diff options
author | Eduardo Chappa <echappa@gmx.com> | 2013-02-03 00:59:38 -0700 |
---|---|---|
committer | Eduardo Chappa <echappa@gmx.com> | 2013-02-03 00:59:38 -0700 |
commit | 094ca96844842928810f14844413109fc6cdd890 (patch) | |
tree | e60efbb980f38ba9308ccb4fb2b77b87bbc115f3 /imap/src/osdep/unix/ckp_dce.c | |
download | alpine-094ca96844842928810f14844413109fc6cdd890.tar.xz |
Initial Alpine Version
Diffstat (limited to 'imap/src/osdep/unix/ckp_dce.c')
-rw-r--r-- | imap/src/osdep/unix/ckp_dce.c | 83 |
1 files changed, 83 insertions, 0 deletions
diff --git a/imap/src/osdep/unix/ckp_dce.c b/imap/src/osdep/unix/ckp_dce.c new file mode 100644 index 00000000..2a3aed0e --- /dev/null +++ b/imap/src/osdep/unix/ckp_dce.c @@ -0,0 +1,83 @@ +/* ======================================================================== + * Copyright 1988-2006 University of Washington + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * + * ======================================================================== + */ + +/* + * Program: DCE check password + * + * Author: Mark Crispin + * Networks and Distributed Computing + * Computing & Communications + * University of Washington + * Administration Building, AG-44 + * Seattle, WA 98195 + * Internet: MRC@CAC.Washington.EDU + * + * Date: 1 August 1988 + * Last Edited: 30 August 2006 + */ + +/* Check password + * Accepts: login passwd struct + * password string + * argument count + * argument vector + * Returns: passwd struct if password validated, NIL otherwise + */ + +#include <dce/rpc.h> +#include <dce/sec_login.h> + +struct passwd *checkpw (struct passwd *pw,char *pass,int argc,char *argv[]) +{ + sec_passwd_rec_t pwr; + sec_login_handle_t lhdl; + boolean32 rstpwd; + sec_login_auth_src_t asrc; + error_status_t status; + FILE *fd; + /* easy case */ + if (pw->pw_passwd && pw->pw_passwd[0] && pw->pw_passwd[1] && + !strcmp (pw->pw_passwd,(char *) crypt (pass,pw->pw_passwd))) return pw; + /* try DCE password cache file */ + if (fd = fopen (PASSWD_OVERRIDE,"r")) { + char *usr = cpystr (pw->pw_name); + while ((pw = fgetpwent (fd)) && strcmp (usr,pw->pw_name)); + fclose (fd); /* finished with cache file */ + /* validate cached password */ + if (pw && pw->pw_passwd && pw->pw_passwd[0] && pw->pw_passwd[1] && + !strcmp (pw->pw_passwd,(char *) crypt (pass,pw->pw_passwd))) { + fs_give ((void **) &usr); + return pw; + } + if (!pw) pw = getpwnam (usr); + fs_give ((void **) &usr); + } + if (pw) { /* try S-L-O-W DCE... */ + sec_login_setup_identity ((unsigned_char_p_t) pw->pw_name, + sec_login_no_flags,&lhdl,&status); + if (status == error_status_ok) { + pwr.key.tagged_union.plain = (idl_char *) pass; + pwr.key.key_type = sec_passwd_plain; + pwr.pepper = NIL; + pwr.version_number = sec_passwd_c_version_none; + /* validate password with login context */ + sec_login_validate_identity (lhdl,&pwr,&rstpwd,&asrc,&status); + if (!rstpwd && (asrc == sec_login_auth_src_network) && + (status == error_status_ok)) { + sec_login_purge_context (&lhdl,&status); + if (status == error_status_ok) return pw; + } + } + } + return NIL; /* password validation failed */ +} |