2012-09-20 07:51:34 +04:00
|
|
|
/**
|
|
|
|
* xrdp: A Remote Desktop Protocol server.
|
|
|
|
*
|
2013-06-08 21:51:53 +04:00
|
|
|
* Copyright (C) Jay Sorg 2004-2013
|
2012-09-20 07:51:34 +04:00
|
|
|
*
|
|
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
* you may not use this file except in compliance with the License.
|
|
|
|
* You may obtain a copy of the License at
|
|
|
|
*
|
|
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
*
|
|
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
* See the License for the specific language governing permissions and
|
|
|
|
* limitations under the License.
|
|
|
|
*/
|
2005-07-07 07:08:03 +04:00
|
|
|
|
2006-05-26 00:34:32 +04:00
|
|
|
/**
|
|
|
|
*
|
|
|
|
* @file verify_user_pam_userpass.c
|
|
|
|
* @brief Authenticate user using pam_userpass module
|
|
|
|
* @author Jay Sorg
|
2012-09-20 07:51:34 +04:00
|
|
|
*
|
2006-05-26 00:34:32 +04:00
|
|
|
*/
|
|
|
|
|
2005-07-07 07:08:03 +04:00
|
|
|
#include "arch.h"
|
|
|
|
#include "os_calls.h"
|
|
|
|
|
|
|
|
#include <security/pam_userpass.h>
|
|
|
|
|
|
|
|
#define SERVICE "xrdp"
|
|
|
|
|
|
|
|
/******************************************************************************/
|
|
|
|
/* returns boolean */
|
|
|
|
int DEFAULT_CC
|
2016-10-17 09:14:06 +03:00
|
|
|
auth_userpass(const char *user, const char *pass, int *errorcode)
|
2005-07-07 07:08:03 +04:00
|
|
|
{
|
2012-09-20 07:51:34 +04:00
|
|
|
pam_handle_t *pamh;
|
|
|
|
pam_userpass_t userpass;
|
|
|
|
struct pam_conv conv = {pam_userpass_conv, &userpass};
|
|
|
|
const void *template1;
|
|
|
|
int status;
|
|
|
|
|
|
|
|
userpass.user = user;
|
|
|
|
userpass.pass = pass;
|
|
|
|
|
|
|
|
if (pam_start(SERVICE, user, &conv, &pamh) != PAM_SUCCESS)
|
|
|
|
{
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
status = pam_authenticate(pamh, 0);
|
|
|
|
|
|
|
|
if (status != PAM_SUCCESS)
|
|
|
|
{
|
|
|
|
pam_end(pamh, status);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
status = pam_acct_mgmt(pamh, 0);
|
|
|
|
|
|
|
|
if (status != PAM_SUCCESS)
|
|
|
|
{
|
|
|
|
pam_end(pamh, status);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
status = pam_get_item(pamh, PAM_USER, &template1);
|
|
|
|
|
|
|
|
if (status != PAM_SUCCESS)
|
|
|
|
{
|
|
|
|
pam_end(pamh, status);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (pam_end(pamh, PAM_SUCCESS) != PAM_SUCCESS)
|
|
|
|
{
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
return 1;
|
2005-07-07 07:08:03 +04:00
|
|
|
}
|
2005-07-19 06:22:33 +04:00
|
|
|
|
|
|
|
/******************************************************************************/
|
|
|
|
/* returns error */
|
|
|
|
int DEFAULT_CC
|
2016-11-07 07:01:49 +03:00
|
|
|
auth_start_session(long in_val, int in_display)
|
2005-07-19 06:22:33 +04:00
|
|
|
{
|
2012-09-20 07:51:34 +04:00
|
|
|
return 0;
|
2005-07-19 06:22:33 +04:00
|
|
|
}
|
|
|
|
|
2013-10-01 21:42:00 +04:00
|
|
|
/******************************************************************************/
|
|
|
|
/* returns error */
|
|
|
|
int DEFAULT_CC
|
|
|
|
auth_stop_session(long in_val)
|
|
|
|
{
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2005-07-19 06:22:33 +04:00
|
|
|
/******************************************************************************/
|
|
|
|
int DEFAULT_CC
|
2016-11-07 07:01:49 +03:00
|
|
|
auth_end(long in_val)
|
2005-07-19 06:22:33 +04:00
|
|
|
{
|
2012-09-20 07:51:34 +04:00
|
|
|
return 0;
|
2005-07-19 06:22:33 +04:00
|
|
|
}
|
2005-08-14 06:22:11 +04:00
|
|
|
|
|
|
|
/******************************************************************************/
|
|
|
|
int DEFAULT_CC
|
2016-11-07 07:01:49 +03:00
|
|
|
auth_set_env(long in_val)
|
2005-08-14 06:22:11 +04:00
|
|
|
{
|
2012-09-20 07:51:34 +04:00
|
|
|
return 0;
|
2005-08-14 06:22:11 +04:00
|
|
|
}
|