]> andersk Git - openssh.git/blame - auth-skey.c
- (dtucker) [openbsd-compat/fake-rfc2553.c] Add headers needed for inet_ntoa.
[openssh.git] / auth-skey.c
CommitLineData
cecc422f 1/* $OpenBSD: auth-skey.c,v 1.26 2006/08/05 08:28:24 dtucker Exp $ */
bf093080 2/*
3 * Copyright (c) 2001 Markus Friedl. All rights reserved.
4 *
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
7 * are met:
8 * 1. Redistributions of source code must retain the above copyright
9 * notice, this list of conditions and the following disclaimer.
10 * 2. Redistributions in binary form must reproduce the above copyright
11 * notice, this list of conditions and the following disclaimer in the
12 * documentation and/or other materials provided with the distribution.
13 *
14 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
15 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
16 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
17 * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
18 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
19 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
20 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
21 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
22 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
23 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
24 */
31652869 25
bf093080 26#include "includes.h"
bf093080 27
28#ifdef SKEY
29
31652869 30#include <sys/types.h>
31
453cb7e7 32#include <pwd.h>
33#include <stdio.h>
34
bf093080 35#include <skey.h>
36
37#include "xmalloc.h"
453cb7e7 38#include "key.h"
39#include "hostfile.h"
bf093080 40#include "auth.h"
1853d1ef 41#include "monitor_wrap.h"
bf093080 42
43static void *
44skey_init_ctx(Authctxt *authctxt)
45{
46 return authctxt;
47}
48
69538b0c 49int
184eed6a 50skey_query(void *ctx, char **name, char **infotxt,
bf093080 51 u_int* numprompts, char ***prompts, u_int **echo_on)
52{
53 Authctxt *authctxt = ctx;
cecc422f 54 char challenge[1024];
bf093080 55 struct skey skey;
56
d1cf9a87 57 if (_compat_skeychallenge(&skey, authctxt->user, challenge,
f2b7b5c8 58 sizeof(challenge)) == -1)
bf093080 59 return -1;
60
7203d6bb 61 *name = xstrdup("");
62 *infotxt = xstrdup("");
bf093080 63 *numprompts = 1;
52e3daed 64 *prompts = xcalloc(*numprompts, sizeof(char *));
65 *echo_on = xcalloc(*numprompts, sizeof(u_int));
bf093080 66
52e3daed 67 xasprintf(*prompts, "%s%s", challenge, SKEY_PROMPT);
bf093080 68
69 return 0;
70}
71
69538b0c 72int
bf093080 73skey_respond(void *ctx, u_int numresponses, char **responses)
74{
75 Authctxt *authctxt = ctx;
184eed6a 76
bf093080 77 if (authctxt->valid &&
184eed6a 78 numresponses == 1 &&
bf093080 79 skey_haskey(authctxt->pw->pw_name) == 0 &&
80 skey_passcheck(authctxt->pw->pw_name, responses[0]) != -1)
81 return 0;
82 return -1;
83}
84
85static void
86skey_free_ctx(void *ctx)
87{
88 /* we don't have a special context */
89}
90
91KbdintDevice skey_device = {
92 "skey",
93 skey_init_ctx,
94 skey_query,
95 skey_respond,
96 skey_free_ctx
97};
1853d1ef 98
99KbdintDevice mm_skey_device = {
100 "skey",
101 skey_init_ctx,
102 mm_skey_query,
103 mm_skey_respond,
104 skey_free_ctx
105};
bf093080 106#endif /* SKEY */
This page took 0.182259 seconds and 5 git commands to generate.