summaryrefslogtreecommitdiff
path: root/monitor_wrap.c
diff options
context:
space:
mode:
authorColin Watson <cjwatson@debian.org>2018-04-03 08:20:28 +0100
committerColin Watson <cjwatson@debian.org>2018-04-03 08:20:28 +0100
commited6ae9c1a014a08ff5db3d768f01f2e427eeb476 (patch)
tree601025e307745d351946c01ab13f419ddb6dae29 /monitor_wrap.c
parent62f54f20bf351468e0124f63cc2902ee40d9b0e9 (diff)
parenta0349a1cc4a18967ad1dbff5389bcdf9da098814 (diff)
Import openssh_7.7p1.orig.tar.gz
Diffstat (limited to 'monitor_wrap.c')
-rw-r--r--monitor_wrap.c56
1 files changed, 31 insertions, 25 deletions
diff --git a/monitor_wrap.c b/monitor_wrap.c
index 69212aaf3..9666bda4b 100644
--- a/monitor_wrap.c
+++ b/monitor_wrap.c
@@ -1,4 +1,4 @@
1/* $OpenBSD: monitor_wrap.c,v 1.94 2017/10/02 19:33:20 djm Exp $ */ 1/* $OpenBSD: monitor_wrap.c,v 1.99 2018/03/03 03:15:51 djm Exp $ */
2/* 2/*
3 * Copyright 2002 Niels Provos <provos@citi.umich.edu> 3 * Copyright 2002 Niels Provos <provos@citi.umich.edu>
4 * Copyright 2002 Markus Friedl <markus@openbsd.org> 4 * Copyright 2002 Markus Friedl <markus@openbsd.org>
@@ -76,7 +76,6 @@
76#include "atomicio.h" 76#include "atomicio.h"
77#include "monitor_fdpass.h" 77#include "monitor_fdpass.h"
78#include "misc.h" 78#include "misc.h"
79#include "uuencode.h"
80 79
81#include "channels.h" 80#include "channels.h"
82#include "session.h" 81#include "session.h"
@@ -287,19 +286,15 @@ out:
287 newopts->x = buffer_get_string(&m, NULL); \ 286 newopts->x = buffer_get_string(&m, NULL); \
288 } while (0) 287 } while (0)
289#define M_CP_STRARRAYOPT(x, nx) do { \ 288#define M_CP_STRARRAYOPT(x, nx) do { \
290 for (i = 0; i < newopts->nx; i++) \
291 newopts->x[i] = buffer_get_string(&m, NULL); \
292 } while (0)
293#define M_CP_STRARRAYOPT_ALLOC(x, nx) do { \
294 newopts->x = newopts->nx == 0 ? \ 289 newopts->x = newopts->nx == 0 ? \
295 NULL : xcalloc(newopts->nx, sizeof(*newopts->x)); \ 290 NULL : xcalloc(newopts->nx, sizeof(*newopts->x)); \
296 M_CP_STRARRAYOPT(x, nx); \ 291 for (i = 0; i < newopts->nx; i++) \
292 newopts->x[i] = buffer_get_string(&m, NULL); \
297 } while (0) 293 } while (0)
298 /* See comment in servconf.h */ 294 /* See comment in servconf.h */
299 COPY_MATCH_STRING_OPTS(); 295 COPY_MATCH_STRING_OPTS();
300#undef M_CP_STROPT 296#undef M_CP_STROPT
301#undef M_CP_STRARRAYOPT 297#undef M_CP_STRARRAYOPT
302#undef M_CP_STRARRAYOPT_ALLOC
303 298
304 copy_set_server_options(&options, newopts, 1); 299 copy_set_server_options(&options, newopts, 1);
305 log_change_level(options.log_level); 300 log_change_level(options.log_level);
@@ -356,7 +351,7 @@ mm_inform_authserv(char *service, char *style)
356 351
357/* Do the password authentication */ 352/* Do the password authentication */
358int 353int
359mm_auth_password(Authctxt *authctxt, char *password) 354mm_auth_password(struct ssh *ssh, char *password)
360{ 355{
361 Buffer m; 356 Buffer m;
362 int authenticated = 0; 357 int authenticated = 0;
@@ -383,34 +378,38 @@ mm_auth_password(Authctxt *authctxt, char *password)
383} 378}
384 379
385int 380int
386mm_user_key_allowed(struct passwd *pw, struct sshkey *key, 381mm_user_key_allowed(struct ssh *ssh, struct passwd *pw, struct sshkey *key,
387 int pubkey_auth_attempt) 382 int pubkey_auth_attempt, struct sshauthopt **authoptp)
388{ 383{
389 return (mm_key_allowed(MM_USERKEY, NULL, NULL, key, 384 return (mm_key_allowed(MM_USERKEY, NULL, NULL, key,
390 pubkey_auth_attempt)); 385 pubkey_auth_attempt, authoptp));
391} 386}
392 387
393int 388int
394mm_hostbased_key_allowed(struct passwd *pw, const char *user, const char *host, 389mm_hostbased_key_allowed(struct passwd *pw, const char *user, const char *host,
395 struct sshkey *key) 390 struct sshkey *key)
396{ 391{
397 return (mm_key_allowed(MM_HOSTKEY, user, host, key, 0)); 392 return (mm_key_allowed(MM_HOSTKEY, user, host, key, 0, NULL));
398} 393}
399 394
400int 395int
401mm_key_allowed(enum mm_keytype type, const char *user, const char *host, 396mm_key_allowed(enum mm_keytype type, const char *user, const char *host,
402 struct sshkey *key, int pubkey_auth_attempt) 397 struct sshkey *key, int pubkey_auth_attempt, struct sshauthopt **authoptp)
403{ 398{
404 Buffer m; 399 Buffer m;
405 u_char *blob; 400 u_char *blob;
406 u_int len; 401 u_int len;
407 int allowed = 0, have_forced = 0; 402 int r, allowed = 0;
403 struct sshauthopt *opts = NULL;
408 404
409 debug3("%s entering", __func__); 405 debug3("%s entering", __func__);
410 406
407 if (authoptp != NULL)
408 *authoptp = NULL;
409
411 /* Convert the key to a blob and the pass it over */ 410 /* Convert the key to a blob and the pass it over */
412 if (!key_to_blob(key, &blob, &len)) 411 if (!key_to_blob(key, &blob, &len))
413 return (0); 412 return 0;
414 413
415 buffer_init(&m); 414 buffer_init(&m);
416 buffer_put_int(&m, type); 415 buffer_put_int(&m, type);
@@ -423,18 +422,24 @@ mm_key_allowed(enum mm_keytype type, const char *user, const char *host,
423 mm_request_send(pmonitor->m_recvfd, MONITOR_REQ_KEYALLOWED, &m); 422 mm_request_send(pmonitor->m_recvfd, MONITOR_REQ_KEYALLOWED, &m);
424 423
425 debug3("%s: waiting for MONITOR_ANS_KEYALLOWED", __func__); 424 debug3("%s: waiting for MONITOR_ANS_KEYALLOWED", __func__);
426 mm_request_receive_expect(pmonitor->m_recvfd, MONITOR_ANS_KEYALLOWED, &m); 425 mm_request_receive_expect(pmonitor->m_recvfd,
426 MONITOR_ANS_KEYALLOWED, &m);
427 427
428 allowed = buffer_get_int(&m); 428 allowed = buffer_get_int(&m);
429 429 if (allowed && type == MM_USERKEY) {
430 /* fake forced command */ 430 if ((r = sshauthopt_deserialise(&m, &opts)) != 0)
431 auth_clear_options(); 431 fatal("%s: sshauthopt_deserialise: %s",
432 have_forced = buffer_get_int(&m); 432 __func__, ssh_err(r));
433 forced_command = have_forced ? xstrdup("true") : NULL; 433 }
434
435 buffer_free(&m); 434 buffer_free(&m);
436 435
437 return (allowed); 436 if (authoptp != NULL) {
437 *authoptp = opts;
438 opts = NULL;
439 }
440 sshauthopt_free(opts);
441
442 return allowed;
438} 443}
439 444
440/* 445/*
@@ -445,7 +450,7 @@ mm_key_allowed(enum mm_keytype type, const char *user, const char *host,
445 450
446int 451int
447mm_sshkey_verify(const struct sshkey *key, const u_char *sig, size_t siglen, 452mm_sshkey_verify(const struct sshkey *key, const u_char *sig, size_t siglen,
448 const u_char *data, size_t datalen, u_int compat) 453 const u_char *data, size_t datalen, const char *sigalg, u_int compat)
449{ 454{
450 Buffer m; 455 Buffer m;
451 u_char *blob; 456 u_char *blob;
@@ -462,6 +467,7 @@ mm_sshkey_verify(const struct sshkey *key, const u_char *sig, size_t siglen,
462 buffer_put_string(&m, blob, len); 467 buffer_put_string(&m, blob, len);
463 buffer_put_string(&m, sig, siglen); 468 buffer_put_string(&m, sig, siglen);
464 buffer_put_string(&m, data, datalen); 469 buffer_put_string(&m, data, datalen);
470 buffer_put_cstring(&m, sigalg == NULL ? "" : sigalg);
465 free(blob); 471 free(blob);
466 472
467 mm_request_send(pmonitor->m_recvfd, MONITOR_REQ_KEYVERIFY, &m); 473 mm_request_send(pmonitor->m_recvfd, MONITOR_REQ_KEYVERIFY, &m);