1
0
This repository has been archived on 2024-07-22. You can view files and clone it, but cannot push or open issues or pull requests.
TP-Link_Archer-XR500v/BBA1.5_platform/apps/public/dropbear/svr-authpasswd.c
2024-07-22 01:58:46 -03:00

296 lines
8.0 KiB
C
Raw Permalink Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

/*
* Dropbear - a SSH2 server
*
* Copyright (c) 2002,2003 Matt Johnston
* All rights reserved.
*
* Permission is hereby granted, free of charge, to any person obtaining a copy
* of this software and associated documentation files (the "Software"), to deal
* in the Software without restriction, including without limitation the rights
* to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
* copies of the Software, and to permit persons to whom the Software is
* furnished to do so, subject to the following conditions:
*
* The above copyright notice and this permission notice shall be included in
* all copies or substantial portions of the Software.
*
* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
* IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
* FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
* AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
* LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
* OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
* SOFTWARE. */
/* Validates a user password */
#include "includes.h"
#include "session.h"
#include "buffer.h"
#include "dbutil.h"
#include "auth.h"
#include "md5.h"
#include "md5_interface.h"
enum TETHER_LOGIN_MODE
{
TETHER_LOGIN_MODE_OLD = 1,
TETHER_LOGIN_MODE_NEW = 2
};
#ifdef ENABLE_SVR_PASSWORD_AUTH
/* Process a password auth request, sending success or failure messages as
* appropriate */
void svr_auth_password() {
#ifdef HAVE_SHADOW_H
struct spwd *spasswd = NULL;
#endif
char * passwdcrypt = NULL; /* the crypt from /etc/passwd or /etc/shadow */
char * testcrypt = NULL; /* crypt generated from the user's password sent */
unsigned char * password;
int success_blank = 0;
unsigned int passwordlen;
unsigned int changepw;
passwdcrypt = ses.authstate.pw_passwd;
#ifdef HAVE_SHADOW_H
/* get the shadow password if possible */
spasswd = getspnam(ses.authstate.pw_name);
if (spasswd != NULL && spasswd->sp_pwdp != NULL) {
passwdcrypt = spasswd->sp_pwdp;
}
#endif
#ifdef DEBUG_HACKCRYPT
/* debugging crypt for non-root testing with shadows */
passwdcrypt = DEBUG_HACKCRYPT;
#endif
/* check if client wants to change password */
changepw = buf_getbool(ses.payload);
if (changepw) {
/* not implemented by this server */
send_msg_userauth_failure(0, 1);
return;
}
password = buf_getstring(ses.payload, &passwordlen);
/* the first bytes of passwdcrypt are the salt */
testcrypt = crypt((char*)password, passwdcrypt);
m_burn(password, passwordlen);
m_free(password);
/* check for empty password */
if (passwdcrypt[0] == '\0') {
#ifdef ALLOW_BLANK_PASSWORD
if (passwordlen == 0) {
success_blank = 1;
}
#else
dropbear_log(LOG_WARNING, "User '%s' has blank password, rejected",
ses.authstate.pw_name);
send_msg_userauth_failure(0, 1);
return;
#endif
}
if (success_blank || strcmp(testcrypt, passwdcrypt) == 0) {
/* successful authentication */
dropbear_log(LOG_NOTICE,
"Password auth succeeded for '%s' from %s",
ses.authstate.pw_name,
svr_ses.addrstring);
send_msg_userauth_success();
} else {
dropbear_log(LOG_WARNING,
"Bad password attempt for '%s' from %s",
ses.authstate.pw_name,
svr_ses.addrstring);
send_msg_userauth_failure(0, 1);
}
}
#if DROPBEAR_PWD
//<2F><><EFBFBD><EFBFBD><EFBFBD>ַ<EFBFBD><D6B7><EFBFBD><EFBFBD><EFBFBD>ʽΪ"00010A..."<22><>ÿ<EFBFBD><C3BF><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>һ<EFBFBD><D2BB><EFBFBD><EFBFBD>32<33>ֽ<EFBFBD>
/* !!! Can NOT be static, why??? */
void hexString2Md5Digest(unsigned char *md5Pswd)
{
unsigned int index = 0;
unsigned int val = 0;
unsigned char md5_password[MD5_DIGEST_LEN] = {0};
for (index = 0; index < MD5_DIGEST_LEN; ++index)
{
/* sscanf requires md5Pswd be '\0' terminated */
sscanf(md5Pswd + 2 * index, "%02x", &val);
*(md5_password + index) = val;
}
memcpy(md5Pswd, md5_password, MD5_DIGEST_LEN);
}
void svr_chk_pwd(const char* username, const char* pwdfile)
{
char isFactoryDefault = 'n';
char svr_username[MD5_DIGEST_LEN + 1] = {0};
unsigned char svr_password[MD5_DIGEST_LEN*2 + 1] = {0};
unsigned char * password;
unsigned int passwordlen;
unsigned int changepw;
unsigned int loginMode = 0;
/* dingcheng:add for service auth */
#if ALLOW_SERVICE_AUTH
char servicename[ALLOW_SERVICE_TYPENUM][MD5_DIGEST_LEN + 1] = {{0}};
char servicepwd[ALLOW_SERVICE_TYPENUM][MD5_DIGEST_LEN*2 + 1] = {{0}};
int index = 0;
int i = 0;
#endif/* ALLOW_SERVICE_AUTH */
/* end added */
FILE *auth_file = NULL;
char *szLine = NULL;
int len = 0;
char *szPos = NULL;
if (!(auth_file = fopen(pwdfile, "r")))
return ;
while (getline(&szLine, &len, auth_file) != -1)
{
if(szLine[strlen(szLine) - 1] == '\n')
{
szLine[strlen(szLine) - 1] = '\0';
}
szPos = strchr(szLine, ':');
if( szPos != NULL)
{
szPos++;
if(strncmp( "username", szLine, strlen("username")) == 0)
{
strncpy(svr_username, szPos, MD5_DIGEST_LEN);
svr_username[strlen(szPos)] = '\0';
}
else if(strncmp( "password", szLine, strlen("password")) == 0)
{
strncpy(svr_password, szPos, MD5_DIGEST_LEN*2);
svr_password[strlen(szPos)] = '\0';
hexString2Md5Digest(svr_password);
}
else if (strncmp("isFactoryDefault", szLine, strlen("isFactoryDefault")) == 0)
{
memcpy(&isFactoryDefault, szPos, 1);
}
else if (strncmp("loginMode", szLine, strlen("loginMode")) == 0)
{
sscanf(szLine, "loginMode:%u\n", &loginMode);
}
/* dingcheng:add for service auth */
#if ALLOW_SERVICE_AUTH
else if(strncmp( "servicename", szLine, strlen("servicename")) == 0)
{
strncpy(servicename[index], szPos, MD5_DIGEST_LEN);
servicename[index][strlen(szPos)] = '\0';
}
if(strncmp( "servicepwd", szLine, strlen("servicepwd")) == 0)
{
strncpy(servicepwd[index], szPos, MD5_DIGEST_LEN*2);
servicepwd[index][strlen(szPos)] = '\0';
hexString2Md5Digest(servicepwd[index]);
if (index < ALLOW_SERVICE_TYPENUM - 1)
{
index ++;
}
}
#endif/* ALLOW_SERVICE_AUTH */
/* end added */
}
}
fclose(auth_file);
/* check if client wants to change password */
changepw = buf_getbool(ses.payload);
if (changepw) {
/* not implemented by this server */
send_msg_userauth_failure(0, 1);
return;
}
password = buf_getstring(ses.payload, &passwordlen);
/* dingcheng:add for service auth */
#if ALLOW_SERVICE_AUTH
for (i = 0;i <= index;i++)
{
TRACE(("username %s servicename %s password %s",username,servicename[i],
password))
if (strncmp(username, servicename[i], strlen(username)) == 0 &&
md5_verify_digest( servicepwd[i], password, strlen(password))
)
{
TRACE(("svr_chk_pwd send_msg_userauth_success"))
dropbear_log(LOG_NOTICE,
"Password auth succeeded for '%s' from %s",
username,
svr_ses.addrstring);
send_msg_userauth_success();
strncpy(ses.mark,servicename[i],MD5_DIGEST_LEN);
ses.mark[strlen(servicename[i])] = '\0';
goto out;
}
}
#endif/* ALLOW_SERVICE_AUTH */
/* end added */
if ((loginMode == TETHER_LOGIN_MODE_NEW) && (isFactoryDefault == 'y'))
{
TRACE(("svr_chk_pwd send_msg_userauth_success"))
send_msg_userauth_success();
#if ALLOW_SERVICE_AUTH
strncpy(ses.mark, "admin", 5);
ses.mark[5] = '\0';
#endif/* ALLOW_SERVICE_AUTH */
}
else if ((loginMode == TETHER_LOGIN_MODE_OLD) || (isFactoryDefault == 'n'))
{
if( (strlen(username) == strlen(svr_username)) &&
strncmp(username, svr_username, strlen(username)) == 0 &&
md5_verify_digest( svr_password, password, strlen(password) ) )
{
TRACE(("svr_chk_pwd send_msg_userauth_success"))
dropbear_log(LOG_NOTICE,
"Password auth succeeded for '%s' from %s",
username,
svr_ses.addrstring);
send_msg_userauth_success();
/* dingcheng:add for service auth */
#if ALLOW_SERVICE_AUTH
strncpy(ses.mark,"admin",5);
ses.mark[5] = '\0';
#endif/* ALLOW_SERVICE_AUTH */
/* end added */
}
else
{
TRACE(("svr_chk_pwd send_msg_userauth_failure"))
dropbear_log(LOG_WARNING,
"Bad password attempt for '%s' from %s",
username,
svr_ses.addrstring);
send_msg_userauth_failure(0, 1);
}
}
out:
m_burn(password, passwordlen);
m_free(password);
}
#endif
#endif