Searched refs:password (Results 1 - 25 of 107) sorted by relevance

12345

/illumos-gate/usr/src/lib/pam_modules/authtok_check/
H A Dfascist.c29 /* attempt reverse engineering of password strings */
390 char *password; local
397 password = rpassword;
399 (void) strcpy(password, Lowercase(password));
400 (void) Trim(password);
404 * since password cannot be longer than TRUNCSTRINGSIZE;
411 if (!(a = Mangle(password, r_destructors[i]))) {
420 (void) strlcpy(password, Reverse(password), PATH_MA
437 DictCheck(char *password, char *path) argument
[all...]
/illumos-gate/usr/src/lib/libbc/inc/include/rpcsvc/
H A Dpwdnm.h35 char *password; member in struct:pwdnm
/illumos-gate/usr/src/cmd/krb5/kadmin/kpasswd/
H A Dkpasswd.h38 long read_old_password(krb5_context context, char *password,
41 long read_new_password(void *server_handle, char *password,
H A Dtty_kpasswd.c58 long read_old_password(context, password, pwsize)
60 char *password;
65 0, password, pwsize);
69 long read_new_password(server_handle, password, pwsize, msg_ret, msg_len, princ)
71 char *password;
H A Dkpasswd.c59 * Purpose: Initialize and call lower level routines to change a password
65 * read_old_password (f) function to read old password
66 * read_new_password (f) function to read new and change password
73 * 2 old password wrong
76 * 5 password not typed
85 * If argc is 2, the password for the principal specified in argv[1]
89 * read_old_password is then called to prompt for the old password.
92 * read_new_password is called to read the new password and change the
93 * principal's password (presumably ovsec_kadm_chpass_principal).
98 * Changes the principal's password
113 char password[255]; /* I don't really like 255 but that's what kinit uses */ local
[all...]
/illumos-gate/usr/src/lib/libbc/libc/gen/common/
H A Dgrpauth.c38 * password.adjunct file on the system since they do not exist anymore.
45 grpauth(char *name, char *password) argument
49 * this routine authenticates a password for the named user.
58 /* group is not in main password system */
67 if (strcmp(crypt(password, gr.gr_passwd), gr.gr_passwd) == 0)
H A Dpwdauth.c37 * password.adjunct file on the system since they do not exist anymore.
44 pwdauth(char *name, char *password) argument
47 * this routine authenticates a password for the named user.
62 /* user is not in main password system */
70 if (strcmp(crypt(password, enpwp), enpwp) == 0)
H A Dpwdnm.c41 if (! xdr_wrapstring(xdrs, &objp->password)) {
/illumos-gate/usr/src/grub/grub-0.97/util/
H A Dgrub-md5-crypt.in3 # Encrypt a password in MD5 format
35 Encrypt a password in MD5 format.
67 # Prompt to enter a password.
69 read -r password
73 echo -n "Retype password: "
80 if test "x$password" = x; then
81 echo "Empty password is not permitted."
85 if test "x$password" != "x$password2"; then
94 $password
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/crypto/des/
H A Dafsstring2key.c102 unsigned char password[9]; /* trailing nul for crypt() */ local
105 memset (password, 0, sizeof (password));
106 memcpy (password, realm, min (salt->length, 8));
108 if (isupper(password[i]))
109 password[i] = tolower(password[i]);
111 password[i] ^= data->data[i];
113 if (password[i] == '\0')
114 password[
135 unsigned char *password = malloc(pw_len+1); local
[all...]
/illumos-gate/usr/src/boot/sys/boot/forth/
H A DMakefile5 check-password.4th.8 \
/illumos-gate/usr/src/lib/pam_modules/ldap/
H A Dldap_authenticate.c59 char *password = NULL; local
95 /* Get the password entered in the first scheme if any */
96 (void) pam_get_item(pamh, PAM_AUTHTOK, (void **) &password);
97 if (password == NULL) {
106 * Authenticate user using the password from PAM_AUTHTOK.
107 * If no password available or if authentication fails
110 result = authenticate(&credp, user, password, NULL);
114 * user's password is good but needs
118 * password after the account management
120 * the password ha
[all...]
/illumos-gate/usr/src/lib/print/libpapi-common/common/
H A Duri.h40 * scheme://[[user[:password]@]host[:port]]/path[[#fragment]|[?query]]
46 char *password; member in struct:__anon4324
H A Duri.c41 * scheme://[[user[:password]@]host[:port]]/path[[#fragment]|[?query]]
93 char *password = NULL; local
95 for (password = user; (password < host - 1); password++)
96 if (*password == ':') {
97 u->password = strndup(password + 1,
98 host - password - 2);
101 u->user = strndup(user, password
[all...]
/illumos-gate/usr/src/lib/sasl_plugins/login/
H A Dlogin.c164 /* demand password */
174 sasl_secret_t *password; local
189 /* get password */
190 password =
192 if (!password) {
197 strncpy((char *)password->data, clientin, clientinlen);
198 password->data[clientinlen] = '\0';
199 password->len = clientinlen;
201 /* canonicalize username first, so that password verification is
207 _plug_free_secret(params->utils, &password);
311 sasl_secret_t *password; member in struct:client_context
[all...]
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/mech/
H A Dacquire_cred_with_pw.c97 acquire_accept_cred_with_pw(context, minor_status, desired_name, password, cred)
101 const gss_buffer_t password;
112 acquire_init_cred_with_pw(context, minor_status, desired_name, password, cred)
116 const gss_buffer_t password;
127 if (password == NULL || password->length == NULL ||
128 password->value == NULL)
130 else if (*((char *)password->value + (password->length - 1)) == '\0')
131 pw = strdup(password
[all...]
/illumos-gate/usr/src/lib/pam_modules/dial_auth/
H A Ddial_auth.c64 char *password = NULL; local
154 dgettext(TEXT_DOMAIN, "Dialup Password: "), &password);
160 if (strcmp(crypt(password, p2), p2) != 0) {
161 (void) memset(password, 0, strlen(password));
162 free(password);
165 (void) memset(password, 0, strlen(password));
166 free(password);
/illumos-gate/usr/src/lib/krb5/kadm5/srv/
H A Dserver_misc.c120 /* Check word to see if it's the password */
138 char *password, int use_policy, kadm5_policy_ent_t pol,
153 if(strlen(password) < pol->pw_min_length)
155 s = password;
177 if((find_word(password) == KADM5_OK))
182 if (strcasecmp(cp, password) == 0)
186 if (strcasecmp(cp, password) == 0)
191 if (str_check_gecos(ent->pw_gecos, password))
198 if (strlen(password) < 1)
137 passwd_check(kadm5_server_handle_t handle, char *password, int use_policy, kadm5_policy_ent_t pol, krb5_principal principal) argument
/illumos-gate/usr/src/lib/libsmbfs/netsmb/
H A Dsmb_keychain.h49 /* Add a password to the keychain. */
51 const char *password);
57 /* Delete a password from the keychain. */
/illumos-gate/usr/src/lib/krb5/plugins/kdb/ldap/libkdb_ldap/
H A Dldap_service_stash.c45 krb5_ldap_readpassword(context, ldap_context, password)
48 unsigned char **password;
56 *password = NULL;
127 /* password field missing */
133 /* Extract the plain password / certificate file information */
139 /* Set *password = {FILE}<path to cert>\0<cert password> */
142 *password = (unsigned char *)malloc(strlen(start) + 2);
143 if (*password == NULL) {
147 (*password)[strle
[all...]
/illumos-gate/usr/src/lib/pam_modules/sample/
H A Dsample_authenticate.c50 * first_pass_good (first password is always good when used with use/try)
51 * first_pass_bad (first password is always bad when used with use/try)
52 * pass=foobar (set good password to "foobar". default good password
83 char *firstpass, *password; local
138 * Get the password from the user
156 password = ret_resp->resp;
158 if (password == NULL) {
165 if (strncmp(password, the_password, strlen(the_password)) == 0) {
168 /* this is the first password, stas
[all...]
/illumos-gate/usr/src/lib/print/libpapi-dynamic/common/
H A Dservice.c197 char *password = svc->password; local
202 /* if no API password, try the URI password */
203 if ((password == NULL) && (svc->uri != NULL))
204 password = (svc->uri)->password;
206 result = f(&svc->svc_handle, svc->name, user, password,
219 char *password,
238 if (password !
218 papiServiceCreate(papi_service_t *handle, char *service_name, char *user_name, char *password, int (*authCB)(papi_service_t svc, void *app_data), papi_encryption_t encryption, void *app_data) argument
334 papiServiceSetPassword(papi_service_t handle, char *password) argument
[all...]
/illumos-gate/usr/src/lib/pam_modules/passwd_auth/
H A Dpasswd_auth.c69 char *password; local
115 res = pam_get_item(pamh, PAM_AUTHTOK, (void **)&password);
119 if (password != NULL)
174 * The password prompt differs between users updating their
175 * own password, and users updating other an user's password
183 dgettext(TEXT_DOMAIN, "Enter %s's password: "),
191 dgettext(TEXT_DOMAIN, "Enter existing login password: "));
195 &password);
199 if (password
[all...]
/illumos-gate/usr/src/lib/print/libpapi-ipp/common/
H A Dservice.c125 char *user_name, char *password,
142 if (password != NULL)
143 svc->password = strdup(password);
178 if (svc->password != NULL)
179 free(svc->password);
211 papiServiceSetPassword(papi_service_t handle, char *password) argument
218 if (svc->password != NULL)
219 free(svc->password);
220 svc->password
124 papiServiceCreate(papi_service_t *handle, char *service_name, char *user_name, char *password, int (*authCB)(papi_service_t svc, void *app_data), papi_encryption_t encryption, void *app_data) argument
[all...]
/illumos-gate/usr/src/lib/pam_modules/krb5/
H A Dutils.h56 char *password; member in struct:__anon4258

Completed in 97 milliseconds

12345