2 Copyright (C) 2006, 2007, 2008, 2009, 2010, 2011, 2012, 2013, 2014, 2015
3 Ben Kibbey <bjk@luxsci.net>
5 This file is part of libpwmd.
7 Libpwmd is free software: you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
9 the Free Software Foundation, either version 2 of the License, or
10 (at your option) any later version.
12 Libpwmd is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
17 You should have received a copy of the GNU General Public License
18 along with Libpwmd. If not, see <http://www.gnu.org/licenses/>.
24 #include <sys/types.h>
40 static gpg_error_t
set_pinentry_strings (pwm_t
* pwm
, pwmd_pinentry_t which
);
43 launch_pinentry (pwm_t
* pwm
)
47 int child_list
[] = { -1 };
49 const char **p
= argv
;
50 static struct assuan_malloc_hooks mhooks
= {
51 pwmd_malloc
, pwmd_realloc
, pwmd_free
54 if (!pwm
->pinentry_display
&& !pwm
->pinentry_tty
)
55 return GPG_ERR_ENOTTY
;
58 *p
++ = pwm
->pinentry_display
? "--display" : "--ttyname";
59 *p
++ = pwm
->pinentry_display
? pwm
->pinentry_display
: pwm
->pinentry_tty
;
61 if (pwm
->pinentry_lcctype
)
64 *p
++ = pwm
->pinentry_lcctype
;
67 if (pwm
->pinentry_lcmessages
)
69 *p
++ = "--lc-messages";
70 *p
++ = pwm
->pinentry_lcmessages
;
75 if (!pwm
->pinentry_display
)
78 *p
++ = pwm
->pinentry_term
? pwm
->pinentry_term
: getenv ("TERM");
82 rc
= assuan_new_ext (&ctx
, GPG_ERR_SOURCE_PINENTRY
, &mhooks
, NULL
, NULL
);
86 rc
= assuan_pipe_connect (ctx
,
87 pwm
->pinentry_path
? pwm
->
88 pinentry_path
: PINENTRY_PATH
, argv
, child_list
,
96 pwm
->pinentry_pid
= assuan_get_pid (ctx
);
98 rc
= set_pinentry_strings (pwm
, 0);
100 _pinentry_disconnect (pwm
);
106 pinentry_command (pwm_t
* pwm
, char **result
, size_t * len
, const char *cmd
)
116 gpg_error_t rc
= launch_pinentry (pwm
);
122 return _assuan_command (pwm
, pwm
->pctx
, result
, len
, cmd
);
127 quality_cb (void *data
, const char *line
)
134 if (strncmp (line
, "QUALITY ", 8))
135 return GPG_ERR_INV_ARG
;
137 if (!(tmp
= FascistCheck (line
+ 8, CRACKLIB_DICT
)))
138 return assuan_send_data (pwm
->pctx
, "100", 3);
140 if (!strcmp (tmp
, N_("it is WAY too short")))
142 else if (!strcmp (tmp
, N_("it is too short")))
144 else if (!strcmp (tmp
, N_("it is all whitespace")))
146 else if (!strcmp (tmp
, N_("it is based on your username")))
148 else if (!strcmp (tmp
, N_("it does not contain enough DIFFERENT characters")))
150 else if (!strcmp (tmp
, N_("it is based on a dictionary word")))
152 else if (!strcmp (tmp
, N_("it is based upon your password entry")))
154 else if (!strcmp (tmp
, N_("it's derived from your password entry")))
156 else if (!strcmp (tmp
, N_("it is derived from your password entry")))
158 else if (!strcmp (tmp
, N_("it is based on a (reversed) dictionary word")))
160 else if (!strcmp (tmp
, N_("it is derivable from your password entry")))
162 else if (!strcmp (tmp
, N_("it's derivable from your password entry")))
164 else if (!strcmp (tmp
, N_("it looks like a National Insurance number.")))
166 else if (!strcmp (tmp
, N_("it is too simplistic/systematic")))
171 snprintf (buf
, sizeof (buf
), "%i", score
);
172 return assuan_send_data (pwm
->pctx
, buf
, strlen (buf
));
177 set_pinentry_strings (pwm_t
* pwm
, pwmd_pinentry_t which
)
179 char *tmp
, *desc
= NULL
;
182 if (which
!= PWMD_PINENTRY_USER
)
184 rc
= pinentry_command (pwm
, NULL
, NULL
, "SETERROR ");
189 tmp
= pwmd_malloc (ASSUAN_LINELENGTH
+ 1);
191 return gpg_error_from_errno (ENOMEM
);
193 if (!pwm
->pinentry_prompt
)
195 pwm
->pinentry_prompt
= pwmd_strdup (N_("Passphrase:"));
196 if (!pwm
->pinentry_prompt
)
199 return GPG_ERR_ENOMEM
;
203 if (!pwm
->pinentry_desc
)
205 if (which
== PWMD_PINENTRY_OPEN
|| which
== PWMD_PINENTRY_OPEN_FAILED
)
207 if (pwm
->passphrase_hint
&& pwm
->passphrase_info
)
209 char *hint
= pwmd_strdup (pwm
->passphrase_hint
), *hintp
= hint
;
210 char *info
= pwmd_strdup (pwm
->passphrase_info
), *infop
= info
;
211 char *userid
= strchr (hint
, ' ');
213 if (userid
&& *userid
)
216 infop
= strchr (info
, ' ');
219 char *p
= strchr (++infop
, ' ');
222 infop
[strlen(infop
)-strlen(p
)] = 0;
227 desc
= pwmd_strdup_printf (N_
228 ("Please enter the passphrase to unlock the OpenPGP secret key:%%0A%%0AClient: %s%%0AData file: %s%%0AKey id: %s (0x%s)%%0AMain key ID: 0x%s"), pwm
->name
? pwm
->name
: N_("unknown"), pwm
->filename
, userid
, hintp
, infop
);
234 desc
= pwmd_strdup_printf (N_ ("A passphrase is required to decrypt the encrypted data file \"%s\". Please enter the passphrase below."), pwm
->filename
);
237 else if (which
== PWMD_PINENTRY_SAVE
238 || which
== PWMD_PINENTRY_SAVE_FAILED
)
240 pwmd_strdup_printf (N_
241 ("Please enter the passphrase to use to encrypt the data file \"%s\"."),
243 else if (which
== PWMD_PINENTRY_SAVE_CONFIRM
)
245 pwmd_strdup_printf (N_
246 ("Please re-enter the passphrase for confirmation."),
252 return GPG_ERR_ENOMEM
;
256 if (pwm
->pinentry_desc
)
257 desc
= pwm
->pinentry_desc
;
259 if (which
== PWMD_PINENTRY_USER
)
261 snprintf (tmp
, ASSUAN_LINELENGTH
, "SETERROR %s",
262 pwm
->pinentry_error
? pwm
->pinentry_error
: "");
263 rc
= pinentry_command (pwm
, NULL
, NULL
, tmp
);
270 snprintf (tmp
, ASSUAN_LINELENGTH
, "SETDESC %s",
271 pwm
->pinentry_desc
? pwm
->pinentry_desc
: "");
275 if (which
== PWMD_PINENTRY_SAVE_FAILED
276 || which
== PWMD_PINENTRY_OPEN_FAILED
)
278 if (which
== PWMD_PINENTRY_SAVE_FAILED
)
279 snprintf (tmp
, ASSUAN_LINELENGTH
, "SETERROR %s",
280 N_("Passphrases do not match, try again."));
283 if (pwm
->pinentry_tries
)
285 strcpy (tmp
, "SETERROR ");
286 snprintf (tmp
+ strlen ("SETERROR "), ASSUAN_LINELENGTH
,
287 N_("Bad passphrase (try %i of %i)"),
288 pwm
->pinentry_try
+ 1, pwm
->pinentry_tries
);
291 snprintf (tmp
, ASSUAN_LINELENGTH
, "SETERROR %s",
292 N_("Bad passphrase, try again"));
295 rc
= pinentry_command (pwm
, NULL
, NULL
, tmp
);
303 snprintf (tmp
, ASSUAN_LINELENGTH
, "SETDESC %s", desc
);
305 if (pwm
->pinentry_desc
!= desc
)
309 rc
= pinentry_command (pwm
, NULL
, NULL
, tmp
);
316 snprintf (tmp
, ASSUAN_LINELENGTH
, "SETPROMPT %s", pwm
->pinentry_prompt
);
317 rc
= pinentry_command (pwm
, NULL
, NULL
, tmp
);
321 if (!rc
&& (which
== PWMD_PINENTRY_SAVE
||
322 which
== PWMD_PINENTRY_SAVE_FAILED
))
324 rc
= pinentry_command (pwm
, NULL
, NULL
, "SETQUALITYBAR");
327 pwm
->_inquire_func
= quality_cb
;
328 pwm
->_inquire_data
= pwm
;
333 if (pwm
->pinentry_timeout
>= 0)
337 snprintf(buf
, sizeof(buf
), "SETTIMEOUT %i", pwm
->pinentry_timeout
);
338 rc
= pinentry_command(pwm
, NULL
, NULL
, buf
);
345 _pinentry_disconnect (pwm_t
* pwm
)
348 assuan_release (pwm
->pctx
);
351 pwm
->pinentry_pid
= -1;
355 _getpin (pwm_t
* pwm
, char **result
, size_t * len
, pwmd_pinentry_t which
)
357 gpg_error_t rc
= set_pinentry_strings (pwm
, which
);
361 _pinentry_disconnect (pwm
);
365 rc
= pinentry_command (pwm
, result
, len
,
366 which
== PWMD_PINENTRY_CONFIRM
? "CONFIRM" : "GETPIN");
369 _pinentry_disconnect (pwm
);
371 /* This lets PWMD_OPTION_PINENTRY_TIMEOUT work. Note that it is not
372 * thread safe do to the global variables. */
373 if (gpg_err_code (rc
) == GPG_ERR_EOF
)
374 rc
= GPG_ERR_CANCELED
;
376 else if (which
!= PWMD_PINENTRY_CONFIRM
&& len
&& result
)
379 *len
= strlen (*result
); // remove the null byte
382 *result
= pwmd_malloc (1);
392 _pwmd_getpin (pwm_t
* pwm
, const char *filename
, char **result
,
393 size_t * len
, pwmd_pinentry_t which
)
399 return GPG_ERR_INV_ARG
;
402 if (which
== PWMD_PINENTRY_CLOSE
)
404 _pinentry_disconnect (pwm
);
408 if (!result
&& which
!= PWMD_PINENTRY_CONFIRM
)
409 return GPG_ERR_INV_ARG
;
411 pwm
->filename
= (char *) filename
;
412 rc
= _getpin (pwm
, result
, len
, which
);