HomeSort by: relevance | last modified time | path
    Searched defs:pamh (Results 1 - 16 of 16) sorted by relevancy

  /src/usr.bin/passwd/
pam_passwd.c 58 static pam_handle_t *pamh; variable
67 warnx("%s: %s", (msg), pam_strerror(pamh, pam_err)); \
110 pam_err = pam_start("passwd", username, &pamc, &pamh);
115 pam_err = pam_set_item(pamh, PAM_TTY, ttyname(STDERR_FILENO));
119 pam_err = pam_set_item(pamh, PAM_RHOST, hostname);
122 pam_err = pam_set_item(pamh, PAM_RUSER, getlogin());
126 pam_err = pam_chauthtok(pamh, 0);
133 pam_strerror(pamh, pam_err));
136 pam_strerror(pamh, pam_err));
145 pam_end(pamh, pam_err)
    [all...]
  /src/external/bsd/cron/dist/
pam_auth.c 7 static pam_handle_t *pamh = NULL; variable
15 if (pamh)
18 retval = pam_start ("cron", username, &cron_conv, &pamh);
22 pamh = NULL;
24 pam_strerror (pamh, retval));
27 retval = pam_authenticate (pamh, PAM_SILENT);
32 pam_strerror (pamh, retval));
33 pam_end (pamh, retval);
34 pamh = NULL;
37 retval = pam_acct_mgmt (pamh, PAM_SILENT)
    [all...]
  /src/external/bsd/openpam/dist/bin/openpam_dump_policy/
openpam_dump_policy.c 121 pam_handle_t *pamh; local
125 if ((pamh = calloc(1, sizeof *pamh)) == NULL)
127 if ((ret = openpam_configure(pamh, service)) != PAM_SUCCESS)
130 if (pamh->chains[fclt] != NULL) {
133 ret = openpam_dump_chain(name, pamh->chains[fclt]);
147 if (pamh->chains[fclt] != NULL) {
158 free(pamh);
  /src/external/bsd/openpam/dist/bin/su/
su.c 59 static pam_handle_t *pamh; variable
100 pam_start("su", user, &pamc, &pamh);
104 if ((pam_err = pam_set_item(pamh, PAM_RHOST, hostname)) != PAM_SUCCESS)
107 if ((pam_err = pam_set_item(pamh, PAM_RUSER, user)) != PAM_SUCCESS)
110 if ((pam_err = pam_set_item(pamh, PAM_TTY, tty)) != PAM_SUCCESS)
114 if ((pam_err = pam_authenticate(pamh, 0)) != PAM_SUCCESS)
116 if ((pam_err = pam_acct_mgmt(pamh, 0)) == PAM_NEW_AUTHTOK_REQD)
117 pam_err = pam_chauthtok(pamh, PAM_CHANGE_EXPIRED_AUTHTOK);
122 if ((pam_err = pam_setcred(pamh, PAM_ESTABLISH_CRED)) != PAM_SUCCESS)
126 if ((pam_err = pam_open_session(pamh, 0)) != PAM_SUCCESS
    [all...]
  /src/external/bsd/openpam/dist/t/
t_pam_env.c 60 pam_handle_t *pamh;
65 pam_err = pam_start("t_pam_env", "test", &t_null_pamc, &pamh);
67 envlist = pam_getenvlist(pamh);
73 pam_end(pamh, pam_err);
80 pam_handle_t *pamh;
85 pam_err = pam_start("t_pam_env", "test", &t_null_pamc, &pamh);
87 pam_err = pam_putenv(pamh, T_ENV_NAMEVALUE);
89 envlist = pam_getenvlist(pamh);
96 pam_end(pamh, pam_err);
103 pam_handle_t *pamh;
59 pam_handle_t *pamh; local
79 pam_handle_t *pamh; local
102 pam_handle_t *pamh; local
125 pam_handle_t *pamh; local
141 pam_handle_t *pamh; local
159 pam_handle_t *pamh; local
    [all...]
t_openpam_dispatch.c 64 pam_handle_t *pamh; variable
72 pam_err = pam_start(tf->name, "test", &pamc, &pamh);
82 pam_err = pam_authenticate(pamh, 0);
85 pam_err = pam_setcred(pamh, 0);
88 pam_err = pam_acct_mgmt(pamh, 0);
91 pam_err = pam_chauthtok(pamh, 0);
94 pam_err = pam_open_session(pamh, 0);
97 pam_err = pam_close_session(pamh, 0);
100 pam_end(pamh, pam_err);
131 pam_handle_t *pamh; variable
    [all...]
  /src/external/bsd/ppp/dist/pppd/
session.c 132 static pam_handle_t *pamh = NULL; variable
229 pam_error = pam_start (SERVICE_NAME, usr, &pam_conv_data, &pamh);
234 ok = (pam_set_item(pamh, PAM_TTY, ttyName) == PAM_SUCCESS) &&
235 (pam_set_item(pamh, PAM_RHOST, ifname) == PAM_SUCCESS);
240 pam_error = pam_authenticate (pamh, PAM_SILENT);
253 pam_strerror(pamh, pam_error));
254 SET_MSG(msg, (char *) pam_strerror (pamh, pam_error));
261 pam_error = pam_acct_mgmt (pamh, PAM_SILENT);
287 pam_strerror(pamh, pam_error));
288 SET_MSG(msg, (char *) pam_strerror (pamh, pam_error))
    [all...]
  /src/usr.bin/lock/
lock.c 111 pam_handle_t *pamh = NULL; local
218 pam_err = pam_start("lock", pw->pw_name, &pamc, &pamh);
257 pam_err = pam_authenticate(pamh, 0);
293 (void)pam_end(pamh, pam_err);
  /src/external/bsd/openpam/dist/bin/pamtest/
pamtest.c 52 static pam_handle_t *pamh; variable
105 if ((pame = pam_start(service, user, &pamc, &pamh)) != PAM_SUCCESS)
120 if ((pame = pam_authenticate(pamh, flags)) != PAM_SUCCESS)
135 if ((pame = pam_acct_mgmt(pamh, flags)) != PAM_SUCCESS)
150 if ((pame = pam_chauthtok(pamh, flags)) != PAM_SUCCESS)
165 if ((pame = pam_setcred(pamh, flags)) != PAM_SUCCESS)
180 if ((pame = pam_open_session(pamh, flags)) != PAM_SUCCESS)
195 if ((pame = pam_close_session(pamh, flags)) != PAM_SUCCESS)
226 if ((pame = pam_set_item(pamh, item, p)) != PAM_SUCCESS)
238 if (pamh != NULL && (pame = pam_end(pamh, pame)) != PAM_SUCCESS
    [all...]
  /src/lib/libtelnet/
sra.c 559 pam_handle_t *pamh = NULL; local
566 e = pam_start("telnetd", name, &conv, &pamh);
568 syslog(LOG_ERR, "pam_start: %s", pam_strerror(pamh, e));
573 e = pam_set_item(pamh, PAM_RHOST, remotehost);
576 pam_strerror(pamh, e));
581 e = pam_authenticate(pamh, 0);
601 if ((e = pam_get_item(pamh, PAM_USER, &item)) ==
606 pam_strerror(pamh, e));
622 syslog(LOG_ERR, "auth_pam: %s", pam_strerror(pamh, e));
627 if ((e = pam_end(pamh, e)) != PAM_SUCCESS)
    [all...]
  /src/libexec/rexecd/
rexecd.c 77 static pam_handle_t *pamh; variable
229 if (!pam_ok(pam_start("rexecd", user, &pamc, &pamh)) ||
230 !pam_ok(pam_set_item(pamh, PAM_RHOST, hostname)) ||
231 !pam_ok(pam_set_item(pamh, PAM_AUTHTOK, pass))) {
234 hostname, pam_strerror(pamh, pam_err));
237 if (!pam_ok(pam_authenticate(pamh, pam_flags)) ||
238 !pam_ok(pam_acct_mgmt(pamh, pam_flags))) {
241 hostname, pam_strerror(pamh, pam_err));
277 (void)pam_end(pamh, pam_err);
339 if (!pam_ok(pam_setcred(pamh, PAM_ESTABLISH_CRED))
    [all...]
  /src/usr.bin/login/
login_pam.c 117 pam_handle_t *pamh = NULL; local
257 syslog(LOG_ERR, "%s: %s", msg, pam_strerror(pamh, pam_err)); \
258 warnx("%s: %s", msg, pam_strerror(pamh, pam_err)); \
259 pam_end(pamh, pam_err); \
263 pam_err = pam_start("login", username, &pamc, &pamh);
265 if (pamh != NULL)
269 pam_strerror(pamh, pam_err));
274 pam_err = pam_set_item(pamh, (item), (var)); \
322 switch(pam_err = pam_authenticate(pamh, pam_silent)) {
328 pam_err = pam_get_item(pamh, PAM_USER, &newuser)
    [all...]
  /src/usr.bin/su/
su_pam.c 87 safe_pam_strerror(pam_handle_t *pamh, int pam_err) {
90 if ((msg = pam_strerror(pamh, pam_err)) != NULL)
118 pam_handle_t *pamh = NULL; local
226 if ((pam_err = pam_start("su", user, &pamc, &pamh)) != PAM_SUCCESS) {
227 if (pamh != NULL)
231 safe_pam_strerror(pamh, pam_err));
237 if ((pam_err = pam_set_item(pamh, (item), (var))) != PAM_SUCCESS) \
253 if ((pam_err = pam_authenticate(pamh, 0)) != PAM_SUCCESS) {
255 username, user, ontty(), safe_pam_strerror(pamh, pam_err));
256 (void)pam_end(pamh, pam_err)
    [all...]
  /src/libexec/rshd/
rshd.c 117 static pam_handle_t *pamh; variable
121 if ((pam_err = pam_setcred(pamh, PAM_DELETE_CRED)) != PAM_SUCCESS) \
123 pam_strerror(pamh, pam_err)); \
124 if ((pam_err = pam_close_session(pamh,0)) != PAM_SUCCESS) \
126 pam_strerror(pamh, pam_err)); \
127 if ((pam_err = pam_end(pamh, pam_err)) != PAM_SUCCESS) \
129 pam_strerror(pamh, pam_err)); \
462 pam_err = pam_start("rsh", locuser, &pamc, &pamh);
465 pam_strerror(pamh, pam_err));
469 if ((pam_err = pam_set_item(pamh, PAM_RUSER, remuser)) != PAM_SUCCESS |
    [all...]
  /src/libexec/ftpd/
ftpd.c 199 pam_handle_t *pamh = NULL; variable
1314 if (pamh) {
1315 if ((e = pam_setcred(pamh, PAM_DELETE_CRED)) != PAM_SUCCESS)
1317 pam_strerror(pamh, e));
1318 if ((e = pam_close_session(pamh,0)) != PAM_SUCCESS)
1320 pam_strerror(pamh, e));
1321 if ((e = pam_end(pamh, e)) != PAM_SUCCESS)
1322 syslog(LOG_ERR, "pam_end: %s", pam_strerror(pamh, e));
1323 pamh = NULL;
1488 if (pamh) {
    [all...]
  /src/external/gpl2/xcvs/dist/src/
server.c 119 static pam_handle_t *pamh = NULL; variable
6524 if (pamh)
6528 retval = pam_close_session (pamh, 0);
6533 pam_strerror (pamh, retval));
6536 retval = pam_end (pamh, retval);
6541 pam_strerror (pamh, retval));
6564 if (pamh)
6566 retval = pam_open_session (pamh, 0);
6570 retval = pam_get_item (pamh, PAM_USER, (const void **)&username);
6576 pam_strerror (pamh, retval))
    [all...]

Completed in 25 milliseconds