Searched refs:passwd (Results 101 - 125 of 491) sorted by relevance

1234567891011>>

/freebsd-11-stable/contrib/apr-util/include/
H A Dapr_md5.h164 * @param passwd The password to validate
167 APU_DECLARE(apr_status_t) apr_password_validate(const char *passwd,
/freebsd-11-stable/contrib/libreadline/
H A Dshell.c66 extern struct passwd *getpwuid PARAMS((uid_t));
164 struct passwd *entry;
/freebsd-11-stable/lib/libpam/modules/pam_self/
H A Dpam_self.c58 struct passwd *pwd;
/freebsd-11-stable/libexec/ulog-helper/
H A Dulog-helper.c52 const struct passwd *pw;
/freebsd-11-stable/crypto/openssh/
H A Dsshconnect.h40 struct passwd *, int);
H A Dauth-passwd.c1 /* $OpenBSD: auth-passwd.c,v 1.45 2016/07/21 01:39:35 dtucker Exp $ */
86 struct passwd * pw = authctxt->pw;
107 /* Fall back to ordinary passwd authentication. */
175 struct passwd *pw = authctxt->pw;
200 struct passwd *pw = authctxt->pw;
/freebsd-11-stable/usr.bin/chkey/
H A Dchkey.c66 struct passwd *ypgetpwuid(uid_t);
90 struct passwd *pw;
248 struct passwd *
254 static struct passwd pw;
258 if (yp_match(domain, "passwd.byuid", uidstr, strlen(uidstr),
/freebsd-11-stable/usr.bin/tip/tip/
H A Dlog.c55 struct passwd *pwd;
/freebsd-11-stable/crypto/openssh/openbsd-compat/
H A Dport-irix.c47 irix_setusercontext(struct passwd *pw)
/freebsd-11-stable/etc/pam.d/
H A DMakefile14 passwd pop3 \
/freebsd-11-stable/usr.sbin/jexec/
H A Djexec.c54 static void get_user_info(const char *username, const struct passwd **pwdp,
65 const struct passwd *pwd = NULL;
153 get_user_info(const char *username, const struct passwd **pwdp,
157 const struct passwd *pwd;
/freebsd-11-stable/crypto/heimdal/appl/su/
H A Dsu.c110 free_info(struct passwd *p)
119 static struct passwd*
120 dup_info(const struct passwd *pwd)
122 struct passwd *info;
146 krb5_verify(const struct passwd *login_info,
147 const struct passwd *su_info,
290 verify_unix(struct passwd *login, struct passwd *su)
332 struct passwd *su_info;
333 struct passwd *login_inf
[all...]
/freebsd-11-stable/contrib/top/
H A Dusername.c30 * This makes the table size independent of the passwd file size.
84 /* not here or not right -- get it out of passwd */
95 struct passwd *pwd;
144 * If the passwd database is hashed (#define RANDOM_PW), we
145 * just handle this uid. Otherwise we scan the passwd file
154 struct passwd *pwd;
168 * since that just iterates through the passwd file each time. So,
172 * the next record. In theory, we never have to read the passwd file
/freebsd-11-stable/contrib/sendmail/libsm/
H A Dmpeix.c247 ** - MPE does not initialize all fields in the passwd struct
253 ** pointer to struct passwd if found else NULL
259 extern struct passwd *getpwnam(const char *);
261 struct passwd *
269 struct passwd *result = NULL;
317 ** Initializes the uninitalized fields in the passwd struct.
320 ** uid -- uid to obtain passwd data for
323 ** pointer to struct passwd or NULL if not found
327 extern struct passwd *getpwuid __P((uid_t));
329 struct passwd *
[all...]
/freebsd-11-stable/release/picobsd/tinyware/passwd/
H A Dpw_copy.c43 * record, by chpass(1) and passwd(1).
56 extern int pw_scan(char *, struct passwd *);
64 pw_equal(char *buf, struct passwd *pw)
66 struct passwd buf_pw;
84 pw_copy(int ffd, int tfd, struct passwd *pw, struct passwd *old_pw)
204 struct passwd *pw;
220 if (!(pw->pw_passwd = strsep(&bp, ":"))) /* passwd */
/freebsd-11-stable/contrib/wpa/src/tls/
H A Dpkcs5.c384 pkcs5_crypto_init_pbes2(struct pkcs5_params *params, const char *passwd) argument
393 passwd, os_strlen(passwd));
398 if (pbkdf2_sha1(passwd, params->salt, params->salt_len,
511 pkcs12_crypto_init_sha1(struct pkcs5_params *params, const char *passwd) argument
522 pw_len = passwd ? os_strlen(passwd) : 0;
528 WPA_PUT_BE16(&pw[2 * i], passwd[i]);
552 const char *passwd)
560 return pkcs5_crypto_init_pbes2(params, passwd);
551 pkcs5_crypto_init(struct pkcs5_params *params, const char *passwd) argument
588 pkcs5_decrypt(const u8 *enc_alg, size_t enc_alg_len, const u8 *enc_data, size_t enc_data_len, const char *passwd, size_t *data_len) argument
[all...]
H A Dtlsv1_cred.c307 const char *passwd)
314 if (passwd == NULL)
327 pkey = crypto_private_key_import(der, der_len, passwd);
425 const char *passwd)
430 key = pkcs8_enc_key_import(buf, len, passwd);
623 const u8 *buf, size_t len, const char *passwd)
691 return pkcs12_pkcs8_keybag(cred, value, value_len, passwd);
702 const char *passwd)
736 if (pkcs12_safebag(cred, hdr.payload, hdr.length, passwd) < 0)
747 const char *passwd)
305 tlsv1_set_key_enc_pem(const u8 *key, size_t len, const char *passwd) argument
423 pkcs12_pkcs8_keybag(struct tlsv1_credentials *cred, const u8 *buf, size_t len, const char *passwd) argument
622 pkcs12_safebag(struct tlsv1_credentials *cred, const u8 *buf, size_t len, const char *passwd) argument
700 pkcs12_safecontents(struct tlsv1_credentials *cred, const u8 *buf, size_t len, const char *passwd) argument
745 pkcs12_parse_content_data(struct tlsv1_credentials *cred, const u8 *pos, const u8 *end, const char *passwd) argument
767 pkcs12_parse_content_enc_data(struct tlsv1_credentials *cred, const u8 *pos, const u8 *end, const char *passwd) argument
882 pkcs12_parse_content(struct tlsv1_credentials *cred, const u8 *buf, size_t len, const char *passwd) argument
925 pkcs12_parse(struct tlsv1_credentials *cred, const u8 *key, size_t len, const char *passwd) argument
1062 tlsv1_set_key(struct tlsv1_credentials *cred, const u8 *key, size_t len, const char *passwd) argument
[all...]
H A Dpkcs8.c122 pkcs8_enc_key_import(const u8 *buf, size_t len, const char *passwd) argument
130 if (passwd == NULL)
178 passwd, &data_len);
/freebsd-11-stable/crypto/heimdal/kuser/
H A Dkinit.c357 char passwd[256]; local
367 passwd[0] = '\0';
380 if (fgets(passwd, sizeof(passwd), f) == NULL)
386 passwd[strcspn(passwd, "\n")] = '\0';
390 if (passwd[0] == '\0') {
408 if (osret == noErr && length < sizeof(passwd) - 1) {
409 memcpy(passwd, buffer, length);
410 passwd[lengt
[all...]
/freebsd-11-stable/lib/libutil/
H A Dpw_util.c47 * and passwd(1).
186 err(1, "could not lock the passwd file: ");
381 pw_equal(const struct passwd *pw1, const struct passwd *pw2)
395 * Make a passwd line out of a struct passwd.
398 pw_make(const struct passwd *pw)
410 * Make a passwd line (in v7 format) out of a struct passwd
413 pw_make_v7(const struct passwd *p
[all...]
/freebsd-11-stable/contrib/llvm-project/compiler-rt/lib/sanitizer_common/
H A Dsanitizer_platform_limits_solaris.cpp71 unsigned struct_passwd_sz = sizeof(struct passwd);
336 CHECK_TYPE_SIZE(passwd); variable
337 CHECK_SIZE_AND_OFFSET(passwd, pw_name);
338 CHECK_SIZE_AND_OFFSET(passwd, pw_passwd);
339 CHECK_SIZE_AND_OFFSET(passwd, pw_uid);
340 CHECK_SIZE_AND_OFFSET(passwd, pw_gid);
341 CHECK_SIZE_AND_OFFSET(passwd, pw_dir);
342 CHECK_SIZE_AND_OFFSET(passwd, pw_shell);
344 CHECK_SIZE_AND_OFFSET(passwd, pw_gecos);
/freebsd-11-stable/contrib/mtree/
H A Dgetid.c91 static struct passwd * gi_getpwnam(const char *);
92 static struct passwd * gi_getpwuid(uid_t);
107 static struct passwd _pw_passwd; /* password structure */
130 snprintf(pwfile, sizeof(pwfile), "%s/master.passwd", dir);
300 static struct passwd *
313 static struct passwd *
409 _pw_passwd.pw_passwd = strsep(&bp, ":\n"); /* passwd */
/freebsd-11-stable/usr.bin/finger/
H A Dutil.c61 static void userinfo(PERSON *, struct passwd *);
65 match(struct passwd *pw, const char *user)
155 enter_person(struct passwd *pw)
192 struct passwd *pw;
324 userinfo(PERSON *pn, struct passwd *pw)
391 hide(struct passwd *pw)
/freebsd-11-stable/secure/usr.bin/openssl/
H A DMakefile.man24 MAN+= passwd.1
79 MLINKS+= passwd.1 openssl-passwd.1
/freebsd-11-stable/contrib/libc-pwcache/
H A Dpwcache.c129 static struct passwd * (*_pwcache_getpwnam)(const char *) = getpwnam;
130 static struct passwd * (*_pwcache_getpwuid)(uid_t) = getpwuid;
265 struct passwd *pw;
401 struct passwd *pw;
536 struct passwd * (*a_getpwnam)(const char *),
537 struct passwd * (*a_getpwuid)(uid_t))
587 struct passwd *
590 static struct passwd foo;

Completed in 148 milliseconds

1234567891011>>