2008-04-08 11:55:46 +03:00
|
|
|
/* See LICENSE file for license details. */
|
2006-10-12 10:33:38 +03:00
|
|
|
#define _XOPEN_SOURCE 500
|
2006-10-31 09:43:25 +02:00
|
|
|
#if HAVE_SHADOW_H
|
|
|
|
#include <shadow.h>
|
|
|
|
#endif
|
2006-10-12 09:11:08 +03:00
|
|
|
|
2006-10-12 10:33:38 +03:00
|
|
|
#include <ctype.h>
|
2009-11-26 14:53:26 +02:00
|
|
|
#include <errno.h>
|
2016-09-07 14:32:29 +03:00
|
|
|
#include <grp.h>
|
2006-10-31 09:35:54 +02:00
|
|
|
#include <pwd.h>
|
2007-11-24 22:17:32 +02:00
|
|
|
#include <stdarg.h>
|
2006-10-11 13:35:21 +03:00
|
|
|
#include <stdlib.h>
|
|
|
|
#include <stdio.h>
|
|
|
|
#include <string.h>
|
|
|
|
#include <unistd.h>
|
|
|
|
#include <sys/types.h>
|
2015-02-26 00:06:45 +02:00
|
|
|
#include <X11/extensions/Xrandr.h>
|
2006-10-11 13:35:21 +03:00
|
|
|
#include <X11/keysym.h>
|
|
|
|
#include <X11/Xlib.h>
|
|
|
|
#include <X11/Xutil.h>
|
2008-02-22 12:13:12 +02:00
|
|
|
|
2016-08-22 01:25:21 +03:00
|
|
|
#include "arg.h"
|
2016-07-31 14:43:00 +03:00
|
|
|
#include "util.h"
|
|
|
|
|
2016-08-22 01:25:21 +03:00
|
|
|
char *argv0;
|
|
|
|
|
2015-02-12 00:56:35 +02:00
|
|
|
enum {
|
|
|
|
INIT,
|
|
|
|
INPUT,
|
2015-05-06 19:18:50 +03:00
|
|
|
FAILED,
|
2015-02-12 00:56:35 +02:00
|
|
|
NUMCOLS
|
|
|
|
};
|
|
|
|
|
2014-12-22 12:16:26 +02:00
|
|
|
#include "config.h"
|
|
|
|
|
2016-09-12 00:08:19 +03:00
|
|
|
struct lock {
|
2009-11-26 14:53:26 +02:00
|
|
|
int screen;
|
2012-02-05 17:38:58 +02:00
|
|
|
Window root, win;
|
2009-11-26 14:53:26 +02:00
|
|
|
Pixmap pmap;
|
2015-02-12 00:56:35 +02:00
|
|
|
unsigned long colors[NUMCOLS];
|
2016-09-12 00:08:19 +03:00
|
|
|
};
|
2009-11-26 14:53:26 +02:00
|
|
|
|
2016-09-12 00:08:19 +03:00
|
|
|
struct xrandr {
|
|
|
|
int active;
|
|
|
|
int evbase;
|
|
|
|
int errbase;
|
|
|
|
};
|
2009-11-26 14:53:26 +02:00
|
|
|
|
2008-07-29 21:14:53 +03:00
|
|
|
static void
|
2015-01-27 23:16:52 +02:00
|
|
|
die(const char *errstr, ...)
|
|
|
|
{
|
2007-11-24 22:17:32 +02:00
|
|
|
va_list ap;
|
|
|
|
|
|
|
|
va_start(ap, errstr);
|
|
|
|
vfprintf(stderr, errstr, ap);
|
|
|
|
va_end(ap);
|
2015-01-27 23:16:52 +02:00
|
|
|
exit(1);
|
2007-11-24 22:17:32 +02:00
|
|
|
}
|
|
|
|
|
2013-08-02 23:11:18 +03:00
|
|
|
#ifdef __linux__
|
|
|
|
#include <fcntl.h>
|
2016-08-23 02:45:46 +03:00
|
|
|
#include <linux/oom.h>
|
2013-08-02 23:11:18 +03:00
|
|
|
|
|
|
|
static void
|
2015-01-27 23:16:52 +02:00
|
|
|
dontkillme(void)
|
|
|
|
{
|
2016-08-23 02:45:46 +03:00
|
|
|
FILE *f;
|
|
|
|
const char oomfile[] = "/proc/self/oom_score_adj";
|
2013-08-02 23:11:18 +03:00
|
|
|
|
2016-08-23 02:45:46 +03:00
|
|
|
if (!(f = fopen(oomfile, "w"))) {
|
|
|
|
if (errno == ENOENT)
|
|
|
|
return;
|
|
|
|
die("slock: fopen %s: %s\n", oomfile, strerror(errno));
|
2016-02-14 02:28:37 +02:00
|
|
|
}
|
2016-08-23 02:45:46 +03:00
|
|
|
fprintf(f, "%d", OOM_SCORE_ADJ_MIN);
|
|
|
|
if (fclose(f)) {
|
|
|
|
if (errno == EACCES)
|
|
|
|
die("slock: unable to disable OOM killer. "
|
2016-10-02 00:50:49 +03:00
|
|
|
"Make sure to suid or sgid slock.\n");
|
2016-08-23 02:45:46 +03:00
|
|
|
else
|
2016-10-02 00:50:49 +03:00
|
|
|
die("slock: fclose %s: %s\n", oomfile, strerror(errno));
|
2016-02-14 02:28:37 +02:00
|
|
|
}
|
2013-08-02 23:11:18 +03:00
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2008-07-29 21:14:53 +03:00
|
|
|
static const char *
|
2016-09-12 00:10:57 +03:00
|
|
|
gethash(void)
|
2015-01-27 23:16:52 +02:00
|
|
|
{
|
2016-09-12 00:10:57 +03:00
|
|
|
const char *hash;
|
2006-10-31 09:35:54 +02:00
|
|
|
struct passwd *pw;
|
|
|
|
|
2016-09-07 14:02:42 +03:00
|
|
|
/* Check if the current user has a password entry */
|
2013-11-14 13:24:08 +02:00
|
|
|
errno = 0;
|
2016-01-16 13:38:36 +02:00
|
|
|
if (!(pw = getpwuid(getuid()))) {
|
2014-07-09 16:40:49 +03:00
|
|
|
if (errno)
|
2016-09-07 11:04:06 +03:00
|
|
|
die("slock: getpwuid: %s\n", strerror(errno));
|
2014-07-09 16:40:49 +03:00
|
|
|
else
|
2016-09-07 11:04:06 +03:00
|
|
|
die("slock: cannot retrieve password entry\n");
|
2014-07-09 16:40:49 +03:00
|
|
|
}
|
2016-09-12 00:10:57 +03:00
|
|
|
hash = pw->pw_passwd;
|
2006-10-31 09:35:54 +02:00
|
|
|
|
|
|
|
#if HAVE_SHADOW_H
|
2016-09-12 00:10:57 +03:00
|
|
|
if (hash[0] == 'x' && hash[1] == '\0') {
|
2006-10-31 09:35:54 +02:00
|
|
|
struct spwd *sp;
|
2016-09-12 00:17:53 +03:00
|
|
|
if (!(sp = getspnam(pw->pw_name)))
|
2016-10-02 00:50:49 +03:00
|
|
|
die("slock: getspnam: cannot retrieve shadow entry. "
|
|
|
|
"Make sure to suid or sgid slock.\n");
|
2016-09-12 00:10:57 +03:00
|
|
|
hash = sp->sp_pwdp;
|
2006-10-31 09:35:54 +02:00
|
|
|
}
|
2016-09-07 14:02:42 +03:00
|
|
|
#else
|
2016-09-12 00:10:57 +03:00
|
|
|
if (hash[0] == '*' && hash[1] == '\0') {
|
2016-09-07 14:02:42 +03:00
|
|
|
#ifdef __OpenBSD__
|
2016-09-12 00:17:53 +03:00
|
|
|
if (!(pw = getpwuid_shadow(getuid())))
|
2016-10-02 00:50:49 +03:00
|
|
|
die("slock: getpwnam_shadow: cannot retrieve shadow entry. "
|
|
|
|
"Make sure to suid or sgid slock.\n");
|
2016-09-12 00:10:57 +03:00
|
|
|
hash = pw->pw_passwd;
|
2016-09-07 14:02:42 +03:00
|
|
|
#else
|
2016-10-02 00:50:49 +03:00
|
|
|
die("slock: getpwuid: cannot retrieve shadow entry. "
|
|
|
|
"Make sure to suid or sgid slock.\n");
|
2016-09-07 14:02:42 +03:00
|
|
|
#endif /* __OpenBSD__ */
|
|
|
|
}
|
|
|
|
#endif /* HAVE_SHADOW_H */
|
2008-02-22 12:13:12 +02:00
|
|
|
|
2016-09-12 00:10:57 +03:00
|
|
|
return hash;
|
2006-10-31 09:35:54 +02:00
|
|
|
}
|
|
|
|
|
2009-11-26 14:53:26 +02:00
|
|
|
static void
|
2016-09-12 00:08:19 +03:00
|
|
|
readpw(Display *dpy, struct xrandr *rr, struct lock **locks, int nscreens,
|
2016-09-12 00:10:57 +03:00
|
|
|
const char *hash)
|
2009-11-26 14:53:26 +02:00
|
|
|
{
|
2016-10-02 00:50:49 +03:00
|
|
|
XRRScreenChangeNotifyEvent *rre;
|
2016-09-12 00:10:57 +03:00
|
|
|
char buf[32], passwd[256], *inputhash;
|
2016-09-01 14:47:19 +03:00
|
|
|
int num, screen, running, failure;
|
2015-05-08 18:10:15 +03:00
|
|
|
unsigned int len, color;
|
2006-10-11 18:04:04 +03:00
|
|
|
KeySym ksym;
|
2006-10-11 13:35:21 +03:00
|
|
|
XEvent ev;
|
2015-05-08 18:10:15 +03:00
|
|
|
static int oldc = INIT;
|
2006-10-11 13:35:21 +03:00
|
|
|
|
2015-05-08 18:10:15 +03:00
|
|
|
len = 0;
|
2016-09-01 14:47:19 +03:00
|
|
|
running = 1;
|
|
|
|
failure = 0;
|
2006-10-11 14:33:04 +03:00
|
|
|
|
2015-01-27 23:16:52 +02:00
|
|
|
while (running && !XNextEvent(dpy, &ev)) {
|
|
|
|
if (ev.type == KeyPress) {
|
2016-07-31 14:43:00 +03:00
|
|
|
explicit_bzero(&buf, sizeof(buf));
|
2015-05-08 17:43:13 +03:00
|
|
|
num = XLookupString(&ev.xkey, buf, sizeof(buf), &ksym, 0);
|
2015-01-27 23:16:52 +02:00
|
|
|
if (IsKeypadKey(ksym)) {
|
|
|
|
if (ksym == XK_KP_Enter)
|
2008-04-08 11:55:46 +03:00
|
|
|
ksym = XK_Return;
|
2015-01-27 23:16:52 +02:00
|
|
|
else if (ksym >= XK_KP_0 && ksym <= XK_KP_9)
|
2008-04-08 11:55:46 +03:00
|
|
|
ksym = (ksym - XK_KP_0) + XK_0;
|
2008-07-29 21:14:53 +03:00
|
|
|
}
|
2015-01-27 23:16:52 +02:00
|
|
|
if (IsFunctionKey(ksym) ||
|
|
|
|
IsKeypadKey(ksym) ||
|
|
|
|
IsMiscFunctionKey(ksym) ||
|
|
|
|
IsPFKey(ksym) ||
|
|
|
|
IsPrivateKeypadKey(ksym))
|
2006-10-11 13:35:21 +03:00
|
|
|
continue;
|
2015-01-27 23:16:52 +02:00
|
|
|
switch (ksym) {
|
2006-10-11 13:35:21 +03:00
|
|
|
case XK_Return:
|
2016-10-02 00:56:33 +03:00
|
|
|
passwd[len] = '\0';
|
2016-08-31 01:59:06 +03:00
|
|
|
errno = 0;
|
2016-09-12 00:10:57 +03:00
|
|
|
if (!(inputhash = crypt(passwd, hash)))
|
2016-08-31 01:59:06 +03:00
|
|
|
fprintf(stderr, "slock: crypt: %s\n", strerror(errno));
|
|
|
|
else
|
2016-09-12 00:10:57 +03:00
|
|
|
running = !!strcmp(inputhash, hash);
|
2015-05-06 19:18:50 +03:00
|
|
|
if (running) {
|
2006-10-11 14:33:04 +03:00
|
|
|
XBell(dpy, 100);
|
2015-05-06 19:18:50 +03:00
|
|
|
failure = True;
|
|
|
|
}
|
2016-07-31 14:43:00 +03:00
|
|
|
explicit_bzero(&passwd, sizeof(passwd));
|
2006-10-31 09:35:54 +02:00
|
|
|
len = 0;
|
2006-10-11 13:35:21 +03:00
|
|
|
break;
|
|
|
|
case XK_Escape:
|
2016-07-31 14:43:00 +03:00
|
|
|
explicit_bzero(&passwd, sizeof(passwd));
|
2006-10-31 09:35:54 +02:00
|
|
|
len = 0;
|
2006-10-11 13:35:21 +03:00
|
|
|
break;
|
|
|
|
case XK_BackSpace:
|
2015-01-27 23:16:52 +02:00
|
|
|
if (len)
|
2016-10-02 00:56:33 +03:00
|
|
|
passwd[len--] = '\0';
|
2006-10-11 13:35:21 +03:00
|
|
|
break;
|
|
|
|
default:
|
2016-10-02 00:50:49 +03:00
|
|
|
if (num && !iscntrl((int)buf[0]) &&
|
|
|
|
(len + num < sizeof(passwd))) {
|
2006-10-31 09:43:25 +02:00
|
|
|
memcpy(passwd + len, buf, num);
|
2006-10-31 09:35:54 +02:00
|
|
|
len += num;
|
2006-10-11 13:35:21 +03:00
|
|
|
}
|
|
|
|
break;
|
|
|
|
}
|
2016-10-02 00:50:49 +03:00
|
|
|
color = len ? INPUT : ((failure || failonclear) ? FAILED : INIT);
|
2015-08-27 07:16:25 +03:00
|
|
|
if (running && oldc != color) {
|
2015-01-27 23:16:52 +02:00
|
|
|
for (screen = 0; screen < nscreens; screen++) {
|
2016-10-02 00:50:49 +03:00
|
|
|
XSetWindowBackground(dpy,
|
|
|
|
locks[screen]->win,
|
|
|
|
locks[screen]->colors[color]);
|
2012-03-17 19:03:25 +02:00
|
|
|
XClearWindow(dpy, locks[screen]->win);
|
|
|
|
}
|
2015-05-08 18:10:15 +03:00
|
|
|
oldc = color;
|
2012-03-17 19:03:25 +02:00
|
|
|
}
|
2016-09-12 00:08:19 +03:00
|
|
|
} else if (rr->active && ev.type == rr->evbase + RRScreenChangeNotify) {
|
2016-10-02 00:50:49 +03:00
|
|
|
rre = (XRRScreenChangeNotifyEvent*)&ev;
|
2015-02-26 00:06:45 +02:00
|
|
|
for (screen = 0; screen < nscreens; screen++) {
|
|
|
|
if (locks[screen]->win == rre->window) {
|
2016-10-02 00:50:49 +03:00
|
|
|
XResizeWindow(dpy, locks[screen]->win,
|
|
|
|
rre->width, rre->height);
|
2015-02-26 00:06:45 +02:00
|
|
|
XClearWindow(dpy, locks[screen]->win);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
} else for (screen = 0; screen < nscreens; screen++)
|
2012-02-05 17:41:31 +02:00
|
|
|
XRaiseWindow(dpy, locks[screen]->win);
|
2008-02-22 12:13:12 +02:00
|
|
|
}
|
2009-11-26 14:53:26 +02:00
|
|
|
}
|
|
|
|
|
2016-09-12 00:08:19 +03:00
|
|
|
static struct lock *
|
|
|
|
lockscreen(Display *dpy, struct xrandr *rr, int screen)
|
2015-01-27 23:16:52 +02:00
|
|
|
{
|
2009-11-26 14:53:26 +02:00
|
|
|
char curs[] = {0, 0, 0, 0, 0, 0, 0, 0};
|
2016-09-01 14:46:51 +03:00
|
|
|
int i, ptgrab, kbgrab;
|
2016-09-12 00:08:19 +03:00
|
|
|
struct lock *lock;
|
2012-03-17 19:03:25 +02:00
|
|
|
XColor color, dummy;
|
2009-11-26 14:53:26 +02:00
|
|
|
XSetWindowAttributes wa;
|
|
|
|
Cursor invisible;
|
|
|
|
|
2016-09-12 00:08:19 +03:00
|
|
|
if (dpy == NULL || screen < 0 || !(lock = malloc(sizeof(struct lock))))
|
2009-11-26 14:53:26 +02:00
|
|
|
return NULL;
|
|
|
|
|
|
|
|
lock->screen = screen;
|
|
|
|
lock->root = RootWindow(dpy, lock->screen);
|
|
|
|
|
2015-02-12 00:56:35 +02:00
|
|
|
for (i = 0; i < NUMCOLS; i++) {
|
2016-10-02 00:50:49 +03:00
|
|
|
XAllocNamedColor(dpy, DefaultColormap(dpy, lock->screen),
|
|
|
|
colorname[i], &color, &dummy);
|
2015-02-12 00:56:35 +02:00
|
|
|
lock->colors[i] = color.pixel;
|
|
|
|
}
|
|
|
|
|
2009-11-26 14:53:26 +02:00
|
|
|
/* init */
|
|
|
|
wa.override_redirect = 1;
|
2015-02-12 00:56:35 +02:00
|
|
|
wa.background_pixel = lock->colors[INIT];
|
2016-10-02 00:50:49 +03:00
|
|
|
lock->win = XCreateWindow(dpy, lock->root, 0, 0,
|
|
|
|
DisplayWidth(dpy, lock->screen),
|
|
|
|
DisplayHeight(dpy, lock->screen),
|
|
|
|
0, DefaultDepth(dpy, lock->screen),
|
|
|
|
CopyFromParent,
|
|
|
|
DefaultVisual(dpy, lock->screen),
|
|
|
|
CWOverrideRedirect | CWBackPixel, &wa);
|
2012-02-05 17:38:58 +02:00
|
|
|
lock->pmap = XCreateBitmapFromData(dpy, lock->win, curs, 8, 8);
|
2016-10-02 00:50:49 +03:00
|
|
|
invisible = XCreatePixmapCursor(dpy, lock->pmap, lock->pmap,
|
|
|
|
&color, &color, 0, 0);
|
2012-02-05 17:38:58 +02:00
|
|
|
XDefineCursor(dpy, lock->win, invisible);
|
2016-01-18 17:49:15 +02:00
|
|
|
|
2016-09-01 14:46:51 +03:00
|
|
|
/* Try to grab mouse pointer *and* keyboard for 600ms, else fail the lock */
|
2016-09-02 12:49:02 +03:00
|
|
|
for (i = 0, ptgrab = kbgrab = -1; i < 6; i++) {
|
2016-09-01 14:46:51 +03:00
|
|
|
if (ptgrab != GrabSuccess) {
|
|
|
|
ptgrab = XGrabPointer(dpy, lock->root, False,
|
2016-10-02 00:50:49 +03:00
|
|
|
ButtonPressMask | ButtonReleaseMask |
|
|
|
|
PointerMotionMask, GrabModeAsync,
|
|
|
|
GrabModeAsync, None, invisible, CurrentTime);
|
2016-09-01 14:46:51 +03:00
|
|
|
}
|
|
|
|
if (kbgrab != GrabSuccess) {
|
|
|
|
kbgrab = XGrabKeyboard(dpy, lock->root, True,
|
2016-10-02 00:50:49 +03:00
|
|
|
GrabModeAsync, GrabModeAsync, CurrentTime);
|
2016-09-01 14:46:51 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
/* input is grabbed: we can lock the screen */
|
|
|
|
if (ptgrab == GrabSuccess && kbgrab == GrabSuccess) {
|
|
|
|
XMapRaised(dpy, lock->win);
|
2016-09-12 00:08:19 +03:00
|
|
|
if (rr->active)
|
2016-09-01 14:46:51 +03:00
|
|
|
XRRSelectInput(dpy, lock->win, RRScreenChangeNotifyMask);
|
|
|
|
|
|
|
|
XSelectInput(dpy, lock->root, SubstructureNotifyMask);
|
|
|
|
return lock;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* retry on AlreadyGrabbed but fail on other errors */
|
|
|
|
if ((ptgrab != AlreadyGrabbed && ptgrab != GrabSuccess) ||
|
|
|
|
(kbgrab != AlreadyGrabbed && kbgrab != GrabSuccess))
|
|
|
|
break;
|
|
|
|
|
|
|
|
usleep(100000);
|
2016-08-30 18:33:09 +03:00
|
|
|
}
|
|
|
|
|
2016-09-01 14:46:51 +03:00
|
|
|
/* we couldn't grab all input: fail out */
|
|
|
|
if (ptgrab != GrabSuccess)
|
2016-10-02 00:50:49 +03:00
|
|
|
fprintf(stderr, "slock: unable to grab mouse pointer for screen %d\n",
|
|
|
|
screen);
|
2016-09-01 14:46:51 +03:00
|
|
|
if (kbgrab != GrabSuccess)
|
2016-10-02 00:50:49 +03:00
|
|
|
fprintf(stderr, "slock: unable to grab keyboard for screen %d\n",
|
|
|
|
screen);
|
2016-09-01 14:46:51 +03:00
|
|
|
return NULL;
|
2009-11-26 14:53:26 +02:00
|
|
|
}
|
|
|
|
|
2016-02-15 15:15:45 +02:00
|
|
|
static void
|
|
|
|
usage(void)
|
2016-02-14 02:48:48 +02:00
|
|
|
{
|
2016-08-23 11:55:34 +03:00
|
|
|
die("usage: slock [-v] [cmd [arg ...]]\n");
|
2016-02-15 15:15:45 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
int
|
|
|
|
main(int argc, char **argv) {
|
2016-09-12 00:08:19 +03:00
|
|
|
struct xrandr rr;
|
|
|
|
struct lock **locks;
|
2016-09-07 14:32:29 +03:00
|
|
|
struct passwd *pwd;
|
|
|
|
struct group *grp;
|
|
|
|
uid_t duid;
|
|
|
|
gid_t dgid;
|
2016-09-12 00:10:57 +03:00
|
|
|
const char *hash;
|
2009-11-26 14:53:26 +02:00
|
|
|
Display *dpy;
|
2016-09-12 00:08:19 +03:00
|
|
|
int s, nlocks, nscreens;
|
2009-11-26 14:53:26 +02:00
|
|
|
|
2016-08-22 01:25:21 +03:00
|
|
|
ARGBEGIN {
|
|
|
|
case 'v':
|
|
|
|
fprintf(stderr, "slock-"VERSION"\n");
|
|
|
|
return 0;
|
|
|
|
default:
|
2016-02-15 15:15:45 +02:00
|
|
|
usage();
|
2016-08-22 01:25:21 +03:00
|
|
|
} ARGEND
|
2016-02-15 15:15:45 +02:00
|
|
|
|
2016-09-07 14:32:29 +03:00
|
|
|
/* validate drop-user and -group */
|
|
|
|
errno = 0;
|
|
|
|
if (!(pwd = getpwnam(user)))
|
2016-10-02 00:50:49 +03:00
|
|
|
die("slock: getpwnam %s: %s\n", user,
|
|
|
|
errno ? strerror(errno) : "user entry not found");
|
2016-09-07 14:32:29 +03:00
|
|
|
duid = pwd->pw_uid;
|
|
|
|
errno = 0;
|
|
|
|
if (!(grp = getgrnam(group)))
|
2016-10-02 00:50:49 +03:00
|
|
|
die("slock: getgrnam %s: %s\n", group,
|
|
|
|
errno ? strerror(errno) : "group entry not found");
|
2016-09-07 14:32:29 +03:00
|
|
|
dgid = grp->gr_gid;
|
|
|
|
|
2013-08-02 23:11:18 +03:00
|
|
|
#ifdef __linux__
|
|
|
|
dontkillme();
|
|
|
|
#endif
|
|
|
|
|
2016-09-12 00:10:57 +03:00
|
|
|
hash = gethash();
|
2016-09-23 20:08:39 +03:00
|
|
|
errno = 0;
|
|
|
|
if (!crypt("", hash))
|
|
|
|
die("slock: crypt: %s\n", strerror(errno));
|
2009-11-26 14:53:26 +02:00
|
|
|
|
2016-08-22 01:25:21 +03:00
|
|
|
if (!(dpy = XOpenDisplay(NULL)))
|
|
|
|
die("slock: cannot open display\n");
|
|
|
|
|
2016-09-07 14:32:29 +03:00
|
|
|
/* drop privileges */
|
|
|
|
if (setgroups(0, NULL) < 0)
|
|
|
|
die("slock: setgroups: %s\n", strerror(errno));
|
|
|
|
if (setgid(dgid) < 0)
|
|
|
|
die("slock: setgid: %s\n", strerror(errno));
|
|
|
|
if (setuid(duid) < 0)
|
|
|
|
die("slock: setuid: %s\n", strerror(errno));
|
|
|
|
|
2016-08-22 01:25:21 +03:00
|
|
|
/* check for Xrandr support */
|
2016-09-12 00:08:19 +03:00
|
|
|
rr.active = XRRQueryExtension(dpy, &rr.evbase, &rr.errbase);
|
2016-08-22 01:25:21 +03:00
|
|
|
|
|
|
|
/* get number of screens in display "dpy" and blank them */
|
2009-11-26 14:53:26 +02:00
|
|
|
nscreens = ScreenCount(dpy);
|
2016-09-12 00:08:19 +03:00
|
|
|
if (!(locks = calloc(nscreens, sizeof(struct lock *))))
|
2016-08-22 01:25:21 +03:00
|
|
|
die("slock: out of memory\n");
|
|
|
|
for (nlocks = 0, s = 0; s < nscreens; s++) {
|
2016-09-12 00:08:19 +03:00
|
|
|
if ((locks[s] = lockscreen(dpy, &rr, s)) != NULL)
|
2012-08-02 22:54:18 +03:00
|
|
|
nlocks++;
|
2016-09-01 14:47:05 +03:00
|
|
|
else
|
|
|
|
break;
|
2012-08-02 22:54:18 +03:00
|
|
|
}
|
2016-08-22 01:25:21 +03:00
|
|
|
XSync(dpy, 0);
|
2009-11-26 14:53:26 +02:00
|
|
|
|
2016-09-01 14:47:05 +03:00
|
|
|
/* did we manage to lock everything? */
|
2016-09-12 00:08:19 +03:00
|
|
|
if (nlocks != nscreens)
|
2012-08-02 22:54:18 +03:00
|
|
|
return 1;
|
|
|
|
|
2016-08-22 01:25:21 +03:00
|
|
|
/* run post-lock command */
|
|
|
|
if (argc > 0) {
|
|
|
|
switch (fork()) {
|
|
|
|
case -1:
|
|
|
|
die("slock: fork failed: %s\n", strerror(errno));
|
|
|
|
case 0:
|
|
|
|
if (close(ConnectionNumber(dpy)) < 0)
|
|
|
|
die("slock: close: %s\n", strerror(errno));
|
|
|
|
execvp(argv[0], argv);
|
2016-10-02 00:50:49 +03:00
|
|
|
fprintf(stderr, "slock: execvp %s: %s\n", argv[0], strerror(errno));
|
2016-08-22 01:25:21 +03:00
|
|
|
_exit(1);
|
|
|
|
}
|
2015-12-26 14:13:25 +02:00
|
|
|
}
|
|
|
|
|
2016-08-22 01:25:21 +03:00
|
|
|
/* everything is now blank. Wait for the correct password */
|
2016-09-12 00:10:57 +03:00
|
|
|
readpw(dpy, &rr, locks, nscreens, hash);
|
2009-11-26 14:53:26 +02:00
|
|
|
|
2006-10-11 13:35:21 +03:00
|
|
|
return 0;
|
|
|
|
}
|