summaryrefslogtreecommitdiff
path: root/usr.sbin/pkg_add/OpenBSD/signify.pm
blob: 20ee2eb22216a5d572423d5fa4ce1526d65a0076 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
# ex:ts=8 sw=4:
# $OpenBSD: signify.pm,v 1.13 2014/03/18 16:40:46 espie Exp $
#
# Copyright (c) 2013-2014 Marc Espie <espie@openbsd.org>
#
# Permission to use, copy, modify, and distribute this software for any
# purpose with or without fee is hereby granted, provided that the above
# copyright notice and this permission notice appear in all copies.
#
# THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
# WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
# MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
# ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
# WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
# ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
# OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.

use strict;
use warnings;

package OpenBSD::signify;

use OpenBSD::PackageInfo;
use OpenBSD::Paths;
use File::Temp qw/mkstemp/;

my $header = "untrusted comment: signify -- signature\n";
my $cmd = OpenBSD::Paths->signify;
my $suffix = ".sig";

sub do_check
{
	my ($plist, $state, $sig, $pubkey) = @_;
	my ($rdmsg, $wrmsg);
	pipe($rdmsg, $wrmsg) or $state->fatal("Bad pipe: #1", $!);
	return $state->system(
	    sub {
		    close($wrmsg);
		    open(STDIN, '<&', $rdmsg);
		    close($rdmsg);
	    },
	    sub {
	    	close($rdmsg);
		print $wrmsg $header, $sig, "\n";
		$plist->write_no_sig($wrmsg);
		close($wrmsg);
	    },
	    $cmd, '-V', '-q', '-p', $pubkey, '-e', '-x', '-', 
	    '-m', '/dev/null');
}

sub compute_signature
{
	my ($plist, $state, $key, $pub) = @_;

	my ($rdmsg, $wrmsg);
	my ($rdsig, $wrsig);
	pipe($rdmsg, $wrmsg) or $state->fatal("Bad pipe: #1", $!);
	pipe($rdsig, $wrsig) or $state->fatal("Bad pipe: #1", $!);
	my $sig;
	$state->system(
	    sub {
		close($wrmsg);
		open(STDIN, '<&', $rdmsg);
		close($rdmsg);
		close($rdsig);
		open(STDOUT, '>&', $wrsig);
		close($wrsig);
	    },
	    sub {
	    	close($rdmsg);
		close($wrsig);
		$plist->write_no_sig($wrmsg);
		close($wrmsg);
		my $header = <$rdsig>;
		$sig = <$rdsig>;
		chomp $sig;
		close($rdsig);
	    },
	    $cmd, '-S', '-q', '-s', $key, '-m', '-', '-x', '-') == 0 or 
	    $state->fatal("problem generating signature");
	if (defined $pub) {
		do_check($plist, $state, $sig, $pub) == 0 or
		    $state->fatal("public key and private key don't match");
	}
	return $sig;
}


sub check_signature
{
	my ($plist, $state) = @_;
	
	if (!$plist->has('signer')) {
		$state->errsay("Invalid signed plist: no \@signer");
		return 0;
	}
	my $signer = $plist->get('signer')->name;
	my $pubkey = OpenBSD::Paths->signifykey($signer);
	if (!-f $pubkey) {
		$state->errsay("Can't find key #1 for signer #1", $pubkey, 
		    $signer);
		return 0;
	}

	my $sig = $plist->get('digital-signature');
	my $rc = do_check($plist, $state, $sig->{b64sig}, $pubkey);
	if ($rc != 0) {
	    	$state->log("Bad signature");
		return 0;
	}
	if (!grep 
	    {ref($_) eq 'Regexp' ? $signer =~ $_ : $_ eq $signer} 
	    @{$state->signer_list}) {
		$state->errsay("Package signed by untrusted party #1", $signer);
		return 0;
	}
	return 1;
}

1;