/dovecot/src/auth/ |
H A D | db-passwd-file.c | 29 passwd_file_add(struct passwd_file *pw, const char *username, argument 38 if (hash_table_lookup(pw->users, username) != NULL) { 40 pw->path, username); 44 pu = p_new(pw->pool, struct passwd_user, 1); 45 user = p_strdup(pw->pool, username); 57 pu->password = p_strconcat(pw->pool, "{PLAIN-MD5}", 60 pu->password = p_strconcat(pw->pool, "{DIGEST-MD5}", 65 pw->path, username); 69 pu->password = p_strconcat(pw->pool, "{CRYPT}", 73 pu->password = p_strdup(pw 154 struct passwd_file *pw; local 166 passwd_file_open(struct passwd_file *pw, bool startup, const char **error_r) argument 235 passwd_file_close(struct passwd_file *pw) argument 244 passwd_file_free(struct passwd_file *pw) argument 254 passwd_file_sync(struct auth_request *request, struct passwd_file *pw) argument 433 struct passwd_file *pw; local [all...] |
H A D | passdb-passwd.c | 45 struct passwd pw; local 49 res = passwd_lookup(request, &pw); 55 ret = auth_request_password_verify(request, password, pw.pw_passwd, 59 safe_memset(pw.pw_passwd, 0, strlen(pw.pw_passwd)); 67 auth_request_set_field(request, "user", pw.pw_name, NULL); 76 struct passwd pw; local 79 res = passwd_lookup(request, &pw); 85 auth_request_set_field(request, "user", pw.pw_name, NULL); 86 passdb_handle_credentials(PASSDB_RESULT_OK, pw [all...] |
H A D | password-scheme-md5crypt.c | 49 const char *password_generate_md5_crypt(const char *pw, const char *salt) argument 57 size_t pw_len = strlen(pw); 76 md5_update(&ctx,pw,pw_len); 84 /* Then just as many characters of the MD5(pw,salt,pw) */ 86 md5_update(&ctx1,pw,pw_len); 88 md5_update(&ctx1,pw,pw_len); 101 md5_update(&ctx, pw+j, 1); 119 md5_update(&ctx1,pw,pw_len); 127 md5_update(&ctx1,pw,pw_le [all...] |
H A D | passdb-bsdauth.c | 20 struct passwd pw; local 26 switch (i_getpwnam(request->user, &pw)) { 44 safe_memset(pw.pw_passwd, 0, strlen(pw.pw_passwd)); 53 auth_request_set_field(request, "user", pw.pw_name, NULL);
|
H A D | password-scheme-otp.c | 15 int password_generate_otp(const char *pw, const char *state_data, argument 37 otp_hash(state.algo, state.seed, pw, state.seq, state.hash);
|
H A D | password-scheme-rpa.c | 28 void password_generate_rpa(const char *pw, unsigned char result[]) argument 33 ucs2be_pw = ucs2be_str(unsafe_data_stack_pool, pw, &size);
|
H A D | userdb-passwd.c | 85 struct passwd pw; local 94 ret = i_getpwnam(auth_request->user, &pw); 110 auth_request_set_field(auth_request, "user", pw.pw_name, NULL); 113 pw.pw_name); 114 auth_request_set_userdb_field(auth_request, "uid", dec2str(pw.pw_uid)); 115 auth_request_set_userdb_field(auth_request, "gid", dec2str(pw.pw_gid)); 116 auth_request_set_userdb_field(auth_request, "home", pw.pw_dir); 145 passwd_iterate_want_pw(struct passwd *pw, const struct auth_settings *set) argument 149 if (pw->pw_uid < (uid_t)set->first_valid_uid) 151 if (pw 165 struct passwd *pw; local [all...] |
H A D | password-scheme.h | 86 const char *password_generate_md5_crypt(const char *pw, const char *salt); 87 int password_generate_otp(const char *pw, const char *state_data, 90 void password_generate_rpa(const char *pw, unsigned char result[]);
|
H A D | userdb.c | 61 struct passwd pw; local 70 switch (i_getpwnam(str, &pw)) { 81 return pw.pw_uid;
|
H A D | auth-master-connection.c | 395 struct passwd pw; local 398 if (i_getpwuid(conn->userdb_restricted_uid, &pw) <= 0) 401 namestr = t_strdup_printf("(%s)", pw.pw_name);
|
/dovecot/src/lib/ |
H A D | home-expand.c | 12 struct passwd pw; local 30 switch (i_getpwnam(name, &pw)) { 39 home = pw.pw_dir;
|
H A D | eacces-error.c | 155 struct passwd pw; local 177 switch (i_getpwuid(geteuid(), &pw)) { 185 pw_name = t_strdup(pw.pw_name); 251 if (pw_name != NULL && i_getpwuid(st.st_uid, &pw) > 0 && 252 strcmp(pw.pw_name, pw_name) == 0) {
|
H A D | mkdir-parents.c | 66 struct passwd pw; local 68 if (i_getpwuid(uid, &pw) > 0) 69 str_printfa(str, "(%s)", pw.pw_name);
|
H A D | ioloop-notify-inotify.c | 155 struct passwd pw; local 159 if (i_getpwuid(uid, &pw) <= 0) 163 dec2str(uid), pw.pw_name);
|
H A D | restrict-access.c | 35 struct passwd pw; local 39 if (i_getpwuid(uid, &pw) <= 0) 42 ret = t_strdup_printf("%s(%s)", dec2str(uid), pw.pw_name);
|
/dovecot/src/lda/ |
H A D | main.c | 383 struct passwd pw; local 388 /* no need for a pw lookup */ 390 } else if ((ret = i_getpwuid(process_euid, &pw)) > 0) { 391 user = t_strdup(pw.pw_name); 393 env_put(t_strconcat("HOME=", pw.pw_dir, NULL));
|
/dovecot/src/plugins/mail-crypt/ |
H A D | mail-crypt-key.c | 216 const char *enc_hash = NULL, *key_hash = NULL, *pw = NULL; local 249 pw = mail_user_plugin_getenv(user, MAIL_CRYPT_USERENV_PASSWORD); 250 if (pw == NULL) { 274 bool res = dcrypt_key_load_private(&key, data, pw, dec_key, error_r); 419 const char *pw = NULL; local 431 (pw = mail_user_plugin_getenv(user,MAIL_CRYPT_USERENV_PASSWORD)) 438 pw, enc_key, error_r)) {
|
/dovecot/src/master/ |
H A D | main.c | 90 struct passwd pw; local 98 switch (i_getpwnam(user, &pw)) { 106 *uid_r = pw.pw_uid; 107 *gid_r = pw.pw_gid;
|
H A D | master-settings.c | 422 struct passwd pw; local 456 if (i_getpwnam(set->default_login_user, &pw) == 0) { 461 if (i_getpwnam(set->default_internal_user, &pw) == 0) {
|
/dovecot/src/lib-storage/ |
H A D | mail-storage-service.c | 359 struct passwd pw; local 364 switch (i_getpwnam(str, &pw)) { 372 *uid_r = pw.pw_uid;
|