/*
- * Copyright (c) 1988, 1993
+ * Portions of this code are Copyright (c) 1988, 1993
* The Regents of the University of California. All rights reserved.
*
* Redistribution and use in source and binary forms, with or without
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
* SUCH DAMAGE.
*
- * $ID$
+ * $Id$
*/
#include <stdio.h>
-#include <unistd.h>
#include <termios.h>
+#include <unistd.h> /* for ttyname() */
+#include "h/mh.h" /* for adios() */
-#define PASSWORD_LEN 128
+/* We don't use MAX_PASS here because the maximum password length on a remote
+ POP daemon will have nothing to do with the length on our OS. 256 is
+ arbitrary but hopefully big enough to accomodate everyone. */
+#define MAX_PASSWORD_LEN 256
#ifndef TCSANOW
#define TCSANOW 0
#endif
-char *getpass(const char *prompt)
+char *
+nmh_getpass(const char *prompt)
{
struct termios oterm, term;
int ch;
- char *p, *ttystring, buf[PASSWORD_LEN+1];
+ char *p, *ttystring;
FILE *fout, *fin;
+ static char buf[MAX_PASSWORD_LEN + 1];
/* Find if stdin is connect to a terminal. If so, read directly from
* the terminal, and turn off echo. Otherwise read from stdin.
*/
- if((ttystring = ttyname(fileno(stdin))) == NULL) {
+ if((ttystring = (char *)ttyname(fileno(stdin))) == NULL) {
fout = stderr;
fin = stdin;
}
(void)tcsetattr(fileno(fin), TCSANOW, &term);
}
- for (p = buf; (ch = getc(fin)) != EOF && ch != '\n';)
- if (p < buf + PASSWORD_LEN)
- *p++ = ch;
+ for (p = buf; (ch = getc(fin)) != EOF &&
+ ch != '\n' &&
+ p < buf + MAX_PASSWORD_LEN;)
+ *p++ = ch;
*p = '\0';
if(ttystring != NULL) {
(void)fputc('\n', fout);
(void)fclose(fin);
}
- return(buf);
+ return buf;
}