Annotation of src/usr.bin/ssh/auth-chall.c, Revision 1.7
1.1 markus 1: /*
1.5 deraadt 2: * Copyright (c) 2001 Markus Friedl. All rights reserved.
1.1 markus 3: *
4: * Redistribution and use in source and binary forms, with or without
5: * modification, are permitted provided that the following conditions
6: * are met:
7: * 1. Redistributions of source code must retain the above copyright
8: * notice, this list of conditions and the following disclaimer.
9: * 2. Redistributions in binary form must reproduce the above copyright
10: * notice, this list of conditions and the following disclaimer in the
11: * documentation and/or other materials provided with the distribution.
12: *
13: * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
14: * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
15: * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
16: * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
17: * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
18: * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
19: * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
20: * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
21: * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
22: * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
23: */
24:
25: #include "includes.h"
1.7 ! markus 26: RCSID("$OpenBSD: auth-chall.c,v 1.6 2001/03/20 18:57:04 markus Exp $");
1.1 markus 27:
28: #include "auth.h"
1.6 markus 29: #include "log.h"
1.1 markus 30:
1.6 markus 31: #ifdef BSD_AUTH
32: char *
33: get_challenge(Authctxt *authctxt, char *devs)
34: {
35: char *challenge;
36:
37: if (authctxt->as != NULL) {
38: debug2("try reuse session");
39: challenge = auth_getitem(authctxt->as, AUTHV_CHALLENGE);
40: if (challenge != NULL) {
41: debug2("reuse bsd auth session");
42: return challenge;
43: }
44: auth_close(authctxt->as);
45: authctxt->as = NULL;
46: }
47: debug2("new bsd auth session");
48: if (devs == NULL || strlen(devs) == 0)
49: devs = authctxt->style;
50: debug3("bsd auth: devs %s", devs ? devs : "<default>");
51: authctxt->as = auth_userchallenge(authctxt->user, devs, "auth-ssh",
52: &challenge);
1.7 ! markus 53: if (authctxt->as == NULL)
! 54: return NULL;
1.6 markus 55: debug2("get_challenge: <%s>", challenge ? challenge : "EMPTY");
56: return challenge;
57: }
58: int
59: verify_response(Authctxt *authctxt, char *response)
60: {
61: int authok;
62:
63: if (authctxt->as == 0)
64: error("verify_response: no bsd auth session");
65: authok = auth_userresponse(authctxt->as, response, 0);
66: authctxt->as = NULL;
67: debug("verify_response: <%s> = <%d>", response, authok);
68: return authok != 0;
69: }
70: #else
1.1 markus 71: #ifdef SKEY
1.2 markus 72: #include <skey.h>
73:
1.1 markus 74: char *
75: get_challenge(Authctxt *authctxt, char *devs)
76: {
77: static char challenge[1024];
1.4 stevesk 78: struct skey skey;
1.1 markus 79: if (skeychallenge(&skey, authctxt->user, challenge) == -1)
80: return NULL;
81: strlcat(challenge, "\nS/Key Password: ", sizeof challenge);
82: return challenge;
83: }
84: int
85: verify_response(Authctxt *authctxt, char *response)
86: {
87: return (authctxt->valid &&
88: skey_haskey(authctxt->pw->pw_name) == 0 &&
89: skey_passcheck(authctxt->pw->pw_name, response) != -1);
90: }
91: #else
92: /* not available */
93: char *
94: get_challenge(Authctxt *authctxt, char *devs)
95: {
96: return NULL;
97: }
98: int
99: verify_response(Authctxt *authctxt, char *response)
100: {
101: return 0;
102: }
1.6 markus 103: #endif
1.1 markus 104: #endif