| /freebsd/contrib/openpam/doc/man/ |
| H A D | pam_setcred.3 | 1 .\" Generated from pam_setcred.c by gendoc.pl 6 .Nm pam_setcred 12 .Fn pam_setcred "pam_handle_t *pamh" "int flags" 15 .Fn pam_setcred 38 .Fn pam_setcred 43 .Fn pam_setcred 81 .Fn pam_setcred
|
| H A D | pam_sm_setcred.3 | 7 .Nd service module implementation for pam_setcred 19 .Xr pam_setcred 3 53 .Xr pam_setcred 3 ,
|
| H A D | pam.3 | 20 .Nm pam_setcred , 57 .Fn pam_setcred "pam_handle_t *pamh" "int flags" 125 .Fn pam_setcred . 246 .Xr pam_setcred 3 ,
|
| H A D | pam.conf.5 | 80 .Xr pam_setcred 3 148 .Xr pam_setcred 3 ,
|
| H A D | Makefile.am | 19 pam_setcred.3 \
|
| H A D | pam.man | 64 .Fn pam_setcred .
|
| /freebsd/contrib/openpam/bin/pamtest/ |
| H A D | pamtest.1 | 83 .Xr pam_setcred 3 95 .Xr pam_setcred 3 133 .Xr pam_setcred 3 , 183 .Xr pam_setcred 3 ,
|
| H A D | pamtest.c | 154 * Wrapper for pam_setcred(3) 162 pt_verbose("pam_setcred()"); in pt_setcred() 163 if ((pame = pam_setcred(pamh, flags)) != PAM_SUCCESS) in pt_setcred() 164 pt_error(pame, "pam_setcred()"); in pt_setcred()
|
| /freebsd/contrib/pam-krb5/docs/ |
| H A D | docknot.yaml | 155 `pam_setcred(PAM_REINITIALIZE_CRED)` without first calling 380 pam_setcred(PAM_ESTABLISH_CRED) 401 credentials to the call to `pam_setcred`. The module would use a memory 404 `pam_setcred`. Most do, but OpenSSH notoriously does not and calls 406 tickets to the `pam_setcred` call in a different process. 420 pam-krb5 treats `pam_open_session` and `pam_setcred(PAM_ESTABLISH_CRED)` 426 some applications call `pam_setcred` or `pam_open_session` multiple 434 After the call to `pam_setcred` or `pam_open_session`, the ticket cache 444 pam_setcred(PAM_REINITIALIZE_CRED) 449 above. At the `pam_setcred` stage, rather than creating a new ticket [all …]
|
| H A D | pam_krb5.pod | 39 Provides implementations of pam_authenticate() and pam_setcred(). The 90 When pam_setcred() is called to initialize a new ticket cache, the 102 If pam_setcred() initializes a new ticket cache, it will also set up that 111 calling pam_setcred() with the PAM_ESTABLISH_CRED flag, and 113 pam_setcred(). 289 session calls (including pam_setcred) will return PAM_IGNORE, telling the 303 (including pam_setcred) will return PAM_IGNORE, telling the PAM library to 901 pam_setcred(), pam_start_session(), and pam_acct_mgmt() don't make sense 931 Set by pam_setcred() with the PAM_ESTABLISH_CRED option, and therefore 939 authentication (unless the I<no_ccache> option was given). pam_setcred() [all …]
|
| /freebsd/contrib/openpam/lib/libpam/ |
| H A D | pam_setcred.c | 54 pam_setcred(pam_handle_t *pamh, in pam_setcred() function 78 * The =pam_setcred function manages the application's credentials. 96 * If any other bits are set, =pam_setcred will return =PAM_BAD_CONSTANT.
|
| H A D | pam_sm_setcred.c | 49 * Service module implementation for pam_setcred 83 * the =pam_setcred API function.
|
| H A D | Makefile.am | 71 pam_setcred.c \
|
| H A D | Makefile.in | 156 pam_set_data.lo pam_set_item.lo pam_setcred.lo pam_setenv.lo \ 219 ./$(DEPDIR)/pam_set_item.Plo ./$(DEPDIR)/pam_setcred.Plo \ 475 pam_setcred.c \ 629 @AMDEP_TRUE@@am__include@ @am__quote@./$(DEPDIR)/pam_setcred.Plo@am__quote@ # am--include-marker 845 -rm -f ./$(DEPDIR)/pam_setcred.Plo 945 -rm -f ./$(DEPDIR)/pam_setcred.Plo
|
| /freebsd/contrib/pam-krb5/ |
| H A D | README.md | 79 `pam_setcred(PAM_REINITIALIZE_CRED)` without first calling 408 pam_setcred(PAM_ESTABLISH_CRED) 429 the call to `pam_setcred`. The module would use a memory cache, but 431 environment between the calls to `pam_authenticate` and `pam_setcred`. 434 `pam_setcred` call in a different process. 448 pam-krb5 treats `pam_open_session` and `pam_setcred(PAM_ESTABLISH_CRED)` 454 `pam_setcred` or `pam_open_session` multiple times (most notably X.Org 7 462 After the call to `pam_setcred` or `pam_open_session`, the ticket cache 472 pam_setcred(PAM_REINITIALIZE_CRED) 477 above. At the `pam_setcred` stage, rather than creating a new ticket [all …]
|
| H A D | README | 77 pam_setcred(PAM_REINITIALIZE_CRED) without first calling 380 pam_setcred(PAM_ESTABLISH_CRED) 398 to the call to pam_setcred. The module would use a memory cache, but 400 environment between the calls to pam_authenticate and pam_setcred. Most 403 pam_setcred call in a different process. 417 pam-krb5 treats pam_open_session and pam_setcred(PAM_ESTABLISH_CRED) as 423 pam_setcred or pam_open_session multiple times (most notably X.Org 7 and 431 After the call to pam_setcred or pam_open_session, the ticket cache will 440 pam_setcred(PAM_REINITIALIZE_CRED) 444 above. At the pam_setcred stage, rather than creating a new ticket [all …]
|
| H A D | NEWS | 423 pam_setcred. It's safe to return success when doing nothing in 424 pam_setcred because the stack has already been frozen after the 499 Stop returning PAM_IGNORE from pam_setcred if the user is ignored or 502 would cause pam_setcred to fail even if other modules succeeded. 507 the ticket cache named in KRB5CCNAME during pam_setcred. Instead, 515 pam_setcred anyway unless the calling user is permitted to generally 588 SECURITY: Disable pam_setcred(PAM_REINITIALIZE_CREDS) for setuid 591 su calls pam_setcred with that option rather than PAM_ESTABLISH_CREDS 655 pam_setcred, pam_open_session, and pam_acct_mgmt now return PAM_IGNORE 726 If no_ccache is set, always exit successfully from pam_setcred or [all …]
|
| /freebsd/contrib/pam-krb5/module/ |
| H A D | public.c | 143 putil_err(args, "invalid pam_setcred flags %d", flags); in pam_sm_setcred() 152 * Never return PAM_IGNORE from pam_setcred since this can confuse the in pam_sm_setcred() 153 * Linux PAM library, at least for applications that call pam_setcred in pam_sm_setcred() 161 * during the second pass with pam_setcred. in pam_sm_setcred()
|
| H A D | setcred.c | 4 * pam_setcred and pam_open_session need to do similar but not identical work 291 * pam_authenticate, but for either pam_setcred (other than DELETE) or for in pamk5_setcred() 308 * Solaris su calls pam_setcred as root with PAM_REINITIALIZE_CREDS, in pamk5_setcred() 311 * before calling pam_setcred. in pamk5_setcred()
|
| H A D | cache.c | 5 * pam_setcred, and pam_chauthtok after changing an expired password. 154 * in PAM_KRB5CCNAME where it can be picked up later by pam_setcred. Returns
|
| /freebsd/contrib/openpam/t/ |
| H A D | t_openpam_dispatch.c | 85 pam_err = pam_setcred(pamh, 0); 86 t_printv("pam_setcred() returned %d\n", pam_err); 160 pam_err = pam_setcred(pamh, tc->flags);
|
| /freebsd/usr.bin/su/ |
| H A D | su.c | 92 local_ret = pam_setcred(pamh, PAM_DELETE_CRED); \ 94 syslog(LOG_ERR, "pam_setcred: %s", \ 394 * PAM modules might add supplementary groups in pam_setcred(), so in main() 400 retcode = pam_setcred(pamh, PAM_ESTABLISH_CRED); in main() 402 syslog(LOG_ERR, "pam_setcred: %s", in main() 417 * pam_setcred(pamh, PAM_DELETE_CRED) as root. in main()
|
| /freebsd/lib/libpam/modules/pam_krb5/ |
| H A D | pam-krb5.8 | 89 Provides implementations of \fBpam_authenticate()\fR and \fBpam_setcred()\fR. The 140 When \fBpam_setcred()\fR is called to initialize a new ticket cache, the 152 If \fBpam_setcred()\fR initializes a new ticket cache, it will also set up that 160 calling \fBpam_setcred()\fR with the PAM_ESTABLISH_CRED flag, and 333 session calls (including pam_setcred) will return PAM_IGNORE, telling the 346 (including pam_setcred) will return PAM_IGNORE, telling the PAM library to 917 Set by \fBpam_setcred()\fR with the PAM_ESTABLISH_CRED option, and therefore 924 authentication (unless the \fIno_ccache\fR option was given). \fBpam_setcred()\fR 941 is ended or when \fBpam_setcred()\fR is called and will normally not be 989 pam_setcred(PAM_REINITIALIZE_CRED) without first calling pam_open_session,
|
| /freebsd/lib/libpam/libpam/ |
| H A D | Makefile | 94 pam_setcred.c \ 139 pam_setcred.3 \
|
| /freebsd/usr.bin/login/ |
| H A D | login.c | 399 pam_err = pam_setcred(pamh, pam_silent|PAM_ESTABLISH_CRED); in main() 401 pam_syslog("pam_setcred()"); in main() 524 * PAM modules might add supplementary groups during pam_setcred(). in main() 531 pam_err = pam_setcred(pamh, pam_silent|PAM_REINITIALIZE_CRED); in main() 533 pam_syslog("pam_setcred()"); in main() 981 pam_err = pam_setcred(pamh, pam_silent|PAM_DELETE_CRED); in pam_cleanup() 983 pam_syslog("pam_setcred()"); in pam_cleanup()
|