summaryrefslogtreecommitdiffstats
path: root/sss_client/pam_sss.c
Commit message (Collapse)AuthorAgeFilesLines
* Add missing includeJakub Hrozek2010-02-051-0/+1
|
* Warn the user if authentication happens offlineSumit Bose2010-02-021-0/+82
|
* Improve logging of pam_sssSumit Bose2010-02-011-9/+46
| | | | | | | | | | To avoid unnecessary messages in the log files of the system we only send log messages for PAM modules type which are explicitly handled by sssd. Furthermore only the authentication modules sends a log message when the operation was successful. All other modules only sends a message if an error occurs. This patch should fix bz556534.
* Avoid 'PAM' at the beginning of define and enum namesSumit Bose2010-02-011-27/+28
|
* Rename PAM_USER_INFO to PAM_SYSTEM_INFOSumit Bose2010-02-011-2/+2
|
* Pointers to non 32 bit aligned data were being cast to uint32_t *George McCollister2010-01-221-27/+38
| | | | | | | | uint32_t pointers must point to 32 bit aligned data on ARM. Instead of padding the data to force it into alignment I altered the code to memcpy the data to an aligned location. I'd appreciate any and all feedback especially on whether I took the best approach. pam_test_client auth and pam_test_client acct now work on my armeb-xscale-linux-gnueabi target. Signed-off-by: George McCollister <georgem@opteron.novatech-llc.com>
* Handle chauthtok with PAM_PRELIM_CHECK separatelySumit Bose2009-12-181-1/+1
| | | | | | If pam_sm_chauthtok is called with the flag PAM_PRELIM_CHECK set we generate a separate call to the sssd to validate the old password before asking for a new password and sending the change password request.
* Clean up unused dependenciesStephen Gallagher2009-11-061-1/+0
|
* use old password if available during password changeSumit Bose2009-10-141-8/+9
| | | | | | - if the password is reset by root we do not ask for a password during PAM_PRELIM_CHECK. But if there is one available during PAM_UPDATE_AUTHTOK we will use it, because now we are in an expired password dialog.
* add syslog message similar to pam_unixSumit Bose2009-10-081-2/+14
|
* ask for new password if password is expiredSumit Bose2009-10-051-7/+40
|
* move password handling into subroutinesSumit Bose2009-10-051-71/+117
|
* make cli_pid mandatory and increase version number of pam protocolSumit Bose2009-09-141-2/+2
|
* remove unused client locale from PAM protocolSumit Bose2009-09-141-19/+0
|
* Let the PAM client send its PIDSumit Bose2009-09-141-9/+34
| | | | | | - the client sends the PID as uint32_t and sssd will use uint32_t too - fix a possible type issue where a uint32_t is sent as int32 in internal dbus communication
* Add copyright noticesJakub Hrozek2009-09-111-0/+20
| | | | Fixes: #138
* do not show server messages to userSumit Bose2009-08-271-5/+0
|
* cleanup of pam_sssSumit Bose2009-07-221-250/+241
| | | | | - make pam_sss work with pam_cracklib and similar pam modules - clean up the if-&&-else-|| jungle to make clear what is happening
* Cleanup warnings in client and server codeSimo Sorce2009-07-031-2/+2
|
* added kerberos backend with tevent_req event handlingSumit Bose2009-07-021-1/+1
|
* Implement _pam_overwrite_n(n,x) for older systemsStephen Gallagher2009-06-251-0/+1
| | | | | | | | OSes based on older versions of the PAM development libraries lack the _pam_overwrite_n(n,x) macro. This patch copies the Fedora 11 pam-devel-1.0.91-6 implementation into an SSSD private header. This affects RHEL5 and SUSE10.
* Don't mix strdup and static stringsSimo Sorce2009-06-021-1/+1
|
* Initial gettext framework for sss_clientsStephen Gallagher2009-05-261-1/+7
|
* Build fixesSimo Sorce2009-05-171-0/+2
| | | | | Comment out unused function in pam_sss Add missing configure.ac to common/ini
* added new pam client protocolSumit Bose2009-05-151-2/+136
|
* added syslog support to pam_sssSumit Bose2009-05-081-5/+40
|
* cleanup and fixes for pam_sssSumit Bose2009-05-081-190/+352
| | | | | | | | | | | - if PAM_USER==root return PAM_USER_UNKNOWN - pam_sss now can handle to following options: - use_first_pass: forces the module to use a previous stacked modules password and will never prompt the user - use_authtok: when password changing enforce the module to set the new password to the one provided by a previously stacked password module - forward_pass: store the passwords collected by the module as pam items for modules called later in the stack
* Fix IndentationSimo Sorce2009-04-291-88/+89
|
* reuse authtok which is already in the pam stackSumit Bose2009-04-291-2/+22
|
* allow to forward the authtok to other pam modulesSumit Bose2009-04-231-0/+16
| | | | | | | | Other pam modules which are called after pam_sss might want to reuse the given password so that the user is not bothered with multiple password prompt. When pam_sss is configured with the option 'forward_pass' it will use pam_set_item to safe the password for other pam modules.
* Fix compilation error due to implicit castStephen Gallagher2009-03-251-2/+2
|
* added response type PAM_ENV_ITEM and integrated response data into dbus messagesSumit Bose2009-03-201-0/+32
|
* Remove unexisting left over headersssd-0_2_1Simo Sorce2009-03-101-1/+0
| | | | Also bump up the version as this error prevented a successful build of 0.2.0
* added generic PAM return messages and a false login delaySumit Bose2009-03-101-15/+59
|
* added password reset by rootSumit Bose2009-03-051-9/+33
|
* first version of LOCAL pam backendSumit Bose2009-03-021-0/+6
|
* Add PAM clientSumit Bose2009-02-241-0/+324
Also rename nss_client to sss_client and reuse the same pipe protocol for both the NSS and PAM client libraries. Signed-off-by: Simo Sorce <ssorce@redhat.com>