Home
last modified time | relevance | path

Searched refs:newpw (Results 1 – 18 of 18) sorted by relevance

/titanic_41/usr/src/cmd/krb5/kadmin/kclient/
H A Dksmb.c64 char *newpw; in main() local
103 newpw = strdup(buf); in main()
104 if (newpw == NULL) { in main()
109 newpw = getpassphrase(gettext("Enter new password: ")); in main()
110 if (newpw == NULL) { in main()
116 newpw = strdup(newpw); in main()
117 if (newpw == NULL) { in main()
126 ret = smb_setdomainprops(fqdn, server, newpw); in main()
128 free(newpw); in main()
H A Dksetpw.c59 char c, *vprincstr, *ktname, *token, *lasts, *newpw; in main() local
199 newpw = strdup(buf); in main()
200 if (newpw == NULL) { in main()
206 newpw = getpassphrase(gettext("Enter new password: ")); in main()
207 if (newpw == NULL) { in main()
213 newpw = strdup(newpw); in main()
214 if (newpw == NULL) { in main()
222 code = krb5_set_password_using_ccache(ctx, cc, newpw, victim, in main()
248 kt_add_entry(ctx, kt, victim, salt, enctypes[i], kvno, newpw); in main()
H A Dkclient.sh1098 printf "%s" "$newpw" | $KSMB -d $domain -s $server
1389 newpw=$p
1396 printf "%s" "$newpw" | $KSETPW ${netbios_nodename}@${realm} > /dev/null 2>&1
1528 printf "%s" "$newpw" | $KSETPW $ks_args $skey > /dev/null 2>&1
/titanic_41/usr/src/cmd/ypcmd/yppasswd/
H A Dchangepasswd.c94 struct passwd newpw, opwd; in changepasswd() local
148 (!validstr(yppwd.newpw.pw_passwd, cryptpwsize)) || in changepasswd()
149 (!validstr(yppwd.newpw.pw_name, UTUSERLEN)) || in changepasswd()
150 (!validstr(yppwd.newpw.pw_gecos, fingersize)) || in changepasswd()
151 (!validstr(yppwd.newpw.pw_shell, shellsize))) { in changepasswd()
170 newpw = yppwd.newpw; in changepasswd()
171 strcpy(name, newpw.pw_name); in changepasswd()
409 newpw.pw_name); in changepasswd()
415 newpw.pw_name); in changepasswd()
436 oldpass_crypt = cryptoldpasswd(yppwd.oldpass, newpw.pw_passwd, in changepasswd()
[all …]
H A Dyppasswdxdr.c68 if (!xdr_passwd(xdrs, &yppw->newpw)) { in xdr_yppasswd()
/titanic_41/usr/src/lib/gss_mechs/mech_krb5/krb5/os/
H A Dchangepw.c49 char *newpw; member
167 ctx->newpw, in kpasswd_sendto_msg_callback()
173 ctx->newpw, in kpasswd_sendto_msg_callback()
193 krb5_change_set_password(krb5_context context, krb5_creds *creds, char *newpw, in krb5_change_set_password() argument
213 callback_ctx.newpw = newpw; in krb5_change_set_password()
338 krb5_change_password(krb5_context context, krb5_creds *creds, char *newpw, int *result_code, krb5_d… in krb5_change_password() argument
341 context, creds, newpw, NULL, result_code, result_code_string, result_string ); in krb5_change_password()
353 char *newpw, in krb5_set_password() argument
359 context, creds, newpw, change_password_for, result_code, result_code_string, result_string ); in krb5_set_password()
366 char *newpw, in krb5_set_password_using_ccache() argument
[all …]
/titanic_41/usr/src/lib/libnisdb/yptol/
H A Dshim_changepasswd.c181 if ((!validstr(yppwd.newpw.pw_passwd, CRYPTPWSIZE)) || in shim_changepasswd()
182 (!validstr(yppwd.newpw.pw_name, UTUSERLEN)) || in shim_changepasswd()
183 (!validstr(yppwd.newpw.pw_gecos, FINGERSIZE)) || in shim_changepasswd()
184 (!validstr(yppwd.newpw.pw_shell, SHELLSIZE))) { in shim_changepasswd()
265 for (p = yppwd->newpw.pw_name; (*p != '\0'); p++) in proc_domain()
268 for (p = yppwd->newpw.pw_passwd; (*p != '\0'); p++) in proc_domain()
273 old_pwd = get_old_info(yppwd->newpw.pw_name, domain); in proc_domain()
277 "domain %s", yppwd->newpw.pw_name, domain); in proc_domain()
311 yppwd->newpw.pw_name); in proc_request()
654 "No change for %s", yppwd->newpw.pw_name); in modify_ent()
[all …]
/titanic_41/usr/src/lib/pam_modules/smb/
H A Dsmb_passwd.c84 char *newpw; in pam_sm_chauthtok() local
119 (void) pam_get_item(pamh, PAM_AUTHTOK, (void **)&newpw); in pam_sm_chauthtok()
120 if (newpw == NULL) { in pam_sm_chauthtok()
150 res = smb_pwd_setpasswd(user, newpw); in pam_sm_chauthtok()
/titanic_41/usr/src/lib/krb5/kadm5/clnt/
H A Dchangepw.c85 krb5_change_password_local(context, params, creds, newpw, srvr_rsp_code, in krb5_change_password_local() argument
90 char *newpw;
271 &ap_req, newpw, &chpw_req))
373 char *newpw, in kadm5_chpass_principal_v2() argument
430 &ncreds, newpw, in kadm5_chpass_principal_v2()
/titanic_41/usr/src/lib/pam_modules/authtok_store/
H A Dauthtok_store.c100 char *newpw;
159 res = pam_get_item(pamh, PAM_AUTHTOK, (void **)&newpw);
160 if (res != PAM_SUCCESS || newpw == NULL) {
167 l.data.val_s = newpw;
/titanic_41/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/
H A Dpreauth.c381 krb5_data newpw; in sam_get_pass_from_user() local
382 newpw.data = 0; newpw.length = 0; in sam_get_pass_from_user()
385 (krb5_const_pointer)&newpw, new_enc_key); in sam_get_pass_from_user()
386 krb5_xfree(newpw.data); in sam_get_pass_from_user()
/titanic_41/usr/src/head/rpcsvc/
H A Dyppasswd.h47 struct passwd newpw; /* new pw structure */ member
/titanic_41/usr/src/lib/libnsl/yp/
H A Dyppasswd_xdr.c57 return (xdr_passwd(xdrsp, &pp->newpw)); in xdr_yppasswd()
/titanic_41/usr/src/cmd/krb5/kadmin/cli/
H A Dkadmin.c712 static char newpw[1024]; local
856 unsigned int i = sizeof (newpw) - 1;
865 newpw, &i);
880 newpw);
884 retval = kadm5_chpass_principal(handle, princ, newpw);
887 memset(newpw, 0, sizeof (newpw));
1210 static char newpw[1024], dummybuf[256]; local
1283 unsigned int sz = sizeof (newpw) - 1;
1291 newpw, &sz);
1300 pass = newpw;
/titanic_41/usr/src/lib/smbsrv/libmlsvc/common/
H A Dsamlib.h132 struct samr_encr_passwd *newpw,
H A Dsamr_clnt.c970 struct samr_encr_passwd *newpw, in samr_change_password() argument
1011 arg.nt_newpw = newpw; in samr_change_password()
/titanic_41/usr/src/lib/passwdutil/
H A Dnis_attr.c471 yppasswd.newpw = *nisbuf->pwd; in nis_putpwnam()
/titanic_41/usr/src/uts/common/gssapi/mechs/krb5/include/
H A Dkrb5.h2082 (krb5_context context, krb5_creds *creds, char *newpw,
2087 (krb5_context context, krb5_creds *creds, char *newpw, krb5_principal change_password_for,
2091 (krb5_context context, krb5_ccache ccache, char *newpw, krb5_principal change_password_for,