Searched refs:pamh (Results 1 - 16 of 16) sorted by relevance

/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/source/auth/
H A Dpampass.c68 static BOOL smb_pam_error_handler(pam_handle_t *pamh, int pam_error, const char *msg, int dbglvl) argument
73 msg, pam_strerror(pamh, pam_error)));
85 static BOOL smb_pam_nt_status_error_handler(pam_handle_t *pamh, int pam_error, argument
91 if (smb_pam_error_handler(pamh, pam_error, msg, dbglvl))
431 static BOOL smb_pam_end(pam_handle_t *pamh, struct pam_conv *smb_pam_conv_ptr) argument
437 if( pamh != NULL ) {
438 pam_error = pam_end(pamh, 0);
439 if(smb_pam_error_handler(pamh, pam_error, "End Cleanup Failed", 2) == True) {
452 static BOOL smb_pam_start(pam_handle_t **pamh, const char *user, const char *rhost, struct pam_conv *pconv) argument
457 *pamh
500 smb_pam_auth(pam_handle_t *pamh, const char *user) argument
546 smb_pam_account(pam_handle_t *pamh, const char * user) argument
585 smb_pam_setcred(pam_handle_t *pamh, const char * user) argument
625 smb_internal_pam_session(pam_handle_t *pamh, const char *user, const char *tty, BOOL flag) argument
653 smb_pam_chauthtok(pam_handle_t *pamh, const char * user) argument
709 pam_handle_t *pamh = NULL; local
737 pam_handle_t *pamh = NULL; local
766 pam_handle_t *pamh = NULL; local
793 pam_handle_t *pamh = NULL; local
839 pam_handle_t *pamh = NULL; local
[all...]
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/source/pam_smbpass/
H A Dpam_smb_auth.c43 pam_set_data( pamh, "smb_setcred_return" \
49 static int _smb_add_user(pam_handle_t *pamh, unsigned int ctrl,
62 int pam_sm_authenticate(pam_handle_t *pamh, int flags, argument
88 retval = pam_get_user( pamh, &name, "Username: " );
114 retval = _smb_add_user(pamh, ctrl, name, sampass, found);
137 retval = _smb_read_password(pamh, ctrl, NULL, "Password: ", NULL, _SMB_AUTHTOK, &p);
147 retval = _smb_verify_password( pamh, sampass, p, ctrl );
158 int pam_sm_setcred(pam_handle_t *pamh, int flags, argument
165 pam_get_data(pamh, "smb_setcred_return", (const void **) &pretval);
170 pam_set_data(pamh, "smb_setcred_retur
177 _smb_add_user(pam_handle_t *pamh, unsigned int ctrl, const char *name, SAM_ACCOUNT *sampass, BOOL exist) argument
[all...]
H A Dsupport.c84 int converse( pam_handle_t * pamh, int ctrl, int nargs argument
91 retval = pam_get_item(pamh, PAM_CONV, (const void **) &conv);
99 ,pam_strerror(pamh, retval));
103 ,pam_strerror(pamh, retval));
109 int make_remark( pam_handle_t * pamh, unsigned int ctrl argument
121 return converse(pamh, ctrl, 1, pmsg, &resp);
222 void _cleanup( pam_handle_t * pamh, void *x, int error_status ) argument
258 void _cleanup_failures( pam_handle_t * pamh, void *fl, int err ) argument
284 pam_get_item( pamh, PAM_SERVICE, (const void **) &service );
308 int _smb_verify_password( pam_handle_t * pamh, SAM_ACCOUN argument
466 _smb_read_password( pam_handle_t * pamh, unsigned int ctrl, const char *comment, const char *prompt1, const char *prompt2, const char *data_name, char **pass ) argument
616 _pam_smb_approve_pass(pam_handle_t * pamh, unsigned int ctrl, const char *pass_old, const char *pass_new ) argument
[all...]
H A Dsupport.h29 extern int _smb_verify_password( pam_handle_t *pamh , SAM_ACCOUNT *sampass,
H A Dpam_smb_acct.c42 int pam_sm_acct_mgmt( pam_handle_t *pamh, int flags, argument
61 retval = pam_get_user( pamh, &name, "Username: " );
95 make_remark( pamh, ctrl, PAM_ERROR_MSG
H A Dpam_smb_passwd.c41 int smb_update_db( pam_handle_t *pamh, int ctrl, const char *user, const char *pass_new ) argument
57 make_remark( pamh, ctrl, PAM_ERROR_MSG, err_str );
65 make_remark( pamh, ctrl, PAM_TEXT_INFO, msg_str );
91 int pam_sm_chauthtok(pam_handle_t *pamh, int flags, argument
118 retval = pam_get_user( pamh, &user, "Username: " );
184 retval = _smb_read_password( pamh, ctrl, Announce, "Current SMB password: ",
198 retval = _smb_verify_password( pamh, sampass, pass_old, ctrl );
223 retval = pam_get_item( pamh, PAM_OLDAUTHTOK,
226 retval = pam_get_data( pamh, _SMB_OLD_AUTHTOK,
251 retval = _smb_read_password( pamh, ctr
[all...]
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/timemachine/netatalk-2.2.0/etc/uams/
H A Duams_pam.c57 static pam_handle_t *pamh = NULL; variable
168 &pamh);
172 pam_set_item(pamh, PAM_TTY, "afpd");
173 pam_set_item(pamh, PAM_RHOST, hostname);
175 PAM_error = pam_authenticate(pamh,0);
182 PAM_error = pam_acct_mgmt(pamh, 0);
197 PAM_error = pam_setcred(pamh, PAM_CRED_ESTABLISH);
201 PAM_error = pam_open_session(pamh, 0);
213 pam_end(pamh, PAM_error);
214 pamh
[all...]
H A Duams_dhx_pam.c74 static pam_handle_t *pamh = NULL; variable
480 &pamh);
484 pam_strerror(pamh,PAM_error));
490 pam_set_item(pamh, PAM_TTY, "afpd");
491 pam_set_item(pamh, PAM_RHOST, hostname);
492 PAM_error = pam_authenticate(pamh,0);
498 pam_strerror(pamh, PAM_error));
503 PAM_error = pam_acct_mgmt(pamh, 0);
507 pam_strerror(pamh, PAM_error));
522 PAM_error = pam_setcred(pamh, PAM_CRED_ESTABLIS
[all...]
H A Duams_dhx2_pam.c57 static pam_handle_t *pamh = NULL; variable
601 PAM_error = pam_start("netatalk", PAM_username, &PAM_conversation, &pamh);
604 pam_strerror(pamh,PAM_error));
609 pam_set_item(pamh, PAM_TTY, "afpd");
610 pam_set_item(pamh, PAM_RHOST, hostname);
611 PAM_error = pam_authenticate(pamh, 0);
616 pam_strerror(pamh, PAM_error));
620 PAM_error = pam_acct_mgmt(pamh, 0);
623 pam_strerror(pamh, PAM_error));
637 PAM_error = pam_setcred(pamh, PAM_CRED_ESTABLIS
[all...]
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/zebra/vtysh/
H A Dvtysh_user.c46 pam_handle_t *pamh = NULL; local
49 ret = pam_start("zebra", user, &conv, &pamh);
54 ret = pam_authenticate (pamh, 0);
60 ret = pam_acct_mgmt (pamh, 0);
76 if (pam_end (pamh, ret) != PAM_SUCCESS)
78 pamh = NULL;
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/source/nsswitch/
H A Dpam_winbind.c64 static int converse(pam_handle_t *pamh, int nargs, argument
71 retval = pam_get_item(pamh, PAM_CONV, (const void **) &conv ) ;
81 static int _make_remark(pam_handle_t * pamh, int type, const char *text) argument
93 retval = converse(pamh, 1, pmsg, &resp);
300 static int _winbind_read_password(pam_handle_t * pamh
329 retval = pam_get_item(pamh, authtok_flag, (const void **) &item);
381 retval = converse(pamh, i, pmsg, &resp);
398 _make_remark(pamh ,PAM_ERROR_MSG, MISTYPED_PASS);
430 retval = pam_set_item(pamh, authtok_flag, token);
433 || (retval = pam_get_item(pamh, authtok_fla
449 pam_sm_authenticate(pam_handle_t *pamh, int flags, int argc, const char **argv) argument
513 pam_sm_setcred(pam_handle_t *pamh, int flags, int argc, const char **argv) argument
524 pam_sm_acct_mgmt(pam_handle_t *pamh, int flags, int argc, const char **argv) argument
570 pam_sm_open_session(pam_handle_t *pamh, int flags, int argc, const char **argv) argument
580 pam_sm_close_session(pam_handle_t *pamh, int flags, int argc, const char **argv) argument
592 pam_sm_chauthtok(pam_handle_t * pamh, int flags, int argc, const char **argv) argument
[all...]
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/bftpd-1.6.6/
H A Dlogin.h5 extern pam_handle_t *pamh;
H A Dlogin.c53 pam_handle_t *pamh = NULL; variable
742 (pam_handle_t **) & pamh);
747 pam_strerror (pamh, retval));
750 pam_fail_delay (pamh, 0);
751 retval = pam_authenticate (pamh, 0);
753 retval = pam_acct_mgmt (pamh, 0);
755 pam_open_session (pamh, 0);
764 if (pamh)
766 pam_close_session (pamh, 0);
767 pam_end (pamh,
[all...]
/netgear-WNDR4500-V1.0.1.40_1.0.68/src/router/busybox-1.x/loginutils/
H A Dlogin.c240 USE_PAM(pam_handle_t *pamh;)
296 pamret = pam_start("login", username, &conv, &pamh);
302 pamret = pam_set_item(pamh, PAM_TTY, short_tty);
307 pamret = pam_authenticate(pamh, 0);
317 pamret = pam_acct_mgmt(pamh, 0);
327 if (pam_get_item(pamh, PAM_USER, (void*)&pamuser) != PAM_SUCCESS) {
340 bb_error_msg("%s failed: %s (%d)", failed_msg, pam_strerror(pamh, pamret), pamret);
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/ppp/pppd/
H A Dauth.c1029 static pam_handle_t *pamh = NULL; variable
1106 pam_error = pam_start ("ppp", user, &PAM_conversation, &pamh);
1108 *msg = (char *) pam_strerror (pamh, pam_error);
1119 pam_set_item (pamh, PAM_TTY, devnam); /* this might be useful to some modules */
1124 pam_error = pam_authenticate (pamh, PAM_SILENT);
1126 pam_error = pam_acct_mgmt (pamh, PAM_SILENT);
1128 pam_open_session (pamh, PAM_SILENT);
1131 *msg = (char *) pam_strerror (pamh, pam_error);
1226 if (pamh != NULL) {
1227 pam_error = pam_close_session (pamh, PAM_SILEN
[all...]
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/ppp-2.4.4/pppd/
H A Dauth.c1492 static pam_handle_t *pamh = NULL; variable
1571 pam_error = pam_start ("ppp", user, &PAM_conversation, &pamh);
1573 *msg = (char *) pam_strerror (pamh, pam_error);
1584 pam_set_item (pamh, PAM_TTY, devnam); /* this might be useful to some modules */
1589 pam_error = pam_authenticate (pamh, PAM_SILENT);
1591 pam_error = pam_acct_mgmt (pamh, PAM_SILENT);
1593 pam_error = pam_open_session (pamh, PAM_SILENT);
1596 *msg = (char *) pam_strerror (pamh, pam_error);
1690 if (pamh != NULL) {
1691 pam_error = pam_close_session (pamh, PAM_SILEN
[all...]

Completed in 184 milliseconds