mirror of
git://anongit.mindrot.org/openssh.git
synced 2024-12-24 02:42:25 +00:00
d1d301a1dd
Apparently some NIS implementations can leave pw->pw_passwd (or the shadow equivalent) NULL. bz#2909; based on patch from Todd Eigenschink
164 lines
4.3 KiB
C
164 lines
4.3 KiB
C
/*
|
|
* Copyright (c) 2003 Ben Lindstrom. All rights reserved.
|
|
*
|
|
* Redistribution and use in source and binary forms, with or without
|
|
* modification, are permitted provided that the following conditions
|
|
* are met:
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
* notice, this list of conditions and the following disclaimer.
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
* documentation and/or other materials provided with the distribution.
|
|
*
|
|
* THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
|
|
* IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
|
|
* OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
|
|
* IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
|
|
* INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
|
|
* NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
|
|
* DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
|
|
* THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
|
|
* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
|
|
* THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
*/
|
|
|
|
#include "includes.h"
|
|
|
|
#include <sys/types.h>
|
|
#include <string.h>
|
|
#include <unistd.h>
|
|
#include <pwd.h>
|
|
|
|
# if defined(HAVE_CRYPT_H) && !defined(HAVE_SECUREWARE)
|
|
# include <crypt.h>
|
|
# endif
|
|
|
|
# ifdef __hpux
|
|
# include <hpsecurity.h>
|
|
# include <prot.h>
|
|
# endif
|
|
|
|
# ifdef HAVE_SECUREWARE
|
|
# include <sys/security.h>
|
|
# include <sys/audit.h>
|
|
# include <prot.h>
|
|
# endif
|
|
|
|
# if defined(HAVE_SHADOW_H) && !defined(DISABLE_SHADOW)
|
|
# include <shadow.h>
|
|
# endif
|
|
|
|
# if defined(HAVE_GETPWANAM) && !defined(DISABLE_SHADOW)
|
|
# include <sys/label.h>
|
|
# include <sys/audit.h>
|
|
# include <pwdadj.h>
|
|
# endif
|
|
|
|
# if defined(HAVE_MD5_PASSWORDS) && !defined(HAVE_MD5_CRYPT)
|
|
# include "md5crypt.h"
|
|
# endif
|
|
|
|
# if defined(WITH_OPENSSL) && !defined(HAVE_CRYPT) && defined(HAVE_DES_CRYPT)
|
|
# include <openssl/des.h>
|
|
# define crypt DES_crypt
|
|
# endif
|
|
|
|
/*
|
|
* Pick an appropriate password encryption type and salt for the running
|
|
* system by searching through accounts until we find one that has a valid
|
|
* salt. Usually this will be root unless the root account is locked out.
|
|
* If we don't find one we return a traditional DES-based salt.
|
|
*/
|
|
static const char *
|
|
pick_salt(void)
|
|
{
|
|
struct passwd *pw;
|
|
char *passwd, *p;
|
|
size_t typelen;
|
|
static char salt[32];
|
|
|
|
if (salt[0] != '\0')
|
|
return salt;
|
|
strlcpy(salt, "xx", sizeof(salt));
|
|
setpwent();
|
|
while ((pw = getpwent()) != NULL) {
|
|
if ((passwd = shadow_pw(pw)) == NULL)
|
|
continue;
|
|
if (passwd[0] == '$' && (p = strrchr(passwd+1, '$')) != NULL) {
|
|
typelen = p - passwd + 1;
|
|
strlcpy(salt, passwd, MIN(typelen, sizeof(salt)));
|
|
explicit_bzero(passwd, strlen(passwd));
|
|
goto out;
|
|
}
|
|
}
|
|
out:
|
|
endpwent();
|
|
return salt;
|
|
}
|
|
|
|
char *
|
|
xcrypt(const char *password, const char *salt)
|
|
{
|
|
char *crypted;
|
|
|
|
/*
|
|
* If we don't have a salt we are encrypting a fake password for
|
|
* for timing purposes. Pick an appropriate salt.
|
|
*/
|
|
if (salt == NULL)
|
|
salt = pick_salt();
|
|
|
|
# ifdef HAVE_MD5_PASSWORDS
|
|
if (is_md5_salt(salt))
|
|
crypted = md5_crypt(password, salt);
|
|
else
|
|
crypted = crypt(password, salt);
|
|
# elif defined(__hpux) && !defined(HAVE_SECUREWARE)
|
|
if (iscomsec())
|
|
crypted = bigcrypt(password, salt);
|
|
else
|
|
crypted = crypt(password, salt);
|
|
# elif defined(HAVE_SECUREWARE)
|
|
crypted = bigcrypt(password, salt);
|
|
# else
|
|
crypted = crypt(password, salt);
|
|
# endif
|
|
|
|
return crypted;
|
|
}
|
|
|
|
/*
|
|
* Handle shadowed password systems in a cleaner way for portable
|
|
* version.
|
|
*/
|
|
|
|
char *
|
|
shadow_pw(struct passwd *pw)
|
|
{
|
|
char *pw_password = pw->pw_passwd;
|
|
|
|
# if defined(HAVE_SHADOW_H) && !defined(DISABLE_SHADOW)
|
|
struct spwd *spw = getspnam(pw->pw_name);
|
|
|
|
if (spw != NULL)
|
|
pw_password = spw->sp_pwdp;
|
|
# endif
|
|
|
|
#ifdef USE_LIBIAF
|
|
return(get_iaf_password(pw));
|
|
#endif
|
|
|
|
# if defined(HAVE_GETPWANAM) && !defined(DISABLE_SHADOW)
|
|
struct passwd_adjunct *spw;
|
|
if (issecure() && (spw = getpwanam(pw->pw_name)) != NULL)
|
|
pw_password = spw->pwa_passwd;
|
|
# elif defined(HAVE_SECUREWARE)
|
|
struct pr_passwd *spw = getprpwnam(pw->pw_name);
|
|
|
|
if (spw != NULL)
|
|
pw_password = spw->ufld.fd_encrypt;
|
|
# endif
|
|
|
|
return pw_password;
|
|
}
|