ProxyAuth
Linux PAM to authenticate device via Bluetooth device
|
#include <pwd.h>
#include <unistd.h>
#include <sys/types.h>
#include <security/pam_appl.h>
#include <security/pam_modules.h>
#include "pam_misc.h"
#include "pam_bt_misc.h"
Go to the source code of this file.
Macros | |
#define | DEAUTH "deauth" |
Functions | |
int | exec_deauth (char *bt_addr, const char *username, FILE *log_fp, const char *trusted_dir_path) |
#define DEAUTH "deauth" |
Definition at line 4 of file pam_post_auth.h.
int exec_deauth | ( | char * | bt_addr, |
const char * | username, | ||
FILE * | log_fp, | ||
const char * | trusted_dir_path | ||
) |
Once Authenticated, run the deauth background service
NOTE: exec replaces the child process. Memory mappings are not preservered on an exec() call so memory is reclaimed apparently. NOTE: will set the euid to be the user instead of root
bt_addr | the trusted bluetooth address we want to log in |
username | the user we want to run the program as (i.e. should be the username of the user who wishes to login) |
Definition at line 3 of file pam_post_auth.c.