home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Meeting Pearls 3
/
Meeting_Pearls_III.iso
/
Pearls
/
tcp
/
Networking
/
TCP
/
Server
/
wu-ftpd
/
src
/
authuser.c
< prev
next >
Wrap
C/C++ Source or Header
|
1994-08-08
|
4KB
|
164 lines
/*
* 5/6/91 DJB baseline authuser 3.1. Public domain.
*/
#ifndef AMIGA
#include "../src/config.h"
#else
#include "config.h"
#endif
#include <arpa/inet.h>
#include <ctype.h>
#include <errno.h>
#include <fcntl.h>
#include <limits.h>
#include <netdb.h>
#include <netinet/in.h>
#include <stdio.h>
#include <sys/socket.h>
#include <sys/stat.h>
#include <sys/types.h>
extern int errno;
#include "authuser.h"
unsigned short auth_tcpport = 113;
#define SIZ 500 /* various buffers */
static int
usercmp(register char *u, register char *v)
{
/* is it correct to consider Foo and fOo the same user? yes */
/* but the function of this routine may change later */
while (*u && *v)
if (tolower(*u) != tolower(*v))
return tolower(*u) - tolower(*v);
else
++u, ++v;
return *u || *v;
}
static char authline[SIZ];
char *
auth_xline(register char *user, register int fd, register long unsigned int *in)
/* the supposed name of the user, NULL if unknown */
/* the file descriptor of the connection */
{
unsigned short local;
unsigned short remote;
register char *ruser;
if (auth_fd(fd, in, &local, &remote) == -1)
return 0;
ruser = auth_tcpuser(*in, local, remote);
if (!ruser)
return 0;
if (!user)
user = ruser; /* forces X-Auth-User */
(void) sprintf(authline,
(usercmp(ruser, user) ? "X-Forgery-By: %s" : "X-Auth-User: %s"),
ruser);
return authline;
}
int
auth_fd(register int fd, register long unsigned int *in, register short unsigned int *local, register short unsigned int *remote)
{
struct sockaddr_in sa;
int dummy;
dummy = sizeof(sa);
if (getsockname(fd, (struct sockaddr *)&sa, &dummy) == -1)
return -1;
if (sa.sin_family != AF_INET) {
errno = EAFNOSUPPORT;
return -1;
}
*local = ntohs(sa.sin_port);
dummy = sizeof(sa);
if (getpeername(fd, (struct sockaddr *)&sa, &dummy) == -1)
return -1;
*remote = ntohs(sa.sin_port);
*in = sa.sin_addr.s_addr;
return 0;
}
static char ruser[SIZ];
static char realbuf[SIZ];
static char *buf;
char *
auth_tcpuser(register long unsigned int in, register short unsigned int local, register short unsigned int remote)
{
struct sockaddr_in sa;
register int s;
register int buflen;
register int w;
register int saveerrno;
char ch;
unsigned short rlocal;
unsigned short rremote;
if ((s = socket(AF_INET, SOCK_STREAM, 0)) == -1)
return 0;
sa.sin_family = AF_INET;
sa.sin_port = htons(auth_tcpport);
sa.sin_addr.s_addr = in;
if (connect(s, (struct sockaddr *)&sa, sizeof(sa)) == -1) {
saveerrno = errno;
(void) close(s);
errno = saveerrno;
return 0;
}
buf = realbuf;
(void) sprintf(buf, "%u , %u\r\n", (unsigned int) remote, (unsigned int) local);
/* note the reversed order---the example in the RFC is misleading */
buflen = strlen(buf);
while ((w = write(s, buf, buflen)) < buflen)
if (w == -1) { /* should we worry about 0 as well? */
saveerrno = errno;
(void) close(s);
errno = saveerrno;
return 0;
} else {
buf += w;
buflen -= w;
}
buf = realbuf;
while ((w = read(s, &ch, 1)) == 1) {
*buf = ch;
if ((ch != ' ') && (ch != '\t') && (ch != '\r'))
++buf;
if ((buf - realbuf == sizeof(realbuf) - 1) || (ch == '\n'))
break;
}
if (w == -1) {
saveerrno = errno;
(void) close(s);
errno = saveerrno;
return 0;
}
*buf = '\0';
if (sscanf(realbuf, "%hd,%hd: USERID :%*[^:]:%s", &rremote, &rlocal, ruser) < 3) {
(void) close(s);
errno = EIO;
/* makes sense, right? well, not when USERID failed to match ERROR */
/* but there's no good error to return in that case */
return 0;
}
if ((remote != rremote) || (local != rlocal)) {
(void) close(s);
errno = EIO;
return 0;
}
/* XXX: we're not going to do any backslash processing */
(void) close(s);
return ruser;
}