Home
last modified time | relevance | path

Searched refs:password (Results 1 – 25 of 151) sorted by relevance

1234567

/titanic_44/usr/src/cmd/ssh/sshd/
H A Dauth-passwd.c88 auth_password(Authctxt *authctxt, const char *password) in auth_password() argument
91 if (*password == '\0' && options.permit_empty_passwd == 0) in auth_password()
93 return auth_pam_password(authctxt, password); in auth_password()
95 if (*password == '\0' && options.permit_empty_passwd == 0) in auth_password()
97 return auth_sia_password(authctxt, password); in auth_password()
122 if (*password == '\0' && options.permit_empty_passwd == 0) in auth_password()
126 int ret = auth_krb5_password(authctxt, password); in auth_password()
134 HANDLE hToken = cygwin_logon_user(pw, password); in auth_password()
143 authsuccess = (authenticate(pw->pw_name,password,&reenter,&authmsg) == 0); in auth_password()
156 int ret = auth_krb4_password(authctxt, password); in auth_password()
[all …]
H A Dauth2-passwd.c46 char *password; in userauth_passwd() local
56 password = packet_get_string(&len); in userauth_passwd()
62 auth_password(authctxt, password) == 1) { in userauth_passwd()
65 memset(password, 0, len); in userauth_passwd()
66 xfree(password); in userauth_passwd()
/titanic_44/usr/src/lib/pam_modules/authtok_check/
H A Dfascist.c390 char *password; in FascistLook() local
397 password = rpassword; in FascistLook()
399 (void) strcpy(password, Lowercase(password)); in FascistLook()
400 (void) Trim(password); in FascistLook()
411 if (!(a = Mangle(password, r_destructors[i]))) { in FascistLook()
420 (void) strlcpy(password, Reverse(password), PATH_MAX); in FascistLook()
425 if (!(a = Mangle(password, r_destructors[i]))) { in FascistLook()
437 DictCheck(char *password, char *path) in DictCheck() argument
445 r = FascistLook(pwp, password); in DictCheck()
/titanic_44/usr/src/lib/gss_mechs/mech_krb5/crypto/des/
H A Dafsstring2key.c102 unsigned char password[9]; /* trailing nul for crypt() */ in mit_afs_string_to_key() local
105 memset (password, 0, sizeof (password)); in mit_afs_string_to_key()
106 memcpy (password, realm, min (salt->length, 8)); in mit_afs_string_to_key()
108 if (isupper(password[i])) in mit_afs_string_to_key()
109 password[i] = tolower(password[i]); in mit_afs_string_to_key()
111 password[i] ^= data->data[i]; in mit_afs_string_to_key()
113 if (password[i] == '\0') in mit_afs_string_to_key()
114 password[i] = 'X'; in mit_afs_string_to_key()
115 password[8] = '\0'; in mit_afs_string_to_key()
119 (char *) afs_crypt((char *) password, "#~", afs_crypt_buf) + 2, in mit_afs_string_to_key()
[all …]
/titanic_44/usr/src/lib/gss_mechs/mech_krb5/mech/
H A Dacquire_cred_with_pw.c97 acquire_accept_cred_with_pw(context, minor_status, desired_name, password, cred) in acquire_accept_cred_with_pw() argument
101 const gss_buffer_t password;
112 acquire_init_cred_with_pw(context, minor_status, desired_name, password, cred) in acquire_init_cred_with_pw() argument
116 const gss_buffer_t password;
127 if (password == NULL || password->length == NULL ||
128 password->value == NULL)
130 else if (*((char *)password->value + (password->length - 1)) == '\0')
131 pw = strdup(password->value);
133 pw = malloc(password->length + 1);
139 (void) strlcat(pw, password->value, password->length + 1);
[all …]
/titanic_44/usr/src/lib/sasl_plugins/login/
H A Dlogin.c174 sasl_secret_t *password; in login_server_mech_step() local
190 password = in login_server_mech_step()
192 if (!password) { in login_server_mech_step()
197 strncpy((char *)password->data, clientin, clientinlen); in login_server_mech_step()
198 password->data[clientinlen] = '\0'; in login_server_mech_step()
199 password->len = clientinlen; in login_server_mech_step()
207 _plug_free_secret(params->utils, &password); in login_server_mech_step()
214 (char *)password->data, password->len); in login_server_mech_step()
217 _plug_free_secret(params->utils, &password); in login_server_mech_step()
223 (char *)password->data, password->len); in login_server_mech_step()
[all …]
/titanic_44/usr/src/lib/print/libpapi-common/common/
H A Duri.c93 char *password = NULL; in uri_from_string() local
95 for (password = user; (password < host - 1); password++) in uri_from_string()
96 if (*password == ':') { in uri_from_string()
97 u->password = strndup(password + 1, in uri_from_string()
98 host - password - 2); in uri_from_string()
101 u->user = strndup(user, password - user); in uri_from_string()
168 ((uri->password != NULL) && (uri->user == NULL)) || in uri_to_string()
188 (uri->password ? ":" : ""), in uri_to_string()
189 (uri->password ? uri->password : ""), in uri_to_string()
218 if (uri->password != NULL) in uri_free()
[all …]
/titanic_44/usr/src/lib/pam_modules/dial_auth/
H A Ddial_auth.c64 char *password = NULL; in pam_sm_authenticate() local
154 dgettext(TEXT_DOMAIN, "Dialup Password: "), &password); in pam_sm_authenticate()
160 if (strcmp(crypt(password, p2), p2) != 0) { in pam_sm_authenticate()
161 (void) memset(password, 0, strlen(password)); in pam_sm_authenticate()
162 free(password); in pam_sm_authenticate()
165 (void) memset(password, 0, strlen(password)); in pam_sm_authenticate()
166 free(password); in pam_sm_authenticate()
/titanic_44/usr/src/cmd/krb5/kadmin/kpasswd/
H A Dkpasswd.c113 char password[255]; /* I don't really like 255 but that's what kinit uses */ local
193 pwsize = sizeof(password);
194 code = read_old_password(context, password, &pwsize);
197 memset(password, 0, sizeof(password));
204 memset(password, 0, sizeof(password));
224 code = kadm5_init_with_password(princ_str, password, cpw_service,
333 pwsize = sizeof(password);
334 code = read_new_password(server_handle, password, &pwsize, msg_ret, sizeof (msg_ret), princ);
335 memset(password, 0, sizeof(password));
H A Dtty_kpasswd.c58 long read_old_password(context, password, pwsize) in read_old_password() argument
60 char *password;
65 0, password, pwsize);
69 long read_new_password(server_handle, password, pwsize, msg_ret, msg_len, princ) in read_new_password() argument
71 char *password;
/titanic_44/usr/src/lib/krb5/plugins/kdb/ldap/libkdb_ldap/
H A Dldap_service_stash.c45 krb5_ldap_readpassword(context, ldap_context, password) in krb5_ldap_readpassword() argument
48 unsigned char **password;
56 *password = NULL;
142 *password = (unsigned char *)malloc(strlen(start) + 2);
143 if (*password == NULL) {
147 (*password)[strlen(start) + 1] = '\0';
148 (*password)[strlen(start)] = '\0';
150 strcpy((char *)(*password), start);
179 *password = PT.value;
186 if (*password)
[all …]
H A Dkdb_ldap_conn.c51 unsigned char *password=NULL; in krb5_validate_ldap_context() local
69 if ((st=krb5_ldap_readpassword(context, ldap_context, &password)) != 0) { in krb5_validate_ldap_context()
75 if (!strncmp("{FILE}", (char *)password, 6)) { in krb5_validate_ldap_context()
77 ldap_context->service_cert_path = strdup((char *)password + strlen("{FILE}")); in krb5_validate_ldap_context()
83 if (password[strlen((char *)password) + 1] == '\0') in krb5_validate_ldap_context()
86 ldap_context->service_cert_pass = strdup((char *)password + in krb5_validate_ldap_context()
87 strlen((char *)password) + 1); in krb5_validate_ldap_context()
94 free(password); in krb5_validate_ldap_context()
96 ldap_context->bind_pwd = (char *)password; in krb5_validate_ldap_context()
/titanic_44/usr/src/lib/print/libpapi-dynamic/common/
H A Dservice.c197 char *password = svc->password; in service_connect() local
203 if ((password == NULL) && (svc->uri != NULL)) in service_connect()
204 password = (svc->uri)->password; in service_connect()
206 result = f(&svc->svc_handle, svc->name, user, password, in service_connect()
219 char *password, in papiServiceCreate() argument
238 if (password != NULL) in papiServiceCreate()
239 svc->password = strdup(password); in papiServiceCreate()
286 if (svc->password != NULL) in papiServiceDestroy()
287 free(svc->password); in papiServiceDestroy()
334 papiServiceSetPassword(papi_service_t handle, char *password) in papiServiceSetPassword() argument
[all …]
/titanic_44/usr/src/lib/passwdutil/
H A DREADME.SunOS-aging36 The characters are password aging data. Password aging forces the
38 of time. Password aging can also force a user to keep a password for
42 ] Sample entry from /etc/passwd with password aging installed:
47 Note the comma in the encrypted password field. The characters after
48 the comma are used by the password aging mechanism.
58 1: Maximum number of weeks a password can be used without changing.
59 2: Minimum number of weeks a password must be used before changing.
60 3& 4: Last time password was changed, in number of weeks since 1970.
70 user will not be subjected to password aging requirements again.
77 the user is not allowed to change his/her password. Only root can
[all …]
/titanic_44/usr/src/lib/print/libpapi-ipp/common/
H A Dservice.c125 char *user_name, char *password, in papiServiceCreate() argument
142 if (password != NULL) in papiServiceCreate()
143 svc->password = strdup(password); in papiServiceCreate()
178 if (svc->password != NULL) in papiServiceDestroy()
179 free(svc->password); in papiServiceDestroy()
211 papiServiceSetPassword(papi_service_t handle, char *password) in papiServiceSetPassword() argument
218 if (svc->password != NULL) in papiServiceSetPassword()
219 free(svc->password); in papiServiceSetPassword()
220 svc->password = NULL; in papiServiceSetPassword()
221 if (password != NULL) in papiServiceSetPassword()
[all …]
/titanic_44/usr/src/lib/pam_modules/passwd_auth/
H A Dpasswd_auth.c69 char *password; in pam_sm_authenticate() local
115 res = pam_get_item(pamh, PAM_AUTHTOK, (void **)&password); in pam_sm_authenticate()
119 if (password != NULL) in pam_sm_authenticate()
195 &password); in pam_sm_authenticate()
199 if (password == NULL) { in pam_sm_authenticate()
262 if (strcmp(crypt(password, rep_passwd), rep_passwd) != 0) { in pam_sm_authenticate()
305 retval = pam_set_item(pamh, PAM_AUTHTOK, (void *)password); in pam_sm_authenticate()
308 if (password) { in pam_sm_authenticate()
309 (void) memset(password, 0, strlen(password)); in pam_sm_authenticate()
310 free(password); in pam_sm_authenticate()
/titanic_44/usr/src/lib/krb5/kadm5/srv/
H A Dserver_misc.c138 char *password, int use_policy, kadm5_policy_ent_t pol, in passwd_check() argument
153 if(strlen(password) < pol->pw_min_length) in passwd_check()
155 s = password; in passwd_check()
177 if((find_word(password) == KADM5_OK)) in passwd_check()
182 if (strcasecmp(cp, password) == 0) in passwd_check()
186 if (strcasecmp(cp, password) == 0) in passwd_check()
191 if (str_check_gecos(ent->pw_gecos, password)) in passwd_check()
198 if (strlen(password) < 1) in passwd_check()
/titanic_44/usr/src/lib/smbsrv/libmlsvc/common/
H A Dnetr_auth.c281 bzero(netr_info->password, sizeof (netr_info->password)); in netr_gen_skey128()
283 (char *)netr_info->password, sizeof (netr_info->password)); in netr_gen_skey128()
285 if ((rc != SMBD_SMF_OK) || *netr_info->password == '\0') { in netr_gen_skey128()
289 rc = smb_auth_ntlm_hash((char *)netr_info->password, ntlmhash); in netr_gen_skey128()
386 bzero(netr_info->password, sizeof (netr_info->password)); in netr_gen_skey64()
388 (char *)netr_info->password, sizeof (netr_info->password)); in netr_gen_skey64()
390 if ((rc != SMBD_SMF_OK) || *netr_info->password == '\0') { in netr_gen_skey64()
394 rc = smb_auth_ntlm_hash((char *)netr_info->password, md4hash); in netr_gen_skey64()
515 netr_info->password, new_password) == SMBAUTH_FAILURE) { in netr_server_password_set()
545 (void) memcpy(netr_info->password, new_password, in netr_server_password_set()
/titanic_44/usr/src/grub/grub-0.97/util/
H A Dgrub-md5-crypt.in35 Encrypt a password in MD5 format.
69 read -r password
80 if test "x$password" = x; then
85 if test "x$password" != "x$password2"; then
94 $password
/titanic_44/usr/src/lib/sasl_plugins/plain/
H A Dplain.c107 const char *password; in plain_server_mech_step() local
150 password = clientin + lup; in plain_server_mech_step()
153 password_len = clientin + lup - password; in plain_server_mech_step()
175 strncpy(passcopy, password, password_len); in plain_server_mech_step()
217 params->transition(params->utils->conn, password, password_len); in plain_server_mech_step()
313 sasl_secret_t *password = NULL; in plain_client_mech_step() local
352 if (password == NULL) { in plain_client_mech_step()
353 pass_result = _plug_get_password(params->utils, &password, in plain_client_mech_step()
407 if (!password) { in plain_client_mech_step()
429 + password->len); in plain_client_mech_step()
[all …]
/titanic_44/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/
H A Dgic_pwd.c51 krb5_data *password; in krb5_get_as_key_password() local
59 password = (krb5_data *) gak_data; in krb5_get_as_key_password()
76 if (password->data[0] == '\0') { in krb5_get_as_key_password()
91 prompt.reply = password; in krb5_get_as_key_password()
113 ret = krb5_c_string_to_key_with_params(context, etype, password, salt, in krb5_get_as_key_password()
126 char *password, in krb5_get_init_creds_password() argument
142 return (__krb5_get_init_creds_password(context, creds, client, password, in krb5_get_init_creds_password()
156 char *password, in __krb5_get_init_creds_password() argument
187 if (password && password[0]) { in __krb5_get_init_creds_password()
188 if ((pw0.length = strlen(password)) > sizeof(pw0array)) { in __krb5_get_init_creds_password()
[all …]
/titanic_44/usr/src/lib/pam_modules/krb5/
H A Dkrb5_acct_mgmt.c65 char *cpw_service, *password; in fetch_princ_entry() local
70 password = kmd->password; in fetch_princ_entry()
83 if (strlen(password) == 0) { in fetch_princ_entry()
108 code = kadm5_init_with_password(kprinc, password, cpw_service, in fetch_princ_entry()
175 char messages[PAM_MAX_NUM_MSG][PAM_MAX_MSG_SIZE], *password; in exp_warn() local
183 password = kmd->password; in exp_warn()
185 if (!pamh || !user || !password) { in exp_warn()
459 !nowarn && kmd->password) { in pam_sm_acct_mgmt()
/titanic_44/usr/src/lib/pam_modules/authtok_get/
H A Dauthtok_get.c224 char *password; in pam_sm_authenticate() local
257 res = pam_get_item(pamh, PAM_AUTHTOK, (void **)&password); in pam_sm_authenticate()
261 if (password != NULL) in pam_sm_authenticate()
328 dgettext(TEXT_DOMAIN, "Password: "), &password); in pam_sm_authenticate()
332 if (password != NULL) { in pam_sm_authenticate()
333 (void) pam_set_item(pamh, PAM_AUTHTOK, (void *)password); in pam_sm_authenticate()
334 (void) memset(password, 0, strlen(password)); in pam_sm_authenticate()
335 free(password); in pam_sm_authenticate()
/titanic_44/usr/src/lib/pam_modules/sample/
H A Dsample_authenticate.c83 char *firstpass, *password; in pam_sm_authenticate() local
156 password = ret_resp->resp; in pam_sm_authenticate()
158 if (password == NULL) { in pam_sm_authenticate()
165 if (strncmp(password, the_password, strlen(the_password)) == 0) { in pam_sm_authenticate()
169 (void) pam_set_item(pamh, PAM_AUTHTOK, password); in pam_sm_authenticate()
/titanic_44/usr/src/lib/pam_modules/ldap/
H A Dldap_authenticate.c59 char *password = NULL; in pam_sm_authenticate() local
96 (void) pam_get_item(pamh, PAM_AUTHTOK, (void **) &password); in pam_sm_authenticate()
97 if (password == NULL) { in pam_sm_authenticate()
110 result = authenticate(&credp, user, password, NULL); in pam_sm_authenticate()

1234567