| /src/usr.bin/passwd/ |
| pam_passwd.c | 58 static pam_handle_t *pamh; variable 67 warnx("%s: %s", (msg), pam_strerror(pamh, pam_err)); \ 110 pam_err = pam_start("passwd", username, &pamc, &pamh); 115 pam_err = pam_set_item(pamh, PAM_TTY, ttyname(STDERR_FILENO)); 119 pam_err = pam_set_item(pamh, PAM_RHOST, hostname); 122 pam_err = pam_set_item(pamh, PAM_RUSER, getlogin()); 126 pam_err = pam_chauthtok(pamh, 0); 133 pam_strerror(pamh, pam_err)); 136 pam_strerror(pamh, pam_err)); 145 pam_end(pamh, pam_err) [all...] |
| /src/external/bsd/cron/dist/ |
| pam_auth.c | 7 static pam_handle_t *pamh = NULL; variable 15 if (pamh) 18 retval = pam_start ("cron", username, &cron_conv, &pamh); 22 pamh = NULL; 24 pam_strerror (pamh, retval)); 27 retval = pam_authenticate (pamh, PAM_SILENT); 32 pam_strerror (pamh, retval)); 33 pam_end (pamh, retval); 34 pamh = NULL; 37 retval = pam_acct_mgmt (pamh, PAM_SILENT) [all...] |
| /src/external/bsd/openpam/dist/bin/openpam_dump_policy/ |
| openpam_dump_policy.c | 121 pam_handle_t *pamh; local 125 if ((pamh = calloc(1, sizeof *pamh)) == NULL) 127 if ((ret = openpam_configure(pamh, service)) != PAM_SUCCESS) 130 if (pamh->chains[fclt] != NULL) { 133 ret = openpam_dump_chain(name, pamh->chains[fclt]); 147 if (pamh->chains[fclt] != NULL) { 158 free(pamh);
|
| /src/external/bsd/openpam/dist/bin/su/ |
| su.c | 59 static pam_handle_t *pamh; variable 100 pam_start("su", user, &pamc, &pamh); 104 if ((pam_err = pam_set_item(pamh, PAM_RHOST, hostname)) != PAM_SUCCESS) 107 if ((pam_err = pam_set_item(pamh, PAM_RUSER, user)) != PAM_SUCCESS) 110 if ((pam_err = pam_set_item(pamh, PAM_TTY, tty)) != PAM_SUCCESS) 114 if ((pam_err = pam_authenticate(pamh, 0)) != PAM_SUCCESS) 116 if ((pam_err = pam_acct_mgmt(pamh, 0)) == PAM_NEW_AUTHTOK_REQD) 117 pam_err = pam_chauthtok(pamh, PAM_CHANGE_EXPIRED_AUTHTOK); 122 if ((pam_err = pam_setcred(pamh, PAM_ESTABLISH_CRED)) != PAM_SUCCESS) 126 if ((pam_err = pam_open_session(pamh, 0)) != PAM_SUCCESS [all...] |
| /src/external/bsd/openpam/dist/t/ |
| t_pam_env.c | 60 pam_handle_t *pamh; 65 pam_err = pam_start("t_pam_env", "test", &t_null_pamc, &pamh); 67 envlist = pam_getenvlist(pamh); 73 pam_end(pamh, pam_err); 80 pam_handle_t *pamh; 85 pam_err = pam_start("t_pam_env", "test", &t_null_pamc, &pamh); 87 pam_err = pam_putenv(pamh, T_ENV_NAMEVALUE); 89 envlist = pam_getenvlist(pamh); 96 pam_end(pamh, pam_err); 103 pam_handle_t *pamh; 59 pam_handle_t *pamh; local 79 pam_handle_t *pamh; local 102 pam_handle_t *pamh; local 125 pam_handle_t *pamh; local 141 pam_handle_t *pamh; local 159 pam_handle_t *pamh; local [all...] |
| t_openpam_dispatch.c | 64 pam_handle_t *pamh; variable 72 pam_err = pam_start(tf->name, "test", &pamc, &pamh); 82 pam_err = pam_authenticate(pamh, 0); 85 pam_err = pam_setcred(pamh, 0); 88 pam_err = pam_acct_mgmt(pamh, 0); 91 pam_err = pam_chauthtok(pamh, 0); 94 pam_err = pam_open_session(pamh, 0); 97 pam_err = pam_close_session(pamh, 0); 100 pam_end(pamh, pam_err); 131 pam_handle_t *pamh; variable [all...] |
| /src/external/bsd/ppp/dist/pppd/ |
| session.c | 132 static pam_handle_t *pamh = NULL; variable 229 pam_error = pam_start (SERVICE_NAME, usr, &pam_conv_data, &pamh); 234 ok = (pam_set_item(pamh, PAM_TTY, ttyName) == PAM_SUCCESS) && 235 (pam_set_item(pamh, PAM_RHOST, ifname) == PAM_SUCCESS); 240 pam_error = pam_authenticate (pamh, PAM_SILENT); 253 pam_strerror(pamh, pam_error)); 254 SET_MSG(msg, (char *) pam_strerror (pamh, pam_error)); 261 pam_error = pam_acct_mgmt (pamh, PAM_SILENT); 287 pam_strerror(pamh, pam_error)); 288 SET_MSG(msg, (char *) pam_strerror (pamh, pam_error)) [all...] |
| /src/usr.bin/lock/ |
| lock.c | 111 pam_handle_t *pamh = NULL; local 218 pam_err = pam_start("lock", pw->pw_name, &pamc, &pamh); 257 pam_err = pam_authenticate(pamh, 0); 293 (void)pam_end(pamh, pam_err);
|
| /src/external/bsd/openpam/dist/bin/pamtest/ |
| pamtest.c | 52 static pam_handle_t *pamh; variable 105 if ((pame = pam_start(service, user, &pamc, &pamh)) != PAM_SUCCESS) 120 if ((pame = pam_authenticate(pamh, flags)) != PAM_SUCCESS) 135 if ((pame = pam_acct_mgmt(pamh, flags)) != PAM_SUCCESS) 150 if ((pame = pam_chauthtok(pamh, flags)) != PAM_SUCCESS) 165 if ((pame = pam_setcred(pamh, flags)) != PAM_SUCCESS) 180 if ((pame = pam_open_session(pamh, flags)) != PAM_SUCCESS) 195 if ((pame = pam_close_session(pamh, flags)) != PAM_SUCCESS) 226 if ((pame = pam_set_item(pamh, item, p)) != PAM_SUCCESS) 238 if (pamh != NULL && (pame = pam_end(pamh, pame)) != PAM_SUCCESS [all...] |
| /src/lib/libtelnet/ |
| sra.c | 559 pam_handle_t *pamh = NULL; local 566 e = pam_start("telnetd", name, &conv, &pamh); 568 syslog(LOG_ERR, "pam_start: %s", pam_strerror(pamh, e)); 573 e = pam_set_item(pamh, PAM_RHOST, remotehost); 576 pam_strerror(pamh, e)); 581 e = pam_authenticate(pamh, 0); 601 if ((e = pam_get_item(pamh, PAM_USER, &item)) == 606 pam_strerror(pamh, e)); 622 syslog(LOG_ERR, "auth_pam: %s", pam_strerror(pamh, e)); 627 if ((e = pam_end(pamh, e)) != PAM_SUCCESS) [all...] |
| /src/libexec/rexecd/ |
| rexecd.c | 77 static pam_handle_t *pamh; variable 229 if (!pam_ok(pam_start("rexecd", user, &pamc, &pamh)) || 230 !pam_ok(pam_set_item(pamh, PAM_RHOST, hostname)) || 231 !pam_ok(pam_set_item(pamh, PAM_AUTHTOK, pass))) { 234 hostname, pam_strerror(pamh, pam_err)); 237 if (!pam_ok(pam_authenticate(pamh, pam_flags)) || 238 !pam_ok(pam_acct_mgmt(pamh, pam_flags))) { 241 hostname, pam_strerror(pamh, pam_err)); 277 (void)pam_end(pamh, pam_err); 339 if (!pam_ok(pam_setcred(pamh, PAM_ESTABLISH_CRED)) [all...] |
| /src/usr.bin/login/ |
| login_pam.c | 117 pam_handle_t *pamh = NULL; local 257 syslog(LOG_ERR, "%s: %s", msg, pam_strerror(pamh, pam_err)); \ 258 warnx("%s: %s", msg, pam_strerror(pamh, pam_err)); \ 259 pam_end(pamh, pam_err); \ 263 pam_err = pam_start("login", username, &pamc, &pamh); 265 if (pamh != NULL) 269 pam_strerror(pamh, pam_err)); 274 pam_err = pam_set_item(pamh, (item), (var)); \ 322 switch(pam_err = pam_authenticate(pamh, pam_silent)) { 328 pam_err = pam_get_item(pamh, PAM_USER, &newuser) [all...] |
| /src/usr.bin/su/ |
| su_pam.c | 87 safe_pam_strerror(pam_handle_t *pamh, int pam_err) { 90 if ((msg = pam_strerror(pamh, pam_err)) != NULL) 118 pam_handle_t *pamh = NULL; local 226 if ((pam_err = pam_start("su", user, &pamc, &pamh)) != PAM_SUCCESS) { 227 if (pamh != NULL) 231 safe_pam_strerror(pamh, pam_err)); 237 if ((pam_err = pam_set_item(pamh, (item), (var))) != PAM_SUCCESS) \ 253 if ((pam_err = pam_authenticate(pamh, 0)) != PAM_SUCCESS) { 255 username, user, ontty(), safe_pam_strerror(pamh, pam_err)); 256 (void)pam_end(pamh, pam_err) [all...] |
| /src/libexec/rshd/ |
| rshd.c | 117 static pam_handle_t *pamh; variable 121 if ((pam_err = pam_setcred(pamh, PAM_DELETE_CRED)) != PAM_SUCCESS) \ 123 pam_strerror(pamh, pam_err)); \ 124 if ((pam_err = pam_close_session(pamh,0)) != PAM_SUCCESS) \ 126 pam_strerror(pamh, pam_err)); \ 127 if ((pam_err = pam_end(pamh, pam_err)) != PAM_SUCCESS) \ 129 pam_strerror(pamh, pam_err)); \ 462 pam_err = pam_start("rsh", locuser, &pamc, &pamh); 465 pam_strerror(pamh, pam_err)); 469 if ((pam_err = pam_set_item(pamh, PAM_RUSER, remuser)) != PAM_SUCCESS | [all...] |
| /src/libexec/ftpd/ |
| ftpd.c | 199 pam_handle_t *pamh = NULL; variable 1314 if (pamh) { 1315 if ((e = pam_setcred(pamh, PAM_DELETE_CRED)) != PAM_SUCCESS) 1317 pam_strerror(pamh, e)); 1318 if ((e = pam_close_session(pamh,0)) != PAM_SUCCESS) 1320 pam_strerror(pamh, e)); 1321 if ((e = pam_end(pamh, e)) != PAM_SUCCESS) 1322 syslog(LOG_ERR, "pam_end: %s", pam_strerror(pamh, e)); 1323 pamh = NULL; 1488 if (pamh) { [all...] |
| /src/external/gpl2/xcvs/dist/src/ |
| server.c | 119 static pam_handle_t *pamh = NULL; variable 6524 if (pamh) 6528 retval = pam_close_session (pamh, 0); 6533 pam_strerror (pamh, retval)); 6536 retval = pam_end (pamh, retval); 6541 pam_strerror (pamh, retval)); 6564 if (pamh) 6566 retval = pam_open_session (pamh, 0); 6570 retval = pam_get_item (pamh, PAM_USER, (const void **)&username); 6576 pam_strerror (pamh, retval)) [all...] |