/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/source/auth/ |
H A D | pampass.c | 68 static BOOL smb_pam_error_handler(pam_handle_t *pamh, int pam_error, const char *msg, int dbglvl) argument 73 msg, pam_strerror(pamh, pam_error))); 85 static BOOL smb_pam_nt_status_error_handler(pam_handle_t *pamh, int pam_error, argument 91 if (smb_pam_error_handler(pamh, pam_error, msg, dbglvl)) 431 static BOOL smb_pam_end(pam_handle_t *pamh, struct pam_conv *smb_pam_conv_ptr) argument 437 if( pamh != NULL ) { 438 pam_error = pam_end(pamh, 0); 439 if(smb_pam_error_handler(pamh, pam_error, "End Cleanup Failed", 2) == True) { 452 static BOOL smb_pam_start(pam_handle_t **pamh, const char *user, const char *rhost, struct pam_conv *pconv) argument 457 *pamh 500 smb_pam_auth(pam_handle_t *pamh, const char *user) argument 546 smb_pam_account(pam_handle_t *pamh, const char * user) argument 585 smb_pam_setcred(pam_handle_t *pamh, const char * user) argument 625 smb_internal_pam_session(pam_handle_t *pamh, const char *user, const char *tty, BOOL flag) argument 653 smb_pam_chauthtok(pam_handle_t *pamh, const char * user) argument 709 pam_handle_t *pamh = NULL; local 737 pam_handle_t *pamh = NULL; local 766 pam_handle_t *pamh = NULL; local 793 pam_handle_t *pamh = NULL; local 839 pam_handle_t *pamh = NULL; local [all...] |
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/source/pam_smbpass/ |
H A D | pam_smb_auth.c | 43 pam_set_data( pamh, "smb_setcred_return" \ 49 static int _smb_add_user(pam_handle_t *pamh, unsigned int ctrl, 62 int pam_sm_authenticate(pam_handle_t *pamh, int flags, argument 88 retval = pam_get_user( pamh, &name, "Username: " ); 114 retval = _smb_add_user(pamh, ctrl, name, sampass, found); 137 retval = _smb_read_password(pamh, ctrl, NULL, "Password: ", NULL, _SMB_AUTHTOK, &p); 147 retval = _smb_verify_password( pamh, sampass, p, ctrl ); 158 int pam_sm_setcred(pam_handle_t *pamh, int flags, argument 165 pam_get_data(pamh, "smb_setcred_return", (const void **) &pretval); 170 pam_set_data(pamh, "smb_setcred_retur 177 _smb_add_user(pam_handle_t *pamh, unsigned int ctrl, const char *name, SAM_ACCOUNT *sampass, BOOL exist) argument [all...] |
H A D | support.c | 84 int converse( pam_handle_t * pamh, int ctrl, int nargs argument 91 retval = pam_get_item(pamh, PAM_CONV, (const void **) &conv); 99 ,pam_strerror(pamh, retval)); 103 ,pam_strerror(pamh, retval)); 109 int make_remark( pam_handle_t * pamh, unsigned int ctrl argument 121 return converse(pamh, ctrl, 1, pmsg, &resp); 222 void _cleanup( pam_handle_t * pamh, void *x, int error_status ) argument 258 void _cleanup_failures( pam_handle_t * pamh, void *fl, int err ) argument 284 pam_get_item( pamh, PAM_SERVICE, (const void **) &service ); 308 int _smb_verify_password( pam_handle_t * pamh, SAM_ACCOUN argument 466 _smb_read_password( pam_handle_t * pamh, unsigned int ctrl, const char *comment, const char *prompt1, const char *prompt2, const char *data_name, char **pass ) argument 616 _pam_smb_approve_pass(pam_handle_t * pamh, unsigned int ctrl, const char *pass_old, const char *pass_new ) argument [all...] |
H A D | support.h | 29 extern int _smb_verify_password( pam_handle_t *pamh , SAM_ACCOUNT *sampass,
|
H A D | pam_smb_acct.c | 42 int pam_sm_acct_mgmt( pam_handle_t *pamh, int flags, argument 61 retval = pam_get_user( pamh, &name, "Username: " ); 95 make_remark( pamh, ctrl, PAM_ERROR_MSG
|
H A D | pam_smb_passwd.c | 41 int smb_update_db( pam_handle_t *pamh, int ctrl, const char *user, const char *pass_new ) argument 57 make_remark( pamh, ctrl, PAM_ERROR_MSG, err_str ); 65 make_remark( pamh, ctrl, PAM_TEXT_INFO, msg_str ); 91 int pam_sm_chauthtok(pam_handle_t *pamh, int flags, argument 118 retval = pam_get_user( pamh, &user, "Username: " ); 184 retval = _smb_read_password( pamh, ctrl, Announce, "Current SMB password: ", 198 retval = _smb_verify_password( pamh, sampass, pass_old, ctrl ); 223 retval = pam_get_item( pamh, PAM_OLDAUTHTOK, 226 retval = pam_get_data( pamh, _SMB_OLD_AUTHTOK, 251 retval = _smb_read_password( pamh, ctr [all...] |
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/timemachine/netatalk-2.2.0/etc/uams/ |
H A D | uams_pam.c | 57 static pam_handle_t *pamh = NULL; variable 168 &pamh); 172 pam_set_item(pamh, PAM_TTY, "afpd"); 173 pam_set_item(pamh, PAM_RHOST, hostname); 175 PAM_error = pam_authenticate(pamh,0); 182 PAM_error = pam_acct_mgmt(pamh, 0); 197 PAM_error = pam_setcred(pamh, PAM_CRED_ESTABLISH); 201 PAM_error = pam_open_session(pamh, 0); 213 pam_end(pamh, PAM_error); 214 pamh [all...] |
H A D | uams_dhx_pam.c | 74 static pam_handle_t *pamh = NULL; variable 480 &pamh); 484 pam_strerror(pamh,PAM_error)); 490 pam_set_item(pamh, PAM_TTY, "afpd"); 491 pam_set_item(pamh, PAM_RHOST, hostname); 492 PAM_error = pam_authenticate(pamh,0); 498 pam_strerror(pamh, PAM_error)); 503 PAM_error = pam_acct_mgmt(pamh, 0); 507 pam_strerror(pamh, PAM_error)); 522 PAM_error = pam_setcred(pamh, PAM_CRED_ESTABLIS [all...] |
H A D | uams_dhx2_pam.c | 57 static pam_handle_t *pamh = NULL; variable 601 PAM_error = pam_start("netatalk", PAM_username, &PAM_conversation, &pamh); 604 pam_strerror(pamh,PAM_error)); 609 pam_set_item(pamh, PAM_TTY, "afpd"); 610 pam_set_item(pamh, PAM_RHOST, hostname); 611 PAM_error = pam_authenticate(pamh, 0); 616 pam_strerror(pamh, PAM_error)); 620 PAM_error = pam_acct_mgmt(pamh, 0); 623 pam_strerror(pamh, PAM_error)); 637 PAM_error = pam_setcred(pamh, PAM_CRED_ESTABLIS [all...] |
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/zebra/vtysh/ |
H A D | vtysh_user.c | 46 pam_handle_t *pamh = NULL; local 49 ret = pam_start("zebra", user, &conv, &pamh); 54 ret = pam_authenticate (pamh, 0); 60 ret = pam_acct_mgmt (pamh, 0); 76 if (pam_end (pamh, ret) != PAM_SUCCESS) 78 pamh = NULL;
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/source/nsswitch/ |
H A D | pam_winbind.c | 64 static int converse(pam_handle_t *pamh, int nargs, argument 71 retval = pam_get_item(pamh, PAM_CONV, (const void **) &conv ) ; 81 static int _make_remark(pam_handle_t * pamh, int type, const char *text) argument 93 retval = converse(pamh, 1, pmsg, &resp); 300 static int _winbind_read_password(pam_handle_t * pamh 329 retval = pam_get_item(pamh, authtok_flag, (const void **) &item); 381 retval = converse(pamh, i, pmsg, &resp); 398 _make_remark(pamh ,PAM_ERROR_MSG, MISTYPED_PASS); 430 retval = pam_set_item(pamh, authtok_flag, token); 433 || (retval = pam_get_item(pamh, authtok_fla 449 pam_sm_authenticate(pam_handle_t *pamh, int flags, int argc, const char **argv) argument 513 pam_sm_setcred(pam_handle_t *pamh, int flags, int argc, const char **argv) argument 524 pam_sm_acct_mgmt(pam_handle_t *pamh, int flags, int argc, const char **argv) argument 570 pam_sm_open_session(pam_handle_t *pamh, int flags, int argc, const char **argv) argument 580 pam_sm_close_session(pam_handle_t *pamh, int flags, int argc, const char **argv) argument 592 pam_sm_chauthtok(pam_handle_t * pamh, int flags, int argc, const char **argv) argument [all...] |
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/bftpd-1.6.6/ |
H A D | login.h | 5 extern pam_handle_t *pamh;
|
H A D | login.c | 53 pam_handle_t *pamh = NULL; variable 742 (pam_handle_t **) & pamh); 747 pam_strerror (pamh, retval)); 750 pam_fail_delay (pamh, 0); 751 retval = pam_authenticate (pamh, 0); 753 retval = pam_acct_mgmt (pamh, 0); 755 pam_open_session (pamh, 0); 764 if (pamh) 766 pam_close_session (pamh, 0); 767 pam_end (pamh, [all...] |
/netgear-WNDR4500-V1.0.1.40_1.0.68/src/router/busybox-1.x/loginutils/ |
H A D | login.c | 240 USE_PAM(pam_handle_t *pamh;) 296 pamret = pam_start("login", username, &conv, &pamh); 302 pamret = pam_set_item(pamh, PAM_TTY, short_tty); 307 pamret = pam_authenticate(pamh, 0); 317 pamret = pam_acct_mgmt(pamh, 0); 327 if (pam_get_item(pamh, PAM_USER, (void*)&pamuser) != PAM_SUCCESS) { 340 bb_error_msg("%s failed: %s (%d)", failed_msg, pam_strerror(pamh, pamret), pamret);
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/ppp/pppd/ |
H A D | auth.c | 1029 static pam_handle_t *pamh = NULL;
variable 1106 pam_error = pam_start ("ppp", user, &PAM_conversation, &pamh);
1108 *msg = (char *) pam_strerror (pamh, pam_error);
1119 pam_set_item (pamh, PAM_TTY, devnam); /* this might be useful to some modules */
1124 pam_error = pam_authenticate (pamh, PAM_SILENT);
1126 pam_error = pam_acct_mgmt (pamh, PAM_SILENT);
1128 pam_open_session (pamh, PAM_SILENT);
1131 *msg = (char *) pam_strerror (pamh, pam_error);
1226 if (pamh != NULL) {
1227 pam_error = pam_close_session (pamh, PAM_SILEN [all...] |
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/ppp-2.4.4/pppd/ |
H A D | auth.c | 1492 static pam_handle_t *pamh = NULL; variable 1571 pam_error = pam_start ("ppp", user, &PAM_conversation, &pamh); 1573 *msg = (char *) pam_strerror (pamh, pam_error); 1584 pam_set_item (pamh, PAM_TTY, devnam); /* this might be useful to some modules */ 1589 pam_error = pam_authenticate (pamh, PAM_SILENT); 1591 pam_error = pam_acct_mgmt (pamh, PAM_SILENT); 1593 pam_error = pam_open_session (pamh, PAM_SILENT); 1596 *msg = (char *) pam_strerror (pamh, pam_error); 1690 if (pamh != NULL) { 1691 pam_error = pam_close_session (pamh, PAM_SILEN [all...] |