]> andersk Git - openssh.git/blobdiff - auth2-chall.c
[configure.ac] Make sure -lcrypto is before -lsocket for sco3. ok mouring@
[openssh.git] / auth2-chall.c
index ad4f7ac42e522f61acdcbbdce09404c9c33d90ae..aacbf0bccebb19509760f91c4998f4a034fe9860 100644 (file)
  * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
  */
 #include "includes.h"
-RCSID("$OpenBSD: auth2-chall.c,v 1.5 2001/05/18 14:13:28 markus Exp $");
+RCSID("$OpenBSD: auth2-chall.c,v 1.20 2002/06/30 21:59:45 deraadt Exp $");
 
 #include "ssh2.h"
 #include "auth.h"
+#include "buffer.h"
 #include "packet.h"
 #include "xmalloc.h"
 #include "dispatch.h"
 #include "auth.h"
 #include "log.h"
 
-static int auth2_challenge_start(Authctxt *authctxt);
-static int send_userauth_info_request(Authctxt *authctxt);
-static void input_userauth_info_response(int type, int plen, void *ctxt);
+static int auth2_challenge_start(Authctxt *);
+static int send_userauth_info_request(Authctxt *);
+static void input_userauth_info_response(int, u_int32_t, void *);
 
 #ifdef BSD_AUTH
 extern KbdintDevice bsdauth_device;
 #else
+#ifdef USE_PAM
+extern KbdintDevice sshpam_device;
+#endif
 #ifdef SKEY
 extern KbdintDevice skey_device;
 #endif
@@ -49,6 +53,9 @@ KbdintDevice *devices[] = {
 #ifdef BSD_AUTH
        &bsdauth_device,
 #else
+#ifdef USE_PAM
+       &sshpam_device,
+#endif
 #ifdef SKEY
        &skey_device,
 #endif
@@ -62,34 +69,39 @@ struct KbdintAuthctxt
        char *devices;
        void *ctxt;
        KbdintDevice *device;
+       u_int nreq;
 };
 
-KbdintAuthctxt *
+static KbdintAuthctxt *
 kbdint_alloc(const char *devs)
 {
        KbdintAuthctxt *kbdintctxt;
+       Buffer b;
        int i;
-       char buf[1024];
 
        kbdintctxt = xmalloc(sizeof(KbdintAuthctxt));
        if (strcmp(devs, "") == 0) {
-               buf[0] = '\0';
+               buffer_init(&b);
                for (i = 0; devices[i]; i++) {
-                       if (i != 0)
-                               strlcat(buf, ",", sizeof(buf));
-                       strlcat(buf, devices[i]->name, sizeof(buf));
+                       if (buffer_len(&b) > 0)
+                               buffer_append(&b, ",", 1);
+                       buffer_append(&b, devices[i]->name,
+                           strlen(devices[i]->name));
                }
-               debug("kbdint_alloc: devices '%s'", buf);
-               kbdintctxt->devices = xstrdup(buf);
+               buffer_append(&b, "\0", 1);
+               kbdintctxt->devices = xstrdup(buffer_ptr(&b));
+               buffer_free(&b);
        } else {
                kbdintctxt->devices = xstrdup(devs);
        }
+       debug("kbdint_alloc: devices '%s'", kbdintctxt->devices);
        kbdintctxt->ctxt = NULL;
        kbdintctxt->device = NULL;
+       kbdintctxt->nreq = 0;
 
        return kbdintctxt;
 }
-void
+static void
 kbdint_reset_device(KbdintAuthctxt *kbdintctxt)
 {
        if (kbdintctxt->ctxt) {
@@ -98,7 +110,7 @@ kbdint_reset_device(KbdintAuthctxt *kbdintctxt)
        }
        kbdintctxt->device = NULL;
 }
-void
+static void
 kbdint_free(KbdintAuthctxt *kbdintctxt)
 {
        if (kbdintctxt->device)
@@ -110,7 +122,7 @@ kbdint_free(KbdintAuthctxt *kbdintctxt)
        xfree(kbdintctxt);
 }
 /* get next device */
-int
+static int
 kbdint_next_device(KbdintAuthctxt *kbdintctxt)
 {
        size_t len;
@@ -139,7 +151,7 @@ kbdint_next_device(KbdintAuthctxt *kbdintctxt)
 }
 
 /*
- * try challenge-reponse, set authctxt->postponed if we have to
+ * try challenge-response, set authctxt->postponed if we have to
  * wait for the response.
  */
 int
@@ -149,13 +161,25 @@ auth2_challenge(Authctxt *authctxt, char *devs)
            authctxt->user ? authctxt->user : "<nouser>",
            devs ? devs : "<no devs>");
 
-       if (!authctxt->valid || authctxt->user == NULL || !devs)
+       if (authctxt->user == NULL || !devs)
                return 0;
-       if (authctxt->kbdintctxt == NULL) 
+       if (authctxt->kbdintctxt == NULL)
                authctxt->kbdintctxt = kbdint_alloc(devs);
        return auth2_challenge_start(authctxt);
 }
 
+/* unregister kbd-int callbacks and context */
+void
+auth2_challenge_stop(Authctxt *authctxt)
+{
+       /* unregister callback */
+       dispatch_set(SSH2_MSG_USERAUTH_INFO_RESPONSE, NULL);
+       if (authctxt->kbdintctxt != NULL)  {
+               kbdint_free(authctxt->kbdintctxt);
+               authctxt->kbdintctxt = NULL;
+       }
+}
+
 /* side effect: sets authctxt->postponed if a reply was sent*/
 static int
 auth2_challenge_start(Authctxt *authctxt)
@@ -166,21 +190,18 @@ auth2_challenge_start(Authctxt *authctxt)
            kbdintctxt->devices ?  kbdintctxt->devices : "<empty>");
 
        if (kbdint_next_device(kbdintctxt) == 0) {
-               kbdint_free(kbdintctxt);
-               authctxt->kbdintctxt = NULL;
+               auth2_challenge_stop(authctxt);
                return 0;
        }
        debug("auth2_challenge_start: trying authentication method '%s'",
            kbdintctxt->device->name);
 
        if ((kbdintctxt->ctxt = kbdintctxt->device->init_ctx(authctxt)) == NULL) {
-               kbdint_free(kbdintctxt);
-               authctxt->kbdintctxt = NULL;
+               auth2_challenge_stop(authctxt);
                return 0;
        }
        if (send_userauth_info_request(authctxt) == 0) {
-               kbdint_free(kbdintctxt);
-               authctxt->kbdintctxt = NULL;
+               auth2_challenge_stop(authctxt);
                return 0;
        }
        dispatch_set(SSH2_MSG_USERAUTH_INFO_RESPONSE,
@@ -196,26 +217,26 @@ send_userauth_info_request(Authctxt *authctxt)
        KbdintAuthctxt *kbdintctxt;
        char *name, *instr, **prompts;
        int i;
-       u_int numprompts, *echo_on;
+       u_int *echo_on;
 
        kbdintctxt = authctxt->kbdintctxt;
        if (kbdintctxt->device->query(kbdintctxt->ctxt,
-           &name, &instr, &numprompts, &prompts, &echo_on))
+           &name, &instr, &kbdintctxt->nreq, &prompts, &echo_on))
                return 0;
 
        packet_start(SSH2_MSG_USERAUTH_INFO_REQUEST);
        packet_put_cstring(name);
        packet_put_cstring(instr);
-       packet_put_cstring("");         /* language not used */
-       packet_put_int(numprompts);
-       for (i = 0; i < numprompts; i++) {
+       packet_put_cstring("");         /* language not used */
+       packet_put_int(kbdintctxt->nreq);
+       for (i = 0; i < kbdintctxt->nreq; i++) {
                packet_put_cstring(prompts[i]);
                packet_put_char(echo_on[i]);
        }
        packet_send();
        packet_write_wait();
 
-       for (i = 0; i < numprompts; i++)
+       for (i = 0; i < kbdintctxt->nreq; i++)
                xfree(prompts[i]);
        xfree(prompts);
        xfree(echo_on);
@@ -225,7 +246,7 @@ send_userauth_info_request(Authctxt *authctxt)
 }
 
 static void
-input_userauth_info_response(int type, int plen, void *ctxt)
+input_userauth_info_response(int type, u_int32_t seq, void *ctxt)
 {
        Authctxt *authctxt = ctxt;
        KbdintAuthctxt *kbdintctxt;
@@ -243,12 +264,16 @@ input_userauth_info_response(int type, int plen, void *ctxt)
 
        authctxt->postponed = 0;        /* reset */
        nresp = packet_get_int();
+       if (nresp != kbdintctxt->nreq)
+               fatal("input_userauth_info_response: wrong number of replies");
+       if (nresp > 100)
+               fatal("input_userauth_info_response: too many replies");
        if (nresp > 0) {
-               response = xmalloc(nresp * sizeof(char*));
+               response = xmalloc(nresp * sizeof(char *));
                for (i = 0; i < nresp; i++)
                        response[i] = packet_get_string(NULL);
        }
-       packet_done();
+       packet_check_eom();
 
        if (authctxt->valid) {
                res = kbdintctxt->device->respond(kbdintctxt->ctxt,
@@ -271,10 +296,8 @@ input_userauth_info_response(int type, int plen, void *ctxt)
                break;
        case 1:
                /* Authentication needs further interaction */
-               authctxt->postponed = 1;
-               if (send_userauth_info_request(authctxt) == 0) {
-                       authctxt->postponed = 0;
-               }
+               if (send_userauth_info_request(authctxt) == 1)
+                       authctxt->postponed = 1;
                break;
        default:
                /* Failure! */
@@ -284,18 +307,12 @@ input_userauth_info_response(int type, int plen, void *ctxt)
        len = strlen("keyboard-interactive") + 2 +
                strlen(kbdintctxt->device->name);
        method = xmalloc(len);
-       method[0] = '\0';
-       strlcat(method, "keyboard-interactive", len);
-       strlcat(method, "/", len);
-       strlcat(method, kbdintctxt->device->name, len);
+       snprintf(method, len, "keyboard-interactive/%s",
+           kbdintctxt->device->name);
 
        if (!authctxt->postponed) {
-               /* unregister callback */
-               dispatch_set(SSH2_MSG_USERAUTH_INFO_RESPONSE, NULL);
-
                if (authenticated) {
-                       kbdint_free(kbdintctxt);
-                       authctxt->kbdintctxt = NULL;
+                       auth2_challenge_stop(authctxt);
                } else {
                        /* start next device */
                        /* may set authctxt->postponed */
@@ -305,3 +322,31 @@ input_userauth_info_response(int type, int plen, void *ctxt)
        userauth_finish(authctxt, authenticated, method);
        xfree(method);
 }
+
+void
+privsep_challenge_enable(void)
+{
+#if defined(BSD_AUTH) || defined(USE_PAM) || defined(SKEY)
+       int n = 0;
+#endif
+#ifdef BSD_AUTH
+       extern KbdintDevice mm_bsdauth_device;
+#endif
+#ifdef USE_PAM
+       extern KbdintDevice mm_sshpam_device;
+#endif
+#ifdef SKEY
+       extern KbdintDevice mm_skey_device;
+#endif
+
+#ifdef BSD_AUTH
+       devices[n++] = &mm_bsdauth_device;
+#else
+#ifdef USE_PAM
+       devices[n++] = &mm_sshpam_device;
+#endif
+#ifdef SKEY
+       devices[n++] = &mm_skey_device;
+#endif
+#endif
+}
This page took 0.051682 seconds and 4 git commands to generate.