sysauth.c 3.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192
  1. /*
  2. * This file is part of the UCB release of Plan 9. It is subject to the license
  3. * terms in the LICENSE file found in the top-level directory of this
  4. * distribution and at http://akaros.cs.berkeley.edu/files/Plan9License. No
  5. * part of the UCB release of Plan 9, including this file, may be copied,
  6. * modified, propagated, or distributed except according to the terms contained
  7. * in the LICENSE file.
  8. */
  9. #include "u.h"
  10. #include "../port/lib.h"
  11. #include "mem.h"
  12. #include "dat.h"
  13. #include "fns.h"
  14. #include "../port/error.h"
  15. #include <authsrv.h>
  16. char *eve;
  17. char hostdomain[DOMLEN];
  18. /*
  19. * return true if current user is eve
  20. */
  21. int
  22. iseve(void)
  23. {
  24. return strcmp(eve, up->user) == 0;
  25. }
  26. void
  27. sysfversion(Ar0* ar0, va_list list)
  28. {
  29. Chan *c;
  30. char *version;
  31. int fd;
  32. uint32_t msize;
  33. usize nversion;
  34. /*
  35. * int fversion(int fd, int bufsize, char *version, int nversion);
  36. * should be
  37. * usize fversion(int fd, u32int msize, char *version, usize nversion);
  38. */
  39. fd = va_arg(list, int);
  40. msize = va_arg(list, uint32_t);
  41. version = va_arg(list, char*);
  42. nversion = va_arg(list, usize);
  43. version = validaddr(version, nversion, 1);
  44. /* check there's a NUL in the version string */
  45. if(nversion == 0 || memchr(version, 0, nversion) == nil)
  46. error(Ebadarg);
  47. c = fdtochan(fd, ORDWR, 0, 1);
  48. if(waserror()){
  49. cclose(c);
  50. nexterror();
  51. }
  52. ar0->u = mntversion(c, msize, version, nversion);
  53. cclose(c);
  54. poperror();
  55. }
  56. void
  57. sys_fsession(Ar0* ar0, va_list list)
  58. {
  59. int fd;
  60. char *trbuf;
  61. /*
  62. * int fsession(int fd, char trbuf[TICKREQLEN]);
  63. *
  64. * Deprecated; backwards compatibility only.
  65. */
  66. fd = va_arg(list, int);
  67. trbuf = va_arg(list, char*);
  68. USED(fd);
  69. trbuf = validaddr(trbuf, 1, 1);
  70. *trbuf = '\0';
  71. ar0->i = 0;
  72. }
  73. void
  74. sysfauth(Ar0* ar0, va_list list)
  75. {
  76. Chan *c, *ac;
  77. char *aname;
  78. int fd;
  79. /*
  80. * int fauth(int fd, char *aname);
  81. */
  82. fd = va_arg(list, int);
  83. aname = va_arg(list, char*);
  84. aname = validaddr(aname, 1, 0);
  85. aname = validnamedup(aname, 1);
  86. if(waserror()){
  87. free(aname);
  88. nexterror();
  89. }
  90. c = fdtochan(fd, ORDWR, 0, 1);
  91. if(waserror()){
  92. cclose(c);
  93. nexterror();
  94. }
  95. ac = mntauth(c, aname);
  96. /* at this point ac is responsible for keeping c alive */
  97. cclose(c);
  98. poperror(); /* c */
  99. free(aname);
  100. poperror(); /* aname */
  101. if(waserror()){
  102. cclose(ac);
  103. nexterror();
  104. }
  105. fd = newfd(ac);
  106. if(fd < 0)
  107. error(Enofd);
  108. poperror(); /* ac */
  109. /* always mark it close on exec */
  110. ac->flag |= CCEXEC;
  111. ar0->i = fd;
  112. }
  113. /*
  114. * called by devcons() for user device
  115. *
  116. * anyone can become none
  117. */
  118. int32_t
  119. userwrite(char* a, int32_t n)
  120. {
  121. if(n != 4 || strncmp(a, "none", 4) != 0)
  122. error(Eperm);
  123. kstrdup(&up->user, "none");
  124. up->basepri = PriNormal;
  125. return n;
  126. }
  127. /*
  128. * called by devcons() for host owner/domain
  129. *
  130. * writing hostowner also sets user
  131. */
  132. int32_t
  133. hostownerwrite(char* a, int32_t n)
  134. {
  135. char buf[128];
  136. if(!iseve())
  137. error(Eperm);
  138. if(n <= 0 || n >= sizeof buf)
  139. error(Ebadarg);
  140. memmove(buf, a, n);
  141. buf[n] = 0;
  142. renameuser(eve, buf);
  143. kstrdup(&eve, buf);
  144. kstrdup(&up->user, buf);
  145. up->basepri = PriNormal;
  146. return n;
  147. }
  148. int32_t
  149. hostdomainwrite(char* a, int32_t n)
  150. {
  151. char buf[DOMLEN];
  152. if(!iseve())
  153. error(Eperm);
  154. if(n >= DOMLEN)
  155. error(Ebadarg);
  156. memset(buf, 0, DOMLEN);
  157. strncpy(buf, a, n);
  158. if(buf[0] == 0)
  159. error(Ebadarg);
  160. memmove(hostdomain, buf, DOMLEN);
  161. return n;
  162. }