Searched defs:password (Results 1 - 25 of 41) sorted by relevance

12

/osnet-11/usr/src/cmd/perl/5.8.4/distrib/lib/Net/
H A DNetrc.pm111 elsif($tok =~ /^(login|password|account)$/)
183 sub password subroutine
187 exists $me->{password}
188 ? $me->{password}
195 ($me->login, $me->password, $me->account);
212 ($login, $password, $account) = $mach->lpa;
247 default login anonymous password user@site
258 =item password string
260 Supply a password. If this token is present, the auto-login
262 requires a password a
[all...]
/osnet-11/usr/src/lib/krb5/kadm5/srv/
H A Dsvr_chpass_util.c45 char *password,
49 /* This method of password changing is not supported by the server */
43 kadm5_chpass_principal_v2(void *server_handle, krb5_principal princ, char *password, kadm5_ret_t *srvr_rsp_code, krb5_data *srvr_msg) argument
H A Dserver_misc.c119 /* Check word to see if it's the password */
137 char *password, int use_policy, kadm5_policy_ent_t pol,
152 if(strlen(password) < pol->pw_min_length)
154 s = password;
176 if((find_word(password) == KADM5_OK))
181 if (strcasecmp(cp, password) == 0)
185 if (strcasecmp(cp, password) == 0)
190 if (str_check_gecos(ent->pw_gecos, password))
197 if (strlen(password) < 1)
136 passwd_check(kadm5_server_handle_t handle, char *password, int use_policy, kadm5_policy_ent_t pol, krb5_principal principal) argument
/osnet-11/usr/src/grub/grub2/grub-core/commands/
H A Dpassword.c35 void *password)
37 if (grub_crypto_memcmp (entered, password, GRUB_AUTH_MAX_PASSLEN) != 0)
46 grub_normal_set_password (const char *user, const char *password) argument
55 copylen = grub_strlen (password);
58 grub_memcpy (pass, password, copylen);
82 GRUB_MOD_INIT(password)
85 cmd = grub_register_command ("password", grub_cmd_password,
87 N_("Set user password (plaintext). "
91 GRUB_MOD_FINI(password)
34 check_password(const char *user, const char *entered, void *password) argument
/osnet-11/usr/src/lib/pam_modules/authtok_check/
H A Dfascist.c29 /* attempt reverse engineering of password strings */
390 char *password; local
397 password = rpassword;
399 (void) strcpy(password, Lowercase(password));
400 (void) Trim(password);
404 * since password cannot be longer than TRUNCSTRINGSIZE;
411 if (!(a = Mangle(password, r_destructors[i]))) {
420 (void) strlcpy(password, Reverse(password), PATH_MA
437 DictCheck(char *password, char *path) argument
[all...]
/osnet-11/usr/src/lib/pam_modules/ldap/
H A Dldap_authenticate.c59 char *password = NULL; local
95 /* Get the password entered in the first scheme if any */
96 (void) pam_get_item(pamh, PAM_AUTHTOK, (void **) &password);
97 if (password == NULL) {
106 * Authenticate user using the password from PAM_AUTHTOK.
107 * If no password available or if authentication fails
110 result = authenticate(&credp, user, password, NULL);
114 * user's password is good but needs
118 * password after the account management
120 * the password ha
[all...]
H A Dldap_acct_mgmt.c42 * warn_user_passwd_will_expire - warn the user when the password will
64 "Your password will expire within one hour."));
68 "Your password will expire in %d hours."),
73 "Your password will expire in %d days."),
130 * warn_user_passwd_expired - warn the user that the password has expired
140 "Your password has expired. "
146 "Your password has expired."));
152 * display_passwd_reset_msg - tell user that password has been reset by
162 "Your password has been reset by administrator."));
172 * seconds left for password t
255 char *password = NULL; local
[all...]
/osnet-11/usr/src/lib/krb5/plugins/kdb/ldap/libkdb_ldap/
H A Dkdb_ldap_conn.c50 unsigned char *password=NULL; local
62 krb5_set_error_message(context, st, gettext("LDAP bind password value missing"));
68 if ((st=krb5_ldap_readpassword(context, ldap_context, &password)) != 0) {
69 prepend_err_str(context, gettext("Error reading password from stash: "), st, st);
73 /* Check if the returned 'password' is actually the path of a certificate */
74 if (!strncmp("{FILE}", (char *)password, 6)) {
75 /* 'password' format: <path>\0<password> */
76 ldap_context->service_cert_path = strdup((char *)password + strlen("{FILE}"));
82 if (password[strle
[all...]
H A Dldap_service_stash.c44 unsigned char **password)
52 *password = NULL;
124 /* password field missing */
130 /* Extract the plain password / certificate file information */
136 /* Set *password = {FILE}<path to cert>\0<cert password> */
139 *password = (unsigned char *)malloc(len + 2);
140 if (*password == NULL) {
144 memcpy(*password, start, len);
145 (*password)[le
43 krb5_ldap_readpassword(krb5_context context, krb5_ldap_context *ldap_context, unsigned char **password) argument
[all...]
H A Dldap_services.c560 char *password[2] = {NULL}; local
566 password[0] = passwd;
571 if ((st=krb5_add_str_mem_ldap_mod(&mods, "userPassword", LDAP_MOD_REPLACE, password)) != 0)
/osnet-11/usr/src/lib/pam_modules/authtok_get/
H A Dauthtok_get.c95 * password.
135 * Since we don't actually check the password, we should
158 * the password correctly.
187 "pam_authtok_get: new password verified");
223 char *password; local
256 res = pam_get_item(pamh, PAM_AUTHTOK, (void **)&password);
260 if (password != NULL)
264 * No password has been entered yet. Check to see if we need
265 * to obtain a password
310 * We will ask for a password t
[all...]
/osnet-11/usr/src/lib/pam_modules/dial_auth/
H A Ddial_auth.c64 char *password = NULL; local
154 dgettext(TEXT_DOMAIN, "Dialup Password: "), &password);
160 if (strcmp(crypt(password, p2), p2) != 0) {
161 (void) memset(password, 0, strlen(password));
162 free(password);
165 (void) memset(password, 0, strlen(password));
166 free(password);
/osnet-11/usr/src/lib/pam_modules/krb5/
H A Dutils.h56 char *password; member in struct:__anon2794
H A Dkrb5_acct_mgmt.c65 char **cpw_services, *password; local
70 password = kmd->password;
83 if (strlen(password) == 0) {
108 code = kadm5_init_with_password(context, kprinc, password, cpw_services,
155 * We first check to see if the KDC had set any account or password
176 char messages[PAM_MAX_NUM_MSG][PAM_MAX_MSG_SIZE], *password; local
184 password = kmd->password;
186 if (!pamh || !user || !password) {
[all...]
/osnet-11/usr/src/lib/pam_modules/sample/
H A Dsample_authenticate.c50 * first_pass_good (first password is always good when used with use/try)
51 * first_pass_bad (first password is always bad when used with use/try)
52 * pass=foobar (set good password to "foobar". default good password
83 char *firstpass, *password; local
138 * Get the password from the user
156 password = ret_resp->resp;
158 if (password == NULL) {
165 if (strncmp(password, the_password, strlen(the_password)) == 0) {
168 /* this is the first password, stas
[all...]
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/
H A Dinit_creds_ctx.h19 krb5_data password; member in struct:_krb5_init_creds_context
H A Dgic_pwd.c39 krb5_data *password; local
47 password = (krb5_data *) gak_data;
64 if (password->length == 0 || password->data[0] == '\0') {
76 prompt.reply = password;
98 ret = krb5_c_string_to_key_with_params(context, etype, password, salt,
110 const char *password)
114 s = strdup(password);
118 if (ctx->password.data != NULL) {
119 zap(ctx->password
108 krb5_init_creds_set_password(krb5_context context, krb5_init_creds_context ctx, const char *password) argument
132 krb5_get_init_creds_password(krb5_context context, krb5_creds *creds, krb5_principal client, char *password, krb5_prompter_fct prompter, void *data, krb5_deltat start_time, char *in_tkt_service, krb5_get_init_creds_opt *options) argument
162 __krb5_get_init_creds_password(krb5_context context, krb5_creds *creds, krb5_principal client, char *password, krb5_prompter_fct prompter, void *data, krb5_deltat start_time, char *in_tkt_service, krb5_get_init_creds_opt *options, krb5_kdc_rep **ptr_as_reply) argument
515 krb5_get_in_tkt_with_password(krb5_context context, krb5_flags options, krb5_address *const *addrs, krb5_enctype *ktypes, krb5_preauthtype *pre_auth_types, const char *password, krb5_ccache ccache, krb5_creds *creds, krb5_kdc_rep **ret_as_reply) argument
[all...]
/osnet-11/usr/src/lib/pam_modules/krb5_migrate/
H A Dkrb5_migrate_authenticate.c55 char *password = NULL; local
126 * Grok the user password
128 err = pam_get_item(pamh, PAM_AUTHTOK, (void **)&password);
133 if (password == NULL || (password[0] == '\0')) {
292 mask, password);
/osnet-11/usr/src/lib/pam_modules/passwd_auth/
H A Dpasswd_auth.c69 char *password; local
115 res = pam_get_item(pamh, PAM_AUTHTOK, (void **)&password);
119 if (password != NULL)
174 * The password prompt differs between users updating their
175 * own password, and users updating other an user's password
183 dgettext(TEXT_DOMAIN, "Enter %s's password: "),
191 dgettext(TEXT_DOMAIN, "Enter existing login password: "));
195 &password);
199 if (password
[all...]
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/crypto/des/
H A Dafsstring2key.c103 unsigned char password[9]; /* trailing nul for crypt() */ local
106 memset (password, 0, sizeof (password));
107 memcpy (password, realm, min (salt->length, 8));
109 if (isupper(password[i]))
110 password[i] = tolower(password[i]);
112 password[i] ^= data->data[i];
114 if (password[i] == '\0')
115 password[
136 unsigned char *password = malloc(pw_len+1); local
[all...]
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/keytab/
H A Dkt_solaris.c74 krb5_data password, salt; local
81 password.length = strlen(pw);
82 password.data = (char *)pw;
88 if ((krb5_c_string_to_key(ctx, enctype, &password, &salt, &key)) != 0)
107 * krb5_kvno kvno, uint_t flags, char *password)
126 * where password is the password that will be used to derive the key for
159 krb5_kvno kvno, uint_t flags, char *password)
171 assert(password != NULL && domain != NULL);
241 kvno, password);
158 k5_kt_add_ad_entries(krb5_context ctx, char **sprincs_str, char *domain, krb5_kvno kvno, uint_t flags, char *password) argument
[all...]
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/os/
H A Dread_pwd.c125 char * password,
150 (void) memset(password, 0, *pwsize);
152 if (fgets(password, *pwsize, stdin) == NULL) {
159 if ((ptr = strchr(password, '\n')))
187 if (strncmp(password, tmpstr, *pwsize)) {
200 (void) memset(password, 0, *pwsize);
202 *pwsize = strlen(password);
122 read_console_password(krb5_context context, const char * prompt, const char * prompt2, char * password, int * pwsize) argument
/osnet-11/usr/src/lib/krb5/kadm5/clnt/
H A Dclient_principal.c263 krb5_principal princ, char *password)
272 arg.pass = password;
287 char *password)
296 arg.pass = password;
262 kadm5_chpass_principal(void *server_handle, krb5_principal princ, char *password) argument
284 kadm5_chpass_principal_3(void *server_handle, krb5_principal princ, krb5_boolean keepold, int n_ks_tuple, krb5_key_salt_tuple *ks_tuple, char *password) argument
/osnet-11/usr/src/lib/sasl_plugins/plain/
H A Dplain.c107 const char *password; local
116 /* should have received author-id NUL authen-id NUL password */
125 "Can only find author (no password)");
127 SETERROR(params->utils, "Can only find author (no password)");
140 "Can only find author/en (no password)");
143 "Can only find author/en (no password)");
148 /* get password */
150 password = clientin + lup;
153 password_len = clientin + lup - password;
166 /* this kinda sucks. we need password t
313 sasl_secret_t *password = NULL; local
[all...]
/osnet-11/usr/src/lib/libfedfs/common/
H A Dnsdb_primitives.c97 nsdb_connect(char *nsdb, int port, char *admin, char *password) argument
109 nsdb, port, admin, password);
120 pw = password;

Completed in 91 milliseconds

12