/illumos-gate/usr/src/lib/libsldap/common/ |
H A D | ns_connect.c | 489 if (cred->cred.unix_cred.passwd) 490 (void) fprintf(fp, "tid= %d: passwd=%s\n", 491 t, cred->cred.unix_cred.passwd); 1626 if (AdminCred == NULL || AdminCred->passwd == NULL) { 1631 modparamVal = dvalue(AdminCred->passwd); 1658 (*authp)->cred.unix_cred.passwd = modparamVal; 1974 * a flag indicating this function should fail if the passwd 2340 char *binddn, *passwd, errstr[MAXERROR], *errmsg; local 2348 passwd = auth->cred.unix_cred.passwd; 2438 char *binddn, *passwd, *digest_md5_name, local [all...] |
H A D | ns_sldap.h | 149 char *passwd; /* password */ member in struct:UnixCred 154 char *passwd; /* password */ member in struct:CertCred 463 #define NS_LDAP_TYPE_PASSWD "passwd"
|
H A D | ns_internal.h | 727 char *passwd; member in struct:ns_sasl_cb_param
|
/illumos-gate/usr/src/lib/libsmbfs/smb/ |
H A D | ctx.c | 517 /* may have [[domain;]user[:passwd]] */ 753 smb_ctx_setpassword(struct smb_ctx *ctx, const char *passwd, int from_cmd) argument 757 if (passwd == NULL) 759 if (strlen(passwd) >= sizeof (ctx->ct_password)) { 773 if (strncmp(passwd, "$$1", 3) == 0) 774 (void) smb_simpledecrypt(ctx->ct_password, passwd); 776 strlcpy(ctx->ct_password, passwd, 875 struct passwd pw; 1501 struct passwd pw;
|
/illumos-gate/usr/src/lib/libpkg/common/ |
H A D | keystore.c | 360 * passwd - Password used to decrypt keystore 497 * passwd - Password used to encrypt keystore 1848 char *passwd; local 1854 passwd = ""; 1856 passwd = NULL; 1877 passwd = xstrdup(passbuf); 1879 keystore->passphrase = passwd; 1889 * passwd - password used to encrypt keystore
|
H A D | pkgweb.c | 1819 * passwd - password used to encrypt certs 1826 char *passwd) 1868 if ((p12 = sunw_PKCS12_create(passwd, NULL, NULL, cacerts)) == NULL) { 3219 /* first newline found is end of passwd, so nuke it */ 3232 /* unable to collect passwd from given source */ 1825 write_ca_file(PKG_ERR *err, char *tmpdir, STACK_OF(X509) *cacerts, char *passwd) argument
|
/illumos-gate/usr/src/lib/libldap5/sources/ldap/common/ |
H A D | digest_md5.c | 600 const char *passwd, 611 if (challenge == NULL || username == NULL || passwd == NULL) { 642 passwd, 0, 0, hash_pass), 597 ldap_digest_md5_encode( const char *challenge, const char *username, const char *passwd, char **digest ) argument
|
/illumos-gate/usr/src/cmd/keyserv/ |
H A D | keyserv.c | 552 char *passwd; local 571 passwd = getpass("root password:"); 572 passwd2des(passwd, master); 573 if (!getsecretkey(name, secret, passwd)) { 588 retval = storeotherrootkeys(fp, name, passwd, secret);
|
H A D | setkey.c | 574 storeotherrootkeys(FILE *fp, char *netname, char *passwd, char *osecret) argument 583 netname, passwd)); 584 passwd2des_g(passwd, netname, strlen(netname), &master, FALSE); 599 passwd)) {
|
/illumos-gate/usr/src/cmd/passwd/ |
H A D | passwd.c | 33 * passwd is a program whose sole purpose is to manage 73 #define MFLAG 0x004 /* set max field -- # of days passwd is valid */ 80 #define WFLAG 0x100 /* warn user to change passwd */ 145 #define MSG_SORRY "%s: Sorry, wrong passwd\n" 157 #define PASSWD "/etc/passwd" 277 struct passwd *pass = getpwuid(uid); 286 * If flag is zero, change passwd. 297 if (pam_start("passwd", usrname, &pam_conv, &pamh) != PAM_SUCCESS) { 1244 char *passwd; local 1251 passwd [all...] |
/illumos-gate/usr/src/cmd/rmformat/ |
H A D | rmf_misc.c | 150 char passwd[256], re_passwd[256]; local 185 buf = fgets(passwd, (size_t)256, in); 191 len = strlen(passwd); 209 if ((buf == NULL) || strcmp(passwd, re_passwd)) { 217 (void) strncpy(wp->sm_passwd, passwd, wp->sm_passwd_len);
|
/illumos-gate/usr/src/cmd/cmd-inet/usr.bin/pppd/ |
H A D | options.c | 97 char passwd[MAXSECRETLEN]; /* Password for PAP */ variable 568 struct passwd *pw;
|
H A D | auth.c | 134 /* Set if we got the contents of passwd[] from the pap-secrets file. */ 147 int (*pap_auth_hook) __P((char *user, char *passwd, char **msgp, 155 int (*pap_passwd_hook) __P((char *user, char *passwd)) = NULL; 179 bool uselogin = 0; /* Use /etc/passwd for checking PAP */ 277 { "password", o_string, passwd, 332 || fgets(passwd, MAXSECRETLEN - 1, ufile) == NULL){ 342 l = strlen(passwd); 343 if (l > 0 && passwd[l-1] == '\n') 344 passwd[l-1] = '\0'; 592 if (passwd[ 1079 char passwd[256], user[256]; local [all...] |
/illumos-gate/usr/src/cmd/idmap/idmap/ |
H A D | idmap.c | 221 char *passwd; member in struct:__anon650 309 "a:(authentication)D:(bindDN)j:(passwd-file)", 319 "a:(authentication)D:(bindDN)j:(passwd-file):", 604 if (namemaps.passwd != NULL) 605 (void) memset(namemaps.passwd, 0, strlen(namemaps.passwd)); 607 free_null(&namemaps.passwd); 621 init_nm_command(char *user, char *passwd, char *auth, char *windomain, argument 628 strcmp_null(passwd, namemaps.passwd) ! 3122 flags2cred(flag_t *f, char **user, char **passwd, cmd_pos_t *pos) argument 3220 char *passwd; local 3277 char *passwd; local [all...] |
/illumos-gate/usr/src/cmd/ldap/common/ |
H A D | common.c | 149 fprintf( stderr, gettext(" -w passwd\tbind passwd (for simple authentication)\n") ); 150 fprintf( stderr, gettext(" -w - \tprompt for bind passwd (for simple authentication)\n") ); 151 fprintf( stderr, gettext(" -j file\tread bind passwd (for simple authentication)\n") ); 214 static char *passwd = NULL; variable 603 passwd = strdup( optarg ); 759 passwd = NULL; 767 passwd = strdup(pbuf); 772 passwd = getpassphrase(password_string); 775 passwd 1441 ldaptool_simple_bind_s( LDAP *ld, const char *dn, const char *passwd, LDAPControl **serverctrls, LDAPControl **clientctrls, char *msg ) argument [all...] |
/illumos-gate/usr/src/uts/common/inet/tcp/ |
H A D | tcp.c | 3644 uint8_t passwd[PASSWD_SIZE]; member in struct:__anon4816 3665 bcopy(&cpu_list->cpu_type_info, &tcp_iss_cookie.passwd, 3671 bcopy(phrase, &tcp_iss_cookie.passwd, min(PASSWD_SIZE, len));
|
/illumos-gate/usr/src/lib/krb5/kdb/ |
H A D | kdb5.c | 1775 char *passwd, 1798 passwd, 1771 krb5_dbe_cpw(krb5_context kcontext, krb5_keyblock * master_key, krb5_key_salt_tuple * ks_tuple, int ks_tuple_count, char *passwd, int new_kvno, krb5_boolean keepold, krb5_db_entry * db_entry) argument
|
/illumos-gate/usr/src/lib/smbsrv/libmlsvc/common/ |
H A D | srvsvc_svc.c | 2599 uint8_t *passwd; local 2605 passwd = (uint8_t *)NDR_STRDUP(mxa, empty_string); 2608 if (!netname || !comment || !passwd || !path) 2633 info2[i].shi2_passwd = passwd; 2653 info502[i].shi502_passwd = passwd; 2685 struct passwd pw;
|
/illumos-gate/usr/src/lib/libslp/clib/ |
H A D | slp_ami.h | 673 char *passwd; /* const */ member in struct:ami_des_keygen_param_t
|
/illumos-gate/usr/src/lib/sasl_plugins/digestmd5/ |
H A D | digestmd5.c | 3245 * H_URP = H({ username-value,":",realm-value,":",passwd}) sec->data 3263 * A1 = { H( { username-value, ":", realm-value, ":", passwd } ), 3479 * The "username-value", "realm-value" and "passwd" are encoded according 3481 * present, and all the characters of either "username-value" or "passwd" 3855 sasl_secret_t * passwd, 3865 if(!username || !cnonce || !nonce || !ncvalue || !digesturi || !passwd) { 3884 passwd, 3846 calculate_response(context_t * text, const sasl_utils_t * utils, unsigned char *username, unsigned char *realm, unsigned char *nonce, unsigned int ncvalue, unsigned char *cnonce, char *qop, unsigned char *digesturi, sasl_secret_t * passwd, unsigned char *authorization_id, char **response_value) argument
|
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/include/ |
H A D | krb5.h | 1270 krb5_data *passwd; member in struct:_passwd_phrase_element
|