12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182 |
- /* vi: set sw=4 ts=4: */
- /*
- * Ask for a password
- * I use a static buffer in this function. Plan accordingly.
- *
- * Copyright (C) 1999-2004 by Erik Andersen <andersen@codepoet.org>
- *
- * Licensed under GPLv2 or later, see file LICENSE in this tarball for details.
- */
- #include "libbb.h"
- /* do nothing signal handler */
- static void askpass_timeout(int UNUSED_PARAM ignore)
- {
- }
- char* FAST_FUNC bb_ask_stdin(const char *prompt)
- {
- return bb_ask(STDIN_FILENO, 0, prompt);
- }
- char* FAST_FUNC bb_ask(const int fd, int timeout, const char *prompt)
- {
- /* Was static char[BIGNUM] */
- enum { sizeof_passwd = 128 };
- static char *passwd;
- char *ret;
- int i;
- struct sigaction sa, oldsa;
- struct termios tio, oldtio;
- if (!passwd)
- passwd = xmalloc(sizeof_passwd);
- memset(passwd, 0, sizeof_passwd);
- tcgetattr(fd, &oldtio);
- tcflush(fd, TCIFLUSH);
- tio = oldtio;
- #ifndef IUCLC
- # define IUCLC 0
- #endif
- tio.c_iflag &= ~(IUCLC|IXON|IXOFF|IXANY);
- tio.c_lflag &= ~(ECHO|ECHOE|ECHOK|ECHONL|TOSTOP);
- tcsetattr_stdin_TCSANOW(&tio);
- memset(&sa, 0, sizeof(sa));
- /* sa.sa_flags = 0; - no SA_RESTART! */
- /* SIGINT and SIGALRM will interrupt read below */
- sa.sa_handler = askpass_timeout;
- sigaction(SIGINT, &sa, &oldsa);
- if (timeout) {
- sigaction_set(SIGALRM, &sa);
- alarm(timeout);
- }
- fputs(prompt, stdout);
- fflush(stdout);
- ret = NULL;
- /* On timeout or Ctrl-C, read will hopefully be interrupted,
- * and we return NULL */
- if (read(fd, passwd, sizeof_passwd - 1) > 0) {
- ret = passwd;
- i = 0;
- /* Last byte is guaranteed to be 0
- (read did not overwrite it) */
- do {
- if (passwd[i] == '\r' || passwd[i] == '\n')
- passwd[i] = '\0';
- } while (passwd[i++]);
- }
- if (timeout) {
- alarm(0);
- }
- sigaction_set(SIGINT, &oldsa);
- tcsetattr_stdin_TCSANOW(&oldtio);
- bb_putchar('\n');
- fflush(stdout);
- return ret;
- }
|