Annotation of embedaddon/sudo/plugins/sudoers/auth/rfc1938.c, revision 1.1

1.1     ! misho       1: /*
        !             2:  * Copyright (c) 1994-1996, 1998-2005, 2010-2011
        !             3:  *     Todd C. Miller <Todd.Miller@courtesan.com>
        !             4:  *
        !             5:  * Permission to use, copy, modify, and distribute this software for any
        !             6:  * purpose with or without fee is hereby granted, provided that the above
        !             7:  * copyright notice and this permission notice appear in all copies.
        !             8:  *
        !             9:  * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
        !            10:  * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
        !            11:  * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
        !            12:  * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
        !            13:  * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
        !            14:  * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
        !            15:  * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
        !            16:  *
        !            17:  * Sponsored in part by the Defense Advanced Research Projects
        !            18:  * Agency (DARPA) and Air Force Research Laboratory, Air Force
        !            19:  * Materiel Command, USAF, under agreement number F39502-99-1-0512.
        !            20:  */
        !            21: 
        !            22: #include <config.h>
        !            23: 
        !            24: #include <sys/types.h>
        !            25: #include <sys/param.h>
        !            26: #include <stdio.h>
        !            27: #ifdef STDC_HEADERS
        !            28: # include <stdlib.h>
        !            29: # include <stddef.h>
        !            30: #else
        !            31: # ifdef HAVE_STDLIB_H
        !            32: #  include <stdlib.h>
        !            33: # endif
        !            34: #endif /* STDC_HEADERS */
        !            35: #ifdef HAVE_STRING_H
        !            36: # include <string.h>
        !            37: #endif /* HAVE_STRING_H */
        !            38: #ifdef HAVE_STRINGS_H
        !            39: # include <strings.h>
        !            40: #endif /* HAVE_STRINGS_H */
        !            41: #ifdef HAVE_UNISTD_H
        !            42: # include <unistd.h>
        !            43: #endif /* HAVE_UNISTD_H */
        !            44: #include <pwd.h>
        !            45: 
        !            46: #if defined(HAVE_SKEY)
        !            47: # include <skey.h>
        !            48: # define RFC1938                               skey
        !            49: #  ifdef HAVE_RFC1938_SKEYCHALLENGE
        !            50: #   define rfc1938challenge(a,b,c,d)   skeychallenge((a),(b),(c),(d))
        !            51: #  else
        !            52: #   define rfc1938challenge(a,b,c,d)   skeychallenge((a),(b),(c))
        !            53: #  endif
        !            54: # define rfc1938verify(a,b)            skeyverify((a),(b))
        !            55: #elif defined(HAVE_OPIE)
        !            56: # include <opie.h>
        !            57: # define RFC1938                       opie
        !            58: # define rfc1938challenge(a,b,c,d)     opiechallenge((a),(b),(c))
        !            59: # define rfc1938verify(a,b)            opieverify((a),(b))
        !            60: #endif
        !            61: 
        !            62: #include "sudoers.h"
        !            63: #include "sudo_auth.h"
        !            64: 
        !            65: int
        !            66: rfc1938_setup(struct passwd *pw, char **promptp, sudo_auth *auth)
        !            67: {
        !            68:     char challenge[256];
        !            69:     static char *orig_prompt = NULL, *new_prompt = NULL;
        !            70:     static int op_len, np_size;
        !            71:     static struct RFC1938 rfc1938;
        !            72: 
        !            73:     /* Stash a pointer to the rfc1938 struct if we have not initialized */
        !            74:     if (!auth->data)
        !            75:        auth->data = &rfc1938;
        !            76: 
        !            77:     /* Save the original prompt */
        !            78:     if (orig_prompt == NULL) {
        !            79:        orig_prompt = *promptp;
        !            80:        op_len = strlen(orig_prompt);
        !            81: 
        !            82:        /* Ignore trailing colon (we will add our own) */
        !            83:        if (orig_prompt[op_len - 1] == ':')
        !            84:            op_len--;
        !            85:        else if (op_len >= 2 && orig_prompt[op_len - 1] == ' '
        !            86:            && orig_prompt[op_len - 2] == ':')
        !            87:            op_len -= 2;
        !            88:     }
        !            89: 
        !            90: #ifdef HAVE_SKEY
        !            91:     /* Close old stream */
        !            92:     if (rfc1938.keyfile)
        !            93:        (void) fclose(rfc1938.keyfile);
        !            94: #endif
        !            95: 
        !            96:     /*
        !            97:      * Look up the user and get the rfc1938 challenge.
        !            98:      * If the user is not in the OTP db, only post a fatal error if
        !            99:      * we are running alone (since they may just use a normal passwd).
        !           100:      */
        !           101:     if (rfc1938challenge(&rfc1938, pw->pw_name, challenge, sizeof(challenge))) {
        !           102:        if (IS_ONEANDONLY(auth)) {
        !           103:            warningx(_("you do not exist in the %s database"), auth->name);
        !           104:            return AUTH_FATAL;
        !           105:        } else {
        !           106:            return AUTH_FAILURE;
        !           107:        }
        !           108:     }
        !           109: 
        !           110:     /* Get space for new prompt with embedded challenge */
        !           111:     if (np_size < op_len + strlen(challenge) + 7) {
        !           112:        np_size = op_len + strlen(challenge) + 7;
        !           113:        new_prompt = (char *) erealloc(new_prompt, np_size);
        !           114:     }
        !           115: 
        !           116:     if (def_long_otp_prompt)
        !           117:        (void) snprintf(new_prompt, np_size, "%s\n%s", challenge, orig_prompt);
        !           118:     else
        !           119:        (void) snprintf(new_prompt, np_size, "%.*s [ %s ]:", op_len,
        !           120:            orig_prompt, challenge);
        !           121: 
        !           122:     *promptp = new_prompt;
        !           123:     return AUTH_SUCCESS;
        !           124: }
        !           125: 
        !           126: int
        !           127: rfc1938_verify(struct passwd *pw, char *pass, sudo_auth *auth)
        !           128: {
        !           129: 
        !           130:     if (rfc1938verify((struct RFC1938 *) auth->data, pass) == 0)
        !           131:        return AUTH_SUCCESS;
        !           132:     else
        !           133:        return AUTH_FAILURE;
        !           134: }

FreeBSD-CVSweb <freebsd-cvsweb@FreeBSD.org>