/freebsd-11-stable/contrib/openpam/lib/libpam/ |
H A D | pam_end.c | 56 pam_end(pam_handle_t *pamh, argument 63 if (pamh == NULL) 67 while ((dp = pamh->module_data) != NULL) { 69 (dp->cleanup)(pamh, dp->data, status); 70 pamh->module_data = dp->next; 76 while (pamh->env_count) { 77 --pamh->env_count; 78 FREE(pamh->env[pamh->env_count]); 80 FREE(pamh [all...] |
H A D | pam_putenv.c | 58 pam_putenv(pam_handle_t *pamh, argument 74 if ((i = openpam_findenv(pamh, namevalue, p - namevalue)) >= 0) { 77 FREE(pamh->env[i]); 78 pamh->env[i] = p; 83 if (pamh->env_count == pamh->env_size) { 84 env_size = pamh->env_size * 2 + 1; 85 env = realloc(pamh->env, sizeof(char *) * env_size); 88 pamh->env = env; 89 pamh [all...] |
H A D | openpam_free_data.c | 56 openpam_free_data(pam_handle_t *pamh, argument 62 (void)pamh;
|
H A D | pam_acct_mgmt.c | 56 pam_acct_mgmt(pam_handle_t *pamh, argument 62 r = openpam_dispatch(pamh, PAM_SM_ACCT_MGMT, flags);
|
H A D | openpam_findenv.c | 56 openpam_findenv(pam_handle_t *pamh, argument 63 for (i = 0; i < pamh->env_count; ++i) 64 if (strncmp(pamh->env[i], name, len) == 0 && 65 pamh->env[i][len] == '=')
|
H A D | pam_authenticate.c | 56 pam_authenticate(pam_handle_t *pamh, argument 64 r = openpam_dispatch(pamh, PAM_SM_AUTHENTICATE, flags); 65 pam_set_item(pamh, PAM_AUTHTOK, NULL); 80 * associated with the pam context specified by the =pamh argument.
|
H A D | pam_chauthtok.c | 56 pam_chauthtok(pam_handle_t *pamh, argument 64 r = openpam_dispatch(pamh, PAM_SM_CHAUTHTOK, 67 r = openpam_dispatch(pamh, PAM_SM_CHAUTHTOK, 69 pam_set_item(pamh, PAM_OLDAUTHTOK, NULL); 70 pam_set_item(pamh, PAM_AUTHTOK, NULL); 85 * for the user associated with the pam context specified by the =pamh
|
H A D | pam_set_data.c | 57 pam_set_data(pam_handle_t *pamh, argument 60 void (*cleanup)(pam_handle_t *pamh, 67 for (dp = pamh->module_data; dp != NULL; dp = dp->next) { 70 (dp->cleanup)(pamh, dp->data, PAM_SUCCESS); 84 dp->next = pamh->module_data; 85 pamh->module_data = dp; 99 * in the PAM context specified by the =pamh argument.
|
H A D | pam_getenv.c | 58 pam_getenv(pam_handle_t *pamh, argument 71 if ((i = openpam_findenv(pamh, name, len)) < 0) 73 /* assert(pamh->env[i][len] == '='); */ 74 RETURNS(pamh->env[i] + len + 1);
|
H A D | pam_get_authtok.c | 65 pam_get_authtok(pam_handle_t *pamh, argument 86 r = pam_get_item(pamh, PAM_RHOST, &rhost); 88 r = pam_get_item(pamh, PAM_HOST, &lhost); 94 r = pam_get_item(pamh, PAM_OLDAUTHTOK, &oldauthtok); 109 if (openpam_get_option(pamh, "try_first_pass") || 110 openpam_get_option(pamh, "use_first_pass")) { 111 r = pam_get_item(pamh, item, &prevauthtok); 115 } else if (openpam_get_option(pamh, "use_first_pass")) { 120 if ((promptp = openpam_get_option(pamh, prompt_option)) != NULL) 124 r = pam_get_item(pamh, pite [all...] |
H A D | pam_getenvlist.c | 57 pam_getenvlist(pam_handle_t *pamh) argument 63 envlist = malloc(sizeof(char *) * (pamh->env_count + 1)); 69 for (i = 0; i < pamh->env_count; ++i) { 70 if ((envlist[i] = strdup(pamh->env[i])) == NULL) { 97 * environ = pam_getenvlist(pamh);
|
H A D | pam_setcred.c | 56 pam_setcred(pam_handle_t *pamh, argument 66 r = openpam_dispatch(pamh, PAM_SM_SETCRED, flags);
|
H A D | pam_close_session.c | 56 pam_close_session(pam_handle_t *pamh, argument 64 r = openpam_dispatch(pamh, PAM_SM_CLOSE_SESSION, flags);
|
H A D | pam_vinfo.c | 57 pam_vinfo(const pam_handle_t *pamh, argument 64 r = pam_vprompt(pamh, PAM_TEXT_INFO, &rsp, fmt, ap);
|
H A D | pam_verror.c | 57 pam_verror(const pam_handle_t *pamh, argument 64 r = pam_vprompt(pamh, PAM_ERROR_MSG, &rsp, fmt, ap);
|
H A D | pam_get_user.c | 61 pam_get_user(pam_handle_t *pamh, argument 72 r = pam_get_item(pamh, PAM_USER, (const void **)user); 76 if ((promptp = openpam_get_option(pamh, "user_prompt")) != NULL) 80 r = pam_get_item(pamh, PAM_USER_PROMPT, &promptp); 89 r = openpam_subst(pamh, prompt_buf, &prompt_size, prompt); 92 r = pam_prompt(pamh, PAM_PROMPT_ECHO_ON, &resp, "%s", prompt); 95 r = pam_set_item(pamh, PAM_USER, resp); 99 r = pam_get_item(pamh, PAM_USER, (const void **)user);
|
H A D | pam_open_session.c | 56 pam_open_session(pam_handle_t *pamh, argument 64 r = openpam_dispatch(pamh, PAM_SM_OPEN_SESSION, flags);
|
/freebsd-11-stable/contrib/openpam/modules/pam_permit/ |
H A D | pam_permit.c | 47 pam_sm_authenticate(pam_handle_t *pamh, int flags, argument 51 (void)pamh; 59 pam_sm_setcred(pam_handle_t *pamh, int flags, argument 63 (void)pamh; 71 pam_sm_acct_mgmt(pam_handle_t *pamh, int flags, argument 75 (void)pamh; 83 pam_sm_open_session(pam_handle_t *pamh, int flags, argument 87 (void)pamh; 95 pam_sm_close_session(pam_handle_t *pamh, int flags, argument 99 (void)pamh; 107 pam_sm_chauthtok(pam_handle_t *pamh, int flags, int argc, const char *argv[]) argument [all...] |
/freebsd-11-stable/contrib/openpam/modules/pam_deny/ |
H A D | pam_deny.c | 47 pam_sm_authenticate(pam_handle_t *pamh, int flags, argument 51 (void)pamh; 59 pam_sm_setcred(pam_handle_t *pamh, int flags, argument 63 (void)pamh; 71 pam_sm_acct_mgmt(pam_handle_t *pamh, int flags, argument 75 (void)pamh; 83 pam_sm_open_session(pam_handle_t *pamh, int flags, argument 87 (void)pamh; 95 pam_sm_close_session(pam_handle_t *pamh, int flags, argument 99 (void)pamh; 107 pam_sm_chauthtok(pam_handle_t *pamh, int flags, int argc, const char *argv[]) argument [all...] |
/freebsd-11-stable/contrib/openpam/t/ |
H A D | t_pam_env.c | 62 pam_handle_t *pamh; 67 pam_err = pam_start("t_pam_env", "test", &t_null_pamc, &pamh); 69 envlist = pam_getenvlist(pamh); 75 pam_end(pamh, pam_err); 82 pam_handle_t *pamh; 87 pam_err = pam_start("t_pam_env", "test", &t_null_pamc, &pamh); 89 pam_err = pam_putenv(pamh, T_ENV_NAMEVALUE); 91 envlist = pam_getenvlist(pamh); 98 pam_end(pamh, pam_err); 105 pam_handle_t *pamh; 61 pam_handle_t *pamh; local 81 pam_handle_t *pamh; local 104 pam_handle_t *pamh; local 127 pam_handle_t *pamh; local 143 pam_handle_t *pamh; local 161 pam_handle_t *pamh; local [all...] |
/freebsd-11-stable/contrib/openpam/modules/pam_return/ |
H A D | pam_return.c | 48 pam_return(pam_handle_t *pamh, int flags, argument 58 if ((errname = openpam_get_option(pamh, "error")) == NULL || 80 pam_sm_authenticate(pam_handle_t *pamh, int flags, argument 84 return (pam_return(pamh, flags, argc, argv)); 88 pam_sm_setcred(pam_handle_t *pamh, int flags, argument 92 return (pam_return(pamh, flags, argc, argv)); 96 pam_sm_acct_mgmt(pam_handle_t *pamh, int flags, argument 100 return (pam_return(pamh, flags, argc, argv)); 104 pam_sm_open_session(pam_handle_t *pamh, int flags, argument 108 return (pam_return(pamh, flag 112 pam_sm_close_session(pam_handle_t *pamh, int flags, int argc, const char *argv[]) argument 120 pam_sm_chauthtok(pam_handle_t *pamh, int flags, int argc, const char *argv[]) argument [all...] |
/freebsd-11-stable/lib/libpam/modules/pam_guest/ |
H A D | pam_guest.c | 69 pam_sm_authenticate(pam_handle_t *pamh, int flags __unused, argument 76 if (pam_get_user(pamh, &user, NULL) != PAM_SUCCESS || user == NULL) 80 if ((guests = openpam_get_option(pamh, "guests")) == NULL) 87 if (!openpam_get_option(pamh, "nopass")) { 88 err = pam_get_authtok(pamh, PAM_AUTHTOK, &authtok, NULL); 91 if (openpam_get_option(pamh, "pass_is_user") && 94 if (openpam_get_option(pamh, "pass_as_ruser")) 95 pam_set_item(pamh, PAM_RUSER, authtok); 100 pam_setenv(pamh, "GUEST", user, 1); 107 pam_sm_setcred(pam_handle_t * pamh __unuse [all...] |
/freebsd-11-stable/lib/libpam/modules/pam_group/ |
H A D | pam_group.c | 57 pam_group(pam_handle_t *pamh) argument 67 if (pam_get_user(pamh, &user, NULL) != PAM_SUCCESS || 70 if (pwd->pw_uid != 0 && openpam_get_option(pamh, "root_only")) 74 local = openpam_get_option(pamh, "luser") ? 1 : 0; 75 remote = openpam_get_option(pamh, "ruser") ? 1 : 0; 87 if (pam_get_item(pamh, PAM_RUSER, &ruser) != PAM_SUCCESS || 93 if ((group = openpam_get_option(pamh, "group")) == NULL) 108 if (openpam_get_option(pamh, "deny")) 112 if (openpam_get_option(pamh, "deny")) 116 if (openpam_get_option(pamh, "fail_saf 123 pam_sm_authenticate(pam_handle_t *pamh, int flags __unused, int argc __unused, const char *argv[] __unused) argument 139 pam_sm_acct_mgmt(pam_handle_t *pamh, int flags __unused, int argc __unused, const char *argv[] __unused) argument [all...] |
/freebsd-11-stable/contrib/openpam/bin/su/ |
H A D | su.c | 59 static pam_handle_t *pamh; variable 100 pam_start("su", user, &pamc, &pamh); 104 if ((pam_err = pam_set_item(pamh, PAM_RHOST, hostname)) != PAM_SUCCESS) 107 if ((pam_err = pam_set_item(pamh, PAM_RUSER, user)) != PAM_SUCCESS) 110 if ((pam_err = pam_set_item(pamh, PAM_TTY, tty)) != PAM_SUCCESS) 114 if ((pam_err = pam_authenticate(pamh, 0)) != PAM_SUCCESS) 116 if ((pam_err = pam_acct_mgmt(pamh, 0)) == PAM_NEW_AUTHTOK_REQD) 117 pam_err = pam_chauthtok(pamh, PAM_CHANGE_EXPIRED_AUTHTOK); 122 if ((pam_err = pam_setcred(pamh, PAM_ESTABLISH_CRED)) != PAM_SUCCESS) 126 if ((pam_err = pam_open_session(pamh, [all...] |
/freebsd-11-stable/lib/libpam/libpam/security/ |
H A D | pam_mod_misc.h | 51 !openpam_get_option(pamh, "no_warn")) \ 52 pam_error(pamh, __VA_ARGS__); \
|