From d524c8e88f558b9f2aebff39b6fbe77eab51e081 Mon Sep 17 00:00:00 2001 From: Daniel Baumann Date: Sun, 7 Apr 2024 19:43:08 +0200 Subject: Adding upstream version 43.0. Signed-off-by: Daniel Baumann --- pam_gdm/meson.build | 16 +++++++ pam_gdm/pam_gdm.c | 129 ++++++++++++++++++++++++++++++++++++++++++++++++++++ 2 files changed, 145 insertions(+) create mode 100644 pam_gdm/meson.build create mode 100644 pam_gdm/pam_gdm.c (limited to 'pam_gdm') diff --git a/pam_gdm/meson.build b/pam_gdm/meson.build new file mode 100644 index 0000000..f47d8e6 --- /dev/null +++ b/pam_gdm/meson.build @@ -0,0 +1,16 @@ +pam_gdm_deps = [ + libpam_dep, +] + +if keyutils_dep.found() + pam_gdm_deps += keyutils_dep +endif + +pam_gdm = library('pam_gdm', + 'pam_gdm.c', + dependencies: pam_gdm_deps, + include_directories: config_h_dir, + name_prefix: '', + install: true, + install_dir: pam_mod_dir, +) diff --git a/pam_gdm/pam_gdm.c b/pam_gdm/pam_gdm.c new file mode 100644 index 0000000..ef77f16 --- /dev/null +++ b/pam_gdm/pam_gdm.c @@ -0,0 +1,129 @@ +/* -*- Mode: C; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 8 -*- + * + * Copyright (C) 2016 Red Hat, Inc. + * + * This program is free software; you can redistribute it and/or modify + * it under the terms of the GNU General Public License as published by + * the Free Software Foundation; either version 2 of the License, or + * (at your option) any later version. + * + * This program is distributed in the hope that it will be useful, + * but WITHOUT ANY WARRANTY; without even the implied warranty of + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + * GNU General Public License for more details. + * + * You should have received a copy of the GNU General Public License + * along with this program; if not, write to the Free Software + * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA. + * + */ +#include + +#include + +#include +#include +#include +#include +#include + +#ifdef HAVE_KEYUTILS +#include +#endif + +int +pam_sm_authenticate (pam_handle_t *pamh, + int flags, + int argc, + const char **argv) +{ +#ifdef HAVE_KEYUTILS + long r; + size_t cached_passwords_length; + char *cached_passwords = NULL; + char *last_cached_password = NULL; + key_serial_t serial; + size_t i; + + serial = find_key_by_type_and_desc ("user", "cryptsetup", 0); + if (serial == 0) + return PAM_AUTHINFO_UNAVAIL; + + r = keyctl_read_alloc (serial, &cached_passwords); + if (r < 0) + return PAM_AUTHINFO_UNAVAIL; + + cached_passwords_length = r; + + /* + Find the last password in the NUL-separated list of passwords. + Multiple passwords are returned either when the user enters an + incorrect password or there are multiple encrypted drives. + In the case of an incorrect password the last one is correct. + In the case of multiple drives, choosing the last drive is as + arbitrary a choice as any other, but choosing the last password at + least supports multiple attempts on the last drive. + */ + last_cached_password = cached_passwords; + for (i = 0; i < cached_passwords_length; i++) { + last_cached_password = cached_passwords + i; + i += strlen (last_cached_password); + } + + r = pam_set_item (pamh, PAM_AUTHTOK, last_cached_password); + + free (cached_passwords); + + if (r < 0) + return PAM_AUTH_ERR; + else + return PAM_SUCCESS; +#endif + + return PAM_AUTHINFO_UNAVAIL; +} + +int +pam_sm_setcred (pam_handle_t *pamh, + int flags, + int argc, + const char **argv) +{ + return PAM_SUCCESS; +} + +int +pam_sm_acct_mgmt (pam_handle_t *pamh, + int flags, + int argc, + const char **argv) +{ + return PAM_SUCCESS; +} + +int +pam_sm_chauthtok (pam_handle_t *pamh, + int flags, + int argc, + const char **argv) +{ + return PAM_SUCCESS; +} + +int +pam_sm_open_session (pam_handle_t *pamh, + int flags, + int argc, + const char **argv) +{ + return PAM_SUCCESS; +} + +int +pam_sm_close_session (pam_handle_t *pamh, + int flags, + int argc, + const char **argv) +{ + return PAM_SUCCESS; +} -- cgit v1.2.3