Fossil SCM
Remove some debug output.
Commit
d1b7be2ff8822c9dd731f8c31a31a156c82f4e005d48241f581fee708d8f5735
Parent
815a84cbcc6872c…
1 file changed
+4
-8
+4
-8
| --- src/xfer.c | ||
| +++ src/xfer.c | ||
| @@ -866,13 +866,13 @@ | ||
| 866 | 866 | const char *zPw = db_column_text(&q, 0); |
| 867 | 867 | char *zSecret = sha1_shared_secret(zPw, blob_str(pLogin), 0); |
| 868 | 868 | blob_zero(&combined); |
| 869 | 869 | blob_copy(&combined, pNonce); |
| 870 | 870 | blob_append(&combined, zSecret, -1); |
| 871 | + fossil_free(zSecret); | |
| 871 | 872 | sha1sum_blob(&combined, &hash); |
| 872 | 873 | rc = blob_constant_time_cmp(&hash, pSig); |
| 873 | - fossil_free(zSecret); | |
| 874 | 874 | blob_reset(&hash); |
| 875 | 875 | blob_reset(&combined); |
| 876 | 876 | } |
| 877 | 877 | if( rc==0 ){ |
| 878 | 878 | const char *zCap; |
| @@ -881,11 +881,10 @@ | ||
| 881 | 881 | g.userUid = db_column_int(&q, 2); |
| 882 | 882 | g.zLogin = mprintf("%b", pLogin); |
| 883 | 883 | g.zNonce = mprintf("%b", pNonce); |
| 884 | 884 | } |
| 885 | 885 | } |
| 886 | - /* @ message login\src=%d(rc)\sas\s%F(g.zLogin) */ | |
| 887 | 886 | db_finalize(&q); |
| 888 | 887 | return rc; |
| 889 | 888 | } |
| 890 | 889 | |
| 891 | 890 | /* |
| @@ -1318,13 +1317,13 @@ | ||
| 1318 | 1317 | if( zScript ){ /* NOTE: Are TH1 transfer hooks enabled? */ |
| 1319 | 1318 | pzUuidList = &zUuidList; |
| 1320 | 1319 | pnUuidList = &nUuidList; |
| 1321 | 1320 | } |
| 1322 | 1321 | if( g.syncInfo.zLoginCard ){ |
| 1323 | - /* Login card received via HTTP header X-Fossil-Xfer-Login */ | |
| 1324 | - assert( g.syncInfo.bLoginCardHeader && "Set via HTTP header parser" ); | |
| 1325 | - @ message got\slogin\scard\sheader:\s%F(g.syncInfo.zLoginCard) | |
| 1322 | + /* Login card received via HTTP header X-Fossil-Xfer-Login or | |
| 1323 | + ** x-f-x-l GET parameter. */ | |
| 1324 | + assert( g.syncInfo.bLoginCardHeader && "Set via HTTP header/GET arg" ); | |
| 1326 | 1325 | blob_zero(&xfer.line); |
| 1327 | 1326 | blob_append(&xfer.line, g.syncInfo.zLoginCard, -1); |
| 1328 | 1327 | xfer.nToken = blob_tokenize(&xfer.line, xfer.aToken, |
| 1329 | 1328 | count(xfer.aToken)); |
| 1330 | 1329 | fossil_free( g.syncInfo.zLoginCard ); |
| @@ -1577,13 +1576,10 @@ | ||
| 1577 | 1576 | */ |
| 1578 | 1577 | if( blob_eq(&xfer.aToken[0], "login") |
| 1579 | 1578 | && xfer.nToken==4 |
| 1580 | 1579 | ){ |
| 1581 | 1580 | handle_login_card: |
| 1582 | - if( 0 && g.perm.Debug ){ | |
| 1583 | - @message login\scard:\s%F(blob_str(&xfer.line)) | |
| 1584 | - } | |
| 1585 | 1581 | nLogin++; |
| 1586 | 1582 | if( disableLogin ){ |
| 1587 | 1583 | g.perm.Read = g.perm.Write = g.perm.Private = g.perm.Admin = 1; |
| 1588 | 1584 | }else if( nLogin > 1 ){ |
| 1589 | 1585 | cgi_reset_content(); |
| 1590 | 1586 |
| --- src/xfer.c | |
| +++ src/xfer.c | |
| @@ -866,13 +866,13 @@ | |
| 866 | const char *zPw = db_column_text(&q, 0); |
| 867 | char *zSecret = sha1_shared_secret(zPw, blob_str(pLogin), 0); |
| 868 | blob_zero(&combined); |
| 869 | blob_copy(&combined, pNonce); |
| 870 | blob_append(&combined, zSecret, -1); |
| 871 | sha1sum_blob(&combined, &hash); |
| 872 | rc = blob_constant_time_cmp(&hash, pSig); |
| 873 | fossil_free(zSecret); |
| 874 | blob_reset(&hash); |
| 875 | blob_reset(&combined); |
| 876 | } |
| 877 | if( rc==0 ){ |
| 878 | const char *zCap; |
| @@ -881,11 +881,10 @@ | |
| 881 | g.userUid = db_column_int(&q, 2); |
| 882 | g.zLogin = mprintf("%b", pLogin); |
| 883 | g.zNonce = mprintf("%b", pNonce); |
| 884 | } |
| 885 | } |
| 886 | /* @ message login\src=%d(rc)\sas\s%F(g.zLogin) */ |
| 887 | db_finalize(&q); |
| 888 | return rc; |
| 889 | } |
| 890 | |
| 891 | /* |
| @@ -1318,13 +1317,13 @@ | |
| 1318 | if( zScript ){ /* NOTE: Are TH1 transfer hooks enabled? */ |
| 1319 | pzUuidList = &zUuidList; |
| 1320 | pnUuidList = &nUuidList; |
| 1321 | } |
| 1322 | if( g.syncInfo.zLoginCard ){ |
| 1323 | /* Login card received via HTTP header X-Fossil-Xfer-Login */ |
| 1324 | assert( g.syncInfo.bLoginCardHeader && "Set via HTTP header parser" ); |
| 1325 | @ message got\slogin\scard\sheader:\s%F(g.syncInfo.zLoginCard) |
| 1326 | blob_zero(&xfer.line); |
| 1327 | blob_append(&xfer.line, g.syncInfo.zLoginCard, -1); |
| 1328 | xfer.nToken = blob_tokenize(&xfer.line, xfer.aToken, |
| 1329 | count(xfer.aToken)); |
| 1330 | fossil_free( g.syncInfo.zLoginCard ); |
| @@ -1577,13 +1576,10 @@ | |
| 1577 | */ |
| 1578 | if( blob_eq(&xfer.aToken[0], "login") |
| 1579 | && xfer.nToken==4 |
| 1580 | ){ |
| 1581 | handle_login_card: |
| 1582 | if( 0 && g.perm.Debug ){ |
| 1583 | @message login\scard:\s%F(blob_str(&xfer.line)) |
| 1584 | } |
| 1585 | nLogin++; |
| 1586 | if( disableLogin ){ |
| 1587 | g.perm.Read = g.perm.Write = g.perm.Private = g.perm.Admin = 1; |
| 1588 | }else if( nLogin > 1 ){ |
| 1589 | cgi_reset_content(); |
| 1590 |
| --- src/xfer.c | |
| +++ src/xfer.c | |
| @@ -866,13 +866,13 @@ | |
| 866 | const char *zPw = db_column_text(&q, 0); |
| 867 | char *zSecret = sha1_shared_secret(zPw, blob_str(pLogin), 0); |
| 868 | blob_zero(&combined); |
| 869 | blob_copy(&combined, pNonce); |
| 870 | blob_append(&combined, zSecret, -1); |
| 871 | fossil_free(zSecret); |
| 872 | sha1sum_blob(&combined, &hash); |
| 873 | rc = blob_constant_time_cmp(&hash, pSig); |
| 874 | blob_reset(&hash); |
| 875 | blob_reset(&combined); |
| 876 | } |
| 877 | if( rc==0 ){ |
| 878 | const char *zCap; |
| @@ -881,11 +881,10 @@ | |
| 881 | g.userUid = db_column_int(&q, 2); |
| 882 | g.zLogin = mprintf("%b", pLogin); |
| 883 | g.zNonce = mprintf("%b", pNonce); |
| 884 | } |
| 885 | } |
| 886 | db_finalize(&q); |
| 887 | return rc; |
| 888 | } |
| 889 | |
| 890 | /* |
| @@ -1318,13 +1317,13 @@ | |
| 1317 | if( zScript ){ /* NOTE: Are TH1 transfer hooks enabled? */ |
| 1318 | pzUuidList = &zUuidList; |
| 1319 | pnUuidList = &nUuidList; |
| 1320 | } |
| 1321 | if( g.syncInfo.zLoginCard ){ |
| 1322 | /* Login card received via HTTP header X-Fossil-Xfer-Login or |
| 1323 | ** x-f-x-l GET parameter. */ |
| 1324 | assert( g.syncInfo.bLoginCardHeader && "Set via HTTP header/GET arg" ); |
| 1325 | blob_zero(&xfer.line); |
| 1326 | blob_append(&xfer.line, g.syncInfo.zLoginCard, -1); |
| 1327 | xfer.nToken = blob_tokenize(&xfer.line, xfer.aToken, |
| 1328 | count(xfer.aToken)); |
| 1329 | fossil_free( g.syncInfo.zLoginCard ); |
| @@ -1577,13 +1576,10 @@ | |
| 1576 | */ |
| 1577 | if( blob_eq(&xfer.aToken[0], "login") |
| 1578 | && xfer.nToken==4 |
| 1579 | ){ |
| 1580 | handle_login_card: |
| 1581 | nLogin++; |
| 1582 | if( disableLogin ){ |
| 1583 | g.perm.Read = g.perm.Write = g.perm.Private = g.perm.Admin = 1; |
| 1584 | }else if( nLogin > 1 ){ |
| 1585 | cgi_reset_content(); |
| 1586 |