1 /* $NetBSD: pam_deny.c,v 1.4 2013/10/19 22:57:46 mrg Exp $ */
2
3 /*-
4 * Copyright 2001 Mark R V Murray
5 * All rights reserved.
6 *
7 * Redistribution and use in source and binary forms, with or without
8 * modification, are permitted provided that the following conditions
9 * are met:
10 * 1. Redistributions of source code must retain the above copyright
11 * notice, this list of conditions and the following disclaimer.
12 * 2. Redistributions in binary form must reproduce the above copyright
13 * notice, this list of conditions and the following disclaimer in the
14 * documentation and/or other materials provided with the distribution.
15 *
16 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
17 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
18 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
19 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
20 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
21 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
22 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
23 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
24 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
25 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
26 * SUCH DAMAGE.
27 */
28
29 #include <sys/cdefs.h>
30 #ifdef __FreeBSD__
31 __FBSDID("$FreeBSD: src/lib/libpam/modules/pam_deny/pam_deny.c,v 1.9 2002/04/12 22:27:19 des Exp $");
32 #else
33 __RCSID("$NetBSD: pam_deny.c,v 1.4 2013/10/19 22:57:46 mrg Exp $");
34 #endif
35
36 #include <stddef.h>
37 #include <string.h>
38 #include <syslog.h>
39
40 #define PAM_SM_AUTH
41 #define PAM_SM_ACCOUNT
42 #define PAM_SM_SESSION
43 #define PAM_SM_PASSWORD
44
45 #include <security/pam_appl.h>
46 #include <security/pam_modules.h>
47
48 PAM_EXTERN int
pam_sm_authenticate(pam_handle_t * pamh,int flags __unused,int argc __unused,const char * argv[]__unused)49 pam_sm_authenticate(pam_handle_t *pamh, int flags __unused,
50 int argc __unused, const char *argv[] __unused)
51 {
52 const char *user;
53 int r;
54
55 if ((r = pam_get_user(pamh, &user, NULL)) != PAM_SUCCESS)
56 return (r);
57
58 return (PAM_AUTH_ERR);
59 }
60
61 PAM_EXTERN int
pam_sm_setcred(pam_handle_t * pamh __unused,int flags __unused,int argc __unused,const char * argv[]__unused)62 pam_sm_setcred(pam_handle_t *pamh __unused, int flags __unused,
63 int argc __unused, const char *argv[] __unused)
64 {
65
66 return (PAM_CRED_ERR);
67 }
68
69 PAM_EXTERN int
pam_sm_acct_mgmt(pam_handle_t * pamh __unused,int flags __unused,int argc __unused,const char * argv[]__unused)70 pam_sm_acct_mgmt(pam_handle_t *pamh __unused, int flags __unused,
71 int argc __unused, const char *argv[] __unused)
72 {
73
74 return (PAM_AUTH_ERR);
75 }
76
77 PAM_EXTERN int
pam_sm_chauthtok(pam_handle_t * pamh __unused,int flags,int argc,const char * argv[])78 pam_sm_chauthtok(pam_handle_t *pamh __unused, int flags,
79 int argc, const char *argv[])
80 {
81 int prelim_ignore = 0;
82 int i;
83
84 for (i = 0; i < argc; i++) {
85 if (strcmp(argv[i], "prelim_ignore") == 0)
86 prelim_ignore = 1;
87 else if (strcmp(argv[i], "debug") == 0)
88 /* nothing */;
89 else
90 syslog(LOG_ERR, "illegal option %s", argv[i]);
91 }
92
93 if (flags & PAM_PRELIM_CHECK && prelim_ignore)
94 return (PAM_IGNORE);
95 else
96 return (PAM_AUTHTOK_ERR);
97 }
98
99 PAM_EXTERN int
pam_sm_open_session(pam_handle_t * pamh __unused,int flags __unused,int argc __unused,const char * argv[]__unused)100 pam_sm_open_session(pam_handle_t *pamh __unused, int flags __unused,
101 int argc __unused, const char *argv[] __unused)
102 {
103
104 return (PAM_SESSION_ERR);
105 }
106
107 PAM_EXTERN int
pam_sm_close_session(pam_handle_t * pamh __unused,int flags __unused,int argc __unused,const char * argv[]__unused)108 pam_sm_close_session(pam_handle_t *pamh __unused, int flags __unused,
109 int argc __unused, const char *argv[] __unused)
110 {
111
112 return (PAM_SESSION_ERR);
113 }
114
115 PAM_MODULE_ENTRY("pam_deny");
116