1
1
.\" Title: pam_sm_chauthtok
3
.\" Generator: DocBook XSL Stylesheets v1.73.1 <http://docbook.sf.net/>
2
.\" Author: [FIXME: author] [see http://docbook.sf.net/el/author]
3
.\" Generator: DocBook XSL Stylesheets v1.74.0 <http://docbook.sf.net/>
5
5
.\" Manual: Linux-PAM Manual
6
6
.\" Source: Linux-PAM Manual
8
.TH "PAM_SM_CHAUTHTOK" "3" "04/16/2008" "Linux-PAM Manual" "Linux-PAM Manual"
9
.TH "PAM_SM_CHAUTHTOK" "3" "03/02/2009" "Linux-PAM Manual" "Linux-PAM Manual"
10
.\" -----------------------------------------------------------------
11
.\" * (re)Define some macros
12
.\" -----------------------------------------------------------------
13
.\" ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
14
.\" toupper - uppercase a string (locale-aware)
15
.\" ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
17
.tr aAbBcCdDeEfFgGhHiIjJkKlLmMnNoOpPqQrRsStTuUvVwWxXyYzZ
19
.tr aabbccddeeffgghhiijjkkllmmnnooppqqrrssttuuvvwwxxyyzz
21
.\" ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
22
.\" SH-xref - format a cross-reference to an SH section
23
.\" ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
32
.\" ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
33
.\" SH - level-one heading that works better for non-TTY output
34
.\" ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
36
.\" put an extra blank line of space above the head in non-TTY output
43
.nr an-prevailing-indent \\n[IN]
47
.HTML-TAG ".NH \\n[an-level]"
49
.nr an-no-space-flag 1
51
\." make the size of the head bigger
56
.\" if n (TTY output), use uppercase
61
.\" if not n (not TTY), use normal case (not uppercase)
65
.\" if not n (not TTY), put a border/line under subheading
70
.\" ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
71
.\" SS - level-two heading that works better for non-TTY output
72
.\" ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
77
.nr an-prevailing-indent \\n[IN]
82
.nr an-no-space-flag 1
85
\." make the size of the head bigger
91
.\" ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
92
.\" BB/BE - put background/screen (filled box) around block of text
93
.\" ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
106
.if "\\$2"adjust-for-leading-newline" \{\
114
.nr BW \\n(.lu-\\n(.i
117
.ie "\\$2"adjust-for-leading-newline" \{\
118
\M[\\$1]\h'1n'\v'+.5v'\D'P \\n(BWu 0 0 \\n(BHu -\\n(BWu 0 0 -\\n(BHu'\M[]
121
\M[\\$1]\h'1n'\v'-.5v'\D'P \\n(BWu 0 0 \\n(BHu -\\n(BWu 0 0 -\\n(BHu'\M[]
132
.\" ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
133
.\" BM/EM - put colored marker in margin next to block of text
134
.\" ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
151
\M[\\$1]\D'P -.75n 0 0 \\n(BHu -(\\n[.i]u - \\n(INu - .75n) 0 0 -\\n(BHu'\M[]
159
.\" -----------------------------------------------------------------
160
.\" * set default formatting
161
.\" -----------------------------------------------------------------
9
162
.\" disable hyphenation
11
164
.\" disable justification (adjust text to left margin only)
14
pam_sm_chauthtok - PAM service function for authentication token management
166
.\" -----------------------------------------------------------------
167
.\" * MAIN CONTENT STARTS HERE *
168
.\" -----------------------------------------------------------------
170
pam_sm_chauthtok \- PAM service function for authentication token management
19
177
#define PAM_SM_PASSWORD
25
#include <security/pam_modules\.h>
187
#include <security/pam_modules\&.h>
193
.HP \w'PAM_EXTERN\ int\ pam_sm_chauthtok('u
29
194
.BI "PAM_EXTERN int pam_sm_chauthtok(pam_handle_t\ *" "pamh" ", int\ " "flags" ", int\ " "argc" ", const\ char\ **" "argv" ");"
33
199
\fBpam_sm_chauthtok\fR
34
200
function is the service module\'s implementation of the
35
201
\fBpam_chauthtok\fR(3)
38
This function is used to (re\-)set the authentication token of the user\.
204
This function is used to (re\-)set the authentication token of the user\&.
40
206
Valid flags, which may be logically OR\'d with
41
207
\fIPAM_SILENT\fR, are:
45
Do not emit any messages\.
211
Do not emit any messages\&.
48
214
PAM_CHANGE_EXPIRED_AUTHTOK
50
This argument indicates to the module that the users authentication token (password) should only be changed if it has expired\. This flag is optional and
216
This argument indicates to the module that the users authentication token (password) should only be changed if it has expired\&. This flag is optional and
52
be combined with one of the following two flags\. Note, however, the following two options are
53
\fImutually exclusive\fR\.
218
be combined with one of the following two flags\&. Note, however, the following two options are
219
\fImutually exclusive\fR\&.
58
This indicates that the modules are being probed as to their ready status for altering the user\'s authentication token\. If the module requires access to another system over some network it should attempt to verify it can connect to this system on receiving this flag\. If a module cannot establish it is ready to update the user\'s authentication token it should return
59
\fBPAM_TRY_AGAIN\fR, this information will be passed back to the application\.
224
This indicates that the modules are being probed as to their ready status for altering the user\'s authentication token\&. If the module requires access to another system over some network it should attempt to verify it can connect to this system on receiving this flag\&. If a module cannot establish it is ready to update the user\'s authentication token it should return
225
\fBPAM_TRY_AGAIN\fR, this information will be passed back to the application\&.
229
is used in the password stack, the
230
\fIPAM_PRELIM_CHECK\fR
231
section of the modules following that control value is not always executed\&.
62
234
PAM_UPDATE_AUTHTOK
64
This informs the module that this is the call it should change the authorization tokens\. If the flag is logically OR\'d with
65
\fBPAM_CHANGE_EXPIRED_AUTHTOK\fR, the token is only changed if it has actually expired\.
236
This informs the module that this is the call it should change the authorization tokens\&. If the flag is logically OR\'d with
237
\fBPAM_CHANGE_EXPIRED_AUTHTOK\fR, the token is only changed if it has actually expired\&.
68
The PAM library calls this function twice in succession\. The first time with
240
The PAM library calls this function twice in succession\&. The first time with
69
241
\fBPAM_PRELIM_CHECK\fR
70
242
and then, if the module does not return
71
243
\fBPAM_TRY_AGAIN\fR, subsequently with
72
\fBPAM_UPDATE_AUTHTOK\fR\. It is only on the second call that the authorization token is (possibly) changed\.
244
\fBPAM_UPDATE_AUTHTOK\fR\&. It is only on the second call that the authorization token is (possibly) changed\&.
73
245
.SH "RETURN VALUES"
77
The module was unable to obtain the new authentication token\.
249
The module was unable to obtain the new authentication token\&.
80
252
PAM_AUTHTOK_RECOVERY_ERR
82
The module was unable to obtain the old authentication token\.
254
The module was unable to obtain the old authentication token\&.
85
257
PAM_AUTHTOK_LOCK_BUSY
87
Cannot change the authentication token since it is currently locked\.
259
Cannot change the authentication token since it is currently locked\&.
90
262
PAM_AUTHTOK_DISABLE_AGING
92
Authentication token aging has been disabled\.
264
Authentication token aging has been disabled\&.
102
Preliminary check was unsuccessful\. Signals an immediate return to the application is desired\.
274
Preliminary check was unsuccessful\&. Signals an immediate return to the application is desired\&.
107
The authentication token was successfully updated\.
279
The authentication token was successfully updated\&.
112
User unknown to password service\.
284
User unknown to password service\&.