• Home
  • Raw
  • Download

Lines Matching refs:passwd

175 int (*pap_auth_hook) __P((char *user, char *passwd, char **msgp,
183 int (*pap_passwd_hook) __P((char *user, char *passwd)) = NULL;
189 int (*chap_passwd_hook) __P((char *user, char *passwd)) = NULL;
368 { "password", o_string, passwd,
451 strlcpy(passwd, p, sizeof(passwd));
763 if (passwd[0] == 0) {
765 if (!get_pap_passwd(passwd))
768 upap_authwithpeer(unit, user, passwd);
968 BZERO(passwd, MAXSECRETLEN);
1007 BZERO(passwd, MAXSECRETLEN);
1292 ao->neg_upap = !refuse_pap && (passwd[0] != 0 || get_pap_passwd(NULL));
1294 && (passwd[0] != 0 ||
1298 passwd[0] != 0 ||
1347 char passwd[256], user[256];
1356 slprintf(passwd, sizeof(passwd), "%.*v", passwdlen, apasswd);
1364 ret = (*pap_auth_hook)(user, passwd, msg, &addrs, &opts);
1374 BZERO(passwd, sizeof(passwd));
1403 if ((ret = plogin(user, passwd, msg)) == UPAP_AUTHACK)
1408 if ((cryptpap || strcmp(passwd, secret) != 0)
1409 && strcmp(crypt(passwd, secret), secret) != 0)
1443 BZERO(passwd, sizeof(passwd));
1530 plogin(user, passwd, msg) in plogin() argument
1532 char *passwd;
1554 PAM_password = passwd;
1588 struct passwd *pw = getpwnam(user);
1616 || strcmp(crypt(passwd, pw->pw_passwd), pw->pw_passwd) != 0)
1631 if (pw != (struct passwd *)NULL) {
1738 get_pap_passwd(passwd) in get_pap_passwd() argument
1739 char *passwd; in get_pap_passwd()
1750 ret = (*pap_passwd_hook)(user, passwd);
1766 if (passwd != NULL)
1767 strlcpy(passwd, secret, MAXSECRETLEN);
1924 if (!am_server && passwd[0] != 0) {
1925 strlcpy(secbuf, passwd, sizeof(secbuf));
1988 if (!am_server && passwd[0] != '\0') {
1989 strlcpy(secret, passwd, MAXWORDLEN);
2533 struct passwd *pw;