76
63
struct sigaction old_action,
77
64
new_action = { .sa_handler = termination_handler,
80
struct argp_option options[] = {
81
{ .name = "prefix", .key = 'p',
82
.arg = "PREFIX", .flags = 0,
83
.doc = "Prefix shown before the prompt", .group = 2 },
84
{ .name = "debug", .key = 128,
85
.doc = "Debug mode", .group = 3 },
89
error_t parse_opt (int key, char *arg, struct argp_state *state){
103
return ARGP_ERR_UNKNOWN;
68
static struct option long_options[] = {
69
{"debug", no_argument, (int *)&debug, 1},
70
{"prefix", required_argument, 0, 'p'},
74
ret = getopt_long (argc, argv, "p:", long_options, &option_index);
108
struct argp argp = { .options = options, .parser = parse_opt,
110
.doc = "Mandos password-prompt -- Read and"
111
" output a password" };
112
ret = argp_parse(&argp, argc, argv, 0, 0, NULL);
113
if(ret == ARGP_ERR_UNKNOWN){
114
fprintf(stderr, "Unknown error while parsing arguments\n");
87
fprintf(stderr, "bad arguments\n");
120
93
fprintf(stderr, "Starting %s\n", argv[0]);
123
96
fprintf(stderr, "Storing current terminal attributes\n");
126
if(tcgetattr(STDIN_FILENO, &t_old) != 0){
99
if (tcgetattr(STDIN_FILENO, &t_old) != 0){
128
100
return EXIT_FAILURE;
131
103
sigemptyset(&new_action.sa_mask);
132
ret = sigaddset(&new_action.sa_mask, SIGINT);
137
ret = sigaddset(&new_action.sa_mask, SIGHUP);
142
ret = sigaddset(&new_action.sa_mask, SIGTERM);
147
/* Need to check if the handler is SIG_IGN before handling:
148
| [[info:libc:Initial Signal Actions]] |
149
| [[info:libc:Basic Signal Handling]] |
151
ret = sigaction(SIGINT, NULL, &old_action);
156
if(old_action.sa_handler != SIG_IGN){
157
ret = sigaction(SIGINT, &new_action, NULL);
163
ret = sigaction(SIGHUP, NULL, &old_action);
168
if(old_action.sa_handler != SIG_IGN){
169
ret = sigaction(SIGHUP, &new_action, NULL);
175
ret = sigaction(SIGTERM, NULL, &old_action);
180
if(old_action.sa_handler != SIG_IGN){
181
ret = sigaction(SIGTERM, &new_action, NULL);
104
sigaddset(&new_action.sa_mask, SIGINT);
105
sigaddset(&new_action.sa_mask, SIGHUP);
106
sigaddset(&new_action.sa_mask, SIGTERM);
107
sigaction(SIGINT, NULL, &old_action);
108
if (old_action.sa_handler != SIG_IGN)
109
sigaction(SIGINT, &new_action, NULL);
110
sigaction(SIGHUP, NULL, &old_action);
111
if (old_action.sa_handler != SIG_IGN)
112
sigaction(SIGHUP, &new_action, NULL);
113
sigaction(SIGTERM, NULL, &old_action);
114
if (old_action.sa_handler != SIG_IGN)
115
sigaction(SIGTERM, &new_action, NULL);
190
119
fprintf(stderr, "Removing echo flag from terminal attributes\n");
194
123
t_new.c_lflag &= ~ECHO;
195
if(tcsetattr(STDIN_FILENO, TCSAFLUSH, &t_new) != 0){
124
if (tcsetattr(STDIN_FILENO, TCSAFLUSH, &t_new) != 0){
196
125
perror("tcsetattr-echo");
197
126
return EXIT_FAILURE;
201
130
fprintf(stderr, "Waiting for input from stdin \n");
206
fprintf(stderr, "Interrupted by signal, exiting.\n");
208
134
status = EXIT_FAILURE;
213
fprintf(stderr, "%s ", prefix);
216
const char *cryptsource = getenv("cryptsource");
217
const char *crypttarget = getenv("crypttarget");
218
const char *const prompt
219
= "Enter passphrase to unlock the disk";
220
if(cryptsource == NULL){
221
if(crypttarget == NULL){
222
fprintf(stderr, "%s: ", prompt);
224
fprintf(stderr, "%s (%s): ", prompt, crypttarget);
227
if(crypttarget == NULL){
228
fprintf(stderr, "%s %s: ", prompt, cryptsource);
230
fprintf(stderr, "%s %s (%s): ", prompt, cryptsource,
139
fprintf(stderr, "%s Password: ", prefix);
141
fprintf(stderr, "Password: ");
235
143
ret = getline(&buffer, &n, stdin);
145
fprintf(stdout, "%s", buffer);
237
146
status = EXIT_SUCCESS;
238
/* Make n = data size instead of allocated buffer size */
240
/* Strip final newline */
241
if(n>0 and buffer[n-1] == '\n'){
242
buffer[n-1] = '\0'; /* not strictly necessary */
247
ret = write(STDOUT_FILENO, buffer + written, n - written);
250
status = EXIT_FAILURE;
253
written += (size_t)ret;
258
if(errno != EINTR and not feof(stdin)){
149
// ret == 0 makes no other sence than to retry to read from stdin
151
if (errno != EINTR and not feof(stdin)){
259
152
perror("getline");
260
153
status = EXIT_FAILURE;
264
/* if(ret == 0), then the only sensible thing to do is to retry to
266
157
fputc('\n', stderr);
267
if(debug and not quit_now){
268
/* If quit_now is nonzero, we were interrupted by a signal, and
269
will print that later, so no need to show this too. */
270
fprintf(stderr, "getline() returned 0, retrying.\n");
277
161
fprintf(stderr, "Restoring terminal attributes\n");
279
if(tcsetattr(STDIN_FILENO, TCSAFLUSH, &t_old) != 0){
163
if (tcsetattr(STDIN_FILENO, TCSAFLUSH, &t_old) != 0){
280
164
perror("tcsetattr+echo");
284
sigemptyset(&old_action.sa_mask);
285
old_action.sa_handler = SIG_DFL;
286
ret = sigaction(signal_received, &old_action, NULL);
290
raise(signal_received);
294
fprintf(stderr, "%s is exiting with status %d\n", argv[0],
297
if(status == EXIT_SUCCESS){
168
fprintf(stderr, "%s is exiting\n", argv[0]);