1 /* $OpenBSD: readpass.c,v 1.44 2006/07/22 20:48:23 stevesk Exp $ */
3 * Copyright (c) 2001 Markus Friedl. All rights reserved.
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
8 * 1. Redistributions of source code must retain the above copyright
9 * notice, this list of conditions and the following disclaimer.
10 * 2. Redistributions in binary form must reproduce the above copyright
11 * notice, this list of conditions and the following disclaimer in the
12 * documentation and/or other materials provided with the distribution.
14 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
15 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
16 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
17 * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
18 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
19 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
20 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
21 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
22 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
23 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
28 #include <sys/types.h>
42 #include "pathnames.h"
48 ssh_askpass(char *askpass
, const char *msg
)
53 int p
[2], status
, ret
;
56 if (fflush(stdout
) != 0)
57 error("ssh_askpass: fflush: %s", strerror(errno
));
59 fatal("internal error: askpass undefined");
61 error("ssh_askpass: pipe: %s", strerror(errno
));
64 if ((pid
= fork()) < 0) {
65 error("ssh_askpass: fork: %s", strerror(errno
));
69 permanently_drop_suid(getuid());
71 if (dup2(p
[1], STDOUT_FILENO
) < 0)
72 fatal("ssh_askpass: dup2: %s", strerror(errno
));
73 execlp(askpass
, askpass
, msg
, (char *) 0);
74 fatal("ssh_askpass: exec(%s): %s", askpass
, strerror(errno
));
80 ret
= read(p
[0], buf
+ len
, sizeof(buf
) - 1 - len
);
81 if (ret
== -1 && errno
== EINTR
)
86 } while (sizeof(buf
) - 1 - len
> 0);
90 while (waitpid(pid
, &status
, 0) < 0)
94 if (!WIFEXITED(status
) || WEXITSTATUS(status
) != 0) {
95 memset(buf
, 0, sizeof(buf
));
99 buf
[strcspn(buf
, "\r\n")] = '\0';
101 memset(buf
, 0, sizeof(buf
));
106 * Reads a passphrase from /dev/tty with echo turned off/on. Returns the
107 * passphrase (allocated with xmalloc). Exits if EOF is encountered. If
108 * RP_ALLOW_STDIN is set, the passphrase will be read from stdin if no
112 read_passphrase(const char *prompt
, int flags
)
114 char *askpass
= NULL
, *ret
, buf
[1024];
115 int rppflags
, use_askpass
= 0, ttyfd
;
117 rppflags
= (flags
& RP_ECHO
) ? RPP_ECHO_ON
: RPP_ECHO_OFF
;
118 if (flags
& RP_USE_ASKPASS
)
120 else if (flags
& RP_ALLOW_STDIN
) {
121 if (!isatty(STDIN_FILENO
)) {
122 debug("read_passphrase: stdin is not a tty");
126 rppflags
|= RPP_REQUIRE_TTY
;
127 ttyfd
= open(_PATH_TTY
, O_RDWR
);
131 debug("read_passphrase: can't open %s: %s", _PATH_TTY
,
137 if ((flags
& RP_USE_ASKPASS
) && getenv("DISPLAY") == NULL
)
138 return (flags
& RP_ALLOW_EOF
) ? NULL
: xstrdup("");
140 if (use_askpass
&& getenv("DISPLAY")) {
141 if (getenv(SSH_ASKPASS_ENV
))
142 askpass
= getenv(SSH_ASKPASS_ENV
);
144 askpass
= _PATH_SSH_ASKPASS_DEFAULT
;
145 if ((ret
= ssh_askpass(askpass
, prompt
)) == NULL
)
146 if (!(flags
& RP_ALLOW_EOF
))
151 if (readpassphrase(prompt
, buf
, sizeof buf
, rppflags
) == NULL
) {
152 if (flags
& RP_ALLOW_EOF
)
158 memset(buf
, 'x', sizeof buf
);
163 ask_permission(const char *fmt
, ...)
166 char *p
, prompt
[1024];
170 vsnprintf(prompt
, sizeof(prompt
), fmt
, args
);
173 p
= read_passphrase(prompt
, RP_USE_ASKPASS
|RP_ALLOW_EOF
);
176 * Accept empty responses and responses consisting
177 * of the word "yes" as affirmative.
179 if (*p
== '\0' || *p
== '\n' ||
180 strcasecmp(p
, "yes") == 0)