summaryrefslogtreecommitdiff
path: root/go/parabola_hackers/nslcd_backend/db_pam.go
diff options
context:
space:
mode:
Diffstat (limited to 'go/parabola_hackers/nslcd_backend/db_pam.go')
-rw-r--r--go/parabola_hackers/nslcd_backend/db_pam.go17
1 files changed, 9 insertions, 8 deletions
diff --git a/go/parabola_hackers/nslcd_backend/db_pam.go b/go/parabola_hackers/nslcd_backend/db_pam.go
index f770cc1..0538e70 100644
--- a/go/parabola_hackers/nslcd_backend/db_pam.go
+++ b/go/parabola_hackers/nslcd_backend/db_pam.go
@@ -1,4 +1,4 @@
-// Copyright 2015-2016 Luke Shumaker <lukeshu@sbcglobal.net>.
+// Copyright 2015-2016 Luke Shumaker <git.lukeshu@sbcglobal>.
//
// This is free software; you can redistribute it and/or
// modify it under the terms of the GNU General Public License as
@@ -20,11 +20,12 @@ import (
"fmt"
"os"
"parabola_hackers"
- s "syscall"
- "lukeshu.com/git/go/libgnulinux.git/crypt"
- p "lukeshu.com/git/go/libnslcd.git/proto"
- "lukeshu.com/git/go/libsystemd.git/sd_daemon/logger"
+ s "golang.org/x/sys/unix"
+ p "git.lukeshu.com/go/libnslcd/nslcd_proto"
+
+ "git.lukeshu.com/go/libgnulinux/crypt"
+ "git.lukeshu.com/go/libsystemd/sd_daemon"
)
func checkPassword(password string, hash string) bool {
@@ -36,7 +37,7 @@ func hashPassword(newPassword string, oldHash string) string {
if salt == "!" {
str, err := parabola_hackers.RandomString(crypt.SaltAlphabet, 8)
if err != nil {
- logger.Err("Could not generate a random string")
+ sd_daemon.Log.Err("Could not generate a random string")
str = ""
}
salt = "$6$" + str + "$"
@@ -174,7 +175,7 @@ func (o *Hackers) PAM_PwMod(cred s.Ucred, req p.Request_PAM_PwMod) <-chan p.PAM_
// Update the PwHash in memory
user.Passwd.PwHash = hashPassword(req.NewPassword, user.Passwd.PwHash)
if len(user.Passwd.PwHash) == 0 {
- logger.Err("Password hashing failed")
+ sd_daemon.Log.Err("Password hashing failed")
return
}
@@ -186,7 +187,7 @@ func (o *Hackers) PAM_PwMod(cred s.Ucred, req p.Request_PAM_PwMod) <-chan p.PAM_
passwords[user.Passwd.Name] = user.Passwd.PwHash
err := parabola_hackers.SaveAllPasswords(passwords)
if err != nil {
- logger.Err("Writing passwords to disk: %v", err)
+ sd_daemon.Log.Err(fmt.Sprintf("Writing passwords to disk: %v", err))
return
}