[BACK]Return to readpass.c CVS log [TXT][DIR] Up to [local] / src / usr.bin / ssh

Annotation of src/usr.bin/ssh/readpass.c, Revision 1.19

1.1       deraadt     1: /*
1.8       deraadt     2:  * Copyright (c) 1988, 1993
                      3:  *      The Regents of the University of California.  All rights reserved.
                      4:  *
                      5:  * Redistribution and use in source and binary forms, with or without
                      6:  * modification, are permitted provided that the following conditions
                      7:  * are met:
                      8:  * 1. Redistributions of source code must retain the above copyright
                      9:  *    notice, this list of conditions and the following disclaimer.
                     10:  * 2. Redistributions in binary form must reproduce the above copyright
                     11:  *    notice, this list of conditions and the following disclaimer in the
                     12:  *    documentation and/or other materials provided with the distribution.
                     13:  * 3. All advertising materials mentioning features or use of this software
                     14:  *    must display the following acknowledgement:
                     15:  *      This product includes software developed by the University of
                     16:  *      California, Berkeley and its contributors.
                     17:  * 4. Neither the name of the University nor the names of its contributors
                     18:  *    may be used to endorse or promote products derived from this software
                     19:  *    without specific prior written permission.
                     20:  *
                     21:  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
                     22:  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
                     23:  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
                     24:  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
                     25:  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
                     26:  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
                     27:  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
                     28:  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
                     29:  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
                     30:  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
                     31:  * SUCH DAMAGE.
1.6       deraadt    32:  */
1.1       deraadt    33:
                     34: #include "includes.h"
1.19    ! markus     35: RCSID("$OpenBSD: readpass.c,v 1.18 2001/06/23 15:12:19 itojun Exp $");
        !            36:
        !            37: #include <readpassphrase.h>
1.1       deraadt    38:
                     39: #include "xmalloc.h"
1.14      itojun     40: #include "readpass.h"
1.15      markus     41: #include "pathnames.h"
                     42: #include "log.h"
                     43: #include "atomicio.h"
                     44: #include "ssh.h"
                     45:
1.18      itojun     46: static char *
1.16      mouring    47: ssh_askpass(char *askpass, const char *msg)
1.15      markus     48: {
                     49:        pid_t pid;
                     50:        size_t len;
                     51:        char *nl, *pass;
                     52:        int p[2], status;
                     53:        char buf[1024];
                     54:
                     55:        if (fflush(stdout) != 0)
                     56:                error("ssh_askpass: fflush: %s", strerror(errno));
                     57:        if (askpass == NULL)
                     58:                fatal("internal error: askpass undefined");
                     59:        if (pipe(p) < 0)
                     60:                fatal("ssh_askpass: pipe: %s", strerror(errno));
                     61:        if ((pid = fork()) < 0)
                     62:                fatal("ssh_askpass: fork: %s", strerror(errno));
                     63:        if (pid == 0) {
                     64:                seteuid(getuid());
                     65:                setuid(getuid());
                     66:                close(p[0]);
                     67:                if (dup2(p[1], STDOUT_FILENO) < 0)
                     68:                        fatal("ssh_askpass: dup2: %s", strerror(errno));
                     69:                execlp(askpass, askpass, msg, (char *) 0);
                     70:                fatal("ssh_askpass: exec(%s): %s", askpass, strerror(errno));
                     71:        }
                     72:        close(p[1]);
                     73:        len = read(p[0], buf, sizeof buf);
                     74:        close(p[0]);
                     75:        while (waitpid(pid, &status, 0) < 0)
                     76:                if (errno != EINTR)
                     77:                        break;
                     78:        if (len <= 1)
                     79:                return xstrdup("");
                     80:        nl = strchr(buf, '\n');
                     81:        if (nl)
                     82:                *nl = '\0';
                     83:        pass = xstrdup(buf);
                     84:        memset(buf, 0, sizeof(buf));
                     85:        return pass;
                     86: }
                     87:
1.7       markus     88: /*
1.19    ! markus     89:  * Reads a passphrase from /dev/tty with echo turned off/on.  Returns the
        !            90:  * passphrase (allocated with xmalloc).  Exits if EOF is encountered. If
        !            91:  * RP_ALLOW_STDIN is set, the passphrase will be read from stdin if no
        !            92:  * tty is available
1.12      markus     93:  */
1.5       markus     94: char *
1.19    ! markus     95: read_passphrase(const char *prompt, int flags)
1.1       deraadt    96: {
1.19    ! markus     97:        char *askpass = NULL, *ret, buf[1024];
        !            98:        int rppflags, use_askpass = 0, ttyfd;
1.15      markus     99:
1.19    ! markus    100:        rppflags = (flags & RP_ECHO) ? RPP_ECHO_ON : RPP_ECHO_OFF;
        !           101:        if (flags & RP_ALLOW_STDIN) {
1.15      markus    102:                if (!isatty(STDIN_FILENO))
                    103:                        use_askpass = 1;
                    104:        } else {
1.19    ! markus    105:                rppflags |= RPP_REQUIRE_TTY;
1.15      markus    106:                ttyfd = open("/dev/tty", O_RDWR);
                    107:                if (ttyfd >= 0)
                    108:                        close(ttyfd);
                    109:                else
                    110:                        use_askpass = 1;
                    111:        }
                    112:
                    113:        if (use_askpass && getenv("DISPLAY")) {
                    114:                if (getenv(SSH_ASKPASS_ENV))
                    115:                        askpass = getenv(SSH_ASKPASS_ENV);
                    116:                else
                    117:                        askpass = _PATH_SSH_ASKPASS_DEFAULT;
                    118:                return ssh_askpass(askpass, prompt);
                    119:        }
                    120:
1.19    ! markus    121:        if (readpassphrase(prompt, buf, sizeof buf, rppflags) == NULL)
        !           122:                return NULL;
        !           123:
        !           124:        ret = xstrdup(buf);
        !           125:        memset(buf, 'x', sizeof buf);
        !           126:        return ret;
1.1       deraadt   127: }