| 1 | // filesystem unique_path.cpp --------------------------------------------------------// |
| 2 | |
| 3 | // Copyright Beman Dawes 2010 |
| 4 | |
| 5 | // Distributed under the Boost Software License, Version 1.0. |
| 6 | // See http://www.boost.org/LICENSE_1_0.txt |
| 7 | |
| 8 | // Library home page: http://www.boost.org/libs/filesystem |
| 9 | |
| 10 | //--------------------------------------------------------------------------------------// |
| 11 | |
| 12 | // define BOOST_FILESYSTEM_SOURCE so that <boost/filesystem/config.hpp> knows |
| 13 | // the library is being built (possibly exporting rather than importing code) |
| 14 | #define BOOST_FILESYSTEM_SOURCE |
| 15 | |
| 16 | #ifndef BOOST_SYSTEM_NO_DEPRECATED |
| 17 | # define BOOST_SYSTEM_NO_DEPRECATED |
| 18 | #endif |
| 19 | |
| 20 | #include <boost/filesystem/operations.hpp> |
| 21 | #include <cassert> |
| 22 | |
| 23 | # ifdef BOOST_POSIX_API |
| 24 | # include <fcntl.h> |
| 25 | # ifdef BOOST_HAS_UNISTD_H |
| 26 | # include <unistd.h> |
| 27 | # endif |
| 28 | # else // BOOST_WINDOWS_API |
| 29 | # include <windows.h> |
| 30 | # include <wincrypt.h> |
| 31 | # ifdef _MSC_VER |
| 32 | # pragma comment(lib, "Advapi32.lib") |
| 33 | # endif |
| 34 | # endif |
| 35 | |
| 36 | namespace { |
| 37 | |
| 38 | void fail(int err, boost::system::error_code* ec) |
| 39 | { |
| 40 | if (ec == 0) |
| 41 | BOOST_FILESYSTEM_THROW( boost::system::system_error(err, |
| 42 | boost::system::system_category(), |
| 43 | "boost::filesystem::unique_path" )); |
| 44 | |
| 45 | ec->assign(err, boost::system::system_category()); |
| 46 | return; |
| 47 | } |
| 48 | |
| 49 | #ifdef BOOST_WINDOWS_API |
| 50 | |
| 51 | int acquire_crypt_handle(HCRYPTPROV& handle) |
| 52 | { |
| 53 | if (::CryptAcquireContextW(&handle, 0, 0, PROV_RSA_FULL, CRYPT_VERIFYCONTEXT | CRYPT_SILENT)) |
| 54 | return 0; |
| 55 | |
| 56 | int errval = ::GetLastError(); |
| 57 | if (errval != NTE_BAD_KEYSET) |
| 58 | return errval; |
| 59 | |
| 60 | if (::CryptAcquireContextW(&handle, 0, 0, PROV_RSA_FULL, CRYPT_NEWKEYSET | CRYPT_VERIFYCONTEXT | CRYPT_SILENT)) |
| 61 | return 0; |
| 62 | |
| 63 | errval = ::GetLastError(); |
| 64 | // Another thread could have attempted to create the keyset at the same time. |
| 65 | if (errval != NTE_EXISTS) |
| 66 | return errval; |
| 67 | |
| 68 | if (::CryptAcquireContextW(&handle, 0, 0, PROV_RSA_FULL, CRYPT_VERIFYCONTEXT | CRYPT_SILENT)) |
| 69 | return 0; |
| 70 | |
| 71 | return ::GetLastError(); |
| 72 | } |
| 73 | |
| 74 | #endif |
| 75 | |
| 76 | void system_crypt_random(void* buf, std::size_t len, boost::system::error_code* ec) |
| 77 | { |
| 78 | # ifdef BOOST_POSIX_API |
| 79 | |
| 80 | int file = open("/dev/urandom" , O_RDONLY); |
| 81 | if (file == -1) |
| 82 | { |
| 83 | file = open("/dev/random" , O_RDONLY); |
| 84 | if (file == -1) |
| 85 | { |
| 86 | fail(errno, ec); |
| 87 | return; |
| 88 | } |
| 89 | } |
| 90 | |
| 91 | size_t bytes_read = 0; |
| 92 | while (bytes_read < len) |
| 93 | { |
| 94 | ssize_t n = read(file, buf, len - bytes_read); |
| 95 | if (n == -1) |
| 96 | { |
| 97 | close(file); |
| 98 | fail(errno, ec); |
| 99 | return; |
| 100 | } |
| 101 | bytes_read += n; |
| 102 | buf = static_cast<char*>(buf) + n; |
| 103 | } |
| 104 | |
| 105 | close(file); |
| 106 | |
| 107 | # else // BOOST_WINDOWS_API |
| 108 | |
| 109 | HCRYPTPROV handle; |
| 110 | int errval = acquire_crypt_handle(handle); |
| 111 | |
| 112 | if (!errval) |
| 113 | { |
| 114 | BOOL gen_ok = ::CryptGenRandom(handle, static_cast<DWORD>(len), static_cast<unsigned char*>(buf)); |
| 115 | if (!gen_ok) |
| 116 | errval = ::GetLastError(); |
| 117 | ::CryptReleaseContext(handle, 0); |
| 118 | } |
| 119 | |
| 120 | if (!errval) return; |
| 121 | |
| 122 | fail(errval, ec); |
| 123 | # endif |
| 124 | } |
| 125 | |
| 126 | } // unnamed namespace |
| 127 | |
| 128 | namespace boost { namespace filesystem { namespace detail { |
| 129 | |
| 130 | BOOST_FILESYSTEM_DECL |
| 131 | path unique_path(const path& model, system::error_code* ec) |
| 132 | { |
| 133 | // This function used wstring for fear of misidentifying |
| 134 | // a part of a multibyte character as a percent sign. |
| 135 | // However, double byte encodings only have 80-FF as lead |
| 136 | // bytes and 40-7F as trailing bytes, whereas % is 25. |
| 137 | // So, use string on POSIX and avoid conversions. |
| 138 | |
| 139 | path::string_type s( model.native() ); |
| 140 | |
| 141 | #ifdef BOOST_WINDOWS_API |
| 142 | const wchar_t hex[] = L"0123456789abcdef" ; |
| 143 | const wchar_t percent = L'%'; |
| 144 | #else |
| 145 | const char hex[] = "0123456789abcdef" ; |
| 146 | const char percent = '%'; |
| 147 | #endif |
| 148 | |
| 149 | char ran[] = "123456789abcdef" ; // init to avoid clang static analyzer message |
| 150 | // see ticket #8954 |
| 151 | assert(sizeof(ran) == 16); |
| 152 | const int max_nibbles = 2 * sizeof(ran); // 4-bits per nibble |
| 153 | |
| 154 | int nibbles_used = max_nibbles; |
| 155 | for(path::string_type::size_type i=0; i < s.size(); ++i) |
| 156 | { |
| 157 | if (s[i] == percent) // digit request |
| 158 | { |
| 159 | if (nibbles_used == max_nibbles) |
| 160 | { |
| 161 | system_crypt_random(ran, sizeof(ran), ec); |
| 162 | if (ec != 0 && *ec) |
| 163 | return "" ; |
| 164 | nibbles_used = 0; |
| 165 | } |
| 166 | int c = ran[nibbles_used/2]; |
| 167 | c >>= 4 * (nibbles_used++ & 1); // if odd, shift right 1 nibble |
| 168 | s[i] = hex[c & 0xf]; // convert to hex digit and replace |
| 169 | } |
| 170 | } |
| 171 | |
| 172 | if (ec != 0) ec->clear(); |
| 173 | |
| 174 | return s; |
| 175 | } |
| 176 | |
| 177 | }}} |
| 178 | |