Welcome a trimmed version of OpenSSH-4.1p1 in the tree.
[dragonfly.git] / crypto / openssh-4 / auth2-none.c
blob1c30a3203e1f94c528a88590d7141d677a40eeb6
1 /*
2 * Copyright (c) 2000 Markus Friedl. All rights reserved.
4 * Redistribution and use in source and binary forms, with or without
5 * modification, are permitted provided that the following conditions
6 * are met:
7 * 1. Redistributions of source code must retain the above copyright
8 * notice, this list of conditions and the following disclaimer.
9 * 2. Redistributions in binary form must reproduce the above copyright
10 * notice, this list of conditions and the following disclaimer in the
11 * documentation and/or other materials provided with the distribution.
13 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
14 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
15 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
16 * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
17 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
18 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
19 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
20 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
21 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
22 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
25 #include "includes.h"
26 RCSID("$OpenBSD: auth2-none.c,v 1.7 2004/05/11 19:01:43 deraadt Exp $");
28 #include "auth.h"
29 #include "xmalloc.h"
30 #include "packet.h"
31 #include "log.h"
32 #include "servconf.h"
33 #include "atomicio.h"
34 #include "compat.h"
35 #include "ssh2.h"
36 #include "monitor_wrap.h"
38 /* import */
39 extern ServerOptions options;
41 /* "none" is allowed only one time */
42 static int none_enabled = 1;
44 char *
45 auth2_read_banner(void)
47 struct stat st;
48 char *banner = NULL;
49 size_t len, n;
50 int fd;
52 if ((fd = open(options.banner, O_RDONLY)) == -1)
53 return (NULL);
54 if (fstat(fd, &st) == -1) {
55 close(fd);
56 return (NULL);
58 if (st.st_size > 1*1024*1024) {
59 close(fd);
60 return (NULL);
63 len = (size_t)st.st_size; /* truncate */
64 banner = xmalloc(len + 1);
65 n = atomicio(read, fd, banner, len);
66 close(fd);
68 if (n != len) {
69 xfree(banner);
70 return (NULL);
72 banner[n] = '\0';
74 return (banner);
77 void
78 userauth_send_banner(const char *msg)
80 if (datafellows & SSH_BUG_BANNER)
81 return;
83 packet_start(SSH2_MSG_USERAUTH_BANNER);
84 packet_put_cstring(msg);
85 packet_put_cstring(""); /* language, unused */
86 packet_send();
87 debug("%s: sent", __func__);
90 static void
91 userauth_banner(void)
93 char *banner = NULL;
95 if (options.banner == NULL || (datafellows & SSH_BUG_BANNER))
96 return;
98 if ((banner = PRIVSEP(auth2_read_banner())) == NULL)
99 goto done;
100 userauth_send_banner(banner);
102 done:
103 if (banner)
104 xfree(banner);
107 static int
108 userauth_none(Authctxt *authctxt)
110 none_enabled = 0;
111 packet_check_eom();
112 userauth_banner();
113 #ifdef HAVE_CYGWIN
114 if (check_nt_auth(1, authctxt->pw) == 0)
115 return (0);
116 #endif
117 if (options.password_authentication)
118 return (PRIVSEP(auth_password(authctxt, "")));
119 return (0);
122 Authmethod method_none = {
123 "none",
124 userauth_none,
125 &none_enabled