int nmh_get_credentials (char *host, char *user, int sasl, nmh_creds_t creds) { char *cred_style = context_find ("credentials"); init_credentials_file (); creds->host = host; if (cred_style == NULL || ! strcmp (cred_style, "legacy")) { if (sasl) { /* This is what inc.c and msgchk.c used to contain. */ /* Only inc.c and msgchk.c do this. smtp.c doesn't. */ creds->user = user == NULL ? getusername () : user; creds->password = getusername (); } } else if (! strncasecmp (cred_style, "file:", 5)) { /* * Determine user using the first of: * 1) -user switch * 2) matching host entry with login in a credentials file * such as ~/.netrc * 3) interactively request from user (as long as the * credentials file didn't have a "default" token) */ creds->user = user; } else { admonish (NULL, "unknown credentials style %s", cred_style); return NOTOK; } ruserpass (host, &creds->user, &creds->password); return OK; }
int login(const char *host) { char tmp[80]; char *puser, *ppass, *pacct; const char *user, *pass, *acct; int n, aflag = 0; user = pass = acct = 0; n = ruserpass(host, &puser, &ppass, &pacct); if (n < 0) { code = -1; return(0); } if (0 != n) { user = puser; pass = ppass; acct = pacct; } while (user == NULL) { const char *myname = "none"; // This needs to become the usename env if (myname) printf("Name (%s:%s): ", host, myname); else printf("Name (%s): ", host); (void) fflush(stdout); (void) fgets(tmp, sizeof(tmp) - 1, stdin); tmp[strlen(tmp) - 1] = '\0'; if (*tmp == '\0') user = myname; else user = tmp; } n = command("USER %s", user); if (n == CONTINUE) { if (pass == NULL) pass = getpass("Password:"******"PASS %s", pass); fflush(stdin); } if (n == CONTINUE) { aflag++; acct = getpass("Account:"); n = command("ACCT %s", acct); } if (n != COMPLETE) { fprintf(stderr, "Login failed.\n"); return (0); } if (!aflag && acct != NULL) (void) command("ACCT %s", acct); if (proxy) return(1); for (n = 0; n < macnum; ++n) { if (!strcmp("init", macros[n].mac_name)) { (void) strcpy(line, "$init"); makeargv(); domacro(margc, margv); break; } } return (1); }
int rexec_af(char **ahost, int rport, const char *name, const char *pass, const char *cmd, int *fd2p, sa_family_t af) { struct sockaddr_storage sa2, from; struct addrinfo hints, *res0; const char *orig_name = name; const char *orig_pass = pass; u_short port = 0; int s, timo = 1, s3; char c; int gai; char servbuff[NI_MAXSERV]; if (sizeof(servbuff) < sizeof(int)*3 + 2) { snprintf(servbuff, sizeof(servbuff), "%d", ntohs(rport)); servbuff[sizeof(servbuff) - 1] = '\0'; } else { sprintf(servbuff, "%d", ntohs(rport)); } memset(&hints, '\0', sizeof(hints)); hints.ai_family = af; hints.ai_socktype = SOCK_STREAM; hints.ai_flags = AI_CANONNAME; gai = getaddrinfo(*ahost, servbuff, &hints, &res0); if (gai) { /* XXX: set errno? */ return -1; } if (res0->ai_canonname) { if (!ahostbuf) ahostbuf = __uc_malloc(NI_MAXHOST); strncpy(ahostbuf, res0->ai_canonname, NI_MAXHOST); ahostbuf[NI_MAXHOST-1] = '\0'; *ahost = ahostbuf; } else { *ahost = NULL; __set_errno(ENOENT); return -1; } ruserpass(res0->ai_canonname, &name, &pass); retry: s = socket(res0->ai_family, res0->ai_socktype, 0); if (s < 0) { perror("rexec: socket"); return -1; } if (connect(s, res0->ai_addr, res0->ai_addrlen) < 0) { if (errno == ECONNREFUSED && timo <= 16) { (void) close(s); sleep(timo); timo *= 2; goto retry; } perror(res0->ai_canonname); return -1; } if (fd2p == 0) { (void) write(s, "", 1); port = 0; } else { char num[32]; int s2; socklen_t sa2len; s2 = socket(res0->ai_family, res0->ai_socktype, 0); if (s2 < 0) { (void) close(s); return -1; } listen(s2, 1); sa2len = sizeof(sa2); if (getsockname(s2, (struct sockaddr *)&sa2, &sa2len) < 0) { perror("getsockname"); (void) close(s2); goto bad; } else if (sa2len != SA_LEN((struct sockaddr *)&sa2)) { __set_errno(EINVAL); (void) close(s2); goto bad; } port = 0; if (!getnameinfo((struct sockaddr *)&sa2, sa2len, NULL, 0, servbuff, sizeof(servbuff), NI_NUMERICSERV)) port = atoi(servbuff); (void) sprintf(num, "%u", port); (void) write(s, num, strlen(num)+1); { socklen_t len = sizeof(from); s3 = TEMP_FAILURE_RETRY(accept(s2, (struct sockaddr *)&from, &len)); close(s2); if (s3 < 0) { perror("accept"); port = 0; goto bad; } } *fd2p = s3; } (void) write(s, name, strlen(name) + 1); /* should public key encypt the password here */ (void) write(s, pass, strlen(pass) + 1); (void) write(s, cmd, strlen(cmd) + 1); /* We don't need the memory allocated for the name and the password in ruserpass anymore. */ if (name != orig_name) free((char *) name); if (pass != orig_pass) free((char *) pass); if (read(s, &c, 1) != 1) { perror(*ahost); goto bad; } if (c != 0) { while (read(s, &c, 1) == 1) { (void) write(2, &c, 1); if (c == '\n') break; } goto bad; } freeaddrinfo(res0); return s; bad: if (port) (void) close(*fd2p); (void) close(s); freeaddrinfo(res0); return -1; }