diff options
author | Justus Winter <justus@sequoia-pgp.org> | 2019-01-08 12:33:42 +0100 |
---|---|---|
committer | Justus Winter <justus@sequoia-pgp.org> | 2019-01-08 14:24:43 +0100 |
commit | 6edda878c730fd7f675c356f44ff1ce14e650b73 (patch) | |
tree | ae345c0d2e457fb0c2d3db84466c29684ecf2b12 /ffi/src/openpgp/armor.rs | |
parent | 65141b09cbc3d9fdbb5e7d83c2393f089a8f3d7b (diff) |
ffi: Move armor glue to a new module.
Diffstat (limited to 'ffi/src/openpgp/armor.rs')
-rw-r--r-- | ffi/src/openpgp/armor.rs | 387 |
1 files changed, 387 insertions, 0 deletions
diff --git a/ffi/src/openpgp/armor.rs b/ffi/src/openpgp/armor.rs new file mode 100644 index 00000000..698018f6 --- /dev/null +++ b/ffi/src/openpgp/armor.rs @@ -0,0 +1,387 @@ +//! ASCII Armor. +//! +//! Wraps [`sequoia-openpgp::armor`]. +//! +//! [`sequoia-openpgp::armor`]: ../../../sequoia_openpgp/armor/index.html + +use std::ffi::CStr; +use std::mem::size_of; +use std::ptr; +use std::slice; +use std::io::{Read, Write}; +use libc::{self, uint8_t, c_char, c_int, size_t}; + +extern crate sequoia_openpgp; +use self::sequoia_openpgp::armor; + +use ::core::Context; + +/// Represents a (key, value) pair in an armor header. +#[repr(C)] +pub struct ArmorHeader { + key: *const c_char, + value: *const c_char, +} + +fn int_to_kind(kind: c_int) -> Option<armor::Kind> { + match kind { + 0 => None, + 1 => Some(armor::Kind::Message), + 2 => Some(armor::Kind::PublicKey), + 3 => Some(armor::Kind::SecretKey), + 4 => Some(armor::Kind::Signature), + 5 => Some(armor::Kind::File), + _ => panic!("Bad kind: {}", kind), + } +} + +fn kind_to_int(kind: Option<armor::Kind>) -> c_int { + match kind { + None => 0, + Some(armor::Kind::Message) => 1, + Some(armor::Kind::PublicKey) => 2, + Some(armor::Kind::SecretKey) => 3, + Some(armor::Kind::Signature) => 4, + Some(armor::Kind::File) => 5, + } +} + +/// Constructs a new filter for the given type of data. +/// +/// A filter that strips ASCII Armor from a stream of data. +/// +/// # Example +/// +/// ```c +/// #define _GNU_SOURCE +/// #include <assert.h> +/// #include <error.h> +/// #include <stdio.h> +/// #include <stdlib.h> +/// #include <string.h> +/// +/// #include <sequoia.h> +/// +/// const char *armored = +/// "-----BEGIN PGP ARMORED FILE-----\n" +/// "Key0: Value0\n" +/// "Key1: Value1\n" +/// "\n" +/// "SGVsbG8gd29ybGQh\n" +/// "=s4Gu\n" +/// "-----END PGP ARMORED FILE-----\n"; +/// +/// int +/// main (int argc, char **argv) +/// { +/// sq_error_t err; +/// sq_context_t ctx; +/// sq_reader_t bytes; +/// sq_reader_t armor; +/// sq_armor_kind_t kind; +/// char message[12]; +/// sq_armor_header_t *header; +/// size_t header_len; +/// +/// ctx = sq_context_new ("org.sequoia-pgp.example", &err); +/// if (ctx == NULL) +/// error (1, 0, "Initializing sequoia failed: %s", +/// sq_error_string (err)); +/// +/// bytes = sq_reader_from_bytes ((uint8_t *) armored, strlen (armored)); +/// armor = sq_armor_reader_new (bytes, SQ_ARMOR_KIND_ANY); +/// +/// header = sq_armor_reader_headers (ctx, armor, &header_len); +/// if (header == NULL) +/// { +/// err = sq_context_last_error (ctx); +/// error (1, 0, "Getting headers failed: %s", +/// sq_error_string (err)); +/// } +/// +/// assert (header_len == 2); +/// assert (strcmp (header[0].key, "Key0") == 0 +/// && strcmp (header[0].value, "Value0") == 0); +/// assert (strcmp (header[1].key, "Key1") == 0 +/// && strcmp (header[1].value, "Value1") == 0); +/// for (size_t i = 0; i < header_len; i++) +/// { +/// free (header[i].key); +/// free (header[i].value); +/// } +/// free (header); +/// +/// kind = sq_armor_reader_kind (armor); +/// assert (kind == SQ_ARMOR_KIND_FILE); +/// +/// if (sq_reader_read (ctx, armor, (uint8_t *) message, 12) < 0) +/// { +/// err = sq_context_last_error (ctx); +/// error (1, 0, "Reading failed: %s", +/// sq_error_string (err)); +/// } +/// +/// assert (memcmp (message, "Hello world!", 12) == 0); +/// +/// sq_reader_free (armor); +/// sq_reader_free (bytes); +/// sq_context_free (ctx); +/// return 0; +/// } +/// ``` +#[no_mangle] +pub extern "system" fn sq_armor_reader_new(inner: Option<&'static mut Box<Read>>, + kind: c_int) + -> *mut Box<Read> { + let inner = inner.expect("Inner is NULL"); + let kind = int_to_kind(kind); + + box_raw!(Box::new(armor::Reader::new(inner, kind))) +} + +/// Creates a `Reader` from a file. +#[no_mangle] +pub extern "system" fn sq_armor_reader_from_file(ctx: Option<&mut Context>, + filename: *const c_char, + kind: c_int) + -> *mut Box<Read> { + let ctx = ctx.expect("Context is NULL"); + assert!(! filename.is_null()); + let filename = unsafe { + CStr::from_ptr(filename).to_string_lossy().into_owned() + }; + let kind = int_to_kind(kind); + + fry_box!(ctx, armor::Reader::from_file(&filename, kind) + .map(|r| Box::new(r)) + .map_err(|e| e.into())) +} + +/// Creates a `Reader` from a buffer. +#[no_mangle] +pub extern "system" fn sq_armor_reader_from_bytes(b: *const uint8_t, len: size_t, + kind: c_int) + -> *mut Box<Read> { + assert!(!b.is_null()); + let buf = unsafe { + slice::from_raw_parts(b, len as usize) + }; + let kind = int_to_kind(kind); + + box_raw!(Box::new(armor::Reader::from_bytes(buf, kind))) +} + +/// Returns the kind of data this reader is for. +/// +/// Useful if the kind of data is not known in advance. If the header +/// has not been encountered yet (try reading some data first!), this +/// function returns SQ_ARMOR_KIND_ANY. +/// +/// # Example +/// +/// See [this] example. +/// +/// [this]: fn.sq_armor_reader_new.html +#[no_mangle] +pub extern "system" fn sq_armor_reader_kind(reader: *mut Box<Read>) + -> c_int { + // We need to downcast `reader`. To do that, we need to do a + // little dance. We will momentarily take ownership of `reader`, + // wrapping it in a Box again. Then, at the end of the function, + // we will leak it again. + assert!(! reader.is_null()); + let reader = unsafe { + Box::from_raw(reader as *mut Box<armor::Reader>) + }; + let kind = kind_to_int(reader.kind()); + Box::into_raw(reader); + kind +} + +/// Returns the armored headers. +/// +/// The tuples contain a key and a value. +/// +/// Note: if a key occurs multiple times, then there are multiple +/// entries in the vector with the same key; values with the same +/// key are *not* combined. +/// +/// The returned array and the strings in the headers have been +/// allocated with `malloc`, and the caller is responsible for freeing +/// both the array and the strings. +/// +/// # Example +/// +/// See [this] example. +/// +/// [this]: fn.sq_armor_reader_new.html +#[no_mangle] +pub extern "system" fn sq_armor_reader_headers(ctx: Option<&mut Context>, + reader: *mut Box<Read>, + len: Option<&mut size_t>) + -> *mut ArmorHeader { + let ctx = ctx.expect("Context is NULL"); + assert!(! reader.is_null()); + let len = len.expect("LEN is NULL"); + + // We need to downcast `reader`. To do that, we need to do a + // little dance. We will momentarily take ownership of `reader`, + // wrapping it in a Box again. Then, at the end of the function, + // we will leak it again. + let mut reader = unsafe { + Box::from_raw(reader as *mut Box<armor::Reader>) + }; + + // We need to be extra careful here in order not to keep ownership + // of `reader` in case of errors. + let result = match reader.headers().map_err(|e| e.into()) { + Ok(headers) => { + // Allocate space for the result. + let buf = unsafe { + libc::calloc(headers.len(), size_of::<ArmorHeader>()) + as *mut ArmorHeader + }; + let sl = unsafe { + slice::from_raw_parts_mut(buf, headers.len()) + }; + for (i, (key, value)) in headers.iter().enumerate() { + sl[i].key = strdup(key); + sl[i].value = strdup(value); + } + + *len = headers.len(); + buf + }, + Err(e) => { + ctx.e = Some(e); + ptr::null_mut() + }, + }; + + // Release temporary ownership. + Box::into_raw(reader); + result +} + +/// Creates a zero-terminated C string from a &str allocated using +/// malloc. +fn strdup(s: &str) -> *mut c_char { + let b = s.as_bytes(); + let len = b.len() + 1; + let dup = unsafe { + libc::malloc(len) as *mut c_char + }; + let sl = unsafe { + slice::from_raw_parts_mut(dup as *mut uint8_t, len) + }; + sl[..len-1].copy_from_slice(b); + sl[len-1] = 0; + dup +} + +/// Constructs a new filter for the given type of data. +/// +/// A filter that applies ASCII Armor to the data written to it. +/// +/// # Example +/// +/// ```c +/// #define _GNU_SOURCE +/// #include <assert.h> +/// #include <error.h> +/// #include <stdio.h> +/// #include <stdlib.h> +/// #include <string.h> +/// +/// #include <sequoia.h> +/// +/// int +/// main (int argc, char **argv) +/// { +/// void *buf = NULL; +/// size_t len = 0; +/// sq_writer_t alloc; +/// sq_writer_t armor; +/// sq_error_t err; +/// sq_context_t ctx; +/// char *message = "Hello world!"; +/// sq_armor_header_t header[2] = { +/// { "Key0", "Value0" }, +/// { "Key1", "Value1" }, +/// }; +/// +/// ctx = sq_context_new ("org.sequoia-pgp.example", &err); +/// if (ctx == NULL) +/// error (1, 0, "Initializing sequoia failed: %s", +/// sq_error_string (err)); +/// +/// alloc = sq_writer_alloc (&buf, &len); +/// armor = sq_armor_writer_new (ctx, alloc, SQ_ARMOR_KIND_FILE, header, 2); +/// if (armor == NULL) +/// { +/// err = sq_context_last_error (ctx); +/// error (1, 0, "Creating armor writer failed: %s", +/// sq_error_string (err)); +/// } +/// +/// if (sq_writer_write (ctx, armor, (uint8_t *) message, strlen (message)) < 0) +/// { +/// err = sq_context_last_error (ctx); +/// error (1, 0, "Writing failed: %s", +/// sq_error_string (err)); +/// } +/// sq_writer_free (armor); +/// sq_writer_free (alloc); +/// +/// assert (len == 114); +/// assert (memcmp (buf, +/// "-----BEGIN PGP ARMORED FILE-----\n" +/// "Key0: Value0\n" +/// "Key1: Value1\n" +/// "\n" +/// "SGVsbG8gd29ybGQh\n" +/// "=s4Gu\n" +/// "-----END PGP ARMORED FILE-----\n", +/// len) == 0); +/// +/// free (buf); +/// sq_context_free (ctx); +/// return 0; +/// } +/// ``` +#[no_mangle] +pub extern "system" fn sq_armor_writer_new + (ctx: Option<&mut Context>, + inner: Option<&'static mut Box<Write>>, + kind: c_int, + header: Option<&ArmorHeader>, + header_len: size_t) + -> *mut Box<Write> +{ + let ctx = ctx.expect("Context is NULL"); + let inner = inner.expect("Inner is NULL"); + let kind = int_to_kind(kind).expect("KIND must not be SQ_ARMOR_KIND_ANY"); + + let mut header_ = Vec::new(); + if header_len > 0 { + let header = header.expect("HEADER is NULL"); + let header = unsafe { + slice::from_raw_parts(header, header_len) + }; + for h in header { + assert!(! h.key.is_null()); + assert!(! h.value.is_null()); + header_.push(unsafe { + (CStr::from_ptr(h.key).to_string_lossy(), + CStr::from_ptr(h.value).to_string_lossy()) + }); + } + } + + let header: Vec<(&str, &str)> = + header_.iter().map(|h| (h.0.as_ref(), h.1.as_ref())).collect(); + + fry_box!(ctx, armor::Writer::new(inner, kind, &header) + .map(|r| Box::new(r)) + .map_err(|e| e.into())) +} |