/illumos-gate/usr/src/lib/pam_modules/authtok_check/ |
H A D | fascist.c | 29 /* attempt reverse engineering of password strings */ 390 char *password; local 397 password = rpassword; 399 (void) strcpy(password, Lowercase(password)); 400 (void) Trim(password); 404 * since password cannot be longer than TRUNCSTRINGSIZE; 411 if (!(a = Mangle(password, r_destructors[i]))) { 420 (void) strlcpy(password, Reverse(password), PATH_MA 437 DictCheck(char *password, char *path) argument [all...] |
/illumos-gate/usr/src/lib/libbc/inc/include/rpcsvc/ |
H A D | pwdnm.h | 35 char *password; member in struct:pwdnm
|
/illumos-gate/usr/src/cmd/krb5/kadmin/kpasswd/ |
H A D | kpasswd.h | 38 long read_old_password(krb5_context context, char *password, 41 long read_new_password(void *server_handle, char *password,
|
H A D | tty_kpasswd.c | 58 long read_old_password(context, password, pwsize) 60 char *password; 65 0, password, pwsize); 69 long read_new_password(server_handle, password, pwsize, msg_ret, msg_len, princ) 71 char *password;
|
H A D | kpasswd.c | 59 * Purpose: Initialize and call lower level routines to change a password 65 * read_old_password (f) function to read old password 66 * read_new_password (f) function to read new and change password 73 * 2 old password wrong 76 * 5 password not typed 85 * If argc is 2, the password for the principal specified in argv[1] 89 * read_old_password is then called to prompt for the old password. 92 * read_new_password is called to read the new password and change the 93 * principal's password (presumably ovsec_kadm_chpass_principal). 98 * Changes the principal's password 113 char password[255]; /* I don't really like 255 but that's what kinit uses */ local [all...] |
/illumos-gate/usr/src/lib/libbc/libc/gen/common/ |
H A D | grpauth.c | 38 * password.adjunct file on the system since they do not exist anymore. 45 grpauth(char *name, char *password) argument 49 * this routine authenticates a password for the named user. 58 /* group is not in main password system */ 67 if (strcmp(crypt(password, gr.gr_passwd), gr.gr_passwd) == 0)
|
H A D | pwdauth.c | 37 * password.adjunct file on the system since they do not exist anymore. 44 pwdauth(char *name, char *password) argument 47 * this routine authenticates a password for the named user. 62 /* user is not in main password system */ 70 if (strcmp(crypt(password, enpwp), enpwp) == 0)
|
H A D | pwdnm.c | 41 if (! xdr_wrapstring(xdrs, &objp->password)) {
|
/illumos-gate/usr/src/grub/grub-0.97/util/ |
H A D | grub-md5-crypt.in | 3 # Encrypt a password in MD5 format 35 Encrypt a password in MD5 format. 67 # Prompt to enter a password. 69 read -r password 73 echo -n "Retype password: " 80 if test "x$password" = x; then 81 echo "Empty password is not permitted." 85 if test "x$password" != "x$password2"; then 94 $password
|
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/crypto/des/ |
H A D | afsstring2key.c | 102 unsigned char password[9]; /* trailing nul for crypt() */ local 105 memset (password, 0, sizeof (password)); 106 memcpy (password, realm, min (salt->length, 8)); 108 if (isupper(password[i])) 109 password[i] = tolower(password[i]); 111 password[i] ^= data->data[i]; 113 if (password[i] == '\0') 114 password[ 135 unsigned char *password = malloc(pw_len+1); local [all...] |
/illumos-gate/usr/src/boot/sys/boot/forth/ |
H A D | Makefile | 5 check-password.4th.8 \
|
/illumos-gate/usr/src/lib/pam_modules/ldap/ |
H A D | ldap_authenticate.c | 59 char *password = NULL; local 95 /* Get the password entered in the first scheme if any */ 96 (void) pam_get_item(pamh, PAM_AUTHTOK, (void **) &password); 97 if (password == NULL) { 106 * Authenticate user using the password from PAM_AUTHTOK. 107 * If no password available or if authentication fails 110 result = authenticate(&credp, user, password, NULL); 114 * user's password is good but needs 118 * password after the account management 120 * the password ha [all...] |
/illumos-gate/usr/src/lib/print/libpapi-common/common/ |
H A D | uri.h | 40 * scheme://[[user[:password]@]host[:port]]/path[[#fragment]|[?query]] 46 char *password; member in struct:__anon4324
|
H A D | uri.c | 41 * scheme://[[user[:password]@]host[:port]]/path[[#fragment]|[?query]] 93 char *password = NULL; local 95 for (password = user; (password < host - 1); password++) 96 if (*password == ':') { 97 u->password = strndup(password + 1, 98 host - password - 2); 101 u->user = strndup(user, password [all...] |
/illumos-gate/usr/src/lib/sasl_plugins/login/ |
H A D | login.c | 164 /* demand password */ 174 sasl_secret_t *password; local 189 /* get password */ 190 password = 192 if (!password) { 197 strncpy((char *)password->data, clientin, clientinlen); 198 password->data[clientinlen] = '\0'; 199 password->len = clientinlen; 201 /* canonicalize username first, so that password verification is 207 _plug_free_secret(params->utils, &password); 311 sasl_secret_t *password; member in struct:client_context [all...] |
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/mech/ |
H A D | acquire_cred_with_pw.c | 97 acquire_accept_cred_with_pw(context, minor_status, desired_name, password, cred) 101 const gss_buffer_t password; 112 acquire_init_cred_with_pw(context, minor_status, desired_name, password, cred) 116 const gss_buffer_t password; 127 if (password == NULL || password->length == NULL || 128 password->value == NULL) 130 else if (*((char *)password->value + (password->length - 1)) == '\0') 131 pw = strdup(password [all...] |
/illumos-gate/usr/src/lib/pam_modules/dial_auth/ |
H A D | dial_auth.c | 64 char *password = NULL; local 154 dgettext(TEXT_DOMAIN, "Dialup Password: "), &password); 160 if (strcmp(crypt(password, p2), p2) != 0) { 161 (void) memset(password, 0, strlen(password)); 162 free(password); 165 (void) memset(password, 0, strlen(password)); 166 free(password);
|
/illumos-gate/usr/src/lib/krb5/kadm5/srv/ |
H A D | server_misc.c | 120 /* Check word to see if it's the password */ 138 char *password, int use_policy, kadm5_policy_ent_t pol, 153 if(strlen(password) < pol->pw_min_length) 155 s = password; 177 if((find_word(password) == KADM5_OK)) 182 if (strcasecmp(cp, password) == 0) 186 if (strcasecmp(cp, password) == 0) 191 if (str_check_gecos(ent->pw_gecos, password)) 198 if (strlen(password) < 1) 137 passwd_check(kadm5_server_handle_t handle, char *password, int use_policy, kadm5_policy_ent_t pol, krb5_principal principal) argument
|
/illumos-gate/usr/src/lib/libsmbfs/netsmb/ |
H A D | smb_keychain.h | 49 /* Add a password to the keychain. */ 51 const char *password); 57 /* Delete a password from the keychain. */
|
/illumos-gate/usr/src/lib/krb5/plugins/kdb/ldap/libkdb_ldap/ |
H A D | ldap_service_stash.c | 45 krb5_ldap_readpassword(context, ldap_context, password) 48 unsigned char **password; 56 *password = NULL; 127 /* password field missing */ 133 /* Extract the plain password / certificate file information */ 139 /* Set *password = {FILE}<path to cert>\0<cert password> */ 142 *password = (unsigned char *)malloc(strlen(start) + 2); 143 if (*password == NULL) { 147 (*password)[strle [all...] |
/illumos-gate/usr/src/lib/pam_modules/sample/ |
H A D | sample_authenticate.c | 50 * first_pass_good (first password is always good when used with use/try) 51 * first_pass_bad (first password is always bad when used with use/try) 52 * pass=foobar (set good password to "foobar". default good password 83 char *firstpass, *password; local 138 * Get the password from the user 156 password = ret_resp->resp; 158 if (password == NULL) { 165 if (strncmp(password, the_password, strlen(the_password)) == 0) { 168 /* this is the first password, stas [all...] |
/illumos-gate/usr/src/lib/print/libpapi-dynamic/common/ |
H A D | service.c | 197 char *password = svc->password; local 202 /* if no API password, try the URI password */ 203 if ((password == NULL) && (svc->uri != NULL)) 204 password = (svc->uri)->password; 206 result = f(&svc->svc_handle, svc->name, user, password, 219 char *password, 238 if (password ! 218 papiServiceCreate(papi_service_t *handle, char *service_name, char *user_name, char *password, int (*authCB)(papi_service_t svc, void *app_data), papi_encryption_t encryption, void *app_data) argument 334 papiServiceSetPassword(papi_service_t handle, char *password) argument [all...] |
/illumos-gate/usr/src/lib/pam_modules/passwd_auth/ |
H A D | passwd_auth.c | 69 char *password; local 115 res = pam_get_item(pamh, PAM_AUTHTOK, (void **)&password); 119 if (password != NULL) 174 * The password prompt differs between users updating their 175 * own password, and users updating other an user's password 183 dgettext(TEXT_DOMAIN, "Enter %s's password: "), 191 dgettext(TEXT_DOMAIN, "Enter existing login password: ")); 195 &password); 199 if (password [all...] |
/illumos-gate/usr/src/lib/print/libpapi-ipp/common/ |
H A D | service.c | 125 char *user_name, char *password, 142 if (password != NULL) 143 svc->password = strdup(password); 178 if (svc->password != NULL) 179 free(svc->password); 211 papiServiceSetPassword(papi_service_t handle, char *password) argument 218 if (svc->password != NULL) 219 free(svc->password); 220 svc->password 124 papiServiceCreate(papi_service_t *handle, char *service_name, char *user_name, char *password, int (*authCB)(papi_service_t svc, void *app_data), papi_encryption_t encryption, void *app_data) argument [all...] |
/illumos-gate/usr/src/lib/pam_modules/krb5/ |
H A D | utils.h | 56 char *password; member in struct:__anon4258
|