/titanic_44/usr/src/cmd/ssh/sshd/ |
H A D | auth-passwd.c | 88 auth_password(Authctxt *authctxt, const char *password) in auth_password() argument 91 if (*password == '\0' && options.permit_empty_passwd == 0) in auth_password() 93 return auth_pam_password(authctxt, password); in auth_password() 95 if (*password == '\0' && options.permit_empty_passwd == 0) in auth_password() 97 return auth_sia_password(authctxt, password); in auth_password() 122 if (*password == '\0' && options.permit_empty_passwd == 0) in auth_password() 126 int ret = auth_krb5_password(authctxt, password); in auth_password() 134 HANDLE hToken = cygwin_logon_user(pw, password); in auth_password() 143 authsuccess = (authenticate(pw->pw_name,password,&reenter,&authmsg) == 0); in auth_password() 156 int ret = auth_krb4_password(authctxt, password); in auth_password() [all …]
|
H A D | auth2-passwd.c | 46 char *password; in userauth_passwd() local 56 password = packet_get_string(&len); in userauth_passwd() 62 auth_password(authctxt, password) == 1) { in userauth_passwd() 65 memset(password, 0, len); in userauth_passwd() 66 xfree(password); in userauth_passwd()
|
/titanic_44/usr/src/lib/pam_modules/authtok_check/ |
H A D | fascist.c | 390 char *password; in FascistLook() local 397 password = rpassword; in FascistLook() 399 (void) strcpy(password, Lowercase(password)); in FascistLook() 400 (void) Trim(password); in FascistLook() 411 if (!(a = Mangle(password, r_destructors[i]))) { in FascistLook() 420 (void) strlcpy(password, Reverse(password), PATH_MAX); in FascistLook() 425 if (!(a = Mangle(password, r_destructors[i]))) { in FascistLook() 437 DictCheck(char *password, char *path) in DictCheck() argument 445 r = FascistLook(pwp, password); in DictCheck()
|
/titanic_44/usr/src/lib/gss_mechs/mech_krb5/crypto/des/ |
H A D | afsstring2key.c | 102 unsigned char password[9]; /* trailing nul for crypt() */ in mit_afs_string_to_key() local 105 memset (password, 0, sizeof (password)); in mit_afs_string_to_key() 106 memcpy (password, realm, min (salt->length, 8)); in mit_afs_string_to_key() 108 if (isupper(password[i])) in mit_afs_string_to_key() 109 password[i] = tolower(password[i]); in mit_afs_string_to_key() 111 password[i] ^= data->data[i]; in mit_afs_string_to_key() 113 if (password[i] == '\0') in mit_afs_string_to_key() 114 password[i] = 'X'; in mit_afs_string_to_key() 115 password[8] = '\0'; in mit_afs_string_to_key() 119 (char *) afs_crypt((char *) password, "#~", afs_crypt_buf) + 2, in mit_afs_string_to_key() [all …]
|
/titanic_44/usr/src/lib/gss_mechs/mech_krb5/mech/ |
H A D | acquire_cred_with_pw.c | 97 acquire_accept_cred_with_pw(context, minor_status, desired_name, password, cred) in acquire_accept_cred_with_pw() argument 101 const gss_buffer_t password; 112 acquire_init_cred_with_pw(context, minor_status, desired_name, password, cred) in acquire_init_cred_with_pw() argument 116 const gss_buffer_t password; 127 if (password == NULL || password->length == NULL || 128 password->value == NULL) 130 else if (*((char *)password->value + (password->length - 1)) == '\0') 131 pw = strdup(password->value); 133 pw = malloc(password->length + 1); 139 (void) strlcat(pw, password->value, password->length + 1); [all …]
|
/titanic_44/usr/src/lib/sasl_plugins/login/ |
H A D | login.c | 174 sasl_secret_t *password; in login_server_mech_step() local 190 password = in login_server_mech_step() 192 if (!password) { in login_server_mech_step() 197 strncpy((char *)password->data, clientin, clientinlen); in login_server_mech_step() 198 password->data[clientinlen] = '\0'; in login_server_mech_step() 199 password->len = clientinlen; in login_server_mech_step() 207 _plug_free_secret(params->utils, &password); in login_server_mech_step() 214 (char *)password->data, password->len); in login_server_mech_step() 217 _plug_free_secret(params->utils, &password); in login_server_mech_step() 223 (char *)password->data, password->len); in login_server_mech_step() [all …]
|
/titanic_44/usr/src/lib/print/libpapi-common/common/ |
H A D | uri.c | 93 char *password = NULL; in uri_from_string() local 95 for (password = user; (password < host - 1); password++) in uri_from_string() 96 if (*password == ':') { in uri_from_string() 97 u->password = strndup(password + 1, in uri_from_string() 98 host - password - 2); in uri_from_string() 101 u->user = strndup(user, password - user); in uri_from_string() 168 ((uri->password != NULL) && (uri->user == NULL)) || in uri_to_string() 188 (uri->password ? ":" : ""), in uri_to_string() 189 (uri->password ? uri->password : ""), in uri_to_string() 218 if (uri->password != NULL) in uri_free() [all …]
|
/titanic_44/usr/src/lib/pam_modules/dial_auth/ |
H A D | dial_auth.c | 64 char *password = NULL; in pam_sm_authenticate() local 154 dgettext(TEXT_DOMAIN, "Dialup Password: "), &password); in pam_sm_authenticate() 160 if (strcmp(crypt(password, p2), p2) != 0) { in pam_sm_authenticate() 161 (void) memset(password, 0, strlen(password)); in pam_sm_authenticate() 162 free(password); in pam_sm_authenticate() 165 (void) memset(password, 0, strlen(password)); in pam_sm_authenticate() 166 free(password); in pam_sm_authenticate()
|
/titanic_44/usr/src/cmd/krb5/kadmin/kpasswd/ |
H A D | kpasswd.c | 113 char password[255]; /* I don't really like 255 but that's what kinit uses */ local 193 pwsize = sizeof(password); 194 code = read_old_password(context, password, &pwsize); 197 memset(password, 0, sizeof(password)); 204 memset(password, 0, sizeof(password)); 224 code = kadm5_init_with_password(princ_str, password, cpw_service, 333 pwsize = sizeof(password); 334 code = read_new_password(server_handle, password, &pwsize, msg_ret, sizeof (msg_ret), princ); 335 memset(password, 0, sizeof(password));
|
H A D | tty_kpasswd.c | 58 long read_old_password(context, password, pwsize) in read_old_password() argument 60 char *password; 65 0, password, pwsize); 69 long read_new_password(server_handle, password, pwsize, msg_ret, msg_len, princ) in read_new_password() argument 71 char *password;
|
/titanic_44/usr/src/lib/krb5/plugins/kdb/ldap/libkdb_ldap/ |
H A D | ldap_service_stash.c | 45 krb5_ldap_readpassword(context, ldap_context, password) in krb5_ldap_readpassword() argument 48 unsigned char **password; 56 *password = NULL; 142 *password = (unsigned char *)malloc(strlen(start) + 2); 143 if (*password == NULL) { 147 (*password)[strlen(start) + 1] = '\0'; 148 (*password)[strlen(start)] = '\0'; 150 strcpy((char *)(*password), start); 179 *password = PT.value; 186 if (*password) [all …]
|
H A D | kdb_ldap_conn.c | 51 unsigned char *password=NULL; in krb5_validate_ldap_context() local 69 if ((st=krb5_ldap_readpassword(context, ldap_context, &password)) != 0) { in krb5_validate_ldap_context() 75 if (!strncmp("{FILE}", (char *)password, 6)) { in krb5_validate_ldap_context() 77 ldap_context->service_cert_path = strdup((char *)password + strlen("{FILE}")); in krb5_validate_ldap_context() 83 if (password[strlen((char *)password) + 1] == '\0') in krb5_validate_ldap_context() 86 ldap_context->service_cert_pass = strdup((char *)password + in krb5_validate_ldap_context() 87 strlen((char *)password) + 1); in krb5_validate_ldap_context() 94 free(password); in krb5_validate_ldap_context() 96 ldap_context->bind_pwd = (char *)password; in krb5_validate_ldap_context()
|
/titanic_44/usr/src/lib/print/libpapi-dynamic/common/ |
H A D | service.c | 197 char *password = svc->password; in service_connect() local 203 if ((password == NULL) && (svc->uri != NULL)) in service_connect() 204 password = (svc->uri)->password; in service_connect() 206 result = f(&svc->svc_handle, svc->name, user, password, in service_connect() 219 char *password, in papiServiceCreate() argument 238 if (password != NULL) in papiServiceCreate() 239 svc->password = strdup(password); in papiServiceCreate() 286 if (svc->password != NULL) in papiServiceDestroy() 287 free(svc->password); in papiServiceDestroy() 334 papiServiceSetPassword(papi_service_t handle, char *password) in papiServiceSetPassword() argument [all …]
|
/titanic_44/usr/src/lib/passwdutil/ |
H A D | README.SunOS-aging | 36 The characters are password aging data. Password aging forces the 38 of time. Password aging can also force a user to keep a password for 42 ] Sample entry from /etc/passwd with password aging installed: 47 Note the comma in the encrypted password field. The characters after 48 the comma are used by the password aging mechanism. 58 1: Maximum number of weeks a password can be used without changing. 59 2: Minimum number of weeks a password must be used before changing. 60 3& 4: Last time password was changed, in number of weeks since 1970. 70 user will not be subjected to password aging requirements again. 77 the user is not allowed to change his/her password. Only root can [all …]
|
/titanic_44/usr/src/lib/print/libpapi-ipp/common/ |
H A D | service.c | 125 char *user_name, char *password, in papiServiceCreate() argument 142 if (password != NULL) in papiServiceCreate() 143 svc->password = strdup(password); in papiServiceCreate() 178 if (svc->password != NULL) in papiServiceDestroy() 179 free(svc->password); in papiServiceDestroy() 211 papiServiceSetPassword(papi_service_t handle, char *password) in papiServiceSetPassword() argument 218 if (svc->password != NULL) in papiServiceSetPassword() 219 free(svc->password); in papiServiceSetPassword() 220 svc->password = NULL; in papiServiceSetPassword() 221 if (password != NULL) in papiServiceSetPassword() [all …]
|
/titanic_44/usr/src/lib/pam_modules/passwd_auth/ |
H A D | passwd_auth.c | 69 char *password; in pam_sm_authenticate() local 115 res = pam_get_item(pamh, PAM_AUTHTOK, (void **)&password); in pam_sm_authenticate() 119 if (password != NULL) in pam_sm_authenticate() 195 &password); in pam_sm_authenticate() 199 if (password == NULL) { in pam_sm_authenticate() 262 if (strcmp(crypt(password, rep_passwd), rep_passwd) != 0) { in pam_sm_authenticate() 305 retval = pam_set_item(pamh, PAM_AUTHTOK, (void *)password); in pam_sm_authenticate() 308 if (password) { in pam_sm_authenticate() 309 (void) memset(password, 0, strlen(password)); in pam_sm_authenticate() 310 free(password); in pam_sm_authenticate()
|
/titanic_44/usr/src/lib/krb5/kadm5/srv/ |
H A D | server_misc.c | 138 char *password, int use_policy, kadm5_policy_ent_t pol, in passwd_check() argument 153 if(strlen(password) < pol->pw_min_length) in passwd_check() 155 s = password; in passwd_check() 177 if((find_word(password) == KADM5_OK)) in passwd_check() 182 if (strcasecmp(cp, password) == 0) in passwd_check() 186 if (strcasecmp(cp, password) == 0) in passwd_check() 191 if (str_check_gecos(ent->pw_gecos, password)) in passwd_check() 198 if (strlen(password) < 1) in passwd_check()
|
/titanic_44/usr/src/lib/smbsrv/libmlsvc/common/ |
H A D | netr_auth.c | 281 bzero(netr_info->password, sizeof (netr_info->password)); in netr_gen_skey128() 283 (char *)netr_info->password, sizeof (netr_info->password)); in netr_gen_skey128() 285 if ((rc != SMBD_SMF_OK) || *netr_info->password == '\0') { in netr_gen_skey128() 289 rc = smb_auth_ntlm_hash((char *)netr_info->password, ntlmhash); in netr_gen_skey128() 386 bzero(netr_info->password, sizeof (netr_info->password)); in netr_gen_skey64() 388 (char *)netr_info->password, sizeof (netr_info->password)); in netr_gen_skey64() 390 if ((rc != SMBD_SMF_OK) || *netr_info->password == '\0') { in netr_gen_skey64() 394 rc = smb_auth_ntlm_hash((char *)netr_info->password, md4hash); in netr_gen_skey64() 515 netr_info->password, new_password) == SMBAUTH_FAILURE) { in netr_server_password_set() 545 (void) memcpy(netr_info->password, new_password, in netr_server_password_set()
|
/titanic_44/usr/src/grub/grub-0.97/util/ |
H A D | grub-md5-crypt.in | 35 Encrypt a password in MD5 format. 69 read -r password 80 if test "x$password" = x; then 85 if test "x$password" != "x$password2"; then 94 $password
|
/titanic_44/usr/src/lib/sasl_plugins/plain/ |
H A D | plain.c | 107 const char *password; in plain_server_mech_step() local 150 password = clientin + lup; in plain_server_mech_step() 153 password_len = clientin + lup - password; in plain_server_mech_step() 175 strncpy(passcopy, password, password_len); in plain_server_mech_step() 217 params->transition(params->utils->conn, password, password_len); in plain_server_mech_step() 313 sasl_secret_t *password = NULL; in plain_client_mech_step() local 352 if (password == NULL) { in plain_client_mech_step() 353 pass_result = _plug_get_password(params->utils, &password, in plain_client_mech_step() 407 if (!password) { in plain_client_mech_step() 429 + password->len); in plain_client_mech_step() [all …]
|
/titanic_44/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/ |
H A D | gic_pwd.c | 51 krb5_data *password; in krb5_get_as_key_password() local 59 password = (krb5_data *) gak_data; in krb5_get_as_key_password() 76 if (password->data[0] == '\0') { in krb5_get_as_key_password() 91 prompt.reply = password; in krb5_get_as_key_password() 113 ret = krb5_c_string_to_key_with_params(context, etype, password, salt, in krb5_get_as_key_password() 126 char *password, in krb5_get_init_creds_password() argument 142 return (__krb5_get_init_creds_password(context, creds, client, password, in krb5_get_init_creds_password() 156 char *password, in __krb5_get_init_creds_password() argument 187 if (password && password[0]) { in __krb5_get_init_creds_password() 188 if ((pw0.length = strlen(password)) > sizeof(pw0array)) { in __krb5_get_init_creds_password() [all …]
|
/titanic_44/usr/src/lib/pam_modules/krb5/ |
H A D | krb5_acct_mgmt.c | 65 char *cpw_service, *password; in fetch_princ_entry() local 70 password = kmd->password; in fetch_princ_entry() 83 if (strlen(password) == 0) { in fetch_princ_entry() 108 code = kadm5_init_with_password(kprinc, password, cpw_service, in fetch_princ_entry() 175 char messages[PAM_MAX_NUM_MSG][PAM_MAX_MSG_SIZE], *password; in exp_warn() local 183 password = kmd->password; in exp_warn() 185 if (!pamh || !user || !password) { in exp_warn() 459 !nowarn && kmd->password) { in pam_sm_acct_mgmt()
|
/titanic_44/usr/src/lib/pam_modules/authtok_get/ |
H A D | authtok_get.c | 224 char *password; in pam_sm_authenticate() local 257 res = pam_get_item(pamh, PAM_AUTHTOK, (void **)&password); in pam_sm_authenticate() 261 if (password != NULL) in pam_sm_authenticate() 328 dgettext(TEXT_DOMAIN, "Password: "), &password); in pam_sm_authenticate() 332 if (password != NULL) { in pam_sm_authenticate() 333 (void) pam_set_item(pamh, PAM_AUTHTOK, (void *)password); in pam_sm_authenticate() 334 (void) memset(password, 0, strlen(password)); in pam_sm_authenticate() 335 free(password); in pam_sm_authenticate()
|
/titanic_44/usr/src/lib/pam_modules/sample/ |
H A D | sample_authenticate.c | 83 char *firstpass, *password; in pam_sm_authenticate() local 156 password = ret_resp->resp; in pam_sm_authenticate() 158 if (password == NULL) { in pam_sm_authenticate() 165 if (strncmp(password, the_password, strlen(the_password)) == 0) { in pam_sm_authenticate() 169 (void) pam_set_item(pamh, PAM_AUTHTOK, password); in pam_sm_authenticate()
|
/titanic_44/usr/src/lib/pam_modules/ldap/ |
H A D | ldap_authenticate.c | 59 char *password = NULL; in pam_sm_authenticate() local 96 (void) pam_get_item(pamh, PAM_AUTHTOK, (void **) &password); in pam_sm_authenticate() 97 if (password == NULL) { in pam_sm_authenticate() 110 result = authenticate(&credp, user, password, NULL); in pam_sm_authenticate()
|