Searched defs:passwd (Results 26 - 45 of 45) sorted by relevance

12

/osnet-11/usr/src/lib/libsmb/common/
H A Dsmb_auth.c556 unsigned char *passwd)
565 return (bcmp(lm_resp, passwd, SMBAUTH_RESP_SZ) == 0);
573 unsigned char *passwd,
584 ok = (bcmp(ntlm_resp, passwd, SMBAUTH_RESP_SZ) == 0);
598 unsigned char *passwd,
614 clnt_blob = &passwd[SMBAUTH_HASH_SZ];
653 ok = (bcmp(passwd, ntlmv2_resp, pwdlen) == 0);
700 unsigned char *passwd,
722 return (bcmp(passwd, ntlm2_sess_resp, pwdlen) == 0);
730 unsigned char *passwd,
552 smb_lm_password_ok( unsigned char *challenge, uint32_t clen, unsigned char *lm_hash, unsigned char *passwd) argument
569 smb_ntlm_password_ok( unsigned char *challenge, uint32_t clen, unsigned char *ntlm_hash, unsigned char *passwd, unsigned char *session_key) argument
594 smb_ntlmv2_password_ok( unsigned char *challenge, uint32_t clen, unsigned char *ntlm_hash, unsigned char *passwd, int pwdlen, char *domain, char *username, uchar_t *session_key) argument
696 smb_ntlm2_session_password_ok( unsigned char *challenge, uint32_t clen, unsigned char *ntlm_hash, unsigned char *passwd, int pwdlen, unsigned char *nonce, int nlen, uchar_t *session_key) argument
726 smb_lmv2_password_ok( unsigned char *challenge, uint32_t clen, unsigned char *ntlm_hash, unsigned char *passwd, char *domain, char *username) argument
793 smb_auth_validate_lm( unsigned char *challenge, uint32_t clen, smb_passwd_t *smbpw, unsigned char *passwd, int pwdlen, char *domain, char *username) argument
832 smb_auth_validate_nt( unsigned char *challenge, uint32_t clen, smb_passwd_t *smbpw, unsigned char *passwd, int pwdlen, char *domain, char *username, unsigned char *nonce, int nlen, uchar_t *session_key) argument
[all...]
H A Dsmb_info.c55 uint8_t passwd[SMB_IPC_MAXPWDLEN]; /* clear text passwd */ member in struct:__anon2602
403 smb_set_machine_passwd(char *passwd) argument
408 if (smb_config_setstr(SMB_CI_MACHINE_PASSWD, passwd) != SMBD_SMF_OK)
467 (void) memset(ipc_info.passwd, 0, SMB_IPC_MAXPWDLEN);
479 smb_ipc_set(const char *plain_user, const char *passwd) argument
483 if (smb_auth_ntlm_hash(passwd, passwd_hash) != SMBAUTH_SUCCESS)
489 (void) memcpy(ipc_info.passwd, passwd, SMB_IPC_MAXPWDLEN);
521 (void) memset(ipc_info.passwd,
619 smb_setdomainprops(char *fqdn, char *server, char *passwd) argument
[all...]
/osnet-11/usr/src/lib/libsmbfs/common/
H A Dsmbfs_ctx.c588 smbfs_ctx_setpassword(struct smb_ctx *ctx, const char *passwd, int from_cmd) argument
592 if (passwd == NULL)
594 if (strlen(passwd) >= sizeof (ctx->ct_password)) {
608 if (strncmp(passwd, "$$1", 3) == 0)
609 (void) smbfs_simpledecrypt(ctx->ct_password, passwd);
611 (void) strlcpy(ctx->ct_password, passwd,
1057 struct passwd pw;
/osnet-11/usr/src/lib/libldap5/sources/ldap/common/
H A Drequest.c465 char *binddn, *passwd; local
471 binddn = passwd = "";
474 if (( lderr = (*ld->ld_rebind_fn)( ld, &binddn, &passwd,
496 if (( lderr = ldap_bind_s( ld, binddn, passwd,
514 (*ld->ld_rebind_fn)( ld, &binddn, &passwd,
H A Ddigest_md5.c600 const char *passwd,
611 if (challenge == NULL || username == NULL || passwd == NULL) {
642 passwd, 0, 0, hash_pass),
597 ldap_digest_md5_encode( const char *challenge, const char *username, const char *passwd, char **digest ) argument
/osnet-11/usr/src/lib/libntsvcs/common/
H A Dntsvcs_clnt.c246 uchar_t passwd[SMB_IPC_MAXPWDLEN]; local
265 smb_ipc_get_passwd(passwd, SMB_IPC_MAXPWDLEN, B_TRUE);
268 rc = smb_kinit(principal, (char *)passwd);
H A Dsrvsvc_svc.c2350 uint8_t *passwd = empty_string; local
2385 info2[i].shi2_passwd = passwd;
2405 info502[i].shi502_passwd = passwd;
/osnet-11/usr/src/cmd/ldap/common/
H A Dldaptest.c223 static char dn[256], passwd[256]; local
243 getaline( passwd, sizeof(passwd), stdin,
246 passwd[0] = '\0';
248 *passwdp = passwd;
262 char passwd[64], dn[256], rdn[64], attr[64], value[256]; local
446 getaline( passwd, sizeof(passwd), stdin,
449 passwd[0] = '\0';
451 if ( ldap_bind( ld, dn, passwd, metho
[all...]
H A Dcommon.c149 fprintf( stderr, gettext(" -w passwd\tbind passwd (for simple authentication)\n") );
150 fprintf( stderr, gettext(" -w - \tprompt for bind passwd (for simple authentication)\n") );
151 fprintf( stderr, gettext(" -j file\tread bind passwd (for simple authentication)\n") );
214 static char *passwd = NULL; variable
603 passwd = strdup( optarg );
759 passwd = NULL;
767 passwd = strdup(pbuf);
772 passwd = getpassphrase(password_string);
775 passwd
1441 ldaptool_simple_bind_s( LDAP *ld, const char *dn, const char *passwd, LDAPControl **serverctrls, LDAPControl **clientctrls, char *msg ) argument
[all...]
/osnet-11/usr/src/lib/passwdutil/
H A Dldap_attr.c99 char *passwd; /* encrypted password */ member in struct:__anon2796
100 struct passwd *pwd;
101 ns_ldap_attr_t **pattrs; /* passwd attrs */
104 ns_ldap_attr_t **sattrs; /* passwd attrs */
114 /* passwd attributes filters */
149 if (p->passwd) {
150 (void) memset(p->passwd, 0, strlen(p->passwd));
151 free(p->passwd);
194 struct passwd *p
[all...]
/osnet-11/usr/src/lib/libpkg/common/
H A Dkeystore.c360 * passwd - Password used to decrypt keystore
497 * passwd - Password used to encrypt keystore
1848 char *passwd; local
1854 passwd = "";
1856 passwd = NULL;
1877 passwd = xstrdup(passbuf);
1879 keystore->passphrase = passwd;
1889 * passwd - password used to encrypt keystore
H A Dpkgweb.c1816 * passwd - password used to encrypt certs
1823 char *passwd)
1865 if ((p12 = sunw_PKCS12_create(passwd, NULL, NULL, cacerts)) == NULL) {
3219 /* first newline found is end of passwd, so nuke it */
3232 /* unable to collect passwd from given source */
1822 write_ca_file(PKG_ERR *err, char *tmpdir, STACK_OF(X509) *cacerts, char *passwd) argument
/osnet-11/usr/src/lib/pkcs11/pkcs11_softtoken/common/
H A DsoftKeysUtil.c1277 soft_create_hmac_key(soft_session_t *session_p, CK_BYTE *passwd, argument
1305 keytemplate[3].pValue = passwd;
/osnet-11/usr/src/lib/libsldap/common/
H A Dns_connect.c501 if (cred->cred.unix_cred.passwd)
502 (void) fprintf(fp, "tid= %d: passwd=%s\n",
503 t, cred->cred.unix_cred.passwd);
1780 if (AdminCred == NULL || AdminCred->passwd == NULL) {
1785 modparamVal = dvalue(AdminCred->passwd);
1812 (*authp)->cred.unix_cred.passwd = modparamVal;
2128 * a flag indicating this function should fail if the passwd
2494 char *binddn, *passwd, errstr[MAXERROR], *errmsg; local
2503 passwd = NULL;
2506 passwd
2614 char *binddn, *passwd, *digest_md5_name, local
[all...]
H A Dns_sldap.h173 char *passwd; /* password */ member in struct:UnixCred
178 char *passwd; /* password */ member in struct:CertCred
487 #define NS_LDAP_TYPE_PASSWD "passwd"
H A Dns_internal.h831 char *passwd; member in struct:ns_sasl_cb_param
/osnet-11/usr/src/lib/krb5/kdb/
H A Dkdb5.c2345 char *passwd,
2355 passwd, new_kvno, keepold, db_entry);
2341 krb5_dbe_cpw(krb5_context kcontext, krb5_keyblock * master_key, krb5_key_salt_tuple * ks_tuple, int ks_tuple_count, char *passwd, int new_kvno, krb5_boolean keepold, krb5_db_entry * db_entry) argument
/osnet-11/usr/src/lib/libslp/clib/
H A Dslp_ami.h673 char *passwd; /* const */ member in struct:ami_des_keygen_param_t
/osnet-11/usr/src/lib/nsswitch/ldap/common/
H A Dgetgrent.c857 * Get the DN entry from the server. Specify 'passwd' as the service
859 * that schema mapping for the passwd service will be done by libsldap.
1149 * Given a group or member (user) DN, search the nscd group or passwd cache
1150 * to find a group or passwd entry with a matching DN.
1609 char **gname, **passwd, **gid, *password, *end; local
1649 passwd = __ns_ldap_getAttr(result->entry, _G_PASSWD);
1650 if (passwd == NULL || passwd[0] == NULL || (strlen(passwd[0]) == 0)) {
1661 if (strncasecmp(passwd[
[all...]
/osnet-11/usr/src/lib/sasl_plugins/digestmd5/
H A Ddigestmd5.c3250 * H_URP = H({ username-value,":",realm-value,":",passwd}) sec->data
3268 * A1 = { H( { username-value, ":", realm-value, ":", passwd } ),
3484 * The "username-value", "realm-value" and "passwd" are encoded according
3486 * present, and all the characters of either "username-value" or "passwd"
3868 sasl_secret_t * passwd,
3878 if(!username || !cnonce || !nonce || !ncvalue || !digesturi || !passwd) {
3897 passwd,
3859 calculate_response(context_t * text, const sasl_utils_t * utils, unsigned char *username, unsigned char *realm, unsigned char *nonce, unsigned int ncvalue, unsigned char *cnonce, char *qop, unsigned char *digesturi, sasl_secret_t * passwd, unsigned char *authorization_id, char **response_value) argument

Completed in 177 milliseconds

12