⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 passwd.c

📁 校园网拨号端软件
💻 C
字号:
/*	libdrcom - Library for communicating with DrCOM 2133 Broadband Access Server	Copyright (C) 2005 William Poetra Yoga Hadisoeseno <williampoetra@yahoo.com>	This program is free software; you can redistribute it and/or modify	it under the terms of the GNU General Public License as published by	the Free Software Foundation; either version 2 of the License, or	(at your option) any later version.	This program is distributed in the hope that it will be useful,	but WITHOUT ANY WARRANTY; without even the implied warranty of	MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.	See the	GNU General Public License for more details.	You should have received a copy of the GNU General Public License	along with this program; if not, write to the Free Software	Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA	02111-1307	USA*/#include <string.h>#include <errno.h>#include <stdlib.h>#include "md5.h"#include "drcomd.h"#include "daemon_server.h"#include "client_daemon.h"#include "log.h"static void _build_passwd_packet(struct drcom_passwd_packet *passwd_packet, 				struct drcom_info *info, 				struct drcom_challenge *challenge, 				char *newpassword){	unsigned char s[32], t[22], d[16];	int i, l;	/* header */	passwd_packet->host_header.pkt_type = PKT_PASSWORD_CHANGE;	passwd_packet->host_header.zero = 0;	passwd_packet->host_header.len = sizeof(struct drcom_passwd_packet);	memset(t, 0, 22);	memcpy(t, &passwd_packet->host_header.pkt_type, 2);	memcpy(t + 2, &challenge->challenge, 4);	l = strlen(info->password);	strncpy((char *) (t + 6), info->password, 16);	MD5(t, l + 6, d);	memcpy(passwd_packet->host_header.checksum, d, 16);	/* username */	memset(passwd_packet->username, 0, 16);	strncpy(passwd_packet->username, info->username, 16);	memset(s, 0, 32);	memcpy(s, passwd_packet->host_header.checksum, 16);	l = strlen(info->password);	strncpy((char *) (s + 16), info->password, 16);	MD5(s, 16 + l, d);	memcpy(passwd_packet->checksum1_xor, d, 16);	for (i = 0; i < 16; ++i)		passwd_packet->checksum1_xor[i] ^= newpassword[i];	/* unknown */	passwd_packet->unknown0 = 0x12;	passwd_packet->unknown1 = 0x16;	passwd_packet->unknown2 = 0x04;	passwd_packet->unknown3 = 0x00;	return;}static int drcom_passwd(int s2, struct drcom_handle *h, char *newpassword, int timeout){	struct drcom_socks *socks = (struct drcom_socks *) h->socks;	struct drcom_info *info = (struct drcom_info *) h->info;	struct drcom_challenge *challenge;	struct drcom_passwd_packet passwd_packet;	struct drcom_acknowledgement *acknowledgement;	int retry=0;	unsigned char *pkt;	int pkt_size;	int ret;	(void)timeout;try_it_again_1:	retry++;	if(retry>3)		return -1;	if(_send_dialog_packet(socks, NULL, PKT_REQUEST)<0){		report_daemon_msg(s2, "send(PKT_REQUEST) failed\n");		return -1;	}        ret = _recv_dialog_packet(socks, &pkt, &pkt_size);        if (ret < 0 || pkt_size < sizeof(struct drcom_challenge)) {                if (pkt)                        free(pkt);                report_daemon_msg(s2, "_recv_dialog_package(PKT_CHALLENGE) failed\n");                goto try_it_again_1;        }        challenge = (struct drcom_challenge *)pkt;        if (challenge->serv_header.pkt_type != PKT_CHALLENGE) {                free(pkt);                report_daemon_msg(s2, "_recv_dialog_package(PKT_CHALLENGE) returned non challenge pkt\n");                goto try_it_again_1;        }	_build_passwd_packet(&passwd_packet, info, challenge, newpassword);	free(pkt);	retry=0;try_it_again_2:	retry++;	if(retry>3)		return -1;	if(_send_dialog_packet(socks, &passwd_packet, PKT_PASSWORD_CHANGE)<0){		report_daemon_msg(s2, "send(PKT_PASSWORD_CHANGE) failed\n");		return -1;	}        ret = _recv_dialog_packet(socks, &pkt, &pkt_size);        if (ret < 0 || pkt_size < sizeof(struct drcom_acknowledgement)) {                if (pkt)			free(pkt);                report_daemon_msg(s2, "_recv_dialog_package(PKT_ACK_SUCCESS) failed\n");                goto try_it_again_2;        }        acknowledgement = (struct drcom_acknowledgement *)pkt;        if (acknowledgement->serv_header.pkt_type != PKT_ACK_SUCCESS){                report_daemon_msg(s2, "Server acknowledged failure\n");                free(pkt);                return -1;        }	if (acknowledgement->serv_header.pkt_type != PKT_ACK_SUCCESS){		free(pkt);		report_daemon_msg(s2, "Server acknowledged failure\n");		return -1;	}	report_daemon_msg(s2, "Change passwd succeeded\n");	free(pkt);	return 0;}void do_command_passwd(int s2, struct drcom_handle *h){	struct drcomcd_passwd cd_passwd;	int r;	r = safe_recv(s2, &cd_passwd, sizeof(struct drcomcd_passwd));	if (r != sizeof(struct drcomcd_passwd)) {		logerr("daemon: recv: %s", strerror(errno));		return;	}	if(status != STATUS_IDLE){		report_daemon_msg(s2, "BUSY, please logout first to change passwd\n");		report_final_result(s2, h, DRCOMCD_FAILURE);		return;	}	status = STATUS_BUSY;	r = drcom_passwd(s2, h, cd_passwd.newpasswd, cd_passwd.timeout);	if(r != 0){		report_daemon_msg(s2, "Change passwd failed\n");		report_final_result(s2, h, DRCOMCD_FAILURE);		return;	}	report_final_result(s2, h, DRCOMCD_SUCCESS);}

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -