Home
last modified time | relevance | path

Searched refs:PAM_SUCCESS (Results 1 – 25 of 58) sorted by relevance

123

/titanic_50/usr/src/cmd/ssh/sshd/
H A Dauth-pam.c198 pam->last_pam_retval = PAM_SUCCESS; in new_start_pam()
208 if ((retval = pam_start(svc, user, conv, &pamh)) != PAM_SUCCESS) { in new_start_pam()
219 if ((retval = pam_set_item(pamh, PAM_RHOST, rhost)) != PAM_SUCCESS) { in new_start_pam()
225 if ((retval = pam_set_item(pamh, PAM_TTY, "sshd")) != PAM_SUCCESS) { in new_start_pam()
232 if ((retval = pam_set_item(pamh, PAM_AUSER, authctxt->cuser)) != PAM_SUCCESS) { in new_start_pam()
277 if (retval != PAM_SUCCESS) in finish_userauth_do_pam()
292 if (retval != PAM_SUCCESS) { in finish_userauth_do_pam()
318 return PAM_SUCCESS; in finish_userauth_do_pam()
329 if (retval != PAM_SUCCESS) in finish_userauth_do_pam()
356 if (retval != PAM_SUCCESS) in finish_userauth_do_pam()
[all …]
H A Dauth2-pam.c97 if (retval != PAM_SUCCESS) in do_pam_kbdint()
141 PAM_CHANGE_EXPIRED_AUTHTOK)) != PAM_SUCCESS) { in do_pam_kbdint()
158 if (retval != PAM_SUCCESS) in do_pam_kbdint()
165 if (retval != PAM_SUCCESS) in do_pam_kbdint()
185 if ((retval2 = pam_end(pamh, retval)) != PAM_SUCCESS) { in do_pam_kbdint()
275 return PAM_SUCCESS; in do_pam_conv_kbd_int()
336 return PAM_SUCCESS; in do_pam_conv_kbd_int()
390 conv_ctxt->responses[j].resp_retcode = PAM_SUCCESS; in input_userauth_info_response_pam()
/titanic_50/usr/src/lib/pam_modules/authtok_get/
H A Dauthtok_get.c68 if (res != PAM_SUCCESS) in read_authtok()
73 if (res != PAM_SUCCESS) in read_authtok()
78 if (res == PAM_SUCCESS) in read_authtok()
86 if (res != PAM_SUCCESS) in read_authtok()
99 if (res != PAM_SUCCESS) in read_authtok()
115 if (res != PAM_SUCCESS) in read_authtok()
121 PAM_SUCCESS) && service != NULL) { in read_authtok()
131 if (res != PAM_SUCCESS) { in read_authtok()
163 if (res != PAM_SUCCESS || authtok == NULL) in verify_authtok()
169 if (res != PAM_SUCCESS) in verify_authtok()
[all …]
/titanic_50/usr/src/lib/pam_modules/allow/
H A Dallow.c67 return (PAM_SUCCESS); in pam_sm_authenticate()
74 return (PAM_SUCCESS); in pam_sm_setcred()
81 return (PAM_SUCCESS); in pam_sm_acct_mgmt()
88 return (PAM_SUCCESS); in pam_sm_open_session()
95 return (PAM_SUCCESS); in pam_sm_close_session()
102 return (PAM_SUCCESS); in pam_sm_chauthtok()
/titanic_50/usr/src/lib/pam_modules/ldap/
H A Dldap_utils.c47 return (PAM_SUCCESS); in __ldap_to_pamerror()
110 if ((result = __ldap_to_pamerror(ldaprc)) != PAM_SUCCESS) in authenticate()
124 if ((result = __ldap_to_pamerror(ldaprc)) != PAM_SUCCESS) in authenticate()
131 if ((result = __ldap_to_pamerror(ldaprc)) != PAM_SUCCESS) in authenticate()
141 if ((result = __ldap_to_pamerror(ldaprc)) != PAM_SUCCESS) in authenticate()
184 result = PAM_SUCCESS; in authenticate()
191 result = PAM_SUCCESS; in authenticate()
265 if (credp && (result == PAM_SUCCESS || in authenticate()
H A Dldap_authenticate.c65 != PAM_SUCCESS || in pam_sm_authenticate()
66 (err = pam_get_item(pamh, PAM_USER, (void **)&user)) != PAM_SUCCESS) in pam_sm_authenticate()
123 result = PAM_SUCCESS; in pam_sm_authenticate()
130 result = PAM_SUCCESS; in pam_sm_authenticate()
H A Dldap_acct_mgmt.c202 return (PAM_SUCCESS); in get_account_mgmt()
276 != PAM_SUCCESS) in pam_sm_acct_mgmt()
324 result = PAM_SUCCESS; in pam_sm_acct_mgmt()
332 } else if (result == PAM_SUCCESS) { in pam_sm_acct_mgmt()
349 if (result != PAM_SUCCESS) { in pam_sm_acct_mgmt()
361 if (pam_res == PAM_SUCCESS) in pam_sm_acct_mgmt()
367 != PAM_SUCCESS) { in pam_sm_acct_mgmt()
/titanic_50/usr/src/lib/libpam/
H A Dpam_framework.c308 != PAM_SUCCESS) { in pam_start()
315 != PAM_SUCCESS) { in pam_start()
322 != PAM_SUCCESS) { in pam_start()
329 return (PAM_SUCCESS); in pam_start()
385 return (PAM_SUCCESS); in pam_end()
538 return (PAM_SUCCESS); in pam_set_item()
611 return (PAM_SUCCESS); in pam_get_item()
673 return (PAM_SUCCESS); in parse_user_name()
700 != PAM_SUCCESS) { in pam_get_user()
707 return (PAM_SUCCESS); in pam_get_user()
[all …]
/titanic_50/usr/src/lib/pam_modules/sample/
H A Dsample_authenticate.c105 return (PAM_SUCCESS); in pam_sm_authenticate()
116 if (err != PAM_SUCCESS) in pam_sm_authenticate()
120 if (err != PAM_SUCCESS) in pam_sm_authenticate()
131 result = PAM_SUCCESS; in pam_sm_authenticate()
151 if (err != PAM_SUCCESS) { in pam_sm_authenticate()
166 result = PAM_SUCCESS; in pam_sm_authenticate()
H A Dsample_acct_mgmt.c60 return (PAM_SUCCESS); in pam_sm_acct_mgmt()
62 if (pam_get_item(pamh, PAM_USER, (void **)&user) != PAM_SUCCESS) in pam_sm_acct_mgmt()
65 if (pam_get_item(pamh, PAM_SERVICE, (void **)&pg) != PAM_SUCCESS) in pam_sm_acct_mgmt()
90 return (PAM_SUCCESS); in pam_sm_acct_mgmt()
103 return (error?PAM_SUCCESS:PAM_AUTH_ERR); in pam_sm_acct_mgmt()
/titanic_50/usr/src/lib/pam_modules/timestamp/
H A Dpam_timestamp.c98 return (PAM_SUCCESS); in validate_basic()
140 return (PAM_SUCCESS); in validate_dir()
161 return (PAM_SUCCESS); in create_dir()
212 if (validate_basic(pamh, user_tty, timestampfile) != PAM_SUCCESS) in pam_sm_authenticate()
216 if (validate_dir(sudir) != PAM_SUCCESS) in pam_sm_authenticate()
221 if (validate_dir(dirname(timestampdir)) != PAM_SUCCESS) in pam_sm_authenticate()
313 result = PAM_SUCCESS; in pam_sm_authenticate()
354 if (validate_basic(pamh, user_tty, timestampfile) != PAM_SUCCESS) in pam_sm_setcred()
373 if (create_dir(TIMESTAMP_DIR) != PAM_SUCCESS) in pam_sm_setcred()
378 if (create_dir(dirname(timestampdir)) != PAM_SUCCESS) in pam_sm_setcred()
[all …]
/titanic_50/usr/src/lib/pam_modules/unix_session/
H A Dunix_session.c82 return (PAM_SUCCESS); in pam_sm_close_session()
115 != PAM_SUCCESS || in pam_sm_open_session()
117 != PAM_SUCCESS || in pam_sm_open_session()
119 != PAM_SUCCESS) { in pam_sm_open_session()
147 return (PAM_SUCCESS); in pam_sm_open_session()
191 return (PAM_SUCCESS); in pam_sm_open_session()
/titanic_50/usr/src/lib/pam_modules/authtok_store/
H A Dauthtok_store.c83 (const void **)status) != PAM_SUCCESS) in authtok_is_aged()
137 if (res != PAM_SUCCESS) {
143 if (res != PAM_SUCCESS) {
154 if (res != PAM_SUCCESS) {
160 if (res != PAM_SUCCESS || newpw == NULL) {
186 if (res != PAM_SUCCESS) {
218 res = PAM_SUCCESS;
271 res = PAM_SUCCESS;
/titanic_50/usr/src/lib/pam_modules/rhosts_auth/
H A Drhosts_auth.c69 if (pam_get_item(pamh, PAM_USER, (void **) &lusername) != PAM_SUCCESS) in pam_sm_authenticate()
71 if (pam_get_item(pamh, PAM_RHOST, (void **) &host) != PAM_SUCCESS) in pam_sm_authenticate()
73 if (pam_get_item(pamh, PAM_RUSER, (void **)&rusername) != PAM_SUCCESS) in pam_sm_authenticate()
99 == -1 ? PAM_AUTH_ERR : PAM_SUCCESS); in pam_sm_authenticate()
/titanic_50/usr/src/cmd/rexd/
H A Dunix_login.c154 if (pam_start("rexd", pw->pw_name, NULL, &pamh) != PAM_SUCCESS ||
155 pam_set_item(pamh, PAM_RHOST, host) != PAM_SUCCESS) {
171 if ((v = pam_acct_mgmt(pamh, 0)) != PAM_SUCCESS) {
356 if (pam_set_item(pamh, PAM_TTY, slavename) != PAM_SUCCESS || in LoginUser()
357 pam_get_item(pamh, PAM_USER, (void **) &user) != PAM_SUCCESS || in LoginUser()
358 pam_get_item(pamh, PAM_RHOST, (void **) &rhost) != PAM_SUCCESS || in LoginUser()
359 pam_open_session(pamh, 0) != PAM_SUCCESS) { in LoginUser()
427 pam_end(pamh, PAM_SUCCESS); in LogoutUser()
451 == PAM_SUCCESS) { in LogoutUser()
455 (void) pam_end(pamh, PAM_SUCCESS); in LogoutUser()
/titanic_50/usr/src/lib/pam_modules/krb5/
H A Dkrb5_setcred.c109 if (pam_get_data(pamh, KRB5_DATA, (const void**)&kmd) != PAM_SUCCESS) { in pam_sm_setcred()
138 kmd, &krb5_cleanup)) != PAM_SUCCESS) { in pam_sm_setcred()
185 (kmd->auth_status != PAM_SUCCESS)) { in pam_sm_setcred()
240 return (PAM_SUCCESS); in pam_sm_setcred()
258 if (err != PAM_SUCCESS) in pam_sm_setcred()
344 return (PAM_SUCCESS); in attempt_refresh_cred()
418 if (kmd->auth_status == PAM_SUCCESS) { in krb5_renew_tgt()
602 return (PAM_SUCCESS); in attempt_delete_initcred()
612 return (PAM_SUCCESS); in attempt_delete_initcred()
H A Dkrb5_acct_mgmt.c146 return (PAM_SUCCESS); in fetch_princ_entry()
218 != PAM_SUCCESS) { in exp_warn()
271 err = PAM_SUCCESS; in exp_warn()
366 if (err != PAM_SUCCESS) { in pam_sm_acct_mgmt()
390 != PAM_SUCCESS) { in pam_sm_acct_mgmt()
458 if (kmd->auth_status == PAM_SUCCESS && !(flags & PAM_SILENT) && in pam_sm_acct_mgmt()
469 err = kmd->auth_status != PAM_SUCCESS ? PAM_IGNORE : kmd->auth_status; in pam_sm_acct_mgmt()
H A Dkrb5_authenticate.c136 if (!(err == PAM_SUCCESS || err == PAM_NO_MODULE_DATA)) in pam_sm_authenticate()
160 if (err != PAM_SUCCESS) { in pam_sm_authenticate()
167 kmd->auth_status == PAM_SUCCESS) { in pam_sm_authenticate()
191 PAM_SUCCESS) { in pam_sm_authenticate()
219 if (err != PAM_SUCCESS) { in pam_sm_authenticate()
263 kmd->age_status = PAM_SUCCESS; in pam_sm_authenticate()
298 kmd->auth_status = PAM_SUCCESS; in pam_sm_authenticate()
299 return (PAM_SUCCESS); in pam_sm_authenticate()
337 kmd->auth_status == PAM_SUCCESS)) { in pam_sm_authenticate()
340 if (result == PAM_SUCCESS) { in pam_sm_authenticate()
[all …]
H A Dkrb5_password.c74 if (login_result == PAM_SUCCESS) { in set_ccname()
81 != PAM_SUCCESS) { in set_ccname()
133 if (login_result != PAM_SUCCESS) { in get_set_creds()
211 != PAM_SUCCESS) { in pam_sm_chauthtok()
305 if (result == PAM_SUCCESS) { in pam_sm_chauthtok()
514 return (PAM_SUCCESS); in krb5_changepw()
/titanic_50/usr/src/lib/pam_modules/unix_account/
H A Dunix_acct.c173 return (PAM_SUCCESS);
208 return (PAM_SUCCESS); in perform_passwd_aging_check()
212 return (PAM_SUCCESS); in perform_passwd_aging_check()
319 != PAM_SUCCESS) in pam_sm_acct_mgmt()
329 != PAM_SUCCESS) in pam_sm_acct_mgmt()
510 != PAM_SUCCESS) { in pam_sm_acct_mgmt()
524 error = PAM_SUCCESS; in pam_sm_acct_mgmt()
557 if (pam_res == PAM_SUCCESS) in pam_sm_acct_mgmt()
563 != PAM_SUCCESS) { in pam_sm_acct_mgmt()
/titanic_50/usr/src/lib/pam_modules/passwd_auth/
H A Dpasswd_auth.c102 if ((res = pam_get_user(pamh, &user, NULL)) != PAM_SUCCESS) { in pam_sm_authenticate()
116 if (res != PAM_SUCCESS) in pam_sm_authenticate()
123 if (res != PAM_SUCCESS) in pam_sm_authenticate()
127 if (res != PAM_SUCCESS) { in pam_sm_authenticate()
169 retval = PAM_SUCCESS; in pam_sm_authenticate()
196 if (retval != PAM_SUCCESS) in pam_sm_authenticate()
/titanic_50/usr/src/lib/pam_modules/unix_auth/
H A Dunix_auth.c174 if (pam_get_item(pamh, PAM_USER, (void **)&user) != PAM_SUCCESS) { in pam_sm_authenticate()
185 if (pam_get_item(pamh, PAM_AUTHTOK, (void **)&passwd) != PAM_SUCCESS) { in pam_sm_authenticate()
192 if (result == PAM_SUCCESS && auth_rep != NULL) { in pam_sm_authenticate()
267 result = PAM_SUCCESS; in pam_sm_authenticate()
304 result = PAM_SUCCESS; in pam_sm_authenticate()
309 if (dolock && (result == PAM_SUCCESS && old_failed_count > 0)) { in pam_sm_authenticate()
/titanic_50/usr/src/lib/pam_modules/dial_auth/
H A Ddial_auth.c78 != PAM_SUCCESS || in pam_sm_authenticate()
80 != PAM_SUCCESS) in pam_sm_authenticate()
156 if (res != PAM_SUCCESS) { in pam_sm_authenticate()
169 return (PAM_SUCCESS); in pam_sm_authenticate()
/titanic_50/usr/src/cmd/cmd-inet/usr.sbin/
H A Din.rexecd.c294 if (pam_start("rexec", user, &conv, &pamh) != PAM_SUCCESS) { in doit()
297 if (pam_set_item(pamh, PAM_RHOST, hostname) != PAM_SUCCESS) { in doit()
301 if ((status = pam_authenticate(pamh, pam_flags)) != PAM_SUCCESS) { in doit()
316 if ((status = pam_acct_mgmt(pamh, pam_flags)) != PAM_SUCCESS) { in doit()
348 if ((status = pam_setcred(pamh, PAM_ESTABLISH_CRED)) != PAM_SUCCESS) { in doit()
352 pam_end(pamh, PAM_SUCCESS); in doit()
454 pam_end(pamh, PAM_SUCCESS); in doit()
570 return (PAM_SUCCESS); in rexec_conv()
/titanic_50/usr/src/cmd/bnu/
H A Din.uucpd.c224 if ((pam_start("uucp", user, &conv, &pamh)) != PAM_SUCCESS)
226 if ((pam_set_item(pamh, PAM_TTY, ttyname(0))) != PAM_SUCCESS)
229 if (pam_authenticate(pamh, PAM_SILENT) != PAM_SUCCESS) {
237 if ((error = pam_acct_mgmt(pamh, PAM_SILENT)) != PAM_SUCCESS) {
290 if (pam_setcred(pamh, PAM_ESTABLISH_CRED) != PAM_SUCCESS) {
305 pam_end(pamh, PAM_SUCCESS);
547 return (PAM_SUCCESS);
612 return (PAM_SUCCESS);

123