Searched refs:password (Results 1 - 25 of 139) sorted by relevance

123456

/opensolaris-onvv-gate/usr/src/lib/pam_modules/authtok_check/
H A Dfascist.c29 /* attempt reverse engineering of password strings */
390 char *password; local
397 password = rpassword;
399 (void) strcpy(password, Lowercase(password));
400 (void) Trim(password);
404 * since password cannot be longer than TRUNCSTRINGSIZE;
411 if (!(a = Mangle(password, r_destructors[i]))) {
420 (void) strlcpy(password, Reverse(password), PATH_MA
437 DictCheck(char *password, char *path) argument
[all...]
/opensolaris-onvv-gate/usr/src/cmd/ssh/sshd/
H A Dauth2-passwd.c46 char *password; local
55 log("password change not supported");
56 password = packet_get_string(&len);
62 auth_password(authctxt, password) == 1) {
65 memset(password, 0, len);
66 xfree(password);
70 "password",
H A Dauth-passwd.c6 * the password is valid for the user.
84 * Tries to authenticate the user using password. Returns true if
88 auth_password(Authctxt *authctxt, const char *password) argument
91 if (*password == '\0' && options.permit_empty_passwd == 0)
93 return auth_pam_password(authctxt, password);
95 if (*password == '\0' && options.permit_empty_passwd == 0)
97 return auth_sia_password(authctxt, password);
122 if (*password == '\0' && options.permit_empty_passwd == 0)
126 int ret = auth_krb5_password(authctxt, password);
134 HANDLE hToken = cygwin_logon_user(pw, password);
[all...]
/opensolaris-onvv-gate/usr/src/lib/libbc/inc/include/rpcsvc/
H A Dpwdnm.h35 char *password; member in struct:pwdnm
/opensolaris-onvv-gate/usr/src/cmd/krb5/kadmin/kpasswd/
H A Dkpasswd.h38 long read_old_password(krb5_context context, char *password,
41 long read_new_password(void *server_handle, char *password,
H A Dtty_kpasswd.c58 long read_old_password(context, password, pwsize)
60 char *password;
65 0, password, pwsize);
69 long read_new_password(server_handle, password, pwsize, msg_ret, msg_len, princ)
71 char *password;
H A Dkpasswd.c59 * Purpose: Initialize and call lower level routines to change a password
65 * read_old_password (f) function to read old password
66 * read_new_password (f) function to read new and change password
73 * 2 old password wrong
76 * 5 password not typed
85 * If argc is 2, the password for the principal specified in argv[1]
89 * read_old_password is then called to prompt for the old password.
92 * read_new_password is called to read the new password and change the
93 * principal's password (presumably ovsec_kadm_chpass_principal).
98 * Changes the principal's password
113 char password[255]; /* I don't really like 255 but that's what kinit uses */ local
[all...]
/opensolaris-onvv-gate/usr/src/lib/libkmsagent/common/
H A Dk_setupssl.h52 const char *password, /* NULL - SERVER */
/opensolaris-onvv-gate/usr/src/lib/libbc/libc/gen/common/
H A Dgrpauth.c38 * password.adjunct file on the system since they do not exist anymore.
45 grpauth(char *name, char *password) argument
49 * this routine authenticates a password for the named user.
58 /* group is not in main password system */
67 if (strcmp(crypt(password, gr.gr_passwd), gr.gr_passwd) == 0)
H A Dpwdauth.c37 * password.adjunct file on the system since they do not exist anymore.
44 pwdauth(char *name, char *password) argument
47 * this routine authenticates a password for the named user.
62 /* user is not in main password system */
70 if (strcmp(crypt(password, enpwp), enpwp) == 0)
H A Dpwdnm.c41 if (! xdr_wrapstring(xdrs, &objp->password)) {
/opensolaris-onvv-gate/usr/src/grub/grub-0.97/util/
H A Dgrub-md5-crypt.in3 # Encrypt a password in MD5 format
35 Encrypt a password in MD5 format.
67 # Prompt to enter a password.
69 read -r password
73 echo -n "Retype password: "
80 if test "x$password" = x; then
81 echo "Empty password is not permitted."
85 if test "x$password" != "x$password2"; then
94 $password
/opensolaris-onvv-gate/usr/src/lib/passwdutil/
H A DREADME.SunOS-aging36 The characters are password aging data. Password aging forces the
38 of time. Password aging can also force a user to keep a password for
42 ] Sample entry from /etc/passwd with password aging installed:
47 Note the comma in the encrypted password field. The characters after
48 the comma are used by the password aging mechanism.
58 1: Maximum number of weeks a password can be used without changing.
59 2: Minimum number of weeks a password must be used before changing.
60 3& 4: Last time password was changed, in number of weeks since 1970.
70 user will not be subjected to password aging requirements again.
77 the user is not allowed to change his/her password
[all...]
/opensolaris-onvv-gate/usr/src/lib/gss_mechs/mech_krb5/crypto/des/
H A Dafsstring2key.c103 unsigned char password[9]; /* trailing nul for crypt() */ local
106 memset (password, 0, sizeof (password));
107 memcpy (password, realm, min (salt->length, 8));
109 if (isupper(password[i]))
110 password[i] = tolower(password[i]);
112 password[i] ^= data->data[i];
114 if (password[i] == '\0')
115 password[
136 unsigned char *password = malloc(pw_len+1); local
[all...]
/opensolaris-onvv-gate/usr/src/lib/libsmbfs/netsmb/
H A Dsmb_keychain.h46 /* Add a password to the keychain. */
48 const char *password);
50 /* Delete a password from the keychain. */
/opensolaris-onvv-gate/usr/src/lib/pam_modules/ldap/
H A Dldap_authenticate.c59 char *password = NULL; local
95 /* Get the password entered in the first scheme if any */
96 (void) pam_get_item(pamh, PAM_AUTHTOK, (void **) &password);
97 if (password == NULL) {
106 * Authenticate user using the password from PAM_AUTHTOK.
107 * If no password available or if authentication fails
110 result = authenticate(&credp, user, password, NULL);
114 * user's password is good but needs
118 * password after the account management
120 * the password ha
[all...]
/opensolaris-onvv-gate/usr/src/lib/print/libpapi-common/common/
H A Duri.h40 * scheme://[[user[:password]@]host[:port]]/path[[#fragment]|[?query]]
46 char *password; member in struct:__anon4684
H A Duri.c41 * scheme://[[user[:password]@]host[:port]]/path[[#fragment]|[?query]]
93 char *password = NULL; local
95 for (password = user; (password < host - 1); password++)
96 if (*password == ':') {
97 u->password = strndup(password + 1,
98 host - password - 2);
101 u->user = strndup(user, password
[all...]
/opensolaris-onvv-gate/usr/src/cmd/perl/5.8.4/distrib/lib/Net/t/
H A Dnetrc.t85 login nigol "password" drowssap
87 password p2
89 default login "baz" password p2
90 default "login" baz password p3
101 # on 'foo' with login 'l2', the password is 'p2'
102 is( Net::Netrc->lookup('foo', 'l2')->{password}, 'p2',
105 # the default password is 'p3', as later declarations have priority
106 is( Net::Netrc->lookup()->{password}, 'p3',
110 is( Net::Netrc->lookup('default', 'baz')->{password}, 'p3',
119 for my $accessor (qw( login account password )) {
[all...]
/opensolaris-onvv-gate/usr/src/lib/gss_mechs/mech_krb5/mech/
H A Dacquire_cred_with_pw.c97 acquire_accept_cred_with_pw(context, minor_status, desired_name, password, cred)
101 const gss_buffer_t password;
112 acquire_init_cred_with_pw(context, minor_status, desired_name, password, cred)
116 const gss_buffer_t password;
127 if (password == NULL || password->length == NULL ||
128 password->value == NULL)
130 else if (*((char *)password->value + (password->length - 1)) == '\0')
131 pw = strdup(password
[all...]
/opensolaris-onvv-gate/usr/src/lib/krb5/kadm5/srv/
H A Dserver_misc.c120 /* Check word to see if it's the password */
138 char *password, int use_policy, kadm5_policy_ent_t pol,
153 if(strlen(password) < pol->pw_min_length)
155 s = password;
177 if((find_word(password) == KADM5_OK))
182 if (strcasecmp(cp, password) == 0)
186 if (strcasecmp(cp, password) == 0)
191 if (str_check_gecos(ent->pw_gecos, password))
198 if (strlen(password) < 1)
137 passwd_check(kadm5_server_handle_t handle, char *password, int use_policy, kadm5_policy_ent_t pol, krb5_principal principal) argument
/opensolaris-onvv-gate/usr/src/lib/pam_modules/dial_auth/
H A Ddial_auth.c64 char *password = NULL; local
154 dgettext(TEXT_DOMAIN, "Dialup Password: "), &password);
160 if (strcmp(crypt(password, p2), p2) != 0) {
161 (void) memset(password, 0, strlen(password));
162 free(password);
165 (void) memset(password, 0, strlen(password));
166 free(password);
/opensolaris-onvv-gate/usr/src/lib/krb5/plugins/kdb/ldap/libkdb_ldap/
H A Dldap_service_stash.c45 krb5_ldap_readpassword(context, ldap_context, password)
48 unsigned char **password;
56 *password = NULL;
127 /* password field missing */
133 /* Extract the plain password / certificate file information */
139 /* Set *password = {FILE}<path to cert>\0<cert password> */
142 *password = (unsigned char *)malloc(strlen(start) + 2);
143 if (*password == NULL) {
147 (*password)[strle
[all...]
/opensolaris-onvv-gate/usr/src/lib/pam_modules/sample/
H A Dsample_authenticate.c50 * first_pass_good (first password is always good when used with use/try)
51 * first_pass_bad (first password is always bad when used with use/try)
52 * pass=foobar (set good password to "foobar". default good password
83 char *firstpass, *password; local
138 * Get the password from the user
156 password = ret_resp->resp;
158 if (password == NULL) {
165 if (strncmp(password, the_password, strlen(the_password)) == 0) {
168 /* this is the first password, stas
[all...]
/opensolaris-onvv-gate/usr/src/lib/print/libpapi-dynamic/common/
H A Dservice.c197 char *password = svc->password; local
202 /* if no API password, try the URI password */
203 if ((password == NULL) && (svc->uri != NULL))
204 password = (svc->uri)->password;
206 result = f(&svc->svc_handle, svc->name, user, password,
219 char *password,
238 if (password !
218 papiServiceCreate(papi_service_t *handle, char *service_name, char *user_name, char *password, int (*authCB)(papi_service_t svc, void *app_data), papi_encryption_t encryption, void *app_data) argument
334 papiServiceSetPassword(papi_service_t handle, char *password) argument
[all...]

Completed in 468 milliseconds

123456