1 /* $NetBSD: pam_skey.c,v 1.2 2005/03/20 16:48:47 christos Exp $ */
4 * Copyright (c) 2005 The NetBSD Foundation, Inc.
7 * This code is derived from software contributed to The NetBSD Foundation
10 * Redistribution and use in source and binary forms, with or without
11 * modification, are permitted provided that the following conditions
13 * 1. Redistributions of source code must retain the above copyright
14 * notice, this list of conditions and the following disclaimer.
15 * 2. Redistributions in binary form must reproduce the above copyright
16 * notice, this list of conditions and the following disclaimer in the
17 * documentation and/or other materials provided with the distribution.
19 * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
20 * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
21 * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
22 * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
23 * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
24 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
25 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
26 * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
27 * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
28 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
29 * POSSIBILITY OF SUCH DAMAGE.
32 #include <sys/cdefs.h>
33 __RCSID("$NetBSD: pam_skey.c,v 1.2 2005/03/20 16:48:47 christos Exp $");
35 #include <sys/types.h>
45 #include <security/pam_appl.h>
46 #include <security/pam_modules.h>
47 #include <security/pam_mod_misc.h>
50 * authentication management
54 pam_sm_authenticate(pam_handle_t
*pamh
, int flags __unused
,
55 int argc __unused
, const char *argv
[] __unused
)
57 const char *user
, *skinfo
, *pass
;
62 if (openpam_get_option(pamh
, PAM_OPT_AUTH_AS_SELF
)) {
65 retval
= pam_get_user(pamh
, &user
, NULL
);
66 if (retval
!= PAM_SUCCESS
)
68 PAM_LOG("Got user: %s", user
);
71 if (skey_haskey(user
) != 0)
72 return (PAM_SERVICE_ERR
); /* XXX PAM_AUTHINFO_UNAVAIL? */
74 skinfo
= skey_keyinfo(user
);
76 PAM_VERBOSE_ERROR("Error getting S/Key challenge");
77 return (PAM_SERVICE_ERR
);
80 (void) snprintf(skprompt
, sizeof(skprompt
),
81 "Password [ %s ]:", skinfo
);
83 retval
= pam_get_authtok(pamh
, PAM_AUTHTOK
, &pass
, skprompt
);
84 if (retval
!= PAM_SUCCESS
)
87 response
= strdup(pass
);
88 if (response
== NULL
) {
89 pam_error(pamh
, "Unable to copy S/Key response");
90 return (PAM_SERVICE_ERR
);
93 retval
= skey_passcheck(user
, response
) == -1 ?
94 PAM_AUTH_ERR
: PAM_SUCCESS
;
103 pam_sm_setcred(pam_handle_t
*pamh __unused
, int flags __unused
,
104 int argc __unused
, const char *argv
[] __unused
)
107 return (PAM_SUCCESS
);
110 PAM_MODULE_ENTRY("pam_skey");