2000-10-14 07:23:11 +02:00
|
|
|
#include "includes.h"
|
2001-02-10 22:45:02 +01:00
|
|
|
RCSID("$OpenBSD: cli.c,v 1.9 2001/02/10 12:44:02 markus Exp $");
|
2000-10-14 07:23:11 +02:00
|
|
|
|
|
|
|
#include "xmalloc.h"
|
2001-01-22 06:34:40 +01:00
|
|
|
#include "log.h"
|
2001-02-09 03:11:24 +01:00
|
|
|
#include "cli.h"
|
2000-10-14 07:23:11 +02:00
|
|
|
|
|
|
|
static int cli_input = -1;
|
|
|
|
static int cli_output = -1;
|
|
|
|
static int cli_from_stdin = 0;
|
|
|
|
|
|
|
|
sigset_t oset;
|
|
|
|
sigset_t nset;
|
|
|
|
struct sigaction nsa;
|
|
|
|
struct sigaction osa;
|
|
|
|
struct termios ntio;
|
|
|
|
struct termios otio;
|
|
|
|
int echo_modified;
|
|
|
|
|
|
|
|
volatile int intr;
|
|
|
|
|
|
|
|
static int
|
|
|
|
cli_open(int from_stdin)
|
|
|
|
{
|
|
|
|
if (cli_input >= 0 && cli_output >= 0 && cli_from_stdin == from_stdin)
|
|
|
|
return 1;
|
|
|
|
|
|
|
|
if (from_stdin) {
|
|
|
|
if (!cli_from_stdin && cli_input >= 0) {
|
|
|
|
(void)close(cli_input);
|
|
|
|
}
|
|
|
|
cli_input = STDIN_FILENO;
|
|
|
|
cli_output = STDERR_FILENO;
|
|
|
|
} else {
|
2001-02-09 03:11:24 +01:00
|
|
|
cli_input = cli_output = open(_PATH_TTY, O_RDWR);
|
2000-10-14 07:23:11 +02:00
|
|
|
if (cli_input < 0)
|
|
|
|
fatal("You have no controlling tty. Cannot read passphrase.");
|
|
|
|
}
|
|
|
|
|
|
|
|
cli_from_stdin = from_stdin;
|
|
|
|
|
|
|
|
return cli_input >= 0 && cli_output >= 0 && cli_from_stdin == from_stdin;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
2001-02-09 03:11:24 +01:00
|
|
|
cli_close(void)
|
2000-10-14 07:23:11 +02:00
|
|
|
{
|
|
|
|
if (!cli_from_stdin && cli_input >= 0)
|
|
|
|
close(cli_input);
|
|
|
|
cli_input = -1;
|
|
|
|
cli_output = -1;
|
|
|
|
cli_from_stdin = 0;
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
2001-02-09 03:11:24 +01:00
|
|
|
intrcatch(int sig)
|
2000-10-14 07:23:11 +02:00
|
|
|
{
|
|
|
|
intr = 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
2001-02-09 03:11:24 +01:00
|
|
|
cli_echo_disable(void)
|
2000-10-14 07:23:11 +02:00
|
|
|
{
|
|
|
|
sigemptyset(&nset);
|
|
|
|
sigaddset(&nset, SIGTSTP);
|
|
|
|
(void) sigprocmask(SIG_BLOCK, &nset, &oset);
|
|
|
|
|
|
|
|
intr = 0;
|
|
|
|
|
|
|
|
memset(&nsa, 0, sizeof(nsa));
|
|
|
|
nsa.sa_handler = intrcatch;
|
|
|
|
(void) sigaction(SIGINT, &nsa, &osa);
|
|
|
|
|
|
|
|
echo_modified = 0;
|
|
|
|
if (tcgetattr(cli_input, &otio) == 0 && (otio.c_lflag & ECHO)) {
|
|
|
|
echo_modified = 1;
|
|
|
|
ntio = otio;
|
|
|
|
ntio.c_lflag &= ~(ECHO | ECHOE | ECHOK | ECHONL);
|
|
|
|
(void) tcsetattr(cli_input, TCSANOW, &ntio);
|
|
|
|
}
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
2001-02-09 03:11:24 +01:00
|
|
|
cli_echo_restore(void)
|
2000-10-14 07:23:11 +02:00
|
|
|
{
|
|
|
|
if (echo_modified != 0) {
|
|
|
|
tcsetattr(cli_input, TCSANOW, &otio);
|
|
|
|
echo_modified = 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
(void) sigprocmask(SIG_SETMASK, &oset, NULL);
|
|
|
|
(void) sigaction(SIGINT, &osa, NULL);
|
|
|
|
|
|
|
|
if (intr != 0) {
|
|
|
|
kill(getpid(), SIGINT);
|
|
|
|
sigemptyset(&nset);
|
|
|
|
/* XXX tty has not neccessarily drained by now? */
|
|
|
|
sigsuspend(&nset);
|
|
|
|
intr = 0;
|
|
|
|
}
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
cli_read(char* buf, int size, int echo)
|
|
|
|
{
|
|
|
|
char ch = 0;
|
|
|
|
int i = 0;
|
|
|
|
|
|
|
|
if (!echo)
|
|
|
|
cli_echo_disable();
|
|
|
|
|
|
|
|
while (ch != '\n') {
|
|
|
|
if (read(cli_input, &ch, 1) != 1)
|
|
|
|
break;
|
|
|
|
if (ch == '\n' || intr != 0)
|
|
|
|
break;
|
|
|
|
if (i < size)
|
|
|
|
buf[i++] = ch;
|
|
|
|
}
|
|
|
|
buf[i] = '\0';
|
|
|
|
|
|
|
|
if (!echo)
|
|
|
|
cli_echo_restore();
|
|
|
|
if (!intr && !echo)
|
|
|
|
(void) write(cli_output, "\n", 1);
|
|
|
|
return i;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
2001-01-17 01:10:48 +01:00
|
|
|
cli_write(const char* buf, int size)
|
2000-10-14 07:23:11 +02:00
|
|
|
{
|
|
|
|
int i, len, pos, ret = 0;
|
|
|
|
char *output, *p;
|
|
|
|
|
|
|
|
output = xmalloc(4*size);
|
|
|
|
for (p = output, i = 0; i < size; i++) {
|
2001-02-10 22:45:02 +01:00
|
|
|
if (buf[i] == '\n' || buf[i] == '\r')
|
2001-02-05 13:42:17 +01:00
|
|
|
*p++ = buf[i];
|
|
|
|
else
|
|
|
|
p = vis(p, buf[i], 0, 0);
|
|
|
|
}
|
2000-10-14 07:23:11 +02:00
|
|
|
len = p - output;
|
|
|
|
|
|
|
|
for (pos = 0; pos < len; pos += ret) {
|
|
|
|
ret = write(cli_output, output + pos, len - pos);
|
2001-01-08 07:13:41 +01:00
|
|
|
if (ret == -1) {
|
|
|
|
xfree(output);
|
2000-10-14 07:23:11 +02:00
|
|
|
return -1;
|
2001-01-08 07:13:41 +01:00
|
|
|
}
|
2000-10-14 07:23:11 +02:00
|
|
|
}
|
2001-01-08 07:13:41 +01:00
|
|
|
xfree(output);
|
2000-10-14 07:23:11 +02:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Presents a prompt and returns the response allocated with xmalloc().
|
|
|
|
* Uses /dev/tty or stdin/out depending on arg. Optionally disables echo
|
|
|
|
* of response depending on arg. Tries to ensure that no other userland
|
|
|
|
* buffer is storing the response.
|
|
|
|
*/
|
|
|
|
char*
|
2001-01-17 01:10:48 +01:00
|
|
|
cli_read_passphrase(const char* prompt, int from_stdin, int echo_enable)
|
2000-10-14 07:23:11 +02:00
|
|
|
{
|
|
|
|
char buf[BUFSIZ];
|
|
|
|
char* p;
|
|
|
|
|
|
|
|
if (!cli_open(from_stdin))
|
|
|
|
fatal("Cannot read passphrase.");
|
|
|
|
|
|
|
|
fflush(stdout);
|
|
|
|
|
|
|
|
cli_write(prompt, strlen(prompt));
|
|
|
|
cli_read(buf, sizeof buf, echo_enable);
|
|
|
|
|
|
|
|
cli_close();
|
|
|
|
|
|
|
|
p = xstrdup(buf);
|
|
|
|
memset(buf, 0, sizeof(buf));
|
|
|
|
return (p);
|
|
|
|
}
|
|
|
|
|
|
|
|
char*
|
|
|
|
cli_prompt(char* prompt, int echo_enable)
|
|
|
|
{
|
|
|
|
return cli_read_passphrase(prompt, 0, echo_enable);
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
cli_mesg(char* mesg)
|
|
|
|
{
|
|
|
|
cli_open(0);
|
|
|
|
cli_write(mesg, strlen(mesg));
|
|
|
|
cli_write("\n", strlen("\n"));
|
|
|
|
cli_close();
|
|
|
|
return;
|
|
|
|
}
|