search for: pam_cleanup_proc

Displaying 6 results from an estimated 6 matches for "pam_cleanup_proc".

2001 Jan 30
1
PAM namespace.
auth-pam.c declares some new functions in the pam_ namespace that are not part of PAM. pam_password_change_required() pam_msg_cat() pam_cleanup_proc() Purely to avoid any possible future problems I would suggest changing these so they do not being with pam_, suggestions include: __ssh_pam_msg_cat() ssh_pam_msg_cat() do_pam_msg_cat() cat_pam_msg() Please don't take this as a hint that any of these functions are going to appear in a fu...
1998 Oct 07
1
Re: sshd and PAM [summary]
-----BEGIN PGP SIGNED MESSAGE----- Hi, I''ve got several replies, thank you for them. Let me summarize: o Many people say there is a PAMified version of ssh available at ftp://ftp.replay.com/pub/crypto/redhat/SRPMS (the source) ftp://ftp.replay.com/pub/crypto/redhat/i386 (Intel binaries) (there are analogous paths for the other architectures). The packages are made by Jan
1999 Nov 22
0
OpenSSH 1.2pre14 fails on pam_open_session() ...
Anyone out there know more about PAM under Solaris 7/x86 then I do, that can maybe tackle this, and/or suggestion a route to take to fix? After doing some debugging, it looks like the problem is a seg fault at: sshd.c:void pam_cleanup_proc(void *context) =========================================== debug("PAM_retval(open_session) about to run"); pam_retval = pam_open_session((pam_handle_t *)pamh, 0); debug("PAM_retval(open_session) successful"); if (pam_retval != PAM_SUCCESS) { log("PAM session s...
1999 Dec 28
0
Patches to report rsaref build and to call pam_setcred
...--------- --- sshd.c Mon Dec 27 23:09:36 1999 +++ sshd.c Tue Dec 28 10:57:00 1999 @@ -149,6 +149,7 @@ int do_pam_auth(const char *user, const char *password); void do_pam_account(char *username, char *remote_user); void do_pam_session(char *username, char *ttyname); +void do_pam_setcred(); void pam_cleanup_proc(void *context); static struct pam_conv conv = { @@ -230,6 +231,12 @@ PAM_STRERROR((pam_handle_t *)pamh, pam_retval)); } + pam_retval = pam_setcred((pam_handle_t *)pamh, PAM_DELETE_CRED); + if (pam_retval != PAM_SUCCESS) { + log("Cannot delete credentials: %.200s", + PAM...
1999 Nov 21
1
openssh 1.2pre13 on Linux/i386 RH4.2 problems
...ade PAM from source, but I'd probably break other programs. gcc -g -O2 -Wall -I/usr/local/ssl/include -DETCDIR=\"/etc/ssh\" -DSSH_PROGRAM=\"/usr/bin/ssh\" -DASKPASS_PROGRAM=\"/usr/libexec/ssh/ssh-askpass\" -DHAVE_CONFIG_H -c sshd.c -o sshd.o sshd.c: In function `pam_cleanup_proc': sshd.c:224: warning: passing arg 1 of `pam_strerror' makes integer from pointer without a cast sshd.c:224: too many arguments to function `pam_strerror' sshd.c:231: warning: passing arg 1 of `pam_strerror' makes integer from pointer without a cast sshd.c:231: too many arguments to...
1998 Oct 29
0
Digest.
.../ + break; + case PAM_ERROR_MSG: + default: + /* Must be an error of some sort... */ + free (reply); + return PAM_CONV_ERR; + } + } + if (reply) *resp = reply; + return PAM_SUCCESS; +} + +static struct pam_conv conv = { + pamconv, + NULL +}; + +void pam_cleanup_proc (void *context) { + if (retval == PAM_SUCCESS) + retval = pam_close_session ((pam_handle_t *)pamh, 0); + if (pam_end ((pam_handle_t *)pamh, retval) != PAM_SUCCESS) + log_msg ("Cannot release PAM authentication."); +} +#endif /* HAVE_PAM */ /* Signal handler for SIGHUP. Sshd...