/osnet-11/usr/src/cmd/perl/5.8.4/distrib/lib/CGI/examples/ |
H A D | multiple_forms.cgi | 28 print "<P>What's the password? ",$query->password_field('pass','secret'); 44 <P>The secret password is <EM>$Q::pass</EM>
|
/osnet-11/usr/src/lib/pam_modules/ldap/ |
H A D | ldap_acct_mgmt.c | 42 * warn_user_passwd_will_expire - warn the user when the password will 64 "Your password will expire within one hour.")); 68 "Your password will expire in %d hours."), 73 "Your password will expire in %d days."), 130 * warn_user_passwd_expired - warn the user that the password has expired 140 "Your password has expired. " 146 "Your password has expired.")); 152 * display_passwd_reset_msg - tell user that password has been reset by 162 "Your password has been reset by administrator.")); 172 * seconds left for password t 255 char *password = NULL; local [all...] |
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/keytab/ |
H A D | kt_solaris.c | 74 krb5_data password, salt; local 81 password.length = strlen(pw); 82 password.data = (char *)pw; 88 if ((krb5_c_string_to_key(ctx, enctype, &password, &salt, &key)) != 0) 107 * krb5_kvno kvno, uint_t flags, char *password) 126 * where password is the password that will be used to derive the key for 159 krb5_kvno kvno, uint_t flags, char *password) 171 assert(password != NULL && domain != NULL); 241 kvno, password); 158 k5_kt_add_ad_entries(krb5_context ctx, char **sprincs_str, char *domain, krb5_kvno kvno, uint_t flags, char *password) argument [all...] |
/osnet-11/usr/src/lib/fm/libasr/common/ |
H A D | libasr.h | 131 #define ASR_PROP_AREG_PASS ASR_PROP(autoreg/password) 136 #define ASR_PROP_AREG_PROXY_PASS ASR_PROP(autoreg/proxy-password) 235 extern int asr_regreq_set_password(asr_regreq_t *regreq, const char *password); 238 const char *host, const char *user, const char *password); 243 char **host, char **user, char **password); 324 EASR_SC_AUTH, /* invalid SOA username/password */
|
/osnet-11/usr/src/lib/libsmb/common/ |
H A D | smb_auth.c | 61 * Converts the given LM password to all uppercase. 85 * 1. The password, as entered by user, is either padded with nulls 89 * . The given password is OEM not Unicode 91 * 2. The 14-byte password is converted to all uppercase 97 smb_auth_lm_hash(const char *password, unsigned char *lm_hash) argument 102 (void) strncpy((char *)lm_pwd, password, SMBAUTH_LM_PWD_SZ); 141 * Make NTLM Hash (using MD4) from the given password. 145 smb_auth_ntlm_hash(const char *password, unsigned char *hash) argument 151 if (password == NULL || hash == NULL) 154 length = strlen(password); 425 smb_auth_set_info(char *username, char *password, unsigned char *ntlm_hash, char *domain, unsigned char *srv_challenge_key, int srv_challenge_len, int lmcomp_lvl, smb_auth_info_t *auth) argument [all...] |
H A D | smb_pwdutil.c | 86 #define SMB_PWD_GETF_NOPWD 2 /* password is not needed */ 153 * Checks to see if a password management utility library 257 * Returns a smb password structure for the given UID 309 smb_pwd_setpasswd(const char *name, const char *password) argument 312 return (smb_pwd_ops.pwop_setpasswd(name, password)); 314 return (smb_pwd_update(name, password, 0)); 422 * Updates the password entry of the given user if the user already 424 * given password and control information. 427 smb_pwd_update(const char *name, const char *password, int control) argument 476 * copy old password entrie 632 smb_pwd_chgpwent(smb_passwd_t *smbpw, const char *password, int control) argument [all...] |
/osnet-11/usr/src/lib/pam_modules/krb5/ |
H A D | krb5_authenticate.c | 100 /* return an error on password expire */ 103 char *password = NULL; local 141 * preauth sucessfully then this instance is a fallback to password 207 /* make sure a password entry exists for this user */ 262 kmd->password = NULL; 321 (void) pam_get_item(pamh, PAM_AUTHTOK, (void **)&password); 323 result = attempt_krb5_auth(pamh, kmd, user, &password, 1); 396 * Because this function should never be used for password prompts, 397 * disallow password prompts. 695 * read a password fro [all...] |
/osnet-11/usr/src/grub/grub2/include/grub/ |
H A D | normal.h | 128 grub_normal_set_password (const char *user, const char *password);
|
/osnet-11/usr/src/lib/libsasl/plugin/ |
H A D | plugin_common.c | 448 * Retrieve the user password. 450 int _plug_get_password(const sasl_utils_t *utils, sasl_secret_t **password, argument 458 *password = NULL; 461 /* see if we were given the password in the prompt */ 472 *password = (sasl_secret_t *) utils->malloc(sizeof(sasl_secret_t) + 474 if (!*password) { 479 (*password)->len=prompt->len; 480 memcpy((*password)->data, prompt->result, prompt->len); 481 (*password)->data[(*password) [all...] |
/osnet-11/usr/src/lib/sasl_plugins/cram/ |
H A D | cram.c | 595 sasl_secret_t *password = NULL; local 596 unsigned int free_password = 0; /* set if we need to free password */ 637 /* try to get the password */ 638 if (password == NULL) { 639 pass_result=_plug_get_password(params->utils, &password, 665 gettext("Please enter your password")) 676 "Please enter your password" : NULL, NULL, 685 if (!password) { 698 in16 = make_hashed(password, (char *) serverin, serverinlen, 739 if (free_password) _plug_free_secret(params-> utils, &password); [all...] |
/osnet-11/usr/src/lib/libsmbfs/common/ |
H A D | libsmbfs.h | 237 /* Add a password to the keychain. */ 239 const char *password, boolean_t updatefile); 245 /* Delete a password from the keychain. */
|
/osnet-11/usr/src/lib/krb5/kadm5/clnt/ |
H A D | client_principal.c | 263 krb5_principal princ, char *password) 272 arg.pass = password; 287 char *password) 296 arg.pass = password; 262 kadm5_chpass_principal(void *server_handle, krb5_principal princ, char *password) argument 284 kadm5_chpass_principal_3(void *server_handle, krb5_principal princ, krb5_boolean keepold, int n_ks_tuple, krb5_key_salt_tuple *ks_tuple, char *password) argument
|
/osnet-11/usr/src/lib/libntsvcs/common/ |
H A D | libntsvcs.h | 93 * NT supports two forms of password: a Lanman (case-insensitive) 94 * password and an NT (case-sensitive) password. If either of the 100 void mlsvc_nt_password_hash(char *result, char *password); 101 int mlsvc_encrypt_nt_password(char *password, char *key, int keylen, char *out,
|
H A D | netr_clnt.c | 579 * the appropriate password but it isn't working yet. So we 582 if (smb_get_machine_passwd((char *)netr_info->password, 583 sizeof (netr_info->password)) != 0) 586 rc = smb_auth_ntlm_hash((char *)netr_info->password, ntlmhash); 641 * the first 7 bytes of the password. The initial password is formed 642 * using the NT password hash on the local hostname in lower case. 650 * the key is the last 7 bytes of the password. 681 * the appropriate password but it isn't working yet. So we 684 if (smb_get_machine_passwd((char *)netr_info->password, [all...] |
/osnet-11/usr/src/cmd/perl/5.8.4/distrib/lib/Net/ |
H A D | POP3.pm | 280 my $pass = $m ? $m->password || "" 376 if ($pop->login($username, $password) > 0) { 443 C<Net::POP3> uses C<Net::Netrc> to lookup the password using the host 455 Authenticate with the server identifying as C<USER> with password C<PASS>. 456 Similar to L</login>, but the password is not sent in clear text.
|
/osnet-11/usr/src/lib/krb5/kadm5/srv/ |
H A D | svr_principal.c | 208 * addprinc -randkey operation. The krb5 1.6 dummy password for these requests 216 char *password = *passptr; local 219 if (password == NULL || !(mask & KADM5_ATTRIBUTES) || 223 /* The 1.6 dummy password was the octets 1..255. */ 224 for (i = 0; (unsigned char) password[i] == i + 1; i++); 225 if (password[i] != '\0' || i != 255) 228 /* This will make the caller use a random password instead. */ 235 char *password) 239 0, NULL, password); 245 char *password) 233 kadm5_create_principal(void *server_handle, kadm5_principal_ent_t entry, long mask, char *password) argument 242 kadm5_create_principal_3(void *server_handle, kadm5_principal_ent_t entry, long mask, int n_ks_tuple, krb5_key_salt_tuple *ks_tuple, char *password) argument 1399 kadm5_chpass_principal(void *server_handle, krb5_principal principal, char *password) argument 1408 kadm5_chpass_principal_3(void *server_handle, krb5_principal principal, krb5_boolean keepold, int n_ks_tuple, krb5_key_salt_tuple *ks_tuple, char *password) argument [all...] |
/osnet-11/usr/src/lib/libntfs/common/libntfs/ |
H A D | crypto.c | 298 int pfx_size, const char *password) 338 * Verify that the password is correct and that the key file has not 339 * been tampered with. Note if the password has zero length and the 340 * verification fails, retry with password set to NULL. This is needed 341 * to get password less .pfx files generated with Windows XP SP1 (and 345 err = gnutls_pkcs12_verify_mac(pkcs12, password); 348 password && !strlen(password)) { 349 password = NULL; 352 ntfs_log_error("You are probably misspelled password t 297 ntfs_pkcs12_extract_rsa_key(u8 *pfx, int pfx_size, const char *password) argument [all...] |
/osnet-11/usr/src/lib/krb5/plugins/kdb/ldap/libkdb_ldap/ |
H A D | ldap_services.c | 560 char *password[2] = {NULL}; local 566 password[0] = passwd; 571 if ((st=krb5_add_str_mem_ldap_mod(&mods, "userPassword", LDAP_MOD_REPLACE, password)) != 0)
|
/osnet-11/usr/src/grub/grub-0.97/stage2/ |
H A D | stage2.c | 315 if (! auth && password) 319 password to unlock the next set of features."); 566 if (! auth && password) 570 /* Do password check here! */ 572 char *pptr = password; 579 /* Wipe out the previously entered password */ 589 if (! check_password (entered, password, password_type))
|
/osnet-11/usr/src/lib/libfedfs/common/ |
H A D | nsdb_primitives.c | 97 nsdb_connect(char *nsdb, int port, char *admin, char *password) argument 109 nsdb, port, admin, password); 120 pw = password;
|
/osnet-11/usr/src/grub/grub2/grub-core/commands/ |
H A D | legacycfg.c | 526 void *password __attribute__ ((unused))) 600 void *password) 602 if (!check_password_md5_real (entered, password)) 709 If 2 password commands are executed in a row and second one fails 710 on GRUB2 the password of first one is used, whereas in grub-legacy 711 authenthication is denied. In case of no password command was executed 726 grub_puts_ (N_("Enter password: ")); 798 N_("Simulate grub-legacy password command")); 803 N_("Simulate grub-legacy password command in menuentry mode")); 598 check_password_md5(const char *user, const char *entered, void *password) argument
|
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/ |
H A D | chpw.c | 3 ** set password functions added by Paul W. Nelson, Thursby Software Systems, Inc. 65 /* krb-priv of password */ 286 req.password.data = passwd; 287 req.password.length = strlen(passwd); 323 ** put in the "private" password data - 398 ** set password version is 0xff80, change password version is 1 530 *code_string = "Initial password required";
|
/osnet-11/usr/src/lib/brand/labeled/zone/ |
H A D | common.ksh | 329 printf "$fmtval" password astring $rootpwd 335 printf "$fmtval" password astring $userpwd
|
/osnet-11/usr/src/cmd/perl/5.8.4/distrib/lib/CGI/t/ |
H A D | autoescape.t | 44 default => 'password field', 45 onclick => 'alert("===> password 49 qq{<input type="password" name="" value="password field" onclick="alert("===> password 51 'autoescape javascript turns off for password field'
|
/osnet-11/usr/src/cmd/perl/5.8.4/distrib/lib/User/ |
H A D | pwent.pm | 271 more secure hashing than DES. On systems supporting shadow password 272 systems, Perl automatically returns the shadow password entry when
|