214
214
fprintf(stderr, "bad gpgme_op_decrypt: %s: %s\n",
215
215
gpgme_strsource(rc), gpgme_strerror(rc));
216
216
plaintext_length = -1;
218
gpgme_decrypt_result_t result;
219
result = gpgme_op_decrypt_result(ctx);
221
fprintf(stderr, "gpgme_op_decrypt_result failed\n");
223
fprintf(stderr, "Unsupported algorithm: %s\n",
224
result->unsupported_algorithm);
225
fprintf(stderr, "Wrong key usage: %u\n",
226
result->wrong_key_usage);
227
if(result->file_name != NULL){
228
fprintf(stderr, "File name: %s\n", result->file_name);
230
gpgme_recipient_t recipient;
231
recipient = result->recipients;
233
while(recipient != NULL){
234
fprintf(stderr, "Public key algorithm: %s\n",
235
gpgme_pubkey_algo_name(recipient->pubkey_algo));
236
fprintf(stderr, "Key ID: %s\n", recipient->keyid);
237
fprintf(stderr, "Secret key available: %s\n",
238
recipient->status == GPG_ERR_NO_SECKEY
240
recipient = recipient->next;
245
217
goto decrypt_end;
249
221
fprintf(stderr, "Decryption of OpenPGP data succeeded\n");
225
gpgme_decrypt_result_t result;
226
result = gpgme_op_decrypt_result(ctx);
228
fprintf(stderr, "gpgme_op_decrypt_result failed\n");
230
fprintf(stderr, "Unsupported algorithm: %s\n",
231
result->unsupported_algorithm);
232
fprintf(stderr, "Wrong key usage: %u\n",
233
result->wrong_key_usage);
234
if(result->file_name != NULL){
235
fprintf(stderr, "File name: %s\n", result->file_name);
237
gpgme_recipient_t recipient;
238
recipient = result->recipients;
240
while(recipient != NULL){
241
fprintf(stderr, "Public key algorithm: %s\n",
242
gpgme_pubkey_algo_name(recipient->pubkey_algo));
243
fprintf(stderr, "Key ID: %s\n", recipient->keyid);
244
fprintf(stderr, "Secret key available: %s\n",
245
recipient->status == GPG_ERR_NO_SECKEY
247
recipient = recipient->next;
252
253
/* Seek back to the beginning of the GPGME plaintext data buffer */
253
254
if (gpgme_data_seek(dh_plain, (off_t) 0, SEEK_SET) == -1){
254
255
perror("pgpme_data_seek");
773
775
const char *pubkeyname = "pubkey.txt";
774
776
const char *seckeyname = "seckey.txt";
775
777
mandos_context mc = { .simple_poll = NULL, .server = NULL,
776
.dh_bits = 1024, .priority = "SECURE256"
777
":!CTYPE-X.509:+CTYPE-OPENPGP" };
778
.dh_bits = 1024, .priority = "SECURE256"};
778
779
bool gnutls_initalized = false;
782
783
{ .name = "debug", .key = 128,
783
784
.doc = "Debug mode", .group = 3 },
784
785
{ .name = "connect", .key = 'c',
785
.arg = "ADDRESS:PORT",
786
.doc = "Connect directly to a specific Mandos server",
787
.doc = "Connect directly to a sepcified mandos server",
788
789
{ .name = "interface", .key = 'i',
790
.doc = "Interface that will be used to search for Mandos"
791
.doc = "Interface that Avahi will conntect through",
793
793
{ .name = "keydir", .key = 'd',
795
.doc = "Directory to read the OpenPGP key files from",
795
.doc = "Directory where the openpgp keyring is",
797
797
{ .name = "seckey", .key = 's',
799
.doc = "OpenPGP secret key file base name",
799
.doc = "Secret openpgp key for gnutls authentication",
801
801
{ .name = "pubkey", .key = 'p',
803
.doc = "OpenPGP public key file base name",
803
.doc = "Public openpgp key for gnutls authentication",
805
805
{ .name = "dh-bits", .key = 129,
807
.doc = "Bit length of the prime number used in the"
808
" Diffie-Hellman key exchange",
807
.doc = "dh-bits to use in gnutls communication",
810
809
{ .name = "priority", .key = 130,
812
.doc = "GnuTLS priority string for the TLS handshake",
811
.doc = "GNUTLS priority", .group = 1 },
817
816
error_t parse_opt (int key, char *arg,
818
817
struct argp_state *state) {
819
818
/* Get the INPUT argument from `argp_parse', which we know is
820
819
a pointer to our plugin list pointer. */
822
case 128: /* --debug */
825
case 'c': /* --connect */
826
825
connect_to = arg;
828
case 'i': /* --interface */
831
case 'd': /* --keydir */
834
case 's': /* --seckey */
835
834
seckeyname = arg;
837
case 'p': /* --pubkey */
838
837
pubkeyname = arg;
840
case 129: /* --dh-bits */
842
841
mc.dh_bits = (unsigned int) strtol(arg, NULL, 10);
861
860
struct argp argp = { .options = options, .parser = parse_opt,
863
862
.doc = "Mandos client -- Get and decrypt"
864
" passwords from a Mandos server" };
863
" passwords from mandos server" };
865
864
ret = argp_parse (&argp, argc, argv, 0, 0, NULL);
866
865
if (ret == ARGP_ERR_UNKNOWN){
867
866
fprintf(stderr, "Unknown error while parsing arguments\n");
990
989
config.publish_addresses = 0;
991
990
config.publish_workstation = 0;
992
991
config.publish_domain = 0;
994
993
/* Allocate a new server */
995
994
mc.server = avahi_server_new(avahi_simple_poll_get
996
995
(mc.simple_poll), &config, NULL,
999
998
/* Free the Avahi configuration data */
1000
999
avahi_server_config_free(&config);