diff options
author | stevel@tonic-gate <none@none> | 2005-06-14 00:00:00 -0700 |
---|---|---|
committer | stevel@tonic-gate <none@none> | 2005-06-14 00:00:00 -0700 |
commit | 7c478bd95313f5f23a4c958a745db2134aa03244 (patch) | |
tree | c871e58545497667cbb4b0a4f2daf204743e1fe7 /usr/src/lib/pam_modules/ldap/ldap_authenticate.c | |
download | illumos-gate-7c478bd95313f5f23a4c958a745db2134aa03244.tar.gz |
OpenSolaris Launch
Diffstat (limited to 'usr/src/lib/pam_modules/ldap/ldap_authenticate.c')
-rw-r--r-- | usr/src/lib/pam_modules/ldap/ldap_authenticate.c | 136 |
1 files changed, 136 insertions, 0 deletions
diff --git a/usr/src/lib/pam_modules/ldap/ldap_authenticate.c b/usr/src/lib/pam_modules/ldap/ldap_authenticate.c new file mode 100644 index 0000000000..865988852f --- /dev/null +++ b/usr/src/lib/pam_modules/ldap/ldap_authenticate.c @@ -0,0 +1,136 @@ +/* + * CDDL HEADER START + * + * The contents of this file are subject to the terms of the + * Common Development and Distribution License, Version 1.0 only + * (the "License"). You may not use this file except in compliance + * with the License. + * + * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE + * or http://www.opensolaris.org/os/licensing. + * See the License for the specific language governing permissions + * and limitations under the License. + * + * When distributing Covered Code, include this CDDL HEADER in each + * file and include the License file at usr/src/OPENSOLARIS.LICENSE. + * If applicable, add the following below this CDDL HEADER, with the + * fields enclosed by brackets "[]" replaced with your own identifying + * information: Portions Copyright [yyyy] [name of copyright owner] + * + * CDDL HEADER END + */ +/* + * Copyright 2004 Sun Microsystems, Inc. All rights reserved. + * Use is subject to license terms. + */ + +#pragma ident "%Z%%M% %I% %E% SMI" + +#include "ldap_headers.h" + +/* + * + * LDAP module for pam_sm_authenticate. + * + * options - + * + * debug + * nowarn + */ + +/* + * pam_sm_authenticate(): + * Authenticate user. + */ +/*ARGSUSED*/ +int +pam_sm_authenticate( + pam_handle_t *pamh, + int flags, + int argc, + const char **argv) +{ + char *service = NULL; + char *user = NULL; + int err; + int result = PAM_AUTH_ERR; + int debug = 0; + int i; + char *password = NULL; + ns_cred_t *credp = NULL; + int nowarn = 0; + + /* Get the service and user */ + if ((err = pam_get_item(pamh, PAM_SERVICE, (void **)&service)) + != PAM_SUCCESS || + (err = pam_get_item(pamh, PAM_USER, (void **)&user)) != PAM_SUCCESS) + return (err); + + /* + * Check options passed to this module. + * Silently ignore try_first_pass and use_first_pass options + * for the time being. + */ + for (i = 0; i < argc; i++) { + if (strcmp(argv[i], "debug") == 0) + debug = 1; + else if (strcmp(argv[i], "nowarn") == 0) + nowarn = 1; + else if ((strcmp(argv[i], "try_first_pass") != 0) && + (strcmp(argv[i], "use_first_pass") != 0)) + syslog(LOG_AUTH | LOG_DEBUG, + "ldap pam_sm_authenticate(%s), " + "illegal scheme option %s", service, argv[i]); + } + + if (debug) + syslog(LOG_AUTH | LOG_DEBUG, + "ldap pam_sm_authenticate(%s %s), flags = %x %s", + service, (user && *user != '\0')?user:"no-user", flags, + (nowarn)? ", nowarn": ""); + + if (!user || *user == '\0') + return (PAM_USER_UNKNOWN); + + /* Get the password entered in the first scheme if any */ + (void) pam_get_item(pamh, PAM_AUTHTOK, (void **) &password); + if (password == NULL) { + if (debug) + syslog(LOG_AUTH | LOG_DEBUG, + "ldap pam_sm_authenticate(%s %s), " + "AUTHTOK not set", service, user); + return (PAM_AUTH_ERR); + } + + /* + * Authenticate user using the password from PAM_AUTHTOK. + * If no password available or if authentication fails + * return the appropriate error. + */ + result = authenticate(&credp, user, password, NULL); + if (result == PAM_NEW_AUTHTOK_REQD) { + /* + * PAM_NEW_AUTHTOK_REQD means the + * user's password is good but needs + * to change immediately. If the service + * is login or similar programs, the + * user will be asked to change the + * password after the account management + * module is called and determined that + * the password has expired. + * So change the rc to PAM_SUCCESS here. + */ + result = PAM_SUCCESS; + } else if (result == PAM_AUTHTOK_EXPIRED) { + /* + * Authentication token is the right one but + * expired. Consider this as pass. + * Change rc to PAM_SUCCESS. + */ + result = PAM_SUCCESS; + } + + if (credp != NULL) + (void) __ns_ldap_freeCred(&credp); + return (result); +} |