]> git.saurik.com Git - apple/system_cmds.git/blame - login.tproj/login.c
system_cmds-279.tar.gz
[apple/system_cmds.git] / login.tproj / login.c
CommitLineData
1815bff5
A
1/*
2 * Copyright (c) 1999 Apple Computer, Inc. All rights reserved.
3 *
4 * @APPLE_LICENSE_HEADER_START@
5 *
c3a08f59
A
6 * Copyright (c) 1999-2003 Apple Computer, Inc. All Rights Reserved.
7 *
8 * This file contains Original Code and/or Modifications of Original Code
9 * as defined in and that are subject to the Apple Public Source License
10 * Version 2.0 (the 'License'). You may not use this file except in
11 * compliance with the License. Please obtain a copy of the License at
12 * http://www.opensource.apple.com/apsl/ and read it before using this
13 * file.
1815bff5
A
14 *
15 * The Original Code and all software distributed under the License are
16 * distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER
17 * EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES,
18 * INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY,
c3a08f59
A
19 * FITNESS FOR A PARTICULAR PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT.
20 * Please see the License for the specific language governing rights and
21 * limitations under the License.
1815bff5
A
22 *
23 * @APPLE_LICENSE_HEADER_END@
24 */
25/*-
26 * Copyright (c) 1980, 1987, 1988, 1991, 1993, 1994
27 * The Regents of the University of California. All rights reserved.
28 *
29 * Redistribution and use in source and binary forms, with or without
30 * modification, are permitted provided that the following conditions
31 * are met:
32 * 1. Redistributions of source code must retain the above copyright
33 * notice, this list of conditions and the following disclaimer.
34 * 2. Redistributions in binary form must reproduce the above copyright
35 * notice, this list of conditions and the following disclaimer in the
36 * documentation and/or other materials provided with the distribution.
37 * 3. All advertising materials mentioning features or use of this software
38 * must display the following acknowledgement:
39 * This product includes software developed by the University of
40 * California, Berkeley and its contributors.
41 * 4. Neither the name of the University nor the names of its contributors
42 * may be used to endorse or promote products derived from this software
43 * without specific prior written permission.
44 *
45 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
46 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
47 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
48 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
49 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
50 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
51 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
52 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
53 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
54 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
55 * SUCH DAMAGE.
56 */
57
58#ifndef lint
59static char copyright[] =
60"@(#) Copyright (c) Apple Computer, Inc. 1997\n\n";
61#endif /* not lint */
62
63/*
64 * login [ name ]
65 * login -h hostname (for telnetd, etc.)
66 * login -f name (for pre-authenticated login: datakit, xterm, etc.)
67 */
68
69#include <sys/param.h>
70#include <sys/stat.h>
71#include <sys/time.h>
72#include <sys/resource.h>
73#include <sys/file.h>
b51d5b5f 74#include <sys/wait.h>
1815bff5
A
75
76#include <err.h>
77#include <errno.h>
78#include <grp.h>
79#include <pwd.h>
80#include <setjmp.h>
81#include <signal.h>
82#include <stdio.h>
83#include <stdlib.h>
84#include <string.h>
85#include <syslog.h>
86#include <ttyent.h>
87#include <tzfile.h>
88#include <unistd.h>
89#include <utmp.h>
90
b51d5b5f
A
91#ifdef USE_PAM
92#include <pam/pam_appl.h>
93#include <pam/pam_misc.h>
94#endif
95
1815bff5
A
96#include "pathnames.h"
97
98void badlogin __P((char *));
99void checknologin __P((void));
100void dolastlog __P((int));
101void getloginname __P((void));
102void motd __P((void));
103int rootterm __P((char *));
104void sigint __P((int));
105void sleepexit __P((int));
106char *stypeof __P((char *));
107void timedout __P((int));
108#ifdef KERBEROS
109int klogin __P((struct passwd *, char *, char *, char *));
110#endif
111
112extern void login __P((struct utmp *));
113
114#define TTYGRPNAME "tty" /* name of group to own ttys */
115
116/*
117 * This bounds the time given to login. Not a define so it can
118 * be patched on machines where it's too small.
119 */
120u_int timeout = 300;
121
122#ifdef KERBEROS
123int notickets = 1;
124char *instance;
125char *krbtkfile_env;
126int authok;
127#endif
128
129struct passwd *pwd;
130int failures;
b51d5b5f 131char term[64], *hostname, *username = NULL, *tty;
1815bff5
A
132
133int
134main(argc, argv)
135 int argc;
136 char *argv[];
137{
138 extern char **environ;
139 struct group *gr;
140 struct stat st;
141 struct timeval tp;
142 struct utmp utmp;
20e66415 143 int ask, ch, cnt, oflag = 0, fflag, hflag, pflag, quietlog, rootlogin = 0, rval;
1815bff5 144 uid_t uid;
b51d5b5f
A
145 uid_t euid;
146 gid_t egid;
1815bff5
A
147 char *domain, *p, *salt, *ttyn;
148 char tbuf[MAXPATHLEN + 2], tname[sizeof(_PATH_TTY) + 10];
149 char localhost[MAXHOSTNAMELEN];
b51d5b5f
A
150#ifdef USE_PAM
151 pam_handle_t *pamh = NULL;
152 struct pam_conv conv = { misc_conv, NULL };
153 char **pmenv;
154 pid_t pid;
155#endif
1815bff5
A
156
157 (void)signal(SIGALRM, timedout);
158 (void)alarm(timeout);
159 (void)signal(SIGQUIT, SIG_IGN);
160 (void)signal(SIGINT, SIG_IGN);
161 (void)setpriority(PRIO_PROCESS, 0, 0);
162
163 openlog("login", LOG_ODELAY, LOG_AUTH);
164
165 /*
166 * -p is used by getty to tell login not to destroy the environment
167 * -f is used to skip a second login authentication
168 * -h is used by other servers to pass the name of the remote
169 * host to login so that it may be placed in utmp and wtmp
170 */
171 domain = NULL;
172 if (gethostname(localhost, sizeof(localhost)) < 0)
173 syslog(LOG_ERR, "couldn't get local hostname: %m");
174 else
175 domain = strchr(localhost, '.');
b51d5b5f
A
176
177 euid = geteuid();
178 egid = getegid();
1815bff5
A
179
180 fflag = hflag = pflag = 0;
181 uid = getuid();
20e66415 182 while ((ch = getopt(argc, argv, "1fh:p")) != EOF)
1815bff5 183 switch (ch) {
20e66415
A
184 case '1':
185 oflag = 1;
186 break;
1815bff5
A
187 case 'f':
188 fflag = 1;
189 break;
190 case 'h':
191 if (uid)
192 errx(1, "-h option: %s", strerror(EPERM));
193 hflag = 1;
194 if (domain && (p = strchr(optarg, '.')) &&
195 strcasecmp(p, domain) == 0)
196 *p = 0;
197 hostname = optarg;
198 break;
199 case 'p':
200 pflag = 1;
201 break;
202 case '?':
203 default:
204 if (!uid)
205 syslog(LOG_ERR, "invalid flag %c", ch);
206 (void)fprintf(stderr,
207 "usage: login [-fp] [-h hostname] [username]\n");
208 exit(1);
209 }
210 argc -= optind;
211 argv += optind;
212
213 if (*argv) {
214 username = *argv;
215 ask = 0;
216 } else
217 ask = 1;
218
219 for (cnt = getdtablesize(); cnt > 2; cnt--)
220 (void)close(cnt);
221
222 ttyn = ttyname(STDIN_FILENO);
223 if (ttyn == NULL || *ttyn == '\0') {
224 (void)snprintf(tname, sizeof(tname), "%s??", _PATH_TTY);
225 ttyn = tname;
226 }
227 if (tty = strrchr(ttyn, '/'))
228 ++tty;
229 else
230 tty = ttyn;
231
b51d5b5f
A
232#ifdef USE_PAM
233 rval = pam_start("login", username, &conv, &pamh);
234 if( rval != PAM_SUCCESS ) {
235 fprintf(stderr, "login: PAM Error: %s\n", pam_strerror(pamh, rval));
236 exit(1);
237 }
238 rval = pam_set_item(pamh, PAM_TTY, tty);
239 if( rval != PAM_SUCCESS ) {
240 fprintf(stderr, "login: PAM Error: %s\n", pam_strerror(pamh, rval));
241 exit(1);
242 }
243
244 rval = pam_set_item(pamh, PAM_RHOST, hostname);
245 if( rval != PAM_SUCCESS ) {
246 fprintf(stderr, "login: PAM Error: %s\n", pam_strerror(pamh, rval));
247 exit(1);
248 }
249
250 rval = pam_set_item(pamh, PAM_USER_PROMPT, "login: ");
251 if( rval != PAM_SUCCESS ) {
252 fprintf(stderr, "login: PAM Error: %s\n", pam_strerror(pamh, rval));
253 exit(1);
254 }
255
256 if( !username )
257 getloginname();
258 pam_set_item(pamh, PAM_USER, username);
259 pwd = getpwnam(username);
260 if( (pwd != NULL) && (pwd->pw_uid == 0) )
261 rootlogin = 1;
262
263 if( (pwd != NULL) && fflag && ((uid == 0) || (uid == pwd->pw_uid)) ){
264 rval = 0;
265 } else {
266
267 rval = pam_authenticate(pamh, 0);
20e66415 268 while( (!oflag) && (cnt++ < 10) && ((rval == PAM_AUTH_ERR) ||
b51d5b5f
A
269 (rval == PAM_USER_UNKNOWN) ||
270 (rval == PAM_CRED_INSUFFICIENT) ||
271 (rval == PAM_AUTHINFO_UNAVAIL))) {
272 badlogin(username);
273 printf("Login incorrect\n");
274 rootlogin = 0;
275 getloginname();
276 pwd = getpwnam(username);
277 if( (pwd != NULL) && (pwd->pw_uid == 0) )
278 rootlogin = 1;
279 pam_set_item(pamh, PAM_USER, username);
280 rval = pam_authenticate(pamh, 0);
281 }
282
283 if( rval != PAM_SUCCESS ) {
284 pam_get_item(pamh, PAM_USER, (void *)&username);
285 badlogin(username);
286 printf("Login incorrect\n");
287 exit(1);
288 }
289
290 rval = pam_acct_mgmt(pamh, 0);
291 if( rval == PAM_NEW_AUTHTOK_REQD ) {
292 rval = pam_chauthtok(pamh, PAM_CHANGE_EXPIRED_AUTHTOK);
293 }
294 if( rval != PAM_SUCCESS ) {
295 fprintf(stderr, "login: PAM Error: %s\n", pam_strerror(pamh, rval));
296 exit(1);
297 }
298 }
299
300 rval = pam_get_item(pamh, PAM_USER, (void *)&username);
301 if( (rval == PAM_SUCCESS) && username && *username)
302 pwd = getpwnam(username);
303
304 rval = pam_open_session(pamh, 0);
305 if( rval != PAM_SUCCESS ) {
306 fprintf(stderr, "login: PAM Error: %s\n", pam_strerror(pamh, rval));
307 exit(1);
308 }
309
310 rval = pam_setcred(pamh, PAM_ESTABLISH_CRED);
311 if( rval != PAM_SUCCESS ) {
312 fprintf(stderr, "login: PAM Error: %s\n", pam_strerror(pamh, rval));
313 exit(1);
314 }
315
316#else /* USE_PAM */
1815bff5
A
317 for (cnt = 0;; ask = 1) {
318 if (ask) {
319 fflag = 0;
320 getloginname();
321 }
322 rootlogin = 0;
323#ifdef KERBEROS
324 if ((instance = strchr(username, '.')) != NULL) {
325 if (strncmp(instance, ".root", 5) == 0)
326 rootlogin = 1;
327 *instance++ = '\0';
328 } else
329 instance = "";
330#endif
331 if (strlen(username) > UT_NAMESIZE)
332 username[UT_NAMESIZE] = '\0';
333
334 /*
335 * Note if trying multiple user names; log failures for
336 * previous user name, but don't bother logging one failure
337 * for nonexistent name (mistyped username).
338 */
339 if (failures && strcmp(tbuf, username)) {
340 if (failures > (pwd ? 0 : 1))
341 badlogin(tbuf);
342 failures = 0;
343 }
344 (void)strcpy(tbuf, username);
345
346 if (pwd = getpwnam(username))
347 salt = pwd->pw_passwd;
348 else
349 salt = "xx";
350
351 /*
352 * if we have a valid account name, and it doesn't have a
353 * password, or the -f option was specified and the caller
354 * is root or the caller isn't changing their uid, don't
355 * authenticate.
356 */
357 if (pwd && (*pwd->pw_passwd == '\0' ||
358 fflag && (uid == 0 || uid == pwd->pw_uid)))
359 break;
360 fflag = 0;
361 if (pwd && pwd->pw_uid == 0)
362 rootlogin = 1;
363
364 (void)setpriority(PRIO_PROCESS, 0, -4);
365
366 p = getpass("Password:");
367
368 if (pwd) {
369#ifdef KERBEROS
370 rval = klogin(pwd, instance, localhost, p);
371 if (rval != 0 && rootlogin && pwd->pw_uid != 0)
372 rootlogin = 0;
373 if (rval == 0)
374 authok = 1;
375 else if (rval == 1)
376 rval = strcmp(crypt(p, salt), pwd->pw_passwd);
377#else
378 rval = strcmp(crypt(p, salt), pwd->pw_passwd);
379#endif
380 }
381 memset(p, 0, strlen(p));
382
383 (void)setpriority(PRIO_PROCESS, 0, 0);
384
385 /*
386 * If trying to log in as root without Kerberos,
387 * but with insecure terminal, refuse the login attempt.
388 */
389#ifdef KERBEROS
390 if (authok == 0)
391#endif
392 if (pwd && rootlogin && !rootterm(tty)) {
393 (void)fprintf(stderr,
394 "%s login refused on this terminal.\n",
395 pwd->pw_name);
396 if (hostname)
397 syslog(LOG_NOTICE,
398 "LOGIN %s REFUSED FROM %s ON TTY %s",
399 pwd->pw_name, hostname, tty);
400 else
401 syslog(LOG_NOTICE,
402 "LOGIN %s REFUSED ON TTY %s",
403 pwd->pw_name, tty);
404 continue;
405 }
406
407 if (pwd && !rval)
408 break;
409
410 (void)printf("Login incorrect\n");
411 failures++;
412 /* we allow 10 tries, but after 3 we start backing off */
413 if (++cnt > 3) {
414 if (cnt >= 10) {
415 badlogin(username);
416 sleepexit(1);
417 }
418 sleep((u_int)((cnt - 3) * 5));
419 }
420 }
b51d5b5f 421#endif
1815bff5
A
422
423 /* committed to login -- turn off timeout */
424 (void)alarm((u_int)0);
425
426 endpwent();
427
428 /* if user not super-user, check for disabled logins */
429 if (!rootlogin)
430 checknologin();
431
b51d5b5f
A
432 setegid(pwd->pw_gid);
433 seteuid(rootlogin ? 0 : pwd->pw_uid);
434
435 /* First do a stat in case the homedir is automounted */
436\r stat(pwd->pw_dir,&st);
437
1815bff5
A
438 if (chdir(pwd->pw_dir) < 0) {
439 (void)printf("No home directory %s!\n", pwd->pw_dir);
440 if (chdir("/"))
441 exit(0);
442 pwd->pw_dir = "/";
443 (void)printf("Logging in with home = \"/\".\n");
444 }
b51d5b5f
A
445 seteuid(euid);
446 setegid(egid);
1815bff5
A
447
448 quietlog = access(_PATH_HUSHLOGIN, F_OK) == 0;
449
1815bff5
A
450 /* Nothing else left to fail -- really log in. */
451 memset((void *)&utmp, 0, sizeof(utmp));
452 (void)time(&utmp.ut_time);
453 (void)strncpy(utmp.ut_name, username, sizeof(utmp.ut_name));
454 if (hostname)
455 (void)strncpy(utmp.ut_host, hostname, sizeof(utmp.ut_host));
456 (void)strncpy(utmp.ut_line, tty, sizeof(utmp.ut_line));
457 login(&utmp);
458
459 dolastlog(quietlog);
460
461 (void)chown(ttyn, pwd->pw_uid,
462 (gr = getgrnam(TTYGRPNAME)) ? gr->gr_gid : pwd->pw_gid);
1c51fdde 463 (void)chmod(ttyn, 0620);
1815bff5
A
464 (void)setgid(pwd->pw_gid);
465
466 initgroups(username, pwd->pw_gid);
467
468 if (*pwd->pw_shell == '\0')
469 pwd->pw_shell = _PATH_BSHELL;
470
471 /* Destroy environment unless user has requested its preservation. */
b51d5b5f
A
472 if (!pflag) {
473 environ = malloc(sizeof(char *));
474 *environ = NULL;
475 }
1815bff5
A
476 (void)setenv("HOME", pwd->pw_dir, 1);
477 (void)setenv("SHELL", pwd->pw_shell, 1);
478 if (term[0] == '\0')
479 (void)strncpy(term, stypeof(tty), sizeof(term));
480 (void)setenv("TERM", term, 0);
481 (void)setenv("LOGNAME", pwd->pw_name, 1);
482 (void)setenv("USER", pwd->pw_name, 1);
483 (void)setenv("PATH", _PATH_DEFPATH, 0);
484#ifdef KERBEROS
485 if (krbtkfile_env)
486 (void)setenv("KRBTKFILE", krbtkfile_env, 1);
487#endif
488
b51d5b5f
A
489#ifdef USE_PAM
490 pmenv = pam_getenvlist(pamh);
491 for( cnt = 0; pmenv && pmenv[cnt]; cnt++ )
492 putenv(pmenv[cnt]);
493
494 pid = fork();
495 if ( pid < 0 ) {
496 err(1, "fork");
497 } else if( pid != 0 ) {
498 waitpid(pid, NULL, 0);
499 pam_setcred(pamh, PAM_DELETE_CRED);
500 rval = pam_close_session(pamh, 0);
501 pam_end(pamh,rval);
502 exit(0);
503 }
504
505#endif
506
1815bff5
A
507 if (tty[sizeof("tty")-1] == 'd')
508 syslog(LOG_INFO, "DIALUP %s, %s", tty, pwd->pw_name);
509
510 /* If fflag is on, assume caller/authenticator has logged root login. */
511 if (rootlogin && fflag == 0)
512 if (hostname)
513 syslog(LOG_NOTICE, "ROOT LOGIN (%s) ON %s FROM %s",
514 username, tty, hostname);
515 else
516 syslog(LOG_NOTICE, "ROOT LOGIN (%s) ON %s", username, tty);
517
518#ifdef KERBEROS
519 if (!quietlog && notickets == 1)
520 (void)printf("Warning: no Kerberos tickets issued.\n");
521#endif
522
523 if (!quietlog) {
524 motd();
525 (void)snprintf(tbuf,
526 sizeof(tbuf), "%s/%s", _PATH_MAILDIR, pwd->pw_name);
527 if (stat(tbuf, &st) == 0 && st.st_size != 0)
528 (void)printf("You have %smail.\n",
529 (st.st_mtime > st.st_atime) ? "new " : "");
530 }
531
532 (void)signal(SIGALRM, SIG_DFL);
533 (void)signal(SIGQUIT, SIG_DFL);
534 (void)signal(SIGINT, SIG_DFL);
535 (void)signal(SIGTSTP, SIG_IGN);
536
537 tbuf[0] = '-';
538 (void)strcpy(tbuf + 1, (p = strrchr(pwd->pw_shell, '/')) ?
539 p + 1 : pwd->pw_shell);
540
541 if (setlogin(pwd->pw_name) < 0)
542 syslog(LOG_ERR, "setlogin() failure: %m");
543
544 /* Discard permissions last so can't get killed and drop core. */
545 if (rootlogin)
546 (void) setuid(0);
547 else
548 (void) setuid(pwd->pw_uid);
549
550 execlp(pwd->pw_shell, tbuf, 0);
551 err(1, "%s", pwd->pw_shell);
552}
553
554#ifdef KERBEROS
b51d5b5f 555#define NBUFSIZ (MAXLOGNAME + 1 + 5) /* .root suffix */
1815bff5 556#else
b51d5b5f 557#define NBUFSIZ (MAXLOGNAME + 1)
1815bff5
A
558#endif
559
560void
561getloginname()
562{
563 int ch;
564 char *p;
565 static char nbuf[NBUFSIZ];
566
567 for (;;) {
568 (void)printf("login: ");
569 for (p = nbuf; (ch = getchar()) != '\n'; ) {
570 if (ch == EOF) {
571 badlogin(username);
572 exit(0);
573 }
574 if (p < nbuf + (NBUFSIZ - 1))
575 *p++ = ch;
576 }
b51d5b5f 577 if (p > nbuf) {
1815bff5
A
578 if (nbuf[0] == '-')
579 (void)fprintf(stderr,
580 "login names may not start with '-'.\n");
581 else {
582 *p = '\0';
583 username = nbuf;
584 break;
585 }
b51d5b5f 586 }
1815bff5
A
587 }
588}
589
590int
591rootterm(ttyn)
592 char *ttyn;
593{
594 struct ttyent *t;
595
596 return ((t = getttynam(ttyn)) && t->ty_status & TTY_SECURE);
597}
598
599jmp_buf motdinterrupt;
600
601void
602motd()
603{
604 int fd, nchars;
605 sig_t oldint;
606 char tbuf[8192];
607
608 if ((fd = open(_PATH_MOTDFILE, O_RDONLY, 0)) < 0)
609 return;
610 oldint = signal(SIGINT, sigint);
611 if (setjmp(motdinterrupt) == 0)
612 while ((nchars = read(fd, tbuf, sizeof(tbuf))) > 0)
613 (void)write(fileno(stdout), tbuf, nchars);
614 (void)signal(SIGINT, oldint);
615 (void)close(fd);
616}
617
618/* ARGSUSED */
619void
620sigint(signo)
621 int signo;
622{
623
624 longjmp(motdinterrupt, 1);
625}
626
627/* ARGSUSED */
628void
629timedout(signo)
630 int signo;
631{
632
633 (void)fprintf(stderr, "Login timed out after %d seconds\n", timeout);
634 exit(0);
635}
636
637void
638checknologin()
639{
640 int fd, nchars;
641 char tbuf[8192];
642
643 if ((fd = open(_PATH_NOLOGIN, O_RDONLY, 0)) >= 0) {
644 while ((nchars = read(fd, tbuf, sizeof(tbuf))) > 0)
645 (void)write(fileno(stdout), tbuf, nchars);
646 sleepexit(0);
647 }
648}
649
650void
651dolastlog(quiet)
652 int quiet;
653{
654 struct lastlog ll;
655 int fd;
656
c3a08f59
A
657 /* HACK HACK HACK: This is because HFS doesn't support sparse files
658 * and seeking into the file too far is too slow. The "solution"
659 * is to just bail if the seek time for a large uid would be too
660 * slow.
661 */
662 if(pwd->pw_uid > 100000) {
663 syslog(LOG_NOTICE, "User login %s (%d) not logged in lastlog. UID too large.", pwd->pw_name, pwd->pw_uid);
664 return;
665 }
666
1815bff5
A
667 if ((fd = open(_PATH_LASTLOG, O_RDWR, 0)) >= 0) {
668 (void)lseek(fd, (off_t)pwd->pw_uid * sizeof(ll), L_SET);
669 if (!quiet) {
670 if (read(fd, (char *)&ll, sizeof(ll)) == sizeof(ll) &&
671 ll.ll_time != 0) {
672 (void)printf("Last login: %.*s ",
673 24-5, (char *)ctime(&ll.ll_time));
674 if (*ll.ll_host != '\0')
675 (void)printf("from %.*s\n",
676 (int)sizeof(ll.ll_host),
677 ll.ll_host);
678 else
679 (void)printf("on %.*s\n",
680 (int)sizeof(ll.ll_line),
681 ll.ll_line);
682 }
683 (void)lseek(fd, (off_t)pwd->pw_uid * sizeof(ll), L_SET);
684 }
685 memset((void *)&ll, 0, sizeof(ll));
686 (void)time(&ll.ll_time);
687 (void)strncpy(ll.ll_line, tty, sizeof(ll.ll_line));
688 if (hostname)
689 (void)strncpy(ll.ll_host, hostname, sizeof(ll.ll_host));
690 (void)write(fd, (char *)&ll, sizeof(ll));
691 (void)close(fd);
692 }
693}
694
695void
696badlogin(name)
697 char *name;
698{
699
700 if (failures == 0)
701 return;
702 if (hostname) {
703 syslog(LOG_NOTICE, "%d LOGIN FAILURE%s FROM %s",
704 failures, failures > 1 ? "S" : "", hostname);
705 syslog(LOG_AUTHPRIV|LOG_NOTICE,
706 "%d LOGIN FAILURE%s FROM %s, %s",
707 failures, failures > 1 ? "S" : "", hostname, name);
708 } else {
709 syslog(LOG_NOTICE, "%d LOGIN FAILURE%s ON %s",
710 failures, failures > 1 ? "S" : "", tty);
711 syslog(LOG_AUTHPRIV|LOG_NOTICE,
712 "%d LOGIN FAILURE%s ON %s, %s",
713 failures, failures > 1 ? "S" : "", tty, name);
714 }
715}
716
717#undef UNKNOWN
718#define UNKNOWN "su"
719
720char *
721stypeof(ttyid)
722 char *ttyid;
723{
724 struct ttyent *t;
725
726 return (ttyid && (t = getttynam(ttyid)) ? t->ty_type : UNKNOWN);
727}
728
729void
730sleepexit(eval)
731 int eval;
732{
733
734 (void)sleep(5);
735 exit(eval);
736}