From mboxrd@z Thu Jan 1 00:00:00 1970 X-Msuck: nntp://news.gmane.io/gmane.emacs.gnus.general/55297 Path: main.gmane.org!not-for-mail From: Simon Josefsson Newsgroups: gmane.emacs.gnus.general Subject: Re: Cache passwords Date: Sun, 21 Dec 2003 12:52:39 +0100 Sender: ding-owner@lists.math.uh.edu Message-ID: References: <87vfoa5she.fsf@emptyhost.emptydomain.de> NNTP-Posting-Host: deer.gmane.org Mime-Version: 1.0 Content-Type: multipart/mixed; boundary="=-=-=" X-Trace: sea.gmane.org 1072007624 32281 80.91.224.253 (21 Dec 2003 11:53:44 GMT) X-Complaints-To: usenet@sea.gmane.org NNTP-Posting-Date: Sun, 21 Dec 2003 11:53:44 +0000 (UTC) Cc: ding@gnus.org Original-X-From: ding-owner+M3837=ding+2Daccount=gmane.org@lists.math.uh.edu Sun Dec 21 12:53:41 2003 Return-path: Original-Received: from malifon.math.uh.edu ([129.7.128.13]) by deer.gmane.org with esmtp (Exim 3.35 #1 (Debian)) id 1AY29V-0004pg-00 for ; Sun, 21 Dec 2003 12:53:41 +0100 Original-Received: from localhost ([127.0.0.1] helo=lists.math.uh.edu) by malifon.math.uh.edu with smtp (Exim 3.20 #1) id 1AY29U-0004cG-01 for ding-account@gmane.org; Sun, 21 Dec 2003 05:53:40 -0600 Original-Received: from justine.libertine.org ([66.139.78.221]) by malifon.math.uh.edu with esmtp (Exim 3.20 #1) id 1AY29M-0004bh-00 for ding@lists.math.uh.edu; Sun, 21 Dec 2003 05:53:32 -0600 Original-Received: from yxa.extundo.com (178.230.13.217.in-addr.dgcsystems.net [217.13.230.178]) by justine.libertine.org (Postfix) with ESMTP id 101C93A0089 for ; Sun, 21 Dec 2003 05:53:00 -0600 (CST) Original-Received: from latte.josefsson.org (yxa.extundo.com [217.13.230.178]) (authenticated bits=0) by yxa.extundo.com (8.12.10/8.12.10) with ESMTP id hBLBqvAU001942 (version=TLSv1/SSLv3 cipher=EDH-RSA-DES-CBC3-SHA bits=168 verify=NO); Sun, 21 Dec 2003 12:52:58 +0100 Original-To: Kai Grossjohann Mail-Copies-To: nobody X-Hashcash: 0:031221:kai@emptydomain.de:c96da50c52b904ab X-Hashcash: 0:031221:ding@gnus.org:e1dec9d37d2db6b0 In-Reply-To: <87vfoa5she.fsf@emptyhost.emptydomain.de> (Kai Grossjohann's message of "Sun, 21 Dec 2003 11:18:37 +0000") User-Agent: Gnus/5.1003 (Gnus v5.10.3) Emacs/21.3.50 (gnu/linux) Precedence: bulk Xref: main.gmane.org gmane.emacs.gnus.general:55297 X-Report-Spam: http://spam.gmane.org/gmane.emacs.gnus.general:55297 --=-=-= Kai Grossjohann writes: > I'm thinking about augmenting Tramp with a multi-connection mode. > What does this have to do with Gnus, you ask? Well, opening a > connection to a remote host often means that the user has to enter a > password (or five). I would like to make it convenient for the user > to open more connections, so I'd like to cache the password that the > user typed. > > Is there something in Gnus or PGG or mailcrypt that could help me with > this? I guess I need some key (a string I guess) to store each > password under. And I need a way of retrieving the password later. There is code in pgg.el for this, but perhaps depending on it in tramp isn't the best idea. It could be separated. How about a password.el? > And some security of one kind of another would be nice, too. Left as an exercise to the reader. --=-=-= Content-Type: application/emacs-lisp Content-Disposition: attachment; filename=password.el Content-Transfer-Encoding: quoted-printable ;;; password.el --- Read passwords from user, possibly using a password cac= he. ;; Copyright (C) 1999, 2000, 2003 Free Software Foundation, Inc. ;; Author: Simon Josefsson ;; Created: 2003-12-21 ;; Keywords: password cache passphrase key ;; This file is part of GNU Emacs. ;; GNU Emacs is free software; you can redistribute it and/or modify ;; it under the terms of the GNU General Public License as published by ;; the Free Software Foundation; either version 2, or (at your option) ;; any later version. ;; GNU Emacs is distributed in the hope that it will be useful, ;; but WITHOUT ANY WARRANTY; without even the implied warranty of ;; MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the ;; GNU General Public License for more details. ;; You should have received a copy of the GNU General Public License ;; along with GNU Emacs; see the file COPYING. If not, write to the ;; Free Software Foundation, Inc., 59 Temple Place - Suite 330, ;; Boston, MA 02111-1307, USA. ;;; Commentary: ;; Greatly influenced by pgg.el written by Daiki Ueno, with timer ;; fixes for XEmacs by Katsumi Yamaoka. In fact, this is mostly just ;; a rip-off. ;; ;; (password-read "Password? " "test") ;; ;; Minibuffer prompt for password. ;; =3D> "foo" ;; ;; (password-cache-add "test" "foo") ;; =3D> nil ;; ;; (password-read "Password? " "test") ;; ;; No minibuffer prompt ;; =3D> "foo" ;; ;; (password-read "Password? " "test") ;; ;; No minibuffer prompt ;; =3D> "foo" ;; ;; ;; Wait `password-cache-expiry' seconds. ;; ;; (password-read "Password? " "test") ;; ;; Minibuffer prompt for password is back. ;; =3D> "foo" ;;; Code: (autoload 'run-at-time "timer") (eval-when-compile (require 'cl)) (defcustom password-cache t "Whether to cache passwords." :group 'password :type 'boolean) (defcustom password-cache-expiry 16 "How many seconds passwords are cached, or nil to disable expiring. Whether passwords are cached at all is controlled by `password-cache'." :group 'password :type '(choice (const :tag "Never" nil) (integer :tag "Seconds"))) (defvar password-data (make-vector 7 0)) (defun password-read (prompt &optional key) "Read password, for use with KEY, from user, or from cache if wanted. KEY indicate the purpose of the password, so the cache can separate passwords. The cache is not used if KEY is nil. It is typically a string. The variable `password-cache' control whether the cache is used." (or (and password-cache key (symbol-value (intern-soft key password-data))) (read-passwd prompt))) (eval-when-compile (defvar itimer-process) (defvar itimer-timer) (autoload 'delete-itimer "itimer") (autoload 'itimer-driver-start "itimer") (autoload 'itimer-value "itimer") (autoload 'set-itimer-function "itimer") (autoload 'set-itimer-function-arguments "itimer") (autoload 'set-itimer-restart "itimer") (autoload 'start-itimer "itimer")) (eval-and-compile (defalias 'password-run-at-time (if (featurep 'xemacs) (if (condition-case nil (progn (unless (or itimer-process itimer-timer) (itimer-driver-start)) ;; Check whether there is a bug to which the difference of ;; the present time and the time when the itimer driver was ;; woken up is subtracted from the initial itimer value. (let* ((inhibit-quit t) (ctime (current-time)) (itimer-timer-last-wakeup (prog1 ctime (setcar ctime (1- (car ctime))))) (itimer-list nil) (itimer (start-itimer "password-run-at-time" 'ignore 5))) (sleep-for 0.1) ;; Accept the timeout interrupt. (prog1 (> (itimer-value itimer) 0) (delete-itimer itimer)))) (error nil)) (lambda (time repeat function &rest args) "Emulating function run as `run-at-time'. TIME should be nil meaning now, or a number of seconds from now. Return an itimer object which can be used in either `delete-itimer' or `cancel-timer'." (apply #'start-itimer "password-run-at-time" function (if time (max time 1e-9) 1e-9) repeat nil t args)) (lambda (time repeat function &rest args) "Emulating function run as `run-at-time' in the right way. TIME should be nil meaning now, or a number of seconds from now. Return an itimer object which can be used in either `delete-itimer' or `cancel-timer'." (let ((itimers (list nil))) (setcar itimers (apply #'start-itimer "password-run-at-time" (lambda (itimers repeat function &rest args) (let ((itimer (car itimers))) (if repeat (progn (set-itimer-function itimer (lambda (itimer repeat function &rest args) (set-itimer-restart itimer repeat) (set-itimer-function itimer function) (set-itimer-function-arguments itimer args) (apply function args))) (set-itimer-function-arguments itimer (append (list itimer repeat function) args))) (set-itimer-function itimer (lambda (itimer function &rest args) (delete-itimer itimer) (apply function args))) (set-itimer-function-arguments itimer (append (list itimer function) args))))) 1e-9 (if time (max time 1e-9) 1e-9) nil t itimers repeat function args))))) 'run-at-time))) (defun password-cache-remove (key) "Remove password indexed by KEY from password cache. This is typically run be a timer setup from `password-cache-add', but can be invoked at any time to forcefully remove passwords from the cache. This may be useful when it has been detected that a password is invalid, so that `password-read' query the user again." (let ((password (symbol-value (intern-soft key password-data)))) (when password (fillarray password ?_) (unintern key password-data)))) (defun password-cache-add (key password) "Add password to cache. The password is removed by a timer after `password-cache-expiry' seconds." (set (intern key password-data) password) (when password-cache-expiry (password-run-at-time password-cache-expiry nil #'password-cache-remove key)) nil) (provide 'password) ;;; password.el ends here --=-=-=--