/illumos-gate/usr/src/lib/libbc/libc/gen/common/ |
H A D | grpauth.c | 38 * password.adjunct file on the system since they do not exist anymore. 45 grpauth(char *name, char *password) argument 49 * this routine authenticates a password for the named user. 58 /* group is not in main password system */ 67 if (strcmp(crypt(password, gr.gr_passwd), gr.gr_passwd) == 0)
|
H A D | pwdauth.c | 37 * password.adjunct file on the system since they do not exist anymore. 44 pwdauth(char *name, char *password) argument 47 * this routine authenticates a password for the named user. 62 /* user is not in main password system */ 70 if (strcmp(crypt(password, enpwp), enpwp) == 0)
|
/illumos-gate/usr/src/lib/libbc/inc/include/rpcsvc/ |
H A D | pwdnm.h | 35 char *password; member in struct:pwdnm
|
/illumos-gate/usr/src/lib/pam_modules/authtok_check/ |
H A D | fascist.c | 29 /* attempt reverse engineering of password strings */ 390 char *password; local 397 password = rpassword; 399 (void) strcpy(password, Lowercase(password)); 400 (void) Trim(password); 404 * since password cannot be longer than TRUNCSTRINGSIZE; 411 if (!(a = Mangle(password, r_destructors[i]))) { 420 (void) strlcpy(password, Reverse(password), PATH_MA 437 DictCheck(char *password, char *path) argument [all...] |
/illumos-gate/usr/src/lib/pam_modules/ldap/ |
H A D | ldap_authenticate.c | 59 char *password = NULL; local 95 /* Get the password entered in the first scheme if any */ 96 (void) pam_get_item(pamh, PAM_AUTHTOK, (void **) &password); 97 if (password == NULL) { 106 * Authenticate user using the password from PAM_AUTHTOK. 107 * If no password available or if authentication fails 110 result = authenticate(&credp, user, password, NULL); 114 * user's password is good but needs 118 * password after the account management 120 * the password ha [all...] |
H A D | ldap_acct_mgmt.c | 42 * warn_user_passwd_will_expire - warn the user when the password will 64 "Your password will expire within one hour.")); 68 "Your password will expire in %d hours."), 73 "Your password will expire in %d days."), 130 * warn_user_passwd_expired - warn the user that the password has expired 140 "Your password has expired. " 146 "Your password has expired.")); 152 * display_passwd_reset_msg - tell user that password has been reset by 162 "Your password has been reset by administrator.")); 172 * seconds left for password t 255 char *password = NULL; local [all...] |
/illumos-gate/usr/src/lib/print/libpapi-common/common/ |
H A D | uri.h | 40 * scheme://[[user[:password]@]host[:port]]/path[[#fragment]|[?query]] 46 char *password; member in struct:__anon4324
|
H A D | uri.c | 41 * scheme://[[user[:password]@]host[:port]]/path[[#fragment]|[?query]] 93 char *password = NULL; local 95 for (password = user; (password < host - 1); password++) 96 if (*password == ':') { 97 u->password = strndup(password + 1, 98 host - password - 2); 101 u->user = strndup(user, password [all...] |
/illumos-gate/usr/src/lib/krb5/kadm5/srv/ |
H A D | svr_chpass_util.c | 44 char *password, 48 /* This method of password changing is not supported by the server */ 42 kadm5_chpass_principal_v2(void *server_handle, krb5_principal princ, char *password, kadm5_ret_t *srvr_rsp_code, krb5_data *srvr_msg) argument
|
/illumos-gate/usr/src/lib/print/libpapi-dynamic/common/ |
H A D | papi_impl.h | 59 char *password; member in struct:__anon4325
|
/illumos-gate/usr/src/lib/print/libpapi-ipp/common/ |
H A D | papi_impl.h | 64 char *password; member in struct:__anon4329
|
H A D | service.c | 125 char *user_name, char *password, 142 if (password != NULL) 143 svc->password = strdup(password); 178 if (svc->password != NULL) 179 free(svc->password); 211 papiServiceSetPassword(papi_service_t handle, char *password) argument 218 if (svc->password != NULL) 219 free(svc->password); 220 svc->password 124 papiServiceCreate(papi_service_t *handle, char *service_name, char *user_name, char *password, int (*authCB)(papi_service_t svc, void *app_data), papi_encryption_t encryption, void *app_data) argument [all...] |
/illumos-gate/usr/src/cmd/krb5/kadmin/kpasswd/ |
H A D | kpasswd.c | 59 * Purpose: Initialize and call lower level routines to change a password 65 * read_old_password (f) function to read old password 66 * read_new_password (f) function to read new and change password 73 * 2 old password wrong 76 * 5 password not typed 85 * If argc is 2, the password for the principal specified in argv[1] 89 * read_old_password is then called to prompt for the old password. 92 * read_new_password is called to read the new password and change the 93 * principal's password (presumably ovsec_kadm_chpass_principal). 98 * Changes the principal's password 113 char password[255]; /* I don't really like 255 but that's what kinit uses */ local [all...] |
/illumos-gate/usr/src/cmd/krb5/kadmin/server/ |
H A D | misc.c | 41 * principal (input) krb5_principals whose password we are 47 * password (input) password we are going to change to. 64 char *password) 75 password); 83 * password's min. life. 86 * principal (input) krb5_principal whose password we are 59 chpass_principal_wrapper_3(void *server_handle, krb5_principal principal, krb5_boolean keepold, int n_ks_tuple, krb5_key_salt_tuple *ks_tuple, char *password) argument
|
/illumos-gate/usr/src/lib/pam_modules/authtok_get/ |
H A D | authtok_get.c | 96 * password. 136 * Since we don't actually check the password, we should 159 * the password correctly. 188 "pam_authtok_get: new password verified"); 224 char *password; local 257 res = pam_get_item(pamh, PAM_AUTHTOK, (void **)&password); 261 if (password != NULL) 265 * No password has been entered yet. Check to see if we need 266 * to obtain a password 309 * We will ask for a password t [all...] |
/illumos-gate/usr/src/lib/pam_modules/dial_auth/ |
H A D | dial_auth.c | 64 char *password = NULL; local 154 dgettext(TEXT_DOMAIN, "Dialup Password: "), &password); 160 if (strcmp(crypt(password, p2), p2) != 0) { 161 (void) memset(password, 0, strlen(password)); 162 free(password); 165 (void) memset(password, 0, strlen(password)); 166 free(password);
|
/illumos-gate/usr/src/lib/pam_modules/krb5/ |
H A D | utils.h | 56 char *password; member in struct:__anon4258
|
H A D | krb5_acct_mgmt.c | 65 char *cpw_service, *password; local 70 password = kmd->password; 83 if (strlen(password) == 0) { 108 code = kadm5_init_with_password(kprinc, password, cpw_service, 154 * We first check to see if the KDC had set any account or password 175 char messages[PAM_MAX_NUM_MSG][PAM_MAX_MSG_SIZE], *password; local 183 password = kmd->password; 185 if (!pamh || !user || !password) { [all...] |
/illumos-gate/usr/src/lib/pam_modules/sample/ |
H A D | sample_authenticate.c | 50 * first_pass_good (first password is always good when used with use/try) 51 * first_pass_bad (first password is always bad when used with use/try) 52 * pass=foobar (set good password to "foobar". default good password 83 char *firstpass, *password; local 138 * Get the password from the user 156 password = ret_resp->resp; 158 if (password == NULL) { 165 if (strncmp(password, the_password, strlen(the_password)) == 0) { 168 /* this is the first password, stas [all...] |
/illumos-gate/usr/src/lib/krb5/plugins/kdb/ldap/libkdb_ldap/ |
H A D | kdb_ldap_conn.c | 51 unsigned char *password=NULL; local 63 krb5_set_error_message(context, st, gettext("LDAP bind password value missing")); 69 if ((st=krb5_ldap_readpassword(context, ldap_context, &password)) != 0) { 70 prepend_err_str(context, gettext("Error reading password from stash: "), st, st); 74 /* Check if the returned 'password' is actually the path of a certificate */ 75 if (!strncmp("{FILE}", (char *)password, 6)) { 76 /* 'password' format: <path>\0<password> */ 77 ldap_context->service_cert_path = strdup((char *)password + strlen("{FILE}")); 83 if (password[strle [all...] |
/illumos-gate/usr/src/lib/pam_modules/krb5_migrate/ |
H A D | krb5_migrate_authenticate.c | 54 char *password = NULL; local 125 * Grok the user password 127 err = pam_get_item(pamh, PAM_AUTHTOK, (void **)&password); 132 if (password == NULL || (password[0] == '\0')) { 291 mask, password);
|
/illumos-gate/usr/src/lib/pam_modules/passwd_auth/ |
H A D | passwd_auth.c | 69 char *password; local 115 res = pam_get_item(pamh, PAM_AUTHTOK, (void **)&password); 119 if (password != NULL) 174 * The password prompt differs between users updating their 175 * own password, and users updating other an user's password 183 dgettext(TEXT_DOMAIN, "Enter %s's password: "), 191 dgettext(TEXT_DOMAIN, "Enter existing login password: ")); 195 &password); 199 if (password [all...] |
/illumos-gate/usr/src/lib/print/libpapi-lpd/common/ |
H A D | service.c | 75 char *user_name, char *password, 93 (void) papiServiceSetPassword(svc, password); 134 papiServiceSetPassword(papi_service_t handle, char *password) argument 142 PAPI_ATTR_REPLACE, "password", password)); 220 "password", &result); 74 papiServiceCreate(papi_service_t *handle, char *service_name, char *user_name, char *password, int (*authCB)(papi_service_t svc, void *app_data), papi_encryption_t encryption, void *app_data) argument
|
/illumos-gate/usr/src/cmd/krb5/kadmin/kclient/ |
H A D | ksetpw.c | 195 gettext("Couldn't read new password\n")); 206 newpw = getpassphrase(gettext("Enter new password: ")); 209 gettext("Couldn't read new password\n")); 334 krb5_data password, salt; local 351 password.length = strlen(pw); 352 password.data = (char *)pw; 360 code = krb5_c_string_to_key(ctx, enctype, &password, &salt, &key); 386 gettext("\t-n\tDon't set the principal's password\n"));
|
/illumos-gate/usr/src/cmd/krb5/kadmin/ktutil/ |
H A D | ktutil_funcs.c | 97 * password or key. If the keytab list is NULL, allocate a new 115 krb5_data password, salt; local 166 password.length = pwsize; 167 password.data = (char *) malloc(pwsize); 168 if (!password.data) { 175 retval = krb5_read_password(context, promptstr, NULL, password.data, 176 &password.length); 182 retval = krb5_c_string_to_key(context, enctype, &password, 186 memset(password.data, 0, password [all...] |