Lines Matching refs:pd

55 static errno_t add_expired_warning(struct pam_data *pd, long exp_time)
65 data = talloc_array(pd, uint32_t, 2);
74 ret = pam_add_response(pd, SSS_PAM_USER_INFO, 2 * sizeof(uint32_t),
84 struct pam_data *pd,
113 if (pd != NULL &&
116 ret = add_expired_warning(pd, (long) difftime(expire_time, now));
128 struct pam_data *pd)
162 if (pd != NULL && spwd->sp_max != -1 && spwd->sp_warn != -1 &&
172 ret = add_expired_warning(pd, exp);
181 static errno_t check_pwexpire_ldap(struct pam_data *pd,
195 data = talloc_size(pd, 2* sizeof(uint32_t));
218 ret = pam_add_response(pd, SSS_PAM_USER_INFO, 2* sizeof(uint32_t),
231 struct pam_data *pd,
238 ret = check_pwexpire_shadow(pw_expire_data, time(NULL), pd);
241 ret = check_pwexpire_kerberos(pw_expire_data, time(NULL), pd,
245 ret = check_pwexpire_ldap(pd, pw_expire_data,
861 struct pam_data *pd;
870 struct pam_data *pd,
884 state->pd = pd;
886 pd->pam_status = PAM_SYSTEM_ERR;
888 switch (pd->cmd) {
891 pd->user, pd->authtok, false);
893 pd->pam_status = PAM_SYSTEM_ERR;
901 pd->user, pd->authtok, true);
903 pd->pam_status = PAM_SYSTEM_ERR;
910 pd->pam_status = PAM_SYSTEM_ERR;
917 pd->pam_status = PAM_SUCCESS;
920 pd->pam_status = PAM_MODULE_UNKNOWN;
951 ret = check_pwexpire_policy(pw_expire_type, pw_expire_data, state->pd,
955 state->pd->pam_status = PAM_SYSTEM_ERR;
962 state->pd->pam_status = PAM_SUCCESS;
965 state->pd->pam_status = PAM_PERM_DENIED;
968 state->pd->pam_status = PAM_AUTH_ERR;
972 state->pd->pam_status = PAM_AUTHINFO_UNAVAIL;
976 state->pd->pam_status = PAM_ACCT_EXPIRED;
979 state->pd->pam_status = PAM_NEW_AUTHTOK_REQD;
982 state->pd->account_locked = true;
983 state->pd->pam_status = PAM_PERM_DENIED;
986 state->pd->pam_status = PAM_BAD_ITEM;
989 state->pd->pam_status = PAM_SYSTEM_ERR;
994 ret = sss_authtok_get_password(state->pd->authtok, &password, NULL);
996 ret = sysdb_cache_password(state->be_ctx->domain, state->pd->user,
1003 state->pd->user);
1006 state->pd->user);
1026 *_data = talloc_steal(mem_ctx, state->pd);
1035 struct pam_data *pd;
1047 struct pam_data *pd,
1061 state->pd = pd;
1067 pd->pam_status = PAM_AUTHINFO_UNAVAIL;
1071 if ((pd->priv == 1) && (pd->cmd == SSS_PAM_CHAUTHTOK_PRELIM) &&
1072 (sss_authtok_get_type(pd->authtok) != SSS_AUTHTOK_TYPE_PASSWORD)) {
1075 pd->pam_status = PAM_PERM_DENIED;
1080 "starting password change request for user [%s].\n", pd->user);
1082 pd->pam_status = PAM_SYSTEM_ERR;
1084 if (pd->cmd != SSS_PAM_CHAUTHTOK && pd->cmd != SSS_PAM_CHAUTHTOK_PRELIM) {
1091 pd->user, pd->authtok, true);
1093 pd->pam_status = PAM_SYSTEM_ERR;
1127 state->pd->cmd == SSS_PAM_CHAUTHTOK_PRELIM) {
1130 state->pd->pam_status = PAM_SUCCESS;
1146 state->pd->pam_status = PAM_SYSTEM_ERR;
1155 state->pd->pam_status = PAM_SYSTEM_ERR;
1169 state->pd->pam_status = PAM_MODULE_UNKNOWN;
1176 ret = sss_authtok_get_password(state->pd->authtok,
1179 state->pd->pam_status = PAM_SYSTEM_ERR;
1182 ret = sss_authtok_get_password(state->pd->newauthtok,
1185 state->pd->pam_status = PAM_SYSTEM_ERR;
1198 "%s\n", state->pd->user);
1199 state->pd->pam_status = PAM_SYSTEM_ERR;
1211 state->pd->pam_status = PAM_AUTH_ERR;
1212 ret = pack_user_info_chpass_error(state->pd, "Old password not "
1218 ret = pam_add_response(state->pd, SSS_PAM_USER_INFO,
1227 state->pd->pam_status = PAM_AUTHINFO_UNAVAIL;
1231 state->pd->pam_status = PAM_SYSTEM_ERR;
1258 state->pd->pam_status = PAM_SUCCESS;
1261 state->pd->pam_status = PAM_NEW_AUTHTOK_REQD;
1264 state->pd->pam_status = PAM_AUTHTOK_ERR;
1267 state->pd->pam_status = PAM_SYSTEM_ERR;
1271 if (state->pd->pam_status != PAM_SUCCESS && user_error_message != NULL) {
1272 ret = pack_user_info_chpass_error(state->pd, user_error_message,
1277 ret = pam_add_response(state->pd, SSS_PAM_USER_INFO, msg_len, msg);
1284 if (state->pd->pam_status == PAM_SUCCESS &&
1293 state->pd->pam_status = PAM_SYSTEM_ERR;
1319 state->pd->pam_status = PAM_SYSTEM_ERR;
1323 state->pd->pam_status = PAM_SUCCESS;
1341 *_data = talloc_steal(mem_ctx, state->pd);