Lines Matching defs:password

645 static char *password_or_responder(const char *password)
652 return discard_const(password);
669 DEBUG(SSSDBG_CRIT_FAILURE, "Cannot handle password prompts.\n");
1265 const char *password)
1290 password_or_responder(password),
1403 * password migration would make sense. All Kerberos error codes which can
1431 const char *password = NULL;
1448 ret = sss_authtok_get_password(kr->pd->authtok, &password, NULL);
1451 "Failed to fetch current password [%d] %s.\n",
1457 /* We do not need a password expiration warning here. */
1471 password_or_responder(password),
1478 ret = pack_user_info_chpass_error(kr->pd, "Old password not accepted.",
1498 "Initial authentication for change password operation "
1506 DEBUG(SSSDBG_CRIT_FAILURE, "Failed to fetch new password [%d] %s.\n",
1549 "password meets the complexity constraints.");
1589 /* We changed some of the gic options for the password change, now we have
1595 DEBUG(SSSDBG_CRIT_FAILURE, "Failed to set password for fresh TGT.\n");
1612 const char *password = NULL;
1618 /* No password is needed for pre-auth, or if we have 2FA */
1621 ret = sss_authtok_get_password(kr->pd->authtok, &password, NULL);
1638 kerr = get_and_save_tgt(kr, password);
1663 /* If the password is expired the KDC will always return
1664 KRB5KDC_ERR_KEY_EXP regardless if the supplied password is correct or
1665 not. In general the password can still be used to get a changepw ticket.
1666 So we validate the password by trying to get a changepw ticket. */
1679 password_or_responder(password),
1688 /* If the password is expired we can safely remove the ccache from the
2565 /* A prompter is used to catch messages about when a password will
2566 * expired. The library shall not use the prompter to ask for a new password
2831 DEBUG(SSSDBG_TRACE_FUNC, "Will perform password change\n");
2835 DEBUG(SSSDBG_TRACE_FUNC, "Will perform password change checks\n");