75
64
struct sigaction old_action,
76
65
new_action = { .sa_handler = termination_handler,
79
struct argp_option options[] = {
80
{ .name = "prefix", .key = 'p',
81
.arg = "PREFIX", .flags = 0,
82
.doc = "Prefix shown before the prompt", .group = 2 },
83
{ .name = "debug", .key = 128,
84
.doc = "Debug mode", .group = 3 },
88
error_t parse_opt (int key, char *arg, struct argp_state *state){
102
return ARGP_ERR_UNKNOWN;
69
static struct option long_options[] = {
70
{"debug", no_argument, (int *)&debug, 1},
71
{"prefix", required_argument, 0, 'p'},
75
ret = getopt_long (argc, argv, "p:", long_options, &option_index);
107
struct argp argp = { .options = options, .parser = parse_opt,
109
.doc = "Mandos password-prompt -- Read and"
110
" output a password" };
111
ret = argp_parse(&argp, argc, argv, 0, 0, NULL);
112
if(ret == ARGP_ERR_UNKNOWN){
113
fprintf(stderr, "Unknown error while parsing arguments\n");
88
fprintf(stderr, "bad arguments\n");
119
94
fprintf(stderr, "Starting %s\n", argv[0]);
122
97
fprintf(stderr, "Storing current terminal attributes\n");
125
if(tcgetattr(STDIN_FILENO, &t_old) != 0){
100
if (tcgetattr(STDIN_FILENO, &t_old) != 0){
127
101
return EXIT_FAILURE;
130
104
sigemptyset(&new_action.sa_mask);
131
ret = sigaddset(&new_action.sa_mask, SIGINT);
136
ret = sigaddset(&new_action.sa_mask, SIGHUP);
141
ret = sigaddset(&new_action.sa_mask, SIGTERM);
146
/* Need to check if the handler is SIG_IGN before handling:
147
| [[info:libc:Initial Signal Actions]] |
148
| [[info:libc:Basic Signal Handling]] |
150
ret = sigaction(SIGINT, NULL, &old_action);
155
if(old_action.sa_handler != SIG_IGN){
156
ret = sigaction(SIGINT, &new_action, NULL);
162
ret = sigaction(SIGHUP, NULL, &old_action);
167
if(old_action.sa_handler != SIG_IGN){
168
ret = sigaction(SIGHUP, &new_action, NULL);
174
ret = sigaction(SIGTERM, NULL, &old_action);
179
if(old_action.sa_handler != SIG_IGN){
180
ret = sigaction(SIGTERM, &new_action, NULL);
105
sigaddset(&new_action.sa_mask, SIGINT);
106
sigaddset(&new_action.sa_mask, SIGQUIT);
107
sigaddset(&new_action.sa_mask, SIGHUP);
108
sigaddset(&new_action.sa_mask, SIGTERM);
109
sigaction(SIGINT, NULL, &old_action);
110
if (old_action.sa_handler != SIG_IGN)
111
sigaction(SIGINT, &new_action, NULL);
112
sigaction(SIGQUIT, NULL, &old_action);
113
if (old_action.sa_handler != SIG_IGN)
114
sigaction(SIGQUIT, &new_action, NULL);
115
sigaction(SIGHUP, NULL, &old_action);
116
if (old_action.sa_handler != SIG_IGN)
117
sigaction(SIGHUP, &new_action, NULL);
118
sigaction(SIGTERM, NULL, &old_action);
119
if (old_action.sa_handler != SIG_IGN)
120
sigaction(SIGTERM, &new_action, NULL);
189
124
fprintf(stderr, "Removing echo flag from terminal attributes\n");
193
128
t_new.c_lflag &= ~ECHO;
194
if(tcsetattr(STDIN_FILENO, TCSAFLUSH, &t_new) != 0){
129
if (tcsetattr(STDIN_FILENO, TCSAFLUSH, &t_new) != 0){
195
130
perror("tcsetattr-echo");
196
131
return EXIT_FAILURE;
200
135
fprintf(stderr, "Waiting for input from stdin \n");
205
fprintf(stderr, "Interrupted by signal, exiting.\n");
207
139
status = EXIT_FAILURE;
212
fprintf(stderr, "%s ", prefix);
215
const char *cryptsource = getenv("cryptsource");
216
const char *crypttarget = getenv("crypttarget");
217
const char *const prompt
218
= "Enter passphrase to unlock the disk";
219
if(cryptsource == NULL){
220
if(crypttarget == NULL){
221
fprintf(stderr, "%s: ", prompt);
223
fprintf(stderr, "%s (%s): ", prompt, crypttarget);
226
if(crypttarget == NULL){
227
fprintf(stderr, "%s %s: ", prompt, cryptsource);
229
fprintf(stderr, "%s %s (%s): ", prompt, cryptsource,
144
fprintf(stderr, "%s Password: ", prefix);
146
fprintf(stderr, "Password: ");
234
148
ret = getline(&buffer, &n, stdin);
150
fprintf(stdout, "%s", buffer);
236
151
status = EXIT_SUCCESS;
237
/* Make n = data size instead of allocated buffer size */
239
/* Strip final newline */
240
if(n>0 and buffer[n-1] == '\n'){
241
buffer[n-1] = '\0'; /* not strictly necessary */
246
ret = write(STDOUT_FILENO, buffer + written, n - written);
249
status = EXIT_FAILURE;
252
written += (size_t)ret;
257
if(errno != EINTR and not feof(stdin)){
154
// ret == 0 makes no other sence than to retry to read from stdin
156
if (errno != EINTR and not feof(stdin)){
258
157
perror("getline");
259
158
status = EXIT_FAILURE;
263
/* if(ret == 0), then the only sensible thing to do is to retry to
265
162
fputc('\n', stderr);
266
if(debug and not quit_now){
267
/* If quit_now is nonzero, we were interrupted by a signal, and
268
will print that later, so no need to show this too. */
269
fprintf(stderr, "getline() returned 0, retrying.\n");
276
166
fprintf(stderr, "Restoring terminal attributes\n");
278
if(tcsetattr(STDIN_FILENO, TCSAFLUSH, &t_old) != 0){
168
if (tcsetattr(STDIN_FILENO, TCSAFLUSH, &t_old) != 0){
279
169
perror("tcsetattr+echo");
283
sigemptyset(&old_action.sa_mask);
284
old_action.sa_handler = SIG_DFL;
285
ret = sigaction(signal_received, &old_action, NULL);
289
raise(signal_received);
293
fprintf(stderr, "%s is exiting with status %d\n", argv[0],
296
if(status == EXIT_SUCCESS){
173
fprintf(stderr, "%s is exiting\n", argv[0]);