2 * Copyright (c) 2015 Nathan Holstein <nathan.holstein@gmail.com>
4 * Permission to use, copy, modify, and distribute this software for any
5 * purpose with or without fee is hereby granted, provided that the above
6 * copyright notice and this permission notice appear in all copies.
8 * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
9 * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
10 * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
11 * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
12 * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
13 * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
14 * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
17 #include <sys/types.h>
21 #include <readpassphrase.h>
26 #include <security/pam_appl.h>
30 #define PAM_SERVICE "sudo"
32 #define __UNUSED __attribute__ ((unused))
35 pam_prompt(const char *msg, int echo_on, int *pam)
37 char buf[PAM_MAX_RESP_SIZE];
38 int flags = RPP_REQUIRE_TTY | (echo_on ? RPP_ECHO_ON : RPP_ECHO_OFF);
39 char *ret = readpassphrase(msg, buf, sizeof(buf), flags);
42 else if (!(ret = strdup(ret)))
44 explicit_bzero(buf, sizeof(buf));
49 pam_conv(int nmsgs, const struct pam_message **msgs,
50 struct pam_response **rsps, __UNUSED void *ptr)
52 struct pam_response *rsp;
54 int pam = PAM_SUCCESS;
56 if (!(rsp = calloc(nmsgs, sizeof(struct pam_response))))
57 errx(1, "couldn't malloc pam_response");
60 for (i = 0; i < nmsgs; i++) {
61 switch (style = msgs[i]->msg_style) {
62 case PAM_PROMPT_ECHO_OFF:
63 case PAM_PROMPT_ECHO_ON:
64 rsp[i].resp = pam_prompt(msgs[i]->msg,
65 style == PAM_PROMPT_ECHO_ON, &pam);
70 if (fprintf(style == PAM_ERROR_MSG ? stderr : stdout,
71 "%s\n", msgs[i]->msg) < 0)
76 errx(1, "invalid PAM msg_style %d", style);
84 auth_userokay(char *name, char *style, char *type, char *password)
86 static const struct pam_conv conv = {
92 pam_handle_t *pamh = NULL;
96 if (style || type || password)
97 errx(1, "auth_userokay(name, NULL, NULL, NULL)!\n");
99 ret = pam_start(PAM_SERVICE, name, &conv, &pamh);
100 if (ret != PAM_SUCCESS)
101 errx(1, "pam_start(\"%s\", \"%s\", ?, ?): failed\n",
104 auth = pam_authenticate(pamh, 0);
106 ret = pam_close_session(pamh, 0);
107 if (ret != PAM_SUCCESS)
108 errx(1, "pam_close_session(): %s\n", pam_strerror(pamh, ret));
110 return auth == PAM_SUCCESS;