|
pam_sm_chauthtok(3) -- Service provider implementation for pam_chauthtok
|
In response to a call to pam_chauthtok() the PAM framework calls pam_sm_chauthtok() from the modules listed in the pam.conf(4) file. The password management provider supplies the back-end functionality for this interface function. pam_sm_chauthtok() changes the authentication token associated with a particular user referenced by the authentication handle, pamh. The following flag may be passed in ... |
pam_sm_close_session(3) -- Service provider implementation for pam_open_session and pam_close_session respectively
|
In response to a call to pam_open_session() and pam_close_session(), the PAM framework calls pam_sm_open_session() and pam_sm_close_session(), respectively from the modules listed in the pam.conf(4) file. The session management provider supplies the backend functionality for this interface function. pam_sm_open_session() is called to initiate session management. pam_sm_close_session() is invoked w... |
|
pam_sm_open_session(3) -- Service provider implementation for pam_open_session and pam_close_session respectively
|
In response to a call to pam_open_session() and pam_close_session(), the PAM framework calls pam_sm_open_session() and pam_sm_close_session(), respectively from the modules listed in the pam.conf(4) file. The session management provider supplies the backend functionality for this interface function. pam_sm_open_session() is called to initiate session management. pam_sm_close_session() is invoked w... |
pam_sm_setcred(3) -- Service provider implementation for pam_setcred
|
In response to a call to pam_setcred(), the PAM framework calls pam_sm_setcred() from the modules listed in the pam.conf(4) file. The authentication provider supplies the back-end functionality for this interface function. pam_sm_setcred() is called to set the credentials of the current user associated with the authentication handle, pamh. The following flags may be set in the flags field. Note th... |
pam_start(3) -- authentication transaction routines for PAM
|
pam_start() is called to initiate an authentication transaction. pam_start() takes as arguments the name of the current service, service, the name of the user to be authenticated, user, the address of the conversation structure, pam_conv, and the address of a variable to be assigned the authentication handle, pamh. Upon successful completion, pamh will refer to a PAM handle for use with subsequent... |
pam_strerror(3) -- get PAM error message string
|
pam_strerror() maps the PAM error number in errnum to a PAM error message string, and returns a pointer to that string. The application should not free or modify the string returned. The pamh argument is the PAM handle obtained by a prior call to pam_start(). If pam_start() returns an error, a NULL PAM handle should be passed. |
putdvagnam(3) -- manipulate device assignment database entry for a trusted system
|
getdvagent, getdvagnam, and copydvagent each return a pointer to an object with the following structure containing the broken-out fields of an entry in the Device Assignment database. Each database entry is returned as a dev_asg structure, declared in the header file: struct dev_field { char *fd_name; /* external name */ char **fd_devs; /* device list */ mask_t fd_type[1]; /* tape, printe... |
putprdfnam(3) -- manipulate system default database entry for a trusted system
|
getprdfent and getprdfnam each returns a pointer to an object with the following structure containing the broken-out fields of a line in the system default database. Each line in the database contains a pr_default structure, declared in the header file: struct system_default_fields { time_t fd_inactivity_timeout ; char fd_boot_authenticate ; } ; struct system_default_flags { unsigned shor... |
putprpwnam(3) -- manipulate protected password database entries (for trusted systems only).
|
getprpwent, getprpwuid, getprpwaid, and getprpwnam each returns a pointer to a pr_passwd structure containing the broken-out fields of a line in the protected password database. Each line in the database contains a pr_passwd structure, declared in the header file: struct pr_field { /* Identity: */ char fd_name[9]; /* uses 8 character maximum(and NULL) from utmp */ uid_t fd_uid; /* uid ass... |
putprtcnam(3) -- manipulate terminal control database entry for a trusted system
|
getprtcent and getprtcnam each returns a pointer to an object with the following structure containing the broken-out fields of an entry in the terminal control database. Each entry in the database contains a pr_term structure, declared in the header file: struct t_field { char fd_devname[14]; /* Terminal (or host) name */ uid_t fd_uid; /* uid of last successful login */ time_t fd_slogin; ... |
RectObj(3) -- The RectObj widget class
|
RectObj is never instantiated. Its sole purpose is as a supporting superclass for other widget classes. |
request_init(3) -- access control library
|
The routines described here are a part of the libwrap.a library. They implement a rule-based access control language with optional shell commands that are executed when a rule fires. request_init() initializes a structure with information about a client request. request_set() updates an already initialized request structure. Both functions take a variable-length list of key-value pairs and return ... |
request_set(3) -- access control library
|
The routines described here are a part of the libwrap.a library. They implement a rule-based access control language with optional shell commands that are executed when a rule fires. request_init() initializes a structure with information about a client request. request_set() updates an already initialized request structure. Both functions take a variable-length list of key-value pairs and return ... |
secdef(3) -- security defaults configuration file routines
|
open_secdef opens the security configuration file /etc/default/security. This function must be called prior to calling get_secdef_str or get_secdef_int. close_secdef closes the security configuration file. get_secdef_str and get_secdef_int return the value of the specified parameter defined in the security configuration file. See the security(4) manpage. Programs using these routines must be compi... |
setdvagent(3) -- manipulate device assignment database entry for a trusted system
|
getdvagent, getdvagnam, and copydvagent each return a pointer to an object with the following structure containing the broken-out fields of an entry in the Device Assignment database. Each database entry is returned as a dev_asg structure, declared in the header file: struct dev_field { char *fd_name; /* external name */ char **fd_devs; /* device list */ mask_t fd_type[1]; /* tape, printe... |