pamh              134 nsswitch/pam_winbind.c 			       function " (flags: 0x%04x)", ctx->pamh, ctx->flags); \
pamh              141 nsswitch/pam_winbind.c 			       function " returning %d (%s)", ctx->pamh, retval, \
pamh              169 nsswitch/pam_winbind.c static int _pam_get_item(const pam_handle_t *pamh,
pamh              174 nsswitch/pam_winbind.c 	return pam_get_item(pamh, item_type, item);
pamh              176 nsswitch/pam_winbind.c static int _pam_get_data(const pam_handle_t *pamh,
pamh              181 nsswitch/pam_winbind.c 	return pam_get_data(pamh, module_data_name, data);
pamh              187 nsswitch/pam_winbind.c static void _pam_log_int(const pam_handle_t *pamh,
pamh              192 nsswitch/pam_winbind.c 	pam_vsyslog(pamh, err, format, args);
pamh              195 nsswitch/pam_winbind.c static void _pam_log_int(const pam_handle_t *pamh,
pamh              203 nsswitch/pam_winbind.c 	_pam_get_item(pamh, PAM_SERVICE, &service);
pamh              233 nsswitch/pam_winbind.c 	_pam_log_int(r->pamh, err, format, args);
pamh              236 nsswitch/pam_winbind.c static void __pam_log(const pam_handle_t *pamh, int ctrl, int err, const char *format, ...) PRINTF_ATTRIBUTE(4,5);
pamh              237 nsswitch/pam_winbind.c static void __pam_log(const pam_handle_t *pamh, int ctrl, int err, const char *format, ...)
pamh              246 nsswitch/pam_winbind.c 	_pam_log_int(pamh, err, format, args);
pamh              286 nsswitch/pam_winbind.c 	_pam_log_int(r->pamh, err, format, args);
pamh              289 nsswitch/pam_winbind.c static void __pam_log_debug(const pam_handle_t *pamh, int ctrl, int err, const char *format, ...) PRINTF_ATTRIBUTE(4,5);
pamh              290 nsswitch/pam_winbind.c static void __pam_log_debug(const pam_handle_t *pamh, int ctrl, int err, const char *format, ...)
pamh              299 nsswitch/pam_winbind.c 	_pam_log_int(pamh, err, format, args);
pamh              310 nsswitch/pam_winbind.c 		pam_get_item(ctx->pamh, item_type, &data);
pamh              312 nsswitch/pam_winbind.c 		pam_get_data(ctx->pamh, key, &data);
pamh              319 nsswitch/pam_winbind.c 				       ctx->pamh, type, key, (const char *)data,
pamh              324 nsswitch/pam_winbind.c 				       ctx->pamh, type, key, data);
pamh              385 nsswitch/pam_winbind.c static int _pam_parse(const pam_handle_t *pamh,
pamh              494 nsswitch/pam_winbind.c 			__pam_log(pamh, ctrl, LOG_ERR,
pamh              525 nsswitch/pam_winbind.c static int _pam_winbind_init_context(pam_handle_t *pamh,
pamh              544 nsswitch/pam_winbind.c 	r->pamh = pamh;
pamh              548 nsswitch/pam_winbind.c 	r->ctrl = _pam_parse(pamh, flags, argc, argv, &r->dict);
pamh              559 nsswitch/pam_winbind.c static void _pam_winbind_cleanup_func(pam_handle_t *pamh,
pamh              563 nsswitch/pam_winbind.c 	int ctrl = _pam_parse(pamh, 0, 0, NULL, NULL);
pamh              565 nsswitch/pam_winbind.c 		__pam_log_debug(pamh, ctrl, LOG_DEBUG,
pamh              567 nsswitch/pam_winbind.c 			       "(error_status = %d)", pamh, data,
pamh              636 nsswitch/pam_winbind.c static int converse(const pam_handle_t *pamh,
pamh              644 nsswitch/pam_winbind.c 	retval = _pam_get_item(pamh, PAM_CONV, &conv);
pamh              673 nsswitch/pam_winbind.c 	retval = converse(ctx->pamh, 1, pmsg, &resp);
pamh              818 nsswitch/pam_winbind.c 	ret = converse(ctx->pamh, 1, &pmsg, &resp);
pamh             1255 nsswitch/pam_winbind.c 	ret = pam_putenv(ctx->pamh, var);
pamh             1259 nsswitch/pam_winbind.c 			 var, pam_strerror(ctx->pamh, ret));
pamh             1319 nsswitch/pam_winbind.c 	ret = pam_set_data(ctx->pamh, data_name, talloc_strdup(NULL, value),
pamh             1324 nsswitch/pam_winbind.c 			       data_name, pam_strerror(ctx->pamh, ret));
pamh             1359 nsswitch/pam_winbind.c static void _pam_free_data_info3(pam_handle_t *pamh)
pamh             1361 nsswitch/pam_winbind.c 	pam_set_data(pamh, PAM_WINBIND_HOMEDIR, NULL, NULL);
pamh             1362 nsswitch/pam_winbind.c 	pam_set_data(pamh, PAM_WINBIND_LOGONSCRIPT, NULL, NULL);
pamh             1363 nsswitch/pam_winbind.c 	pam_set_data(pamh, PAM_WINBIND_LOGONSERVER, NULL, NULL);
pamh             1364 nsswitch/pam_winbind.c 	pam_set_data(pamh, PAM_WINBIND_PROFILEPATH, NULL, NULL);
pamh             1588 nsswitch/pam_winbind.c 	ret = pam_get_user(ctx->pamh, &username, NULL);
pamh             2131 nsswitch/pam_winbind.c 		retval = _pam_get_item(ctx->pamh, authtok_flag, &item);
pamh             2185 nsswitch/pam_winbind.c 		retval = converse(ctx->pamh, i, pmsg, &resp);
pamh             2236 nsswitch/pam_winbind.c 	retval = pam_set_item(ctx->pamh, authtok_flag, token);
pamh             2239 nsswitch/pam_winbind.c 	    (retval = _pam_get_item(ctx->pamh, authtok_flag, &item)) != PAM_SUCCESS) {
pamh             2461 nsswitch/pam_winbind.c static int _pam_delete_cred(pam_handle_t *pamh, int flags,
pamh             2473 nsswitch/pam_winbind.c 	retval = _pam_winbind_init_context(pamh, flags, argc, argv, &ctx);
pamh             2488 nsswitch/pam_winbind.c 		retval = pam_get_user(pamh, &user, _("Username: "));
pamh             2505 nsswitch/pam_winbind.c 		ccname = pam_getenv(pamh, "KRB5CCNAME");
pamh             2582 nsswitch/pam_winbind.c 	if ((ctx->ctrl & WINBIND_KRB5_AUTH) && pam_getenv(pamh, "KRB5CCNAME")) {
pamh             2583 nsswitch/pam_winbind.c 		pam_putenv(pamh, "KRB5CCNAME");
pamh             2594 nsswitch/pam_winbind.c int pam_sm_authenticate(pam_handle_t *pamh, int flags,
pamh             2608 nsswitch/pam_winbind.c 	retval = _pam_winbind_init_context(pamh, flags, argc, argv, &ctx);
pamh             2616 nsswitch/pam_winbind.c 	retval = pam_get_user(pamh, &username, NULL);
pamh             2706 nsswitch/pam_winbind.c 		pam_set_data(pamh, PAM_WINBIND_NEW_AUTHTOK_REQD,
pamh             2718 nsswitch/pam_winbind.c 		pam_set_data(pamh, PAM_WINBIND_NEW_AUTHTOK_REQD_DURING_AUTH,
pamh             2727 nsswitch/pam_winbind.c 		pam_set_item (pamh, PAM_USER, username_ret);
pamh             2738 nsswitch/pam_winbind.c 		pam_set_data(pamh, PAM_WINBIND_NEW_AUTHTOK_REQD, NULL, NULL);
pamh             2742 nsswitch/pam_winbind.c 		_pam_free_data_info3(pamh);
pamh             2753 nsswitch/pam_winbind.c int pam_sm_setcred(pam_handle_t *pamh, int flags,
pamh             2759 nsswitch/pam_winbind.c 	ret = _pam_winbind_init_context(pamh, flags, argc, argv, &ctx);
pamh             2769 nsswitch/pam_winbind.c 			ret = _pam_delete_cred(pamh, flags, argc, argv);
pamh             2805 nsswitch/pam_winbind.c int pam_sm_acct_mgmt(pam_handle_t *pamh, int flags,
pamh             2813 nsswitch/pam_winbind.c 	ret = _pam_winbind_init_context(pamh, flags, argc, argv, &ctx);
pamh             2822 nsswitch/pam_winbind.c 	ret = pam_get_user(pamh, &username, NULL);
pamh             2848 nsswitch/pam_winbind.c 		pam_get_data(pamh, PAM_WINBIND_NEW_AUTHTOK_REQD,
pamh             2902 nsswitch/pam_winbind.c int pam_sm_open_session(pam_handle_t *pamh, int flags,
pamh             2908 nsswitch/pam_winbind.c 	ret = _pam_winbind_init_context(pamh, flags, argc, argv, &ctx);
pamh             2928 nsswitch/pam_winbind.c int pam_sm_close_session(pam_handle_t *pamh, int flags,
pamh             2934 nsswitch/pam_winbind.c 	ret = _pam_winbind_init_context(pamh, flags, argc, argv, &ctx);
pamh             2977 nsswitch/pam_winbind.c 	_pam_get_data(ctx->pamh, PAM_WINBIND_NEW_AUTHTOK_REQD_DURING_AUTH,
pamh             2979 nsswitch/pam_winbind.c 	pam_set_data(ctx->pamh, PAM_WINBIND_NEW_AUTHTOK_REQD_DURING_AUTH,
pamh             3000 nsswitch/pam_winbind.c int pam_sm_chauthtok(pam_handle_t * pamh, int flags,
pamh             3019 nsswitch/pam_winbind.c 	ret = _pam_winbind_init_context(pamh, flags, argc, argv, &ctx);
pamh             3034 nsswitch/pam_winbind.c 	ret = pam_get_user(pamh, &user, _("Username: "));
pamh             3110 nsswitch/pam_winbind.c 		pam_set_data(pamh, PAM_WINBIND_PWD_LAST_SET,
pamh             3113 nsswitch/pam_winbind.c 		ret = pam_set_item(pamh, PAM_OLDAUTHTOK,
pamh             3132 nsswitch/pam_winbind.c 		ret = _pam_get_item(pamh, PAM_OLDAUTHTOK, &pass_old);
pamh             3182 nsswitch/pam_winbind.c 		_pam_get_data(pamh, PAM_WINBIND_PWD_LAST_SET,
pamh             3249 nsswitch/pam_winbind.c 					pam_set_item(pamh, PAM_USER,
pamh              166 nsswitch/pam_winbind.h 	pam_handle_t *pamh;
pamh               72 source3/auth/pampass.c static bool smb_pam_error_handler(pam_handle_t *pamh, int pam_error, const char *msg, int dbglvl)
pamh               77 source3/auth/pampass.c 				msg, pam_strerror(pamh, pam_error)));
pamh               89 source3/auth/pampass.c static bool smb_pam_nt_status_error_handler(pam_handle_t *pamh, int pam_error,
pamh               95 source3/auth/pampass.c 	if (smb_pam_error_handler(pamh, pam_error, msg, dbglvl))
pamh              441 source3/auth/pampass.c static bool smb_pam_end(pam_handle_t *pamh, struct pam_conv *smb_pam_conv_ptr)
pamh              447 source3/auth/pampass.c 	if( pamh != NULL ) {
pamh              448 source3/auth/pampass.c 		pam_error = pam_end(pamh, 0);
pamh              449 source3/auth/pampass.c 		if(smb_pam_error_handler(pamh, pam_error, "End Cleanup Failed", 2) == True) {
pamh              462 source3/auth/pampass.c static bool smb_pam_start(pam_handle_t **pamh, const char *user, const char *rhost, struct pam_conv *pconv)
pamh              470 source3/auth/pampass.c 	*pamh = (pam_handle_t *)NULL;
pamh              474 source3/auth/pampass.c 	pam_error = pam_start("samba", user, pconv, pamh);
pamh              475 source3/auth/pampass.c 	if( !smb_pam_error_handler(*pamh, pam_error, "Init Failed", 0)) {
pamh              476 source3/auth/pampass.c 		*pamh = (pam_handle_t *)NULL;
pamh              490 source3/auth/pampass.c 	pam_error = pam_set_item(*pamh, PAM_RHOST, our_rhost);
pamh              491 source3/auth/pampass.c 	if(!smb_pam_error_handler(*pamh, pam_error, "set rhost failed", 0)) {
pamh              492 source3/auth/pampass.c 		smb_pam_end(*pamh, pconv);
pamh              493 source3/auth/pampass.c 		*pamh = (pam_handle_t *)NULL;
pamh              499 source3/auth/pampass.c 	pam_error = pam_set_item(*pamh, PAM_TTY, "samba");
pamh              500 source3/auth/pampass.c 	if (!smb_pam_error_handler(*pamh, pam_error, "set tty failed", 0)) {
pamh              501 source3/auth/pampass.c 		smb_pam_end(*pamh, pconv);
pamh              502 source3/auth/pampass.c 		*pamh = (pam_handle_t *)NULL;
pamh              513 source3/auth/pampass.c static NTSTATUS smb_pam_auth(pam_handle_t *pamh, const char *user)
pamh              524 source3/auth/pampass.c 	pam_error = pam_authenticate(pamh, PAM_SILENT | lp_null_passwords() ? 0 : PAM_DISALLOW_NULL_AUTHTOK);
pamh              552 source3/auth/pampass.c 	smb_pam_nt_status_error_handler(pamh, pam_error, "Authentication Failure", 2, &nt_status);
pamh              559 source3/auth/pampass.c static NTSTATUS smb_pam_account(pam_handle_t *pamh, const char * user)
pamh              565 source3/auth/pampass.c 	pam_error = pam_acct_mgmt(pamh, PAM_SILENT); /* Is user account enabled? */
pamh              590 source3/auth/pampass.c 	smb_pam_nt_status_error_handler(pamh, pam_error, "Account Check Failed", 2, &nt_status);
pamh              598 source3/auth/pampass.c static NTSTATUS smb_pam_setcred(pam_handle_t *pamh, const char * user)
pamh              609 source3/auth/pampass.c 	pam_error = pam_setcred(pamh, (PAM_ESTABLISH_CRED|PAM_SILENT)); 
pamh              631 source3/auth/pampass.c 	smb_pam_nt_status_error_handler(pamh, pam_error, "Set Credential Failure", 2, &nt_status);
pamh              638 source3/auth/pampass.c static bool smb_internal_pam_session(pam_handle_t *pamh, const char *user, const char *tty, bool flag)
pamh              644 source3/auth/pampass.c 	pam_error = pam_set_item(pamh, PAM_TTY, tty);
pamh              645 source3/auth/pampass.c 	if (!smb_pam_error_handler(pamh, pam_error, "set tty failed", 0))
pamh              650 source3/auth/pampass.c 		pam_error = pam_open_session(pamh, PAM_SILENT);
pamh              651 source3/auth/pampass.c 		if (!smb_pam_error_handler(pamh, pam_error, "session setup failed", 0))
pamh              654 source3/auth/pampass.c 		pam_setcred(pamh, (PAM_DELETE_CRED|PAM_SILENT)); /* We don't care if this fails */
pamh              655 source3/auth/pampass.c 		pam_error = pam_close_session(pamh, PAM_SILENT); /* This will probably pick up the error anyway */
pamh              656 source3/auth/pampass.c 		if (!smb_pam_error_handler(pamh, pam_error, "session close failed", 0))
pamh              666 source3/auth/pampass.c static bool smb_pam_chauthtok(pam_handle_t *pamh, const char * user)
pamh              672 source3/auth/pampass.c 	pam_error = pam_chauthtok(pamh, PAM_SILENT); /* Change Password */
pamh              708 source3/auth/pampass.c 	if(!smb_pam_error_handler(pamh, pam_error, "Password Change Failed", 2)) {
pamh              722 source3/auth/pampass.c 	pam_handle_t *pamh = NULL;
pamh              733 source3/auth/pampass.c 	if (!smb_pam_start(&pamh, user, rhost, pconv))
pamh              736 source3/auth/pampass.c 	if (!smb_internal_pam_session(pamh, user, tty, True)) {
pamh              737 source3/auth/pampass.c 		smb_pam_end(pamh, pconv);
pamh              741 source3/auth/pampass.c 	return smb_pam_end(pamh, pconv);
pamh              750 source3/auth/pampass.c 	pam_handle_t *pamh = NULL;
pamh              761 source3/auth/pampass.c 	if (!smb_pam_start(&pamh, user, rhost, pconv))
pamh              764 source3/auth/pampass.c 	if (!smb_internal_pam_session(pamh, user, tty, False)) {
pamh              765 source3/auth/pampass.c 		smb_pam_end(pamh, pconv);
pamh              769 source3/auth/pampass.c 	return smb_pam_end(pamh, pconv);
pamh              779 source3/auth/pampass.c 	pam_handle_t *pamh = NULL;
pamh              790 source3/auth/pampass.c 	if (!smb_pam_start(&pamh, user, NULL, pconv))
pamh              793 source3/auth/pampass.c 	if (!NT_STATUS_IS_OK(nt_status = smb_pam_account(pamh, user)))
pamh              796 source3/auth/pampass.c 	smb_pam_end(pamh, pconv);
pamh              806 source3/auth/pampass.c 	pam_handle_t *pamh = NULL;
pamh              819 source3/auth/pampass.c 	if (!smb_pam_start(&pamh, user, NULL, pconv))
pamh              822 source3/auth/pampass.c 	if (!NT_STATUS_IS_OK(nt_status = smb_pam_auth(pamh, user))) {
pamh              824 source3/auth/pampass.c 		smb_pam_end(pamh, pconv);
pamh              828 source3/auth/pampass.c 	if (!NT_STATUS_IS_OK(nt_status = smb_pam_account(pamh, user))) {
pamh              830 source3/auth/pampass.c 		smb_pam_end(pamh, pconv);
pamh              834 source3/auth/pampass.c 	if (!NT_STATUS_IS_OK(nt_status = smb_pam_setcred(pamh, user))) {
pamh              836 source3/auth/pampass.c 		smb_pam_end(pamh, pconv);
pamh              840 source3/auth/pampass.c 	smb_pam_end(pamh, pconv);
pamh              852 source3/auth/pampass.c 	pam_handle_t *pamh = NULL;
pamh              857 source3/auth/pampass.c 	if(!smb_pam_start(&pamh, user, NULL, pconv))
pamh              860 source3/auth/pampass.c 	if (!smb_pam_chauthtok(pamh, user)) {
pamh              862 source3/auth/pampass.c 		smb_pam_end(pamh, pconv);
pamh              866 source3/auth/pampass.c 	return smb_pam_end(pamh, pconv);
pamh               49 source3/pam_smbpass/pam_smb_acct.c int pam_sm_acct_mgmt( pam_handle_t *pamh, int flags,
pamh               63 source3/pam_smbpass/pam_smb_acct.c 	ctrl = set_ctrl(pamh, flags, argc, argv );
pamh               67 source3/pam_smbpass/pam_smb_acct.c 	retval = pam_get_user( pamh, &name, "Username: " );
pamh               70 source3/pam_smbpass/pam_smb_acct.c 			_log_err(pamh, LOG_DEBUG, "acct: could not identify user" );
pamh               75 source3/pam_smbpass/pam_smb_acct.c 		_log_err(pamh, LOG_DEBUG, "acct: username [%s] obtained", name );
pamh               79 source3/pam_smbpass/pam_smb_acct.c 		_log_err(pamh, LOG_DEBUG, "Cannot access samba password database, not running as root.");
pamh               87 source3/pam_smbpass/pam_smb_acct.c 	  _log_err(pamh, LOG_ALERT, "Cannot access samba password database" );
pamh              101 source3/pam_smbpass/pam_smb_acct.c 		_log_err(pamh, LOG_DEBUG, "acct: could not identify user");
pamh              114 source3/pam_smbpass/pam_smb_acct.c 			_log_err(pamh, LOG_DEBUG,
pamh              117 source3/pam_smbpass/pam_smb_acct.c 		make_remark( pamh, ctrl, PAM_ERROR_MSG
pamh               50 source3/pam_smbpass/pam_smb_auth.c 		pam_set_data( pamh, "smb_setcred_return"	\
pamh               56 source3/pam_smbpass/pam_smb_auth.c static int _smb_add_user(pam_handle_t *pamh, unsigned int ctrl,
pamh               69 source3/pam_smbpass/pam_smb_auth.c int pam_sm_authenticate(pam_handle_t *pamh, int flags,
pamh               86 source3/pam_smbpass/pam_smb_auth.c 	ctrl = set_ctrl(pamh, flags, argc, argv);
pamh               98 source3/pam_smbpass/pam_smb_auth.c 	retval = pam_get_user( pamh, &name, "Username: " );
pamh              101 source3/pam_smbpass/pam_smb_auth.c 			_log_err(pamh, LOG_DEBUG, "auth: could not identify user");
pamh              106 source3/pam_smbpass/pam_smb_auth.c 		_log_err(pamh, LOG_DEBUG, "username [%s] obtained", name );
pamh              110 source3/pam_smbpass/pam_smb_auth.c 		_log_err(pamh, LOG_DEBUG, "Cannot access samba password database, not running as root.");
pamh              116 source3/pam_smbpass/pam_smb_auth.c 		_log_err(pamh, LOG_ALERT, "Cannot access samba password database" );
pamh              123 source3/pam_smbpass/pam_smb_auth.c 		_log_err(pamh, LOG_ALERT, "Cannot talloc a samu struct" );
pamh              131 source3/pam_smbpass/pam_smb_auth.c 		retval = _smb_add_user(pamh, ctrl, name, sampass, found);
pamh              137 source3/pam_smbpass/pam_smb_auth.c 		_log_err(pamh, LOG_ALERT, "Failed to find entry for user %s.", name);
pamh              154 source3/pam_smbpass/pam_smb_auth.c 	retval = _smb_read_password(pamh, ctrl, NULL, "Password: ", NULL, _SMB_AUTHTOK, &p);
pamh              156 source3/pam_smbpass/pam_smb_auth.c 		_log_err(pamh,LOG_CRIT, "auth: no password provided for [%s]", name);
pamh              163 source3/pam_smbpass/pam_smb_auth.c 	retval = _smb_verify_password( pamh, sampass, p, ctrl );
pamh              174 source3/pam_smbpass/pam_smb_auth.c int pam_sm_setcred(pam_handle_t *pamh, int flags,
pamh              181 source3/pam_smbpass/pam_smb_auth.c 	_pam_get_data(pamh, "smb_setcred_return", &pretval);
pamh              186 source3/pam_smbpass/pam_smb_auth.c 	pam_set_data(pamh, "smb_setcred_return", NULL, NULL);
pamh              192 source3/pam_smbpass/pam_smb_auth.c static int _smb_add_user(pam_handle_t *pamh, unsigned int ctrl,
pamh              201 source3/pam_smbpass/pam_smb_auth.c 	retval = _pam_get_item( pamh, PAM_AUTHTOK, &pass );
pamh              204 source3/pam_smbpass/pam_smb_auth.c 		_log_err(pamh, LOG_ALERT
pamh              216 source3/pam_smbpass/pam_smb_auth.c 			make_remark(pamh, ctrl, PAM_ERROR_MSG, err_str );
pamh              218 source3/pam_smbpass/pam_smb_auth.c 			make_remark(pamh, ctrl, PAM_TEXT_INFO, msg_str );
pamh              231 source3/pam_smbpass/pam_smb_auth.c 				make_remark(pamh, ctrl, PAM_ERROR_MSG, err_str );
pamh              233 source3/pam_smbpass/pam_smb_auth.c 				make_remark(pamh, ctrl, PAM_TEXT_INFO, msg_str );
pamh               48 source3/pam_smbpass/pam_smb_passwd.c int smb_update_db( pam_handle_t *pamh, int ctrl, const char *user,  const char *pass_new )
pamh               60 source3/pam_smbpass/pam_smb_passwd.c 			make_remark(pamh, ctrl, PAM_ERROR_MSG, err_str );
pamh               67 source3/pam_smbpass/pam_smb_passwd.c 			make_remark(pamh, ctrl, PAM_TEXT_INFO, msg_str );
pamh               95 source3/pam_smbpass/pam_smb_passwd.c int pam_sm_chauthtok(pam_handle_t *pamh, int flags,
pamh              111 source3/pam_smbpass/pam_smb_passwd.c     ctrl = set_ctrl(pamh, flags, argc, argv);
pamh              118 source3/pam_smbpass/pam_smb_passwd.c     retval = pam_get_user( pamh, &user, "Username: " );
pamh              121 source3/pam_smbpass/pam_smb_passwd.c             _log_err(pamh, LOG_DEBUG, "password: could not identify user");
pamh              126 source3/pam_smbpass/pam_smb_passwd.c         _log_err(pamh, LOG_DEBUG, "username [%s] obtained", user);
pamh              130 source3/pam_smbpass/pam_smb_passwd.c 	_log_err(pamh, LOG_DEBUG, "Cannot access samba password database, not running as root.");
pamh              139 source3/pam_smbpass/pam_smb_passwd.c       _log_err(pamh, LOG_ALERT, "Cannot access samba password database" );
pamh              151 source3/pam_smbpass/pam_smb_passwd.c         _log_err(pamh, LOG_ALERT, "Failed to find entry for user %s.", user);
pamh              156 source3/pam_smbpass/pam_smb_passwd.c         _log_err(pamh, LOG_DEBUG, "Located account for %s", user);
pamh              182 source3/pam_smbpass/pam_smb_passwd.c                 _log_err(pamh, LOG_CRIT, "password: out of memory");
pamh              192 source3/pam_smbpass/pam_smb_passwd.c             retval = _smb_read_password( pamh, ctrl, Announce, "Current SMB password: ",
pamh              197 source3/pam_smbpass/pam_smb_passwd.c                 _log_err(pamh, LOG_NOTICE,
pamh              206 source3/pam_smbpass/pam_smb_passwd.c             retval = _smb_verify_password( pamh, sampass, pass_old, ctrl );
pamh              231 source3/pam_smbpass/pam_smb_passwd.c             retval = _pam_get_item( pamh, PAM_OLDAUTHTOK,
pamh              234 source3/pam_smbpass/pam_smb_passwd.c             retval = _pam_get_data( pamh, _SMB_OLD_AUTHTOK,
pamh              243 source3/pam_smbpass/pam_smb_passwd.c             _log_err(pamh, LOG_NOTICE, "password: user not authenticated");
pamh              259 source3/pam_smbpass/pam_smb_passwd.c         retval = _smb_read_password( pamh, ctrl
pamh              268 source3/pam_smbpass/pam_smb_passwd.c                 _log_err(pamh, LOG_ALERT,
pamh              287 source3/pam_smbpass/pam_smb_passwd.c         retval = _pam_smb_approve_pass(pamh, ctrl, pass_old, pass_new);
pamh              290 source3/pam_smbpass/pam_smb_passwd.c             _log_err(pamh, LOG_NOTICE, "new password not acceptable");
pamh              304 source3/pam_smbpass/pam_smb_passwd.c         retval = smb_update_db(pamh, ctrl, user, pass_new);
pamh              310 source3/pam_smbpass/pam_smb_passwd.c 			_log_err(pamh, LOG_NOTICE,
pamh              313 source3/pam_smbpass/pam_smb_passwd.c 			_log_err(pamh, LOG_NOTICE, "password for (%s) changed by (%s/%d)",
pamh              316 source3/pam_smbpass/pam_smb_passwd.c 			_log_err(pamh, LOG_NOTICE, "password for (%s/%d) changed by (%s/%d)",
pamh              320 source3/pam_smbpass/pam_smb_passwd.c 		_log_err(pamh, LOG_ERR, "password change failed for user %s", user);
pamh              331 source3/pam_smbpass/pam_smb_passwd.c         _log_err(pamh, LOG_ALERT, "password received unknown request");
pamh               82 source3/pam_smbpass/support.c void _log_err( pam_handle_t *pamh, int err, const char *format, ... )
pamh               87 source3/pam_smbpass/support.c 	pam_vsyslog(pamh, err, format, args);
pamh               91 source3/pam_smbpass/support.c void _log_err( pam_handle_t *pamh, int err, const char *format, ... )
pamh              120 source3/pam_smbpass/support.c int converse( pam_handle_t * pamh, int ctrl, int nargs
pamh              127 source3/pam_smbpass/support.c 	retval = _pam_get_item(pamh, PAM_CONV, &conv);
pamh              134 source3/pam_smbpass/support.c 			_log_err(pamh, LOG_DEBUG, "conversation failure [%s]"
pamh              135 source3/pam_smbpass/support.c 					 ,pam_strerror(pamh, retval));
pamh              138 source3/pam_smbpass/support.c 		_log_err(pamh, LOG_ERR, "couldn't obtain coversation function [%s]"
pamh              139 source3/pam_smbpass/support.c 				 ,pam_strerror(pamh, retval));
pamh              145 source3/pam_smbpass/support.c int make_remark( pam_handle_t * pamh, unsigned int ctrl
pamh              157 source3/pam_smbpass/support.c 		return converse(pamh, ctrl, 1, pmsg, &resp);
pamh              165 source3/pam_smbpass/support.c int set_ctrl( pam_handle_t *pamh, int flags, int argc, const char **argv )
pamh              207 source3/pam_smbpass/support.c 	_log_err(pamh, LOG_ERR, "Error loading service file %s", service_file);
pamh              230 source3/pam_smbpass/support.c             _log_err(pamh, LOG_ERR, "unrecognized option [%s]", *argv);
pamh              258 source3/pam_smbpass/support.c void _cleanup( pam_handle_t * pamh, void *x, int error_status )
pamh              269 source3/pam_smbpass/support.c char * smbpXstrDup( pam_handle_t *pamh, const char *x )
pamh              279 source3/pam_smbpass/support.c             _log_err(pamh, LOG_CRIT, "out of memory in smbpXstrDup");
pamh              294 source3/pam_smbpass/support.c void _cleanup_failures( pam_handle_t * pamh, void *fl, int err )
pamh              320 source3/pam_smbpass/support.c                 _pam_get_item( pamh, PAM_SERVICE, &service );
pamh              321 source3/pam_smbpass/support.c                 _log_err(pamh, LOG_NOTICE
pamh              330 source3/pam_smbpass/support.c                     _log_err(pamh, LOG_ALERT
pamh              344 source3/pam_smbpass/support.c int _smb_verify_password( pam_handle_t * pamh, struct samu *sampass,
pamh              360 source3/pam_smbpass/support.c         (void) pam_fail_delay( pamh, 1000000 );	/* 1 sec delay for on failure */
pamh              366 source3/pam_smbpass/support.c         _log_err(pamh, LOG_DEBUG, "user %s has null SMB password", name);
pamh              375 source3/pam_smbpass/support.c             _pam_get_item( pamh, PAM_SERVICE, &service );
pamh              376 source3/pam_smbpass/support.c             _log_err(pamh, LOG_NOTICE, "failed auth request by %s for service %s as %s",
pamh              384 source3/pam_smbpass/support.c         _log_err(pamh, LOG_CRIT, "no memory for data-name" );
pamh              404 source3/pam_smbpass/support.c             pam_set_data(pamh, data_name, NULL, _cleanup_failures);
pamh              410 source3/pam_smbpass/support.c         _pam_get_item( pamh, PAM_SERVICE, &service );
pamh              423 source3/pam_smbpass/support.c                 _pam_get_data(pamh, data_name, &old);
pamh              431 source3/pam_smbpass/support.c                     _log_err(pamh, LOG_NOTICE,
pamh              438 source3/pam_smbpass/support.c                     _log_err(pamh, LOG_NOTICE,
pamh              443 source3/pam_smbpass/support.c                 newauth->user = smbpXstrDup( pamh, name );
pamh              444 source3/pam_smbpass/support.c                 newauth->agent = smbpXstrDup( pamh, uidtoname( getuid() ) );
pamh              445 source3/pam_smbpass/support.c                 pam_set_data( pamh, data_name, newauth, _cleanup_failures );
pamh              448 source3/pam_smbpass/support.c                 _log_err(pamh, LOG_CRIT, "no memory for failure recorder" );
pamh              449 source3/pam_smbpass/support.c                 _log_err(pamh, LOG_NOTICE,
pamh              455 source3/pam_smbpass/support.c         _log_err(pamh, LOG_NOTICE,
pamh              503 source3/pam_smbpass/support.c int _smb_read_password( pam_handle_t * pamh, unsigned int ctrl,
pamh              528 source3/pam_smbpass/support.c         retval = _pam_get_item( pamh, authtok_flag, &item );
pamh              531 source3/pam_smbpass/support.c             _log_err(pamh, LOG_ALERT,
pamh              576 source3/pam_smbpass/support.c     retval = converse( pamh, ctrl, i, pmsg, &resp );
pamh              584 source3/pam_smbpass/support.c             token = smbpXstrDup(pamh, resp[j++].resp);
pamh              591 source3/pam_smbpass/support.c                         make_remark( pamh, ctrl, PAM_ERROR_MSG
pamh              596 source3/pam_smbpass/support.c                 _log_err(pamh, LOG_NOTICE,
pamh              610 source3/pam_smbpass/support.c             _log_err(pamh, LOG_DEBUG, "unable to obtain a password");
pamh              619 source3/pam_smbpass/support.c         retval = pam_set_item( pamh, authtok_flag, (const void *)token );
pamh              622 source3/pam_smbpass/support.c             || (retval = _pam_get_item( pamh, authtok_flag
pamh              625 source3/pam_smbpass/support.c             _log_err(pamh, LOG_CRIT, "error manipulating password");
pamh              634 source3/pam_smbpass/support.c         retval = pam_set_data( pamh, data_name, (void *) token, _cleanup );
pamh              636 source3/pam_smbpass/support.c             || (retval = _pam_get_data( pamh, data_name, &item ))
pamh              639 source3/pam_smbpass/support.c             _log_err(pamh, LOG_CRIT, "error manipulating password data [%s]",
pamh              640 source3/pam_smbpass/support.c                      pam_strerror( pamh, retval ));
pamh              654 source3/pam_smbpass/support.c int _pam_smb_approve_pass(pam_handle_t * pamh,
pamh              664 source3/pam_smbpass/support.c 	    _log_err(pamh, LOG_DEBUG,
pamh              667 source3/pam_smbpass/support.c 	make_remark( pamh, ctrl, PAM_ERROR_MSG, pass_new == NULL ?
pamh              679 source3/pam_smbpass/support.c int _pam_get_item(const pam_handle_t *pamh,
pamh              684 source3/pam_smbpass/support.c 	return pam_get_item(pamh, item_type, item);
pamh              687 source3/pam_smbpass/support.c int _pam_get_data(const pam_handle_t *pamh,
pamh              692 source3/pam_smbpass/support.c 	return pam_get_data(pamh, module_data_name, data);
pamh               29 source3/pam_smbpass/support.h extern int _smb_verify_password( pam_handle_t *pamh , struct samu *sampass, 
pamh               52 source3/pam_smbpass/support.h int _pam_get_item(const pam_handle_t *pamh,
pamh               55 source3/pam_smbpass/support.h int _pam_get_data(const pam_handle_t *pamh,
pamh              229 source4/auth/ntlm/auth_unix.c static NTSTATUS smb_pam_start(pam_handle_t **pamh, const char *account_name, const char *remote_host, struct pam_conv *pconv)
pamh              239 source4/auth/ntlm/auth_unix.c 	pam_error = pam_start("samba", account_name, pconv, pamh);
pamh              248 source4/auth/ntlm/auth_unix.c 	pam_error = pam_set_item(*pamh, PAM_RHOST, remote_host);
pamh              253 source4/auth/ntlm/auth_unix.c 			 pam_strerror(*pamh, pam_error)));
pamh              256 source4/auth/ntlm/auth_unix.c 		pam_error = pam_end(*pamh, 0);
pamh              268 source4/auth/ntlm/auth_unix.c 	pam_error = pam_set_item(*pamh, PAM_TTY, "samba");
pamh              273 source4/auth/ntlm/auth_unix.c 			 pam_strerror(*pamh, pam_error)));
pamh              276 source4/auth/ntlm/auth_unix.c 		pam_error = pam_end(*pamh, 0);
pamh              291 source4/auth/ntlm/auth_unix.c static NTSTATUS smb_pam_end(pam_handle_t *pamh)
pamh              295 source4/auth/ntlm/auth_unix.c 	if (pamh != NULL) {
pamh              296 source4/auth/ntlm/auth_unix.c 		pam_error = pam_end(pamh, 0);
pamh              313 source4/auth/ntlm/auth_unix.c static NTSTATUS smb_pam_auth(pam_handle_t *pamh, bool allow_null_passwords, const char *user)
pamh              324 source4/auth/ntlm/auth_unix.c 	pam_error = pam_authenticate(pamh, PAM_SILENT | allow_null_passwords ? 0 : PAM_DISALLOW_NULL_AUTHTOK);
pamh              358 source4/auth/ntlm/auth_unix.c static NTSTATUS smb_pam_account(pam_handle_t *pamh, const char * user)
pamh              364 source4/auth/ntlm/auth_unix.c 	pam_error = pam_acct_mgmt(pamh, PAM_SILENT); /* Is user account enabled? */
pamh              396 source4/auth/ntlm/auth_unix.c static NTSTATUS smb_pam_setcred(pam_handle_t *pamh, const char * user)
pamh              407 source4/auth/ntlm/auth_unix.c 	pam_error = pam_setcred(pamh, (PAM_ESTABLISH_CRED|PAM_SILENT)); 
pamh              437 source4/auth/ntlm/auth_unix.c 	pam_handle_t *pamh;
pamh              461 source4/auth/ntlm/auth_unix.c 	nt_status = smb_pam_start(&pamh, user_info->mapped.account_name, user_info->remote_host ? user_info->remote_host->addr : NULL, pamconv);
pamh              466 source4/auth/ntlm/auth_unix.c 	nt_status = smb_pam_auth(pamh, lp_null_passwords(lp_ctx), user_info->mapped.account_name);
pamh              468 source4/auth/ntlm/auth_unix.c 		smb_pam_end(pamh);
pamh              474 source4/auth/ntlm/auth_unix.c 		nt_status = smb_pam_account(pamh, user_info->mapped.account_name);
pamh              476 source4/auth/ntlm/auth_unix.c 			smb_pam_end(pamh);
pamh              480 source4/auth/ntlm/auth_unix.c 		nt_status = smb_pam_setcred(pamh, user_info->mapped.account_name);
pamh              482 source4/auth/ntlm/auth_unix.c 			smb_pam_end(pamh);
pamh              487 source4/auth/ntlm/auth_unix.c 	smb_pam_end(pamh);