/dports/net/nss-pam-ldapd-sasl/nss-pam-ldapd-0.9.11/pam/ |
H A D | common.h | 38 pam_syslog(pamh, LOG_ERR, "error opening connection to nslcd: %s", \ 44 pam_syslog(pamh, LOG_ERR, "error reading from nslcd: %s", \ 51 pam_syslog(pamh, LOG_CRIT, "buffer %d bytes too small", tmpint32); \ 58 pam_syslog(pamh, LOG_ERR, "error writing to nslcd: %s", \ 68 pam_syslog(pamh, LOG_DEBUG, "user not handled by nslcd"); \ 98 (i) = nslcd2pam_rc(pamh, ntohl(tmpint32));
|
/dports/net/nss-pam-ldapd/nss-pam-ldapd-0.9.11/pam/ |
H A D | common.h | 38 pam_syslog(pamh, LOG_ERR, "error opening connection to nslcd: %s", \ 44 pam_syslog(pamh, LOG_ERR, "error reading from nslcd: %s", \ 51 pam_syslog(pamh, LOG_CRIT, "buffer %d bytes too small", tmpint32); \ 58 pam_syslog(pamh, LOG_ERR, "error writing to nslcd: %s", \ 68 pam_syslog(pamh, LOG_DEBUG, "user not handled by nslcd"); \ 98 (i) = nslcd2pam_rc(pamh, ntohl(tmpint32));
|
/dports/security/p5-Net-Radius-Server/Net-Radius-Server-1.116/bin/ |
H A D | pam-client | 58 my $pamh = new Authen::PAM ($opt{service}, $opt{login}, \&my_conv_f); 59 die "Error $pamh initializing PAM: svc $opt{service}, user $opt{login}\n" 60 unless ref($pamh); 64 my $res = $pamh->pam_authenticate(0x0); 75 $res = $pamh->pam_acct_mgmt(0x0); 88 my %env = $pamh->pam_getenvlist();
|
/dports/security/pam_p11/pam_p11-0.3.1/src/ |
H A D | test.c | 38 extern int pam_sm_test(pam_handle_t *pamh, int flags, int argc, const char **argv); 47 pam_handle_t *pamh = NULL; in main() local 84 r = pam_start("test", user, &conv, &pamh); in main() 88 r = pam_sm_test(pamh, 0, sizeof pam_argv/sizeof *pam_argv, pam_argv); in main() 96 printf("Error: %s\n", pam_strerror(pamh, r)); in main() 100 pam_end(pamh, r); in main()
|
/dports/security/courier-authlib-base/courier-authlib-0.71.4/ |
H A D | authpam.c | 95 static int dopam(pam_handle_t **pamh, int *started) in dopam() argument 105 retval=pam_start(pam_service, pam_username, &conv, pamh); in dopam() 115 retval=pam_set_item(*pamh, PAM_RHOST, tcpremoteip); in dopam() 126 retval=pam_set_item(*pamh, PAM_AUTHTOK, pam_password); in dopam() 136 retval=pam_authenticate(*pamh, 0); in dopam() 148 retval=pam_setcred(*pamh, PAM_ESTABLISH_CRED); in dopam() 159 retval=pam_acct_mgmt(*pamh, 0); in dopam() 180 pam_handle_t *pamh=NULL; in callback_pam() local 240 retval=dopam(&pamh, &started); in callback_pam() 247 pam_end(pamh, retval); in callback_pam()
|
/dports/databases/courier-authlib-mysql/courier-authlib-0.71.4/ |
H A D | authpam.c | 95 static int dopam(pam_handle_t **pamh, int *started) in dopam() argument 105 retval=pam_start(pam_service, pam_username, &conv, pamh); in dopam() 115 retval=pam_set_item(*pamh, PAM_RHOST, tcpremoteip); in dopam() 126 retval=pam_set_item(*pamh, PAM_AUTHTOK, pam_password); in dopam() 136 retval=pam_authenticate(*pamh, 0); in dopam() 148 retval=pam_setcred(*pamh, PAM_ESTABLISH_CRED); in dopam() 159 retval=pam_acct_mgmt(*pamh, 0); in dopam() 180 pam_handle_t *pamh=NULL; in callback_pam() local 240 retval=dopam(&pamh, &started); in callback_pam() 247 pam_end(pamh, retval); in callback_pam()
|
/dports/databases/courier-authlib-sqlite/courier-authlib-0.71.4/ |
H A D | authpam.c | 95 static int dopam(pam_handle_t **pamh, int *started) in dopam() argument 105 retval=pam_start(pam_service, pam_username, &conv, pamh); in dopam() 115 retval=pam_set_item(*pamh, PAM_RHOST, tcpremoteip); in dopam() 126 retval=pam_set_item(*pamh, PAM_AUTHTOK, pam_password); in dopam() 136 retval=pam_authenticate(*pamh, 0); in dopam() 148 retval=pam_setcred(*pamh, PAM_ESTABLISH_CRED); in dopam() 159 retval=pam_acct_mgmt(*pamh, 0); in dopam() 180 pam_handle_t *pamh=NULL; in callback_pam() local 240 retval=dopam(&pamh, &started); in callback_pam() 247 pam_end(pamh, retval); in callback_pam()
|
/dports/databases/courier-authlib-usergdbm/courier-authlib-0.71.4/ |
H A D | authpam.c | 95 static int dopam(pam_handle_t **pamh, int *started) in dopam() argument 105 retval=pam_start(pam_service, pam_username, &conv, pamh); in dopam() 115 retval=pam_set_item(*pamh, PAM_RHOST, tcpremoteip); in dopam() 126 retval=pam_set_item(*pamh, PAM_AUTHTOK, pam_password); in dopam() 136 retval=pam_authenticate(*pamh, 0); in dopam() 148 retval=pam_setcred(*pamh, PAM_ESTABLISH_CRED); in dopam() 159 retval=pam_acct_mgmt(*pamh, 0); in dopam() 180 pam_handle_t *pamh=NULL; in callback_pam() local 240 retval=dopam(&pamh, &started); in callback_pam() 247 pam_end(pamh, retval); in callback_pam()
|
/dports/databases/courier-authlib-pgsql/courier-authlib-0.71.4/ |
H A D | authpam.c | 95 static int dopam(pam_handle_t **pamh, int *started) in dopam() argument 105 retval=pam_start(pam_service, pam_username, &conv, pamh); in dopam() 115 retval=pam_set_item(*pamh, PAM_RHOST, tcpremoteip); in dopam() 126 retval=pam_set_item(*pamh, PAM_AUTHTOK, pam_password); in dopam() 136 retval=pam_authenticate(*pamh, 0); in dopam() 148 retval=pam_setcred(*pamh, PAM_ESTABLISH_CRED); in dopam() 159 retval=pam_acct_mgmt(*pamh, 0); in dopam() 180 pam_handle_t *pamh=NULL; in callback_pam() local 240 retval=dopam(&pamh, &started); in callback_pam() 247 pam_end(pamh, retval); in callback_pam()
|
/dports/databases/courier-authlib-userdb/courier-authlib-0.71.4/ |
H A D | authpam.c | 95 static int dopam(pam_handle_t **pamh, int *started) in dopam() argument 105 retval=pam_start(pam_service, pam_username, &conv, pamh); in dopam() 115 retval=pam_set_item(*pamh, PAM_RHOST, tcpremoteip); in dopam() 126 retval=pam_set_item(*pamh, PAM_AUTHTOK, pam_password); in dopam() 136 retval=pam_authenticate(*pamh, 0); in dopam() 148 retval=pam_setcred(*pamh, PAM_ESTABLISH_CRED); in dopam() 159 retval=pam_acct_mgmt(*pamh, 0); in dopam() 180 pam_handle_t *pamh=NULL; in callback_pam() local 240 retval=dopam(&pamh, &started); in callback_pam() 247 pam_end(pamh, retval); in callback_pam()
|
/dports/net/courier-authlib-ldap/courier-authlib-0.71.4/ |
H A D | authpam.c | 95 static int dopam(pam_handle_t **pamh, int *started) in dopam() argument 105 retval=pam_start(pam_service, pam_username, &conv, pamh); in dopam() 115 retval=pam_set_item(*pamh, PAM_RHOST, tcpremoteip); in dopam() 126 retval=pam_set_item(*pamh, PAM_AUTHTOK, pam_password); in dopam() 136 retval=pam_authenticate(*pamh, 0); in dopam() 148 retval=pam_setcred(*pamh, PAM_ESTABLISH_CRED); in dopam() 159 retval=pam_acct_mgmt(*pamh, 0); in dopam() 180 pam_handle_t *pamh=NULL; in callback_pam() local 240 retval=dopam(&pamh, &started); in callback_pam() 247 pam_end(pamh, retval); in callback_pam()
|
/dports/mail/courier-authlib-vchkpw/courier-authlib-0.71.4/ |
H A D | authpam.c | 95 static int dopam(pam_handle_t **pamh, int *started) in dopam() argument 105 retval=pam_start(pam_service, pam_username, &conv, pamh); in dopam() 115 retval=pam_set_item(*pamh, PAM_RHOST, tcpremoteip); in dopam() 126 retval=pam_set_item(*pamh, PAM_AUTHTOK, pam_password); in dopam() 136 retval=pam_authenticate(*pamh, 0); in dopam() 148 retval=pam_setcred(*pamh, PAM_ESTABLISH_CRED); in dopam() 159 retval=pam_acct_mgmt(*pamh, 0); in dopam() 180 pam_handle_t *pamh=NULL; in callback_pam() local 240 retval=dopam(&pamh, &started); in callback_pam() 247 pam_end(pamh, retval); in callback_pam()
|
/dports/security/pam-modules/pam-modules-2.2/pam_umotd/ |
H A D | pam_umotd.c | 105 read_fd(pam_handle_t *pamh, const char *file, int fd) in read_fd() argument 127 pam_info(pamh, "%s", buf); in read_fd() 136 pam_info(pamh, "%s", buf); in read_fd() 147 read_file(pam_handle_t *pamh, const char *file) in read_file() argument 158 retval = read_fd(pamh, file, fd); in read_file() 258 pam_info(pamh, "%s", buf); in exec_file() 283 pam_info(pamh, "%s", buf); in exec_file() 343 gray_expand_string(pamh, motd_file_name, slist); in pam_sm_open_session() 346 retval = read_file(pamh, file); in pam_sm_open_session() 361 gray_expand_string(pamh, argv[i], slist); in pam_sm_open_session() [all …]
|
/dports/deskutils/lumina-screenshot/lumina-1.6.0/src-qt5/core/lumina-checkpass/ |
H A D | main.c | 76 pam_handle_t *pamh; in main() local 79 int ret = pam_start( "system", cUser, &pamc, &pamh); in main() 82 ret = pam_set_item(pamh, PAM_AUTHTOK, pass); in main() 84 …ret = pam_authenticate(pamh,0); //this can be true without verifying password if pam_self.so is us… in main() 85 …if( ret == PAM_SUCCESS ){ ret = pam_acct_mgmt(pamh,0); } //Check for valid, unexpired account and … in main() 87 pam_end(pamh,ret); in main()
|
/dports/deskutils/lumina-mediaplayer/lumina-1.6.0/src-qt5/core/lumina-checkpass/ |
H A D | main.c | 76 pam_handle_t *pamh; in main() local 79 int ret = pam_start( "system", cUser, &pamc, &pamh); in main() 82 ret = pam_set_item(pamh, PAM_AUTHTOK, pass); in main() 84 …ret = pam_authenticate(pamh,0); //this can be true without verifying password if pam_self.so is us… in main() 85 …if( ret == PAM_SUCCESS ){ ret = pam_acct_mgmt(pamh,0); } //Check for valid, unexpired account and … in main() 87 pam_end(pamh,ret); in main()
|
/dports/deskutils/lumina-photo/lumina-1.6.0/src-qt5/core/lumina-checkpass/ |
H A D | main.c | 76 pam_handle_t *pamh; in main() local 79 int ret = pam_start( "system", cUser, &pamc, &pamh); in main() 82 ret = pam_set_item(pamh, PAM_AUTHTOK, pass); in main() 84 …ret = pam_authenticate(pamh,0); //this can be true without verifying password if pam_self.so is us… in main() 85 …if( ret == PAM_SUCCESS ){ ret = pam_acct_mgmt(pamh,0); } //Check for valid, unexpired account and … in main() 87 pam_end(pamh,ret); in main()
|
/dports/deskutils/lumina-fileinfo/lumina-1.6.0/src-qt5/core/lumina-checkpass/ |
H A D | main.c | 76 pam_handle_t *pamh; in main() local 79 int ret = pam_start( "system", cUser, &pamc, &pamh); in main() 82 ret = pam_set_item(pamh, PAM_AUTHTOK, pass); in main() 84 …ret = pam_authenticate(pamh,0); //this can be true without verifying password if pam_self.so is us… in main() 85 …if( ret == PAM_SUCCESS ){ ret = pam_acct_mgmt(pamh,0); } //Check for valid, unexpired account and … in main() 87 pam_end(pamh,ret); in main()
|
/dports/deskutils/lumina-fm/lumina-1.6.0/src-qt5/core/lumina-checkpass/ |
H A D | main.c | 76 pam_handle_t *pamh; in main() local 79 int ret = pam_start( "system", cUser, &pamc, &pamh); in main() 82 ret = pam_set_item(pamh, PAM_AUTHTOK, pass); in main() 84 …ret = pam_authenticate(pamh,0); //this can be true without verifying password if pam_self.so is us… in main() 85 …if( ret == PAM_SUCCESS ){ ret = pam_acct_mgmt(pamh,0); } //Check for valid, unexpired account and … in main() 87 pam_end(pamh,ret); in main()
|
/dports/deskutils/lumina-textedit/lumina-1.6.0/src-qt5/core/lumina-checkpass/ |
H A D | main.c | 76 pam_handle_t *pamh; in main() local 79 int ret = pam_start( "system", cUser, &pamc, &pamh); in main() 82 ret = pam_set_item(pamh, PAM_AUTHTOK, pass); in main() 84 …ret = pam_authenticate(pamh,0); //this can be true without verifying password if pam_self.so is us… in main() 85 …if( ret == PAM_SUCCESS ){ ret = pam_acct_mgmt(pamh,0); } //Check for valid, unexpired account and … in main() 87 pam_end(pamh,ret); in main()
|
/dports/x11/lumina-coreutils/lumina-1.6.0/src-qt5/core/lumina-checkpass/ |
H A D | main.c | 76 pam_handle_t *pamh; in main() local 79 int ret = pam_start( "system", cUser, &pamc, &pamh); in main() 82 ret = pam_set_item(pamh, PAM_AUTHTOK, pass); in main() 84 …ret = pam_authenticate(pamh,0); //this can be true without verifying password if pam_self.so is us… in main() 85 …if( ret == PAM_SUCCESS ){ ret = pam_acct_mgmt(pamh,0); } //Check for valid, unexpired account and … in main() 87 pam_end(pamh,ret); in main()
|
/dports/x11/lumina-core/lumina-1.6.0/src-qt5/core/lumina-checkpass/ |
H A D | main.c | 76 pam_handle_t *pamh; in main() local 79 int ret = pam_start( "system", cUser, &pamc, &pamh); in main() 82 ret = pam_set_item(pamh, PAM_AUTHTOK, pass); in main() 84 …ret = pam_authenticate(pamh,0); //this can be true without verifying password if pam_self.so is us… in main() 85 …if( ret == PAM_SUCCESS ){ ret = pam_acct_mgmt(pamh,0); } //Check for valid, unexpired account and … in main() 87 pam_end(pamh,ret); in main()
|
/dports/deskutils/lumina-archiver/lumina-1.6.0/src-qt5/core/lumina-checkpass/ |
H A D | main.c | 76 pam_handle_t *pamh; in main() local 79 int ret = pam_start( "system", cUser, &pamc, &pamh); in main() 82 ret = pam_set_item(pamh, PAM_AUTHTOK, pass); in main() 84 …ret = pam_authenticate(pamh,0); //this can be true without verifying password if pam_self.so is us… in main() 85 …if( ret == PAM_SUCCESS ){ ret = pam_acct_mgmt(pamh,0); } //Check for valid, unexpired account and … in main() 87 pam_end(pamh,ret); in main()
|
/dports/mail/popa3d-before-sendmail/popa3d-1.0.3/ |
H A D | auth_pam.c | 166 pam_handle_t *pamh; in auth_userpass() local 178 if (pam_start(AUTH_PAM_SERVICE, user, &conv, &pamh) != PAM_SUCCESS) { in auth_userpass() 183 if ((status = pam_authenticate(pamh, 0)) != PAM_SUCCESS) { in auth_userpass() 184 pam_end(pamh, status); in auth_userpass() 189 if ((status = pam_acct_mgmt(pamh, 0)) != PAM_SUCCESS) { in auth_userpass() 190 pam_end(pamh, status); in auth_userpass() 195 status = pam_get_item(pamh, PAM_USER, &item); in auth_userpass() 197 pam_end(pamh, status); in auth_userpass() 205 if (pam_end(pamh, PAM_SUCCESS) != PAM_SUCCESS || !template) { in auth_userpass()
|
/dports/mail/popa3d/popa3d-1.0.3/ |
H A D | auth_pam.c | 166 pam_handle_t *pamh; in auth_userpass() local 178 if (pam_start(AUTH_PAM_SERVICE, user, &conv, &pamh) != PAM_SUCCESS) { in auth_userpass() 183 if ((status = pam_authenticate(pamh, 0)) != PAM_SUCCESS) { in auth_userpass() 184 pam_end(pamh, status); in auth_userpass() 189 if ((status = pam_acct_mgmt(pamh, 0)) != PAM_SUCCESS) { in auth_userpass() 190 pam_end(pamh, status); in auth_userpass() 195 status = pam_get_item(pamh, PAM_USER, &item); in auth_userpass() 197 pam_end(pamh, status); in auth_userpass() 205 if (pam_end(pamh, PAM_SUCCESS) != PAM_SUCCESS || !template) { in auth_userpass()
|
/dports/security/pam_krb5-rh/pam_krb5-2.4.13/src/ |
H A D | sly.c | 98 _pam_krb5_sly_maybe_refresh(pam_handle_t *pamh, int flags, const char *why, in _pam_krb5_sly_maybe_refresh() argument 142 i = pam_get_user(pamh, &user, NULL); in _pam_krb5_sly_maybe_refresh() 150 options = _pam_krb5_options_init(pamh, argc, argv, ctx, in _pam_krb5_sly_maybe_refresh() 171 _pam_krb5_options_free(pamh, ctx, options); in _pam_krb5_sly_maybe_refresh() 183 _pam_krb5_options_free(pamh, ctx, options); in _pam_krb5_sly_maybe_refresh() 189 stash = _pam_krb5_stash_get(pamh, user, userinfo, options); in _pam_krb5_sly_maybe_refresh() 194 _pam_krb5_options_free(pamh, ctx, options); in _pam_krb5_sly_maybe_refresh() 202 v5ccname = pam_getenv(pamh, "KRB5CCNAME"); in _pam_krb5_sly_maybe_refresh() 316 pam_strerror(pamh, retval)); in _pam_krb5_sly_maybe_refresh() 320 _pam_krb5_options_free(pamh, ctx, options); in _pam_krb5_sly_maybe_refresh()
|