/sssd-io/src/util/ |
H A D | memory.c | 35 char *password = (char *)memctx; local 38 /* zero out password */ 39 for (i = 0; password[i]; i++) password[i] = '\0';
|
H A D | tev_curl.h | 247 * @brief Force HTTP basic authentication with @username and @password. 251 * @param[in] password 259 const char *password);
|
H A D | authtok.h | 36 * @return An sss_authtok_type (empty, password, ...) 65 * @param len The length of the password string 69 * EACCESS if the token is not a password token 75 * @brief Set a password into an auth token, replacing any previous data 79 * @param password A string 81 * then strlen(password) will be used internally. 87 const char *password, size_t len); 100 * EACCESS if the token is not a password token 159 * @brief Uses safezero to wipe the password from memory if the 160 * authtoken contains a password, otherwis [all...] |
/sssd-io/src/tests/multihost/basic/ |
H A D | test_basic.py | 14 username='foo1', password='Secret123') 25 username='foo2', password='Secret123') 42 username='foo3', password='Secret123') 82 username='foo4', password='Secret123') 93 username='foo4', password='Secret123')
|
/sssd-io/src/sss_client/libwbclient/ |
H A D | wbc_pam_sssd.c | 26 /* Authenticate a username/password pair */ 28 const char *password) 35 params.password.plaintext = password; 111 /* Change a password for a user with more detailed information upon failure */ 128 /* Change a password for a user */ 180 wbcErr wbcCredentialSave(const char *user, const char *password) argument 27 wbcAuthenticateUser(const char *username, const char *password) argument
|
H A D | wbc_ctx_sssd.c | 301 const char *password) 363 const char *user, const char *password) 299 wbcCtxAuthenticateUser(struct wbcContext *ctx, const char *username, const char *password) argument 362 wbcCtxCredentialSave(struct wbcContext *ctx, const char *user, const char *password) argument
|
H A D | wbclient_sssd.h | 265 } password; member in struct:wbcAuthUserParams 274 const char *password; member in struct:wbcLogonUserParams 402 #define WBC_ACB_PWNOTREQ 0x00000004 /* 1 User password not required */ 409 #define WBC_ACB_PWNOEXP 0x00000200 /* 1 User password does not expire */ 411 #define WBC_ACB_ENC_TXT_PWD_ALLOWED 0x00000800 /* 1 Encryped text password is allowed */ 1634 * @brief Authenticate a username/password pair 1638 * @param password Clear text password os user 1644 const char *password); 1647 * @brief Authenticate a username/password pai [all...] |
/sssd-io/src/tools/ |
H A D | sss_obfuscate | 15 parser.set_description("sss_obfuscate converts a given password into \ 18 file. The password can be passed in by stdin, \ 23 help="Read the password from stdin.") 26 help="The domain to use the password in (mandatory)", 50 pprompt = lambda: (getpass.getpass("Enter password: "), 51 getpass.getpass("Re-enter password: ")) 65 password = p1 76 password = sys.stdin.read() 80 # Obfuscate the password 81 obfobj = pysss.password() [all...] |
H A D | sss_seed.c | 45 char *password; member in struct:user_ctx 184 char *password = NULL; local 195 temp = getpass("Enter temporary password:"); 197 DEBUG(SSSDBG_OP_FAILURE, "Failed to get prompted password\n"); 209 password = talloc_strdup(tmp_ctx, temp); 210 if (password == NULL) { 215 talloc_set_destructor((TALLOC_CTX *)password, password_destructor); 217 temp = getpass("Enter temporary password again:"); 219 DEBUG(SSSDBG_OP_FAILURE, "Failed to get prompted password\n"); 224 if (strncmp(temp,password,strle 243 char *password = NULL; local [all...] |
/sssd-io/src/util/crypto/ |
H A D | sss_crypto.h | 54 int sss_password_encrypt(TALLOC_CTX *mem_ctx, const char *password, int plen, 58 char **password);
|
/sssd-io/src/tests/python/sssd/testlib/common/ |
H A D | libkrb5.py | 11 Default Admin password is "Secret123" 15 """ Initialize realm, host, ports, Kerberos admin password """ 101 password=self.admin_password, 152 password=None, 158 :param str password: password ('Secret123') 170 " -pw %s %s@%s" % (password, principal, 176 " -pw %s %s/%s" % (password, service, 'admin')
|
H A D | utils.py | 113 :param str admin_password: Administrator password required to join 252 def auth_from_client(self, username, password): 255 :param str password: Login password of user 266 expect_script += 'send "' + password + '\r"\n' 397 bindpw(str): Bind password 513 password = user_attr['userPassword'] 515 password = 'Secret123' 537 'gidNumber': gidnumber, 'userPassword': password, 803 password [all...] |
/sssd-io/src/tests/ |
H A D | krb5_child-test.c | 159 const char *password) 173 ret = sss_authtok_set_password(pd->authtok, password, 0); 189 const char *password, const char *realm, 219 kr->pd = create_dummy_pam_data(kr, user, password); 408 char *password = NULL; local 418 { "password", 'w', POPT_ARG_STRING, &pc_passwd, 0, 420 { "ask-password", 'W', POPT_ARG_NONE, NULL, 'W', 442 password = getpass("Enter password:"); 443 if (!password) { 158 create_dummy_pam_data(TALLOC_CTX *mem_ctx, const char *user, const char *password) argument 188 create_dummy_req(TALLOC_CTX *mem_ctx, const char *user, const char *password, const char *realm, const char *ccname, const char *ccname_template, int timeout) argument [all...] |
H A D | crypto-tests.c | 53 const char *password[] = { "test123", /* general */ local 73 for (i=0; password[i]; i++) { 74 ret = sss_password_encrypt(test_ctx, password[i], strlen(password[i])+1, 81 fail_if(ctpwd && strcmp(password[i], ctpwd) != 0);
|
H A D | tcurl_test_tool.c | 54 const char *password; member in struct:tool_options 215 if (opts->username != NULL && opts->password != NULL) { 217 opts->password); 335 { "password", '\0', POPT_ARG_STRING, &opts.password, '\0', "Password for basic authentication", NULL },
|
/sssd-io/src/providers/krb5/ |
H A D | krb5_delayed_online_authentication.c | 75 char *password; local 80 keysize = keyctl_read_alloc(pd->key_serial, (void **)&password); 88 ret = sss_authtok_set_password(pd->authtok, password, keysize); 89 safezero(password, keysize); 90 free(password); 93 "failed to set password in auth token [%d][%s].\n", 277 const char *password; local 280 ret = sss_authtok_get_password(new_pd->authtok, &password, &len); 283 "Failed to get password [%d][%s].\n", ret, strerror(ret)); 289 new_pd->key_serial = add_key("user", new_pd->user, password, le [all...] |
H A D | krb5_auth.c | 253 const char *password = NULL; local 256 ret = sss_authtok_get_password(pd->authtok, &password, NULL); 259 "Failed to get password [%d] %s. Delayed authentication is only " 260 "available for password authentication (single factor).\n", 268 password, cdb, true, NULL, NULL); 340 const char *password = NULL; local 350 * as the cached password. 360 ret = sss_authtok_get_2fa(pd->authtok, &password, &password_len, 372 ret = sss_authtok_get_password(pd->authtok, &password, NULL); 380 ret = sss_authtok_get_password(pd->newauthtok, &password, NUL [all...] |
/sssd-io/src/tests/intg/ |
H A D | kdc.py | 89 def add_principal(self, princ, password=None): 91 if password is None: 94 args += ["addprinc -pw %s %s" % (password, princ)]
|
H A D | krb5utils.py | 60 def kinit(self, principal, password, env=None): 62 return self._run_in_env(args, password.encode('utf-8'), env)
|
H A D | ds_openldap.py | 39 def hash_password(password): 40 """Generate userPassword value for a password.""" 42 hash = hashlib.sha1(password.encode('utf-8')) 61 admin_pw Administrator password.
|
/sssd-io/src/responder/pam/ |
H A D | pam_LOCAL_domain.c | 160 const char *password; local 167 ret = sss_authtok_get_password(pd->newauthtok, &password, NULL); 182 ret = s3crypt_sha512(lreq, password, salt, &new_hash); 228 const char *password; local 293 "allowing root to reset a password.\n"); 296 ret = sss_authtok_get_password(pd->authtok, &password, NULL); 297 NEQ_CHECK_OR_JUMP(ret, EOK, "Failed to get password.\n", 301 NULL_CHECK_OR_JUMP(pwdhash, "No password stored.\n", 304 "user: [%s], password hash: [%s]\n", username, pwdhash); 306 ret = s3crypt_sha512(lreq, password, pwdhas [all...] |
/sssd-io/src/util/crypto/libcrypto/ |
H A D | crypto_obfuscate.c | 28 * Please note that password obfuscation does not improve security in any 29 * way. It is just a mechanism to make the password human-unreadable. If you 69 int sss_password_encrypt(TALLOC_CTX *mem_ctx, const char *password, int plen, argument 135 if (!EVP_EncryptUpdate(ctx, cryptotext, &ctlen, (const unsigned char *)password, plen)) { 197 char **password) 303 *password = talloc_move(mem_ctx, &pwdbuf); 196 sss_password_decrypt(TALLOC_CTX *mem_ctx, char *b64encoded, char **password) argument
|
/sssd-io/src/util/crypto/nss/ |
H A D | nss_obfuscate.c | 27 * Please note that password obfuscation does not improve security in any 28 * way. It is just a mechanism to make the password human-unreadable. If you 61 int sss_password_encrypt(TALLOC_CTX *mem_ctx, const char *password, int plen, argument 114 plaintext = (unsigned char *) talloc_strndup(tmp_ctx, password, plen); 196 char **password) 323 *password = talloc_move(mem_ctx, &pwdbuf); 195 sss_password_decrypt(TALLOC_CTX *mem_ctx, char *b64encoded, char **password) argument
|
/sssd-io/src/providers/proxy/ |
H A D | proxy_child.c | 69 const char *password; local 89 &password, &pwlen); 93 memcpy(reply[i].resp, password, pwlen + 1); 120 const char *password; local 142 &password, &pwlen); 146 memcpy(reply[i].resp, password, pwlen + 1); 152 &password, &pwlen); 156 memcpy(reply[i].resp, password, pwlen + 1);
|
/sssd-io/src/python/ |
H A D | pysss.c | 75 * The sss.password object 961 "Obfuscate a password\n\n" 962 ":param password: The password to obfuscate\n\n" 968 char *password = NULL; local 978 &password, &plen, &mode)) { 988 ret = sss_password_encrypt(tctx, password, plen+1, 1007 "Deobfuscate a password\n\n" 1008 ":param obfpwd: The password to convert back to clear text\n\n"); 1014 char *password [all...] |