/titanic_50/usr/src/cmd/ssh/sshd/ |
H A D | auth-pam.c | 198 pam->last_pam_retval = PAM_SUCCESS; in new_start_pam() 208 if ((retval = pam_start(svc, user, conv, &pamh)) != PAM_SUCCESS) { in new_start_pam() 219 if ((retval = pam_set_item(pamh, PAM_RHOST, rhost)) != PAM_SUCCESS) { in new_start_pam() 225 if ((retval = pam_set_item(pamh, PAM_TTY, "sshd")) != PAM_SUCCESS) { in new_start_pam() 232 if ((retval = pam_set_item(pamh, PAM_AUSER, authctxt->cuser)) != PAM_SUCCESS) { in new_start_pam() 277 if (retval != PAM_SUCCESS) in finish_userauth_do_pam() 292 if (retval != PAM_SUCCESS) { in finish_userauth_do_pam() 318 return PAM_SUCCESS; in finish_userauth_do_pam() 329 if (retval != PAM_SUCCESS) in finish_userauth_do_pam() 356 if (retval != PAM_SUCCESS) in finish_userauth_do_pam() [all …]
|
H A D | auth2-pam.c | 97 if (retval != PAM_SUCCESS) in do_pam_kbdint() 141 PAM_CHANGE_EXPIRED_AUTHTOK)) != PAM_SUCCESS) { in do_pam_kbdint() 158 if (retval != PAM_SUCCESS) in do_pam_kbdint() 165 if (retval != PAM_SUCCESS) in do_pam_kbdint() 185 if ((retval2 = pam_end(pamh, retval)) != PAM_SUCCESS) { in do_pam_kbdint() 275 return PAM_SUCCESS; in do_pam_conv_kbd_int() 336 return PAM_SUCCESS; in do_pam_conv_kbd_int() 390 conv_ctxt->responses[j].resp_retcode = PAM_SUCCESS; in input_userauth_info_response_pam()
|
/titanic_50/usr/src/lib/pam_modules/authtok_get/ |
H A D | authtok_get.c | 68 if (res != PAM_SUCCESS) in read_authtok() 73 if (res != PAM_SUCCESS) in read_authtok() 78 if (res == PAM_SUCCESS) in read_authtok() 86 if (res != PAM_SUCCESS) in read_authtok() 99 if (res != PAM_SUCCESS) in read_authtok() 115 if (res != PAM_SUCCESS) in read_authtok() 121 PAM_SUCCESS) && service != NULL) { in read_authtok() 131 if (res != PAM_SUCCESS) { in read_authtok() 163 if (res != PAM_SUCCESS || authtok == NULL) in verify_authtok() 169 if (res != PAM_SUCCESS) in verify_authtok() [all …]
|
/titanic_50/usr/src/lib/pam_modules/allow/ |
H A D | allow.c | 67 return (PAM_SUCCESS); in pam_sm_authenticate() 74 return (PAM_SUCCESS); in pam_sm_setcred() 81 return (PAM_SUCCESS); in pam_sm_acct_mgmt() 88 return (PAM_SUCCESS); in pam_sm_open_session() 95 return (PAM_SUCCESS); in pam_sm_close_session() 102 return (PAM_SUCCESS); in pam_sm_chauthtok()
|
/titanic_50/usr/src/lib/pam_modules/ldap/ |
H A D | ldap_utils.c | 47 return (PAM_SUCCESS); in __ldap_to_pamerror() 110 if ((result = __ldap_to_pamerror(ldaprc)) != PAM_SUCCESS) in authenticate() 124 if ((result = __ldap_to_pamerror(ldaprc)) != PAM_SUCCESS) in authenticate() 131 if ((result = __ldap_to_pamerror(ldaprc)) != PAM_SUCCESS) in authenticate() 141 if ((result = __ldap_to_pamerror(ldaprc)) != PAM_SUCCESS) in authenticate() 184 result = PAM_SUCCESS; in authenticate() 191 result = PAM_SUCCESS; in authenticate() 265 if (credp && (result == PAM_SUCCESS || in authenticate()
|
H A D | ldap_authenticate.c | 65 != PAM_SUCCESS || in pam_sm_authenticate() 66 (err = pam_get_item(pamh, PAM_USER, (void **)&user)) != PAM_SUCCESS) in pam_sm_authenticate() 123 result = PAM_SUCCESS; in pam_sm_authenticate() 130 result = PAM_SUCCESS; in pam_sm_authenticate()
|
H A D | ldap_acct_mgmt.c | 202 return (PAM_SUCCESS); in get_account_mgmt() 276 != PAM_SUCCESS) in pam_sm_acct_mgmt() 324 result = PAM_SUCCESS; in pam_sm_acct_mgmt() 332 } else if (result == PAM_SUCCESS) { in pam_sm_acct_mgmt() 349 if (result != PAM_SUCCESS) { in pam_sm_acct_mgmt() 361 if (pam_res == PAM_SUCCESS) in pam_sm_acct_mgmt() 367 != PAM_SUCCESS) { in pam_sm_acct_mgmt()
|
/titanic_50/usr/src/lib/libpam/ |
H A D | pam_framework.c | 308 != PAM_SUCCESS) { in pam_start() 315 != PAM_SUCCESS) { in pam_start() 322 != PAM_SUCCESS) { in pam_start() 329 return (PAM_SUCCESS); in pam_start() 385 return (PAM_SUCCESS); in pam_end() 538 return (PAM_SUCCESS); in pam_set_item() 611 return (PAM_SUCCESS); in pam_get_item() 673 return (PAM_SUCCESS); in parse_user_name() 700 != PAM_SUCCESS) { in pam_get_user() 707 return (PAM_SUCCESS); in pam_get_user() [all …]
|
/titanic_50/usr/src/lib/pam_modules/sample/ |
H A D | sample_authenticate.c | 105 return (PAM_SUCCESS); in pam_sm_authenticate() 116 if (err != PAM_SUCCESS) in pam_sm_authenticate() 120 if (err != PAM_SUCCESS) in pam_sm_authenticate() 131 result = PAM_SUCCESS; in pam_sm_authenticate() 151 if (err != PAM_SUCCESS) { in pam_sm_authenticate() 166 result = PAM_SUCCESS; in pam_sm_authenticate()
|
H A D | sample_acct_mgmt.c | 60 return (PAM_SUCCESS); in pam_sm_acct_mgmt() 62 if (pam_get_item(pamh, PAM_USER, (void **)&user) != PAM_SUCCESS) in pam_sm_acct_mgmt() 65 if (pam_get_item(pamh, PAM_SERVICE, (void **)&pg) != PAM_SUCCESS) in pam_sm_acct_mgmt() 90 return (PAM_SUCCESS); in pam_sm_acct_mgmt() 103 return (error?PAM_SUCCESS:PAM_AUTH_ERR); in pam_sm_acct_mgmt()
|
/titanic_50/usr/src/lib/pam_modules/timestamp/ |
H A D | pam_timestamp.c | 98 return (PAM_SUCCESS); in validate_basic() 140 return (PAM_SUCCESS); in validate_dir() 161 return (PAM_SUCCESS); in create_dir() 212 if (validate_basic(pamh, user_tty, timestampfile) != PAM_SUCCESS) in pam_sm_authenticate() 216 if (validate_dir(sudir) != PAM_SUCCESS) in pam_sm_authenticate() 221 if (validate_dir(dirname(timestampdir)) != PAM_SUCCESS) in pam_sm_authenticate() 313 result = PAM_SUCCESS; in pam_sm_authenticate() 354 if (validate_basic(pamh, user_tty, timestampfile) != PAM_SUCCESS) in pam_sm_setcred() 373 if (create_dir(TIMESTAMP_DIR) != PAM_SUCCESS) in pam_sm_setcred() 378 if (create_dir(dirname(timestampdir)) != PAM_SUCCESS) in pam_sm_setcred() [all …]
|
/titanic_50/usr/src/lib/pam_modules/unix_session/ |
H A D | unix_session.c | 82 return (PAM_SUCCESS); in pam_sm_close_session() 115 != PAM_SUCCESS || in pam_sm_open_session() 117 != PAM_SUCCESS || in pam_sm_open_session() 119 != PAM_SUCCESS) { in pam_sm_open_session() 147 return (PAM_SUCCESS); in pam_sm_open_session() 191 return (PAM_SUCCESS); in pam_sm_open_session()
|
/titanic_50/usr/src/lib/pam_modules/authtok_store/ |
H A D | authtok_store.c | 83 (const void **)status) != PAM_SUCCESS) in authtok_is_aged() 137 if (res != PAM_SUCCESS) { 143 if (res != PAM_SUCCESS) { 154 if (res != PAM_SUCCESS) { 160 if (res != PAM_SUCCESS || newpw == NULL) { 186 if (res != PAM_SUCCESS) { 218 res = PAM_SUCCESS; 271 res = PAM_SUCCESS;
|
/titanic_50/usr/src/lib/pam_modules/rhosts_auth/ |
H A D | rhosts_auth.c | 69 if (pam_get_item(pamh, PAM_USER, (void **) &lusername) != PAM_SUCCESS) in pam_sm_authenticate() 71 if (pam_get_item(pamh, PAM_RHOST, (void **) &host) != PAM_SUCCESS) in pam_sm_authenticate() 73 if (pam_get_item(pamh, PAM_RUSER, (void **)&rusername) != PAM_SUCCESS) in pam_sm_authenticate() 99 == -1 ? PAM_AUTH_ERR : PAM_SUCCESS); in pam_sm_authenticate()
|
/titanic_50/usr/src/cmd/rexd/ |
H A D | unix_login.c | 154 if (pam_start("rexd", pw->pw_name, NULL, &pamh) != PAM_SUCCESS || 155 pam_set_item(pamh, PAM_RHOST, host) != PAM_SUCCESS) { 171 if ((v = pam_acct_mgmt(pamh, 0)) != PAM_SUCCESS) { 356 if (pam_set_item(pamh, PAM_TTY, slavename) != PAM_SUCCESS || in LoginUser() 357 pam_get_item(pamh, PAM_USER, (void **) &user) != PAM_SUCCESS || in LoginUser() 358 pam_get_item(pamh, PAM_RHOST, (void **) &rhost) != PAM_SUCCESS || in LoginUser() 359 pam_open_session(pamh, 0) != PAM_SUCCESS) { in LoginUser() 427 pam_end(pamh, PAM_SUCCESS); in LogoutUser() 451 == PAM_SUCCESS) { in LogoutUser() 455 (void) pam_end(pamh, PAM_SUCCESS); in LogoutUser()
|
/titanic_50/usr/src/lib/pam_modules/krb5/ |
H A D | krb5_setcred.c | 109 if (pam_get_data(pamh, KRB5_DATA, (const void**)&kmd) != PAM_SUCCESS) { in pam_sm_setcred() 138 kmd, &krb5_cleanup)) != PAM_SUCCESS) { in pam_sm_setcred() 185 (kmd->auth_status != PAM_SUCCESS)) { in pam_sm_setcred() 240 return (PAM_SUCCESS); in pam_sm_setcred() 258 if (err != PAM_SUCCESS) in pam_sm_setcred() 344 return (PAM_SUCCESS); in attempt_refresh_cred() 418 if (kmd->auth_status == PAM_SUCCESS) { in krb5_renew_tgt() 602 return (PAM_SUCCESS); in attempt_delete_initcred() 612 return (PAM_SUCCESS); in attempt_delete_initcred()
|
H A D | krb5_acct_mgmt.c | 146 return (PAM_SUCCESS); in fetch_princ_entry() 218 != PAM_SUCCESS) { in exp_warn() 271 err = PAM_SUCCESS; in exp_warn() 366 if (err != PAM_SUCCESS) { in pam_sm_acct_mgmt() 390 != PAM_SUCCESS) { in pam_sm_acct_mgmt() 458 if (kmd->auth_status == PAM_SUCCESS && !(flags & PAM_SILENT) && in pam_sm_acct_mgmt() 469 err = kmd->auth_status != PAM_SUCCESS ? PAM_IGNORE : kmd->auth_status; in pam_sm_acct_mgmt()
|
H A D | krb5_authenticate.c | 136 if (!(err == PAM_SUCCESS || err == PAM_NO_MODULE_DATA)) in pam_sm_authenticate() 160 if (err != PAM_SUCCESS) { in pam_sm_authenticate() 167 kmd->auth_status == PAM_SUCCESS) { in pam_sm_authenticate() 191 PAM_SUCCESS) { in pam_sm_authenticate() 219 if (err != PAM_SUCCESS) { in pam_sm_authenticate() 263 kmd->age_status = PAM_SUCCESS; in pam_sm_authenticate() 298 kmd->auth_status = PAM_SUCCESS; in pam_sm_authenticate() 299 return (PAM_SUCCESS); in pam_sm_authenticate() 337 kmd->auth_status == PAM_SUCCESS)) { in pam_sm_authenticate() 340 if (result == PAM_SUCCESS) { in pam_sm_authenticate() [all …]
|
H A D | krb5_password.c | 74 if (login_result == PAM_SUCCESS) { in set_ccname() 81 != PAM_SUCCESS) { in set_ccname() 133 if (login_result != PAM_SUCCESS) { in get_set_creds() 211 != PAM_SUCCESS) { in pam_sm_chauthtok() 305 if (result == PAM_SUCCESS) { in pam_sm_chauthtok() 514 return (PAM_SUCCESS); in krb5_changepw()
|
/titanic_50/usr/src/lib/pam_modules/unix_account/ |
H A D | unix_acct.c | 173 return (PAM_SUCCESS); 208 return (PAM_SUCCESS); in perform_passwd_aging_check() 212 return (PAM_SUCCESS); in perform_passwd_aging_check() 319 != PAM_SUCCESS) in pam_sm_acct_mgmt() 329 != PAM_SUCCESS) in pam_sm_acct_mgmt() 510 != PAM_SUCCESS) { in pam_sm_acct_mgmt() 524 error = PAM_SUCCESS; in pam_sm_acct_mgmt() 557 if (pam_res == PAM_SUCCESS) in pam_sm_acct_mgmt() 563 != PAM_SUCCESS) { in pam_sm_acct_mgmt()
|
/titanic_50/usr/src/lib/pam_modules/passwd_auth/ |
H A D | passwd_auth.c | 102 if ((res = pam_get_user(pamh, &user, NULL)) != PAM_SUCCESS) { in pam_sm_authenticate() 116 if (res != PAM_SUCCESS) in pam_sm_authenticate() 123 if (res != PAM_SUCCESS) in pam_sm_authenticate() 127 if (res != PAM_SUCCESS) { in pam_sm_authenticate() 169 retval = PAM_SUCCESS; in pam_sm_authenticate() 196 if (retval != PAM_SUCCESS) in pam_sm_authenticate()
|
/titanic_50/usr/src/lib/pam_modules/unix_auth/ |
H A D | unix_auth.c | 174 if (pam_get_item(pamh, PAM_USER, (void **)&user) != PAM_SUCCESS) { in pam_sm_authenticate() 185 if (pam_get_item(pamh, PAM_AUTHTOK, (void **)&passwd) != PAM_SUCCESS) { in pam_sm_authenticate() 192 if (result == PAM_SUCCESS && auth_rep != NULL) { in pam_sm_authenticate() 267 result = PAM_SUCCESS; in pam_sm_authenticate() 304 result = PAM_SUCCESS; in pam_sm_authenticate() 309 if (dolock && (result == PAM_SUCCESS && old_failed_count > 0)) { in pam_sm_authenticate()
|
/titanic_50/usr/src/lib/pam_modules/dial_auth/ |
H A D | dial_auth.c | 78 != PAM_SUCCESS || in pam_sm_authenticate() 80 != PAM_SUCCESS) in pam_sm_authenticate() 156 if (res != PAM_SUCCESS) { in pam_sm_authenticate() 169 return (PAM_SUCCESS); in pam_sm_authenticate()
|
/titanic_50/usr/src/cmd/cmd-inet/usr.sbin/ |
H A D | in.rexecd.c | 294 if (pam_start("rexec", user, &conv, &pamh) != PAM_SUCCESS) { in doit() 297 if (pam_set_item(pamh, PAM_RHOST, hostname) != PAM_SUCCESS) { in doit() 301 if ((status = pam_authenticate(pamh, pam_flags)) != PAM_SUCCESS) { in doit() 316 if ((status = pam_acct_mgmt(pamh, pam_flags)) != PAM_SUCCESS) { in doit() 348 if ((status = pam_setcred(pamh, PAM_ESTABLISH_CRED)) != PAM_SUCCESS) { in doit() 352 pam_end(pamh, PAM_SUCCESS); in doit() 454 pam_end(pamh, PAM_SUCCESS); in doit() 570 return (PAM_SUCCESS); in rexec_conv()
|
/titanic_50/usr/src/cmd/bnu/ |
H A D | in.uucpd.c | 224 if ((pam_start("uucp", user, &conv, &pamh)) != PAM_SUCCESS) 226 if ((pam_set_item(pamh, PAM_TTY, ttyname(0))) != PAM_SUCCESS) 229 if (pam_authenticate(pamh, PAM_SILENT) != PAM_SUCCESS) { 237 if ((error = pam_acct_mgmt(pamh, PAM_SILENT)) != PAM_SUCCESS) { 290 if (pam_setcred(pamh, PAM_ESTABLISH_CRED) != PAM_SUCCESS) { 305 pam_end(pamh, PAM_SUCCESS); 547 return (PAM_SUCCESS); 612 return (PAM_SUCCESS);
|