1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
|
#include <u.h>
#include <libc.h>
#include <bio.h>
#include <authsrv.h>
#include "authcmdlib.h"
void
main(int argc, char **argv)
{
int fd, n, dp9ik;
Ticketreq tr;
Ticket t;
Passwordreq pr;
Authkey key;
char buf[512];
char *s, *user;
dp9ik = 1;
ARGBEGIN{
case '1':
dp9ik = 0;
break;
default:
fprint(2, "%s [-1]\n", argv0);
exits("usage");
}ARGEND
argv0 = "passwd";
user = getuser();
private();
s = nil;
if(argc > 0){
user = argv[0];
s = strchr(user, '@');
if(s != nil)
*s++ = 0;
if(*user == 0)
user = getuser();
}
fd = authdial(nil, s);
if(fd < 0)
error("authdial: %r");
memset(&tr, 0, sizeof(tr));
strncpy(tr.uid, user, sizeof(tr.uid)-1);
tr.type = AuthPass;
/*
* get a password from the user and try to decrypt the
* ticket. If it doesn't work we've got a bad password,
* give up.
*/
memset(&pr, 0, sizeof(pr));
getpass(&key, pr.old, 0, 0);
if(dp9ik){
authpak_hash(&key, tr.uid);
if(_asgetpakkey(fd, &tr, &key) < 0)
error("%r");
}
if(_asrequest(fd, &tr) < 0)
error("%r");
if(_asgetresp(fd, &t, nil, &key) < 0)
error("%r");
if(t.num != AuthTp || strcmp(t.cuid, tr.uid) != 0)
error("bad password");
/* loop trying new passwords */
for(;;){
memset(pr.new, 0, sizeof(pr.new));
if(answer("change Plan 9 Password?"))
getpass(nil, pr.new, 0, 1);
pr.changesecret = answer("change Inferno/POP secret?");
if(pr.changesecret){
if(answer("make it the same as your plan 9 password?")){
if(*pr.new)
strcpy(pr.secret, pr.new);
else
strcpy(pr.secret, pr.old);
} else {
getpass(nil, pr.secret, 0, 1);
}
}
pr.num = AuthPass;
n = convPR2M(&pr, buf, sizeof(buf), &t);
if(write(fd, buf, n) != n)
error("AS protocol botch: %r");
if(_asrdresp(fd, buf, 0) == 0)
break;
fprint(2, "passwd: refused: %r\n");
}
close(fd);
exits(0);
}
|