Home
last modified time | relevance | path

Searched refs:password (Results 1 – 25 of 146) sorted by relevance

123456

/titanic_52/usr/src/lib/pam_modules/authtok_check/
H A Dfascist.c29 /* attempt reverse engineering of password strings */
390 char *password; in FascistLook() local
397 password = rpassword; in FascistLook()
399 (void) strcpy(password, Lowercase(password)); in FascistLook()
400 (void) Trim(password); in FascistLook()
404 * since password cannot be longer than TRUNCSTRINGSIZE; in FascistLook()
411 if (!(a = Mangle(password, r_destructors[i]))) { in FascistLook()
420 (void) strlcpy(password, Reverse(password), PATH_MA in FascistLook()
437 DictCheck(char * password,char * path) DictCheck() argument
[all...]
/titanic_52/usr/src/lib/gss_mechs/mech_krb5/crypto/des/
H A Dafsstring2key.c102 unsigned char password[9]; /* trailing nul for crypt() */ in mit_afs_string_to_key() local
105 memset (password, 0, sizeof (password)); in mit_afs_string_to_key()
106 memcpy (password, realm, min (salt->length, 8)); in mit_afs_string_to_key()
108 if (isupper(password[i])) in mit_afs_string_to_key()
109 password[i] = tolower(password[i]); in mit_afs_string_to_key()
111 password[i] ^= data->data[i]; in mit_afs_string_to_key()
113 if (password[i] == '\0') in mit_afs_string_to_key()
114 password[ in mit_afs_string_to_key()
135 unsigned char *password = malloc(pw_len+1); mit_afs_string_to_key() local
[all...]
/titanic_52/usr/src/lib/gss_mechs/mech_krb5/mech/
H A Dacquire_cred_with_pw.c97 acquire_accept_cred_with_pw(context, minor_status, desired_name, password, cred) in acquire_accept_cred_with_pw() argument
101 const gss_buffer_t password;
112 acquire_init_cred_with_pw(context, minor_status, desired_name, password, cred) in acquire_init_cred_with_pw() argument
116 const gss_buffer_t password;
127 if (password == NULL || password->length == NULL ||
128 password->value == NULL)
130 else if (*((char *)password->value + (password->length - 1)) == '\0')
131 pw = strdup(password
207 krb5_gss_acquire_cred_with_password(minor_status,desired_name,password,time_req,desired_mechs,cred_usage,output_cred_handle,actual_mechs,time_rec) krb5_gss_acquire_cred_with_password() argument
456 gssspi_acquire_cred_with_password(ctx,minor_status,desired_name,password,time_req,desired_mechs,cred_usage,output_cred_handle,actual_mechs,time_rec) gssspi_acquire_cred_with_password() argument
[all...]
/titanic_52/usr/src/lib/sasl_plugins/login/
H A Dlogin.c164 /* demand password */ in login_server_mech_step()
174 sasl_secret_t *password; in login_server_mech_step() local
189 /* get password */ in login_server_mech_step()
190 password = in login_server_mech_step()
192 if (!password) { in login_server_mech_step()
197 strncpy((char *)password->data, clientin, clientinlen); in login_server_mech_step()
198 password->data[clientinlen] = '\0'; in login_server_mech_step()
199 password->len = clientinlen; in login_server_mech_step()
201 /* canonicalize username first, so that password verification is in login_server_mech_step()
207 _plug_free_secret(params->utils, &password); in login_server_mech_step()
311 sasl_secret_t *password; global() member
[all...]
/titanic_52/usr/src/lib/print/libpapi-common/common/
H A Duri.c41 * scheme://[[user[:password]@]host[:port]]/path[[#fragment]|[?query]]
93 char *password = NULL; in uri_from_string() local
95 for (password = user; (password < host - 1); password++) in uri_from_string()
96 if (*password == ':') { in uri_from_string()
97 u->password = strndup(password + 1, in uri_from_string()
98 host - password - 2); in uri_from_string()
101 u->user = strndup(user, password in uri_from_string()
[all...]
/titanic_52/usr/src/lib/pam_modules/dial_auth/
H A Ddial_auth.c64 char *password = NULL; in pam_sm_authenticate() local
154 dgettext(TEXT_DOMAIN, "Dialup Password: "), &password); in pam_sm_authenticate()
160 if (strcmp(crypt(password, p2), p2) != 0) { in pam_sm_authenticate()
161 (void) memset(password, 0, strlen(password)); in pam_sm_authenticate()
162 free(password); in pam_sm_authenticate()
165 (void) memset(password, 0, strlen(password)); in pam_sm_authenticate()
166 free(password); in pam_sm_authenticate()
/titanic_52/usr/src/cmd/krb5/kadmin/kpasswd/
H A Dkpasswd.c59 * Purpose: Initialize and call lower level routines to change a password
65 * read_old_password (f) function to read old password
66 * read_new_password (f) function to read new and change password
73 * 2 old password wrong
76 * 5 password not typed
85 * If argc is 2, the password for the principal specified in argv[1]
89 * read_old_password is then called to prompt for the old password.
92 * read_new_password is called to read the new password and change the
93 * principal's password (presumably ovsec_kadm_chpass_principal).
98 * Changes the principal's password
113 char password[255]; /* I don't really like 255 but that's what kinit uses */ global() local
[all...]
H A Dtty_kpasswd.c58 long read_old_password(context, password, pwsize) in read_old_password() argument
60 char *password;
65 0, password, pwsize);
69 long read_new_password(server_handle, password, pwsize, msg_ret, msg_len, princ) in read_new_password() argument
71 char *password;
/titanic_52/usr/src/lib/krb5/plugins/kdb/ldap/libkdb_ldap/
H A Dldap_service_stash.c45 krb5_ldap_readpassword(context, ldap_context, password) in krb5_ldap_readpassword() argument
48 unsigned char **password;
56 *password = NULL;
127 /* password field missing */
133 /* Extract the plain password / certificate file information */
139 /* Set *password = {FILE}<path to cert>\0<cert password> */
142 *password = (unsigned char *)malloc(strlen(start) + 2);
143 if (*password == NULL) {
147 (*password)[strle
[all...]
H A Dkdb_ldap_conn.c51 unsigned char *password=NULL; in krb5_validate_ldap_context() local
63 krb5_set_error_message(context, st, gettext("LDAP bind password value missing")); in krb5_validate_ldap_context()
69 if ((st=krb5_ldap_readpassword(context, ldap_context, &password)) != 0) { in krb5_validate_ldap_context()
70 prepend_err_str(context, gettext("Error reading password from stash: "), st, st); in krb5_validate_ldap_context()
74 /* Check if the returned 'password' is actually the path of a certificate */ in krb5_validate_ldap_context()
75 if (!strncmp("{FILE}", (char *)password, 6)) { in krb5_validate_ldap_context()
76 /* 'password' format: <path>\0<password> */ in krb5_validate_ldap_context()
77 ldap_context->service_cert_path = strdup((char *)password + strlen("{FILE}")); in krb5_validate_ldap_context()
83 if (password[strle in krb5_validate_ldap_context()
[all...]
/titanic_52/usr/src/lib/print/libpapi-dynamic/common/
H A Dservice.c197 char *password = svc->password; in service_connect() local
202 /* if no API password, try the URI password */ in service_connect()
203 if ((password == NULL) && (svc->uri != NULL)) in service_connect()
204 password = (svc->uri)->password; in service_connect()
206 result = f(&svc->svc_handle, svc->name, user, password, in service_connect()
219 char *password, in papiServiceCreate() argument
238 if (password ! in papiServiceCreate()
334 papiServiceSetPassword(papi_service_t handle,char * password) papiServiceSetPassword() argument
[all...]
/titanic_52/usr/src/lib/passwdutil/
H A DREADME.SunOS-aging36 The characters are password aging data. Password aging forces the
38 of time. Password aging can also force a user to keep a password for
42 ] Sample entry from /etc/passwd with password aging installed:
47 Note the comma in the encrypted password field. The characters after
48 the comma are used by the password aging mechanism.
58 1: Maximum number of weeks a password can be used without changing.
59 2: Minimum number of weeks a password must be used before changing.
60 3& 4: Last time password was changed, in number of weeks since 1970.
70 user will not be subjected to password aging requirements again.
77 the user is not allowed to change his/her password
[all...]
/titanic_52/usr/src/lib/print/libpapi-ipp/common/
H A Dservice.c125 char *user_name, char *password, in papiServiceCreate() argument
142 if (password != NULL) in papiServiceCreate()
143 svc->password = strdup(password); in papiServiceCreate()
178 if (svc->password != NULL) in papiServiceDestroy()
179 free(svc->password); in papiServiceDestroy()
211 papiServiceSetPassword(papi_service_t handle, char *password) in papiServiceSetPassword() argument
218 if (svc->password != NULL) in papiServiceSetPassword()
219 free(svc->password); in papiServiceSetPassword()
220 svc->password in papiServiceSetPassword()
[all...]
/titanic_52/usr/src/lib/pam_modules/passwd_auth/
H A Dpasswd_auth.c69 char *password; in pam_sm_authenticate() local
115 res = pam_get_item(pamh, PAM_AUTHTOK, (void **)&password); in pam_sm_authenticate()
119 if (password != NULL) in pam_sm_authenticate()
174 * The password prompt differs between users updating their in pam_sm_authenticate()
175 * own password, and users updating other an user's password in pam_sm_authenticate()
183 dgettext(TEXT_DOMAIN, "Enter %s's password: "), in pam_sm_authenticate()
191 dgettext(TEXT_DOMAIN, "Enter existing login password: ")); in pam_sm_authenticate()
195 &password); in pam_sm_authenticate()
199 if (password in pam_sm_authenticate()
[all...]
/titanic_52/usr/src/lib/krb5/kadm5/srv/
H A Dserver_misc.c120 /* Check word to see if it's the password */
138 char *password, int use_policy, kadm5_policy_ent_t pol, in passwd_check() argument
153 if(strlen(password) < pol->pw_min_length) in passwd_check()
155 s = password; in passwd_check()
177 if((find_word(password) == KADM5_OK)) in passwd_check()
182 if (strcasecmp(cp, password) == 0) in passwd_check()
186 if (strcasecmp(cp, password) == 0) in passwd_check()
191 if (str_check_gecos(ent->pw_gecos, password)) in passwd_check()
198 if (strlen(password) < 1) in passwd_check()
/titanic_52/usr/src/lib/smbsrv/libmlsvc/common/
H A Dnetr_auth.c282 * the appropriate password but it isn't working yet. So we in netr_gen_skey128()
285 bzero(netr_info->password, sizeof (netr_info->password)); in netr_gen_skey128()
287 (char *)netr_info->password, sizeof (netr_info->password)); in netr_gen_skey128()
289 if ((rc != SMBD_SMF_OK) || *netr_info->password == '\0') { in netr_gen_skey128()
293 rc = smb_auth_ntlm_hash((char *)netr_info->password, ntlmhash); in netr_gen_skey128()
347 * the first 7 bytes of the password. The initial password is formed
348 * using the NT password has
[all...]
/titanic_52/usr/src/grub/grub-0.97/util/
H A Dgrub-md5-crypt.in3 # Encrypt a password in MD5 format
35 Encrypt a password in MD5 format.
67 # Prompt to enter a password.
69 read -r password
73 echo -n "Retype password: "
80 if test "x$password" = x; then
81 echo "Empty password is not permitted."
85 if test "x$password" != "x$password2"; then
94 $password
/titanic_52/usr/src/lib/sasl_plugins/plain/
H A Dplain.c107 const char *password; in plain_server_mech_step() local
116 /* should have received author-id NUL authen-id NUL password */ in plain_server_mech_step()
125 "Can only find author (no password)"); in plain_server_mech_step()
127 SETERROR(params->utils, "Can only find author (no password)"); in plain_server_mech_step()
140 "Can only find author/en (no password)"); in plain_server_mech_step()
143 "Can only find author/en (no password)"); in plain_server_mech_step()
148 /* get password */ in plain_server_mech_step()
150 password = clientin + lup; in plain_server_mech_step()
153 password_len = clientin + lup - password; in plain_server_mech_step()
166 /* this kinda sucks. we need password t in plain_server_mech_step()
313 sasl_secret_t *password = NULL; plain_client_mech_step() local
[all...]
/titanic_52/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/
H A Dgic_pwd.c51 krb5_data *password; in krb5_get_as_key_password() local
59 password = (krb5_data *) gak_data; in krb5_get_as_key_password()
76 if (password->data[0] == '\0') { in krb5_get_as_key_password()
91 prompt.reply = password; in krb5_get_as_key_password()
113 ret = krb5_c_string_to_key_with_params(context, etype, password, salt, in krb5_get_as_key_password()
126 char *password, in krb5_get_init_creds_password() argument
138 * use this information to provide account/password expiration warnings. in krb5_get_init_creds_password()
142 return (__krb5_get_init_creds_password(context, creds, client, password, in krb5_get_init_creds_password()
156 char *password, in __krb5_get_init_creds_password() argument
187 if (password in __krb5_get_init_creds_password()
577 krb5_get_in_tkt_with_password(krb5_context context,krb5_flags options,krb5_address * const * addrs,krb5_enctype * ktypes,krb5_preauthtype * pre_auth_types,const char * password,krb5_ccache ccache,krb5_creds * creds,krb5_kdc_rep ** ret_as_reply) krb5_get_in_tkt_with_password() argument
[all...]
/titanic_52/usr/src/lib/pam_modules/krb5/
H A Dkrb5_acct_mgmt.c65 char *cpw_service, *password; in fetch_princ_entry() local
70 password = kmd->password; in fetch_princ_entry()
83 if (strlen(password) == 0) { in fetch_princ_entry()
108 code = kadm5_init_with_password(kprinc, password, cpw_service, in fetch_princ_entry()
154 * We first check to see if the KDC had set any account or password
175 char messages[PAM_MAX_NUM_MSG][PAM_MAX_MSG_SIZE], *password; in exp_warn() local
183 password = kmd->password; in exp_warn()
185 if (!pamh || !user || !password) { in exp_warn()
[all...]
/titanic_52/usr/src/boot/sys/boot/forth/
H A Dcheck-password.4th27 marker task-check-password.4th
31 vocabulary password-processing
32 only forth also password-processing definitions
37 255 constant readmax \ Maximum number of characters for the password
106 \ We are not going to echo the password to the screen (for
108 \ password, otherwise augment the key to a string.
132 only forth definitions also password-processing
134 : check-password ( -- )
137 \ password has been set (preventing even boot from proceeding)
144 3000 ms ." loader: incorrect password" 1
[all...]
/titanic_52/usr/src/lib/pam_modules/authtok_get/
H A Dauthtok_get.c96 * password. in read_authtok()
136 * Since we don't actually check the password, we should in read_authtok()
159 * the password correctly. in verify_authtok()
188 "pam_authtok_get: new password verified"); in verify_authtok()
224 char *password; in pam_sm_authenticate() local
257 res = pam_get_item(pamh, PAM_AUTHTOK, (void **)&password); in pam_sm_authenticate()
261 if (password != NULL) in pam_sm_authenticate()
265 * No password has been entered yet. Check to see if we need in pam_sm_authenticate()
266 * to obtain a password in pam_sm_authenticate()
309 * We will ask for a password t in pam_sm_authenticate()
[all...]
/titanic_52/usr/src/lib/pam_modules/sample/
H A Dsample_authenticate.c50 * first_pass_good (first password is always good when used with use/try)
51 * first_pass_bad (first password is always bad when used with use/try)
52 * pass=foobar (set good password to "foobar". default good password
83 char *firstpass, *password; in pam_sm_authenticate() local
138 * Get the password from the user in pam_sm_authenticate()
156 password = ret_resp->resp; in pam_sm_authenticate()
158 if (password == NULL) { in pam_sm_authenticate()
165 if (strncmp(password, the_password, strlen(the_password)) == 0) { in pam_sm_authenticate()
168 /* this is the first password, stas in pam_sm_authenticate()
[all...]
/titanic_52/usr/src/lib/pam_modules/ldap/
H A Dldap_authenticate.c59 char *password = NULL; in pam_sm_authenticate() local
95 /* Get the password entered in the first scheme if any */ in pam_sm_authenticate()
96 (void) pam_get_item(pamh, PAM_AUTHTOK, (void **) &password); in pam_sm_authenticate()
97 if (password == NULL) { in pam_sm_authenticate()
106 * Authenticate user using the password from PAM_AUTHTOK. in pam_sm_authenticate()
107 * If no password available or if authentication fails in pam_sm_authenticate()
110 result = authenticate(&credp, user, password, NULL); in pam_sm_authenticate()
114 * user's password is good but needs in pam_sm_authenticate()
118 * password after the account management in pam_sm_authenticate()
120 * the password ha in pam_sm_authenticate()
[all...]
/titanic_52/usr/src/cmd/keyserv/
H A Dnewkey.c58 #define MAXPASSWD 256 /* max significant characters in password */
318 * (d) the login password of root on target_host is returned
325 * (d) the login password of the user <username> is returned
333 static char password[MAXPASSWD+1]; local
353 "%s: unable to locate password record for uid %d\n",
363 "%s: unable to locate shadow password record for %s\n",
369 (void) sprintf(prompt, "Enter local root login password:");
371 (void) sprintf(prompt, "Enter %s's login password:",
376 (void) fprintf(stderr, "%s: Invalid password.\n",
380 strcpy(password, pas
[all...]

123456