1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
|
/*
* opie.c -- One-Time Password authentication.
*
* For license terms, see the file COPYING in this directory.
*/
#include "config.h"
#include <stdio.h>
#include <string.h>
#include <ctype.h>
#if defined(STDC_HEADERS)
#include <stdlib.h>
#endif
#include "fetchmail.h"
#include "socket.h"
#include "i18n.h"
#include "md5.h"
#if OPIE_ENABLE
#include <opie.h>
int do_otp(int sock, char *command, struct query *ctl)
{
int i, rval;
int result;
char buffer[128];
char challenge[OPIE_CHALLENGE_MAX+1];
char response[OPIE_RESPONSE_MAX+1];
gen_send(sock, "%s X-OTP");
if (rval = gen_recv(sock, buffer, sizeof(buffer)))
return rval;
if ((i = from64tobits(challenge, buffer, sizeof(challenge))) < 0) {
report(stderr, GT_("Could not decode initial BASE64 challenge\n"));
return PS_AUTHFAIL;
};
to64frombits(buffer, ctl->remotename, strlen(ctl->remotename));
if (rval = gen_transact(sock, buffer, sizeof(buffer)))
return rval;
if ((i = from64tobits(challenge, buffer, sizeof(challenge))) < 0) {
report(stderr, GT_("Could not decode OTP challenge\n"));
return PS_AUTHFAIL;
};
rval = opiegenerator(challenge, !strcmp(ctl->password, "opie") ? "" : ctl->password, response);
if ((rval == -2) && !run.poll_interval) {
char secret[OPIE_SECRET_MAX+1];
fprintf(stderr, GT_("Secret pass phrase: "));
if (opiereadpass(secret, sizeof(secret), 0))
rval = opiegenerator(challenge, secret, response);
memset(secret, 0, sizeof(secret));
};
if (rval)
return(PS_AUTHFAIL);
to64frombits(buffer, response, strlen(response));
suppress_tags = TRUE;
result = gen_transact(sock, buffer, strlen(buffer));
suppress_tags = FALSE;
if (result)
return PS_SUCCESS;
else
return PS_AUTHFAIL;
};
#endif /* OPIE_ENABLE */
/* opie.c ends here */
|