/dports/security/vlock/vlock-2.2.3/src/ |
H A D | auth-pam.c | 115 int pam_status; in auth() local 123 pam_status = pam_start("vlock", user, &pamc, &pamh); in auth() 125 if (pam_status != PAM_SUCCESS) { in auth() 126 fprintf(stderr, "vlock: %s\n", pam_strerror(pamh, pam_status)); in auth() 135 pam_status = pam_set_item(pamh, PAM_TTY, pam_tty); in auth() 137 if (pam_status != PAM_SUCCESS) { in auth() 147 pam_status = pam_authenticate(pamh, 0); in auth() 149 if (pam_status != PAM_SUCCESS) { in auth() 150 fprintf(stderr, "vlock: %s\n", pam_strerror(pamh, pam_status)); in auth() 155 pam_end_status = pam_end(pamh, pam_status); in auth() [all …]
|
/dports/x11/swaylock/swaylock-1.5/ |
H A D | pam.c | 79 static const char *get_pam_auth_error(int pam_status) { in get_pam_auth_error() argument 80 switch (pam_status) { in get_pam_auth_error() 92 snprintf(msg, sizeof(msg), "unknown error (%d)", pam_status); in get_pam_auth_error() 114 int pam_status = PAM_SUCCESS; in run_pw_backend_child() local 123 int pam_status = pam_authenticate(auth_handle, 0); in run_pw_backend_child() local 124 bool success = pam_status == PAM_SUCCESS; in run_pw_backend_child() 127 get_pam_auth_error(pam_status)); in run_pw_backend_child() 140 if (pam_end(auth_handle, pam_status) != PAM_SUCCESS) { in run_pw_backend_child() 145 exit((pam_status == PAM_SUCCESS) ? EXIT_SUCCESS : EXIT_FAILURE); in run_pw_backend_child()
|
/dports/x11/swaylock-effects/swaylock-effects-1.6-3/ |
H A D | pam.c | 79 static const char *get_pam_auth_error(int pam_status) { in get_pam_auth_error() argument 80 switch (pam_status) { in get_pam_auth_error() 92 snprintf(msg, sizeof(msg), "unknown error (%d)", pam_status); in get_pam_auth_error() 114 int pam_status = PAM_SUCCESS; in run_pw_backend_child() local 123 int pam_status = pam_authenticate(auth_handle, 0); in run_pw_backend_child() local 124 bool success = pam_status == PAM_SUCCESS; in run_pw_backend_child() 127 get_pam_auth_error(pam_status)); in run_pw_backend_child() 142 if (pam_end(auth_handle, pam_status) != PAM_SUCCESS) { in run_pw_backend_child() 147 exit((pam_status == PAM_SUCCESS) ? EXIT_SUCCESS : EXIT_FAILURE); in run_pw_backend_child()
|
/dports/security/sudo/sudo-1.9.8p2/plugins/sudoers/auth/ |
H A D | pam.c | 192 static int pam_status = PAM_SUCCESS; in sudo_pam_init2() local 199 auth->data = &pam_status; in sudo_pam_init2() 210 if (pam_status != PAM_SUCCESS) { in sudo_pam_init2() 291 int *pam_status = (int *) auth->data; in sudo_pam_verify() local 326 switch (*pam_status) { in sudo_pam_verify() 334 "pam_authenticate: %d", *pam_status); in sudo_pam_verify() 364 rc = *pam_status; in sudo_pam_approval() 380 rc = *pam_status; in sudo_pam_approval() 407 *pam_status = rc; in sudo_pam_approval() 420 *pam_status = pam_end(pamh, *pam_status | PAM_DATA_SILENT); in sudo_pam_cleanup() [all …]
|
/dports/audio/pianod2/pianod2-329/src/user/ |
H A D | user.cpp | 164 int pam_status = 0; 170 pam_status = pam_start ("checkpw", name.c_str(), &pam_conv, &pamh); 171 if (pam_status == PAM_SUCCESS) { 173 pam_status = pam_set_item (pamh, PAM_AUTHTOK, trypass); 174 if (pam_status == PAM_SUCCESS) { 176 pam_status = pam_authenticate (pamh, 0); 177 if (pam_status == PAM_SUCCESS || pam_status == PAM_AUTH_ERR) { 179 pam_end (pamh, pam_status); 180 return pam_status == PAM_SUCCESS; 184 flog (LOG_WHERE (LOG_WARNING), func, ": ", pam_strerror (pamh, pam_status)); [all …]
|
/dports/x11-wm/hikari/hikari-2.2.3/ |
H A D | hikari_unlocker.c | 61 int pam_status = pam_authenticate(auth_handle, 0); in check_password() local 63 success = pam_status == PAM_SUCCESS; in check_password() 66 pam_end(auth_handle, pam_status); in check_password()
|
/dports/net/freerdp/freerdp-2.5.0/server/shadow/X11/ |
H A D | x11_shadow.c | 76 int pam_status = PAM_CONV_ERR; in x11_shadow_pam_conv() local 107 pam_status = PAM_CONV_ERR; in x11_shadow_pam_conv() 128 return pam_status; in x11_shadow_pam_conv() 157 int pam_status; in x11_shadow_pam_authenticate() local 170 pam_status = pam_start(info.service_name, 0, &info.pamc, &info.handle); in x11_shadow_pam_authenticate() 172 if (pam_status != PAM_SUCCESS) in x11_shadow_pam_authenticate() 174 WLog_ERR(TAG, "pam_start failure: %s", pam_strerror(info.handle, pam_status)); in x11_shadow_pam_authenticate() 178 pam_status = pam_authenticate(info.handle, 0); in x11_shadow_pam_authenticate() 180 if (pam_status != PAM_SUCCESS) in x11_shadow_pam_authenticate() 186 pam_status = pam_acct_mgmt(info.handle, 0); in x11_shadow_pam_authenticate() [all …]
|
/dports/security/openvpn-devel/openvpn-0033811e0215af76f469d78912c95a2f59813454/src/plugins/auth-pam/ |
H A D | pamdl.c | 67 pam_end(pam_handle_t *pamh, int pam_status) in pam_end() argument 71 return real_pam_end(pamh, pam_status); in pam_end()
|
/dports/security/openvpn/openvpn-2.5.6/src/plugins/auth-pam/ |
H A D | pamdl.c | 67 pam_end(pam_handle_t *pamh, int pam_status) in pam_end() argument 71 return real_pam_end(pamh, pam_status); in pam_end()
|
/dports/security/openvpn-mbedtls/openvpn-2.5.6/src/plugins/auth-pam/ |
H A D | pamdl.c | 67 pam_end(pam_handle_t *pamh, int pam_status) in pam_end() argument 71 return real_pam_end(pamh, pam_status); in pam_end()
|
/dports/net/samba412/samba-4.12.15/third_party/pam_wrapper/ |
H A D | pam_wrapper.c | 183 typedef int (*__libpam_pam_end)(pam_handle_t *pamh, int pam_status); 384 static int libpam_pam_end(pam_handle_t *pamh, int pam_status) 388 return pwrap.libpam.symbols._libpam_pam_end.f(pamh, pam_status); 1169 static int pwrap_pam_end(pam_handle_t *pamh, int pam_status) 1171 PWRAP_LOG(PWRAP_LOG_TRACE, "pam_end status=%d", pam_status); 1172 return libpam_pam_end(pamh, pam_status); 1176 int pam_end(pam_handle_t *pamh, int pam_status) 1178 return pwrap_pam_end(pamh, pam_status);
|
/dports/devel/pam_wrapper/pam_wrapper-1.0.6/src/ |
H A D | pam_wrapper.c | 183 typedef int (*__libpam_pam_end)(pam_handle_t *pamh, int pam_status); 376 static int libpam_pam_end(pam_handle_t *pamh, int pam_status) in libpam_pam_end() argument 380 return pwrap.libpam.symbols._libpam_pam_end.f(pamh, pam_status); in libpam_pam_end() 1163 static int pwrap_pam_end(pam_handle_t *pamh, int pam_status) in pwrap_pam_end() argument 1165 PWRAP_LOG(PWRAP_LOG_TRACE, "pam_end status=%d", pam_status); in pwrap_pam_end() 1166 return libpam_pam_end(pamh, pam_status); in pwrap_pam_end() 1170 int pam_end(pam_handle_t *pamh, int pam_status) in pam_end() argument 1172 return pwrap_pam_end(pamh, pam_status); in pam_end()
|
/dports/security/p5-Authen-PAM/Authen-PAM-0.16/ |
H A D | PAM.xs | 496 pam_end(pamh, pam_status=PAM_SUCCESS) 498 int pam_status 508 RETVAL = pam_end(pamh, pam_status);
|
H A D | PAM.pm.in | 185 $res = pam_end($pamh, $pam_status); 224 except for pam_setcred. The $pam_status argument is also optional for
|
/dports/security/gnome-keyring/gnome-keyring-40.0/ |
H A D | configure.ac | 247 pam_status="no" 339 pam_status="yes ($with_pam_dir)" 662 echo " PAM: $pam_status"
|
H A D | configure | 17079 pam_status="no" 20882 echo " PAM: $pam_status"
|
/dports/comms/kermit/kermit-9.0.305.04/ |
H A D | ckufio.c | 7939 int pam_status; local 8074 if ((pam_status = 8077 reply = pam_strerror(NULL, pam_status); 8277 int pam_status; local 8305 if ((pam_status = pam_set_item(pamh,PAM_AUTHTOK,p)) != PAM_SUCCESS) { 8306 reply = pam_strerror(pamh, pam_status); 8336 if ((pam_status = pam_authenticate(pamh, 0)) != PAM_SUCCESS) { 8337 reply = pam_strerror(pamh, pam_status); 8349 if ((pam_status = pam_acct_mgmt(pamh, 0)) != PAM_SUCCESS) { 8350 reply = pam_strerror(pamh, pam_status);
|
/dports/x11/xpra/xpra-4.3/xpra/server/ |
H A D | pam.pyx | 63 int pam_end(pam_handle_t *pamh, int pam_status)
|
/dports/x11/lightdm/lightdm-1.30.0/tests/src/ |
H A D | libsystem.c | 1427 pam_end (pam_handle_t *pamh, int pam_status) in pam_end() argument
|