Searched defs:password (Results 1 - 25 of 69) sorted by relevance

123

/illumos-gate/usr/src/lib/libbc/libc/gen/common/
H A Dgrpauth.c38 * password.adjunct file on the system since they do not exist anymore.
45 grpauth(char *name, char *password) argument
49 * this routine authenticates a password for the named user.
58 /* group is not in main password system */
67 if (strcmp(crypt(password, gr.gr_passwd), gr.gr_passwd) == 0)
H A Dpwdauth.c37 * password.adjunct file on the system since they do not exist anymore.
44 pwdauth(char *name, char *password) argument
47 * this routine authenticates a password for the named user.
62 /* user is not in main password system */
70 if (strcmp(crypt(password, enpwp), enpwp) == 0)
/illumos-gate/usr/src/lib/libbc/inc/include/rpcsvc/
H A Dpwdnm.h35 char *password; member in struct:pwdnm
/illumos-gate/usr/src/lib/pam_modules/authtok_check/
H A Dfascist.c29 /* attempt reverse engineering of password strings */
390 char *password; local
397 password = rpassword;
399 (void) strcpy(password, Lowercase(password));
400 (void) Trim(password);
404 * since password cannot be longer than TRUNCSTRINGSIZE;
411 if (!(a = Mangle(password, r_destructors[i]))) {
420 (void) strlcpy(password, Reverse(password), PATH_MA
437 DictCheck(char *password, char *path) argument
[all...]
/illumos-gate/usr/src/lib/pam_modules/ldap/
H A Dldap_authenticate.c59 char *password = NULL; local
95 /* Get the password entered in the first scheme if any */
96 (void) pam_get_item(pamh, PAM_AUTHTOK, (void **) &password);
97 if (password == NULL) {
106 * Authenticate user using the password from PAM_AUTHTOK.
107 * If no password available or if authentication fails
110 result = authenticate(&credp, user, password, NULL);
114 * user's password is good but needs
118 * password after the account management
120 * the password ha
[all...]
H A Dldap_acct_mgmt.c42 * warn_user_passwd_will_expire - warn the user when the password will
64 "Your password will expire within one hour."));
68 "Your password will expire in %d hours."),
73 "Your password will expire in %d days."),
130 * warn_user_passwd_expired - warn the user that the password has expired
140 "Your password has expired. "
146 "Your password has expired."));
152 * display_passwd_reset_msg - tell user that password has been reset by
162 "Your password has been reset by administrator."));
172 * seconds left for password t
255 char *password = NULL; local
[all...]
/illumos-gate/usr/src/lib/print/libpapi-common/common/
H A Duri.h40 * scheme://[[user[:password]@]host[:port]]/path[[#fragment]|[?query]]
46 char *password; member in struct:__anon4324
H A Duri.c41 * scheme://[[user[:password]@]host[:port]]/path[[#fragment]|[?query]]
93 char *password = NULL; local
95 for (password = user; (password < host - 1); password++)
96 if (*password == ':') {
97 u->password = strndup(password + 1,
98 host - password - 2);
101 u->user = strndup(user, password
[all...]
/illumos-gate/usr/src/lib/krb5/kadm5/srv/
H A Dsvr_chpass_util.c44 char *password,
48 /* This method of password changing is not supported by the server */
42 kadm5_chpass_principal_v2(void *server_handle, krb5_principal princ, char *password, kadm5_ret_t *srvr_rsp_code, krb5_data *srvr_msg) argument
/illumos-gate/usr/src/lib/print/libpapi-dynamic/common/
H A Dpapi_impl.h59 char *password; member in struct:__anon4325
/illumos-gate/usr/src/lib/print/libpapi-ipp/common/
H A Dpapi_impl.h64 char *password; member in struct:__anon4329
H A Dservice.c125 char *user_name, char *password,
142 if (password != NULL)
143 svc->password = strdup(password);
178 if (svc->password != NULL)
179 free(svc->password);
211 papiServiceSetPassword(papi_service_t handle, char *password) argument
218 if (svc->password != NULL)
219 free(svc->password);
220 svc->password
124 papiServiceCreate(papi_service_t *handle, char *service_name, char *user_name, char *password, int (*authCB)(papi_service_t svc, void *app_data), papi_encryption_t encryption, void *app_data) argument
[all...]
/illumos-gate/usr/src/cmd/krb5/kadmin/kpasswd/
H A Dkpasswd.c59 * Purpose: Initialize and call lower level routines to change a password
65 * read_old_password (f) function to read old password
66 * read_new_password (f) function to read new and change password
73 * 2 old password wrong
76 * 5 password not typed
85 * If argc is 2, the password for the principal specified in argv[1]
89 * read_old_password is then called to prompt for the old password.
92 * read_new_password is called to read the new password and change the
93 * principal's password (presumably ovsec_kadm_chpass_principal).
98 * Changes the principal's password
113 char password[255]; /* I don't really like 255 but that's what kinit uses */ local
[all...]
/illumos-gate/usr/src/cmd/krb5/kadmin/server/
H A Dmisc.c41 * principal (input) krb5_principals whose password we are
47 * password (input) password we are going to change to.
64 char *password)
75 password);
83 * password's min. life.
86 * principal (input) krb5_principal whose password we are
59 chpass_principal_wrapper_3(void *server_handle, krb5_principal principal, krb5_boolean keepold, int n_ks_tuple, krb5_key_salt_tuple *ks_tuple, char *password) argument
/illumos-gate/usr/src/lib/pam_modules/authtok_get/
H A Dauthtok_get.c96 * password.
136 * Since we don't actually check the password, we should
159 * the password correctly.
188 "pam_authtok_get: new password verified");
224 char *password; local
257 res = pam_get_item(pamh, PAM_AUTHTOK, (void **)&password);
261 if (password != NULL)
265 * No password has been entered yet. Check to see if we need
266 * to obtain a password
309 * We will ask for a password t
[all...]
/illumos-gate/usr/src/lib/pam_modules/dial_auth/
H A Ddial_auth.c64 char *password = NULL; local
154 dgettext(TEXT_DOMAIN, "Dialup Password: "), &password);
160 if (strcmp(crypt(password, p2), p2) != 0) {
161 (void) memset(password, 0, strlen(password));
162 free(password);
165 (void) memset(password, 0, strlen(password));
166 free(password);
/illumos-gate/usr/src/lib/pam_modules/krb5/
H A Dutils.h56 char *password; member in struct:__anon4258
H A Dkrb5_acct_mgmt.c65 char *cpw_service, *password; local
70 password = kmd->password;
83 if (strlen(password) == 0) {
108 code = kadm5_init_with_password(kprinc, password, cpw_service,
154 * We first check to see if the KDC had set any account or password
175 char messages[PAM_MAX_NUM_MSG][PAM_MAX_MSG_SIZE], *password; local
183 password = kmd->password;
185 if (!pamh || !user || !password) {
[all...]
/illumos-gate/usr/src/lib/pam_modules/sample/
H A Dsample_authenticate.c50 * first_pass_good (first password is always good when used with use/try)
51 * first_pass_bad (first password is always bad when used with use/try)
52 * pass=foobar (set good password to "foobar". default good password
83 char *firstpass, *password; local
138 * Get the password from the user
156 password = ret_resp->resp;
158 if (password == NULL) {
165 if (strncmp(password, the_password, strlen(the_password)) == 0) {
168 /* this is the first password, stas
[all...]
/illumos-gate/usr/src/lib/krb5/plugins/kdb/ldap/libkdb_ldap/
H A Dkdb_ldap_conn.c51 unsigned char *password=NULL; local
63 krb5_set_error_message(context, st, gettext("LDAP bind password value missing"));
69 if ((st=krb5_ldap_readpassword(context, ldap_context, &password)) != 0) {
70 prepend_err_str(context, gettext("Error reading password from stash: "), st, st);
74 /* Check if the returned 'password' is actually the path of a certificate */
75 if (!strncmp("{FILE}", (char *)password, 6)) {
76 /* 'password' format: <path>\0<password> */
77 ldap_context->service_cert_path = strdup((char *)password + strlen("{FILE}"));
83 if (password[strle
[all...]
/illumos-gate/usr/src/lib/pam_modules/krb5_migrate/
H A Dkrb5_migrate_authenticate.c54 char *password = NULL; local
125 * Grok the user password
127 err = pam_get_item(pamh, PAM_AUTHTOK, (void **)&password);
132 if (password == NULL || (password[0] == '\0')) {
291 mask, password);
/illumos-gate/usr/src/lib/pam_modules/passwd_auth/
H A Dpasswd_auth.c69 char *password; local
115 res = pam_get_item(pamh, PAM_AUTHTOK, (void **)&password);
119 if (password != NULL)
174 * The password prompt differs between users updating their
175 * own password, and users updating other an user's password
183 dgettext(TEXT_DOMAIN, "Enter %s's password: "),
191 dgettext(TEXT_DOMAIN, "Enter existing login password: "));
195 &password);
199 if (password
[all...]
/illumos-gate/usr/src/lib/print/libpapi-lpd/common/
H A Dservice.c75 char *user_name, char *password,
93 (void) papiServiceSetPassword(svc, password);
134 papiServiceSetPassword(papi_service_t handle, char *password) argument
142 PAPI_ATTR_REPLACE, "password", password));
220 "password", &result);
74 papiServiceCreate(papi_service_t *handle, char *service_name, char *user_name, char *password, int (*authCB)(papi_service_t svc, void *app_data), papi_encryption_t encryption, void *app_data) argument
/illumos-gate/usr/src/cmd/krb5/kadmin/kclient/
H A Dksetpw.c195 gettext("Couldn't read new password\n"));
206 newpw = getpassphrase(gettext("Enter new password: "));
209 gettext("Couldn't read new password\n"));
334 krb5_data password, salt; local
351 password.length = strlen(pw);
352 password.data = (char *)pw;
360 code = krb5_c_string_to_key(ctx, enctype, &password, &salt, &key);
386 gettext("\t-n\tDon't set the principal's password\n"));
/illumos-gate/usr/src/cmd/krb5/kadmin/ktutil/
H A Dktutil_funcs.c97 * password or key. If the keytab list is NULL, allocate a new
115 krb5_data password, salt; local
166 password.length = pwsize;
167 password.data = (char *) malloc(pwsize);
168 if (!password.data) {
175 retval = krb5_read_password(context, promptstr, NULL, password.data,
176 &password.length);
182 retval = krb5_c_string_to_key(context, enctype, &password,
186 memset(password.data, 0, password
[all...]

Completed in 91 milliseconds

123