Clearsigning is how we do signatures by default now. Detached signature file stays as an option. Having a PGP-like non-cleartext non-detached file doesn't really look much useful and brings complexity. Axed.
365 lines
8.3 KiB
C++
365 lines
8.3 KiB
C++
|
|
/*
|
|
* This file is part of Codecrypt.
|
|
*
|
|
* Codecrypt is free software: you can redistribute it and/or modify it
|
|
* under the terms of the GNU Lesser General Public License as published by
|
|
* the Free Software Foundation, either version 3 of the License, or (at
|
|
* your option) any later version.
|
|
*
|
|
* Codecrypt is distributed in the hope that it will be useful, but WITHOUT
|
|
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
|
|
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU Lesser General Public
|
|
* License for more details.
|
|
*
|
|
* You should have received a copy of the GNU Lesser General Public License
|
|
* along with Codecrypt. If not, see <http://www.gnu.org/licenses/>.
|
|
*/
|
|
|
|
#include "outhelpers.h"
|
|
|
|
void print_version()
|
|
{
|
|
out ("codecrypt " PACKAGE_VERSION);
|
|
out ("Copyright (C) 2013 Mirek Kratochvil <exa.exa@gmail.com>");
|
|
out ("This is free software; see the source "
|
|
"for copying conditions. There is NO");
|
|
out ("warranty; not even for MERCHANTABILITY "
|
|
"or FITNESS FOR A PARTICULAR PURPOSE.");
|
|
}
|
|
|
|
void print_help (char*pname)
|
|
{
|
|
print_version();
|
|
outeol;
|
|
out ("Usage: " << pname << " [options]");
|
|
outeol;
|
|
out ("Common options:");
|
|
out (" -h, --help display this help");
|
|
out (" -V, --version display version information");
|
|
out (" -T, --test perform (probably nonexistent) testing/debugging stuff");
|
|
outeol;
|
|
out ("Global options:");
|
|
out (" -R, --in input file, default is stdin");
|
|
out (" -o, --out output file, default is stdout");
|
|
out (" -a, --armor use ascii-armored I/O");
|
|
out (" -y, --yes assume that answer is `yes' everytime");
|
|
outeol;
|
|
out ("Actions:");
|
|
out (" -s, --sign sign a message");
|
|
out (" -v, --verify verify a signed message");
|
|
out (" -e, --encrypt encrypt a message");
|
|
out (" -d, --decrypt decrypt an encrypted message");
|
|
outeol;
|
|
out ("Action options:");
|
|
out (" -r, --recipient encrypt for given user");
|
|
out (" -u, --user use specified secret key");
|
|
out (" -b, --detach-sign specify detached signature file");
|
|
outeol;
|
|
out ("Key management:");
|
|
out (" -g, --gen-key generate specified keypair");
|
|
out (" -k, --list list matching keys");
|
|
out (" -K, --list-secret");
|
|
out (" -i, --import import keys (optionally rename them)");
|
|
out (" -I, --import-secret");
|
|
out (" -p, --export export matching keys");
|
|
out (" -P, --export-secret");
|
|
out (" -x, --delete delete matching keys");
|
|
out (" -X, --delete-secret");
|
|
out (" -m, --rename rename matching keys");
|
|
out (" -M, --rename-secret");
|
|
outeol;
|
|
out ("Key management options:");
|
|
out (" -n, --no-action on import, only show what would be imported");
|
|
out (" -N, --name specify a new name for renaming or importing");
|
|
out (" -F, --filter only work with keys with matching names");
|
|
out (" -f, --fingerprint format key IDs nicely for human eyes");
|
|
outeol;
|
|
out ("Codecrypt eats data. Use it with caution.");
|
|
outeol;
|
|
}
|
|
|
|
/*
|
|
* testing
|
|
*/
|
|
|
|
void test()
|
|
{
|
|
/*
|
|
* Dear hacker,
|
|
* use this function for quicktesting your stuff.
|
|
* Other places suck for that purpose.
|
|
*/
|
|
}
|
|
|
|
/*
|
|
* main module. Parse options, fire up stuff, pass commands to it.
|
|
*/
|
|
|
|
#include <getopt.h>
|
|
|
|
#include "actions.h"
|
|
#include "algo_suite.h"
|
|
|
|
int main (int argc, char**argv)
|
|
{
|
|
//option variables
|
|
bool do_help = false,
|
|
do_version = false,
|
|
do_test = false,
|
|
has_opt = false,
|
|
opt_armor = false,
|
|
opt_yes = false,
|
|
opt_fingerprint = false,
|
|
opt_import_no_action = false;
|
|
|
|
std::string recipient, user,
|
|
input, output,
|
|
name, filter,
|
|
action_param,
|
|
detach_sign;
|
|
|
|
char action = 0;
|
|
|
|
int c, option_index;
|
|
for (;;) {
|
|
static struct option long_opts[] = {
|
|
{"help", 0, 0, 'h' },
|
|
{"version", 0, 0, 'V' },
|
|
{"test", 0, 0, 'T' },
|
|
|
|
//global options
|
|
{"armor", 0, 0, 'a' },
|
|
{"yes", 0, 0, 'y' },
|
|
{"recipient", 1, 0, 'r' },
|
|
{"user", 1, 0, 'u' },
|
|
|
|
//I/O redirection from default stdin/out
|
|
{"in", 1, 0, 'R' },
|
|
{"out", 1, 0, 'o' },
|
|
|
|
//keyring management
|
|
{"list", 0, 0, 'k' },
|
|
{"import", 0, 0, 'i' },
|
|
{"export", 0, 0, 'p' },
|
|
{"delete", 1, 0, 'x' },
|
|
{"rename", 1, 0, 'm' },
|
|
|
|
{"list-secret", 0, 0, 'K' },
|
|
{"import-secret", 0, 0, 'I' },
|
|
{"export-secret", 0, 0, 'P' },
|
|
{"delete-secret", 1, 0, 'X' },
|
|
{"rename-secret", 1, 0, 'M' },
|
|
|
|
{"gen-key", 1, 0, 'g' },
|
|
|
|
{"name", 1, 0, 'N' },
|
|
{"filter", 1, 0, 'F' },
|
|
|
|
{"fingerprint", 0, 0, 'f' },
|
|
{"no-action", 0, 0, 'n' },
|
|
|
|
//actions
|
|
{"sign", 0, 0, 's' },
|
|
{"verify", 0, 0, 'v' },
|
|
{"encrypt", 0, 0, 'e' },
|
|
{"decrypt", 0, 0, 'd' },
|
|
|
|
//action options
|
|
{"detach-sign", 1, 0, 'b' },
|
|
|
|
{0, 0, 0, 0 }
|
|
};
|
|
|
|
option_index = -1;
|
|
c = getopt_long
|
|
(argc, argv,
|
|
"hVTayr:u:R:o:kipx:m:KIPX:M:g:N:F:fnsvedb:",
|
|
long_opts, &option_index);
|
|
if (c == -1) break;
|
|
|
|
has_opt = true;
|
|
switch (c) {
|
|
case '?':
|
|
case ':':
|
|
case 'h':
|
|
do_help = true;
|
|
break;
|
|
|
|
#define read_flag(ch,var) case ch: var=true; break;
|
|
|
|
#define read_single_opt(ch,var,errmsg) \
|
|
case ch: if(var.length()) {progerr(errmsg); do_help=true;}\
|
|
else var=optarg; break;
|
|
|
|
#define read_action(ch) read_action_comb(ch,0,0)
|
|
|
|
#define read_action_comb(ch, hit, comb) \
|
|
case ch: \
|
|
if(hit && action==hit) { \
|
|
action=comb; \
|
|
if(optarg) action_param=optarg; \
|
|
} else if(action) { \
|
|
progerr("please specify a single action"); \
|
|
do_help=true; \
|
|
} else { \
|
|
action=ch; \
|
|
if(optarg) action_param=optarg; \
|
|
} break;
|
|
|
|
|
|
|
|
read_flag ('V', do_version)
|
|
read_flag ('T', do_test)
|
|
read_flag ('a', opt_armor)
|
|
read_flag ('y', opt_yes)
|
|
|
|
read_single_opt ('r', recipient,
|
|
"specify only one recipient")
|
|
read_single_opt ('u', user,
|
|
"specify only one local user")
|
|
read_single_opt ('R', input,
|
|
"cannot accept multiple inputs")
|
|
read_single_opt ('o', output,
|
|
"cannot accept multiple outputs")
|
|
|
|
read_action ('k')
|
|
read_action ('i')
|
|
read_action ('p')
|
|
read_action ('x')
|
|
read_action ('m')
|
|
|
|
read_action ('K')
|
|
read_action ('I')
|
|
read_action ('P')
|
|
read_action ('X')
|
|
read_action ('M')
|
|
|
|
read_action ('g')
|
|
|
|
read_single_opt ('N', name,
|
|
"please specify single name")
|
|
read_single_opt ('F', filter,
|
|
"please specify single filter string")
|
|
|
|
read_flag ('f', opt_fingerprint)
|
|
read_flag ('n', opt_import_no_action)
|
|
|
|
/*
|
|
* combinations of s+e and d+v are possible. result is
|
|
* 'E' = "big encrypt with sig" and 'D' "big decrypt
|
|
* with verify".
|
|
*/
|
|
read_action_comb ('s', 'e', 'E')
|
|
read_action_comb ('v', 'd', 'D')
|
|
read_action_comb ('e', 's', 'E')
|
|
read_action_comb ('d', 'v', 'D')
|
|
|
|
read_single_opt ('b', detach_sign,
|
|
"specify only one detach-sign file")
|
|
|
|
#undef read_flag
|
|
#undef read_single_opt
|
|
#undef read_action
|
|
|
|
default: //which doesn't just happen.
|
|
do_help = true;
|
|
break;
|
|
}
|
|
}
|
|
|
|
if (optind != argc) {
|
|
for (int i = 0; i < argc; ++i) out (argv[i]);
|
|
err (argv[0] << ": unmatched non-option parameters");
|
|
do_help = true;
|
|
}
|
|
|
|
if ( (!has_opt) || do_help) {
|
|
print_help (argv[0]);
|
|
return 0;
|
|
}
|
|
|
|
if (do_version) {
|
|
print_version();
|
|
return 0;
|
|
}
|
|
|
|
/*
|
|
* something will be happening, therefore init everything
|
|
*/
|
|
|
|
int exitval = 0;
|
|
keyring KR;
|
|
algorithm_suite AS;
|
|
|
|
//keyring initialization
|
|
if (!KR.open() ) {
|
|
err ("could not open keyring!");
|
|
return 1;
|
|
}
|
|
|
|
if (!KR.load() ) {
|
|
err ("could not load keyring!");
|
|
exitval = 1;
|
|
goto exit_ok;
|
|
}
|
|
|
|
//register all available algorithms
|
|
fill_algorithm_suite (AS);
|
|
|
|
/*
|
|
* check the option flags and do whatever was requested
|
|
*/
|
|
|
|
if (do_test) {
|
|
test();
|
|
goto exit_ok;
|
|
}
|
|
|
|
switch (action) {
|
|
case 'g':
|
|
exitval = action_keygen (action_param, name, KR, AS);
|
|
break;
|
|
|
|
case 'e':
|
|
case 'd':
|
|
case 's':
|
|
case 'v':
|
|
case 'E':
|
|
case 'D':
|
|
|
|
case 'k':
|
|
case 'i':
|
|
case 'p':
|
|
case 'x':
|
|
case 'm':
|
|
case 'K':
|
|
case 'I':
|
|
case 'P':
|
|
case 'X':
|
|
case 'M':
|
|
|
|
default:
|
|
progerr ("no action specified, use `--help'");
|
|
exitval = 1;
|
|
break;
|
|
|
|
}
|
|
|
|
/*
|
|
* all done.
|
|
* keyring is _not_ automatically saved here to prevent frequent
|
|
* rewriting and due the fact that everything that modifies it _must_
|
|
* also ensure and verify that it was written back correctly.
|
|
*/
|
|
|
|
exit_ok:
|
|
if (!KR.close() ) {
|
|
err ("could not close keyring, "
|
|
"something weird is going to happen.");
|
|
}
|
|
|
|
return exitval;
|
|
}
|
|
|