+/* Blerg is (C) 2011 The Dominion of Awesome, and is distributed under a
+ * BSD-style license. Please see the COPYING file for details.
+ */
#include <sys/types.h>
#include <sys/stat.h>
#include <fcntl.h>
#include <string.h>
#include <stdio.h>
+#include <stdlib.h>
#include "config.h"
#include "auth.h"
+#include "util.h"
+
+#define TOKEN_SIZE 16
+#define MAX_PASSWORD_LENGTH 64
int auth_set_password(const char *username, const char *password) {
char filename[512];
- int fd;
+ int fd, n;
+
+ if (!valid_name(username) || !blerg_exists(username))
+ return 0;
- if (!blerg_exists(username))
+ n = strlen(password);
+ if (n > MAX_PASSWORD_LENGTH)
return 0;
snprintf(filename, 512, "%s/%s/password", DATA_PATH, username);
fd = open(filename, O_WRONLY | O_CREAT, 0600);
- write(fd, password, strlen(password));
+ write(fd, password, n);
close(fd);
return 1;
int fd;
int len = 0;
+ if (!valid_name(username))
+ return 0;
+
sprintf(filename, "%s/%s/password", DATA_PATH, username);
fd = open(filename, O_RDONLY);
if (fd == -1)
return 0;
- len = read(fd, password, 32);
+ len = read(fd, password, MAX_PASSWORD_LENGTH);
close(fd);
password[len] = 0;
if (auth_get_password(username, epw) == 0)
return 0;
- if (strncmp(password, epw, 32) == 0)
+ if (strncmp(password, epw, MAX_PASSWORD_LENGTH) == 0)
return 1;
else
return 0;
}
+
+void hexify(char *dst, char *src, int len) {
+ static char hex[] = "0123456789abcdef";
+ int i;
+
+ for (i = 0; i < len; i++) {
+ dst[i * 2] = hex[(src[i] & 0xF0) >> 4];
+ dst[i * 2 + 1] = hex[src[i] & 0xF];
+ }
+}
+
+char *create_random_token() {
+ unsigned char buf[TOKEN_SIZE];
+ char *token;
+ int rand_fd;
+
+ rand_fd = open("/dev/urandom", O_RDONLY);
+ if (rand_fd == -1) {
+ perror("Could not open /dev/urandom\n");
+ return 0;
+ }
+ read(rand_fd, buf, TOKEN_SIZE);
+ close(rand_fd);
+
+ token = malloc(TOKEN_SIZE * 2 + 1);
+ hexify(token, buf, TOKEN_SIZE);
+ token[TOKEN_SIZE * 2] = 0;
+
+ return token;
+}
+
+int auth_login(const char *username, const char *password) {
+ char filename[512];
+ int token_fd;
+
+ if (!auth_check_password(username, password))
+ return 0;
+
+ sprintf(filename, "%s/%s/token", DATA_PATH, username);
+ token_fd = open(filename, O_WRONLY | O_CREAT, 0600);
+ if (token_fd == -1) {
+ perror("Could not open token");
+ return 0;
+ }
+
+ char *token = create_random_token();
+ write(token_fd, token, TOKEN_SIZE * 2);
+ close(token_fd);
+ free(token);
+
+ return 1;
+}
+
+int auth_logout(const char *username) {
+ char filename[512];
+
+ if (!valid_name(username))
+ return 0;
+
+ sprintf(filename, "%s/%s/token", DATA_PATH, username);
+ if (unlink(filename) == -1)
+ return 0;
+
+ return 1;
+}
+
+char *auth_get_token(const char *username) {
+ char filename[512];
+ char *token;
+ int token_fd;
+
+ if (!valid_name(username))
+ return 0;
+
+ sprintf(filename, "%s/%s/token", DATA_PATH, username);
+ token_fd = open(filename, O_RDONLY, 0600);
+ if (token_fd == -1) {
+ perror("Could not open token");
+ return NULL;
+ }
+
+ token = malloc(TOKEN_SIZE * 2 + 1);
+ read(token_fd, token, TOKEN_SIZE * 2);
+ close(token_fd);
+
+ return token;
+}
+
+int auth_check_token(const char *username, const char *given_token) {
+ char *token = auth_get_token(username);
+ if (token != NULL && given_token != NULL) {
+ int ret = (strncmp(token, given_token, TOKEN_SIZE * 2) == 0);
+ free(token);
+ return ret;
+ } else {
+ return 0;
+ }
+}