1
0
mirror of git://git.gnupg.org/gnupg.git synced 2024-12-22 10:19:57 +01:00
gnupg/g10/status.c

348 lines
8.4 KiB
C
Raw Normal View History

1998-01-30 16:23:16 +00:00
/* status.c
1998-02-24 18:50:46 +00:00
* Copyright (C) 1998 Free Software Foundation, Inc.
1998-01-30 16:23:16 +00:00
*
* This file is part of GnuPG.
1998-01-30 16:23:16 +00:00
*
* GnuPG is free software; you can redistribute it and/or modify
1998-01-30 16:23:16 +00:00
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation; either version 2 of the License, or
* (at your option) any later version.
*
* GnuPG is distributed in the hope that it will be useful,
1998-01-30 16:23:16 +00:00
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program; if not, write to the Free Software
* Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA
*/
#include <config.h>
#include <stdio.h>
#include <stdlib.h>
1998-02-03 12:09:20 +00:00
#include <string.h>
1998-07-31 16:45:58 +00:00
#include <errno.h>
1998-01-30 16:23:16 +00:00
#include <unistd.h>
1998-07-31 16:45:58 +00:00
#ifdef USE_SHM_COPROCESSING
#ifdef HAVE_SYS_IPC_H
#include <sys/ipc.h>
#endif
#ifdef HAVE_SYS_SHM_H
#include <sys/shm.h>
#endif
1998-09-28 19:25:31 +00:00
#if defined(HAVE_MLOCK)
#include <sys/mman.h>
#endif
1998-07-31 16:45:58 +00:00
#endif
#include "util.h"
1998-01-30 16:23:16 +00:00
#include "status.h"
1998-07-31 16:45:58 +00:00
#include "ttyio.h"
#include "options.h"
#include "main.h"
1998-08-08 19:27:00 +00:00
#include "i18n.h"
1998-01-30 16:23:16 +00:00
static int fd = -1;
1998-07-31 16:45:58 +00:00
#ifdef USE_SHM_COPROCESSING
static int shm_id = -1;
static volatile char *shm_area;
static size_t shm_size;
static int shm_is_locked;
#endif /*USE_SHM_COPROCESSING*/
1998-01-30 16:23:16 +00:00
void
1998-07-31 16:45:58 +00:00
set_status_fd ( int newfd )
1998-01-30 16:23:16 +00:00
{
fd = newfd;
}
int
is_status_enabled()
{
return fd != -1;
}
1998-01-30 16:23:16 +00:00
void
1998-07-31 16:45:58 +00:00
write_status ( int no )
1998-03-09 21:44:06 +00:00
{
write_status_text( no, NULL );
}
void
1998-07-31 16:45:58 +00:00
write_status_text ( int no, const char *text)
1998-01-30 16:23:16 +00:00
{
const char *s;
if( fd == -1 )
return; /* not enabled */
switch( no ) {
case STATUS_ENTER : s = "ENTER\n"; break;
case STATUS_LEAVE : s = "LEAVE\n"; break;
case STATUS_ABORT : s = "ABORT\n"; break;
case STATUS_GOODSIG: s = "GOODSIG\n"; break;
1998-06-25 10:19:08 +00:00
case STATUS_SIGEXPIRED: s = "SIGEXPIRED\n"; break;
1998-07-09 13:37:17 +00:00
case STATUS_KEYREVOKED: s = "KEYREVOKED\n"; break;
1998-01-30 16:23:16 +00:00
case STATUS_BADSIG : s = "BADSIG\n"; break;
case STATUS_ERRSIG : s = "ERRSIG\n"; break;
1998-02-04 18:54:31 +00:00
case STATUS_BADARMOR : s = "BADARMOR\n"; break;
1998-05-29 11:53:54 +00:00
case STATUS_RSA_OR_IDEA : s= "RSA_OR_IDEA\n"; break;
1998-07-09 13:37:17 +00:00
case STATUS_TRUST_UNDEFINED: s = "TRUST_UNDEFINED\n"; break;
case STATUS_TRUST_NEVER : s = "TRUST_NEVER\n"; break;
case STATUS_TRUST_MARGINAL : s = "TRUST_MARGINAL\n"; break;
case STATUS_TRUST_FULLY : s = "TRUST_FULLY\n"; break;
case STATUS_TRUST_ULTIMATE : s = "TRUST_ULTIMATE\n"; break;
1998-07-31 16:45:58 +00:00
case STATUS_SHM_INFO : s = "SHM_INFO\n"; break;
case STATUS_SHM_GET : s = "SHM_GET\n"; break;
case STATUS_SHM_GET_BOOL : s = "SHM_GET_BOOL\n"; break;
case STATUS_SHM_GET_HIDDEN : s = "SHM_GET_HIDDEN\n"; break;
1998-08-08 19:27:00 +00:00
case STATUS_NEED_PASSPHRASE: s = "NEED_PASSPHRASE\n"; break;
case STATUS_VALIDSIG : s = "VALIDSIG\n"; break;
case STATUS_SIG_ID : s = "SIG_ID\n"; break;
1998-01-30 16:23:16 +00:00
default: s = "?\n"; break;
}
1998-05-29 11:53:54 +00:00
write( fd, "[GNUPG:] ", 9 );
1998-03-09 21:44:06 +00:00
if( text ) {
write( fd, s, strlen(s)-1 );
write( fd, " ", 1 );
write( fd, text, strlen(text) );
write( fd, "\n", 1 );
}
else
write( fd, s, strlen(s) );
1998-01-30 16:23:16 +00:00
}
1998-07-31 16:45:58 +00:00
#ifdef USE_SHM_COPROCESSING
1998-09-14 15:49:56 +00:00
#ifndef IPC_RMID_DEFERRED_RELEASE
static void
remove_shmid( void )
{
if( shm_id != -1 ) {
shmctl ( shm_id, IPC_RMID, 0);
shm_id = -1;
}
}
#endif
1998-07-31 16:45:58 +00:00
void
init_shm_coprocessing ( ulong requested_shm_size, int lock_mem )
{
char buf[100];
1998-09-14 15:49:56 +00:00
struct shmid_ds shmds;
1998-07-31 16:45:58 +00:00
1998-09-14 15:49:56 +00:00
#ifndef IPC_RMID_DEFERRED_RELEASE
atexit( remove_shmid );
#endif
1998-07-31 16:45:58 +00:00
requested_shm_size = (requested_shm_size + 4095) & ~4095;
if ( requested_shm_size > 2 * 4096 )
log_fatal("too much shared memory requested; only 8k are allowed\n");
shm_size = 4096 /* one page for us */ + requested_shm_size;
1998-08-05 16:51:59 +00:00
shm_id = shmget( IPC_PRIVATE, shm_size, IPC_CREAT | 0700 );
1998-07-31 16:45:58 +00:00
if ( shm_id == -1 )
log_fatal("can't get %uk of shared memory: %s\n",
(unsigned)shm_size/1024, strerror(errno));
shm_area = shmat( shm_id, 0, 0 );
if ( shm_area == (char*)-1 )
log_fatal("can't attach %uk shared memory: %s\n",
(unsigned)shm_size/1024, strerror(errno));
1998-11-10 12:59:59 +00:00
log_debug("mapped %uk shared memory at %p, id=%d\n",
1998-07-31 16:45:58 +00:00
(unsigned)shm_size/1024, shm_area, shm_id );
if( lock_mem ) {
1998-09-28 19:25:31 +00:00
#ifdef IPC_HAVE_SHM_LOCK
1998-07-31 16:45:58 +00:00
if ( shmctl (shm_id, SHM_LOCK, 0) )
1998-09-28 19:25:31 +00:00
log_info("locking shared memory %d failed: %s\n",
1998-07-31 16:45:58 +00:00
shm_id, strerror(errno));
else
shm_is_locked = 1;
1998-09-28 19:25:31 +00:00
#elif defined(HAVE_MLOCK) && !defined(HAVE_BROKEN_MLOCK)
/* (need the cast for Solaris with Sun's workshop compilers) */
if ( mlock ( (char*)shm_area, shm_size) )
1998-09-28 19:25:31 +00:00
log_info("locking shared memory %d failed: %s\n",
shm_id, strerror(errno));
else
shm_is_locked = 1;
#else
log_info("Locking shared memory %d failed: No way to do it\n", shm_id );
#endif
1998-07-31 16:45:58 +00:00
}
1998-09-14 15:49:56 +00:00
1998-07-31 16:45:58 +00:00
#ifdef IPC_RMID_DEFERRED_RELEASE
1998-09-14 15:49:56 +00:00
if( shmctl( shm_id, IPC_RMID, 0) )
1998-07-31 16:45:58 +00:00
log_fatal("shmctl IPC_RMDID of %d failed: %s\n",
shm_id, strerror(errno));
#endif
1998-09-14 15:49:56 +00:00
if( shmctl( shm_id, IPC_STAT, &shmds ) )
log_fatal("shmctl IPC_STAT of %d failed: %s\n",
shm_id, strerror(errno));
if( shmds.shm_perm.uid != getuid() ) {
shmds.shm_perm.uid = getuid();
if( shmctl( shm_id, IPC_SET, &shmds ) )
log_fatal("shmctl IPC_SET of %d failed: %s\n",
shm_id, strerror(errno));
}
1998-07-31 16:45:58 +00:00
/* write info; Protocol version, id, size, locked size */
sprintf( buf, "pv=1 pid=%d shmid=%d sz=%u lz=%u", (int)getpid(),
shm_id, (unsigned)shm_size, shm_is_locked? (unsigned)shm_size:0 );
write_status_text( STATUS_SHM_INFO, buf );
}
/****************
* Request a string from client
* If bool, returns static string on true (do not free) or NULL for false
*/
static char *
do_shm_get( const char *keyword, int hidden, int bool )
{
size_t n;
byte *p;
char *string;
if( !shm_area )
BUG();
shm_area[0] = 0; /* msb of length of control block */
shm_area[1] = 32; /* and lsb */
shm_area[2] = 1; /* indicate that we are waiting on a reply */
shm_area[3] = 0; /* clear data available flag */
write_status_text( bool? STATUS_SHM_GET_BOOL :
hidden? STATUS_SHM_GET_HIDDEN : STATUS_SHM_GET, keyword );
do {
pause_on_sigusr(1);
if( shm_area[0] || shm_area[1] != 32 || shm_area[2] != 1 )
log_fatal("client modified shm control block - abort\n");
} while( !shm_area[3] );
shm_area[2] = 0; /* reset request flag */
p = (byte*)shm_area+32;
n = p[0] << 8 | p[1];
p += 2;
if( n+32+2+1 > 4095 )
log_fatal("client returns too large data (%u bytes)\n", (unsigned)n );
if( bool )
return p[0]? "" : NULL;
string = hidden? m_alloc_secure( n+1 ) : m_alloc( n+1 );
memcpy(string, p, n );
string[n] = 0; /* make sure it is a string */
if( hidden ) /* invalidate the memory */
memset( p, 0, n );
return string;
}
#endif /* USE_SHM_COPROCESSING */
1998-08-08 19:27:00 +00:00
1998-07-31 16:45:58 +00:00
int
cpr_enabled()
{
#ifdef USE_SHM_COPROCESSING
if( opt.shm_coprocess )
return 1;
#endif
return 0;
}
char *
cpr_get( const char *keyword, const char *prompt )
{
1998-08-08 19:27:00 +00:00
char *p;
1998-07-31 16:45:58 +00:00
#ifdef USE_SHM_COPROCESSING
if( opt.shm_coprocess )
return do_shm_get( keyword, 0, 0 );
#endif
1998-08-08 19:27:00 +00:00
for(;;) {
p = tty_get( prompt );
if( *p == '?' && !p[1] ) {
m_free(p);
display_online_help( keyword );
1998-08-08 19:27:00 +00:00
}
else
return p;
}
1998-07-31 16:45:58 +00:00
}
1998-11-10 12:59:59 +00:00
char *
cpr_get_utf8( const char *keyword, const char *prompt )
{
char *p;
p = cpr_get( keyword, prompt );
if( p ) {
char *utf8 = native_to_utf8( p );
m_free( p );
p = utf8;
}
return p;
}
1998-07-31 16:45:58 +00:00
char *
cpr_get_hidden( const char *keyword, const char *prompt )
{
1998-08-08 19:27:00 +00:00
char *p;
1998-07-31 16:45:58 +00:00
#ifdef USE_SHM_COPROCESSING
if( opt.shm_coprocess )
return do_shm_get( keyword, 1, 0 );
#endif
1998-08-08 19:27:00 +00:00
for(;;) {
p = tty_get_hidden( prompt );
if( *p == '?' && !p[1] ) {
m_free(p);
display_online_help( keyword );
1998-08-08 19:27:00 +00:00
}
else
return p;
}
1998-07-31 16:45:58 +00:00
}
void
cpr_kill_prompt(void)
{
#ifdef USE_SHM_COPROCESSING
if( opt.shm_coprocess )
return;
#endif
tty_kill_prompt();
return;
1998-07-31 16:45:58 +00:00
}
int
cpr_get_answer_is_yes( const char *keyword, const char *prompt )
{
1998-08-11 17:29:34 +00:00
int yes;
char *p;
1998-07-31 16:45:58 +00:00
#ifdef USE_SHM_COPROCESSING
if( opt.shm_coprocess )
return !!do_shm_get( keyword, 0, 1 );
#endif
1998-08-11 17:29:34 +00:00
for(;;) {
p = tty_get( prompt );
trim_spaces(p); /* it is okay to do this here */
if( *p == '?' && !p[1] ) {
m_free(p);
display_online_help( keyword );
1998-08-11 17:29:34 +00:00
}
else {
tty_kill_prompt();
yes = answer_is_yes(p);
m_free(p);
return yes;
}
}
1998-07-31 16:45:58 +00:00
}