pam_start.c 4.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179
  1. /* pam_start.c */
  2. /* Creator Marc Ewing
  3. * Maintained by AGM
  4. *
  5. * $Id$
  6. *
  7. */
  8. #include "pam_private.h"
  9. #include <ctype.h>
  10. #include <stdlib.h>
  11. #include <unistd.h>
  12. #include <string.h>
  13. #include <syslog.h>
  14. static int _pam_start_internal (
  15. const char *service_name,
  16. const char *user,
  17. const struct pam_conv *pam_conversation,
  18. const char *confdir,
  19. pam_handle_t **pamh)
  20. {
  21. D(("called pam_start: [%s] [%s] [%p] [%p]"
  22. ,service_name, user, pam_conversation, pamh));
  23. if (pamh == NULL) {
  24. pam_syslog(NULL, LOG_CRIT,
  25. "pam_start: invalid argument: pamh == NULL");
  26. return (PAM_SYSTEM_ERR);
  27. }
  28. if (service_name == NULL) {
  29. pam_syslog(NULL, LOG_CRIT,
  30. "pam_start: invalid argument: service == NULL");
  31. return (PAM_SYSTEM_ERR);
  32. }
  33. if (pam_conversation == NULL) {
  34. pam_syslog(NULL, LOG_CRIT,
  35. "pam_start: invalid argument: conv == NULL");
  36. return (PAM_SYSTEM_ERR);
  37. }
  38. if ((*pamh = calloc(1, sizeof(**pamh))) == NULL) {
  39. pam_syslog(NULL, LOG_CRIT, "pam_start: calloc failed for *pamh");
  40. return (PAM_BUF_ERR);
  41. }
  42. /* All service names should be files below /etc/pam.d and nothing
  43. else. Forbid paths. */
  44. if (strrchr(service_name, '/') != NULL)
  45. service_name = strrchr(service_name, '/') + 1;
  46. /* Mark the caller as the application - permission to do certain
  47. things is limited to a module or an application */
  48. __PAM_TO_APP(*pamh);
  49. if (((*pamh)->service_name = _pam_strdup(service_name)) == NULL) {
  50. pam_syslog(*pamh, LOG_CRIT,
  51. "pam_start: _pam_strdup failed for service name");
  52. _pam_drop(*pamh);
  53. return (PAM_BUF_ERR);
  54. } else {
  55. char *tmp;
  56. for (tmp=(*pamh)->service_name; *tmp; ++tmp)
  57. *tmp = tolower(*tmp); /* require lower case */
  58. }
  59. if (user) {
  60. if (((*pamh)->user = _pam_strdup(user)) == NULL) {
  61. pam_syslog(*pamh, LOG_CRIT,
  62. "pam_start: _pam_strdup failed for user");
  63. _pam_drop((*pamh)->service_name);
  64. _pam_drop(*pamh);
  65. return (PAM_BUF_ERR);
  66. }
  67. } else
  68. (*pamh)->user = NULL;
  69. if (confdir) {
  70. if (((*pamh)->confdir = _pam_strdup(confdir)) == NULL) {
  71. pam_syslog(*pamh, LOG_CRIT,
  72. "pam_start: _pam_strdup failed for confdir");
  73. _pam_drop((*pamh)->service_name);
  74. _pam_drop((*pamh)->user);
  75. _pam_drop(*pamh);
  76. return (PAM_BUF_ERR);
  77. }
  78. } else
  79. (*pamh)->confdir = NULL;
  80. (*pamh)->tty = NULL;
  81. (*pamh)->prompt = NULL; /* prompt for pam_get_user() */
  82. (*pamh)->ruser = NULL;
  83. (*pamh)->rhost = NULL;
  84. (*pamh)->authtok = NULL;
  85. (*pamh)->oldauthtok = NULL;
  86. (*pamh)->fail_delay.delay_fn_ptr = NULL;
  87. (*pamh)->former.choice = PAM_NOT_STACKED;
  88. (*pamh)->former.substates = NULL;
  89. #ifdef HAVE_LIBAUDIT
  90. (*pamh)->audit_state = 0;
  91. #endif
  92. (*pamh)->xdisplay = NULL;
  93. (*pamh)->authtok_type = NULL;
  94. (*pamh)->authtok_verified = 0;
  95. memset (&((*pamh)->xauth), 0, sizeof ((*pamh)->xauth));
  96. if (((*pamh)->pam_conversation = (struct pam_conv *)
  97. malloc(sizeof(struct pam_conv))) == NULL) {
  98. pam_syslog(*pamh, LOG_CRIT, "pam_start: malloc failed for pam_conv");
  99. _pam_drop((*pamh)->service_name);
  100. _pam_drop((*pamh)->user);
  101. _pam_drop((*pamh)->confdir);
  102. _pam_drop(*pamh);
  103. return (PAM_BUF_ERR);
  104. } else {
  105. memcpy((*pamh)->pam_conversation, pam_conversation,
  106. sizeof(struct pam_conv));
  107. }
  108. (*pamh)->data = NULL;
  109. if ( _pam_make_env(*pamh) != PAM_SUCCESS ) {
  110. pam_syslog(*pamh,LOG_ERR,"pam_start: failed to initialize environment");
  111. _pam_drop((*pamh)->pam_conversation);
  112. _pam_drop((*pamh)->service_name);
  113. _pam_drop((*pamh)->user);
  114. _pam_drop((*pamh)->confdir);
  115. _pam_drop(*pamh);
  116. return PAM_ABORT;
  117. }
  118. _pam_reset_timer(*pamh); /* initialize timer support */
  119. _pam_start_handlers(*pamh); /* cannot fail */
  120. /* According to the SunOS man pages, loading modules and resolving
  121. * symbols happens on the first call from the application. */
  122. if ( _pam_init_handlers(*pamh) != PAM_SUCCESS ) {
  123. pam_syslog(*pamh, LOG_ERR, "pam_start: failed to initialize handlers");
  124. _pam_drop_env(*pamh); /* purge the environment */
  125. _pam_drop((*pamh)->pam_conversation);
  126. _pam_drop((*pamh)->service_name);
  127. _pam_drop((*pamh)->user);
  128. _pam_drop((*pamh)->confdir);
  129. _pam_drop(*pamh);
  130. return PAM_ABORT;
  131. }
  132. D(("exiting pam_start successfully"));
  133. return PAM_SUCCESS;
  134. }
  135. int pam_start_confdir (
  136. const char *service_name,
  137. const char *user,
  138. const struct pam_conv *pam_conversation,
  139. const char *confdir,
  140. pam_handle_t **pamh)
  141. {
  142. return _pam_start_internal(service_name, user, pam_conversation,
  143. confdir, pamh);
  144. }
  145. int pam_start (
  146. const char *service_name,
  147. const char *user,
  148. const struct pam_conv *pam_conversation,
  149. pam_handle_t **pamh)
  150. {
  151. return _pam_start_internal(service_name, user, pam_conversation,
  152. NULL, pamh);
  153. }