function old new delta buffer_fill_and_print 179 196 +17 fflush_all - 9 +9 spawn 87 92 +5 rtcwake_main 455 453 -2 ... alarm_intr 93 84 -9 readcmd 1072 1062 -10 bb_ask 345 333 -12 more_main 845 832 -13 flush_stdout_stderr 42 23 -19 xfflush_stdout 27 - -27 flush_stderr 30 - -30 ------------------------------------------------------------------------------ (add/remove: 1/2 grow/shrink: 2/50 up/down: 31/-397) Total: -366 bytes Signed-off-by: Denys Vlasenko <vda.linux@googlemail.com>
		
			
				
	
	
		
			83 lines
		
	
	
		
			1.8 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			83 lines
		
	
	
		
			1.8 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
| /* vi: set sw=4 ts=4: */
 | |
| /*
 | |
|  * Ask for a password
 | |
|  * I use a static buffer in this function.  Plan accordingly.
 | |
|  *
 | |
|  * Copyright (C) 1999-2004 by Erik Andersen <andersen@codepoet.org>
 | |
|  *
 | |
|  * Licensed under GPLv2 or later, see file LICENSE in this tarball for details.
 | |
|  */
 | |
| 
 | |
| #include "libbb.h"
 | |
| 
 | |
| /* do nothing signal handler */
 | |
| static void askpass_timeout(int UNUSED_PARAM ignore)
 | |
| {
 | |
| }
 | |
| 
 | |
| char* FAST_FUNC bb_ask_stdin(const char *prompt)
 | |
| {
 | |
| 	return bb_ask(STDIN_FILENO, 0, prompt);
 | |
| }
 | |
| char* FAST_FUNC bb_ask(const int fd, int timeout, const char *prompt)
 | |
| {
 | |
| 	/* Was static char[BIGNUM] */
 | |
| 	enum { sizeof_passwd = 128 };
 | |
| 	static char *passwd;
 | |
| 
 | |
| 	char *ret;
 | |
| 	int i;
 | |
| 	struct sigaction sa, oldsa;
 | |
| 	struct termios tio, oldtio;
 | |
| 
 | |
| 	if (!passwd)
 | |
| 		passwd = xmalloc(sizeof_passwd);
 | |
| 	memset(passwd, 0, sizeof_passwd);
 | |
| 
 | |
| 	tcgetattr(fd, &oldtio);
 | |
| 	tcflush(fd, TCIFLUSH);
 | |
| 	tio = oldtio;
 | |
| #ifndef IUCLC
 | |
| # define IUCLC 0
 | |
| #endif
 | |
| 	tio.c_iflag &= ~(IUCLC|IXON|IXOFF|IXANY);
 | |
| 	tio.c_lflag &= ~(ECHO|ECHOE|ECHOK|ECHONL|TOSTOP);
 | |
| 	tcsetattr_stdin_TCSANOW(&tio);
 | |
| 
 | |
| 	memset(&sa, 0, sizeof(sa));
 | |
| 	/* sa.sa_flags = 0; - no SA_RESTART! */
 | |
| 	/* SIGINT and SIGALRM will interrupt read below */
 | |
| 	sa.sa_handler = askpass_timeout;
 | |
| 	sigaction(SIGINT, &sa, &oldsa);
 | |
| 	if (timeout) {
 | |
| 		sigaction_set(SIGALRM, &sa);
 | |
| 		alarm(timeout);
 | |
| 	}
 | |
| 
 | |
| 	fputs(prompt, stdout);
 | |
| 	fflush_all();
 | |
| 	ret = NULL;
 | |
| 	/* On timeout or Ctrl-C, read will hopefully be interrupted,
 | |
| 	 * and we return NULL */
 | |
| 	if (read(fd, passwd, sizeof_passwd - 1) > 0) {
 | |
| 		ret = passwd;
 | |
| 		i = 0;
 | |
| 		/* Last byte is guaranteed to be 0
 | |
| 		   (read did not overwrite it) */
 | |
| 		do {
 | |
| 			if (passwd[i] == '\r' || passwd[i] == '\n')
 | |
| 				passwd[i] = '\0';
 | |
| 		} while (passwd[i++]);
 | |
| 	}
 | |
| 
 | |
| 	if (timeout) {
 | |
| 		alarm(0);
 | |
| 	}
 | |
| 	sigaction_set(SIGINT, &oldsa);
 | |
| 
 | |
| 	tcsetattr_stdin_TCSANOW(&oldtio);
 | |
| 	bb_putchar('\n');
 | |
| 	fflush_all();
 | |
| 	return ret;
 | |
| }
 |