ProxyAuth
Linux PAM to authenticate device via Bluetooth device
|
#include "pam_post_auth.h"
Go to the source code of this file.
Functions | |
int | exec_deauth (char *bt_addr, const char *username, FILE *log_fp, const char *trusted_dir_path) |
int exec_deauth | ( | char * | bt_addr, |
const char * | username, | ||
FILE * | log_fp, | ||
const char * | trusted_dir_path | ||
) |
Once Authenticated, run the deauth background service
NOTE: exec replaces the child process. Memory mappings are not preservered on an exec() call so memory is reclaimed apparently. NOTE: will set the euid to be the user instead of root
bt_addr | the trusted bluetooth address we want to log in |
username | the user we want to run the program as (i.e. should be the username of the user who wishes to login) |
Definition at line 3 of file pam_post_auth.c.