xref: /freebsd/contrib/openpam/lib/libpam/pam_get_authtok.c (revision f7e6344d4a3b7072f8b8a1dec8f483a5a3ca50eb)
1*f7e6344dSDag-Erling Smørgrav /*-
2*f7e6344dSDag-Erling Smørgrav  * Copyright (c) 2002-2003 Networks Associates Technology, Inc.
3*f7e6344dSDag-Erling Smørgrav  * Copyright (c) 2004-2011 Dag-Erling Smørgrav
4*f7e6344dSDag-Erling Smørgrav  * All rights reserved.
5*f7e6344dSDag-Erling Smørgrav  *
6*f7e6344dSDag-Erling Smørgrav  * This software was developed for the FreeBSD Project by ThinkSec AS and
7*f7e6344dSDag-Erling Smørgrav  * Network Associates Laboratories, the Security Research Division of
8*f7e6344dSDag-Erling Smørgrav  * Network Associates, Inc.  under DARPA/SPAWAR contract N66001-01-C-8035
9*f7e6344dSDag-Erling Smørgrav  * ("CBOSS"), as part of the DARPA CHATS research program.
10*f7e6344dSDag-Erling Smørgrav  *
11*f7e6344dSDag-Erling Smørgrav  * Redistribution and use in source and binary forms, with or without
12*f7e6344dSDag-Erling Smørgrav  * modification, are permitted provided that the following conditions
13*f7e6344dSDag-Erling Smørgrav  * are met:
14*f7e6344dSDag-Erling Smørgrav  * 1. Redistributions of source code must retain the above copyright
15*f7e6344dSDag-Erling Smørgrav  *    notice, this list of conditions and the following disclaimer.
16*f7e6344dSDag-Erling Smørgrav  * 2. Redistributions in binary form must reproduce the above copyright
17*f7e6344dSDag-Erling Smørgrav  *    notice, this list of conditions and the following disclaimer in the
18*f7e6344dSDag-Erling Smørgrav  *    documentation and/or other materials provided with the distribution.
19*f7e6344dSDag-Erling Smørgrav  * 3. The name of the author may not be used to endorse or promote
20*f7e6344dSDag-Erling Smørgrav  *    products derived from this software without specific prior written
21*f7e6344dSDag-Erling Smørgrav  *    permission.
22*f7e6344dSDag-Erling Smørgrav  *
23*f7e6344dSDag-Erling Smørgrav  * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
24*f7e6344dSDag-Erling Smørgrav  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
25*f7e6344dSDag-Erling Smørgrav  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
26*f7e6344dSDag-Erling Smørgrav  * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
27*f7e6344dSDag-Erling Smørgrav  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
28*f7e6344dSDag-Erling Smørgrav  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
29*f7e6344dSDag-Erling Smørgrav  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
30*f7e6344dSDag-Erling Smørgrav  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
31*f7e6344dSDag-Erling Smørgrav  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
32*f7e6344dSDag-Erling Smørgrav  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
33*f7e6344dSDag-Erling Smørgrav  * SUCH DAMAGE.
34*f7e6344dSDag-Erling Smørgrav  *
35*f7e6344dSDag-Erling Smørgrav  * $Id: pam_get_authtok.c 510 2011-12-31 13:14:23Z des $
36*f7e6344dSDag-Erling Smørgrav  */
37*f7e6344dSDag-Erling Smørgrav 
38*f7e6344dSDag-Erling Smørgrav #ifdef HAVE_CONFIG_H
39*f7e6344dSDag-Erling Smørgrav # include "config.h"
40*f7e6344dSDag-Erling Smørgrav #endif
41*f7e6344dSDag-Erling Smørgrav 
42*f7e6344dSDag-Erling Smørgrav #include <sys/param.h>
43*f7e6344dSDag-Erling Smørgrav 
44*f7e6344dSDag-Erling Smørgrav #include <stdlib.h>
45*f7e6344dSDag-Erling Smørgrav #include <string.h>
46*f7e6344dSDag-Erling Smørgrav 
47*f7e6344dSDag-Erling Smørgrav #include <security/pam_appl.h>
48*f7e6344dSDag-Erling Smørgrav #include <security/openpam.h>
49*f7e6344dSDag-Erling Smørgrav 
50*f7e6344dSDag-Erling Smørgrav #include "openpam_impl.h"
51*f7e6344dSDag-Erling Smørgrav 
52*f7e6344dSDag-Erling Smørgrav static const char authtok_prompt[] = "Password:";
53*f7e6344dSDag-Erling Smørgrav static const char authtok_prompt_remote[] = "Password for %u@%h:";
54*f7e6344dSDag-Erling Smørgrav static const char oldauthtok_prompt[] = "Old Password:";
55*f7e6344dSDag-Erling Smørgrav static const char newauthtok_prompt[] = "New Password:";
56*f7e6344dSDag-Erling Smørgrav 
57*f7e6344dSDag-Erling Smørgrav /*
58*f7e6344dSDag-Erling Smørgrav  * OpenPAM extension
59*f7e6344dSDag-Erling Smørgrav  *
60*f7e6344dSDag-Erling Smørgrav  * Retrieve authentication token
61*f7e6344dSDag-Erling Smørgrav  */
62*f7e6344dSDag-Erling Smørgrav 
63*f7e6344dSDag-Erling Smørgrav int
64*f7e6344dSDag-Erling Smørgrav pam_get_authtok(pam_handle_t *pamh,
65*f7e6344dSDag-Erling Smørgrav 	int item,
66*f7e6344dSDag-Erling Smørgrav 	const char **authtok,
67*f7e6344dSDag-Erling Smørgrav 	const char *prompt)
68*f7e6344dSDag-Erling Smørgrav {
69*f7e6344dSDag-Erling Smørgrav 	char prompt_buf[1024];
70*f7e6344dSDag-Erling Smørgrav 	size_t prompt_size;
71*f7e6344dSDag-Erling Smørgrav 	const void *oldauthtok, *prevauthtok, *promptp;
72*f7e6344dSDag-Erling Smørgrav 	const char *prompt_option, *default_prompt;
73*f7e6344dSDag-Erling Smørgrav 	const void *lhost, *rhost;
74*f7e6344dSDag-Erling Smørgrav 	char *resp, *resp2;
75*f7e6344dSDag-Erling Smørgrav 	int pitem, r, style, twice;
76*f7e6344dSDag-Erling Smørgrav 
77*f7e6344dSDag-Erling Smørgrav 	ENTER();
78*f7e6344dSDag-Erling Smørgrav 	if (pamh == NULL || authtok == NULL)
79*f7e6344dSDag-Erling Smørgrav 		RETURNC(PAM_SYSTEM_ERR);
80*f7e6344dSDag-Erling Smørgrav 	*authtok = NULL;
81*f7e6344dSDag-Erling Smørgrav 	twice = 0;
82*f7e6344dSDag-Erling Smørgrav 	switch (item) {
83*f7e6344dSDag-Erling Smørgrav 	case PAM_AUTHTOK:
84*f7e6344dSDag-Erling Smørgrav 		pitem = PAM_AUTHTOK_PROMPT;
85*f7e6344dSDag-Erling Smørgrav 		prompt_option = "authtok_prompt";
86*f7e6344dSDag-Erling Smørgrav 		default_prompt = authtok_prompt;
87*f7e6344dSDag-Erling Smørgrav 		r = pam_get_item(pamh, PAM_RHOST, &rhost);
88*f7e6344dSDag-Erling Smørgrav 		if (r == PAM_SUCCESS && rhost != NULL) {
89*f7e6344dSDag-Erling Smørgrav 			r = pam_get_item(pamh, PAM_HOST, &lhost);
90*f7e6344dSDag-Erling Smørgrav 			if (r == PAM_SUCCESS && lhost != NULL) {
91*f7e6344dSDag-Erling Smørgrav 				if (strcmp(rhost, lhost) != 0)
92*f7e6344dSDag-Erling Smørgrav 					default_prompt = authtok_prompt_remote;
93*f7e6344dSDag-Erling Smørgrav 			}
94*f7e6344dSDag-Erling Smørgrav 		}
95*f7e6344dSDag-Erling Smørgrav 		r = pam_get_item(pamh, PAM_OLDAUTHTOK, &oldauthtok);
96*f7e6344dSDag-Erling Smørgrav 		if (r == PAM_SUCCESS && oldauthtok != NULL) {
97*f7e6344dSDag-Erling Smørgrav 			default_prompt = newauthtok_prompt;
98*f7e6344dSDag-Erling Smørgrav 			twice = 1;
99*f7e6344dSDag-Erling Smørgrav 		}
100*f7e6344dSDag-Erling Smørgrav 		break;
101*f7e6344dSDag-Erling Smørgrav 	case PAM_OLDAUTHTOK:
102*f7e6344dSDag-Erling Smørgrav 		pitem = PAM_OLDAUTHTOK_PROMPT;
103*f7e6344dSDag-Erling Smørgrav 		prompt_option = "oldauthtok_prompt";
104*f7e6344dSDag-Erling Smørgrav 		default_prompt = oldauthtok_prompt;
105*f7e6344dSDag-Erling Smørgrav 		twice = 0;
106*f7e6344dSDag-Erling Smørgrav 		break;
107*f7e6344dSDag-Erling Smørgrav 	default:
108*f7e6344dSDag-Erling Smørgrav 		RETURNC(PAM_SYMBOL_ERR);
109*f7e6344dSDag-Erling Smørgrav 	}
110*f7e6344dSDag-Erling Smørgrav 	if (openpam_get_option(pamh, "try_first_pass") ||
111*f7e6344dSDag-Erling Smørgrav 	    openpam_get_option(pamh, "use_first_pass")) {
112*f7e6344dSDag-Erling Smørgrav 		r = pam_get_item(pamh, item, &prevauthtok);
113*f7e6344dSDag-Erling Smørgrav 		if (r == PAM_SUCCESS && prevauthtok != NULL) {
114*f7e6344dSDag-Erling Smørgrav 			*authtok = prevauthtok;
115*f7e6344dSDag-Erling Smørgrav 			RETURNC(PAM_SUCCESS);
116*f7e6344dSDag-Erling Smørgrav 		}
117*f7e6344dSDag-Erling Smørgrav 		else if (openpam_get_option(pamh, "use_first_pass"))
118*f7e6344dSDag-Erling Smørgrav 			RETURNC(r == PAM_SUCCESS ? PAM_AUTH_ERR : r);
119*f7e6344dSDag-Erling Smørgrav 	}
120*f7e6344dSDag-Erling Smørgrav 	/* pam policy overrides the module's choice */
121*f7e6344dSDag-Erling Smørgrav 	if ((promptp = openpam_get_option(pamh, prompt_option)) != NULL)
122*f7e6344dSDag-Erling Smørgrav 		prompt = promptp;
123*f7e6344dSDag-Erling Smørgrav 	/* no prompt provided, see if there is one tucked away somewhere */
124*f7e6344dSDag-Erling Smørgrav 	if (prompt == NULL)
125*f7e6344dSDag-Erling Smørgrav 		if (pam_get_item(pamh, pitem, &promptp) && promptp != NULL)
126*f7e6344dSDag-Erling Smørgrav 			prompt = promptp;
127*f7e6344dSDag-Erling Smørgrav 	/* fall back to hardcoded default */
128*f7e6344dSDag-Erling Smørgrav 	if (prompt == NULL)
129*f7e6344dSDag-Erling Smørgrav 		prompt = default_prompt;
130*f7e6344dSDag-Erling Smørgrav 	/* expand */
131*f7e6344dSDag-Erling Smørgrav 	prompt_size = sizeof prompt_buf;
132*f7e6344dSDag-Erling Smørgrav 	r = openpam_subst(pamh, prompt_buf, &prompt_size, prompt);
133*f7e6344dSDag-Erling Smørgrav 	if (r == PAM_SUCCESS && prompt_size <= sizeof prompt_buf)
134*f7e6344dSDag-Erling Smørgrav 		prompt = prompt_buf;
135*f7e6344dSDag-Erling Smørgrav 	style = openpam_get_option(pamh, "echo_pass") ?
136*f7e6344dSDag-Erling Smørgrav 	    PAM_PROMPT_ECHO_ON : PAM_PROMPT_ECHO_OFF;
137*f7e6344dSDag-Erling Smørgrav 	r = pam_prompt(pamh, style, &resp, "%s", prompt);
138*f7e6344dSDag-Erling Smørgrav 	if (r != PAM_SUCCESS)
139*f7e6344dSDag-Erling Smørgrav 		RETURNC(r);
140*f7e6344dSDag-Erling Smørgrav 	if (twice) {
141*f7e6344dSDag-Erling Smørgrav 		r = pam_prompt(pamh, style, &resp2, "Retype %s", prompt);
142*f7e6344dSDag-Erling Smørgrav 		if (r != PAM_SUCCESS) {
143*f7e6344dSDag-Erling Smørgrav 			FREE(resp);
144*f7e6344dSDag-Erling Smørgrav 			RETURNC(r);
145*f7e6344dSDag-Erling Smørgrav 		}
146*f7e6344dSDag-Erling Smørgrav 		if (strcmp(resp, resp2) != 0)
147*f7e6344dSDag-Erling Smørgrav 			FREE(resp);
148*f7e6344dSDag-Erling Smørgrav 		FREE(resp2);
149*f7e6344dSDag-Erling Smørgrav 	}
150*f7e6344dSDag-Erling Smørgrav 	if (resp == NULL)
151*f7e6344dSDag-Erling Smørgrav 		RETURNC(PAM_TRY_AGAIN);
152*f7e6344dSDag-Erling Smørgrav 	r = pam_set_item(pamh, item, resp);
153*f7e6344dSDag-Erling Smørgrav 	FREE(resp);
154*f7e6344dSDag-Erling Smørgrav 	if (r != PAM_SUCCESS)
155*f7e6344dSDag-Erling Smørgrav 		RETURNC(r);
156*f7e6344dSDag-Erling Smørgrav 	r = pam_get_item(pamh, item, (const void **)authtok);
157*f7e6344dSDag-Erling Smørgrav 	RETURNC(r);
158*f7e6344dSDag-Erling Smørgrav }
159*f7e6344dSDag-Erling Smørgrav 
160*f7e6344dSDag-Erling Smørgrav /*
161*f7e6344dSDag-Erling Smørgrav  * Error codes:
162*f7e6344dSDag-Erling Smørgrav  *
163*f7e6344dSDag-Erling Smørgrav  *	=pam_get_item
164*f7e6344dSDag-Erling Smørgrav  *	=pam_prompt
165*f7e6344dSDag-Erling Smørgrav  *	=pam_set_item
166*f7e6344dSDag-Erling Smørgrav  *	!PAM_SYMBOL_ERR
167*f7e6344dSDag-Erling Smørgrav  *	PAM_TRY_AGAIN
168*f7e6344dSDag-Erling Smørgrav  */
169*f7e6344dSDag-Erling Smørgrav 
170*f7e6344dSDag-Erling Smørgrav /**
171*f7e6344dSDag-Erling Smørgrav  * The =pam_get_authtok function returns the cached authentication token,
172*f7e6344dSDag-Erling Smørgrav  * or prompts the user if no token is currently cached.
173*f7e6344dSDag-Erling Smørgrav  * Either way, a pointer to the authentication token is stored in the
174*f7e6344dSDag-Erling Smørgrav  * location pointed to by the =authtok argument.
175*f7e6344dSDag-Erling Smørgrav  *
176*f7e6344dSDag-Erling Smørgrav  * The =item argument must have one of the following values:
177*f7e6344dSDag-Erling Smørgrav  *
178*f7e6344dSDag-Erling Smørgrav  *	=PAM_AUTHTOK:
179*f7e6344dSDag-Erling Smørgrav  *		Returns the current authentication token, or the new token
180*f7e6344dSDag-Erling Smørgrav  *		when changing authentication tokens.
181*f7e6344dSDag-Erling Smørgrav  *	=PAM_OLDAUTHTOK:
182*f7e6344dSDag-Erling Smørgrav  *		Returns the previous authentication token when changing
183*f7e6344dSDag-Erling Smørgrav  *		authentication tokens.
184*f7e6344dSDag-Erling Smørgrav  *
185*f7e6344dSDag-Erling Smørgrav  * The =prompt argument specifies a prompt to use if no token is cached.
186*f7e6344dSDag-Erling Smørgrav  * If it is =NULL, the =PAM_AUTHTOK_PROMPT or =PAM_OLDAUTHTOK_PROMPT item,
187*f7e6344dSDag-Erling Smørgrav  * as appropriate, will be used.
188*f7e6344dSDag-Erling Smørgrav  * If that item is also =NULL, a hardcoded default prompt will be used.
189*f7e6344dSDag-Erling Smørgrav  * Either way, the prompt is expanded using =openpam_subst before it is
190*f7e6344dSDag-Erling Smørgrav  * passed to the conversation function.
191*f7e6344dSDag-Erling Smørgrav  *
192*f7e6344dSDag-Erling Smørgrav  * If =pam_get_authtok is called from a module and the ;authtok_prompt /
193*f7e6344dSDag-Erling Smørgrav  * ;oldauthtok_prompt option is set in the policy file, the value of that
194*f7e6344dSDag-Erling Smørgrav  * option takes precedence over both the =prompt argument and the
195*f7e6344dSDag-Erling Smørgrav  * =PAM_AUTHTOK_PROMPT / =PAM_OLDAUTHTOK_PROMPT item.
196*f7e6344dSDag-Erling Smørgrav  *
197*f7e6344dSDag-Erling Smørgrav  * If =item is set to =PAM_AUTHTOK and there is a non-null =PAM_OLDAUTHTOK
198*f7e6344dSDag-Erling Smørgrav  * item, =pam_get_authtok will ask the user to confirm the new token by
199*f7e6344dSDag-Erling Smørgrav  * retyping it.
200*f7e6344dSDag-Erling Smørgrav  * If there is a mismatch, =pam_get_authtok will return =PAM_TRY_AGAIN.
201*f7e6344dSDag-Erling Smørgrav  *
202*f7e6344dSDag-Erling Smørgrav  * >pam_get_item
203*f7e6344dSDag-Erling Smørgrav  * >pam_get_user
204*f7e6344dSDag-Erling Smørgrav  * >openpam_subst
205*f7e6344dSDag-Erling Smørgrav  */
206