- // Width = 0, don't print
- if( Width > 0 )
- {
- // 4 preceding, 5 price
- int nameWidth = Width - 4 - 5;
- move( Row, Col );
-
- if( Index >= 0 )
- {
- // Show hilight and status
- switch( status )
- {
- case 0:
- if( bHilighted )
- printw("-> ");
- else
- printw(" ");
- break;
- case 1:
- printw("SLD ");
- break;
-
- default:
- case -1:
- printw("ERR ");
- break;
- }
-
- printw("%-*.*s", nameWidth, nameWidth, name);
-
-// getyx(stdscr, _y, _x);
- // Assumes max 4 digit prices
-// times = Width - 5 - (_x - Col); // TODO: Better handling for large prices
-// while(times--) addch(' ');
-
- printw(" %4i", price);
- }
- else
- {
- printw("-- %s", name);
- getyx(stdscr, _y, _x);
- times = Width - 4 - (_x - Col);
- while(times--) addch(' ');
- printw(" ");
- }
- }
-
- // If the item isn't availiable for sale, return -1 (so it's skipped)
- if( status )
- Index = -1;
-
- return Index;
-}
-
-/**
- * \brief Print a three-part string at the specified position (formatted)
- * \note NCurses UI Helper
- *
- * Prints \a Left on the left of the area, \a Right on the righthand side
- * and \a Mid in the middle of the area. These are padded with \a Pad1
- * between \a Left and \a Mid, and \a Pad2 between \a Mid and \a Right.
- *
- * ::printf style format codes are allowed in \a Left, \a Mid and \a Right,
- * and the arguments to these are read in that order.
- */
-void PrintAlign(int Row, int Col, int Width, const char *Left, char Pad1,
- const char *Mid, char Pad2, const char *Right, ...)
-{
- int lLen, mLen, rLen;
- int times;
-
- va_list args;
-
- // Get the length of the strings
- va_start(args, Right);
- lLen = vsnprintf(NULL, 0, Left, args);
- mLen = vsnprintf(NULL, 0, Mid, args);
- rLen = vsnprintf(NULL, 0, Right, args);
- va_end(args);
-
- // Sanity check
- if( lLen + mLen/2 > Width/2 || mLen/2 + rLen > Width/2 ) {
- return ; // TODO: What to do?
- }
-
- move(Row, Col);
-
- // Render strings
- va_start(args, Right);
- // - Left
- {
- char tmp[lLen+1];
- vsnprintf(tmp, lLen+1, Left, args);
- addstr(tmp);
- }
- // - Left padding
- times = (Width - mLen)/2 - lLen;
- while(times--) addch(Pad1);
- // - Middle
- {
- char tmp[mLen+1];
- vsnprintf(tmp, mLen+1, Mid, args);
- addstr(tmp);
- }
- // - Right Padding
- times = (Width - mLen)/2 - rLen;
- if( (Width - mLen) % 2 ) times ++;
- while(times--) addch(Pad2);
- // - Right
- {
- char tmp[rLen+1];
- vsnprintf(tmp, rLen+1, Right, args);
- addstr(tmp);
- }
-}
-
-// ---------------------
-// --- Coke Protocol ---
-// ---------------------
-int OpenConnection(const char *Host, int Port)
-{
- struct hostent *host;
- struct sockaddr_in serverAddr;
- int sock;
-
- host = gethostbyname(Host);
- if( !host ) {
- fprintf(stderr, "Unable to look up '%s'\n", Host);
- return -1;
- }
-
- memset(&serverAddr, 0, sizeof(serverAddr));
-
- serverAddr.sin_family = AF_INET; // IPv4
- // NOTE: I have a suspicion that IPv6 will play sillybuggers with this :)
- serverAddr.sin_addr.s_addr = *((unsigned long *) host->h_addr_list[0]);
- serverAddr.sin_port = htons(Port);
-
- sock = socket(PF_INET, SOCK_STREAM, IPPROTO_TCP);
- if( sock < 0 ) {
- fprintf(stderr, "Failed to create socket\n");
- return -1;
- }
-
-// printf("geteuid() = %i, getuid() = %i\n", geteuid(), getuid());
-
- if( geteuid() == 0 || getuid() == 0 )
- {
- int i;
- struct sockaddr_in localAddr;
- memset(&localAddr, 0, sizeof(localAddr));
- localAddr.sin_family = AF_INET; // IPv4
-
- // Loop through all the top ports until one is avaliable
- for( i = 512; i < 1024; i ++)
- {
- localAddr.sin_port = htons(i); // IPv4
- // Attempt to bind to low port for autoauth
- if( bind(sock, (struct sockaddr*)&localAddr, sizeof(localAddr)) == 0 )
- break;
- }
- if( i == 1024 )
- printf("Warning: AUTOAUTH unavaliable\n");
-// else
-// printf("Bound to 0.0.0.0:%i\n", i);
- }
-
- if( connect(sock, (struct sockaddr *) &serverAddr, sizeof(serverAddr)) < 0 ) {
- fprintf(stderr, "Failed to connect to server\n");
- return -1;
- }
-
- return sock;
-}
-
-/**
- * \brief Authenticate with the server
- * \return Boolean Failure
- */
-int Authenticate(int Socket)
-{
- struct passwd *pwd;
- char *buf;
- int responseCode;
- char salt[32];
- int i;
- regmatch_t matches[4];
-
- if( gbIsAuthenticated ) return 0;
-
- // Get user name
- pwd = getpwuid( getuid() );
-
- // Attempt automatic authentication
- sendf(Socket, "AUTOAUTH %s\n", pwd->pw_name);
-
- // Check if it worked
- buf = ReadLine(Socket);
-
- responseCode = atoi(buf);
- switch( responseCode )
- {
- case 200: // Autoauth succeeded, return
- free(buf);
- break;
-
- case 401: // Untrusted, attempt password authentication
- free(buf);
-
- sendf(Socket, "USER %s\n", pwd->pw_name);
- printf("Using username %s\n", pwd->pw_name);
-
- buf = ReadLine(Socket);
-
- // TODO: Get Salt
- // Expected format: 100 SALT <something> ...
- // OR : 100 User Set
- RunRegex(&gSaltRegex, buf, 4, matches, "Malformed server response");
- responseCode = atoi(buf);
- if( responseCode != 100 ) {
- fprintf(stderr, "Unknown repsonse code %i from server\n%s\n", responseCode, buf);
- free(buf);
- return -1; // ERROR
- }
-
- // Check for salt
- if( memcmp( buf+matches[2].rm_so, "SALT", matches[2].rm_eo - matches[2].rm_so) == 0) {
- // Store it for later
- memcpy( salt, buf + matches[3].rm_so, matches[3].rm_eo - matches[3].rm_so );
- salt[ matches[3].rm_eo - matches[3].rm_so ] = 0;
- }
- free(buf);
-
- // Give three attempts
- for( i = 0; i < 3; i ++ )
- {
- int ofs = strlen(pwd->pw_name)+strlen(salt);
- char tmpBuf[42];
- char tmp[ofs+20];
- char *pass = getpass("Password: ");
- uint8_t h[20];
-
- // Create hash string
- // <username><salt><hash>
- strcpy(tmp, pwd->pw_name);
- strcat(tmp, salt);
- SHA1( (unsigned char*)pass, strlen(pass), h );
- memcpy(tmp+ofs, h, 20);
-
- // Hash all that
- SHA1( (unsigned char*)tmp, ofs+20, h );
- sprintf(tmpBuf, "%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x",
- h[ 0], h[ 1], h[ 2], h[ 3], h[ 4], h[ 5], h[ 6], h[ 7], h[ 8], h[ 9],
- h[10], h[11], h[12], h[13], h[14], h[15], h[16], h[17], h[18], h[19]
- );
-
- // Send password
- sendf(Socket, "PASS %s\n", tmpBuf);
- buf = ReadLine(Socket);
-
- responseCode = atoi(buf);
- // Auth OK?
- if( responseCode == 200 ) break;
- // Bad username/password
- if( responseCode == 401 ) continue;
-
- fprintf(stderr, "Unknown repsonse code %i from server\n%s\n", responseCode, buf);
- free(buf);
- return -1;
- }
- free(buf);
- if( i == 3 )
- return 2; // 2 = Bad Password
- break;
-
- case 404: // Bad Username
- fprintf(stderr, "Bad Username '%s'\n", pwd->pw_name);
- free(buf);
- return 1;
-
- default:
- fprintf(stderr, "Unkown response code %i from server\n", responseCode);
- printf("%s\n", buf);
- free(buf);
- return -1;
- }
-
- // Set effective user
- if( gsEffectiveUser ) {
- sendf(Socket, "SETEUSER %s\n", gsEffectiveUser);
-
- buf = ReadLine(Socket);
- responseCode = atoi(buf);
-
- switch(responseCode)
- {
- case 200:
- printf("Running as '%s' by '%s'\n", gsEffectiveUser, pwd->pw_name);
- break;
-
- case 403:
- printf("Only coke members can use `dispense -u`\n");
- free(buf);
- return -1;
-
- case 404:
- printf("Invalid user selected\n");
- free(buf);
- return -1;
-
- default:
- fprintf(stderr, "Unkown response code %i from server\n", responseCode);
- printf("%s\n", buf);
- free(buf);
- exit(-1);
- }
-
- free(buf);
- }
-
- gbIsAuthenticated = 1;
-
- return 0;
-}
-
-int GetUserBalance(int Socket)
-{
- regmatch_t matches[6];
- struct passwd *pwd;
- char *buf;
- int responseCode;
-
- if( !gsUserName )
- {
- if( gsEffectiveUser ) {
- gsUserName = gsEffectiveUser;
- }
- else {
- pwd = getpwuid( getuid() );
- gsUserName = strdup(pwd->pw_name);
- }
- }
-
- sendf(Socket, "USER_INFO %s\n", gsUserName);
- buf = ReadLine(Socket);
- responseCode = atoi(buf);
- switch(responseCode)
- {
- case 202: break; // Ok
-
- case 404:
- printf("Invalid user? (USER_INFO failed)\n");
- free(buf);
- return -1;
-
- default:
- fprintf(stderr, "Unkown response code %i from server\n", responseCode);
- printf("%s\n", buf);
- free(buf);
- exit(-1);
- }
-
- RunRegex(&gUserInfoRegex, buf, 6, matches, "Malformed server response");
-
- giUserBalance = atoi( buf + matches[4].rm_so );
- gsUserFlags = strdup( buf + matches[5].rm_so );
-
- free(buf);
-
- return 0;
-}
-
-/**
- * \brief Read an item info response from the server
- * \param Dest Destination for the read item (strings will be on the heap)
- */
-int ReadItemInfo(int Socket, tItem *Dest)
-{
- char *buf;
- int responseCode;
-
- regmatch_t matches[8];
- char *statusStr;
-
- // Get item info
- buf = ReadLine(Socket);
- responseCode = atoi(buf);
-
- switch(responseCode)
- {
- case 202: break;
-
- case 406:
- printf("Bad item name\n");
- free(buf);
- return 1;
-
- default:
- fprintf(stderr, "Unknown response from dispense server (Response Code %i)\n%s", responseCode, buf);
- exit(-1);
- }
-
- RunRegex(&gItemRegex, buf, 8, matches, "Malformed server response");
-
- buf[ matches[3].rm_eo ] = '\0';
- buf[ matches[5].rm_eo ] = '\0';
- buf[ matches[7].rm_eo ] = '\0';
-
- statusStr = &buf[ matches[5].rm_so ];
-
- Dest->ID = atoi( buf + matches[4].rm_so );
-
- if( strcmp(statusStr, "avail") == 0 )
- Dest->Status = 0;
- else if( strcmp(statusStr, "sold") == 0 )
- Dest->Status = 1;
- else if( strcmp(statusStr, "error") == 0 )
- Dest->Status = -1;
- else {
- fprintf(stderr, "Unknown response from dispense server (status '%s')\n",
- statusStr);
- return 1;
- }
- Dest->Price = atoi( buf + matches[6].rm_so );
-
- // Hack a little to reduce heap fragmentation
- {
- char tmpType[strlen(buf + matches[3].rm_so) + 1];
- char tmpDesc[strlen(buf + matches[7].rm_so) + 1];
- strcpy(tmpType, buf + matches[3].rm_so);
- strcpy(tmpDesc, buf + matches[7].rm_so);
- free(buf);
- Dest->Type = strdup( tmpType );
- Dest->Desc = strdup( tmpDesc );
- }
-
- return 0;
-}
-
-/**
- * \brief Fill the item information structure
- * \return Boolean Failure
- */
-void PopulateItemList(int Socket)
-{
- char *buf;
- int responseCode;
-
- char *itemType, *itemStart;
- int count, i;
- regmatch_t matches[4];
-
- // Ask server for stock list
- send(Socket, "ENUM_ITEMS\n", 11, 0);
- buf = ReadLine(Socket);
-
- //printf("Output: %s\n", buf);