Searched defs:passwd (Results 1 - 25 of 45) sorted by relevance

12

/osnet-11/usr/src/lib/gss_mechs/mech_dh/dh_common/
H A Ddh_nsl_tmpl.c44 * supplied public key, private key, and passwd. This routine is
67 __dl_gen_dhkeys(char *xpublic, char *xsecret, char *passwd) argument
69 __generic_gen_dhkeys(KEYLEN, MODULUS, ROOT, xpublic, xsecret, passwd);
/osnet-11/usr/src/lib/passwdutil/
H A D__check_history.c39 * passwd = new clear text password.
43 * PWU_SUCCESS, passwd found in user's old password history.
46 * PWU_NOT_FOUND, passwd not in user's old password history.
51 __check_history(char *user, char *passwd, pwu_repository_t *rep) argument
72 res = rops[i]->checkhistory(user, passwd, rep);
H A Dswitch_utils.c136 conf = __nsw_getconfig("passwd", &pserr);
145 "passwd not found.");
158 * though changing AD users' passwords through passwd(1) is not.
236 p->config_name = NSS_DBNAM_PASSWD; /* Use config for "passwd" */
257 p->config_name = NSS_DBNAM_PASSWD; /* Use config for "passwd" */
295 struct passwd *passwd = (struct passwd *)ent; local
311 passwd->pw_name = p = gettok(&next); /* username */
318 passwd
[all...]
H A Dfiles_attr.c48 int files_checkhistory(char *user, char *passwd, pwu_repository_t *rep);
79 struct passwd *pwd;
140 struct passwd *
141 private_getpwnam_r(const char *name, struct passwd *result, char *buffer,
222 * determine which password structure (/etc/passwd or /etc/shadow)
236 pwbuf->pwd = malloc(sizeof (struct passwd));
387 * passwd = new clear text password.
390 * PWU_SUCCESS, passwd found in user's old password history.
393 * PWU_NOT_FOUND, passwd not in user's old password history.
398 files_checkhistory(char *user, char *passwd, pwu_repository_ argument
[all...]
/osnet-11/usr/src/lib/libldap4/common/
H A Dbind.c56 ldap_bind( LDAP *ld, char *dn, char *passwd, int authmethod ) argument
64 * simple [0] OCTET STRING -- passwd
78 return( ldap_simple_bind( ld, dn, passwd ) );
109 ldap_bind_s( LDAP *ld, char *dn, char *passwd, int authmethod ) argument
115 return( ldap_simple_bind_s( ld, dn, passwd ) );
H A Dsbind.c38 BerElement * ldap_build_simple_bind_req(LDAP *ld, char *dn, char *passwd, LDAPControl **serverctrls) argument
46 * simple [0] OCTET STRING -- passwd
56 if ( passwd == NULL )
57 passwd = "";
64 if ( ber_printf( ber, "{it{ists}", ++ld->ld_msgid, LDAP_REQ_BIND, ld->ld_version, dn, LDAP_AUTH_SIMPLE, passwd ) == -1 ) {
107 ldap_simple_bind( LDAP *ld, char *dn, char *passwd )
120 if ( passwd == NULL )
121 passwd = "";
124 if ( (ber = ldap_build_simple_bind_req( ld, dn, passwd, NULL )) == NULLBER ) {
157 ldap_simple_bind_s( LDAP *ld, char *dn, char *passwd )
[all...]
H A Drequest.c367 char *binddn, *passwd; local
377 binddn = passwd = "";
380 if (( err = (*ld->ld_rebindproc)( ld, &binddn, &passwd,
394 if ( ldap_bind_s( ld, binddn, passwd, authmethod ) !=
403 (*ld->ld_rebindproc)( ld, &binddn, &passwd,
/osnet-11/usr/src/lib/libldap5/sources/ldap/common/
H A Dbind.c51 ldap_bind( LDAP *ld, const char *dn, const char *passwd, int authmethod ) argument
59 * simple [0] OCTET STRING -- passwd
73 return( ldap_simple_bind( ld, dn, passwd ) );
97 ldap_bind_s( LDAP *ld, const char *dn, const char *passwd, int authmethod ) argument
105 return( ldap_simple_bind_s( ld, dn, passwd ) );
H A Dsbind.c40 static int simple_bind_nolock( LDAP *ld, const char *dn, const char *passwd,
42 static int simple_bindifnot_s( LDAP *ld, const char *dn, const char *passwd );
56 ldap_simple_bind( LDAP *ld, const char *dn, const char *passwd )
66 rc = simple_bind_nolock( ld, dn, passwd, 1 );
73 simple_bind_nolock( LDAP *ld, const char *dn, const char *passwd, argument
85 * simple [0] OCTET STRING -- passwd
97 if ( passwd == NULL )
98 passwd = "";
103 bv.bv_val = (char *)passwd;
104 bv.bv_len = strlen( passwd );
[all...]
/osnet-11/usr/src/cmd/cmd-inet/usr.bin/pppd/plugins/
H A Dpassprompt.c27 static int promptpass(char *user, char *passwd) argument
38 if (user != NULL && passwd == NULL)
84 red = read(p[0], passwd + readgood, MAXSECRETLEN-1 - readgood);
96 passwd[readgood] = 0;
109 if (readgood > 0 && passwd[--readgood] == '\n')
110 passwd[readgood] = '\0';
/osnet-11/usr/src/lib/krb5/kadm5/clnt/
H A Dchpw.c21 char *passwd,
36 clearpw.length = strlen(passwd);
37 clearpw.data = passwd;
59 * version of the passwd change protocol (v2),
17 krb5int_mk_chpw_req( krb5_context context, krb5_auth_context auth_context, krb5_data *ap_req, char *passwd, krb5_data *packet) argument
/osnet-11/usr/src/cmd/ldap/common/
H A Dldaptool-sasl.c33 char *passwd; member in struct:__anon54
42 char *passwd, char *realm )
64 defaults->passwd = passwd;
111 defvalue = defaults->passwd;
126 /* Clear passwd */
128 /* At this point defaults->passwd is not NULL */
129 memset( defaults->passwd, '\0', strlen(defaults->passwd));
41 ldaptool_set_sasl_defaults( LDAP *ld, char *mech, char *authid, char *username, char *passwd, char *realm ) argument
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/
H A Dchpw.c15 char *passwd,
30 clearpw.length = strlen(passwd);
31 clearpw.data = passwd;
268 char *passwd,
286 req.password.data = passwd;
287 req.password.length = strlen(passwd);
12 krb5int_mk_chpw_req(krb5_context context, krb5_auth_context auth_context, krb5_data *ap_req, char *passwd, krb5_data *packet) argument
264 krb5int_mk_setpw_req(krb5_context context, krb5_auth_context auth_context, krb5_data *ap_req, krb5_principal targprinc, char *passwd, krb5_data *packet) argument
/osnet-11/usr/src/lib/libc/port/gen/
H A Dgetpwnam_r.c54 struct passwd *
55 _uncached_getpwuid_r(uid_t uid, struct passwd *result, char *buffer,
58 struct passwd *
59 _uncached_getpwnam_r(const char *name, struct passwd *result, char *buffer,
66 struct passwd *
67 getpwnam_r(const char *name, struct passwd *result, char *buffer, int buflen)
79 return ((struct passwd *)NSS_XbyY_FINI(&arg));
86 struct passwd *
87 getpwuid_r(uid_t uid, struct passwd *result, char *buffer, int buflen)
95 return ((struct passwd *)NSS_XbyY_FIN
243 struct passwd *passwd = (struct passwd *)ent; local
[all...]
/osnet-11/usr/src/lib/libsasl/lib/
H A Dcheckpw.c114 const char *passwd, size_t passlen,
118 const char *passwd, size_t passlen,
139 _sasl_MD5Update(&ctx, passwd, passlen);
152 const char *passwd,
199 if(!passwd) {
209 && !strcmp(auxprop_values[0].values[0], passwd)) {
220 passwd, strlen(passwd),
223 ret = _sasl_make_plain_secret(db_secret, passwd,
224 strlen(passwd),
113 _sasl_make_plain_secret(const sasl_utils_t *utils, const char *salt, const char *passwd, size_t passlen, sasl_secret_t **secret) argument
150 auxprop_verify_password(sasl_conn_t *conn, const char *userstr, const char *passwd, const char *service __attribute__((unused)), const char *user_realm __attribute__((unused))) argument
407 pwcheck_verify_password(sasl_conn_t *conn, const char *userid, const char *passwd, const char *service __attribute__((unused)), const char *user_realm __attribute__((unused))) argument
497 saslauthd_verify_password(sasl_conn_t *conn, const char *userid, const char *passwd, const char *service, const char *user_realm) argument
[all...]
/osnet-11/usr/src/lib/libsmbns/common/
H A Dsmbns_kpasswd.c276 * Pre-condition: fqdn and passwd input parameters have already been validated
280 smb_krb5_kt_update_adjoin(char *fqdn, krb5_kvno kvno, char *passwd, argument
310 fqdn, kvno, kt_flags, passwd)) != 0) {
352 smb_krb5_setpwd(const char *fqdn, char *passwd) argument
386 code = krb5_set_password_using_ccache(ctx, cc, passwd, princ,
/osnet-11/usr/src/lib/libnsl/key/
H A Dxcrypt.c75 * Encrypt a secret key given passwd
80 xencrypt(secret, passwd)
82 char *passwd;
96 (void) passwd2des(passwd, key);
116 * Decrypt secret key using passwd
121 xdecrypt(secret, passwd)
123 char *passwd;
138 (void) passwd2des(passwd, key);
238 * Encrypt a secret key given passwd.
258 const char *passwd, /* i
254 xencrypt_g( char *secret, keylen_t keylen, algtype_t algtype, const char *passwd, const char netname[], char **encrypted_secret, bool_t do_chksum) argument
367 xdecrypt_g( char *secret, int keylen, int algtype, const char *passwd, const char netname[], bool_t do_chksum) argument
[all...]
H A Dpublickey.c145 getkeys_nis(int *errp, char *netname, char *pkey, char *skey, char *passwd) argument
203 if (skey && extract_secret(p, skey, passwd))
225 getkeys_files(int *errp, char *netname, char *pkey, char *skey, char *passwd) argument
286 if (skey && extract_secret(p, skey, passwd))
326 getsecretkey(const char *netname, char *skey, const char *passwd) argument
329 passwd));
345 char *passwd, /* in */
354 if (!buf || !passwd || !raw || !private || !prilen ||
372 if (!xdecrypt_g(buf, keylen, algtype, passwd, netname, TRUE)) {
397 extract_secret(char *raw, char *private, char *passwd) argument
341 extract_secret_g( char *raw, char *private, int prilen, char *passwd, char *netname, keylen_t keylen, algtype_t algtype) argument
419 getkeys_ldap_g( int *err, char *netname, char *pkey, int pkeylen, char *skey, int skeylen, char *passwd, keylen_t keylen, algtype_t algtype) argument
624 getsecretkey_g( const char *netname, keylen_t keylen, algtype_t algtype, char *skey, size_t skeylen, const char *passwd) argument
[all...]
/osnet-11/usr/src/lib/libipmi/common/
H A Dipmi_user.c328 ipmi_user_set_password(ipmi_handle_t *ihp, uint8_t uid, const char *passwd) argument
336 if (strlen(passwd) > 19)
340 if (strlen(passwd) > 15)
343 (void) strcpy(req.isup_passwd, passwd);
/osnet-11/usr/src/lib/krb5/plugins/kdb/ldap/libkdb_ldap/
H A Dldap_services.c556 krb5_ldap_set_service_passwd(krb5_context context, char *service, char *passwd) argument
566 password[0] = passwd;
/osnet-11/usr/src/lib/nsswitch/ldap/common/
H A Dgetspent.c78 char **uid, **passwd, **last, **smin, **smax; local
97 passwd = __ns_ldap_getAttr(result->entry, _S_USERPASSWORD);
98 if (passwd == NULL || passwd[0] == NULL) {
104 } else if (strcmp(passwd[0], "") == 0) {
111 if ((tmp = strstr(passwd[0], "{crypt}")) != NULL ||
112 (tmp = strstr(passwd[0], "{CRYPT}")) != NULL) {
113 if (tmp != passwd[0])
232 * getbynam gets a passwd entry by uid name. This function constructs an ldap
/osnet-11/usr/src/lib/pam_modules/dhkeys/
H A Ddhkeys.c198 char *passwd; local
205 struct passwd pw; /* Needed to obtain uid */
224 (void) pam_get_item(pamh, PAM_AUTHTOK, (void **)&passwd);
255 /* passwd can be NULL (no passwd or su as root) */
256 if (passwd) {
257 (void) strlcpy(short_pass, passwd, sizeof (short_pass));
315 syslog(LOG_DEBUG, "pam_dhkeys: %d passwd decrypt successes",
/osnet-11/usr/src/lib/pam_modules/unix_auth/
H A Dunix_auth.c197 char *passwd; local
239 if (pam_get_item(pamh, PAM_AUTHTOK, (void **)&passwd) != PAM_SUCCESS) {
332 if (passwd == NULL) {
345 if ((crypt_passwd = crypt(passwd, rep_passwd)) == NULL) {
/osnet-11/usr/src/lib/libfedfs/common/
H A Dnsdb_primitives.c42 char *passwd; member in struct:cb_param
66 ret = cred->passwd;
185 sasl_param.passwd = pw;
192 sasl_param.passwd = pw;
199 sasl_param.passwd = pw;
/osnet-11/usr/src/lib/krb5/kadm5/
H A Dkadm_rpc.h33 char *passwd; member in struct:cprinc_arg
43 char *passwd; member in struct:cprinc3_arg

Completed in 177 milliseconds

12