]> andersk Git - openssh.git/blame - auth-chall.c
- deraadt@cvs.openbsd.org 2006/08/03 03:34:42
[openssh.git] / auth-chall.c
CommitLineData
31652869 1/* $OpenBSD: auth-chall.c,v 1.12 2006/08/03 03:34:41 deraadt Exp $ */
59c97189 2/*
f3c7c613 3 * Copyright (c) 2001 Markus Friedl. All rights reserved.
59c97189 4 *
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
7 * are met:
8 * 1. Redistributions of source code must retain the above copyright
9 * notice, this list of conditions and the following disclaimer.
10 * 2. Redistributions in binary form must reproduce the above copyright
11 * notice, this list of conditions and the following disclaimer in the
12 * documentation and/or other materials provided with the distribution.
13 *
14 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
15 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
16 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
17 * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
18 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
19 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
20 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
21 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
22 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
23 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
24 */
25
26#include "includes.h"
59c97189 27
31652869 28#include <sys/types.h>
29
30#include "xmalloc.h"
31#include "key.h"
32#include "hostfile.h"
59c97189 33#include "auth.h"
af774732 34#include "log.h"
c384a74c 35#include "servconf.h"
59c97189 36
5ba55ada 37/* limited protocol v1 interface to kbd-interactive authentication */
af774732 38
5ba55ada 39extern KbdintDevice *devices[];
40static KbdintDevice *device;
c384a74c 41extern ServerOptions options;
6005a40c 42
59c97189 43char *
5ba55ada 44get_challenge(Authctxt *authctxt)
59c97189 45{
5ba55ada 46 char *challenge, *name, *info, **prompts;
47 u_int i, numprompts;
48 u_int *echo_on;
49
c384a74c 50#ifdef USE_PAM
51 if (!options.use_pam)
52 remove_kbdint_device("pam");
53#endif
54
5ba55ada 55 device = devices[0]; /* we always use the 1st device for protocol 1 */
56 if (device == NULL)
59c97189 57 return NULL;
5ba55ada 58 if ((authctxt->kbdintctxt = device->init_ctx(authctxt)) == NULL)
59 return NULL;
60 if (device->query(authctxt->kbdintctxt, &name, &info,
61 &numprompts, &prompts, &echo_on)) {
62 device->free_ctx(authctxt->kbdintctxt);
63 authctxt->kbdintctxt = NULL;
64 return NULL;
65 }
66 if (numprompts < 1)
67 fatal("get_challenge: numprompts < 1");
68 challenge = xstrdup(prompts[0]);
69 for (i = 0; i < numprompts; i++)
70 xfree(prompts[i]);
71 xfree(prompts);
72 xfree(name);
73 xfree(echo_on);
74 xfree(info);
75
76 return (challenge);
59c97189 77}
78int
5ba55ada 79verify_response(Authctxt *authctxt, const char *response)
59c97189 80{
85a68682 81 char *resp[1], *name, *info, **prompts;
82 u_int i, numprompts, *echo_on;
83 int authenticated = 0;
5ba55ada 84
85 if (device == NULL)
86 return 0;
87 if (authctxt->kbdintctxt == NULL)
88 return 0;
89 resp[0] = (char *)response;
85a68682 90 switch (device->respond(authctxt->kbdintctxt, 1, resp)) {
91 case 0: /* Success */
92 authenticated = 1;
93 break;
94 case 1: /* Postponed - retry with empty query for PAM */
95 if ((device->query(authctxt->kbdintctxt, &name, &info,
96 &numprompts, &prompts, &echo_on)) != 0)
97 break;
aff51935 98 if (numprompts == 0 &&
85a68682 99 device->respond(authctxt->kbdintctxt, 0, resp) == 0)
100 authenticated = 1;
05114c74 101
85a68682 102 for (i = 0; i < numprompts; i++)
103 xfree(prompts[i]);
104 xfree(prompts);
105 xfree(name);
106 xfree(echo_on);
107 xfree(info);
108 break;
05114c74 109 }
5ba55ada 110 device->free_ctx(authctxt->kbdintctxt);
111 authctxt->kbdintctxt = NULL;
85a68682 112 return authenticated;
59c97189 113}
05114c74 114void
115abandon_challenge_response(Authctxt *authctxt)
116{
117 if (authctxt->kbdintctxt != NULL) {
118 device->free_ctx(authctxt->kbdintctxt);
119 authctxt->kbdintctxt = NULL;
120 }
121}
This page took 0.18098 seconds and 5 git commands to generate.