/dports/net/quagga/quagga-1.2.4/vtysh/ |
H A D | vtysh_user.c | 53 pam_handle_t *pamh = NULL; in vtysh_pam() local 56 ret = pam_start(QUAGGA_PROGNAME, user, &conv, &pamh); in vtysh_pam() 61 ret = pam_authenticate (pamh, 0); in vtysh_pam() 69 ret = pam_acct_mgmt (pamh, 0); in vtysh_pam() 85 if (pam_end (pamh, ret) != PAM_SUCCESS) in vtysh_pam() 87 pamh = NULL; in vtysh_pam()
|
/dports/security/pwauth/pwauth-2.3.11/ |
H A D | auth_pam.c | 159 pam_handle_t *pamh= NULL; local 178 retval= pam_start("pwauth", login, &conv, &pamh); 181 retval= pam_authenticate(pamh, PAM_SILENT); 184 retval= pam_acct_mgmt(pamh, 0); /* permitted access? */ 186 if (pam_end(pamh,retval) != PAM_SUCCESS) /* close PAM */ 188 pamh= NULL;
|
/dports/security/calife/calife-3.0.6/ |
H A D | calife.c | 201 pam_handle_t *pamh = NULL; variable 512 if (pamh) in main() 517 pam_strerror (pamh, e)); in main() 523 pam_strerror (pamh, e)); in main() 639 if (pamh) in main() 641 if ((e = pam_setcred (pamh, PAM_DELETE_CRED)) != \ in main() 644 pam_strerror(pamh, e)); in main() 648 pam_strerror(pamh, e)); in main() 650 if ((e = pam_end (pamh, e)) != PAM_SUCCESS) in main() 652 pam_strerror(pamh, e)); in main() [all …]
|
/dports/security/pam-modules/pam-modules-2.2/lib/ |
H A D | graypam.h | 74 #define MAKE_STR(pamh, str, var) \ 75 gray_make_str(pamh,str,#var,&var) 101 void gray_cleanup_string(pam_handle_t *pamh, void *x, int error_status); 102 void gray_cleanup_regex(pam_handle_t *pamh, void *x, int error_status); 103 void gray_make_str(pam_handle_t *pamh, const char *str, const char *name, 139 int gray_converse(pam_handle_t *pamh, int nargs, 183 void gray_expand_argv(pam_handle_t *pamh, int argc, const char **argv, 185 void gray_expand_string(pam_handle_t *pamh, const char *str,
|
H A D | converse.c | 20 gray_converse(pam_handle_t *pamh, 28 retval = pam_get_item(pamh, PAM_CONV, (const void **) &conv); 39 pam_strerror(pamh, retval)); in texinfo-master-menu-list-recursive() 44 pam_strerror(pamh, retval));
|
H A D | vartab.c | 73 get_variable(pam_handle_t *pamh, const char *str, gray_slist_t slist, in get_variable() argument 117 rc = pam_get_item(pamh, kw->code, (const void**) &val); in get_variable() 121 kw->name, pam_strerror(pamh, rc)); in get_variable() 142 gray_expand_argv(pam_handle_t *pamh, int argc, const char **argv, in gray_expand_argv() argument 160 if (get_variable(pamh, p, slist, &p)) in gray_expand_argv() 173 gray_expand_string(pam_handle_t *pamh, const char *str, gray_slist_t slist) in gray_expand_string() argument 192 if (get_variable(pamh, p, slist, &p)) { in gray_expand_string()
|
H A D | mem.c | 103 gray_cleanup_string(pam_handle_t *pamh, void *x, int error_status) 109 gray_cleanup_regex(pam_handle_t *pamh, void *x, int error_status) 115 gray_make_str(pam_handle_t *pamh, const char *str, const char *name, 121 retval = pam_set_data(pamh, name, (void *)newstr, gray_cleanup_string); 126 pam_strerror(pamh, retval));
|
/dports/security/pam_p11/pam_p11-0.3.1/src/ |
H A D | login.c | 25 extern int pam_sm_test(pam_handle_t *pamh, int flags, int argc, const char **argv); 27 int pam_sm_test(pam_handle_t *pamh, int flags, int argc, const char **argv) in pam_sm_test() argument 31 r = pam_sm_authenticate(pamh, flags, argc, argv); in pam_sm_test() 35 r = pam_sm_acct_mgmt(pamh, flags, argc, argv); in pam_sm_test()
|
/dports/mail/mailutils/mailutils-3.13/libmu_auth/ |
H A D | pam.c | 155 pam_handle_t *pamh; in mu_authenticate_pam() local 165 pamerror = pam_start (mu_pam_service, _user, &PAM_conversation, &pamh); in mu_authenticate_pam() 167 pamerror = pam_authenticate (pamh, 0); in mu_authenticate_pam() 169 pamerror = pam_acct_mgmt (pamh, 0); in mu_authenticate_pam() 171 pamerror = pam_setcred (pamh, PAM_ESTABLISH_CRED); in mu_authenticate_pam() 173 pam_end (pamh, PAM_SUCCESS); in mu_authenticate_pam()
|
/dports/mail/mdpop3d/mdpop3d-0.97/ |
H A D | mdpop3d.c | 341 static pam_handle_t *pamh; variable 411 rhost, pam_strerror(pamh,r)); in checkpass() 418 PAMOK(pam_authenticate(pamh, 0)) && in checkpass() 419 PAMOK(pam_acct_mgmt(pamh, 0)) && in checkpass() 436 pam_strerror(pamh, r)); in checkpass() 438 pamh = NULL; in checkpass() 500 pam_end(pamh, r); in auth() 501 pamh = NULL; in auth() 629 if (pamh) { in die() 1000 if (pamh) { in main() [all …]
|
/dports/net/gnu-dico/dico-2.10/modules/pam/ |
H A D | pam.c | 112 pam_handle_t *pamh; in db_check_pass() local 121 &_dico_pam_conv, &pamh); in db_check_pass() 123 pamerror = pam_authenticate(pamh, 0); in db_check_pass() 125 pamerror = pam_acct_mgmt(pamh, 0); in db_check_pass() 127 pamerror = pam_setcred(pamh, PAM_ESTABLISH_CRED); in db_check_pass() 130 pam_end(pamh, PAM_SUCCESS); in db_check_pass()
|
/dports/security/pam_helper/pam_helper-1.1/ |
H A D | pam_helper.c | 60 pam_handle_t *pamh = NULL; in main() local 101 status = pam_start(service, c.user, &pc, &pamh); in main() 109 status = pam_authenticate(pamh, 0); in main() 113 acct_status = pam_acct_mgmt(pamh, 0); in main() 114 acct_status = pam_setcred(pamh, PAM_REINITIALIZE_CRED); in main() 124 pam_end(pamh, status); in main()
|
/dports/sysutils/webmin/webmin-1.981/ |
H A D | password_change.cgi | 117 $pamh = new Authen::PAM($service, $in{'user'}, \&pam_check_func); 118 $rv = $pamh->pam_authenticate(); 121 $pamh = undef; 131 $pamh = new Authen::PAM("passwd", $in{'user'}, \&pam_change_func); 132 $rv = $pamh->pam_chauthtok(); 135 print TEMP ($messages || $pamh->pam_strerror($rv)),"\n"; 146 $pamh = undef;
|
/dports/sysutils/usermin/usermin-1.830/ |
H A D | password_change.cgi | 117 $pamh = new Authen::PAM($service, $in{'user'}, \&pam_check_func); 118 $rv = $pamh->pam_authenticate(); 121 $pamh = undef; 131 $pamh = new Authen::PAM("passwd", $in{'user'}, \&pam_change_func); 132 $rv = $pamh->pam_chauthtok(); 135 print TEMP ($messages || $pamh->pam_strerror($rv)),"\n"; 146 $pamh = undef;
|
/dports/sysutils/linrename/util-linux-2.25.2/login-utils/ |
H A D | su-common.c | 120 static pam_handle_t *pamh = NULL; variable 239 pam_close_session (pamh, 0); in cleanup_pam() 244 pam_end(pamh, retcode); in cleanup_pam() 263 env = pam_getenvlist (pamh); in export_pamenv() 281 retval = pam_open_session (pamh, 0); in create_watching_parent() 286 pam_strerror (pamh, retval)); in create_watching_parent() 453 retval = pam_set_item (pamh, PAM_TTY, tty); in authenticate() 477 retval = pam_authenticate (pamh, 0); in authenticate() 481 retval = pam_acct_mgmt (pamh, 0); in authenticate() 498 msg = pam_strerror(pamh, retval); in authenticate() [all …]
|
/dports/news/inn-current/inn-2.7-20211226/authprogs/ |
H A D | ckpasswd.c | 126 pam_handle_t *pamh; in auth_pam() local 132 status = pam_start("nnrpd", username, &conv, &pamh); in auth_pam() 134 die("pam_start failed: %s", pam_strerror(pamh, status)); in auth_pam() 135 status = pam_authenticate(pamh, PAM_SILENT); in auth_pam() 137 die("pam_authenticate failed: %s", pam_strerror(pamh, status)); in auth_pam() 138 status = pam_acct_mgmt(pamh, PAM_SILENT); in auth_pam() 140 die("pam_acct_mgmt failed: %s", pam_strerror(pamh, status)); in auth_pam() 141 status = pam_end(pamh, status); in auth_pam() 143 die("pam_end failed: %s", pam_strerror(pamh, status)); in auth_pam()
|
/dports/news/inn/inn-2.6.4/authprogs/ |
H A D | ckpasswd.c | 128 pam_handle_t *pamh; in auth_pam() local 134 status = pam_start("nnrpd", username, &conv, &pamh); in auth_pam() 136 die("pam_start failed: %s", pam_strerror(pamh, status)); in auth_pam() 137 status = pam_authenticate(pamh, PAM_SILENT); in auth_pam() 139 die("pam_authenticate failed: %s", pam_strerror(pamh, status)); in auth_pam() 140 status = pam_acct_mgmt(pamh, PAM_SILENT); in auth_pam() 142 die("pam_acct_mgmt failed: %s", pam_strerror(pamh, status)); in auth_pam() 143 status = pam_end(pamh, status); in auth_pam() 145 die("pam_end failed: %s", pam_strerror(pamh, status)); in auth_pam()
|
/dports/security/pam_krb5/pam-krb5-4.9/pam-util/ |
H A D | logging.c | 111 pam_syslog(pargs->pamh, priority, "(user %s) %s", pargs->user, msg); in log_vplain() 114 pam_vsyslog(pargs->pamh, priority, fmt, args); in log_vplain() 163 pam_strerror(pargs->pamh, status)); in log_pam() 237 pam_syslog(pargs->pamh, LOG_DEBUG, "%s: entry", func); in LOG_FUNCTION() 239 pam_syslog(pargs->pamh, LOG_DEBUG, "%s: entry (%s)", func, out); in LOG_FUNCTION() 268 pam_get_item(pargs->pamh, PAM_RUSER, (PAM_CONST void **) &ruser); in putil_log_failure() 269 pam_get_item(pargs->pamh, PAM_RHOST, (PAM_CONST void **) &rhost); in putil_log_failure() 270 pam_get_item(pargs->pamh, PAM_TTY, (PAM_CONST void **) &tty); in putil_log_failure() 273 pam_syslog(pargs->pamh, LOG_NOTICE, "%s; logname=%s uid=%ld euid=%ld" in putil_log_failure()
|
/dports/sysutils/shlock/inn-2.6.4/authprogs/ |
H A D | ckpasswd.c | 128 pam_handle_t *pamh; in auth_pam() local 134 status = pam_start("nnrpd", username, &conv, &pamh); in auth_pam() 136 die("pam_start failed: %s", pam_strerror(pamh, status)); in auth_pam() 137 status = pam_authenticate(pamh, PAM_SILENT); in auth_pam() 139 die("pam_authenticate failed: %s", pam_strerror(pamh, status)); in auth_pam() 140 status = pam_acct_mgmt(pamh, PAM_SILENT); in auth_pam() 142 die("pam_acct_mgmt failed: %s", pam_strerror(pamh, status)); in auth_pam() 143 status = pam_end(pamh, status); in auth_pam() 145 die("pam_end failed: %s", pam_strerror(pamh, status)); in auth_pam()
|
/dports/security/pam_search_list/pam-search-list-0.1/ |
H A D | pam_search_list.c | 57 pam_sm_acct_mgmt(pam_handle_t *pamh, int flags __unused, in pam_sm_acct_mgmt() argument 68 pam_err = pam_get_user(pamh, &user, NULL); in pam_sm_acct_mgmt() 74 openpam_get_option(pamh, OPT_ALLOW_ROOT) != NULL) in pam_sm_acct_mgmt() 79 if ((list_filename = openpam_get_option(pamh, "path")) == NULL) { in pam_sm_acct_mgmt() 115 allow = (openpam_get_option(pamh, "disallow") == NULL); in pam_sm_acct_mgmt()
|
/dports/net/gnu-radius/radius-1.6.1/radiusd/ |
H A D | pam.c | 101 pam_handle_t *pamh = NULL; in pam_pass() local 122 rc = pam_start(pamauth, name, &conv, &pamh); in pam_pass() 127 rc = pam_authenticate(pamh, 0); in pam_pass() 133 rc = pam_acct_mgmt(pamh, 0); in pam_pass() 137 pam_end(pamh, 0); in pam_pass()
|
/dports/emulators/qemu42/qemu-4.2.1/authz/ |
H A D | pamacct.c | 36 pam_handle_t *pamh = NULL; in qauthz_pam_is_allowed() local 43 &pamh); in qauthz_pam_is_allowed() 50 ret = pam_acct_mgmt(pamh, PAM_SILENT); in qauthz_pam_is_allowed() 51 pam_end(pamh, ret); in qauthz_pam_is_allowed() 54 identity, pam_strerror(pamh, ret)); in qauthz_pam_is_allowed()
|
/dports/emulators/qemu/qemu-6.2.0/authz/ |
H A D | pamacct.c | 36 pam_handle_t *pamh = NULL; in qauthz_pam_is_allowed() local 43 &pamh); in qauthz_pam_is_allowed() 50 ret = pam_acct_mgmt(pamh, PAM_SILENT); in qauthz_pam_is_allowed() 51 pam_end(pamh, ret); in qauthz_pam_is_allowed() 54 identity, pam_strerror(pamh, ret)); in qauthz_pam_is_allowed()
|
/dports/emulators/qemu60/qemu-6.0.0/authz/ |
H A D | pamacct.c | 36 pam_handle_t *pamh = NULL; in qauthz_pam_is_allowed() local 43 &pamh); in qauthz_pam_is_allowed() 50 ret = pam_acct_mgmt(pamh, PAM_SILENT); in qauthz_pam_is_allowed() 51 pam_end(pamh, ret); in qauthz_pam_is_allowed() 54 identity, pam_strerror(pamh, ret)); in qauthz_pam_is_allowed()
|
/dports/emulators/qemu5/qemu-5.2.0/authz/ |
H A D | pamacct.c | 36 pam_handle_t *pamh = NULL; in qauthz_pam_is_allowed() local 43 &pamh); in qauthz_pam_is_allowed() 50 ret = pam_acct_mgmt(pamh, PAM_SILENT); in qauthz_pam_is_allowed() 51 pam_end(pamh, ret); in qauthz_pam_is_allowed() 54 identity, pam_strerror(pamh, ret)); in qauthz_pam_is_allowed()
|