/macosx-10.10/sudo-73/src/auth/ |
H A D | kerb5.c | 178 kerb5_verify(pw, pass, auth) 180 char *pass; 192 error = krb5_verify_user(sudo_context, princ, ccache, pass, 1, NULL); 197 kerb5_verify(pw, pass, auth) 199 char *pass; 228 pass, krb5_prompter_posix,
|
/macosx-10.10/cups-408/cups/test/ |
H A D | ipptool.c | 780 pass, /* Did we pass the test? */ local 781 prev_pass = 1, /* Did we pass the previous test? */ 841 pass = 0; 854 pass = 0; 877 pass = 1; 903 pass = 0; 926 pass = 0; 945 pass = 0; 966 pass [all...] |
/macosx-10.10/screen-22/screen/ |
H A D | attacher.c | 810 char *pass, mypass[16 + 1], salt[3]; local 814 pass = ppp->pw_passwd; 815 if (pass == 0 || *pass == 0) 817 if ((pass = getpass("Key: "))) 819 strncpy(mypass, pass, sizeof(mypass) - 1); 823 if ((pass = getpass("Again: "))) 825 if (strcmp(mypass, pass)) 833 if (pass == 0) 843 pass [all...] |
H A D | acls.c | 152 UserAdd(name, pass, up) 153 char *name, *pass; 164 if (pass) 165 (*up)->u_password = SaveStr(pass); 183 if (pass) 184 (*up)->u_password = SaveStr(pass); 307 UserSetPass(name, pass, up) 308 char *name, *pass; 314 return UserAdd(name, pass, up); 317 strncpy((*up)->u_password, pass 506 char *pass = ""; local [all...] |
/macosx-10.10/ruby-106/ruby/ext/openssl/ |
H A D | ossl_pkey_dsa.c | 189 * DSA.new([size | string [, pass]) -> dsa 196 * * +pass+ is a string that contains an optional password. 212 VALUE arg, pass; local 215 if(rb_scan_args(argc, argv, "02", &arg, &pass) == 0) { 224 if (!NIL_P(pass)) passwd = StringValuePtr(pass); 314 VALUE cipher, pass, str; local 317 rb_scan_args(argc, argv, "02", &cipher, &pass); 320 if (!NIL_P(pass)) { 321 StringValue(pass); [all...] |
H A D | ossl_pkey_rsa.c | 194 * OpenSSL will prompt for the pass phrase. 200 * OpenSSL::PKey::RSA.new File.read('rsa.pem'), 'my pass phrase' 209 VALUE arg, pass; local 212 if(rb_scan_args(argc, argv, "02", &arg, &pass) == 0) { 216 rsa = rsa_generate(FIX2INT(arg), NIL_P(pass) ? RSA_F4 : NUM2ULONG(pass)); 220 if (!NIL_P(pass)) passwd = StringValuePtr(pass); 308 VALUE cipher, pass, str; local 312 rb_scan_args(argc, argv, "02", &cipher, &pass); [all...] |
H A D | ossl.c | 153 VALUE pass; local 155 pass = rb_yield(flag); 156 SafeStringValue(pass); 158 return pass; 165 VALUE rflag, pass; local 177 pass = rb_protect(ossl_pem_passwd_cb0, rflag, &status); 183 len = RSTRING_LENINT(pass); 192 memcpy(buf, RSTRING_PTR(pass), len); 495 * export a key you may export it with a pass phrase. 498 * pass_phrase = 'my secure pass phras [all...] |
/macosx-10.10/apache-793/httpd/modules/aaa/ |
H A D | mod_auth_basic.c | 143 const char *user, const char *pass) 160 if (!pass) { 161 pass = "password"; 173 ap_expr_parse_cmd(cmd, pass, AP_EXPR_FLAG_STRING_RESULT, 218 "check for digest auth, using a hash of 'user:realm:pass'"), 446 const char *auth_line, *user, *pass, *err; local 469 pass = ap_expr_str_exec(r, conf->fakepass, &err); 475 if (!pass || !*pass) { 487 ":", pass, NUL 142 add_basic_fake(cmd_parms * cmd, void *config, const char *user, const char *pass) argument [all...] |
/macosx-10.10/dcerpc-61/dcerpc/rpcd/ |
H A D | rpcddb.c | 109 unsigned32 pass; member in struct:__anon8352 527 * type, list entry pointer, and pass number are saved so the search 530 PRIVATE void db_save_context(h, entry_handle, list_type, lp, pass) 535 unsigned32 pass; 593 chp->pass = pass; 615 PRIVATE void db_get_context(h, entry_handle, list_type, lp, pass, status) 620 unsigned32 *pass; 634 *pass = chp->pass; [all...] |
/macosx-10.10/emacs-93/emacs/lisp/gnus/ |
H A D | pop3.el | 76 (defcustom pop3-authentication-scheme 'pass 78 Defaults to `pass', for the standard USER/PASS authentication. The other 80 :type '(choice (const :tag "Normal user/password" pass) 151 ((equal 'pass pop3-authentication-scheme) 153 (pop3-pass process)) 196 ((equal 'pass pop3-authentication-scheme) 198 (pop3-pass process)) 398 (defun pop3-pass (process) 407 (let ((pass pop3-password)) 408 (if (and pop3-password-required (not pass)) [all...] |
/macosx-10.10/procmail-14/procmail/src/ |
H A D | lockfile.c | 120 if(sleepsec>=0) /* is this still the first pass? */ 129 else /* no second pass, so leave sleepsec<0 */ 133 { auth_identity*pass;static char*ma; local 134 if(*cp&&cp[1]||ma&&sleepsec>=0) /* second pass? */ 138 (pass=auth_finduser(ma,0))&& 139 auth_whatuid(pass)==uid|| 140 (pass=auth_finduid(uid,0)))) 145 if(!*(p=auth_mailboxname(pass))|| 155 if(sleepsec>=0) /* first pass? */ 175 else if(sleepsec<0) /* second pass, releas [all...] |
/macosx-10.10/cups-408/cups/everywhere/ |
H A D | bonjour-tests.bat | 118 set pass=0 variable 127 set /a pass+=1 139 set /a pass+=1 151 set /a pass+=1 166 set /a pass+=1 178 set /a pass+=1 193 set /a pass+=1 213 set /a pass+=1 230 set /a pass+=1 247 set /a pass [all...] |
/macosx-10.10/JavaScriptCore-7600.1.17/dfg/ |
H A D | DFGGraph.h | 199 AddSpeculationMode addSpeculationMode(Node* add, bool leftShouldSpeculateInt32, bool rightShouldSpeculateInt32, PredictionPass pass) argument 203 RareCaseProfilingSource source = add->sourceFor(pass); 216 AddSpeculationMode valueAddSpeculationMode(Node* add, PredictionPass pass) argument 222 pass); 225 AddSpeculationMode arithAddSpeculationMode(Node* add, PredictionPass pass) argument 231 pass); 234 AddSpeculationMode addSpeculationMode(Node* add, PredictionPass pass) argument 237 return valueAddSpeculationMode(add, pass); 239 return arithAddSpeculationMode(add, pass); 242 bool addShouldSpeculateInt32(Node* add, PredictionPass pass) argument 264 mulShouldSpeculateInt32(Node* mul, PredictionPass pass) argument 275 mulShouldSpeculateMachineInt(Node* mul, PredictionPass pass) argument 290 negateShouldSpeculateInt32(Node* negate, PredictionPass pass) argument 297 negateShouldSpeculateMachineInt(Node* negate, PredictionPass pass) argument [all...] |
/macosx-10.10/OpenSSL098-52/src/apps/ |
H A D | pkcs12.c | 89 int dump_certs_keys_p12(BIO *out, PKCS12 *p12, char *pass, int passlen, int options, char *pempass); 90 int dump_certs_pkeys_bags(BIO *out, STACK_OF(PKCS12_SAFEBAG) *bags, char *pass, 92 int dump_certs_pkeys_bag(BIO *out, PKCS12_SAFEBAG *bags, char *pass, int passlen, int options, char *pempass); 111 char pass[50], macpass[50]; local 343 BIO_printf (bio_err, "-passin p input file pass phrase source\n"); 344 BIO_printf (bio_err, "-passout p output file pass phrase source\n"); 379 cpass = pass; 587 EVP_read_pw_string(pass, sizeof pass, "Enter Export Password:", 1)) 592 if (!twopass) BUF_strlcpy(macpass, pass, sizeo 703 dump_certs_keys_p12(BIO *out, PKCS12 *p12, char *pass, int passlen, int options, char *pempass) argument 745 dump_certs_pkeys_bags(BIO *out, STACK_OF(PKCS12_SAFEBAG) *bags, char *pass, int passlen, int options, char *pempass) argument 759 dump_certs_pkeys_bag(BIO *out, PKCS12_SAFEBAG *bag, char *pass, int passlen, int options, char *pempass) argument [all...] |
/macosx-10.10/CPANInternal-159.1/String-ShellQuote-1.04/ |
H A D | shell-quote | 121 B<shell-quote> lets you pass arbitrary strings through the shell so that 171 user can't pass through), you can do something like this: 177 x--pass-through)
|
/macosx-10.10/OpenSSH-189/openssh/ |
H A D | readpass.c | 55 char *pass; local 107 pass = xstrdup(buf); 109 return pass;
|
/macosx-10.10/Security-57031.1.35/Security/sec/securityd/Regressions/ |
H A D | secd-70-engine.c | 92 pass("pre-rcv %@", dest); 95 pass("pre-send %@", source); 100 pass("pre-add %@", source); 103 pass("post-add %@", source); 106 pass("post-rcv %@", dest); 116 pass("%@ before message", source); 122 pass("%@ before addition", source); 125 pass("%@ after addition", source); 154 pass("%s %@ handled message [%d] %@", name, SOSEngineGetMyID(dest->ds->engine), msg_index, message); 225 pass("pr [all...] |
/macosx-10.10/ruby-106/ruby/test/webrick/ |
H A D | test_httpauth.rb | 15 WEBrick::HTTPAuth.basic_auth(req, res, realm){|user, pass| 16 user == "webrick" && pass == "supersecretpassword" 43 htpasswd.each{|user, pass| users << user } 108 htdigest.each{|user, pass| users << user }
|
H A D | test_server.rb | 40 Thread.pass while server.status != :Running 44 Thread.pass until server.status == :Stop
|
/macosx-10.10/cxxfilt-11/cxxfilt/binutils/testsuite/binutils-all/ |
H A D | readelf.exp | 75 if [ string match "#pass" $line_b ] { 164 pass $testname 217 pass "readelf $options" 302 pass "readelf -wi"
|
/macosx-10.10/cxxfilt-11/cxxfilt/libiberty/ |
H A D | vmsbuild.com | 36 $! first pass: compile "required" modules 38 $ pass = 1 41 $! second pass: process dummy.c, using the first pass' results 76 $! third pass: compile "missing" modules collected in pass 2 77 $ pass = 3 109 $ if pass.eq.3 .and. f$search("''f'.c").eqs."" then gosub chk_deffunc
|
/macosx-10.10/emacs-93/emacs/lisp/erc/ |
H A D | erc-ezbounce.el | 58 (defvar erc-ezb-action-alist '(("^\\[awaiting login/pass command\\]$" . erc-ezb-identify) 124 (pass (cdr login))) 125 (erc-server-send (concat "LOGIN " username " " pass))))))
|
/macosx-10.10/lukemftp-14/tnftp/src/ |
H A D | util.c | 155 "Connecting via pass-through server %s\n", 388 char *user, *pass, *acct, *p; local 394 user = pass = acct = NULL; 398 pass = ftp_strdup(lpass); 400 DPRINTF("ftp_login: user `%s' pass `%s' host `%s'\n", 401 user ? user : "<null>", pass ? pass : "<null>", 410 FREEPTR(pass); 411 pass = ftp_strdup(getoptionvalue("anonpass")); 414 if (ruserpass(host, &user, &pass, [all...] |
/macosx-10.10/tcl-105/tcl_ext/tkimg/tkimg/compat/libpng/ |
H A D | pngread.c | 472 png_debug2(1, "in png_read_row (row %lu, pass %d)", 473 (unsigned long) png_ptr->row_number, png_ptr->pass); 477 if (png_ptr->row_number == 0 && png_ptr->pass == 0) 515 switch (png_ptr->pass) 522 png_pass_dsp_mask[png_ptr->pass]); 532 png_pass_dsp_mask[png_ptr->pass]); 542 png_pass_dsp_mask[png_ptr->pass]); 552 png_pass_dsp_mask[png_ptr->pass]); 562 png_pass_dsp_mask[png_ptr->pass]); 572 png_pass_dsp_mask[png_ptr->pass]); 774 int pass, j; local [all...] |
/macosx-10.10/dyld-353.2.1/unit-tests/test-cases/dlsym-RTLD_NEXT-missing/ |
H A D | Makefile | 40 ${TESTROOT}/bin/exit-zero-pass.pl "dlsym-RTLD_NEXT-missing with circular libraries" "dlsym-RTLD_NEXT-missing with circular libraries" ${PROG}
|