From 094ca96844842928810f14844413109fc6cdd890 Mon Sep 17 00:00:00 2001 From: Eduardo Chappa Date: Sun, 3 Feb 2013 00:59:38 -0700 Subject: Initial Alpine Version --- imap/src/osdep/unix/ckp_dce.c | 83 +++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 83 insertions(+) create mode 100644 imap/src/osdep/unix/ckp_dce.c (limited to 'imap/src/osdep/unix/ckp_dce.c') diff --git a/imap/src/osdep/unix/ckp_dce.c b/imap/src/osdep/unix/ckp_dce.c new file mode 100644 index 00000000..2a3aed0e --- /dev/null +++ b/imap/src/osdep/unix/ckp_dce.c @@ -0,0 +1,83 @@ +/* ======================================================================== + * Copyright 1988-2006 University of Washington + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * + * ======================================================================== + */ + +/* + * Program: DCE check password + * + * Author: Mark Crispin + * Networks and Distributed Computing + * Computing & Communications + * University of Washington + * Administration Building, AG-44 + * Seattle, WA 98195 + * Internet: MRC@CAC.Washington.EDU + * + * Date: 1 August 1988 + * Last Edited: 30 August 2006 + */ + +/* Check password + * Accepts: login passwd struct + * password string + * argument count + * argument vector + * Returns: passwd struct if password validated, NIL otherwise + */ + +#include +#include + +struct passwd *checkpw (struct passwd *pw,char *pass,int argc,char *argv[]) +{ + sec_passwd_rec_t pwr; + sec_login_handle_t lhdl; + boolean32 rstpwd; + sec_login_auth_src_t asrc; + error_status_t status; + FILE *fd; + /* easy case */ + if (pw->pw_passwd && pw->pw_passwd[0] && pw->pw_passwd[1] && + !strcmp (pw->pw_passwd,(char *) crypt (pass,pw->pw_passwd))) return pw; + /* try DCE password cache file */ + if (fd = fopen (PASSWD_OVERRIDE,"r")) { + char *usr = cpystr (pw->pw_name); + while ((pw = fgetpwent (fd)) && strcmp (usr,pw->pw_name)); + fclose (fd); /* finished with cache file */ + /* validate cached password */ + if (pw && pw->pw_passwd && pw->pw_passwd[0] && pw->pw_passwd[1] && + !strcmp (pw->pw_passwd,(char *) crypt (pass,pw->pw_passwd))) { + fs_give ((void **) &usr); + return pw; + } + if (!pw) pw = getpwnam (usr); + fs_give ((void **) &usr); + } + if (pw) { /* try S-L-O-W DCE... */ + sec_login_setup_identity ((unsigned_char_p_t) pw->pw_name, + sec_login_no_flags,&lhdl,&status); + if (status == error_status_ok) { + pwr.key.tagged_union.plain = (idl_char *) pass; + pwr.key.key_type = sec_passwd_plain; + pwr.pepper = NIL; + pwr.version_number = sec_passwd_c_version_none; + /* validate password with login context */ + sec_login_validate_identity (lhdl,&pwr,&rstpwd,&asrc,&status); + if (!rstpwd && (asrc == sec_login_auth_src_network) && + (status == error_status_ok)) { + sec_login_purge_context (&lhdl,&status); + if (status == error_status_ok) return pw; + } + } + } + return NIL; /* password validation failed */ +} -- cgit v1.2.3-54-g00ecf