Searched refs:pam_status (Results 1 - 25 of 27) sorted by relevance

12

/sssd/src/providers/ldap/
H A Dldap_access.c61 pd->pam_status = PAM_SYSTEM_ERR;
91 state->pd->pam_status = PAM_SUCCESS;
94 state->pd->pam_status = PAM_ACCT_EXPIRED;
99 state->pd->pam_status = PAM_PERM_DENIED;
102 state->pd->pam_status = PAM_NEW_AUTHTOK_REQD;
106 state->pd->pam_status = PAM_SYSTEM_ERR;
H A Dldap_auth.c932 pd->pam_status = PAM_SYSTEM_ERR;
939 pd->pam_status = PAM_SYSTEM_ERR;
949 pd->pam_status = PAM_SYSTEM_ERR;
956 pd->pam_status = PAM_SYSTEM_ERR;
963 pd->pam_status = PAM_SUCCESS;
966 pd->pam_status = PAM_MODULE_UNKNOWN;
1001 state->pd->pam_status = PAM_SYSTEM_ERR;
1008 state->pd->pam_status = PAM_SUCCESS;
1011 state->pd->pam_status = PAM_PERM_DENIED;
1014 state->pd->pam_status
[all...]
/sssd/src/responder/pam/
H A Dpamsrv_dp.c64 preq->pd->pam_status = PAM_SYSTEM_ERR;
74 preq->pd->pam_status = PAM_SYSTEM_ERR;
78 "received: [%d (%s)][%s]\n", preq->pd->pam_status,
79 pam_strerror(NULL, preq->pd->pam_status),
84 preq->pd->pam_status = PAM_SYSTEM_ERR;
88 preq->pd->pam_status = PAM_SYSTEM_ERR;
H A Dpam_LOCAL_domain.c67 if (lreq->error != EOK && pd->pam_status == PAM_SUCCESS)
68 pd->pam_status = PAM_SYSTEM_ERR;
107 pd->pam_status = PAM_AUTH_ERR;
153 pd->pam_status = PAM_PERM_DENIED;
250 pd->pam_status = PAM_SUCCESS;
264 pd->pam_status = PAM_USER_UNKNOWN;
H A Dpamsrv_cmd.c460 preq->pd->pam_status = PAM_SYSTEM_ERR;
720 pd->pam_status, pam_strerror(NULL, pd->pam_status));
721 if (pd->pam_status == PAM_AUTHINFO_UNAVAIL || preq->use_cached_auth) {
768 pd->pam_status = PAM_AUTHTOK_ERR;
786 pd->pam_status = PAM_SUCCESS;
790 pd->pam_status = PAM_MODULE_UNKNOWN;
794 if (pd->pam_status == PAM_SUCCESS && pd->cmd == SSS_PAM_CHAUTHTOK) {
828 pd->pam_status == PAM_SUCCESS &&
850 if (pd->pam_status
[all...]
/sssd/src/tests/cmocka/
H A Dtest_krb5_wait_queue.c37 int pam_status; member in struct:krb5_mocked_auth_state
66 state->pam_status = sss_mock_type(int);
108 *_pam_status = state->pam_status;
166 int pam_status,
174 will_return(krb5_auth_send, pam_status);
212 int pam_status; local
215 ret = krb5_auth_queue_recv(req, &pam_status, &dp_err);
255 int pam_status; local
258 ret = krb5_auth_queue_recv(req, &pam_status, &dp_err);
302 int pam_status; local
162 test_krb5_wait_mock(struct test_krb5_wait_queue *test_ctx, const char *username, time_t us_delay, int ret, int pam_status, int dp_err) argument
[all...]
/sssd/src/providers/data_provider/
H A Ddp_target_auth.c40 "Sending result [%d][%s]", pd->pam_status, pd->domain);
78 pd->pam_status = PAM_SYSTEM_ERR;
132 pd->pam_status = PAM_SUCCESS;
138 pd->pam_status = PAM_SUCCESS;
144 pd->pam_status = PAM_SUCCESS;
152 pd->pam_status = PAM_MODULE_UNKNOWN;
161 pd->pam_status = PAM_MODULE_UNKNOWN;
243 if (pd->cmd == SSS_PAM_ACCT_MGMT && pd->pam_status == PAM_SUCCESS) {
H A Ddp_builtin.c50 state->pd->pam_status = PAM_SUCCESS;
96 state->pd->pam_status = PAM_PERM_DENIED;
/sssd/src/providers/krb5/
H A Dkrb5_auth.c248 int *pam_status, int *dp_err)
264 *pam_status = PAM_SYSTEM_ERR;
273 *pam_status = cached_login_pam_status(ret);
284 *pam_status = PAM_AUTHINFO_UNAVAIL;
417 int pam_status; member in struct:krb5_auth_state
452 state->pam_status = PAM_SYSTEM_ERR;
475 state->pam_status = PAM_AUTH_ERR;
486 state->pam_status = PAM_SYSTEM_ERR;
497 state->pam_status = PAM_PERM_DENIED;
510 state->pam_status
244 krb5_auth_cache_creds(struct krb5_ctx *krb5_ctx, struct sss_domain_info *domain, struct confdb_ctx *cdb, struct pam_data *pd, uid_t uid, int *pam_status, int *dp_err) argument
1145 krb5_auth_recv(struct tevent_req *req, int *pam_status, int *dp_err) argument
[all...]
H A Dkrb5_wait_queue.c48 int pam_status, int dp_err);
72 int pam_status; local
76 ret = krb5_auth_recv(req, &pam_status, &dp_err);
82 krb5_auth_queue_finish(parent_req, ret, pam_status, dp_err);
246 int pam_status; member in struct:krb5_auth_queue_state
314 ret = krb5_auth_recv(subreq, &state->pam_status, &state->dp_err);
336 int pam_status,
344 state->pam_status = pam_status;
365 *_pam_status = state->pam_status;
334 krb5_auth_queue_finish(struct tevent_req *req, errno_t ret, int pam_status, int dp_err) argument
[all...]
H A Dkrb5_delayed_online_authentication.c122 int pam_status = PAM_SYSTEM_ERR; local
125 ret = krb5_auth_queue_recv(req, &pam_status, &dp_err);
130 if (pam_status == PAM_SUCCESS) {
H A Dkrb5_auth.h99 int krb5_auth_recv(struct tevent_req *req, int *pam_status, int *dp_err);
H A Dkrb5_renew_tgt.c89 int pam_status = PAM_SYSTEM_ERR; local
93 ret = krb5_auth_queue_recv(req, &pam_status, &dp_err);
103 switch (pam_status) {
/sssd/src/providers/proxy/
H A Dproxy_child.c182 int pam_status; local
242 pam_status = pam_authenticate(pamh, 0);
245 pam_status=pam_setcred(pamh, 0);
248 pam_status=pam_acct_mgmt(pamh, 0);
251 pam_status=pam_open_session(pamh, 0);
254 pam_status=pam_close_session(pamh, 0);
259 pam_status = pam_authenticate(pamh, 0);
261 if (pam_status != PAM_SUCCESS) break;
264 pam_status = pam_chauthtok(pamh, 0);
269 pam_status
[all...]
H A Dproxy_auth.c589 state->pd->pam_status = PAM_SYSTEM_ERR;
599 state->pd->pam_status = PAM_SYSTEM_ERR;
605 state->pd->pam_status,
611 state->pd->pam_status = PAM_SYSTEM_ERR;
615 state->pd->pam_status = PAM_SYSTEM_ERR;
748 pd->pam_status = PAM_SYSTEM_ERR;
756 pd->pam_status = PAM_SUCCESS;
760 pd->pam_status = PAM_MODULE_UNKNOWN;
788 state->pd->pam_status = PAM_SYSTEM_ERR;
812 && (state->pd->pam_status
[all...]
/sssd/src/providers/ipa/
H A Dipa_auth.c206 pd->pam_status = PAM_SYSTEM_ERR;
211 pd->pam_status = PAM_SYSTEM_ERR;
238 state->pd->pam_status = PAM_SYSTEM_ERR;
239 ret = krb5_auth_queue_recv(subreq, &state->pd->pam_status, &dp_err);
241 if (ret != EOK && state->pd->pam_status != PAM_CRED_ERR) {
252 && state->pd->pam_status == PAM_CRED_ERR) {
286 state->pd->pam_status = PAM_SYSTEM_ERR;
298 state->pd->pam_status = PAM_SYSTEM_ERR;
325 state->pd->pam_status = PAM_SYSTEM_ERR;
390 state->pd->pam_status
[all...]
H A Dipa_access.c741 state->pd->pam_status = PAM_SYSTEM_ERR;
774 state->pd->pam_status = PAM_PERM_DENIED;
777 state->pd->pam_status = PAM_ACCT_EXPIRED;
782 state->pd->pam_status = PAM_SYSTEM_ERR;
789 state->pd->pam_status = PAM_SYSTEM_ERR;
816 state->pd->pam_status = PAM_PERM_DENIED;
821 state->pd->pam_status = PAM_SYSTEM_ERR;
828 state->pd->pam_status = PAM_SUCCESS;
830 state->pd->pam_status = PAM_PERM_DENIED;
832 state->pd->pam_status
[all...]
H A Dipa_selinux.c1542 pd->pam_status = PAM_SYSTEM_ERR;
1649 state->pd->pam_status = PAM_SYSTEM_ERR;
1657 state->pd->pam_status = PAM_SUCCESS;
/sssd/src/sss_client/
H A Dpam_sss.c822 int32_t pam_status; local
830 memcpy(&pam_status, buf+p, sizeof(int32_t));
1146 int pam_status = PAM_SYSTEM_ERR; local
1153 pam_status = PAM_SYSTEM_ERR;
1170 pam_status = PAM_AUTHINFO_UNAVAIL;
1177 pam_status = PAM_SYSTEM_ERR;
1181 SAFEALIGN_COPY_UINT32(&pam_status, repbuf, NULL);
1185 pam_status = ret;
1191 logger(pamh, (pam_status == PAM_SUCCESS ? LOG_INFO : LOG_NOTICE),
1194 pam_status
1701 int pam_status; local
1756 int pam_status; local
[all...]
/sssd/src/providers/simple/
H A Dsimple_access.c201 pd->pam_status = PAM_SYSTEM_ERR;
205 pd->pam_status = PAM_MODULE_UNKNOWN;
217 pd->pam_status = PAM_PERM_DENIED;
225 pd->pam_status = PAM_SYSTEM_ERR;
254 state->pd->pam_status = PAM_SYSTEM_ERR;
259 state->pd->pam_status = PAM_SUCCESS;
261 state->pd->pam_status = PAM_PERM_DENIED;
/sssd/src/providers/
H A Ddp_auth_util.c150 uint32_t pam_status; local
156 pam_status = pd->pam_status;
158 DBUS_TYPE_UINT32, &pam_status);
250 dbus_message_iter_get_basic(&iter, &(pd->pam_status));
H A Ddata_provider.h178 int pam_status; member in struct:pam_data
H A Ddp_pam_data_util.c53 pd->pam_status = PAM_SYSTEM_ERR;
/sssd/src/tests/cmocka/data_provider/
H A Dtest_dp_builtin.c106 assert_int_equal(pd->pam_status, PAM_PERM_DENIED);
133 assert_int_equal(pd->pam_status, PAM_SUCCESS);
/sssd/src/providers/ad/
H A Dad_access.c488 pd->pam_status = PAM_SYSTEM_ERR;
517 state->pd->pam_status = PAM_SUCCESS;
520 state->pd->pam_status = PAM_PERM_DENIED;
523 state->pd->pam_status = PAM_ACCT_EXPIRED;
526 state->pd->pam_status = PAM_SYSTEM_ERR;

Completed in 115 milliseconds

12