/illumos-gate/usr/src/lib/passwdutil/ |
H A D | switch_utils.c | 136 conf = __nsw_getconfig("passwd", &pserr); 145 "passwd not found."); 158 * though changing AD users' passwords through passwd(1) is not. 236 p->config_name = NSS_DBNAM_PASSWD; /* Use config for "passwd" */ 257 p->config_name = NSS_DBNAM_PASSWD; /* Use config for "passwd" */ 295 struct passwd *passwd = (struct passwd *)ent; local 311 passwd->pw_name = p = gettok(&next); /* username */ 318 passwd [all...] |
H A D | files_attr.c | 47 int files_checkhistory(char *user, char *passwd, pwu_repository_t *rep); 79 struct passwd *pwd; 148 struct passwd * 149 private_getpwnam_r(const char *name, struct passwd *result, char *buffer, 230 * determine which password structure (/etc/passwd or /etc/shadow) 244 pwbuf->pwd = malloc(sizeof (struct passwd)); 394 * passwd = new clear text password. 397 * PWU_SUCCESS, passwd found in user's old password history. 400 * PWU_NOT_FOUND, passwd not in user's old password history. 405 files_checkhistory(char *user, char *passwd, pwu_repository_ argument [all...] |
H A D | ldap_attr.c | 100 char *passwd; /* encrypted password */ member in struct:__anon4260 101 struct passwd *pwd; 102 ns_ldap_attr_t **pattrs; /* passwd attrs */ 105 ns_ldap_attr_t **sattrs; /* passwd attrs */ 115 /* passwd attributes filters */ 150 if (p->passwd) { 151 (void) memset(p->passwd, 0, strlen(p->passwd)); 152 free(p->passwd); 195 struct passwd *p [all...] |
/illumos-gate/usr/src/lib/libsasl/lib/ |
H A D | checkpw.c | 114 const char *passwd, size_t passlen, 118 const char *passwd, size_t passlen, 139 _sasl_MD5Update(&ctx, passwd, passlen); 152 const char *passwd, 199 if(!passwd) { 209 && !strcmp(auxprop_values[0].values[0], passwd)) { 220 passwd, strlen(passwd), 223 ret = _sasl_make_plain_secret(db_secret, passwd, 224 strlen(passwd), 113 _sasl_make_plain_secret(const sasl_utils_t *utils, const char *salt, const char *passwd, size_t passlen, sasl_secret_t **secret) argument 150 auxprop_verify_password(sasl_conn_t *conn, const char *userstr, const char *passwd, const char *service __attribute__((unused)), const char *user_realm __attribute__((unused))) argument 407 pwcheck_verify_password(sasl_conn_t *conn, const char *userid, const char *passwd, const char *service __attribute__((unused)), const char *user_realm __attribute__((unused))) argument 497 saslauthd_verify_password(sasl_conn_t *conn, const char *userid, const char *passwd, const char *service, const char *user_realm) argument [all...] |
/illumos-gate/usr/src/lib/libnsl/key/ |
H A D | xcrypt.c | 75 * Encrypt a secret key given passwd 80 xencrypt(secret, passwd) 82 char *passwd; 95 (void) passwd2des(passwd, key); 109 * Decrypt secret key using passwd 114 xdecrypt(secret, passwd) 116 char *passwd; 130 (void) passwd2des(passwd, key); 224 * Encrypt a secret key given passwd. 244 const char *passwd, /* i 240 xencrypt_g( char *secret, keylen_t keylen, algtype_t algtype, const char *passwd, const char netname[], char **encrypted_secret, bool_t do_chksum) argument 345 xdecrypt_g( char *secret, int keylen, int algtype, const char *passwd, const char netname[], bool_t do_chksum) argument [all...] |
H A D | publickey.c | 148 getkeys_nis(int *errp, char *netname, char *pkey, char *skey, char *passwd) argument 206 if (skey && extract_secret(p, skey, passwd)) 228 getkeys_files(int *errp, char *netname, char *pkey, char *skey, char *passwd) argument 289 if (skey && extract_secret(p, skey, passwd)) 329 getsecretkey(const char *netname, char *skey, const char *passwd) argument 332 passwd)); 348 char *passwd, /* in */ 357 if (!buf || !passwd || !raw || !private || !prilen || 375 if (!xdecrypt_g(buf, keylen, algtype, passwd, netname, TRUE)) { 400 extract_secret(char *raw, char *private, char *passwd) argument 344 extract_secret_g( char *raw, char *private, int prilen, char *passwd, char *netname, keylen_t keylen, algtype_t algtype) argument 422 getkeys_ldap_g( int *err, char *netname, char *pkey, int pkeylen, char *skey, int skeylen, char *passwd, keylen_t keylen, algtype_t algtype) argument 628 getsecretkey_g( const char *netname, keylen_t keylen, algtype_t algtype, char *skey, size_t skeylen, const char *passwd) argument [all...] |
/illumos-gate/usr/src/lib/libipmi/common/ |
H A D | ipmi_user.c | 325 ipmi_user_set_password(ipmi_handle_t *ihp, uint8_t uid, const char *passwd) argument 333 if (strlen(passwd) > 19) 337 if (strlen(passwd) > 15) 340 (void) strcpy(req.isup_passwd, passwd);
|
/illumos-gate/usr/src/cmd/print/printmgr/com/sun/admin/pm/server/ |
H A D | DoPrinterNS.c | 46 const char *passwd, 62 const char *passwd, 81 const char *passwd; local 92 passwd = (*env)->GetStringUTFChars(env, jpasswd, 0); 96 ret = _dorexec(host, user, passwd, cmd, locale); 229 const char *passwd = NULL; local 250 passwd = (*env)->GetStringUTFChars(env, jpasswd, 0); 266 ret = _updateldap(action, host, binddn, passwd, printername,
|
H A D | NS.c | 57 const char *passwd = "directorymanager"; local 60 result = _updateldap("add", host, user, passwd, 66 result = _updateldap("delete", host, user, passwd, 72 result = _updateldap("delete", host, user, passwd, TPRINTERNAME, 78 result = _updateldap("delete", host, user, passwd, "_default", 84 result = _updateldap("add", host, user, passwd, TPRINTERNAME, 90 result = _updateldap("modify", host, user, passwd, TPRINTERNAME, 96 result = _updateldap("modify", host, user, passwd, TPRINTERNAME, 112 const char *passwd, 135 passwd, cm 109 _dorexec( const char *host, const char *user, const char *passwd, const char *cmd, const char *locale) argument 238 char *passwd; member in struct:ns_cred 445 _updateldap( const char *action, const char *host, const char *binddn, const char *passwd, const char *printername, const char *printserver, const char *extensions, const char *comment, const char *isdefault) argument [all...] |
/illumos-gate/usr/src/cmd/scadm/sparc/mpxu/common/ |
H A D | user.c | 207 char *passwd; local 262 passwd = &permissions[strlen(permissions)+1]; 265 if (strncmp(passwd, "Assigned", 12) == 0) { 267 } else if (strncmp(passwd, "None", 12) == 0) { 270 (void) printf("%-12s\n\n", passwd); 310 passwd = &permissions[strlen(permissions)+1]; 313 if (strncmp(passwd, "Assigned", 12) == 0) { 315 } else if (strncmp(passwd, "None", 12) == 0) { 318 (void) printf("%-12s\n", passwd);
|
/illumos-gate/usr/src/cmd/bnu/ |
H A D | in.uucpd.c | 69 struct passwd nouser = { 209 char user[64], passwd[64]; local 210 struct passwd *pw, *getpwnam(); 230 /* force a delay if passwd bad */ 311 sprintf(passwd, "-h%s", inet_ntoa(sinp->sin_addr)); 312 execl(UUCICO, "uucico", passwd, (char *)0); 426 struct passwd *pw; 521 static char passwd[64]; local 545 if (readline(passwd, sizeof (passwd)) < [all...] |
/illumos-gate/usr/src/cmd/krb5/ldap_util/ |
H A D | kdb5_ldap_util.c | 117 "kdb5_ldap_util [-D user_dn [-w passwd]] [-H ldapuri]\n" 306 char *passwd = NULL; local 386 passwd = strdup(koptarg); 387 if (passwd == NULL) { 515 if (passwd == NULL) { 516 passwd = (char *)malloc(MAX_PASSWD_LEN); 517 if (passwd == NULL) { 525 free(passwd); 526 passwd = NULL; 532 memset(passwd, [all...] |
H A D | kdb5_ldap_services.c | 1548 char *passwd = NULL; local 1667 if ((errcode = generate_random_password(util_context, &passwd, &passwd_len))) { 1671 passwd_len = strlen(passwd); 1675 passwd = (char *)malloc(MAX_SERVICE_PASSWD_LEN + 1); 1676 if (passwd == NULL) { 1680 memset(passwd, 0, MAX_SERVICE_PASSWD_LEN + 1); 1701 retval = krb5_read_password(util_context, prompt1, prompt2, passwd, &passwd_len); 1706 memset(passwd, 0, MAX_SERVICE_PASSWD_LEN); 1711 memset(passwd, 0, MAX_SERVICE_PASSWD_LEN); 1714 passwd_len = strlen(passwd); 1929 char passwd[MAX_SERVICE_PASSWD_LEN]; local [all...] |
/illumos-gate/usr/src/lib/smbsrv/libsmbns/common/ |
H A D | smbns_ksetpwd.c | 231 smb_krb5_setpwd(krb5_context ctx, const char *fqdn, char *passwd) argument 255 code = krb5_set_password_using_ccache(ctx, cc, passwd, princ, 320 char *passwd, krb5_enctype *enctypes, int enctype_count) 349 kvno, &salt, passwd) != 0) { 318 smb_krb5_kt_populate(krb5_context ctx, const char *fqdn, krb5_principal *princs, int count, char *fname, krb5_kvno kvno, char *passwd, krb5_enctype *enctypes, int enctype_count) argument
|
/illumos-gate/usr/src/lib/print/libprint/common/ |
H A D | ns.h | 130 char *passwd; member in struct:ns_cred
|
/illumos-gate/usr/src/cmd/ndmpd/ndmp/ |
H A D | ndmpd_connect.c | 66 static void create_md5_digest(unsigned char *digest, char *passwd, 198 char *passwd, *dec_passwd; local 246 passwd = ndmpd_get_prop(NDMP_CLEARTEXT_PASSWORD); 247 if (!passwd || !*passwd) { 259 dec_passwd = ndmp_base64_decode(passwd); 290 passwd = ndmpd_get_prop(NDMP_CRAM_MD5_PASSWORD); 291 if (!passwd || !*passwd) { 302 dec_passwd = ndmp_base64_decode(passwd); 608 create_md5_digest(unsigned char *digest, char *passwd, unsigned char *challenge) argument 1165 char *passwd, *dec_passwd; local 1218 char *passwd, *dec_passwd; local [all...] |
/illumos-gate/usr/src/lib/krb5/kadm5/ |
H A D | kadm_rpc.h | 30 char *passwd; member in struct:cprinc_arg 40 char *passwd; member in struct:cprinc3_arg
|
/illumos-gate/usr/src/lib/smbsrv/libsmb/common/ |
H A D | smb_auth.c | 379 unsigned char *passwd, 395 clnt_blob = &passwd[SMBAUTH_HASH_SZ]; 434 ok = (bcmp(passwd, ntlmv2_resp, pwdlen) == 0); 455 unsigned char *passwd, 466 clnt_challenge = &passwd[SMBAUTH_HASH_SZ]; 500 ok = (bcmp(passwd, lmv2_resp, SMBAUTH_LM_RESP_SZ) == 0); 376 smb_ntlmv2_password_ok( unsigned char *challenge, unsigned char *ntlm_hash, unsigned char *passwd, int pwdlen, char *domain, char *username, uchar_t *session_key) argument 452 smb_lmv2_password_ok( unsigned char *srv_challenge, unsigned char *ntlm_hash, unsigned char *passwd, char *domain, char *username) argument
|
H A D | smb_info.c | 58 uint8_t passwd[SMBAUTH_HASH_SZ]; member in struct:__anon212 372 smb_set_machine_passwd(char *passwd) argument 377 if (smb_config_set(SMB_CI_MACHINE_PASSWD, passwd) != SMBD_SMF_OK) 421 rc = smb_get_machine_passwd(ipc_info.passwd, SMBAUTH_HASH_SZ); 423 *ipc_info.passwd = 0; 438 (void) memcpy(ipc_info.passwd, passwd_hash, SMBAUTH_HASH_SZ); 453 (void) smb_get_machine_passwd(ipc_info.passwd, SMBAUTH_HASH_SZ); 467 (void) memcpy(ipc_info.passwd, ipc_orig_info.passwd, 468 sizeof (ipc_info.passwd)); 526 smb_setdomainprops(char *fqdn, char *server, char *passwd) argument [all...] |
/illumos-gate/usr/src/lib/libldap5/sources/ldap/common/ |
H A D | request.c | 465 char *binddn, *passwd; local 471 binddn = passwd = ""; 474 if (( lderr = (*ld->ld_rebind_fn)( ld, &binddn, &passwd, 496 if (( lderr = ldap_bind_s( ld, binddn, passwd, 514 (*ld->ld_rebind_fn)( ld, &binddn, &passwd,
|
/illumos-gate/usr/src/cmd/cmd-inet/usr.sbin/in.routed/ |
H A D | rtquery.c | 94 char passwd[RIP_AUTH_PW_LEN+1]; variable 250 if (0 == strcasecmp("passwd", optarg)) 257 passwd, sizeof (passwd))) 318 " [-a type=passwd] [host1 ...]\n"), 392 (void) memcpy(NA0.au.au_pw, passwd, RIP_AUTH_PW_LEN); 409 (uchar_t *)passwd, RIP_AUTH_MD5_LEN); 723 (uchar_t *)passwd, RIP_AUTH_MD5_LEN);
|
/illumos-gate/usr/src/cmd/keyserv/ |
H A D | chkey_common.c | 567 * otherwise "dn" and "passwd" would be used to bind as an individual 573 const char *passwd, 611 credp->cred.unix_cred.passwd = strdup(bindPasswd); 613 if (passwd) 614 credp->cred.unix_cred.passwd = strdup(passwd); 624 credp->cred.unix_cred.passwd = ldap_pw; 628 if (credp->cred.unix_cred.passwd == NULL) { 629 fprintf(stderr, "Memory allocation failure (passwd)\n"); 732 char *passwd) 571 update_ldap_attr(const char *dn, ns_ldap_attr_t **attrs, const char *passwd, int add, int update4host, const char *bindDN, const char *bindPasswd) argument 728 ldap_update(char *mechname, char *netname, char *public, char *crypt, char *passwd) argument [all...] |
/illumos-gate/usr/src/cmd/ldap/common/ |
H A D | ldaptest.c | 223 static char dn[256], passwd[256]; local 243 getaline( passwd, sizeof(passwd), stdin, 246 passwd[0] = '\0'; 248 *passwdp = passwd; 262 char passwd[64], dn[256], rdn[64], attr[64], value[256]; local 446 getaline( passwd, sizeof(passwd), stdin, 449 passwd[0] = '\0'; 451 if ( ldap_bind( ld, dn, passwd, metho [all...] |
/illumos-gate/usr/src/cmd/idmap/idmap/ |
H A D | namemaps.c | 140 strings2cred(ns_cred_t *nsc, char *user, char *passwd, char *auth) argument 154 if (passwd != NULL) { 155 nsc->cred.unix_cred.passwd = strdup(passwd); 156 if (nsc->cred.unix_cred.passwd == NULL) { 339 if (p->nsc.cred.unix_cred.passwd != NULL) { 341 (void) memset(p->nsc.cred.unix_cred.passwd, 0, 342 strlen(p->nsc.cred.unix_cred.passwd)); 343 free(p->nsc.cred.unix_cred.passwd); 356 char *user, char *passwd, cha 355 idmap_init_namemaps(idmap_nm_handle_t **adh, char *user, char *passwd, char *auth, char *windomain, int direction) argument [all...] |
/illumos-gate/usr/src/lib/pkcs11/pkcs11_softtoken/common/ |
H A D | softKeysUtil.c | 1251 soft_create_hmac_key(soft_session_t *session_p, CK_BYTE *passwd, argument 1279 keytemplate[3].pValue = passwd;
|