/netbsd-src/lib/libpam/modules/pam_group/ |
H A D | pam_group.c | 86 if (pwd->pw_uid != 0 && openpam_get_option(pamh, "root_only")) in pam_sm_authenticate() 96 auth = openpam_get_option(pamh, "authenticate") != NULL; in pam_sm_authenticate() 99 if ((group = openpam_get_option(pamh, "group")) == NULL) in pam_sm_authenticate() 117 if (openpam_get_option(pamh, "deny")) in pam_sm_authenticate() 133 if (openpam_get_option(pamh, "deny")) in pam_sm_authenticate() 137 if (openpam_get_option(pamh, "fail_safe")) in pam_sm_authenticate()
|
/netbsd-src/external/bsd/openpam/dist/lib/libpam/ |
H A D | pam_get_authtok.c | 112 if (openpam_get_option(pamh, "try_first_pass") || in pam_get_authtok() 113 openpam_get_option(pamh, "use_first_pass")) { in pam_get_authtok() 118 } else if (openpam_get_option(pamh, "use_first_pass")) { in pam_get_authtok() 123 if ((promptp = openpam_get_option(pamh, prompt_option)) != NULL) in pam_get_authtok() 139 style = openpam_get_option(pamh, "echo_pass") ? in pam_get_authtok()
|
H A D | openpam_get_option.c | 60 openpam_get_option(pam_handle_t *pamh, in openpam_get_option() function
|
H A D | pam_get_user.c | 79 if ((promptp = openpam_get_option(pamh, "user_prompt")) != NULL) in pam_get_user()
|
H A D | Makefile.in | 144 openpam_get_option.lo openpam_load.lo openpam_log.lo \ 193 ./$(DEPDIR)/openpam_get_option.Plo \ 436 openpam_get_option.c \ 592 @AMDEP_TRUE@@am__include@ @am__quote@./$(DEPDIR)/openpam_get_option.Plo@am__quote@ # am--include-ma… 808 -rm -f ./$(DEPDIR)/openpam_get_option.Plo 908 -rm -f ./$(DEPDIR)/openpam_get_option.Plo
|
H A D | Makefile.am | 35 openpam_get_option.c \
|
H A D | openpam_dispatch.c | 118 debug = (openpam_get_option(pamh, "debug") != NULL); in openpam_dispatch()
|
/netbsd-src/lib/libpam/modules/pam_guest/ |
H A D | pam_guest.c | 86 if ((guests = openpam_get_option(pamh, "guests")) == NULL) in pam_sm_authenticate() 93 if (!openpam_get_option(pamh, "nopass")) { in pam_sm_authenticate() 97 if (openpam_get_option(pamh, "pass_is_user") && in pam_sm_authenticate() 100 if (openpam_get_option(pamh, "pass_as_ruser")) in pam_sm_authenticate()
|
/netbsd-src/lib/libpam/modules/pam_chroot/ |
H A D | pam_chroot.c | 72 if (pwd->pw_uid == 0 && !openpam_get_option(pamh, "also_root")) in pam_sm_open_session() 85 } else if ((dir = openpam_get_option(pamh, "dir")) != NULL) { in pam_sm_open_session() 86 if ((cwd = openpam_get_option(pamh, "cwd")) == NULL) in pam_sm_open_session() 89 if (openpam_get_option(pamh, "always")) { in pam_sm_open_session()
|
/netbsd-src/lib/libpam/modules/pam_radius/ |
H A D | pam_radius.c | 277 conf_file = openpam_get_option(pamh, PAM_OPT_CONF); in pam_sm_authenticate() 278 template_user = openpam_get_option(pamh, PAM_OPT_TEMPLATE_USER); in pam_sm_authenticate() 279 nas_id = openpam_get_option(pamh, PAM_OPT_NAS_ID); in pam_sm_authenticate() 280 nas_ipaddr = openpam_get_option(pamh, PAM_OPT_NAS_IPADDR); in pam_sm_authenticate()
|
/netbsd-src/lib/libpam/modules/pam_krb5/ |
H A D | pam_krb5.c | 172 debug = openpam_get_option(pamh, PAM_OPT_DEBUG) ? 1 : 0; in pam_sm_authenticate() 187 if (!openpam_get_option(pamh, PAM_OPT_ALLOW_KDC_SPOOF)) { in pam_sm_authenticate() 200 if (openpam_get_option(pamh, PAM_OPT_FORWARDABLE)) in pam_sm_authenticate() 203 if ((rtime = openpam_get_option(pamh, PAM_OPT_RENEWABLE)) != NULL) { in pam_sm_authenticate() 234 if (openpam_get_option(pamh, PAM_OPT_AUTH_AS_SELF)) in pam_sm_authenticate() 437 if (openpam_get_option(pamh, PAM_OPT_NO_CCACHE)) in pam_sm_setcred() 504 cache_name = openpam_get_option(pamh, PAM_OPT_CCACHE); in pam_sm_setcred()
|
/netbsd-src/lib/libpam/modules/pam_unix/ |
H A D | pam_unix.c | 94 if (openpam_get_option(pamh, PAM_OPT_AUTH_AS_SELF)) { in pam_sm_authenticate() 110 openpam_get_option(pamh, PAM_OPT_NULLOK)) in pam_sm_authenticate() 419 if (openpam_get_option(pamh, PAM_OPT_AUTH_AS_SELF)) { in pam_sm_chauthtok() 446 passwd_db = openpam_get_option(pamh, "passwd_db"); in pam_sm_chauthtok()
|
/netbsd-src/lib/libpam/modules/pam_lastlog/ |
H A D | pam_lastlog.c | 174 if (openpam_get_option(pamh, "no_nested") == NULL || nuser == NULL) { in pam_sm_open_session() 198 if (openpam_get_option(pamh, "no_fail")) in pam_sm_open_session() 226 if (openpam_get_option(pamh, "no_nested") == NULL || nuser == NULL) { in pam_sm_close_session()
|
/netbsd-src/lib/libpam/modules/pam_ssh/ |
H A D | pam_ssh.c | 174 nullok = (openpam_get_option(pamh, "nullok") != NULL); in pam_sm_authenticate() 222 openpam_get_option(pamh, "try_first_pass") != NULL) { in pam_sm_authenticate() 425 openpam_get_option(pamh, "want_agent") == NULL) in pam_sm_open_session()
|
/netbsd-src/lib/libpam/libpam/ |
H A D | Makefile | 73 openpam_get_option.c \ 121 openpam_get_option.3 \
|
H A D | pam_debug_log.c | 57 if ((flags & PAM_SILENT) || openpam_get_option(pamh, "no_warn")) in _pam_verbose_error()
|
/netbsd-src/lib/libpam/modules/pam_self/ |
H A D | pam_self.c | 78 if (uid == 0 && !openpam_get_option(pamh, OPT_ALLOW_ROOT)) in pam_sm_authenticate()
|
/netbsd-src/lib/libpam/modules/pam_skey/ |
H A D | pam_skey.c | 62 if (openpam_get_option(pamh, PAM_OPT_AUTH_AS_SELF)) { in pam_sm_authenticate()
|
/netbsd-src/lib/libpam/modules/pam_rhosts/ |
H A D | pam_rhosts.c | 76 openpam_get_option(pamh, OPT_ALLOW_ROOT) == NULL) in pam_sm_authenticate()
|
/netbsd-src/external/bsd/openpam/dist/modules/pam_return/ |
H A D | pam_return.c | 56 if ((errname = openpam_get_option(pamh, "error")) == NULL || in pam_return()
|
/netbsd-src/external/bsd/openpam/dist/doc/man/ |
H A D | Makefile.am | 40 openpam_get_option.3 \
|
H A D | Makefile.in | 337 openpam_get_option.3 \
|
/netbsd-src/lib/libpam/modules/pam_ftpusers/ |
H A D | pam_ftpusers.c | 115 allow = (openpam_get_option(pamh, "disallow") == NULL); in pam_sm_acct_mgmt()
|
/netbsd-src/external/bsd/openpam/dist/include/security/ |
H A D | openpam.h | 77 openpam_get_option(pam_handle_t *_pamh,
|
/netbsd-src/external/bsd/openpam/dist/ |
H A D | HISTORY | 489 - ENHANCE: Added openpam_get_option() and openpam_set_option().
|