/osnet-11/usr/src/lib/libsmb/common/ |
H A D | smb_auth.c | 556 unsigned char *passwd) 565 return (bcmp(lm_resp, passwd, SMBAUTH_RESP_SZ) == 0); 573 unsigned char *passwd, 584 ok = (bcmp(ntlm_resp, passwd, SMBAUTH_RESP_SZ) == 0); 598 unsigned char *passwd, 614 clnt_blob = &passwd[SMBAUTH_HASH_SZ]; 653 ok = (bcmp(passwd, ntlmv2_resp, pwdlen) == 0); 700 unsigned char *passwd, 722 return (bcmp(passwd, ntlm2_sess_resp, pwdlen) == 0); 730 unsigned char *passwd, 552 smb_lm_password_ok( unsigned char *challenge, uint32_t clen, unsigned char *lm_hash, unsigned char *passwd) argument 569 smb_ntlm_password_ok( unsigned char *challenge, uint32_t clen, unsigned char *ntlm_hash, unsigned char *passwd, unsigned char *session_key) argument 594 smb_ntlmv2_password_ok( unsigned char *challenge, uint32_t clen, unsigned char *ntlm_hash, unsigned char *passwd, int pwdlen, char *domain, char *username, uchar_t *session_key) argument 696 smb_ntlm2_session_password_ok( unsigned char *challenge, uint32_t clen, unsigned char *ntlm_hash, unsigned char *passwd, int pwdlen, unsigned char *nonce, int nlen, uchar_t *session_key) argument 726 smb_lmv2_password_ok( unsigned char *challenge, uint32_t clen, unsigned char *ntlm_hash, unsigned char *passwd, char *domain, char *username) argument 793 smb_auth_validate_lm( unsigned char *challenge, uint32_t clen, smb_passwd_t *smbpw, unsigned char *passwd, int pwdlen, char *domain, char *username) argument 832 smb_auth_validate_nt( unsigned char *challenge, uint32_t clen, smb_passwd_t *smbpw, unsigned char *passwd, int pwdlen, char *domain, char *username, unsigned char *nonce, int nlen, uchar_t *session_key) argument [all...] |
H A D | smb_info.c | 55 uint8_t passwd[SMB_IPC_MAXPWDLEN]; /* clear text passwd */ member in struct:__anon2602 403 smb_set_machine_passwd(char *passwd) argument 408 if (smb_config_setstr(SMB_CI_MACHINE_PASSWD, passwd) != SMBD_SMF_OK) 467 (void) memset(ipc_info.passwd, 0, SMB_IPC_MAXPWDLEN); 479 smb_ipc_set(const char *plain_user, const char *passwd) argument 483 if (smb_auth_ntlm_hash(passwd, passwd_hash) != SMBAUTH_SUCCESS) 489 (void) memcpy(ipc_info.passwd, passwd, SMB_IPC_MAXPWDLEN); 521 (void) memset(ipc_info.passwd, 619 smb_setdomainprops(char *fqdn, char *server, char *passwd) argument [all...] |
/osnet-11/usr/src/lib/libsmbfs/common/ |
H A D | smbfs_ctx.c | 588 smbfs_ctx_setpassword(struct smb_ctx *ctx, const char *passwd, int from_cmd) argument 592 if (passwd == NULL) 594 if (strlen(passwd) >= sizeof (ctx->ct_password)) { 608 if (strncmp(passwd, "$$1", 3) == 0) 609 (void) smbfs_simpledecrypt(ctx->ct_password, passwd); 611 (void) strlcpy(ctx->ct_password, passwd, 1057 struct passwd pw;
|
/osnet-11/usr/src/lib/libldap5/sources/ldap/common/ |
H A D | request.c | 465 char *binddn, *passwd; local 471 binddn = passwd = ""; 474 if (( lderr = (*ld->ld_rebind_fn)( ld, &binddn, &passwd, 496 if (( lderr = ldap_bind_s( ld, binddn, passwd, 514 (*ld->ld_rebind_fn)( ld, &binddn, &passwd,
|
H A D | digest_md5.c | 600 const char *passwd, 611 if (challenge == NULL || username == NULL || passwd == NULL) { 642 passwd, 0, 0, hash_pass), 597 ldap_digest_md5_encode( const char *challenge, const char *username, const char *passwd, char **digest ) argument
|
/osnet-11/usr/src/lib/libntsvcs/common/ |
H A D | ntsvcs_clnt.c | 246 uchar_t passwd[SMB_IPC_MAXPWDLEN]; local 265 smb_ipc_get_passwd(passwd, SMB_IPC_MAXPWDLEN, B_TRUE); 268 rc = smb_kinit(principal, (char *)passwd);
|
H A D | srvsvc_svc.c | 2350 uint8_t *passwd = empty_string; local 2385 info2[i].shi2_passwd = passwd; 2405 info502[i].shi502_passwd = passwd;
|
/osnet-11/usr/src/cmd/ldap/common/ |
H A D | ldaptest.c | 223 static char dn[256], passwd[256]; local 243 getaline( passwd, sizeof(passwd), stdin, 246 passwd[0] = '\0'; 248 *passwdp = passwd; 262 char passwd[64], dn[256], rdn[64], attr[64], value[256]; local 446 getaline( passwd, sizeof(passwd), stdin, 449 passwd[0] = '\0'; 451 if ( ldap_bind( ld, dn, passwd, metho [all...] |
H A D | common.c | 149 fprintf( stderr, gettext(" -w passwd\tbind passwd (for simple authentication)\n") ); 150 fprintf( stderr, gettext(" -w - \tprompt for bind passwd (for simple authentication)\n") ); 151 fprintf( stderr, gettext(" -j file\tread bind passwd (for simple authentication)\n") ); 214 static char *passwd = NULL; variable 603 passwd = strdup( optarg ); 759 passwd = NULL; 767 passwd = strdup(pbuf); 772 passwd = getpassphrase(password_string); 775 passwd 1441 ldaptool_simple_bind_s( LDAP *ld, const char *dn, const char *passwd, LDAPControl **serverctrls, LDAPControl **clientctrls, char *msg ) argument [all...] |
/osnet-11/usr/src/lib/passwdutil/ |
H A D | ldap_attr.c | 99 char *passwd; /* encrypted password */ member in struct:__anon2796 100 struct passwd *pwd; 101 ns_ldap_attr_t **pattrs; /* passwd attrs */ 104 ns_ldap_attr_t **sattrs; /* passwd attrs */ 114 /* passwd attributes filters */ 149 if (p->passwd) { 150 (void) memset(p->passwd, 0, strlen(p->passwd)); 151 free(p->passwd); 194 struct passwd *p [all...] |
/osnet-11/usr/src/lib/libpkg/common/ |
H A D | keystore.c | 360 * passwd - Password used to decrypt keystore 497 * passwd - Password used to encrypt keystore 1848 char *passwd; local 1854 passwd = ""; 1856 passwd = NULL; 1877 passwd = xstrdup(passbuf); 1879 keystore->passphrase = passwd; 1889 * passwd - password used to encrypt keystore
|
H A D | pkgweb.c | 1816 * passwd - password used to encrypt certs 1823 char *passwd) 1865 if ((p12 = sunw_PKCS12_create(passwd, NULL, NULL, cacerts)) == NULL) { 3219 /* first newline found is end of passwd, so nuke it */ 3232 /* unable to collect passwd from given source */ 1822 write_ca_file(PKG_ERR *err, char *tmpdir, STACK_OF(X509) *cacerts, char *passwd) argument
|
/osnet-11/usr/src/lib/pkcs11/pkcs11_softtoken/common/ |
H A D | softKeysUtil.c | 1277 soft_create_hmac_key(soft_session_t *session_p, CK_BYTE *passwd, argument 1305 keytemplate[3].pValue = passwd;
|
/osnet-11/usr/src/lib/libsldap/common/ |
H A D | ns_connect.c | 501 if (cred->cred.unix_cred.passwd) 502 (void) fprintf(fp, "tid= %d: passwd=%s\n", 503 t, cred->cred.unix_cred.passwd); 1780 if (AdminCred == NULL || AdminCred->passwd == NULL) { 1785 modparamVal = dvalue(AdminCred->passwd); 1812 (*authp)->cred.unix_cred.passwd = modparamVal; 2128 * a flag indicating this function should fail if the passwd 2494 char *binddn, *passwd, errstr[MAXERROR], *errmsg; local 2503 passwd = NULL; 2506 passwd 2614 char *binddn, *passwd, *digest_md5_name, local [all...] |
H A D | ns_sldap.h | 173 char *passwd; /* password */ member in struct:UnixCred 178 char *passwd; /* password */ member in struct:CertCred 487 #define NS_LDAP_TYPE_PASSWD "passwd"
|
H A D | ns_internal.h | 831 char *passwd; member in struct:ns_sasl_cb_param
|
/osnet-11/usr/src/lib/krb5/kdb/ |
H A D | kdb5.c | 2345 char *passwd, 2355 passwd, new_kvno, keepold, db_entry); 2341 krb5_dbe_cpw(krb5_context kcontext, krb5_keyblock * master_key, krb5_key_salt_tuple * ks_tuple, int ks_tuple_count, char *passwd, int new_kvno, krb5_boolean keepold, krb5_db_entry * db_entry) argument
|
/osnet-11/usr/src/lib/libslp/clib/ |
H A D | slp_ami.h | 673 char *passwd; /* const */ member in struct:ami_des_keygen_param_t
|
/osnet-11/usr/src/lib/nsswitch/ldap/common/ |
H A D | getgrent.c | 857 * Get the DN entry from the server. Specify 'passwd' as the service 859 * that schema mapping for the passwd service will be done by libsldap. 1149 * Given a group or member (user) DN, search the nscd group or passwd cache 1150 * to find a group or passwd entry with a matching DN. 1609 char **gname, **passwd, **gid, *password, *end; local 1649 passwd = __ns_ldap_getAttr(result->entry, _G_PASSWD); 1650 if (passwd == NULL || passwd[0] == NULL || (strlen(passwd[0]) == 0)) { 1661 if (strncasecmp(passwd[ [all...] |
/osnet-11/usr/src/lib/sasl_plugins/digestmd5/ |
H A D | digestmd5.c | 3250 * H_URP = H({ username-value,":",realm-value,":",passwd}) sec->data 3268 * A1 = { H( { username-value, ":", realm-value, ":", passwd } ), 3484 * The "username-value", "realm-value" and "passwd" are encoded according 3486 * present, and all the characters of either "username-value" or "passwd" 3868 sasl_secret_t * passwd, 3878 if(!username || !cnonce || !nonce || !ncvalue || !digesturi || !passwd) { 3897 passwd, 3859 calculate_response(context_t * text, const sasl_utils_t * utils, unsigned char *username, unsigned char *realm, unsigned char *nonce, unsigned int ncvalue, unsigned char *cnonce, char *qop, unsigned char *digesturi, sasl_secret_t * passwd, unsigned char *authorization_id, char **response_value) argument
|