/freebsd-current/contrib/openpam/lib/libpam/ |
H A D | pam_end.c | 54 pam_end(pam_handle_t *pamh, argument 61 if (pamh == NULL) 65 while ((dp = pamh->module_data) != NULL) { 67 (dp->cleanup)(pamh, dp->data, status); 68 pamh->module_data = dp->next; 74 while (pamh->env_count) { 75 --pamh->env_count; 76 FREE(pamh->env[pamh->env_count]); 78 FREE(pamh [all...] |
H A D | pam_putenv.c | 56 pam_putenv(pam_handle_t *pamh, argument 72 if ((i = openpam_findenv(pamh, namevalue, p - namevalue)) >= 0) { 75 FREE(pamh->env[i]); 76 pamh->env[i] = p; 81 if (pamh->env_count == pamh->env_size) { 82 env_size = pamh->env_size * 2 + 1; 83 env = realloc(pamh->env, sizeof(char *) * env_size); 86 pamh->env = env; 87 pamh [all...] |
H A D | pam_acct_mgmt.c | 54 pam_acct_mgmt(pam_handle_t *pamh, argument 60 r = openpam_dispatch(pamh, PAM_SM_ACCT_MGMT, flags);
|
H A D | openpam_free_data.c | 54 openpam_free_data(pam_handle_t *pamh, argument 60 (void)pamh;
|
H A D | openpam_findenv.c | 54 openpam_findenv(pam_handle_t *pamh, argument 61 for (i = 0; i < pamh->env_count; ++i) 62 if (strncmp(pamh->env[i], name, len) == 0 && 63 pamh->env[i][len] == '=')
|
H A D | pam_authenticate.c | 54 pam_authenticate(pam_handle_t *pamh, argument 62 r = openpam_dispatch(pamh, PAM_SM_AUTHENTICATE, flags); 63 pam_set_item(pamh, PAM_AUTHTOK, NULL); 78 * associated with the pam context specified by the =pamh argument.
|
H A D | pam_chauthtok.c | 54 pam_chauthtok(pam_handle_t *pamh, argument 62 r = openpam_dispatch(pamh, PAM_SM_CHAUTHTOK, 65 r = openpam_dispatch(pamh, PAM_SM_CHAUTHTOK, 67 pam_set_item(pamh, PAM_OLDAUTHTOK, NULL); 68 pam_set_item(pamh, PAM_AUTHTOK, NULL); 83 * for the user associated with the pam context specified by the =pamh
|
H A D | pam_set_data.c | 55 pam_set_data(pam_handle_t *pamh, argument 58 void (*cleanup)(pam_handle_t *pamh, 65 for (dp = pamh->module_data; dp != NULL; dp = dp->next) { 68 (dp->cleanup)(pamh, dp->data, PAM_SUCCESS); 82 dp->next = pamh->module_data; 83 pamh->module_data = dp; 97 * in the PAM context specified by the =pamh argument.
|
H A D | pam_getenv.c | 56 pam_getenv(pam_handle_t *pamh, argument 69 if ((i = openpam_findenv(pamh, name, len)) < 0) 71 /* assert(pamh->env[i][len] == '='); */ 72 RETURNS(pamh->env[i] + len + 1);
|
H A D | pam_get_authtok.c | 63 pam_get_authtok(pam_handle_t *pamh, argument 84 r = pam_get_item(pamh, PAM_RHOST, &rhost); 86 r = pam_get_item(pamh, PAM_HOST, &lhost); 92 r = pam_get_item(pamh, PAM_OLDAUTHTOK, &oldauthtok); 107 if (openpam_get_option(pamh, "try_first_pass") || 108 openpam_get_option(pamh, "use_first_pass")) { 109 r = pam_get_item(pamh, item, &prevauthtok); 113 } else if (openpam_get_option(pamh, "use_first_pass")) { 118 if ((promptp = openpam_get_option(pamh, prompt_option)) != NULL) 122 r = pam_get_item(pamh, pite [all...] |
H A D | pam_getenvlist.c | 55 pam_getenvlist(pam_handle_t *pamh) argument 61 envlist = malloc(sizeof(char *) * (pamh->env_count + 1)); 67 for (i = 0; i < pamh->env_count; ++i) { 68 if ((envlist[i] = strdup(pamh->env[i])) == NULL) { 95 * environ = pam_getenvlist(pamh);
|
H A D | pam_close_session.c | 54 pam_close_session(pam_handle_t *pamh, argument 62 r = openpam_dispatch(pamh, PAM_SM_CLOSE_SESSION, flags);
|
H A D | pam_setcred.c | 54 pam_setcred(pam_handle_t *pamh, argument 64 r = openpam_dispatch(pamh, PAM_SM_SETCRED, flags);
|
H A D | pam_strerror.c | 54 pam_strerror(const pam_handle_t *pamh, argument 59 (void)pamh; 72 * The =pamh argument is ignored.
|
H A D | pam_vinfo.c | 55 pam_vinfo(const pam_handle_t *pamh, argument 62 r = pam_vprompt(pamh, PAM_TEXT_INFO, &rsp, fmt, ap);
|
H A D | pam_verror.c | 55 pam_verror(const pam_handle_t *pamh, argument 62 r = pam_vprompt(pamh, PAM_ERROR_MSG, &rsp, fmt, ap);
|
H A D | pam_get_user.c | 59 pam_get_user(pam_handle_t *pamh, argument 70 r = pam_get_item(pamh, PAM_USER, (const void **)user); 74 if ((promptp = openpam_get_option(pamh, "user_prompt")) != NULL) 78 r = pam_get_item(pamh, PAM_USER_PROMPT, &promptp); 87 r = openpam_subst(pamh, prompt_buf, &prompt_size, prompt); 90 r = pam_prompt(pamh, PAM_PROMPT_ECHO_ON, &resp, "%s", prompt); 93 r = pam_set_item(pamh, PAM_USER, resp); 97 r = pam_get_item(pamh, PAM_USER, (const void **)user);
|
H A D | pam_open_session.c | 54 pam_open_session(pam_handle_t *pamh, argument 62 r = openpam_dispatch(pamh, PAM_SM_OPEN_SESSION, flags);
|
/freebsd-current/contrib/openpam/modules/pam_deny/ |
H A D | pam_deny.c | 45 pam_sm_authenticate(pam_handle_t *pamh, int flags, argument 49 (void)pamh; 57 pam_sm_setcred(pam_handle_t *pamh, int flags, argument 61 (void)pamh; 69 pam_sm_acct_mgmt(pam_handle_t *pamh, int flags, argument 73 (void)pamh; 81 pam_sm_open_session(pam_handle_t *pamh, int flags, argument 85 (void)pamh; 93 pam_sm_close_session(pam_handle_t *pamh, int flags, argument 97 (void)pamh; 105 pam_sm_chauthtok(pam_handle_t *pamh, int flags, int argc, const char *argv[]) argument [all...] |
/freebsd-current/contrib/openpam/modules/pam_permit/ |
H A D | pam_permit.c | 45 pam_sm_authenticate(pam_handle_t *pamh, int flags, argument 49 (void)pamh; 57 pam_sm_setcred(pam_handle_t *pamh, int flags, argument 61 (void)pamh; 69 pam_sm_acct_mgmt(pam_handle_t *pamh, int flags, argument 73 (void)pamh; 81 pam_sm_open_session(pam_handle_t *pamh, int flags, argument 85 (void)pamh; 93 pam_sm_close_session(pam_handle_t *pamh, int flags, argument 97 (void)pamh; 105 pam_sm_chauthtok(pam_handle_t *pamh, int flags, int argc, const char *argv[]) argument [all...] |
/freebsd-current/contrib/openpam/t/ |
H A D | t_pam_env.c | 60 pam_handle_t *pamh; 65 pam_err = pam_start("t_pam_env", "test", &t_null_pamc, &pamh); 67 envlist = pam_getenvlist(pamh); 73 pam_end(pamh, pam_err); 80 pam_handle_t *pamh; 85 pam_err = pam_start("t_pam_env", "test", &t_null_pamc, &pamh); 87 pam_err = pam_putenv(pamh, T_ENV_NAMEVALUE); 89 envlist = pam_getenvlist(pamh); 96 pam_end(pamh, pam_err); 103 pam_handle_t *pamh; 59 pam_handle_t *pamh; local 79 pam_handle_t *pamh; local 102 pam_handle_t *pamh; local 125 pam_handle_t *pamh; local 141 pam_handle_t *pamh; local 159 pam_handle_t *pamh; local [all...] |
/freebsd-current/contrib/openpam/modules/pam_return/ |
H A D | pam_return.c | 46 pam_return(pam_handle_t *pamh, int flags, argument 56 if ((errname = openpam_get_option(pamh, "error")) == NULL || 78 pam_sm_authenticate(pam_handle_t *pamh, int flags, argument 82 return (pam_return(pamh, flags, argc, argv)); 86 pam_sm_setcred(pam_handle_t *pamh, int flags, argument 90 return (pam_return(pamh, flags, argc, argv)); 94 pam_sm_acct_mgmt(pam_handle_t *pamh, int flags, argument 98 return (pam_return(pamh, flags, argc, argv)); 102 pam_sm_open_session(pam_handle_t *pamh, int flags, argument 106 return (pam_return(pamh, flag 110 pam_sm_close_session(pam_handle_t *pamh, int flags, int argc, const char *argv[]) argument 118 pam_sm_chauthtok(pam_handle_t *pamh, int flags, int argc, const char *argv[]) argument [all...] |
/freebsd-current/lib/libpam/modules/pam_guest/ |
H A D | pam_guest.c | 69 pam_sm_authenticate(pam_handle_t *pamh, int flags __unused, argument 76 if (pam_get_user(pamh, &user, NULL) != PAM_SUCCESS || user == NULL) 80 if ((guests = openpam_get_option(pamh, "guests")) == NULL) 87 if (!openpam_get_option(pamh, "nopass")) { 88 err = pam_get_authtok(pamh, PAM_AUTHTOK, &authtok, NULL); 91 if (openpam_get_option(pamh, "pass_is_user") && 94 if (openpam_get_option(pamh, "pass_as_ruser")) 95 pam_set_item(pamh, PAM_RUSER, authtok); 100 pam_setenv(pamh, "GUEST", user, 1); 107 pam_sm_setcred(pam_handle_t * pamh __unuse [all...] |
/freebsd-current/contrib/openpam/bin/su/ |
H A D | su.c | 57 static pam_handle_t *pamh; variable 98 pam_start("su", user, &pamc, &pamh); 102 if ((pam_err = pam_set_item(pamh, PAM_RHOST, hostname)) != PAM_SUCCESS) 105 if ((pam_err = pam_set_item(pamh, PAM_RUSER, user)) != PAM_SUCCESS) 108 if ((pam_err = pam_set_item(pamh, PAM_TTY, tty)) != PAM_SUCCESS) 112 if ((pam_err = pam_authenticate(pamh, 0)) != PAM_SUCCESS) 114 if ((pam_err = pam_acct_mgmt(pamh, 0)) == PAM_NEW_AUTHTOK_REQD) 115 pam_err = pam_chauthtok(pamh, PAM_CHANGE_EXPIRED_AUTHTOK); 120 if ((pam_err = pam_setcred(pamh, PAM_ESTABLISH_CRED)) != PAM_SUCCESS) 124 if ((pam_err = pam_open_session(pamh, [all...] |
/freebsd-current/lib/libpam/modules/pam_group/ |
H A D | pam_group.c | 56 pam_group(pam_handle_t *pamh) argument 66 if (pam_get_user(pamh, &user, NULL) != PAM_SUCCESS || 69 if (pwd->pw_uid != 0 && openpam_get_option(pamh, "root_only")) 73 local = openpam_get_option(pamh, "luser") ? 1 : 0; 74 remote = openpam_get_option(pamh, "ruser") ? 1 : 0; 86 if (pam_get_item(pamh, PAM_RUSER, &ruser) != PAM_SUCCESS || 92 if ((group = openpam_get_option(pamh, "group")) == NULL) 107 if (openpam_get_option(pamh, "deny")) 111 if (openpam_get_option(pamh, "deny")) 115 if (openpam_get_option(pamh, "fail_saf 122 pam_sm_authenticate(pam_handle_t *pamh, int flags __unused, int argc __unused, const char *argv[] __unused) argument 138 pam_sm_acct_mgmt(pam_handle_t *pamh, int flags __unused, int argc __unused, const char *argv[] __unused) argument [all...] |