/illumos-gate/usr/src/lib/smbsrv/libsmb/common/ |
H A D | smb_auth.c | 379 unsigned char *passwd, 395 clnt_blob = &passwd[SMBAUTH_HASH_SZ]; 434 ok = (bcmp(passwd, ntlmv2_resp, pwdlen) == 0); 455 unsigned char *passwd, 466 clnt_challenge = &passwd[SMBAUTH_HASH_SZ]; 500 ok = (bcmp(passwd, lmv2_resp, SMBAUTH_LM_RESP_SZ) == 0); 376 smb_ntlmv2_password_ok( unsigned char *challenge, unsigned char *ntlm_hash, unsigned char *passwd, int pwdlen, char *domain, char *username, uchar_t *session_key) argument 452 smb_lmv2_password_ok( unsigned char *srv_challenge, unsigned char *ntlm_hash, unsigned char *passwd, char *domain, char *username) argument
|
H A D | smb_info.c | 58 uint8_t passwd[SMBAUTH_HASH_SZ]; member in struct:__anon212 372 smb_set_machine_passwd(char *passwd) argument 377 if (smb_config_set(SMB_CI_MACHINE_PASSWD, passwd) != SMBD_SMF_OK) 421 rc = smb_get_machine_passwd(ipc_info.passwd, SMBAUTH_HASH_SZ); 423 *ipc_info.passwd = 0; 438 (void) memcpy(ipc_info.passwd, passwd_hash, SMBAUTH_HASH_SZ); 453 (void) smb_get_machine_passwd(ipc_info.passwd, SMBAUTH_HASH_SZ); 467 (void) memcpy(ipc_info.passwd, ipc_orig_info.passwd, 468 sizeof (ipc_info.passwd)); 526 smb_setdomainprops(char *fqdn, char *server, char *passwd) argument [all...] |
/illumos-gate/usr/src/lib/smbsrv/libsmbns/common/ |
H A D | smbns_ksetpwd.c | 231 smb_krb5_setpwd(krb5_context ctx, const char *fqdn, char *passwd) argument 255 code = krb5_set_password_using_ccache(ctx, cc, passwd, princ, 320 char *passwd, krb5_enctype *enctypes, int enctype_count) 349 kvno, &salt, passwd) != 0) { 318 smb_krb5_kt_populate(krb5_context ctx, const char *fqdn, krb5_principal *princs, int count, char *fname, krb5_kvno kvno, char *passwd, krb5_enctype *enctypes, int enctype_count) argument
|
/illumos-gate/usr/src/cmd/idmap/idmap/ |
H A D | namemaps.c | 140 strings2cred(ns_cred_t *nsc, char *user, char *passwd, char *auth) argument 154 if (passwd != NULL) { 155 nsc->cred.unix_cred.passwd = strdup(passwd); 156 if (nsc->cred.unix_cred.passwd == NULL) { 339 if (p->nsc.cred.unix_cred.passwd != NULL) { 341 (void) memset(p->nsc.cred.unix_cred.passwd, 0, 342 strlen(p->nsc.cred.unix_cred.passwd)); 343 free(p->nsc.cred.unix_cred.passwd); 356 char *user, char *passwd, cha 355 idmap_init_namemaps(idmap_nm_handle_t **adh, char *user, char *passwd, char *auth, char *windomain, int direction) argument [all...] |
/illumos-gate/usr/src/lib/smbsrv/libmlsvc/common/ |
H A D | srvsvc_svc.c | 2599 uint8_t *passwd; local 2605 passwd = (uint8_t *)NDR_STRDUP(mxa, empty_string); 2608 if (!netname || !comment || !passwd || !path) 2633 info2[i].shi2_passwd = passwd; 2653 info502[i].shi502_passwd = passwd; 2685 struct passwd pw;
|
/illumos-gate/usr/src/lib/libsmbfs/smb/ |
H A D | ctx.c | 517 /* may have [[domain;]user[:passwd]] */ 753 smb_ctx_setpassword(struct smb_ctx *ctx, const char *passwd, int from_cmd) argument 757 if (passwd == NULL) 759 if (strlen(passwd) >= sizeof (ctx->ct_password)) { 773 if (strncmp(passwd, "$$1", 3) == 0) 774 (void) smb_simpledecrypt(ctx->ct_password, passwd); 776 strlcpy(ctx->ct_password, passwd, 875 struct passwd pw; 1501 struct passwd pw;
|
/illumos-gate/usr/src/head/ |
H A D | pwd.h | 48 struct passwd { struct 69 extern struct passwd *getpwuid(uid_t); /* MT-unsafe */ 70 extern struct passwd *getpwnam(const char *); /* MT-unsafe */ 73 extern struct passwd *getpwent_r(struct passwd *, char *, int); 74 extern struct passwd *fgetpwent_r(FILE *, struct passwd *, char *, int); 75 extern struct passwd *fgetpwent(FILE *); /* MT-unsafe */ 76 extern int putpwent(const struct passwd *, FILE *); 82 extern struct passwd *getpwen [all...] |
/illumos-gate/usr/src/cmd/cmd-inet/usr.bin/pppd/ |
H A D | options.c | 97 char passwd[MAXSECRETLEN]; /* Password for PAP */ variable 568 struct passwd *pw;
|
/illumos-gate/usr/src/uts/common/inet/tcp/ |
H A D | tcp.c | 3644 uint8_t passwd[PASSWD_SIZE]; member in struct:__anon4816 3665 bcopy(&cpu_list->cpu_type_info, &tcp_iss_cookie.passwd, 3671 bcopy(phrase, &tcp_iss_cookie.passwd, min(PASSWD_SIZE, len));
|
/illumos-gate/usr/src/lib/libnsl/key/ |
H A D | publickey.c | 148 getkeys_nis(int *errp, char *netname, char *pkey, char *skey, char *passwd) argument 206 if (skey && extract_secret(p, skey, passwd)) 228 getkeys_files(int *errp, char *netname, char *pkey, char *skey, char *passwd) argument 289 if (skey && extract_secret(p, skey, passwd)) 329 getsecretkey(const char *netname, char *skey, const char *passwd) argument 332 passwd)); 348 char *passwd, /* in */ 357 if (!buf || !passwd || !raw || !private || !prilen || 375 if (!xdecrypt_g(buf, keylen, algtype, passwd, netname, TRUE)) { 400 extract_secret(char *raw, char *private, char *passwd) argument 344 extract_secret_g( char *raw, char *private, int prilen, char *passwd, char *netname, keylen_t keylen, algtype_t algtype) argument 422 getkeys_ldap_g( int *err, char *netname, char *pkey, int pkeylen, char *skey, int skeylen, char *passwd, keylen_t keylen, algtype_t algtype) argument 628 getsecretkey_g( const char *netname, keylen_t keylen, algtype_t algtype, char *skey, size_t skeylen, const char *passwd) argument [all...] |
H A D | xcrypt.c | 75 * Encrypt a secret key given passwd 80 xencrypt(secret, passwd) 82 char *passwd; 95 (void) passwd2des(passwd, key); 109 * Decrypt secret key using passwd 114 xdecrypt(secret, passwd) 116 char *passwd; 130 (void) passwd2des(passwd, key); 224 * Encrypt a secret key given passwd. 244 const char *passwd, /* i 240 xencrypt_g( char *secret, keylen_t keylen, algtype_t algtype, const char *passwd, const char netname[], char **encrypted_secret, bool_t do_chksum) argument 345 xdecrypt_g( char *secret, int keylen, int algtype, const char *passwd, const char netname[], bool_t do_chksum) argument [all...] |
/illumos-gate/usr/src/cmd/ndmpd/ndmp/ |
H A D | ndmpd_connect.c | 66 static void create_md5_digest(unsigned char *digest, char *passwd, 198 char *passwd, *dec_passwd; local 246 passwd = ndmpd_get_prop(NDMP_CLEARTEXT_PASSWORD); 247 if (!passwd || !*passwd) { 259 dec_passwd = ndmp_base64_decode(passwd); 290 passwd = ndmpd_get_prop(NDMP_CRAM_MD5_PASSWORD); 291 if (!passwd || !*passwd) { 302 dec_passwd = ndmp_base64_decode(passwd); 608 create_md5_digest(unsigned char *digest, char *passwd, unsigned char *challenge) argument 1165 char *passwd, *dec_passwd; local 1218 char *passwd, *dec_passwd; local [all...] |
/illumos-gate/usr/src/cmd/passwd/ |
H A D | Makefile | 26 PROG= passwd 27 DEFAULTFILES= passwd.dfl 31 passwd := LDLIBS += $(ROOT)/usr/lib/passwdutil.so.1 macro
|
H A D | passwd.c | 33 * passwd is a program whose sole purpose is to manage 73 #define MFLAG 0x004 /* set max field -- # of days passwd is valid */ 80 #define WFLAG 0x100 /* warn user to change passwd */ 145 #define MSG_SORRY "%s: Sorry, wrong passwd\n" 157 #define PASSWD "/etc/passwd" 277 struct passwd *pass = getpwuid(uid); 286 * If flag is zero, change passwd. 297 if (pam_start("passwd", usrname, &pam_conv, &pamh) != PAM_SUCCESS) { 1244 char *passwd; local 1251 passwd [all...] |
/illumos-gate/usr/src/lib/sasl_plugins/digestmd5/ |
H A D | digestmd5.c | 3245 * H_URP = H({ username-value,":",realm-value,":",passwd}) sec->data 3263 * A1 = { H( { username-value, ":", realm-value, ":", passwd } ), 3479 * The "username-value", "realm-value" and "passwd" are encoded according 3481 * present, and all the characters of either "username-value" or "passwd" 3855 sasl_secret_t * passwd, 3865 if(!username || !cnonce || !nonce || !ncvalue || !digesturi || !passwd) { 3884 passwd, 3846 calculate_response(context_t * text, const sasl_utils_t * utils, unsigned char *username, unsigned char *realm, unsigned char *nonce, unsigned int ncvalue, unsigned char *cnonce, char *qop, unsigned char *digesturi, sasl_secret_t * passwd, unsigned char *authorization_id, char **response_value) argument
|
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/include/ |
H A D | krb5.h | 1270 krb5_data *passwd; member in struct:_passwd_phrase_element
|
/illumos-gate/usr/src/ucbcmd/vipw/ |
H A D | vipw.c | 60 char *passwd = "/etc/passwd"; variable 87 if (stat(passwd, &osbuf) < 0) { 88 (void)fprintf(stderr,"vipw: can't stat passwd file.\n"); 92 if (copyfile(passwd, ptemp)) 98 passwd); 104 if (editfile(editor, ptemp, passwd, &n_mtime)) { 105 if (sanity_check(ptemp, &n_mtime, passwd)) 122 if (rename(ptemp, passwd) < 0) { 129 (chown(passwd, osbu [all...] |
/illumos-gate/usr/src/lib/pkcs11/pkcs11_softtoken/common/ |
H A D | softKeysUtil.c | 1251 soft_create_hmac_key(soft_session_t *session_p, CK_BYTE *passwd, argument 1279 keytemplate[3].pValue = passwd;
|
/illumos-gate/usr/src/lib/print/libprint/common/ |
H A D | ns.h | 130 char *passwd; member in struct:ns_cred
|
/illumos-gate/usr/src/lib/nsswitch/ldap/common/ |
H A D | getgrent.c | 89 char **gname, **passwd, **gid, *password, *end; local 119 passwd = __ns_ldap_getAttr(result->entry, _G_PASSWD); 120 if (passwd == NULL || passwd[0] == NULL || (strlen(passwd[0]) == 0)) { 131 if (strncasecmp(passwd[0], _CRYPT, strlen(_CRYPT)) == 0) 132 password = passwd[0] + strlen(_CRYPT); 134 password = passwd[0];
|
H A D | getspent.c | 78 char **uid, **passwd, **last, **smin, **smax; local 97 passwd = __ns_ldap_getAttr(result->entry, _S_USERPASSWORD); 98 if (passwd == NULL || passwd[0] == NULL) { 104 } else if (strcmp(passwd[0], "") == 0) { 111 if ((tmp = strstr(passwd[0], "{crypt}")) != NULL || 112 (tmp = strstr(passwd[0], "{CRYPT}")) != NULL) { 113 if (tmp != passwd[0]) 232 * getbynam gets a passwd entry by uid name. This function constructs an ldap
|
/illumos-gate/usr/src/lib/pam_modules/dhkeys/ |
H A D | dhkeys.c | 199 char *passwd; local 206 struct passwd pw; /* Needed to obtain uid */ 225 (void) pam_get_item(pamh, PAM_AUTHTOK, (void **)&passwd); 256 /* passwd can be NULL (no passwd or su as root) */ 257 if (passwd) { 258 (void) strlcpy(short_pass, passwd, sizeof (short_pass)); 316 syslog(LOG_DEBUG, "pam_dhkeys: %d passwd decrypt successes",
|
/illumos-gate/usr/src/lib/pam_modules/unix_auth/ |
H A D | unix_auth.c | 146 char *passwd; local 185 if (pam_get_item(pamh, PAM_AUTHTOK, (void **)&passwd) != PAM_SUCCESS) { 276 if (passwd == NULL) { 289 if ((crypt_passwd = crypt(passwd, rep_passwd)) == NULL) {
|
/illumos-gate/usr/src/lib/passwdutil/ |
H A D | __check_history.c | 39 * passwd = new clear text password. 43 * PWU_SUCCESS, passwd found in user's old password history. 46 * PWU_NOT_FOUND, passwd not in user's old password history. 51 __check_history(char *user, char *passwd, pwu_repository_t *rep) argument 72 res = rops[i]->checkhistory(user, passwd, rep);
|
H A D | files_attr.c | 47 int files_checkhistory(char *user, char *passwd, pwu_repository_t *rep); 79 struct passwd *pwd; 148 struct passwd * 149 private_getpwnam_r(const char *name, struct passwd *result, char *buffer, 230 * determine which password structure (/etc/passwd or /etc/shadow) 244 pwbuf->pwd = malloc(sizeof (struct passwd)); 394 * passwd = new clear text password. 397 * PWU_SUCCESS, passwd found in user's old password history. 400 * PWU_NOT_FOUND, passwd not in user's old password history. 405 files_checkhistory(char *user, char *passwd, pwu_repository_ argument [all...] |