summaryrefslogtreecommitdiffstats
path: root/src/rspamadm/signtool.c
diff options
context:
space:
mode:
authorVsevolod Stakhov <vsevolod@rspamd.com>2023-07-26 10:49:23 +0100
committerVsevolod Stakhov <vsevolod@rspamd.com>2023-07-26 10:49:23 +0100
commit537a7180a0d5132c11636c4fd8b1450cd99d352c (patch)
treefb9f8c84955a411bdffbd6371ea32f2716fb3687 /src/rspamadm/signtool.c
parent5fd7a90fdaa33f52c59bdb0ca84451e5c1e22365 (diff)
downloadrspamd-537a7180a0d5132c11636c4fd8b1450cd99d352c.tar.gz
rspamd-537a7180a0d5132c11636c4fd8b1450cd99d352c.zip
[Rework] Use clang-format to unify formatting in all sources
No meaningful changes.
Diffstat (limited to 'src/rspamadm/signtool.c')
-rw-r--r--src/rspamadm/signtool.c585
1 files changed, 291 insertions, 294 deletions
diff --git a/src/rspamadm/signtool.c b/src/rspamadm/signtool.c
index b28c36c8c..b39b87058 100644
--- a/src/rspamadm/signtool.c
+++ b/src/rspamadm/signtool.c
@@ -39,63 +39,62 @@ static gchar *editor = NULL;
static gboolean edit = FALSE;
enum rspamd_cryptobox_mode mode = RSPAMD_CRYPTOBOX_MODE_25519;
-static void rspamadm_signtool (gint argc, gchar **argv,
- const struct rspamadm_command *cmd);
-static const char *rspamadm_signtool_help (gboolean full_help,
- const struct rspamadm_command *cmd);
+static void rspamadm_signtool(gint argc, gchar **argv,
+ const struct rspamadm_command *cmd);
+static const char *rspamadm_signtool_help(gboolean full_help,
+ const struct rspamadm_command *cmd);
struct rspamadm_command signtool_command = {
- .name = "signtool",
- .flags = 0,
- .help = rspamadm_signtool_help,
- .run = rspamadm_signtool,
- .lua_subrs = NULL,
+ .name = "signtool",
+ .flags = 0,
+ .help = rspamadm_signtool_help,
+ .run = rspamadm_signtool,
+ .lua_subrs = NULL,
};
static GOptionEntry entries[] = {
- {"openssl", 'o', 0, G_OPTION_ARG_NONE, &openssl,
- "Generate openssl nistp256 keypair not curve25519 one", NULL},
- {"verify", 'v', 0, G_OPTION_ARG_NONE, &verify,
- "Verify signatures and not sign", NULL},
- {"suffix", 'S', 0, G_OPTION_ARG_STRING, &suffix,
- "Save signatures in file<suffix> files", NULL},
- {"pubkey", 'p', 0, G_OPTION_ARG_STRING, &pubkey,
- "Base32 encoded pubkey to verify", NULL},
- {"pubout", '\0', 0, G_OPTION_ARG_FILENAME, &pubout,
- "Output public key to the specified file", NULL},
- {"pubfile", 'P', 0, G_OPTION_ARG_FILENAME, &pubkey_file,
- "Load base32 encoded pubkey to verify from the file", NULL},
- {"keypair", 'k', 0, G_OPTION_ARG_STRING, &keypair_file,
- "UCL with keypair to load for signing", NULL},
- {"quiet", 'q', 0, G_OPTION_ARG_NONE, &quiet,
- "Be quiet", NULL},
- {"edit", 'e', 0, G_OPTION_ARG_NONE, &edit,
- "Run editor and sign the edited file", NULL},
- {"editor", '\0', 0, G_OPTION_ARG_STRING, &editor,
- "Use the specified editor instead of $EDITOR environment var", NULL},
- {NULL, 0, 0, G_OPTION_ARG_NONE, NULL, NULL, NULL}
-};
+ {"openssl", 'o', 0, G_OPTION_ARG_NONE, &openssl,
+ "Generate openssl nistp256 keypair not curve25519 one", NULL},
+ {"verify", 'v', 0, G_OPTION_ARG_NONE, &verify,
+ "Verify signatures and not sign", NULL},
+ {"suffix", 'S', 0, G_OPTION_ARG_STRING, &suffix,
+ "Save signatures in file<suffix> files", NULL},
+ {"pubkey", 'p', 0, G_OPTION_ARG_STRING, &pubkey,
+ "Base32 encoded pubkey to verify", NULL},
+ {"pubout", '\0', 0, G_OPTION_ARG_FILENAME, &pubout,
+ "Output public key to the specified file", NULL},
+ {"pubfile", 'P', 0, G_OPTION_ARG_FILENAME, &pubkey_file,
+ "Load base32 encoded pubkey to verify from the file", NULL},
+ {"keypair", 'k', 0, G_OPTION_ARG_STRING, &keypair_file,
+ "UCL with keypair to load for signing", NULL},
+ {"quiet", 'q', 0, G_OPTION_ARG_NONE, &quiet,
+ "Be quiet", NULL},
+ {"edit", 'e', 0, G_OPTION_ARG_NONE, &edit,
+ "Run editor and sign the edited file", NULL},
+ {"editor", '\0', 0, G_OPTION_ARG_STRING, &editor,
+ "Use the specified editor instead of $EDITOR environment var", NULL},
+ {NULL, 0, 0, G_OPTION_ARG_NONE, NULL, NULL, NULL}};
static const char *
-rspamadm_signtool_help (gboolean full_help,
- const struct rspamadm_command *cmd)
+rspamadm_signtool_help(gboolean full_help,
+ const struct rspamadm_command *cmd)
{
const char *help_str;
if (full_help) {
help_str = "Manage digital signatures\n\n"
- "Usage: rspamadm signtool [-o] -k <keypair_file> [-v -p <pubkey> | -P <pubkey_file>] [-S <suffix>] file1 ...\n"
- "Where options are:\n\n"
- "-v: verify against pubkey instead of \n"
- "-o: use ECDSA instead of EdDSA\n"
- "-p: load pubkey as base32 string\n"
- "-P: load pubkey paced in file\n"
- "-k: load signing keypair from ucl file\n"
- "-S: append suffix for signatures and store them in files\n"
- "-q: be quiet\n"
- "-e: opens file for editing and sign the result\n"
- "--editor: use the specified editor instead of $EDITOR environment var\n"
- "--help: shows available options and commands";
+ "Usage: rspamadm signtool [-o] -k <keypair_file> [-v -p <pubkey> | -P <pubkey_file>] [-S <suffix>] file1 ...\n"
+ "Where options are:\n\n"
+ "-v: verify against pubkey instead of \n"
+ "-o: use ECDSA instead of EdDSA\n"
+ "-p: load pubkey as base32 string\n"
+ "-P: load pubkey paced in file\n"
+ "-k: load signing keypair from ucl file\n"
+ "-S: append suffix for signatures and store them in files\n"
+ "-q: be quiet\n"
+ "-e: opens file for editing and sign the result\n"
+ "--editor: use the specified editor instead of $EDITOR environment var\n"
+ "--help: shows available options and commands";
}
else {
help_str = "Sign and verify files tool";
@@ -105,7 +104,7 @@ rspamadm_signtool_help (gboolean full_help,
}
static gint
-rspamadm_edit_file (const gchar *fname)
+rspamadm_edit_file(const gchar *fname)
{
gchar tmppath[PATH_MAX], run_cmdline[PATH_MAX];
guchar *map;
@@ -117,169 +116,169 @@ rspamadm_edit_file (const gchar *fname)
GError *err = NULL;
if (editor == NULL) {
- editor = getenv ("EDITOR");
+ editor = getenv("EDITOR");
}
if (editor == NULL) {
- rspamd_fprintf (stderr, "cannot find editor: specify $EDITOR "
- "environment variable or pass --editor argument\n");
- exit (EXIT_FAILURE);
+ rspamd_fprintf(stderr, "cannot find editor: specify $EDITOR "
+ "environment variable or pass --editor argument\n");
+ exit(EXIT_FAILURE);
}
- tmpdir = getenv ("TMPDIR");
+ tmpdir = getenv("TMPDIR");
if (tmpdir == NULL) {
tmpdir = "/tmp";
}
- if (stat (fname, &st) == -1 || st.st_size == 0) {
+ if (stat(fname, &st) == -1 || st.st_size == 0) {
/* The source does not exist, but that shouldn't be a problem */
len = 0;
map = NULL;
/* Try to touch source anyway */
- fd_out = rspamd_file_xopen (fname, O_WRONLY | O_CREAT | O_EXCL, 00644,
- 0);
+ fd_out = rspamd_file_xopen(fname, O_WRONLY | O_CREAT | O_EXCL, 00644,
+ 0);
if (fd_out == -1) {
- rspamd_fprintf (stderr, "cannot open %s: %s\n", fname,
- strerror (errno));
- exit (EXIT_FAILURE);
+ rspamd_fprintf(stderr, "cannot open %s: %s\n", fname,
+ strerror(errno));
+ exit(EXIT_FAILURE);
}
- close (fd_out);
+ close(fd_out);
}
else {
- map = rspamd_file_xmap (fname, PROT_READ, &len, TRUE);
+ map = rspamd_file_xmap(fname, PROT_READ, &len, TRUE);
if (map == NULL) {
- rspamd_fprintf (stderr, "cannot open %s: %s\n", fname,
- strerror (errno));
- exit (EXIT_FAILURE);
+ rspamd_fprintf(stderr, "cannot open %s: %s\n", fname,
+ strerror(errno));
+ exit(EXIT_FAILURE);
}
}
- rspamd_snprintf (tmppath, sizeof (tmppath),
- "%s/rspamd_sign-XXXXXXXXXX", tmpdir);
- mode_t cur_umask = umask (S_IRWXO|S_IRWXG);
- fd_out = mkstemp (tmppath);
- (void)umask (cur_umask);
+ rspamd_snprintf(tmppath, sizeof(tmppath),
+ "%s/rspamd_sign-XXXXXXXXXX", tmpdir);
+ mode_t cur_umask = umask(S_IRWXO | S_IRWXG);
+ fd_out = mkstemp(tmppath);
+ (void) umask(cur_umask);
if (fd_out == -1) {
- rspamd_fprintf (stderr, "cannot open tempfile %s: %s\n", tmppath,
- strerror (errno));
- exit (EXIT_FAILURE);
+ rspamd_fprintf(stderr, "cannot open tempfile %s: %s\n", tmppath,
+ strerror(errno));
+ exit(EXIT_FAILURE);
}
- if (len > 0 && write (fd_out, map, len) == -1) {
- rspamd_fprintf (stderr, "cannot write to tempfile %s: %s\n", tmppath,
- strerror (errno));
- unlink (tmppath);
- munmap (map, len);
- close (fd_out);
- exit (EXIT_FAILURE);
+ if (len > 0 && write(fd_out, map, len) == -1) {
+ rspamd_fprintf(stderr, "cannot write to tempfile %s: %s\n", tmppath,
+ strerror(errno));
+ unlink(tmppath);
+ munmap(map, len);
+ close(fd_out);
+ exit(EXIT_FAILURE);
}
if (len > 0) {
- munmap (map, len);
+ munmap(map, len);
}
- fsync (fd_out);
- close (fd_out);
+ fsync(fd_out);
+ close(fd_out);
/* Now we spawn editor with the filename as argument */
- rspamd_snprintf (run_cmdline, sizeof (run_cmdline), "%s %s", editor, tmppath);
- if (!g_shell_parse_argv (run_cmdline, &child_argc,
- &child_argv, &err)) {
- rspamd_fprintf (stderr, "cannot exec %s: %e\n", editor,
- err);
- unlink (tmppath);
- exit (EXIT_FAILURE);
+ rspamd_snprintf(run_cmdline, sizeof(run_cmdline), "%s %s", editor, tmppath);
+ if (!g_shell_parse_argv(run_cmdline, &child_argc,
+ &child_argv, &err)) {
+ rspamd_fprintf(stderr, "cannot exec %s: %e\n", editor,
+ err);
+ unlink(tmppath);
+ exit(EXIT_FAILURE);
}
- if (!g_spawn_async (NULL, child_argv, NULL,
- G_SPAWN_CHILD_INHERITS_STDIN|G_SPAWN_SEARCH_PATH|G_SPAWN_DO_NOT_REAP_CHILD,
- NULL, NULL, &child_pid, &err)) {
- rspamd_fprintf (stderr, "cannot exec %s: %e\n", editor,
- err);
- unlink (tmppath);
- exit (EXIT_FAILURE);
+ if (!g_spawn_async(NULL, child_argv, NULL,
+ G_SPAWN_CHILD_INHERITS_STDIN | G_SPAWN_SEARCH_PATH | G_SPAWN_DO_NOT_REAP_CHILD,
+ NULL, NULL, &child_pid, &err)) {
+ rspamd_fprintf(stderr, "cannot exec %s: %e\n", editor,
+ err);
+ unlink(tmppath);
+ exit(EXIT_FAILURE);
}
- g_strfreev (child_argv);
+ g_strfreev(child_argv);
for (;;) {
- if (waitpid ((pid_t)child_pid, &retcode, 0) != -1) {
+ if (waitpid((pid_t) child_pid, &retcode, 0) != -1) {
break;
}
if (errno != EINTR) {
- rspamd_fprintf (stderr, "failed to wait for %s: %s\n", editor,
- strerror (errno));
- unlink (tmppath);
- exit (EXIT_FAILURE);
+ rspamd_fprintf(stderr, "failed to wait for %s: %s\n", editor,
+ strerror(errno));
+ unlink(tmppath);
+ exit(EXIT_FAILURE);
}
}
#if GLIB_MAJOR_VERSION >= 2 && GLIB_MINOR_VERSION >= 34
-# if GLIB_MINOR_VERSION >= 70
- if (!g_spawn_check_wait_status (retcode, &err)) {
-# else
- if (!g_spawn_check_exit_status (retcode, &err)) {
-# endif
- unlink (tmppath);
- rspamd_fprintf (stderr, "%s returned error code: %d - %e\n", editor,
- retcode, err);
- exit (EXIT_FAILURE);
+#if GLIB_MINOR_VERSION >= 70
+ if (!g_spawn_check_wait_status(retcode, &err)) {
+#else
+ if (!g_spawn_check_exit_status(retcode, &err)) {
+#endif
+ unlink(tmppath);
+ rspamd_fprintf(stderr, "%s returned error code: %d - %e\n", editor,
+ retcode, err);
+ exit(EXIT_FAILURE);
}
#else
if (retcode != 0) {
- unlink (tmppath);
- rspamd_fprintf (stderr, "%s returned error code: %d\n", editor,
- retcode);
- exit (retcode);
+ unlink(tmppath);
+ rspamd_fprintf(stderr, "%s returned error code: %d\n", editor,
+ retcode);
+ exit(retcode);
}
#endif
- map = rspamd_file_xmap (tmppath, PROT_READ, &len, TRUE);
+ map = rspamd_file_xmap(tmppath, PROT_READ, &len, TRUE);
if (map == NULL) {
- rspamd_fprintf (stderr, "cannot map %s: %s\n", tmppath,
- strerror (errno));
- unlink (tmppath);
- exit (EXIT_FAILURE);
+ rspamd_fprintf(stderr, "cannot map %s: %s\n", tmppath,
+ strerror(errno));
+ unlink(tmppath);
+ exit(EXIT_FAILURE);
}
- rspamd_snprintf (run_cmdline, sizeof (run_cmdline), "%s.new", fname);
- fd_out = rspamd_file_xopen (run_cmdline, O_RDWR | O_CREAT | O_TRUNC, 00600,
- 0);
+ rspamd_snprintf(run_cmdline, sizeof(run_cmdline), "%s.new", fname);
+ fd_out = rspamd_file_xopen(run_cmdline, O_RDWR | O_CREAT | O_TRUNC, 00600,
+ 0);
if (fd_out == -1) {
- rspamd_fprintf (stderr, "cannot open new file %s: %s\n", run_cmdline,
- strerror (errno));
- unlink (tmppath);
- munmap (map, len);
- exit (EXIT_FAILURE);
+ rspamd_fprintf(stderr, "cannot open new file %s: %s\n", run_cmdline,
+ strerror(errno));
+ unlink(tmppath);
+ munmap(map, len);
+ exit(EXIT_FAILURE);
}
- if (write (fd_out, map, len) == -1) {
- rspamd_fprintf (stderr, "cannot write new file %s: %s\n", run_cmdline,
- strerror (errno));
- unlink (tmppath);
- unlink (run_cmdline);
- close (fd_out);
- munmap (map, len);
- exit (EXIT_FAILURE);
+ if (write(fd_out, map, len) == -1) {
+ rspamd_fprintf(stderr, "cannot write new file %s: %s\n", run_cmdline,
+ strerror(errno));
+ unlink(tmppath);
+ unlink(run_cmdline);
+ close(fd_out);
+ munmap(map, len);
+ exit(EXIT_FAILURE);
}
- unlink (tmppath);
- (void)lseek (fd_out, 0, SEEK_SET);
- munmap (map, len);
+ unlink(tmppath);
+ (void) lseek(fd_out, 0, SEEK_SET);
+ munmap(map, len);
return fd_out;
}
static bool
-rspamadm_sign_file (const gchar *fname, struct rspamd_cryptobox_keypair *kp)
+rspamadm_sign_file(const gchar *fname, struct rspamd_cryptobox_keypair *kp)
{
gint fd_sig, fd_input;
guchar sig[rspamd_cryptobox_MAX_SIGBYTES], *map;
@@ -294,98 +293,98 @@ rspamadm_sign_file (const gchar *fname, struct rspamd_cryptobox_keypair *kp)
if (edit) {
/* We need to open editor and then sign the temporary file */
- fd_input = rspamadm_edit_file (fname);
+ fd_input = rspamadm_edit_file(fname);
}
else {
- fd_input = rspamd_file_xopen (fname, O_RDONLY, 0, TRUE);
+ fd_input = rspamd_file_xopen(fname, O_RDONLY, 0, TRUE);
}
if (fd_input == -1) {
- rspamd_fprintf (stderr, "cannot open %s: %s\n", fname,
- strerror (errno));
- exit (EXIT_FAILURE);
+ rspamd_fprintf(stderr, "cannot open %s: %s\n", fname,
+ strerror(errno));
+ exit(EXIT_FAILURE);
}
- g_assert (fstat (fd_input, &st) != -1);
+ g_assert(fstat(fd_input, &st) != -1);
- rspamd_snprintf (sigpath, sizeof (sigpath), "%s%s", fname, suffix);
- fd_sig = rspamd_file_xopen (sigpath, O_WRONLY | O_CREAT | O_TRUNC, 00644, 0);
+ rspamd_snprintf(sigpath, sizeof(sigpath), "%s%s", fname, suffix);
+ fd_sig = rspamd_file_xopen(sigpath, O_WRONLY | O_CREAT | O_TRUNC, 00644, 0);
if (fd_sig == -1) {
- close (fd_input);
- rspamd_fprintf (stderr, "cannot open %s: %s\n", sigpath,
- strerror (errno));
- exit (EXIT_FAILURE);
+ close(fd_input);
+ rspamd_fprintf(stderr, "cannot open %s: %s\n", sigpath,
+ strerror(errno));
+ exit(EXIT_FAILURE);
}
- map = mmap (NULL, st.st_size, PROT_READ, MAP_SHARED, fd_input, 0);
- close (fd_input);
+ map = mmap(NULL, st.st_size, PROT_READ, MAP_SHARED, fd_input, 0);
+ close(fd_input);
if (map == MAP_FAILED) {
- close (fd_sig);
- rspamd_fprintf (stderr, "cannot map %s: %s\n", fname,
- strerror (errno));
- exit (EXIT_FAILURE);
+ close(fd_sig);
+ rspamd_fprintf(stderr, "cannot map %s: %s\n", fname,
+ strerror(errno));
+ exit(EXIT_FAILURE);
}
- g_assert (rspamd_cryptobox_MAX_SIGBYTES >=
- rspamd_cryptobox_signature_bytes (mode));
+ g_assert(rspamd_cryptobox_MAX_SIGBYTES >=
+ rspamd_cryptobox_signature_bytes(mode));
- sk = rspamd_keypair_component (kp, RSPAMD_KEYPAIR_COMPONENT_SK, NULL);
- rspamd_cryptobox_sign (sig, NULL, map, st.st_size, sk, mode);
+ sk = rspamd_keypair_component(kp, RSPAMD_KEYPAIR_COMPONENT_SK, NULL);
+ rspamd_cryptobox_sign(sig, NULL, map, st.st_size, sk, mode);
if (edit) {
/* We also need to rename .new file */
- rspamd_snprintf (sigpath, sizeof (sigpath), "%s.new", fname);
+ rspamd_snprintf(sigpath, sizeof(sigpath), "%s.new", fname);
- if (rename (sigpath, fname) == -1) {
- rspamd_fprintf (stderr, "cannot rename %s to %s: %s\n", sigpath, fname,
- strerror (errno));
- exit (EXIT_FAILURE);
+ if (rename(sigpath, fname) == -1) {
+ rspamd_fprintf(stderr, "cannot rename %s to %s: %s\n", sigpath, fname,
+ strerror(errno));
+ exit(EXIT_FAILURE);
}
- unlink (sigpath);
+ unlink(sigpath);
}
- rspamd_snprintf (sigpath, sizeof (sigpath), "%s%s", fname, suffix);
+ rspamd_snprintf(sigpath, sizeof(sigpath), "%s%s", fname, suffix);
- if (write (fd_sig, sig, rspamd_cryptobox_signature_bytes (mode)) == -1) {
- rspamd_fprintf (stderr, "cannot write signature to %s: %s\n", sigpath,
- strerror (errno));
- exit (EXIT_FAILURE);
+ if (write(fd_sig, sig, rspamd_cryptobox_signature_bytes(mode)) == -1) {
+ rspamd_fprintf(stderr, "cannot write signature to %s: %s\n", sigpath,
+ strerror(errno));
+ exit(EXIT_FAILURE);
}
- close (fd_sig);
- munmap (map, st.st_size);
+ close(fd_sig);
+ munmap(map, st.st_size);
if (!quiet) {
- rspamd_fprintf (stdout, "signed %s; stored hash in %s\n",
- fname, sigpath);
+ rspamd_fprintf(stdout, "signed %s; stored hash in %s\n",
+ fname, sigpath);
}
if (pubout) {
GString *b32_pk;
- pub_fp = fopen (pubout, "w");
+ pub_fp = fopen(pubout, "w");
if (pub_fp == NULL) {
- rspamd_fprintf (stderr, "cannot write pubkey to %s: %s",
- pubout, strerror (errno));
+ rspamd_fprintf(stderr, "cannot write pubkey to %s: %s",
+ pubout, strerror(errno));
}
else {
- b32_pk = rspamd_keypair_print (kp,
- RSPAMD_KEYPAIR_PUBKEY|RSPAMD_KEYPAIR_BASE32);
+ b32_pk = rspamd_keypair_print(kp,
+ RSPAMD_KEYPAIR_PUBKEY | RSPAMD_KEYPAIR_BASE32);
if (b32_pk) {
- rspamd_fprintf (pub_fp, "%v", b32_pk);
- g_string_free (b32_pk, TRUE);
+ rspamd_fprintf(pub_fp, "%v", b32_pk);
+ g_string_free(b32_pk, TRUE);
}
- fclose (pub_fp);
+ fclose(pub_fp);
}
if (!quiet) {
- rspamd_fprintf (stdout, "stored pubkey in %s\n",
- pubout);
+ rspamd_fprintf(stdout, "stored pubkey in %s\n",
+ pubout);
}
}
@@ -393,7 +392,7 @@ rspamadm_sign_file (const gchar *fname, struct rspamd_cryptobox_keypair *kp)
}
static bool
-rspamadm_verify_file (const gchar *fname, const guchar *pk)
+rspamadm_verify_file(const gchar *fname, const guchar *pk)
{
gint fd_sig, fd_input;
guchar *map, *map_sig;
@@ -401,75 +400,75 @@ rspamadm_verify_file (const gchar *fname, const guchar *pk)
struct stat st, st_sig;
bool ret;
- g_assert (rspamd_cryptobox_MAX_SIGBYTES >=
- rspamd_cryptobox_signature_bytes (mode));
+ g_assert(rspamd_cryptobox_MAX_SIGBYTES >=
+ rspamd_cryptobox_signature_bytes(mode));
if (suffix == NULL) {
suffix = ".sig";
}
- fd_input = rspamd_file_xopen (fname, O_RDONLY, 0, TRUE);
+ fd_input = rspamd_file_xopen(fname, O_RDONLY, 0, TRUE);
if (fd_input == -1) {
- rspamd_fprintf (stderr, "cannot open %s: %s\n", fname,
- strerror (errno));
- exit (EXIT_FAILURE);
+ rspamd_fprintf(stderr, "cannot open %s: %s\n", fname,
+ strerror(errno));
+ exit(EXIT_FAILURE);
}
- g_assert (fstat (fd_input, &st) != -1);
+ g_assert(fstat(fd_input, &st) != -1);
- rspamd_snprintf (sigpath, sizeof (sigpath), "%s%s", fname, suffix);
- fd_sig = rspamd_file_xopen (sigpath, O_RDONLY, 0, TRUE);
+ rspamd_snprintf(sigpath, sizeof(sigpath), "%s%s", fname, suffix);
+ fd_sig = rspamd_file_xopen(sigpath, O_RDONLY, 0, TRUE);
if (fd_sig == -1) {
- close (fd_input);
- rspamd_fprintf (stderr, "cannot open %s: %s\n", sigpath,
- strerror (errno));
- exit (EXIT_FAILURE);
+ close(fd_input);
+ rspamd_fprintf(stderr, "cannot open %s: %s\n", sigpath,
+ strerror(errno));
+ exit(EXIT_FAILURE);
}
- map = mmap (NULL, st.st_size, PROT_READ, MAP_SHARED, fd_input, 0);
- close (fd_input);
+ map = mmap(NULL, st.st_size, PROT_READ, MAP_SHARED, fd_input, 0);
+ close(fd_input);
if (map == MAP_FAILED) {
- close (fd_sig);
- rspamd_fprintf (stderr, "cannot open %s: %s\n", sigpath,
- strerror (errno));
- exit (EXIT_FAILURE);
+ close(fd_sig);
+ rspamd_fprintf(stderr, "cannot open %s: %s\n", sigpath,
+ strerror(errno));
+ exit(EXIT_FAILURE);
}
- g_assert (fstat (fd_sig, &st_sig) != -1);
+ g_assert(fstat(fd_sig, &st_sig) != -1);
- if (st_sig.st_size != rspamd_cryptobox_signature_bytes (mode)) {
- close (fd_sig);
- rspamd_fprintf (stderr, "invalid signature size %s: %ud\n", fname,
- (guint)st_sig.st_size);
- munmap (map, st.st_size);
- exit (EXIT_FAILURE);
+ if (st_sig.st_size != rspamd_cryptobox_signature_bytes(mode)) {
+ close(fd_sig);
+ rspamd_fprintf(stderr, "invalid signature size %s: %ud\n", fname,
+ (guint) st_sig.st_size);
+ munmap(map, st.st_size);
+ exit(EXIT_FAILURE);
}
- map_sig = mmap (NULL, st_sig.st_size, PROT_READ, MAP_SHARED, fd_sig, 0);
- close (fd_sig);
+ map_sig = mmap(NULL, st_sig.st_size, PROT_READ, MAP_SHARED, fd_sig, 0);
+ close(fd_sig);
if (map_sig == MAP_FAILED) {
- munmap (map, st.st_size);
- rspamd_fprintf (stderr, "cannot map %s: %s\n", sigpath,
- strerror (errno));
- exit (EXIT_FAILURE);
+ munmap(map, st.st_size);
+ rspamd_fprintf(stderr, "cannot map %s: %s\n", sigpath,
+ strerror(errno));
+ exit(EXIT_FAILURE);
}
- ret = rspamd_cryptobox_verify (map_sig, st_sig.st_size,
- map, st.st_size, pk, mode);
- munmap (map, st.st_size);
- munmap (map_sig, st_sig.st_size);
+ ret = rspamd_cryptobox_verify(map_sig, st_sig.st_size,
+ map, st.st_size, pk, mode);
+ munmap(map, st.st_size);
+ munmap(map_sig, st_sig.st_size);
if (!ret) {
- rspamd_fprintf (stderr, "cannot verify %s using %s: invalid signature\n",
- fname, sigpath);
+ rspamd_fprintf(stderr, "cannot verify %s using %s: invalid signature\n",
+ fname, sigpath);
}
else if (!quiet) {
- rspamd_fprintf (stdout, "verified %s using %s\n",
- fname, sigpath);
+ rspamd_fprintf(stdout, "verified %s using %s\n",
+ fname, sigpath);
}
return ret;
@@ -477,7 +476,7 @@ rspamadm_verify_file (const gchar *fname, const guchar *pk)
static void
-rspamadm_signtool (gint argc, gchar **argv, const struct rspamadm_command *cmd)
+rspamadm_signtool(gint argc, gchar **argv, const struct rspamadm_command *cmd)
{
GOptionContext *context;
GError *error = NULL;
@@ -488,139 +487,137 @@ rspamadm_signtool (gint argc, gchar **argv, const struct rspamadm_command *cmd)
gsize fsize, flen;
gint i;
- context = g_option_context_new (
- "keypair - create encryption keys");
- g_option_context_set_summary (context,
- "Summary:\n Rspamd administration utility version "
- RVERSION
- "\n Release id: "
- RID);
- g_option_context_add_main_entries (context, entries, NULL);
+ context = g_option_context_new(
+ "keypair - create encryption keys");
+ g_option_context_set_summary(context,
+ "Summary:\n Rspamd administration utility version " RVERSION
+ "\n Release id: " RID);
+ g_option_context_add_main_entries(context, entries, NULL);
- if (!g_option_context_parse (context, &argc, &argv, &error)) {
- rspamd_fprintf (stderr, "option parsing failed: %s\n", error->message);
- g_error_free (error);
- g_option_context_free (context);
- exit (EXIT_FAILURE);
+ if (!g_option_context_parse(context, &argc, &argv, &error)) {
+ rspamd_fprintf(stderr, "option parsing failed: %s\n", error->message);
+ g_error_free(error);
+ g_option_context_free(context);
+ exit(EXIT_FAILURE);
}
- g_option_context_free (context);
+ g_option_context_free(context);
if (openssl) {
mode = RSPAMD_CRYPTOBOX_MODE_NIST;
}
if (verify && (!pubkey && !pubkey_file)) {
- rspamd_fprintf (stderr, "no pubkey for verification\n");
- exit (EXIT_FAILURE);
+ rspamd_fprintf(stderr, "no pubkey for verification\n");
+ exit(EXIT_FAILURE);
}
else if (!verify && (!keypair_file)) {
- rspamd_fprintf (stderr, "no keypair for signing\n");
- exit (EXIT_FAILURE);
+ rspamd_fprintf(stderr, "no keypair for signing\n");
+ exit(EXIT_FAILURE);
}
if (verify) {
- g_assert (pubkey || pubkey_file);
+ g_assert(pubkey || pubkey_file);
if (pubkey_file) {
gint fd;
gchar *map;
struct stat st;
- fd = open (pubkey_file, O_RDONLY);
+ fd = open(pubkey_file, O_RDONLY);
if (fd == -1) {
- rspamd_fprintf (stderr, "cannot open %s: %s\n", pubkey_file,
- strerror (errno));
- exit (EXIT_FAILURE);
+ rspamd_fprintf(stderr, "cannot open %s: %s\n", pubkey_file,
+ strerror(errno));
+ exit(EXIT_FAILURE);
}
- g_assert (fstat (fd, &st) != -1);
+ g_assert(fstat(fd, &st) != -1);
fsize = st.st_size;
flen = fsize;
- map = mmap (NULL, fsize, PROT_READ, MAP_SHARED, fd, 0);
- close (fd);
+ map = mmap(NULL, fsize, PROT_READ, MAP_SHARED, fd, 0);
+ close(fd);
if (map == MAP_FAILED) {
- rspamd_fprintf (stderr, "cannot read %s: %s\n", pubkey_file,
- strerror (errno));
- exit (EXIT_FAILURE);
+ rspamd_fprintf(stderr, "cannot read %s: %s\n", pubkey_file,
+ strerror(errno));
+ exit(EXIT_FAILURE);
}
/* XXX: assume base32 pubkey now */
- while (flen > 0 && g_ascii_isspace (map[flen - 1])) {
- flen --;
+ while (flen > 0 && g_ascii_isspace(map[flen - 1])) {
+ flen--;
}
- pk = rspamd_pubkey_from_base32 (map, flen,
- RSPAMD_KEYPAIR_SIGN, mode);
+ pk = rspamd_pubkey_from_base32(map, flen,
+ RSPAMD_KEYPAIR_SIGN, mode);
if (pk == NULL) {
- rspamd_fprintf (stderr, "bad size %s: %ud, %ud expected\n",
- pubkey_file,
- (guint)flen,
- rspamd_cryptobox_pk_sig_bytes (mode));
- exit (EXIT_FAILURE);
+ rspamd_fprintf(stderr, "bad size %s: %ud, %ud expected\n",
+ pubkey_file,
+ (guint) flen,
+ rspamd_cryptobox_pk_sig_bytes(mode));
+ exit(EXIT_FAILURE);
}
- munmap (map, fsize);
+ munmap(map, fsize);
}
else {
- pk = rspamd_pubkey_from_base32 (pubkey, strlen (pubkey),
- RSPAMD_KEYPAIR_SIGN, mode);
+ pk = rspamd_pubkey_from_base32(pubkey, strlen(pubkey),
+ RSPAMD_KEYPAIR_SIGN, mode);
if (pk == NULL) {
- rspamd_fprintf (stderr, "bad size %s: %ud, %ud expected\n",
- pubkey_file,
- (guint)strlen (pubkey),
- rspamd_cryptobox_pk_sig_bytes (mode));
- exit (EXIT_FAILURE);
+ rspamd_fprintf(stderr, "bad size %s: %ud, %ud expected\n",
+ pubkey_file,
+ (guint) strlen(pubkey),
+ rspamd_cryptobox_pk_sig_bytes(mode));
+ exit(EXIT_FAILURE);
}
}
for (i = 1; i < argc; i++) {
/* XXX: support cmd line signature */
- if (!rspamadm_verify_file (argv[i], rspamd_pubkey_get_pk (pk, NULL))) {
- exit (EXIT_FAILURE);
+ if (!rspamadm_verify_file(argv[i], rspamd_pubkey_get_pk(pk, NULL))) {
+ exit(EXIT_FAILURE);
}
}
- g_free (pk);
+ g_free(pk);
}
else {
- g_assert (keypair_file != NULL);
+ g_assert(keypair_file != NULL);
- parser = ucl_parser_new (0);
+ parser = ucl_parser_new(0);
- if (!ucl_parser_add_file (parser, keypair_file) ||
- (top = ucl_parser_get_object (parser)) == NULL) {
- rspamd_fprintf (stderr, "cannot load keypair: %s\n",
- ucl_parser_get_error (parser));
- exit (EXIT_FAILURE);
+ if (!ucl_parser_add_file(parser, keypair_file) ||
+ (top = ucl_parser_get_object(parser)) == NULL) {
+ rspamd_fprintf(stderr, "cannot load keypair: %s\n",
+ ucl_parser_get_error(parser));
+ exit(EXIT_FAILURE);
}
- ucl_parser_free (parser);
+ ucl_parser_free(parser);
- kp = rspamd_keypair_from_ucl (top);
+ kp = rspamd_keypair_from_ucl(top);
if (kp == NULL) {
- rspamd_fprintf (stderr, "invalid signing key\n");
- exit (EXIT_FAILURE);
+ rspamd_fprintf(stderr, "invalid signing key\n");
+ exit(EXIT_FAILURE);
}
- if (rspamd_keypair_type (kp) != RSPAMD_KEYPAIR_SIGN) {
- rspamd_fprintf (stderr, "unsuitable for signing key\n");
- exit (EXIT_FAILURE);
+ if (rspamd_keypair_type(kp) != RSPAMD_KEYPAIR_SIGN) {
+ rspamd_fprintf(stderr, "unsuitable for signing key\n");
+ exit(EXIT_FAILURE);
}
for (i = 1; i < argc; i++) {
/* XXX: support cmd line signature */
- if (!rspamadm_sign_file (argv[i], kp)) {
- rspamd_keypair_unref (kp);
- exit (EXIT_FAILURE);
+ if (!rspamadm_sign_file(argv[i], kp)) {
+ rspamd_keypair_unref(kp);
+ exit(EXIT_FAILURE);
}
}
- rspamd_keypair_unref (kp);
+ rspamd_keypair_unref(kp);
}
}