summaryrefslogtreecommitdiff
path: root/src/gs-auth-helper.c.orig
diff options
context:
space:
mode:
authorPerberos <[email protected]>2011-11-04 22:37:08 -0300
committerPerberos <[email protected]>2011-11-04 22:37:08 -0300
commit1edf6684b4713b0848f425d474fc1a43b073942d (patch)
treef78832545d22866467af640a5bb0b5f7ea3e08c0 /src/gs-auth-helper.c.orig
parent497dc1c333aeb0c327f073317e3c55491687f4cd (diff)
downloadmate-screensaver-1edf6684b4713b0848f425d474fc1a43b073942d.tar.bz2
mate-screensaver-1edf6684b4713b0848f425d474fc1a43b073942d.tar.xz
quitando archivos generados por astyle
Diffstat (limited to 'src/gs-auth-helper.c.orig')
-rw-r--r--src/gs-auth-helper.c.orig213
1 files changed, 0 insertions, 213 deletions
diff --git a/src/gs-auth-helper.c.orig b/src/gs-auth-helper.c.orig
deleted file mode 100644
index 946aef3..0000000
--- a/src/gs-auth-helper.c.orig
+++ /dev/null
@@ -1,213 +0,0 @@
-/* -*- Mode: C; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 8 -*-
- *
- * written by Olaf Kirch <[email protected]>
- * xscreensaver, Copyright (c) 1993-2004 Jamie Zawinski <[email protected]>
- *
- * Permission to use, copy, modify, distribute, and sell this software and its
- * documentation for any purpose is hereby granted without fee, provided that
- * the above copyright notice appear in all copies and that both that
- * copyright notice and this permission notice appear in supporting
- * documentation. No representations are made about the suitability of this
- * software for any purpose. It is provided "as is" without express or
- * implied warranty.
- */
-
-/* The idea here is to be able to run mate-screensaver-dialog without any setuid bits.
- * Password verification happens through an external program that you feed
- * your password to on stdin. The external command is invoked with a user
- * name argument.
- *
- * The external helper does whatever authentication is necessary. Currently,
- * SuSE uses "unix2_chkpwd", which is a variation of "unix_chkpwd" from the
- * PAM distribution.
- *
- * Normally, the password helper should just authenticate the calling user
- * (i.e. based on the caller's real uid). This is in order to prevent
- * brute-forcing passwords in a shadow environment. A less restrictive
- * approach would be to allow verifying other passwords as well, but always
- * with a 2 second delay or so. (Not sure what SuSE's "unix2_chkpwd"
- * currently does.)
- * -- Olaf Kirch <[email protected]>, 16-Dec-2003
- */
-
-#include "config.h"
-
-#include <stdlib.h>
-#ifdef HAVE_UNISTD_H
-# include <unistd.h>
-#endif
-
-#include <stdio.h>
-#include <string.h>
-#include <sys/types.h>
-#include <pwd.h>
-#include <errno.h>
-#include <sys/wait.h>
-
-#include <glib.h>
-#include <glib/gstdio.h>
-
-#include "gs-auth.h"
-#include "subprocs.h"
-
-static gboolean verbose_enabled = FALSE;
-
-GQuark
-gs_auth_error_quark (void)
-{
- static GQuark quark = 0;
- if (! quark)
- {
- quark = g_quark_from_static_string ("gs_auth_error");
- }
-
- return quark;
-}
-
-void
-gs_auth_set_verbose (gboolean enabled)
-{
- verbose_enabled = enabled;
-}
-
-gboolean
-gs_auth_get_verbose (void)
-{
- return verbose_enabled;
-}
-
-static gboolean
-ext_run (const char *user,
- const char *typed_passwd,
- gboolean verbose)
-{
- int pfd[2], status;
- pid_t pid;
-
- if (pipe (pfd) < 0)
- {
- return 0;
- }
-
- if (verbose)
- {
- g_message ("ext_run (%s, %s)",
- PASSWD_HELPER_PROGRAM, user);
- }
-
- block_sigchld ();
-
- if ((pid = fork ()) < 0)
- {
- close (pfd [0]);
- close (pfd [1]);
- return FALSE;
- }
-
- if (pid == 0)
- {
- close (pfd [1]);
- if (pfd [0] != 0)
- {
- dup2 (pfd [0], 0);
- }
-
- /* Helper is invoked as helper service-name [user] */
- execlp (PASSWD_HELPER_PROGRAM, PASSWD_HELPER_PROGRAM, "mate-screensaver", user, NULL);
- if (verbose)
- {
- g_message ("%s: %s", PASSWD_HELPER_PROGRAM, g_strerror (errno));
- }
-
- exit (1);
- }
-
- close (pfd [0]);
-
- /* Write out password to helper process */
- if (!typed_passwd)
- {
- typed_passwd = "";
- }
- write (pfd [1], typed_passwd, strlen (typed_passwd));
- close (pfd [1]);
-
- while (waitpid (pid, &status, 0) < 0)
- {
- if (errno == EINTR)
- {
- continue;
- }
-
- if (verbose)
- {
- g_message ("ext_run: waitpid failed: %s\n",
- g_strerror (errno));
- }
-
- unblock_sigchld ();
- return FALSE;
- }
-
- unblock_sigchld ();
-
- if (! WIFEXITED (status) || WEXITSTATUS (status) != 0)
- {
- return FALSE;
- }
-
- return TRUE;
-}
-
-gboolean
-gs_auth_verify_user (const char *username,
- const char *display,
- GSAuthMessageFunc func,
- gpointer data,
- GError **error)
-{
- gboolean res = FALSE;
- char *password;
-
- password = NULL;
-
- /* ask for the password for user */
- if (func != NULL)
- {
- func (GS_AUTH_MESSAGE_PROMPT_ECHO_OFF,
- "Password: ",
- &password,
- data);
- }
-
- if (password == NULL)
- {
- return FALSE;
- }
-
- res = ext_run (username, password, gs_auth_get_verbose ());
-
- return res;
-}
-
-gboolean
-gs_auth_init (void)
-{
- return TRUE;
-}
-
-gboolean
-gs_auth_priv_init (void)
-{
- /* Make sure the passwd helper exists */
- if (g_access (PASSWD_HELPER_PROGRAM, X_OK) < 0)
- {
- g_warning ("%s does not exist. "
- "password authentication via "
- "external helper will not work.",
- PASSWD_HELPER_PROGRAM);
- return FALSE;
- }
-
- return TRUE;
-}