Lines Matching refs:password

208  * addprinc -randkey operation.  The krb5 1.6 dummy password for these requests
216 char *password = *passptr;
219 if (password == NULL || !(mask & KADM5_ATTRIBUTES) ||
223 /* The 1.6 dummy password was the octets 1..255. */
224 for (i = 0; (unsigned char) password[i] == i + 1; i++);
225 if (password[i] != '\0' || i != 255)
228 /* This will make the caller use a random password instead. */
235 char *password)
239 0, NULL, password);
245 char *password)
261 check_1_6_dummy(entry, mask, n_ks_tuple, ks_tuple, &password);
325 if (password) {
326 ret = passwd_check(handle, password, (mask & KADM5_POLICY),
463 if (password) {
467 password, (mask & KADM5_KVNO)?entry->kvno:1,
470 /* Null password means create with random key (new in 1.8). */
1014 * enforce password history.
1030 * for each password in pw_hist_data:
1031 * for each hist_key in password:
1085 * Purpose: Creates a password history entry from an array of
1154 * Purpose: Adds a password to a principal's password history.
1162 * pw (r) keys for the password to add to adb's key history
1166 * add_to_history adds a single password to adb's password history.
1189 /* A history of 1 means just check the current password */
1194 /* The history key has changed since the last password change, so we
1195 * have to reset the password history. */
1274 * If nhist decreased since the last password change, and nkeys+1
1318 * Apple password server with the Kerberos database. Password server
1323 * password server falling out of sync with the database,
1381 /* child read password and exited. Check the return value. */
1383 ret = KRB5KDC_ERR_POLICY; /* password change rejected */
1386 /* child read password but crashed or was killed */
1400 krb5_principal principal, char *password)
1404 0, NULL, password);
1411 char *password)
1436 if (principal == NULL || password == NULL)
1457 if ((ret = passwd_check(handle, password, adb.aux_attributes &
1469 password, 0 /* increment kvno */,
1524 /* If hist_kvno has changed since the last password change, we
1567 ret = kadm5_launch_task (handle->context, path, argv, password);