pamh 134 nsswitch/pam_winbind.c function " (flags: 0x%04x)", ctx->pamh, ctx->flags); \ pamh 141 nsswitch/pam_winbind.c function " returning %d (%s)", ctx->pamh, retval, \ pamh 169 nsswitch/pam_winbind.c static int _pam_get_item(const pam_handle_t *pamh, pamh 174 nsswitch/pam_winbind.c return pam_get_item(pamh, item_type, item); pamh 176 nsswitch/pam_winbind.c static int _pam_get_data(const pam_handle_t *pamh, pamh 181 nsswitch/pam_winbind.c return pam_get_data(pamh, module_data_name, data); pamh 187 nsswitch/pam_winbind.c static void _pam_log_int(const pam_handle_t *pamh, pamh 192 nsswitch/pam_winbind.c pam_vsyslog(pamh, err, format, args); pamh 195 nsswitch/pam_winbind.c static void _pam_log_int(const pam_handle_t *pamh, pamh 203 nsswitch/pam_winbind.c _pam_get_item(pamh, PAM_SERVICE, &service); pamh 233 nsswitch/pam_winbind.c _pam_log_int(r->pamh, err, format, args); pamh 236 nsswitch/pam_winbind.c static void __pam_log(const pam_handle_t *pamh, int ctrl, int err, const char *format, ...) PRINTF_ATTRIBUTE(4,5); pamh 237 nsswitch/pam_winbind.c static void __pam_log(const pam_handle_t *pamh, int ctrl, int err, const char *format, ...) pamh 246 nsswitch/pam_winbind.c _pam_log_int(pamh, err, format, args); pamh 286 nsswitch/pam_winbind.c _pam_log_int(r->pamh, err, format, args); pamh 289 nsswitch/pam_winbind.c static void __pam_log_debug(const pam_handle_t *pamh, int ctrl, int err, const char *format, ...) PRINTF_ATTRIBUTE(4,5); pamh 290 nsswitch/pam_winbind.c static void __pam_log_debug(const pam_handle_t *pamh, int ctrl, int err, const char *format, ...) pamh 299 nsswitch/pam_winbind.c _pam_log_int(pamh, err, format, args); pamh 310 nsswitch/pam_winbind.c pam_get_item(ctx->pamh, item_type, &data); pamh 312 nsswitch/pam_winbind.c pam_get_data(ctx->pamh, key, &data); pamh 319 nsswitch/pam_winbind.c ctx->pamh, type, key, (const char *)data, pamh 324 nsswitch/pam_winbind.c ctx->pamh, type, key, data); pamh 385 nsswitch/pam_winbind.c static int _pam_parse(const pam_handle_t *pamh, pamh 494 nsswitch/pam_winbind.c __pam_log(pamh, ctrl, LOG_ERR, pamh 525 nsswitch/pam_winbind.c static int _pam_winbind_init_context(pam_handle_t *pamh, pamh 544 nsswitch/pam_winbind.c r->pamh = pamh; pamh 548 nsswitch/pam_winbind.c r->ctrl = _pam_parse(pamh, flags, argc, argv, &r->dict); pamh 559 nsswitch/pam_winbind.c static void _pam_winbind_cleanup_func(pam_handle_t *pamh, pamh 563 nsswitch/pam_winbind.c int ctrl = _pam_parse(pamh, 0, 0, NULL, NULL); pamh 565 nsswitch/pam_winbind.c __pam_log_debug(pamh, ctrl, LOG_DEBUG, pamh 567 nsswitch/pam_winbind.c "(error_status = %d)", pamh, data, pamh 636 nsswitch/pam_winbind.c static int converse(const pam_handle_t *pamh, pamh 644 nsswitch/pam_winbind.c retval = _pam_get_item(pamh, PAM_CONV, &conv); pamh 673 nsswitch/pam_winbind.c retval = converse(ctx->pamh, 1, pmsg, &resp); pamh 818 nsswitch/pam_winbind.c ret = converse(ctx->pamh, 1, &pmsg, &resp); pamh 1255 nsswitch/pam_winbind.c ret = pam_putenv(ctx->pamh, var); pamh 1259 nsswitch/pam_winbind.c var, pam_strerror(ctx->pamh, ret)); pamh 1319 nsswitch/pam_winbind.c ret = pam_set_data(ctx->pamh, data_name, talloc_strdup(NULL, value), pamh 1324 nsswitch/pam_winbind.c data_name, pam_strerror(ctx->pamh, ret)); pamh 1359 nsswitch/pam_winbind.c static void _pam_free_data_info3(pam_handle_t *pamh) pamh 1361 nsswitch/pam_winbind.c pam_set_data(pamh, PAM_WINBIND_HOMEDIR, NULL, NULL); pamh 1362 nsswitch/pam_winbind.c pam_set_data(pamh, PAM_WINBIND_LOGONSCRIPT, NULL, NULL); pamh 1363 nsswitch/pam_winbind.c pam_set_data(pamh, PAM_WINBIND_LOGONSERVER, NULL, NULL); pamh 1364 nsswitch/pam_winbind.c pam_set_data(pamh, PAM_WINBIND_PROFILEPATH, NULL, NULL); pamh 1588 nsswitch/pam_winbind.c ret = pam_get_user(ctx->pamh, &username, NULL); pamh 2131 nsswitch/pam_winbind.c retval = _pam_get_item(ctx->pamh, authtok_flag, &item); pamh 2185 nsswitch/pam_winbind.c retval = converse(ctx->pamh, i, pmsg, &resp); pamh 2236 nsswitch/pam_winbind.c retval = pam_set_item(ctx->pamh, authtok_flag, token); pamh 2239 nsswitch/pam_winbind.c (retval = _pam_get_item(ctx->pamh, authtok_flag, &item)) != PAM_SUCCESS) { pamh 2461 nsswitch/pam_winbind.c static int _pam_delete_cred(pam_handle_t *pamh, int flags, pamh 2473 nsswitch/pam_winbind.c retval = _pam_winbind_init_context(pamh, flags, argc, argv, &ctx); pamh 2488 nsswitch/pam_winbind.c retval = pam_get_user(pamh, &user, _("Username: ")); pamh 2505 nsswitch/pam_winbind.c ccname = pam_getenv(pamh, "KRB5CCNAME"); pamh 2582 nsswitch/pam_winbind.c if ((ctx->ctrl & WINBIND_KRB5_AUTH) && pam_getenv(pamh, "KRB5CCNAME")) { pamh 2583 nsswitch/pam_winbind.c pam_putenv(pamh, "KRB5CCNAME"); pamh 2594 nsswitch/pam_winbind.c int pam_sm_authenticate(pam_handle_t *pamh, int flags, pamh 2608 nsswitch/pam_winbind.c retval = _pam_winbind_init_context(pamh, flags, argc, argv, &ctx); pamh 2616 nsswitch/pam_winbind.c retval = pam_get_user(pamh, &username, NULL); pamh 2706 nsswitch/pam_winbind.c pam_set_data(pamh, PAM_WINBIND_NEW_AUTHTOK_REQD, pamh 2718 nsswitch/pam_winbind.c pam_set_data(pamh, PAM_WINBIND_NEW_AUTHTOK_REQD_DURING_AUTH, pamh 2727 nsswitch/pam_winbind.c pam_set_item (pamh, PAM_USER, username_ret); pamh 2738 nsswitch/pam_winbind.c pam_set_data(pamh, PAM_WINBIND_NEW_AUTHTOK_REQD, NULL, NULL); pamh 2742 nsswitch/pam_winbind.c _pam_free_data_info3(pamh); pamh 2753 nsswitch/pam_winbind.c int pam_sm_setcred(pam_handle_t *pamh, int flags, pamh 2759 nsswitch/pam_winbind.c ret = _pam_winbind_init_context(pamh, flags, argc, argv, &ctx); pamh 2769 nsswitch/pam_winbind.c ret = _pam_delete_cred(pamh, flags, argc, argv); pamh 2805 nsswitch/pam_winbind.c int pam_sm_acct_mgmt(pam_handle_t *pamh, int flags, pamh 2813 nsswitch/pam_winbind.c ret = _pam_winbind_init_context(pamh, flags, argc, argv, &ctx); pamh 2822 nsswitch/pam_winbind.c ret = pam_get_user(pamh, &username, NULL); pamh 2848 nsswitch/pam_winbind.c pam_get_data(pamh, PAM_WINBIND_NEW_AUTHTOK_REQD, pamh 2902 nsswitch/pam_winbind.c int pam_sm_open_session(pam_handle_t *pamh, int flags, pamh 2908 nsswitch/pam_winbind.c ret = _pam_winbind_init_context(pamh, flags, argc, argv, &ctx); pamh 2928 nsswitch/pam_winbind.c int pam_sm_close_session(pam_handle_t *pamh, int flags, pamh 2934 nsswitch/pam_winbind.c ret = _pam_winbind_init_context(pamh, flags, argc, argv, &ctx); pamh 2977 nsswitch/pam_winbind.c _pam_get_data(ctx->pamh, PAM_WINBIND_NEW_AUTHTOK_REQD_DURING_AUTH, pamh 2979 nsswitch/pam_winbind.c pam_set_data(ctx->pamh, PAM_WINBIND_NEW_AUTHTOK_REQD_DURING_AUTH, pamh 3000 nsswitch/pam_winbind.c int pam_sm_chauthtok(pam_handle_t * pamh, int flags, pamh 3019 nsswitch/pam_winbind.c ret = _pam_winbind_init_context(pamh, flags, argc, argv, &ctx); pamh 3034 nsswitch/pam_winbind.c ret = pam_get_user(pamh, &user, _("Username: ")); pamh 3110 nsswitch/pam_winbind.c pam_set_data(pamh, PAM_WINBIND_PWD_LAST_SET, pamh 3113 nsswitch/pam_winbind.c ret = pam_set_item(pamh, PAM_OLDAUTHTOK, pamh 3132 nsswitch/pam_winbind.c ret = _pam_get_item(pamh, PAM_OLDAUTHTOK, &pass_old); pamh 3182 nsswitch/pam_winbind.c _pam_get_data(pamh, PAM_WINBIND_PWD_LAST_SET, pamh 3249 nsswitch/pam_winbind.c pam_set_item(pamh, PAM_USER, pamh 166 nsswitch/pam_winbind.h pam_handle_t *pamh; pamh 72 source3/auth/pampass.c static bool smb_pam_error_handler(pam_handle_t *pamh, int pam_error, const char *msg, int dbglvl) pamh 77 source3/auth/pampass.c msg, pam_strerror(pamh, pam_error))); pamh 89 source3/auth/pampass.c static bool smb_pam_nt_status_error_handler(pam_handle_t *pamh, int pam_error, pamh 95 source3/auth/pampass.c if (smb_pam_error_handler(pamh, pam_error, msg, dbglvl)) pamh 441 source3/auth/pampass.c static bool smb_pam_end(pam_handle_t *pamh, struct pam_conv *smb_pam_conv_ptr) pamh 447 source3/auth/pampass.c if( pamh != NULL ) { pamh 448 source3/auth/pampass.c pam_error = pam_end(pamh, 0); pamh 449 source3/auth/pampass.c if(smb_pam_error_handler(pamh, pam_error, "End Cleanup Failed", 2) == True) { pamh 462 source3/auth/pampass.c static bool smb_pam_start(pam_handle_t **pamh, const char *user, const char *rhost, struct pam_conv *pconv) pamh 470 source3/auth/pampass.c *pamh = (pam_handle_t *)NULL; pamh 474 source3/auth/pampass.c pam_error = pam_start("samba", user, pconv, pamh); pamh 475 source3/auth/pampass.c if( !smb_pam_error_handler(*pamh, pam_error, "Init Failed", 0)) { pamh 476 source3/auth/pampass.c *pamh = (pam_handle_t *)NULL; pamh 490 source3/auth/pampass.c pam_error = pam_set_item(*pamh, PAM_RHOST, our_rhost); pamh 491 source3/auth/pampass.c if(!smb_pam_error_handler(*pamh, pam_error, "set rhost failed", 0)) { pamh 492 source3/auth/pampass.c smb_pam_end(*pamh, pconv); pamh 493 source3/auth/pampass.c *pamh = (pam_handle_t *)NULL; pamh 499 source3/auth/pampass.c pam_error = pam_set_item(*pamh, PAM_TTY, "samba"); pamh 500 source3/auth/pampass.c if (!smb_pam_error_handler(*pamh, pam_error, "set tty failed", 0)) { pamh 501 source3/auth/pampass.c smb_pam_end(*pamh, pconv); pamh 502 source3/auth/pampass.c *pamh = (pam_handle_t *)NULL; pamh 513 source3/auth/pampass.c static NTSTATUS smb_pam_auth(pam_handle_t *pamh, const char *user) pamh 524 source3/auth/pampass.c pam_error = pam_authenticate(pamh, PAM_SILENT | lp_null_passwords() ? 0 : PAM_DISALLOW_NULL_AUTHTOK); pamh 552 source3/auth/pampass.c smb_pam_nt_status_error_handler(pamh, pam_error, "Authentication Failure", 2, &nt_status); pamh 559 source3/auth/pampass.c static NTSTATUS smb_pam_account(pam_handle_t *pamh, const char * user) pamh 565 source3/auth/pampass.c pam_error = pam_acct_mgmt(pamh, PAM_SILENT); /* Is user account enabled? */ pamh 590 source3/auth/pampass.c smb_pam_nt_status_error_handler(pamh, pam_error, "Account Check Failed", 2, &nt_status); pamh 598 source3/auth/pampass.c static NTSTATUS smb_pam_setcred(pam_handle_t *pamh, const char * user) pamh 609 source3/auth/pampass.c pam_error = pam_setcred(pamh, (PAM_ESTABLISH_CRED|PAM_SILENT)); pamh 631 source3/auth/pampass.c smb_pam_nt_status_error_handler(pamh, pam_error, "Set Credential Failure", 2, &nt_status); pamh 638 source3/auth/pampass.c static bool smb_internal_pam_session(pam_handle_t *pamh, const char *user, const char *tty, bool flag) pamh 644 source3/auth/pampass.c pam_error = pam_set_item(pamh, PAM_TTY, tty); pamh 645 source3/auth/pampass.c if (!smb_pam_error_handler(pamh, pam_error, "set tty failed", 0)) pamh 650 source3/auth/pampass.c pam_error = pam_open_session(pamh, PAM_SILENT); pamh 651 source3/auth/pampass.c if (!smb_pam_error_handler(pamh, pam_error, "session setup failed", 0)) pamh 654 source3/auth/pampass.c pam_setcred(pamh, (PAM_DELETE_CRED|PAM_SILENT)); /* We don't care if this fails */ pamh 655 source3/auth/pampass.c pam_error = pam_close_session(pamh, PAM_SILENT); /* This will probably pick up the error anyway */ pamh 656 source3/auth/pampass.c if (!smb_pam_error_handler(pamh, pam_error, "session close failed", 0)) pamh 666 source3/auth/pampass.c static bool smb_pam_chauthtok(pam_handle_t *pamh, const char * user) pamh 672 source3/auth/pampass.c pam_error = pam_chauthtok(pamh, PAM_SILENT); /* Change Password */ pamh 708 source3/auth/pampass.c if(!smb_pam_error_handler(pamh, pam_error, "Password Change Failed", 2)) { pamh 722 source3/auth/pampass.c pam_handle_t *pamh = NULL; pamh 733 source3/auth/pampass.c if (!smb_pam_start(&pamh, user, rhost, pconv)) pamh 736 source3/auth/pampass.c if (!smb_internal_pam_session(pamh, user, tty, True)) { pamh 737 source3/auth/pampass.c smb_pam_end(pamh, pconv); pamh 741 source3/auth/pampass.c return smb_pam_end(pamh, pconv); pamh 750 source3/auth/pampass.c pam_handle_t *pamh = NULL; pamh 761 source3/auth/pampass.c if (!smb_pam_start(&pamh, user, rhost, pconv)) pamh 764 source3/auth/pampass.c if (!smb_internal_pam_session(pamh, user, tty, False)) { pamh 765 source3/auth/pampass.c smb_pam_end(pamh, pconv); pamh 769 source3/auth/pampass.c return smb_pam_end(pamh, pconv); pamh 779 source3/auth/pampass.c pam_handle_t *pamh = NULL; pamh 790 source3/auth/pampass.c if (!smb_pam_start(&pamh, user, NULL, pconv)) pamh 793 source3/auth/pampass.c if (!NT_STATUS_IS_OK(nt_status = smb_pam_account(pamh, user))) pamh 796 source3/auth/pampass.c smb_pam_end(pamh, pconv); pamh 806 source3/auth/pampass.c pam_handle_t *pamh = NULL; pamh 819 source3/auth/pampass.c if (!smb_pam_start(&pamh, user, NULL, pconv)) pamh 822 source3/auth/pampass.c if (!NT_STATUS_IS_OK(nt_status = smb_pam_auth(pamh, user))) { pamh 824 source3/auth/pampass.c smb_pam_end(pamh, pconv); pamh 828 source3/auth/pampass.c if (!NT_STATUS_IS_OK(nt_status = smb_pam_account(pamh, user))) { pamh 830 source3/auth/pampass.c smb_pam_end(pamh, pconv); pamh 834 source3/auth/pampass.c if (!NT_STATUS_IS_OK(nt_status = smb_pam_setcred(pamh, user))) { pamh 836 source3/auth/pampass.c smb_pam_end(pamh, pconv); pamh 840 source3/auth/pampass.c smb_pam_end(pamh, pconv); pamh 852 source3/auth/pampass.c pam_handle_t *pamh = NULL; pamh 857 source3/auth/pampass.c if(!smb_pam_start(&pamh, user, NULL, pconv)) pamh 860 source3/auth/pampass.c if (!smb_pam_chauthtok(pamh, user)) { pamh 862 source3/auth/pampass.c smb_pam_end(pamh, pconv); pamh 866 source3/auth/pampass.c return smb_pam_end(pamh, pconv); pamh 49 source3/pam_smbpass/pam_smb_acct.c int pam_sm_acct_mgmt( pam_handle_t *pamh, int flags, pamh 63 source3/pam_smbpass/pam_smb_acct.c ctrl = set_ctrl(pamh, flags, argc, argv ); pamh 67 source3/pam_smbpass/pam_smb_acct.c retval = pam_get_user( pamh, &name, "Username: " ); pamh 70 source3/pam_smbpass/pam_smb_acct.c _log_err(pamh, LOG_DEBUG, "acct: could not identify user" ); pamh 75 source3/pam_smbpass/pam_smb_acct.c _log_err(pamh, LOG_DEBUG, "acct: username [%s] obtained", name ); pamh 79 source3/pam_smbpass/pam_smb_acct.c _log_err(pamh, LOG_DEBUG, "Cannot access samba password database, not running as root."); pamh 87 source3/pam_smbpass/pam_smb_acct.c _log_err(pamh, LOG_ALERT, "Cannot access samba password database" ); pamh 101 source3/pam_smbpass/pam_smb_acct.c _log_err(pamh, LOG_DEBUG, "acct: could not identify user"); pamh 114 source3/pam_smbpass/pam_smb_acct.c _log_err(pamh, LOG_DEBUG, pamh 117 source3/pam_smbpass/pam_smb_acct.c make_remark( pamh, ctrl, PAM_ERROR_MSG pamh 50 source3/pam_smbpass/pam_smb_auth.c pam_set_data( pamh, "smb_setcred_return" \ pamh 56 source3/pam_smbpass/pam_smb_auth.c static int _smb_add_user(pam_handle_t *pamh, unsigned int ctrl, pamh 69 source3/pam_smbpass/pam_smb_auth.c int pam_sm_authenticate(pam_handle_t *pamh, int flags, pamh 86 source3/pam_smbpass/pam_smb_auth.c ctrl = set_ctrl(pamh, flags, argc, argv); pamh 98 source3/pam_smbpass/pam_smb_auth.c retval = pam_get_user( pamh, &name, "Username: " ); pamh 101 source3/pam_smbpass/pam_smb_auth.c _log_err(pamh, LOG_DEBUG, "auth: could not identify user"); pamh 106 source3/pam_smbpass/pam_smb_auth.c _log_err(pamh, LOG_DEBUG, "username [%s] obtained", name ); pamh 110 source3/pam_smbpass/pam_smb_auth.c _log_err(pamh, LOG_DEBUG, "Cannot access samba password database, not running as root."); pamh 116 source3/pam_smbpass/pam_smb_auth.c _log_err(pamh, LOG_ALERT, "Cannot access samba password database" ); pamh 123 source3/pam_smbpass/pam_smb_auth.c _log_err(pamh, LOG_ALERT, "Cannot talloc a samu struct" ); pamh 131 source3/pam_smbpass/pam_smb_auth.c retval = _smb_add_user(pamh, ctrl, name, sampass, found); pamh 137 source3/pam_smbpass/pam_smb_auth.c _log_err(pamh, LOG_ALERT, "Failed to find entry for user %s.", name); pamh 154 source3/pam_smbpass/pam_smb_auth.c retval = _smb_read_password(pamh, ctrl, NULL, "Password: ", NULL, _SMB_AUTHTOK, &p); pamh 156 source3/pam_smbpass/pam_smb_auth.c _log_err(pamh,LOG_CRIT, "auth: no password provided for [%s]", name); pamh 163 source3/pam_smbpass/pam_smb_auth.c retval = _smb_verify_password( pamh, sampass, p, ctrl ); pamh 174 source3/pam_smbpass/pam_smb_auth.c int pam_sm_setcred(pam_handle_t *pamh, int flags, pamh 181 source3/pam_smbpass/pam_smb_auth.c _pam_get_data(pamh, "smb_setcred_return", &pretval); pamh 186 source3/pam_smbpass/pam_smb_auth.c pam_set_data(pamh, "smb_setcred_return", NULL, NULL); pamh 192 source3/pam_smbpass/pam_smb_auth.c static int _smb_add_user(pam_handle_t *pamh, unsigned int ctrl, pamh 201 source3/pam_smbpass/pam_smb_auth.c retval = _pam_get_item( pamh, PAM_AUTHTOK, &pass ); pamh 204 source3/pam_smbpass/pam_smb_auth.c _log_err(pamh, LOG_ALERT pamh 216 source3/pam_smbpass/pam_smb_auth.c make_remark(pamh, ctrl, PAM_ERROR_MSG, err_str ); pamh 218 source3/pam_smbpass/pam_smb_auth.c make_remark(pamh, ctrl, PAM_TEXT_INFO, msg_str ); pamh 231 source3/pam_smbpass/pam_smb_auth.c make_remark(pamh, ctrl, PAM_ERROR_MSG, err_str ); pamh 233 source3/pam_smbpass/pam_smb_auth.c make_remark(pamh, ctrl, PAM_TEXT_INFO, msg_str ); pamh 48 source3/pam_smbpass/pam_smb_passwd.c int smb_update_db( pam_handle_t *pamh, int ctrl, const char *user, const char *pass_new ) pamh 60 source3/pam_smbpass/pam_smb_passwd.c make_remark(pamh, ctrl, PAM_ERROR_MSG, err_str ); pamh 67 source3/pam_smbpass/pam_smb_passwd.c make_remark(pamh, ctrl, PAM_TEXT_INFO, msg_str ); pamh 95 source3/pam_smbpass/pam_smb_passwd.c int pam_sm_chauthtok(pam_handle_t *pamh, int flags, pamh 111 source3/pam_smbpass/pam_smb_passwd.c ctrl = set_ctrl(pamh, flags, argc, argv); pamh 118 source3/pam_smbpass/pam_smb_passwd.c retval = pam_get_user( pamh, &user, "Username: " ); pamh 121 source3/pam_smbpass/pam_smb_passwd.c _log_err(pamh, LOG_DEBUG, "password: could not identify user"); pamh 126 source3/pam_smbpass/pam_smb_passwd.c _log_err(pamh, LOG_DEBUG, "username [%s] obtained", user); pamh 130 source3/pam_smbpass/pam_smb_passwd.c _log_err(pamh, LOG_DEBUG, "Cannot access samba password database, not running as root."); pamh 139 source3/pam_smbpass/pam_smb_passwd.c _log_err(pamh, LOG_ALERT, "Cannot access samba password database" ); pamh 151 source3/pam_smbpass/pam_smb_passwd.c _log_err(pamh, LOG_ALERT, "Failed to find entry for user %s.", user); pamh 156 source3/pam_smbpass/pam_smb_passwd.c _log_err(pamh, LOG_DEBUG, "Located account for %s", user); pamh 182 source3/pam_smbpass/pam_smb_passwd.c _log_err(pamh, LOG_CRIT, "password: out of memory"); pamh 192 source3/pam_smbpass/pam_smb_passwd.c retval = _smb_read_password( pamh, ctrl, Announce, "Current SMB password: ", pamh 197 source3/pam_smbpass/pam_smb_passwd.c _log_err(pamh, LOG_NOTICE, pamh 206 source3/pam_smbpass/pam_smb_passwd.c retval = _smb_verify_password( pamh, sampass, pass_old, ctrl ); pamh 231 source3/pam_smbpass/pam_smb_passwd.c retval = _pam_get_item( pamh, PAM_OLDAUTHTOK, pamh 234 source3/pam_smbpass/pam_smb_passwd.c retval = _pam_get_data( pamh, _SMB_OLD_AUTHTOK, pamh 243 source3/pam_smbpass/pam_smb_passwd.c _log_err(pamh, LOG_NOTICE, "password: user not authenticated"); pamh 259 source3/pam_smbpass/pam_smb_passwd.c retval = _smb_read_password( pamh, ctrl pamh 268 source3/pam_smbpass/pam_smb_passwd.c _log_err(pamh, LOG_ALERT, pamh 287 source3/pam_smbpass/pam_smb_passwd.c retval = _pam_smb_approve_pass(pamh, ctrl, pass_old, pass_new); pamh 290 source3/pam_smbpass/pam_smb_passwd.c _log_err(pamh, LOG_NOTICE, "new password not acceptable"); pamh 304 source3/pam_smbpass/pam_smb_passwd.c retval = smb_update_db(pamh, ctrl, user, pass_new); pamh 310 source3/pam_smbpass/pam_smb_passwd.c _log_err(pamh, LOG_NOTICE, pamh 313 source3/pam_smbpass/pam_smb_passwd.c _log_err(pamh, LOG_NOTICE, "password for (%s) changed by (%s/%d)", pamh 316 source3/pam_smbpass/pam_smb_passwd.c _log_err(pamh, LOG_NOTICE, "password for (%s/%d) changed by (%s/%d)", pamh 320 source3/pam_smbpass/pam_smb_passwd.c _log_err(pamh, LOG_ERR, "password change failed for user %s", user); pamh 331 source3/pam_smbpass/pam_smb_passwd.c _log_err(pamh, LOG_ALERT, "password received unknown request"); pamh 82 source3/pam_smbpass/support.c void _log_err( pam_handle_t *pamh, int err, const char *format, ... ) pamh 87 source3/pam_smbpass/support.c pam_vsyslog(pamh, err, format, args); pamh 91 source3/pam_smbpass/support.c void _log_err( pam_handle_t *pamh, int err, const char *format, ... ) pamh 120 source3/pam_smbpass/support.c int converse( pam_handle_t * pamh, int ctrl, int nargs pamh 127 source3/pam_smbpass/support.c retval = _pam_get_item(pamh, PAM_CONV, &conv); pamh 134 source3/pam_smbpass/support.c _log_err(pamh, LOG_DEBUG, "conversation failure [%s]" pamh 135 source3/pam_smbpass/support.c ,pam_strerror(pamh, retval)); pamh 138 source3/pam_smbpass/support.c _log_err(pamh, LOG_ERR, "couldn't obtain coversation function [%s]" pamh 139 source3/pam_smbpass/support.c ,pam_strerror(pamh, retval)); pamh 145 source3/pam_smbpass/support.c int make_remark( pam_handle_t * pamh, unsigned int ctrl pamh 157 source3/pam_smbpass/support.c return converse(pamh, ctrl, 1, pmsg, &resp); pamh 165 source3/pam_smbpass/support.c int set_ctrl( pam_handle_t *pamh, int flags, int argc, const char **argv ) pamh 207 source3/pam_smbpass/support.c _log_err(pamh, LOG_ERR, "Error loading service file %s", service_file); pamh 230 source3/pam_smbpass/support.c _log_err(pamh, LOG_ERR, "unrecognized option [%s]", *argv); pamh 258 source3/pam_smbpass/support.c void _cleanup( pam_handle_t * pamh, void *x, int error_status ) pamh 269 source3/pam_smbpass/support.c char * smbpXstrDup( pam_handle_t *pamh, const char *x ) pamh 279 source3/pam_smbpass/support.c _log_err(pamh, LOG_CRIT, "out of memory in smbpXstrDup"); pamh 294 source3/pam_smbpass/support.c void _cleanup_failures( pam_handle_t * pamh, void *fl, int err ) pamh 320 source3/pam_smbpass/support.c _pam_get_item( pamh, PAM_SERVICE, &service ); pamh 321 source3/pam_smbpass/support.c _log_err(pamh, LOG_NOTICE pamh 330 source3/pam_smbpass/support.c _log_err(pamh, LOG_ALERT pamh 344 source3/pam_smbpass/support.c int _smb_verify_password( pam_handle_t * pamh, struct samu *sampass, pamh 360 source3/pam_smbpass/support.c (void) pam_fail_delay( pamh, 1000000 ); /* 1 sec delay for on failure */ pamh 366 source3/pam_smbpass/support.c _log_err(pamh, LOG_DEBUG, "user %s has null SMB password", name); pamh 375 source3/pam_smbpass/support.c _pam_get_item( pamh, PAM_SERVICE, &service ); pamh 376 source3/pam_smbpass/support.c _log_err(pamh, LOG_NOTICE, "failed auth request by %s for service %s as %s", pamh 384 source3/pam_smbpass/support.c _log_err(pamh, LOG_CRIT, "no memory for data-name" ); pamh 404 source3/pam_smbpass/support.c pam_set_data(pamh, data_name, NULL, _cleanup_failures); pamh 410 source3/pam_smbpass/support.c _pam_get_item( pamh, PAM_SERVICE, &service ); pamh 423 source3/pam_smbpass/support.c _pam_get_data(pamh, data_name, &old); pamh 431 source3/pam_smbpass/support.c _log_err(pamh, LOG_NOTICE, pamh 438 source3/pam_smbpass/support.c _log_err(pamh, LOG_NOTICE, pamh 443 source3/pam_smbpass/support.c newauth->user = smbpXstrDup( pamh, name ); pamh 444 source3/pam_smbpass/support.c newauth->agent = smbpXstrDup( pamh, uidtoname( getuid() ) ); pamh 445 source3/pam_smbpass/support.c pam_set_data( pamh, data_name, newauth, _cleanup_failures ); pamh 448 source3/pam_smbpass/support.c _log_err(pamh, LOG_CRIT, "no memory for failure recorder" ); pamh 449 source3/pam_smbpass/support.c _log_err(pamh, LOG_NOTICE, pamh 455 source3/pam_smbpass/support.c _log_err(pamh, LOG_NOTICE, pamh 503 source3/pam_smbpass/support.c int _smb_read_password( pam_handle_t * pamh, unsigned int ctrl, pamh 528 source3/pam_smbpass/support.c retval = _pam_get_item( pamh, authtok_flag, &item ); pamh 531 source3/pam_smbpass/support.c _log_err(pamh, LOG_ALERT, pamh 576 source3/pam_smbpass/support.c retval = converse( pamh, ctrl, i, pmsg, &resp ); pamh 584 source3/pam_smbpass/support.c token = smbpXstrDup(pamh, resp[j++].resp); pamh 591 source3/pam_smbpass/support.c make_remark( pamh, ctrl, PAM_ERROR_MSG pamh 596 source3/pam_smbpass/support.c _log_err(pamh, LOG_NOTICE, pamh 610 source3/pam_smbpass/support.c _log_err(pamh, LOG_DEBUG, "unable to obtain a password"); pamh 619 source3/pam_smbpass/support.c retval = pam_set_item( pamh, authtok_flag, (const void *)token ); pamh 622 source3/pam_smbpass/support.c || (retval = _pam_get_item( pamh, authtok_flag pamh 625 source3/pam_smbpass/support.c _log_err(pamh, LOG_CRIT, "error manipulating password"); pamh 634 source3/pam_smbpass/support.c retval = pam_set_data( pamh, data_name, (void *) token, _cleanup ); pamh 636 source3/pam_smbpass/support.c || (retval = _pam_get_data( pamh, data_name, &item )) pamh 639 source3/pam_smbpass/support.c _log_err(pamh, LOG_CRIT, "error manipulating password data [%s]", pamh 640 source3/pam_smbpass/support.c pam_strerror( pamh, retval )); pamh 654 source3/pam_smbpass/support.c int _pam_smb_approve_pass(pam_handle_t * pamh, pamh 664 source3/pam_smbpass/support.c _log_err(pamh, LOG_DEBUG, pamh 667 source3/pam_smbpass/support.c make_remark( pamh, ctrl, PAM_ERROR_MSG, pass_new == NULL ? pamh 679 source3/pam_smbpass/support.c int _pam_get_item(const pam_handle_t *pamh, pamh 684 source3/pam_smbpass/support.c return pam_get_item(pamh, item_type, item); pamh 687 source3/pam_smbpass/support.c int _pam_get_data(const pam_handle_t *pamh, pamh 692 source3/pam_smbpass/support.c return pam_get_data(pamh, module_data_name, data); pamh 29 source3/pam_smbpass/support.h extern int _smb_verify_password( pam_handle_t *pamh , struct samu *sampass, pamh 52 source3/pam_smbpass/support.h int _pam_get_item(const pam_handle_t *pamh, pamh 55 source3/pam_smbpass/support.h int _pam_get_data(const pam_handle_t *pamh, pamh 229 source4/auth/ntlm/auth_unix.c static NTSTATUS smb_pam_start(pam_handle_t **pamh, const char *account_name, const char *remote_host, struct pam_conv *pconv) pamh 239 source4/auth/ntlm/auth_unix.c pam_error = pam_start("samba", account_name, pconv, pamh); pamh 248 source4/auth/ntlm/auth_unix.c pam_error = pam_set_item(*pamh, PAM_RHOST, remote_host); pamh 253 source4/auth/ntlm/auth_unix.c pam_strerror(*pamh, pam_error))); pamh 256 source4/auth/ntlm/auth_unix.c pam_error = pam_end(*pamh, 0); pamh 268 source4/auth/ntlm/auth_unix.c pam_error = pam_set_item(*pamh, PAM_TTY, "samba"); pamh 273 source4/auth/ntlm/auth_unix.c pam_strerror(*pamh, pam_error))); pamh 276 source4/auth/ntlm/auth_unix.c pam_error = pam_end(*pamh, 0); pamh 291 source4/auth/ntlm/auth_unix.c static NTSTATUS smb_pam_end(pam_handle_t *pamh) pamh 295 source4/auth/ntlm/auth_unix.c if (pamh != NULL) { pamh 296 source4/auth/ntlm/auth_unix.c pam_error = pam_end(pamh, 0); pamh 313 source4/auth/ntlm/auth_unix.c static NTSTATUS smb_pam_auth(pam_handle_t *pamh, bool allow_null_passwords, const char *user) pamh 324 source4/auth/ntlm/auth_unix.c pam_error = pam_authenticate(pamh, PAM_SILENT | allow_null_passwords ? 0 : PAM_DISALLOW_NULL_AUTHTOK); pamh 358 source4/auth/ntlm/auth_unix.c static NTSTATUS smb_pam_account(pam_handle_t *pamh, const char * user) pamh 364 source4/auth/ntlm/auth_unix.c pam_error = pam_acct_mgmt(pamh, PAM_SILENT); /* Is user account enabled? */ pamh 396 source4/auth/ntlm/auth_unix.c static NTSTATUS smb_pam_setcred(pam_handle_t *pamh, const char * user) pamh 407 source4/auth/ntlm/auth_unix.c pam_error = pam_setcred(pamh, (PAM_ESTABLISH_CRED|PAM_SILENT)); pamh 437 source4/auth/ntlm/auth_unix.c pam_handle_t *pamh; pamh 461 source4/auth/ntlm/auth_unix.c nt_status = smb_pam_start(&pamh, user_info->mapped.account_name, user_info->remote_host ? user_info->remote_host->addr : NULL, pamconv); pamh 466 source4/auth/ntlm/auth_unix.c nt_status = smb_pam_auth(pamh, lp_null_passwords(lp_ctx), user_info->mapped.account_name); pamh 468 source4/auth/ntlm/auth_unix.c smb_pam_end(pamh); pamh 474 source4/auth/ntlm/auth_unix.c nt_status = smb_pam_account(pamh, user_info->mapped.account_name); pamh 476 source4/auth/ntlm/auth_unix.c smb_pam_end(pamh); pamh 480 source4/auth/ntlm/auth_unix.c nt_status = smb_pam_setcred(pamh, user_info->mapped.account_name); pamh 482 source4/auth/ntlm/auth_unix.c smb_pam_end(pamh); pamh 487 source4/auth/ntlm/auth_unix.c smb_pam_end(pamh);