/illumos-gate/usr/src/lib/pam_modules/authtok_check/ |
H A D | fascist.c | 390 char *password; in FascistLook() local 397 password = rpassword; in FascistLook() 399 (void) strcpy(password, Lowercase(password)); in FascistLook() 400 (void) Trim(password); in FascistLook() 411 if (!(a = Mangle(password, r_destructors[i]))) { in FascistLook() 420 (void) strlcpy(password, Reverse(password), PATH_MAX); in FascistLook() 425 if (!(a = Mangle(password, r_destructors[i]))) { in FascistLook() 437 DictCheck(char *password, char *path) in DictCheck() argument 445 r = FascistLook(pwp, password); in DictCheck()
|
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/crypto/des/ |
H A D | afsstring2key.c | 105 memset (password, 0, sizeof (password)); in mit_afs_string_to_key() 108 if (isupper(password[i])) in mit_afs_string_to_key() 109 password[i] = tolower(password[i]); in mit_afs_string_to_key() 113 if (password[i] == '\0') in mit_afs_string_to_key() 114 password[i] = 'X'; in mit_afs_string_to_key() 115 password[8] = '\0'; in mit_afs_string_to_key() 126 memset(password, 0, (size_t) sizeof(password)); in mit_afs_string_to_key() 142 password[i] = realm[j]; in mit_afs_string_to_key() 143 if (isupper(password[i])) in mit_afs_string_to_key() 144 password[i] = tolower(password[i]); in mit_afs_string_to_key() [all …]
|
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/mech/ |
H A D | acquire_cred_with_pw.c | 99 const gss_buffer_t password; 114 const gss_buffer_t password; 125 if (password == NULL || password->length == 0 || 126 password->value == NULL) 128 else if (*((char *)password->value + (password->length - 1)) == '\0') 129 pw = strdup(password->value); 137 (void) strlcat(pw, password->value, password->length + 1); 212 const gss_buffer_t password; 323 password, cred)) 343 desired_name, password, cred)) [all …]
|
/illumos-gate/usr/src/lib/sasl_plugins/login/ |
H A D | login.c | 174 sasl_secret_t *password; in login_server_mech_step() local 190 password = in login_server_mech_step() 192 if (!password) { in login_server_mech_step() 198 password->data[clientinlen] = '\0'; in login_server_mech_step() 199 password->len = clientinlen; in login_server_mech_step() 214 (char *)password->data, password->len); in login_server_mech_step() 223 (char *)password->data, password->len); in login_server_mech_step() 311 sasl_secret_t *password; member 383 if (text->password == NULL) { in login_client_mech_step() 427 if (!text->password) { in login_client_mech_step() [all …]
|
/illumos-gate/usr/src/lib/print/libpapi-common/common/ |
H A D | uri.c | 93 char *password = NULL; in uri_from_string() local 95 for (password = user; (password < host - 1); password++) in uri_from_string() 96 if (*password == ':') { in uri_from_string() 97 u->password = strndup(password + 1, in uri_from_string() 98 host - password - 2); in uri_from_string() 101 u->user = strndup(user, password - user); in uri_from_string() 188 (uri->password ? ":" : ""), in uri_to_string() 189 (uri->password ? uri->password : ""), in uri_to_string() 218 if (uri->password != NULL) in uri_free() 219 free(uri->password); in uri_free() [all …]
|
/illumos-gate/usr/src/cmd/krb5/kadmin/kpasswd/ |
H A D | kpasswd.c | 113 char password[255]; /* I don't really like 255 but that's what kinit uses */ local 193 pwsize = sizeof(password); 194 code = read_old_password(context, password, &pwsize); 197 memset(password, 0, sizeof(password)); 204 memset(password, 0, sizeof(password)); 224 code = kadm5_init_with_password(princ_str, password, cpw_service, 333 pwsize = sizeof(password); 334 code = read_new_password(server_handle, password, &pwsize, msg_ret, sizeof (msg_ret), princ); 335 memset(password, 0, sizeof(password));
|
H A D | tty_kpasswd.c | 56 long read_old_password(context, password, pwsize) in read_old_password() argument 58 char *password; 63 0, password, pwsize); 67 long read_new_password(server_handle, password, pwsize, msg_ret, msg_len, princ) in read_new_password() argument 69 char *password;
|
/illumos-gate/usr/src/lib/pam_modules/dial_auth/ |
H A D | dial_auth.c | 62 char *password = NULL; in pam_sm_authenticate() local 152 dgettext(TEXT_DOMAIN, "Dialup Password: "), &password); in pam_sm_authenticate() 158 if (strcmp(crypt(password, p2), p2) != 0) { in pam_sm_authenticate() 159 (void) memset(password, 0, strlen(password)); in pam_sm_authenticate() 160 free(password); in pam_sm_authenticate() 163 (void) memset(password, 0, strlen(password)); in pam_sm_authenticate() 164 free(password); in pam_sm_authenticate()
|
/illumos-gate/usr/src/lib/print/libpapi-ipp/common/ |
H A D | service.c | 120 char *user_name, char *password, in papiServiceCreate() argument 137 if (password != NULL) in papiServiceCreate() 138 svc->password = strdup(password); in papiServiceCreate() 173 if (svc->password != NULL) in papiServiceDestroy() 174 free(svc->password); in papiServiceDestroy() 213 if (svc->password != NULL) in papiServiceSetPassword() 214 free(svc->password); in papiServiceSetPassword() 215 svc->password = NULL; in papiServiceSetPassword() 216 if (password != NULL) in papiServiceSetPassword() 217 svc->password = strdup(password); in papiServiceSetPassword() [all …]
|
/illumos-gate/usr/src/lib/krb5/plugins/kdb/ldap/libkdb_ldap/ |
H A D | ldap_service_stash.c | 43 krb5_ldap_readpassword(context, ldap_context, password) in krb5_ldap_readpassword() argument 46 unsigned char **password; 54 *password = NULL; 141 if (*password == NULL) { 145 (*password)[strlen(start) + 1] = '\0'; 146 (*password)[strlen(start)] = '\0'; 148 strcpy((char *)(*password), start); 177 *password = PT.value; 184 if (*password) 185 free (*password); [all …]
|
H A D | kdb_ldap_conn.c | 51 unsigned char *password=NULL; in krb5_validate_ldap_context() local 69 if ((st=krb5_ldap_readpassword(context, ldap_context, &password)) != 0) { in krb5_validate_ldap_context() 75 if (!strncmp("{FILE}", (char *)password, 6)) { in krb5_validate_ldap_context() 77 ldap_context->service_cert_path = strdup((char *)password + strlen("{FILE}")); in krb5_validate_ldap_context() 83 if (password[strlen((char *)password) + 1] == '\0') in krb5_validate_ldap_context() 86 ldap_context->service_cert_pass = strdup((char *)password + in krb5_validate_ldap_context() 87 strlen((char *)password) + 1); in krb5_validate_ldap_context() 94 free(password); in krb5_validate_ldap_context() 96 ldap_context->bind_pwd = (char *)password; in krb5_validate_ldap_context()
|
/illumos-gate/usr/src/lib/print/libpapi-dynamic/common/ |
H A D | service.c | 192 char *password = svc->password; in service_connect() local 199 password = (svc->uri)->password; in service_connect() 214 char *password, in papiServiceCreate() argument 233 if (password != NULL) in papiServiceCreate() 234 svc->password = strdup(password); in papiServiceCreate() 281 if (svc->password != NULL) in papiServiceDestroy() 282 free(svc->password); in papiServiceDestroy() 338 free(svc->password); in papiServiceSetPassword() 339 if (password != NULL) in papiServiceSetPassword() 340 svc->password = strdup(password); in papiServiceSetPassword() [all …]
|
/illumos-gate/usr/src/lib/smbsrv/libmlsvc/common/ |
H A D | netr_auth.c | 469 bzero(netr_info->password, sizeof (netr_info->password)); in netr_gen_skey128() 471 (char *)netr_info->password, sizeof (netr_info->password)); in netr_gen_skey128() 473 if ((rc != SMBD_SMF_OK) || *netr_info->password == '\0') { in netr_gen_skey128() 479 explicit_bzero(&netr_info->password, in netr_gen_skey128() 480 sizeof (netr_info->password)); in netr_gen_skey128() 527 explicit_bzero(&netr_info->password, sizeof (netr_info->password)); in netr_gen_skey128() 584 bzero(netr_info->password, sizeof (netr_info->password)); in netr_gen_skey64() 586 (char *)netr_info->password, sizeof (netr_info->password)); in netr_gen_skey64() 588 if ((rc != SMBD_SMF_OK) || *netr_info->password == '\0') { in netr_gen_skey64() 615 explicit_bzero(&netr_info->password, sizeof (netr_info->password)); in netr_gen_skey64() [all …]
|
/illumos-gate/usr/src/lib/passwdutil/ |
H A D | README.SunOS-aging | 36 The characters are password aging data. Password aging forces the 38 of time. Password aging can also force a user to keep a password for 42 ] Sample entry from /etc/passwd with password aging installed: 47 Note the comma in the encrypted password field. The characters after 48 the comma are used by the password aging mechanism. 60 3& 4: Last time password was changed, in number of weeks since 1970. 70 user will not be subjected to password aging requirements again. 77 the user is not allowed to change his/her password. Only root can 78 change that users password. 81 aging data. An account with an expired password can be su'd to [all …]
|
/illumos-gate/usr/src/lib/pam_modules/passwd_auth/ |
H A D | passwd_auth.c | 69 char *password; in pam_sm_authenticate() local 115 res = pam_get_item(pamh, PAM_AUTHTOK, (void **)&password); in pam_sm_authenticate() 119 if (password != NULL) in pam_sm_authenticate() 195 &password); in pam_sm_authenticate() 199 if (password == NULL) { in pam_sm_authenticate() 262 if (strcmp(crypt(password, rep_passwd), rep_passwd) != 0) { in pam_sm_authenticate() 305 retval = pam_set_item(pamh, PAM_AUTHTOK, (void *)password); in pam_sm_authenticate() 308 if (password) { in pam_sm_authenticate() 309 (void) memset(password, 0, strlen(password)); in pam_sm_authenticate() 310 free(password); in pam_sm_authenticate()
|
/illumos-gate/usr/src/lib/krb5/kadm5/srv/ |
H A D | server_misc.c | 138 char *password, int use_policy, kadm5_policy_ent_t pol, in passwd_check() argument 153 if(strlen(password) < pol->pw_min_length) in passwd_check() 155 s = password; in passwd_check() 177 if((find_word(password) == KADM5_OK)) in passwd_check() 182 if (strcasecmp(cp, password) == 0) in passwd_check() 186 if (strcasecmp(cp, password) == 0) in passwd_check() 191 if (str_check_gecos(ent->pw_gecos, password)) in passwd_check() 198 if (strlen(password) < 1) in passwd_check()
|
/illumos-gate/usr/src/grub/grub-0.97/util/ |
H A D | grub-md5-crypt.in | 35 Encrypt a password in MD5 format. 69 read -r password 80 if test "x$password" = x; then 85 if test "x$password" != "x$password2"; then 94 $password
|
/illumos-gate/usr/src/lib/sasl_plugins/plain/ |
H A D | plain.c | 106 const char *password; in plain_server_mech_step() local 149 password = clientin + lup; in plain_server_mech_step() 152 password_len = clientin + lup - password; in plain_server_mech_step() 174 strncpy(passcopy, password, password_len); in plain_server_mech_step() 216 params->transition(params->utils->conn, password, password_len); in plain_server_mech_step() 312 sasl_secret_t *password = NULL; in plain_client_mech_step() local 351 if (password == NULL) { in plain_client_mech_step() 352 pass_result = _plug_get_password(params->utils, &password, in plain_client_mech_step() 406 if (!password) { in plain_client_mech_step() 428 + password->len); in plain_client_mech_step() [all …]
|
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/ |
H A D | gic_pwd.c | 55 krb5_data *password; in krb5_get_as_key_password() local 63 password = (krb5_data *) gak_data; in krb5_get_as_key_password() 80 if (password->data[0] == '\0') { in krb5_get_as_key_password() 95 prompt.reply = password; in krb5_get_as_key_password() 130 char *password, in krb5_get_init_creds_password() argument 160 char *password, in __krb5_get_init_creds_password() argument 191 if (password && password[0]) { in __krb5_get_init_creds_password() 196 strcpy(pw0.data, password); in __krb5_get_init_creds_password() 594 if (password) { in krb5_get_in_tkt_with_password() 595 pw0.length = strlen(password); in krb5_get_in_tkt_with_password() [all …]
|
/illumos-gate/usr/src/lib/pam_modules/krb5/ |
H A D | krb5_acct_mgmt.c | 65 char *cpw_service, *password; in fetch_princ_entry() local 70 password = kmd->password; in fetch_princ_entry() 83 if (strlen(password) == 0) { in fetch_princ_entry() 108 code = kadm5_init_with_password(kprinc, password, cpw_service, in fetch_princ_entry() 175 char messages[PAM_MAX_NUM_MSG][PAM_MAX_MSG_SIZE], *password; in exp_warn() local 183 password = kmd->password; in exp_warn() 185 if (!pamh || !user || !password) { in exp_warn() 459 !nowarn && kmd->password) { in pam_sm_acct_mgmt()
|
/illumos-gate/usr/src/boot/forth/ |
H A D | check-password.4th | 26 marker task-check-password.4th 30 vocabulary password-processing 31 only forth also password-processing definitions 107 \ password, otherwise augment the key to a string. 131 only forth definitions also password-processing 133 : check-password ( -- ) 143 3000 ms ." loader: incorrect password" 10 emit 157 \ Exit if a password was not set 158 s" password" getenv -1 = if exit else drop then 168 s" password" getenv dup readmax > if drop readmax then [all …]
|
/illumos-gate/usr/src/lib/pam_modules/authtok_get/ |
H A D | authtok_get.c | 224 char *password; in pam_sm_authenticate() local 257 res = pam_get_item(pamh, PAM_AUTHTOK, (void **)&password); in pam_sm_authenticate() 261 if (password != NULL) in pam_sm_authenticate() 328 dgettext(TEXT_DOMAIN, "Password: "), &password); in pam_sm_authenticate() 332 if (password != NULL) { in pam_sm_authenticate() 333 (void) pam_set_item(pamh, PAM_AUTHTOK, (void *)password); in pam_sm_authenticate() 334 (void) memset(password, 0, strlen(password)); in pam_sm_authenticate() 335 free(password); in pam_sm_authenticate()
|
/illumos-gate/usr/src/lib/pam_modules/sample/ |
H A D | sample_authenticate.c | 81 char *firstpass, *password; in pam_sm_authenticate() local 154 password = ret_resp->resp; in pam_sm_authenticate() 156 if (password == NULL) { in pam_sm_authenticate() 163 if (strncmp(password, the_password, strlen(the_password)) == 0) { in pam_sm_authenticate() 167 (void) pam_set_item(pamh, PAM_AUTHTOK, password); in pam_sm_authenticate()
|
/illumos-gate/usr/src/lib/pam_modules/ldap/ |
H A D | ldap_authenticate.c | 57 char *password = NULL; in pam_sm_authenticate() local 94 (void) pam_get_item(pamh, PAM_AUTHTOK, (void **) &password); in pam_sm_authenticate() 95 if (password == NULL) { in pam_sm_authenticate() 108 result = authenticate(&credp, user, password, NULL); in pam_sm_authenticate()
|
/illumos-gate/usr/src/cmd/keyserv/ |
H A D | newkey.c | 333 static char password[MAXPASSWD+1]; local 380 strcpy(password, pass); 381 encrypted_password = crypt(password, login_password); 394 strcpy(password, pass); 395 encrypted_password = crypt(password, login_password); 437 strcpy(password, pass); 459 if (strcmp(pass, password) != 0) { 467 return (password);
|