Lines Matching refs:passwd

162 /* Set if we got the contents of passwd[] from the pap-secrets file. */
175 int (*pap_auth_hook) __P((char *user, char *passwd, char **msgp,
183 int (*pap_passwd_hook) __P((char *user, char *passwd)) = NULL;
189 int (*chap_passwd_hook) __P((char *user, char *passwd)) = NULL;
223 bool uselogin = 0; /* Use /etc/passwd for checking PAP */
368 { "password", o_string, passwd,
450 if (override_value("passwd", option_priority, fname))
451 strlcpy(passwd, p, sizeof(passwd));
763 if (passwd[0] == 0) {
765 if (!get_pap_passwd(passwd))
768 upap_authwithpeer(unit, user, passwd);
968 BZERO(passwd, MAXSECRETLEN);
1007 BZERO(passwd, MAXSECRETLEN);
1292 ao->neg_upap = !refuse_pap && (passwd[0] != 0 || get_pap_passwd(NULL));
1294 && (passwd[0] != 0 ||
1298 passwd[0] != 0 ||
1322 * check_passwd - Check the user name and passwd against the PAP secrets
1347 char passwd[256], user[256];
1356 slprintf(passwd, sizeof(passwd), "%.*v", passwdlen, apasswd);
1364 ret = (*pap_auth_hook)(user, passwd, msg, &addrs, &opts);
1374 BZERO(passwd, sizeof(passwd));
1403 if ((ret = plogin(user, passwd, msg)) == UPAP_AUTHACK)
1408 if ((cryptpap || strcmp(passwd, secret) != 0)
1409 && strcmp(crypt(passwd, secret), secret) != 0)
1421 * Frustrate passwd stealer programs.
1443 BZERO(passwd, sizeof(passwd));
1530 plogin(user, passwd, msg)
1532 char *passwd;
1554 PAM_password = passwd;
1588 struct passwd *pw = getpwnam(user);
1613 * If no passwd, don't let them login.
1616 || strcmp(crypt(passwd, pw->pw_passwd), pw->pw_passwd) != 0)
1631 if (pw != (struct passwd *)NULL) {
1735 * Assumes passwd points to MAXSECRETLEN bytes of space (if non-null).
1738 get_pap_passwd(passwd)
1739 char *passwd;
1750 ret = (*pap_passwd_hook)(user, passwd);
1766 if (passwd != NULL)
1767 strlcpy(passwd, secret, MAXSECRETLEN);
1924 if (!am_server && passwd[0] != 0) {
1925 strlcpy(secbuf, passwd, sizeof(secbuf));
1988 if (!am_server && passwd[0] != '\0') {
1989 strlcpy(secret, passwd, MAXWORDLEN);
2533 struct passwd *pw;