1 /* vim:tw=78:ts=8:sw=4:set ft=c: */
3 Copyright (C) 2006-2009 Ben Kibbey <bjk@luxsci.net>
5 This program is free software; you can redistribute it and/or modify
6 it under the terms of the GNU General Public License as published by
7 the Free Software Foundation; either version 2 of the License, or
8 (at your option) any later version.
10 This program is distributed in the hope that it will be useful,
11 but WITHOUT ANY WARRANTY; without even the implied warranty of
12 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
13 GNU General Public License for more details.
15 You should have received a copy of the GNU General Public License
16 along with this program; if not, write to the Free Software
17 Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02110-1301 USA
26 #include <sys/socket.h>
35 #include <sys/types.h>
37 #include <sys/select.h>
39 #include <netinet/in.h>
40 #include <sys/socket.h>
52 #define DNS_USE_GETTIMEOFDAY_FOR_ID 1
54 #include <arpa/nameser.h>
66 #define N_(msgid) dgettext("libpwmd", msgid)
73 static int gelapsed
, gtimeout
;
74 static gpg_error_t
pinentry_command(pwm_t
*pwm
, char **result
, const char *cmd
);
77 static char *_getpwuid(struct passwd
*pwd
)
79 size_t size
= sysconf(_SC_GETPW_R_SIZE_MAX
);
80 struct passwd
*result
;
87 buf
= pwmd_malloc(size
);
92 n
= getpwuid_r(getuid(), pwd
, buf
, size
, &result
);
109 const char *_pwmd_strerror(gpg_error_t e
)
111 gpg_err_code_t code
= gpg_err_code(e
);
113 if (code
>= GPG_ERR_USER_1
&& code
< gpg_err_code(EPWMD_MAX
)) {
118 return N_("Unknown error");
120 return N_("No cache slots available");
122 return N_("Recursion loop");
124 return N_("No file is open");
126 return N_("General LibXML error");
128 return N_("File modified");
130 return N_("Access denied");
137 const char *pwmd_strerror(gpg_error_t e
)
139 const char *p
= _pwmd_strerror(e
);
141 return p
? p
: gpg_strerror(e
);
144 int pwmd_strerror_r(gpg_error_t e
, char *buf
, size_t size
)
146 const char *p
= _pwmd_strerror(e
);
149 snprintf(buf
, size
, "%s", p
);
151 if (strlen(p
) > size
)
157 return gpg_strerror_r(e
, buf
, size
);
160 gpg_error_t
pwmd_init()
162 static int initialized
;
171 bindtextdomain("libpwmd", LOCALEDIR
);
174 assuan_set_malloc_hooks(pwmd_malloc
, pwmd_realloc
, pwmd_free
);
175 assuan_set_assuan_err_source(GPG_ERR_SOURCE_DEFAULT
);
180 static gpg_error_t
_socket_connect_finalize(pwm_t
*pwm
)
183 int n
= assuan_get_active_fds(pwm
->ctx
, 0, active
, N_ARRAY(active
));
185 pwm
->fd
= n
<= 0 ? -1 : dup(active
[0]);
188 pwm
->pinentry_tries
= 3;
190 assuan_set_pointer(pwm
->ctx
, pwm
);
193 return pwmd_command(pwm
, NULL
, "OPTION CLIENT NAME=%s", pwm
->name
);
199 static int read_hook(assuan_context_t ctx
, assuan_fd_t fd
, void *data
,
200 size_t len
, ssize_t
*ret
)
202 pwm_t
*pwm
= assuan_get_pointer(ctx
);
204 if (!pwm
|| !pwm
->tcp_conn
)
206 *ret
= pth_read((int)fd
, data
, len
);
208 *ret
= read((int)fd
, data
, len
);
212 *ret
= libssh2_channel_read(pwm
->tcp_conn
->channel
, data
, len
);
213 } while (*ret
== LIBSSH2_ERROR_EAGAIN
);
216 return *ret
<= 0 ? 0 : 1;
219 static int write_hook(assuan_context_t ctx
, assuan_fd_t fd
, const void *data
,
220 size_t len
, ssize_t
*ret
)
222 pwm_t
*pwm
= assuan_get_pointer(ctx
);
224 if (!pwm
|| !pwm
->tcp_conn
)
226 *ret
= pth_write((int)fd
, data
, len
);
228 *ret
= write((int)fd
, data
, len
);
232 *ret
= libssh2_channel_write(pwm
->tcp_conn
->channel
, data
, len
);
233 } while (*ret
== LIBSSH2_ERROR_EAGAIN
);
236 return *ret
<= 0 ? 0 : 1;
239 static void _ssh_deinit(pwmd_tcp_conn_t
*conn
);
240 static void free_tcp_conn(pwmd_tcp_conn_t
*conn
)
245 if (conn
->username
) {
246 pwmd_free(conn
->username
);
247 conn
->username
= NULL
;
250 if (conn
->known_hosts
) {
251 pwmd_free(conn
->known_hosts
);
252 conn
->known_hosts
= NULL
;
255 if (conn
->identity
) {
256 pwmd_free(conn
->identity
);
257 conn
->identity
= NULL
;
260 if (conn
->identity_pub
) {
261 pwmd_free(conn
->identity_pub
);
262 conn
->identity_pub
= NULL
;
266 pwmd_free(conn
->host
);
271 pwmd_free(conn
->hostkey
);
272 conn
->hostkey
= NULL
;
276 ares_destroy(conn
->chan
);
281 ares_free_hostent(conn
->he
);
296 static void _ssh_deinit(pwmd_tcp_conn_t
*conn
)
302 libssh2_channel_free(conn
->channel
);
305 libssh2_session_disconnect(conn
->session
, "Bye!");
306 libssh2_session_free(conn
->session
);
309 conn
->session
= NULL
;
310 conn
->channel
= NULL
;
314 static void _ssh_assuan_deinit(assuan_context_t ctx
)
316 pwm_t
*pwm
= assuan_get_pointer(ctx
);
318 _ssh_deinit(pwm
->tcp_conn
);
319 pwm
->tcp_conn
= NULL
;
323 * Sets common options from both pwmd_tcp_connect() and
324 * pwmd_tcp_connect_async().
326 static gpg_error_t
init_tcp_conn(pwmd_tcp_conn_t
**dst
, const char *host
,
327 int port
, const char *identity
, const char *user
, const char *hosts
,
330 pwmd_tcp_conn_t
*conn
;
335 return GPG_ERR_INV_ARG
;
338 if (!host
|| !identity
|| !hosts
)
339 return GPG_ERR_INV_ARG
;
342 conn
= pwmd_calloc(1, sizeof(pwmd_tcp_conn_t
));
345 return gpg_error_from_errno(ENOMEM
);
347 conn
->port
= port
== -1 ? 22 : port
;
348 conn
->host
= pwmd_strdup(host
);
351 rc
= gpg_error_from_errno(ENOMEM
);
357 char *pwbuf
= _getpwuid(&pw
);
360 rc
= gpg_error_from_errno(errno
);
364 conn
->username
= pwmd_strdup(user
? user
: pw
.pw_name
);
367 if (!conn
->username
) {
368 rc
= gpg_error_from_errno(ENOMEM
);
372 conn
->identity
= pwmd_strdup(identity
);
374 if (!conn
->identity
) {
375 rc
= gpg_error_from_errno(ENOMEM
);
379 conn
->identity_pub
= pwmd_malloc(strlen(conn
->identity
)+5);
381 if (!conn
->identity_pub
) {
382 rc
= gpg_error_from_errno(ENOMEM
);
386 sprintf(conn
->identity_pub
, "%s.pub", conn
->identity
);
387 conn
->known_hosts
= pwmd_strdup(hosts
);
389 if (!conn
->known_hosts
) {
390 rc
= gpg_error_from_errno(ENOMEM
);
403 static gpg_error_t
do_connect(pwm_t
*pwm
, int prot
, void *addr
)
405 struct sockaddr_in their_addr
;
407 pwm
->tcp_conn
->fd
= socket(prot
, SOCK_STREAM
, 0);
409 if (pwm
->tcp_conn
->fd
== -1)
410 return gpg_error_from_syserror();
412 if (pwm
->tcp_conn
->async
)
413 fcntl(pwm
->tcp_conn
->fd
, F_SETFL
, O_NONBLOCK
);
415 pwm
->cmd
= ASYNC_CMD_CONNECT
;
416 their_addr
.sin_family
= prot
;
417 their_addr
.sin_port
= htons(pwm
->tcp_conn
->port
);
418 their_addr
.sin_addr
= *((struct in_addr
*)addr
);
419 memset(their_addr
.sin_zero
, '\0', sizeof their_addr
.sin_zero
);
422 if (pth_connect(pwm
->tcp_conn
->fd
, (struct sockaddr
*)&their_addr
,
423 sizeof(their_addr
)) == -1)
425 if (connect(pwm
->tcp_conn
->fd
, (struct sockaddr
*)&their_addr
,
426 sizeof(their_addr
)) == -1)
428 return gpg_error_from_syserror();
433 static gpg_error_t
ares_error_to_pwmd(int status
)
435 if (status
!= ARES_SUCCESS
)
436 warnx("%s", ares_strerror(status
));
442 return GPG_ERR_UNKNOWN_HOST
;
444 return GPG_ERR_EHOSTDOWN
;
446 return GPG_ERR_TIMEOUT
;
448 return gpg_error_from_errno(ENOMEM
);
449 case ARES_ECONNREFUSED
:
450 return GPG_ERR_ECONNREFUSED
;
453 return GPG_ERR_EHOSTUNREACH
;
459 static void dns_resolve_cb(void *arg
, int status
, int timeouts
,
460 unsigned char *abuf
, int alen
)
466 if (status
== ARES_EDESTRUCTION
)
469 if (status
!= ARES_SUCCESS
) {
470 pwm
->tcp_conn
->rc
= ares_error_to_pwmd(status
);
474 //FIXME localhost. works with ipv4. maybe local system config error
475 /* Check for an IPv6 address first. */
476 rc
= ares_parse_a_reply(abuf
, alen
, &he
, NULL
, NULL
);
478 if (rc
!= ARES_SUCCESS
) {
479 if (rc
!= ARES_ENODATA
) {
480 pwm
->tcp_conn
->rc
= ares_error_to_pwmd(status
);
484 rc
= ares_parse_aaaa_reply(abuf
, alen
, &he
, NULL
, NULL
);
486 if (rc
!= ARES_SUCCESS
) {
487 pwm
->tcp_conn
->rc
= ares_error_to_pwmd(status
);
492 pwm
->tcp_conn
->he
= he
;
493 pwm
->tcp_conn
->rc
= do_connect(pwm
, he
->h_addrtype
, he
->h_addr
);
496 static gpg_error_t
_do_pwmd_tcp_connect_async(pwm_t
*pwm
, const char *host
,
497 int port
, const char *identity
, const char *user
,
498 const char *known_hosts
, pwmd_async_cmd_t which
)
500 pwmd_tcp_conn_t
*conn
;
503 rc
= init_tcp_conn(&conn
, host
, port
, identity
, user
, known_hosts
,
504 which
== ASYNC_CMD_HOSTKEY
? 1 : 0);
510 pwm
->tcp_conn
= conn
;
511 pwm
->tcp_conn
->cmd
= which
;
513 if (pwm
->tcp_conn
->cmd
== ASYNC_CMD_HOSTKEY
)
514 pwm
->tcp_conn
->get_only
= 1;
516 pwm
->cmd
= ASYNC_CMD_DNS
;
517 pwm
->state
= ASYNC_PROCESS
;
518 ares_init(&pwm
->tcp_conn
->chan
);
519 ares_query(pwm
->tcp_conn
->chan
, pwm
->tcp_conn
->host
, ns_c_any
, ns_t_any
,
520 dns_resolve_cb
, pwm
);
524 gpg_error_t
pwmd_tcp_connect_async(pwm_t
*pwm
, const char *host
, int port
,
525 const char *identity
, const char *user
, const char *known_hosts
)
527 return _do_pwmd_tcp_connect_async(pwm
, host
, port
, identity
, user
,
528 known_hosts
, ASYNC_CMD_CONNECT
);
531 static void *_ssh_malloc(size_t size
, void **data
)
533 return pwmd_malloc(size
);
536 static void _ssh_free(void *ptr
, void **data
)
541 static void *_ssh_realloc(void *ptr
, size_t size
, void **data
)
543 return pwmd_realloc(ptr
, size
);
546 static char *to_hex(const char *str
, size_t slen
)
549 char *buf
= pwmd_malloc(slen
*2+1);
554 for (i
= 0, buf
[0] = 0; i
< slen
; i
++) {
557 sprintf(tmp
, "%02x", (unsigned char)str
[i
]);
564 static int verify_host_key(pwm_t
*pwm
)
566 FILE *fp
= fopen(pwm
->tcp_conn
->known_hosts
, "r");
572 buf
= pwmd_malloc(LINE_MAX
);
577 while ((p
= fgets(buf
, LINE_MAX
, fp
))) {
578 if (*p
== '#' || isspace(*p
))
581 if (p
[strlen(p
)-1] == '\n')
584 if (!strcmp(buf
, pwm
->tcp_conn
->hostkey
))
601 static gpg_error_t
authenticate_ssh(pwm_t
*pwm
)
603 const char *fp
= libssh2_hostkey_hash(pwm
->tcp_conn
->session
,
604 LIBSSH2_HOSTKEY_HASH_SHA1
);
607 pwm
->tcp_conn
->hostkey
= to_hex(fp
, 20);
609 if (!pwm
->tcp_conn
->hostkey
)
610 return gpg_error_from_errno(ENOMEM
);
612 if (pwm
->tcp_conn
->get_only
)
615 if (!fp
|| verify_host_key(pwm
))
616 return GPG_ERR_CHECKSUM
;
618 userauth
= libssh2_userauth_list(pwm
->tcp_conn
->session
,
619 pwm
->tcp_conn
->username
, strlen(pwm
->tcp_conn
->username
));
621 if (!userauth
|| !strstr(userauth
, "publickey"))
622 return GPG_ERR_BAD_PIN_METHOD
;
624 if (libssh2_userauth_publickey_fromfile(pwm
->tcp_conn
->session
,
625 pwm
->tcp_conn
->username
, pwm
->tcp_conn
->identity_pub
,
626 pwm
->tcp_conn
->identity
, NULL
))
627 return GPG_ERR_BAD_SECKEY
;
632 static gpg_error_t
setup_tcp_session(pwm_t
*pwm
)
634 assuan_context_t ctx
;
635 struct assuan_io_hooks io_hooks
= {read_hook
, write_hook
};
638 pwm
->tcp_conn
->session
= libssh2_session_init_ex(_ssh_malloc
, _ssh_free
,
641 if (!pwm
->tcp_conn
->session
) {
642 rc
= gpg_error_from_errno(ENOMEM
);
646 if (libssh2_session_startup(pwm
->tcp_conn
->session
, pwm
->tcp_conn
->fd
)) {
647 rc
= GPG_ERR_ASSUAN_SERVER_FAULT
;
651 rc
= authenticate_ssh(pwm
);
656 /* pwmd_get_hostkey(). */
657 if (pwm
->tcp_conn
->get_only
) {
658 pwm
->result
= pwmd_strdup(pwm
->tcp_conn
->hostkey
);
661 rc
= gpg_error_from_errno(ENOMEM
);
668 pwm
->tcp_conn
->channel
= libssh2_channel_open_session(pwm
->tcp_conn
->session
);
670 if (!pwm
->tcp_conn
->channel
) {
671 rc
= GPG_ERR_ASSUAN_SERVER_FAULT
;
675 if (libssh2_channel_shell(pwm
->tcp_conn
->channel
)) {
676 rc
= GPG_ERR_ASSUAN_SERVER_FAULT
;
680 assuan_set_io_hooks(&io_hooks
);
681 rc
= assuan_socket_connect_fd(&ctx
, pwm
->tcp_conn
->fd
, 0, pwm
);
686 assuan_set_finish_handler(ctx
, _ssh_assuan_deinit
);
688 return _socket_connect_finalize(pwm
);
691 free_tcp_conn(pwm
->tcp_conn
);
692 pwm
->tcp_conn
= NULL
;
696 static gpg_error_t
_do_pwmd_tcp_connect(pwm_t
*pwm
, const char *host
, int port
,
697 const char *identity
, const char *user
, const char *known_hosts
, int get
)
699 pwmd_tcp_conn_t
*conn
;
702 rc
= init_tcp_conn(&conn
, host
, port
, identity
, user
, known_hosts
, get
);
707 pwm
->tcp_conn
= conn
;
708 pwm
->tcp_conn
->get_only
= get
;
709 pwm
->cmd
= ASYNC_CMD_DNS
;
710 ares_init(&pwm
->tcp_conn
->chan
);
711 ares_query(pwm
->tcp_conn
->chan
, pwm
->tcp_conn
->host
, ns_c_any
, ns_t_any
,
712 dns_resolve_cb
, pwm
);
714 /* dns_resolve_cb() may have already been called. */
715 if (pwm
->tcp_conn
->rc
) {
716 rc
= pwm
->tcp_conn
->rc
;
721 * Fake a blocking DNS lookup. libcares does a better job than
731 n
= ares_fds(pwm
->tcp_conn
->chan
, &rfds
, &wfds
);
732 ares_timeout(pwm
->tcp_conn
->chan
, NULL
, &tv
);
734 n
= pth_select(n
, &rfds
, &wfds
, NULL
, &tv
);
736 n
= select(n
, &rfds
, &wfds
, NULL
, &tv
);
740 rc
= gpg_error_from_syserror();
744 rc
= GPG_ERR_TIMEOUT
;
748 ares_process(pwm
->tcp_conn
->chan
, &rfds
, &wfds
);
750 if (pwm
->tcp_conn
->rc
)
752 } while (pwm
->cmd
== ASYNC_CMD_DNS
);
754 if (pwm
->tcp_conn
->rc
) {
755 rc
= pwm
->tcp_conn
->rc
;
759 return setup_tcp_session(pwm
);
765 gpg_error_t
pwmd_tcp_connect(pwm_t
*pwm
, const char *host
, int port
,
766 const char *identity
, const char *user
, const char *known_hosts
)
768 return _do_pwmd_tcp_connect(pwm
, host
, port
, identity
, user
, known_hosts
, 0);
771 /* Must free the result with pwmd_free(). */
772 gpg_error_t
pwmd_get_hostkey(const char *host
, int port
, char **result
)
775 pwm_t
*pwm
= pwmd_new(NULL
);
779 return gpg_error_from_errno(ENOMEM
);
781 rc
= _do_pwmd_tcp_connect(pwm
, host
, port
, NULL
, NULL
, NULL
, 1);
788 hostkey
= pwmd_strdup(pwm
->tcp_conn
->hostkey
);
791 rc
= gpg_error_from_errno(ENOMEM
);
798 gpg_error_t
pwmd_get_hostkey_async(pwm_t
*pwm
, const char *host
, int port
)
800 return _do_pwmd_tcp_connect_async(pwm
, host
, port
, NULL
, NULL
, NULL
,
805 gpg_error_t
pwmd_connect(pwm_t
*pwm
, const char *path
)
807 char *socketpath
= NULL
;
808 assuan_context_t ctx
;
810 char *pwbuf
= _getpwuid(&pw
);
814 return gpg_error_from_errno(errno
);
817 socketpath
= (char *)pwmd_malloc(strlen(pw
.pw_dir
) + strlen("/.pwmd/socket") + 1);
818 sprintf(socketpath
, "%s/.pwmd/socket", pw
.pw_dir
);
821 socketpath
= pwmd_strdup(path
);
824 rc
= assuan_socket_connect_ext(&ctx
, socketpath
, -1, 0);
825 pwmd_free(socketpath
);
831 return _socket_connect_finalize(pwm
);
834 void pwmd_close(pwm_t
*pwm
)
840 assuan_disconnect(pwm
->ctx
);
843 pwmd_free(pwm
->password
);
846 pwmd_free(pwm
->title
);
849 pwmd_free(pwm
->desc
);
852 pwmd_free(pwm
->prompt
);
854 if (pwm
->pinentry_tty
)
855 pwmd_free(pwm
->pinentry_tty
);
857 if (pwm
->pinentry_display
)
858 pwmd_free(pwm
->pinentry_display
);
860 if (pwm
->pinentry_term
)
861 pwmd_free(pwm
->pinentry_term
);
864 pwmd_free(pwm
->lcctype
);
867 pwmd_free(pwm
->lcmessages
);
870 pwmd_free(pwm
->filename
);
873 pwmd_free(pwm
->name
);
877 free_tcp_conn(pwm
->tcp_conn
);
883 static int mem_realloc_cb(void *data
, const void *buffer
, size_t len
)
885 membuf_t
*mem
= (membuf_t
*)data
;
891 if ((p
= pwmd_realloc(mem
->buf
, mem
->len
+ len
)) == NULL
)
895 memcpy((char *)mem
->buf
+ mem
->len
, buffer
, len
);
900 static int _inquire_cb(void *data
, const char *keyword
)
902 pwm_t
*pwm
= (pwm_t
*)data
;
904 int flags
= fcntl(pwm
->fd
, F_GETFL
);
906 /* Shouldn't get this far without a callback. */
907 if (!pwm
->inquire_func
)
908 return GPG_ERR_INV_ARG
;
911 * Since the socket file descriptor is probably set to non-blocking, set to
912 * blocking to prevent GPG_ERR_EAGAIN errors. This should be fixes when
913 * asynchronous INQUIRE is supported by either libassuan or a later
916 fcntl(pwm
->fd
, F_SETFL
, 0);
923 rc
= pwm
->inquire_func(pwm
->inquire_data
, keyword
, rc
, &result
, &len
);
924 rc
= gpg_err_code(rc
);
926 if (rc
== GPG_ERR_EOF
|| !rc
) {
927 if (len
<= 0 || !result
|| !*result
) {
932 arc
= assuan_send_data(pwm
->ctx
, result
, len
);
934 if (rc
== GPG_ERR_EOF
) {
945 fcntl(pwm
->fd
, F_SETFL
, flags
);
949 static gpg_error_t
do_nb_command(pwm_t
*pwm
, const char *cmd
, ...)
955 if (pwm
->state
== ASYNC_DONE
)
956 pwm
->state
= ASYNC_INIT
;
958 if (pwm
->state
!= ASYNC_INIT
)
959 return GPG_ERR_INV_STATE
;
961 buf
= pwmd_malloc(ASSUAN_LINELENGTH
);
964 return gpg_error_from_errno(ENOMEM
);
967 vsnprintf(buf
, ASSUAN_LINELENGTH
, cmd
, ap
);
969 rc
= assuan_write_line(pwm
->ctx
, buf
);
973 pwm
->state
= ASYNC_PROCESS
;
979 gpg_error_t
pwmd_open_async(pwm_t
*pwm
, const char *filename
)
981 if (!pwm
|| !filename
)
982 return GPG_ERR_INV_ARG
;
984 /* For pinentry retries. */
985 if (!pwm
->is_open_cmd
) {
987 pwmd_free(pwm
->filename
);
989 pwm
->filename
= pwmd_strdup(filename
);
992 pwm
->is_open_cmd
= 1;
993 pwm
->cmd
= ASYNC_CMD_OPEN
;
994 return do_nb_command(pwm
, "OPEN %s %s", filename
,
995 pwm
->password
? pwm
->password
: "");
998 gpg_error_t
pwmd_save_async(pwm_t
*pwm
)
1001 return GPG_ERR_INV_ARG
;
1003 pwm
->cmd
= ASYNC_CMD_SAVE
;
1004 return do_nb_command(pwm
, "SAVE %s", pwm
->password
? pwm
->password
: "");
1007 static gpg_error_t
parse_assuan_line(pwm_t
*pwm
)
1013 rc
= assuan_read_line(pwm
->ctx
, &line
, &len
);
1016 if (line
[0] == 'O' && line
[1] == 'K' &&
1017 (line
[2] == 0 || line
[2] == ' ')) {
1018 pwm
->state
= ASYNC_DONE
;
1020 else if (line
[0] == '#') {
1022 else if (line
[0] == 'S' && (line
[1] == 0 || line
[1] == ' ')) {
1023 if (pwm
->status_func
) {
1024 pwm
->status_func(pwm
->status_data
,
1025 line
[1] == 0 ? line
+1 : line
+2);
1028 else if (line
[0] == 'E' && line
[1] == 'R' && line
[2] == 'R' &&
1029 (line
[3] == 0 || line
[3] == ' ')) {
1032 pwm
->state
= ASYNC_DONE
;
1039 gpg_error_t
pwmd_pending_line(pwm_t
*pwm
)
1042 return GPG_ERR_INV_ARG
;
1045 return GPG_ERR_INV_STATE
;
1047 return assuan_pending_line(pwm
->ctx
) ? 0 : GPG_ERR_NO_DATA
;
1050 static pwmd_async_t
reset_async(pwm_t
*pwm
, int done
)
1052 pwm
->state
= ASYNC_INIT
;
1053 pwm
->cmd
= ASYNC_CMD_NONE
;
1055 #ifdef WITH_PINENTRY
1056 pwm
->is_open_cmd
= 0;
1058 if (pwm
->nb_fd
!= -1) {
1064 if (done
&& pwm
->tcp_conn
&& pwm
->tcp_conn
->fd
!= -1) {
1065 close(pwm
->tcp_conn
->fd
);
1066 pwm
->tcp_conn
->fd
= -1;
1073 pwmd_async_t
pwmd_process(pwm_t
*pwm
, gpg_error_t
*rc
, char **result
)
1077 struct timeval tv
= {0, 0};
1082 *rc
= GPG_ERR_INV_ARG
;
1086 /* When not in a command, this will let libassuan process status messages
1087 * by calling PWMD_OPTION_STATUS_FUNC. The client can poll the file
1088 * descriptor returned by pwmd_get_fd() to determine when this should be
1089 * called or call pwmd_pending_line() to determine whether a buffered line
1090 * needs to be processed. */
1091 if (pwm
->cmd
== ASYNC_CMD_NONE
) {
1092 *rc
= assuan_command(pwm
, pwm
->ctx
, NULL
, "NOP");
1096 /* Fixes pwmd_open/save_async2() when there is a cached or new file. */
1097 if (pwm
->state
== ASYNC_DONE
) {
1098 reset_async(pwm
, 0);
1102 if (pwm
->state
!= ASYNC_PROCESS
) {
1103 *rc
= GPG_ERR_INV_STATE
;
1108 if (pwm
->cmd
== ASYNC_CMD_DNS
) {
1111 if (pwm
->tcp_conn
->rc
) {
1112 *rc
= pwm
->tcp_conn
->rc
;
1113 reset_async(pwm
, 1);
1119 n
= ares_fds(pwm
->tcp_conn
->chan
, &rfds
, &wfds
);
1121 /* Shouldn't happen. */
1126 n
= pth_select(n
, &rfds
, &wfds
, NULL
, &tv
);
1128 n
= select(n
, &rfds
, &wfds
, NULL
, &tv
);
1132 ares_process(pwm
->tcp_conn
->chan
, &rfds
, &wfds
);
1136 else if (pwm
->cmd
== ASYNC_CMD_CONNECT
) {
1137 if (pwm
->tcp_conn
->rc
== GPG_ERR_EINPROGRESS
) {
1139 socklen_t len
= sizeof(int);
1142 FD_SET(pwm
->tcp_conn
->fd
, &fds
);
1144 n
= pth_select(pwm
->tcp_conn
->fd
+1, NULL
, &fds
, NULL
, &tv
);
1146 n
= select(pwm
->tcp_conn
->fd
+1, NULL
, &fds
, NULL
, &tv
);
1149 if (!n
|| !FD_ISSET(pwm
->tcp_conn
->fd
, &fds
))
1152 *rc
= gpg_error_from_syserror();
1153 reset_async(pwm
, 1);
1157 ret
= getsockopt(pwm
->tcp_conn
->fd
, SOL_SOCKET
, SO_ERROR
, &n
, &len
);
1160 *rc
= ret
? gpg_error_from_syserror() : gpg_error_from_errno(n
);
1161 reset_async(pwm
, 1);
1165 else if (pwm
->tcp_conn
->rc
) {
1166 *rc
= pwm
->tcp_conn
->rc
;
1167 reset_async(pwm
, 1);
1171 fcntl(pwm
->tcp_conn
->fd
, F_SETFL
, 0);
1172 *rc
= setup_tcp_session(pwm
);
1175 switch (pwm
->tcp_conn
->cmd
) {
1176 case ASYNC_CMD_HOSTKEY
:
1178 *result
= pwm
->result
;
1185 return reset_async(pwm
, *rc
? 1 : 0);
1189 #ifdef WITH_PINENTRY
1190 if (pwm
->cmd
== ASYNC_CMD_OPEN2
|| pwm
->cmd
== ASYNC_CMD_SAVE2
) {
1191 if (pwm
->nb_fd
== -1) {
1192 *rc
= GPG_ERR_INV_STATE
;
1193 return reset_async(pwm
, 0);
1197 FD_SET(pwm
->nb_fd
, &fds
);
1199 n
= pth_select(pwm
->nb_fd
+1, &fds
, NULL
, NULL
, &tv
);
1201 n
= select(pwm
->nb_fd
+1, &fds
, NULL
, NULL
, &tv
);
1204 *rc
= gpg_error_from_syserror();
1205 return reset_async(pwm
, 0);
1209 pwmd_nb_status_t nb
;
1210 size_t len
= read(pwm
->nb_fd
, &nb
, sizeof(nb
));
1213 return reset_async(pwm
, 0);
1221 *rc
= GPG_ERR_INV_STATE
;
1222 return reset_async(pwm
, 0);
1225 /* This is for the non-blocking OPEN and SAVE commands. */
1227 FD_SET(pwm
->fd
, &fds
);
1229 n
= pth_select(pwm
->fd
+1, &fds
, NULL
, NULL
, &tv
);
1231 n
= select(pwm
->fd
+1, &fds
, NULL
, NULL
, &tv
);
1235 *rc
= gpg_error_from_syserror();
1236 return reset_async(pwm
, 0);
1240 if (FD_ISSET(pwm
->fd
, &fds
)) {
1241 *rc
= parse_assuan_line(pwm
);
1244 return reset_async(pwm
, 0);
1248 while (!*rc
&& assuan_pending_line(pwm
->ctx
))
1249 *rc
= parse_assuan_line(pwm
);
1252 return reset_async(pwm
, 0);
1254 /* For pinentry retries. */
1255 if (pwm
->is_open_cmd
&& gpg_err_code(*rc
) == EPWMD_BADKEY
&&
1256 ++pwm
->ntries
< pwm
->pinentry_tries
) {
1257 pwm
->state
= ASYNC_INIT
;
1258 *rc
= pwmd_open_async(pwm
, pwm
->filename
);
1262 return reset_async(pwm
, 0);
1264 if (pwm
->state
== ASYNC_DONE
) {
1265 reset_async(pwm
, 0);
1272 static gpg_error_t
assuan_command(pwm_t
*pwm
, assuan_context_t ctx
,
1273 char **result
, const char *cmd
)
1281 rc
= assuan_transact(ctx
, cmd
, mem_realloc_cb
, &data
, _inquire_cb
, pwm
,
1282 pwm
->status_func
, pwm
->status_data
);
1286 pwmd_free(data
.buf
);
1292 mem_realloc_cb(&data
, "", 1);
1295 pwmd_free(data
.buf
);
1296 rc
= GPG_ERR_INV_ARG
;
1299 *result
= (char *)data
.buf
;
1303 return gpg_err_code(rc
);
1306 gpg_error_t
pwmd_inquire(pwm_t
*pwm
, const char *cmd
, pwmd_inquire_fn fn
,
1309 if (!pwm
|| !cmd
|| !fn
)
1310 return GPG_ERR_INV_ARG
;
1312 pwm
->inquire_func
= fn
;
1313 pwm
->inquire_data
= data
;
1314 return assuan_command(pwm
, pwm
->ctx
, NULL
, cmd
);
1317 static gpg_error_t
terminate_pinentry(pwm_t
*pwm
)
1319 #ifndef WITH_PINENTRY
1320 return GPG_ERR_NOT_IMPLEMENTED
;
1322 pid_t pid
= pwm
->pid
;
1326 if (!pwm
|| pid
== -1)
1327 return GPG_ERR_INV_ARG
;
1329 if (kill(pid
, 0) == 0) {
1330 if (kill(pid
, SIGTERM
) == -1) {
1331 if (kill(pid
, SIGKILL
) == -1)
1332 return gpg_error_from_errno(errno
);
1336 return gpg_error_from_errno(errno
);
1342 #ifdef WITH_PINENTRY
1343 static gpg_error_t
set_pinentry_strings(pwm_t
*pwm
, int which
)
1346 char tmp
[ASSUAN_LINELENGTH
];
1350 pwm
->title
= pwmd_strdup(N_("LibPWMD"));
1353 pwm
->prompt
= pwmd_strdup(N_("Passphrase:"));
1355 if (!pwm
->desc
&& !which
)
1356 pwm
->desc
= pwmd_strdup(N_("Enter a passphrase."));
1359 snprintf(tmp
, sizeof(tmp
), "SETERROR %s", N_("Invalid passphrase, please try again."));
1360 buf
= pwmd_strdup(tmp
);
1362 else if (which
== 2) {
1363 snprintf(tmp
, sizeof(tmp
), "SETERROR %s", N_("Please type the passphrase again for confirmation."));
1364 buf
= pwmd_strdup(tmp
);
1367 buf
= (char *)pwmd_malloc(strlen("SETERROR ") + strlen(pwm
->desc
) + 1);
1368 sprintf(buf
, "SETERROR %s", pwm
->desc
);
1371 error
= pinentry_command(pwm
, NULL
, buf
);
1377 buf
= (char *)pwmd_malloc(strlen("SETPROMPT ") + strlen(pwm
->prompt
) + 1);
1378 sprintf(buf
, "SETPROMPT %s", pwm
->prompt
);
1379 error
= pinentry_command(pwm
, NULL
, buf
);
1385 buf
= (char *)pwmd_malloc(strlen("SETDESC ") + strlen(pwm
->title
) + 1);
1386 sprintf(buf
, "SETDESC %s", pwm
->title
);
1387 error
= pinentry_command(pwm
, NULL
, buf
);
1392 static void update_pinentry_settings(pwm_t
*pwm
)
1398 char *pwbuf
= _getpwuid(&pw
);
1403 snprintf(buf
, sizeof(buf
), "%s/.pwmd/pinentry.conf", pw
.pw_dir
);
1406 if ((fp
= fopen(buf
, "r")) == NULL
)
1409 while ((p
= fgets(buf
, sizeof(buf
), fp
)) != NULL
) {
1410 char name
[32], val
[256];
1412 if (sscanf(p
, " %31[a-zA-Z] = %255s", name
, val
) != 2)
1415 if (strcasecmp(name
, "TTYNAME") == 0) {
1416 pwmd_free(pwm
->pinentry_tty
);
1417 pwm
->pinentry_tty
= pwmd_strdup(val
);
1419 else if (strcasecmp(name
, "TTYTYPE") == 0) {
1420 pwmd_free(pwm
->pinentry_term
);
1421 pwm
->pinentry_term
= pwmd_strdup(val
);
1423 else if (strcasecmp(name
, "DISPLAY") == 0) {
1424 pwmd_free(pwm
->pinentry_display
);
1425 pwm
->pinentry_display
= pwmd_strdup(val
);
1427 else if (strcasecmp(name
, "PATH") == 0) {
1428 pwmd_free(pwm
->pinentry_path
);
1429 pwm
->pinentry_path
= pwmd_strdup(val
);
1436 static gpg_error_t
launch_pinentry(pwm_t
*pwm
)
1439 assuan_context_t ctx
;
1440 int child_list
[] = {-1};
1441 char *display
= getenv("DISPLAY");
1442 const char *argv
[10];
1443 const char **p
= argv
;
1444 int have_display
= 0;
1446 char *ttybuf
= NULL
;
1448 update_pinentry_settings(pwm
);
1450 if (pwm
->pinentry_display
|| display
)
1453 if (!pwm
->pinentry_tty
) {
1454 ttybuf
= pwmd_malloc(255);
1457 return gpg_error_from_errno(ENOMEM
);
1459 rc
= ttyname_r(STDOUT_FILENO
, ttybuf
, 255);
1463 return gpg_error_from_errno(rc
);
1469 tty
= pwm
->pinentry_tty
;
1472 if (!have_display
&& !tty
)
1473 return GPG_ERR_ENOTTY
;
1476 *p
++ = have_display
? "--display" : "--ttyname";
1477 *p
++ = have_display
? pwm
->pinentry_display
? pwm
->pinentry_display
: display
: tty
;
1480 *p
++ = "--lc-ctype";
1481 *p
++ = pwm
->lcctype
;
1484 if (pwm
->lcmessages
) {
1485 *p
++ = "--lc-messages";
1486 *p
++ = pwm
->lcmessages
;
1491 if (!have_display
) {
1493 *p
++ = pwm
->pinentry_term
? pwm
->pinentry_term
: getenv("TERM");
1497 rc
= assuan_pipe_connect(&ctx
, pwm
->pinentry_path
? pwm
->pinentry_path
: PINENTRY_PATH
, argv
, child_list
);
1505 pwm
->pid
= assuan_get_pid(ctx
);
1507 return set_pinentry_strings(pwm
, 0);
1510 static gpg_error_t
pinentry_command(pwm_t
*pwm
, char **result
, const char *cmd
)
1515 n
= launch_pinentry(pwm
);
1521 return assuan_command(pwm
, pwm
->pctx
, result
, cmd
);
1524 static void pinentry_disconnect(pwm_t
*pwm
)
1527 assuan_disconnect(pwm
->pctx
);
1534 * Only called from a child process.
1536 static void catchsig(int sig
)
1540 if (gelapsed
++ >= gtimeout
)
1541 terminate_pinentry(gpwm
);
1552 * Borrowed from libassuan.
1554 static char *percent_escape(const char *atext
)
1556 const unsigned char *s
;
1557 int len
= strlen(atext
) * 3 + 1;
1558 char *buf
= (char *)pwmd_malloc(len
), *p
= buf
;
1563 for (s
=(const unsigned char *)atext
; *s
; s
++) {
1565 sprintf (p
, "%%%02X", *s
);
1576 static gpg_error_t
send_command(pwm_t
*pwm
, char **result
, const char *cmd
)
1579 return GPG_ERR_INV_ARG
;
1581 return assuan_command(pwm
, pwm
->ctx
, result
, cmd
);
1584 gpg_error_t
pwmd_command_ap(pwm_t
*pwm
, char **result
, const char *cmd
,
1592 return GPG_ERR_INV_ARG
;
1595 * C99 allows the dst pointer to be null which will calculate the length
1596 * of the would-be result and return it.
1598 len
= vsnprintf(NULL
, 0, cmd
, ap
)+1;
1599 buf
= (char *)pwmd_malloc(len
);
1600 len
= vsnprintf(buf
, len
, cmd
, ap
);
1601 error
= send_command(pwm
, result
, buf
);
1607 * Avoid sending the BYE command here. libassuan will close the file
1608 * descriptor and release the assuan context. Use pwmd_close() instead.
1610 gpg_error_t
pwmd_command(pwm_t
*pwm
, char **result
, const char *cmd
, ...)
1616 return GPG_ERR_INV_ARG
;
1622 error
= pwmd_command_ap(pwm
, result
, cmd
, ap
);
1627 #ifdef WITH_PINENTRY
1628 static gpg_error_t
do_getpin(pwm_t
*pwm
, char **result
)
1631 signal(SIGALRM
, catchsig
);
1636 return pinentry_command(pwm
, result
, "GETPIN");
1639 static gpg_error_t
getpin(pwm_t
*pwm
, char **result
, int *try_n
, int which
)
1641 int pin_try
= *try_n
;
1647 if (pin_try
== -1) {
1648 error
= set_pinentry_strings(pwm
, which
);
1651 pinentry_disconnect(pwm
);
1656 if (pwm
->pinentry_tries
-1 != pin_try
) {
1657 error
= set_pinentry_strings(pwm
, 1);
1660 pinentry_disconnect(pwm
);
1666 error
= do_getpin(pwm
, result
);
1669 * Since there was input cancel any timeout setting.
1674 if (error
== GPG_ERR_CANCELED
)
1675 return GPG_ERR_CANCELED
;
1677 if (pin_try
!= -1 && pin_try
--)
1681 pinentry_disconnect(pwm
);
1691 static gpg_error_t
do_open_command(pwm_t
*pwm
, const char *filename
, char *password
)
1693 char buf
[ASSUAN_LINELENGTH
];
1695 char *result
= NULL
;
1697 snprintf(buf
, sizeof(buf
), "OPEN %s %s", filename
, password
? password
: "");
1698 error
= send_command(pwm
, &result
, buf
);
1699 memset(buf
, 0, sizeof(buf
));
1701 if (error
&& result
)
1707 static gpg_error_t
do_pwmd_open(pwm_t
*pwm
, const char *filename
, int nb
)
1709 char *result
= NULL
;
1710 char *password
= NULL
;
1711 char path
[PATH_MAX
];
1712 #ifdef WITH_PINENTRY
1717 if (!pwm
|| !filename
|| !*filename
)
1718 return GPG_ERR_INV_ARG
;
1720 #ifdef WITH_PINENTRY
1721 pin_try
= pwm
->pinentry_tries
- 1;
1725 * Avoid calling pinentry if the password is cached on the server or if
1726 * this is a new file.
1728 rc
= pwmd_command(pwm
, &result
, "GETCONFIG data_directory");
1733 snprintf(path
, sizeof(path
), "%s/%s", result
, filename
);
1736 if (access(path
, R_OK
) == -1) {
1737 if (errno
== ENOENT
)
1741 rc
= pwmd_command(pwm
, &result
, "ISCACHED %s", filename
);
1743 if (rc
== EPWMD_CACHE_NOT_FOUND
) {
1744 if (pwm
->passfunc
) {
1745 password
= (char *)pwm
->passfunc(pwm
->passdata
);
1749 #ifdef WITH_PINENTRY
1751 * Get the password from pinentry.
1753 if (pwm
->use_pinentry
) {
1755 * Nonblocking is wanted. fork() then return a file descriptor
1756 * that the client can use to read() from.
1761 pwmd_nb_status_t pw
;
1764 return gpg_error_from_syserror();
1777 if (pwm
->pinentry_timeout
> 0) {
1779 gtimeout
= pwm
->pinentry_timeout
;
1784 rc
= getpin(pwm
, &password
, &pin_try
, 0);
1789 pinentry_disconnect(pwm
);
1791 if (gtimeout
&& gelapsed
>= gtimeout
)
1792 rc
= GPG_ERR_TIMEOUT
;
1796 pth_write(p
[1], &pw
, sizeof(pw
));
1798 write(p
[1], &pw
, sizeof(pw
));
1805 * Don't count the time it takes to open the file
1806 * which may have many iterations.
1808 signal(SIGALRM
, SIG_DFL
);
1809 rc
= do_open_command(pwm
, filename
, password
);
1811 if (pwm
->pinentry_timeout
)
1812 signal(SIGALRM
, catchsig
);
1814 if (pwm
->pctx
&& rc
== EPWMD_BADKEY
) {
1816 goto getpin_nb_again
;
1818 goto getpin_nb_fail
;
1821 pinentry_disconnect(pwm
);
1824 pth_write(p
[1], &pw
, sizeof(pw
));
1826 write(p
[1], &pw
, sizeof(pw
));
1832 rc
= gpg_error_from_syserror();
1848 * Not using pinentry and the file was not found
1851 password
= pwm
->password
;
1852 #ifdef WITH_PINENTRY
1859 pwm
->state
= ASYNC_DONE
;
1862 rc
= do_open_command(pwm
, filename
, password
);
1865 * Keep the user defined password set with pwmd_setopt(). The password may
1866 * be needed later (pwmd_save()) depending on the pwmd file cache settings.
1868 if (!pwm
->passfunc
&& password
&& password
!= pwm
->password
)
1869 pwmd_free(password
);
1871 #ifdef WITH_PINENTRY
1872 if (rc
== EPWMD_BADKEY
) {
1873 if (pin_try
-- > 0 && !nb
) {
1874 rc
= pwmd_command(pwm
, &result
, "OPTION TITLE=%s",
1875 N_("Invalid passphrase, please try again."));
1884 pinentry_disconnect(pwm
);
1892 pwmd_free(pwm
->filename
);
1894 pwm
->filename
= pwmd_strdup(filename
);
1900 gpg_error_t
pwmd_open(pwm_t
*pwm
, const char *filename
)
1902 return do_pwmd_open(pwm
, filename
, 0);
1905 gpg_error_t
pwmd_open_async2(pwm_t
*pwm
, const char *filename
)
1907 #ifndef WITH_PINENTRY
1908 return GPG_ERR_NOT_IMPLEMENTED
;
1912 pwm
->cmd
= ASYNC_CMD_OPEN2
;
1913 pwm
->state
= ASYNC_PROCESS
;
1914 rc
= do_pwmd_open(pwm
, filename
, 1);
1917 reset_async(pwm
, 1);
1923 #ifdef WITH_PINENTRY
1924 static gpg_error_t
do_save_getpin(pwm_t
*pwm
, char **password
)
1928 char *result
= NULL
;
1932 error
= getpin(pwm
, &result
, &pin_try
, confirm
? 2 : 0);
1936 pinentry_disconnect(pwm
);
1939 pwmd_free(*password
);
1949 if (strcmp(*password
, result
)) {
1950 pwmd_free(*password
);
1952 pinentry_disconnect(pwm
);
1953 error
= EPWMD_BADKEY
;
1958 pinentry_disconnect(pwm
);
1963 static gpg_error_t
do_save_command(pwm_t
*pwm
, char *password
)
1965 char buf
[ASSUAN_LINELENGTH
];
1967 char *result
= NULL
;
1969 snprintf(buf
, sizeof(buf
), "SAVE %s", password
? password
: "");
1970 error
= send_command(pwm
, &result
, buf
);
1971 memset(&buf
, 0, sizeof(buf
));
1973 if (error
&& result
)
1979 static gpg_error_t
do_pwmd_save(pwm_t
*pwm
, int nb
)
1981 char *result
= NULL
;
1982 char *password
= NULL
;
1986 return GPG_ERR_INV_ARG
;
1988 if (pwm
->use_pinentry
|| pwm
->passfunc
) {
1989 rc
= pwmd_command(pwm
, &result
, "ISCACHED %s", pwm
->filename
);
1991 if (rc
== EPWMD_CACHE_NOT_FOUND
) {
1993 password
= (char *)(*pwm
->passfunc
)(pwm
->passdata
);
1994 #ifdef WITH_PINENTRY
1995 else if (pwm
->use_pinentry
) {
1999 pwmd_nb_status_t pw
;
2002 return gpg_error_from_syserror();
2017 rc
= do_save_getpin(pwm
, &password
);
2018 } while (rc
== EPWMD_BADKEY
);
2022 pinentry_disconnect(pwm
);
2026 pth_write(p
[1], &pw
, sizeof(pw
));
2028 write(p
[1], &pw
, sizeof(pw
));
2034 rc
= do_save_command(pwm
, password
);
2035 pinentry_disconnect(pwm
);
2038 pth_write(p
[1], &pw
, sizeof(pw
));
2040 write(p
[1], &pw
, sizeof(pw
));
2046 rc
= gpg_error_from_syserror();
2059 rc
= do_save_getpin(pwm
, &password
);
2070 pwm
->state
= ASYNC_DONE
;
2074 password
= pwm
->password
;
2076 rc
= do_save_command(pwm
, password
);
2078 if (!pwm
->passfunc
&& password
&& password
!= pwm
->password
)
2079 pwmd_free(password
);
2084 gpg_error_t
pwmd_save_async2(pwm_t
*pwm
)
2086 #ifndef WITH_PINENTRY
2087 return GPG_ERR_NOT_IMPLEMENTED
;
2091 pwm
->cmd
= ASYNC_CMD_SAVE2
;
2092 pwm
->state
= ASYNC_PROCESS
;
2093 rc
= do_pwmd_save(pwm
, 1);
2096 reset_async(pwm
, 0);
2102 gpg_error_t
pwmd_save(pwm_t
*pwm
)
2104 return do_pwmd_save(pwm
, 0);
2107 gpg_error_t
pwmd_setopt(pwm_t
*pwm
, pwmd_option_t opt
, ...)
2110 int n
= va_arg(ap
, int);
2113 gpg_error_t error
= 0;
2116 return GPG_ERR_INV_ARG
;
2121 case PWMD_OPTION_STATUS_FUNC
:
2122 pwm
->status_func
= va_arg(ap
, pwmd_status_fn
);
2124 case PWMD_OPTION_STATUS_DATA
:
2125 pwm
->status_data
= va_arg(ap
, void *);
2127 case PWMD_OPTION_PASSWORD_FUNC
:
2128 pwm
->passfunc
= va_arg(ap
, pwmd_password_fn
);
2130 case PWMD_OPTION_PASSWORD_DATA
:
2131 pwm
->passdata
= va_arg(ap
, void *);
2133 case PWMD_OPTION_PASSWORD
:
2134 arg1
= va_arg(ap
, char *);
2137 pwmd_free(pwm
->password
);
2139 pwm
->password
= pwmd_strdup(arg1
);
2141 case PWMD_OPTION_PINENTRY
:
2142 n
= va_arg(ap
, int);
2144 if (n
!= 0 && n
!= 1) {
2146 error
= GPG_ERR_INV_VALUE
;
2149 pwm
->use_pinentry
= n
;
2150 error
= pwmd_command(pwm
, &result
, "OPTION PINENTRY=%i",
2151 !pwm
->use_pinentry
);
2154 #ifdef WITH_PINENTRY
2155 case PWMD_OPTION_PINENTRY_TRIES
:
2156 n
= va_arg(ap
, int);
2160 error
= GPG_ERR_INV_VALUE
;
2163 pwm
->pinentry_tries
= n
;
2166 case PWMD_OPTION_PINENTRY_TIMEOUT
:
2167 n
= va_arg(ap
, int);
2171 error
= GPG_ERR_INV_VALUE
;
2174 pwm
->pinentry_timeout
= n
;
2176 if (!pwm
->use_pinentry
)
2177 error
= pwmd_command(pwm
, &result
, "OPTION TIMEOUT=%i",
2178 pwm
->pinentry_timeout
);
2180 case PWMD_OPTION_PINENTRY_PATH
:
2181 if (pwm
->pinentry_path
)
2182 pwmd_free(pwm
->pinentry_path
);
2184 pwm
->pinentry_path
= pwmd_strdup(va_arg(ap
, char *));
2186 if (!pwm
->use_pinentry
)
2187 error
= pwmd_command(pwm
, &result
, "OPTION PATH=%s",
2188 pwm
->pinentry_path
);
2190 case PWMD_OPTION_PINENTRY_TTY
:
2191 if (pwm
->pinentry_tty
)
2192 pwmd_free(pwm
->pinentry_tty
);
2194 pwm
->pinentry_tty
= pwmd_strdup(va_arg(ap
, char *));
2196 if (!pwm
->use_pinentry
)
2197 error
= pwmd_command(pwm
, &result
, "OPTION TTY=%s",
2200 case PWMD_OPTION_PINENTRY_DISPLAY
:
2201 if (pwm
->pinentry_display
)
2202 pwmd_free(pwm
->pinentry_display
);
2204 pwm
->pinentry_display
= pwmd_strdup(va_arg(ap
, char *));
2206 if (!pwm
->use_pinentry
)
2207 error
= pwmd_command(pwm
, &result
, "OPTION DISPLAY=%s",
2208 pwm
->pinentry_display
);
2210 case PWMD_OPTION_PINENTRY_TERM
:
2211 if (pwm
->pinentry_term
)
2212 pwmd_free(pwm
->pinentry_term
);
2214 pwm
->pinentry_term
= pwmd_strdup(va_arg(ap
, char *));
2216 if (!pwm
->use_pinentry
)
2217 error
= pwmd_command(pwm
, &result
, "OPTION TTYTYPE=%s",
2218 pwm
->pinentry_term
);
2220 case PWMD_OPTION_PINENTRY_TITLE
:
2222 pwmd_free(pwm
->title
);
2224 pwm
->title
= percent_escape(va_arg(ap
, char *));
2226 if (!pwm
->use_pinentry
)
2227 error
= pwmd_command(pwm
, &result
, "OPTION TITLE=%s",
2230 case PWMD_OPTION_PINENTRY_PROMPT
:
2232 pwmd_free(pwm
->prompt
);
2234 pwm
->prompt
= percent_escape(va_arg(ap
, char *));
2236 if (!pwm
->use_pinentry
)
2237 error
= pwmd_command(pwm
, &result
, "OPTION PROMPT=%s",
2240 case PWMD_OPTION_PINENTRY_DESC
:
2242 pwmd_free(pwm
->desc
);
2244 pwm
->desc
= percent_escape(va_arg(ap
, char *));
2246 if (!pwm
->use_pinentry
)
2247 error
= pwmd_command(pwm
, &result
, "OPTION DESC=%s",
2250 case PWMD_OPTION_PINENTRY_LC_CTYPE
:
2252 pwmd_free(pwm
->lcctype
);
2254 pwm
->lcctype
= pwmd_strdup(va_arg(ap
, char *));
2256 if (!pwm
->use_pinentry
)
2257 error
= pwmd_command(pwm
, &result
, "OPTION LC_CTYPE=%s",
2260 case PWMD_OPTION_PINENTRY_LC_MESSAGES
:
2261 if (pwm
->lcmessages
)
2262 pwmd_free(pwm
->lcmessages
);
2264 pwm
->lcmessages
= pwmd_strdup(va_arg(ap
, char *));
2266 if (!pwm
->use_pinentry
)
2267 error
= pwmd_command(pwm
, &result
, "OPTION LC_MESSAGES=%s",
2271 error
= GPG_ERR_NOT_IMPLEMENTED
;
2279 gpg_error_t
pwmd_get_fd(pwm_t
*pwm
, int *fd
)
2282 return GPG_ERR_INV_ARG
;
2285 return GPG_ERR_INV_STATE
;
2291 gpg_error_t
pwmd_get_fd2(pwm_t
*pwm
, int *fd
)
2293 #ifndef WITH_PINENTRY
2294 return GPG_ERR_NOT_IMPLEMENTED
;
2297 return GPG_ERR_INV_ARG
;
2299 if (pwm
->nb_fd
== -1)
2300 return GPG_ERR_INV_STATE
;
2307 pwm_t
*pwmd_new(const char *name
)
2309 pwm_t
*h
= pwmd_calloc(1, sizeof(pwm_t
));
2315 h
->name
= pwmd_strdup(name
);
2324 #ifdef WITH_PINENTRY
2330 void pwmd_free(void *ptr
)
2335 void *pwmd_malloc(size_t size
)
2337 return xmalloc(size
);
2340 void *pwmd_calloc(size_t nmemb
, size_t size
)
2342 return xcalloc(nmemb
, size
);
2345 void *pwmd_realloc(void *ptr
, size_t size
)
2347 return xrealloc(ptr
, size
);
2350 char *pwmd_strdup(const char *str
)
2352 return xstrdup(str
);