1 /*- 2 * Copyright (c) 2002-2003 Networks Associates Technology, Inc. 3 * All rights reserved. 4 * 5 * This software was developed for the FreeBSD Project by ThinkSec AS and 6 * Network Associates Laboratories, the Security Research Division of 7 * Network Associates, Inc. under DARPA/SPAWAR contract N66001-01-C-8035 8 * ("CBOSS"), as part of the DARPA CHATS research program. 9 * 10 * Redistribution and use in source and binary forms, with or without 11 * modification, are permitted provided that the following conditions 12 * are met: 13 * 1. Redistributions of source code must retain the above copyright 14 * notice, this list of conditions and the following disclaimer. 15 * 2. Redistributions in binary form must reproduce the above copyright 16 * notice, this list of conditions and the following disclaimer in the 17 * documentation and/or other materials provided with the distribution. 18 * 3. The name of the author may not be used to endorse or promote 19 * products derived from this software without specific prior written 20 * permission. 21 * 22 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND 23 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 24 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 25 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE 26 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 27 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 28 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 29 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 30 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 31 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 32 * SUCH DAMAGE. 33 * 34 * $P4: //depot/projects/openpam/modules/pam_unix/pam_unix.c#6 $ 35 */ 36 37 #ifdef HAVE_CONFIG_H 38 # include <config.h> 39 #endif 40 41 #include <sys/param.h> 42 43 #include <pwd.h> 44 #include <stdlib.h> 45 #include <stdio.h> 46 #include <string.h> 47 #include <unistd.h> 48 49 #ifdef HAVE_CRYPT_H 50 # include <crypt.h> 51 #endif 52 53 #include <security/pam_modules.h> 54 #include <security/pam_appl.h> 55 56 #ifndef _OPENPAM 57 static char password_prompt[] = "Password:"; 58 #endif 59 60 #ifndef PAM_EXTERN 61 #define PAM_EXTERN 62 #endif 63 64 PAM_EXTERN int 65 pam_sm_authenticate(pam_handle_t *pamh, int flags, 66 int argc, const char *argv[]) 67 { 68 #ifndef _OPENPAM 69 struct pam_conv *conv; 70 struct pam_message msg; 71 const struct pam_message *msgp; 72 struct pam_response *resp; 73 #endif 74 struct passwd *pwd; 75 const char *user; 76 char *crypt_password, *password; 77 int pam_err, retry; 78 79 /* identify user */ 80 if ((pam_err = pam_get_user(pamh, &user, NULL)) != PAM_SUCCESS) 81 return (pam_err); 82 if ((pwd = getpwnam(user)) == NULL) 83 return (PAM_USER_UNKNOWN); 84 85 /* get password */ 86 #ifndef _OPENPAM 87 pam_err = pam_get_item(pamh, PAM_CONV, (const void **)&conv); 88 if (pam_err != PAM_SUCCESS) 89 return (PAM_SYSTEM_ERR); 90 msg.msg_style = PAM_PROMPT_ECHO_OFF; 91 msg.msg = password_prompt; 92 msgp = &msg; 93 #endif 94 for (retry = 0; retry < 3; ++retry) { 95 #ifdef _OPENPAM 96 pam_err = pam_get_authtok(pamh, PAM_AUTHTOK, 97 (const char **)&password, NULL); 98 #else 99 resp = NULL; 100 pam_err = (*conv->conv)(1, &msgp, &resp, conv->appdata_ptr); 101 if (resp != NULL) { 102 if (pam_err == PAM_SUCCESS) 103 password = resp->resp; 104 else 105 free(resp->resp); 106 free(resp); 107 } 108 #endif 109 if (pam_err == PAM_SUCCESS) 110 break; 111 } 112 if (pam_err == PAM_CONV_ERR) 113 return (pam_err); 114 if (pam_err != PAM_SUCCESS) 115 return (PAM_AUTH_ERR); 116 117 /* compare passwords */ 118 if ((!pwd->pw_passwd[0] && (flags & PAM_DISALLOW_NULL_AUTHTOK)) || 119 (crypt_password = crypt(password, pwd->pw_passwd)) == NULL || 120 strcmp(crypt_password, pwd->pw_passwd) != 0) 121 pam_err = PAM_AUTH_ERR; 122 else 123 pam_err = PAM_SUCCESS; 124 #ifndef _OPENPAM 125 free(password); 126 #endif 127 return (pam_err); 128 } 129 130 PAM_EXTERN int 131 pam_sm_setcred(pam_handle_t *pamh, int flags, 132 int argc, const char *argv[]) 133 { 134 135 return (PAM_SUCCESS); 136 } 137 138 PAM_EXTERN int 139 pam_sm_acct_mgmt(pam_handle_t *pamh, int flags, 140 int argc, const char *argv[]) 141 { 142 143 return (PAM_SUCCESS); 144 } 145 146 PAM_EXTERN int 147 pam_sm_open_session(pam_handle_t *pamh, int flags, 148 int argc, const char *argv[]) 149 { 150 151 return (PAM_SUCCESS); 152 } 153 154 PAM_EXTERN int 155 pam_sm_close_session(pam_handle_t *pamh, int flags, 156 int argc, const char *argv[]) 157 { 158 159 return (PAM_SUCCESS); 160 } 161 162 PAM_EXTERN int 163 pam_sm_chauthtok(pam_handle_t *pamh, int flags, 164 int argc, const char *argv[]) 165 { 166 167 return (PAM_SERVICE_ERR); 168 } 169 170 #ifdef PAM_MODULE_ENTRY 171 PAM_MODULE_ENTRY("pam_unix"); 172 #endif 173