diff options
| author | FRIGN <dev@frign.de> | 2016-09-11 23:10:57 +0200 |
|---|---|---|
| committer | Markus Teich <markus.teich@stusta.mhn.de> | 2016-09-23 18:51:40 +0200 |
| commit | 9a617db716641da8489e2062e04098220954bffe (patch) | |
| tree | 5560787afa51a04bb2592a2ba90e2b3fbd7db232 | |
| parent | b00f444a4ea0d9ffa5cd7dcda71c97cdf05d322e (diff) | |
Rename getpw() and pws to gethash() and hash
| -rw-r--r-- | slock.c | 32 |
1 files changed, 16 insertions, 16 deletions
| @@ -85,9 +85,9 @@ dontkillme(void) | |||
| 85 | #endif | 85 | #endif |
| 86 | 86 | ||
| 87 | static const char * | 87 | static const char * |
| 88 | getpw(void) | 88 | gethash(void) |
| 89 | { | 89 | { |
| 90 | const char *rval; | 90 | const char *hash; |
| 91 | struct passwd *pw; | 91 | struct passwd *pw; |
| 92 | 92 | ||
| 93 | /* Check if the current user has a password entry */ | 93 | /* Check if the current user has a password entry */ |
| @@ -98,35 +98,35 @@ getpw(void) | |||
| 98 | else | 98 | else |
| 99 | die("slock: cannot retrieve password entry\n"); | 99 | die("slock: cannot retrieve password entry\n"); |
| 100 | } | 100 | } |
| 101 | rval = pw->pw_passwd; | 101 | hash = pw->pw_passwd; |
| 102 | 102 | ||
| 103 | #if HAVE_SHADOW_H | 103 | #if HAVE_SHADOW_H |
| 104 | if (rval[0] == 'x' && rval[1] == '\0') { | 104 | if (hash[0] == 'x' && hash[1] == '\0') { |
| 105 | struct spwd *sp; | 105 | struct spwd *sp; |
| 106 | if (!(sp = getspnam(getenv("USER")))) | 106 | if (!(sp = getspnam(getenv("USER")))) |
| 107 | die("slock: getspnam: cannot retrieve shadow entry (make sure to suid or sgid slock)\n"); | 107 | die("slock: getspnam: cannot retrieve shadow entry (make sure to suid or sgid slock)\n"); |
| 108 | rval = sp->sp_pwdp; | 108 | hash = sp->sp_pwdp; |
| 109 | } | 109 | } |
| 110 | #else | 110 | #else |
| 111 | if (rval[0] == '*' && rval[1] == '\0') { | 111 | if (hash[0] == '*' && hash[1] == '\0') { |
| 112 | #ifdef __OpenBSD__ | 112 | #ifdef __OpenBSD__ |
| 113 | if (!(pw = getpwnam_shadow(getenv("USER")))) | 113 | if (!(pw = getpwnam_shadow(getenv("USER")))) |
| 114 | die("slock: getpwnam_shadow: cannot retrieve shadow entry (make sure to suid or sgid slock)\n"); | 114 | die("slock: getpwnam_shadow: cannot retrieve shadow entry (make sure to suid or sgid slock)\n"); |
| 115 | rval = pw->pw_passwd; | 115 | hash = pw->pw_passwd; |
| 116 | #else | 116 | #else |
| 117 | die("slock: getpwuid: cannot retrieve shadow entry (make sure to suid or sgid slock)\n"); | 117 | die("slock: getpwuid: cannot retrieve shadow entry (make sure to suid or sgid slock)\n"); |
| 118 | #endif /* __OpenBSD__ */ | 118 | #endif /* __OpenBSD__ */ |
| 119 | } | 119 | } |
| 120 | #endif /* HAVE_SHADOW_H */ | 120 | #endif /* HAVE_SHADOW_H */ |
| 121 | 121 | ||
| 122 | return rval; | 122 | return hash; |
| 123 | } | 123 | } |
| 124 | 124 | ||
| 125 | static void | 125 | static void |
| 126 | readpw(Display *dpy, struct xrandr *rr, struct lock **locks, int nscreens, | 126 | readpw(Display *dpy, struct xrandr *rr, struct lock **locks, int nscreens, |
| 127 | const char *pws) | 127 | const char *hash) |
| 128 | { | 128 | { |
| 129 | char buf[32], passwd[256], *encrypted; | 129 | char buf[32], passwd[256], *inputhash; |
| 130 | int num, screen, running, failure; | 130 | int num, screen, running, failure; |
| 131 | unsigned int len, color; | 131 | unsigned int len, color; |
| 132 | KeySym ksym; | 132 | KeySym ksym; |
| @@ -161,10 +161,10 @@ readpw(Display *dpy, struct xrandr *rr, struct lock **locks, int nscreens, | |||
| 161 | case XK_Return: | 161 | case XK_Return: |
| 162 | passwd[len] = 0; | 162 | passwd[len] = 0; |
| 163 | errno = 0; | 163 | errno = 0; |
| 164 | if (!(encrypted = crypt(passwd, pws))) | 164 | if (!(inputhash = crypt(passwd, hash))) |
| 165 | fprintf(stderr, "slock: crypt: %s\n", strerror(errno)); | 165 | fprintf(stderr, "slock: crypt: %s\n", strerror(errno)); |
| 166 | else | 166 | else |
| 167 | running = !!strcmp(encrypted, pws); | 167 | running = !!strcmp(inputhash, hash); |
| 168 | if (running) { | 168 | if (running) { |
| 169 | XBell(dpy, 100); | 169 | XBell(dpy, 100); |
| 170 | failure = True; | 170 | failure = True; |
| @@ -292,7 +292,7 @@ main(int argc, char **argv) { | |||
| 292 | struct group *grp; | 292 | struct group *grp; |
| 293 | uid_t duid; | 293 | uid_t duid; |
| 294 | gid_t dgid; | 294 | gid_t dgid; |
| 295 | const char *pws; | 295 | const char *hash; |
| 296 | Display *dpy; | 296 | Display *dpy; |
| 297 | int s, nlocks, nscreens; | 297 | int s, nlocks, nscreens; |
| 298 | 298 | ||
| @@ -320,8 +320,8 @@ main(int argc, char **argv) { | |||
| 320 | dontkillme(); | 320 | dontkillme(); |
| 321 | #endif | 321 | #endif |
| 322 | 322 | ||
| 323 | pws = getpw(); | 323 | hash = gethash(); |
| 324 | if (strlen(pws) < 2) | 324 | if (strlen(hash) < 2) |
| 325 | die("slock: failed to get user password hash.\n"); | 325 | die("slock: failed to get user password hash.\n"); |
| 326 | 326 | ||
| 327 | if (!(dpy = XOpenDisplay(NULL))) | 327 | if (!(dpy = XOpenDisplay(NULL))) |
| @@ -370,7 +370,7 @@ main(int argc, char **argv) { | |||
| 370 | } | 370 | } |
| 371 | 371 | ||
| 372 | /* everything is now blank. Wait for the correct password */ | 372 | /* everything is now blank. Wait for the correct password */ |
| 373 | readpw(dpy, &rr, locks, nscreens, pws); | 373 | readpw(dpy, &rr, locks, nscreens, hash); |
| 374 | 374 | ||
| 375 | return 0; | 375 | return 0; |
| 376 | } | 376 | } |
