Fixup for Coverity issue #101137.
[libpwmd.git] / src / pinentry.c
bloba3c690eb67441e141d31bda93f97a0a59948a535
1 /*
2 Copyright (C) 2006, 2007, 2008, 2009, 2010, 2011, 2012, 2013, 2014, 2015
3 Ben Kibbey <bjk@luxsci.net>
5 This file is part of libpwmd.
7 Libpwmd is free software: you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
9 the Free Software Foundation, either version 2 of the License, or
10 (at your option) any later version.
12 Libpwmd is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
17 You should have received a copy of the GNU General Public License
18 along with Libpwmd. If not, see <http://www.gnu.org/licenses/>.
20 #ifdef HAVE_CONFIG_H
21 #include <config.h>
22 #endif
24 #include <sys/types.h>
25 #include <errno.h>
26 #include <stdlib.h>
27 #include <limits.h>
29 #ifdef HAVE_STRING_H
30 #include <string.h>
31 #endif
33 #include "pinentry.h"
34 #include "misc.h"
36 #ifdef WITH_QUALITY
37 #include <crack.h>
38 #endif
40 static gpg_error_t set_pinentry_strings (pwm_t * pwm, pwmd_pinentry_t which);
42 static gpg_error_t
43 launch_pinentry (pwm_t * pwm)
45 int rc;
46 assuan_context_t ctx;
47 int child_list[] = { -1 };
48 const char *argv[10];
49 const char **p = argv;
50 static struct assuan_malloc_hooks mhooks = {
51 pwmd_malloc, pwmd_realloc, pwmd_free
54 update_pinentry_settings (pwm);
55 if (!pwm->pinentry_display && !pwm->pinentry_tty)
56 return GPG_ERR_ENOTTY;
58 *p++ = "pinentry";
59 *p++ = pwm->pinentry_display ? "--display" : "--ttyname";
60 *p++ = pwm->pinentry_display ? pwm->pinentry_display : pwm->pinentry_tty;
62 if (pwm->pinentry_lcctype)
64 *p++ = "--lc-ctype";
65 *p++ = pwm->pinentry_lcctype;
68 if (pwm->pinentry_lcmessages)
70 *p++ = "--lc-messages";
71 *p++ = pwm->pinentry_lcmessages;
74 *p = NULL;
76 if (!pwm->pinentry_display)
78 *p++ = "--ttytype";
79 *p++ = pwm->pinentry_term ? pwm->pinentry_term : getenv ("TERM");
80 *p = NULL;
83 rc = assuan_new_ext (&ctx, GPG_ERR_SOURCE_PINENTRY, &mhooks, NULL, NULL);
84 if (rc)
85 return rc;
87 rc = assuan_pipe_connect (ctx,
88 pwm->pinentry_path ? pwm->
89 pinentry_path : PINENTRY_PATH, argv, child_list,
90 NULL, NULL, 0);
91 if (rc)
93 assuan_release (ctx);
94 return rc;
97 pwm->pinentry_pid = assuan_get_pid (ctx);
98 pwm->pctx = ctx;
99 rc = set_pinentry_strings (pwm, 0);
100 if (rc)
101 _pinentry_disconnect (pwm);
103 return rc;
106 static gpg_error_t
107 pinentry_command (pwm_t * pwm, char **result, size_t * len, const char *cmd)
109 if (len)
110 *len = 0;
112 if (result)
113 *result = NULL;
115 if (!pwm->pctx)
117 gpg_error_t rc = launch_pinentry (pwm);
119 if (rc)
120 return rc;
123 return _assuan_command (pwm, pwm->pctx, result, len, cmd);
126 #ifdef WITH_QUALITY
127 static gpg_error_t
128 quality_cb (void *data, const char *line)
130 pwm_t *pwm = data;
131 int score = 0;
132 char buf[5];
133 const char *tmp;
135 if (strncmp (line, "QUALITY ", 8))
136 return GPG_ERR_INV_ARG;
138 if (!(tmp = FascistCheck (line + 8, CRACKLIB_DICT)))
139 return assuan_send_data (pwm->pctx, "100", 3);
141 if (!strcmp (tmp, N_("it is WAY too short")))
142 score = 10;
143 else if (!strcmp (tmp, N_("it is too short")))
144 score = 20;
145 else if (!strcmp (tmp, N_("it is all whitespace")))
146 score = 25;
147 else if (!strcmp (tmp, N_("it is based on your username")))
148 score = 30;
149 else if (!strcmp (tmp, N_("it does not contain enough DIFFERENT characters")))
150 score = 35;
151 else if (!strcmp (tmp, N_("it is based on a dictionary word")))
152 score = 40;
153 else if (!strcmp (tmp, N_("it is based upon your password entry")))
154 score = 50;
155 else if (!strcmp (tmp, N_("it's derived from your password entry")))
156 score = 50;
157 else if (!strcmp (tmp, N_("it is derived from your password entry")))
158 score = 50;
159 else if (!strcmp (tmp, N_("it is based on a (reversed) dictionary word")))
160 score = 60;
161 else if (!strcmp (tmp, N_("it is derivable from your password entry")))
162 score = 70;
163 else if (!strcmp (tmp, N_("it's derivable from your password entry")))
164 score = 70;
165 else if (!strcmp (tmp, N_("it looks like a National Insurance number.")))
166 score = 80;
167 else if (!strcmp (tmp, N_("it is too simplistic/systematic")))
168 score = 90;
169 else
170 score = 0;
172 snprintf (buf, sizeof (buf), "%i", score);
173 return assuan_send_data (pwm->pctx, buf, strlen (buf));
175 #endif
177 static gpg_error_t
178 set_pinentry_strings (pwm_t * pwm, pwmd_pinentry_t which)
180 char *tmp, *desc = NULL;
181 gpg_error_t rc;
183 if (which != PWMD_PINENTRY_USER)
185 rc = pinentry_command (pwm, NULL, NULL, "SETERROR ");
186 if (rc)
187 return rc;
190 tmp = pwmd_malloc (ASSUAN_LINELENGTH + 1);
191 if (!tmp)
192 return gpg_error_from_errno (ENOMEM);
194 if (!pwm->pinentry_prompt)
196 pwm->pinentry_prompt = pwmd_strdup (N_("Passphrase:"));
197 if (!pwm->pinentry_prompt)
199 pwmd_free (tmp);
200 return GPG_ERR_ENOMEM;
204 if (!pwm->pinentry_desc)
206 if (which == PWMD_PINENTRY_OPEN || which == PWMD_PINENTRY_OPEN_FAILED)
208 if (pwm->version >= 0x030100)
210 char *hint = pwmd_strdup (pwm->passphrase_hint), *hintp = hint;
211 char *info = pwmd_strdup (pwm->passphrase_info), *infop = info;
212 char *userid = strchr (hint, ' ');
214 if (userid && *userid)
215 *userid++ = 0;
217 infop = strchr (info, ' ');
218 if (infop && *infop)
220 char *p = strchr (++infop, ' ');
222 if (p)
223 infop[strlen(infop)-strlen(p)] = 0;
226 hintp += 8;
227 infop += 8;
228 desc = pwmd_strdup_printf (N_
229 ("Please enter the passphrase to unlock the OpenPGP secret key:%%0A%%0AClient: %s%%0AData file: %s%%0AKey id: %s (0x%s)%%0AMain key ID: 0x%s"), pwm->name ? pwm->name : N_("unknown"), pwm->filename, userid, hintp, infop);
230 pwmd_free (hint);
231 pwmd_free (info);
233 else
235 desc = pwmd_strdup_printf (N_ ("A passphrase is required to unlock the secret key for the encrypted data file \"%s\". Please enter the passphrase below."), pwm->filename);
238 else if (which == PWMD_PINENTRY_SAVE
239 || which == PWMD_PINENTRY_SAVE_FAILED)
240 desc =
241 pwmd_strdup_printf (N_
242 ("Please enter the passphrase to use to encrypt the data file \"%s\"."),
243 pwm->filename);
244 else if (which == PWMD_PINENTRY_SAVE_CONFIRM)
245 desc =
246 pwmd_strdup_printf (N_
247 ("Please re-enter the passphrase for confirmation."),
248 pwm->filename);
250 if (!desc)
252 pwmd_free (tmp);
253 return GPG_ERR_ENOMEM;
257 if (pwm->pinentry_desc)
258 desc = pwm->pinentry_desc;
260 if (which == PWMD_PINENTRY_USER)
262 snprintf (tmp, ASSUAN_LINELENGTH, "SETERROR %s",
263 pwm->pinentry_error ? pwm->pinentry_error : "");
264 rc = pinentry_command (pwm, NULL, NULL, tmp);
265 if (rc)
267 pwmd_free (tmp);
268 return rc;
271 snprintf (tmp, ASSUAN_LINELENGTH, "SETDESC %s",
272 pwm->pinentry_desc ? pwm->pinentry_desc : "");
274 else
276 if (which == PWMD_PINENTRY_SAVE_FAILED
277 || which == PWMD_PINENTRY_OPEN_FAILED)
279 if (which == PWMD_PINENTRY_SAVE_FAILED)
280 snprintf (tmp, ASSUAN_LINELENGTH, "SETERROR %s",
281 N_("Passphrases do not match, try again."));
282 else
284 if (pwm->pinentry_tries)
286 strcpy (tmp, "SETERROR ");
287 snprintf (tmp + strlen ("SETERROR "), ASSUAN_LINELENGTH,
288 N_("Bad passphrase (try %i of %i)"),
289 pwm->pinentry_try + 1, pwm->pinentry_tries);
291 else
292 snprintf (tmp, ASSUAN_LINELENGTH, "SETERROR %s",
293 N_("Bad passphrase, try again"));
296 rc = pinentry_command (pwm, NULL, NULL, tmp);
297 if (rc)
299 pwmd_free (tmp);
300 return rc;
304 snprintf (tmp, ASSUAN_LINELENGTH, "SETDESC %s", desc);
306 if (pwm->pinentry_desc != desc)
307 pwmd_free (desc);
310 rc = pinentry_command (pwm, NULL, NULL, tmp);
311 if (rc)
313 pwmd_free (tmp);
314 return rc;
317 snprintf (tmp, ASSUAN_LINELENGTH, "SETPROMPT %s", pwm->pinentry_prompt);
318 rc = pinentry_command (pwm, NULL, NULL, tmp);
319 pwmd_free (tmp);
321 #ifdef WITH_QUALITY
322 if (!rc && (which == PWMD_PINENTRY_SAVE ||
323 which == PWMD_PINENTRY_SAVE_FAILED))
325 rc = pinentry_command (pwm, NULL, NULL, "SETQUALITYBAR");
326 if (!rc)
328 pwm->_inquire_func = quality_cb;
329 pwm->_inquire_data = pwm;
332 #endif
334 if (pwm->pinentry_timeout >= 0)
336 char buf[32];
338 snprintf(buf, sizeof(buf), "SETTIMEOUT %i", pwm->pinentry_timeout);
339 rc = pinentry_command(pwm, NULL, NULL, buf);
342 return rc;
345 void
346 _pinentry_disconnect (pwm_t * pwm)
348 if (pwm->pctx)
349 assuan_release (pwm->pctx);
351 pwm->pctx = NULL;
352 pwm->pinentry_pid = -1;
355 gpg_error_t
356 _getpin (pwm_t * pwm, char **result, size_t * len, pwmd_pinentry_t which)
358 gpg_error_t rc = set_pinentry_strings (pwm, which);
360 if (rc)
362 _pinentry_disconnect (pwm);
363 return rc;
366 rc = pinentry_command (pwm, result, len,
367 which == PWMD_PINENTRY_CONFIRM ? "CONFIRM" : "GETPIN");
368 if (rc)
370 _pinentry_disconnect (pwm);
372 /* This lets PWMD_OPTION_PINENTRY_TIMEOUT work. Note that it is not
373 * thread safe do to the global variables. */
374 if (gpg_err_code (rc) == GPG_ERR_EOF)
375 rc = GPG_ERR_CANCELED;
377 else if (which != PWMD_PINENTRY_CONFIRM && len && result)
379 if (*len)
380 *len = strlen (*result); // remove the null byte
381 else
383 *result = pwmd_malloc (1);
384 *(*result) = 0;
385 *len = 1;
389 return rc;
392 gpg_error_t
393 _pwmd_getpin (pwm_t * pwm, const char *filename, char **result,
394 size_t * len, pwmd_pinentry_t which)
396 gpg_error_t rc;
397 char *p;
399 if (!pwm)
400 return GPG_ERR_INV_ARG;
402 p = pwm->filename;
403 if (which == PWMD_PINENTRY_CLOSE)
405 _pinentry_disconnect (pwm);
406 return 0;
409 if (!result && which != PWMD_PINENTRY_CONFIRM)
410 return GPG_ERR_INV_ARG;
412 pwm->filename = (char *) filename;
413 rc = _getpin (pwm, result, len, which);
414 pwm->filename = p;
415 return rc;