Displaying 6 results from an estimated 6 matches for "pam_cleanup_proc".
2001 Jan 30
1
PAM namespace.
auth-pam.c declares some new functions in the pam_ namespace that are not
part of PAM.
pam_password_change_required()
pam_msg_cat()
pam_cleanup_proc()
Purely to avoid any possible future problems I would suggest changing
these so they do not being with pam_, suggestions include:
__ssh_pam_msg_cat()
ssh_pam_msg_cat()
do_pam_msg_cat()
cat_pam_msg()
Please don't take this as a hint that any of these functions are going
to appear in a fu...
1998 Oct 07
1
Re: sshd and PAM [summary]
-----BEGIN PGP SIGNED MESSAGE-----
Hi,
I''ve got several replies, thank you for them. Let me summarize:
o Many people say there is a PAMified version of ssh available at
ftp://ftp.replay.com/pub/crypto/redhat/SRPMS (the source)
ftp://ftp.replay.com/pub/crypto/redhat/i386 (Intel binaries)
(there are analogous paths for the other architectures). The packages
are made by Jan
1999 Nov 22
0
OpenSSH 1.2pre14 fails on pam_open_session() ...
Anyone out there know more about PAM under Solaris 7/x86 then I do, that
can maybe tackle this, and/or suggestion a route to take to fix?
After doing some debugging, it looks like the problem is a seg fault at:
sshd.c:void pam_cleanup_proc(void *context)
===========================================
debug("PAM_retval(open_session) about to run");
pam_retval = pam_open_session((pam_handle_t *)pamh, 0);
debug("PAM_retval(open_session) successful");
if (pam_retval != PAM_SUCCESS)
{
log("PAM session s...
1999 Dec 28
0
Patches to report rsaref build and to call pam_setcred
...---------
--- sshd.c Mon Dec 27 23:09:36 1999
+++ sshd.c Tue Dec 28 10:57:00 1999
@@ -149,6 +149,7 @@
int do_pam_auth(const char *user, const char *password);
void do_pam_account(char *username, char *remote_user);
void do_pam_session(char *username, char *ttyname);
+void do_pam_setcred();
void pam_cleanup_proc(void *context);
static struct pam_conv conv = {
@@ -230,6 +231,12 @@
PAM_STRERROR((pam_handle_t *)pamh, pam_retval));
}
+ pam_retval = pam_setcred((pam_handle_t *)pamh, PAM_DELETE_CRED);
+ if (pam_retval != PAM_SUCCESS) {
+ log("Cannot delete credentials: %.200s",
+ PAM...
1999 Nov 21
1
openssh 1.2pre13 on Linux/i386 RH4.2 problems
...ade PAM from source, but
I'd probably break other programs.
gcc -g -O2 -Wall -I/usr/local/ssl/include -DETCDIR=\"/etc/ssh\" -DSSH_PROGRAM=\"/usr/bin/ssh\" -DASKPASS_PROGRAM=\"/usr/libexec/ssh/ssh-askpass\" -DHAVE_CONFIG_H -c sshd.c -o sshd.o
sshd.c: In function `pam_cleanup_proc':
sshd.c:224: warning: passing arg 1 of `pam_strerror' makes integer from pointer without a cast
sshd.c:224: too many arguments to function `pam_strerror'
sshd.c:231: warning: passing arg 1 of `pam_strerror' makes integer from pointer without a cast
sshd.c:231: too many arguments to...
1998 Oct 29
0
Digest.
.../
+ break;
+ case PAM_ERROR_MSG:
+ default:
+ /* Must be an error of some sort... */
+ free (reply);
+ return PAM_CONV_ERR;
+ }
+ }
+ if (reply) *resp = reply;
+ return PAM_SUCCESS;
+}
+
+static struct pam_conv conv = {
+ pamconv,
+ NULL
+};
+
+void pam_cleanup_proc (void *context) {
+ if (retval == PAM_SUCCESS)
+ retval = pam_close_session ((pam_handle_t *)pamh, 0);
+ if (pam_end ((pam_handle_t *)pamh, retval) != PAM_SUCCESS)
+ log_msg ("Cannot release PAM authentication.");
+}
+#endif /* HAVE_PAM */
/* Signal handler for SIGHUP. Sshd...