2 * Copyright (c) 2001 Markus Friedl. All rights reserved.
4 * Redistribution and use in source and binary forms, with or without
5 * modification, are permitted provided that the following conditions
7 * 1. Redistributions of source code must retain the above copyright
8 * notice, this list of conditions and the following disclaimer.
9 * 2. Redistributions in binary form must reproduce the above copyright
10 * notice, this list of conditions and the following disclaimer in the
11 * documentation and/or other materials provided with the distribution.
13 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
14 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
15 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
16 * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
17 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
18 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
19 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
20 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
21 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
22 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
26 RCSID("$OpenBSD: readpass.c,v 1.31 2004/10/29 22:53:56 djm Exp $");
30 #include "pathnames.h"
35 ssh_askpass(char *askpass
, const char *msg
)
40 int p
[2], status
, ret
;
43 if (fflush(stdout
) != 0)
44 error("ssh_askpass: fflush: %s", strerror(errno
));
46 fatal("internal error: askpass undefined");
48 error("ssh_askpass: pipe: %s", strerror(errno
));
51 if ((pid
= fork()) < 0) {
52 error("ssh_askpass: fork: %s", strerror(errno
));
59 if (dup2(p
[1], STDOUT_FILENO
) < 0)
60 fatal("ssh_askpass: dup2: %s", strerror(errno
));
61 execlp(askpass
, askpass
, msg
, (char *) 0);
62 fatal("ssh_askpass: exec(%s): %s", askpass
, strerror(errno
));
68 ret
= read(p
[0], buf
+ len
, sizeof(buf
) - 1 - len
);
69 if (ret
== -1 && errno
== EINTR
)
74 } while (sizeof(buf
) - 1 - len
> 0);
78 while (waitpid(pid
, &status
, 0) < 0)
82 if (!WIFEXITED(status
) || WEXITSTATUS(status
) != 0) {
83 memset(buf
, 0, sizeof(buf
));
87 buf
[strcspn(buf
, "\r\n")] = '\0';
89 memset(buf
, 0, sizeof(buf
));
94 * Reads a passphrase from /dev/tty with echo turned off/on. Returns the
95 * passphrase (allocated with xmalloc). Exits if EOF is encountered. If
96 * RP_ALLOW_STDIN is set, the passphrase will be read from stdin if no
100 read_passphrase(const char *prompt
, int flags
)
102 char *askpass
= NULL
, *ret
, buf
[1024];
103 int rppflags
, use_askpass
= 0, ttyfd
;
105 rppflags
= (flags
& RP_ECHO
) ? RPP_ECHO_ON
: RPP_ECHO_OFF
;
106 if (flags
& RP_USE_ASKPASS
)
108 else if (flags
& RP_ALLOW_STDIN
) {
109 if (!isatty(STDIN_FILENO
))
112 rppflags
|= RPP_REQUIRE_TTY
;
113 ttyfd
= open(_PATH_TTY
, O_RDWR
);
120 if ((flags
& RP_USE_ASKPASS
) && getenv("DISPLAY") == NULL
)
121 return (flags
& RP_ALLOW_EOF
) ? NULL
: xstrdup("");
123 if (use_askpass
&& getenv("DISPLAY")) {
124 if (getenv(SSH_ASKPASS_ENV
))
125 askpass
= getenv(SSH_ASKPASS_ENV
);
127 askpass
= _PATH_SSH_ASKPASS_DEFAULT
;
128 if ((ret
= ssh_askpass(askpass
, prompt
)) == NULL
)
129 if (!(flags
& RP_ALLOW_EOF
))
134 if (readpassphrase(prompt
, buf
, sizeof buf
, rppflags
) == NULL
) {
135 if (flags
& RP_ALLOW_EOF
)
141 memset(buf
, 'x', sizeof buf
);
146 ask_permission(const char *fmt
, ...)
149 char *p
, prompt
[1024];
153 vsnprintf(prompt
, sizeof(prompt
), fmt
, args
);
156 p
= read_passphrase(prompt
, RP_USE_ASKPASS
|RP_ALLOW_EOF
);
159 * Accept empty responses and responses consisting
160 * of the word "yes" as affirmative.
162 if (*p
== '\0' || *p
== '\n' ||
163 strcasecmp(p
, "yes") == 0)