Home
last modified time | relevance | path

Searched refs:password (Results 1 – 25 of 151) sorted by relevance

1234567

/illumos-gate/usr/src/lib/pam_modules/authtok_check/
H A Dfascist.c390 char *password; in FascistLook() local
397 password = rpassword; in FascistLook()
399 (void) strcpy(password, Lowercase(password)); in FascistLook()
400 (void) Trim(password); in FascistLook()
411 if (!(a = Mangle(password, r_destructors[i]))) { in FascistLook()
420 (void) strlcpy(password, Reverse(password), PATH_MAX); in FascistLook()
425 if (!(a = Mangle(password, r_destructors[i]))) { in FascistLook()
437 DictCheck(char *password, char *path) in DictCheck() argument
445 r = FascistLook(pwp, password); in DictCheck()
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/crypto/des/
H A Dafsstring2key.c105 memset (password, 0, sizeof (password)); in mit_afs_string_to_key()
108 if (isupper(password[i])) in mit_afs_string_to_key()
109 password[i] = tolower(password[i]); in mit_afs_string_to_key()
113 if (password[i] == '\0') in mit_afs_string_to_key()
114 password[i] = 'X'; in mit_afs_string_to_key()
115 password[8] = '\0'; in mit_afs_string_to_key()
126 memset(password, 0, (size_t) sizeof(password)); in mit_afs_string_to_key()
142 password[i] = realm[j]; in mit_afs_string_to_key()
143 if (isupper(password[i])) in mit_afs_string_to_key()
144 password[i] = tolower(password[i]); in mit_afs_string_to_key()
[all …]
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/mech/
H A Dacquire_cred_with_pw.c99 const gss_buffer_t password;
114 const gss_buffer_t password;
125 if (password == NULL || password->length == 0 ||
126 password->value == NULL)
128 else if (*((char *)password->value + (password->length - 1)) == '\0')
129 pw = strdup(password->value);
137 (void) strlcat(pw, password->value, password->length + 1);
212 const gss_buffer_t password;
323 password, cred))
343 desired_name, password, cred))
[all …]
/illumos-gate/usr/src/lib/sasl_plugins/login/
H A Dlogin.c174 sasl_secret_t *password; in login_server_mech_step() local
190 password = in login_server_mech_step()
192 if (!password) { in login_server_mech_step()
198 password->data[clientinlen] = '\0'; in login_server_mech_step()
199 password->len = clientinlen; in login_server_mech_step()
214 (char *)password->data, password->len); in login_server_mech_step()
223 (char *)password->data, password->len); in login_server_mech_step()
311 sasl_secret_t *password; member
383 if (text->password == NULL) { in login_client_mech_step()
427 if (!text->password) { in login_client_mech_step()
[all …]
/illumos-gate/usr/src/lib/print/libpapi-common/common/
H A Duri.c93 char *password = NULL; in uri_from_string() local
95 for (password = user; (password < host - 1); password++) in uri_from_string()
96 if (*password == ':') { in uri_from_string()
97 u->password = strndup(password + 1, in uri_from_string()
98 host - password - 2); in uri_from_string()
101 u->user = strndup(user, password - user); in uri_from_string()
188 (uri->password ? ":" : ""), in uri_to_string()
189 (uri->password ? uri->password : ""), in uri_to_string()
218 if (uri->password != NULL) in uri_free()
219 free(uri->password); in uri_free()
[all …]
/illumos-gate/usr/src/cmd/krb5/kadmin/kpasswd/
H A Dkpasswd.c113 char password[255]; /* I don't really like 255 but that's what kinit uses */ local
193 pwsize = sizeof(password);
194 code = read_old_password(context, password, &pwsize);
197 memset(password, 0, sizeof(password));
204 memset(password, 0, sizeof(password));
224 code = kadm5_init_with_password(princ_str, password, cpw_service,
333 pwsize = sizeof(password);
334 code = read_new_password(server_handle, password, &pwsize, msg_ret, sizeof (msg_ret), princ);
335 memset(password, 0, sizeof(password));
H A Dtty_kpasswd.c56 long read_old_password(context, password, pwsize) in read_old_password() argument
58 char *password;
63 0, password, pwsize);
67 long read_new_password(server_handle, password, pwsize, msg_ret, msg_len, princ) in read_new_password() argument
69 char *password;
/illumos-gate/usr/src/lib/pam_modules/dial_auth/
H A Ddial_auth.c62 char *password = NULL; in pam_sm_authenticate() local
152 dgettext(TEXT_DOMAIN, "Dialup Password: "), &password); in pam_sm_authenticate()
158 if (strcmp(crypt(password, p2), p2) != 0) { in pam_sm_authenticate()
159 (void) memset(password, 0, strlen(password)); in pam_sm_authenticate()
160 free(password); in pam_sm_authenticate()
163 (void) memset(password, 0, strlen(password)); in pam_sm_authenticate()
164 free(password); in pam_sm_authenticate()
/illumos-gate/usr/src/lib/print/libpapi-ipp/common/
H A Dservice.c120 char *user_name, char *password, in papiServiceCreate() argument
137 if (password != NULL) in papiServiceCreate()
138 svc->password = strdup(password); in papiServiceCreate()
173 if (svc->password != NULL) in papiServiceDestroy()
174 free(svc->password); in papiServiceDestroy()
213 if (svc->password != NULL) in papiServiceSetPassword()
214 free(svc->password); in papiServiceSetPassword()
215 svc->password = NULL; in papiServiceSetPassword()
216 if (password != NULL) in papiServiceSetPassword()
217 svc->password = strdup(password); in papiServiceSetPassword()
[all …]
/illumos-gate/usr/src/lib/krb5/plugins/kdb/ldap/libkdb_ldap/
H A Dldap_service_stash.c43 krb5_ldap_readpassword(context, ldap_context, password) in krb5_ldap_readpassword() argument
46 unsigned char **password;
54 *password = NULL;
141 if (*password == NULL) {
145 (*password)[strlen(start) + 1] = '\0';
146 (*password)[strlen(start)] = '\0';
148 strcpy((char *)(*password), start);
177 *password = PT.value;
184 if (*password)
185 free (*password);
[all …]
H A Dkdb_ldap_conn.c51 unsigned char *password=NULL; in krb5_validate_ldap_context() local
69 if ((st=krb5_ldap_readpassword(context, ldap_context, &password)) != 0) { in krb5_validate_ldap_context()
75 if (!strncmp("{FILE}", (char *)password, 6)) { in krb5_validate_ldap_context()
77 ldap_context->service_cert_path = strdup((char *)password + strlen("{FILE}")); in krb5_validate_ldap_context()
83 if (password[strlen((char *)password) + 1] == '\0') in krb5_validate_ldap_context()
86 ldap_context->service_cert_pass = strdup((char *)password + in krb5_validate_ldap_context()
87 strlen((char *)password) + 1); in krb5_validate_ldap_context()
94 free(password); in krb5_validate_ldap_context()
96 ldap_context->bind_pwd = (char *)password; in krb5_validate_ldap_context()
/illumos-gate/usr/src/lib/print/libpapi-dynamic/common/
H A Dservice.c192 char *password = svc->password; in service_connect() local
199 password = (svc->uri)->password; in service_connect()
214 char *password, in papiServiceCreate() argument
233 if (password != NULL) in papiServiceCreate()
234 svc->password = strdup(password); in papiServiceCreate()
281 if (svc->password != NULL) in papiServiceDestroy()
282 free(svc->password); in papiServiceDestroy()
338 free(svc->password); in papiServiceSetPassword()
339 if (password != NULL) in papiServiceSetPassword()
340 svc->password = strdup(password); in papiServiceSetPassword()
[all …]
/illumos-gate/usr/src/lib/smbsrv/libmlsvc/common/
H A Dnetr_auth.c469 bzero(netr_info->password, sizeof (netr_info->password)); in netr_gen_skey128()
471 (char *)netr_info->password, sizeof (netr_info->password)); in netr_gen_skey128()
473 if ((rc != SMBD_SMF_OK) || *netr_info->password == '\0') { in netr_gen_skey128()
479 explicit_bzero(&netr_info->password, in netr_gen_skey128()
480 sizeof (netr_info->password)); in netr_gen_skey128()
527 explicit_bzero(&netr_info->password, sizeof (netr_info->password)); in netr_gen_skey128()
584 bzero(netr_info->password, sizeof (netr_info->password)); in netr_gen_skey64()
586 (char *)netr_info->password, sizeof (netr_info->password)); in netr_gen_skey64()
588 if ((rc != SMBD_SMF_OK) || *netr_info->password == '\0') { in netr_gen_skey64()
615 explicit_bzero(&netr_info->password, sizeof (netr_info->password)); in netr_gen_skey64()
[all …]
/illumos-gate/usr/src/lib/passwdutil/
H A DREADME.SunOS-aging36 The characters are password aging data. Password aging forces the
38 of time. Password aging can also force a user to keep a password for
42 ] Sample entry from /etc/passwd with password aging installed:
47 Note the comma in the encrypted password field. The characters after
48 the comma are used by the password aging mechanism.
60 3& 4: Last time password was changed, in number of weeks since 1970.
70 user will not be subjected to password aging requirements again.
77 the user is not allowed to change his/her password. Only root can
78 change that users password.
81 aging data. An account with an expired password can be su'd to
[all …]
/illumos-gate/usr/src/lib/pam_modules/passwd_auth/
H A Dpasswd_auth.c69 char *password; in pam_sm_authenticate() local
115 res = pam_get_item(pamh, PAM_AUTHTOK, (void **)&password); in pam_sm_authenticate()
119 if (password != NULL) in pam_sm_authenticate()
195 &password); in pam_sm_authenticate()
199 if (password == NULL) { in pam_sm_authenticate()
262 if (strcmp(crypt(password, rep_passwd), rep_passwd) != 0) { in pam_sm_authenticate()
305 retval = pam_set_item(pamh, PAM_AUTHTOK, (void *)password); in pam_sm_authenticate()
308 if (password) { in pam_sm_authenticate()
309 (void) memset(password, 0, strlen(password)); in pam_sm_authenticate()
310 free(password); in pam_sm_authenticate()
/illumos-gate/usr/src/lib/krb5/kadm5/srv/
H A Dserver_misc.c138 char *password, int use_policy, kadm5_policy_ent_t pol, in passwd_check() argument
153 if(strlen(password) < pol->pw_min_length) in passwd_check()
155 s = password; in passwd_check()
177 if((find_word(password) == KADM5_OK)) in passwd_check()
182 if (strcasecmp(cp, password) == 0) in passwd_check()
186 if (strcasecmp(cp, password) == 0) in passwd_check()
191 if (str_check_gecos(ent->pw_gecos, password)) in passwd_check()
198 if (strlen(password) < 1) in passwd_check()
/illumos-gate/usr/src/grub/grub-0.97/util/
H A Dgrub-md5-crypt.in35 Encrypt a password in MD5 format.
69 read -r password
80 if test "x$password" = x; then
85 if test "x$password" != "x$password2"; then
94 $password
/illumos-gate/usr/src/lib/sasl_plugins/plain/
H A Dplain.c106 const char *password; in plain_server_mech_step() local
149 password = clientin + lup; in plain_server_mech_step()
152 password_len = clientin + lup - password; in plain_server_mech_step()
174 strncpy(passcopy, password, password_len); in plain_server_mech_step()
216 params->transition(params->utils->conn, password, password_len); in plain_server_mech_step()
312 sasl_secret_t *password = NULL; in plain_client_mech_step() local
351 if (password == NULL) { in plain_client_mech_step()
352 pass_result = _plug_get_password(params->utils, &password, in plain_client_mech_step()
406 if (!password) { in plain_client_mech_step()
428 + password->len); in plain_client_mech_step()
[all …]
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/
H A Dgic_pwd.c55 krb5_data *password; in krb5_get_as_key_password() local
63 password = (krb5_data *) gak_data; in krb5_get_as_key_password()
80 if (password->data[0] == '\0') { in krb5_get_as_key_password()
95 prompt.reply = password; in krb5_get_as_key_password()
130 char *password, in krb5_get_init_creds_password() argument
160 char *password, in __krb5_get_init_creds_password() argument
191 if (password && password[0]) { in __krb5_get_init_creds_password()
196 strcpy(pw0.data, password); in __krb5_get_init_creds_password()
594 if (password) { in krb5_get_in_tkt_with_password()
595 pw0.length = strlen(password); in krb5_get_in_tkt_with_password()
[all …]
/illumos-gate/usr/src/lib/pam_modules/krb5/
H A Dkrb5_acct_mgmt.c65 char *cpw_service, *password; in fetch_princ_entry() local
70 password = kmd->password; in fetch_princ_entry()
83 if (strlen(password) == 0) { in fetch_princ_entry()
108 code = kadm5_init_with_password(kprinc, password, cpw_service, in fetch_princ_entry()
175 char messages[PAM_MAX_NUM_MSG][PAM_MAX_MSG_SIZE], *password; in exp_warn() local
183 password = kmd->password; in exp_warn()
185 if (!pamh || !user || !password) { in exp_warn()
459 !nowarn && kmd->password) { in pam_sm_acct_mgmt()
/illumos-gate/usr/src/boot/forth/
H A Dcheck-password.4th26 marker task-check-password.4th
30 vocabulary password-processing
31 only forth also password-processing definitions
107 \ password, otherwise augment the key to a string.
131 only forth definitions also password-processing
133 : check-password ( -- )
143 3000 ms ." loader: incorrect password" 10 emit
157 \ Exit if a password was not set
158 s" password" getenv -1 = if exit else drop then
168 s" password" getenv dup readmax > if drop readmax then
[all …]
/illumos-gate/usr/src/lib/pam_modules/authtok_get/
H A Dauthtok_get.c224 char *password; in pam_sm_authenticate() local
257 res = pam_get_item(pamh, PAM_AUTHTOK, (void **)&password); in pam_sm_authenticate()
261 if (password != NULL) in pam_sm_authenticate()
328 dgettext(TEXT_DOMAIN, "Password: "), &password); in pam_sm_authenticate()
332 if (password != NULL) { in pam_sm_authenticate()
333 (void) pam_set_item(pamh, PAM_AUTHTOK, (void *)password); in pam_sm_authenticate()
334 (void) memset(password, 0, strlen(password)); in pam_sm_authenticate()
335 free(password); in pam_sm_authenticate()
/illumos-gate/usr/src/lib/pam_modules/sample/
H A Dsample_authenticate.c81 char *firstpass, *password; in pam_sm_authenticate() local
154 password = ret_resp->resp; in pam_sm_authenticate()
156 if (password == NULL) { in pam_sm_authenticate()
163 if (strncmp(password, the_password, strlen(the_password)) == 0) { in pam_sm_authenticate()
167 (void) pam_set_item(pamh, PAM_AUTHTOK, password); in pam_sm_authenticate()
/illumos-gate/usr/src/lib/pam_modules/ldap/
H A Dldap_authenticate.c57 char *password = NULL; in pam_sm_authenticate() local
94 (void) pam_get_item(pamh, PAM_AUTHTOK, (void **) &password); in pam_sm_authenticate()
95 if (password == NULL) { in pam_sm_authenticate()
108 result = authenticate(&credp, user, password, NULL); in pam_sm_authenticate()
/illumos-gate/usr/src/cmd/keyserv/
H A Dnewkey.c333 static char password[MAXPASSWD+1]; local
380 strcpy(password, pass);
381 encrypted_password = crypt(password, login_password);
394 strcpy(password, pass);
395 encrypted_password = crypt(password, login_password);
437 strcpy(password, pass);
459 if (strcmp(pass, password) != 0) {
467 return (password);

1234567