Home
last modified time | relevance | path

Searched refs:pamh (Results 1 – 25 of 60) sorted by relevance

123

/titanic_44/usr/src/lib/libpam/
H A Dpam_framework.c145 pam_trace_cname(pam_handle_t *pamh) in pam_trace_cname() argument
147 if (pamh->pam_conf_name[pamh->include_depth] == NULL) in pam_trace_cname()
149 return (pamh->pam_conf_name[pamh->include_depth]); in pam_trace_cname()
291 const struct pam_conv *pam_conv, pam_handle_t **pamh) in pam_start() argument
295 *pamh = calloc(1, sizeof (struct pam_handle)); in pam_start()
301 (void *)*pamh, pam_debug); in pam_start()
303 if (*pamh == NULL) in pam_start()
306 (*pamh)->pam_inmodule = RO_OK; /* OK to set RO items */ in pam_start()
307 if ((err = pam_set_item(*pamh, PAM_SERVICE, (void *)service)) in pam_start()
309 clean_up(*pamh); in pam_start()
[all …]
H A Dpam_appl.h158 pam_handle_t **pamh /* Address to store handle */
166 pam_handle_t *pamh, /* handle from pam_start() */
176 pam_handle_t *pamh, /* PAM handle */
187 const pam_handle_t *pamh, /* PAM handle */
226 pam_handle_t *pamh, /* PAM handle */
236 pam_handle_t *pamh, /* pam handle */
248 pam_handle_t *pamh,
263 pam_handle_t *pamh,
273 pam_handle_t *pamh,
282 pam_handle_t *pamh,
[all …]
H A Dpam_modules.h38 pam_handle_t *pamh,
45 pam_handle_t *pamh,
52 pam_handle_t *pamh,
59 pam_handle_t *pamh,
66 pam_handle_t *pamh,
80 pam_handle_t *pamh,
92 pam_handle_t *pamh, /* PAM handle */
95 void (*cleanup)(pam_handle_t *pamh, void *data, int pam_end_status)
104 const pam_handle_t *pamh,
H A Dpam_impl.h144 __pam_get_authtok(pam_handle_t *pamh, int source, int type, char *prompt,
148 __pam_display_msg(pam_handle_t *pamh, int msg_style, int num_msg,
174 void (*cleanup)(pam_handle_t *pamh, void *data, int pam_status);
227 int (*pam_sm_authenticate)(pam_handle_t *pamh, int flags, int argc,
229 int (*pam_sm_setcred)(pam_handle_t *pamh, int flags, int argc,
234 int (*pam_sm_chauthtok)(pam_handle_t *pamh, int flags, int argc,
239 int (*pam_sm_open_session)(pam_handle_t *pamh, int flags, int argc,
241 int (*pam_sm_close_session)(pam_handle_t *pamh, int flags, int argc,
246 int (*pam_sm_acct_mgmt)(pam_handle_t *pamh, int flags, int argc,
/titanic_44/usr/src/lib/pam_modules/authtok_get/
H A Dauthtok_get.c43 error(pam_handle_t *pamh, char *fmt, ...) in error() argument
50 (void) __pam_display_msg(pamh, PAM_ERROR_MSG, 1, messages, NULL); in error()
55 read_authtok(pam_handle_t *pamh, int debug) in read_authtok() argument
67 res = pam_get_item(pamh, PAM_OLDAUTHTOK, (void **)&authtok); in read_authtok()
72 res = pam_get_item(pamh, PAM_AUTHTOK, (void **)&authtok); in read_authtok()
76 res = pam_set_item(pamh, PAM_OLDAUTHTOK, in read_authtok()
79 res = pam_set_item(pamh, PAM_AUTHTOK, NULL); in read_authtok()
98 res = pam_get_item(pamh, PAM_AUTHTOK, (void **)&pwd); in read_authtok()
110 (void) pam_set_item(pamh, PAM_AUTHTOK, NULL); in read_authtok()
112 res = __pam_get_authtok(pamh, PAM_PROMPT, PAM_AUTHTOK, in read_authtok()
[all …]
/titanic_44/usr/src/lib/pam_modules/allow/
H A Dallow.c47 debug(pam_handle_t *pamh, int flags, int argc, const char **argv, char *mod) in debug() argument
55 (void) pam_get_item(pamh, PAM_SERVICE, (void **)&service); in debug()
56 (void) pam_get_item(pamh, PAM_USER, (void **)&user); in debug()
64 pam_sm_authenticate(pam_handle_t *pamh, int flags, int argc, const char **argv) in pam_sm_authenticate() argument
66 debug(pamh, flags, argc, argv, "pam_sm_authenticate"); in pam_sm_authenticate()
71 pam_sm_setcred(pam_handle_t *pamh, int flags, int argc, const char **argv) in pam_sm_setcred() argument
73 debug(pamh, flags, argc, argv, "pam_sm_setcred"); in pam_sm_setcred()
78 pam_sm_acct_mgmt(pam_handle_t *pamh, int flags, int argc, const char **argv) in pam_sm_acct_mgmt() argument
80 debug(pamh, flags, argc, argv, "pam_sm_acct_mgmt"); in pam_sm_acct_mgmt()
85 pam_sm_open_session(pam_handle_t *pamh, int flags, int argc, const char **argv) in pam_sm_open_session() argument
[all …]
/titanic_44/usr/src/lib/pam_modules/deny/
H A Ddeny.c47 debug(pam_handle_t *pamh, int flags, int argc, const char **argv, char *mod) in debug() argument
55 (void) pam_get_item(pamh, PAM_SERVICE, (void **)&service); in debug()
56 (void) pam_get_item(pamh, PAM_USER, (void **)&user); in debug()
64 pam_sm_authenticate(pam_handle_t *pamh, int flags, int argc, const char **argv) in pam_sm_authenticate() argument
66 debug(pamh, flags, argc, argv, "pam_sm_authenticate"); in pam_sm_authenticate()
71 pam_sm_setcred(pam_handle_t *pamh, int flags, int argc, const char **argv) in pam_sm_setcred() argument
73 debug(pamh, flags, argc, argv, "pam_sm_setcred"); in pam_sm_setcred()
78 pam_sm_acct_mgmt(pam_handle_t *pamh, int flags, int argc, const char **argv) in pam_sm_acct_mgmt() argument
80 debug(pamh, flags, argc, argv, "pam_sm_acct_mgmt"); in pam_sm_acct_mgmt()
85 pam_sm_open_session(pam_handle_t *pamh, int flags, int argc, const char **argv) in pam_sm_open_session() argument
[all …]
/titanic_44/usr/src/lib/pam_modules/authtok_store/
H A Dauthtok_store.c44 error(int nowarn, pam_handle_t *pamh, char *fmt, ...) in error() argument
52 (void) __pam_display_msg(pamh, PAM_ERROR_MSG, 1, messages, in error()
59 info(int nowarn, pam_handle_t *pamh, char *fmt, ...) in info() argument
67 (void) __pam_display_msg(pamh, PAM_TEXT_INFO, 1, messages, in info()
78 authtok_is_aged(pam_handle_t *pamh) in authtok_is_aged() argument
82 if (pam_get_data(pamh, UNIX_AUTHTOK_DATA, in authtok_is_aged()
91 pam_sm_chauthtok(pam_handle_t *pamh, int flags, int argc, const char **argv)
130 if ((flags & PAM_CHANGE_EXPIRED_AUTHTOK) && !authtok_is_aged(pamh)) {
136 res = pam_get_item(pamh, PAM_SERVICE, (void **)&service);
142 res = pam_get_item(pamh, PAM_USER, (void **)&user);
[all …]
/titanic_44/usr/src/lib/pam_modules/ldap/
H A Dldap_acct_mgmt.c34 pam_handle_t *pamh, in ldap_cleanup() argument
48 pam_handle_t *pamh, in warn_user_passwd_will_expire() argument
77 (void) __pam_display_msg(pamh, PAM_TEXT_INFO, 1, messages, NULL); in warn_user_passwd_will_expire()
85 display_acct_unlock_time(pam_handle_t *pamh, int sec_b4_unlock) in display_acct_unlock_time() argument
96 (void) __pam_display_msg(pamh, PAM_TEXT_INFO, 1, in display_acct_unlock_time()
126 (void) __pam_display_msg(pamh, PAM_TEXT_INFO, 1, messages, NULL); in display_acct_unlock_time()
133 warn_user_passwd_expired(pam_handle_t *pamh, int grace) in warn_user_passwd_expired() argument
148 (void) __pam_display_msg(pamh, PAM_TEXT_INFO, 1, messages, NULL); in warn_user_passwd_expired()
156 display_passwd_reset_msg(pam_handle_t *pamh) in display_passwd_reset_msg() argument
164 (void) __pam_display_msg(pamh, PAM_TEXT_INFO, 1, messages, NULL); in display_passwd_reset_msg()
[all …]
/titanic_44/usr/src/lib/pam_modules/smb/
H A Dsmb_passwd.c45 error(boolean_t nowarn, pam_handle_t *pamh, char *fmt, ...) in error() argument
55 (void) __pam_display_msg(pamh, PAM_ERROR_MSG, 1, &message, in error()
62 info(boolean_t nowarn, pam_handle_t *pamh, char *fmt, ...) in info() argument
72 (void) __pam_display_msg(pamh, PAM_TEXT_INFO, 1, &message, in info()
78 pam_sm_chauthtok(pam_handle_t *pamh, int flags, int argc, const char **argv) in pam_sm_chauthtok() argument
110 (void) pam_get_item(pamh, PAM_SERVICE, (void **)&service); in pam_sm_chauthtok()
111 (void) pam_get_item(pamh, PAM_USER, (void **)&user); in pam_sm_chauthtok()
119 (void) pam_get_item(pamh, PAM_AUTHTOK, (void **)&newpw); in pam_sm_chauthtok()
160 info(nowarn, pamh, dgettext(TEXT_DOMAIN, in pam_sm_chauthtok()
174 error(nowarn, pamh, dgettext(TEXT_DOMAIN, in pam_sm_chauthtok()
[all …]
/titanic_44/usr/src/lib/pam_modules/dhkeys/
H A Ddhkeys.c74 msg(pam_handle_t *pamh, char *fmt, ...) in msg() argument
83 return (__pam_display_msg(pamh, PAM_ERROR_MSG, 1, messages, NULL)); in msg()
97 pam_handle_t *pamh, /* in */ in get_and_set_seckey() argument
137 if (pamh && !(flags & PAM_SILENT)) { in get_and_set_seckey()
144 (void) __pam_display_msg(pamh, PAM_ERROR_MSG, 1, in get_and_set_seckey()
196 establish_key(pam_handle_t *pamh, int flags, int debug, char *netname) in establish_key() argument
217 (void) pam_get_item(pamh, PAM_USER, (void **)&user); in establish_key()
225 (void) pam_get_item(pamh, PAM_AUTHTOK, (void **)&passwd); in establish_key()
279 if (!get_and_set_seckey(pamh, netname, mp->keylen, in establish_key()
303 if (!get_and_set_seckey(pamh, netname, AUTH_DES_KEYLEN, in establish_key()
[all …]
/titanic_44/usr/src/lib/pam_modules/krb5/
H A Dkrb5_password.c59 pam_handle_t *pamh, in set_ccname() argument
80 if ((result = pam_putenv(pamh, kmd->env)) in set_ccname()
107 pam_handle_t *pamh, in get_set_creds() argument
124 login_result = attempt_krb5_auth(pamh, kmd, user, &newpass, 0); in get_set_creds()
134 display_msg(pamh, PAM_TEXT_INFO, in get_set_creds()
141 set_ccname(pamh, kmd, login_result, debug); in get_set_creds()
150 pam_handle_t *pamh, in pam_sm_chauthtok() argument
180 (void) pam_get_item(pamh, PAM_REPOSITORY, (void **)&rep_data); in pam_sm_chauthtok()
210 if ((err = pam_get_data(pamh, KRB5_DATA, (const void **)&kmd)) in pam_sm_chauthtok()
231 (void) pam_get_item(pamh, PAM_USER, (void **)&user); in pam_sm_chauthtok()
[all …]
H A Dkrb5_acct_mgmt.c166 pam_handle_t *pamh, in exp_warn() argument
185 if (!pamh || !user || !password) { in exp_warn()
266 (void) __pam_display_msg(pamh, PAM_TEXT_INFO, 1, in exp_warn()
303 pam_handle_t *pamh, in pam_sm_acct_mgmt() argument
337 (void) pam_get_item(pamh, PAM_REPOSITORY, (void **)&rep_data); in pam_sm_acct_mgmt()
356 (void) pam_get_item(pamh, PAM_USER, (void **) &user); in pam_sm_acct_mgmt()
364 err = pam_get_data(pamh, KRB5_AUTOMIGRATE_DATA, in pam_sm_acct_mgmt()
378 (void) pam_sm_authenticate(pamh, flags, argc, in pam_sm_acct_mgmt()
389 if ((err = pam_get_data(pamh, KRB5_DATA, (const void **)&kmd)) in pam_sm_acct_mgmt()
451 (void) __pam_display_msg(pamh, PAM_TEXT_INFO, in pam_sm_acct_mgmt()
[all …]
/titanic_44/usr/src/lib/pam_modules/authtok_check/
H A Dauthtok_check.c112 error(pam_handle_t *pamh, int flags, char *fmt, ...) in error() argument
121 (void) __pam_display_msg(pamh, PAM_ERROR_MSG, 1, msg, NULL); in error()
147 get_passwd_defaults(pam_handle_t *pamh, char *user, struct pwdefaults *p) in get_passwd_defaults() argument
158 (void) pam_get_item(pamh, PAM_SERVICE, (void **)&progname); in get_passwd_defaults()
260 (void) pam_get_item(pamh, PAM_REPOSITORY, (void **)&pam_rep); in get_passwd_defaults()
436 check_composition(char *pw, struct pwdefaults *pwdef, pam_handle_t *pamh, in check_composition() argument
454 (void) pam_get_item(pamh, PAM_SERVICE, (void **)&progname); in check_composition()
530 error(pamh, flags, dgettext(TEXT_DOMAIN, in check_composition()
542 error(pamh, flags, errmsg, pwdef->minalpha, in check_composition()
553 error(pamh, flags, errmsg, pwdef->minnonalpha, in check_composition()
[all …]
/titanic_44/usr/src/lib/pam_modules/passwd_auth/
H A Dpasswd_auth.c46 error(int nowarn, pam_handle_t *pamh, char *fmt, ...) in error() argument
54 (void) __pam_display_msg(pamh, PAM_ERROR_MSG, 1, messages, in error()
65 pam_sm_authenticate(pam_handle_t *pamh, int flags, int argc, const char **argv) in pam_sm_authenticate() argument
102 if ((res = pam_get_user(pamh, &user, NULL)) != PAM_SUCCESS) { in pam_sm_authenticate()
105 "get user failed: %s", pam_strerror(pamh, res)); in pam_sm_authenticate()
115 res = pam_get_item(pamh, PAM_AUTHTOK, (void **)&password); in pam_sm_authenticate()
122 res = pam_get_item(pamh, PAM_SERVICE, (void **)&service); in pam_sm_authenticate()
126 res = pam_get_item(pamh, PAM_REPOSITORY, (void **)&auth_rep); in pam_sm_authenticate()
153 error(nowarn, pamh, dgettext(TEXT_DOMAIN, "%s: " in pam_sm_authenticate()
194 retval = __pam_get_authtok(pamh, PAM_PROMPT, PAM_AUTHTOK, prompt, in pam_sm_authenticate()
[all …]
/titanic_44/usr/src/cmd/rexd/
H A Dunix_login.c68 pam_handle_t *pamh; variable
154 if (pam_start("rexd", pw->pw_name, NULL, &pamh) != PAM_SUCCESS ||
155 pam_set_item(pamh, PAM_RHOST, host) != PAM_SUCCESS) {
164 if (pamh) {
165 pam_end(pamh, PAM_ABORT);
166 pamh = NULL;
171 if ((v = pam_acct_mgmt(pamh, 0)) != PAM_SUCCESS) {
190 pam_end(pamh, PAM_ABORT);
191 pamh = NULL;
356 if (pam_set_item(pamh, PAM_TTY, slavename) != PAM_SUCCESS || in LoginUser()
[all …]
H A Drpc.rexd.c89 pam_handle_t *pamh; /* PAM handle */ variable
839 extern pam_handle_t *pamh;
925 if (pamh) {
926 pam_end(pamh, PAM_ABORT);
927 pamh = NULL;
941 if (pamh) {
942 pam_end(pamh, PAM_ABORT);
943 pamh = NULL;
974 if (pamh) {
975 pam_end(pamh, PAM_ABORT);
[all …]
/titanic_44/usr/src/lib/pam_modules/unix_auth/
H A Dunix_auth.c56 error(pam_handle_t *pamh, char *fmt, ...) in error() argument
63 (void) __pam_display_msg(pamh, PAM_ERROR_MSG, 1, messages, NULL); in error()
108 display_warning(pam_handle_t *pamh, int failures, char *homedir) in display_warning() argument
118 error(pamh, "Warning: 1 failed login attempt since last " in display_warning()
121 error(pamh, "Warning: %d failed login attempts since last " in display_warning()
124 error(pamh, "Warning: at least %d failed login attempts since " in display_warning()
140 pam_sm_authenticate(pam_handle_t *pamh, int flags, int argc, const char **argv) in pam_sm_authenticate() argument
174 if (pam_get_item(pamh, PAM_USER, (void **)&user) != PAM_SUCCESS) { in pam_sm_authenticate()
185 if (pam_get_item(pamh, PAM_AUTHTOK, (void **)&passwd) != PAM_SUCCESS) { in pam_sm_authenticate()
191 result = pam_get_item(pamh, PAM_REPOSITORY, (void **)&auth_rep); in pam_sm_authenticate()
[all …]
/titanic_44/usr/src/lib/pam_modules/unix_account/
H A Dunix_acct.c74 pam_handle_t *pamh, in unix_cleanup() argument
182 pam_handle_t *pamh, in perform_passwd_aging_check() argument
230 (void) __pam_display_msg(pamh, PAM_ERROR_MSG, 2, messages, in perform_passwd_aging_check()
243 pam_handle_t *pamh, in warn_user_passwd_will_expire() argument
271 (void) __pam_display_msg(pamh, PAM_TEXT_INFO, 1, messages, in warn_user_passwd_will_expire()
282 pam_sm_acct_mgmt(pam_handle_t *pamh, int flags, int argc, const char **argv) in pam_sm_acct_mgmt() argument
318 if ((error = pam_get_item(pamh, PAM_USER, (void **)&user)) in pam_sm_acct_mgmt()
328 if ((error = pam_get_item(pamh, PAM_REPOSITORY, (void **)&auth_rep)) in pam_sm_acct_mgmt()
452 (void) pam_get_item(pamh, PAM_SERVICE, (void **)&service); in pam_sm_acct_mgmt()
453 (void) pam_get_item(pamh, PAM_RHOST, (void **)&rhost); in pam_sm_acct_mgmt()
[all …]
/titanic_44/usr/src/lib/pam_modules/dial_auth/
H A Ddial_auth.c55 pam_sm_authenticate(pam_handle_t *pamh, int flags, int argc, const char **argv) in pam_sm_authenticate() argument
77 if ((retcode = pam_get_user(pamh, &user, NULL)) in pam_sm_authenticate()
79 (retcode = pam_get_item(pamh, PAM_TTY, (void **)&ttyn)) in pam_sm_authenticate()
92 (void) pam_get_item(pamh, PAM_SERVICE, (void **)&service); in pam_sm_authenticate()
95 pam_strerror(pamh, PAM_SERVICE_ERR)); in pam_sm_authenticate()
117 pam_strerror(pamh, PAM_SYSTEM_ERR)); in pam_sm_authenticate()
153 res = __pam_get_authtok(pamh, PAM_PROMPT, PAM_AUTHTOK, in pam_sm_authenticate()
177 pam_sm_setcred(pam_handle_t *pamh, int flags, int argc, const char **argv) in pam_sm_setcred() argument
/titanic_44/usr/src/cmd/cmd-inet/usr.sbin/
H A Din.rexecd.c93 static pam_handle_t *pamh; /* authentication handle */ variable
294 if (pam_start("rexec", user, &conv, &pamh) != PAM_SUCCESS) { in doit()
297 if (pam_set_item(pamh, PAM_RHOST, hostname) != PAM_SUCCESS) { in doit()
301 if ((status = pam_authenticate(pamh, pam_flags)) != PAM_SUCCESS) { in doit()
313 pam_end(pamh, status); in doit()
316 if ((status = pam_acct_mgmt(pamh, pam_flags)) != PAM_SUCCESS) { in doit()
333 pam_end(pamh, status); in doit()
343 pam_end(pamh, PAM_ABORT); in doit()
348 if ((status = pam_setcred(pamh, PAM_ESTABLISH_CRED)) != PAM_SUCCESS) { in doit()
352 pam_end(pamh, PAM_SUCCESS); in doit()
[all …]
/titanic_44/usr/src/lib/pam_modules/roles/
H A Droles.c50 pam_sm_acct_mgmt(pam_handle_t *pamh, int flags, int argc, const char **argv) in pam_sm_acct_mgmt() argument
66 (void) pam_get_item(pamh, PAM_USER, (void **)&username); in pam_sm_acct_mgmt()
67 (void) pam_get_item(pamh, PAM_AUSER, (void **)&auser); in pam_sm_acct_mgmt()
68 (void) pam_get_item(pamh, PAM_RHOST, (void **)&rhost); in pam_sm_acct_mgmt()
86 (void) pam_get_item(pamh, PAM_RUSER, (void **)&ruser); in pam_sm_acct_mgmt()
87 (void) pam_get_item(pamh, PAM_SERVICE, (void **)&service); in pam_sm_acct_mgmt()
176 (void) __pam_display_msg(pamh, PAM_ERROR_MSG, 1, messages, in pam_sm_acct_mgmt()
/titanic_44/usr/src/lib/pam_modules/rhosts_auth/
H A Drhosts_auth.c49 pam_handle_t *pamh, in pam_sm_authenticate() argument
69 if (pam_get_item(pamh, PAM_USER, (void **) &lusername) != PAM_SUCCESS) in pam_sm_authenticate()
71 if (pam_get_item(pamh, PAM_RHOST, (void **) &host) != PAM_SUCCESS) in pam_sm_authenticate()
73 if (pam_get_item(pamh, PAM_RUSER, (void **)&rusername) != PAM_SUCCESS) in pam_sm_authenticate()
109 pam_handle_t *pamh, in pam_sm_setcred() argument
/titanic_44/usr/src/cmd/bnu/
H A Din.uucpd.c59 pam_handle_t *pamh; variable
224 if ((pam_start("uucp", user, &conv, &pamh)) != PAM_SUCCESS)
226 if ((pam_set_item(pamh, PAM_TTY, ttyname(0))) != PAM_SUCCESS)
229 if (pam_authenticate(pamh, PAM_SILENT) != PAM_SUCCESS) {
233 pam_end(pamh, PAM_ABORT);
237 if ((error = pam_acct_mgmt(pamh, PAM_SILENT)) != PAM_SUCCESS) {
252 pam_end(pamh, PAM_ABORT);
260 pam_end(pamh, PAM_USER_UNKNOWN);
270 pam_end(pamh, PAM_ABORT);
277 pam_end(pamh, PAM_PERM_DENIED);
[all …]
/titanic_44/usr/src/lib/pam_modules/krb5_migrate/
H A Dkrb5_migrate_authenticate.c40 static void krb5_migrate_cleanup(pam_handle_t *pamh, void *data,
48 int pam_sm_authenticate(pam_handle_t *pamh, int flags, in pam_sm_authenticate() argument
99 err = pam_get_item(pamh, PAM_USER, (void**)&user); in pam_sm_authenticate()
127 err = pam_get_item(pamh, PAM_AUTHTOK, (void **)&password); in pam_sm_authenticate()
323 (void) __pam_display_msg(pamh, PAM_TEXT_INFO, 1, in pam_sm_authenticate()
336 if (pam_get_data(pamh, KRB5_AUTOMIGRATE_DATA, in pam_sm_authenticate()
347 if (pam_set_data(pamh, KRB5_AUTOMIGRATE_DATA, userdata, in pam_sm_authenticate()
373 krb5_migrate_cleanup(pam_handle_t *pamh, void *data, int pam_status) { in krb5_migrate_cleanup() argument
380 pam_sm_setcred(pam_handle_t *pamh, int flags, int argc, const char **argv) in pam_sm_setcred() argument

123