/src/zsrelay/auth-pwd.c

https://github.com/Shirk/zsrelay · C · 259 lines · 159 code · 49 blank · 51 comment · 55 complexity · 2f1fbea10b55f567adadd7053598e28f MD5 · raw file

  1. /*
  2. This file is part of zsrelay a srelay port for the iPhone.
  3. Copyright (C) 2008 Rene Koecher <shirk@bitspin.org>
  4. Based on srelay 0.4.6 source base Copyright (C) 2001 Tomo.M
  5. Destributed under the GPL license with original authors permission.
  6. zsrelay is free software: you can redistribute it and/or modify
  7. it under the terms of the GNU General Public License as published by
  8. the Free Software Foundation, either version 3 of the License, or (at
  9. your option) any later version.
  10. This program is distributed in the hope that it will be useful, but
  11. WITHOUT ANY WARRANTY; without even the implied warranty of
  12. MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
  13. General Public License for more details.
  14. You should have received a copy of the GNU General Public License
  15. along with this program. If not, see <http://www.gnu.org/licenses/>.
  16. */
  17. #include "zsrelay.h"
  18. #if defined(FREEBSD) || defined(LINUX)
  19. #include <pwd.h>
  20. #elif SOLARIS
  21. #include <shadow.h>
  22. #include <crypt.h>
  23. #endif
  24. #define TIMEOUTSEC 30
  25. /* proto types */
  26. int checkpasswd(char *, char *);
  27. int
  28. auth_pwd_server(int s)
  29. {
  30. char buf[512];
  31. int r, len;
  32. char user[256];
  33. char pass[256];
  34. struct sockaddr_storage client;
  35. char client_ip[NI_MAXHOST];
  36. int error = 0;
  37. int code = 0;
  38. r = timerd_read(s, buf, sizeof(buf), TIMEOUTSEC, MSG_PEEK);
  39. if ( r < 2 )
  40. return(-1);
  41. if (buf[0] != 0x01) /* current username/password auth version */
  42. /* error in version */
  43. return(-1);
  44. len = buf[1];
  45. if (len < 1 || len > 255)
  46. /* invalid username len */
  47. return(-1);
  48. /* read username */
  49. r = timerd_read(s, buf, 2+len, TIMEOUTSEC, 0);
  50. if (r < 2+len)
  51. /* read error */
  52. return(-1);
  53. strncpy(user, &buf[2], len);
  54. user[len] = '\0';
  55. /* get passwd */
  56. r = timerd_read(s, buf, sizeof(buf), TIMEOUTSEC, MSG_PEEK);
  57. if ( r < 1 )
  58. return(-1);
  59. len = buf[0];
  60. if (len < 1 || len > 255)
  61. /* invalid password len */
  62. return(-1);
  63. /* read passwd */
  64. r = timerd_read(s, buf, 1+len, TIMEOUTSEC, 0);
  65. if (r < 1+len)
  66. /* read error */
  67. return(-1);
  68. strncpy(pass, &buf[1], len);
  69. pass[len] = '\0';
  70. /* do authentication */
  71. r = checkpasswd(user, pass);
  72. /* logging */
  73. len = sizeof(struct sockaddr_storage);
  74. if (getpeername(s, (struct sockaddr *)&client, &len) != 0)
  75. client_ip[0] = '\0';
  76. else
  77. {
  78. error = getnameinfo((struct sockaddr *)&client, len,
  79. client_ip, sizeof(client_ip),
  80. NULL, 0, NI_NUMERICHOST);
  81. if (error)
  82. client_ip[0] = '\0';
  83. }
  84. msg_out(norm, "%s 5-U/P_AUTH %s %s.", client_ip,
  85. user, r == 0 ? "accepted" : "denied");
  86. /* erace uname and passwd storage */
  87. memset(user, 0, sizeof(user));
  88. memset(pass, 0, sizeof(pass));
  89. code = ( r == 0 ? 0 : -1 );
  90. /* reply to client */
  91. buf[0] = 0x01; /* sub negotiation version */
  92. buf[1] = code & 0xff; /* grant or not */
  93. r = timerd_write(s, buf, 2, TIMEOUTSEC);
  94. if (r < 2)
  95. /* write error */
  96. return(-1);
  97. return(code); /* access granted or not */
  98. }
  99. int
  100. auth_pwd_client(int s, int ind)
  101. {
  102. char buf[640];
  103. int r, ulen, plen;
  104. FILE *fp;
  105. char user[256];
  106. char pass[256];
  107. /* get username/password */
  108. setreuid(PROCUID, 0);
  109. fp = fopen(pwdfile, "r");
  110. setreuid(0, PROCUID);
  111. if ( fp == NULL )
  112. /* cannot open pwdfile */
  113. return(-1);
  114. r = readpasswd(fp, ind,
  115. user, sizeof(user)-1, pass, sizeof(pass)-1);
  116. fclose(fp);
  117. if ( r != 0)
  118. /* no matching entry found or error */
  119. goto err_ret;
  120. ulen = strlen(user);
  121. if ( ulen < 1 || ulen > 255)
  122. /* invalid user name length */
  123. goto err_ret;
  124. plen = strlen(pass);
  125. if ( plen < 1 || plen > 255 )
  126. /* invalid password length */
  127. goto err_ret;
  128. /* build auth data */
  129. buf[0] = 0x01;
  130. buf[1] = ulen & 0xff;
  131. memcpy(&buf[2], user, ulen);
  132. buf[2+ulen] = plen & 0xff;
  133. memcpy(&buf[2+ulen+1], pass, plen);
  134. r = timerd_write(s, buf, 3+ulen+plen, TIMEOUTSEC);
  135. if (r < 3+ulen+plen)
  136. /* cannot write */
  137. goto err_ret;
  138. /* get server reply */
  139. r = timerd_read(s, buf, 2, TIMEOUTSEC, 0);
  140. if (r < 2)
  141. /* cannot read */
  142. goto err_ret;
  143. if (buf[0] == 0x01 && buf[1] == 0)
  144. /* username/passwd auth succeded */
  145. return(0);
  146. err_ret:
  147. /* erace uname and passwd storage */
  148. memset(user, 0, sizeof(user));
  149. memset(pass, 0, sizeof(pass));
  150. return(-1);
  151. }
  152. int
  153. checkpasswd(char *user, char *pass)
  154. {
  155. #if defined(FREEBSD) || defined(LINUX)
  156. struct passwd *pwd;
  157. #elif SOLARIS
  158. struct spwd *spwd, sp;
  159. char buf[512];
  160. #endif
  161. int matched = 0;
  162. if (user == NULL)
  163. /* user must be specified */
  164. return(-1);
  165. #if defined(FREEBSD) || defined(LINUX)
  166. setreuid(PROCUID, 0);
  167. pwd = getpwnam(user);
  168. setreuid(0, PROCUID);
  169. if (pwd == NULL)
  170. /* error in getpwnam */
  171. return(-1);
  172. if (pwd->pw_passwd == NULL && pass == NULL)
  173. /* null password matched */
  174. return(0);
  175. if (*pwd->pw_passwd)
  176. {
  177. if (strcmp(pwd->pw_passwd, crypt(pass, pwd->pw_passwd)) == 0)
  178. matched = 1;
  179. }
  180. memset(pwd->pw_passwd, 0, strlen(pwd->pw_passwd));
  181. #elif SOLARIS
  182. setreuid(PROCUID, 0);
  183. spwd = getspnam_r(user, &sp, buf, sizeof buf);
  184. setreuid(0, PROCUID);
  185. if (spwd == NULL)
  186. /* error in getspnam */
  187. return(-1);
  188. if (spwd->sp_pwdp == NULL && pass == NULL)
  189. /* null password matched */
  190. return(0);
  191. if (*spwd->sp_pwdp)
  192. {
  193. if (strcmp(spwd->sp_pwdp, crypt(pass, spwd->sp_pwdp)) == 0)
  194. matched = 1;
  195. }
  196. memset(spwd->sp_pwdp, 0, strlen(spwd->sp_pwdp));
  197. #endif
  198. #if defined(FREEBSD) || defined(SOLARIS)
  199. if (matched)
  200. return(0);
  201. else
  202. return(-1);
  203. #endif
  204. return(0);
  205. }