/osnet-11/usr/src/lib/gss_mechs/mech_dh/dh_common/ |
H A D | dh_nsl_tmpl.c | 44 * supplied public key, private key, and passwd. This routine is 67 __dl_gen_dhkeys(char *xpublic, char *xsecret, char *passwd) argument 69 __generic_gen_dhkeys(KEYLEN, MODULUS, ROOT, xpublic, xsecret, passwd);
|
/osnet-11/usr/src/lib/passwdutil/ |
H A D | __check_history.c | 39 * passwd = new clear text password. 43 * PWU_SUCCESS, passwd found in user's old password history. 46 * PWU_NOT_FOUND, passwd not in user's old password history. 51 __check_history(char *user, char *passwd, pwu_repository_t *rep) argument 72 res = rops[i]->checkhistory(user, passwd, rep);
|
H A D | switch_utils.c | 136 conf = __nsw_getconfig("passwd", &pserr); 145 "passwd not found."); 158 * though changing AD users' passwords through passwd(1) is not. 236 p->config_name = NSS_DBNAM_PASSWD; /* Use config for "passwd" */ 257 p->config_name = NSS_DBNAM_PASSWD; /* Use config for "passwd" */ 295 struct passwd *passwd = (struct passwd *)ent; local 311 passwd->pw_name = p = gettok(&next); /* username */ 318 passwd [all...] |
H A D | files_attr.c | 48 int files_checkhistory(char *user, char *passwd, pwu_repository_t *rep); 79 struct passwd *pwd; 140 struct passwd * 141 private_getpwnam_r(const char *name, struct passwd *result, char *buffer, 222 * determine which password structure (/etc/passwd or /etc/shadow) 236 pwbuf->pwd = malloc(sizeof (struct passwd)); 387 * passwd = new clear text password. 390 * PWU_SUCCESS, passwd found in user's old password history. 393 * PWU_NOT_FOUND, passwd not in user's old password history. 398 files_checkhistory(char *user, char *passwd, pwu_repository_ argument [all...] |
/osnet-11/usr/src/lib/libldap4/common/ |
H A D | bind.c | 56 ldap_bind( LDAP *ld, char *dn, char *passwd, int authmethod ) argument 64 * simple [0] OCTET STRING -- passwd 78 return( ldap_simple_bind( ld, dn, passwd ) ); 109 ldap_bind_s( LDAP *ld, char *dn, char *passwd, int authmethod ) argument 115 return( ldap_simple_bind_s( ld, dn, passwd ) );
|
H A D | sbind.c | 38 BerElement * ldap_build_simple_bind_req(LDAP *ld, char *dn, char *passwd, LDAPControl **serverctrls) argument 46 * simple [0] OCTET STRING -- passwd 56 if ( passwd == NULL ) 57 passwd = ""; 64 if ( ber_printf( ber, "{it{ists}", ++ld->ld_msgid, LDAP_REQ_BIND, ld->ld_version, dn, LDAP_AUTH_SIMPLE, passwd ) == -1 ) { 107 ldap_simple_bind( LDAP *ld, char *dn, char *passwd ) 120 if ( passwd == NULL ) 121 passwd = ""; 124 if ( (ber = ldap_build_simple_bind_req( ld, dn, passwd, NULL )) == NULLBER ) { 157 ldap_simple_bind_s( LDAP *ld, char *dn, char *passwd ) [all...] |
H A D | request.c | 367 char *binddn, *passwd; local 377 binddn = passwd = ""; 380 if (( err = (*ld->ld_rebindproc)( ld, &binddn, &passwd, 394 if ( ldap_bind_s( ld, binddn, passwd, authmethod ) != 403 (*ld->ld_rebindproc)( ld, &binddn, &passwd,
|
/osnet-11/usr/src/lib/libldap5/sources/ldap/common/ |
H A D | bind.c | 51 ldap_bind( LDAP *ld, const char *dn, const char *passwd, int authmethod ) argument 59 * simple [0] OCTET STRING -- passwd 73 return( ldap_simple_bind( ld, dn, passwd ) ); 97 ldap_bind_s( LDAP *ld, const char *dn, const char *passwd, int authmethod ) argument 105 return( ldap_simple_bind_s( ld, dn, passwd ) );
|
H A D | sbind.c | 40 static int simple_bind_nolock( LDAP *ld, const char *dn, const char *passwd, 42 static int simple_bindifnot_s( LDAP *ld, const char *dn, const char *passwd ); 56 ldap_simple_bind( LDAP *ld, const char *dn, const char *passwd ) 66 rc = simple_bind_nolock( ld, dn, passwd, 1 ); 73 simple_bind_nolock( LDAP *ld, const char *dn, const char *passwd, argument 85 * simple [0] OCTET STRING -- passwd 97 if ( passwd == NULL ) 98 passwd = ""; 103 bv.bv_val = (char *)passwd; 104 bv.bv_len = strlen( passwd ); [all...] |
/osnet-11/usr/src/cmd/cmd-inet/usr.bin/pppd/plugins/ |
H A D | passprompt.c | 27 static int promptpass(char *user, char *passwd) argument 38 if (user != NULL && passwd == NULL) 84 red = read(p[0], passwd + readgood, MAXSECRETLEN-1 - readgood); 96 passwd[readgood] = 0; 109 if (readgood > 0 && passwd[--readgood] == '\n') 110 passwd[readgood] = '\0';
|
/osnet-11/usr/src/lib/krb5/kadm5/clnt/ |
H A D | chpw.c | 21 char *passwd, 36 clearpw.length = strlen(passwd); 37 clearpw.data = passwd; 59 * version of the passwd change protocol (v2), 17 krb5int_mk_chpw_req( krb5_context context, krb5_auth_context auth_context, krb5_data *ap_req, char *passwd, krb5_data *packet) argument
|
/osnet-11/usr/src/cmd/ldap/common/ |
H A D | ldaptool-sasl.c | 33 char *passwd; member in struct:__anon54 42 char *passwd, char *realm ) 64 defaults->passwd = passwd; 111 defvalue = defaults->passwd; 126 /* Clear passwd */ 128 /* At this point defaults->passwd is not NULL */ 129 memset( defaults->passwd, '\0', strlen(defaults->passwd)); 41 ldaptool_set_sasl_defaults( LDAP *ld, char *mech, char *authid, char *username, char *passwd, char *realm ) argument
|
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/ |
H A D | chpw.c | 15 char *passwd, 30 clearpw.length = strlen(passwd); 31 clearpw.data = passwd; 268 char *passwd, 286 req.password.data = passwd; 287 req.password.length = strlen(passwd); 12 krb5int_mk_chpw_req(krb5_context context, krb5_auth_context auth_context, krb5_data *ap_req, char *passwd, krb5_data *packet) argument 264 krb5int_mk_setpw_req(krb5_context context, krb5_auth_context auth_context, krb5_data *ap_req, krb5_principal targprinc, char *passwd, krb5_data *packet) argument
|
/osnet-11/usr/src/lib/libc/port/gen/ |
H A D | getpwnam_r.c | 54 struct passwd * 55 _uncached_getpwuid_r(uid_t uid, struct passwd *result, char *buffer, 58 struct passwd * 59 _uncached_getpwnam_r(const char *name, struct passwd *result, char *buffer, 66 struct passwd * 67 getpwnam_r(const char *name, struct passwd *result, char *buffer, int buflen) 79 return ((struct passwd *)NSS_XbyY_FINI(&arg)); 86 struct passwd * 87 getpwuid_r(uid_t uid, struct passwd *result, char *buffer, int buflen) 95 return ((struct passwd *)NSS_XbyY_FIN 243 struct passwd *passwd = (struct passwd *)ent; local [all...] |
/osnet-11/usr/src/lib/libsasl/lib/ |
H A D | checkpw.c | 114 const char *passwd, size_t passlen, 118 const char *passwd, size_t passlen, 139 _sasl_MD5Update(&ctx, passwd, passlen); 152 const char *passwd, 199 if(!passwd) { 209 && !strcmp(auxprop_values[0].values[0], passwd)) { 220 passwd, strlen(passwd), 223 ret = _sasl_make_plain_secret(db_secret, passwd, 224 strlen(passwd), 113 _sasl_make_plain_secret(const sasl_utils_t *utils, const char *salt, const char *passwd, size_t passlen, sasl_secret_t **secret) argument 150 auxprop_verify_password(sasl_conn_t *conn, const char *userstr, const char *passwd, const char *service __attribute__((unused)), const char *user_realm __attribute__((unused))) argument 407 pwcheck_verify_password(sasl_conn_t *conn, const char *userid, const char *passwd, const char *service __attribute__((unused)), const char *user_realm __attribute__((unused))) argument 497 saslauthd_verify_password(sasl_conn_t *conn, const char *userid, const char *passwd, const char *service, const char *user_realm) argument [all...] |
/osnet-11/usr/src/lib/libsmbns/common/ |
H A D | smbns_kpasswd.c | 276 * Pre-condition: fqdn and passwd input parameters have already been validated 280 smb_krb5_kt_update_adjoin(char *fqdn, krb5_kvno kvno, char *passwd, argument 310 fqdn, kvno, kt_flags, passwd)) != 0) { 352 smb_krb5_setpwd(const char *fqdn, char *passwd) argument 386 code = krb5_set_password_using_ccache(ctx, cc, passwd, princ,
|
/osnet-11/usr/src/lib/libnsl/key/ |
H A D | xcrypt.c | 75 * Encrypt a secret key given passwd 80 xencrypt(secret, passwd) 82 char *passwd; 96 (void) passwd2des(passwd, key); 116 * Decrypt secret key using passwd 121 xdecrypt(secret, passwd) 123 char *passwd; 138 (void) passwd2des(passwd, key); 238 * Encrypt a secret key given passwd. 258 const char *passwd, /* i 254 xencrypt_g( char *secret, keylen_t keylen, algtype_t algtype, const char *passwd, const char netname[], char **encrypted_secret, bool_t do_chksum) argument 367 xdecrypt_g( char *secret, int keylen, int algtype, const char *passwd, const char netname[], bool_t do_chksum) argument [all...] |
H A D | publickey.c | 145 getkeys_nis(int *errp, char *netname, char *pkey, char *skey, char *passwd) argument 203 if (skey && extract_secret(p, skey, passwd)) 225 getkeys_files(int *errp, char *netname, char *pkey, char *skey, char *passwd) argument 286 if (skey && extract_secret(p, skey, passwd)) 326 getsecretkey(const char *netname, char *skey, const char *passwd) argument 329 passwd)); 345 char *passwd, /* in */ 354 if (!buf || !passwd || !raw || !private || !prilen || 372 if (!xdecrypt_g(buf, keylen, algtype, passwd, netname, TRUE)) { 397 extract_secret(char *raw, char *private, char *passwd) argument 341 extract_secret_g( char *raw, char *private, int prilen, char *passwd, char *netname, keylen_t keylen, algtype_t algtype) argument 419 getkeys_ldap_g( int *err, char *netname, char *pkey, int pkeylen, char *skey, int skeylen, char *passwd, keylen_t keylen, algtype_t algtype) argument 624 getsecretkey_g( const char *netname, keylen_t keylen, algtype_t algtype, char *skey, size_t skeylen, const char *passwd) argument [all...] |
/osnet-11/usr/src/lib/libipmi/common/ |
H A D | ipmi_user.c | 328 ipmi_user_set_password(ipmi_handle_t *ihp, uint8_t uid, const char *passwd) argument 336 if (strlen(passwd) > 19) 340 if (strlen(passwd) > 15) 343 (void) strcpy(req.isup_passwd, passwd);
|
/osnet-11/usr/src/lib/krb5/plugins/kdb/ldap/libkdb_ldap/ |
H A D | ldap_services.c | 556 krb5_ldap_set_service_passwd(krb5_context context, char *service, char *passwd) argument 566 password[0] = passwd;
|
/osnet-11/usr/src/lib/nsswitch/ldap/common/ |
H A D | getspent.c | 78 char **uid, **passwd, **last, **smin, **smax; local 97 passwd = __ns_ldap_getAttr(result->entry, _S_USERPASSWORD); 98 if (passwd == NULL || passwd[0] == NULL) { 104 } else if (strcmp(passwd[0], "") == 0) { 111 if ((tmp = strstr(passwd[0], "{crypt}")) != NULL || 112 (tmp = strstr(passwd[0], "{CRYPT}")) != NULL) { 113 if (tmp != passwd[0]) 232 * getbynam gets a passwd entry by uid name. This function constructs an ldap
|
/osnet-11/usr/src/lib/pam_modules/dhkeys/ |
H A D | dhkeys.c | 198 char *passwd; local 205 struct passwd pw; /* Needed to obtain uid */ 224 (void) pam_get_item(pamh, PAM_AUTHTOK, (void **)&passwd); 255 /* passwd can be NULL (no passwd or su as root) */ 256 if (passwd) { 257 (void) strlcpy(short_pass, passwd, sizeof (short_pass)); 315 syslog(LOG_DEBUG, "pam_dhkeys: %d passwd decrypt successes",
|
/osnet-11/usr/src/lib/pam_modules/unix_auth/ |
H A D | unix_auth.c | 197 char *passwd; local 239 if (pam_get_item(pamh, PAM_AUTHTOK, (void **)&passwd) != PAM_SUCCESS) { 332 if (passwd == NULL) { 345 if ((crypt_passwd = crypt(passwd, rep_passwd)) == NULL) {
|
/osnet-11/usr/src/lib/libfedfs/common/ |
H A D | nsdb_primitives.c | 42 char *passwd; member in struct:cb_param 66 ret = cred->passwd; 185 sasl_param.passwd = pw; 192 sasl_param.passwd = pw; 199 sasl_param.passwd = pw;
|
/osnet-11/usr/src/lib/krb5/kadm5/ |
H A D | kadm_rpc.h | 33 char *passwd; member in struct:cprinc_arg 43 char *passwd; member in struct:cprinc3_arg
|