/illumos-gate/usr/src/lib/krb5/kadm5/ |
H A D | chpass_util.c | 69 * msg_ret (output) a useful message is copied here. 76 * A msg_ret should point to a buffer large enough for the messasge. 90 char *msg_ret, 126 (void) strncpy(msg_ret, string_text(CHPASS_UTIL_NEW_PASSWORD_MISMATCH), 128 msg_ret[msg_len - 1] = '\0'; 131 (void) strncpy(msg_ret, error_message(code), msg_len - 1); 132 (void) strncat(msg_ret, " ", msg_len - 1); 133 (void) strncat(msg_ret, string_text(CHPASS_UTIL_WHILE_READING_PASSWORD), 135 (void) strncat(msg_ret, string_text(CHPASS_UTIL_PASSWORD_NOT_CHANGED), 137 msg_ret[msg_le 85 _kadm5_chpass_principal_util(void *server_handle, void *lhandle, krb5_principal princ, char *new_pw, char **ret_pw, char *msg_ret, unsigned int msg_len) argument [all...] |
H A D | admin_internal.h | 93 char *msg_ret,
|
H A D | admin.h | 437 char *msg_ret, 566 char *msg_ret, 780 char *msg_ret);
|
/illumos-gate/usr/src/lib/krb5/kadm5/clnt/ |
H A D | clnt_chpass_util.c | 28 char *msg_ret, 35 new_pw, ret_pw, msg_ret, msg_len); 24 kadm5_chpass_principal_util(void *server_handle, krb5_principal princ, char *new_pw, char **ret_pw, char *msg_ret, unsigned int msg_len) argument
|
/illumos-gate/usr/src/lib/krb5/kadm5/srv/ |
H A D | svr_chpass_util.c | 31 char *msg_ret, 38 new_pw, ret_pw, msg_ret, msg_len); 27 kadm5_chpass_principal_util(void *server_handle, krb5_principal princ, char *new_pw, char **ret_pw, char *msg_ret, unsigned int msg_len) argument
|
H A D | svr_principal.c | 2204 char *msg_ret, unsigned int msg_len) 2212 if (msg_ret != NULL) 2213 *msg_ret = '\0'; 2231 if (msg_ret != NULL) { 2245 sprintf(msg_ret, errstr, time_string); 2203 kadm5_check_min_life(void *server_handle, krb5_principal principal, char *msg_ret, unsigned int msg_len) argument
|
/illumos-gate/usr/src/cmd/krb5/kadmin/kpasswd/ |
H A D | kpasswd.h | 42 unsigned int *pwsize, char *msg_ret,
|
H A D | tty_kpasswd.c | 69 long read_new_password(server_handle, password, pwsize, msg_ret, msg_len, princ) 73 char *msg_ret; 79 msg_ret, msg_len));
|
H A D | kpasswd.c | 114 char msg_ret[1024], admin_realm[1024]; local 334 code = read_new_password(server_handle, password, &pwsize, msg_ret, sizeof (msg_ret), princ); 338 com_err(whoami, 0, msg_ret);
|
/illumos-gate/usr/src/cmd/krb5/kadmin/server/ |
H A D | misc.c | 124 char *msg_ret, unsigned int msg_len) 129 ret = kadm5_check_min_life(server_handle, princ, msg_ret, msg_len); 135 msg_ret, msg_len); 122 schpw_util_wrapper(void *server_handle, krb5_principal princ, char *new_pw, char **ret_pw, char *msg_ret, unsigned int msg_len) argument
|
H A D | misc.h | 55 char *msg_ret, unsigned int msg_len);
|
/illumos-gate/usr/src/lib/pam_modules/krb5/ |
H A D | krb5_password.c | 429 char msg_ret[1024], admin_realm[1024]; local 489 msg_ret, 490 sizeof (msg_ret)); 498 (void) snprintf(msgs[1], PAM_MAX_MSG_SIZE, "%s", msg_ret);
|
/illumos-gate/usr/src/uts/common/io/ib/clients/iser/ |
H A D | iser_ib.c | 768 int rq_space, msg_ret; local 818 msg = iser_msg_get(hca, rq_space, &msg_ret); 840 if (msg_ret != rq_space) { 843 rq_space, msg_ret); 845 rq_space = msg_ret;
|