1
0
mirror of git://git.gnupg.org/gnupg.git synced 2024-12-23 10:29:58 +01:00
gnupg/g10/passphrase.c

1083 lines
27 KiB
C
Raw Normal View History

1997-11-18 14:06:00 +00:00
/* passphrase.c - Get a passphrase
* Copyright (C) 1998, 1999, 2000, 2001, 2002, 2003, 2004, 2005,
* 2006 Free Software Foundation, Inc.
1997-11-18 14:06:00 +00:00
*
* This file is part of GnuPG.
1997-11-18 14:06:00 +00:00
*
* GnuPG is free software; you can redistribute it and/or modify
1997-11-18 14:06:00 +00:00
* it under the terms of the GNU General Public License as published by
2007-10-23 10:48:09 +00:00
* the Free Software Foundation; either version 3 of the License, or
1997-11-18 14:06:00 +00:00
* (at your option) any later version.
*
* GnuPG is distributed in the hope that it will be useful,
1997-11-18 14:06:00 +00:00
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
2007-10-23 10:48:09 +00:00
* along with this program; if not, see <http://www.gnu.org/licenses/>.
1997-11-18 14:06:00 +00:00
*/
#include <config.h>
2002-06-29 13:46:34 +00:00
#include <stddef.h>
1997-11-18 14:06:00 +00:00
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
1998-01-16 21:15:24 +00:00
#include <unistd.h>
1997-11-18 14:06:00 +00:00
#include <assert.h>
2002-06-29 13:46:34 +00:00
#if !defined(HAVE_DOSISH_SYSTEM) && !defined(__riscos__)
#include <sys/socket.h>
#include <sys/un.h>
2002-06-29 13:46:34 +00:00
#endif
#if defined (_WIN32)
#include <windows.h>
2002-06-29 13:46:34 +00:00
#endif
#include <errno.h>
2002-06-29 13:46:34 +00:00
#ifdef HAVE_LOCALE_H
#include <locale.h>
#endif
#ifdef HAVE_LANGINFO_CODESET
#include <langinfo.h>
#endif
#include "util.h"
2002-06-29 13:46:34 +00:00
#include "memory.h"
1998-01-02 20:40:10 +00:00
#include "options.h"
1997-11-18 14:06:00 +00:00
#include "ttyio.h"
2002-06-29 13:46:34 +00:00
#include "cipher.h"
1997-12-20 17:23:29 +00:00
#include "keydb.h"
1998-05-15 18:49:19 +00:00
#include "main.h"
1998-05-29 11:53:54 +00:00
#include "i18n.h"
1998-08-08 19:27:00 +00:00
#include "status.h"
#ifdef ENABLE_AGENT_SUPPORT
#include "assuan.h"
#endif /*ENABLE_AGENT_SUPPORT*/
2002-06-29 13:46:34 +00:00
1998-09-28 19:25:31 +00:00
static char *fd_passwd = NULL;
1998-05-26 13:38:00 +00:00
static char *next_pw = NULL;
static char *last_pw = NULL;
1997-11-18 14:06:00 +00:00
1998-05-03 19:35:33 +00:00
static void hash_passphrase( DEK *dek, char *pw, STRING2KEY *s2k, int create );
1997-11-18 14:06:00 +00:00
1998-01-02 20:40:10 +00:00
int
1998-09-28 19:25:31 +00:00
have_static_passphrase()
1998-01-02 20:40:10 +00:00
{
if ( opt.use_agent )
return 0;
1998-09-28 19:25:31 +00:00
return !!fd_passwd;
1998-01-02 20:40:10 +00:00
}
1998-05-26 13:38:00 +00:00
/****************
* Set the passphrase to be used for the next query and only for the next
* one.
*/
void
set_next_passphrase( const char *s )
{
2005-07-27 18:10:56 +00:00
xfree(next_pw);
1998-05-26 13:38:00 +00:00
next_pw = NULL;
if( s ) {
2005-07-27 18:10:56 +00:00
next_pw = xmalloc_secure( strlen(s)+1 );
1998-05-26 13:38:00 +00:00
strcpy(next_pw, s );
}
}
/****************
* Get the last passphrase used in passphrase_to_dek.
* Note: This removes the passphrase from this modules and
* the caller must free the result. May return NULL:
*/
char *
get_last_passphrase()
{
char *p = last_pw;
last_pw = NULL;
return p;
}
/* As if we had used the passphrase - make it the last_pw. */
void
next_to_last_passphrase(void)
{
if(next_pw)
{
last_pw=next_pw;
next_pw=NULL;
}
}
/* Here's an interesting question: since this passphrase was passed in
on the command line, is there really any point in using secure
memory for it? I'm going with 'yes', since it doesn't hurt, and
might help in some small way (swapping). */
void
set_passphrase_from_string(const char *pass)
{
xfree( fd_passwd );
fd_passwd = xmalloc_secure(strlen(pass)+1);
strcpy(fd_passwd,pass);
1998-05-26 13:38:00 +00:00
}
1997-11-18 14:06:00 +00:00
1998-09-28 19:25:31 +00:00
void
read_passphrase_from_fd( int fd )
{
int i, len;
char *pw;
if ( opt.use_agent )
{ /* Not used but we have to do a dummy read, so that it won't end
up at the begin of the message if the quite usual trick to
prepend the passphtrase to the message is used. */
char buf[1];
1998-09-28 19:25:31 +00:00
while (!(read (fd, buf, 1) != 1 || *buf == '\n' ))
;
*buf = 0;
return;
}
if (!opt.batch )
1998-09-28 19:25:31 +00:00
tty_printf("Reading passphrase from file descriptor %d ...", fd );
for (pw = NULL, i = len = 100; ; i++ )
{
if (i >= len-1 )
{
char *pw2 = pw;
len += 100;
2005-07-27 18:10:56 +00:00
pw = xmalloc_secure( len );
if( pw2 )
{
memcpy(pw, pw2, i );
2005-07-27 18:10:56 +00:00
xfree (pw2);
}
else
i=0;
1998-09-28 19:25:31 +00:00
}
if (read( fd, pw+i, 1) != 1 || pw[i] == '\n' )
break;
1998-09-28 19:25:31 +00:00
}
pw[i] = 0;
if (!opt.batch)
tty_printf("\b\b\b \n" );
1998-09-28 19:25:31 +00:00
2005-07-27 18:10:56 +00:00
xfree( fd_passwd );
fd_passwd = pw;
1998-09-28 19:25:31 +00:00
}
2002-06-29 13:46:34 +00:00
#ifdef ENABLE_AGENT_SUPPORT
/* Send one option to the gpg-agent. */
2002-06-29 13:46:34 +00:00
static int
agent_send_option (assuan_context_t ctx, const char *name, const char *value)
2002-06-29 13:46:34 +00:00
{
char *line;
int rc;
2002-06-29 13:46:34 +00:00
if (!value || !*value)
return 0; /* Avoid sending empty option values. */
line = xmalloc (7 + strlen (name) + 1 + strlen (value) + 1);
strcpy (stpcpy (stpcpy (stpcpy (line, "OPTION "), name), "="), value);
rc = assuan_transact (ctx, line, NULL, NULL, NULL, NULL, NULL, NULL);
xfree (line);
return rc? -1 : 0;
2002-06-29 13:46:34 +00:00
}
/* Send all required options to the gpg-agent. */
2002-06-29 13:46:34 +00:00
static int
agent_send_all_options (assuan_context_t ctx)
2002-06-29 13:46:34 +00:00
{
char *dft_display = NULL;
const char *dft_ttyname = NULL;
2002-06-29 13:46:34 +00:00
char *dft_ttytype = NULL;
char *old_lc = NULL;
char *dft_lc = NULL;
int rc = 0;
dft_display = getenv ("DISPLAY");
if (opt.display || dft_display)
{
if (agent_send_option (ctx, "display",
2002-06-29 13:46:34 +00:00
opt.display ? opt.display : dft_display))
return -1;
}
if (!opt.ttyname)
{
const char *tmp;
dft_ttyname = getenv ("GPG_TTY");
if ((!dft_ttyname || !*dft_ttyname) && (tmp=ttyname (0)))
dft_ttyname = tmp;
if ((!dft_ttyname || !*dft_ttyname) && (tmp=tty_get_ttyname ()))
dft_ttyname = tmp;
}
2002-06-29 13:46:34 +00:00
if (opt.ttyname || dft_ttyname)
{
if (agent_send_option (ctx, "ttyname",
2002-06-29 13:46:34 +00:00
opt.ttyname ? opt.ttyname : dft_ttyname))
return -1;
}
dft_ttytype = getenv ("TERM");
if (opt.ttytype || (dft_ttyname && dft_ttytype))
{
if (agent_send_option (ctx, "ttytype",
2002-06-29 13:46:34 +00:00
opt.ttyname ? opt.ttytype : dft_ttytype))
return -1;
}
#if defined(HAVE_SETLOCALE) && defined(LC_CTYPE)
old_lc = setlocale (LC_CTYPE, NULL);
if (old_lc)
2005-07-27 18:10:56 +00:00
old_lc = xstrdup (old_lc);
2002-06-29 13:46:34 +00:00
dft_lc = setlocale (LC_CTYPE, "");
#endif
if (opt.lc_ctype || (dft_ttyname && dft_lc))
{
rc = agent_send_option (ctx, "lc-ctype",
2002-06-29 13:46:34 +00:00
opt.lc_ctype ? opt.lc_ctype : dft_lc);
}
#if defined(HAVE_SETLOCALE) && defined(LC_CTYPE)
if (old_lc)
{
setlocale (LC_CTYPE, old_lc);
2005-07-27 18:10:56 +00:00
xfree (old_lc);
2002-06-29 13:46:34 +00:00
}
#endif
if (rc)
return rc;
#if defined(HAVE_SETLOCALE) && defined(LC_MESSAGES)
old_lc = setlocale (LC_MESSAGES, NULL);
if (old_lc)
2005-07-27 18:10:56 +00:00
old_lc = xstrdup (old_lc);
2002-06-29 13:46:34 +00:00
dft_lc = setlocale (LC_MESSAGES, "");
#endif
if (opt.lc_messages || (dft_ttyname && dft_lc))
{
rc = agent_send_option (ctx, "lc-messages",
2002-06-29 13:46:34 +00:00
opt.lc_messages ? opt.lc_messages : dft_lc);
}
#if defined(HAVE_SETLOCALE) && defined(LC_MESSAGES)
if (old_lc)
{
setlocale (LC_MESSAGES, old_lc);
2005-07-27 18:10:56 +00:00
xfree (old_lc);
2002-06-29 13:46:34 +00:00
}
#endif
return rc;
}
#endif /*ENABLE_AGENT_SUPPORT*/
/*
* Open a connection to the agent and initializes the connection.
* Returns: -1 on error; on success an Assuan context for that
* connection is returned. With TRY set to true, no error messages
* are printed and the use of the agent won't get disabled on failure.
* If ORIG_CODESET is not NULL, the function will swithc the codeset
* back to that one before printing error messages.
*/
#ifdef ENABLE_AGENT_SUPPORT
assuan_context_t
agent_open (int try, const char *orig_codeset)
{
int rc;
assuan_context_t ctx;
char *infostr, *p;
int prot;
int pid;
2002-06-29 13:46:34 +00:00
if (opt.gpg_agent_info)
infostr = xstrdup (opt.gpg_agent_info);
else
{
infostr = getenv ( "GPG_AGENT_INFO" );
if (!infostr || !*infostr)
{
if (!try)
{
#ifdef ENABLE_NLS
if (orig_codeset)
bind_textdomain_codeset (PACKAGE, orig_codeset);
#endif /*ENABLE_NLS*/
2005-09-07 15:53:03 +00:00
log_info (_("gpg-agent is not available in this session\n"));
opt.use_agent = 0;
}
return NULL;
2002-06-29 13:46:34 +00:00
}
infostr = xstrdup ( infostr );
}
if ( !(p = strchr (infostr, PATHSEP_C)) || p == infostr)
{
if (!try)
{
#ifdef ENABLE_NLS
if (orig_codeset)
bind_textdomain_codeset (PACKAGE, orig_codeset);
#endif /*ENABLE_NLS*/
log_error ( _("malformed GPG_AGENT_INFO environment variable\n"));
opt.use_agent = 0;
}
xfree (infostr);
return NULL;
}
*p++ = 0;
pid = atoi (p);
while (*p && *p != PATHSEP_C)
p++;
prot = *p? atoi (p+1) : 0;
if (prot != 1)
{
if (!try)
{
#ifdef ENABLE_NLS
if (orig_codeset)
bind_textdomain_codeset (PACKAGE, orig_codeset);
#endif /*ENABLE_NLS*/
log_error (_("gpg-agent protocol version %d is not supported\n"),
prot);
opt.use_agent = 0;
}
xfree (infostr);
return NULL;
}
rc = assuan_socket_connect (&ctx, infostr, pid);
if (rc)
{
if (!try)
{
#ifdef ENABLE_NLS
if (orig_codeset)
bind_textdomain_codeset (PACKAGE, orig_codeset);
#endif /*ENABLE_NLS*/
2006-07-31 11:40:14 +00:00
log_info ( _("can't connect to `%s': %s\n"),
infostr, assuan_strerror (rc));
opt.use_agent = 0;
}
xfree (infostr );
return NULL;
2002-06-29 13:46:34 +00:00
}
xfree (infostr);
2002-06-29 13:46:34 +00:00
if (agent_send_all_options (ctx))
{
if (!try)
{
#ifdef ENABLE_NLS
if (orig_codeset)
bind_textdomain_codeset (PACKAGE, orig_codeset);
#endif /*ENABLE_NLS*/
log_error (_("problem with the agent - disabling agent use\n"));
opt.use_agent = 0;
}
assuan_disconnect (ctx);
return NULL;
}
2002-06-29 13:46:34 +00:00
return ctx;
}
#endif/*ENABLE_AGENT_SUPPORT*/
2002-06-29 13:46:34 +00:00
#ifdef ENABLE_AGENT_SUPPORT
void
agent_close (assuan_context_t ctx)
{
assuan_disconnect (ctx);
}
#endif /*ENABLE_AGENT_SUPPORT*/
/* Copy the text ATEXT into the buffer P and do plus '+' and percent
escaping. Note that the provided buffer needs to be 3 times the
size of ATEXT plus 1. Returns a pointer to the leading Nul in P. */
#ifdef ENABLE_AGENT_SUPPORT
static char *
percent_plus_escape (char *p, const char *atext)
{
const unsigned char *s;
for (s=atext; *s; s++)
{
if (*s < ' ' || *s == '+')
{
sprintf (p, "%%%02X", *s);
p += 3;
}
else if (*s == ' ')
*p++ = '+';
else
*p++ = *s;
}
*p = 0;
return p;
}
#endif /*ENABLE_AGENT_SUPPORT*/
#ifdef ENABLE_AGENT_SUPPORT
/* Object for the agent_okay_cb function. */
struct agent_okay_cb_s {
char *pw;
};
/* A callback used to get the passphrase from the okay line. See
agent-get_passphrase for details. LINE is the rest of the OK
status line without leading white spaces. */
static assuan_error_t
agent_okay_cb (void *opaque, const char *line)
{
struct agent_okay_cb_s *parm = opaque;
int i;
/* Note: If the malloc below fails we won't be able to wipe the
memory at LINE given the current implementation of the Assuan
code. There is no easy ay around this w/o adding a lot of more
memory function code to allow wiping arbitrary stuff on memory
failure. */
parm->pw = xmalloc_secure (strlen (line)/2+2);
for (i=0; hexdigitp (line) && hexdigitp (line+1); line += 2)
parm->pw[i++] = xtoi_2 (line);
parm->pw[i] = 0;
return 0;
}
#endif /*ENABLE_AGENT_SUPPORT*/
/*
* Ask the GPG Agent for the passphrase.
* Mode 0: Allow cached passphrase
* 1: No cached passphrase FIXME: Not really implemented
* 2: Ditto, but change the text to "repeat entry"
*
* Note that TRYAGAIN_TEXT must not be translated. If canceled is not
* NULL, the function does set it to 1 if the user canceled the
* operation. If CACHEID is not NULL, it will be used as the cacheID
* for the gpg-agent; if is NULL and a key fingerprint can be
* computed, this will be used as the cacheid.
*/
static char *
agent_get_passphrase ( u32 *keyid, int mode, const char *cacheid,
const char *tryagain_text,
const char *custom_description,
const char *custom_prompt, int *canceled)
{
#ifdef ENABLE_AGENT_SUPPORT
char *atext = NULL;
assuan_context_t ctx = NULL;
2002-06-29 13:46:34 +00:00
char *pw = NULL;
2005-07-27 18:10:56 +00:00
PKT_public_key *pk = xmalloc_clear( sizeof *pk );
2002-06-29 13:46:34 +00:00
byte fpr[MAX_FINGERPRINT_LEN];
int have_fpr = 0;
char *orig_codeset = NULL;
if (canceled)
*canceled = 0;
#if MAX_FINGERPRINT_LEN < 20
2002-06-29 13:46:34 +00:00
#error agent needs a 20 byte fingerprint
#endif
2002-06-29 13:46:34 +00:00
memset (fpr, 0, MAX_FINGERPRINT_LEN );
if( keyid && get_pubkey( pk, keyid ) )
{
if (pk)
free_public_key( pk );
pk = NULL; /* oops: no key for some reason */
}
2002-06-29 13:46:34 +00:00
#ifdef ENABLE_NLS
/* The Assuan agent protocol requires us to transmit utf-8 strings */
orig_codeset = bind_textdomain_codeset (PACKAGE, NULL);
#ifdef HAVE_LANGINFO_CODESET
if (!orig_codeset)
orig_codeset = nl_langinfo (CODESET);
#endif
if (orig_codeset)
{ /* We only switch when we are able to restore the codeset later. */
2005-07-27 18:10:56 +00:00
orig_codeset = xstrdup (orig_codeset);
if (!bind_textdomain_codeset (PACKAGE, "utf-8"))
orig_codeset = NULL;
}
#endif
if ( !(ctx = agent_open (0, orig_codeset)) )
goto failure;
if (custom_description)
atext = native_to_utf8 (custom_description);
else if ( !mode && pk && keyid )
2002-06-29 13:46:34 +00:00
{
char *uid;
size_t uidlen;
const char *algo_name = pubkey_algo_to_string ( pk->pubkey_algo );
const char *timestr;
char *maink;
if ( !algo_name )
algo_name = "?";
#define KEYIDSTRING _(" (main key ID %s)")
2005-07-27 18:10:56 +00:00
maink = xmalloc ( strlen (KEYIDSTRING) + keystrlen() + 20 );
2002-06-29 13:46:34 +00:00
if( keyid[2] && keyid[3] && keyid[0] != keyid[2]
&& keyid[1] != keyid[3] )
sprintf( maink, KEYIDSTRING, keystr(&keyid[2]) );
2002-06-29 13:46:34 +00:00
else
*maink = 0;
uid = get_user_id ( keyid, &uidlen );
2002-06-29 13:46:34 +00:00
timestr = strtimestamp (pk->timestamp);
#undef KEYIDSTRING
#define PROMPTSTRING _("You need a passphrase to unlock the secret" \
" key for user:\n" \
"\"%.*s\"\n" \
"%u-bit %s key, ID %s, created %s%s\n" )
2005-07-27 18:10:56 +00:00
atext = xmalloc ( 100 + strlen (PROMPTSTRING)
+ uidlen + 15 + strlen(algo_name) + keystrlen()
2002-06-29 13:46:34 +00:00
+ strlen (timestr) + strlen (maink) );
sprintf (atext, PROMPTSTRING,
(int)uidlen, uid,
nbits_from_pk (pk), algo_name, keystr(&keyid[0]), timestr,
2002-06-29 13:46:34 +00:00
maink );
2005-07-27 18:10:56 +00:00
xfree (uid);
xfree (maink);
#undef PROMPTSTRING
2002-06-29 13:46:34 +00:00
{
size_t dummy;
fingerprint_from_pk( pk, fpr, &dummy );
have_fpr = 1;
2002-06-29 13:46:34 +00:00
}
}
else if (mode == 2 )
2005-07-27 18:10:56 +00:00
atext = xstrdup ( _("Repeat passphrase\n") );
else
2005-07-27 18:10:56 +00:00
atext = xstrdup ( _("Enter passphrase\n") );
2002-06-29 13:46:34 +00:00
{
2002-06-29 13:46:34 +00:00
char *line, *p;
int i, rc;
struct agent_okay_cb_s okay_cb_parm;
2002-06-29 13:46:34 +00:00
if (!tryagain_text)
tryagain_text = "X";
else
tryagain_text = _(tryagain_text);
2002-06-29 13:46:34 +00:00
/* We allocate 23 times the needed space for thye texts so that
there is enough space for escaping. */
line = xmalloc (15 + 46
+ 3*strlen (atext)
+ 3*strlen (custom_prompt? custom_prompt:"")
+ (cacheid? (3*strlen (cacheid)): 0)
+ 3*strlen (tryagain_text)
+ 1);
2002-06-29 13:46:34 +00:00
strcpy (line, "GET_PASSPHRASE ");
p = line+15;
if (!mode && cacheid)
{
p = percent_plus_escape (p, cacheid);
}
else if (!mode && have_fpr)
2002-06-29 13:46:34 +00:00
{
for (i=0; i < 20; i++, p +=2 )
sprintf (p, "%02X", fpr[i]);
}
else
*p++ = 'X'; /* No caching. */
2002-06-29 13:46:34 +00:00
*p++ = ' ';
p = percent_plus_escape (p, tryagain_text);
2002-06-29 13:46:34 +00:00
*p++ = ' ';
/* The prompt. */
if (custom_prompt)
{
char *tmp = native_to_utf8 (custom_prompt);
p = percent_plus_escape (p, tmp);
xfree (tmp);
}
else
*p++ = 'X'; /* Use the standard prompt. */
2002-06-29 13:46:34 +00:00
*p++ = ' ';
/* Copy description. */
percent_plus_escape (p, atext);
/* Call gpg-agent. */
memset (&okay_cb_parm, 0, sizeof okay_cb_parm);
rc = assuan_transact2 (ctx, line, NULL, NULL, NULL, NULL, NULL, NULL,
agent_okay_cb, &okay_cb_parm);
xfree (line);
xfree (atext); atext = NULL;
if (!rc)
2002-06-29 13:46:34 +00:00
{
assert (okay_cb_parm.pw);
pw = okay_cb_parm.pw;
agent_close (ctx);
if (pk)
free_public_key( pk );
#ifdef ENABLE_NLS
if (orig_codeset)
bind_textdomain_codeset (PACKAGE, orig_codeset);
#endif
xfree (orig_codeset);
2002-06-29 13:46:34 +00:00
return pw;
}
else if (rc && (rc & 0xffff) == 99)
{
/* 99 is GPG_ERR_CANCELED. */
log_info (_("cancelled by user\n") );
if (canceled)
*canceled = 1;
}
2002-06-29 13:46:34 +00:00
else
{
log_error (_("problem with the agent - disabling agent use\n"));
opt.use_agent = 0;
}
}
2002-06-29 13:46:34 +00:00
2002-06-29 13:46:34 +00:00
failure:
#ifdef ENABLE_NLS
if (orig_codeset)
{
bind_textdomain_codeset (PACKAGE, orig_codeset);
xfree (orig_codeset);
}
#endif
xfree (atext);
agent_close (ctx);
xfree (pw );
if (pk)
free_public_key( pk );
#endif /*ENABLE_AGENT_SUPPORT*/
2002-06-29 13:46:34 +00:00
return NULL;
}
/*
* Clear the cached passphrase. If CACHEID is not NULL, it will be
* used instead of a cache ID derived from KEYID.
*/
void
passphrase_clear_cache ( u32 *keyid, const char *cacheid, int algo )
{
#ifdef ENABLE_AGENT_SUPPORT
assuan_context_t ctx = NULL;
2002-06-29 13:46:34 +00:00
PKT_public_key *pk;
byte fpr[MAX_FINGERPRINT_LEN];
#if MAX_FINGERPRINT_LEN < 20
#error agent needs a 20 byte fingerprint
#endif
2002-06-29 13:46:34 +00:00
if (!opt.use_agent)
return;
if (!cacheid)
{
pk = xcalloc (1, sizeof *pk);
memset (fpr, 0, MAX_FINGERPRINT_LEN );
if( !keyid || get_pubkey( pk, keyid ) )
{
goto failure; /* oops: no key for some reason */
}
2002-06-29 13:46:34 +00:00
{
size_t dummy;
fingerprint_from_pk( pk, fpr, &dummy );
}
}
else
pk = NULL;
if ( !(ctx = agent_open (0, NULL)) )
2002-06-29 13:46:34 +00:00
goto failure;
{
2002-06-29 13:46:34 +00:00
char *line, *p;
int i, rc;
2002-06-29 13:46:34 +00:00
if (cacheid)
{
line = xmalloc (17 + 3*strlen (cacheid) + 2);
strcpy (line, "CLEAR_PASSPHRASE ");
p = line+17;
p = percent_plus_escape (p, cacheid);
}
else
{
line = xmalloc (17 + 40 + 2);
strcpy (line, "CLEAR_PASSPHRASE ");
p = line+17;
for (i=0; i < 20; i++, p +=2 )
sprintf (p, "%02X", fpr[i]);
}
*p = 0;
rc = assuan_transact (ctx, line, NULL, NULL, NULL, NULL, NULL, NULL);
xfree (line);
if (rc)
2002-06-29 13:46:34 +00:00
{
log_error (_("problem with the agent - disabling agent use\n"));
opt.use_agent = 0;
}
}
2002-06-29 13:46:34 +00:00
failure:
agent_close (ctx);
if (pk)
free_public_key( pk );
#endif /*ENABLE_AGENT_SUPPORT*/
}
1997-11-18 14:06:00 +00:00
/****************
* Ask for a passphrase and return that string.
1997-11-18 14:06:00 +00:00
*/
char *
ask_passphrase (const char *description,
const char *tryagain_text,
const char *promptid,
const char *prompt,
const char *cacheid, int *canceled)
{
char *pw = NULL;
if (canceled)
*canceled = 0;
if (!opt.batch && description)
{
if (strchr (description, '%'))
{
char *tmp = unescape_percent_string (description);
tty_printf ("\n%s\n", tmp);
xfree (tmp);
}
else
tty_printf ("\n%s\n",description);
}
agent_died:
if ( opt.use_agent )
{
pw = agent_get_passphrase (NULL, 0, cacheid,
tryagain_text, description, prompt,
canceled );
if (!pw)
{
if (!opt.use_agent)
goto agent_died;
pw = NULL;
}
}
else if (fd_passwd)
{
2005-07-27 18:10:56 +00:00
pw = xmalloc_secure (strlen(fd_passwd)+1);
strcpy (pw, fd_passwd);
}
else if (opt.batch)
{
log_error(_("can't query passphrase in batch mode\n"));
pw = NULL;
}
else {
if (tryagain_text)
tty_printf(_("%s.\n"), tryagain_text);
pw = cpr_get_hidden(promptid? promptid : "passphrase.ask",
prompt?prompt : _("Enter passphrase: ") );
tty_kill_prompt();
}
if (!pw || !*pw)
write_status( STATUS_MISSING_PASSPHRASE );
return pw;
}
/* Return a new DEK object Using the string-to-key sepcifier S2K. Use
* KEYID and PUBKEY_ALGO to prompt the user.
MODE 0: Allow cached passphrase
1: Ignore cached passphrase
2: Ditto, but change the text to "repeat entry"
*/
1997-11-18 14:06:00 +00:00
DEK *
passphrase_to_dek( u32 *keyid, int pubkey_algo,
2002-06-29 13:46:34 +00:00
int cipher_algo, STRING2KEY *s2k, int mode,
const char *tryagain_text, int *canceled)
1997-11-18 14:06:00 +00:00
{
1998-05-26 13:38:00 +00:00
char *pw = NULL;
1997-11-18 14:06:00 +00:00
DEK *dek;
1998-05-04 18:49:26 +00:00
STRING2KEY help_s2k;
if (canceled)
*canceled = 0;
1998-05-04 18:49:26 +00:00
if( !s2k ) {
2002-06-29 13:46:34 +00:00
/* This is used for the old rfc1991 mode
* Note: This must match the code in encode.c with opt.rfc1991 set */
1998-05-04 18:49:26 +00:00
s2k = &help_s2k;
s2k->mode = 0;
s2k->hash_algo = S2K_DIGEST_ALGO;
1998-05-04 18:49:26 +00:00
}
1997-11-18 14:06:00 +00:00
/* If we do not have a passphrase available in NEXT_PW and status
information are request, we print them now. */
if( !next_pw && is_status_enabled() ) {
char buf[50];
if( keyid ) {
2002-06-29 13:46:34 +00:00
u32 used_kid[2];
char *us;
if( keyid[2] && keyid[3] ) {
used_kid[0] = keyid[2];
used_kid[1] = keyid[3];
}
else {
used_kid[0] = keyid[0];
used_kid[1] = keyid[1];
}
us = get_long_user_id_string( keyid );
write_status_text( STATUS_USERID_HINT, us );
2005-07-27 18:10:56 +00:00
xfree(us);
2002-06-29 13:46:34 +00:00
sprintf( buf, "%08lX%08lX %08lX%08lX %d 0",
(ulong)keyid[0], (ulong)keyid[1],
(ulong)used_kid[0], (ulong)used_kid[1],
pubkey_algo );
write_status_text( STATUS_NEED_PASSPHRASE, buf );
}
else {
sprintf( buf, "%d %d %d", cipher_algo, s2k->mode, s2k->hash_algo );
write_status_text( STATUS_NEED_PASSPHRASE_SYM, buf );
}
}
/* If we do have a keyID, we do not have a passphrase available in
NEXT_PW, we are not running in batch mode and we do not want to
ignore the passphrase cache (mode!=1), print a prompt with
information on that key. */
if( keyid && !opt.batch && !next_pw && mode!=1 ) {
2005-07-27 18:10:56 +00:00
PKT_public_key *pk = xmalloc_clear( sizeof *pk );
1998-05-29 11:53:54 +00:00
char *p;
1997-12-20 17:23:29 +00:00
p=get_user_id_native(keyid);
tty_printf("\n");
tty_printf(_("You need a passphrase to unlock the secret key for\n"
"user: \"%s\"\n"),p);
2005-07-27 18:10:56 +00:00
xfree(p);
1998-05-29 11:53:54 +00:00
1998-06-29 12:30:57 +00:00
if( !get_pubkey( pk, keyid ) ) {
2002-06-29 13:46:34 +00:00
const char *s = pubkey_algo_to_string( pk->pubkey_algo );
tty_printf( _("%u-bit %s key, ID %s, created %s"),
nbits_from_pk( pk ), s?s:"?", keystr(keyid),
1998-06-29 12:30:57 +00:00
strtimestamp(pk->timestamp) );
if( keyid[2] && keyid[3] && keyid[0] != keyid[2]
&& keyid[1] != keyid[3] )
{
if(keystrlen()>10)
{
tty_printf("\n");
tty_printf(_(" (subkey on main key ID %s)"),
keystr(&keyid[2]) );
}
else
tty_printf( _(" (main key ID %s)"), keystr(&keyid[2]) );
}
tty_printf("\n");
1998-05-29 11:53:54 +00:00
}
1998-05-29 11:53:54 +00:00
tty_printf("\n");
if (pk)
free_public_key( pk );
1997-11-18 14:06:00 +00:00
}
1998-08-08 19:27:00 +00:00
2002-06-29 13:46:34 +00:00
agent_died:
1998-05-26 13:38:00 +00:00
if( next_pw ) {
/* Simply return the passphrase we already have in NEXT_PW. */
1998-05-26 13:38:00 +00:00
pw = next_pw;
next_pw = NULL;
}
else if ( opt.use_agent ) {
/* Divert to the gpg-agent. */
pw = agent_get_passphrase ( keyid, mode == 2? 1: 0, NULL,
tryagain_text, NULL, NULL, canceled );
2002-06-29 13:46:34 +00:00
if (!pw)
{
if (!opt.use_agent)
goto agent_died;
2005-07-27 18:10:56 +00:00
pw = xstrdup ("");
2002-06-29 13:46:34 +00:00
}
if( *pw && mode == 2 )
{
int i;
for(i=0;i<opt.passwd_repeat;i++)
{
char *pw2 = agent_get_passphrase ( keyid, 2, NULL, NULL, NULL,
NULL, canceled );
if (!pw2)
{
if (!opt.use_agent)
{
xfree (pw);
pw = NULL;
goto agent_died;
}
pw2 = xstrdup ("");
}
if( strcmp(pw, pw2) )
{
xfree(pw2);
xfree(pw);
return NULL;
}
2005-07-27 18:10:56 +00:00
xfree(pw2);
}
}
}
1998-09-28 19:25:31 +00:00
else if( fd_passwd ) {
/* Return the passphrase we have store in FD_PASSWD. */
2005-07-27 18:10:56 +00:00
pw = xmalloc_secure( strlen(fd_passwd)+1 );
1998-09-28 19:25:31 +00:00
strcpy( pw, fd_passwd );
1997-11-18 14:06:00 +00:00
}
else if( opt.batch )
{
log_error(_("can't query passphrase in batch mode\n"));
2005-07-27 18:10:56 +00:00
pw = xstrdup( "" ); /* return an empty passphrase */
}
1998-01-02 20:40:10 +00:00
else {
/* Read the passphrase from the tty or the command-fd. */
pw = cpr_get_hidden("passphrase.enter", _("Enter passphrase: ") );
1998-01-02 20:40:10 +00:00
tty_kill_prompt();
if( mode == 2 && !cpr_enabled() )
{
int i;
for(i=0;i<opt.passwd_repeat;i++)
{
char *pw2 = cpr_get_hidden("passphrase.repeat",
_("Repeat passphrase: ") );
tty_kill_prompt();
if( strcmp(pw, pw2) )
{
xfree(pw2);
xfree(pw);
return NULL;
}
2005-07-27 18:10:56 +00:00
xfree(pw2);
}
}
1997-11-18 14:06:00 +00:00
}
if( !pw || !*pw )
write_status( STATUS_MISSING_PASSPHRASE );
/* Hash the passphrase and store it in a newly allocated DEK
object. Keep a copy of the passphrase in LAST_PW for use by
get_last_passphrase(). */
2005-07-27 18:10:56 +00:00
dek = xmalloc_secure_clear ( sizeof *dek );
1998-05-04 18:49:26 +00:00
dek->algo = cipher_algo;
if( !*pw && mode == 2 )
dek->keylen = 0;
1997-12-09 12:46:23 +00:00
else
1998-05-03 15:42:08 +00:00
hash_passphrase( dek, pw, s2k, mode==2 );
2005-07-27 18:10:56 +00:00
xfree(last_pw);
1998-05-26 13:38:00 +00:00
last_pw = pw;
1998-05-04 18:49:26 +00:00
return dek;
1997-11-18 14:06:00 +00:00
}
1998-05-03 15:42:08 +00:00
/****************
* Hash a passphrase using the supplied s2k. If create is true, create
1998-09-28 19:25:31 +00:00
* a new salt or what else must be filled into the s2k for a new key.
1998-05-03 15:42:08 +00:00
* always needs: dek->algo, s2k->mode, s2k->hash_algo.
*/
static void
hash_passphrase( DEK *dek, char *pw, STRING2KEY *s2k, int create )
1997-11-18 14:06:00 +00:00
{
2002-06-29 13:46:34 +00:00
MD_HANDLE md;
1998-09-28 19:25:31 +00:00
int pass, i;
int used = 0;
int pwlen = strlen(pw);
1997-11-18 14:06:00 +00:00
1998-05-03 15:42:08 +00:00
assert( s2k->hash_algo );
2002-06-29 13:46:34 +00:00
dek->keylen = cipher_get_keylen( dek->algo ) / 8;
1998-09-28 19:25:31 +00:00
if( !(dek->keylen > 0 && dek->keylen <= DIM(dek->key)) )
BUG();
2002-06-29 13:46:34 +00:00
md = md_open( s2k->hash_algo, 1);
1998-09-28 19:25:31 +00:00
for(pass=0; used < dek->keylen ; pass++ ) {
if( pass ) {
2002-09-10 08:40:12 +00:00
md_reset(md);
1998-09-28 19:25:31 +00:00
for(i=0; i < pass; i++ ) /* preset the hash context */
2002-06-29 13:46:34 +00:00
md_putc(md, 0 );
1998-09-28 19:25:31 +00:00
}
1998-08-05 18:30:53 +00:00
1998-09-28 19:25:31 +00:00
if( s2k->mode == 1 || s2k->mode == 3 ) {
int len2 = pwlen + 8;
ulong count = len2;
1998-08-05 18:30:53 +00:00
1998-09-28 19:25:31 +00:00
if( create && !pass ) {
2002-06-29 13:46:34 +00:00
randomize_buffer(s2k->salt, 8, 1);
1998-09-28 19:25:31 +00:00
if( s2k->mode == 3 )
s2k->count = opt.s2k_count;
1998-08-11 17:29:34 +00:00
}
1998-09-28 19:25:31 +00:00
if( s2k->mode == 3 ) {
count = S2K_DECODE_COUNT(s2k->count);
1998-09-28 19:25:31 +00:00
if( count < len2 )
count = len2;
}
/* a little bit complicated because we need a ulong for count */
while( count > len2 ) { /* maybe iterated+salted */
2002-06-29 13:46:34 +00:00
md_write( md, s2k->salt, 8 );
md_write( md, pw, pwlen );
1998-09-28 19:25:31 +00:00
count -= len2;
}
if( count < 8 )
2002-06-29 13:46:34 +00:00
md_write( md, s2k->salt, count );
1998-08-05 18:30:53 +00:00
else {
2002-06-29 13:46:34 +00:00
md_write( md, s2k->salt, 8 );
1998-08-05 18:30:53 +00:00
count -= 8;
2002-06-29 13:46:34 +00:00
md_write( md, pw, count );
1998-08-05 18:30:53 +00:00
}
}
1998-09-28 19:25:31 +00:00
else
2002-06-29 13:46:34 +00:00
md_write( md, pw, pwlen );
md_final( md );
i = md_digest_length( s2k->hash_algo );
1998-09-28 19:25:31 +00:00
if( i > dek->keylen - used )
i = dek->keylen - used;
2002-06-29 13:46:34 +00:00
memcpy( dek->key+used, md_read(md, s2k->hash_algo), i );
1998-09-28 19:25:31 +00:00
used += i;
1998-04-04 20:16:55 +00:00
}
2002-06-29 13:46:34 +00:00
md_close(md);
1997-11-18 14:06:00 +00:00
}