shithub: drawterm-fdroid

Download patch

ref: 5c9d398cd57adad601821c31bc810d71ca5106de
parent: f7b7d00715abf41532f7ffa87f088a23f6259314
author: cinap_lenrek <cinap_lenrek@felloff.net>
date: Tue Jan 2 00:26:15 EST 2018

libauth: don't compile unneeded (for drawterm) units, update _attrfmt() and auth.h header

--- a/include/auth.h
+++ b/include/auth.h
@@ -17,7 +17,7 @@
 enum
 {
 	MAXCHLEN=	256,		/* max challenge length	*/
-	AMAXNAMELEN=	256,		/* maximum name length */
+	MAXNAMELEN=	256,		/* maximum name length */
 	MD5LEN=		16,
 
 	ARok = 0,			/* rpc return values */
@@ -37,7 +37,7 @@
 struct AuthRpc
 {
 	int afd;
-	char ibuf[AuthRpcMax];
+	char ibuf[AuthRpcMax+1];	/* +1 for NUL in auth_rpc.c */
 	char obuf[AuthRpcMax];
 	char *arg;
 	uint narg;
@@ -63,7 +63,7 @@
 /* for implementation only */
 	int	afd;			/* to factotum */
 	AuthRpc	*rpc;			/* to factotum */
-	char	userbuf[AMAXNAMELEN];	/* temp space if needed */
+	char	userbuf[MAXNAMELEN];	/* temp space if needed */
 	int	userinchal;		/* user was sent to obtain challenge */
 };
 
@@ -91,16 +91,13 @@
 extern	int	noworld(char*);
 extern	int	amount(int, char*, int, char*);
 
-/* these two may get generalized away -rsc */
 extern	int	login(char*, char*, char*);
-extern	int	httpauth(char*, char*);
 
 typedef struct Attr Attr;
-typedef struct String String;
 enum {
 	AttrNameval,		/* name=val -- when matching, must have name=val */
 	AttrQuery,		/* name? -- when matching, must be present */
-	AttrDefault,		/* name:=val -- when matching, if present must match INTERNAL */
+	AttrDefault,		/* name=val -- when matching, if present must match INTERNAL */
 };
 struct Attr
 {
@@ -141,11 +138,9 @@
 extern Attr*		auth_attr(AuthRpc *rpc);
 extern void		auth_freerpc(AuthRpc *rpc);
 extern uint		auth_rpc(AuthRpc *rpc, char *verb, void *a, int n);
-extern int		auth_wep(char*, char*, ...);
-
 #ifdef VARARGCK
 #pragma varargck argpos auth_proxy 3
 #pragma varargck argpos auth_challenge 1
-#pragma varargck argpos auth_respond 3
+#pragma varargck argpos auth_respond 8
 #pragma varargck argpos auth_getuserpasswd 2
 #endif
--- a/libauth/Makefile
+++ b/libauth/Makefile
@@ -5,12 +5,8 @@
 OFILES=\
 	attr.$O\
 	auth_attr.$O\
-	auth_challenge.$O\
-	auth_getuserpasswd.$O\
 	auth_proxy.$O\
-	auth_respond.$O\
 	auth_rpc.$O\
-	auth_userpasswd.$O\
 
 default: $(LIB)
 $(LIB): $(OFILES)
--- a/libauth/attr.c
+++ b/libauth/attr.c
@@ -5,28 +5,26 @@
 int
 _attrfmt(Fmt *fmt)
 {
-	char *b, buf[1024], *ebuf;
 	Attr *a;
+	int first = 1;
 
-	ebuf = buf+sizeof buf;
-	b = buf;
-	strcpy(buf, " ");
-	for(a=va_arg(fmt->args, Attr*); a; a=a->next){
+	for(a=va_arg(fmt->args, Attr*); a != nil; a=a->next){
 		if(a->name == nil)
 			continue;
 		switch(a->type){
+		default:
+			continue;
 		case AttrQuery:
-			b = seprint(b, ebuf, " %q?", a->name);
+			fmtprint(fmt, first+" %q?", a->name);
 			break;
 		case AttrNameval:
-			b = seprint(b, ebuf, " %q=%q", a->name, a->val);
-			break;
 		case AttrDefault:
-			b = seprint(b, ebuf, " %q:=%q", a->name, a->val);
+			fmtprint(fmt, first+" %q=%q", a->name, a->val);
 			break;
 		}
+		first = 0;
 	}
-	return fmtstrcpy(fmt, buf+1);
+	return 0;
 }
 
 Attr*
--- a/libauth/auth_challenge.c
+++ /dev/null
@@ -1,116 +1,0 @@
-#include <u.h>
-#include <libc.h>
-#include <auth.h>
-#include "authlocal.h"
-
-Chalstate*
-auth_challenge(char *fmt, ...)
-{
-	char *p;
-	va_list arg;
-	Chalstate *c;
-
-	quotefmtinstall();	/* just in case */
-	va_start(arg, fmt);
-	p = vsmprint(fmt, arg);
-	va_end(arg);
-	if(p == nil)
-		return nil;
-
-	c = mallocz(sizeof(*c), 1);
-	if(c == nil){
-		free(p);
-		return nil;
-	}
-
-	if((c->afd = open("/mnt/factotum/rpc", ORDWR)) < 0){
-	Error:
-		auth_freechal(c);
-		free(p);
-		return nil;
-	}
-
-	if((c->rpc=auth_allocrpc(c->afd)) == nil
-	|| auth_rpc(c->rpc, "start", p, strlen(p)) != ARok
-	|| auth_rpc(c->rpc, "read", nil, 0) != ARok)
-		goto Error;
-
-	if(c->rpc->narg > sizeof(c->chal)-1){
-		werrstr("buffer too small for challenge");
-		goto Error;
-	}
-	memmove(c->chal, c->rpc->arg, c->rpc->narg);
-	c->nchal = c->rpc->narg;
-	free(p);
-	return c;
-}
-
-AuthInfo*
-auth_response(Chalstate *c)
-{
-	int ret;
-	AuthInfo *ai;
-
-	ai = nil;
-	if(c->afd < 0){
-		werrstr("auth_response: connection not open");
-		return nil;
-	}
-	if(c->resp == nil){
-		werrstr("auth_response: nil response");
-		return nil;
-	}
-	if(c->nresp == 0){
-		werrstr("auth_response: unspecified response length");
-		return nil;
-	}
-
-	if(c->user){
-		if(auth_rpc(c->rpc, "write", c->user, strlen(c->user)) != ARok){
-			/*
-			 * if this fails we're out of phase with factotum.
-			 * give up.
-			 */
-			goto Out;
-		}
-	}
-
-	if(auth_rpc(c->rpc, "write", c->resp, c->nresp) != ARok){
-		/*
-		 * don't close the connection -- maybe we'll try again.
-		 */
-		return nil;
-	}
-
-	switch(ret = auth_rpc(c->rpc, "read", nil, 0)){
-	case ARok:
-	default:
-		werrstr("factotum protocol botch %d %s", ret, c->rpc->ibuf);
-		break;
-	case ARdone:
-		ai = auth_getinfo(c->rpc);
-		break;
-	}
-
-Out:
-	close(c->afd);
-	auth_freerpc(c->rpc);
-	c->afd = -1;
-	c->rpc = nil;
-	return ai;
-}
-
-void
-auth_freechal(Chalstate *c)
-{
-	if(c == nil)
-		return;
-
-	if(c->afd >= 0)
-		close(c->afd);
-	if(c->rpc != nil)
-		auth_freerpc(c->rpc);
-
-	memset(c, 0xBB, sizeof(*c));
-	free(c);
-}
--- a/libauth/auth_getuserpasswd.c
+++ /dev/null
@@ -1,75 +1,0 @@
-#include <u.h>
-#include <libc.h>
-#include <auth.h>
-#include "authlocal.h"
-
-enum {
-	ARgiveup = 100,
-};
-
-static int
-dorpc(AuthRpc *rpc, char *verb, char *val, int len, AuthGetkey *getkey)
-{
-	int ret;
-
-	for(;;){
-		if((ret = auth_rpc(rpc, verb, val, len)) != ARneedkey && ret != ARbadkey)
-			return ret;
-		if(getkey == nil)
-			return ARgiveup;	/* don't know how */
-		if((*getkey)(rpc->arg) < 0)
-			return ARgiveup;	/* user punted */
-	}
-}
-
-UserPasswd*
-auth_getuserpasswd(AuthGetkey *getkey, char *fmt, ...)
-{
-	AuthRpc *rpc;
-	char *f[3], *p, *params;
-	int fd;
-	va_list arg;
-	UserPasswd *up;
-
-	up = nil;
-	rpc = nil;
-	params = nil;
-
-	fd = open("/mnt/factotum/rpc", ORDWR);
-	if(fd < 0)
-		goto out;
-	rpc = auth_allocrpc(fd);
-	if(rpc == nil)
-		goto out;
-	quotefmtinstall();	/* just in case */
-	va_start(arg, fmt);
-	params = vsmprint(fmt, arg);
-	va_end(arg);
-	if(params == nil)
-		goto out;
-
-	if(dorpc(rpc, "start", params, strlen(params), getkey) != ARok
-	|| dorpc(rpc, "read", nil, 0, getkey) != ARok)
-		goto out;
-
-	rpc->arg[rpc->narg] = '\0';
-	if(tokenize(rpc->arg, f, 2) != 2){
-		werrstr("bad answer from factotum");
-		goto out;
-	}
-	up = malloc(sizeof(*up)+rpc->narg+1);
-	if(up == nil)
-		goto out;
-	p = (char*)&up[1];
-	strcpy(p, f[0]);
-	up->user = p;
-	p += strlen(p)+1;
-	strcpy(p, f[1]);
-	up->passwd = p;
-
-out:
-	free(params);
-	auth_freerpc(rpc);
-	close(fd);
-	return up;
-}
--- a/libauth/auth_respond.c
+++ /dev/null
@@ -1,72 +1,0 @@
-#include <u.h>
-#include <libc.h>
-#include <auth.h>
-#include "authlocal.h"
-
-enum {
-	ARgiveup = 100,
-};
-
-static int
-dorpc(AuthRpc *rpc, char *verb, char *val, int len, AuthGetkey *getkey)
-{
-	int ret;
-
-	for(;;){
-		if((ret = auth_rpc(rpc, verb, val, len)) != ARneedkey && ret != ARbadkey)
-			return ret;
-		if(getkey == nil)
-			return ARgiveup;	/* don't know how */
-		if((*getkey)(rpc->arg) < 0)
-			return ARgiveup;	/* user punted */
-	}
-}
-
-int
-auth_respond(void *chal, uint nchal, char *user, uint nuser, void *resp, uint nresp, AuthGetkey *getkey, char *fmt, ...)
-{
-	char *p, *s;
-	va_list arg;
-	int afd;
-	AuthRpc *rpc;
-	Attr *a;
-
-	if((afd = open("/mnt/factotum/rpc", ORDWR)) < 0)
-		return -1;
-	
-	if((rpc = auth_allocrpc(afd)) == nil){
-		close(afd);
-		return -1;
-	}
-
-	quotefmtinstall();	/* just in case */
-	va_start(arg, fmt);
-	p = vsmprint(fmt, arg);
-	va_end(arg);
-
-	if(p==nil
-	|| dorpc(rpc, "start", p, strlen(p), getkey) != ARok
-	|| dorpc(rpc, "write", chal, nchal, getkey) != ARok
-	|| dorpc(rpc, "read", nil, 0, getkey) != ARok){
-		free(p);
-		close(afd);
-		auth_freerpc(rpc);
-		return -1;
-	}
-	free(p);
-
-	if(rpc->narg < nresp)
-		nresp = rpc->narg;
-	memmove(resp, rpc->arg, nresp);
-
-	if((a = auth_attr(rpc)) != nil
-	&& (s = _strfindattr(a, "user")) != nil && strlen(s) < nuser)
-		strcpy(user, s);
-	else if(nuser > 0)
-		user[0] = '\0';
-
-	_freeattr(a);
-	close(afd);
-	auth_freerpc(rpc);
-	return nresp;	
-}
--- a/libauth/auth_userpasswd.c
+++ /dev/null
@@ -1,49 +1,0 @@
-#include <u.h>
-#include <libc.h>
-#include <auth.h>
-#include <authsrv.h>
-#include "authlocal.h"
-
-/*
- * compute the proper response.  We encrypt the ascii of
- * challenge number, with trailing binary zero fill.
- * This process was derived empirically.
- * this was copied from inet's guard.
- */
-static void
-netresp(char key[DESKEYLEN], long chal, char *answer)
-{
-	uchar buf[8];
-
-	memset(buf, 0, sizeof buf);
-	snprint((char *)buf, sizeof buf, "%lud", chal);
-	if(encrypt(key, buf, 8) < 0)
-		abort();
-	sprint(answer, "%.8ux", buf[0]<<24 | buf[1]<<16 | buf[2]<<8 | buf[3]);
-}
-
-AuthInfo*
-auth_userpasswd(char *user, char *passwd)
-{
-	char resp[16], key[DESKEYLEN];
-	AuthInfo *ai;
-	Chalstate *ch;
-
-	/*
-	 * Probably we should have a factotum protocol
-	 * to check a raw password.  For now, we use
-	 * p9cr, which is simplest to speak.
-	 */
-	if((ch = auth_challenge("user=%q proto=p9cr role=server", user)) == nil)
-		return nil;
-
-	passtodeskey(key, passwd);
-	netresp(key, atol(ch->chal), resp);
-	memset(key, 0, sizeof(key));
-
-	ch->resp = resp;
-	ch->nresp = strlen(resp);
-	ai = auth_response(ch);
-	auth_freechal(ch);
-	return ai;
-}
--- a/libauth/httpauth.c
+++ /dev/null
@@ -1,51 +1,0 @@
-#include <u.h>
-#include <libc.h>
-#include <auth.h>
-#include <authsrv.h>
-
-/* deprecated.
-	This is the mechanism that put entries in /sys/lib/httpd.rewrite
-	and passwords on the authserver in /sys/lib/httppasswords, which
-	was awkward to administer.  Instead, use local .httplogin files,
-	which are implemented in sys/src/cmd/ip/httpd/authorize.c */
-
-int
-httpauth(char *name, char *password)
-{
-	int afd;
-	Ticketreq tr;
-	Ticket	t;
-	char key[DESKEYLEN];
-	char buf[512];
-
-	afd = authdial(nil, nil);
-	if(afd < 0)
-		return -1;
-
-	/* send ticket request to AS */
-	memset(&tr, 0, sizeof(tr));
-	strcpy(tr.uid, name);
-	tr.type = AuthHttp;
-	convTR2M(&tr, buf);
-	if(write(afd, buf, TICKREQLEN) != TICKREQLEN){
-		close(afd);
-		return -1;
-	}
-	if(_asrdresp(afd, buf, TICKETLEN) < 0){
-		close(afd);
-		return -1;
-	}
-	close(afd);
-
-	/*
-	 *  use password and try to decrypt the
-	 *  ticket.  If it doesn't work we've got a bad password,
-	 *  give up.
-	 */
-	passtokey(key, password);
-	convM2T(buf, &t, key);
-	if(t.num != AuthHr || strcmp(t.cuid, tr.uid))
-		return -1;
-
-	return 0;
-}