| /sssd-io/src/util/ |
| H A D | memory.c | 35 char *password = (char *)memctx; local 38 /* zero out password */ 39 for (i = 0; password[i]; i++) password[i] = '\0';
|
| H A D | authtok.c | 167 const char *password, size_t len) 172 "password", password, len); 166 sss_authtok_set_password(struct sss_auth_token *tok, const char *password, size_t len) argument
|
| H A D | tev_curl.c | 1099 const char *password) 1113 ret = tcurl_set_option(tcurl_req, CURLOPT_PASSWORD, password); 1097 tcurl_req_http_basic_auth(struct tcurl_request *tcurl_req, const char *username, const char *password) argument
|
| /sssd-io/src/responder/pam/ |
| H A D | pam_LOCAL_domain.c | 160 const char *password; local 167 ret = sss_authtok_get_password(pd->newauthtok, &password, NULL); 182 ret = s3crypt_sha512(lreq, password, salt, &new_hash); 228 const char *password; local 293 "allowing root to reset a password.\n"); 296 ret = sss_authtok_get_password(pd->authtok, &password, NULL); 297 NEQ_CHECK_OR_JUMP(ret, EOK, "Failed to get password.\n", 301 NULL_CHECK_OR_JUMP(pwdhash, "No password stored.\n", 304 "user: [%s], password hash: [%s]\n", username, pwdhash); 306 ret = s3crypt_sha512(lreq, password, pwdhas [all...] |
| H A D | pamsrv_cmd.c | 654 const char **password) 663 ret = sss_authtok_get_password(authtok, password, NULL); 666 ret = sss_authtok_get_2fa(authtok, password, &pw_len, &fa2, &fa2_len); 674 DEBUG(SSSDBG_FATAL_FAILURE, "Failed to get password.\n"); 837 const char *password = NULL; local 856 ret = get_password_for_cache_auth(pd->authtok, &password); 864 pd->user, password, 653 get_password_for_cache_auth(struct sss_auth_token *authtok, const char **password) argument
|
| /sssd-io/src/sss_client/libwbclient/ |
| H A D | wbc_pam_sssd.c | 26 /* Authenticate a username/password pair */ 28 const char *password) 35 params.password.plaintext = password; 111 /* Change a password for a user with more detailed information upon failure */ 128 /* Change a password for a user */ 180 wbcErr wbcCredentialSave(const char *user, const char *password) argument 27 wbcAuthenticateUser(const char *username, const char *password) argument
|
| H A D | wbc_ctx_sssd.c | 301 const char *password) 363 const char *user, const char *password) 299 wbcCtxAuthenticateUser(struct wbcContext *ctx, const char *username, const char *password) argument 362 wbcCtxCredentialSave(struct wbcContext *ctx, const char *user, const char *password) argument
|
| /sssd-io/src/providers/krb5/ |
| H A D | krb5_delayed_online_authentication.c | 75 char *password; local 80 keysize = keyctl_read_alloc(pd->key_serial, (void **)&password); 88 ret = sss_authtok_set_password(pd->authtok, password, keysize); 89 safezero(password, keysize); 90 free(password); 93 "failed to set password in auth token [%d][%s].\n", 277 const char *password; local 280 ret = sss_authtok_get_password(new_pd->authtok, &password, &len); 283 "Failed to get password [%d][%s].\n", ret, strerror(ret)); 289 new_pd->key_serial = add_key("user", new_pd->user, password, le [all...] |
| H A D | krb5_auth.c | 253 const char *password = NULL; local 256 ret = sss_authtok_get_password(pd->authtok, &password, NULL); 259 "Failed to get password [%d] %s. Delayed authentication is only " 260 "available for password authentication (single factor).\n", 268 password, cdb, true, NULL, NULL); 340 const char *password = NULL; local 350 * as the cached password. 360 ret = sss_authtok_get_2fa(pd->authtok, &password, &password_len, 372 ret = sss_authtok_get_password(pd->authtok, &password, NULL); 380 ret = sss_authtok_get_password(pd->newauthtok, &password, NUL [all...] |
| H A D | krb5_child.c | 53 krb5_principal client, const char *password, 808 static char *password_or_responder(const char *password) argument 815 return discard_const(password); 843 DEBUG(SSSDBG_CRIT_FAILURE, "Cannot handle password prompts.\n"); 1578 krb5_principal client, const char *password, 1595 if (password != NULL) { 1596 kerr = krb5_init_creds_set_password(context, init_cred_ctx, password); 1630 const char *password) 1681 password_or_responder(password), 1688 * possible authentication methods to update the password 1577 sss_krb5_get_init_creds_password(krb5_context context, krb5_creds *creds, krb5_principal client, const char *password, krb5_prompter_fct prompter, void *data, krb5_deltat start_time, const char *in_tkt_service, krb5_get_init_creds_opt *k5_gic_options) argument 1629 get_and_save_tgt(struct krb5_req *kr, const char *password) argument 1868 const char *password = NULL; local 2085 const char *password = NULL; local [all...] |
| /sssd-io/src/tests/ |
| H A D | crypto-tests.c | 53 const char *password[] = { "test123", /* general */ local 73 for (i=0; password[i]; i++) { 74 ret = sss_password_encrypt(test_ctx, password[i], strlen(password[i])+1, 81 fail_if(ctpwd && strcmp(password[i], ctpwd) != 0);
|
| H A D | tcurl_test_tool.c | 54 const char *password; member in struct:tool_options 215 if (opts->username != NULL && opts->password != NULL) { 217 opts->password); 335 { "password", '\0', POPT_ARG_STRING, &opts.password, '\0', "Password for basic authentication", NULL },
|
| H A D | krb5_child-test.c | 159 const char *password) 173 ret = sss_authtok_set_password(pd->authtok, password, 0); 189 const char *password, const char *realm, 219 kr->pd = create_dummy_pam_data(kr, user, password); 408 char *password = NULL; local 418 { "password", 'w', POPT_ARG_STRING, &pc_passwd, 0, 420 { "ask-password", 'W', POPT_ARG_NONE, NULL, 'W', 442 password = getpass("Enter password:"); 443 if (!password) { 158 create_dummy_pam_data(TALLOC_CTX *mem_ctx, const char *user, const char *password) argument 188 create_dummy_req(TALLOC_CTX *mem_ctx, const char *user, const char *password, const char *realm, const char *ccname, const char *ccname_template, int timeout) argument [all...] |
| H A D | sysdb-tests.c | 2073 const char *password, 2101 password ? password : data->username, 2119 const char *password, 2163 password ? password : data->username, 7168 /* Authenticate with missing cached password */ 7172 /* Add a cached password */ 7175 /* Authenticate against cached password */ 2072 cached_authentication_without_expiration(uid_t uid, const char *password, int expected_result) argument 2118 cached_authentication_with_expiration(uid_t uid, const char *password, int expected_result) argument
|
| /sssd-io/src/util/crypto/libcrypto/ |
| H A D | crypto_obfuscate.c | 28 * Please note that password obfuscation does not improve security in any 29 * way. It is just a mechanism to make the password human-unreadable. If you 69 int sss_password_encrypt(TALLOC_CTX *mem_ctx, const char *password, int plen, argument 135 if (!EVP_EncryptUpdate(ctx, cryptotext, &ctlen, (const unsigned char *)password, plen)) { 197 char **password) 303 *password = talloc_move(mem_ctx, &pwdbuf); 196 sss_password_decrypt(TALLOC_CTX *mem_ctx, char *b64encoded, char **password) argument
|
| /sssd-io/src/util/crypto/nss/ |
| H A D | nss_obfuscate.c | 27 * Please note that password obfuscation does not improve security in any 28 * way. It is just a mechanism to make the password human-unreadable. If you 61 int sss_password_encrypt(TALLOC_CTX *mem_ctx, const char *password, int plen, argument 114 plaintext = (unsigned char *) talloc_strndup(tmp_ctx, password, plen); 196 char **password) 323 *password = talloc_move(mem_ctx, &pwdbuf); 195 sss_password_decrypt(TALLOC_CTX *mem_ctx, char *b64encoded, char **password) argument
|
| /sssd-io/src/providers/proxy/ |
| H A D | proxy_child.c | 69 const char *password; local 89 &password, &pwlen); 93 memcpy(reply[i].resp, password, pwlen + 1); 120 const char *password; local 142 &password, &pwlen); 146 memcpy(reply[i].resp, password, pwlen + 1); 152 &password, &pwlen); 156 memcpy(reply[i].resp, password, pwlen + 1);
|
| H A D | proxy_auth.c | 789 const char *password; local 824 ret = sss_authtok_get_password(state->pd->authtok, &password, NULL); 826 /* password caching failures are not fatal errors */ 827 DEBUG(SSSDBG_OP_FAILURE, "Failed to cache password\n"); 831 ret = sysdb_cache_password(state->be_ctx->domain, state->pd->user, password); 833 /* password caching failures are not fatal errors */ 836 DEBUG(SSSDBG_OP_FAILURE, "Failed to cache password (%d)[%s]!?\n",
|
| /sssd-io/src/python/ |
| H A D | pysss.c | 75 * The sss.password object 961 "Obfuscate a password\n\n" 962 ":param password: The password to obfuscate\n\n" 968 char *password = NULL; local 978 &password, &plen, &mode)) { 988 ret = sss_password_encrypt(tctx, password, plen+1, 1007 "Deobfuscate a password\n\n" 1008 ":param obfpwd: The password to convert back to clear text\n\n"); 1014 char *password [all...] |
| /sssd-io/src/responder/secrets/ |
| H A D | proxy.c | 44 char *password; member in struct:pat_basic_auth 115 ret = proxy_get_config_string(pctx, cfg, true, secreq, "password", 116 &cfg->auth.basic.password); 445 pcfg->auth.basic.password);
|
| /sssd-io/src/tools/ |
| H A D | sss_seed.c | 45 char *password; member in struct:user_ctx 184 char *password = NULL; local 195 temp = getpass("Enter temporary password:"); 197 DEBUG(SSSDBG_OP_FAILURE, "Failed to get prompted password\n"); 209 password = talloc_strdup(tmp_ctx, temp); 210 if (password == NULL) { 215 talloc_set_destructor((TALLOC_CTX *)password, password_destructor); 217 temp = getpass("Enter temporary password again:"); 219 DEBUG(SSSDBG_OP_FAILURE, "Failed to get prompted password\n"); 224 if (strncmp(temp,password,strle 243 char *password = NULL; local [all...] |
| /sssd-io/src/providers/ldap/ |
| H A D | ldap_auth.c | 105 DEBUG(SSSDBG_CONF_SETTINGS, "Kerberos password expired.\n"); 137 "Last change day is not set, new password needed.\n"); 145 "The last password change time is in the future!.\n"); 252 DEBUG(SSSDBG_CRIT_FAILURE, "Unknown password expiration type.\n"); 276 DEBUG(SSSDBG_CRIT_FAILURE, "Missing password policy.\n"); 281 DEBUG(SSSDBG_TRACE_ALL, "No password policy requested.\n"); 287 "Found Kerberos password expiration attributes.\n"); 302 "No Kerberos password expiration attributes found, " 303 "but MIT Kerberos password policy was requested. " 311 "Found shadow password expiratio 940 const char *password; local 1172 const char *password; local [all...] |
| H A D | sdap_async_connection.c | 806 "User must set a new password.\n"); 821 "Password expired user must set a new password.\n"); 827 "Password expired user must set a new password.\n"); 1308 const char *password = NULL; local 1313 ret = sss_authtok_get_password(authtok, &password, &pwlen); 1319 /* Treat a zero-length password as a failure */ 1320 if (*password == '\0') { 1324 pw.bv_val = discard_const(password); 1346 if (strcasecmp(authtok_type,"password") == 0) { 1840 if (strcasecmp(authtok_type, "password") ! 2181 struct berval password = {0, NULL}; local [all...] |
| H A D | sdap_async.c | 500 const char *password, 529 LDAP_TAG_EXOP_MODIFY_PASSWD_OLD, password, 656 "Please make sure the password meets the " 496 sdap_exop_modify_passwd_send(TALLOC_CTX *memctx, struct tevent_context *ev, struct sdap_handle *sh, char *user_dn, const char *password, const char *new_password, int timeout) argument
|
| /sssd-io/src/db/ |
| H A D | sysdb_ops.c | 3180 const char *password, 3201 ret = s3crypt_sha512(tmp_ctx, password, salt, &hash); 3203 DEBUG(SSSDBG_CONF_SETTINGS, "Failed to create password hash.\n"); 3250 const char *password) 3252 return sysdb_cache_password_ex(domain, username, password, 4295 /* ========= Authentication against cached password ============ */ 4376 const char *password, 4403 pw_len = strlen(password); 4415 short_pw = talloc_strndup(tmp_ctx, password, (pw_len - cached_fa2_len)); 4424 DEBUG(SSSDBG_CONF_SETTINGS, "Failed to create password has 3178 sysdb_cache_password_ex(struct sss_domain_info *domain, const char *username, const char *password, enum sss_authtok_type authtok_type, size_t second_factor_len) argument 3248 sysdb_cache_password(struct sss_domain_info *domain, const char *username, const char *password) argument 4374 check_for_combined_2fa_password(struct sss_domain_info *domain, struct ldb_message *ldb_msg, const char *password, const char *userhash) argument 4444 sysdb_cache_auth(struct sss_domain_info *domain, const char *name, const char *password, struct confdb_ctx *cdb, bool just_check, time_t *_expire_date, time_t *_delayed_until) argument [all...] |