1516
1515
__attribute__((nonnull))
1517
1516
void run_network_hooks(const char *mode, const char *interface,
1518
1517
const float delay){
1519
struct dirent **direntries = NULL;
1520
if(hookdir_fd == -1){
1521
hookdir_fd = open(hookdir, O_RDONLY);
1522
if(hookdir_fd == -1){
1523
if(errno == ENOENT){
1525
fprintf_plus(stderr, "Network hook directory \"%s\" not"
1526
" found\n", hookdir);
1529
perror_plus("open");
1535
#if __GLIBC_PREREQ(2, 15)
1536
int numhooks = scandirat(hookdir_fd, ".", &direntries,
1537
runnable_hook, alphasort);
1538
#else /* not __GLIBC_PREREQ(2, 15) */
1539
int numhooks = scandir(hookdir, &direntries, runnable_hook,
1541
#endif /* not __GLIBC_PREREQ(2, 15) */
1542
#else /* not __GLIBC__ */
1543
int numhooks = scandir(hookdir, &direntries, runnable_hook,
1545
#endif /* not __GLIBC__ */
1518
struct dirent **direntries;
1519
int numhooks = scandir(hookdir, &direntries, runnable_hook,
1546
1521
if(numhooks == -1){
1547
perror_plus("scandir");
1550
struct dirent *direntry;
1552
int devnull = open("/dev/null", O_RDONLY);
1553
for(int i = 0; i < numhooks; i++){
1554
direntry = direntries[i];
1556
fprintf_plus(stderr, "Running network hook \"%s\"\n",
1522
if(errno == ENOENT){
1524
fprintf_plus(stderr, "Network hook directory \"%s\" not"
1525
" found\n", hookdir);
1528
perror_plus("scandir");
1559
pid_t hook_pid = fork();
1562
/* Raise privileges */
1563
errno = raise_privileges_permanently();
1565
perror_plus("Failed to raise privileges");
1572
perror_plus("setgid");
1575
/* Reset supplementary groups */
1577
ret = setgroups(0, NULL);
1579
perror_plus("setgroups");
1582
ret = dup2(devnull, STDIN_FILENO);
1584
perror_plus("dup2(devnull, STDIN_FILENO)");
1587
ret = close(devnull);
1589
perror_plus("close");
1592
ret = dup2(STDERR_FILENO, STDOUT_FILENO);
1594
perror_plus("dup2(STDERR_FILENO, STDOUT_FILENO)");
1597
ret = setenv("MANDOSNETHOOKDIR", hookdir, 1);
1599
perror_plus("setenv");
1602
ret = setenv("DEVICE", interface, 1);
1604
perror_plus("setenv");
1607
ret = setenv("VERBOSITY", debug ? "1" : "0", 1);
1609
perror_plus("setenv");
1612
ret = setenv("MODE", mode, 1);
1614
perror_plus("setenv");
1618
ret = asprintf(&delaystring, "%f", (double)delay);
1531
struct dirent *direntry;
1533
int devnull = open("/dev/null", O_RDONLY);
1534
for(int i = 0; i < numhooks; i++){
1535
direntry = direntries[i];
1536
char *fullname = NULL;
1537
ret = asprintf(&fullname, "%s/%s", hookdir, direntry->d_name);
1620
1539
perror_plus("asprintf");
1623
ret = setenv("DELAY", delaystring, 1);
1543
fprintf_plus(stderr, "Running network hook \"%s\"\n",
1546
pid_t hook_pid = fork();
1549
/* Raise privileges */
1550
if(raise_privileges_permanently() != 0){
1551
perror_plus("Failed to raise privileges");
1558
perror_plus("setgid");
1561
/* Reset supplementary groups */
1563
ret = setgroups(0, NULL);
1565
perror_plus("setgroups");
1568
ret = dup2(devnull, STDIN_FILENO);
1570
perror_plus("dup2(devnull, STDIN_FILENO)");
1573
ret = close(devnull);
1575
perror_plus("close");
1578
ret = dup2(STDERR_FILENO, STDOUT_FILENO);
1580
perror_plus("dup2(STDERR_FILENO, STDOUT_FILENO)");
1583
ret = setenv("MANDOSNETHOOKDIR", hookdir, 1);
1585
perror_plus("setenv");
1588
ret = setenv("DEVICE", interface, 1);
1590
perror_plus("setenv");
1593
ret = setenv("VERBOSITY", debug ? "1" : "0", 1);
1595
perror_plus("setenv");
1598
ret = setenv("MODE", mode, 1);
1600
perror_plus("setenv");
1604
ret = asprintf(&delaystring, "%f", (double)delay);
1606
perror_plus("asprintf");
1609
ret = setenv("DELAY", delaystring, 1);
1612
perror_plus("setenv");
1625
1615
free(delaystring);
1626
perror_plus("setenv");
1630
if(connect_to != NULL){
1631
ret = setenv("CONNECT", connect_to, 1);
1633
perror_plus("setenv");
1637
int hook_fd = openat(hookdir_fd, direntry->d_name, O_RDONLY);
1639
perror_plus("openat");
1640
_exit(EXIT_FAILURE);
1642
if((int)TEMP_FAILURE_RETRY(close(hookdir_fd)) == -1){
1643
perror_plus("close");
1644
_exit(EXIT_FAILURE);
1646
if(fexecve(hook_fd, (char *const []){ direntry->d_name, NULL },
1648
perror_plus("fexecve");
1649
_exit(EXIT_FAILURE);
1653
if(TEMP_FAILURE_RETRY(waitpid(hook_pid, &status, 0)) == -1){
1654
perror_plus("waitpid");
1657
if(WIFEXITED(status)){
1658
if(WEXITSTATUS(status) != 0){
1659
fprintf_plus(stderr, "Warning: network hook \"%s\" exited"
1660
" with status %d\n", direntry->d_name,
1661
WEXITSTATUS(status));
1664
} else if(WIFSIGNALED(status)){
1665
fprintf_plus(stderr, "Warning: network hook \"%s\" died by"
1666
" signal %d\n", direntry->d_name,
1616
if(connect_to != NULL){
1617
ret = setenv("CONNECT", connect_to, 1);
1619
perror_plus("setenv");
1623
if(execl(fullname, direntry->d_name, mode, NULL) == -1){
1624
perror_plus("execl");
1625
_exit(EXIT_FAILURE);
1670
fprintf_plus(stderr, "Warning: network hook \"%s\""
1671
" crashed\n", direntry->d_name);
1676
fprintf_plus(stderr, "Network hook \"%s\" ran successfully\n",
1681
if((int)TEMP_FAILURE_RETRY(close(hookdir_fd)) == -1){
1682
perror_plus("close");
1629
if(TEMP_FAILURE_RETRY(waitpid(hook_pid, &status, 0)) == -1){
1630
perror_plus("waitpid");
1634
if(WIFEXITED(status)){
1635
if(WEXITSTATUS(status) != 0){
1636
fprintf_plus(stderr, "Warning: network hook \"%s\" exited"
1637
" with status %d\n", direntry->d_name,
1638
WEXITSTATUS(status));
1642
} else if(WIFSIGNALED(status)){
1643
fprintf_plus(stderr, "Warning: network hook \"%s\" died by"
1644
" signal %d\n", direntry->d_name,
1649
fprintf_plus(stderr, "Warning: network hook \"%s\""
1650
" crashed\n", direntry->d_name);
1657
fprintf_plus(stderr, "Network hook \"%s\" ran successfully\n",
1689
1665
__attribute__((nonnull, warn_unused_result))
2613
2572
/* Removes the GPGME temp directory and all files inside */
2614
2573
if(tempdir != NULL){
2615
2574
struct dirent **direntries = NULL;
2616
int tempdir_fd = (int)TEMP_FAILURE_RETRY(open(tempdir, O_RDONLY |
2618
if(tempdir_fd == -1){
2619
perror_plus("open");
2622
#if __GLIBC_PREREQ(2, 15)
2623
int numentries = scandirat(tempdir_fd, ".", &direntries,
2624
notdotentries, alphasort);
2625
#else /* not __GLIBC_PREREQ(2, 15) */
2626
int numentries = scandir(tempdir, &direntries, notdotentries,
2628
#endif /* not __GLIBC_PREREQ(2, 15) */
2629
#else /* not __GLIBC__ */
2630
int numentries = scandir(tempdir, &direntries, notdotentries,
2632
#endif /* not __GLIBC__ */
2633
if(numentries >= 0){
2634
for(int i = 0; i < numentries; i++){
2635
ret = unlinkat(tempdir_fd, direntries[i]->d_name, 0);
2637
fprintf_plus(stderr, "unlinkat(open(\"%s\", O_RDONLY),"
2638
" \"%s\", 0): %s\n", tempdir,
2639
direntries[i]->d_name, strerror(errno));
2643
/* need to clean even if 0 because man page doesn't specify */
2645
if(numentries == -1){
2646
perror_plus("scandir");
2648
ret = rmdir(tempdir);
2649
if(ret == -1 and errno != ENOENT){
2650
perror_plus("rmdir");
2575
struct dirent *direntry = NULL;
2576
int numentries = scandir(tempdir, &direntries, notdotentries,
2579
for(int i = 0; i < numentries; i++){
2580
direntry = direntries[i];
2581
char *fullname = NULL;
2582
ret = asprintf(&fullname, "%s/%s", tempdir,
2585
perror_plus("asprintf");
2588
ret = remove(fullname);
2590
fprintf_plus(stderr, "remove(\"%s\"): %s\n", fullname,
2653
TEMP_FAILURE_RETRY(close(tempdir_fd));
2597
/* need to clean even if 0 because man page doesn't specify */
2599
if(numentries == -1){
2600
perror_plus("scandir");
2602
ret = rmdir(tempdir);
2603
if(ret == -1 and errno != ENOENT){
2604
perror_plus("rmdir");