mirror of
https://github.com/0intro/conterm
synced 2024-11-21 13:21:50 +03:00
bell labs version
This commit is contained in:
parent
230e492a8a
commit
bae94a73be
714
cpu-bl.c
Normal file
714
cpu-bl.c
Normal file
@ -0,0 +1,714 @@
|
||||
/*
|
||||
* cpu.c - Make a connection to a cpu server
|
||||
*
|
||||
* Invoked by listen as 'cpu -R | -N service net netdir'
|
||||
* by users as 'cpu [-h system] [-c cmd args ...]'
|
||||
*/
|
||||
|
||||
#include <u.h>
|
||||
#include <libc.h>
|
||||
#include <auth.h>
|
||||
#include <fcall.h>
|
||||
#include <authsrv.h>
|
||||
#include <libsec.h>
|
||||
#include "args.h"
|
||||
#include "drawterm.h"
|
||||
|
||||
#define Maxfdata 8192
|
||||
#define MaxStr 128
|
||||
|
||||
static void fatal(int, char*, ...);
|
||||
static void usage(void);
|
||||
static void writestr(int, char*, char*, int);
|
||||
static int readstr(int, char*, int);
|
||||
static char *rexcall(int*, char*, char*);
|
||||
static char *keyspec = "";
|
||||
static AuthInfo *p9any(int);
|
||||
|
||||
#define system csystem
|
||||
static char *system;
|
||||
static int cflag;
|
||||
extern int dbg;
|
||||
|
||||
static char *srvname = "ncpu";
|
||||
static char *ealgs = "rc4_256 sha1";
|
||||
|
||||
/* message size for exportfs; may be larger so we can do big graphics in CPU window */
|
||||
static int msgsize = Maxfdata+IOHDRSZ;
|
||||
|
||||
/* authentication mechanisms */
|
||||
static int netkeyauth(int);
|
||||
static int netkeysrvauth(int, char*);
|
||||
static int p9auth(int);
|
||||
static int srvp9auth(int, char*);
|
||||
|
||||
char *authserver;
|
||||
|
||||
typedef struct AuthMethod AuthMethod;
|
||||
struct AuthMethod {
|
||||
char *name; /* name of method */
|
||||
int (*cf)(int); /* client side authentication */
|
||||
int (*sf)(int, char*); /* server side authentication */
|
||||
} authmethod[] =
|
||||
{
|
||||
{ "p9", p9auth, srvp9auth,},
|
||||
{ "netkey", netkeyauth, netkeysrvauth,},
|
||||
// { "none", noauth, srvnoauth,},
|
||||
{ nil, nil}
|
||||
};
|
||||
AuthMethod *am = authmethod; /* default is p9 */
|
||||
|
||||
char *p9authproto = "p9any";
|
||||
|
||||
int setam(char*);
|
||||
|
||||
void
|
||||
exits(char *s)
|
||||
{
|
||||
print("\ngoodbye\n");
|
||||
for(;;) osyield();
|
||||
}
|
||||
|
||||
void
|
||||
usage(void)
|
||||
{
|
||||
fprint(2, "usage: drawterm [-a authserver] [-c cpuserver] [-s secstore] [-u user]\n");
|
||||
exits("usage");
|
||||
}
|
||||
int fdd;
|
||||
|
||||
int
|
||||
mountfactotum(void)
|
||||
{
|
||||
int fd;
|
||||
|
||||
if((fd = dialfactotum()) < 0)
|
||||
return -1;
|
||||
if(sysmount(fd, -1, "/mnt/factotum", MREPL, "") < 0){
|
||||
fprint(2, "mount factotum: %r\n");
|
||||
return -1;
|
||||
}
|
||||
if((fd = open("/mnt/factotum/ctl", OREAD)) < 0){
|
||||
fprint(2, "open /mnt/factotum/ctl: %r\n");
|
||||
return -1;
|
||||
}
|
||||
close(fd);
|
||||
return 0;
|
||||
}
|
||||
|
||||
void
|
||||
cpumain(int argc, char **argv)
|
||||
{
|
||||
char dat[MaxStr], buf[MaxStr], cmd[MaxStr], *err, *secstoreserver, *p, *s;
|
||||
int fd, ms, data;
|
||||
|
||||
/* see if we should use a larger message size */
|
||||
fd = open("/dev/draw", OREAD);
|
||||
if(fd > 0){
|
||||
ms = iounit(fd);
|
||||
if(msgsize < ms+IOHDRSZ)
|
||||
msgsize = ms+IOHDRSZ;
|
||||
close(fd);
|
||||
}
|
||||
|
||||
user = getenv("USER");
|
||||
if(user == nil)
|
||||
user = readcons("user", nil, 0);
|
||||
secstoreserver = nil;
|
||||
authserver = getenv("auth");
|
||||
if(authserver == nil)
|
||||
authserver = "lookout.cs.bell-labs.com";
|
||||
system = getenv("cpu");
|
||||
if(system == nil)
|
||||
system = "anna.cs.bell-labs.com";
|
||||
ARGBEGIN{
|
||||
case 'o':
|
||||
authserver = "plan9.bell-labs.com";
|
||||
system = "plan9.bell-labs.com";
|
||||
break;
|
||||
case 'a':
|
||||
authserver = EARGF(usage());
|
||||
break;
|
||||
case 'c':
|
||||
system = EARGF(usage());
|
||||
break;
|
||||
case 'd':
|
||||
dbg++;
|
||||
break;
|
||||
case 'e':
|
||||
ealgs = EARGF(usage());
|
||||
if(*ealgs == 0 || strcmp(ealgs, "clear") == 0)
|
||||
ealgs = nil;
|
||||
break;
|
||||
case 'C':
|
||||
cflag++;
|
||||
cmd[0] = '!';
|
||||
cmd[1] = '\0';
|
||||
while((p = ARGF()) != nil) {
|
||||
strcat(cmd, " ");
|
||||
strcat(cmd, p);
|
||||
}
|
||||
break;
|
||||
case 'k':
|
||||
keyspec = EARGF(usage());
|
||||
break;
|
||||
case 'u':
|
||||
user = EARGF(usage());
|
||||
break;
|
||||
case 's':
|
||||
secstoreserver = EARGF(usage());
|
||||
break;
|
||||
default:
|
||||
usage();
|
||||
}ARGEND;
|
||||
|
||||
if(argc != 0)
|
||||
usage();
|
||||
|
||||
if(mountfactotum() < 0){
|
||||
if(secstoreserver == nil)
|
||||
secstoreserver = authserver;
|
||||
if(havesecstore(secstoreserver, user)){
|
||||
s = secstorefetch(secstoreserver, user, nil);
|
||||
if(s){
|
||||
if(strlen(s) >= sizeof secstorebuf)
|
||||
sysfatal("secstore data too big");
|
||||
strcpy(secstorebuf, s);
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
if((err = rexcall(&data, system, srvname)))
|
||||
fatal(1, "%s: %s", err, system);
|
||||
|
||||
/* Tell the remote side the command to execute and where our working directory is */
|
||||
if(cflag)
|
||||
writestr(data, cmd, "command", 0);
|
||||
if(getcwd(dat, sizeof(dat)) == 0)
|
||||
writestr(data, "NO", "dir", 0);
|
||||
else
|
||||
writestr(data, dat, "dir", 0);
|
||||
|
||||
/*
|
||||
* Wait for the other end to execute and start our file service
|
||||
* of /mnt/term
|
||||
*/
|
||||
if(readstr(data, buf, sizeof(buf)) < 0)
|
||||
fatal(1, "waiting for FS: %r");
|
||||
if(strncmp("FS", buf, 2) != 0) {
|
||||
print("remote cpu: %s", buf);
|
||||
exits(buf);
|
||||
}
|
||||
|
||||
if(readstr(data, buf, sizeof buf) < 0)
|
||||
fatal(1, "waiting for remote export: %r");
|
||||
if(strcmp(buf, "/") != 0){
|
||||
print("remote cpu: %s" , buf);
|
||||
exits(buf);
|
||||
}
|
||||
write(data, "OK", 2);
|
||||
|
||||
/* Begin serving the gnot namespace */
|
||||
exportfs(data, msgsize);
|
||||
fatal(1, "starting exportfs");
|
||||
}
|
||||
|
||||
void
|
||||
fatal(int syserr, char *fmt, ...)
|
||||
{
|
||||
Fmt f;
|
||||
char *str;
|
||||
va_list arg;
|
||||
|
||||
fmtstrinit(&f);
|
||||
fmtprint(&f, "cpu: ");
|
||||
va_start(arg, fmt);
|
||||
fmtvprint(&f, fmt, arg);
|
||||
va_end(arg);
|
||||
if(syserr)
|
||||
fmtprint(&f, ": %r");
|
||||
fmtprint(&f, "\n");
|
||||
str = fmtstrflush(&f);
|
||||
write(2, str, strlen(str));
|
||||
exits(str);
|
||||
}
|
||||
|
||||
char *negstr = "negotiating authentication method";
|
||||
|
||||
char bug[256];
|
||||
|
||||
char*
|
||||
rexcall(int *fd, char *host, char *service)
|
||||
{
|
||||
char *na;
|
||||
char dir[MaxStr];
|
||||
char err[ERRMAX];
|
||||
char msg[MaxStr];
|
||||
int n;
|
||||
|
||||
na = netmkaddr(host, "tcp", "17010");
|
||||
if((*fd = dial(na, 0, dir, 0)) < 0)
|
||||
return "can't dial";
|
||||
|
||||
/* negotiate authentication mechanism */
|
||||
if(ealgs != nil)
|
||||
snprint(msg, sizeof(msg), "%s %s", am->name, ealgs);
|
||||
else
|
||||
snprint(msg, sizeof(msg), "%s", am->name);
|
||||
writestr(*fd, msg, negstr, 0);
|
||||
n = readstr(*fd, err, sizeof err);
|
||||
if(n < 0)
|
||||
return negstr;
|
||||
if(*err){
|
||||
werrstr(err);
|
||||
return negstr;
|
||||
}
|
||||
|
||||
/* authenticate */
|
||||
*fd = (*am->cf)(*fd);
|
||||
if(*fd < 0)
|
||||
return "can't authenticate";
|
||||
return 0;
|
||||
}
|
||||
|
||||
void
|
||||
writestr(int fd, char *str, char *thing, int ignore)
|
||||
{
|
||||
int l, n;
|
||||
|
||||
l = strlen(str);
|
||||
n = write(fd, str, l+1);
|
||||
if(!ignore && n < 0)
|
||||
fatal(1, "writing network: %s", thing);
|
||||
}
|
||||
|
||||
int
|
||||
readstr(int fd, char *str, int len)
|
||||
{
|
||||
int n;
|
||||
|
||||
while(len) {
|
||||
n = read(fd, str, 1);
|
||||
if(n < 0)
|
||||
return -1;
|
||||
if(*str == '\0')
|
||||
return 0;
|
||||
str++;
|
||||
len--;
|
||||
}
|
||||
return -1;
|
||||
}
|
||||
|
||||
static int
|
||||
readln(char *buf, int n)
|
||||
{
|
||||
int i;
|
||||
char *p;
|
||||
|
||||
n--; /* room for \0 */
|
||||
p = buf;
|
||||
for(i=0; i<n; i++){
|
||||
if(read(0, p, 1) != 1)
|
||||
break;
|
||||
if(*p == '\n' || *p == '\r')
|
||||
break;
|
||||
p++;
|
||||
}
|
||||
*p = '\0';
|
||||
return p-buf;
|
||||
}
|
||||
|
||||
/*
|
||||
* user level challenge/response
|
||||
*/
|
||||
static int
|
||||
netkeyauth(int fd)
|
||||
{
|
||||
char chall[32];
|
||||
char resp[32];
|
||||
|
||||
strecpy(chall, chall+sizeof chall, getuser());
|
||||
print("user[%s]: ", chall);
|
||||
if(readln(resp, sizeof(resp)) < 0)
|
||||
return -1;
|
||||
if(*resp != 0)
|
||||
strcpy(chall, resp);
|
||||
writestr(fd, chall, "challenge/response", 1);
|
||||
|
||||
for(;;){
|
||||
if(readstr(fd, chall, sizeof chall) < 0)
|
||||
break;
|
||||
if(*chall == 0)
|
||||
return fd;
|
||||
print("challenge: %s\nresponse: ", chall);
|
||||
if(readln(resp, sizeof(resp)) < 0)
|
||||
break;
|
||||
writestr(fd, resp, "challenge/response", 1);
|
||||
}
|
||||
return -1;
|
||||
}
|
||||
|
||||
static int
|
||||
netkeysrvauth(int fd, char *user)
|
||||
{
|
||||
return -1;
|
||||
}
|
||||
|
||||
static void
|
||||
mksecret(char *t, uchar *f)
|
||||
{
|
||||
sprint(t, "%2.2ux%2.2ux%2.2ux%2.2ux%2.2ux%2.2ux%2.2ux%2.2ux%2.2ux%2.2ux",
|
||||
f[0], f[1], f[2], f[3], f[4], f[5], f[6], f[7], f[8], f[9]);
|
||||
}
|
||||
|
||||
/*
|
||||
* plan9 authentication followed by rc4 encryption
|
||||
*/
|
||||
static int
|
||||
p9auth(int fd)
|
||||
{
|
||||
uchar key[16];
|
||||
uchar digest[SHA1dlen];
|
||||
char fromclientsecret[21];
|
||||
char fromserversecret[21];
|
||||
int i;
|
||||
AuthInfo *ai;
|
||||
|
||||
ai = p9any(fd);
|
||||
if(ai == nil)
|
||||
return -1;
|
||||
memmove(key+4, ai->secret, ai->nsecret);
|
||||
if(ealgs == nil)
|
||||
return fd;
|
||||
|
||||
/* exchange random numbers */
|
||||
for(i = 0; i < 4; i++)
|
||||
key[i] = fastrand();
|
||||
if(write(fd, key, 4) != 4)
|
||||
return -1;
|
||||
if(readn(fd, key+12, 4) != 4)
|
||||
return -1;
|
||||
|
||||
/* scramble into two secrets */
|
||||
sha1(key, sizeof(key), digest, nil);
|
||||
mksecret(fromclientsecret, digest);
|
||||
mksecret(fromserversecret, digest+10);
|
||||
|
||||
/* set up encryption */
|
||||
i = pushssl(fd, ealgs, fromclientsecret, fromserversecret, nil);
|
||||
if(i < 0)
|
||||
werrstr("can't establish ssl connection: %r");
|
||||
return i;
|
||||
}
|
||||
|
||||
int
|
||||
authdial(char *net, char *dom)
|
||||
{
|
||||
int fd;
|
||||
fd = dial(netmkaddr(authserver, "tcp", "567"), 0, 0, 0);
|
||||
//print("authdial %d\n", fd);
|
||||
return fd;
|
||||
}
|
||||
|
||||
static int
|
||||
getastickets(Ticketreq *tr, char *trbuf, char *tbuf)
|
||||
{
|
||||
int asfd, rv;
|
||||
char *dom;
|
||||
|
||||
dom = tr->authdom;
|
||||
asfd = authdial(nil, dom);
|
||||
if(asfd < 0)
|
||||
return -1;
|
||||
rv = _asgetticket(asfd, trbuf, tbuf);
|
||||
close(asfd);
|
||||
return rv;
|
||||
}
|
||||
|
||||
static int
|
||||
mkserverticket(Ticketreq *tr, char *authkey, char *tbuf)
|
||||
{
|
||||
int i;
|
||||
Ticket t;
|
||||
|
||||
if(strcmp(tr->authid, tr->hostid) != 0)
|
||||
return -1;
|
||||
memset(&t, 0, sizeof(t));
|
||||
memmove(t.chal, tr->chal, CHALLEN);
|
||||
strcpy(t.cuid, tr->uid);
|
||||
strcpy(t.suid, tr->uid);
|
||||
for(i=0; i<DESKEYLEN; i++)
|
||||
t.key[i] = fastrand();
|
||||
t.num = AuthTc;
|
||||
convT2M(&t, tbuf, authkey);
|
||||
t.num = AuthTs;
|
||||
convT2M(&t, tbuf+TICKETLEN, authkey);
|
||||
return 0;
|
||||
}
|
||||
|
||||
static int
|
||||
gettickets(Ticketreq *tr, char *key, char *trbuf, char *tbuf)
|
||||
{
|
||||
if(getastickets(tr, trbuf, tbuf) >= 0)
|
||||
return 0;
|
||||
return mkserverticket(tr, key, tbuf);
|
||||
}
|
||||
|
||||
/*
|
||||
* prompt user for a key. don't care about memory leaks, runs standalone
|
||||
*/
|
||||
static Attr*
|
||||
promptforkey(char *params)
|
||||
{
|
||||
char *v;
|
||||
int fd;
|
||||
Attr *a, *attr;
|
||||
char *def;
|
||||
|
||||
fd = open("/dev/cons", ORDWR);
|
||||
if(fd < 0)
|
||||
sysfatal("opening /dev/cons: %r");
|
||||
|
||||
attr = _parseattr(params);
|
||||
fprint(fd, "\n!Adding key:");
|
||||
for(a=attr; a; a=a->next)
|
||||
if(a->type != AttrQuery && a->name[0] != '!')
|
||||
fprint(fd, " %q=%q", a->name, a->val);
|
||||
fprint(fd, "\n");
|
||||
|
||||
for(a=attr; a; a=a->next){
|
||||
v = a->name;
|
||||
if(a->type != AttrQuery || v[0]=='!')
|
||||
continue;
|
||||
def = nil;
|
||||
if(strcmp(v, "user") == 0)
|
||||
def = getuser();
|
||||
a->val = readcons(v, def, 0);
|
||||
if(a->val == nil)
|
||||
sysfatal("user terminated key input");
|
||||
a->type = AttrNameval;
|
||||
}
|
||||
for(a=attr; a; a=a->next){
|
||||
v = a->name;
|
||||
if(a->type != AttrQuery || v[0]!='!')
|
||||
continue;
|
||||
def = nil;
|
||||
if(strcmp(v+1, "user") == 0)
|
||||
def = getuser();
|
||||
a->val = readcons(v+1, def, 1);
|
||||
if(a->val == nil)
|
||||
sysfatal("user terminated key input");
|
||||
a->type = AttrNameval;
|
||||
}
|
||||
fprint(fd, "!\n");
|
||||
close(fd);
|
||||
return attr;
|
||||
}
|
||||
|
||||
/*
|
||||
* send a key to the mounted factotum
|
||||
*/
|
||||
static int
|
||||
sendkey(Attr *attr)
|
||||
{
|
||||
int fd, rv;
|
||||
char buf[1024];
|
||||
|
||||
fd = open("/mnt/factotum/ctl", ORDWR);
|
||||
if(fd < 0)
|
||||
sysfatal("opening /mnt/factotum/ctl: %r");
|
||||
rv = fprint(fd, "key %A\n", attr);
|
||||
read(fd, buf, sizeof buf);
|
||||
close(fd);
|
||||
return rv;
|
||||
}
|
||||
|
||||
int
|
||||
askuser(char *params)
|
||||
{
|
||||
Attr *attr;
|
||||
|
||||
fmtinstall('A', _attrfmt);
|
||||
|
||||
attr = promptforkey(params);
|
||||
if(attr == nil)
|
||||
sysfatal("no key supplied");
|
||||
if(sendkey(attr) < 0)
|
||||
sysfatal("sending key to factotum: %r");
|
||||
return 0;
|
||||
}
|
||||
|
||||
AuthInfo*
|
||||
p9anyfactotum(int fd, int afd)
|
||||
{
|
||||
return auth_proxy(fd, askuser, "proto=p9any role=client %s", keyspec);
|
||||
}
|
||||
|
||||
AuthInfo*
|
||||
p9any(int fd)
|
||||
{
|
||||
char buf[1024], buf2[1024], cchal[CHALLEN], *bbuf, *p, *dom, *u;
|
||||
char *pass;
|
||||
char tbuf[TICKETLEN+TICKETLEN+AUTHENTLEN], trbuf[TICKREQLEN];
|
||||
char authkey[DESKEYLEN];
|
||||
Authenticator auth;
|
||||
int afd, i, v2;
|
||||
Ticketreq tr;
|
||||
Ticket t;
|
||||
AuthInfo *ai;
|
||||
|
||||
if((afd = open("/mnt/factotum/ctl", ORDWR)) >= 0)
|
||||
return p9anyfactotum(fd, afd);
|
||||
|
||||
if(readstr(fd, buf, sizeof buf) < 0)
|
||||
fatal(1, "cannot read p9any negotiation");
|
||||
bbuf = buf;
|
||||
v2 = 0;
|
||||
if(strncmp(buf, "v.2 ", 4) == 0){
|
||||
v2 = 1;
|
||||
bbuf += 4;
|
||||
}
|
||||
if((p = strchr(bbuf, ' ')))
|
||||
*p = 0;
|
||||
p = bbuf;
|
||||
if((dom = strchr(p, '@')) == nil)
|
||||
fatal(1, "bad p9any domain");
|
||||
*dom++ = 0;
|
||||
if(strcmp(p, "p9sk1") != 0)
|
||||
fatal(1, "server did not offer p9sk1");
|
||||
|
||||
sprint(buf2, "%s %s", p, dom);
|
||||
if(write(fd, buf2, strlen(buf2)+1) != strlen(buf2)+1)
|
||||
fatal(1, "cannot write user/domain choice in p9any");
|
||||
if(v2){
|
||||
if(readstr(fd, buf, sizeof buf) != 3)
|
||||
fatal(1, "cannot read OK in p9any");
|
||||
if(memcmp(buf, "OK\0", 3) != 0)
|
||||
fatal(1, "did not get OK in p9any");
|
||||
}
|
||||
for(i=0; i<CHALLEN; i++)
|
||||
cchal[i] = fastrand();
|
||||
if(write(fd, cchal, 8) != 8)
|
||||
fatal(1, "cannot write p9sk1 challenge");
|
||||
|
||||
if(readn(fd, trbuf, TICKREQLEN) != TICKREQLEN)
|
||||
fatal(1, "cannot read ticket request in p9sk1");
|
||||
|
||||
|
||||
convM2TR(trbuf, &tr);
|
||||
u = user;
|
||||
pass = findkey(&u, tr.authdom);
|
||||
if(pass == nil)
|
||||
again:
|
||||
pass = getkey(u, tr.authdom);
|
||||
if(pass == nil)
|
||||
fatal(1, "no password");
|
||||
|
||||
passtokey(authkey, pass);
|
||||
memset(pass, 0, strlen(pass));
|
||||
|
||||
tr.type = AuthTreq;
|
||||
strecpy(tr.hostid, tr.hostid+sizeof tr.hostid, u);
|
||||
strecpy(tr.uid, tr.uid+sizeof tr.uid, u);
|
||||
convTR2M(&tr, trbuf);
|
||||
|
||||
if(gettickets(&tr, authkey, trbuf, tbuf) < 0)
|
||||
fatal(1, "cannot get auth tickets in p9sk1");
|
||||
|
||||
convM2T(tbuf, &t, authkey);
|
||||
if(t.num != AuthTc){
|
||||
print("?password mismatch with auth server\n");
|
||||
goto again;
|
||||
}
|
||||
memmove(tbuf, tbuf+TICKETLEN, TICKETLEN);
|
||||
|
||||
auth.num = AuthAc;
|
||||
memmove(auth.chal, tr.chal, CHALLEN);
|
||||
auth.id = 0;
|
||||
convA2M(&auth, tbuf+TICKETLEN, t.key);
|
||||
|
||||
if(write(fd, tbuf, TICKETLEN+AUTHENTLEN) != TICKETLEN+AUTHENTLEN)
|
||||
fatal(1, "cannot send ticket and authenticator back in p9sk1");
|
||||
|
||||
if(readn(fd, tbuf, AUTHENTLEN) != AUTHENTLEN)
|
||||
fatal(1, "cannot read authenticator in p9sk1");
|
||||
|
||||
convM2A(tbuf, &auth, t.key);
|
||||
if(auth.num != AuthAs
|
||||
|| memcmp(auth.chal, cchal, CHALLEN) != 0
|
||||
|| auth.id != 0){
|
||||
print("?you and auth server agree about password.\n");
|
||||
print("?server is confused.\n");
|
||||
fatal(1, "server lies got %llux.%d want %llux.%d", *(vlong*)auth.chal, auth.id, *(vlong*)cchal, 0);
|
||||
}
|
||||
//print("i am %s there.\n", t.suid);
|
||||
ai = mallocz(sizeof(AuthInfo), 1);
|
||||
ai->secret = mallocz(8, 1);
|
||||
des56to64((uchar*)t.key, ai->secret);
|
||||
ai->nsecret = 8;
|
||||
ai->suid = strdup(t.suid);
|
||||
ai->cuid = strdup(t.cuid);
|
||||
memset(authkey, 0, sizeof authkey);
|
||||
return ai;
|
||||
}
|
||||
|
||||
/*
|
||||
static int
|
||||
noauth(int fd)
|
||||
{
|
||||
ealgs = nil;
|
||||
return fd;
|
||||
}
|
||||
|
||||
static int
|
||||
srvnoauth(int fd, char *user)
|
||||
{
|
||||
strecpy(user, user+MaxStr, getuser());
|
||||
ealgs = nil;
|
||||
return fd;
|
||||
}
|
||||
*/
|
||||
|
||||
void
|
||||
loghex(uchar *p, int n)
|
||||
{
|
||||
char buf[100];
|
||||
int i;
|
||||
|
||||
for(i = 0; i < n; i++)
|
||||
sprint(buf+2*i, "%2.2ux", p[i]);
|
||||
// syslog(0, "cpu", buf);
|
||||
}
|
||||
|
||||
static int
|
||||
srvp9auth(int fd, char *user)
|
||||
{
|
||||
return -1;
|
||||
}
|
||||
|
||||
/*
|
||||
* set authentication mechanism
|
||||
*/
|
||||
int
|
||||
setam(char *name)
|
||||
{
|
||||
for(am = authmethod; am->name != nil; am++)
|
||||
if(strcmp(am->name, name) == 0)
|
||||
return 0;
|
||||
am = authmethod;
|
||||
return -1;
|
||||
}
|
||||
|
||||
/*
|
||||
* set authentication mechanism and encryption/hash algs
|
||||
*
|
||||
int
|
||||
setamalg(char *s)
|
||||
{
|
||||
ealgs = strchr(s, ' ');
|
||||
if(ealgs != nil)
|
||||
*ealgs++ = 0;
|
||||
return setam(s);
|
||||
}
|
||||
|
||||
*/
|
Loading…
Reference in New Issue
Block a user