This repository has been archived by the owner on Mar 10, 2021. It is now read-only.
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathcmd-check.c
107 lines (86 loc) · 2.34 KB
/
cmd-check.c
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
/*
* Copyright (c) 2019 Tim van der Molen <tim@kariliq.nl>
*
* Permission to use, copy, modify, and distribute this software for any
* purpose with or without fee is hereby granted, provided that the above
* copyright notice and this permission notice appear in all copies.
*
* THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
* WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
* MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
* ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
* WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
* ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
* OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
*/
#include "config.h"
#include <string.h>
#include <unistd.h>
#include "sigbak.h"
int
cmd_check(int argc, char **argv)
{
struct sbk_ctx *ctx;
struct sbk_file *file;
Signal__BackupFrame *frm;
char *passfile, passphr[128];
int c, ret;
passfile = NULL;
while ((c = getopt(argc, argv, "p:")) != -1)
switch (c) {
case 'p':
passfile = optarg;
break;
default:
goto usage;
}
argc -= optind;
argv += optind;
if (argc != 1)
goto usage;
if (unveil(argv[0], "r") == -1)
err(1, "unveil");
if (passfile == NULL) {
if (pledge("stdio rpath tty", NULL) == -1)
err(1, "pledge");
} else {
if (unveil(passfile, "r") == -1)
err(1, "unveil");
if (pledge("stdio rpath", NULL) == -1)
err(1, "pledge");
}
if ((ctx = sbk_ctx_new()) == NULL)
errx(1, "Cannot create backup context");
if (get_passphrase(passfile, passphr, sizeof passphr) == -1) {
sbk_ctx_free(ctx);
return 1;
}
if (sbk_open(ctx, argv[0], passphr) == -1) {
warnx("%s: %s", argv[0], sbk_error(ctx));
explicit_bzero(passphr, sizeof passphr);
sbk_ctx_free(ctx);
return 1;
}
explicit_bzero(passphr, sizeof passphr);
if (pledge("stdio", NULL) == -1)
err(1, "pledge");
ret = 0;
while ((frm = sbk_get_frame(ctx, &file)) != NULL) {
sbk_free_frame(frm);
if (file != NULL) {
ret = sbk_write_file(ctx, file, NULL);
sbk_free_file(file);
if (ret == -1)
break;
}
}
if (!sbk_eof(ctx) || ret == -1) {
warnx("%s: %s", argv[0], sbk_error(ctx));
ret = 1;
}
sbk_close(ctx);
sbk_ctx_free(ctx);
return ret;
usage:
usage("check", "[-p passfile] backup");
}