blank.c

/*
* $Id$
*/ /* Andrew Morgan (morgan@parc.power.net) -- a self contained `blank'
* application
*
* I am not very proud of this code. It makes use of a possibly ill-
* defined pamh pointer to call pam_strerror() with. The reason that
* I was sloppy with this is historical (pam_strerror, prior to 0.59,
* did not require a pamh argument) and if this program is used as a
* model for anything, I should wish that you will take this error into
* account.
*/ #include <stdio.h>
#include <stdlib.h> #include <security/pam_appl.h>
#include <security/pam_misc.h> /* ------ some local (static) functions ------- */ static void bail_out(pam_handle_t *pamh, int really, int code, const char *fn)
{
fprintf(stderr,"==> called %s()\n got: `%s'\n", fn,
pam_strerror(pamh, code));
if (really && code)
exit ();
} /* ------ some static data objects ------- */ static struct pam_conv conv = {
misc_conv,
NULL
}; /* ------- the application itself -------- */ int main(int argc, char **argv)
{
pam_handle_t *pamh=NULL;
char *username=NULL;
int retcode; /* did the user call with a username as an argument ? */ if (argc > ) {
fprintf(stderr,"usage: %s [username]\n",argv[]);
} else if (argc == ) {
username = argv[];
} /* initialize the Linux-PAM library */
retcode = pam_start("blank", username, &conv, &pamh);
bail_out(pamh,,retcode,"pam_start"); /* test the environment stuff */
{
#define MAXENV 15
const char *greek[MAXENV] = {
"a=alpha", "b=beta", "c=gamma", "d=delta", "e=epsilon",
"f=phi", "g=psi", "h=eta", "i=iota", "j=mu", "k=nu",
"l=zeta", "h=", "d", "k=xi"
};
char **env;
int i; for (i=; i<MAXENV; ++i) {
retcode = pam_putenv(pamh,greek[i]);
bail_out(pamh,,retcode,"pam_putenv");
}
env = pam_getenvlist(pamh);
if (env)
env = pam_misc_drop_env(env);
else
fprintf(stderr,"???\n");
fprintf(stderr,"a test: c=[%s], j=[%s]\n"
, pam_getenv(pamh, "c"), pam_getenv(pamh, "j"));
} /* to avoid using goto we abuse a loop here */
for (;;) {
/* authenticate the user --- `0' here, could have been PAM_SILENT
* | PAM_DISALLOW_NULL_AUTHTOK */ retcode = pam_authenticate(pamh, );
bail_out(pamh,,retcode,"pam_authenticate"); /* has the user proved themself valid? */
if (retcode != PAM_SUCCESS) {
fprintf(stderr,"%s: invalid request\n",argv[]);
break;
} /* the user is valid, but should they have access at this
time? */ retcode = pam_acct_mgmt(pamh, ); /* `0' could be as above */
bail_out(pamh,,retcode,"pam_acct_mgmt"); if (retcode == PAM_NEW_AUTHTOK_REQD) {
fprintf(stderr,"Application must request new password...\n");
retcode = pam_chauthtok(pamh,PAM_CHANGE_EXPIRED_AUTHTOK);
bail_out(pamh,,retcode,"pam_chauthtok");
} if (retcode != PAM_SUCCESS) {
fprintf(stderr,"%s: invalid request\n",argv[]);
break;
} /* `0' could be as above */
retcode = pam_setcred(pamh, PAM_ESTABLISH_CRED);
bail_out(pamh,,retcode,"pam_setcred1"); if (retcode != PAM_SUCCESS) {
fprintf(stderr,"%s: problem setting user credentials\n"
,argv[]);
break;
} /* open a session for the user --- `0' could be PAM_SILENT */
retcode = pam_open_session(pamh,);
bail_out(pamh,,retcode,"pam_open_session");
if (retcode != PAM_SUCCESS) {
fprintf(stderr,"%s: problem opening a session\n",argv[]);
break;
} fprintf(stderr,"The user has been authenticated and `logged in'\n"); /* close a session for the user --- `0' could be PAM_SILENT
* it is possible that this pam_close_call is in another program..
*/ retcode = pam_close_session(pamh,);
bail_out(pamh,,retcode,"pam_close_session");
if (retcode != PAM_SUCCESS) {
fprintf(stderr,"%s: problem closing a session\n",argv[]);
break;
} retcode = pam_setcred(pamh, PAM_DELETE_CRED);
bail_out(pamh,,retcode,"pam_setcred2"); break; /* don't go on for ever! */
} /* close the Linux-PAM library */
retcode = pam_end(pamh, PAM_SUCCESS);
pamh = NULL; bail_out(pamh,,retcode,"pam_end"); exit();
}

check_user.c

/*
$Id$ This program was contributed by Shane Watts <shane@icarus.bofh.asn.au>
slight modifications by AGM. You need to add the following (or equivalent) to the /etc/pam.conf file.
# check authorization
check auth required pam_unix_auth.so
check account required pam_unix_acct.so
*/ #include <security/pam_appl.h>
#include <security/pam_misc.h>
#include <stdio.h> static struct pam_conv conv = {
misc_conv,
NULL
}; int main(int argc, char *argv[])
{
pam_handle_t *pamh=NULL;
int retval;
const char *user="nobody"; if(argc == ) {
user = argv[];
} if(argc > ) {
fprintf(stderr, "Usage: check_user [username]\n");
exit();
} retval = pam_start("check", user, &conv, &pamh); if (retval == PAM_SUCCESS)
retval = pam_authenticate(pamh, ); /* is user really user? */ if (retval == PAM_SUCCESS)
retval = pam_acct_mgmt(pamh, ); /* permitted access? */ /* This is where we have been authorized or not. */ if (retval == PAM_SUCCESS) {
fprintf(stdout, "Authenticated\n");
} else {
fprintf(stdout, "Not Authenticated\n");
} if (pam_end(pamh,retval) != PAM_SUCCESS) { /* close Linux-PAM */
pamh = NULL;
fprintf(stderr, "check_user: failed to release authenticator\n");
exit();
} return ( retval == PAM_SUCCESS ? : ); /* indicate success */
}

vpass.c

#include "config.h"

#include <stdlib.h>
#include <stdio.h>
#include <unistd.h>
#include <pwd.h>
#include <sys/types.h>
#include <security/pam_appl.h> static int
test_conv (int num_msg UNUSED, const struct pam_message **msgm UNUSED,
struct pam_response **response UNUSED, void *appdata_ptr UNUSED)
{
return ;
} static struct pam_conv conv = {
test_conv,
NULL
}; int main(void)
{
char *user;
pam_handle_t *pamh;
struct passwd *pw;
uid_t uid;
int res; uid = geteuid();
pw = getpwuid(uid);
if (pw) {
user = pw->pw_name;
} else {
fprintf(stderr, "Invalid userid: %lu\n", (unsigned long) uid);
exit();
} pam_start("vpass", user, &conv, &pamh);
pam_set_item(pamh, PAM_TTY, "/dev/tty");
if ((res = pam_authenticate(pamh, )) != PAM_SUCCESS) {
fprintf(stderr, "Oops: %s\n", pam_strerror(pamh, res));
exit();
} pam_end(pamh, res);
exit();
}

xsh.c

/* Andrew Morgan (morgan@kernel.org) -- an example application
* that invokes a shell, based on blank.c */ #include "config.h" #include <stdio.h>
#include <stdlib.h> #include <security/pam_appl.h>
#include <security/pam_misc.h> #include <pwd.h>
#include <sys/types.h>
#include <unistd.h> /* ------ some local (static) functions ------- */ static void bail_out(pam_handle_t *pamh,int really, int code, const char *fn)
{
fprintf(stderr,"==> called %s()\n got: `%s'\n", fn,
pam_strerror(pamh,code));
if (really && code)
exit ();
} /* ------ some static data objects ------- */ static struct pam_conv conv = {
misc_conv,
NULL
}; /* ------- the application itself -------- */ int main(int argc, char **argv)
{
pam_handle_t *pamh=NULL;
const void *username=NULL;
const char *service="xsh";
int retcode; /* did the user call with a username as an argument ?
* did they also */ if (argc > ) {
fprintf(stderr,"usage: %s [username [service-name]]\n",argv[]);
}
if ((argc >= ) && (argv[][] != '-')) {
username = argv[];
}
if (argc == ) {
service = argv[];
} /* initialize the Linux-PAM library */
retcode = pam_start(service, username, &conv, &pamh);
bail_out(pamh,,retcode,"pam_start"); /* fill in the RUSER and RHOST etc. fields */
{
char buffer[];
struct passwd *pw;
const char *tty; pw = getpwuid(getuid());
if (pw != NULL) {
retcode = pam_set_item(pamh, PAM_RUSER, pw->pw_name);
bail_out(pamh,,retcode,"pam_set_item(PAM_RUSER)");
} retcode = gethostname(buffer, sizeof(buffer)-);
if (retcode) {
perror("failed to look up hostname");
retcode = pam_end(pamh, PAM_ABORT);
bail_out(pamh,,retcode,"pam_end");
}
retcode = pam_set_item(pamh, PAM_RHOST, buffer);
bail_out(pamh,,retcode,"pam_set_item(PAM_RHOST)"); tty = ttyname(fileno(stdin));
if (tty) {
retcode = pam_set_item(pamh, PAM_TTY, tty);
bail_out(pamh,,retcode,"pam_set_item(PAM_RHOST)");
}
} /* to avoid using goto we abuse a loop here */
for (;;) {
/* authenticate the user --- `0' here, could have been PAM_SILENT
* | PAM_DISALLOW_NULL_AUTHTOK */ retcode = pam_authenticate(pamh, );
bail_out(pamh,,retcode,"pam_authenticate"); /* has the user proved themself valid? */
if (retcode != PAM_SUCCESS) {
fprintf(stderr,"%s: invalid request\n",argv[]);
break;
} /* the user is valid, but should they have access at this
time? */ retcode = pam_acct_mgmt(pamh, ); /* `0' could be as above */
bail_out(pamh,,retcode,"pam_acct_mgmt"); if (retcode == PAM_NEW_AUTHTOK_REQD) {
fprintf(stderr,"Application must request new password...\n");
retcode = pam_chauthtok(pamh,PAM_CHANGE_EXPIRED_AUTHTOK);
bail_out(pamh,,retcode,"pam_chauthtok");
} if (retcode != PAM_SUCCESS) {
fprintf(stderr,"%s: invalid request\n",argv[]);
break;
} /* `0' could be as above */
retcode = pam_setcred(pamh, PAM_ESTABLISH_CRED);
bail_out(pamh,,retcode,"pam_setcred"); if (retcode != PAM_SUCCESS) {
fprintf(stderr,"%s: problem setting user credentials\n"
,argv[]);
break;
} /* open a session for the user --- `0' could be PAM_SILENT */
retcode = pam_open_session(pamh,);
bail_out(pamh,,retcode,"pam_open_session");
if (retcode != PAM_SUCCESS) {
fprintf(stderr,"%s: problem opening a session\n",argv[]);
break;
} pam_get_item(pamh, PAM_USER, &username);
fprintf(stderr,
"The user [%s] has been authenticated and `logged in'\n",
(const char *)username); /* this is always a really bad thing for security! */
retcode = system("/bin/sh"); /* close a session for the user --- `0' could be PAM_SILENT
* it is possible that this pam_close_call is in another program..
*/ retcode = pam_close_session(pamh,);
bail_out(pamh,,retcode,"pam_close_session");
if (retcode != PAM_SUCCESS) {
fprintf(stderr,"%s: problem closing a session\n",argv[]);
break;
} /* `0' could be as above */
retcode = pam_setcred(pamh, PAM_DELETE_CRED);
bail_out(pamh,,retcode,"pam_setcred");
if (retcode != PAM_SUCCESS) {
fprintf(stderr,"%s: problem deleting user credentials\n"
,argv[]);
break;
} break; /* don't go on for ever! */
} /* close the Linux-PAM library */
retcode = pam_end(pamh, PAM_SUCCESS);
pamh = NULL;
bail_out(pamh,,retcode,"pam_end"); return ();
}

pam_examples的更多相关文章

随机推荐

  1. 用js+css3做一个小球投篮的动画(easing)

    <!DOCTYPE html> <html> <head> <script src="jquery-1.11.3.min.js">& ...

  2. Abp的AspNetZero5.0版本无法使用ctrl+f5调式

    AspNetZero是基于Abp框架开发的商业程序,最近从Abp交流群中得知5.0版本开始加入了防盗版的功能,在vs中也无法使用ctrl+f5进行调试.经过两天的摸索,我发现不能进行调试的原因也是因为 ...

  3. bzoj3168-钙铁锌硒维生素

    题目 这道题的题意理解很重要,直接写原题了. 小林把人体需要的营养分成了\(n\)种,他准备了2套厨师机器人,一套厨师机器人有\(n\)个,每个厨师机器人只会做一道菜,这道菜一斤能提供第\(i\)种营 ...

  4. BZOJ 1486 最小圈(01分数规划)

    好像是很normal的01分数规划题.最小比率生成环. u(c)=sigma(E)/k.转化一下就是k*u(c)=sigma(E). sigma(E-u(c))=0. 所以答案对于这个式子是有单调性的 ...

  5. 【codevs3160】最长公共子串 后缀数组

    题目描述 给出两个由小写字母组成的字符串,求它们的最长公共子串的长度. 输入 读入两个字符串 输出 输出最长公共子串的长度 样例输入 yeshowmuchiloveyoumydearmotherrea ...

  6. Django CRM系统

    本节内容 业务痛点分析 项目需求讨论 使用场景分析 表结构设计 业务痛点分析 我2013年刚加入老男孩教育的时候,学校就一间教室,2个招生老师,招了学生后,招生老师就在自己的excel表里记录一下,每 ...

  7. 理清一下JavaScript面向对象思路

    借这篇文章理清一下自己的思路,同时也希望能给和我同样一知半解的同学理清一下思路.引发思考来自于我犯的一个错误,错误代码是这样的: 1 var o = { 2     ... 3 } 4 var obj ...

  8. 解密百度图片URL

    今天想爬百度图片搜索,但因为爬出来的链接乱七八糟,有些打不开,对于我这个完美主义者而言,这实在是太残酷,但我还是把爬虫过程的核心部分——解密URL给记录下来了. 下图是捕获的json数据的其中一条数据 ...

  9. Bigbluebutton安装过程

    BigBlueButton安装过程(翻译) 欢迎来到BigBlueButton 1.0-beta安装指南(以下简称BigBlueButton 1.0).BigBlueButton是一个开放源代码的网络 ...

  10. Http字段含义

    转载自:http://blog.csdn.net/sand_ant/article/details/10503579 一.request请求Header简介 Accept:--客户机支持的类型 Acc ...