17
|
1 extern crate pam; |
|
2 extern crate rand; |
|
3 |
|
4 pub mod ffi; |
|
5 |
|
6 use pam::module::{PamHandleT, get_item, get_user}; |
|
7 use pam::constants::{PamResultCode, PAM_PROMPT_ECHO_OFF}; |
|
8 use pam::conv::PamConv; |
|
9 use std::collections::HashMap; |
|
10 use std::time::Duration; |
|
11 use rand::Rng; |
|
12 use std::str::FromStr; |
|
13 |
|
14 macro_rules! pam_try { |
|
15 ($e:expr) => ( |
|
16 match $e { |
|
17 Ok(v) => v, |
|
18 Err(e) => return e, |
|
19 } |
|
20 ); |
|
21 ($e:expr, $err:expr) => ( |
|
22 match $e { |
|
23 Ok(v) => v, |
|
24 Err(e) => { |
|
25 println!("Error: {}", e); |
|
26 return $err; |
|
27 } |
|
28 } |
|
29 ); |
|
30 } |
|
31 |
|
32 // This function performs the task of authenticating the user. |
|
33 pub fn sm_authenticate(pamh: &PamHandleT, args: Vec<String>, silent: bool) -> PamResultCode { |
|
34 println!("Let's auth over HTTP"); |
|
35 |
|
36 /* TODO: use args to change difficulty ;-) |
|
37 let args: HashMap<&str, &str> = args.iter().map(|s| { |
|
38 let mut parts = s.splitn(2, "="); |
|
39 (parts.next().unwrap(), parts.next().unwrap_or("")) |
|
40 }).collect(); |
|
41 */ |
|
42 |
|
43 // TODO: maybe we can change difficulty base on user? |
|
44 // let user = pam_try!(get_user(&pamh, None)); |
|
45 |
|
46 let conv = match get_item::<PamConv>(&pamh) { |
|
47 Ok(conv) => conv, |
|
48 Err(err) => { |
|
49 println!("Couldn't get pam_conv"); |
|
50 return err; |
|
51 } |
|
52 }; |
|
53 |
|
54 let mut rng = rand::thread_rng(); |
|
55 let a = rng.gen::<u32>() % 100; |
|
56 let b = rng.gen::<u32>() % 100; |
|
57 let math = format!("{} + {} = ", a, b); |
|
58 |
|
59 // This println kinda helps debugging since the test script doesn't echo |
|
60 println!("{}", math); |
|
61 |
|
62 let password = pam_try!(conv.send(PAM_PROMPT_ECHO_OFF, &math)); |
|
63 |
|
64 if password.and_then(|p| u32::from_str(&p).ok()) == Some(a+b) { |
|
65 return PamResultCode::PAM_SUCCESS; |
|
66 } |
|
67 |
|
68 println!("You failed the PAM sobriety test."); |
|
69 return PamResultCode::PAM_AUTH_ERR; |
|
70 } |
|
71 |
|
72 // This function performs the task of altering the credentials of the user with respect to the |
|
73 // corresponding authorization scheme. Generally, an authentication module may have access to more |
|
74 // information about a user than their authentication token. This function is used to make such |
|
75 // information available to the application. It should only be called after the user has been |
|
76 // authenticated but before a session has been established. |
|
77 pub fn sm_setcred(_pamh: &PamHandleT, _args: Vec<String>, _silent: bool) -> PamResultCode { |
|
78 println!("set credentials"); |
|
79 PamResultCode::PAM_SUCCESS |
|
80 } |
|
81 |
|
82 // This function performs the task of establishing whether the user is permitted to gain access at |
|
83 // this time. It should be understood that the user has previously been validated by an |
|
84 // authentication module. This function checks for other things. Such things might be: the time of |
|
85 // day or the date, the terminal line, remote hostname, etc. This function may also determine |
|
86 // things like the expiration on passwords, and respond that the user change it before continuing. |
|
87 pub fn acct_mgmt(_pamh: &PamHandleT, _args: Vec<String>, _silent: bool) -> PamResultCode { |
|
88 println!("account management"); |
|
89 PamResultCode::PAM_SUCCESS |
|
90 } |