Home
last modified time | relevance | path

Searched refs:pamh (Results 101 – 125 of 548) sorted by relevance

12345678910>>...22

/dports/security/plasma5-kscreenlocker/kscreenlocker-5.23.5/kcheckpass/
H A Dcheckpass_pam.c131 pam_handle_t *pamh; in Authenticate() local
157 pam_error = pam_set_item(pamh, PAM_TTY, tty); in Authenticate()
159 pam_end(pamh, pam_error); in Authenticate()
164 pam_set_item(pamh, PAM_FAIL_DELAY, (void *)fail_delay); in Authenticate()
167 pam_error = pam_authenticate(pamh, 0); in Authenticate()
171 pam_end(pamh, pam_error); in Authenticate()
174 pam_end(pamh, pam_error); in Authenticate()
187 pam_error = pam_get_item(pamh, PAM_USER, &pam_item); in Authenticate()
189 pam_end(pamh, pam_error); in Authenticate()
197 pam_error = pam_setcred(pamh, PAM_REFRESH_CRED); in Authenticate()
[all …]
/dports/net/nss-pam-ldapd/nss-pam-ldapd-0.9.11/compat/
H A Dpam_compat.h51 int pam_get_authtok(pam_handle_t *pamh, int item, const char **authtok,
57 int pam_prompt(pam_handle_t *pamh, int style, char **response,
64 #define pam_info(pamh, format...) \ argument
65 pam_prompt(pamh, PAM_TEXT_INFO, NULL, ##format)
70 #define pam_error(pamh, format...) \ argument
71 pam_prompt(pamh, PAM_ERROR_MSG, NULL, ##format)
78 #define pam_modutil_getpwnam(pamh, user) \ argument
87 #define pam_syslog(pamh, priority, format...) \ argument
/dports/net/nss-pam-ldapd-sasl/nss-pam-ldapd-0.9.11/compat/
H A Dpam_compat.h51 int pam_get_authtok(pam_handle_t *pamh, int item, const char **authtok,
57 int pam_prompt(pam_handle_t *pamh, int style, char **response,
64 #define pam_info(pamh, format...) \ argument
65 pam_prompt(pamh, PAM_TEXT_INFO, NULL, ##format)
70 #define pam_error(pamh, format...) \ argument
71 pam_prompt(pamh, PAM_ERROR_MSG, NULL, ##format)
78 #define pam_modutil_getpwnam(pamh, user) \ argument
87 #define pam_syslog(pamh, priority, format...) \ argument
/dports/security/pam-pgsql/pam-pgsql-0.7.3.2/tests/
H A Dauthenticate.c27 pam_handle_t *pamh=NULL;
40 retval = pam_start("pgsql", user, &conv, &pamh);
46 retval = pam_authenticate(pamh, 0); /* is user really user? */
51 printf("Authentication failed: %s\n", pam_strerror(pamh, retval));
54 retval = pam_acct_mgmt(pamh, 0); /* permitted access? */
59 printf("Access denied: %s\n", pam_strerror(pamh, retval));
62 if (pam_end(pamh,retval) != PAM_SUCCESS) { /* close Linux-PAM */
63 pamh = NULL;
/dports/security/pam-pgsql/pam-pgsql-0.7.3.2/src/
H A Dpam_get_pass.c45 pam_conv_pass(pam_handle_t *pamh, int pam_item, const char *prompt, int options) in pam_conv_pass() argument
54 if ((retval = pam_get_item(pamh, PAM_CONV, &item)) != in pam_conv_pass()
65 if ((retval = pam_set_item(pamh, pam_item, resp[0].resp)) != in pam_conv_pass()
75 pam_get_pass(pam_handle_t *pamh, int pam_item, const char **passp, const char *prompt, in pam_get_pass() argument
85 if ((retval = pam_get_item(pamh, pam_item, &item)) != in pam_get_pass()
95 if ((retval = pam_conv_pass(pamh, pam_item, prompt, options)) != in pam_get_pass()
97 (retval = pam_get_item(pamh, pam_item, &item)) != in pam_get_pass()
119 if ((retval = pam_get_item(pamh, PAM_AUTHTOK, (const void **)&item)) != PAM_SUCCESS) in pam_get_confirm_pass()
128 if ((retval = pam_get_item(pamh, PAM_CONV, (const void **)&item)) != PAM_SUCCESS) in pam_get_confirm_pass()
149 retval = pam_set_item(pamh, PAM_AUTHTOK, resp[0].resp); in pam_get_confirm_pass()
[all …]
/dports/net/bsdrcmds/bsdrcmds-20171003.01/rshd/
H A Drshd.c96 static pam_handle_t *pamh; variable
318 pam_err = pam_start("rsh", luser, &pamc, &pamh); in doit()
321 pam_strerror(pamh, pam_err)); in doit()
331 pam_strerror(pamh, pam_err)); in doit()
338 pam_err = pam_authenticate(pamh, 0); in doit()
345 pam_err = pam_acct_mgmt(pamh, 0); in doit()
507 (void) pam_setenv(pamh, "HOME", pwd->pw_dir, 1); in doit()
509 (void) pam_setenv(pamh, "USER", pwd->pw_name, 1); in doit()
510 (void) pam_setenv(pamh, "PATH", _PATH_DEFPATH, 1); in doit()
511 environ = pam_getenvlist(pamh); in doit()
[all …]
/dports/security/pamtester/pamtester-0.1.2/src/
H A Dapp.c208 pam_handle_t *pamh = NULL; in pamtester_app_run() local
218 pamh = NULL; in pamtester_app_run()
232 err_msg = xstrdup(pam_strerror(pamh, err)); in pamtester_app_run()
238 if ((err = pam_putenv(pamh, item->name))) { in pamtester_app_run()
239 err_msg = xstrdup(pam_strerror(pamh, err)); in pamtester_app_run()
276 if ((err = pam_authenticate(pamh, flag))) { in pamtester_app_run()
309 if ((err = pam_setcred(pamh, flag))) { in pamtester_app_run()
342 if ((err = pam_acct_mgmt(pamh, flag))) { in pamtester_app_run()
441 if ((err = pam_chauthtok(pamh, flag))) { in pamtester_app_run()
461 if (pamh != NULL) { in pamtester_app_run()
[all …]
/dports/security/pam_yubico/pam_yubico-2.26/tests/
H A Dpam_test.c101 const char * pam_strerror(const pam_handle_t *pamh, int errnum) { argument
103 const char * pam_strerror(pam_handle_t *pamh, int errnum) {
109 int pam_set_data(pam_handle_t *pamh, const char *module_data_name, void *data, argument
110 void (*cleanup)(pam_handle_t *pamh, void *data, int error_status)) { argument
121 int pam_get_user(pam_handle_t *pamh, const char **user, const char *prompt) { argument
126 *user = test_get_data((void*)pamh)->user;
152 pam_conversation.appdata_ptr = (void*)pamh;
155 if(item_type == PAM_AUTHTOK && pamh >= (pam_handle_t*)8) {
156 *item = (void*)_data[(int)(uintptr_t)pamh].otp;
161 int pam_modutil_drop_priv(pam_handle_t *pamh, struct pam_modutil_privs *p, argument
[all …]
/dports/security/calife/calife-3.0.6/
H A Dauth_pam.c77 e = pam_start("calife", (*ppw)->pw_name, &conv, &pamh); in auth_pam()
79 syslog(LOG_AUTH | LOG_ERR, "pam_start: %s", pam_strerror(pamh, e)); in auth_pam()
87 e = pam_authenticate(pamh, 0); in auth_pam()
108 if ((e = pam_get_item(pamh, PAM_USER, &item)) == PAM_SUCCESS) in auth_pam()
115 pam_strerror(pamh, e)); in auth_pam()
122 syslog(LOG_AUTH | LOG_ERR, "auth_pam: %s", pam_strerror(pamh, e)); in auth_pam()
127 syslog(LOG_AUTH | LOG_ERR, "pam_authenticate: %s", pam_strerror(pamh,\ in auth_pam()
136 e = pam_acct_mgmt(pamh, 0); in auth_pam()
138 e = pam_chauthtok(pamh, PAM_CHANGE_EXPIRED_AUTHTOK); in auth_pam()
141 pam_strerror(pamh, e)); in auth_pam()
/dports/security/pam_krb5-rh/pam_krb5-2.4.13/src/
H A Dpassword.c67 pam_sm_chauthtok(pam_handle_t *pamh, int flags, in pam_sm_chauthtok() argument
92 i = pam_get_user(pamh, &user, NULL); in pam_sm_chauthtok()
125 _pam_krb5_options_free(pamh, ctx, options); in pam_sm_chauthtok()
140 _pam_krb5_options_free(pamh, ctx, options); in pam_sm_chauthtok()
214 _pam_krb5_conv_call(pamh, &message, 1, in pam_sm_chauthtok()
256 i = v5_get_creds(stash->v5ctx, pamh, in pam_sm_chauthtok()
275 pam_strerror(pamh, i)); in pam_sm_chauthtok()
313 i = v5_get_creds(stash->v5ctx, pamh, in pam_sm_chauthtok()
345 i = v5_get_creds(stash->v5ctx, pamh, in pam_sm_chauthtok()
528 _pam_krb5_stash_shm_write(pamh, stash, in pam_sm_chauthtok()
[all …]
H A Dpamitems.c49 _pam_krb5_has_item(pam_handle_t *pamh, int item) in _pam_krb5_has_item() argument
53 if ((pam_get_item(pamh, item, &data) == PAM_SUCCESS) && in _pam_krb5_has_item()
61 _pam_krb5_get_item_text(pam_handle_t *pamh, int item, char **text) in _pam_krb5_get_item_text() argument
64 return pam_get_item(pamh, item, in _pam_krb5_get_item_text()
71 _pam_krb5_get_item_conv(pam_handle_t *pamh, struct pam_conv **conv) in _pam_krb5_get_item_conv() argument
73 return pam_get_item(pamh, PAM_CONV, (PAM_KRB5_MAYBE_CONST void**) conv); in _pam_krb5_get_item_conv()
/dports/www/yaws/yaws-2.0.6/c_src/
H A Depam.c265 pam_handle_t *pamh; member
299 pam_handle_t *pamh=NULL; in do_auth() local
307 werr(pamh, sid, retval, "start"); in do_auth()
310 pam_set_item(pamh, PAM_RUSER, user); in do_auth()
312 retval = pam_authenticate(pamh, 0); in do_auth()
314 werr(pamh, sid, retval, "auth"); in do_auth()
318 retval = pam_acct_mgmt(pamh, 0); in do_auth()
326 retval = pam_open_session(pamh, 0); in do_auth()
334 werr(pamh, sid, -1, "malloc"); in do_auth()
342 sessp->pamh = pamh; in do_auth()
[all …]
/dports/science/py-dipy/dipy-1.4.1/dipy/io/
H A Dpeaks.py50 pamh = f['pam']
58 affine = pamh['affine'][:]
62 peak_dirs = pamh['peak_dirs'][:]
63 peak_values = pamh['peak_values'][:]
64 peak_indices = pamh['peak_indices'][:]
67 shm_coeff = pamh['shm_coeff'][:]
74 odf = pamh['odf'][:]
84 pam.B = pamh['B'][:]
86 pam.ang_thr = pamh['ang_thr'][:][0]
87 pam.gfa = pamh['gfa'][:]
[all …]
/dports/security/super/super-3.30.3/
H A Dpam.c37 pam_strerror(pam_handle_t *pamh, int status) in pam_strerror() argument
164 pam_handle_t *pamh = NULL; local
170 if (pam_start(ONETRUENAME, user, &conv, &pamh) != PAM_SUCCESS) {
201 pamstatus = pam_authenticate(pamh, PAM_DISALLOW_NULL_AUTHTOK);
206 pam_end(pamh, pamstatus);
208 pam_strerror(pamh, pamstatus));
211 if ((pamstatus=pam_acct_mgmt(pamh, 0)) != PAM_SUCCESS) {
212 pam_end(pamh, pamstatus);
214 but PAM doesn't grant access:\n\t%s\n", pam_strerror(pamh, pamstatus));
217 if (pam_end(pamh, pamstatus) != PAM_SUCCESS) {
/dports/ftp/pure-ftpd/pure-ftpd-1.0.50/src/
H A Dlog_pam.c153 pam_handle_t *pamh; in pw_pam_check() local
164 &PAM_conversation, &pamh); in pw_pam_check()
167 (void) pam_set_item(pamh, PAM_TTY, "pure-ftpd"); in pw_pam_check()
170 (void) pam_set_item(pamh, PAM_RUSER, user); in pw_pam_check()
177 (void) pam_set_item(pamh, PAM_RHOST, buf); in pw_pam_check()
186 pam_error = pam_authenticate(pamh, 0); in pw_pam_check()
188 pam_error = pam_acct_mgmt(pamh, 0); in pw_pam_check()
202 pam_error = pam_setcred(pamh, PAM_CRED_ESTABLISH); in pw_pam_check()
210 (void) pam_open_session(pamh, PAM_SILENT); in pw_pam_check()
211 (void) pam_close_session(pamh, PAM_SILENT); /* It doesn't matter if it fails */ in pw_pam_check()
[all …]
/dports/net/wayvnc/wayvnc-0.4.1/src/
H A Dpam_auth.c62 pam_handle_t* pamh; in pam_auth() local
63 int result = pam_start(service, username, &conv, &pamh); in pam_auth()
65 log_error("ERROR: PAM start failed: %s\n", pam_strerror(pamh, result)); in pam_auth()
69 result = pam_authenticate(pamh, PAM_SILENT|PAM_DISALLOW_NULL_AUTHTOK); in pam_auth()
71 log_error("PAM authenticate failed: %s\n", pam_strerror(pamh, result)); in pam_auth()
75 result = pam_acct_mgmt(pamh, 0); in pam_auth()
77 log_error("PAM account management failed: %s\n", pam_strerror(pamh, result)); in pam_auth()
82 pam_end(pamh, result); in pam_auth()
/dports/sysutils/busybox/busybox-1.26.2/loginutils/
H A Dlogin.c255 pam_strerror(pamh, pamret), pamret); in login_pam_end()
257 pamret = pam_close_session(pamh, 0); in login_pam_end()
260 pam_strerror(pamh, pamret), pamret); in login_pam_end()
262 pamret = pam_end(pamh, pamret); in login_pam_end()
265 pam_strerror(pamh, pamret), pamret); in login_pam_end()
352 pam_handle_t *pamh; in login_main() local
443 pamret = pam_authenticate(pamh, 0); in login_main()
454 pamret = pam_acct_mgmt(pamh, 0); in login_main()
477 pamret = pam_open_session(pamh, 0); in login_main()
555 IF_PAM(login_pam_end(pamh);) in login_main()
[all …]
/dports/security/duo/duo_unix-1.11.4/tests/
H A Dtestpam.c85 die(pam_handle_t *pamh, int errnum) in die() argument
94 pam_handle_t *pamh = NULL; in main() local
106 if ((ret = pam_start("testpam", user, &conv, &pamh)) != PAM_SUCCESS) { in main()
107 die(pamh, ret); in main()
110 if ((ret = pam_set_item(pamh, PAM_RHOST, host)) != PAM_SUCCESS) in main()
111 die(pamh, ret); in main()
113 if ((ret = pam_authenticate(pamh, 0)) != PAM_SUCCESS) { in main()
114 die(pamh, ret); in main()
116 if ((ret = pam_end(pamh, ret)) != PAM_SUCCESS) { in main()
117 die(pamh, ret); in main()
/dports/mail/tpop3d/tpop3d-1.5.5/
H A Dauth_pam.c76 pam_handle_t *pamh = NULL; in auth_pam_do_authentication() local
83 r = pam_start(facility, user, &conv, &pamh); in auth_pam_do_authentication()
86 log_print(LOG_ERR, "auth_pam_new_user_pass: pam_start: %s", pam_strerror(pamh, r)); in auth_pam_do_authentication()
92 r = pam_set_item(pamh, PAM_RHOST, clienthost); in auth_pam_do_authentication()
95 log_print(LOG_ERR, "auth_pam_new_user_pass: pam_start: %s", pam_strerror(pamh, r)); in auth_pam_do_authentication()
100 r = pam_authenticate(pamh, 0); in auth_pam_do_authentication()
104 r = pam_acct_mgmt(pamh, PAM_SILENT); in auth_pam_do_authentication()
110 … log_print(LOG_ERR, "auth_pam_new_user_pass: pam_acct_mgmt(%s): %s", user, pam_strerror(pamh, r)); in auth_pam_do_authentication()
113 …og_print(LOG_ERR, "auth_pam_new_user_pass: pam_authenticate(%s): %s", user, pam_strerror(pamh, r)); in auth_pam_do_authentication()
115 r = pam_end(pamh, r); in auth_pam_do_authentication()
[all …]
/dports/x11/gdm/gdm-3.28.4/pam_gdm/
H A Dpam_gdm.c35 pam_sm_authenticate (pam_handle_t *pamh, in pam_sm_authenticate() argument
53 r = pam_set_item (pamh, PAM_AUTHTOK, cached_password); in pam_sm_authenticate()
67 pam_sm_setcred (pam_handle_t *pamh, in pam_sm_setcred() argument
76 pam_sm_acct_mgmt (pam_handle_t *pamh, in pam_sm_acct_mgmt() argument
85 pam_sm_chauthtok (pam_handle_t *pamh, in pam_sm_chauthtok() argument
94 pam_sm_open_session (pam_handle_t *pamh, in pam_sm_open_session() argument
103 pam_sm_close_session (pam_handle_t *pamh, in pam_sm_close_session() argument
/dports/security/pam_krb5/pam-krb5-4.9/tests/pam-util/
H A Dargs-t.c44 pam_handle_t *pamh; in check_pam_user()
50 if (pam_start("test", NULL, &conv, &pamh) != PAM_SUCCESS) in check_pam_user()
52 args = putil_args_new(pamh, 0); in check_pam_user()
57 ok(args->pamh == pamh, "...and pamh is correct"); in check_pam_user()
72 args = putil_args_new(pamh, PAM_SILENT); in check_pam_user()
83 pam_end(pamh, 0); in check_pam_user()
/dports/security/p5-Net-Radius-Server/Net-Radius-Server-1.116/lib/Net/Radius/Server/
H A DPAM.pm49 my $pamh = new Authen::PAM
66 unless (ref($pamh))
68 $self->log(2, "Failed to init PAM: $pamh");
72 if ($pamh->pam_fail_delay(0) != PAM_SUCCESS()
73 and $pamh->pam_set_item(PAM_FAIL_DELAY(),
79 my $res = $pamh->pam_authenticate(0x0);
83 $r_data->{$store} = $pamh;
122 my $pamh = $r_data->{$store};
127 my %env = $pamh->pam_getenvlist;
/dports/security/pam-modules/pam-modules-2.2/pam_fshadow/
H A Dpam_fshadow.c231 retval = pam_get_item(pamh, PAM_AUTHTOK,
237 pam_strerror(pamh, retval));
261 retval = gray_converse(pamh, i, pmsg, &resp);
266 pam_set_item(pamh, PAM_AUTHTOK, token);
271 pam_strerror(pamh, retval));
284 retval = pam_set_data(pamh, "password",
290 pam_strerror(pamh, retval));
299 pam_strerror(pamh, retval));
445 pam_strerror(pamh, rc));
459 translate(pam_handle_t *pamh, char const *input,
[all …]
/dports/net/samba412/samba-4.12.15/source4/auth/ntlm/
H A Dauth_unix.c264 pam_strerror(*pamh, pam_error))); in smb_pam_start()
267 pam_error = pam_end(*pamh, 0); in smb_pam_start()
284 pam_strerror(*pamh, pam_error))); in smb_pam_start()
287 pam_error = pam_end(*pamh, 0); in smb_pam_start()
306 if (pamh != NULL) { in smb_pam_end()
307 pam_error = pam_end(pamh, 0); in smb_pam_end()
448 pam_handle_t *pamh; in check_unix_password() local
480 smb_pam_end(pamh); in check_unix_password()
488 smb_pam_end(pamh); in check_unix_password()
494 smb_pam_end(pamh); in check_unix_password()
[all …]
/dports/security/vlock/vlock-2.2.3/src/
H A Dauth-pam.c114 pam_handle_t *pamh; in auth() local
123 pam_status = pam_start("vlock", user, &pamc, &pamh); in auth()
126 fprintf(stderr, "vlock: %s\n", pam_strerror(pamh, pam_status)); in auth()
135 pam_status = pam_set_item(pamh, PAM_TTY, pam_tty); in auth()
138 fprintf(stderr, "vlock: %s\n", pam_strerror(pamh, pam_status)); in auth()
147 pam_status = pam_authenticate(pamh, 0); in auth()
150 fprintf(stderr, "vlock: %s\n", pam_strerror(pamh, pam_status)); in auth()
155 pam_end_status = pam_end(pamh, pam_status); in auth()
158 fprintf(stderr, "vlock: %s\n", pam_strerror(pamh, pam_end_status)); in auth()

12345678910>>...22