summaryrefslogtreecommitdiff
path: root/usr/src/lib/libsmartsshd/common/sshd-plugin.c
blob: 4f0f0bc1ad546abafced5ad1e021e89ec5c81bee (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
/*
 * CDDL HEADER START
 *
 * The contents of this file are subject to the terms of the
 * Common Development and Distribution License (the "License").
 * You may not use this file except in compliance with the License.
 *
 * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
 * or http://www.opensolaris.org/os/licensing.
 * See the License for the specific language governing permissions
 * and limitations under the License.
 *
 * When distributing Covered Code, include this CDDL HEADER in each
 * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
 * If applicable, add the following below this CDDL HEADER, with the
 * fields enclosed by brackets "[]" replaced with your own identifying
 * information: Portions Copyright [yyyy] [name of copyright owner]
 *
 * CDDL HEADER END
 */
/*
 * Copyright 2011 Joyent, Inc.  All rights reserved.
 * Use is subject to license terms.
 */

#pragma ident "%Z%%M% %I% %E% SMI"

#include <alloca.h>
#include <door.h>
#include <errno.h>
#include <fcntl.h>
#include <pwd.h>
#include <sys/mman.h>
#include <sys/stat.h>
#include <sys/types.h>
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <unistd.h>

#include <openssl/rsa.h>

#ifdef __cplusplus
extern "C" {
#endif

#define	LOG_OOM(SZ)	fprintf(stderr, "Unable to alloca %d bytes\n", SZ)

static const char *DOOR = "/var/tmp/._joyent_sshd_key_is_authorized";
static const char *REQ_FMT_STR = "%s %d %s"; /* name uid fp */
static const int RETURN_SZ = 2;

static const int MAX_ATTEMPTS = 2;
static const int SLEEP_PERIOD = 1;

static int
sshd_allowed_in_capi(struct passwd *pw, const char *fp)
{
	int allowed = 0;
	int fd = -1;
	int blen = 0;
	int attempts = 0;
	char *buf = NULL;
	door_arg_t door_args = {0};

	if (pw == NULL || fp == NULL)
		return (0);

	blen = snprintf(NULL, 0, REQ_FMT_STR, pw->pw_name, pw->pw_uid, fp) + 1;

	buf = (char *)alloca(blen);
	if (buf == NULL) {
		LOG_OOM(blen);
		return (0);
	}

	(void) snprintf(buf, blen, REQ_FMT_STR, pw->pw_name, pw->pw_uid, fp);
	door_args.data_ptr = buf;
	door_args.data_size = blen;

	door_args.rsize = RETURN_SZ;
	door_args.rbuf = alloca(RETURN_SZ);
	if (door_args.rbuf == NULL) {
		LOG_OOM(RETURN_SZ);
		return (0);
	}
	memset(door_args.rbuf, 0, RETURN_SZ);

	do {
		fd = open(DOOR, O_RDWR);
		if (fd < 0)
			perror("smartplugin: open (of door FD) failed");

		if (door_call(fd, &door_args) < 0) {
			perror("smartplugin: door_call failed");
		} else {
			allowed = atoi(door_args.rbuf);
			munmap(door_args.rbuf, door_args.rsize);
			return (allowed);
		}
		if (++attempts < MAX_ATTEMPTS)
			sleep(SLEEP_PERIOD);
	} while (attempts < MAX_ATTEMPTS);

	return (0);
}

int
sshd_user_rsa_key_allowed(struct passwd *pw, RSA *key, const char *fp)
{
	return sshd_allowed_in_capi(pw, fp);
}

int
sshd_user_dsa_key_allowed(struct passwd *pw, DSA *key, const char *fp)
{
	return sshd_allowed_in_capi(pw, fp);
}


#ifdef __cplusplus
}
#endif