version 1.27, 2002/05/24 16:45:16 |
version 1.27.2.1, 2003/09/16 21:20:24 |
|
|
auth_password(Authctxt *authctxt, const char *password) |
auth_password(Authctxt *authctxt, const char *password) |
{ |
{ |
struct passwd * pw = authctxt->pw; |
struct passwd * pw = authctxt->pw; |
|
int ok = authctxt->valid; |
|
|
/* deny if no user. */ |
/* deny if no user. */ |
if (pw == NULL) |
if (pw == NULL) |
return 0; |
return 0; |
if (pw->pw_uid == 0 && options.permit_root_login != PERMIT_YES) |
if (pw->pw_uid == 0 && options.permit_root_login != PERMIT_YES) |
return 0; |
ok = 0; |
if (*password == '\0' && options.permit_empty_passwd == 0) |
if (*password == '\0' && options.permit_empty_passwd == 0) |
return 0; |
return 0; |
#ifdef KRB5 |
#ifdef KRB5 |
if (options.kerberos_authentication == 1) { |
if (options.kerberos_authentication == 1) { |
int ret = auth_krb5_password(authctxt, password); |
int ret = auth_krb5_password(authctxt, password); |
if (ret == 1 || ret == 0) |
if (ret == 1 || ret == 0) |
return ret; |
return ret && ok; |
/* Fall back to ordinary passwd authentication. */ |
/* Fall back to ordinary passwd authentication. */ |
} |
} |
#endif |
#endif |
#ifdef KRB4 |
|
if (options.kerberos_authentication == 1) { |
|
int ret = auth_krb4_password(authctxt, password); |
|
if (ret == 1 || ret == 0) |
|
return ret; |
|
/* Fall back to ordinary passwd authentication. */ |
|
} |
|
#endif |
|
#ifdef BSD_AUTH |
#ifdef BSD_AUTH |
if (auth_userokay(pw->pw_name, authctxt->style, "auth-ssh", |
if (auth_userokay(pw->pw_name, authctxt->style, "auth-ssh", |
(char *)password) == 0) |
(char *)password) == 0) |
return 0; |
return 0; |
else |
else |
return 1; |
return ok; |
#else |
#else |
/* Check for users with no password. */ |
/* Check for users with no password. */ |
if (strcmp(password, "") == 0 && strcmp(pw->pw_passwd, "") == 0) |
if (strcmp(password, "") == 0 && strcmp(pw->pw_passwd, "") == 0) |
return 1; |
return ok; |
else { |
else { |
/* Encrypt the candidate password using the proper salt. */ |
/* Encrypt the candidate password using the proper salt. */ |
char *encrypted_password = crypt(password, |
char *encrypted_password = crypt(password, |
|
|
* Authentication is accepted if the encrypted passwords |
* Authentication is accepted if the encrypted passwords |
* are identical. |
* are identical. |
*/ |
*/ |
return (strcmp(encrypted_password, pw->pw_passwd) == 0); |
return (strcmp(encrypted_password, pw->pw_passwd) == 0) && ok; |
} |
} |
#endif |
#endif |
} |
} |