mirror of
git://git.gnupg.org/gnupg.git
synced 2025-04-17 15:44:34 +02:00
agent: Fix function return type for check_cb and agent_askpin.
* agent/call-pinentry.c (unlock_pinentry): Return gpg_error_t. (start_pinentry, setup_qualitybar): Likewise. (agent_askpin): Fix return value check of check_cb. * agent/command-ssh.c (reenter_compare_cb): Return gpg_error_t. (ssh_identity_register): Fix return value check of agent_askpin. * agent/cvt-openpgp.c (try_do_unprotect_cb): Return gpg_error_t. * agent/findkey.c (try_unprotect_cb): Likewise. * agent/genkey.c (reenter_compare_cb): Return gpg_error_t. (agent_ask_new_passphrase): Fix return value check of agent_askpin.
This commit is contained in:
parent
ea079d283d
commit
f70f669536
@ -257,7 +257,8 @@ struct pin_entry_info_s
|
|||||||
int with_qualitybar; /* Set if the quality bar should be displayed. */
|
int with_qualitybar; /* Set if the quality bar should be displayed. */
|
||||||
int with_repeat; /* Request repetition of the passphrase. */
|
int with_repeat; /* Request repetition of the passphrase. */
|
||||||
int repeat_okay; /* Repetition worked. */
|
int repeat_okay; /* Repetition worked. */
|
||||||
int (*check_cb)(struct pin_entry_info_s *); /* CB used to check the PIN */
|
gpg_error_t (*check_cb)(struct pin_entry_info_s *); /* CB used to check
|
||||||
|
the PIN */
|
||||||
void *check_cb_arg; /* optional argument which might be of use in the CB */
|
void *check_cb_arg; /* optional argument which might be of use in the CB */
|
||||||
const char *cb_errtext; /* used by the cb to display a specific error */
|
const char *cb_errtext; /* used by the cb to display a specific error */
|
||||||
size_t max_length; /* Allocated length of the buffer PIN. */
|
size_t max_length; /* Allocated length of the buffer PIN. */
|
||||||
@ -402,11 +403,11 @@ void initialize_module_call_pinentry (void);
|
|||||||
void agent_query_dump_state (void);
|
void agent_query_dump_state (void);
|
||||||
void agent_reset_query (ctrl_t ctrl);
|
void agent_reset_query (ctrl_t ctrl);
|
||||||
int pinentry_active_p (ctrl_t ctrl, int waitseconds);
|
int pinentry_active_p (ctrl_t ctrl, int waitseconds);
|
||||||
int agent_askpin (ctrl_t ctrl,
|
gpg_error_t agent_askpin (ctrl_t ctrl,
|
||||||
const char *desc_text, const char *prompt_text,
|
const char *desc_text, const char *prompt_text,
|
||||||
const char *inital_errtext,
|
const char *inital_errtext,
|
||||||
struct pin_entry_info_s *pininfo,
|
struct pin_entry_info_s *pininfo,
|
||||||
const char *keyinfo, cache_mode_t cache_mode);
|
const char *keyinfo, cache_mode_t cache_mode);
|
||||||
int agent_get_passphrase (ctrl_t ctrl, char **retpass,
|
int agent_get_passphrase (ctrl_t ctrl, char **retpass,
|
||||||
const char *desc, const char *prompt,
|
const char *desc, const char *prompt,
|
||||||
const char *errtext, int with_qualitybar,
|
const char *errtext, int with_qualitybar,
|
||||||
|
@ -127,8 +127,8 @@ agent_reset_query (ctrl_t ctrl)
|
|||||||
disconnect that pinentry - we do this after the unlock so that a
|
disconnect that pinentry - we do this after the unlock so that a
|
||||||
stalled pinentry does not block other threads. Fixme: We should
|
stalled pinentry does not block other threads. Fixme: We should
|
||||||
have a timeout in Assuan for the disconnect operation. */
|
have a timeout in Assuan for the disconnect operation. */
|
||||||
static int
|
static gpg_error_t
|
||||||
unlock_pinentry (int rc)
|
unlock_pinentry (gpg_error_t rc)
|
||||||
{
|
{
|
||||||
assuan_context_t ctx = entry_ctx;
|
assuan_context_t ctx = entry_ctx;
|
||||||
int err;
|
int err;
|
||||||
@ -229,7 +229,7 @@ getinfo_pid_cb (void *opaque, const void *buffer, size_t length)
|
|||||||
that this function must always be used to aquire the lock for the
|
that this function must always be used to aquire the lock for the
|
||||||
pinentry - we will serialize _all_ pinentry calls.
|
pinentry - we will serialize _all_ pinentry calls.
|
||||||
*/
|
*/
|
||||||
static int
|
static gpg_error_t
|
||||||
start_pinentry (ctrl_t ctrl)
|
start_pinentry (ctrl_t ctrl)
|
||||||
{
|
{
|
||||||
int rc = 0;
|
int rc = 0;
|
||||||
@ -709,7 +709,7 @@ inq_quality (void *opaque, const char *line)
|
|||||||
|
|
||||||
|
|
||||||
/* Helper for agent_askpin and agent_get_passphrase. */
|
/* Helper for agent_askpin and agent_get_passphrase. */
|
||||||
static int
|
static gpg_error_t
|
||||||
setup_qualitybar (ctrl_t ctrl)
|
setup_qualitybar (ctrl_t ctrl)
|
||||||
{
|
{
|
||||||
int rc;
|
int rc;
|
||||||
@ -801,14 +801,14 @@ pinentry_status_cb (void *opaque, const char *line)
|
|||||||
number here and repeat it as long as we have invalid formed
|
number here and repeat it as long as we have invalid formed
|
||||||
numbers. KEYINFO and CACHE_MODE are used to tell pinentry something
|
numbers. KEYINFO and CACHE_MODE are used to tell pinentry something
|
||||||
about the key. */
|
about the key. */
|
||||||
int
|
gpg_error_t
|
||||||
agent_askpin (ctrl_t ctrl,
|
agent_askpin (ctrl_t ctrl,
|
||||||
const char *desc_text, const char *prompt_text,
|
const char *desc_text, const char *prompt_text,
|
||||||
const char *initial_errtext,
|
const char *initial_errtext,
|
||||||
struct pin_entry_info_s *pininfo,
|
struct pin_entry_info_s *pininfo,
|
||||||
const char *keyinfo, cache_mode_t cache_mode)
|
const char *keyinfo, cache_mode_t cache_mode)
|
||||||
{
|
{
|
||||||
int rc;
|
gpg_error_t rc;
|
||||||
char line[ASSUAN_LINELENGTH];
|
char line[ASSUAN_LINELENGTH];
|
||||||
struct entry_parm_s parm;
|
struct entry_parm_s parm;
|
||||||
const char *errtext = NULL;
|
const char *errtext = NULL;
|
||||||
@ -1006,7 +1006,8 @@ agent_askpin (ctrl_t ctrl,
|
|||||||
/* More checks by utilizing the optional callback. */
|
/* More checks by utilizing the optional callback. */
|
||||||
pininfo->cb_errtext = NULL;
|
pininfo->cb_errtext = NULL;
|
||||||
rc = pininfo->check_cb (pininfo);
|
rc = pininfo->check_cb (pininfo);
|
||||||
if (rc == -1 && pininfo->cb_errtext)
|
if (gpg_err_code (rc) == GPG_ERR_BAD_PASSPHRASE
|
||||||
|
&& pininfo->cb_errtext)
|
||||||
errtext = pininfo->cb_errtext;
|
errtext = pininfo->cb_errtext;
|
||||||
else if (gpg_err_code (rc) == GPG_ERR_BAD_PASSPHRASE
|
else if (gpg_err_code (rc) == GPG_ERR_BAD_PASSPHRASE
|
||||||
|| gpg_err_code (rc) == GPG_ERR_BAD_PIN)
|
|| gpg_err_code (rc) == GPG_ERR_BAD_PIN)
|
||||||
|
@ -3040,14 +3040,14 @@ ssh_key_to_protected_buffer (gcry_sexp_t key, const char *passphrase,
|
|||||||
|
|
||||||
/* Callback function to compare the first entered PIN with the one
|
/* Callback function to compare the first entered PIN with the one
|
||||||
currently being entered. */
|
currently being entered. */
|
||||||
static int
|
static gpg_error_t
|
||||||
reenter_compare_cb (struct pin_entry_info_s *pi)
|
reenter_compare_cb (struct pin_entry_info_s *pi)
|
||||||
{
|
{
|
||||||
const char *pin1 = pi->check_cb_arg;
|
const char *pin1 = pi->check_cb_arg;
|
||||||
|
|
||||||
if (!strcmp (pin1, pi->pin))
|
if (!strcmp (pin1, pi->pin))
|
||||||
return 0; /* okay */
|
return 0; /* okay */
|
||||||
return -1;
|
return gpg_error (GPG_ERR_BAD_PASSPHRASE);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
@ -3133,7 +3133,7 @@ ssh_identity_register (ctrl_t ctrl, ssh_key_type_spec_t *spec,
|
|||||||
if (*pi->pin && !pi->repeat_okay)
|
if (*pi->pin && !pi->repeat_okay)
|
||||||
{
|
{
|
||||||
err = agent_askpin (ctrl, description2, NULL, NULL, pi2, NULL, 0);
|
err = agent_askpin (ctrl, description2, NULL, NULL, pi2, NULL, 0);
|
||||||
if (err == -1)
|
if (gpg_err_code (err) == GPG_ERR_BAD_PASSPHRASE)
|
||||||
{ /* The re-entered one did not match and the user did not
|
{ /* The re-entered one did not match and the user did not
|
||||||
hit cancel. */
|
hit cancel. */
|
||||||
initial_errtext = L_("does not match - try again");
|
initial_errtext = L_("does not match - try again");
|
||||||
|
@ -657,7 +657,7 @@ do_unprotect (const char *passphrase,
|
|||||||
|
|
||||||
/* Callback function to try the unprotection from the passphrase query
|
/* Callback function to try the unprotection from the passphrase query
|
||||||
code. */
|
code. */
|
||||||
static int
|
static gpg_error_t
|
||||||
try_do_unprotect_cb (struct pin_entry_info_s *pi)
|
try_do_unprotect_cb (struct pin_entry_info_s *pi)
|
||||||
{
|
{
|
||||||
gpg_error_t err;
|
gpg_error_t err;
|
||||||
|
@ -111,7 +111,7 @@ agent_write_private_key (const unsigned char *grip,
|
|||||||
|
|
||||||
/* Callback function to try the unprotection from the passphrase query
|
/* Callback function to try the unprotection from the passphrase query
|
||||||
code. */
|
code. */
|
||||||
static int
|
static gpg_error_t
|
||||||
try_unprotect_cb (struct pin_entry_info_s *pi)
|
try_unprotect_cb (struct pin_entry_info_s *pi)
|
||||||
{
|
{
|
||||||
struct try_unprotect_arg_s *arg = pi->check_cb_arg;
|
struct try_unprotect_arg_s *arg = pi->check_cb_arg;
|
||||||
|
@ -326,14 +326,14 @@ check_passphrase_constraints (ctrl_t ctrl, const char *pw,
|
|||||||
|
|
||||||
/* Callback function to compare the first entered PIN with the one
|
/* Callback function to compare the first entered PIN with the one
|
||||||
currently being entered. */
|
currently being entered. */
|
||||||
static int
|
static gpg_error_t
|
||||||
reenter_compare_cb (struct pin_entry_info_s *pi)
|
reenter_compare_cb (struct pin_entry_info_s *pi)
|
||||||
{
|
{
|
||||||
const char *pin1 = pi->check_cb_arg;
|
const char *pin1 = pi->check_cb_arg;
|
||||||
|
|
||||||
if (!strcmp (pin1, pi->pin))
|
if (!strcmp (pin1, pi->pin))
|
||||||
return 0; /* okay */
|
return 0; /* okay */
|
||||||
return -1;
|
return gpg_error (GPG_ERR_BAD_PASSPHRASE);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
@ -410,7 +410,7 @@ agent_ask_new_passphrase (ctrl_t ctrl, const char *prompt,
|
|||||||
if (*pi->pin && !pi->repeat_okay)
|
if (*pi->pin && !pi->repeat_okay)
|
||||||
{
|
{
|
||||||
err = agent_askpin (ctrl, text2, NULL, NULL, pi2, NULL, 0);
|
err = agent_askpin (ctrl, text2, NULL, NULL, pi2, NULL, 0);
|
||||||
if (err == -1)
|
if (gpg_err_code (err) == GPG_ERR_BAD_PASSPHRASE)
|
||||||
{ /* The re-entered one did not match and the user did not
|
{ /* The re-entered one did not match and the user did not
|
||||||
hit cancel. */
|
hit cancel. */
|
||||||
initial_errtext = xtrystrdup (L_("does not match - try again"));
|
initial_errtext = xtrystrdup (L_("does not match - try again"));
|
||||||
|
Loading…
x
Reference in New Issue
Block a user