1 /* $NetBSD: pam_passwd.c,v 1.3 2005/02/26 07:19:25 thorpej Exp $ */
4 * Copyright (c) 2002 Networks Associates Technologies, Inc.
7 * This software was developed for the FreeBSD Project by ThinkSec AS and
8 * NAI Labs, the Security Research Division of Network Associates, Inc.
9 * under DARPA/SPAWAR contract N66001-01-C-8035 ("CBOSS"), as part of the
10 * DARPA CHATS research program.
12 * Redistribution and use in source and binary forms, with or without
13 * modification, are permitted provided that the following conditions
15 * 1. Redistributions of source code must retain the above copyright
16 * notice, this list of conditions and the following disclaimer.
17 * 2. Redistributions in binary form must reproduce the above copyright
18 * notice, this list of conditions and the following disclaimer in the
19 * documentation and/or other materials provided with the distribution.
20 * 3. The name of the author may not be used to endorse or promote
21 * products derived from this software without specific prior written
24 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
25 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
26 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
27 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
28 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
29 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
30 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
31 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
32 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
33 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
37 #include <sys/cdefs.h>
39 __FBSDID("$FreeBSD: src/usr.bin/passwd/passwd.c,v 1.23 2003/04/18 21:27:09 nectar Exp $");
41 __RCSID("$NetBSD: pam_passwd.c,v 1.3 2005/02/26 07:19:25 thorpej Exp $");
44 #include <sys/param.h>
55 #include <security/pam_appl.h>
56 #include <security/openpam.h>
58 static pam_handle_t
*pamh
;
59 static struct pam_conv pamc
= {
64 #define pam_check(msg) \
66 if (pam_err != PAM_SUCCESS) { \
67 warnx("%s: %s", (msg), pam_strerror(pamh, pam_err)); \
70 } while (/*CONSTCOND*/0)
73 pwpam_process(const char *username
, int argc
, char **argv
)
76 char hostname
[MAXHOSTNAMELEN
+ 1];
78 while ((ch
= getopt(argc
, argv
, "")) != -1) {
91 /* username already provided */
101 (void)printf("Changing password for %s.\n", username
);
103 /* initialize PAM -- always use the program name "passwd" */
104 pam_err
= pam_start("passwd", username
, &pamc
, &pamh
);
105 pam_check("unable to start PAM session");
107 pam_err
= pam_set_item(pamh
, PAM_TTY
, ttyname(STDERR_FILENO
));
108 pam_check("unable to set TTY");
110 (void)gethostname(hostname
, sizeof hostname
);
111 pam_err
= pam_set_item(pamh
, PAM_RHOST
, hostname
);
112 pam_check("unable to set RHOST");
114 pam_err
= pam_set_item(pamh
, PAM_RUSER
, getlogin());
115 pam_check("unable to set RUSER");
117 /* set new password */
118 pam_err
= pam_chauthtok(pamh
, 0);
119 if (pam_err
!= PAM_SUCCESS
)
120 printf("Unable to change auth token: %s\n",
121 pam_strerror(pamh
, pam_err
));
124 pam_end(pamh
, pam_err
);
125 if (pam_err
== PAM_SUCCESS
)