26
26
#include <sys/types.h> /* ssize_t */
27
27
#include <sys/stat.h> /* mkfifo(), S_IRUSR, S_IWUSR */
28
28
#include <iso646.h> /* and */
29
#include <errno.h> /* errno, EACCES, ENOTDIR, ELOOP,
30
ENAMETOOLONG, ENOSPC, EROFS,
31
ENOENT, EEXIST, EFAULT, EMFILE,
32
ENFILE, ENOMEM, EBADF, EINVAL, EIO,
29
#include <errno.h> /* errno, EEXIST */
34
30
#include <stdio.h> /* perror() */
35
31
#include <stdlib.h> /* EXIT_FAILURE, NULL, size_t, free(),
36
32
realloc(), EXIT_SUCCESS */
37
33
#include <fcntl.h> /* open(), O_RDONLY */
38
34
#include <unistd.h> /* read(), close(), write(),
40
#include <sysexits.h> /* EX_OSERR, EX_OSFILE,
41
EX_UNAVAILABLE, EX_IOERR */
44
38
int main(__attribute__((unused))int argc,
50
44
const char passfifo[] = "/lib/cryptsetup/passfifo";
51
ret = mkfifo(passfifo, S_IRUSR | S_IWUSR);
45
ret = (int)TEMP_FAILURE_RETRY(mkfifo(passfifo, S_IRUSR | S_IWUSR));
46
if(ret == -1 and errno != EEXIST){
66
return EX_UNAVAILABLE; /* no "/lib/cryptsetup"? */
68
break; /* not an error */
73
int fifo_fd = open(passfifo, O_RDONLY);
52
int fifo_fd = (int)TEMP_FAILURE_RETRY(open(passfifo, O_RDONLY));
81
return EX_UNAVAILABLE;
94
58
/* Read from FIFO */
104
68
perror("realloc");
109
73
buf_allocated += blocksize;
111
sret = read(fifo_fd, buf + buf_len, buf_allocated - buf_len);
75
sret = TEMP_FAILURE_RETRY(read(fifo_fd, buf + buf_len,
76
buf_allocated - buf_len));
126
return EX_UNAVAILABLE;
129
82
buf_len += (size_t)sret;
130
83
} while(sret != 0);
87
TEMP_FAILURE_RETRY(close(fifo_fd));
136
89
/* Print password to stdout */
137
90
size_t written = 0;
138
91
while(written < buf_len){
139
sret = write(STDOUT_FILENO, buf + written, buf_len - written);
92
sret = TEMP_FAILURE_RETRY(write(STDOUT_FILENO, buf + written,
157
99
written += (size_t)sret;
161
ret = close(STDOUT_FILENO);
173
103
return EXIT_SUCCESS;