xref: /titanic_41/usr/src/cmd/cmd-inet/usr.bin/pppd/plugins/passprompt.c (revision 8d483882aa3390058094b043f3d62187b5d1de03)
1 /*
2  * passprompt.c - pppd plugin to invoke an external PAP password prompter
3  *
4  * Copyright 1999 Paul Mackerras, Alan Curry.
5  *
6  *  This program is free software; you can redistribute it and/or
7  *  modify it under the terms of the GNU General Public License
8  *  as published by the Free Software Foundation; either version
9  *  2 of the License, or (at your option) any later version.
10  */
11 #include <errno.h>
12 #include <unistd.h>
13 #include <fcntl.h>
14 #include <sys/wait.h>
15 #include <syslog.h>
16 #include "pppd.h"
17 
18 static char promptprog[PATH_MAX+1];
19 
20 static option_t options[] = {
21     { "promptprog", o_string, promptprog,
22       "External PAP password prompting program",
23       OPT_STATIC, NULL, PATH_MAX },
24     { NULL }
25 };
26 
27 static int promptpass(char *user, char *passwd)
28 {
29     int p[2];
30     pid_t kid;
31     int readgood, wstat;
32     int red;
33 
34     if (promptprog[0] == 0 || access(promptprog, X_OK) < 0)
35 	return -1;	/* sorry, can't help */
36 
37     /* This occurs when we're probed for the ability to supply a password */
38     if (user != NULL && passwd == NULL)
39 	return 1;
40 
41     if (pipe(p)) {
42 	warn("Can't make a pipe for %s", promptprog);
43 	return 0;
44     }
45     if ((kid = fork()) == (pid_t) -1) {
46 	warn("Can't fork to run %s", promptprog);
47 	(void) close(p[0]);
48 	(void) close(p[1]);
49 	return 0;
50     }
51     if (kid == (pid_t)0) {
52 	/* we are the child, exec the program */
53 	char *argv[5], fdstr[32];
54 
55 	sys_close();
56 	closelog();
57 	if (detached && p[1] <= 2) {
58 	    (void) dup2(p[1], 3);
59 	    p[1] = 3;
60 	}
61 	(void) close(p[0]);
62 	if (detached) {
63 	    red = open("/etc/ppp/prompt-errors", O_WRONLY | O_APPEND | O_CREAT,
64 		0600);
65 	    (void) dup2(red, 1);
66 	    (void) dup2(red, 2);
67 	}
68 	(void) seteuid(getuid());
69 	(void) setegid(getgid());
70 	argv[0] = promptprog;
71 	argv[1] = user == NULL ? "" : user;
72 	argv[2] = remote_name;
73 	slprintf(fdstr, sizeof (fdstr), "%d", p[1]);
74 	argv[3] = fdstr;
75 	argv[4] = NULL;
76 	(void) execv(*argv, argv);
77 	_exit(127);
78     }
79 
80     /* we are the parent, read the password from the pipe */
81     (void) close(p[1]);
82     readgood = 0;
83     do {
84 	red = read(p[0], passwd + readgood, MAXSECRETLEN-1 - readgood);
85 	if (red == 0)
86 	    break;
87 	if (red < 0) {
88 	    if (errno == EINTR)
89 		continue;
90 	    error("Can't read secret from %s: %m", promptprog);
91 	    readgood = -1;
92 	    break;
93 	}
94 	readgood += red;
95     } while (readgood < MAXSECRETLEN - 1);
96     passwd[readgood] = 0;
97     (void) close(p[0]);
98 
99     /* now wait for child to exit */
100     while (waitpid(kid, &wstat, 0) < 0) {
101 	if (errno != EINTR) {
102 	    warn("error waiting for %s: %m", promptprog);
103 	    break;
104 	}
105     }
106 
107     if (readgood < 0)
108 	return 0;
109     if (readgood > 0 && passwd[--readgood] == '\n')
110 	passwd[readgood] = '\0';
111     if (!WIFEXITED(wstat))
112 	warn("%s terminated abnormally", promptprog);
113     if (WEXITSTATUS(wstat) != 0)
114 	warn("%s exited with code %d", promptprog, WEXITSTATUS(wstat));
115 
116     return 1;
117 }
118 
119 void plugin_init(void)
120 {
121     add_options(options);
122     pap_passwd_hook = promptpass;
123 }
124