Searched defs:passwd (Results 1 - 25 of 71) sorted by last modified time

123

/illumos-gate/usr/src/lib/smbsrv/libsmb/common/
H A Dsmb_auth.c379 unsigned char *passwd,
395 clnt_blob = &passwd[SMBAUTH_HASH_SZ];
434 ok = (bcmp(passwd, ntlmv2_resp, pwdlen) == 0);
455 unsigned char *passwd,
466 clnt_challenge = &passwd[SMBAUTH_HASH_SZ];
500 ok = (bcmp(passwd, lmv2_resp, SMBAUTH_LM_RESP_SZ) == 0);
376 smb_ntlmv2_password_ok( unsigned char *challenge, unsigned char *ntlm_hash, unsigned char *passwd, int pwdlen, char *domain, char *username, uchar_t *session_key) argument
452 smb_lmv2_password_ok( unsigned char *srv_challenge, unsigned char *ntlm_hash, unsigned char *passwd, char *domain, char *username) argument
H A Dsmb_info.c58 uint8_t passwd[SMBAUTH_HASH_SZ]; member in struct:__anon212
372 smb_set_machine_passwd(char *passwd) argument
377 if (smb_config_set(SMB_CI_MACHINE_PASSWD, passwd) != SMBD_SMF_OK)
421 rc = smb_get_machine_passwd(ipc_info.passwd, SMBAUTH_HASH_SZ);
423 *ipc_info.passwd = 0;
438 (void) memcpy(ipc_info.passwd, passwd_hash, SMBAUTH_HASH_SZ);
453 (void) smb_get_machine_passwd(ipc_info.passwd, SMBAUTH_HASH_SZ);
467 (void) memcpy(ipc_info.passwd, ipc_orig_info.passwd,
468 sizeof (ipc_info.passwd));
526 smb_setdomainprops(char *fqdn, char *server, char *passwd) argument
[all...]
/illumos-gate/usr/src/lib/smbsrv/libsmbns/common/
H A Dsmbns_ksetpwd.c231 smb_krb5_setpwd(krb5_context ctx, const char *fqdn, char *passwd) argument
255 code = krb5_set_password_using_ccache(ctx, cc, passwd, princ,
320 char *passwd, krb5_enctype *enctypes, int enctype_count)
349 kvno, &salt, passwd) != 0) {
318 smb_krb5_kt_populate(krb5_context ctx, const char *fqdn, krb5_principal *princs, int count, char *fname, krb5_kvno kvno, char *passwd, krb5_enctype *enctypes, int enctype_count) argument
/illumos-gate/usr/src/cmd/idmap/idmap/
H A Dnamemaps.c140 strings2cred(ns_cred_t *nsc, char *user, char *passwd, char *auth) argument
154 if (passwd != NULL) {
155 nsc->cred.unix_cred.passwd = strdup(passwd);
156 if (nsc->cred.unix_cred.passwd == NULL) {
339 if (p->nsc.cred.unix_cred.passwd != NULL) {
341 (void) memset(p->nsc.cred.unix_cred.passwd, 0,
342 strlen(p->nsc.cred.unix_cred.passwd));
343 free(p->nsc.cred.unix_cred.passwd);
356 char *user, char *passwd, cha
355 idmap_init_namemaps(idmap_nm_handle_t **adh, char *user, char *passwd, char *auth, char *windomain, int direction) argument
[all...]
/illumos-gate/usr/src/lib/smbsrv/libmlsvc/common/
H A Dsrvsvc_svc.c2599 uint8_t *passwd; local
2605 passwd = (uint8_t *)NDR_STRDUP(mxa, empty_string);
2608 if (!netname || !comment || !passwd || !path)
2633 info2[i].shi2_passwd = passwd;
2653 info502[i].shi502_passwd = passwd;
2685 struct passwd pw;
/illumos-gate/usr/src/lib/libsmbfs/smb/
H A Dctx.c517 /* may have [[domain;]user[:passwd]] */
753 smb_ctx_setpassword(struct smb_ctx *ctx, const char *passwd, int from_cmd) argument
757 if (passwd == NULL)
759 if (strlen(passwd) >= sizeof (ctx->ct_password)) {
773 if (strncmp(passwd, "$$1", 3) == 0)
774 (void) smb_simpledecrypt(ctx->ct_password, passwd);
776 strlcpy(ctx->ct_password, passwd,
875 struct passwd pw;
1501 struct passwd pw;
/illumos-gate/usr/src/head/
H A Dpwd.h48 struct passwd { struct
69 extern struct passwd *getpwuid(uid_t); /* MT-unsafe */
70 extern struct passwd *getpwnam(const char *); /* MT-unsafe */
73 extern struct passwd *getpwent_r(struct passwd *, char *, int);
74 extern struct passwd *fgetpwent_r(FILE *, struct passwd *, char *, int);
75 extern struct passwd *fgetpwent(FILE *); /* MT-unsafe */
76 extern int putpwent(const struct passwd *, FILE *);
82 extern struct passwd *getpwen
[all...]
/illumos-gate/usr/src/cmd/cmd-inet/usr.bin/pppd/
H A Doptions.c97 char passwd[MAXSECRETLEN]; /* Password for PAP */ variable
568 struct passwd *pw;
/illumos-gate/usr/src/uts/common/inet/tcp/
H A Dtcp.c3644 uint8_t passwd[PASSWD_SIZE]; member in struct:__anon4816
3665 bcopy(&cpu_list->cpu_type_info, &tcp_iss_cookie.passwd,
3671 bcopy(phrase, &tcp_iss_cookie.passwd, min(PASSWD_SIZE, len));
/illumos-gate/usr/src/lib/libnsl/key/
H A Dpublickey.c148 getkeys_nis(int *errp, char *netname, char *pkey, char *skey, char *passwd) argument
206 if (skey && extract_secret(p, skey, passwd))
228 getkeys_files(int *errp, char *netname, char *pkey, char *skey, char *passwd) argument
289 if (skey && extract_secret(p, skey, passwd))
329 getsecretkey(const char *netname, char *skey, const char *passwd) argument
332 passwd));
348 char *passwd, /* in */
357 if (!buf || !passwd || !raw || !private || !prilen ||
375 if (!xdecrypt_g(buf, keylen, algtype, passwd, netname, TRUE)) {
400 extract_secret(char *raw, char *private, char *passwd) argument
344 extract_secret_g( char *raw, char *private, int prilen, char *passwd, char *netname, keylen_t keylen, algtype_t algtype) argument
422 getkeys_ldap_g( int *err, char *netname, char *pkey, int pkeylen, char *skey, int skeylen, char *passwd, keylen_t keylen, algtype_t algtype) argument
628 getsecretkey_g( const char *netname, keylen_t keylen, algtype_t algtype, char *skey, size_t skeylen, const char *passwd) argument
[all...]
H A Dxcrypt.c75 * Encrypt a secret key given passwd
80 xencrypt(secret, passwd)
82 char *passwd;
95 (void) passwd2des(passwd, key);
109 * Decrypt secret key using passwd
114 xdecrypt(secret, passwd)
116 char *passwd;
130 (void) passwd2des(passwd, key);
224 * Encrypt a secret key given passwd.
244 const char *passwd, /* i
240 xencrypt_g( char *secret, keylen_t keylen, algtype_t algtype, const char *passwd, const char netname[], char **encrypted_secret, bool_t do_chksum) argument
345 xdecrypt_g( char *secret, int keylen, int algtype, const char *passwd, const char netname[], bool_t do_chksum) argument
[all...]
/illumos-gate/usr/src/cmd/ndmpd/ndmp/
H A Dndmpd_connect.c66 static void create_md5_digest(unsigned char *digest, char *passwd,
198 char *passwd, *dec_passwd; local
246 passwd = ndmpd_get_prop(NDMP_CLEARTEXT_PASSWORD);
247 if (!passwd || !*passwd) {
259 dec_passwd = ndmp_base64_decode(passwd);
290 passwd = ndmpd_get_prop(NDMP_CRAM_MD5_PASSWORD);
291 if (!passwd || !*passwd) {
302 dec_passwd = ndmp_base64_decode(passwd);
608 create_md5_digest(unsigned char *digest, char *passwd, unsigned char *challenge) argument
1165 char *passwd, *dec_passwd; local
1218 char *passwd, *dec_passwd; local
[all...]
/illumos-gate/usr/src/cmd/passwd/
H A DMakefile26 PROG= passwd
27 DEFAULTFILES= passwd.dfl
31 passwd := LDLIBS += $(ROOT)/usr/lib/passwdutil.so.1 macro
H A Dpasswd.c33 * passwd is a program whose sole purpose is to manage
73 #define MFLAG 0x004 /* set max field -- # of days passwd is valid */
80 #define WFLAG 0x100 /* warn user to change passwd */
145 #define MSG_SORRY "%s: Sorry, wrong passwd\n"
157 #define PASSWD "/etc/passwd"
277 struct passwd *pass = getpwuid(uid);
286 * If flag is zero, change passwd.
297 if (pam_start("passwd", usrname, &pam_conv, &pamh) != PAM_SUCCESS) {
1244 char *passwd; local
1251 passwd
[all...]
/illumos-gate/usr/src/lib/sasl_plugins/digestmd5/
H A Ddigestmd5.c3245 * H_URP = H({ username-value,":",realm-value,":",passwd}) sec->data
3263 * A1 = { H( { username-value, ":", realm-value, ":", passwd } ),
3479 * The "username-value", "realm-value" and "passwd" are encoded according
3481 * present, and all the characters of either "username-value" or "passwd"
3855 sasl_secret_t * passwd,
3865 if(!username || !cnonce || !nonce || !ncvalue || !digesturi || !passwd) {
3884 passwd,
3846 calculate_response(context_t * text, const sasl_utils_t * utils, unsigned char *username, unsigned char *realm, unsigned char *nonce, unsigned int ncvalue, unsigned char *cnonce, char *qop, unsigned char *digesturi, sasl_secret_t * passwd, unsigned char *authorization_id, char **response_value) argument
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/include/
H A Dkrb5.h1270 krb5_data *passwd; member in struct:_passwd_phrase_element
/illumos-gate/usr/src/ucbcmd/vipw/
H A Dvipw.c60 char *passwd = "/etc/passwd"; variable
87 if (stat(passwd, &osbuf) < 0) {
88 (void)fprintf(stderr,"vipw: can't stat passwd file.\n");
92 if (copyfile(passwd, ptemp))
98 passwd);
104 if (editfile(editor, ptemp, passwd, &n_mtime)) {
105 if (sanity_check(ptemp, &n_mtime, passwd))
122 if (rename(ptemp, passwd) < 0) {
129 (chown(passwd, osbu
[all...]
/illumos-gate/usr/src/lib/pkcs11/pkcs11_softtoken/common/
H A DsoftKeysUtil.c1251 soft_create_hmac_key(soft_session_t *session_p, CK_BYTE *passwd, argument
1279 keytemplate[3].pValue = passwd;
/illumos-gate/usr/src/lib/print/libprint/common/
H A Dns.h130 char *passwd; member in struct:ns_cred
/illumos-gate/usr/src/lib/nsswitch/ldap/common/
H A Dgetgrent.c89 char **gname, **passwd, **gid, *password, *end; local
119 passwd = __ns_ldap_getAttr(result->entry, _G_PASSWD);
120 if (passwd == NULL || passwd[0] == NULL || (strlen(passwd[0]) == 0)) {
131 if (strncasecmp(passwd[0], _CRYPT, strlen(_CRYPT)) == 0)
132 password = passwd[0] + strlen(_CRYPT);
134 password = passwd[0];
H A Dgetspent.c78 char **uid, **passwd, **last, **smin, **smax; local
97 passwd = __ns_ldap_getAttr(result->entry, _S_USERPASSWORD);
98 if (passwd == NULL || passwd[0] == NULL) {
104 } else if (strcmp(passwd[0], "") == 0) {
111 if ((tmp = strstr(passwd[0], "{crypt}")) != NULL ||
112 (tmp = strstr(passwd[0], "{CRYPT}")) != NULL) {
113 if (tmp != passwd[0])
232 * getbynam gets a passwd entry by uid name. This function constructs an ldap
/illumos-gate/usr/src/lib/pam_modules/dhkeys/
H A Ddhkeys.c199 char *passwd; local
206 struct passwd pw; /* Needed to obtain uid */
225 (void) pam_get_item(pamh, PAM_AUTHTOK, (void **)&passwd);
256 /* passwd can be NULL (no passwd or su as root) */
257 if (passwd) {
258 (void) strlcpy(short_pass, passwd, sizeof (short_pass));
316 syslog(LOG_DEBUG, "pam_dhkeys: %d passwd decrypt successes",
/illumos-gate/usr/src/lib/pam_modules/unix_auth/
H A Dunix_auth.c146 char *passwd; local
185 if (pam_get_item(pamh, PAM_AUTHTOK, (void **)&passwd) != PAM_SUCCESS) {
276 if (passwd == NULL) {
289 if ((crypt_passwd = crypt(passwd, rep_passwd)) == NULL) {
/illumos-gate/usr/src/lib/passwdutil/
H A D__check_history.c39 * passwd = new clear text password.
43 * PWU_SUCCESS, passwd found in user's old password history.
46 * PWU_NOT_FOUND, passwd not in user's old password history.
51 __check_history(char *user, char *passwd, pwu_repository_t *rep) argument
72 res = rops[i]->checkhistory(user, passwd, rep);
H A Dfiles_attr.c47 int files_checkhistory(char *user, char *passwd, pwu_repository_t *rep);
79 struct passwd *pwd;
148 struct passwd *
149 private_getpwnam_r(const char *name, struct passwd *result, char *buffer,
230 * determine which password structure (/etc/passwd or /etc/shadow)
244 pwbuf->pwd = malloc(sizeof (struct passwd));
394 * passwd = new clear text password.
397 * PWU_SUCCESS, passwd found in user's old password history.
400 * PWU_NOT_FOUND, passwd not in user's old password history.
405 files_checkhistory(char *user, char *passwd, pwu_repository_ argument
[all...]

Completed in 4395 milliseconds

123