/titanic_41/usr/src/cmd/krb5/kadmin/kclient/ |
H A D | ksmb.c | 64 char *newpw; in main() local 103 newpw = strdup(buf); in main() 104 if (newpw == NULL) { in main() 109 newpw = getpassphrase(gettext("Enter new password: ")); in main() 110 if (newpw == NULL) { in main() 116 newpw = strdup(newpw); in main() 117 if (newpw == NULL) { in main() 126 ret = smb_setdomainprops(fqdn, server, newpw); in main() 128 free(newpw); in main()
|
H A D | ksetpw.c | 59 char c, *vprincstr, *ktname, *token, *lasts, *newpw; in main() local 199 newpw = strdup(buf); in main() 200 if (newpw == NULL) { in main() 206 newpw = getpassphrase(gettext("Enter new password: ")); in main() 207 if (newpw == NULL) { in main() 213 newpw = strdup(newpw); in main() 214 if (newpw == NULL) { in main() 222 code = krb5_set_password_using_ccache(ctx, cc, newpw, victim, in main() 248 kt_add_entry(ctx, kt, victim, salt, enctypes[i], kvno, newpw); in main()
|
H A D | kclient.sh | 1098 printf "%s" "$newpw" | $KSMB -d $domain -s $server 1389 newpw=$p 1396 printf "%s" "$newpw" | $KSETPW ${netbios_nodename}@${realm} > /dev/null 2>&1 1528 printf "%s" "$newpw" | $KSETPW $ks_args $skey > /dev/null 2>&1
|
/titanic_41/usr/src/cmd/ypcmd/yppasswd/ |
H A D | changepasswd.c | 94 struct passwd newpw, opwd; in changepasswd() local 148 (!validstr(yppwd.newpw.pw_passwd, cryptpwsize)) || in changepasswd() 149 (!validstr(yppwd.newpw.pw_name, UTUSERLEN)) || in changepasswd() 150 (!validstr(yppwd.newpw.pw_gecos, fingersize)) || in changepasswd() 151 (!validstr(yppwd.newpw.pw_shell, shellsize))) { in changepasswd() 170 newpw = yppwd.newpw; in changepasswd() 171 strcpy(name, newpw.pw_name); in changepasswd() 409 newpw.pw_name); in changepasswd() 415 newpw.pw_name); in changepasswd() 436 oldpass_crypt = cryptoldpasswd(yppwd.oldpass, newpw.pw_passwd, in changepasswd() [all …]
|
H A D | yppasswdxdr.c | 68 if (!xdr_passwd(xdrs, &yppw->newpw)) { in xdr_yppasswd()
|
/titanic_41/usr/src/lib/gss_mechs/mech_krb5/krb5/os/ |
H A D | changepw.c | 49 char *newpw; member 167 ctx->newpw, in kpasswd_sendto_msg_callback() 173 ctx->newpw, in kpasswd_sendto_msg_callback() 193 krb5_change_set_password(krb5_context context, krb5_creds *creds, char *newpw, in krb5_change_set_password() argument 213 callback_ctx.newpw = newpw; in krb5_change_set_password() 338 krb5_change_password(krb5_context context, krb5_creds *creds, char *newpw, int *result_code, krb5_d… in krb5_change_password() argument 341 context, creds, newpw, NULL, result_code, result_code_string, result_string ); in krb5_change_password() 353 char *newpw, in krb5_set_password() argument 359 context, creds, newpw, change_password_for, result_code, result_code_string, result_string ); in krb5_set_password() 366 char *newpw, in krb5_set_password_using_ccache() argument [all …]
|
/titanic_41/usr/src/lib/libnisdb/yptol/ |
H A D | shim_changepasswd.c | 181 if ((!validstr(yppwd.newpw.pw_passwd, CRYPTPWSIZE)) || in shim_changepasswd() 182 (!validstr(yppwd.newpw.pw_name, UTUSERLEN)) || in shim_changepasswd() 183 (!validstr(yppwd.newpw.pw_gecos, FINGERSIZE)) || in shim_changepasswd() 184 (!validstr(yppwd.newpw.pw_shell, SHELLSIZE))) { in shim_changepasswd() 265 for (p = yppwd->newpw.pw_name; (*p != '\0'); p++) in proc_domain() 268 for (p = yppwd->newpw.pw_passwd; (*p != '\0'); p++) in proc_domain() 273 old_pwd = get_old_info(yppwd->newpw.pw_name, domain); in proc_domain() 277 "domain %s", yppwd->newpw.pw_name, domain); in proc_domain() 311 yppwd->newpw.pw_name); in proc_request() 654 "No change for %s", yppwd->newpw.pw_name); in modify_ent() [all …]
|
/titanic_41/usr/src/lib/pam_modules/smb/ |
H A D | smb_passwd.c | 84 char *newpw; in pam_sm_chauthtok() local 119 (void) pam_get_item(pamh, PAM_AUTHTOK, (void **)&newpw); in pam_sm_chauthtok() 120 if (newpw == NULL) { in pam_sm_chauthtok() 150 res = smb_pwd_setpasswd(user, newpw); in pam_sm_chauthtok()
|
/titanic_41/usr/src/lib/krb5/kadm5/clnt/ |
H A D | changepw.c | 85 krb5_change_password_local(context, params, creds, newpw, srvr_rsp_code, in krb5_change_password_local() argument 90 char *newpw; 271 &ap_req, newpw, &chpw_req)) 373 char *newpw, in kadm5_chpass_principal_v2() argument 430 &ncreds, newpw, in kadm5_chpass_principal_v2()
|
/titanic_41/usr/src/lib/pam_modules/authtok_store/ |
H A D | authtok_store.c | 100 char *newpw; 159 res = pam_get_item(pamh, PAM_AUTHTOK, (void **)&newpw); 160 if (res != PAM_SUCCESS || newpw == NULL) { 167 l.data.val_s = newpw;
|
/titanic_41/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/ |
H A D | preauth.c | 381 krb5_data newpw; in sam_get_pass_from_user() local 382 newpw.data = 0; newpw.length = 0; in sam_get_pass_from_user() 385 (krb5_const_pointer)&newpw, new_enc_key); in sam_get_pass_from_user() 386 krb5_xfree(newpw.data); in sam_get_pass_from_user()
|
/titanic_41/usr/src/head/rpcsvc/ |
H A D | yppasswd.h | 47 struct passwd newpw; /* new pw structure */ member
|
/titanic_41/usr/src/lib/libnsl/yp/ |
H A D | yppasswd_xdr.c | 57 return (xdr_passwd(xdrsp, &pp->newpw)); in xdr_yppasswd()
|
/titanic_41/usr/src/cmd/krb5/kadmin/cli/ |
H A D | kadmin.c | 712 static char newpw[1024]; local 856 unsigned int i = sizeof (newpw) - 1; 865 newpw, &i); 880 newpw); 884 retval = kadm5_chpass_principal(handle, princ, newpw); 887 memset(newpw, 0, sizeof (newpw)); 1210 static char newpw[1024], dummybuf[256]; local 1283 unsigned int sz = sizeof (newpw) - 1; 1291 newpw, &sz); 1300 pass = newpw;
|
/titanic_41/usr/src/lib/smbsrv/libmlsvc/common/ |
H A D | samlib.h | 132 struct samr_encr_passwd *newpw,
|
H A D | samr_clnt.c | 970 struct samr_encr_passwd *newpw, in samr_change_password() argument 1011 arg.nt_newpw = newpw; in samr_change_password()
|
/titanic_41/usr/src/lib/passwdutil/ |
H A D | nis_attr.c | 471 yppasswd.newpw = *nisbuf->pwd; in nis_putpwnam()
|
/titanic_41/usr/src/uts/common/gssapi/mechs/krb5/include/ |
H A D | krb5.h | 2082 (krb5_context context, krb5_creds *creds, char *newpw, 2087 (krb5_context context, krb5_creds *creds, char *newpw, krb5_principal change_password_for, 2091 (krb5_context context, krb5_ccache ccache, char *newpw, krb5_principal change_password_for,
|