Server IP : 85.214.239.14 / Your IP : 3.128.94.112 Web Server : Apache/2.4.62 (Debian) System : Linux h2886529.stratoserver.net 4.9.0 #1 SMP Tue Jan 9 19:45:01 MSK 2024 x86_64 User : www-data ( 33) PHP Version : 7.4.18 Disable Function : pcntl_alarm,pcntl_fork,pcntl_waitpid,pcntl_wait,pcntl_wifexited,pcntl_wifstopped,pcntl_wifsignaled,pcntl_wifcontinued,pcntl_wexitstatus,pcntl_wtermsig,pcntl_wstopsig,pcntl_signal,pcntl_signal_get_handler,pcntl_signal_dispatch,pcntl_get_last_error,pcntl_strerror,pcntl_sigprocmask,pcntl_sigwaitinfo,pcntl_sigtimedwait,pcntl_exec,pcntl_getpriority,pcntl_setpriority,pcntl_async_signals,pcntl_unshare, MySQL : OFF | cURL : OFF | WGET : ON | Perl : ON | Python : ON | Sudo : ON | Pkexec : OFF Directory : /usr/share/perl5/Dpkg/OpenPGP/Backend/ |
Upload File : |
# Copyright © 2021-2022 Guillem Jover <guillem@debian.org> # # This program is free software; you can redistribute it and/or modify # it under the terms of the GNU General Public License as published by # the Free Software Foundation; either version 2 of the License, or # (at your option) any later version. # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program. If not, see <https://www.gnu.org/licenses/>. package Dpkg::OpenPGP::Backend::Sequoia; use strict; use warnings; our $VERSION = '0.01'; use POSIX qw(:sys_wait_h); use Dpkg::ErrorHandling; use Dpkg::IPC; use Dpkg::OpenPGP::ErrorCodes; use parent qw(Dpkg::OpenPGP::Backend); sub DEFAULT_CMD { return [ qw(sq) ]; } sub _sq_exec { my ($self, @exec) = @_; my ($stdout, $stderr); spawn(exec => [ $self->{cmd}, @exec ], wait_child => 1, nocheck => 1, timeout => 10, to_string => \$stdout, error_to_string => \$stderr); if (WIFEXITED($?)) { my $status = WEXITSTATUS($?); print { *STDERR } "$stdout$stderr" if $status; return $status; } else { subprocerr("$self->{cmd} @exec"); } } sub armor { my ($self, $type, $in, $out) = @_; return OPENPGP_MISSING_CMD unless $self->{cmd}; # We ignore the $type, and let "sq" handle this automatically. my $rc = $self->_sq_exec(qw(armor --output), $out, $in); return OPENPGP_BAD_DATA if $rc; return OPENPGP_OK; } sub dearmor { my ($self, $type, $in, $out) = @_; return OPENPGP_MISSING_CMD unless $self->{cmd}; # We ignore the $type, and let "sq" handle this automatically. my $rc = $self->_sq_exec(qw(dearmor --output), $out, $in); return OPENPGP_BAD_DATA if $rc; return OPENPGP_OK; } sub inline_verify { my ($self, $inlinesigned, $data, @certs) = @_; return OPENPGP_MISSING_CMD unless $self->{cmd}; my @opts; push @opts, map { ('--signer-cert', $_) } @certs; push @opts, '--output', $data if defined $data; my $rc = $self->_sq_exec(qw(verify), @opts, $inlinesigned); return OPENPGP_NO_SIG if $rc; return OPENPGP_OK; } sub verify { my ($self, $data, $sig, @certs) = @_; return OPENPGP_MISSING_CMD unless $self->{cmd}; my @opts; push @opts, map { ('--signer-cert', $_) } @certs; push @opts, '--detached', $sig; my $rc = $self->_sq_exec(qw(verify), @opts, $data); return OPENPGP_NO_SIG if $rc; return OPENPGP_OK; } sub inline_sign { my ($self, $data, $inlinesigned, $key) = @_; return OPENPGP_MISSING_CMD unless $self->{cmd}; return OPENPGP_NEEDS_KEYSTORE if $key->needs_keystore(); my @opts; push @opts, '--cleartext-signature'; push @opts, '--signer-key', $key->handle; push @opts, '--output', $inlinesigned; my $rc = $self->_sq_exec('sign', @opts, $data); return OPENPGP_KEY_CANNOT_SIGN if $rc; return OPENPGP_OK; } 1;