diff --git a/src/gpgme-tool.c b/src/gpgme-tool.c index b05664e3..e45ea12d 100644 --- a/src/gpgme-tool.c +++ b/src/gpgme-tool.c @@ -1,3442 +1,3443 @@ /* gpgme-tool.c - Assuan server exposing GnuPG Made Easy operations. * Copyright (C) 2009, 2010, 2012, 2013 g10 Code GmbH * Copyright (C) 2001, 2003, 2009, 2011 Free Software Foundation, Inc. * * This file is part of GPGME. * * GPGME is free software; you can redistribute this file and/or modify it * under the terms of the GNU General Public License as published by * the Free Software Foundation; either version 3 of the License, or * (at your option) any later version. * * GPGME is distributed in the hope that it will be useful, but * WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU * Lesser General Public License for more details. * * You should have received a copy of the GNU General Public License * along with this program; if not, see . * SPDX-License-Identifier: GPL-3.0-or-later */ #if HAVE_CONFIG_H #include #endif #include #include #include #include #include #include #include #ifdef HAVE_LOCALE_H #include #endif #include #include "argparse.h" #include "gpgme.h" /* GCC attributes. */ #if __GNUC__ >= 4 # define GT_GCC_A_SENTINEL(a) __attribute__ ((sentinel(a))) #else # define GT_GCC_A_SENTINEL(a) #endif #if __GNUC__ > 2 || (__GNUC__ == 2 && __GNUC_MINOR__ >= 5 ) # define GT_GCC_A_PRINTF(f, a) __attribute__ ((format (printf,f,a))) #else # define GT_GCC_A_PRINTF(f, a) #endif #define DIM(v) (sizeof(v)/sizeof((v)[0])) #define xtoi_1(p) (*(p) <= '9'? (*(p)- '0'): \ *(p) <= 'F'? (*(p)-'A'+10):(*(p)-'a'+10)) #define xtoi_2(p) ((xtoi_1(p) * 16) + xtoi_1((p)+1)) /* MEMBUF */ /* A simple implementation of a dynamic buffer. Use init_membuf() to create a buffer, put_membuf to append bytes and get_membuf to release and return the buffer. Allocation errors are detected but only returned at the final get_membuf(), this helps not to clutter the code with out-of-core checks. */ /* The definition of the structure is private, we only need it here, so it can be allocated on the stack. */ struct private_membuf_s { size_t len; size_t size; char *buf; int out_of_core; }; typedef struct private_membuf_s membuf_t; /* Return the current length of the membuf. */ #define get_membuf_len(a) ((a)->len) #define is_membuf_ready(a) ((a)->buf || (a)->out_of_core) #define MEMBUF_ZERO { 0, 0, NULL, 0} static void init_membuf (membuf_t *mb, int initiallen) { mb->len = 0; mb->size = initiallen; mb->out_of_core = 0; mb->buf = malloc (initiallen); if (!mb->buf) mb->out_of_core = errno; } /* Shift the the content of the membuf MB by AMOUNT bytes. The next operation will then behave as if AMOUNT bytes had not been put into the buffer. If AMOUNT is greater than the actual accumulated bytes, the membuf is basically reset to its initial state. */ #if 0 /* Not yet used. */ static void clear_membuf (membuf_t *mb, size_t amount) { /* No need to clear if we are already out of core. */ if (mb->out_of_core) return; if (amount >= mb->len) mb->len = 0; else { mb->len -= amount; memmove (mb->buf, mb->buf+amount, mb->len); } } #endif /* unused */ static void put_membuf (membuf_t *mb, const void *buf, size_t len) { if (mb->out_of_core || !len) return; if (mb->len + len >= mb->size) { char *p; mb->size += len + 1024; p = realloc (mb->buf, mb->size); if (!p) { mb->out_of_core = errno ? errno : ENOMEM; return; } mb->buf = p; } memcpy (mb->buf + mb->len, buf, len); mb->len += len; } #if 0 /* Not yet used. */ static void put_membuf_str (membuf_t *mb, const char *string) { put_membuf (mb, string, strlen (string)); } #endif /* unused */ static void * get_membuf (membuf_t *mb, size_t *len) { char *p; if (mb->out_of_core) { if (mb->buf) { free (mb->buf); mb->buf = NULL; } gpg_err_set_errno (mb->out_of_core); return NULL; } p = mb->buf; if (len) *len = mb->len; mb->buf = NULL; mb->out_of_core = ENOMEM; /* hack to make sure it won't get reused. */ return p; } /* Peek at the membuf MB. On success a pointer to the buffer is returned which is valid until the next operation on MB. If LEN is not NULL the current LEN of the buffer is stored there. On error NULL is returned and ERRNO is set. */ #if 0 /* Not yet used. */ static const void * peek_membuf (membuf_t *mb, size_t *len) { const char *p; if (mb->out_of_core) { gpg_err_set_errno (mb->out_of_core); return NULL; } p = mb->buf; if (len) *len = mb->len; return p; } #endif /* unused */ /* SUPPORT. */ FILE *log_stream; char program_name[] = "gpgme-tool"; #define spacep(p) (*(p) == ' ' || *(p) == '\t') void log_error (int status, gpg_error_t errnum, const char *fmt, ...) GT_GCC_A_PRINTF(3,4); void log_init (void) { log_stream = stderr; } void log_error (int status, gpg_error_t errnum, const char *fmt, ...) { va_list ap; fprintf (log_stream, "%s: ", program_name); va_start (ap, fmt); vfprintf (log_stream, fmt, ap); va_end (ap); if (errnum) { fprintf (log_stream, ": %s", gpg_strerror (errnum)); if (gpg_err_source (errnum) != GPG_ERR_SOURCE_GPGME) fprintf (log_stream, " <%s>", gpg_strsource (errnum)); } fprintf (log_stream, "\n"); if (status) exit (status); } /* Note that it is sufficient to allocate the target string D as long as the source string S, i.e.: strlen(s)+1;. D == S is allowed. */ static void strcpy_escaped_plus (char *d, const char *s) { while (*s) { if (*s == '%' && s[1] && s[2]) { s++; *d++ = xtoi_2 (s); s += 2; } else if (*s == '+') *d++ = ' ', s++; else *d++ = *s++; } *d = 0; } /* Check whether the option NAME appears in LINE. */ static int has_option (const char *line, const char *name) { const char *s; int n = strlen (name); s = strstr (line, name); return (s && (s == line || spacep (s-1)) && (!s[n] || spacep (s+n))); } /* Skip over options. It is assumed that leading spaces have been removed (this is the case for lines passed to a handler from assuan). Blanks after the options are also removed. */ static char * skip_options (char *line) { while ( *line == '-' && line[1] == '-' ) { while (*line && !spacep (line)) line++; while (spacep (line)) line++; } return line; } typedef gpg_error_t (*result_xml_write_cb_t) (void *hook, const void *buf, size_t len); static char xml_preamble1[] = "\n"; static const char xml_preamble2[] = "\n"; static const char xml_end[] = "\n"; struct result_xml_state { int indent; result_xml_write_cb_t cb; void *hook; #define MAX_TAGS 20 int next_tag; const char *tag[MAX_TAGS]; int had_data[MAX_TAGS]; }; void result_init (struct result_xml_state *state, int indent, result_xml_write_cb_t cb, void *hook) { memset (state, '\0', sizeof (*state)); state->indent = indent; state->cb = cb; state->hook = hook; } gpg_error_t result_xml_indent (struct result_xml_state *state) { char spaces[state->indent + 1]; int i; for (i = 0; i < state->indent; i++) spaces[i] = ' '; spaces[i] = '\0'; return (*state->cb) (state->hook, spaces, i); } gpg_error_t result_xml_tag_start (struct result_xml_state *state, const char *name, ...) { result_xml_write_cb_t cb = state->cb; void *hook = state->hook; va_list ap; char *attr; char *attr_val; char string_null[] = "(null)"; va_start (ap, name); if (state->next_tag > 0) { if (! state->had_data[state->next_tag - 1]) { (*cb) (hook, ">\n", 2); (*cb) (hook, NULL, 0); } state->had_data[state->next_tag - 1] = 1; } result_xml_indent (state); (*cb) (hook, "<", 1); (*cb) (hook, name, strlen (name)); state->tag[state->next_tag] = name; state->had_data[state->next_tag] = 0; state->indent += 2; state->next_tag++; while (1) { attr = va_arg (ap, char *); if (attr == NULL) break; attr_val = va_arg (ap, char *); if (attr_val == NULL) attr_val = string_null; (*cb) (hook, " ", 1); (*cb) (hook, attr, strlen (attr)); (*cb) (hook, "=\"", 2); (*cb) (hook, attr_val, strlen (attr_val)); (*cb) (hook, "\"", 1); } va_end (ap); return 0; } /* Return a constant string with an XML entity for C. */ static const char * result_xml_escape_replacement(char c) { switch (c) { case '<': return "<"; case '>': return ">"; case '&': return "&"; default: return NULL; } } /* Escape DATA by replacing certain characters with their XML entities. The result is stored in a newly allocated buffer which address will be stored at BUF. Returns 0 on success. */ static gpg_error_t result_xml_escape (const char *data, char **buf) { int data_len, i; const char *r; membuf_t mb; init_membuf (&mb, 128); if (data) { data_len = strlen (data); for (i = 0; i < data_len; i++) { r = result_xml_escape_replacement (data[i]); if (r) put_membuf (&mb, r, strlen (r)); else put_membuf (&mb, data+i, 1); } } put_membuf (&mb, "", 1); *buf = get_membuf (&mb, NULL); return *buf? 0 : gpg_error_from_syserror (); } gpg_error_t result_xml_tag_data (struct result_xml_state *state, const char *data) { gpg_error_t err; result_xml_write_cb_t cb = state->cb; void *hook = state->hook; char *buf = NULL; if (state->had_data[state->next_tag - 1]) { (*cb) (hook, "\n", 2); (*cb) (hook, NULL, 0); result_xml_indent (state); } else (*cb) (hook, ">", 1); state->had_data[state->next_tag - 1] = 2; err = result_xml_escape (data, &buf); if (err) return err; (*cb) (hook, buf, strlen (buf)); free (buf); return 0; } gpg_error_t result_xml_tag_end (struct result_xml_state *state) { result_xml_write_cb_t cb = state->cb; void *hook = state->hook; state->next_tag--; state->indent -= 2; if (state->had_data[state->next_tag]) { if (state->had_data[state->next_tag] == 1) result_xml_indent (state); (*cb) (hook, "tag[state->next_tag], strlen (state->tag[state->next_tag])); (*cb) (hook, ">\n", 2); (*cb) (hook, NULL, 0); } else { (*cb) (hook, " />\n", 4); (*cb) (hook, NULL, 0); } return 0; } gpg_error_t result_add_error (struct result_xml_state *state, const char *name, gpg_error_t err) { char code[20]; char msg[1024]; snprintf (code, sizeof (code) - 1, "0x%x", err); snprintf (msg, sizeof (msg) - 1, "%s <%s>", gpg_strerror (err), gpg_strsource (err)); result_xml_tag_start (state, name, "value", code, NULL); result_xml_tag_data (state, msg); result_xml_tag_end (state); return 0; } gpg_error_t result_add_pubkey_algo (struct result_xml_state *state, const char *name, gpgme_pubkey_algo_t algo) { char code[20]; char msg[80]; snprintf (code, sizeof (code) - 1, "0x%x", algo); snprintf (msg, sizeof (msg) - 1, "%s", gpgme_pubkey_algo_name (algo)); result_xml_tag_start (state, name, "value", code, NULL); result_xml_tag_data (state, msg); result_xml_tag_end (state); return 0; } gpg_error_t result_add_hash_algo (struct result_xml_state *state, const char *name, gpgme_hash_algo_t algo) { char code[20]; char msg[80]; snprintf (code, sizeof (code) - 1, "0x%x", algo); snprintf (msg, sizeof (msg) - 1, "%s", gpgme_hash_algo_name (algo)); result_xml_tag_start (state, name, "value", code, NULL); result_xml_tag_data (state, msg); result_xml_tag_end (state); return 0; } gpg_error_t result_add_keyid (struct result_xml_state *state, const char *name, const char *keyid) { result_xml_tag_start (state, name, NULL); result_xml_tag_data (state, keyid); result_xml_tag_end (state); return 0; } gpg_error_t result_add_fpr (struct result_xml_state *state, const char *name, const char *fpr) { result_xml_tag_start (state, name, NULL); result_xml_tag_data (state, fpr); result_xml_tag_end (state); return 0; } gpg_error_t result_add_timestamp (struct result_xml_state *state, const char *name, unsigned int timestamp) { char code[20]; snprintf (code, sizeof (code) - 1, "%ui", timestamp); result_xml_tag_start (state, name, "unix", code, NULL); result_xml_tag_end (state); return 0; } gpg_error_t result_add_sig_mode (struct result_xml_state *state, const char *name, gpgme_sig_mode_t sig_mode) { const char *mode; char code[20]; snprintf (code, sizeof (code) - 1, "%i", sig_mode); switch (sig_mode) { case GPGME_SIG_MODE_NORMAL: mode = "normal"; break; case GPGME_SIG_MODE_DETACH: mode = "detach"; break; case GPGME_SIG_MODE_CLEAR: mode = "clear"; break; default: mode = "unknown"; } result_xml_tag_start (state, name, "type", mode, "value", code, NULL); result_xml_tag_data (state, mode); result_xml_tag_end (state); return 0; } gpg_error_t result_add_protocol (struct result_xml_state *state, const char *name, gpgme_protocol_t protocol) { const char *str; char code[20]; snprintf (code, sizeof (code) - 1, "%i", protocol); str = gpgme_get_protocol_name(protocol); if (!str) str = "invalid"; result_xml_tag_start (state, name, "value", code, NULL); result_xml_tag_data (state, str); result_xml_tag_end (state); return 0; } gpg_error_t result_add_validity (struct result_xml_state *state, const char *name, gpgme_validity_t validity) { const char *str; char code[20]; snprintf (code, sizeof (code) - 1, "%i", validity); switch (validity) { case GPGME_VALIDITY_UNDEFINED: str ="undefined"; break; case GPGME_VALIDITY_NEVER: str ="never"; break; case GPGME_VALIDITY_MARGINAL: str ="marginal"; break; case GPGME_VALIDITY_FULL: str ="full"; break; case GPGME_VALIDITY_ULTIMATE: str ="ultimate"; break; default: str ="unknown"; } result_xml_tag_start (state, name, "value", code, NULL); result_xml_tag_data (state, str); result_xml_tag_end (state); return 0; } gpg_error_t result_add_value (struct result_xml_state *state, const char *name, unsigned int val) { char code[20]; snprintf (code, sizeof (code) - 1, "0x%x", val); result_xml_tag_start (state, name, "value", code, NULL); result_xml_tag_end (state); return 0; } gpg_error_t result_add_string (struct result_xml_state *state, const char *name, const char *str) { if (!str) str = ""; result_xml_tag_start (state, name, NULL); result_xml_tag_data (state, str); result_xml_tag_end (state); return 0; } gpg_error_t result_encrypt_to_xml (gpgme_ctx_t ctx, int indent, result_xml_write_cb_t cb, void *hook) { struct result_xml_state state; gpgme_encrypt_result_t res = gpgme_op_encrypt_result (ctx); gpgme_invalid_key_t inv_recp; if (! res) return 0; result_init (&state, indent, cb, hook); result_xml_tag_start (&state, "encrypt-result", NULL); inv_recp = res->invalid_recipients; if (inv_recp) { result_xml_tag_start (&state, "invalid-recipients", NULL); while (inv_recp) { result_xml_tag_start (&state, "invalid-key", NULL); if (inv_recp->fpr) result_add_fpr (&state, "fpr", inv_recp->fpr); result_add_error (&state, "reason", inv_recp->reason); result_xml_tag_end (&state); inv_recp = inv_recp->next; } result_xml_tag_end (&state); } result_xml_tag_end (&state); return 0; } gpg_error_t result_decrypt_to_xml (gpgme_ctx_t ctx, int indent, result_xml_write_cb_t cb, void *hook) { struct result_xml_state state; gpgme_decrypt_result_t res = gpgme_op_decrypt_result (ctx); gpgme_recipient_t recp; if (! res) return 0; result_init (&state, indent, cb, hook); result_xml_tag_start (&state, "decrypt-result", NULL); if (res->file_name) { result_xml_tag_start (&state, "file-name", NULL); result_xml_tag_data (&state, res->file_name); result_xml_tag_end (&state); } if (res->unsupported_algorithm) { result_xml_tag_start (&state, "unsupported-alogorithm", NULL); result_xml_tag_data (&state, res->unsupported_algorithm); result_xml_tag_end (&state); } if (res->wrong_key_usage) { result_xml_tag_start (&state, "wrong-key-usage", NULL); result_xml_tag_end (&state); } recp = res->recipients; if (recp) { result_xml_tag_start (&state, "recipients", NULL); while (recp) { result_xml_tag_start (&state, "recipient", NULL); result_add_keyid (&state, "keyid", recp->keyid); result_add_pubkey_algo (&state, "pubkey-algo", recp->pubkey_algo); result_add_error (&state, "status", recp->status); result_xml_tag_end (&state); recp = recp->next; } result_xml_tag_end (&state); } result_xml_tag_end (&state); return 0; } gpg_error_t result_sign_to_xml (gpgme_ctx_t ctx, int indent, result_xml_write_cb_t cb, void *hook) { struct result_xml_state state; gpgme_sign_result_t res = gpgme_op_sign_result (ctx); gpgme_invalid_key_t inv_key; gpgme_new_signature_t new_sig; if (! res) return 0; result_init (&state, indent, cb, hook); result_xml_tag_start (&state, "sign-result", NULL); inv_key = res->invalid_signers; if (inv_key) { result_xml_tag_start (&state, "invalid-signers", NULL); while (inv_key) { result_xml_tag_start (&state, "invalid-key", NULL); if (inv_key->fpr) result_add_fpr (&state, "fpr", inv_key->fpr); result_add_error (&state, "reason", inv_key->reason); result_xml_tag_end (&state); inv_key = inv_key->next; } result_xml_tag_end (&state); } new_sig = res->signatures; if (new_sig) { result_xml_tag_start (&state, "signatures", NULL); while (new_sig) { result_xml_tag_start (&state, "new-signature", NULL); result_add_sig_mode (&state, "type", new_sig->type); result_add_pubkey_algo (&state, "pubkey-algo", new_sig->pubkey_algo); result_add_hash_algo (&state, "hash-algo", new_sig->hash_algo); result_add_timestamp (&state, "timestamp", new_sig->timestamp); if (new_sig->fpr) result_add_fpr (&state, "fpr", new_sig->fpr); result_add_value (&state, "sig-class", new_sig->sig_class); result_xml_tag_end (&state); new_sig = new_sig->next; } result_xml_tag_end (&state); } result_xml_tag_end (&state); return 0; } gpg_error_t result_verify_to_xml (gpgme_ctx_t ctx, int indent, result_xml_write_cb_t cb, void *hook) { struct result_xml_state state; gpgme_verify_result_t res = gpgme_op_verify_result (ctx); gpgme_signature_t sig; if (! res) return 0; result_init (&state, indent, cb, hook); result_xml_tag_start (&state, "verify-result", NULL); if (res->file_name) { result_xml_tag_start (&state, "file-name", NULL); result_xml_tag_data (&state, res->file_name); result_xml_tag_end (&state); } sig = res->signatures; if (sig) { result_xml_tag_start (&state, "signatures", NULL); while (sig) { result_xml_tag_start (&state, "signature", NULL); /* FIXME: Could be done better. */ result_add_value (&state, "summary", sig->summary); if (sig->fpr) result_add_fpr (&state, "fpr", sig->fpr); result_add_error (&state, "status", sig->status); /* FIXME: notations */ result_add_timestamp (&state, "timestamp", sig->timestamp); result_add_timestamp (&state, "exp-timestamp", sig->exp_timestamp); result_add_value (&state, "wrong-key-usage", sig->wrong_key_usage); result_add_value (&state, "pka-trust", sig->pka_trust); result_add_value (&state, "chain-model", sig->chain_model); result_add_value (&state, "validity", sig->validity); result_add_error (&state, "validity-reason", sig->validity_reason); result_add_pubkey_algo (&state, "pubkey-algo", sig->pubkey_algo); result_add_hash_algo (&state, "hash-algo", sig->hash_algo); if (sig->pka_address) result_add_string (&state, "pka_address", sig->pka_address); result_xml_tag_end (&state); sig = sig->next; } result_xml_tag_end (&state); } result_xml_tag_end (&state); return 0; } gpg_error_t result_import_to_xml (gpgme_ctx_t ctx, int indent, result_xml_write_cb_t cb, void *hook) { struct result_xml_state state; gpgme_import_result_t res = gpgme_op_import_result (ctx); gpgme_import_status_t stat; if (! res) return 0; result_init (&state, indent, cb, hook); result_xml_tag_start (&state, "import-result", NULL); result_add_value (&state, "considered", res->considered); result_add_value (&state, "no-user-id", res->no_user_id); result_add_value (&state, "imported", res->imported); result_add_value (&state, "imported-rsa", res->imported_rsa); result_add_value (&state, "unchanged", res->unchanged); result_add_value (&state, "new-user-ids", res->new_user_ids); result_add_value (&state, "new-sub-keys", res->new_sub_keys); result_add_value (&state, "new-signatures", res->new_signatures); result_add_value (&state, "new-revocations", res->new_revocations); result_add_value (&state, "secret-read", res->secret_read); result_add_value (&state, "secret-imported", res->secret_imported); result_add_value (&state, "secret-unchanged", res->secret_unchanged); result_add_value (&state, "skipped-new-keys", res->skipped_new_keys); result_add_value (&state, "not-imported", res->not_imported); stat = res->imports; if (stat) { result_xml_tag_start (&state, "imports", NULL); while (stat) { result_xml_tag_start (&state, "import-status", NULL); if (stat->fpr) result_add_fpr (&state, "fpr", stat->fpr); result_add_error (&state, "result", stat->result); /* FIXME: Could be done better. */ result_add_value (&state, "status", stat->status); result_xml_tag_end (&state); stat = stat->next; } result_xml_tag_end (&state); } result_xml_tag_end (&state); return 0; } gpg_error_t result_genkey_to_xml (gpgme_ctx_t ctx, int indent, result_xml_write_cb_t cb, void *hook) { struct result_xml_state state; gpgme_genkey_result_t res = gpgme_op_genkey_result (ctx); if (! res) return 0; result_init (&state, indent, cb, hook); result_xml_tag_start (&state, "genkey-result", NULL); result_add_value (&state, "primary", res->primary); result_add_value (&state, "sub", res->sub); if (res->fpr) result_add_fpr (&state, "fpr", res->fpr); result_xml_tag_end (&state); return 0; } gpg_error_t result_keylist_to_xml (gpgme_ctx_t ctx, int indent, result_xml_write_cb_t cb, void *hook) { struct result_xml_state state; gpgme_keylist_result_t res = gpgme_op_keylist_result (ctx); if (! res) return 0; result_init (&state, indent, cb, hook); result_xml_tag_start (&state, "keylist-result", NULL); result_add_value (&state, "truncated", res->truncated); result_xml_tag_end (&state); return 0; } gpg_error_t result_vfs_mount_to_xml (gpgme_ctx_t ctx, int indent, result_xml_write_cb_t cb, void *hook) { struct result_xml_state state; gpgme_vfs_mount_result_t res = gpgme_op_vfs_mount_result (ctx); if (! res) return 0; result_init (&state, indent, cb, hook); result_xml_tag_start (&state, "vfs-mount-result", NULL); result_add_string (&state, "mount-dir", res->mount_dir); result_xml_tag_end (&state); return 0; } typedef enum status { STATUS_PROTOCOL, STATUS_PROGRESS, STATUS_ENGINE, STATUS_ARMOR, STATUS_TEXTMODE, STATUS_INCLUDE_CERTS, STATUS_KEYLIST_MODE, STATUS_RECIPIENT, STATUS_ENCRYPT_RESULT, STATUS_IDENTIFY_RESULT } status_t; const char *status_string[] = { "PROTOCOL", "PROGRESS", "ENGINE", "ARMOR", "TEXTMODE", "INCLUDE_CERTS", "KEYLIST_MODE", "RECIPIENT", "ENCRYPT_RESULT", "IDENTIFY_RESULT" }; struct gpgme_tool { gpgme_ctx_t ctx; #define MAX_RECIPIENTS 10 gpgme_key_t recipients[MAX_RECIPIENTS + 1]; int recipients_nr; gpg_error_t (*write_status) (void *hook, const char *status, const char *msg); void *write_status_hook; gpg_error_t (*write_data) (void *hook, const void *buf, size_t len); void *write_data_hook; }; typedef struct gpgme_tool *gpgme_tool_t; /* Forward declaration. */ void gt_write_status (gpgme_tool_t gt, status_t status, ...) GT_GCC_A_SENTINEL(0); static gpg_error_t server_passphrase_cb (void *opaque, const char *uid_hint, const char *info, int was_bad, int fd); void _gt_progress_cb (void *opaque, const char *what, int type, int current, int total) { gpgme_tool_t gt = opaque; char buf[100]; snprintf (buf, sizeof (buf), "0x%02x %i %i", type, current, total); gt_write_status (gt, STATUS_PROGRESS, what, buf, NULL); } gpg_error_t _gt_gpgme_new (gpgme_tool_t gt, gpgme_ctx_t *ctx) { gpg_error_t err; err = gpgme_new (ctx); if (err) return err; gpgme_set_progress_cb (*ctx, _gt_progress_cb, gt); return 0; } void gt_init (gpgme_tool_t gt) { gpg_error_t err; memset (gt, '\0', sizeof (*gt)); err = _gt_gpgme_new (gt, >->ctx); if (err) log_error (1, err, "can't create gpgme context"); } gpg_error_t gt_signers_add (gpgme_tool_t gt, const char *fpr) { gpg_error_t err; gpgme_key_t key; err = gpgme_get_key (gt->ctx, fpr, &key, 0); if (err) return err; return gpgme_signers_add (gt->ctx, key); } gpg_error_t gt_signers_clear (gpgme_tool_t gt) { gpgme_signers_clear (gt->ctx); return 0; } gpg_error_t gt_get_key (gpgme_tool_t gt, const char *pattern, gpgme_key_t *r_key) { gpgme_ctx_t ctx; gpgme_ctx_t listctx; gpgme_error_t err; gpgme_key_t key; if (!gt || !r_key || !pattern) return gpg_error (GPG_ERR_INV_VALUE); ctx = gt->ctx; err = gpgme_new (&listctx); if (err) return err; { gpgme_protocol_t proto; gpgme_engine_info_t info; /* Clone the relevant state. */ proto = gpgme_get_protocol (ctx); /* The g13 protocol does not allow keylisting, we need to choose something else. */ if (proto == GPGME_PROTOCOL_G13) proto = GPGME_PROTOCOL_OpenPGP; gpgme_set_protocol (listctx, proto); gpgme_set_keylist_mode (listctx, gpgme_get_keylist_mode (ctx)); info = gpgme_ctx_get_engine_info (ctx); while (info && info->protocol != proto) info = info->next; if (info) gpgme_ctx_set_engine_info (listctx, proto, info->file_name, info->home_dir); } err = gpgme_op_keylist_start (listctx, pattern, 0); if (!err) err = gpgme_op_keylist_next (listctx, r_key); if (!err) { try_next_key: err = gpgme_op_keylist_next (listctx, &key); if (gpgme_err_code (err) == GPG_ERR_EOF) err = 0; else { if (!err && *r_key && (*r_key)->subkeys && (*r_key)->subkeys->fpr && key && key->subkeys && key->subkeys->fpr && !strcmp ((*r_key)->subkeys->fpr, key->subkeys->fpr)) { /* The fingerprint is identical. We assume that this is the same key and don't mark it as an ambiguous. This problem may occur with corrupted keyrings and has been noticed often with gpgsm. In fact gpgsm uses a similar hack to sort out such duplicates but it can't do that while listing keys. */ gpgme_key_unref (key); goto try_next_key; } if (!err) { gpgme_key_unref (key); err = gpg_error (GPG_ERR_AMBIGUOUS_NAME); } gpgme_key_unref (*r_key); } } gpgme_release (listctx); if (! err) gt_write_status (gt, STATUS_RECIPIENT, ((*r_key)->subkeys && (*r_key)->subkeys->fpr) ? (*r_key)->subkeys->fpr : "invalid", NULL); return err; } gpg_error_t gt_recipients_add (gpgme_tool_t gt, const char *pattern) { gpg_error_t err; gpgme_key_t key; if (gt->recipients_nr >= MAX_RECIPIENTS) return gpg_error (GPG_ERR_ENOMEM); if (gpgme_get_protocol (gt->ctx) == GPGME_PROTOCOL_UISERVER) err = gpgme_key_from_uid (&key, pattern); else err = gt_get_key (gt, pattern, &key); if (err) return err; gt->recipients[gt->recipients_nr++] = key; return 0; } void gt_recipients_clear (gpgme_tool_t gt) { int idx; for (idx = 0; idx < gt->recipients_nr; idx++) gpgme_key_unref (gt->recipients[idx]); memset (gt->recipients, '\0', gt->recipients_nr * sizeof (gpgme_key_t)); gt->recipients_nr = 0; } gpg_error_t gt_reset (gpgme_tool_t gt) { gpg_error_t err; gpgme_ctx_t ctx; err = _gt_gpgme_new (gt, &ctx); if (err) return err; gpgme_release (gt->ctx); gt->ctx = ctx; gt_recipients_clear (gt); return 0; } void gt_write_status (gpgme_tool_t gt, status_t status, ...) { va_list ap; const char *text; char buf[950]; char *p; size_t n; gpg_error_t err; va_start (ap, status); p = buf; n = 0; while ((text = va_arg (ap, const char *))) { if (n) { *p++ = ' '; n++; } while (*text && n < sizeof (buf) - 2) { *p++ = *text++; n++; } } *p = 0; va_end (ap); err = gt->write_status (gt->write_status_hook, status_string[status], buf); if (err) log_error (1, err, "can't write status line"); } gpg_error_t gt_write_data (gpgme_tool_t gt, const void *buf, size_t len) { return gt->write_data (gt->write_data_hook, buf, len); } gpg_error_t gt_get_engine_info (gpgme_tool_t gt, gpgme_protocol_t proto) { gpgme_engine_info_t info; info = gpgme_ctx_get_engine_info (gt->ctx); while (info) { if (proto == GPGME_PROTOCOL_UNKNOWN || proto == info->protocol) gt_write_status (gt, STATUS_ENGINE, gpgme_get_protocol_name (info->protocol), info->file_name, info->version, info->req_version, info->home_dir, NULL); info = info->next; } return 0; } gpgme_protocol_t gt_protocol_from_name (const char *name) { if (! strcasecmp (name, gpgme_get_protocol_name (GPGME_PROTOCOL_OpenPGP))) return GPGME_PROTOCOL_OpenPGP; if (! strcasecmp (name, gpgme_get_protocol_name (GPGME_PROTOCOL_CMS))) return GPGME_PROTOCOL_CMS; if (! strcasecmp (name,gpgme_get_protocol_name (GPGME_PROTOCOL_GPGCONF))) return GPGME_PROTOCOL_GPGCONF; if (! strcasecmp (name, gpgme_get_protocol_name (GPGME_PROTOCOL_ASSUAN))) return GPGME_PROTOCOL_ASSUAN; if (! strcasecmp (name, gpgme_get_protocol_name (GPGME_PROTOCOL_G13))) return GPGME_PROTOCOL_G13; if (! strcasecmp (name, gpgme_get_protocol_name (GPGME_PROTOCOL_UISERVER))) return GPGME_PROTOCOL_UISERVER; if (! strcasecmp (name, gpgme_get_protocol_name (GPGME_PROTOCOL_SPAWN))) return GPGME_PROTOCOL_SPAWN; if (! strcasecmp (name, gpgme_get_protocol_name (GPGME_PROTOCOL_DEFAULT))) return GPGME_PROTOCOL_DEFAULT; return GPGME_PROTOCOL_UNKNOWN; } gpg_error_t gt_set_protocol (gpgme_tool_t gt, gpgme_protocol_t proto) { return gpgme_set_protocol (gt->ctx, proto); } gpg_error_t gt_get_protocol (gpgme_tool_t gt) { gpgme_protocol_t proto = gpgme_get_protocol (gt->ctx); gt_write_status (gt, STATUS_PROTOCOL, gpgme_get_protocol_name (proto), NULL); return 0; } gpg_error_t gt_set_sub_protocol (gpgme_tool_t gt, gpgme_protocol_t proto) { return gpgme_set_sub_protocol (gt->ctx, proto); } gpg_error_t gt_get_sub_protocol (gpgme_tool_t gt) { gpgme_protocol_t proto = gpgme_get_sub_protocol (gt->ctx); gt_write_status (gt, STATUS_PROTOCOL, gpgme_get_protocol_name (proto), NULL); return 0; } gpg_error_t gt_set_pinentry_mode (gpgme_tool_t gt, gpgme_pinentry_mode_t mode, void *opaque) { gpg_error_t err; gpgme_set_passphrase_cb (gt->ctx, NULL, NULL); err = gpgme_set_pinentry_mode (gt->ctx, mode); if (!err && mode == GPGME_PINENTRY_MODE_LOOPBACK) gpgme_set_passphrase_cb (gt->ctx, server_passphrase_cb, opaque); return err; } gpg_error_t gt_set_armor (gpgme_tool_t gt, int armor) { gpgme_set_armor (gt->ctx, armor); return 0; } gpg_error_t gt_get_armor (gpgme_tool_t gt) { gt_write_status (gt, STATUS_ARMOR, gpgme_get_armor (gt->ctx) ? "true" : "false", NULL); return 0; } gpg_error_t gt_set_textmode (gpgme_tool_t gt, int textmode) { gpgme_set_textmode (gt->ctx, textmode); return 0; } gpg_error_t gt_get_textmode (gpgme_tool_t gt) { gt_write_status (gt, STATUS_TEXTMODE, gpgme_get_textmode (gt->ctx) ? "true" : "false", NULL); return 0; } gpg_error_t gt_set_keylist_mode (gpgme_tool_t gt, gpgme_keylist_mode_t keylist_mode) { gpgme_set_keylist_mode (gt->ctx, keylist_mode); return 0; } gpg_error_t gt_get_keylist_mode (gpgme_tool_t gt) { #define NR_KEYLIST_MODES 6 const char *modes[NR_KEYLIST_MODES + 1]; int idx = 0; gpgme_keylist_mode_t mode = gpgme_get_keylist_mode (gt->ctx); if (mode & GPGME_KEYLIST_MODE_LOCAL) modes[idx++] = "local"; if (mode & GPGME_KEYLIST_MODE_EXTERN) modes[idx++] = "extern"; if (mode & GPGME_KEYLIST_MODE_SIGS) modes[idx++] = "sigs"; if (mode & GPGME_KEYLIST_MODE_SIG_NOTATIONS) modes[idx++] = "sig_notations"; if (mode & GPGME_KEYLIST_MODE_WITH_SECRET) modes[idx++] = "with_secret"; if (mode & GPGME_KEYLIST_MODE_EPHEMERAL) modes[idx++] = "ephemeral"; if (mode & GPGME_KEYLIST_MODE_VALIDATE) modes[idx++] = "validate"; modes[idx++] = NULL; gt_write_status (gt, STATUS_KEYLIST_MODE, modes[0], modes[1], modes[2], modes[3], modes[4], modes[5], modes[6], NULL); return 0; } gpg_error_t gt_set_include_certs (gpgme_tool_t gt, int include_certs) { gpgme_set_include_certs (gt->ctx, include_certs); return 0; } gpg_error_t gt_get_include_certs (gpgme_tool_t gt) { int include_certs = gpgme_get_include_certs (gt->ctx); char buf[100]; if (include_certs == GPGME_INCLUDE_CERTS_DEFAULT) strcpy (buf, "default"); else snprintf (buf, sizeof (buf), "%i", include_certs); gt_write_status (gt, STATUS_INCLUDE_CERTS, buf, NULL); return 0; } gpg_error_t gt_decrypt_verify (gpgme_tool_t gt, gpgme_data_t cipher, gpgme_data_t plain, int verify) { if (verify) return gpgme_op_decrypt_verify (gt->ctx, cipher, plain); else return gpgme_op_decrypt (gt->ctx, cipher, plain); } gpg_error_t gt_sign_encrypt (gpgme_tool_t gt, gpgme_encrypt_flags_t flags, gpgme_data_t plain, gpgme_data_t cipher, int sign) { gpg_error_t err; gpgme_key_t *recp; recp = gt->recipients_nr? gt->recipients : NULL; if (sign) err = gpgme_op_encrypt_sign (gt->ctx, recp, flags, plain, cipher); else err = gpgme_op_encrypt (gt->ctx, recp, flags, plain, cipher); gt_recipients_clear (gt); return err; } gpg_error_t gt_sign (gpgme_tool_t gt, gpgme_data_t plain, gpgme_data_t sig, gpgme_sig_mode_t mode) { return gpgme_op_sign (gt->ctx, plain, sig, mode); } gpg_error_t gt_verify (gpgme_tool_t gt, gpgme_data_t sig, gpgme_data_t sig_text, gpgme_data_t plain) { return gpgme_op_verify (gt->ctx, sig, sig_text, plain); } gpg_error_t gt_import (gpgme_tool_t gt, gpgme_data_t data) { return gpgme_op_import (gt->ctx, data); } gpg_error_t gt_export (gpgme_tool_t gt, const char *pattern[], gpgme_export_mode_t mode, gpgme_data_t data) { return gpgme_op_export_ext (gt->ctx, pattern, mode, data); } gpg_error_t gt_genkey (gpgme_tool_t gt, const char *parms, gpgme_data_t public, gpgme_data_t secret) { return gpgme_op_genkey (gt->ctx, parms, public, secret); } gpg_error_t gt_import_keys (gpgme_tool_t gt, char *fpr[]) { gpg_error_t err = 0; int cnt; int idx; gpgme_key_t *keys; cnt = 0; while (fpr[cnt]) cnt++; if (! cnt) return gpg_error (GPG_ERR_INV_VALUE); keys = malloc ((cnt + 1) * sizeof (gpgme_key_t)); if (! keys) return gpg_error_from_syserror (); for (idx = 0; idx < cnt; idx++) { err = gpgme_get_key (gt->ctx, fpr[idx], &keys[idx], 0); if (err) break; } if (! err) { keys[cnt] = NULL; err = gpgme_op_import_keys (gt->ctx, keys); } /* Rollback. */ while (--idx >= 0) gpgme_key_unref (keys[idx]); free (keys); return err; } gpg_error_t gt_delete (gpgme_tool_t gt, char *fpr, int allow_secret) { gpg_error_t err; gpgme_key_t key; err = gpgme_get_key (gt->ctx, fpr, &key, 0); if (err) return err; err = gpgme_op_delete (gt->ctx, key, allow_secret); gpgme_key_unref (key); return err; } gpg_error_t gt_keylist_start (gpgme_tool_t gt, const char *pattern[], int secret_only) { return gpgme_op_keylist_ext_start (gt->ctx, pattern, secret_only, 0); } gpg_error_t gt_keylist_next (gpgme_tool_t gt, gpgme_key_t *key) { return gpgme_op_keylist_next (gt->ctx, key); } gpg_error_t gt_getauditlog (gpgme_tool_t gt, gpgme_data_t output, unsigned int flags) { return gpgme_op_getauditlog (gt->ctx, output, flags); } gpg_error_t gt_vfs_mount (gpgme_tool_t gt, const char *container_file, const char *mount_dir, int flags) { gpg_error_t err; gpg_error_t op_err; err = gpgme_op_vfs_mount (gt->ctx, container_file, mount_dir, flags, &op_err); return err ? err : op_err; } gpg_error_t gt_vfs_create (gpgme_tool_t gt, const char *container_file, int flags) { gpg_error_t err; gpg_error_t op_err; err = gpgme_op_vfs_create (gt->ctx, gt->recipients, container_file, flags, &op_err); gt_recipients_clear (gt); return err ? err : op_err; } gpg_error_t gt_passwd (gpgme_tool_t gt, char *fpr) { gpg_error_t err; gpgme_key_t key; err = gpgme_get_key (gt->ctx, fpr, &key, 0); if (err) return gpg_err_code (err) == GPG_ERR_EOF? gpg_error (GPG_ERR_NO_PUBKEY):err; err = gpgme_op_passwd (gt->ctx, key, 0); gpgme_key_unref (key); return err; } gpg_error_t gt_identify (gpgme_tool_t gt, gpgme_data_t data) { const char *s = "?"; switch (gpgme_data_identify (data, 0)) { case GPGME_DATA_TYPE_INVALID: return gpg_error (GPG_ERR_GENERAL); case GPGME_DATA_TYPE_UNKNOWN : s = "unknown"; break; case GPGME_DATA_TYPE_PGP_SIGNED : s = "PGP-signed"; break; case GPGME_DATA_TYPE_PGP_SIGNATURE: s = "PGP-signature"; break; case GPGME_DATA_TYPE_PGP_ENCRYPTED: s = "PGP-encrypted"; break; case GPGME_DATA_TYPE_PGP_OTHER : s = "PGP"; break; case GPGME_DATA_TYPE_PGP_KEY : s = "PGP-key"; break; case GPGME_DATA_TYPE_CMS_SIGNED : s = "CMS-signed"; break; case GPGME_DATA_TYPE_CMS_ENCRYPTED: s = "CMS-encrypted"; break; case GPGME_DATA_TYPE_CMS_OTHER : s = "CMS"; break; case GPGME_DATA_TYPE_X509_CERT : s = "X.509"; break; case GPGME_DATA_TYPE_PKCS12 : s = "PKCS12"; break; } gt_write_status (gt, STATUS_IDENTIFY_RESULT, s, NULL); return 0; } gpg_error_t gt_spawn (gpgme_tool_t gt, const char *pgm, gpgme_data_t inp, gpgme_data_t outp) { gpg_error_t err; err = gpgme_op_spawn (gt->ctx, pgm, NULL, inp, outp, outp, 0); return err; } #define GT_RESULT_ENCRYPT 0x1 #define GT_RESULT_DECRYPT 0x2 #define GT_RESULT_SIGN 0x4 #define GT_RESULT_VERIFY 0x8 #define GT_RESULT_IMPORT 0x10 #define GT_RESULT_GENKEY 0x20 #define GT_RESULT_KEYLIST 0x40 #define GT_RESULT_VFS_MOUNT 0x80 #define GT_RESULT_ALL (~0U) gpg_error_t gt_result (gpgme_tool_t gt, unsigned int flags) { int indent = 2; gt_write_data (gt, xml_preamble1, strlen (xml_preamble1)); gt_write_data (gt, NULL, 0); gt_write_data (gt, xml_preamble2, strlen (xml_preamble2)); gt_write_data (gt, NULL, 0); if (flags & GT_RESULT_ENCRYPT) result_encrypt_to_xml (gt->ctx, indent, (result_xml_write_cb_t) gt_write_data, gt); if (flags & GT_RESULT_DECRYPT) result_decrypt_to_xml (gt->ctx, indent, (result_xml_write_cb_t) gt_write_data, gt); if (flags & GT_RESULT_SIGN) result_sign_to_xml (gt->ctx, indent, (result_xml_write_cb_t) gt_write_data, gt); if (flags & GT_RESULT_VERIFY) result_verify_to_xml (gt->ctx, indent, (result_xml_write_cb_t) gt_write_data, gt); if (flags & GT_RESULT_IMPORT) result_import_to_xml (gt->ctx, indent, (result_xml_write_cb_t) gt_write_data, gt); if (flags & GT_RESULT_GENKEY) result_genkey_to_xml (gt->ctx, indent, (result_xml_write_cb_t) gt_write_data, gt); if (flags & GT_RESULT_KEYLIST) result_keylist_to_xml (gt->ctx, indent, (result_xml_write_cb_t) gt_write_data, gt); if (flags & GT_RESULT_VFS_MOUNT) result_vfs_mount_to_xml (gt->ctx, indent, (result_xml_write_cb_t) gt_write_data, gt); gt_write_data (gt, xml_end, strlen (xml_end)); return 0; } /* GPGME SERVER. */ #include struct server { gpgme_tool_t gt; assuan_context_t assuan_ctx; gpgme_data_encoding_t input_enc; gpgme_data_encoding_t output_enc; assuan_fd_t input_fd; char *input_filename; FILE *input_stream; assuan_fd_t output_fd; char *output_filename; FILE *output_stream; assuan_fd_t message_fd; char *message_filename; FILE *message_stream; gpgme_data_encoding_t message_enc; }; gpg_error_t server_write_status (void *hook, const char *status, const char *msg) { struct server *server = hook; return assuan_write_status (server->assuan_ctx, status, msg); } gpg_error_t server_write_data (void *hook, const void *buf, size_t len) { struct server *server = hook; return assuan_send_data (server->assuan_ctx, buf, len); } static gpg_error_t server_passphrase_cb (void *opaque, const char *uid_hint, const char *info, int was_bad, int fd) { struct server *server = opaque; gpg_error_t err; unsigned char *buf = NULL; size_t buflen = 0; (void)was_bad; if (server && server->assuan_ctx) { if (uid_hint) assuan_write_status (server->assuan_ctx, "USERID_HINT", uid_hint); if (info) assuan_write_status (server->assuan_ctx, "NEED_PASSPHRASE", info); err = assuan_inquire (server->assuan_ctx, "PASSPHRASE", &buf, &buflen, 100); } else err = gpg_error (GPG_ERR_NO_PASSPHRASE); if (!err) { /* We take care to always send a LF. */ if (gpgme_io_writen (fd, buf, buflen)) err = gpg_error_from_syserror (); else if (!memchr (buf, '\n', buflen) && gpgme_io_writen (fd, "\n", 1)) err = gpg_error_from_syserror (); } free (buf); return err; } /* Wrapper around assuan_command_parse_fd to also handle a "file=FILENAME" argument. On success either a filename is returned at FILENAME or a file descriptor at RFD; the other one is set to NULL respective ASSUAN_INVALID_FD. */ static gpg_error_t server_parse_fd (assuan_context_t ctx, char *line, assuan_fd_t *rfd, char **filename) { *rfd = ASSUAN_INVALID_FD; *filename = NULL; if (! strncasecmp (line, "file=", 5)) { char *term; *filename = strdup (line + 5); if (!*filename) return gpg_error_from_syserror(); term = strchr (*filename, ' '); if (term) *term = '\0'; return 0; } else return assuan_command_parse_fd (ctx, line, rfd); } static gpgme_data_encoding_t server_data_encoding (const char *line) { if (strstr (line, "--binary")) return GPGME_DATA_ENCODING_BINARY; if (strstr (line, "--base64")) return GPGME_DATA_ENCODING_BASE64; if (strstr (line, "--armor")) return GPGME_DATA_ENCODING_ARMOR; if (strstr (line, "--url")) return GPGME_DATA_ENCODING_URL; if (strstr (line, "--urlesc")) return GPGME_DATA_ENCODING_URLESC; if (strstr (line, "--url0")) return GPGME_DATA_ENCODING_URL0; if (strstr (line, "--mime")) return GPGME_DATA_ENCODING_MIME; return GPGME_DATA_ENCODING_NONE; } static gpgme_error_t server_data_obj (assuan_fd_t fd, char *fn, int out, gpgme_data_encoding_t encoding, gpgme_data_t *data, FILE **fs) { gpgme_error_t err; *fs = NULL; if (fn) { *fs = fopen (fn, out ? "wb" : "rb"); if (!*fs) return gpg_error_from_syserror (); err = gpgme_data_new_from_stream (data, *fs); } else err = gpgme_data_new_from_fd (data, (int) fd); if (err) return err; return gpgme_data_set_encoding (*data, encoding); } void server_reset_fds (struct server *server) { /* assuan closes the input and output FDs for us when doing a RESET, but we use this same function after commands, so repeat it here. */ if (server->input_fd != ASSUAN_INVALID_FD) { #if HAVE_W32_SYSTEM CloseHandle (server->input_fd); #else close (server->input_fd); #endif server->input_fd = ASSUAN_INVALID_FD; } if (server->output_fd != ASSUAN_INVALID_FD) { #if HAVE_W32_SYSTEM CloseHandle (server->output_fd); #else close (server->output_fd); #endif server->output_fd = ASSUAN_INVALID_FD; } if (server->message_fd != ASSUAN_INVALID_FD) { /* FIXME: Assuan should provide a close function. */ #if HAVE_W32_SYSTEM CloseHandle (server->message_fd); #else close (server->message_fd); #endif server->message_fd = ASSUAN_INVALID_FD; } if (server->input_filename) { free (server->input_filename); server->input_filename = NULL; } if (server->output_filename) { free (server->output_filename); server->output_filename = NULL; } if (server->message_filename) { free (server->message_filename); server->message_filename = NULL; } if (server->input_stream) { fclose (server->input_stream); server->input_stream = NULL; } if (server->output_stream) { fclose (server->output_stream); server->output_stream = NULL; } if (server->message_stream) { fclose (server->message_stream); server->message_stream = NULL; } server->input_enc = GPGME_DATA_ENCODING_NONE; server->output_enc = GPGME_DATA_ENCODING_NONE; server->message_enc = GPGME_DATA_ENCODING_NONE; } static gpg_error_t reset_notify (assuan_context_t ctx, char *line) { struct server *server = assuan_get_pointer (ctx); (void)line; server_reset_fds (server); gt_reset (server->gt); return 0; } static const char hlp_version[] = "VERSION []\n" "\n" "Call the function gpgme_check_version."; static gpg_error_t cmd_version (assuan_context_t ctx, char *line) { if (line && *line) { const char *version = gpgme_check_version (line); return version ? 0 : gpg_error (GPG_ERR_SELFTEST_FAILED); } else { const char *version = gpgme_check_version (NULL); return assuan_send_data (ctx, version, strlen (version)); } } static const char hlp_engine[] = "ENGINE []\n" "\n" "Get information about a GPGME engine (a.k.a. protocol)."; static gpg_error_t cmd_engine (assuan_context_t ctx, char *line) { struct server *server = assuan_get_pointer (ctx); return gt_get_engine_info (server->gt, gt_protocol_from_name (line)); } static const char hlp_protocol[] = "PROTOCOL []\n" "\n" "With NAME, set the protocol. Without, return the current\n" "protocol."; static gpg_error_t cmd_protocol (assuan_context_t ctx, char *line) { struct server *server = assuan_get_pointer (ctx); if (line && *line) return gt_set_protocol (server->gt, gt_protocol_from_name (line)); else return gt_get_protocol (server->gt); } static const char hlp_sub_protocol[] = "SUB_PROTOCOL []\n" "\n" "With NAME, set the sub-protocol. Without, return the\n" "current sub-protocol."; static gpg_error_t cmd_sub_protocol (assuan_context_t ctx, char *line) { struct server *server = assuan_get_pointer (ctx); if (line && *line) return gt_set_sub_protocol (server->gt, gt_protocol_from_name (line)); else return gt_get_sub_protocol (server->gt); } static const char hlp_pinentry_mode[] = "PINENTRY_MODE \n" "\n" "Set the pinentry mode to NAME. Allowedvalues for NAME are:\n" " default - reset to the default of the engine,\n" " ask - force the use of the pinentry,\n" " cancel - emulate use of pinentry's cancel button,\n" " error - return a pinentry error,\n" " loopback - redirect pinentry queries to the caller.\n" "Note that only recent versions of GPG support changing the pinentry mode."; static gpg_error_t cmd_pinentry_mode (assuan_context_t ctx, char *line) { struct server *server = assuan_get_pointer (ctx); gpgme_pinentry_mode_t mode; if (!line || !*line || !strcmp (line, "default")) mode = GPGME_PINENTRY_MODE_DEFAULT; else if (!strcmp (line, "ask")) mode = GPGME_PINENTRY_MODE_ASK; else if (!strcmp (line, "cancel")) mode = GPGME_PINENTRY_MODE_CANCEL; else if (!strcmp (line, "error")) mode = GPGME_PINENTRY_MODE_ERROR; else if (!strcmp (line, "loopback")) mode = GPGME_PINENTRY_MODE_LOOPBACK; else return gpg_error (GPG_ERR_INV_VALUE); return gt_set_pinentry_mode (server->gt, mode, server); } static const char hlp_armor[] = "ARMOR [true|false]\n" "\n" "With 'true' or 'false', turn output ASCII armoring on or\n" "off. Without, return the current armoring status."; static gpg_error_t cmd_armor (assuan_context_t ctx, char *line) { struct server *server = assuan_get_pointer (ctx); if (line && *line) { int flag = 0; if (! strcasecmp (line, "true") || ! strcasecmp (line, "yes") || line[0] == '1') flag = 1; return gt_set_armor (server->gt, flag); } else return gt_get_armor (server->gt); } static const char hlp_textmode[] = "TEXTMODE [true|false]\n" "\n" "With 'true' or 'false', turn text mode on or off.\n" "Without, return the current text mode status."; static gpg_error_t cmd_textmode (assuan_context_t ctx, char *line) { struct server *server = assuan_get_pointer (ctx); if (line && *line) { int flag = 0; if (! strcasecmp (line, "true") || ! strcasecmp (line, "yes") || line[0] == '1') flag = 1; return gt_set_textmode (server->gt, flag); } else return gt_get_textmode (server->gt); } static const char hlp_include_certs[] = "INCLUDE_CERTS [default|]\n" "\n" "With DEFAULT or N, set how many certificates should be\n" "included in the next S/MIME signed message. See the\n" "GPGME documentation for details on the meaning of\n" "various N. Without either, return the current setting."; static gpg_error_t cmd_include_certs (assuan_context_t ctx, char *line) { struct server *server = assuan_get_pointer (ctx); if (line && *line) { int include_certs = 0; if (! strcasecmp (line, "default")) include_certs = GPGME_INCLUDE_CERTS_DEFAULT; else include_certs = atoi (line); return gt_set_include_certs (server->gt, include_certs); } else return gt_get_include_certs (server->gt); } static const char hlp_keylist_mode[] = "KEYLIST_MODE [local] [extern] [sigs] [sig_notations]\n" " [ephemeral] [validate]\n" "\n" "Set the mode for the next KEYLIST command."; static gpg_error_t cmd_keylist_mode (assuan_context_t ctx, char *line) { struct server *server = assuan_get_pointer (ctx); if (line && *line) { gpgme_keylist_mode_t mode = 0; if (strstr (line, "local")) mode |= GPGME_KEYLIST_MODE_LOCAL; if (strstr (line, "extern")) mode |= GPGME_KEYLIST_MODE_EXTERN; if (strstr (line, "sigs")) mode |= GPGME_KEYLIST_MODE_SIGS; if (strstr (line, "sig_notations")) mode |= GPGME_KEYLIST_MODE_SIG_NOTATIONS; if (strstr (line, "with_secret")) mode |= GPGME_KEYLIST_MODE_WITH_SECRET; if (strstr (line, "ephemeral")) mode |= GPGME_KEYLIST_MODE_EPHEMERAL; if (strstr (line, "validate")) mode |= GPGME_KEYLIST_MODE_VALIDATE; return gt_set_keylist_mode (server->gt, mode); } else return gt_get_keylist_mode (server->gt); } static const char hlp_input[] = "INPUT [|FILE=]\n" "\n" "Set the input for the next command. Use either the\n" "Assuan file descriptor FD or a filesystem PATH."; static gpg_error_t cmd_input (assuan_context_t ctx, char *line) { struct server *server = assuan_get_pointer (ctx); gpg_error_t err; assuan_fd_t sysfd; char *filename; err = server_parse_fd (ctx, line, &sysfd, &filename); if (err) return err; server->input_fd = sysfd; server->input_filename = filename; server->input_enc = server_data_encoding (line); return 0; } static const char hlp_output[] = "OUTPUT [|FILE=]\n" "\n" "Set the output for the next command. Use either the\n" "Assuan file descriptor FD or a filesystem PATH."; static gpg_error_t cmd_output (assuan_context_t ctx, char *line) { struct server *server = assuan_get_pointer (ctx); gpg_error_t err; assuan_fd_t sysfd; char *filename; err = server_parse_fd (ctx, line, &sysfd, &filename); if (err) return err; server->output_fd = sysfd; server->output_filename = filename; server->output_enc = server_data_encoding (line); return 0; } static const char hlp_message[] = "MESSAGE [|FILE=]\n" "\n" "Set the plaintext message for the next VERIFY command\n" "with a detached signature. Use either the Assuan file\n" "descriptor FD or a filesystem PATH."; static gpg_error_t cmd_message (assuan_context_t ctx, char *line) { struct server *server = assuan_get_pointer (ctx); gpg_error_t err; assuan_fd_t sysfd; char *filename; err = server_parse_fd (ctx, line, &sysfd, &filename); if (err) return err; server->message_fd = sysfd; server->message_filename = filename; server->message_enc = server_data_encoding (line); return 0; } static const char hlp_recipient[] = "RECIPIENT \n" "\n" "Add the key matching PATTERN to the list of recipients\n" "for the next encryption command."; static gpg_error_t cmd_recipient (assuan_context_t ctx, char *line) { struct server *server = assuan_get_pointer (ctx); return gt_recipients_add (server->gt, line); } static const char hlp_signer[] = "SIGNER \n" "\n" "Add the key with FINGERPRINT to the list of signers to\n" "be used for the next signing command."; static gpg_error_t cmd_signer (assuan_context_t ctx, char *line) { struct server *server = assuan_get_pointer (ctx); return gt_signers_add (server->gt, line); } static const char hlp_signers_clear[] = "SIGNERS_CLEAR\n" "\n" "Clear the list of signers specified by previous SIGNER\n" "commands."; static gpg_error_t cmd_signers_clear (assuan_context_t ctx, char *line) { struct server *server = assuan_get_pointer (ctx); (void)line; return gt_signers_clear (server->gt); } static gpg_error_t _cmd_decrypt_verify (assuan_context_t ctx, char *line, int verify) { struct server *server = assuan_get_pointer (ctx); gpg_error_t err; assuan_fd_t inp_fd; char *inp_fn; assuan_fd_t out_fd; char *out_fn; gpgme_data_t inp_data; gpgme_data_t out_data; (void)line; inp_fd = server->input_fd; inp_fn = server->input_filename; if (inp_fd == ASSUAN_INVALID_FD && !inp_fn) return GPG_ERR_ASS_NO_INPUT; out_fd = server->output_fd; out_fn = server->output_filename; if (out_fd == ASSUAN_INVALID_FD && !out_fn) return GPG_ERR_ASS_NO_OUTPUT; err = server_data_obj (inp_fd, inp_fn, 0, server->input_enc, &inp_data, &server->input_stream); if (err) return err; err = server_data_obj (out_fd, out_fn, 1, server->output_enc, &out_data, &server->output_stream); if (err) { gpgme_data_release (inp_data); return err; } err = gt_decrypt_verify (server->gt, inp_data, out_data, verify); gpgme_data_release (inp_data); gpgme_data_release (out_data); server_reset_fds (server); return err; } static const char hlp_decrypt[] = "DECRYPT\n" "\n" "Decrypt the object set by the last INPUT command and\n" "write the decrypted message to the object set by the\n" "last OUTPUT command."; static gpg_error_t cmd_decrypt (assuan_context_t ctx, char *line) { return _cmd_decrypt_verify (ctx, line, 0); } static const char hlp_decrypt_verify[] = "DECRYPT_VERIFY\n" "\n" "Decrypt the object set by the last INPUT command and\n" "verify any embedded signatures. Write the decrypted\n" "message to the object set by the last OUTPUT command."; static gpg_error_t cmd_decrypt_verify (assuan_context_t ctx, char *line) { return _cmd_decrypt_verify (ctx, line, 1); } static gpg_error_t _cmd_sign_encrypt (assuan_context_t ctx, char *line, int sign) { struct server *server = assuan_get_pointer (ctx); gpg_error_t err; assuan_fd_t inp_fd; char *inp_fn; assuan_fd_t out_fd; char *out_fn; gpgme_data_t inp_data = NULL; gpgme_data_t out_data = NULL; gpgme_encrypt_flags_t flags = 0; if (strstr (line, "--always-trust")) flags |= GPGME_ENCRYPT_ALWAYS_TRUST; if (strstr (line, "--no-encrypt-to")) flags |= GPGME_ENCRYPT_NO_ENCRYPT_TO; if (strstr (line, "--prepare")) flags |= GPGME_ENCRYPT_PREPARE; if (strstr (line, "--expect-sign")) flags |= GPGME_ENCRYPT_EXPECT_SIGN; if (strstr (line, "--no-compress")) flags |= GPGME_ENCRYPT_NO_COMPRESS; inp_fd = server->input_fd; inp_fn = server->input_filename; out_fd = server->output_fd; out_fn = server->output_filename; if (inp_fd != ASSUAN_INVALID_FD || inp_fn) { err = server_data_obj (inp_fd, inp_fn, 0, server->input_enc, &inp_data, &server->input_stream); if (err) return err; } if (out_fd != ASSUAN_INVALID_FD || out_fn) { err = server_data_obj (out_fd, out_fn, 1, server->output_enc, &out_data, &server->output_stream); if (err) { gpgme_data_release (inp_data); return err; } } err = gt_sign_encrypt (server->gt, flags, inp_data, out_data, sign); gpgme_data_release (inp_data); gpgme_data_release (out_data); server_reset_fds (server); return err; } static const char hlp_encrypt[] = "ENCRYPT [--always-trust] [--no-encrypt-to]\n" " [--no-compress] [--prepare] [--expect-sign]\n" "\n" "Encrypt the object set by the last INPUT command to\n" "the keys specified by previous RECIPIENT commands. \n" "Write the signed and encrypted message to the object\n" "set by the last OUTPUT command."; static gpg_error_t cmd_encrypt (assuan_context_t ctx, char *line) { return _cmd_sign_encrypt (ctx, line, 0); } static const char hlp_sign_encrypt[] = "SIGN_ENCRYPT [--always-trust] [--no-encrypt-to]\n" " [--no-compress] [--prepare] [--expect-sign]\n" "\n" "Sign the object set by the last INPUT command with the\n" "keys specified by previous SIGNER commands and encrypt\n" "it to the keys specified by previous RECIPIENT\n" "commands. Write the signed and encrypted message to\n" "the object set by the last OUTPUT command."; static gpg_error_t cmd_sign_encrypt (assuan_context_t ctx, char *line) { return _cmd_sign_encrypt (ctx, line, 1); } static const char hlp_sign[] = "SIGN [--clear|--detach]\n" "\n" "Sign the object set by the last INPUT command with the\n" "keys specified by previous SIGNER commands. Write the\n" "signed message to the object set by the last OUTPUT\n" "command. With `--clear`, generate a clear text\n" "signature. With `--detach`, generate a detached\n" "signature."; static gpg_error_t cmd_sign (assuan_context_t ctx, char *line) { struct server *server = assuan_get_pointer (ctx); gpg_error_t err; assuan_fd_t inp_fd; char *inp_fn; assuan_fd_t out_fd; char *out_fn; gpgme_data_t inp_data; gpgme_data_t out_data; gpgme_sig_mode_t mode = GPGME_SIG_MODE_NORMAL; if (strstr (line, "--clear")) mode = GPGME_SIG_MODE_CLEAR; if (strstr (line, "--detach")) mode = GPGME_SIG_MODE_DETACH; inp_fd = server->input_fd; inp_fn = server->input_filename; if (inp_fd == ASSUAN_INVALID_FD && !inp_fn) return GPG_ERR_ASS_NO_INPUT; out_fd = server->output_fd; out_fn = server->output_filename; if (out_fd == ASSUAN_INVALID_FD && !out_fn) return GPG_ERR_ASS_NO_OUTPUT; err = server_data_obj (inp_fd, inp_fn, 0, server->input_enc, &inp_data, &server->input_stream); if (err) return err; err = server_data_obj (out_fd, out_fn, 1, server->output_enc, &out_data, &server->output_stream); if (err) { gpgme_data_release (inp_data); return err; } err = gt_sign (server->gt, inp_data, out_data, mode); gpgme_data_release (inp_data); gpgme_data_release (out_data); server_reset_fds (server); return err; } static const char hlp_verify[] = "VERIFY\n" "\n" "Verify signatures on the object set by the last INPUT\n" "and MESSAGE commands. If the message was encrypted,\n" "write the plaintext to the object set by the last\n" "OUTPUT command."; static gpg_error_t cmd_verify (assuan_context_t ctx, char *line) { struct server *server = assuan_get_pointer (ctx); gpg_error_t err; assuan_fd_t inp_fd; assuan_fd_t msg_fd; assuan_fd_t out_fd; char *inp_fn; char *msg_fn; char *out_fn; gpgme_data_t inp_data; gpgme_data_t msg_data = NULL; gpgme_data_t out_data = NULL; (void)line; inp_fd = server->input_fd; inp_fn = server->input_filename; if (inp_fd == ASSUAN_INVALID_FD && !inp_fn) return GPG_ERR_ASS_NO_INPUT; msg_fd = server->message_fd; msg_fn = server->message_filename; out_fd = server->output_fd; out_fn = server->output_filename; err = server_data_obj (inp_fd, inp_fn, 0, server->input_enc, &inp_data, &server->input_stream); if (err) return err; if (msg_fd != ASSUAN_INVALID_FD || msg_fn) { err = server_data_obj (msg_fd, msg_fn, 0, server->message_enc, &msg_data, &server->message_stream); if (err) { gpgme_data_release (inp_data); return err; } } if (out_fd != ASSUAN_INVALID_FD || out_fn) { err = server_data_obj (out_fd, out_fn, 1, server->output_enc, &out_data, &server->output_stream); if (err) { gpgme_data_release (inp_data); gpgme_data_release (msg_data); return err; } } err = gt_verify (server->gt, inp_data, msg_data, out_data); gpgme_data_release (inp_data); if (msg_data) gpgme_data_release (msg_data); if (out_data) gpgme_data_release (out_data); server_reset_fds (server); return err; } static const char hlp_import[] = "IMPORT []\n" "\n" "With PATTERN, import the keys described by PATTERN.\n" "Without, read a key (or keys) from the object set by the\n" "last INPUT command."; static gpg_error_t cmd_import (assuan_context_t ctx, char *line) { struct server *server = assuan_get_pointer (ctx); if (line && *line) { char *fprs[2] = { line, NULL }; return gt_import_keys (server->gt, fprs); } else { gpg_error_t err; assuan_fd_t inp_fd; char *inp_fn; gpgme_data_t inp_data; inp_fd = server->input_fd; inp_fn = server->input_filename; if (inp_fd == ASSUAN_INVALID_FD && !inp_fn) return GPG_ERR_ASS_NO_INPUT; err = server_data_obj (inp_fd, inp_fn, 0, server->input_enc, &inp_data, &server->input_stream); if (err) return err; err = gt_import (server->gt, inp_data); gpgme_data_release (inp_data); server_reset_fds (server); return err; } } static const char hlp_export[] = - "EXPORT [--extern] [--minimal] [--secret [--pkcs12] [--raw]] []\n" + "EXPORT [--extern] [--minimal]\n" + " [--secret [--pkcs12] [--raw]|--secret-subkey] []\n" "\n" "Export the keys described by PATTERN. Write the\n" "the output to the object set by the last OUTPUT command."; static gpg_error_t cmd_export (assuan_context_t ctx, char *line) { struct server *server = assuan_get_pointer (ctx); gpg_error_t err; assuan_fd_t out_fd; char *out_fn; gpgme_data_t out_data; gpgme_export_mode_t mode = 0; const char *pattern[2]; out_fd = server->output_fd; out_fn = server->output_filename; if (out_fd == ASSUAN_INVALID_FD && !out_fn) return GPG_ERR_ASS_NO_OUTPUT; err = server_data_obj (out_fd, out_fn, 1, server->output_enc, &out_data, &server->output_stream); if (err) return err; if (has_option (line, "--extern")) mode |= GPGME_EXPORT_MODE_EXTERN; if (has_option (line, "--minimal")) mode |= GPGME_EXPORT_MODE_MINIMAL; if (has_option (line, "--secret")) mode |= GPGME_EXPORT_MODE_SECRET; if (has_option (line, "--secret-subkey")) mode |= GPGME_EXPORT_MODE_SECRET_SUBKEY; if (has_option (line, "--raw")) mode |= GPGME_EXPORT_MODE_RAW; if (has_option (line, "--pkcs12")) mode |= GPGME_EXPORT_MODE_PKCS12; line = skip_options (line); pattern[0] = line; pattern[1] = NULL; err = gt_export (server->gt, pattern, mode, out_data); gpgme_data_release (out_data); server_reset_fds (server); return err; } static gpg_error_t _cmd_genkey_write (gpgme_data_t data, const void *buf, size_t size) { while (size > 0) { gpgme_ssize_t writen = gpgme_data_write (data, buf, size); if (writen < 0 && errno != EAGAIN) return gpg_error_from_syserror (); else if (writen > 0) { buf = (void *) (((char *) buf) + writen); size -= writen; } } return 0; } static gpg_error_t cmd_genkey (assuan_context_t ctx, char *line) { struct server *server = assuan_get_pointer (ctx); gpg_error_t err; assuan_fd_t inp_fd; char *inp_fn; assuan_fd_t out_fd; char *out_fn; gpgme_data_t inp_data; gpgme_data_t out_data = NULL; gpgme_data_t parms_data = NULL; const char *parms; (void)line; inp_fd = server->input_fd; inp_fn = server->input_filename; if (inp_fd == ASSUAN_INVALID_FD && !inp_fn) return GPG_ERR_ASS_NO_INPUT; out_fd = server->output_fd; out_fn = server->output_filename; err = server_data_obj (inp_fd, inp_fn, 0, server->input_enc, &inp_data, &server->input_stream); if (err) return err; if (out_fd != ASSUAN_INVALID_FD || out_fn) { err = server_data_obj (out_fd, out_fn, 1, server->output_enc, &out_data, &server->output_stream); if (err) { gpgme_data_release (inp_data); return err; } } /* Convert input data. */ err = gpgme_data_new (&parms_data); if (err) goto out; do { char buf[512]; gpgme_ssize_t readn = gpgme_data_read (inp_data, buf, sizeof (buf)); if (readn < 0) { err = gpg_error_from_syserror (); goto out; } else if (readn == 0) break; err = _cmd_genkey_write (parms_data, buf, readn); if (err) goto out; } while (1); err = _cmd_genkey_write (parms_data, "", 1); if (err) goto out; parms = gpgme_data_release_and_get_mem (parms_data, NULL); parms_data = NULL; if (! parms) { err = gpg_error (GPG_ERR_GENERAL); goto out; } err = gt_genkey (server->gt, parms, out_data, NULL); server_reset_fds (server); out: gpgme_data_release (inp_data); if (out_data) gpgme_data_release (out_data); if (parms_data) gpgme_data_release (parms_data); return err; } static gpg_error_t cmd_delete (assuan_context_t ctx, char *line) { struct server *server = assuan_get_pointer (ctx); int allow_secret = 0; const char optstr[] = "--allow-secret"; if (!strncasecmp (line, optstr, strlen (optstr))) { allow_secret = 1; line += strlen (optstr); while (*line && !spacep (line)) line++; } return gt_delete (server->gt, line, allow_secret); } static const char hlp_keylist[] = "KEYLIST [--secret-only] []\n" "\n" "List all certificates or only those specified by PATTERNS. Each\n" "pattern shall be a percent-plus escaped certificate specification."; static gpg_error_t cmd_keylist (assuan_context_t ctx, char *line) { #define MAX_CMD_KEYLIST_PATTERN 20 struct server *server = assuan_get_pointer (ctx); gpgme_tool_t gt = server->gt; struct result_xml_state state; gpg_error_t err; int secret_only = 0; int idx, indent=2; const char *pattern[MAX_CMD_KEYLIST_PATTERN+1]; const char optstr[] = "--secret-only"; char *p; if (!strncasecmp (line, optstr, strlen (optstr))) { secret_only = 1; line += strlen (optstr); while (*line && !spacep (line)) line++; } idx = 0; for (p=line; *p; line = p) { while (*p && *p != ' ') p++; if (*p) *p++ = 0; if (*line) { if (idx+1 == DIM (pattern)) return gpg_error (GPG_ERR_TOO_MANY); strcpy_escaped_plus (line, line); pattern[idx++] = line; } } pattern[idx] = NULL; gt_write_data (gt, xml_preamble1, strlen (xml_preamble1)); gt_write_data (gt, NULL, 0); gt_write_data (gt, xml_preamble2, strlen (xml_preamble2)); gt_write_data (gt, NULL, 0); result_init (&state, indent, (result_xml_write_cb_t) gt_write_data, gt); result_xml_tag_start (&state, "keylist", NULL); err = gt_keylist_start (server->gt, pattern, secret_only); while (! err) { gpgme_key_t key; gpgme_subkey_t subkey; gpgme_user_id_t uid; err = gt_keylist_next (server->gt, &key); if (gpg_err_code (err) == GPG_ERR_EOF) { err = 0; break; } else if (! err) { result_xml_tag_start (&state, "key", NULL); result_add_value (&state, "revoked", key->revoked); result_add_value (&state, "expired", key->expired); result_add_value (&state, "disabled", key->disabled); result_add_value (&state, "invalid", key->invalid); result_add_value (&state, "can-encrypt", key->can_encrypt); result_add_value (&state, "can-sign", key->can_sign); result_add_value (&state, "can-certify", key->can_certify); result_add_value (&state, "can-authenticate", key->can_authenticate); result_add_value (&state, "is-qualified", key->is_qualified); result_add_value (&state, "secret", key->secret); result_add_protocol (&state, "protocol", key->protocol); result_xml_tag_start (&state, "issuer", NULL); result_add_string (&state, "serial", key->issuer_serial); result_add_string (&state, "name", key->issuer_name); result_xml_tag_end (&state); /* issuer */ result_add_string (&state, "chain-id", key->chain_id); result_add_validity (&state, "owner-trust", key->owner_trust); result_xml_tag_start (&state, "subkeys", NULL); subkey = key->subkeys; while (subkey) { result_xml_tag_start (&state, "subkey", NULL); /* FIXME: more data */ result_add_keyid (&state, "keyid", subkey->keyid); if (subkey->fpr) result_add_fpr (&state, "fpr", subkey->fpr); result_add_value (&state, "secret", subkey->secret); result_add_value (&state, "is_cardkey", subkey->is_cardkey); if (subkey->card_number) result_add_string (&state, "card_number", subkey->card_number); if (subkey->curve) result_add_string (&state, "curve", subkey->curve); result_xml_tag_end (&state); /* subkey */ subkey = subkey->next; } result_xml_tag_end (&state); /* subkeys */ result_xml_tag_start (&state, "uids", NULL); uid = key->uids; while (uid) { result_xml_tag_start (&state, "uid", NULL); /* FIXME: more data */ result_add_string (&state, "uid", uid->uid); result_add_string (&state, "name", uid->name); result_add_string (&state, "email", uid->email); result_add_string (&state, "comment", uid->comment); result_xml_tag_end (&state); /* uid */ uid = uid->next; } result_xml_tag_end (&state); /* uids */ result_xml_tag_end (&state); /* key */ gpgme_key_unref (key); } } result_xml_tag_end (&state); /* keylist */ gt_write_data (gt, xml_end, strlen (xml_end)); server_reset_fds (server); return err; } static const char hlp_getauditlog[] = "GETAUDITLOG [--html] [--with-help]\n" "\n" "Call the function gpgme_op_getauditlog with the given flags. Write\n" "the output to the object set by the last OUTPUT command."; static gpg_error_t cmd_getauditlog (assuan_context_t ctx, char *line) { struct server *server = assuan_get_pointer (ctx); gpg_error_t err; assuan_fd_t out_fd; char *out_fn; gpgme_data_t out_data; unsigned int flags = 0; out_fd = server->output_fd; out_fn = server->output_filename; if (out_fd == ASSUAN_INVALID_FD && !out_fn) return GPG_ERR_ASS_NO_OUTPUT; err = server_data_obj (out_fd, out_fn, 1, server->output_enc, &out_data, &server->output_stream); if (err) return err; if (strstr (line, "--html")) flags |= GPGME_AUDITLOG_HTML; if (strstr (line, "--with-help")) flags |= GPGME_AUDITLOG_WITH_HELP; err = gt_getauditlog (server->gt, out_data, flags); gpgme_data_release (out_data); server_reset_fds (server); return err; } static gpg_error_t cmd_vfs_mount (assuan_context_t ctx, char *line) { struct server *server = assuan_get_pointer (ctx); char *mount_dir; gpg_error_t err; mount_dir = strchr (line, ' '); if (mount_dir) { *(mount_dir++) = '\0'; while (*mount_dir == ' ') mount_dir++; } err = gt_vfs_mount (server->gt, line, mount_dir, 0); return err; } static gpg_error_t cmd_vfs_create (assuan_context_t ctx, char *line) { struct server *server = assuan_get_pointer (ctx); gpg_error_t err; char *end; end = strchr (line, ' '); if (end) { *(end++) = '\0'; while (*end == ' ') end++; } err = gt_vfs_create (server->gt, line, 0); return err; } static const char hlp_passwd[] = "PASSWD \n" "\n" "Ask the backend to change the passphrase for the key\n" "specified by USER-ID."; static gpg_error_t cmd_passwd (assuan_context_t ctx, char *line) { struct server *server = assuan_get_pointer (ctx); return gt_passwd (server->gt, line); } static gpg_error_t cmd_result (assuan_context_t ctx, char *line) { struct server *server = assuan_get_pointer (ctx); (void)line; return gt_result (server->gt, GT_RESULT_ALL); } /* STRERROR */ static gpg_error_t cmd_strerror (assuan_context_t ctx, char *line) { gpg_error_t err; char buf[100]; err = atoi (line); snprintf (buf, sizeof (buf), "%s <%s>", gpgme_strerror (err), gpgme_strsource (err)); return assuan_send_data (ctx, buf, strlen (buf)); } static gpg_error_t cmd_pubkey_algo_name (assuan_context_t ctx, char *line) { gpgme_pubkey_algo_t algo; char buf[100]; algo = atoi (line); snprintf (buf, sizeof (buf), "%s", gpgme_pubkey_algo_name (algo)); return assuan_send_data (ctx, buf, strlen (buf)); } static gpg_error_t cmd_hash_algo_name (assuan_context_t ctx, char *line) { gpgme_hash_algo_t algo; char buf[100]; algo = atoi (line); snprintf (buf, sizeof (buf), "%s", gpgme_hash_algo_name (algo)); return assuan_send_data (ctx, buf, strlen (buf)); } static const char hlp_identify[] = "IDENTIFY\n" "\n" "Identify the type of data set with the INPUT command."; static gpg_error_t cmd_identify (assuan_context_t ctx, char *line) { struct server *server = assuan_get_pointer (ctx); gpg_error_t err; assuan_fd_t inp_fd; char *inp_fn; gpgme_data_t inp_data; (void)line; inp_fd = server->input_fd; inp_fn = server->input_filename; if (inp_fd == ASSUAN_INVALID_FD && !inp_fn) return GPG_ERR_ASS_NO_INPUT; err = server_data_obj (inp_fd, inp_fn, 0, server->input_enc, &inp_data, &server->input_stream); if (err) return err; err = gt_identify (server->gt, inp_data); gpgme_data_release (inp_data); server_reset_fds (server); return err; } static const char hlp_spawn[] = "SPAWN PGM [args]\n" "\n" "Run program PGM with stdin connected to the INPUT source;\n" "stdout and stderr to the OUTPUT source."; static gpg_error_t cmd_spawn (assuan_context_t ctx, char *line) { struct server *server = assuan_get_pointer (ctx); gpg_error_t err; assuan_fd_t inp_fd; char *inp_fn; assuan_fd_t out_fd; char *out_fn; gpgme_data_t inp_data = NULL; gpgme_data_t out_data = NULL; inp_fd = server->input_fd; inp_fn = server->input_filename; out_fd = server->output_fd; out_fn = server->output_filename; if (inp_fd != ASSUAN_INVALID_FD || inp_fn) { err = server_data_obj (inp_fd, inp_fn, 0, server->input_enc, &inp_data, &server->input_stream); if (err) return err; } if (out_fd != ASSUAN_INVALID_FD || out_fn) { err = server_data_obj (out_fd, out_fn, 1, server->output_enc, &out_data, &server->output_stream); if (err) { gpgme_data_release (inp_data); return err; } } err = gt_spawn (server->gt, line, inp_data, out_data); gpgme_data_release (inp_data); gpgme_data_release (out_data); server_reset_fds (server); return err; } /* Tell the assuan library about our commands. */ static gpg_error_t register_commands (assuan_context_t ctx) { gpg_error_t err; static struct { const char *name; assuan_handler_t handler; const char * const help; } table[] = { /* RESET, BYE are implicit. */ { "VERSION", cmd_version, hlp_version }, /* TODO: Set engine info. */ { "ENGINE", cmd_engine, hlp_engine }, { "PROTOCOL", cmd_protocol, hlp_protocol }, { "SUB_PROTOCOL", cmd_sub_protocol, hlp_sub_protocol }, { "PINENTRY_MODE", cmd_pinentry_mode, hlp_pinentry_mode }, { "ARMOR", cmd_armor, hlp_armor }, { "TEXTMODE", cmd_textmode, hlp_textmode }, { "INCLUDE_CERTS", cmd_include_certs, hlp_include_certs }, { "KEYLIST_MODE", cmd_keylist_mode, hlp_keylist_mode }, { "INPUT", cmd_input, hlp_input }, { "OUTPUT", cmd_output, hlp_output }, { "MESSAGE", cmd_message, hlp_message }, { "RECIPIENT", cmd_recipient, hlp_recipient }, { "SIGNER", cmd_signer, hlp_signer }, { "SIGNERS_CLEAR", cmd_signers_clear, hlp_signers_clear }, /* TODO: SIGNOTATION missing. */ /* TODO: Could add wait interface if we allow more than one context */ /* and add _START variants. */ /* TODO: Could add data interfaces if we allow multiple data objects. */ { "DECRYPT", cmd_decrypt, hlp_decrypt }, { "DECRYPT_VERIFY", cmd_decrypt_verify, hlp_decrypt_verify }, { "ENCRYPT", cmd_encrypt, hlp_encrypt }, { "ENCRYPT_SIGN", cmd_sign_encrypt, hlp_sign_encrypt }, { "SIGN_ENCRYPT", cmd_sign_encrypt, hlp_sign_encrypt }, { "SIGN", cmd_sign, hlp_sign }, { "VERIFY", cmd_verify, hlp_verify }, { "IMPORT", cmd_import, hlp_import }, { "EXPORT", cmd_export, hlp_export }, { "GENKEY", cmd_genkey }, { "DELETE", cmd_delete }, /* TODO: EDIT, CARD_EDIT (with INQUIRE) */ { "KEYLIST", cmd_keylist, hlp_keylist }, { "LISTKEYS", cmd_keylist, hlp_keylist }, /* TODO: TRUSTLIST, TRUSTLIST_EXT */ { "GETAUDITLOG", cmd_getauditlog, hlp_getauditlog }, /* TODO: ASSUAN */ { "VFS_MOUNT", cmd_vfs_mount }, { "MOUNT", cmd_vfs_mount }, { "VFS_CREATE", cmd_vfs_create }, { "CREATE", cmd_vfs_create }, /* TODO: GPGCONF */ { "RESULT", cmd_result }, { "STRERROR", cmd_strerror }, { "PUBKEY_ALGO_NAME", cmd_pubkey_algo_name }, { "HASH_ALGO_NAME", cmd_hash_algo_name }, { "PASSWD", cmd_passwd, hlp_passwd }, { "IDENTIFY", cmd_identify, hlp_identify }, { "SPAWN", cmd_spawn, hlp_spawn }, { NULL } }; int idx; for (idx = 0; table[idx].name; idx++) { err = assuan_register_command (ctx, table[idx].name, table[idx].handler, table[idx].help); if (err) return err; } return 0; } void gpgme_server (gpgme_tool_t gt) { gpg_error_t err; assuan_fd_t filedes[2]; struct server server; static const char hello[] = ("GPGME-Tool " VERSION " ready"); memset (&server, 0, sizeof (server)); server.input_fd = ASSUAN_INVALID_FD; server.output_fd = ASSUAN_INVALID_FD; server.message_fd = ASSUAN_INVALID_FD; server.input_enc = GPGME_DATA_ENCODING_NONE; server.output_enc = GPGME_DATA_ENCODING_NONE; server.message_enc = GPGME_DATA_ENCODING_NONE; server.gt = gt; gt->write_status = server_write_status; gt->write_status_hook = &server; gt->write_data = server_write_data; gt->write_data_hook = &server; /* We use a pipe based server so that we can work from scripts. * assuan_init_pipe_server will automagically detect when we are * called with a socketpair and ignore FILEDES in this case. */ filedes[0] = assuan_fdopen (0); filedes[1] = assuan_fdopen (1); err = assuan_new (&server.assuan_ctx); if (err) log_error (1, err, "can't create assuan context"); assuan_set_pointer (server.assuan_ctx, &server); err = assuan_init_pipe_server (server.assuan_ctx, filedes); if (err) log_error (1, err, "can't initialize assuan server"); err = register_commands (server.assuan_ctx); if (err) log_error (1, err, "can't register assuan commands"); assuan_set_hello_line (server.assuan_ctx, hello); assuan_register_reset_notify (server.assuan_ctx, reset_notify); #define DBG_ASSUAN 0 if (DBG_ASSUAN) assuan_set_log_stream (server.assuan_ctx, log_stream); for (;;) { err = assuan_accept (server.assuan_ctx); if (err == -1) break; else if (err) { log_error (0, err, "assuan accept problem"); break; } err = assuan_process (server.assuan_ctx); if (err) log_error (0, err, "assuan processing failed"); } assuan_release (server.assuan_ctx); } static const char * my_strusage( int level ) { const char *p; switch (level) { case 11: p = "gpgme-tool"; break; case 13: p = PACKAGE_VERSION; break; case 14: p = "Copyright (C) 2015 g10 Code GmbH"; break; case 19: p = "Please report bugs to <" PACKAGE_BUGREPORT ">.\n"; break; case 1: case 40: p = "Usage: gpgme-tool [OPTIONS] [COMMANDS]"; break; case 41: p = "GPGME Tool -- Assuan server exposing GPGME operations\n"; break; case 42: p = "1"; /* Flag print 40 as part of 41. */ break; default: p = NULL; break; } return p; } int main (int argc, char *argv[]) { static ARGPARSE_OPTS opts[] = { ARGPARSE_c ('s', "server", "Server mode"), ARGPARSE_s_s(501, "gpg-binary", "|FILE|Use FILE for the GPG backend"), ARGPARSE_c (502, "lib-version", "Show library version"), ARGPARSE_end() }; ARGPARSE_ARGS pargs = { &argc, &argv, 0 }; enum { CMD_DEFAULT, CMD_SERVER, CMD_LIBVERSION } cmd = CMD_DEFAULT; const char *gpg_binary = NULL; struct gpgme_tool gt; gpg_error_t err; int needgt = 1; set_strusage (my_strusage); #ifdef HAVE_SETLOCALE setlocale (LC_ALL, ""); #endif gpgme_check_version (NULL); #ifdef LC_CTYPE gpgme_set_locale (NULL, LC_CTYPE, setlocale (LC_CTYPE, NULL)); #endif #ifdef LC_MESSAGES gpgme_set_locale (NULL, LC_MESSAGES, setlocale (LC_MESSAGES, NULL)); #endif log_init (); while (arg_parse (&pargs, opts)) { switch (pargs.r_opt) { case 's': cmd = CMD_SERVER; break; case 501: gpg_binary = pargs.r.ret_str; break; case 502: cmd = CMD_LIBVERSION; break; default: pargs.err = ARGPARSE_PRINT_WARNING; break; } } if (cmd == CMD_LIBVERSION) needgt = 0; if (needgt && gpg_binary) { if (access (gpg_binary, X_OK)) err = gpg_error_from_syserror (); else err = gpgme_set_engine_info (GPGME_PROTOCOL_OpenPGP, gpg_binary, NULL); if (err) log_error (1, err, "error witching OpenPGP engine to '%s'", gpg_binary); } if (needgt) gt_init (>); switch (cmd) { case CMD_DEFAULT: case CMD_SERVER: gpgme_server (>); break; case CMD_LIBVERSION: printf ("Version from header: %s (0x%06x)\n", GPGME_VERSION, GPGME_VERSION_NUMBER); printf ("Version from binary: %s\n", gpgme_check_version (NULL)); printf ("Copyright blurb ...:%s\n", gpgme_check_version ("\x01\x01")); break; } if (needgt) gpgme_release (gt.ctx); return 0; } diff --git a/tests/run-export.c b/tests/run-export.c index f071b8c2..3e328826 100644 --- a/tests/run-export.c +++ b/tests/run-export.c @@ -1,248 +1,249 @@ /* pgp-export.c - Helper to run an export command * Copyright (C) 2008, 2009 g10 Code GmbH * * This file is part of GPGME. * * GPGME is free software; you can redistribute it and/or modify it * under the terms of the GNU Lesser General Public License as * published by the Free Software Foundation; either version 2.1 of * the License, or (at your option) any later version. * * GPGME is distributed in the hope that it will be useful, but * WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU * Lesser General Public License for more details. * * You should have received a copy of the GNU Lesser General Public * License along with this program; if not, see . * SPDX-License-Identifier: LGPL-2.1-or-later */ /* We need to include config.h so that we know whether we are building with large file system (LFS) support. */ #ifdef HAVE_CONFIG_H #include #endif #include #include #include #include #define PGM "run-export" #include "run-support.h" static int verbose; static gpg_error_t status_cb (void *opaque, const char *keyword, const char *value) { (void)opaque; fprintf (stderr, "status_cb: %s %s\n", keyword, value); return 0; } static int show_usage (int ex) { fputs ("usage: " PGM " [options] USERIDS\n\n" "Options:\n" " --verbose run in verbose mode\n" " --status print status lines from the backend\n" " --openpgp use OpenPGP protocol (default)\n" " --cms use X.509 protocol\n" " --ssh export as ssh public key\n" " --extern send keys to the keyserver (TAKE CARE!)\n" " --secret export secret keys instead of public keys\n" + " --secret-subkey export secret subkeys instead of public keys\n" " --raw use PKCS#1 as secret key format\n" " --pkcs12 use PKCS#12 as secret key format\n" , stderr); exit (ex); } int main (int argc, char **argv) { int last_argc = -1; gpgme_error_t err; gpgme_ctx_t ctx; gpgme_key_t key; gpgme_keylist_result_t result; gpgme_key_t keyarray[100]; int keyidx = 0; gpgme_data_t out; gpgme_protocol_t protocol = GPGME_PROTOCOL_OpenPGP; gpgme_export_mode_t mode = 0; int print_status = 0; if (argc) { argc--; argv++; } while (argc && last_argc != argc ) { last_argc = argc; if (!strcmp (*argv, "--")) { argc--; argv++; break; } else if (!strcmp (*argv, "--help")) show_usage (0); else if (!strcmp (*argv, "--verbose")) { verbose = 1; argc--; argv++; } else if (!strcmp (*argv, "--status")) { print_status = 1; argc--; argv++; } else if (!strcmp (*argv, "--openpgp")) { protocol = GPGME_PROTOCOL_OpenPGP; argc--; argv++; } else if (!strcmp (*argv, "--cms")) { protocol = GPGME_PROTOCOL_CMS; argc--; argv++; } else if (!strcmp (*argv, "--extern")) { mode |= GPGME_EXPORT_MODE_EXTERN; argc--; argv++; } else if (!strcmp (*argv, "--ssh")) { mode |= GPGME_EXPORT_MODE_SSH; argc--; argv++; } else if (!strcmp (*argv, "--secret")) { mode |= GPGME_EXPORT_MODE_SECRET; argc--; argv++; } else if (!strcmp (*argv, "--secret-subkey")) { mode |= GPGME_EXPORT_MODE_SECRET_SUBKEY; argc--; argv++; } else if (!strcmp (*argv, "--raw")) { mode |= GPGME_EXPORT_MODE_RAW; argc--; argv++; } else if (!strcmp (*argv, "--pkcs12")) { mode |= GPGME_EXPORT_MODE_PKCS12; argc--; argv++; } else if (!strncmp (*argv, "--", 2)) show_usage (1); } if (!argc) show_usage (1); init_gpgme (protocol); err = gpgme_new (&ctx); fail_if_err (err); gpgme_set_protocol (ctx, protocol); if (print_status) { gpgme_set_status_cb (ctx, status_cb, NULL); gpgme_set_ctx_flag (ctx, "full-status", "1"); } err = gpgme_data_new (&out); fail_if_err (err); if ((mode & GPGME_EXPORT_MODE_SSH)) { mode = GPGME_EXPORT_MODE_SSH; /* Set only this bit for this test. */ keyarray[0] = NULL; err = gpgme_op_export_ext (ctx, (const char**)argv, mode, out); fail_if_err (err); } else if ((mode & GPGME_EXPORT_MODE_SECRET_SUBKEY)) { keyarray[0] = NULL; printf ("exporting secret subkeys!\n"); gpgme_set_armor (ctx, 1); err = gpgme_op_export_ext (ctx, (const char**)argv, mode, out); fail_if_err (err); } else { /* Lookup the keys as required by the export_keys function. */ err = gpgme_op_keylist_ext_start (ctx, (const char**)argv, 0, 0); fail_if_err (err); while (!(err = gpgme_op_keylist_next (ctx, &key))) { printf ("keyid: %s (fpr: %s)\n", key->subkeys?nonnull (key->subkeys->keyid):"?", key->subkeys?nonnull (key->subkeys->fpr):"?"); if (keyidx < DIM (keyarray)-1) keyarray[keyidx++] = key; else { fprintf (stderr, PGM": too many keys" "- skipping this key\n"); gpgme_key_unref (key); } } if (gpgme_err_code (err) != GPG_ERR_EOF) fail_if_err (err); err = gpgme_op_keylist_end (ctx); fail_if_err (err); keyarray[keyidx] = NULL; result = gpgme_op_keylist_result (ctx); if (result->truncated) { fprintf (stderr, PGM ": key listing unexpectedly truncated\n"); exit (1); } /* Now for the actual export. */ if ((mode & GPGME_EXPORT_MODE_EXTERN)) printf ("sending keys to keyserver\n"); if ((mode & GPGME_EXPORT_MODE_SECRET)) printf ("exporting secret keys!\n"); gpgme_set_armor (ctx, 1); err = gpgme_op_export_keys (ctx, keyarray, mode, (mode & GPGME_KEYLIST_MODE_EXTERN)? NULL:out); fail_if_err (err); } fflush (NULL); if (!(mode & GPGME_KEYLIST_MODE_EXTERN)) { fputs ("Begin Result:\n", stdout); print_data (out); fputs ("End Result.\n", stdout); } /* Cleanup. */ gpgme_data_release (out); for (keyidx=0; keyarray[keyidx]; keyidx++) gpgme_key_unref (keyarray[keyidx]); gpgme_release (ctx); return 0; }