/dports/sysutils/google-compute-engine-oslogin/guest-oslogin-5a710bb/src/pam/ |
H A D | pam_oslogin_admin.cc | 46 PAM_EXTERN int pam_sm_acct_mgmt(pam_handle_t *pamh, int flags, int argc, in pam_sm_acct_mgmt() argument 52 if ((pam_result = pam_get_user(pamh, &user_name, NULL)) != PAM_SUCCESS) { in pam_sm_acct_mgmt() 53 PAM_SYSLOG(pamh, LOG_INFO, "Could not get pam user."); in pam_sm_acct_mgmt() 84 PAM_SYSLOG(pamh, LOG_INFO, in pam_sm_acct_mgmt()
|
/dports/databases/mariadb105-client/mariadb-10.5.15/plugin/auth_pam/testing/ |
H A D | pam_mariadb_mtr.c | 18 int pam_sm_authenticate(pam_handle_t *pamh, int flags __attribute__((unused)), in pam_sm_authenticate() argument 32 pam_err = pam_get_item(pamh, PAM_CONV, (const void **)&conv); in pam_sm_authenticate() 66 pam_set_item(pamh, PAM_USER, argv[0]); in pam_sm_authenticate() 75 int pam_sm_setcred(pam_handle_t *pamh __attribute__((unused)), in pam_sm_setcred() argument
|
/dports/databases/mariadb104-server/mariadb-10.4.24/plugin/auth_pam/testing/ |
H A D | pam_mariadb_mtr.c | 18 int pam_sm_authenticate(pam_handle_t *pamh, int flags __attribute__((unused)), in pam_sm_authenticate() argument 32 pam_err = pam_get_item(pamh, PAM_CONV, (const void **)&conv); in pam_sm_authenticate() 66 pam_set_item(pamh, PAM_USER, argv[0]); in pam_sm_authenticate() 75 int pam_sm_setcred(pam_handle_t *pamh __attribute__((unused)), in pam_sm_setcred() argument
|
/dports/databases/mariadb104-client/mariadb-10.4.24/plugin/auth_pam/testing/ |
H A D | pam_mariadb_mtr.c | 18 int pam_sm_authenticate(pam_handle_t *pamh, int flags __attribute__((unused)), 32 pam_err = pam_get_item(pamh, PAM_CONV, (const void **)&conv); 66 pam_set_item(pamh, PAM_USER, argv[0]); 75 int pam_sm_setcred(pam_handle_t *pamh __attribute__((unused)),
|
/dports/databases/mariadb105-server/mariadb-10.5.15/plugin/auth_pam/testing/ |
H A D | pam_mariadb_mtr.c | 18 int pam_sm_authenticate(pam_handle_t *pamh, int flags __attribute__((unused)), in pam_sm_authenticate() argument 32 pam_err = pam_get_item(pamh, PAM_CONV, (const void **)&conv); in pam_sm_authenticate() 66 pam_set_item(pamh, PAM_USER, argv[0]); in pam_sm_authenticate() 75 int pam_sm_setcred(pam_handle_t *pamh __attribute__((unused)), in pam_sm_setcred() argument
|
/dports/security/pam_krb5/pam-krb5-4.9/tests/pam-util/ |
H A D | logging-t.c | 63 pam_strerror(args->pamh, c)); \ 93 pam_handle_t *pamh; 105 if (pam_start("test", NULL, &conv, &pamh) != PAM_SUCCESS) 107 args = putil_args_new(pamh, 0); 143 pam_end(pamh, 0);
|
/dports/x11/wdm/wdm-1.28/src/wdm/ |
H A D | session.c | 96 static pam_handle_t *pamh = NULL; in thepamhp() local 97 return &pamh; in thepamhp() 471 pam_handle_t *pamh = thepamh(); in SessionExit() local 472 if(pamh) in SessionExit() 477 pam_close_session(pamh, 0); in SessionExit() 478 pam_end(pamh, PAM_SUCCESS); in SessionExit() 479 pamh = NULL; in SessionExit() 588 if(pamh) in StartClient() 593 pam_end(pamh, PAM_SUCCESS); in StartClient() 594 pamh = NULL; in StartClient() [all …]
|
/dports/databases/mysqlwsrep57-server/mysql-wsrep-wsrep_5.7.35-25.27/plugin/auth_pam/ |
H A D | auth_pam.c | 132 pam_handle_t *pamh = NULL; in pam_auth() local 151 DO( pam_start(service, info->user_name, &pam_start_arg, &pamh) ); in pam_auth() 154 DO( pam_authenticate (pamh, 0) ); in pam_auth() 157 DO( pam_acct_mgmt(pamh, 0) ); in pam_auth() 160 DO( pam_get_item(pamh, PAM_USER, (pam_get_item_3_arg) &new_username) ); in pam_auth() 168 pam_end(pamh, status); in pam_auth()
|
/dports/databases/mariadb103-server/mariadb-10.3.34/plugin/auth_pam/ |
H A D | auth_pam.c | 135 pam_handle_t *pamh = NULL; in pam_auth() local 154 DO( pam_start(service, info->user_name, &pam_start_arg, &pamh) ); in pam_auth() 157 DO( pam_authenticate (pamh, 0) ); in pam_auth() 160 DO( pam_acct_mgmt(pamh, 0) ); in pam_auth() 163 DO( pam_get_item(pamh, PAM_USER, (pam_get_item_3_arg) &new_username) ); in pam_auth() 172 pam_end(pamh, status); in pam_auth()
|
/dports/databases/mariadb103-client/mariadb-10.3.34/plugin/auth_pam/ |
H A D | auth_pam.c | 135 pam_handle_t *pamh = NULL; in pam_auth() local 154 DO( pam_start(service, info->user_name, &pam_start_arg, &pamh) ); in pam_auth() 157 DO( pam_authenticate (pamh, 0) ); in pam_auth() 160 DO( pam_acct_mgmt(pamh, 0) ); in pam_auth() 163 DO( pam_get_item(pamh, PAM_USER, (pam_get_item_3_arg) &new_username) ); in pam_auth() 172 pam_end(pamh, status); in pam_auth()
|
/dports/sysutils/fcron/fcron-3.2.1/ |
H A D | fcrontab.c | 93 pam_handle_t *pamh = NULL; variable 182 pam_setcred(pamh, PAM_DELETE_CRED | PAM_SILENT); in xexit() 183 pam_end(pamh, pam_close_session(pamh, PAM_SILENT)); in xexit() 1045 retcode = pam_start("fcrontab", runas, &apamconv, &pamh); in main() 1047 die_pame(pamh, retcode, "Could not start PAM"); in main() 1052 retcode = pam_acct_mgmt(pamh, 0); /* permitted access? */ in main() 1056 retcode = pam_setcred(pamh, PAM_ESTABLISH_CRED); in main() 1058 die_pame(pamh, retcode, "Could not set PAM credentials"); in main() 1059 retcode = pam_open_session(pamh, 0); in main() 1061 die_pame(pamh, retcode, "Could not open PAM session"); in main() [all …]
|
H A D | log.c | 54 static void log_pame(int priority, pam_handle_t * pamh, int pamerrno, 288 log_pame(int priority, pam_handle_t * pamh, int pamerrno, char *fmt, in log_pame() argument 293 if ((msg = make_msg(pam_strerror(pamh, pamerrno), fmt, args)) == NULL) in log_pame() 414 error_pame(pam_handle_t * pamh, int pamerrno, char *fmt, ...) in error_pame() argument 421 log_pame(COMPLAIN_LEVEL, pamh, pamerrno, fmt, args); in error_pame() 476 die_pame(pam_handle_t * pamh, int pamerrno, char *fmt, ...) in die_pame() argument 483 log_pame(COMPLAIN_LEVEL, pamh, pamerrno, fmt, args); in die_pame() 485 pam_end(pamh, pamerrno); in die_pame()
|
/dports/security/pam-modules/pam-modules-2.2/pam_sql/ |
H A D | pam_sql.h | 45 int gpam_sql_verify_user_pass(pam_handle_t *pamh, const char *passwd, 47 int gpam_sql_acct(pam_handle_t *pamh, const char *query); 50 const char *gpam_sql_get_query(pam_handle_t *pamh, const char *name,
|
/dports/security/duo/duo_unix-1.11.4/pam_duo/ |
H A D | pam_extra.c | 81 pam_vprompt(pam_handle_t *pamh, int style, char **response, in pam_vprompt() argument 96 retval = pam_get_item(pamh, PAM_CONV, &convp); in pam_vprompt() 137 pam_prompt(pam_handle_t *pamh, int style, char **response, in pam_prompt() argument 144 retval = pam_vprompt(pamh, style, response, fmt, args); in pam_prompt()
|
/dports/sysutils/slurm-wlm/slurm-20.02.7/contribs/pam_slurm_adopt/ |
H A D | helper.c | 106 send_user_msg(pam_handle_t *pamh, const char *mesg) in send_user_msg() argument 120 retval = pam_get_item(pamh, PAM_CONV, (const void **) &dummy); in send_user_msg() 124 pam_strerror(pamh, retval)); in send_user_msg() 140 pam_strerror(pamh, retval)); in send_user_msg()
|
/dports/security/pam_krb5-rh/pam_krb5-2.4.13/src/ |
H A D | shmem.h | 36 int _pam_krb5_shm_new(pam_handle_t *pamh, size_t size, void **address, 41 int _pam_krb5_shm_new_from_file(pam_handle_t *pamh, size_t lead, 44 int _pam_krb5_shm_new_from_blob(pam_handle_t *pamh, size_t lead,
|
/dports/security/openvpn-devel/openvpn-0033811e0215af76f469d78912c95a2f59813454/sample/sample-scripts/ |
H A D | auth-pam.pl | 81 if (!ref($pamh = new Authen::PAM($service, $username, \&my_conv_func))) { 88 $res = $pamh->pam_authenticate; 95 print "Auth '$username' failed, PAM said: ", $pamh->pam_strerror($res), "\n";
|
/dports/security/openvpn-mbedtls/openvpn-2.5.6/sample/sample-scripts/ |
H A D | auth-pam.pl | 81 if (!ref($pamh = new Authen::PAM($service, $username, \&my_conv_func))) { 88 $res = $pamh->pam_authenticate; 95 print "Auth '$username' failed, PAM said: ", $pamh->pam_strerror($res), "\n";
|
/dports/security/openvpn/openvpn-2.5.6/sample/sample-scripts/ |
H A D | auth-pam.pl | 81 if (!ref($pamh = new Authen::PAM($service, $username, \&my_conv_func))) { 88 $res = $pamh->pam_authenticate; 95 print "Auth '$username' failed, PAM said: ", $pamh->pam_strerror($res), "\n";
|
/dports/security/pam_krb5/pam-krb5-4.9/module/ |
H A D | password.c | 44 pamret = pam_get_item(args->pamh, PAM_AUTHTOK, &tmp); in pamk5_password_prompt() 97 pamret = pam_set_item(args->pamh, PAM_AUTHTOK, pass1); in pamk5_password_prompt() 205 if (pam_set_item(args->pamh, PAM_AUTHTOK, NULL)) in change_password() 250 pam_syslog(args->pamh, LOG_INFO, "user %s changed Kerberos password", in pamk5_password_change() 293 status = pam_get_user(args->pamh, &user, NULL); in pamk5_password() 318 pamret = pam_set_data(args->pamh, "pam_krb5", args->config->ctx, in pamk5_password() 368 pam_syslog(args->pamh, LOG_INFO, in pamk5_password() 371 pam_syslog(args->pamh, LOG_INFO, "user %s authenticated as %s", in pamk5_password()
|
/dports/ftp/bbftp-server/bbftp-server-3.2.1/bbftpd/ |
H A D | bbftpd_login.c | 164 pam_handle_t *pamh=NULL; in loginsequence() local 291 retcode = pam_start("bbftp", username, &PAM_conversation, &pamh); in loginsequence() 292 #define PAM_BAIL if (retcode != PAM_SUCCESS) { pam_end(pamh, 0); syslog(BBFTPD_ERR,"PAM error (%d) … in loginsequence() 294 retcode = pam_authenticate(pamh, PAM_SILENT); in loginsequence() 296 retcode = pam_acct_mgmt(pamh, 0); in loginsequence() 299 retcode = pam_setcred(pamh, PAM_ESTABLISH_CRED); in loginsequence() 301 retcode = pam_setcred(pamh, PAM_CRED_ESTABLISH); in loginsequence() 304 pam_end(pamh, PAM_SUCCESS); in loginsequence()
|
/dports/x11/pcdm/pcdm-690fdbdfc9fe482514161df1cd2bd994790c8a2d/src-qt5/PCDM/src/ |
H A D | pcdm-xprocess.cpp | 309 if(xuser=="root"){ ret = pam_start("system", cUser, &pamc, &pamh); } in pam_checkPW() 310 else{ ret = pam_start("login", cUser, &pamc, &pamh); } in pam_checkPW() 314 ret = pam_set_item(pamh, PAM_AUTHTOK, cPassword); in pam_checkPW() 319 ret = pam_authenticate(pamh,0); in pam_checkPW() 322 ret = pam_acct_mgmt(pamh,0); in pam_checkPW() 336 int ret = pam_open_session(pamh,0); in pam_startSession() 346 int ret = pam_close_session(pamh,0); in pam_stopSession() 407 pam_end(pamh,0); in pam_shutdown()
|
/dports/mail/perdition/perdition-2.2/perdition/ |
H A D | pop3_in.c | 63 pam_handle_t *pamh=NULL; in pop3_in_authenticate() local 68 &conv_struct, &pamh) in pop3_in_authenticate() 71 do_pam_end(pamh, EX_PAM_ERROR); in pop3_in_authenticate() 74 if (do_pam_authentication(pamh, name, auth->passwd) < 0) { in pop3_in_authenticate() 79 do_pam_end(pamh, EXIT_SUCCESS); in pop3_in_authenticate() 82 do_pam_end(pamh, EXIT_SUCCESS); in pop3_in_authenticate() 86 do_pam_end(pamh, EXIT_SUCCESS); in pop3_in_authenticate()
|
/dports/sysutils/usermin/usermin-1.830/changepass/ |
H A D | changepass.cgi | 165 $pamh = new Authen::PAM($service, $remote_user, \&pam_check_func); 166 $rv = $pamh->pam_authenticate(); 168 $pamh = undef; 177 $pamh = new Authen::PAM("passwd", $remote_user, \&pam_change_func); 178 $rv = $pamh->pam_chauthtok(); 181 print TEMP ($messages || $pamh->pam_strerror($rv)),"\n";
|
/dports/security/pam_krb5/pam-krb5-4.9/tests/fakepam/ |
H A D | logging.c | 100 pam_strerror(PAM_STRERROR_CONST pam_handle_t *pamh UNUSED, int code) in pam_strerror() 121 pam_syslog(const pam_handle_t *pamh, int priority, const char *format, ...) in pam_syslog() argument 126 pam_vsyslog(pamh, priority, format, args); in pam_syslog() 139 pam_vsyslog(const pam_handle_t *pamh UNUSED, int priority, const char *format, in pam_vsyslog()
|