1 /* $OpenBSD: readpass.c,v 1.47 2006/08/03 03:34:42 deraadt Exp $ */
3 * Copyright (c) 2001 Markus Friedl. All rights reserved.
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
8 * 1. Redistributions of source code must retain the above copyright
9 * notice, this list of conditions and the following disclaimer.
10 * 2. Redistributions in binary form must reproduce the above copyright
11 * notice, this list of conditions and the following disclaimer in the
12 * documentation and/or other materials provided with the distribution.
14 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
15 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
16 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
17 * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
18 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
19 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
20 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
21 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
22 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
23 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
28 #include <sys/types.h>
44 #include "pathnames.h"
50 ssh_askpass(char *askpass
, const char *msg
)
55 int p
[2], status
, ret
;
58 if (fflush(stdout
) != 0)
59 error("ssh_askpass: fflush: %s", strerror(errno
));
61 fatal("internal error: askpass undefined");
63 error("ssh_askpass: pipe: %s", strerror(errno
));
66 if ((pid
= fork()) < 0) {
67 error("ssh_askpass: fork: %s", strerror(errno
));
71 permanently_drop_suid(getuid());
73 if (dup2(p
[1], STDOUT_FILENO
) < 0)
74 fatal("ssh_askpass: dup2: %s", strerror(errno
));
75 execlp(askpass
, askpass
, msg
, (char *) 0);
76 fatal("ssh_askpass: exec(%s): %s", askpass
, strerror(errno
));
82 ret
= read(p
[0], buf
+ len
, sizeof(buf
) - 1 - len
);
83 if (ret
== -1 && errno
== EINTR
)
88 } while (sizeof(buf
) - 1 - len
> 0);
92 while (waitpid(pid
, &status
, 0) < 0)
96 if (!WIFEXITED(status
) || WEXITSTATUS(status
) != 0) {
97 memset(buf
, 0, sizeof(buf
));
101 buf
[strcspn(buf
, "\r\n")] = '\0';
103 memset(buf
, 0, sizeof(buf
));
108 * Reads a passphrase from /dev/tty with echo turned off/on. Returns the
109 * passphrase (allocated with xmalloc). Exits if EOF is encountered. If
110 * RP_ALLOW_STDIN is set, the passphrase will be read from stdin if no
114 read_passphrase(const char *prompt
, int flags
)
116 char *askpass
= NULL
, *ret
, buf
[1024];
117 int rppflags
, use_askpass
= 0, ttyfd
;
119 rppflags
= (flags
& RP_ECHO
) ? RPP_ECHO_ON
: RPP_ECHO_OFF
;
120 if (flags
& RP_USE_ASKPASS
)
122 else if (flags
& RP_ALLOW_STDIN
) {
123 if (!isatty(STDIN_FILENO
)) {
124 debug("read_passphrase: stdin is not a tty");
128 rppflags
|= RPP_REQUIRE_TTY
;
129 ttyfd
= open(_PATH_TTY
, O_RDWR
);
133 debug("read_passphrase: can't open %s: %s", _PATH_TTY
,
139 if ((flags
& RP_USE_ASKPASS
) && getenv("DISPLAY") == NULL
)
140 return (flags
& RP_ALLOW_EOF
) ? NULL
: xstrdup("");
142 if (use_askpass
&& getenv("DISPLAY")) {
143 if (getenv(SSH_ASKPASS_ENV
))
144 askpass
= getenv(SSH_ASKPASS_ENV
);
146 askpass
= _PATH_SSH_ASKPASS_DEFAULT
;
147 if ((ret
= ssh_askpass(askpass
, prompt
)) == NULL
)
148 if (!(flags
& RP_ALLOW_EOF
))
153 if (readpassphrase(prompt
, buf
, sizeof buf
, rppflags
) == NULL
) {
154 if (flags
& RP_ALLOW_EOF
)
160 memset(buf
, 'x', sizeof buf
);
165 ask_permission(const char *fmt
, ...)
168 char *p
, prompt
[1024];
172 vsnprintf(prompt
, sizeof(prompt
), fmt
, args
);
175 p
= read_passphrase(prompt
, RP_USE_ASKPASS
|RP_ALLOW_EOF
);
178 * Accept empty responses and responses consisting
179 * of the word "yes" as affirmative.
181 if (*p
== '\0' || *p
== '\n' ||
182 strcasecmp(p
, "yes") == 0)