2003-08-05 19:11:04 +02:00
|
|
|
/* agent.h - Global definitions for the agent
|
2011-04-21 15:40:48 +02:00
|
|
|
* Copyright (C) 2001, 2002, 2003, 2005, 2011 Free Software Foundation, Inc.
|
2015-06-18 05:10:47 +02:00
|
|
|
* Copyright (C) 2015 g10 Code GmbH.
|
2003-08-05 19:11:04 +02:00
|
|
|
*
|
|
|
|
* This file is part of GnuPG.
|
|
|
|
*
|
|
|
|
* GnuPG is free software; you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU General Public License as published by
|
2007-07-04 21:49:40 +02:00
|
|
|
* the Free Software Foundation; either version 3 of the License, or
|
2003-08-05 19:11:04 +02:00
|
|
|
* (at your option) any later version.
|
|
|
|
*
|
|
|
|
* GnuPG is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU General Public License
|
2016-11-05 12:02:19 +01:00
|
|
|
* along with this program; if not, see <https://www.gnu.org/licenses/>.
|
2003-08-05 19:11:04 +02:00
|
|
|
*/
|
|
|
|
|
|
|
|
#ifndef AGENT_H
|
|
|
|
#define AGENT_H
|
|
|
|
|
|
|
|
#ifdef GPG_ERR_SOURCE_DEFAULT
|
|
|
|
#error GPG_ERR_SOURCE_DEFAULT already defined
|
|
|
|
#endif
|
|
|
|
#define GPG_ERR_SOURCE_DEFAULT GPG_ERR_SOURCE_GPGAGENT
|
|
|
|
#include <gpg-error.h>
|
2004-12-18 11:22:10 +01:00
|
|
|
#define map_assuan_err(a) \
|
|
|
|
map_assuan_err_with_source (GPG_ERR_SOURCE_DEFAULT, (a))
|
2003-08-05 19:11:04 +02:00
|
|
|
#include <errno.h>
|
2020-06-24 12:44:02 +02:00
|
|
|
#include <assuan.h>
|
2003-08-05 19:11:04 +02:00
|
|
|
|
|
|
|
#include <gcrypt.h>
|
|
|
|
#include "../common/util.h"
|
2007-10-01 16:48:39 +02:00
|
|
|
#include "../common/membuf.h"
|
|
|
|
#include "../common/sysutils.h" /* (gnupg_fd_t) */
|
2009-07-07 12:02:41 +02:00
|
|
|
#include "../common/session-env.h"
|
2013-02-06 12:49:52 +01:00
|
|
|
#include "../common/shareddefs.h"
|
2003-08-05 19:11:04 +02:00
|
|
|
|
2006-10-06 12:58:18 +02:00
|
|
|
/* To convey some special hash algorithms we use algorithm numbers
|
|
|
|
reserved for application use. */
|
2008-09-29 17:02:55 +02:00
|
|
|
#ifndef GCRY_MODULE_ID_USER
|
|
|
|
#define GCRY_MODULE_ID_USER 1024
|
2006-10-06 12:58:18 +02:00
|
|
|
#endif
|
2008-09-29 17:02:55 +02:00
|
|
|
#define MD_USER_TLS_MD5SHA1 (GCRY_MODULE_ID_USER+1)
|
2003-08-05 19:11:04 +02:00
|
|
|
|
2006-10-06 12:58:18 +02:00
|
|
|
/* Maximum length of a digest. */
|
2009-03-26 20:27:04 +01:00
|
|
|
#define MAX_DIGEST_LEN 64
|
2003-08-05 19:11:04 +02:00
|
|
|
|
2015-08-24 16:14:09 +02:00
|
|
|
/* The maximum length of a passphrase (in bytes). Note: this is
|
Spelling cleanup.
No functional changes, just fixing minor spelling issues.
---
Most of these were identified from the command line by running:
codespell \
--ignore-words-list fpr,stati,keyserver,keyservers,asign,cas,iff,ifset \
--skip '*.po,ChangeLog*,help.*.txt,*.jpg,*.eps,*.pdf,*.png,*.gpg,*.asc' \
doc g13 g10 kbx agent artwork scd tests tools am common dirmngr sm \
NEWS README README.maint TODO
Signed-off-by: Daniel Kahn Gillmor <dkg@fifthhorseman.net>
2020-02-18 15:34:42 +01:00
|
|
|
further constrained by the Assuan line length (and any other text on
|
2015-08-24 16:14:09 +02:00
|
|
|
the same line). However, the Assuan line length is 1k bytes so
|
|
|
|
this shouldn't be a problem in practice. */
|
|
|
|
#define MAX_PASSPHRASE_LEN 255
|
2011-03-03 18:35:08 +01:00
|
|
|
|
2020-06-24 12:44:02 +02:00
|
|
|
/* The daemons we support. When you add a new daemon, add to
|
|
|
|
both the daemon_type and the daemon_modules array in call-daemon.c */
|
|
|
|
enum daemon_type
|
|
|
|
{
|
|
|
|
DAEMON_SCD,
|
2021-03-09 22:50:29 +01:00
|
|
|
DAEMON_TPM2D,
|
2020-06-24 12:44:02 +02:00
|
|
|
DAEMON_MAX_TYPE
|
|
|
|
};
|
2011-03-03 18:35:08 +01:00
|
|
|
|
2003-08-05 19:11:04 +02:00
|
|
|
/* A large struct name "opt" to keep global flags */
|
2020-02-10 16:37:34 +01:00
|
|
|
EXTERN_UNLESS_MAIN_MODULE
|
2006-09-06 18:35:52 +02:00
|
|
|
struct
|
|
|
|
{
|
2005-02-03 18:40:02 +01:00
|
|
|
unsigned int debug; /* Debug flags (DBG_foo_VALUE) */
|
|
|
|
int verbose; /* Verbosity level */
|
|
|
|
int quiet; /* Be as quiet as possible */
|
|
|
|
int dry_run; /* Don't change any persistent data */
|
|
|
|
int batch; /* Batch mode */
|
2005-02-23 22:06:32 +01:00
|
|
|
|
2010-11-11 16:07:37 +01:00
|
|
|
/* True if we handle sigusr2. */
|
|
|
|
int sigusr2_enabled;
|
|
|
|
|
2011-12-05 10:54:59 +01:00
|
|
|
/* Environment settings gathered at program start or changed using the
|
2005-06-03 15:57:24 +02:00
|
|
|
Assuan command UPDATESTARTUPTTY. */
|
2009-07-07 12:02:41 +02:00
|
|
|
session_env_t startup_env;
|
2005-06-03 15:57:24 +02:00
|
|
|
char *startup_lc_ctype;
|
|
|
|
char *startup_lc_messages;
|
2005-02-23 22:06:32 +01:00
|
|
|
|
2015-05-11 10:23:24 +02:00
|
|
|
/* Enable pinentry debugging (--debug 1024 should also be used). */
|
|
|
|
int debug_pinentry;
|
|
|
|
|
2011-12-05 10:54:59 +01:00
|
|
|
/* Filename of the program to start as pinentry. */
|
|
|
|
const char *pinentry_program;
|
|
|
|
|
2020-06-24 12:44:02 +02:00
|
|
|
/* Filename of the program to handle daemon tasks. */
|
|
|
|
const char *daemon_program[DAEMON_MAX_TYPE];
|
2011-12-05 10:54:59 +01:00
|
|
|
|
2020-06-24 12:44:02 +02:00
|
|
|
int disable_daemon[DAEMON_MAX_TYPE]; /* Never use the daemon. */
|
2011-12-05 10:54:59 +01:00
|
|
|
|
2005-02-03 18:40:02 +01:00
|
|
|
int no_grab; /* Don't let the pinentry grab the keyboard */
|
2005-06-07 21:09:18 +02:00
|
|
|
|
2015-09-16 21:24:14 +02:00
|
|
|
/* The name of the file pinentry shall touch before exiting. If
|
|
|
|
this is not set the file name of the standard socket is used. */
|
2007-02-14 17:27:55 +01:00
|
|
|
const char *pinentry_touch_file;
|
|
|
|
|
2015-09-16 21:24:14 +02:00
|
|
|
/* A string where the first character is used by the pinentry as a
|
|
|
|
custom invisible character. */
|
|
|
|
char *pinentry_invisible_char;
|
|
|
|
|
2016-01-20 11:22:44 +01:00
|
|
|
/* The timeout value for the Pinentry in seconds. This is passed to
|
|
|
|
the pinentry if it is not 0. It is up to the pinentry to act
|
|
|
|
upon this timeout value. */
|
|
|
|
unsigned long pinentry_timeout;
|
|
|
|
|
2005-06-07 21:09:18 +02:00
|
|
|
/* The default and maximum TTL of cache entries. */
|
2005-06-16 10:12:03 +02:00
|
|
|
unsigned long def_cache_ttl; /* Default. */
|
|
|
|
unsigned long def_cache_ttl_ssh; /* for SSH. */
|
|
|
|
unsigned long max_cache_ttl; /* Default. */
|
|
|
|
unsigned long max_cache_ttl_ssh; /* for SSH. */
|
2003-08-05 19:11:04 +02:00
|
|
|
|
2007-09-14 15:38:36 +02:00
|
|
|
/* Flag disallowing bypassing of the warning. */
|
2007-08-27 20:10:27 +02:00
|
|
|
int enforce_passphrase_constraints;
|
2011-12-05 10:54:59 +01:00
|
|
|
|
2007-01-25 09:30:47 +01:00
|
|
|
/* The require minmum length of a passphrase. */
|
|
|
|
unsigned int min_passphrase_len;
|
2011-12-05 10:54:59 +01:00
|
|
|
|
2007-08-27 20:10:27 +02:00
|
|
|
/* The minimum number of non-alpha characters in a passphrase. */
|
|
|
|
unsigned int min_passphrase_nonalpha;
|
2011-12-05 10:54:59 +01:00
|
|
|
|
2007-08-27 20:10:27 +02:00
|
|
|
/* File name with a patternfile or NULL if not enabled. */
|
|
|
|
const char *check_passphrase_pattern;
|
2011-12-05 10:54:59 +01:00
|
|
|
|
2007-08-28 19:48:13 +02:00
|
|
|
/* If not 0 the user is asked to change his passphrase after these
|
|
|
|
number of days. */
|
|
|
|
unsigned int max_passphrase_days;
|
2011-12-05 10:54:59 +01:00
|
|
|
|
2007-08-28 19:48:13 +02:00
|
|
|
/* If set, a passphrase history will be written and checked at each
|
|
|
|
passphrase change. */
|
2016-10-28 21:06:11 +02:00
|
|
|
int enable_passphrase_history;
|
2005-06-07 21:09:18 +02:00
|
|
|
|
2019-03-06 17:58:39 +01:00
|
|
|
/* If set the extended key format is used for new keys. Note that
|
Spelling cleanup.
No functional changes, just fixing minor spelling issues.
---
Most of these were identified from the command line by running:
codespell \
--ignore-words-list fpr,stati,keyserver,keyservers,asign,cas,iff,ifset \
--skip '*.po,ChangeLog*,help.*.txt,*.jpg,*.eps,*.pdf,*.png,*.gpg,*.asc' \
doc g13 g10 kbx agent artwork scd tests tools am common dirmngr sm \
NEWS README README.maint TODO
Signed-off-by: Daniel Kahn Gillmor <dkg@fifthhorseman.net>
2020-02-18 15:34:42 +01:00
|
|
|
* this may have the value 2 in which case
|
2019-03-06 17:58:39 +01:00
|
|
|
* --disable-extended-key-format won't have any effect and thus
|
|
|
|
* effectivley locking it. This is required to support existing
|
|
|
|
* profiles which lock the use of --enable-extended-key-format. */
|
2017-03-24 10:30:17 +01:00
|
|
|
int enable_extended_key_format;
|
|
|
|
|
2005-02-03 18:40:02 +01:00
|
|
|
int running_detached; /* We are running detached from the tty. */
|
2003-08-05 19:11:04 +02:00
|
|
|
|
2011-12-05 10:54:59 +01:00
|
|
|
/* If this global option is true, the passphrase cache is ignored
|
|
|
|
for signing operations. */
|
2003-08-05 19:11:04 +02:00
|
|
|
int ignore_cache_for_signing;
|
2011-12-05 10:54:59 +01:00
|
|
|
|
|
|
|
/* If this global option is true, the user is allowed to
|
|
|
|
interactively mark certificate in trustlist.txt as trusted. */
|
2004-05-03 15:37:38 +02:00
|
|
|
int allow_mark_trusted;
|
2011-12-05 10:54:59 +01:00
|
|
|
|
|
|
|
/* If this global option is true, the Assuan command
|
|
|
|
PRESET_PASSPHRASE is allowed. */
|
2004-12-21 20:05:15 +01:00
|
|
|
int allow_preset_passphrase;
|
2011-12-05 10:54:59 +01:00
|
|
|
|
|
|
|
/* If this global option is true, the Assuan option
|
|
|
|
pinentry-mode=loopback is allowed. */
|
2011-03-03 18:35:08 +01:00
|
|
|
int allow_loopback_pinentry;
|
2011-12-05 10:54:59 +01:00
|
|
|
|
2015-05-11 18:08:44 +02:00
|
|
|
/* Allow the use of an external password cache. If this option is
|
|
|
|
enabled (which is the default) we send an option to Pinentry
|
|
|
|
to allow it to enable such a cache. */
|
|
|
|
int allow_external_cache;
|
|
|
|
|
2015-06-09 14:07:00 +02:00
|
|
|
/* If this global option is true, the Assuan option of Pinentry
|
|
|
|
allow-emacs-prompt is allowed. */
|
|
|
|
int allow_emacs_pinentry;
|
|
|
|
|
2005-02-03 18:40:02 +01:00
|
|
|
int keep_tty; /* Don't switch the TTY (for pinentry) on request */
|
|
|
|
int keep_display; /* Don't switch the DISPLAY (for pinentry) on request */
|
2011-12-05 10:54:59 +01:00
|
|
|
|
2016-11-10 14:17:17 +01:00
|
|
|
/* This global option indicates the use of an extra socket. Note
|
2014-11-27 20:41:37 +01:00
|
|
|
that we use a hack for cleanup handling in gpg-agent.c: If the
|
|
|
|
value is less than 2 the name has not yet been malloced. */
|
|
|
|
int extra_socket;
|
2015-06-11 09:36:27 +02:00
|
|
|
|
2016-11-10 14:17:17 +01:00
|
|
|
/* This global option indicates the use of an extra socket for web
|
2015-06-11 09:36:27 +02:00
|
|
|
browsers. Note that we use a hack for cleanup handling in
|
|
|
|
gpg-agent.c: If the value is less than 2 the name has not yet
|
|
|
|
been malloced. */
|
|
|
|
int browser_socket;
|
2017-05-24 17:48:42 +02:00
|
|
|
|
|
|
|
/* The digest algorithm to use for ssh fingerprints when
|
|
|
|
* communicating with the user. */
|
|
|
|
int ssh_fingerprint_digest;
|
2017-11-06 13:57:30 +01:00
|
|
|
|
|
|
|
/* The value of the option --s2k-count. If this option is not given
|
|
|
|
* or 0 an auto-calibrated value is used. */
|
|
|
|
unsigned long s2k_count;
|
2003-08-05 19:11:04 +02:00
|
|
|
} opt;
|
|
|
|
|
|
|
|
|
2011-12-05 10:54:59 +01:00
|
|
|
/* Bit values for the --debug option. */
|
2003-08-05 19:11:04 +02:00
|
|
|
#define DBG_MPI_VALUE 2 /* debug mpi details */
|
|
|
|
#define DBG_CRYPTO_VALUE 4 /* debug low level crypto */
|
|
|
|
#define DBG_MEMORY_VALUE 32 /* debug memory allocation stuff */
|
|
|
|
#define DBG_CACHE_VALUE 64 /* debug the caching */
|
|
|
|
#define DBG_MEMSTAT_VALUE 128 /* show memory statistics */
|
|
|
|
#define DBG_HASHING_VALUE 512 /* debug hashing operations */
|
2015-04-06 13:42:17 +02:00
|
|
|
#define DBG_IPC_VALUE 1024 /* Enable Assuan debugging. */
|
2003-08-05 19:11:04 +02:00
|
|
|
|
2011-12-05 10:54:59 +01:00
|
|
|
/* Test macros for the debug option. */
|
2003-08-05 19:11:04 +02:00
|
|
|
#define DBG_CRYPTO (opt.debug & DBG_CRYPTO_VALUE)
|
|
|
|
#define DBG_MEMORY (opt.debug & DBG_MEMORY_VALUE)
|
|
|
|
#define DBG_CACHE (opt.debug & DBG_CACHE_VALUE)
|
|
|
|
#define DBG_HASHING (opt.debug & DBG_HASHING_VALUE)
|
2015-04-06 13:42:17 +02:00
|
|
|
#define DBG_IPC (opt.debug & DBG_IPC_VALUE)
|
2003-08-05 19:11:04 +02:00
|
|
|
|
2011-12-05 10:54:59 +01:00
|
|
|
/* Forward reference for local definitions in command.c. */
|
2003-08-05 19:11:04 +02:00
|
|
|
struct server_local_s;
|
2011-12-05 10:54:59 +01:00
|
|
|
|
2013-08-08 21:22:38 +02:00
|
|
|
/* Declaration of objects from command-ssh.c. */
|
|
|
|
struct ssh_control_file_s;
|
|
|
|
typedef struct ssh_control_file_s *ssh_control_file_t;
|
|
|
|
|
2011-12-05 10:54:59 +01:00
|
|
|
/* Forward reference for local definitions in call-scd.c. */
|
2020-06-24 12:44:02 +02:00
|
|
|
struct daemon_local_s;
|
2003-08-05 19:11:04 +02:00
|
|
|
|
2005-05-18 12:48:06 +02:00
|
|
|
/* Collection of data per session (aka connection). */
|
2011-02-04 12:57:53 +01:00
|
|
|
struct server_control_s
|
2005-06-16 10:12:03 +02:00
|
|
|
{
|
2006-11-20 17:49:41 +01:00
|
|
|
/* Private data used to fire up the connection thread. We use this
|
2011-12-05 10:54:59 +01:00
|
|
|
structure do avoid an extra allocation for only a few bytes while
|
|
|
|
spawning a new connection thread. */
|
2006-11-20 17:49:41 +01:00
|
|
|
struct {
|
2007-10-01 16:48:39 +02:00
|
|
|
gnupg_fd_t fd;
|
2006-11-20 17:49:41 +01:00
|
|
|
} thread_startup;
|
2011-02-04 12:57:53 +01:00
|
|
|
|
2015-06-11 09:36:27 +02:00
|
|
|
/* Flag indicating the connection is run in restricted mode.
|
|
|
|
A value of 1 if used for --extra-socket,
|
|
|
|
a value of 2 is used for --browser-socket. */
|
2014-11-27 20:41:37 +01:00
|
|
|
int restricted;
|
|
|
|
|
2005-05-18 12:48:06 +02:00
|
|
|
/* Private data of the server (command.c). */
|
2003-08-05 19:11:04 +02:00
|
|
|
struct server_local_s *server_local;
|
2005-05-18 12:48:06 +02:00
|
|
|
|
2020-06-24 12:44:02 +02:00
|
|
|
/* Private data of the daemon (call-XXX.c). */
|
|
|
|
struct daemon_local_s *d_local[DAEMON_MAX_TYPE];
|
2005-05-18 12:48:06 +02:00
|
|
|
|
2011-12-05 10:54:59 +01:00
|
|
|
/* Environment settings for the connection. */
|
2009-07-07 12:02:41 +02:00
|
|
|
session_env_t session_env;
|
2003-08-05 19:11:04 +02:00
|
|
|
char *lc_ctype;
|
|
|
|
char *lc_messages;
|
2017-02-03 17:13:08 +01:00
|
|
|
unsigned long client_pid;
|
2017-02-05 08:12:25 +01:00
|
|
|
int client_uid;
|
2009-07-07 12:02:41 +02:00
|
|
|
|
2011-03-03 18:35:08 +01:00
|
|
|
/* The current pinentry mode. */
|
|
|
|
pinentry_mode_t pinentry_mode;
|
|
|
|
|
2011-04-21 15:40:48 +02:00
|
|
|
/* The TTL used for the --preset option of certain commands. */
|
|
|
|
int cache_ttl_opt_preset;
|
|
|
|
|
|
|
|
/* Information on the currently used digest (for signing commands). */
|
2003-08-05 19:11:04 +02:00
|
|
|
struct {
|
2020-05-18 19:24:41 +02:00
|
|
|
char *data; /* NULL or malloced data of length VALUELEN. If
|
2020-08-10 10:01:03 +02:00
|
|
|
this is set the other fields are ignored. Used
|
|
|
|
for PureEdDSA and RSA with PSS (in which case
|
|
|
|
data_is_pss is also set). */
|
2020-05-18 19:24:41 +02:00
|
|
|
int valuelen;
|
2003-08-05 19:11:04 +02:00
|
|
|
int algo;
|
|
|
|
unsigned char value[MAX_DIGEST_LEN];
|
2020-08-10 10:01:03 +02:00
|
|
|
unsigned int raw_value: 1;
|
|
|
|
unsigned int is_pss: 1; /* DATA holds PSS formated data. */
|
2003-08-05 19:11:04 +02:00
|
|
|
} digest;
|
2005-06-16 10:12:03 +02:00
|
|
|
unsigned char keygrip[20];
|
2003-08-05 19:11:04 +02:00
|
|
|
int have_keygrip;
|
|
|
|
|
2011-12-05 10:54:59 +01:00
|
|
|
/* A flag to enable a hack to send the PKAUTH command instead of the
|
|
|
|
PKSIGN command to the scdaemon. */
|
|
|
|
int use_auth_call;
|
|
|
|
|
|
|
|
/* A flag to inhibit enforced passphrase change during an explicit
|
|
|
|
passwd command. */
|
|
|
|
int in_passwd;
|
2011-06-29 02:35:13 +02:00
|
|
|
|
2011-12-05 10:54:59 +01:00
|
|
|
/* The current S2K which might be different from the calibrated
|
|
|
|
count. */
|
|
|
|
unsigned long s2k_count;
|
2017-10-26 07:40:38 +02:00
|
|
|
|
2017-10-27 02:54:48 +02:00
|
|
|
/* If pinentry is active for this thread. It can be more than 1,
|
|
|
|
when pinentry is called recursively. */
|
|
|
|
int pinentry_active;
|
2003-08-05 19:11:04 +02:00
|
|
|
};
|
2006-09-06 18:35:52 +02:00
|
|
|
|
2003-08-05 19:11:04 +02:00
|
|
|
|
2019-01-28 04:58:13 +01:00
|
|
|
/* Status of pinentry. */
|
|
|
|
enum
|
|
|
|
{
|
|
|
|
PINENTRY_STATUS_CLOSE_BUTTON = 1 << 0,
|
|
|
|
PINENTRY_STATUS_PIN_REPEATED = 1 << 8,
|
|
|
|
PINENTRY_STATUS_PASSWORD_FROM_CACHE = 1 << 9
|
|
|
|
};
|
|
|
|
|
2011-12-05 10:54:59 +01:00
|
|
|
/* Information pertaining to pinentry requests. */
|
2011-02-04 12:57:53 +01:00
|
|
|
struct pin_entry_info_s
|
2006-09-06 18:35:52 +02:00
|
|
|
{
|
2003-08-05 19:11:04 +02:00
|
|
|
int min_digits; /* min. number of digits required or 0 for freeform entry */
|
|
|
|
int max_digits; /* max. number of allowed digits allowed*/
|
2011-12-05 10:54:59 +01:00
|
|
|
int max_tries; /* max. number of allowed tries. */
|
|
|
|
int failed_tries; /* Number of tries so far failed. */
|
2007-09-18 13:40:09 +02:00
|
|
|
int with_qualitybar; /* Set if the quality bar should be displayed. */
|
2014-10-24 16:20:20 +02:00
|
|
|
int with_repeat; /* Request repetition of the passphrase. */
|
2019-01-28 04:58:13 +01:00
|
|
|
int repeat_okay; /* Repetition worked. */
|
|
|
|
unsigned int status; /* Status. */
|
2015-10-09 04:33:13 +02:00
|
|
|
gpg_error_t (*check_cb)(struct pin_entry_info_s *); /* CB used to check
|
|
|
|
the PIN */
|
2003-08-05 19:11:04 +02:00
|
|
|
void *check_cb_arg; /* optional argument which might be of use in the CB */
|
2010-08-31 17:58:39 +02:00
|
|
|
const char *cb_errtext; /* used by the cb to display a specific error */
|
2011-12-05 10:54:59 +01:00
|
|
|
size_t max_length; /* Allocated length of the buffer PIN. */
|
|
|
|
char pin[1]; /* The buffer to hold the PIN or passphrase.
|
|
|
|
It's actual allocated length is given by
|
|
|
|
MAX_LENGTH (above). */
|
2003-08-05 19:11:04 +02:00
|
|
|
};
|
|
|
|
|
|
|
|
|
2011-12-05 10:54:59 +01:00
|
|
|
/* Types of the private keys. */
|
2011-02-04 12:57:53 +01:00
|
|
|
enum
|
2005-06-07 21:09:18 +02:00
|
|
|
{
|
2011-12-05 10:54:59 +01:00
|
|
|
PRIVATE_KEY_UNKNOWN = 0, /* Type of key is not known. */
|
|
|
|
PRIVATE_KEY_CLEAR = 1, /* The key is not protected. */
|
|
|
|
PRIVATE_KEY_PROTECTED = 2, /* The key is protected. */
|
|
|
|
PRIVATE_KEY_SHADOWED = 3, /* The key is a stub for a smartcard
|
|
|
|
based key. */
|
2015-01-29 16:26:07 +01:00
|
|
|
PROTECTED_SHARED_SECRET = 4, /* RFU. */
|
|
|
|
PRIVATE_KEY_OPENPGP_NONE = 5 /* openpgp-native with protection "none". */
|
2005-06-07 21:09:18 +02:00
|
|
|
};
|
|
|
|
|
|
|
|
|
|
|
|
/* Values for the cache_mode arguments. */
|
2011-02-04 12:57:53 +01:00
|
|
|
typedef enum
|
2005-06-07 21:09:18 +02:00
|
|
|
{
|
2007-08-28 19:48:13 +02:00
|
|
|
CACHE_MODE_IGNORE = 0, /* Special mode to bypass the cache. */
|
2018-07-02 21:24:15 +02:00
|
|
|
CACHE_MODE_ANY, /* Any mode except ignore and data matches. */
|
2005-06-07 21:09:18 +02:00
|
|
|
CACHE_MODE_NORMAL, /* Normal cache (gpg-agent). */
|
|
|
|
CACHE_MODE_USER, /* GET_PASSPHRASE related cache. */
|
2010-09-01 11:48:35 +02:00
|
|
|
CACHE_MODE_SSH, /* SSH related cache. */
|
2018-07-02 21:24:15 +02:00
|
|
|
CACHE_MODE_NONCE, /* This is a non-predictable nonce. */
|
2020-01-07 18:36:18 +01:00
|
|
|
CACHE_MODE_PIN, /* PINs stored/retrieved by scdaemon. */
|
2018-07-02 21:24:15 +02:00
|
|
|
CACHE_MODE_DATA /* Arbitrary data. */
|
2005-06-07 21:09:18 +02:00
|
|
|
}
|
|
|
|
cache_mode_t;
|
|
|
|
|
2011-04-12 18:20:46 +02:00
|
|
|
/* The TTL is seconds used for adding a new nonce mode cache item. */
|
|
|
|
#define CACHE_TTL_NONCE 120
|
|
|
|
|
2011-04-21 15:40:48 +02:00
|
|
|
/* The TTL in seconds used by the --preset option of some commands.
|
|
|
|
This is the default value changeable by an OPTION command. */
|
2011-04-12 18:20:46 +02:00
|
|
|
#define CACHE_TTL_OPT_PRESET 900
|
|
|
|
|
2003-08-05 19:11:04 +02:00
|
|
|
|
2009-05-15 13:16:28 +02:00
|
|
|
/* The type of a function to lookup a TTL by a keygrip. */
|
|
|
|
typedef int (*lookup_ttl_t)(const char *hexgrip);
|
|
|
|
|
|
|
|
|
2015-06-30 21:58:02 +02:00
|
|
|
/* This is a special version of the usual _() gettext macro. It
|
|
|
|
assumes a server connection control variable with the name "ctrl"
|
|
|
|
and uses that to translate a string according to the locale set for
|
|
|
|
the connection. The macro LunderscoreIMPL is used by i18n to
|
|
|
|
actually define the inline function when needed. */
|
2017-08-23 11:02:28 +02:00
|
|
|
#if defined (ENABLE_NLS) || defined (USE_SIMPLE_GETTEXT)
|
2015-06-30 21:58:02 +02:00
|
|
|
#define L_(a) agent_Lunderscore (ctrl, (a))
|
2015-06-30 22:28:41 +02:00
|
|
|
#define LunderscorePROTO \
|
|
|
|
static inline const char *agent_Lunderscore (ctrl_t ctrl, \
|
|
|
|
const char *string) \
|
|
|
|
GNUPG_GCC_ATTR_FORMAT_ARG(2);
|
2015-06-30 21:58:02 +02:00
|
|
|
#define LunderscoreIMPL \
|
|
|
|
static inline const char * \
|
|
|
|
agent_Lunderscore (ctrl_t ctrl, const char *string) \
|
|
|
|
{ \
|
|
|
|
return ctrl? i18n_localegettext (ctrl->lc_messages, string) \
|
|
|
|
/* */: gettext (string); \
|
|
|
|
}
|
2015-07-10 02:21:32 +02:00
|
|
|
#else
|
|
|
|
#define L_(a) (a)
|
|
|
|
#endif
|
2015-06-30 21:58:02 +02:00
|
|
|
|
|
|
|
|
2019-05-15 08:53:35 +02:00
|
|
|
/* Information from scdaemon for card keys. */
|
|
|
|
struct card_key_info_s
|
|
|
|
{
|
|
|
|
struct card_key_info_s *next;
|
2020-01-13 08:43:53 +01:00
|
|
|
char keygrip[41];
|
2019-05-15 08:53:35 +02:00
|
|
|
char *serialno;
|
|
|
|
char *idstr;
|
|
|
|
};
|
|
|
|
|
2003-08-05 19:11:04 +02:00
|
|
|
/*-- gpg-agent.c --*/
|
2015-07-26 12:50:16 +02:00
|
|
|
void agent_exit (int rc)
|
|
|
|
GPGRT_ATTR_NORETURN; /* Also implemented in other tools */
|
2016-01-25 11:20:23 +01:00
|
|
|
void agent_set_progress_cb (void (*cb)(ctrl_t ctrl, const char *what,
|
|
|
|
int printchar, int current, int total),
|
|
|
|
ctrl_t ctrl);
|
2014-12-19 13:07:09 +01:00
|
|
|
gpg_error_t agent_copy_startup_env (ctrl_t ctrl);
|
2007-02-14 17:27:55 +01:00
|
|
|
const char *get_agent_socket_name (void);
|
2007-06-18 12:33:12 +02:00
|
|
|
const char *get_agent_ssh_socket_name (void);
|
2016-08-06 10:14:17 +02:00
|
|
|
int get_agent_active_connection_count (void);
|
2007-11-27 09:01:19 +01:00
|
|
|
#ifdef HAVE_W32_SYSTEM
|
2020-06-24 12:44:02 +02:00
|
|
|
void *get_agent_daemon_notify_event (void);
|
2007-11-27 09:01:19 +01:00
|
|
|
#endif
|
2007-07-04 11:34:28 +02:00
|
|
|
void agent_sighup_action (void);
|
2011-01-13 06:14:45 +01:00
|
|
|
int map_pk_openpgp_to_gcry (int openpgp_algo);
|
2003-08-05 19:11:04 +02:00
|
|
|
|
|
|
|
/*-- command.c --*/
|
2016-11-03 20:07:56 +01:00
|
|
|
gpg_error_t agent_inq_pinentry_launched (ctrl_t ctrl, unsigned long pid,
|
|
|
|
const char *extra);
|
2009-03-20 20:04:47 +01:00
|
|
|
gpg_error_t agent_write_status (ctrl_t ctrl, const char *keyword, ...)
|
2015-07-26 12:50:16 +02:00
|
|
|
GPGRT_ATTR_SENTINEL(0);
|
2012-02-07 12:46:32 +01:00
|
|
|
gpg_error_t agent_print_status (ctrl_t ctrl, const char *keyword,
|
|
|
|
const char *format, ...)
|
2015-07-26 12:50:16 +02:00
|
|
|
GPGRT_ATTR_PRINTF(3,4);
|
2006-11-14 15:53:42 +01:00
|
|
|
void bump_key_eventcounter (void);
|
|
|
|
void bump_card_eventcounter (void);
|
2007-10-01 16:48:39 +02:00
|
|
|
void start_command_handler (ctrl_t, gnupg_fd_t, gnupg_fd_t);
|
2014-03-07 09:46:44 +01:00
|
|
|
gpg_error_t pinentry_loopback (ctrl_t, const char *keyword,
|
2019-06-04 02:59:08 +02:00
|
|
|
unsigned char **buffer, size_t *size,
|
|
|
|
size_t max_length);
|
|
|
|
gpg_error_t pinentry_loopback_confirm (ctrl_t ctrl, const char *desc,
|
|
|
|
int ask_confirmation,
|
|
|
|
const char *ok, const char *notok);
|
2014-03-07 09:46:44 +01:00
|
|
|
|
|
|
|
#ifdef HAVE_W32_SYSTEM
|
|
|
|
int serve_mmapped_ssh_request (ctrl_t ctrl,
|
|
|
|
unsigned char *request, size_t maxreqlen);
|
|
|
|
#endif /*HAVE_W32_SYSTEM*/
|
2003-08-05 19:11:04 +02:00
|
|
|
|
2005-01-26 23:20:21 +01:00
|
|
|
/*-- command-ssh.c --*/
|
2013-08-08 21:22:38 +02:00
|
|
|
ssh_control_file_t ssh_open_control_file (void);
|
|
|
|
void ssh_close_control_file (ssh_control_file_t cf);
|
|
|
|
gpg_error_t ssh_read_control_file (ssh_control_file_t cf,
|
|
|
|
char *r_hexgrip, int *r_disabled,
|
|
|
|
int *r_ttl, int *r_confirm);
|
|
|
|
gpg_error_t ssh_search_control_file (ssh_control_file_t cf,
|
|
|
|
const char *hexgrip,
|
|
|
|
int *r_disabled,
|
|
|
|
int *r_ttl, int *r_confirm);
|
|
|
|
|
2007-10-01 16:48:39 +02:00
|
|
|
void start_command_handler_ssh (ctrl_t, gnupg_fd_t);
|
2005-01-26 23:20:21 +01:00
|
|
|
|
2003-08-05 19:11:04 +02:00
|
|
|
/*-- findkey.c --*/
|
2017-02-22 11:04:55 +01:00
|
|
|
gpg_error_t agent_modify_description (const char *in, const char *comment,
|
|
|
|
const gcry_sexp_t key, char **result);
|
2003-08-05 19:11:04 +02:00
|
|
|
int agent_write_private_key (const unsigned char *grip,
|
2019-05-03 15:54:54 +02:00
|
|
|
const void *buffer, size_t length, int force,
|
2020-08-17 14:21:00 +02:00
|
|
|
const char *serialno, const char *keyref,
|
|
|
|
time_t timestamp);
|
2011-02-04 12:57:53 +01:00
|
|
|
gpg_error_t agent_key_from_file (ctrl_t ctrl,
|
2010-09-01 13:07:16 +02:00
|
|
|
const char *cache_nonce,
|
2004-02-13 18:06:34 +01:00
|
|
|
const char *desc_text,
|
|
|
|
const unsigned char *grip,
|
2003-08-05 19:11:04 +02:00
|
|
|
unsigned char **shadow_info,
|
2005-06-07 21:09:18 +02:00
|
|
|
cache_mode_t cache_mode,
|
2009-05-15 13:16:28 +02:00
|
|
|
lookup_ttl_t lookup_ttl,
|
2010-10-01 22:33:53 +02:00
|
|
|
gcry_sexp_t *result,
|
|
|
|
char **r_passphrase);
|
2011-07-20 20:49:41 +02:00
|
|
|
gpg_error_t agent_raw_key_from_file (ctrl_t ctrl, const unsigned char *grip,
|
|
|
|
gcry_sexp_t *result);
|
2011-02-04 12:57:53 +01:00
|
|
|
gpg_error_t agent_public_key_from_file (ctrl_t ctrl,
|
2005-02-23 22:06:32 +01:00
|
|
|
const unsigned char *grip,
|
|
|
|
gcry_sexp_t *result);
|
2020-06-19 06:58:13 +02:00
|
|
|
int agent_pk_get_algo (gcry_sexp_t s_key);
|
2021-03-09 22:50:29 +01:00
|
|
|
int agent_is_tpm2_key(gcry_sexp_t s_key);
|
2003-08-05 19:11:04 +02:00
|
|
|
int agent_key_available (const unsigned char *grip);
|
2009-03-06 18:31:27 +01:00
|
|
|
gpg_error_t agent_key_info_from_file (ctrl_t ctrl, const unsigned char *grip,
|
|
|
|
int *r_keytype,
|
2020-06-14 19:26:45 +02:00
|
|
|
unsigned char **r_shadow_info,
|
|
|
|
unsigned char **r_shadow_info_type);
|
2014-04-15 16:40:48 +02:00
|
|
|
gpg_error_t agent_delete_key (ctrl_t ctrl, const char *desc_text,
|
2017-03-24 09:02:02 +01:00
|
|
|
const unsigned char *grip,
|
|
|
|
int force, int only_stubs);
|
2003-08-05 19:11:04 +02:00
|
|
|
|
2007-06-14 19:05:07 +02:00
|
|
|
/*-- call-pinentry.c --*/
|
|
|
|
void initialize_module_call_pinentry (void);
|
2005-06-07 21:09:18 +02:00
|
|
|
void agent_query_dump_state (void);
|
2005-11-28 12:52:25 +01:00
|
|
|
void agent_reset_query (ctrl_t ctrl);
|
2006-10-19 16:22:06 +02:00
|
|
|
int pinentry_active_p (ctrl_t ctrl, int waitseconds);
|
2015-10-09 04:33:13 +02:00
|
|
|
gpg_error_t agent_askpin (ctrl_t ctrl,
|
|
|
|
const char *desc_text, const char *prompt_text,
|
|
|
|
const char *inital_errtext,
|
|
|
|
struct pin_entry_info_s *pininfo,
|
|
|
|
const char *keyinfo, cache_mode_t cache_mode);
|
2004-02-13 18:06:34 +01:00
|
|
|
int agent_get_passphrase (ctrl_t ctrl, char **retpass,
|
2003-08-05 19:11:04 +02:00
|
|
|
const char *desc, const char *prompt,
|
2015-05-19 14:58:04 +02:00
|
|
|
const char *errtext, int with_qualitybar,
|
2020-07-08 14:20:01 +02:00
|
|
|
const char *keyinfo, cache_mode_t cache_mode,
|
|
|
|
struct pin_entry_info_s *pininfo);
|
2004-02-13 18:06:34 +01:00
|
|
|
int agent_get_confirmation (ctrl_t ctrl, const char *desc, const char *ok,
|
2009-06-17 12:19:50 +02:00
|
|
|
const char *notokay, int with_cancel);
|
2007-08-27 20:10:27 +02:00
|
|
|
int agent_show_message (ctrl_t ctrl, const char *desc, const char *ok_btn);
|
2007-01-25 09:30:47 +01:00
|
|
|
int agent_popup_message_start (ctrl_t ctrl,
|
|
|
|
const char *desc, const char *ok_btn);
|
2005-11-28 12:52:25 +01:00
|
|
|
void agent_popup_message_stop (ctrl_t ctrl);
|
2015-05-19 15:00:16 +02:00
|
|
|
int agent_clear_passphrase (ctrl_t ctrl,
|
|
|
|
const char *keyinfo, cache_mode_t cache_mode);
|
2003-08-05 19:11:04 +02:00
|
|
|
|
|
|
|
/*-- cache.c --*/
|
2010-09-02 12:46:23 +02:00
|
|
|
void initialize_module_cache (void);
|
|
|
|
void deinitialize_module_cache (void);
|
2018-03-06 16:22:42 +01:00
|
|
|
void agent_cache_housekeeping (void);
|
2020-01-07 18:36:18 +01:00
|
|
|
void agent_flush_cache (int pincache_only);
|
2018-03-27 08:40:58 +02:00
|
|
|
int agent_put_cache (ctrl_t ctrl, const char *key, cache_mode_t cache_mode,
|
2005-06-07 21:09:18 +02:00
|
|
|
const char *data, int ttl);
|
2018-03-27 08:40:58 +02:00
|
|
|
char *agent_get_cache (ctrl_t ctrl, const char *key, cache_mode_t cache_mode);
|
2014-09-17 15:12:08 +02:00
|
|
|
void agent_store_cache_hit (const char *key);
|
2003-08-05 19:11:04 +02:00
|
|
|
|
|
|
|
|
|
|
|
/*-- pksign.c --*/
|
2017-07-28 10:37:33 +02:00
|
|
|
gpg_error_t agent_pksign_do (ctrl_t ctrl, const char *cache_nonce,
|
|
|
|
const char *desc_text,
|
|
|
|
gcry_sexp_t *signature_sexp,
|
|
|
|
cache_mode_t cache_mode, lookup_ttl_t lookup_ttl,
|
|
|
|
const void *overridedata, size_t overridedatalen);
|
|
|
|
gpg_error_t agent_pksign (ctrl_t ctrl, const char *cache_nonce,
|
|
|
|
const char *desc_text,
|
|
|
|
membuf_t *outbuf, cache_mode_t cache_mode);
|
2003-08-05 19:11:04 +02:00
|
|
|
|
|
|
|
/*-- pkdecrypt.c --*/
|
2020-12-08 07:06:33 +01:00
|
|
|
gpg_error_t agent_pkdecrypt (ctrl_t ctrl, const char *desc_text,
|
|
|
|
const unsigned char *ciphertext, size_t ciphertextlen,
|
|
|
|
membuf_t *outbuf, int *r_padding);
|
2003-08-05 19:11:04 +02:00
|
|
|
|
|
|
|
/*-- genkey.c --*/
|
2020-07-08 14:20:01 +02:00
|
|
|
int check_passphrase_constraints (ctrl_t ctrl, const char *pw, int no_empty,
|
2015-06-18 05:10:47 +02:00
|
|
|
char **failed_constraint);
|
2010-06-17 17:44:44 +02:00
|
|
|
gpg_error_t agent_ask_new_passphrase (ctrl_t ctrl, const char *prompt,
|
2010-10-13 17:57:08 +02:00
|
|
|
char **r_passphrase);
|
2020-08-17 14:21:00 +02:00
|
|
|
int agent_genkey (ctrl_t ctrl, const char *cache_nonce, time_t timestamp,
|
2010-10-14 18:34:31 +02:00
|
|
|
const char *keyparam, size_t keyparmlen,
|
2015-01-21 11:31:20 +01:00
|
|
|
int no_protection, const char *override_passphrase,
|
|
|
|
int preset, membuf_t *outbuf);
|
2010-10-26 11:10:29 +02:00
|
|
|
gpg_error_t agent_protect_and_store (ctrl_t ctrl, gcry_sexp_t s_skey,
|
|
|
|
char **passphrase_addr);
|
2003-08-05 19:11:04 +02:00
|
|
|
|
|
|
|
/*-- protect.c --*/
|
2018-12-11 18:12:51 +01:00
|
|
|
void set_s2k_calibration_time (unsigned int milliseconds);
|
2017-11-06 14:20:03 +01:00
|
|
|
unsigned long get_calibrated_s2k_count (void);
|
2009-12-14 21:12:56 +01:00
|
|
|
unsigned long get_standard_s2k_count (void);
|
2011-04-26 20:33:46 +02:00
|
|
|
unsigned char get_standard_s2k_count_rfc4880 (void);
|
2017-11-06 14:20:03 +01:00
|
|
|
unsigned long get_standard_s2k_time (void);
|
2003-08-05 19:11:04 +02:00
|
|
|
int agent_protect (const unsigned char *plainkey, const char *passphrase,
|
2011-06-29 02:35:13 +02:00
|
|
|
unsigned char **result, size_t *resultlen,
|
2016-04-12 14:37:26 +02:00
|
|
|
unsigned long s2k_count, int use_ocb);
|
2017-07-28 10:37:33 +02:00
|
|
|
gpg_error_t agent_unprotect (ctrl_t ctrl,
|
2013-05-22 10:50:12 +02:00
|
|
|
const unsigned char *protectedkey, const char *passphrase,
|
2011-02-04 12:57:53 +01:00
|
|
|
gnupg_isotime_t protected_at,
|
2003-08-05 19:11:04 +02:00
|
|
|
unsigned char **result, size_t *resultlen);
|
|
|
|
int agent_private_key_type (const unsigned char *privatekey);
|
2005-02-25 17:14:55 +01:00
|
|
|
unsigned char *make_shadow_info (const char *serialno, const char *idstring);
|
2003-08-05 19:11:04 +02:00
|
|
|
int agent_shadow_key (const unsigned char *pubkey,
|
|
|
|
const unsigned char *shadow_info,
|
|
|
|
unsigned char **result);
|
2020-06-14 19:26:45 +02:00
|
|
|
int agent_shadow_key_type (const unsigned char *pubkey,
|
|
|
|
const unsigned char *shadow_info,
|
|
|
|
const unsigned char *type,
|
|
|
|
unsigned char **result);
|
2017-07-28 10:37:33 +02:00
|
|
|
gpg_error_t agent_get_shadow_info (const unsigned char *shadowkey,
|
|
|
|
unsigned char const **shadow_info);
|
2020-06-14 19:26:45 +02:00
|
|
|
gpg_error_t agent_get_shadow_info_type (const unsigned char *shadowkey,
|
|
|
|
unsigned char const **shadow_info,
|
|
|
|
unsigned char **shadow_type);
|
2011-02-04 12:57:53 +01:00
|
|
|
gpg_error_t parse_shadow_info (const unsigned char *shadow_info,
|
2012-02-07 14:17:33 +01:00
|
|
|
char **r_hexsn, char **r_idstr, int *r_pinlen);
|
2010-08-31 17:58:39 +02:00
|
|
|
gpg_error_t s2k_hash_passphrase (const char *passphrase, int hashalgo,
|
|
|
|
int s2kmode,
|
|
|
|
const unsigned char *s2ksalt,
|
|
|
|
unsigned int s2kcount,
|
|
|
|
unsigned char *key, size_t keylen);
|
2016-10-20 05:05:15 +02:00
|
|
|
gpg_error_t agent_write_shadow_key (const unsigned char *grip,
|
|
|
|
const char *serialno, const char *keyid,
|
|
|
|
const unsigned char *pkbuf, int force);
|
2003-08-05 19:11:04 +02:00
|
|
|
|
|
|
|
|
|
|
|
/*-- trustlist.c --*/
|
2007-06-14 19:05:07 +02:00
|
|
|
void initialize_module_trustlist (void);
|
2009-03-19 11:21:51 +01:00
|
|
|
gpg_error_t agent_istrusted (ctrl_t ctrl, const char *fpr, int *r_disabled);
|
2006-09-15 20:53:37 +02:00
|
|
|
gpg_error_t agent_listtrusted (void *assuan_context);
|
|
|
|
gpg_error_t agent_marktrusted (ctrl_t ctrl, const char *name,
|
|
|
|
const char *fpr, int flag);
|
2004-05-11 21:11:53 +02:00
|
|
|
void agent_reload_trustlist (void);
|
2003-08-05 19:11:04 +02:00
|
|
|
|
2021-03-09 22:50:29 +01:00
|
|
|
/*-- divert-tpm2.c --*/
|
|
|
|
#ifdef HAVE_LIBTSS
|
|
|
|
int divert_tpm2_pksign (ctrl_t ctrl, const char *desc_text,
|
|
|
|
const unsigned char *digest, size_t digestlen, int algo,
|
|
|
|
const unsigned char *shadow_info, unsigned char **r_sig,
|
|
|
|
size_t *r_siglen);
|
|
|
|
int divert_tpm2_pkdecrypt (ctrl_t ctrl, const char *desc_text,
|
|
|
|
const unsigned char *cipher,
|
|
|
|
const unsigned char *shadow_info,
|
|
|
|
char **r_buf, size_t *r_len, int *r_padding);
|
|
|
|
int divert_tpm2_writekey (ctrl_t ctrl, const unsigned char *grip,
|
|
|
|
gcry_sexp_t s_skey);
|
|
|
|
#else /*!HAVE_LIBTSS*/
|
|
|
|
static inline int
|
|
|
|
divert_tpm2_pksign (ctrl_t ctrl, const char *desc_text,
|
|
|
|
const unsigned char *digest,
|
|
|
|
size_t digestlen, int algo,
|
|
|
|
const unsigned char *shadow_info,
|
|
|
|
unsigned char **r_sig,
|
|
|
|
size_t *r_siglen)
|
|
|
|
{
|
|
|
|
(void)ctrl; (void)desc_text; (void)digest; (void)digestlen;
|
|
|
|
(void)algo; (void)shadow_info; (void)r_sig; (void)r_siglen;
|
|
|
|
return gpg_error (GPG_ERR_NOT_SUPPORTED);
|
|
|
|
}
|
|
|
|
static inline int
|
|
|
|
divert_tpm2_pkdecrypt (ctrl_t ctrl, const char *desc_text,
|
|
|
|
const unsigned char *cipher,
|
|
|
|
const unsigned char *shadow_info,
|
|
|
|
char **r_buf, size_t *r_len,
|
|
|
|
int *r_padding)
|
|
|
|
{
|
|
|
|
(void)ctrl; (void)desc_text; (void)cipher; (void)shadow_info;
|
|
|
|
(void)r_buf; (void)r_len; (void)r_padding;
|
|
|
|
return gpg_error (GPG_ERR_NOT_SUPPORTED);
|
|
|
|
}
|
|
|
|
static inline int
|
|
|
|
divert_tpm2_writekey (ctrl_t ctrl, const unsigned char *grip,
|
|
|
|
gcry_sexp_t s_skey)
|
|
|
|
{
|
2021-03-10 15:51:31 +01:00
|
|
|
(void)ctrl; (void)grip; (void)s_skey;
|
2021-03-09 22:50:29 +01:00
|
|
|
return gpg_error (GPG_ERR_NOT_SUPPORTED);
|
|
|
|
}
|
|
|
|
#endif /*!HAVE_LIBTSS*/
|
|
|
|
|
|
|
|
|
2003-08-05 19:11:04 +02:00
|
|
|
|
|
|
|
/*-- divert-scd.c --*/
|
2017-02-22 09:40:50 +01:00
|
|
|
int divert_pksign (ctrl_t ctrl, const char *desc_text,
|
2019-05-15 08:53:35 +02:00
|
|
|
const unsigned char *grip,
|
2003-08-05 19:11:04 +02:00
|
|
|
const unsigned char *digest, size_t digestlen, int algo,
|
2013-02-28 03:17:47 +01:00
|
|
|
const unsigned char *shadow_info, unsigned char **r_sig,
|
|
|
|
size_t *r_siglen);
|
2017-02-22 09:40:50 +01:00
|
|
|
int divert_pkdecrypt (ctrl_t ctrl, const char *desc_text,
|
2019-05-15 08:53:35 +02:00
|
|
|
const unsigned char *grip,
|
2003-08-05 19:11:04 +02:00
|
|
|
const unsigned char *cipher,
|
|
|
|
const unsigned char *shadow_info,
|
2013-08-26 17:29:54 +02:00
|
|
|
char **r_buf, size_t *r_len, int *r_padding);
|
2004-02-13 18:06:34 +01:00
|
|
|
int divert_generic_cmd (ctrl_t ctrl,
|
|
|
|
const char *cmdline, void *assuan_context);
|
2019-03-05 12:08:27 +01:00
|
|
|
gpg_error_t divert_writekey (ctrl_t ctrl, int force, const char *serialno,
|
|
|
|
const char *keyref,
|
|
|
|
const char *keydata, size_t keydatalen);
|
2003-08-05 19:11:04 +02:00
|
|
|
|
2020-06-24 12:44:02 +02:00
|
|
|
/*-- call-daemon.c --*/
|
|
|
|
gpg_error_t daemon_start (enum daemon_type type, ctrl_t ctrl);
|
|
|
|
assuan_context_t daemon_type_ctx (enum daemon_type type, ctrl_t ctrl);
|
|
|
|
gpg_error_t daemon_unlock (enum daemon_type type, ctrl_t ctrl, gpg_error_t rc);
|
|
|
|
void initialize_module_daemon (void);
|
|
|
|
void agent_daemon_dump_state (void);
|
|
|
|
int agent_daemon_check_running (enum daemon_type type);
|
|
|
|
void agent_daemon_check_aliveness (void);
|
|
|
|
void agent_reset_daemon (ctrl_t ctrl);
|
|
|
|
void agent_kill_daemon (enum daemon_type type);
|
2003-08-05 19:11:04 +02:00
|
|
|
|
2021-03-09 22:50:29 +01:00
|
|
|
/*-- call-tpm2d.c --*/
|
|
|
|
int agent_tpm2d_writekey (ctrl_t ctrl, unsigned char **shadow_info,
|
|
|
|
gcry_sexp_t s_skey);
|
|
|
|
int agent_tpm2d_pksign (ctrl_t ctrl, const unsigned char *digest,
|
|
|
|
size_t digestlen, const unsigned char *shadow_info,
|
|
|
|
unsigned char **r_sig, size_t *r_siglen);
|
|
|
|
int agent_tpm2d_pkdecrypt (ctrl_t ctrl, const unsigned char *cipher,
|
|
|
|
size_t cipherlen, const unsigned char *shadow_info,
|
|
|
|
char **r_buf, size_t *r_len);
|
|
|
|
|
2003-08-05 19:11:04 +02:00
|
|
|
/*-- call-scd.c --*/
|
2004-01-29 21:17:27 +01:00
|
|
|
int agent_card_learn (ctrl_t ctrl,
|
|
|
|
void (*kpinfo_cb)(void*, const char *),
|
2003-08-05 19:11:04 +02:00
|
|
|
void *kpinfo_cb_arg,
|
|
|
|
void (*certinfo_cb)(void*, const char *),
|
|
|
|
void *certinfo_cb_arg,
|
|
|
|
void (*sinfo_cb)(void*, const char *,
|
|
|
|
size_t, const char *),
|
|
|
|
void *sinfo_cb_arg);
|
2017-01-16 02:33:08 +01:00
|
|
|
int agent_card_serialno (ctrl_t ctrl, char **r_serialno, const char *demand);
|
2004-01-29 21:17:27 +01:00
|
|
|
int agent_card_pksign (ctrl_t ctrl,
|
|
|
|
const char *keyid,
|
2017-02-22 09:40:50 +01:00
|
|
|
int (*getpin_cb)(void *, const char *,
|
|
|
|
const char *, char*, size_t),
|
2003-08-05 19:11:04 +02:00
|
|
|
void *getpin_cb_arg,
|
2017-02-22 09:40:50 +01:00
|
|
|
const char *desc_text,
|
2011-03-02 15:35:10 +01:00
|
|
|
int mdalgo,
|
2003-08-05 19:11:04 +02:00
|
|
|
const unsigned char *indata, size_t indatalen,
|
2005-06-16 10:12:03 +02:00
|
|
|
unsigned char **r_buf, size_t *r_buflen);
|
2004-01-29 21:17:27 +01:00
|
|
|
int agent_card_pkdecrypt (ctrl_t ctrl,
|
|
|
|
const char *keyid,
|
2017-02-22 09:40:50 +01:00
|
|
|
int (*getpin_cb)(void *, const char *,
|
|
|
|
const char *, char*,size_t),
|
2003-08-05 19:11:04 +02:00
|
|
|
void *getpin_cb_arg,
|
2017-02-22 09:40:50 +01:00
|
|
|
const char *desc_text,
|
2003-08-05 19:11:04 +02:00
|
|
|
const unsigned char *indata, size_t indatalen,
|
2013-08-26 17:29:54 +02:00
|
|
|
char **r_buf, size_t *r_buflen, int *r_padding);
|
2004-01-29 21:17:27 +01:00
|
|
|
int agent_card_readcert (ctrl_t ctrl,
|
|
|
|
const char *id, char **r_buf, size_t *r_buflen);
|
2020-02-13 11:45:41 +01:00
|
|
|
int agent_card_readkey (ctrl_t ctrl, const char *id,
|
|
|
|
unsigned char **r_buf, char **r_keyref);
|
2019-03-05 12:08:27 +01:00
|
|
|
gpg_error_t agent_card_writekey (ctrl_t ctrl, int force, const char *serialno,
|
|
|
|
const char *keyref,
|
|
|
|
const char *keydata, size_t keydatalen,
|
|
|
|
int (*getpin_cb)(void *, const char *,
|
|
|
|
const char *, char*, size_t),
|
|
|
|
void *getpin_cb_arg);
|
2020-01-13 08:43:53 +01:00
|
|
|
gpg_error_t agent_card_getattr (ctrl_t ctrl, const char *name, char **result,
|
|
|
|
const char *keygrip);
|
2004-01-29 21:17:27 +01:00
|
|
|
int agent_card_scd (ctrl_t ctrl, const char *cmdline,
|
2017-02-22 09:40:50 +01:00
|
|
|
int (*getpin_cb)(void *, const char *,
|
|
|
|
const char *, char*, size_t),
|
2003-08-05 19:11:04 +02:00
|
|
|
void *getpin_cb_arg, void *assuan_context);
|
2020-06-24 12:44:02 +02:00
|
|
|
|
2019-05-15 08:53:35 +02:00
|
|
|
void agent_card_free_keyinfo (struct card_key_info_s *l);
|
|
|
|
gpg_error_t agent_card_keyinfo (ctrl_t ctrl, const char *keygrip,
|
2020-01-09 03:55:42 +01:00
|
|
|
int cap, struct card_key_info_s **result);
|
2003-08-05 19:11:04 +02:00
|
|
|
|
|
|
|
|
|
|
|
/*-- learncard.c --*/
|
2015-04-03 10:33:11 +02:00
|
|
|
int agent_handle_learn (ctrl_t ctrl, int send, void *assuan_context, int force);
|
2003-08-05 19:11:04 +02:00
|
|
|
|
|
|
|
|
2015-01-27 01:30:11 +01:00
|
|
|
/*-- cvt-openpgp.c --*/
|
|
|
|
gpg_error_t
|
|
|
|
extract_private_key (gcry_sexp_t s_key, int req_private_key_data,
|
|
|
|
const char **r_algoname, int *r_npkey, int *r_nskey,
|
2015-01-27 10:22:47 +01:00
|
|
|
const char **r_format,
|
|
|
|
gcry_mpi_t *mpi_array, int arraysize,
|
2015-01-27 01:30:11 +01:00
|
|
|
gcry_sexp_t *r_curve, gcry_sexp_t *r_flags);
|
|
|
|
|
2020-06-05 03:35:33 +02:00
|
|
|
/*-- sexp-secret.c --*/
|
|
|
|
gpg_error_t fixup_when_ecc_private_key (unsigned char *buf, size_t *buflen_p);
|
|
|
|
gpg_error_t sexp_sscan_private_key (gcry_sexp_t *result, size_t *r_erroff,
|
|
|
|
unsigned char *buf);
|
|
|
|
|
2003-08-05 19:11:04 +02:00
|
|
|
#endif /*AGENT_H*/
|