read_pwd.c revision 7c478bd95313f5f23a4c958a745db2134aa03244
/*
* Copyright 2004 Sun Microsystems, Inc. All rights reserved.
* Use is subject to license terms.
*/
#pragma ident "%Z%%M% %I% %E% SMI"
/*
* lib/krb5/os/read_pwd.c
*
* Copyright 1990,1991 by the Massachusetts Institute of Technology.
* All Rights Reserved.
*
* Export of this software from the United States of America may
* require a specific license from the United States Government.
* It is the responsibility of any person or organization contemplating
* export to obtain such a license before exporting.
*
* WITHIN THAT CONSTRAINT, permission to use, copy, modify, and
* distribute this software and its documentation for any purpose and
* without fee is hereby granted, provided that the above copyright
* notice appear in all copies and that both that copyright notice and
* this permission notice appear in supporting documentation, and that
* the name of M.I.T. not be used in advertising or publicity pertaining
* to distribution of the software without specific, written prior
* permission. Furthermore if you modify this software you must label
* your software as modified software and not distribute it in such a
* fashion that it might be confused with the original M.I.T. software.
* M.I.T. makes no representations about the suitability of
* this software for any purpose. It is provided "as is" without express
* or implied warranty.
*
*
* libos: krb5_read_password for BSD 4.3
*/
#include <k5-int.h>
#if !defined(_MSDOS) && !defined(_WIN32) && !defined(macintosh)
#define DEFINED_KRB5_READ_PASSWORD
#include <stdio.h>
#include <errno.h>
#include <signal.h>
#include <setjmp.h>
/*
* Solaris kerberos: include this for internationalization
*/
#include <libintl.h>
#ifndef ECHO_PASSWORD
#include <termios.h>
#endif /* ECHO_PASSWORD */
static jmp_buf pwd_jump;
/*ARGSUSED*/
static krb5_sigtype
intr_routine(signo)
int signo;
{
longjmp(pwd_jump, 1);
/*NOTREACHED*/
}
/*ARGSUSED*/
krb5_error_code
krb5_read_password(context, prompt, prompt2, return_pwd, size_return)
krb5_context context;
const char *prompt;
const char *prompt2;
char *return_pwd;
unsigned int *size_return;
{
/* adapted from Kerberos v4 des/read_password.c */
/* readin_string is used after a longjmp, so must be volatile */
char *volatile readin_string = 0;
register char *ptr;
int scratchchar;
krb5_sigtype (*volatile ointrfunc)();
krb5_error_code errcode;
#ifndef ECHO_PASSWORD
struct termios echo_control, save_control;
int fd;
/* get the file descriptor associated with stdin */
fd=fileno(stdin);
if (tcgetattr(fd, &echo_control) == -1)
return errno;
save_control = echo_control;
echo_control.c_lflag &= ~(ECHO|ECHONL);
if (tcsetattr(fd, TCSANOW, &echo_control) == -1)
return errno;
#endif /* ECHO_PASSWORD */
if (setjmp(pwd_jump)) {
errcode = KRB5_LIBOS_PWDINTR; /* we were interrupted... */
goto cleanup;
}
/* save intrfunc */
ointrfunc = signal(SIGINT, intr_routine);
/* put out the prompt */
(void) fputs(dgettext(TEXT_DOMAIN, prompt), stdout);
(void) fflush(stdout);
(void) memset(return_pwd, 0, *size_return);
if (fgets(return_pwd, *size_return, stdin) == NULL) {
(void) putchar('\n');
errcode = KRB5_LIBOS_CANTREADPWD;
goto cleanup;
}
(void) putchar('\n');
/* fgets always null-terminates the returned string */
/* replace newline with null */
if ((ptr = strchr(return_pwd, '\n')))
*ptr = '\0';
else /* flush rest of input line */
do {
scratchchar = getchar();
} while (scratchchar != EOF && scratchchar != '\n');
if (prompt2) {
/* put out the prompt */
(void) fputs(dgettext(TEXT_DOMAIN, prompt2), stdout);
(void) fflush(stdout);
readin_string = malloc(*size_return);
if (!readin_string) {
errcode = ENOMEM;
goto cleanup;
}
(void) memset((char *)readin_string, 0, *size_return);
if (fgets((char *)readin_string, *size_return, stdin) == NULL) {
(void) putchar('\n');
errcode = KRB5_LIBOS_CANTREADPWD;
goto cleanup;
}
(void) putchar('\n');
if ((ptr = strchr((char *)readin_string, '\n')))
*ptr = '\0';
else /* need to flush */
do {
scratchchar = getchar();
} while (scratchchar != EOF && scratchchar != '\n');
/* compare */
if (strncmp(return_pwd, (char *)readin_string, *size_return)) {
errcode = KRB5_LIBOS_BADPWDMATCH;
goto cleanup;
}
}
errcode = 0;
cleanup:
(void) signal(SIGINT, ointrfunc);
#ifndef ECHO_PASSWORD
if ((tcsetattr(fd, TCSANOW, &save_control) == -1) &&
errcode == 0)
return errno;
#endif
if (readin_string) {
memset((char *)readin_string, 0, *size_return);
krb5_xfree(readin_string);
}
if (errcode)
memset(return_pwd, 0, *size_return);
else
*size_return = strlen(return_pwd);
return errcode;
}
#else /* MSDOS */
#ifndef DEFINED_KRB5_READ_PASSWORD
#define DEFINED_KRB5_READ_PASSWORD
/*
* Don't expect to be called, just define it for sanity and the linker.
*/
KRB5_DLLIMP krb5_error_code KRB5_CALLCONV
krb5_read_password(context, prompt, prompt2, return_pwd, size_return)
krb5_context context;
const char *prompt;
const char *prompt2;
char *return_pwd;
int *size_return;
{
*size_return = 0;
return KRB5_LIBOS_CANTREADPWD;
}
#endif /* DEFINED_KRB5_READ_PASSWORD */
#endif /* MSDOS */