File: [local] / src / lib / libutil / check_expire.c (download)
Revision 1.8, Tue Apr 20 23:21:23 2004 UTC (20 years, 1 month ago) by millert
Branch: MAIN
CVS Tags: OPENBSD_5_3_BASE, OPENBSD_5_3, OPENBSD_5_2_BASE, OPENBSD_5_2, OPENBSD_5_1_BASE, OPENBSD_5_1, OPENBSD_5_0_BASE, OPENBSD_5_0, OPENBSD_4_9_BASE, OPENBSD_4_9, OPENBSD_4_8_BASE, OPENBSD_4_8, OPENBSD_4_7_BASE, OPENBSD_4_7, OPENBSD_4_6_BASE, OPENBSD_4_6, OPENBSD_4_5_BASE, OPENBSD_4_5, OPENBSD_4_4_BASE, OPENBSD_4_4, OPENBSD_4_3_BASE, OPENBSD_4_3, OPENBSD_4_2_BASE, OPENBSD_4_2, OPENBSD_4_1_BASE, OPENBSD_4_1, OPENBSD_4_0_BASE, OPENBSD_4_0, OPENBSD_3_9_BASE, OPENBSD_3_9, OPENBSD_3_8_BASE, OPENBSD_3_8, OPENBSD_3_7_BASE, OPENBSD_3_7, OPENBSD_3_6_BASE, OPENBSD_3_6 Changes since 1.7: +6 -11 lines
Adapt to new pw_copy() API, closes PR 3698.
|
/* $OpenBSD: check_expire.c,v 1.8 2004/04/20 23:21:23 millert Exp $ */
/*
* Copyright (c) 1997 Berkeley Software Design, Inc. All rights reserved.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions
* are met:
* 1. Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in the
* documentation and/or other materials provided with the distribution.
* 3. All advertising materials mentioning features or use of this software
* must display the following acknowledgement:
* This product includes software developed by Berkeley Software Design,
* Inc.
* 4. The name of Berkeley Software Design, Inc. may not be used to endorse
* or promote products derived from this software without specific prior
* written permission.
*
* THIS SOFTWARE IS PROVIDED BY BERKELEY SOFTWARE DESIGN, INC. ``AS IS'' AND
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
* ARE DISCLAIMED. IN NO EVENT SHALL BERKELEY SOFTWARE DESIGN, INC. BE LIABLE
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
* SUCH DAMAGE.
*
* BSDI $From: check_expire.c,v 2.1 1997/08/08 18:38:25 prb Exp $
*/
#include <sys/types.h>
#include <errno.h>
#include <fcntl.h>
#include <pwd.h>
#include <signal.h>
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <syslog.h>
#include <time.h>
#include <tzfile.h>
#include <login_cap.h>
#include <bsd_auth.h>
#include "util.h"
static char *pwd_update(const struct passwd *, const struct passwd *);
int
login_check_expire(FILE *back, struct passwd *pwd, char *class, int lastchance)
{
auth_session_t *as;
login_cap_t *lc;
quad_t dead, expire, warn;
char *p;
if ((as = auth_open()) == NULL) {
syslog(LOG_ERR, "failed to create auth session");
return (1);
}
if (auth_setpwd(as, pwd) < 0) {
syslog(LOG_ERR, "failed to set pwd entry in auth session");
return (1);
}
expire = auth_check_change(as);
auth_close(as);
if (expire != 0) {
fprintf(back, BI_VALUE " expire %qd\n", expire);
if (class == NULL)
class = pwd->pw_class;
if ((lc = login_getclass(class)) == NULL) {
dead = 0;
warn = 0;
} else {
dead = login_getcaptime(lc, "password-dead", 0, 0);
warn = login_getcaptime(lc, "password-warn",
2 * DAYSPERWEEK * SECSPERDAY,
2 * DAYSPERWEEK * SECSPERDAY);
if (dead < 0) {
syslog(LOG_ERR, "class %s password-dead is %qd",
lc->lc_class, dead);
dead = 0;
}
if (warn < 0) {
syslog(LOG_ERR, "class %s password-warn is %qd",
lc->lc_class, warn);
warn = 0;
}
}
login_close(lc);
/*
* If their password is dead (expired longer than
* password-dead) then just reject them. If it is
* expired but not dead yet, reject them with a
* PWEXPIRED so login knows they can still sort of
* get in.
*/
if (expire < -dead) {
syslog(LOG_WARNING, "%s: dead password", pwd->pw_name);
fprintf(back, BI_VALUE
" errormsg Your password has expired\n");
fprintf(back, BI_REJECT "\n");
return (1);
}
if (expire < 0) {
if (lastchance) {
struct passwd *npwd;
endpwent();
/*
* Only let them play this game once.
* Set their password change time to 1.
* This will most certainly cause any
* expired password to be dead, as well.
*/
npwd = pw_dup(pwd);
npwd->pw_change = 1;
p = pwd_update(npwd, pwd);
memset(npwd->pw_passwd, 0,
strlen(npwd->pw_passwd));
free(npwd);
if (p != NULL) {
fprintf(back, BI_VALUE " errormsg %s",
auth_mkvalue(p));
fprintf(back, BI_REJECT "\n");
return (1);
}
}
syslog(LOG_WARNING, "%s: expired password", pwd->pw_name);
fprintf(back, BI_VALUE
" errormsg Your password has expired\n");
fprintf(back, BI_PWEXPIRED "\n");
return (1);
}
/*
* If their password is not expired but is about to expire
* then warn them.
*/
if (expire <= warn) {
fprintf(back, BI_VALUE
" warnmsg Your password expires on %s\n",
ctime(&pwd->pw_change));
}
}
return (0);
}
static char *
pwd_update(const struct passwd *pwd, const struct passwd *opwd)
{
int tfd, pfd;
pw_init();
tfd = pw_lock(0);
if (tfd < 0) {
if (errno == EEXIST)
return("the passwd file is busy.");
else
return("can't open passwd temp file");
}
pfd = open(_PATH_MASTERPASSWD, O_RDONLY, 0);
if (pfd < 0 || fcntl(pfd, F_SETFD, 1) == -1) {
pw_abort();
return(strerror(errno));
}
pw_copy(pfd, tfd, pwd, opwd);
if (pw_mkdb(pwd->pw_name, 0) < 0) {
pw_abort();
return("unable to update password database");
}
return(NULL);
}