Searched defs:passwd (Results 26 - 50 of 71) sorted by relevance

123

/illumos-gate/usr/src/lib/passwdutil/
H A Dswitch_utils.c136 conf = __nsw_getconfig("passwd", &pserr);
145 "passwd not found.");
158 * though changing AD users' passwords through passwd(1) is not.
236 p->config_name = NSS_DBNAM_PASSWD; /* Use config for "passwd" */
257 p->config_name = NSS_DBNAM_PASSWD; /* Use config for "passwd" */
295 struct passwd *passwd = (struct passwd *)ent; local
311 passwd->pw_name = p = gettok(&next); /* username */
318 passwd
[all...]
H A Dfiles_attr.c47 int files_checkhistory(char *user, char *passwd, pwu_repository_t *rep);
79 struct passwd *pwd;
148 struct passwd *
149 private_getpwnam_r(const char *name, struct passwd *result, char *buffer,
230 * determine which password structure (/etc/passwd or /etc/shadow)
244 pwbuf->pwd = malloc(sizeof (struct passwd));
394 * passwd = new clear text password.
397 * PWU_SUCCESS, passwd found in user's old password history.
400 * PWU_NOT_FOUND, passwd not in user's old password history.
405 files_checkhistory(char *user, char *passwd, pwu_repository_ argument
[all...]
H A Dldap_attr.c100 char *passwd; /* encrypted password */ member in struct:__anon4260
101 struct passwd *pwd;
102 ns_ldap_attr_t **pattrs; /* passwd attrs */
105 ns_ldap_attr_t **sattrs; /* passwd attrs */
115 /* passwd attributes filters */
150 if (p->passwd) {
151 (void) memset(p->passwd, 0, strlen(p->passwd));
152 free(p->passwd);
195 struct passwd *p
[all...]
/illumos-gate/usr/src/lib/libsasl/lib/
H A Dcheckpw.c114 const char *passwd, size_t passlen,
118 const char *passwd, size_t passlen,
139 _sasl_MD5Update(&ctx, passwd, passlen);
152 const char *passwd,
199 if(!passwd) {
209 && !strcmp(auxprop_values[0].values[0], passwd)) {
220 passwd, strlen(passwd),
223 ret = _sasl_make_plain_secret(db_secret, passwd,
224 strlen(passwd),
113 _sasl_make_plain_secret(const sasl_utils_t *utils, const char *salt, const char *passwd, size_t passlen, sasl_secret_t **secret) argument
150 auxprop_verify_password(sasl_conn_t *conn, const char *userstr, const char *passwd, const char *service __attribute__((unused)), const char *user_realm __attribute__((unused))) argument
407 pwcheck_verify_password(sasl_conn_t *conn, const char *userid, const char *passwd, const char *service __attribute__((unused)), const char *user_realm __attribute__((unused))) argument
497 saslauthd_verify_password(sasl_conn_t *conn, const char *userid, const char *passwd, const char *service, const char *user_realm) argument
[all...]
/illumos-gate/usr/src/lib/libnsl/key/
H A Dxcrypt.c75 * Encrypt a secret key given passwd
80 xencrypt(secret, passwd)
82 char *passwd;
95 (void) passwd2des(passwd, key);
109 * Decrypt secret key using passwd
114 xdecrypt(secret, passwd)
116 char *passwd;
130 (void) passwd2des(passwd, key);
224 * Encrypt a secret key given passwd.
244 const char *passwd, /* i
240 xencrypt_g( char *secret, keylen_t keylen, algtype_t algtype, const char *passwd, const char netname[], char **encrypted_secret, bool_t do_chksum) argument
345 xdecrypt_g( char *secret, int keylen, int algtype, const char *passwd, const char netname[], bool_t do_chksum) argument
[all...]
H A Dpublickey.c148 getkeys_nis(int *errp, char *netname, char *pkey, char *skey, char *passwd) argument
206 if (skey && extract_secret(p, skey, passwd))
228 getkeys_files(int *errp, char *netname, char *pkey, char *skey, char *passwd) argument
289 if (skey && extract_secret(p, skey, passwd))
329 getsecretkey(const char *netname, char *skey, const char *passwd) argument
332 passwd));
348 char *passwd, /* in */
357 if (!buf || !passwd || !raw || !private || !prilen ||
375 if (!xdecrypt_g(buf, keylen, algtype, passwd, netname, TRUE)) {
400 extract_secret(char *raw, char *private, char *passwd) argument
344 extract_secret_g( char *raw, char *private, int prilen, char *passwd, char *netname, keylen_t keylen, algtype_t algtype) argument
422 getkeys_ldap_g( int *err, char *netname, char *pkey, int pkeylen, char *skey, int skeylen, char *passwd, keylen_t keylen, algtype_t algtype) argument
628 getsecretkey_g( const char *netname, keylen_t keylen, algtype_t algtype, char *skey, size_t skeylen, const char *passwd) argument
[all...]
/illumos-gate/usr/src/lib/libipmi/common/
H A Dipmi_user.c325 ipmi_user_set_password(ipmi_handle_t *ihp, uint8_t uid, const char *passwd) argument
333 if (strlen(passwd) > 19)
337 if (strlen(passwd) > 15)
340 (void) strcpy(req.isup_passwd, passwd);
/illumos-gate/usr/src/cmd/print/printmgr/com/sun/admin/pm/server/
H A DDoPrinterNS.c46 const char *passwd,
62 const char *passwd,
81 const char *passwd; local
92 passwd = (*env)->GetStringUTFChars(env, jpasswd, 0);
96 ret = _dorexec(host, user, passwd, cmd, locale);
229 const char *passwd = NULL; local
250 passwd = (*env)->GetStringUTFChars(env, jpasswd, 0);
266 ret = _updateldap(action, host, binddn, passwd, printername,
H A DNS.c57 const char *passwd = "directorymanager"; local
60 result = _updateldap("add", host, user, passwd,
66 result = _updateldap("delete", host, user, passwd,
72 result = _updateldap("delete", host, user, passwd, TPRINTERNAME,
78 result = _updateldap("delete", host, user, passwd, "_default",
84 result = _updateldap("add", host, user, passwd, TPRINTERNAME,
90 result = _updateldap("modify", host, user, passwd, TPRINTERNAME,
96 result = _updateldap("modify", host, user, passwd, TPRINTERNAME,
112 const char *passwd,
135 passwd, cm
109 _dorexec( const char *host, const char *user, const char *passwd, const char *cmd, const char *locale) argument
238 char *passwd; member in struct:ns_cred
445 _updateldap( const char *action, const char *host, const char *binddn, const char *passwd, const char *printername, const char *printserver, const char *extensions, const char *comment, const char *isdefault) argument
[all...]
/illumos-gate/usr/src/cmd/scadm/sparc/mpxu/common/
H A Duser.c207 char *passwd; local
262 passwd = &permissions[strlen(permissions)+1];
265 if (strncmp(passwd, "Assigned", 12) == 0) {
267 } else if (strncmp(passwd, "None", 12) == 0) {
270 (void) printf("%-12s\n\n", passwd);
310 passwd = &permissions[strlen(permissions)+1];
313 if (strncmp(passwd, "Assigned", 12) == 0) {
315 } else if (strncmp(passwd, "None", 12) == 0) {
318 (void) printf("%-12s\n", passwd);
/illumos-gate/usr/src/cmd/bnu/
H A Din.uucpd.c69 struct passwd nouser = {
209 char user[64], passwd[64]; local
210 struct passwd *pw, *getpwnam();
230 /* force a delay if passwd bad */
311 sprintf(passwd, "-h%s", inet_ntoa(sinp->sin_addr));
312 execl(UUCICO, "uucico", passwd, (char *)0);
426 struct passwd *pw;
521 static char passwd[64]; local
545 if (readline(passwd, sizeof (passwd)) <
[all...]
/illumos-gate/usr/src/cmd/krb5/ldap_util/
H A Dkdb5_ldap_util.c117 "kdb5_ldap_util [-D user_dn [-w passwd]] [-H ldapuri]\n"
306 char *passwd = NULL; local
386 passwd = strdup(koptarg);
387 if (passwd == NULL) {
515 if (passwd == NULL) {
516 passwd = (char *)malloc(MAX_PASSWD_LEN);
517 if (passwd == NULL) {
525 free(passwd);
526 passwd = NULL;
532 memset(passwd,
[all...]
H A Dkdb5_ldap_services.c1548 char *passwd = NULL; local
1667 if ((errcode = generate_random_password(util_context, &passwd, &passwd_len))) {
1671 passwd_len = strlen(passwd);
1675 passwd = (char *)malloc(MAX_SERVICE_PASSWD_LEN + 1);
1676 if (passwd == NULL) {
1680 memset(passwd, 0, MAX_SERVICE_PASSWD_LEN + 1);
1701 retval = krb5_read_password(util_context, prompt1, prompt2, passwd, &passwd_len);
1706 memset(passwd, 0, MAX_SERVICE_PASSWD_LEN);
1711 memset(passwd, 0, MAX_SERVICE_PASSWD_LEN);
1714 passwd_len = strlen(passwd);
1929 char passwd[MAX_SERVICE_PASSWD_LEN]; local
[all...]
/illumos-gate/usr/src/lib/smbsrv/libsmbns/common/
H A Dsmbns_ksetpwd.c231 smb_krb5_setpwd(krb5_context ctx, const char *fqdn, char *passwd) argument
255 code = krb5_set_password_using_ccache(ctx, cc, passwd, princ,
320 char *passwd, krb5_enctype *enctypes, int enctype_count)
349 kvno, &salt, passwd) != 0) {
318 smb_krb5_kt_populate(krb5_context ctx, const char *fqdn, krb5_principal *princs, int count, char *fname, krb5_kvno kvno, char *passwd, krb5_enctype *enctypes, int enctype_count) argument
/illumos-gate/usr/src/lib/print/libprint/common/
H A Dns.h130 char *passwd; member in struct:ns_cred
/illumos-gate/usr/src/cmd/ndmpd/ndmp/
H A Dndmpd_connect.c66 static void create_md5_digest(unsigned char *digest, char *passwd,
198 char *passwd, *dec_passwd; local
246 passwd = ndmpd_get_prop(NDMP_CLEARTEXT_PASSWORD);
247 if (!passwd || !*passwd) {
259 dec_passwd = ndmp_base64_decode(passwd);
290 passwd = ndmpd_get_prop(NDMP_CRAM_MD5_PASSWORD);
291 if (!passwd || !*passwd) {
302 dec_passwd = ndmp_base64_decode(passwd);
608 create_md5_digest(unsigned char *digest, char *passwd, unsigned char *challenge) argument
1165 char *passwd, *dec_passwd; local
1218 char *passwd, *dec_passwd; local
[all...]
/illumos-gate/usr/src/lib/krb5/kadm5/
H A Dkadm_rpc.h30 char *passwd; member in struct:cprinc_arg
40 char *passwd; member in struct:cprinc3_arg
/illumos-gate/usr/src/lib/smbsrv/libsmb/common/
H A Dsmb_auth.c379 unsigned char *passwd,
395 clnt_blob = &passwd[SMBAUTH_HASH_SZ];
434 ok = (bcmp(passwd, ntlmv2_resp, pwdlen) == 0);
455 unsigned char *passwd,
466 clnt_challenge = &passwd[SMBAUTH_HASH_SZ];
500 ok = (bcmp(passwd, lmv2_resp, SMBAUTH_LM_RESP_SZ) == 0);
376 smb_ntlmv2_password_ok( unsigned char *challenge, unsigned char *ntlm_hash, unsigned char *passwd, int pwdlen, char *domain, char *username, uchar_t *session_key) argument
452 smb_lmv2_password_ok( unsigned char *srv_challenge, unsigned char *ntlm_hash, unsigned char *passwd, char *domain, char *username) argument
H A Dsmb_info.c58 uint8_t passwd[SMBAUTH_HASH_SZ]; member in struct:__anon212
372 smb_set_machine_passwd(char *passwd) argument
377 if (smb_config_set(SMB_CI_MACHINE_PASSWD, passwd) != SMBD_SMF_OK)
421 rc = smb_get_machine_passwd(ipc_info.passwd, SMBAUTH_HASH_SZ);
423 *ipc_info.passwd = 0;
438 (void) memcpy(ipc_info.passwd, passwd_hash, SMBAUTH_HASH_SZ);
453 (void) smb_get_machine_passwd(ipc_info.passwd, SMBAUTH_HASH_SZ);
467 (void) memcpy(ipc_info.passwd, ipc_orig_info.passwd,
468 sizeof (ipc_info.passwd));
526 smb_setdomainprops(char *fqdn, char *server, char *passwd) argument
[all...]
/illumos-gate/usr/src/lib/libldap5/sources/ldap/common/
H A Drequest.c465 char *binddn, *passwd; local
471 binddn = passwd = "";
474 if (( lderr = (*ld->ld_rebind_fn)( ld, &binddn, &passwd,
496 if (( lderr = ldap_bind_s( ld, binddn, passwd,
514 (*ld->ld_rebind_fn)( ld, &binddn, &passwd,
/illumos-gate/usr/src/cmd/cmd-inet/usr.sbin/in.routed/
H A Drtquery.c94 char passwd[RIP_AUTH_PW_LEN+1]; variable
250 if (0 == strcasecmp("passwd", optarg))
257 passwd, sizeof (passwd)))
318 " [-a type=passwd] [host1 ...]\n"),
392 (void) memcpy(NA0.au.au_pw, passwd, RIP_AUTH_PW_LEN);
409 (uchar_t *)passwd, RIP_AUTH_MD5_LEN);
723 (uchar_t *)passwd, RIP_AUTH_MD5_LEN);
/illumos-gate/usr/src/cmd/keyserv/
H A Dchkey_common.c567 * otherwise "dn" and "passwd" would be used to bind as an individual
573 const char *passwd,
611 credp->cred.unix_cred.passwd = strdup(bindPasswd);
613 if (passwd)
614 credp->cred.unix_cred.passwd = strdup(passwd);
624 credp->cred.unix_cred.passwd = ldap_pw;
628 if (credp->cred.unix_cred.passwd == NULL) {
629 fprintf(stderr, "Memory allocation failure (passwd)\n");
732 char *passwd)
571 update_ldap_attr(const char *dn, ns_ldap_attr_t **attrs, const char *passwd, int add, int update4host, const char *bindDN, const char *bindPasswd) argument
728 ldap_update(char *mechname, char *netname, char *public, char *crypt, char *passwd) argument
[all...]
/illumos-gate/usr/src/cmd/ldap/common/
H A Dldaptest.c223 static char dn[256], passwd[256]; local
243 getaline( passwd, sizeof(passwd), stdin,
246 passwd[0] = '\0';
248 *passwdp = passwd;
262 char passwd[64], dn[256], rdn[64], attr[64], value[256]; local
446 getaline( passwd, sizeof(passwd), stdin,
449 passwd[0] = '\0';
451 if ( ldap_bind( ld, dn, passwd, metho
[all...]
/illumos-gate/usr/src/cmd/idmap/idmap/
H A Dnamemaps.c140 strings2cred(ns_cred_t *nsc, char *user, char *passwd, char *auth) argument
154 if (passwd != NULL) {
155 nsc->cred.unix_cred.passwd = strdup(passwd);
156 if (nsc->cred.unix_cred.passwd == NULL) {
339 if (p->nsc.cred.unix_cred.passwd != NULL) {
341 (void) memset(p->nsc.cred.unix_cred.passwd, 0,
342 strlen(p->nsc.cred.unix_cred.passwd));
343 free(p->nsc.cred.unix_cred.passwd);
356 char *user, char *passwd, cha
355 idmap_init_namemaps(idmap_nm_handle_t **adh, char *user, char *passwd, char *auth, char *windomain, int direction) argument
[all...]
/illumos-gate/usr/src/lib/pkcs11/pkcs11_softtoken/common/
H A DsoftKeysUtil.c1251 soft_create_hmac_key(soft_session_t *session_p, CK_BYTE *passwd, argument
1279 keytemplate[3].pValue = passwd;

Completed in 1210 milliseconds

123