/dovecot/src/lib-sasl/ |
H A D | dsasl-client.h | 10 /* password - must be set with most mechanisms */ 11 const char *password; member in struct:dsasl_client_settings
|
H A D | dsasl-client-private.h | 9 char *password; member in struct:dsasl_client
|
/dovecot/src/auth/ |
H A D | passdb-sia.c | 33 local_sia_verify_plain(struct auth_request *request, const char *password, argument 40 /* check if the password is valid */ 43 (char *)password) != SIASUCCESS) {
|
H A D | passdb-bsdauth.c | 17 bsdauth_verify_plain(struct auth_request *request, const char *password, argument 38 /* check if the password is valid */ 41 t_strdup_noconst(password));
|
H A D | passdb-blocking.c | 7 #include "password-scheme.h" 33 /* OK \t user \t password [\t extra] */ 50 /* FAIL \t result [\t user \t password [\t extra]] */ 107 const char *password = NULL, *scheme = NULL; local 111 password = request->passdb_password; 112 scheme = password_get_scheme(&password); 116 "password scheme"); 121 passdb_handle_credentials(result, password, scheme,
|
H A D | passdb-oauth2.c | 28 oauth2_verify_plain(struct auth_request *request, const char *password, argument 40 db_oauth2_lookup(module->db, req, password, request, oauth2_verify_plain_continue, request);
|
H A D | passdb-passwd.c | 31 "invalid password field '%s'", pw_r->pw_passwd); 35 /* save the password so cache can use it */ 36 auth_request_set_field(request, "password", pw_r->pw_passwd, 42 passwd_verify_plain(struct auth_request *request, const char *password, argument 54 /* check if the password is valid */ 55 ret = auth_request_password_verify(request, password, pw.pw_passwd,
|
H A D | passdb-shadow.c | 28 "invalid password field"); 32 /* save the password so cache can use it */ 33 auth_request_set_field(request, "password", (*spw_r)->sp_pwdp, 39 shadow_verify_plain(struct auth_request *request, const char *password, argument 52 /* check if the password is valid */ 53 ret = auth_request_password_verify(request, password, spw->sp_pwdp,
|
H A D | db-passwd-file.h | 14 char *password; member in struct:passwd_user
|
H A D | passdb-checkpassword.c | 8 #include "password-scheme.h" 36 if (strncmp(extra_fields[i], "password=", 9) == 0) 47 auth_request_set_field(request, "password", 51 "password field returned without {scheme} prefix"); 58 checkpassword_verify_plain(struct auth_request *request, const char *password, argument 65 db_checkpassword_call(module->db, request, password, 89 if (strncmp(extra_fields[i], "password=", 9) == 0)
|
H A D | passdb-static.c | 6 #include "password-scheme.h" 36 "Failed to expand password=%s: %s", 44 "No password returned (and no nopassword)"); 53 auth_request_set_field(request, "password", 60 static_verify_plain(struct auth_request *request, const char *password, argument 75 ret = auth_request_password_verify(request, password, static_password, 107 if (passdb_template_remove(module->tmpl, "password", &value))
|
H A D | passdb-cache.c | 9 #include "password-scheme.h" 23 /* hide the password */ 39 /* value = password \t ... */ 68 const char *password, 95 /* NULL password */ 97 "Cached NULL password access"); 104 str_append_tabescaped(str, password); 111 "validating password on worker"); 120 ret = auth_request_password_verify_log(request, password, cached_pw, 126 that the password wa 67 passdb_cache_verify_plain(struct auth_request *request, const char *key, const char *password, enum passdb_result *result_r, bool use_expired) argument [all...] |
H A D | passdb-dict.c | 10 #include "password-scheme.h" 73 "No password returned (and no nopassword)"); 87 const char *password = NULL, *scheme = NULL; local 103 password = t_strdup(auth_request->passdb_password); 104 scheme = password_get_scheme(&password); 106 i_assert(password == NULL || scheme != NULL); 110 passdb_handle_credentials(passdb_result, password, scheme, 114 if (password != NULL) { 117 password, scheme, AUTH_SUBSYS_DB); 128 const char *password ATTR_UNUSE [all...] |
H A D | passdb-imap.c | 82 const char *password, 98 set.password = password; 81 passdb_imap_verify_plain(struct auth_request *auth_request, const char *password, verify_plain_callback_t *callback) argument
|
H A D | passdb-lua.c | 20 struct auth_request *request, const char *password) 25 password, &error); 56 "No password returned (and no nopassword)"); 61 "nopassword given and password is not empty"); 79 passdb_lua_verify_plain(struct auth_request *request, const char *password, argument 88 result = passdb_lua_verify_password(module, request, password); 94 if ((auth_request_password_verify(request, password, lua_password, 19 passdb_lua_verify_password(struct dlua_passdb_module *module, struct auth_request *request, const char *password) argument
|
H A D | passdb-passwd-file.c | 10 #include "password-scheme.h" 57 *crypted_pass_r = pu->password != NULL ? pu->password : ""; 62 /* save the password so cache can use it */ 63 auth_request_set_field(request, "password", 74 passwd_file_verify_plain(struct auth_request *request, const char *password, argument 97 ret = auth_request_password_verify(request, password, crypted_pass,
|
H A D | passdb-vpopmail.c | 11 #include "password-scheme.h" 65 char *password; local 77 password = NULL; 82 password = t_strdup_noconst(vpw->pw_clear_passwd); 85 password = t_strdup_noconst(vpw->pw_passwd); 87 password = NULL; 88 *result_r = password != NULL ? PASSDB_RESULT_OK : 98 return password; 105 char *password; local 108 password 120 vpopmail_verify_plain(struct auth_request *request, const char *password, verify_plain_callback_t *callback) argument [all...] |
/dovecot/src/plugins/mail-crypt/ |
H A D | mail-crypt-userenv.c | 24 const char *password = mail_user_plugin_getenv(user, set_pw); local 26 set_pw, password,
|
H A D | mail-crypt-pluginenv.c | 70 const char *password = mail_crypt_plugin_getenv(set, set_pw); local 72 set_pw, password,
|
/dovecot/src/lib-http/ |
H A D | http-url.h | 18 const char *password; member in struct:http_url 42 /* Allow 'user:password@' part in HTTP URL */
|
/dovecot/src/lib-ldap/ |
H A D | ldap-client.h | 26 const char *password; member in struct:ldap_client_settings
|
/dovecot/src/lib/ |
H A D | pkcs5.c | 14 const unsigned char *password, size_t password_len, 27 hash->loop(ctx, password, password_len); 45 const unsigned char *password, size_t password_len, 63 hmac_init(&hctx, password, password_len, hash); 71 hmac_init(&hctx, password, password_len, hash); 85 const unsigned char *password, size_t password_len, 91 return pkcs5_pbkdf1(hash,password,password_len, 94 return pkcs5_pbkdf2(hash,password,password_len, 13 pkcs5_pbkdf1(const struct hash_method *hash, const unsigned char *password, size_t password_len, const unsigned char *salt, size_t salt_len, unsigned int iter, uint32_t length, buffer_t *result) argument 44 pkcs5_pbkdf2(const struct hash_method *hash, const unsigned char *password, size_t password_len, const unsigned char *salt, size_t salt_len, unsigned int iter, uint32_t length, buffer_t *result) argument 84 pkcs5_pbkdf(enum pkcs5_pbkdf_mode mode, const struct hash_method *hash, const unsigned char *password, size_t password_len, const unsigned char *salt, size_t salt_len, unsigned int iterations, uint32_t dk_len, buffer_t *result) argument
|
/dovecot/src/lib-dict-backend/ |
H A D | dict-ldap-settings.h | 23 const char *password; member in struct:dict_ldap_settings
|
/dovecot/src/lib-smtp/ |
H A D | smtp-client.h | 52 const char *password; member in struct:smtp_client_settings 90 /* don't clear password after first successful authentication */
|
/dovecot/src/lib-storage/index/pop3c/ |
H A D | pop3c-client.h | 31 const char *password; member in struct:pop3c_client_settings
|