util.c 18 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989
  1. #include "dat.h"
  2. static char secstore[100]; /* server name */
  3. /* bind in the default network and cs */
  4. static int
  5. bindnetcs(void)
  6. {
  7. int srvfd;
  8. if(access("/net/tcp", AEXIST) < 0)
  9. bind("#I", "/net", MBEFORE);
  10. if(access("/net/cs", AEXIST) < 0){
  11. if((srvfd = open("#s/cs", ORDWR)) >= 0){
  12. if(mount(srvfd, -1, "/net", MBEFORE, "") >= 0)
  13. return 0;
  14. close(srvfd);
  15. }
  16. return -1;
  17. }
  18. return 0;
  19. }
  20. int
  21. _authdial(char *net, char *authdom)
  22. {
  23. int fd;
  24. if(bindnetcs() >= 0 && (fd=authdial(net, authdom)) >= 0)
  25. return fd;
  26. if(net != nil && strcmp(net, "/net") != 0)
  27. return -1;
  28. /* use the auth sever passed to us as an arg */
  29. if(authaddr == nil)
  30. return -1;
  31. fd = dial(netmkaddr(authaddr, "il", "566"), 0, 0, 0);
  32. if(fd >= 0)
  33. return fd;
  34. return dial(netmkaddr(authaddr, "tcp", "567"), 0, 0, 0);
  35. }
  36. int
  37. secdial(void)
  38. {
  39. char *p, buf[80], *f[3];
  40. int fd, nf;
  41. p = secstore; /* take it from writehostowner, if set there */
  42. if(*p == 0) /* else use the authserver */
  43. p = "$auth";
  44. if(bindnetcs() >= 0)
  45. return dial(netmkaddr(p, "net", "secstore"), 0, 0, 0);
  46. /* translate $auth ourselves.
  47. * authaddr is something like il!host!566 or tcp!host!567.
  48. * extract host, accounting for a change of format to something
  49. * like il!host or tcp!host or host.
  50. */
  51. if(strcmp(p, "$auth")==0){
  52. if(authaddr == nil)
  53. return -1;
  54. safecpy(buf, authaddr, sizeof buf);
  55. nf = getfields(buf, f, nelem(f), 0, "!");
  56. switch(nf){
  57. default:
  58. return -1;
  59. case 1:
  60. p = f[0];
  61. break;
  62. case 2:
  63. case 3:
  64. p = f[1];
  65. break;
  66. }
  67. }
  68. fd = dial(netmkaddr(p, "tcp", "5356"), 0, 0, 0);
  69. if(fd >= 0)
  70. return fd;
  71. return -1;
  72. }
  73. /*
  74. * prompt user for a key. don't care about memory leaks, runs standalone
  75. */
  76. static Attr*
  77. promptforkey(char *params)
  78. {
  79. char *v;
  80. int fd;
  81. Attr *a, *attr;
  82. char *def;
  83. fd = open("/dev/cons", ORDWR);
  84. if(fd < 0)
  85. sysfatal("opening /dev/cons: %r");
  86. attr = _parseattr(params);
  87. fprint(fd, "\n!Adding key:");
  88. for(a=attr; a; a=a->next)
  89. if(a->type != AttrQuery && a->name[0] != '!')
  90. fprint(fd, " %q=%q", a->name, a->val);
  91. fprint(fd, "\n");
  92. for(a=attr; a; a=a->next){
  93. v = a->name;
  94. if(a->type != AttrQuery || v[0]=='!')
  95. continue;
  96. def = nil;
  97. if(strcmp(v, "user") == 0)
  98. def = getuser();
  99. a->val = readcons(v, def, 0);
  100. if(a->val == nil)
  101. sysfatal("user terminated key input");
  102. a->type = AttrNameval;
  103. }
  104. for(a=attr; a; a=a->next){
  105. v = a->name;
  106. if(a->type != AttrQuery || v[0]!='!')
  107. continue;
  108. def = nil;
  109. if(strcmp(v+1, "user") == 0)
  110. def = getuser();
  111. a->val = readcons(v+1, def, 1);
  112. if(a->val == nil)
  113. sysfatal("user terminated key input");
  114. a->type = AttrNameval;
  115. }
  116. fprint(fd, "!\n");
  117. close(fd);
  118. return attr;
  119. }
  120. /*
  121. * send a key to the mounted factotum
  122. */
  123. static int
  124. sendkey(Attr *attr)
  125. {
  126. int fd, rv;
  127. char buf[1024];
  128. fd = open("/mnt/factotum/ctl", ORDWR);
  129. if(fd < 0)
  130. sysfatal("opening /mnt/factotum/ctl: %r");
  131. rv = fprint(fd, "key %A\n", attr);
  132. read(fd, buf, sizeof buf);
  133. close(fd);
  134. return rv;
  135. }
  136. /* askuser */
  137. void
  138. askuser(char *params)
  139. {
  140. Attr *attr;
  141. attr = promptforkey(params);
  142. if(attr == nil)
  143. sysfatal("no key supplied");
  144. if(sendkey(attr) < 0)
  145. sysfatal("sending key to factotum: %r");
  146. }
  147. ulong conftaggen;
  148. int
  149. canusekey(Fsstate *fss, Key *k)
  150. {
  151. int i;
  152. if(_strfindattr(k->attr, "confirm")){
  153. for(i=0; i<fss->nconf; i++)
  154. if(fss->conf[i].key == k)
  155. return fss->conf[i].canuse;
  156. if(fss->nconf%16 == 0)
  157. fss->conf = erealloc(fss->conf, (fss->nconf+16)*(sizeof(fss->conf[0])));
  158. fss->conf[fss->nconf].key = k;
  159. k->ref++;
  160. fss->conf[fss->nconf].canuse = -1;
  161. fss->conf[fss->nconf].tag = conftaggen++;
  162. fss->nconf++;
  163. return -1;
  164. }
  165. return 1;
  166. }
  167. /* closekey */
  168. void
  169. closekey(Key *k)
  170. {
  171. if(k == nil)
  172. return;
  173. if(--k->ref != 0)
  174. return;
  175. if(k->proto && k->proto->closekey)
  176. (*k->proto->closekey)(k);
  177. _freeattr(k->attr);
  178. _freeattr(k->privattr);
  179. k->attr = (void*)~1;
  180. k->privattr = (void*)~1;
  181. k->proto = nil;
  182. free(k);
  183. }
  184. static uchar*
  185. pstring(uchar *p, uchar *e, char *s)
  186. {
  187. uint n;
  188. if(p == nil)
  189. return nil;
  190. if(s == nil)
  191. s = "";
  192. n = strlen(s);
  193. if(p+n+BIT16SZ >= e)
  194. return nil;
  195. PBIT16(p, n);
  196. p += BIT16SZ;
  197. memmove(p, s, n);
  198. p += n;
  199. return p;
  200. }
  201. static uchar*
  202. pcarray(uchar *p, uchar *e, uchar *s, uint n)
  203. {
  204. if(p == nil)
  205. return nil;
  206. if(s == nil){
  207. if(n > 0)
  208. sysfatal("pcarray");
  209. s = (uchar*)"";
  210. }
  211. if(p+n+BIT16SZ >= e)
  212. return nil;
  213. PBIT16(p, n);
  214. p += BIT16SZ;
  215. memmove(p, s, n);
  216. p += n;
  217. return p;
  218. }
  219. uchar*
  220. convAI2M(AuthInfo *ai, uchar *p, int n)
  221. {
  222. uchar *e = p+n;
  223. p = pstring(p, e, ai->cuid);
  224. p = pstring(p, e, ai->suid);
  225. p = pstring(p, e, ai->cap);
  226. p = pcarray(p, e, ai->secret, ai->nsecret);
  227. return p;
  228. }
  229. int
  230. failure(Fsstate *s, char *fmt, ...)
  231. {
  232. char e[ERRMAX];
  233. va_list arg;
  234. if(fmt == nil)
  235. rerrstr(s->err, sizeof(s->err));
  236. else {
  237. va_start(arg, fmt);
  238. snprint(e, sizeof e, fmt, arg);
  239. va_end(arg);
  240. strecpy(s->err, s->err+sizeof(s->err), e);
  241. errstr(e, sizeof e);
  242. }
  243. flog("%d: failure %s", s->seqnum, s->err);
  244. return RpcFailure;
  245. }
  246. static int
  247. hasqueries(Attr *a)
  248. {
  249. for(; a; a=a->next)
  250. if(a->type == AttrQuery)
  251. return 1;
  252. return 0;
  253. }
  254. char *ignored[] = {
  255. "role",
  256. "disabled",
  257. };
  258. static int
  259. ignoreattr(char *s)
  260. {
  261. int i;
  262. for(i=0; i<nelem(ignored); i++)
  263. if(strcmp(ignored[i], s)==0)
  264. return 1;
  265. return 0;
  266. }
  267. Keyinfo*
  268. mkkeyinfo(Keyinfo *k, Fsstate *fss, Attr *attr)
  269. {
  270. memset(k, 0, sizeof *k);
  271. k->fss = fss;
  272. k->user = fss->sysuser;
  273. if(attr)
  274. k->attr = attr;
  275. else
  276. k->attr = fss->attr;
  277. return k;
  278. }
  279. int
  280. findkey(Key **ret, Keyinfo *ki, char *fmt, ...)
  281. {
  282. int i, s, nmatch;
  283. char buf[1024], *p, *who;
  284. va_list arg;
  285. Attr *a, *attr0, *attr1, *attr2, *attr3, **l;
  286. Key *k;
  287. *ret = nil;
  288. who = ki->user;
  289. attr0 = ki->attr;
  290. if(fmt){
  291. va_start(arg, fmt);
  292. vseprint(buf, buf+sizeof buf, fmt, arg);
  293. va_end(arg);
  294. attr1 = _parseattr(buf);
  295. }else
  296. attr1 = nil;
  297. if(who && strcmp(who, owner) == 0)
  298. who = nil;
  299. if(who){
  300. snprint(buf, sizeof buf, "owner=%q", who);
  301. attr2 = _parseattr(buf);
  302. attr3 = _parseattr("owner=*");
  303. }else
  304. attr2 = attr3 = nil;
  305. p = _strfindattr(attr0, "proto");
  306. if(p == nil)
  307. p = _strfindattr(attr1, "proto");
  308. if(p && findproto(p) == nil){
  309. werrstr("unknown protocol %s", p);
  310. _freeattr(attr1);
  311. _freeattr(attr2);
  312. _freeattr(attr3);
  313. return failure(ki->fss, nil);
  314. }
  315. nmatch = 0;
  316. for(i=0; i<ring->nkey; i++){
  317. k = ring->key[i];
  318. if(_strfindattr(k->attr, "disabled") && !ki->usedisabled)
  319. continue;
  320. if(matchattr(attr0, k->attr, k->privattr) && matchattr(attr1, k->attr, k->privattr)){
  321. /* check ownership */
  322. if(!matchattr(attr2, k->attr, nil) && !matchattr(attr3, k->attr, nil))
  323. continue;
  324. if(nmatch++ < ki->skip)
  325. continue;
  326. if(!ki->noconf){
  327. switch(canusekey(ki->fss, k)){
  328. case -1:
  329. _freeattr(attr1);
  330. return RpcConfirm;
  331. case 0:
  332. continue;
  333. case 1:
  334. break;
  335. }
  336. }
  337. _freeattr(attr1);
  338. _freeattr(attr2);
  339. _freeattr(attr3);
  340. k->ref++;
  341. *ret = k;
  342. return RpcOk;
  343. }
  344. }
  345. flog("%d: no key matches %A %A %A %A", ki->fss->seqnum, attr0, attr1, attr2, attr3);
  346. werrstr("no key matches %A %A", attr0, attr1);
  347. _freeattr(attr2);
  348. _freeattr(attr3);
  349. s = RpcFailure;
  350. if(askforkeys && who==nil && (hasqueries(attr0) || hasqueries(attr1))){
  351. if(nmatch == 0){
  352. attr0 = _copyattr(attr0);
  353. for(l=&attr0; *l; l=&(*l)->next)
  354. ;
  355. *l = attr1;
  356. for(l=&attr0; *l; ){
  357. if(ignoreattr((*l)->name)){
  358. a = *l;
  359. *l = (*l)->next;
  360. a->next = nil;
  361. _freeattr(a);
  362. }else
  363. l = &(*l)->next;
  364. }
  365. attr0 = sortattr(attr0);
  366. snprint(ki->fss->keyinfo, sizeof ki->fss->keyinfo, "%A", attr0);
  367. _freeattr(attr0);
  368. attr1 = nil; /* attr1 was linked to attr0 */
  369. }else
  370. ki->fss->keyinfo[0] = '\0';
  371. s = RpcNeedkey;
  372. }
  373. _freeattr(attr1);
  374. if(s == RpcFailure)
  375. return failure(ki->fss, nil); /* loads error string */
  376. return s;
  377. }
  378. int
  379. findp9authkey(Key **k, Fsstate *fss)
  380. {
  381. char *dom;
  382. Keyinfo ki;
  383. /*
  384. * We don't use fss->attr here because we don't
  385. * care about what the user name is set to, for instance.
  386. */
  387. mkkeyinfo(&ki, fss, nil);
  388. ki.attr = nil;
  389. ki.user = nil;
  390. if(dom = _strfindattr(fss->attr, "dom"))
  391. return findkey(k, &ki, "proto=p9sk1 dom=%q role=server user?", dom);
  392. else
  393. return findkey(k, &ki, "proto=p9sk1 role=server dom? user?");
  394. }
  395. Proto*
  396. findproto(char *name)
  397. {
  398. int i;
  399. for(i=0; prototab[i]; i++)
  400. if(strcmp(name, prototab[i]->name) == 0)
  401. return prototab[i];
  402. return nil;
  403. }
  404. char*
  405. getnvramkey(int flag, char **secstorepw)
  406. {
  407. char *s;
  408. Nvrsafe safe;
  409. char spw[CONFIGLEN+1];
  410. int i;
  411. memset(&safe, 0, sizeof safe);
  412. /*
  413. * readnvram can return -1 meaning nvram wasn't written,
  414. * but safe still holds good data.
  415. */
  416. if(readnvram(&safe, flag)<0 && safe.authid[0]==0)
  417. return nil;
  418. /*
  419. * we're using the config area to hold the secstore
  420. * password. if there's anything there, return it.
  421. */
  422. memmove(spw, safe.config, CONFIGLEN);
  423. spw[CONFIGLEN] = 0;
  424. if(spw[0] != 0)
  425. *secstorepw = estrdup(spw);
  426. /*
  427. * only use nvram key if it is non-zero
  428. */
  429. for(i = 0; i < DESKEYLEN; i++)
  430. if(safe.machkey[i] != 0)
  431. break;
  432. if(i == DESKEYLEN)
  433. return nil;
  434. s = emalloc(512);
  435. fmtinstall('H', encodefmt);
  436. sprint(s, "key proto=p9sk1 user=%q dom=%q !hex=%.*H !password=______",
  437. safe.authid, safe.authdom, DESKEYLEN, safe.machkey);
  438. writehostowner(safe.authid);
  439. return s;
  440. }
  441. int
  442. isclient(char *role)
  443. {
  444. if(role == nil){
  445. werrstr("role not specified");
  446. return -1;
  447. }
  448. if(strcmp(role, "server") == 0)
  449. return 0;
  450. if(strcmp(role, "client") == 0)
  451. return 1;
  452. werrstr("unknown role %q", role);
  453. return -1;
  454. }
  455. static int
  456. hasname(Attr *a0, Attr *a1, char *name)
  457. {
  458. return _findattr(a0, name) || _findattr(a1, name);
  459. }
  460. static int
  461. hasnameval(Attr *a0, Attr *a1, char *name, char *val)
  462. {
  463. Attr *a;
  464. for(a=_findattr(a0, name); a; a=_findattr(a->next, name))
  465. if(strcmp(a->val, val) == 0)
  466. return 1;
  467. for(a=_findattr(a1, name); a; a=_findattr(a->next, name))
  468. if(strcmp(a->val, val) == 0)
  469. return 1;
  470. return 0;
  471. }
  472. int
  473. matchattr(Attr *pat, Attr *a0, Attr *a1)
  474. {
  475. int type;
  476. for(; pat; pat=pat->next){
  477. type = pat->type;
  478. if(ignoreattr(pat->name))
  479. type = AttrDefault;
  480. switch(type){
  481. case AttrQuery: /* name=something be present */
  482. if(!hasname(a0, a1, pat->name))
  483. return 0;
  484. break;
  485. case AttrNameval: /* name=val must be present */
  486. if(!hasnameval(a0, a1, pat->name, pat->val))
  487. return 0;
  488. break;
  489. case AttrDefault: /* name=val must be present if name=anything is present */
  490. if(hasname(a0, a1, pat->name) && !hasnameval(a0, a1, pat->name, pat->val))
  491. return 0;
  492. break;
  493. }
  494. }
  495. return 1;
  496. }
  497. void
  498. memrandom(void *p, int n)
  499. {
  500. uchar *cp;
  501. for(cp = (uchar*)p; n > 0; n--)
  502. *cp++ = fastrand();
  503. }
  504. /*
  505. * keep caphash fd open since opens of it could be disabled
  506. */
  507. static int caphashfd;
  508. void
  509. initcap(void)
  510. {
  511. caphashfd = open("#¤/caphash", OWRITE);
  512. // if(caphashfd < 0)
  513. // fprint(2, "%s: opening #¤/caphash: %r\n", argv0);
  514. }
  515. /*
  516. * create a change uid capability
  517. */
  518. char*
  519. mkcap(char *from, char *to)
  520. {
  521. uchar rand[20];
  522. char *cap;
  523. char *key;
  524. int nfrom, nto;
  525. uchar hash[SHA1dlen];
  526. if(caphashfd < 0)
  527. return nil;
  528. /* create the capability */
  529. nto = strlen(to);
  530. nfrom = strlen(from);
  531. cap = emalloc(nfrom+1+nto+1+sizeof(rand)*3+1);
  532. sprint(cap, "%s@%s", from, to);
  533. memrandom(rand, sizeof(rand));
  534. key = cap+nfrom+1+nto+1;
  535. enc64(key, sizeof(rand)*3, rand, sizeof(rand));
  536. /* hash the capability */
  537. hmac_sha1((uchar*)cap, strlen(cap), (uchar*)key, strlen(key), hash, nil);
  538. /* give the kernel the hash */
  539. key[-1] = '@';
  540. if(write(caphashfd, hash, SHA1dlen) < 0){
  541. free(cap);
  542. return nil;
  543. }
  544. return cap;
  545. }
  546. int
  547. phaseerror(Fsstate *s, char *op)
  548. {
  549. char tmp[32];
  550. werrstr("protocol phase error: %s in state %s", op, phasename(s, s->phase, tmp));
  551. return RpcPhase;
  552. }
  553. char*
  554. phasename(Fsstate *fss, int phase, char *tmp)
  555. {
  556. char *name;
  557. if(fss->phase == Broken)
  558. name = "Broken";
  559. else if(phase == Established)
  560. name = "Established";
  561. else if(phase == Notstarted)
  562. name = "Notstarted";
  563. else if(phase < 0 || phase >= fss->maxphase
  564. || (name = fss->phasename[phase]) == nil){
  565. sprint(tmp, "%d", phase);
  566. name = tmp;
  567. }
  568. return name;
  569. }
  570. static int
  571. outin(char *prompt, char *def, int len)
  572. {
  573. char *s;
  574. s = readcons(prompt, def, 0);
  575. if(s == nil)
  576. return -1;
  577. if(s == nil)
  578. sysfatal("s==nil???");
  579. strncpy(def, s, len);
  580. def[len-1] = 0;
  581. free(s);
  582. return strlen(def);
  583. }
  584. /*
  585. * get host owner and set it
  586. */
  587. void
  588. promptforhostowner(void)
  589. {
  590. char owner[64], *p;
  591. /* hack for bitsy; can't prompt during boot */
  592. if(p = getenv("user")){
  593. writehostowner(p);
  594. free(p);
  595. return;
  596. }
  597. free(p);
  598. strcpy(owner, "none");
  599. do{
  600. outin("user", owner, sizeof(owner));
  601. } while(*owner == 0);
  602. writehostowner(owner);
  603. }
  604. char*
  605. estrappend(char *s, char *fmt, ...)
  606. {
  607. char *t;
  608. va_list arg;
  609. va_start(arg, fmt);
  610. t = vsmprint(fmt, arg);
  611. if(t == nil)
  612. sysfatal("out of memory");
  613. va_end(arg);
  614. s = erealloc(s, strlen(s)+strlen(t)+1);
  615. strcat(s, t);
  616. free(t);
  617. return s;
  618. }
  619. /*
  620. * prompt for a string with a possible default response
  621. */
  622. char*
  623. readcons(char *prompt, char *def, int raw)
  624. {
  625. int fdin, fdout, ctl, n;
  626. char line[10];
  627. char *s;
  628. fdin = open("/dev/cons", OREAD);
  629. if(fdin < 0)
  630. fdin = 0;
  631. fdout = open("/dev/cons", OWRITE);
  632. if(fdout < 0)
  633. fdout = 1;
  634. if(def != nil)
  635. fprint(fdout, "%s[%s]: ", prompt, def);
  636. else
  637. fprint(fdout, "%s: ", prompt);
  638. if(raw){
  639. ctl = open("/dev/consctl", OWRITE);
  640. if(ctl >= 0)
  641. write(ctl, "rawon", 5);
  642. } else
  643. ctl = -1;
  644. s = estrdup("");
  645. for(;;){
  646. n = read(fdin, line, 1);
  647. if(n == 0){
  648. Error:
  649. close(fdin);
  650. close(fdout);
  651. if(ctl >= 0)
  652. close(ctl);
  653. free(s);
  654. return nil;
  655. }
  656. if(n < 0)
  657. goto Error;
  658. if(line[0] == 0x7f)
  659. goto Error;
  660. if(n == 0 || line[0] == '\n' || line[0] == '\r'){
  661. if(raw){
  662. write(ctl, "rawoff", 6);
  663. write(fdout, "\n", 1);
  664. }
  665. close(ctl);
  666. close(fdin);
  667. close(fdout);
  668. if(*s == 0 && def != nil)
  669. s = estrappend(s, "%s", def);
  670. return s;
  671. }
  672. if(line[0] == '\b'){
  673. if(strlen(s) > 0)
  674. s[strlen(s)-1] = 0;
  675. } else if(line[0] == 0x15) { /* ^U: line kill */
  676. if(def != nil)
  677. fprint(fdout, "\n%s[%s]: ", prompt, def);
  678. else
  679. fprint(fdout, "\n%s: ", prompt);
  680. s[0] = 0;
  681. } else {
  682. s = estrappend(s, "%c", line[0]);
  683. }
  684. }
  685. return nil; /* not reached */
  686. }
  687. /*
  688. * Insert a key into the keyring.
  689. * If the public attributes are identical to some other key, replace that one.
  690. */
  691. int
  692. replacekey(Key *kn, int before)
  693. {
  694. int i;
  695. Key *k;
  696. for(i=0; i<ring->nkey; i++){
  697. k = ring->key[i];
  698. if(matchattr(kn->attr, k->attr, nil) && matchattr(k->attr, kn->attr, nil)){
  699. closekey(k);
  700. kn->ref++;
  701. ring->key[i] = kn;
  702. return 0;
  703. }
  704. }
  705. if(ring->nkey%16 == 0)
  706. ring->key = erealloc(ring->key, (ring->nkey+16)*sizeof(ring->key[0]));
  707. kn->ref++;
  708. if(before){
  709. memmove(ring->key+1, ring->key, ring->nkey*sizeof ring->key[0]);
  710. ring->key[0] = kn;
  711. ring->nkey++;
  712. }else
  713. ring->key[ring->nkey++] = kn;
  714. return 0;
  715. }
  716. char*
  717. safecpy(char *to, char *from, int n)
  718. {
  719. memset(to, 0, n);
  720. if(n == 1)
  721. return to;
  722. if(from==nil)
  723. sysfatal("safecpy called with from==nil, pc=%#p\n",
  724. getcallerpc(&to));
  725. strncpy(to, from, n-1);
  726. return to;
  727. }
  728. Attr*
  729. setattr(Attr *a, char *fmt, ...)
  730. {
  731. char buf[1024];
  732. va_list arg;
  733. Attr *b;
  734. va_start(arg, fmt);
  735. vseprint(buf, buf+sizeof buf, fmt, arg);
  736. va_end(arg);
  737. b = _parseattr(buf);
  738. a = setattrs(a, b);
  739. setmalloctag(a, getcallerpc(&a));
  740. _freeattr(b);
  741. return a;
  742. }
  743. /*
  744. * add attributes in list b to list a. If any attributes are in
  745. * both lists, replace those in a by those in b.
  746. */
  747. Attr*
  748. setattrs(Attr *a, Attr *b)
  749. {
  750. int found;
  751. Attr **l, *freea;
  752. for(; b; b=b->next){
  753. found = 0;
  754. for(l=&a; *l; ){
  755. if(strcmp(b->name, (*l)->name) == 0){
  756. switch(b->type){
  757. case AttrNameval:
  758. if(!found){
  759. found = 1;
  760. free((*l)->val);
  761. (*l)->val = estrdup(b->val);
  762. (*l)->type = AttrNameval;
  763. l = &(*l)->next;
  764. }else{
  765. freea = *l;
  766. *l = (*l)->next;
  767. freea->next = nil;
  768. _freeattr(freea);
  769. }
  770. break;
  771. case AttrQuery:
  772. goto continue2;
  773. }
  774. }else
  775. l = &(*l)->next;
  776. }
  777. if(found == 0){
  778. *l = _mkattr(b->type, b->name, b->val, nil);
  779. setmalloctag(*l, getcallerpc(&a));
  780. }
  781. continue2:;
  782. }
  783. return a;
  784. }
  785. void
  786. setmalloctaghere(void *v)
  787. {
  788. setmalloctag(v, getcallerpc(&v));
  789. }
  790. Attr*
  791. sortattr(Attr *a)
  792. {
  793. int i;
  794. Attr *anext, *a0, *a1, **l;
  795. if(a == nil || a->next == nil)
  796. return a;
  797. /* cut list in halves */
  798. a0 = nil;
  799. a1 = nil;
  800. i = 0;
  801. for(; a; a=anext){
  802. anext = a->next;
  803. if(i++%2){
  804. a->next = a0;
  805. a0 = a;
  806. }else{
  807. a->next = a1;
  808. a1 = a;
  809. }
  810. }
  811. /* sort */
  812. a0 = sortattr(a0);
  813. a1 = sortattr(a1);
  814. /* merge */
  815. l = &a;
  816. while(a0 || a1){
  817. if(a1==nil){
  818. anext = a0;
  819. a0 = a0->next;
  820. }else if(a0==nil){
  821. anext = a1;
  822. a1 = a1->next;
  823. }else if(strcmp(a0->name, a1->name) < 0){
  824. anext = a0;
  825. a0 = a0->next;
  826. }else{
  827. anext = a1;
  828. a1 = a1->next;
  829. }
  830. *l = anext;
  831. l = &(*l)->next;
  832. }
  833. *l = nil;
  834. return a;
  835. }
  836. int
  837. toosmall(Fsstate *fss, uint n)
  838. {
  839. fss->rpc.nwant = n;
  840. return RpcToosmall;
  841. }
  842. void
  843. writehostowner(char *owner)
  844. {
  845. int fd;
  846. char *s;
  847. if((s = strchr(owner,'@')) != nil){
  848. *s++ = 0;
  849. strncpy(secstore, s, (sizeof secstore)-1);
  850. }
  851. fd = open("#c/hostowner", OWRITE);
  852. if(fd >= 0){
  853. if(fprint(fd, "%s", owner) < 0)
  854. fprint(2, "factotum: setting #c/hostowner to %q: %r\n",
  855. owner);
  856. close(fd);
  857. }
  858. }
  859. int
  860. attrnamefmt(Fmt *fmt)
  861. {
  862. char *b, buf[1024], *ebuf;
  863. Attr *a;
  864. ebuf = buf+sizeof buf;
  865. b = buf;
  866. strcpy(buf, " ");
  867. for(a=va_arg(fmt->args, Attr*); a; a=a->next){
  868. if(a->name == nil)
  869. continue;
  870. b = seprint(b, ebuf, " %q?", a->name);
  871. }
  872. return fmtstrcpy(fmt, buf+1);
  873. }
  874. void
  875. disablekey(Key *k)
  876. {
  877. Attr *a;
  878. for(a=k->attr; a; a=a->next){
  879. if(a->type==AttrNameval && strcmp(a->name, "disabled") == 0)
  880. return;
  881. if(a->next == nil)
  882. break;
  883. }
  884. if(a)
  885. a->next = _mkattr(AttrNameval, "disabled", "by.factotum", nil);
  886. else
  887. k->attr = _mkattr(AttrNameval, "disabled", "by.factotum", nil); /* not reached: always a proto attribute */
  888. }