mirror of
git://git.gnupg.org/gnupg.git
synced 2025-01-30 16:17:02 +01:00
62a7854816
* tpm2d: New directory. * Makefile.am (SUBDIRS): Add directory. * configure.ac: Detect libtss and decide whether to build tpm2d. * am/cmacros.am: Add a define. * util.h (GNUPG_MODULE_NAME_TPM2DAEMON): New. * common/homedir.c (gnupg_module_name): Add tpm2d. * common/mapstrings.c (macros): Add "TPM2DAEMON". * tools/gpgconf.h (GC_COMPONENT_TPM2DAEMON): New. * tools/gpgconf-comp.c (known_options_tpm2daemon): New. (gc_component): Add TPM2. (tpm2daemon_runtime_change): New. * tpm2d/Makefile.am: New. * tpm2d/command.c: New. * tpm2d/ibm-tss.h: New. * tpm2d/tpm2.c: New. * tpm2d/tpm2.h: New. * tpm2d/tpm2daemon.c: New. * tpm2d/tpm2daemon.h: New. --- This commit adds and plumbs in a tpm2daemon to the build to mirror the operation of scdaemon. The architecture of the code is that tpm2daemon.c itself is pretty much a clone of scd/scdaemon.c just with updated function prefixes (this argues there could be some further consolidation of the daemon handling code). Note that although this commit causes the daemon to be built and installed, nothing actually starts it or uses it yet. Command handling ---------------- command.c is copied from the command handler in scd.c except that the command implementation is now done in terms of tpm2 commands and the wire protocol is far simpler. The tpm2daemon only responds to 4 commands IMPORT: import a standard s-expression private key and export it to TPM2 format. This conversion cannot be undone and the private key now can *only* be used by the TPM2. To anyone who gets hold of the private key now, it's just an encrypted binary blob. PKSIGN: create a signature from the tpm2 key. The TPM2 form private key is retrieved by KEYDATA and the hash to be signed by EXTRA. Note there is no hash specifier because the tpm2 tss deduces the hash type from the length of the EXTRA data. This is actually a limitation of the tpm2 command API and it will be interesting to see how this fares if the tpm2 ever supports say sha3-256 hashes. PKDECRYPT: decrypt (RSA case) or derive (ECC case) a symmetric key. The tpm2 for private key is retrieved by KEYDATA and the information used to create the symmetric key by EXTRA. KILLTPM2D: stop the daemon All the tpm2 primitives used by command.c are in tpm2.h and all the tpm2 specific gunk is confined to tpm2.c, which is the only piece of this that actually does calls into the tss library. Signed-off-by: James Bottomley <James.Bottomley@HansenPartnership.com> Changes from James' patch: - gpgconf: The displayed name is "TPM" and not "TPM2". That string is used by GUIs and should be something the user understands. For example we also use "network" instead of "Dirmngr". - Removed some commented includes. - Use 16 as emulation of GPG_ERR_SOURCE_TPM2. - Silenced a C90 compiler warning and flags unused parameters. - Removed "if HAVE_LIBS" from tpm2/Makefile.am and add missing files so that make distcheck works. Signed-off-by: Werner Koch <wk@gnupg.org>
1290 lines
34 KiB
C
1290 lines
34 KiB
C
/* tpm2daemon.c - The GnuPG tpm2 Daemon
|
||
* Copyright (C) 2001-2002, 2004-2005, 2007-2009 Free Software Foundation, Inc.
|
||
* Copyright (C) 2001-2002, 2004-2005, 2007-2014 Werner Koch
|
||
*
|
||
* This file is part of GnuPG.
|
||
*
|
||
* GnuPG is free software; you can redistribute it and/or modify
|
||
* it under the terms of the GNU General Public License as published by
|
||
* the Free Software Foundation; either version 3 of the License, or
|
||
* (at your option) any later version.
|
||
*
|
||
* GnuPG is distributed in the hope that it will be useful,
|
||
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||
* GNU General Public License for more details.
|
||
*
|
||
* You should have received a copy of the GNU General Public License
|
||
* along with this program; if not, see <https://www.gnu.org/licenses/>.
|
||
*/
|
||
|
||
#include <config.h>
|
||
|
||
#include <stdio.h>
|
||
#include <stdlib.h>
|
||
#include <stddef.h>
|
||
#include <stdarg.h>
|
||
#include <string.h>
|
||
#include <errno.h>
|
||
#include <assert.h>
|
||
#include <time.h>
|
||
#include <fcntl.h>
|
||
#ifndef HAVE_W32_SYSTEM
|
||
#include <sys/socket.h>
|
||
#include <sys/un.h>
|
||
#endif /*HAVE_W32_SYSTEM*/
|
||
#include <unistd.h>
|
||
#include <signal.h>
|
||
#include <npth.h>
|
||
|
||
#define INCLUDED_BY_MAIN_MODULE 1
|
||
#define GNUPG_COMMON_NEED_AFLOCAL
|
||
#include "tpm2daemon.h"
|
||
#include <gcrypt.h>
|
||
|
||
#include <assuan.h> /* malloc hooks */
|
||
|
||
#include "../common/i18n.h"
|
||
#include "../common/sysutils.h"
|
||
#include "../common/gc-opt-flags.h"
|
||
#include "../common/asshelp.h"
|
||
#include "../common/exechelp.h"
|
||
#include "../common/init.h"
|
||
|
||
#ifndef ENAMETOOLONG
|
||
# define ENAMETOOLONG EINVAL
|
||
#endif
|
||
|
||
enum cmd_and_opt_values
|
||
{ aNull = 0,
|
||
oCsh = 'c',
|
||
oQuiet = 'q',
|
||
oSh = 's',
|
||
oVerbose = 'v',
|
||
|
||
oNoVerbose = 500,
|
||
aGPGConfList,
|
||
aGPGConfTest,
|
||
oOptions,
|
||
oDebug,
|
||
oDebugAll,
|
||
oDebugLevel,
|
||
oDebugWait,
|
||
oDebugAllowCoreDump,
|
||
oDebugLogTid,
|
||
oDebugAssuanLogCats,
|
||
oNoGreeting,
|
||
oNoOptions,
|
||
oHomedir,
|
||
oNoDetach,
|
||
oNoGrab,
|
||
oLogFile,
|
||
oServer,
|
||
oMultiServer,
|
||
oDaemon,
|
||
oListenBacklog,
|
||
oParent
|
||
};
|
||
|
||
|
||
|
||
static gpgrt_opt_t opts[] = {
|
||
ARGPARSE_c (aGPGConfList, "gpgconf-list", "@"),
|
||
ARGPARSE_c (aGPGConfTest, "gpgconf-test", "@"),
|
||
|
||
ARGPARSE_group (301, N_("@Options:\n ")),
|
||
|
||
ARGPARSE_s_n (oServer,"server", N_("run in server mode (foreground)")),
|
||
ARGPARSE_s_n (oMultiServer, "multi-server",
|
||
N_("run in multi server mode (foreground)")),
|
||
ARGPARSE_s_n (oDaemon, "daemon", N_("run in daemon mode (background)")),
|
||
ARGPARSE_s_n (oVerbose, "verbose", N_("verbose")),
|
||
ARGPARSE_s_n (oQuiet, "quiet", N_("be somewhat more quiet")),
|
||
ARGPARSE_s_n (oSh, "sh", N_("sh-style command output")),
|
||
ARGPARSE_s_n (oCsh, "csh", N_("csh-style command output")),
|
||
ARGPARSE_s_s (oOptions, "options", N_("|FILE|read options from FILE")),
|
||
ARGPARSE_s_s (oDebug, "debug", "@"),
|
||
ARGPARSE_s_n (oDebugAll, "debug-all", "@"),
|
||
ARGPARSE_s_s (oDebugLevel, "debug-level" ,
|
||
N_("|LEVEL|set the debugging level to LEVEL")),
|
||
ARGPARSE_s_i (oDebugWait, "debug-wait", "@"),
|
||
ARGPARSE_s_n (oDebugAllowCoreDump, "debug-allow-core-dump", "@"),
|
||
ARGPARSE_s_n (oDebugLogTid, "debug-log-tid", "@"),
|
||
ARGPARSE_p_u (oDebugAssuanLogCats, "debug-assuan-log-cats", "@"),
|
||
ARGPARSE_s_n (oNoDetach, "no-detach", N_("do not detach from the console")),
|
||
ARGPARSE_s_s (oLogFile, "log-file", N_("|FILE|write a log to FILE")),
|
||
ARGPARSE_s_s (oHomedir, "homedir", "@"),
|
||
ARGPARSE_s_i (oListenBacklog, "listen-backlog", "@"),
|
||
ARGPARSE_p_u (oParent, "tpm2-parent",
|
||
N_("Specify tpm2 parent for key")),
|
||
|
||
ARGPARSE_end ()
|
||
};
|
||
|
||
|
||
/* The list of supported debug flags. */
|
||
static struct debug_flags_s debug_flags [] =
|
||
{
|
||
{ DBG_MPI_VALUE , "mpi" },
|
||
{ DBG_CRYPTO_VALUE , "crypto" },
|
||
{ DBG_IPC_VALUE , "ipc" },
|
||
{ 0, NULL }
|
||
};
|
||
|
||
|
||
/* The timer tick used to check card removal.
|
||
|
||
We poll every 500ms to let the user immediately know a status
|
||
change.
|
||
|
||
For a card reader with an interrupt endpoint, this timer is not
|
||
used with the internal CCID driver.
|
||
|
||
This is not too good for power saving but given that there is no
|
||
easy way to block on card status changes it is the best we can do.
|
||
For PC/SC we could in theory use an extra thread to wait for status
|
||
changes but that requires a native thread because there is no way
|
||
to make the underlying PC/SC card change function block using a Npth
|
||
mechanism. Given that a native thread could only be used under W32
|
||
we don't do that at all. */
|
||
#define TIMERTICK_INTERVAL_SEC (0)
|
||
#define TIMERTICK_INTERVAL_USEC (500000)
|
||
|
||
/* Flag to indicate that a shutdown was requested. */
|
||
static int shutdown_pending;
|
||
|
||
/* It is possible that we are currently running under setuid permissions */
|
||
static int maybe_setuid = 1;
|
||
|
||
/* Flag telling whether we are running as a pipe server. */
|
||
static int pipe_server;
|
||
|
||
/* Name of the communication socket */
|
||
static char *socket_name;
|
||
/* Name of the redirected socket or NULL. */
|
||
static char *redir_socket_name;
|
||
|
||
/* We need to keep track of the server's nonces (these are dummies for
|
||
POSIX systems). */
|
||
static assuan_sock_nonce_t socket_nonce;
|
||
|
||
/* Value for the listen() backlog argument. Change at runtime with
|
||
* --listen-backlog. */
|
||
static int listen_backlog = 64;
|
||
|
||
#ifdef HAVE_W32_SYSTEM
|
||
static HANDLE the_event;
|
||
#else
|
||
/* PID to notify update of usb devices. */
|
||
static pid_t main_thread_pid;
|
||
#endif
|
||
#ifdef HAVE_PSELECT_NO_EINTR
|
||
/* FD to notify changes. */
|
||
static int notify_fd;
|
||
#endif
|
||
|
||
static char *create_socket_name (char *standard_name);
|
||
static gnupg_fd_t create_server_socket (const char *name,
|
||
char **r_redir_name,
|
||
assuan_sock_nonce_t *nonce);
|
||
|
||
static void *start_connection_thread (void *arg);
|
||
static void handle_connections (int listen_fd);
|
||
|
||
/* Pth wrapper function definitions. */
|
||
ASSUAN_SYSTEM_NPTH_IMPL;
|
||
|
||
static int active_connections;
|
||
|
||
|
||
static char *
|
||
make_libversion (const char *libname, const char *(*getfnc)(const char*))
|
||
{
|
||
const char *s;
|
||
char *result;
|
||
|
||
if (maybe_setuid)
|
||
{
|
||
gcry_control (GCRYCTL_INIT_SECMEM, 0, 0); /* Drop setuid. */
|
||
maybe_setuid = 0;
|
||
}
|
||
s = getfnc (NULL);
|
||
result = xmalloc (strlen (libname) + 1 + strlen (s) + 1);
|
||
strcpy (stpcpy (stpcpy (result, libname), " "), s);
|
||
return result;
|
||
}
|
||
|
||
|
||
static const char *
|
||
my_strusage (int level)
|
||
{
|
||
static char *ver_gcry;
|
||
const char *p;
|
||
|
||
switch (level)
|
||
{
|
||
case 11: p = "@TPM2DAEMON@ (@GNUPG@)";
|
||
break;
|
||
case 13: p = VERSION; break;
|
||
case 17: p = PRINTABLE_OS_NAME; break;
|
||
case 19: p = _("Please report bugs to <@EMAIL@>.\n"); break;
|
||
|
||
case 20:
|
||
if (!ver_gcry)
|
||
ver_gcry = make_libversion ("libgcrypt", gcry_check_version);
|
||
p = ver_gcry;
|
||
break;
|
||
case 1:
|
||
case 40: p = _("Usage: @TPM2DAEMON@ [options] (-h for help)");
|
||
break;
|
||
case 41: p = _("Syntax: tpm2daemon [options] [command [args]]\n"
|
||
"TPM2 daemon for @GNUPG@\n");
|
||
break;
|
||
|
||
default: p = NULL;
|
||
}
|
||
return p;
|
||
}
|
||
|
||
|
||
static int
|
||
tid_log_callback (unsigned long *rvalue)
|
||
{
|
||
int len = sizeof (*rvalue);
|
||
npth_t thread;
|
||
|
||
thread = npth_self ();
|
||
if (sizeof (thread) < len)
|
||
len = sizeof (thread);
|
||
memcpy (rvalue, &thread, len);
|
||
|
||
return 2; /* Use use hex representation. */
|
||
}
|
||
|
||
|
||
/* Setup the debugging. With a LEVEL of NULL only the active debug
|
||
flags are propagated to the subsystems. With LEVEL set, a specific
|
||
set of debug flags is set; thus overriding all flags already
|
||
set. */
|
||
static void
|
||
set_debug (const char *level)
|
||
{
|
||
int numok = (level && digitp (level));
|
||
int numlvl = numok? atoi (level) : 0;
|
||
|
||
if (!level)
|
||
;
|
||
else if (!strcmp (level, "none") || (numok && numlvl < 1))
|
||
opt.debug = 0;
|
||
else if (!strcmp (level, "basic") || (numok && numlvl <= 2))
|
||
opt.debug = DBG_IPC_VALUE;
|
||
else if (!strcmp (level, "advanced") || (numok && numlvl <= 5))
|
||
opt.debug = DBG_IPC_VALUE;
|
||
else if (!strcmp (level, "expert") || (numok && numlvl <= 8))
|
||
opt.debug = DBG_IPC_VALUE;
|
||
else if (!strcmp (level, "guru") || numok)
|
||
opt.debug = ~0;
|
||
else
|
||
{
|
||
log_error (_("invalid debug-level '%s' given\n"), level);
|
||
tpm2d_exit (2);
|
||
}
|
||
|
||
|
||
if (opt.debug && !opt.verbose)
|
||
opt.verbose = 1;
|
||
if (opt.debug && opt.quiet)
|
||
opt.quiet = 0;
|
||
|
||
if (opt.debug & DBG_MPI_VALUE)
|
||
gcry_control (GCRYCTL_SET_DEBUG_FLAGS, 2);
|
||
if (opt.debug & DBG_CRYPTO_VALUE )
|
||
gcry_control (GCRYCTL_SET_DEBUG_FLAGS, 1);
|
||
gcry_control (GCRYCTL_SET_VERBOSITY, (int)opt.verbose);
|
||
|
||
if (opt.debug)
|
||
parse_debug_flag (NULL, &opt.debug, debug_flags);
|
||
}
|
||
|
||
|
||
|
||
static void
|
||
cleanup (void)
|
||
{
|
||
if (socket_name && *socket_name)
|
||
{
|
||
char *name;
|
||
|
||
name = redir_socket_name? redir_socket_name : socket_name;
|
||
|
||
gnupg_remove (name);
|
||
*socket_name = 0;
|
||
}
|
||
}
|
||
|
||
|
||
|
||
int
|
||
main (int argc, char **argv )
|
||
{
|
||
gpgrt_argparse_t pargs;
|
||
int orig_argc;
|
||
char **orig_argv;
|
||
char *last_configname = NULL;
|
||
const char *configname = NULL;
|
||
const char *shell;
|
||
int parse_debug = 0;
|
||
const char *debug_level = NULL;
|
||
int greeting = 0;
|
||
int nogreeting = 0;
|
||
int multi_server = 0;
|
||
int is_daemon = 0;
|
||
int nodetach = 0;
|
||
int csh_style = 0;
|
||
char *logfile = NULL;
|
||
int debug_wait = 0;
|
||
int gpgconf_list = 0;
|
||
char *config_filename = NULL;
|
||
int allow_coredump = 0;
|
||
struct assuan_malloc_hooks malloc_hooks;
|
||
int res;
|
||
npth_t pipecon_handler;
|
||
|
||
early_system_init ();
|
||
gpgrt_set_strusage (my_strusage);
|
||
gcry_control (GCRYCTL_SUSPEND_SECMEM_WARN);
|
||
/* Please note that we may running SUID(ROOT), so be very CAREFUL
|
||
when adding any stuff between here and the call to INIT_SECMEM()
|
||
somewhere after the option parsing */
|
||
log_set_prefix ("tpm2daemon", GPGRT_LOG_WITH_PREFIX | GPGRT_LOG_WITH_PID);
|
||
|
||
/* Make sure that our subsystems are ready. */
|
||
i18n_init ();
|
||
init_common_subsystems (&argc, &argv);
|
||
|
||
malloc_hooks.malloc = gcry_malloc;
|
||
malloc_hooks.realloc = gcry_realloc;
|
||
malloc_hooks.free = gcry_free;
|
||
assuan_set_malloc_hooks (&malloc_hooks);
|
||
assuan_set_gpg_err_source (GPG_ERR_SOURCE_DEFAULT);
|
||
assuan_set_system_hooks (ASSUAN_SYSTEM_NPTH);
|
||
assuan_sock_init ();
|
||
setup_libassuan_logging (&opt.debug, NULL);
|
||
|
||
setup_libgcrypt_logging ();
|
||
gcry_control (GCRYCTL_USE_SECURE_RNDPOOL);
|
||
|
||
disable_core_dumps ();
|
||
|
||
/* Set default options. */
|
||
opt.parent = 0; /* 0 means TPM uses default */
|
||
|
||
shell = getenv ("SHELL");
|
||
if (shell && strlen (shell) >= 3 && !strcmp (shell+strlen (shell)-3, "csh") )
|
||
csh_style = 1;
|
||
|
||
/* Check whether we have a config file on the commandline */
|
||
orig_argc = argc;
|
||
orig_argv = argv;
|
||
pargs.argc = &argc;
|
||
pargs.argv = &argv;
|
||
pargs.flags= (ARGPARSE_FLAG_KEEP | ARGPARSE_FLAG_NOVERSION);
|
||
while (gpgrt_argparse (NULL, &pargs, opts))
|
||
{
|
||
switch (pargs.r_opt)
|
||
{
|
||
case oDebug:
|
||
case oDebugAll:
|
||
parse_debug++;
|
||
break;
|
||
case oHomedir:
|
||
gnupg_set_homedir (pargs.r.ret_str);
|
||
break;
|
||
}
|
||
}
|
||
/* Reset the flags. */
|
||
pargs.flags &= ~(ARGPARSE_FLAG_KEEP | ARGPARSE_FLAG_NOVERSION);
|
||
|
||
/* initialize the secure memory. */
|
||
gcry_control (GCRYCTL_INIT_SECMEM, 16384, 0);
|
||
maybe_setuid = 0;
|
||
|
||
/*
|
||
Now we are working under our real uid
|
||
*/
|
||
|
||
|
||
/* The configuraton directories for use by gpgrt_argparser. */
|
||
gpgrt_set_confdir (GPGRT_CONFDIR_SYS, gnupg_sysconfdir ());
|
||
gpgrt_set_confdir (GPGRT_CONFDIR_USER, gnupg_homedir ());
|
||
|
||
/* We are re-using the struct, thus the reset flag. We OR the
|
||
* flags so that the internal intialized flag won't be cleared. */
|
||
argc = orig_argc;
|
||
argv = orig_argv;
|
||
pargs.argc = &argc;
|
||
pargs.argv = &argv;
|
||
pargs.flags |= (ARGPARSE_FLAG_RESET
|
||
| ARGPARSE_FLAG_KEEP
|
||
| ARGPARSE_FLAG_SYS
|
||
| ARGPARSE_FLAG_USER);
|
||
while (gpgrt_argparser (&pargs, opts, TPM2DAEMON_NAME EXTSEP_S "conf"))
|
||
{
|
||
switch (pargs.r_opt)
|
||
{
|
||
case ARGPARSE_CONFFILE:
|
||
if (parse_debug)
|
||
log_info (_("reading options from '%s'\n"),
|
||
pargs.r_type? pargs.r.ret_str: "[cmdline]");
|
||
if (pargs.r_type)
|
||
{
|
||
xfree (last_configname);
|
||
last_configname = xstrdup (pargs.r.ret_str);
|
||
configname = last_configname;
|
||
}
|
||
else
|
||
configname = NULL;
|
||
break;
|
||
|
||
case aGPGConfList: gpgconf_list = 1; break;
|
||
case aGPGConfTest: gpgconf_list = 2; break;
|
||
case oQuiet: opt.quiet = 1; break;
|
||
case oVerbose: opt.verbose++; break;
|
||
|
||
case oDebug:
|
||
if (parse_debug_flag (pargs.r.ret_str, &opt.debug, debug_flags))
|
||
{
|
||
pargs.r_opt = ARGPARSE_INVALID_ARG;
|
||
pargs.err = ARGPARSE_PRINT_ERROR;
|
||
}
|
||
break;
|
||
case oDebugAll: opt.debug = ~0; break;
|
||
case oDebugLevel: debug_level = pargs.r.ret_str; break;
|
||
case oDebugWait: debug_wait = pargs.r.ret_int; break;
|
||
case oDebugAllowCoreDump:
|
||
enable_core_dumps ();
|
||
allow_coredump = 1;
|
||
break;
|
||
case oDebugLogTid:
|
||
log_set_pid_suffix_cb (tid_log_callback);
|
||
break;
|
||
case oDebugAssuanLogCats:
|
||
set_libassuan_log_cats (pargs.r.ret_ulong);
|
||
break;
|
||
|
||
case oNoGreeting: nogreeting = 1; break;
|
||
case oNoVerbose: opt.verbose = 0; break;
|
||
case oNoOptions: break; /* no-options */
|
||
case oHomedir: gnupg_set_homedir (pargs.r.ret_str); break;
|
||
case oNoDetach: nodetach = 1; break;
|
||
case oLogFile: logfile = pargs.r.ret_str; break;
|
||
case oCsh: csh_style = 1; break;
|
||
case oSh: csh_style = 0; break;
|
||
case oServer: pipe_server = 1; break;
|
||
case oMultiServer: pipe_server = 1; multi_server = 1; break;
|
||
case oDaemon: is_daemon = 1; break;
|
||
|
||
case oListenBacklog:
|
||
listen_backlog = pargs.r.ret_int;
|
||
break;
|
||
|
||
case oParent:
|
||
opt.parent = pargs.r.ret_ulong;
|
||
break;
|
||
|
||
default:
|
||
if (configname)
|
||
pargs.err = ARGPARSE_PRINT_WARNING;
|
||
else
|
||
pargs.err = ARGPARSE_PRINT_ERROR;
|
||
break;
|
||
}
|
||
}
|
||
gpgrt_argparse (NULL, &pargs, NULL); /* Release internal state. */
|
||
|
||
if (!last_configname)
|
||
config_filename = gpgrt_fnameconcat (gnupg_homedir (),
|
||
TPM2DAEMON_NAME EXTSEP_S "conf",
|
||
NULL);
|
||
else
|
||
{
|
||
config_filename = last_configname;
|
||
last_configname = NULL;
|
||
}
|
||
|
||
if (log_get_errorcount (0))
|
||
exit (2);
|
||
if (nogreeting )
|
||
greeting = 0;
|
||
|
||
if (greeting)
|
||
{
|
||
es_fprintf (es_stderr, "%s %s; %s\n",
|
||
gpgrt_strusage (11), gpgrt_strusage (13),
|
||
gpgrt_strusage (14) );
|
||
es_fprintf (es_stderr, "%s\n", gpgrt_strusage (15) );
|
||
}
|
||
#ifdef IS_DEVELOPMENT_VERSION
|
||
log_info ("NOTE: this is a development version!\n");
|
||
#endif
|
||
|
||
/* Print a warning if an argument looks like an option. */
|
||
if (!opt.quiet && !(pargs.flags & ARGPARSE_FLAG_STOP_SEEN))
|
||
{
|
||
int i;
|
||
|
||
for (i=0; i < argc; i++)
|
||
if (argv[i][0] == '-' && argv[i][1] == '-')
|
||
log_info (_("Note: '%s' is not considered an option\n"), argv[i]);
|
||
}
|
||
|
||
if (atexit (cleanup))
|
||
{
|
||
log_error ("atexit failed\n");
|
||
cleanup ();
|
||
exit (1);
|
||
}
|
||
|
||
set_debug (debug_level);
|
||
|
||
if (gpgconf_list == 2)
|
||
tpm2d_exit (0);
|
||
if (gpgconf_list)
|
||
{
|
||
es_printf ("verbose:%lu:\n"
|
||
"quiet:%lu:\n"
|
||
"debug-level:%lu:\"none:\n"
|
||
"log-file:%lu:\n",
|
||
GC_OPT_FLAG_NONE,
|
||
GC_OPT_FLAG_NONE,
|
||
GC_OPT_FLAG_DEFAULT,
|
||
GC_OPT_FLAG_NONE );
|
||
|
||
tpm2d_exit (0);
|
||
}
|
||
|
||
/* Now start with logging to a file if this is desired. */
|
||
if (logfile)
|
||
{
|
||
log_set_file (logfile);
|
||
log_set_prefix (NULL, GPGRT_LOG_WITH_PREFIX | GPGRT_LOG_WITH_TIME | GPGRT_LOG_WITH_PID);
|
||
}
|
||
|
||
if (debug_wait && pipe_server)
|
||
{
|
||
log_debug ("waiting for debugger - my pid is %u .....\n",
|
||
(unsigned int)getpid ());
|
||
gnupg_sleep (debug_wait);
|
||
log_debug ("... okay\n");
|
||
}
|
||
|
||
if (pipe_server)
|
||
{
|
||
/* This is the simple pipe based server */
|
||
ctrl_t ctrl;
|
||
npth_attr_t tattr;
|
||
int fd = -1;
|
||
|
||
#ifndef HAVE_W32_SYSTEM
|
||
{
|
||
struct sigaction sa;
|
||
|
||
sa.sa_handler = SIG_IGN;
|
||
sigemptyset (&sa.sa_mask);
|
||
sa.sa_flags = 0;
|
||
sigaction (SIGPIPE, &sa, NULL);
|
||
}
|
||
#endif
|
||
|
||
npth_init ();
|
||
gpgrt_set_syscall_clamp (npth_unprotect, npth_protect);
|
||
|
||
/* If --debug-allow-core-dump has been given we also need to
|
||
switch the working directory to a place where we can actually
|
||
write. */
|
||
if (allow_coredump)
|
||
{
|
||
if (chdir ("/tmp"))
|
||
log_debug ("chdir to '/tmp' failed: %s\n", strerror (errno));
|
||
else
|
||
log_debug ("changed working directory to '/tmp'\n");
|
||
}
|
||
|
||
/* In multi server mode we need to listen on an additional
|
||
socket. Create that socket now before starting the handler
|
||
for the pipe connection. This allows that handler to send
|
||
back the name of that socket. */
|
||
if (multi_server)
|
||
{
|
||
socket_name = create_socket_name (TPM2DAEMON_SOCK_NAME);
|
||
fd = FD2INT (create_server_socket (socket_name,
|
||
&redir_socket_name,
|
||
&socket_nonce));
|
||
}
|
||
|
||
res = npth_attr_init (&tattr);
|
||
if (res)
|
||
{
|
||
log_error ("error allocating thread attributes: %s\n",
|
||
strerror (res));
|
||
tpm2d_exit (2);
|
||
}
|
||
npth_attr_setdetachstate (&tattr, NPTH_CREATE_DETACHED);
|
||
|
||
ctrl = xtrycalloc (1, sizeof *ctrl);
|
||
if ( !ctrl )
|
||
{
|
||
log_error ("error allocating connection control data: %s\n",
|
||
strerror (errno) );
|
||
tpm2d_exit (2);
|
||
}
|
||
ctrl->thread_startup.fd = GNUPG_INVALID_FD;
|
||
res = npth_create (&pipecon_handler, &tattr, start_connection_thread, ctrl);
|
||
if (res)
|
||
{
|
||
log_error ("error spawning pipe connection handler: %s\n",
|
||
strerror (res) );
|
||
xfree (ctrl);
|
||
tpm2d_exit (2);
|
||
}
|
||
npth_setname_np (pipecon_handler, "pipe-connection");
|
||
npth_attr_destroy (&tattr);
|
||
|
||
/* We run handle_connection to wait for the shutdown signal and
|
||
to run the ticker stuff. */
|
||
handle_connections (fd);
|
||
if (fd != -1)
|
||
close (fd);
|
||
}
|
||
else if (!is_daemon)
|
||
{
|
||
log_info (_("please use the option '--daemon'"
|
||
" to run the program in the background\n"));
|
||
}
|
||
else
|
||
{ /* Regular server mode */
|
||
int fd;
|
||
#ifndef HAVE_W32_SYSTEM
|
||
pid_t pid;
|
||
int i;
|
||
#endif
|
||
|
||
/* Create the socket. */
|
||
socket_name = create_socket_name (TPM2DAEMON_SOCK_NAME);
|
||
fd = FD2INT (create_server_socket (socket_name,
|
||
&redir_socket_name, &socket_nonce));
|
||
|
||
|
||
fflush (NULL);
|
||
#ifdef HAVE_W32_SYSTEM
|
||
(void)csh_style;
|
||
(void)nodetach;
|
||
#else
|
||
pid = fork ();
|
||
if (pid == (pid_t)-1)
|
||
{
|
||
log_fatal ("fork failed: %s\n", strerror (errno) );
|
||
exit (1);
|
||
}
|
||
else if (pid)
|
||
{ /* we are the parent */
|
||
char *infostr;
|
||
|
||
close (fd);
|
||
|
||
/* create the info string: <name>:<pid>:<protocol_version> */
|
||
if (gpgrt_asprintf (&infostr, "TPM2DAEMON_INFO=%s:%lu:1",
|
||
socket_name, (ulong) pid) < 0)
|
||
{
|
||
log_error ("out of core\n");
|
||
kill (pid, SIGTERM);
|
||
exit (1);
|
||
}
|
||
*socket_name = 0; /* don't let cleanup() remove the socket -
|
||
the child should do this from now on */
|
||
if (argc)
|
||
{ /* run the program given on the commandline */
|
||
if (putenv (infostr))
|
||
{
|
||
log_error ("failed to set environment: %s\n",
|
||
strerror (errno) );
|
||
kill (pid, SIGTERM );
|
||
exit (1);
|
||
}
|
||
execvp (argv[0], argv);
|
||
log_error ("failed to run the command: %s\n", strerror (errno));
|
||
kill (pid, SIGTERM);
|
||
exit (1);
|
||
}
|
||
else
|
||
{
|
||
/* Print the environment string, so that the caller can use
|
||
shell's eval to set it */
|
||
if (csh_style)
|
||
{
|
||
*strchr (infostr, '=') = ' ';
|
||
es_printf ( "setenv %s;\n", infostr);
|
||
}
|
||
else
|
||
{
|
||
es_printf ( "%s; export TPM2DAEMON_INFO;\n", infostr);
|
||
}
|
||
xfree (infostr);
|
||
exit (0);
|
||
}
|
||
/* NOTREACHED */
|
||
} /* end parent */
|
||
|
||
/* This is the child. */
|
||
|
||
npth_init ();
|
||
gpgrt_set_syscall_clamp (npth_unprotect, npth_protect);
|
||
|
||
/* Detach from tty and put process into a new session. */
|
||
if (!nodetach )
|
||
{
|
||
/* Close stdin, stdout and stderr unless it is the log stream. */
|
||
for (i=0; i <= 2; i++)
|
||
{
|
||
if (!log_test_fd (i) && i != fd )
|
||
{
|
||
if ( !close (i)
|
||
&& open ("/dev/null", i? O_WRONLY : O_RDONLY) == -1)
|
||
{
|
||
log_error ("failed to open '%s': %s\n",
|
||
"/dev/null", strerror (errno));
|
||
cleanup ();
|
||
exit (1);
|
||
}
|
||
}
|
||
}
|
||
|
||
if (setsid () == -1)
|
||
{
|
||
log_error ("setsid() failed: %s\n", strerror (errno) );
|
||
cleanup ();
|
||
exit (1);
|
||
}
|
||
}
|
||
|
||
{
|
||
struct sigaction sa;
|
||
|
||
sa.sa_handler = SIG_IGN;
|
||
sigemptyset (&sa.sa_mask);
|
||
sa.sa_flags = 0;
|
||
sigaction (SIGPIPE, &sa, NULL);
|
||
}
|
||
|
||
#endif /*!HAVE_W32_SYSTEM*/
|
||
|
||
if (gnupg_chdir (gnupg_daemon_rootdir ()))
|
||
{
|
||
log_error ("chdir to '%s' failed: %s\n",
|
||
gnupg_daemon_rootdir (), strerror (errno));
|
||
exit (1);
|
||
}
|
||
|
||
handle_connections (fd);
|
||
|
||
close (fd);
|
||
}
|
||
|
||
xfree (config_filename);
|
||
return 0;
|
||
}
|
||
|
||
void
|
||
tpm2d_exit (int rc)
|
||
{
|
||
gcry_control (GCRYCTL_TERM_SECMEM );
|
||
rc = rc? rc : log_get_errorcount (0)? 2 : 0;
|
||
exit (rc);
|
||
}
|
||
|
||
|
||
static void
|
||
tpm2d_init_default_ctrl (ctrl_t ctrl)
|
||
{
|
||
(void)ctrl;
|
||
}
|
||
|
||
static void
|
||
tpm2d_deinit_default_ctrl (ctrl_t ctrl)
|
||
{
|
||
if (!ctrl)
|
||
return;
|
||
xfree (ctrl->in_data.value);
|
||
ctrl->in_data.value = NULL;
|
||
ctrl->in_data.valuelen = 0;
|
||
}
|
||
|
||
|
||
/* Return the name of the socket to be used to connect to this
|
||
process. If no socket is available, return NULL. */
|
||
const char *
|
||
tpm2d_get_socket_name (void)
|
||
{
|
||
if (socket_name && *socket_name)
|
||
return socket_name;
|
||
return NULL;
|
||
}
|
||
|
||
|
||
#ifndef HAVE_W32_SYSTEM
|
||
static void
|
||
handle_signal (int signo)
|
||
{
|
||
switch (signo)
|
||
{
|
||
case SIGHUP:
|
||
log_info ("SIGHUP received - "
|
||
"re-reading configuration\n");
|
||
/* reread_configuration (); */
|
||
break;
|
||
|
||
case SIGUSR1:
|
||
log_info ("SIGUSR1 received - printing internal information:\n");
|
||
/* Fixme: We need to see how to integrate pth dumping into our
|
||
logging system. */
|
||
/* pth_ctrl (PTH_CTRL_DUMPSTATE, log_get_stream ()); */
|
||
#if 0
|
||
app_dump_state ();
|
||
#endif
|
||
break;
|
||
|
||
case SIGUSR2:
|
||
log_info ("SIGUSR2 received - no action defined\n");
|
||
break;
|
||
|
||
case SIGCONT:
|
||
/* Nothing. */
|
||
log_debug ("SIGCONT received - breaking select\n");
|
||
break;
|
||
|
||
case SIGTERM:
|
||
if (!shutdown_pending)
|
||
log_info ("SIGTERM received - shutting down ...\n");
|
||
else
|
||
log_info ("SIGTERM received - still %i running threads\n",
|
||
active_connections);
|
||
shutdown_pending++;
|
||
if (shutdown_pending > 2)
|
||
{
|
||
log_info ("shutdown forced\n");
|
||
log_info ("%s %s stopped\n", gpgrt_strusage (11),
|
||
gpgrt_strusage (13) );
|
||
cleanup ();
|
||
tpm2d_exit (0);
|
||
}
|
||
break;
|
||
|
||
case SIGINT:
|
||
log_info ("SIGINT received - immediate shutdown\n");
|
||
log_info ( "%s %s stopped\n", gpgrt_strusage (11), gpgrt_strusage (13));
|
||
cleanup ();
|
||
tpm2d_exit (0);
|
||
break;
|
||
|
||
default:
|
||
log_info ("signal %d received - no action defined\n", signo);
|
||
}
|
||
}
|
||
#endif /*!HAVE_W32_SYSTEM*/
|
||
|
||
|
||
/* Create a name for the socket. We check for valid characters as
|
||
well as against a maximum allowed length for a unix domain socket
|
||
is done. The function terminates the process in case of an error.
|
||
Retunrs: Pointer to an allcoated string with the absolute name of
|
||
the socket used. */
|
||
static char *
|
||
create_socket_name (char *standard_name)
|
||
{
|
||
char *name;
|
||
|
||
name = make_filename (gnupg_socketdir (), standard_name, NULL);
|
||
if (strchr (name, PATHSEP_C))
|
||
{
|
||
log_error (("'%s' are not allowed in the socket name\n"), PATHSEP_S);
|
||
tpm2d_exit (2);
|
||
}
|
||
return name;
|
||
}
|
||
|
||
|
||
|
||
/* Create a Unix domain socket with NAME. Returns the file descriptor
|
||
or terminates the process in case of an error. If the socket has
|
||
been redirected the name of the real socket is stored as a malloced
|
||
string at R_REDIR_NAME. */
|
||
static gnupg_fd_t
|
||
create_server_socket (const char *name, char **r_redir_name,
|
||
assuan_sock_nonce_t *nonce)
|
||
{
|
||
struct sockaddr *addr;
|
||
struct sockaddr_un *unaddr;
|
||
socklen_t len;
|
||
gnupg_fd_t fd;
|
||
int rc;
|
||
|
||
xfree (*r_redir_name);
|
||
*r_redir_name = NULL;
|
||
|
||
fd = assuan_sock_new (AF_UNIX, SOCK_STREAM, 0);
|
||
if (fd == GNUPG_INVALID_FD)
|
||
{
|
||
log_error (_("can't create socket: %s\n"), strerror (errno));
|
||
tpm2d_exit (2);
|
||
}
|
||
|
||
unaddr = xmalloc (sizeof (*unaddr));
|
||
addr = (struct sockaddr*)unaddr;
|
||
|
||
{
|
||
int redirected;
|
||
|
||
if (assuan_sock_set_sockaddr_un (name, addr, &redirected))
|
||
{
|
||
if (errno == ENAMETOOLONG)
|
||
log_error (_("socket name '%s' is too long\n"), name);
|
||
else
|
||
log_error ("error preparing socket '%s': %s\n",
|
||
name, gpg_strerror (gpg_error_from_syserror ()));
|
||
tpm2d_exit (2);
|
||
}
|
||
if (redirected)
|
||
{
|
||
*r_redir_name = xstrdup (unaddr->sun_path);
|
||
if (opt.verbose)
|
||
log_info ("redirecting socket '%s' to '%s'\n", name, *r_redir_name);
|
||
}
|
||
}
|
||
|
||
len = SUN_LEN (unaddr);
|
||
|
||
rc = assuan_sock_bind (fd, addr, len);
|
||
if (rc == -1 && errno == EADDRINUSE)
|
||
{
|
||
gnupg_remove (unaddr->sun_path);
|
||
rc = assuan_sock_bind (fd, addr, len);
|
||
}
|
||
if (rc != -1
|
||
&& (rc=assuan_sock_get_nonce (addr, len, nonce)))
|
||
log_error (_("error getting nonce for the socket\n"));
|
||
if (rc == -1)
|
||
{
|
||
log_error (_("error binding socket to '%s': %s\n"),
|
||
unaddr->sun_path,
|
||
gpg_strerror (gpg_error_from_syserror ()));
|
||
assuan_sock_close (fd);
|
||
tpm2d_exit (2);
|
||
}
|
||
|
||
if (gnupg_chmod (unaddr->sun_path, "-rwx"))
|
||
log_error (_("can't set permissions of '%s': %s\n"),
|
||
unaddr->sun_path, strerror (errno));
|
||
|
||
if (listen (FD2INT (fd), listen_backlog) == -1)
|
||
{
|
||
log_error ("listen(fd, %d) failed: %s\n",
|
||
listen_backlog, gpg_strerror (gpg_error_from_syserror ()));
|
||
assuan_sock_close (fd);
|
||
tpm2d_exit (2);
|
||
}
|
||
|
||
if (opt.verbose)
|
||
log_info (_("listening on socket '%s'\n"), unaddr->sun_path);
|
||
|
||
return fd;
|
||
}
|
||
|
||
|
||
|
||
/* This is the standard connection thread's main function. */
|
||
static void *
|
||
start_connection_thread (void *arg)
|
||
{
|
||
ctrl_t ctrl = arg;
|
||
|
||
if (ctrl->thread_startup.fd != GNUPG_INVALID_FD
|
||
&& assuan_sock_check_nonce (ctrl->thread_startup.fd, &socket_nonce))
|
||
{
|
||
log_info (_("error reading nonce on fd %d: %s\n"),
|
||
FD2INT (ctrl->thread_startup.fd), strerror (errno));
|
||
assuan_sock_close (ctrl->thread_startup.fd);
|
||
xfree (ctrl);
|
||
return NULL;
|
||
}
|
||
|
||
active_connections++;
|
||
|
||
tpm2d_init_default_ctrl (ctrl);
|
||
if (opt.verbose)
|
||
log_info (_("handler for fd %d started\n"),
|
||
FD2INT (ctrl->thread_startup.fd));
|
||
|
||
/* If this is a pipe server, we request a shutdown if the command
|
||
handler asked for it. With the next ticker event and given that
|
||
no other connections are running the shutdown will then
|
||
happen. */
|
||
if (tpm2d_command_handler (ctrl, FD2INT (ctrl->thread_startup.fd))
|
||
&& pipe_server)
|
||
shutdown_pending = 1;
|
||
|
||
if (opt.verbose)
|
||
log_info (_("handler for fd %d terminated\n"),
|
||
FD2INT (ctrl->thread_startup.fd));
|
||
|
||
tpm2d_deinit_default_ctrl (ctrl);
|
||
xfree (ctrl);
|
||
|
||
if (--active_connections == 0)
|
||
tpm2d_kick_the_loop ();
|
||
|
||
return NULL;
|
||
}
|
||
|
||
|
||
void
|
||
tpm2d_kick_the_loop (void)
|
||
{
|
||
#ifdef HAVE_W32_SYSTEM
|
||
int ret;
|
||
|
||
/* Kick the select loop. */
|
||
ret = SetEvent (the_event);
|
||
if (ret == 0)
|
||
log_error ("SetEvent for tpm2d_kick_the_loop failed: %s\n",
|
||
w32_strerror (-1));
|
||
#elif defined(HAVE_PSELECT_NO_EINTR)
|
||
write (notify_fd, "", 1);
|
||
#else
|
||
int ret;
|
||
|
||
ret = kill (main_thread_pid, SIGCONT);
|
||
if (ret < 0)
|
||
log_error ("SetEvent for tpm2d_kick_the_loop failed: %s\n",
|
||
gpg_strerror (gpg_error_from_syserror ()));
|
||
#endif
|
||
}
|
||
|
||
/* Connection handler loop. Wait for connection requests and spawn a
|
||
thread after accepting a connection. LISTEN_FD is allowed to be -1
|
||
in which case this code will only do regular timeouts and handle
|
||
signals. */
|
||
static void
|
||
handle_connections (int listen_fd)
|
||
{
|
||
npth_attr_t tattr;
|
||
struct sockaddr_un paddr;
|
||
socklen_t plen;
|
||
fd_set fdset, read_fdset;
|
||
int nfd;
|
||
int ret;
|
||
int fd;
|
||
struct timespec timeout;
|
||
struct timespec *t;
|
||
int saved_errno;
|
||
#ifdef HAVE_W32_SYSTEM
|
||
HANDLE events[2];
|
||
unsigned int events_set;
|
||
#else
|
||
int signo;
|
||
#endif
|
||
#ifdef HAVE_PSELECT_NO_EINTR
|
||
int pipe_fd[2];
|
||
|
||
ret = gnupg_create_pipe (pipe_fd);
|
||
if (ret)
|
||
{
|
||
log_error ("pipe creation failed: %s\n", gpg_strerror (ret));
|
||
return;
|
||
}
|
||
notify_fd = pipe_fd[1];
|
||
#endif
|
||
|
||
ret = npth_attr_init (&tattr);
|
||
if (ret)
|
||
{
|
||
log_error ("npth_attr_init failed: %s\n", strerror (ret));
|
||
return;
|
||
}
|
||
|
||
npth_attr_setdetachstate (&tattr, NPTH_CREATE_DETACHED);
|
||
|
||
#ifdef HAVE_W32_SYSTEM
|
||
{
|
||
HANDLE h, h2;
|
||
SECURITY_ATTRIBUTES sa = { sizeof (SECURITY_ATTRIBUTES), NULL, TRUE};
|
||
|
||
events[0] = the_event = INVALID_HANDLE_VALUE;
|
||
events[1] = INVALID_HANDLE_VALUE;
|
||
h = CreateEvent (&sa, TRUE, FALSE, NULL);
|
||
if (!h)
|
||
log_error ("can't create tpm2d event: %s\n", w32_strerror (-1) );
|
||
else if (!DuplicateHandle (GetCurrentProcess (), h,
|
||
GetCurrentProcess (), &h2,
|
||
EVENT_MODIFY_STATE|SYNCHRONIZE, TRUE, 0))
|
||
{
|
||
log_error ("setting synchronize for tpm2d_kick_the_loop failed: %s\n",
|
||
w32_strerror (-1) );
|
||
CloseHandle (h);
|
||
}
|
||
else
|
||
{
|
||
CloseHandle (h);
|
||
events[0] = the_event = h2;
|
||
}
|
||
}
|
||
#else
|
||
npth_sigev_init ();
|
||
npth_sigev_add (SIGHUP);
|
||
npth_sigev_add (SIGUSR1);
|
||
npth_sigev_add (SIGUSR2);
|
||
npth_sigev_add (SIGINT);
|
||
npth_sigev_add (SIGCONT);
|
||
npth_sigev_add (SIGTERM);
|
||
npth_sigev_fini ();
|
||
main_thread_pid = getpid ();
|
||
#endif
|
||
|
||
FD_ZERO (&fdset);
|
||
nfd = 0;
|
||
if (listen_fd != -1)
|
||
{
|
||
FD_SET (listen_fd, &fdset);
|
||
nfd = listen_fd;
|
||
}
|
||
|
||
for (;;)
|
||
{
|
||
int periodical_check;
|
||
int max_fd = nfd;
|
||
|
||
if (shutdown_pending)
|
||
{
|
||
if (active_connections == 0)
|
||
break; /* ready */
|
||
|
||
/* Do not accept anymore connections but wait for existing
|
||
connections to terminate. We do this by clearing out all
|
||
file descriptors to wait for, so that the select will be
|
||
used to just wait on a signal or timeout event. */
|
||
FD_ZERO (&fdset);
|
||
listen_fd = -1;
|
||
}
|
||
|
||
periodical_check = 0;
|
||
|
||
timeout.tv_sec = TIMERTICK_INTERVAL_SEC;
|
||
timeout.tv_nsec = TIMERTICK_INTERVAL_USEC * 1000;
|
||
|
||
if (shutdown_pending || periodical_check)
|
||
t = &timeout;
|
||
else
|
||
t = NULL;
|
||
|
||
/* POSIX says that fd_set should be implemented as a structure,
|
||
thus a simple assignment is fine to copy the entire set. */
|
||
read_fdset = fdset;
|
||
|
||
#ifdef HAVE_PSELECT_NO_EINTR
|
||
FD_SET (pipe_fd[0], &read_fdset);
|
||
if (max_fd < pipe_fd[0])
|
||
max_fd = pipe_fd[0];
|
||
#endif
|
||
|
||
#ifndef HAVE_W32_SYSTEM
|
||
ret = npth_pselect (max_fd+1, &read_fdset, NULL, NULL, t,
|
||
npth_sigev_sigmask ());
|
||
saved_errno = errno;
|
||
|
||
while (npth_sigev_get_pending (&signo))
|
||
handle_signal (signo);
|
||
#else
|
||
ret = npth_eselect (nfd+1, &read_fdset, NULL, NULL, t,
|
||
events, &events_set);
|
||
saved_errno = errno;
|
||
if (events_set & 1)
|
||
continue;
|
||
#endif
|
||
|
||
if (ret == -1 && saved_errno != EINTR)
|
||
{
|
||
log_error (_("npth_pselect failed: %s - waiting 1s\n"),
|
||
strerror (saved_errno));
|
||
npth_sleep (1);
|
||
continue;
|
||
}
|
||
|
||
if (ret <= 0)
|
||
/* Timeout. Will be handled when calculating the next timeout. */
|
||
continue;
|
||
|
||
#ifdef HAVE_PSELECT_NO_EINTR
|
||
if (FD_ISSET (pipe_fd[0], &read_fdset))
|
||
{
|
||
char buf[256];
|
||
|
||
read (pipe_fd[0], buf, sizeof buf);
|
||
}
|
||
#endif
|
||
|
||
if (listen_fd != -1 && FD_ISSET (listen_fd, &read_fdset))
|
||
{
|
||
ctrl_t ctrl;
|
||
|
||
plen = sizeof paddr;
|
||
fd = npth_accept (listen_fd, (struct sockaddr *)&paddr, &plen);
|
||
if (fd == -1)
|
||
{
|
||
log_error ("accept failed: %s\n", strerror (errno));
|
||
}
|
||
else if ( !(ctrl = xtrycalloc (1, sizeof *ctrl)) )
|
||
{
|
||
log_error ("error allocating connection control data: %s\n",
|
||
strerror (errno) );
|
||
close (fd);
|
||
}
|
||
else
|
||
{
|
||
char threadname[50];
|
||
npth_t thread;
|
||
|
||
snprintf (threadname, sizeof threadname, "conn fd=%d", fd);
|
||
ctrl->thread_startup.fd = INT2FD (fd);
|
||
ret = npth_create (&thread, &tattr, start_connection_thread, ctrl);
|
||
if (ret)
|
||
{
|
||
log_error ("error spawning connection handler: %s\n",
|
||
strerror (ret));
|
||
xfree (ctrl);
|
||
close (fd);
|
||
}
|
||
else
|
||
npth_setname_np (thread, threadname);
|
||
}
|
||
}
|
||
}
|
||
|
||
#ifdef HAVE_W32_SYSTEM
|
||
if (the_event != INVALID_HANDLE_VALUE)
|
||
CloseHandle (the_event);
|
||
#endif
|
||
#ifdef HAVE_PSELECT_NO_EINTR
|
||
close (pipe_fd[0]);
|
||
close (pipe_fd[1]);
|
||
#endif
|
||
cleanup ();
|
||
log_info (_("%s %s stopped\n"), gpgrt_strusage (11), gpgrt_strusage (13));
|
||
npth_attr_destroy (&tattr);
|
||
}
|
||
|
||
/* Return the number of active connections. */
|
||
int
|
||
get_active_connection_count (void)
|
||
{
|
||
return active_connections;
|
||
}
|