Page Menu
Home
GnuPG
Search
Configure Global Search
Log In
Files
F20065004
dirmngr.c
No One
Temporary
Actions
Download File
Edit File
Delete File
View Transforms
Subscribe
Mute Notifications
Award Token
Size
60 KB
Subscribers
None
dirmngr.c
View Options
/* dirmngr.c - Keyserver and X.509 LDAP access
* Copyright (C) 2002 Klarälvdalens Datakonsult AB
* Copyright (C) 2003, 2004, 2006, 2007, 2008, 2010, 2011 g10 Code GmbH
* Copyright (C) 2014 Werner Koch
*
* This file is part of GnuPG.
*
* GnuPG is free software; you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation; either version 3 of the License, or
* (at your option) any later version.
*
* GnuPG is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program; if not, see <http://www.gnu.org/licenses/>.
*/
#include
<config.h>
#include
<stdio.h>
#include
<stdlib.h>
#include
<stddef.h>
#include
<stdarg.h>
#include
<string.h>
#include
<errno.h>
#include
<assert.h>
#include
<time.h>
#include
<fcntl.h>
#ifndef HAVE_W32_SYSTEM
#include
<sys/socket.h>
#include
<sys/un.h>
#endif
#include
<sys/stat.h>
#include
<unistd.h>
#ifdef HAVE_SIGNAL_H
# include <signal.h>
#endif
#include
<npth.h>
#include
"dirmngr-err.h"
#if HTTP_USE_NTBTLS
# include <ntbtls.h>
#elif HTTP_USE_GNUTLS
# include <gnutls/gnutls.h>
#endif
/*HTTP_USE_GNUTLS*/
#define GNUPG_COMMON_NEED_AFLOCAL
#include
"dirmngr.h"
#include
<assuan.h>
#include
"certcache.h"
#include
"crlcache.h"
#include
"crlfetch.h"
#include
"misc.h"
#if USE_LDAP
# include "ldapserver.h"
#endif
#include
"asshelp.h"
#if USE_LDAP
# include "ldap-wrapper.h"
#endif
#include
"../common/init.h"
#include
"gc-opt-flags.h"
#include
"dns-stuff.h"
/* The plain Windows version uses the windows service system. For
example to start the service you may use "sc start dirmngr".
WindowsCE does not support this; the service system over there is
based on a single process with all services being DLLs - we can't
support this easily. */
#if defined(HAVE_W32_SYSTEM) && !defined(HAVE_W32CE_SYSTEM)
# define USE_W32_SERVICE 1
#endif
#ifndef ENAMETOOLONG
# define ENAMETOOLONG EINVAL
#endif
enum
cmd_and_opt_values
{
aNull
=
0
,
oCsh
=
'c'
,
oQuiet
=
'q'
,
oSh
=
's'
,
oVerbose
=
'v'
,
oNoVerbose
=
500
,
aServer
,
aDaemon
,
aService
,
aListCRLs
,
aLoadCRL
,
aFetchCRL
,
aShutdown
,
aFlush
,
aGPGConfList
,
aGPGConfTest
,
oOptions
,
oDebug
,
oDebugAll
,
oDebugWait
,
oDebugLevel
,
oGnutlsDebug
,
oNoGreeting
,
oNoOptions
,
oHomedir
,
oNoDetach
,
oLogFile
,
oBatch
,
oDisableHTTP
,
oDisableLDAP
,
oIgnoreLDAPDP
,
oIgnoreHTTPDP
,
oIgnoreOCSPSvcUrl
,
oHonorHTTPProxy
,
oHTTPProxy
,
oLDAPProxy
,
oOnlyLDAPProxy
,
oLDAPFile
,
oLDAPTimeout
,
oLDAPAddServers
,
oOCSPResponder
,
oOCSPSigner
,
oOCSPMaxClockSkew
,
oOCSPMaxPeriod
,
oOCSPCurrentPeriod
,
oMaxReplies
,
oHkpCaCert
,
oFakedSystemTime
,
oForce
,
oAllowOCSP
,
oSocketName
,
oLDAPWrapperProgram
,
oHTTPWrapperProgram
,
oIgnoreCertExtension
,
oUseTor
,
oKeyServer
,
oNameServer
,
aTest
};
static
ARGPARSE_OPTS
opts
[]
=
{
ARGPARSE_group
(
300
,
N_
(
"@Commands:
\n
"
)),
ARGPARSE_c
(
aServer
,
"server"
,
N_
(
"run in server mode (foreground)"
)
),
ARGPARSE_c
(
aDaemon
,
"daemon"
,
N_
(
"run in daemon mode (background)"
)
),
#ifdef USE_W32_SERVICE
ARGPARSE_c
(
aService
,
"service"
,
N_
(
"run as windows service (background)"
)),
#endif
ARGPARSE_c
(
aListCRLs
,
"list-crls"
,
N_
(
"list the contents of the CRL cache"
)),
ARGPARSE_c
(
aLoadCRL
,
"load-crl"
,
N_
(
"|FILE|load CRL from FILE into cache"
)),
ARGPARSE_c
(
aFetchCRL
,
"fetch-crl"
,
N_
(
"|URL|fetch a CRL from URL"
)),
ARGPARSE_c
(
aShutdown
,
"shutdown"
,
N_
(
"shutdown the dirmngr"
)),
ARGPARSE_c
(
aFlush
,
"flush"
,
N_
(
"flush the cache"
)),
ARGPARSE_c
(
aGPGConfList
,
"gpgconf-list"
,
"@"
),
ARGPARSE_c
(
aGPGConfTest
,
"gpgconf-test"
,
"@"
),
ARGPARSE_group
(
301
,
N_
(
"@
\n
Options:
\n
"
)),
ARGPARSE_s_n
(
oVerbose
,
"verbose"
,
N_
(
"verbose"
)),
ARGPARSE_s_n
(
oQuiet
,
"quiet"
,
N_
(
"be somewhat more quiet"
)),
ARGPARSE_s_n
(
oSh
,
"sh"
,
N_
(
"sh-style command output"
)),
ARGPARSE_s_n
(
oCsh
,
"csh"
,
N_
(
"csh-style command output"
)),
ARGPARSE_s_s
(
oOptions
,
"options"
,
N_
(
"|FILE|read options from FILE"
)),
ARGPARSE_s_s
(
oDebugLevel
,
"debug-level"
,
N_
(
"|LEVEL|set the debugging level to LEVEL"
)),
ARGPARSE_s_n
(
oNoDetach
,
"no-detach"
,
N_
(
"do not detach from the console"
)),
ARGPARSE_s_s
(
oLogFile
,
"log-file"
,
N_
(
"|FILE|write server mode logs to FILE"
)),
ARGPARSE_s_n
(
oBatch
,
"batch"
,
N_
(
"run without asking a user"
)),
ARGPARSE_s_n
(
oForce
,
"force"
,
N_
(
"force loading of outdated CRLs"
)),
ARGPARSE_s_n
(
oAllowOCSP
,
"allow-ocsp"
,
N_
(
"allow sending OCSP requests"
)),
ARGPARSE_s_n
(
oDisableHTTP
,
"disable-http"
,
N_
(
"inhibit the use of HTTP"
)),
ARGPARSE_s_n
(
oDisableLDAP
,
"disable-ldap"
,
N_
(
"inhibit the use of LDAP"
)),
ARGPARSE_s_n
(
oIgnoreHTTPDP
,
"ignore-http-dp"
,
N_
(
"ignore HTTP CRL distribution points"
)),
ARGPARSE_s_n
(
oIgnoreLDAPDP
,
"ignore-ldap-dp"
,
N_
(
"ignore LDAP CRL distribution points"
)),
ARGPARSE_s_n
(
oIgnoreOCSPSvcUrl
,
"ignore-ocsp-service-url"
,
N_
(
"ignore certificate contained OCSP service URLs"
)),
ARGPARSE_s_s
(
oHTTPProxy
,
"http-proxy"
,
N_
(
"|URL|redirect all HTTP requests to URL"
)),
ARGPARSE_s_s
(
oLDAPProxy
,
"ldap-proxy"
,
N_
(
"|HOST|use HOST for LDAP queries"
)),
ARGPARSE_s_n
(
oOnlyLDAPProxy
,
"only-ldap-proxy"
,
N_
(
"do not use fallback hosts with --ldap-proxy"
)),
ARGPARSE_s_s
(
oLDAPFile
,
"ldapserverlist-file"
,
N_
(
"|FILE|read LDAP server list from FILE"
)),
ARGPARSE_s_n
(
oLDAPAddServers
,
"add-servers"
,
N_
(
"add new servers discovered in CRL distribution"
" points to serverlist"
)),
ARGPARSE_s_i
(
oLDAPTimeout
,
"ldaptimeout"
,
N_
(
"|N|set LDAP timeout to N seconds"
)),
ARGPARSE_s_s
(
oOCSPResponder
,
"ocsp-responder"
,
N_
(
"|URL|use OCSP responder at URL"
)),
ARGPARSE_s_s
(
oOCSPSigner
,
"ocsp-signer"
,
N_
(
"|FPR|OCSP response signed by FPR"
)),
ARGPARSE_s_i
(
oOCSPMaxClockSkew
,
"ocsp-max-clock-skew"
,
"@"
),
ARGPARSE_s_i
(
oOCSPMaxPeriod
,
"ocsp-max-period"
,
"@"
),
ARGPARSE_s_i
(
oOCSPCurrentPeriod
,
"ocsp-current-period"
,
"@"
),
ARGPARSE_s_i
(
oMaxReplies
,
"max-replies"
,
N_
(
"|N|do not return more than N items in one query"
)),
ARGPARSE_s_s
(
oNameServer
,
"nameserver"
,
"@"
),
ARGPARSE_s_s
(
oKeyServer
,
"keyserver"
,
"@"
),
ARGPARSE_s_s
(
oHkpCaCert
,
"hkp-cacert"
,
N_
(
"|FILE|use the CA certificates in FILE for HKP over TLS"
)),
ARGPARSE_s_n
(
oUseTor
,
"use-tor"
,
N_
(
"route all network traffic via Tor"
)),
ARGPARSE_s_s
(
oSocketName
,
"socket-name"
,
"@"
),
/* Only for debugging. */
ARGPARSE_s_u
(
oFakedSystemTime
,
"faked-system-time"
,
"@"
),
/*(epoch time)*/
ARGPARSE_s_s
(
oDebug
,
"debug"
,
"@"
),
ARGPARSE_s_n
(
oDebugAll
,
"debug-all"
,
"@"
),
ARGPARSE_s_i
(
oGnutlsDebug
,
"gnutls-debug"
,
"@"
),
ARGPARSE_s_i
(
oGnutlsDebug
,
"tls-debug"
,
"@"
),
ARGPARSE_s_i
(
oDebugWait
,
"debug-wait"
,
"@"
),
ARGPARSE_s_n
(
oNoGreeting
,
"no-greeting"
,
"@"
),
ARGPARSE_s_s
(
oHomedir
,
"homedir"
,
"@"
),
ARGPARSE_s_s
(
oLDAPWrapperProgram
,
"ldap-wrapper-program"
,
"@"
),
ARGPARSE_s_s
(
oHTTPWrapperProgram
,
"http-wrapper-program"
,
"@"
),
ARGPARSE_s_n
(
oHonorHTTPProxy
,
"honor-http-proxy"
,
"@"
),
ARGPARSE_s_s
(
oIgnoreCertExtension
,
"ignore-cert-extension"
,
"@"
),
ARGPARSE_group
(
302
,
N_
(
"@
\n
(See the
\"
info
\"
manual for a complete listing "
"of all commands and options)
\n
"
)),
ARGPARSE_end
()
};
/* The list of supported debug flags. */
static
struct
debug_flags_s
debug_flags
[]
=
{
{
DBG_X509_VALUE
,
"x509"
},
{
DBG_CRYPTO_VALUE
,
"crypto"
},
{
DBG_MEMORY_VALUE
,
"memory"
},
{
DBG_CACHE_VALUE
,
"cache"
},
{
DBG_MEMSTAT_VALUE
,
"memstat"
},
{
DBG_HASHING_VALUE
,
"hashing"
},
{
DBG_IPC_VALUE
,
"ipc"
},
{
DBG_LOOKUP_VALUE
,
"lookup"
},
{
77
,
NULL
}
/* 77 := Do not exit on "help" or "?". */
};
#define DEFAULT_MAX_REPLIES 10
#define DEFAULT_LDAP_TIMEOUT 100
/* arbitrary large timeout */
/* For the cleanup handler we need to keep track of the socket's name. */
static
const
char
*
socket_name
;
/* If the socket has been redirected, this is the name of the
redirected socket.. */
static
const
char
*
redir_socket_name
;
/* We need to keep track of the server's nonces (these are dummies for
POSIX systems). */
static
assuan_sock_nonce_t
socket_nonce
;
/* Only if this flag has been set will we remove the socket file. */
static
int
cleanup_socket
;
/* Keep track of the current log file so that we can avoid updating
the log file after a SIGHUP if it didn't changed. Malloced. */
static
char
*
current_logfile
;
/* Helper to implement --debug-level. */
static
const
char
*
debug_level
;
/* Helper to set the NTBTLS or GNUTLS log level. */
static
int
opt_gnutls_debug
=
-1
;
/* Flag indicating that a shutdown has been requested. */
static
volatile
int
shutdown_pending
;
/* Counter for the active connections. */
static
int
active_connections
;
/* The timer tick used for housekeeping stuff. For Windows we use a
longer period as the SetWaitableTimer seems to signal earlier than
the 2 seconds. All values are in seconds. */
#if defined(HAVE_W32CE_SYSTEM)
# define TIMERTICK_INTERVAL (60)
#elif defined(HAVE_W32_SYSTEM)
# define TIMERTICK_INTERVAL (4)
#else
# define TIMERTICK_INTERVAL (2)
#endif
#define HOUSEKEEPING_INTERVAL (600)
/* This union is used to avoid compiler warnings in case a pointer is
64 bit and an int 32 bit. We store an integer in a pointer and get
it back later (npth_getspecific et al.). */
union
int_and_ptr_u
{
int
aint
;
assuan_fd_t
afd
;
void
*
aptr
;
};
/* The key used to store the current file descriptor in the thread
local storage. We use this in conjunction with the
log_set_pid_suffix_cb feature. */
#ifndef HAVE_W32_SYSTEM
static
int
my_tlskey_current_fd
;
#endif
/* Prototypes. */
static
void
cleanup
(
void
);
#if USE_LDAP
static
ldap_server_t
parse_ldapserver_file
(
const
char
*
filename
);
#endif
/*USE_LDAP*/
static
fingerprint_list_t
parse_ocsp_signer
(
const
char
*
string
);
static
void
handle_connections
(
assuan_fd_t
listen_fd
);
/* NPth wrapper function definitions. */
ASSUAN_SYSTEM_NPTH_IMPL
;
static
const
char
*
my_strusage
(
int
level
)
{
const
char
*
p
;
switch
(
level
)
{
case
11
:
p
=
"@DIRMNGR@ (@GNUPG@)"
;
break
;
case
13
:
p
=
VERSION
;
break
;
case
17
:
p
=
PRINTABLE_OS_NAME
;
break
;
/* TRANSLATORS: @EMAIL@ will get replaced by the actual bug
reporting address. This is so that we can change the
reporting address without breaking the translations. */
case
19
:
p
=
_
(
"Please report bugs to <@EMAIL@>.
\n
"
);
break
;
case
49
:
p
=
PACKAGE_BUGREPORT
;
break
;
case
1
:
case
40
:
p
=
_
(
"Usage: @DIRMNGR@ [options] (-h for help)"
);
break
;
case
41
:
p
=
_
(
"Syntax: @DIRMNGR@ [options] [command [args]]
\n
"
"Keyserver, CRL, and OCSP access for @GNUPG@
\n
"
);
break
;
default
:
p
=
NULL
;
}
return
p
;
}
/* Callback from libksba to hash a provided buffer. Our current
implementation does only allow SHA-1 for hashing. This may be
extended by mapping the name, testing for algorithm availibility
and adjust the length checks accordingly. */
static
gpg_error_t
my_ksba_hash_buffer
(
void
*
arg
,
const
char
*
oid
,
const
void
*
buffer
,
size_t
length
,
size_t
resultsize
,
unsigned
char
*
result
,
size_t
*
resultlen
)
{
(
void
)
arg
;
if
(
oid
&&
strcmp
(
oid
,
"1.3.14.3.2.26"
))
return
gpg_error
(
GPG_ERR_NOT_SUPPORTED
);
if
(
resultsize
<
20
)
return
gpg_error
(
GPG_ERR_BUFFER_TOO_SHORT
);
gcry_md_hash_buffer
(
2
,
result
,
buffer
,
length
);
*
resultlen
=
20
;
return
0
;
}
/* GNUTLS log function callback. */
#ifdef HTTP_USE_GNUTLS
static
void
my_gnutls_log
(
int
level
,
const
char
*
text
)
{
int
n
;
n
=
strlen
(
text
);
while
(
n
&&
text
[
n
-1
]
==
'\n'
)
n
--
;
log_debug
(
"gnutls:L%d: %.*s
\n
"
,
level
,
n
,
text
);
}
#endif
/*HTTP_USE_GNUTLS*/
/* Setup the debugging. With a LEVEL of NULL only the active debug
flags are propagated to the subsystems. With LEVEL set, a specific
set of debug flags is set; thus overriding all flags already
set. */
static
void
set_debug
(
void
)
{
int
numok
=
(
debug_level
&&
digitp
(
debug_level
));
int
numlvl
=
numok
?
atoi
(
debug_level
)
:
0
;
if
(
!
debug_level
)
;
else
if
(
!
strcmp
(
debug_level
,
"none"
)
||
(
numok
&&
numlvl
<
1
))
opt
.
debug
=
0
;
else
if
(
!
strcmp
(
debug_level
,
"basic"
)
||
(
numok
&&
numlvl
<=
2
))
opt
.
debug
=
DBG_IPC_VALUE
;
else
if
(
!
strcmp
(
debug_level
,
"advanced"
)
||
(
numok
&&
numlvl
<=
5
))
opt
.
debug
=
(
DBG_IPC_VALUE
|
DBG_X509_VALUE
|
DBG_LOOKUP_VALUE
);
else
if
(
!
strcmp
(
debug_level
,
"expert"
)
||
(
numok
&&
numlvl
<=
8
))
opt
.
debug
=
(
DBG_IPC_VALUE
|
DBG_X509_VALUE
|
DBG_LOOKUP_VALUE
|
DBG_CACHE_VALUE
|
DBG_CRYPTO_VALUE
);
else
if
(
!
strcmp
(
debug_level
,
"guru"
)
||
numok
)
{
opt
.
debug
=
~
0
;
/* Unless the "guru" string has been used we don't want to allow
hashing debugging. The rationale is that people tend to
select the highest debug value and would then clutter their
disk with debug files which may reveal confidential data. */
if
(
numok
)
opt
.
debug
&=
~
(
DBG_HASHING_VALUE
);
}
else
{
log_error
(
_
(
"invalid debug-level '%s' given
\n
"
),
debug_level
);
log_info
(
_
(
"valid debug levels are: %s
\n
"
),
"none, basic, advanced, expert, guru"
);
opt
.
debug
=
0
;
/* Reset debugging, so that prior debug
statements won't have an undesired effect. */
}
if
(
opt
.
debug
&&
!
opt
.
verbose
)
{
opt
.
verbose
=
1
;
gcry_control
(
GCRYCTL_SET_VERBOSITY
,
(
int
)
opt
.
verbose
);
}
if
(
opt
.
debug
&&
opt
.
quiet
)
opt
.
quiet
=
0
;
if
(
opt
.
debug
&
DBG_CRYPTO_VALUE
)
gcry_control
(
GCRYCTL_SET_DEBUG_FLAGS
,
1
);
#if HTTP_USE_NTBTLS
if
(
opt_gnutls_debug
>=
0
)
{
ntbtls_set_debug
(
opt_gnutls_debug
,
NULL
,
NULL
);
}
#elif HTTP_USE_GNUTLS
if
(
opt_gnutls_debug
>=
0
)
{
gnutls_global_set_log_function
(
my_gnutls_log
);
gnutls_global_set_log_level
(
opt_gnutls_debug
);
}
#endif
/*HTTP_USE_GNUTLS*/
if
(
opt
.
debug
)
parse_debug_flag
(
NULL
,
&
opt
.
debug
,
debug_flags
);
}
static
void
set_tor_mode
(
void
)
{
if
(
opt
.
use_tor
)
{
#if ASSUAN_VERSION_NUMBER >= 0x020300
/* >= 2.3.0 */
if
(
assuan_sock_set_flag
(
ASSUAN_INVALID_FD
,
"tor-mode"
,
1
))
#endif
{
log_error
(
"error enabling Tor mode: %s
\n
"
,
strerror
(
errno
));
log_info
(
"(is your Libassuan recent enough?)
\n
"
);
}
}
}
static
void
wrong_args
(
const
char
*
text
)
{
es_fprintf
(
es_stderr
,
_
(
"usage: %s [options] "
),
DIRMNGR_NAME
);
es_fputs
(
text
,
es_stderr
);
es_putc
(
'\n'
,
es_stderr
);
dirmngr_exit
(
2
);
}
/* Helper to stop the reaper thread for the ldap wrapper. */
static
void
shutdown_reaper
(
void
)
{
#if USE_LDAP
ldap_wrapper_wait_connections
();
#endif
}
/* Handle options which are allowed to be reset after program start.
Return true if the current option in PARGS could be handled and
false if not. As a special feature, passing a value of NULL for
PARGS, resets the options to the default. REREAD should be set
true if it is not the initial option parsing. */
static
int
parse_rereadable_options
(
ARGPARSE_ARGS
*
pargs
,
int
reread
)
{
if
(
!
pargs
)
{
/* Reset mode. */
opt
.
quiet
=
0
;
opt
.
verbose
=
0
;
opt
.
debug
=
0
;
opt
.
ldap_wrapper_program
=
NULL
;
opt
.
disable_http
=
0
;
opt
.
disable_ldap
=
0
;
opt
.
honor_http_proxy
=
0
;
opt
.
http_proxy
=
NULL
;
opt
.
ldap_proxy
=
NULL
;
opt
.
only_ldap_proxy
=
0
;
opt
.
ignore_http_dp
=
0
;
opt
.
ignore_ldap_dp
=
0
;
opt
.
ignore_ocsp_service_url
=
0
;
opt
.
allow_ocsp
=
0
;
opt
.
ocsp_responder
=
NULL
;
opt
.
ocsp_max_clock_skew
=
10
*
60
;
/* 10 minutes. */
opt
.
ocsp_max_period
=
90
*
86400
;
/* 90 days. */
opt
.
ocsp_current_period
=
3
*
60
*
60
;
/* 3 hours. */
opt
.
max_replies
=
DEFAULT_MAX_REPLIES
;
while
(
opt
.
ocsp_signer
)
{
fingerprint_list_t
tmp
=
opt
.
ocsp_signer
->
next
;
xfree
(
opt
.
ocsp_signer
);
opt
.
ocsp_signer
=
tmp
;
}
FREE_STRLIST
(
opt
.
ignored_cert_extensions
);
http_register_tls_ca
(
NULL
);
xfree
(
opt
.
keyserver
);
opt
.
keyserver
=
NULL
;
/* Note: We do not allow resetting of opt.use_tor at runtime. */
return
1
;
}
switch
(
pargs
->
r_opt
)
{
case
oQuiet
:
opt
.
quiet
=
1
;
break
;
case
oVerbose
:
opt
.
verbose
++
;
break
;
case
oDebug
:
parse_debug_flag
(
pargs
->
r
.
ret_str
,
&
opt
.
debug
,
debug_flags
);
break
;
case
oDebugAll
:
opt
.
debug
=
~
0
;
break
;
case
oDebugLevel
:
debug_level
=
pargs
->
r
.
ret_str
;
break
;
case
oGnutlsDebug
:
opt_gnutls_debug
=
pargs
->
r
.
ret_int
;
break
;
case
oLogFile
:
if
(
!
reread
)
return
0
;
/* Not handled. */
if
(
!
current_logfile
||
!
pargs
->
r
.
ret_str
||
strcmp
(
current_logfile
,
pargs
->
r
.
ret_str
))
{
log_set_file
(
pargs
->
r
.
ret_str
);
xfree
(
current_logfile
);
current_logfile
=
xtrystrdup
(
pargs
->
r
.
ret_str
);
}
break
;
case
oLDAPWrapperProgram
:
opt
.
ldap_wrapper_program
=
pargs
->
r
.
ret_str
;
break
;
case
oHTTPWrapperProgram
:
opt
.
http_wrapper_program
=
pargs
->
r
.
ret_str
;
break
;
case
oDisableHTTP
:
opt
.
disable_http
=
1
;
break
;
case
oDisableLDAP
:
opt
.
disable_ldap
=
1
;
break
;
case
oHonorHTTPProxy
:
opt
.
honor_http_proxy
=
1
;
break
;
case
oHTTPProxy
:
opt
.
http_proxy
=
pargs
->
r
.
ret_str
;
break
;
case
oLDAPProxy
:
opt
.
ldap_proxy
=
pargs
->
r
.
ret_str
;
break
;
case
oOnlyLDAPProxy
:
opt
.
only_ldap_proxy
=
1
;
break
;
case
oIgnoreHTTPDP
:
opt
.
ignore_http_dp
=
1
;
break
;
case
oIgnoreLDAPDP
:
opt
.
ignore_ldap_dp
=
1
;
break
;
case
oIgnoreOCSPSvcUrl
:
opt
.
ignore_ocsp_service_url
=
1
;
break
;
case
oAllowOCSP
:
opt
.
allow_ocsp
=
1
;
break
;
case
oOCSPResponder
:
opt
.
ocsp_responder
=
pargs
->
r
.
ret_str
;
break
;
case
oOCSPSigner
:
opt
.
ocsp_signer
=
parse_ocsp_signer
(
pargs
->
r
.
ret_str
);
break
;
case
oOCSPMaxClockSkew
:
opt
.
ocsp_max_clock_skew
=
pargs
->
r
.
ret_int
;
break
;
case
oOCSPMaxPeriod
:
opt
.
ocsp_max_period
=
pargs
->
r
.
ret_int
;
break
;
case
oOCSPCurrentPeriod
:
opt
.
ocsp_current_period
=
pargs
->
r
.
ret_int
;
break
;
case
oMaxReplies
:
opt
.
max_replies
=
pargs
->
r
.
ret_int
;
break
;
case
oHkpCaCert
:
{
char
*
tmpname
;
/* Do tilde expansion and print a warning if the file can't be
accessed. */
tmpname
=
make_absfilename_try
(
pargs
->
r
.
ret_str
,
NULL
);
if
(
!
tmpname
||
access
(
tmpname
,
F_OK
))
log_info
(
_
(
"can't access '%s': %s
\n
"
),
tmpname
?
tmpname
:
pargs
->
r
.
ret_str
,
gpg_strerror
(
gpg_error_from_syserror
()));
else
http_register_tls_ca
(
tmpname
);
xfree
(
tmpname
);
}
break
;
case
oIgnoreCertExtension
:
add_to_strlist
(
&
opt
.
ignored_cert_extensions
,
pargs
->
r
.
ret_str
);
break
;
case
oUseTor
:
opt
.
use_tor
=
1
;
break
;
case
oKeyServer
:
xfree
(
opt
.
keyserver
);
opt
.
keyserver
=
*
pargs
->
r
.
ret_str
?
xtrystrdup
(
pargs
->
r
.
ret_str
)
:
NULL
;
break
;
case
oNameServer
:
set_dns_nameserver
(
pargs
->
r
.
ret_str
);
break
;
default
:
return
0
;
/* Not handled. */
}
return
1
;
/* Handled. */
}
#ifdef USE_W32_SERVICE
/* The global status of our service. */
SERVICE_STATUS_HANDLE
service_handle
;
SERVICE_STATUS
service_status
;
DWORD
WINAPI
w32_service_control
(
DWORD
control
,
DWORD
event_type
,
LPVOID
event_data
,
LPVOID
context
)
{
(
void
)
event_type
;
(
void
)
event_data
;
(
void
)
context
;
/* event_type and event_data are not used here. */
switch
(
control
)
{
case
SERVICE_CONTROL_SHUTDOWN
:
/* For shutdown we will try to force termination. */
service_status
.
dwCurrentState
=
SERVICE_STOP_PENDING
;
SetServiceStatus
(
service_handle
,
&
service_status
);
shutdown_pending
=
3
;
break
;
case
SERVICE_CONTROL_STOP
:
service_status
.
dwCurrentState
=
SERVICE_STOP_PENDING
;
SetServiceStatus
(
service_handle
,
&
service_status
);
shutdown_pending
=
1
;
break
;
default
:
break
;
}
return
0
;
}
#endif
/*USE_W32_SERVICE*/
#ifndef HAVE_W32_SYSTEM
static
int
pid_suffix_callback
(
unsigned
long
*
r_suffix
)
{
union
int_and_ptr_u
value
;
memset
(
&
value
,
0
,
sizeof
value
);
value
.
aptr
=
npth_getspecific
(
my_tlskey_current_fd
);
*
r_suffix
=
value
.
aint
;
return
(
*
r_suffix
!=
-1
);
/* Use decimal representation. */
}
#endif
/*!HAVE_W32_SYSTEM*/
#ifdef USE_W32_SERVICE
# define main real_main
#endif
int
main
(
int
argc
,
char
**
argv
)
{
#ifdef USE_W32_SERVICE
# undef main
#endif
enum
cmd_and_opt_values
cmd
=
0
;
ARGPARSE_ARGS
pargs
;
int
orig_argc
;
char
**
orig_argv
;
FILE
*
configfp
=
NULL
;
char
*
configname
=
NULL
;
const
char
*
shell
;
unsigned
configlineno
;
int
parse_debug
=
0
;
int
default_config
=
1
;
int
greeting
=
0
;
int
nogreeting
=
0
;
int
nodetach
=
0
;
int
csh_style
=
0
;
char
*
logfile
=
NULL
;
#if USE_LDAP
char
*
ldapfile
=
NULL
;
#endif
/*USE_LDAP*/
int
debug_wait
=
0
;
int
rc
;
int
homedir_seen
=
0
;
struct
assuan_malloc_hooks
malloc_hooks
;
early_system_init
();
#ifdef USE_W32_SERVICE
/* The option will be set by main() below if we should run as a
system daemon. */
if
(
opt
.
system_service
)
{
service_handle
=
RegisterServiceCtrlHandlerEx
(
"DirMngr"
,
&
w32_service_control
,
NULL
/*FIXME*/
);
if
(
service_handle
==
0
)
log_error
(
"failed to register service control handler: ec=%d"
,
(
int
)
GetLastError
());
service_status
.
dwServiceType
=
SERVICE_WIN32_OWN_PROCESS
;
service_status
.
dwCurrentState
=
SERVICE_START_PENDING
;
service_status
.
dwControlsAccepted
=
SERVICE_ACCEPT_STOP
|
SERVICE_ACCEPT_SHUTDOWN
;
service_status
.
dwWin32ExitCode
=
NO_ERROR
;
service_status
.
dwServiceSpecificExitCode
=
NO_ERROR
;
service_status
.
dwCheckPoint
=
0
;
service_status
.
dwWaitHint
=
10000
;
/* 10 seconds timeout. */
SetServiceStatus
(
service_handle
,
&
service_status
);
}
#endif
/*USE_W32_SERVICE*/
set_strusage
(
my_strusage
);
log_set_prefix
(
DIRMNGR_NAME
,
1
|
4
);
/* Make sure that our subsystems are ready. */
i18n_init
();
init_common_subsystems
(
&
argc
,
&
argv
);
npth_init
();
gcry_control
(
GCRYCTL_DISABLE_SECMEM
,
0
);
/* Check that the libraries are suitable. Do it here because
the option parsing may need services of the libraries. */
if
(
!
gcry_check_version
(
NEED_LIBGCRYPT_VERSION
)
)
log_fatal
(
_
(
"%s is too old (need %s, have %s)
\n
"
),
"libgcrypt"
,
NEED_LIBGCRYPT_VERSION
,
gcry_check_version
(
NULL
)
);
if
(
!
ksba_check_version
(
NEED_KSBA_VERSION
)
)
log_fatal
(
_
(
"%s is too old (need %s, have %s)
\n
"
),
"libksba"
,
NEED_KSBA_VERSION
,
ksba_check_version
(
NULL
)
);
ksba_set_malloc_hooks
(
gcry_malloc
,
gcry_realloc
,
gcry_free
);
ksba_set_hash_buffer_function
(
my_ksba_hash_buffer
,
NULL
);
/* Init TLS library. */
#if HTTP_USE_NTBTLS
if
(
!
ntbtls_check_version
(
NEED_NTBTLS_VERSION
)
)
log_fatal
(
_
(
"%s is too old (need %s, have %s)
\n
"
),
"ntbtls"
,
NEED_NTBTLS_VERSION
,
ntbtls_check_version
(
NULL
)
);
#elif HTTP_USE_GNUTLS
rc
=
gnutls_global_init
();
if
(
rc
)
log_fatal
(
"gnutls_global_init failed: %s
\n
"
,
gnutls_strerror
(
rc
));
#endif
/*HTTP_USE_GNUTLS*/
/* Init Assuan. */
malloc_hooks
.
malloc
=
gcry_malloc
;
malloc_hooks
.
realloc
=
gcry_realloc
;
malloc_hooks
.
free
=
gcry_free
;
assuan_set_malloc_hooks
(
&
malloc_hooks
);
assuan_set_assuan_log_prefix
(
log_get_prefix
(
NULL
));
assuan_set_gpg_err_source
(
GPG_ERR_SOURCE_DEFAULT
);
assuan_set_system_hooks
(
ASSUAN_SYSTEM_NPTH
);
assuan_sock_init
();
setup_libassuan_logging
(
&
opt
.
debug
);
setup_libgcrypt_logging
();
/* Setup defaults. */
shell
=
getenv
(
"SHELL"
);
if
(
shell
&&
strlen
(
shell
)
>=
3
&&
!
strcmp
(
shell
+
strlen
(
shell
)
-3
,
"csh"
)
)
csh_style
=
1
;
opt
.
homedir
=
default_homedir
();
/* Now with NPth running we can set the logging callback. Our
windows implementation does not yet feature the NPth TLS
functions. */
#ifndef HAVE_W32_SYSTEM
if
(
npth_key_create
(
&
my_tlskey_current_fd
,
NULL
)
==
0
)
if
(
npth_setspecific
(
my_tlskey_current_fd
,
NULL
)
==
0
)
log_set_pid_suffix_cb
(
pid_suffix_callback
);
#endif
/*!HAVE_W32_SYSTEM*/
/* Reset rereadable options to default values. */
parse_rereadable_options
(
NULL
,
0
);
/* LDAP defaults. */
opt
.
add_new_ldapservers
=
0
;
opt
.
ldaptimeout
=
DEFAULT_LDAP_TIMEOUT
;
/* Other defaults. */
/* Check whether we have a config file given on the commandline */
orig_argc
=
argc
;
orig_argv
=
argv
;
pargs
.
argc
=
&
argc
;
pargs
.
argv
=
&
argv
;
pargs
.
flags
=
1
|
(
1
<<
6
);
/* do not remove the args, ignore version */
while
(
arg_parse
(
&
pargs
,
opts
))
{
if
(
pargs
.
r_opt
==
oDebug
||
pargs
.
r_opt
==
oDebugAll
)
parse_debug
++
;
else
if
(
pargs
.
r_opt
==
oOptions
)
{
/* Yes there is one, so we do not try the default one, but
read the option file when it is encountered at the
commandline */
default_config
=
0
;
}
else
if
(
pargs
.
r_opt
==
oNoOptions
)
default_config
=
0
;
/* --no-options */
else
if
(
pargs
.
r_opt
==
oHomedir
)
{
opt
.
homedir
=
pargs
.
r
.
ret_str
;
homedir_seen
=
1
;
}
else
if
(
pargs
.
r_opt
==
aDaemon
)
opt
.
system_daemon
=
1
;
else
if
(
pargs
.
r_opt
==
aService
)
{
/* Redundant. The main function takes care of it. */
opt
.
system_service
=
1
;
opt
.
system_daemon
=
1
;
}
#ifdef HAVE_W32_SYSTEM
else
if
(
pargs
.
r_opt
==
aGPGConfList
||
pargs
.
r_opt
==
aGPGConfTest
)
/* We set this so we switch to the system configuration
directory below. This is a crutch to solve the problem
that the user configuration is never used on Windows. Also
see below at aGPGConfList. */
opt
.
system_daemon
=
1
;
#endif
}
/* If --daemon has been given on the command line but not --homedir,
we switch to /etc/gnupg as default home directory. Note, that
this also overrides the GNUPGHOME environment variable. */
if
(
opt
.
system_daemon
&&
!
homedir_seen
)
{
#ifdef HAVE_W32CE_SYSTEM
opt
.
homedir
=
DIRSEP_S
"gnupg"
;
#else
opt
.
homedir
=
gnupg_sysconfdir
();
#endif
opt
.
homedir_cache
=
gnupg_cachedir
();
socket_name
=
dirmngr_sys_socket_name
();
}
else
if
(
dirmngr_user_socket_name
())
socket_name
=
dirmngr_user_socket_name
();
else
socket_name
=
dirmngr_sys_socket_name
();
if
(
default_config
)
configname
=
make_filename
(
opt
.
homedir
,
DIRMNGR_NAME
".conf"
,
NULL
);
argc
=
orig_argc
;
argv
=
orig_argv
;
pargs
.
argc
=
&
argc
;
pargs
.
argv
=
&
argv
;
pargs
.
flags
=
1
;
/* do not remove the args */
next_pass
:
if
(
configname
)
{
configlineno
=
0
;
configfp
=
fopen
(
configname
,
"r"
);
if
(
!
configfp
)
{
if
(
default_config
)
{
if
(
parse_debug
)
log_info
(
_
(
"Note: no default option file '%s'
\n
"
),
configname
);
}
else
{
log_error
(
_
(
"option file '%s': %s
\n
"
),
configname
,
strerror
(
errno
)
);
exit
(
2
);
}
xfree
(
configname
);
configname
=
NULL
;
}
if
(
parse_debug
&&
configname
)
log_info
(
_
(
"reading options from '%s'
\n
"
),
configname
);
default_config
=
0
;
}
while
(
optfile_parse
(
configfp
,
configname
,
&
configlineno
,
&
pargs
,
opts
)
)
{
if
(
parse_rereadable_options
(
&
pargs
,
0
))
continue
;
/* Already handled */
switch
(
pargs
.
r_opt
)
{
case
aServer
:
case
aDaemon
:
case
aService
:
case
aShutdown
:
case
aFlush
:
case
aListCRLs
:
case
aLoadCRL
:
case
aFetchCRL
:
case
aGPGConfList
:
case
aGPGConfTest
:
cmd
=
pargs
.
r_opt
;
break
;
case
oQuiet
:
opt
.
quiet
=
1
;
break
;
case
oVerbose
:
opt
.
verbose
++
;
break
;
case
oBatch
:
opt
.
batch
=
1
;
break
;
case
oDebugWait
:
debug_wait
=
pargs
.
r
.
ret_int
;
break
;
case
oOptions
:
/* Config files may not be nested (silently ignore them) */
if
(
!
configfp
)
{
xfree
(
configname
);
configname
=
xstrdup
(
pargs
.
r
.
ret_str
);
goto
next_pass
;
}
break
;
case
oNoGreeting
:
nogreeting
=
1
;
break
;
case
oNoVerbose
:
opt
.
verbose
=
0
;
break
;
case
oNoOptions
:
break
;
/* no-options */
case
oHomedir
:
/* Ignore this option here. */
;
break
;
case
oNoDetach
:
nodetach
=
1
;
break
;
case
oLogFile
:
logfile
=
pargs
.
r
.
ret_str
;
break
;
case
oCsh
:
csh_style
=
1
;
break
;
case
oSh
:
csh_style
=
0
;
break
;
case
oLDAPFile
:
# if USE_LDAP
ldapfile
=
pargs
.
r
.
ret_str
;
# endif
/*USE_LDAP*/
break
;
case
oLDAPAddServers
:
opt
.
add_new_ldapservers
=
1
;
break
;
case
oLDAPTimeout
:
opt
.
ldaptimeout
=
pargs
.
r
.
ret_int
;
break
;
case
oFakedSystemTime
:
gnupg_set_time
((
time_t
)
pargs
.
r
.
ret_ulong
,
0
);
break
;
case
oForce
:
opt
.
force
=
1
;
break
;
case
oSocketName
:
socket_name
=
pargs
.
r
.
ret_str
;
break
;
default
:
pargs
.
err
=
configfp
?
1
:
2
;
break
;
}
}
if
(
configfp
)
{
fclose
(
configfp
);
configfp
=
NULL
;
/* Keep a copy of the name so that it can be read on SIGHUP. */
opt
.
config_filename
=
configname
;
configname
=
NULL
;
goto
next_pass
;
}
xfree
(
configname
);
configname
=
NULL
;
if
(
log_get_errorcount
(
0
))
exit
(
2
);
if
(
nogreeting
)
greeting
=
0
;
if
(
!
opt
.
homedir_cache
)
opt
.
homedir_cache
=
opt
.
homedir
;
if
(
greeting
)
{
es_fprintf
(
es_stderr
,
"%s %s; %s
\n
"
,
strusage
(
11
),
strusage
(
13
),
strusage
(
14
)
);
es_fprintf
(
es_stderr
,
"%s
\n
"
,
strusage
(
15
)
);
}
#ifdef IS_DEVELOPMENT_VERSION
log_info
(
"NOTE: this is a development version!
\n
"
);
#endif
if
(
opt
.
use_tor
)
{
log_info
(
"WARNING: ***************************************
\n
"
);
log_info
(
"WARNING: Tor mode (--use-tor) MAY NOT FULLY WORK!
\n
"
);
log_info
(
"WARNING: ***************************************
\n
"
);
}
/* Print a warning if an argument looks like an option. */
if
(
!
opt
.
quiet
&&
!
(
pargs
.
flags
&
ARGPARSE_FLAG_STOP_SEEN
))
{
int
i
;
for
(
i
=
0
;
i
<
argc
;
i
++
)
if
(
argv
[
i
][
0
]
==
'-'
&&
argv
[
i
][
1
]
==
'-'
)
log_info
(
_
(
"Note: '%s' is not considered an option
\n
"
),
argv
[
i
]);
}
if
(
!
access
(
"/etc/"
DIRMNGR_NAME
,
F_OK
)
&&
!
strncmp
(
opt
.
homedir
,
"/etc/"
,
5
))
log_info
(
"NOTE: DirMngr is now a proper part of %s. The configuration and"
" other directory names changed. Please check that no other version"
" of dirmngr is still installed. To disable this warning, remove the"
" directory '/etc/dirmngr'.
\n
"
,
GNUPG_NAME
);
if
(
gnupg_faked_time_p
())
{
gnupg_isotime_t
tbuf
;
log_info
(
_
(
"WARNING: running with faked system time: "
));
gnupg_get_isotime
(
tbuf
);
dump_isotime
(
tbuf
);
log_printf
(
"
\n
"
);
}
set_debug
();
set_tor_mode
();
/* Get LDAP server list from file. */
#if USE_LDAP
if
(
!
ldapfile
)
{
ldapfile
=
make_filename
(
opt
.
homedir
,
opt
.
system_daemon
?
"ldapservers.conf"
:
"dirmngr_ldapservers.conf"
,
NULL
);
opt
.
ldapservers
=
parse_ldapserver_file
(
ldapfile
);
xfree
(
ldapfile
);
}
else
opt
.
ldapservers
=
parse_ldapserver_file
(
ldapfile
);
#endif
/*USE_LDAP*/
#ifndef HAVE_W32_SYSTEM
/* We need to ignore the PIPE signal because the we might log to a
socket and that code handles EPIPE properly. The ldap wrapper
also requires us to ignore this silly signal. Assuan would set
this signal to ignore anyway.*/
signal
(
SIGPIPE
,
SIG_IGN
);
#endif
/* Ready. Now to our duties. */
if
(
!
cmd
&&
opt
.
system_service
)
cmd
=
aDaemon
;
else
if
(
!
cmd
)
cmd
=
aServer
;
rc
=
0
;
if
(
cmd
==
aServer
)
{
/* Note that this server mode is mainly useful for debugging. */
if
(
argc
)
wrong_args
(
"--server"
);
if
(
logfile
)
{
log_set_file
(
logfile
);
log_set_prefix
(
NULL
,
2
|
4
);
}
if
(
debug_wait
)
{
log_debug
(
"waiting for debugger - my pid is %u .....
\n
"
,
(
unsigned
int
)
getpid
());
gnupg_sleep
(
debug_wait
);
log_debug
(
"... okay
\n
"
);
}
#if USE_LDAP
ldap_wrapper_launch_thread
();
#endif
/*USE_LDAP*/
cert_cache_init
();
crl_cache_init
();
start_command_handler
(
ASSUAN_INVALID_FD
);
shutdown_reaper
();
}
else
if
(
cmd
==
aDaemon
)
{
assuan_fd_t
fd
;
pid_t
pid
;
int
len
;
struct
sockaddr_un
serv_addr
;
if
(
argc
)
wrong_args
(
"--daemon"
);
/* Now start with logging to a file if this is desired. */
if
(
logfile
)
{
log_set_file
(
logfile
);
log_set_prefix
(
NULL
,
(
GPGRT_LOG_WITH_PREFIX
|
GPGRT_LOG_WITH_TIME
|
GPGRT_LOG_WITH_PID
));
current_logfile
=
xstrdup
(
logfile
);
}
#ifndef HAVE_W32_SYSTEM
if
(
strchr
(
socket_name
,
':'
))
{
log_error
(
_
(
"colons are not allowed in the socket name
\n
"
));
dirmngr_exit
(
1
);
}
#endif
fd
=
assuan_sock_new
(
AF_UNIX
,
SOCK_STREAM
,
0
);
if
(
fd
==
ASSUAN_INVALID_FD
)
{
log_error
(
_
(
"can't create socket: %s
\n
"
),
strerror
(
errno
));
cleanup
();
dirmngr_exit
(
1
);
}
#if ASSUAN_VERSION_NUMBER >= 0x020104
/* >= 2.1.4 */
{
int
redirected
;
if
(
assuan_sock_set_sockaddr_un
(
socket_name
,
(
struct
sockaddr
*
)
&
serv_addr
,
&
redirected
))
{
if
(
errno
==
ENAMETOOLONG
)
log_error
(
_
(
"socket name '%s' is too long
\n
"
),
socket_name
);
else
log_error
(
"error preparing socket '%s': %s
\n
"
,
socket_name
,
gpg_strerror
(
gpg_error_from_syserror
()));
dirmngr_exit
(
1
);
}
if
(
redirected
)
{
redir_socket_name
=
xstrdup
(
serv_addr
.
sun_path
);
if
(
opt
.
verbose
)
log_info
(
"redirecting socket '%s' to '%s'
\n
"
,
socket_name
,
redir_socket_name
);
}
}
#else
/* Assuan < 2.1.4 */
memset
(
&
serv_addr
,
0
,
sizeof
serv_addr
);
serv_addr
.
sun_family
=
AF_UNIX
;
if
(
strlen
(
socket_name
)
+
1
>=
sizeof
serv_addr
.
sun_path
)
{
log_error
(
_
(
"socket name '%s' is too long
\n
"
),
socket_name
);
dirmngr_exit
(
1
);
}
strcpy
(
serv_addr
.
sun_path
,
socket_name
);
#endif
/* Assuan < 2.1.4 */
len
=
SUN_LEN
(
&
serv_addr
);
rc
=
assuan_sock_bind
(
fd
,
(
struct
sockaddr
*
)
&
serv_addr
,
len
);
if
(
rc
==
-1
&&
(
errno
==
EADDRINUSE
#ifdef HAVE_W32_SYSTEM
||
errno
==
EEXIST
#endif
))
{
/* Fixme: We should test whether a dirmngr is already running. */
gnupg_remove
(
redir_socket_name
?
redir_socket_name
:
socket_name
);
rc
=
assuan_sock_bind
(
fd
,
(
struct
sockaddr
*
)
&
serv_addr
,
len
);
}
if
(
rc
!=
-1
&&
(
rc
=
assuan_sock_get_nonce
((
struct
sockaddr
*
)
&
serv_addr
,
len
,
&
socket_nonce
)))
log_error
(
_
(
"error getting nonce for the socket
\n
"
));
if
(
rc
==
-1
)
{
log_error
(
_
(
"error binding socket to '%s': %s
\n
"
),
serv_addr
.
sun_path
,
gpg_strerror
(
gpg_error_from_errno
(
errno
)));
assuan_sock_close
(
fd
);
dirmngr_exit
(
1
);
}
cleanup_socket
=
1
;
if
(
listen
(
FD2INT
(
fd
),
5
)
==
-1
)
{
log_error
(
_
(
"listen() failed: %s
\n
"
),
strerror
(
errno
));
assuan_sock_close
(
fd
);
dirmngr_exit
(
1
);
}
if
(
opt
.
verbose
)
log_info
(
_
(
"listening on socket '%s'
\n
"
),
serv_addr
.
sun_path
);
es_fflush
(
NULL
);
/* Note: We keep the dirmngr_info output only for the sake of
existing scripts which might use this to detect a successful
start of the dirmngr. */
#ifdef HAVE_W32_SYSTEM
(
void
)
csh_style
;
(
void
)
nodetach
;
pid
=
getpid
();
es_printf
(
"set %s=%s;%lu;1
\n
"
,
DIRMNGR_INFO_NAME
,
socket_name
,
(
ulong
)
pid
);
#else
pid
=
fork
();
if
(
pid
==
(
pid_t
)
-1
)
{
log_fatal
(
_
(
"error forking process: %s
\n
"
),
strerror
(
errno
));
dirmngr_exit
(
1
);
}
if
(
pid
)
{
/* We are the parent */
char
*
infostr
;
/* Don't let cleanup() remove the socket - the child is
responsible for doing that. */
cleanup_socket
=
0
;
close
(
fd
);
/* Create the info string: <name>:<pid>:<protocol_version> */
if
(
asprintf
(
&
infostr
,
"%s=%s:%lu:1"
,
DIRMNGR_INFO_NAME
,
serv_addr
.
sun_path
,
(
ulong
)
pid
)
<
0
)
{
log_error
(
_
(
"out of core
\n
"
));
kill
(
pid
,
SIGTERM
);
dirmngr_exit
(
1
);
}
/* Print the environment string, so that the caller can use
shell's eval to set it. But see above. */
if
(
csh_style
)
{
*
strchr
(
infostr
,
'='
)
=
' '
;
es_printf
(
"setenv %s;
\n
"
,
infostr
);
}
else
{
es_printf
(
"%s; export %s;
\n
"
,
infostr
,
DIRMNGR_INFO_NAME
);
}
free
(
infostr
);
exit
(
0
);
/*NEVER REACHED*/
}
/* end parent */
/*
This is the child
*/
/* Detach from tty and put process into a new session */
if
(
!
nodetach
)
{
int
i
;
unsigned
int
oldflags
;
/* Close stdin, stdout and stderr unless it is the log stream */
for
(
i
=
0
;
i
<=
2
;
i
++
)
{
if
(
!
log_test_fd
(
i
)
&&
i
!=
fd
)
close
(
i
);
}
if
(
setsid
()
==
-1
)
{
log_error
(
"setsid() failed: %s
\n
"
,
strerror
(
errno
)
);
dirmngr_exit
(
1
);
}
log_get_prefix
(
&
oldflags
);
log_set_prefix
(
NULL
,
oldflags
|
GPGRT_LOG_RUN_DETACHED
);
opt
.
running_detached
=
1
;
if
(
chdir
(
"/"
))
{
log_error
(
"chdir to / failed: %s
\n
"
,
strerror
(
errno
));
dirmngr_exit
(
1
);
}
}
#endif
#if USE_LDAP
ldap_wrapper_launch_thread
();
#endif
/*USE_LDAP*/
cert_cache_init
();
crl_cache_init
();
#ifdef USE_W32_SERVICE
if
(
opt
.
system_service
)
{
service_status
.
dwCurrentState
=
SERVICE_RUNNING
;
SetServiceStatus
(
service_handle
,
&
service_status
);
}
#endif
handle_connections
(
fd
);
assuan_sock_close
(
fd
);
shutdown_reaper
();
#ifdef USE_W32_SERVICE
if
(
opt
.
system_service
)
{
service_status
.
dwCurrentState
=
SERVICE_STOPPED
;
SetServiceStatus
(
service_handle
,
&
service_status
);
}
#endif
}
else
if
(
cmd
==
aListCRLs
)
{
/* Just list the CRL cache and exit. */
if
(
argc
)
wrong_args
(
"--list-crls"
);
#if USE_LDAP
ldap_wrapper_launch_thread
();
#endif
/*USE_LDAP*/
crl_cache_init
();
crl_cache_list
(
es_stdout
);
}
else
if
(
cmd
==
aLoadCRL
)
{
struct
server_control_s
ctrlbuf
;
memset
(
&
ctrlbuf
,
0
,
sizeof
ctrlbuf
);
dirmngr_init_default_ctrl
(
&
ctrlbuf
);
#if USE_LDAP
ldap_wrapper_launch_thread
();
#endif
/*USE_LDAP*/
cert_cache_init
();
crl_cache_init
();
if
(
!
argc
)
rc
=
crl_cache_load
(
&
ctrlbuf
,
NULL
);
else
{
for
(;
!
rc
&&
argc
;
argc
--
,
argv
++
)
rc
=
crl_cache_load
(
&
ctrlbuf
,
*
argv
);
}
dirmngr_deinit_default_ctrl
(
&
ctrlbuf
);
}
else
if
(
cmd
==
aFetchCRL
)
{
ksba_reader_t
reader
;
struct
server_control_s
ctrlbuf
;
if
(
argc
!=
1
)
wrong_args
(
"--fetch-crl URL"
);
memset
(
&
ctrlbuf
,
0
,
sizeof
ctrlbuf
);
dirmngr_init_default_ctrl
(
&
ctrlbuf
);
#if USE_LDAP
ldap_wrapper_launch_thread
();
#endif
/*USE_LDAP*/
cert_cache_init
();
crl_cache_init
();
rc
=
crl_fetch
(
&
ctrlbuf
,
argv
[
0
],
&
reader
);
if
(
rc
)
log_error
(
_
(
"fetching CRL from '%s' failed: %s
\n
"
),
argv
[
0
],
gpg_strerror
(
rc
));
else
{
rc
=
crl_cache_insert
(
&
ctrlbuf
,
argv
[
0
],
reader
);
if
(
rc
)
log_error
(
_
(
"processing CRL from '%s' failed: %s
\n
"
),
argv
[
0
],
gpg_strerror
(
rc
));
crl_close_reader
(
reader
);
}
dirmngr_deinit_default_ctrl
(
&
ctrlbuf
);
}
else
if
(
cmd
==
aFlush
)
{
/* Delete cache and exit. */
if
(
argc
)
wrong_args
(
"--flush"
);
rc
=
crl_cache_flush
();
}
else
if
(
cmd
==
aGPGConfTest
)
dirmngr_exit
(
0
);
else
if
(
cmd
==
aGPGConfList
)
{
unsigned
long
flags
=
0
;
char
*
filename
;
char
*
filename_esc
;
#ifdef HAVE_W32_SYSTEM
/* On Windows systems, dirmngr always runs as system daemon, and
the per-user configuration is never used. So we short-cut
everything to use the global system configuration of dirmngr
above, and here we set the no change flag to make these
read-only. */
flags
|=
GC_OPT_FLAG_NO_CHANGE
;
#endif
/* First the configuration file. This is not an option, but it
is vital information for GPG Conf. */
if
(
!
opt
.
config_filename
)
opt
.
config_filename
=
make_filename
(
opt
.
homedir
,
"dirmngr.conf"
,
NULL
);
filename
=
percent_escape
(
opt
.
config_filename
,
NULL
);
es_printf
(
"gpgconf-dirmngr.conf:%lu:
\"
%s
\n
"
,
GC_OPT_FLAG_DEFAULT
,
filename
);
xfree
(
filename
);
es_printf
(
"verbose:%lu:
\n
"
,
flags
|
GC_OPT_FLAG_NONE
);
es_printf
(
"quiet:%lu:
\n
"
,
flags
|
GC_OPT_FLAG_NONE
);
es_printf
(
"debug-level:%lu:
\"
none
\n
"
,
flags
|
GC_OPT_FLAG_DEFAULT
);
es_printf
(
"log-file:%lu:
\n
"
,
flags
|
GC_OPT_FLAG_NONE
);
es_printf
(
"force:%lu:
\n
"
,
flags
|
GC_OPT_FLAG_NONE
);
/* --csh and --sh are mutually exclusive, something we can not
express in GPG Conf. --options is only usable from the
command line, really. --debug-all interacts with --debug,
and having both of them is thus problematic. --no-detach is
also only usable on the command line. --batch is unused. */
filename
=
make_filename
(
opt
.
homedir
,
opt
.
system_daemon
?
"ldapservers.conf"
:
"dirmngr_ldapservers.conf"
,
NULL
);
filename_esc
=
percent_escape
(
filename
,
NULL
);
es_printf
(
"ldapserverlist-file:%lu:
\"
%s
\n
"
,
flags
|
GC_OPT_FLAG_DEFAULT
,
filename_esc
);
xfree
(
filename_esc
);
xfree
(
filename
);
es_printf
(
"ldaptimeout:%lu:%u
\n
"
,
flags
|
GC_OPT_FLAG_DEFAULT
,
DEFAULT_LDAP_TIMEOUT
);
es_printf
(
"max-replies:%lu:%u
\n
"
,
flags
|
GC_OPT_FLAG_DEFAULT
,
DEFAULT_MAX_REPLIES
);
es_printf
(
"allow-ocsp:%lu:
\n
"
,
flags
|
GC_OPT_FLAG_NONE
);
es_printf
(
"ocsp-responder:%lu:
\n
"
,
flags
|
GC_OPT_FLAG_NONE
);
es_printf
(
"ocsp-signer:%lu:
\n
"
,
flags
|
GC_OPT_FLAG_NONE
);
es_printf
(
"faked-system-time:%lu:
\n
"
,
flags
|
GC_OPT_FLAG_NONE
);
es_printf
(
"no-greeting:%lu:
\n
"
,
flags
|
GC_OPT_FLAG_NONE
);
es_printf
(
"disable-http:%lu:
\n
"
,
flags
|
GC_OPT_FLAG_NONE
);
es_printf
(
"disable-ldap:%lu:
\n
"
,
flags
|
GC_OPT_FLAG_NONE
);
es_printf
(
"honor-http-proxy:%lu
\n
"
,
flags
|
GC_OPT_FLAG_NONE
);
es_printf
(
"http-proxy:%lu:
\n
"
,
flags
|
GC_OPT_FLAG_NONE
);
es_printf
(
"ldap-proxy:%lu:
\n
"
,
flags
|
GC_OPT_FLAG_NONE
);
es_printf
(
"only-ldap-proxy:%lu:
\n
"
,
flags
|
GC_OPT_FLAG_NONE
);
es_printf
(
"ignore-ldap-dp:%lu:
\n
"
,
flags
|
GC_OPT_FLAG_NONE
);
es_printf
(
"ignore-http-dp:%lu:
\n
"
,
flags
|
GC_OPT_FLAG_NONE
);
es_printf
(
"ignore-ocsp-service-url:%lu:
\n
"
,
flags
|
GC_OPT_FLAG_NONE
);
/* Note: The next one is to fix a typo in gpgconf - should be
removed eventually. */
es_printf
(
"ignore-ocsp-servic-url:%lu:
\n
"
,
flags
|
GC_OPT_FLAG_NONE
);
es_printf
(
"use-tor:%lu:
\n
"
,
flags
|
GC_OPT_FLAG_NONE
);
es_printf
(
"keyserver:%lu:
\n
"
,
flags
|
GC_OPT_FLAG_NONE
);
}
cleanup
();
return
!!
rc
;
}
#ifdef USE_W32_SERVICE
static
void
WINAPI
call_real_main
(
DWORD
argc
,
LPSTR
*
argv
)
{
real_main
(
argc
,
argv
);
}
int
main
(
int
argc
,
char
*
argv
[])
{
int
i
;
/* Find out if we run in daemon mode or on the command line. */
for
(
i
=
1
;
i
<
argc
;
i
++
)
if
(
!
strcmp
(
argv
[
i
],
"--service"
))
{
opt
.
system_service
=
1
;
opt
.
system_daemon
=
1
;
break
;
}
if
(
!
opt
.
system_service
)
return
real_main
(
argc
,
argv
);
else
{
SERVICE_TABLE_ENTRY
DispatchTable
[]
=
{
{
"DirMngr"
,
&
call_real_main
},
{
NULL
,
NULL
}
};
if
(
!
StartServiceCtrlDispatcher
(
DispatchTable
))
return
1
;
return
0
;
}
}
#endif
/*USE_W32_SERVICE*/
static
void
cleanup
(
void
)
{
crl_cache_deinit
();
cert_cache_deinit
(
1
);
#if USE_LDAP
ldapserver_list_free
(
opt
.
ldapservers
);
#endif
/*USE_LDAP*/
opt
.
ldapservers
=
NULL
;
if
(
cleanup_socket
)
{
cleanup_socket
=
0
;
if
(
redir_socket_name
)
gnupg_remove
(
redir_socket_name
);
else
if
(
socket_name
&&
*
socket_name
)
gnupg_remove
(
socket_name
);
}
}
void
dirmngr_exit
(
int
rc
)
{
cleanup
();
exit
(
rc
);
}
void
dirmngr_init_default_ctrl
(
ctrl_t
ctrl
)
{
if
(
opt
.
http_proxy
)
ctrl
->
http_proxy
=
xstrdup
(
opt
.
http_proxy
);
}
void
dirmngr_deinit_default_ctrl
(
ctrl_t
ctrl
)
{
if
(
!
ctrl
)
return
;
xfree
(
ctrl
->
http_proxy
);
ctrl
->
http_proxy
=
NULL
;
}
/* Create a list of LDAP servers from the file FILENAME. Returns the
list or NULL in case of errors.
The format fo such a file is line oriented where empty lines and
lines starting with a hash mark are ignored. All other lines are
assumed to be colon seprated with these fields:
1. field: Hostname
2. field: Portnumber
3. field: Username
4. field: Password
5. field: Base DN
*/
#if USE_LDAP
static
ldap_server_t
parse_ldapserver_file
(
const
char
*
filename
)
{
char
buffer
[
1024
];
char
*
p
;
ldap_server_t
server
,
serverstart
,
*
serverend
;
int
c
;
unsigned
int
lineno
=
0
;
estream_t
fp
;
fp
=
es_fopen
(
filename
,
"r"
);
if
(
!
fp
)
{
log_error
(
_
(
"error opening '%s': %s
\n
"
),
filename
,
strerror
(
errno
));
return
NULL
;
}
serverstart
=
NULL
;
serverend
=
&
serverstart
;
while
(
es_fgets
(
buffer
,
sizeof
buffer
,
fp
))
{
lineno
++
;
if
(
!*
buffer
||
buffer
[
strlen
(
buffer
)
-1
]
!=
'\n'
)
{
if
(
*
buffer
&&
es_feof
(
fp
))
;
/* Last line not terminated - continue. */
else
{
log_error
(
_
(
"%s:%u: line too long - skipped
\n
"
),
filename
,
lineno
);
while
(
(
c
=
es_fgetc
(
fp
))
!=
EOF
&&
c
!=
'\n'
)
;
/* Skip until end of line. */
continue
;
}
}
/* Skip empty and comment lines.*/
for
(
p
=
buffer
;
spacep
(
p
);
p
++
)
;
if
(
!*
p
||
*
p
==
'\n'
||
*
p
==
'#'
)
continue
;
/* Parse the colon separated fields. */
server
=
ldapserver_parse_one
(
buffer
,
filename
,
lineno
);
if
(
server
)
{
*
serverend
=
server
;
serverend
=
&
server
->
next
;
}
}
if
(
es_ferror
(
fp
))
log_error
(
_
(
"error reading '%s': %s
\n
"
),
filename
,
strerror
(
errno
));
es_fclose
(
fp
);
return
serverstart
;
}
#endif
/*USE_LDAP*/
static
fingerprint_list_t
parse_ocsp_signer
(
const
char
*
string
)
{
gpg_error_t
err
;
char
*
fname
;
estream_t
fp
;
char
line
[
256
];
char
*
p
;
fingerprint_list_t
list
,
*
list_tail
,
item
;
unsigned
int
lnr
=
0
;
int
c
,
i
,
j
;
int
errflag
=
0
;
/* Check whether this is not a filename and treat it as a direct
fingerprint specification. */
if
(
!
strpbrk
(
string
,
"/.~
\\
"
))
{
item
=
xcalloc
(
1
,
sizeof
*
item
);
for
(
i
=
j
=
0
;
(
string
[
i
]
==
':'
||
hexdigitp
(
string
+
i
))
&&
j
<
40
;
i
++
)
if
(
string
[
i
]
!=
':'
)
item
->
hexfpr
[
j
++
]
=
string
[
i
]
>=
'a'
?
(
string
[
i
]
&
0xdf
)
:
string
[
i
];
item
->
hexfpr
[
j
]
=
0
;
if
(
j
!=
40
||
!
(
spacep
(
string
+
i
)
||
!
string
[
i
]))
{
log_error
(
_
(
"%s:%u: invalid fingerprint detected
\n
"
),
"--ocsp-signer"
,
0
);
xfree
(
item
);
return
NULL
;
}
return
item
;
}
/* Well, it is a filename. */
if
(
*
string
==
'/'
||
(
*
string
==
'~'
&&
string
[
1
]
==
'/'
))
fname
=
make_filename
(
string
,
NULL
);
else
{
if
(
string
[
0
]
==
'.'
&&
string
[
1
]
==
'/'
)
string
+=
2
;
fname
=
make_filename
(
opt
.
homedir
,
string
,
NULL
);
}
fp
=
es_fopen
(
fname
,
"r"
);
if
(
!
fp
)
{
err
=
gpg_error_from_syserror
();
log_error
(
_
(
"can't open '%s': %s
\n
"
),
fname
,
gpg_strerror
(
err
));
xfree
(
fname
);
return
NULL
;
}
list
=
NULL
;
list_tail
=
&
list
;
for
(;;)
{
if
(
!
es_fgets
(
line
,
DIM
(
line
)
-1
,
fp
)
)
{
if
(
!
es_feof
(
fp
))
{
err
=
gpg_error_from_syserror
();
log_error
(
_
(
"%s:%u: read error: %s
\n
"
),
fname
,
lnr
,
gpg_strerror
(
err
));
errflag
=
1
;
}
es_fclose
(
fp
);
if
(
errflag
)
{
while
(
list
)
{
fingerprint_list_t
tmp
=
list
->
next
;
xfree
(
list
);
list
=
tmp
;
}
}
xfree
(
fname
);
return
list
;
/* Ready. */
}
lnr
++
;
if
(
!*
line
||
line
[
strlen
(
line
)
-1
]
!=
'\n'
)
{
/* Eat until end of line. */
while
(
(
c
=
es_getc
(
fp
))
!=
EOF
&&
c
!=
'\n'
)
;
err
=
gpg_error
(
*
line
?
GPG_ERR_LINE_TOO_LONG
/* */
:
GPG_ERR_INCOMPLETE_LINE
);
log_error
(
_
(
"%s:%u: read error: %s
\n
"
),
fname
,
lnr
,
gpg_strerror
(
err
));
errflag
=
1
;
continue
;
}
/* Allow for empty lines and spaces */
for
(
p
=
line
;
spacep
(
p
);
p
++
)
;
if
(
!*
p
||
*
p
==
'\n'
||
*
p
==
'#'
)
continue
;
item
=
xcalloc
(
1
,
sizeof
*
item
);
*
list_tail
=
item
;
list_tail
=
&
item
->
next
;
for
(
i
=
j
=
0
;
(
p
[
i
]
==
':'
||
hexdigitp
(
p
+
i
))
&&
j
<
40
;
i
++
)
if
(
p
[
i
]
!=
':'
)
item
->
hexfpr
[
j
++
]
=
p
[
i
]
>=
'a'
?
(
p
[
i
]
&
0xdf
)
:
p
[
i
];
item
->
hexfpr
[
j
]
=
0
;
if
(
j
!=
40
||
!
(
spacep
(
p
+
i
)
||
p
[
i
]
==
'\n'
))
{
log_error
(
_
(
"%s:%u: invalid fingerprint detected
\n
"
),
fname
,
lnr
);
errflag
=
1
;
}
i
++
;
while
(
spacep
(
p
+
i
))
i
++
;
if
(
p
[
i
]
&&
p
[
i
]
!=
'\n'
)
log_info
(
_
(
"%s:%u: garbage at end of line ignored
\n
"
),
fname
,
lnr
);
}
/*NOTREACHED*/
}
/*
Stuff used in daemon mode.
*/
/* Reread parts of the configuration. Note, that this function is
obviously not thread-safe and should only be called from the NPTH
signal handler.
Fixme: Due to the way the argument parsing works, we create a
memory leak here for all string type arguments. There is currently
no clean way to tell whether the memory for the argument has been
allocated or points into the process' original arguments. Unless
we have a mechanism to tell this, we need to live on with this. */
static
void
reread_configuration
(
void
)
{
ARGPARSE_ARGS
pargs
;
FILE
*
fp
;
unsigned
int
configlineno
=
0
;
int
dummy
;
if
(
!
opt
.
config_filename
)
return
;
/* No config file. */
fp
=
fopen
(
opt
.
config_filename
,
"r"
);
if
(
!
fp
)
{
log_error
(
_
(
"option file '%s': %s
\n
"
),
opt
.
config_filename
,
strerror
(
errno
)
);
return
;
}
parse_rereadable_options
(
NULL
,
1
);
/* Start from the default values. */
memset
(
&
pargs
,
0
,
sizeof
pargs
);
dummy
=
0
;
pargs
.
argc
=
&
dummy
;
pargs
.
flags
=
1
;
/* do not remove the args */
while
(
optfile_parse
(
fp
,
opt
.
config_filename
,
&
configlineno
,
&
pargs
,
opts
)
)
{
if
(
pargs
.
r_opt
<
-1
)
pargs
.
err
=
1
;
/* Print a warning. */
else
/* Try to parse this option - ignore unchangeable ones. */
parse_rereadable_options
(
&
pargs
,
1
);
}
fclose
(
fp
);
set_debug
();
set_tor_mode
();
}
/* A global function which allows us to trigger the reload stuff from
other places. */
void
dirmngr_sighup_action
(
void
)
{
log_info
(
_
(
"SIGHUP received - "
"re-reading configuration and flushing caches
\n
"
));
reread_configuration
();
cert_cache_deinit
(
0
);
crl_cache_deinit
();
cert_cache_init
();
crl_cache_init
();
}
/* The signal handler. */
#ifndef HAVE_W32_SYSTEM
static
void
handle_signal
(
int
signo
)
{
switch
(
signo
)
{
case
SIGHUP
:
dirmngr_sighup_action
();
break
;
case
SIGUSR1
:
cert_cache_print_stats
();
break
;
case
SIGUSR2
:
log_info
(
_
(
"SIGUSR2 received - no action defined
\n
"
));
break
;
case
SIGTERM
:
if
(
!
shutdown_pending
)
log_info
(
_
(
"SIGTERM received - shutting down ...
\n
"
));
else
log_info
(
_
(
"SIGTERM received - still %d active connections
\n
"
),
active_connections
);
shutdown_pending
++
;
if
(
shutdown_pending
>
2
)
{
log_info
(
_
(
"shutdown forced
\n
"
));
log_info
(
"%s %s stopped
\n
"
,
strusage
(
11
),
strusage
(
13
)
);
cleanup
();
dirmngr_exit
(
0
);
}
break
;
case
SIGINT
:
log_info
(
_
(
"SIGINT received - immediate shutdown
\n
"
));
log_info
(
"%s %s stopped
\n
"
,
strusage
(
11
),
strusage
(
13
));
cleanup
();
dirmngr_exit
(
0
);
break
;
default
:
log_info
(
_
(
"signal %d received - no action defined
\n
"
),
signo
);
}
}
#endif
/*!HAVE_W32_SYSTEM*/
/* Thread to do the housekeeping. */
static
void
*
housekeeping_thread
(
void
*
arg
)
{
static
int
sentinel
;
time_t
curtime
;
(
void
)
arg
;
curtime
=
gnupg_get_time
();
if
(
sentinel
)
{
log_info
(
"housekeeping is already going on
\n
"
);
return
NULL
;
}
sentinel
++
;
if
(
opt
.
verbose
)
log_info
(
"starting housekeeping
\n
"
);
ks_hkp_housekeeping
(
curtime
);
if
(
opt
.
verbose
)
log_info
(
"ready with housekeeping
\n
"
);
sentinel
--
;
return
NULL
;
}
#if GPGRT_GCC_HAVE_PUSH_PRAGMA
# pragma GCC push_options
# pragma GCC optimize ("no-strict-overflow")
#endif
static
int
time_for_housekeeping_p
(
time_t
curtime
)
{
static
time_t
last_housekeeping
;
if
(
!
last_housekeeping
)
last_housekeeping
=
curtime
;
if
(
last_housekeeping
+
HOUSEKEEPING_INTERVAL
<=
curtime
||
last_housekeeping
>
curtime
/*(be prepared for y2038)*/
)
{
last_housekeeping
=
curtime
;
return
1
;
}
return
0
;
}
#if GPGRT_GCC_HAVE_PUSH_PRAGMA
# pragma GCC pop_options
#endif
/* This is the worker for the ticker. It is called every few seconds
and may only do fast operations. */
static
void
handle_tick
(
void
)
{
/* Under Windows we don't use signals and need a way for the loop to
check for the shutdown flag. */
#ifdef HAVE_W32_SYSTEM
if
(
shutdown_pending
)
log_info
(
_
(
"SIGTERM received - shutting down ...
\n
"
));
if
(
shutdown_pending
>
2
)
{
log_info
(
_
(
"shutdown forced
\n
"
));
log_info
(
"%s %s stopped
\n
"
,
strusage
(
11
),
strusage
(
13
)
);
cleanup
();
dirmngr_exit
(
0
);
}
#endif
/*HAVE_W32_SYSTEM*/
if
(
time_for_housekeeping_p
(
gnupg_get_time
()))
{
npth_t
thread
;
npth_attr_t
tattr
;
int
err
;
err
=
npth_attr_init
(
&
tattr
);
if
(
err
)
log_error
(
"error preparing housekeeping thread: %s
\n
"
,
strerror
(
err
));
else
{
npth_attr_setdetachstate
(
&
tattr
,
NPTH_CREATE_DETACHED
);
err
=
npth_create
(
&
thread
,
&
tattr
,
housekeeping_thread
,
NULL
);
if
(
err
)
log_error
(
"error spawning housekeeping thread: %s
\n
"
,
strerror
(
err
));
npth_attr_destroy
(
&
tattr
);
}
}
}
/* Check the nonce on a new connection. This is a NOP unless we are
using our Unix domain socket emulation under Windows. */
static
int
check_nonce
(
assuan_fd_t
fd
,
assuan_sock_nonce_t
*
nonce
)
{
if
(
assuan_sock_check_nonce
(
fd
,
nonce
))
{
log_info
(
_
(
"error reading nonce on fd %d: %s
\n
"
),
FD2INT
(
fd
),
strerror
(
errno
));
assuan_sock_close
(
fd
);
return
-1
;
}
else
return
0
;
}
/* Helper to call a connection's main function. */
static
void
*
start_connection_thread
(
void
*
arg
)
{
union
int_and_ptr_u
argval
;
gnupg_fd_t
fd
;
memset
(
&
argval
,
0
,
sizeof
argval
);
argval
.
aptr
=
arg
;
fd
=
argval
.
afd
;
if
(
check_nonce
(
fd
,
&
socket_nonce
))
{
log_error
(
"handler nonce check FAILED
\n
"
);
return
NULL
;
}
#ifndef HAVE_W32_SYSTEM
npth_setspecific
(
my_tlskey_current_fd
,
argval
.
aptr
);
#endif
active_connections
++
;
if
(
opt
.
verbose
)
log_info
(
_
(
"handler for fd %d started
\n
"
),
FD2INT
(
fd
));
start_command_handler
(
fd
);
if
(
opt
.
verbose
)
log_info
(
_
(
"handler for fd %d terminated
\n
"
),
FD2INT
(
fd
));
active_connections
--
;
#ifndef HAVE_W32_SYSTEM
argval
.
afd
=
ASSUAN_INVALID_FD
;
npth_setspecific
(
my_tlskey_current_fd
,
argval
.
aptr
);
#endif
return
NULL
;
}
/* Main loop in daemon mode. */
static
void
handle_connections
(
assuan_fd_t
listen_fd
)
{
npth_attr_t
tattr
;
#ifndef HAVE_W32_SYSTEM
int
signo
;
#endif
struct
sockaddr_un
paddr
;
socklen_t
plen
=
sizeof
(
paddr
);
gnupg_fd_t
fd
;
int
nfd
,
ret
;
fd_set
fdset
,
read_fdset
;
struct
timespec
abstime
;
struct
timespec
curtime
;
struct
timespec
timeout
;
int
saved_errno
;
npth_attr_init
(
&
tattr
);
npth_attr_setdetachstate
(
&
tattr
,
NPTH_CREATE_DETACHED
);
#ifndef HAVE_W32_SYSTEM
/* FIXME */
npth_sigev_init
();
npth_sigev_add
(
SIGHUP
);
npth_sigev_add
(
SIGUSR1
);
npth_sigev_add
(
SIGUSR2
);
npth_sigev_add
(
SIGINT
);
npth_sigev_add
(
SIGTERM
);
npth_sigev_fini
();
#endif
/* Setup the fdset. It has only one member. This is because we use
pth_select instead of pth_accept to properly sync timeouts with
to full second. */
FD_ZERO
(
&
fdset
);
FD_SET
(
FD2INT
(
listen_fd
),
&
fdset
);
nfd
=
FD2INT
(
listen_fd
);
npth_clock_gettime
(
&
abstime
);
abstime
.
tv_sec
+=
TIMERTICK_INTERVAL
;
/* Main loop. */
for
(;;)
{
/* Shutdown test. */
if
(
shutdown_pending
)
{
if
(
!
active_connections
)
break
;
/* ready */
/* Do not accept new connections but keep on running the
loop to cope with the timer events. */
FD_ZERO
(
&
fdset
);
}
/* Take a copy of the fdset. */
read_fdset
=
fdset
;
npth_clock_gettime
(
&
curtime
);
if
(
!
(
npth_timercmp
(
&
curtime
,
&
abstime
,
<
)))
{
/* Timeout. */
handle_tick
();
npth_clock_gettime
(
&
abstime
);
abstime
.
tv_sec
+=
TIMERTICK_INTERVAL
;
}
npth_timersub
(
&
abstime
,
&
curtime
,
&
timeout
);
#ifndef HAVE_W32_SYSTEM
ret
=
npth_pselect
(
nfd
+
1
,
&
read_fdset
,
NULL
,
NULL
,
&
timeout
,
npth_sigev_sigmask
());
saved_errno
=
errno
;
while
(
npth_sigev_get_pending
(
&
signo
))
handle_signal
(
signo
);
#else
ret
=
npth_eselect
(
nfd
+
1
,
&
read_fdset
,
NULL
,
NULL
,
&
timeout
,
NULL
,
NULL
);
saved_errno
=
errno
;
#endif
if
(
ret
==
-1
&&
saved_errno
!=
EINTR
)
{
log_error
(
_
(
"npth_pselect failed: %s - waiting 1s
\n
"
),
strerror
(
saved_errno
));
npth_sleep
(
1
);
continue
;
}
if
(
ret
<=
0
)
/* Interrupt or timeout. Will be handled when calculating the
next timeout. */
continue
;
if
(
!
shutdown_pending
&&
FD_ISSET
(
FD2INT
(
listen_fd
),
&
read_fdset
))
{
plen
=
sizeof
paddr
;
fd
=
INT2FD
(
npth_accept
(
FD2INT
(
listen_fd
),
(
struct
sockaddr
*
)
&
paddr
,
&
plen
));
if
(
fd
==
GNUPG_INVALID_FD
)
{
log_error
(
"accept failed: %s
\n
"
,
strerror
(
errno
));
}
else
{
char
threadname
[
50
];
union
int_and_ptr_u
argval
;
npth_t
thread
;
memset
(
&
argval
,
0
,
sizeof
argval
);
argval
.
afd
=
fd
;
snprintf
(
threadname
,
sizeof
threadname
-1
,
"conn fd=%d"
,
FD2INT
(
fd
));
threadname
[
sizeof
threadname
-1
]
=
0
;
ret
=
npth_create
(
&
thread
,
&
tattr
,
start_connection_thread
,
argval
.
aptr
);
if
(
ret
)
{
log_error
(
"error spawning connection handler: %s
\n
"
,
strerror
(
ret
)
);
assuan_sock_close
(
fd
);
}
npth_setname_np
(
thread
,
threadname
);
}
fd
=
GNUPG_INVALID_FD
;
}
}
npth_attr_destroy
(
&
tattr
);
cleanup
();
log_info
(
"%s %s stopped
\n
"
,
strusage
(
11
),
strusage
(
13
));
}
File Metadata
Details
Attached
Mime Type
text/x-c
Expires
Sun, Feb 23, 7:54 PM (1 h, 16 m)
Storage Engine
local-disk
Storage Format
Raw Data
Storage Handle
5d/8d/5fa1fc1957e1d6b0930ff6fe2157
Attached To
rG GnuPG
Event Timeline
Log In to Comment