Searched refs:pw (Results 1 - 20 of 20) sorted by relevance

/dovecot/src/auth/
H A Ddb-passwd-file.c29 passwd_file_add(struct passwd_file *pw, const char *username, argument
38 if (hash_table_lookup(pw->users, username) != NULL) {
40 pw->path, username);
44 pu = p_new(pw->pool, struct passwd_user, 1);
45 user = p_strdup(pw->pool, username);
57 pu->password = p_strconcat(pw->pool, "{PLAIN-MD5}",
60 pu->password = p_strconcat(pw->pool, "{DIGEST-MD5}",
65 pw->path, username);
69 pu->password = p_strconcat(pw->pool, "{CRYPT}",
73 pu->password = p_strdup(pw
154 struct passwd_file *pw; local
166 passwd_file_open(struct passwd_file *pw, bool startup, const char **error_r) argument
235 passwd_file_close(struct passwd_file *pw) argument
244 passwd_file_free(struct passwd_file *pw) argument
254 passwd_file_sync(struct auth_request *request, struct passwd_file *pw) argument
433 struct passwd_file *pw; local
[all...]
H A Dpassdb-passwd.c45 struct passwd pw; local
49 res = passwd_lookup(request, &pw);
55 ret = auth_request_password_verify(request, password, pw.pw_passwd,
59 safe_memset(pw.pw_passwd, 0, strlen(pw.pw_passwd));
67 auth_request_set_field(request, "user", pw.pw_name, NULL);
76 struct passwd pw; local
79 res = passwd_lookup(request, &pw);
85 auth_request_set_field(request, "user", pw.pw_name, NULL);
86 passdb_handle_credentials(PASSDB_RESULT_OK, pw
[all...]
H A Dpassword-scheme-md5crypt.c49 const char *password_generate_md5_crypt(const char *pw, const char *salt) argument
57 size_t pw_len = strlen(pw);
76 md5_update(&ctx,pw,pw_len);
84 /* Then just as many characters of the MD5(pw,salt,pw) */
86 md5_update(&ctx1,pw,pw_len);
88 md5_update(&ctx1,pw,pw_len);
101 md5_update(&ctx, pw+j, 1);
119 md5_update(&ctx1,pw,pw_len);
127 md5_update(&ctx1,pw,pw_le
[all...]
H A Dpassdb-bsdauth.c20 struct passwd pw; local
26 switch (i_getpwnam(request->user, &pw)) {
44 safe_memset(pw.pw_passwd, 0, strlen(pw.pw_passwd));
53 auth_request_set_field(request, "user", pw.pw_name, NULL);
H A Dpassword-scheme-otp.c15 int password_generate_otp(const char *pw, const char *state_data, argument
37 otp_hash(state.algo, state.seed, pw, state.seq, state.hash);
H A Dpassword-scheme-rpa.c28 void password_generate_rpa(const char *pw, unsigned char result[]) argument
33 ucs2be_pw = ucs2be_str(unsafe_data_stack_pool, pw, &size);
H A Duserdb-passwd.c85 struct passwd pw; local
94 ret = i_getpwnam(auth_request->user, &pw);
110 auth_request_set_field(auth_request, "user", pw.pw_name, NULL);
113 pw.pw_name);
114 auth_request_set_userdb_field(auth_request, "uid", dec2str(pw.pw_uid));
115 auth_request_set_userdb_field(auth_request, "gid", dec2str(pw.pw_gid));
116 auth_request_set_userdb_field(auth_request, "home", pw.pw_dir);
145 passwd_iterate_want_pw(struct passwd *pw, const struct auth_settings *set) argument
149 if (pw->pw_uid < (uid_t)set->first_valid_uid)
151 if (pw
165 struct passwd *pw; local
[all...]
H A Dpassword-scheme.h86 const char *password_generate_md5_crypt(const char *pw, const char *salt);
87 int password_generate_otp(const char *pw, const char *state_data,
90 void password_generate_rpa(const char *pw, unsigned char result[]);
H A Duserdb.c61 struct passwd pw; local
70 switch (i_getpwnam(str, &pw)) {
81 return pw.pw_uid;
H A Dauth-master-connection.c395 struct passwd pw; local
398 if (i_getpwuid(conn->userdb_restricted_uid, &pw) <= 0)
401 namestr = t_strdup_printf("(%s)", pw.pw_name);
/dovecot/src/lib/
H A Dhome-expand.c12 struct passwd pw; local
30 switch (i_getpwnam(name, &pw)) {
39 home = pw.pw_dir;
H A Deacces-error.c155 struct passwd pw; local
177 switch (i_getpwuid(geteuid(), &pw)) {
185 pw_name = t_strdup(pw.pw_name);
251 if (pw_name != NULL && i_getpwuid(st.st_uid, &pw) > 0 &&
252 strcmp(pw.pw_name, pw_name) == 0) {
H A Dmkdir-parents.c66 struct passwd pw; local
68 if (i_getpwuid(uid, &pw) > 0)
69 str_printfa(str, "(%s)", pw.pw_name);
H A Dioloop-notify-inotify.c155 struct passwd pw; local
159 if (i_getpwuid(uid, &pw) <= 0)
163 dec2str(uid), pw.pw_name);
H A Drestrict-access.c35 struct passwd pw; local
39 if (i_getpwuid(uid, &pw) <= 0)
42 ret = t_strdup_printf("%s(%s)", dec2str(uid), pw.pw_name);
/dovecot/src/lda/
H A Dmain.c383 struct passwd pw; local
388 /* no need for a pw lookup */
390 } else if ((ret = i_getpwuid(process_euid, &pw)) > 0) {
391 user = t_strdup(pw.pw_name);
393 env_put(t_strconcat("HOME=", pw.pw_dir, NULL));
/dovecot/src/plugins/mail-crypt/
H A Dmail-crypt-key.c216 const char *enc_hash = NULL, *key_hash = NULL, *pw = NULL; local
249 pw = mail_user_plugin_getenv(user, MAIL_CRYPT_USERENV_PASSWORD);
250 if (pw == NULL) {
274 bool res = dcrypt_key_load_private(&key, data, pw, dec_key, error_r);
419 const char *pw = NULL; local
431 (pw = mail_user_plugin_getenv(user,MAIL_CRYPT_USERENV_PASSWORD))
438 pw, enc_key, error_r)) {
/dovecot/src/master/
H A Dmain.c90 struct passwd pw; local
98 switch (i_getpwnam(user, &pw)) {
106 *uid_r = pw.pw_uid;
107 *gid_r = pw.pw_gid;
H A Dmaster-settings.c422 struct passwd pw; local
456 if (i_getpwnam(set->default_login_user, &pw) == 0) {
461 if (i_getpwnam(set->default_internal_user, &pw) == 0) {
/dovecot/src/lib-storage/
H A Dmail-storage-service.c359 struct passwd pw; local
364 switch (i_getpwnam(str, &pw)) {
372 *uid_r = pw.pw_uid;

Completed in 1037 milliseconds