summaryrefslogtreecommitdiffstats
path: root/ldap/servers/slapd/pw_mgmt.c
diff options
context:
space:
mode:
authorRich Megginson <rmeggins@redhat.com>2005-02-07 19:02:49 +0000
committerRich Megginson <rmeggins@redhat.com>2005-02-07 19:02:49 +0000
commit5335c65cbaf4a899dae6bc497ae7e85e0831f540 (patch)
tree769e16668d2abfead0be06eae78e2a8ebf93d09b /ldap/servers/slapd/pw_mgmt.c
parent9eb2b56ec631aa3fffc9a80afcbe40f6cc645d8a (diff)
downloadds-5335c65cbaf4a899dae6bc497ae7e85e0831f540.tar.gz
ds-5335c65cbaf4a899dae6bc497ae7e85e0831f540.tar.xz
ds-5335c65cbaf4a899dae6bc497ae7e85e0831f540.zip
PAM pass through auth plugin support
Diffstat (limited to 'ldap/servers/slapd/pw_mgmt.c')
-rw-r--r--ldap/servers/slapd/pw_mgmt.c28
1 files changed, 14 insertions, 14 deletions
diff --git a/ldap/servers/slapd/pw_mgmt.c b/ldap/servers/slapd/pw_mgmt.c
index b400efab..d9346f85 100644
--- a/ldap/servers/slapd/pw_mgmt.c
+++ b/ldap/servers/slapd/pw_mgmt.c
@@ -105,9 +105,9 @@ skip:
/* check for "changeafterreset" condition */
if (pb->pb_conn->c_needpw == 1) {
if (pwresponse_req) {
- pwpolicy_make_response_control ( pb, -1, -1, LDAP_PWPOLICY_CHGAFTERRESET );
+ slapi_pwpolicy_make_response_control ( pb, -1, -1, LDAP_PWPOLICY_CHGAFTERRESET );
}
- add_pwd_control ( pb, LDAP_CONTROL_PWEXPIRED, 0);
+ slapi_add_pwd_control ( pb, LDAP_CONTROL_PWEXPIRED, 0);
}
pw_apply_mods(dn, &smods);
slapi_mods_done(&smods);
@@ -136,18 +136,18 @@ skip:
if (pwresponse_req) {
/* check for "changeafterreset" condition */
if (pb->pb_conn->c_needpw == 1) {
- pwpolicy_make_response_control( pb, -1,
+ slapi_pwpolicy_make_response_control( pb, -1,
((pwpolicy->pw_gracelimit) - pwdGraceUserTime),
LDAP_PWPOLICY_CHGAFTERRESET);
} else {
- pwpolicy_make_response_control( pb, -1,
+ slapi_pwpolicy_make_response_control( pb, -1,
((pwpolicy->pw_gracelimit) - pwdGraceUserTime),
-1);
}
}
if (pb->pb_conn->c_needpw == 1) {
- add_pwd_control ( pb, LDAP_CONTROL_PWEXPIRED, 0);
+ slapi_add_pwd_control ( pb, LDAP_CONTROL_PWEXPIRED, 0);
}
delete_passwdPolicy(&pwpolicy);
return ( 0 );
@@ -155,9 +155,9 @@ skip:
/* password expired and user exceeded limit of grace attemps.
* Send result and also the control */
- add_pwd_control ( pb, LDAP_CONTROL_PWEXPIRED, 0);
+ slapi_add_pwd_control ( pb, LDAP_CONTROL_PWEXPIRED, 0);
if (pwresponse_req) {
- pwpolicy_make_response_control ( pb, -1, -1, LDAP_PWPOLICY_PWDEXPIRED );
+ slapi_pwpolicy_make_response_control ( pb, -1, -1, LDAP_PWPOLICY_PWDEXPIRED );
}
slapi_send_ldap_result ( pb, LDAP_INVALID_CREDENTIALS, NULL,
"password expired!", 0, NULL );
@@ -226,16 +226,16 @@ skip:
if (pwresponse_req) {
/* check for "changeafterreset" condition */
if (pb->pb_conn->c_needpw == 1) {
- pwpolicy_make_response_control( pb, *t, -1,
+ slapi_pwpolicy_make_response_control( pb, *t, -1,
LDAP_PWPOLICY_CHGAFTERRESET);
} else {
- pwpolicy_make_response_control( pb, *t, -1,
+ slapi_pwpolicy_make_response_control( pb, *t, -1,
-1);
}
}
if (pb->pb_conn->c_needpw == 1) {
- add_pwd_control ( pb, LDAP_CONTROL_PWEXPIRED, 0);
+ slapi_add_pwd_control ( pb, LDAP_CONTROL_PWEXPIRED, 0);
}
delete_passwdPolicy(&pwpolicy);
return (2);
@@ -245,7 +245,7 @@ skip:
slapi_mods_done(&smods);
/* Leftover from "changeafterreset" condition */
if (pb->pb_conn->c_needpw == 1) {
- add_pwd_control ( pb, LDAP_CONTROL_PWEXPIRED, 0);
+ slapi_add_pwd_control ( pb, LDAP_CONTROL_PWEXPIRED, 0);
}
delete_passwdPolicy(&pwpolicy);
/* passes checking, return 0 */
@@ -298,7 +298,7 @@ check_account_lock ( Slapi_PBlock *pb, Slapi_Entry * bind_target_entry, int pwre
{
/* account inactivated */
if (pwresponse_req) {
- pwpolicy_make_response_control ( pb, -1, -1,
+ slapi_pwpolicy_make_response_control ( pb, -1, -1,
LDAP_PWPOLICY_ACCTLOCKED );
}
send_ldap_result ( pb, LDAP_UNWILLING_TO_PERFORM, NULL,
@@ -348,7 +348,7 @@ check_account_lock ( Slapi_PBlock *pb, Slapi_Entry * bind_target_entry, int pwre
/* account is locked forever. contact admin to reset */
if (pwresponse_req) {
- pwpolicy_make_response_control ( pb, -1, -1,
+ slapi_pwpolicy_make_response_control ( pb, -1, -1,
LDAP_PWPOLICY_ACCTLOCKED );
}
send_ldap_result ( pb, LDAP_CONSTRAINT_VIOLATION, NULL,
@@ -363,7 +363,7 @@ check_account_lock ( Slapi_PBlock *pb, Slapi_Entry * bind_target_entry, int pwre
/* account is locked, cannot do anything */
if (pwresponse_req) {
- pwpolicy_make_response_control ( pb, -1, -1,
+ slapi_pwpolicy_make_response_control ( pb, -1, -1,
LDAP_PWPOLICY_ACCTLOCKED );
}
send_ldap_result ( pb, LDAP_CONSTRAINT_VIOLATION, NULL,