2 * Copyright 1998 Juniper Networks, Inc.
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
8 * 1. Redistributions of source code must retain the above copyright
9 * notice, this list of conditions and the following disclaimer.
10 * 2. Redistributions in binary form must reproduce the above copyright
11 * notice, this list of conditions and the following disclaimer in the
12 * documentation and/or other materials provided with the distribution.
14 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
15 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
16 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
17 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
18 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
19 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
20 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
21 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
22 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
23 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
26 * $FreeBSD: src/lib/libpam/modules/pam_kerberosIV/pam_kerberosIV.c,v 1.4.2.2 2002/07/06 14:14:06 des Exp $
27 * $DragonFly: src/lib/libpam/modules/pam_kerberosIV/Attic/pam_kerberosIV.c,v 1.2 2003/06/17 04:26:50 dillon Exp $
30 #include <sys/param.h>
37 #include <security/pam_modules.h>
39 #include <security/pam_mod_misc.h>
41 #define PASSWORD_PROMPT "Password:"
43 extern int klogin(struct passwd *, char *, char *, char *);
45 /* Globals used by klogin.c */
47 int noticketsdontcomplain = 1;
51 pam_sm_authenticate(pam_handle_t *pamh, int flags, int argc,
54 struct options options;
60 char localhost[MAXHOSTNAMELEN + 1];
64 pam_std_option(&options, NULL, argc, argv);
65 if ((retval = pam_get_user(pamh, &user, NULL)) != PAM_SUCCESS)
67 if ((retval = pam_get_pass(pamh, &password, PASSWORD_PROMPT,
68 &options)) != PAM_SUCCESS)
70 if (gethostname(localhost, sizeof localhost - 1) == -1)
71 return PAM_SYSTEM_ERR;
72 if ((principal = strdup(user)) == NULL)
74 if ((instance = strchr(principal, '.')) != NULL)
78 if ((pwd = getpwnam(user)) != NULL &&
79 klogin(pwd, instance, localhost, (char *)password) == 0) {
80 if (!(flags & PAM_SILENT) && notickets &&
81 !noticketsdontcomplain)
82 pam_prompt(pamh, PAM_ERROR_MSG,
83 "Warning: no Kerberos tickets issued", NULL);
85 * XXX - I think the ticket file really isn't supposed to
86 * be even created until pam_sm_setcred() is called.
88 if (krbtkfile_env != NULL)
89 setenv("KRBTKFILE", krbtkfile_env, 1);
92 retval = PAM_AUTH_ERR;
94 * The PAM infrastructure will obliterate the cleartext
95 * password before returning to the application.
102 pam_sm_setcred(pam_handle_t *pamh, int flags, int argc, const char **argv)
107 PAM_MODULE_ENTRY("pam_kerberosIV");