Commit Graph

111 Commits

Author SHA1 Message Date
christos 50873dad9c bump date 2007-03-10 18:31:42 +00:00
christos 6ccceec0a3 tyop 2007-03-10 18:31:07 +00:00
christos 33aa8ab0d0 off by one, reported by jukka salmi. 2007-03-10 18:30:45 +00:00
christos 476933786a PR/35968: Jukka Salmi: add option to pam_krb5(8) to request renewable tickets 2007-03-10 17:47:21 +00:00
hubertf 4d49175215 Remove unneeded #include of <libgen.h>
From: Slava Semushin <php-coder@altlinux.ru>
2007-03-09 23:44:50 +00:00
christos 4ed3eb7f90 init the syslog data. 2006-11-03 18:55:40 +00:00
christos e76ecd93c1 use the re-entrant syslog functions so that we don't depend on the syslog
settings of the calling program.
2006-11-03 18:04:20 +00:00
christos 105f63f965 don't include syslog.h if you are not going to use it. 2006-11-03 18:03:23 +00:00
dogcow f35a70b511 new ssh import requires another include 2006-09-29 04:56:04 +00:00
jnemeth 74cf788741 PR/30730 force changing password via chsh fails
PR/33502 password aging not working
copy old_pwd to new_pwd before modifying
2006-05-30 19:48:07 +00:00
christos d49dbefade Coverity CID 3783: Fix uninit variable. 2006-05-25 15:27:35 +00:00
christos 4d02435f76 Coverity CID 3677: Plug memory leak 2006-05-23 00:58:42 +00:00
christos ad04b86013 Remove old kerberos library (Jukka Salmi) 2006-03-20 21:22:40 +00:00
christos 85e611dd01 Goodbye KerberosIV 2006-03-20 04:03:10 +00:00
christos 6b8123e7e5 Coverity CID 1909: Prevent memory leak. 2006-03-19 21:21:18 +00:00
christos e5d241d0e4 Coverity CID 2480: Move variable initialization higher up to prevent
uninitialized access during error cleanup.
2006-03-19 21:15:21 +00:00
christos 81cd8f57a4 Coverity CID 2481: Move initialization of variable higher up to prevent
uninitialized access in error path.
2006-03-19 21:11:28 +00:00
christos 082737ff51 Coverity CID 2595: Don't call cc_destroy after cc_close because cc_close
free's the second argument.
2006-03-19 21:07:55 +00:00
jnemeth 0c47a67596 Fix coverity run 5, issue 2018 -- memory leak.
Approved by christos.
2006-03-19 06:52:26 +00:00
jnemeth 216a33af30 Fix Coverity run 5, issue 2022 -- memory leak.
Approved by christos@.
2006-03-18 10:53:17 +00:00
jnemeth f358706242 Fix Coverity run 5, issue 2498 -- uninitialized variable
Fix Coverity run 5, issue 707 -- unreachable code
Approved by Christos.
2006-03-18 10:06:16 +00:00
jnemeth 9804398129 PR/30923: Zafer Aydogan: pam too verbose
Syslog root login failures on insecure terminals.

Approved by christos@.
2006-03-06 23:08:20 +00:00
christos e551462e89 PR/32870: Johan Veenhuizen: login(1) does not obey .hushlogin 2006-02-19 00:12:36 +00:00
bouyer 5cd3d133bf Use the class of the user, not then default class, when checking for
nologin and ignorelogin login.conf(5) capabilities.
2006-02-15 20:28:32 +00:00
christos e531452f6f define where the dynamic modules go. 2006-02-05 02:38:25 +00:00
christos ba9fdf89e5 Add all the modules to the static pam. This is required, otherwise pam does
not work on non pic builds because it does not find modules listed in
/etc/pam.d.
2006-01-20 16:52:55 +00:00
christos 7768338003 Declare what we services provide, otherwise pam assumes that we provide
everything and this breaks static linking.
2006-01-20 16:51:15 +00:00
tsarna 9b412b7436 Implement PAM_REFRESH_CRED / PAM_REINITIALIZE_CRED
support in pam_sm_setcred()

With this and a suitably pam-aware screen locker (eg xscreensaver built
with PAM), you now get the nice Windows-style behavior of having
your tickets refreshed (and tokens, with pam_afslog) when you unlock
your screen.
2005-09-27 14:38:19 +00:00
wiz d61c7b6e74 Remove trailing whitespace. Punctuation nits. Use .Nm more.
Use .An. Sort SEE ALSO.
2005-09-23 19:56:16 +00:00
tsarna 4019a4212f pam_afslog is used in conjunction with pam_krb5 to obtain AFS tokens and
create a PAG if necessary.

Especially important for home directories on AFS.
2005-09-21 14:19:08 +00:00
christos 98785bd85a Get rid of pam debugging.
XXX: We should do this on the 3.0 branch too.
2005-08-28 07:41:41 +00:00
matt ae59c445be Remove CPPFLAGS 2005-04-25 17:21:31 +00:00
matt 51ba88ed0f Add ${DESTDIR}/usr/include/krb5 to CPPFLAGS so <parse_units.h> can be found. 2005-04-25 15:43:34 +00:00
matt bb1ca526b7 Don't cast the lvalue; cast the rhs instead. 2005-04-25 15:42:46 +00:00
yamt 8c79aa408b s!/var/run/nologin!/etc/nologin!g to match with the code. 2005-04-25 10:24:06 +00:00
christos b4073cddaf Fix getgrnam -> getgrnam_r 2005-04-19 13:04:38 +00:00
christos e640241b82 fix getgrnam -> getgrnam_r and add a forgotten getpwnam -> gepwnam_r
From john nemeth
2005-04-19 13:04:19 +00:00
lukem 01cf9d0263 Safety boots: don't depend upon getpwnam_r() to set pwd to NULL on all
failures, especially if we're going to ignore the return result.
2005-04-19 03:40:16 +00:00
lukem a767f5ec9c getpw*_r() may return 0 and set pwd==NULL 2005-04-19 03:38:08 +00:00
christos 2a62e4e1ad check for pwd != in getpw*_r functions. 2005-04-19 03:15:34 +00:00
christos b4eda329f4 Don't print an error if we are doing authentication. 2005-04-05 18:24:17 +00:00
thorpej 59cbc9e205 Use getpwnam_r(). 2005-03-31 15:11:54 +00:00
christos 611fb1aa58 Make S/Key prompt compliant with RFC 2289. Patch supplied by Dave Huang
in PR bin/23167.
2005-03-20 16:48:47 +00:00
christos dbf71d82fb remove debugging printf's 2005-03-17 01:14:40 +00:00
christos 99186ebfc8 Clear the authorization token at the entry of each loop, so that
we get a chance to re-enter.
2005-03-17 01:13:59 +00:00
christos 52ffc9e55d remove code to deal with authorized keys. it has no place here. 2005-03-14 23:39:26 +00:00
christos 041bcdce98 Go back to rev-1.5. This is better than what was there before, but I am
still uncertain about the proper way to dealing what keys to accept.
2005-03-14 05:45:48 +00:00
christos 56cc440468 Revert previous. This is not the right fix. 2005-03-14 05:40:35 +00:00
christos adb433f9e5 Do not let keys that are not listed in authorized_keys participate
in authentication. Problem reported by Maximum Entropy.
2005-03-14 05:35:23 +00:00
christos 811c70b5c5 Free the prompt response. 2005-03-05 20:33:40 +00:00