/opensolaris-onvv-gate/usr/src/lib/pam_modules/authtok_check/ |
H A D | fascist.c | 29 /* attempt reverse engineering of password strings */ 390 char *password; local 397 password = rpassword; 399 (void) strcpy(password, Lowercase(password)); 400 (void) Trim(password); 404 * since password cannot be longer than TRUNCSTRINGSIZE; 411 if (!(a = Mangle(password, r_destructors[i]))) { 420 (void) strlcpy(password, Reverse(password), PATH_MA 437 DictCheck(char *password, char *path) argument [all...] |
/opensolaris-onvv-gate/usr/src/cmd/ssh/sshd/ |
H A D | auth2-passwd.c | 46 char *password; local 55 log("password change not supported"); 56 password = packet_get_string(&len); 62 auth_password(authctxt, password) == 1) { 65 memset(password, 0, len); 66 xfree(password); 70 "password",
|
H A D | auth-passwd.c | 6 * the password is valid for the user. 84 * Tries to authenticate the user using password. Returns true if 88 auth_password(Authctxt *authctxt, const char *password) argument 91 if (*password == '\0' && options.permit_empty_passwd == 0) 93 return auth_pam_password(authctxt, password); 95 if (*password == '\0' && options.permit_empty_passwd == 0) 97 return auth_sia_password(authctxt, password); 122 if (*password == '\0' && options.permit_empty_passwd == 0) 126 int ret = auth_krb5_password(authctxt, password); 134 HANDLE hToken = cygwin_logon_user(pw, password); [all...] |
/opensolaris-onvv-gate/usr/src/lib/libbc/inc/include/rpcsvc/ |
H A D | pwdnm.h | 35 char *password; member in struct:pwdnm
|
/opensolaris-onvv-gate/usr/src/cmd/krb5/kadmin/kpasswd/ |
H A D | kpasswd.h | 38 long read_old_password(krb5_context context, char *password, 41 long read_new_password(void *server_handle, char *password,
|
H A D | tty_kpasswd.c | 58 long read_old_password(context, password, pwsize) 60 char *password; 65 0, password, pwsize); 69 long read_new_password(server_handle, password, pwsize, msg_ret, msg_len, princ) 71 char *password;
|
H A D | kpasswd.c | 59 * Purpose: Initialize and call lower level routines to change a password 65 * read_old_password (f) function to read old password 66 * read_new_password (f) function to read new and change password 73 * 2 old password wrong 76 * 5 password not typed 85 * If argc is 2, the password for the principal specified in argv[1] 89 * read_old_password is then called to prompt for the old password. 92 * read_new_password is called to read the new password and change the 93 * principal's password (presumably ovsec_kadm_chpass_principal). 98 * Changes the principal's password 113 char password[255]; /* I don't really like 255 but that's what kinit uses */ local [all...] |
/opensolaris-onvv-gate/usr/src/lib/libkmsagent/common/ |
H A D | k_setupssl.h | 52 const char *password, /* NULL - SERVER */
|
/opensolaris-onvv-gate/usr/src/lib/libbc/libc/gen/common/ |
H A D | grpauth.c | 38 * password.adjunct file on the system since they do not exist anymore. 45 grpauth(char *name, char *password) argument 49 * this routine authenticates a password for the named user. 58 /* group is not in main password system */ 67 if (strcmp(crypt(password, gr.gr_passwd), gr.gr_passwd) == 0)
|
H A D | pwdauth.c | 37 * password.adjunct file on the system since they do not exist anymore. 44 pwdauth(char *name, char *password) argument 47 * this routine authenticates a password for the named user. 62 /* user is not in main password system */ 70 if (strcmp(crypt(password, enpwp), enpwp) == 0)
|
H A D | pwdnm.c | 41 if (! xdr_wrapstring(xdrs, &objp->password)) {
|
/opensolaris-onvv-gate/usr/src/grub/grub-0.97/util/ |
H A D | grub-md5-crypt.in | 3 # Encrypt a password in MD5 format 35 Encrypt a password in MD5 format. 67 # Prompt to enter a password. 69 read -r password 73 echo -n "Retype password: " 80 if test "x$password" = x; then 81 echo "Empty password is not permitted." 85 if test "x$password" != "x$password2"; then 94 $password
|
/opensolaris-onvv-gate/usr/src/lib/passwdutil/ |
H A D | README.SunOS-aging | 36 The characters are password aging data. Password aging forces the 38 of time. Password aging can also force a user to keep a password for 42 ] Sample entry from /etc/passwd with password aging installed: 47 Note the comma in the encrypted password field. The characters after 48 the comma are used by the password aging mechanism. 58 1: Maximum number of weeks a password can be used without changing. 59 2: Minimum number of weeks a password must be used before changing. 60 3& 4: Last time password was changed, in number of weeks since 1970. 70 user will not be subjected to password aging requirements again. 77 the user is not allowed to change his/her password [all...] |
/opensolaris-onvv-gate/usr/src/lib/gss_mechs/mech_krb5/crypto/des/ |
H A D | afsstring2key.c | 103 unsigned char password[9]; /* trailing nul for crypt() */ local 106 memset (password, 0, sizeof (password)); 107 memcpy (password, realm, min (salt->length, 8)); 109 if (isupper(password[i])) 110 password[i] = tolower(password[i]); 112 password[i] ^= data->data[i]; 114 if (password[i] == '\0') 115 password[ 136 unsigned char *password = malloc(pw_len+1); local [all...] |
/opensolaris-onvv-gate/usr/src/lib/libsmbfs/netsmb/ |
H A D | smb_keychain.h | 46 /* Add a password to the keychain. */ 48 const char *password); 50 /* Delete a password from the keychain. */
|
/opensolaris-onvv-gate/usr/src/lib/pam_modules/ldap/ |
H A D | ldap_authenticate.c | 59 char *password = NULL; local 95 /* Get the password entered in the first scheme if any */ 96 (void) pam_get_item(pamh, PAM_AUTHTOK, (void **) &password); 97 if (password == NULL) { 106 * Authenticate user using the password from PAM_AUTHTOK. 107 * If no password available or if authentication fails 110 result = authenticate(&credp, user, password, NULL); 114 * user's password is good but needs 118 * password after the account management 120 * the password ha [all...] |
/opensolaris-onvv-gate/usr/src/lib/print/libpapi-common/common/ |
H A D | uri.h | 40 * scheme://[[user[:password]@]host[:port]]/path[[#fragment]|[?query]] 46 char *password; member in struct:__anon4684
|
H A D | uri.c | 41 * scheme://[[user[:password]@]host[:port]]/path[[#fragment]|[?query]] 93 char *password = NULL; local 95 for (password = user; (password < host - 1); password++) 96 if (*password == ':') { 97 u->password = strndup(password + 1, 98 host - password - 2); 101 u->user = strndup(user, password [all...] |
/opensolaris-onvv-gate/usr/src/cmd/perl/5.8.4/distrib/lib/Net/t/ |
H A D | netrc.t | 85 login nigol "password" drowssap 87 password p2 89 default login "baz" password p2 90 default "login" baz password p3 101 # on 'foo' with login 'l2', the password is 'p2' 102 is( Net::Netrc->lookup('foo', 'l2')->{password}, 'p2', 105 # the default password is 'p3', as later declarations have priority 106 is( Net::Netrc->lookup()->{password}, 'p3', 110 is( Net::Netrc->lookup('default', 'baz')->{password}, 'p3', 119 for my $accessor (qw( login account password )) { [all...] |
/opensolaris-onvv-gate/usr/src/lib/gss_mechs/mech_krb5/mech/ |
H A D | acquire_cred_with_pw.c | 97 acquire_accept_cred_with_pw(context, minor_status, desired_name, password, cred) 101 const gss_buffer_t password; 112 acquire_init_cred_with_pw(context, minor_status, desired_name, password, cred) 116 const gss_buffer_t password; 127 if (password == NULL || password->length == NULL || 128 password->value == NULL) 130 else if (*((char *)password->value + (password->length - 1)) == '\0') 131 pw = strdup(password [all...] |
/opensolaris-onvv-gate/usr/src/lib/krb5/kadm5/srv/ |
H A D | server_misc.c | 120 /* Check word to see if it's the password */ 138 char *password, int use_policy, kadm5_policy_ent_t pol, 153 if(strlen(password) < pol->pw_min_length) 155 s = password; 177 if((find_word(password) == KADM5_OK)) 182 if (strcasecmp(cp, password) == 0) 186 if (strcasecmp(cp, password) == 0) 191 if (str_check_gecos(ent->pw_gecos, password)) 198 if (strlen(password) < 1) 137 passwd_check(kadm5_server_handle_t handle, char *password, int use_policy, kadm5_policy_ent_t pol, krb5_principal principal) argument
|
/opensolaris-onvv-gate/usr/src/lib/pam_modules/dial_auth/ |
H A D | dial_auth.c | 64 char *password = NULL; local 154 dgettext(TEXT_DOMAIN, "Dialup Password: "), &password); 160 if (strcmp(crypt(password, p2), p2) != 0) { 161 (void) memset(password, 0, strlen(password)); 162 free(password); 165 (void) memset(password, 0, strlen(password)); 166 free(password);
|
/opensolaris-onvv-gate/usr/src/lib/krb5/plugins/kdb/ldap/libkdb_ldap/ |
H A D | ldap_service_stash.c | 45 krb5_ldap_readpassword(context, ldap_context, password) 48 unsigned char **password; 56 *password = NULL; 127 /* password field missing */ 133 /* Extract the plain password / certificate file information */ 139 /* Set *password = {FILE}<path to cert>\0<cert password> */ 142 *password = (unsigned char *)malloc(strlen(start) + 2); 143 if (*password == NULL) { 147 (*password)[strle [all...] |
/opensolaris-onvv-gate/usr/src/lib/pam_modules/sample/ |
H A D | sample_authenticate.c | 50 * first_pass_good (first password is always good when used with use/try) 51 * first_pass_bad (first password is always bad when used with use/try) 52 * pass=foobar (set good password to "foobar". default good password 83 char *firstpass, *password; local 138 * Get the password from the user 156 password = ret_resp->resp; 158 if (password == NULL) { 165 if (strncmp(password, the_password, strlen(the_password)) == 0) { 168 /* this is the first password, stas [all...] |
/opensolaris-onvv-gate/usr/src/lib/print/libpapi-dynamic/common/ |
H A D | service.c | 197 char *password = svc->password; local 202 /* if no API password, try the URI password */ 203 if ((password == NULL) && (svc->uri != NULL)) 204 password = (svc->uri)->password; 206 result = f(&svc->svc_handle, svc->name, user, password, 219 char *password, 238 if (password ! 218 papiServiceCreate(papi_service_t *handle, char *service_name, char *user_name, char *password, int (*authCB)(papi_service_t svc, void *app_data), papi_encryption_t encryption, void *app_data) argument 334 papiServiceSetPassword(papi_service_t handle, char *password) argument [all...] |