/dports/security/plasma5-kscreenlocker/kscreenlocker-5.23.5/kcheckpass/ |
H A D | checkpass_pam.c | 131 pam_handle_t *pamh; in Authenticate() local 157 pam_error = pam_set_item(pamh, PAM_TTY, tty); in Authenticate() 159 pam_end(pamh, pam_error); in Authenticate() 164 pam_set_item(pamh, PAM_FAIL_DELAY, (void *)fail_delay); in Authenticate() 167 pam_error = pam_authenticate(pamh, 0); in Authenticate() 171 pam_end(pamh, pam_error); in Authenticate() 174 pam_end(pamh, pam_error); in Authenticate() 187 pam_error = pam_get_item(pamh, PAM_USER, &pam_item); in Authenticate() 189 pam_end(pamh, pam_error); in Authenticate() 197 pam_error = pam_setcred(pamh, PAM_REFRESH_CRED); in Authenticate() [all …]
|
/dports/net/nss-pam-ldapd/nss-pam-ldapd-0.9.11/compat/ |
H A D | pam_compat.h | 51 int pam_get_authtok(pam_handle_t *pamh, int item, const char **authtok, 57 int pam_prompt(pam_handle_t *pamh, int style, char **response, 64 #define pam_info(pamh, format...) \ argument 65 pam_prompt(pamh, PAM_TEXT_INFO, NULL, ##format) 70 #define pam_error(pamh, format...) \ argument 71 pam_prompt(pamh, PAM_ERROR_MSG, NULL, ##format) 78 #define pam_modutil_getpwnam(pamh, user) \ argument 87 #define pam_syslog(pamh, priority, format...) \ argument
|
/dports/net/nss-pam-ldapd-sasl/nss-pam-ldapd-0.9.11/compat/ |
H A D | pam_compat.h | 51 int pam_get_authtok(pam_handle_t *pamh, int item, const char **authtok, 57 int pam_prompt(pam_handle_t *pamh, int style, char **response, 64 #define pam_info(pamh, format...) \ argument 65 pam_prompt(pamh, PAM_TEXT_INFO, NULL, ##format) 70 #define pam_error(pamh, format...) \ argument 71 pam_prompt(pamh, PAM_ERROR_MSG, NULL, ##format) 78 #define pam_modutil_getpwnam(pamh, user) \ argument 87 #define pam_syslog(pamh, priority, format...) \ argument
|
/dports/security/pam-pgsql/pam-pgsql-0.7.3.2/tests/ |
H A D | authenticate.c | 27 pam_handle_t *pamh=NULL; 40 retval = pam_start("pgsql", user, &conv, &pamh); 46 retval = pam_authenticate(pamh, 0); /* is user really user? */ 51 printf("Authentication failed: %s\n", pam_strerror(pamh, retval)); 54 retval = pam_acct_mgmt(pamh, 0); /* permitted access? */ 59 printf("Access denied: %s\n", pam_strerror(pamh, retval)); 62 if (pam_end(pamh,retval) != PAM_SUCCESS) { /* close Linux-PAM */ 63 pamh = NULL;
|
/dports/security/pam-pgsql/pam-pgsql-0.7.3.2/src/ |
H A D | pam_get_pass.c | 45 pam_conv_pass(pam_handle_t *pamh, int pam_item, const char *prompt, int options) in pam_conv_pass() argument 54 if ((retval = pam_get_item(pamh, PAM_CONV, &item)) != in pam_conv_pass() 65 if ((retval = pam_set_item(pamh, pam_item, resp[0].resp)) != in pam_conv_pass() 75 pam_get_pass(pam_handle_t *pamh, int pam_item, const char **passp, const char *prompt, in pam_get_pass() argument 85 if ((retval = pam_get_item(pamh, pam_item, &item)) != in pam_get_pass() 95 if ((retval = pam_conv_pass(pamh, pam_item, prompt, options)) != in pam_get_pass() 97 (retval = pam_get_item(pamh, pam_item, &item)) != in pam_get_pass() 119 if ((retval = pam_get_item(pamh, PAM_AUTHTOK, (const void **)&item)) != PAM_SUCCESS) in pam_get_confirm_pass() 128 if ((retval = pam_get_item(pamh, PAM_CONV, (const void **)&item)) != PAM_SUCCESS) in pam_get_confirm_pass() 149 retval = pam_set_item(pamh, PAM_AUTHTOK, resp[0].resp); in pam_get_confirm_pass() [all …]
|
/dports/net/bsdrcmds/bsdrcmds-20171003.01/rshd/ |
H A D | rshd.c | 96 static pam_handle_t *pamh; variable 318 pam_err = pam_start("rsh", luser, &pamc, &pamh); in doit() 321 pam_strerror(pamh, pam_err)); in doit() 331 pam_strerror(pamh, pam_err)); in doit() 338 pam_err = pam_authenticate(pamh, 0); in doit() 345 pam_err = pam_acct_mgmt(pamh, 0); in doit() 507 (void) pam_setenv(pamh, "HOME", pwd->pw_dir, 1); in doit() 509 (void) pam_setenv(pamh, "USER", pwd->pw_name, 1); in doit() 510 (void) pam_setenv(pamh, "PATH", _PATH_DEFPATH, 1); in doit() 511 environ = pam_getenvlist(pamh); in doit() [all …]
|
/dports/security/pamtester/pamtester-0.1.2/src/ |
H A D | app.c | 208 pam_handle_t *pamh = NULL; in pamtester_app_run() local 218 pamh = NULL; in pamtester_app_run() 232 err_msg = xstrdup(pam_strerror(pamh, err)); in pamtester_app_run() 238 if ((err = pam_putenv(pamh, item->name))) { in pamtester_app_run() 239 err_msg = xstrdup(pam_strerror(pamh, err)); in pamtester_app_run() 276 if ((err = pam_authenticate(pamh, flag))) { in pamtester_app_run() 309 if ((err = pam_setcred(pamh, flag))) { in pamtester_app_run() 342 if ((err = pam_acct_mgmt(pamh, flag))) { in pamtester_app_run() 441 if ((err = pam_chauthtok(pamh, flag))) { in pamtester_app_run() 461 if (pamh != NULL) { in pamtester_app_run() [all …]
|
/dports/security/pam_yubico/pam_yubico-2.26/tests/ |
H A D | pam_test.c | 101 const char * pam_strerror(const pam_handle_t *pamh, int errnum) { argument 103 const char * pam_strerror(pam_handle_t *pamh, int errnum) { 109 int pam_set_data(pam_handle_t *pamh, const char *module_data_name, void *data, argument 110 void (*cleanup)(pam_handle_t *pamh, void *data, int error_status)) { argument 121 int pam_get_user(pam_handle_t *pamh, const char **user, const char *prompt) { argument 126 *user = test_get_data((void*)pamh)->user; 152 pam_conversation.appdata_ptr = (void*)pamh; 155 if(item_type == PAM_AUTHTOK && pamh >= (pam_handle_t*)8) { 156 *item = (void*)_data[(int)(uintptr_t)pamh].otp; 161 int pam_modutil_drop_priv(pam_handle_t *pamh, struct pam_modutil_privs *p, argument [all …]
|
/dports/security/calife/calife-3.0.6/ |
H A D | auth_pam.c | 77 e = pam_start("calife", (*ppw)->pw_name, &conv, &pamh); in auth_pam() 79 syslog(LOG_AUTH | LOG_ERR, "pam_start: %s", pam_strerror(pamh, e)); in auth_pam() 87 e = pam_authenticate(pamh, 0); in auth_pam() 108 if ((e = pam_get_item(pamh, PAM_USER, &item)) == PAM_SUCCESS) in auth_pam() 115 pam_strerror(pamh, e)); in auth_pam() 122 syslog(LOG_AUTH | LOG_ERR, "auth_pam: %s", pam_strerror(pamh, e)); in auth_pam() 127 syslog(LOG_AUTH | LOG_ERR, "pam_authenticate: %s", pam_strerror(pamh,\ in auth_pam() 136 e = pam_acct_mgmt(pamh, 0); in auth_pam() 138 e = pam_chauthtok(pamh, PAM_CHANGE_EXPIRED_AUTHTOK); in auth_pam() 141 pam_strerror(pamh, e)); in auth_pam()
|
/dports/security/pam_krb5-rh/pam_krb5-2.4.13/src/ |
H A D | password.c | 67 pam_sm_chauthtok(pam_handle_t *pamh, int flags, in pam_sm_chauthtok() argument 92 i = pam_get_user(pamh, &user, NULL); in pam_sm_chauthtok() 125 _pam_krb5_options_free(pamh, ctx, options); in pam_sm_chauthtok() 140 _pam_krb5_options_free(pamh, ctx, options); in pam_sm_chauthtok() 214 _pam_krb5_conv_call(pamh, &message, 1, in pam_sm_chauthtok() 256 i = v5_get_creds(stash->v5ctx, pamh, in pam_sm_chauthtok() 275 pam_strerror(pamh, i)); in pam_sm_chauthtok() 313 i = v5_get_creds(stash->v5ctx, pamh, in pam_sm_chauthtok() 345 i = v5_get_creds(stash->v5ctx, pamh, in pam_sm_chauthtok() 528 _pam_krb5_stash_shm_write(pamh, stash, in pam_sm_chauthtok() [all …]
|
H A D | pamitems.c | 49 _pam_krb5_has_item(pam_handle_t *pamh, int item) in _pam_krb5_has_item() argument 53 if ((pam_get_item(pamh, item, &data) == PAM_SUCCESS) && in _pam_krb5_has_item() 61 _pam_krb5_get_item_text(pam_handle_t *pamh, int item, char **text) in _pam_krb5_get_item_text() argument 64 return pam_get_item(pamh, item, in _pam_krb5_get_item_text() 71 _pam_krb5_get_item_conv(pam_handle_t *pamh, struct pam_conv **conv) in _pam_krb5_get_item_conv() argument 73 return pam_get_item(pamh, PAM_CONV, (PAM_KRB5_MAYBE_CONST void**) conv); in _pam_krb5_get_item_conv()
|
/dports/www/yaws/yaws-2.0.6/c_src/ |
H A D | epam.c | 265 pam_handle_t *pamh; member 299 pam_handle_t *pamh=NULL; in do_auth() local 307 werr(pamh, sid, retval, "start"); in do_auth() 310 pam_set_item(pamh, PAM_RUSER, user); in do_auth() 312 retval = pam_authenticate(pamh, 0); in do_auth() 314 werr(pamh, sid, retval, "auth"); in do_auth() 318 retval = pam_acct_mgmt(pamh, 0); in do_auth() 326 retval = pam_open_session(pamh, 0); in do_auth() 334 werr(pamh, sid, -1, "malloc"); in do_auth() 342 sessp->pamh = pamh; in do_auth() [all …]
|
/dports/science/py-dipy/dipy-1.4.1/dipy/io/ |
H A D | peaks.py | 50 pamh = f['pam'] 58 affine = pamh['affine'][:] 62 peak_dirs = pamh['peak_dirs'][:] 63 peak_values = pamh['peak_values'][:] 64 peak_indices = pamh['peak_indices'][:] 67 shm_coeff = pamh['shm_coeff'][:] 74 odf = pamh['odf'][:] 84 pam.B = pamh['B'][:] 86 pam.ang_thr = pamh['ang_thr'][:][0] 87 pam.gfa = pamh['gfa'][:] [all …]
|
/dports/security/super/super-3.30.3/ |
H A D | pam.c | 37 pam_strerror(pam_handle_t *pamh, int status) in pam_strerror() argument 164 pam_handle_t *pamh = NULL; local 170 if (pam_start(ONETRUENAME, user, &conv, &pamh) != PAM_SUCCESS) { 201 pamstatus = pam_authenticate(pamh, PAM_DISALLOW_NULL_AUTHTOK); 206 pam_end(pamh, pamstatus); 208 pam_strerror(pamh, pamstatus)); 211 if ((pamstatus=pam_acct_mgmt(pamh, 0)) != PAM_SUCCESS) { 212 pam_end(pamh, pamstatus); 214 but PAM doesn't grant access:\n\t%s\n", pam_strerror(pamh, pamstatus)); 217 if (pam_end(pamh, pamstatus) != PAM_SUCCESS) {
|
/dports/ftp/pure-ftpd/pure-ftpd-1.0.50/src/ |
H A D | log_pam.c | 153 pam_handle_t *pamh; in pw_pam_check() local 164 &PAM_conversation, &pamh); in pw_pam_check() 167 (void) pam_set_item(pamh, PAM_TTY, "pure-ftpd"); in pw_pam_check() 170 (void) pam_set_item(pamh, PAM_RUSER, user); in pw_pam_check() 177 (void) pam_set_item(pamh, PAM_RHOST, buf); in pw_pam_check() 186 pam_error = pam_authenticate(pamh, 0); in pw_pam_check() 188 pam_error = pam_acct_mgmt(pamh, 0); in pw_pam_check() 202 pam_error = pam_setcred(pamh, PAM_CRED_ESTABLISH); in pw_pam_check() 210 (void) pam_open_session(pamh, PAM_SILENT); in pw_pam_check() 211 (void) pam_close_session(pamh, PAM_SILENT); /* It doesn't matter if it fails */ in pw_pam_check() [all …]
|
/dports/net/wayvnc/wayvnc-0.4.1/src/ |
H A D | pam_auth.c | 62 pam_handle_t* pamh; in pam_auth() local 63 int result = pam_start(service, username, &conv, &pamh); in pam_auth() 65 log_error("ERROR: PAM start failed: %s\n", pam_strerror(pamh, result)); in pam_auth() 69 result = pam_authenticate(pamh, PAM_SILENT|PAM_DISALLOW_NULL_AUTHTOK); in pam_auth() 71 log_error("PAM authenticate failed: %s\n", pam_strerror(pamh, result)); in pam_auth() 75 result = pam_acct_mgmt(pamh, 0); in pam_auth() 77 log_error("PAM account management failed: %s\n", pam_strerror(pamh, result)); in pam_auth() 82 pam_end(pamh, result); in pam_auth()
|
/dports/sysutils/busybox/busybox-1.26.2/loginutils/ |
H A D | login.c | 255 pam_strerror(pamh, pamret), pamret); in login_pam_end() 257 pamret = pam_close_session(pamh, 0); in login_pam_end() 260 pam_strerror(pamh, pamret), pamret); in login_pam_end() 262 pamret = pam_end(pamh, pamret); in login_pam_end() 265 pam_strerror(pamh, pamret), pamret); in login_pam_end() 352 pam_handle_t *pamh; in login_main() local 443 pamret = pam_authenticate(pamh, 0); in login_main() 454 pamret = pam_acct_mgmt(pamh, 0); in login_main() 477 pamret = pam_open_session(pamh, 0); in login_main() 555 IF_PAM(login_pam_end(pamh);) in login_main() [all …]
|
/dports/security/duo/duo_unix-1.11.4/tests/ |
H A D | testpam.c | 85 die(pam_handle_t *pamh, int errnum) in die() argument 94 pam_handle_t *pamh = NULL; in main() local 106 if ((ret = pam_start("testpam", user, &conv, &pamh)) != PAM_SUCCESS) { in main() 107 die(pamh, ret); in main() 110 if ((ret = pam_set_item(pamh, PAM_RHOST, host)) != PAM_SUCCESS) in main() 111 die(pamh, ret); in main() 113 if ((ret = pam_authenticate(pamh, 0)) != PAM_SUCCESS) { in main() 114 die(pamh, ret); in main() 116 if ((ret = pam_end(pamh, ret)) != PAM_SUCCESS) { in main() 117 die(pamh, ret); in main()
|
/dports/mail/tpop3d/tpop3d-1.5.5/ |
H A D | auth_pam.c | 76 pam_handle_t *pamh = NULL; in auth_pam_do_authentication() local 83 r = pam_start(facility, user, &conv, &pamh); in auth_pam_do_authentication() 86 log_print(LOG_ERR, "auth_pam_new_user_pass: pam_start: %s", pam_strerror(pamh, r)); in auth_pam_do_authentication() 92 r = pam_set_item(pamh, PAM_RHOST, clienthost); in auth_pam_do_authentication() 95 log_print(LOG_ERR, "auth_pam_new_user_pass: pam_start: %s", pam_strerror(pamh, r)); in auth_pam_do_authentication() 100 r = pam_authenticate(pamh, 0); in auth_pam_do_authentication() 104 r = pam_acct_mgmt(pamh, PAM_SILENT); in auth_pam_do_authentication() 110 … log_print(LOG_ERR, "auth_pam_new_user_pass: pam_acct_mgmt(%s): %s", user, pam_strerror(pamh, r)); in auth_pam_do_authentication() 113 …og_print(LOG_ERR, "auth_pam_new_user_pass: pam_authenticate(%s): %s", user, pam_strerror(pamh, r)); in auth_pam_do_authentication() 115 r = pam_end(pamh, r); in auth_pam_do_authentication() [all …]
|
/dports/x11/gdm/gdm-3.28.4/pam_gdm/ |
H A D | pam_gdm.c | 35 pam_sm_authenticate (pam_handle_t *pamh, in pam_sm_authenticate() argument 53 r = pam_set_item (pamh, PAM_AUTHTOK, cached_password); in pam_sm_authenticate() 67 pam_sm_setcred (pam_handle_t *pamh, in pam_sm_setcred() argument 76 pam_sm_acct_mgmt (pam_handle_t *pamh, in pam_sm_acct_mgmt() argument 85 pam_sm_chauthtok (pam_handle_t *pamh, in pam_sm_chauthtok() argument 94 pam_sm_open_session (pam_handle_t *pamh, in pam_sm_open_session() argument 103 pam_sm_close_session (pam_handle_t *pamh, in pam_sm_close_session() argument
|
/dports/security/pam_krb5/pam-krb5-4.9/tests/pam-util/ |
H A D | args-t.c | 44 pam_handle_t *pamh; in check_pam_user() 50 if (pam_start("test", NULL, &conv, &pamh) != PAM_SUCCESS) in check_pam_user() 52 args = putil_args_new(pamh, 0); in check_pam_user() 57 ok(args->pamh == pamh, "...and pamh is correct"); in check_pam_user() 72 args = putil_args_new(pamh, PAM_SILENT); in check_pam_user() 83 pam_end(pamh, 0); in check_pam_user()
|
/dports/security/p5-Net-Radius-Server/Net-Radius-Server-1.116/lib/Net/Radius/Server/ |
H A D | PAM.pm | 49 my $pamh = new Authen::PAM 66 unless (ref($pamh)) 68 $self->log(2, "Failed to init PAM: $pamh"); 72 if ($pamh->pam_fail_delay(0) != PAM_SUCCESS() 73 and $pamh->pam_set_item(PAM_FAIL_DELAY(), 79 my $res = $pamh->pam_authenticate(0x0); 83 $r_data->{$store} = $pamh; 122 my $pamh = $r_data->{$store}; 127 my %env = $pamh->pam_getenvlist;
|
/dports/security/pam-modules/pam-modules-2.2/pam_fshadow/ |
H A D | pam_fshadow.c | 231 retval = pam_get_item(pamh, PAM_AUTHTOK, 237 pam_strerror(pamh, retval)); 261 retval = gray_converse(pamh, i, pmsg, &resp); 266 pam_set_item(pamh, PAM_AUTHTOK, token); 271 pam_strerror(pamh, retval)); 284 retval = pam_set_data(pamh, "password", 290 pam_strerror(pamh, retval)); 299 pam_strerror(pamh, retval)); 445 pam_strerror(pamh, rc)); 459 translate(pam_handle_t *pamh, char const *input, [all …]
|
/dports/net/samba412/samba-4.12.15/source4/auth/ntlm/ |
H A D | auth_unix.c | 264 pam_strerror(*pamh, pam_error))); in smb_pam_start() 267 pam_error = pam_end(*pamh, 0); in smb_pam_start() 284 pam_strerror(*pamh, pam_error))); in smb_pam_start() 287 pam_error = pam_end(*pamh, 0); in smb_pam_start() 306 if (pamh != NULL) { in smb_pam_end() 307 pam_error = pam_end(pamh, 0); in smb_pam_end() 448 pam_handle_t *pamh; in check_unix_password() local 480 smb_pam_end(pamh); in check_unix_password() 488 smb_pam_end(pamh); in check_unix_password() 494 smb_pam_end(pamh); in check_unix_password() [all …]
|
/dports/security/vlock/vlock-2.2.3/src/ |
H A D | auth-pam.c | 114 pam_handle_t *pamh; in auth() local 123 pam_status = pam_start("vlock", user, &pamc, &pamh); in auth() 126 fprintf(stderr, "vlock: %s\n", pam_strerror(pamh, pam_status)); in auth() 135 pam_status = pam_set_item(pamh, PAM_TTY, pam_tty); in auth() 138 fprintf(stderr, "vlock: %s\n", pam_strerror(pamh, pam_status)); in auth() 147 pam_status = pam_authenticate(pamh, 0); in auth() 150 fprintf(stderr, "vlock: %s\n", pam_strerror(pamh, pam_status)); in auth() 155 pam_end_status = pam_end(pamh, pam_status); in auth() 158 fprintf(stderr, "vlock: %s\n", pam_strerror(pamh, pam_end_status)); in auth()
|