X-Git-Url: https://diplodocus.org/git/nmh/blobdiff_plain/da6af9633e4ecdc19b1ee01de023fa4dfe615c39..f28cfc5260eb87df0f6f106c837b3e2de640a9bf:/sbr/getpass.c?ds=sidebyside diff --git a/sbr/getpass.c b/sbr/getpass.c index 6bc2cb8a..66f02da1 100644 --- a/sbr/getpass.c +++ b/sbr/getpass.c @@ -1,4 +1,5 @@ -/* +/* getpass.c -- read a password without echo. + * * Portions of this code are Copyright (c) 1988, 1993 * The Regents of the University of California. All rights reserved. * @@ -29,18 +30,15 @@ * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF * SUCH DAMAGE. - * - * $Id$ */ -#include +#include "h/mh.h" +#include "getpass.h" #include -#include /* for isatty() */ -#include "h/mh.h" /* for adios() */ /* We don't use MAX_PASS here because the maximum password length on a remote POP daemon will have nothing to do with the length on our OS. 256 is - arbitrary but hopefully big enough to accomodate everyone. */ + arbitrary but hopefully big enough to accommodate everyone. */ #define MAX_PASSWORD_LEN 256 #ifndef TCSANOW @@ -81,7 +79,7 @@ nmh_getpass(const char *prompt) *p++ = ch; *p = '\0'; - if (istty) { + if (istty && fin != stdin) { (void)tcsetattr(fileno(fin), TCSANOW, &oterm); rewind(fout); (void)fputc('\n', fout);