/titanic_41/usr/src/head/ |
H A D | pwd.h | 48 struct passwd { struct 69 extern struct passwd *getpwuid(uid_t); /* MT-unsafe */ argument 70 extern struct passwd *getpwnam(const char *); /* MT-unsafe */ 73 extern struct passwd *getpwent_r(struct passwd *, char *, int); 74 extern struct passwd *fgetpwent_r(FILE *, struct passwd *, char *, int); 75 extern struct passwd *fgetpwent(FILE *); /* MT-unsafe */ 76 extern int putpwent(const struct passwd *, FILE *); 82 extern struct passwd *getpwent(void); /* MT-unsafe */ 130 extern int getpwuid_r(uid_t, struct passwd *, char *, 131 size_t, struct passwd **); [all …]
|
/titanic_41/usr/src/lib/libc/port/gen/ |
H A D | getpwnam_r.c | 54 struct passwd * 55 _uncached_getpwuid_r(uid_t uid, struct passwd *result, char *buffer, 58 struct passwd * 59 _uncached_getpwnam_r(const char *name, struct passwd *result, char *buffer, 66 struct passwd * 67 getpwnam_r(const char *name, struct passwd *result, char *buffer, int buflen) in getpwnam_r() 79 return ((struct passwd *)NSS_XbyY_FINI(&arg)); in getpwnam_r() 86 struct passwd * 87 getpwuid_r(uid_t uid, struct passwd *result, char *buffer, int buflen) in getpwuid_r() 95 return ((struct passwd *)NSS_XbyY_FINI(&arg)); in getpwuid_r() [all …]
|
H A D | getpwnam.c | 65 b = NSS_XbyY_ALLOC(buffer, sizeof (struct passwd), NSS_BUFLEN_PASSWD); in get_pwbuf() 69 struct passwd * 78 struct passwd * 87 struct passwd * 96 struct passwd *
|
/titanic_41/usr/src/cmd/ssh/include/ |
H A D | auth.h | 93 struct passwd *pw; 214 int auth_rhosts(struct passwd *, const char *); 216 auth_rhosts2(struct passwd *, const char *, const char *, const char *); 218 int auth_rhosts_rsa(struct passwd *, char *, Key *); 220 int auth_rsa(struct passwd *, BIGNUM *); 224 int auth_rsa_key_allowed(struct passwd *, BIGNUM *, Key **); 226 int auth_rhosts_rsa_key_allowed(struct passwd *, char *, char *, Key *); 227 int hostbased_key_allowed(struct passwd *, const char *, char *, Key *); 228 int user_key_allowed(struct passwd *, Key *); 283 struct passwd * getpwnamallow(const char *user); [all …]
|
/titanic_41/usr/src/cmd/ypcmd/net_files/ |
H A D | Makefile | 81 all: passwd group hosts ipnodes ethers networks rpc services protocols \ 87 -@if [ -f $(PWDIR)/security/passwd.adjunct ]; then \ 89 passwd.adjunct.time group.adjunct.time; \ 91 passwd.adjunct.time group.adjunct.time; \ 95 passwd.time: $(PWDIR)/passwd $(PWDIR)/shadow 96 -@if [ -f $(PWDIR)/security/passwd.adjunct ]; then \ 97 …" $$1; printf "%s\t%s\n", $$1, $$0 }' $(PWDIR)/passwd $(CHKPIPE)) | $(MAKEDBM) - $(YPDBDIR)/$(DOM)… 98 …$1; printf "%-10d\t%s\n", $$3, $$0 }' $(PWDIR)/passwd $(CHKPIPE)) | $(MAKEDBM) - $(YPDBDIR)/$(DOM)… 100 …dow[$$1]; printf "%s\t%s\n",$$1,$$0 }' $(PWDIR)/passwd $(CHKPIPE))| $(MAKEDBM) - $(YPDBDIR)/$(DOM)… 101 …[$$1]; printf "%-10d\t%s\n",$$3,$$0 }' $(PWDIR)/passwd $(CHKPIPE))| $(MAKEDBM) - $(YPDBDIR)/$(DOM)… [all …]
|
/titanic_41/usr/src/lib/libldap5/sources/ldap/common/ |
H A D | sbind.c | 40 static int simple_bind_nolock( LDAP *ld, const char *dn, const char *passwd, 42 static int simple_bindifnot_s( LDAP *ld, const char *dn, const char *passwd ); 56 ldap_simple_bind( LDAP *ld, const char *dn, const char *passwd ) in ldap_simple_bind() argument 66 rc = simple_bind_nolock( ld, dn, passwd, 1 ); in ldap_simple_bind() 73 simple_bind_nolock( LDAP *ld, const char *dn, const char *passwd, in simple_bind_nolock() argument 97 if ( passwd == NULL ) in simple_bind_nolock() 98 passwd = ""; in simple_bind_nolock() 103 bv.bv_val = (char *)passwd; in simple_bind_nolock() 104 bv.bv_len = strlen( passwd ); in simple_bind_nolock() 124 NSLDAPI_LDAP_VERSION( ld ), dn, LDAP_AUTH_SIMPLE, passwd ) == -1 ) { in simple_bind_nolock() [all …]
|
/titanic_41/usr/src/test/zfs-tests/tests/functional/xattr/ |
H A D | xattr_011_pos.ksh | 60 create_xattr $TESTDIR/myfile.$$ passwd /etc/passwd 71 create_xattr $TESTDIR/cpio.$$ passwd /etc/passwd 97 compare_xattrs $TESTDIR/myfile.$$ $TESTDIR/myfile2.$$ passwd 127 create_xattr $TESTDIR/mvfile.$$ passwd /etc/passwd 129 verify_xattr $TESTDIR/mvfile2.$$ passwd /etc/passwd 135 create_xattr $TESTDIR/pax.$$ passwd /etc/passwd 153 verify_xattr $TESTDIR/pax.$$ passwd /etc/passwd 164 create_xattr $TESTDIR/tar.$$ passwd /etc/passwd 179 verify_xattr tar.$$ passwd /etc/passwd
|
H A D | xattr_005_pos.ksh | 57 create_xattr $TESTDIR/myfile.$$ passwd /etc/passwd 65 verify_xattr $TESTDIR/clone/myfile.$$ passwd /etc/passwd 68 create_xattr $TESTDIR/clone/myfile.$$ foo /etc/passwd 72 delete_xattr $TESTDIR/myfile.$$ passwd 75 verify_xattr $TESTDIR/clone/myfile.$$ passwd /etc/passwd 76 delete_xattr $TESTDIR/clone/myfile.$$ passwd
|
H A D | xattr_013_pos.ksh | 62 create_xattr $TESTDIR/myfile.$$ passwd /etc/passwd 81 verify_xattr $TESTDIR/myfile.$$ passwd /etc/passwd 86 create_xattr $TESTDIR/new.$$ passwd /etc/passwd
|
H A D | xattr_001_pos.ksh | 59 create_xattr $TESTDIR/myfile.$$ passwd /etc/passwd 60 verify_write_xattr $TESTDIR/myfile.$$ passwd 61 delete_xattr $TESTDIR/myfile.$$ passwd
|
/titanic_41/usr/src/lib/passwdutil/ |
H A D | switch_utils.c | 295 struct passwd *passwd = (struct passwd *)ent; in str2passwd() local 311 passwd->pw_name = p = gettok(&next); /* username */ in str2passwd() 318 passwd->pw_uid = UID_NOBODY; in str2passwd() 319 passwd->pw_gid = GID_NOBODY; in str2passwd() 323 passwd->pw_passwd = ""; in str2passwd() 324 passwd->pw_age = ""; in str2passwd() 328 passwd->pw_comment = ""; in str2passwd() 329 passwd->pw_gecos = ""; in str2passwd() 330 passwd->pw_dir = ""; in str2passwd() 331 passwd->pw_shell = ""; in str2passwd() [all …]
|
/titanic_41/usr/src/cmd/cmd-inet/usr.lib/ilbd/ |
H A D | ilbd.h | 298 struct passwd cli_pw; 310 ilb_status_t ilbd_check_client_config_auth(const struct passwd *); 311 ilb_status_t ilbd_check_client_enable_auth(const struct passwd *); 317 const struct passwd *, ucred_t *); 319 const struct passwd *, ucred_t *); 321 const struct passwd *, ucred_t *); 323 ilb_status_t ilbd_destroy_sg(const char *, const struct passwd *, 327 ilb_status_t ilbd_enable_server(ilb_sg_info_t *, const struct passwd *, 329 ilb_status_t ilbd_disable_server(ilb_sg_info_t *, const struct passwd *, 347 ilb_status_t ilbd_create_rule(ilb_rule_info_t *, int, const struct passwd *, [all …]
|
/titanic_41/usr/src/lib/smbsrv/libsmb/common/ |
H A D | smb_auth.c | 313 unsigned char *passwd) in smb_lm_password_ok() argument 322 return (bcmp(lm_resp, passwd, SMBAUTH_LM_RESP_SZ) == 0); in smb_lm_password_ok() 330 unsigned char *passwd, in smb_ntlm_password_ok() argument 341 ok = (bcmp(ntlm_resp, passwd, SMBAUTH_LM_RESP_SZ) == 0); in smb_ntlm_password_ok() 355 unsigned char *passwd, in smb_ntlmv2_password_ok() argument 371 clnt_blob = &passwd[SMBAUTH_HASH_SZ]; in smb_ntlmv2_password_ok() 410 ok = (bcmp(passwd, ntlmv2_resp, pwdlen) == 0); in smb_ntlmv2_password_ok() 432 unsigned char *passwd, in smb_lmv2_password_ok() argument 443 clnt_challenge = &passwd[SMBAUTH_HASH_SZ]; in smb_lmv2_password_ok() 477 ok = (bcmp(passwd, lmv2_resp, SMBAUTH_LM_RESP_SZ) == 0); in smb_lmv2_password_ok() [all …]
|
H A D | smb_info.c | 55 uint8_t passwd[SMBAUTH_HASH_SZ]; member 297 smb_set_machine_passwd(char *passwd) in smb_set_machine_passwd() argument 302 if (smb_config_set(SMB_CI_MACHINE_PASSWD, passwd) != SMBD_SMF_OK) in smb_set_machine_passwd() 346 rc = smb_get_machine_passwd(ipc_info.passwd, SMBAUTH_HASH_SZ); in smb_ipc_init() 348 *ipc_info.passwd = 0; in smb_ipc_init() 363 (void) memcpy(ipc_info.passwd, passwd_hash, SMBAUTH_HASH_SZ); in smb_ipc_set() 378 (void) smb_get_machine_passwd(ipc_info.passwd, SMBAUTH_HASH_SZ); in smb_ipc_commit() 392 (void) memcpy(ipc_info.passwd, ipc_orig_info.passwd, in smb_ipc_rollback() 393 sizeof (ipc_info.passwd)); in smb_ipc_rollback() 412 (void) memcpy(buf, ipc_info.passwd, SMBAUTH_HASH_SZ); in smb_ipc_get_passwd() [all …]
|
/titanic_41/usr/src/lib/libnsl/key/ |
H A D | publickey.c | 148 getkeys_nis(int *errp, char *netname, char *pkey, char *skey, char *passwd) in getkeys_nis() argument 206 if (skey && extract_secret(p, skey, passwd)) in getkeys_nis() 228 getkeys_files(int *errp, char *netname, char *pkey, char *skey, char *passwd) in getkeys_files() argument 289 if (skey && extract_secret(p, skey, passwd)) in getkeys_files() 329 getsecretkey(const char *netname, char *skey, const char *passwd) in getsecretkey() argument 332 passwd)); in getsecretkey() 348 char *passwd, /* in */ in extract_secret_g() argument 357 if (!buf || !passwd || !raw || !private || !prilen || in extract_secret_g() 375 if (!xdecrypt_g(buf, keylen, algtype, passwd, netname, TRUE)) { in extract_secret_g() 400 extract_secret(char *raw, char *private, char *passwd) in extract_secret() argument [all …]
|
H A D | xcrypt.c | 80 xencrypt(secret, passwd) in xencrypt() argument 82 char *passwd; 95 (void) passwd2des(passwd, key); 114 xdecrypt(secret, passwd) in xdecrypt() argument 116 char *passwd; 130 (void) passwd2des(passwd, key); 244 const char *passwd, /* in */ in xencrypt_g() argument 262 if (!secret || !keylen || !passwd || !encrypted_secret) in xencrypt_g() 303 (void) passwd2des((char *)passwd, key.c); in xencrypt_g() 306 (void) passwd2des_g(passwd, netname, in xencrypt_g() [all …]
|
/titanic_41/usr/src/cmd/krb5/ldap_util/ |
H A D | kdb5_ldap_util.c | 306 char *passwd = NULL; local 386 passwd = strdup(koptarg); 387 if (passwd == NULL) { 515 if (passwd == NULL) { 516 passwd = (char *)malloc(MAX_PASSWD_LEN); 517 if (passwd == NULL) { 525 free(passwd); 526 passwd = NULL; 532 memset(passwd, 0, sizeof(passwd)); 536 db_retval = krb5_read_password(util_context, prompt, NULL, passwd, &passwd_len); [all …]
|
/titanic_41/usr/src/cmd/cmd-inet/lib/nwamd/ |
H A D | door_if.c | 74 nwam_error_t (*ndre_fn)(nwamd_door_arg_t *, ucred_t *, struct passwd *); 78 ucred_t *, struct passwd *); 80 ucred_t *, struct passwd *); 82 ucred_t *, struct passwd *); 84 ucred_t *, struct passwd *); 86 ucred_t *, struct passwd *); 88 ucred_t *, struct passwd *); 90 ucred_t *, struct passwd *); 92 ucred_t *, struct passwd *); 94 ucred_t *, struct passwd *); [all …]
|
/titanic_41/usr/src/lib/libpkg/common/ |
H A D | ncgrpw.c | 62 static int dup_pw_ent(struct passwd *pwp); 181 struct passwd * 184 struct passwd *pwd; in cpwnam() 213 pwd = (struct passwd *)NULL; in cpwnam() 224 sizeof (struct passwd))) != Null_Item) { in cpwnam() 237 sizeof (struct passwd)); in cpwnam() 248 return ((struct passwd *)itemp->data); in cpwnam() 337 struct passwd * 340 struct passwd *pwd; in cpwuid() 370 pwd = (struct passwd *)NULL; in cpwuid() [all …]
|
/titanic_41/usr/src/lib/libsasl/lib/ |
H A D | checkpw.c | 114 const char *passwd, size_t passlen, in _sasl_make_plain_secret() argument 118 const char *passwd, size_t passlen, in _sasl_make_plain_secret() 139 _sasl_MD5Update(&ctx, passwd, passlen); in _sasl_make_plain_secret() 152 const char *passwd, in auxprop_verify_password() argument 199 if(!passwd) { in auxprop_verify_password() 209 && !strcmp(auxprop_values[0].values[0], passwd)) { in auxprop_verify_password() 220 passwd, strlen(passwd), in auxprop_verify_password() 223 ret = _sasl_make_plain_secret(db_secret, passwd, in auxprop_verify_password() 224 strlen(passwd), in auxprop_verify_password() 409 const char *passwd, in pwcheck_verify_password() argument [all …]
|
/titanic_41/usr/src/cmd/cmd-inet/usr.bin/pppd/plugins/ |
H A D | passprompt.c | 27 static int promptpass(char *user, char *passwd) in promptpass() argument 38 if (user != NULL && passwd == NULL) in promptpass() 84 red = read(p[0], passwd + readgood, MAXSECRETLEN-1 - readgood); in promptpass() 96 passwd[readgood] = 0; in promptpass() 109 if (readgood > 0 && passwd[--readgood] == '\n') in promptpass() 110 passwd[readgood] = '\0'; in promptpass()
|
/titanic_41/usr/src/lib/libbc/inc/include/ |
H A D | pwd.h | 37 struct passwd { struct 51 extern struct passwd *getpwent(); argument 62 struct passwd *getpwuid(/* uid_t uid */); 63 struct passwd *getpwnam(/* char *name */);
|
/titanic_41/usr/src/lib/libbc/inc/5include/ |
H A D | pwd.h | 46 struct passwd { struct 72 extern struct passwd *getpwent(); argument 83 struct passwd *getpwuid(/* uid_t uid */); 84 struct passwd *getpwnam(/* char *name */);
|
/titanic_41/usr/src/cmd/mailx/ |
H A D | getname.c | 46 extern struct passwd *getpwnam(); 47 extern struct passwd *getpwuid(); 59 struct passwd *pw; in getname() 82 struct passwd *pw; in getuserid()
|
/titanic_41/usr/src/cmd/cmd-inet/usr.bin/pppd/ |
H A D | auth.c | 147 int (*pap_auth_hook) __P((char *user, char *passwd, char **msgp, 155 int (*pap_passwd_hook) __P((char *user, char *passwd)) = NULL; 277 { "password", o_string, passwd, 332 || fgets(passwd, MAXSECRETLEN - 1, ufile) == NULL){ 342 l = strlen(passwd); 343 if (l > 0 && passwd[l-1] == '\n') 344 passwd[l-1] = '\0'; 592 if (passwd[0] == '\0') { 594 if (!get_pap_passwd(passwd)) 599 upap_authwithpeer(unit, user, passwd); [all …]
|