mirror of
git://git.gnupg.org/gnupg.git
synced 2025-07-14 21:47:19 +02:00
Merge branch 'switch-to-gpgk' into master
-- Resolved Conflicts: * common/asshelp.c: Keep the new code in master for spawing under Windows. * g10/Makefile.am: Keep all new file. * g10/photoid.c: Pass CTRL to pct_expando. Signed-off-by: Werner Koch <wk@gnupg.org>
This commit is contained in:
commit
9698761933
61 changed files with 7194 additions and 507 deletions
|
@ -18,16 +18,20 @@
|
|||
|
||||
## Process this file with automake to produce Makefile.in
|
||||
|
||||
EXTRA_DIST = mkerrors
|
||||
EXTRA_DIST = mkerrors keyboxd-w32info.rc
|
||||
|
||||
AM_CPPFLAGS =
|
||||
|
||||
include $(top_srcdir)/am/cmacros.am
|
||||
if HAVE_W32_SYSTEM
|
||||
resource_objs += keyboxd-w32info.o
|
||||
endif
|
||||
|
||||
AM_CFLAGS = $(LIBGCRYPT_CFLAGS) $(KSBA_CFLAGS)
|
||||
|
||||
noinst_LIBRARIES = libkeybox.a libkeybox509.a
|
||||
bin_PROGRAMS = kbxutil
|
||||
libexec_PROGRAMS = keyboxd
|
||||
|
||||
if HAVE_W32CE_SYSTEM
|
||||
extra_libs = $(LIBASSUAN_LIBS)
|
||||
|
@ -35,6 +39,9 @@ else
|
|||
extra_libs =
|
||||
endif
|
||||
|
||||
common_libs = $(libcommon)
|
||||
commonpth_libs = $(libcommonpth)
|
||||
|
||||
common_sources = \
|
||||
keybox.h keybox-defs.h keybox-search-desc.h \
|
||||
keybox-util.c \
|
||||
|
@ -59,9 +66,31 @@ libkeybox509_a_CFLAGS = $(AM_CFLAGS) -DKEYBOX_WITH_X509=1
|
|||
# to do it this way.
|
||||
kbxutil_SOURCES = kbxutil.c $(common_sources)
|
||||
kbxutil_CFLAGS = $(AM_CFLAGS) -DKEYBOX_WITH_X509=1
|
||||
kbxutil_LDADD = ../common/libcommon.a \
|
||||
kbxutil_LDADD = $(common_libs) \
|
||||
$(KSBA_LIBS) $(LIBGCRYPT_LIBS) $(extra_libs) \
|
||||
$(GPG_ERROR_LIBS) $(LIBINTL) $(LIBICONV) $(W32SOCKLIBS) \
|
||||
$(NETLIBS)
|
||||
|
||||
$(PROGRAMS) : ../common/libcommon.a
|
||||
|
||||
keyboxd_SOURCES = \
|
||||
keyboxd.c keyboxd.h \
|
||||
kbxserver.c \
|
||||
frontend.c frontend.h \
|
||||
backend.h backend-support.c \
|
||||
backend-cache.c \
|
||||
backend-kbx.c \
|
||||
$(common_sources)
|
||||
|
||||
keyboxd_CFLAGS = $(AM_CFLAGS) $(LIBASSUAN_CFLAGS) $(NPTH_CFLAGS) \
|
||||
$(INCICONV)
|
||||
keyboxd_LDADD = $(commonpth_libs) \
|
||||
$(LIBGCRYPT_LIBS) $(LIBASSUAN_LIBS) $(NPTH_LIBS) \
|
||||
$(GPG_ERROR_LIBS) $(LIBINTL) $(NETLIBS) $(LIBICONV) \
|
||||
$(resource_objs)
|
||||
keyboxd_LDFLAGS = $(extra_bin_ldflags)
|
||||
keyboxd_DEPENDENCIES = $(resource_objs)
|
||||
|
||||
|
||||
# Make sure that all libs are build before we use them. This is
|
||||
# important for things like make -j2.
|
||||
$(PROGRAMS): $(common_libs) $(commonpth_libs)
|
||||
|
|
1190
kbx/backend-cache.c
Normal file
1190
kbx/backend-cache.c
Normal file
File diff suppressed because it is too large
Load diff
328
kbx/backend-kbx.c
Normal file
328
kbx/backend-kbx.c
Normal file
|
@ -0,0 +1,328 @@
|
|||
/* backend-kbx.c - Keybox format backend for keyboxd
|
||||
* Copyright (C) 2019 g10 Code GmbH
|
||||
*
|
||||
* This file is part of GnuPG.
|
||||
*
|
||||
* GnuPG is free software; you can redistribute it and/or modify
|
||||
* it under the terms of the GNU General Public License as published by
|
||||
* the Free Software Foundation; either version 3 of the License, or
|
||||
* (at your option) any later version.
|
||||
*
|
||||
* GnuPG is distributed in the hope that it will be useful,
|
||||
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
* GNU General Public License for more details.
|
||||
*
|
||||
* You should have received a copy of the GNU General Public License
|
||||
* along with this program; if not, see <https://www.gnu.org/licenses/>.
|
||||
* SPDX-License-Identifier: GPL-3.0-or-later
|
||||
*/
|
||||
|
||||
#include <config.h>
|
||||
#include <stdio.h>
|
||||
#include <stdlib.h>
|
||||
#include <stddef.h>
|
||||
#include <string.h>
|
||||
|
||||
#include "keyboxd.h"
|
||||
#include "../common/i18n.h"
|
||||
#include "backend.h"
|
||||
#include "keybox.h"
|
||||
|
||||
|
||||
/* Our definition of the backend handle. */
|
||||
struct backend_handle_s
|
||||
{
|
||||
enum database_types db_type; /* Always DB_TYPE_KBX. */
|
||||
unsigned int backend_id; /* Always the id of the backend. */
|
||||
|
||||
void *token; /* Used to create a new KEYBOX_HANDLE. */
|
||||
char filename[1];
|
||||
};
|
||||
|
||||
|
||||
/* Check that the file FILENAME is a valid keybox file which can be
|
||||
* used here. Common return codes:
|
||||
*
|
||||
* 0 := Valid keybox file
|
||||
* GPG_ERR_ENOENT := No such file
|
||||
* GPG_ERR_NO_OBJ := File exists with size zero.
|
||||
* GPG_ERR_INV_OBJ:= File exists but is not a keybox file.
|
||||
*/
|
||||
static gpg_error_t
|
||||
check_kbx_file_magic (const char *filename)
|
||||
{
|
||||
gpg_error_t err;
|
||||
u32 magic;
|
||||
unsigned char verbuf[4];
|
||||
estream_t fp;
|
||||
|
||||
fp = es_fopen (filename, "rb");
|
||||
if (!fp)
|
||||
return gpg_error_from_syserror ();
|
||||
|
||||
err = gpg_error (GPG_ERR_INV_OBJ);
|
||||
if (es_fread (&magic, 4, 1, fp) == 1 )
|
||||
{
|
||||
if (es_fread (&verbuf, 4, 1, fp) == 1
|
||||
&& verbuf[0] == 1
|
||||
&& es_fread (&magic, 4, 1, fp) == 1
|
||||
&& !memcmp (&magic, "KBXf", 4))
|
||||
{
|
||||
err = 0;
|
||||
}
|
||||
}
|
||||
else /* Maybe empty: Let's create it. */
|
||||
err = gpg_error (GPG_ERR_NO_OBJ);
|
||||
|
||||
es_fclose (fp);
|
||||
return err;
|
||||
}
|
||||
|
||||
|
||||
/* Create new keybox file. This can also be used if the keybox
|
||||
* already exists but has a length of zero. Do not use it in any
|
||||
* other cases. */
|
||||
static gpg_error_t
|
||||
create_keybox (const char *filename)
|
||||
{
|
||||
gpg_error_t err;
|
||||
dotlock_t lockhd = NULL;
|
||||
estream_t fp;
|
||||
|
||||
/* To avoid races with other temporary instances of keyboxd trying
|
||||
* to create or update the keybox, we do the next stuff in a locked
|
||||
* state. */
|
||||
lockhd = dotlock_create (filename, 0);
|
||||
if (!lockhd)
|
||||
{
|
||||
err = gpg_error_from_syserror ();
|
||||
/* A reason for this to fail is that the directory is not
|
||||
* writable. However, this whole locking stuff does not make
|
||||
* sense if this is the case. An empty non-writable directory
|
||||
* with no keybox is not really useful at all. */
|
||||
if (opt.verbose)
|
||||
log_info ("can't allocate lock for '%s': %s\n",
|
||||
filename, gpg_strerror (err));
|
||||
return err;
|
||||
}
|
||||
|
||||
if ( dotlock_take (lockhd, -1) )
|
||||
{
|
||||
err = gpg_error_from_syserror ();
|
||||
/* This is something bad. Probably a stale lockfile. */
|
||||
log_info ("can't lock '%s': %s\n", filename, gpg_strerror (err));
|
||||
goto leave;
|
||||
}
|
||||
|
||||
/* Make sure that at least one record is in a new keybox file, so
|
||||
* that the detection magic will work the next time it is used.
|
||||
* We always set the OpenPGP blobs maybe availabale flag. */
|
||||
fp = es_fopen (filename, "w+b,mode=-rw-------");
|
||||
if (!fp)
|
||||
{
|
||||
err = gpg_error_from_syserror ();
|
||||
log_error (_("error creating keybox '%s': %s\n"),
|
||||
filename, gpg_strerror (err));
|
||||
goto leave;
|
||||
}
|
||||
err = _keybox_write_header_blob (NULL, fp, 1);
|
||||
es_fclose (fp);
|
||||
if (err)
|
||||
{
|
||||
log_error (_("error creating keybox '%s': %s\n"),
|
||||
filename, gpg_strerror (err));
|
||||
goto leave;
|
||||
}
|
||||
|
||||
if (!opt.quiet)
|
||||
log_info (_("keybox '%s' created\n"), filename);
|
||||
err = 0;
|
||||
|
||||
leave:
|
||||
if (lockhd)
|
||||
{
|
||||
dotlock_release (lockhd);
|
||||
dotlock_destroy (lockhd);
|
||||
}
|
||||
return err;
|
||||
}
|
||||
|
||||
|
||||
|
||||
/* Install a new resource and return a handle for that backend. */
|
||||
gpg_error_t
|
||||
be_kbx_add_resource (ctrl_t ctrl, backend_handle_t *r_hd,
|
||||
const char *filename, int readonly)
|
||||
{
|
||||
gpg_error_t err;
|
||||
backend_handle_t hd;
|
||||
void *token;
|
||||
|
||||
(void)ctrl;
|
||||
|
||||
*r_hd = NULL;
|
||||
hd = xtrycalloc (1, sizeof *hd + strlen (filename));
|
||||
if (!hd)
|
||||
return gpg_error_from_syserror ();
|
||||
hd->db_type = DB_TYPE_KBX;
|
||||
strcpy (hd->filename, filename);
|
||||
|
||||
err = check_kbx_file_magic (filename);
|
||||
switch (gpg_err_code (err))
|
||||
{
|
||||
case 0:
|
||||
break;
|
||||
case GPG_ERR_ENOENT:
|
||||
case GPG_ERR_NO_OBJ:
|
||||
if (readonly)
|
||||
{
|
||||
err = gpg_error (GPG_ERR_ENOENT);
|
||||
goto leave;
|
||||
}
|
||||
err = create_keybox (filename);
|
||||
if (err)
|
||||
goto leave;
|
||||
break;
|
||||
default:
|
||||
goto leave;
|
||||
}
|
||||
|
||||
err = keybox_register_file (filename, 0, &token);
|
||||
if (err)
|
||||
goto leave;
|
||||
|
||||
hd->backend_id = be_new_backend_id ();
|
||||
hd->token = token;
|
||||
|
||||
*r_hd = hd;
|
||||
hd = NULL;
|
||||
|
||||
leave:
|
||||
xfree (hd);
|
||||
return err;
|
||||
}
|
||||
|
||||
|
||||
/* Release the backend handle HD and all its resources. HD is not
|
||||
* valid after a call to this function. */
|
||||
void
|
||||
be_kbx_release_resource (ctrl_t ctrl, backend_handle_t hd)
|
||||
{
|
||||
(void)ctrl;
|
||||
|
||||
if (!hd)
|
||||
return;
|
||||
hd->db_type = DB_TYPE_NONE;
|
||||
|
||||
xfree (hd);
|
||||
}
|
||||
|
||||
|
||||
void
|
||||
be_kbx_release_kbx_hd (KEYBOX_HANDLE kbx_hd)
|
||||
{
|
||||
keybox_release (kbx_hd);
|
||||
}
|
||||
|
||||
|
||||
/* Helper for be_find_request_part to initialize a kbx request part. */
|
||||
gpg_error_t
|
||||
be_kbx_init_request_part (backend_handle_t backend_hd, db_request_part_t part)
|
||||
{
|
||||
part->kbx_hd = keybox_new_openpgp (backend_hd->token, 0);
|
||||
if (!part->kbx_hd)
|
||||
return gpg_error_from_syserror ();
|
||||
return 0;
|
||||
}
|
||||
|
||||
|
||||
/* Search for the keys described by (DESC,NDESC) and return them to
|
||||
* the caller. BACKEND_HD is the handle for this backend and REQUEST
|
||||
* is the current database request object. */
|
||||
gpg_error_t
|
||||
be_kbx_search (ctrl_t ctrl, backend_handle_t backend_hd, db_request_t request,
|
||||
KEYDB_SEARCH_DESC *desc, unsigned int ndesc)
|
||||
{
|
||||
gpg_error_t err;
|
||||
db_request_part_t part;
|
||||
size_t descindex;
|
||||
unsigned long skipped_long_blobs;
|
||||
|
||||
log_assert (backend_hd && backend_hd->db_type == DB_TYPE_KBX);
|
||||
log_assert (request);
|
||||
|
||||
/* Find the specific request part or allocate it. */
|
||||
err = be_find_request_part (backend_hd, request, &part);
|
||||
if (err)
|
||||
goto leave;
|
||||
|
||||
if (!desc)
|
||||
err = keybox_search_reset (part->kbx_hd);
|
||||
else
|
||||
err = keybox_search (part->kbx_hd, desc, ndesc, KEYBOX_BLOBTYPE_PGP,
|
||||
&descindex, &skipped_long_blobs);
|
||||
if (err == -1)
|
||||
err = gpg_error (GPG_ERR_EOF);
|
||||
|
||||
if (desc && !err)
|
||||
{
|
||||
/* Successful search operation. */
|
||||
void *buffer;
|
||||
size_t buflen;
|
||||
enum pubkey_types pubkey_type;
|
||||
unsigned char blobid[20];
|
||||
|
||||
err = keybox_get_data (part->kbx_hd, &buffer, &buflen, &pubkey_type);
|
||||
if (err)
|
||||
goto leave;
|
||||
gcry_md_hash_buffer (GCRY_MD_SHA1, blobid, buffer, buflen);
|
||||
err = be_return_pubkey (ctrl, buffer, buflen, pubkey_type, blobid);
|
||||
if (!err)
|
||||
be_cache_pubkey (ctrl, blobid, buffer, buflen, pubkey_type);
|
||||
xfree (buffer);
|
||||
}
|
||||
|
||||
leave:
|
||||
return err;
|
||||
}
|
||||
|
||||
|
||||
/* Seek in the keybox to the given UBID. BACKEND_HD is the handle for
|
||||
* this backend and REQUEST is the current database request object.
|
||||
* This does a dummy read so that the next search operation starts
|
||||
* right after that UBID. */
|
||||
gpg_error_t
|
||||
be_kbx_seek (ctrl_t ctrl, backend_handle_t backend_hd,
|
||||
db_request_t request, unsigned char *ubid)
|
||||
{
|
||||
gpg_error_t err;
|
||||
db_request_part_t part;
|
||||
size_t descindex;
|
||||
unsigned long skipped_long_blobs;
|
||||
KEYDB_SEARCH_DESC desc;
|
||||
|
||||
(void)ctrl;
|
||||
|
||||
log_assert (backend_hd && backend_hd->db_type == DB_TYPE_KBX);
|
||||
log_assert (request);
|
||||
|
||||
memset (&desc, 0, sizeof desc);
|
||||
desc.mode = KEYDB_SEARCH_MODE_UBID;
|
||||
memcpy (desc.u.ubid, ubid, 20);
|
||||
|
||||
/* Find the specific request part or allocate it. */
|
||||
err = be_find_request_part (backend_hd, request, &part);
|
||||
if (err)
|
||||
goto leave;
|
||||
|
||||
err = keybox_search_reset (part->kbx_hd);
|
||||
if (!err)
|
||||
err = keybox_search (part->kbx_hd, &desc, 1, 0,
|
||||
&descindex, &skipped_long_blobs);
|
||||
if (err == -1)
|
||||
err = gpg_error (GPG_ERR_EOF);
|
||||
|
||||
leave:
|
||||
return err;
|
||||
}
|
171
kbx/backend-support.c
Normal file
171
kbx/backend-support.c
Normal file
|
@ -0,0 +1,171 @@
|
|||
/* backend-support.c - Supporting functions for the backend.
|
||||
* Copyright (C) 2019 g10 Code GmbH
|
||||
*
|
||||
* This file is part of GnuPG.
|
||||
*
|
||||
* GnuPG is free software; you can redistribute it and/or modify
|
||||
* it under the terms of the GNU General Public License as published by
|
||||
* the Free Software Foundation; either version 3 of the License, or
|
||||
* (at your option) any later version.
|
||||
*
|
||||
* GnuPG is distributed in the hope that it will be useful,
|
||||
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
* GNU General Public License for more details.
|
||||
*
|
||||
* You should have received a copy of the GNU General Public License
|
||||
* along with this program; if not, see <https://www.gnu.org/licenses/>.
|
||||
* SPDX-License-Identifier: GPL-3.0+
|
||||
*/
|
||||
|
||||
#include <config.h>
|
||||
#include <stdio.h>
|
||||
#include <stdlib.h>
|
||||
#include <stddef.h>
|
||||
#include <string.h>
|
||||
|
||||
#include "keyboxd.h"
|
||||
#include "../common/i18n.h"
|
||||
#include "../common/asshelp.h"
|
||||
#include "backend.h"
|
||||
#include "keybox.h"
|
||||
|
||||
|
||||
/* Common definition part of all backend handle. All definitions of
|
||||
* this structure must start with these fields. */
|
||||
struct backend_handle_s
|
||||
{
|
||||
enum database_types db_type;
|
||||
unsigned int backend_id;
|
||||
};
|
||||
|
||||
|
||||
|
||||
/* Return a string with the name of the database type T. */
|
||||
const char *
|
||||
strdbtype (enum database_types t)
|
||||
{
|
||||
switch (t)
|
||||
{
|
||||
case DB_TYPE_NONE: return "none";
|
||||
case DB_TYPE_CACHE:return "cache";
|
||||
case DB_TYPE_KBX: return "keybox";
|
||||
}
|
||||
return "?";
|
||||
}
|
||||
|
||||
|
||||
/* Return a new backend ID. Backend IDs are used to identify backends
|
||||
* without using the actual object. The number of backend resources
|
||||
* is limited because they are specified in the config file. Thus an
|
||||
* overflow check is not required. */
|
||||
unsigned int
|
||||
be_new_backend_id (void)
|
||||
{
|
||||
static unsigned int last;
|
||||
|
||||
return ++last;
|
||||
}
|
||||
|
||||
|
||||
/* Release the backend described by HD. This is a generic function
|
||||
* which dispatches to the the actual backend. */
|
||||
void
|
||||
be_generic_release_backend (ctrl_t ctrl, backend_handle_t hd)
|
||||
{
|
||||
if (!hd)
|
||||
return;
|
||||
switch (hd->db_type)
|
||||
{
|
||||
case DB_TYPE_NONE:
|
||||
xfree (hd);
|
||||
break;
|
||||
case DB_TYPE_CACHE:
|
||||
be_cache_release_resource (ctrl, hd);
|
||||
break;
|
||||
case DB_TYPE_KBX:
|
||||
be_kbx_release_resource (ctrl, hd);
|
||||
break;
|
||||
default:
|
||||
log_error ("%s: faulty backend handle of type %d given\n",
|
||||
__func__, hd->db_type);
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
/* Release the request object REQ. */
|
||||
void
|
||||
be_release_request (db_request_t req)
|
||||
{
|
||||
db_request_part_t part, partn;
|
||||
|
||||
if (!req)
|
||||
return;
|
||||
|
||||
for (part = req->part; part; part = partn)
|
||||
{
|
||||
partn = part->next;
|
||||
be_kbx_release_kbx_hd (part->kbx_hd);
|
||||
xfree (part);
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
/* Given the backend handle BACKEND_HD and the REQUEST find or
|
||||
* allocate a request part for that backend and store it at R_PART.
|
||||
* On error R_PART is set to NULL and an error returned. */
|
||||
gpg_error_t
|
||||
be_find_request_part (backend_handle_t backend_hd, db_request_t request,
|
||||
db_request_part_t *r_part)
|
||||
{
|
||||
gpg_error_t err;
|
||||
db_request_part_t part;
|
||||
|
||||
for (part = request->part; part; part = part->next)
|
||||
if (part->backend_id == backend_hd->backend_id)
|
||||
break;
|
||||
if (!part)
|
||||
{
|
||||
part = xtrycalloc (1, sizeof *part);
|
||||
if (!part)
|
||||
return gpg_error_from_syserror ();
|
||||
part->backend_id = backend_hd->backend_id;
|
||||
if (backend_hd->db_type == DB_TYPE_KBX)
|
||||
{
|
||||
err = be_kbx_init_request_part (backend_hd, part);
|
||||
if (err)
|
||||
{
|
||||
xfree (part);
|
||||
return err;
|
||||
}
|
||||
}
|
||||
part->next = request->part;
|
||||
request->part = part;
|
||||
}
|
||||
*r_part = part;
|
||||
return 0;
|
||||
}
|
||||
|
||||
|
||||
/* Return the public key (BUFFER,BUFLEN) which has the type
|
||||
* PUBKEY_TYPE to the caller. */
|
||||
gpg_error_t
|
||||
be_return_pubkey (ctrl_t ctrl, const void *buffer, size_t buflen,
|
||||
enum pubkey_types pubkey_type, const unsigned char *ubid)
|
||||
{
|
||||
gpg_error_t err;
|
||||
char hexubid[41];
|
||||
|
||||
bin2hex (ubid, 20, hexubid);
|
||||
err = status_printf (ctrl, "PUBKEY_INFO", "%d %s", pubkey_type, hexubid);
|
||||
if (err)
|
||||
goto leave;
|
||||
|
||||
if (ctrl->no_data_return)
|
||||
err = 0;
|
||||
else
|
||||
err = kbxd_write_data_line(ctrl, buffer, buflen);
|
||||
|
||||
leave:
|
||||
return err;
|
||||
}
|
140
kbx/backend.h
Normal file
140
kbx/backend.h
Normal file
|
@ -0,0 +1,140 @@
|
|||
/* backend.h - Definitions for keyboxd backends
|
||||
* Copyright (C) 2019 g10 Code GmbH
|
||||
*
|
||||
* This file is part of GnuPG.
|
||||
*
|
||||
* GnuPG is free software; you can redistribute it and/or modify
|
||||
* it under the terms of the GNU General Public License as published by
|
||||
* the Free Software Foundation; either version 3 of the License, or
|
||||
* (at your option) any later version.
|
||||
*
|
||||
* GnuPG is distributed in the hope that it will be useful,
|
||||
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
* GNU General Public License for more details.
|
||||
*
|
||||
* You should have received a copy of the GNU General Public License
|
||||
* along with this program; if not, see <https://www.gnu.org/licenses/>.
|
||||
*/
|
||||
|
||||
#ifndef KBX_BACKEND_H
|
||||
#define KBX_BACKEND_H
|
||||
|
||||
#include "keybox-search-desc.h"
|
||||
|
||||
/* Forward declaration of the keybox handle type. */
|
||||
struct keybox_handle;
|
||||
typedef struct keybox_handle *KEYBOX_HANDLE;
|
||||
|
||||
|
||||
/* The types of the backends. */
|
||||
enum database_types
|
||||
{
|
||||
DB_TYPE_NONE, /* No database at all (unitialized etc.). */
|
||||
DB_TYPE_CACHE, /* The cache backend (backend-cache.c). */
|
||||
DB_TYPE_KBX /* Keybox type database (backend-kbx.c). */
|
||||
};
|
||||
|
||||
|
||||
/* Declaration of the backend handle. Each backend uses its own
|
||||
* hidden handle structure with the only common thing being that the
|
||||
* first field is the database_type to help with debugging. */
|
||||
struct backend_handle_s;
|
||||
typedef struct backend_handle_s *backend_handle_t;
|
||||
|
||||
|
||||
/* Object to store backend specific database information per database
|
||||
* handle. */
|
||||
struct db_request_part_s
|
||||
{
|
||||
struct db_request_part_s *next;
|
||||
|
||||
/* Id of the backend instance this object pertains to. */
|
||||
unsigned int backend_id;
|
||||
|
||||
/* The handle used for a KBX backend or NULL. */
|
||||
KEYBOX_HANDLE kbx_hd;
|
||||
|
||||
/* For the CACHE backend the indices into the bloblist for each
|
||||
* index type. */
|
||||
struct {
|
||||
unsigned int fpr;
|
||||
unsigned int kid;
|
||||
unsigned int grip;
|
||||
unsigned int ubid;
|
||||
} cache_seqno;
|
||||
};
|
||||
typedef struct db_request_part_s *db_request_part_t;
|
||||
|
||||
|
||||
/* A database request handle. This keeps per session search
|
||||
* information as well as a list of per-backend infos. */
|
||||
struct db_request_s
|
||||
{
|
||||
unsigned int any_search:1; /* Any search has been done. */
|
||||
unsigned int any_found:1; /* Any object has been found. */
|
||||
unsigned int last_cached_valid:1; /* see below */
|
||||
unsigned int last_cached_final:1; /* see below */
|
||||
unsigned int last_cached_fprlen:8;/* see below */
|
||||
|
||||
db_request_part_t part;
|
||||
|
||||
/* Counter to track the next to be searched database index. */
|
||||
unsigned int next_dbidx;
|
||||
|
||||
/* The last UBID found in the cache and the corresponding keyid and,
|
||||
* if found via fpr, the fingerprint. For the LAST_CACHE_FPRLEN see
|
||||
* above. The entry here is only valid if LAST_CACHE_VALID is set;
|
||||
* if LAST_CACHE_FINAL is also set, this indicates that no further
|
||||
* database searches are required. */
|
||||
unsigned char last_cached_ubid[20];
|
||||
u32 last_cached_kid_h;
|
||||
u32 last_cached_kid_l;
|
||||
unsigned char last_cached_fpr[32];
|
||||
};
|
||||
|
||||
|
||||
|
||||
/*-- backend-support.c --*/
|
||||
const char *strdbtype (enum database_types t);
|
||||
unsigned int be_new_backend_id (void);
|
||||
void be_generic_release_backend (ctrl_t ctrl, backend_handle_t hd);
|
||||
void be_release_request (db_request_t req);
|
||||
gpg_error_t be_find_request_part (backend_handle_t backend_hd,
|
||||
db_request_t request,
|
||||
db_request_part_t *r_part);
|
||||
gpg_error_t be_return_pubkey (ctrl_t ctrl, const void *buffer, size_t buflen,
|
||||
enum pubkey_types pubkey_type,
|
||||
const unsigned char *ubid);
|
||||
|
||||
|
||||
/*-- backend-cache.c --*/
|
||||
gpg_error_t be_cache_add_resource (ctrl_t ctrl, backend_handle_t *r_hd);
|
||||
void be_cache_release_resource (ctrl_t ctrl, backend_handle_t hd);
|
||||
gpg_error_t be_cache_search (ctrl_t ctrl, backend_handle_t backend_hd,
|
||||
db_request_t request,
|
||||
KEYDB_SEARCH_DESC *desc, unsigned int ndesc);
|
||||
void be_cache_mark_final (ctrl_t ctrl, db_request_t request);
|
||||
void be_cache_pubkey (ctrl_t ctrl, const unsigned char *ubid,
|
||||
const void *blob, unsigned int bloblen,
|
||||
enum pubkey_types pubkey_type);
|
||||
void be_cache_not_found (ctrl_t ctrl, enum pubkey_types pubkey_type,
|
||||
KEYDB_SEARCH_DESC *desc, unsigned int ndesc);
|
||||
|
||||
|
||||
/*-- backend-kbx.c --*/
|
||||
gpg_error_t be_kbx_add_resource (ctrl_t ctrl, backend_handle_t *r_hd,
|
||||
const char *filename, int readonly);
|
||||
void be_kbx_release_resource (ctrl_t ctrl, backend_handle_t hd);
|
||||
|
||||
void be_kbx_release_kbx_hd (KEYBOX_HANDLE kbx_hd);
|
||||
gpg_error_t be_kbx_init_request_part (backend_handle_t backend_hd,
|
||||
db_request_part_t part);
|
||||
gpg_error_t be_kbx_search (ctrl_t ctrl, backend_handle_t hd,
|
||||
db_request_t request,
|
||||
KEYDB_SEARCH_DESC *desc, unsigned int ndesc);
|
||||
gpg_error_t be_kbx_seek (ctrl_t ctrl, backend_handle_t backend_hd,
|
||||
db_request_t request, unsigned char *ubid);
|
||||
|
||||
|
||||
#endif /*KBX_BACKEND_H*/
|
385
kbx/frontend.c
Normal file
385
kbx/frontend.c
Normal file
|
@ -0,0 +1,385 @@
|
|||
/* frontend.c - Database fronend code for keyboxd
|
||||
* Copyright (C) 2019 g10 Code GmbH
|
||||
*
|
||||
* This file is part of GnuPG.
|
||||
*
|
||||
* GnuPG is free software; you can redistribute it and/or modify
|
||||
* it under the terms of the GNU General Public License as published by
|
||||
* the Free Software Foundation; either version 3 of the License, or
|
||||
* (at your option) any later version.
|
||||
*
|
||||
* GnuPG is distributed in the hope that it will be useful,
|
||||
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
* GNU General Public License for more details.
|
||||
*
|
||||
* You should have received a copy of the GNU General Public License
|
||||
* along with this program; if not, see <https://www.gnu.org/licenses/>.
|
||||
* SPDX-License-Identifier: GPL-3.0+
|
||||
*/
|
||||
|
||||
#include <config.h>
|
||||
#include <stdio.h>
|
||||
#include <stdlib.h>
|
||||
#include <stddef.h>
|
||||
#include <string.h>
|
||||
|
||||
#include "keyboxd.h"
|
||||
#include <assuan.h>
|
||||
#include "../common/i18n.h"
|
||||
#include "../common/userids.h"
|
||||
#include "backend.h"
|
||||
#include "frontend.h"
|
||||
|
||||
|
||||
/* An object to describe a single database. */
|
||||
struct db_desc_s
|
||||
{
|
||||
enum database_types db_type;
|
||||
backend_handle_t backend_handle;
|
||||
};
|
||||
typedef struct db_desc_s *db_desc_t;
|
||||
|
||||
|
||||
/* The table of databases and the size of that table. */
|
||||
static db_desc_t databases;
|
||||
static unsigned int no_of_databases;
|
||||
|
||||
|
||||
|
||||
|
||||
/* Take a lock for reading the databases. */
|
||||
static void
|
||||
take_read_lock (ctrl_t ctrl)
|
||||
{
|
||||
/* FIXME */
|
||||
(void)ctrl;
|
||||
}
|
||||
|
||||
|
||||
/* Take a lock for reading and writing the databases. */
|
||||
/* static void */
|
||||
/* take_read_write_lock (ctrl_t ctrl) */
|
||||
/* { */
|
||||
/* /\* FIXME *\/ */
|
||||
/* (void)ctrl; */
|
||||
/* } */
|
||||
|
||||
|
||||
/* Release a lock. It is valid to call this even if no lock has been
|
||||
* taken in which case this is a nop. */
|
||||
static void
|
||||
release_lock (ctrl_t ctrl)
|
||||
{
|
||||
/* FIXME */
|
||||
(void)ctrl;
|
||||
}
|
||||
|
||||
|
||||
/* Add a new resource to the database. Depending on the FILENAME
|
||||
* suffix we decide which one to use. This function must be called at
|
||||
* daemon startup because it employs no locking. If FILENAME has no
|
||||
* directory separator, the file is expected or created below
|
||||
* "$GNUPGHOME/public-keys-v1.d/". In READONLY mode the file must
|
||||
* exists; otherwise it is created. */
|
||||
gpg_error_t
|
||||
kbxd_add_resource (ctrl_t ctrl, const char *filename_arg, int readonly)
|
||||
{
|
||||
gpg_error_t err;
|
||||
char *filename;
|
||||
enum database_types db_type = 0;
|
||||
backend_handle_t handle = NULL;
|
||||
unsigned int n, dbidx;
|
||||
|
||||
/* Do tilde expansion etc. */
|
||||
if (!strcmp (filename_arg, "[cache]"))
|
||||
{
|
||||
filename = xstrdup (filename_arg);
|
||||
db_type = DB_TYPE_CACHE;
|
||||
}
|
||||
else if (strchr (filename_arg, DIRSEP_C)
|
||||
#ifdef HAVE_W32_SYSTEM
|
||||
|| strchr (filename_arg, '/') /* Windows also accepts a slash. */
|
||||
#endif
|
||||
)
|
||||
filename = make_filename (filename_arg, NULL);
|
||||
else
|
||||
filename = make_filename (gnupg_homedir (), GNUPG_PUBLIC_KEYS_DIR,
|
||||
filename_arg, NULL);
|
||||
|
||||
/* If this is the first call to the function and the request is not
|
||||
* for the cache backend, add the cache backend so that it will
|
||||
* always be the first to be queried. */
|
||||
if (!no_of_databases && !db_type)
|
||||
{
|
||||
err = kbxd_add_resource (ctrl, "[cache]", 0);
|
||||
if (err)
|
||||
goto leave;
|
||||
}
|
||||
|
||||
n = strlen (filename);
|
||||
if (db_type)
|
||||
; /* We already know it. */
|
||||
else if (n > 4 && !strcmp (filename + n - 4, ".kbx"))
|
||||
db_type = DB_TYPE_KBX;
|
||||
else
|
||||
{
|
||||
log_error (_("can't use file '%s': %s\n"), filename, _("unknown suffix"));
|
||||
err = gpg_error (GPG_ERR_NOT_SUPPORTED);
|
||||
goto leave;
|
||||
}
|
||||
|
||||
err = gpg_error (GPG_ERR_BUG);
|
||||
switch (db_type)
|
||||
{
|
||||
case DB_TYPE_NONE: /* NOTREACHED */
|
||||
break;
|
||||
|
||||
case DB_TYPE_CACHE:
|
||||
err = be_cache_add_resource (ctrl, &handle);
|
||||
break;
|
||||
|
||||
case DB_TYPE_KBX:
|
||||
err = be_kbx_add_resource (ctrl, &handle, filename, readonly);
|
||||
break;
|
||||
}
|
||||
if (err)
|
||||
goto leave;
|
||||
|
||||
/* All good, create an entry in the table. */
|
||||
for (dbidx = 0; dbidx < no_of_databases; dbidx++)
|
||||
if (!databases[dbidx].db_type)
|
||||
break;
|
||||
if (dbidx == no_of_databases)
|
||||
{
|
||||
/* No table yet or table is full. */
|
||||
if (!databases)
|
||||
{
|
||||
/* Create first set of databases. Note that the initial
|
||||
* type for all entries is DB_TYPE_NONE. */
|
||||
dbidx = 4;
|
||||
databases = xtrycalloc (dbidx, sizeof *databases);
|
||||
if (!databases)
|
||||
{
|
||||
err = gpg_error_from_syserror ();
|
||||
goto leave;
|
||||
}
|
||||
no_of_databases = dbidx;
|
||||
dbidx = 0; /* Put into first slot. */
|
||||
}
|
||||
else
|
||||
{
|
||||
db_desc_t newdb;
|
||||
|
||||
dbidx = no_of_databases + (no_of_databases == 4? 12 : 16);
|
||||
newdb = xtrycalloc (dbidx, sizeof *databases);
|
||||
if (!databases)
|
||||
{
|
||||
err = gpg_error_from_syserror ();
|
||||
goto leave;
|
||||
}
|
||||
for (n=0; n < no_of_databases; n++)
|
||||
newdb[n] = databases[n];
|
||||
xfree (databases);
|
||||
databases = newdb;
|
||||
n = no_of_databases;
|
||||
no_of_databases = dbidx;
|
||||
dbidx = n; /* Put into first new slot. */
|
||||
}
|
||||
}
|
||||
|
||||
databases[dbidx].db_type = db_type;
|
||||
databases[dbidx].backend_handle = handle;
|
||||
handle = NULL;
|
||||
|
||||
leave:
|
||||
if (err)
|
||||
{
|
||||
log_error ("error adding resource '%s': %s\n",
|
||||
filename, gpg_strerror (err));
|
||||
be_generic_release_backend (ctrl, handle);
|
||||
}
|
||||
xfree (filename);
|
||||
return err;
|
||||
}
|
||||
|
||||
|
||||
/* Release all per session objects. */
|
||||
void
|
||||
kbxd_release_session_info (ctrl_t ctrl)
|
||||
{
|
||||
if (!ctrl)
|
||||
return;
|
||||
be_release_request (ctrl->opgp_req);
|
||||
ctrl->opgp_req = NULL;
|
||||
be_release_request (ctrl->x509_req);
|
||||
ctrl->x509_req = NULL;
|
||||
}
|
||||
|
||||
|
||||
|
||||
/* Search for the keys described by (DESC,NDESC) and return them to
|
||||
* the caller. If RESET is set, the search state is first reset. */
|
||||
gpg_error_t
|
||||
kbxd_search (ctrl_t ctrl, KEYDB_SEARCH_DESC *desc, unsigned int ndesc,
|
||||
int reset)
|
||||
{
|
||||
gpg_error_t err;
|
||||
int i;
|
||||
unsigned int dbidx;
|
||||
db_desc_t db;
|
||||
db_request_t request;
|
||||
int start_at_ubid = 0;
|
||||
|
||||
if (DBG_CLOCK)
|
||||
log_clock ("%s: enter", __func__);
|
||||
|
||||
if (DBG_LOOKUP)
|
||||
{
|
||||
log_debug ("%s: %u search descriptions:\n", __func__, ndesc);
|
||||
for (i = 0; i < ndesc; i ++)
|
||||
{
|
||||
/* char *t = keydb_search_desc_dump (&desc[i]); */
|
||||
/* log_debug ("%s %d: %s\n", __func__, i, t); */
|
||||
/* xfree (t); */
|
||||
}
|
||||
}
|
||||
|
||||
take_read_lock (ctrl);
|
||||
|
||||
/* Allocate a handle object if none exists for this context. */
|
||||
if (!ctrl->opgp_req)
|
||||
{
|
||||
ctrl->opgp_req = xtrycalloc (1, sizeof *ctrl->opgp_req);
|
||||
if (!ctrl->opgp_req)
|
||||
{
|
||||
err = gpg_error_from_syserror ();
|
||||
goto leave;
|
||||
}
|
||||
}
|
||||
request = ctrl->opgp_req;
|
||||
|
||||
/* If requested do a reset. Using the reset flag is faster than
|
||||
* letting the caller do a separate call for an intial reset. */
|
||||
if (!desc || reset)
|
||||
{
|
||||
for (dbidx=0; dbidx < no_of_databases; dbidx++)
|
||||
{
|
||||
db = databases + dbidx;
|
||||
if (!db->db_type)
|
||||
continue; /* Empty slot. */
|
||||
|
||||
switch (db->db_type)
|
||||
{
|
||||
case DB_TYPE_NONE: /* NOTREACHED */
|
||||
break;
|
||||
|
||||
case DB_TYPE_CACHE:
|
||||
err = 0; /* Nothing to do. */
|
||||
break;
|
||||
|
||||
case DB_TYPE_KBX:
|
||||
err = be_kbx_search (ctrl, db->backend_handle, request, NULL, 0);
|
||||
break;
|
||||
}
|
||||
if (err)
|
||||
{
|
||||
log_error ("error during the %ssearch reset: %s\n",
|
||||
reset? "initial ":"", gpg_strerror (err));
|
||||
goto leave;
|
||||
}
|
||||
}
|
||||
request->any_search = 0;
|
||||
request->any_found = 0;
|
||||
request->next_dbidx = 0;
|
||||
if (!desc) /* Reset only mode */
|
||||
{
|
||||
err = 0;
|
||||
goto leave;
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
/* Move to the next non-empty slot. */
|
||||
next_db:
|
||||
for (dbidx=request->next_dbidx; (dbidx < no_of_databases
|
||||
&& !databases[dbidx].db_type); dbidx++)
|
||||
;
|
||||
request->next_dbidx = dbidx;
|
||||
if (!(dbidx < no_of_databases))
|
||||
{
|
||||
/* All databases have been searched. Put the non-found mark
|
||||
* into the cache for all descriptors.
|
||||
* FIXME: We need to see which pubkey type we need to insert. */
|
||||
be_cache_not_found (ctrl, PUBKEY_TYPE_UNKNOWN, desc, ndesc);
|
||||
err = gpg_error (GPG_ERR_NOT_FOUND);
|
||||
goto leave;
|
||||
}
|
||||
db = databases + dbidx;
|
||||
|
||||
/* Divert to the backend for the actual search. */
|
||||
switch (db->db_type)
|
||||
{
|
||||
case DB_TYPE_NONE:
|
||||
/* NOTREACHED */
|
||||
err = gpg_error (GPG_ERR_INTERNAL);
|
||||
break;
|
||||
|
||||
case DB_TYPE_CACHE:
|
||||
err = be_cache_search (ctrl, db->backend_handle, request,
|
||||
desc, ndesc);
|
||||
/* Expected error codes from the cache lookup are:
|
||||
* 0 - found and returned via the cache
|
||||
* GPG_ERR_NOT_FOUND - marked in the cache as not available
|
||||
* GPG_ERR_EOF - cache miss. */
|
||||
break;
|
||||
|
||||
case DB_TYPE_KBX:
|
||||
if (start_at_ubid)
|
||||
{
|
||||
/* We need to set the startpoint for the search. */
|
||||
err = be_kbx_seek (ctrl, db->backend_handle, request,
|
||||
request->last_cached_ubid);
|
||||
if (err)
|
||||
{
|
||||
log_debug ("%s: seeking %s to an UBID failed: %s\n",
|
||||
__func__, strdbtype (db->db_type), gpg_strerror (err));
|
||||
break;
|
||||
}
|
||||
}
|
||||
err = be_kbx_search (ctrl, db->backend_handle, request,
|
||||
desc, ndesc);
|
||||
if (start_at_ubid && gpg_err_code (err) == GPG_ERR_EOF)
|
||||
be_cache_mark_final (ctrl, request);
|
||||
break;
|
||||
}
|
||||
|
||||
if (DBG_LOOKUP)
|
||||
log_debug ("%s: searched %s (db %u of %u) => %s\n",
|
||||
__func__, strdbtype (db->db_type), dbidx, no_of_databases,
|
||||
gpg_strerror (err));
|
||||
request->any_search = 1;
|
||||
start_at_ubid = 0;
|
||||
if (!err)
|
||||
{
|
||||
request->any_found = 1;
|
||||
}
|
||||
else if (gpg_err_code (err) == GPG_ERR_EOF)
|
||||
{
|
||||
if (db->db_type == DB_TYPE_CACHE && request->last_cached_valid)
|
||||
{
|
||||
if (request->last_cached_final)
|
||||
goto leave;
|
||||
start_at_ubid = 1;
|
||||
}
|
||||
request->next_dbidx++;
|
||||
goto next_db;
|
||||
}
|
||||
|
||||
|
||||
leave:
|
||||
release_lock (ctrl);
|
||||
if (DBG_CLOCK)
|
||||
log_clock ("%s: leave (%s)", __func__, err? "not found" : "found");
|
||||
return err;
|
||||
}
|
36
kbx/frontend.h
Normal file
36
kbx/frontend.h
Normal file
|
@ -0,0 +1,36 @@
|
|||
/* frontend.h - Definitions for the keyboxd frontend
|
||||
* Copyright (C) 2019 g10 Code GmbH
|
||||
*
|
||||
* This file is part of GnuPG.
|
||||
*
|
||||
* GnuPG is free software; you can redistribute it and/or modify
|
||||
* it under the terms of the GNU General Public License as published by
|
||||
* the Free Software Foundation; either version 3 of the License, or
|
||||
* (at your option) any later version.
|
||||
*
|
||||
* GnuPG is distributed in the hope that it will be useful,
|
||||
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
* GNU General Public License for more details.
|
||||
*
|
||||
* You should have received a copy of the GNU General Public License
|
||||
* along with this program; if not, see <https://www.gnu.org/licenses/>.
|
||||
*/
|
||||
|
||||
#ifndef KBX_FRONTEND_H
|
||||
#define KBX_FRONTEND_H
|
||||
|
||||
#include "keybox-search-desc.h"
|
||||
|
||||
|
||||
gpg_error_t kbxd_add_resource (ctrl_t ctrl,
|
||||
const char *filename_arg, int readonly);
|
||||
|
||||
void kbxd_release_session_info (ctrl_t ctrl);
|
||||
|
||||
gpg_error_t kbxd_search (ctrl_t ctrl,
|
||||
KEYDB_SEARCH_DESC *desc, unsigned int ndesc,
|
||||
int reset);
|
||||
|
||||
|
||||
#endif /*KBX_FRONTEND_H*/
|
775
kbx/kbxserver.c
Normal file
775
kbx/kbxserver.c
Normal file
|
@ -0,0 +1,775 @@
|
|||
/* kbxserver.c - Handle Assuan commands send to the keyboxd
|
||||
* Copyright (C) 2019 g10 Code GmbH
|
||||
*
|
||||
* This file is part of GnuPG.
|
||||
*
|
||||
* GnuPG is free software; you can redistribute it and/or modify
|
||||
* it under the terms of the GNU General Public License as published by
|
||||
* the Free Software Foundation; either version 3 of the License, or
|
||||
* (at your option) any later version.
|
||||
*
|
||||
* GnuPG is distributed in the hope that it will be useful,
|
||||
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
* GNU General Public License for more details.
|
||||
*
|
||||
* You should have received a copy of the GNU General Public License
|
||||
* along with this program; if not, see <https://www.gnu.org/licenses/>.
|
||||
* SPDX-License-Identifier: GPL-3.0+
|
||||
*/
|
||||
|
||||
#include <config.h>
|
||||
#include <stdio.h>
|
||||
#include <stdlib.h>
|
||||
#include <stddef.h>
|
||||
#include <string.h>
|
||||
#include <assert.h>
|
||||
#include <sys/types.h>
|
||||
#include <sys/stat.h>
|
||||
#include <unistd.h>
|
||||
#include <errno.h>
|
||||
|
||||
#include "keyboxd.h"
|
||||
#include <assuan.h>
|
||||
#include "../common/i18n.h"
|
||||
#include "../common/server-help.h"
|
||||
#include "../common/userids.h"
|
||||
#include "../common/asshelp.h"
|
||||
#include "../common/host2net.h"
|
||||
#include "frontend.h"
|
||||
|
||||
|
||||
|
||||
#define PARM_ERROR(t) assuan_set_error (ctx, \
|
||||
gpg_error (GPG_ERR_ASS_PARAMETER), (t))
|
||||
#define set_error(e,t) (ctx ? assuan_set_error (ctx, gpg_error (e), (t)) \
|
||||
/**/: gpg_error (e))
|
||||
|
||||
|
||||
|
||||
/* Control structure per connection. */
|
||||
struct server_local_s
|
||||
{
|
||||
/* Data used to associate an Assuan context with local server data */
|
||||
assuan_context_t assuan_ctx;
|
||||
|
||||
/* The session id (a counter). */
|
||||
unsigned int session_id;
|
||||
|
||||
/* If this flag is set to true this process will be terminated after
|
||||
* the end of this session. */
|
||||
int stopme;
|
||||
|
||||
/* If the first both flags are set the assuan logging of data lines
|
||||
* is suppressed. The count variable is used to show the number of
|
||||
* non-logged bytes. */
|
||||
size_t inhibit_data_logging_count;
|
||||
unsigned int inhibit_data_logging : 1;
|
||||
unsigned int inhibit_data_logging_now : 1;
|
||||
|
||||
/* This flag is set if the last search command was called with --more. */
|
||||
unsigned int search_expecting_more : 1;
|
||||
|
||||
/* This flag is set if the last search command was successful. */
|
||||
unsigned int search_any_found : 1;
|
||||
|
||||
/* The first is the current search description as parsed by the
|
||||
* cmd_search. If more than one pattern is required, cmd_search
|
||||
* also allocates and sets multi_search_desc and
|
||||
* multi_search_desc_len. If a search description has ever been
|
||||
* allocated the allocated size is stored at
|
||||
* multi_search_desc_size. */
|
||||
KEYBOX_SEARCH_DESC search_desc;
|
||||
KEYBOX_SEARCH_DESC *multi_search_desc;
|
||||
unsigned int multi_search_desc_size;
|
||||
unsigned int multi_search_desc_len;
|
||||
|
||||
/* If not NULL write output to this stream instead of using D lines. */
|
||||
estream_t outstream;
|
||||
};
|
||||
|
||||
|
||||
|
||||
|
||||
/* Return the assuan contxt from the local server info in CTRL. */
|
||||
static assuan_context_t
|
||||
get_assuan_ctx_from_ctrl (ctrl_t ctrl)
|
||||
{
|
||||
if (!ctrl || !ctrl->server_local)
|
||||
return NULL;
|
||||
return ctrl->server_local->assuan_ctx;
|
||||
}
|
||||
|
||||
|
||||
/* If OUTPUT has been used prepare the output FD for use. This needs
|
||||
* to be called by all functions which will in any way use
|
||||
* kbxd_write_data_line later. Whether the output goes to the output
|
||||
* stream is decided by this function. */
|
||||
static gpg_error_t
|
||||
prepare_outstream (ctrl_t ctrl)
|
||||
{
|
||||
int fd;
|
||||
|
||||
log_assert (ctrl && ctrl->server_local);
|
||||
|
||||
if (ctrl->server_local->outstream)
|
||||
return 0; /* Already enabled. */
|
||||
|
||||
fd = translate_sys2libc_fd
|
||||
(assuan_get_output_fd (get_assuan_ctx_from_ctrl (ctrl)), 1);
|
||||
if (fd == -1)
|
||||
return 0; /* No Output command active. */
|
||||
|
||||
ctrl->server_local->outstream = es_fdopen_nc (fd, "w");
|
||||
if (!ctrl->server_local->outstream)
|
||||
return gpg_err_code_from_syserror ();
|
||||
return 0;
|
||||
}
|
||||
|
||||
|
||||
/* The usual writen function; here with diagnostic output. */
|
||||
static gpg_error_t
|
||||
kbxd_writen (estream_t fp, const void *buffer, size_t length)
|
||||
{
|
||||
gpg_error_t err;
|
||||
size_t nwritten;
|
||||
|
||||
if (es_write (fp, buffer, length, &nwritten))
|
||||
{
|
||||
err = gpg_error_from_syserror ();
|
||||
log_error ("error writing OUTPUT: %s\n", gpg_strerror (err));
|
||||
}
|
||||
else if (length != nwritten)
|
||||
{
|
||||
err = gpg_error (GPG_ERR_EIO);
|
||||
log_error ("error writing OUTPUT: %s\n", "short write");
|
||||
}
|
||||
else
|
||||
err = 0;
|
||||
|
||||
return err;
|
||||
}
|
||||
|
||||
|
||||
/* A wrapper around assuan_send_data which makes debugging the output
|
||||
* in verbose mode easier. It also takes CTRL as argument. */
|
||||
gpg_error_t
|
||||
kbxd_write_data_line (ctrl_t ctrl, const void *buffer_arg, size_t size)
|
||||
{
|
||||
const char *buffer = buffer_arg;
|
||||
assuan_context_t ctx = get_assuan_ctx_from_ctrl (ctrl);
|
||||
gpg_error_t err;
|
||||
|
||||
if (!ctx) /* Oops - no assuan context. */
|
||||
return gpg_error (GPG_ERR_NOT_PROCESSED);
|
||||
|
||||
/* Write toa file descriptor if enabled. */
|
||||
if (ctrl && ctrl->server_local && ctrl->server_local->outstream)
|
||||
{
|
||||
unsigned char lenbuf[4];
|
||||
|
||||
ulongtobuf (lenbuf, size);
|
||||
err = kbxd_writen (ctrl->server_local->outstream, lenbuf, 4);
|
||||
if (!err)
|
||||
err = kbxd_writen (ctrl->server_local->outstream, buffer, size);
|
||||
if (!err && es_fflush (ctrl->server_local->outstream))
|
||||
{
|
||||
err = gpg_error_from_syserror ();
|
||||
log_error ("error writing OUTPUT: %s\n", gpg_strerror (err));
|
||||
}
|
||||
|
||||
goto leave;
|
||||
}
|
||||
|
||||
/* If we do not want logging, enable it here. */
|
||||
if (ctrl && ctrl->server_local && ctrl->server_local->inhibit_data_logging)
|
||||
ctrl->server_local->inhibit_data_logging_now = 1;
|
||||
|
||||
if (0 && opt.verbose && buffer && size)
|
||||
{
|
||||
/* Ease reading of output by limiting the line length. */
|
||||
size_t n, nbytes;
|
||||
|
||||
nbytes = size;
|
||||
do
|
||||
{
|
||||
n = nbytes > 64? 64 : nbytes;
|
||||
err = assuan_send_data (ctx, buffer, n);
|
||||
if (err)
|
||||
{
|
||||
gpg_err_set_errno (EIO);
|
||||
goto leave;
|
||||
}
|
||||
buffer += n;
|
||||
nbytes -= n;
|
||||
if (nbytes && (err=assuan_send_data (ctx, NULL, 0))) /* Flush line. */
|
||||
{
|
||||
gpg_err_set_errno (EIO);
|
||||
goto leave;
|
||||
}
|
||||
}
|
||||
while (nbytes);
|
||||
}
|
||||
else
|
||||
{
|
||||
err = assuan_send_data (ctx, buffer, size);
|
||||
if (err)
|
||||
{
|
||||
gpg_err_set_errno (EIO); /* For use by data_line_cookie_write. */
|
||||
goto leave;
|
||||
}
|
||||
}
|
||||
|
||||
leave:
|
||||
if (ctrl && ctrl->server_local && ctrl->server_local->inhibit_data_logging)
|
||||
{
|
||||
ctrl->server_local->inhibit_data_logging_count += size;
|
||||
ctrl->server_local->inhibit_data_logging_now = 0;
|
||||
}
|
||||
|
||||
return err;
|
||||
}
|
||||
|
||||
|
||||
|
||||
/* Helper to print a message while leaving a command. */
|
||||
static gpg_error_t
|
||||
leave_cmd (assuan_context_t ctx, gpg_error_t err)
|
||||
{
|
||||
if (err && opt.verbose)
|
||||
{
|
||||
const char *name = assuan_get_command_name (ctx);
|
||||
if (!name)
|
||||
name = "?";
|
||||
if (gpg_err_source (err) == GPG_ERR_SOURCE_DEFAULT)
|
||||
log_error ("command '%s' failed: %s\n", name,
|
||||
gpg_strerror (err));
|
||||
else
|
||||
log_error ("command '%s' failed: %s <%s>\n", name,
|
||||
gpg_strerror (err), gpg_strsource (err));
|
||||
}
|
||||
return err;
|
||||
}
|
||||
|
||||
|
||||
|
||||
/* Handle OPTION commands. */
|
||||
static gpg_error_t
|
||||
option_handler (assuan_context_t ctx, const char *key, const char *value)
|
||||
{
|
||||
ctrl_t ctrl = assuan_get_pointer (ctx);
|
||||
gpg_error_t err = 0;
|
||||
|
||||
if (!strcmp (key, "lc-messages"))
|
||||
{
|
||||
if (ctrl->lc_messages)
|
||||
xfree (ctrl->lc_messages);
|
||||
ctrl->lc_messages = xtrystrdup (value);
|
||||
if (!ctrl->lc_messages)
|
||||
return out_of_core ();
|
||||
}
|
||||
else
|
||||
err = gpg_error (GPG_ERR_UNKNOWN_OPTION);
|
||||
|
||||
return err;
|
||||
}
|
||||
|
||||
|
||||
|
||||
static const char hlp_search[] =
|
||||
"SEARCH [--no-data] [[--more] PATTERN]\n"
|
||||
"\n"
|
||||
"Search for the keys identified by PATTERN. With --more more\n"
|
||||
"patterns to be used for the search are expected with the next\n"
|
||||
"command. With --no-data only the search status is returned but\n"
|
||||
"not the actual data. See also \"NEXT\".";
|
||||
static gpg_error_t
|
||||
cmd_search (assuan_context_t ctx, char *line)
|
||||
{
|
||||
ctrl_t ctrl = assuan_get_pointer (ctx);
|
||||
int opt_more, opt_no_data;
|
||||
gpg_error_t err;
|
||||
unsigned int n, k;
|
||||
|
||||
opt_no_data = has_option (line, "--no-data");
|
||||
opt_more = has_option (line, "--more");
|
||||
line = skip_options (line);
|
||||
|
||||
ctrl->server_local->search_any_found = 0;
|
||||
|
||||
if (!*line)
|
||||
{
|
||||
if (opt_more)
|
||||
{
|
||||
err = set_error (GPG_ERR_INV_ARG, "--more but no pattern");
|
||||
goto leave;
|
||||
}
|
||||
else if (!*line && ctrl->server_local->search_expecting_more)
|
||||
{
|
||||
/* It would be too surprising to first set a pattern but
|
||||
* finally add no pattern to search the entire DB. */
|
||||
err = set_error (GPG_ERR_INV_ARG, "--more pending but no pattern");
|
||||
goto leave;
|
||||
}
|
||||
else /* No pattern - return the first item. */
|
||||
{
|
||||
memset (&ctrl->server_local->search_desc, 0,
|
||||
sizeof ctrl->server_local->search_desc);
|
||||
ctrl->server_local->search_desc.mode = KEYDB_SEARCH_MODE_FIRST;
|
||||
}
|
||||
}
|
||||
else
|
||||
{
|
||||
err = classify_user_id (line, &ctrl->server_local->search_desc, 0);
|
||||
if (err)
|
||||
goto leave;
|
||||
}
|
||||
|
||||
if (opt_more || ctrl->server_local->search_expecting_more)
|
||||
{
|
||||
/* More pattern are expected - store the current one and return
|
||||
* success. */
|
||||
if (!ctrl->server_local->multi_search_desc_size)
|
||||
{
|
||||
n = 10;
|
||||
ctrl->server_local->multi_search_desc
|
||||
= xtrycalloc (n, sizeof *ctrl->server_local->multi_search_desc);
|
||||
if (!ctrl->server_local->multi_search_desc)
|
||||
{
|
||||
err = gpg_error_from_syserror ();
|
||||
goto leave;
|
||||
}
|
||||
ctrl->server_local->multi_search_desc_size = n;
|
||||
}
|
||||
|
||||
if (ctrl->server_local->multi_search_desc_len
|
||||
== ctrl->server_local->multi_search_desc_size)
|
||||
{
|
||||
KEYBOX_SEARCH_DESC *desc;
|
||||
n = ctrl->server_local->multi_search_desc_size + 10;
|
||||
desc = xtrycalloc (n, sizeof *desc);
|
||||
if (!desc)
|
||||
{
|
||||
err = gpg_error_from_syserror ();
|
||||
goto leave;
|
||||
}
|
||||
for (k=0; k < ctrl->server_local->multi_search_desc_size; k++)
|
||||
desc[k] = ctrl->server_local->multi_search_desc[k];
|
||||
xfree (ctrl->server_local->multi_search_desc);
|
||||
ctrl->server_local->multi_search_desc = desc;
|
||||
ctrl->server_local->multi_search_desc_size = n;
|
||||
}
|
||||
/* Actually store. */
|
||||
ctrl->server_local->multi_search_desc
|
||||
[ctrl->server_local->multi_search_desc_len++]
|
||||
= ctrl->server_local->search_desc;
|
||||
|
||||
if (opt_more)
|
||||
{
|
||||
/* We need to be called aagain with more pattern. */
|
||||
ctrl->server_local->search_expecting_more = 1;
|
||||
goto leave;
|
||||
}
|
||||
ctrl->server_local->search_expecting_more = 0;
|
||||
/* Continue with the actual search. */
|
||||
}
|
||||
else
|
||||
ctrl->server_local->multi_search_desc_len = 0;
|
||||
|
||||
ctrl->server_local->inhibit_data_logging = 1;
|
||||
ctrl->server_local->inhibit_data_logging_now = 0;
|
||||
ctrl->server_local->inhibit_data_logging_count = 0;
|
||||
ctrl->no_data_return = opt_no_data;
|
||||
err = prepare_outstream (ctrl);
|
||||
if (err)
|
||||
;
|
||||
else if (ctrl->server_local->multi_search_desc_len)
|
||||
err = kbxd_search (ctrl, ctrl->server_local->multi_search_desc,
|
||||
ctrl->server_local->multi_search_desc_len, 1);
|
||||
else
|
||||
err = kbxd_search (ctrl, &ctrl->server_local->search_desc, 1, 1);
|
||||
if (err)
|
||||
goto leave;
|
||||
|
||||
/* Set a flag for use by NEXT. */
|
||||
ctrl->server_local->search_any_found = 1;
|
||||
|
||||
leave:
|
||||
if (err)
|
||||
ctrl->server_local->multi_search_desc_len = 0;
|
||||
ctrl->no_data_return = 0;
|
||||
ctrl->server_local->inhibit_data_logging = 0;
|
||||
return leave_cmd (ctx, err);
|
||||
}
|
||||
|
||||
|
||||
static const char hlp_next[] =
|
||||
"NEXT [--no-data]\n"
|
||||
"\n"
|
||||
"Get the next search result from a previus search.";
|
||||
static gpg_error_t
|
||||
cmd_next (assuan_context_t ctx, char *line)
|
||||
{
|
||||
ctrl_t ctrl = assuan_get_pointer (ctx);
|
||||
int opt_no_data;
|
||||
gpg_error_t err;
|
||||
|
||||
opt_no_data = has_option (line, "--no-data");
|
||||
line = skip_options (line);
|
||||
|
||||
if (*line)
|
||||
{
|
||||
err = set_error (GPG_ERR_INV_ARG, "no args expected");
|
||||
goto leave;
|
||||
}
|
||||
|
||||
if (!ctrl->server_local->search_any_found)
|
||||
{
|
||||
err = set_error (GPG_ERR_NOTHING_FOUND, "no previous SEARCH");
|
||||
goto leave;
|
||||
}
|
||||
|
||||
ctrl->server_local->inhibit_data_logging = 1;
|
||||
ctrl->server_local->inhibit_data_logging_now = 0;
|
||||
ctrl->server_local->inhibit_data_logging_count = 0;
|
||||
ctrl->no_data_return = opt_no_data;
|
||||
err = prepare_outstream (ctrl);
|
||||
if (err)
|
||||
;
|
||||
else if (ctrl->server_local->multi_search_desc_len)
|
||||
{
|
||||
/* The next condition should never be tru but we better handle
|
||||
* the first/next transition anyway. */
|
||||
if (ctrl->server_local->multi_search_desc[0].mode
|
||||
== KEYDB_SEARCH_MODE_FIRST)
|
||||
ctrl->server_local->multi_search_desc[0].mode = KEYDB_SEARCH_MODE_NEXT;
|
||||
|
||||
err = kbxd_search (ctrl, ctrl->server_local->multi_search_desc,
|
||||
ctrl->server_local->multi_search_desc_len, 0);
|
||||
}
|
||||
else
|
||||
{
|
||||
/* We need to do the transition from first to next here. */
|
||||
if (ctrl->server_local->search_desc.mode == KEYDB_SEARCH_MODE_FIRST)
|
||||
ctrl->server_local->search_desc.mode = KEYDB_SEARCH_MODE_NEXT;
|
||||
|
||||
err = kbxd_search (ctrl, &ctrl->server_local->search_desc, 1, 0);
|
||||
}
|
||||
if (err)
|
||||
goto leave;
|
||||
|
||||
leave:
|
||||
ctrl->no_data_return = 0;
|
||||
ctrl->server_local->inhibit_data_logging = 0;
|
||||
return leave_cmd (ctx, err);
|
||||
}
|
||||
|
||||
|
||||
|
||||
static const char hlp_getinfo[] =
|
||||
"GETINFO <what>\n"
|
||||
"\n"
|
||||
"Multi purpose command to return certain information. \n"
|
||||
"Supported values of WHAT are:\n"
|
||||
"\n"
|
||||
"version - Return the version of the program.\n"
|
||||
"pid - Return the process id of the server.\n"
|
||||
"socket_name - Return the name of the socket.\n"
|
||||
"session_id - Return the current session_id.\n"
|
||||
"getenv NAME - Return value of envvar NAME\n";
|
||||
static gpg_error_t
|
||||
cmd_getinfo (assuan_context_t ctx, char *line)
|
||||
{
|
||||
ctrl_t ctrl = assuan_get_pointer (ctx);
|
||||
gpg_error_t err;
|
||||
char numbuf[50];
|
||||
|
||||
if (!strcmp (line, "version"))
|
||||
{
|
||||
const char *s = VERSION;
|
||||
err = assuan_send_data (ctx, s, strlen (s));
|
||||
}
|
||||
else if (!strcmp (line, "pid"))
|
||||
{
|
||||
snprintf (numbuf, sizeof numbuf, "%lu", (unsigned long)getpid ());
|
||||
err = assuan_send_data (ctx, numbuf, strlen (numbuf));
|
||||
}
|
||||
else if (!strcmp (line, "socket_name"))
|
||||
{
|
||||
const char *s = get_kbxd_socket_name ();
|
||||
if (!s)
|
||||
s = "[none]";
|
||||
err = assuan_send_data (ctx, s, strlen (s));
|
||||
}
|
||||
else if (!strcmp (line, "session_id"))
|
||||
{
|
||||
snprintf (numbuf, sizeof numbuf, "%u", ctrl->server_local->session_id);
|
||||
err = assuan_send_data (ctx, numbuf, strlen (numbuf));
|
||||
}
|
||||
else if (!strncmp (line, "getenv", 6)
|
||||
&& (line[6] == ' ' || line[6] == '\t' || !line[6]))
|
||||
{
|
||||
line += 6;
|
||||
while (*line == ' ' || *line == '\t')
|
||||
line++;
|
||||
if (!*line)
|
||||
err = gpg_error (GPG_ERR_MISSING_VALUE);
|
||||
else
|
||||
{
|
||||
const char *s = getenv (line);
|
||||
if (!s)
|
||||
err = set_error (GPG_ERR_NOT_FOUND, "No such envvar");
|
||||
else
|
||||
err = assuan_send_data (ctx, s, strlen (s));
|
||||
}
|
||||
}
|
||||
else
|
||||
err = set_error (GPG_ERR_ASS_PARAMETER, "unknown value for WHAT");
|
||||
|
||||
return leave_cmd (ctx, err);
|
||||
}
|
||||
|
||||
|
||||
|
||||
static const char hlp_killkeyboxd[] =
|
||||
"KILLKEYBOXD\n"
|
||||
"\n"
|
||||
"This command allows a user - given sufficient permissions -\n"
|
||||
"to kill this keyboxd process.\n";
|
||||
static gpg_error_t
|
||||
cmd_killkeyboxd (assuan_context_t ctx, char *line)
|
||||
{
|
||||
ctrl_t ctrl = assuan_get_pointer (ctx);
|
||||
|
||||
(void)line;
|
||||
|
||||
ctrl->server_local->stopme = 1;
|
||||
assuan_set_flag (ctx, ASSUAN_FORCE_CLOSE, 1);
|
||||
return gpg_error (GPG_ERR_EOF);
|
||||
}
|
||||
|
||||
|
||||
static const char hlp_reloadkeyboxd[] =
|
||||
"RELOADKEYBOXD\n"
|
||||
"\n"
|
||||
"This command is an alternative to SIGHUP\n"
|
||||
"to reload the configuration.";
|
||||
static gpg_error_t
|
||||
cmd_reloadkeyboxd (assuan_context_t ctx, char *line)
|
||||
{
|
||||
(void)ctx;
|
||||
(void)line;
|
||||
|
||||
kbxd_sighup_action ();
|
||||
return 0;
|
||||
}
|
||||
|
||||
|
||||
static const char hlp_output[] =
|
||||
"OUTPUT FD[=<n>]\n"
|
||||
"\n"
|
||||
"Set the file descriptor to write the output data to N. If N is not\n"
|
||||
"given and the operating system supports file descriptor passing, the\n"
|
||||
"file descriptor currently in flight will be used.";
|
||||
|
||||
|
||||
/* Tell the assuan library about our commands. */
|
||||
static int
|
||||
register_commands (assuan_context_t ctx)
|
||||
{
|
||||
static struct {
|
||||
const char *name;
|
||||
assuan_handler_t handler;
|
||||
const char * const help;
|
||||
} table[] = {
|
||||
{ "SEARCH", cmd_search, hlp_search },
|
||||
{ "NEXT", cmd_next, hlp_next },
|
||||
{ "GETINFO", cmd_getinfo, hlp_getinfo },
|
||||
{ "OUTPUT", NULL, hlp_output },
|
||||
{ "KILLKEYBOXD",cmd_killkeyboxd,hlp_killkeyboxd },
|
||||
{ "RELOADKEYBOXD",cmd_reloadkeyboxd,hlp_reloadkeyboxd },
|
||||
{ NULL, NULL }
|
||||
};
|
||||
int i, j, rc;
|
||||
|
||||
for (i=j=0; table[i].name; i++)
|
||||
{
|
||||
rc = assuan_register_command (ctx, table[i].name, table[i].handler,
|
||||
table[i].help);
|
||||
if (rc)
|
||||
return rc;
|
||||
}
|
||||
return 0;
|
||||
}
|
||||
|
||||
|
||||
/* Note that we do not reset the list of configured keyservers. */
|
||||
static gpg_error_t
|
||||
reset_notify (assuan_context_t ctx, char *line)
|
||||
{
|
||||
ctrl_t ctrl = assuan_get_pointer (ctx);
|
||||
|
||||
(void)line;
|
||||
(void)ctrl;
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
|
||||
/* This function is called by our assuan log handler to test whether a
|
||||
* log message shall really be printed. The function must return
|
||||
* false to inhibit the logging of MSG. CAT gives the requested log
|
||||
* category. MSG might be NULL. */
|
||||
int
|
||||
kbxd_assuan_log_monitor (assuan_context_t ctx, unsigned int cat,
|
||||
const char *msg)
|
||||
{
|
||||
ctrl_t ctrl = assuan_get_pointer (ctx);
|
||||
|
||||
(void)cat;
|
||||
(void)msg;
|
||||
|
||||
if (!ctrl || !ctrl->server_local)
|
||||
return 1; /* Can't decide - allow logging. */
|
||||
|
||||
if (!ctrl->server_local->inhibit_data_logging)
|
||||
return 1; /* Not requested - allow logging. */
|
||||
|
||||
/* Disallow logging if *_now is true. */
|
||||
return !ctrl->server_local->inhibit_data_logging_now;
|
||||
}
|
||||
|
||||
|
||||
/* Startup the server and run the main command loop. With FD = -1,
|
||||
* use stdin/stdout. SESSION_ID is either 0 or a unique number
|
||||
* identifying a session. */
|
||||
void
|
||||
kbxd_start_command_handler (ctrl_t ctrl, gnupg_fd_t fd, unsigned int session_id)
|
||||
{
|
||||
static const char hello[] = "Keyboxd " VERSION " at your service";
|
||||
static char *hello_line;
|
||||
int rc;
|
||||
assuan_context_t ctx;
|
||||
|
||||
ctrl->server_local = xtrycalloc (1, sizeof *ctrl->server_local);
|
||||
if (!ctrl->server_local)
|
||||
{
|
||||
log_error (_("can't allocate control structure: %s\n"),
|
||||
gpg_strerror (gpg_error_from_syserror ()));
|
||||
xfree (ctrl);
|
||||
return;
|
||||
}
|
||||
|
||||
rc = assuan_new (&ctx);
|
||||
if (rc)
|
||||
{
|
||||
log_error (_("failed to allocate assuan context: %s\n"),
|
||||
gpg_strerror (rc));
|
||||
kbxd_exit (2);
|
||||
}
|
||||
|
||||
if (fd == GNUPG_INVALID_FD)
|
||||
{
|
||||
assuan_fd_t filedes[2];
|
||||
|
||||
filedes[0] = assuan_fdopen (0);
|
||||
filedes[1] = assuan_fdopen (1);
|
||||
rc = assuan_init_pipe_server (ctx, filedes);
|
||||
}
|
||||
else
|
||||
{
|
||||
rc = assuan_init_socket_server (ctx, fd,
|
||||
(ASSUAN_SOCKET_SERVER_ACCEPTED
|
||||
|ASSUAN_SOCKET_SERVER_FDPASSING));
|
||||
}
|
||||
|
||||
if (rc)
|
||||
{
|
||||
assuan_release (ctx);
|
||||
log_error (_("failed to initialize the server: %s\n"),
|
||||
gpg_strerror (rc));
|
||||
kbxd_exit (2);
|
||||
}
|
||||
|
||||
rc = register_commands (ctx);
|
||||
if (rc)
|
||||
{
|
||||
log_error (_("failed to the register commands with Assuan: %s\n"),
|
||||
gpg_strerror(rc));
|
||||
kbxd_exit (2);
|
||||
}
|
||||
|
||||
|
||||
if (!hello_line)
|
||||
{
|
||||
hello_line = xtryasprintf
|
||||
("Home: %s\n"
|
||||
"Config: %s\n"
|
||||
"%s",
|
||||
gnupg_homedir (),
|
||||
/*opt.config_filename? opt.config_filename :*/ "[none]",
|
||||
hello);
|
||||
}
|
||||
|
||||
ctrl->server_local->assuan_ctx = ctx;
|
||||
assuan_set_pointer (ctx, ctrl);
|
||||
|
||||
assuan_set_hello_line (ctx, hello_line);
|
||||
assuan_register_option_handler (ctx, option_handler);
|
||||
assuan_register_reset_notify (ctx, reset_notify);
|
||||
|
||||
ctrl->server_local->session_id = session_id;
|
||||
|
||||
/* The next call enable the use of status_printf. */
|
||||
set_assuan_context_func (get_assuan_ctx_from_ctrl);
|
||||
|
||||
for (;;)
|
||||
{
|
||||
rc = assuan_accept (ctx);
|
||||
if (rc == -1)
|
||||
break;
|
||||
if (rc)
|
||||
{
|
||||
log_info (_("Assuan accept problem: %s\n"), gpg_strerror (rc));
|
||||
break;
|
||||
}
|
||||
|
||||
#ifndef HAVE_W32_SYSTEM
|
||||
if (opt.verbose)
|
||||
{
|
||||
assuan_peercred_t peercred;
|
||||
|
||||
if (!assuan_get_peercred (ctx, &peercred))
|
||||
log_info ("connection from process %ld (%ld:%ld)\n",
|
||||
(long)peercred->pid, (long)peercred->uid,
|
||||
(long)peercred->gid);
|
||||
}
|
||||
#endif
|
||||
|
||||
rc = assuan_process (ctx);
|
||||
if (rc)
|
||||
{
|
||||
log_info (_("Assuan processing failed: %s\n"), gpg_strerror (rc));
|
||||
continue;
|
||||
}
|
||||
}
|
||||
|
||||
assuan_close_output_fd (ctx);
|
||||
|
||||
set_assuan_context_func (NULL);
|
||||
ctrl->server_local->assuan_ctx = NULL;
|
||||
assuan_release (ctx);
|
||||
|
||||
if (ctrl->server_local->stopme)
|
||||
kbxd_exit (0);
|
||||
|
||||
if (ctrl->refcount)
|
||||
log_error ("oops: connection control structure still referenced (%d)\n",
|
||||
ctrl->refcount);
|
||||
else
|
||||
{
|
||||
xfree (ctrl->server_local->multi_search_desc);
|
||||
xfree (ctrl->server_local);
|
||||
ctrl->server_local = NULL;
|
||||
}
|
||||
}
|
|
@ -67,6 +67,7 @@
|
|||
- u16 Blob flags
|
||||
bit 0 = contains secret key material (not used)
|
||||
bit 1 = ephemeral blob (e.g. used while querying external resources)
|
||||
bit 2 = blob has an UBID field.
|
||||
- u32 Offset to the OpenPGP keyblock or the X.509 DER encoded
|
||||
certificate
|
||||
- u32 The length of the keyblock or certificate
|
||||
|
@ -143,7 +144,10 @@
|
|||
IDs go here.
|
||||
- bN Space for the keyblock or certificate.
|
||||
- bN RFU. This is the remaining space after keyblock and before
|
||||
the checksum. It is not covered by the checksum.
|
||||
the checksum. Not part of the SHA-1 checksum.
|
||||
- bN Only if blob flags bit 2 is set: 20 octet Unique Blob-ID (UBID).
|
||||
This is the SHA-1 checksum of the keyblock or certificate.
|
||||
This is not part of the SHA-1 checksum below.
|
||||
- b20 SHA-1 checksum (useful for KS synchronization?)
|
||||
Note, that KBX versions before GnuPG 2.1 used an MD5
|
||||
checksum. However it was only created but never checked.
|
||||
|
@ -173,6 +177,10 @@
|
|||
|
||||
|
||||
#include "../common/gettime.h"
|
||||
#include "../common/host2net.h"
|
||||
|
||||
|
||||
#define get32(a) buf32_to_ulong ((a))
|
||||
|
||||
|
||||
/* special values of the signature status */
|
||||
|
@ -559,7 +567,7 @@ create_blob_header (KEYBOXBLOB blob, int blobtype, int as_ephemeral,
|
|||
put32 ( a, 0 ); /* blob length, needs fixup */
|
||||
put8 ( a, blobtype);
|
||||
put8 ( a, want_fpr32? 2:1 ); /* blob type version */
|
||||
put16 ( a, as_ephemeral? 2:0 ); /* blob flags */
|
||||
put16 ( a, as_ephemeral? 6:4 ); /* blob flags */
|
||||
|
||||
put32 ( a, 0 ); /* offset to the raw data, needs fixup */
|
||||
put32 ( a, 0 ); /* length of the raw data, needs fixup */
|
||||
|
@ -686,8 +694,8 @@ create_blob_finish (KEYBOXBLOB blob)
|
|||
unsigned char *pp;
|
||||
size_t n;
|
||||
|
||||
/* Write a placeholder for the checksum */
|
||||
put_membuf (a, NULL, 20);
|
||||
/* Write placeholders for the UBID and the checksum */
|
||||
put_membuf (a, NULL, 40);
|
||||
|
||||
/* get the memory area */
|
||||
n = 0; /* (Just to avoid compiler warning.) */
|
||||
|
@ -721,8 +729,11 @@ create_blob_finish (KEYBOXBLOB blob)
|
|||
blob->fixups = NULL;
|
||||
}
|
||||
|
||||
/* Compute and store the UBID. (image_off) (image_len) */
|
||||
gcry_md_hash_buffer (GCRY_MD_SHA1, p + n - 40, p + get32 (p+8), get32 (p+12));
|
||||
|
||||
/* Compute and store the SHA-1 checksum. */
|
||||
gcry_md_hash_buffer (GCRY_MD_SHA1, p + n - 20, p, n - 20);
|
||||
gcry_md_hash_buffer (GCRY_MD_SHA1, p + n - 20, p, n - 40);
|
||||
|
||||
pp = xtrymalloc (n);
|
||||
if ( !pp )
|
||||
|
|
|
@ -63,6 +63,41 @@ print_string (FILE *fp, const byte *p, size_t n, int delim)
|
|||
}
|
||||
|
||||
|
||||
static void
|
||||
print_ubib (const byte *buffer, size_t length, FILE *fp)
|
||||
{
|
||||
const byte *p;
|
||||
int i;
|
||||
size_t image_off, image_len;
|
||||
unsigned char digest[20];
|
||||
|
||||
fprintf (fp, "UBIB: ");
|
||||
if (length < 40)
|
||||
{
|
||||
fputs ("[blob too short for a stored UBIB]\n", fp);
|
||||
return;
|
||||
}
|
||||
|
||||
p = buffer + length - 40;
|
||||
for (i=0; i < 20; p++, i++)
|
||||
fprintf (fp, "%02X", *p);
|
||||
|
||||
image_off = get32 (buffer+8);
|
||||
image_len = get32 (buffer+12);
|
||||
if ((uint64_t)image_off+(uint64_t)image_len > (uint64_t)length)
|
||||
{
|
||||
fputs (" [image claims to be longer than the blob]\n", fp);
|
||||
return;
|
||||
}
|
||||
|
||||
gcry_md_hash_buffer (GCRY_MD_SHA1, digest, buffer+image_off,image_len);
|
||||
if (memcmp (digest, buffer + length - 40, 20))
|
||||
fputs (" [does not match the image]\n", fp);
|
||||
else
|
||||
fputc ('\n', fp);
|
||||
}
|
||||
|
||||
|
||||
static int
|
||||
print_checksum (const byte *buffer, size_t length, size_t unhashed, FILE *fp)
|
||||
{
|
||||
|
@ -171,6 +206,7 @@ _keybox_dump_blob (KEYBOXBLOB blob, FILE *fp)
|
|||
ulong unhashed;
|
||||
const byte *p;
|
||||
int is_fpr32; /* blob ersion 2 */
|
||||
int have_ubib = 0;
|
||||
|
||||
buffer = _keybox_get_blob_image (blob, &length);
|
||||
|
||||
|
@ -237,6 +273,14 @@ _keybox_dump_blob (KEYBOXBLOB blob, FILE *fp)
|
|||
fputs ("ephemeral", fp);
|
||||
any++;
|
||||
}
|
||||
if ((n & 4))
|
||||
{
|
||||
if (any)
|
||||
putc (',', fp);
|
||||
fputs ("ubid", fp);
|
||||
any++;
|
||||
have_ubib = 1;
|
||||
}
|
||||
putc (')', fp);
|
||||
}
|
||||
putc ('\n', fp);
|
||||
|
@ -422,6 +466,8 @@ _keybox_dump_blob (KEYBOXBLOB blob, FILE *fp)
|
|||
n = get32 ( buffer + length - unhashed);
|
||||
fprintf (fp, "Storage-Flags: %08lx\n", n );
|
||||
}
|
||||
if (have_ubib)
|
||||
print_ubib (buffer, length, fp);
|
||||
print_checksum (buffer, length, unhashed, fp);
|
||||
return 0;
|
||||
}
|
||||
|
|
|
@ -146,9 +146,9 @@ _keybox_write_blob (KEYBOXBLOB blob, FILE *fp)
|
|||
}
|
||||
|
||||
|
||||
/* Write a fresh header type blob. */
|
||||
int
|
||||
_keybox_write_header_blob (FILE *fp, int for_openpgp)
|
||||
/* Write a fresh header type blob. Either FP or STREAM must be used. */
|
||||
gpg_error_t
|
||||
_keybox_write_header_blob (FILE *fp, estream_t stream, int for_openpgp)
|
||||
{
|
||||
unsigned char image[32];
|
||||
u32 val;
|
||||
|
@ -174,7 +174,15 @@ _keybox_write_header_blob (FILE *fp, int for_openpgp)
|
|||
image[20+2] = (val >> 8);
|
||||
image[20+3] = (val );
|
||||
|
||||
if (fwrite (image, 32, 1, fp) != 1)
|
||||
return gpg_error_from_syserror ();
|
||||
if (fp)
|
||||
{
|
||||
if (fwrite (image, 32, 1, fp) != 1)
|
||||
return gpg_error_from_syserror ();
|
||||
}
|
||||
else
|
||||
{
|
||||
if (es_fwrite (image, 32, 1, stream) != 1)
|
||||
return gpg_error_from_syserror ();
|
||||
}
|
||||
return 0;
|
||||
}
|
||||
|
|
|
@ -42,11 +42,21 @@ typedef enum {
|
|||
KEYDB_SEARCH_MODE_SN,
|
||||
KEYDB_SEARCH_MODE_SUBJECT,
|
||||
KEYDB_SEARCH_MODE_KEYGRIP,
|
||||
KEYDB_SEARCH_MODE_UBID,
|
||||
KEYDB_SEARCH_MODE_FIRST,
|
||||
KEYDB_SEARCH_MODE_NEXT
|
||||
} KeydbSearchMode;
|
||||
|
||||
|
||||
/* Identifiers for the public key types we use in GnuPG. */
|
||||
enum pubkey_types
|
||||
{
|
||||
PUBKEY_TYPE_UNKNOWN = 0,
|
||||
PUBKEY_TYPE_OPGP = 1,
|
||||
PUBKEY_TYPE_X509 = 2
|
||||
};
|
||||
|
||||
|
||||
/* Forward declaration. See g10/packet.h. */
|
||||
struct gpg_pkt_user_id_s;
|
||||
typedef struct gpg_pkt_user_id_s *gpg_pkt_user_id_t;
|
||||
|
@ -70,6 +80,7 @@ struct keydb_search_desc
|
|||
unsigned char fpr[32];
|
||||
u32 kid[2]; /* Note that this is in native endianness. */
|
||||
unsigned char grip[20];
|
||||
unsigned char ubid[20];
|
||||
} u;
|
||||
byte fprlen; /* Only used with KEYDB_SEARCH_MODE_FPR. */
|
||||
int exact; /* Use exactly this key ('!' suffix in gpg). */
|
||||
|
|
|
@ -696,6 +696,35 @@ has_keygrip (KEYBOXBLOB blob, const unsigned char *grip)
|
|||
return 0;
|
||||
}
|
||||
|
||||
static inline int
|
||||
has_ubid (KEYBOXBLOB blob, const unsigned char *ubid)
|
||||
{
|
||||
size_t length;
|
||||
const unsigned char *buffer;
|
||||
size_t image_off, image_len;
|
||||
unsigned char ubid_blob[20];
|
||||
|
||||
buffer = _keybox_get_blob_image (blob, &length);
|
||||
if (length < 40)
|
||||
return 0; /*GPG_ERR_TOO_SHORT*/
|
||||
|
||||
if ((get16 (buffer + 6) & 4))
|
||||
{
|
||||
/* The blob has a stored UBID. */
|
||||
return !memcmp (ubid, buffer + length - 40, 20);
|
||||
}
|
||||
else
|
||||
{
|
||||
/* Need to compute the UBID. */
|
||||
image_off = get32 (buffer+8);
|
||||
image_len = get32 (buffer+12);
|
||||
if ((uint64_t)image_off+(uint64_t)image_len > (uint64_t)length)
|
||||
return 0; /*GPG_ERR_TOO_SHORT*/
|
||||
|
||||
gcry_md_hash_buffer (GCRY_MD_SHA1, ubid_blob, buffer+image_off,image_len);
|
||||
return !memcmp (ubid, ubid_blob, 20);
|
||||
}
|
||||
}
|
||||
|
||||
static inline int
|
||||
has_issuer (KEYBOXBLOB blob, const char *name)
|
||||
|
@ -1119,6 +1148,10 @@ keybox_search (KEYBOX_HANDLE hd, KEYBOX_SEARCH_DESC *desc, size_t ndesc,
|
|||
if (has_keygrip (blob, desc[n].u.grip))
|
||||
goto found;
|
||||
break;
|
||||
case KEYDB_SEARCH_MODE_UBID:
|
||||
if (has_ubid (blob, desc[n].u.ubid))
|
||||
goto found;
|
||||
break;
|
||||
case KEYDB_SEARCH_MODE_FIRST:
|
||||
goto found;
|
||||
break;
|
||||
|
@ -1180,11 +1213,70 @@ keybox_search (KEYBOX_HANDLE hd, KEYBOX_SEARCH_DESC *desc, size_t ndesc,
|
|||
a successful search operation.
|
||||
*/
|
||||
|
||||
/* Return the raw data from the last found blob. Caller must release
|
||||
* the value stored at R_BUFFER. If called with NULL for R_BUFFER
|
||||
* only the needed length for the buffer and the public key type is
|
||||
* returned. */
|
||||
gpg_error_t
|
||||
keybox_get_data (KEYBOX_HANDLE hd, void **r_buffer, size_t *r_length,
|
||||
enum pubkey_types *r_pubkey_type)
|
||||
{
|
||||
const unsigned char *buffer;
|
||||
size_t length;
|
||||
size_t image_off, image_len;
|
||||
|
||||
if (r_buffer)
|
||||
*r_buffer = NULL;
|
||||
if (r_length)
|
||||
*r_length = 0;
|
||||
if (r_pubkey_type)
|
||||
*r_pubkey_type = PUBKEY_TYPE_UNKNOWN;
|
||||
|
||||
if (!hd)
|
||||
return gpg_error (GPG_ERR_INV_VALUE);
|
||||
if (!hd->found.blob)
|
||||
return gpg_error (GPG_ERR_NOTHING_FOUND);
|
||||
|
||||
switch (blob_get_type (hd->found.blob))
|
||||
{
|
||||
case KEYBOX_BLOBTYPE_PGP:
|
||||
if (r_pubkey_type)
|
||||
*r_pubkey_type = PUBKEY_TYPE_OPGP;
|
||||
break;
|
||||
case KEYBOX_BLOBTYPE_X509:
|
||||
if (r_pubkey_type)
|
||||
*r_pubkey_type = PUBKEY_TYPE_X509;
|
||||
break;
|
||||
default:
|
||||
return gpg_error (GPG_ERR_WRONG_BLOB_TYPE);
|
||||
}
|
||||
|
||||
buffer = _keybox_get_blob_image (hd->found.blob, &length);
|
||||
if (length < 40)
|
||||
return gpg_error (GPG_ERR_TOO_SHORT);
|
||||
image_off = get32 (buffer+8);
|
||||
image_len = get32 (buffer+12);
|
||||
if ((uint64_t)image_off+(uint64_t)image_len > (uint64_t)length)
|
||||
return gpg_error (GPG_ERR_TOO_SHORT);
|
||||
|
||||
if (r_length)
|
||||
*r_length = image_len;
|
||||
if (r_buffer)
|
||||
{
|
||||
*r_buffer = xtrymalloc (image_len);
|
||||
if (!*r_buffer)
|
||||
return gpg_error_from_syserror ();
|
||||
memcpy (*r_buffer, buffer + image_off, image_len);
|
||||
}
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
|
||||
/* Return the last found keyblock. Returns 0 on success and stores a
|
||||
* new iobuf at R_IOBUF. R_UID_NO and R_PK_NO are used to return the
|
||||
* number of the key or user id which was matched the search criteria;
|
||||
* if not known they are set to 0. */
|
||||
* index of the key or user id which matched the search criteria; if
|
||||
* not known they are set to 0. */
|
||||
gpg_error_t
|
||||
keybox_get_keyblock (KEYBOX_HANDLE hd, iobuf_t *r_iobuf,
|
||||
int *r_pk_no, int *r_uid_no)
|
||||
|
|
|
@ -182,7 +182,7 @@ blob_filecopy (int mode, const char *fname, KEYBOXBLOB blob,
|
|||
if (!newfp )
|
||||
return gpg_error_from_syserror ();
|
||||
|
||||
rc = _keybox_write_header_blob (newfp, for_openpgp);
|
||||
rc = _keybox_write_header_blob (newfp, NULL, for_openpgp);
|
||||
if (rc)
|
||||
{
|
||||
fclose (newfp);
|
||||
|
@ -730,7 +730,7 @@ keybox_compress (KEYBOX_HANDLE hd)
|
|||
}
|
||||
|
||||
/* The header blob is missing. Insert it. */
|
||||
rc = _keybox_write_header_blob (newfp, hd->for_openpgp);
|
||||
rc = _keybox_write_header_blob (newfp, NULL, hd->for_openpgp);
|
||||
if (rc)
|
||||
break;
|
||||
any_changes = 1;
|
||||
|
|
|
@ -81,9 +81,13 @@ gpg_error_t keybox_lock (KEYBOX_HANDLE hd, int yes, long timeout);
|
|||
/*-- keybox-file.c --*/
|
||||
/* Fixme: This function does not belong here: Provide a better
|
||||
interface to create a new keybox file. */
|
||||
int _keybox_write_header_blob (FILE *fp, int openpgp_flag);
|
||||
gpg_error_t _keybox_write_header_blob (FILE *fp, estream_t stream,
|
||||
int openpgp_flag);
|
||||
|
||||
/*-- keybox-search.c --*/
|
||||
gpg_error_t keybox_get_data (KEYBOX_HANDLE hd,
|
||||
void **r_buffer, size_t *r_length,
|
||||
enum pubkey_types *r_pubkey_type);
|
||||
gpg_error_t keybox_get_keyblock (KEYBOX_HANDLE hd, iobuf_t *r_iobuf,
|
||||
int *r_uid_no, int *r_pk_no);
|
||||
#ifdef KEYBOX_WITH_X509
|
||||
|
|
50
kbx/keyboxd-w32info.rc
Normal file
50
kbx/keyboxd-w32info.rc
Normal file
|
@ -0,0 +1,50 @@
|
|||
/* keyboxd-w32info.rc -*- c -*-
|
||||
* Copyright (C) 2018 g10 Code GmbH
|
||||
*
|
||||
* This file is free software; as a special exception the author gives
|
||||
* unlimited permission to copy and/or distribute it, with or without
|
||||
* modifications, as long as this notice is preserved.
|
||||
*
|
||||
* This program is distributed in the hope that it will be useful, but
|
||||
* WITHOUT ANY WARRANTY, to the extent permitted by law; without even the
|
||||
* implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
|
||||
*/
|
||||
|
||||
#include "afxres.h"
|
||||
#include "../common/w32info-rc.h"
|
||||
|
||||
1 ICON "../common/gnupg.ico"
|
||||
|
||||
1 VERSIONINFO
|
||||
FILEVERSION W32INFO_VI_FILEVERSION
|
||||
PRODUCTVERSION W32INFO_VI_PRODUCTVERSION
|
||||
FILEFLAGSMASK 0x3fL
|
||||
#ifdef _DEBUG
|
||||
FILEFLAGS 0x01L /* VS_FF_DEBUG (0x1)*/
|
||||
#else
|
||||
FILEFLAGS 0x00L
|
||||
#endif
|
||||
FILEOS 0x40004L /* VOS_NT (0x40000) | VOS__WINDOWS32 (0x4) */
|
||||
FILETYPE 0x1L /* VFT_APP (0x1) */
|
||||
FILESUBTYPE 0x0L /* VFT2_UNKNOWN */
|
||||
BEGIN
|
||||
BLOCK "StringFileInfo"
|
||||
BEGIN
|
||||
BLOCK "040904b0" /* US English (0409), Unicode (04b0) */
|
||||
BEGIN
|
||||
VALUE "FileDescription", L"GnuPG\x2019s public key daemon\0"
|
||||
VALUE "InternalName", "keyboxd\0"
|
||||
VALUE "OriginalFilename", "keyboxd.exe\0"
|
||||
VALUE "ProductName", W32INFO_PRODUCTNAME
|
||||
VALUE "ProductVersion", W32INFO_PRODUCTVERSION
|
||||
VALUE "CompanyName", W32INFO_COMPANYNAME
|
||||
VALUE "FileVersion", W32INFO_FILEVERSION
|
||||
VALUE "LegalCopyright", W32INFO_LEGALCOPYRIGHT
|
||||
VALUE "Comments", W32INFO_COMMENTS
|
||||
END
|
||||
END
|
||||
BLOCK "VarFileInfo"
|
||||
BEGIN
|
||||
VALUE "Translation", 0x409, 0x4b0
|
||||
END
|
||||
END
|
1845
kbx/keyboxd.c
Normal file
1845
kbx/keyboxd.c
Normal file
File diff suppressed because it is too large
Load diff
156
kbx/keyboxd.h
Normal file
156
kbx/keyboxd.h
Normal file
|
@ -0,0 +1,156 @@
|
|||
/* keyboxd.h - Global definitions for keyboxd
|
||||
* Copyright (C) 2018 Werner Koch
|
||||
*
|
||||
* This file is part of GnuPG.
|
||||
*
|
||||
* GnuPG is free software; you can redistribute it and/or modify
|
||||
* it under the terms of the GNU General Public License as published by
|
||||
* the Free Software Foundation; either version 3 of the License, or
|
||||
* (at your option) any later version.
|
||||
*
|
||||
* GnuPG is distributed in the hope that it will be useful,
|
||||
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
* GNU General Public License for more details.
|
||||
*
|
||||
* You should have received a copy of the GNU General Public License
|
||||
* along with this program; if not, see <https://www.gnu.org/licenses/>.
|
||||
*/
|
||||
|
||||
#ifndef KEYBOXD_H
|
||||
#define KEYBOXD_H
|
||||
|
||||
#ifdef GPG_ERR_SOURCE_DEFAULT
|
||||
#error GPG_ERR_SOURCE_DEFAULT already defined
|
||||
#endif
|
||||
#define GPG_ERR_SOURCE_DEFAULT GPG_ERR_SOURCE_KEYBOX
|
||||
#include <gpg-error.h>
|
||||
|
||||
#include <gcrypt.h>
|
||||
#include "../common/util.h"
|
||||
#include "../common/membuf.h"
|
||||
#include "../common/sysutils.h" /* (gnupg_fd_t) */
|
||||
|
||||
|
||||
/* A large struct name "opt" to keep global flags */
|
||||
struct
|
||||
{
|
||||
unsigned int debug; /* Debug flags (DBG_foo_VALUE) */
|
||||
int verbose; /* Verbosity level */
|
||||
int quiet; /* Be as quiet as possible */
|
||||
int dry_run; /* Don't change any persistent data */
|
||||
int batch; /* Batch mode */
|
||||
|
||||
/* True if we are running detached from the tty. */
|
||||
int running_detached;
|
||||
|
||||
} opt;
|
||||
|
||||
|
||||
/* Bit values for the --debug option. */
|
||||
#define DBG_MPI_VALUE 2 /* debug mpi details */
|
||||
#define DBG_CRYPTO_VALUE 4 /* debug low level crypto */
|
||||
#define DBG_MEMORY_VALUE 32 /* debug memory allocation stuff */
|
||||
#define DBG_CACHE_VALUE 64 /* debug the caching */
|
||||
#define DBG_MEMSTAT_VALUE 128 /* show memory statistics */
|
||||
#define DBG_HASHING_VALUE 512 /* debug hashing operations */
|
||||
#define DBG_IPC_VALUE 1024 /* Enable Assuan debugging. */
|
||||
#define DBG_CLOCK_VALUE 4096 /* debug timings (required build option). */
|
||||
#define DBG_LOOKUP_VALUE 8192 /* debug the key lookup */
|
||||
|
||||
/* Test macros for the debug option. */
|
||||
#define DBG_CRYPTO (opt.debug & DBG_CRYPTO_VALUE)
|
||||
#define DBG_MEMORY (opt.debug & DBG_MEMORY_VALUE)
|
||||
#define DBG_CACHE (opt.debug & DBG_CACHE_VALUE)
|
||||
#define DBG_HASHING (opt.debug & DBG_HASHING_VALUE)
|
||||
#define DBG_IPC (opt.debug & DBG_IPC_VALUE)
|
||||
#define DBG_CLOCK (opt.debug & DBG_CLOCK_VALUE)
|
||||
#define DBG_LOOKUP (opt.debug & DBG_LOOKUP_VALUE)
|
||||
|
||||
|
||||
/* Declaration of a database request object. This is used for all
|
||||
* database operation (search, insert, update, delete). */
|
||||
struct db_request_s;
|
||||
typedef struct db_request_s *db_request_t;
|
||||
|
||||
/* Forward reference for local definitions in command.c. */
|
||||
struct server_local_s;
|
||||
|
||||
#if SIZEOF_UNSIGNED_LONG == 8
|
||||
# define SERVER_CONTROL_MAGIC 0x6b6579626f786420
|
||||
#else
|
||||
# define SERVER_CONTROL_MAGIC 0x6b627864
|
||||
#endif
|
||||
|
||||
/* Collection of data per session (aka connection). */
|
||||
struct server_control_s
|
||||
{
|
||||
unsigned long magic;/* Always has SERVER_CONTROL_MAGIC. */
|
||||
int refcount; /* Count additional references to this object. */
|
||||
|
||||
/* Private data used to fire up the connection thread. We use this
|
||||
* structure do avoid an extra allocation for only a few bytes while
|
||||
* spawning a new connection thread. */
|
||||
struct {
|
||||
gnupg_fd_t fd;
|
||||
} thread_startup;
|
||||
|
||||
/* Private data of the server (kbxserver.c). */
|
||||
struct server_local_s *server_local;
|
||||
|
||||
/* Environment settings for the connection. */
|
||||
char *lc_messages;
|
||||
|
||||
/* Miscellaneous info on the connection. */
|
||||
unsigned long client_pid;
|
||||
int client_uid;
|
||||
|
||||
/* Two database request objects used with a connection. They are
|
||||
* auto-created as needed. */
|
||||
db_request_t opgp_req;
|
||||
db_request_t x509_req;
|
||||
|
||||
/* Flags for the current request. */
|
||||
unsigned int no_data_return : 1; /* Used by SEARCH and NEXT. */
|
||||
};
|
||||
|
||||
|
||||
/* This is a special version of the usual _() gettext macro. It
|
||||
* assumes a server connection control variable with the name "ctrl"
|
||||
* and uses that to translate a string according to the locale set for
|
||||
* the connection. The macro LunderscoreIMPL is used by i18n to
|
||||
* actually define the inline function when needed. */
|
||||
#if defined (ENABLE_NLS) || defined (USE_SIMPLE_GETTEXT)
|
||||
#define L_(a) keyboxd_Lunderscore (ctrl, (a))
|
||||
#define LunderscorePROTO \
|
||||
static inline const char *keyboxd_Lunderscore (ctrl_t ctrl, \
|
||||
const char *string) \
|
||||
GNUPG_GCC_ATTR_FORMAT_ARG(2);
|
||||
#define LunderscoreIMPL \
|
||||
static inline const char * \
|
||||
keyboxd_Lunderscore (ctrl_t ctrl, const char *string) \
|
||||
{ \
|
||||
return ctrl? i18n_localegettext (ctrl->lc_messages, string) \
|
||||
/* */: gettext (string); \
|
||||
}
|
||||
#else
|
||||
#define L_(a) (a)
|
||||
#endif
|
||||
|
||||
|
||||
/*-- keyboxd.c --*/
|
||||
void kbxd_exit (int rc) GPGRT_ATTR_NORETURN;
|
||||
void kbxd_set_progress_cb (void (*cb)(ctrl_t ctrl, const char *what,
|
||||
int printchar, int current, int total),
|
||||
ctrl_t ctrl);
|
||||
const char *get_kbxd_socket_name (void);
|
||||
int get_kbxd_active_connection_count (void);
|
||||
void kbxd_sighup_action (void);
|
||||
|
||||
|
||||
/*-- kbxserver.c --*/
|
||||
gpg_error_t kbxd_write_data_line (ctrl_t ctrl,
|
||||
const void *buffer_arg, size_t size);
|
||||
void kbxd_start_command_handler (ctrl_t, gnupg_fd_t, unsigned int);
|
||||
|
||||
#endif /*KEYBOXD_H*/
|
Loading…
Add table
Add a link
Reference in a new issue