diff options
Diffstat (limited to 'auth-shadow.c')
-rw-r--r-- | auth-shadow.c | 135 |
1 files changed, 135 insertions, 0 deletions
diff --git a/auth-shadow.c b/auth-shadow.c new file mode 100644 index 000000000..a85442d72 --- /dev/null +++ b/auth-shadow.c | |||
@@ -0,0 +1,135 @@ | |||
1 | /* | ||
2 | * Copyright (c) 2004 Darren Tucker. All rights reserved. | ||
3 | * | ||
4 | * Redistribution and use in source and binary forms, with or without | ||
5 | * modification, are permitted provided that the following conditions | ||
6 | * are met: | ||
7 | * 1. Redistributions of source code must retain the above copyright | ||
8 | * notice, this list of conditions and the following disclaimer. | ||
9 | * 2. Redistributions in binary form must reproduce the above copyright | ||
10 | * notice, this list of conditions and the following disclaimer in the | ||
11 | * documentation and/or other materials provided with the distribution. | ||
12 | * | ||
13 | * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR | ||
14 | * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES | ||
15 | * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. | ||
16 | * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, | ||
17 | * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT | ||
18 | * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, | ||
19 | * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY | ||
20 | * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT | ||
21 | * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF | ||
22 | * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. | ||
23 | */ | ||
24 | |||
25 | #include "includes.h" | ||
26 | RCSID("$Id: auth-shadow.c,v 1.5 2004/02/21 23:22:05 dtucker Exp $"); | ||
27 | |||
28 | #if defined(USE_SHADOW) && defined(HAS_SHADOW_EXPIRE) | ||
29 | #include <shadow.h> | ||
30 | |||
31 | #include "auth.h" | ||
32 | #include "buffer.h" | ||
33 | #include "log.h" | ||
34 | |||
35 | #define DAY (24L * 60 * 60) /* 1 day in seconds */ | ||
36 | |||
37 | extern Buffer loginmsg; | ||
38 | |||
39 | /* | ||
40 | * For the account and password expiration functions, we assume the expiry | ||
41 | * occurs the day after the day specified. | ||
42 | */ | ||
43 | |||
44 | /* | ||
45 | * Check if specified account is expired. Returns 1 if account is expired, | ||
46 | * 0 otherwise. | ||
47 | */ | ||
48 | int | ||
49 | auth_shadow_acctexpired(struct spwd *spw) | ||
50 | { | ||
51 | time_t today; | ||
52 | int daysleft; | ||
53 | char buf[256]; | ||
54 | |||
55 | today = time(NULL) / DAY; | ||
56 | daysleft = spw->sp_expire - today; | ||
57 | debug3("%s: today %d sp_expire %d days left %d", __func__, (int)today, | ||
58 | (int)spw->sp_expire, daysleft); | ||
59 | |||
60 | if (spw->sp_expire == -1) { | ||
61 | debug3("account expiration disabled"); | ||
62 | } else if (daysleft < 0) { | ||
63 | logit("Account %.100s has expired", spw->sp_namp); | ||
64 | return 1; | ||
65 | } else if (daysleft <= spw->sp_warn) { | ||
66 | debug3("account will expire in %d days", daysleft); | ||
67 | snprintf(buf, sizeof(buf), | ||
68 | "Your account will expire in %d day%s.\n", daysleft, | ||
69 | daysleft == 1 ? "" : "s"); | ||
70 | buffer_append(&loginmsg, buf, strlen(buf)); | ||
71 | } | ||
72 | |||
73 | return 0; | ||
74 | } | ||
75 | |||
76 | /* | ||
77 | * Checks password expiry for platforms that use shadow passwd files. | ||
78 | * Returns: 1 = password expired, 0 = password not expired | ||
79 | */ | ||
80 | int | ||
81 | auth_shadow_pwexpired(Authctxt *ctxt) | ||
82 | { | ||
83 | struct spwd *spw = NULL; | ||
84 | const char *user = ctxt->pw->pw_name; | ||
85 | char buf[256]; | ||
86 | time_t today; | ||
87 | int daysleft, disabled = 0; | ||
88 | |||
89 | if ((spw = getspnam((char *)user)) == NULL) { | ||
90 | error("Could not get shadow information for %.100s", user); | ||
91 | return 0; | ||
92 | } | ||
93 | |||
94 | today = time(NULL) / DAY; | ||
95 | debug3("%s: today %d sp_lstchg %d sp_max %d", __func__, (int)today, | ||
96 | (int)spw->sp_lstchg, (int)spw->sp_max); | ||
97 | |||
98 | #if defined(__hpux) && !defined(HAVE_SECUREWARE) | ||
99 | if (iscomsec()) { | ||
100 | struct pr_passwd *pr; | ||
101 | |||
102 | pr = getprpwnam((char *)user); | ||
103 | |||
104 | /* Test for Trusted Mode expiry disabled */ | ||
105 | if (pr != NULL && pr->ufld.fd_min == 0 && | ||
106 | pr->ufld.fd_lifetime == 0 && pr->ufld.fd_expire == 0 && | ||
107 | pr->ufld.fd_pw_expire_warning == 0 && | ||
108 | pr->ufld.fd_schange != 0) | ||
109 | disabled = 1; | ||
110 | } | ||
111 | #endif | ||
112 | |||
113 | /* TODO: check sp_inact */ | ||
114 | daysleft = spw->sp_lstchg + spw->sp_max - today; | ||
115 | if (disabled) { | ||
116 | debug3("password expiration disabled"); | ||
117 | } else if (spw->sp_lstchg == 0) { | ||
118 | logit("User %.100s password has expired (root forced)", user); | ||
119 | return 1; | ||
120 | } else if (spw->sp_max == -1) { | ||
121 | debug3("password expiration disabled"); | ||
122 | } else if (daysleft < 0) { | ||
123 | logit("User %.100s password has expired (password aged)", user); | ||
124 | return 1; | ||
125 | } else if (daysleft <= spw->sp_warn) { | ||
126 | debug3("password will expire in %d days", daysleft); | ||
127 | snprintf(buf, sizeof(buf), | ||
128 | "Your password will expire in %d day%s.\n", daysleft, | ||
129 | daysleft == 1 ? "" : "s"); | ||
130 | buffer_append(&loginmsg, buf, strlen(buf)); | ||
131 | } | ||
132 | |||
133 | return 0; | ||
134 | } | ||
135 | #endif /* USE_SHADOW && HAS_SHADOW_EXPIRE */ | ||