123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975 |
- /*
- * storage.c: Unix-specific implementation of the interface defined
- * in storage.h.
- */
- #include <stdio.h>
- #include <stdlib.h>
- #include <string.h>
- #include <assert.h>
- #include <errno.h>
- #include <ctype.h>
- #include <limits.h>
- #include <unistd.h>
- #include <fcntl.h>
- #include <dirent.h>
- #include <sys/stat.h>
- #include <sys/types.h>
- #include <pwd.h>
- #include "putty.h"
- #include "storage.h"
- #include "tree234.h"
- #ifdef PATH_MAX
- #define FNLEN PATH_MAX
- #else
- #define FNLEN 1024 /* XXX */
- #endif
- enum {
- INDEX_DIR, INDEX_HOSTKEYS, INDEX_HOSTKEYS_TMP, INDEX_RANDSEED,
- INDEX_SESSIONDIR, INDEX_SESSION, INDEX_HOSTCADIR, INDEX_HOSTCA
- };
- static const char hex[16] = "0123456789ABCDEF";
- static void make_session_filename(const char *in, strbuf *out)
- {
- if (!in || !*in)
- in = "Default Settings";
- while (*in) {
- /*
- * There are remarkably few punctuation characters that
- * aren't shell-special in some way or likely to be used as
- * separators in some file format or another! Hence we use
- * opt-in for safe characters rather than opt-out for
- * specific unsafe ones...
- */
- if (*in!='+' && *in!='-' && *in!='.' && *in!='@' && *in!='_' &&
- !(*in >= '0' && *in <= '9') &&
- !(*in >= 'A' && *in <= 'Z') &&
- !(*in >= 'a' && *in <= 'z')) {
- put_byte(out, '%');
- put_byte(out, hex[((unsigned char) *in) >> 4]);
- put_byte(out, hex[((unsigned char) *in) & 15]);
- } else
- put_byte(out, *in);
- in++;
- }
- }
- static void decode_session_filename(const char *in, strbuf *out)
- {
- while (*in) {
- if (*in == '%' && in[1] && in[2]) {
- int i, j;
- i = in[1] - '0';
- i -= (i > 9 ? 7 : 0);
- j = in[2] - '0';
- j -= (j > 9 ? 7 : 0);
- put_byte(out, (i << 4) + j);
- in += 3;
- } else {
- put_byte(out, *in++);
- }
- }
- }
- static char *make_filename(int index, const char *subname)
- {
- char *env, *tmp, *ret;
- /*
- * Allow override of the PuTTY configuration location, and of
- * specific subparts of it, by means of environment variables.
- */
- if (index == INDEX_DIR) {
- struct passwd *pwd;
- char *xdg_dir, *old_dir, *old_dir2, *old_dir3, *home, *pwd_home;
- env = getenv("PUTTYDIR");
- if (env)
- return dupstr(env);
- home = getenv("HOME");
- pwd = getpwuid(getuid());
- if (pwd && pwd->pw_dir) {
- pwd_home = pwd->pw_dir;
- } else {
- pwd_home = NULL;
- }
- xdg_dir = NULL;
- env = getenv("XDG_CONFIG_HOME");
- if (env && *env) {
- xdg_dir = dupprintf("%s/putty", env);
- }
- if (!xdg_dir) {
- if (home) {
- tmp = home;
- } else if (pwd_home) {
- tmp = pwd_home;
- } else {
- tmp = "";
- }
- xdg_dir = dupprintf("%s/.config/putty", tmp);
- }
- if (xdg_dir && access(xdg_dir, F_OK) == 0) {
- return xdg_dir;
- }
- old_dir = old_dir2 = old_dir3 = NULL;
- if (home) {
- old_dir = dupprintf("%s/.putty", home);
- }
- if (pwd_home) {
- old_dir2 = dupprintf("%s/.putty", pwd_home);
- }
- old_dir3 = dupstr("/.putty");
- if (old_dir && access(old_dir, F_OK) == 0) {
- ret = old_dir;
- goto out;
- }
- if (old_dir2 && access(old_dir2, F_OK) == 0) {
- ret = old_dir2;
- goto out;
- }
- if (access(old_dir3, F_OK) == 0) {
- ret = old_dir3;
- goto out;
- }
- #ifdef XDG_DEFAULT
- if (xdg_dir) {
- ret = xdg_dir;
- goto out;
- }
- #endif
- ret = old_dir ? old_dir : (old_dir2 ? old_dir2 : old_dir3);
- out:
- if (ret != old_dir)
- sfree(old_dir);
- if (ret != old_dir2)
- sfree(old_dir2);
- if (ret != old_dir3)
- sfree(old_dir3);
- if (ret != xdg_dir)
- sfree(xdg_dir);
- return ret;
- }
- if (index == INDEX_SESSIONDIR) {
- env = getenv("PUTTYSESSIONS");
- if (env)
- return dupstr(env);
- tmp = make_filename(INDEX_DIR, NULL);
- ret = dupprintf("%s/sessions", tmp);
- sfree(tmp);
- return ret;
- }
- if (index == INDEX_SESSION) {
- strbuf *sb = strbuf_new();
- tmp = make_filename(INDEX_SESSIONDIR, NULL);
- put_fmt(sb, "%s/", tmp);
- sfree(tmp);
- make_session_filename(subname, sb);
- return strbuf_to_str(sb);
- }
- if (index == INDEX_HOSTKEYS) {
- env = getenv("PUTTYSSHHOSTKEYS");
- if (env)
- return dupstr(env);
- tmp = make_filename(INDEX_DIR, NULL);
- ret = dupprintf("%s/sshhostkeys", tmp);
- sfree(tmp);
- return ret;
- }
- if (index == INDEX_HOSTKEYS_TMP) {
- tmp = make_filename(INDEX_HOSTKEYS, NULL);
- ret = dupprintf("%s.tmp", tmp);
- sfree(tmp);
- return ret;
- }
- if (index == INDEX_RANDSEED) {
- env = getenv("PUTTYRANDOMSEED");
- if (env)
- return dupstr(env);
- tmp = make_filename(INDEX_DIR, NULL);
- ret = dupprintf("%s/randomseed", tmp);
- sfree(tmp);
- return ret;
- }
- if (index == INDEX_HOSTCADIR) {
- env = getenv("PUTTYSSHHOSTCAS");
- if (env)
- return dupstr(env);
- tmp = make_filename(INDEX_DIR, NULL);
- ret = dupprintf("%s/sshhostcas", tmp);
- sfree(tmp);
- return ret;
- }
- if (index == INDEX_HOSTCA) {
- strbuf *sb = strbuf_new();
- tmp = make_filename(INDEX_HOSTCADIR, NULL);
- put_fmt(sb, "%s/", tmp);
- sfree(tmp);
- make_session_filename(subname, sb);
- return strbuf_to_str(sb);
- }
- tmp = make_filename(INDEX_DIR, NULL);
- ret = dupprintf("%s/ERROR", tmp);
- sfree(tmp);
- return ret;
- }
- struct settings_w {
- FILE *fp;
- };
- settings_w *open_settings_w(const char *sessionname, char **errmsg)
- {
- char *filename, *err;
- FILE *fp;
- *errmsg = NULL;
- /*
- * Start by making sure the .putty directory and its sessions
- * subdir actually exist.
- */
- filename = make_filename(INDEX_DIR, NULL);
- if ((err = make_dir_path(filename, 0700)) != NULL) {
- *errmsg = dupprintf("Unable to save session: %s", err);
- sfree(err);
- sfree(filename);
- return NULL;
- }
- sfree(filename);
- filename = make_filename(INDEX_SESSIONDIR, NULL);
- if ((err = make_dir_path(filename, 0700)) != NULL) {
- *errmsg = dupprintf("Unable to save session: %s", err);
- sfree(err);
- sfree(filename);
- return NULL;
- }
- sfree(filename);
- filename = make_filename(INDEX_SESSION, sessionname);
- fp = fopen(filename, "w");
- if (!fp) {
- *errmsg = dupprintf("Unable to save session: open(\"%s\") "
- "returned '%s'", filename, strerror(errno));
- sfree(filename);
- return NULL; /* can't open */
- }
- sfree(filename);
- settings_w *toret = snew(settings_w);
- toret->fp = fp;
- return toret;
- }
- void write_setting_s(settings_w *handle, const char *key, const char *value)
- {
- fprintf(handle->fp, "%s=%s\n", key, value);
- }
- void write_setting_i(settings_w *handle, const char *key, int value)
- {
- fprintf(handle->fp, "%s=%d\n", key, value);
- }
- void close_settings_w(settings_w *handle)
- {
- fclose(handle->fp);
- sfree(handle);
- }
- /* ----------------------------------------------------------------------
- * System for treating X resources as a fallback source of defaults,
- * after data read from a saved-session disk file.
- *
- * The read_setting_* functions will call get_setting(key) as a
- * fallback if the setting isn't in the file they loaded. That in turn
- * will hand on to x_get_default, which the front end application
- * provides, and which actually reads resources from the X server (if
- * appropriate). In between, there's a tree234 of X-resource shaped
- * settings living locally in this file: the front end can call
- * provide_xrm_string() to insert a setting into this tree (typically
- * in response to an -xrm command line option or similar), and those
- * will override the actual X resources.
- */
- struct skeyval {
- const char *key;
- const char *value;
- };
- static tree234 *xrmtree = NULL;
- static int keycmp(void *av, void *bv)
- {
- struct skeyval *a = (struct skeyval *)av;
- struct skeyval *b = (struct skeyval *)bv;
- return strcmp(a->key, b->key);
- }
- void provide_xrm_string(const char *string, const char *progname)
- {
- const char *p, *q;
- struct skeyval *xrms, *ret;
- p = q = strchr(string, ':');
- if (!q) {
- fprintf(stderr, "%s: expected a colon in resource string"
- " \"%s\"\n", progname, string);
- return;
- }
- xrms = snew(struct skeyval);
- while (p > string && p[-1] != '.' && p[-1] != '*')
- p--;
- xrms->key = mkstr(make_ptrlen(p, q-p));
- q++;
- while (*q && isspace((unsigned char)*q))
- q++;
- xrms->value = dupstr(q);
- if (!xrmtree)
- xrmtree = newtree234(keycmp);
- ret = add234(xrmtree, xrms);
- if (ret) {
- /* Override an existing string. */
- del234(xrmtree, ret);
- add234(xrmtree, xrms);
- }
- }
- static const char *get_setting(const char *key)
- {
- struct skeyval tmp, *ret;
- tmp.key = key;
- if (xrmtree) {
- ret = find234(xrmtree, &tmp, NULL);
- if (ret)
- return ret->value;
- }
- return x_get_default(key);
- }
- /* ----------------------------------------------------------------------
- * Main code for reading settings from a disk file, calling the above
- * get_setting() as a fallback if necessary.
- */
- struct settings_r {
- tree234 *t;
- };
- settings_r *open_settings_r(const char *sessionname)
- {
- char *filename;
- FILE *fp;
- char *line;
- settings_r *toret;
- filename = make_filename(INDEX_SESSION, sessionname);
- fp = fopen(filename, "r");
- sfree(filename);
- if (!fp)
- return NULL; /* can't open */
- toret = snew(settings_r);
- toret->t = newtree234(keycmp);
- while ( (line = fgetline(fp)) ) {
- char *value = strchr(line, '=');
- struct skeyval *kv;
- if (!value) {
- sfree(line);
- continue;
- }
- *value++ = '\0';
- value[strcspn(value, "\r\n")] = '\0'; /* trim trailing NL */
- kv = snew(struct skeyval);
- kv->key = dupstr(line);
- kv->value = dupstr(value);
- add234(toret->t, kv);
- sfree(line);
- }
- fclose(fp);
- return toret;
- }
- char *read_setting_s(settings_r *handle, const char *key)
- {
- const char *val;
- struct skeyval tmp, *kv;
- tmp.key = key;
- if (handle != NULL &&
- (kv = find234(handle->t, &tmp, NULL)) != NULL) {
- val = kv->value;
- assert(val != NULL);
- } else
- val = get_setting(key);
- if (!val)
- return NULL;
- else
- return dupstr(val);
- }
- int read_setting_i(settings_r *handle, const char *key, int defvalue)
- {
- const char *val;
- struct skeyval tmp, *kv;
- tmp.key = key;
- if (handle != NULL &&
- (kv = find234(handle->t, &tmp, NULL)) != NULL) {
- val = kv->value;
- assert(val != NULL);
- } else
- val = get_setting(key);
- if (!val)
- return defvalue;
- else
- return atoi(val);
- }
- FontSpec *read_setting_fontspec(settings_r *handle, const char *name)
- {
- /*
- * In GTK1-only PuTTY, we used to store font names simply as a
- * valid X font description string (logical or alias), under a
- * bare key such as "Font".
- *
- * In GTK2 PuTTY, we have a prefix system where "client:"
- * indicates a Pango font and "server:" an X one; existing
- * configuration needs to be reinterpreted as having the
- * "server:" prefix, so we change the storage key from the
- * provided name string (e.g. "Font") to a suffixed one
- * ("FontName").
- */
- char *suffname = dupcat(name, "Name");
- char *tmp;
- if ((tmp = read_setting_s(handle, suffname)) != NULL) {
- FontSpec *fs = fontspec_new(tmp);
- sfree(suffname);
- sfree(tmp);
- return fs; /* got new-style name */
- }
- sfree(suffname);
- /* Fall back to old-style name. */
- tmp = read_setting_s(handle, name);
- if (tmp && *tmp) {
- char *tmp2 = dupcat("server:", tmp);
- FontSpec *fs = fontspec_new(tmp2);
- sfree(tmp2);
- sfree(tmp);
- return fs;
- } else {
- sfree(tmp);
- return NULL;
- }
- }
- Filename *read_setting_filename(settings_r *handle, const char *name)
- {
- char *tmp = read_setting_s(handle, name);
- if (tmp) {
- Filename *ret = filename_from_str(tmp);
- sfree(tmp);
- return ret;
- } else
- return NULL;
- }
- void write_setting_fontspec(settings_w *handle, const char *name, FontSpec *fs)
- {
- /*
- * read_setting_fontspec had to handle two cases, but when
- * writing our settings back out we simply always generate the
- * new-style name.
- */
- char *suffname = dupcat(name, "Name");
- write_setting_s(handle, suffname, fs->name);
- sfree(suffname);
- }
- void write_setting_filename(settings_w *handle,
- const char *name, Filename *result)
- {
- write_setting_s(handle, name, result->path);
- }
- void close_settings_r(settings_r *handle)
- {
- struct skeyval *kv;
- if (!handle)
- return;
- while ( (kv = index234(handle->t, 0)) != NULL) {
- del234(handle->t, kv);
- sfree((char *)kv->key);
- sfree((char *)kv->value);
- sfree(kv);
- }
- freetree234(handle->t);
- sfree(handle);
- }
- void del_settings(const char *sessionname)
- {
- char *filename;
- filename = make_filename(INDEX_SESSION, sessionname);
- unlink(filename);
- sfree(filename);
- }
- struct settings_e {
- DIR *dp;
- };
- settings_e *enum_settings_start(void)
- {
- DIR *dp;
- char *filename;
- filename = make_filename(INDEX_SESSIONDIR, NULL);
- dp = opendir(filename);
- sfree(filename);
- settings_e *toret = snew(settings_e);
- toret->dp = dp;
- return toret;
- }
- static bool enum_dir_next(DIR *dp, int index, strbuf *out)
- {
- struct dirent *de;
- struct stat st;
- strbuf *fullpath;
- if (!dp)
- return false;
- fullpath = strbuf_new();
- char *sessiondir = make_filename(index, NULL);
- put_dataz(fullpath, sessiondir);
- sfree(sessiondir);
- put_byte(fullpath, '/');
- size_t baselen = fullpath->len;
- while ( (de = readdir(dp)) != NULL ) {
- strbuf_shrink_to(fullpath, baselen);
- put_dataz(fullpath, de->d_name);
- if (stat(fullpath->s, &st) < 0 || !S_ISREG(st.st_mode))
- continue; /* try another one */
- decode_session_filename(de->d_name, out);
- strbuf_free(fullpath);
- return true;
- }
- strbuf_free(fullpath);
- return false;
- }
- bool enum_settings_next(settings_e *handle, strbuf *out)
- {
- return enum_dir_next(handle->dp, INDEX_SESSIONDIR, out);
- }
- void enum_settings_finish(settings_e *handle)
- {
- if (handle->dp)
- closedir(handle->dp);
- sfree(handle);
- }
- struct host_ca_enum {
- DIR *dp;
- };
- host_ca_enum *enum_host_ca_start(void)
- {
- host_ca_enum *handle = snew(host_ca_enum);
- char *filename = make_filename(INDEX_HOSTCADIR, NULL);
- handle->dp = opendir(filename);
- sfree(filename);
- return handle;
- }
- bool enum_host_ca_next(host_ca_enum *handle, strbuf *out)
- {
- return enum_dir_next(handle->dp, INDEX_HOSTCADIR, out);
- }
- void enum_host_ca_finish(host_ca_enum *handle)
- {
- if (handle->dp)
- closedir(handle->dp);
- sfree(handle);
- }
- host_ca *host_ca_load(const char *name)
- {
- char *filename = make_filename(INDEX_HOSTCA, name);
- FILE *fp = fopen(filename, "r");
- sfree(filename);
- if (!fp)
- return NULL;
- host_ca *hca = host_ca_new();
- hca->name = dupstr(name);
- char *line;
- CertExprBuilder *eb = NULL;
- while ( (line = fgetline(fp)) ) {
- char *value = strchr(line, '=');
- if (!value) {
- sfree(line);
- continue;
- }
- *value++ = '\0';
- value[strcspn(value, "\r\n")] = '\0'; /* trim trailing NL */
- if (!strcmp(line, "PublicKey")) {
- hca->ca_public_key = base64_decode_sb(ptrlen_from_asciz(value));
- } else if (!strcmp(line, "MatchHosts")) {
- if (!eb)
- eb = cert_expr_builder_new();
- cert_expr_builder_add(eb, value);
- } else if (!strcmp(line, "Validity")) {
- hca->validity_expression = strbuf_to_str(
- percent_decode_sb(ptrlen_from_asciz(value)));
- } else if (!strcmp(line, "PermitRSASHA1")) {
- hca->opts.permit_rsa_sha1 = atoi(value);
- } else if (!strcmp(line, "PermitRSASHA256")) {
- hca->opts.permit_rsa_sha256 = atoi(value);
- } else if (!strcmp(line, "PermitRSASHA512")) {
- hca->opts.permit_rsa_sha512 = atoi(value);
- }
- sfree(line);
- }
- fclose(fp);
- if (eb) {
- if (!hca->validity_expression) {
- hca->validity_expression = cert_expr_expression(eb);
- }
- cert_expr_builder_free(eb);
- }
- return hca;
- }
- char *host_ca_save(host_ca *hca)
- {
- if (!*hca->name)
- return dupstr("CA record must have a name");
- char *filename = make_filename(INDEX_HOSTCA, hca->name);
- FILE *fp = fopen(filename, "w");
- if (!fp)
- return dupprintf("Unable to open file '%s'", filename);
- fprintf(fp, "PublicKey=");
- base64_encode_fp(fp, ptrlen_from_strbuf(hca->ca_public_key), 0);
- fprintf(fp, "\n");
- fprintf(fp, "Validity=");
- percent_encode_fp(fp, ptrlen_from_asciz(hca->validity_expression), NULL);
- fprintf(fp, "\n");
- fprintf(fp, "PermitRSASHA1=%d\n", (int)hca->opts.permit_rsa_sha1);
- fprintf(fp, "PermitRSASHA256=%d\n", (int)hca->opts.permit_rsa_sha256);
- fprintf(fp, "PermitRSASHA512=%d\n", (int)hca->opts.permit_rsa_sha512);
- bool bad = ferror(fp);
- if (fclose(fp) < 0)
- bad = true;
- char *err = NULL;
- if (bad)
- err = dupprintf("Unable to write file '%s'", filename);
- sfree(filename);
- return err;
- }
- char *host_ca_delete(const char *name)
- {
- if (!*name)
- return dupstr("CA record must have a name");
- char *filename = make_filename(INDEX_HOSTCA, name);
- bool bad = remove(filename) < 0;
- char *err = NULL;
- if (bad)
- err = dupprintf("Unable to delete file '%s'", filename);
- sfree(filename);
- return err;
- }
- /*
- * Lines in the host keys file are of the form
- *
- * type@port:hostname keydata
- *
- * e.g.
- *
- * rsa@22:foovax.example.org 0x23,0x293487364395345345....2343
- */
- int check_stored_host_key(const char *hostname, int port,
- const char *keytype, const char *key)
- {
- FILE *fp;
- char *filename;
- char *line;
- int ret;
- filename = make_filename(INDEX_HOSTKEYS, NULL);
- fp = fopen(filename, "r");
- sfree(filename);
- if (!fp)
- return 1; /* key does not exist */
- ret = 1;
- while ( (line = fgetline(fp)) ) {
- int i;
- char *p = line;
- char porttext[20];
- line[strcspn(line, "\n")] = '\0'; /* strip trailing newline */
- i = strlen(keytype);
- if (strncmp(p, keytype, i))
- goto done;
- p += i;
- if (*p != '@')
- goto done;
- p++;
- sprintf(porttext, "%d", port);
- i = strlen(porttext);
- if (strncmp(p, porttext, i))
- goto done;
- p += i;
- if (*p != ':')
- goto done;
- p++;
- i = strlen(hostname);
- if (strncmp(p, hostname, i))
- goto done;
- p += i;
- if (*p != ' ')
- goto done;
- p++;
- /*
- * Found the key. Now just work out whether it's the right
- * one or not.
- */
- if (!strcmp(p, key))
- ret = 0; /* key matched OK */
- else
- ret = 2; /* key mismatch */
- done:
- sfree(line);
- if (ret != 1)
- break;
- }
- fclose(fp);
- return ret;
- }
- bool have_ssh_host_key(const char *hostname, int port,
- const char *keytype)
- {
- /*
- * If we have a host key, check_stored_host_key will return 0 or 2.
- * If we don't have one, it'll return 1.
- */
- return check_stored_host_key(hostname, port, keytype, "") != 1;
- }
- void store_host_key(Seat *seat, const char *hostname, int port,
- const char *keytype, const char *key)
- {
- FILE *rfp, *wfp;
- char *newtext, *line;
- int headerlen;
- char *filename, *tmpfilename;
- /*
- * Open both the old file and a new file.
- */
- tmpfilename = make_filename(INDEX_HOSTKEYS_TMP, NULL);
- wfp = fopen(tmpfilename, "w");
- if (!wfp && errno == ENOENT) {
- char *dir, *errmsg;
- dir = make_filename(INDEX_DIR, NULL);
- if ((errmsg = make_dir_path(dir, 0700)) != NULL) {
- seat_nonfatal(seat, "Unable to store host key: %s", errmsg);
- sfree(errmsg);
- sfree(dir);
- sfree(tmpfilename);
- return;
- }
- sfree(dir);
- wfp = fopen(tmpfilename, "w");
- }
- if (!wfp) {
- seat_nonfatal(seat, "Unable to store host key: open(\"%s\") "
- "returned '%s'", tmpfilename, strerror(errno));
- sfree(tmpfilename);
- return;
- }
- filename = make_filename(INDEX_HOSTKEYS, NULL);
- rfp = fopen(filename, "r");
- newtext = dupprintf("%s@%d:%s %s\n", keytype, port, hostname, key);
- headerlen = 1 + strcspn(newtext, " "); /* count the space too */
- /*
- * Copy all lines from the old file to the new one that _don't_
- * involve the same host key identifier as the one we're adding.
- */
- if (rfp) {
- while ( (line = fgetline(rfp)) ) {
- if (strncmp(line, newtext, headerlen))
- fputs(line, wfp);
- sfree(line);
- }
- fclose(rfp);
- }
- /*
- * Now add the new line at the end.
- */
- fputs(newtext, wfp);
- fclose(wfp);
- if (rename(tmpfilename, filename) < 0) {
- seat_nonfatal(seat, "Unable to store host key: rename(\"%s\",\"%s\")"
- " returned '%s'", tmpfilename, filename,
- strerror(errno));
- }
- sfree(tmpfilename);
- sfree(filename);
- sfree(newtext);
- }
- void read_random_seed(noise_consumer_t consumer)
- {
- int fd;
- char *fname;
- fname = make_filename(INDEX_RANDSEED, NULL);
- fd = open(fname, O_RDONLY);
- sfree(fname);
- if (fd >= 0) {
- char buf[512];
- int ret;
- while ( (ret = read(fd, buf, sizeof(buf))) > 0)
- consumer(buf, ret);
- close(fd);
- }
- }
- void write_random_seed(void *data, int len)
- {
- int fd;
- char *fname;
- fname = make_filename(INDEX_RANDSEED, NULL);
- /*
- * Don't truncate the random seed file if it already exists; if
- * something goes wrong half way through writing it, it would
- * be better to leave the old data there than to leave it empty.
- */
- fd = open(fname, O_CREAT | O_WRONLY, 0600);
- if (fd < 0) {
- if (errno != ENOENT) {
- nonfatal("Unable to write random seed: open(\"%s\") "
- "returned '%s'", fname, strerror(errno));
- sfree(fname);
- return;
- }
- char *dir, *errmsg;
- dir = make_filename(INDEX_DIR, NULL);
- if ((errmsg = make_dir_path(dir, 0700)) != NULL) {
- nonfatal("Unable to write random seed: %s", errmsg);
- sfree(errmsg);
- sfree(fname);
- sfree(dir);
- return;
- }
- sfree(dir);
- fd = open(fname, O_CREAT | O_WRONLY, 0600);
- if (fd < 0) {
- nonfatal("Unable to write random seed: open(\"%s\") "
- "returned '%s'", fname, strerror(errno));
- sfree(fname);
- return;
- }
- }
- while (len > 0) {
- int ret = write(fd, data, len);
- if (ret < 0) {
- nonfatal("Unable to write random seed: write "
- "returned '%s'", strerror(errno));
- break;
- }
- len -= ret;
- data = (char *)data + len;
- }
- close(fd);
- sfree(fname);
- }
- void cleanup_all(void)
- {
- }
|