Searched refs:password (Results 26 - 50 of 74) sorted by relevance

123

/osnet-11/usr/src/cmd/perl/5.8.4/distrib/lib/CGI/examples/
H A Dmultiple_forms.cgi28 print "<P>What's the password? ",$query->password_field('pass','secret');
44 <P>The secret password is <EM>$Q::pass</EM>
/osnet-11/usr/src/lib/pam_modules/ldap/
H A Dldap_acct_mgmt.c42 * warn_user_passwd_will_expire - warn the user when the password will
64 "Your password will expire within one hour."));
68 "Your password will expire in %d hours."),
73 "Your password will expire in %d days."),
130 * warn_user_passwd_expired - warn the user that the password has expired
140 "Your password has expired. "
146 "Your password has expired."));
152 * display_passwd_reset_msg - tell user that password has been reset by
162 "Your password has been reset by administrator."));
172 * seconds left for password t
255 char *password = NULL; local
[all...]
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/keytab/
H A Dkt_solaris.c74 krb5_data password, salt; local
81 password.length = strlen(pw);
82 password.data = (char *)pw;
88 if ((krb5_c_string_to_key(ctx, enctype, &password, &salt, &key)) != 0)
107 * krb5_kvno kvno, uint_t flags, char *password)
126 * where password is the password that will be used to derive the key for
159 krb5_kvno kvno, uint_t flags, char *password)
171 assert(password != NULL && domain != NULL);
241 kvno, password);
158 k5_kt_add_ad_entries(krb5_context ctx, char **sprincs_str, char *domain, krb5_kvno kvno, uint_t flags, char *password) argument
[all...]
/osnet-11/usr/src/lib/fm/libasr/common/
H A Dlibasr.h131 #define ASR_PROP_AREG_PASS ASR_PROP(autoreg/password)
136 #define ASR_PROP_AREG_PROXY_PASS ASR_PROP(autoreg/proxy-password)
235 extern int asr_regreq_set_password(asr_regreq_t *regreq, const char *password);
238 const char *host, const char *user, const char *password);
243 char **host, char **user, char **password);
324 EASR_SC_AUTH, /* invalid SOA username/password */
/osnet-11/usr/src/lib/libsmb/common/
H A Dsmb_auth.c61 * Converts the given LM password to all uppercase.
85 * 1. The password, as entered by user, is either padded with nulls
89 * . The given password is OEM not Unicode
91 * 2. The 14-byte password is converted to all uppercase
97 smb_auth_lm_hash(const char *password, unsigned char *lm_hash) argument
102 (void) strncpy((char *)lm_pwd, password, SMBAUTH_LM_PWD_SZ);
141 * Make NTLM Hash (using MD4) from the given password.
145 smb_auth_ntlm_hash(const char *password, unsigned char *hash) argument
151 if (password == NULL || hash == NULL)
154 length = strlen(password);
425 smb_auth_set_info(char *username, char *password, unsigned char *ntlm_hash, char *domain, unsigned char *srv_challenge_key, int srv_challenge_len, int lmcomp_lvl, smb_auth_info_t *auth) argument
[all...]
H A Dsmb_pwdutil.c86 #define SMB_PWD_GETF_NOPWD 2 /* password is not needed */
153 * Checks to see if a password management utility library
257 * Returns a smb password structure for the given UID
309 smb_pwd_setpasswd(const char *name, const char *password) argument
312 return (smb_pwd_ops.pwop_setpasswd(name, password));
314 return (smb_pwd_update(name, password, 0));
422 * Updates the password entry of the given user if the user already
424 * given password and control information.
427 smb_pwd_update(const char *name, const char *password, int control) argument
476 * copy old password entrie
632 smb_pwd_chgpwent(smb_passwd_t *smbpw, const char *password, int control) argument
[all...]
/osnet-11/usr/src/lib/pam_modules/krb5/
H A Dkrb5_authenticate.c100 /* return an error on password expire */
103 char *password = NULL; local
141 * preauth sucessfully then this instance is a fallback to password
207 /* make sure a password entry exists for this user */
262 kmd->password = NULL;
321 (void) pam_get_item(pamh, PAM_AUTHTOK, (void **)&password);
323 result = attempt_krb5_auth(pamh, kmd, user, &password, 1);
396 * Because this function should never be used for password prompts,
397 * disallow password prompts.
695 * read a password fro
[all...]
/osnet-11/usr/src/grub/grub2/include/grub/
H A Dnormal.h128 grub_normal_set_password (const char *user, const char *password);
/osnet-11/usr/src/lib/libsasl/plugin/
H A Dplugin_common.c448 * Retrieve the user password.
450 int _plug_get_password(const sasl_utils_t *utils, sasl_secret_t **password, argument
458 *password = NULL;
461 /* see if we were given the password in the prompt */
472 *password = (sasl_secret_t *) utils->malloc(sizeof(sasl_secret_t) +
474 if (!*password) {
479 (*password)->len=prompt->len;
480 memcpy((*password)->data, prompt->result, prompt->len);
481 (*password)->data[(*password)
[all...]
/osnet-11/usr/src/lib/sasl_plugins/cram/
H A Dcram.c595 sasl_secret_t *password = NULL; local
596 unsigned int free_password = 0; /* set if we need to free password */
637 /* try to get the password */
638 if (password == NULL) {
639 pass_result=_plug_get_password(params->utils, &password,
665 gettext("Please enter your password"))
676 "Please enter your password" : NULL, NULL,
685 if (!password) {
698 in16 = make_hashed(password, (char *) serverin, serverinlen,
739 if (free_password) _plug_free_secret(params-> utils, &password);
[all...]
/osnet-11/usr/src/lib/libsmbfs/common/
H A Dlibsmbfs.h237 /* Add a password to the keychain. */
239 const char *password, boolean_t updatefile);
245 /* Delete a password from the keychain. */
/osnet-11/usr/src/lib/krb5/kadm5/clnt/
H A Dclient_principal.c263 krb5_principal princ, char *password)
272 arg.pass = password;
287 char *password)
296 arg.pass = password;
262 kadm5_chpass_principal(void *server_handle, krb5_principal princ, char *password) argument
284 kadm5_chpass_principal_3(void *server_handle, krb5_principal princ, krb5_boolean keepold, int n_ks_tuple, krb5_key_salt_tuple *ks_tuple, char *password) argument
/osnet-11/usr/src/lib/libntsvcs/common/
H A Dlibntsvcs.h93 * NT supports two forms of password: a Lanman (case-insensitive)
94 * password and an NT (case-sensitive) password. If either of the
100 void mlsvc_nt_password_hash(char *result, char *password);
101 int mlsvc_encrypt_nt_password(char *password, char *key, int keylen, char *out,
H A Dnetr_clnt.c579 * the appropriate password but it isn't working yet. So we
582 if (smb_get_machine_passwd((char *)netr_info->password,
583 sizeof (netr_info->password)) != 0)
586 rc = smb_auth_ntlm_hash((char *)netr_info->password, ntlmhash);
641 * the first 7 bytes of the password. The initial password is formed
642 * using the NT password hash on the local hostname in lower case.
650 * the key is the last 7 bytes of the password.
681 * the appropriate password but it isn't working yet. So we
684 if (smb_get_machine_passwd((char *)netr_info->password,
[all...]
/osnet-11/usr/src/cmd/perl/5.8.4/distrib/lib/Net/
H A DPOP3.pm280 my $pass = $m ? $m->password || ""
376 if ($pop->login($username, $password) > 0) {
443 C<Net::POP3> uses C<Net::Netrc> to lookup the password using the host
455 Authenticate with the server identifying as C<USER> with password C<PASS>.
456 Similar to L</login>, but the password is not sent in clear text.
/osnet-11/usr/src/lib/krb5/kadm5/srv/
H A Dsvr_principal.c208 * addprinc -randkey operation. The krb5 1.6 dummy password for these requests
216 char *password = *passptr; local
219 if (password == NULL || !(mask & KADM5_ATTRIBUTES) ||
223 /* The 1.6 dummy password was the octets 1..255. */
224 for (i = 0; (unsigned char) password[i] == i + 1; i++);
225 if (password[i] != '\0' || i != 255)
228 /* This will make the caller use a random password instead. */
235 char *password)
239 0, NULL, password);
245 char *password)
233 kadm5_create_principal(void *server_handle, kadm5_principal_ent_t entry, long mask, char *password) argument
242 kadm5_create_principal_3(void *server_handle, kadm5_principal_ent_t entry, long mask, int n_ks_tuple, krb5_key_salt_tuple *ks_tuple, char *password) argument
1399 kadm5_chpass_principal(void *server_handle, krb5_principal principal, char *password) argument
1408 kadm5_chpass_principal_3(void *server_handle, krb5_principal principal, krb5_boolean keepold, int n_ks_tuple, krb5_key_salt_tuple *ks_tuple, char *password) argument
[all...]
/osnet-11/usr/src/lib/libntfs/common/libntfs/
H A Dcrypto.c298 int pfx_size, const char *password)
338 * Verify that the password is correct and that the key file has not
339 * been tampered with. Note if the password has zero length and the
340 * verification fails, retry with password set to NULL. This is needed
341 * to get password less .pfx files generated with Windows XP SP1 (and
345 err = gnutls_pkcs12_verify_mac(pkcs12, password);
348 password && !strlen(password)) {
349 password = NULL;
352 ntfs_log_error("You are probably misspelled password t
297 ntfs_pkcs12_extract_rsa_key(u8 *pfx, int pfx_size, const char *password) argument
[all...]
/osnet-11/usr/src/lib/krb5/plugins/kdb/ldap/libkdb_ldap/
H A Dldap_services.c560 char *password[2] = {NULL}; local
566 password[0] = passwd;
571 if ((st=krb5_add_str_mem_ldap_mod(&mods, "userPassword", LDAP_MOD_REPLACE, password)) != 0)
/osnet-11/usr/src/grub/grub-0.97/stage2/
H A Dstage2.c315 if (! auth && password)
319 password to unlock the next set of features.");
566 if (! auth && password)
570 /* Do password check here! */
572 char *pptr = password;
579 /* Wipe out the previously entered password */
589 if (! check_password (entered, password, password_type))
/osnet-11/usr/src/lib/libfedfs/common/
H A Dnsdb_primitives.c97 nsdb_connect(char *nsdb, int port, char *admin, char *password) argument
109 nsdb, port, admin, password);
120 pw = password;
/osnet-11/usr/src/grub/grub2/grub-core/commands/
H A Dlegacycfg.c526 void *password __attribute__ ((unused)))
600 void *password)
602 if (!check_password_md5_real (entered, password))
709 If 2 password commands are executed in a row and second one fails
710 on GRUB2 the password of first one is used, whereas in grub-legacy
711 authenthication is denied. In case of no password command was executed
726 grub_puts_ (N_("Enter password: "));
798 N_("Simulate grub-legacy password command"));
803 N_("Simulate grub-legacy password command in menuentry mode"));
598 check_password_md5(const char *user, const char *entered, void *password) argument
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/
H A Dchpw.c3 ** set password functions added by Paul W. Nelson, Thursby Software Systems, Inc.
65 /* krb-priv of password */
286 req.password.data = passwd;
287 req.password.length = strlen(passwd);
323 ** put in the "private" password data -
398 ** set password version is 0xff80, change password version is 1
530 *code_string = "Initial password required";
/osnet-11/usr/src/lib/brand/labeled/zone/
H A Dcommon.ksh329 printf "$fmtval" password astring $rootpwd
335 printf "$fmtval" password astring $userpwd
/osnet-11/usr/src/cmd/perl/5.8.4/distrib/lib/CGI/t/
H A Dautoescape.t44 default => 'password field',
45 onclick => 'alert("===> password
49 qq{<input type="password" name="" value="password field" onclick="alert("===> password
51 'autoescape javascript turns off for password field'
/osnet-11/usr/src/cmd/perl/5.8.4/distrib/lib/User/
H A Dpwent.pm271 more secure hashing than DES. On systems supporting shadow password
272 systems, Perl automatically returns the shadow password entry when

Completed in 3361 milliseconds

123