/src/lib/libpam/modules/pam_guest/ |
pam_guest.c | 75 pam_sm_authenticate(pam_handle_t *pamh, int flags __unused, 82 if (pam_get_user(pamh, &user, NULL) != PAM_SUCCESS || user == NULL) 86 if ((guests = openpam_get_option(pamh, "guests")) == NULL) 93 if (!openpam_get_option(pamh, "nopass")) { 94 err = pam_get_authtok(pamh, PAM_AUTHTOK, &authtok, NULL); 97 if (openpam_get_option(pamh, "pass_is_user") && 100 if (openpam_get_option(pamh, "pass_as_ruser")) 101 pam_set_item(pamh, PAM_RUSER, authtok); 106 pam_setenv(pamh, "GUEST", user, 1); 113 pam_sm_setcred(pam_handle_t * pamh __unused, int flags __unused [all...] |
/src/lib/libpam/modules/pam_echo/ |
pam_echo.c | 53 _pam_echo(pam_handle_t *pamh, int flags, 99 err = pam_get_item(pamh, item, &str); 109 return (pam_info(pamh, "%s", msg)); 113 pam_sm_authenticate(pam_handle_t *pamh, int flags, 117 return (_pam_echo(pamh, flags, argc, argv)); 121 pam_sm_setcred(pam_handle_t *pamh __unused, int flags __unused, 129 pam_sm_acct_mgmt(pam_handle_t *pamh, int flags, 133 return (_pam_echo(pamh, flags, argc, argv)); 137 pam_sm_open_session(pam_handle_t *pamh, int flags, 141 return (_pam_echo(pamh, flags, argc, argv)) [all...] |
/src/usr.bin/passwd/ |
pam_passwd.c | 58 static pam_handle_t *pamh; variable in typeref:typename:pam_handle_t * 67 warnx("%s: %s", (msg), pam_strerror(pamh, pam_err)); \ 110 pam_err = pam_start("passwd", username, &pamc, &pamh); 115 pam_err = pam_set_item(pamh, PAM_TTY, ttyname(STDERR_FILENO)); 119 pam_err = pam_set_item(pamh, PAM_RHOST, hostname); 122 pam_err = pam_set_item(pamh, PAM_RUSER, getlogin()); 126 pam_err = pam_chauthtok(pamh, 0); 133 pam_strerror(pamh, pam_err)); 136 pam_strerror(pamh, pam_err)); 145 pam_end(pamh, pam_err) [all...] |
/src/lib/libpam/modules/pam_unix/ |
pam_unix.c | 84 pam_sm_authenticate(pam_handle_t *pamh, int flags __unused, 94 if (openpam_get_option(pamh, PAM_OPT_AUTH_AS_SELF)) { 98 retval = pam_get_user(pamh, &user, NULL); 110 openpam_get_option(pamh, PAM_OPT_NULLOK)) 119 retval = pam_get_authtok(pamh, PAM_AUTHTOK, &pass, NULL); 133 pam_sm_setcred(pam_handle_t *pamh __unused, int flags __unused, 145 pam_sm_acct_mgmt(pam_handle_t *pamh, int flags __unused, 156 retval = pam_get_user(pamh, &user, NULL); 197 pam_error(pamh, "Warning: your account expires on %s", 209 pam_error(pamh, "Warning: your password expires on %s" [all...] |
/src/lib/libpam/modules/pam_deny/ |
pam_deny.c | 49 pam_sm_authenticate(pam_handle_t *pamh, int flags __unused, 55 if ((r = pam_get_user(pamh, &user, NULL)) != PAM_SUCCESS) 62 pam_sm_setcred(pam_handle_t *pamh __unused, int flags __unused, 70 pam_sm_acct_mgmt(pam_handle_t *pamh __unused, int flags __unused, 78 pam_sm_chauthtok(pam_handle_t *pamh __unused, int flags, 100 pam_sm_open_session(pam_handle_t *pamh __unused, int flags __unused, 108 pam_sm_close_session(pam_handle_t *pamh __unused, int flags __unused,
|
/src/lib/libpam/modules/pam_permit/ |
pam_permit.c | 47 pam_sm_authenticate(pam_handle_t *pamh, int flags __unused, 53 if ((r = pam_get_user(pamh, &user, NULL)) != PAM_SUCCESS) 60 pam_sm_setcred(pam_handle_t *pamh __unused, int flags __unused, 68 pam_sm_acct_mgmt(pam_handle_t *pamh __unused, int flags __unused, 76 pam_sm_chauthtok(pam_handle_t *pamh __unused, int flags __unused, 84 pam_sm_open_session(pam_handle_t *pamh __unused, int flags __unused, 92 pam_sm_close_session(pam_handle_t *pamh __unused, int flags __unused,
|
/src/lib/libpam/modules/pam_chroot/ |
pam_chroot.c | 59 pam_sm_open_session(pam_handle_t *pamh, int flags __unused, 67 if (pam_get_user(pamh, &user, NULL) != PAM_SUCCESS || 72 if (pwd->pw_uid == 0 && !openpam_get_option(pamh, "also_root")) 85 } else if ((dir = openpam_get_option(pamh, "dir")) != NULL) { 86 if ((cwd = openpam_get_option(pamh, "cwd")) == NULL) 89 if (openpam_get_option(pamh, "always")) { 107 pam_setenv(pamh, "HOME", cwd, 1); 112 pam_sm_close_session(pam_handle_t *pamh __unused, int flags __unused,
|
/src/lib/libpam/modules/pam_rhosts/ |
pam_rhosts.c | 59 pam_sm_authenticate(pam_handle_t *pamh, int flags __unused, 68 err = pam_get_user(pamh, &user, NULL); 76 openpam_get_option(pamh, OPT_ALLOW_ROOT) == NULL) 79 err = pam_get_item(pamh, PAM_RUSER, &ruser); 83 err = pam_get_item(pamh, PAM_RHOST, &rhost); 96 pam_sm_setcred(pam_handle_t *pamh __unused, int flags __unused,
|
/src/lib/libpam/modules/pam_skey/ |
pam_skey.c | 54 pam_sm_authenticate(pam_handle_t *pamh, int flags __unused, 62 if (openpam_get_option(pamh, PAM_OPT_AUTH_AS_SELF)) { 65 retval = pam_get_user(pamh, &user, NULL); 83 retval = pam_get_authtok(pamh, PAM_AUTHTOK, &pass, skprompt); 89 pam_error(pamh, "Unable to copy S/Key response"); 103 pam_sm_setcred(pam_handle_t *pamh __unused, int flags __unused,
|
/src/lib/libpam/modules/pam_ssh/ |
pam_ssh.c | 152 pam_ssh_free_key(pam_handle_t *pamh __unused, 164 pam_sm_authenticate(pam_handle_t *pamh, int flags __unused, 174 nullok = (openpam_get_option(pamh, "nullok") != NULL); 180 pam_err = pam_get_user(pamh, &user, NULL); 190 pass = (pam_get_item(pamh, PAM_AUTHTOK, &item) == PAM_SUCCESS && 194 pam_err = pam_get_authtok(pamh, PAM_AUTHTOK, 200 pam_err = openpam_borrow_cred(pamh, pwd); 208 pam_set_data(pamh, *kfn, psk, pam_ssh_free_key); 214 openpam_restore_cred(pamh); 222 openpam_get_option(pamh, "try_first_pass") != NULL) [all...] |
/src/lib/libpam/modules/pam_exec/ |
pam_exec.c | 70 _pam_exec(pam_handle_t *pamh __unused, int flags __unused, 91 envlist = pam_getenvlist(pamh); 103 pam_err = pam_get_item(pamh, env_items[i].item, &item); 160 pam_sm_authenticate(pam_handle_t *pamh, int flags, 164 return (_pam_exec(pamh, flags, argc, argv)); 168 pam_sm_setcred(pam_handle_t *pamh, int flags, 172 return (_pam_exec(pamh, flags, argc, argv)); 176 pam_sm_acct_mgmt(pam_handle_t *pamh, int flags, 180 return (_pam_exec(pamh, flags, argc, argv)); 184 pam_sm_open_session(pam_handle_t *pamh, int flags [all...] |
/src/lib/libpam/modules/pam_group/ |
pam_group.c | 67 pam_sm_authenticate(pam_handle_t *pamh, int flags __unused, 81 if (pam_get_user(pamh, &user, NULL) != PAM_SUCCESS || 86 if (pwd->pw_uid != 0 && openpam_get_option(pamh, "root_only")) 90 if (pam_get_item(pamh, PAM_RUSER, &ruser) != PAM_SUCCESS || 96 auth = openpam_get_option(pamh, "authenticate") != NULL; 99 if ((group = openpam_get_option(pamh, "group")) == NULL) 117 if (openpam_get_option(pamh, "deny")) 120 pam_err = pam_prompt(pamh, PAM_ERROR_MSG, &promptresp, 130 if ((pam_err = authenticate(pamh, pwd, flags)) != PAM_SUCCESS) 133 if (openpam_get_option(pamh, "deny") [all...] |
/src/usr.bin/login/ |
login_pam.c | 117 pam_handle_t *pamh = NULL; local in function:main 257 syslog(LOG_ERR, "%s: %s", msg, pam_strerror(pamh, pam_err)); \ 258 warnx("%s: %s", msg, pam_strerror(pamh, pam_err)); \ 259 pam_end(pamh, pam_err); \ 263 pam_err = pam_start("login", username, &pamc, &pamh); 265 if (pamh != NULL) 269 pam_strerror(pamh, pam_err)); 274 pam_err = pam_set_item(pamh, (item), (var)); \ 322 switch(pam_err = pam_authenticate(pamh, pam_silent)) { 328 pam_err = pam_get_item(pamh, PAM_USER, &newuser) [all...] |
/src/lib/libpam/libpam/ |
pam_debug_log.c | 49 _pam_verbose_error(pam_handle_t *pamh, int flags, 57 if ((flags & PAM_SILENT) || openpam_get_option(pamh, "no_warn")) 70 pam_error(pamh, "%.*s: %s: %s\n", (int)(ssize_t)(period - modname),
|
/src/lib/libpam/modules/pam_rootok/ |
pam_rootok.c | 57 pam_sm_authenticate(pam_handle_t *pamh, int flags __unused, 71 pam_sm_setcred(pam_handle_t *pamh __unused, int flags __unused,
|
/src/lib/libpam/libpam/security/ |
pam_mod_misc.h | 56 _pam_verbose_error(pamh, flags, __FILE__, __func__, __VA_ARGS__)
|
/src/lib/libpam/modules/pam_login_access/ |
pam_login_access.c | 61 pam_sm_acct_mgmt(pam_handle_t *pamh, int flags __unused, 68 pam_err = pam_get_item(pamh, PAM_USER, &user); 77 pam_err = pam_get_item(pamh, PAM_RHOST, &rhost); 81 pam_err = pam_get_item(pamh, PAM_TTY, &tty);
|
/src/lib/libpam/modules/pam_self/ |
pam_self.c | 60 pam_sm_authenticate(pam_handle_t *pamh, int flags __unused, 69 pam_err = pam_get_user(pamh, &luser, NULL); 78 if (uid == 0 && !openpam_get_option(pamh, OPT_ALLOW_ROOT)) 90 pam_sm_setcred(pam_handle_t *pamh __unused, int flags __unused,
|
/src/lib/libpam/modules/pam_lastlog/ |
pam_lastlog.c | 114 pam_sm_open_session(pam_handle_t *pamh, int flags, 128 pam_err = pam_get_user(pamh, &user, NULL); 139 pam_err = pam_get_item(pamh, PAM_RHOST, &vrhost); 144 pam_err = pam_get_item(pamh, PAM_SOCKADDR, &vss); 149 pam_err = pam_get_item(pamh, PAM_TTY, &vtty); 159 if (pam_get_item(pamh, PAM_NUSER, &vnuser) != PAM_SUCCESS) 174 if (openpam_get_option(pamh, "no_nested") == NULL || nuser == NULL) { 189 dolastlogx(pamh, quiet, pwd, rhost, tty, ss, &now); 194 dolastlog(pamh, quiet, pwd, rhost, tty, &now); 198 if (openpam_get_option(pamh, "no_fail") [all...] |
/src/usr.bin/su/ |
su_pam.c | 87 safe_pam_strerror(pam_handle_t *pamh, int pam_err) { 90 if ((msg = pam_strerror(pamh, pam_err)) != NULL) 118 pam_handle_t *pamh = NULL; local in function:main 226 if ((pam_err = pam_start("su", user, &pamc, &pamh)) != PAM_SUCCESS) { 227 if (pamh != NULL) 231 safe_pam_strerror(pamh, pam_err)); 237 if ((pam_err = pam_set_item(pamh, (item), (var))) != PAM_SUCCESS) \ 253 if ((pam_err = pam_authenticate(pamh, 0)) != PAM_SUCCESS) { 255 username, user, ontty(), safe_pam_strerror(pamh, pam_err)); 256 (void)pam_end(pamh, pam_err) [all...] |
/src/libexec/rexecd/ |
rexecd.c | 77 static pam_handle_t *pamh; variable in typeref:typename:pam_handle_t * 229 if (!pam_ok(pam_start("rexecd", user, &pamc, &pamh)) || 230 !pam_ok(pam_set_item(pamh, PAM_RHOST, hostname)) || 231 !pam_ok(pam_set_item(pamh, PAM_AUTHTOK, pass))) { 234 hostname, pam_strerror(pamh, pam_err)); 237 if (!pam_ok(pam_authenticate(pamh, pam_flags)) || 238 !pam_ok(pam_acct_mgmt(pamh, pam_flags))) { 241 hostname, pam_strerror(pamh, pam_err)); 277 (void)pam_end(pamh, pam_err); 339 if (!pam_ok(pam_setcred(pamh, PAM_ESTABLISH_CRED)) [all...] |
/src/lib/libpam/modules/pam_afslog/ |
pam_afslog.c | 45 pam_sm_authenticate(pam_handle_t *pamh, int flags __unused, 52 pam_sm_setcred(pam_handle_t *pamh, int flags, 63 pam_get_item(pamh, PAM_SERVICE, &service); 72 ccname = pam_getenv(pamh, "KRB5CCNAME");
|
/src/lib/libpam/modules/pam_nologin/ |
pam_nologin.c | 69 pam_sm_authenticate(pam_handle_t *pamh, int flags __unused, 82 if ((retval = pam_get_user(pamh, &user, NULL)) != PAM_SUCCESS) 140 pam_error(pamh, "%s", mtmp); 151 pam_sm_setcred(pam_handle_t *pamh __unused, int flags __unused,
|
/src/lib/libpam/modules/pam_radius/ |
pam_radius.c | 159 do_accept(pam_handle_t *pamh, struct rad_handle *radh) 174 pam_set_item(pamh, PAM_USER, s); 186 do_challenge(pam_handle_t *pamh, struct rad_handle *radh, const char *user) 245 if ((retval = pam_get_item(pamh, PAM_CONV, &item)) != PAM_SUCCESS) { 265 pam_sm_authenticate(pam_handle_t *pamh, int flags __unused, 277 conf_file = openpam_get_option(pamh, PAM_OPT_CONF); 278 template_user = openpam_get_option(pamh, PAM_OPT_TEMPLATE_USER); 279 nas_id = openpam_get_option(pamh, PAM_OPT_NAS_ID); 280 nas_ipaddr = openpam_get_option(pamh, PAM_OPT_NAS_IPADDR); 282 retval = pam_get_user(pamh, &user, NULL) [all...] |
/src/lib/libpam/modules/pam_securetty/ |
pam_securetty.c | 62 pam_sm_acct_mgmt(pam_handle_t *pamh __unused, int flags __unused, 74 pam_err = pam_get_user(pamh, &user, NULL); 88 pam_err = pam_get_item(pamh, PAM_TTY, &tty); 104 pam_err = pam_get_item(pamh, PAM_RHOST, &hostname);
|