15331Samw /*
25331Samw * CDDL HEADER START
35331Samw *
45331Samw * The contents of this file are subject to the terms of the
55331Samw * Common Development and Distribution License (the "License").
65331Samw * You may not use this file except in compliance with the License.
75331Samw *
85331Samw * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
95331Samw * or http://www.opensolaris.org/os/licensing.
105331Samw * See the License for the specific language governing permissions
115331Samw * and limitations under the License.
125331Samw *
135331Samw * When distributing Covered Code, include this CDDL HEADER in each
145331Samw * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
155331Samw * If applicable, add the following below this CDDL HEADER, with the
165331Samw * fields enclosed by brackets "[]" replaced with your own identifying
175331Samw * information: Portions Copyright [yyyy] [name of copyright owner]
185331Samw *
195331Samw * CDDL HEADER END
205331Samw */
215331Samw /*
226030Sjb150015 * Copyright 2008 Sun Microsystems, Inc. All rights reserved.
235331Samw * Use is subject to license terms.
245331Samw */
255331Samw
265331Samw #pragma ident "%Z%%M% %I% %E% SMI"
275331Samw
285331Samw #include <sys/types.h>
295331Samw #include <sys/varargs.h>
305331Samw #include <string.h>
315331Samw #include <syslog.h>
325331Samw #include <stdlib.h>
335331Samw
345331Samw #include <security/pam_appl.h>
355331Samw #include <security/pam_modules.h>
365331Samw #include <security/pam_impl.h>
375331Samw
385331Samw #include <libintl.h>
395331Samw #include <passwdutil.h>
405331Samw
415331Samw #include <smbsrv/libsmb.h>
425331Samw
435331Samw /*PRINTFLIKE3*/
445331Samw static void
error(boolean_t nowarn,pam_handle_t * pamh,char * fmt,...)455331Samw error(boolean_t nowarn, pam_handle_t *pamh, char *fmt, ...)
465331Samw {
475331Samw va_list ap;
485331Samw char message[PAM_MAX_MSG_SIZE];
495331Samw
505331Samw if (nowarn)
515331Samw return;
525331Samw
535331Samw va_start(ap, fmt);
545331Samw (void) vsnprintf(message, sizeof (message), fmt, ap);
555331Samw (void) __pam_display_msg(pamh, PAM_ERROR_MSG, 1, &message,
565331Samw NULL);
575331Samw va_end(ap);
585331Samw }
595331Samw
605331Samw /*PRINTFLIKE3*/
615331Samw static void
info(boolean_t nowarn,pam_handle_t * pamh,char * fmt,...)625331Samw info(boolean_t nowarn, pam_handle_t *pamh, char *fmt, ...)
635331Samw {
645331Samw va_list ap;
655331Samw char message[PAM_MAX_MSG_SIZE];
665331Samw
675331Samw if (nowarn)
685331Samw return;
695331Samw
705331Samw va_start(ap, fmt);
715331Samw (void) vsnprintf(message, sizeof (message), fmt, ap);
725331Samw (void) __pam_display_msg(pamh, PAM_TEXT_INFO, 1, &message,
735331Samw NULL);
745331Samw va_end(ap);
755331Samw }
765331Samw
775331Samw int
pam_sm_chauthtok(pam_handle_t * pamh,int flags,int argc,const char ** argv)785331Samw pam_sm_chauthtok(pam_handle_t *pamh, int flags, int argc, const char **argv)
795331Samw {
805331Samw boolean_t debug = B_FALSE;
815331Samw boolean_t nowarn = B_FALSE;
825331Samw pwu_repository_t files_rep;
835331Samw char *user, *local_user;
845331Samw char *newpw;
855331Samw char *service;
865331Samw int privileged;
875331Samw int res;
885331Samw int i;
895331Samw
905331Samw for (i = 0; i < argc; i++) {
915331Samw if (strcmp(argv[i], "debug") == 0)
925331Samw debug = B_TRUE;
935331Samw else if (strcmp(argv[i], "nowarn") == 0)
945331Samw nowarn = B_TRUE;
955331Samw }
965331Samw
975331Samw if ((flags & PAM_PRELIM_CHECK) != 0)
985331Samw return (PAM_IGNORE);
995331Samw
1005331Samw if ((flags & PAM_UPDATE_AUTHTOK) == 0)
1015331Samw return (PAM_SYSTEM_ERR);
1025331Samw
1035331Samw if ((flags & PAM_SILENT) != 0)
1045331Samw nowarn = B_TRUE;
1055331Samw
1065331Samw if (debug)
1075331Samw __pam_log(LOG_AUTH | LOG_DEBUG,
1085331Samw "pam_smb_passwd: storing authtok");
1095331Samw
1105331Samw (void) pam_get_item(pamh, PAM_SERVICE, (void **)&service);
1115331Samw (void) pam_get_item(pamh, PAM_USER, (void **)&user);
1125331Samw
1135331Samw if (user == NULL || *user == '\0') {
1145331Samw __pam_log(LOG_AUTH | LOG_ERR,
1155331Samw "pam_smb_passwd: username is empty");
1165331Samw return (PAM_USER_UNKNOWN);
1175331Samw }
1185331Samw
1195331Samw (void) pam_get_item(pamh, PAM_AUTHTOK, (void **)&newpw);
1205331Samw if (newpw == NULL) {
1215331Samw /*
1225331Samw * A module on the stack has removed PAM_AUTHTOK. We fail
1235331Samw */
1245331Samw return (PAM_AUTHTOK_ERR);
1255331Samw }
1265331Samw
1275331Samw /* Check to see if this is a local user */
1285331Samw files_rep.type = "files";
1295331Samw files_rep.scope = NULL;
1305331Samw files_rep.scope_len = 0;
1315331Samw res = __user_to_authenticate(user, &files_rep, &local_user,
1325331Samw &privileged);
1335331Samw if (res != PWU_SUCCESS) {
1345331Samw switch (res) {
1355331Samw case PWU_NOT_FOUND:
1365331Samw /* if not a local user, ignore */
1375331Samw if (debug) {
1385331Samw __pam_log(LOG_AUTH | LOG_DEBUG,
1395331Samw "pam_smb_passwd: %s is not local", user);
1405331Samw }
1415331Samw return (PAM_IGNORE);
1425331Samw case PWU_DENIED:
1435331Samw return (PAM_PERM_DENIED);
1445331Samw }
1455331Samw return (PAM_SYSTEM_ERR);
1465331Samw }
1475331Samw
148*7052Samw smb_pwd_init(B_FALSE);
1496030Sjb150015
1505331Samw res = smb_pwd_setpasswd(user, newpw);
1515331Samw
1526030Sjb150015 smb_pwd_fini();
1536030Sjb150015
1545331Samw /*
1555331Samw * now map the various return states to user messages
1565331Samw * and PAM return codes.
1575331Samw */
1585331Samw switch (res) {
1595331Samw case SMB_PWE_SUCCESS:
1605331Samw info(nowarn, pamh, dgettext(TEXT_DOMAIN,
1615331Samw "%s: SMB password successfully changed for %s"),
1625331Samw service, user);
1635331Samw return (PAM_SUCCESS);
1645331Samw
1655331Samw case SMB_PWE_STAT_FAILED:
1665331Samw __pam_log(LOG_AUTH | LOG_ERR,
1675331Samw "%s: stat of SMB password file failed", service);
1685331Samw return (PAM_SYSTEM_ERR);
1695331Samw
1705331Samw case SMB_PWE_OPEN_FAILED:
1715331Samw case SMB_PWE_WRITE_FAILED:
1725331Samw case SMB_PWE_CLOSE_FAILED:
1735331Samw case SMB_PWE_UPDATE_FAILED:
1745331Samw error(nowarn, pamh, dgettext(TEXT_DOMAIN,
1755331Samw "%s: Unexpected failure. SMB password database unchanged."),
1765331Samw service);
1775331Samw return (PAM_SYSTEM_ERR);
1785331Samw
1795331Samw case SMB_PWE_BUSY:
1805331Samw error(nowarn, pamh, dgettext(TEXT_DOMAIN,
1815331Samw "%s: SMB password database busy. Try again later."),
1825331Samw service);
1835331Samw
1845331Samw return (PAM_AUTHTOK_LOCK_BUSY);
1855331Samw
1865331Samw case SMB_PWE_USER_UNKNOWN:
1875331Samw error(nowarn, pamh, dgettext(TEXT_DOMAIN,
1885331Samw "%s: %s does not exist."), service, user);
1895331Samw return (PAM_USER_UNKNOWN);
1905331Samw
1915331Samw case SMB_PWE_USER_DISABLE:
1925331Samw error(nowarn, pamh, dgettext(TEXT_DOMAIN,
1935331Samw "%s: %s is disable. SMB password database unchanged."),
1945331Samw service, user);
1955331Samw return (PAM_IGNORE);
1965331Samw
1975331Samw case SMB_PWE_DENIED:
1985331Samw return (PAM_PERM_DENIED);
1995331Samw
2005331Samw default:
2015331Samw res = PAM_SYSTEM_ERR;
2025331Samw break;
2035331Samw }
2045331Samw
2055331Samw return (res);
2065331Samw }
207