summaryrefslogtreecommitdiffstats
path: root/auth-pam.h (follow)
Commit message (Collapse)AuthorAgeFilesLines
* remove PAM dependencies on old packet APIDamien Miller2019-01-201-1/+1
| | | | | Requires some caching of values, because the PAM code isn't always called with packet context.
* upstream: switch over to the new authorized_keys options API anddjm@openbsd.org2018-03-031-1/+3
| | | | | | | | | | | remove the legacy one. Includes a fairly big refactor of auth2-pubkey.c to retain less state between key file lines. feedback and ok markus@ OpenBSD-Commit-ID: dece6cae0f47751b9892080eb13d6625599573df
* Remove do_pam_set_tty which is dead code.Darren Tucker2016-10-141-1/+0
| | | | | The callers of do_pam_set_tty were removed in 2008, so this is now dead code. bz#2604, pointed out by jjelen at redhat.com.
* Remove obsolete CVS $Id from source files.Darren Tucker2016-08-171-2/+0
| | | | | Since -portable switched to git the CVS $Id tags are no longer being updated and are becoming increasingly misleading. Remove them.
* add --with-pam-service to specify PAM service nameDamien Miller2016-08-161-4/+0
| | | | Saves messing around with CFLAGS to do it.
* Handle PAM_MAXTRIES from modules.Darren Tucker2016-07-181-0/+2
| | | | | | | | | | | bz#2249: handle the case where PAM returns PAM_MAXTRIES by ceasing to offer password and keyboard-interative authentication methods. Should prevent "sshd ignoring max retries" warnings in the log. ok djm@ It probably won't trigger with keyboard-interactive in the default configuration because the retry counter is stored in module-private storage which goes away with the sshd PAM process (see bz#688). On the other hand, those cases probably won't log a warning either.
* - (dtucker) [auth-pam.c auth-pam.h session.c] Bug #890: Send output fromDarren Tucker2004-09-111-1/+2
| | | | | failing PAM session modules to user then exit, similar to the way /etc/nologin is handled. ok djm@
* - (dtucker) [auth-pam.c auth-pam.h auth-passwd.c]: Bug #874: Re-add PAMDarren Tucker2004-05-301-1/+2
| | | | support for PasswordAuthentication=yes. ok djm@
* - (dtucker) [auth-pam.c auth-pam.h auth1.c auth2.c monitor.c monitor_wrap.cDarren Tucker2004-03-081-2/+2
| | | | | | | monitor_wrap.h] Bug #808: Ensure force_pwchange is correctly initialized even if keyboard-interactive is not used by the client. Prevents segfaults in some cases where the user's password is expired (note this is not considered a security exposure). ok djm@
* - (dtucker) [auth-pam.c auth-pam.h session.c] Bug #14: Use do_pwchange toDarren Tucker2004-02-101-3/+1
| | | | | change expired PAM passwords for SSHv1 connections without privsep. pam_chauthtok is still used when privsep is disabled. ok djm@
* - (djm) Export environment variables from authentication subprocess toDamien Miller2003-11-171-1/+2
| | | | parent. Part of Bug #717
* - (dtucker) [auth-pam.c auth-pam.h session.c] Make PAM use the new staticDarren Tucker2003-10-071-1/+3
| | | | cleanup functions. With & ok djm@
* - (djm) Bug #423: reorder setting of PAM_TTY and calling of PAM sessionDamien Miller2003-09-021-2/+3
| | | | | management (now done in do_setusercontext). Largely from michael_steffens AT hp.com
* - (dtucker) [Makefile.in acconfig.h auth-krb5.c auth-pam.c auth-pam.hDarren Tucker2003-08-261-1/+2
| | | | | configure.ac defines.h gss-serv-krb5.c session.c ssh-gss.h sshconnect1.c sshconnect2.c] Add Portable GSSAPI support, patch by Simon Wilkinson.
* - (djm) Bug #564: Perform PAM account checks for all authentications whenDamien Miller2003-08-251-2/+2
| | | | UsePAM=yes; ok dtucker
* - (djm) Sync auth-pam.h with what we actually implementDamien Miller2003-05-191-12/+8
|
* - (djm) Merge FreeBSD PAM code: replaces PAM password auth kludge withAFTER_FREEBSD_PAM_MERGEDamien Miller2003-05-101-3/+3
| | | | proper challenge-response module
* - (stevesk) [auth-pam.[ch] session.c] pam_getenvlist() must beKevin Steves2002-07-231-1/+2
| | | | freed by the caller; add free_pam_environment() and use it.
* - (stevesk) [auth-pam.[ch] ssh.h] move SSHD_PAM_SERVICE to auth-pam.hKevin Steves2002-07-221-1/+5
|
* - (stevesk) [auth-pam.h] unneeded includeKevin Steves2002-07-221-3/+1
|
* - (stevesk) [auth-pam.h] licenseKevin Steves2002-07-221-1/+25
|
* - (stevesk) [auth-pam.c auth-pam.h auth-passwd.c auth-sia.c auth-sia.hKevin Steves2002-04-041-2/+2
| | | | auth1.c auth2.c] PAM, OSF_SIA password auth cleanup; from djm.
* - (djm) Reestablish PAM credentials (which can be supplemental groupDamien Miller2001-03-271-2/+2
| | | | | memberships) after initgroups() blows them away. Report and suggested fix from Nalin Dahyabhai <nalin@redhat.com>
* - (djm) Clean up PAM namespace. Suggested by Darren MoffatDamien Miller2001-02-151-3/+3
| | | | <Darren.Moffat@eng.sun.com>
* - (djm) Add CVS Id's to files that we have missedDamien Miller2001-02-091-0/+2
|
* - (djm) Much KNF on PAM codeDamien Miller2001-02-071-0/+1
| | | | | | | | - (djm) Revise auth-pam.c conversation function to be a little more readable. - (djm) Revise kbd-int PAM conversation function to fold all text messages to before first prompt. Fixes hangs if last pam_message did not require a reply. - (djm) Fix password changing when using PAM kbd-int authentication
* - (djm) Merge patch from Tim Waugh (via Nalin Dahyabhai <nalin@redhat.com>)Damien Miller2001-01-191-1/+1
| | | | to fix NULL pointer deref and fake authloop breakage in PAM code.
* - (djm) Added patch from Nalin Dahyabhai <nalin@redhat.com> to enableDamien Miller2000-12-031-0/+2
| | | | | PAM authentication using KbdInteractive. - (djm) Added another TODO
* function prototype and definition consistency cleanup.Kevin Steves2000-10-141-2/+2
|
* - (stevesk) ~/.hushlogin shouldn't cause required password change toKevin Steves2000-10-141-0/+1
| | | | be bypassed.
* - (djm) Add Steve VanDevender's <stevev@darkwing.uoregon.edu> PAMDamien Miller2000-09-161-0/+1
| | | | | password change patch. - (djm) Bring licenses on my stuff in line with OpenBSD's
* Add const to suppress compiler warningDamien Miller2000-01-271-1/+1
|
* - Removed most of the pam code into its own file auth-pam.[ch]. ThisDamien Miller1999-12-301-0/+15
cleaned up sshd.c up significantly. - Several other cleanups