2 * wrapper functions around the usign executable
3 * Copyright (C) 2018 Daniel Golle <daniel@makrotopia.org>
5 * This program is free software; you can redistribute it and/or modify
6 * it under the terms of the GNU General Public License version 3
7 * as published by the Free Software Foundation
9 * This program is distributed in the hope that it will be useful,
10 * but WITHOUT ANY WARRANTY; without even the implied warranty of
11 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 * GNU General Public License for more details.
24 * check for revoker deadlink in pubkeydir
25 * return true if a revoker exists, false otherwise
27 int _usign_key_is_revoked(const char *fingerprint, const char *pubkeydir) {
29 char rfname[256] = {0};
31 snprintf(rfname, sizeof(rfname)-1, "%s/%s", pubkeydir, fingerprint);
32 if (readlink(rfname, tml, sizeof(tml)) > 0 &&
33 !strcmp(tml, ".revoked.")) {
43 * return WEXITSTATUS or -1 if fork or execv fails
45 int usign_s(const char *msgfile, const char *seckeyfile, const char *sigfile, bool quiet) {
48 const char *usign_argv[16] = {0};
49 unsigned int usign_argc = 0;
51 usign_argv[usign_argc++] = "/usr/bin/usign";
52 usign_argv[usign_argc++] = "-S";
53 usign_argv[usign_argc++] = "-m";
54 usign_argv[usign_argc++] = msgfile;
55 usign_argv[usign_argc++] = "-s";
56 usign_argv[usign_argc++] = seckeyfile;
57 usign_argv[usign_argc++] = "-x";
58 usign_argv[usign_argc++] = sigfile;
61 usign_argv[usign_argc++] = "-q";
69 if (execv(usign_argv[0], usign_argv))
75 waitpid(pid, &status, 0);
76 return WEXITSTATUS(status);
82 int usign_s(const char *msgfile, const char *seckeyfile, const char *sigfile, bool quiet) {
88 * call usign -F ... and set fingerprint returned
89 * return WEXITSTATUS or -1 if fork or execv fails
91 static int usign_f(char *fingerprint, const char *pubkeyfile, const char *seckeyfile, const char *sigfile) {
95 const char *usign_argv[16] = {0};
96 unsigned int usign_argc = 0;
101 usign_argv[usign_argc++] = "/usr/bin/usign";
102 usign_argv[usign_argc++] = "-F";
105 usign_argv[usign_argc++] = "-p";
106 usign_argv[usign_argc++] = pubkeyfile;
110 usign_argv[usign_argc++] = "-s";
111 usign_argv[usign_argc++] = seckeyfile;
115 usign_argv[usign_argc++] = "-x";
116 usign_argv[usign_argc++] = sigfile;
132 if (execv(usign_argv[0], usign_argv))
138 waitpid(pid, &status, 0);
139 if (fingerprint && !WEXITSTATUS(status)) {
140 memset(fingerprint, 0, 16);
141 read(fds[0], fingerprint, 16);
142 fingerprint[16] = '\0';
146 return WEXITSTATUS(status);
153 * call usign -F -p ...
155 int usign_f_pubkey(char *fingerprint, const char *pubkeyfile) {
156 return usign_f(fingerprint, pubkeyfile, NULL, NULL);
160 * call usign -F -s ...
162 int usign_f_seckey(char *fingerprint, const char *seckeyfile) {
163 return usign_f(fingerprint, NULL, seckeyfile, NULL);
167 * call usign -F -x ...
169 int usign_f_sig(char *fingerprint, const char *sigfile) {
170 return usign_f(fingerprint, NULL, NULL, sigfile);
176 * return WEXITSTATUS or -1 if fork or execv fails
178 int usign_v(const char *msgfile, const char *pubkeyfile,
179 const char *pubkeydir, const char *sigfile, bool quiet) {
182 const char *usign_argv[16] = {0};
183 unsigned int usign_argc = 0;
184 char fingerprint[17];
186 if (usign_f_sig(fingerprint, sigfile)) {
188 fprintf(stdout, "cannot get signing key fingerprint\n");
192 if (pubkeydir && _usign_key_is_revoked(fingerprint, pubkeydir)) {
194 fprintf(stdout, "key %s has been revoked!\n", fingerprint);
197 usign_argv[usign_argc++] = "/usr/bin/usign";
198 usign_argv[usign_argc++] = "-V";
199 usign_argv[usign_argc++] = "-m";
200 usign_argv[usign_argc++] = msgfile;
203 usign_argv[usign_argc++] = "-q";
206 usign_argv[usign_argc++] = "-p";
207 usign_argv[usign_argc++] = pubkeyfile;
211 usign_argv[usign_argc++] = "-P";
212 usign_argv[usign_argc++] = pubkeydir;
216 usign_argv[usign_argc++] = "-x";
217 usign_argv[usign_argc++] = sigfile;
226 if (execv(usign_argv[0], usign_argv))
232 waitpid(pid, &status, 0);
233 return WEXITSTATUS(status);