diff options
author | Andrew G. Morgan <morgan@kernel.org> | 2001-02-05 06:50:41 +0000 |
---|---|---|
committer | Andrew G. Morgan <morgan@kernel.org> | 2001-02-05 06:50:41 +0000 |
commit | 547e42fc5cb7c0208eeb002809c3d270334af114 (patch) | |
tree | 8c1653cfb589e3d69c80611c3808a47320cdb2fa /examples | |
parent | b89c0d4ccae2f48cfa1e28423e2fe86e1d435ec5 (diff) | |
download | pam-547e42fc5cb7c0208eeb002809c3d270334af114.tar.gz pam-547e42fc5cb7c0208eeb002809c3d270334af114.tar.bz2 pam-547e42fc5cb7c0208eeb002809c3d270334af114.zip |
Relevant BUGIDs: 129775
Purpose of commit: bugfix
Commit summary:
---------------
This bugfix leads to backwardly incompatable behavior with earlier
releases of Linux-PAM.
Note, this cleans up the setcred/session and chauthtok stacks in
such a way that it is no longer preferred that the setcred module
always return the same error code as the auth components of said
modules did.
This means behavior should be a great deal more sane. It also gives
meaning to the unique return codes that are available to pam_sm_setcred.
[I'm sure that when we add support for credential relevant events,
this change will be critical.]
Diffstat (limited to 'examples')
-rw-r--r-- | examples/xsh.c | 34 |
1 files changed, 26 insertions, 8 deletions
diff --git a/examples/xsh.c b/examples/xsh.c index 13971a2d..0987da26 100644 --- a/examples/xsh.c +++ b/examples/xsh.c @@ -33,19 +33,25 @@ static struct pam_conv conv = { int main(int argc, char **argv) { pam_handle_t *pamh=NULL; - char *username=NULL; + const char *username=NULL; + const char *service="xsh"; int retcode; - /* did the user call with a username as an argument ? */ + /* did the user call with a username as an argument ? + * did they also */ - if (argc > 2) { - fprintf(stderr,"usage: %s [username]\n",argv[0]); - } else if (argc == 2) { + if (argc > 3) { + fprintf(stderr,"usage: %s [username [service-name]]\n",argv[0]); + } + if (argc >= 2) { username = argv[1]; - } + } + if (argc == 3) { + service = argv[2]; + } /* initialize the Linux-PAM library */ - retcode = pam_start("xsh", username, &conv, &pamh); + retcode = pam_start(service, username, &conv, &pamh); bail_out(pamh,1,retcode,"pam_start"); /* to avoid using goto we abuse a loop here */ @@ -97,7 +103,10 @@ int main(int argc, char **argv) break; } - fprintf(stderr,"The user has been authenticated and `logged in'\n"); + pam_get_item(pamh, PAM_USER, (const void **) &username); + fprintf(stderr, + "The user [%s] has been authenticated and `logged in'\n", + username); /* this is always a really bad thing for security! */ system("/bin/sh"); @@ -113,6 +122,15 @@ int main(int argc, char **argv) break; } + /* `0' could be as above */ + retcode = pam_setcred(pamh, PAM_DELETE_CRED); + bail_out(pamh,0,retcode,"pam_setcred"); + if (retcode != PAM_SUCCESS) { + fprintf(stderr,"%s: problem deleting user credentials\n" + ,argv[0]); + break; + } + break; /* don't go on for ever! */ } |