diff options
author | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-04-10 20:49:52 +0000 |
---|---|---|
committer | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-04-10 20:49:52 +0000 |
commit | 55944e5e40b1be2afc4855d8d2baf4b73d1876b5 (patch) | |
tree | 33f869f55a1b149e9b7c2b7e201867ca5dd52992 /src/reply-password | |
parent | Initial commit. (diff) | |
download | systemd-55944e5e40b1be2afc4855d8d2baf4b73d1876b5.tar.xz systemd-55944e5e40b1be2afc4855d8d2baf4b73d1876b5.zip |
Adding upstream version 255.4.upstream/255.4
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to '')
-rw-r--r-- | src/reply-password/meson.build | 8 | ||||
-rw-r--r-- | src/reply-password/reply-password.c | 80 |
2 files changed, 88 insertions, 0 deletions
diff --git a/src/reply-password/meson.build b/src/reply-password/meson.build new file mode 100644 index 0000000..ace112c --- /dev/null +++ b/src/reply-password/meson.build @@ -0,0 +1,8 @@ +# SPDX-License-Identifier: LGPL-2.1-or-later + +executables += [ + libexec_template + { + 'name' : 'systemd-reply-password', + 'sources' : files('reply-password.c'), + }, +] diff --git a/src/reply-password/reply-password.c b/src/reply-password/reply-password.c new file mode 100644 index 0000000..ce4582a --- /dev/null +++ b/src/reply-password/reply-password.c @@ -0,0 +1,80 @@ +/* SPDX-License-Identifier: LGPL-2.1-or-later */ + +#include <errno.h> +#include <stddef.h> +#include <sys/un.h> + +#include "alloc-util.h" +#include "main-func.h" +#include "fd-util.h" +#include "fileio.h" +#include "log.h" +#include "macro.h" +#include "memory-util.h" +#include "socket-util.h" +#include "string-util.h" + +static int send_on_socket(int fd, const char *socket_name, const void *packet, size_t size) { + union sockaddr_union sa = {}; + int salen; + + assert(fd >= 0); + assert(socket_name); + assert(packet); + + salen = sockaddr_un_set_path(&sa.un, socket_name); + if (salen < 0) + return log_error_errno(salen, "Specified socket path for AF_UNIX socket invalid, refusing: %s", socket_name); + + if (sendto(fd, packet, size, MSG_NOSIGNAL, &sa.sa, salen) < 0) + return log_error_errno(errno, "Failed to send: %m"); + + return 0; +} + +static int run(int argc, char *argv[]) { + _cleanup_(erase_and_freep) char *packet = NULL; + _cleanup_close_ int fd = -EBADF; + size_t length = 0; + int r; + + log_setup(); + + if (argc != 3) + return log_error_errno(SYNTHETIC_ERRNO(EINVAL), "Wrong number of arguments."); + + if (streq(argv[1], "1")) { + _cleanup_(erase_and_freep) char *line = NULL; + + r = read_line(stdin, LONG_LINE_MAX, &line); + if (r < 0) + return log_error_errno(r, "Failed to read password: %m"); + if (r == 0) + return log_error_errno(SYNTHETIC_ERRNO(EIO), + "Got EOF while reading password."); + + packet = strjoin("+", line); + if (!packet) + return log_oom(); + + length = 1 + strlen(line) + 1; + + } else if (streq(argv[1], "0")) { + packet = strdup("-"); + if (!packet) + return log_oom(); + + length = 1; + + } else + return log_error_errno(SYNTHETIC_ERRNO(EINVAL), + "Invalid first argument %s", argv[1]); + + fd = socket(AF_UNIX, SOCK_DGRAM|SOCK_CLOEXEC|SOCK_NONBLOCK, 0); + if (fd < 0) + return log_error_errno(errno, "socket() failed: %m"); + + return send_on_socket(fd, argv[2], packet, length); +} + +DEFINE_MAIN_FUNCTION(run); |