a11f010af2
- If the user doesn't have an OPIE key, don't challenge him. This is a workaround until I get PAM to work properly with ssh2. Sponsored by: DARPA, NAI Labs
100 lines
2.7 KiB
C
100 lines
2.7 KiB
C
/*
|
|
* Copyright (c) 2001 Markus Friedl. All rights reserved.
|
|
*
|
|
* Redistribution and use in source and binary forms, with or without
|
|
* modification, are permitted provided that the following conditions
|
|
* are met:
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
* notice, this list of conditions and the following disclaimer.
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
* documentation and/or other materials provided with the distribution.
|
|
*
|
|
* THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
|
|
* IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
|
|
* OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
|
|
* IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
|
|
* INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
|
|
* NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
|
|
* DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
|
|
* THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
|
|
* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
|
|
* THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
*/
|
|
#include "includes.h"
|
|
RCSID("$OpenBSD: auth-skey.c,v 1.16 2002/01/12 13:10:29 markus Exp $");
|
|
RCSID("$FreeBSD$");
|
|
|
|
#ifdef SKEY
|
|
|
|
#include <opie.h>
|
|
|
|
#include "xmalloc.h"
|
|
#include "auth.h"
|
|
|
|
static void *
|
|
skey_init_ctx(Authctxt *authctxt)
|
|
{
|
|
return authctxt;
|
|
}
|
|
|
|
#define PROMPT "\nOPIE Password: "
|
|
|
|
static int
|
|
skey_query(void *ctx, char **name, char **infotxt,
|
|
u_int* numprompts, char ***prompts, u_int **echo_on)
|
|
{
|
|
Authctxt *authctxt = ctx;
|
|
char challenge[1024], *p;
|
|
int len;
|
|
struct opie opie;
|
|
|
|
if (opie_haskey(authctxt->user) != 0)
|
|
return -1;
|
|
if (opiechallenge(&opie, authctxt->user, challenge) == -1)
|
|
return -1;
|
|
|
|
*name = xstrdup("");
|
|
*infotxt = xstrdup("");
|
|
*numprompts = 1;
|
|
*prompts = xmalloc(*numprompts * sizeof(char*));
|
|
*echo_on = xmalloc(*numprompts * sizeof(u_int));
|
|
(*echo_on)[0] = 0;
|
|
|
|
len = strlen(challenge) + strlen(PROMPT) + 1;
|
|
p = xmalloc(len);
|
|
strlcpy(p, challenge, len);
|
|
strlcat(p, PROMPT, len);
|
|
(*prompts)[0] = p;
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int
|
|
skey_respond(void *ctx, u_int numresponses, char **responses)
|
|
{
|
|
Authctxt *authctxt = ctx;
|
|
|
|
if (authctxt->valid &&
|
|
numresponses == 1 &&
|
|
opie_haskey(authctxt->pw->pw_name) == 0 &&
|
|
opie_passverify(authctxt->pw->pw_name, responses[0]) != -1)
|
|
return 0;
|
|
return -1;
|
|
}
|
|
|
|
static void
|
|
skey_free_ctx(void *ctx)
|
|
{
|
|
/* we don't have a special context */
|
|
}
|
|
|
|
KbdintDevice skey_device = {
|
|
"skey",
|
|
skey_init_ctx,
|
|
skey_query,
|
|
skey_respond,
|
|
skey_free_ctx
|
|
};
|
|
#endif /* SKEY */
|