ProxyAuth
Linux PAM to authenticate device via Bluetooth device
Macros | Functions
pam_post_auth.h File Reference
#include <pwd.h>
#include <unistd.h>
#include <sys/types.h>
#include <security/pam_appl.h>
#include <security/pam_modules.h>
#include "pam_misc.h"
#include "pam_bt_misc.h"
Include dependency graph for pam_post_auth.h:
This graph shows which files directly or indirectly include this file:

Go to the source code of this file.

Macros

#define DEAUTH   "deauth"
 

Functions

int exec_deauth (char *bt_addr, const char *username, FILE *log_fp, const char *trusted_dir_path)
 

Macro Definition Documentation

◆ DEAUTH

#define DEAUTH   "deauth"

Definition at line 4 of file pam_post_auth.h.

Function Documentation

◆ exec_deauth()

int exec_deauth ( char *  bt_addr,
const char *  username,
FILE *  log_fp,
const char *  trusted_dir_path 
)

Once Authenticated, run the deauth background service

NOTE: exec replaces the child process. Memory mappings are not preservered on an exec() call so memory is reclaimed apparently. NOTE: will set the euid to be the user instead of root

Parameters
bt_addrthe trusted bluetooth address we want to log in
usernamethe user we want to run the program as (i.e. should be the username of the user who wishes to login)

Definition at line 3 of file pam_post_auth.c.

Here is the call graph for this function: