/titanic_52/usr/src/lib/pam_modules/authtok_check/ |
H A D | fascist.c | 29 /* attempt reverse engineering of password strings */ 390 char *password; in FascistLook() local 397 password = rpassword; in FascistLook() 399 (void) strcpy(password, Lowercase(password)); in FascistLook() 400 (void) Trim(password); in FascistLook() 404 * since password cannot be longer than TRUNCSTRINGSIZE; in FascistLook() 411 if (!(a = Mangle(password, r_destructors[i]))) { in FascistLook() 420 (void) strlcpy(password, Reverse(password), PATH_MA in FascistLook() 437 DictCheck(char * password,char * path) DictCheck() argument [all...] |
/titanic_52/usr/src/lib/gss_mechs/mech_krb5/crypto/des/ |
H A D | afsstring2key.c | 102 unsigned char password[9]; /* trailing nul for crypt() */ in mit_afs_string_to_key() local 105 memset (password, 0, sizeof (password)); in mit_afs_string_to_key() 106 memcpy (password, realm, min (salt->length, 8)); in mit_afs_string_to_key() 108 if (isupper(password[i])) in mit_afs_string_to_key() 109 password[i] = tolower(password[i]); in mit_afs_string_to_key() 111 password[i] ^= data->data[i]; in mit_afs_string_to_key() 113 if (password[i] == '\0') in mit_afs_string_to_key() 114 password[ in mit_afs_string_to_key() 135 unsigned char *password = malloc(pw_len+1); mit_afs_string_to_key() local [all...] |
/titanic_52/usr/src/lib/gss_mechs/mech_krb5/mech/ |
H A D | acquire_cred_with_pw.c | 97 acquire_accept_cred_with_pw(context, minor_status, desired_name, password, cred) in acquire_accept_cred_with_pw() argument 101 const gss_buffer_t password; 112 acquire_init_cred_with_pw(context, minor_status, desired_name, password, cred) in acquire_init_cred_with_pw() argument 116 const gss_buffer_t password; 127 if (password == NULL || password->length == NULL || 128 password->value == NULL) 130 else if (*((char *)password->value + (password->length - 1)) == '\0') 131 pw = strdup(password 207 krb5_gss_acquire_cred_with_password(minor_status,desired_name,password,time_req,desired_mechs,cred_usage,output_cred_handle,actual_mechs,time_rec) krb5_gss_acquire_cred_with_password() argument 456 gssspi_acquire_cred_with_password(ctx,minor_status,desired_name,password,time_req,desired_mechs,cred_usage,output_cred_handle,actual_mechs,time_rec) gssspi_acquire_cred_with_password() argument [all...] |
/titanic_52/usr/src/lib/sasl_plugins/login/ |
H A D | login.c | 164 /* demand password */ in login_server_mech_step() 174 sasl_secret_t *password; in login_server_mech_step() local 189 /* get password */ in login_server_mech_step() 190 password = in login_server_mech_step() 192 if (!password) { in login_server_mech_step() 197 strncpy((char *)password->data, clientin, clientinlen); in login_server_mech_step() 198 password->data[clientinlen] = '\0'; in login_server_mech_step() 199 password->len = clientinlen; in login_server_mech_step() 201 /* canonicalize username first, so that password verification is in login_server_mech_step() 207 _plug_free_secret(params->utils, &password); in login_server_mech_step() 311 sasl_secret_t *password; global() member [all...] |
/titanic_52/usr/src/lib/print/libpapi-common/common/ |
H A D | uri.c | 41 * scheme://[[user[:password]@]host[:port]]/path[[#fragment]|[?query]] 93 char *password = NULL; in uri_from_string() local 95 for (password = user; (password < host - 1); password++) in uri_from_string() 96 if (*password == ':') { in uri_from_string() 97 u->password = strndup(password + 1, in uri_from_string() 98 host - password - 2); in uri_from_string() 101 u->user = strndup(user, password in uri_from_string() [all...] |
/titanic_52/usr/src/lib/pam_modules/dial_auth/ |
H A D | dial_auth.c | 64 char *password = NULL; in pam_sm_authenticate() local 154 dgettext(TEXT_DOMAIN, "Dialup Password: "), &password); in pam_sm_authenticate() 160 if (strcmp(crypt(password, p2), p2) != 0) { in pam_sm_authenticate() 161 (void) memset(password, 0, strlen(password)); in pam_sm_authenticate() 162 free(password); in pam_sm_authenticate() 165 (void) memset(password, 0, strlen(password)); in pam_sm_authenticate() 166 free(password); in pam_sm_authenticate()
|
/titanic_52/usr/src/cmd/krb5/kadmin/kpasswd/ |
H A D | kpasswd.c | 59 * Purpose: Initialize and call lower level routines to change a password 65 * read_old_password (f) function to read old password 66 * read_new_password (f) function to read new and change password 73 * 2 old password wrong 76 * 5 password not typed 85 * If argc is 2, the password for the principal specified in argv[1] 89 * read_old_password is then called to prompt for the old password. 92 * read_new_password is called to read the new password and change the 93 * principal's password (presumably ovsec_kadm_chpass_principal). 98 * Changes the principal's password 113 char password[255]; /* I don't really like 255 but that's what kinit uses */ global() local [all...] |
H A D | tty_kpasswd.c | 58 long read_old_password(context, password, pwsize) in read_old_password() argument 60 char *password; 65 0, password, pwsize); 69 long read_new_password(server_handle, password, pwsize, msg_ret, msg_len, princ) in read_new_password() argument 71 char *password;
|
/titanic_52/usr/src/lib/krb5/plugins/kdb/ldap/libkdb_ldap/ |
H A D | ldap_service_stash.c | 45 krb5_ldap_readpassword(context, ldap_context, password) in krb5_ldap_readpassword() argument 48 unsigned char **password; 56 *password = NULL; 127 /* password field missing */ 133 /* Extract the plain password / certificate file information */ 139 /* Set *password = {FILE}<path to cert>\0<cert password> */ 142 *password = (unsigned char *)malloc(strlen(start) + 2); 143 if (*password == NULL) { 147 (*password)[strle [all...] |
H A D | kdb_ldap_conn.c | 51 unsigned char *password=NULL; in krb5_validate_ldap_context() local 63 krb5_set_error_message(context, st, gettext("LDAP bind password value missing")); in krb5_validate_ldap_context() 69 if ((st=krb5_ldap_readpassword(context, ldap_context, &password)) != 0) { in krb5_validate_ldap_context() 70 prepend_err_str(context, gettext("Error reading password from stash: "), st, st); in krb5_validate_ldap_context() 74 /* Check if the returned 'password' is actually the path of a certificate */ in krb5_validate_ldap_context() 75 if (!strncmp("{FILE}", (char *)password, 6)) { in krb5_validate_ldap_context() 76 /* 'password' format: <path>\0<password> */ in krb5_validate_ldap_context() 77 ldap_context->service_cert_path = strdup((char *)password + strlen("{FILE}")); in krb5_validate_ldap_context() 83 if (password[strle in krb5_validate_ldap_context() [all...] |
/titanic_52/usr/src/lib/print/libpapi-dynamic/common/ |
H A D | service.c | 197 char *password = svc->password; in service_connect() local 202 /* if no API password, try the URI password */ in service_connect() 203 if ((password == NULL) && (svc->uri != NULL)) in service_connect() 204 password = (svc->uri)->password; in service_connect() 206 result = f(&svc->svc_handle, svc->name, user, password, in service_connect() 219 char *password, in papiServiceCreate() argument 238 if (password ! in papiServiceCreate() 334 papiServiceSetPassword(papi_service_t handle,char * password) papiServiceSetPassword() argument [all...] |
/titanic_52/usr/src/lib/passwdutil/ |
H A D | README.SunOS-aging | 36 The characters are password aging data. Password aging forces the 38 of time. Password aging can also force a user to keep a password for 42 ] Sample entry from /etc/passwd with password aging installed: 47 Note the comma in the encrypted password field. The characters after 48 the comma are used by the password aging mechanism. 58 1: Maximum number of weeks a password can be used without changing. 59 2: Minimum number of weeks a password must be used before changing. 60 3& 4: Last time password was changed, in number of weeks since 1970. 70 user will not be subjected to password aging requirements again. 77 the user is not allowed to change his/her password [all...] |
/titanic_52/usr/src/lib/print/libpapi-ipp/common/ |
H A D | service.c | 125 char *user_name, char *password, in papiServiceCreate() argument 142 if (password != NULL) in papiServiceCreate() 143 svc->password = strdup(password); in papiServiceCreate() 178 if (svc->password != NULL) in papiServiceDestroy() 179 free(svc->password); in papiServiceDestroy() 211 papiServiceSetPassword(papi_service_t handle, char *password) in papiServiceSetPassword() argument 218 if (svc->password != NULL) in papiServiceSetPassword() 219 free(svc->password); in papiServiceSetPassword() 220 svc->password in papiServiceSetPassword() [all...] |
/titanic_52/usr/src/lib/pam_modules/passwd_auth/ |
H A D | passwd_auth.c | 69 char *password; in pam_sm_authenticate() local 115 res = pam_get_item(pamh, PAM_AUTHTOK, (void **)&password); in pam_sm_authenticate() 119 if (password != NULL) in pam_sm_authenticate() 174 * The password prompt differs between users updating their in pam_sm_authenticate() 175 * own password, and users updating other an user's password in pam_sm_authenticate() 183 dgettext(TEXT_DOMAIN, "Enter %s's password: "), in pam_sm_authenticate() 191 dgettext(TEXT_DOMAIN, "Enter existing login password: ")); in pam_sm_authenticate() 195 &password); in pam_sm_authenticate() 199 if (password in pam_sm_authenticate() [all...] |
/titanic_52/usr/src/lib/krb5/kadm5/srv/ |
H A D | server_misc.c | 120 /* Check word to see if it's the password */ 138 char *password, int use_policy, kadm5_policy_ent_t pol, in passwd_check() argument 153 if(strlen(password) < pol->pw_min_length) in passwd_check() 155 s = password; in passwd_check() 177 if((find_word(password) == KADM5_OK)) in passwd_check() 182 if (strcasecmp(cp, password) == 0) in passwd_check() 186 if (strcasecmp(cp, password) == 0) in passwd_check() 191 if (str_check_gecos(ent->pw_gecos, password)) in passwd_check() 198 if (strlen(password) < 1) in passwd_check()
|
/titanic_52/usr/src/lib/smbsrv/libmlsvc/common/ |
H A D | netr_auth.c | 282 * the appropriate password but it isn't working yet. So we in netr_gen_skey128() 285 bzero(netr_info->password, sizeof (netr_info->password)); in netr_gen_skey128() 287 (char *)netr_info->password, sizeof (netr_info->password)); in netr_gen_skey128() 289 if ((rc != SMBD_SMF_OK) || *netr_info->password == '\0') { in netr_gen_skey128() 293 rc = smb_auth_ntlm_hash((char *)netr_info->password, ntlmhash); in netr_gen_skey128() 347 * the first 7 bytes of the password. The initial password is formed 348 * using the NT password has [all...] |
/titanic_52/usr/src/grub/grub-0.97/util/ |
H A D | grub-md5-crypt.in | 3 # Encrypt a password in MD5 format 35 Encrypt a password in MD5 format. 67 # Prompt to enter a password. 69 read -r password 73 echo -n "Retype password: " 80 if test "x$password" = x; then 81 echo "Empty password is not permitted." 85 if test "x$password" != "x$password2"; then 94 $password
|
/titanic_52/usr/src/lib/sasl_plugins/plain/ |
H A D | plain.c | 107 const char *password; in plain_server_mech_step() local 116 /* should have received author-id NUL authen-id NUL password */ in plain_server_mech_step() 125 "Can only find author (no password)"); in plain_server_mech_step() 127 SETERROR(params->utils, "Can only find author (no password)"); in plain_server_mech_step() 140 "Can only find author/en (no password)"); in plain_server_mech_step() 143 "Can only find author/en (no password)"); in plain_server_mech_step() 148 /* get password */ in plain_server_mech_step() 150 password = clientin + lup; in plain_server_mech_step() 153 password_len = clientin + lup - password; in plain_server_mech_step() 166 /* this kinda sucks. we need password t in plain_server_mech_step() 313 sasl_secret_t *password = NULL; plain_client_mech_step() local [all...] |
/titanic_52/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/ |
H A D | gic_pwd.c | 51 krb5_data *password; in krb5_get_as_key_password() local 59 password = (krb5_data *) gak_data; in krb5_get_as_key_password() 76 if (password->data[0] == '\0') { in krb5_get_as_key_password() 91 prompt.reply = password; in krb5_get_as_key_password() 113 ret = krb5_c_string_to_key_with_params(context, etype, password, salt, in krb5_get_as_key_password() 126 char *password, in krb5_get_init_creds_password() argument 138 * use this information to provide account/password expiration warnings. in krb5_get_init_creds_password() 142 return (__krb5_get_init_creds_password(context, creds, client, password, in krb5_get_init_creds_password() 156 char *password, in __krb5_get_init_creds_password() argument 187 if (password in __krb5_get_init_creds_password() 577 krb5_get_in_tkt_with_password(krb5_context context,krb5_flags options,krb5_address * const * addrs,krb5_enctype * ktypes,krb5_preauthtype * pre_auth_types,const char * password,krb5_ccache ccache,krb5_creds * creds,krb5_kdc_rep ** ret_as_reply) krb5_get_in_tkt_with_password() argument [all...] |
/titanic_52/usr/src/lib/pam_modules/krb5/ |
H A D | krb5_acct_mgmt.c | 65 char *cpw_service, *password; in fetch_princ_entry() local 70 password = kmd->password; in fetch_princ_entry() 83 if (strlen(password) == 0) { in fetch_princ_entry() 108 code = kadm5_init_with_password(kprinc, password, cpw_service, in fetch_princ_entry() 154 * We first check to see if the KDC had set any account or password 175 char messages[PAM_MAX_NUM_MSG][PAM_MAX_MSG_SIZE], *password; in exp_warn() local 183 password = kmd->password; in exp_warn() 185 if (!pamh || !user || !password) { in exp_warn() [all...] |
/titanic_52/usr/src/boot/sys/boot/forth/ |
H A D | check-password.4th | 27 marker task-check-password.4th 31 vocabulary password-processing 32 only forth also password-processing definitions 37 255 constant readmax \ Maximum number of characters for the password 106 \ We are not going to echo the password to the screen (for 108 \ password, otherwise augment the key to a string. 132 only forth definitions also password-processing 134 : check-password ( -- ) 137 \ password has been set (preventing even boot from proceeding) 144 3000 ms ." loader: incorrect password" 1 [all...] |
/titanic_52/usr/src/lib/pam_modules/authtok_get/ |
H A D | authtok_get.c | 96 * password. in read_authtok() 136 * Since we don't actually check the password, we should in read_authtok() 159 * the password correctly. in verify_authtok() 188 "pam_authtok_get: new password verified"); in verify_authtok() 224 char *password; in pam_sm_authenticate() local 257 res = pam_get_item(pamh, PAM_AUTHTOK, (void **)&password); in pam_sm_authenticate() 261 if (password != NULL) in pam_sm_authenticate() 265 * No password has been entered yet. Check to see if we need in pam_sm_authenticate() 266 * to obtain a password in pam_sm_authenticate() 309 * We will ask for a password t in pam_sm_authenticate() [all...] |
/titanic_52/usr/src/lib/pam_modules/sample/ |
H A D | sample_authenticate.c | 50 * first_pass_good (first password is always good when used with use/try) 51 * first_pass_bad (first password is always bad when used with use/try) 52 * pass=foobar (set good password to "foobar". default good password 83 char *firstpass, *password; in pam_sm_authenticate() local 138 * Get the password from the user in pam_sm_authenticate() 156 password = ret_resp->resp; in pam_sm_authenticate() 158 if (password == NULL) { in pam_sm_authenticate() 165 if (strncmp(password, the_password, strlen(the_password)) == 0) { in pam_sm_authenticate() 168 /* this is the first password, stas in pam_sm_authenticate() [all...] |
/titanic_52/usr/src/lib/pam_modules/ldap/ |
H A D | ldap_authenticate.c | 59 char *password = NULL; in pam_sm_authenticate() local 95 /* Get the password entered in the first scheme if any */ in pam_sm_authenticate() 96 (void) pam_get_item(pamh, PAM_AUTHTOK, (void **) &password); in pam_sm_authenticate() 97 if (password == NULL) { in pam_sm_authenticate() 106 * Authenticate user using the password from PAM_AUTHTOK. in pam_sm_authenticate() 107 * If no password available or if authentication fails in pam_sm_authenticate() 110 result = authenticate(&credp, user, password, NULL); in pam_sm_authenticate() 114 * user's password is good but needs in pam_sm_authenticate() 118 * password after the account management in pam_sm_authenticate() 120 * the password ha in pam_sm_authenticate() [all...] |
/titanic_52/usr/src/cmd/keyserv/ |
H A D | newkey.c | 58 #define MAXPASSWD 256 /* max significant characters in password */ 318 * (d) the login password of root on target_host is returned 325 * (d) the login password of the user <username> is returned 333 static char password[MAXPASSWD+1]; local 353 "%s: unable to locate password record for uid %d\n", 363 "%s: unable to locate shadow password record for %s\n", 369 (void) sprintf(prompt, "Enter local root login password:"); 371 (void) sprintf(prompt, "Enter %s's login password:", 376 (void) fprintf(stderr, "%s: Invalid password.\n", 380 strcpy(password, pas [all...] |