Server IP : 195.201.23.43 / Your IP : 18.188.159.66 Web Server : Apache System : Linux webserver2.vercom.be 5.4.0-192-generic #212-Ubuntu SMP Fri Jul 5 09:47:39 UTC 2024 x86_64 User : kdecoratie ( 1041) PHP Version : 7.1.33-63+ubuntu20.04.1+deb.sury.org+1 Disable Function : pcntl_alarm,pcntl_fork,pcntl_waitpid,pcntl_wait,pcntl_wifexited,pcntl_wifstopped,pcntl_wifsignaled,pcntl_wifcontinued,pcntl_wexitstatus,pcntl_wtermsig,pcntl_wstopsig,pcntl_signal,pcntl_signal_get_handler,pcntl_signal_dispatch,pcntl_get_last_error,pcntl_strerror,pcntl_sigprocmask,pcntl_sigwaitinfo,pcntl_sigtimedwait,pcntl_exec,pcntl_getpriority,pcntl_setpriority,pcntl_async_signals, MySQL : OFF | cURL : ON | WGET : ON | Perl : ON | Python : OFF | Sudo : ON | Pkexec : ON Directory : /usr/share/usermin/gnupg/ |
Upload File : |
# gnupg-lib.pl # Functions for managing gnupg keys, signing, encrypting and so on BEGIN { push(@INC, ".."); }; use strict; use warnings; no warnings 'redefine'; no warnings 'uninitialized'; use WebminCore; our ($module_name, %config, $user_module_config_directory, %text); if (!$module_name) { # Only do this if we are the primary library for the usermin gnupg mod &init_config(); &switch_to_remote_user(); &create_user_config_dirs(); } &foreign_require("proc", "proc-lib.pl"); our $gpgpath = $config{'gpg'} || "gpg"; # list_keys() # Returns an array of all GnuPG keys sub list_keys { my (@rv, %kmap); &clean_language(); open(GPG, "$gpgpath --list-keys 2>/dev/null |"); while(<GPG>) { if (/^pub\s+([a-z0-9]+)(\s+)([\d]{4}-[\d]{2}-[\d]{2})/ || /^pub\s+(\S+)\/(\S+)\s+(\S+)\s+(.*)\s+<(\S+)>/ || /^pub\s+(\S+)\/(\S+)\s+(\S+)\s+(.*)/) { my $k = { 'size' => $1, 'key' => $2, 'date' => $3, 'name' => &filter_javascript($4) ? [ &filter_javascript($4) ] : [ ], 'email' => &filter_javascript($5) ? [ &filter_javascript($5) ] : &filter_javascript($4) ? [ "" ] : [ ], 'index' => scalar(@rv) }; if ($k->{'name'}->[0] && $k->{'name'}->[0] =~ /\[(expires|expired):\s+(\S+)\]/) { # Expiry date, the actual name $k->{'expires'} = $2; $k->{'expired'} = 1 if ($1 eq 'expired'); shift(@{$k->{'name'}}); } $kmap{$k->{'key'}} = $k; while(1) { $_ = <GPG>; last if ($_ !~ /\S/); if (/^sub\s+(\S+)\/(\S+)\s+/) { push(@{$k->{'key2'}}, $2); } elsif (/^uid\s+\[[^\]]+\]\s+(.*)\s+<(\S+)>/ || /^uid\s+(.*)\s+<(\S+)>/ || /^uid\s+(.*)/) { push(@{$k->{'name'}}, &filter_javascript($1)); push(@{$k->{'email'}}, &filter_javascript($2)); } elsif (/^\s+([A-F0-9]{0,40})/) { $k->{'key'} = $1; $kmap{$1} = $k; } } push(@rv, $k); } } close(GPG); open(GPG, "$gpgpath --list-secret-keys 2>/dev/null |"); while(<GPG>) { if ((/^sec\s+(\S+)\/(\S+)\s+(\S+)\s+(.*)/ || /^(\s+)([A-F0-9]{0,40})/) && $kmap{$2}) { $kmap{$2}->{'secret'}++; } } close(GPG); &reset_environment(); return @rv; } # list_keys_sorted() # Returns a list of all keys, sorted by name sub list_keys_sorted { return sort { lc($a->{'name'}->[0]) cmp lc($b->{'name'}->[0]) } &list_keys(); } # list_secret_keys() # List list_keys, but only returns secret ones sub list_secret_keys { return grep { $_->{'secret'} } &list_keys(); } # key_fingerprint(&key) sub key_fingerprint { my $fp; local $_; &clean_language(); open(GPG, "$gpgpath --fingerprint ".quotemeta($_[0]->{'name'}->[0])." 2>/dev/null |"); while(<GPG>) { if (/([0-9A-F]{4}\s+[0-9A-F]{4}\s+[0-9A-F]{4}\s+[0-9A-F]{4}\s+[0-9A-F]{4}\s+[0-9A-F]{4}\s+[0-9A-F]{4}\s+[0-9A-F]{4}\s+[0-9A-F]{4}\s+[0-9A-F]{4})/i) { $fp = $1; } } close(GPG); &reset_environment(); return $fp; } # get_passphrase(&key) # Returns the passphrase for a key, or undef if we don't have one sub get_passphrase { my ($key) = @_; open(PASS, "<$user_module_config_directory/pass.$key->{'key'}") || open(PASS, "<$user_module_config_directory/pass") || return undef; my $pass = <PASS>; close(PASS); chop($pass); return $pass; } sub get_passphrase_file { my ($key) = @_; return "$user_module_config_directory/pass.$key->{'key'}"; } # put_passphrase(pass, &key) sub put_passphrase { my $fh; &open_tempfile($fh, ">$user_module_config_directory/pass.$_[1]->{'key'}"); &print_tempfile($fh, $_[0],"\n"); &close_tempfile($fh); chmod(0700, "$user_module_config_directory/pass.$_[1]->{'key'}"); } # encrypt_data(data, &result, &key|&keys, ascii) # Encrypts some data with the given public key and returns the result, and # returns an error message or undef on failure sub encrypt_data { my ($data, $out, $keys, $ascii) = @_; my $srcfile = &transname(); my @keys = ref($keys) eq 'ARRAY' ? @$keys : ( $keys ); my $rcpt = join(" ", map { "--recipient ".quotemeta($_->{'name'}->[0]) } @keys); &write_file_contents($srcfile, $data); my $dstfile = &transname(); my $asciiflag = $ascii ? "--armor" : ""; my $comp = $config{'compress'} eq '' ? "" : " --compress-algo ".quotemeta($config{'compress'}); &clean_language(); my $cmd = "$gpgpath --output ".quotemeta($dstfile). " $rcpt $asciiflag $comp --encrypt ".quotemeta($srcfile); my ($fh, $fpid) = &proc::pty_process_exec($cmd); while(1) { my $rv = &wait_for($fh, "anyway"); if ($rv == 0) { syswrite($fh, "yes\n", length("yes\n")); } elsif ($rv < 0) { last; } } close($fh); &reset_environment(); unlink($srcfile); my $dst = &read_file_contents($dstfile); unlink($dstfile); if ($dst) { $$out = $dst; return undef; } else { return $wait_for_input; } } # decrypt_data(data, &result, [&key]) # Decrypts some data encrypted for the current GnuPG user, and puts the results # into &result. Returns an error message or undef on success. sub decrypt_data { my ($data, $out, $key) = @_; my $srcfile = &transname(); &write_file_contents($srcfile, $data); my $dstfile = &transname(); &clean_language(); my $pflag = ""; my $pass; if (!$key) { # No key was given, but if we have only one try it my @keys = &list_secret_keys(); if (@keys == 1) { $key = $keys[0]; } } if ($key) { # Key was given, use it's passphrase $pass = &get_passphrase($key); return $text{'gnupg_esignpass'} if (!$key); $pflag = "--batch --passphrase-file ". quotemeta(&get_passphrase_file($key)); } my $cmd = "$gpgpath $pflag --output ".quotemeta($dstfile). " --decrypt ".quotemeta($srcfile); my ($fh, $fpid) = &proc::pty_process_exec($cmd); my ($error, $seen_pass, $keyid); $wait_for_debug = 1; while(1) { my $rv = &wait_for($fh, "passphrase:", "key,\\s+ID\\s+(\\S+),", "failed.*\\n", "error.*\\n", "invalid.*\\n", "signal caught.*\\n"); if ($rv == 0) { # Only needed if caller didn't supply a key with passphrase last if ($seen_pass++); sleep(1); syswrite($fh, "$pass\n", length("$pass\n")); } elsif ($rv == 1) { # Only needed if caller didn't supply a key $keyid = $matches[1]; my $rkey; ($rkey) = grep { &indexof($matches[1], @{$_->{'key2'}}) >= 0 || $_->{'key'} eq $matches[1] } &list_secret_keys(); if ($rkey && $key) { # Does discovered key match? return &text('gnupg_ecryptkey2', "<tt>$keyid</tt>") if ($rkey->{'key'} ne $key->{'key'}); } elsif ($rkey && !$key) { # Discovered the key to use $pass = &get_passphrase($rkey); $key = $rkey; } } elsif ($rv > 1) { $error++; last; } elsif ($rv < 0) { last; } } close($fh); &reset_environment(); unlink($srcfile); my $dst = &read_file_contents($dstfile); unlink($dstfile); if (!$keyid && !$key) { return $text{'gnupg_ecryptid'}; } elsif (!$key) { return &text('gnupg_ecryptkey', "<tt>$keyid</tt>"); } elsif (!defined($pass)) { return &text('gnupg_ecryptpass', $key->{'name'}->[0]).". ". &text('gnupg_canset', "/gnupg/edit_key.cgi?key=$key->{'key'}")."."; } elsif ($error || $seen_pass > 1) { return "<pre>".&html_escape($wait_for_input)."</pre>"; } else { $$out = $dst; return undef; } } # sign_data(data, \&result, &key, mode) # Signs the given data and returns the result. Mode 0 = binary signature # mode 1 = ascii signature at end, mode 2 = ascii signature only sub sign_data { my ($data, $out, $key, $mode) = @_; my $srcfile = &transname(); &write_file_contents($srcfile, $data); my $dstfile = &transname(); my $pass = &get_passphrase($key); if (!defined($pass)) { return $text{'gnupg_esignpass'}.". ". &text('gnupg_canset', "/gnupg/edit_key.cgi?key=$key->{'key'}")."."; } my $pflag = "--batch --passphrase-file ".quotemeta(&get_passphrase_file($key)); my $cmd; if ($mode == 0) { $cmd = "$gpgpath $pflag --output ".quotemeta($dstfile)." --default-key $key->{'key'} --sign ".quotemeta($srcfile); } elsif ($mode == 1) { $cmd = "$gpgpath $pflag --output ".quotemeta($dstfile)." --default-key $key->{'key'} --clearsign ".quotemeta($srcfile); } elsif ($mode == 2) { $cmd = "$gpgpath $pflag --armor --output ".quotemeta($dstfile)." --default-key $key->{'key'} --detach-sig ".quotemeta($srcfile); } &clean_language(); my ($fh, $fpid) = &proc::pty_process_exec($cmd); &reset_environment(); my ($error, $seen_pass); while(1) { my $rv = &wait_for($fh, "passphrase:", "failed", "error"); if ($rv == 0) { # This should never happen since we supply the passphrase # on the command line already last if ($seen_pass++); sleep(1); syswrite($fh, "$pass\n", length("$pass\n")); } elsif ($rv > 0) { $error++; last; } elsif ($rv < 0) { last; } } close($fh); unlink($srcfile); my $dst = &read_file_contents($dstfile); unlink($dstfile); if ($error || $seen_pass > 1) { return "<pre>".&html_escape($wait_for_input)."</pre>"; } else { $$out = $dst; return undef; } } # verify_data(data, [signature]) # Verifies the signature on some data, and returns a status code and a message # code 0 = verified successfully, message contains signer # code 1 = verified successfully but no trust chain, message contains signer # code 2 = failed to verify, message contains signer # code 3 = do not have signers public key, message contains ID # code 4 = verification totally failed, message contains reason sub verify_data { my ($data, $sig) = @_; my $datafile = &transname(); &write_file_contents($datafile, $data); my $cmd; my $sigfile; if (!$sig) { $cmd = "$gpgpath --verify ".quotemeta($datafile); } else { $sigfile = &transname(); &write_file_contents($sigfile, $sig); $cmd = "$gpgpath --verify ".quotemeta($sigfile)." ".quotemeta($datafile); } #local ($fh, $fpid) = &proc::pty_process_exec($cmd); #&wait_for($fh); #close($fh); #local $out = $wait_for_input; &clean_language(); my $out = &backquote_command("$cmd 2>&1 </dev/null") || ""; &reset_environment(); unlink($datafile); unlink($sigfile) if ($sigfile); if ($out =~ /BAD signature from "(.*)"/i) { return (2, $1); } elsif ($out =~ /key ID (\S+).*\n.*not found/i) { return (3, $1); } elsif ($out =~ /Good signature from "(.*)"/i) { my $signer = $1; if ($out =~ /warning/) { return (1, $signer); } else { return (0, $signer); } } else { return (4, $out); } } # get_trust_level(&key) # Returns the trust level of a key sub get_trust_level { my ($key) = @_; &clean_language(); my $cmd = "$gpgpath --edit-key ".quotemeta($key->{'name'}->[0]); my ($fh, $fpid) = &proc::pty_process_exec($cmd); my $rv = &wait_for($fh, "trust:\\s+(.)", "command>"); my $tr; if ($rv == 0) { $tr = $matches[1] eq "q" ? 1 : $matches[1] eq "n" ? 2 : $matches[1] eq "m" ? 3 : $matches[1] eq "f" ? 4 : 0; } else { $tr = -1; } syswrite($fh, "quit\n", length("quit\n")); close($fh); &reset_environment(); return $tr; } # delete_key(&key) # Delete one public or secret key sub delete_key { my ($key) = @_; if ($key->{'secret'}) { &clean_language(); my $cmd = "$gpgpath --delete-secret-key ". quotemeta($key->{'name'}->[0]); my ($fh, $fpid) = &proc::pty_process_exec($cmd); &wait_for($fh, "\\?"); syswrite($fh, "y\n"); &wait_for($fh, "\\?"); syswrite($fh, "y\n"); sleep(1); close($fh); &reset_environment(); } &clean_language(); my $cmd = "$gpgpath --delete-key ".quotemeta($key->{'name'}->[0]); my ($fh, $fpid) = &proc::pty_process_exec($cmd); &wait_for($fh, "\\?"); syswrite($fh, "y\n"); sleep(1); close($fh); &reset_environment(); } # default_email_address() # Returns the current user's email address, or undef if not possible sub default_email_address { if (&foreign_check("mailbox")) { &foreign_require("mailbox", "mailbox-lib.pl"); my ($fromaddr) = &mailbox::split_addresses( &mailbox::get_preferred_from_address()); if ($fromaddr) { return $fromaddr->[0]; } } return undef; } # fetch_gpg_key(id) # Imports a key by ID from the configured keyserver. Returns 0 on success, # 1 on failure, 2 if there was no change, 3 if the import appeared to succeed # but the key isn't visible. sub fetch_gpg_key { my ($id) = @_; my $out = &backquote_command( "$gpgpath --keyserver ".quotemeta($config{'keyserver'}). " --recv-key ".quotemeta($id)." 2>&1 </dev/null") || ""; my @keys = &list_keys(); my ($key) = grep { lc($_->{'key'}) eq lc($id) } @keys; if ($?) { return wantarray ? (1, $out) : 1; } elsif ($out =~ /not\s+changed/) { return wantarray ? (2, $key) : 2; } else { if ($key) { return (0, $key); } else { return (3, $out); } } } # search_gpg_keys(word) # Searches the configured keyserver for GPG keys matching some name or email # address, and returns them as a list of hash refs sub search_gpg_keys { my ($word) = @_; my $cmd = "$gpgpath --keyserver ".quotemeta($config{'keyserver'}). " --search-keys ".quotemeta($word); my ($fh, $fpid) = &proc::pty_process_exec($cmd); my @rv; while(1) { $wait_for_input = undef; my $rv = &wait_for($fh, "N.ext, or Q.uit"); if ($rv < 0) { last; } my $count = 0; my $key; foreach my $l (split(/\r?\n/, $wait_for_input)) { if ($l =~ /^\(\d+\)\s+(\d+)\s+bit\s+(\S+)\s+key\s+(\S+)/) { # Key with no name .. skip! } elsif ($l =~ /^\(\d+\)\s+(\S.*)\s+<(\S+)>/ || $l =~ /^\(\d+\)\s+(\S.*)/) { # First name and email for a key $key = { 'name' => [ $1 ], 'email' => [ $2 ] }; $key->{'name'} =~ s/\s+$//; push(@rv, $key); $count++; } elsif ($l =~ /^\s+(\S.*)\s+<(\S+)>/ && $key) { # Additional name and email push(@{$key->{'name'}}, $1); push(@{$key->{'email'}}, $2); } elsif ($l =~ /\s+(\d+)\s+bit\s+(\S+)\s+key\s+(\S+),\s+created:\s+(\S+)/ && $key) { # Size and ID $key->{'size'} = $1; $key->{'key'} = $3; $key->{'date'} = $4; if ($l =~ /revoked/) { $key->{'revoked'} = 1; } $key = undef; } } if ($count) { &sysprint($fh, "N\n"); } else { last; } } close($fh); return @rv; } # returns current version of gpg command sub get_gpg_version { my ($gpg) = @_; $gpg = "gpg" if (!$gpg); $gpg = quotemeta($gpg); $gpg = `$gpg --version`; $gpg =~ /(\*|\d+(\.\d+){0,2})/; return $1; } 1;Private