aboutsummaryrefslogtreecommitdiff
path: root/libpam/pam_modutil_check_user.c
blob: 4034e59d8443687697148eb3b65b815035ab546d (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
#include "pam_modutil_private.h"
#include <security/pam_ext.h>

#include <stdio.h>
#include <string.h>
#include <syslog.h>

int
pam_modutil_check_user_in_passwd(pam_handle_t *pamh,
				 const char *user_name,
				 const char *file_name)
{
	int rc, c = EOF;
	FILE *fp;

	/* Validate the user name.  */
	if (user_name[0] == '\0') {
		pam_syslog(pamh, LOG_NOTICE, "user name is not valid");
		return PAM_SERVICE_ERR;
	}

	if (strchr(user_name, ':') != NULL) {
		/*
		 * "root:x" is not a local user name even if the passwd file
		 * contains a line starting with "root:x:".
		 */
		return PAM_PERM_DENIED;
	}

	/* Open the passwd file.  */
	if (file_name == NULL) {
		file_name = "/etc/passwd";
	}
	if ((fp = fopen(file_name, "r")) == NULL) {
		pam_syslog(pamh, LOG_ERR, "error opening %s: %m", file_name);
		return PAM_SERVICE_ERR;
	}

	/*
	 * Scan the file using fgetc() instead of fgetpwent_r() because
	 * the latter is not flexible enough in handling long lines
	 * in passwd files.
	 */
	rc = PAM_PERM_DENIED;
	do {
		const char *p;

		/*
		 * Does this line start with the user name
		 * followed by a colon?
		 */
		for (p = user_name; *p != '\0'; p++) {
			c = fgetc(fp);
			if (c == EOF || c == '\n' || (char)c != *p)
				break;
		}

		if (c != EOF && c != '\n')
			c = fgetc(fp);

		if (*p == '\0' && c == ':') {
			rc = PAM_SUCCESS;
			/*
			 * Continue reading the file to avoid timing attacks.
			 */
		}

		/* Read till the end of this line.  */
		while (c != EOF && c != '\n')
			c = fgetc(fp);

		/* Continue with the next line.  */
	} while (c != EOF);

	fclose(fp);
	return rc;
}