Searched defs:passwd (Results 1 - 25 of 45) sorted by last modified time

12

/osnet-11/usr/src/cmd/ldap/common/
H A Dcommon.c149 fprintf( stderr, gettext(" -w passwd\tbind passwd (for simple authentication)\n") );
150 fprintf( stderr, gettext(" -w - \tprompt for bind passwd (for simple authentication)\n") );
151 fprintf( stderr, gettext(" -j file\tread bind passwd (for simple authentication)\n") );
214 static char *passwd = NULL; variable
603 passwd = strdup( optarg );
759 passwd = NULL;
767 passwd = strdup(pbuf);
772 passwd = getpassphrase(password_string);
775 passwd
1441 ldaptool_simple_bind_s( LDAP *ld, const char *dn, const char *passwd, LDAPControl **serverctrls, LDAPControl **clientctrls, char *msg ) argument
[all...]
H A Dldaptest.c223 static char dn[256], passwd[256]; local
243 getaline( passwd, sizeof(passwd), stdin,
246 passwd[0] = '\0';
248 *passwdp = passwd;
262 char passwd[64], dn[256], rdn[64], attr[64], value[256]; local
446 getaline( passwd, sizeof(passwd), stdin,
449 passwd[0] = '\0';
451 if ( ldap_bind( ld, dn, passwd, metho
[all...]
H A Dldaptool-sasl.c33 char *passwd; member in struct:__anon54
42 char *passwd, char *realm )
64 defaults->passwd = passwd;
111 defvalue = defaults->passwd;
126 /* Clear passwd */
128 /* At this point defaults->passwd is not NULL */
129 memset( defaults->passwd, '\0', strlen(defaults->passwd));
41 ldaptool_set_sasl_defaults( LDAP *ld, char *mech, char *authid, char *username, char *passwd, char *realm ) argument
/osnet-11/usr/src/cmd/cmd-inet/usr.bin/pppd/plugins/
H A Dpassprompt.c27 static int promptpass(char *user, char *passwd) argument
38 if (user != NULL && passwd == NULL)
84 red = read(p[0], passwd + readgood, MAXSECRETLEN-1 - readgood);
96 passwd[readgood] = 0;
109 if (readgood > 0 && passwd[--readgood] == '\n')
110 passwd[readgood] = '\0';
/osnet-11/usr/src/lib/libldap5/sources/ldap/common/
H A Dbind.c51 ldap_bind( LDAP *ld, const char *dn, const char *passwd, int authmethod ) argument
59 * simple [0] OCTET STRING -- passwd
73 return( ldap_simple_bind( ld, dn, passwd ) );
97 ldap_bind_s( LDAP *ld, const char *dn, const char *passwd, int authmethod ) argument
105 return( ldap_simple_bind_s( ld, dn, passwd ) );
H A Ddigest_md5.c600 const char *passwd,
611 if (challenge == NULL || username == NULL || passwd == NULL) {
642 passwd, 0, 0, hash_pass),
597 ldap_digest_md5_encode( const char *challenge, const char *username, const char *passwd, char **digest ) argument
H A Drequest.c465 char *binddn, *passwd; local
471 binddn = passwd = "";
474 if (( lderr = (*ld->ld_rebind_fn)( ld, &binddn, &passwd,
496 if (( lderr = ldap_bind_s( ld, binddn, passwd,
514 (*ld->ld_rebind_fn)( ld, &binddn, &passwd,
H A Dsbind.c40 static int simple_bind_nolock( LDAP *ld, const char *dn, const char *passwd,
42 static int simple_bindifnot_s( LDAP *ld, const char *dn, const char *passwd );
56 ldap_simple_bind( LDAP *ld, const char *dn, const char *passwd )
66 rc = simple_bind_nolock( ld, dn, passwd, 1 );
73 simple_bind_nolock( LDAP *ld, const char *dn, const char *passwd, argument
85 * simple [0] OCTET STRING -- passwd
97 if ( passwd == NULL )
98 passwd = "";
103 bv.bv_val = (char *)passwd;
104 bv.bv_len = strlen( passwd );
[all...]
/osnet-11/usr/src/lib/pkcs11/pkcs11_softtoken/common/
H A DsoftKeysUtil.c1277 soft_create_hmac_key(soft_session_t *session_p, CK_BYTE *passwd, argument
1305 keytemplate[3].pValue = passwd;
/osnet-11/usr/src/lib/libldap4/common/
H A Dbind.c56 ldap_bind( LDAP *ld, char *dn, char *passwd, int authmethod ) argument
64 * simple [0] OCTET STRING -- passwd
78 return( ldap_simple_bind( ld, dn, passwd ) );
109 ldap_bind_s( LDAP *ld, char *dn, char *passwd, int authmethod ) argument
115 return( ldap_simple_bind_s( ld, dn, passwd ) );
H A Drequest.c367 char *binddn, *passwd; local
377 binddn = passwd = "";
380 if (( err = (*ld->ld_rebindproc)( ld, &binddn, &passwd,
394 if ( ldap_bind_s( ld, binddn, passwd, authmethod ) !=
403 (*ld->ld_rebindproc)( ld, &binddn, &passwd,
H A Dsbind.c38 BerElement * ldap_build_simple_bind_req(LDAP *ld, char *dn, char *passwd, LDAPControl **serverctrls) argument
46 * simple [0] OCTET STRING -- passwd
56 if ( passwd == NULL )
57 passwd = "";
64 if ( ber_printf( ber, "{it{ists}", ++ld->ld_msgid, LDAP_REQ_BIND, ld->ld_version, dn, LDAP_AUTH_SIMPLE, passwd ) == -1 ) {
107 ldap_simple_bind( LDAP *ld, char *dn, char *passwd )
120 if ( passwd == NULL )
121 passwd = "";
124 if ( (ber = ldap_build_simple_bind_req( ld, dn, passwd, NULL )) == NULLBER ) {
157 ldap_simple_bind_s( LDAP *ld, char *dn, char *passwd )
[all...]
/osnet-11/usr/src/lib/pam_modules/dhkeys/
H A Ddhkeys.c198 char *passwd; local
205 struct passwd pw; /* Needed to obtain uid */
224 (void) pam_get_item(pamh, PAM_AUTHTOK, (void **)&passwd);
255 /* passwd can be NULL (no passwd or su as root) */
256 if (passwd) {
257 (void) strlcpy(short_pass, passwd, sizeof (short_pass));
315 syslog(LOG_DEBUG, "pam_dhkeys: %d passwd decrypt successes",
/osnet-11/usr/src/lib/pam_modules/unix_auth/
H A Dunix_auth.c197 char *passwd; local
239 if (pam_get_item(pamh, PAM_AUTHTOK, (void **)&passwd) != PAM_SUCCESS) {
332 if (passwd == NULL) {
345 if ((crypt_passwd = crypt(passwd, rep_passwd)) == NULL) {
/osnet-11/usr/src/lib/passwdutil/
H A Dfiles_attr.c48 int files_checkhistory(char *user, char *passwd, pwu_repository_t *rep);
79 struct passwd *pwd;
140 struct passwd *
141 private_getpwnam_r(const char *name, struct passwd *result, char *buffer,
222 * determine which password structure (/etc/passwd or /etc/shadow)
236 pwbuf->pwd = malloc(sizeof (struct passwd));
387 * passwd = new clear text password.
390 * PWU_SUCCESS, passwd found in user's old password history.
393 * PWU_NOT_FOUND, passwd not in user's old password history.
398 files_checkhistory(char *user, char *passwd, pwu_repository_ argument
[all...]
H A Dldap_attr.c99 char *passwd; /* encrypted password */ member in struct:__anon2796
100 struct passwd *pwd;
101 ns_ldap_attr_t **pattrs; /* passwd attrs */
104 ns_ldap_attr_t **sattrs; /* passwd attrs */
114 /* passwd attributes filters */
149 if (p->passwd) {
150 (void) memset(p->passwd, 0, strlen(p->passwd));
151 free(p->passwd);
194 struct passwd *p
[all...]
/osnet-11/usr/src/lib/libntsvcs/common/
H A Dsrvsvc_svc.c2350 uint8_t *passwd = empty_string; local
2385 info2[i].shi2_passwd = passwd;
2405 info502[i].shi502_passwd = passwd;
H A Dntsvcs_clnt.c246 uchar_t passwd[SMB_IPC_MAXPWDLEN]; local
265 smb_ipc_get_passwd(passwd, SMB_IPC_MAXPWDLEN, B_TRUE);
268 rc = smb_kinit(principal, (char *)passwd);
/osnet-11/usr/src/lib/libsmbfs/common/
H A Dsmbfs_ctx.c588 smbfs_ctx_setpassword(struct smb_ctx *ctx, const char *passwd, int from_cmd) argument
592 if (passwd == NULL)
594 if (strlen(passwd) >= sizeof (ctx->ct_password)) {
608 if (strncmp(passwd, "$$1", 3) == 0)
609 (void) smbfs_simpledecrypt(ctx->ct_password, passwd);
611 (void) strlcpy(ctx->ct_password, passwd,
1057 struct passwd pw;
/osnet-11/usr/src/lib/libsmb/common/
H A Dsmb_info.c55 uint8_t passwd[SMB_IPC_MAXPWDLEN]; /* clear text passwd */ member in struct:__anon2602
403 smb_set_machine_passwd(char *passwd) argument
408 if (smb_config_setstr(SMB_CI_MACHINE_PASSWD, passwd) != SMBD_SMF_OK)
467 (void) memset(ipc_info.passwd, 0, SMB_IPC_MAXPWDLEN);
479 smb_ipc_set(const char *plain_user, const char *passwd) argument
483 if (smb_auth_ntlm_hash(passwd, passwd_hash) != SMBAUTH_SUCCESS)
489 (void) memcpy(ipc_info.passwd, passwd, SMB_IPC_MAXPWDLEN);
521 (void) memset(ipc_info.passwd,
619 smb_setdomainprops(char *fqdn, char *server, char *passwd) argument
[all...]
H A Dsmb_auth.c556 unsigned char *passwd)
565 return (bcmp(lm_resp, passwd, SMBAUTH_RESP_SZ) == 0);
573 unsigned char *passwd,
584 ok = (bcmp(ntlm_resp, passwd, SMBAUTH_RESP_SZ) == 0);
598 unsigned char *passwd,
614 clnt_blob = &passwd[SMBAUTH_HASH_SZ];
653 ok = (bcmp(passwd, ntlmv2_resp, pwdlen) == 0);
700 unsigned char *passwd,
722 return (bcmp(passwd, ntlm2_sess_resp, pwdlen) == 0);
730 unsigned char *passwd,
552 smb_lm_password_ok( unsigned char *challenge, uint32_t clen, unsigned char *lm_hash, unsigned char *passwd) argument
569 smb_ntlm_password_ok( unsigned char *challenge, uint32_t clen, unsigned char *ntlm_hash, unsigned char *passwd, unsigned char *session_key) argument
594 smb_ntlmv2_password_ok( unsigned char *challenge, uint32_t clen, unsigned char *ntlm_hash, unsigned char *passwd, int pwdlen, char *domain, char *username, uchar_t *session_key) argument
696 smb_ntlm2_session_password_ok( unsigned char *challenge, uint32_t clen, unsigned char *ntlm_hash, unsigned char *passwd, int pwdlen, unsigned char *nonce, int nlen, uchar_t *session_key) argument
726 smb_lmv2_password_ok( unsigned char *challenge, uint32_t clen, unsigned char *ntlm_hash, unsigned char *passwd, char *domain, char *username) argument
793 smb_auth_validate_lm( unsigned char *challenge, uint32_t clen, smb_passwd_t *smbpw, unsigned char *passwd, int pwdlen, char *domain, char *username) argument
832 smb_auth_validate_nt( unsigned char *challenge, uint32_t clen, smb_passwd_t *smbpw, unsigned char *passwd, int pwdlen, char *domain, char *username, unsigned char *nonce, int nlen, uchar_t *session_key) argument
[all...]
/osnet-11/usr/src/lib/libsmbns/common/
H A Dsmbns_kpasswd.c276 * Pre-condition: fqdn and passwd input parameters have already been validated
280 smb_krb5_kt_update_adjoin(char *fqdn, krb5_kvno kvno, char *passwd, argument
310 fqdn, kvno, kt_flags, passwd)) != 0) {
352 smb_krb5_setpwd(const char *fqdn, char *passwd) argument
386 code = krb5_set_password_using_ccache(ctx, cc, passwd, princ,
/osnet-11/usr/src/lib/libfedfs/common/
H A Dnsdb_primitives.c42 char *passwd; member in struct:cb_param
66 ret = cred->passwd;
185 sasl_param.passwd = pw;
192 sasl_param.passwd = pw;
199 sasl_param.passwd = pw;
/osnet-11/usr/src/lib/libpkg/common/
H A Dpkgweb.c1816 * passwd - password used to encrypt certs
1823 char *passwd)
1865 if ((p12 = sunw_PKCS12_create(passwd, NULL, NULL, cacerts)) == NULL) {
3219 /* first newline found is end of passwd, so nuke it */
3232 /* unable to collect passwd from given source */
1822 write_ca_file(PKG_ERR *err, char *tmpdir, STACK_OF(X509) *cacerts, char *passwd) argument
/osnet-11/usr/src/lib/krb5/kdb/
H A Dkdb5.c2345 char *passwd,
2355 passwd, new_kvno, keepold, db_entry);
2341 krb5_dbe_cpw(krb5_context kcontext, krb5_keyblock * master_key, krb5_key_salt_tuple * ks_tuple, int ks_tuple_count, char *passwd, int new_kvno, krb5_boolean keepold, krb5_db_entry * db_entry) argument

Completed in 150 milliseconds

12