diff options
Diffstat (limited to 'Linux-PAM/modules/pam_permit')
-rw-r--r-- | Linux-PAM/modules/pam_permit/Makefile | 15 | ||||
-rw-r--r-- | Linux-PAM/modules/pam_permit/README | 4 | ||||
-rw-r--r-- | Linux-PAM/modules/pam_permit/pam_permit.c | 112 |
3 files changed, 131 insertions, 0 deletions
diff --git a/Linux-PAM/modules/pam_permit/Makefile b/Linux-PAM/modules/pam_permit/Makefile new file mode 100644 index 00000000..23835be4 --- /dev/null +++ b/Linux-PAM/modules/pam_permit/Makefile @@ -0,0 +1,15 @@ +# +# $Id: Makefile,v 1.1.1.1 2001/04/29 04:17:26 hartmans Exp $ +# +# This Makefile controls a build process of $(TITLE) module for +# Linux-PAM. You should not modify this Makefile (unless you know +# what you are doing!). +# +# Created by Andrew Morgan <morgan@linux.kernel.org> 2000/08/27 +# + +include ../../Make.Rules + +TITLE=pam_permit + +include ../Simple.Rules diff --git a/Linux-PAM/modules/pam_permit/README b/Linux-PAM/modules/pam_permit/README new file mode 100644 index 00000000..15d95942 --- /dev/null +++ b/Linux-PAM/modules/pam_permit/README @@ -0,0 +1,4 @@ +# $Id: README,v 1.1.1.1 2001/04/29 04:17:26 hartmans Exp $ +# + +this module always returns PAM_SUCCESS, it ignores all options. diff --git a/Linux-PAM/modules/pam_permit/pam_permit.c b/Linux-PAM/modules/pam_permit/pam_permit.c new file mode 100644 index 00000000..1041ca84 --- /dev/null +++ b/Linux-PAM/modules/pam_permit/pam_permit.c @@ -0,0 +1,112 @@ +/* pam_permit module */ + +/* + * $Id: pam_permit.c,v 1.1.1.1 2001/04/29 04:17:26 hartmans Exp $ + * + * Written by Andrew Morgan <morgan@parc.power.net> 1996/3/11 + * + */ + +#define DEFAULT_USER "nobody" + +#include <stdio.h> + +/* + * here, we make definitions for the externally accessible functions + * in this file (these definitions are required for static modules + * but strongly encouraged generally) they are used to instruct the + * modules include file to define their prototypes. + */ + +#define PAM_SM_AUTH +#define PAM_SM_ACCOUNT +#define PAM_SM_SESSION +#define PAM_SM_PASSWORD + +#include <security/pam_modules.h> +#include <security/_pam_macros.h> + +/* --- authentication management functions --- */ + +PAM_EXTERN +int pam_sm_authenticate(pam_handle_t *pamh,int flags,int argc + ,const char **argv) +{ + int retval; + const char *user=NULL; + + /* + * authentication requires we know who the user wants to be + */ + retval = pam_get_user(pamh, &user, NULL); + if (retval != PAM_SUCCESS) { + D(("get user returned error: %s", pam_strerror(pamh,retval))); + return retval; + } + if (user == NULL || *user == '\0') { + D(("username not known")); + pam_set_item(pamh, PAM_USER, (const void *) DEFAULT_USER); + } + user = NULL; /* clean up */ + + return PAM_SUCCESS; +} + +PAM_EXTERN +int pam_sm_setcred(pam_handle_t *pamh,int flags,int argc + ,const char **argv) +{ + return PAM_SUCCESS; +} + +/* --- account management functions --- */ + +PAM_EXTERN +int pam_sm_acct_mgmt(pam_handle_t *pamh,int flags,int argc + ,const char **argv) +{ + return PAM_SUCCESS; +} + +/* --- password management --- */ + +PAM_EXTERN +int pam_sm_chauthtok(pam_handle_t *pamh,int flags,int argc + ,const char **argv) +{ + return PAM_SUCCESS; +} + +/* --- session management --- */ + +PAM_EXTERN +int pam_sm_open_session(pam_handle_t *pamh,int flags,int argc + ,const char **argv) +{ + return PAM_SUCCESS; +} + +PAM_EXTERN +int pam_sm_close_session(pam_handle_t *pamh,int flags,int argc + ,const char **argv) +{ + return PAM_SUCCESS; +} + +/* end of module definition */ + +#ifdef PAM_STATIC + +/* static module data */ + +struct pam_module _pam_permit_modstruct = { + "pam_permit", + pam_sm_authenticate, + pam_sm_setcred, + pam_sm_acct_mgmt, + pam_sm_open_session, + pam_sm_close_session, + pam_sm_chauthtok +}; + +#endif |