2013-10-05 15:08:04 +05:30
|
|
|
/*-
|
|
|
|
* Copyright (c) 2013 Juan Romero Pardines.
|
|
|
|
* All rights reserved.
|
|
|
|
*
|
|
|
|
* Redistribution and use in source and binary forms, with or without
|
|
|
|
* modification, are permitted provided that the following conditions
|
|
|
|
* are met:
|
|
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer.
|
|
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
|
|
* documentation and/or other materials provided with the distribution.
|
|
|
|
*
|
|
|
|
* THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
|
|
|
|
* IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
|
|
|
|
* OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
|
|
|
|
* IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
|
|
|
|
* INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
|
|
|
|
* NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
|
|
|
|
* DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
|
|
|
|
* THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
|
|
|
|
* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
|
|
|
|
* THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
|
|
*/
|
|
|
|
|
|
|
|
#include <stdio.h>
|
|
|
|
#include <stdlib.h>
|
|
|
|
#include <string.h>
|
|
|
|
#include <unistd.h>
|
|
|
|
#include <fcntl.h>
|
|
|
|
#include <assert.h>
|
|
|
|
|
|
|
|
#include <openssl/err.h>
|
|
|
|
#include <openssl/sha.h>
|
|
|
|
#include <openssl/rsa.h>
|
|
|
|
#include <openssl/ssl.h>
|
|
|
|
#include <openssl/pem.h>
|
|
|
|
|
|
|
|
#include "defs.h"
|
|
|
|
|
|
|
|
static RSA *
|
|
|
|
load_rsa_privkey(const char *path)
|
|
|
|
{
|
|
|
|
FILE *fp;
|
|
|
|
RSA *rsa = NULL;
|
2013-10-12 13:25:03 +05:30
|
|
|
const char *p;
|
|
|
|
char *passphrase = NULL;
|
2013-10-05 15:08:04 +05:30
|
|
|
|
|
|
|
if ((fp = fopen(path, "r")) == 0)
|
|
|
|
return NULL;
|
|
|
|
|
|
|
|
if ((rsa = RSA_new()) == NULL) {
|
|
|
|
fclose(fp);
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
2013-10-12 13:25:03 +05:30
|
|
|
p = getenv("XBPS_PASSPHRASE");
|
|
|
|
if (p) {
|
|
|
|
passphrase = strdup(p);
|
|
|
|
}
|
|
|
|
rsa = PEM_read_RSAPrivateKey(fp, 0, NULL, passphrase);
|
|
|
|
if (passphrase) {
|
|
|
|
free(passphrase);
|
|
|
|
passphrase = NULL;
|
|
|
|
}
|
2013-10-05 15:08:04 +05:30
|
|
|
fclose(fp);
|
|
|
|
return rsa;
|
|
|
|
}
|
|
|
|
|
|
|
|
static char *
|
|
|
|
pubkey_from_privkey(RSA *rsa)
|
|
|
|
{
|
|
|
|
BIO *bp;
|
|
|
|
char *buf;
|
|
|
|
|
|
|
|
bp = BIO_new(BIO_s_mem());
|
|
|
|
assert(bp);
|
|
|
|
|
|
|
|
if (!PEM_write_bio_RSA_PUBKEY(bp, rsa)) {
|
|
|
|
fprintf(stderr, "error writing public key: %s\n",
|
|
|
|
ERR_error_string(ERR_get_error(), NULL));
|
|
|
|
BIO_free(bp);
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
/* XXX (xtraeme) 8192 should be always enough? */
|
|
|
|
buf = malloc(8192);
|
|
|
|
assert(buf);
|
|
|
|
BIO_read(bp, buf, 8192);
|
|
|
|
BIO_free(bp);
|
|
|
|
ERR_free_strings();
|
|
|
|
|
|
|
|
return buf;
|
|
|
|
}
|
|
|
|
|
2013-12-24 15:13:55 +05:30
|
|
|
static bool
|
|
|
|
rsa_sign_buf(RSA *rsa, const char *buf, unsigned int buflen,
|
2013-10-05 15:08:04 +05:30
|
|
|
unsigned char **sigret, unsigned int *siglen)
|
|
|
|
{
|
|
|
|
SHA256_CTX context;
|
|
|
|
unsigned char sha256[SHA256_DIGEST_LENGTH];
|
|
|
|
|
|
|
|
SHA256_Init(&context);
|
2013-12-24 15:13:55 +05:30
|
|
|
SHA256_Update(&context, buf, buflen);
|
2013-10-05 15:08:04 +05:30
|
|
|
SHA256_Final(sha256, &context);
|
|
|
|
|
|
|
|
*sigret = calloc(1, RSA_size(rsa) + 1);
|
2013-12-24 15:13:55 +05:30
|
|
|
if (!RSA_sign(NID_sha1, sha256, sizeof(sha256),
|
|
|
|
*sigret, siglen, rsa)) {
|
|
|
|
free(*sigret);
|
|
|
|
return false;
|
2013-10-05 15:08:04 +05:30
|
|
|
}
|
2013-12-24 15:13:55 +05:30
|
|
|
return true;
|
2013-10-05 15:08:04 +05:30
|
|
|
}
|
|
|
|
|
|
|
|
int
|
|
|
|
sign_repo(struct xbps_handle *xhp, const char *repodir,
|
|
|
|
const char *privkey, const char *signedby)
|
|
|
|
{
|
2013-12-24 15:13:55 +05:30
|
|
|
struct stat st;
|
2013-10-05 15:08:04 +05:30
|
|
|
struct xbps_repo *repo;
|
2013-12-24 15:13:55 +05:30
|
|
|
xbps_dictionary_t pkgd, idx, idxfiles, meta = NULL;
|
2013-10-05 15:08:04 +05:30
|
|
|
xbps_data_t data;
|
2013-12-24 15:13:55 +05:30
|
|
|
xbps_object_iterator_t iter = NULL;
|
|
|
|
xbps_object_t obj;
|
|
|
|
RSA *rsa = NULL;
|
2013-10-05 15:08:04 +05:30
|
|
|
unsigned char *sig;
|
2013-12-24 15:13:55 +05:30
|
|
|
unsigned int siglen;
|
|
|
|
const char *arch, *pkgver;
|
|
|
|
char *binpkg, *binpkg_sig, *buf, *defprivkey;
|
|
|
|
int binpkg_fd, binpkg_sig_fd;
|
|
|
|
bool flush = false;
|
2013-10-05 15:08:04 +05:30
|
|
|
|
|
|
|
if (signedby == NULL) {
|
|
|
|
fprintf(stderr, "--signedby unset! cannot sign repository\n");
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
/*
|
|
|
|
* Check that repository index exists and not empty, otherwise bail out.
|
|
|
|
*/
|
|
|
|
repo = xbps_repo_open(xhp, repodir);
|
|
|
|
if (repo == NULL) {
|
|
|
|
fprintf(stderr, "cannot read repository data: %s\n", strerror(errno));
|
2013-11-30 13:00:25 +05:30
|
|
|
return -1;
|
2013-10-05 15:08:04 +05:30
|
|
|
}
|
2013-10-07 13:53:14 +05:30
|
|
|
if (xbps_dictionary_count(repo->idx) == 0) {
|
2013-10-05 15:08:04 +05:30
|
|
|
fprintf(stderr, "invalid number of objects in repository index!\n");
|
2013-10-07 13:53:14 +05:30
|
|
|
xbps_repo_close(repo);
|
2013-10-05 15:08:04 +05:30
|
|
|
return -1;
|
|
|
|
}
|
2013-10-07 13:53:14 +05:30
|
|
|
xbps_repo_open_idxfiles(repo);
|
|
|
|
idx = xbps_dictionary_copy(repo->idx);
|
|
|
|
idxfiles = xbps_dictionary_copy(repo->idxfiles);
|
|
|
|
xbps_repo_close(repo);
|
2013-10-05 15:08:04 +05:30
|
|
|
/*
|
|
|
|
* If privkey not set, default to ~/.ssh/id_rsa.
|
|
|
|
*/
|
|
|
|
if (privkey == NULL)
|
|
|
|
defprivkey = xbps_xasprintf("%s/.ssh/id_rsa", getenv("HOME"));
|
|
|
|
else
|
|
|
|
defprivkey = strdup(privkey);
|
|
|
|
|
2013-12-24 15:13:55 +05:30
|
|
|
ERR_load_crypto_strings();
|
|
|
|
OpenSSL_add_all_algorithms();
|
|
|
|
OpenSSL_add_all_ciphers();
|
|
|
|
OpenSSL_add_all_digests();
|
|
|
|
|
|
|
|
if ((rsa = load_rsa_privkey(defprivkey)) == NULL) {
|
|
|
|
fprintf(stderr, "failed to read the RSA privkey\n");
|
|
|
|
return -1;
|
2013-11-30 12:34:37 +05:30
|
|
|
}
|
2013-11-30 13:00:25 +05:30
|
|
|
/*
|
2013-12-24 15:13:55 +05:30
|
|
|
* Iterate over the idx dictionary and then sign all binary
|
|
|
|
* packages in this repository.
|
2013-11-30 13:00:25 +05:30
|
|
|
*/
|
2013-12-24 15:13:55 +05:30
|
|
|
iter = xbps_dictionary_iterator(idx);
|
|
|
|
while ((obj = xbps_object_iterator_next(iter))) {
|
|
|
|
pkgd = xbps_dictionary_get_keysym(idx, obj);
|
|
|
|
xbps_dictionary_get_cstring_nocopy(pkgd, "architecture", &arch);
|
|
|
|
xbps_dictionary_get_cstring_nocopy(pkgd, "pkgver", &pkgver);
|
2013-10-05 15:08:04 +05:30
|
|
|
|
2013-12-24 15:13:55 +05:30
|
|
|
binpkg = xbps_xasprintf("%s/%s.%s.xbps", repodir, pkgver, arch);
|
|
|
|
binpkg_sig = xbps_xasprintf("%s.sig", binpkg);
|
|
|
|
/*
|
|
|
|
* Skip pkg if file signature exists
|
|
|
|
*/
|
2013-12-26 12:29:11 +05:30
|
|
|
if ((binpkg_sig_fd = access(binpkg_sig, R_OK)) == 0) {
|
2013-12-24 15:13:55 +05:30
|
|
|
fprintf(stdout, "skipping %s, file signature found.\n", pkgver);
|
|
|
|
free(binpkg);
|
|
|
|
free(binpkg_sig);
|
|
|
|
close(binpkg_sig_fd);
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
/*
|
|
|
|
* Generate pkg file signature.
|
|
|
|
*/
|
|
|
|
if ((binpkg_fd = open(binpkg, O_RDONLY)) == -1) {
|
|
|
|
fprintf(stderr, "cannot read %s: %s\n", binpkg, strerror(errno));
|
|
|
|
free(binpkg);
|
|
|
|
free(binpkg_sig);
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
fstat(binpkg_fd, &st);
|
|
|
|
buf = malloc(st.st_size);
|
|
|
|
assert(buf);
|
|
|
|
if (read(binpkg_fd, buf, st.st_size) != st.st_size) {
|
|
|
|
fprintf(stderr, "failed to read %s: %s\n", binpkg, strerror(errno));
|
|
|
|
close(binpkg_fd);
|
|
|
|
free(buf);
|
|
|
|
free(binpkg);
|
|
|
|
free(binpkg_sig);
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
close(binpkg_fd);
|
|
|
|
if (!rsa_sign_buf(rsa, buf, st.st_size, &sig, &siglen)) {
|
|
|
|
fprintf(stderr, "failed to sign %s: %s\n", binpkg, strerror(errno));
|
|
|
|
free(buf);
|
|
|
|
free(binpkg);
|
|
|
|
free(binpkg_sig);
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
free(buf);
|
|
|
|
free(binpkg);
|
|
|
|
/*
|
|
|
|
* Write pkg file signature.
|
|
|
|
*/
|
|
|
|
binpkg_sig_fd = creat(binpkg_sig, 0644);
|
|
|
|
if (binpkg_sig_fd == -1) {
|
|
|
|
fprintf(stderr, "failed to create %s: %s\n", binpkg_sig, strerror(errno));
|
|
|
|
free(binpkg_sig);
|
|
|
|
continue;
|
|
|
|
}
|
2013-12-24 15:28:55 +05:30
|
|
|
if (write(binpkg_sig_fd, sig, siglen) != (ssize_t)siglen) {
|
2013-12-24 15:13:55 +05:30
|
|
|
fprintf(stderr, "failed to write %s: %s\n", binpkg_sig, strerror(errno));
|
|
|
|
free(sig);
|
|
|
|
free(binpkg_sig);
|
|
|
|
close(binpkg_sig_fd);
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
flush = true;
|
|
|
|
free(sig);
|
|
|
|
free(binpkg_sig);
|
|
|
|
close(binpkg_sig_fd);
|
|
|
|
binpkg_fd = binpkg_sig_fd = -1;
|
|
|
|
printf("Signed successfully %s\n", pkgver);
|
2013-10-07 13:53:14 +05:30
|
|
|
}
|
2013-12-24 15:13:55 +05:30
|
|
|
xbps_object_iterator_release(iter);
|
2013-10-07 13:53:14 +05:30
|
|
|
|
2013-12-24 15:13:55 +05:30
|
|
|
if (flush) {
|
|
|
|
/*
|
|
|
|
* Prepare the XBPS_REPOIDX_META for our repository data.
|
|
|
|
*/
|
|
|
|
meta = xbps_dictionary_create();
|
|
|
|
xbps_dictionary_set_cstring_nocopy(meta, "signature-by", signedby);
|
|
|
|
xbps_dictionary_set_cstring_nocopy(meta, "signature-type", "rsa");
|
|
|
|
buf = pubkey_from_privkey(rsa);
|
|
|
|
assert(buf);
|
|
|
|
data = xbps_data_create_data(buf, strlen(buf));
|
|
|
|
xbps_dictionary_set(meta, "public-key", data);
|
|
|
|
xbps_dictionary_set_uint16(meta, "public-key-size", RSA_size(rsa) * 8);
|
2013-10-07 13:53:14 +05:30
|
|
|
free(buf);
|
2013-12-24 15:13:55 +05:30
|
|
|
xbps_object_release(data);
|
2014-01-03 15:23:55 +05:30
|
|
|
/*
|
|
|
|
* XXX remove this code when 0.29 is released.
|
|
|
|
* Sign the index for compatibility with 0.27.
|
|
|
|
*/
|
|
|
|
if ((buf = xbps_dictionary_externalize(idx)) == NULL) {
|
|
|
|
fprintf(stderr, "failed to externalize repository index: %s\n", strerror(errno));
|
|
|
|
return errno;
|
|
|
|
}
|
|
|
|
if (!rsa_sign_buf(rsa, buf, strlen(buf), &sig, &siglen)) {
|
|
|
|
fprintf(stderr, "failed to create repository index signature: %s\n", strerror(errno));
|
|
|
|
return errno;
|
|
|
|
}
|
|
|
|
data = xbps_data_create_data_nocopy(sig, siglen);
|
|
|
|
xbps_dictionary_set(meta, "signature", data);
|
|
|
|
free(buf);
|
2013-12-24 15:13:55 +05:30
|
|
|
/*
|
|
|
|
* and finally write our repodata file!
|
|
|
|
*/
|
|
|
|
if (!repodata_flush(xhp, repodir, idx, idxfiles, meta)) {
|
|
|
|
fprintf(stderr, "failed to write repodata: %s\n", strerror(errno));
|
|
|
|
RSA_free(rsa);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
RSA_free(rsa);
|
2013-10-05 15:08:04 +05:30
|
|
|
|
2013-12-24 15:13:55 +05:30
|
|
|
return 0;
|
2013-10-05 15:08:04 +05:30
|
|
|
}
|