1
/* pam_permit module */
4
* $Id: pam_debug.c,v 1.1 2002/09/15 20:08:45 hartmans Exp $
6
* Written by Andrew Morgan <morgan@kernel.org> 2001/02/04
10
#define DEFAULT_USER "nobody"
15
* This module is intended as a debugging aide for determining how
16
* the PAM stack is operating.
18
* here, we make definitions for the externally accessible functions
19
* in this file (these definitions are required for static modules
20
* but strongly encouraged generally) they are used to instruct the
21
* modules include file to define their prototypes.
25
#define PAM_SM_ACCOUNT
26
#define PAM_SM_SESSION
27
#define PAM_SM_PASSWORD
29
#include <security/pam_modules.h>
30
#include <security/_pam_macros.h>
32
#define _PAM_ACTION_UNDEF (-10)
33
#include "../../libpam/pam_tokens.h"
35
/* --- authentication management functions --- */
37
static int state(pam_handle_t *pamh, const char *text)
40
struct pam_conv *conv;
41
struct pam_message msg[1], *mesg[1];
42
struct pam_response *response;
44
retval = pam_get_item(pamh, PAM_CONV, (const void **)&conv);
45
if ((retval != PAM_SUCCESS) || (conv == NULL)) {
46
D(("failed to obtain conversation function"));
50
msg[0].msg_style = PAM_TEXT_INFO;
54
retval = conv->conv(1, (const struct pam_message **) mesg,
55
&response, conv->appdata_ptr);
56
if (retval != PAM_SUCCESS) {
57
D(("conversation failed"));
63
static int parse_args(int retval, const char *event,
64
pam_handle_t *pamh, int argc, const char **argv)
68
for (i=0; i<argc; ++i) {
69
int length = strlen(event);
70
if (!strncmp(event, argv[i], length) && (argv[i][length] == '=')) {
72
const char *return_string = argv[i] + (length+1);
74
for (j=0; j<_PAM_RETURN_VALUES; ++j) {
75
if (!strcmp(return_string, _pam_token_returns[j])) {
89
int pam_sm_authenticate(pam_handle_t *pamh, int flags, int argc,
93
const char *user=NULL;
96
* authentication requires we know who the user wants to be
98
retval = pam_get_user(pamh, &user, NULL);
99
if (retval != PAM_SUCCESS) {
100
D(("get user returned error: %s", pam_strerror(pamh,retval)));
103
if (user == NULL || *user == '\0') {
104
D(("username not known"));
105
pam_set_item(pamh, PAM_USER, (const void *) DEFAULT_USER);
107
user = NULL; /* clean up */
109
retval = parse_args(PAM_SUCCESS, "auth", pamh, argc, argv);
115
int pam_sm_setcred(pam_handle_t *pamh, int flags, int argc,
118
return parse_args(PAM_SUCCESS, "cred", pamh, argc, argv);
121
/* --- account management functions --- */
124
int pam_sm_acct_mgmt(pam_handle_t *pamh, int flags, int argc,
127
return parse_args(PAM_SUCCESS, "acct", pamh, argc, argv);
130
/* --- password management --- */
133
int pam_sm_chauthtok(pam_handle_t *pamh, int flags, int argc,
136
if (flags & PAM_PRELIM_CHECK) {
137
return parse_args(PAM_SUCCESS, "prechauthtok", pamh, argc, argv);
139
return parse_args(PAM_SUCCESS, "chauthtok", pamh, argc, argv);
143
/* --- session management --- */
146
int pam_sm_open_session(pam_handle_t *pamh,int flags,int argc,
149
return parse_args(PAM_SUCCESS, "open_session", pamh, argc, argv);
153
int pam_sm_close_session(pam_handle_t *pamh,int flags,int argc
156
return parse_args(PAM_SUCCESS, "close_session", pamh, argc, argv);
159
/* end of module definition */
163
/* static module data */
165
struct pam_module _pam_permit_modstruct = {
171
pam_sm_close_session,