5151/*
5252 * Refresh the group policies of current user
5353 */
54- static int update_policy (pam_handle_t * pamh , const char * username , const char * krb5ccname , int debug ) {
54+ static int update_policy (pam_handle_t * pamh , const char * username , const char * krb5ccname , int debug ) {
5555 int retval ;
5656 retval = pam_info (pamh , "Applying user settings" );
5757 if (retval != PAM_SUCCESS ) {
5858 return retval ;
5959 }
6060
61- if (memcmp (krb5ccname , (const char * )"FILE:" , 5 ) == 0 ) {
61+ if (memcmp (krb5ccname , (const char * )"FILE:" , 5 ) == 0 ) {
6262 krb5ccname += 5 ;
6363 }
6464
65- char * * arggv ;
66- arggv = calloc (6 , sizeof (char * ));
65+ char * * arggv ;
66+ arggv = calloc (6 , sizeof (char * ));
6767 if (arggv == NULL ) {
6868 return PAM_BUF_ERR ;
6969 }
7070
7171 arggv [0 ] = "/sbin/adsysctl" ;
7272 arggv [1 ] = "update" ;
73- arggv [2 ] = (char * )(username );
74- arggv [3 ] = (char * )(krb5ccname );
73+ arggv [2 ] = (char * )(username );
74+ arggv [3 ] = (char * )(krb5ccname );
7575 arggv [4 ] = NULL ;
7676 if (debug ) {
7777 arggv [4 ] = "-vv" ;
@@ -130,15 +130,15 @@ static int update_policy(pam_handle_t *pamh, const char *username, const char *k
130130/*
131131 * Refresh the group policies of machine
132132 */
133- static int update_machine_policy (pam_handle_t * pamh , int debug ) {
133+ static int update_machine_policy (pam_handle_t * pamh , int debug ) {
134134 int retval ;
135135 retval = pam_info (pamh , "Applying machine settings" );
136136 if (retval != PAM_SUCCESS ) {
137137 return retval ;
138138 }
139139
140- char * * arggv ;
141- arggv = calloc (5 , sizeof (char * ));
140+ char * * arggv ;
141+ arggv = calloc (5 , sizeof (char * ));
142142 if (arggv == NULL ) {
143143 return PAM_BUF_ERR ;
144144 }
@@ -202,18 +202,18 @@ static int update_machine_policy(pam_handle_t *pamh, int debug) {
202202/*
203203 * Get default domain suffix from SSSD_CONF_PATH
204204 */
205- static char * get_default_sss_domain (pam_handle_t * pamh ) {
206- FILE * f = fopen (SSSD_CONF_PATH , "r" );
205+ static char * get_default_sss_domain (pam_handle_t * pamh ) {
206+ FILE * f = fopen (SSSD_CONF_PATH , "r" );
207207 if (f == NULL ) {
208208 pam_syslog (pamh , LOG_ERR , "Failed to open sssd.conf" );
209209 return NULL ;
210210 }
211211
212212 size_t buffsize = 256 ;
213- char * buf = malloc (sizeof (char ) * buffsize );
214- char * domain = NULL ;
213+ char * buf = malloc (sizeof (char ) * buffsize );
214+ char * domain = NULL ;
215215 while (getline (& buf , & buffsize , f ) != -1 ) {
216- char * line = buf ;
216+ char * line = buf ;
217217 // ignores whitespaces listed before the config key
218218 while (strlen (line ) > 0 && (* line == ' ' || * line == '\t' )) {
219219 line ++ ;
@@ -236,7 +236,7 @@ static char *get_default_sss_domain(pam_handle_t *pamh) {
236236 break ;
237237 }
238238
239- char * newline = strchr (domain , '\n' );
239+ char * newline = strchr (domain , '\n' );
240240 if (newline != NULL ) {
241241 * newline = '\0' ;
242242 }
@@ -250,18 +250,18 @@ static char *get_default_sss_domain(pam_handle_t *pamh) {
250250 return NULL ;
251251 }
252252
253- char * ret = strdup (domain );
253+ char * ret = strdup (domain );
254254 free (buf );
255255 return ret ;
256256}
257257
258258/*
259259 * Converts domain\user to user@domain format
260260 */
261- static char * slash_to_at_username (const char * username ) {
262- char * backslash = strchr (username , '\\' );
261+ static char * slash_to_at_username (const char * username ) {
262+ char * backslash = strchr (username , '\\' );
263263 if (backslash != NULL ) {
264- char * ret = malloc ((strlen (username ) + 1 ) * sizeof (char ));
264+ char * ret = malloc ((strlen (username ) + 1 ) * sizeof (char ));
265265 strcpy (ret , backslash + 1 );
266266 strcat (ret , "@" );
267267 strncat (ret , username , backslash - username );
@@ -273,17 +273,17 @@ static char *slash_to_at_username(const char *username) {
273273/*
274274 * Set DCONF_PROFILE for current user
275275 */
276- static int set_dconf_profile (pam_handle_t * pamh , const char * username , int debug ) {
276+ static int set_dconf_profile (pam_handle_t * pamh , const char * username , int debug ) {
277277 int retval = PAM_SUCCESS ;
278278
279- char * profile_name = slash_to_at_username (username );
279+ char * profile_name = slash_to_at_username (username );
280280
281281 // We need to check if the profile name does not already contain the domain.
282282 if (strchr (profile_name , '@' ) == NULL ) {
283- char * domain = get_default_sss_domain (pamh );
283+ char * domain = get_default_sss_domain (pamh );
284284 if (domain != NULL ) {
285285 free (profile_name );
286- profile_name = (char * )malloc ((strlen (username ) + strlen (domain ) + 2 ) * sizeof (char ));
286+ profile_name = (char * )malloc ((strlen (username ) + strlen (domain ) + 2 ) * sizeof (char ));
287287 strcpy (profile_name , username );
288288 strcat (profile_name , "@" );
289289 strcat (profile_name , domain );
@@ -292,11 +292,11 @@ static int set_dconf_profile(pam_handle_t *pamh, const char *username, int debug
292292 }
293293 // We need to lowercase the profile_name, as it can have uppercased letters and we
294294 // always normalize it in adsys.
295- for (char * s = profile_name ; * s ; s ++ ) {
295+ for (char * s = profile_name ; * s ; s ++ ) {
296296 * s = tolower (* s );
297297 }
298298
299- char * envvar ;
299+ char * envvar ;
300300 if (asprintf (& envvar , "DCONF_PROFILE=%s" , profile_name ) < 0 ) {
301301 pam_syslog (pamh , LOG_CRIT , "out of memory" );
302302 free (profile_name );
@@ -312,9 +312,9 @@ static int set_dconf_profile(pam_handle_t *pamh, const char *username, int debug
312312/*
313313 * Get the ticket path for the user by calling adsysctl policy debug ticket-path
314314 */
315- static int get_krb5cc_ticket_path (pam_handle_t * pamh , const char * username , char * * path ) {
316- char * * arggv ;
317- arggv = calloc (6 , sizeof (char * ));
315+ static int get_krb5cc_ticket_path (pam_handle_t * pamh , const char * username , char * * path ) {
316+ char * * arggv ;
317+ arggv = calloc (6 , sizeof (char * ));
318318 if (arggv == NULL ) {
319319 return 1 ;
320320 }
@@ -323,7 +323,7 @@ static int get_krb5cc_ticket_path(pam_handle_t *pamh, const char *username, char
323323 arggv [1 ] = "policy" ;
324324 arggv [2 ] = "debug" ;
325325 arggv [3 ] = "ticket-path" ;
326- arggv [4 ] = (char * )(username );
326+ arggv [4 ] = (char * )(username );
327327 arggv [5 ] = NULL ;
328328
329329 int pipefd [2 ];
@@ -374,7 +374,7 @@ static int get_krb5cc_ticket_path(pam_handle_t *pamh, const char *username, char
374374 return 1 ;
375375 }
376376 ticket_path [n ] = '\0' ;
377- char * newline = strchr (ticket_path , '\n' );
377+ char * newline = strchr (ticket_path , '\n' );
378378 if (newline != NULL ) {
379379 * newline = '\0' ;
380380 }
@@ -396,11 +396,11 @@ static int get_krb5cc_ticket_path(pam_handle_t *pamh, const char *username, char
396396 return 0 ; /* command had no output and exited with 0 */
397397}
398398
399- PAM_EXTERN int pam_sm_authenticate (pam_handle_t * pamh , int flags , int argc , const char * * argv ) { return PAM_IGNORE ; }
399+ PAM_EXTERN int pam_sm_authenticate (pam_handle_t * pamh , int flags , int argc , const char * * argv ) { return PAM_IGNORE ; }
400400
401- PAM_EXTERN int pam_sm_setcred (pam_handle_t * pamh , int flags , int argc , const char * * argv ) { return PAM_IGNORE ; }
401+ PAM_EXTERN int pam_sm_setcred (pam_handle_t * pamh , int flags , int argc , const char * * argv ) { return PAM_IGNORE ; }
402402
403- PAM_EXTERN int pam_sm_open_session (pam_handle_t * pamh , int flags , int argc , const char * * argv ) {
403+ PAM_EXTERN int pam_sm_open_session (pam_handle_t * pamh , int flags , int argc , const char * * argv ) {
404404 int retval = PAM_SUCCESS ;
405405
406406 int debug = 0 ;
@@ -414,8 +414,8 @@ PAM_EXTERN int pam_sm_open_session(pam_handle_t *pamh, int flags, int argc, cons
414414 }
415415 }
416416
417- const char * username ;
418- if (pam_get_item (pamh , PAM_USER , (void * )& username ) != PAM_SUCCESS ) {
417+ const char * username ;
418+ if (pam_get_item (pamh , PAM_USER , (void * )& username ) != PAM_SUCCESS ) {
419419 D (("pam_get_item failed for PAM_USER" ));
420420 return PAM_SYSTEM_ERR ; /* let pam_get_item() log the error */
421421 }
@@ -425,9 +425,9 @@ PAM_EXTERN int pam_sm_open_session(pam_handle_t *pamh, int flags, int argc, cons
425425 * We do an exception for GDM which is handled by the machine's GPO
426426 * and we must set the DCONF_PROFILE environment variable.
427427 */
428- const char * krb5ccname = pam_getenv (pamh , "KRB5CCNAME" );
428+ const char * krb5ccname = pam_getenv (pamh , "KRB5CCNAME" );
429429 if (krb5ccname == NULL && strcmp (username , "gdm" ) != 0 ) {
430- char * ticket_path = NULL ;
430+ char * ticket_path = NULL ;
431431
432432 // An error here means the detect_cached_ticket setting is enabled
433433 if (get_krb5cc_ticket_path (pamh , username , & ticket_path ) != 0 ) {
@@ -442,7 +442,7 @@ PAM_EXTERN int pam_sm_open_session(pam_handle_t *pamh, int flags, int argc, cons
442442 }
443443
444444 // We have a ticket, proceed with setting the environment variable
445- char * envvar ;
445+ char * envvar ;
446446 if (asprintf (& envvar , "KRB5CCNAME=FILE:%s" , ticket_path ) < 0 ) {
447447 pam_syslog (pamh , LOG_CRIT , "out of memory" );
448448 free (ticket_path );
@@ -497,6 +497,6 @@ PAM_EXTERN int pam_sm_open_session(pam_handle_t *pamh, int flags, int argc, cons
497497 return update_policy (pamh , username , krb5ccname , debug );
498498}
499499
500- PAM_EXTERN int pam_sm_close_session (pam_handle_t * pamh , int flags , int argc , const char * * argv ) { return PAM_SUCCESS ; }
500+ PAM_EXTERN int pam_sm_close_session (pam_handle_t * pamh , int flags , int argc , const char * * argv ) { return PAM_SUCCESS ; }
501501
502502/* end of module definition */
0 commit comments