Searched defs:passwd (Results 51 - 71 of 71) sorted by relevance

123

/illumos-gate/usr/src/lib/libsldap/common/
H A Dns_connect.c489 if (cred->cred.unix_cred.passwd)
490 (void) fprintf(fp, "tid= %d: passwd=%s\n",
491 t, cred->cred.unix_cred.passwd);
1626 if (AdminCred == NULL || AdminCred->passwd == NULL) {
1631 modparamVal = dvalue(AdminCred->passwd);
1658 (*authp)->cred.unix_cred.passwd = modparamVal;
1974 * a flag indicating this function should fail if the passwd
2340 char *binddn, *passwd, errstr[MAXERROR], *errmsg; local
2348 passwd = auth->cred.unix_cred.passwd;
2438 char *binddn, *passwd, *digest_md5_name, local
[all...]
H A Dns_sldap.h149 char *passwd; /* password */ member in struct:UnixCred
154 char *passwd; /* password */ member in struct:CertCred
463 #define NS_LDAP_TYPE_PASSWD "passwd"
H A Dns_internal.h727 char *passwd; member in struct:ns_sasl_cb_param
/illumos-gate/usr/src/lib/libsmbfs/smb/
H A Dctx.c517 /* may have [[domain;]user[:passwd]] */
753 smb_ctx_setpassword(struct smb_ctx *ctx, const char *passwd, int from_cmd) argument
757 if (passwd == NULL)
759 if (strlen(passwd) >= sizeof (ctx->ct_password)) {
773 if (strncmp(passwd, "$$1", 3) == 0)
774 (void) smb_simpledecrypt(ctx->ct_password, passwd);
776 strlcpy(ctx->ct_password, passwd,
875 struct passwd pw;
1501 struct passwd pw;
/illumos-gate/usr/src/lib/libpkg/common/
H A Dkeystore.c360 * passwd - Password used to decrypt keystore
497 * passwd - Password used to encrypt keystore
1848 char *passwd; local
1854 passwd = "";
1856 passwd = NULL;
1877 passwd = xstrdup(passbuf);
1879 keystore->passphrase = passwd;
1889 * passwd - password used to encrypt keystore
H A Dpkgweb.c1819 * passwd - password used to encrypt certs
1826 char *passwd)
1868 if ((p12 = sunw_PKCS12_create(passwd, NULL, NULL, cacerts)) == NULL) {
3219 /* first newline found is end of passwd, so nuke it */
3232 /* unable to collect passwd from given source */
1825 write_ca_file(PKG_ERR *err, char *tmpdir, STACK_OF(X509) *cacerts, char *passwd) argument
/illumos-gate/usr/src/lib/libldap5/sources/ldap/common/
H A Ddigest_md5.c600 const char *passwd,
611 if (challenge == NULL || username == NULL || passwd == NULL) {
642 passwd, 0, 0, hash_pass),
597 ldap_digest_md5_encode( const char *challenge, const char *username, const char *passwd, char **digest ) argument
/illumos-gate/usr/src/cmd/keyserv/
H A Dkeyserv.c552 char *passwd; local
571 passwd = getpass("root password:");
572 passwd2des(passwd, master);
573 if (!getsecretkey(name, secret, passwd)) {
588 retval = storeotherrootkeys(fp, name, passwd, secret);
H A Dsetkey.c574 storeotherrootkeys(FILE *fp, char *netname, char *passwd, char *osecret) argument
583 netname, passwd));
584 passwd2des_g(passwd, netname, strlen(netname), &master, FALSE);
599 passwd)) {
/illumos-gate/usr/src/cmd/passwd/
H A Dpasswd.c33 * passwd is a program whose sole purpose is to manage
73 #define MFLAG 0x004 /* set max field -- # of days passwd is valid */
80 #define WFLAG 0x100 /* warn user to change passwd */
145 #define MSG_SORRY "%s: Sorry, wrong passwd\n"
157 #define PASSWD "/etc/passwd"
277 struct passwd *pass = getpwuid(uid);
286 * If flag is zero, change passwd.
297 if (pam_start("passwd", usrname, &pam_conv, &pamh) != PAM_SUCCESS) {
1244 char *passwd; local
1251 passwd
[all...]
/illumos-gate/usr/src/cmd/rmformat/
H A Drmf_misc.c150 char passwd[256], re_passwd[256]; local
185 buf = fgets(passwd, (size_t)256, in);
191 len = strlen(passwd);
209 if ((buf == NULL) || strcmp(passwd, re_passwd)) {
217 (void) strncpy(wp->sm_passwd, passwd, wp->sm_passwd_len);
/illumos-gate/usr/src/cmd/cmd-inet/usr.bin/pppd/
H A Doptions.c97 char passwd[MAXSECRETLEN]; /* Password for PAP */ variable
568 struct passwd *pw;
H A Dauth.c134 /* Set if we got the contents of passwd[] from the pap-secrets file. */
147 int (*pap_auth_hook) __P((char *user, char *passwd, char **msgp,
155 int (*pap_passwd_hook) __P((char *user, char *passwd)) = NULL;
179 bool uselogin = 0; /* Use /etc/passwd for checking PAP */
277 { "password", o_string, passwd,
332 || fgets(passwd, MAXSECRETLEN - 1, ufile) == NULL){
342 l = strlen(passwd);
343 if (l > 0 && passwd[l-1] == '\n')
344 passwd[l-1] = '\0';
592 if (passwd[
1079 char passwd[256], user[256]; local
[all...]
/illumos-gate/usr/src/cmd/idmap/idmap/
H A Didmap.c221 char *passwd; member in struct:__anon650
309 "a:(authentication)D:(bindDN)j:(passwd-file)",
319 "a:(authentication)D:(bindDN)j:(passwd-file):",
604 if (namemaps.passwd != NULL)
605 (void) memset(namemaps.passwd, 0, strlen(namemaps.passwd));
607 free_null(&namemaps.passwd);
621 init_nm_command(char *user, char *passwd, char *auth, char *windomain, argument
628 strcmp_null(passwd, namemaps.passwd) !
3122 flags2cred(flag_t *f, char **user, char **passwd, cmd_pos_t *pos) argument
3220 char *passwd; local
3277 char *passwd; local
[all...]
/illumos-gate/usr/src/cmd/ldap/common/
H A Dcommon.c149 fprintf( stderr, gettext(" -w passwd\tbind passwd (for simple authentication)\n") );
150 fprintf( stderr, gettext(" -w - \tprompt for bind passwd (for simple authentication)\n") );
151 fprintf( stderr, gettext(" -j file\tread bind passwd (for simple authentication)\n") );
214 static char *passwd = NULL; variable
603 passwd = strdup( optarg );
759 passwd = NULL;
767 passwd = strdup(pbuf);
772 passwd = getpassphrase(password_string);
775 passwd
1441 ldaptool_simple_bind_s( LDAP *ld, const char *dn, const char *passwd, LDAPControl **serverctrls, LDAPControl **clientctrls, char *msg ) argument
[all...]
/illumos-gate/usr/src/uts/common/inet/tcp/
H A Dtcp.c3644 uint8_t passwd[PASSWD_SIZE]; member in struct:__anon4816
3665 bcopy(&cpu_list->cpu_type_info, &tcp_iss_cookie.passwd,
3671 bcopy(phrase, &tcp_iss_cookie.passwd, min(PASSWD_SIZE, len));
/illumos-gate/usr/src/lib/krb5/kdb/
H A Dkdb5.c1775 char *passwd,
1798 passwd,
1771 krb5_dbe_cpw(krb5_context kcontext, krb5_keyblock * master_key, krb5_key_salt_tuple * ks_tuple, int ks_tuple_count, char *passwd, int new_kvno, krb5_boolean keepold, krb5_db_entry * db_entry) argument
/illumos-gate/usr/src/lib/smbsrv/libmlsvc/common/
H A Dsrvsvc_svc.c2599 uint8_t *passwd; local
2605 passwd = (uint8_t *)NDR_STRDUP(mxa, empty_string);
2608 if (!netname || !comment || !passwd || !path)
2633 info2[i].shi2_passwd = passwd;
2653 info502[i].shi502_passwd = passwd;
2685 struct passwd pw;
/illumos-gate/usr/src/lib/libslp/clib/
H A Dslp_ami.h673 char *passwd; /* const */ member in struct:ami_des_keygen_param_t
/illumos-gate/usr/src/lib/sasl_plugins/digestmd5/
H A Ddigestmd5.c3245 * H_URP = H({ username-value,":",realm-value,":",passwd}) sec->data
3263 * A1 = { H( { username-value, ":", realm-value, ":", passwd } ),
3479 * The "username-value", "realm-value" and "passwd" are encoded according
3481 * present, and all the characters of either "username-value" or "passwd"
3855 sasl_secret_t * passwd,
3865 if(!username || !cnonce || !nonce || !ncvalue || !digesturi || !passwd) {
3884 passwd,
3846 calculate_response(context_t * text, const sasl_utils_t * utils, unsigned char *username, unsigned char *realm, unsigned char *nonce, unsigned int ncvalue, unsigned char *cnonce, char *qop, unsigned char *digesturi, sasl_secret_t * passwd, unsigned char *authorization_id, char **response_value) argument
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/include/
H A Dkrb5.h1270 krb5_data *passwd; member in struct:_passwd_phrase_element

Completed in 1146 milliseconds

123