AuthInfo *ai;
Chalstate *cs;
char *s, *t;
- int n;
if((cs = auth_challenge("proto=cram role=server")) == nil)
return "couldn't get cram challenge";
- n = cs->nchal;
- s = binalloc(&parseBin, n * 2, 0);
- n = enc64(s, n * 2, (uchar*)cs->chal, n);
- Bprint(&bout, "+ ");
- Bwrite(&bout, s, n);
- Bprint(&bout, "\r\n");
+ Bprint(&bout, "+ %.*[\r\n", cs->nchal, cs->chal);
if(Bflush(&bout) < 0)
writeErr();
Chalstate *cs;
uchar digest[MD5dlen];
char response[2*MD5dlen+1];
- int i;
if((cs = auth_challenge("proto=cram role=server")) == nil)
return nil;
hmac_md5((uchar*)cs->chal, strlen(cs->chal),
(uchar*)secret, strlen(secret), digest,
nil);
- for(i = 0; i < MD5dlen; i++)
- snprint(response + 2*i, sizeof(response) - 2*i, "%2.2ux", digest[i]);
+ snprint(response, sizeof(response), "%.*H", MD5dlen, digest);
cs->user = user;
cs->resp = response;
{
int m, mm, nn;
- nn = 0;
- for(; n > 0; n -= m){
+ for(nn = 0; n > 0; n -= m, nn += mm){
m = 18 * 3;
if(m > n)
m = n;
+ nn += 2; /* \r\n */
+ assert(nn < lim);
mm = enc64(out, lim - nn, in, m);
+ assert(mm > 0);
in += m;
out += mm;
*out++ = '\r';
*out++ = '\n';
- nn += mm + 2;
}
return nn;
}
int m, n;
for(;;){
- n = read(in, buf, sizeof(buf));
+ n = readn(in, buf, sizeof(buf));
if(n < 0)
return;
if(n == 0)