diff options
author | Werner Koch <[email protected]> | 2010-03-12 18:03:02 +0000 |
---|---|---|
committer | Werner Koch <[email protected]> | 2010-03-12 18:03:02 +0000 |
commit | 6e3602b556b6ac4dc32877a2f800e3322294976d (patch) | |
tree | ba5e229df9c1e7ed75d1eb6785f7a75bc517c783 /src/passwd.c | |
parent | Hack to start the agent as a side-effect of a secret key listing (diff) | |
download | gpgme-6e3602b556b6ac4dc32877a2f800e3322294976d.tar.gz gpgme-6e3602b556b6ac4dc32877a2f800e3322294976d.zip |
Detect old gpg versions not featuring the --passwd command.
Diffstat (limited to 'src/passwd.c')
-rw-r--r-- | src/passwd.c | 47 |
1 files changed, 44 insertions, 3 deletions
diff --git a/src/passwd.c b/src/passwd.c index 67668770..ab61b4a4 100644 --- a/src/passwd.c +++ b/src/passwd.c @@ -27,6 +27,14 @@ #include "context.h" #include "ops.h" + +typedef struct +{ + int success_seen; + int error_seen; +} *op_data_t; + + /* Parse an error status line and return the error code. */ static gpgme_error_t @@ -63,16 +71,39 @@ static gpgme_error_t passwd_status_handler (void *priv, gpgme_status_code_t code, char *args) { gpgme_ctx_t ctx = (gpgme_ctx_t) priv; - gpgme_error_t err = 0; + gpgme_error_t err; + void *hook; + op_data_t opd; - (void)ctx; + err = _gpgme_op_data_lookup (ctx, OPDATA_PASSWD, &hook, -1, NULL); + opd = hook; + if (err) + return err; switch (code) { case GPGME_STATUS_ERROR: err = parse_error (args); + if (err) + opd->error_seen = 1; break; - + + case GPGME_STATUS_SUCCESS: + opd->success_seen = 1; + break; + + case GPGME_STATUS_EOF: + /* In case the OpenPGP engine does not properly implement the + passwd command we won't get a success status back and thus we + conclude that this operation is not supported. This is for + example the case for GnuPG < 2.0.16. Note that this test is + obsolete for assuan based engines because they will properly + return an error for an unknown command. */ + if (ctx->protocol == GPGME_PROTOCOL_OpenPGP + && !opd->error_seen && !opd->success_seen) + err = gpg_error (GPG_ERR_NOT_SUPPORTED); + break; + default: break; } @@ -86,6 +117,8 @@ passwd_start (gpgme_ctx_t ctx, int synchronous, gpgme_key_t key, unsigned int flags) { gpgme_error_t err; + void *hook; + op_data_t opd; if (!key) return gpg_error (GPG_ERR_INV_VALUE); @@ -96,6 +129,14 @@ passwd_start (gpgme_ctx_t ctx, int synchronous, gpgme_key_t key, if (err) return err; + err = _gpgme_op_data_lookup (ctx, OPDATA_PASSWD, &hook, sizeof (*opd), NULL); + opd = hook; + if (err) + return err; + + opd->success_seen = 0; + opd->error_seen = 0; + _gpgme_engine_set_status_handler (ctx->engine, passwd_status_handler, ctx); return _gpgme_engine_op_passwd (ctx->engine, key, flags); |