1/*	$NetBSD: compare.c,v 1.51 2007/02/04 08:03:18 elad Exp $	*/
2
3/*-
4 * Copyright (c) 1989, 1993
5 *	The Regents of the University of California.  All rights reserved.
6 *
7 * Redistribution and use in source and binary forms, with or without
8 * modification, are permitted provided that the following conditions
9 * are met:
10 * 1. Redistributions of source code must retain the above copyright
11 *    notice, this list of conditions and the following disclaimer.
12 * 2. Redistributions in binary form must reproduce the above copyright
13 *    notice, this list of conditions and the following disclaimer in the
14 *    documentation and/or other materials provided with the distribution.
15 * 3. Neither the name of the University nor the names of its contributors
16 *    may be used to endorse or promote products derived from this software
17 *    without specific prior written permission.
18 *
19 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
20 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
21 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
22 * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
23 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
24 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
25 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
26 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
27 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
28 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
29 * SUCH DAMAGE.
30 */
31
32#if HAVE_NBTOOL_CONFIG_H
33#include "nbtool_config.h"
34#endif
35
36#include <sys/cdefs.h>
37#if defined(__RCSID) && !defined(lint)
38#if 0
39static char sccsid[] = "@(#)compare.c	8.1 (Berkeley) 6/6/93";
40#else
41__RCSID("$NetBSD: compare.c,v 1.51 2007/02/04 08:03:18 elad Exp $");
42#endif
43#endif /* not lint */
44
45#include <sys/param.h>
46
47#include <errno.h>
48#include <fcntl.h>
49#include <stdio.h>
50#include <stdlib.h>
51#include <string.h>
52#include <time.h>
53#include <unistd.h>
54
55#ifndef NO_MD5
56#include <md5.h>
57#endif
58#ifndef NO_RMD160
59#include <rmd160.h>
60#endif
61#ifndef NO_SHA1
62#include <sha1.h>
63#endif
64#ifndef NO_SHA2
65#include <sha2.h>
66#endif
67
68#include "extern.h"
69
70#define	INDENTNAMELEN	8
71#define MARK								\
72do {									\
73	len = printf("%s: ", RP(p));					\
74	if (len > INDENTNAMELEN) {					\
75		tab = "\t";						\
76		printf("\n");						\
77	} else {							\
78		tab = "";						\
79		printf("%*s", INDENTNAMELEN - (int)len, "");		\
80	}								\
81} while (0)
82#define	LABEL if (!label++) MARK
83
84#if HAVE_STRUCT_STAT_ST_FLAGS
85
86
87#define CHANGEFLAGS							\
88	if (flags != p->fts_statp->st_flags) {				\
89		char *sf;						\
90		if (!label) {						\
91			MARK;						\
92			sf = flags_to_string(p->fts_statp->st_flags, "none"); \
93			printf("%sflags (\"%s\"", tab, sf);		\
94			free(sf);					\
95		}							\
96		if (lchflags(p->fts_accpath, flags)) {			\
97			label++;					\
98			printf(", not modified: %s)\n",			\
99			    strerror(errno));				\
100		} else {						\
101			sf = flags_to_string(flags, "none");		\
102			printf(", modified to \"%s\")\n", sf);		\
103			free(sf);					\
104		}							\
105	}
106
107/* SETFLAGS:
108 * given pflags, additionally set those flags specified in s->st_flags and
109 * selected by mask (the other flags are left unchanged).
110 */
111#define SETFLAGS(pflags, mask)						\
112do {									\
113	flags = (s->st_flags & (mask)) | (pflags);			\
114	CHANGEFLAGS;							\
115} while (0)
116
117/* CLEARFLAGS:
118 * given pflags, reset the flags specified in s->st_flags and selected by mask
119 * (the other flags are left unchanged).
120 */
121#define CLEARFLAGS(pflags, mask)					\
122do {									\
123	flags = (~(s->st_flags & (mask)) & CH_MASK) & (pflags);		\
124	CHANGEFLAGS;							\
125} while (0)
126#endif	/* HAVE_STRUCT_STAT_ST_FLAGS */
127
128int
129compare(NODE *s, FTSENT *p)
130{
131	u_int32_t len, val, flags;
132	int fd, label;
133	const char *cp, *tab;
134#if !defined(NO_MD5) || !defined(NO_RMD160) || !defined(NO_SHA1) || !defined(NO_SHA2)
135	char *digestbuf;
136#endif
137
138	tab = NULL;
139	label = 0;
140	switch(s->type) {
141	case F_BLOCK:
142		if (!S_ISBLK(p->fts_statp->st_mode))
143			goto typeerr;
144		break;
145	case F_CHAR:
146		if (!S_ISCHR(p->fts_statp->st_mode))
147			goto typeerr;
148		break;
149	case F_DIR:
150		if (!S_ISDIR(p->fts_statp->st_mode))
151			goto typeerr;
152		break;
153	case F_FIFO:
154		if (!S_ISFIFO(p->fts_statp->st_mode))
155			goto typeerr;
156		break;
157	case F_FILE:
158		if (!S_ISREG(p->fts_statp->st_mode))
159			goto typeerr;
160		break;
161	case F_LINK:
162		if (!S_ISLNK(p->fts_statp->st_mode))
163			goto typeerr;
164		break;
165#ifdef S_ISSOCK
166	case F_SOCK:
167		if (!S_ISSOCK(p->fts_statp->st_mode))
168			goto typeerr;
169		break;
170#endif
171typeerr:		LABEL;
172		printf("\ttype (%s, %s)\n",
173		    nodetype(s->type), inotype(p->fts_statp->st_mode));
174		return (label);
175	}
176	if (mtree_Wflag)
177		goto afterpermwhack;
178#if HAVE_STRUCT_STAT_ST_FLAGS
179	if (iflag && !uflag) {
180		if (s->flags & F_FLAGS)
181		    SETFLAGS(p->fts_statp->st_flags, SP_FLGS);
182		return (label);
183        }
184	if (mflag && !uflag) {
185		if (s->flags & F_FLAGS)
186		    CLEARFLAGS(p->fts_statp->st_flags, SP_FLGS);
187		return (label);
188        }
189#endif
190	if (s->flags & F_DEV &&
191	    (s->type == F_BLOCK || s->type == F_CHAR) &&
192	    s->st_rdev != p->fts_statp->st_rdev) {
193		LABEL;
194		printf("%sdevice (%#llx, %#llx",
195		    tab, (long long)s->st_rdev,
196		    (long long)p->fts_statp->st_rdev);
197		if (uflag) {
198			if ((unlink(p->fts_accpath) == -1) ||
199			    (mknod(p->fts_accpath,
200			      s->st_mode | nodetoino(s->type),
201			      s->st_rdev) == -1) ||
202			    (lchown(p->fts_accpath, p->fts_statp->st_uid,
203			      p->fts_statp->st_gid) == -1) )
204				printf(", not modified: %s)\n",
205				    strerror(errno));
206			 else
207				printf(", modified)\n");
208		} else
209			printf(")\n");
210		tab = "\t";
211	}
212	/* Set the uid/gid first, then set the mode. */
213	if (s->flags & (F_UID | F_UNAME) && s->st_uid != p->fts_statp->st_uid) {
214		LABEL;
215		printf("%suser (%lu, %lu",
216		    tab, (u_long)s->st_uid, (u_long)p->fts_statp->st_uid);
217		if (uflag) {
218			if (lchown(p->fts_accpath, s->st_uid, -1))
219				printf(", not modified: %s)\n",
220				    strerror(errno));
221			else
222				printf(", modified)\n");
223		} else
224			printf(")\n");
225		tab = "\t";
226	}
227	if (s->flags & (F_GID | F_GNAME) && s->st_gid != p->fts_statp->st_gid) {
228		LABEL;
229		printf("%sgid (%lu, %lu",
230		    tab, (u_long)s->st_gid, (u_long)p->fts_statp->st_gid);
231		if (uflag) {
232			if (lchown(p->fts_accpath, -1, s->st_gid))
233				printf(", not modified: %s)\n",
234				    strerror(errno));
235			else
236				printf(", modified)\n");
237		}
238		else
239			printf(")\n");
240		tab = "\t";
241	}
242	if (s->flags & F_MODE &&
243	    s->st_mode != (p->fts_statp->st_mode & MBITS)) {
244		if (lflag) {
245			mode_t tmode, mode;
246
247			tmode = s->st_mode;
248			mode = p->fts_statp->st_mode & MBITS;
249			/*
250			 * if none of the suid/sgid/etc bits are set,
251			 * then if the mode is a subset of the target,
252			 * skip.
253			 */
254			if (!((tmode & ~(S_IRWXU|S_IRWXG|S_IRWXO)) ||
255			    (mode & ~(S_IRWXU|S_IRWXG|S_IRWXO))))
256				if ((mode | tmode) == tmode)
257					goto skip;
258		}
259
260		LABEL;
261		printf("%spermissions (%#lo, %#lo",
262		    tab, (u_long)s->st_mode,
263		    (u_long)p->fts_statp->st_mode & MBITS);
264		if (uflag) {
265			if (lchmod(p->fts_accpath, s->st_mode))
266				printf(", not modified: %s)\n",
267				    strerror(errno));
268			else
269				printf(", modified)\n");
270		}
271		else
272			printf(")\n");
273		tab = "\t";
274	skip:	;
275	}
276	if (s->flags & F_NLINK && s->type != F_DIR &&
277	    s->st_nlink != p->fts_statp->st_nlink) {
278		LABEL;
279		printf("%slink count (%lu, %lu)\n",
280		    tab, (u_long)s->st_nlink, (u_long)p->fts_statp->st_nlink);
281		tab = "\t";
282	}
283	if (s->flags & F_SIZE && s->st_size != p->fts_statp->st_size) {
284		LABEL;
285		printf("%ssize (%lld, %lld)\n",
286		    tab, (long long)s->st_size,
287		    (long long)p->fts_statp->st_size);
288		tab = "\t";
289	}
290	/*
291	 * XXX
292	 * Since utimes(2) only takes a timeval, there's no point in
293	 * comparing the low bits of the timespec nanosecond field.  This
294	 * will only result in mismatches that we can never fix.
295	 *
296	 * Doesn't display microsecond differences.
297	 */
298	if (s->flags & F_TIME) {
299		struct timeval tv[2];
300		struct stat *ps = p->fts_statp;
301		time_t smtime = s->st_mtimespec.tv_sec;
302
303#if defined(BSD4_4) && !defined(HAVE_NBTOOL_CONFIG_H)
304		time_t pmtime = ps->st_mtimespec.tv_sec;
305
306		TIMESPEC_TO_TIMEVAL(&tv[0], &s->st_mtimespec);
307		TIMESPEC_TO_TIMEVAL(&tv[1], &ps->st_mtimespec);
308#else
309		time_t pmtime = (time_t)ps->st_mtime;
310
311		tv[0].tv_sec = smtime;
312		tv[0].tv_usec = 0;
313		tv[1].tv_sec = pmtime;
314		tv[1].tv_usec = 0;
315#endif
316
317		if (tv[0].tv_sec != tv[1].tv_sec ||
318		    tv[0].tv_usec != tv[1].tv_usec) {
319			LABEL;
320			printf("%smodification time (%.24s, ",
321			    tab, ctime(&smtime));
322			printf("%.24s", ctime(&pmtime));
323			if (tflag) {
324				tv[1] = tv[0];
325				if (utimes(p->fts_accpath, tv))
326					printf(", not modified: %s)\n",
327					    strerror(errno));
328				else
329					printf(", modified)\n");
330			} else
331				printf(")\n");
332			tab = "\t";
333		}
334	}
335#if HAVE_STRUCT_STAT_ST_FLAGS
336	/*
337	 * XXX
338	 * since lchflags(2) will reset file times, the utimes() above
339	 * may have been useless!  oh well, we'd rather have correct
340	 * flags, rather than times?
341	 */
342        if ((s->flags & F_FLAGS) && ((s->st_flags != p->fts_statp->st_flags)
343	    || mflag || iflag)) {
344		if (s->st_flags != p->fts_statp->st_flags) {
345			char *f_s;
346			LABEL;
347			f_s = flags_to_string(s->st_flags, "none");
348			printf("%sflags (\"%s\" is not ", tab, f_s);
349			free(f_s);
350			f_s = flags_to_string(p->fts_statp->st_flags, "none");
351			printf("\"%s\"", f_s);
352			free(f_s);
353		}
354		if (uflag) {
355			if (iflag)
356				SETFLAGS(0, CH_MASK);
357			else if (mflag)
358				CLEARFLAGS(0, SP_FLGS);
359			else
360				SETFLAGS(0, (~SP_FLGS & CH_MASK));
361		} else
362			printf(")\n");
363		tab = "\t";
364	}
365#endif	/* HAVE_STRUCT_STAT_ST_FLAGS */
366
367	/*
368	 * from this point, no more permission checking or whacking
369	 * occurs, only checking of stuff like checksums and symlinks.
370	 */
371 afterpermwhack:
372	if (s->flags & F_CKSUM) {
373		if ((fd = open(p->fts_accpath, O_RDONLY, 0)) < 0) {
374			LABEL;
375			printf("%scksum: %s: %s\n",
376			    tab, p->fts_accpath, strerror(errno));
377			tab = "\t";
378		} else if (crc(fd, &val, &len)) {
379			close(fd);
380			LABEL;
381			printf("%scksum: %s: %s\n",
382			    tab, p->fts_accpath, strerror(errno));
383			tab = "\t";
384		} else {
385			close(fd);
386			if (s->cksum != val) {
387				LABEL;
388				printf("%scksum (%lu, %lu)\n",
389				    tab, s->cksum, (unsigned long)val);
390			}
391			tab = "\t";
392		}
393	}
394#ifndef NO_MD5
395	if (s->flags & F_MD5) {
396		if ((digestbuf = MD5File(p->fts_accpath, NULL)) == NULL) {
397			LABEL;
398			printf("%smd5: %s: %s\n",
399			    tab, p->fts_accpath, strerror(errno));
400			tab = "\t";
401		} else {
402			if (strcmp(s->md5digest, digestbuf)) {
403				LABEL;
404				printf("%smd5 (0x%s, 0x%s)\n",
405				    tab, s->md5digest, digestbuf);
406			}
407			tab = "\t";
408			free(digestbuf);
409		}
410	}
411#endif	/* ! NO_MD5 */
412#ifndef NO_RMD160
413	if (s->flags & F_RMD160) {
414		if ((digestbuf = RMD160File(p->fts_accpath, NULL)) == NULL) {
415			LABEL;
416			printf("%srmd160: %s: %s\n",
417			    tab, p->fts_accpath, strerror(errno));
418			tab = "\t";
419		} else {
420			if (strcmp(s->rmd160digest, digestbuf)) {
421				LABEL;
422				printf("%srmd160 (0x%s, 0x%s)\n",
423				    tab, s->rmd160digest, digestbuf);
424			}
425			tab = "\t";
426			free(digestbuf);
427		}
428	}
429#endif	/* ! NO_RMD160 */
430#ifndef NO_SHA1
431	if (s->flags & F_SHA1) {
432		if ((digestbuf = SHA1File(p->fts_accpath, NULL)) == NULL) {
433			LABEL;
434			printf("%ssha1: %s: %s\n",
435			    tab, p->fts_accpath, strerror(errno));
436			tab = "\t";
437		} else {
438			if (strcmp(s->sha1digest, digestbuf)) {
439				LABEL;
440				printf("%ssha1 (0x%s, 0x%s)\n",
441				    tab, s->sha1digest, digestbuf);
442			}
443			tab = "\t";
444			free(digestbuf);
445		}
446	}
447#endif	/* ! NO_SHA1 */
448#ifndef NO_SHA2
449	if (s->flags & F_SHA256) {
450		if ((digestbuf = SHA256_File(p->fts_accpath, NULL)) == NULL) {
451			LABEL;
452			printf("%ssha256: %s: %s\n",
453			    tab, p->fts_accpath, strerror(errno));
454			tab = "\t";
455		} else {
456			if (strcmp(s->sha256digest, digestbuf)) {
457				LABEL;
458				printf("%ssha256 (0x%s, 0x%s)\n",
459				    tab, s->sha256digest, digestbuf);
460			}
461			tab = "\t";
462			free(digestbuf);
463		}
464	}
465	if (s->flags & F_SHA384) {
466		if ((digestbuf = SHA384_File(p->fts_accpath, NULL)) == NULL) {
467			LABEL;
468			printf("%ssha384: %s: %s\n",
469			    tab, p->fts_accpath, strerror(errno));
470			tab = "\t";
471		} else {
472			if (strcmp(s->sha384digest, digestbuf)) {
473				LABEL;
474				printf("%ssha384 (0x%s, 0x%s)\n",
475				    tab, s->sha384digest, digestbuf);
476			}
477			tab = "\t";
478			free(digestbuf);
479		}
480	}
481	if (s->flags & F_SHA512) {
482		if ((digestbuf = SHA512_File(p->fts_accpath, NULL)) == NULL) {
483			LABEL;
484			printf("%ssha512: %s: %s\n",
485			    tab, p->fts_accpath, strerror(errno));
486			tab = "\t";
487		} else {
488			if (strcmp(s->sha512digest, digestbuf)) {
489				LABEL;
490				printf("%ssha512 (0x%s, 0x%s)\n",
491				    tab, s->sha512digest, digestbuf);
492			}
493			tab = "\t";
494			free(digestbuf);
495		}
496	}
497#endif	/* ! NO_SHA2 */
498	if (s->flags & F_SLINK &&
499	    strcmp(cp = rlink(p->fts_accpath), s->slink)) {
500		LABEL;
501		printf("%slink ref (%s, %s", tab, cp, s->slink);
502		if (uflag) {
503			if ((unlink(p->fts_accpath) == -1) ||
504			    (symlink(s->slink, p->fts_accpath) == -1) )
505				printf(", not modified: %s)\n",
506				    strerror(errno));
507			else
508				printf(", modified)\n");
509		} else
510			printf(")\n");
511	}
512	return (label);
513}
514
515const char *
516rlink(const char *name)
517{
518	static char lbuf[MAXPATHLEN];
519	int len;
520
521	if ((len = readlink(name, lbuf, sizeof(lbuf) - 1)) == -1)
522		mtree_err("%s: %s", name, strerror(errno));
523	lbuf[len] = '\0';
524	return (lbuf);
525}
526