]> andersk Git - openssh.git/blame - auth-skey.c
- (djm) [acss.c auth-pam.c auth-shadow.c auth-skey.c auth1.c canohost.c]
[openssh.git] / auth-skey.c
CommitLineData
bf093080 1/*
2 * Copyright (c) 2001 Markus Friedl. All rights reserved.
3 *
4 * Redistribution and use in source and binary forms, with or without
5 * modification, are permitted provided that the following conditions
6 * are met:
7 * 1. Redistributions of source code must retain the above copyright
8 * notice, this list of conditions and the following disclaimer.
9 * 2. Redistributions in binary form must reproduce the above copyright
10 * notice, this list of conditions and the following disclaimer in the
11 * documentation and/or other materials provided with the distribution.
12 *
13 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
14 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
15 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
16 * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
17 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
18 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
19 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
20 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
21 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
22 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
23 */
24#include "includes.h"
343288b8 25RCSID("$OpenBSD: auth-skey.c,v 1.20 2002/06/30 21:59:45 deraadt Exp $");
bf093080 26
27#ifdef SKEY
28
29#include <skey.h>
30
31#include "xmalloc.h"
32#include "auth.h"
1853d1ef 33#include "monitor_wrap.h"
bf093080 34
35static void *
36skey_init_ctx(Authctxt *authctxt)
37{
38 return authctxt;
39}
40
69538b0c 41int
184eed6a 42skey_query(void *ctx, char **name, char **infotxt,
bf093080 43 u_int* numprompts, char ***prompts, u_int **echo_on)
44{
45 Authctxt *authctxt = ctx;
46 char challenge[1024], *p;
47 int len;
48 struct skey skey;
49
d1cf9a87 50 if (_compat_skeychallenge(&skey, authctxt->user, challenge,
f2b7b5c8 51 sizeof(challenge)) == -1)
bf093080 52 return -1;
53
7203d6bb 54 *name = xstrdup("");
55 *infotxt = xstrdup("");
bf093080 56 *numprompts = 1;
343288b8 57 *prompts = xmalloc(*numprompts * sizeof(char *));
bf093080 58 *echo_on = xmalloc(*numprompts * sizeof(u_int));
59 (*echo_on)[0] = 0;
60
1853d1ef 61 len = strlen(challenge) + strlen(SKEY_PROMPT) + 1;
bf093080 62 p = xmalloc(len);
68a7e648 63 strlcpy(p, challenge, len);
1853d1ef 64 strlcat(p, SKEY_PROMPT, len);
bf093080 65 (*prompts)[0] = p;
66
67 return 0;
68}
69
69538b0c 70int
bf093080 71skey_respond(void *ctx, u_int numresponses, char **responses)
72{
73 Authctxt *authctxt = ctx;
184eed6a 74
bf093080 75 if (authctxt->valid &&
184eed6a 76 numresponses == 1 &&
bf093080 77 skey_haskey(authctxt->pw->pw_name) == 0 &&
78 skey_passcheck(authctxt->pw->pw_name, responses[0]) != -1)
79 return 0;
80 return -1;
81}
82
83static void
84skey_free_ctx(void *ctx)
85{
86 /* we don't have a special context */
87}
88
89KbdintDevice skey_device = {
90 "skey",
91 skey_init_ctx,
92 skey_query,
93 skey_respond,
94 skey_free_ctx
95};
1853d1ef 96
97KbdintDevice mm_skey_device = {
98 "skey",
99 skey_init_ctx,
100 mm_skey_query,
101 mm_skey_respond,
102 skey_free_ctx
103};
bf093080 104#endif /* SKEY */
This page took 0.152418 seconds and 5 git commands to generate.