version 1.14, 2009/11/18 17:06:23 |
version 1.14.6.1, 2014/05/22 11:36:59 |
Line 111 pam_sm_authenticate(pam_handle_t *pamh, |
|
Line 111 pam_sm_authenticate(pam_handle_t *pamh, |
|
return (PAM_SUCCESS); |
return (PAM_SUCCESS); |
realpw = "*"; |
realpw = "*"; |
} |
} |
lc = login_getpwclass(pwd); |
|
} else { |
} else { |
PAM_LOG("Doing dummy authentication"); |
PAM_LOG("Doing dummy authentication"); |
realpw = "*"; |
realpw = "*"; |
lc = login_getclass(NULL); |
|
} |
} |
|
lc = login_getpwclass(pwd); |
retval = pam_get_authtok(pamh, PAM_AUTHTOK, &pass, NULL); |
retval = pam_get_authtok(pamh, PAM_AUTHTOK, &pass, NULL); |
login_close(lc); |
login_close(lc); |
if (retval != PAM_SUCCESS) |
if (retval != PAM_SUCCESS) |
Line 300 yp_set_password(pam_handle_t *pamh, stru |
|
Line 299 yp_set_password(pam_handle_t *pamh, stru |
|
goto malloc_failure; |
goto malloc_failure; |
if ((yppwd.newpw.pw_name = strdup(pwd->pw_name)) == NULL) |
if ((yppwd.newpw.pw_name = strdup(pwd->pw_name)) == NULL) |
goto malloc_failure; |
goto malloc_failure; |
yppwd.newpw.pw_uid = pwd->pw_uid; |
yppwd.newpw.pw_uid = (int)pwd->pw_uid; |
yppwd.newpw.pw_gid = pwd->pw_gid; |
yppwd.newpw.pw_gid = (int)pwd->pw_gid; |
if ((yppwd.newpw.pw_gecos = strdup(pwd->pw_gecos)) == NULL) |
if ((yppwd.newpw.pw_gecos = strdup(pwd->pw_gecos)) == NULL) |
goto malloc_failure; |
goto malloc_failure; |
if ((yppwd.newpw.pw_dir = strdup(pwd->pw_dir)) == NULL) |
if ((yppwd.newpw.pw_dir = strdup(pwd->pw_dir)) == NULL) |
Line 543 pam_sm_chauthtok(pam_handle_t *pamh, int |
|
Line 542 pam_sm_chauthtok(pam_handle_t *pamh, int |
|
|
|
PAM_LOG("UPDATE round"); |
PAM_LOG("UPDATE round"); |
|
|
if ((lc = login_getclass(pwd->pw_class)) != NULL) { |
if ((lc = login_getpwclass(pwd)) != NULL) { |
min_pw_len = (int) login_getcapnum(lc, |
min_pw_len = (int) login_getcapnum(lc, |
"minpasswordlen", (quad_t)0, (quad_t)0); |
"minpasswordlen", (quad_t)0, (quad_t)0); |
pw_expiry = (int) login_getcapnum(lc, |
pw_expiry = (int) login_getcapnum(lc, |