/titanic_44/usr/src/lib/libpam/ |
H A D | pam_framework.c | 145 pam_trace_cname(pam_handle_t *pamh) in pam_trace_cname() argument 147 if (pamh->pam_conf_name[pamh->include_depth] == NULL) in pam_trace_cname() 149 return (pamh->pam_conf_name[pamh->include_depth]); in pam_trace_cname() 291 const struct pam_conv *pam_conv, pam_handle_t **pamh) in pam_start() argument 295 *pamh = calloc(1, sizeof (struct pam_handle)); in pam_start() 301 (void *)*pamh, pam_debug); in pam_start() 303 if (*pamh == NULL) in pam_start() 306 (*pamh)->pam_inmodule = RO_OK; /* OK to set RO items */ in pam_start() 307 if ((err = pam_set_item(*pamh, PAM_SERVICE, (void *)service)) in pam_start() 309 clean_up(*pamh); in pam_start() [all …]
|
H A D | pam_appl.h | 158 pam_handle_t **pamh /* Address to store handle */ 166 pam_handle_t *pamh, /* handle from pam_start() */ 176 pam_handle_t *pamh, /* PAM handle */ 187 const pam_handle_t *pamh, /* PAM handle */ 226 pam_handle_t *pamh, /* PAM handle */ 236 pam_handle_t *pamh, /* pam handle */ 248 pam_handle_t *pamh, 263 pam_handle_t *pamh, 273 pam_handle_t *pamh, 282 pam_handle_t *pamh, [all …]
|
H A D | pam_modules.h | 38 pam_handle_t *pamh, 45 pam_handle_t *pamh, 52 pam_handle_t *pamh, 59 pam_handle_t *pamh, 66 pam_handle_t *pamh, 80 pam_handle_t *pamh, 92 pam_handle_t *pamh, /* PAM handle */ 95 void (*cleanup)(pam_handle_t *pamh, void *data, int pam_end_status) 104 const pam_handle_t *pamh,
|
H A D | pam_impl.h | 144 __pam_get_authtok(pam_handle_t *pamh, int source, int type, char *prompt, 148 __pam_display_msg(pam_handle_t *pamh, int msg_style, int num_msg, 174 void (*cleanup)(pam_handle_t *pamh, void *data, int pam_status); 227 int (*pam_sm_authenticate)(pam_handle_t *pamh, int flags, int argc, 229 int (*pam_sm_setcred)(pam_handle_t *pamh, int flags, int argc, 234 int (*pam_sm_chauthtok)(pam_handle_t *pamh, int flags, int argc, 239 int (*pam_sm_open_session)(pam_handle_t *pamh, int flags, int argc, 241 int (*pam_sm_close_session)(pam_handle_t *pamh, int flags, int argc, 246 int (*pam_sm_acct_mgmt)(pam_handle_t *pamh, int flags, int argc,
|
/titanic_44/usr/src/lib/pam_modules/authtok_get/ |
H A D | authtok_get.c | 43 error(pam_handle_t *pamh, char *fmt, ...) in error() argument 50 (void) __pam_display_msg(pamh, PAM_ERROR_MSG, 1, messages, NULL); in error() 55 read_authtok(pam_handle_t *pamh, int debug) in read_authtok() argument 67 res = pam_get_item(pamh, PAM_OLDAUTHTOK, (void **)&authtok); in read_authtok() 72 res = pam_get_item(pamh, PAM_AUTHTOK, (void **)&authtok); in read_authtok() 76 res = pam_set_item(pamh, PAM_OLDAUTHTOK, in read_authtok() 79 res = pam_set_item(pamh, PAM_AUTHTOK, NULL); in read_authtok() 98 res = pam_get_item(pamh, PAM_AUTHTOK, (void **)&pwd); in read_authtok() 110 (void) pam_set_item(pamh, PAM_AUTHTOK, NULL); in read_authtok() 112 res = __pam_get_authtok(pamh, PAM_PROMPT, PAM_AUTHTOK, in read_authtok() [all …]
|
/titanic_44/usr/src/lib/pam_modules/allow/ |
H A D | allow.c | 47 debug(pam_handle_t *pamh, int flags, int argc, const char **argv, char *mod) in debug() argument 55 (void) pam_get_item(pamh, PAM_SERVICE, (void **)&service); in debug() 56 (void) pam_get_item(pamh, PAM_USER, (void **)&user); in debug() 64 pam_sm_authenticate(pam_handle_t *pamh, int flags, int argc, const char **argv) in pam_sm_authenticate() argument 66 debug(pamh, flags, argc, argv, "pam_sm_authenticate"); in pam_sm_authenticate() 71 pam_sm_setcred(pam_handle_t *pamh, int flags, int argc, const char **argv) in pam_sm_setcred() argument 73 debug(pamh, flags, argc, argv, "pam_sm_setcred"); in pam_sm_setcred() 78 pam_sm_acct_mgmt(pam_handle_t *pamh, int flags, int argc, const char **argv) in pam_sm_acct_mgmt() argument 80 debug(pamh, flags, argc, argv, "pam_sm_acct_mgmt"); in pam_sm_acct_mgmt() 85 pam_sm_open_session(pam_handle_t *pamh, int flags, int argc, const char **argv) in pam_sm_open_session() argument [all …]
|
/titanic_44/usr/src/lib/pam_modules/deny/ |
H A D | deny.c | 47 debug(pam_handle_t *pamh, int flags, int argc, const char **argv, char *mod) in debug() argument 55 (void) pam_get_item(pamh, PAM_SERVICE, (void **)&service); in debug() 56 (void) pam_get_item(pamh, PAM_USER, (void **)&user); in debug() 64 pam_sm_authenticate(pam_handle_t *pamh, int flags, int argc, const char **argv) in pam_sm_authenticate() argument 66 debug(pamh, flags, argc, argv, "pam_sm_authenticate"); in pam_sm_authenticate() 71 pam_sm_setcred(pam_handle_t *pamh, int flags, int argc, const char **argv) in pam_sm_setcred() argument 73 debug(pamh, flags, argc, argv, "pam_sm_setcred"); in pam_sm_setcred() 78 pam_sm_acct_mgmt(pam_handle_t *pamh, int flags, int argc, const char **argv) in pam_sm_acct_mgmt() argument 80 debug(pamh, flags, argc, argv, "pam_sm_acct_mgmt"); in pam_sm_acct_mgmt() 85 pam_sm_open_session(pam_handle_t *pamh, int flags, int argc, const char **argv) in pam_sm_open_session() argument [all …]
|
/titanic_44/usr/src/lib/pam_modules/authtok_store/ |
H A D | authtok_store.c | 44 error(int nowarn, pam_handle_t *pamh, char *fmt, ...) in error() argument 52 (void) __pam_display_msg(pamh, PAM_ERROR_MSG, 1, messages, in error() 59 info(int nowarn, pam_handle_t *pamh, char *fmt, ...) in info() argument 67 (void) __pam_display_msg(pamh, PAM_TEXT_INFO, 1, messages, in info() 78 authtok_is_aged(pam_handle_t *pamh) in authtok_is_aged() argument 82 if (pam_get_data(pamh, UNIX_AUTHTOK_DATA, in authtok_is_aged() 91 pam_sm_chauthtok(pam_handle_t *pamh, int flags, int argc, const char **argv) 130 if ((flags & PAM_CHANGE_EXPIRED_AUTHTOK) && !authtok_is_aged(pamh)) { 136 res = pam_get_item(pamh, PAM_SERVICE, (void **)&service); 142 res = pam_get_item(pamh, PAM_USER, (void **)&user); [all …]
|
/titanic_44/usr/src/lib/pam_modules/ldap/ |
H A D | ldap_acct_mgmt.c | 34 pam_handle_t *pamh, in ldap_cleanup() argument 48 pam_handle_t *pamh, in warn_user_passwd_will_expire() argument 77 (void) __pam_display_msg(pamh, PAM_TEXT_INFO, 1, messages, NULL); in warn_user_passwd_will_expire() 85 display_acct_unlock_time(pam_handle_t *pamh, int sec_b4_unlock) in display_acct_unlock_time() argument 96 (void) __pam_display_msg(pamh, PAM_TEXT_INFO, 1, in display_acct_unlock_time() 126 (void) __pam_display_msg(pamh, PAM_TEXT_INFO, 1, messages, NULL); in display_acct_unlock_time() 133 warn_user_passwd_expired(pam_handle_t *pamh, int grace) in warn_user_passwd_expired() argument 148 (void) __pam_display_msg(pamh, PAM_TEXT_INFO, 1, messages, NULL); in warn_user_passwd_expired() 156 display_passwd_reset_msg(pam_handle_t *pamh) in display_passwd_reset_msg() argument 164 (void) __pam_display_msg(pamh, PAM_TEXT_INFO, 1, messages, NULL); in display_passwd_reset_msg() [all …]
|
/titanic_44/usr/src/lib/pam_modules/smb/ |
H A D | smb_passwd.c | 45 error(boolean_t nowarn, pam_handle_t *pamh, char *fmt, ...) in error() argument 55 (void) __pam_display_msg(pamh, PAM_ERROR_MSG, 1, &message, in error() 62 info(boolean_t nowarn, pam_handle_t *pamh, char *fmt, ...) in info() argument 72 (void) __pam_display_msg(pamh, PAM_TEXT_INFO, 1, &message, in info() 78 pam_sm_chauthtok(pam_handle_t *pamh, int flags, int argc, const char **argv) in pam_sm_chauthtok() argument 110 (void) pam_get_item(pamh, PAM_SERVICE, (void **)&service); in pam_sm_chauthtok() 111 (void) pam_get_item(pamh, PAM_USER, (void **)&user); in pam_sm_chauthtok() 119 (void) pam_get_item(pamh, PAM_AUTHTOK, (void **)&newpw); in pam_sm_chauthtok() 160 info(nowarn, pamh, dgettext(TEXT_DOMAIN, in pam_sm_chauthtok() 174 error(nowarn, pamh, dgettext(TEXT_DOMAIN, in pam_sm_chauthtok() [all …]
|
/titanic_44/usr/src/lib/pam_modules/dhkeys/ |
H A D | dhkeys.c | 74 msg(pam_handle_t *pamh, char *fmt, ...) in msg() argument 83 return (__pam_display_msg(pamh, PAM_ERROR_MSG, 1, messages, NULL)); in msg() 97 pam_handle_t *pamh, /* in */ in get_and_set_seckey() argument 137 if (pamh && !(flags & PAM_SILENT)) { in get_and_set_seckey() 144 (void) __pam_display_msg(pamh, PAM_ERROR_MSG, 1, in get_and_set_seckey() 196 establish_key(pam_handle_t *pamh, int flags, int debug, char *netname) in establish_key() argument 217 (void) pam_get_item(pamh, PAM_USER, (void **)&user); in establish_key() 225 (void) pam_get_item(pamh, PAM_AUTHTOK, (void **)&passwd); in establish_key() 279 if (!get_and_set_seckey(pamh, netname, mp->keylen, in establish_key() 303 if (!get_and_set_seckey(pamh, netname, AUTH_DES_KEYLEN, in establish_key() [all …]
|
/titanic_44/usr/src/lib/pam_modules/krb5/ |
H A D | krb5_password.c | 59 pam_handle_t *pamh, in set_ccname() argument 80 if ((result = pam_putenv(pamh, kmd->env)) in set_ccname() 107 pam_handle_t *pamh, in get_set_creds() argument 124 login_result = attempt_krb5_auth(pamh, kmd, user, &newpass, 0); in get_set_creds() 134 display_msg(pamh, PAM_TEXT_INFO, in get_set_creds() 141 set_ccname(pamh, kmd, login_result, debug); in get_set_creds() 150 pam_handle_t *pamh, in pam_sm_chauthtok() argument 180 (void) pam_get_item(pamh, PAM_REPOSITORY, (void **)&rep_data); in pam_sm_chauthtok() 210 if ((err = pam_get_data(pamh, KRB5_DATA, (const void **)&kmd)) in pam_sm_chauthtok() 231 (void) pam_get_item(pamh, PAM_USER, (void **)&user); in pam_sm_chauthtok() [all …]
|
H A D | krb5_acct_mgmt.c | 166 pam_handle_t *pamh, in exp_warn() argument 185 if (!pamh || !user || !password) { in exp_warn() 266 (void) __pam_display_msg(pamh, PAM_TEXT_INFO, 1, in exp_warn() 303 pam_handle_t *pamh, in pam_sm_acct_mgmt() argument 337 (void) pam_get_item(pamh, PAM_REPOSITORY, (void **)&rep_data); in pam_sm_acct_mgmt() 356 (void) pam_get_item(pamh, PAM_USER, (void **) &user); in pam_sm_acct_mgmt() 364 err = pam_get_data(pamh, KRB5_AUTOMIGRATE_DATA, in pam_sm_acct_mgmt() 378 (void) pam_sm_authenticate(pamh, flags, argc, in pam_sm_acct_mgmt() 389 if ((err = pam_get_data(pamh, KRB5_DATA, (const void **)&kmd)) in pam_sm_acct_mgmt() 451 (void) __pam_display_msg(pamh, PAM_TEXT_INFO, in pam_sm_acct_mgmt() [all …]
|
/titanic_44/usr/src/lib/pam_modules/authtok_check/ |
H A D | authtok_check.c | 112 error(pam_handle_t *pamh, int flags, char *fmt, ...) in error() argument 121 (void) __pam_display_msg(pamh, PAM_ERROR_MSG, 1, msg, NULL); in error() 147 get_passwd_defaults(pam_handle_t *pamh, char *user, struct pwdefaults *p) in get_passwd_defaults() argument 158 (void) pam_get_item(pamh, PAM_SERVICE, (void **)&progname); in get_passwd_defaults() 260 (void) pam_get_item(pamh, PAM_REPOSITORY, (void **)&pam_rep); in get_passwd_defaults() 436 check_composition(char *pw, struct pwdefaults *pwdef, pam_handle_t *pamh, in check_composition() argument 454 (void) pam_get_item(pamh, PAM_SERVICE, (void **)&progname); in check_composition() 530 error(pamh, flags, dgettext(TEXT_DOMAIN, in check_composition() 542 error(pamh, flags, errmsg, pwdef->minalpha, in check_composition() 553 error(pamh, flags, errmsg, pwdef->minnonalpha, in check_composition() [all …]
|
/titanic_44/usr/src/lib/pam_modules/passwd_auth/ |
H A D | passwd_auth.c | 46 error(int nowarn, pam_handle_t *pamh, char *fmt, ...) in error() argument 54 (void) __pam_display_msg(pamh, PAM_ERROR_MSG, 1, messages, in error() 65 pam_sm_authenticate(pam_handle_t *pamh, int flags, int argc, const char **argv) in pam_sm_authenticate() argument 102 if ((res = pam_get_user(pamh, &user, NULL)) != PAM_SUCCESS) { in pam_sm_authenticate() 105 "get user failed: %s", pam_strerror(pamh, res)); in pam_sm_authenticate() 115 res = pam_get_item(pamh, PAM_AUTHTOK, (void **)&password); in pam_sm_authenticate() 122 res = pam_get_item(pamh, PAM_SERVICE, (void **)&service); in pam_sm_authenticate() 126 res = pam_get_item(pamh, PAM_REPOSITORY, (void **)&auth_rep); in pam_sm_authenticate() 153 error(nowarn, pamh, dgettext(TEXT_DOMAIN, "%s: " in pam_sm_authenticate() 194 retval = __pam_get_authtok(pamh, PAM_PROMPT, PAM_AUTHTOK, prompt, in pam_sm_authenticate() [all …]
|
/titanic_44/usr/src/cmd/rexd/ |
H A D | unix_login.c | 68 pam_handle_t *pamh; variable 154 if (pam_start("rexd", pw->pw_name, NULL, &pamh) != PAM_SUCCESS || 155 pam_set_item(pamh, PAM_RHOST, host) != PAM_SUCCESS) { 164 if (pamh) { 165 pam_end(pamh, PAM_ABORT); 166 pamh = NULL; 171 if ((v = pam_acct_mgmt(pamh, 0)) != PAM_SUCCESS) { 190 pam_end(pamh, PAM_ABORT); 191 pamh = NULL; 356 if (pam_set_item(pamh, PAM_TTY, slavename) != PAM_SUCCESS || in LoginUser() [all …]
|
H A D | rpc.rexd.c | 89 pam_handle_t *pamh; /* PAM handle */ variable 839 extern pam_handle_t *pamh; 925 if (pamh) { 926 pam_end(pamh, PAM_ABORT); 927 pamh = NULL; 941 if (pamh) { 942 pam_end(pamh, PAM_ABORT); 943 pamh = NULL; 974 if (pamh) { 975 pam_end(pamh, PAM_ABORT); [all …]
|
/titanic_44/usr/src/lib/pam_modules/unix_auth/ |
H A D | unix_auth.c | 56 error(pam_handle_t *pamh, char *fmt, ...) in error() argument 63 (void) __pam_display_msg(pamh, PAM_ERROR_MSG, 1, messages, NULL); in error() 108 display_warning(pam_handle_t *pamh, int failures, char *homedir) in display_warning() argument 118 error(pamh, "Warning: 1 failed login attempt since last " in display_warning() 121 error(pamh, "Warning: %d failed login attempts since last " in display_warning() 124 error(pamh, "Warning: at least %d failed login attempts since " in display_warning() 140 pam_sm_authenticate(pam_handle_t *pamh, int flags, int argc, const char **argv) in pam_sm_authenticate() argument 174 if (pam_get_item(pamh, PAM_USER, (void **)&user) != PAM_SUCCESS) { in pam_sm_authenticate() 185 if (pam_get_item(pamh, PAM_AUTHTOK, (void **)&passwd) != PAM_SUCCESS) { in pam_sm_authenticate() 191 result = pam_get_item(pamh, PAM_REPOSITORY, (void **)&auth_rep); in pam_sm_authenticate() [all …]
|
/titanic_44/usr/src/lib/pam_modules/unix_account/ |
H A D | unix_acct.c | 74 pam_handle_t *pamh, in unix_cleanup() argument 182 pam_handle_t *pamh, in perform_passwd_aging_check() argument 230 (void) __pam_display_msg(pamh, PAM_ERROR_MSG, 2, messages, in perform_passwd_aging_check() 243 pam_handle_t *pamh, in warn_user_passwd_will_expire() argument 271 (void) __pam_display_msg(pamh, PAM_TEXT_INFO, 1, messages, in warn_user_passwd_will_expire() 282 pam_sm_acct_mgmt(pam_handle_t *pamh, int flags, int argc, const char **argv) in pam_sm_acct_mgmt() argument 318 if ((error = pam_get_item(pamh, PAM_USER, (void **)&user)) in pam_sm_acct_mgmt() 328 if ((error = pam_get_item(pamh, PAM_REPOSITORY, (void **)&auth_rep)) in pam_sm_acct_mgmt() 452 (void) pam_get_item(pamh, PAM_SERVICE, (void **)&service); in pam_sm_acct_mgmt() 453 (void) pam_get_item(pamh, PAM_RHOST, (void **)&rhost); in pam_sm_acct_mgmt() [all …]
|
/titanic_44/usr/src/lib/pam_modules/dial_auth/ |
H A D | dial_auth.c | 55 pam_sm_authenticate(pam_handle_t *pamh, int flags, int argc, const char **argv) in pam_sm_authenticate() argument 77 if ((retcode = pam_get_user(pamh, &user, NULL)) in pam_sm_authenticate() 79 (retcode = pam_get_item(pamh, PAM_TTY, (void **)&ttyn)) in pam_sm_authenticate() 92 (void) pam_get_item(pamh, PAM_SERVICE, (void **)&service); in pam_sm_authenticate() 95 pam_strerror(pamh, PAM_SERVICE_ERR)); in pam_sm_authenticate() 117 pam_strerror(pamh, PAM_SYSTEM_ERR)); in pam_sm_authenticate() 153 res = __pam_get_authtok(pamh, PAM_PROMPT, PAM_AUTHTOK, in pam_sm_authenticate() 177 pam_sm_setcred(pam_handle_t *pamh, int flags, int argc, const char **argv) in pam_sm_setcred() argument
|
/titanic_44/usr/src/cmd/cmd-inet/usr.sbin/ |
H A D | in.rexecd.c | 93 static pam_handle_t *pamh; /* authentication handle */ variable 294 if (pam_start("rexec", user, &conv, &pamh) != PAM_SUCCESS) { in doit() 297 if (pam_set_item(pamh, PAM_RHOST, hostname) != PAM_SUCCESS) { in doit() 301 if ((status = pam_authenticate(pamh, pam_flags)) != PAM_SUCCESS) { in doit() 313 pam_end(pamh, status); in doit() 316 if ((status = pam_acct_mgmt(pamh, pam_flags)) != PAM_SUCCESS) { in doit() 333 pam_end(pamh, status); in doit() 343 pam_end(pamh, PAM_ABORT); in doit() 348 if ((status = pam_setcred(pamh, PAM_ESTABLISH_CRED)) != PAM_SUCCESS) { in doit() 352 pam_end(pamh, PAM_SUCCESS); in doit() [all …]
|
/titanic_44/usr/src/lib/pam_modules/roles/ |
H A D | roles.c | 50 pam_sm_acct_mgmt(pam_handle_t *pamh, int flags, int argc, const char **argv) in pam_sm_acct_mgmt() argument 66 (void) pam_get_item(pamh, PAM_USER, (void **)&username); in pam_sm_acct_mgmt() 67 (void) pam_get_item(pamh, PAM_AUSER, (void **)&auser); in pam_sm_acct_mgmt() 68 (void) pam_get_item(pamh, PAM_RHOST, (void **)&rhost); in pam_sm_acct_mgmt() 86 (void) pam_get_item(pamh, PAM_RUSER, (void **)&ruser); in pam_sm_acct_mgmt() 87 (void) pam_get_item(pamh, PAM_SERVICE, (void **)&service); in pam_sm_acct_mgmt() 176 (void) __pam_display_msg(pamh, PAM_ERROR_MSG, 1, messages, in pam_sm_acct_mgmt()
|
/titanic_44/usr/src/lib/pam_modules/rhosts_auth/ |
H A D | rhosts_auth.c | 49 pam_handle_t *pamh, in pam_sm_authenticate() argument 69 if (pam_get_item(pamh, PAM_USER, (void **) &lusername) != PAM_SUCCESS) in pam_sm_authenticate() 71 if (pam_get_item(pamh, PAM_RHOST, (void **) &host) != PAM_SUCCESS) in pam_sm_authenticate() 73 if (pam_get_item(pamh, PAM_RUSER, (void **)&rusername) != PAM_SUCCESS) in pam_sm_authenticate() 109 pam_handle_t *pamh, in pam_sm_setcred() argument
|
/titanic_44/usr/src/cmd/bnu/ |
H A D | in.uucpd.c | 59 pam_handle_t *pamh; variable 224 if ((pam_start("uucp", user, &conv, &pamh)) != PAM_SUCCESS) 226 if ((pam_set_item(pamh, PAM_TTY, ttyname(0))) != PAM_SUCCESS) 229 if (pam_authenticate(pamh, PAM_SILENT) != PAM_SUCCESS) { 233 pam_end(pamh, PAM_ABORT); 237 if ((error = pam_acct_mgmt(pamh, PAM_SILENT)) != PAM_SUCCESS) { 252 pam_end(pamh, PAM_ABORT); 260 pam_end(pamh, PAM_USER_UNKNOWN); 270 pam_end(pamh, PAM_ABORT); 277 pam_end(pamh, PAM_PERM_DENIED); [all …]
|
/titanic_44/usr/src/lib/pam_modules/krb5_migrate/ |
H A D | krb5_migrate_authenticate.c | 40 static void krb5_migrate_cleanup(pam_handle_t *pamh, void *data, 48 int pam_sm_authenticate(pam_handle_t *pamh, int flags, in pam_sm_authenticate() argument 99 err = pam_get_item(pamh, PAM_USER, (void**)&user); in pam_sm_authenticate() 127 err = pam_get_item(pamh, PAM_AUTHTOK, (void **)&password); in pam_sm_authenticate() 323 (void) __pam_display_msg(pamh, PAM_TEXT_INFO, 1, in pam_sm_authenticate() 336 if (pam_get_data(pamh, KRB5_AUTOMIGRATE_DATA, in pam_sm_authenticate() 347 if (pam_set_data(pamh, KRB5_AUTOMIGRATE_DATA, userdata, in pam_sm_authenticate() 373 krb5_migrate_cleanup(pam_handle_t *pamh, void *data, int pam_status) { in krb5_migrate_cleanup() argument 380 pam_sm_setcred(pam_handle_t *pamh, int flags, int argc, const char **argv) in pam_sm_setcred() argument
|