Chapter 5. Programming notes

Table of Contents

5.1. Security issues for module creation
5.1.1. Sufficient resources
5.1.2. Who´s who?
5.1.3. Using the conversation function
5.1.4. Authentication tokens
5.2. Use of syslog(3)
5.3. Modules that require system libraries

Here we collect some pointers for the module writer to bear in mind when writing/developing a Linux-PAM compatible module.