75
63
struct sigaction old_action,
76
64
new_action = { .sa_handler = termination_handler,
79
struct argp_option options[] = {
80
{ .name = "prefix", .key = 'p',
81
.arg = "PREFIX", .flags = 0,
82
.doc = "Prefix shown before the prompt", .group = 2 },
83
{ .name = "debug", .key = 128,
84
.doc = "Debug mode", .group = 3 },
88
error_t parse_opt (int key, char *arg, struct argp_state *state){
102
return ARGP_ERR_UNKNOWN;
68
static struct option long_options[] = {
69
{"debug", no_argument, (int *)&debug, 1},
70
{"prefix", required_argument, 0, 'p'},
74
ret = getopt_long (argc, argv, "p:", long_options, &option_index);
107
struct argp argp = { .options = options, .parser = parse_opt,
109
.doc = "Mandos password-prompt -- Read and"
110
" output a password" };
111
ret = argp_parse(&argp, argc, argv, 0, 0, NULL);
112
if(ret == ARGP_ERR_UNKNOWN){
113
fprintf(stderr, "Unknown error while parsing arguments\n");
87
fprintf(stderr, "bad arguments\n");
119
93
fprintf(stderr, "Starting %s\n", argv[0]);
122
96
fprintf(stderr, "Storing current terminal attributes\n");
125
if(tcgetattr(STDIN_FILENO, &t_old) != 0){
99
if (tcgetattr(STDIN_FILENO, &t_old) != 0){
127
100
return EXIT_FAILURE;
130
103
sigemptyset(&new_action.sa_mask);
131
ret = sigaddset(&new_action.sa_mask, SIGINT);
136
ret = sigaddset(&new_action.sa_mask, SIGHUP);
141
ret = sigaddset(&new_action.sa_mask, SIGTERM);
146
/* Need to check if the handler is SIG_IGN before handling:
147
| [[info:libc:Initial Signal Actions]] |
148
| [[info:libc:Basic Signal Handling]] |
150
ret = sigaction(SIGINT, NULL, &old_action);
155
if(old_action.sa_handler != SIG_IGN){
156
ret = sigaction(SIGINT, &new_action, NULL);
162
ret = sigaction(SIGHUP, NULL, &old_action);
167
if(old_action.sa_handler != SIG_IGN){
168
ret = sigaction(SIGHUP, &new_action, NULL);
174
ret = sigaction(SIGTERM, NULL, &old_action);
179
if(old_action.sa_handler != SIG_IGN){
180
ret = sigaction(SIGTERM, &new_action, NULL);
104
sigaddset(&new_action.sa_mask, SIGINT);
105
sigaddset(&new_action.sa_mask, SIGQUIT);
106
sigaddset(&new_action.sa_mask, SIGHUP);
107
sigaddset(&new_action.sa_mask, SIGTERM);
108
sigaction(SIGINT, NULL, &old_action);
109
if (old_action.sa_handler != SIG_IGN)
110
sigaction(SIGINT, &new_action, NULL);
111
sigaction(SIGQUIT, NULL, &old_action);
112
if (old_action.sa_handler != SIG_IGN)
113
sigaction(SIGQUIT, &new_action, NULL);
114
sigaction(SIGHUP, NULL, &old_action);
115
if (old_action.sa_handler != SIG_IGN)
116
sigaction(SIGHUP, &new_action, NULL);
117
sigaction(SIGTERM, NULL, &old_action);
118
if (old_action.sa_handler != SIG_IGN)
119
sigaction(SIGTERM, &new_action, NULL);
189
123
fprintf(stderr, "Removing echo flag from terminal attributes\n");
193
t_new.c_lflag &= ~(tcflag_t)ECHO;
194
if(tcsetattr(STDIN_FILENO, TCSAFLUSH, &t_new) != 0){
127
t_new.c_lflag &= ~ECHO;
128
if (tcsetattr(STDIN_FILENO, TCSAFLUSH, &t_new) != 0){
195
129
perror("tcsetattr-echo");
196
130
return EXIT_FAILURE;
200
134
fprintf(stderr, "Waiting for input from stdin \n");
205
fprintf(stderr, "Interrupted by signal, exiting.\n");
207
138
status = EXIT_FAILURE;
212
fprintf(stderr, "%s ", prefix);
215
const char *cryptsource = getenv("cryptsource");
216
const char *crypttarget = getenv("crypttarget");
217
const char *const prompt
218
= "Enter passphrase to unlock the disk";
219
if(cryptsource == NULL){
220
if(crypttarget == NULL){
221
fprintf(stderr, "%s: ", prompt);
223
fprintf(stderr, "%s (%s): ", prompt, crypttarget);
226
if(crypttarget == NULL){
227
fprintf(stderr, "%s %s: ", prompt, cryptsource);
229
fprintf(stderr, "%s %s (%s): ", prompt, cryptsource,
143
fprintf(stderr, "%s Password: ", prefix);
145
fprintf(stderr, "Password: ");
234
147
ret = getline(&buffer, &n, stdin);
149
fprintf(stdout, "%s", buffer);
236
150
status = EXIT_SUCCESS;
237
/* Make n = data size instead of allocated buffer size */
239
/* Strip final newline */
240
if(n>0 and buffer[n-1] == '\n'){
241
buffer[n-1] = '\0'; /* not strictly necessary */
246
ret = write(STDOUT_FILENO, buffer + written, n - written);
249
status = EXIT_FAILURE;
252
written += (size_t)ret;
257
if(errno != EINTR and not feof(stdin)){
153
// ret == 0 makes no other sence than to retry to read from stdin
155
if (errno != EINTR and not feof(stdin)){
258
156
perror("getline");
259
157
status = EXIT_FAILURE;
263
/* if(ret == 0), then the only sensible thing to do is to retry to
265
161
fputc('\n', stderr);
266
if(debug and not quit_now){
267
/* If quit_now is nonzero, we were interrupted by a signal, and
268
will print that later, so no need to show this too. */
269
fprintf(stderr, "getline() returned 0, retrying.\n");
276
165
fprintf(stderr, "Restoring terminal attributes\n");
278
if(tcsetattr(STDIN_FILENO, TCSAFLUSH, &t_old) != 0){
167
if (tcsetattr(STDIN_FILENO, TCSAFLUSH, &t_old) != 0){
279
168
perror("tcsetattr+echo");
283
sigemptyset(&old_action.sa_mask);
284
old_action.sa_handler = SIG_DFL;
285
ret = sigaction(signal_received, &old_action, NULL);
289
raise(signal_received);
293
fprintf(stderr, "%s is exiting with status %d\n", argv[0],
296
if(status == EXIT_SUCCESS){
172
fprintf(stderr, "%s is exiting\n", argv[0]);