blob: 4034e59d8443687697148eb3b65b815035ab546d (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
|
#include "pam_modutil_private.h"
#include <security/pam_ext.h>
#include <stdio.h>
#include <string.h>
#include <syslog.h>
int
pam_modutil_check_user_in_passwd(pam_handle_t *pamh,
const char *user_name,
const char *file_name)
{
int rc, c = EOF;
FILE *fp;
/* Validate the user name. */
if (user_name[0] == '\0') {
pam_syslog(pamh, LOG_NOTICE, "user name is not valid");
return PAM_SERVICE_ERR;
}
if (strchr(user_name, ':') != NULL) {
/*
* "root:x" is not a local user name even if the passwd file
* contains a line starting with "root:x:".
*/
return PAM_PERM_DENIED;
}
/* Open the passwd file. */
if (file_name == NULL) {
file_name = "/etc/passwd";
}
if ((fp = fopen(file_name, "r")) == NULL) {
pam_syslog(pamh, LOG_ERR, "error opening %s: %m", file_name);
return PAM_SERVICE_ERR;
}
/*
* Scan the file using fgetc() instead of fgetpwent_r() because
* the latter is not flexible enough in handling long lines
* in passwd files.
*/
rc = PAM_PERM_DENIED;
do {
const char *p;
/*
* Does this line start with the user name
* followed by a colon?
*/
for (p = user_name; *p != '\0'; p++) {
c = fgetc(fp);
if (c == EOF || c == '\n' || (char)c != *p)
break;
}
if (c != EOF && c != '\n')
c = fgetc(fp);
if (*p == '\0' && c == ':') {
rc = PAM_SUCCESS;
/*
* Continue reading the file to avoid timing attacks.
*/
}
/* Read till the end of this line. */
while (c != EOF && c != '\n')
c = fgetc(fp);
/* Continue with the next line. */
} while (c != EOF);
fclose(fp);
return rc;
}
|