termux-packages/x11-packages/xrdp/sesman-no-shadow.patch
2022-04-18 14:08:47 +05:30

282 lines
5.8 KiB
Diff

diff -uNr xrdp-0.9.8/sesman/verify_user.c xrdp-0.9.8.mod/sesman/verify_user.c
--- xrdp-0.9.8/sesman/verify_user.c 2018-03-26 09:18:26.000000000 +0300
+++ xrdp-0.9.8.mod/sesman/verify_user.c 2018-12-27 15:46:20.210152209 +0200
@@ -33,8 +33,6 @@
#include <stdio.h>
#include <string.h>
#include <sys/types.h>
-#include <crypt.h>
-#include <shadow.h>
#include <pwd.h>
#ifndef SECS_PER_DAY
@@ -43,58 +41,12 @@
extern struct config_sesman *g_cfg; /* in sesman.c */
-static int
-auth_crypt_pwd(const char *pwd, const char *pln, char *crp);
-
-static int
-auth_account_disabled(struct spwd *stp);
-
/******************************************************************************/
/* returns boolean */
long
auth_userpass(const char *user, const char *pass, int *errorcode)
{
- const char *encr;
- const char *epass;
- struct passwd *spw;
- struct spwd *stp;
-
- spw = getpwnam(user);
-
- if (spw == 0)
- {
- return 0;
- }
-
- if (g_strncmp(spw->pw_passwd, "x", 3) == 0)
- {
- /* the system is using shadow */
- stp = getspnam(user);
-
- if (stp == 0)
- {
- return 0;
- }
-
- if (1 == auth_account_disabled(stp))
- {
- log_message(LOG_LEVEL_INFO, "account %s is disabled", user);
- return 0;
- }
-
- encr = stp->sp_pwdp;
- }
- else
- {
- /* old system with only passwd */
- encr = spw->pw_passwd;
- }
- epass = crypt(pass, encr);
- if (epass == 0)
- {
- return 0;
- }
- return (strcmp(encr, epass) == 0);
+ return 1;
}
/******************************************************************************/
@@ -131,207 +83,11 @@
int
auth_check_pwd_chg(const char *user)
{
- struct passwd *spw;
- struct spwd *stp;
- int now;
- long today;
-
- spw = getpwnam(user);
-
- if (spw == 0)
- {
- return AUTH_PWD_CHG_ERROR;
- }
-
- if (g_strncmp(spw->pw_passwd, "x", 3) != 0)
- {
- /* old system with only passwd */
- return AUTH_PWD_CHG_OK;
- }
-
- /* the system is using shadow */
- stp = getspnam(user);
-
- if (stp == 0)
- {
- return AUTH_PWD_CHG_ERROR;
- }
-
- /* check if we need a pwd change */
- now = g_time1();
- today = now / SECS_PER_DAY;
-
- if (stp->sp_expire == -1)
- {
- return AUTH_PWD_CHG_OK;
- }
-
- if (today >= (stp->sp_lstchg + stp->sp_max - stp->sp_warn))
- {
- return AUTH_PWD_CHG_CHANGE;
- }
-
- if (today >= (stp->sp_lstchg + stp->sp_max))
- {
- return AUTH_PWD_CHG_CHANGE_MANDATORY;
- }
-
- if (today < ((stp->sp_lstchg) + (stp->sp_min)))
- {
- /* cannot change pwd for now */
- return AUTH_PWD_CHG_NOT_NOW;
- }
-
return AUTH_PWD_CHG_OK;
}
int
auth_change_pwd(const char *user, const char *newpwd)
{
- struct passwd *spw;
- struct spwd *stp;
- char hash[35] = "";
- long today;
-
- FILE *fd;
-
- if (0 != lckpwdf())
- {
- return 1;
- }
-
- /* open passwd */
- spw = getpwnam(user);
-
- if (spw == 0)
- {
- return 1;
- }
-
- if (g_strncmp(spw->pw_passwd, "x", 3) != 0)
- {
- /* old system with only passwd */
- if (auth_crypt_pwd(spw->pw_passwd, newpwd, hash) != 0)
- {
- ulckpwdf();
- return 1;
- }
-
- spw->pw_passwd = g_strdup(hash);
- fd = fopen("/etc/passwd", "rw");
- putpwent(spw, fd);
- }
- else
- {
- /* the system is using shadow */
- stp = getspnam(user);
-
- if (stp == 0)
- {
- return 1;
- }
-
- /* old system with only passwd */
- if (auth_crypt_pwd(stp->sp_pwdp, newpwd, hash) != 0)
- {
- ulckpwdf();
- return 1;
- }
-
- stp->sp_pwdp = g_strdup(hash);
- today = g_time1() / SECS_PER_DAY;
- stp->sp_lstchg = today;
- stp->sp_expire = today + stp->sp_max + stp->sp_inact;
- fd = fopen("/etc/shadow", "rw");
- putspent(stp, fd);
- }
-
- ulckpwdf();
- return 0;
-}
-
-/**
- *
- * @brief Password encryption
- * @param pwd Old password
- * @param pln Plaintext new password
- * @param crp Crypted new password
- *
- */
-
-static int
-auth_crypt_pwd(const char *pwd, const char *pln, char *crp)
-{
- char salt[13] = "$1$";
- int saltcnt = 0;
- char *encr;
-
- if (g_strncmp(pwd, "$1$", 3) == 0)
- {
- /* gnu style crypt(); */
- saltcnt = 3;
-
- while ((pwd[saltcnt] != '$') && (saltcnt < 11))
- {
- salt[saltcnt] = pwd[saltcnt];
- saltcnt++;
- }
-
- salt[saltcnt] = '$';
- salt[saltcnt + 1] = '\0';
- }
- else
- {
- /* classic two char salt */
- salt[0] = pwd[0];
- salt[1] = pwd[1];
- salt[2] = '\0';
- }
-
- encr = crypt(pln, salt);
- g_strncpy(crp, encr, 34);
-
- return 0;
-}
-
-/**
- *
- * @return 1 if the account is disabled, 0 otherwise
- *
- */
-static int
-auth_account_disabled(struct spwd *stp)
-{
- int today;
-
- if (0 == stp)
- {
- /* if an invalid struct was passed we assume a disabled account */
- return 1;
- }
-
- today = g_time1() / SECS_PER_DAY;
-
- LOG_DBG("last %d", stp->sp_lstchg);
- LOG_DBG("min %d", stp->sp_min);
- LOG_DBG("max %d", stp->sp_max);
- LOG_DBG("inact %d", stp->sp_inact);
- LOG_DBG("warn %d", stp->sp_warn);
- LOG_DBG("expire %d", stp->sp_expire);
- LOG_DBG("today %d", today);
-
- if ((stp->sp_expire != -1) && (today >= stp->sp_expire))
- {
- return 1;
- }
-
- if ((stp->sp_max >= 0) &&
- (stp->sp_inact >= 0) &&
- (stp->sp_lstchg > 0) &&
- (today >= (stp->sp_lstchg + stp->sp_max + stp->sp_inact)))
- {
- return 1;
- }
-
- return 0;
+ return 1;
}