aboutsummaryrefslogtreecommitdiff
path: root/Linux-PAM/examples/check_user.c
diff options
context:
space:
mode:
authorSteve Langasek <steve.langasek@ubuntu.com>2019-01-03 13:00:10 -0800
committerSteve Langasek <steve.langasek@ubuntu.com>2019-01-03 13:00:10 -0800
commit9d69c7bbb05cc22edce56e751cef5828e652988a (patch)
treeb97c4aa6e6133fa3e319805c5190819020838c32 /Linux-PAM/examples/check_user.c
parenta6f4ab0bebc76acf85cc0244bd21c1036009c28c (diff)
parentd5b06b67bbeeed7c05c0eb2e05d6a972ad050d1c (diff)
downloadpam-9d69c7bbb05cc22edce56e751cef5828e652988a.tar.gz
pam-9d69c7bbb05cc22edce56e751cef5828e652988a.tar.bz2
pam-9d69c7bbb05cc22edce56e751cef5828e652988a.zip
Merge tag 'upstream/0.99.7.1' into debian
Diffstat (limited to 'Linux-PAM/examples/check_user.c')
-rw-r--r--Linux-PAM/examples/check_user.c60
1 files changed, 60 insertions, 0 deletions
diff --git a/Linux-PAM/examples/check_user.c b/Linux-PAM/examples/check_user.c
new file mode 100644
index 00000000..cb539c4e
--- /dev/null
+++ b/Linux-PAM/examples/check_user.c
@@ -0,0 +1,60 @@
+/*
+ $Id: check_user.c,v 1.2 2000/12/04 19:02:33 baggins Exp $
+
+ This program was contributed by Shane Watts <shane@icarus.bofh.asn.au>
+ slight modifications by AGM.
+
+ You need to add the following (or equivalent) to the /etc/pam.conf file.
+ # check authorization
+ check auth required pam_unix_auth.so
+ check account required pam_unix_acct.so
+*/
+
+#include <security/pam_appl.h>
+#include <security/pam_misc.h>
+#include <stdio.h>
+
+static struct pam_conv conv = {
+ misc_conv,
+ NULL
+};
+
+int main(int argc, char *argv[])
+{
+ pam_handle_t *pamh=NULL;
+ int retval;
+ const char *user="nobody";
+
+ if(argc == 2) {
+ user = argv[1];
+ }
+
+ if(argc > 2) {
+ fprintf(stderr, "Usage: check_user [username]\n");
+ exit(1);
+ }
+
+ retval = pam_start("check", user, &conv, &pamh);
+
+ if (retval == PAM_SUCCESS)
+ retval = pam_authenticate(pamh, 0); /* is user really user? */
+
+ if (retval == PAM_SUCCESS)
+ retval = pam_acct_mgmt(pamh, 0); /* permitted access? */
+
+ /* This is where we have been authorized or not. */
+
+ if (retval == PAM_SUCCESS) {
+ fprintf(stdout, "Authenticated\n");
+ } else {
+ fprintf(stdout, "Not Authenticated\n");
+ }
+
+ if (pam_end(pamh,retval) != PAM_SUCCESS) { /* close Linux-PAM */
+ pamh = NULL;
+ fprintf(stderr, "check_user: failed to release authenticator\n");
+ exit(1);
+ }
+
+ return ( retval == PAM_SUCCESS ? 0:1 ); /* indicate success */
+}