2 Copyright (C) 2006, 2007, 2008, 2009, 2010, 2011, 2012, 2013, 2014
3 Ben Kibbey <bjk@luxsci.net>
5 This file is part of libpwmd.
7 Libpwmd is free software: you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
9 the Free Software Foundation, either version 2 of the License, or
10 (at your option) any later version.
12 Libpwmd is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
17 You should have received a copy of the GNU General Public License
18 along with Libpwmd. If not, see <http://www.gnu.org/licenses/>.
24 #include <sys/types.h>
40 static gpg_error_t
set_pinentry_strings (pwm_t
* pwm
, pwmd_pinentry_t which
);
43 launch_pinentry (pwm_t
* pwm
)
47 int child_list
[] = { -1 };
49 const char **p
= argv
;
50 static struct assuan_malloc_hooks mhooks
= {
51 pwmd_malloc
, pwmd_realloc
, pwmd_free
54 update_pinentry_settings (pwm
);
55 if (!pwm
->pinentry_display
&& !pwm
->pinentry_tty
)
56 return GPG_ERR_ENOTTY
;
59 *p
++ = pwm
->pinentry_display
? "--display" : "--ttyname";
60 *p
++ = pwm
->pinentry_display
? pwm
->pinentry_display
: pwm
->pinentry_tty
;
62 if (pwm
->pinentry_lcctype
)
65 *p
++ = pwm
->pinentry_lcctype
;
68 if (pwm
->pinentry_lcmessages
)
70 *p
++ = "--lc-messages";
71 *p
++ = pwm
->pinentry_lcmessages
;
76 if (!pwm
->pinentry_display
)
79 *p
++ = pwm
->pinentry_term
? pwm
->pinentry_term
: getenv ("TERM");
83 rc
= assuan_new_ext (&ctx
, GPG_ERR_SOURCE_PINENTRY
, &mhooks
, NULL
, NULL
);
87 rc
= assuan_pipe_connect (ctx
,
88 pwm
->pinentry_path
? pwm
->
89 pinentry_path
: PINENTRY_PATH
, argv
, child_list
,
97 pwm
->pinentry_pid
= assuan_get_pid (ctx
);
99 rc
= set_pinentry_strings (pwm
, 0);
101 _pinentry_disconnect (pwm
);
107 pinentry_command (pwm_t
* pwm
, char **result
, size_t * len
, const char *cmd
)
117 gpg_error_t rc
= launch_pinentry (pwm
);
123 return _assuan_command (pwm
, pwm
->pctx
, result
, len
, cmd
);
128 quality_cb (void *data
, const char *line
)
135 if (strncmp (line
, "QUALITY ", 8))
136 return GPG_ERR_INV_ARG
;
138 if (!(tmp
= FascistCheck (line
+ 8, CRACKLIB_DICT
)))
139 return assuan_send_data (pwm
->pctx
, "100", 3);
141 if (!strcmp (tmp
, N_("it is WAY too short")))
143 else if (!strcmp (tmp
, N_("it is too short")))
145 else if (!strcmp (tmp
, N_("it is all whitespace")))
147 else if (!strcmp (tmp
, N_("it is based on your username")))
149 else if (!strcmp (tmp
, N_("it does not contain enough DIFFERENT characters")))
151 else if (!strcmp (tmp
, N_("it is based on a dictionary word")))
153 else if (!strcmp (tmp
, N_("it is based upon your password entry")))
155 else if (!strcmp (tmp
, N_("it's derived from your password entry")))
157 else if (!strcmp (tmp
, N_("it is derived from your password entry")))
159 else if (!strcmp (tmp
, N_("it is based on a (reversed) dictionary word")))
161 else if (!strcmp (tmp
, N_("it is derivable from your password entry")))
163 else if (!strcmp (tmp
, N_("it's derivable from your password entry")))
165 else if (!strcmp (tmp
, N_("it looks like a National Insurance number.")))
167 else if (!strcmp (tmp
, N_("it is too simplistic/systematic")))
172 snprintf (buf
, sizeof (buf
), "%i", score
);
173 return assuan_send_data (pwm
->pctx
, buf
, strlen (buf
));
178 set_pinentry_strings (pwm_t
* pwm
, pwmd_pinentry_t which
)
180 char *tmp
, *desc
= NULL
;
183 if (which
!= PWMD_PINENTRY_USER
)
185 rc
= pinentry_command (pwm
, NULL
, NULL
, "SETERROR ");
190 tmp
= pwmd_malloc (ASSUAN_LINELENGTH
+ 1);
192 return gpg_error_from_errno (ENOMEM
);
194 if (!pwm
->pinentry_prompt
)
196 pwm
->pinentry_prompt
= pwmd_strdup (N_("Passphrase:"));
197 if (!pwm
->pinentry_prompt
)
200 return GPG_ERR_ENOMEM
;
204 if (!pwm
->pinentry_desc
)
206 if (which
== PWMD_PINENTRY_OPEN
|| which
== PWMD_PINENTRY_OPEN_FAILED
)
208 if (pwm
->version
>= 0x030100)
210 char *hint
= pwmd_strdup (pwm
->passphrase_hint
), *hintp
= hint
;
211 char *info
= pwmd_strdup (pwm
->passphrase_info
), *infop
= info
;
212 char *userid
= strchr (hint
, ' ');
217 infop
= strchr (info
, ' ');
220 char *p
= strchr (++infop
, ' ');
222 infop
[strlen(infop
)-strlen(p
)] = 0;
227 desc
= pwmd_strdup_printf (N_
228 ("Please enter the passphrase to unlock the OpenPGP secret key:%%0A%%0AClient: %s%%0AData file: %s%%0AKey id: %s (0x%s)%%0AMain key ID: 0x%s"), pwm
->name
? pwm
->name
: N_("unknown"), pwm
->filename
, userid
, hintp
, infop
);
234 desc
= pwmd_strdup_printf (N_ ("A passphrase is required to unlock the secret key for the encrypted data file \"%s\". Please enter the passphrase below."), pwm
->filename
);
237 else if (which
== PWMD_PINENTRY_SAVE
238 || which
== PWMD_PINENTRY_SAVE_FAILED
)
240 pwmd_strdup_printf (N_
241 ("Please enter the passphrase to use to encrypt the data file \"%s\"."),
243 else if (which
== PWMD_PINENTRY_SAVE_CONFIRM
)
245 pwmd_strdup_printf (N_
246 ("Please re-enter the passphrase for confirmation."),
252 return GPG_ERR_ENOMEM
;
256 if (pwm
->pinentry_desc
)
257 desc
= pwm
->pinentry_desc
;
259 if (which
== PWMD_PINENTRY_USER
)
261 snprintf (tmp
, ASSUAN_LINELENGTH
, "SETERROR %s",
262 pwm
->pinentry_error
? pwm
->pinentry_error
: "");
263 rc
= pinentry_command (pwm
, NULL
, NULL
, tmp
);
270 snprintf (tmp
, ASSUAN_LINELENGTH
, "SETDESC %s",
271 pwm
->pinentry_desc
? pwm
->pinentry_desc
: "");
275 if (which
== PWMD_PINENTRY_SAVE_FAILED
276 || which
== PWMD_PINENTRY_OPEN_FAILED
)
278 if (which
== PWMD_PINENTRY_SAVE_FAILED
)
279 snprintf (tmp
, ASSUAN_LINELENGTH
, "SETERROR %s",
280 N_("Passphrases do not match, try again."));
283 if (pwm
->pinentry_tries
)
285 strcpy (tmp
, "SETERROR ");
286 snprintf (tmp
+ strlen ("SETERROR "), ASSUAN_LINELENGTH
,
287 N_("Bad passphrase (try %i of %i)"),
288 pwm
->pinentry_try
+ 1, pwm
->pinentry_tries
);
291 snprintf (tmp
, ASSUAN_LINELENGTH
, "SETERROR %s",
292 N_("Bad passphrase, try again"));
295 rc
= pinentry_command (pwm
, NULL
, NULL
, tmp
);
303 snprintf (tmp
, ASSUAN_LINELENGTH
, "SETDESC %s", desc
);
305 if (pwm
->pinentry_desc
!= desc
)
309 rc
= pinentry_command (pwm
, NULL
, NULL
, tmp
);
316 snprintf (tmp
, ASSUAN_LINELENGTH
, "SETPROMPT %s", pwm
->pinentry_prompt
);
317 rc
= pinentry_command (pwm
, NULL
, NULL
, tmp
);
321 if (!rc
&& (which
== PWMD_PINENTRY_SAVE
||
322 which
== PWMD_PINENTRY_SAVE_FAILED
))
324 rc
= pinentry_command (pwm
, NULL
, NULL
, "SETQUALITYBAR");
327 pwm
->_inquire_func
= quality_cb
;
328 pwm
->_inquire_data
= pwm
;
333 if (pwm
->pinentry_timeout
>= 0)
337 snprintf(buf
, sizeof(buf
), "SETTIMEOUT %i", pwm
->pinentry_timeout
);
338 rc
= pinentry_command(pwm
, NULL
, NULL
, buf
);
345 _pinentry_disconnect (pwm_t
* pwm
)
348 assuan_release (pwm
->pctx
);
351 pwm
->pinentry_pid
= -1;
355 _getpin (pwm_t
* pwm
, char **result
, size_t * len
, pwmd_pinentry_t which
)
357 gpg_error_t rc
= set_pinentry_strings (pwm
, which
);
361 _pinentry_disconnect (pwm
);
365 rc
= pinentry_command (pwm
, result
, len
,
366 which
== PWMD_PINENTRY_CONFIRM
? "CONFIRM" : "GETPIN");
369 _pinentry_disconnect (pwm
);
371 /* This lets PWMD_OPTION_PINENTRY_TIMEOUT work. Note that it is not
372 * thread safe do to the global variables. */
373 if (gpg_err_code (rc
) == GPG_ERR_EOF
)
374 rc
= GPG_ERR_CANCELED
;
376 else if (which
!= PWMD_PINENTRY_CONFIRM
&& len
&& result
)
379 *len
= strlen (*result
); // remove the null byte
382 *result
= pwmd_malloc (1);
392 _pwmd_getpin (pwm_t
* pwm
, const char *filename
, char **result
,
393 size_t * len
, pwmd_pinentry_t which
)
399 return GPG_ERR_INV_ARG
;
402 if (which
== PWMD_PINENTRY_CLOSE
)
404 _pinentry_disconnect (pwm
);
408 if (!result
&& which
!= PWMD_PINENTRY_CONFIRM
)
409 return GPG_ERR_INV_ARG
;
411 pwm
->filename
= (char *) filename
;
412 rc
= _getpin (pwm
, result
, len
, which
);