1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
|
/* This file is part of the Project Athena Zephyr Notification System.
* It contains source for the ZCheckAuthentication function.
*
* Created by: Robert French
*
* $Source$
* $Author$
*
* Copyright (c) 1987,1991 by the Massachusetts Institute of Technology.
* For copying and distribution information, see the file
* "mit-copyright.h".
*/
/* $Header$ */
#ifndef lint
static char rcsid_ZCheckAuthentication_c[] =
"$Zephyr: /mit/zephyr/src/lib/RCS/ZCheckAuthentication.c,v 1.14 89/03/24 14:17:38 jtkohl Exp Locker: raeburn $";
#endif
#include <zephyr/mit-copyright.h>
#include <sys/param.h>
#include <zephyr/zephyr_internal.h>
/* Check authentication of the notice.
If it looks authentic but fails the Kerberos check, return -1.
If it looks authentic and passes the Kerberos check, return 1.
If it doesn't look authentic, return 0
When not using Kerberos, return (looks-authentic-p)
*/
int ZCheckAuthentication(notice, from)
ZNotice_t *notice;
struct sockaddr_in *from;
{
#ifdef KERBEROS
int result;
char srcprincipal[ANAME_SZ+INST_SZ+REALM_SZ+4];
KTEXT_ST authent;
AUTH_DAT dat;
ZChecksum_t our_checksum;
CREDENTIALS cred;
if (!notice->z_auth)
return (ZAUTH_NO);
if (__Zephyr_server) {
/* XXX: This routine needs to know where the server ticket
file is! */
static char srvtab[MAXPATHLEN];
if (srvtab[0] == 0) {
strcpy (srvtab, Z_LIBDIR);
strcat (srvtab, "/srvtab");
}
if (notice->z_authent_len <= 0) /* bogus length */
return(ZAUTH_FAILED);
if (ZReadAscii(notice->z_ascii_authent,
strlen(notice->z_ascii_authent)+1,
(unsigned char *)authent.dat,
notice->z_authent_len) == ZERR_BADFIELD) {
return (ZAUTH_FAILED);
}
authent.length = notice->z_authent_len;
result = krb_rd_req(&authent, SERVER_SERVICE,
SERVER_INSTANCE, from->sin_addr.s_addr,
&dat, srvtab);
if (result == RD_AP_OK) {
(void) memcpy((char *)__Zephyr_session, (char *)dat.session,
sizeof(C_Block));
(void) sprintf(srcprincipal, "%s%s%s@%s", dat.pname,
dat.pinst[0]?".":"", dat.pinst, dat.prealm);
if (strcmp(srcprincipal, notice->z_sender))
return (ZAUTH_FAILED);
return(ZAUTH_YES);
} else
return (ZAUTH_FAILED); /* didn't decode correctly */
}
if (result = krb_get_cred(SERVER_SERVICE, SERVER_INSTANCE,
__Zephyr_realm, &cred))
return (ZAUTH_NO);
#ifdef NOENCRYPTION
our_checksum = 0;
#else
our_checksum = (ZChecksum_t)des_quad_cksum(notice->z_packet, NULL,
notice->z_default_format+
strlen(notice->z_default_format)+1-
notice->z_packet, 0, cred.session);
#endif
/* if mismatched checksum, then the packet was corrupted */
return ((our_checksum == notice->z_checksum) ? ZAUTH_YES : ZAUTH_FAILED);
#else
return (notice->z_auth ? ZAUTH_YES : ZAUTH_NO);
#endif
}
|