Update copyright year to 2015.
[libpwmd.git] / src / pinentry.c
blob2aa325f011b10776325f624249d3f86f4528e90c
1 /*
2 Copyright (C) 2006, 2007, 2008, 2009, 2010, 2011, 2012, 2013, 2014, 2015
3 Ben Kibbey <bjk@luxsci.net>
5 This file is part of libpwmd.
7 Libpwmd is free software: you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
9 the Free Software Foundation, either version 2 of the License, or
10 (at your option) any later version.
12 Libpwmd is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
17 You should have received a copy of the GNU General Public License
18 along with Libpwmd. If not, see <http://www.gnu.org/licenses/>.
20 #ifdef HAVE_CONFIG_H
21 #include <config.h>
22 #endif
24 #include <sys/types.h>
25 #include <errno.h>
26 #include <stdlib.h>
27 #include <limits.h>
29 #ifdef HAVE_STRING_H
30 #include <string.h>
31 #endif
33 #include "pinentry.h"
34 #include "misc.h"
36 #ifdef WITH_QUALITY
37 #include <crack.h>
38 #endif
40 static gpg_error_t set_pinentry_strings (pwm_t * pwm, pwmd_pinentry_t which);
42 static gpg_error_t
43 launch_pinentry (pwm_t * pwm)
45 int rc;
46 assuan_context_t ctx;
47 int child_list[] = { -1 };
48 const char *argv[10];
49 const char **p = argv;
50 static struct assuan_malloc_hooks mhooks = {
51 pwmd_malloc, pwmd_realloc, pwmd_free
54 update_pinentry_settings (pwm);
55 if (!pwm->pinentry_display && !pwm->pinentry_tty)
56 return GPG_ERR_ENOTTY;
58 *p++ = "pinentry";
59 *p++ = pwm->pinentry_display ? "--display" : "--ttyname";
60 *p++ = pwm->pinentry_display ? pwm->pinentry_display : pwm->pinentry_tty;
62 if (pwm->pinentry_lcctype)
64 *p++ = "--lc-ctype";
65 *p++ = pwm->pinentry_lcctype;
68 if (pwm->pinentry_lcmessages)
70 *p++ = "--lc-messages";
71 *p++ = pwm->pinentry_lcmessages;
74 *p = NULL;
76 if (!pwm->pinentry_display)
78 *p++ = "--ttytype";
79 *p++ = pwm->pinentry_term ? pwm->pinentry_term : getenv ("TERM");
80 *p = NULL;
83 rc = assuan_new_ext (&ctx, GPG_ERR_SOURCE_PINENTRY, &mhooks, NULL, NULL);
84 if (rc)
85 return rc;
87 rc = assuan_pipe_connect (ctx,
88 pwm->pinentry_path ? pwm->
89 pinentry_path : PINENTRY_PATH, argv, child_list,
90 NULL, NULL, 0);
91 if (rc)
93 assuan_release (ctx);
94 return rc;
97 pwm->pinentry_pid = assuan_get_pid (ctx);
98 pwm->pctx = ctx;
99 rc = set_pinentry_strings (pwm, 0);
100 if (rc)
101 _pinentry_disconnect (pwm);
103 return rc;
106 static gpg_error_t
107 pinentry_command (pwm_t * pwm, char **result, size_t * len, const char *cmd)
109 if (len)
110 *len = 0;
112 if (result)
113 *result = NULL;
115 if (!pwm->pctx)
117 gpg_error_t rc = launch_pinentry (pwm);
119 if (rc)
120 return rc;
123 return _assuan_command (pwm, pwm->pctx, result, len, cmd);
126 #ifdef WITH_QUALITY
127 static gpg_error_t
128 quality_cb (void *data, const char *line)
130 pwm_t *pwm = data;
131 int score = 0;
132 char buf[5];
133 const char *tmp;
135 if (strncmp (line, "QUALITY ", 8))
136 return GPG_ERR_INV_ARG;
138 if (!(tmp = FascistCheck (line + 8, CRACKLIB_DICT)))
139 return assuan_send_data (pwm->pctx, "100", 3);
141 if (!strcmp (tmp, N_("it is WAY too short")))
142 score = 10;
143 else if (!strcmp (tmp, N_("it is too short")))
144 score = 20;
145 else if (!strcmp (tmp, N_("it is all whitespace")))
146 score = 25;
147 else if (!strcmp (tmp, N_("it is based on your username")))
148 score = 30;
149 else if (!strcmp (tmp, N_("it does not contain enough DIFFERENT characters")))
150 score = 35;
151 else if (!strcmp (tmp, N_("it is based on a dictionary word")))
152 score = 40;
153 else if (!strcmp (tmp, N_("it is based upon your password entry")))
154 score = 50;
155 else if (!strcmp (tmp, N_("it's derived from your password entry")))
156 score = 50;
157 else if (!strcmp (tmp, N_("it is derived from your password entry")))
158 score = 50;
159 else if (!strcmp (tmp, N_("it is based on a (reversed) dictionary word")))
160 score = 60;
161 else if (!strcmp (tmp, N_("it is derivable from your password entry")))
162 score = 70;
163 else if (!strcmp (tmp, N_("it's derivable from your password entry")))
164 score = 70;
165 else if (!strcmp (tmp, N_("it looks like a National Insurance number.")))
166 score = 80;
167 else if (!strcmp (tmp, N_("it is too simplistic/systematic")))
168 score = 90;
169 else
170 score = 0;
172 snprintf (buf, sizeof (buf), "%i", score);
173 return assuan_send_data (pwm->pctx, buf, strlen (buf));
175 #endif
177 static gpg_error_t
178 set_pinentry_strings (pwm_t * pwm, pwmd_pinentry_t which)
180 char *tmp, *desc = NULL;
181 gpg_error_t rc;
183 if (which != PWMD_PINENTRY_USER)
185 rc = pinentry_command (pwm, NULL, NULL, "SETERROR ");
186 if (rc)
187 return rc;
190 tmp = pwmd_malloc (ASSUAN_LINELENGTH + 1);
191 if (!tmp)
192 return gpg_error_from_errno (ENOMEM);
194 if (!pwm->pinentry_prompt)
196 pwm->pinentry_prompt = pwmd_strdup (N_("Passphrase:"));
197 if (!pwm->pinentry_prompt)
199 pwmd_free (tmp);
200 return GPG_ERR_ENOMEM;
204 if (!pwm->pinentry_desc)
206 if (which == PWMD_PINENTRY_OPEN || which == PWMD_PINENTRY_OPEN_FAILED)
208 if (pwm->version >= 0x030100)
210 char *hint = pwmd_strdup (pwm->passphrase_hint), *hintp = hint;
211 char *info = pwmd_strdup (pwm->passphrase_info), *infop = info;
212 char *userid = strchr (hint, ' ');
214 if (userid)
215 *userid++ = 0;
217 infop = strchr (info, ' ');
218 if (infop)
220 char *p = strchr (++infop, ' ');
222 infop[strlen(infop)-strlen(p)] = 0;
225 hintp += 8;
226 infop += 8;
227 desc = pwmd_strdup_printf (N_
228 ("Please enter the passphrase to unlock the OpenPGP secret key:%%0A%%0AClient: %s%%0AData file: %s%%0AKey id: %s (0x%s)%%0AMain key ID: 0x%s"), pwm->name ? pwm->name : N_("unknown"), pwm->filename, userid, hintp, infop);
229 pwmd_free (hint);
230 pwmd_free (info);
232 else
234 desc = pwmd_strdup_printf (N_ ("A passphrase is required to unlock the secret key for the encrypted data file \"%s\". Please enter the passphrase below."), pwm->filename);
237 else if (which == PWMD_PINENTRY_SAVE
238 || which == PWMD_PINENTRY_SAVE_FAILED)
239 desc =
240 pwmd_strdup_printf (N_
241 ("Please enter the passphrase to use to encrypt the data file \"%s\"."),
242 pwm->filename);
243 else if (which == PWMD_PINENTRY_SAVE_CONFIRM)
244 desc =
245 pwmd_strdup_printf (N_
246 ("Please re-enter the passphrase for confirmation."),
247 pwm->filename);
249 if (!desc)
251 pwmd_free (tmp);
252 return GPG_ERR_ENOMEM;
256 if (pwm->pinentry_desc)
257 desc = pwm->pinentry_desc;
259 if (which == PWMD_PINENTRY_USER)
261 snprintf (tmp, ASSUAN_LINELENGTH, "SETERROR %s",
262 pwm->pinentry_error ? pwm->pinentry_error : "");
263 rc = pinentry_command (pwm, NULL, NULL, tmp);
264 if (rc)
266 pwmd_free (tmp);
267 return rc;
270 snprintf (tmp, ASSUAN_LINELENGTH, "SETDESC %s",
271 pwm->pinentry_desc ? pwm->pinentry_desc : "");
273 else
275 if (which == PWMD_PINENTRY_SAVE_FAILED
276 || which == PWMD_PINENTRY_OPEN_FAILED)
278 if (which == PWMD_PINENTRY_SAVE_FAILED)
279 snprintf (tmp, ASSUAN_LINELENGTH, "SETERROR %s",
280 N_("Passphrases do not match, try again."));
281 else
283 if (pwm->pinentry_tries)
285 strcpy (tmp, "SETERROR ");
286 snprintf (tmp + strlen ("SETERROR "), ASSUAN_LINELENGTH,
287 N_("Bad passphrase (try %i of %i)"),
288 pwm->pinentry_try + 1, pwm->pinentry_tries);
290 else
291 snprintf (tmp, ASSUAN_LINELENGTH, "SETERROR %s",
292 N_("Bad passphrase, try again"));
295 rc = pinentry_command (pwm, NULL, NULL, tmp);
296 if (rc)
298 pwmd_free (tmp);
299 return rc;
303 snprintf (tmp, ASSUAN_LINELENGTH, "SETDESC %s", desc);
305 if (pwm->pinentry_desc != desc)
306 pwmd_free (desc);
309 rc = pinentry_command (pwm, NULL, NULL, tmp);
310 if (rc)
312 pwmd_free (tmp);
313 return rc;
316 snprintf (tmp, ASSUAN_LINELENGTH, "SETPROMPT %s", pwm->pinentry_prompt);
317 rc = pinentry_command (pwm, NULL, NULL, tmp);
318 pwmd_free (tmp);
320 #ifdef WITH_QUALITY
321 if (!rc && (which == PWMD_PINENTRY_SAVE ||
322 which == PWMD_PINENTRY_SAVE_FAILED))
324 rc = pinentry_command (pwm, NULL, NULL, "SETQUALITYBAR");
325 if (!rc)
327 pwm->_inquire_func = quality_cb;
328 pwm->_inquire_data = pwm;
331 #endif
333 if (pwm->pinentry_timeout >= 0)
335 char buf[32];
337 snprintf(buf, sizeof(buf), "SETTIMEOUT %i", pwm->pinentry_timeout);
338 rc = pinentry_command(pwm, NULL, NULL, buf);
341 return rc;
344 void
345 _pinentry_disconnect (pwm_t * pwm)
347 if (pwm->pctx)
348 assuan_release (pwm->pctx);
350 pwm->pctx = NULL;
351 pwm->pinentry_pid = -1;
354 gpg_error_t
355 _getpin (pwm_t * pwm, char **result, size_t * len, pwmd_pinentry_t which)
357 gpg_error_t rc = set_pinentry_strings (pwm, which);
359 if (rc)
361 _pinentry_disconnect (pwm);
362 return rc;
365 rc = pinentry_command (pwm, result, len,
366 which == PWMD_PINENTRY_CONFIRM ? "CONFIRM" : "GETPIN");
367 if (rc)
369 _pinentry_disconnect (pwm);
371 /* This lets PWMD_OPTION_PINENTRY_TIMEOUT work. Note that it is not
372 * thread safe do to the global variables. */
373 if (gpg_err_code (rc) == GPG_ERR_EOF)
374 rc = GPG_ERR_CANCELED;
376 else if (which != PWMD_PINENTRY_CONFIRM && len && result)
378 if (*len)
379 *len = strlen (*result); // remove the null byte
380 else
382 *result = pwmd_malloc (1);
383 *(*result) = 0;
384 *len = 1;
388 return rc;
391 gpg_error_t
392 _pwmd_getpin (pwm_t * pwm, const char *filename, char **result,
393 size_t * len, pwmd_pinentry_t which)
395 gpg_error_t rc;
396 char *p;
398 if (!pwm)
399 return GPG_ERR_INV_ARG;
401 p = pwm->filename;
402 if (which == PWMD_PINENTRY_CLOSE)
404 _pinentry_disconnect (pwm);
405 return 0;
408 if (!result && which != PWMD_PINENTRY_CONFIRM)
409 return GPG_ERR_INV_ARG;
411 pwm->filename = (char *) filename;
412 rc = _getpin (pwm, result, len, which);
413 pwm->filename = p;
414 return rc;