1 /* passwd.c --- verifying typed passwords with the OS.
2 * xscreensaver, Copyright (c) 1993-2003 Jamie Zawinski <jwz@jwz.org>
4 * Permission to use, copy, modify, distribute, and sell this software and its
5 * documentation for any purpose is hereby granted without fee, provided that
6 * the above copyright notice appear in all copies and that both that
7 * copyright notice and this permission notice appear in supporting
8 * documentation. No representations are made about the suitability of this
9 * software for any purpose. It is provided "as is" without express or
17 #ifndef NO_LOCKING /* whole file */
25 extern char *blurb(void);
26 extern void check_for_leaks (const char *where);
38 #define countof(x) (sizeof((x))/sizeof(*(x)))
42 Bool (*init) (int argc, char **argv, Bool verbose_p);
43 Bool (*priv_init) (int argc, char **argv, Bool verbose_p);
44 Bool (*valid_p) (const char *typed_passwd, Bool verbose_p);
51 extern Bool kerberos_lock_init (int argc, char **argv, Bool verbose_p);
52 extern Bool kerberos_passwd_valid_p (const char *typed_passwd, Bool verbose_p);
55 extern Bool pam_priv_init (int argc, char **argv, Bool verbose_p);
56 extern Bool pam_passwd_valid_p (const char *typed_passwd, Bool verbose_p);
58 extern Bool pwent_lock_init (int argc, char **argv, Bool verbose_p);
59 extern Bool pwent_priv_init (int argc, char **argv, Bool verbose_p);
60 extern Bool pwent_passwd_valid_p (const char *typed_passwd, Bool verbose_p);
63 /* The authorization methods to try, in order.
64 Note that the last one (the pwent version) is actually two auth methods,
65 since that code tries shadow passwords, and then non-shadow passwords.
66 (It's all in the same file since the APIs are randomly nearly-identical.)
68 struct auth_methods methods[] = {
70 { "Kerberos", kerberos_lock_init, 0, kerberos_passwd_valid_p,
74 { "PAM", 0, pam_priv_init, pam_passwd_valid_p,
77 { "normal", pwent_lock_init, pwent_priv_init, pwent_passwd_valid_p,
83 lock_priv_init (int argc, char **argv, Bool verbose_p)
87 for (i = 0; i < countof(methods); i++)
89 if (!methods[i].priv_init)
90 methods[i].priv_initted_p = True;
92 methods[i].priv_initted_p = methods[i].priv_init (argc, argv,
95 if (methods[i].priv_initted_p)
98 fprintf (stderr, "%s: initialization of %s passwords failed.\n",
99 blurb(), methods[i].name);
106 lock_init (int argc, char **argv, Bool verbose_p)
110 for (i = 0; i < countof(methods); i++)
112 if (!methods[i].priv_initted_p) /* Bail if lock_priv_init failed. */
115 if (!methods[i].init)
116 methods[i].initted_p = True;
118 methods[i].initted_p = methods[i].init (argc, argv, verbose_p);
120 if (methods[i].initted_p)
123 fprintf (stderr, "%s: initialization of %s passwords failed.\n",
124 blurb(), methods[i].name);
131 passwd_valid_p (const char *typed_passwd, Bool verbose_p)
134 for (i = 0; i < countof(methods); i++)
136 int ok_p = (methods[i].initted_p &&
137 methods[i].valid_p (typed_passwd, verbose_p));
139 check_for_leaks (methods[i].name);
143 /* If we successfully authenticated by method N, but attempting
144 to authenticate by method N-1 failed, mention that (since if
145 an earlier authentication method fails and a later one succeeds,
146 something screwy is probably going on.)
148 if (verbose_p && i > 0)
150 for (j = 0; j < i; j++)
151 if (methods[j].initted_p)
153 "%s: authentication via %s passwords failed.\n",
154 blurb(), methods[j].name);
156 "%s: authentication via %s passwords succeeded.\n",
157 blurb(), methods[i].name);
160 return True; /* Successfully authenticated! */
164 return False; /* Authentication failure. */
167 #endif /* NO_LOCKING -- whole file */