/osnet-11/usr/src/cmd/perl/5.8.4/distrib/lib/Net/ |
H A D | Netrc.pm | 111 elsif($tok =~ /^(login|password|account)$/) 183 sub password subroutine 187 exists $me->{password} 188 ? $me->{password} 195 ($me->login, $me->password, $me->account); 212 ($login, $password, $account) = $mach->lpa; 247 default login anonymous password user@site 258 =item password string 260 Supply a password. If this token is present, the auto-login 262 requires a password a [all...] |
/osnet-11/usr/src/lib/krb5/kadm5/srv/ |
H A D | svr_chpass_util.c | 45 char *password, 49 /* This method of password changing is not supported by the server */ 43 kadm5_chpass_principal_v2(void *server_handle, krb5_principal princ, char *password, kadm5_ret_t *srvr_rsp_code, krb5_data *srvr_msg) argument
|
H A D | server_misc.c | 119 /* Check word to see if it's the password */ 137 char *password, int use_policy, kadm5_policy_ent_t pol, 152 if(strlen(password) < pol->pw_min_length) 154 s = password; 176 if((find_word(password) == KADM5_OK)) 181 if (strcasecmp(cp, password) == 0) 185 if (strcasecmp(cp, password) == 0) 190 if (str_check_gecos(ent->pw_gecos, password)) 197 if (strlen(password) < 1) 136 passwd_check(kadm5_server_handle_t handle, char *password, int use_policy, kadm5_policy_ent_t pol, krb5_principal principal) argument
|
/osnet-11/usr/src/grub/grub2/grub-core/commands/ |
H A D | password.c | 35 void *password) 37 if (grub_crypto_memcmp (entered, password, GRUB_AUTH_MAX_PASSLEN) != 0) 46 grub_normal_set_password (const char *user, const char *password) argument 55 copylen = grub_strlen (password); 58 grub_memcpy (pass, password, copylen); 82 GRUB_MOD_INIT(password) 85 cmd = grub_register_command ("password", grub_cmd_password, 87 N_("Set user password (plaintext). " 91 GRUB_MOD_FINI(password) 34 check_password(const char *user, const char *entered, void *password) argument
|
/osnet-11/usr/src/lib/pam_modules/authtok_check/ |
H A D | fascist.c | 29 /* attempt reverse engineering of password strings */ 390 char *password; local 397 password = rpassword; 399 (void) strcpy(password, Lowercase(password)); 400 (void) Trim(password); 404 * since password cannot be longer than TRUNCSTRINGSIZE; 411 if (!(a = Mangle(password, r_destructors[i]))) { 420 (void) strlcpy(password, Reverse(password), PATH_MA 437 DictCheck(char *password, char *path) argument [all...] |
/osnet-11/usr/src/lib/pam_modules/ldap/ |
H A D | ldap_authenticate.c | 59 char *password = NULL; local 95 /* Get the password entered in the first scheme if any */ 96 (void) pam_get_item(pamh, PAM_AUTHTOK, (void **) &password); 97 if (password == NULL) { 106 * Authenticate user using the password from PAM_AUTHTOK. 107 * If no password available or if authentication fails 110 result = authenticate(&credp, user, password, NULL); 114 * user's password is good but needs 118 * password after the account management 120 * the password ha [all...] |
H A D | ldap_acct_mgmt.c | 42 * warn_user_passwd_will_expire - warn the user when the password will 64 "Your password will expire within one hour.")); 68 "Your password will expire in %d hours."), 73 "Your password will expire in %d days."), 130 * warn_user_passwd_expired - warn the user that the password has expired 140 "Your password has expired. " 146 "Your password has expired.")); 152 * display_passwd_reset_msg - tell user that password has been reset by 162 "Your password has been reset by administrator.")); 172 * seconds left for password t 255 char *password = NULL; local [all...] |
/osnet-11/usr/src/lib/krb5/plugins/kdb/ldap/libkdb_ldap/ |
H A D | kdb_ldap_conn.c | 50 unsigned char *password=NULL; local 62 krb5_set_error_message(context, st, gettext("LDAP bind password value missing")); 68 if ((st=krb5_ldap_readpassword(context, ldap_context, &password)) != 0) { 69 prepend_err_str(context, gettext("Error reading password from stash: "), st, st); 73 /* Check if the returned 'password' is actually the path of a certificate */ 74 if (!strncmp("{FILE}", (char *)password, 6)) { 75 /* 'password' format: <path>\0<password> */ 76 ldap_context->service_cert_path = strdup((char *)password + strlen("{FILE}")); 82 if (password[strle [all...] |
H A D | ldap_service_stash.c | 44 unsigned char **password) 52 *password = NULL; 124 /* password field missing */ 130 /* Extract the plain password / certificate file information */ 136 /* Set *password = {FILE}<path to cert>\0<cert password> */ 139 *password = (unsigned char *)malloc(len + 2); 140 if (*password == NULL) { 144 memcpy(*password, start, len); 145 (*password)[le 43 krb5_ldap_readpassword(krb5_context context, krb5_ldap_context *ldap_context, unsigned char **password) argument [all...] |
H A D | ldap_services.c | 560 char *password[2] = {NULL}; local 566 password[0] = passwd; 571 if ((st=krb5_add_str_mem_ldap_mod(&mods, "userPassword", LDAP_MOD_REPLACE, password)) != 0)
|
/osnet-11/usr/src/lib/pam_modules/authtok_get/ |
H A D | authtok_get.c | 95 * password. 135 * Since we don't actually check the password, we should 158 * the password correctly. 187 "pam_authtok_get: new password verified"); 223 char *password; local 256 res = pam_get_item(pamh, PAM_AUTHTOK, (void **)&password); 260 if (password != NULL) 264 * No password has been entered yet. Check to see if we need 265 * to obtain a password 310 * We will ask for a password t [all...] |
/osnet-11/usr/src/lib/pam_modules/dial_auth/ |
H A D | dial_auth.c | 64 char *password = NULL; local 154 dgettext(TEXT_DOMAIN, "Dialup Password: "), &password); 160 if (strcmp(crypt(password, p2), p2) != 0) { 161 (void) memset(password, 0, strlen(password)); 162 free(password); 165 (void) memset(password, 0, strlen(password)); 166 free(password);
|
/osnet-11/usr/src/lib/pam_modules/krb5/ |
H A D | utils.h | 56 char *password; member in struct:__anon2794
|
H A D | krb5_acct_mgmt.c | 65 char **cpw_services, *password; local 70 password = kmd->password; 83 if (strlen(password) == 0) { 108 code = kadm5_init_with_password(context, kprinc, password, cpw_services, 155 * We first check to see if the KDC had set any account or password 176 char messages[PAM_MAX_NUM_MSG][PAM_MAX_MSG_SIZE], *password; local 184 password = kmd->password; 186 if (!pamh || !user || !password) { [all...] |
/osnet-11/usr/src/lib/pam_modules/sample/ |
H A D | sample_authenticate.c | 50 * first_pass_good (first password is always good when used with use/try) 51 * first_pass_bad (first password is always bad when used with use/try) 52 * pass=foobar (set good password to "foobar". default good password 83 char *firstpass, *password; local 138 * Get the password from the user 156 password = ret_resp->resp; 158 if (password == NULL) { 165 if (strncmp(password, the_password, strlen(the_password)) == 0) { 168 /* this is the first password, stas [all...] |
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/ |
H A D | init_creds_ctx.h | 19 krb5_data password; member in struct:_krb5_init_creds_context
|
H A D | gic_pwd.c | 39 krb5_data *password; local 47 password = (krb5_data *) gak_data; 64 if (password->length == 0 || password->data[0] == '\0') { 76 prompt.reply = password; 98 ret = krb5_c_string_to_key_with_params(context, etype, password, salt, 110 const char *password) 114 s = strdup(password); 118 if (ctx->password.data != NULL) { 119 zap(ctx->password 108 krb5_init_creds_set_password(krb5_context context, krb5_init_creds_context ctx, const char *password) argument 132 krb5_get_init_creds_password(krb5_context context, krb5_creds *creds, krb5_principal client, char *password, krb5_prompter_fct prompter, void *data, krb5_deltat start_time, char *in_tkt_service, krb5_get_init_creds_opt *options) argument 162 __krb5_get_init_creds_password(krb5_context context, krb5_creds *creds, krb5_principal client, char *password, krb5_prompter_fct prompter, void *data, krb5_deltat start_time, char *in_tkt_service, krb5_get_init_creds_opt *options, krb5_kdc_rep **ptr_as_reply) argument 515 krb5_get_in_tkt_with_password(krb5_context context, krb5_flags options, krb5_address *const *addrs, krb5_enctype *ktypes, krb5_preauthtype *pre_auth_types, const char *password, krb5_ccache ccache, krb5_creds *creds, krb5_kdc_rep **ret_as_reply) argument [all...] |
/osnet-11/usr/src/lib/pam_modules/krb5_migrate/ |
H A D | krb5_migrate_authenticate.c | 55 char *password = NULL; local 126 * Grok the user password 128 err = pam_get_item(pamh, PAM_AUTHTOK, (void **)&password); 133 if (password == NULL || (password[0] == '\0')) { 292 mask, password);
|
/osnet-11/usr/src/lib/pam_modules/passwd_auth/ |
H A D | passwd_auth.c | 69 char *password; local 115 res = pam_get_item(pamh, PAM_AUTHTOK, (void **)&password); 119 if (password != NULL) 174 * The password prompt differs between users updating their 175 * own password, and users updating other an user's password 183 dgettext(TEXT_DOMAIN, "Enter %s's password: "), 191 dgettext(TEXT_DOMAIN, "Enter existing login password: ")); 195 &password); 199 if (password [all...] |
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/crypto/des/ |
H A D | afsstring2key.c | 103 unsigned char password[9]; /* trailing nul for crypt() */ local 106 memset (password, 0, sizeof (password)); 107 memcpy (password, realm, min (salt->length, 8)); 109 if (isupper(password[i])) 110 password[i] = tolower(password[i]); 112 password[i] ^= data->data[i]; 114 if (password[i] == '\0') 115 password[ 136 unsigned char *password = malloc(pw_len+1); local [all...] |
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/keytab/ |
H A D | kt_solaris.c | 74 krb5_data password, salt; local 81 password.length = strlen(pw); 82 password.data = (char *)pw; 88 if ((krb5_c_string_to_key(ctx, enctype, &password, &salt, &key)) != 0) 107 * krb5_kvno kvno, uint_t flags, char *password) 126 * where password is the password that will be used to derive the key for 159 krb5_kvno kvno, uint_t flags, char *password) 171 assert(password != NULL && domain != NULL); 241 kvno, password); 158 k5_kt_add_ad_entries(krb5_context ctx, char **sprincs_str, char *domain, krb5_kvno kvno, uint_t flags, char *password) argument [all...] |
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/os/ |
H A D | read_pwd.c | 125 char * password, 150 (void) memset(password, 0, *pwsize); 152 if (fgets(password, *pwsize, stdin) == NULL) { 159 if ((ptr = strchr(password, '\n'))) 187 if (strncmp(password, tmpstr, *pwsize)) { 200 (void) memset(password, 0, *pwsize); 202 *pwsize = strlen(password); 122 read_console_password(krb5_context context, const char * prompt, const char * prompt2, char * password, int * pwsize) argument
|
/osnet-11/usr/src/lib/krb5/kadm5/clnt/ |
H A D | client_principal.c | 263 krb5_principal princ, char *password) 272 arg.pass = password; 287 char *password) 296 arg.pass = password; 262 kadm5_chpass_principal(void *server_handle, krb5_principal princ, char *password) argument 284 kadm5_chpass_principal_3(void *server_handle, krb5_principal princ, krb5_boolean keepold, int n_ks_tuple, krb5_key_salt_tuple *ks_tuple, char *password) argument
|
/osnet-11/usr/src/lib/sasl_plugins/plain/ |
H A D | plain.c | 107 const char *password; local 116 /* should have received author-id NUL authen-id NUL password */ 125 "Can only find author (no password)"); 127 SETERROR(params->utils, "Can only find author (no password)"); 140 "Can only find author/en (no password)"); 143 "Can only find author/en (no password)"); 148 /* get password */ 150 password = clientin + lup; 153 password_len = clientin + lup - password; 166 /* this kinda sucks. we need password t 313 sasl_secret_t *password = NULL; local [all...] |
/osnet-11/usr/src/lib/libfedfs/common/ |
H A D | nsdb_primitives.c | 97 nsdb_connect(char *nsdb, int port, char *admin, char *password) argument 109 nsdb, port, admin, password); 120 pw = password;
|