summaryrefslogtreecommitdiff
path: root/imap/src/osdep/unix/ckp_sce.c
diff options
context:
space:
mode:
authorEduardo Chappa <echappa@gmx.com>2013-02-03 00:59:38 -0700
committerEduardo Chappa <echappa@gmx.com>2013-02-03 00:59:38 -0700
commit094ca96844842928810f14844413109fc6cdd890 (patch)
treee60efbb980f38ba9308ccb4fb2b77b87bbc115f3 /imap/src/osdep/unix/ckp_sce.c
downloadalpine-094ca96844842928810f14844413109fc6cdd890.tar.xz
Initial Alpine Version
Diffstat (limited to 'imap/src/osdep/unix/ckp_sce.c')
-rw-r--r--imap/src/osdep/unix/ckp_sce.c51
1 files changed, 51 insertions, 0 deletions
diff --git a/imap/src/osdep/unix/ckp_sce.c b/imap/src/osdep/unix/ckp_sce.c
new file mode 100644
index 00000000..cff95dda
--- /dev/null
+++ b/imap/src/osdep/unix/ckp_sce.c
@@ -0,0 +1,51 @@
+/* ========================================================================
+ * Copyright 1988-2006 University of Washington
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ *
+ * ========================================================================
+ */
+
+/*
+ * Program: SecureWare check password
+ *
+ * Author: Mark Crispin
+ * Networks and Distributed Computing
+ * Computing & Communications
+ * University of Washington
+ * Administration Building, AG-44
+ * Seattle, WA 98195
+ * Internet: MRC@CAC.Washington.EDU
+ *
+ * Date: 1 August 1988
+ * Last Edited: 30 August 2006
+ */
+
+/* Check password
+ * Accepts: login passwd struct
+ * password string
+ * argument count
+ * argument vector
+ * Returns: passwd struct if password validated, NIL otherwise
+ */
+
+struct passwd *checkpw (struct passwd *pw,char *pass,int argc,char *argv[])
+{
+ struct es_passwd *pp;
+ set_auth_parameters (argc,argv);
+ if ((pw->pw_passwd && pw->pw_passwd[0] && pw->pw_passwd[1] &&
+ !strcmp (pw->pw_passwd,(char *) crypt (pass,pw->pw_passwd))) ||
+ ((pp = getespwnam (pw->pw_name)) && !pp->ufld->fd_lock &&
+ !pp->ufld->fd_psw_chg_reqd &&
+ pp->ufld->fd_encrypt && pp->ufld->fd_encrypt[0] &&
+ pp->ufld->fd_encrypt[1] &&
+ !strcmp (pp->ufld->fd_encrypt,bigcrypt (pass,pp->ufld->fd_encrypt))))
+ endprpwent (); /* don't need shadow password data any more */
+ else pw = NIL; /* password failed */
+ return pw;
+}