Home
last modified time | relevance | path

Searched refs:password (Results 1 – 25 of 151) sorted by relevance

1234567

/illumos-gate/usr/src/lib/pam_modules/authtok_check/
H A Dfascist.c391 char *password; in FascistLook() local
398 password = rpassword; in FascistLook()
400 (void) strcpy(password, Lowercase(password)); in FascistLook()
401 (void) Trim(password); in FascistLook()
412 if (!(a = Mangle(password, r_destructors[i]))) { in FascistLook()
421 (void) strlcpy(password, Reverse(password), PATH_MAX); in FascistLook()
426 if (!(a = Mangle(password, r_destructors[i]))) { in FascistLook()
438 DictCheck(const char *password, char *path) in DictCheck() argument
446 r = FascistLook(pwp, password); in DictCheck()
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/crypto/des/
H A Dafsstring2key.c102 unsigned char password[9]; /* trailing nul for crypt() */ in mit_afs_string_to_key() local
105 memset (password, 0, sizeof (password)); in mit_afs_string_to_key()
106 memcpy (password, realm, min (salt->length, 8)); in mit_afs_string_to_key()
108 if (isupper(password[i])) in mit_afs_string_to_key()
109 password[i] = tolower(password[i]); in mit_afs_string_to_key()
111 password[i] ^= data->data[i]; in mit_afs_string_to_key()
113 if (password[i] == '\0') in mit_afs_string_to_key()
114 password[i] = 'X'; in mit_afs_string_to_key()
115 password[8] = '\0'; in mit_afs_string_to_key()
119 (char *) afs_crypt((char *) password, "#~", afs_crypt_buf) + 2, in mit_afs_string_to_key()
[all …]
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/mech/
H A Dacquire_cred_with_pw.c95 acquire_accept_cred_with_pw(context, minor_status, desired_name, password, cred) in acquire_accept_cred_with_pw() argument
99 const gss_buffer_t password;
110 acquire_init_cred_with_pw(context, minor_status, desired_name, password, cred) in acquire_init_cred_with_pw() argument
114 const gss_buffer_t password;
125 if (password == NULL || password->length == 0 ||
126 password->value == NULL)
128 else if (*((char *)password->value + (password->length - 1)) == '\0')
129 pw = strdup(password->value);
131 pw = malloc(password->length + 1);
137 (void) strlcat(pw, password->value, password->length + 1);
[all …]
/illumos-gate/usr/src/lib/sasl_plugins/login/
H A Dlogin.c174 sasl_secret_t *password; in login_server_mech_step() local
190 password = in login_server_mech_step()
192 if (!password) { in login_server_mech_step()
197 strncpy((char *)password->data, clientin, clientinlen); in login_server_mech_step()
198 password->data[clientinlen] = '\0'; in login_server_mech_step()
199 password->len = clientinlen; in login_server_mech_step()
207 _plug_free_secret(params->utils, &password); in login_server_mech_step()
214 (char *)password->data, password->len); in login_server_mech_step()
217 _plug_free_secret(params->utils, &password); in login_server_mech_step()
223 (char *)password->data, password->len); in login_server_mech_step()
[all …]
/illumos-gate/usr/src/lib/print/libpapi-common/common/
H A Duri.c93 char *password = NULL; in uri_from_string() local
95 for (password = user; (password < host - 1); password++) in uri_from_string()
96 if (*password == ':') { in uri_from_string()
97 u->password = strndup(password + 1, in uri_from_string()
98 host - password - 2); in uri_from_string()
101 u->user = strndup(user, password - user); in uri_from_string()
168 ((uri->password != NULL) && (uri->user == NULL)) || in uri_to_string()
188 (uri->password ? ":" : ""), in uri_to_string()
189 (uri->password ? uri->password : ""), in uri_to_string()
218 if (uri->password != NULL) in uri_free()
[all …]
/illumos-gate/usr/src/cmd/krb5/kadmin/kpasswd/
H A Dkpasswd.c113 char password[255]; /* I don't really like 255 but that's what kinit uses */ local
193 pwsize = sizeof(password);
194 code = read_old_password(context, password, &pwsize);
197 memset(password, 0, sizeof(password));
204 memset(password, 0, sizeof(password));
224 code = kadm5_init_with_password(princ_str, password, cpw_service,
333 pwsize = sizeof(password);
334 code = read_new_password(server_handle, password, &pwsize, msg_ret, sizeof (msg_ret), princ);
335 memset(password, 0, sizeof(password));
H A Dtty_kpasswd.c56 long read_old_password(context, password, pwsize) in read_old_password() argument
58 char *password;
63 0, password, pwsize);
67 long read_new_password(server_handle, password, pwsize, msg_ret, msg_len, princ) in read_new_password() argument
69 char *password;
/illumos-gate/usr/src/lib/pam_modules/dial_auth/
H A Ddial_auth.c63 char *password = NULL; in pam_sm_authenticate() local
153 dgettext(TEXT_DOMAIN, "Dialup Password: "), &password); in pam_sm_authenticate()
159 if (strcmp(crypt(password, p2), p2) != 0) { in pam_sm_authenticate()
160 (void) memset(password, 0, strlen(password)); in pam_sm_authenticate()
161 free(password); in pam_sm_authenticate()
164 (void) memset(password, 0, strlen(password)); in pam_sm_authenticate()
165 free(password); in pam_sm_authenticate()
/illumos-gate/usr/src/lib/print/libpapi-ipp/common/
H A Dservice.c120 char *user_name, char *password, in papiServiceCreate() argument
137 if (password != NULL) in papiServiceCreate()
138 svc->password = strdup(password); in papiServiceCreate()
173 if (svc->password != NULL) in papiServiceDestroy()
174 free(svc->password); in papiServiceDestroy()
206 papiServiceSetPassword(papi_service_t handle, char *password) in papiServiceSetPassword() argument
213 if (svc->password != NULL) in papiServiceSetPassword()
214 free(svc->password); in papiServiceSetPassword()
215 svc->password = NULL; in papiServiceSetPassword()
216 if (password != NULL) in papiServiceSetPassword()
[all …]
/illumos-gate/usr/src/lib/print/libpapi-dynamic/common/
H A Dservice.c192 char *password = svc->password; in service_connect() local
198 if ((password == NULL) && (svc->uri != NULL)) in service_connect()
199 password = (svc->uri)->password; in service_connect()
201 result = f(&svc->svc_handle, svc->name, user, password, in service_connect()
214 char *password, in papiServiceCreate() argument
233 if (password != NULL) in papiServiceCreate()
234 svc->password = strdup(password); in papiServiceCreate()
281 if (svc->password != NULL) in papiServiceDestroy()
282 free(svc->password); in papiServiceDestroy()
329 papiServiceSetPassword(papi_service_t handle, char *password) in papiServiceSetPassword() argument
[all …]
/illumos-gate/usr/src/lib/smbsrv/libmlsvc/common/
H A Dnetr_auth.c469 bzero(netr_info->password, sizeof (netr_info->password)); in netr_gen_skey128()
471 (char *)netr_info->password, sizeof (netr_info->password)); in netr_gen_skey128()
473 if ((rc != SMBD_SMF_OK) || *netr_info->password == '\0') { in netr_gen_skey128()
477 rc = smb_auth_ntlm_hash((char *)netr_info->password, ntlmhash); in netr_gen_skey128()
479 explicit_bzero(&netr_info->password, in netr_gen_skey128()
480 sizeof (netr_info->password)); in netr_gen_skey128()
527 explicit_bzero(&netr_info->password, sizeof (netr_info->password)); in netr_gen_skey128()
584 bzero(netr_info->password, sizeof (netr_info->password)); in netr_gen_skey64()
586 (char *)netr_info->password, sizeof (netr_info->password)); in netr_gen_skey64()
588 if ((rc != SMBD_SMF_OK) || *netr_info->password == '\0') { in netr_gen_skey64()
[all …]
/illumos-gate/usr/src/lib/krb5/plugins/kdb/ldap/libkdb_ldap/
H A Dldap_service_stash.c43 krb5_ldap_readpassword(context, ldap_context, password) in krb5_ldap_readpassword() argument
46 unsigned char **password;
54 *password = NULL;
140 *password = (unsigned char *)malloc(strlen(start) + 2);
141 if (*password == NULL) {
145 (*password)[strlen(start) + 1] = '\0';
146 (*password)[strlen(start)] = '\0';
148 strcpy((char *)(*password), start);
177 *password = PT.value;
184 if (*password)
[all …]
H A Dkdb_ldap_conn.c51 unsigned char *password=NULL; in krb5_validate_ldap_context() local
69 if ((st=krb5_ldap_readpassword(context, ldap_context, &password)) != 0) { in krb5_validate_ldap_context()
75 if (!strncmp("{FILE}", (char *)password, 6)) { in krb5_validate_ldap_context()
77 ldap_context->service_cert_path = strdup((char *)password + strlen("{FILE}")); in krb5_validate_ldap_context()
83 if (password[strlen((char *)password) + 1] == '\0') in krb5_validate_ldap_context()
86 ldap_context->service_cert_pass = strdup((char *)password + in krb5_validate_ldap_context()
87 strlen((char *)password) + 1); in krb5_validate_ldap_context()
94 free(password); in krb5_validate_ldap_context()
96 ldap_context->bind_pwd = (char *)password; in krb5_validate_ldap_context()
/illumos-gate/usr/src/lib/passwdutil/
H A DREADME.SunOS-aging36 The characters are password aging data. Password aging forces the
38 of time. Password aging can also force a user to keep a password for
42 ] Sample entry from /etc/passwd with password aging installed:
47 Note the comma in the encrypted password field. The characters after
48 the comma are used by the password aging mechanism.
58 1: Maximum number of weeks a password can be used without changing.
59 2: Minimum number of weeks a password must be used before changing.
60 3& 4: Last time password was changed, in number of weeks since 1970.
70 user will not be subjected to password aging requirements again.
77 the user is not allowed to change his/her password. Only root can
[all …]
/illumos-gate/usr/src/lib/pam_modules/passwd_auth/
H A Dpasswd_auth.c71 char *password; in pam_sm_authenticate() local
118 res = pam_get_item(pamh, PAM_AUTHTOK, (const void **)&password); in pam_sm_authenticate()
122 if (password != NULL) in pam_sm_authenticate()
198 &password); in pam_sm_authenticate()
202 if (password == NULL) { in pam_sm_authenticate()
265 if (strcmp(crypt(password, rep_passwd), rep_passwd) != 0) { in pam_sm_authenticate()
308 retval = pam_set_item(pamh, PAM_AUTHTOK, (void *)password); in pam_sm_authenticate()
311 if (password) { in pam_sm_authenticate()
312 (void) memset(password, 0, strlen(password)); in pam_sm_authenticate()
313 free(password); in pam_sm_authenticate()
/illumos-gate/usr/src/lib/krb5/kadm5/srv/
H A Dserver_misc.c138 char *password, int use_policy, kadm5_policy_ent_t pol, in passwd_check() argument
153 if(strlen(password) < pol->pw_min_length) in passwd_check()
155 s = password; in passwd_check()
177 if((find_word(password) == KADM5_OK)) in passwd_check()
182 if (strcasecmp(cp, password) == 0) in passwd_check()
186 if (strcasecmp(cp, password) == 0) in passwd_check()
191 if (str_check_gecos(ent->pw_gecos, password)) in passwd_check()
198 if (strlen(password) < 1) in passwd_check()
/illumos-gate/usr/src/lib/sasl_plugins/plain/
H A Dplain.c106 const char *password; in plain_server_mech_step() local
149 password = clientin + lup; in plain_server_mech_step()
152 password_len = clientin + lup - password; in plain_server_mech_step()
174 strncpy(passcopy, password, password_len); in plain_server_mech_step()
216 params->transition(params->utils->conn, password, password_len); in plain_server_mech_step()
312 sasl_secret_t *password = NULL; in plain_client_mech_step() local
351 if (password == NULL) { in plain_client_mech_step()
352 pass_result = _plug_get_password(params->utils, &password, in plain_client_mech_step()
406 if (!password) { in plain_client_mech_step()
428 + password->len); in plain_client_mech_step()
[all …]
/illumos-gate/usr/src/grub/grub-0.97/util/
H A Dgrub-md5-crypt.in35 Encrypt a password in MD5 format.
69 read -r password
80 if test "x$password" = x; then
85 if test "x$password" != "x$password2"; then
94 $password
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/
H A Dgic_pwd.c55 krb5_data *password; in krb5_get_as_key_password() local
63 password = (krb5_data *) gak_data; in krb5_get_as_key_password()
80 if (password->data[0] == '\0') { in krb5_get_as_key_password()
95 prompt.reply = password; in krb5_get_as_key_password()
117 ret = krb5_c_string_to_key_with_params(context, etype, password, salt, in krb5_get_as_key_password()
130 char *password, in krb5_get_init_creds_password() argument
146 return (__krb5_get_init_creds_password(context, creds, client, password, in krb5_get_init_creds_password()
160 char *password, in __krb5_get_init_creds_password() argument
191 if (password && password[0]) { in __krb5_get_init_creds_password()
192 if ((pw0.length = strlen(password)) > sizeof(pw0array)) { in __krb5_get_init_creds_password()
[all …]
/illumos-gate/usr/src/lib/pam_modules/krb5/
H A Dkrb5_acct_mgmt.c67 char *cpw_service, *password; in fetch_princ_entry() local
72 password = kmd->password; in fetch_princ_entry()
85 if (strlen(password) == 0) { in fetch_princ_entry()
110 code = kadm5_init_with_password(kprinc, password, cpw_service, in fetch_princ_entry()
177 char messages[PAM_MAX_NUM_MSG][PAM_MAX_MSG_SIZE], *password; in exp_warn() local
185 password = kmd->password; in exp_warn()
187 if (!pamh || !user || !password) { in exp_warn()
455 !nowarn && kmd->password) { in pam_sm_acct_mgmt()
/illumos-gate/usr/src/boot/forth/
H A Dcheck-password.4th26 marker task-check-password.4th
30 vocabulary password-processing
31 only forth also password-processing definitions
36 255 constant readmax \ Maximum number of characters for the password
105 \ We are not going to echo the password to the screen (for
107 \ password, otherwise augment the key to a string.
131 only forth definitions also password-processing
133 : check-password ( -- )
136 \ password has been set (preventing even boot from proceeding)
143 3000 ms ." loader: incorrect password" 10 emit
[all …]
/illumos-gate/usr/src/lib/pam_modules/authtok_get/
H A Dauthtok_get.c225 char *password; in pam_sm_authenticate() local
258 res = pam_get_item(pamh, PAM_AUTHTOK, (const void **)&password); in pam_sm_authenticate()
262 if (password != NULL) in pam_sm_authenticate()
329 dgettext(TEXT_DOMAIN, "Password: "), &password); in pam_sm_authenticate()
333 if (password != NULL) { in pam_sm_authenticate()
334 (void) pam_set_item(pamh, PAM_AUTHTOK, (const void *)password); in pam_sm_authenticate()
335 (void) memset(password, 0, strlen(password)); in pam_sm_authenticate()
336 free(password); in pam_sm_authenticate()
/illumos-gate/usr/src/lib/pam_modules/sample/
H A Dsample_authenticate.c79 char *password; in pam_sm_authenticate() local
152 password = ret_resp->resp; in pam_sm_authenticate()
154 if (password == NULL) { in pam_sm_authenticate()
161 if (strncmp(password, the_password, strlen(the_password)) == 0) { in pam_sm_authenticate()
165 (void) pam_set_item(pamh, PAM_AUTHTOK, password); in pam_sm_authenticate()
/illumos-gate/usr/src/cmd/keyserv/
H A Dnewkey.c333 static char password[MAXPASSWD+1]; local
380 strcpy(password, pass);
381 encrypted_password = crypt(password, login_password);
394 strcpy(password, pass);
395 encrypted_password = crypt(password, login_password);
437 strcpy(password, pass);
459 if (strcmp(pass, password) != 0) {
467 return (password);
/illumos-gate/usr/src/lib/pam_modules/ldap/
H A Dldap_authenticate.c54 const char *password = NULL; in pam_sm_authenticate() local
93 (void) pam_get_item(pamh, PAM_AUTHTOK, (const void **)&password); in pam_sm_authenticate()
94 if (password == NULL) { in pam_sm_authenticate()
107 result = authenticate(&credp, user, password, NULL); in pam_sm_authenticate()

1234567