1
/* -*- coding: utf-8 -*- */
3
* Passprompt - Read a password from the terminal and print it
5
* Copyright © 2007-2008 Teddy Hogeborn & Björn Påhlsson
7
* This program is free software: you can redistribute it and/or
8
* modify it under the terms of the GNU General Public License as
9
* published by the Free Software Foundation, either version 3 of the
10
* License, or (at your option) any later version.
12
* This program is distributed in the hope that it will be useful, but
13
* WITHOUT ANY WARRANTY; without even the implied warranty of
14
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
15
* General Public License for more details.
17
* You should have received a copy of the GNU General Public License
18
* along with this program. If not, see
19
* <http://www.gnu.org/licenses/>.
21
* Contact the authors at <https://www.fukt.bsnet.se/~belorn/> and
22
* <https://www.fukt.bsnet.se/~teddy/>.
1
25
#define _GNU_SOURCE /* getline() */
2
#define _FORTIFY_SOURCE 2
3
27
#include <termios.h> /* struct termios, tcsetattr(),
4
28
TCSAFLUSH, tcgetattr(), ECHO */
5
29
#include <unistd.h> /* struct termios, tcsetattr(),
9
33
sigaction, sigemptyset(),
10
34
sigaction(), sigaddset(), SIGINT,
11
35
SIGQUIT, SIGHUP, SIGTERM */
12
#include <stddef.h> /* NULL, size_t */
36
#include <stddef.h> /* NULL, size_t, ssize_t */
13
37
#include <sys/types.h> /* ssize_t */
14
38
#include <stdlib.h> /* EXIT_SUCCESS, EXIT_FAILURE,
39
getopt_long, getenv() */
16
40
#include <stdio.h> /* fprintf(), stderr, getline(),
17
41
stdin, feof(), perror(), fputc(),
18
42
stdout, getopt_long */
20
44
#include <iso646.h> /* or, not */
21
45
#include <stdbool.h> /* bool, false, true */
22
46
#include <string.h> /* strlen, rindex, strncmp, strcmp */
23
#include <getopt.h> /* getopt_long */
47
#include <argp.h> /* struct argp_option, struct
48
argp_state, struct argp,
49
argp_parse(), error_t,
50
ARGP_KEY_ARG, ARGP_KEY_END,
25
53
volatile bool quit_now = false;
26
54
bool debug = false;
55
const char *argp_program_version = "password-prompt 1.0";
56
const char *argp_program_bug_address = "<mandos@fukt.bsnet.se>";
28
void termination_handler(int signum){
58
static void termination_handler(__attribute__((unused))int signum){
39
69
struct sigaction old_action,
40
70
new_action = { .sa_handler = termination_handler,
44
static struct option long_options[] = {
45
{"debug", no_argument, (int *)&debug, 1},
46
{"prefix", required_argument, 0, 'p'},
50
ret = getopt_long (argc, argv, "p:", long_options, &option_index);
73
struct argp_option options[] = {
74
{ .name = "prefix", .key = 'p',
75
.arg = "PREFIX", .flags = 0,
76
.doc = "Prefix used before the passprompt", .group = 2 },
77
{ .name = "debug", .key = 128,
78
.doc = "Debug mode", .group = 3 },
82
error_t parse_opt (int key, char *arg, struct argp_state *state) {
83
/* Get the INPUT argument from `argp_parse', which we know is a
84
pointer to our plugin list pointer. */
98
return ARGP_ERR_UNKNOWN;
63
fprintf(stderr, "bad arguments\n");
103
struct argp argp = { .options = options, .parser = parse_opt,
105
.doc = "Mandos Passprompt -- Provides a passprompt" };
106
ret = argp_parse (&argp, argc, argv, 0, 0, NULL);
107
if (ret == ARGP_ERR_UNKNOWN){
108
fprintf(stderr, "Unknown error while parsing arguments\n");
69
114
fprintf(stderr, "Starting %s\n", argv[0]);
79
124
sigemptyset(&new_action.sa_mask);
80
125
sigaddset(&new_action.sa_mask, SIGINT);
81
sigaddset(&new_action.sa_mask, SIGQUIT);
82
126
sigaddset(&new_action.sa_mask, SIGHUP);
83
127
sigaddset(&new_action.sa_mask, SIGTERM);
84
sigaction(SIGINT, NULL, &old_action);
85
if (old_action.sa_handler != SIG_IGN)
86
sigaction(SIGINT, &new_action, NULL);
87
sigaction(SIGQUIT, NULL, &old_action);
88
if (old_action.sa_handler != SIG_IGN)
89
sigaction(SIGQUIT, &new_action, NULL);
90
sigaction(SIGHUP, NULL, &old_action);
91
if (old_action.sa_handler != SIG_IGN)
92
sigaction(SIGHUP, &new_action, NULL);
93
sigaction(SIGTERM, NULL, &old_action);
94
if (old_action.sa_handler != SIG_IGN)
95
sigaction(SIGTERM, &new_action, NULL);
128
ret = sigaction(SIGINT, NULL, &old_action);
133
if (old_action.sa_handler != SIG_IGN){
134
ret = sigaction(SIGINT, &new_action, NULL);
140
ret = sigaction(SIGHUP, NULL, &old_action);
145
if (old_action.sa_handler != SIG_IGN){
146
ret = sigaction(SIGHUP, &new_action, NULL);
152
ret = sigaction(SIGTERM, NULL, &old_action);
157
if (old_action.sa_handler != SIG_IGN){
158
ret = sigaction(SIGTERM, &new_action, NULL);
99
167
fprintf(stderr, "Removing echo flag from terminal attributes\n");
119
fprintf(stderr, "%s Password: ", prefix);
121
fprintf(stderr, "Password: ");
187
fprintf(stderr, "%s ", prefix);
190
const char *cryptsource = getenv("cryptsource");
191
const char *crypttarget = getenv("crypttarget");
192
const char *const prompt
193
= "Enter passphrase to unlock the disk";
194
if(cryptsource == NULL){
195
if(crypttarget == NULL){
196
fprintf(stderr, "%s: ", prompt);
198
fprintf(stderr, "%s (%s): ", prompt, crypttarget);
201
if(crypttarget == NULL){
202
fprintf(stderr, "%s %s: ", prompt, cryptsource);
204
fprintf(stderr, "%s %s (%s): ", prompt, cryptsource,
123
209
ret = getline(&buffer, &n, stdin);
125
211
fprintf(stdout, "%s", buffer);
126
212
status = EXIT_SUCCESS;
129
// ret == 0 makes no other sence than to retry to read from stdin
131
216
if (errno != EINTR and not feof(stdin)){
132
217
perror("getline");
222
/* if(ret == 0), then the only sensible thing to do is to retry to
137
224
fputc('\n', stderr);
141
228
fprintf(stderr, "Restoring terminal attributes\n");
143
230
if (tcsetattr(STDIN_FILENO, TCSAFLUSH, &t_old) != 0){
144
231
perror("tcsetattr+echo");
148
235
fprintf(stderr, "%s is exiting\n", argv[0]);