/osnet-11/usr/src/cmd/ldap/common/ |
H A D | common.c | 149 fprintf( stderr, gettext(" -w passwd\tbind passwd (for simple authentication)\n") ); 150 fprintf( stderr, gettext(" -w - \tprompt for bind passwd (for simple authentication)\n") ); 151 fprintf( stderr, gettext(" -j file\tread bind passwd (for simple authentication)\n") ); 214 static char *passwd = NULL; variable 603 passwd = strdup( optarg ); 759 passwd = NULL; 767 passwd = strdup(pbuf); 772 passwd = getpassphrase(password_string); 775 passwd 1441 ldaptool_simple_bind_s( LDAP *ld, const char *dn, const char *passwd, LDAPControl **serverctrls, LDAPControl **clientctrls, char *msg ) argument [all...] |
H A D | ldaptest.c | 223 static char dn[256], passwd[256]; local 243 getaline( passwd, sizeof(passwd), stdin, 246 passwd[0] = '\0'; 248 *passwdp = passwd; 262 char passwd[64], dn[256], rdn[64], attr[64], value[256]; local 446 getaline( passwd, sizeof(passwd), stdin, 449 passwd[0] = '\0'; 451 if ( ldap_bind( ld, dn, passwd, metho [all...] |
H A D | ldaptool-sasl.c | 33 char *passwd; member in struct:__anon54 42 char *passwd, char *realm ) 64 defaults->passwd = passwd; 111 defvalue = defaults->passwd; 126 /* Clear passwd */ 128 /* At this point defaults->passwd is not NULL */ 129 memset( defaults->passwd, '\0', strlen(defaults->passwd)); 41 ldaptool_set_sasl_defaults( LDAP *ld, char *mech, char *authid, char *username, char *passwd, char *realm ) argument
|
/osnet-11/usr/src/cmd/cmd-inet/usr.bin/pppd/plugins/ |
H A D | passprompt.c | 27 static int promptpass(char *user, char *passwd) argument 38 if (user != NULL && passwd == NULL) 84 red = read(p[0], passwd + readgood, MAXSECRETLEN-1 - readgood); 96 passwd[readgood] = 0; 109 if (readgood > 0 && passwd[--readgood] == '\n') 110 passwd[readgood] = '\0';
|
/osnet-11/usr/src/lib/libldap5/sources/ldap/common/ |
H A D | bind.c | 51 ldap_bind( LDAP *ld, const char *dn, const char *passwd, int authmethod ) argument 59 * simple [0] OCTET STRING -- passwd 73 return( ldap_simple_bind( ld, dn, passwd ) ); 97 ldap_bind_s( LDAP *ld, const char *dn, const char *passwd, int authmethod ) argument 105 return( ldap_simple_bind_s( ld, dn, passwd ) );
|
H A D | digest_md5.c | 600 const char *passwd, 611 if (challenge == NULL || username == NULL || passwd == NULL) { 642 passwd, 0, 0, hash_pass), 597 ldap_digest_md5_encode( const char *challenge, const char *username, const char *passwd, char **digest ) argument
|
H A D | request.c | 465 char *binddn, *passwd; local 471 binddn = passwd = ""; 474 if (( lderr = (*ld->ld_rebind_fn)( ld, &binddn, &passwd, 496 if (( lderr = ldap_bind_s( ld, binddn, passwd, 514 (*ld->ld_rebind_fn)( ld, &binddn, &passwd,
|
H A D | sbind.c | 40 static int simple_bind_nolock( LDAP *ld, const char *dn, const char *passwd, 42 static int simple_bindifnot_s( LDAP *ld, const char *dn, const char *passwd ); 56 ldap_simple_bind( LDAP *ld, const char *dn, const char *passwd ) 66 rc = simple_bind_nolock( ld, dn, passwd, 1 ); 73 simple_bind_nolock( LDAP *ld, const char *dn, const char *passwd, argument 85 * simple [0] OCTET STRING -- passwd 97 if ( passwd == NULL ) 98 passwd = ""; 103 bv.bv_val = (char *)passwd; 104 bv.bv_len = strlen( passwd ); [all...] |
/osnet-11/usr/src/lib/pkcs11/pkcs11_softtoken/common/ |
H A D | softKeysUtil.c | 1277 soft_create_hmac_key(soft_session_t *session_p, CK_BYTE *passwd, argument 1305 keytemplate[3].pValue = passwd;
|
/osnet-11/usr/src/lib/libldap4/common/ |
H A D | bind.c | 56 ldap_bind( LDAP *ld, char *dn, char *passwd, int authmethod ) argument 64 * simple [0] OCTET STRING -- passwd 78 return( ldap_simple_bind( ld, dn, passwd ) ); 109 ldap_bind_s( LDAP *ld, char *dn, char *passwd, int authmethod ) argument 115 return( ldap_simple_bind_s( ld, dn, passwd ) );
|
H A D | request.c | 367 char *binddn, *passwd; local 377 binddn = passwd = ""; 380 if (( err = (*ld->ld_rebindproc)( ld, &binddn, &passwd, 394 if ( ldap_bind_s( ld, binddn, passwd, authmethod ) != 403 (*ld->ld_rebindproc)( ld, &binddn, &passwd,
|
H A D | sbind.c | 38 BerElement * ldap_build_simple_bind_req(LDAP *ld, char *dn, char *passwd, LDAPControl **serverctrls) argument 46 * simple [0] OCTET STRING -- passwd 56 if ( passwd == NULL ) 57 passwd = ""; 64 if ( ber_printf( ber, "{it{ists}", ++ld->ld_msgid, LDAP_REQ_BIND, ld->ld_version, dn, LDAP_AUTH_SIMPLE, passwd ) == -1 ) { 107 ldap_simple_bind( LDAP *ld, char *dn, char *passwd ) 120 if ( passwd == NULL ) 121 passwd = ""; 124 if ( (ber = ldap_build_simple_bind_req( ld, dn, passwd, NULL )) == NULLBER ) { 157 ldap_simple_bind_s( LDAP *ld, char *dn, char *passwd ) [all...] |
/osnet-11/usr/src/lib/pam_modules/dhkeys/ |
H A D | dhkeys.c | 198 char *passwd; local 205 struct passwd pw; /* Needed to obtain uid */ 224 (void) pam_get_item(pamh, PAM_AUTHTOK, (void **)&passwd); 255 /* passwd can be NULL (no passwd or su as root) */ 256 if (passwd) { 257 (void) strlcpy(short_pass, passwd, sizeof (short_pass)); 315 syslog(LOG_DEBUG, "pam_dhkeys: %d passwd decrypt successes",
|
/osnet-11/usr/src/lib/pam_modules/unix_auth/ |
H A D | unix_auth.c | 197 char *passwd; local 239 if (pam_get_item(pamh, PAM_AUTHTOK, (void **)&passwd) != PAM_SUCCESS) { 332 if (passwd == NULL) { 345 if ((crypt_passwd = crypt(passwd, rep_passwd)) == NULL) {
|
/osnet-11/usr/src/lib/passwdutil/ |
H A D | files_attr.c | 48 int files_checkhistory(char *user, char *passwd, pwu_repository_t *rep); 79 struct passwd *pwd; 140 struct passwd * 141 private_getpwnam_r(const char *name, struct passwd *result, char *buffer, 222 * determine which password structure (/etc/passwd or /etc/shadow) 236 pwbuf->pwd = malloc(sizeof (struct passwd)); 387 * passwd = new clear text password. 390 * PWU_SUCCESS, passwd found in user's old password history. 393 * PWU_NOT_FOUND, passwd not in user's old password history. 398 files_checkhistory(char *user, char *passwd, pwu_repository_ argument [all...] |
H A D | ldap_attr.c | 99 char *passwd; /* encrypted password */ member in struct:__anon2796 100 struct passwd *pwd; 101 ns_ldap_attr_t **pattrs; /* passwd attrs */ 104 ns_ldap_attr_t **sattrs; /* passwd attrs */ 114 /* passwd attributes filters */ 149 if (p->passwd) { 150 (void) memset(p->passwd, 0, strlen(p->passwd)); 151 free(p->passwd); 194 struct passwd *p [all...] |
/osnet-11/usr/src/lib/libntsvcs/common/ |
H A D | srvsvc_svc.c | 2350 uint8_t *passwd = empty_string; local 2385 info2[i].shi2_passwd = passwd; 2405 info502[i].shi502_passwd = passwd;
|
H A D | ntsvcs_clnt.c | 246 uchar_t passwd[SMB_IPC_MAXPWDLEN]; local 265 smb_ipc_get_passwd(passwd, SMB_IPC_MAXPWDLEN, B_TRUE); 268 rc = smb_kinit(principal, (char *)passwd);
|
/osnet-11/usr/src/lib/libsmbfs/common/ |
H A D | smbfs_ctx.c | 588 smbfs_ctx_setpassword(struct smb_ctx *ctx, const char *passwd, int from_cmd) argument 592 if (passwd == NULL) 594 if (strlen(passwd) >= sizeof (ctx->ct_password)) { 608 if (strncmp(passwd, "$$1", 3) == 0) 609 (void) smbfs_simpledecrypt(ctx->ct_password, passwd); 611 (void) strlcpy(ctx->ct_password, passwd, 1057 struct passwd pw;
|
/osnet-11/usr/src/lib/libsmb/common/ |
H A D | smb_info.c | 55 uint8_t passwd[SMB_IPC_MAXPWDLEN]; /* clear text passwd */ member in struct:__anon2602 403 smb_set_machine_passwd(char *passwd) argument 408 if (smb_config_setstr(SMB_CI_MACHINE_PASSWD, passwd) != SMBD_SMF_OK) 467 (void) memset(ipc_info.passwd, 0, SMB_IPC_MAXPWDLEN); 479 smb_ipc_set(const char *plain_user, const char *passwd) argument 483 if (smb_auth_ntlm_hash(passwd, passwd_hash) != SMBAUTH_SUCCESS) 489 (void) memcpy(ipc_info.passwd, passwd, SMB_IPC_MAXPWDLEN); 521 (void) memset(ipc_info.passwd, 619 smb_setdomainprops(char *fqdn, char *server, char *passwd) argument [all...] |
H A D | smb_auth.c | 556 unsigned char *passwd) 565 return (bcmp(lm_resp, passwd, SMBAUTH_RESP_SZ) == 0); 573 unsigned char *passwd, 584 ok = (bcmp(ntlm_resp, passwd, SMBAUTH_RESP_SZ) == 0); 598 unsigned char *passwd, 614 clnt_blob = &passwd[SMBAUTH_HASH_SZ]; 653 ok = (bcmp(passwd, ntlmv2_resp, pwdlen) == 0); 700 unsigned char *passwd, 722 return (bcmp(passwd, ntlm2_sess_resp, pwdlen) == 0); 730 unsigned char *passwd, 552 smb_lm_password_ok( unsigned char *challenge, uint32_t clen, unsigned char *lm_hash, unsigned char *passwd) argument 569 smb_ntlm_password_ok( unsigned char *challenge, uint32_t clen, unsigned char *ntlm_hash, unsigned char *passwd, unsigned char *session_key) argument 594 smb_ntlmv2_password_ok( unsigned char *challenge, uint32_t clen, unsigned char *ntlm_hash, unsigned char *passwd, int pwdlen, char *domain, char *username, uchar_t *session_key) argument 696 smb_ntlm2_session_password_ok( unsigned char *challenge, uint32_t clen, unsigned char *ntlm_hash, unsigned char *passwd, int pwdlen, unsigned char *nonce, int nlen, uchar_t *session_key) argument 726 smb_lmv2_password_ok( unsigned char *challenge, uint32_t clen, unsigned char *ntlm_hash, unsigned char *passwd, char *domain, char *username) argument 793 smb_auth_validate_lm( unsigned char *challenge, uint32_t clen, smb_passwd_t *smbpw, unsigned char *passwd, int pwdlen, char *domain, char *username) argument 832 smb_auth_validate_nt( unsigned char *challenge, uint32_t clen, smb_passwd_t *smbpw, unsigned char *passwd, int pwdlen, char *domain, char *username, unsigned char *nonce, int nlen, uchar_t *session_key) argument [all...] |
/osnet-11/usr/src/lib/libsmbns/common/ |
H A D | smbns_kpasswd.c | 276 * Pre-condition: fqdn and passwd input parameters have already been validated 280 smb_krb5_kt_update_adjoin(char *fqdn, krb5_kvno kvno, char *passwd, argument 310 fqdn, kvno, kt_flags, passwd)) != 0) { 352 smb_krb5_setpwd(const char *fqdn, char *passwd) argument 386 code = krb5_set_password_using_ccache(ctx, cc, passwd, princ,
|
/osnet-11/usr/src/lib/libfedfs/common/ |
H A D | nsdb_primitives.c | 42 char *passwd; member in struct:cb_param 66 ret = cred->passwd; 185 sasl_param.passwd = pw; 192 sasl_param.passwd = pw; 199 sasl_param.passwd = pw;
|
/osnet-11/usr/src/lib/libpkg/common/ |
H A D | pkgweb.c | 1816 * passwd - password used to encrypt certs 1823 char *passwd) 1865 if ((p12 = sunw_PKCS12_create(passwd, NULL, NULL, cacerts)) == NULL) { 3219 /* first newline found is end of passwd, so nuke it */ 3232 /* unable to collect passwd from given source */ 1822 write_ca_file(PKG_ERR *err, char *tmpdir, STACK_OF(X509) *cacerts, char *passwd) argument
|
/osnet-11/usr/src/lib/krb5/kdb/ |
H A D | kdb5.c | 2345 char *passwd, 2355 passwd, new_kvno, keepold, db_entry); 2341 krb5_dbe_cpw(krb5_context kcontext, krb5_keyblock * master_key, krb5_key_salt_tuple * ks_tuple, int ks_tuple_count, char *passwd, int new_kvno, krb5_boolean keepold, krb5_db_entry * db_entry) argument
|