1998-01-30 17:23:16 +01:00
|
|
|
/* status.c
|
2000-07-14 19:34:53 +02:00
|
|
|
* Copyright (C) 1998, 1999, 2000 Free Software Foundation, Inc.
|
1998-01-30 17:23:16 +01:00
|
|
|
*
|
1998-12-23 13:41:40 +01:00
|
|
|
* This file is part of GnuPG.
|
1998-01-30 17:23:16 +01:00
|
|
|
*
|
1998-12-23 13:41:40 +01:00
|
|
|
* GnuPG is free software; you can redistribute it and/or modify
|
1998-01-30 17:23:16 +01:00
|
|
|
* it under the terms of the GNU General Public License as published by
|
|
|
|
* the Free Software Foundation; either version 2 of the License, or
|
|
|
|
* (at your option) any later version.
|
|
|
|
*
|
1998-12-23 13:41:40 +01:00
|
|
|
* GnuPG is distributed in the hope that it will be useful,
|
1998-01-30 17:23:16 +01:00
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU General Public License
|
|
|
|
* along with this program; if not, write to the Free Software
|
|
|
|
* Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA
|
|
|
|
*/
|
|
|
|
|
|
|
|
#include <config.h>
|
|
|
|
#include <stdio.h>
|
|
|
|
#include <stdlib.h>
|
1998-02-03 13:09:20 +01:00
|
|
|
#include <string.h>
|
1998-07-31 18:45:58 +02:00
|
|
|
#include <errno.h>
|
1998-01-30 17:23:16 +01:00
|
|
|
#include <unistd.h>
|
1998-07-31 18:45:58 +02:00
|
|
|
#ifdef USE_SHM_COPROCESSING
|
1999-06-29 21:50:54 +02:00
|
|
|
#ifdef USE_CAPABILITIES
|
|
|
|
#include <sys/capability.h>
|
|
|
|
#endif
|
1998-07-31 18:45:58 +02:00
|
|
|
#ifdef HAVE_SYS_IPC_H
|
|
|
|
#include <sys/ipc.h>
|
|
|
|
#endif
|
|
|
|
#ifdef HAVE_SYS_SHM_H
|
|
|
|
#include <sys/shm.h>
|
|
|
|
#endif
|
1998-09-28 21:25:31 +02:00
|
|
|
#if defined(HAVE_MLOCK)
|
|
|
|
#include <sys/mman.h>
|
|
|
|
#endif
|
1998-07-31 18:45:58 +02:00
|
|
|
#endif
|
2000-07-14 19:34:53 +02:00
|
|
|
|
|
|
|
#include <gcrypt.h>
|
1998-07-31 18:45:58 +02:00
|
|
|
#include "util.h"
|
1998-01-30 17:23:16 +01:00
|
|
|
#include "status.h"
|
1998-07-31 18:45:58 +02:00
|
|
|
#include "ttyio.h"
|
|
|
|
#include "options.h"
|
|
|
|
#include "main.h"
|
1998-08-08 21:27:00 +02:00
|
|
|
#include "i18n.h"
|
1998-01-30 17:23:16 +01:00
|
|
|
|
|
|
|
static int fd = -1;
|
1998-07-31 18:45:58 +02:00
|
|
|
#ifdef USE_SHM_COPROCESSING
|
|
|
|
static int shm_id = -1;
|
|
|
|
static volatile char *shm_area;
|
|
|
|
static size_t shm_size;
|
|
|
|
static int shm_is_locked;
|
|
|
|
#endif /*USE_SHM_COPROCESSING*/
|
1998-01-30 17:23:16 +01:00
|
|
|
|
2000-07-14 19:34:53 +02:00
|
|
|
|
|
|
|
static void
|
|
|
|
progress_cb ( void *ctx, int c )
|
|
|
|
{
|
|
|
|
char buf[50];
|
|
|
|
|
|
|
|
if ( c == '\n' )
|
|
|
|
sprintf ( buf, "%.20s X 100 100", (char*)ctx );
|
|
|
|
else
|
|
|
|
sprintf ( buf, "%.20s %c 0 0", (char*)ctx, c );
|
|
|
|
write_status_text ( STATUS_PROGRESS, buf );
|
|
|
|
}
|
|
|
|
|
|
|
|
|
1998-01-30 17:23:16 +01:00
|
|
|
void
|
1998-07-31 18:45:58 +02:00
|
|
|
set_status_fd ( int newfd )
|
1998-01-30 17:23:16 +01:00
|
|
|
{
|
|
|
|
fd = newfd;
|
2000-07-14 19:34:53 +02:00
|
|
|
if ( fd != -1 ) {
|
|
|
|
#warning fixme - progress functions
|
2000-10-04 13:16:19 +02:00
|
|
|
/* Has to be fixed in libgcrypt */
|
|
|
|
#if 0
|
2000-07-14 19:34:53 +02:00
|
|
|
register_primegen_progress ( progress_cb, "primegen" );
|
|
|
|
register_pk_dsa_progress ( progress_cb, "pk_dsa" );
|
|
|
|
register_pk_elg_progress ( progress_cb, "pk_elg" );
|
|
|
|
#endif
|
|
|
|
}
|
1998-01-30 17:23:16 +01:00
|
|
|
}
|
|
|
|
|
1999-01-09 16:06:59 +01:00
|
|
|
int
|
|
|
|
is_status_enabled()
|
|
|
|
{
|
|
|
|
return fd != -1;
|
|
|
|
}
|
1998-01-30 17:23:16 +01:00
|
|
|
|
|
|
|
void
|
1998-07-31 18:45:58 +02:00
|
|
|
write_status ( int no )
|
1998-03-09 22:44:06 +01:00
|
|
|
{
|
|
|
|
write_status_text( no, NULL );
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
1998-07-31 18:45:58 +02:00
|
|
|
write_status_text ( int no, const char *text)
|
1998-01-30 17:23:16 +01:00
|
|
|
{
|
|
|
|
const char *s;
|
|
|
|
|
|
|
|
if( fd == -1 )
|
|
|
|
return; /* not enabled */
|
|
|
|
|
|
|
|
switch( no ) {
|
|
|
|
case STATUS_ENTER : s = "ENTER\n"; break;
|
|
|
|
case STATUS_LEAVE : s = "LEAVE\n"; break;
|
|
|
|
case STATUS_ABORT : s = "ABORT\n"; break;
|
|
|
|
case STATUS_GOODSIG: s = "GOODSIG\n"; break;
|
1998-06-25 12:19:08 +02:00
|
|
|
case STATUS_SIGEXPIRED: s = "SIGEXPIRED\n"; break;
|
1998-07-09 15:37:17 +02:00
|
|
|
case STATUS_KEYREVOKED: s = "KEYREVOKED\n"; break;
|
1998-01-30 17:23:16 +01:00
|
|
|
case STATUS_BADSIG : s = "BADSIG\n"; break;
|
|
|
|
case STATUS_ERRSIG : s = "ERRSIG\n"; break;
|
1998-02-04 19:54:31 +01:00
|
|
|
case STATUS_BADARMOR : s = "BADARMOR\n"; break;
|
1998-05-29 13:53:54 +02:00
|
|
|
case STATUS_RSA_OR_IDEA : s= "RSA_OR_IDEA\n"; break;
|
1998-07-09 15:37:17 +02:00
|
|
|
case STATUS_TRUST_UNDEFINED: s = "TRUST_UNDEFINED\n"; break;
|
|
|
|
case STATUS_TRUST_NEVER : s = "TRUST_NEVER\n"; break;
|
|
|
|
case STATUS_TRUST_MARGINAL : s = "TRUST_MARGINAL\n"; break;
|
|
|
|
case STATUS_TRUST_FULLY : s = "TRUST_FULLY\n"; break;
|
|
|
|
case STATUS_TRUST_ULTIMATE : s = "TRUST_ULTIMATE\n"; break;
|
2000-07-14 19:34:53 +02:00
|
|
|
case STATUS_GET_BOOL : s = "GET_BOOL\n"; break;
|
|
|
|
case STATUS_GET_LINE : s = "GET_LINE\n"; break;
|
|
|
|
case STATUS_GET_HIDDEN : s = "GET_HIDDEN\n"; break;
|
|
|
|
case STATUS_GOT_IT : s = "GOT_IT\n"; break;
|
1998-07-31 18:45:58 +02:00
|
|
|
case STATUS_SHM_INFO : s = "SHM_INFO\n"; break;
|
|
|
|
case STATUS_SHM_GET : s = "SHM_GET\n"; break;
|
|
|
|
case STATUS_SHM_GET_BOOL : s = "SHM_GET_BOOL\n"; break;
|
|
|
|
case STATUS_SHM_GET_HIDDEN : s = "SHM_GET_HIDDEN\n"; break;
|
1998-08-08 21:27:00 +02:00
|
|
|
case STATUS_NEED_PASSPHRASE: s = "NEED_PASSPHRASE\n"; break;
|
1999-01-09 16:06:59 +01:00
|
|
|
case STATUS_VALIDSIG : s = "VALIDSIG\n"; break;
|
1999-02-26 17:59:48 +01:00
|
|
|
case STATUS_SIG_ID : s = "SIG_ID\n"; break;
|
1999-03-17 13:13:04 +01:00
|
|
|
case STATUS_ENC_TO : s = "ENC_TO\n"; break;
|
|
|
|
case STATUS_NODATA : s = "NODATA\n"; break;
|
|
|
|
case STATUS_BAD_PASSPHRASE : s = "BAD_PASSPHRASE\n"; break;
|
|
|
|
case STATUS_NO_PUBKEY : s = "NO_PUBKEY\n"; break;
|
|
|
|
case STATUS_NO_SECKEY : s = "NO_SECKEY\n"; break;
|
1999-04-08 09:41:35 +02:00
|
|
|
case STATUS_NEED_PASSPHRASE_SYM: s = "NEED_PASSPHRASE_SYM\n"; break;
|
|
|
|
case STATUS_DECRYPTION_FAILED: s = "DECRYPTION_FAILED\n"; break;
|
1999-04-09 12:34:44 +02:00
|
|
|
case STATUS_DECRYPTION_OKAY: s = "DECRYPTION_OKAY\n"; break;
|
|
|
|
case STATUS_MISSING_PASSPHRASE: s = "MISSING_PASSPHRASE\n"; break;
|
|
|
|
case STATUS_GOOD_PASSPHRASE : s = "GOOD_PASSPHRASE\n"; break;
|
1999-04-26 17:53:01 +02:00
|
|
|
case STATUS_GOODMDC : s = "GOODMDC\n"; break;
|
|
|
|
case STATUS_BADMDC : s = "BADMDC\n"; break;
|
|
|
|
case STATUS_ERRMDC : s = "ERRMDC\n"; break;
|
1999-07-14 19:47:23 +02:00
|
|
|
case STATUS_IMPORTED : s = "IMPORTED\n"; break;
|
|
|
|
case STATUS_IMPORT_RES : s = "IMPORT_RES\n"; break;
|
2000-07-14 19:34:53 +02:00
|
|
|
case STATUS_FILE_START : s = "FILE_START\n"; break;
|
|
|
|
case STATUS_FILE_DONE : s = "FILE_DONE\n"; break;
|
|
|
|
case STATUS_FILE_ERROR : s = "FILE_ERROR\n"; break;
|
|
|
|
case STATUS_BEGIN_DECRYPTION:s = "BEGIN_DECRYPTION\n"; break;
|
|
|
|
case STATUS_END_DECRYPTION : s = "END_DECRYPTION\n"; break;
|
|
|
|
case STATUS_BEGIN_ENCRYPTION:s = "BEGIN_ENCRYPTION\n"; break;
|
|
|
|
case STATUS_END_ENCRYPTION : s = "END_ENCRYPTION\n"; break;
|
|
|
|
case STATUS_DELETE_PROBLEM : s = "DELETE_PROBLEM\n"; break;
|
|
|
|
case STATUS_PROGRESS : s = "PROGRESS\n"; break;
|
|
|
|
case STATUS_SIG_CREATED : s = "SIG_CREATED\n"; break;
|
1998-01-30 17:23:16 +01:00
|
|
|
default: s = "?\n"; break;
|
|
|
|
}
|
|
|
|
|
1998-05-29 13:53:54 +02:00
|
|
|
write( fd, "[GNUPG:] ", 9 );
|
1998-03-09 22:44:06 +01:00
|
|
|
if( text ) {
|
|
|
|
write( fd, s, strlen(s)-1 );
|
|
|
|
write( fd, " ", 1 );
|
|
|
|
write( fd, text, strlen(text) );
|
|
|
|
write( fd, "\n", 1 );
|
|
|
|
}
|
|
|
|
else
|
|
|
|
write( fd, s, strlen(s) );
|
1998-01-30 17:23:16 +01:00
|
|
|
}
|
|
|
|
|
1998-07-31 18:45:58 +02:00
|
|
|
|
|
|
|
#ifdef USE_SHM_COPROCESSING
|
1998-09-14 17:49:56 +02:00
|
|
|
|
|
|
|
#ifndef IPC_RMID_DEFERRED_RELEASE
|
|
|
|
static void
|
|
|
|
remove_shmid( void )
|
|
|
|
{
|
|
|
|
if( shm_id != -1 ) {
|
|
|
|
shmctl ( shm_id, IPC_RMID, 0);
|
|
|
|
shm_id = -1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
1998-07-31 18:45:58 +02:00
|
|
|
void
|
|
|
|
init_shm_coprocessing ( ulong requested_shm_size, int lock_mem )
|
|
|
|
{
|
|
|
|
char buf[100];
|
1998-09-14 17:49:56 +02:00
|
|
|
struct shmid_ds shmds;
|
1998-07-31 18:45:58 +02:00
|
|
|
|
1998-09-14 17:49:56 +02:00
|
|
|
#ifndef IPC_RMID_DEFERRED_RELEASE
|
|
|
|
atexit( remove_shmid );
|
|
|
|
#endif
|
1998-07-31 18:45:58 +02:00
|
|
|
requested_shm_size = (requested_shm_size + 4095) & ~4095;
|
|
|
|
if ( requested_shm_size > 2 * 4096 )
|
|
|
|
log_fatal("too much shared memory requested; only 8k are allowed\n");
|
|
|
|
shm_size = 4096 /* one page for us */ + requested_shm_size;
|
|
|
|
|
1998-08-05 18:51:59 +02:00
|
|
|
shm_id = shmget( IPC_PRIVATE, shm_size, IPC_CREAT | 0700 );
|
1998-07-31 18:45:58 +02:00
|
|
|
if ( shm_id == -1 )
|
|
|
|
log_fatal("can't get %uk of shared memory: %s\n",
|
|
|
|
(unsigned)shm_size/1024, strerror(errno));
|
2000-07-14 19:34:53 +02:00
|
|
|
|
|
|
|
#if !defined(IPC_HAVE_SHM_LOCK) \
|
|
|
|
&& defined(HAVE_MLOCK) && !defined(HAVE_BROKEN_MLOCK)
|
|
|
|
/* part of the old code which uses mlock */
|
1998-07-31 18:45:58 +02:00
|
|
|
shm_area = shmat( shm_id, 0, 0 );
|
|
|
|
if ( shm_area == (char*)-1 )
|
|
|
|
log_fatal("can't attach %uk shared memory: %s\n",
|
|
|
|
(unsigned)shm_size/1024, strerror(errno));
|
1998-11-10 13:59:59 +01:00
|
|
|
log_debug("mapped %uk shared memory at %p, id=%d\n",
|
1998-07-31 18:45:58 +02:00
|
|
|
(unsigned)shm_size/1024, shm_area, shm_id );
|
|
|
|
if( lock_mem ) {
|
1999-06-29 21:50:54 +02:00
|
|
|
#ifdef USE_CAPABILITIES
|
|
|
|
cap_set_proc( cap_from_text("cap_ipc_lock+ep") );
|
|
|
|
#endif
|
1998-12-10 20:20:47 +01:00
|
|
|
/* (need the cast for Solaris with Sun's workshop compilers) */
|
|
|
|
if ( mlock ( (char*)shm_area, shm_size) )
|
1998-09-28 21:25:31 +02:00
|
|
|
log_info("locking shared memory %d failed: %s\n",
|
|
|
|
shm_id, strerror(errno));
|
|
|
|
else
|
|
|
|
shm_is_locked = 1;
|
1999-06-29 21:50:54 +02:00
|
|
|
#ifdef USE_CAPABILITIES
|
|
|
|
cap_set_proc( cap_from_text("cap_ipc_lock+p") );
|
|
|
|
#endif
|
1998-07-31 18:45:58 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
#ifdef IPC_RMID_DEFERRED_RELEASE
|
1998-09-14 17:49:56 +02:00
|
|
|
if( shmctl( shm_id, IPC_RMID, 0) )
|
1998-07-31 18:45:58 +02:00
|
|
|
log_fatal("shmctl IPC_RMDID of %d failed: %s\n",
|
|
|
|
shm_id, strerror(errno));
|
|
|
|
#endif
|
|
|
|
|
1998-09-14 17:49:56 +02:00
|
|
|
if( shmctl( shm_id, IPC_STAT, &shmds ) )
|
|
|
|
log_fatal("shmctl IPC_STAT of %d failed: %s\n",
|
|
|
|
shm_id, strerror(errno));
|
|
|
|
if( shmds.shm_perm.uid != getuid() ) {
|
|
|
|
shmds.shm_perm.uid = getuid();
|
|
|
|
if( shmctl( shm_id, IPC_SET, &shmds ) )
|
|
|
|
log_fatal("shmctl IPC_SET of %d failed: %s\n",
|
|
|
|
shm_id, strerror(errno));
|
|
|
|
}
|
|
|
|
|
2000-07-14 19:34:53 +02:00
|
|
|
#else /* this is the new code which handles the changes in the SHM semantics
|
|
|
|
* introduced with Linux 2.4. The changes is that we now change the
|
|
|
|
* permissions and then attach to the memory.
|
|
|
|
*/
|
|
|
|
|
|
|
|
if( lock_mem ) {
|
|
|
|
#ifdef USE_CAPABILITIES
|
|
|
|
cap_set_proc( cap_from_text("cap_ipc_lock+ep") );
|
|
|
|
#endif
|
|
|
|
#ifdef IPC_HAVE_SHM_LOCK
|
|
|
|
if ( shmctl (shm_id, SHM_LOCK, 0) )
|
|
|
|
log_info("locking shared memory %d failed: %s\n",
|
|
|
|
shm_id, strerror(errno));
|
|
|
|
else
|
|
|
|
shm_is_locked = 1;
|
|
|
|
#else
|
|
|
|
log_info("Locking shared memory %d failed: No way to do it\n", shm_id );
|
|
|
|
#endif
|
|
|
|
#ifdef USE_CAPABILITIES
|
|
|
|
cap_set_proc( cap_from_text("cap_ipc_lock+p") );
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
|
|
|
if( shmctl( shm_id, IPC_STAT, &shmds ) )
|
|
|
|
log_fatal("shmctl IPC_STAT of %d failed: %s\n",
|
|
|
|
shm_id, strerror(errno));
|
|
|
|
if( shmds.shm_perm.uid != getuid() ) {
|
|
|
|
shmds.shm_perm.uid = getuid();
|
|
|
|
if( shmctl( shm_id, IPC_SET, &shmds ) )
|
|
|
|
log_fatal("shmctl IPC_SET of %d failed: %s\n",
|
|
|
|
shm_id, strerror(errno));
|
|
|
|
}
|
|
|
|
|
|
|
|
shm_area = shmat( shm_id, 0, 0 );
|
|
|
|
if ( shm_area == (char*)-1 )
|
|
|
|
log_fatal("can't attach %uk shared memory: %s\n",
|
|
|
|
(unsigned)shm_size/1024, strerror(errno));
|
|
|
|
log_debug("mapped %uk shared memory at %p, id=%d\n",
|
|
|
|
(unsigned)shm_size/1024, shm_area, shm_id );
|
|
|
|
|
|
|
|
#ifdef IPC_RMID_DEFERRED_RELEASE
|
|
|
|
if( shmctl( shm_id, IPC_RMID, 0) )
|
|
|
|
log_fatal("shmctl IPC_RMDID of %d failed: %s\n",
|
|
|
|
shm_id, strerror(errno));
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#endif
|
1998-07-31 18:45:58 +02:00
|
|
|
/* write info; Protocol version, id, size, locked size */
|
|
|
|
sprintf( buf, "pv=1 pid=%d shmid=%d sz=%u lz=%u", (int)getpid(),
|
|
|
|
shm_id, (unsigned)shm_size, shm_is_locked? (unsigned)shm_size:0 );
|
|
|
|
write_status_text( STATUS_SHM_INFO, buf );
|
|
|
|
}
|
|
|
|
|
|
|
|
/****************
|
|
|
|
* Request a string from client
|
|
|
|
* If bool, returns static string on true (do not free) or NULL for false
|
|
|
|
*/
|
|
|
|
static char *
|
|
|
|
do_shm_get( const char *keyword, int hidden, int bool )
|
|
|
|
{
|
|
|
|
size_t n;
|
|
|
|
byte *p;
|
|
|
|
char *string;
|
|
|
|
|
|
|
|
if( !shm_area )
|
|
|
|
BUG();
|
|
|
|
|
|
|
|
shm_area[0] = 0; /* msb of length of control block */
|
|
|
|
shm_area[1] = 32; /* and lsb */
|
|
|
|
shm_area[2] = 1; /* indicate that we are waiting on a reply */
|
|
|
|
shm_area[3] = 0; /* clear data available flag */
|
|
|
|
|
|
|
|
write_status_text( bool? STATUS_SHM_GET_BOOL :
|
|
|
|
hidden? STATUS_SHM_GET_HIDDEN : STATUS_SHM_GET, keyword );
|
|
|
|
|
|
|
|
do {
|
|
|
|
pause_on_sigusr(1);
|
|
|
|
if( shm_area[0] || shm_area[1] != 32 || shm_area[2] != 1 )
|
|
|
|
log_fatal("client modified shm control block - abort\n");
|
|
|
|
} while( !shm_area[3] );
|
|
|
|
shm_area[2] = 0; /* reset request flag */
|
|
|
|
p = (byte*)shm_area+32;
|
|
|
|
n = p[0] << 8 | p[1];
|
|
|
|
p += 2;
|
|
|
|
if( n+32+2+1 > 4095 )
|
|
|
|
log_fatal("client returns too large data (%u bytes)\n", (unsigned)n );
|
|
|
|
|
|
|
|
if( bool )
|
|
|
|
return p[0]? "" : NULL;
|
|
|
|
|
2000-01-24 12:55:49 +01:00
|
|
|
string = hidden? gcry_xmalloc_secure( n+1 ) : gcry_xmalloc( n+1 );
|
1998-07-31 18:45:58 +02:00
|
|
|
memcpy(string, p, n );
|
|
|
|
string[n] = 0; /* make sure it is a string */
|
|
|
|
if( hidden ) /* invalidate the memory */
|
|
|
|
memset( p, 0, n );
|
|
|
|
|
|
|
|
return string;
|
|
|
|
}
|
|
|
|
|
|
|
|
#endif /* USE_SHM_COPROCESSING */
|
|
|
|
|
1998-08-08 21:27:00 +02:00
|
|
|
|
2000-07-14 19:34:53 +02:00
|
|
|
/****************
|
|
|
|
* Request a string from the client over the command-fd
|
|
|
|
* If bool, returns static string on true (do not free) or NULL for false
|
|
|
|
*/
|
|
|
|
static char *
|
|
|
|
do_get_from_fd( const char *keyword, int hidden, int bool )
|
|
|
|
{
|
|
|
|
int i, len;
|
|
|
|
char *string;
|
|
|
|
|
|
|
|
write_status_text( bool? STATUS_GET_BOOL :
|
|
|
|
hidden? STATUS_GET_HIDDEN : STATUS_GET_LINE, keyword );
|
|
|
|
|
|
|
|
for( string = NULL, i = len = 200; ; i++ ) {
|
|
|
|
if( i >= len-1 ) {
|
|
|
|
char *save = string;
|
|
|
|
len += 100;
|
|
|
|
string = hidden? gcry_xmalloc_secure ( len ) : gcry_malloc ( len );
|
|
|
|
if( save )
|
|
|
|
memcpy(string, save, i );
|
|
|
|
else
|
|
|
|
i=0;
|
|
|
|
}
|
|
|
|
/* Hmmm: why not use our read_line function here */
|
2000-08-18 14:23:17 +02:00
|
|
|
if( read( opt.command_fd, string+i, 1) != 1 || string[i] == '\n' )
|
2000-07-14 19:34:53 +02:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
string[i] = 0;
|
|
|
|
|
|
|
|
write_status( STATUS_GOT_IT );
|
|
|
|
|
|
|
|
if( bool ) /* Fixme: is this correct??? */
|
|
|
|
return string[0] == 'Y' ? "" : NULL;
|
|
|
|
|
|
|
|
return string;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
1998-07-31 18:45:58 +02:00
|
|
|
|
|
|
|
int
|
|
|
|
cpr_enabled()
|
|
|
|
{
|
2000-07-14 19:34:53 +02:00
|
|
|
if( opt.command_fd != -1 )
|
|
|
|
return 1;
|
1998-07-31 18:45:58 +02:00
|
|
|
#ifdef USE_SHM_COPROCESSING
|
|
|
|
if( opt.shm_coprocess )
|
|
|
|
return 1;
|
|
|
|
#endif
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
char *
|
|
|
|
cpr_get( const char *keyword, const char *prompt )
|
|
|
|
{
|
1998-08-08 21:27:00 +02:00
|
|
|
char *p;
|
|
|
|
|
2000-07-14 19:34:53 +02:00
|
|
|
if( opt.command_fd != -1 )
|
|
|
|
return do_get_from_fd ( keyword, 0, 0 );
|
1998-07-31 18:45:58 +02:00
|
|
|
#ifdef USE_SHM_COPROCESSING
|
|
|
|
if( opt.shm_coprocess )
|
|
|
|
return do_shm_get( keyword, 0, 0 );
|
|
|
|
#endif
|
1998-08-08 21:27:00 +02:00
|
|
|
for(;;) {
|
|
|
|
p = tty_get( prompt );
|
1999-06-29 21:50:54 +02:00
|
|
|
if( *p=='?' && !p[1] && !(keyword && !*keyword)) {
|
2000-01-24 12:55:49 +01:00
|
|
|
gcry_free(p);
|
1998-11-27 12:42:49 +01:00
|
|
|
display_online_help( keyword );
|
1998-08-08 21:27:00 +02:00
|
|
|
}
|
|
|
|
else
|
|
|
|
return p;
|
|
|
|
}
|
1998-07-31 18:45:58 +02:00
|
|
|
}
|
|
|
|
|
1998-11-10 13:59:59 +01:00
|
|
|
char *
|
|
|
|
cpr_get_utf8( const char *keyword, const char *prompt )
|
|
|
|
{
|
|
|
|
char *p;
|
|
|
|
p = cpr_get( keyword, prompt );
|
|
|
|
if( p ) {
|
|
|
|
char *utf8 = native_to_utf8( p );
|
2000-01-24 12:55:49 +01:00
|
|
|
gcry_free( p );
|
1998-11-10 13:59:59 +01:00
|
|
|
p = utf8;
|
|
|
|
}
|
|
|
|
return p;
|
|
|
|
}
|
|
|
|
|
1998-07-31 18:45:58 +02:00
|
|
|
char *
|
|
|
|
cpr_get_hidden( const char *keyword, const char *prompt )
|
|
|
|
{
|
1998-08-08 21:27:00 +02:00
|
|
|
char *p;
|
|
|
|
|
2000-07-14 19:34:53 +02:00
|
|
|
if( opt.command_fd != -1 )
|
|
|
|
return do_get_from_fd ( keyword, 1, 0 );
|
1998-07-31 18:45:58 +02:00
|
|
|
#ifdef USE_SHM_COPROCESSING
|
|
|
|
if( opt.shm_coprocess )
|
|
|
|
return do_shm_get( keyword, 1, 0 );
|
|
|
|
#endif
|
1998-08-08 21:27:00 +02:00
|
|
|
for(;;) {
|
|
|
|
p = tty_get_hidden( prompt );
|
|
|
|
if( *p == '?' && !p[1] ) {
|
2000-01-24 12:55:49 +01:00
|
|
|
gcry_free(p);
|
1998-11-27 12:42:49 +01:00
|
|
|
display_online_help( keyword );
|
1998-08-08 21:27:00 +02:00
|
|
|
}
|
|
|
|
else
|
|
|
|
return p;
|
|
|
|
}
|
1998-07-31 18:45:58 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
cpr_kill_prompt(void)
|
|
|
|
{
|
2000-07-14 19:34:53 +02:00
|
|
|
if( opt.command_fd != -1 )
|
|
|
|
return;
|
1998-07-31 18:45:58 +02:00
|
|
|
#ifdef USE_SHM_COPROCESSING
|
|
|
|
if( opt.shm_coprocess )
|
|
|
|
return;
|
|
|
|
#endif
|
1998-12-10 20:20:47 +01:00
|
|
|
tty_kill_prompt();
|
|
|
|
return;
|
1998-07-31 18:45:58 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
int
|
|
|
|
cpr_get_answer_is_yes( const char *keyword, const char *prompt )
|
|
|
|
{
|
1998-08-11 19:29:34 +02:00
|
|
|
int yes;
|
|
|
|
char *p;
|
|
|
|
|
2000-07-14 19:34:53 +02:00
|
|
|
if( opt.command_fd != -1 )
|
|
|
|
return !!do_get_from_fd ( keyword, 0, 1 );
|
1998-07-31 18:45:58 +02:00
|
|
|
#ifdef USE_SHM_COPROCESSING
|
|
|
|
if( opt.shm_coprocess )
|
|
|
|
return !!do_shm_get( keyword, 0, 1 );
|
|
|
|
#endif
|
1998-08-11 19:29:34 +02:00
|
|
|
for(;;) {
|
|
|
|
p = tty_get( prompt );
|
|
|
|
trim_spaces(p); /* it is okay to do this here */
|
|
|
|
if( *p == '?' && !p[1] ) {
|
2000-01-24 12:55:49 +01:00
|
|
|
gcry_free(p);
|
1998-11-27 12:42:49 +01:00
|
|
|
display_online_help( keyword );
|
1998-08-11 19:29:34 +02:00
|
|
|
}
|
|
|
|
else {
|
|
|
|
tty_kill_prompt();
|
|
|
|
yes = answer_is_yes(p);
|
2000-01-24 12:55:49 +01:00
|
|
|
gcry_free(p);
|
1998-08-11 19:29:34 +02:00
|
|
|
return yes;
|
|
|
|
}
|
|
|
|
}
|
1998-07-31 18:45:58 +02:00
|
|
|
}
|
|
|
|
|
1999-05-27 09:45:46 +02:00
|
|
|
int
|
|
|
|
cpr_get_answer_yes_no_quit( const char *keyword, const char *prompt )
|
|
|
|
{
|
|
|
|
int yes;
|
|
|
|
char *p;
|
|
|
|
|
2000-07-14 19:34:53 +02:00
|
|
|
if( opt.command_fd != -1 )
|
|
|
|
return !!do_get_from_fd ( keyword, 0, 1 );
|
1999-05-27 09:45:46 +02:00
|
|
|
#ifdef USE_SHM_COPROCESSING
|
|
|
|
if( opt.shm_coprocess )
|
|
|
|
return !!do_shm_get( keyword, 0, 1 );
|
|
|
|
#endif
|
|
|
|
for(;;) {
|
|
|
|
p = tty_get( prompt );
|
|
|
|
trim_spaces(p); /* it is okay to do this here */
|
|
|
|
if( *p == '?' && !p[1] ) {
|
2000-01-24 12:55:49 +01:00
|
|
|
gcry_free(p);
|
1999-05-27 09:45:46 +02:00
|
|
|
display_online_help( keyword );
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
tty_kill_prompt();
|
|
|
|
yes = answer_is_yes_no_quit(p);
|
2000-01-24 12:55:49 +01:00
|
|
|
gcry_free(p);
|
1999-05-27 09:45:46 +02:00
|
|
|
return yes;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|