2014-11-24 20:23:48 +03:00
|
|
|
/**
|
|
|
|
* xrdp: A Remote Desktop Protocol server.
|
|
|
|
*
|
|
|
|
* Copyright (C) Jay Sorg 2005-2014
|
|
|
|
*
|
|
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
* you may not use this file except in compliance with the License.
|
|
|
|
* You may obtain a copy of the License at
|
|
|
|
*
|
|
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
*
|
|
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
* See the License for the specific language governing permissions and
|
|
|
|
* limitations under the License.
|
|
|
|
*/
|
2014-11-21 16:22:15 +03:00
|
|
|
|
|
|
|
/**
|
|
|
|
*
|
2014-11-21 17:00:01 +03:00
|
|
|
* @file verify_user_bsd.c
|
2014-11-21 16:22:15 +03:00
|
|
|
* @brief Authenticate user using BSD password system
|
|
|
|
* @author Renaud Allard
|
|
|
|
*
|
|
|
|
*/
|
|
|
|
|
2017-03-03 07:33:23 +03:00
|
|
|
#if defined(HAVE_CONFIG_H)
|
|
|
|
#include <config_ac.h>
|
|
|
|
#endif
|
|
|
|
|
2022-09-11 15:18:53 +03:00
|
|
|
#include "arch.h"
|
2023-03-20 18:06:11 +03:00
|
|
|
#include "sesman_auth.h"
|
2014-11-21 16:22:15 +03:00
|
|
|
|
|
|
|
#define _XOPEN_SOURCE
|
|
|
|
#include <stdio.h>
|
|
|
|
#include <sys/types.h>
|
|
|
|
#include <stdlib.h>
|
|
|
|
#include <unistd.h>
|
|
|
|
#include <time.h>
|
2022-12-13 13:45:25 +03:00
|
|
|
#include <limits.h>
|
|
|
|
#include <sys/param.h>
|
|
|
|
#if defined(OpenBSD)
|
2014-11-21 16:22:15 +03:00
|
|
|
#include <login_cap.h>
|
|
|
|
#include <bsd_auth.h>
|
2022-12-13 13:45:25 +03:00
|
|
|
#else
|
|
|
|
/*
|
|
|
|
* If OpenBSD isn't defined, add static definitions of OpenBSD-specific
|
|
|
|
* functions. This won't work, but will let the compiler on other
|
|
|
|
* systems check that all is correctly defined */
|
|
|
|
static int
|
|
|
|
auth_userokay(char *name, char *style, char *type, char *password)
|
|
|
|
{
|
|
|
|
fprintf(stderr, "auth_userokay() not implmented on this platform!\n");
|
|
|
|
abort();
|
|
|
|
return 0;
|
|
|
|
}
|
2014-11-21 16:22:15 +03:00
|
|
|
#endif
|
|
|
|
|
2022-12-13 13:45:25 +03:00
|
|
|
|
2022-09-11 15:18:53 +03:00
|
|
|
/*
|
|
|
|
* Need a complete type for struct auth_info, even though we're
|
|
|
|
* not really using it if this module (BSD authentication) is selected */
|
|
|
|
struct auth_info
|
|
|
|
{
|
|
|
|
char dummy;
|
|
|
|
};
|
|
|
|
|
2014-11-21 16:22:15 +03:00
|
|
|
/******************************************************************************/
|
2022-09-11 15:18:53 +03:00
|
|
|
/* returns non-NULL for success */
|
|
|
|
struct auth_info *
|
2022-12-13 13:45:25 +03:00
|
|
|
auth_userpass(const char *const_user, const char *const_pass,
|
|
|
|
const char *client_ip, enum scp_login_status *errorcode)
|
|
|
|
{
|
|
|
|
/* Need a non-NULL pointer to return to indicate success */
|
|
|
|
static struct auth_info success = {0};
|
|
|
|
enum scp_login_status status;
|
|
|
|
|
|
|
|
// auth_userokay is not const-correct. See usr.sbin/smtpd/smtpd.c in
|
|
|
|
// the OpenBSD source tree for this workaround
|
|
|
|
char user[LOGIN_NAME_MAX];
|
|
|
|
char pass[LINE_MAX];
|
|
|
|
char type[] = "auth-xrdp";
|
|
|
|
|
|
|
|
snprintf(user, sizeof(user), "%s", const_user);
|
|
|
|
snprintf(pass, sizeof(pass), "%s", const_pass);
|
|
|
|
|
|
|
|
if (auth_userokay(user, NULL, type, pass))
|
|
|
|
{
|
|
|
|
status = E_SCP_LOGIN_OK;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
status = E_SCP_LOGIN_NOT_AUTHENTICATED;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (errorcode != NULL)
|
|
|
|
{
|
|
|
|
*errorcode = status;
|
|
|
|
}
|
|
|
|
|
|
|
|
return (status == E_SCP_LOGIN_OK) ? &success : NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
/******************************************************************************/
|
|
|
|
/* returns non-NULL for success */
|
|
|
|
struct auth_info *
|
|
|
|
auth_uds(const char *user, enum scp_login_status *errorcode)
|
2014-11-21 16:22:15 +03:00
|
|
|
{
|
2022-09-11 15:18:53 +03:00
|
|
|
/* Need a non-NULL pointer to return to indicate success */
|
|
|
|
static struct auth_info success = {0};
|
|
|
|
|
2022-12-13 13:45:25 +03:00
|
|
|
if (errorcode != NULL)
|
2022-09-11 15:18:53 +03:00
|
|
|
{
|
2022-12-13 13:45:25 +03:00
|
|
|
*errorcode = E_SCP_LOGIN_OK;
|
2022-09-11 15:18:53 +03:00
|
|
|
}
|
2022-12-13 13:45:25 +03:00
|
|
|
|
|
|
|
return &success;
|
2014-11-21 16:22:15 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
/******************************************************************************/
|
|
|
|
/* returns error */
|
2017-03-12 19:35:00 +03:00
|
|
|
int
|
2022-09-11 15:18:53 +03:00
|
|
|
auth_start_session(struct auth_info *auth_info, int display_num)
|
2014-11-21 16:22:15 +03:00
|
|
|
{
|
2014-11-24 20:23:48 +03:00
|
|
|
return 0;
|
2014-11-21 16:22:15 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
/******************************************************************************/
|
2017-03-12 19:35:00 +03:00
|
|
|
int
|
2022-09-11 15:18:53 +03:00
|
|
|
auth_end(struct auth_info *auth_info)
|
2014-11-21 16:22:15 +03:00
|
|
|
{
|
2014-11-24 20:23:48 +03:00
|
|
|
return 0;
|
2014-11-21 16:22:15 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
/******************************************************************************/
|
2017-03-12 19:35:00 +03:00
|
|
|
int
|
2022-09-11 15:18:53 +03:00
|
|
|
auth_set_env(struct auth_info *auth_info)
|
2014-11-21 16:22:15 +03:00
|
|
|
{
|
2014-11-24 20:23:48 +03:00
|
|
|
return 0;
|
2014-11-21 16:22:15 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
/******************************************************************************/
|
2017-03-12 19:35:00 +03:00
|
|
|
int
|
2016-10-17 09:14:06 +03:00
|
|
|
auth_check_pwd_chg(const char *user)
|
2014-11-21 16:22:15 +03:00
|
|
|
{
|
2014-11-24 20:23:48 +03:00
|
|
|
return 0;
|
2014-11-21 16:22:15 +03:00
|
|
|
}
|
|
|
|
|
2017-03-12 19:35:00 +03:00
|
|
|
int
|
2016-10-17 09:14:06 +03:00
|
|
|
auth_change_pwd(const char *user, const char *newpwd)
|
2014-11-21 16:22:15 +03:00
|
|
|
{
|
2014-11-24 20:23:48 +03:00
|
|
|
return 0;
|
2014-11-21 16:22:15 +03:00
|
|
|
}
|
|
|
|
|
2017-03-12 19:35:00 +03:00
|
|
|
int
|
2022-09-11 15:18:53 +03:00
|
|
|
auth_stop_session(struct auth_info *auth_info)
|
2014-11-21 16:22:15 +03:00
|
|
|
{
|
2014-11-24 20:23:48 +03:00
|
|
|
return 0;
|
2014-11-21 16:22:15 +03:00
|
|
|
}
|