/titanic_41/usr/src/lib/krb5/kadm5/ |
H A D | chpass_util.c | 90 char *msg_ret, in _kadm5_chpass_principal_util() argument 126 (void) strncpy(msg_ret, string_text(CHPASS_UTIL_NEW_PASSWORD_MISMATCH), in _kadm5_chpass_principal_util() 128 msg_ret[msg_len - 1] = '\0'; in _kadm5_chpass_principal_util() 131 (void) strncpy(msg_ret, error_message(code), msg_len - 1); in _kadm5_chpass_principal_util() 132 (void) strncat(msg_ret, " ", msg_len - 1); in _kadm5_chpass_principal_util() 133 (void) strncat(msg_ret, string_text(CHPASS_UTIL_WHILE_READING_PASSWORD), in _kadm5_chpass_principal_util() 135 (void) strncat(msg_ret, string_text(CHPASS_UTIL_PASSWORD_NOT_CHANGED), in _kadm5_chpass_principal_util() 137 msg_ret[msg_len - 1] = '\0'; in _kadm5_chpass_principal_util() 145 strncpy(msg_ret, string_text(CHPASS_UTIL_NO_PASSWORD_READ), msg_len - 1); in _kadm5_chpass_principal_util() 146 msg_ret[msg_len - 1] = '\0'; in _kadm5_chpass_principal_util() [all …]
|
H A D | admin_internal.h | 93 char *msg_ret,
|
H A D | admin.h | 437 char *msg_ret, 566 char *msg_ret, 780 char *msg_ret);
|
/titanic_41/usr/src/cmd/krb5/kadmin/kpasswd/ |
H A D | tty_kpasswd.c | 69 long read_new_password(server_handle, password, pwsize, msg_ret, msg_len, princ) in read_new_password() argument 73 char *msg_ret; 79 msg_ret, msg_len));
|
H A D | kpasswd.c | 114 char msg_ret[1024], admin_realm[1024]; local 334 code = read_new_password(server_handle, password, &pwsize, msg_ret, sizeof (msg_ret), princ); 338 com_err(whoami, 0, msg_ret);
|
H A D | kpasswd.h | 42 unsigned int *pwsize, char *msg_ret,
|
/titanic_41/usr/src/cmd/krb5/kadmin/server/ |
H A D | misc.c | 124 char *msg_ret, unsigned int msg_len) in schpw_util_wrapper() argument 129 ret = kadm5_check_min_life(server_handle, princ, msg_ret, msg_len); in schpw_util_wrapper() 135 msg_ret, msg_len); in schpw_util_wrapper()
|
H A D | misc.h | 55 char *msg_ret, unsigned int msg_len);
|
/titanic_41/usr/src/lib/krb5/kadm5/clnt/ |
H A D | clnt_chpass_util.c | 28 char *msg_ret, in kadm5_chpass_principal_util() argument 35 new_pw, ret_pw, msg_ret, msg_len); in kadm5_chpass_principal_util()
|
/titanic_41/usr/src/lib/krb5/kadm5/srv/ |
H A D | svr_chpass_util.c | 31 char *msg_ret, in kadm5_chpass_principal_util() argument 38 new_pw, ret_pw, msg_ret, msg_len); in kadm5_chpass_principal_util()
|
H A D | svr_principal.c | 2204 char *msg_ret, unsigned int msg_len) in kadm5_check_min_life() argument 2212 if (msg_ret != NULL) in kadm5_check_min_life() 2213 *msg_ret = '\0'; in kadm5_check_min_life() 2231 if (msg_ret != NULL) { in kadm5_check_min_life() 2245 sprintf(msg_ret, errstr, time_string); in kadm5_check_min_life()
|
/titanic_41/usr/src/lib/pam_modules/krb5/ |
H A D | krb5_password.c | 429 char msg_ret[1024], admin_realm[1024]; in krb5_changepw() local 489 msg_ret, in krb5_changepw() 490 sizeof (msg_ret)); in krb5_changepw() 498 (void) snprintf(msgs[1], PAM_MAX_MSG_SIZE, "%s", msg_ret); in krb5_changepw()
|
/titanic_41/usr/src/uts/common/io/ib/clients/iser/ |
H A D | iser_ib.c | 768 int rq_space, msg_ret; in iser_ib_post_recv() local 818 msg = iser_msg_get(hca, rq_space, &msg_ret); in iser_ib_post_recv() 840 if (msg_ret != rq_space) { in iser_ib_post_recv() 843 rq_space, msg_ret); in iser_ib_post_recv() 845 rq_space = msg_ret; in iser_ib_post_recv()
|