17c478bd9Sstevel@tonic-gate /*
27c478bd9Sstevel@tonic-gate  * lib/krb5/os/read_pwd.c
37c478bd9Sstevel@tonic-gate  *
47c478bd9Sstevel@tonic-gate  * Copyright 1990,1991 by the Massachusetts Institute of Technology.
57c478bd9Sstevel@tonic-gate  * All Rights Reserved.
67c478bd9Sstevel@tonic-gate  *
77c478bd9Sstevel@tonic-gate  * Export of this software from the United States of America may
87c478bd9Sstevel@tonic-gate  *   require a specific license from the United States Government.
97c478bd9Sstevel@tonic-gate  *   It is the responsibility of any person or organization contemplating
107c478bd9Sstevel@tonic-gate  *   export to obtain such a license before exporting.
11*55fea89dSDan Cross  *
127c478bd9Sstevel@tonic-gate  * WITHIN THAT CONSTRAINT, permission to use, copy, modify, and
137c478bd9Sstevel@tonic-gate  * distribute this software and its documentation for any purpose and
147c478bd9Sstevel@tonic-gate  * without fee is hereby granted, provided that the above copyright
157c478bd9Sstevel@tonic-gate  * notice appear in all copies and that both that copyright notice and
167c478bd9Sstevel@tonic-gate  * this permission notice appear in supporting documentation, and that
177c478bd9Sstevel@tonic-gate  * the name of M.I.T. not be used in advertising or publicity pertaining
187c478bd9Sstevel@tonic-gate  * to distribution of the software without specific, written prior
197c478bd9Sstevel@tonic-gate  * permission.  Furthermore if you modify this software you must label
207c478bd9Sstevel@tonic-gate  * your software as modified software and not distribute it in such a
217c478bd9Sstevel@tonic-gate  * fashion that it might be confused with the original M.I.T. software.
227c478bd9Sstevel@tonic-gate  * M.I.T. makes no representations about the suitability of
237c478bd9Sstevel@tonic-gate  * this software for any purpose.  It is provided "as is" without express
247c478bd9Sstevel@tonic-gate  * or implied warranty.
25*55fea89dSDan Cross  *
267c478bd9Sstevel@tonic-gate  *
277c478bd9Sstevel@tonic-gate  * libos: krb5_read_password for BSD 4.3
287c478bd9Sstevel@tonic-gate  */
297c478bd9Sstevel@tonic-gate 
30505d05c7Sgtb #include "k5-int.h"
317c478bd9Sstevel@tonic-gate 
32505d05c7Sgtb #if !defined(_WIN32)
337c478bd9Sstevel@tonic-gate #define DEFINED_KRB5_READ_PASSWORD
347c478bd9Sstevel@tonic-gate #include <stdio.h>
357c478bd9Sstevel@tonic-gate #include <errno.h>
367c478bd9Sstevel@tonic-gate #include <signal.h>
377c478bd9Sstevel@tonic-gate #include <setjmp.h>
387c478bd9Sstevel@tonic-gate 
397c478bd9Sstevel@tonic-gate #ifndef ECHO_PASSWORD
407c478bd9Sstevel@tonic-gate #include <termios.h>
417c478bd9Sstevel@tonic-gate #endif /* ECHO_PASSWORD */
427c478bd9Sstevel@tonic-gate 
43505d05c7Sgtb krb5_error_code
krb5_read_password(krb5_context context,const char * prompt,const char * prompt2,char * return_pwd,unsigned int * size_return)44505d05c7Sgtb krb5_read_password(krb5_context context, const char *prompt, const char *prompt2, char *return_pwd, unsigned int *size_return)
457c478bd9Sstevel@tonic-gate {
46*55fea89dSDan Cross     krb5_data reply_data;
47505d05c7Sgtb     krb5_prompt k5prompt;
48505d05c7Sgtb     krb5_error_code retval;
49505d05c7Sgtb     reply_data.length = *size_return; /* NB: size_return is also an input */
50505d05c7Sgtb     reply_data.data = return_pwd;
51505d05c7Sgtb     k5prompt.prompt = (char *)prompt;
52505d05c7Sgtb     k5prompt.hidden = 1;
53505d05c7Sgtb     k5prompt.reply = &reply_data;
54505d05c7Sgtb     retval =  krb5_prompter_posix(NULL,
55505d05c7Sgtb 				  NULL, NULL, NULL, 1, &k5prompt);
56505d05c7Sgtb 
57505d05c7Sgtb     if ((retval==0) && prompt2) {
58505d05c7Sgtb 	krb5_data verify_data;
59505d05c7Sgtb 	verify_data.data = malloc(*size_return);
60505d05c7Sgtb 	verify_data.length = *size_return;
61505d05c7Sgtb 	k5prompt.prompt = (char *)prompt2;
62505d05c7Sgtb 	k5prompt.reply = &verify_data;
63505d05c7Sgtb 	if (!verify_data.data)
64505d05c7Sgtb 	    return ENOMEM;
65505d05c7Sgtb 	retval = krb5_prompter_posix(NULL,
66505d05c7Sgtb 				     NULL,NULL, NULL, 1, &k5prompt);
67505d05c7Sgtb 	if (retval == 0) {
68505d05c7Sgtb 	    /* compare */
69505d05c7Sgtb 	    if (strncmp(return_pwd, (char *)verify_data.data, *size_return))
70505d05c7Sgtb 		retval = KRB5_LIBOS_BADPWDMATCH;
71505d05c7Sgtb 	}
72505d05c7Sgtb 	free(verify_data.data);
73505d05c7Sgtb     }
74505d05c7Sgtb     if (!retval)
75505d05c7Sgtb 	*size_return = k5prompt.reply->length;
76505d05c7Sgtb     else
77505d05c7Sgtb 	memset(return_pwd, 0, *size_return);
78505d05c7Sgtb     return retval;
797c478bd9Sstevel@tonic-gate }
80505d05c7Sgtb #endif
817c478bd9Sstevel@tonic-gate 
82505d05c7Sgtb #if defined(_WIN32)
83505d05c7Sgtb #define DEFINED_KRB5_READ_PASSWORD
847c478bd9Sstevel@tonic-gate 
85505d05c7Sgtb #include <io.h>
867c478bd9Sstevel@tonic-gate 
87505d05c7Sgtb typedef struct {
88505d05c7Sgtb     char *pwd_prompt;
89505d05c7Sgtb     char *pwd_prompt2;
90505d05c7Sgtb     char *pwd_return_pwd;
91505d05c7Sgtb     int  *pwd_size_return;
92505d05c7Sgtb } pwd_params;
937c478bd9Sstevel@tonic-gate 
center_dialog(HWND hwnd)94505d05c7Sgtb void center_dialog(HWND hwnd)
95505d05c7Sgtb {
96505d05c7Sgtb     int scrwidth, scrheight;
97505d05c7Sgtb     int dlgwidth, dlgheight;
98505d05c7Sgtb     RECT r;
99505d05c7Sgtb     HDC hdc;
100*55fea89dSDan Cross 
101505d05c7Sgtb     if (hwnd == NULL)
102505d05c7Sgtb 	return;
103*55fea89dSDan Cross 
104505d05c7Sgtb     GetWindowRect(hwnd, &r);
105505d05c7Sgtb     dlgwidth = r.right  - r.left;
106505d05c7Sgtb     dlgheight = r.bottom - r.top ;
107505d05c7Sgtb     hdc = GetDC(NULL);
108505d05c7Sgtb     scrwidth = GetDeviceCaps(hdc, HORZRES);
109505d05c7Sgtb     scrheight = GetDeviceCaps(hdc, VERTRES);
110505d05c7Sgtb     ReleaseDC(NULL, hdc);
111505d05c7Sgtb     r.left = (scrwidth - dlgwidth) / 2;
112505d05c7Sgtb     r.top  = (scrheight - dlgheight) / 2;
113505d05c7Sgtb     MoveWindow(hwnd, r.left, r.top, dlgwidth, dlgheight, TRUE);
114505d05c7Sgtb }
1157c478bd9Sstevel@tonic-gate 
116505d05c7Sgtb #ifdef _WIN32
117505d05c7Sgtb static krb5_error_code
read_console_password(krb5_context context,const char * prompt,const char * prompt2,char * password,int * pwsize)118505d05c7Sgtb read_console_password(
119505d05c7Sgtb     krb5_context	context,
120505d05c7Sgtb     const char		* prompt,
121505d05c7Sgtb     const char		* prompt2,
122505d05c7Sgtb     char		* password,
123505d05c7Sgtb     int			* pwsize)
124505d05c7Sgtb {
125505d05c7Sgtb     HANDLE		handle;
126505d05c7Sgtb     DWORD		old_mode, new_mode;
127505d05c7Sgtb     char		*tmpstr = 0;
128505d05c7Sgtb     char		*ptr;
129505d05c7Sgtb     int			scratchchar;
130505d05c7Sgtb     krb5_error_code	errcode = 0;
131505d05c7Sgtb 
132505d05c7Sgtb     handle = GetStdHandle(STD_INPUT_HANDLE);
133505d05c7Sgtb     if (handle == INVALID_HANDLE_VALUE)
134505d05c7Sgtb 	return ENOTTY;
135505d05c7Sgtb     if (!GetConsoleMode(handle, &old_mode))
136505d05c7Sgtb 	return ENOTTY;
137505d05c7Sgtb 
138505d05c7Sgtb     new_mode = old_mode;
139505d05c7Sgtb     new_mode |=  ( ENABLE_LINE_INPUT | ENABLE_PROCESSED_INPUT );
140505d05c7Sgtb     new_mode &= ~( ENABLE_ECHO_INPUT );
1417c478bd9Sstevel@tonic-gate 
142505d05c7Sgtb     if (!SetConsoleMode(handle, new_mode))
143505d05c7Sgtb 	return ENOTTY;
144505d05c7Sgtb 
145505d05c7Sgtb     (void) fputs(prompt, stdout);
1467c478bd9Sstevel@tonic-gate     (void) fflush(stdout);
147505d05c7Sgtb     (void) memset(password, 0, *pwsize);
1487c478bd9Sstevel@tonic-gate 
149505d05c7Sgtb     if (fgets(password, *pwsize, stdin) == NULL) {
1507c478bd9Sstevel@tonic-gate 	(void) putchar('\n');
1517c478bd9Sstevel@tonic-gate 	errcode = KRB5_LIBOS_CANTREADPWD;
1527c478bd9Sstevel@tonic-gate 	goto cleanup;
1537c478bd9Sstevel@tonic-gate     }
1547c478bd9Sstevel@tonic-gate     (void) putchar('\n');
1557c478bd9Sstevel@tonic-gate 
156505d05c7Sgtb     if ((ptr = strchr(password, '\n')))
1577c478bd9Sstevel@tonic-gate 	*ptr = '\0';
158505d05c7Sgtb     else /* need to flush */
1597c478bd9Sstevel@tonic-gate 	do {
1607c478bd9Sstevel@tonic-gate 	    scratchchar = getchar();
1617c478bd9Sstevel@tonic-gate 	} while (scratchchar != EOF && scratchchar != '\n');
1627c478bd9Sstevel@tonic-gate 
1637c478bd9Sstevel@tonic-gate     if (prompt2) {
164505d05c7Sgtb 	if (! (tmpstr = (char *)malloc(*pwsize))) {
1657c478bd9Sstevel@tonic-gate 	    errcode = ENOMEM;
1667c478bd9Sstevel@tonic-gate 	    goto cleanup;
1677c478bd9Sstevel@tonic-gate 	}
168505d05c7Sgtb 	(void) fputs(prompt2, stdout);
169505d05c7Sgtb 	(void) fflush(stdout);
170505d05c7Sgtb 	if (fgets(tmpstr, *pwsize, stdin) == NULL) {
1717c478bd9Sstevel@tonic-gate 	    (void) putchar('\n');
1727c478bd9Sstevel@tonic-gate 	    errcode = KRB5_LIBOS_CANTREADPWD;
1737c478bd9Sstevel@tonic-gate 	    goto cleanup;
1747c478bd9Sstevel@tonic-gate 	}
1757c478bd9Sstevel@tonic-gate 	(void) putchar('\n');
1767c478bd9Sstevel@tonic-gate 
177505d05c7Sgtb 	if ((ptr = strchr(tmpstr, '\n')))
1787c478bd9Sstevel@tonic-gate 	    *ptr = '\0';
179505d05c7Sgtb 	else /* need to flush */
1807c478bd9Sstevel@tonic-gate 	    do {
1817c478bd9Sstevel@tonic-gate 		scratchchar = getchar();
1827c478bd9Sstevel@tonic-gate 	    } while (scratchchar != EOF && scratchchar != '\n');
183505d05c7Sgtb 
184505d05c7Sgtb 	if (strncmp(password, tmpstr, *pwsize)) {
1857c478bd9Sstevel@tonic-gate 	    errcode = KRB5_LIBOS_BADPWDMATCH;
1867c478bd9Sstevel@tonic-gate 	    goto cleanup;
1877c478bd9Sstevel@tonic-gate 	}
1887c478bd9Sstevel@tonic-gate     }
189505d05c7Sgtb 
1907c478bd9Sstevel@tonic-gate cleanup:
191505d05c7Sgtb     (void) SetConsoleMode(handle, old_mode);
192505d05c7Sgtb     if (tmpstr) {
193505d05c7Sgtb 	(void) memset(tmpstr, 0, *pwsize);
194505d05c7Sgtb 	(void) free(tmpstr);
1957c478bd9Sstevel@tonic-gate     }
1967c478bd9Sstevel@tonic-gate     if (errcode)
197505d05c7Sgtb 	(void) memset(password, 0, *pwsize);
1987c478bd9Sstevel@tonic-gate     else
199505d05c7Sgtb 	*pwsize = strlen(password);
2007c478bd9Sstevel@tonic-gate     return errcode;
2017c478bd9Sstevel@tonic-gate }
202505d05c7Sgtb #endif
203505d05c7Sgtb 
204505d05c7Sgtb static int CALLBACK
read_pwd_proc(HWND hdlg,UINT msg,WPARAM wParam,LPARAM lParam)205505d05c7Sgtb read_pwd_proc(HWND hdlg, UINT msg, WPARAM wParam, LPARAM lParam)
206505d05c7Sgtb {
207505d05c7Sgtb     pwd_params *dp;
208*55fea89dSDan Cross 
209505d05c7Sgtb     switch(msg) {
210505d05c7Sgtb     case WM_INITDIALOG:
211505d05c7Sgtb 	dp = (pwd_params *) lParam;
212159d09a2SMark Phalan 	SetWindowLongPtr(hdlg, DWLP_USER, lParam);
213505d05c7Sgtb 	SetDlgItemText(hdlg, ID_READ_PWD_PROMPT, dp->pwd_prompt);
214505d05c7Sgtb 	SetDlgItemText(hdlg, ID_READ_PWD_PROMPT2, dp->pwd_prompt2);
215505d05c7Sgtb 	SetDlgItemText(hdlg, ID_READ_PWD_PWD, "");
216505d05c7Sgtb 	center_dialog(hdlg);
217505d05c7Sgtb 	return TRUE;
218505d05c7Sgtb 
219505d05c7Sgtb     case WM_COMMAND:
220159d09a2SMark Phalan 	dp = (pwd_params *) GetWindowLongPtr(hdlg, DWLP_USER);
221505d05c7Sgtb         switch (wParam) {
222505d05c7Sgtb 	case IDOK:
223505d05c7Sgtb 	    *(dp->pwd_size_return) =
224*55fea89dSDan Cross 		GetDlgItemText(hdlg, ID_READ_PWD_PWD,
225505d05c7Sgtb 			       dp->pwd_return_pwd, *(dp->pwd_size_return));
226505d05c7Sgtb 	    EndDialog(hdlg, TRUE);
227505d05c7Sgtb 	    break;
228*55fea89dSDan Cross 
229505d05c7Sgtb 	case IDCANCEL:
230505d05c7Sgtb 	    memset(dp->pwd_return_pwd, 0 , *(dp->pwd_size_return));
231505d05c7Sgtb 	    *(dp->pwd_size_return) = 0;
232505d05c7Sgtb 	    EndDialog(hdlg, FALSE);
233505d05c7Sgtb 	    break;
234505d05c7Sgtb         }
235505d05c7Sgtb         return TRUE;
236*55fea89dSDan Cross 
237505d05c7Sgtb     default:
238505d05c7Sgtb         return FALSE;
239505d05c7Sgtb     }
240505d05c7Sgtb }
241505d05c7Sgtb 
242505d05c7Sgtb krb5_error_code KRB5_CALLCONV
krb5_read_password(context,prompt,prompt2,return_pwd,size_return)243505d05c7Sgtb krb5_read_password(context, prompt, prompt2, return_pwd, size_return)
244505d05c7Sgtb     krb5_context context;
245505d05c7Sgtb     const char *prompt;
246505d05c7Sgtb     const char *prompt2;
247505d05c7Sgtb     char *return_pwd;
248505d05c7Sgtb     int *size_return;
249505d05c7Sgtb {
250505d05c7Sgtb     DLGPROC dlgproc;
251505d05c7Sgtb     HINSTANCE hinst;
252505d05c7Sgtb     pwd_params dps;
253505d05c7Sgtb     int rc;
254505d05c7Sgtb 
255505d05c7Sgtb #ifdef _WIN32
256505d05c7Sgtb     if (_isatty(_fileno(stdin)))
257505d05c7Sgtb 	return(read_console_password
258505d05c7Sgtb 	       (context, prompt, prompt2, return_pwd, size_return));
259505d05c7Sgtb #endif
260505d05c7Sgtb 
261505d05c7Sgtb     dps.pwd_prompt = prompt;
262505d05c7Sgtb     dps.pwd_prompt2 = prompt2;
263505d05c7Sgtb     dps.pwd_return_pwd = return_pwd;
264505d05c7Sgtb     dps.pwd_size_return = size_return;
265505d05c7Sgtb 
266505d05c7Sgtb     hinst = get_lib_instance();
267505d05c7Sgtb #ifdef _WIN32
268505d05c7Sgtb     dlgproc = read_pwd_proc;
269505d05c7Sgtb #else
270505d05c7Sgtb     dlgproc = (FARPROC) MakeProcInstance(read_pwd_proc, hinst);
271505d05c7Sgtb #endif
272505d05c7Sgtb     rc = DialogBoxParam(hinst, MAKEINTRESOURCE(ID_READ_PWD_DIALOG), 0,
273505d05c7Sgtb 			dlgproc, (LPARAM) &dps);
274505d05c7Sgtb #ifndef _WIN32
275505d05c7Sgtb     FreeProcInstance ((FARPROC) dlgproc);
276505d05c7Sgtb #endif
277505d05c7Sgtb     return 0;
278505d05c7Sgtb }
279505d05c7Sgtb #endif
2807c478bd9Sstevel@tonic-gate 
2817c478bd9Sstevel@tonic-gate #ifndef DEFINED_KRB5_READ_PASSWORD
2827c478bd9Sstevel@tonic-gate #define DEFINED_KRB5_READ_PASSWORD
2837c478bd9Sstevel@tonic-gate /*
2847c478bd9Sstevel@tonic-gate  * Don't expect to be called, just define it for sanity and the linker.
2857c478bd9Sstevel@tonic-gate  */
286505d05c7Sgtb krb5_error_code KRB5_CALLCONV
krb5_read_password(context,prompt,prompt2,return_pwd,size_return)2877c478bd9Sstevel@tonic-gate krb5_read_password(context, prompt, prompt2, return_pwd, size_return)
2887c478bd9Sstevel@tonic-gate     krb5_context context;
2897c478bd9Sstevel@tonic-gate     const char *prompt;
2907c478bd9Sstevel@tonic-gate     const char *prompt2;
2917c478bd9Sstevel@tonic-gate     char *return_pwd;
2927c478bd9Sstevel@tonic-gate     int *size_return;
2937c478bd9Sstevel@tonic-gate {
2947c478bd9Sstevel@tonic-gate    *size_return = 0;
2957c478bd9Sstevel@tonic-gate    return KRB5_LIBOS_CANTREADPWD;
2967c478bd9Sstevel@tonic-gate }
297505d05c7Sgtb #endif
298