]> granicus.if.org Git - uw-imap/commitdiff
add files for 2006-08-31T01:33:52Z
authorUnknown <>
Thu, 31 Aug 2006 01:33:52 +0000 (01:33 +0000)
committerNathan Wagner <nw@hydaspes.if.org>
Fri, 7 Sep 2018 00:02:32 +0000 (00:02 +0000)
src/osdep/unix/ckp_dce.c [new file with mode: 0644]

diff --git a/src/osdep/unix/ckp_dce.c b/src/osdep/unix/ckp_dce.c
new file mode 100644 (file)
index 0000000..2a3aed0
--- /dev/null
@@ -0,0 +1,83 @@
+/* ========================================================================
+ * Copyright 1988-2006 University of Washington
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ *     http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * 
+ * ========================================================================
+ */
+
+/*
+ * Program:    DCE check password
+ *
+ * Author:     Mark Crispin
+ *             Networks and Distributed Computing
+ *             Computing & Communications
+ *             University of Washington
+ *             Administration Building, AG-44
+ *             Seattle, WA  98195
+ *             Internet: MRC@CAC.Washington.EDU
+ *
+ * Date:       1 August 1988
+ * Last Edited:        30 August 2006
+ */
+\f
+/* Check password
+ * Accepts: login passwd struct
+ *         password string
+ *         argument count
+ *         argument vector
+ * Returns: passwd struct if password validated, NIL otherwise
+ */
+
+#include <dce/rpc.h>
+#include <dce/sec_login.h>
+
+struct passwd *checkpw (struct passwd *pw,char *pass,int argc,char *argv[])
+{
+  sec_passwd_rec_t pwr;
+  sec_login_handle_t lhdl;
+  boolean32 rstpwd;
+  sec_login_auth_src_t asrc;
+  error_status_t status;
+  FILE *fd;
+                               /* easy case */
+  if (pw->pw_passwd && pw->pw_passwd[0] && pw->pw_passwd[1] &&
+      !strcmp (pw->pw_passwd,(char *) crypt (pass,pw->pw_passwd))) return pw;
+                               /* try DCE password cache file */
+  if (fd = fopen (PASSWD_OVERRIDE,"r")) {
+    char *usr = cpystr (pw->pw_name);
+    while ((pw = fgetpwent (fd)) && strcmp (usr,pw->pw_name));
+    fclose (fd);               /* finished with cache file */
+                               /* validate cached password */
+    if (pw && pw->pw_passwd && pw->pw_passwd[0] && pw->pw_passwd[1] &&
+       !strcmp (pw->pw_passwd,(char *) crypt (pass,pw->pw_passwd))) {
+      fs_give ((void **) &usr);
+      return pw;
+    }
+    if (!pw) pw = getpwnam (usr);
+    fs_give ((void **) &usr);
+  }
+  if (pw) {                    /* try S-L-O-W DCE... */
+    sec_login_setup_identity ((unsigned_char_p_t) pw->pw_name,
+                             sec_login_no_flags,&lhdl,&status);
+    if (status == error_status_ok) {
+      pwr.key.tagged_union.plain = (idl_char *) pass;
+      pwr.key.key_type = sec_passwd_plain;
+      pwr.pepper = NIL;
+      pwr.version_number = sec_passwd_c_version_none;
+                               /* validate password with login context */
+      sec_login_validate_identity (lhdl,&pwr,&rstpwd,&asrc,&status);
+      if (!rstpwd && (asrc == sec_login_auth_src_network) &&
+         (status == error_status_ok)) {
+       sec_login_purge_context (&lhdl,&status);
+       if (status == error_status_ok) return pw;
+      }
+    }
+  }
+  return NIL;                  /* password validation failed */
+}