Home
last modified time | relevance | path

Searched full:pam (Results 1 – 25 of 357) sorted by relevance

12345678910>>...15

/freebsd/contrib/pam-krb5/tests/fakepam/
H A DREADME1 PAM Testing Framework
5 The files in this directory provide a shim PAM library that's used for
6 testing and a test framework used to exercise a PAM module.
9 of the PAM module interface so that PAM modules can be tested without
10 such problems as needing configuration files in /etc/pam.d or needing
11 changes to the system configuration to run a testing PAM module
12 instead of the normal system PAM modules.
14 The goal of this library is that all PAM code should be able to be
16 rather than the regular PAM library. The testing code can then call
17 pam_start and pam_end as defined in the fakepam/pam.h header file and
[all …]
H A Dscript.h2 * PAM interaction script API.
4 * Provides an interface that loads a PAM interaction script from a file and
5 * runs through that script, calling the internal PAM module functions and
6 * checking their results. This allows automation of PAM testing through
41 #include <portable/pam.h>
45 /* A test callback called after PAM functions are run but before pam_end. */
50 /* Configuration for the PAM interaction script API. */
56 const char *authtok; /* Stored as AUTHTOK before PAM. */
57 const char *oldauthtok; /* Stored as OLDAUTHTOK before PAM. */
58 script_callback callback; /* Called after PAM, before pam_end. */
/freebsd/sys/contrib/openzfs/tests/zfs-tests/tests/functional/pam/
H A Dpam_mount_recursively.ksh24 . $STF_SUITE/tests/functional/pam/utilities.kshlib
35 log_must zfs create -o mountpoint="$TESTDIR/mrec" "$TESTPOOL/mrec/pam"
37 -o keylocation=prompt "$TESTPOOL/mrec/pam/${username}"
38 log_must zfs create "$TESTPOOL/mrec/pam/${username}/deep"
39 log_must zfs create "$TESTPOOL/mrec/pam/${username}/deep/deeper"
40 log_must zfs create -o mountpoint=none "$TESTPOOL/mrec/pam/${username}/deep/none"
41 log_must zfs create -o canmount=noauto "$TESTPOOL/mrec/pam/${username}/deep/noauto"
42 log_must zfs create -o canmount=off "$TESTPOOL/mrec/pam/${username}/deep/off"
43 log_must zfs unmount "$TESTPOOL/mrec/pam/${username}"
44 log_must zfs unload-key "$TESTPOOL/mrec/pam/${username}"
[all …]
H A Dpam_recursive.ksh24 . $STF_SUITE/tests/functional/pam/utilities.kshlib
35 log_must zfs create -o mountpoint="$TESTDIR/rec" "$TESTPOOL/pampam/pam"
37 -o keylocation=prompt "$TESTPOOL/pampam/pam/${username}"
38 log_must zfs unmount "$TESTPOOL/pampam/pam/${username}"
39 log_must zfs unload-key "$TESTPOOL/pampam/pam/${username}"
43 log_must [ "$(get_prop keystatus "$TESTPOOL/pampam/pam/${username}")" = "$1" ]
46 log_mustnot ismounted "$TESTPOOL/pampam/pam/${username}"
52 log_must ismounted "$TESTPOOL/pampam/pam/${username}"
57 log_mustnot ismounted "$TESTPOOL/pampam/pam/${username}"
61 genconfig "homes=$TESTPOOL/pampam/pam prop_mountpoint runstatedir=${runstatedir}"
H A Dpam_short_password.ksh29 . $STF_SUITE/tests/functional/pam/utilities.kshlib
44 log_mustnot ismounted "$TESTPOOL/pam/${username}"
47 genconfig "homes=$TESTPOOL/pam runstatedir=${runstatedir}"
52 log_must ismounted "$TESTPOOL/pam/${username}"
61 log_mustnot ismounted "$TESTPOOL/pam/${username}"
67 log_mustnot ismounted "$TESTPOOL/pam/${username}"
74 log_must ismounted "$TESTPOOL/pam/${username}"
81 log_mustnot ismounted "$TESTPOOL/pam/${username}"
84 echo "short" | zfs load-key "$TESTPOOL/pam/${username}"
86 zfs unload-key "$TESTPOOL/pam/${username}"
H A Dpam_nounmount.ksh24 . $STF_SUITE/tests/functional/pam/utilities.kshlib
30 log_mustnot ismounted "$TESTPOOL/pam/${username}"
33 genconfig "homes=$TESTPOOL/pam runstatedir=${runstatedir} nounmount"
36 log_must ismounted "$TESTPOOL/pam/${username}"
42 log_must ismounted "$TESTPOOL/pam/${username}"
47 log_must ismounted "$TESTPOOL/pam/${username}"
52 log_must ismounted "$TESTPOOL/pam/${username}"
53 log_must zfs unmount "$TESTPOOL/pam/${username}"
54 log_must zfs unload-key "$TESTPOOL/pam/${username}"
H A Dpam_change_unmounted.ksh24 . $STF_SUITE/tests/functional/pam/utilities.kshlib
30 log_mustnot ismounted "$TESTPOOL/pam/${username}"
33 genconfig "homes=$TESTPOOL/pam runstatedir=${runstatedir}"
37 log_mustnot ismounted "$TESTPOOL/pam/${username}"
42 log_must ismounted "$TESTPOOL/pam/${username}"
47 log_must ismounted "$TESTPOOL/pam/${username}"
48 log_must ismounted "$TESTPOOL/pam/${username}"
53 log_mustnot ismounted "$TESTPOOL/pam/${username}"
/freebsd/contrib/pam-krb5/
H A DNEWS1 User-Visible pam-krb5 Changes
3 pam-krb5 4.11 (2021-10-17)
7 is closing the PAM session after a fork to free memory resources, but
12 Stop attempting to guess the correct PAM module installation path on
23 pam-krb5 4.10 (2021-03-20)
42 pam-krb5 4.9 (2020-03-30)
57 the memory used by PAM responses before freeing. This reduces the
77 * Fix misplaced va_end in the pam-util putil_log_failure function.
90 pam-krb5 4.8 (2017-12-30)
131 * Add portability defines for macOS's PAM implementation.
[all …]
H A DREADME.md1 # pam-krb5
4 status](https://github.com/rra/pam-krb5/workflows/build/badge.svg)](https://github.com/rra/pam-krb5…
18 pam-krb5 is a Kerberos PAM module for either MIT Kerberos or Heimdal. It
22 expected PAM features. It works correctly with OpenSSH, even with
24 supports extensive configuration either by PAM options or in krb5.conf or
30 pam-krb5 provides a Kerberos PAM module that supports authentication, user
33 can be configured through either options in the PAM configuration itself
35 around PAM implementation flaws in commonly-used PAM-enabled applications
39 This is not the Kerberos PAM module maintained on Sourceforge and used on
46 Kerberos PAM module), see
[all …]
H A DREADME1 pam-krb5 4.11
2 (PAM module for Kerberos authentication)
14 pam-krb5 is a Kerberos PAM module for either MIT Kerberos or Heimdal.
18 standard expected PAM features. It works correctly with OpenSSH, even
20 and supports extensive configuration either by PAM options or in
26 pam-krb5 provides a Kerberos PAM module that supports authentication,
29 changing. It can be configured through either options in the PAM
31 and it tries to work around PAM implementation flaws in commonly-used
32 PAM-enabled applications such as OpenSSH and xdm. It supports both
36 This is not the Kerberos PAM module maintained on Sourceforge and used
[all …]
H A DMakefile.am1 # Automake makefile for pam-krb5.
23 tests/data/krb5-pam.conf tests/data/krb5.conf tests/data/perl.conf \
35 noinst_LTLIBRARIES = pam-util/libpamutil.la portable/libportable.la
37 portable/krb5.h portable/macros.h portable/pam.h portable/stdbool.h \
40 pam_util_libpamutil_la_SOURCES = pam-util/args.c pam-util/args.h \
41 pam-util/logging.c pam-util/logging.h pam-util/options.c \
42 pam-util/options.h pam-util/vector.c pam-util/vector.h
59 module_pam_krb5_la_LIBADD = pam-util/libpamutil.la portable/libportable.la \
66 pod2man --release="$(VERSION)" --center=pam-krb5 -s 5 \
92 tests/module/long-t tests/module/no-cache-t tests/module/pam-user-t \
[all …]
H A DTODO1 pam-krb5 To-Do List
3 PAM API:
7 available in the PAM data) and trying a regular authentication first to
14 these into one PAM conversation call for better GUI presentation
21 password. This will fix failure to store passwords in the PAM data
28 pam-krb5 is run as a non-root user and hence doesn't have access to the
30 developed for a different PAM authentication module, and it would be
44 * Support disabling of user canonicalization so that the PAM user is
71 the PAM context is currently too complicated. It should be possible to
78 PAM module configuration.
[all …]
H A Dconfigure.ac1 dnl Autoconf configuration for pam-krb5.
13 AC_INIT([pam-krb5], [4.11], [eagle@eyrie.org])
45 dnl Probe for the functionality of the PAM libraries and their include file
46 dnl naming. Mac OS X puts them in pam/* instead of security/*.
47 AC_SEARCH_LIBS([pam_set_data], [pam])
51 [AC_CHECK_HEADERS([pam/pam_modutil.h])])
53 [AC_CHECK_HEADERS([pam/pam_appl.h], [],
54 [AC_MSG_ERROR([No PAM header files found])])])
56 [AC_CHECK_HEADERS([pam/pam_ext.h])])
60 [The name of the PAM module, used by the pam_vsyslog replacement.])
[all …]
/freebsd/contrib/pam-krb5/docs/
H A Ddocknot.yaml1 # Package metadata for pam-krb5.
16 name: pam-krb5
19 synopsis: PAM module for Kerberos authentication
42 installation path for PAM modules varies considerably between systems.
46 PAM directory. On Debian's amd64 architecture,
61 tarname: pam-krb5
62 version: pam-krb5
65 github: rra/pam-krb5
66 web: https://www.eyrie.org/~eagle/software/pam-krb5/
68 browse: https://git.eyrie.org/?p=kerberos/pam-krb5.git
[all …]
H A Dpam_krb5.pod5 logout pam-krb5 preauth 0.8rc1 screensaver screensavers sshd localname
11 pam_krb5 - Kerberos PAM module
22 The Kerberos service module for PAM, typically installed at
23 F</lib/security/pam_krb5.so>, provides functionality for the four PAM
26 dynamically loaded by the PAM subsystem as necessary, based on the system
27 PAM configuration. PAM is a system for plugging in external
30 user session on that system. For details on how to configure PAM on your
31 system, see the PAM man page, often pam(7).
40 former takes the username from the PAM session, prompts for the user's
53 After doing the initial authentication, the Kerberos PAM module will
[all …]
/freebsd/lib/libpam/modules/pam_krb5/
H A Dpam-krb5.864 pam_krb5 \- Kerberos PAM module
75 The Kerberos service module for PAM, typically installed at
76 \&\fI/lib/security/pam_krb5.so\fR, provides functionality for the four PAM
79 dynamically loaded by the PAM subsystem as necessary, based on the system
80 PAM configuration. PAM is a system for plugging in external
83 user session on that system. For details on how to configure PAM on your
84 system, see the PAM man page, often \fBpam\fR\|(7).
90 former takes the username from the PAM session, prompts for the user's
103 After doing the initial authentication, the Kerberos PAM module will
107 local key and that the PAM module be running as a user that can read the
[all …]
H A DMakefile29 SRCDIR= ${SRCTOP}/contrib/pam-krb5
32 ${SRCDIR}/pam-util \
49 pam-util_options.c \
60 MAN= pam-krb5.8
61 MLINKS= pam-krb5.8 pam_krb5.8
70 CLEANFILES= pam-util_options.c module_options.c
72 pam-util_options.c: .PHONY
73 cp ${SRCDIR}/pam-util/options.c pam-util_options.c
/freebsd/crypto/openssh/
H A Dauth-pam.c48 /* Based on FreeBSD: src/crypto/openssh/auth2-pam-freebsd.c,v 1.11 2003/03/31 13:48:18 des */
67 #include <pam/pam_appl.h>
89 #include "auth-pam.h"
159 return; /* handler called after PAM cleanup, shouldn't happen */ in sshpam_sigchld_handler()
162 /* PAM thread has not exitted, privsep slave must have */ in sshpam_sigchld_handler()
253 /* Some PAM implementations don't implement this */
261 * env vars (e.g. KRB5CCNAME) from the PAM environment. in pam_getenvlist()
279 * This wraps pam_chauthtok and sets/restore the real uid so PAM will do
289 fatal("PAM: sshpam_authctxt not initialized"); in sshpam_chauthtok_ruid()
308 fatal("%s: PAM authctxt not initialized", __func__); in sshpam_password_change_required()
[all …]
H A DINSTALL58 PAM:
60 OpenSSH can utilise Pluggable Authentication Modules (PAM) if your
61 system supports it. PAM is standard most Linux distributions, Solaris,
64 Information about the various PAM implementations are available:
66 Solaris PAM: http://www.sun.com/software/solaris/pam/
67 Linux PAM: http://www.kernel.org/pub/linux/libs/pam/
166 If you are using PAM, you may need to manually install a PAM control
167 file as "/etc/pam.d/sshd" (or wherever your system prefers to keep
168 them). Note that the service name used to start PAM is __progname,
171 executable, your PAM configuration may need to be modified.
[all …]
/freebsd/crypto/openssh/.github/workflows/
H A Dselfhosted.yml67 - { target: openindiana, config: pam, host: libvirt-hipri }
69 - { target: sol10, config: pam, host: libvirt-hipri }
71 - { target: sol11, config: pam-krb5, host: libvirt-hipri }
74 - { target: centos7, config: pam, host: libvirt }
75 - { target: debian-i386, config: pam, host: libvirt }
77 - { target: dfly48, config: pam ,host: libvirt }
78 - { target: dfly58, config: pam, host: libvirt }
79 - { target: dfly60, config: pam, host: libvirt }
80 - { target: dfly62, config: pam, host: libvirt }
81 - { target: dfly64, config: pam, host: libvirt }
[all …]
/freebsd/contrib/pam-krb5/portable/
H A Dpam.h2 * Portability wrapper around PAM header files.
4 * This header file includes the various PAM headers, wherever they may be
5 * found on the system, and defines replacements for PAM functions that may
30 /* Linux PAM 1.1.0 requires sys/types.h before security/pam_modutil.h. */
40 # include <pam/pam_appl.h>
41 # include <pam/pam_modules.h>
46 # include <pam/pam_ext.h>
51 # include <pam/pam_modutil.h>
61 /* Solaris 8 has deficient PAM. */
92 * Some PAM implementations support building the module static and exporting
[all …]
/freebsd/contrib/pam-krb5/module/
H A Dpublic.c2 * The public APIs of the pam-afs-session PAM module.
27 #include <portable/pam.h>
31 #include <pam-util/args.h>
32 #include <pam-util/logging.h>
36 * The main PAM interface for authorization checking.
55 * PAM configuration, but it's not common for the user to do so and that's in pam_sm_acct_mgmt()
56 * not how other krb5 PAM modules work. If we don't do this, root logins in pam_sm_acct_mgmt()
75 * The main PAM interface for authentication. We also do authorization checks
101 * The main PAM interface, in the auth stack, for establishing credentials
153 * Linux PAM library, at least for applications that call pam_setcred in pam_sm_setcred()
[all …]
/freebsd/contrib/openpam/doc/man/
H A Dpam.man2 The Pluggable Authentication Modules (PAM) library abstracts a number
7 In PAM parlance, the application that uses PAM to authenticate a user
16 user and perform whatever task he requested is a PAM transaction; the
20 The functionality embodied by PAM is divided into six primitives
24 The PAM library expects the application to provide a conversation
35 function initializes the PAM library and returns a handle which must
44 and can be called at any time to terminate a PAM transaction.
95 function returns a pointer to a string describing the specified PAM
/freebsd/contrib/pam-krb5/pam-util/
H A Dargs.h2 * Standard structure for PAM data.
4 * The PAM utility functions often need an initial argument that encapsulates
5 * the PAM handle, some configuration information, and possibly a Kerberos
8 * The individual PAM modules should provide a definition of the pam_config
9 * struct appropriate to that module. None of the PAM utility functions need
47 #include <portable/pam.h>
50 /* Opaque struct from the PAM utility perspective. */
54 pam_handle_t *pamh; /* Pointer back to the PAM handle. */
55 struct pam_config *config; /* Per-module PAM configuration. */
/freebsd/sys/contrib/openzfs/config/
H A Duser-pam.m42 AC_ARG_ENABLE([pam],
3 AS_HELP_STRING([--enable-pam],
10 [install pam module in dir [[$libdir/security]]]),
15 [install pam-config files in dir [DATADIR/pam-configs]]),
17 [pamconfigsdir='${datadir}/pam-configs'])
33 DEFINE_PAM='--with pam'

12345678910>>...15