2002-01-19 21:58:41 +01:00
|
|
|
|
/* sysutils.c - system helpers
|
2014-11-11 15:14:31 +01:00
|
|
|
|
* Copyright (C) 1991-2001, 2003-2004,
|
|
|
|
|
* 2006-2008 Free Software Foundation, Inc.
|
2016-11-29 16:18:24 +01:00
|
|
|
|
* Copyright (C) 2013-2016 Werner Koch
|
2002-01-19 21:58:41 +01:00
|
|
|
|
*
|
|
|
|
|
* This file is part of GnuPG.
|
|
|
|
|
*
|
Change license for some files in common to LGPLv3+/GPLv2+.
Having the LGPL on the common GnuPG code helps to share code
between GnuPG and related projects (like GPGME and Libassuan). This
is good for interoperability and to reduces bugs.
* common/asshelp.c, common/asshelp.h, common/asshelp2.c, common/b64dec.c
* common/b64enc.c, common/convert.c, common/dns-cert.c
* common/dns-cert.h common/exechelp-posix.c, common/exechelp-w32.c
* common/exechelp-w32ce.c, common/exechelp.h, common/get-passphrase.c
* common/get-passphrase.h, common/gettime.c, common/gpgrlhelp.c
* common/helpfile.c, common/homedir.c, common/http.c, common/http.h
* common/i18n.c, common/init.c, common/init.h, common/iobuf.c
* common/iobuf.h, common/localename.c, common/membuf.c, common/membuf.h
* common/miscellaneous.c, common/openpgp-oid.c, common/openpgpdefs.h
* common/percent.c, common/pka.c, common/pka.h, common/session-env.c
* common/session-env.h, common/sexp-parse.h, common/sexputil.c
* common/signal.c, common/srv.c, common/srv.h, common/ssh-utils.c
* common/ssh-utils.h, common/sysutils.c, common/sysutils.h
* common/tlv.c, common/tlv.h, common/ttyio.c, common/ttyio.h
* common/userids.c, common/userids.h, common/xasprintf.c: Change
license to LGPLv3+/GPLv2+/
2012-04-20 15:43:06 +02:00
|
|
|
|
* This file is free software; you can redistribute it and/or modify
|
|
|
|
|
* it under the terms of either
|
2002-01-19 21:58:41 +01:00
|
|
|
|
*
|
Change license for some files in common to LGPLv3+/GPLv2+.
Having the LGPL on the common GnuPG code helps to share code
between GnuPG and related projects (like GPGME and Libassuan). This
is good for interoperability and to reduces bugs.
* common/asshelp.c, common/asshelp.h, common/asshelp2.c, common/b64dec.c
* common/b64enc.c, common/convert.c, common/dns-cert.c
* common/dns-cert.h common/exechelp-posix.c, common/exechelp-w32.c
* common/exechelp-w32ce.c, common/exechelp.h, common/get-passphrase.c
* common/get-passphrase.h, common/gettime.c, common/gpgrlhelp.c
* common/helpfile.c, common/homedir.c, common/http.c, common/http.h
* common/i18n.c, common/init.c, common/init.h, common/iobuf.c
* common/iobuf.h, common/localename.c, common/membuf.c, common/membuf.h
* common/miscellaneous.c, common/openpgp-oid.c, common/openpgpdefs.h
* common/percent.c, common/pka.c, common/pka.h, common/session-env.c
* common/session-env.h, common/sexp-parse.h, common/sexputil.c
* common/signal.c, common/srv.c, common/srv.h, common/ssh-utils.c
* common/ssh-utils.h, common/sysutils.c, common/sysutils.h
* common/tlv.c, common/tlv.h, common/ttyio.c, common/ttyio.h
* common/userids.c, common/userids.h, common/xasprintf.c: Change
license to LGPLv3+/GPLv2+/
2012-04-20 15:43:06 +02:00
|
|
|
|
* - the GNU Lesser General Public License as published by the Free
|
|
|
|
|
* Software Foundation; either version 3 of the License, or (at
|
|
|
|
|
* your option) any later version.
|
|
|
|
|
*
|
|
|
|
|
* or
|
|
|
|
|
*
|
|
|
|
|
* - the GNU General Public License as published by the Free
|
|
|
|
|
* Software Foundation; either version 2 of the License, or (at
|
|
|
|
|
* your option) any later version.
|
|
|
|
|
*
|
|
|
|
|
* or both in parallel, as here.
|
|
|
|
|
*
|
|
|
|
|
* This file is distributed in the hope that it will be useful,
|
2002-01-19 21:58:41 +01:00
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
|
* GNU General Public License for more details.
|
|
|
|
|
*
|
|
|
|
|
* You should have received a copy of the GNU General Public License
|
2016-11-05 12:02:19 +01:00
|
|
|
|
* along with this program; if not, see <https://www.gnu.org/licenses/>.
|
2002-01-19 21:58:41 +01:00
|
|
|
|
*/
|
|
|
|
|
|
|
|
|
|
#include <config.h>
|
2007-06-20 13:16:42 +02:00
|
|
|
|
|
Port to npth.
* configure.ac: Don't check for PTH but for NPTH.
(AH_BOTTOM): Remove PTH_SYSCALL_SOFT.
(have_pth): Rename to ...
(have_npth): ... this.
(USE_GNU_NPTH): Rename to ...
(USE_GNU_PTH): ... this.
* m4/npth.m4: New file.
* agent/Makefile.am, agent/cache.c, agent/call-pinentry.c,
agent/call-scd.c, agent/findkey.c, agent/gpg-agent.c,
agent/trustlist.c, common/Makefile.am, common/estream.c,
common/exechelp-posix.c, common/exechelp-w32.c,
common/exechelp-w32ce.c, common/http.c, common/init.c,
common/sysutils.c, dirmngr/Makefile.am, dirmngr/crlfetch.c,
dirmngr/dirmngr.c, dirmngr/dirmngr_ldap.c, dirmngr/ldap-wrapper-ce.c,
dirmngr/ldap-wrapper.c, dirmngr/ldap.c, g13/Makefile.am,
g13/call-gpg.c, g13/g13.c, g13/runner.c, scd/Makefile.am,
scd/apdu.c, scd/app.c, scd/ccid-driver.c, scd/command.c,
scd/scdaemon.c, tools/Makefile.am: Port to npth.
2012-01-03 22:12:37 +01:00
|
|
|
|
#ifdef WITHOUT_NPTH /* Give the Makefile a chance to build without Pth. */
|
|
|
|
|
# undef HAVE_NPTH
|
|
|
|
|
# undef USE_NPTH
|
2007-06-20 13:16:42 +02:00
|
|
|
|
#endif
|
|
|
|
|
|
2002-01-19 21:58:41 +01:00
|
|
|
|
#include <stdio.h>
|
|
|
|
|
#include <stdlib.h>
|
2014-11-11 15:14:31 +01:00
|
|
|
|
#include <stdint.h>
|
2002-01-19 21:58:41 +01:00
|
|
|
|
#include <string.h>
|
|
|
|
|
#include <unistd.h>
|
|
|
|
|
#include <errno.h>
|
|
|
|
|
#ifdef HAVE_STAT
|
2007-06-20 13:16:42 +02:00
|
|
|
|
# include <sys/stat.h>
|
2002-01-19 21:58:41 +01:00
|
|
|
|
#endif
|
|
|
|
|
#if defined(__linux__) && defined(__alpha__) && __GLIBC__ < 2
|
2007-06-20 13:16:42 +02:00
|
|
|
|
# include <asm/sysinfo.h>
|
|
|
|
|
# include <asm/unistd.h>
|
2002-01-19 21:58:41 +01:00
|
|
|
|
#endif
|
2016-10-31 12:20:33 +01:00
|
|
|
|
#include <time.h>
|
2002-01-19 21:58:41 +01:00
|
|
|
|
#ifdef HAVE_SETRLIMIT
|
2007-06-20 13:16:42 +02:00
|
|
|
|
# include <sys/time.h>
|
|
|
|
|
# include <sys/resource.h>
|
|
|
|
|
#endif
|
|
|
|
|
#ifdef HAVE_W32_SYSTEM
|
2014-03-07 09:46:44 +01:00
|
|
|
|
# if WINVER < 0x0500
|
|
|
|
|
# define WINVER 0x0500 /* Required for AllowSetForegroundWindow. */
|
|
|
|
|
# endif
|
2014-03-07 09:46:44 +01:00
|
|
|
|
# ifdef HAVE_WINSOCK2_H
|
|
|
|
|
# include <winsock2.h>
|
|
|
|
|
# endif
|
2007-06-20 13:16:42 +02:00
|
|
|
|
# include <windows.h>
|
2016-10-26 22:37:07 +02:00
|
|
|
|
#else /*!HAVE_W32_SYSTEM*/
|
|
|
|
|
# include <sys/socket.h>
|
|
|
|
|
# include <sys/un.h>
|
2007-06-20 13:16:42 +02:00
|
|
|
|
#endif
|
2016-10-15 21:35:05 +02:00
|
|
|
|
#ifdef HAVE_INOTIFY_INIT
|
|
|
|
|
# include <sys/inotify.h>
|
|
|
|
|
#endif /*HAVE_INOTIFY_INIT*/
|
Port to npth.
* configure.ac: Don't check for PTH but for NPTH.
(AH_BOTTOM): Remove PTH_SYSCALL_SOFT.
(have_pth): Rename to ...
(have_npth): ... this.
(USE_GNU_NPTH): Rename to ...
(USE_GNU_PTH): ... this.
* m4/npth.m4: New file.
* agent/Makefile.am, agent/cache.c, agent/call-pinentry.c,
agent/call-scd.c, agent/findkey.c, agent/gpg-agent.c,
agent/trustlist.c, common/Makefile.am, common/estream.c,
common/exechelp-posix.c, common/exechelp-w32.c,
common/exechelp-w32ce.c, common/http.c, common/init.c,
common/sysutils.c, dirmngr/Makefile.am, dirmngr/crlfetch.c,
dirmngr/dirmngr.c, dirmngr/dirmngr_ldap.c, dirmngr/ldap-wrapper-ce.c,
dirmngr/ldap-wrapper.c, dirmngr/ldap.c, g13/Makefile.am,
g13/call-gpg.c, g13/g13.c, g13/runner.c, scd/Makefile.am,
scd/apdu.c, scd/app.c, scd/ccid-driver.c, scd/command.c,
scd/scdaemon.c, tools/Makefile.am: Port to npth.
2012-01-03 22:12:37 +01:00
|
|
|
|
#ifdef HAVE_NPTH
|
|
|
|
|
# include <npth.h>
|
2002-01-19 21:58:41 +01:00
|
|
|
|
#endif
|
2007-12-03 14:05:15 +01:00
|
|
|
|
#include <fcntl.h>
|
2007-06-20 13:16:42 +02:00
|
|
|
|
|
2010-06-08 20:33:21 +02:00
|
|
|
|
#include <assuan.h>
|
|
|
|
|
|
2002-01-19 21:58:41 +01:00
|
|
|
|
#include "util.h"
|
|
|
|
|
#include "i18n.h"
|
|
|
|
|
|
|
|
|
|
#include "sysutils.h"
|
|
|
|
|
|
2007-08-22 12:55:07 +02:00
|
|
|
|
#define tohex(n) ((n) < 10 ? ((n) + '0') : (((n) - 10) + 'A'))
|
|
|
|
|
|
2016-11-29 16:18:24 +01:00
|
|
|
|
/* Flag to tell whether special file names are enabled. See gpg.c for
|
|
|
|
|
* an explanation of these file names. */
|
|
|
|
|
static int allow_special_filenames;
|
|
|
|
|
|
2007-08-22 12:55:07 +02:00
|
|
|
|
|
2016-10-15 21:35:05 +02:00
|
|
|
|
static GPGRT_INLINE gpg_error_t
|
|
|
|
|
my_error_from_syserror (void)
|
|
|
|
|
{
|
|
|
|
|
return gpg_err_make (default_errsource, gpg_err_code_from_syserror ());
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static GPGRT_INLINE gpg_error_t
|
|
|
|
|
my_error (int e)
|
|
|
|
|
{
|
|
|
|
|
return gpg_err_make (default_errsource, (e));
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
2002-01-19 21:58:41 +01:00
|
|
|
|
#if defined(__linux__) && defined(__alpha__) && __GLIBC__ < 2
|
|
|
|
|
#warning using trap_unaligned
|
|
|
|
|
static int
|
|
|
|
|
setsysinfo(unsigned long op, void *buffer, unsigned long size,
|
|
|
|
|
int *start, void *arg, unsigned long flag)
|
|
|
|
|
{
|
|
|
|
|
return syscall(__NR_osf_setsysinfo, op, buffer, size, start, arg, flag);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
void
|
|
|
|
|
trap_unaligned(void)
|
|
|
|
|
{
|
|
|
|
|
unsigned int buf[2];
|
|
|
|
|
|
|
|
|
|
buf[0] = SSIN_UACPROC;
|
|
|
|
|
buf[1] = UAC_SIGBUS | UAC_NOPRINT;
|
|
|
|
|
setsysinfo(SSI_NVPAIRS, buf, 1, 0, 0, 0);
|
|
|
|
|
}
|
|
|
|
|
#else
|
|
|
|
|
void
|
|
|
|
|
trap_unaligned(void)
|
|
|
|
|
{ /* dummy */
|
|
|
|
|
}
|
|
|
|
|
#endif
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
int
|
|
|
|
|
disable_core_dumps (void)
|
|
|
|
|
{
|
2004-05-11 11:54:52 +02:00
|
|
|
|
#ifdef HAVE_DOSISH_SYSTEM
|
2002-01-19 21:58:41 +01:00
|
|
|
|
return 0;
|
2004-05-11 11:54:52 +02:00
|
|
|
|
#else
|
|
|
|
|
# ifdef HAVE_SETRLIMIT
|
2002-01-19 21:58:41 +01:00
|
|
|
|
struct rlimit limit;
|
|
|
|
|
|
2004-05-11 11:54:52 +02:00
|
|
|
|
/* We only set the current limit unless we were not able to
|
|
|
|
|
retrieve the old value. */
|
|
|
|
|
if (getrlimit (RLIMIT_CORE, &limit))
|
|
|
|
|
limit.rlim_max = 0;
|
2002-01-19 21:58:41 +01:00
|
|
|
|
limit.rlim_cur = 0;
|
2004-05-11 11:54:52 +02:00
|
|
|
|
if( !setrlimit (RLIMIT_CORE, &limit) )
|
2002-01-19 21:58:41 +01:00
|
|
|
|
return 0;
|
|
|
|
|
if( errno != EINVAL && errno != ENOSYS )
|
|
|
|
|
log_fatal (_("can't disable core dumps: %s\n"), strerror(errno) );
|
2004-05-11 11:54:52 +02:00
|
|
|
|
#endif
|
|
|
|
|
return 1;
|
|
|
|
|
#endif
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
int
|
|
|
|
|
enable_core_dumps (void)
|
|
|
|
|
{
|
|
|
|
|
#ifdef HAVE_DOSISH_SYSTEM
|
|
|
|
|
return 0;
|
|
|
|
|
#else
|
|
|
|
|
# ifdef HAVE_SETRLIMIT
|
|
|
|
|
struct rlimit limit;
|
|
|
|
|
|
|
|
|
|
if (getrlimit (RLIMIT_CORE, &limit))
|
|
|
|
|
return 1;
|
|
|
|
|
limit.rlim_cur = limit.rlim_max;
|
|
|
|
|
setrlimit (RLIMIT_CORE, &limit);
|
2007-12-03 14:05:15 +01:00
|
|
|
|
return 1; /* We always return true because this function is
|
2004-05-11 11:54:52 +02:00
|
|
|
|
merely a debugging aid. */
|
2005-06-07 21:09:18 +02:00
|
|
|
|
# endif
|
2002-01-19 21:58:41 +01:00
|
|
|
|
return 1;
|
2004-05-11 11:54:52 +02:00
|
|
|
|
#endif
|
2002-01-19 21:58:41 +01:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
2016-11-29 16:18:24 +01:00
|
|
|
|
/* Allow the use of special "-&nnn" style file names. */
|
|
|
|
|
void
|
|
|
|
|
enable_special_filenames (void)
|
|
|
|
|
{
|
|
|
|
|
allow_special_filenames = 1;
|
|
|
|
|
}
|
|
|
|
|
|
2002-01-19 21:58:41 +01:00
|
|
|
|
|
2010-03-02 22:25:08 +01:00
|
|
|
|
/* Return a string which is used as a kind of process ID. */
|
2002-01-19 21:58:41 +01:00
|
|
|
|
const byte *
|
2010-03-02 22:25:08 +01:00
|
|
|
|
get_session_marker (size_t *rlen)
|
2002-01-19 21:58:41 +01:00
|
|
|
|
{
|
2010-03-02 22:25:08 +01:00
|
|
|
|
static byte marker[SIZEOF_UNSIGNED_LONG*2];
|
|
|
|
|
static int initialized;
|
2011-02-04 12:57:53 +01:00
|
|
|
|
|
2010-03-02 22:25:08 +01:00
|
|
|
|
if (!initialized)
|
|
|
|
|
{
|
|
|
|
|
gcry_create_nonce (marker, sizeof marker);
|
|
|
|
|
initialized = 1;
|
2002-01-19 21:58:41 +01:00
|
|
|
|
}
|
2010-03-02 22:25:08 +01:00
|
|
|
|
*rlen = sizeof (marker);
|
|
|
|
|
return marker;
|
2002-01-19 21:58:41 +01:00
|
|
|
|
}
|
|
|
|
|
|
2011-04-12 16:30:08 +02:00
|
|
|
|
/* Return a random number in an unsigned int. */
|
|
|
|
|
unsigned int
|
|
|
|
|
get_uint_nonce (void)
|
|
|
|
|
{
|
|
|
|
|
unsigned int value;
|
|
|
|
|
|
|
|
|
|
gcry_create_nonce (&value, sizeof value);
|
|
|
|
|
return value;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
2002-01-19 21:58:41 +01:00
|
|
|
|
|
2004-02-12 10:28:32 +01:00
|
|
|
|
#if 0 /* not yet needed - Note that this will require inclusion of
|
|
|
|
|
cmacros.am in Makefile.am */
|
2002-01-19 21:58:41 +01:00
|
|
|
|
int
|
|
|
|
|
check_permissions(const char *path,int extension,int checkonly)
|
|
|
|
|
{
|
|
|
|
|
#if defined(HAVE_STAT) && !defined(HAVE_DOSISH_SYSTEM)
|
|
|
|
|
char *tmppath;
|
|
|
|
|
struct stat statbuf;
|
|
|
|
|
int ret=1;
|
|
|
|
|
int isdir=0;
|
|
|
|
|
|
|
|
|
|
if(opt.no_perm_warn)
|
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
|
|
if(extension && path[0]!=DIRSEP_C)
|
|
|
|
|
{
|
|
|
|
|
if(strchr(path,DIRSEP_C))
|
|
|
|
|
tmppath=make_filename(path,NULL);
|
|
|
|
|
else
|
|
|
|
|
tmppath=make_filename(GNUPG_LIBDIR,path,NULL);
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
tmppath=m_strdup(path);
|
|
|
|
|
|
|
|
|
|
/* It's okay if the file doesn't exist */
|
|
|
|
|
if(stat(tmppath,&statbuf)!=0)
|
|
|
|
|
{
|
|
|
|
|
ret=0;
|
|
|
|
|
goto end;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
isdir=S_ISDIR(statbuf.st_mode);
|
|
|
|
|
|
|
|
|
|
/* Per-user files must be owned by the user. Extensions must be
|
|
|
|
|
owned by the user or root. */
|
|
|
|
|
if((!extension && statbuf.st_uid != getuid()) ||
|
|
|
|
|
(extension && statbuf.st_uid!=0 && statbuf.st_uid!=getuid()))
|
|
|
|
|
{
|
|
|
|
|
if(!checkonly)
|
|
|
|
|
log_info(_("Warning: unsafe ownership on %s \"%s\"\n"),
|
|
|
|
|
isdir?"directory":extension?"extension":"file",path);
|
|
|
|
|
goto end;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* This works for both directories and files - basically, we don't
|
|
|
|
|
care what the owner permissions are, so long as the group and
|
|
|
|
|
other permissions are 0 for per-user files, and non-writable for
|
|
|
|
|
extensions. */
|
|
|
|
|
if((extension && (statbuf.st_mode & (S_IWGRP|S_IWOTH)) !=0) ||
|
|
|
|
|
(!extension && (statbuf.st_mode & (S_IRWXG|S_IRWXO)) != 0))
|
|
|
|
|
{
|
|
|
|
|
char *dir;
|
|
|
|
|
|
|
|
|
|
/* However, if the directory the directory/file is in is owned
|
|
|
|
|
by the user and is 700, then this is not a problem.
|
|
|
|
|
Theoretically, we could walk this test up to the root
|
|
|
|
|
directory /, but for the sake of sanity, I'm stopping at one
|
|
|
|
|
level down. */
|
|
|
|
|
|
|
|
|
|
dir= make_dirname (tmppath);
|
|
|
|
|
if(stat(dir,&statbuf)==0 && statbuf.st_uid==getuid() &&
|
|
|
|
|
S_ISDIR(statbuf.st_mode) && (statbuf.st_mode & (S_IRWXG|S_IRWXO))==0)
|
|
|
|
|
{
|
|
|
|
|
xfree (dir);
|
|
|
|
|
ret=0;
|
|
|
|
|
goto end;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
m_free(dir);
|
|
|
|
|
|
|
|
|
|
if(!checkonly)
|
|
|
|
|
log_info(_("Warning: unsafe permissions on %s \"%s\"\n"),
|
|
|
|
|
isdir?"directory":extension?"extension":"file",path);
|
|
|
|
|
goto end;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
ret=0;
|
|
|
|
|
|
|
|
|
|
end:
|
|
|
|
|
m_free(tmppath);
|
|
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
|
|
|
|
|
|
#endif /* HAVE_STAT && !HAVE_DOSISH_SYSTEM */
|
|
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
#endif
|
2007-06-20 13:16:42 +02:00
|
|
|
|
|
|
|
|
|
|
2015-11-16 12:41:46 +01:00
|
|
|
|
/* Wrapper around the usual sleep function. This one won't wake up
|
2007-06-20 13:16:42 +02:00
|
|
|
|
before the sleep time has really elapsed. When build with Pth it
|
|
|
|
|
merely calls pth_sleep and thus suspends only the current
|
|
|
|
|
thread. */
|
|
|
|
|
void
|
|
|
|
|
gnupg_sleep (unsigned int seconds)
|
|
|
|
|
{
|
2014-05-02 08:06:10 +02:00
|
|
|
|
#ifdef USE_NPTH
|
|
|
|
|
npth_sleep (seconds);
|
2007-06-20 13:16:42 +02:00
|
|
|
|
#else
|
|
|
|
|
/* Fixme: make sure that a sleep won't wake up to early. */
|
2011-02-04 12:57:53 +01:00
|
|
|
|
# ifdef HAVE_W32_SYSTEM
|
2007-06-20 13:16:42 +02:00
|
|
|
|
Sleep (seconds*1000);
|
|
|
|
|
# else
|
|
|
|
|
sleep (seconds);
|
|
|
|
|
# endif
|
|
|
|
|
#endif
|
|
|
|
|
}
|
2007-06-25 13:54:43 +02:00
|
|
|
|
|
|
|
|
|
|
2016-10-31 12:20:33 +01:00
|
|
|
|
/* Wrapper around the platforms usleep function. This one won't wake
|
|
|
|
|
* up before the sleep time has really elapsed. When build with nPth
|
|
|
|
|
* it merely calls npth_usleep and thus suspends only the current
|
|
|
|
|
* thread. */
|
|
|
|
|
void
|
|
|
|
|
gnupg_usleep (unsigned int usecs)
|
|
|
|
|
{
|
|
|
|
|
#if defined(USE_NPTH)
|
|
|
|
|
|
|
|
|
|
npth_usleep (usecs);
|
|
|
|
|
|
|
|
|
|
#elif defined(HAVE_W32_SYSTEM)
|
|
|
|
|
|
|
|
|
|
Sleep ((usecs + 999) / 1000);
|
|
|
|
|
|
|
|
|
|
#elif defined(HAVE_NANOSLEEP)
|
|
|
|
|
|
|
|
|
|
if (usecs)
|
|
|
|
|
{
|
|
|
|
|
struct timespec req;
|
|
|
|
|
struct timespec rem;
|
|
|
|
|
|
2017-11-15 15:30:21 +01:00
|
|
|
|
req.tv_sec = usecs / 1000000;
|
|
|
|
|
req.tv_nsec = (usecs % 1000000) * 1000;
|
2016-10-31 12:20:33 +01:00
|
|
|
|
while (nanosleep (&req, &rem) < 0 && errno == EINTR)
|
2017-11-15 15:30:21 +01:00
|
|
|
|
req = rem;
|
2016-10-31 12:20:33 +01:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
#else /*Standard Unix*/
|
|
|
|
|
|
|
|
|
|
if (usecs)
|
|
|
|
|
{
|
|
|
|
|
struct timeval tv;
|
|
|
|
|
|
|
|
|
|
tv.tv_sec = usecs / 1000000;
|
|
|
|
|
tv.tv_usec = usecs % 1000000;
|
|
|
|
|
select (0, NULL, NULL, NULL, &tv);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
#endif
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
2007-06-25 13:54:43 +02:00
|
|
|
|
/* This function is a NOP for POSIX systems but required under Windows
|
|
|
|
|
as the file handles as returned by OS calls (like CreateFile) are
|
|
|
|
|
different from the libc file descriptors (like open). This function
|
|
|
|
|
translates system file handles to libc file handles. FOR_WRITE
|
|
|
|
|
gives the direction of the handle. */
|
|
|
|
|
int
|
2007-07-12 17:28:30 +02:00
|
|
|
|
translate_sys2libc_fd (gnupg_fd_t fd, int for_write)
|
2007-06-25 13:54:43 +02:00
|
|
|
|
{
|
2010-03-02 22:25:08 +01:00
|
|
|
|
#if defined(HAVE_W32CE_SYSTEM)
|
2010-06-11 01:17:33 +02:00
|
|
|
|
(void)for_write;
|
|
|
|
|
return (int) fd;
|
2010-03-02 22:25:08 +01:00
|
|
|
|
#elif defined(HAVE_W32_SYSTEM)
|
2007-06-25 13:54:43 +02:00
|
|
|
|
int x;
|
|
|
|
|
|
2007-07-12 17:28:30 +02:00
|
|
|
|
if (fd == GNUPG_INVALID_FD)
|
|
|
|
|
return -1;
|
2011-02-04 12:57:53 +01:00
|
|
|
|
|
2007-07-12 17:28:30 +02:00
|
|
|
|
/* Note that _open_osfhandle is currently defined to take and return
|
|
|
|
|
a long. */
|
2019-07-24 07:27:47 +02:00
|
|
|
|
x = _open_osfhandle ((intptr_t)fd, for_write ? 1 : 0);
|
2007-06-25 13:54:43 +02:00
|
|
|
|
if (x == -1)
|
|
|
|
|
log_error ("failed to translate osfhandle %p\n", (void *) fd);
|
2007-07-12 17:28:30 +02:00
|
|
|
|
return x;
|
|
|
|
|
#else /*!HAVE_W32_SYSTEM */
|
2008-10-20 15:53:23 +02:00
|
|
|
|
(void)for_write;
|
2007-06-25 13:54:43 +02:00
|
|
|
|
return fd;
|
2007-07-12 17:28:30 +02:00
|
|
|
|
#endif
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* This is the same as translate_sys2libc_fd but takes an integer
|
2010-06-07 17:11:35 +02:00
|
|
|
|
which is assumed to be such an system handle. On WindowsCE the
|
|
|
|
|
passed FD is a rendezvous ID and the function finishes the pipe
|
|
|
|
|
creation. */
|
2007-07-12 17:28:30 +02:00
|
|
|
|
int
|
|
|
|
|
translate_sys2libc_fd_int (int fd, int for_write)
|
|
|
|
|
{
|
2010-06-07 17:11:35 +02:00
|
|
|
|
#if HAVE_W32CE_SYSTEM
|
2010-06-11 01:17:33 +02:00
|
|
|
|
fd = (int) _assuan_w32ce_finish_pipe (fd, for_write);
|
|
|
|
|
return translate_sys2libc_fd ((void*)fd, for_write);
|
2010-06-07 17:11:35 +02:00
|
|
|
|
#elif HAVE_W32_SYSTEM
|
2007-07-12 17:28:30 +02:00
|
|
|
|
if (fd <= 2)
|
|
|
|
|
return fd; /* Do not do this for error, stdin, stdout, stderr. */
|
|
|
|
|
|
|
|
|
|
return translate_sys2libc_fd ((void*)fd, for_write);
|
|
|
|
|
#else
|
2008-10-20 15:53:23 +02:00
|
|
|
|
(void)for_write;
|
2007-07-12 17:28:30 +02:00
|
|
|
|
return fd;
|
|
|
|
|
#endif
|
2007-06-25 13:54:43 +02:00
|
|
|
|
}
|
2007-08-22 12:55:07 +02:00
|
|
|
|
|
|
|
|
|
|
2016-11-29 16:18:24 +01:00
|
|
|
|
/* Check whether FNAME has the form "-&nnnn", where N is a non-zero
|
|
|
|
|
* number. Returns this number or -1 if it is not the case. If the
|
|
|
|
|
* caller wants to use the file descriptor for writing FOR_WRITE shall
|
2017-04-28 03:06:33 +02:00
|
|
|
|
* be set to 1. If NOTRANSLATE is set the Windows specific mapping is
|
2016-11-29 16:18:24 +01:00
|
|
|
|
* not done. */
|
|
|
|
|
int
|
|
|
|
|
check_special_filename (const char *fname, int for_write, int notranslate)
|
|
|
|
|
{
|
|
|
|
|
if (allow_special_filenames
|
|
|
|
|
&& fname && *fname == '-' && fname[1] == '&')
|
|
|
|
|
{
|
|
|
|
|
int i;
|
|
|
|
|
|
|
|
|
|
fname += 2;
|
|
|
|
|
for (i=0; digitp (fname+i); i++ )
|
|
|
|
|
;
|
|
|
|
|
if (!fname[i])
|
|
|
|
|
return notranslate? atoi (fname)
|
|
|
|
|
/**/ : translate_sys2libc_fd_int (atoi (fname), for_write);
|
|
|
|
|
}
|
|
|
|
|
return -1;
|
|
|
|
|
}
|
|
|
|
|
|
2007-08-22 12:55:07 +02:00
|
|
|
|
|
|
|
|
|
/* Replacement for tmpfile(). This is required because the tmpfile
|
|
|
|
|
function of Windows' runtime library is broken, insecure, ignores
|
|
|
|
|
TMPDIR and so on. In addition we create a file with an inheritable
|
|
|
|
|
handle. */
|
|
|
|
|
FILE *
|
|
|
|
|
gnupg_tmpfile (void)
|
|
|
|
|
{
|
|
|
|
|
#ifdef HAVE_W32_SYSTEM
|
|
|
|
|
int attempts, n;
|
2010-03-02 22:25:08 +01:00
|
|
|
|
#ifdef HAVE_W32CE_SYSTEM
|
|
|
|
|
wchar_t buffer[MAX_PATH+7+12+1];
|
|
|
|
|
# define mystrlen(a) wcslen (a)
|
|
|
|
|
wchar_t *name, *p;
|
|
|
|
|
#else
|
2007-08-22 12:55:07 +02:00
|
|
|
|
char buffer[MAX_PATH+7+12+1];
|
2010-03-02 22:25:08 +01:00
|
|
|
|
# define mystrlen(a) strlen (a)
|
2007-08-22 12:55:07 +02:00
|
|
|
|
char *name, *p;
|
2010-03-02 22:25:08 +01:00
|
|
|
|
#endif
|
2007-08-22 12:55:07 +02:00
|
|
|
|
HANDLE file;
|
|
|
|
|
int pid = GetCurrentProcessId ();
|
|
|
|
|
unsigned int value;
|
|
|
|
|
int i;
|
|
|
|
|
SECURITY_ATTRIBUTES sec_attr;
|
|
|
|
|
|
|
|
|
|
memset (&sec_attr, 0, sizeof sec_attr );
|
|
|
|
|
sec_attr.nLength = sizeof sec_attr;
|
|
|
|
|
sec_attr.bInheritHandle = TRUE;
|
|
|
|
|
|
|
|
|
|
n = GetTempPath (MAX_PATH+1, buffer);
|
2010-03-02 22:25:08 +01:00
|
|
|
|
if (!n || n > MAX_PATH || mystrlen (buffer) > MAX_PATH)
|
2007-08-22 12:55:07 +02:00
|
|
|
|
{
|
2010-03-02 22:25:08 +01:00
|
|
|
|
gpg_err_set_errno (ENOENT);
|
2007-08-22 12:55:07 +02:00
|
|
|
|
return NULL;
|
|
|
|
|
}
|
2010-03-02 22:25:08 +01:00
|
|
|
|
p = buffer + mystrlen (buffer);
|
|
|
|
|
#ifdef HAVE_W32CE_SYSTEM
|
|
|
|
|
wcscpy (p, L"_gnupg");
|
|
|
|
|
p += 7;
|
|
|
|
|
#else
|
2007-08-22 12:55:07 +02:00
|
|
|
|
p = stpcpy (p, "_gnupg");
|
2010-03-02 22:25:08 +01:00
|
|
|
|
#endif
|
2007-08-22 12:55:07 +02:00
|
|
|
|
/* We try to create the directory but don't care about an error as
|
|
|
|
|
it may already exist and the CreateFile would throw an error
|
|
|
|
|
anyway. */
|
|
|
|
|
CreateDirectory (buffer, NULL);
|
|
|
|
|
*p++ = '\\';
|
|
|
|
|
name = p;
|
|
|
|
|
for (attempts=0; attempts < 10; attempts++)
|
|
|
|
|
{
|
|
|
|
|
p = name;
|
|
|
|
|
value = (GetTickCount () ^ ((pid<<16) & 0xffff0000));
|
|
|
|
|
for (i=0; i < 8; i++)
|
|
|
|
|
{
|
|
|
|
|
*p++ = tohex (((value >> 28) & 0x0f));
|
|
|
|
|
value <<= 4;
|
|
|
|
|
}
|
2010-03-02 22:25:08 +01:00
|
|
|
|
#ifdef HAVE_W32CE_SYSTEM
|
|
|
|
|
wcscpy (p, L".tmp");
|
|
|
|
|
#else
|
2007-08-22 12:55:07 +02:00
|
|
|
|
strcpy (p, ".tmp");
|
2010-03-02 22:25:08 +01:00
|
|
|
|
#endif
|
2007-08-22 12:55:07 +02:00
|
|
|
|
file = CreateFile (buffer,
|
|
|
|
|
GENERIC_READ | GENERIC_WRITE,
|
|
|
|
|
0,
|
|
|
|
|
&sec_attr,
|
|
|
|
|
CREATE_NEW,
|
|
|
|
|
FILE_ATTRIBUTE_TEMPORARY | FILE_FLAG_DELETE_ON_CLOSE,
|
|
|
|
|
NULL);
|
|
|
|
|
if (file != INVALID_HANDLE_VALUE)
|
|
|
|
|
{
|
|
|
|
|
FILE *fp;
|
2010-03-02 22:25:08 +01:00
|
|
|
|
#ifdef HAVE_W32CE_SYSTEM
|
|
|
|
|
int fd = (int)file;
|
|
|
|
|
fp = _wfdopen (fd, L"w+b");
|
|
|
|
|
#else
|
2019-07-24 07:27:47 +02:00
|
|
|
|
int fd = _open_osfhandle ((intptr_t)file, 0);
|
2007-08-22 12:55:07 +02:00
|
|
|
|
if (fd == -1)
|
|
|
|
|
{
|
|
|
|
|
CloseHandle (file);
|
|
|
|
|
return NULL;
|
|
|
|
|
}
|
|
|
|
|
fp = fdopen (fd, "w+b");
|
2010-03-02 22:25:08 +01:00
|
|
|
|
#endif
|
2007-08-22 12:55:07 +02:00
|
|
|
|
if (!fp)
|
|
|
|
|
{
|
|
|
|
|
int save = errno;
|
|
|
|
|
close (fd);
|
2010-03-02 22:25:08 +01:00
|
|
|
|
gpg_err_set_errno (save);
|
2007-08-22 12:55:07 +02:00
|
|
|
|
return NULL;
|
|
|
|
|
}
|
|
|
|
|
return fp;
|
|
|
|
|
}
|
|
|
|
|
Sleep (1); /* One ms as this is the granularity of GetTickCount. */
|
|
|
|
|
}
|
2010-03-02 22:25:08 +01:00
|
|
|
|
gpg_err_set_errno (ENOENT);
|
2007-08-22 12:55:07 +02:00
|
|
|
|
return NULL;
|
2010-03-02 22:25:08 +01:00
|
|
|
|
#undef mystrlen
|
2007-08-22 12:55:07 +02:00
|
|
|
|
#else /*!HAVE_W32_SYSTEM*/
|
|
|
|
|
return tmpfile ();
|
|
|
|
|
#endif /*!HAVE_W32_SYSTEM*/
|
|
|
|
|
}
|
2007-12-03 14:05:15 +01:00
|
|
|
|
|
|
|
|
|
|
|
|
|
|
/* Make sure that the standard file descriptors are opened. Obviously
|
|
|
|
|
some folks close them before an exec and the next file we open will
|
|
|
|
|
get one of them assigned and thus any output (i.e. diagnostics) end
|
|
|
|
|
up in that file (e.g. the trustdb). Not actually a gpg problem as
|
2015-11-16 12:41:46 +01:00
|
|
|
|
this will happen with almost all utilities when called in a wrong
|
2007-12-03 14:05:15 +01:00
|
|
|
|
way. However we try to minimize the damage here and raise
|
|
|
|
|
awareness of the problem.
|
|
|
|
|
|
|
|
|
|
Must be called before we open any files! */
|
|
|
|
|
void
|
|
|
|
|
gnupg_reopen_std (const char *pgmname)
|
2011-02-04 12:57:53 +01:00
|
|
|
|
{
|
2018-10-02 07:22:24 +02:00
|
|
|
|
#ifdef F_GETFD
|
2007-12-03 14:05:15 +01:00
|
|
|
|
int did_stdin = 0;
|
|
|
|
|
int did_stdout = 0;
|
|
|
|
|
int did_stderr = 0;
|
|
|
|
|
FILE *complain;
|
|
|
|
|
|
2018-10-02 07:22:24 +02:00
|
|
|
|
if (fcntl (STDIN_FILENO, F_GETFD) == -1 && errno ==EBADF)
|
2007-12-03 14:05:15 +01:00
|
|
|
|
{
|
|
|
|
|
if (open ("/dev/null",O_RDONLY) == STDIN_FILENO)
|
|
|
|
|
did_stdin = 1;
|
|
|
|
|
else
|
|
|
|
|
did_stdin = 2;
|
|
|
|
|
}
|
2011-02-04 12:57:53 +01:00
|
|
|
|
|
2018-10-02 07:22:24 +02:00
|
|
|
|
if (fcntl (STDOUT_FILENO, F_GETFD) == -1 && errno == EBADF)
|
2007-12-03 14:05:15 +01:00
|
|
|
|
{
|
|
|
|
|
if (open ("/dev/null",O_WRONLY) == STDOUT_FILENO)
|
|
|
|
|
did_stdout = 1;
|
|
|
|
|
else
|
|
|
|
|
did_stdout = 2;
|
|
|
|
|
}
|
|
|
|
|
|
2018-10-02 07:22:24 +02:00
|
|
|
|
if (fcntl (STDERR_FILENO, F_GETFD)==-1 && errno==EBADF)
|
2007-12-03 14:05:15 +01:00
|
|
|
|
{
|
|
|
|
|
if (open ("/dev/null", O_WRONLY) == STDERR_FILENO)
|
|
|
|
|
did_stderr = 1;
|
|
|
|
|
else
|
|
|
|
|
did_stderr = 2;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* It's hard to log this sort of thing since the filehandle we would
|
|
|
|
|
complain to may be closed... */
|
|
|
|
|
if (!did_stderr)
|
|
|
|
|
complain = stderr;
|
|
|
|
|
else if (!did_stdout)
|
|
|
|
|
complain = stdout;
|
|
|
|
|
else
|
|
|
|
|
complain = NULL;
|
|
|
|
|
|
|
|
|
|
if (complain)
|
|
|
|
|
{
|
|
|
|
|
if (did_stdin == 1)
|
|
|
|
|
fprintf (complain, "%s: WARNING: standard input reopened\n", pgmname);
|
|
|
|
|
if (did_stdout == 1)
|
|
|
|
|
fprintf (complain, "%s: WARNING: standard output reopened\n", pgmname);
|
|
|
|
|
if (did_stderr == 1)
|
|
|
|
|
fprintf (complain, "%s: WARNING: standard error reopened\n", pgmname);
|
|
|
|
|
|
|
|
|
|
if (did_stdin == 2 || did_stdout == 2 || did_stderr == 2)
|
|
|
|
|
fprintf(complain,"%s: fatal: unable to reopen standard input,"
|
|
|
|
|
" output, or error\n", pgmname);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (did_stdin == 2 || did_stdout == 2 || did_stderr == 2)
|
|
|
|
|
exit (3);
|
2018-10-02 07:22:24 +02:00
|
|
|
|
#else /* !F_GETFD */
|
2009-04-01 12:51:53 +02:00
|
|
|
|
(void)pgmname;
|
|
|
|
|
#endif
|
2007-12-03 14:05:15 +01:00
|
|
|
|
}
|
|
|
|
|
|
2008-02-14 20:50:10 +01:00
|
|
|
|
|
|
|
|
|
/* Hack required for Windows. */
|
2011-02-04 12:57:53 +01:00
|
|
|
|
void
|
2008-02-14 20:50:10 +01:00
|
|
|
|
gnupg_allow_set_foregound_window (pid_t pid)
|
|
|
|
|
{
|
2009-04-01 12:51:53 +02:00
|
|
|
|
if (!pid)
|
2008-02-14 20:50:10 +01:00
|
|
|
|
log_info ("%s called with invalid pid %lu\n",
|
|
|
|
|
"gnupg_allow_set_foregound_window", (unsigned long)pid);
|
2010-03-22 13:46:05 +01:00
|
|
|
|
#if defined(HAVE_W32_SYSTEM) && !defined(HAVE_W32CE_SYSTEM)
|
2009-04-01 12:51:53 +02:00
|
|
|
|
else if (!AllowSetForegroundWindow ((pid_t)pid == (pid_t)(-1)?ASFW_ANY:pid))
|
2008-02-14 20:50:10 +01:00
|
|
|
|
log_info ("AllowSetForegroundWindow(%lu) failed: %s\n",
|
|
|
|
|
(unsigned long)pid, w32_strerror (-1));
|
|
|
|
|
#endif
|
|
|
|
|
}
|
2010-03-02 22:25:08 +01:00
|
|
|
|
|
2010-03-24 13:15:30 +01:00
|
|
|
|
int
|
|
|
|
|
gnupg_remove (const char *fname)
|
|
|
|
|
{
|
|
|
|
|
#ifdef HAVE_W32CE_SYSTEM
|
|
|
|
|
int rc;
|
|
|
|
|
wchar_t *wfname;
|
|
|
|
|
|
|
|
|
|
wfname = utf8_to_wchar (fname);
|
|
|
|
|
if (!wfname)
|
|
|
|
|
rc = 0;
|
|
|
|
|
else
|
|
|
|
|
{
|
|
|
|
|
rc = DeleteFile (wfname);
|
|
|
|
|
xfree (wfname);
|
|
|
|
|
}
|
|
|
|
|
if (!rc)
|
2010-08-12 13:43:46 +02:00
|
|
|
|
return -1; /* ERRNO is automagically provided by gpg-error.h. */
|
|
|
|
|
return 0;
|
2010-03-24 13:15:30 +01:00
|
|
|
|
#else
|
2010-04-14 19:56:22 +02:00
|
|
|
|
return remove (fname);
|
2010-03-24 13:15:30 +01:00
|
|
|
|
#endif
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
2016-11-16 17:43:59 +01:00
|
|
|
|
/* Wrapper for rename(2) to handle Windows peculiarities. If
|
|
|
|
|
* BLOCK_SIGNALS is not NULL and points to a variable set to true, all
|
|
|
|
|
* signals will be blocked by calling gnupg_block_all_signals; the
|
|
|
|
|
* caller needs to call gnupg_unblock_all_signals if that variable is
|
|
|
|
|
* still set to true on return. */
|
|
|
|
|
gpg_error_t
|
|
|
|
|
gnupg_rename_file (const char *oldname, const char *newname, int *block_signals)
|
|
|
|
|
{
|
|
|
|
|
gpg_error_t err = 0;
|
|
|
|
|
|
|
|
|
|
if (block_signals && *block_signals)
|
|
|
|
|
gnupg_block_all_signals ();
|
|
|
|
|
|
|
|
|
|
#ifdef HAVE_DOSISH_SYSTEM
|
|
|
|
|
{
|
|
|
|
|
int wtime = 0;
|
|
|
|
|
|
|
|
|
|
gnupg_remove (newname);
|
|
|
|
|
again:
|
|
|
|
|
if (rename (oldname, newname))
|
|
|
|
|
{
|
|
|
|
|
if (GetLastError () == ERROR_SHARING_VIOLATION)
|
|
|
|
|
{
|
|
|
|
|
/* Another process has the file open. We do not use a
|
|
|
|
|
* lock for read but instead we wait until the other
|
|
|
|
|
* process has closed the file. This may take long but
|
|
|
|
|
* that would also be the case with a dotlock approach for
|
|
|
|
|
* read and write. Note that we don't need this on Unix
|
|
|
|
|
* due to the inode concept.
|
|
|
|
|
*
|
|
|
|
|
* So let's wait until the rename has worked. The retry
|
|
|
|
|
* intervals are 50, 100, 200, 400, 800, 50ms, ... */
|
|
|
|
|
if (!wtime || wtime >= 800)
|
|
|
|
|
wtime = 50;
|
|
|
|
|
else
|
|
|
|
|
wtime *= 2;
|
|
|
|
|
|
|
|
|
|
if (wtime >= 800)
|
|
|
|
|
log_info (_("waiting for file '%s' to become accessible ...\n"),
|
|
|
|
|
oldname);
|
|
|
|
|
|
|
|
|
|
Sleep (wtime);
|
|
|
|
|
goto again;
|
|
|
|
|
}
|
|
|
|
|
err = my_error_from_syserror ();
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
#else /* Unix */
|
|
|
|
|
{
|
|
|
|
|
#ifdef __riscos__
|
|
|
|
|
gnupg_remove (newname);
|
|
|
|
|
#endif
|
|
|
|
|
if (rename (oldname, newname) )
|
|
|
|
|
err = my_error_from_syserror ();
|
|
|
|
|
}
|
|
|
|
|
#endif /* Unix */
|
|
|
|
|
|
|
|
|
|
if (block_signals && *block_signals && err)
|
|
|
|
|
{
|
|
|
|
|
gnupg_unblock_all_signals ();
|
|
|
|
|
*block_signals = 0;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (err)
|
|
|
|
|
log_error (_("renaming '%s' to '%s' failed: %s\n"),
|
|
|
|
|
oldname, newname, gpg_strerror (err));
|
|
|
|
|
return err;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
2016-04-20 14:55:45 +02:00
|
|
|
|
#ifndef HAVE_W32_SYSTEM
|
|
|
|
|
static mode_t
|
|
|
|
|
modestr_to_mode (const char *modestr)
|
|
|
|
|
{
|
|
|
|
|
mode_t mode = 0;
|
|
|
|
|
|
|
|
|
|
if (modestr && *modestr)
|
|
|
|
|
{
|
|
|
|
|
modestr++;
|
|
|
|
|
if (*modestr && *modestr++ == 'r')
|
|
|
|
|
mode |= S_IRUSR;
|
|
|
|
|
if (*modestr && *modestr++ == 'w')
|
|
|
|
|
mode |= S_IWUSR;
|
|
|
|
|
if (*modestr && *modestr++ == 'x')
|
|
|
|
|
mode |= S_IXUSR;
|
|
|
|
|
if (*modestr && *modestr++ == 'r')
|
|
|
|
|
mode |= S_IRGRP;
|
|
|
|
|
if (*modestr && *modestr++ == 'w')
|
|
|
|
|
mode |= S_IWGRP;
|
|
|
|
|
if (*modestr && *modestr++ == 'x')
|
|
|
|
|
mode |= S_IXGRP;
|
|
|
|
|
if (*modestr && *modestr++ == 'r')
|
|
|
|
|
mode |= S_IROTH;
|
|
|
|
|
if (*modestr && *modestr++ == 'w')
|
|
|
|
|
mode |= S_IWOTH;
|
|
|
|
|
if (*modestr && *modestr++ == 'x')
|
|
|
|
|
mode |= S_IXOTH;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return mode;
|
|
|
|
|
}
|
|
|
|
|
#endif
|
|
|
|
|
|
|
|
|
|
|
2010-04-14 13:24:02 +02:00
|
|
|
|
/* A wrapper around mkdir which takes a string for the mode argument.
|
|
|
|
|
This makes it easier to handle the mode argument which is not
|
|
|
|
|
defined on all systems. The format of the modestring is
|
|
|
|
|
|
|
|
|
|
"-rwxrwxrwx"
|
2011-02-04 12:57:53 +01:00
|
|
|
|
|
2010-04-14 13:24:02 +02:00
|
|
|
|
'-' is a don't care or not set. 'r', 'w', 'x' are read allowed,
|
|
|
|
|
write allowed, execution allowed with the first group for the user,
|
|
|
|
|
the second for the group and the third for all others. If the
|
|
|
|
|
string is shorter than above the missing mode characters are meant
|
|
|
|
|
to be not set. */
|
|
|
|
|
int
|
|
|
|
|
gnupg_mkdir (const char *name, const char *modestr)
|
|
|
|
|
{
|
|
|
|
|
#ifdef HAVE_W32CE_SYSTEM
|
|
|
|
|
wchar_t *wname;
|
|
|
|
|
(void)modestr;
|
2011-02-04 12:57:53 +01:00
|
|
|
|
|
2010-04-14 13:24:02 +02:00
|
|
|
|
wname = utf8_to_wchar (name);
|
|
|
|
|
if (!wname)
|
|
|
|
|
return -1;
|
|
|
|
|
if (!CreateDirectoryW (wname, NULL))
|
|
|
|
|
{
|
|
|
|
|
xfree (wname);
|
|
|
|
|
return -1; /* ERRNO is automagically provided by gpg-error.h. */
|
|
|
|
|
}
|
|
|
|
|
xfree (wname);
|
|
|
|
|
return 0;
|
|
|
|
|
#elif MKDIR_TAKES_ONE_ARG
|
|
|
|
|
(void)modestr;
|
|
|
|
|
/* Note: In the case of W32 we better use CreateDirectory and try to
|
|
|
|
|
set appropriate permissions. However using mkdir is easier
|
|
|
|
|
because this sets ERRNO. */
|
|
|
|
|
return mkdir (name);
|
|
|
|
|
#else
|
2016-04-20 14:55:45 +02:00
|
|
|
|
return mkdir (name, modestr_to_mode (modestr));
|
|
|
|
|
#endif
|
|
|
|
|
}
|
2010-04-14 13:24:02 +02:00
|
|
|
|
|
2016-04-20 14:55:45 +02:00
|
|
|
|
|
2017-07-25 12:24:01 +02:00
|
|
|
|
/* A simple wrapper around chdir. NAME is expected to be utf8
|
|
|
|
|
* encoded. */
|
|
|
|
|
int
|
|
|
|
|
gnupg_chdir (const char *name)
|
|
|
|
|
{
|
|
|
|
|
return chdir (name);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
2016-06-08 16:18:02 +02:00
|
|
|
|
/* A wrapper around chmod which takes a string for the mode argument.
|
2016-04-20 14:55:45 +02:00
|
|
|
|
This makes it easier to handle the mode argument which is not
|
|
|
|
|
defined on all systems. The format of the modestring is the same
|
|
|
|
|
as for gnupg_mkdir. */
|
|
|
|
|
int
|
|
|
|
|
gnupg_chmod (const char *name, const char *modestr)
|
|
|
|
|
{
|
|
|
|
|
#ifdef HAVE_W32_SYSTEM
|
2016-05-24 13:02:14 +02:00
|
|
|
|
(void)name;
|
|
|
|
|
(void)modestr;
|
2016-04-20 14:55:45 +02:00
|
|
|
|
return 0;
|
|
|
|
|
#else
|
|
|
|
|
return chmod (name, modestr_to_mode (modestr));
|
2010-04-14 13:24:02 +02:00
|
|
|
|
#endif
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
2014-11-11 15:14:31 +01:00
|
|
|
|
/* Our version of mkdtemp. The API is identical to POSIX.1-2008
|
|
|
|
|
version. We do not use a system provided mkdtemp because we have a
|
|
|
|
|
good RNG instantly available and this way we don't have diverging
|
|
|
|
|
versions. */
|
|
|
|
|
char *
|
|
|
|
|
gnupg_mkdtemp (char *tmpl)
|
|
|
|
|
{
|
|
|
|
|
/* A lower bound on the number of temporary files to attempt to
|
|
|
|
|
generate. The maximum total number of temporary file names that
|
|
|
|
|
can exist for a given template is 62**6 (5*36**3 for Windows).
|
|
|
|
|
It should never be necessary to try all these combinations.
|
|
|
|
|
Instead if a reasonable number of names is tried (we define
|
|
|
|
|
reasonable as 62**3 or 5*36**3) fail to give the system
|
|
|
|
|
administrator the chance to remove the problems. */
|
|
|
|
|
#ifdef HAVE_W32_SYSTEM
|
|
|
|
|
static const char letters[] =
|
|
|
|
|
"abcdefghijklmnopqrstuvwxyz0123456789";
|
|
|
|
|
# define NUMBER_OF_LETTERS 36
|
|
|
|
|
# define ATTEMPTS_MIN (5 * 36 * 36 * 36)
|
|
|
|
|
#else
|
|
|
|
|
static const char letters[] =
|
|
|
|
|
"abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789";
|
|
|
|
|
# define NUMBER_OF_LETTERS 62
|
|
|
|
|
# define ATTEMPTS_MIN (62 * 62 * 62)
|
|
|
|
|
#endif
|
|
|
|
|
int len;
|
|
|
|
|
char *XXXXXX;
|
|
|
|
|
uint64_t value;
|
|
|
|
|
unsigned int count;
|
|
|
|
|
int save_errno = errno;
|
|
|
|
|
/* The number of times to attempt to generate a temporary file. To
|
|
|
|
|
conform to POSIX, this must be no smaller than TMP_MAX. */
|
|
|
|
|
#if ATTEMPTS_MIN < TMP_MAX
|
|
|
|
|
unsigned int attempts = TMP_MAX;
|
|
|
|
|
#else
|
|
|
|
|
unsigned int attempts = ATTEMPTS_MIN;
|
|
|
|
|
#endif
|
|
|
|
|
|
|
|
|
|
len = strlen (tmpl);
|
|
|
|
|
if (len < 6 || strcmp (&tmpl[len - 6], "XXXXXX"))
|
|
|
|
|
{
|
|
|
|
|
gpg_err_set_errno (EINVAL);
|
|
|
|
|
return NULL;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* This is where the Xs start. */
|
|
|
|
|
XXXXXX = &tmpl[len - 6];
|
|
|
|
|
|
|
|
|
|
/* Get a random start value. */
|
|
|
|
|
gcry_create_nonce (&value, sizeof value);
|
|
|
|
|
|
|
|
|
|
/* Loop until a directory was created. */
|
|
|
|
|
for (count = 0; count < attempts; value += 7777, ++count)
|
|
|
|
|
{
|
|
|
|
|
uint64_t v = value;
|
|
|
|
|
|
|
|
|
|
/* Fill in the random bits. */
|
|
|
|
|
XXXXXX[0] = letters[v % NUMBER_OF_LETTERS];
|
|
|
|
|
v /= NUMBER_OF_LETTERS;
|
|
|
|
|
XXXXXX[1] = letters[v % NUMBER_OF_LETTERS];
|
|
|
|
|
v /= NUMBER_OF_LETTERS;
|
|
|
|
|
XXXXXX[2] = letters[v % NUMBER_OF_LETTERS];
|
|
|
|
|
v /= NUMBER_OF_LETTERS;
|
|
|
|
|
XXXXXX[3] = letters[v % NUMBER_OF_LETTERS];
|
|
|
|
|
v /= NUMBER_OF_LETTERS;
|
|
|
|
|
XXXXXX[4] = letters[v % NUMBER_OF_LETTERS];
|
|
|
|
|
v /= NUMBER_OF_LETTERS;
|
|
|
|
|
XXXXXX[5] = letters[v % NUMBER_OF_LETTERS];
|
|
|
|
|
|
|
|
|
|
if (!gnupg_mkdir (tmpl, "-rwx"))
|
|
|
|
|
{
|
|
|
|
|
gpg_err_set_errno (save_errno);
|
|
|
|
|
return tmpl;
|
|
|
|
|
}
|
|
|
|
|
if (errno != EEXIST)
|
|
|
|
|
return NULL;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* We got out of the loop because we ran out of combinations to try. */
|
|
|
|
|
gpg_err_set_errno (EEXIST);
|
|
|
|
|
return NULL;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
2010-04-14 13:24:02 +02:00
|
|
|
|
int
|
|
|
|
|
gnupg_setenv (const char *name, const char *value, int overwrite)
|
|
|
|
|
{
|
|
|
|
|
#ifdef HAVE_W32CE_SYSTEM
|
|
|
|
|
(void)name;
|
|
|
|
|
(void)value;
|
|
|
|
|
(void)overwrite;
|
|
|
|
|
return 0;
|
2016-10-25 08:59:44 +02:00
|
|
|
|
#else /*!W32CE*/
|
|
|
|
|
# ifdef HAVE_W32_SYSTEM
|
2016-10-20 16:45:18 +02:00
|
|
|
|
/* Windows maintains (at least) two sets of environment variables.
|
|
|
|
|
One set can be accessed by GetEnvironmentVariable and
|
|
|
|
|
SetEnvironmentVariable. This set is inherited by the children.
|
|
|
|
|
The other set is maintained in the C runtime, and is accessed
|
|
|
|
|
using getenv and putenv. We try to keep them in sync by
|
|
|
|
|
modifying both sets. */
|
|
|
|
|
{
|
|
|
|
|
int exists;
|
|
|
|
|
char tmpbuf[10];
|
|
|
|
|
exists = GetEnvironmentVariable (name, tmpbuf, sizeof tmpbuf);
|
|
|
|
|
|
|
|
|
|
if ((! exists || overwrite) && !SetEnvironmentVariable (name, value))
|
|
|
|
|
{
|
|
|
|
|
gpg_err_set_errno (EINVAL); /* (Might also be ENOMEM.) */
|
|
|
|
|
return -1;
|
|
|
|
|
}
|
|
|
|
|
}
|
2016-10-25 08:59:44 +02:00
|
|
|
|
# endif /*W32*/
|
2014-11-11 15:14:31 +01:00
|
|
|
|
|
2016-10-25 08:59:44 +02:00
|
|
|
|
# ifdef HAVE_SETENV
|
2016-10-20 16:45:18 +02:00
|
|
|
|
return setenv (name, value, overwrite);
|
2016-10-25 08:59:44 +02:00
|
|
|
|
# else /*!HAVE_SETENV*/
|
2016-10-20 16:45:18 +02:00
|
|
|
|
if (! getenv (name) || overwrite)
|
2014-11-11 15:14:31 +01:00
|
|
|
|
{
|
2016-10-20 16:45:18 +02:00
|
|
|
|
char *buf;
|
|
|
|
|
|
|
|
|
|
(void)overwrite;
|
|
|
|
|
if (!name || !value)
|
|
|
|
|
{
|
|
|
|
|
gpg_err_set_errno (EINVAL);
|
|
|
|
|
return -1;
|
|
|
|
|
}
|
2016-10-25 08:59:44 +02:00
|
|
|
|
buf = strconcat (name, "=", value, NULL);
|
2016-10-20 16:45:18 +02:00
|
|
|
|
if (!buf)
|
|
|
|
|
return -1;
|
2016-10-25 08:59:44 +02:00
|
|
|
|
# if __GNUC__
|
|
|
|
|
# warning no setenv - using putenv but leaking memory.
|
|
|
|
|
# endif
|
2016-10-20 16:45:18 +02:00
|
|
|
|
return putenv (buf);
|
|
|
|
|
}
|
|
|
|
|
return 0;
|
2016-10-25 08:59:44 +02:00
|
|
|
|
# endif /*!HAVE_SETENV*/
|
|
|
|
|
#endif /*!W32CE*/
|
2010-04-14 13:24:02 +02:00
|
|
|
|
}
|
|
|
|
|
|
2014-11-11 15:14:31 +01:00
|
|
|
|
|
2011-02-04 12:57:53 +01:00
|
|
|
|
int
|
2010-04-14 13:24:02 +02:00
|
|
|
|
gnupg_unsetenv (const char *name)
|
|
|
|
|
{
|
|
|
|
|
#ifdef HAVE_W32CE_SYSTEM
|
|
|
|
|
(void)name;
|
|
|
|
|
return 0;
|
2016-10-25 08:59:44 +02:00
|
|
|
|
#else /*!W32CE*/
|
|
|
|
|
# ifdef HAVE_W32_SYSTEM
|
2016-10-20 16:45:18 +02:00
|
|
|
|
/* Windows maintains (at least) two sets of environment variables.
|
|
|
|
|
One set can be accessed by GetEnvironmentVariable and
|
|
|
|
|
SetEnvironmentVariable. This set is inherited by the children.
|
|
|
|
|
The other set is maintained in the C runtime, and is accessed
|
|
|
|
|
using getenv and putenv. We try to keep them in sync by
|
|
|
|
|
modifying both sets. */
|
2014-11-11 15:14:31 +01:00
|
|
|
|
if (!SetEnvironmentVariable (name, NULL))
|
|
|
|
|
{
|
|
|
|
|
gpg_err_set_errno (EINVAL); /* (Might also be ENOMEM.) */
|
|
|
|
|
return -1;
|
|
|
|
|
}
|
2016-10-25 08:59:44 +02:00
|
|
|
|
# endif /*W32*/
|
|
|
|
|
|
|
|
|
|
# ifdef HAVE_UNSETENV
|
2010-04-20 03:11:35 +02:00
|
|
|
|
return unsetenv (name);
|
2016-10-25 08:59:44 +02:00
|
|
|
|
# else /*!HAVE_UNSETENV*/
|
2016-10-20 16:45:18 +02:00
|
|
|
|
{
|
|
|
|
|
char *buf;
|
|
|
|
|
|
|
|
|
|
if (!name)
|
|
|
|
|
{
|
|
|
|
|
gpg_err_set_errno (EINVAL);
|
|
|
|
|
return -1;
|
|
|
|
|
}
|
|
|
|
|
buf = xtrystrdup (name);
|
|
|
|
|
if (!buf)
|
2014-11-11 15:14:31 +01:00
|
|
|
|
return -1;
|
2016-10-25 08:59:44 +02:00
|
|
|
|
# if __GNUC__
|
|
|
|
|
# warning no unsetenv - trying putenv but leaking memory.
|
|
|
|
|
# endif
|
2016-10-20 16:45:18 +02:00
|
|
|
|
return putenv (buf);
|
|
|
|
|
}
|
2016-10-25 08:59:44 +02:00
|
|
|
|
# endif /*!HAVE_UNSETENV*/
|
|
|
|
|
#endif /*!W32CE*/
|
2010-04-14 13:24:02 +02:00
|
|
|
|
}
|
2010-03-02 22:25:08 +01:00
|
|
|
|
|
2014-04-15 16:40:48 +02:00
|
|
|
|
|
|
|
|
|
/* Return the current working directory as a malloced string. Return
|
|
|
|
|
NULL and sets ERRNo on error. */
|
|
|
|
|
char *
|
|
|
|
|
gnupg_getcwd (void)
|
|
|
|
|
{
|
|
|
|
|
char *buffer;
|
|
|
|
|
size_t size = 100;
|
|
|
|
|
|
|
|
|
|
for (;;)
|
|
|
|
|
{
|
|
|
|
|
buffer = xtrymalloc (size+1);
|
|
|
|
|
if (!buffer)
|
|
|
|
|
return NULL;
|
|
|
|
|
#ifdef HAVE_W32CE_SYSTEM
|
|
|
|
|
strcpy (buffer, "/"); /* Always "/". */
|
|
|
|
|
return buffer;
|
|
|
|
|
#else
|
|
|
|
|
if (getcwd (buffer, size) == buffer)
|
|
|
|
|
return buffer;
|
|
|
|
|
xfree (buffer);
|
|
|
|
|
if (errno != ERANGE)
|
|
|
|
|
return NULL;
|
|
|
|
|
size *= 2;
|
|
|
|
|
#endif
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
2010-04-14 16:39:16 +02:00
|
|
|
|
#ifdef HAVE_W32CE_SYSTEM
|
|
|
|
|
/* There is a isatty function declaration in cegcc but it does not
|
|
|
|
|
make sense, thus we redefine it. */
|
2011-02-04 12:57:53 +01:00
|
|
|
|
int
|
2010-04-14 16:39:16 +02:00
|
|
|
|
_gnupg_isatty (int fd)
|
|
|
|
|
{
|
|
|
|
|
(void)fd;
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
#endif
|
|
|
|
|
|
2010-03-02 22:25:08 +01:00
|
|
|
|
|
|
|
|
|
#ifdef HAVE_W32CE_SYSTEM
|
|
|
|
|
/* Replacement for getenv which takes care of the our use of getenv.
|
|
|
|
|
The code is not thread safe but we expect it to work in all cases
|
|
|
|
|
because it is called for the first time early enough. */
|
|
|
|
|
char *
|
|
|
|
|
_gnupg_getenv (const char *name)
|
|
|
|
|
{
|
2010-04-14 13:24:02 +02:00
|
|
|
|
static int initialized;
|
|
|
|
|
static char *assuan_debug;
|
2011-02-04 12:57:53 +01:00
|
|
|
|
|
2010-04-14 13:24:02 +02:00
|
|
|
|
if (!initialized)
|
|
|
|
|
{
|
2011-02-04 12:57:53 +01:00
|
|
|
|
assuan_debug = read_w32_registry_string (NULL,
|
2010-04-14 13:24:02 +02:00
|
|
|
|
"\\Software\\GNU\\libassuan",
|
|
|
|
|
"debug");
|
|
|
|
|
initialized = 1;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (!strcmp (name, "ASSUAN_DEBUG"))
|
|
|
|
|
return assuan_debug;
|
|
|
|
|
else
|
|
|
|
|
return NULL;
|
2010-03-02 22:25:08 +01:00
|
|
|
|
}
|
2010-04-14 13:24:02 +02:00
|
|
|
|
|
2010-03-02 22:25:08 +01:00
|
|
|
|
#endif /*HAVE_W32CE_SYSTEM*/
|
2014-03-07 09:46:44 +01:00
|
|
|
|
|
|
|
|
|
|
|
|
|
|
#ifdef HAVE_W32_SYSTEM
|
|
|
|
|
/* Return the user's security identifier from the current process. */
|
|
|
|
|
PSID
|
|
|
|
|
w32_get_user_sid (void)
|
|
|
|
|
{
|
|
|
|
|
int okay = 0;
|
|
|
|
|
HANDLE proc = NULL;
|
|
|
|
|
HANDLE token = NULL;
|
|
|
|
|
TOKEN_USER *user = NULL;
|
|
|
|
|
PSID sid = NULL;
|
|
|
|
|
DWORD tokenlen, sidlen;
|
|
|
|
|
|
|
|
|
|
proc = OpenProcess (PROCESS_QUERY_INFORMATION, FALSE, GetCurrentProcessId());
|
|
|
|
|
if (!proc)
|
|
|
|
|
goto leave;
|
|
|
|
|
|
|
|
|
|
if (!OpenProcessToken (proc, TOKEN_QUERY, &token))
|
|
|
|
|
goto leave;
|
|
|
|
|
|
|
|
|
|
if (!GetTokenInformation (token, TokenUser, NULL, 0, &tokenlen)
|
|
|
|
|
&& GetLastError() != ERROR_INSUFFICIENT_BUFFER)
|
|
|
|
|
goto leave;
|
|
|
|
|
|
|
|
|
|
user = xtrymalloc (tokenlen);
|
|
|
|
|
if (!user)
|
|
|
|
|
goto leave;
|
|
|
|
|
|
|
|
|
|
if (!GetTokenInformation (token, TokenUser, user, tokenlen, &tokenlen))
|
|
|
|
|
goto leave;
|
|
|
|
|
if (!IsValidSid (user->User.Sid))
|
|
|
|
|
goto leave;
|
|
|
|
|
sidlen = GetLengthSid (user->User.Sid);
|
|
|
|
|
sid = xtrymalloc (sidlen);
|
|
|
|
|
if (!sid)
|
|
|
|
|
goto leave;
|
|
|
|
|
if (!CopySid (sidlen, sid, user->User.Sid))
|
|
|
|
|
goto leave;
|
|
|
|
|
okay = 1;
|
|
|
|
|
|
|
|
|
|
leave:
|
|
|
|
|
xfree (user);
|
|
|
|
|
if (token)
|
|
|
|
|
CloseHandle (token);
|
|
|
|
|
if (proc)
|
|
|
|
|
CloseHandle (proc);
|
|
|
|
|
|
|
|
|
|
if (!okay)
|
|
|
|
|
{
|
|
|
|
|
xfree (sid);
|
|
|
|
|
sid = NULL;
|
|
|
|
|
}
|
|
|
|
|
return sid;
|
|
|
|
|
}
|
|
|
|
|
#endif /*HAVE_W32_SYSTEM*/
|
2016-10-15 21:35:05 +02:00
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
/* Support for inotify under Linux. */
|
|
|
|
|
|
2017-06-23 13:20:42 +02:00
|
|
|
|
/* Store a new inotify file handle for FNAME at R_FD or return an
|
|
|
|
|
* error code. This file descriptor watch the removal of FNAME. */
|
|
|
|
|
gpg_error_t
|
|
|
|
|
gnupg_inotify_watch_delete_self (int *r_fd, const char *fname)
|
|
|
|
|
{
|
|
|
|
|
#if HAVE_INOTIFY_INIT
|
|
|
|
|
gpg_error_t err;
|
|
|
|
|
int fd;
|
|
|
|
|
|
|
|
|
|
*r_fd = -1;
|
|
|
|
|
|
|
|
|
|
if (!fname)
|
|
|
|
|
return my_error (GPG_ERR_INV_VALUE);
|
|
|
|
|
|
|
|
|
|
fd = inotify_init ();
|
|
|
|
|
if (fd == -1)
|
|
|
|
|
return my_error_from_syserror ();
|
|
|
|
|
|
|
|
|
|
if (inotify_add_watch (fd, fname, IN_DELETE_SELF) == -1)
|
|
|
|
|
{
|
|
|
|
|
err = my_error_from_syserror ();
|
|
|
|
|
close (fd);
|
|
|
|
|
return err;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
*r_fd = fd;
|
|
|
|
|
return 0;
|
|
|
|
|
#else /*!HAVE_INOTIFY_INIT*/
|
|
|
|
|
|
|
|
|
|
(void)fname;
|
|
|
|
|
*r_fd = -1;
|
|
|
|
|
return my_error (GPG_ERR_NOT_SUPPORTED);
|
|
|
|
|
|
|
|
|
|
#endif /*!HAVE_INOTIFY_INIT*/
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
2016-10-15 21:35:05 +02:00
|
|
|
|
/* Store a new inotify file handle for SOCKET_NAME at R_FD or return
|
|
|
|
|
* an error code. */
|
|
|
|
|
gpg_error_t
|
|
|
|
|
gnupg_inotify_watch_socket (int *r_fd, const char *socket_name)
|
|
|
|
|
{
|
|
|
|
|
#if HAVE_INOTIFY_INIT
|
|
|
|
|
gpg_error_t err;
|
|
|
|
|
char *fname;
|
|
|
|
|
int fd;
|
|
|
|
|
char *p;
|
|
|
|
|
|
|
|
|
|
*r_fd = -1;
|
|
|
|
|
|
2016-10-26 05:55:07 +02:00
|
|
|
|
if (!socket_name)
|
2016-10-26 09:02:10 +02:00
|
|
|
|
return my_error (GPG_ERR_INV_VALUE);
|
2016-10-26 05:55:07 +02:00
|
|
|
|
|
2016-10-15 21:35:05 +02:00
|
|
|
|
fname = xtrystrdup (socket_name);
|
|
|
|
|
if (!fname)
|
|
|
|
|
return my_error_from_syserror ();
|
|
|
|
|
|
|
|
|
|
fd = inotify_init ();
|
|
|
|
|
if (fd == -1)
|
|
|
|
|
{
|
|
|
|
|
err = my_error_from_syserror ();
|
|
|
|
|
xfree (fname);
|
|
|
|
|
return err;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* We need to watch the directory for the file because there won't
|
|
|
|
|
* be an IN_DELETE_SELF for a socket file. To handle a removal of
|
|
|
|
|
* the directory we also watch the directory itself. */
|
|
|
|
|
p = strrchr (fname, '/');
|
|
|
|
|
if (p)
|
|
|
|
|
*p = 0;
|
|
|
|
|
if (inotify_add_watch (fd, fname,
|
|
|
|
|
(IN_DELETE|IN_DELETE_SELF|IN_EXCL_UNLINK)) == -1)
|
|
|
|
|
{
|
|
|
|
|
err = my_error_from_syserror ();
|
|
|
|
|
close (fd);
|
|
|
|
|
xfree (fname);
|
|
|
|
|
return err;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
xfree (fname);
|
|
|
|
|
|
|
|
|
|
*r_fd = fd;
|
|
|
|
|
return 0;
|
|
|
|
|
#else /*!HAVE_INOTIFY_INIT*/
|
|
|
|
|
|
|
|
|
|
(void)socket_name;
|
|
|
|
|
*r_fd = -1;
|
|
|
|
|
return my_error (GPG_ERR_NOT_SUPPORTED);
|
|
|
|
|
|
|
|
|
|
#endif /*!HAVE_INOTIFY_INIT*/
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
/* Read an inotify event and return true if it matches NAME or if it
|
|
|
|
|
* sees an IN_DELETE_SELF event for the directory of NAME. */
|
|
|
|
|
int
|
|
|
|
|
gnupg_inotify_has_name (int fd, const char *name)
|
|
|
|
|
{
|
|
|
|
|
#if USE_NPTH && HAVE_INOTIFY_INIT
|
2016-10-27 03:16:48 +02:00
|
|
|
|
#define BUFSIZE_FOR_INOTIFY (sizeof (struct inotify_event) + 255 + 1)
|
2016-10-27 08:37:47 +02:00
|
|
|
|
union {
|
|
|
|
|
struct inotify_event ev;
|
|
|
|
|
char _buf[sizeof (struct inotify_event) + 255 + 1];
|
|
|
|
|
} buf;
|
|
|
|
|
struct inotify_event *evp;
|
2016-10-15 21:35:05 +02:00
|
|
|
|
int n;
|
|
|
|
|
|
2016-10-27 08:37:47 +02:00
|
|
|
|
n = npth_read (fd, &buf, sizeof buf);
|
2016-10-15 21:35:05 +02:00
|
|
|
|
/* log_debug ("notify read: n=%d\n", n); */
|
2016-10-27 08:37:47 +02:00
|
|
|
|
evp = &buf.ev;
|
2016-10-15 21:35:05 +02:00
|
|
|
|
while (n >= sizeof (struct inotify_event))
|
|
|
|
|
{
|
|
|
|
|
/* log_debug (" mask=%x len=%u name=(%s)\n", */
|
2016-10-27 08:37:47 +02:00
|
|
|
|
/* evp->mask, (unsigned int)evp->len, evp->len? evp->name:""); */
|
|
|
|
|
if ((evp->mask & IN_UNMOUNT))
|
2016-10-15 21:35:05 +02:00
|
|
|
|
{
|
|
|
|
|
/* log_debug (" found (dir unmounted)\n"); */
|
|
|
|
|
return 3; /* Directory was unmounted. */
|
|
|
|
|
}
|
2016-10-27 08:37:47 +02:00
|
|
|
|
if ((evp->mask & IN_DELETE_SELF))
|
2016-10-15 21:35:05 +02:00
|
|
|
|
{
|
|
|
|
|
/* log_debug (" found (dir removed)\n"); */
|
|
|
|
|
return 2; /* Directory was removed. */
|
|
|
|
|
}
|
2016-10-27 08:37:47 +02:00
|
|
|
|
if ((evp->mask & IN_DELETE))
|
2016-10-15 21:35:05 +02:00
|
|
|
|
{
|
2016-10-27 08:37:47 +02:00
|
|
|
|
if (evp->len >= strlen (name) && !strcmp (evp->name, name))
|
2016-10-15 21:35:05 +02:00
|
|
|
|
{
|
|
|
|
|
/* log_debug (" found (file removed)\n"); */
|
|
|
|
|
return 1; /* File was removed. */
|
|
|
|
|
}
|
|
|
|
|
}
|
2016-10-27 08:37:47 +02:00
|
|
|
|
n -= sizeof (*evp) + evp->len;
|
|
|
|
|
evp = (struct inotify_event *)(void *)
|
|
|
|
|
((char *)evp + sizeof (*evp) + evp->len);
|
2016-10-15 21:35:05 +02:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
#else /*!(USE_NPTH && HAVE_INOTIFY_INIT)*/
|
|
|
|
|
|
|
|
|
|
(void)fd;
|
|
|
|
|
(void)name;
|
|
|
|
|
|
|
|
|
|
#endif /*!(USE_NPTH && HAVE_INOTIFY_INIT)*/
|
|
|
|
|
|
|
|
|
|
return 0; /* Not found. */
|
|
|
|
|
}
|
2016-10-26 22:37:07 +02:00
|
|
|
|
|
|
|
|
|
|
|
|
|
|
/* Return a malloc'ed string that is the path to the passed
|
|
|
|
|
* unix-domain socket (or return NULL if this is not a valid
|
|
|
|
|
* unix-domain socket). We use a plain int here because it is only
|
|
|
|
|
* used on Linux.
|
|
|
|
|
*
|
|
|
|
|
* FIXME: This function needs to be moved to libassuan. */
|
|
|
|
|
#ifndef HAVE_W32_SYSTEM
|
|
|
|
|
char *
|
|
|
|
|
gnupg_get_socket_name (int fd)
|
|
|
|
|
{
|
|
|
|
|
struct sockaddr_un un;
|
|
|
|
|
socklen_t len = sizeof(un);
|
|
|
|
|
char *name = NULL;
|
|
|
|
|
|
|
|
|
|
if (getsockname (fd, (struct sockaddr*)&un, &len) != 0)
|
|
|
|
|
log_error ("could not getsockname(%d): %s\n", fd,
|
2016-10-27 09:13:36 +02:00
|
|
|
|
gpg_strerror (my_error_from_syserror ()));
|
2016-10-26 22:37:07 +02:00
|
|
|
|
else if (un.sun_family != AF_UNIX)
|
|
|
|
|
log_error ("file descriptor %d is not a unix-domain socket\n", fd);
|
|
|
|
|
else if (len <= offsetof (struct sockaddr_un, sun_path))
|
|
|
|
|
log_error ("socket name not present for file descriptor %d\n", fd);
|
|
|
|
|
else if (len > sizeof(un))
|
|
|
|
|
log_error ("socket name for file descriptor %d was truncated "
|
|
|
|
|
"(passed %zu bytes, wanted %u)\n", fd, sizeof(un), len);
|
|
|
|
|
else
|
|
|
|
|
{
|
|
|
|
|
size_t namelen = len - offsetof (struct sockaddr_un, sun_path);
|
|
|
|
|
|
2016-10-27 09:13:36 +02:00
|
|
|
|
/* log_debug ("file descriptor %d has path %s (%zu octets)\n", fd, */
|
|
|
|
|
/* un.sun_path, namelen); */
|
2016-10-26 22:37:07 +02:00
|
|
|
|
name = xtrymalloc (namelen + 1);
|
|
|
|
|
if (!name)
|
|
|
|
|
log_error ("failed to allocate memory for name of fd %d: %s\n",
|
2016-10-27 09:13:36 +02:00
|
|
|
|
fd, gpg_strerror (my_error_from_syserror ()));
|
2016-10-26 22:37:07 +02:00
|
|
|
|
else
|
|
|
|
|
{
|
|
|
|
|
memcpy (name, un.sun_path, namelen);
|
|
|
|
|
name[namelen] = 0;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return name;
|
|
|
|
|
}
|
|
|
|
|
#endif /*!HAVE_W32_SYSTEM*/
|
2017-02-08 13:49:41 +01:00
|
|
|
|
|
|
|
|
|
/* Check whether FD is valid. */
|
|
|
|
|
int
|
|
|
|
|
gnupg_fd_valid (int fd)
|
|
|
|
|
{
|
|
|
|
|
int d = dup (fd);
|
|
|
|
|
if (d < 0)
|
|
|
|
|
return 0;
|
|
|
|
|
close (d);
|
|
|
|
|
return 1;
|
|
|
|
|
}
|