aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
Diffstat (limited to 'modules/pam_unix/pam_unix.c~')
-rw-r--r--modules/pam_unix/pam_unix.c~13
1 files changed, 8 insertions, 5 deletions
diff --git a/modules/pam_unix/pam_unix.c~ b/modules/pam_unix/pam_unix.c~
index c65ec10..20088ec 100644
--- a/modules/pam_unix/pam_unix.c~
+++ b/modules/pam_unix/pam_unix.c~
@@ -1,8 +1,11 @@
+#define _XOPEN_SOURCE
+
/* #include <pwd.h> */
#include <netdb.h>
#include <shadow.h>
#include <sys/types.h>
#include <unistd.h>
+#include <time.h>
#ifndef MAXHOSTNAMELEN
@@ -20,7 +23,7 @@
#include <security/pam_modules.h>
#include <security/pam_appl.h>
-#include <pam_mod_misc.h>
+#include <security/pam_mod_misc.h>
/*
* User authentication
@@ -61,7 +64,7 @@ pam_sm_authenticate(pam_handle_t *pamh, int flags,
if (pass[0] == '\0') {
if (!(flags & PAM_DISALLOW_NULL_AUTHTOK) &&
openpam_get_option(pamh, PAM_OPT_NULLOK)){
- PAM_ERROR("Authentication failed. Empty passwd not allowed");
+ PAM_ERROR("Authentication failed. Empty passwd not allowed.");
return (PAM_SUCCESS);
}
@@ -71,7 +74,7 @@ pam_sm_authenticate(pam_handle_t *pamh, int flags,
lc = login_getpwclass(pwd);
#endif
} else {
- PAM_LOG("Doing dummy authentication");
+ PAM_LOG("Doing dummy authentication.");
pass = "*";
#ifndef __linux__
lc = login_getpwclass(NULL);
@@ -99,7 +102,7 @@ pam_sm_authenticate(pam_handle_t *pamh, int flags,
PAM_ERROR("Wrong password. Authentication failed.");
pam_err = PAM_AUTH_ERR;
} else {
- PAM_LOG("Authentication completed succesfully");
+ PAM_LOG("Authentication completed succesfully.");
pam_err = PAM_SUCCESS;
}
@@ -249,7 +252,7 @@ pam_sm_chautok(pam_handle_t *pamh, int flags,
int argc, const char *argv[])
{
-
+ return (PAM_SUCCESS);
}