X-Git-Url: http://www.chiark.greenend.org.uk/ucgi/~mdw/git/disorder/blobdiff_plain/05b75f8d50b83e943af3be4071449304d82dbdcd..063f0acf13de0c3faa57c0e39c2cf284576cf0fd:/lib/cookies.c diff --git a/lib/cookies.c b/lib/cookies.c index 40e3c3e..e32fc0c 100644 --- a/lib/cookies.c +++ b/lib/cookies.c @@ -2,20 +2,18 @@ * This file is part of DisOrder * Copyright (C) 2007, 2008 Richard Kettlewell * - * This program is free software; you can redistribute it and/or modify + * This program is free software: you can redistribute it and/or modify * it under the terms of the GNU General Public License as published by - * the Free Software Foundation; either version 2 of the License, or + * the Free Software Foundation, either version 3 of the License, or * (at your option) any later version. - * - * This program is distributed in the hope that it will be useful, but - * WITHOUT ANY WARRANTY; without even the implied warranty of - * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU - * General Public License for more details. - * + * + * This program is distributed in the hope that it will be useful, + * but WITHOUT ANY WARRANTY; without even the implied warranty of + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + * GNU General Public License for more details. + * * You should have received a copy of the GNU General Public License - * along with this program; if not, write to the Free Software - * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 - * USA + * along with this program. If not, see . */ /** @file lib/cookies.c * @brief Cookie support @@ -37,6 +35,7 @@ #include "configuration.h" #include "kvp.h" #include "trackdb.h" +#include "syscalls.h" /** @brief Hash function used in signing HMAC */ #define ALGO GCRY_MD_SHA1 @@ -68,7 +67,7 @@ static int revoked_cleanup_callback(const char *key, void *value, static void newkey(void) { time_t now; - time(&now); + xtime(&now); memcpy(old_signing_key, signing_key, HASHSIZE); gcry_randomize(signing_key, HASHSIZE, GCRY_STRONG_RANDOM); signing_key_validity_limit = now + config->cookie_key_lifetime; @@ -136,7 +135,7 @@ char *make_cookie(const char *user) { return 0; } /* make sure we have a valid signing key */ - time(&now); + xtime(&now); if(now >= signing_key_validity_limit) newkey(); /* construct the subject */ @@ -189,7 +188,7 @@ char *verify_cookie(const char *cookie, rights_type *rights) { /* Extract the username */ user = xstrndup(c1 + 1, c2 - (c1 + 1)); /* check expiry */ - time(&now); + xtime(&now); if(now >= t) { error(0, "cookie has expired"); return 0;