summaryrefslogtreecommitdiffstats
path: root/contrib/libpam/modules/pam_pwdb/pam_unix_auth.-c
blob: 4a1eed0d6387bf7fa01843bd831983967021fe44 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
/*
 * $Id: pam_unix_auth.-c,v 1.4 1996/12/01 03:05:54 morgan Exp $
 * 
 * $Log: pam_unix_auth.-c,v $
 * Revision 1.4  1996/12/01 03:05:54  morgan
 * debugging with _pam_macros.h
 *
 * Revision 1.3  1996/11/10 21:04:29  morgan
 * pwdb conversion
 *
 * Revision 1.2  1996/09/05 06:46:53  morgan
 * fixed comments. Added check for null passwd.
 * changed data item name
 *
 * Revision 1.1  1996/08/29 13:27:51  morgan
 * Initial revision
 *
 * See end of file for Copyright information.
 */

static const char rcsid_auth[] =
"$Id: pam_unix_auth.-c,v 1.4 1996/12/01 03:05:54 morgan Exp $: pam_unix_auth.-c,v 1.2 1996/09/05 06:46:53 morgan Exp morgan $\n"
" - PAM_PWDB authentication functions. <morgan@parc.power.net>";

/*
 * _unix_auth() is a front-end for UNIX/shadow authentication
 *
 *	First, obtain the password from the user. Then use a
 *      routine in 'support.-c' to authenticate the user.
 */

#define _UNIX_AUTHTOK  "-UN*X-PASS"

static int _unix_auth(pam_handle_t *pamh, unsigned int ctrl)
{
    int retval;
    const char *name, *p;

    D(("called."));

    /* get the user'name' */

    retval = _unix_get_user(pamh, ctrl, NULL, &name);
    if (retval != PAM_SUCCESS ) {
	if ( on(UNIX_DEBUG,ctrl) ) {
	    _log_err(LOG_DEBUG, "auth could not identify user");
	}
	return retval;
    }

    /* if this user does not have a password... */

    if ( _unix_blankpasswd(ctrl, name) ) {
	D(("user '%s' has blank passwd", name));
	name = NULL;
	return PAM_SUCCESS;
    }

    /* get this user's authentication token */

    retval = _unix_read_password(pamh, ctrl, NULL, "Password: ", NULL
				 , _UNIX_AUTHTOK, &p);
    if (retval != PAM_SUCCESS ) {
	_log_err(LOG_CRIT, "auth could not identify password for [%s]"
		 , name);
	name = NULL;
	return retval;
    }

    /* verify the password of this user */

    retval = _unix_verify_password(pamh, name, p, ctrl);
    name = p = NULL;

    return retval;
}

/*
 * This function is for setting unix credentials. Sun has indicated
 * that there are *NO* authentication credentials for unix. The
 * obvious credentials would be the group membership of the user as
 * listed in the /etc/group file. However, Sun indicates that it is
 * the responsibility of the application to set these.
 */

static int _unix_set_credentials(pam_handle_t *pamh, unsigned int ctrl)
{
    D(("called <empty function> returning."));

    return PAM_SUCCESS;
}

/********************************************************************
 * Copyright (c) Alexander O. Yuriev, 1996.
 * Copyright (c) Andrew G. Morgan <morgan@parc.power.net> 1996
 * Copyright (c) Cristian Gafton <gafton@redhat.com> 1996, 1997
 *
 * Redistribution and use in source and binary forms, with or without
 * modification, are permitted provided that the following conditions
 * are met:
 * 1. Redistributions of source code must retain the above copyright
 *    notice, and the entire permission notice in its entirety,
 *    including the disclaimer of warranties.
 * 2. Redistributions in binary form must reproduce the above copyright
 *    notice, this list of conditions and the following disclaimer in the
 *    documentation and/or other materials provided with the distribution.
 * 3. The name of the author may not be used to endorse or promote
 *    products derived from this software without specific prior
 *    written permission.
 * 
 * ALTERNATIVELY, this product may be distributed under the terms of
 * the GNU Public License, in which case the provisions of the GPL are
 * required INSTEAD OF the above restrictions.  (This clause is
 * necessary due to a potential bad interaction between the GPL and
 * the restrictions contained in a BSD-style copyright.)
 * 
 * THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED
 * WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
 * DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT,
 * INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
 * (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
 * SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
 * OF THE POSSIBILITY OF SUCH DAMAGE.
 */
 
OpenPOWER on IntegriCloud