64
76
struct sigaction old_action,
65
77
new_action = { .sa_handler = termination_handler,
69
static struct option long_options[] = {
70
{"debug", no_argument, (int *)&debug, 1},
71
{"prefix", required_argument, 0, 'p'},
75
ret = getopt_long (argc, argv, "p:", long_options, &option_index);
80
struct argp_option options[] = {
81
{ .name = "prefix", .key = 'p',
82
.arg = "PREFIX", .flags = 0,
83
.doc = "Prefix shown before the prompt", .group = 2 },
84
{ .name = "debug", .key = 128,
85
.doc = "Debug mode", .group = 3 },
89
error_t parse_opt (int key, char *arg, struct argp_state *state){
103
return ARGP_ERR_UNKNOWN;
88
fprintf(stderr, "bad arguments\n");
108
struct argp argp = { .options = options, .parser = parse_opt,
110
.doc = "Mandos password-prompt -- Read and"
111
" output a password" };
112
ret = argp_parse(&argp, argc, argv, 0, 0, NULL);
113
if(ret == ARGP_ERR_UNKNOWN){
114
fprintf(stderr, "Unknown error while parsing arguments\n");
94
120
fprintf(stderr, "Starting %s\n", argv[0]);
97
123
fprintf(stderr, "Storing current terminal attributes\n");
100
if (tcgetattr(STDIN_FILENO, &t_old) != 0){
126
if(tcgetattr(STDIN_FILENO, &t_old) != 0){
101
128
return EXIT_FAILURE;
104
131
sigemptyset(&new_action.sa_mask);
105
sigaddset(&new_action.sa_mask, SIGINT);
106
sigaddset(&new_action.sa_mask, SIGQUIT);
107
sigaddset(&new_action.sa_mask, SIGHUP);
108
sigaddset(&new_action.sa_mask, SIGTERM);
109
sigaction(SIGINT, NULL, &old_action);
110
if (old_action.sa_handler != SIG_IGN)
111
sigaction(SIGINT, &new_action, NULL);
112
sigaction(SIGQUIT, NULL, &old_action);
113
if (old_action.sa_handler != SIG_IGN)
114
sigaction(SIGQUIT, &new_action, NULL);
115
sigaction(SIGHUP, NULL, &old_action);
116
if (old_action.sa_handler != SIG_IGN)
117
sigaction(SIGHUP, &new_action, NULL);
118
sigaction(SIGTERM, NULL, &old_action);
119
if (old_action.sa_handler != SIG_IGN)
120
sigaction(SIGTERM, &new_action, NULL);
132
ret = sigaddset(&new_action.sa_mask, SIGINT);
137
ret = sigaddset(&new_action.sa_mask, SIGHUP);
142
ret = sigaddset(&new_action.sa_mask, SIGTERM);
147
/* Need to check if the handler is SIG_IGN before handling:
148
| [[info:libc:Initial Signal Actions]] |
149
| [[info:libc:Basic Signal Handling]] |
151
ret = sigaction(SIGINT, NULL, &old_action);
156
if(old_action.sa_handler != SIG_IGN){
157
ret = sigaction(SIGINT, &new_action, NULL);
163
ret = sigaction(SIGHUP, NULL, &old_action);
168
if(old_action.sa_handler != SIG_IGN){
169
ret = sigaction(SIGHUP, &new_action, NULL);
175
ret = sigaction(SIGTERM, NULL, &old_action);
180
if(old_action.sa_handler != SIG_IGN){
181
ret = sigaction(SIGTERM, &new_action, NULL);
124
190
fprintf(stderr, "Removing echo flag from terminal attributes\n");
128
194
t_new.c_lflag &= ~ECHO;
129
if (tcsetattr(STDIN_FILENO, TCSAFLUSH, &t_new) != 0){
195
if(tcsetattr(STDIN_FILENO, TCSAFLUSH, &t_new) != 0){
130
196
perror("tcsetattr-echo");
131
197
return EXIT_FAILURE;
135
201
fprintf(stderr, "Waiting for input from stdin \n");
206
fprintf(stderr, "Interrupted by signal, exiting.\n");
139
208
status = EXIT_FAILURE;
144
fprintf(stderr, "%s Password: ", prefix);
146
fprintf(stderr, "Password: ");
213
fprintf(stderr, "%s ", prefix);
216
const char *cryptsource = getenv("cryptsource");
217
const char *crypttarget = getenv("crypttarget");
218
const char *const prompt
219
= "Enter passphrase to unlock the disk";
220
if(cryptsource == NULL){
221
if(crypttarget == NULL){
222
fprintf(stderr, "%s: ", prompt);
224
fprintf(stderr, "%s (%s): ", prompt, crypttarget);
227
if(crypttarget == NULL){
228
fprintf(stderr, "%s %s: ", prompt, cryptsource);
230
fprintf(stderr, "%s %s (%s): ", prompt, cryptsource,
148
235
ret = getline(&buffer, &n, stdin);
150
fprintf(stdout, "%s", buffer);
151
237
status = EXIT_SUCCESS;
238
/* Make n = data size instead of allocated buffer size */
240
/* Strip final newline */
241
if(n>0 and buffer[n-1] == '\n'){
242
buffer[n-1] = '\0'; /* not strictly necessary */
247
ret = write(STDOUT_FILENO, buffer + written, n - written);
250
status = EXIT_FAILURE;
253
written += (size_t)ret;
154
// ret == 0 makes no other sence than to retry to read from stdin
156
if (errno != EINTR and not feof(stdin)){
258
if(errno != EINTR and not feof(stdin)){
157
259
perror("getline");
158
260
status = EXIT_FAILURE;
264
/* if(ret == 0), then the only sensible thing to do is to retry to
162
266
fputc('\n', stderr);
267
if(debug and not quit_now){
268
/* If quit_now is nonzero, we were interrupted by a signal, and
269
will print that later, so no need to show this too. */
270
fprintf(stderr, "getline() returned 0, retrying.\n");
166
277
fprintf(stderr, "Restoring terminal attributes\n");
168
if (tcsetattr(STDIN_FILENO, TCSAFLUSH, &t_old) != 0){
279
if(tcsetattr(STDIN_FILENO, TCSAFLUSH, &t_old) != 0){
169
280
perror("tcsetattr+echo");
173
fprintf(stderr, "%s is exiting\n", argv[0]);
284
sigemptyset(&old_action.sa_mask);
285
old_action.sa_handler = SIG_DFL;
286
ret = sigaction(signal_received, &old_action, NULL);
290
raise(signal_received);
294
fprintf(stderr, "%s is exiting with status %d\n", argv[0],
297
if(status == EXIT_SUCCESS){