Lines Matching defs:password
253 const char *password = NULL;
256 ret = sss_authtok_get_password(pd->authtok, &password, NULL);
259 "Failed to get password [%d] %s. Delayed authentication is only "
260 "available for password authentication (single factor).\n",
268 password, cdb, true, NULL, NULL);
340 const char *password = NULL;
350 * as the cached password.
360 ret = sss_authtok_get_2fa(pd->authtok, &password, &password_len,
372 ret = sss_authtok_get_password(pd->authtok, &password, NULL);
380 ret = sss_authtok_get_password(pd->newauthtok, &password, NULL);
389 "Failed to get password [%d] %s\n", ret, strerror(ret));
390 /* password caching failures are not fatal errors */
394 if (password == NULL) {
397 "password not available, offline auth may not work.\n");
398 /* password caching failures are not fatal errors */
403 ret = sysdb_cache_password_ex(domain, pd->user, password,
407 "Failed to cache password, offline auth may not work."
409 /* password caching failures are not fatal errors */
500 /* handle empty password gracefully */
679 "Skipping password checks for OTP-enabled user\n");
751 "No KDC suitable for password change is available\n");
947 * change password request just return success. */
1007 /* If the password is expired we can safely remove the ccache from the
1091 /* Now only a successful authentication or password change is left.
1162 * password on the PAM stack for other modules to use. This is not needed
1164 * (long term password) can be passed to the other modules. */