/illumos-gate/usr/src/lib/pam_modules/authtok_check/ |
H A D | fascist.c | 391 char *password; in FascistLook() local 398 password = rpassword; in FascistLook() 400 (void) strcpy(password, Lowercase(password)); in FascistLook() 401 (void) Trim(password); in FascistLook() 412 if (!(a = Mangle(password, r_destructors[i]))) { in FascistLook() 421 (void) strlcpy(password, Reverse(password), PATH_MAX); in FascistLook() 426 if (!(a = Mangle(password, r_destructors[i]))) { in FascistLook() 438 DictCheck(const char *password, char *path) in DictCheck() argument 446 r = FascistLook(pwp, password); in DictCheck()
|
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/crypto/des/ |
H A D | afsstring2key.c | 102 unsigned char password[9]; /* trailing nul for crypt() */ in mit_afs_string_to_key() local 105 memset (password, 0, sizeof (password)); in mit_afs_string_to_key() 106 memcpy (password, realm, min (salt->length, 8)); in mit_afs_string_to_key() 108 if (isupper(password[i])) in mit_afs_string_to_key() 109 password[i] = tolower(password[i]); in mit_afs_string_to_key() 111 password[i] ^= data->data[i]; in mit_afs_string_to_key() 113 if (password[i] == '\0') in mit_afs_string_to_key() 114 password[i] = 'X'; in mit_afs_string_to_key() 115 password[8] = '\0'; in mit_afs_string_to_key() 119 (char *) afs_crypt((char *) password, "#~", afs_crypt_buf) + 2, in mit_afs_string_to_key() [all …]
|
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/mech/ |
H A D | acquire_cred_with_pw.c | 95 acquire_accept_cred_with_pw(context, minor_status, desired_name, password, cred) in acquire_accept_cred_with_pw() argument 99 const gss_buffer_t password; 110 acquire_init_cred_with_pw(context, minor_status, desired_name, password, cred) in acquire_init_cred_with_pw() argument 114 const gss_buffer_t password; 125 if (password == NULL || password->length == 0 || 126 password->value == NULL) 128 else if (*((char *)password->value + (password->length - 1)) == '\0') 129 pw = strdup(password->value); 131 pw = malloc(password->length + 1); 137 (void) strlcat(pw, password->value, password->length + 1); [all …]
|
/illumos-gate/usr/src/lib/sasl_plugins/login/ |
H A D | login.c | 174 sasl_secret_t *password; in login_server_mech_step() local 190 password = in login_server_mech_step() 192 if (!password) { in login_server_mech_step() 197 strncpy((char *)password->data, clientin, clientinlen); in login_server_mech_step() 198 password->data[clientinlen] = '\0'; in login_server_mech_step() 199 password->len = clientinlen; in login_server_mech_step() 207 _plug_free_secret(params->utils, &password); in login_server_mech_step() 214 (char *)password->data, password->len); in login_server_mech_step() 217 _plug_free_secret(params->utils, &password); in login_server_mech_step() 223 (char *)password->data, password->len); in login_server_mech_step() [all …]
|
/illumos-gate/usr/src/lib/print/libpapi-common/common/ |
H A D | uri.c | 93 char *password = NULL; in uri_from_string() local 95 for (password = user; (password < host - 1); password++) in uri_from_string() 96 if (*password == ':') { in uri_from_string() 97 u->password = strndup(password + 1, in uri_from_string() 98 host - password - 2); in uri_from_string() 101 u->user = strndup(user, password - user); in uri_from_string() 168 ((uri->password != NULL) && (uri->user == NULL)) || in uri_to_string() 188 (uri->password ? ":" : ""), in uri_to_string() 189 (uri->password ? uri->password : ""), in uri_to_string() 218 if (uri->password != NULL) in uri_free() [all …]
|
/illumos-gate/usr/src/cmd/krb5/kadmin/kpasswd/ |
H A D | kpasswd.c | 113 char password[255]; /* I don't really like 255 but that's what kinit uses */ local 193 pwsize = sizeof(password); 194 code = read_old_password(context, password, &pwsize); 197 memset(password, 0, sizeof(password)); 204 memset(password, 0, sizeof(password)); 224 code = kadm5_init_with_password(princ_str, password, cpw_service, 333 pwsize = sizeof(password); 334 code = read_new_password(server_handle, password, &pwsize, msg_ret, sizeof (msg_ret), princ); 335 memset(password, 0, sizeof(password));
|
H A D | tty_kpasswd.c | 56 long read_old_password(context, password, pwsize) in read_old_password() argument 58 char *password; 63 0, password, pwsize); 67 long read_new_password(server_handle, password, pwsize, msg_ret, msg_len, princ) in read_new_password() argument 69 char *password;
|
/illumos-gate/usr/src/lib/pam_modules/dial_auth/ |
H A D | dial_auth.c | 63 char *password = NULL; in pam_sm_authenticate() local 153 dgettext(TEXT_DOMAIN, "Dialup Password: "), &password); in pam_sm_authenticate() 159 if (strcmp(crypt(password, p2), p2) != 0) { in pam_sm_authenticate() 160 (void) memset(password, 0, strlen(password)); in pam_sm_authenticate() 161 free(password); in pam_sm_authenticate() 164 (void) memset(password, 0, strlen(password)); in pam_sm_authenticate() 165 free(password); in pam_sm_authenticate()
|
/illumos-gate/usr/src/lib/print/libpapi-ipp/common/ |
H A D | service.c | 120 char *user_name, char *password, in papiServiceCreate() argument 137 if (password != NULL) in papiServiceCreate() 138 svc->password = strdup(password); in papiServiceCreate() 173 if (svc->password != NULL) in papiServiceDestroy() 174 free(svc->password); in papiServiceDestroy() 206 papiServiceSetPassword(papi_service_t handle, char *password) in papiServiceSetPassword() argument 213 if (svc->password != NULL) in papiServiceSetPassword() 214 free(svc->password); in papiServiceSetPassword() 215 svc->password = NULL; in papiServiceSetPassword() 216 if (password != NULL) in papiServiceSetPassword() [all …]
|
/illumos-gate/usr/src/lib/print/libpapi-dynamic/common/ |
H A D | service.c | 192 char *password = svc->password; in service_connect() local 198 if ((password == NULL) && (svc->uri != NULL)) in service_connect() 199 password = (svc->uri)->password; in service_connect() 201 result = f(&svc->svc_handle, svc->name, user, password, in service_connect() 214 char *password, in papiServiceCreate() argument 233 if (password != NULL) in papiServiceCreate() 234 svc->password = strdup(password); in papiServiceCreate() 281 if (svc->password != NULL) in papiServiceDestroy() 282 free(svc->password); in papiServiceDestroy() 329 papiServiceSetPassword(papi_service_t handle, char *password) in papiServiceSetPassword() argument [all …]
|
/illumos-gate/usr/src/lib/smbsrv/libmlsvc/common/ |
H A D | netr_auth.c | 469 bzero(netr_info->password, sizeof (netr_info->password)); in netr_gen_skey128() 471 (char *)netr_info->password, sizeof (netr_info->password)); in netr_gen_skey128() 473 if ((rc != SMBD_SMF_OK) || *netr_info->password == '\0') { in netr_gen_skey128() 477 rc = smb_auth_ntlm_hash((char *)netr_info->password, ntlmhash); in netr_gen_skey128() 479 explicit_bzero(&netr_info->password, in netr_gen_skey128() 480 sizeof (netr_info->password)); in netr_gen_skey128() 527 explicit_bzero(&netr_info->password, sizeof (netr_info->password)); in netr_gen_skey128() 584 bzero(netr_info->password, sizeof (netr_info->password)); in netr_gen_skey64() 586 (char *)netr_info->password, sizeof (netr_info->password)); in netr_gen_skey64() 588 if ((rc != SMBD_SMF_OK) || *netr_info->password == '\0') { in netr_gen_skey64() [all …]
|
/illumos-gate/usr/src/lib/krb5/plugins/kdb/ldap/libkdb_ldap/ |
H A D | ldap_service_stash.c | 43 krb5_ldap_readpassword(context, ldap_context, password) in krb5_ldap_readpassword() argument 46 unsigned char **password; 54 *password = NULL; 140 *password = (unsigned char *)malloc(strlen(start) + 2); 141 if (*password == NULL) { 145 (*password)[strlen(start) + 1] = '\0'; 146 (*password)[strlen(start)] = '\0'; 148 strcpy((char *)(*password), start); 177 *password = PT.value; 184 if (*password) [all …]
|
H A D | kdb_ldap_conn.c | 51 unsigned char *password=NULL; in krb5_validate_ldap_context() local 69 if ((st=krb5_ldap_readpassword(context, ldap_context, &password)) != 0) { in krb5_validate_ldap_context() 75 if (!strncmp("{FILE}", (char *)password, 6)) { in krb5_validate_ldap_context() 77 ldap_context->service_cert_path = strdup((char *)password + strlen("{FILE}")); in krb5_validate_ldap_context() 83 if (password[strlen((char *)password) + 1] == '\0') in krb5_validate_ldap_context() 86 ldap_context->service_cert_pass = strdup((char *)password + in krb5_validate_ldap_context() 87 strlen((char *)password) + 1); in krb5_validate_ldap_context() 94 free(password); in krb5_validate_ldap_context() 96 ldap_context->bind_pwd = (char *)password; in krb5_validate_ldap_context()
|
/illumos-gate/usr/src/lib/passwdutil/ |
H A D | README.SunOS-aging | 36 The characters are password aging data. Password aging forces the 38 of time. Password aging can also force a user to keep a password for 42 ] Sample entry from /etc/passwd with password aging installed: 47 Note the comma in the encrypted password field. The characters after 48 the comma are used by the password aging mechanism. 58 1: Maximum number of weeks a password can be used without changing. 59 2: Minimum number of weeks a password must be used before changing. 60 3& 4: Last time password was changed, in number of weeks since 1970. 70 user will not be subjected to password aging requirements again. 77 the user is not allowed to change his/her password. Only root can [all …]
|
/illumos-gate/usr/src/lib/pam_modules/passwd_auth/ |
H A D | passwd_auth.c | 71 char *password; in pam_sm_authenticate() local 118 res = pam_get_item(pamh, PAM_AUTHTOK, (const void **)&password); in pam_sm_authenticate() 122 if (password != NULL) in pam_sm_authenticate() 198 &password); in pam_sm_authenticate() 202 if (password == NULL) { in pam_sm_authenticate() 265 if (strcmp(crypt(password, rep_passwd), rep_passwd) != 0) { in pam_sm_authenticate() 308 retval = pam_set_item(pamh, PAM_AUTHTOK, (void *)password); in pam_sm_authenticate() 311 if (password) { in pam_sm_authenticate() 312 (void) memset(password, 0, strlen(password)); in pam_sm_authenticate() 313 free(password); in pam_sm_authenticate()
|
/illumos-gate/usr/src/lib/krb5/kadm5/srv/ |
H A D | server_misc.c | 138 char *password, int use_policy, kadm5_policy_ent_t pol, in passwd_check() argument 153 if(strlen(password) < pol->pw_min_length) in passwd_check() 155 s = password; in passwd_check() 177 if((find_word(password) == KADM5_OK)) in passwd_check() 182 if (strcasecmp(cp, password) == 0) in passwd_check() 186 if (strcasecmp(cp, password) == 0) in passwd_check() 191 if (str_check_gecos(ent->pw_gecos, password)) in passwd_check() 198 if (strlen(password) < 1) in passwd_check()
|
/illumos-gate/usr/src/lib/sasl_plugins/plain/ |
H A D | plain.c | 106 const char *password; in plain_server_mech_step() local 149 password = clientin + lup; in plain_server_mech_step() 152 password_len = clientin + lup - password; in plain_server_mech_step() 174 strncpy(passcopy, password, password_len); in plain_server_mech_step() 216 params->transition(params->utils->conn, password, password_len); in plain_server_mech_step() 312 sasl_secret_t *password = NULL; in plain_client_mech_step() local 351 if (password == NULL) { in plain_client_mech_step() 352 pass_result = _plug_get_password(params->utils, &password, in plain_client_mech_step() 406 if (!password) { in plain_client_mech_step() 428 + password->len); in plain_client_mech_step() [all …]
|
/illumos-gate/usr/src/grub/grub-0.97/util/ |
H A D | grub-md5-crypt.in | 35 Encrypt a password in MD5 format. 69 read -r password 80 if test "x$password" = x; then 85 if test "x$password" != "x$password2"; then 94 $password
|
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/ |
H A D | gic_pwd.c | 55 krb5_data *password; in krb5_get_as_key_password() local 63 password = (krb5_data *) gak_data; in krb5_get_as_key_password() 80 if (password->data[0] == '\0') { in krb5_get_as_key_password() 95 prompt.reply = password; in krb5_get_as_key_password() 117 ret = krb5_c_string_to_key_with_params(context, etype, password, salt, in krb5_get_as_key_password() 130 char *password, in krb5_get_init_creds_password() argument 146 return (__krb5_get_init_creds_password(context, creds, client, password, in krb5_get_init_creds_password() 160 char *password, in __krb5_get_init_creds_password() argument 191 if (password && password[0]) { in __krb5_get_init_creds_password() 192 if ((pw0.length = strlen(password)) > sizeof(pw0array)) { in __krb5_get_init_creds_password() [all …]
|
/illumos-gate/usr/src/lib/pam_modules/krb5/ |
H A D | krb5_acct_mgmt.c | 67 char *cpw_service, *password; in fetch_princ_entry() local 72 password = kmd->password; in fetch_princ_entry() 85 if (strlen(password) == 0) { in fetch_princ_entry() 110 code = kadm5_init_with_password(kprinc, password, cpw_service, in fetch_princ_entry() 177 char messages[PAM_MAX_NUM_MSG][PAM_MAX_MSG_SIZE], *password; in exp_warn() local 185 password = kmd->password; in exp_warn() 187 if (!pamh || !user || !password) { in exp_warn() 455 !nowarn && kmd->password) { in pam_sm_acct_mgmt()
|
/illumos-gate/usr/src/boot/forth/ |
H A D | check-password.4th | 26 marker task-check-password.4th 30 vocabulary password-processing 31 only forth also password-processing definitions 36 255 constant readmax \ Maximum number of characters for the password 105 \ We are not going to echo the password to the screen (for 107 \ password, otherwise augment the key to a string. 131 only forth definitions also password-processing 133 : check-password ( -- ) 136 \ password has been set (preventing even boot from proceeding) 143 3000 ms ." loader: incorrect password" 10 emit [all …]
|
/illumos-gate/usr/src/lib/pam_modules/authtok_get/ |
H A D | authtok_get.c | 225 char *password; in pam_sm_authenticate() local 258 res = pam_get_item(pamh, PAM_AUTHTOK, (const void **)&password); in pam_sm_authenticate() 262 if (password != NULL) in pam_sm_authenticate() 329 dgettext(TEXT_DOMAIN, "Password: "), &password); in pam_sm_authenticate() 333 if (password != NULL) { in pam_sm_authenticate() 334 (void) pam_set_item(pamh, PAM_AUTHTOK, (const void *)password); in pam_sm_authenticate() 335 (void) memset(password, 0, strlen(password)); in pam_sm_authenticate() 336 free(password); in pam_sm_authenticate()
|
/illumos-gate/usr/src/lib/pam_modules/sample/ |
H A D | sample_authenticate.c | 79 char *password; in pam_sm_authenticate() local 152 password = ret_resp->resp; in pam_sm_authenticate() 154 if (password == NULL) { in pam_sm_authenticate() 161 if (strncmp(password, the_password, strlen(the_password)) == 0) { in pam_sm_authenticate() 165 (void) pam_set_item(pamh, PAM_AUTHTOK, password); in pam_sm_authenticate()
|
/illumos-gate/usr/src/cmd/keyserv/ |
H A D | newkey.c | 333 static char password[MAXPASSWD+1]; local 380 strcpy(password, pass); 381 encrypted_password = crypt(password, login_password); 394 strcpy(password, pass); 395 encrypted_password = crypt(password, login_password); 437 strcpy(password, pass); 459 if (strcmp(pass, password) != 0) { 467 return (password);
|
/illumos-gate/usr/src/lib/pam_modules/ldap/ |
H A D | ldap_authenticate.c | 54 const char *password = NULL; in pam_sm_authenticate() local 93 (void) pam_get_item(pamh, PAM_AUTHTOK, (const void **)&password); in pam_sm_authenticate() 94 if (password == NULL) { in pam_sm_authenticate() 107 result = authenticate(&credp, user, password, NULL); in pam_sm_authenticate()
|