Provided by: manpages-dev_3.54-1ubuntu1_all bug

NAME

       getpass - get a password

SYNOPSIS

       #include <unistd.h>

       char *getpass( const char *prompt);

   Feature Test Macro Requirements for glibc (see feature_test_macros(7)):

       getpass():
           Since glibc 2.2.2:
               _BSD_SOURCE ||
                   (_XOPEN_SOURCE >= 500 ||
                       _XOPEN_SOURCE && _XOPEN_SOURCE_EXTENDED) &&
                   !(_POSIX_C_SOURCE >= 200112L || _XOPEN_SOURCE >= 600)
           Before glibc 2.2.2:
               none

DESCRIPTION

       This  function  is obsolete.  Do not use it.  If you want to read input without terminal echoing enabled,
       see the description of the ECHO flag in termios(3).

       The getpass() function opens /dev/tty (the controlling terminal  of  the  process),  outputs  the  string
       prompt,  turns  off  echoing,  reads  one  line  (the "password"), restores the terminal state and closes
       /dev/tty again.

RETURN VALUE

       The function getpass() returns a pointer to a static buffer containing (the first PASS_MAX bytes of)  the
       password  without the trailing newline, terminated by a null byte ('\0').  This buffer may be overwritten
       by a following call.  On error, the terminal state is restored, errno is set appropriately, and  NULL  is
       returned.

ERRORS

       The function may fail if

       ENXIO  The process does not have a controlling terminal.

FILES

       /dev/tty

ATTRIBUTES

   Multithreading (see pthreads(7))
       The getpass() function is not thread-safe.

CONFORMING TO

       Present in SUSv2, but marked LEGACY.  Removed in POSIX.1-2001.

NOTES

       For  libc4  and libc5, the prompt is not written to /dev/tty but to stderr.  Moreover, if /dev/tty cannot
       be opened, the password is read from stdin.  The static buffer has length 128 so that only the first  127
       bytes  of  the  password  are  returned.  While reading the password, signal generation (SIGINT, SIGQUIT,
       SIGSTOP, SIGTSTP) is disabled and the corresponding characters (usually control-C,  control-\,  control-Z
       and control-Y) are transmitted as part of the password.  Since libc 5.4.19 also line editing is disabled,
       so that also backspace and the like will be seen as part of the password.

       For glibc2, if /dev/tty cannot be opened, the prompt is written to stderr and the password is  read  from
       stdin.  There is no limit on the length of the password.  Line editing is not disabled.

       According to the SUSv2, the value of PASS_MAX must be defined in <limits.h> in case it is smaller than 8,
       and can in any case be obtained using sysconf(_SC_PASS_MAX).  However, POSIX.2  withdraws  the  constants
       PASS_MAX  and _SC_PASS_MAX, and the function getpass().  Libc4 and libc5 have never supported PASS_MAX or
       _SC_PASS_MAX.  Glibc2 accepts _SC_PASS_MAX and returns BUFSIZ (e.g., 8192).

BUGS

       The calling process should zero the password as soon as possible to avoid leaving the cleartext  password
       visible in the process's address space.

SEE ALSO

       crypt(3)

COLOPHON

       This  page  is  part  of  release 3.54 of the Linux man-pages project.  A description of the project, and
       information about reporting bugs, can be found at http://www.kernel.org/doc/man-pages/.