OLD | NEW |
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "remoting/host/pam_authorization_factory_posix.h" | 5 #include "remoting/host/pam_authorization_factory_posix.h" |
6 | 6 |
7 #include <security/pam_appl.h> | 7 #include <security/pam_appl.h> |
8 | 8 |
9 #include "base/bind.h" | 9 #include "base/bind.h" |
10 #include "base/callback.h" | 10 #include "base/callback.h" |
11 #include "base/environment.h" | 11 #include "base/environment.h" |
12 #include "base/logging.h" | 12 #include "remoting/base/logging.h" |
13 #include "remoting/base/util.h" | 13 #include "remoting/base/util.h" |
14 #include "remoting/protocol/channel_authenticator.h" | 14 #include "remoting/protocol/channel_authenticator.h" |
15 #include "third_party/libjingle/source/talk/xmllite/xmlelement.h" | 15 #include "third_party/libjingle/source/talk/xmllite/xmlelement.h" |
16 | 16 |
17 namespace remoting { | 17 namespace remoting { |
18 | 18 |
19 namespace { | 19 namespace { |
20 class PamAuthorizer : public protocol::Authenticator { | 20 class PamAuthorizer : public protocol::Authenticator { |
21 public: | 21 public: |
22 PamAuthorizer(scoped_ptr<protocol::Authenticator> underlying); | 22 PamAuthorizer(scoped_ptr<protocol::Authenticator> underlying); |
(...skipping 85 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
108 } | 108 } |
109 struct pam_conv conv = { PamConversation, NULL }; | 109 struct pam_conv conv = { PamConversation, NULL }; |
110 pam_handle_t* handle = NULL; | 110 pam_handle_t* handle = NULL; |
111 int result = pam_start("chrome-remote-desktop", username.c_str(), | 111 int result = pam_start("chrome-remote-desktop", username.c_str(), |
112 &conv, &handle); | 112 &conv, &handle); |
113 if (result == PAM_SUCCESS) { | 113 if (result == PAM_SUCCESS) { |
114 result = pam_acct_mgmt(handle, 0); | 114 result = pam_acct_mgmt(handle, 0); |
115 } | 115 } |
116 pam_end(handle, result); | 116 pam_end(handle, result); |
117 | 117 |
118 LOG(INFO) << "Local login check for " << username | 118 HOST_LOG << "Local login check for " << username |
119 << (result == PAM_SUCCESS ? " succeeded." : " failed."); | 119 << (result == PAM_SUCCESS ? " succeeded." : " failed."); |
120 | 120 |
121 return result == PAM_SUCCESS; | 121 return result == PAM_SUCCESS; |
122 } | 122 } |
123 | 123 |
124 int PamAuthorizer::PamConversation(int num_messages, | 124 int PamAuthorizer::PamConversation(int num_messages, |
125 const struct pam_message** messages, | 125 const struct pam_message** messages, |
126 struct pam_response** responses, | 126 struct pam_response** responses, |
127 void* context) { | 127 void* context) { |
128 // Assume we're only being asked to log messages, in which case our response | 128 // Assume we're only being asked to log messages, in which case our response |
129 // need to be free()-able zero-initialized memory. | 129 // need to be free()-able zero-initialized memory. |
130 *responses = static_cast<struct pam_response*>( | 130 *responses = static_cast<struct pam_response*>( |
131 calloc(num_messages, sizeof(struct pam_response))); | 131 calloc(num_messages, sizeof(struct pam_response))); |
132 | 132 |
133 // We don't expect this function to be called. Since we have no easy way | 133 // We don't expect this function to be called. Since we have no easy way |
134 // of returning a response, we consider it to be an error if we're asked | 134 // of returning a response, we consider it to be an error if we're asked |
135 // for one and abort. Informational and error messages are logged. | 135 // for one and abort. Informational and error messages are logged. |
136 for (int i = 0; i < num_messages; ++i) { | 136 for (int i = 0; i < num_messages; ++i) { |
137 const struct pam_message* message = messages[i]; | 137 const struct pam_message* message = messages[i]; |
138 switch (message->msg_style) { | 138 switch (message->msg_style) { |
139 case PAM_ERROR_MSG: | 139 case PAM_ERROR_MSG: |
140 LOG(ERROR) << "PAM conversation error message: " << message->msg; | 140 LOG(ERROR) << "PAM conversation error message: " << message->msg; |
141 break; | 141 break; |
142 case PAM_TEXT_INFO: | 142 case PAM_TEXT_INFO: |
143 LOG(INFO) << "PAM conversation message: " << message->msg; | 143 HOST_LOG << "PAM conversation message: " << message->msg; |
144 break; | 144 break; |
145 default: | 145 default: |
146 LOG(FATAL) << "Unexpected PAM conversation response required: " | 146 LOG(FATAL) << "Unexpected PAM conversation response required: " |
147 << message->msg << "; msg_style = " << message->msg_style; | 147 << message->msg << "; msg_style = " << message->msg_style; |
148 } | 148 } |
149 } | 149 } |
150 return PAM_SUCCESS; | 150 return PAM_SUCCESS; |
151 } | 151 } |
152 | 152 |
153 | 153 |
(...skipping 11 matching lines...) Expand all Loading... |
165 const std::string& remote_jid, | 165 const std::string& remote_jid, |
166 const buzz::XmlElement* first_message) { | 166 const buzz::XmlElement* first_message) { |
167 scoped_ptr<protocol::Authenticator> authenticator( | 167 scoped_ptr<protocol::Authenticator> authenticator( |
168 underlying_->CreateAuthenticator(local_jid, remote_jid, first_message)); | 168 underlying_->CreateAuthenticator(local_jid, remote_jid, first_message)); |
169 return scoped_ptr<protocol::Authenticator>( | 169 return scoped_ptr<protocol::Authenticator>( |
170 new PamAuthorizer(authenticator.Pass())); | 170 new PamAuthorizer(authenticator.Pass())); |
171 } | 171 } |
172 | 172 |
173 | 173 |
174 } // namespace remoting | 174 } // namespace remoting |
OLD | NEW |