jcs's openbsd hax
openbsd
at jcs 67 lines 2.2 kB view raw
1/* $OpenBSD: auth2-none.c,v 1.26 2024/05/17 00:30:23 djm Exp $ */ 2/* 3 * Copyright (c) 2000 Markus Friedl. All rights reserved. 4 * 5 * Redistribution and use in source and binary forms, with or without 6 * modification, are permitted provided that the following conditions 7 * are met: 8 * 1. Redistributions of source code must retain the above copyright 9 * notice, this list of conditions and the following disclaimer. 10 * 2. Redistributions in binary form must reproduce the above copyright 11 * notice, this list of conditions and the following disclaimer in the 12 * documentation and/or other materials provided with the distribution. 13 * 14 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR 15 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES 16 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. 17 * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, 18 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT 19 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, 20 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY 21 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT 22 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF 23 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 24 */ 25 26#include <sys/types.h> 27#include <stdarg.h> 28#include <stdio.h> 29 30#include "xmalloc.h" 31#include "sshkey.h" 32#include "hostfile.h" 33#include "auth.h" 34#include "packet.h" 35#include "log.h" 36#include "misc.h" 37#include "servconf.h" 38#include "ssh2.h" 39#include "ssherr.h" 40#ifdef GSSAPI 41#include "ssh-gss.h" 42#endif 43#include "monitor_wrap.h" 44 45/* import */ 46extern ServerOptions options; 47extern struct authmethod_cfg methodcfg_none; 48 49extern int none_enabled; 50 51static int 52userauth_none(struct ssh *ssh, const char *method) 53{ 54 int r; 55 56 none_enabled = 0; 57 if ((r = sshpkt_get_end(ssh)) != 0) 58 fatal_fr(r, "parse packet"); 59 if (options.permit_empty_passwd && options.password_authentication) 60 return mm_auth_password(ssh, ""); 61 return (0); 62} 63 64Authmethod method_none = { 65 &methodcfg_none, 66 userauth_none, 67};