Man page - pam_sm_setcred(3)
Packages contas this manual
- pam_putenv(3)
- pam_strerror(3)
- pam(3)
- pam_sm_setcred(3)
- pam_get_authtok(3)
- pam_error(3)
- pam_sm_acct_mgmt(3)
- pam_getenv(3)
- pam_conv(3)
- pam_start(3)
- pam_get_data(3)
- pam_sm_close_session(3)
- pam_prompt(3)
- pam_close_session(3)
- pam_setcred(3)
- pam_info(3)
- pam_get_authtok_noverify(3)
- pam_set_data(3)
- pam_xauth_data(3)
- pam_end(3)
- pam_open_session(3)
- pam_vinfo(3)
- pam_get_item(3)
- pam_getenvlist(3)
- pam_get_user(3)
- misc_conv(3)
- pam_vprompt(3)
- pam_vsyslog(3)
- pam_syslog(3)
- pam_fail_delay(3)
- pam_chauthtok(3)
- pam_acct_mgmt(3)
- pam_sm_chauthtok(3)
- pam_get_authtok_verify(3)
- pam_sm_open_session(3)
- pam_misc_setenv(3)
- pam_verror(3)
- pam_sm_authenticate(3)
- pam_authenticate(3)
- pam_misc_drop_env(3)
- pam_set_item(3)
- pam_misc_paste_env(3)
apt-get install libpam-doc
Manual
| PAM_SM_SETCRED(3) | Linux-PAM Manual | PAM_SM_SETCRED(3) |
NAME
pam_sm_setcred - PAM service function to alter credentials
SYNOPSIS
#include <security/pam_modules.h>
int pam_sm_setcred(pam_handle_t *pamh, int flags, int argc, const char **argv);
DESCRIPTION
The pam_sm_setcred function is the service module's implementation of the pam_setcred(3) interface.
This function performs the task of altering the credentials of the user with respect to the corresponding authorization scheme. Generally, an authentication module may have access to more information about a user than their authentication token. This function is used to make such information available to the application. It should only be called after the user has been authenticated but before a session has been established.
Valid flags, which may be logically OR'd with PAM_SILENT, are:
PAM_SILENT
PAM_ESTABLISH_CRED
PAM_DELETE_CRED
PAM_REINITIALIZE_CRED
PAM_REFRESH_CRED
The way the auth stack is navigated in order to evaluate the pam_setcred() function call, independent of the pam_sm_setcred() return codes, is exactly the same way that it was navigated when evaluating the pam_authenticate() library call. Typically, if a stack entry was ignored in evaluating pam_authenticate(), it will be ignored when libpam evaluates the pam_setcred() function call. Otherwise, the return codes from each module specific pam_sm_setcred() call are treated as required.
RETURN VALUES
PAM_CRED_UNAVAIL
PAM_CRED_EXPIRED
PAM_CRED_ERR
PAM_SUCCESS
PAM_USER_UNKNOWN
These, non-PAM_SUCCESS, return values will typically lead to the credential stack failing. The first such error will dominate in the return value of pam_setcred().
SEE ALSO
pam(3), pam_authenticate(3), pam_setcred(3), pam_sm_authenticate(3), pam_strerror(3), PAM(8)
| 06/29/2025 | Linux-PAM |