• Home
  • History
  • Annotate
  • Raw
  • Download
  • only in /macosx-10.10.1/ppp-786.1.1/Helpers/pppd/

Lines Matching defs:passwd

190 /* Set if we got the contents of passwd[] from the pap-secrets file. */
203 int (*pap_auth_hook) __P((char *user, char *passwd, char **msgp,
211 int (*pap_passwd_hook) __P((char *user, char *passwd)) = NULL;
217 int (*chap_passwd_hook) __P((char *user, char *passwd)) = NULL;
267 bool uselogin = 0; /* Use /etc/passwd for checking PAP */
477 { "password", o_string, passwd,
570 if (override_value("passwd", option_priority, fname))
571 strlcpy(passwd, p, sizeof(passwd));
777 if (passwd[0] == 0) {
779 if (!get_pap_passwd(passwd))
782 upap_authwithpeer(unit, user, passwd);
1077 BZERO(passwd, MAXSECRETLEN);
1098 BZERO(passwd, MAXSECRETLEN);
1137 BZERO(passwd, MAXSECRETLEN);
1489 ao->neg_upap = !refuse_pap && (passwd[0] != 0 || get_pap_passwd(NULL));
1491 && (passwd[0] != 0 ||
1499 passwd[0] != 0 ||
1532 * check_passwd - Check the user name and passwd against the PAP secrets
1554 char passwd[256], user[256];
1563 slprintf(passwd, sizeof(passwd), "%.*v", passwdlen, apasswd);
1571 ret = (*pap_auth_hook)(user, passwd, msg, &addrs, &opts);
1575 BZERO(passwd, sizeof(passwd));
1609 if ((ret = plogin(user, passwd, msg)) == UPAP_AUTHACK)
1614 if ((cryptpap || strcmp(passwd, secret) != 0)
1615 && strcmp(crypt(passwd, secret), secret) != 0)
1627 * Frustrate passwd stealer programs.
1649 BZERO(passwd, sizeof(passwd));
1735 plogin(user, passwd, msg)
1737 char *passwd;
1756 PAM_password = passwd;
1790 struct passwd *pw = getpwnam(user);
1815 * If no passwd, don't let them login.
1818 || strcmp(crypt(passwd, pw->pw_passwd), pw->pw_passwd) != 0)
1847 if (pw != (struct passwd *)NULL) {
1967 * Assumes passwd points to MAXSECRETLEN bytes of space (if non-null).
1970 get_pap_passwd(passwd)
1971 char *passwd;
1982 ret = (*pap_passwd_hook)(user, passwd);
1998 if (passwd != NULL)
1999 strlcpy(passwd, secret, MAXSECRETLEN);
2156 if (!am_server && passwd[0] != 0) {
2157 strlcpy(secbuf, passwd, sizeof(secbuf));
2220 if (!am_server && passwd[0] != '\0') {
2221 strlcpy(secret, passwd, MAXWORDLEN);
2782 struct passwd *pw;
2824 if (read_keychainpassword(kSecPreferencesDomainSystem, *argv, 0, passwd, MAXSECRETLEN)) {
2844 if (read_keychainpassword(kSecPreferencesDomainUser, *argv, 0, passwd, MAXSECRETLEN)) {