From: David Dahlberg <[email protected]> --- src/platform/openbsd.sh | 34 ---------------------------------- 1 file changed, 34 deletions(-)
diff --git a/src/platform/openbsd.sh b/src/platform/openbsd.sh index b66b32f..ace9a7b 100644 --- a/src/platform/openbsd.sh +++ b/src/platform/openbsd.sh @@ -2,39 +2,5 @@ # Copyright (C) 2015 David Dahlberg <[email protected]>. All Rights Reserved. # This file is licensed under the GPLv2+. Please see COPYING for more information. -tmpdir() { - [[ -n $SECURE_TMPDIR ]] && return - local warn=1 - [[ $1 == "nowarn" ]] && warn=0 - local template="$PROGRAM.XXXXXXXXXXXXX" - if [[ $(sysctl -n kern.usermount) == 1 ]]; then - SECURE_TMPDIR="$(mktemp -d "${TMPDIR:-/tmp}/$template")" - mount -t tmpfs -o -s16M tmpfs "$SECURE_TMPDIR" || die "Error: could not create tmpfs." - unmount_tmpdir() { - [[ -n $SECURE_TMPDIR && -d $SECURE_TMPDIR ]] || return - umount "$SECURE_TMPDIR" - rm -rf "$SECURE_TMPDIR" - } - trap unmount_tmpdir INT TERM EXIT - else - [[ $warn -eq 1 ]] && yesno "$(cat <<-_EOF - The sysctl kern.usermount is disabled, therefore it is not - possible to create a tmpfs for temporary storage of files - in memory. - This means that it may be difficult to entirely erase - the temporary non-encrypted password file after editing. - - Are you sure you would like to continue? - _EOF - )" - SECURE_TMPDIR="$(mktemp -d "${TMPDIR:-/tmp}/$template")" - shred_tmpfile() { - find "$SECURE_TMPDIR" -type f -exec $SHRED {} + - rm -rf "$SECURE_TMPDIR" - } - trap shred_tmpfile INT TERM EXIT - fi -} - GETOPT="gnugetopt" SHRED="rm -P -f" -- 2.13.2 _______________________________________________ Password-Store mailing list [email protected] https://lists.zx2c4.com/mailman/listinfo/password-store
