/macosx-10.10/sudo-73/src/auth/ |
H A D | dce.c | 70 dce_verify(pw, plain_pw, auth) 71 struct passwd *pw; 88 if (sec_login_setup_identity((unsigned_char_p_t) pw->pw_name,
|
/macosx-10.10/Heimdal-398.1.2/tests/apple/ |
H A D | check-apple-leo.in | 45 pw=foo 86 ${test_gssntlm} --user=$u --domain=${ntdomain} --password=${pw}
|
H A D | check-apple-lkdc.in | 58 pw=foo 156 dscl . -passwd /Users/$u $pw 173 echo " SRP verififer (no pw)" 174 dscl . -passwd /Users/$u $pw 175 $hodadmin . srp-verifier $v srp$pw 184 /Users/$u $pw 202 echo $pw > ${testdir}/foopassword 203 echo srp$pw > ${testdir}/srpfoopassword 229 dscl . -passwd /Users/$u2 $pw 339 # --password="$pw" \ [all...] |
/macosx-10.10/Security-57031.1.35/Security/sec/Security/Regressions/vmdh/ |
H A D | vmdh-40.c | 47 uint8_t pw[] = { 0x31, 0x32, 0x33, 0x34 }; local 48 size_t pw_len = sizeof(pw); 50 uint8_t encpw[vmdh_encpw_len(sizeof(pw))]; 53 ok(vmdh_encrypt_password(vmdh, pub_key, pub_key_len, pw, pw_len, 56 is(encpw_len, (size_t)16, "encrypted pw is 16 bytes");
|
/macosx-10.10/Security-57031.1.35/Security/sec/Security/ |
H A D | vmdh.h | 62 pub_key_len bytes long), encrypt the password given by pw of pw_len bytes 68 const uint8_t *pw, size_t pw_len, uint8_t *encpw, size_t *encpw_len);
|
H A D | vmdh.c | 53 const uint8_t *pw, size_t pw_len, uint8_t *encpw, size_t *encpw_len) { 65 pw, pw_len, encpw, *encpw_len, encpw_len)) { 51 vmdh_encrypt_password(vmdh_t vmdh, const uint8_t *pub_key, size_t pub_key_len, const uint8_t *pw, size_t pw_len, uint8_t *encpw, size_t *encpw_len) argument
|
/macosx-10.10/system_cmds-643.1.1/chkpasswd.tproj/ |
H A D | passwd.c | 150 struct passwd* pw = getpwuid(getuid()); local 151 if (pw != NULL && pw->pw_name != NULL) { 152 user = strdup(pw->pw_name);
|
/macosx-10.10/OpenSSH-189/openssh/openbsd-compat/ |
H A D | port-aix.c | 74 aix_usrinfo(struct passwd *pw) argument 80 len = sizeof("LOGNAME= NAME= ") + (2 * strlen(pw->pw_name)); 83 i = snprintf(cp, len, "LOGNAME=%s%cNAME=%s%c", pw->pw_name, '\0', 84 pw->pw_name, '\0'); 176 char *authmsg = NULL, *msg = NULL, *name = ctxt->pw->pw_name; 237 sys_auth_allowed_user(struct passwd *pw, Buffer *loginmsg) argument 248 if (pw->pw_uid == 0 || geteuid() != 0) { 253 result = loginrestrictions(pw->pw_name, S_RLOGIN, NULL, &msg); 271 logit("Login restricted for %s: %.100s", pw->pw_name, msg);
|
/macosx-10.10/file_cmds-242/pax/ |
H A D | cache.c | 181 struct passwd *pw; local 210 if ((pw = getpwuid(uid)) == NULL) { 228 return(pw->pw_name); 230 (void)strlcpy(ptr->name, pw->pw_name, sizeof(ptr->name)); 312 struct passwd *pw; local 350 if ((pw = getpwnam(name)) == NULL) 352 *uid = pw->pw_uid; 356 if ((pw = getpwnam(name)) == NULL) { 361 *uid = ptr->uid = pw->pw_uid;
|
/macosx-10.10/OpenSSH-189/openssh/ |
H A D | session.c | 168 auth_sock_cleanup_proc(struct passwd *pw) argument 171 temporarily_use_uid(pw); 180 auth_input_request_forwarding(struct passwd * pw) argument 192 temporarily_use_uid(pw); 273 setproctitle("%s", authctxt->pw->pw_name); 313 s->pw = authctxt->pw; 381 success = auth_input_request_forwarding(s->pw); 394 if (channel_input_port_forward_request(s->pw->pw_uid == 0, 576 cray_init_job(s->pw); /* se 852 struct passwd * pw = s->pw; local 929 struct passwd *pw = s->pw; local 1131 struct passwd *pw = s->pw; local 1407 do_nologin(struct passwd *pw) argument 1495 do_setusercontext(struct passwd *pw) argument 1582 launch_login(struct passwd *pw, const char *hostname) argument 1646 struct passwd *pw = s->pw; local [all...] |
H A D | auth-skey.c | 81 skey_haskey(authctxt->pw->pw_name) == 0 && 82 skey_passcheck(authctxt->pw->pw_name, responses[0]) != -1)
|
H A D | ssh-keysign.c | 68 valid_request(struct passwd *pw, char *host, Key **ret, u_char *data, argument 135 if (strcmp(pw->pw_name, p) != 0) 161 struct passwd *pw; local 181 if ((pw = getpwuid(original_real_uid)) == NULL) 183 pw = pwcopy(pw); 185 permanently_set_uid(pw); 240 if (valid_request(pw, host, &key, data, dlen) < 0)
|
H A D | sshpty.c | 203 pty_setowner(struct passwd *pw, const char *tty) argument 216 gid = pw->pw_gid; 230 ssh_selinux_setup_pty(pw->pw_name, tty); 233 if (st.st_uid != pw->pw_uid || st.st_gid != gid) { 234 if (chown(tty, pw->pw_uid, gid) < 0) { 236 (st.st_uid == pw->pw_uid || st.st_uid == 0)) 238 tty, (u_int)pw->pw_uid, (u_int)gid, 242 tty, (u_int)pw->pw_uid, (u_int)gid,
|
/macosx-10.10/sudo-73/src/ |
H A D | match.c | 110 * Check for user described by pw in a list of members. 114 _userlist_matches(pw, list) 115 struct passwd *pw; 128 if (netgr_matches(m->name, NULL, NULL, pw->pw_name)) 132 if (usergr_matches(m->name, pw->pw_name, pw)) 137 rval = _userlist_matches(pw, &a->members); 144 if (userpw_matches(m->name, pw->pw_name, pw)) 155 userlist_matches(pw, lis [all...] |
H A D | parse.c | 181 if (userlist_matches(sudo_user.pw, &us->users) != ALLOW) 215 if (userlist_matches(sudo_user.pw, &us->users) != ALLOW) 314 sudo_file_display_priv_short(pw, us, lbuf) 315 struct passwd *pw; 348 lbuf_append(lbuf, "%s", pw->pw_name); 369 sudo_file_display_priv_long(pw, us, lbuf) 370 struct passwd *pw; 401 lbuf_append(lbuf, "%s", pw->pw_name); 424 sudo_file_display_privs(nss, pw, lbuf) 426 struct passwd *pw; [all...] |
/macosx-10.10/Heimdal-398.1.2/lib/hx509/ |
H A D | test_pkcs11.in | 54 certificate cert User certificate FILE:$srcdir/data/test.crt,$srcdir/data/test-pw.key
|
/macosx-10.10/Heimdal-398.1.2/tests/bin/ |
H A D | heimdal-win-mount.py | 15 pw = win['password'] variable 36 conn.sendline(pw + "\r\n")
|
/macosx-10.10/Security-57031.1.35/Security/utilities/src/ |
H A D | iOSforOSX.c | 73 struct passwd *pw = getpwuid(getuid()); local 74 path = pw->pw_dir;
|
/macosx-10.10/Security-57031.1.35/Security/utilities/utilities/ |
H A D | iOSforOSX.c | 73 struct passwd *pw = getpwuid(getuid()); local 74 path = pw->pw_dir;
|
/macosx-10.10/zsh-61/zsh/Src/ |
H A D | hashnameddir.c | 182 struct passwd *pw; local 188 while ((pw = getpwent()) && !errflag) 189 adduserdir(pw->pw_name, pw->pw_dir, ND_USERNAME, 1); 222 struct passwd *pw; 228 while ((pw = getpwent()) && !errflag) 229 adduserdir(pw->pw_name, pw->pw_dir, ND_USERNAME, 1);
|
/macosx-10.10/passwordserver_sasl-193/cyrus_sasl/saslauthd/ |
H A D | auth_shadow.c | 113 struct passwd *pw; /* return from getpwnam_r() */ 143 (void) getpwnam_r(login, &pwbuf, pwdata, sizeof(pwdata), &pw); 145 pw = getpwnam_r(login, &pwbuf, pwdata, sizeof(pwdata)); 148 pw = getpwnam(login); 153 if (pw == NULL) { 222 syslog(LOG_DEBUG, "DEBUG: auth_shadow: pw mismatch: '%s' != '%s'", 292 syslog(LOG_DEBUG, "auth_shadow: pw mismatch: %s != %s", 112 struct passwd *pw; /* return from getpwnam_r() */ local
|
/macosx-10.10/ksh-23/ksh/src/lib/libcmd/ |
H A D | id.c | 196 register struct passwd* pw; local 250 if (!(pw = getpwnam(name))) 253 if (*s || !(pw = getpwuid(user))) 255 name = pw->pw_name; 257 user = pw->pw_uid; 258 group = pw->pw_gid; 284 name = (pw = getpwuid(user)) ? pw->pw_name : (char*)0; 332 putid(sp, flags, " euid", (pw = getpwuid(euid)) ? pw [all...] |
/macosx-10.10/apache-793/httpd/support/ |
H A D | dbmmanage.in | 33 Usage: dbmmanage [enc] dbname command [username [pw [group[,group] [comment]]]] 42 pw of . for update command retains the old password 43 pw of - (or blank) for update command prompts for the password 192 my ($pw, $salt) = @_; 194 crypt $pw, $salt; 203 my($pw, $salt) = @_; 205 Crypt::PasswdMD5::apache_md5_crypt($pw, $salt); 209 my($pw, $salt) = @_; 210 '{SHA}' . Digest::SHA1::sha1_base64($pw) . "=";
|
/macosx-10.10/cron-39/lib/ |
H A D | entry.c | 96 load_entry(file, error_func, pw, envp) 99 struct passwd *pw; 125 struct passwd _pw, *pw = NULL; local 129 pw = &_pw; 285 if (!pw) { 331 pw = &_pw; 347 pw = getpwnam(username); 348 if (pw == NULL) { 353 pw->pw_gid = grp->gr_gid; 354 Debug(DPARS, ("load_entry()...uid %d, gid %d\n",pw [all...] |
/macosx-10.10/OpenLDAP-499.27/OpenLDAP/libraries/liblutil/ |
H A D | passwd.c | 350 int lutil_passwd_generate( struct berval *pw, ber_len_t len ) argument 355 pw->bv_len = len; 356 pw->bv_val = ber_memalloc( len + 1 ); 358 if( pw->bv_val == NULL ) { 362 if( lutil_entropy( (unsigned char *) pw->bv_val, pw->bv_len) < 0 ) { 366 for( len = 0; len < pw->bv_len; len++ ) { 367 pw->bv_val[len] = crypt64[ 368 pw->bv_val[len] % (sizeof(crypt64)-1) ]; 371 pw 408 struct berval pw; local 964 char *pw; local [all...] |