blob: 257bafe76e5526b308de60971599c7440c495d83 [file] [log] [blame]
rscbe8b3152004-06-17 03:27:35 +00001#include <u.h>
2#include <libc.h>
3#include <fcall.h>
4#include <auth.h>
rsc648bb6f2005-02-08 20:58:10 +00005#include <9pclient.h>
rscbe8b3152004-06-17 03:27:35 +00006#include "authlocal.h"
7
8enum {
rsccbeb0b22006-04-01 19:24:03 +00009 ARgiveup = 100
rscbe8b3152004-06-17 03:27:35 +000010};
11
12static uchar*
13gstring(uchar *p, uchar *ep, char **s)
14{
15 uint n;
16
17 if(p == nil)
18 return nil;
19 if(p+BIT16SZ > ep)
20 return nil;
21 n = GBIT16(p);
22 p += BIT16SZ;
23 if(p+n > ep)
24 return nil;
25 *s = malloc(n+1);
26 memmove((*s), p, n);
27 (*s)[n] = '\0';
28 p += n;
29 return p;
30}
31
32static uchar*
33gcarray(uchar *p, uchar *ep, uchar **s, int *np)
34{
35 uint n;
36
37 if(p == nil)
38 return nil;
39 if(p+BIT16SZ > ep)
40 return nil;
41 n = GBIT16(p);
42 p += BIT16SZ;
43 if(p+n > ep)
44 return nil;
45 *s = malloc(n);
46 if(*s == nil)
47 return nil;
48 memmove((*s), p, n);
49 *np = n;
50 p += n;
51 return p;
52}
53
54void
55auth_freeAI(AuthInfo *ai)
56{
57 if(ai == nil)
58 return;
59 free(ai->cuid);
60 free(ai->suid);
61 free(ai->cap);
62 free(ai->secret);
63 free(ai);
64}
65
66static uchar*
67convM2AI(uchar *p, int n, AuthInfo **aip)
68{
69 uchar *e = p+n;
70 AuthInfo *ai;
71
72 ai = mallocz(sizeof(*ai), 1);
73 if(ai == nil)
74 return nil;
75
76 p = gstring(p, e, &ai->cuid);
77 p = gstring(p, e, &ai->suid);
78 p = gstring(p, e, &ai->cap);
79 p = gcarray(p, e, &ai->secret, &ai->nsecret);
80 if(p == nil)
81 auth_freeAI(ai);
82 else
83 *aip = ai;
84 return p;
85}
86
87AuthInfo*
88auth_getinfo(AuthRpc *rpc)
89{
90 AuthInfo *a;
91
92 if(auth_rpc(rpc, "authinfo", nil, 0) != ARok)
93 return nil;
rsca8ec4912005-07-13 21:34:11 +000094 a = nil;
rscbe8b3152004-06-17 03:27:35 +000095 if(convM2AI((uchar*)rpc->arg, rpc->narg, &a) == nil){
96 werrstr("bad auth info from factotum");
97 return nil;
98 }
99 return a;
100}
101
102static int
103dorpc(AuthRpc *rpc, char *verb, char *val, int len, AuthGetkey *getkey)
104{
105 int ret;
106
107 for(;;){
108 if((ret = auth_rpc(rpc, verb, val, len)) != ARneedkey && ret != ARbadkey)
109 return ret;
110 if(getkey == nil)
111 return ARgiveup; /* don't know how */
112 if((*getkey)(rpc->arg) < 0)
113 return ARgiveup; /* user punted */
114 }
115}
116
117/*
118 * this just proxies what the factotum tells it to.
119 */
120AuthInfo*
121fauth_proxy(int fd, AuthRpc *rpc, AuthGetkey *getkey, char *params)
122{
123 char *buf;
124 int m, n, ret;
125 AuthInfo *a;
126 char oerr[ERRMAX];
127
128 rerrstr(oerr, sizeof oerr);
129 werrstr("UNKNOWN AUTH ERROR");
130
131 if(dorpc(rpc, "start", params, strlen(params), getkey) != ARok){
132 werrstr("fauth_proxy start: %r");
133 return nil;
134 }
135
136 buf = malloc(AuthRpcMax);
137 if(buf == nil)
138 return nil;
139 for(;;){
140 switch(dorpc(rpc, "read", nil, 0, getkey)){
141 case ARdone:
142 free(buf);
143 a = auth_getinfo(rpc);
144 errstr(oerr, sizeof oerr); /* no error, restore whatever was there */
145 return a;
146 case ARok:
147 if(write(fd, rpc->arg, rpc->narg) != rpc->narg){
148 werrstr("auth_proxy write fd: %r");
149 goto Error;
150 }
151 break;
152 case ARphase:
153 n = 0;
154 memset(buf, 0, AuthRpcMax);
155 while((ret = dorpc(rpc, "write", buf, n, getkey)) == ARtoosmall){
156 if(atoi(rpc->arg) > AuthRpcMax)
157 break;
158 m = read(fd, buf+n, atoi(rpc->arg)-n);
159 if(m <= 0){
160 if(m == 0)
161 werrstr("auth_proxy short read: %s", buf);
162 goto Error;
163 }
164 n += m;
165 }
166 if(ret != ARok){
167 werrstr("auth_proxy rpc write: %s: %r", buf);
168 goto Error;
169 }
170 break;
171 default:
172 werrstr("auth_proxy rpc: %r");
173 goto Error;
174 }
175 }
176Error:
177 free(buf);
178 return nil;
179}
180
181AuthInfo*
182auth_proxy(int fd, AuthGetkey *getkey, char *fmt, ...)
183{
rscbe8b3152004-06-17 03:27:35 +0000184 char *p;
185 va_list arg;
186 AuthInfo *ai;
187 AuthRpc *rpc;
188
189 quotefmtinstall(); /* just in case */
190 va_start(arg, fmt);
191 p = vsmprint(fmt, arg);
192 va_end(arg);
193
rsc648bb6f2005-02-08 20:58:10 +0000194 rpc = auth_allocrpc();
rscbe8b3152004-06-17 03:27:35 +0000195 if(rpc == nil){
196 free(p);
197 return nil;
198 }
199
200 ai = fauth_proxy(fd, rpc, getkey, p);
201 free(p);
202 auth_freerpc(rpc);
rsc648bb6f2005-02-08 20:58:10 +0000203 return ai;
204}
205
206/*
207 * this just proxies what the factotum tells it to.
208 */
209AuthInfo*
210fsfauth_proxy(CFid *fid, AuthRpc *rpc, AuthGetkey *getkey, char *params)
211{
212 char *buf;
213 int m, n, ret;
214 AuthInfo *a;
215 char oerr[ERRMAX];
216
217 rerrstr(oerr, sizeof oerr);
218 werrstr("UNKNOWN AUTH ERROR");
219
220 if(dorpc(rpc, "start", params, strlen(params), getkey) != ARok){
221 werrstr("fauth_proxy start: %r");
222 return nil;
223 }
224
225 buf = malloc(AuthRpcMax);
226 if(buf == nil)
227 return nil;
228 for(;;){
229 switch(dorpc(rpc, "read", nil, 0, getkey)){
230 case ARdone:
231 free(buf);
232 a = auth_getinfo(rpc);
233 errstr(oerr, sizeof oerr); /* no error, restore whatever was there */
234 return a;
235 case ARok:
236 if(fswrite(fid, rpc->arg, rpc->narg) != rpc->narg){
237 werrstr("auth_proxy write fid: %r");
238 goto Error;
239 }
240 break;
241 case ARphase:
242 n = 0;
243 memset(buf, 0, AuthRpcMax);
244 while((ret = dorpc(rpc, "write", buf, n, getkey)) == ARtoosmall){
245 if(atoi(rpc->arg) > AuthRpcMax)
246 break;
247 m = fsread(fid, buf+n, atoi(rpc->arg)-n);
248 if(m <= 0){
249 if(m == 0)
250 werrstr("auth_proxy short read: %s", buf);
251 goto Error;
252 }
253 n += m;
254 }
255 if(ret != ARok){
256 werrstr("auth_proxy rpc write: %s: %r", buf);
257 goto Error;
258 }
259 break;
260 default:
261 werrstr("auth_proxy rpc: %r");
262 goto Error;
263 }
264 }
265Error:
266 free(buf);
267 return nil;
268}
269
270AuthInfo*
271fsauth_proxy(CFid *fid, AuthGetkey *getkey, char *fmt, ...)
272{
273 char *p;
274 va_list arg;
275 AuthInfo *ai;
276 AuthRpc *rpc;
277
278 quotefmtinstall(); /* just in case */
279 va_start(arg, fmt);
280 p = vsmprint(fmt, arg);
281 va_end(arg);
282
283 rpc = auth_allocrpc();
284 if(rpc == nil){
285 free(p);
286 return nil;
287 }
288
289 ai = fsfauth_proxy(fid, rpc, getkey, p);
290 free(p);
291 auth_freerpc(rpc);
rscbe8b3152004-06-17 03:27:35 +0000292 return ai;
293}
294