HomeSort by: relevance | last modified time | path
    Searched refs:pamh (Results 1 - 25 of 32) sorted by relevancy

1 2

  /src/lib/libpam/modules/pam_guest/
pam_guest.c 75 pam_sm_authenticate(pam_handle_t *pamh, int flags __unused,
82 if (pam_get_user(pamh, &user, NULL) != PAM_SUCCESS || user == NULL)
86 if ((guests = openpam_get_option(pamh, "guests")) == NULL)
93 if (!openpam_get_option(pamh, "nopass")) {
94 err = pam_get_authtok(pamh, PAM_AUTHTOK, &authtok, NULL);
97 if (openpam_get_option(pamh, "pass_is_user") &&
100 if (openpam_get_option(pamh, "pass_as_ruser"))
101 pam_set_item(pamh, PAM_RUSER, authtok);
106 pam_setenv(pamh, "GUEST", user, 1);
113 pam_sm_setcred(pam_handle_t * pamh __unused, int flags __unused
    [all...]
  /src/lib/libpam/modules/pam_echo/
pam_echo.c 53 _pam_echo(pam_handle_t *pamh, int flags,
99 err = pam_get_item(pamh, item, &str);
109 return (pam_info(pamh, "%s", msg));
113 pam_sm_authenticate(pam_handle_t *pamh, int flags,
117 return (_pam_echo(pamh, flags, argc, argv));
121 pam_sm_setcred(pam_handle_t *pamh __unused, int flags __unused,
129 pam_sm_acct_mgmt(pam_handle_t *pamh, int flags,
133 return (_pam_echo(pamh, flags, argc, argv));
137 pam_sm_open_session(pam_handle_t *pamh, int flags,
141 return (_pam_echo(pamh, flags, argc, argv))
    [all...]
  /src/usr.bin/passwd/
pam_passwd.c 58 static pam_handle_t *pamh; variable in typeref:typename:pam_handle_t *
67 warnx("%s: %s", (msg), pam_strerror(pamh, pam_err)); \
110 pam_err = pam_start("passwd", username, &pamc, &pamh);
115 pam_err = pam_set_item(pamh, PAM_TTY, ttyname(STDERR_FILENO));
119 pam_err = pam_set_item(pamh, PAM_RHOST, hostname);
122 pam_err = pam_set_item(pamh, PAM_RUSER, getlogin());
126 pam_err = pam_chauthtok(pamh, 0);
133 pam_strerror(pamh, pam_err));
136 pam_strerror(pamh, pam_err));
145 pam_end(pamh, pam_err)
    [all...]
  /src/lib/libpam/modules/pam_unix/
pam_unix.c 84 pam_sm_authenticate(pam_handle_t *pamh, int flags __unused,
94 if (openpam_get_option(pamh, PAM_OPT_AUTH_AS_SELF)) {
98 retval = pam_get_user(pamh, &user, NULL);
110 openpam_get_option(pamh, PAM_OPT_NULLOK))
119 retval = pam_get_authtok(pamh, PAM_AUTHTOK, &pass, NULL);
133 pam_sm_setcred(pam_handle_t *pamh __unused, int flags __unused,
145 pam_sm_acct_mgmt(pam_handle_t *pamh, int flags __unused,
156 retval = pam_get_user(pamh, &user, NULL);
197 pam_error(pamh, "Warning: your account expires on %s",
209 pam_error(pamh, "Warning: your password expires on %s"
    [all...]
  /src/lib/libpam/modules/pam_deny/
pam_deny.c 49 pam_sm_authenticate(pam_handle_t *pamh, int flags __unused,
55 if ((r = pam_get_user(pamh, &user, NULL)) != PAM_SUCCESS)
62 pam_sm_setcred(pam_handle_t *pamh __unused, int flags __unused,
70 pam_sm_acct_mgmt(pam_handle_t *pamh __unused, int flags __unused,
78 pam_sm_chauthtok(pam_handle_t *pamh __unused, int flags,
100 pam_sm_open_session(pam_handle_t *pamh __unused, int flags __unused,
108 pam_sm_close_session(pam_handle_t *pamh __unused, int flags __unused,
  /src/lib/libpam/modules/pam_permit/
pam_permit.c 47 pam_sm_authenticate(pam_handle_t *pamh, int flags __unused,
53 if ((r = pam_get_user(pamh, &user, NULL)) != PAM_SUCCESS)
60 pam_sm_setcred(pam_handle_t *pamh __unused, int flags __unused,
68 pam_sm_acct_mgmt(pam_handle_t *pamh __unused, int flags __unused,
76 pam_sm_chauthtok(pam_handle_t *pamh __unused, int flags __unused,
84 pam_sm_open_session(pam_handle_t *pamh __unused, int flags __unused,
92 pam_sm_close_session(pam_handle_t *pamh __unused, int flags __unused,
  /src/lib/libpam/modules/pam_chroot/
pam_chroot.c 59 pam_sm_open_session(pam_handle_t *pamh, int flags __unused,
67 if (pam_get_user(pamh, &user, NULL) != PAM_SUCCESS ||
72 if (pwd->pw_uid == 0 && !openpam_get_option(pamh, "also_root"))
85 } else if ((dir = openpam_get_option(pamh, "dir")) != NULL) {
86 if ((cwd = openpam_get_option(pamh, "cwd")) == NULL)
89 if (openpam_get_option(pamh, "always")) {
107 pam_setenv(pamh, "HOME", cwd, 1);
112 pam_sm_close_session(pam_handle_t *pamh __unused, int flags __unused,
  /src/lib/libpam/modules/pam_rhosts/
pam_rhosts.c 59 pam_sm_authenticate(pam_handle_t *pamh, int flags __unused,
68 err = pam_get_user(pamh, &user, NULL);
76 openpam_get_option(pamh, OPT_ALLOW_ROOT) == NULL)
79 err = pam_get_item(pamh, PAM_RUSER, &ruser);
83 err = pam_get_item(pamh, PAM_RHOST, &rhost);
96 pam_sm_setcred(pam_handle_t *pamh __unused, int flags __unused,
  /src/lib/libpam/modules/pam_skey/
pam_skey.c 54 pam_sm_authenticate(pam_handle_t *pamh, int flags __unused,
62 if (openpam_get_option(pamh, PAM_OPT_AUTH_AS_SELF)) {
65 retval = pam_get_user(pamh, &user, NULL);
83 retval = pam_get_authtok(pamh, PAM_AUTHTOK, &pass, skprompt);
89 pam_error(pamh, "Unable to copy S/Key response");
103 pam_sm_setcred(pam_handle_t *pamh __unused, int flags __unused,
  /src/lib/libpam/modules/pam_ssh/
pam_ssh.c 152 pam_ssh_free_key(pam_handle_t *pamh __unused,
164 pam_sm_authenticate(pam_handle_t *pamh, int flags __unused,
174 nullok = (openpam_get_option(pamh, "nullok") != NULL);
180 pam_err = pam_get_user(pamh, &user, NULL);
190 pass = (pam_get_item(pamh, PAM_AUTHTOK, &item) == PAM_SUCCESS &&
194 pam_err = pam_get_authtok(pamh, PAM_AUTHTOK,
200 pam_err = openpam_borrow_cred(pamh, pwd);
208 pam_set_data(pamh, *kfn, psk, pam_ssh_free_key);
214 openpam_restore_cred(pamh);
222 openpam_get_option(pamh, "try_first_pass") != NULL)
    [all...]
  /src/lib/libpam/modules/pam_exec/
pam_exec.c 70 _pam_exec(pam_handle_t *pamh __unused, int flags __unused,
91 envlist = pam_getenvlist(pamh);
103 pam_err = pam_get_item(pamh, env_items[i].item, &item);
160 pam_sm_authenticate(pam_handle_t *pamh, int flags,
164 return (_pam_exec(pamh, flags, argc, argv));
168 pam_sm_setcred(pam_handle_t *pamh, int flags,
172 return (_pam_exec(pamh, flags, argc, argv));
176 pam_sm_acct_mgmt(pam_handle_t *pamh, int flags,
180 return (_pam_exec(pamh, flags, argc, argv));
184 pam_sm_open_session(pam_handle_t *pamh, int flags
    [all...]
  /src/lib/libpam/modules/pam_group/
pam_group.c 67 pam_sm_authenticate(pam_handle_t *pamh, int flags __unused,
81 if (pam_get_user(pamh, &user, NULL) != PAM_SUCCESS ||
86 if (pwd->pw_uid != 0 && openpam_get_option(pamh, "root_only"))
90 if (pam_get_item(pamh, PAM_RUSER, &ruser) != PAM_SUCCESS ||
96 auth = openpam_get_option(pamh, "authenticate") != NULL;
99 if ((group = openpam_get_option(pamh, "group")) == NULL)
117 if (openpam_get_option(pamh, "deny"))
120 pam_err = pam_prompt(pamh, PAM_ERROR_MSG, &promptresp,
130 if ((pam_err = authenticate(pamh, pwd, flags)) != PAM_SUCCESS)
133 if (openpam_get_option(pamh, "deny")
    [all...]
  /src/usr.bin/login/
login_pam.c 117 pam_handle_t *pamh = NULL; local in function:main
257 syslog(LOG_ERR, "%s: %s", msg, pam_strerror(pamh, pam_err)); \
258 warnx("%s: %s", msg, pam_strerror(pamh, pam_err)); \
259 pam_end(pamh, pam_err); \
263 pam_err = pam_start("login", username, &pamc, &pamh);
265 if (pamh != NULL)
269 pam_strerror(pamh, pam_err));
274 pam_err = pam_set_item(pamh, (item), (var)); \
322 switch(pam_err = pam_authenticate(pamh, pam_silent)) {
328 pam_err = pam_get_item(pamh, PAM_USER, &newuser)
    [all...]
  /src/lib/libpam/libpam/
pam_debug_log.c 49 _pam_verbose_error(pam_handle_t *pamh, int flags,
57 if ((flags & PAM_SILENT) || openpam_get_option(pamh, "no_warn"))
70 pam_error(pamh, "%.*s: %s: %s\n", (int)(ssize_t)(period - modname),
  /src/lib/libpam/modules/pam_rootok/
pam_rootok.c 57 pam_sm_authenticate(pam_handle_t *pamh, int flags __unused,
71 pam_sm_setcred(pam_handle_t *pamh __unused, int flags __unused,
  /src/lib/libpam/libpam/security/
pam_mod_misc.h 56 _pam_verbose_error(pamh, flags, __FILE__, __func__, __VA_ARGS__)
  /src/lib/libpam/modules/pam_login_access/
pam_login_access.c 61 pam_sm_acct_mgmt(pam_handle_t *pamh, int flags __unused,
68 pam_err = pam_get_item(pamh, PAM_USER, &user);
77 pam_err = pam_get_item(pamh, PAM_RHOST, &rhost);
81 pam_err = pam_get_item(pamh, PAM_TTY, &tty);
  /src/lib/libpam/modules/pam_self/
pam_self.c 60 pam_sm_authenticate(pam_handle_t *pamh, int flags __unused,
69 pam_err = pam_get_user(pamh, &luser, NULL);
78 if (uid == 0 && !openpam_get_option(pamh, OPT_ALLOW_ROOT))
90 pam_sm_setcred(pam_handle_t *pamh __unused, int flags __unused,
  /src/lib/libpam/modules/pam_lastlog/
pam_lastlog.c 114 pam_sm_open_session(pam_handle_t *pamh, int flags,
128 pam_err = pam_get_user(pamh, &user, NULL);
139 pam_err = pam_get_item(pamh, PAM_RHOST, &vrhost);
144 pam_err = pam_get_item(pamh, PAM_SOCKADDR, &vss);
149 pam_err = pam_get_item(pamh, PAM_TTY, &vtty);
159 if (pam_get_item(pamh, PAM_NUSER, &vnuser) != PAM_SUCCESS)
174 if (openpam_get_option(pamh, "no_nested") == NULL || nuser == NULL) {
189 dolastlogx(pamh, quiet, pwd, rhost, tty, ss, &now);
194 dolastlog(pamh, quiet, pwd, rhost, tty, &now);
198 if (openpam_get_option(pamh, "no_fail")
    [all...]
  /src/usr.bin/su/
su_pam.c 87 safe_pam_strerror(pam_handle_t *pamh, int pam_err) {
90 if ((msg = pam_strerror(pamh, pam_err)) != NULL)
118 pam_handle_t *pamh = NULL; local in function:main
226 if ((pam_err = pam_start("su", user, &pamc, &pamh)) != PAM_SUCCESS) {
227 if (pamh != NULL)
231 safe_pam_strerror(pamh, pam_err));
237 if ((pam_err = pam_set_item(pamh, (item), (var))) != PAM_SUCCESS) \
253 if ((pam_err = pam_authenticate(pamh, 0)) != PAM_SUCCESS) {
255 username, user, ontty(), safe_pam_strerror(pamh, pam_err));
256 (void)pam_end(pamh, pam_err)
    [all...]
  /src/libexec/rexecd/
rexecd.c 77 static pam_handle_t *pamh; variable in typeref:typename:pam_handle_t *
229 if (!pam_ok(pam_start("rexecd", user, &pamc, &pamh)) ||
230 !pam_ok(pam_set_item(pamh, PAM_RHOST, hostname)) ||
231 !pam_ok(pam_set_item(pamh, PAM_AUTHTOK, pass))) {
234 hostname, pam_strerror(pamh, pam_err));
237 if (!pam_ok(pam_authenticate(pamh, pam_flags)) ||
238 !pam_ok(pam_acct_mgmt(pamh, pam_flags))) {
241 hostname, pam_strerror(pamh, pam_err));
277 (void)pam_end(pamh, pam_err);
339 if (!pam_ok(pam_setcred(pamh, PAM_ESTABLISH_CRED))
    [all...]
  /src/lib/libpam/modules/pam_afslog/
pam_afslog.c 45 pam_sm_authenticate(pam_handle_t *pamh, int flags __unused,
52 pam_sm_setcred(pam_handle_t *pamh, int flags,
63 pam_get_item(pamh, PAM_SERVICE, &service);
72 ccname = pam_getenv(pamh, "KRB5CCNAME");
  /src/lib/libpam/modules/pam_nologin/
pam_nologin.c 69 pam_sm_authenticate(pam_handle_t *pamh, int flags __unused,
82 if ((retval = pam_get_user(pamh, &user, NULL)) != PAM_SUCCESS)
140 pam_error(pamh, "%s", mtmp);
151 pam_sm_setcred(pam_handle_t *pamh __unused, int flags __unused,
  /src/lib/libpam/modules/pam_radius/
pam_radius.c 159 do_accept(pam_handle_t *pamh, struct rad_handle *radh)
174 pam_set_item(pamh, PAM_USER, s);
186 do_challenge(pam_handle_t *pamh, struct rad_handle *radh, const char *user)
245 if ((retval = pam_get_item(pamh, PAM_CONV, &item)) != PAM_SUCCESS) {
265 pam_sm_authenticate(pam_handle_t *pamh, int flags __unused,
277 conf_file = openpam_get_option(pamh, PAM_OPT_CONF);
278 template_user = openpam_get_option(pamh, PAM_OPT_TEMPLATE_USER);
279 nas_id = openpam_get_option(pamh, PAM_OPT_NAS_ID);
280 nas_ipaddr = openpam_get_option(pamh, PAM_OPT_NAS_IPADDR);
282 retval = pam_get_user(pamh, &user, NULL)
    [all...]
  /src/lib/libpam/modules/pam_securetty/
pam_securetty.c 62 pam_sm_acct_mgmt(pam_handle_t *pamh __unused, int flags __unused,
74 pam_err = pam_get_user(pamh, &user, NULL);
88 pam_err = pam_get_item(pamh, PAM_TTY, &tty);
104 pam_err = pam_get_item(pamh, PAM_RHOST, &hostname);

Completed in 35 milliseconds

1 2