1*f7e6344dSDag-Erling Smørgrav /*- 2*f7e6344dSDag-Erling Smørgrav * Copyright (c) 2002-2003 Networks Associates Technology, Inc. 3*f7e6344dSDag-Erling Smørgrav * Copyright (c) 2004-2011 Dag-Erling Smørgrav 4*f7e6344dSDag-Erling Smørgrav * All rights reserved. 5*f7e6344dSDag-Erling Smørgrav * 6*f7e6344dSDag-Erling Smørgrav * This software was developed for the FreeBSD Project by ThinkSec AS and 7*f7e6344dSDag-Erling Smørgrav * Network Associates Laboratories, the Security Research Division of 8*f7e6344dSDag-Erling Smørgrav * Network Associates, Inc. under DARPA/SPAWAR contract N66001-01-C-8035 9*f7e6344dSDag-Erling Smørgrav * ("CBOSS"), as part of the DARPA CHATS research program. 10*f7e6344dSDag-Erling Smørgrav * 11*f7e6344dSDag-Erling Smørgrav * Redistribution and use in source and binary forms, with or without 12*f7e6344dSDag-Erling Smørgrav * modification, are permitted provided that the following conditions 13*f7e6344dSDag-Erling Smørgrav * are met: 14*f7e6344dSDag-Erling Smørgrav * 1. Redistributions of source code must retain the above copyright 15*f7e6344dSDag-Erling Smørgrav * notice, this list of conditions and the following disclaimer. 16*f7e6344dSDag-Erling Smørgrav * 2. Redistributions in binary form must reproduce the above copyright 17*f7e6344dSDag-Erling Smørgrav * notice, this list of conditions and the following disclaimer in the 18*f7e6344dSDag-Erling Smørgrav * documentation and/or other materials provided with the distribution. 19*f7e6344dSDag-Erling Smørgrav * 3. The name of the author may not be used to endorse or promote 20*f7e6344dSDag-Erling Smørgrav * products derived from this software without specific prior written 21*f7e6344dSDag-Erling Smørgrav * permission. 22*f7e6344dSDag-Erling Smørgrav * 23*f7e6344dSDag-Erling Smørgrav * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND 24*f7e6344dSDag-Erling Smørgrav * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 25*f7e6344dSDag-Erling Smørgrav * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 26*f7e6344dSDag-Erling Smørgrav * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE 27*f7e6344dSDag-Erling Smørgrav * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 28*f7e6344dSDag-Erling Smørgrav * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 29*f7e6344dSDag-Erling Smørgrav * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 30*f7e6344dSDag-Erling Smørgrav * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 31*f7e6344dSDag-Erling Smørgrav * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 32*f7e6344dSDag-Erling Smørgrav * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 33*f7e6344dSDag-Erling Smørgrav * SUCH DAMAGE. 34*f7e6344dSDag-Erling Smørgrav * 35*f7e6344dSDag-Erling Smørgrav * $Id: pam_get_authtok.c 510 2011-12-31 13:14:23Z des $ 36*f7e6344dSDag-Erling Smørgrav */ 37*f7e6344dSDag-Erling Smørgrav 38*f7e6344dSDag-Erling Smørgrav #ifdef HAVE_CONFIG_H 39*f7e6344dSDag-Erling Smørgrav # include "config.h" 40*f7e6344dSDag-Erling Smørgrav #endif 41*f7e6344dSDag-Erling Smørgrav 42*f7e6344dSDag-Erling Smørgrav #include <sys/param.h> 43*f7e6344dSDag-Erling Smørgrav 44*f7e6344dSDag-Erling Smørgrav #include <stdlib.h> 45*f7e6344dSDag-Erling Smørgrav #include <string.h> 46*f7e6344dSDag-Erling Smørgrav 47*f7e6344dSDag-Erling Smørgrav #include <security/pam_appl.h> 48*f7e6344dSDag-Erling Smørgrav #include <security/openpam.h> 49*f7e6344dSDag-Erling Smørgrav 50*f7e6344dSDag-Erling Smørgrav #include "openpam_impl.h" 51*f7e6344dSDag-Erling Smørgrav 52*f7e6344dSDag-Erling Smørgrav static const char authtok_prompt[] = "Password:"; 53*f7e6344dSDag-Erling Smørgrav static const char authtok_prompt_remote[] = "Password for %u@%h:"; 54*f7e6344dSDag-Erling Smørgrav static const char oldauthtok_prompt[] = "Old Password:"; 55*f7e6344dSDag-Erling Smørgrav static const char newauthtok_prompt[] = "New Password:"; 56*f7e6344dSDag-Erling Smørgrav 57*f7e6344dSDag-Erling Smørgrav /* 58*f7e6344dSDag-Erling Smørgrav * OpenPAM extension 59*f7e6344dSDag-Erling Smørgrav * 60*f7e6344dSDag-Erling Smørgrav * Retrieve authentication token 61*f7e6344dSDag-Erling Smørgrav */ 62*f7e6344dSDag-Erling Smørgrav 63*f7e6344dSDag-Erling Smørgrav int 64*f7e6344dSDag-Erling Smørgrav pam_get_authtok(pam_handle_t *pamh, 65*f7e6344dSDag-Erling Smørgrav int item, 66*f7e6344dSDag-Erling Smørgrav const char **authtok, 67*f7e6344dSDag-Erling Smørgrav const char *prompt) 68*f7e6344dSDag-Erling Smørgrav { 69*f7e6344dSDag-Erling Smørgrav char prompt_buf[1024]; 70*f7e6344dSDag-Erling Smørgrav size_t prompt_size; 71*f7e6344dSDag-Erling Smørgrav const void *oldauthtok, *prevauthtok, *promptp; 72*f7e6344dSDag-Erling Smørgrav const char *prompt_option, *default_prompt; 73*f7e6344dSDag-Erling Smørgrav const void *lhost, *rhost; 74*f7e6344dSDag-Erling Smørgrav char *resp, *resp2; 75*f7e6344dSDag-Erling Smørgrav int pitem, r, style, twice; 76*f7e6344dSDag-Erling Smørgrav 77*f7e6344dSDag-Erling Smørgrav ENTER(); 78*f7e6344dSDag-Erling Smørgrav if (pamh == NULL || authtok == NULL) 79*f7e6344dSDag-Erling Smørgrav RETURNC(PAM_SYSTEM_ERR); 80*f7e6344dSDag-Erling Smørgrav *authtok = NULL; 81*f7e6344dSDag-Erling Smørgrav twice = 0; 82*f7e6344dSDag-Erling Smørgrav switch (item) { 83*f7e6344dSDag-Erling Smørgrav case PAM_AUTHTOK: 84*f7e6344dSDag-Erling Smørgrav pitem = PAM_AUTHTOK_PROMPT; 85*f7e6344dSDag-Erling Smørgrav prompt_option = "authtok_prompt"; 86*f7e6344dSDag-Erling Smørgrav default_prompt = authtok_prompt; 87*f7e6344dSDag-Erling Smørgrav r = pam_get_item(pamh, PAM_RHOST, &rhost); 88*f7e6344dSDag-Erling Smørgrav if (r == PAM_SUCCESS && rhost != NULL) { 89*f7e6344dSDag-Erling Smørgrav r = pam_get_item(pamh, PAM_HOST, &lhost); 90*f7e6344dSDag-Erling Smørgrav if (r == PAM_SUCCESS && lhost != NULL) { 91*f7e6344dSDag-Erling Smørgrav if (strcmp(rhost, lhost) != 0) 92*f7e6344dSDag-Erling Smørgrav default_prompt = authtok_prompt_remote; 93*f7e6344dSDag-Erling Smørgrav } 94*f7e6344dSDag-Erling Smørgrav } 95*f7e6344dSDag-Erling Smørgrav r = pam_get_item(pamh, PAM_OLDAUTHTOK, &oldauthtok); 96*f7e6344dSDag-Erling Smørgrav if (r == PAM_SUCCESS && oldauthtok != NULL) { 97*f7e6344dSDag-Erling Smørgrav default_prompt = newauthtok_prompt; 98*f7e6344dSDag-Erling Smørgrav twice = 1; 99*f7e6344dSDag-Erling Smørgrav } 100*f7e6344dSDag-Erling Smørgrav break; 101*f7e6344dSDag-Erling Smørgrav case PAM_OLDAUTHTOK: 102*f7e6344dSDag-Erling Smørgrav pitem = PAM_OLDAUTHTOK_PROMPT; 103*f7e6344dSDag-Erling Smørgrav prompt_option = "oldauthtok_prompt"; 104*f7e6344dSDag-Erling Smørgrav default_prompt = oldauthtok_prompt; 105*f7e6344dSDag-Erling Smørgrav twice = 0; 106*f7e6344dSDag-Erling Smørgrav break; 107*f7e6344dSDag-Erling Smørgrav default: 108*f7e6344dSDag-Erling Smørgrav RETURNC(PAM_SYMBOL_ERR); 109*f7e6344dSDag-Erling Smørgrav } 110*f7e6344dSDag-Erling Smørgrav if (openpam_get_option(pamh, "try_first_pass") || 111*f7e6344dSDag-Erling Smørgrav openpam_get_option(pamh, "use_first_pass")) { 112*f7e6344dSDag-Erling Smørgrav r = pam_get_item(pamh, item, &prevauthtok); 113*f7e6344dSDag-Erling Smørgrav if (r == PAM_SUCCESS && prevauthtok != NULL) { 114*f7e6344dSDag-Erling Smørgrav *authtok = prevauthtok; 115*f7e6344dSDag-Erling Smørgrav RETURNC(PAM_SUCCESS); 116*f7e6344dSDag-Erling Smørgrav } 117*f7e6344dSDag-Erling Smørgrav else if (openpam_get_option(pamh, "use_first_pass")) 118*f7e6344dSDag-Erling Smørgrav RETURNC(r == PAM_SUCCESS ? PAM_AUTH_ERR : r); 119*f7e6344dSDag-Erling Smørgrav } 120*f7e6344dSDag-Erling Smørgrav /* pam policy overrides the module's choice */ 121*f7e6344dSDag-Erling Smørgrav if ((promptp = openpam_get_option(pamh, prompt_option)) != NULL) 122*f7e6344dSDag-Erling Smørgrav prompt = promptp; 123*f7e6344dSDag-Erling Smørgrav /* no prompt provided, see if there is one tucked away somewhere */ 124*f7e6344dSDag-Erling Smørgrav if (prompt == NULL) 125*f7e6344dSDag-Erling Smørgrav if (pam_get_item(pamh, pitem, &promptp) && promptp != NULL) 126*f7e6344dSDag-Erling Smørgrav prompt = promptp; 127*f7e6344dSDag-Erling Smørgrav /* fall back to hardcoded default */ 128*f7e6344dSDag-Erling Smørgrav if (prompt == NULL) 129*f7e6344dSDag-Erling Smørgrav prompt = default_prompt; 130*f7e6344dSDag-Erling Smørgrav /* expand */ 131*f7e6344dSDag-Erling Smørgrav prompt_size = sizeof prompt_buf; 132*f7e6344dSDag-Erling Smørgrav r = openpam_subst(pamh, prompt_buf, &prompt_size, prompt); 133*f7e6344dSDag-Erling Smørgrav if (r == PAM_SUCCESS && prompt_size <= sizeof prompt_buf) 134*f7e6344dSDag-Erling Smørgrav prompt = prompt_buf; 135*f7e6344dSDag-Erling Smørgrav style = openpam_get_option(pamh, "echo_pass") ? 136*f7e6344dSDag-Erling Smørgrav PAM_PROMPT_ECHO_ON : PAM_PROMPT_ECHO_OFF; 137*f7e6344dSDag-Erling Smørgrav r = pam_prompt(pamh, style, &resp, "%s", prompt); 138*f7e6344dSDag-Erling Smørgrav if (r != PAM_SUCCESS) 139*f7e6344dSDag-Erling Smørgrav RETURNC(r); 140*f7e6344dSDag-Erling Smørgrav if (twice) { 141*f7e6344dSDag-Erling Smørgrav r = pam_prompt(pamh, style, &resp2, "Retype %s", prompt); 142*f7e6344dSDag-Erling Smørgrav if (r != PAM_SUCCESS) { 143*f7e6344dSDag-Erling Smørgrav FREE(resp); 144*f7e6344dSDag-Erling Smørgrav RETURNC(r); 145*f7e6344dSDag-Erling Smørgrav } 146*f7e6344dSDag-Erling Smørgrav if (strcmp(resp, resp2) != 0) 147*f7e6344dSDag-Erling Smørgrav FREE(resp); 148*f7e6344dSDag-Erling Smørgrav FREE(resp2); 149*f7e6344dSDag-Erling Smørgrav } 150*f7e6344dSDag-Erling Smørgrav if (resp == NULL) 151*f7e6344dSDag-Erling Smørgrav RETURNC(PAM_TRY_AGAIN); 152*f7e6344dSDag-Erling Smørgrav r = pam_set_item(pamh, item, resp); 153*f7e6344dSDag-Erling Smørgrav FREE(resp); 154*f7e6344dSDag-Erling Smørgrav if (r != PAM_SUCCESS) 155*f7e6344dSDag-Erling Smørgrav RETURNC(r); 156*f7e6344dSDag-Erling Smørgrav r = pam_get_item(pamh, item, (const void **)authtok); 157*f7e6344dSDag-Erling Smørgrav RETURNC(r); 158*f7e6344dSDag-Erling Smørgrav } 159*f7e6344dSDag-Erling Smørgrav 160*f7e6344dSDag-Erling Smørgrav /* 161*f7e6344dSDag-Erling Smørgrav * Error codes: 162*f7e6344dSDag-Erling Smørgrav * 163*f7e6344dSDag-Erling Smørgrav * =pam_get_item 164*f7e6344dSDag-Erling Smørgrav * =pam_prompt 165*f7e6344dSDag-Erling Smørgrav * =pam_set_item 166*f7e6344dSDag-Erling Smørgrav * !PAM_SYMBOL_ERR 167*f7e6344dSDag-Erling Smørgrav * PAM_TRY_AGAIN 168*f7e6344dSDag-Erling Smørgrav */ 169*f7e6344dSDag-Erling Smørgrav 170*f7e6344dSDag-Erling Smørgrav /** 171*f7e6344dSDag-Erling Smørgrav * The =pam_get_authtok function returns the cached authentication token, 172*f7e6344dSDag-Erling Smørgrav * or prompts the user if no token is currently cached. 173*f7e6344dSDag-Erling Smørgrav * Either way, a pointer to the authentication token is stored in the 174*f7e6344dSDag-Erling Smørgrav * location pointed to by the =authtok argument. 175*f7e6344dSDag-Erling Smørgrav * 176*f7e6344dSDag-Erling Smørgrav * The =item argument must have one of the following values: 177*f7e6344dSDag-Erling Smørgrav * 178*f7e6344dSDag-Erling Smørgrav * =PAM_AUTHTOK: 179*f7e6344dSDag-Erling Smørgrav * Returns the current authentication token, or the new token 180*f7e6344dSDag-Erling Smørgrav * when changing authentication tokens. 181*f7e6344dSDag-Erling Smørgrav * =PAM_OLDAUTHTOK: 182*f7e6344dSDag-Erling Smørgrav * Returns the previous authentication token when changing 183*f7e6344dSDag-Erling Smørgrav * authentication tokens. 184*f7e6344dSDag-Erling Smørgrav * 185*f7e6344dSDag-Erling Smørgrav * The =prompt argument specifies a prompt to use if no token is cached. 186*f7e6344dSDag-Erling Smørgrav * If it is =NULL, the =PAM_AUTHTOK_PROMPT or =PAM_OLDAUTHTOK_PROMPT item, 187*f7e6344dSDag-Erling Smørgrav * as appropriate, will be used. 188*f7e6344dSDag-Erling Smørgrav * If that item is also =NULL, a hardcoded default prompt will be used. 189*f7e6344dSDag-Erling Smørgrav * Either way, the prompt is expanded using =openpam_subst before it is 190*f7e6344dSDag-Erling Smørgrav * passed to the conversation function. 191*f7e6344dSDag-Erling Smørgrav * 192*f7e6344dSDag-Erling Smørgrav * If =pam_get_authtok is called from a module and the ;authtok_prompt / 193*f7e6344dSDag-Erling Smørgrav * ;oldauthtok_prompt option is set in the policy file, the value of that 194*f7e6344dSDag-Erling Smørgrav * option takes precedence over both the =prompt argument and the 195*f7e6344dSDag-Erling Smørgrav * =PAM_AUTHTOK_PROMPT / =PAM_OLDAUTHTOK_PROMPT item. 196*f7e6344dSDag-Erling Smørgrav * 197*f7e6344dSDag-Erling Smørgrav * If =item is set to =PAM_AUTHTOK and there is a non-null =PAM_OLDAUTHTOK 198*f7e6344dSDag-Erling Smørgrav * item, =pam_get_authtok will ask the user to confirm the new token by 199*f7e6344dSDag-Erling Smørgrav * retyping it. 200*f7e6344dSDag-Erling Smørgrav * If there is a mismatch, =pam_get_authtok will return =PAM_TRY_AGAIN. 201*f7e6344dSDag-Erling Smørgrav * 202*f7e6344dSDag-Erling Smørgrav * >pam_get_item 203*f7e6344dSDag-Erling Smørgrav * >pam_get_user 204*f7e6344dSDag-Erling Smørgrav * >openpam_subst 205*f7e6344dSDag-Erling Smørgrav */ 206