1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129
|
/******************************************************************************
*
* Rpam Copyright (c) 2008 Andre Osti de Moura <andreoandre@gmail.com>
*
* This program is free software; you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation; either version 2 of the License, or
* (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program; if not, write to the Free Software
* Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
*
* A full copy of the GNU license is provided in the file LICENSE.
*
*******************************************************************************/
#include "ruby.h"
#include <security/pam_appl.h>
typedef struct {
char *name, *pw;
} pam_auth_t;
VALUE Rpam;
VALUE Rpam_Ext;
void Init_rpam_ext();
/*
* auth_pam_talker: supply authentication information to PAM when asked
*
* Assumptions:
* A password is asked for by requesting input without echoing
* A username is asked for by requesting input _with_ echoing
*
*/
static
int auth_pam_talker(int num_msg,
const struct pam_message ** msg,
struct pam_response ** resp,
void *appdata_ptr)
{
unsigned short i = 0;
pam_auth_t *userinfo = (pam_auth_t *) appdata_ptr;
struct pam_response *response = 0;
/* parameter sanity checking */
if (!resp || !msg || !userinfo)
return PAM_CONV_ERR;
/* allocate memory to store response */
response = malloc(num_msg * sizeof(struct pam_response));
if (!response)
return PAM_CONV_ERR;
/* copy values */
for (i = 0; i < num_msg; i++) {
/* initialize to safe values */
response[i].resp_retcode = 0;
response[i].resp = 0;
/* select response based on requested output style */
switch (msg[i]->msg_style) {
case PAM_PROMPT_ECHO_ON:
/* on memory allocation failure, auth fails */
response[i].resp = strdup(userinfo->name);
break;
case PAM_PROMPT_ECHO_OFF:
response[i].resp = strdup(userinfo->pw);
break;
default:
if (response)
free(response);
return PAM_CONV_ERR;
}
}
/* everything okay, set PAM response values */
*resp = response;
return PAM_SUCCESS;
}
/* Authenticates a user and returns TRUE on success, FALSE on failure */
VALUE method_authpam(VALUE self, VALUE username, VALUE password, VALUE servicename) {
char* rpam_servicename;
pam_auth_t userinfo = {NULL, NULL};
struct pam_conv conv_info = {&auth_pam_talker, (void *) &userinfo};
pam_handle_t *pamh = NULL;
int result;
rpam_servicename = StringValuePtr(servicename);
userinfo.name = StringValuePtr(username);
userinfo.pw = StringValuePtr(password);
if ((result = pam_start(rpam_servicename, userinfo.name, &conv_info, &pamh))
!= PAM_SUCCESS) {
return Qfalse;
}
if ((result = pam_authenticate(pamh, PAM_DISALLOW_NULL_AUTHTOK))
!= PAM_SUCCESS) {
pam_end(pamh, PAM_SUCCESS);
return Qfalse;
}
if ((result = pam_acct_mgmt(pamh, PAM_DISALLOW_NULL_AUTHTOK))
!= PAM_SUCCESS) {
pam_end(pamh, PAM_SUCCESS);
return Qfalse;
}
pam_end(pamh, PAM_SUCCESS);
return Qtrue;
}
/* initialize */
void Init_rpam_ext() {
Rpam = rb_define_module("Rpam");
Rpam_Ext = rb_define_module_under(Rpam, "Ext");
rb_define_singleton_method(Rpam_Ext, "authpam", method_authpam, 3);
}
|