Linux and UNIX Man Pages

Linux & Unix Commands - Search Man Pages

pam_chauthtok(3) [opendarwin man page]

PAM_CHAUTHTOK(3)					     App. Programmers' Manual						  PAM_CHAUTHTOK(3)

pam_chauthtok - updating authentication tokens SYNOPSIS
#include <security/pam_appl.h> int pam_chauthtok(pam_handle_t *pamh, int flags); DESCRIPTION
pam_chauthtok Use this function to rejuvenate the authentication tokens (passwords etc.) of an applicant user. Note, the application should not pre-authenticate the user, as this is performed (if required) by the Linux-PAM framework. The flags argument can optionally take the value, PAM_CHANGE_EXPIRED_AUTHTOK. In such cases the framework is only required to update those authentication tokens that have expired. Without this argument, the framework will attempt to obtain new tokens for all configured authen- tication mechanisms. The details of the types and number of such schemes should not concern the calling application. RETURN VALUE
A successful return from this function will be indicated with PAM_SUCCESS. Specific errors of special interest when calling this function are PAM_AUTHTOK_ERROR - a valid new token was not obtained PAM_AUTHTOK_RECOVERY_ERR - old authentication token was not available PAM_AUTHTOK_LOCK_BUSY - a resource needed to update the token was locked (try again later) PAM_AUTHTOK_DISABLE_AGING - one or more of the authentication modules does not honor authentication token aging PAM_TRY_AGAIN - one or more authentication mechanism is not prepared to update a token at this time In general other return values may be returned. They should be treated as indicating failure. ERRORS
May be translated to text with pam_strerror(3). CONFORMING TO
DCE-RFC 86.0, October 1995. BUGS
none known. SEE ALSO
pam_start(3), pam_authenticate(3), pam_setcred(3), pam_get_item(3), pam_strerror(3) and pam(8). Also, see the three Linux-PAM Guides, for System administrators, module developers, and application developers. Linux-PAM 0.55 1997 Jan 4 PAM_CHAUTHTOK(3)

Check Out this Related Man Page

PAM_SM_CHAUTHTOK(3)						 Linux-PAM Manual					       PAM_SM_CHAUTHTOK(3)

pam_sm_chauthtok - PAM service function for authentication token management SYNOPSIS
#define PAM_SM_PASSWORD #include <security/pam_modules.h> PAM_EXTERN int pam_sm_chauthtok(pam_handle_t *pamh, int flags, int argc, const char **argv); DESCRIPTION
The pam_sm_chauthtok function is the service module's implementation of the pam_chauthtok(3) interface. This function is used to (re-)set the authentication token of the user. Valid flags, which may be logically OR'd with PAM_SILENT, are: PAM_SILENT Do not emit any messages. PAM_CHANGE_EXPIRED_AUTHTOK This argument indicates to the module that the users authentication token (password) should only be changed if it has expired. This flag is optional and must be combined with one of the following two flags. Note, however, the following two options are mutually exclusive. PAM_PRELIM_CHECK This indicates that the modules are being probed as to their ready status for altering the user's authentication token. If the module requires access to another system over some network it should attempt to verify it can connect to this system on receiving this flag. If a module cannot establish it is ready to update the user's authentication token it should return PAM_TRY_AGAIN, this information will be passed back to the application. If the control value sufficient is used in the password stack, the PAM_PRELIM_CHECK section of the modules following that control value is not always executed. PAM_UPDATE_AUTHTOK This informs the module that this is the call it should change the authorization tokens. If the flag is logically OR'd with PAM_CHANGE_EXPIRED_AUTHTOK, the token is only changed if it has actually expired. The PAM library calls this function twice in succession. The first time with PAM_PRELIM_CHECK and then, if the module does not return PAM_TRY_AGAIN, subsequently with PAM_UPDATE_AUTHTOK. It is only on the second call that the authorization token is (possibly) changed. RETURN VALUES
PAM_AUTHTOK_ERR The module was unable to obtain the new authentication token. PAM_AUTHTOK_RECOVERY_ERR The module was unable to obtain the old authentication token. PAM_AUTHTOK_LOCK_BUSY Cannot change the authentication token since it is currently locked. PAM_AUTHTOK_DISABLE_AGING Authentication token aging has been disabled. PAM_PERM_DENIED Permission denied. PAM_TRY_AGAIN Preliminary check was unsuccessful. Signals an immediate return to the application is desired. PAM_SUCCESS The authentication token was successfully updated. PAM_USER_UNKNOWN User unknown to password service. SEE ALSO
pam(3), pam_chauthtok(3), pam_sm_chauthtok(3), pam_strerror(3), PAM(8) Linux-PAM Manual 09/19/2013 PAM_SM_CHAUTHTOK(3)
Man Page

Featured Tech Videos