/freebsd-10.0-release/contrib/openpam/lib/libpam/ |
H A D | pam_end.c | 56 pam_end(pam_handle_t *pamh, argument 63 if (pamh == NULL) 67 while ((dp = pamh->module_data) != NULL) { 69 (dp->cleanup)(pamh, dp->data, status); 70 pamh->module_data = dp->next; 76 while (pamh->env_count) { 77 --pamh->env_count; 78 FREE(pamh->env[pamh->env_count]); 80 FREE(pamh [all...] |
H A D | openpam_findenv.c | 55 openpam_findenv(pam_handle_t *pamh, argument 62 if (pamh == NULL) 64 for (i = 0; i < pamh->env_count; ++i) 65 if (strncmp(pamh->env[i], name, len) == 0 && 66 pamh->env[i][len] == '=')
|
H A D | pam_putenv.c | 57 pam_putenv(pam_handle_t *pamh, argument 64 if (pamh == NULL) 72 if ((i = openpam_findenv(pamh, namevalue, p - namevalue)) >= 0) { 75 FREE(pamh->env[i]); 76 pamh->env[i] = p; 81 if (pamh->env_count == pamh->env_size) { 82 env = realloc(pamh->env, 83 sizeof(char *) * (pamh->env_size * 2 + 1)); 86 pamh [all...] |
H A D | openpam_free_data.c | 56 openpam_free_data(pam_handle_t *pamh, argument 62 (void)pamh;
|
H A D | pam_acct_mgmt.c | 56 pam_acct_mgmt(pam_handle_t *pamh, argument 62 r = openpam_dispatch(pamh, PAM_SM_ACCT_MGMT, flags);
|
H A D | pam_authenticate.c | 56 pam_authenticate(pam_handle_t *pamh, argument 64 r = openpam_dispatch(pamh, PAM_SM_AUTHENTICATE, flags); 65 pam_set_item(pamh, PAM_AUTHTOK, NULL); 80 * associated with the pam context specified by the =pamh argument.
|
H A D | pam_chauthtok.c | 56 pam_chauthtok(pam_handle_t *pamh, argument 64 r = openpam_dispatch(pamh, PAM_SM_CHAUTHTOK, 67 r = openpam_dispatch(pamh, PAM_SM_CHAUTHTOK, 69 pam_set_item(pamh, PAM_OLDAUTHTOK, NULL); 70 pam_set_item(pamh, PAM_AUTHTOK, NULL); 85 * for the user associated with the pam context specified by the =pamh
|
H A D | pam_getenvlist.c | 57 pam_getenvlist(pam_handle_t *pamh) argument 63 if (pamh == NULL) 65 envlist = malloc(sizeof(char *) * (pamh->env_count + 1)); 68 pam_strerror(pamh, PAM_BUF_ERR)); 71 for (i = 0; i < pamh->env_count; ++i) { 72 if ((envlist[i] = strdup(pamh->env[i])) == NULL) { 79 pam_strerror(pamh, PAM_BUF_ERR)); 99 * environ = pam_getenvlist(pamh);
|
H A D | pam_get_authtok.c | 64 pam_get_authtok(pam_handle_t *pamh, argument 78 if (pamh == NULL || authtok == NULL) 87 r = pam_get_item(pamh, PAM_RHOST, &rhost); 89 r = pam_get_item(pamh, PAM_HOST, &lhost); 95 r = pam_get_item(pamh, PAM_OLDAUTHTOK, &oldauthtok); 110 if (openpam_get_option(pamh, "try_first_pass") || 111 openpam_get_option(pamh, "use_first_pass")) { 112 r = pam_get_item(pamh, item, &prevauthtok); 116 } else if (openpam_get_option(pamh, "use_first_pass")) { 121 if ((promptp = openpam_get_option(pamh, prompt_optio [all...] |
H A D | pam_get_data.c | 56 pam_get_data(const pam_handle_t *pamh, argument 63 if (pamh == NULL) 65 for (dp = pamh->module_data; dp != NULL; dp = dp->next) { 84 * context specified by the =pamh argument.
|
H A D | pam_get_item.c | 56 pam_get_item(const pam_handle_t *pamh, argument 62 if (pamh == NULL) 78 *item = pamh->item[item_type]; 96 * The item is retrieved from the PAM context specified by the =pamh
|
H A D | pam_get_user.c | 61 pam_get_user(pam_handle_t *pamh, argument 72 if (pamh == NULL || user == NULL) 74 r = pam_get_item(pamh, PAM_USER, (const void **)user); 78 if ((promptp = openpam_get_option(pamh, "user_prompt")) != NULL) 82 if (pam_get_item(pamh, PAM_USER_PROMPT, &promptp) && 90 r = openpam_subst(pamh, prompt_buf, &prompt_size, prompt); 93 r = pam_prompt(pamh, PAM_PROMPT_ECHO_ON, &resp, "%s", prompt); 96 r = pam_set_item(pamh, PAM_USER, resp); 100 r = pam_get_item(pamh, PAM_USER, (const void **)user);
|
H A D | pam_getenv.c | 57 pam_getenv(pam_handle_t *pamh, argument 64 if (pamh == NULL) 68 if ((i = openpam_findenv(pamh, name, strlen(name))) < 0) 70 for (str = pamh->env[i]; *str != '\0'; ++str) {
|
H A D | pam_setenv.c | 59 pam_setenv(pam_handle_t *pamh, argument 68 if (pamh == NULL) 76 if (!overwrite && openpam_findenv(pamh, name, strlen(name)) >= 0) 82 r = pam_putenv(pamh, env);
|
H A D | pam_close_session.c | 56 pam_close_session(pam_handle_t *pamh, argument 64 r = openpam_dispatch(pamh, PAM_SM_CLOSE_SESSION, flags);
|
H A D | pam_open_session.c | 56 pam_open_session(pam_handle_t *pamh, argument 64 r = openpam_dispatch(pamh, PAM_SM_OPEN_SESSION, flags);
|
H A D | pam_setcred.c | 56 pam_setcred(pam_handle_t *pamh, argument 66 r = openpam_dispatch(pamh, PAM_SM_SETCRED, flags);
|
H A D | pam_verror.c | 57 pam_verror(const pam_handle_t *pamh, argument 64 r = pam_vprompt(pamh, PAM_ERROR_MSG, &rsp, fmt, ap);
|
H A D | pam_vinfo.c | 57 pam_vinfo(const pam_handle_t *pamh, argument 64 r = pam_vprompt(pamh, PAM_TEXT_INFO, &rsp, fmt, ap);
|
/freebsd-10.0-release/contrib/openpam/modules/pam_deny/ |
H A D | pam_deny.c | 47 pam_sm_authenticate(pam_handle_t *pamh, int flags, argument 51 (void)pamh; 59 pam_sm_setcred(pam_handle_t *pamh, int flags, argument 63 (void)pamh; 71 pam_sm_acct_mgmt(pam_handle_t *pamh, int flags, argument 75 (void)pamh; 83 pam_sm_open_session(pam_handle_t *pamh, int flags, argument 87 (void)pamh; 95 pam_sm_close_session(pam_handle_t *pamh, int flags, argument 99 (void)pamh; 107 pam_sm_chauthtok(pam_handle_t *pamh, int flags, int argc, const char *argv[]) argument [all...] |
/freebsd-10.0-release/contrib/openpam/modules/pam_permit/ |
H A D | pam_permit.c | 47 pam_sm_authenticate(pam_handle_t *pamh, int flags, argument 51 (void)pamh; 59 pam_sm_setcred(pam_handle_t *pamh, int flags, argument 63 (void)pamh; 71 pam_sm_acct_mgmt(pam_handle_t *pamh, int flags, argument 75 (void)pamh; 83 pam_sm_open_session(pam_handle_t *pamh, int flags, argument 87 (void)pamh; 95 pam_sm_close_session(pam_handle_t *pamh, int flags, argument 99 (void)pamh; 107 pam_sm_chauthtok(pam_handle_t *pamh, int flags, int argc, const char *argv[]) argument [all...] |
/freebsd-10.0-release/lib/libpam/modules/pam_guest/ |
H A D | pam_guest.c | 69 pam_sm_authenticate(pam_handle_t *pamh, int flags __unused, argument 76 if (pam_get_user(pamh, &user, NULL) != PAM_SUCCESS || user == NULL) 80 if ((guests = openpam_get_option(pamh, "guests")) == NULL) 87 if (!openpam_get_option(pamh, "nopass")) { 88 err = pam_get_authtok(pamh, PAM_AUTHTOK, &authtok, NULL); 91 if (openpam_get_option(pamh, "pass_is_user") && 94 if (openpam_get_option(pamh, "pass_as_ruser")) 95 pam_set_item(pamh, PAM_RUSER, authtok); 100 pam_setenv(pamh, "GUEST", user, 1); 107 pam_sm_setcred(pam_handle_t * pamh __unuse [all...] |
/freebsd-10.0-release/contrib/openpam/bin/su/ |
H A D | su.c | 59 static pam_handle_t *pamh; variable 100 pam_start("su", user, &pamc, &pamh); 104 if ((pam_err = pam_set_item(pamh, PAM_RHOST, hostname)) != PAM_SUCCESS) 107 if ((pam_err = pam_set_item(pamh, PAM_RUSER, user)) != PAM_SUCCESS) 110 if ((pam_err = pam_set_item(pamh, PAM_TTY, tty)) != PAM_SUCCESS) 114 if ((pam_err = pam_authenticate(pamh, 0)) != PAM_SUCCESS) 116 if ((pam_err = pam_acct_mgmt(pamh, 0)) == PAM_NEW_AUTHTOK_REQD) 117 pam_err = pam_chauthtok(pamh, PAM_CHANGE_EXPIRED_AUTHTOK); 122 if ((pam_err = pam_setcred(pamh, PAM_ESTABLISH_CRED)) != PAM_SUCCESS) 126 if ((pam_err = pam_open_session(pamh, [all...] |
/freebsd-10.0-release/lib/libpam/modules/pam_group/ |
H A D | pam_group.c | 57 pam_sm_authenticate(pam_handle_t *pamh, int flags __unused, argument 68 if (pam_get_user(pamh, &user, NULL) != PAM_SUCCESS || 71 if (pwd->pw_uid != 0 && openpam_get_option(pamh, "root_only")) 75 local = openpam_get_option(pamh, "luser") ? 1 : 0; 76 remote = openpam_get_option(pamh, "ruser") ? 1 : 0; 88 if (pam_get_item(pamh, PAM_RUSER, &ruser) != PAM_SUCCESS || 94 if ((group = openpam_get_option(pamh, "group")) == NULL) 111 if (openpam_get_option(pamh, "deny")) 115 if (openpam_get_option(pamh, "deny")) 119 if (openpam_get_option(pamh, "fail_saf [all...] |
/freebsd-10.0-release/contrib/openpam/modules/pam_unix/ |
H A D | pam_unix.c | 66 pam_sm_authenticate(pam_handle_t *pamh, int flags, argument 84 if ((pam_err = pam_get_user(pamh, &user, NULL)) != PAM_SUCCESS) 91 pam_err = pam_get_item(pamh, PAM_CONV, (const void **)&conv); 100 pam_err = pam_get_authtok(pamh, PAM_AUTHTOK, 135 pam_sm_setcred(pam_handle_t *pamh, int flags, argument 139 (void)pamh; 147 pam_sm_acct_mgmt(pam_handle_t *pamh, int flags, argument 151 (void)pamh; 159 pam_sm_open_session(pam_handle_t *pamh, int flags, argument 163 (void)pamh; 171 pam_sm_close_session(pam_handle_t *pamh, int flags, int argc, const char *argv[]) argument 183 pam_sm_chauthtok(pam_handle_t *pamh, int flags, int argc, const char *argv[]) argument [all...] |