/dports/security/pam_script/pam_script-1.1.9/ |
H A D | pam_script.c | 62 {if (pam_get_item(pamh, key, &envval) == PAM_SUCCESS) \ 116 retval = pam_get_user(pamh, user, NULL); in pam_script_get_user() 119 pam_strerror(pamh,retval)); in pam_script_get_user() 124 retval = pam_set_item(pamh, PAM_USER, in pam_script_get_user() 184 static int pam_script_exec(pam_handle_t *pamh, in pam_script_exec() argument 348 pam_set_item(pamh, authtok, password); in pam_script_set_authtok() 390 pam_get_item(pamh, PAM_AUTHTOK, (void*) &password); in pam_sm_authenticate() 398 return pam_script_exec(pamh, "auth", PAM_SCRIPT_AUTH, in pam_sm_authenticate() 456 pam_get_item(pamh, PAM_OLDAUTHTOK, (void*) &password); in pam_sm_chauthtok() 468 pam_get_item(pamh, PAM_AUTHTOK, (void*) &password); in pam_sm_chauthtok() [all …]
|
/dports/security/pam_krb5-rh/pam_krb5-2.4.13/src/ |
H A D | harness.c | 196 pam_handle_t *pamh; in main() local 231 pamh = NULL; in main() 270 if (pamh == NULL) { in main() 284 ret = pam_set_item(pamh, PAM_OLDAUTHTOK, in main() 296 ret = pam_end(pamh, 0); in main() 298 pamh = NULL; in main() 313 ret ? pam_strerror(pamh, ret) : ""); in main() 317 envlist = pam_getenvlist(pamh); in main() 414 if (pamh != NULL) { in main() 419 ret = pam_end(pamh, 0); in main() [all …]
|
/dports/devel/util-linux/util-linux-2.36/login-utils/ |
H A D | auth.c | 25 warnx("%s", pam_strerror(pamh, retcode)); in pam_fail_check() 26 pam_end(pamh, retcode); in pam_fail_check() 33 pam_handle_t *pamh = NULL; in auth_pam() local 42 if (pam_fail_check(pamh, retcode)) in auth_pam() 45 retcode = pam_authenticate(pamh, 0); in auth_pam() 46 if (pam_fail_check(pamh, retcode)) in auth_pam() 49 retcode = pam_acct_mgmt(pamh, 0); in auth_pam() 53 if (pam_fail_check(pamh, retcode)) in auth_pam() 56 retcode = pam_setcred(pamh, 0); in auth_pam() 57 if (pam_fail_check(pamh, retcode)) in auth_pam() [all …]
|
/dports/sysutils/py-google-compute-engine/compute-image-packages-20190522/packages/google-compute-engine-oslogin/pam_module/ |
H A D | pam_oslogin_login.cc | 103 PAM_SYSLOG(pamh, LOG_INFO, in pam_sm_acct_mgmt() 111 PAM_SYSLOG(pamh, LOG_INFO, in pam_sm_acct_mgmt() 156 PAM_SYSLOG(pamh, LOG_ERR, in pam_sm_acct_mgmt() 164 PAM_SYSLOG(pamh, LOG_ERR, in pam_sm_acct_mgmt() 180 PAM_SYSLOG(pamh, LOG_ERR, in pam_sm_acct_mgmt() 204 pam_error(pamh, "Unable to get user input"); in pam_sm_acct_mgmt() 209 pam_error(pamh, "Unable to get user input"); in pam_sm_acct_mgmt() 212 pam_error(pamh, "Invalid option"); in pam_sm_acct_mgmt() 222 PAM_SYSLOG(pamh, LOG_ERR, in pam_sm_acct_mgmt() 233 pam_error(pamh, "Unable to get user input"); in pam_sm_acct_mgmt() [all …]
|
/dports/sysutils/google-compute-engine-oslogin/guest-oslogin-5a710bb/src/pam/ |
H A D | pam_oslogin_login.cc | 103 PAM_SYSLOG(pamh, LOG_INFO, in pam_sm_acct_mgmt() 111 PAM_SYSLOG(pamh, LOG_INFO, in pam_sm_acct_mgmt() 156 PAM_SYSLOG(pamh, LOG_ERR, in pam_sm_authenticate() 164 PAM_SYSLOG(pamh, LOG_ERR, in pam_sm_authenticate() 180 PAM_SYSLOG(pamh, LOG_ERR, in pam_sm_authenticate() 204 pam_error(pamh, "Unable to get user input"); in pam_sm_authenticate() 209 pam_error(pamh, "Unable to get user input"); in pam_sm_authenticate() 212 pam_error(pamh, "Invalid option"); in pam_sm_authenticate() 222 PAM_SYSLOG(pamh, LOG_ERR, in pam_sm_authenticate() 233 pam_error(pamh, "Unable to get user input"); in pam_sm_authenticate() [all …]
|
/dports/security/fprintd/libfprint-fprintd-V_0_8_1/pam/ |
H A D | pam_fprintd.c | 49 #define D(pamh, ...) { \ argument 53 send_debug_msg (pamh, s); \ 205 D(pamh, "No devices found\n"); in open_device() 213 D(pamh, "Using device %s\n", path); in open_device() 230 pam_handle_t *pamh; member 249 send_err_msg (data->pamh, msg); in verify_result() 260 send_info_msg (data->pamh, msg); in verify_finger_selected() 285 data->pamh = pamh; in do_verify() 449 release_device (pamh, dev); in do_auth() 484 r = pam_get_user(pamh, &username, NULL); in pam_sm_authenticate() [all …]
|
/dports/security/pam_krb5/pam-krb5-4.9/tests/fakepam/ |
H A D | general.c | 68 *pamh = handle; in pam_start() 80 pam_end(pam_handle_t *pamh, int status) in pam_end() argument 85 if (pamh->environ != NULL) { in pam_end() 87 free(pamh->environ[i]); in pam_end() 88 free(pamh->environ); in pam_end() 90 free(pamh->authtok); in pam_end() 91 free(pamh->oldauthtok); in pam_end() 92 free(pamh->rhost); in pam_end() 93 free(pamh->ruser); in pam_end() 94 free(pamh->tty); in pam_end() [all …]
|
/dports/security/pam-modules/pam-modules-2.2/pam_sql/ |
H A D | pam_sql.c | 67 retval = pam_get_item(pamh, PAM_AUTHTOK, in _pam_get_password() 73 pam_strerror(pamh, retval)); in _pam_get_password() 103 pam_set_item(pamh, PAM_AUTHTOK, token); in _pam_get_password() 107 pam_strerror(pamh, retval)); in _pam_get_password() 120 retval = pam_set_data(pamh, "password", in _pam_get_password() 126 pam_strerror(pamh, retval)); in _pam_get_password() 135 pam_strerror(pamh, retval)); in _pam_get_password() 176 gray_expand_string(pamh, query, slist); in gpam_sql_get_query() 200 gray_expand_string(pamh, query, slist); in get_query2() 244 get_query2(pamh, "passwd-query", in pam_sm_authenticate() [all …]
|
/dports/security/shishi/shishi-1.0.2/extra/pam_shishi/ |
H A D | pam_shishi.c | 70 pam_sm_authenticate (pam_handle_t * pamh, in pam_sm_authenticate() argument 99 retval = pam_get_user (pamh, &user, NULL); in pam_sm_authenticate() 186 D (("done. [%s]", pam_strerror (pamh, retval))); in pam_sm_authenticate() 199 retval = pam_get_data (pamh, "shishi_setcred_return", in pam_sm_setcred() 223 D (("done. [%s]", pam_strerror (pamh, retval))); in pam_sm_setcred() 238 D (("done. [%s]", pam_strerror (pamh, retval))); in pam_sm_acct_mgmt() 244 pam_sm_open_session (pam_handle_t * pamh, in pam_sm_open_session() argument 254 D (("done. [%s]", pam_strerror (pamh, retval))); in pam_sm_open_session() 260 pam_sm_close_session (pam_handle_t * pamh, in pam_sm_close_session() argument 270 D (("done. [%s]", pam_strerror (pamh, retval))); in pam_sm_close_session() [all …]
|
/dports/security/pam_ssh/pam_ssh-8.0/ |
H A D | pam_ssh.c | 173 pam_err = pam_get_user(pamh, &user, NULL); in pam_sm_authenticate() 193 pam_err = openpam_borrow_cred(pamh, pwd); in pam_sm_authenticate() 207 openpam_restore_cred(pamh); in pam_sm_authenticate() 216 pam_set_item(pamh, PAM_AUTHTOK, NULL); in pam_sm_authenticate() 268 pam_setenv(pamh, key, val, 1); in pam_ssh_process_agent_output() 277 pam_ssh_start_agent(pam_handle_t *pamh) in pam_ssh_start_agent() argument 316 pam_ssh_process_agent_output(pamh, f); in pam_ssh_start_agent() 360 pam_set_data(pamh, *kfn, NULL, NULL); in pam_ssh_add_keys_to_agent() 404 pam_err = pam_ssh_start_agent(pamh); in pam_sm_open_session() 406 openpam_restore_cred(pamh); in pam_sm_open_session() [all …]
|
/dports/net/netatalk3/netatalk-3.1.12/etc/uams/ |
H A D | uams_pam.c | 157 &pamh); in login() 202 pam_end(pamh, PAM_error); in login() 203 pamh = NULL; in login() 270 pam_end(pamh, 0); in pam_logout() 271 pamh = NULL; in pam_logout() 403 pamh = NULL; in pam_printer() 414 pamh = NULL; in pam_printer() 423 pamh = NULL; in pam_printer() 432 pamh = NULL; in pam_printer() 441 pam_end(pamh, 0); in pam_printer() [all …]
|
/dports/x11/lightdm/lightdm-1.30.0/tests/src/ |
H A D | libsystem.c | 913 if (pamh->ruser) in pam_authenticate() 1138 pamh->envlist = realloc (pamh->envlist, sizeof (char *) * (i + 2)); in pam_putenv() 1174 if (pamh->tty) in pam_set_item() 1307 if (!pamh->user) in pam_acct_mgmt() 1437 free (pamh->id); in pam_end() 1439 if (pamh->user) in pam_end() 1441 if (pamh->authtok) in pam_end() 1443 if (pamh->ruser) in pam_end() 1445 if (pamh->tty) in pam_end() 1447 free (pamh); in pam_end() [all …]
|
/dports/security/checkpassword-pam/checkpassword-pam-0.99/ |
H A D | pam-support.c | 92 pam_handle_t* pamh; in authenticate_using_pam() local 103 fatal("Initialization failed: %s", pam_strerror(pamh, retval)); in authenticate_using_pam() 112 pam_set_item(pamh, PAM_RHOST, remoteip); in authenticate_using_pam() 116 retval = pam_authenticate(pamh, 0); in authenticate_using_pam() 127 retval = pam_acct_mgmt(pamh, 0); in authenticate_using_pam() 134 retval = pam_setcred(pamh, PAM_ESTABLISH_CRED); in authenticate_using_pam() 141 retval = pam_open_session(pamh, PAM_SILENT); in authenticate_using_pam() 148 retval = pam_close_session(pamh, PAM_SILENT); in authenticate_using_pam() 150 fatal("Session closing failed: %s", pam_strerror(pamh, retval)); in authenticate_using_pam() 157 retval = pam_end(pamh, retval); in authenticate_using_pam() [all …]
|
/dports/devel/pam_wrapper/pam_wrapper-1.0.6/src/modules/ |
H A D | pam_set_items.c | 74 static void pam_setitem_env(pam_handle_t *pamh) in pam_setitem_env() argument 86 rv = pam_set_item(pamh, items[i], v); in pam_setitem_env() 101 pam_setitem_env(pamh); in pam_sm_authenticate() 106 pam_sm_setcred(pam_handle_t *pamh, int flags, in pam_sm_setcred() argument 113 pam_setitem_env(pamh); in pam_sm_setcred() 118 pam_sm_acct_mgmt(pam_handle_t *pamh, int flags, in pam_sm_acct_mgmt() argument 125 pam_setitem_env(pamh); in pam_sm_acct_mgmt() 137 pam_setitem_env(pamh); in pam_sm_open_session() 149 pam_setitem_env(pamh); in pam_sm_close_session() 154 pam_sm_chauthtok(pam_handle_t *pamh, int flags, in pam_sm_chauthtok() argument [all …]
|
/dports/security/sudo/sudo-1.9.8p2/plugins/sudoers/auth/ |
H A D | pam.c | 95 static pam_handle_t *pamh; variable 201 if (pamh != NULL) { in sudo_pam_init2() 214 &pam_conv, &pamh, errstr); in sudo_pam_init2() 373 s = pam_strerror(pamh, rc); in sudo_pam_approval() 397 s = sudo_pam_strerror(pamh, rc); in sudo_pam_approval() 421 pamh = NULL; in sudo_pam_cleanup() 440 if (pamh != NULL) { in sudo_pam_begin_session() 447 pamh = NULL; in sudo_pam_begin_session() 510 pamh = NULL; in sudo_pam_begin_session() 546 if (pamh != NULL) { in sudo_pam_end_session() [all …]
|
/dports/sysutils/pam_mount/pam_mount-2.12/src/ |
H A D | pam_mount.c | 159 assert(pamh != NULL); in converse() 201 assert(pamh != NULL); in read_password() 207 retval = converse(pamh, 1, &pmsg, &resp); in read_password() 264 ret = pam_get_user(pamh, &pam_user, NULL); in common_init() 326 pam_strerror(pamh, ret)); in auth_grab_authtok() 362 assert(pamh != NULL); in pam_sm_authenticate() 367 auth_grab_authtok(pamh, &Config); in pam_sm_authenticate() 550 assert(pamh != NULL); in pam_sm_open_session() 567 krb5 = pam_getenv(pamh, "KRB5CCNAME"); in pam_sm_open_session() 591 system_authtok = ses_grab_authtok(pamh); in pam_sm_open_session() [all …]
|
/dports/sysutils/linrename/util-linux-2.25.2/login-utils/ |
H A D | auth.c | 17 pam_handle_t *pamh = NULL; in auth_pam() local 21 retcode = pam_start(service_name, username, &conv, &pamh); in auth_pam() 22 if (pam_fail_check(pamh, retcode)) in auth_pam() 25 retcode = pam_authenticate(pamh, 0); in auth_pam() 26 if (pam_fail_check(pamh, retcode)) in auth_pam() 29 retcode = pam_acct_mgmt(pamh, 0); in auth_pam() 32 pam_chauthtok(pamh, PAM_CHANGE_EXPIRED_AUTHTOK); in auth_pam() 33 if (pam_fail_check(pamh, retcode)) in auth_pam() 36 retcode = pam_setcred(pamh, 0); in auth_pam() 37 if (pam_fail_check(pamh, retcode)) in auth_pam() [all …]
|
/dports/www/squid/squid-4.15/src/auth/basic/PAM/ |
H A D | basic_pam_auth.cc | 163 pam_handle_t *pamh = NULL; in main() local 256 if (pamh) { in main() 257 retval = pam_end(pamh, retval); in main() 261 pamh = NULL; in main() 281 retval = pam_acct_mgmt(pamh, 0); in main() 291 if (ttl != 0 && pamh) { in main() 296 retval = pam_end(pamh, retval); in main() 300 pamh = NULL; in main() 304 if (pamh) { in main() 305 retval = pam_end(pamh, retval); in main() [all …]
|
/dports/security/pam_pwdfile/libpam-pwdfile-1.0/ |
H A D | pam_pwdfile.c | 84 PAM_EXTERN int pam_sm_authenticate(pam_handle_t *pamh, int flags, in pam_sm_authenticate() argument 123 if (debug) pam_syslog(pamh, LOG_DEBUG, "setting fail delay"); in pam_sm_authenticate() 124 (void) pam_fail_delay(pamh, 2000000); /* 2 sec */ in pam_sm_authenticate() 129 pam_syslog(pamh, LOG_ERR, "password file name not specified"); in pam_sm_authenticate() 133 if (pam_get_user(pamh, &name, NULL) != PAM_SUCCESS) { in pam_sm_authenticate() 134 pam_syslog(pamh, LOG_ERR, "couldn't get username from PAM stack"); in pam_sm_authenticate() 137 if (debug) pam_syslog(pamh, LOG_DEBUG, "username is %s", name); in pam_sm_authenticate() 200 pam_syslog(pamh, LOG_ERR, "crypt() failed"); in pam_sm_authenticate() 213 pam_syslog(pamh, LOG_NOTICE, "wrong password for user %s", name); in pam_sm_authenticate() 218 if (debug) pam_syslog(pamh, LOG_DEBUG, "passwords match"); in pam_sm_authenticate() [all …]
|
/dports/x11/xscreensaver/xscreensaver-5.44/driver/ |
H A D | passwd-pam.c | 100 # define PAM_NO_DELAY(pamh) pam_fail_delay ((pamh), 1) argument 102 # define PAM_NO_DELAY(pamh) /* */ argument 113 # define PAM_STRERROR(pamh, status) pam_strerror((pamh), (status)) argument 184 pam_handle_t *pamh = 0; in pam_try_unlock() local 216 status = pam_set_item (pamh, PAM_TTY, tty); in pam_try_unlock() 243 PAM_NO_DELAY(pamh); in pam_try_unlock() 254 status = pam_authenticate (pamh, 0); in pam_try_unlock() 286 status2 = pam_acct_mgmt (pamh, 0); in pam_try_unlock() 334 if (pamh) in pam_try_unlock() 336 int status2 = pam_end (pamh, status); in pam_try_unlock() [all …]
|
/dports/security/cyrus-sasl2/cyrus-sasl-2.1.28/saslauthd/ |
H A D | auth_pam.c | 131 pam_strerror(my_appdata->pamh, rc)); in saslauthd_pam_conv() 197 my_appdata.pamh = NULL; in auth_pam() 205 pam_strerror(pamh, rc)); in auth_pam() 209 my_appdata.pamh = pamh; in auth_pam() 211 rc = pam_authenticate(pamh, PAM_SILENT); in auth_pam() 214 pam_strerror(pamh, rc)); in auth_pam() 215 pam_end(pamh, rc); in auth_pam() 219 rc = pam_acct_mgmt(pamh, PAM_SILENT); in auth_pam() 222 pam_strerror(pamh, rc)); in auth_pam() 223 pam_end(pamh, rc); in auth_pam() [all …]
|
/dports/security/cyrus-sasl2-gssapi/cyrus-sasl-2.1.28/saslauthd/ |
H A D | auth_pam.c | 131 pam_strerror(my_appdata->pamh, rc)); in saslauthd_pam_conv() 197 my_appdata.pamh = NULL; in auth_pam() 205 pam_strerror(pamh, rc)); in auth_pam() 209 my_appdata.pamh = pamh; in auth_pam() 211 rc = pam_authenticate(pamh, PAM_SILENT); in auth_pam() 214 pam_strerror(pamh, rc)); in auth_pam() 215 pam_end(pamh, rc); in auth_pam() 219 rc = pam_acct_mgmt(pamh, PAM_SILENT); in auth_pam() 222 pam_strerror(pamh, rc)); in auth_pam() 223 pam_end(pamh, rc); in auth_pam() [all …]
|
/dports/security/cyrus-sasl2-saslauthd/cyrus-sasl-2.1.28/saslauthd/ |
H A D | auth_pam.c | 131 pam_strerror(my_appdata->pamh, rc)); in saslauthd_pam_conv() 197 my_appdata.pamh = NULL; in auth_pam() 205 pam_strerror(pamh, rc)); in auth_pam() 209 my_appdata.pamh = pamh; in auth_pam() 211 rc = pam_authenticate(pamh, PAM_SILENT); in auth_pam() 214 pam_strerror(pamh, rc)); in auth_pam() 215 pam_end(pamh, rc); in auth_pam() 219 rc = pam_acct_mgmt(pamh, PAM_SILENT); in auth_pam() 222 pam_strerror(pamh, rc)); in auth_pam() 223 pam_end(pamh, rc); in auth_pam() [all …]
|
/dports/security/cyrus-sasl2-ldapdb/cyrus-sasl-2.1.28/saslauthd/ |
H A D | auth_pam.c | 131 pam_strerror(my_appdata->pamh, rc)); in saslauthd_pam_conv() 197 my_appdata.pamh = NULL; in auth_pam() 205 pam_strerror(pamh, rc)); in auth_pam() 209 my_appdata.pamh = pamh; in auth_pam() 211 rc = pam_authenticate(pamh, PAM_SILENT); in auth_pam() 214 pam_strerror(pamh, rc)); in auth_pam() 215 pam_end(pamh, rc); in auth_pam() 219 rc = pam_acct_mgmt(pamh, PAM_SILENT); in auth_pam() 222 pam_strerror(pamh, rc)); in auth_pam() 223 pam_end(pamh, rc); in auth_pam() [all …]
|
/dports/security/cyrus-sasl2-sql/cyrus-sasl-2.1.28/saslauthd/ |
H A D | auth_pam.c | 131 pam_strerror(my_appdata->pamh, rc)); in saslauthd_pam_conv() 197 my_appdata.pamh = NULL; in auth_pam() 205 pam_strerror(pamh, rc)); in auth_pam() 209 my_appdata.pamh = pamh; in auth_pam() 211 rc = pam_authenticate(pamh, PAM_SILENT); in auth_pam() 214 pam_strerror(pamh, rc)); in auth_pam() 215 pam_end(pamh, rc); in auth_pam() 219 rc = pam_acct_mgmt(pamh, PAM_SILENT); in auth_pam() 222 pam_strerror(pamh, rc)); in auth_pam() 223 pam_end(pamh, rc); in auth_pam() [all …]
|