]> granicus.if.org Git - uw-imap/commitdiff
add files for 2006-08-30T23:37:25Z
authorUnknown <>
Wed, 30 Aug 2006 23:37:25 +0000 (23:37 +0000)
committerNathan Wagner <nw@hydaspes.if.org>
Fri, 7 Sep 2018 00:02:28 +0000 (00:02 +0000)
src/c-client/auth_log.c [new file with mode: 0644]

diff --git a/src/c-client/auth_log.c b/src/c-client/auth_log.c
new file mode 100644 (file)
index 0000000..1e1b1b5
--- /dev/null
@@ -0,0 +1,117 @@
+/* ========================================================================
+ * Copyright 1988-2006 University of Washington
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ *     http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * 
+ * ========================================================================
+ */
+
+/*
+ * Program:    Login authenticator
+ *
+ * Author:     Mark Crispin
+ *             Networks and Distributed Computing
+ *             Computing & Communications
+ *             University of Washington
+ *             Administration Building, AG-44
+ *             Seattle, WA  98195
+ *             Internet: MRC@CAC.Washington.EDU
+ *
+ * Date:       5 December 1995
+ * Last Edited:        30 August 2006
+ */
+\f
+long auth_login_client (authchallenge_t challenger,authrespond_t responder,
+                       char *service,NETMBX *mb,void *stream,
+                       unsigned long *trial,char *user);
+char *auth_login_server (authresponse_t responder,int argc,char *argv[]);
+
+AUTHENTICATOR auth_log = {
+  AU_HIDE,                     /* hidden */
+  "LOGIN",                     /* authenticator name */
+  NIL,                         /* always valid */
+  auth_login_client,           /* client method */
+  auth_login_server,           /* server method */
+  NIL                          /* next authenticator */
+};
+
+#define PWD_USER "User Name"
+#define PWD_PWD "Password"
+\f
+/* Client authenticator
+ * Accepts: challenger function
+ *         responder function
+ *         SASL service name
+ *         parsed network mailbox structure
+ *         stream argument for functions
+ *         pointer to current trial count
+ *         returned user name
+ * Returns: T if success, NIL otherwise, number of trials incremented if retry
+ */
+
+long auth_login_client (authchallenge_t challenger,authrespond_t responder,
+                       char *service,NETMBX *mb,void *stream,
+                       unsigned long *trial,char *user)
+{
+  char pwd[MAILTMPLEN];
+  void *challenge;
+  unsigned long clen;
+  long ret = NIL;
+                               /* get user name prompt */
+  if (challenge = (*challenger) (stream,&clen)) {
+    fs_give ((void **) &challenge);
+    pwd[0] = NIL;              /* prompt user */
+    mm_login (mb,user,pwd,*trial);
+    if (!pwd[0]) {             /* user requested abort */
+      (*responder) (stream,NIL,0);
+      *trial = 0;              /* cancel subsequent attempts */
+      ret = LONGT;             /* will get a BAD response back */
+    }
+                               /* send user name */
+    else if ((*responder) (stream,user,strlen (user)) &&
+            (challenge = (*challenger) (stream,&clen))) {
+      fs_give ((void **) &challenge);
+                               /* send password */
+      if ((*responder) (stream,pwd,strlen (pwd))) {
+       if (challenge = (*challenger) (stream,&clen))
+         fs_give ((void **) &challenge);
+       else {
+         ++*trial;             /* can try again if necessary */
+         ret = LONGT;          /* check the authentication */
+       }
+      }
+    }
+  }
+  memset (pwd,0,MAILTMPLEN);   /* erase password */
+  if (!ret) *trial = 65535;    /* don't retry if bad protocol */
+  return ret;
+}
+
+
+/* Server authenticator
+ * Accepts: responder function
+ *         argument count
+ *         argument vector
+ * Returns: authenticated user name or NIL
+ */
+
+char *auth_login_server (authresponse_t responder,int argc,char *argv[])
+{
+  char *ret = NIL;
+  char *user,*pass,*authuser;
+  if (user = (*responder) (PWD_USER,sizeof (PWD_USER),NIL)) {
+    if (pass = (*responder) (PWD_PWD,sizeof (PWD_PWD),NIL)) {
+                               /* delimit user from possible admin */
+      if (authuser = strchr (user,'*')) *authuser++ = '\0';
+      if (server_login (user,pass,authuser,argc,argv)) ret = myusername ();
+      fs_give ((void **) &pass);
+    }
+    fs_give ((void **) &user);
+  }
+  return ret;
+}