sirc

A simple tui multi server irc client
git clone git://git.emmett1.my/sirc.git
Log | Files | Refs | README | LICENSE

commit f52d54ccc7383af9d029fb75efb91b7e20540c5f
parent de7d2508625dba686351375fdd956ffc690d35aa
Author: emmett1 <me@emmett1.my>
Date:   Mon,  6 Apr 2026 22:41:48 +0800

fix authenticate

Diffstat:
Msirc.c | 39+++++++++++++++++++++++++++++++--------
1 file changed, 31 insertions(+), 8 deletions(-)

diff --git a/sirc.c b/sirc.c @@ -608,8 +608,12 @@ static void handle_irc_line(int si, const char *raw) { if (strcmp(m.cmd,"CAP")==0) { char sub[16]=""; if (m.nparams>=2) str_upper(sub, m.params[1], sizeof(sub)); - if (strcmp(sub,"ACK")==0 && strstr(m.trail,"sasl")) { - srv_send_raw(si, "AUTHENTICATE PLAIN"); + if (strcmp(sub,"ACK")==0) { + /* trail or last param may contain "sasl" */ + const char *caps = m.trail[0] ? m.trail : m.params[m.nparams-1]; + if (strstr(caps,"sasl")) { + srv_send_raw(si, "AUTHENTICATE PLAIN"); + } } else if (strcmp(sub,"NAK")==0) { ev_simple(EV_ERROR, si, NULL, NULL, "Server rejected SASL CAP."); srv_sendf(si, "NICK %s", s->nick); @@ -617,12 +621,31 @@ static void handle_irc_line(int si, const char *raw) { } return; } - if (strcmp(m.cmd,"AUTHENTICATE")==0 && strcmp(m.trail,"+")==0) { - char payload[512]; - int plen=snprintf(payload,sizeof(payload),"%s%c%s%c%s", - s->sasl_user,0,s->sasl_user,0,s->sasl_pass); - char enc[700]; base64_encode((unsigned char*)payload,plen,enc); - srv_sendf(si, "AUTHENTICATE %s", enc); + if (strcmp(m.cmd,"AUTHENTICATE")==0) { + /* server sends AUTHENTICATE + (trail or param) to prompt us */ + const char *challenge = m.trail[0] ? m.trail : + (m.nparams>0 ? m.params[0] : ""); + if (strcmp(challenge,"+")==0) { + /* build PLAIN payload: authzid\0authcid\0passwd + must use memcpy — sasl_user/pass may not contain \0 + but we need to embed \0 separators manually */ + char payload[512]; + int ulen = strlen(s->sasl_user); + int plen_pass = strlen(s->sasl_pass); + /* layout: [sasl_user]\0[sasl_user]\0[sasl_pass] */ + int total = ulen + 1 + ulen + 1 + plen_pass; + if (total < (int)sizeof(payload)) { + int pos = 0; + memcpy(payload + pos, s->sasl_user, ulen); pos += ulen; + payload[pos++] = '\0'; + memcpy(payload + pos, s->sasl_user, ulen); pos += ulen; + payload[pos++] = '\0'; + memcpy(payload + pos, s->sasl_pass, plen_pass); pos += plen_pass; + char enc[700]; + base64_encode((unsigned char*)payload, total, enc); + srv_sendf(si, "AUTHENTICATE %s", enc); + } + } return; } if (strcmp(m.cmd,"903")==0) {