
|
||||
}
|
||||
}
|
||||
|
||||
void mkdir_parent (const std::string& path)
|
||||
{
|
||||
std::string::size_type slash(path.find('/', 1));
|
||||
while (slash != std::string::npos) {
|
||||
std::string prefix(path.substr(0, slash));
|
||||
if (GetFileAttributes(prefix.c_str()) == INVALID_FILE_ATTRIBUTES) {
|
||||
// prefix does not exist, so try to create it
|
||||
if (!CreateDirectory(prefix.c_str(), NULL)) {
|
||||
throw System_error("CreateDirectory", prefix, GetLastError());
|
||||
}
|
||||
}
|
||||
|
||||
slash = path.find('/', slash + 1);
|
||||
}
|
||||
}
|
||||
|
||||
std::string our_exe_path ()
|
||||
{
|
||||
std::vector<char> buffer(128);
|
||||
size_t len;
|
||||
|
||||
while ((len = GetModuleFileNameA(NULL, &buffer[0], buffer.size())) == buffer.size()) {
|
||||
// buffer may have been truncated - grow and try again
|
||||
buffer.resize(buffer.size() * 2);
|
||||
}
|
||||
if (len == 0) {
|
||||
throw System_error("GetModuleFileNameA", "", GetLastError());
|
||||
}
|
||||
|
||||
return std::string(buffer.begin(), buffer.begin() + len);
|
||||
}
|
||||
|
||||
static void escape_cmdline_argument (std::string& cmdline, const std::string& arg)
|
||||
{
|
||||
// For an explanation of Win32's arcane argument quoting rules, see:
|
||||
// http://msdn.microsoft.com/en-us/library/17w5ykft%28v=vs.85%29.aspx
|
||||
// http://msdn.microsoft.com/en-us/library/bb776391%28v=vs.85%29.aspx
|
||||
// http://blogs.msdn.com/b/twistylittlepassagesallalike/archive/2011/04/23/everyone-quotes-arguments-the-wrong-way.aspx
|
||||
// http://blogs.msdn.com/b/oldnewthing/archive/2010/09/17/10063629.aspx
|
||||
cmdline.push_back('"');
|
||||
|
||||
std::string::const_iterator p(arg.begin());
|
||||
while (p != arg.end()) {
|
||||
if (*p == '"') {
|
||||
cmdline.push_back('\\');
|
||||
cmdline.push_back('"');
|
||||
++p;
|
||||
} else if (*p == '\\') {
|
||||
unsigned int num_backslashes = 0;
|
||||
while (p != arg.end() && *p == '\\') {
|
||||
++num_backslashes;
|
||||
++p;
|
||||
}
|
||||
if (p == arg.end() || *p == '"') {
|
||||
// Backslashes need to be escaped
|
||||
num_backslashes *= 2;
|
||||
}
|
||||
while (num_backslashes--) {
|
||||
cmdline.push_back('\\');
|
||||
}
|
||||
} else {
|
||||
cmdline.push_back(*p++);
|
||||
}
|
||||
}
|
||||
|
||||
cmdline.push_back('"');
|
||||
}
|
||||
|
||||
static std::string format_cmdline (const std::vector<std::string>& command)
|
||||
{
|
||||
std::string cmdline;
|
||||
for (std::vector<std::string>::const_iterator arg(command.begin()); arg != command.end(); ++arg) {
|
||||
if (arg != command.begin()) {
|
||||
cmdline.push_back(' ');
|
||||
}
|
||||
escape_cmdline_argument(cmdline, *arg);
|
||||
}
|
||||
return cmdline;
|
||||
}
|
||||
|
||||
static int wait_for_child (HANDLE child_handle)
|
||||
{
|
||||
if (WaitForSingleObject(child_handle, INFINITE) == WAIT_FAILED) {
|
||||
throw System_error("WaitForSingleObject", "", GetLastError());
|
||||
}
|
||||
|
||||
DWORD exit_code;
|
||||
if (!GetExitCodeProcess(child_handle, &exit_code)) {
|
||||
throw System_error("GetExitCodeProcess", "", GetLastError());
|
||||
}
|
||||
|
||||
return exit_code;
|
||||
}
|
||||
|
||||
static HANDLE spawn_command (const std::vector<std::string>& command, HANDLE stdin_handle, HANDLE stdout_handle, HANDLE stderr_handle)
|
||||
{
|
||||
PROCESS_INFORMATION proc_info;
|
||||
ZeroMemory(&proc_info, sizeof(proc_info));
|
||||
|
||||
STARTUPINFO start_info;
|
||||
ZeroMemory(&start_info, sizeof(start_info));
|
||||
|
||||
start_info.cb = sizeof(STARTUPINFO);
|
||||
start_info.hStdInput = stdin_handle ? stdin_handle : GetStdHandle(STD_INPUT_HANDLE);
|
||||
start_info.hStdOutput = stdout_handle ? stdout_handle : GetStdHandle(STD_OUTPUT_HANDLE);
|
||||
start_info.hStdError = stderr_handle ? stderr_handle : GetStdHandle(STD_ERROR_HANDLE);
|
||||
start_info.dwFlags |= STARTF_USESTDHANDLES;
|
||||
|
||||
std::string cmdline(format_cmdline(command));
|
||||
|
||||
if (!CreateProcessA(NULL, // application name (NULL to use command line)
|
||||
const_cast<char*>(cmdline.c_str()),
|
||||
NULL, // process security attributes
|
||||
NULL, // primary thread security attributes
|
||||
TRUE, // handles are inherited
|
||||
0, // creation flags
|
||||
NULL, // use parent's environment
|
||||
NULL, // use parent's current directory
|
||||
&start_info,
|
||||
&proc_info)) {
|
||||
throw System_error("CreateProcess", cmdline, GetLastError());
|
||||
}
|
||||
|
||||
CloseHandle(proc_info.hThread);
|
||||
|
||||
return proc_info.hProcess;
|
||||
}
|
||||
|
||||
int exec_command (const std::vector<std::string>& command)
|
||||
{
|
||||
HANDLE child_handle = spawn_command(command, NULL, NULL, NULL);
|
||||
int exit_code = wait_for_child(child_handle);
|
||||
CloseHandle(child_handle);
|
||||
return exit_code;
|
||||
}
|
||||
|
||||
int exec_command (const std::vector<std::string>& command, std::ostream& output)
|
||||
{
|
||||
HANDLE stdout_pipe_reader = NULL;
|
||||
HANDLE stdout_pipe_writer = NULL;
|
||||
SECURITY_ATTRIBUTES sec_attr;
|
||||
|
||||
// Set the bInheritHandle flag so pipe handles are inherited.
|
||||
sec_attr.nLength = sizeof(SECURITY_ATTRIBUTES);
|
||||
sec_attr.bInheritHandle = TRUE;
|
||||
sec_attr.lpSecurityDescriptor = NULL;
|
||||
|
||||
// Create a pipe for the child process's STDOUT.
|
||||
if (!CreatePipe(&stdout_pipe_reader, &stdout_pipe_writer, &sec_attr, 0)) {
|
||||
throw System_error("CreatePipe", "", GetLastError());
|
||||
}
|
||||
|
||||
// Ensure the read handle to the pipe for STDOUT is not inherited.
|
||||
if (!SetHandleInformation(stdout_pipe_reader, HANDLE_FLAG_INHERIT, 0)) {
|
||||
throw System_error("SetHandleInformation", "", GetLastError());
|
||||
}
|
||||
|
||||
HANDLE child_handle = spawn_command(command, NULL, stdout_pipe_writer, NULL);
|
||||
CloseHandle(stdout_pipe_writer);
|
||||
|
||||
// Read from stdout_pipe_reader.
|
||||
// Note that ReadFile on a pipe may return with bytes_read==0 if the other
|
||||
// end of the pipe writes zero bytes, so don't break out of the read loop
|
||||
// when this happens. When the other end of the pipe closes, ReadFile
|
||||
// fails with ERROR_BROKEN_PIPE.
|
||||
char buffer[1024];
|
||||
DWORD bytes_read;
|
||||
while (ReadFile(stdout_pipe_reader, buffer, sizeof(buffer), &bytes_read, NULL)) {
|
||||
output.write(buffer, bytes_read);
|
||||
}
|
||||
const DWORD read_error = GetLastError();
|
||||
if (read_error != ERROR_BROKEN_PIPE) {
|
||||
throw System_error("ReadFile", "", read_error);
|
||||
}
|
||||
|
||||
CloseHandle(stdout_pipe_reader);
|
||||
|
||||
int exit_code = wait_for_child(child_handle);
|
||||
CloseHandle(child_handle);
|
||||
return exit_code;
|
||||
}
|
||||
|
||||
int exec_command_with_input (const std::vector<std::string>& command, const char* p, size_t len)
|
||||
{
|
||||
HANDLE stdin_pipe_reader = NULL;
|
||||
HANDLE stdin_pipe_writer = NULL;
|
||||
SECURITY_ATTRIBUTES sec_attr;
|
||||
|
||||
// Set the bInheritHandle flag so pipe handles are inherited.
|
||||
sec_attr.nLength = sizeof(SECURITY_ATTRIBUTES);
|
||||
sec_attr.bInheritHandle = TRUE;
|
||||
sec_attr.lpSecurityDescriptor = NULL;
|
||||
|
||||
// Create a pipe for the child process's STDIN.
|
||||
if (!CreatePipe(&stdin_pipe_reader, &stdin_pipe_writer, &sec_attr, 0)) {
|
||||
throw System_error("CreatePipe", "", GetLastError());
|
||||
}
|
||||
|
||||
// Ensure the write handle to the pipe for STDIN is not inherited.
|
||||
if (!SetHandleInformation(stdin_pipe_writer, HANDLE_FLAG_INHERIT, 0)) {
|
||||
throw System_error("SetHandleInformation", "", GetLastError());
|
||||
}
|
||||
|
||||
HANDLE child_handle = spawn_command(command, stdin_pipe_reader, NULL, NULL);
|
||||
CloseHandle(stdin_pipe_reader);
|
||||
|
||||
// Write to stdin_pipe_writer.
|
||||
while (len > 0) {
|
||||
DWORD bytes_written;
|
||||
if (!WriteFile(stdin_pipe_writer, p, len, &bytes_written, NULL)) {
|
||||
throw System_error("WriteFile", "", GetLastError());
|
||||
}
|
||||
p += bytes_written;
|
||||
len -= bytes_written;
|
||||
}
|
||||
|
||||
CloseHandle(stdin_pipe_writer);
|
||||
|
||||
int exit_code = wait_for_child(child_handle);
|
||||
CloseHandle(child_handle);
|
||||
return exit_code;
|
||||
}
|
||||
|
||||
bool successful_exit (int status)
|
||||
{
|
||||
return status == 0;
|
||||
}
|
||||
|
||||
void touch_file (const std::string& filename)
|
||||
{
|
||||
HANDLE fh = CreateFileA(filename.c_str(), FILE_WRITE_ATTRIBUTES, FILE_SHARE_READ, NULL, OPEN_EXISTING, 0, NULL);
|
||||
if (fh == INVALID_HANDLE_VALUE) {
|
||||
throw System_error("CreateFileA", filename, GetLastError());
|
||||
}
|
||||
SYSTEMTIME system_time;
|
||||
GetSystemTime(&system_time);
|
||||
FILETIME file_time;
|
||||
SystemTimeToFileTime(&system_time, &file_time);
|
||||
|
||||
if (!SetFileTime(fh, NULL, NULL, &file_time)) {
|
||||
DWORD error = GetLastError();
|
||||
CloseHandle(fh);
|
||||
throw System_error("SetFileTime", filename, error);
|
||||
}
|
||||
CloseHandle(fh);
|
||||
}
|
||||
|
||||
static void init_std_streams_platform ()
|
||||
{
|
||||
_setmode(_fileno(stdin), _O_BINARY);
|
||||
_setmode(_fileno(stdout), _O_BINARY);
|
||||
}
|
||||
|
||||
void create_protected_file (const char* path) // TODO
|
||||
{
|
||||
}
|
||||
|
||||
int util_rename (const char* from, const char* to)
|
||||
{
|
||||
// On Windows OS, it is necessary to ensure target file doesn't exist
|
||||
unlink(to);
|
||||
return rename(from, to);
|
||||
}
|
||||
|
||||
std::vector<std::string> get_directory_contents (const char* path)
|
||||
{
|
||||
std::vector<std::string> filenames;
|
||||
std::string patt(path);
|
||||
if (!patt.empty() && patt[patt.size() - 1] != '/' && patt[patt.size() - 1] != '\\') {
|
||||
patt.push_back('\\');
|
||||
}
|
||||
patt.push_back('*');
|
||||
|
||||
WIN32_FIND_DATAA ffd;
|
||||
HANDLE h = FindFirstFileA(patt.c_str(), &ffd);
|
||||
if (h == INVALID_HANDLE_VALUE) {
|
||||
throw System_error("FindFirstFileA", patt, GetLastError());
|
||||
}
|
||||
do {
|
||||
if (std::strcmp(ffd.cFileName, ".") != 0 && std::strcmp(ffd.cFileName, "..") != 0) {
|
||||
filenames.push_back(ffd.cFileName);
|
||||
}
|
||||
} while (FindNextFileA(h, &ffd) != 0);
|
||||
|
||||
DWORD err = GetLastError();
|
||||
if (err != ERROR_NO_MORE_FILES) {
|
||||
throw System_error("FileNextFileA", patt, err);
|
||||
}
|
||||
FindClose(h);
|
||||
return filenames;
|
||||
}
|
||||
166
util.cpp
166
util.cpp
@@ -1,5 +1,5 @@
|
||||
/*
|
||||
* Copyright 2012 Andrew Ayer
|
||||
* Copyright 2012, 2014 Andrew Ayer
|
||||
*
|
||||
* This file is part of git-crypt.
|
||||
*
|
||||
@@ -28,89 +28,10 @@
|
||||
* as that of the covered work.
|
||||
*/
|
||||
|
||||
#include "git-crypt.hpp"
|
||||
#include "util.hpp"
|
||||
#include <string>
|
||||
#include <cstring>
|
||||
#include <cstdio>
|
||||
#include <cstdlib>
|
||||
#include <sys/types.h>
|
||||
#include <sys/wait.h>
|
||||
#include <sys/stat.h>
|
||||
#include <unistd.h>
|
||||
#include <errno.h>
|
||||
#include <fstream>
|
||||
|
||||
int exec_command (const char* command, std::ostream& output)
|
||||
{
|
||||
int pipefd[2];
|
||||
if (pipe(pipefd) == -1) {
|
||||
perror("pipe");
|
||||
std::exit(9);
|
||||
}
|
||||
pid_t child = fork();
|
||||
if (child == -1) {
|
||||
perror("fork");
|
||||
std::exit(9);
|
||||
}
|
||||
if (child == 0) {
|
||||
close(pipefd[0]);
|
||||
if (pipefd[1] != 1) {
|
||||
dup2(pipefd[1], 1);
|
||||
close(pipefd[1]);
|
||||
}
|
||||
execl("/bin/sh", "sh", "-c", command, NULL);
|
||||
exit(-1);
|
||||
}
|
||||
close(pipefd[1]);
|
||||
char buffer[1024];
|
||||
ssize_t bytes_read;
|
||||
while ((bytes_read = read(pipefd[0], buffer, sizeof(buffer))) > 0) {
|
||||
output.write(buffer, bytes_read);
|
||||
}
|
||||
close(pipefd[0]);
|
||||
int status = 0;
|
||||
waitpid(child, &status, 0);
|
||||
return status;
|
||||
}
|
||||
|
||||
std::string resolve_path (const char* path)
|
||||
{
|
||||
char* resolved_path_p = realpath(path, NULL);
|
||||
std::string resolved_path(resolved_path_p);
|
||||
free(resolved_path_p);
|
||||
return resolved_path;
|
||||
}
|
||||
|
||||
void open_tempfile (std::fstream& file, std::ios_base::openmode mode)
|
||||
{
|
||||
const char* tmpdir = getenv("TMPDIR");
|
||||
size_t tmpdir_len;
|
||||
if (tmpdir) {
|
||||
tmpdir_len = strlen(tmpdir);
|
||||
} else {
|
||||
tmpdir = "/tmp";
|
||||
tmpdir_len = 4;
|
||||
}
|
||||
char* path = new char[tmpdir_len + 18];
|
||||
strcpy(path, tmpdir);
|
||||
strcpy(path + tmpdir_len, "/git-crypt.XXXXXX");
|
||||
mode_t old_umask = umask(0077);
|
||||
int fd = mkstemp(path);
|
||||
if (fd == -1) {
|
||||
perror("mkstemp");
|
||||
std::exit(9);
|
||||
}
|
||||
umask(old_umask);
|
||||
file.open(path, mode);
|
||||
if (!file.is_open()) {
|
||||
perror("open");
|
||||
unlink(path);
|
||||
std::exit(9);
|
||||
}
|
||||
unlink(path);
|
||||
close(fd);
|
||||
delete[] path;
|
||||
}
|
||||
#include <iostream>
|
||||
|
||||
std::string escape_shell_arg (const std::string& str)
|
||||
{
|
||||
@@ -126,3 +47,84 @@ std::string escape_shell_arg (const std::string& str)
|
||||
return new_str;
|
||||
}
|
||||
|
||||
uint32_t load_be32 (const unsigned char* p)
|
||||
{
|
||||
return (static_cast<uint32_t>(p[3]) << 0) |
|
||||
(static_cast<uint32_t>(p[2]) << 8) |
|
||||
(static_cast<uint32_t>(p[1]) << 16) |
|
||||
(static_cast<uint32_t>(p[0]) << 24);
|
||||
}
|
||||
|
||||
void store_be32 (unsigned char* p, uint32_t i)
|
||||
{
|
||||
p[3] = i; i >>= 8;
|
||||
p[2] = i; i >>= 8;
|
||||
p[1] = i; i >>= 8;
|
||||
p[0] = i;
|
||||
}
|
||||
|
||||
bool read_be32 (std::istream& in, uint32_t& i)
|
||||
{
|
||||
unsigned char buffer[4];
|
||||
in.read(reinterpret_cast<char*>(buffer), 4);
|
||||
if (in.gcount() != 4) {
|
||||
return false;
|
||||
}
|
||||
i = load_be32(buffer);
|
||||
return true;
|
||||
}
|
||||
|
||||
void write_be32 (std::ostream& out, uint32_t i)
|
||||
{
|
||||
unsigned char buffer[4];
|
||||
store_be32(buffer, i);
|
||||
out.write(reinterpret_cast<const char*>(buffer), 4);
|
||||
}
|
||||
|
||||
void* explicit_memset (void* s, int c, std::size_t n)
|
||||
{
|
||||
volatile unsigned char* p = reinterpret_cast<unsigned char*>(s);
|
||||
|
||||
while (n--) {
|
||||
*p++ = c;
|
||||
}
|
||||
|
||||
return s;
|
||||
}
|
||||
|
||||
static bool leakless_equals_char (const unsigned char* a, const unsigned char* b, std::size_t len)
|
||||
{
|
||||
volatile int diff = 0;
|
||||
|
||||
while (len > 0) {
|
||||
diff |= *a++ ^ *b++;
|
||||
--len;
|
||||
}
|
||||
|
||||
return diff == 0;
|
||||
}
|
||||
|
||||
bool leakless_equals (const void* a, const void* b, std::size_t len)
|
||||
{
|
||||
return leakless_equals_char(reinterpret_cast<const unsigned char*>(a), reinterpret_cast<const unsigned char*>(b), len);
|
||||
}
|
||||
|
||||
static void init_std_streams_platform (); // platform-specific initialization
|
||||
|
||||
void init_std_streams ()
|
||||
{
|
||||
// The following two lines are essential for achieving good performance:
|
||||
std::ios_base::sync_with_stdio(false);
|
||||
std::cin.tie(0);
|
||||
|
||||
std::cin.exceptions(std::ios_base::badbit);
|
||||
std::cout.exceptions(std::ios_base::badbit);
|
||||
|
||||
init_std_streams_platform();
|
||||
}
|
||||
|
||||
#ifdef _WIN32
|
||||
#include "util-win32.cpp"
|
||||
#else
|
||||
#include "util-unix.cpp"
|
||||
#endif
|
||||
|
||||
45
util.hpp
45
util.hpp
@@ -1,5 +1,5 @@
|
||||
/*
|
||||
* Copyright 2012 Andrew Ayer
|
||||
* Copyright 2012, 2014 Andrew Ayer
|
||||
*
|
||||
* This file is part of git-crypt.
|
||||
*
|
||||
@@ -34,11 +34,48 @@
|
||||
#include <string>
|
||||
#include <ios>
|
||||
#include <iosfwd>
|
||||
#include <stdint.h>
|
||||
#include <sys/types.h>
|
||||
#include <fstream>
|
||||
#include <vector>
|
||||
|
||||
int exec_command (const char* command, std::ostream& output);
|
||||
std::string resolve_path (const char* path);
|
||||
void open_tempfile (std::fstream&, std::ios_base::openmode);
|
||||
struct System_error {
|
||||
std::string action;
|
||||
std::string target;
|
||||
int error;
|
||||
|
||||
System_error (const std::string& a, const std::string& t, int e) : action(a), target(t), error(e) { }
|
||||
|
||||
std::string message () const;
|
||||
};
|
||||
|
||||
class temp_fstream : public std::fstream {
|
||||
std::string filename;
|
||||
public:
|
||||
~temp_fstream () { close(); }
|
||||
|
||||
void open (std::ios_base::openmode);
|
||||
void close ();
|
||||
};
|
||||
|
||||
void mkdir_parent (const std::string& path); // Create parent directories of path, __but not path itself__
|
||||
std::string our_exe_path ();
|
||||
int exec_command (const std::vector<std::string>&);
|
||||
int exec_command (const std::vector<std::string>&, std::ostream& output);
|
||||
int exec_command_with_input (const std::vector<std::string>&, const char* p, size_t len);
|
||||
bool successful_exit (int status);
|
||||
void touch_file (const std::string&);
|
||||
std::string escape_shell_arg (const std::string&);
|
||||
uint32_t load_be32 (const unsigned char*);
|
||||
void store_be32 (unsigned char*, uint32_t);
|
||||
bool read_be32 (std::istream& in, uint32_t&);
|
||||
void write_be32 (std::ostream& out, uint32_t);
|
||||
void* explicit_memset (void* s, int c, size_t n); // memset that won't be optimized away
|
||||
bool leakless_equals (const void* a, const void* b, size_t len); // compare bytes w/o leaking timing
|
||||
void init_std_streams ();
|
||||
void create_protected_file (const char* path); // create empty file accessible only by current user
|
||||
int util_rename (const char*, const char*);
|
||||
std::vector<std::string> get_directory_contents (const char* path);
|
||||
|
||||
#endif
|
||||
|
||||
|
||||
Reference in New Issue
Block a user