2 * Copyright (c) 2002 Chris Adams. All rights reserved.
4 * Redistribution and use in source and binary forms, with or without
5 * modification, are permitted provided that the following conditions
7 * 1. Redistributions of source code must retain the above copyright
8 * notice, this list of conditions and the following disclaimer.
9 * 2. Redistributions in binary form must reproduce the above copyright
10 * notice, this list of conditions and the following disclaimer in the
11 * documentation and/or other materials provided with the distribution.
13 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
14 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
15 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
16 * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
17 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
18 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
19 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
20 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
21 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
22 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
33 #include <sys/resource.h>
37 #include <sys/types.h>
38 #include <sys/security.h>
52 extern ServerOptions options
;
53 extern int saved_argc
;
54 extern char **saved_argv
;
57 sia_password_change_required(const char *user
)
59 struct es_passwd
*acct
;
63 set_auth_parameters(saved_argc
, saved_argv
);
65 if ((acct
= getespwnam(user
)) == NULL
) {
66 error("Couldn't access protected database entry for %s", user
);
71 /* If forced password change flag is set, honor it */
72 if (acct
->uflg
->fg_psw_chg_reqd
&& acct
->ufld
->fd_psw_chg_reqd
) {
77 /* Obtain password lifetime; if none, it can't have expired */
78 if (acct
->uflg
->fg_expire
)
79 pw_life
= acct
->ufld
->fd_expire
;
80 else if (acct
->sflg
->fg_expire
)
81 pw_life
= acct
->sfld
->fd_expire
;
87 /* Offset from last change; if none, it must be expired */
88 if (acct
->uflg
->fg_schange
)
89 pw_date
= acct
->ufld
->fd_schange
+ pw_life
;
97 /* If expiration date is prior to now, change password */
99 return (pw_date
<= time((time_t *) NULL
));
103 sys_auth_passwd(Authctxt
*authctxt
, const char *pass
)
106 SIAENTITY
*ent
= NULL
;
109 host
= get_canonical_hostname(options
.use_dns
);
111 if (!authctxt
->user
|| pass
== NULL
|| pass
[0] == '\0')
114 if (sia_ses_init(&ent
, saved_argc
, saved_argv
, host
, authctxt
->user
,
115 NULL
, 0, NULL
) != SIASUCCESS
)
118 if ((ret
= sia_ses_authent(NULL
, pass
, ent
)) != SIASUCCESS
) {
119 error("Couldn't authenticate %s from %s",
120 authctxt
->user
, host
);
122 sia_ses_release(&ent
);
127 sia_ses_release(&ent
);
129 authctxt
->force_pwchange
= sia_password_change_required(
136 session_setup_sia(struct passwd
*pw
, char *tty
)
138 SIAENTITY
*ent
= NULL
;
141 host
= get_canonical_hostname(options
.use_dns
);
143 if (sia_ses_init(&ent
, saved_argc
, saved_argv
, host
, pw
->pw_name
,
144 tty
, 0, NULL
) != SIASUCCESS
)
145 fatal("sia_ses_init failed");
147 if (sia_make_entity_pwd(pw
, ent
) != SIASUCCESS
) {
148 sia_ses_release(&ent
);
149 fatal("sia_make_entity_pwd failed");
152 ent
->authtype
= SIA_A_NONE
;
153 if (sia_ses_estab(sia_collect_trm
, ent
) != SIASUCCESS
)
154 fatal("Couldn't establish session for %s from %s",
157 if (sia_ses_launch(sia_collect_trm
, ent
) != SIASUCCESS
)
158 fatal("Couldn't launch session for %s from %s",
161 sia_ses_release(&ent
);
164 permanently_set_uid(pw
);
167 #endif /* HAVE_OSF_SIA */