blob: 6a58256906e46f71899985791cb95040641b6c13 [file] [log] [blame]
Ben Lindstrome487d842001-05-08 20:05:44 +00001/* $OpenBSD: cli.c,v 1.13 2001/05/06 21:23:31 markus Exp $ */
Ben Lindstromb22c2b82001-03-05 06:50:47 +00002
3/*
4 * Copyright (c) 2000 Markus Friedl. All rights reserved.
5 *
6 * Redistribution and use in source and binary forms, with or without
7 * modification, are permitted provided that the following conditions
8 * are met:
9 * 1. Redistributions of source code must retain the above copyright
10 * notice, this list of conditions and the following disclaimer.
11 * 2. Redistributions in binary form must reproduce the above copyright
12 * notice, this list of conditions and the following disclaimer in the
13 * documentation and/or other materials provided with the distribution.
14 *
15 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
16 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
17 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
18 * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
19 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
20 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
21 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
22 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
23 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
24 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
25 */
26
Damien Miller874d77b2000-10-14 16:23:11 +110027#include "includes.h"
Ben Lindstrome487d842001-05-08 20:05:44 +000028RCSID("$OpenBSD: cli.c,v 1.13 2001/05/06 21:23:31 markus Exp $");
Damien Miller874d77b2000-10-14 16:23:11 +110029
30#include "xmalloc.h"
Ben Lindstrom226cfa02001-01-22 05:34:40 +000031#include "log.h"
Ben Lindstrom31ca54a2001-02-09 02:11:24 +000032#include "cli.h"
Damien Miller874d77b2000-10-14 16:23:11 +110033
34static int cli_input = -1;
35static int cli_output = -1;
36static int cli_from_stdin = 0;
37
38sigset_t oset;
39sigset_t nset;
40struct sigaction nsa;
41struct sigaction osa;
42struct termios ntio;
43struct termios otio;
44int echo_modified;
45
46volatile int intr;
47
48static int
49cli_open(int from_stdin)
50{
51 if (cli_input >= 0 && cli_output >= 0 && cli_from_stdin == from_stdin)
52 return 1;
53
54 if (from_stdin) {
55 if (!cli_from_stdin && cli_input >= 0) {
56 (void)close(cli_input);
57 }
58 cli_input = STDIN_FILENO;
59 cli_output = STDERR_FILENO;
60 } else {
Ben Lindstrom31ca54a2001-02-09 02:11:24 +000061 cli_input = cli_output = open(_PATH_TTY, O_RDWR);
Damien Miller874d77b2000-10-14 16:23:11 +110062 if (cli_input < 0)
63 fatal("You have no controlling tty. Cannot read passphrase.");
64 }
65
66 cli_from_stdin = from_stdin;
67
68 return cli_input >= 0 && cli_output >= 0 && cli_from_stdin == from_stdin;
69}
70
71static void
Ben Lindstrom31ca54a2001-02-09 02:11:24 +000072cli_close(void)
Damien Miller874d77b2000-10-14 16:23:11 +110073{
74 if (!cli_from_stdin && cli_input >= 0)
75 close(cli_input);
76 cli_input = -1;
77 cli_output = -1;
78 cli_from_stdin = 0;
79 return;
80}
81
82void
Ben Lindstrom31ca54a2001-02-09 02:11:24 +000083intrcatch(int sig)
Damien Miller874d77b2000-10-14 16:23:11 +110084{
85 intr = 1;
86}
87
88static void
Ben Lindstrom31ca54a2001-02-09 02:11:24 +000089cli_echo_disable(void)
Damien Miller874d77b2000-10-14 16:23:11 +110090{
91 sigemptyset(&nset);
92 sigaddset(&nset, SIGTSTP);
93 (void) sigprocmask(SIG_BLOCK, &nset, &oset);
94
95 intr = 0;
96
97 memset(&nsa, 0, sizeof(nsa));
98 nsa.sa_handler = intrcatch;
99 (void) sigaction(SIGINT, &nsa, &osa);
100
101 echo_modified = 0;
102 if (tcgetattr(cli_input, &otio) == 0 && (otio.c_lflag & ECHO)) {
103 echo_modified = 1;
104 ntio = otio;
105 ntio.c_lflag &= ~(ECHO | ECHOE | ECHOK | ECHONL);
106 (void) tcsetattr(cli_input, TCSANOW, &ntio);
107 }
108 return;
109}
110
111static void
Ben Lindstrom31ca54a2001-02-09 02:11:24 +0000112cli_echo_restore(void)
Damien Miller874d77b2000-10-14 16:23:11 +1100113{
114 if (echo_modified != 0) {
115 tcsetattr(cli_input, TCSANOW, &otio);
116 echo_modified = 0;
117 }
118
119 (void) sigprocmask(SIG_SETMASK, &oset, NULL);
120 (void) sigaction(SIGINT, &osa, NULL);
121
122 if (intr != 0) {
123 kill(getpid(), SIGINT);
124 sigemptyset(&nset);
125 /* XXX tty has not neccessarily drained by now? */
126 sigsuspend(&nset);
127 intr = 0;
128 }
129 return;
130}
131
132static int
133cli_read(char* buf, int size, int echo)
134{
135 char ch = 0;
136 int i = 0;
Ben Lindstromb3144e52001-03-06 03:31:34 +0000137 int n;
Damien Miller874d77b2000-10-14 16:23:11 +1100138
139 if (!echo)
140 cli_echo_disable();
141
142 while (ch != '\n') {
Ben Lindstromb3144e52001-03-06 03:31:34 +0000143 n = read(cli_input, &ch, 1);
Ben Lindstrome487d842001-05-08 20:05:44 +0000144 if (intr)
145 break;
Ben Lindstromb3144e52001-03-06 03:31:34 +0000146 if (n == -1 && (errno == EAGAIN || errno == EINTR))
147 continue;
148 if (n != 1)
Damien Miller874d77b2000-10-14 16:23:11 +1100149 break;
Ben Lindstrome487d842001-05-08 20:05:44 +0000150 if (ch == '\n')
Damien Miller874d77b2000-10-14 16:23:11 +1100151 break;
Ben Lindstrome487d842001-05-08 20:05:44 +0000152 if (i < size - 1)
Damien Miller874d77b2000-10-14 16:23:11 +1100153 buf[i++] = ch;
154 }
Ben Lindstrome487d842001-05-08 20:05:44 +0000155 if (intr)
156 i = 0;
Damien Miller874d77b2000-10-14 16:23:11 +1100157 buf[i] = '\0';
158
159 if (!echo)
160 cli_echo_restore();
161 if (!intr && !echo)
162 (void) write(cli_output, "\n", 1);
163 return i;
164}
165
166static int
Damien Miller92e78f82001-01-17 11:10:48 +1100167cli_write(const char* buf, int size)
Damien Miller874d77b2000-10-14 16:23:11 +1100168{
169 int i, len, pos, ret = 0;
170 char *output, *p;
171
172 output = xmalloc(4*size);
173 for (p = output, i = 0; i < size; i++) {
Ben Lindstromfdc9ab02001-02-10 21:45:02 +0000174 if (buf[i] == '\n' || buf[i] == '\r')
Kevin Stevesef4eea92001-02-05 12:42:17 +0000175 *p++ = buf[i];
176 else
177 p = vis(p, buf[i], 0, 0);
178 }
Damien Miller874d77b2000-10-14 16:23:11 +1100179 len = p - output;
180
181 for (pos = 0; pos < len; pos += ret) {
182 ret = write(cli_output, output + pos, len - pos);
Ben Lindstroma383baa2001-01-08 06:13:41 +0000183 if (ret == -1) {
184 xfree(output);
Damien Miller874d77b2000-10-14 16:23:11 +1100185 return -1;
Ben Lindstroma383baa2001-01-08 06:13:41 +0000186 }
Damien Miller874d77b2000-10-14 16:23:11 +1100187 }
Ben Lindstroma383baa2001-01-08 06:13:41 +0000188 xfree(output);
Damien Miller874d77b2000-10-14 16:23:11 +1100189 return 0;
190}
191
192/*
193 * Presents a prompt and returns the response allocated with xmalloc().
194 * Uses /dev/tty or stdin/out depending on arg. Optionally disables echo
195 * of response depending on arg. Tries to ensure that no other userland
196 * buffer is storing the response.
197 */
198char*
Damien Miller92e78f82001-01-17 11:10:48 +1100199cli_read_passphrase(const char* prompt, int from_stdin, int echo_enable)
Damien Miller874d77b2000-10-14 16:23:11 +1100200{
201 char buf[BUFSIZ];
202 char* p;
203
204 if (!cli_open(from_stdin))
205 fatal("Cannot read passphrase.");
206
207 fflush(stdout);
208
209 cli_write(prompt, strlen(prompt));
210 cli_read(buf, sizeof buf, echo_enable);
211
212 cli_close();
213
214 p = xstrdup(buf);
215 memset(buf, 0, sizeof(buf));
216 return (p);
217}
218
219char*
220cli_prompt(char* prompt, int echo_enable)
221{
222 return cli_read_passphrase(prompt, 0, echo_enable);
223}
224
225void
226cli_mesg(char* mesg)
227{
228 cli_open(0);
229 cli_write(mesg, strlen(mesg));
230 cli_write("\n", strlen("\n"));
231 cli_close();
232 return;
233}