| /freebsd/contrib/openpam/lib/libpam/ |
| H A D | openpam_constants.c | 55 [PAM_NEW_AUTHTOK_REQD] = "PAM_NEW_AUTHTOK_REQD", 92 [PAM_NEW_AUTHTOK_REQD] = "New authentication token required",
|
| H A D | openpam_dispatch.c | 172 if (!fail && err != PAM_NEW_AUTHTOK_REQD) in openpam_dispatch() 223 r == PAM_NEW_AUTHTOK_REQD || in openpam_check_error_code()
|
| H A D | pam_sm_acct_mgmt.c | 76 * PAM_NEW_AUTHTOK_REQD
|
| /freebsd/contrib/pam-krb5/tests/data/scripts/expired/ |
| H A D | defer-mit | 17 acct_mgmt = PAM_NEW_AUTHTOK_REQD
|
| H A D | defer-mit-debug | 18 acct_mgmt = PAM_NEW_AUTHTOK_REQD
|
| /freebsd/contrib/openpam/doc/man/ |
| H A D | pam_sm_acct_mgmt.3 | 40 .It Bq Er PAM_NEW_AUTHTOK_REQD
|
| H A D | pam_acct_mgmt.3 | 51 .It Bq Er PAM_NEW_AUTHTOK_REQD
|
| H A D | pam.3 | 208 .It Bq Er PAM_NEW_AUTHTOK_REQD
|
| /freebsd/lib/libpam/modules/pam_unix/ |
| H A D | pam_unix.c | 193 return (PAM_NEW_AUTHTOK_REQD); in pam_sm_acct_mgmt() 232 retval = PAM_NEW_AUTHTOK_REQD; in pam_sm_acct_mgmt() 244 * PAM_NEW_AUTHTOK_REQD. in pam_sm_acct_mgmt()
|
| /freebsd/contrib/pam-krb5/module/ |
| H A D | account.c | 49 return PAM_NEW_AUTHTOK_REQD; in pamk5_account()
|
| H A D | auth.c | 930 status = PAM_NEW_AUTHTOK_REQD; in pamk5_password_auth() 1042 if (pamret == PAM_NEW_AUTHTOK_REQD) { in pamk5_authenticate()
|
| /freebsd/contrib/openpam/include/security/ |
| H A D | pam_constants.h | 59 PAM_NEW_AUTHTOK_REQD = 10, enumerator
|
| /freebsd/contrib/openpam/bin/su/ |
| H A D | su.c | 114 if ((pam_err = pam_acct_mgmt(pamh, 0)) == PAM_NEW_AUTHTOK_REQD) in main()
|
| /freebsd/lib/libpam/modules/pam_exec/ |
| H A D | pam_exec.c | 81 PAM_ERR_ENV(PAM_NEW_AUTHTOK_REQD), 568 case PAM_NEW_AUTHTOK_REQD: in pam_sm_acct_mgmt()
|
| /freebsd/contrib/pam-krb5/tests/fakepam/ |
| H A D | config.c | 114 {"PAM_NEW_AUTHTOK_REQD", PAM_NEW_AUTHTOK_REQD},
|
| /freebsd/crypto/openssh/ |
| H A D | auth-pam.c | 1094 if (sshpam_err != PAM_SUCCESS && sshpam_err != PAM_NEW_AUTHTOK_REQD) { in do_pam_account() 1099 if (sshpam_err == PAM_NEW_AUTHTOK_REQD) in do_pam_account()
|
| /freebsd/libexec/atrun/ |
| H A D | atrun.c | 182 if (pam_err != PAM_SUCCESS && pam_err != PAM_NEW_AUTHTOK_REQD) in run_file()
|
| /freebsd/usr.bin/su/ |
| H A D | su.c | 321 if (retcode == PAM_NEW_AUTHTOK_REQD) { in main()
|
| /freebsd/usr.sbin/cron/cron/ |
| H A D | do_command.c | 142 if (pam_err != PAM_SUCCESS && pam_err != PAM_NEW_AUTHTOK_REQD) { in child_process()
|
| /freebsd/contrib/pam-krb5/docs/ |
| H A D | docknot.yaml | 476 `PAM_NEW_AUTHTOK_REQD` from `pam_acct_mgmt`) can be enabled with the
|
| /freebsd/contrib/openpam/misc/ |
| H A D | gendoc.pl | 74 PAM_NEW_AUTHTOK_REQD => "New authentication token required",
|
| /freebsd/contrib/pam-krb5/ |
| H A D | README.md | 504 `PAM_NEW_AUTHTOK_REQD` from `pam_acct_mgmt`) can be enabled with the
|
| H A D | README | 470 PAM_NEW_AUTHTOK_REQD from pam_acct_mgmt) can be enabled with the
|
| /freebsd/usr.bin/login/ |
| H A D | login.c | 734 case PAM_NEW_AUTHTOK_REQD: in auth_pam()
|
| /freebsd/lib/libpam/modules/pam_krb5/ |
| H A D | pam-krb5.8 | 709 should return PAM_NEW_AUTHTOK_REQD, at which point the calling
|