2 * Copyright Alexander O. Yuriev, 1996. All rights reserved.
3 * NIS+ support by Thorsten Kukuk <kukuk@weber.uni-paderborn.de>
4 * Copyright Jan Rêkorajski, 1999. All rights reserved.
6 * Redistribution and use in source and binary forms, with or without
7 * modification, are permitted provided that the following conditions
9 * 1. Redistributions of source code must retain the above copyright
10 * notice, and the entire permission notice in its entirety,
11 * including the disclaimer of warranties.
12 * 2. Redistributions in binary form must reproduce the above copyright
13 * notice, this list of conditions and the following disclaimer in the
14 * documentation and/or other materials provided with the distribution.
15 * 3. The name of the author may not be used to endorse or promote
16 * products derived from this software without specific prior
19 * ALTERNATIVELY, this product may be distributed under the terms of
20 * the GNU Public License, in which case the provisions of the GPL are
21 * required INSTEAD OF the above restrictions. (This clause is
22 * necessary due to a potential bad interaction between the GPL and
23 * the restrictions contained in a BSD-style copyright.)
25 * THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED
26 * WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
27 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
28 * DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT,
29 * INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
30 * (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
31 * SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
32 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
33 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
34 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
35 * OF THE POSSIBILITY OF SUCH DAMAGE.
49 #include <sys/types.h>
53 /* indicate the following groups are defined */
57 #define _PAM_EXTERN_FUNCTIONS
58 #include <security/_pam_macros.h>
59 #include <security/pam_modules.h>
60 #include <security/pam_ext.h>
65 * PAM framework looks for these entry-points to pass control to the
66 * authentication module.
71 * pam_sm_authenticate() performs UNIX/shadow authentication
73 * First, if shadow support is available, attempt to perform
74 * authentication using shadow passwords. If shadow is not
75 * available, or user does not have a shadow password, fallback
76 * onto a normal UNIX authentication
79 #define _UNIX_AUTHTOK "-UN*X-PASS"
83 if (on(UNIX_LIKE_AUTH, ctrl) && ret_data) { \
84 D(("recording return code for next time [%d]", \
87 pam_set_data(pamh, "unix_setcred_return", \
88 (void *) ret_data, setcred_free); \
89 } else if (ret_data) \
91 D(("done. [%s]", pam_strerror(pamh, retval))); \
97 setcred_free (pam_handle_t *pamh UNUSED, void *ptr, int err UNUSED)
104 PAM_EXTERN int pam_sm_authenticate(pam_handle_t * pamh, int flags
105 ,int argc, const char **argv)
108 int retval, *ret_data = NULL;
114 ctrl = _set_ctrl(pamh, flags, NULL, argc, argv);
116 /* Get a few bytes so we can pass our return value to
118 if (on(UNIX_LIKE_AUTH, ctrl))
119 ret_data = malloc(sizeof(int));
121 /* get the user'name' */
123 retval = pam_get_user(pamh, &name, NULL);
124 if (retval == PAM_SUCCESS) {
126 * Various libraries at various times have had bugs related to
127 * '+' or '-' as the first character of a user name. Don't take
128 * any chances here. Require that the username starts with an
129 * alphanumeric character.
131 if (name == NULL || !isalnum(*name)) {
132 pam_syslog(pamh, LOG_ERR, "bad username [%s]", name);
133 retval = PAM_USER_UNKNOWN;
136 if (retval == PAM_SUCCESS && on(UNIX_DEBUG, ctrl))
137 D(("username [%s] obtained", name));
139 D(("trouble reading username"));
140 if (retval == PAM_CONV_AGAIN) {
141 D(("pam_get_user/conv() function is not ready yet"));
142 /* it is safe to resume this function so we translate this
143 * retval to the value that indicates we're happy to resume.
145 retval = PAM_INCOMPLETE;
150 /* if this user does not have a password... */
152 if (_unix_blankpasswd(pamh, ctrl, name)) {
153 D(("user '%s' has blank passwd", name));
155 retval = PAM_SUCCESS;
158 /* get this user's authentication token */
160 retval = _unix_read_password(pamh, ctrl, NULL, _("Password: "), NULL
162 if (retval != PAM_SUCCESS) {
163 if (retval != PAM_CONV_AGAIN) {
164 pam_syslog(pamh, LOG_CRIT,
165 "auth could not identify password for [%s]", name);
167 D(("conversation function is not ready yet"));
169 * it is safe to resume this function so we translate this
170 * retval to the value that indicates we're happy to resume.
172 retval = PAM_INCOMPLETE;
177 D(("user=%s, password=[%s]", name, p));
179 /* verify the password of this user */
180 retval = _unix_verify_password(pamh, name, p, ctrl);
188 * The only thing _pam_set_credentials_unix() does is initialization of
191 * Well, everybody but me on linux-pam is convinced that it should not
192 * initialize group IDs, so I am not doing it but don't say that I haven't
197 pam_sm_setcred (pam_handle_t *pamh, int flags UNUSED,
198 int argc UNUSED, const char **argv UNUSED)
201 const void *pretval = NULL;
205 retval = PAM_SUCCESS;
207 D(("recovering return code from auth call"));
208 /* We will only find something here if UNIX_LIKE_AUTH is set --
209 don't worry about an explicit check of argv. */
210 if (pam_get_data(pamh, "unix_setcred_return", &pretval) == PAM_SUCCESS
212 retval = *(const int *)pretval;
213 pam_set_data(pamh, "unix_setcred_return", NULL, NULL);
214 D(("recovered data indicates that old retval was %d", retval));
221 struct pam_module _pam_unix_auth_modstruct = {