30 Commits
0.2 ... 0.9

Author SHA1 Message Date
Anselm R Garbe
a6a3471dd9 fix 2008-07-29 19:17:24 +01:00
Anselm R Garbe
75dd779245 prepared release 2008-07-29 19:14:53 +01:00
Anselm R Garbe
1460b14f45 removed useless chars, prepared release 2008-07-29 19:08:18 +01:00
Anselm R Garbe
c0fdcb8afc s/d// 2008-04-09 23:42:50 +01:00
Anselm R Garbe
cc36050e44 yet another DPMS fix, still trying to prevent the error handler 2008-04-09 23:42:19 +01:00
Anselm R Garbe
049ccf9a90 fixed DPMS crashing issue 2008-04-08 09:55:46 +01:00
Anselm R Garbe
4ed35d22dc Added tag 0.8 for changeset c0eb8221ba49 2008-03-13 16:59:24 +00:00
Anselm R Garbe
98e2fef63d applied two patches, BSD_AUTH patch and Gottox' DPMS support patch 2008-02-22 10:13:12 +00:00
Anselm R. Garbe
a430a647e4 removed Sander from -v by request 2007-11-25 12:17:33 +01:00
Anselm R. Garbe
18b2f4f34f next version will be 0.8 2007-11-24 21:27:44 +01:00
Anselm R. Garbe
925381bfd0 Added tag 0.7 for changeset c4635bb35a45 2007-11-24 21:18:06 +01:00
Anselm R. Garbe
6fdf8be204 final fixes and cleanups 2007-11-24 21:17:32 +01:00
arg@suckless.org
1fd4e7b23e applied Ryan Sorensen bugfix which allows slock to acquire the keyboard grab asynchroneously 2007-11-13 18:16:18 +01:00
Anselm R. Garbe
20e294a66f updating copyright stuff in slock as well 2007-04-13 11:48:17 +02:00
Anselm R. Garbe
1726ff0816 Added tag 0.6 for changeset dd226a81c09a 2007-03-07 13:31:49 +01:00
Anselm R. Garbe
48a7ab2225 grab on the root window, it is correct, all lockers do that 2007-03-07 10:57:23 +01:00
Anselm R. Garbe
d8ea936899 Added tag 0.5 for changeset bd24ea7fcca2 2007-03-05 11:28:53 +01:00
Anselm R. Garbe
8322f22871 grab on the slock window instead on the root window 2007-03-02 21:50:05 +01:00
Anselm R. Garbe
d83a9a1d01 made slock more readable, added root variable because we intend to call RootWindow(...) quite a lot 2007-02-21 22:16:23 +01:00
Anselm R. Garbe
ae8cce24d3 made slock more aggressive, DenisG please recheck 2007-02-21 21:25:53 +01:00
Anselm R. Garbe
663fdb326a foobar 2007-02-01 13:52:36 +01:00
Anselm R. Garbe
48f386ce9d Added tag 0.4 for changeset 4c2cf4d6a2d0 2007-01-13 14:10:56 +01:00
Anselm R. Garbe
6725bb2a3a fixed a potential buffer overflow bug on the stack (thanks to Ghassan Misherg) 2007-01-13 14:09:41 +01:00
arg@mig29
11642443f5 thanks to Jack for this hint 2006-12-08 10:53:35 +01:00
arg@mig29
e521638027 fixed sizeof stuff 2006-11-26 15:50:18 +01:00
arg@mig29
227cc94733 Added tag 0.3 for changeset f9157b1864388ad8f1920e5fde7c5849e73d8327 2006-11-03 11:35:48 +01:00
arg@mig29
ff79c382c5 small fix of Vincent's patch 2006-10-31 08:43:25 +01:00
arg@mig29
27d8d24827 applied Vincent's path with some modifications 2006-10-31 08:35:54 +01:00
Anselm R. Garbe
8a7a68c4c0 applied somwhat similiar patch like Alex Elide proposed 2006-10-18 18:44:19 +02:00
Anselm R. Garbe
6e53ce4582 Added tag 0.2 for changeset da5cb1f0a685258d5315ea109860bacbc2871a57 2006-10-16 17:06:45 +02:00
6 changed files with 138 additions and 82 deletions

View File

@@ -1 +1,8 @@
0a95c73c7374fbc2342b6040d9f35ddf597729e1 0.1 0a95c73c7374fbc2342b6040d9f35ddf597729e1 0.1
da5cb1f0a685258d5315ea109860bacbc2871a57 0.2
f9157b1864388ad8f1920e5fde7c5849e73d8327 0.3
4c2cf4d6a2d0e08cbe280ec50ef76c9aecfc0fbe 0.4
bd24ea7fcca26b161225c464df23ecbfe85280e1 0.5
dd226a81c09adfa86db232419b3000b7e406df68 0.6
c4635bb35a4581261f0187b347d5e596dd390ca3 0.7
c0eb8221ba49c6d10becc93c063c45196a3bb1ba 0.8

View File

@@ -1,6 +1,6 @@
MIT/X Consortium License MIT/X Consortium License
(C)opyright MMVI Anselm R. Garbe <garbeam at gmail dot com> © 2006-2008 Anselm R Garbe <garbeam at gmail dot com>
Permission is hereby granted, free of charge, to any person obtaining a Permission is hereby granted, free of charge, to any person obtaining a
copy of this software and associated documentation files (the "Software"), copy of this software and associated documentation files (the "Software"),

View File

@@ -1,5 +1,5 @@
# slock - simple screen locker # slock - simple screen locker
# (C)opyright MMVI Anselm R. Garbe # © 2006-2007 Anselm R. Garbe, Sander van Dijk
include config.mk include config.mk
@@ -13,7 +13,6 @@ options:
@echo "CFLAGS = ${CFLAGS}" @echo "CFLAGS = ${CFLAGS}"
@echo "LDFLAGS = ${LDFLAGS}" @echo "LDFLAGS = ${LDFLAGS}"
@echo "CC = ${CC}" @echo "CC = ${CC}"
@echo "LD = ${LD}"
.c.o: .c.o:
@echo CC $< @echo CC $<
@@ -22,9 +21,8 @@ options:
${OBJ}: config.mk ${OBJ}: config.mk
slock: ${OBJ} slock: ${OBJ}
@echo LD $@ @echo CC -o $@
@${LD} -o $@ ${OBJ} ${LDFLAGS} @${CC} -o $@ ${OBJ} ${LDFLAGS}
@strip $@
clean: clean:
@echo cleaning @echo cleaning

6
README
View File

@@ -13,12 +13,12 @@ Installation
Edit config.mk to match your local setup (slock is installed into Edit config.mk to match your local setup (slock is installed into
the /usr/local namespace by default). the /usr/local namespace by default).
Afterwards enter the following command to build and install slock (if Afterwards enter the following command to build and install slock
necessary as root): (if necessary as root):
make clean install make clean install
Running slock Running slock
------------- -------------
Simply invoke the 'slock' command. Simply invoke the 'slock' command. To get out of it, enter your password.

View File

@@ -1,28 +1,30 @@
# slock version # slock version
VERSION = 0.2 VERSION = 0.9
# Customize below to fit your system # Customize below to fit your system
# paths # paths
PREFIX = /usr/local PREFIX = /usr/local
MANPREFIX = ${PREFIX}/share/man
X11INC = /usr/X11R6/include X11INC = /usr/X11R6/include
X11LIB = /usr/X11R6/lib X11LIB = /usr/X11R6/lib
# includes and libs # includes and libs
INCS = -I. -I/usr/include -I${X11INC} INCS = -I. -I/usr/include -I${X11INC}
LIBS = -L/usr/lib -lc -lcrypt -L${X11LIB} -lX11 LIBS = -L/usr/lib -lc -lcrypt -L${X11LIB} -lX11 -lXext
# flags # flags
CFLAGS = -Os ${INCS} -DVERSION=\"${VERSION}\" -DHAVE_SHADOW_H CPPFLAGS = -DVERSION=\"${VERSION}\" -DHAVE_SHADOW_H
LDFLAGS = ${LIBS} CFLAGS = -std=c99 -pedantic -Wall -Os ${INCS} ${CPPFLAGS}
#CFLAGS = -g -Wall -O2 ${INCS} -DVERSION=\"${VERSION}\" -DHAVE_SHADOW_H LDFLAGS = -s ${LIBS}
#LDFLAGS = -g ${LIBS}
# On *BSD remove -DHAVE_SHADOW_H from CFLAGS # On *BSD remove -DHAVE_SHADOW_H from CPPFLAGS and add -DHAVE_BSD_AUTH
# On OpenBSD remove -lcrypt from LIBS # On OpenBSD and Darwin remove -lcrypt from LIBS
# compiler and linker # compiler and linker
CC = cc CC = cc
LD = ${CC}
# Install mode. On BSD systems MODE=2755 and GROUP=auth
# On others MODE=4755 and GROUP=root
#MODE=2755
#GROUP=auth

157
slock.c
View File

@@ -1,15 +1,12 @@
/* (C)opyright MMIV-MMV Anselm R. Garbe <garbeam at gmail dot com> /* See LICENSE file for license details. */
* See LICENSE file for license details.
*/
#define _XOPEN_SOURCE 500 #define _XOPEN_SOURCE 500
#if HAVE_SHADOW_H #if HAVE_SHADOW_H
#include <shadow.h> #include <shadow.h>
#else
#include <pwd.h>
#endif #endif
#include <ctype.h> #include <ctype.h>
#include <pwd.h>
#include <stdarg.h>
#include <stdlib.h> #include <stdlib.h>
#include <stdio.h> #include <stdio.h>
#include <string.h> #include <string.h>
@@ -18,16 +15,59 @@
#include <X11/keysym.h> #include <X11/keysym.h>
#include <X11/Xlib.h> #include <X11/Xlib.h>
#include <X11/Xutil.h> #include <X11/Xutil.h>
#include <X11/extensions/dpms.h>
#if HAVE_BSD_AUTH
#include <login_cap.h>
#include <bsd_auth.h>
#endif
static void
die(const char *errstr, ...) {
va_list ap;
va_start(ap, errstr);
vfprintf(stderr, errstr, ap);
va_end(ap);
exit(EXIT_FAILURE);
}
#ifndef HAVE_BSD_AUTH
static const char *
get_password() { /* only run as root */
const char *rval;
struct passwd *pw;
if(geteuid() != 0)
die("slock: cannot retrieve password entry (make sure to suid slock)\n");
pw = getpwuid(getuid());
endpwent();
rval = pw->pw_passwd;
#if HAVE_SHADOW_H
{
struct spwd *sp;
sp = getspnam(getenv("USER"));
endspent();
rval = sp->sp_pwdp;
}
#endif
/* drop privileges */
if(setgid(pw->pw_gid) < 0 || setuid(pw->pw_uid) < 0)
die("slock: cannot drop privileges\n");
return rval;
}
#endif
int int
main(int argc, char **argv) { main(int argc, char **argv) {
char curs[] = {0, 0, 0, 0, 0, 0, 0, 0}; char curs[] = {0, 0, 0, 0, 0, 0, 0, 0};
char buf[32], passwd[256]; char buf[32], passwd[256];
int num, screen; int num, screen;
#if HAVE_SHADOW_H
struct spwd *sp; #ifndef HAVE_BSD_AUTH
#else const char *pws;
struct passwd *pw;
#endif #endif
unsigned int len; unsigned int len;
Bool running = True; Bool running = True;
@@ -35,92 +75,101 @@ main(int argc, char **argv) {
Display *dpy; Display *dpy;
KeySym ksym; KeySym ksym;
Pixmap pmap; Pixmap pmap;
Window w; Window root, w;
XColor black, dummy; XColor black, dummy;
XEvent ev; XEvent ev;
XSetWindowAttributes wa; XSetWindowAttributes wa;
if((argc > 1) && !strncmp(argv[1], "-v", 3)) { if((argc == 2) && !strcmp("-v", argv[1]))
fputs("slock-"VERSION", (C)opyright MMVI Anselm R. Garbe\n", stdout); die("slock-"VERSION", © 2006-2008 Anselm R Garbe\n");
exit(EXIT_SUCCESS); else if(argc != 1)
} die("usage: slock [-v]\n");
if(geteuid() != 0) {
fputs("slock: cannot retrieve password entry (make sure to suid slock)\n", stderr); #ifndef HAVE_BSD_AUTH
exit(EXIT_FAILURE); pws = get_password();
}
#if HAVE_SHADOW_H
sp = getspnam(getenv("USER"));
endspent();
#else
pw = getpwuid(getuid());
endpwent();
#endif #endif
if(!(dpy = XOpenDisplay(0))) {
fputs("slock: cannot open display\n", stderr); if(!(dpy = XOpenDisplay(0)))
exit(EXIT_FAILURE); die("slock: cannot open display\n");
}
screen = DefaultScreen(dpy); screen = DefaultScreen(dpy);
root = RootWindow(dpy, screen);
/* init */ /* init */
passwd[0] = 0;
wa.override_redirect = 1; wa.override_redirect = 1;
wa.background_pixel = BlackPixel(dpy, screen); wa.background_pixel = BlackPixel(dpy, screen);
w = XCreateWindow(dpy, RootWindow(dpy, screen), 0, 0, w = XCreateWindow(dpy, root, 0, 0, DisplayWidth(dpy, screen), DisplayHeight(dpy, screen),
DisplayWidth(dpy, screen), DisplayHeight(dpy, screen),
0, DefaultDepth(dpy, screen), CopyFromParent, 0, DefaultDepth(dpy, screen), CopyFromParent,
DefaultVisual(dpy, screen), CWOverrideRedirect | CWBackPixel, &wa); DefaultVisual(dpy, screen), CWOverrideRedirect | CWBackPixel, &wa);
XAllocNamedColor(dpy, DefaultColormap(dpy, screen), "black", &black, &dummy); XAllocNamedColor(dpy, DefaultColormap(dpy, screen), "black", &black, &dummy);
pmap = XCreateBitmapFromData(dpy, w, curs, 8, 8); pmap = XCreateBitmapFromData(dpy, w, curs, 8, 8);
invisible = XCreatePixmapCursor(dpy, pmap, pmap, &black, &black, 0, 0); invisible = XCreatePixmapCursor(dpy, pmap, pmap, &black, &black, 0, 0);
XDefineCursor(dpy, w, invisible); XDefineCursor(dpy, w, invisible);
running = XGrabPointer(dpy, RootWindow(dpy, screen), False,
ButtonPressMask | ButtonReleaseMask | PointerMotionMask,
GrabModeAsync, GrabModeSync, None, invisible, CurrentTime) == GrabSuccess
&& XGrabKeyboard(dpy, RootWindow(dpy, screen), True, GrabModeAsync,
GrabModeAsync, CurrentTime) == GrabSuccess;
XMapRaised(dpy, w); XMapRaised(dpy, w);
for(len = 1000; len; len--) {
if(XGrabPointer(dpy, root, False, ButtonPressMask | ButtonReleaseMask | PointerMotionMask,
GrabModeAsync, GrabModeAsync, None, invisible, CurrentTime) == GrabSuccess)
break;
usleep(1000);
}
if((running = running && (len > 0))) {
for(len = 1000; len; len--) {
if(XGrabKeyboard(dpy, root, True, GrabModeAsync, GrabModeAsync, CurrentTime)
== GrabSuccess)
break;
usleep(1000);
}
running = (len > 0);
}
len = 0;
XSync(dpy, False); XSync(dpy, False);
/* main event loop */ /* main event loop */
while(running && !XNextEvent(dpy, &ev)) while(running && !XNextEvent(dpy, &ev)) {
if(len == 0 && DPMSCapable(dpy)) {
DPMSEnable(dpy);
DPMSForceLevel(dpy, DPMSModeOff);
}
if(ev.type == KeyPress) { if(ev.type == KeyPress) {
len = strlen(passwd);
buf[0] = 0; buf[0] = 0;
num = XLookupString(&ev.xkey, buf, sizeof(buf), &ksym, 0); num = XLookupString(&ev.xkey, buf, sizeof buf, &ksym, 0);
if(IsKeypadKey(ksym)) {
if(ksym == XK_KP_Enter)
ksym = XK_Return;
else if(ksym >= XK_KP_0 && ksym <= XK_KP_9)
ksym = (ksym - XK_KP_0) + XK_0;
}
if(IsFunctionKey(ksym) || IsKeypadKey(ksym) if(IsFunctionKey(ksym) || IsKeypadKey(ksym)
|| IsMiscFunctionKey(ksym) || IsPFKey(ksym) || IsMiscFunctionKey(ksym) || IsPFKey(ksym)
|| IsPrivateKeypadKey(ksym)) || IsPrivateKeypadKey(ksym))
continue; continue;
switch(ksym) { switch(ksym) {
case XK_Return: case XK_Return:
#if HAVE_SHADOW_H passwd[len] = 0;
if((running = strncmp(crypt(passwd, sp->sp_pwdp), sp->sp_pwdp, sizeof(passwd)))) #ifdef HAVE_BSD_AUTH
running = !auth_userokay(getlogin(), NULL, "auth-xlock", passwd);
#else #else
if((running = strncmp(crypt(passwd, pw->pw_passwd), pw->pw_passwd, sizeof(passwd)))) running = strcmp(crypt(passwd, pws), pws);
#endif #endif
if (running != 0)
XBell(dpy, 100); XBell(dpy, 100);
passwd[0] = 0; len = 0;
break; break;
case XK_Escape: case XK_Escape:
passwd[0] = 0; len = 0;
break; break;
case XK_BackSpace: case XK_BackSpace:
if(len) if(len)
passwd[--len] = 0; --len;
break; break;
default: default:
if(num && !iscntrl((int) buf[0])) { if(num && !iscntrl((int) buf[0]) && (len + num < sizeof passwd)) {
buf[num] = 0; memcpy(passwd + len, buf, num);
if(len) len += num;
strncat(passwd, buf, sizeof(passwd));
else
strncpy(passwd, buf, sizeof(passwd));
} }
break; break;
} }
} }
}
XUngrabPointer(dpy, CurrentTime); XUngrabPointer(dpy, CurrentTime);
XFreePixmap(dpy, pmap); XFreePixmap(dpy, pmap);
XDestroyWindow(dpy, w); XDestroyWindow(dpy, w);