mirror of
https://github.com/sheumann/hush.git
synced 2024-12-22 14:30:31 +00:00
06af216528
no preceding prototype
120 lines
2.7 KiB
C
120 lines
2.7 KiB
C
/* vi: set sw=4 ts=4: */
|
|
|
|
/*
|
|
* vlock implementation for busybox
|
|
*
|
|
* Copyright (C) 2000 by spoon <spoon@ix.netcom.com>
|
|
* Written by spoon <spon@ix.netcom.com>
|
|
*
|
|
* Licensed under GPLv2 or later, see file LICENSE in this tarball for details.
|
|
*/
|
|
|
|
/* Shoutz to Michael K. Johnson <johnsonm@redhat.com>, author of the
|
|
* original vlock. I snagged a bunch of his code to write this
|
|
* minimalistic vlock.
|
|
*/
|
|
/* Fixed by Erik Andersen to do passwords the tinylogin way...
|
|
* It now works with md5, sha1, etc passwords. */
|
|
|
|
#include "busybox.h"
|
|
#include <sys/vt.h>
|
|
|
|
static struct passwd *pw;
|
|
static struct vt_mode ovtm;
|
|
static struct termios oterm;
|
|
static int vfd;
|
|
static unsigned long o_lock_all;
|
|
|
|
static void release_vt(int signo)
|
|
{
|
|
ioctl(vfd, VT_RELDISP, !o_lock_all);
|
|
}
|
|
|
|
static void acquire_vt(int signo)
|
|
{
|
|
ioctl(vfd, VT_RELDISP, VT_ACKACQ);
|
|
}
|
|
|
|
static void restore_terminal(void)
|
|
{
|
|
ioctl(vfd, VT_SETMODE, &ovtm);
|
|
tcsetattr(STDIN_FILENO, TCSANOW, &oterm);
|
|
}
|
|
|
|
int vlock_main(int argc, char **argv);
|
|
int vlock_main(int argc, char **argv)
|
|
{
|
|
sigset_t sig;
|
|
struct sigaction sa;
|
|
struct vt_mode vtm;
|
|
struct termios term;
|
|
uid_t uid = getuid();
|
|
|
|
pw = getpwuid(uid);
|
|
if (pw == NULL)
|
|
bb_error_msg_and_die("unknown uid %d", uid);
|
|
|
|
if (argc > 2) {
|
|
bb_show_usage();
|
|
}
|
|
|
|
o_lock_all = getopt32(argc, argv, "a");
|
|
|
|
vfd = xopen(CURRENT_TTY, O_RDWR);
|
|
|
|
if (ioctl(vfd, VT_GETMODE, &vtm) < 0) {
|
|
bb_perror_msg_and_die("VT_GETMODE");
|
|
}
|
|
|
|
/* mask a bunch of signals */
|
|
sigprocmask(SIG_SETMASK, NULL, &sig);
|
|
sigdelset(&sig, SIGUSR1);
|
|
sigdelset(&sig, SIGUSR2);
|
|
sigaddset(&sig, SIGTSTP);
|
|
sigaddset(&sig, SIGTTIN);
|
|
sigaddset(&sig, SIGTTOU);
|
|
sigaddset(&sig, SIGHUP);
|
|
sigaddset(&sig, SIGCHLD);
|
|
sigaddset(&sig, SIGQUIT);
|
|
sigaddset(&sig, SIGINT);
|
|
|
|
sigemptyset(&(sa.sa_mask));
|
|
sa.sa_flags = SA_RESTART;
|
|
sa.sa_handler = release_vt;
|
|
sigaction(SIGUSR1, &sa, NULL);
|
|
sa.sa_handler = acquire_vt;
|
|
sigaction(SIGUSR2, &sa, NULL);
|
|
|
|
/* need to handle some signals so that we don't get killed by them */
|
|
sa.sa_handler = SIG_IGN;
|
|
sigaction(SIGHUP, &sa, NULL);
|
|
sigaction(SIGQUIT, &sa, NULL);
|
|
sigaction(SIGINT, &sa, NULL);
|
|
sigaction(SIGTSTP, &sa, NULL);
|
|
|
|
ovtm = vtm;
|
|
vtm.mode = VT_PROCESS;
|
|
vtm.relsig = SIGUSR1;
|
|
vtm.acqsig = SIGUSR2;
|
|
ioctl(vfd, VT_SETMODE, &vtm);
|
|
|
|
tcgetattr(STDIN_FILENO, &oterm);
|
|
term = oterm;
|
|
term.c_iflag &= ~BRKINT;
|
|
term.c_iflag |= IGNBRK;
|
|
term.c_lflag &= ~ISIG;
|
|
term.c_lflag &= ~(ECHO | ECHOCTL);
|
|
tcsetattr(STDIN_FILENO, TCSANOW, &term);
|
|
|
|
do {
|
|
printf("Virtual Console%s locked by %s.\n", (o_lock_all) ? "s" : "", pw->pw_name);
|
|
if (correct_password(pw)) {
|
|
break;
|
|
}
|
|
bb_do_delay(FAIL_DELAY);
|
|
puts("Password incorrect");
|
|
} while (1);
|
|
restore_terminal();
|
|
fflush_stdout_and_exit(0);
|
|
}
|