mirror of
git://git.gnupg.org/gnupg.git
synced 2024-12-22 10:19:57 +01:00
63acf06efb
* dirmngr/http.c [W32]: Include winhttp.h (w32_get_internet_session): New. (w32_get_proxy): New. (get_proxy_for_url): Implement automatic proxy detection and fix error in last patch. (http_reinitialize): New. * dirmngr/dirmngr.c (dirmngr_sighup_action): Call reinitialize. * dirmngr/Makefile.am (NETLIBS) [W32]: Link with winhttp. -- GnuPG-bug-id: 5768
2538 lines
71 KiB
C
2538 lines
71 KiB
C
/* dirmngr.c - Keyserver and X.509 LDAP access
|
||
* Copyright (C) 2002 Klarälvdalens Datakonsult AB
|
||
* Copyright (C) 2003-2004, 2006-2007, 2008, 2010-2011, 2020-2021 g10 Code GmbH
|
||
* Copyright (C) 2014 Werner Koch
|
||
*
|
||
* This file is part of GnuPG.
|
||
*
|
||
* GnuPG is free software; you can redistribute it and/or modify
|
||
* it under the terms of the GNU General Public License as published by
|
||
* the Free Software Foundation; either version 3 of the License, or
|
||
* (at your option) any later version.
|
||
*
|
||
* GnuPG is distributed in the hope that it will be useful,
|
||
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||
* GNU General Public License for more details.
|
||
*
|
||
* You should have received a copy of the GNU General Public License
|
||
* along with this program; if not, see <https://www.gnu.org/licenses/>.
|
||
* SPDX-License-Identifier: GPL-3.0-or-later
|
||
*/
|
||
|
||
#include <config.h>
|
||
|
||
#include <stdio.h>
|
||
#include <stdlib.h>
|
||
#include <stddef.h>
|
||
#include <stdarg.h>
|
||
#include <string.h>
|
||
#include <errno.h>
|
||
#include <assert.h>
|
||
#include <time.h>
|
||
#include <fcntl.h>
|
||
#ifndef HAVE_W32_SYSTEM
|
||
#include <sys/socket.h>
|
||
#include <sys/un.h>
|
||
#endif
|
||
#include <sys/stat.h>
|
||
#include <unistd.h>
|
||
#ifdef HAVE_SIGNAL_H
|
||
# include <signal.h>
|
||
#endif
|
||
#ifdef HAVE_INOTIFY_INIT
|
||
# include <sys/inotify.h>
|
||
#endif /*HAVE_INOTIFY_INIT*/
|
||
#include <npth.h>
|
||
|
||
#include "dirmngr-err.h"
|
||
|
||
#if HTTP_USE_NTBTLS
|
||
# include <ntbtls.h>
|
||
#elif HTTP_USE_GNUTLS
|
||
# include <gnutls/gnutls.h>
|
||
#endif /*HTTP_USE_GNUTLS*/
|
||
|
||
|
||
#define INCLUDED_BY_MAIN_MODULE 1
|
||
#define GNUPG_COMMON_NEED_AFLOCAL
|
||
#include "dirmngr.h"
|
||
|
||
#include <assuan.h>
|
||
|
||
#include "certcache.h"
|
||
#include "crlcache.h"
|
||
#include "crlfetch.h"
|
||
#include "misc.h"
|
||
#if USE_LDAP
|
||
# include "ldapserver.h"
|
||
#endif
|
||
#include "../common/asshelp.h"
|
||
#if USE_LDAP
|
||
# include "ldap-wrapper.h"
|
||
#endif
|
||
#include "../common/init.h"
|
||
#include "../common/gc-opt-flags.h"
|
||
#include "dns-stuff.h"
|
||
#include "http-common.h"
|
||
|
||
#ifndef ENAMETOOLONG
|
||
# define ENAMETOOLONG EINVAL
|
||
#endif
|
||
|
||
|
||
enum cmd_and_opt_values {
|
||
aNull = 0,
|
||
oCsh = 'c',
|
||
oQuiet = 'q',
|
||
oSh = 's',
|
||
oVerbose = 'v',
|
||
oNoVerbose = 500,
|
||
|
||
aServer,
|
||
aDaemon,
|
||
aSupervised,
|
||
aListCRLs,
|
||
aLoadCRL,
|
||
aFetchCRL,
|
||
aShutdown,
|
||
aFlush,
|
||
aGPGConfList,
|
||
aGPGConfTest,
|
||
aGPGConfVersions,
|
||
|
||
oOptions,
|
||
oDebug,
|
||
oDebugAll,
|
||
oDebugWait,
|
||
oDebugLevel,
|
||
oGnutlsDebug,
|
||
oDebugCacheExpiredCerts,
|
||
oNoGreeting,
|
||
oNoOptions,
|
||
oHomedir,
|
||
oNoDetach,
|
||
oLogFile,
|
||
oBatch,
|
||
oDisableHTTP,
|
||
oDisableLDAP,
|
||
oDisableIPv4,
|
||
oDisableIPv6,
|
||
oIgnoreLDAPDP,
|
||
oIgnoreHTTPDP,
|
||
oIgnoreOCSPSvcUrl,
|
||
oHonorHTTPProxy,
|
||
oHTTPProxy,
|
||
oLDAPProxy,
|
||
oOnlyLDAPProxy,
|
||
oLDAPServer,
|
||
oLDAPFile,
|
||
oLDAPTimeout,
|
||
oLDAPAddServers,
|
||
oOCSPResponder,
|
||
oOCSPSigner,
|
||
oOCSPMaxClockSkew,
|
||
oOCSPMaxPeriod,
|
||
oOCSPCurrentPeriod,
|
||
oMaxReplies,
|
||
oHkpCaCert,
|
||
oFakedSystemTime,
|
||
oForce,
|
||
oAllowOCSP,
|
||
oAllowVersionCheck,
|
||
oStealSocket,
|
||
oSocketName,
|
||
oLDAPWrapperProgram,
|
||
oHTTPWrapperProgram,
|
||
oIgnoreCert,
|
||
oIgnoreCertExtension,
|
||
oIgnoreCRLExtension,
|
||
oUseTor,
|
||
oNoUseTor,
|
||
oKeyServer,
|
||
oNameServer,
|
||
oDisableCheckOwnSocket,
|
||
oStandardResolver,
|
||
oRecursiveResolver,
|
||
oResolverTimeout,
|
||
oConnectTimeout,
|
||
oConnectQuickTimeout,
|
||
oListenBacklog,
|
||
oCompatibilityFlags,
|
||
aTest
|
||
};
|
||
|
||
|
||
|
||
static ARGPARSE_OPTS opts[] = {
|
||
|
||
ARGPARSE_c (aGPGConfList, "gpgconf-list", "@"),
|
||
ARGPARSE_c (aGPGConfTest, "gpgconf-test", "@"),
|
||
ARGPARSE_c (aGPGConfVersions, "gpgconf-versions", "@"),
|
||
|
||
ARGPARSE_group (300, N_("@Commands:\n ")),
|
||
|
||
ARGPARSE_c (aServer, "server", N_("run in server mode (foreground)") ),
|
||
ARGPARSE_c (aDaemon, "daemon", N_("run in daemon mode (background)") ),
|
||
#ifndef HAVE_W32_SYSTEM
|
||
ARGPARSE_c (aSupervised, "supervised", N_("run in supervised mode")),
|
||
#endif
|
||
ARGPARSE_c (aListCRLs, "list-crls", N_("list the contents of the CRL cache")),
|
||
ARGPARSE_c (aLoadCRL, "load-crl", N_("|FILE|load CRL from FILE into cache")),
|
||
ARGPARSE_c (aFetchCRL, "fetch-crl", N_("|URL|fetch a CRL from URL")),
|
||
ARGPARSE_c (aShutdown, "shutdown", N_("shutdown the dirmngr")),
|
||
ARGPARSE_c (aFlush, "flush", N_("flush the cache")),
|
||
|
||
|
||
ARGPARSE_header (NULL, N_("Options used for startup")),
|
||
|
||
ARGPARSE_s_n (oNoDetach, "no-detach", N_("do not detach from the console")),
|
||
ARGPARSE_s_n (oSh, "sh", N_("sh-style command output")),
|
||
ARGPARSE_s_n (oCsh, "csh", N_("csh-style command output")),
|
||
ARGPARSE_s_n (oStealSocket, "steal-socket", "@"),
|
||
ARGPARSE_s_s (oHomedir, "homedir", "@"),
|
||
ARGPARSE_conffile (oOptions, "options", N_("|FILE|read options from FILE")),
|
||
ARGPARSE_noconffile (oNoOptions, "no-options", "@"),
|
||
|
||
|
||
ARGPARSE_header ("Monitor", N_("Options controlling the diagnostic output")),
|
||
|
||
ARGPARSE_s_n (oVerbose, "verbose", N_("verbose")),
|
||
ARGPARSE_s_n (oQuiet, "quiet", N_("be somewhat more quiet")),
|
||
ARGPARSE_s_n (oNoGreeting, "no-greeting", "@"),
|
||
ARGPARSE_s_s (oDebugLevel, "debug-level",
|
||
N_("|LEVEL|set the debugging level to LEVEL")),
|
||
ARGPARSE_s_s (oDebug, "debug", "@"),
|
||
ARGPARSE_s_n (oDebugAll, "debug-all", "@"),
|
||
ARGPARSE_s_i (oGnutlsDebug, "gnutls-debug", "@"),
|
||
ARGPARSE_s_i (oGnutlsDebug, "tls-debug", "@"),
|
||
ARGPARSE_s_i (oDebugWait, "debug-wait", "@"),
|
||
ARGPARSE_s_s (oLogFile, "log-file",
|
||
N_("|FILE|write server mode logs to FILE")),
|
||
|
||
|
||
ARGPARSE_header ("Configuration",
|
||
N_("Options controlling the configuration")),
|
||
|
||
ARGPARSE_s_n (oAllowVersionCheck, "allow-version-check",
|
||
N_("allow online software version check")),
|
||
ARGPARSE_s_i (oListenBacklog, "listen-backlog", "@"),
|
||
ARGPARSE_s_i (oMaxReplies, "max-replies",
|
||
N_("|N|do not return more than N items in one query")),
|
||
ARGPARSE_s_u (oFakedSystemTime, "faked-system-time", "@"), /*(epoch time)*/
|
||
ARGPARSE_s_n (oDisableCheckOwnSocket, "disable-check-own-socket", "@"),
|
||
ARGPARSE_s_s (oIgnoreCert,"ignore-cert", "@"),
|
||
ARGPARSE_s_s (oIgnoreCertExtension,"ignore-cert-extension", "@"),
|
||
ARGPARSE_s_s (oIgnoreCRLExtension,"ignore-crl-extension", "@"),
|
||
|
||
|
||
ARGPARSE_header ("Network", N_("Network related options")),
|
||
|
||
ARGPARSE_s_n (oUseTor, "use-tor", N_("route all network traffic via Tor")),
|
||
ARGPARSE_s_n (oNoUseTor, "no-use-tor", "@"),
|
||
ARGPARSE_s_n (oDisableIPv4, "disable-ipv4", "@"),
|
||
ARGPARSE_s_n (oDisableIPv6, "disable-ipv6", "@"),
|
||
ARGPARSE_s_n (oStandardResolver, "standard-resolver", "@"),
|
||
ARGPARSE_s_n (oRecursiveResolver, "recursive-resolver", "@"),
|
||
ARGPARSE_s_i (oResolverTimeout, "resolver-timeout", "@"),
|
||
ARGPARSE_s_s (oNameServer, "nameserver", "@"),
|
||
ARGPARSE_s_i (oConnectTimeout, "connect-timeout", "@"),
|
||
ARGPARSE_s_i (oConnectQuickTimeout, "connect-quick-timeout", "@"),
|
||
|
||
|
||
ARGPARSE_header ("Keyserver", N_("Configuration for Keyservers")),
|
||
|
||
ARGPARSE_s_s (oKeyServer, "keyserver",
|
||
N_("|URL|use keyserver at URL")),
|
||
ARGPARSE_s_s (oHkpCaCert, "hkp-cacert",
|
||
N_("|FILE|use the CA certificates in FILE for HKP over TLS")),
|
||
|
||
|
||
ARGPARSE_header ("HTTP", N_("Configuration for HTTP servers")),
|
||
|
||
ARGPARSE_s_n (oDisableHTTP, "disable-http", N_("inhibit the use of HTTP")),
|
||
ARGPARSE_s_n (oIgnoreHTTPDP,"ignore-http-dp",
|
||
N_("ignore HTTP CRL distribution points")),
|
||
ARGPARSE_s_s (oHTTPProxy, "http-proxy",
|
||
N_("|URL|redirect all HTTP requests to URL")),
|
||
ARGPARSE_s_n (oHonorHTTPProxy, "honor-http-proxy",
|
||
N_("use system's HTTP proxy setting")),
|
||
ARGPARSE_s_s (oLDAPWrapperProgram, "ldap-wrapper-program", "@"),
|
||
|
||
|
||
ARGPARSE_header ("LDAP", N_("Configuration of LDAP servers to use")),
|
||
|
||
ARGPARSE_s_n (oDisableLDAP, "disable-ldap", N_("inhibit the use of LDAP")),
|
||
ARGPARSE_s_n (oIgnoreLDAPDP,"ignore-ldap-dp",
|
||
N_("ignore LDAP CRL distribution points")),
|
||
ARGPARSE_s_s (oLDAPProxy, "ldap-proxy",
|
||
N_("|HOST|use HOST for LDAP queries")),
|
||
ARGPARSE_s_n (oOnlyLDAPProxy, "only-ldap-proxy",
|
||
N_("do not use fallback hosts with --ldap-proxy")),
|
||
ARGPARSE_s_s (oLDAPServer, "ldapserver",
|
||
N_("|SPEC|use this keyserver to lookup keys")),
|
||
ARGPARSE_s_s (oLDAPFile, "ldapserverlist-file",
|
||
N_("|FILE|read LDAP server list from FILE")),
|
||
ARGPARSE_s_n (oLDAPAddServers, "add-servers",
|
||
N_("add new servers discovered in CRL distribution"
|
||
" points to serverlist")),
|
||
ARGPARSE_s_i (oLDAPTimeout, "ldaptimeout",
|
||
N_("|N|set LDAP timeout to N seconds")),
|
||
|
||
|
||
ARGPARSE_header ("OCSP", N_("Configuration for OCSP")),
|
||
|
||
ARGPARSE_s_n (oAllowOCSP, "allow-ocsp", N_("allow sending OCSP requests")),
|
||
ARGPARSE_s_n (oIgnoreOCSPSvcUrl, "ignore-ocsp-service-url",
|
||
N_("ignore certificate contained OCSP service URLs")),
|
||
ARGPARSE_s_s (oOCSPResponder, "ocsp-responder",
|
||
N_("|URL|use OCSP responder at URL")),
|
||
ARGPARSE_s_s (oOCSPSigner, "ocsp-signer",
|
||
N_("|FPR|OCSP response signed by FPR")),
|
||
ARGPARSE_s_i (oOCSPMaxClockSkew, "ocsp-max-clock-skew", "@"),
|
||
ARGPARSE_s_i (oOCSPMaxPeriod, "ocsp-max-period", "@"),
|
||
ARGPARSE_s_i (oOCSPCurrentPeriod, "ocsp-current-period", "@"),
|
||
|
||
|
||
ARGPARSE_header (NULL, N_("Other options")),
|
||
|
||
ARGPARSE_s_n (oForce, "force", N_("force loading of outdated CRLs")),
|
||
|
||
ARGPARSE_s_s (oSocketName, "socket-name", "@"), /* Only for debugging. */
|
||
ARGPARSE_s_n (oDebugCacheExpiredCerts, "debug-cache-expired-certs", "@"),
|
||
ARGPARSE_s_s (oCompatibilityFlags, "compatibility-flags", "@"),
|
||
|
||
ARGPARSE_header (NULL, ""), /* Stop the header group. */
|
||
|
||
/* Not yet used options. */
|
||
ARGPARSE_s_n (oBatch, "batch", "@"),
|
||
ARGPARSE_s_s (oHTTPWrapperProgram, "http-wrapper-program", "@"),
|
||
|
||
|
||
ARGPARSE_group (302,N_("@\n(See the \"info\" manual for a complete listing "
|
||
"of all commands and options)\n")),
|
||
|
||
ARGPARSE_end ()
|
||
};
|
||
|
||
/* The list of supported debug flags. */
|
||
static struct debug_flags_s debug_flags [] =
|
||
{
|
||
{ DBG_X509_VALUE , "x509" },
|
||
{ DBG_CRYPTO_VALUE , "crypto" },
|
||
{ DBG_MEMORY_VALUE , "memory" },
|
||
{ DBG_CACHE_VALUE , "cache" },
|
||
{ DBG_MEMSTAT_VALUE, "memstat" },
|
||
{ DBG_HASHING_VALUE, "hashing" },
|
||
{ DBG_IPC_VALUE , "ipc" },
|
||
{ DBG_DNS_VALUE , "dns" },
|
||
{ DBG_NETWORK_VALUE, "network" },
|
||
{ DBG_LOOKUP_VALUE , "lookup" },
|
||
{ DBG_EXTPROG_VALUE, "extprog" },
|
||
{ 77, NULL } /* 77 := Do not exit on "help" or "?". */
|
||
};
|
||
|
||
/* The list of compatibility flags. */
|
||
static struct compatibility_flags_s compatibility_flags [] =
|
||
{
|
||
{ 0, NULL }
|
||
};
|
||
|
||
|
||
#define DEFAULT_MAX_REPLIES 10
|
||
#define DEFAULT_LDAP_TIMEOUT 15 /* seconds */
|
||
|
||
#define DEFAULT_CONNECT_TIMEOUT (15*1000) /* 15 seconds */
|
||
#define DEFAULT_CONNECT_QUICK_TIMEOUT ( 2*1000) /* 2 seconds */
|
||
|
||
/* For the cleanup handler we need to keep track of the socket's name. */
|
||
static const char *socket_name;
|
||
/* If the socket has been redirected, this is the name of the
|
||
redirected socket.. */
|
||
static const char *redir_socket_name;
|
||
|
||
/* We need to keep track of the server's nonces (these are dummies for
|
||
POSIX systems). */
|
||
static assuan_sock_nonce_t socket_nonce;
|
||
|
||
/* Value for the listen() backlog argument.
|
||
* Change at runtime with --listen-backlog. */
|
||
static int listen_backlog = 64;
|
||
|
||
/* Only if this flag has been set will we remove the socket file. */
|
||
static int cleanup_socket;
|
||
|
||
/* Keep track of the current log file so that we can avoid updating
|
||
the log file after a SIGHUP if it didn't changed. Malloced. */
|
||
static char *current_logfile;
|
||
|
||
/* Helper to implement --debug-level. */
|
||
static const char *debug_level;
|
||
|
||
/* Helper to set the NTBTLS or GNUTLS log level. */
|
||
static int opt_gnutls_debug = -1;
|
||
|
||
/* Flag indicating that a shutdown has been requested. */
|
||
static volatile int shutdown_pending;
|
||
|
||
/* Flags to indicate that we shall not watch our own socket. */
|
||
static int disable_check_own_socket;
|
||
|
||
/* Flag indicating to start the daemon even if one already runs. */
|
||
static int steal_socket;
|
||
|
||
|
||
/* Flag to control the Tor mode. */
|
||
static enum
|
||
{ TOR_MODE_AUTO = 0, /* Switch to NO or YES */
|
||
TOR_MODE_NEVER, /* Never use Tor. */
|
||
TOR_MODE_NO, /* Do not use Tor */
|
||
TOR_MODE_YES, /* Use Tor */
|
||
TOR_MODE_FORCE /* Force using Tor */
|
||
} tor_mode;
|
||
|
||
|
||
/* Counter for the active connections. */
|
||
static int active_connections;
|
||
|
||
/* This flag is set by any network access and used by the housekeeping
|
||
* thread to run background network tasks. */
|
||
static int network_activity_seen;
|
||
|
||
/* A list of filenames registred with --hkp-cacert. */
|
||
static strlist_t hkp_cacert_filenames;
|
||
|
||
/* A flag used to clear the list of ldapservers iff --ldapserver is
|
||
* given on the command line or one of the conf files. In this case we
|
||
* want to clear all old specifications through the legacy
|
||
* dirmngr_ldapservers.conf. */
|
||
static int ldapserver_list_needs_reset;
|
||
|
||
/* The timer tick used for housekeeping stuff. The second constant is used when a shutdown is pending. */
|
||
#define TIMERTICK_INTERVAL (60)
|
||
#define TIMERTICK_INTERVAL_SHUTDOWN (4)
|
||
|
||
/* How oft to run the housekeeping. */
|
||
#define HOUSEKEEPING_INTERVAL (600)
|
||
|
||
|
||
/* This union is used to avoid compiler warnings in case a pointer is
|
||
64 bit and an int 32 bit. We store an integer in a pointer and get
|
||
it back later (npth_getspecific et al.). */
|
||
union int_and_ptr_u
|
||
{
|
||
int aint;
|
||
assuan_fd_t afd;
|
||
void *aptr;
|
||
};
|
||
|
||
|
||
|
||
/* The key used to store the current file descriptor in the thread
|
||
local storage. We use this in conjunction with the
|
||
log_set_pid_suffix_cb feature. */
|
||
#ifndef HAVE_W32_SYSTEM
|
||
static npth_key_t my_tlskey_current_fd;
|
||
#endif
|
||
|
||
/* Prototypes. */
|
||
static void cleanup (void);
|
||
#if USE_LDAP
|
||
static ldap_server_t parse_ldapserver_file (const char* filename, int ienoent);
|
||
#endif /*USE_LDAP*/
|
||
static fingerprint_list_t parse_fingerprint_item (const char *string,
|
||
const char *optionname,
|
||
int want_binary);
|
||
static void netactivity_action (void);
|
||
static void handle_connections (assuan_fd_t listen_fd);
|
||
static void gpgconf_versions (void);
|
||
|
||
|
||
/* NPth wrapper function definitions. */
|
||
ASSUAN_SYSTEM_NPTH_IMPL;
|
||
|
||
static const char *
|
||
my_strusage( int level )
|
||
{
|
||
const char *p;
|
||
switch ( level )
|
||
{
|
||
case 9: p = "GPL-3.0-or-later"; break;
|
||
case 11: p = "@DIRMNGR@ (@GNUPG@)";
|
||
break;
|
||
case 13: p = VERSION; break;
|
||
case 14: p = GNUPG_DEF_COPYRIGHT_LINE; break;
|
||
case 17: p = PRINTABLE_OS_NAME; break;
|
||
/* TRANSLATORS: @EMAIL@ will get replaced by the actual bug
|
||
reporting address. This is so that we can change the
|
||
reporting address without breaking the translations. */
|
||
case 19: p = _("Please report bugs to <@EMAIL@>.\n"); break;
|
||
case 49: p = PACKAGE_BUGREPORT; break;
|
||
case 1:
|
||
case 40: p = _("Usage: @DIRMNGR@ [options] (-h for help)");
|
||
break;
|
||
case 41: p = _("Syntax: @DIRMNGR@ [options] [command [args]]\n"
|
||
"Keyserver, CRL, and OCSP access for @GNUPG@\n");
|
||
break;
|
||
|
||
default: p = NULL;
|
||
}
|
||
return p;
|
||
}
|
||
|
||
|
||
/* Callback from libksba to hash a provided buffer. Our current
|
||
implementation does only allow SHA-1 for hashing. This may be
|
||
extended by mapping the name, testing for algorithm availibility
|
||
and adjust the length checks accordingly. */
|
||
static gpg_error_t
|
||
my_ksba_hash_buffer (void *arg, const char *oid,
|
||
const void *buffer, size_t length, size_t resultsize,
|
||
unsigned char *result, size_t *resultlen)
|
||
{
|
||
(void)arg;
|
||
|
||
if (oid && strcmp (oid, "1.3.14.3.2.26"))
|
||
return gpg_error (GPG_ERR_NOT_SUPPORTED);
|
||
if (resultsize < 20)
|
||
return gpg_error (GPG_ERR_BUFFER_TOO_SHORT);
|
||
gcry_md_hash_buffer (2, result, buffer, length);
|
||
*resultlen = 20;
|
||
return 0;
|
||
}
|
||
|
||
|
||
/* GNUTLS log function callback. */
|
||
#ifdef HTTP_USE_GNUTLS
|
||
static void
|
||
my_gnutls_log (int level, const char *text)
|
||
{
|
||
int n;
|
||
|
||
n = strlen (text);
|
||
while (n && text[n-1] == '\n')
|
||
n--;
|
||
|
||
log_debug ("gnutls:L%d: %.*s\n", level, n, text);
|
||
}
|
||
#endif /*HTTP_USE_GNUTLS*/
|
||
|
||
/* Setup the debugging. With a LEVEL of NULL only the active debug
|
||
flags are propagated to the subsystems. With LEVEL set, a specific
|
||
set of debug flags is set; thus overriding all flags already
|
||
set. */
|
||
static void
|
||
set_debug (void)
|
||
{
|
||
int numok = (debug_level && digitp (debug_level));
|
||
int numlvl = numok? atoi (debug_level) : 0;
|
||
|
||
if (!debug_level)
|
||
;
|
||
else if (!strcmp (debug_level, "none") || (numok && numlvl < 1))
|
||
opt.debug = 0;
|
||
else if (!strcmp (debug_level, "basic") || (numok && numlvl <= 2))
|
||
opt.debug = DBG_IPC_VALUE;
|
||
else if (!strcmp (debug_level, "advanced") || (numok && numlvl <= 5))
|
||
opt.debug = (DBG_IPC_VALUE|DBG_X509_VALUE|DBG_LOOKUP_VALUE);
|
||
else if (!strcmp (debug_level, "expert") || (numok && numlvl <= 8))
|
||
opt.debug = (DBG_IPC_VALUE|DBG_X509_VALUE|DBG_LOOKUP_VALUE
|
||
|DBG_CACHE_VALUE|DBG_CRYPTO_VALUE);
|
||
else if (!strcmp (debug_level, "guru") || numok)
|
||
{
|
||
opt.debug = ~0;
|
||
/* Unless the "guru" string has been used we don't want to allow
|
||
hashing debugging. The rationale is that people tend to
|
||
select the highest debug value and would then clutter their
|
||
disk with debug files which may reveal confidential data. */
|
||
if (numok)
|
||
opt.debug &= ~(DBG_HASHING_VALUE);
|
||
}
|
||
else
|
||
{
|
||
log_error (_("invalid debug-level '%s' given\n"), debug_level);
|
||
log_info (_("valid debug levels are: %s\n"),
|
||
"none, basic, advanced, expert, guru");
|
||
opt.debug = 0; /* Reset debugging, so that prior debug
|
||
statements won't have an undesired effect. */
|
||
}
|
||
|
||
|
||
if (opt.debug && !opt.verbose)
|
||
{
|
||
opt.verbose = 1;
|
||
gcry_control (GCRYCTL_SET_VERBOSITY, (int)opt.verbose);
|
||
}
|
||
if (opt.debug && opt.quiet)
|
||
opt.quiet = 0;
|
||
|
||
if (opt.debug & DBG_CRYPTO_VALUE )
|
||
gcry_control (GCRYCTL_SET_DEBUG_FLAGS, 1);
|
||
|
||
#if HTTP_USE_NTBTLS
|
||
if (opt_gnutls_debug >= 0)
|
||
{
|
||
ntbtls_set_debug (opt_gnutls_debug, NULL, NULL);
|
||
}
|
||
#elif HTTP_USE_GNUTLS
|
||
if (opt_gnutls_debug >= 0)
|
||
{
|
||
gnutls_global_set_log_function (my_gnutls_log);
|
||
gnutls_global_set_log_level (opt_gnutls_debug);
|
||
}
|
||
#endif /*HTTP_USE_GNUTLS*/
|
||
|
||
if (opt.debug)
|
||
parse_debug_flag (NULL, &opt.debug, debug_flags);
|
||
}
|
||
|
||
|
||
static void
|
||
set_tor_mode (void)
|
||
{
|
||
if (dirmngr_use_tor ())
|
||
{
|
||
/* Enable Tor mode and when called again force a new curcuit
|
||
* (e.g. on SIGHUP). */
|
||
enable_dns_tormode (1);
|
||
if (assuan_sock_set_flag (ASSUAN_INVALID_FD, "tor-mode", 1))
|
||
{
|
||
log_error ("error enabling Tor mode: %s\n", strerror (errno));
|
||
log_info ("(is your Libassuan recent enough?)\n");
|
||
}
|
||
}
|
||
else
|
||
disable_dns_tormode ();
|
||
}
|
||
|
||
|
||
/* Return true if Tor shall be used. */
|
||
int
|
||
dirmngr_use_tor (void)
|
||
{
|
||
if (tor_mode == TOR_MODE_AUTO)
|
||
{
|
||
/* Figure out whether Tor is running. */
|
||
assuan_fd_t sock;
|
||
|
||
sock = assuan_sock_connect_byname (NULL, 0, 0, NULL, ASSUAN_SOCK_TOR);
|
||
if (sock == ASSUAN_INVALID_FD)
|
||
tor_mode = TOR_MODE_NO;
|
||
else
|
||
{
|
||
tor_mode = TOR_MODE_YES;
|
||
assuan_sock_close (sock);
|
||
}
|
||
}
|
||
|
||
if (tor_mode == TOR_MODE_FORCE)
|
||
return 2; /* Use Tor (using 2 to indicate force mode) */
|
||
else if (tor_mode == TOR_MODE_YES)
|
||
return 1; /* Use Tor */
|
||
else
|
||
return 0; /* Do not use Tor. */
|
||
}
|
||
|
||
|
||
/* This is somewhat similar to dirmngr_use_tor but avoids a trial
|
||
* connect and may thus be faster for this special case. */
|
||
int
|
||
dirmngr_never_use_tor_p (void)
|
||
{
|
||
return tor_mode == TOR_MODE_NEVER;
|
||
}
|
||
|
||
|
||
static void
|
||
wrong_args (const char *text)
|
||
{
|
||
es_fprintf (es_stderr, _("usage: %s [options] "), DIRMNGR_NAME);
|
||
es_fputs (text, es_stderr);
|
||
es_putc ('\n', es_stderr);
|
||
dirmngr_exit (2);
|
||
}
|
||
|
||
|
||
/* Helper to stop the reaper thread for the ldap wrapper. */
|
||
static void
|
||
shutdown_reaper (void)
|
||
{
|
||
#if USE_LDAP
|
||
ldap_wrapper_wait_connections ();
|
||
#endif
|
||
}
|
||
|
||
|
||
/* Handle options which are allowed to be reset after program start.
|
||
Return true if the current option in PARGS could be handled and
|
||
false if not. As a special feature, passing a value of NULL for
|
||
PARGS, resets the options to the default. REREAD should be set
|
||
true if it is not the initial option parsing. */
|
||
static int
|
||
parse_rereadable_options (ARGPARSE_ARGS *pargs, int reread)
|
||
{
|
||
if (!pargs)
|
||
{ /* Reset mode. */
|
||
opt.quiet = 0;
|
||
opt.verbose = 0;
|
||
opt.debug = 0;
|
||
opt.ldap_wrapper_program = NULL;
|
||
opt.disable_http = 0;
|
||
opt.disable_ldap = 0;
|
||
opt.honor_http_proxy = 0;
|
||
opt.http_proxy = NULL;
|
||
opt.ldap_proxy = NULL;
|
||
opt.only_ldap_proxy = 0;
|
||
opt.ignore_http_dp = 0;
|
||
opt.ignore_ldap_dp = 0;
|
||
opt.ignore_ocsp_service_url = 0;
|
||
opt.allow_ocsp = 0;
|
||
opt.allow_version_check = 0;
|
||
opt.ocsp_responder = NULL;
|
||
opt.ocsp_max_clock_skew = 10 * 60; /* 10 minutes. */
|
||
opt.ocsp_max_period = 90 * 86400; /* 90 days. */
|
||
opt.ocsp_current_period = 3 * 60 * 60; /* 3 hours. */
|
||
opt.max_replies = DEFAULT_MAX_REPLIES;
|
||
while (opt.ocsp_signer)
|
||
{
|
||
fingerprint_list_t tmp = opt.ocsp_signer->next;
|
||
xfree (opt.ocsp_signer);
|
||
opt.ocsp_signer = tmp;
|
||
}
|
||
while (opt.ignored_certs)
|
||
{
|
||
fingerprint_list_t tmp = opt.ignored_certs->next;
|
||
xfree (opt.ignored_certs);
|
||
opt.ignored_certs = tmp;
|
||
}
|
||
FREE_STRLIST (opt.ignored_cert_extensions);
|
||
FREE_STRLIST (opt.ignored_crl_extensions);
|
||
http_register_tls_ca (NULL);
|
||
FREE_STRLIST (hkp_cacert_filenames);
|
||
FREE_STRLIST (opt.keyserver);
|
||
/* Note: We do not allow resetting of TOR_MODE_FORCE at runtime. */
|
||
if (tor_mode != TOR_MODE_FORCE)
|
||
tor_mode = TOR_MODE_AUTO;
|
||
disable_check_own_socket = 0;
|
||
enable_standard_resolver (0);
|
||
set_dns_timeout (0);
|
||
opt.connect_timeout = 0;
|
||
opt.connect_quick_timeout = 0;
|
||
opt.ldaptimeout = DEFAULT_LDAP_TIMEOUT;
|
||
ldapserver_list_needs_reset = 1;
|
||
opt.debug_cache_expired_certs = 0;
|
||
opt.compat_flags = 0;
|
||
return 1;
|
||
}
|
||
|
||
switch (pargs->r_opt)
|
||
{
|
||
case oQuiet: opt.quiet = 1; break;
|
||
case oVerbose: opt.verbose++; break;
|
||
case oDebug:
|
||
parse_debug_flag (pargs->r.ret_str, &opt.debug, debug_flags);
|
||
break;
|
||
case oDebugAll: opt.debug = ~0; break;
|
||
case oDebugLevel: debug_level = pargs->r.ret_str; break;
|
||
case oGnutlsDebug: opt_gnutls_debug = pargs->r.ret_int; break;
|
||
|
||
case oLogFile:
|
||
if (!reread)
|
||
return 0; /* Not handled. */
|
||
if (!current_logfile || !pargs->r.ret_str
|
||
|| strcmp (current_logfile, pargs->r.ret_str))
|
||
{
|
||
log_set_file (pargs->r.ret_str);
|
||
xfree (current_logfile);
|
||
current_logfile = xtrystrdup (pargs->r.ret_str);
|
||
}
|
||
break;
|
||
|
||
case oDisableCheckOwnSocket: disable_check_own_socket = 1; break;
|
||
|
||
case oLDAPWrapperProgram:
|
||
opt.ldap_wrapper_program = pargs->r.ret_str;
|
||
break;
|
||
case oHTTPWrapperProgram:
|
||
opt.http_wrapper_program = pargs->r.ret_str;
|
||
break;
|
||
|
||
case oDisableHTTP: opt.disable_http = 1; break;
|
||
case oDisableLDAP: opt.disable_ldap = 1; break;
|
||
case oDisableIPv4: opt.disable_ipv4 = 1; break;
|
||
case oDisableIPv6: opt.disable_ipv6 = 1; break;
|
||
case oHonorHTTPProxy: opt.honor_http_proxy = 1; break;
|
||
case oHTTPProxy: opt.http_proxy = pargs->r.ret_str; break;
|
||
case oLDAPProxy: opt.ldap_proxy = pargs->r.ret_str; break;
|
||
case oOnlyLDAPProxy: opt.only_ldap_proxy = 1; break;
|
||
case oIgnoreHTTPDP: opt.ignore_http_dp = 1; break;
|
||
case oIgnoreLDAPDP: opt.ignore_ldap_dp = 1; break;
|
||
case oIgnoreOCSPSvcUrl: opt.ignore_ocsp_service_url = 1; break;
|
||
|
||
case oAllowOCSP: opt.allow_ocsp = 1; break;
|
||
case oAllowVersionCheck: opt.allow_version_check = 1; break;
|
||
case oOCSPResponder: opt.ocsp_responder = pargs->r.ret_str; break;
|
||
case oOCSPSigner:
|
||
opt.ocsp_signer = parse_fingerprint_item (pargs->r.ret_str,
|
||
"--ocsp-signer", 0);
|
||
break;
|
||
case oOCSPMaxClockSkew: opt.ocsp_max_clock_skew = pargs->r.ret_int; break;
|
||
case oOCSPMaxPeriod: opt.ocsp_max_period = pargs->r.ret_int; break;
|
||
case oOCSPCurrentPeriod: opt.ocsp_current_period = pargs->r.ret_int; break;
|
||
|
||
case oMaxReplies: opt.max_replies = pargs->r.ret_int; break;
|
||
|
||
case oHkpCaCert:
|
||
{
|
||
/* We need to register the filenames with gnutls (http.c) and
|
||
* also for our own cert cache. */
|
||
char *tmpname;
|
||
|
||
/* Do tilde expansion and make path absolute. */
|
||
tmpname = make_absfilename (pargs->r.ret_str, NULL);
|
||
http_register_tls_ca (tmpname);
|
||
add_to_strlist (&hkp_cacert_filenames, pargs->r.ret_str);
|
||
xfree (tmpname);
|
||
}
|
||
break;
|
||
|
||
case oIgnoreCert:
|
||
{
|
||
fingerprint_list_t item, r;
|
||
item = parse_fingerprint_item (pargs->r.ret_str, "--ignore-cert", 20);
|
||
if (item)
|
||
{ /* Append */
|
||
if (!opt.ignored_certs)
|
||
opt.ignored_certs = item;
|
||
else
|
||
{
|
||
for (r = opt.ignored_certs; r->next; r = r->next)
|
||
;
|
||
r->next = item;
|
||
}
|
||
}
|
||
}
|
||
break;
|
||
|
||
case oIgnoreCertExtension:
|
||
add_to_strlist (&opt.ignored_cert_extensions, pargs->r.ret_str);
|
||
break;
|
||
|
||
case oIgnoreCRLExtension:
|
||
add_to_strlist (&opt.ignored_crl_extensions, pargs->r.ret_str);
|
||
break;
|
||
|
||
case oUseTor:
|
||
tor_mode = TOR_MODE_FORCE;
|
||
break;
|
||
case oNoUseTor:
|
||
if (tor_mode != TOR_MODE_FORCE)
|
||
tor_mode = TOR_MODE_NEVER;
|
||
break;
|
||
|
||
case oStandardResolver: enable_standard_resolver (1); break;
|
||
case oRecursiveResolver: enable_recursive_resolver (1); break;
|
||
|
||
case oLDAPServer:
|
||
#if USE_LDAP
|
||
{
|
||
ldap_server_t server;
|
||
char *p;
|
||
|
||
p = pargs->r.ret_str;
|
||
if (!strncmp (p, "ldap:", 5) && !(p[5] == '/' && p[6] == '/'))
|
||
p += 5;
|
||
|
||
server = ldapserver_parse_one (p, NULL, 0);
|
||
if (server)
|
||
{
|
||
if (ldapserver_list_needs_reset)
|
||
{
|
||
ldapserver_list_needs_reset = 0;
|
||
ldapserver_list_free (opt.ldapservers);
|
||
opt.ldapservers = NULL;
|
||
}
|
||
server->next = opt.ldapservers;
|
||
opt.ldapservers = server;
|
||
}
|
||
}
|
||
#endif
|
||
break;
|
||
|
||
case oKeyServer:
|
||
if (*pargs->r.ret_str)
|
||
add_to_strlist (&opt.keyserver, pargs->r.ret_str);
|
||
break;
|
||
|
||
case oNameServer:
|
||
set_dns_nameserver (pargs->r.ret_str);
|
||
break;
|
||
|
||
case oResolverTimeout:
|
||
set_dns_timeout (pargs->r.ret_int);
|
||
break;
|
||
|
||
case oConnectTimeout:
|
||
opt.connect_timeout = pargs->r.ret_ulong * 1000;
|
||
break;
|
||
|
||
case oConnectQuickTimeout:
|
||
opt.connect_quick_timeout = pargs->r.ret_ulong * 1000;
|
||
break;
|
||
|
||
case oLDAPTimeout:
|
||
opt.ldaptimeout = pargs->r.ret_int;
|
||
break;
|
||
|
||
case oDebugCacheExpiredCerts:
|
||
opt.debug_cache_expired_certs = 0;
|
||
break;
|
||
|
||
case oCompatibilityFlags:
|
||
if (parse_compatibility_flags (pargs->r.ret_str, &opt.compat_flags,
|
||
compatibility_flags))
|
||
{
|
||
pargs->r_opt = ARGPARSE_INVALID_ARG;
|
||
pargs->err = ARGPARSE_PRINT_WARNING;
|
||
}
|
||
break;
|
||
|
||
default:
|
||
return 0; /* Not handled. */
|
||
}
|
||
|
||
set_dns_verbose (opt.verbose, !!DBG_DNS);
|
||
http_set_verbose (opt.verbose, !!DBG_NETWORK);
|
||
set_dns_disable_ipv4 (opt.disable_ipv4);
|
||
set_dns_disable_ipv6 (opt.disable_ipv6);
|
||
|
||
return 1; /* Handled. */
|
||
}
|
||
|
||
|
||
/* This fucntion is called after option parsing to adjust some values
|
||
* and call option setup functions. */
|
||
static void
|
||
post_option_parsing (enum cmd_and_opt_values cmd)
|
||
{
|
||
/* It would be too surpirsing if the quick timeout is larger than
|
||
* the standard value. */
|
||
if (opt.connect_quick_timeout > opt.connect_timeout)
|
||
opt.connect_quick_timeout = opt.connect_timeout;
|
||
|
||
set_debug ();
|
||
/* For certain commands we do not want to set/test for Tor mode
|
||
* because that is somewhat expensive. */
|
||
switch (cmd)
|
||
{
|
||
case aGPGConfList:
|
||
case aGPGConfTest:
|
||
case aGPGConfVersions:
|
||
break;
|
||
default:
|
||
set_tor_mode ();
|
||
break;
|
||
}
|
||
}
|
||
|
||
|
||
#ifndef HAVE_W32_SYSTEM
|
||
static int
|
||
pid_suffix_callback (unsigned long *r_suffix)
|
||
{
|
||
union int_and_ptr_u value;
|
||
|
||
memset (&value, 0, sizeof value);
|
||
value.aptr = npth_getspecific (my_tlskey_current_fd);
|
||
*r_suffix = value.aint;
|
||
return (*r_suffix != -1); /* Use decimal representation. */
|
||
}
|
||
#endif /*!HAVE_W32_SYSTEM*/
|
||
|
||
#if HTTP_USE_NTBTLS
|
||
static void
|
||
my_ntbtls_log_handler (void *opaque, int level, const char *fmt, va_list argv)
|
||
{
|
||
(void)opaque;
|
||
|
||
if (level == -1)
|
||
log_logv_with_prefix (GPGRT_LOG_INFO, "ntbtls: ", fmt, argv);
|
||
else
|
||
{
|
||
char prefix[10+20];
|
||
snprintf (prefix, sizeof prefix, "ntbtls(%d): ", level);
|
||
log_logv_with_prefix (GPGRT_LOG_DEBUG, prefix, fmt, argv);
|
||
}
|
||
}
|
||
#endif
|
||
|
||
|
||
static void
|
||
thread_init (void)
|
||
{
|
||
npth_init ();
|
||
assuan_set_system_hooks (ASSUAN_SYSTEM_NPTH);
|
||
gpgrt_set_syscall_clamp (npth_unprotect, npth_protect);
|
||
|
||
/* Now with NPth running we can set the logging callback. Our
|
||
windows implementation does not yet feature the NPth TLS
|
||
functions. */
|
||
#ifndef HAVE_W32_SYSTEM
|
||
if (npth_key_create (&my_tlskey_current_fd, NULL) == 0)
|
||
if (npth_setspecific (my_tlskey_current_fd, NULL) == 0)
|
||
log_set_pid_suffix_cb (pid_suffix_callback);
|
||
#endif /*!HAVE_W32_SYSTEM*/
|
||
}
|
||
|
||
|
||
int
|
||
main (int argc, char **argv)
|
||
{
|
||
enum cmd_and_opt_values cmd = 0;
|
||
ARGPARSE_ARGS pargs;
|
||
int orig_argc;
|
||
char **orig_argv;
|
||
char *last_configname = NULL;
|
||
const char *configname = NULL;
|
||
const char *shell;
|
||
int debug_argparser = 0;
|
||
int greeting = 0;
|
||
int nogreeting = 0;
|
||
int nodetach = 0;
|
||
int csh_style = 0;
|
||
char *logfile = NULL;
|
||
#if USE_LDAP
|
||
char *ldapfile = NULL;
|
||
#endif /*USE_LDAP*/
|
||
int debug_wait = 0;
|
||
int rc;
|
||
struct assuan_malloc_hooks malloc_hooks;
|
||
|
||
early_system_init ();
|
||
set_strusage (my_strusage);
|
||
log_set_prefix (DIRMNGR_NAME, GPGRT_LOG_WITH_PREFIX | GPGRT_LOG_WITH_PID);
|
||
|
||
/* Make sure that our subsystems are ready. */
|
||
i18n_init ();
|
||
init_common_subsystems (&argc, &argv);
|
||
|
||
gcry_control (GCRYCTL_DISABLE_SECMEM, 0);
|
||
|
||
/* Check that the libraries are suitable. Do it here because
|
||
the option parsing may need services of the libraries. */
|
||
if (!ksba_check_version (NEED_KSBA_VERSION) )
|
||
log_fatal( _("%s is too old (need %s, have %s)\n"), "libksba",
|
||
NEED_KSBA_VERSION, ksba_check_version (NULL) );
|
||
|
||
ksba_set_malloc_hooks (gcry_malloc, gcry_realloc, gcry_free );
|
||
ksba_set_hash_buffer_function (my_ksba_hash_buffer, NULL);
|
||
|
||
/* Init TLS library. */
|
||
#if HTTP_USE_NTBTLS
|
||
if (!ntbtls_check_version (NEED_NTBTLS_VERSION) )
|
||
log_fatal( _("%s is too old (need %s, have %s)\n"), "ntbtls",
|
||
NEED_NTBTLS_VERSION, ntbtls_check_version (NULL) );
|
||
#elif HTTP_USE_GNUTLS
|
||
rc = gnutls_global_init ();
|
||
if (rc)
|
||
log_fatal ("gnutls_global_init failed: %s\n", gnutls_strerror (rc));
|
||
#endif /*HTTP_USE_GNUTLS*/
|
||
|
||
/* Init Assuan. */
|
||
malloc_hooks.malloc = gcry_malloc;
|
||
malloc_hooks.realloc = gcry_realloc;
|
||
malloc_hooks.free = gcry_free;
|
||
assuan_set_malloc_hooks (&malloc_hooks);
|
||
assuan_set_assuan_log_prefix (log_get_prefix (NULL));
|
||
assuan_set_gpg_err_source (GPG_ERR_SOURCE_DEFAULT);
|
||
assuan_sock_init ();
|
||
setup_libassuan_logging (&opt.debug, dirmngr_assuan_log_monitor);
|
||
|
||
setup_libgcrypt_logging ();
|
||
|
||
#if HTTP_USE_NTBTLS
|
||
ntbtls_set_log_handler (my_ntbtls_log_handler, NULL);
|
||
#endif
|
||
|
||
/* Setup defaults. */
|
||
shell = getenv ("SHELL");
|
||
if (shell && strlen (shell) >= 3 && !strcmp (shell+strlen (shell)-3, "csh") )
|
||
csh_style = 1;
|
||
|
||
/* Reset rereadable options to default values. */
|
||
parse_rereadable_options (NULL, 0);
|
||
|
||
/* Default TCP timeouts. */
|
||
opt.connect_timeout = DEFAULT_CONNECT_TIMEOUT;
|
||
opt.connect_quick_timeout = DEFAULT_CONNECT_QUICK_TIMEOUT;
|
||
|
||
/* LDAP defaults. */
|
||
opt.add_new_ldapservers = 0;
|
||
opt.ldaptimeout = DEFAULT_LDAP_TIMEOUT;
|
||
|
||
/* Other defaults. */
|
||
|
||
/* Check whether we have a config file given on the commandline */
|
||
orig_argc = argc;
|
||
orig_argv = argv;
|
||
pargs.argc = &argc;
|
||
pargs.argv = &argv;
|
||
pargs.flags= (ARGPARSE_FLAG_KEEP | ARGPARSE_FLAG_NOVERSION);
|
||
while (gnupg_argparse (NULL, &pargs, opts))
|
||
{
|
||
switch (pargs.r_opt)
|
||
{
|
||
case oDebug:
|
||
case oDebugAll:
|
||
debug_argparser++;
|
||
break;
|
||
case oHomedir:
|
||
gnupg_set_homedir (pargs.r.ret_str);
|
||
break;
|
||
}
|
||
}
|
||
/* Reset the flags. */
|
||
pargs.flags &= ~(ARGPARSE_FLAG_KEEP | ARGPARSE_FLAG_NOVERSION);
|
||
|
||
socket_name = dirmngr_socket_name ();
|
||
|
||
/* The configuraton directories for use by gpgrt_argparser. */
|
||
gnupg_set_confdir (GNUPG_CONFDIR_SYS, gnupg_sysconfdir ());
|
||
gnupg_set_confdir (GNUPG_CONFDIR_USER, gnupg_homedir ());
|
||
|
||
/* We are re-using the struct, thus the reset flag. We OR the
|
||
* flags so that the internal intialized flag won't be cleared. */
|
||
argc = orig_argc;
|
||
argv = orig_argv;
|
||
pargs.argc = &argc;
|
||
pargs.argv = &argv;
|
||
pargs.flags |= (ARGPARSE_FLAG_RESET
|
||
| ARGPARSE_FLAG_KEEP
|
||
| ARGPARSE_FLAG_SYS
|
||
| ARGPARSE_FLAG_USER);
|
||
while (gnupg_argparser (&pargs, opts, DIRMNGR_NAME EXTSEP_S "conf"))
|
||
{
|
||
if (pargs.r_opt == ARGPARSE_CONFFILE)
|
||
{
|
||
if (debug_argparser)
|
||
log_info (_("reading options from '%s'\n"),
|
||
pargs.r_type? pargs.r.ret_str: "[cmdline]");
|
||
if (pargs.r_type)
|
||
{
|
||
xfree (last_configname);
|
||
last_configname = xstrdup (pargs.r.ret_str);
|
||
configname = last_configname;
|
||
}
|
||
else
|
||
configname = NULL;
|
||
continue;
|
||
}
|
||
if (parse_rereadable_options (&pargs, 0))
|
||
continue; /* Already handled */
|
||
switch (pargs.r_opt)
|
||
{
|
||
case aServer:
|
||
case aDaemon:
|
||
case aSupervised:
|
||
case aShutdown:
|
||
case aFlush:
|
||
case aListCRLs:
|
||
case aLoadCRL:
|
||
case aFetchCRL:
|
||
case aGPGConfList:
|
||
case aGPGConfTest:
|
||
case aGPGConfVersions:
|
||
cmd = pargs.r_opt;
|
||
break;
|
||
|
||
case oQuiet: opt.quiet = 1; break;
|
||
case oVerbose: opt.verbose++; break;
|
||
case oBatch: opt.batch=1; break;
|
||
|
||
case oDebugWait: debug_wait = pargs.r.ret_int; break;
|
||
|
||
case oNoGreeting: nogreeting = 1; break;
|
||
case oNoVerbose: opt.verbose = 0; break;
|
||
case oHomedir: /* Ignore this option here. */; break;
|
||
case oNoDetach: nodetach = 1; break;
|
||
case oStealSocket: steal_socket = 1; break;
|
||
case oLogFile: logfile = pargs.r.ret_str; break;
|
||
case oCsh: csh_style = 1; break;
|
||
case oSh: csh_style = 0; break;
|
||
case oLDAPFile:
|
||
# if USE_LDAP
|
||
ldapfile = pargs.r.ret_str;
|
||
# endif /*USE_LDAP*/
|
||
break;
|
||
case oLDAPAddServers: opt.add_new_ldapservers = 1; break;
|
||
|
||
case oFakedSystemTime:
|
||
gnupg_set_time ((time_t)pargs.r.ret_ulong, 0);
|
||
break;
|
||
|
||
case oForce: opt.force = 1; break;
|
||
|
||
case oSocketName: socket_name = pargs.r.ret_str; break;
|
||
|
||
case oListenBacklog:
|
||
listen_backlog = pargs.r.ret_int;
|
||
break;
|
||
|
||
default:
|
||
if (configname)
|
||
pargs.err = ARGPARSE_PRINT_WARNING;
|
||
else
|
||
pargs.err = ARGPARSE_PRINT_ERROR;
|
||
break;
|
||
}
|
||
}
|
||
gnupg_argparse (NULL, &pargs, NULL); /* Release internal state. */
|
||
|
||
if (!last_configname)
|
||
opt.config_filename = make_filename (gnupg_homedir (),
|
||
DIRMNGR_NAME EXTSEP_S "conf",
|
||
NULL);
|
||
else
|
||
{
|
||
opt.config_filename = last_configname;
|
||
last_configname = NULL;
|
||
}
|
||
|
||
if (log_get_errorcount(0))
|
||
exit(2);
|
||
if (nogreeting )
|
||
greeting = 0;
|
||
|
||
if (!opt.homedir_cache)
|
||
opt.homedir_cache = xstrdup (gnupg_homedir ());
|
||
|
||
if (greeting)
|
||
{
|
||
es_fprintf (es_stderr, "%s %s; %s\n",
|
||
strusage(11), strusage(13), strusage(14) );
|
||
es_fprintf (es_stderr, "%s\n", strusage(15) );
|
||
}
|
||
|
||
#ifdef IS_DEVELOPMENT_VERSION
|
||
log_info ("NOTE: this is a development version!\n");
|
||
#endif
|
||
|
||
/* Print a warning if an argument looks like an option. */
|
||
if (!opt.quiet && !(pargs.flags & ARGPARSE_FLAG_STOP_SEEN))
|
||
{
|
||
int i;
|
||
|
||
for (i=0; i < argc; i++)
|
||
if (argv[i][0] == '-' && argv[i][1] == '-')
|
||
log_info (_("Note: '%s' is not considered an option\n"), argv[i]);
|
||
}
|
||
|
||
if (!gnupg_access ("/etc/"DIRMNGR_NAME, F_OK)
|
||
&& !strncmp (gnupg_homedir (), "/etc/", 5))
|
||
log_info
|
||
("NOTE: DirMngr is now a proper part of %s. The configuration and"
|
||
" other directory names changed. Please check that no other version"
|
||
" of dirmngr is still installed. To disable this warning, remove the"
|
||
" directory '/etc/dirmngr'.\n", GNUPG_NAME);
|
||
|
||
if (gnupg_faked_time_p ())
|
||
{
|
||
gnupg_isotime_t tbuf;
|
||
|
||
log_info (_("WARNING: running with faked system time: "));
|
||
gnupg_get_isotime (tbuf);
|
||
dump_isotime (tbuf);
|
||
log_printf ("\n");
|
||
}
|
||
|
||
post_option_parsing (cmd);
|
||
|
||
/* Get LDAP server list from file unless --ldapserver has been used. */
|
||
#if USE_LDAP
|
||
if (opt.ldapservers)
|
||
;
|
||
else if (!ldapfile)
|
||
{
|
||
ldapfile = make_filename (gnupg_homedir (),
|
||
"dirmngr_ldapservers.conf",
|
||
NULL);
|
||
opt.ldapservers = parse_ldapserver_file (ldapfile, 1);
|
||
xfree (ldapfile);
|
||
}
|
||
else
|
||
opt.ldapservers = parse_ldapserver_file (ldapfile, 0);
|
||
#endif /*USE_LDAP*/
|
||
|
||
#ifndef HAVE_W32_SYSTEM
|
||
/* We need to ignore the PIPE signal because the we might log to a
|
||
socket and that code handles EPIPE properly. The ldap wrapper
|
||
also requires us to ignore this silly signal. Assuan would set
|
||
this signal to ignore anyway.*/
|
||
signal (SIGPIPE, SIG_IGN);
|
||
#endif
|
||
|
||
/* Ready. Now to our duties. */
|
||
if (!cmd)
|
||
cmd = aServer;
|
||
rc = 0;
|
||
|
||
if (cmd == aServer)
|
||
{
|
||
/* Note that this server mode is mainly useful for debugging. */
|
||
if (argc)
|
||
wrong_args ("--server");
|
||
|
||
if (logfile)
|
||
{
|
||
log_set_file (logfile);
|
||
log_set_prefix (NULL, GPGRT_LOG_WITH_TIME | GPGRT_LOG_WITH_PID);
|
||
}
|
||
|
||
if (debug_wait)
|
||
{
|
||
log_debug ("waiting for debugger - my pid is %u .....\n",
|
||
(unsigned int)getpid());
|
||
gnupg_sleep (debug_wait);
|
||
log_debug ("... okay\n");
|
||
}
|
||
|
||
|
||
thread_init ();
|
||
cert_cache_init (hkp_cacert_filenames);
|
||
crl_cache_init ();
|
||
http_register_netactivity_cb (netactivity_action);
|
||
start_command_handler (ASSUAN_INVALID_FD, 0);
|
||
shutdown_reaper ();
|
||
}
|
||
#ifndef HAVE_W32_SYSTEM
|
||
else if (cmd == aSupervised)
|
||
{
|
||
/* In supervised mode, we expect file descriptor 3 to be an
|
||
already opened, listening socket.
|
||
|
||
We will also not detach from the controlling process or close
|
||
stderr; the supervisor should handle all of that. */
|
||
struct stat statbuf;
|
||
if (fstat (3, &statbuf) == -1 && errno == EBADF)
|
||
{
|
||
log_error ("file descriptor 3 must be validin --supervised mode\n");
|
||
dirmngr_exit (1);
|
||
}
|
||
socket_name = gnupg_get_socket_name (3);
|
||
|
||
/* Now start with logging to a file if this is desired. */
|
||
if (logfile)
|
||
{
|
||
log_set_file (logfile);
|
||
log_set_prefix (NULL, (GPGRT_LOG_WITH_PREFIX
|
||
|GPGRT_LOG_WITH_TIME
|
||
|GPGRT_LOG_WITH_PID));
|
||
current_logfile = xstrdup (logfile);
|
||
}
|
||
else
|
||
log_set_prefix (NULL, 0);
|
||
|
||
thread_init ();
|
||
cert_cache_init (hkp_cacert_filenames);
|
||
crl_cache_init ();
|
||
http_register_netactivity_cb (netactivity_action);
|
||
handle_connections (3);
|
||
shutdown_reaper ();
|
||
}
|
||
#endif /*HAVE_W32_SYSTEM*/
|
||
else if (cmd == aDaemon)
|
||
{
|
||
assuan_fd_t fd;
|
||
pid_t pid;
|
||
int len;
|
||
struct sockaddr_un serv_addr;
|
||
|
||
if (argc)
|
||
wrong_args ("--daemon");
|
||
|
||
/* Now start with logging to a file if this is desired. */
|
||
if (logfile)
|
||
{
|
||
log_set_file (logfile);
|
||
log_set_prefix (NULL, (GPGRT_LOG_WITH_PREFIX
|
||
|GPGRT_LOG_WITH_TIME
|
||
|GPGRT_LOG_WITH_PID));
|
||
current_logfile = xstrdup (logfile);
|
||
}
|
||
|
||
if (debug_wait)
|
||
{
|
||
log_debug ("waiting for debugger - my pid is %u .....\n",
|
||
(unsigned int)getpid());
|
||
gnupg_sleep (debug_wait);
|
||
log_debug ("... okay\n");
|
||
}
|
||
|
||
#ifndef HAVE_W32_SYSTEM
|
||
if (strchr (socket_name, ':'))
|
||
{
|
||
log_error (_("colons are not allowed in the socket name\n"));
|
||
dirmngr_exit (1);
|
||
}
|
||
#endif
|
||
fd = assuan_sock_new (AF_UNIX, SOCK_STREAM, 0);
|
||
if (fd == ASSUAN_INVALID_FD)
|
||
{
|
||
log_error (_("can't create socket: %s\n"), strerror (errno));
|
||
cleanup ();
|
||
dirmngr_exit (1);
|
||
}
|
||
|
||
{
|
||
int redirected;
|
||
|
||
if (assuan_sock_set_sockaddr_un (socket_name,
|
||
(struct sockaddr*)&serv_addr,
|
||
&redirected))
|
||
{
|
||
if (errno == ENAMETOOLONG)
|
||
log_error (_("socket name '%s' is too long\n"), socket_name);
|
||
else
|
||
log_error ("error preparing socket '%s': %s\n",
|
||
socket_name,
|
||
gpg_strerror (gpg_error_from_syserror ()));
|
||
dirmngr_exit (1);
|
||
}
|
||
if (redirected)
|
||
{
|
||
redir_socket_name = xstrdup (serv_addr.sun_path);
|
||
if (opt.verbose)
|
||
log_info ("redirecting socket '%s' to '%s'\n",
|
||
socket_name, redir_socket_name);
|
||
}
|
||
}
|
||
|
||
len = SUN_LEN (&serv_addr);
|
||
|
||
rc = assuan_sock_bind (fd, (struct sockaddr*) &serv_addr, len);
|
||
if (rc == -1
|
||
&& (errno == EADDRINUSE
|
||
#ifdef HAVE_W32_SYSTEM
|
||
|| errno == EEXIST
|
||
#endif
|
||
))
|
||
{
|
||
/* Fixme: We should actually test whether a dirmngr is
|
||
* already running. For now the steal option is a dummy. */
|
||
/* if (steal_socket) */
|
||
/* log_info (N_("trying to steal socket from running %s\n"), */
|
||
/* "dirmngr"); */
|
||
gnupg_remove (redir_socket_name? redir_socket_name : socket_name);
|
||
rc = assuan_sock_bind (fd, (struct sockaddr*) &serv_addr, len);
|
||
}
|
||
if (rc != -1
|
||
&& (rc = assuan_sock_get_nonce ((struct sockaddr*) &serv_addr, len, &socket_nonce)))
|
||
log_error (_("error getting nonce for the socket\n"));
|
||
if (rc == -1)
|
||
{
|
||
log_error (_("error binding socket to '%s': %s\n"),
|
||
serv_addr.sun_path,
|
||
gpg_strerror (gpg_error_from_syserror ()));
|
||
assuan_sock_close (fd);
|
||
dirmngr_exit (1);
|
||
}
|
||
cleanup_socket = 1;
|
||
|
||
if (gnupg_chmod (serv_addr.sun_path, "-rwx"))
|
||
log_error (_("can't set permissions of '%s': %s\n"),
|
||
serv_addr.sun_path, strerror (errno));
|
||
|
||
if (listen (FD2INT (fd), listen_backlog) == -1)
|
||
{
|
||
log_error ("listen(fd,%d) failed: %s\n",
|
||
listen_backlog, strerror (errno));
|
||
assuan_sock_close (fd);
|
||
dirmngr_exit (1);
|
||
}
|
||
|
||
if (opt.verbose)
|
||
log_info (_("listening on socket '%s'\n"), serv_addr.sun_path);
|
||
|
||
es_fflush (NULL);
|
||
|
||
/* Note: We keep the dirmngr_info output only for the sake of
|
||
existing scripts which might use this to detect a successful
|
||
start of the dirmngr. */
|
||
#ifdef HAVE_W32_SYSTEM
|
||
(void)csh_style;
|
||
(void)nodetach;
|
||
|
||
pid = getpid ();
|
||
es_printf ("set %s=%s;%lu;1\n",
|
||
DIRMNGR_INFO_NAME, socket_name, (ulong) pid);
|
||
#else
|
||
pid = fork();
|
||
if (pid == (pid_t)-1)
|
||
{
|
||
log_fatal (_("error forking process: %s\n"), strerror (errno));
|
||
dirmngr_exit (1);
|
||
}
|
||
|
||
if (pid)
|
||
{ /* We are the parent */
|
||
char *infostr;
|
||
|
||
/* Don't let cleanup() remove the socket - the child is
|
||
responsible for doing that. */
|
||
cleanup_socket = 0;
|
||
|
||
close (fd);
|
||
|
||
/* Create the info string: <name>:<pid>:<protocol_version> */
|
||
if (asprintf (&infostr, "%s=%s:%lu:1",
|
||
DIRMNGR_INFO_NAME, serv_addr.sun_path, (ulong)pid ) < 0)
|
||
{
|
||
log_error (_("out of core\n"));
|
||
kill (pid, SIGTERM);
|
||
dirmngr_exit (1);
|
||
}
|
||
/* Print the environment string, so that the caller can use
|
||
shell's eval to set it. But see above. */
|
||
if (csh_style)
|
||
{
|
||
*strchr (infostr, '=') = ' ';
|
||
es_printf ( "setenv %s;\n", infostr);
|
||
}
|
||
else
|
||
{
|
||
es_printf ( "%s; export %s;\n", infostr, DIRMNGR_INFO_NAME);
|
||
}
|
||
free (infostr);
|
||
exit (0);
|
||
/*NEVER REACHED*/
|
||
} /* end parent */
|
||
|
||
|
||
/*
|
||
This is the child
|
||
*/
|
||
|
||
/* Detach from tty and put process into a new session */
|
||
if (!nodetach )
|
||
{
|
||
int i;
|
||
unsigned int oldflags;
|
||
|
||
/* Close stdin, stdout and stderr unless it is the log stream */
|
||
for (i=0; i <= 2; i++)
|
||
{
|
||
if (!log_test_fd (i) && i != fd )
|
||
{
|
||
if ( !close (i)
|
||
&& open ("/dev/null", i? O_WRONLY : O_RDONLY) == -1)
|
||
{
|
||
log_error ("failed to open '%s': %s\n",
|
||
"/dev/null", strerror (errno));
|
||
cleanup ();
|
||
dirmngr_exit (1);
|
||
}
|
||
}
|
||
}
|
||
|
||
if (setsid() == -1)
|
||
{
|
||
log_error ("setsid() failed: %s\n", strerror(errno) );
|
||
dirmngr_exit (1);
|
||
}
|
||
|
||
log_get_prefix (&oldflags);
|
||
log_set_prefix (NULL, oldflags | GPGRT_LOG_RUN_DETACHED);
|
||
opt.running_detached = 1;
|
||
|
||
}
|
||
#endif
|
||
|
||
if (!nodetach )
|
||
{
|
||
if (gnupg_chdir (gnupg_daemon_rootdir ()))
|
||
{
|
||
log_error ("chdir to '%s' failed: %s\n",
|
||
gnupg_daemon_rootdir (), strerror (errno));
|
||
dirmngr_exit (1);
|
||
}
|
||
}
|
||
|
||
thread_init ();
|
||
cert_cache_init (hkp_cacert_filenames);
|
||
crl_cache_init ();
|
||
http_register_netactivity_cb (netactivity_action);
|
||
handle_connections (fd);
|
||
shutdown_reaper ();
|
||
}
|
||
else if (cmd == aListCRLs)
|
||
{
|
||
/* Just list the CRL cache and exit. */
|
||
if (argc)
|
||
wrong_args ("--list-crls");
|
||
crl_cache_init ();
|
||
crl_cache_list (es_stdout);
|
||
}
|
||
else if (cmd == aLoadCRL)
|
||
{
|
||
struct server_control_s ctrlbuf;
|
||
|
||
memset (&ctrlbuf, 0, sizeof ctrlbuf);
|
||
dirmngr_init_default_ctrl (&ctrlbuf);
|
||
|
||
thread_init ();
|
||
cert_cache_init (hkp_cacert_filenames);
|
||
crl_cache_init ();
|
||
if (!argc)
|
||
rc = crl_cache_load (&ctrlbuf, NULL);
|
||
else
|
||
{
|
||
for (; !rc && argc; argc--, argv++)
|
||
rc = crl_cache_load (&ctrlbuf, *argv);
|
||
}
|
||
dirmngr_deinit_default_ctrl (&ctrlbuf);
|
||
}
|
||
else if (cmd == aFetchCRL)
|
||
{
|
||
ksba_reader_t reader;
|
||
struct server_control_s ctrlbuf;
|
||
|
||
if (argc != 1)
|
||
wrong_args ("--fetch-crl URL");
|
||
|
||
memset (&ctrlbuf, 0, sizeof ctrlbuf);
|
||
dirmngr_init_default_ctrl (&ctrlbuf);
|
||
|
||
thread_init ();
|
||
cert_cache_init (hkp_cacert_filenames);
|
||
crl_cache_init ();
|
||
rc = crl_fetch (&ctrlbuf, argv[0], &reader);
|
||
if (rc)
|
||
log_error (_("fetching CRL from '%s' failed: %s\n"),
|
||
argv[0], gpg_strerror (rc));
|
||
else
|
||
{
|
||
rc = crl_cache_insert (&ctrlbuf, argv[0], reader);
|
||
if (rc)
|
||
log_error (_("processing CRL from '%s' failed: %s\n"),
|
||
argv[0], gpg_strerror (rc));
|
||
crl_close_reader (reader);
|
||
}
|
||
dirmngr_deinit_default_ctrl (&ctrlbuf);
|
||
}
|
||
else if (cmd == aFlush)
|
||
{
|
||
/* Delete cache and exit. */
|
||
if (argc)
|
||
wrong_args ("--flush");
|
||
rc = crl_cache_flush();
|
||
}
|
||
else if (cmd == aGPGConfTest)
|
||
dirmngr_exit (0);
|
||
else if (cmd == aGPGConfList)
|
||
{
|
||
unsigned long flags = 0;
|
||
char *filename_esc;
|
||
|
||
es_printf ("debug-level:%lu:\"none\n", flags | GC_OPT_FLAG_DEFAULT);
|
||
es_printf ("ldaptimeout:%lu:%u\n",
|
||
flags | GC_OPT_FLAG_DEFAULT, DEFAULT_LDAP_TIMEOUT);
|
||
es_printf ("max-replies:%lu:%u\n",
|
||
flags | GC_OPT_FLAG_DEFAULT, DEFAULT_MAX_REPLIES);
|
||
|
||
filename_esc = percent_escape (get_default_keyserver (0), NULL);
|
||
es_printf ("keyserver:%lu:\"%s:\n", flags | GC_OPT_FLAG_DEFAULT,
|
||
filename_esc);
|
||
xfree (filename_esc);
|
||
|
||
es_printf ("resolver-timeout:%lu:%u\n",
|
||
flags | GC_OPT_FLAG_DEFAULT, 0);
|
||
}
|
||
else if (cmd == aGPGConfVersions)
|
||
gpgconf_versions ();
|
||
|
||
cleanup ();
|
||
return !!rc;
|
||
}
|
||
|
||
|
||
static void
|
||
cleanup (void)
|
||
{
|
||
crl_cache_deinit ();
|
||
cert_cache_deinit (1);
|
||
reload_dns_stuff (1);
|
||
|
||
#if USE_LDAP
|
||
ldapserver_list_free (opt.ldapservers);
|
||
#endif /*USE_LDAP*/
|
||
opt.ldapservers = NULL;
|
||
|
||
if (cleanup_socket)
|
||
{
|
||
cleanup_socket = 0;
|
||
if (redir_socket_name)
|
||
gnupg_remove (redir_socket_name);
|
||
else if (socket_name && *socket_name)
|
||
gnupg_remove (socket_name);
|
||
}
|
||
}
|
||
|
||
|
||
void
|
||
dirmngr_exit (int rc)
|
||
{
|
||
cleanup ();
|
||
exit (rc);
|
||
}
|
||
|
||
|
||
void
|
||
dirmngr_init_default_ctrl (ctrl_t ctrl)
|
||
{
|
||
ctrl->magic = SERVER_CONTROL_MAGIC;
|
||
if (opt.http_proxy)
|
||
ctrl->http_proxy = xstrdup (opt.http_proxy);
|
||
ctrl->http_no_crl = 1;
|
||
ctrl->timeout = opt.connect_timeout;
|
||
}
|
||
|
||
|
||
void
|
||
dirmngr_deinit_default_ctrl (ctrl_t ctrl)
|
||
{
|
||
if (!ctrl)
|
||
return;
|
||
ctrl->magic = 0xdeadbeef;
|
||
|
||
xfree (ctrl->http_proxy);
|
||
ctrl->http_proxy = NULL;
|
||
nvc_release (ctrl->rootdse);
|
||
ctrl->rootdse = NULL;
|
||
}
|
||
|
||
|
||
/* Create a list of LDAP servers from the file FILENAME. Returns the
|
||
list or NULL in case of errors.
|
||
|
||
The format fo such a file is line oriented where empty lines and
|
||
lines starting with a hash mark are ignored. All other lines are
|
||
assumed to be colon seprated with these fields:
|
||
|
||
1. field: Hostname
|
||
2. field: Portnumber
|
||
3. field: Username
|
||
4. field: Password
|
||
5. field: Base DN
|
||
|
||
*/
|
||
#if USE_LDAP
|
||
static ldap_server_t
|
||
parse_ldapserver_file (const char* filename, int ignore_enoent)
|
||
{
|
||
char buffer[1024];
|
||
char *p;
|
||
ldap_server_t server, serverstart, *serverend;
|
||
int c;
|
||
unsigned int lineno = 0;
|
||
estream_t fp;
|
||
|
||
fp = es_fopen (filename, "r");
|
||
if (!fp)
|
||
{
|
||
if (errno == ENOENT)
|
||
{
|
||
if (!ignore_enoent)
|
||
log_info ("No ldapserver file at: '%s'\n", filename);
|
||
}
|
||
else
|
||
log_error (_("error opening '%s': %s\n"), filename,
|
||
strerror (errno));
|
||
return NULL;
|
||
}
|
||
|
||
serverstart = NULL;
|
||
serverend = &serverstart;
|
||
while (es_fgets (buffer, sizeof buffer, fp))
|
||
{
|
||
lineno++;
|
||
if (!*buffer || buffer[strlen(buffer)-1] != '\n')
|
||
{
|
||
if (*buffer && es_feof (fp))
|
||
; /* Last line not terminated - continue. */
|
||
else
|
||
{
|
||
log_error (_("%s:%u: line too long - skipped\n"),
|
||
filename, lineno);
|
||
while ( (c=es_fgetc (fp)) != EOF && c != '\n')
|
||
; /* Skip until end of line. */
|
||
continue;
|
||
}
|
||
}
|
||
/* Skip empty and comment lines.*/
|
||
for (p=buffer; spacep (p); p++)
|
||
;
|
||
if (!*p || *p == '\n' || *p == '#')
|
||
continue;
|
||
|
||
/* Parse the colon separated fields. */
|
||
server = ldapserver_parse_one (buffer, filename, lineno);
|
||
if (server)
|
||
{
|
||
*serverend = server;
|
||
serverend = &server->next;
|
||
}
|
||
}
|
||
|
||
if (es_ferror (fp))
|
||
log_error (_("error reading '%s': %s\n"), filename, strerror (errno));
|
||
es_fclose (fp);
|
||
|
||
return serverstart;
|
||
}
|
||
#endif /*USE_LDAP*/
|
||
|
||
|
||
/* Parse a fingerprint entry as used by --ocsc-signer. OPTIONNAME as
|
||
* a description on the options used. WANT_BINARY requests to store a
|
||
* binary fingerprint. Returns NULL on error and logs that error. */
|
||
static fingerprint_list_t
|
||
parse_fingerprint_item (const char *string,
|
||
const char *optionname, int want_binary)
|
||
{
|
||
gpg_error_t err;
|
||
char *fname;
|
||
estream_t fp;
|
||
char line[256];
|
||
char *p;
|
||
fingerprint_list_t list, *list_tail, item;
|
||
unsigned int lnr = 0;
|
||
int c, i, j;
|
||
int errflag = 0;
|
||
|
||
|
||
/* Check whether this is not a filename and treat it as a direct
|
||
fingerprint specification. */
|
||
if (!strpbrk (string, "/.~\\"))
|
||
{
|
||
item = xcalloc (1, sizeof *item);
|
||
for (i=j=0; (string[i] == ':' || hexdigitp (string+i)) && j < 40; i++)
|
||
if ( string[i] != ':' )
|
||
item->hexfpr[j++] = string[i] >= 'a'? (string[i] & 0xdf): string[i];
|
||
item->hexfpr[j] = 0;
|
||
if (j != 40 || !(spacep (string+i) || !string[i]))
|
||
{
|
||
log_error (_("%s:%u: invalid fingerprint detected\n"),
|
||
optionname, 0);
|
||
xfree (item);
|
||
return NULL;
|
||
}
|
||
if (want_binary)
|
||
{
|
||
item->binlen = 20;
|
||
hex2bin (item->hexfpr, item->hexfpr, 20);
|
||
}
|
||
return item;
|
||
}
|
||
|
||
/* Well, it is a filename. */
|
||
if (*string == '/' || (*string == '~' && string[1] == '/'))
|
||
fname = make_filename (string, NULL);
|
||
else
|
||
{
|
||
if (string[0] == '.' && string[1] == '/' )
|
||
string += 2;
|
||
fname = make_filename (gnupg_homedir (), string, NULL);
|
||
}
|
||
|
||
fp = es_fopen (fname, "r");
|
||
if (!fp)
|
||
{
|
||
err = gpg_error_from_syserror ();
|
||
log_error (_("can't open '%s': %s\n"), fname, gpg_strerror (err));
|
||
xfree (fname);
|
||
return NULL;
|
||
}
|
||
|
||
list = NULL;
|
||
list_tail = &list;
|
||
for (;;)
|
||
{
|
||
if (!es_fgets (line, DIM(line)-1, fp) )
|
||
{
|
||
if (!es_feof (fp))
|
||
{
|
||
err = gpg_error_from_syserror ();
|
||
log_error (_("%s:%u: read error: %s\n"),
|
||
fname, lnr, gpg_strerror (err));
|
||
errflag = 1;
|
||
}
|
||
es_fclose (fp);
|
||
if (errflag)
|
||
{
|
||
while (list)
|
||
{
|
||
fingerprint_list_t tmp = list->next;
|
||
xfree (list);
|
||
list = tmp;
|
||
}
|
||
}
|
||
xfree (fname);
|
||
return list; /* Ready. */
|
||
}
|
||
|
||
lnr++;
|
||
if (!*line || line[strlen(line)-1] != '\n')
|
||
{
|
||
/* Eat until end of line. */
|
||
while ( (c=es_getc (fp)) != EOF && c != '\n')
|
||
;
|
||
err = gpg_error (*line? GPG_ERR_LINE_TOO_LONG
|
||
/* */: GPG_ERR_INCOMPLETE_LINE);
|
||
log_error (_("%s:%u: read error: %s\n"),
|
||
fname, lnr, gpg_strerror (err));
|
||
errflag = 1;
|
||
continue;
|
||
}
|
||
|
||
/* Allow for empty lines and spaces */
|
||
for (p=line; spacep (p); p++)
|
||
;
|
||
if (!*p || *p == '\n' || *p == '#')
|
||
continue;
|
||
|
||
item = xcalloc (1, sizeof *item);
|
||
*list_tail = item;
|
||
list_tail = &item->next;
|
||
|
||
for (i=j=0; (p[i] == ':' || hexdigitp (p+i)) && j < 40; i++)
|
||
if ( p[i] != ':' )
|
||
item->hexfpr[j++] = p[i] >= 'a'? (p[i] & 0xdf): p[i];
|
||
item->hexfpr[j] = 0;
|
||
if (j != 40 || !(spacep (p+i) || p[i] == '\n'))
|
||
{
|
||
log_error (_("%s:%u: invalid fingerprint detected\n"), fname, lnr);
|
||
errflag = 1;
|
||
}
|
||
else if (want_binary)
|
||
{
|
||
item->binlen = 20;
|
||
hex2bin (item->hexfpr, item->hexfpr, 20);
|
||
}
|
||
|
||
i++;
|
||
while (spacep (p+i))
|
||
i++;
|
||
if (p[i] && p[i] != '\n')
|
||
log_info (_("%s:%u: garbage at end of line ignored\n"), fname, lnr);
|
||
}
|
||
/*NOTREACHED*/
|
||
}
|
||
|
||
|
||
|
||
|
||
/*
|
||
Stuff used in daemon mode.
|
||
*/
|
||
|
||
|
||
|
||
/* Reread parts of the configuration. Note, that this function is
|
||
obviously not thread-safe and should only be called from the NPTH
|
||
signal handler.
|
||
|
||
Fixme: Due to the way the argument parsing works, we create a
|
||
memory leak here for all string type arguments. There is currently
|
||
no clean way to tell whether the memory for the argument has been
|
||
allocated or points into the process' original arguments. Unless
|
||
we have a mechanism to tell this, we need to live on with this. */
|
||
static void
|
||
reread_configuration (void)
|
||
{
|
||
ARGPARSE_ARGS pargs;
|
||
char *twopart;
|
||
int dummy;
|
||
|
||
if (!opt.config_filename)
|
||
return; /* No config file. */
|
||
|
||
twopart = strconcat (DIRMNGR_NAME EXTSEP_S "conf" PATHSEP_S,
|
||
opt.config_filename, NULL);
|
||
if (!twopart)
|
||
return; /* Out of core. */
|
||
|
||
parse_rereadable_options (NULL, 1); /* Start from the default values. */
|
||
|
||
memset (&pargs, 0, sizeof pargs);
|
||
dummy = 0;
|
||
pargs.argc = &dummy;
|
||
pargs.flags = (ARGPARSE_FLAG_KEEP
|
||
|ARGPARSE_FLAG_SYS
|
||
|ARGPARSE_FLAG_USER);
|
||
while (gnupg_argparser (&pargs, opts, twopart))
|
||
{
|
||
if (pargs.r_opt == ARGPARSE_CONFFILE)
|
||
{
|
||
log_info (_("reading options from '%s'\n"),
|
||
pargs.r_type? pargs.r.ret_str: "[cmdline]");
|
||
}
|
||
else if (pargs.r_opt < -1)
|
||
pargs.err = ARGPARSE_PRINT_WARNING;
|
||
else /* Try to parse this option - ignore unchangeable ones. */
|
||
parse_rereadable_options (&pargs, 1);
|
||
}
|
||
gnupg_argparse (NULL, &pargs, NULL); /* Release internal state. */
|
||
xfree (twopart);
|
||
post_option_parsing (0);
|
||
}
|
||
|
||
|
||
/* A global function which allows us to trigger the reload stuff from
|
||
other places. */
|
||
void
|
||
dirmngr_sighup_action (void)
|
||
{
|
||
log_info (_("SIGHUP received - "
|
||
"re-reading configuration and flushing caches\n"));
|
||
reread_configuration ();
|
||
cert_cache_deinit (0);
|
||
crl_cache_deinit ();
|
||
cert_cache_init (hkp_cacert_filenames);
|
||
crl_cache_init ();
|
||
http_reinitialize ();
|
||
reload_dns_stuff (0);
|
||
ks_hkp_reload ();
|
||
}
|
||
|
||
|
||
/* This function is called if some network activity was done. At this
|
||
* point we know the we have a network and we can decide whether to
|
||
* run scheduled background tasks soon. The function should return
|
||
* quickly and only trigger actions for another thread. */
|
||
static void
|
||
netactivity_action (void)
|
||
{
|
||
network_activity_seen = 1;
|
||
}
|
||
|
||
|
||
/* The signal handler. */
|
||
#ifndef HAVE_W32_SYSTEM
|
||
static void
|
||
handle_signal (int signo)
|
||
{
|
||
switch (signo)
|
||
{
|
||
case SIGHUP:
|
||
dirmngr_sighup_action ();
|
||
break;
|
||
|
||
case SIGUSR1:
|
||
cert_cache_print_stats ();
|
||
domaininfo_print_stats ();
|
||
break;
|
||
|
||
case SIGUSR2:
|
||
log_info (_("SIGUSR2 received - no action defined\n"));
|
||
break;
|
||
|
||
case SIGTERM:
|
||
if (!shutdown_pending)
|
||
log_info (_("SIGTERM received - shutting down ...\n"));
|
||
else
|
||
log_info (_("SIGTERM received - still %d active connections\n"),
|
||
active_connections);
|
||
shutdown_pending++;
|
||
if (shutdown_pending > 2)
|
||
{
|
||
log_info (_("shutdown forced\n"));
|
||
log_info ("%s %s stopped\n", strusage(11), strusage(13) );
|
||
cleanup ();
|
||
dirmngr_exit (0);
|
||
}
|
||
break;
|
||
|
||
case SIGINT:
|
||
log_info (_("SIGINT received - immediate shutdown\n"));
|
||
log_info( "%s %s stopped\n", strusage(11), strusage(13));
|
||
cleanup ();
|
||
dirmngr_exit (0);
|
||
break;
|
||
|
||
default:
|
||
log_info (_("signal %d received - no action defined\n"), signo);
|
||
}
|
||
}
|
||
#endif /*!HAVE_W32_SYSTEM*/
|
||
|
||
|
||
/* Thread to do the housekeeping. */
|
||
static void *
|
||
housekeeping_thread (void *arg)
|
||
{
|
||
static int sentinel;
|
||
time_t curtime;
|
||
struct server_control_s ctrlbuf;
|
||
|
||
(void)arg;
|
||
|
||
curtime = gnupg_get_time ();
|
||
if (sentinel)
|
||
{
|
||
log_info ("housekeeping is already going on\n");
|
||
return NULL;
|
||
}
|
||
sentinel++;
|
||
if (opt.verbose > 1)
|
||
log_info ("starting housekeeping\n");
|
||
|
||
memset (&ctrlbuf, 0, sizeof ctrlbuf);
|
||
dirmngr_init_default_ctrl (&ctrlbuf);
|
||
|
||
dns_stuff_housekeeping ();
|
||
ks_hkp_housekeeping (curtime);
|
||
if (network_activity_seen)
|
||
{
|
||
network_activity_seen = 0;
|
||
if (opt.allow_version_check)
|
||
dirmngr_load_swdb (&ctrlbuf, 0);
|
||
workqueue_run_global_tasks (&ctrlbuf, 1);
|
||
}
|
||
else
|
||
workqueue_run_global_tasks (&ctrlbuf, 0);
|
||
|
||
dirmngr_deinit_default_ctrl (&ctrlbuf);
|
||
|
||
if (opt.verbose > 1)
|
||
log_info ("ready with housekeeping\n");
|
||
sentinel--;
|
||
return NULL;
|
||
|
||
}
|
||
|
||
|
||
#if GPGRT_GCC_HAVE_PUSH_PRAGMA
|
||
# pragma GCC push_options
|
||
# pragma GCC optimize ("no-strict-overflow")
|
||
#endif
|
||
static int
|
||
time_for_housekeeping_p (time_t curtime)
|
||
{
|
||
static time_t last_housekeeping;
|
||
|
||
if (!last_housekeeping)
|
||
last_housekeeping = curtime;
|
||
|
||
if (last_housekeeping + HOUSEKEEPING_INTERVAL <= curtime
|
||
|| last_housekeeping > curtime /*(be prepared for y2038)*/)
|
||
{
|
||
last_housekeeping = curtime;
|
||
return 1;
|
||
}
|
||
return 0;
|
||
}
|
||
#if GPGRT_GCC_HAVE_PUSH_PRAGMA
|
||
# pragma GCC pop_options
|
||
#endif
|
||
|
||
|
||
/* This is the worker for the ticker. It is called every few seconds
|
||
and may only do fast operations. */
|
||
static void
|
||
handle_tick (void)
|
||
{
|
||
struct stat statbuf;
|
||
|
||
if (time_for_housekeeping_p (gnupg_get_time ()))
|
||
{
|
||
npth_t thread;
|
||
npth_attr_t tattr;
|
||
int err;
|
||
|
||
err = npth_attr_init (&tattr);
|
||
if (err)
|
||
log_error ("error preparing housekeeping thread: %s\n", strerror (err));
|
||
else
|
||
{
|
||
npth_attr_setdetachstate (&tattr, NPTH_CREATE_DETACHED);
|
||
err = npth_create (&thread, &tattr, housekeeping_thread, NULL);
|
||
if (err)
|
||
log_error ("error spawning housekeeping thread: %s\n",
|
||
strerror (err));
|
||
npth_attr_destroy (&tattr);
|
||
}
|
||
}
|
||
|
||
/* Check whether the homedir is still available. */
|
||
if (!shutdown_pending
|
||
&& gnupg_stat (gnupg_homedir (), &statbuf) && errno == ENOENT)
|
||
{
|
||
shutdown_pending = 1;
|
||
log_info ("homedir has been removed - shutting down\n");
|
||
}
|
||
}
|
||
|
||
|
||
/* Check the nonce on a new connection. This is a NOP unless we are
|
||
using our Unix domain socket emulation under Windows. */
|
||
static int
|
||
check_nonce (assuan_fd_t fd, assuan_sock_nonce_t *nonce)
|
||
{
|
||
if (assuan_sock_check_nonce (fd, nonce))
|
||
{
|
||
log_info (_("error reading nonce on fd %d: %s\n"),
|
||
FD2INT (fd), strerror (errno));
|
||
assuan_sock_close (fd);
|
||
return -1;
|
||
}
|
||
else
|
||
return 0;
|
||
}
|
||
|
||
|
||
/* Helper to call a connection's main function. */
|
||
static void *
|
||
start_connection_thread (void *arg)
|
||
{
|
||
static unsigned int last_session_id;
|
||
unsigned int session_id;
|
||
union int_and_ptr_u argval;
|
||
gnupg_fd_t fd;
|
||
|
||
memset (&argval, 0, sizeof argval);
|
||
argval.aptr = arg;
|
||
fd = argval.afd;
|
||
|
||
if (check_nonce (fd, &socket_nonce))
|
||
{
|
||
log_error ("handler nonce check FAILED\n");
|
||
return NULL;
|
||
}
|
||
|
||
#ifndef HAVE_W32_SYSTEM
|
||
npth_setspecific (my_tlskey_current_fd, argval.aptr);
|
||
#endif
|
||
|
||
active_connections++;
|
||
if (opt.verbose)
|
||
log_info (_("handler for fd %d started\n"), FD2INT (fd));
|
||
|
||
session_id = ++last_session_id;
|
||
if (!session_id)
|
||
session_id = ++last_session_id;
|
||
start_command_handler (fd, session_id);
|
||
|
||
if (opt.verbose)
|
||
log_info (_("handler for fd %d terminated\n"), FD2INT (fd));
|
||
active_connections--;
|
||
|
||
workqueue_run_post_session_tasks (session_id);
|
||
|
||
#ifndef HAVE_W32_SYSTEM
|
||
argval.afd = ASSUAN_INVALID_FD;
|
||
npth_setspecific (my_tlskey_current_fd, argval.aptr);
|
||
#endif
|
||
|
||
return NULL;
|
||
}
|
||
|
||
|
||
#ifdef HAVE_INOTIFY_INIT
|
||
/* Read an inotify event and return true if it matches NAME. */
|
||
static int
|
||
my_inotify_is_name (int fd, const char *name)
|
||
{
|
||
union {
|
||
struct inotify_event ev;
|
||
char _buf[sizeof (struct inotify_event) + 100 + 1];
|
||
} buf;
|
||
int n;
|
||
const char *s;
|
||
|
||
s = strrchr (name, '/');
|
||
if (s && s[1])
|
||
name = s + 1;
|
||
|
||
n = npth_read (fd, &buf, sizeof buf);
|
||
if (n < sizeof (struct inotify_event))
|
||
return 0;
|
||
if (buf.ev.len < strlen (name)+1)
|
||
return 0;
|
||
if (strcmp (buf.ev.name, name))
|
||
return 0; /* Not the desired file. */
|
||
|
||
return 1; /* Found. */
|
||
}
|
||
#endif /*HAVE_INOTIFY_INIT*/
|
||
|
||
|
||
/* Main loop in daemon mode. Note that LISTEN_FD will be owned by
|
||
* this function. */
|
||
static void
|
||
handle_connections (assuan_fd_t listen_fd)
|
||
{
|
||
npth_attr_t tattr;
|
||
#ifndef HAVE_W32_SYSTEM
|
||
int signo;
|
||
#endif
|
||
struct sockaddr_un paddr;
|
||
socklen_t plen = sizeof( paddr );
|
||
int nfd, ret;
|
||
fd_set fdset, read_fdset;
|
||
struct timespec abstime;
|
||
struct timespec curtime;
|
||
struct timespec timeout;
|
||
int saved_errno;
|
||
int my_inotify_fd = -1;
|
||
|
||
npth_attr_init (&tattr);
|
||
npth_attr_setdetachstate (&tattr, NPTH_CREATE_DETACHED);
|
||
|
||
#ifndef HAVE_W32_SYSTEM /* FIXME */
|
||
npth_sigev_init ();
|
||
npth_sigev_add (SIGHUP);
|
||
npth_sigev_add (SIGUSR1);
|
||
npth_sigev_add (SIGUSR2);
|
||
npth_sigev_add (SIGINT);
|
||
npth_sigev_add (SIGTERM);
|
||
npth_sigev_fini ();
|
||
#endif
|
||
|
||
#ifdef HAVE_INOTIFY_INIT
|
||
if (disable_check_own_socket)
|
||
my_inotify_fd = -1;
|
||
else if ((my_inotify_fd = inotify_init ()) == -1)
|
||
log_info ("error enabling fast daemon termination: %s\n",
|
||
strerror (errno));
|
||
else
|
||
{
|
||
/* We need to watch the directory for the file because there
|
||
* won't be an IN_DELETE_SELF for a socket file. */
|
||
char *slash = strrchr (socket_name, '/');
|
||
log_assert (slash && slash[1]);
|
||
*slash = 0;
|
||
if (inotify_add_watch (my_inotify_fd, socket_name, IN_DELETE) == -1)
|
||
{
|
||
close (my_inotify_fd);
|
||
my_inotify_fd = -1;
|
||
}
|
||
*slash = '/';
|
||
}
|
||
#endif /*HAVE_INOTIFY_INIT*/
|
||
|
||
|
||
/* Setup the fdset. It has only one member. This is because we use
|
||
pth_select instead of pth_accept to properly sync timeouts with
|
||
to full second. */
|
||
FD_ZERO (&fdset);
|
||
FD_SET (FD2INT (listen_fd), &fdset);
|
||
nfd = FD2INT (listen_fd);
|
||
if (my_inotify_fd != -1)
|
||
{
|
||
FD_SET (my_inotify_fd, &fdset);
|
||
if (my_inotify_fd > nfd)
|
||
nfd = my_inotify_fd;
|
||
}
|
||
|
||
npth_clock_gettime (&abstime);
|
||
abstime.tv_sec += TIMERTICK_INTERVAL;
|
||
|
||
/* Main loop. */
|
||
for (;;)
|
||
{
|
||
/* Shutdown test. */
|
||
if (shutdown_pending)
|
||
{
|
||
if (!active_connections)
|
||
break; /* ready */
|
||
|
||
/* Do not accept new connections but keep on running the
|
||
* loop to cope with the timer events.
|
||
*
|
||
* Note that we do not close the listening socket because a
|
||
* client trying to connect to that socket would instead
|
||
* restart a new dirmngr instance - which is unlikely the
|
||
* intention of a shutdown. */
|
||
/* assuan_sock_close (listen_fd); */
|
||
/* listen_fd = -1; */
|
||
FD_ZERO (&fdset);
|
||
nfd = -1;
|
||
if (my_inotify_fd != -1)
|
||
{
|
||
FD_SET (my_inotify_fd, &fdset);
|
||
nfd = my_inotify_fd;
|
||
}
|
||
}
|
||
|
||
/* Take a copy of the fdset. */
|
||
read_fdset = fdset;
|
||
|
||
npth_clock_gettime (&curtime);
|
||
if (!(npth_timercmp (&curtime, &abstime, <)))
|
||
{
|
||
/* Timeout. When a shutdown is pending we use a shorter
|
||
* interval to handle the shutdown more quickly. */
|
||
handle_tick ();
|
||
npth_clock_gettime (&abstime);
|
||
abstime.tv_sec += (shutdown_pending
|
||
? TIMERTICK_INTERVAL_SHUTDOWN
|
||
: TIMERTICK_INTERVAL);
|
||
}
|
||
npth_timersub (&abstime, &curtime, &timeout);
|
||
|
||
#ifndef HAVE_W32_SYSTEM
|
||
ret = npth_pselect (nfd+1, &read_fdset, NULL, NULL, &timeout,
|
||
npth_sigev_sigmask());
|
||
saved_errno = errno;
|
||
|
||
while (npth_sigev_get_pending(&signo))
|
||
handle_signal (signo);
|
||
#else
|
||
ret = npth_eselect (nfd+1, &read_fdset, NULL, NULL, &timeout, NULL, NULL);
|
||
saved_errno = errno;
|
||
#endif
|
||
|
||
if (ret == -1 && saved_errno != EINTR)
|
||
{
|
||
log_error (_("npth_pselect failed: %s - waiting 1s\n"),
|
||
strerror (saved_errno));
|
||
npth_sleep (1);
|
||
continue;
|
||
}
|
||
|
||
if (ret <= 0)
|
||
{
|
||
/* Interrupt or timeout. Will be handled when calculating the
|
||
next timeout. */
|
||
continue;
|
||
}
|
||
|
||
if (shutdown_pending)
|
||
{
|
||
/* Do not anymore accept connections. */
|
||
continue;
|
||
}
|
||
|
||
#ifdef HAVE_INOTIFY_INIT
|
||
if (my_inotify_fd != -1 && FD_ISSET (my_inotify_fd, &read_fdset)
|
||
&& my_inotify_is_name (my_inotify_fd, socket_name))
|
||
{
|
||
shutdown_pending = 1;
|
||
log_info ("socket file has been removed - shutting down\n");
|
||
}
|
||
#endif /*HAVE_INOTIFY_INIT*/
|
||
|
||
if (FD_ISSET (FD2INT (listen_fd), &read_fdset))
|
||
{
|
||
gnupg_fd_t fd;
|
||
|
||
plen = sizeof paddr;
|
||
fd = INT2FD (npth_accept (FD2INT(listen_fd),
|
||
(struct sockaddr *)&paddr, &plen));
|
||
if (fd == GNUPG_INVALID_FD)
|
||
{
|
||
log_error ("accept failed: %s\n", strerror (errno));
|
||
}
|
||
else
|
||
{
|
||
char threadname[50];
|
||
union int_and_ptr_u argval;
|
||
npth_t thread;
|
||
|
||
memset (&argval, 0, sizeof argval);
|
||
argval.afd = fd;
|
||
snprintf (threadname, sizeof threadname,
|
||
"conn fd=%d", FD2INT(fd));
|
||
|
||
ret = npth_create (&thread, &tattr,
|
||
start_connection_thread, argval.aptr);
|
||
if (ret)
|
||
{
|
||
log_error ("error spawning connection handler: %s\n",
|
||
strerror (ret) );
|
||
assuan_sock_close (fd);
|
||
}
|
||
npth_setname_np (thread, threadname);
|
||
}
|
||
}
|
||
}
|
||
|
||
#ifdef HAVE_INOTIFY_INIT
|
||
if (my_inotify_fd != -1)
|
||
close (my_inotify_fd);
|
||
#endif /*HAVE_INOTIFY_INIT*/
|
||
npth_attr_destroy (&tattr);
|
||
if (listen_fd != GNUPG_INVALID_FD)
|
||
assuan_sock_close (listen_fd);
|
||
cleanup ();
|
||
log_info ("%s %s stopped\n", strusage(11), strusage(13));
|
||
}
|
||
|
||
const char*
|
||
dirmngr_get_current_socket_name (void)
|
||
{
|
||
if (socket_name)
|
||
return socket_name;
|
||
else
|
||
return dirmngr_socket_name ();
|
||
}
|
||
|
||
|
||
|
||
/* Parse the revision part from the extended version blurb. */
|
||
static const char *
|
||
get_revision_from_blurb (const char *blurb, int *r_len)
|
||
{
|
||
const char *s = blurb? blurb : "";
|
||
int n;
|
||
|
||
for (; *s; s++)
|
||
if (*s == '\n' && s[1] == '(')
|
||
break;
|
||
if (*s)
|
||
{
|
||
s += 2;
|
||
for (n=0; s[n] && s[n] != ' '; n++)
|
||
;
|
||
}
|
||
else
|
||
{
|
||
s = "?";
|
||
n = 1;
|
||
}
|
||
*r_len = n;
|
||
return s;
|
||
}
|
||
|
||
|
||
/* Print versions of dirmngr and used libraries. This is used by
|
||
* "gpgconf --show-versions" so that there is no need to link gpgconf
|
||
* against all these libraries. This is an internal API and should
|
||
* not be relied upon. */
|
||
static void
|
||
gpgconf_versions (void)
|
||
{
|
||
const char *s;
|
||
int n;
|
||
|
||
/* Unfortunately Npth has no way to get the version. */
|
||
|
||
s = get_revision_from_blurb (assuan_check_version ("\x01\x01"), &n);
|
||
es_fprintf (es_stdout, "* Libassuan %s (%.*s)\n\n",
|
||
assuan_check_version (NULL), n, s);
|
||
|
||
s = get_revision_from_blurb (ksba_check_version ("\x01\x01"), &n);
|
||
es_fprintf (es_stdout, "* KSBA %s (%.*s)\n\n",
|
||
ksba_check_version (NULL), n, s);
|
||
|
||
#ifdef HTTP_USE_NTBTLS
|
||
s = get_revision_from_blurb (ntbtls_check_version ("\x01\x01"), &n);
|
||
es_fprintf (es_stdout, "* NTBTLS %s (%.*s)\n\n",
|
||
ntbtls_check_version (NULL), n, s);
|
||
#elif HTTP_USE_GNUTLS
|
||
es_fprintf (es_stdout, "* GNUTLS %s\n\n",
|
||
gnutls_check_version (NULL));
|
||
#endif
|
||
|
||
}
|