| /src/external/bsd/pam-u2f/lib/security/ |
| Makefile | 5 SUBDIR= pam-u2f
|
| /src/external/bsd/pam-u2f/dist/tests/bionic/ |
| run.sh | 14 echo "auth sufficient pam_u2f.so" > /etc/pam.d/dummy 18 echo "auth sufficient pam_u2f.so origin=originA" > /etc/pam.d/dummy 22 echo "auth sufficient pam_u2f.so origin=originB" > /etc/pam.d/dummy 28 echo "auth sufficient pam_u2f.so" > /etc/pam.d/dummy 34 echo "auth sufficient pam_u2f.so origin=originA" > /etc/pam.d/dummy 38 echo "auth sufficient pam_u2f.so origin=originB" > /etc/pam.d/dummy 47 echo "auth sufficient pam_u2f.so" > /etc/pam.d/dummy 51 echo "auth sufficient pam_u2f.so origin=originA" > /etc/pam.d/dummy 55 echo "auth sufficient pam_u2f.so origin=originB" > /etc/pam.d/dummy
|
| /src/external/bsd/pam-u2f/dist/fuzz/ |
| coverage.sh | 5 curl --retry 4 -s -o corpus.tgz https://storage.googleapis.com/kroppkaka/corpus/pam-u2f.corpus.tgz
|
| /src/external/bsd/pam-u2f/lib/security/pam-u2f/ |
| Makefile | 5 .PATH: ${NETBSDSRCDIR}/external/bsd/pam-u2f/dist 11 SRCS= pam-u2f.c util.c b64.c explicit_bzero.c expand.c debug.c
|
| /src/external/bsd/openldap/dist/contrib/slapd-modules/nssov/ |
| Makefile | 26 NLDAPD_INC=-Inss-pam-ldapd 53 nssov.lo passwd.lo protocol.lo rpc.lo service.lo shadow.lo pam.lo 62 tio.lo: nss-pam-ldapd/tio.c
|
| /src/etc/pam.d/ |
| Makefile | 8 FILESDIR= /etc/pam.d
|
| /src/external/mit/xorg/lib/libXdmGreet/ |
| Makefile | 31 pam ${.CURDIR}/../../../../../lib/libpam/libpam
|
| /src/lib/libpam/libpam/ |
| Makefile | 54 LIB= pam 133 pam.3 \ 134 pam.conf.5 \
|
| /src/share/man/man8/ |
| Makefile | 10 intro.8 nis.8 pam.8 rc.8 rc.subr.8 rescue.8 \
|
| /src/external/bsd/ |
| Makefile | 46 SUBDIR+= pam-u2f
|
| /src/external/bsd/pam-u2f/bin/pamu2fcfg/ |
| Makefile | 6 DIST=${NETBSDSRCDIR}/external/bsd/pam-u2f/dist
|
| /src/external/gpl2/xcvs/dist/contrib/ |
| Makefile.am | 20 SUBDIRS = pam
|
| /src/crypto/dist/ipsec-tools/src/racoon/ |
| isakmp_xauth.c | 692 pam_handle_t *pam = NULL; local 701 &PAM_chat, &isakmp_cfg_config.port_pool[port].pam)) != 0) { 702 if (isakmp_cfg_config.port_pool[port].pam == NULL) { 708 pam_strerror(isakmp_cfg_config.port_pool[port].pam, 713 pam = isakmp_cfg_config.port_pool[port].pam; 721 if ((error = pam_set_item(pam, PAM_RHOST, remote)) != 0) { 724 pam_strerror(pam, error)); 728 if ((error = pam_set_item(pam, PAM_RUSER, usr)) != 0) { 731 pam_strerror(pam, error)) [all...] |
| isakmp_cfg.h | 74 pam_handle_t *pam; member in struct:isakmp_cfg_port
|
| isakmp_cfg.c | 1379 /* Cleanup PAM status associated with the port */ 1395 if (isakmp_cfg_config.port_pool[port].pam != NULL) { 1396 pam_end(isakmp_cfg_config.port_pool[port].pam, PAM_SUCCESS); 1397 isakmp_cfg_config.port_pool[port].pam = NULL; 1404 /* Accounting, only for RADIUS or PAM */ 1428 pam_handle_t *pam; local 1436 pam = isakmp_cfg_config.port_pool[port].pam; 1437 if (pam == NULL) { 1438 plog(LLV_ERROR, LOCATION, NULL, "pam handle is NULL\n") [all...] |
| /src/crypto/dist/ipsec-tools/rpm/suse/ |
| ipsec-tools.spec.in | 14 BuildRequires: aaa_base acl attr bash bind-utils bison bzip2 coreutils cpio cpp cracklib cvs cyrus-sasl db devs diffutils e2fsprogs file filesystem fillup findutils flex gawk gdbm-devel glibc glibc-devel glibc-locale gpm grep groff gzip info insserv less libacl libattr libgcc libselinux libstdc++ libxcrypt libzio m4 make man mktemp module-init-tools ncurses ncurses-devel net-tools netcfg openldap2-client openssl pam pam-modules patch permissions popt procinfo procps psmisc pwdutils rcs readline sed strace syslogd sysvinit tar tcpd texinfo timezone unzip util-linux vim zlib zlib-devel autoconf automake binutils gcc gdbm gettext kernel-source libtool openssl-devel perl readline-devel rpm
|
| /src/crypto/external/bsd/openssh/libexec/sshd-session/ |
| Makefile | 24 SRCS+= auth-pam.c
|
| /src/crypto/external/bsd/openssh/libexec/sshd-auth/ |
| Makefile | 51 SRCS+= auth-pam.c
|
| /src/external/bsd/openpam/dist/misc/ |
| gendoc.pl | 94 PAM_BAD_HANDLE => "Invalid PAM handle", 168 3 => { 'pam' => 1 }, 467 if ($$func{name} =~ m/^(?:open)?pam/) { 569 if (m/^\.Nm ((?:(?:open)?pam)_.*?)\s*$/) { 615 if ($page eq 'pam') { 631 if ($page eq 'pam') { 644 if ($page eq 'pam') { 682 gensummary('pam')
|
| /src/external/gpl2/gettext/dist/gettext-tools/examples/hello-c++-kde/admin/ |
| acinclude.m4.in | 672 You should install libcrypt from another source or configure with PAM 3517 dnl shadow password and PAM magic - maintained by ossi@kde.org 3522 AC_ARG_WITH(pam, 3523 [ --with-pam[=ARG] enable support for PAM: ARG=[yes|no|service name]], 3537 AC_CHECK_LIB(pam, pam_start, 3547 AC_MSG_CHECKING(for PAM) 3553 AC_DEFINE(HAVE_PAM, 1, [Defines if you have PAM (Pluggable Authentication Modules)]) 3560 [AC_MSG_RESULT([const: Linux-type PAM])], 3561 [AC_MSG_RESULT([nonconst: Sun-type PAM]) [all...] |
| /src/lib/ |
| Makefile | 319 SUBDIR+= ../external/bsd/pam-u2f/lib # depends on libpam
|
| /src/etc/ |
| Makefile | 342 .for subdir in . defaults autofs bluetooth iscsi mtree namedb pam.d powerd rc.d root skel ssh 716 SUBDIR= defaults rc.d pam.d mtree
|
| /src/crypto/external/bsd/openssh/dist/ |
| auth-pam.c | 1 /* $NetBSD: auth-pam.c,v 1.25 2025/03/26 01:33:02 htodd Exp $ */ 50 /* Based on FreeBSD: src/crypto/openssh/auth2-pam-freebsd.c,v 1.11 2003/03/31 13:48:18 des */ 56 __RCSID("$NetBSD: auth-pam.c,v 1.25 2025/03/26 01:33:02 htodd Exp $"); 84 #include <pam/pam_appl.h> 108 #include "auth-pam.h" 178 return; /* handler called after PAM cleanup, shouldn't happen */ 181 /* PAM thread has not exitted, privsep slave must have */ 273 /* Some PAM implementations don't implement this */ 281 * env vars (e.g. KRB5CCNAME) from the PAM environment. 299 * This wraps pam_chauthtok and sets/restore the real uid so PAM will d [all...] |
| /src/share/mk/ |
| bsd.prog.mk | 150 pam \ 222 # PAM applications, if linked statically, need more libraries
|
| /src/usr.sbin/postinstall/ |
| postinstall.in | 1901 # pam 1904 additem pam "/etc/pam.d is populated" 1911 populate_dir "${op}" true "${SRC_DIR}/etc/pam.d" \ 1912 "${DEST_DIR}/etc/pam.d" 644 \
|