summaryrefslogtreecommitdiff
path: root/imap/src/osdep/unix/ckp_dce.c
diff options
context:
space:
mode:
authorEduardo Chappa <echappa@gmx.com>2013-02-03 00:59:38 -0700
committerEduardo Chappa <echappa@gmx.com>2013-02-03 00:59:38 -0700
commit094ca96844842928810f14844413109fc6cdd890 (patch)
treee60efbb980f38ba9308ccb4fb2b77b87bbc115f3 /imap/src/osdep/unix/ckp_dce.c
downloadalpine-094ca96844842928810f14844413109fc6cdd890.tar.xz
Initial Alpine Version
Diffstat (limited to 'imap/src/osdep/unix/ckp_dce.c')
-rw-r--r--imap/src/osdep/unix/ckp_dce.c83
1 files changed, 83 insertions, 0 deletions
diff --git a/imap/src/osdep/unix/ckp_dce.c b/imap/src/osdep/unix/ckp_dce.c
new file mode 100644
index 00000000..2a3aed0e
--- /dev/null
+++ b/imap/src/osdep/unix/ckp_dce.c
@@ -0,0 +1,83 @@
+/* ========================================================================
+ * Copyright 1988-2006 University of Washington
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ *
+ * ========================================================================
+ */
+
+/*
+ * Program: DCE check password
+ *
+ * Author: Mark Crispin
+ * Networks and Distributed Computing
+ * Computing & Communications
+ * University of Washington
+ * Administration Building, AG-44
+ * Seattle, WA 98195
+ * Internet: MRC@CAC.Washington.EDU
+ *
+ * Date: 1 August 1988
+ * Last Edited: 30 August 2006
+ */
+
+/* Check password
+ * Accepts: login passwd struct
+ * password string
+ * argument count
+ * argument vector
+ * Returns: passwd struct if password validated, NIL otherwise
+ */
+
+#include <dce/rpc.h>
+#include <dce/sec_login.h>
+
+struct passwd *checkpw (struct passwd *pw,char *pass,int argc,char *argv[])
+{
+ sec_passwd_rec_t pwr;
+ sec_login_handle_t lhdl;
+ boolean32 rstpwd;
+ sec_login_auth_src_t asrc;
+ error_status_t status;
+ FILE *fd;
+ /* easy case */
+ if (pw->pw_passwd && pw->pw_passwd[0] && pw->pw_passwd[1] &&
+ !strcmp (pw->pw_passwd,(char *) crypt (pass,pw->pw_passwd))) return pw;
+ /* try DCE password cache file */
+ if (fd = fopen (PASSWD_OVERRIDE,"r")) {
+ char *usr = cpystr (pw->pw_name);
+ while ((pw = fgetpwent (fd)) && strcmp (usr,pw->pw_name));
+ fclose (fd); /* finished with cache file */
+ /* validate cached password */
+ if (pw && pw->pw_passwd && pw->pw_passwd[0] && pw->pw_passwd[1] &&
+ !strcmp (pw->pw_passwd,(char *) crypt (pass,pw->pw_passwd))) {
+ fs_give ((void **) &usr);
+ return pw;
+ }
+ if (!pw) pw = getpwnam (usr);
+ fs_give ((void **) &usr);
+ }
+ if (pw) { /* try S-L-O-W DCE... */
+ sec_login_setup_identity ((unsigned_char_p_t) pw->pw_name,
+ sec_login_no_flags,&lhdl,&status);
+ if (status == error_status_ok) {
+ pwr.key.tagged_union.plain = (idl_char *) pass;
+ pwr.key.key_type = sec_passwd_plain;
+ pwr.pepper = NIL;
+ pwr.version_number = sec_passwd_c_version_none;
+ /* validate password with login context */
+ sec_login_validate_identity (lhdl,&pwr,&rstpwd,&asrc,&status);
+ if (!rstpwd && (asrc == sec_login_auth_src_network) &&
+ (status == error_status_ok)) {
+ sec_login_purge_context (&lhdl,&status);
+ if (status == error_status_ok) return pw;
+ }
+ }
+ }
+ return NIL; /* password validation failed */
+}