summaryrefslogtreecommitdiffstats
path: root/usr.bin/login/login.c
diff options
context:
space:
mode:
authorcsjp <csjp@FreeBSD.org>2006-12-13 06:13:32 +0000
committercsjp <csjp@FreeBSD.org>2006-12-13 06:13:32 +0000
commit1315da38ef063c63141ef76201707daea8140c63 (patch)
tree767fd550a2d64bab44f513680d367afa1a9f05ab /usr.bin/login/login.c
parenta6c5f77bf8c1acd4de1a629e577be8a67d9ec27f (diff)
downloadFreeBSD-src-1315da38ef063c63141ef76201707daea8140c63.zip
FreeBSD-src-1315da38ef063c63141ef76201707daea8140c63.tar.gz
Teach login(1) about the make.conf NO_AUDIT variable. This allows us to
conditionally build in audit support. Submitted by: bz MFC after: 1 week
Diffstat (limited to 'usr.bin/login/login.c')
-rw-r--r--usr.bin/login/login.c16
1 files changed, 16 insertions, 0 deletions
diff --git a/usr.bin/login/login.c b/usr.bin/login/login.c
index b7aa278..7827ea1 100644
--- a/usr.bin/login/login.c
+++ b/usr.bin/login/login.c
@@ -173,7 +173,9 @@ main(int argc, char *argv[])
login_cap_t *lc = NULL;
login_cap_t *lc_user = NULL;
pid_t pid;
+#ifdef USE_BSM_AUDIT
char auditsuccess = 1;
+#endif
(void)signal(SIGQUIT, SIG_IGN);
(void)signal(SIGINT, SIG_IGN);
@@ -292,19 +294,25 @@ main(int argc, char *argv[])
pam_err = pam_start("login", username, &pamc, &pamh);
if (pam_err != PAM_SUCCESS) {
pam_syslog("pam_start()");
+#ifdef USE_BSM_AUDIT
au_login_fail("PAM Error", 1);
+#endif
bail(NO_SLEEP_EXIT, 1);
}
pam_err = pam_set_item(pamh, PAM_TTY, tty);
if (pam_err != PAM_SUCCESS) {
pam_syslog("pam_set_item(PAM_TTY)");
+#ifdef USE_BSM_AUDIT
au_login_fail("PAM Error", 1);
+#endif
bail(NO_SLEEP_EXIT, 1);
}
pam_err = pam_set_item(pamh, PAM_RHOST, hostname);
if (pam_err != PAM_SUCCESS) {
pam_syslog("pam_set_item(PAM_RHOST)");
+#ifdef USE_BSM_AUDIT
au_login_fail("PAM Error", 1);
+#endif
bail(NO_SLEEP_EXIT, 1);
}
@@ -321,7 +329,9 @@ main(int argc, char *argv[])
(uid == (uid_t)0 || uid == (uid_t)pwd->pw_uid)) {
/* already authenticated */
rval = 0;
+#ifdef USE_BSM_AUDIT
auditsuccess = 0; /* opened a terminal window only */
+#endif
} else {
fflag = 0;
(void)setpriority(PRIO_PROCESS, 0, -4);
@@ -338,7 +348,9 @@ main(int argc, char *argv[])
* We are not exiting here, but this corresponds to a failed
* login event, so set exitstatus to 1.
*/
+#ifdef USE_BSM_AUDIT
au_login_fail("Login incorrect", 1);
+#endif
(void)printf("Login incorrect\n");
failures++;
@@ -364,9 +376,11 @@ main(int argc, char *argv[])
endpwent();
+#ifdef USE_BSM_AUDIT
/* Audit successful login. */
if (auditsuccess)
au_login_success();
+#endif
/*
* Establish the login class.
@@ -953,8 +967,10 @@ bail(int sec, int eval)
{
pam_cleanup();
+#ifdef USE_BSM_AUDIT
if (pwd != NULL)
audit_logout();
+#endif
(void)sleep(sec);
exit(eval);
}
OpenPOWER on IntegriCloud