xenocara/app/xdm/auth.c

1496 lines
36 KiB
C
Raw Normal View History

2006-11-25 13:07:29 -07:00
/*
Copyright 1988, 1998 The Open Group
Permission to use, copy, modify, distribute, and sell this software and its
documentation for any purpose is hereby granted without fee, provided that
the above copyright notice appear in all copies and that both that
copyright notice and this permission notice appear in supporting
documentation.
The above copyright notice and this permission notice shall be included
in all copies or substantial portions of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS
OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT.
IN NO EVENT SHALL THE OPEN GROUP BE LIABLE FOR ANY CLAIM, DAMAGES OR
OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE,
ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR
OTHER DEALINGS IN THE SOFTWARE.
Except as contained in this notice, the name of The Open Group shall
not be used in advertising or otherwise to promote the sale, use or
other dealings in this Software without prior written authorization
from The Open Group.
*/
/*
* xdm - display manager daemon
* Author: Keith Packard, MIT X Consortium
*
* auth.c
*
* maintain the authorization generation daemon
*/
#include <X11/X.h>
#include <X11/Xlibint.h>
#include <sys/types.h>
#include <sys/stat.h>
#include "dm.h"
#include "dm_auth.h"
#include "dm_error.h"
#ifdef X_PRIVSEP
#include <pwd.h>
#endif
2006-11-25 13:07:29 -07:00
#include <errno.h>
#include <sys/ioctl.h>
#if defined(TCPCONN) || defined(STREAMSCONN)
# include "dm_socket.h"
#endif
#ifdef DNETCONN
# include <netdnet/dn.h>
# include <netdnet/dnetdb.h>
#endif
#if defined(hpux)
2010-03-28 03:33:02 -06:00
# include <sys/utsname.h>
2006-11-25 13:07:29 -07:00
#endif
#if defined(SYSV) && defined(i386)
# include <sys/stream.h>
# ifdef ISC
# include <stropts.h>
# include <sys/sioctl.h>
# endif /* ISC */
#endif /* i386 */
#ifdef SVR4
# include <netdb.h>
# include <sys/sockio.h>
# include <sys/stropts.h>
#endif
#ifdef __convex__
# include <sync/queue.h>
# include <sync/sema.h>
#endif
#ifdef __GNU__
2010-03-28 03:33:02 -06:00
# include <netdb.h>
# undef SIOCGIFCONF
2006-11-25 13:07:29 -07:00
#else /* __GNU__ */
2010-03-28 03:33:02 -06:00
# include <net/if.h>
2006-11-25 13:07:29 -07:00
#endif /* __GNU__ */
#if defined(TCPCONN) && !defined(WIN32)
# include <netinet/in.h>
#endif
2010-03-28 03:33:02 -06:00
/* Solaris provides an extended interface SIOCGLIFCONF for IPv6 support.
2006-11-25 13:07:29 -07:00
*/
#ifdef SIOCGLIFCONF
2010-03-28 03:33:02 -06:00
# define USE_SIOCGLIFCONF
2006-11-25 13:07:29 -07:00
#endif
#if ((defined(SVR4) && !defined(sun)) || defined(ISC)) && \
defined(SIOCGIFCONF) && !defined(USE_SIOCGLIFCONF)
2010-03-28 03:33:02 -06:00
# define SYSV_SIOCGIFCONF
2006-11-25 13:07:29 -07:00
#endif
#ifdef CSRG_BASED
2010-03-28 03:33:02 -06:00
# include <sys/param.h>
# if (BSD >= 199103)
# define VARIABLE_IFREQ
# endif
2006-11-25 13:07:29 -07:00
#endif
#ifdef __UNIXOS2__
2010-03-28 03:33:02 -06:00
# define link rename
2006-11-25 13:07:29 -07:00
int chown(int a,int b,int c) {}
2010-03-28 03:33:02 -06:00
# include <io.h>
2006-11-25 13:07:29 -07:00
#endif
struct AuthProtocol {
unsigned short name_length;
char *name;
void (*InitAuth)(unsigned short len, char *name);
Xauth *(*GetAuth)(unsigned short len, char *name);
void (*GetXdmcpAuth)(
struct protoDisplay *pdpy,
unsigned short authorizationNameLen,
char *authorizationName);
int inited;
};
static struct AuthProtocol AuthProtocols[] = {
{ (unsigned short) 18, "MIT-MAGIC-COOKIE-1",
MitInitAuth, MitGetAuth, NULL
},
#ifdef HASXDMAUTH
{ (unsigned short) 19, "XDM-AUTHORIZATION-1",
XdmInitAuth, XdmGetAuth, XdmGetXdmcpAuth,
},
#endif
#ifdef SECURE_RPC
{ (unsigned short) 9, "SUN-DES-1",
SecureRPCInitAuth, SecureRPCGetAuth, NULL,
},
#endif
#ifdef K5AUTH
{ (unsigned short) 14, "MIT-KERBEROS-5",
Krb5InitAuth, Krb5GetAuth, NULL,
},
#endif
};
#define NUM_AUTHORIZATION (sizeof (AuthProtocols) / sizeof (AuthProtocols[0]))
static struct AuthProtocol *
findProtocol (unsigned short name_length, char *name)
{
int i;
for (i = 0; i < NUM_AUTHORIZATION; i++)
if (AuthProtocols[i].name_length == name_length &&
memcmp(AuthProtocols[i].name, name, name_length) == 0)
{
return &AuthProtocols[i];
}
return (struct AuthProtocol *) 0;
}
int
ValidAuthorization (unsigned short name_length, char *name)
{
if (findProtocol (name_length, name))
return TRUE;
return FALSE;
}
static Xauth *
GenerateAuthorization (unsigned short name_length, char *name)
{
struct AuthProtocol *a;
2007-08-05 13:37:39 -06:00
Xauth *auth = NULL;
2006-11-25 13:07:29 -07:00
int i;
Debug ("GenerateAuthorization %*.*s\n",
name_length, name_length, name);
a = findProtocol (name_length, name);
if (a)
{
if (!a->inited)
{
(*a->InitAuth) (name_length, name);
a->inited = TRUE;
}
auth = (*a->GetAuth) (name_length, name);
if (auth)
{
Debug ("Got %p (%d %*.*s) ", auth,
auth->name_length, auth->name_length,
auth->name_length, auth->name);
for (i = 0; i < (int)auth->data_length; i++)
Debug (" %02x", auth->data[i] & 0xff);
Debug ("\n");
}
else
Debug ("Got (null)\n");
}
else
{
Debug ("Unknown authorization %*.*s\n", name_length, name_length, name);
}
return auth;
}
#ifdef XDMCP
void
SetProtoDisplayAuthorization (
struct protoDisplay *pdpy,
unsigned short authorizationNameLen,
char *authorizationName)
{
struct AuthProtocol *a;
Xauth *auth;
a = findProtocol (authorizationNameLen, authorizationName);
2007-08-05 13:37:39 -06:00
pdpy->xdmcpAuthorization = pdpy->fileAuthorization = NULL;
2006-11-25 13:07:29 -07:00
if (a)
{
if (!a->inited)
{
(*a->InitAuth) (authorizationNameLen, authorizationName);
a->inited = TRUE;
}
if (a->GetXdmcpAuth)
{
(*a->GetXdmcpAuth) (pdpy, authorizationNameLen, authorizationName);
auth = pdpy->xdmcpAuthorization;
}
else
{
auth = (*a->GetAuth) (authorizationNameLen, authorizationName);
pdpy->fileAuthorization = auth;
2007-08-05 13:37:39 -06:00
pdpy->xdmcpAuthorization = NULL;
2006-11-25 13:07:29 -07:00
}
if (auth)
Debug ("Got %p (%d %*.*s)\n", auth,
auth->name_length, auth->name_length,
auth->name_length, auth->name);
else
Debug ("Got (null)\n");
}
}
#endif /* XDMCP */
void
CleanUpFileName (char *src, char *dst, int len)
{
while (*src) {
if (--len <= 0)
break;
switch (*src & 0x7f)
{
case '/':
*dst++ = '_';
break;
case '-':
*dst++ = '.';
break;
default:
*dst++ = (*src & 0x7f);
}
++src;
}
*dst = '\0';
}
static char authdir1[] = "authdir";
static char authdir2[] = "authfiles";
static int
MakeServerAuthFile (struct display *d, FILE ** file, uid_t uid, gid_t gid)
2006-11-25 13:07:29 -07:00
{
int len;
#if defined(SYSV) && !defined(SVR4)
2010-03-28 03:33:02 -06:00
# define NAMELEN 14
2006-11-25 13:07:29 -07:00
#else
2010-03-28 03:33:02 -06:00
# define NAMELEN 255
2006-11-25 13:07:29 -07:00
#endif
char cleanname[NAMELEN];
int r;
#ifdef HAS_MKSTEMP
int fd;
#endif
struct stat statb;
*file = NULL;
if (!d->authFile) {
2010-03-28 03:33:02 -06:00
if (d->clientAuthFile && *d->clientAuthFile) {
d->authFile = strdup(d->clientAuthFile);
if (!d->authFile)
return FALSE;
} else {
2006-11-25 13:07:29 -07:00
CleanUpFileName (d->name, cleanname, NAMELEN - 8);
len = strlen (authDir) + strlen (authdir1) + strlen (authdir2)
+ strlen (cleanname) + 14;
2010-03-28 03:33:02 -06:00
d->authFile = malloc (len);
if (!d->authFile)
return FALSE;
snprintf (d->authFile, len, "%s/%s", authDir, authdir1);
2006-11-25 13:07:29 -07:00
r = stat(d->authFile, &statb);
if (r == 0) {
if (statb.st_uid != uid)
(void) chown(d->authFile, uid, statb.st_gid);
2006-11-25 13:07:29 -07:00
if ((statb.st_mode & 0077) != 0)
(void) chmod(d->authFile, statb.st_mode & 0700);
} else {
2010-03-28 03:33:02 -06:00
if (errno == ENOENT) {
2006-11-25 13:07:29 -07:00
r = mkdir(d->authFile, 0700);
2010-03-28 03:33:02 -06:00
if (r < 0) {
LogError ("cannot make authentication directory %s: "
"%s\n", d->authFile, _SysErrorMsg (errno));
}
} else {
LogError ("cannot access authentication directory %s: "
"%s\n", d->authFile, _SysErrorMsg (errno));
}
2006-11-25 13:07:29 -07:00
if (r < 0) {
free (d->authFile);
d->authFile = NULL;
return FALSE;
} else {
(void) chown(d->authFile, uid, gid);
2006-11-25 13:07:29 -07:00
}
}
2010-03-28 03:33:02 -06:00
snprintf (d->authFile, len, "%s/%s/%s",
authDir, authdir1, authdir2);
2006-11-25 13:07:29 -07:00
r = mkdir(d->authFile, 0700);
if (r < 0 && errno != EEXIST) {
2010-03-28 03:33:02 -06:00
LogError ("cannot make authentication directory %s: %s\n",
d->authFile, _SysErrorMsg (errno));
2006-11-25 13:07:29 -07:00
free (d->authFile);
d->authFile = NULL;
return FALSE;
} else {
(void) chown(d->authFile, uid, gid);
2006-11-25 13:07:29 -07:00
}
2010-03-28 03:33:02 -06:00
snprintf (d->authFile, len, "%s/%s/%s/A%s-XXXXXX",
authDir, authdir1, authdir2, cleanname);
2006-11-25 13:07:29 -07:00
#ifdef HAS_MKSTEMP
fd = mkstemp (d->authFile);
if (fd < 0) {
2010-03-28 03:33:02 -06:00
LogError ("cannot make authentication file %s: %s\n",
d->authFile, _SysErrorMsg (errno));
2006-11-25 13:07:29 -07:00
free (d->authFile);
d->authFile = NULL;
return FALSE;
}
*file = fdopen(fd, "w");
if (!*file)
(void) close (fd);
return TRUE;
#else
(void) mktemp (d->authFile);
(void) chown(d->authFile, uid, gid);
2006-11-25 13:07:29 -07:00
#endif
}
}
(void) unlink (d->authFile);
*file = fopen (d->authFile, "w");
return TRUE;
}
int
SaveServerAuthorizations (
struct display *d,
Xauth **auths,
int count)
{
FILE *auth_file;
2007-08-05 13:37:39 -06:00
mode_t mask;
2006-11-25 13:07:29 -07:00
int ret;
int i;
uid_t uid;
gid_t gid;
#ifdef X_PRIVSEP
struct passwd *x11;
/* Give read capability to group _x11 */
x11 = getpwnam("_x11");
if (x11 == NULL) {
LogError("Can't find _x11 user\n");
uid = getuid();
gid = getgid();
} else {
uid = x11->pw_uid;
gid = x11->pw_gid;
}
#else
uid = getuid();
gid = getgid();
#endif
2006-11-25 13:07:29 -07:00
mask = umask (0077);
ret = MakeServerAuthFile(d, &auth_file, uid, gid);
2006-11-25 13:07:29 -07:00
umask (mask);
if (!ret)
return FALSE;
if (!auth_file) {
Debug ("Can't creat auth file %s\n", d->authFile);
LogError ("Cannot open server authorization file %s\n", d->authFile);
free (d->authFile);
d->authFile = NULL;
ret = FALSE;
}
else
{
fchown(fileno(auth_file), uid, gid);
2006-11-25 13:07:29 -07:00
Debug ("File: %s auth: %p\n", d->authFile, auths);
ret = TRUE;
for (i = 0; i < count; i++)
{
/*
* User-based auths may not have data until
* a user logs in. In which case don't write
* to the auth file so xrdb and setup programs don't fail.
*/
if (auths[i]->data_length > 0)
if (!XauWriteAuth (auth_file, auths[i]) ||
fflush (auth_file) == EOF)
{
LogError ("Cannot write server authorization file %s\n",
d->authFile);
ret = FALSE;
free (d->authFile);
d->authFile = NULL;
}
}
fclose (auth_file);
}
return ret;
}
void
SetLocalAuthorization (struct display *d)
{
Xauth *auth, **auths;
int i, j;
if (d->authorizations)
{
for (i = 0; i < d->authNum; i++)
XauDisposeAuth (d->authorizations[i]);
free ((char *) d->authorizations);
d->authorizations = (Xauth **) NULL;
d->authNum = 0;
}
if (!d->authNames)
return;
for (i = 0; d->authNames[i]; i++)
;
d->authNameNum = i;
if (d->authNameLens)
free ((char *) d->authNameLens);
d->authNameLens = (unsigned short *) malloc
(d->authNameNum * sizeof (unsigned short));
if (!d->authNameLens)
return;
for (i = 0; i < d->authNameNum; i++)
d->authNameLens[i] = strlen (d->authNames[i]);
auths = (Xauth **) malloc (d->authNameNum * sizeof (Xauth *));
if (!auths)
return;
j = 0;
for (i = 0; i < d->authNameNum; i++)
{
auth = GenerateAuthorization (d->authNameLens[i], d->authNames[i]);
if (auth)
auths[j++] = auth;
}
if (SaveServerAuthorizations (d, auths, j))
{
d->authorizations = auths;
d->authNum = j;
}
else
{
for (i = 0; i < j; i++)
XauDisposeAuth (auths[i]);
free ((char *) auths);
}
}
/*
* Set the authorization to use for xdm's initial connection
* to the X server. Cannot use user-based authorizations
* because no one has logged in yet, so we don't have any
* user credentials.
* Well, actually we could use SUN-DES-1 because we tell the server
* to allow root in. This is bogus and should be fixed.
*/
void
SetAuthorization (struct display *d)
{
register Xauth **auth = d->authorizations;
int i;
for (i = 0; i < d->authNum; i++)
{
if (auth[i]->name_length == 9 &&
memcmp(auth[i]->name, "SUN-DES-1", 9) == 0)
continue;
if (auth[i]->name_length == 14 &&
memcmp(auth[i]->name, "MIT-KERBEROS-5", 14) == 0)
continue;
XSetAuthorization (auth[i]->name, (int) auth[i]->name_length,
auth[i]->data, (int) auth[i]->data_length);
}
}
static int
openFiles (char *name, char *new_name, FILE **oldp, FILE **newp)
{
2007-08-05 13:37:39 -06:00
mode_t mask;
2006-11-25 13:07:29 -07:00
strcpy (new_name, name);
strcat (new_name, "-n");
mask = umask (0077);
(void) unlink (new_name);
*newp = fopen (new_name, "w");
(void) umask (mask);
if (!*newp) {
Debug ("can't open new file %s\n", new_name);
return 0;
}
if (!*oldp)
*oldp = fopen (name, "r");
Debug ("opens succeeded %s %s\n", name, new_name);
return 1;
}
static int
binaryEqual (char *a, char *b, unsigned short len)
{
while (len-- > 0)
if (*a++ != *b++)
return FALSE;
return TRUE;
}
static void
dumpBytes (unsigned short len, char *data)
{
unsigned short i;
Debug ("%d: ", len);
for (i = 0; i < len; i++)
Debug ("%02x ", data[i] & 0377);
Debug ("\n");
}
static void
dumpAuth (Xauth *auth)
{
Debug ("family: %d\n", auth->family);
Debug ("addr: ");
dumpBytes (auth->address_length, auth->address);
Debug ("number: ");
dumpBytes (auth->number_length, auth->number);
Debug ("name: ");
dumpBytes (auth->name_length, auth->name);
Debug ("data: ");
dumpBytes (auth->data_length, auth->data);
}
struct addrList {
unsigned short family;
unsigned short address_length;
char *address;
unsigned short number_length;
char *number;
unsigned short name_length;
char *name;
struct addrList *next;
};
static struct addrList *addrs;
static void
initAddrs (void)
{
2007-08-05 13:37:39 -06:00
addrs = NULL;
2006-11-25 13:07:29 -07:00
}
static void
doneAddrs (void)
{
struct addrList *a, *n;
for (a = addrs; a; a = n) {
n = a->next;
if (a->address)
free (a->address);
if (a->number)
free (a->number);
free ((char *) a);
}
}
static int checkEntry (Xauth *auth);
static void
saveEntry (Xauth *auth)
{
struct addrList *new;
new = (struct addrList *) malloc (sizeof (struct addrList));
if (!new) {
LogOutOfMem ("saveEntry");
return;
}
if ((new->address_length = auth->address_length) > 0) {
new->address = malloc (auth->address_length);
if (!new->address) {
LogOutOfMem ("saveEntry");
free ((char *) new);
return;
}
memmove( new->address, auth->address, (int) auth->address_length);
} else
2007-08-05 13:37:39 -06:00
new->address = NULL;
2006-11-25 13:07:29 -07:00
if ((new->number_length = auth->number_length) > 0) {
new->number = malloc (auth->number_length);
if (!new->number) {
LogOutOfMem ("saveEntry");
free (new->address);
free ((char *) new);
return;
}
memmove( new->number, auth->number, (int) auth->number_length);
} else
2007-08-05 13:37:39 -06:00
new->number = NULL;
2006-11-25 13:07:29 -07:00
if ((new->name_length = auth->name_length) > 0) {
new->name = malloc (auth->name_length);
if (!new->name) {
LogOutOfMem ("saveEntry");
free (new->number);
free (new->address);
free ((char *) new);
return;
}
memmove( new->name, auth->name, (int) auth->name_length);
} else
2007-08-05 13:37:39 -06:00
new->name = NULL;
2006-11-25 13:07:29 -07:00
new->family = auth->family;
new->next = addrs;
addrs = new;
}
static int
checkEntry (Xauth *auth)
{
struct addrList *a;
for (a = addrs; a; a = a->next) {
if (a->family == auth->family &&
a->address_length == auth->address_length &&
binaryEqual (a->address, auth->address, auth->address_length) &&
a->number_length == auth->number_length &&
binaryEqual (a->number, auth->number, auth->number_length) &&
a->name_length == auth->name_length &&
binaryEqual (a->name, auth->name, auth->name_length))
{
return 1;
}
}
return 0;
}
static int doWrite;
static void
writeAuth (FILE *file, Xauth *auth)
{
if (debugLevel >= 15) { /* normally too verbose */
Debug ("writeAuth: doWrite = %d\n", doWrite);
dumpAuth (auth); /* does Debug only */
}
if (doWrite)
XauWriteAuth (file, auth);
}
static void
writeAddr (
int family,
int addr_length,
char *addr,
FILE *file,
Xauth *auth)
{
auth->family = (unsigned short) family;
auth->address_length = addr_length;
auth->address = addr;
Debug ("writeAddr: writing and saving an entry\n");
writeAuth (file, auth);
saveEntry (auth);
}
static void
DefineLocal (FILE *file, Xauth *auth)
{
char displayname[100];
int len = _XGetHostname (displayname, sizeof(displayname));
/* Make sure this produces the same string as _XGetHostname in lib/X/XlibInt.c.
* Otherwise, Xau will not be able to find your cookies in the Xauthority file.
*
* Note: POSIX says that the ``nodename'' member of utsname does _not_ have
* to have sufficient information for interfacing to the network,
* and so, you may be better off using gethostname (if it exists).
*/
#if defined(hpux)
/*
* For HP-UX, HP's Xlib expects a fully-qualified domain name, which
* is achieved by using gethostname(). For compatability, we must
* also still create the entry using uname().
*/
char tmp_displayname[100];
struct utsname name;
2010-03-28 03:33:02 -06:00
2006-11-25 13:07:29 -07:00
tmp_displayname[0] = 0;
uname(&name);
snprintf(tmp_displayname, sizeof(tmp_displayname), "%s", name.nodename);
writeAddr (FamilyLocal, strlen (tmp_displayname), tmp_displayname,
file, auth);
2010-03-28 03:33:02 -06:00
2006-11-25 13:07:29 -07:00
/*
2010-03-28 03:33:02 -06:00
* If _XGetHostname() returned the same value as uname(), don't
2006-11-25 13:07:29 -07:00
* write a duplicate entry.
*/
if (strcmp (displayname, tmp_displayname))
#endif
writeAddr (FamilyLocal, len, displayname, file, auth);
}
#ifdef HAS_GETIFADDRS
2010-03-28 03:33:02 -06:00
# include <ifaddrs.h>
2006-11-25 13:07:29 -07:00
static void
DefineSelf(int fd, FILE *file, Xauth *auth)
{
struct ifaddrs *ifap, *ifr;
char *addr;
int family, len;
2010-03-28 03:33:02 -06:00
2006-11-25 13:07:29 -07:00
Debug("DefineSelf\n");
2010-03-28 03:33:02 -06:00
if (getifaddrs(&ifap) < 0)
2006-11-25 13:07:29 -07:00
return;
for (ifr = ifap; ifr != NULL; ifr = ifr->ifa_next) {
len = sizeof(*(ifr->ifa_addr));
family = ConvertAddr((XdmcpNetaddr)(ifr->ifa_addr), &len, &addr);
2010-03-28 03:33:02 -06:00
if (family == -1 || family == FamilyLocal)
2006-11-25 13:07:29 -07:00
continue;
/*
* don't write out 'localhost' entries, as
* they may conflict with other local entries.
* DefineLocal will always be called to add
* the local entry anyway, so this one can
* be tossed.
*/
2010-03-28 03:33:02 -06:00
if (family == FamilyInternet && len == 4 && addr[0] == 127)
2006-11-25 13:07:29 -07:00
{
Debug ("Skipping localhost address\n");
continue;
}
2010-03-28 03:33:02 -06:00
# if defined(IPv6) && defined(AF_INET6)
2006-11-25 13:07:29 -07:00
if(family == FamilyInternet6) {
if (IN6_IS_ADDR_LOOPBACK(((struct in6_addr *)addr))) {
Debug ("Skipping IPv6 localhost address\n");
continue;
}
/* Also skip XDM-AUTHORIZATION-1 */
2010-03-28 03:33:02 -06:00
if (auth->name_length == 19 &&
2006-11-25 13:07:29 -07:00
strcmp(auth->name, "XDM-AUTHORIZATION-1") == 0) {
Debug ("Skipping IPv6 XDM-AUTHORIZATION-1\n");
continue;
}
}
2010-03-28 03:33:02 -06:00
# endif
2006-11-25 13:07:29 -07:00
writeAddr(family, len, addr, file, auth);
2010-03-28 03:33:02 -06:00
}
2006-11-25 13:07:29 -07:00
Debug("DefineSelf done\n");
}
#else /* GETIFADDRS */
2010-03-28 03:33:02 -06:00
# ifdef SYSV_SIOCGIFCONF
2006-11-25 13:07:29 -07:00
/* Deal with different SIOCGIFCONF ioctl semantics on SYSV, SVR4 */
static int
ifioctl (int fd, int cmd, char *arg)
{
struct strioctl ioc;
int ret;
bzero((char *) &ioc, sizeof(ioc));
ioc.ic_cmd = cmd;
ioc.ic_timout = 0;
if (cmd == SIOCGIFCONF)
{
ioc.ic_len = ((struct ifconf *) arg)->ifc_len;
ioc.ic_dp = ((struct ifconf *) arg)->ifc_buf;
2010-03-28 03:33:02 -06:00
# ifdef ISC
2006-11-25 13:07:29 -07:00
/* SIOCGIFCONF is somewhat brain damaged on ISC. The argument
* buffer must contain the ifconf structure as header. Ifc_req
* is also not a pointer but a one element array of ifreq
* structures. On return this array is extended by enough
* ifreq fields to hold all interfaces. The return buffer length
* is placed in the buffer header.
*/
((struct ifconf *) ioc.ic_dp)->ifc_len =
ioc.ic_len - sizeof(struct ifconf);
2010-03-28 03:33:02 -06:00
# endif
2006-11-25 13:07:29 -07:00
}
else
{
ioc.ic_len = sizeof(struct ifreq);
ioc.ic_dp = arg;
}
ret = ioctl(fd, I_STR, (char *) &ioc);
if (ret >= 0 && cmd == SIOCGIFCONF)
2010-03-28 03:33:02 -06:00
# ifdef SVR4
2006-11-25 13:07:29 -07:00
((struct ifconf *) arg)->ifc_len = ioc.ic_len;
2010-03-28 03:33:02 -06:00
# endif
# ifdef ISC
2006-11-25 13:07:29 -07:00
{
((struct ifconf *) arg)->ifc_len =
((struct ifconf *)ioc.ic_dp)->ifc_len;
2010-03-28 03:33:02 -06:00
((struct ifconf *) arg)->ifc_buf =
2006-11-25 13:07:29 -07:00
(caddr_t)((struct ifconf *)ioc.ic_dp)->ifc_req;
}
2010-03-28 03:33:02 -06:00
# endif
2006-11-25 13:07:29 -07:00
return(ret);
}
2010-03-28 03:33:02 -06:00
# else /* SYSV_SIOCGIFCONF */
# define ifioctl ioctl
# endif /* SYSV_SIOCGIFCONF */
2006-11-25 13:07:29 -07:00
2010-03-28 03:33:02 -06:00
# if defined(STREAMSCONN) && !defined(SYSV_SIOCGIFCONF) && !defined(NCR)
2006-11-25 13:07:29 -07:00
2010-03-28 03:33:02 -06:00
# include <tiuser.h>
2006-11-25 13:07:29 -07:00
2010-03-28 03:33:02 -06:00
/* Define this host for access control. Find all the hosts the OS knows about
2006-11-25 13:07:29 -07:00
* for this fd and add them to the selfhosts list.
* TLI version, written without sufficient documentation.
*/
static void
DefineSelf (int fd, FILE *file, Xauth *auth)
{
struct netbuf netb;
char addrret[1024]; /* easier than t_alloc */
2010-03-28 03:33:02 -06:00
2006-11-25 13:07:29 -07:00
netb.maxlen = sizeof(addrret);
netb.buf = addrret;
if (t_getname (fd, &netb, LOCALNAME) == -1)
t_error ("t_getname");
/* what a kludge */
writeAddr (FamilyInternet, 4, netb.buf+4, file, auth);
}
2010-03-28 03:33:02 -06:00
# else
2006-11-25 13:07:29 -07:00
2010-03-28 03:33:02 -06:00
# ifdef WINTCP /* NCR with Wollongong TCP */
2006-11-25 13:07:29 -07:00
2010-03-28 03:33:02 -06:00
# include <sys/un.h>
# include <stropts.h>
# include <tiuser.h>
2006-11-25 13:07:29 -07:00
2010-03-28 03:33:02 -06:00
# include <sys/stream.h>
# include <net/if.h>
# include <netinet/ip.h>
# include <netinet/ip_var.h>
# include <netinet/in.h>
# include <netinet/in_var.h>
2006-11-25 13:07:29 -07:00
static void
DefineSelf (int fd, FILE *file, Xauth *auth)
{
/*
* The Wollongong drivers used by NCR SVR4/MP-RAS don't understand the
* socket IO calls that most other drivers seem to like. Because of
* this, this routine must be special cased for NCR. Eventually,
* this will be cleared up.
*/
struct ipb ifnet;
struct in_ifaddr ifaddr;
struct strioctl str;
unsigned char *addr;
int len, ipfd;
if ((ipfd = open ("/dev/ip", O_RDWR, 0 )) < 0)
2010-03-28 03:33:02 -06:00
LogError ("cannot get interface configuration; cannot open /dev/ip: "
"%s\n", _SysErrorMsg (errno));
2006-11-25 13:07:29 -07:00
/* Indicate that we want to start at the begining */
ifnet.ib_next = (struct ipb *) 1;
while (ifnet.ib_next)
{
str.ic_cmd = IPIOC_GETIPB;
str.ic_timout = 0;
str.ic_len = sizeof (struct ipb);
str.ic_dp = (char *) &ifnet;
if (ioctl (ipfd, (int) I_STR, (char *) &str) < 0)
{
2010-03-28 03:33:02 -06:00
LogError ("cannot get interface configuration; ioctl failed: %s\n",
_SysErrorMsg (errno));
2006-11-25 13:07:29 -07:00
close (ipfd);
}
ifaddr.ia_next = (struct in_ifaddr *) ifnet.if_addrlist;
str.ic_cmd = IPIOC_GETINADDR;
str.ic_timout = 0;
str.ic_len = sizeof (struct in_ifaddr);
str.ic_dp = (char *) &ifaddr;
if (ioctl (ipfd, (int) I_STR, (char *) &str) < 0)
{
2010-03-28 03:33:02 -06:00
LogError ("cannot get interface configuration; ioctl failed: %s\n",
_SysErrorMsg (errno));
2006-11-25 13:07:29 -07:00
close (ipfd);
}
/*
* Ignore the 127.0.0.1 entry.
*/
if (IA_SIN(&ifaddr)->sin_addr.s_addr == htonl(0x7f000001) )
continue;
writeAddr (FamilyInternet, 4, (char *)&(IA_SIN(&ifaddr)->sin_addr), file, auth);
2010-03-28 03:33:02 -06:00
2006-11-25 13:07:29 -07:00
}
close(ipfd);
}
2010-03-28 03:33:02 -06:00
# else /* WINTCP */
2006-11-25 13:07:29 -07:00
2010-03-28 03:33:02 -06:00
# if defined(SIOCGIFCONF) || defined (USE_SIOCGLIFCONF)
2006-11-25 13:07:29 -07:00
2010-03-28 03:33:02 -06:00
# ifdef USE_SIOCGLIFCONF
# define ifr_type struct lifreq
# else
# define ifr_type struct ifreq
# endif
2006-11-25 13:07:29 -07:00
/* Handle variable length ifreq in BNR2 and later */
2010-03-28 03:33:02 -06:00
# ifdef VARIABLE_IFREQ
# define ifr_size(p) (sizeof (struct ifreq) + \
2006-11-25 13:07:29 -07:00
(p->ifr_addr.sa_len > sizeof (p->ifr_addr) ? \
p->ifr_addr.sa_len - sizeof (p->ifr_addr) : 0))
2010-03-28 03:33:02 -06:00
# else
# define ifr_size(p) (sizeof (ifr_type))
# endif
2006-11-25 13:07:29 -07:00
2010-03-28 03:33:02 -06:00
/* Define this host for access control. Find all the hosts the OS knows about
2006-11-25 13:07:29 -07:00
* for this fd and add them to the selfhosts list.
*/
static void
DefineSelf (int fd, FILE *file, Xauth *auth)
{
char buf[2048], *cp, *cplim;
int len;
char *addr;
int family;
register ifr_type *ifr;
2010-03-28 03:33:02 -06:00
# ifdef USE_SIOCGLIFCONF
2006-11-25 13:07:29 -07:00
int n;
void * bufptr = buf;
size_t buflen = sizeof(buf);
struct lifconf ifc;
2010-03-28 03:33:02 -06:00
# ifdef SIOCGLIFNUM
2006-11-25 13:07:29 -07:00
struct lifnum ifn;
2010-03-28 03:33:02 -06:00
# endif
# else
2006-11-25 13:07:29 -07:00
struct ifconf ifc;
2010-03-28 03:33:02 -06:00
# endif
# if defined(SIOCGLIFNUM) && defined(SIOCGLIFCONF)
2006-11-25 13:07:29 -07:00
ifn.lifn_family = AF_UNSPEC;
ifn.lifn_flags = 0;
if (ioctl (fd, (int) SIOCGLIFNUM, (char *) &ifn) < 0)
LogError ("Failed getting interface count");
if (buflen < (ifn.lifn_count * sizeof(struct lifreq))) {
buflen = ifn.lifn_count * sizeof(struct lifreq);
bufptr = malloc(buflen);
}
2010-03-28 03:33:02 -06:00
# endif
2006-11-25 13:07:29 -07:00
2010-03-28 03:33:02 -06:00
# ifdef USE_SIOCGLIFCONF
2006-11-25 13:07:29 -07:00
ifc.lifc_family = AF_UNSPEC;
ifc.lifc_flags = 0;
ifc.lifc_len = buflen;
ifc.lifc_buf = bufptr;
2010-03-28 03:33:02 -06:00
# define IFC_IOCTL_REQ SIOCGLIFCONF
# define IFC_IFC_REQ ifc.lifc_req
# define IFC_IFC_LEN ifc.lifc_len
# define IFR_IFR_ADDR ifr->lifr_addr
# define IFR_IFR_NAME ifr->lifr_name
2006-11-25 13:07:29 -07:00
2010-03-28 03:33:02 -06:00
# else
2006-11-25 13:07:29 -07:00
ifc.ifc_len = sizeof (buf);
ifc.ifc_buf = buf;
2010-03-28 03:33:02 -06:00
# define IFC_IOCTL_REQ SIOCGIFCONF
# ifdef ISC
# define IFC_IFC_REQ (struct ifreq *) ifc.ifc_buf
# else
# define IFC_IFC_REQ ifc.ifc_req
# endif
# define IFC_IFC_LEN ifc.ifc_len
# define IFR_IFR_ADDR ifr->ifr_addr
# define IFR_IFR_NAME ifr->ifr_name
# endif
2006-11-25 13:07:29 -07:00
if (ifioctl (fd, IFC_IOCTL_REQ, (char *) &ifc) < 0) {
LogError ("Trouble getting network interface configuration");
2010-03-28 03:33:02 -06:00
# ifdef USE_SIOCGLIFCONF
2006-11-25 13:07:29 -07:00
if (bufptr != buf) {
free(bufptr);
}
2010-03-28 03:33:02 -06:00
# endif
2006-11-25 13:07:29 -07:00
return;
}
cplim = (char *) IFC_IFC_REQ + IFC_IFC_LEN;
for (cp = (char *) IFC_IFC_REQ; cp < cplim; cp += ifr_size (ifr))
{
ifr = (ifr_type *) cp;
2010-03-28 03:33:02 -06:00
# ifdef DNETCONN
2006-11-25 13:07:29 -07:00
/*
* this is ugly but SIOCGIFCONF returns decnet addresses in
* a different form from other decnet calls
*/
if (IFR_IFR_ADDR.sa_family == AF_DECnet) {
len = sizeof (struct dn_naddr);
addr = (char *)ifr->ifr_addr.sa_data;
family = FamilyDECnet;
} else
2010-03-28 03:33:02 -06:00
# endif
2006-11-25 13:07:29 -07:00
{
family = ConvertAddr ((XdmcpNetaddr) &IFR_IFR_ADDR, &len, &addr);
if (family < 0)
continue;
if (len == 0)
{
Debug ("Skipping zero length address\n");
continue;
}
/*
* don't write out 'localhost' entries, as
* they may conflict with other local entries.
* DefineLocal will always be called to add
* the local entry anyway, so this one can
* be tossed.
*/
if (family == FamilyInternet && len == 4 &&
addr[0] == 127 && addr[1] == 0 &&
addr[2] == 0 && addr[3] == 1)
{
Debug ("Skipping localhost address\n");
continue;
}
2010-03-28 03:33:02 -06:00
# if defined(IPv6) && defined(AF_INET6)
2006-11-25 13:07:29 -07:00
if(family == FamilyInternet6) {
if (IN6_IS_ADDR_LOOPBACK(((struct in6_addr *)addr))) {
Debug ("Skipping IPv6 localhost address\n");
continue;
}
/* Also skip XDM-AUTHORIZATION-1 */
2010-03-28 03:33:02 -06:00
if (auth->name_length == 19 &&
2006-11-25 13:07:29 -07:00
strcmp(auth->name, "XDM-AUTHORIZATION-1") == 0) {
Debug ("Skipping IPv6 XDM-AUTHORIZATION-1\n");
continue;
}
}
2010-03-28 03:33:02 -06:00
# endif
2006-11-25 13:07:29 -07:00
}
Debug ("DefineSelf: write network address, length %d\n", len);
writeAddr (family, len, addr, file, auth);
}
}
2010-03-28 03:33:02 -06:00
# else /* SIOCGIFCONF */
2006-11-25 13:07:29 -07:00
2010-03-28 03:33:02 -06:00
/* Define this host for access control. Find all the hosts the OS knows about
2006-11-25 13:07:29 -07:00
* for this fd and add them to the selfhosts list.
*/
static void
DefineSelf (int fd, int file, int auth)
{
register int n;
int len;
caddr_t addr;
int family;
struct utsname name;
register struct hostent *hp;
union {
struct sockaddr sa;
struct sockaddr_in in;
} saddr;
2010-03-28 03:33:02 -06:00
2006-11-25 13:07:29 -07:00
struct sockaddr_in *inetaddr;
/* hpux:
* Why not use gethostname()? Well, at least on my system, I've had to
* make an ugly kernel patch to get a name longer than 8 characters, and
* uname() lets me access to the whole string (it smashes release, you
* see), whereas gethostname() kindly truncates it for me.
*/
uname(&name);
hp = gethostbyname (name.nodename);
if (hp != NULL) {
saddr.sa.sa_family = hp->h_addrtype;
inetaddr = (struct sockaddr_in *) (&(saddr.sa));
memmove( (char *) &(inetaddr->sin_addr), (char *) hp->h_addr, (int) hp->h_length);
family = ConvertAddr ( &(saddr.sa), &len, &addr);
if ( family >= 0) {
writeAddr (FamilyInternet, sizeof (inetaddr->sin_addr),
(char *) (&inetaddr->sin_addr), file, auth);
}
}
}
2010-03-28 03:33:02 -06:00
# endif /* SIOCGIFCONF else */
# endif /* WINTCP else */
# endif /* STREAMSCONN && !SYSV_SIOCGIFCONF else */
2006-11-25 13:07:29 -07:00
#endif /* HAS_GETIFADDRS */
static void
setAuthNumber (Xauth *auth, char *name)
{
char *colon;
char *dot, *number;
Debug ("setAuthNumber %s\n", name);
colon = strrchr(name, ':');
if (colon) {
++colon;
dot = strchr(colon, '.');
if (dot)
auth->number_length = dot - colon;
else
auth->number_length = strlen (colon);
number = malloc (auth->number_length + 1);
if (number) {
strncpy (number, colon, auth->number_length);
number[auth->number_length] = '\0';
} else {
LogOutOfMem ("setAuthNumber");
auth->number_length = 0;
}
auth->number = number;
Debug ("setAuthNumber: %s\n", number);
}
}
static void
writeLocalAuth (FILE *file, Xauth *auth, char *name)
{
int fd;
Debug ("writeLocalAuth: %s %.*s\n", name, auth->name_length, auth->name);
setAuthNumber (auth, name);
#ifdef STREAMSCONN
fd = t_open ("/dev/tcp", O_RDWR, 0);
t_bind(fd, NULL, NULL);
DefineSelf (fd, file, auth);
t_unbind (fd);
t_close (fd);
#endif
#ifdef TCPCONN
2010-03-28 03:33:02 -06:00
# if defined(IPv6) && defined(AF_INET6)
2006-11-25 13:07:29 -07:00
fd = socket (AF_INET6, SOCK_STREAM, 0);
if (fd < 0)
2010-03-28 03:33:02 -06:00
# endif
2006-11-25 13:07:29 -07:00
fd = socket (AF_INET, SOCK_STREAM, 0);
DefineSelf (fd, file, auth);
close (fd);
#endif
#ifdef DNETCONN
fd = socket (AF_DECnet, SOCK_STREAM, 0);
DefineSelf (fd, file, auth);
close (fd);
#endif
DefineLocal (file, auth);
}
#ifdef XDMCP
static void
writeRemoteAuth (FILE *file, Xauth *auth, XdmcpNetaddr peer, int peerlen, char *name)
{
int family = FamilyLocal;
char *addr;
2010-03-28 03:33:02 -06:00
2006-11-25 13:07:29 -07:00
Debug ("writeRemoteAuth: %s %.*s\n", name, auth->name_length, auth->name);
if (!peer || peerlen < 2)
return;
setAuthNumber (auth, name);
family = ConvertAddr (peer, &peerlen, &addr);
Debug ("writeRemoteAuth: family %d\n", family);
if (family != FamilyLocal)
{
Debug ("writeRemoteAuth: %d, %d, %x\n",
family, peerlen, *(int *)addr);
writeAddr (family, peerlen, addr, file, auth);
}
else
{
writeLocalAuth (file, auth, name);
}
}
#endif /* XDMCP */
void
SetUserAuthorization (struct display *d, struct verify_info *verify)
{
FILE *old = NULL, *new;
char home_name[1024], backup_name[1024], new_name[1024];
2007-08-05 13:37:39 -06:00
char *name = NULL;
2006-11-25 13:07:29 -07:00
char *home;
2007-08-05 13:37:39 -06:00
char *envname = NULL;
2006-11-25 13:07:29 -07:00
int lockStatus;
Xauth *entry, **auths;
int setenv = 0;
struct stat statb;
int i;
int magicCookie;
int data_len;
#ifdef HAS_MKSTEMP
int fd;
#endif
Debug ("SetUserAuthorization\n");
auths = d->authorizations;
if (auths) {
home = getEnv (verify->userEnviron, "HOME");
lockStatus = LOCK_ERROR;
if (home) {
snprintf (home_name, sizeof(home_name), "%s/.Xauthority", home);
Debug ("XauLockAuth %s\n", home_name);
lockStatus = XauLockAuth (home_name, 1, 2, 10);
Debug ("Lock is %d\n", lockStatus);
if (lockStatus == LOCK_SUCCESS) {
if (openFiles (home_name, new_name, &old, &new)
&& (old != NULL) && (new != NULL)) {
name = home_name;
setenv = 0;
} else {
Debug ("openFiles failed\n");
XauUnlockAuth (home_name);
lockStatus = LOCK_ERROR;
if (old != NULL) {
(void) fclose (old);
old = NULL;
}
if (new != NULL)
(void) fclose (new);
2010-03-28 03:33:02 -06:00
}
2006-11-25 13:07:29 -07:00
}
}
if (lockStatus != LOCK_SUCCESS) {
snprintf (backup_name, sizeof(backup_name),
"%s/.XauthXXXXXX", d->userAuthDir);
#ifdef HAS_MKSTEMP
fd = mkstemp (backup_name);
if (fd >= 0) {
old = fdopen (fd, "r");
if (old == NULL)
(void) close(fd);
}
if (old != NULL)
#else
(void) mktemp (backup_name);
#endif
{
lockStatus = XauLockAuth (backup_name, 1, 2, 10);
Debug ("backup lock is %d\n", lockStatus);
if (lockStatus == LOCK_SUCCESS) {
if (openFiles (backup_name, new_name, &old, &new)
&& (old != NULL) && (new != NULL)) {
name = backup_name;
setenv = 1;
} else {
XauUnlockAuth (backup_name);
lockStatus = LOCK_ERROR;
if (old != NULL) {
(void) fclose (old);
old = NULL;
}
if (new != NULL)
(void) fclose (new);
}
#ifdef HAS_MKSTEMP
} else {
(void) fclose (old);
#endif
}
}
}
if (lockStatus != LOCK_SUCCESS) {
Debug ("can't lock auth file %s or backup %s\n",
home_name, backup_name);
LogError ("can't lock authorization file %s or backup %s\n",
home_name, backup_name);
return;
}
initAddrs ();
doWrite = 1;
Debug ("%d authorization protocols for %s\n", d->authNum, d->name);
/*
* Write MIT-MAGIC-COOKIE-1 authorization first, so that
* R4 clients which only knew that, and used the first
* matching entry will continue to function
*/
magicCookie = -1;
for (i = 0; i < d->authNum; i++)
{
if (auths[i]->name_length == 18 &&
!strncmp (auths[i]->name, "MIT-MAGIC-COOKIE-1", 18))
{
magicCookie = i;
if (d->displayType.location == Local)
writeLocalAuth (new, auths[i], d->name);
#ifdef XDMCP
else
writeRemoteAuth (new, auths[i], d->peer, d->peerlen, d->name);
#endif
break;
}
}
/* now write other authorizations */
for (i = 0; i < d->authNum; i++)
{
if (i != magicCookie)
{
data_len = auths[i]->data_length;
/* client will just use default Kerberos cache, so don't
* even write cache info into the authority file.
*/
if (auths[i]->name_length == 14 &&
!strncmp (auths[i]->name, "MIT-KERBEROS-5", 14))
auths[i]->data_length = 0;
if (d->displayType.location == Local)
writeLocalAuth (new, auths[i], d->name);
#ifdef XDMCP
else
writeRemoteAuth (new, auths[i], d->peer, d->peerlen, d->name);
#endif
auths[i]->data_length = data_len;
}
}
if (old) {
if (fstat (fileno (old), &statb) != -1)
chmod (new_name, (int) (statb.st_mode & 0777));
/*SUPPRESS 560*/
while ((entry = XauReadAuth (old))) {
if (!checkEntry (entry))
{
Debug ("Writing an entry\n");
writeAuth (new, entry);
}
XauDisposeAuth (entry);
}
fclose (old);
}
doneAddrs ();
fclose (new);
if (unlink (name) == -1)
2010-03-28 03:33:02 -06:00
if (errno != ENOENT)
LogError ("cannot remove old authorization file %s: %s\n",
name, _SysErrorMsg (errno));
2006-11-25 13:07:29 -07:00
envname = name;
if (link (new_name, name) == -1) {
2010-03-28 03:33:02 -06:00
LogError ("cannot link temporary authorization file %s to old "
"location %s: %s\n", new_name, name,
_SysErrorMsg (errno));
2006-11-25 13:07:29 -07:00
setenv = 1;
envname = new_name;
} else {
2010-03-28 03:33:02 -06:00
Debug ("authorization file %s successfully updated\n", name);
if (unlink (new_name))
if (errno != ENOENT)
LogError ("cannot remove new authorization file %s:"
" %s\n", new_name, _SysErrorMsg (errno));
2006-11-25 13:07:29 -07:00
}
if (setenv) {
verify->userEnviron = setEnv (verify->userEnviron,
"XAUTHORITY", envname);
verify->systemEnviron = setEnv (verify->systemEnviron,
"XAUTHORITY", envname);
}
XauUnlockAuth (name);
if (envname)
chown (envname, verify->uid, verify->gid);
}
Debug ("done SetUserAuthorization\n");
}
void
RemoveUserAuthorization (struct display *d, struct verify_info *verify)
{
char *home;
Xauth **auths, *entry;
char name[1024], new_name[1024];
int lockStatus;
FILE *old, *new;
struct stat statb;
int i;
if (!(auths = d->authorizations))
return;
home = getEnv (verify->userEnviron, "HOME");
if (!home)
return;
Debug ("RemoveUserAuthorization\n");
snprintf(name, sizeof(name), "%s/.Xauthority", home);
Debug ("XauLockAuth %s\n", name);
lockStatus = XauLockAuth (name, 1, 2, 10);
Debug ("Lock is %d\n", lockStatus);
if (lockStatus != LOCK_SUCCESS)
return;
old = NULL;
if (openFiles (name, new_name, &old, &new))
{
initAddrs ();
doWrite = 0;
for (i = 0; i < d->authNum; i++)
{
if (d->displayType.location == Local)
writeLocalAuth (new, auths[i], d->name);
#ifdef XDMCP
else
writeRemoteAuth (new, auths[i], d->peer, d->peerlen, d->name);
#endif
}
doWrite = 1;
if (old) {
if (fstat (fileno (old), &statb) != -1)
chmod (new_name, (int) (statb.st_mode & 0777));
/*SUPPRESS 560*/
while ((entry = XauReadAuth (old))) {
if (!checkEntry (entry))
{
Debug ("Writing an entry\n");
writeAuth (new, entry);
}
XauDisposeAuth (entry);
}
fclose (old);
}
doneAddrs ();
fclose (new);
if (unlink (name) == -1)
2010-03-28 03:33:02 -06:00
if (errno != ENOENT)
LogError ("cannot remove new authorization file %s: %s\n",
name, _SysErrorMsg (errno));
2006-11-25 13:07:29 -07:00
if (link (new_name, name) == -1) {
2010-03-28 03:33:02 -06:00
LogError ("cannot link temporary authorization file %s to old "
"location %s: %s\n", new_name, name,
_SysErrorMsg (errno));
2006-11-25 13:07:29 -07:00
} else {
2010-03-28 03:33:02 -06:00
Debug ("authorization file %s successfully updated\n", name);
if (unlink (new_name))
if (errno != ENOENT)
LogError ("cannot remove new authorization file %s:"
" %s\n", new_name, _SysErrorMsg (errno));
2006-11-25 13:07:29 -07:00
}
}
XauUnlockAuth (name);
}