summaryrefslogtreecommitdiffstats
path: root/ffi/src/openpgp/armor.rs
diff options
context:
space:
mode:
authorJustus Winter <justus@sequoia-pgp.org>2019-01-08 12:33:42 +0100
committerJustus Winter <justus@sequoia-pgp.org>2019-01-08 14:24:43 +0100
commit6edda878c730fd7f675c356f44ff1ce14e650b73 (patch)
treeae345c0d2e457fb0c2d3db84466c29684ecf2b12 /ffi/src/openpgp/armor.rs
parent65141b09cbc3d9fdbb5e7d83c2393f089a8f3d7b (diff)
ffi: Move armor glue to a new module.
Diffstat (limited to 'ffi/src/openpgp/armor.rs')
-rw-r--r--ffi/src/openpgp/armor.rs387
1 files changed, 387 insertions, 0 deletions
diff --git a/ffi/src/openpgp/armor.rs b/ffi/src/openpgp/armor.rs
new file mode 100644
index 00000000..698018f6
--- /dev/null
+++ b/ffi/src/openpgp/armor.rs
@@ -0,0 +1,387 @@
+//! ASCII Armor.
+//!
+//! Wraps [`sequoia-openpgp::armor`].
+//!
+//! [`sequoia-openpgp::armor`]: ../../../sequoia_openpgp/armor/index.html
+
+use std::ffi::CStr;
+use std::mem::size_of;
+use std::ptr;
+use std::slice;
+use std::io::{Read, Write};
+use libc::{self, uint8_t, c_char, c_int, size_t};
+
+extern crate sequoia_openpgp;
+use self::sequoia_openpgp::armor;
+
+use ::core::Context;
+
+/// Represents a (key, value) pair in an armor header.
+#[repr(C)]
+pub struct ArmorHeader {
+ key: *const c_char,
+ value: *const c_char,
+}
+
+fn int_to_kind(kind: c_int) -> Option<armor::Kind> {
+ match kind {
+ 0 => None,
+ 1 => Some(armor::Kind::Message),
+ 2 => Some(armor::Kind::PublicKey),
+ 3 => Some(armor::Kind::SecretKey),
+ 4 => Some(armor::Kind::Signature),
+ 5 => Some(armor::Kind::File),
+ _ => panic!("Bad kind: {}", kind),
+ }
+}
+
+fn kind_to_int(kind: Option<armor::Kind>) -> c_int {
+ match kind {
+ None => 0,
+ Some(armor::Kind::Message) => 1,
+ Some(armor::Kind::PublicKey) => 2,
+ Some(armor::Kind::SecretKey) => 3,
+ Some(armor::Kind::Signature) => 4,
+ Some(armor::Kind::File) => 5,
+ }
+}
+
+/// Constructs a new filter for the given type of data.
+///
+/// A filter that strips ASCII Armor from a stream of data.
+///
+/// # Example
+///
+/// ```c
+/// #define _GNU_SOURCE
+/// #include <assert.h>
+/// #include <error.h>
+/// #include <stdio.h>
+/// #include <stdlib.h>
+/// #include <string.h>
+///
+/// #include <sequoia.h>
+///
+/// const char *armored =
+/// "-----BEGIN PGP ARMORED FILE-----\n"
+/// "Key0: Value0\n"
+/// "Key1: Value1\n"
+/// "\n"
+/// "SGVsbG8gd29ybGQh\n"
+/// "=s4Gu\n"
+/// "-----END PGP ARMORED FILE-----\n";
+///
+/// int
+/// main (int argc, char **argv)
+/// {
+/// sq_error_t err;
+/// sq_context_t ctx;
+/// sq_reader_t bytes;
+/// sq_reader_t armor;
+/// sq_armor_kind_t kind;
+/// char message[12];
+/// sq_armor_header_t *header;
+/// size_t header_len;
+///
+/// ctx = sq_context_new ("org.sequoia-pgp.example", &err);
+/// if (ctx == NULL)
+/// error (1, 0, "Initializing sequoia failed: %s",
+/// sq_error_string (err));
+///
+/// bytes = sq_reader_from_bytes ((uint8_t *) armored, strlen (armored));
+/// armor = sq_armor_reader_new (bytes, SQ_ARMOR_KIND_ANY);
+///
+/// header = sq_armor_reader_headers (ctx, armor, &header_len);
+/// if (header == NULL)
+/// {
+/// err = sq_context_last_error (ctx);
+/// error (1, 0, "Getting headers failed: %s",
+/// sq_error_string (err));
+/// }
+///
+/// assert (header_len == 2);
+/// assert (strcmp (header[0].key, "Key0") == 0
+/// && strcmp (header[0].value, "Value0") == 0);
+/// assert (strcmp (header[1].key, "Key1") == 0
+/// && strcmp (header[1].value, "Value1") == 0);
+/// for (size_t i = 0; i < header_len; i++)
+/// {
+/// free (header[i].key);
+/// free (header[i].value);
+/// }
+/// free (header);
+///
+/// kind = sq_armor_reader_kind (armor);
+/// assert (kind == SQ_ARMOR_KIND_FILE);
+///
+/// if (sq_reader_read (ctx, armor, (uint8_t *) message, 12) < 0)
+/// {
+/// err = sq_context_last_error (ctx);
+/// error (1, 0, "Reading failed: %s",
+/// sq_error_string (err));
+/// }
+///
+/// assert (memcmp (message, "Hello world!", 12) == 0);
+///
+/// sq_reader_free (armor);
+/// sq_reader_free (bytes);
+/// sq_context_free (ctx);
+/// return 0;
+/// }
+/// ```
+#[no_mangle]
+pub extern "system" fn sq_armor_reader_new(inner: Option<&'static mut Box<Read>>,
+ kind: c_int)
+ -> *mut Box<Read> {
+ let inner = inner.expect("Inner is NULL");
+ let kind = int_to_kind(kind);
+
+ box_raw!(Box::new(armor::Reader::new(inner, kind)))
+}
+
+/// Creates a `Reader` from a file.
+#[no_mangle]
+pub extern "system" fn sq_armor_reader_from_file(ctx: Option<&mut Context>,
+ filename: *const c_char,
+ kind: c_int)
+ -> *mut Box<Read> {
+ let ctx = ctx.expect("Context is NULL");
+ assert!(! filename.is_null());
+ let filename = unsafe {
+ CStr::from_ptr(filename).to_string_lossy().into_owned()
+ };
+ let kind = int_to_kind(kind);
+
+ fry_box!(ctx, armor::Reader::from_file(&filename, kind)
+ .map(|r| Box::new(r))
+ .map_err(|e| e.into()))
+}
+
+/// Creates a `Reader` from a buffer.
+#[no_mangle]
+pub extern "system" fn sq_armor_reader_from_bytes(b: *const uint8_t, len: size_t,
+ kind: c_int)
+ -> *mut Box<Read> {
+ assert!(!b.is_null());
+ let buf = unsafe {
+ slice::from_raw_parts(b, len as usize)
+ };
+ let kind = int_to_kind(kind);
+
+ box_raw!(Box::new(armor::Reader::from_bytes(buf, kind)))
+}
+
+/// Returns the kind of data this reader is for.
+///
+/// Useful if the kind of data is not known in advance. If the header
+/// has not been encountered yet (try reading some data first!), this
+/// function returns SQ_ARMOR_KIND_ANY.
+///
+/// # Example
+///
+/// See [this] example.
+///
+/// [this]: fn.sq_armor_reader_new.html
+#[no_mangle]
+pub extern "system" fn sq_armor_reader_kind(reader: *mut Box<Read>)
+ -> c_int {
+ // We need to downcast `reader`. To do that, we need to do a
+ // little dance. We will momentarily take ownership of `reader`,
+ // wrapping it in a Box again. Then, at the end of the function,
+ // we will leak it again.
+ assert!(! reader.is_null());
+ let reader = unsafe {
+ Box::from_raw(reader as *mut Box<armor::Reader>)
+ };
+ let kind = kind_to_int(reader.kind());
+ Box::into_raw(reader);
+ kind
+}
+
+/// Returns the armored headers.
+///
+/// The tuples contain a key and a value.
+///
+/// Note: if a key occurs multiple times, then there are multiple
+/// entries in the vector with the same key; values with the same
+/// key are *not* combined.
+///
+/// The returned array and the strings in the headers have been
+/// allocated with `malloc`, and the caller is responsible for freeing
+/// both the array and the strings.
+///
+/// # Example
+///
+/// See [this] example.
+///
+/// [this]: fn.sq_armor_reader_new.html
+#[no_mangle]
+pub extern "system" fn sq_armor_reader_headers(ctx: Option<&mut Context>,
+ reader: *mut Box<Read>,
+ len: Option<&mut size_t>)
+ -> *mut ArmorHeader {
+ let ctx = ctx.expect("Context is NULL");
+ assert!(! reader.is_null());
+ let len = len.expect("LEN is NULL");
+
+ // We need to downcast `reader`. To do that, we need to do a
+ // little dance. We will momentarily take ownership of `reader`,
+ // wrapping it in a Box again. Then, at the end of the function,
+ // we will leak it again.
+ let mut reader = unsafe {
+ Box::from_raw(reader as *mut Box<armor::Reader>)
+ };
+
+ // We need to be extra careful here in order not to keep ownership
+ // of `reader` in case of errors.
+ let result = match reader.headers().map_err(|e| e.into()) {
+ Ok(headers) => {
+ // Allocate space for the result.
+ let buf = unsafe {
+ libc::calloc(headers.len(), size_of::<ArmorHeader>())
+ as *mut ArmorHeader
+ };
+ let sl = unsafe {
+ slice::from_raw_parts_mut(buf, headers.len())
+ };
+ for (i, (key, value)) in headers.iter().enumerate() {
+ sl[i].key = strdup(key);
+ sl[i].value = strdup(value);
+ }
+
+ *len = headers.len();
+ buf
+ },
+ Err(e) => {
+ ctx.e = Some(e);
+ ptr::null_mut()
+ },
+ };
+
+ // Release temporary ownership.
+ Box::into_raw(reader);
+ result
+}
+
+/// Creates a zero-terminated C string from a &str allocated using
+/// malloc.
+fn strdup(s: &str) -> *mut c_char {
+ let b = s.as_bytes();
+ let len = b.len() + 1;
+ let dup = unsafe {
+ libc::malloc(len) as *mut c_char
+ };
+ let sl = unsafe {
+ slice::from_raw_parts_mut(dup as *mut uint8_t, len)
+ };
+ sl[..len-1].copy_from_slice(b);
+ sl[len-1] = 0;
+ dup
+}
+
+/// Constructs a new filter for the given type of data.
+///
+/// A filter that applies ASCII Armor to the data written to it.
+///
+/// # Example
+///
+/// ```c
+/// #define _GNU_SOURCE
+/// #include <assert.h>
+/// #include <error.h>
+/// #include <stdio.h>
+/// #include <stdlib.h>
+/// #include <string.h>
+///
+/// #include <sequoia.h>
+///
+/// int
+/// main (int argc, char **argv)
+/// {
+/// void *buf = NULL;
+/// size_t len = 0;
+/// sq_writer_t alloc;
+/// sq_writer_t armor;
+/// sq_error_t err;
+/// sq_context_t ctx;
+/// char *message = "Hello world!";
+/// sq_armor_header_t header[2] = {
+/// { "Key0", "Value0" },
+/// { "Key1", "Value1" },
+/// };
+///
+/// ctx = sq_context_new ("org.sequoia-pgp.example", &err);
+/// if (ctx == NULL)
+/// error (1, 0, "Initializing sequoia failed: %s",
+/// sq_error_string (err));
+///
+/// alloc = sq_writer_alloc (&buf, &len);
+/// armor = sq_armor_writer_new (ctx, alloc, SQ_ARMOR_KIND_FILE, header, 2);
+/// if (armor == NULL)
+/// {
+/// err = sq_context_last_error (ctx);
+/// error (1, 0, "Creating armor writer failed: %s",
+/// sq_error_string (err));
+/// }
+///
+/// if (sq_writer_write (ctx, armor, (uint8_t *) message, strlen (message)) < 0)
+/// {
+/// err = sq_context_last_error (ctx);
+/// error (1, 0, "Writing failed: %s",
+/// sq_error_string (err));
+/// }
+/// sq_writer_free (armor);
+/// sq_writer_free (alloc);
+///
+/// assert (len == 114);
+/// assert (memcmp (buf,
+/// "-----BEGIN PGP ARMORED FILE-----\n"
+/// "Key0: Value0\n"
+/// "Key1: Value1\n"
+/// "\n"
+/// "SGVsbG8gd29ybGQh\n"
+/// "=s4Gu\n"
+/// "-----END PGP ARMORED FILE-----\n",
+/// len) == 0);
+///
+/// free (buf);
+/// sq_context_free (ctx);
+/// return 0;
+/// }
+/// ```
+#[no_mangle]
+pub extern "system" fn sq_armor_writer_new
+ (ctx: Option<&mut Context>,
+ inner: Option<&'static mut Box<Write>>,
+ kind: c_int,
+ header: Option<&ArmorHeader>,
+ header_len: size_t)
+ -> *mut Box<Write>
+{
+ let ctx = ctx.expect("Context is NULL");
+ let inner = inner.expect("Inner is NULL");
+ let kind = int_to_kind(kind).expect("KIND must not be SQ_ARMOR_KIND_ANY");
+
+ let mut header_ = Vec::new();
+ if header_len > 0 {
+ let header = header.expect("HEADER is NULL");
+ let header = unsafe {
+ slice::from_raw_parts(header, header_len)
+ };
+ for h in header {
+ assert!(! h.key.is_null());
+ assert!(! h.value.is_null());
+ header_.push(unsafe {
+ (CStr::from_ptr(h.key).to_string_lossy(),
+ CStr::from_ptr(h.value).to_string_lossy())
+ });
+ }
+ }
+
+ let header: Vec<(&str, &str)> =
+ header_.iter().map(|h| (h.0.as_ref(), h.1.as_ref())).collect();
+
+ fry_box!(ctx, armor::Writer::new(inner, kind, &header)
+ .map(|r| Box::new(r))
+ .map_err(|e| e.into()))
+}