/macosx-10.10/ppp-786.1.1/Helpers/pppd/ |
H A D | auth.c | 190 /* Set if we got the contents of passwd[] from the pap-secrets file. */ 203 int (*pap_auth_hook) __P((char *user, char *passwd, char **msgp, 211 int (*pap_passwd_hook) __P((char *user, char *passwd)) = NULL; 217 int (*chap_passwd_hook) __P((char *user, char *passwd)) = NULL; 267 bool uselogin = 0; /* Use /etc/passwd for checking PAP */ 477 { "password", o_string, passwd, 570 if (override_value("passwd", option_priority, fname)) 571 strlcpy(passwd, p, sizeof(passwd)); 777 if (passwd[ 1554 char passwd[256], user[256]; local [all...] |
/macosx-10.10/BerkeleyDB-21/db/build_vxworks/db_dump/ |
H A D | db_dump.c | 56 char *dopt, *home, *passwd, *subname; local 72 dopt = home = passwd = subname = NULL; 99 passwd = strdup(optarg); 101 if (passwd == NULL) { 185 if (passwd != NULL && (ret = dbenv->set_encrypt(dbenv, 186 passwd, DB_ENCRYPT_AES)) != 0) { 272 if (passwd != NULL) 273 free(passwd);
|
/macosx-10.10/BerkeleyDB-21/db/build_vxworks/db_stat/ |
H A D | db_stat.c | 55 char *db, *home, *p, *passwd, *subdb; local 70 db = home = passwd = subdb = NULL; 164 passwd = strdup(optarg); 166 if (passwd == NULL) { 272 if (passwd != NULL && 273 (ret = dbenv->set_encrypt(dbenv, passwd, DB_ENCRYPT_AES)) != 0) { 375 if (passwd != NULL) 376 free(passwd);
|
/macosx-10.10/BerkeleyDB-21/db/db_dump/ |
H A D | db_dump.c | 42 char *dopt, *home, *passwd, *subname; local 58 dopt = home = passwd = subname = NULL; 84 passwd = strdup(optarg); 86 if (passwd == NULL) { 170 if (passwd != NULL && (ret = dbenv->set_encrypt(dbenv, 171 passwd, DB_ENCRYPT_AES)) != 0) { 257 if (passwd != NULL) 258 free(passwd);
|
/macosx-10.10/BerkeleyDB-21/db/db_stat/ |
H A D | db_stat.c | 41 char *db, *home, *p, *passwd, *subdb; local 56 db = home = passwd = subdb = NULL; 149 passwd = strdup(optarg); 151 if (passwd == NULL) { 257 if (passwd != NULL && 258 (ret = dbenv->set_encrypt(dbenv, passwd, DB_ENCRYPT_AES)) != 0) { 360 if (passwd != NULL) 361 free(passwd);
|
/macosx-10.10/BerkeleyDB-21/db/test/ |
H A D | rpc004.tcl | 13 global passwd 45 -server $rpc_server -encryptaes $passwd -txn}]
|
/macosx-10.10/OpenSSH-189/openssh/ |
H A D | misc.h | 40 struct passwd *pwcopy(struct passwd *);
|
/macosx-10.10/ksh-23/ksh/src/lib/libast/string/ |
H A D | strgid.c | 53 extern struct passwd* getpwnam(const char*); 74 register struct passwd* pw;
|
/macosx-10.10/pam_modules-140/modules/pam_nologin/ |
H A D | pam_nologin.c | 73 struct passwd *user_pwd; 74 struct passwd pwdbuf;
|
/macosx-10.10/pam_modules-140/modules/pam_sacl/ |
H A D | pam_sacl.c | 59 struct passwd *pwd = NULL; 60 struct passwd pwdbuf; 88 * corresponding user account (ie. no passwd entry).
|
/macosx-10.10/sudo-73/src/auth/ |
H A D | dce.c | 71 struct passwd *pw; 75 struct passwd temp_pw;
|
/macosx-10.10/Heimdal-398.1.2/appl/otp/ |
H A D | otp.c | 120 char passwd[OTP_MAX_PASSPHRASE + 1]; local 129 if(UI_UTIL_read_pw_string(passwd, sizeof(passwd)-1, prompt, 0)) 131 return otp_verify_user (&ctx, passwd); 271 struct passwd *pw; 335 struct passwd *pwd;
|
/macosx-10.10/OpenLDAP-499.27/OpenLDAP/include/ |
H A D | lutil.h | 70 /* passwd.c */ 78 const struct berval *passwd, 84 const struct berval *passwd, 102 const struct berval *passwd, /* stored password */ 109 struct berval **passwd, /* password to store */ 123 const struct berval *passwd, /* stored password */ 133 const struct berval *passwd,
|
/macosx-10.10/bind9-45.101/bind9/contrib/sdb/pgsql/ |
H A D | pgsqldb.c | 59 char *passwd; member in struct:dbinfo 88 dbi->user, dbi->passwd); 258 dbi->passwd = NULL; 276 STRDUP_OR_FAIL(dbi->passwd, argv[4]); 310 if (dbi->passwd != NULL) 311 isc_mem_free(ns_g_mctx, dbi->passwd);
|
/macosx-10.10/sudo-73/src/ |
H A D | tsgetgrpw.c | 59 static const char *pwfile = "/etc/passwd"; 98 struct passwd * 101 static struct passwd pw; 141 struct passwd * 145 struct passwd *pw; 165 struct passwd * 169 struct passwd *pw;
|
H A D | pwutil.c | 59 * The passwd and group caches. 89 struct passwd *pw; 96 * proper aligment of struct passwd, group and group_list. 100 struct passwd pw; 158 const struct passwd *pw; 165 struct passwd *newpw; 187 /* Allocate space for struct item, struct passwd and the strings. */ 191 * Copy in passwd contents and make strings relative to space 224 struct passwd *pw; 241 struct passwd *p [all...] |
/macosx-10.10/Heimdal-398.1.2/kuser/ |
H A D | kinit.c | 373 char passwd[256]; local 385 passwd[0] = '\0'; 398 if (fgets(passwd, sizeof(passwd), f) == NULL) 404 passwd[strcspn(passwd, "\n")] = '\0'; 408 if (passwd[0] == '\0' && !will_use_keytab && home_directory_flag) { 429 if (length < sizeof(passwd) - 1) { 430 memcpy(passwd, buffer, length); 431 passwd[lengt 608 (UInt32)strlen(passwd), passwd, local [all...] |
/macosx-10.10/OpenLDAP-499.27/OpenLDAP/libraries/libldap/ |
H A D | test.c | 249 static char dn[256], passwd[256]; local 261 get_line( passwd, sizeof(passwd), stdin, 264 passwd[0] = '\0'; 267 return ldap_bind_s( ld, dn, passwd, authmethod); 277 char passwd[64], dn[256], rdn[64], attr[64], value[256]; local 411 get_line( passwd, sizeof(passwd), stdin, 414 passwd[0] = '\0'; 416 if ( ldap_bind( ld, dn, passwd, metho [all...] |
/macosx-10.10/emacs-93/emacs/lisp/gnus/ |
H A D | sieve-manage.el | 191 (let (user passwd ret reason) 193 (while (or (not user) (not passwd)) 199 (setq passwd (or sieve-manage-password 200 (read-passwd 203 (when (and user passwd) 204 (if (funcall loginfunc user passwd) 210 (setq sieve-manage-password passwd))) 215 (setq passwd nil) 219 ;; passwd nil))) 222 ;; passwd ni [all...] |
/macosx-10.10/OpenLDAP-499.27/OpenLDAP/contrib/ldapc++/src/ |
H A D | LDAPAsynConnection.cpp | 87 const string& passwd, const LDAPConstraints *cons){ 90 << " passwd:" << passwd << endl); 91 LDAPBindRequest *req = new LDAPBindRequest(dn,passwd,this,cons); 330 string passwd = auth->getPassword(); local 336 if(passwd != ""){ 337 c_passwd.bv_val = const_cast<char*>(passwd.c_str()); 338 c_passwd.bv_len = passwd.size(); 86 bind(const string& dn, const string& passwd, const LDAPConstraints *cons) argument
|
/macosx-10.10/gnutar-453/gnutar/src/ |
H A D | names.c | 32 struct passwd *getpwnam (); 34 struct passwd *getpwuid (); 66 struct passwd *passwd; 76 passwd = getpwuid (uid); 77 if (passwd) 80 assign_string (&cached_uname, passwd->pw_name); 126 struct passwd *passwd; 136 passwd 65 struct passwd *passwd; local 125 struct passwd *passwd; local [all...] |
/macosx-10.10/tcl-105/tcl/tcl/unix/ |
H A D | tclUnixCompat.c | 88 struct passwd pwd; 130 static int CopyPwd(struct passwd *tgtPtr, char *buf, int buflen); 146 * Pointer to struct passwd on success or NULL on error. 154 struct passwd * 164 struct passwd *pwPtr = NULL; 174 struct passwd *pwPtr; 203 * Pointer to struct passwd on success or NULL on error. 211 struct passwd * 221 struct passwd *pwPtr = NULL; 231 struct passwd *pwPt [all...] |
/macosx-10.10/OpenLDAP-499.27/OpenLDAP/contrib/slapd-modules/nssov/ |
H A D | shadow.c | 162 struct berval passwd = {0}; local 193 get_userpassword(&a->a_vals[0], &passwd); 194 if (BER_BVISNULL(&passwd)) 195 passwd=default_shadow_userPassword; 222 WRITE_BERVAL(cbp->fp,&passwd);
|
/macosx-10.10/Security-57031.1.35/Security/libsecurity_cryptkit/ckutils/badsig/ |
H A D | badsig.c | 214 unsigned char *passwd, 233 passwd, 342 unsigned char *passwd; local 433 passwd = genPasswd(passwdLen); 461 if(doTest(ptext, ptextLen, passwd, passwdLen, 212 doTest(unsigned char *ptext, unsigned ptextLen, unsigned char *passwd, unsigned passwdLen, int verbose, int quiet, unsigned depth, unsigned incr, int doECDSA, int doECDSAVfy) argument
|
/macosx-10.10/passwordserver_sasl-193/cyrus_sasl/saslauthd/ |
H A D | testsaslauthd.c | 97 const char *passwd, 117 if(!userid || !passwd) return -1; 139 p_len = htons(strlen(passwd)); 149 while (*passwd) *query_end++ = *passwd++; 95 saslauthd_verify_password(const char *saslauthd_path, const char *userid, const char *passwd, const char *service, const char *user_realm) argument
|