[BACK]Return to auth-passwd.c CVS log [TXT][DIR] Up to [local] / src / usr.bin / ssh

Annotation of src/usr.bin/ssh/auth-passwd.c, Revision 1.27

1.1       deraadt     1: /*
1.11      deraadt     2:  * Author: Tatu Ylonen <ylo@cs.hut.fi>
                      3:  * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
                      4:  *                    All rights reserved
                      5:  * Password authentication.  This file contains the functions to check whether
                      6:  * the password is valid for the user.
1.17      deraadt     7:  *
                      8:  * As far as I am concerned, the code I have written for this software
                      9:  * can be used freely for any purpose.  Any derived versions of this
                     10:  * software must be clearly marked as such, and if the derived work is
                     11:  * incompatible with the protocol description in the RFC file, it must be
                     12:  * called by a name other than "ssh" or "Secure Shell".
                     13:  *
                     14:  * Copyright (c) 1999 Dug Song.  All rights reserved.
                     15:  * Copyright (c) 2000 Markus Friedl.  All rights reserved.
                     16:  *
                     17:  * Redistribution and use in source and binary forms, with or without
                     18:  * modification, are permitted provided that the following conditions
                     19:  * are met:
                     20:  * 1. Redistributions of source code must retain the above copyright
                     21:  *    notice, this list of conditions and the following disclaimer.
                     22:  * 2. Redistributions in binary form must reproduce the above copyright
                     23:  *    notice, this list of conditions and the following disclaimer in the
                     24:  *    documentation and/or other materials provided with the distribution.
                     25:  *
                     26:  * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
                     27:  * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
                     28:  * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
                     29:  * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
                     30:  * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
                     31:  * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
                     32:  * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
                     33:  * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
                     34:  * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
                     35:  * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
1.11      deraadt    36:  */
1.1       deraadt    37:
                     38: #include "includes.h"
1.27    ! stevesk    39: RCSID("$OpenBSD: auth-passwd.c,v 1.26 2002/05/10 02:30:12 mouring Exp $");
1.1       deraadt    40:
                     41: #include "packet.h"
1.20      markus     42: #include "log.h"
1.1       deraadt    43: #include "servconf.h"
1.19      markus     44: #include "auth.h"
                     45:
1.22      markus     46:
                     47: extern ServerOptions options;
                     48:
1.11      deraadt    49: /*
                     50:  * Tries to authenticate the user using password.  Returns true if
                     51:  * authentication succeeds.
                     52:  */
1.15      markus     53: int
1.22      markus     54: auth_password(Authctxt *authctxt, const char *password)
1.1       deraadt    55: {
1.22      markus     56:        struct passwd * pw = authctxt->pw;
1.7       markus     57:
1.14      markus     58:        /* deny if no user. */
                     59:        if (pw == NULL)
                     60:                return 0;
1.21      markus     61:        if (pw->pw_uid == 0 && options.permit_root_login != PERMIT_YES)
1.10      markus     62:                return 0;
1.26      mouring    63:        if (*password == '\0' && options.permit_empty_passwd == 0)
1.10      markus     64:                return 0;
1.23      dugsong    65: #ifdef KRB5
                     66:        if (options.kerberos_authentication == 1) {
                     67:                int ret = auth_krb5_password(authctxt, password);
                     68:                if (ret == 1 || ret == 0)
                     69:                        return ret;
                     70:                /* Fall back to ordinary passwd authentication. */
                     71:        }
1.22      markus     72: #endif
1.13      markus     73: #ifdef KRB4
                     74:        if (options.kerberos_authentication == 1) {
1.23      dugsong    75:                int ret = auth_krb4_password(authctxt, password);
1.13      markus     76:                if (ret == 1 || ret == 0)
                     77:                        return ret;
1.10      markus     78:                /* Fall back to ordinary passwd authentication. */
1.2       dugsong    79:        }
1.13      markus     80: #endif
1.23      dugsong    81: #ifdef BSD_AUTH
                     82:        if (auth_userokay(pw->pw_name, authctxt->style, "auth-ssh",
                     83:            (char *)password) == 0)
                     84:                return 0;
                     85:        else
                     86:                return 1;
1.27    ! stevesk    87: #else
1.10      markus     88:        /* Check for users with no password. */
1.12      markus     89:        if (strcmp(password, "") == 0 && strcmp(pw->pw_passwd, "") == 0)
1.10      markus     90:                return 1;
1.27    ! stevesk    91:        else {
        !            92:                /* Encrypt the candidate password using the proper salt. */
        !            93:                char *encrypted_password = crypt(password,
        !            94:                    (pw->pw_passwd[0] && pw->pw_passwd[1]) ?
        !            95:                    pw->pw_passwd : "xx");
        !            96:                /*
        !            97:                 * Authentication is accepted if the encrypted passwords
        !            98:                 * are identical.
        !            99:                 */
        !           100:                return (strcmp(encrypted_password, pw->pw_passwd) == 0);
        !           101:        }
        !           102: #endif
1.1       deraadt   103: }