pamh 134 nsswitch/pam_winbind.c function " (flags: 0x%04x)", ctx->pamh, ctx->flags); \
pamh 141 nsswitch/pam_winbind.c function " returning %d (%s)", ctx->pamh, retval, \
pamh 169 nsswitch/pam_winbind.c static int _pam_get_item(const pam_handle_t *pamh,
pamh 174 nsswitch/pam_winbind.c return pam_get_item(pamh, item_type, item);
pamh 176 nsswitch/pam_winbind.c static int _pam_get_data(const pam_handle_t *pamh,
pamh 181 nsswitch/pam_winbind.c return pam_get_data(pamh, module_data_name, data);
pamh 187 nsswitch/pam_winbind.c static void _pam_log_int(const pam_handle_t *pamh,
pamh 192 nsswitch/pam_winbind.c pam_vsyslog(pamh, err, format, args);
pamh 195 nsswitch/pam_winbind.c static void _pam_log_int(const pam_handle_t *pamh,
pamh 203 nsswitch/pam_winbind.c _pam_get_item(pamh, PAM_SERVICE, &service);
pamh 233 nsswitch/pam_winbind.c _pam_log_int(r->pamh, err, format, args);
pamh 236 nsswitch/pam_winbind.c static void __pam_log(const pam_handle_t *pamh, int ctrl, int err, const char *format, ...) PRINTF_ATTRIBUTE(4,5);
pamh 237 nsswitch/pam_winbind.c static void __pam_log(const pam_handle_t *pamh, int ctrl, int err, const char *format, ...)
pamh 246 nsswitch/pam_winbind.c _pam_log_int(pamh, err, format, args);
pamh 286 nsswitch/pam_winbind.c _pam_log_int(r->pamh, err, format, args);
pamh 289 nsswitch/pam_winbind.c static void __pam_log_debug(const pam_handle_t *pamh, int ctrl, int err, const char *format, ...) PRINTF_ATTRIBUTE(4,5);
pamh 290 nsswitch/pam_winbind.c static void __pam_log_debug(const pam_handle_t *pamh, int ctrl, int err, const char *format, ...)
pamh 299 nsswitch/pam_winbind.c _pam_log_int(pamh, err, format, args);
pamh 310 nsswitch/pam_winbind.c pam_get_item(ctx->pamh, item_type, &data);
pamh 312 nsswitch/pam_winbind.c pam_get_data(ctx->pamh, key, &data);
pamh 319 nsswitch/pam_winbind.c ctx->pamh, type, key, (const char *)data,
pamh 324 nsswitch/pam_winbind.c ctx->pamh, type, key, data);
pamh 385 nsswitch/pam_winbind.c static int _pam_parse(const pam_handle_t *pamh,
pamh 494 nsswitch/pam_winbind.c __pam_log(pamh, ctrl, LOG_ERR,
pamh 525 nsswitch/pam_winbind.c static int _pam_winbind_init_context(pam_handle_t *pamh,
pamh 544 nsswitch/pam_winbind.c r->pamh = pamh;
pamh 548 nsswitch/pam_winbind.c r->ctrl = _pam_parse(pamh, flags, argc, argv, &r->dict);
pamh 559 nsswitch/pam_winbind.c static void _pam_winbind_cleanup_func(pam_handle_t *pamh,
pamh 563 nsswitch/pam_winbind.c int ctrl = _pam_parse(pamh, 0, 0, NULL, NULL);
pamh 565 nsswitch/pam_winbind.c __pam_log_debug(pamh, ctrl, LOG_DEBUG,
pamh 567 nsswitch/pam_winbind.c "(error_status = %d)", pamh, data,
pamh 636 nsswitch/pam_winbind.c static int converse(const pam_handle_t *pamh,
pamh 644 nsswitch/pam_winbind.c retval = _pam_get_item(pamh, PAM_CONV, &conv);
pamh 673 nsswitch/pam_winbind.c retval = converse(ctx->pamh, 1, pmsg, &resp);
pamh 818 nsswitch/pam_winbind.c ret = converse(ctx->pamh, 1, &pmsg, &resp);
pamh 1255 nsswitch/pam_winbind.c ret = pam_putenv(ctx->pamh, var);
pamh 1259 nsswitch/pam_winbind.c var, pam_strerror(ctx->pamh, ret));
pamh 1319 nsswitch/pam_winbind.c ret = pam_set_data(ctx->pamh, data_name, talloc_strdup(NULL, value),
pamh 1324 nsswitch/pam_winbind.c data_name, pam_strerror(ctx->pamh, ret));
pamh 1359 nsswitch/pam_winbind.c static void _pam_free_data_info3(pam_handle_t *pamh)
pamh 1361 nsswitch/pam_winbind.c pam_set_data(pamh, PAM_WINBIND_HOMEDIR, NULL, NULL);
pamh 1362 nsswitch/pam_winbind.c pam_set_data(pamh, PAM_WINBIND_LOGONSCRIPT, NULL, NULL);
pamh 1363 nsswitch/pam_winbind.c pam_set_data(pamh, PAM_WINBIND_LOGONSERVER, NULL, NULL);
pamh 1364 nsswitch/pam_winbind.c pam_set_data(pamh, PAM_WINBIND_PROFILEPATH, NULL, NULL);
pamh 1588 nsswitch/pam_winbind.c ret = pam_get_user(ctx->pamh, &username, NULL);
pamh 2131 nsswitch/pam_winbind.c retval = _pam_get_item(ctx->pamh, authtok_flag, &item);
pamh 2185 nsswitch/pam_winbind.c retval = converse(ctx->pamh, i, pmsg, &resp);
pamh 2236 nsswitch/pam_winbind.c retval = pam_set_item(ctx->pamh, authtok_flag, token);
pamh 2239 nsswitch/pam_winbind.c (retval = _pam_get_item(ctx->pamh, authtok_flag, &item)) != PAM_SUCCESS) {
pamh 2461 nsswitch/pam_winbind.c static int _pam_delete_cred(pam_handle_t *pamh, int flags,
pamh 2473 nsswitch/pam_winbind.c retval = _pam_winbind_init_context(pamh, flags, argc, argv, &ctx);
pamh 2488 nsswitch/pam_winbind.c retval = pam_get_user(pamh, &user, _("Username: "));
pamh 2505 nsswitch/pam_winbind.c ccname = pam_getenv(pamh, "KRB5CCNAME");
pamh 2582 nsswitch/pam_winbind.c if ((ctx->ctrl & WINBIND_KRB5_AUTH) && pam_getenv(pamh, "KRB5CCNAME")) {
pamh 2583 nsswitch/pam_winbind.c pam_putenv(pamh, "KRB5CCNAME");
pamh 2594 nsswitch/pam_winbind.c int pam_sm_authenticate(pam_handle_t *pamh, int flags,
pamh 2608 nsswitch/pam_winbind.c retval = _pam_winbind_init_context(pamh, flags, argc, argv, &ctx);
pamh 2616 nsswitch/pam_winbind.c retval = pam_get_user(pamh, &username, NULL);
pamh 2706 nsswitch/pam_winbind.c pam_set_data(pamh, PAM_WINBIND_NEW_AUTHTOK_REQD,
pamh 2718 nsswitch/pam_winbind.c pam_set_data(pamh, PAM_WINBIND_NEW_AUTHTOK_REQD_DURING_AUTH,
pamh 2727 nsswitch/pam_winbind.c pam_set_item (pamh, PAM_USER, username_ret);
pamh 2738 nsswitch/pam_winbind.c pam_set_data(pamh, PAM_WINBIND_NEW_AUTHTOK_REQD, NULL, NULL);
pamh 2742 nsswitch/pam_winbind.c _pam_free_data_info3(pamh);
pamh 2753 nsswitch/pam_winbind.c int pam_sm_setcred(pam_handle_t *pamh, int flags,
pamh 2759 nsswitch/pam_winbind.c ret = _pam_winbind_init_context(pamh, flags, argc, argv, &ctx);
pamh 2769 nsswitch/pam_winbind.c ret = _pam_delete_cred(pamh, flags, argc, argv);
pamh 2805 nsswitch/pam_winbind.c int pam_sm_acct_mgmt(pam_handle_t *pamh, int flags,
pamh 2813 nsswitch/pam_winbind.c ret = _pam_winbind_init_context(pamh, flags, argc, argv, &ctx);
pamh 2822 nsswitch/pam_winbind.c ret = pam_get_user(pamh, &username, NULL);
pamh 2848 nsswitch/pam_winbind.c pam_get_data(pamh, PAM_WINBIND_NEW_AUTHTOK_REQD,
pamh 2902 nsswitch/pam_winbind.c int pam_sm_open_session(pam_handle_t *pamh, int flags,
pamh 2908 nsswitch/pam_winbind.c ret = _pam_winbind_init_context(pamh, flags, argc, argv, &ctx);
pamh 2928 nsswitch/pam_winbind.c int pam_sm_close_session(pam_handle_t *pamh, int flags,
pamh 2934 nsswitch/pam_winbind.c ret = _pam_winbind_init_context(pamh, flags, argc, argv, &ctx);
pamh 2977 nsswitch/pam_winbind.c _pam_get_data(ctx->pamh, PAM_WINBIND_NEW_AUTHTOK_REQD_DURING_AUTH,
pamh 2979 nsswitch/pam_winbind.c pam_set_data(ctx->pamh, PAM_WINBIND_NEW_AUTHTOK_REQD_DURING_AUTH,
pamh 3000 nsswitch/pam_winbind.c int pam_sm_chauthtok(pam_handle_t * pamh, int flags,
pamh 3019 nsswitch/pam_winbind.c ret = _pam_winbind_init_context(pamh, flags, argc, argv, &ctx);
pamh 3034 nsswitch/pam_winbind.c ret = pam_get_user(pamh, &user, _("Username: "));
pamh 3110 nsswitch/pam_winbind.c pam_set_data(pamh, PAM_WINBIND_PWD_LAST_SET,
pamh 3113 nsswitch/pam_winbind.c ret = pam_set_item(pamh, PAM_OLDAUTHTOK,
pamh 3132 nsswitch/pam_winbind.c ret = _pam_get_item(pamh, PAM_OLDAUTHTOK, &pass_old);
pamh 3182 nsswitch/pam_winbind.c _pam_get_data(pamh, PAM_WINBIND_PWD_LAST_SET,
pamh 3249 nsswitch/pam_winbind.c pam_set_item(pamh, PAM_USER,
pamh 166 nsswitch/pam_winbind.h pam_handle_t *pamh;
pamh 72 source3/auth/pampass.c static bool smb_pam_error_handler(pam_handle_t *pamh, int pam_error, const char *msg, int dbglvl)
pamh 77 source3/auth/pampass.c msg, pam_strerror(pamh, pam_error)));
pamh 89 source3/auth/pampass.c static bool smb_pam_nt_status_error_handler(pam_handle_t *pamh, int pam_error,
pamh 95 source3/auth/pampass.c if (smb_pam_error_handler(pamh, pam_error, msg, dbglvl))
pamh 441 source3/auth/pampass.c static bool smb_pam_end(pam_handle_t *pamh, struct pam_conv *smb_pam_conv_ptr)
pamh 447 source3/auth/pampass.c if( pamh != NULL ) {
pamh 448 source3/auth/pampass.c pam_error = pam_end(pamh, 0);
pamh 449 source3/auth/pampass.c if(smb_pam_error_handler(pamh, pam_error, "End Cleanup Failed", 2) == True) {
pamh 462 source3/auth/pampass.c static bool smb_pam_start(pam_handle_t **pamh, const char *user, const char *rhost, struct pam_conv *pconv)
pamh 470 source3/auth/pampass.c *pamh = (pam_handle_t *)NULL;
pamh 474 source3/auth/pampass.c pam_error = pam_start("samba", user, pconv, pamh);
pamh 475 source3/auth/pampass.c if( !smb_pam_error_handler(*pamh, pam_error, "Init Failed", 0)) {
pamh 476 source3/auth/pampass.c *pamh = (pam_handle_t *)NULL;
pamh 490 source3/auth/pampass.c pam_error = pam_set_item(*pamh, PAM_RHOST, our_rhost);
pamh 491 source3/auth/pampass.c if(!smb_pam_error_handler(*pamh, pam_error, "set rhost failed", 0)) {
pamh 492 source3/auth/pampass.c smb_pam_end(*pamh, pconv);
pamh 493 source3/auth/pampass.c *pamh = (pam_handle_t *)NULL;
pamh 499 source3/auth/pampass.c pam_error = pam_set_item(*pamh, PAM_TTY, "samba");
pamh 500 source3/auth/pampass.c if (!smb_pam_error_handler(*pamh, pam_error, "set tty failed", 0)) {
pamh 501 source3/auth/pampass.c smb_pam_end(*pamh, pconv);
pamh 502 source3/auth/pampass.c *pamh = (pam_handle_t *)NULL;
pamh 513 source3/auth/pampass.c static NTSTATUS smb_pam_auth(pam_handle_t *pamh, const char *user)
pamh 524 source3/auth/pampass.c pam_error = pam_authenticate(pamh, PAM_SILENT | lp_null_passwords() ? 0 : PAM_DISALLOW_NULL_AUTHTOK);
pamh 552 source3/auth/pampass.c smb_pam_nt_status_error_handler(pamh, pam_error, "Authentication Failure", 2, &nt_status);
pamh 559 source3/auth/pampass.c static NTSTATUS smb_pam_account(pam_handle_t *pamh, const char * user)
pamh 565 source3/auth/pampass.c pam_error = pam_acct_mgmt(pamh, PAM_SILENT); /* Is user account enabled? */
pamh 590 source3/auth/pampass.c smb_pam_nt_status_error_handler(pamh, pam_error, "Account Check Failed", 2, &nt_status);
pamh 598 source3/auth/pampass.c static NTSTATUS smb_pam_setcred(pam_handle_t *pamh, const char * user)
pamh 609 source3/auth/pampass.c pam_error = pam_setcred(pamh, (PAM_ESTABLISH_CRED|PAM_SILENT));
pamh 631 source3/auth/pampass.c smb_pam_nt_status_error_handler(pamh, pam_error, "Set Credential Failure", 2, &nt_status);
pamh 638 source3/auth/pampass.c static bool smb_internal_pam_session(pam_handle_t *pamh, const char *user, const char *tty, bool flag)
pamh 644 source3/auth/pampass.c pam_error = pam_set_item(pamh, PAM_TTY, tty);
pamh 645 source3/auth/pampass.c if (!smb_pam_error_handler(pamh, pam_error, "set tty failed", 0))
pamh 650 source3/auth/pampass.c pam_error = pam_open_session(pamh, PAM_SILENT);
pamh 651 source3/auth/pampass.c if (!smb_pam_error_handler(pamh, pam_error, "session setup failed", 0))
pamh 654 source3/auth/pampass.c pam_setcred(pamh, (PAM_DELETE_CRED|PAM_SILENT)); /* We don't care if this fails */
pamh 655 source3/auth/pampass.c pam_error = pam_close_session(pamh, PAM_SILENT); /* This will probably pick up the error anyway */
pamh 656 source3/auth/pampass.c if (!smb_pam_error_handler(pamh, pam_error, "session close failed", 0))
pamh 666 source3/auth/pampass.c static bool smb_pam_chauthtok(pam_handle_t *pamh, const char * user)
pamh 672 source3/auth/pampass.c pam_error = pam_chauthtok(pamh, PAM_SILENT); /* Change Password */
pamh 708 source3/auth/pampass.c if(!smb_pam_error_handler(pamh, pam_error, "Password Change Failed", 2)) {
pamh 722 source3/auth/pampass.c pam_handle_t *pamh = NULL;
pamh 733 source3/auth/pampass.c if (!smb_pam_start(&pamh, user, rhost, pconv))
pamh 736 source3/auth/pampass.c if (!smb_internal_pam_session(pamh, user, tty, True)) {
pamh 737 source3/auth/pampass.c smb_pam_end(pamh, pconv);
pamh 741 source3/auth/pampass.c return smb_pam_end(pamh, pconv);
pamh 750 source3/auth/pampass.c pam_handle_t *pamh = NULL;
pamh 761 source3/auth/pampass.c if (!smb_pam_start(&pamh, user, rhost, pconv))
pamh 764 source3/auth/pampass.c if (!smb_internal_pam_session(pamh, user, tty, False)) {
pamh 765 source3/auth/pampass.c smb_pam_end(pamh, pconv);
pamh 769 source3/auth/pampass.c return smb_pam_end(pamh, pconv);
pamh 779 source3/auth/pampass.c pam_handle_t *pamh = NULL;
pamh 790 source3/auth/pampass.c if (!smb_pam_start(&pamh, user, NULL, pconv))
pamh 793 source3/auth/pampass.c if (!NT_STATUS_IS_OK(nt_status = smb_pam_account(pamh, user)))
pamh 796 source3/auth/pampass.c smb_pam_end(pamh, pconv);
pamh 806 source3/auth/pampass.c pam_handle_t *pamh = NULL;
pamh 819 source3/auth/pampass.c if (!smb_pam_start(&pamh, user, NULL, pconv))
pamh 822 source3/auth/pampass.c if (!NT_STATUS_IS_OK(nt_status = smb_pam_auth(pamh, user))) {
pamh 824 source3/auth/pampass.c smb_pam_end(pamh, pconv);
pamh 828 source3/auth/pampass.c if (!NT_STATUS_IS_OK(nt_status = smb_pam_account(pamh, user))) {
pamh 830 source3/auth/pampass.c smb_pam_end(pamh, pconv);
pamh 834 source3/auth/pampass.c if (!NT_STATUS_IS_OK(nt_status = smb_pam_setcred(pamh, user))) {
pamh 836 source3/auth/pampass.c smb_pam_end(pamh, pconv);
pamh 840 source3/auth/pampass.c smb_pam_end(pamh, pconv);
pamh 852 source3/auth/pampass.c pam_handle_t *pamh = NULL;
pamh 857 source3/auth/pampass.c if(!smb_pam_start(&pamh, user, NULL, pconv))
pamh 860 source3/auth/pampass.c if (!smb_pam_chauthtok(pamh, user)) {
pamh 862 source3/auth/pampass.c smb_pam_end(pamh, pconv);
pamh 866 source3/auth/pampass.c return smb_pam_end(pamh, pconv);
pamh 49 source3/pam_smbpass/pam_smb_acct.c int pam_sm_acct_mgmt( pam_handle_t *pamh, int flags,
pamh 63 source3/pam_smbpass/pam_smb_acct.c ctrl = set_ctrl(pamh, flags, argc, argv );
pamh 67 source3/pam_smbpass/pam_smb_acct.c retval = pam_get_user( pamh, &name, "Username: " );
pamh 70 source3/pam_smbpass/pam_smb_acct.c _log_err(pamh, LOG_DEBUG, "acct: could not identify user" );
pamh 75 source3/pam_smbpass/pam_smb_acct.c _log_err(pamh, LOG_DEBUG, "acct: username [%s] obtained", name );
pamh 79 source3/pam_smbpass/pam_smb_acct.c _log_err(pamh, LOG_DEBUG, "Cannot access samba password database, not running as root.");
pamh 87 source3/pam_smbpass/pam_smb_acct.c _log_err(pamh, LOG_ALERT, "Cannot access samba password database" );
pamh 101 source3/pam_smbpass/pam_smb_acct.c _log_err(pamh, LOG_DEBUG, "acct: could not identify user");
pamh 114 source3/pam_smbpass/pam_smb_acct.c _log_err(pamh, LOG_DEBUG,
pamh 117 source3/pam_smbpass/pam_smb_acct.c make_remark( pamh, ctrl, PAM_ERROR_MSG
pamh 50 source3/pam_smbpass/pam_smb_auth.c pam_set_data( pamh, "smb_setcred_return" \
pamh 56 source3/pam_smbpass/pam_smb_auth.c static int _smb_add_user(pam_handle_t *pamh, unsigned int ctrl,
pamh 69 source3/pam_smbpass/pam_smb_auth.c int pam_sm_authenticate(pam_handle_t *pamh, int flags,
pamh 86 source3/pam_smbpass/pam_smb_auth.c ctrl = set_ctrl(pamh, flags, argc, argv);
pamh 98 source3/pam_smbpass/pam_smb_auth.c retval = pam_get_user( pamh, &name, "Username: " );
pamh 101 source3/pam_smbpass/pam_smb_auth.c _log_err(pamh, LOG_DEBUG, "auth: could not identify user");
pamh 106 source3/pam_smbpass/pam_smb_auth.c _log_err(pamh, LOG_DEBUG, "username [%s] obtained", name );
pamh 110 source3/pam_smbpass/pam_smb_auth.c _log_err(pamh, LOG_DEBUG, "Cannot access samba password database, not running as root.");
pamh 116 source3/pam_smbpass/pam_smb_auth.c _log_err(pamh, LOG_ALERT, "Cannot access samba password database" );
pamh 123 source3/pam_smbpass/pam_smb_auth.c _log_err(pamh, LOG_ALERT, "Cannot talloc a samu struct" );
pamh 131 source3/pam_smbpass/pam_smb_auth.c retval = _smb_add_user(pamh, ctrl, name, sampass, found);
pamh 137 source3/pam_smbpass/pam_smb_auth.c _log_err(pamh, LOG_ALERT, "Failed to find entry for user %s.", name);
pamh 154 source3/pam_smbpass/pam_smb_auth.c retval = _smb_read_password(pamh, ctrl, NULL, "Password: ", NULL, _SMB_AUTHTOK, &p);
pamh 156 source3/pam_smbpass/pam_smb_auth.c _log_err(pamh,LOG_CRIT, "auth: no password provided for [%s]", name);
pamh 163 source3/pam_smbpass/pam_smb_auth.c retval = _smb_verify_password( pamh, sampass, p, ctrl );
pamh 174 source3/pam_smbpass/pam_smb_auth.c int pam_sm_setcred(pam_handle_t *pamh, int flags,
pamh 181 source3/pam_smbpass/pam_smb_auth.c _pam_get_data(pamh, "smb_setcred_return", &pretval);
pamh 186 source3/pam_smbpass/pam_smb_auth.c pam_set_data(pamh, "smb_setcred_return", NULL, NULL);
pamh 192 source3/pam_smbpass/pam_smb_auth.c static int _smb_add_user(pam_handle_t *pamh, unsigned int ctrl,
pamh 201 source3/pam_smbpass/pam_smb_auth.c retval = _pam_get_item( pamh, PAM_AUTHTOK, &pass );
pamh 204 source3/pam_smbpass/pam_smb_auth.c _log_err(pamh, LOG_ALERT
pamh 216 source3/pam_smbpass/pam_smb_auth.c make_remark(pamh, ctrl, PAM_ERROR_MSG, err_str );
pamh 218 source3/pam_smbpass/pam_smb_auth.c make_remark(pamh, ctrl, PAM_TEXT_INFO, msg_str );
pamh 231 source3/pam_smbpass/pam_smb_auth.c make_remark(pamh, ctrl, PAM_ERROR_MSG, err_str );
pamh 233 source3/pam_smbpass/pam_smb_auth.c make_remark(pamh, ctrl, PAM_TEXT_INFO, msg_str );
pamh 48 source3/pam_smbpass/pam_smb_passwd.c int smb_update_db( pam_handle_t *pamh, int ctrl, const char *user, const char *pass_new )
pamh 60 source3/pam_smbpass/pam_smb_passwd.c make_remark(pamh, ctrl, PAM_ERROR_MSG, err_str );
pamh 67 source3/pam_smbpass/pam_smb_passwd.c make_remark(pamh, ctrl, PAM_TEXT_INFO, msg_str );
pamh 95 source3/pam_smbpass/pam_smb_passwd.c int pam_sm_chauthtok(pam_handle_t *pamh, int flags,
pamh 111 source3/pam_smbpass/pam_smb_passwd.c ctrl = set_ctrl(pamh, flags, argc, argv);
pamh 118 source3/pam_smbpass/pam_smb_passwd.c retval = pam_get_user( pamh, &user, "Username: " );
pamh 121 source3/pam_smbpass/pam_smb_passwd.c _log_err(pamh, LOG_DEBUG, "password: could not identify user");
pamh 126 source3/pam_smbpass/pam_smb_passwd.c _log_err(pamh, LOG_DEBUG, "username [%s] obtained", user);
pamh 130 source3/pam_smbpass/pam_smb_passwd.c _log_err(pamh, LOG_DEBUG, "Cannot access samba password database, not running as root.");
pamh 139 source3/pam_smbpass/pam_smb_passwd.c _log_err(pamh, LOG_ALERT, "Cannot access samba password database" );
pamh 151 source3/pam_smbpass/pam_smb_passwd.c _log_err(pamh, LOG_ALERT, "Failed to find entry for user %s.", user);
pamh 156 source3/pam_smbpass/pam_smb_passwd.c _log_err(pamh, LOG_DEBUG, "Located account for %s", user);
pamh 182 source3/pam_smbpass/pam_smb_passwd.c _log_err(pamh, LOG_CRIT, "password: out of memory");
pamh 192 source3/pam_smbpass/pam_smb_passwd.c retval = _smb_read_password( pamh, ctrl, Announce, "Current SMB password: ",
pamh 197 source3/pam_smbpass/pam_smb_passwd.c _log_err(pamh, LOG_NOTICE,
pamh 206 source3/pam_smbpass/pam_smb_passwd.c retval = _smb_verify_password( pamh, sampass, pass_old, ctrl );
pamh 231 source3/pam_smbpass/pam_smb_passwd.c retval = _pam_get_item( pamh, PAM_OLDAUTHTOK,
pamh 234 source3/pam_smbpass/pam_smb_passwd.c retval = _pam_get_data( pamh, _SMB_OLD_AUTHTOK,
pamh 243 source3/pam_smbpass/pam_smb_passwd.c _log_err(pamh, LOG_NOTICE, "password: user not authenticated");
pamh 259 source3/pam_smbpass/pam_smb_passwd.c retval = _smb_read_password( pamh, ctrl
pamh 268 source3/pam_smbpass/pam_smb_passwd.c _log_err(pamh, LOG_ALERT,
pamh 287 source3/pam_smbpass/pam_smb_passwd.c retval = _pam_smb_approve_pass(pamh, ctrl, pass_old, pass_new);
pamh 290 source3/pam_smbpass/pam_smb_passwd.c _log_err(pamh, LOG_NOTICE, "new password not acceptable");
pamh 304 source3/pam_smbpass/pam_smb_passwd.c retval = smb_update_db(pamh, ctrl, user, pass_new);
pamh 310 source3/pam_smbpass/pam_smb_passwd.c _log_err(pamh, LOG_NOTICE,
pamh 313 source3/pam_smbpass/pam_smb_passwd.c _log_err(pamh, LOG_NOTICE, "password for (%s) changed by (%s/%d)",
pamh 316 source3/pam_smbpass/pam_smb_passwd.c _log_err(pamh, LOG_NOTICE, "password for (%s/%d) changed by (%s/%d)",
pamh 320 source3/pam_smbpass/pam_smb_passwd.c _log_err(pamh, LOG_ERR, "password change failed for user %s", user);
pamh 331 source3/pam_smbpass/pam_smb_passwd.c _log_err(pamh, LOG_ALERT, "password received unknown request");
pamh 82 source3/pam_smbpass/support.c void _log_err( pam_handle_t *pamh, int err, const char *format, ... )
pamh 87 source3/pam_smbpass/support.c pam_vsyslog(pamh, err, format, args);
pamh 91 source3/pam_smbpass/support.c void _log_err( pam_handle_t *pamh, int err, const char *format, ... )
pamh 120 source3/pam_smbpass/support.c int converse( pam_handle_t * pamh, int ctrl, int nargs
pamh 127 source3/pam_smbpass/support.c retval = _pam_get_item(pamh, PAM_CONV, &conv);
pamh 134 source3/pam_smbpass/support.c _log_err(pamh, LOG_DEBUG, "conversation failure [%s]"
pamh 135 source3/pam_smbpass/support.c ,pam_strerror(pamh, retval));
pamh 138 source3/pam_smbpass/support.c _log_err(pamh, LOG_ERR, "couldn't obtain coversation function [%s]"
pamh 139 source3/pam_smbpass/support.c ,pam_strerror(pamh, retval));
pamh 145 source3/pam_smbpass/support.c int make_remark( pam_handle_t * pamh, unsigned int ctrl
pamh 157 source3/pam_smbpass/support.c return converse(pamh, ctrl, 1, pmsg, &resp);
pamh 165 source3/pam_smbpass/support.c int set_ctrl( pam_handle_t *pamh, int flags, int argc, const char **argv )
pamh 207 source3/pam_smbpass/support.c _log_err(pamh, LOG_ERR, "Error loading service file %s", service_file);
pamh 230 source3/pam_smbpass/support.c _log_err(pamh, LOG_ERR, "unrecognized option [%s]", *argv);
pamh 258 source3/pam_smbpass/support.c void _cleanup( pam_handle_t * pamh, void *x, int error_status )
pamh 269 source3/pam_smbpass/support.c char * smbpXstrDup( pam_handle_t *pamh, const char *x )
pamh 279 source3/pam_smbpass/support.c _log_err(pamh, LOG_CRIT, "out of memory in smbpXstrDup");
pamh 294 source3/pam_smbpass/support.c void _cleanup_failures( pam_handle_t * pamh, void *fl, int err )
pamh 320 source3/pam_smbpass/support.c _pam_get_item( pamh, PAM_SERVICE, &service );
pamh 321 source3/pam_smbpass/support.c _log_err(pamh, LOG_NOTICE
pamh 330 source3/pam_smbpass/support.c _log_err(pamh, LOG_ALERT
pamh 344 source3/pam_smbpass/support.c int _smb_verify_password( pam_handle_t * pamh, struct samu *sampass,
pamh 360 source3/pam_smbpass/support.c (void) pam_fail_delay( pamh, 1000000 ); /* 1 sec delay for on failure */
pamh 366 source3/pam_smbpass/support.c _log_err(pamh, LOG_DEBUG, "user %s has null SMB password", name);
pamh 375 source3/pam_smbpass/support.c _pam_get_item( pamh, PAM_SERVICE, &service );
pamh 376 source3/pam_smbpass/support.c _log_err(pamh, LOG_NOTICE, "failed auth request by %s for service %s as %s",
pamh 384 source3/pam_smbpass/support.c _log_err(pamh, LOG_CRIT, "no memory for data-name" );
pamh 404 source3/pam_smbpass/support.c pam_set_data(pamh, data_name, NULL, _cleanup_failures);
pamh 410 source3/pam_smbpass/support.c _pam_get_item( pamh, PAM_SERVICE, &service );
pamh 423 source3/pam_smbpass/support.c _pam_get_data(pamh, data_name, &old);
pamh 431 source3/pam_smbpass/support.c _log_err(pamh, LOG_NOTICE,
pamh 438 source3/pam_smbpass/support.c _log_err(pamh, LOG_NOTICE,
pamh 443 source3/pam_smbpass/support.c newauth->user = smbpXstrDup( pamh, name );
pamh 444 source3/pam_smbpass/support.c newauth->agent = smbpXstrDup( pamh, uidtoname( getuid() ) );
pamh 445 source3/pam_smbpass/support.c pam_set_data( pamh, data_name, newauth, _cleanup_failures );
pamh 448 source3/pam_smbpass/support.c _log_err(pamh, LOG_CRIT, "no memory for failure recorder" );
pamh 449 source3/pam_smbpass/support.c _log_err(pamh, LOG_NOTICE,
pamh 455 source3/pam_smbpass/support.c _log_err(pamh, LOG_NOTICE,
pamh 503 source3/pam_smbpass/support.c int _smb_read_password( pam_handle_t * pamh, unsigned int ctrl,
pamh 528 source3/pam_smbpass/support.c retval = _pam_get_item( pamh, authtok_flag, &item );
pamh 531 source3/pam_smbpass/support.c _log_err(pamh, LOG_ALERT,
pamh 576 source3/pam_smbpass/support.c retval = converse( pamh, ctrl, i, pmsg, &resp );
pamh 584 source3/pam_smbpass/support.c token = smbpXstrDup(pamh, resp[j++].resp);
pamh 591 source3/pam_smbpass/support.c make_remark( pamh, ctrl, PAM_ERROR_MSG
pamh 596 source3/pam_smbpass/support.c _log_err(pamh, LOG_NOTICE,
pamh 610 source3/pam_smbpass/support.c _log_err(pamh, LOG_DEBUG, "unable to obtain a password");
pamh 619 source3/pam_smbpass/support.c retval = pam_set_item( pamh, authtok_flag, (const void *)token );
pamh 622 source3/pam_smbpass/support.c || (retval = _pam_get_item( pamh, authtok_flag
pamh 625 source3/pam_smbpass/support.c _log_err(pamh, LOG_CRIT, "error manipulating password");
pamh 634 source3/pam_smbpass/support.c retval = pam_set_data( pamh, data_name, (void *) token, _cleanup );
pamh 636 source3/pam_smbpass/support.c || (retval = _pam_get_data( pamh, data_name, &item ))
pamh 639 source3/pam_smbpass/support.c _log_err(pamh, LOG_CRIT, "error manipulating password data [%s]",
pamh 640 source3/pam_smbpass/support.c pam_strerror( pamh, retval ));
pamh 654 source3/pam_smbpass/support.c int _pam_smb_approve_pass(pam_handle_t * pamh,
pamh 664 source3/pam_smbpass/support.c _log_err(pamh, LOG_DEBUG,
pamh 667 source3/pam_smbpass/support.c make_remark( pamh, ctrl, PAM_ERROR_MSG, pass_new == NULL ?
pamh 679 source3/pam_smbpass/support.c int _pam_get_item(const pam_handle_t *pamh,
pamh 684 source3/pam_smbpass/support.c return pam_get_item(pamh, item_type, item);
pamh 687 source3/pam_smbpass/support.c int _pam_get_data(const pam_handle_t *pamh,
pamh 692 source3/pam_smbpass/support.c return pam_get_data(pamh, module_data_name, data);
pamh 29 source3/pam_smbpass/support.h extern int _smb_verify_password( pam_handle_t *pamh , struct samu *sampass,
pamh 52 source3/pam_smbpass/support.h int _pam_get_item(const pam_handle_t *pamh,
pamh 55 source3/pam_smbpass/support.h int _pam_get_data(const pam_handle_t *pamh,
pamh 229 source4/auth/ntlm/auth_unix.c static NTSTATUS smb_pam_start(pam_handle_t **pamh, const char *account_name, const char *remote_host, struct pam_conv *pconv)
pamh 239 source4/auth/ntlm/auth_unix.c pam_error = pam_start("samba", account_name, pconv, pamh);
pamh 248 source4/auth/ntlm/auth_unix.c pam_error = pam_set_item(*pamh, PAM_RHOST, remote_host);
pamh 253 source4/auth/ntlm/auth_unix.c pam_strerror(*pamh, pam_error)));
pamh 256 source4/auth/ntlm/auth_unix.c pam_error = pam_end(*pamh, 0);
pamh 268 source4/auth/ntlm/auth_unix.c pam_error = pam_set_item(*pamh, PAM_TTY, "samba");
pamh 273 source4/auth/ntlm/auth_unix.c pam_strerror(*pamh, pam_error)));
pamh 276 source4/auth/ntlm/auth_unix.c pam_error = pam_end(*pamh, 0);
pamh 291 source4/auth/ntlm/auth_unix.c static NTSTATUS smb_pam_end(pam_handle_t *pamh)
pamh 295 source4/auth/ntlm/auth_unix.c if (pamh != NULL) {
pamh 296 source4/auth/ntlm/auth_unix.c pam_error = pam_end(pamh, 0);
pamh 313 source4/auth/ntlm/auth_unix.c static NTSTATUS smb_pam_auth(pam_handle_t *pamh, bool allow_null_passwords, const char *user)
pamh 324 source4/auth/ntlm/auth_unix.c pam_error = pam_authenticate(pamh, PAM_SILENT | allow_null_passwords ? 0 : PAM_DISALLOW_NULL_AUTHTOK);
pamh 358 source4/auth/ntlm/auth_unix.c static NTSTATUS smb_pam_account(pam_handle_t *pamh, const char * user)
pamh 364 source4/auth/ntlm/auth_unix.c pam_error = pam_acct_mgmt(pamh, PAM_SILENT); /* Is user account enabled? */
pamh 396 source4/auth/ntlm/auth_unix.c static NTSTATUS smb_pam_setcred(pam_handle_t *pamh, const char * user)
pamh 407 source4/auth/ntlm/auth_unix.c pam_error = pam_setcred(pamh, (PAM_ESTABLISH_CRED|PAM_SILENT));
pamh 437 source4/auth/ntlm/auth_unix.c pam_handle_t *pamh;
pamh 461 source4/auth/ntlm/auth_unix.c nt_status = smb_pam_start(&pamh, user_info->mapped.account_name, user_info->remote_host ? user_info->remote_host->addr : NULL, pamconv);
pamh 466 source4/auth/ntlm/auth_unix.c nt_status = smb_pam_auth(pamh, lp_null_passwords(lp_ctx), user_info->mapped.account_name);
pamh 468 source4/auth/ntlm/auth_unix.c smb_pam_end(pamh);
pamh 474 source4/auth/ntlm/auth_unix.c nt_status = smb_pam_account(pamh, user_info->mapped.account_name);
pamh 476 source4/auth/ntlm/auth_unix.c smb_pam_end(pamh);
pamh 480 source4/auth/ntlm/auth_unix.c nt_status = smb_pam_setcred(pamh, user_info->mapped.account_name);
pamh 482 source4/auth/ntlm/auth_unix.c smb_pam_end(pamh);
pamh 487 source4/auth/ntlm/auth_unix.c smb_pam_end(pamh);