229 lines
5.6 KiB
C
229 lines
5.6 KiB
C
/*
|
|
* CU sudo version 1.5.9
|
|
* Copyright (c) 1996, 1998, 1999 Todd C. Miller <Todd.Miller@courtesan.com>
|
|
*
|
|
* This program is free software; you can redistribute it and/or modify
|
|
* it under the terms of the GNU General Public License as published by
|
|
* the Free Software Foundation; either version 1, or (at your option)
|
|
* any later version.
|
|
*
|
|
* This program is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
* GNU General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU General Public License
|
|
* along with this program; if not, write to the Free Software
|
|
* Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
|
|
*
|
|
* Please send bugs, changes, problems to sudo-bugs@courtesan.com
|
|
*
|
|
*******************************************************************
|
|
*
|
|
* This module contains sudo_getpwuid(), a function that
|
|
* Makes a dynamic copy of the struct passwd returned by
|
|
* getpwuid() and substitutes the shadow password if
|
|
* necesary.
|
|
*
|
|
* Todd C. Miller Mon Nov 20 13:53:06 MST 1995
|
|
*/
|
|
|
|
#include "config.h"
|
|
|
|
#include <stdio.h>
|
|
#ifdef STDC_HEADERS
|
|
#include <stdlib.h>
|
|
#endif /* STDC_HEADERS */
|
|
#ifdef HAVE_STRING_H
|
|
#include <string.h>
|
|
#endif /* HAVE_STRING_H */
|
|
#ifdef HAVE_UNISTD_H
|
|
#include <unistd.h>
|
|
#endif /* HAVE_UNISTD_H */
|
|
#include <sys/types.h>
|
|
#include <sys/stat.h>
|
|
#include <sys/param.h>
|
|
#include <netinet/in.h>
|
|
#include <pwd.h>
|
|
#ifdef HAVE_GETSPNAM
|
|
# include <shadow.h>
|
|
#endif /* HAVE_GETSPNAM */
|
|
#ifdef HAVE_GETPRPWNAM
|
|
# ifdef __hpux
|
|
# include <hpsecurity.h>
|
|
# else
|
|
# include <sys/security.h>
|
|
# endif /* __hpux */
|
|
# include <prot.h>
|
|
#endif /* HAVE_GETPRPWNAM */
|
|
#ifdef HAVE_GETPWANAM
|
|
# include <sys/label.h>
|
|
# include <sys/audit.h>
|
|
# include <pwdadj.h>
|
|
#endif /* HAVE_GETPWANAM */
|
|
#ifdef HAVE_GETAUTHUID
|
|
# include <auth.h>
|
|
#endif /* HAVE_GETAUTHUID */
|
|
|
|
#include "sudo.h"
|
|
|
|
#ifndef lint
|
|
static const char rcsid[] = "$Sudo$";
|
|
#endif /* lint */
|
|
|
|
#ifndef STDC_HEADERS
|
|
extern char *getenv __P((const char *));
|
|
#endif /* !STDC_HEADERS */
|
|
|
|
/*
|
|
* Global variables (yuck)
|
|
*/
|
|
#if defined(HAVE_GETPRPWNAM) && defined(__alpha)
|
|
int crypt_type = INT_MAX;
|
|
#endif /* HAVE_GETPRPWNAM && __alpha */
|
|
|
|
|
|
/*
|
|
* Local functions not visible outside getspwuid.c
|
|
*/
|
|
static char *sudo_getshell __P((struct passwd *));
|
|
static char *sudo_getepw __P((struct passwd *));
|
|
|
|
|
|
|
|
/**********************************************************************
|
|
*
|
|
* sudo_getshell()
|
|
*
|
|
* This function returns the user's shell based on either the
|
|
* SHELL evariable or the passwd(5) entry (in that order).
|
|
*/
|
|
|
|
static char *sudo_getshell(pw)
|
|
struct passwd *pw;
|
|
{
|
|
char *pw_shell;
|
|
|
|
if ((pw_shell = getenv("SHELL")) == NULL)
|
|
pw_shell = pw -> pw_shell;
|
|
|
|
#ifdef _PATH_BSHELL
|
|
/* empty string "" means bourne shell */
|
|
if (*pw_shell == '\0')
|
|
pw_shell = _PATH_BSHELL;
|
|
#endif /* _PATH_BSHELL */
|
|
|
|
return(pw_shell);
|
|
}
|
|
|
|
|
|
/**********************************************************************
|
|
*
|
|
* sudo_getepw()
|
|
*
|
|
* This function returns the encrypted password for the user described
|
|
* by pw. If there is a shadow password it is returned, else the
|
|
* normal UN*X password is returned instead.
|
|
*/
|
|
|
|
static char *sudo_getepw(pw)
|
|
struct passwd *pw;
|
|
{
|
|
|
|
/* if there is a function to check for shadow enabled, use it... */
|
|
#ifdef HAVE_ISCOMSEC
|
|
if (!iscomsec())
|
|
return(pw->pw_passwd);
|
|
#endif /* HAVE_ISCOMSEC */
|
|
#ifdef HAVE_ISSECURE
|
|
if (!issecure())
|
|
return(pw->pw_passwd);
|
|
#endif /* HAVE_ISSECURE */
|
|
|
|
#ifdef HAVE_GETPRPWNAM
|
|
{
|
|
struct pr_passwd *spw;
|
|
|
|
spw = getprpwnam(pw->pw_name);
|
|
if (spw != NULL && spw->ufld.fd_encrypt != NULL) {
|
|
# ifdef __alpha
|
|
crypt_type = spw -> ufld.fd_oldcrypt;
|
|
# endif /* __alpha */
|
|
return(spw -> ufld.fd_encrypt);
|
|
}
|
|
}
|
|
#endif /* HAVE_GETPRPWNAM */
|
|
#ifdef HAVE_GETSPNAM
|
|
{
|
|
struct spwd *spw;
|
|
|
|
if ((spw = getspnam(pw -> pw_name)) && spw -> sp_pwdp)
|
|
return(spw -> sp_pwdp);
|
|
}
|
|
#endif /* HAVE_GETSPNAM */
|
|
#ifdef HAVE_GETSPWUID
|
|
{
|
|
struct s_passwd *spw;
|
|
|
|
if ((spw = getspwuid(pw -> pw_uid)) && spw -> pw_passwd)
|
|
return(spw -> pw_passwd);
|
|
}
|
|
#endif /* HAVE_GETSPWUID */
|
|
#ifdef HAVE_GETPWANAM
|
|
{
|
|
struct passwd_adjunct *spw;
|
|
|
|
if ((spw = getpwanam(pw -> pw_name)) && spw -> pwa_passwd)
|
|
return(spw -> pwa_passwd);
|
|
}
|
|
#endif /* HAVE_GETPWANAM */
|
|
#ifdef HAVE_GETAUTHUID
|
|
{
|
|
AUTHORIZATION *spw;
|
|
|
|
if ((spw = getauthuid(pw -> pw_uid)) && spw -> a_password)
|
|
return(spw -> a_password);
|
|
}
|
|
#endif /* HAVE_GETAUTHUID */
|
|
|
|
/* Fall back on normal passwd */
|
|
return(pw->pw_passwd);
|
|
}
|
|
|
|
|
|
/**********************************************************************
|
|
*
|
|
* sudo_getpwuid()
|
|
*
|
|
* This function dynamically allocates space for a struct password
|
|
* and the constituent parts that we care about. If shadow passwords
|
|
* are in use, it substitutes the shadow password for pw_passwd.
|
|
*/
|
|
|
|
struct passwd *sudo_getpwuid(uid)
|
|
uid_t uid;
|
|
{
|
|
struct passwd *pw, *local_pw;
|
|
|
|
if ((pw = getpwuid(uid)) == NULL)
|
|
return(NULL);
|
|
|
|
/* allocate space for a local copy of pw */
|
|
local_pw = (struct passwd *) emalloc(sizeof(struct passwd));
|
|
|
|
/*
|
|
* Copy the struct passwd and the interesting strings...
|
|
*/
|
|
(void) memcpy(local_pw, pw, sizeof(struct passwd));
|
|
local_pw->pw_name = estrdup(pw->pw_name);
|
|
local_pw->pw_dir = estrdup(pw->pw_dir);
|
|
|
|
/* pw_shell is a special case since we overide with $SHELL */
|
|
local_pw->pw_shell = estrdup(sudo_getshell(pw));
|
|
|
|
/* pw_passwd gets a shadow password if applicable */
|
|
local_pw->pw_passwd = estrdup(sudo_getepw(pw));
|
|
|
|
return(local_pw);
|
|
}
|