-
Notifications
You must be signed in to change notification settings - Fork 0
/
pam_pcsc_cr.c
253 lines (219 loc) · 6.03 KB
/
pam_pcsc_cr.c
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
/*
Copyright (c) 2013 Eugene Crosser
This software is provided 'as-is', without any express or implied
warranty. In no event will the authors be held liable for any damages
arising from the use of this software.
Permission is granted to anyone to use this software for any purpose,
including commercial applications, and to alter it and redistribute it
freely, subject to the following restrictions:
1. The origin of this software must not be misrepresented; you must
not claim that you wrote the original software. If you use this
software in a product, an acknowledgment in the product documentation
would be appreciated but is not required.
2. Altered source versions must be plainly marked as such, and must
not be misrepresented as being the original software.
3. This notice may not be removed or altered from any source
distribution.
*/
#ifdef HAVE_CONFIG_H
# include "config.h"
#endif
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <unistd.h>
#include <errno.h>
#include <stdarg.h>
#include <syslog.h>
#include "authobj.h"
#include "authfile.h"
#include "pcsc_cr.h"
#ifndef PIC
# define PAM_STATIC
#endif
#define PAM_SM_AUTH
#ifdef HAVE_SECURITY_PAM_APPL_H
# include <security/pam_appl.h>
#endif
#ifdef HAVE_SECURITY_PAM_MODULES_H
# include <security/pam_modules.h>
#endif
#ifdef HAVE_SECURITY_PAM_EXT_H
# include <security/pam_ext.h>
#endif
#ifndef PAM_EXTERN
# ifdef PAM_STATIC
# define PAM_EXTERN static
# else
# define PAM_EXTERN extern
# endif
#endif
struct _cfg {
int noaskpass;
int verbose;
int injectauth;
};
#ifndef HAVE_PAM_GET_AUTHTOK
static int pam_get_authtok(pam_handle_t *pamh, int item, const char **authtok,
const char *prompt)
{
struct _cfg dfl_cfg = {0};
struct _cfg *cfg = &dfl_cfg;
struct pam_conv *conv;
struct pam_message msg;
const struct pam_message *msgp;
struct pam_response *resp;
int pam_err;
(void)pam_get_data(pamh, "pcsc_cr_cfg_struct", (const void **)&cfg);
if ((pam_err = pam_get_item(pamh, PAM_AUTHTOK,
(const void **)authtok))) {
if (cfg->verbose) syslog(LOG_ERR,
"get_item(PAM_AUTHTOK) failed: %s",
pam_strerror(pamh, pam_err));
} else {
if (*authtok) return PAM_SUCCESS;
}
if ((pam_err = pam_get_item(pamh, PAM_CONV,
(const void **)&conv))) {
if (cfg->verbose) syslog(LOG_ERR,
"get_item(PAM_CONV) failed: %s",
pam_strerror(pamh, pam_err));
return pam_err;
}
msg.msg_style = PAM_PROMPT_ECHO_OFF;
msg.msg = prompt;
msgp = &msg;
resp = NULL;
pam_err = (*conv->conv)(1, &msgp, &resp, conv->appdata_ptr);
if (resp != NULL) {
if (pam_err == PAM_SUCCESS) *authtok = resp->resp;
else free(resp->resp);
free(resp);
}
return pam_err;
}
#endif
static struct _auth_chunk
token_key(const unsigned char *challenge, const size_t challengesize)
{
struct _auth_chunk ho = {0};
long rc;
size_t keysize = sizeof(ho.data);
if ((rc = pcsc_cr(challenge, challengesize, ho.data, &keysize))) {
ho.err = pcsc_errstr(rc);
}
return ho;
}
static void update_nonce(char *nonce, const size_t nonsize)
{
int n = 0;
sscanf(nonce, "%d", &n);
snprintf(nonce, nonsize, "%d", n+1);
}
void parse_cfg(struct _cfg * const cfg, int argc, const char *argv[])
{
int i;
for (i = 0; i < argc; i++) {
if (strchr(argv[i],':') && strchr(argv[i],'=')) {
if (pcsc_option(argv[i]))
syslog(LOG_ERR,
"unrecognized pcsc backedn option \"%s\"",
argv[i]);
} else if (!strcmp(argv[i], "verbose")) cfg->verbose = 1;
else if (!strcmp(argv[i], "noaskpass")) cfg->noaskpass = 1;
else if (!strcmp(argv[i], "injectauth")) cfg->injectauth = 1;
else if (!strncmp(argv[i], "path=", 5))
authfile_template(argv[i]+5);
else syslog(LOG_ERR, "unrecognized arg: \"%s\"", argv[i]);
if (cfg->verbose) syslog(LOG_DEBUG, "arg: \"%s\"", argv[i]);
}
}
PAM_EXTERN int
pam_sm_authenticate(pam_handle_t *pamh, int flags,
int argc, const char *argv[])
{
struct _cfg cfg = {0};
const char *user;
const char *password;
struct _auth_obj ao;
int pam_err;
parse_cfg(&cfg, argc, argv);
(void)pam_set_data(pamh, "pcsc_cr_cfg_struct", &cfg, NULL);
if (cfg.verbose) syslog(LOG_INFO, "auth with %s", PACKAGE_STRING);
if ((pam_err = pam_get_user(pamh, &user, NULL)) != PAM_SUCCESS) {
if (cfg.verbose) syslog(LOG_ERR, "get_user failed: %s",
pam_strerror(pamh, pam_err));
return pam_err;
}
if (cfg.verbose) syslog(LOG_DEBUG, "user=\"%s\"", user?user:"<none>");
if (!cfg.noaskpass) {
if ((pam_err = pam_get_authtok(pamh, PAM_AUTHTOK,
(const char **)&password,
"Token password:"))) {
if (cfg.verbose) syslog(LOG_ERR,
"get_authtok failed: %s",
pam_strerror(pamh, pam_err));
return pam_err;
}
} else {
password = "";
}
ao = authfile(user, password, update_nonce,
NULL, (size_t)0, NULL, (size_t)0, token_key);
if (ao.err) {
if (cfg.verbose) syslog(LOG_INFO, "authfile: %s", ao.err);
return PAM_AUTH_ERR;
} else {
/* Just because we can. Probably not much use for that. */
/* Userid written in authfile may differ from the login one. */
pam_set_item(pamh, PAM_USER, ao.data);
if (cfg.injectauth && ao.payload && ao.payload[0])
pam_set_item(pamh, PAM_AUTHTOK, ao.payload);
if (cfg.verbose) syslog(LOG_DEBUG, "authenticated");
return PAM_SUCCESS;
}
}
PAM_EXTERN int
pam_sm_setcred(pam_handle_t *pamh, int flags,
int argc, const char *argv[])
{
return PAM_SUCCESS;
}
PAM_EXTERN int
pam_sm_acct_mgmt(pam_handle_t *pamh, int flags,
int argc, const char *argv[])
{
return PAM_SUCCESS;
}
PAM_EXTERN int
pam_sm_open_session(pam_handle_t *pamh, int flags,
int argc, const char *argv[])
{
return PAM_SUCCESS;
}
PAM_EXTERN int
pam_sm_close_session(pam_handle_t *pamh, int flags,
int argc, const char *argv[])
{
return PAM_SUCCESS;
}
PAM_EXTERN int
pam_sm_chauthtok(pam_handle_t *pamh, int flags,
int argc, const char *argv[])
{
return PAM_SERVICE_ERR;
}
#ifdef PAM_MODULE_ENTRY
PAM_MODULE_ENTRY("pam_pcsc_cr");
#endif
#ifdef PAM_STATIC
struct pam_module _pam_pcsc_cr_modstruct = {
"pam_pcsc_cr",
pam_sm_authenticate,
pam_sm_setcred,
pam_sm_acct_mgmt,
pam_sm_open_session,
pam_sm_close_session,
pam_sm_chauthtok
};
#endif