[wiki] [sites] Update pam_auth patch || Jan Christoph Ebersbach

From: <git_AT_suckless.org>
Date: Fri, 09 Sep 2016 22:02:07 +0200

commit aebd67d0981097aae950b7beb99e2472920e8460
Author: Jan Christoph Ebersbach <jceb_AT_e-jc.de>
Date: Fri Sep 9 22:01:54 2016 +0200

    Update pam_auth patch

diff --git a/tools.suckless.org/slock/patches/pam_auth.md b/tools.suckless.org/slock/patches/pam_auth.md
index 4e6e189..2de49db 100644
--- a/tools.suckless.org/slock/patches/pam_auth.md
+++ b/tools.suckless.org/slock/patches/pam_auth.md
_AT_@ -12,6 +12,7 @@ service. The default configuration is for ArchLinux's `login` service.
 Download
 --------
 
+* [slock-pam_auth-20160909-a7619f7.diff](slock-pam_auth-20160909-a7619f7.diff)
 * [slock-pam_auth.diff](slock-pam_auth.diff)
 
 Authors
diff --git a/tools.suckless.org/slock/patches/slock-pam_auth-20160909-a7619f7.diff b/tools.suckless.org/slock/patches/slock-pam_auth-20160909-a7619f7.diff
new file mode 100644
index 0000000..b6450d3
--- /dev/null
+++ b/tools.suckless.org/slock/patches/slock-pam_auth-20160909-a7619f7.diff
_AT_@ -0,0 +1,158 @@
+Author: Jan Christoph Ebersbach <jceb_AT_e-jc.de>
+URL: http://tools.suckless.org/slock/patches/pam_auth
+Replaces shadow support with PAM authentication support.
+
+Change variable `pam_service` in `config.def.h` to the corresponding PAM
+service. The default configuration is for ArchLinux's `login` service.
+
+Index: slock-patches/slock/config.def.h
+===================================================================
+--- slock-patches.orig/slock/config.def.h
++++ slock-patches/slock/config.def.h
+_AT_@ -6,7 +6,11 @@ static const char *colorname[NUMCOLS] =
+ "black", /* after initialization */
+ "#005577", /* during input */
+ "#CC3333", /* wrong password */
++ "#9400D3", /* waiting for PAM */
+ };
+
+ /* treat a cleared input like a wrong password */
+ static const int failonclear = 1;
++
++/* PAM service that's used for authentication */
++static const char* pam_service = "login";
+Index: slock-patches/slock/config.mk
+===================================================================
+--- slock-patches.orig/slock/config.mk
++++ slock-patches/slock/config.mk
+_AT_@ -12,7 +12,7 @@ X11LIB = /usr/X11R6/lib
+
+ # includes and libs
+ INCS = -I. -I/usr/include -I${X11INC}
+-LIBS = -L/usr/lib -lc -lcrypt -L${X11LIB} -lX11 -lXext -lXrandr
++LIBS = -L/usr/lib -lc -lcrypt -L${X11LIB} -lX11 -lXext -lXrandr -lpam
+
+ # flags
+ CPPFLAGS = -DVERSION=\"${VERSION}\" -D_DEFAULT_SOURCE -DHAVE_SHADOW_H
+Index: slock-patches/slock/slock.c
+===================================================================
+--- slock-patches.orig/slock/slock.c
++++ slock-patches/slock/slock.c
+_AT_@ -18,6 +18,8 @@
+ #include <X11/keysym.h>
+ #include <X11/Xlib.h>
+ #include <X11/Xutil.h>
++#include <security/pam_appl.h>
++#include <security/pam_misc.h>
+
+ #include "arg.h"
+ #include "util.h"
+_AT_@ -28,6 +30,7 @@ enum {
+ INIT,
+ INPUT,
+ FAILED,
++ PAM,
+ NUMCOLS
+ };
+
+_AT_@ -40,6 +43,9 @@ typedef struct {
+ unsigned long colors[NUMCOLS];
+ } Lock;
+
++static int pam_conv(int num_msg, const struct pam_message **msg, struct pam_response **resp, void *appdata_ptr);
++struct pam_conv pamc = {pam_conv, NULL};
++char passwd[256];
+ static Lock **locks;
+ static int nscreens;
+ static Bool rr;
+_AT_@ -119,18 +125,46 @@ getpw(void)
+ }
+ #endif /* HAVE_SHADOW_H */
+
++ /* pam, store user name */
++ rval = pw->pw_name;
+ return rval;
+ }
+
++static int
++pam_conv(int num_msg, const struct pam_message **msg,
++ struct pam_response **resp, void *appdata_ptr)
++{
++ int retval = PAM_CONV_ERR;
++ for(int i=0; i<num_msg; i++) {
++ if (msg[i]->msg_style == PAM_PROMPT_ECHO_OFF &&
++ strncmp(msg[i]->msg, "Password: ", 10) == 0) {
++ struct pam_response *resp_msg = malloc(sizeof(struct pam_response));
++ if (!resp_msg)
++ die("malloc failed");
++ char *password = malloc(strlen(passwd) + 1);
++ if (!password)
++ die("malloc failed");
++ memset(password, 0, strlen(passwd) + 1);
++ strcpy(password, passwd);
++ resp_msg->resp_retcode = 0;
++ resp_msg->resp = password;
++ resp[i] = resp_msg;
++ retval = PAM_SUCCESS;
++ }
++ }
++ return retval;
++}
++
+ static void
+ readpw(Display *dpy, const char *pws)
+ {
+- char buf[32], passwd[256], *encrypted;
+- int num, screen, running, failure;
++ char buf[32];
++ int num, screen, running, failure, retval;
+ unsigned int len, color;
+ KeySym ksym;
+ XEvent ev;
+ static int oldc = INIT;
++ pam_handle_t *pamh;
+
+ len = 0;
+ running = 1;
+_AT_@ -159,11 +193,26 @@ readpw(Display *dpy, const char *pws)
+ switch (ksym) {
+ case XK_Return:
+ passwd[len] = 0;
+- errno = 0;
+- if (!(encrypted = crypt(passwd, pws)))
+- fprintf(stderr, "slock: crypt: %s
", strerror(errno));
++ retval = pam_start(pam_service, pws, &pamc, &pamh);
++ color = PAM;
++ for (screen = 0; screen < nscreens; screen++) {
++ XSetWindowBackground(dpy, locks[screen]->win, locks[screen]->colors[color]);
++ XClearWindow(dpy, locks[screen]->win);
++ XRaiseWindow(dpy, locks[screen]->win);
++ }
++ XSync(dpy, False);
++
++ if (retval == PAM_SUCCESS)
++ retval = pam_authenticate(pamh, 0);
++ if (retval == PAM_SUCCESS)
++ retval = pam_acct_mgmt(pamh, 0);
++
++ running = 1;
++ if (retval == PAM_SUCCESS)
++ running = 0;
+ else
+- running = !!strcmp(encrypted, pws);
++ fprintf(stderr, "slock: %s
", pam_strerror(pamh, retval));
++ pam_end(pamh, retval);
+ if (running) {
+ XBell(dpy, 100);
+ failure = True;
+_AT_@ -344,9 +393,8 @@ main(int argc, char **argv) {
+ dontkillme();
+ #endif
+
++ /* the contents of pws are used to transport the current user name */
+ pws = getpw();
+- if (strlen(pws) < 2)
+- die("slock: failed to get user password hash.
");
+
+ if (!(dpy = XOpenDisplay(NULL)))
+ die("slock: cannot open display
");
Received on Fri Sep 09 2016 - 22:02:07 CEST

This archive was generated by hypermail 2.3.0 : Fri Sep 09 2016 - 22:12:15 CEST