rev |
line source |
yuuji@0
|
1 /* ========================================================================
|
yuuji@0
|
2 * Copyright 1988-2006 University of Washington
|
yuuji@0
|
3 *
|
yuuji@0
|
4 * Licensed under the Apache License, Version 2.0 (the "License");
|
yuuji@0
|
5 * you may not use this file except in compliance with the License.
|
yuuji@0
|
6 * You may obtain a copy of the License at
|
yuuji@0
|
7 *
|
yuuji@0
|
8 * http://www.apache.org/licenses/LICENSE-2.0
|
yuuji@0
|
9 *
|
yuuji@0
|
10 *
|
yuuji@0
|
11 * ========================================================================
|
yuuji@0
|
12 */
|
yuuji@0
|
13
|
yuuji@0
|
14 /*
|
yuuji@0
|
15 * Program: Login authenticator
|
yuuji@0
|
16 *
|
yuuji@0
|
17 * Author: Mark Crispin
|
yuuji@0
|
18 * Networks and Distributed Computing
|
yuuji@0
|
19 * Computing & Communications
|
yuuji@0
|
20 * University of Washington
|
yuuji@0
|
21 * Administration Building, AG-44
|
yuuji@0
|
22 * Seattle, WA 98195
|
yuuji@0
|
23 * Internet: MRC@CAC.Washington.EDU
|
yuuji@0
|
24 *
|
yuuji@0
|
25 * Date: 5 December 1995
|
yuuji@0
|
26 * Last Edited: 30 August 2006
|
yuuji@0
|
27 */
|
yuuji@0
|
28
|
yuuji@0
|
29 long auth_login_client (authchallenge_t challenger,authrespond_t responder,
|
yuuji@0
|
30 char *service,NETMBX *mb,void *stream,
|
yuuji@0
|
31 unsigned long *trial,char *user);
|
yuuji@0
|
32 char *auth_login_server (authresponse_t responder,int argc,char *argv[]);
|
yuuji@0
|
33
|
yuuji@0
|
34 AUTHENTICATOR auth_log = {
|
yuuji@0
|
35 AU_HIDE, /* hidden */
|
yuuji@0
|
36 "LOGIN", /* authenticator name */
|
yuuji@0
|
37 NIL, /* always valid */
|
yuuji@0
|
38 auth_login_client, /* client method */
|
yuuji@0
|
39 auth_login_server, /* server method */
|
yuuji@0
|
40 NIL /* next authenticator */
|
yuuji@0
|
41 };
|
yuuji@0
|
42
|
yuuji@0
|
43 #define PWD_USER "User Name"
|
yuuji@0
|
44 #define PWD_PWD "Password"
|
yuuji@0
|
45
|
yuuji@0
|
46 /* Client authenticator
|
yuuji@0
|
47 * Accepts: challenger function
|
yuuji@0
|
48 * responder function
|
yuuji@0
|
49 * SASL service name
|
yuuji@0
|
50 * parsed network mailbox structure
|
yuuji@0
|
51 * stream argument for functions
|
yuuji@0
|
52 * pointer to current trial count
|
yuuji@0
|
53 * returned user name
|
yuuji@0
|
54 * Returns: T if success, NIL otherwise, number of trials incremented if retry
|
yuuji@0
|
55 */
|
yuuji@0
|
56
|
yuuji@0
|
57 long auth_login_client (authchallenge_t challenger,authrespond_t responder,
|
yuuji@0
|
58 char *service,NETMBX *mb,void *stream,
|
yuuji@0
|
59 unsigned long *trial,char *user)
|
yuuji@0
|
60 {
|
yuuji@0
|
61 char pwd[MAILTMPLEN];
|
yuuji@0
|
62 void *challenge;
|
yuuji@0
|
63 unsigned long clen;
|
yuuji@0
|
64 long ret = NIL;
|
yuuji@0
|
65 /* get user name prompt */
|
yuuji@0
|
66 if (challenge = (*challenger) (stream,&clen)) {
|
yuuji@0
|
67 fs_give ((void **) &challenge);
|
yuuji@0
|
68 pwd[0] = NIL; /* prompt user */
|
yuuji@0
|
69 mm_login (mb,user,pwd,*trial);
|
yuuji@0
|
70 if (!pwd[0]) { /* user requested abort */
|
yuuji@0
|
71 (*responder) (stream,NIL,0);
|
yuuji@0
|
72 *trial = 0; /* cancel subsequent attempts */
|
yuuji@0
|
73 ret = LONGT; /* will get a BAD response back */
|
yuuji@0
|
74 }
|
yuuji@0
|
75 /* send user name */
|
yuuji@0
|
76 else if ((*responder) (stream,user,strlen (user)) &&
|
yuuji@0
|
77 (challenge = (*challenger) (stream,&clen))) {
|
yuuji@0
|
78 fs_give ((void **) &challenge);
|
yuuji@0
|
79 /* send password */
|
yuuji@0
|
80 if ((*responder) (stream,pwd,strlen (pwd))) {
|
yuuji@0
|
81 if (challenge = (*challenger) (stream,&clen))
|
yuuji@0
|
82 fs_give ((void **) &challenge);
|
yuuji@0
|
83 else {
|
yuuji@0
|
84 ++*trial; /* can try again if necessary */
|
yuuji@0
|
85 ret = LONGT; /* check the authentication */
|
yuuji@0
|
86 }
|
yuuji@0
|
87 }
|
yuuji@0
|
88 }
|
yuuji@0
|
89 }
|
yuuji@0
|
90 memset (pwd,0,MAILTMPLEN); /* erase password */
|
yuuji@0
|
91 if (!ret) *trial = 65535; /* don't retry if bad protocol */
|
yuuji@0
|
92 return ret;
|
yuuji@0
|
93 }
|
yuuji@0
|
94
|
yuuji@0
|
95
|
yuuji@0
|
96 /* Server authenticator
|
yuuji@0
|
97 * Accepts: responder function
|
yuuji@0
|
98 * argument count
|
yuuji@0
|
99 * argument vector
|
yuuji@0
|
100 * Returns: authenticated user name or NIL
|
yuuji@0
|
101 */
|
yuuji@0
|
102
|
yuuji@0
|
103 char *auth_login_server (authresponse_t responder,int argc,char *argv[])
|
yuuji@0
|
104 {
|
yuuji@0
|
105 char *ret = NIL;
|
yuuji@0
|
106 char *user,*pass,*authuser;
|
yuuji@0
|
107 if (user = (*responder) (PWD_USER,sizeof (PWD_USER),NIL)) {
|
yuuji@4
|
108 #ifdef QMAIL
|
yuuji@4
|
109 extern char* conv_virtualdomain(char*);
|
yuuji@4
|
110 user = conv_virtualdomain(user);
|
yuuji@4
|
111 #endif
|
yuuji@0
|
112 if (pass = (*responder) (PWD_PWD,sizeof (PWD_PWD),NIL)) {
|
yuuji@0
|
113 /* delimit user from possible admin */
|
yuuji@0
|
114 if (authuser = strchr (user,'*')) *authuser++ = '\0';
|
yuuji@0
|
115 if (server_login (user,pass,authuser,argc,argv)) ret = myusername ();
|
yuuji@0
|
116 fs_give ((void **) &pass);
|
yuuji@0
|
117 }
|
yuuji@0
|
118 fs_give ((void **) &user);
|
yuuji@0
|
119 }
|
yuuji@0
|
120 return ret;
|
yuuji@0
|
121 }
|