aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
Diffstat (limited to 'modules/pam_unix/pam_unix.c~')
-rw-r--r--modules/pam_unix/pam_unix.c~15
1 files changed, 4 insertions, 11 deletions
diff --git a/modules/pam_unix/pam_unix.c~ b/modules/pam_unix/pam_unix.c~
index 601aa89..79e1131 100644
--- a/modules/pam_unix/pam_unix.c~
+++ b/modules/pam_unix/pam_unix.c~
@@ -64,7 +64,6 @@ pam_sm_authenticate(pam_handle_t *pamh, int flags,
PAM_LOG("Authenticating user: [%s]", user);
- puts("USER GOT");
/* get password */
if (pwd != NULL) {
@@ -73,22 +72,17 @@ pam_sm_authenticate(pam_handle_t *pamh, int flags,
if (pass[0] == '\0') {
if (!(flags & PAM_DISALLOW_NULL_AUTHTOK) &&
openpam_get_option(pamh, PAM_OPT_NULLOK)){
- PAM_LOG("User [%s] has empty password. Authentication succesfull.");
+ PAM_LOG("User [%s] has empty password. \
+ Authentication succesfull.", user);
return (PAM_SUCCESS);
}
real_hash = "*";
}
- /*
- * Dummy authentication is something that the freebsd-lib
- * people have implemented. Not sure whether it's needed on
- * Linux -or BSD- but it'll be left as is for compatibiity
- * issues. Need to be checked!
- */
-
+#ifndef __linux__
lc = login_getpwclass(pwd);
-
+#endif
} else {
PAM_LOG("Doing dummy authentication.");
real_hash = "*";
@@ -130,7 +124,6 @@ pam_sm_authenticate(pam_handle_t *pamh, int flags,
pam_err = PAM_AUTH_ERR;
} else {
PAM_LOG("Authentication completed succesfully.");
- puts("SUCCESS!");
pam_err = PAM_SUCCESS;
}