From: weasel Date: Tue, 29 Jun 2004 12:29:10 +0000 (+0000) Subject: Initial Import X-Git-Url: https://git.sthu.org/?a=commitdiff_plain;h=c4e5fa4caf995b306fd9c154b0fb2a76c0ce9428;p=pgp-tools.git Initial Import git-svn-id: svn://svn.debian.org/pgp-tools/trunk@5 b513b33f-fedd-0310-b452-c3deb5f4c849 --- diff --git a/caff/caff b/caff/caff new file mode 100755 index 0000000..0eca57b --- /dev/null +++ b/caff/caff @@ -0,0 +1,675 @@ +#!/usr/bin/perl -w + +# caff -- CA - fire and forget +# +# Copyright (c) 2004 Peter Palfrader +# +# All rights reserved. +# +# Redistribution and use in source and binary forms, with or without +# modification, are permitted provided that the following conditions +# are met: +# 1. Redistributions of source code must retain the above copyright +# notice, this list of conditions and the following disclaimer. +# 2. Redistributions in binary form must reproduce the above copyright +# notice, this list of conditions and the following disclaimer in the +# documentation and/or other materials provided with the distribution. +# 3. The name of the author may not be used to endorse or promote products +# derived from this software without specific prior written permission. +# +# THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR +# IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES +# OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. +# IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, +# INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT +# NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, +# DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY +# THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT +# (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF +# THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. + +use strict; +use IO::Handle; +use English; +use File::Path; +use File::Temp qw{tempdir}; +use MIME::Entity; +use Fcntl; +use IO::Select; +use GnuPG::Interface; + +my %CONFIG; +my $VERSION = '0.0.0.1'; + +sub load_config() { + my $config = $ENV{'HOME'} . '/.caffrc'; + -f $config or die "No file $config present. See caffrc(5).\n"; + unless (scalar eval `cat $config`) { + die "Couldn't parse $config: $EVAL_ERROR\n" if $EVAL_ERROR; + }; + + die ("caffhome is not defined.\n") unless defined $CONFIG{'caffhome'}; + die ("owner is not defined.\n") unless defined $CONFIG{'owner'}; + die ("email is not defined.\n") unless defined $CONFIG{'email'}; + die ("keyid is not defined.\n") unless defined $CONFIG{'keyid'}; + die ("keyid is not an array ref\n") unless (ref $CONFIG{'keyid'} eq 'ARRAY'); + for my $keyid (@{$CONFIG{'keyid'}}) { + $keyid =~ /^[A-Fa-z0-9]{16}$/ or die ("key $keyid is not a long (16 digit) keyid.\n"); + }; + @{$CONFIG{'keyid'}} = map { uc } @{$CONFIG{'keyid'}}; + $CONFIG{'export-sig-age'}= 24*60*60 unless defined $CONFIG{'export-sig-age'}; + $CONFIG{'keyserver'} = 'subkeys.pgp.net' unless defined $CONFIG{'keyserver'}; + $CONFIG{'gpg'} = 'gpg' unless defined $CONFIG{'gpg'}; + $CONFIG{'gpg-sign'} = $CONFIG{'gpg'} unless defined $CONFIG{'gpg-sign'}; + $CONFIG{'gpg-delsig'} = $CONFIG{'gpg'} unless defined $CONFIG{'gpg-delsig'}; + $CONFIG{'secret-keyring'} = $ENV{'HOME'}.'/.gnupg/secring.gpg' unless defined $CONFIG{'secret-keyring'}; +}; + +sub notice($) { + my ($line) = @_; + print "[NOTICE] $line\n"; +}; +sub info($) { + my ($line) = @_; + print "[INFO] $line\n"; +}; +sub debug($) { + my ($line) = @_; + #print "[DEBUG] $line\n"; +}; +sub trace($) { + my ($line) = @_; + #print "[trace] $line\n"; +}; +sub trace2($) { + my ($line) = @_; + #print "[trace2] $line\n"; +}; + +sub make_gpg_fds() { + my %fds = ( + stdin => IO::Handle->new(), + stdout => IO::Handle->new(), + stderr => IO::Handle->new(), + status => IO::Handle->new() ); + my $handles = GnuPG::Handles->new( %fds ); + return ($fds{'stdin'}, $fds{'stdout'}, $fds{'stderr'}, $fds{'status'}, $handles); +}; + +sub readwrite_gpg($$$$$%) { + my ($in, $inputfd, $stdoutfd, $stderrfd, $statusfd, %options) = @_; + + trace("Entering readwrite_gpg."); + + my ($first_line, $dummy) = split /\n/, $in; + debug("readwrite_gpg sends ".(defined $first_line ? $first_line : "")); + + local $INPUT_RECORD_SEPARATOR = undef; + my $sout = IO::Select->new(); + my $sin = IO::Select->new(); + my $offset = 0; + + trace("input is $inputfd; output is $stdoutfd; err is $stderrfd; status is ".(defined $statusfd ? $statusfd : 'undef')."."); + + $inputfd->blocking(0); + $stdoutfd->blocking(0); + $statusfd->blocking(0) if defined $statusfd; + $stderrfd->blocking(0); + $sout->add($stdoutfd); + $sout->add($stderrfd); + $sout->add($statusfd) if defined $statusfd; + $sin->add($inputfd); + + my ($stdout, $stderr, $status) = ("", "", ""); + my $exitwhenstatusmatches = $options{'exitwhenstatusmatches'}; + trace("doign stuff until we find $exitwhenstatusmatches") if defined $exitwhenstatusmatches; + + my ($readyr, $readyw, $written); + while ($sout->count() > 0 || (defined($sin) && ($sin->count() > 0))) { + if (defined $exitwhenstatusmatches) { + if ($status =~ /$exitwhenstatusmatches/m) { + trace("readwrite_gpg found match on $exitwhenstatusmatches"); + last; + }; + }; + + trace("select waiting for ".($sout->count())." fds."); + ($readyr, $readyw, undef) = IO::Select::select($sout, $sin, undef, 1); + trace("ready: write: ".(defined $readyw ? scalar @$readyw : 0 )."; read: ".(defined $readyr ? scalar @$readyr : 0)); + for my $wfd (@$readyw) { + if (length($in) != $offset) { + trace("writing to $wfd."); + $written = $wfd->syswrite($in, length($in) - $offset, $offset); + $offset += $written; + }; + if ($offset == length($in)) { + trace("writing to $wfd done."); + unless ($options{'nocloseinput'}) { + close $wfd; + trace("$wfd closed."); + }; + $sin->remove($wfd); + $sin = undef; + } + } + + next unless (defined(@$readyr)); # Wait some more. + + for my $rfd (@$readyr) { + if ($rfd->eof) { + trace("reading from $rfd done."); + $sout->remove($rfd); + close($rfd); + next; + } + trace("reading from $rfd."); + if ($rfd == $stdoutfd) { + $stdout .= <$rfd>; + trace2("stdout is now $stdout\n================"); + next; + } + if (defined $statusfd && $rfd == $statusfd) { + $status .= <$rfd>; + trace2("status is now $status\n================"); + next; + } + if ($rfd == $stderrfd) { + $stderr .= <$rfd>; + trace2("stderr is now $stderr\n================"); + next; + } + } + } + trace("readwrite_gpg done."); + return ($stdout, $stderr, $status); +}; + +sub ask($$) { + my ($question, $default) = @_; + my $answer; + while (1) { + print $question,' ',($default ? '[Y/n]' : '[y/N]'), ' '; + $answer = ; + chomp $answer; + last if ((defined $answer) && (length $answer <= 1)); + print "grrrrrr.\n"; + sleep 1; + }; + my $result = $default; + $result = 1 if $answer =~ /y/i; + $result = 0 if $answer =~ /n/i; + return $result; +}; + + + + + +my $KEYEDIT_PROMPT = '^\[GNUPG:\] GET_LINE keyedit.prompt'; +my $KEYEDIT_DELUID_PROMPT = '^\[GNUPG:\] GET_BOOL keyedit.remove.uid.okay'; +my $KEYEDIT_DELSIG_PROMPT = '^\[GNUPG:\] GET_BOOL keyedit.delsig'; +my $KEYEDIT_KEYEDIT_OR_DELSIG_PROMPT = '^\[GNUPG:\] (GET_BOOL keyedit.delsig|GET_LINE keyedit.prompt)'; +my $KEYEDIT_DELSUBKEY_PROMPT = '^\[GNUPG:\] GET_BOOL keyedit.remove.subkey'; + +load_config; +my $USER_AGENT = "caff $VERSION - (c) 2004 Peter Palfrader"; + +my $KEYSBASE = $CONFIG{'caffhome'}.'/keys'; +my $GNUPGHOME = $CONFIG{'caffhome'}.'/gnupghome'; + +-d $KEYSBASE || mkpath($KEYSBASE , 0, 0700) or die ("Cannot create $KEYSBASE: $!\n"); +-d $GNUPGHOME || mkpath($GNUPGHOME, 0, 0700) or die ("Cannot create $GNUPGHOME: $!\n"); + +my $NOW = time; +my ($sec,$min,$hour,$mday,$mon,$year,$wday,$yday,$isdst) = localtime($NOW); +my $DATE_STRING = sprintf("%04d-%02d-%02d", $year+1900, $mon+1, $mday); + + +sub usage() { + print STDERR "Usage: $PROGRAM_NAME [-u [ ...]\n"; + exit 1; +}; + +sub export_key($$) { + my ($gnupghome, $keyid) = @_; + + my $gpg = GnuPG::Interface->new(); + $gpg->call( $CONFIG{'gpg'} ); + $gpg->options->hash_init( + 'homedir' => $gnupghome, + 'armor' => 1 ); + $gpg->options->meta_interactive( 0 ); + my ($inputfd, $stdoutfd, $stderrfd, $statusfd, $handles) = make_gpg_fds(); + my $pid = $gpg->export_keys(handles => $handles, command_args => [ $keyid ]); + my ($stdout, $stderr, $status) = readwrite_gpg('', $inputfd, $stdoutfd, $stderrfd, $statusfd); + waitpid $pid, 0; + + return $stdout; +}; + +#send_mail($address, $can_encrypt, $longkeyid, $uid, @attached); +sub send_mail($$$@) { + my ($address, $can_encrypt, $key_id, @keys) = @_; + + my $message = "Hi,\n\n"; + + $message .= 'please find attached the user id'.(scalar @keys >= 2 ? 's' : '')."\n"; + for my $key (@keys) { + $message .= "\t".$key->{'text'}."\n"; + }; + $message .= qq{of your key $key_id signed by me. + +Note that I did not upload your key to any keyservers. If you want this +new signature to be available to others, please upload it yourself. +With GnuPG this can be done using + gpg --keyserver subkeys.pgp.net --send-key $key_id + +If you have any questions, don't hesitate to ask. + +Regards, +$CONFIG{'owner'} +}; + my $message_entity = MIME::Entity->build( + Type => "text/plain", + Charset => "utf-8", + Disposition => 'inline', + Data => $message); + + my @key_entities; + for my $key (@keys) { + $message_entity->attach( + Type => "application/pgp-keys", + Disposition => 'attachment', + Encoding => "7bit", + Description => "PGP Key 0x$key_id, uid ".($key->{'text'}).' ('.($key->{'serial'}).')', + Data => $key->{'key'}, + Filename => "0x$key_id.".$key->{'serial'}.".asc"); + }; + + if ($can_encrypt) { + my $message = $message_entity->stringify(); + + my $gpg = GnuPG::Interface->new(); + $gpg->call( $CONFIG{'gpg'} ); + $gpg->options->hash_init( 'homedir' => $GNUPGHOME, + 'extra_args' => '--always-trust', + 'armor' => 1 ); + $gpg->options->meta_interactive( 0 ); + my ($inputfd, $stdoutfd, $stderrfd, $statusfd, $handles) = make_gpg_fds(); + $gpg->options->push_recipients( $key_id ); + $gpg->options->push_recipients( $CONFIG{'also-encrypt-to'} ) if defined $CONFIG{'also-encrypt-to'}; + my $pid = $gpg->encrypt(handles => $handles); + my ($stdout, $stderr, $status) = readwrite_gpg($message, $inputfd, $stdoutfd, $stderrfd, $statusfd); + waitpid $pid, 0; + if ($stdout eq '') { + warn ("No data from gpg for list-key $key_id\n"); + next; + }; + $message = $stdout; + + $message_entity = MIME::Entity->build( + Type => 'multipart/encrypted; protocol="application/pgp-encrypted"'); + + $message_entity->attach( + Type => "application/pgp-encrypted", + Disposition => 'attachment', + Encoding => "7bit", + Data => "Version: 1\n"); + + $message_entity->attach( + Type => "application/octet-stream", + Filename => 'msg.asc', + Disposition => 'inline', + Encoding => "7bit", + Data => $message); + }; + + $message_entity->head->add("Subject", "Your signed PGP key 0x$key_id"); + $message_entity->head->add("To", $address); + $message_entity->head->add("From", $CONFIG{'owner'}.' <'.$CONFIG{'email'}.'>'); + $message_entity->head->add("User-Agent", $USER_AGENT); + $message_entity->send(); + $message_entity->stringify(); +}; + +my $USER; +my @KEYIDS; + +usage() unless scalar @ARGV >= 1; +if ($ARGV[0] eq '-u') { + usage() unless scalar @ARGV >= 3; + shift @ARGV; + $USER = shift @ARGV; + unless ($USER =~ /^[A-Za-z0-9]{8,8}([A-Za-z0-9]{8})?$/) { + print STDERR "-u $USER is not a keyid.\n"; + usage(); + }; + $USER = uc($USER); +}; +for my $keyid (@ARGV) { + unless ($keyid =~ /^[A-Za-z0-9]{8}([A-Za-z0-9]{8})?$/) { + print STDERR "$keyid is not a keyid.\n"; + usage(); + }; + push @KEYIDS, uc($keyid); +}; + + +############################# +# receive keys from keyserver +############################# +my $gpg = GnuPG::Interface->new(); +$gpg->call( $CONFIG{'gpg'} ); +$gpg->options->hash_init( + 'homedir' => $GNUPGHOME, + 'extra_args' => '--keyserver='.$CONFIG{'keyserver'} ); +$gpg->options->meta_interactive( 0 ); +my ($inputfd, $stdoutfd, $stderrfd, $statusfd, $handles) = make_gpg_fds(); +my $pid = $gpg->recv_keys(handles => $handles, command_args => [ @KEYIDS ]); +my ($stdout, $stderr, $status) = readwrite_gpg('', $inputfd, $stdoutfd, $stderrfd, $statusfd); +waitpid $pid, 0; + +my @keyids_ok; +my @keyids_failed; +# [GNUPG:] IMPORT_OK 0 5B00C96D5D54AEE1206BAF84DE7AAF6E94C09C7F +# [GNUPG:] NODATA 1 +# [GNUPG:] NODATA 1 +# [GNUPG:] IMPORT_OK 0 25FC1614B8F87B52FF2F99B962AF4031C82E0039 +for my $line (split /\n/, $status) { + if ($line =~ /^\[GNUPG:\] IMPORT_OK/) { + push @keyids_ok, shift @KEYIDS; + } elsif ($line =~ /^\[GNUPG:\] NODATA/) { + push @keyids_failed, shift @KEYIDS; + }; +} +die ("Still keys in \@KEYIDS. This should not happen.") if scalar @KEYIDS; +notice ("Import failed for: ". (join ' ', @keyids_failed).".") if scalar @keyids_failed; + +########### +# sign keys +########### +info("Sign the following keys according to your policy..."); +for my $keyid (@keyids_ok) { + my @command; + push @command, $CONFIG{'gpg-sign'}; + push @command, '--local-user', $USER if (defined $USER); + push @command, "--homedir=$GNUPGHOME"; + push @command, '--secret-keyring', $CONFIG{'secret-keyring'}; + push @command, '--sign-key', $keyid; + print join(' ', @command),"\n"; + system (@command); +}; + +################## +# export and prune +################## +KEYS: +for my $keyid (@keyids_ok) { + # get key listing + ################# + $gpg = GnuPG::Interface->new(); + $gpg->call( $CONFIG{'gpg'} ); + $gpg->options->hash_init( 'homedir' => $GNUPGHOME ); + $gpg->options->meta_interactive( 0 ); + ($inputfd, $stdoutfd, $stderrfd, $statusfd, $handles) = make_gpg_fds(); + $gpg->options->hash_init( 'extra_args' => [ '--with-colons', '--fixed-list-mode' ] ); + $pid = $gpg->list_public_keys(handles => $handles, command_args => [ $keyid ]); + ($stdout, $stderr, $status) = readwrite_gpg('', $inputfd, $stdoutfd, $stderrfd, $statusfd); + waitpid $pid, 0; + if ($stdout eq '') { + warn ("No data from gpg for list-key $keyid\n"); + next; + }; + my $keyinfo = $stdout; + my @publine = grep { /^pub/ } (split /\n/, $stdout); + my ($dummy1, $dummy2, $dummy3, $dummy4, $longkeyid, $dummy6, $dummy7, $dummy8, $dummy9, $dummy10, $dummy11, $flags) = split /:/, pop @publine; + my $can_encrypt = $flags =~ /E/; + unless (defined $longkeyid) { + warn ("Didn't find public keyid in edit dialog of key $keyid.\n"); + next; + }; + + # export the key + ################ + my $asciikey = export_key($GNUPGHOME, $keyid); + if ($asciikey eq '') { + warn ("No data from gpg for export $keyid\n"); + next; + }; + + my @UIDS; + my $uid_number = 0; + while (1) { + my $this_uid_text = ''; + $uid_number++; + info("Doing key $keyid, uid $uid_number"); + + # import into temporary gpghome + ############################### + my $tempdir = tempdir( "caff-$keyid-XXXXX", DIR => '/tmp/', CLEANUP => 1); + my $gpg = GnuPG::Interface->new(); + $gpg->call( $CONFIG{'gpg'} ); + $gpg->options->hash_init( 'homedir' => $tempdir ); + $gpg->options->meta_interactive( 0 ); + my ($inputfd, $stdoutfd, $stderrfd, $statusfd, $handles) = make_gpg_fds(); + my $pid = $gpg->import_keys(handles => $handles); + my ($stdout, $stderr, $status) = readwrite_gpg($asciikey, $inputfd, $stdoutfd, $stderrfd, $statusfd); + waitpid $pid, 0; + + if ($status !~ /^\[GNUPG:\] IMPORT_OK/m) { + warn ("Could not import $keyid into temporary gnupg.\n"); + next; + }; + + # prune it + ########## + $gpg = GnuPG::Interface->new(); + $gpg->call( $CONFIG{'gpg-delsig'} ); + $gpg->options->hash_init( + 'homedir' => $tempdir, + 'extra_args' => [ '--with-colons', '--fixed-list-mode', '--command-fd=0', '--no-tty' ] ); + ($inputfd, $stdoutfd, $stderrfd, $statusfd, $handles) = make_gpg_fds(); + $pid = $gpg->wrap_call( + commands => [ '--edit' ], + command_args => [ $keyid ], + handles => $handles ); + + debug("Starting edit session"); + ($stdout, $stderr, $status) = readwrite_gpg('', $inputfd, $stdoutfd, $stderrfd, $statusfd, exitwhenstatusmatches => $KEYEDIT_PROMPT, nocloseinput => 1); + + # delete other uids + ################### + my $number_of_subkeys = 0; + my $i = 1; + my $have_one = 0; + my $is_uat = 0; + my $delete_some = 0; + debug("Parsing stdout output."); + for my $line (split /\n/, $stdout) { + debug("Checking line $line"); + my ($type, $dummy2, $dummy3, $dummy4, $dummy5, $dummy6, $dummy7, $dummy8, $dummy9, $uidtext) = split /:/, $line; + if ($type eq 'sub') { + $number_of_subkeys++; + }; + next unless ($type eq 'uid' || $type eq 'uat'); + debug("line is interesting."); + if ($uid_number != $i) { + debug("mark for deletion."); + readwrite_gpg("$i\n", $inputfd, $stdoutfd, $stderrfd, $statusfd, exitwhenstatusmatches => $KEYEDIT_PROMPT, nocloseinput => 1); + $delete_some = 1; + } else { + debug("keep it."); + $have_one = 1; + $this_uid_text = ($type eq 'uid') ? $uidtext : 'attribute'; + $is_uat = $type eq 'uat'; + }; + $i++; + }; + debug("Parsing stdout output done."); + if ($is_uat) { + notice("Can't handle attribute userid of key $keyid."); + next; + }; + unless ($have_one) { + info("key $keyid done."); + last; + }; + if ($delete_some) { + debug("need to delete a few uids."); + readwrite_gpg("deluid\n", $inputfd, $stdoutfd, $stderrfd, $statusfd, exitwhenstatusmatches => $KEYEDIT_DELUID_PROMPT, nocloseinput => 1); + readwrite_gpg("yes\n", $inputfd, $stdoutfd, $stderrfd, $statusfd, exitwhenstatusmatches => $KEYEDIT_PROMPT, nocloseinput => 1); + }; + + # delete subkeys + ################ + if ($number_of_subkeys > 0) { + for (my $i=1; $i<=$number_of_subkeys; $i++) { + readwrite_gpg("key $i\n", $inputfd, $stdoutfd, $stderrfd, $statusfd, exitwhenstatusmatches => $KEYEDIT_PROMPT, nocloseinput => 1); + }; + readwrite_gpg("delkey\n", $inputfd, $stdoutfd, $stderrfd, $statusfd, exitwhenstatusmatches => $KEYEDIT_DELSUBKEY_PROMPT, nocloseinput => 1); + readwrite_gpg("yes\n", $inputfd, $stdoutfd, $stderrfd, $statusfd, exitwhenstatusmatches => $KEYEDIT_PROMPT, nocloseinput => 1); + }; + + # delete signatures + ################### + my $signed_by_me = 0; + readwrite_gpg("1\n", $inputfd, $stdoutfd, $stderrfd, $statusfd, exitwhenstatusmatches => $KEYEDIT_PROMPT, nocloseinput => 1); + ($stdout, $stderr, $status) = + readwrite_gpg("delsig\n", $inputfd, $stdoutfd, $stderrfd, $statusfd, exitwhenstatusmatches => $KEYEDIT_DELSIG_PROMPT, nocloseinput => 1); + + while($status =~ /$KEYEDIT_DELSIG_PROMPT/m) { + # sig:?::17:EA2199412477CAF8:1058095214:::::13x: + my @sigline = grep { /^sig/ } (split /\n/, $stdout); + my $line = pop @sigline; + my $answer = "no"; + if (defined $line) { # only if we found a sig here - we never remove revocation packets for instance + my ($dummy1, $dummy2, $dummy3, $dummy4, $signer, $created, $dummy7, $dummy8, $dummy9) = split /:/, $line; + if ($signer eq $longkeyid) { + $answer = "no"; + } elsif (grep { $signer eq $_ } @{$CONFIG{'keyid'}}) { + $answer = "no"; + $signed_by_me = $signed_by_me > $created ? $signed_by_me : $created; + } else { + $answer = "yes"; + }; + }; + ($stdout, $stderr, $status) = + readwrite_gpg($answer."\n", $inputfd, $stdoutfd, $stderrfd, $statusfd, exitwhenstatusmatches => $KEYEDIT_KEYEDIT_OR_DELSIG_PROMPT, nocloseinput => 1); + }; + readwrite_gpg("save\n", $inputfd, $stdoutfd, $stderrfd, $statusfd); + waitpid $pid, 0; + + my $asciikey = export_key($tempdir, $longkeyid); + if ($asciikey eq '') { + warn ("No data from gpg for export $longkeyid\n"); + next; + }; + + if ($signed_by_me) { + if ($NOW - $signed_by_me > $CONFIG{'export-sig-age'} ) { + my $write = ask("Signature on $this_uid_text is old. Export?", 0); + next unless $write; + }; + my $keydir = "$KEYSBASE/$DATE_STRING"; + -d $keydir || mkpath($keydir , 0, 0700) or die ("Cannot create $keydir $!\n"); + + my $keyfile = "$keydir/$longkeyid.key.$uid_number.$this_uid_text.asc"; + open (KEY, ">$keyfile") or die ("Cannot open $keyfile\n"); + print KEY $asciikey; + close KEY; + + push @UIDS, { text => $this_uid_text, key => $asciikey, serial => $uid_number }; + + info("$longkeyid $uid_number $this_uid_text done."); + } else { + info("$longkeyid $uid_number $this_uid_text is not signed by me, not writing."); + }; + }; + + if (scalar @UIDS == 0) { + info("found no signed uids for $keyid"); + } else { + my @attached ; + for my $uid (@UIDS) { + unless ($uid->{'text'} =~ /@/) { + my $attach = ask("UID $uid->{'text'} is no email address, attach it to every email sent?", 1); + push @attached, $uid; + }; + }; + + notice("Key has no encryption capabilities, mail will be sent unencrypted") unless $can_encrypt; + for my $uid (@UIDS) { + if ($uid->{'text'} =~ /@/) { + my $address = $uid->{'text'}; + $address =~ s/.*<(.*)>.*/$1/; + my $send = ask("Send mail to '$address' for $uid->{'text'}?", 1); + if ($send) { + my $mail = send_mail($address, $can_encrypt, $longkeyid, $uid, @attached); + + my $keydir = "$KEYSBASE/$DATE_STRING"; + my $mailfile = "$keydir/$longkeyid.mail.".$uid->{'serial'}.".".$uid->{'text'}; + open (KEY, ">$mailfile") or die ("Cannot open $mailfile\n"); + print KEY $mail; + close KEY; + }; + }; + }; + }; + +}; + + + + +###############################################################3 +#### old fork gpg --edit +=cut + my ($stdin_read, $stdin_write); + my ($stdout_read, $stdout_write); + my ($stderr_read, $stderr_write); + my ($status_read, $status_write); + pipe $stdin_read, $stdin_write; + pipe $stdout_read, $stdout_write; + pipe $stderr_read, $stderr_write; + pipe $status_read, $status_write; + + $pid = fork(); + unless ($pid) { # child + close $stdin_write; + close $stdout_read; + close $stderr_read; + close $status_read; + + my @call; + push @call, $CONFIG{'gpg-delsig'}; + push @call, "--homedir=$tempdir"; + push @call, '--with-colons'; + push @call, '--fixed-list-mode'; + push @call, '--command-fd=0'; + push @call, "--status-fd=".fileno($status_write); + push @call, "--no-tty"; + push @call, "--edit"; + push @call, $keyid; + + close STDIN; + close STDOUT; + close STDERR; + open (STDIN, "<&".fileno($stdin_read)) or die ("Cannot reopen stdin: $!\n"); + open (STDOUT, ">&".fileno($stdout_write)) or die ("Cannot reopen stdout: $!\n"); + open (STDERR, ">&".fileno($stderr_write)) or die ("Cannot reopen stderr: $!\n"); + + fcntl $status_write, F_SETFD, 0; + + exec (@call); + exit; + }; + close $stdin_read; + close $stdout_write; + close $stderr_write; + close $status_write; + + $inputfd = $stdin_write; + $stdoutfd = $stdout_read; + $stderrfd = $stderr_read; + $statusfd = $status_read; +=cut diff --git a/caff/caffrc.sample b/caff/caffrc.sample new file mode 100644 index 0000000..43d3fb5 --- /dev/null +++ b/caff/caffrc.sample @@ -0,0 +1,11 @@ +#! perl <-- get vim to syntax highlight properly + +$CONFIG{'owner'} = 'Peter Palfrader'; +$CONFIG{'email'} = 'peter@palfrader.org'; +$CONFIG{'keyid'} = [ qw{DE7AAF6E94C09C7F 62AF4031C82E0039} ]; +$CONFIG{'also-encrypt-to'} = 'DE7AAF6E94C09C7F'; +$CONFIG{'caffhome'} = $ENV{'HOME'}.'/.caff'; + +$CONFIG{'gpg-delsig'} = '/home/weasel/tmp/gpg/gnupg-1.3.6/g10/gpg'; + +$CONFIG{'secret-keyring'} = '/tmp/gpg/secring.gpg';