/inc/gpg.inc.php (e359c647715f0861ed81acac3fdfcaaf71d798f1) (7503 bytes) (mode 100644) (type blob)
<?php
function rg_gpg_set_error($s)
{
global $rg_gpg_error;
rg_log('gpg_set_error: ' . $s);
$rg_gpg_error = $s;
}
function rg_gpg_error()
{
global $rg_gpg_error;
return $rg_gpg_error;
}
/*
* Generates a key
*/
function rg_gpg_key_gen($user_id)
{
$ret = array('ok' => 0);
do {
// TODO: hd - how to clean it? Take care of on current access! Lock?
$hd = rg_tmp_path('gpg_key_gen_hd-' . rg_id(16), 120);
$ehd = escapeshellarg($hd);
$kr = rg_tmp_path('gpg_key_gen_kr-' . rg_id(16), 120);
$ekr = escapeshellarg($kr);
$euser_id = escapeshellarg($user_id);
if (!is_dir($hd)) {
$r = @mkdir($hd, 0700);
if ($r === FALSE) {
$ret['errmsg'] = 'cannot create gpg homedir [' . $hd . ']: '
. rg_php_err();
break;
}
}
$base = 'gpg2'
. ' --no-options'
. ' --lock-never'
. ' --keyring ' . $ekr
. ' --no-default-keyring'
. ' --homedir ' . $ehd;
$a = array(
'cmds' => array(
'cmd1' => array(
'cmd' => $base
. ' --passphrase \'\''
. ' --batch'
. ' --quick-generate-key'
. ' ' . $euser_id
. ' rsa4096 default never'
)
)
);
$r = rg_exec2($a);
if (($r['ok'] != 1) || ($r['cmds']['cmd1']['exitcode'] != 0)) {
$ret['errmsg'] = 'cannot generate: '
. $r['cmds']['cmd1']['last_errmsg']
. ' [' . $r['cmds']['cmd1']['err_buf'] . ']';
break;
}
$a = array(
'cmds' => array(
'cmd1' => array(
'cmd' => $base
. ' --export-secret-keys'
. ' --armour'
)
)
);
$r = rg_exec2($a);
if (($r['ok'] != 1) || ($r['cmds']['cmd1']['exitcode'] != 0)) {
$ret['errmsg'] = 'cannot export secret: '
. $r['cmds']['cmd1']['last_errmsg']
. ' [' . $r['cmds']['cmd1']['err_buf'] . ']';
break;
}
$ret['priv_key'] = $r['cmds']['cmd1']['in_buf'];
$a = array(
'cmds' => array(
'cmd1' => array(
'cmd' => $base
. ' --export'
. ' --armour'
)
)
);
$r = rg_exec2($a);
if (($r['ok'] != 1) || ($r['cmds']['cmd1']['exitcode'] != 0)) {
$ret['errmsg'] = 'cannot export public: '
. $r['cmds']['cmd1']['last_errmsg']
. ' [' . $r['cmds']['cmd1']['err_buf'] . ']';
break;
}
$ret['pub_key'] = $r['cmds']['cmd1']['in_buf'];
$ret['ok'] = 1;
} while (0);
rg_del_tree($kr);
@unlink($kr . '.meta');
rg_del_tree($hd);
@unlink($hd . '.meta');
return $ret;
}
/*
* Save a keyring based on a private key (not used)
*/
function rg_gpg_save_kr($out, $key)
{
rg_log_enter('gpg_save_kr');
$ret = array('ok' => 0);
do {
// TODO: hd - how to clean it? Take care of on current access! Lock?
$hd = rg_tmp_path('gpg_save_kr_hd-' . rg_id(16), 120);
$ehd = escapeshellarg($hd);
$eout = escapeshellarg($out);
if (!is_dir($hd)) {
$r = @mkdir($hd, 0700);
if ($r === FALSE) {
$ret['errmsg'] = 'cannot create gpg homedir [' . $hd . ']: '
. rg_php_err();
break;
}
}
$base = 'gpg2'
. ' --no-options'
. ' --lock-never'
. ' --keyring ' . $eout
. ' --no-default-keyring'
. ' --homedir ' . $ehd;
$a = array(
'cmds' => array(
'cmd1' => array(
'cmd' => $base
. ' --import'
. ' --batch',
'out_buf' => $key
)
)
);
$r = rg_exec2($a);
if (($r['ok'] != 1) || ($r['cmds']['cmd1']['exitcode'] != 0)) {
rg_log_debug('import: ' . print_r($r, TRUE));
$ret['errmsg'] = 'cannot import key: '
. $r['cmds']['cmd1']['last_errmsg']
. ' [' . $r['cmds']['cmd1']['err_buf'] . ']';
break;
}
$ret['ok'] = 1;
} while (0);
rg_del_tree($hd);
@unlink($hd . '.meta');
rg_log_exit();
return $ret;
}
/*
* Saves a keyring based on a private key.
* This is a special version of the above one, used for Debian (public keyring v4).
* @out - out file
* @key - private key
*/
function rg_gpg_save_public_kr($out, $key)
{
rg_log_enter('gpg_save_public_kr');
$ret = array('ok' => 0);
do {
// TODO: hd - how to clean it? Take care of on current access! Lock?
$hd = rg_tmp_path('gpg_save_public_kr_home-' . rg_id(16), 120);
$ehd = escapeshellarg($hd);
$kr = rg_tmp_path('gpg-save_public_kr_kr-' . rg_id(16), 120);
$ekr = escapeshellarg($kr);
if (!is_dir($hd)) {
$r = @mkdir($hd, 0700);
if ($r === FALSE) {
$ret['errmsg'] = 'cannot create gpg homedir [' . $hd . ']: '
. rg_php_err();
break;
}
}
$base = 'gpg2'
. ' --no-options'
. ' --lock-never'
. ' --keyring ' . $ekr
. ' --no-default-keyring'
. ' --homedir ' . $ehd;
$a = array(
'cmds' => array(
'cmd1' => array(
'cmd' => $base
. ' --import'
. ' --batch',
'out_buf' => $key
)
)
);
$r = rg_exec2($a);
if (($r['ok'] != 1) || ($r['cmds']['cmd1']['exitcode'] != 0)) {
rg_log_debug('import: ' . print_r($r, TRUE));
$ret['errmsg'] = 'cannot import key: '
. $r['cmds']['cmd1']['last_errmsg']
. ' [' . $r['cmds']['cmd1']['err_buf'] . ']';
break;
}
if (file_exists($out))
@unlink($out);
$eout = escapeshellarg($out);
$a = array(
'cmds' => array(
'cmd1' => array(
'cmd' => $base
. ' --batch'
. ' --export'
. ' --output ' . $eout
)
)
);
$r = rg_exec2($a);
if (($r['ok'] != 1) || ($r['cmds']['cmd1']['exitcode'] != 0)) {
//rg_log_debug('export: ' . print_r($r, TRUE));
$ret['errmsg'] = 'cannot export public keyring: '
. $r['cmds']['cmd1']['last_errmsg']
. ' [' . $r['cmds']['cmd1']['err_buf'] . ']';
break;
}
$ret['ok'] = 1;
} while (0);
rg_del_tree($kr);
@unlink($kr . '.meta');
rg_del_tree($hd);
@unlink($hd . '.meta');
rg_log_exit();
return $ret;
}
/*
* Sign a file providing priv key
*/
function rg_gpg_sign($out, $in, $priv_key, $extra)
{
rg_log_enter('gpg_sign');
$ret = array('ok' => 0);
do {
// TODO: hd - how to clean it? Take care of on current access! Lock?
$hd = rg_tmp_path('gpg_sign_hd-' . rg_id(16), 120);
$ehd = escapeshellarg($hd);
$kr = rg_tmp_path('gpg_sign_kr-' . rg_id(16), 120);
$ekr = escapeshellarg($kr);
if (!is_dir($hd)) {
$r = @mkdir($hd, 0700);
if ($r === FALSE) {
$ret['errmsg'] = 'cannot create gpg homedir [' . $hd . ']: '
. rg_php_err();
break;
}
}
$base = 'gpg2'
. ' --no-options'
. ' --lock-never'
. ' --keyring ' . $ekr
. ' --no-default-keyring'
. ' --homedir ' . $ehd;
$a = array(
'cmds' => array(
'cmd1' => array(
'cmd' => $base
. ' --import'
. ' --batch',
'out_buf' => $priv_key
)
)
);
$r = rg_exec2($a);
if (($r['ok'] != 1) || ($r['cmds']['cmd1']['exitcode'] != 0)) {
rg_log_debug('import: ' . print_r($r, TRUE));
$ret['errmsg'] = 'cannot import key: '
. $r['cmds']['cmd1']['last_errmsg']
. ' [' . $r['cmds']['cmd1']['err_buf'] . ']';
break;
}
$out2 = $out . '-sign';
$a = array(
'cmds' => array(
'cmd1' => array(
'cmd' => $base
. ' --sign'
. ' ' . $extra
. ' --output ' . escapeshellarg($out2)
. ' ' . escapeshellarg($in)
)
)
);
$r = rg_exec2($a);
if (($r['ok'] != 1) || ($r['cmds']['cmd1']['exitcode'] != 0)) {
rg_log_debug('sign: ' . print_r($r, TRUE));
$ret['errmsg'] = 'cannot sign: '
. $r['cmds']['cmd1']['last_errmsg']
. ' [' . $r['cmds']['cmd1']['err_buf'] . ']';
break;
}
$r = @rename($out2, $out);
if ($r === FALSE) {
$ret['errmsg'] = 'cannot rename: '
. rg_php_err();
break;
}
$ret['ok'] = 1;
} while (0);
rg_del_tree($kr);
@unlink($kr . '.meta');
rg_del_tree($hd);
@unlink($hd . '.meta');
rg_log_exit();
return $ret;
}
Mode |
Type |
Size |
Ref |
File |
100644 |
blob |
9 |
f3c7a7c5da68804a1bdf391127ba34aed33c3cca |
.exclude |
100644 |
blob |
108 |
acc2186b1d357966e09df32afcea14933f5f0c78 |
.gitignore |
100644 |
blob |
375 |
1f425bcd2049c526744d449511094fc045ceac74 |
AUTHORS |
100644 |
blob |
2375 |
07d4a2277dd1c385e2562a9ac7c636bcdd084c18 |
History.txt |
100644 |
blob |
34520 |
dba13ed2ddf783ee8118c6a581dbf75305f816a3 |
LICENSE |
100644 |
blob |
3632 |
f216d8f6ca7180c095ee4fcbe96d8fc2ca2b0dee |
Makefile.in |
100644 |
blob |
5325 |
96c40d868ce10b715299085ccffb30f96a730cf3 |
README |
100644 |
blob |
192509 |
58df4c67a312c3a7dc7d0f102b55e90b9127bc87 |
TODO |
100644 |
blob |
1294 |
f22911eb777f0695fcf81ad686eac133eb11fcc4 |
TODO-plans |
100644 |
blob |
203 |
a2863c67c3da44126b61a15a6f09738c25e0fbe0 |
TODO.perf |
100644 |
blob |
967 |
56bbaa7c937381fb10a2907b6bbe056ef8cc824a |
TODO.vm |
040000 |
tree |
- |
21928e906ad2907a55c2e81c2a8b0502b586b8a0 |
artwork |
100644 |
blob |
5328 |
d5be4cc3f15d059ad8d267d800c602e9774816a8 |
compare.csv |
100755 |
blob |
30 |
92c4bc48245c00408cd7e1fd89bc1a03058f4ce4 |
configure |
040000 |
tree |
- |
0a74883db0753f35db9a227ed8f0f46e3c8b1746 |
debian |
040000 |
tree |
- |
fa4b417ddd8b9684c764ea6f1c96065c4d9427b1 |
docker |
040000 |
tree |
- |
f67d3605efbd6422a8acdd953578991139266391 |
docs |
100755 |
blob |
18252 |
e2438615edba7066a730ed6a796a5302263f1f37 |
duilder |
100644 |
blob |
536 |
4d35fc700881fc03e043a4c22d8770baa298d093 |
duilder.conf |
040000 |
tree |
- |
73914e7faf49474a12b29e936ae77006254cc1a1 |
hooks |
040000 |
tree |
- |
343af578d66f98094554d1c45d863a21f2dfbf2f |
inc |
040000 |
tree |
- |
e255ce234c3993998edc12bc7e93fff555376eda |
misc |
100644 |
blob |
6307 |
67d5e75076766ad844969abaff446face8ca9eff |
rocketgit.spec |
040000 |
tree |
- |
459cf6e889bc65568b4fe8d99774380bd2844b39 |
root |
040000 |
tree |
- |
b6db32295abaf3229561581e7577da53af8caf47 |
samples |
040000 |
tree |
- |
3e6d3d08c1a0baea952bada0f36e29ad9f82d778 |
scripts |
040000 |
tree |
- |
454044f7e286fe13ec18598fce6b613190f52e5e |
selinux |
100755 |
blob |
256 |
462ccd108c431f54e380cdac2329129875a318b5 |
spell_check.sh |
040000 |
tree |
- |
d9260d3cf0d6490be720312893600a8041bf991b |
techdocs |
040000 |
tree |
- |
fae18775ac52de4a170fcd1baa733433f31b9559 |
tests |
040000 |
tree |
- |
e810d7397575886ef495708d571eb3675f6928ba |
tools |
Hints:
Before first commit, do not forget to setup your git environment:
git config --global user.name "your_name_here"
git config --global user.email "your@email_here"
Clone this repository using HTTP(S):
git clone https://rocketgit.com/user/catalinux/rocketgit
Clone this repository using ssh (do not forget to upload a key first):
git clone ssh://rocketgit@ssh.rocketgit.com/user/catalinux/rocketgit
Clone this repository using git:
git clone git://git.rocketgit.com/user/catalinux/rocketgit
You are allowed to anonymously push to this repository.
This means that your pushed commits will automatically be transformed into a
merge request:
... clone the repository ...
... make some changes and some commits ...
git push origin main