Searched refs:pw (Results 126 - 150 of 393) sorted by relevance

1234567891011>>

/macosx-10.10/sudo-73/src/auth/
H A Ddce.c70 dce_verify(pw, plain_pw, auth)
71 struct passwd *pw;
88 if (sec_login_setup_identity((unsigned_char_p_t) pw->pw_name,
/macosx-10.10/Heimdal-398.1.2/tests/apple/
H A Dcheck-apple-leo.in45 pw=foo
86 ${test_gssntlm} --user=$u --domain=${ntdomain} --password=${pw}
H A Dcheck-apple-lkdc.in58 pw=foo
156 dscl . -passwd /Users/$u $pw
173 echo " SRP verififer (no pw)"
174 dscl . -passwd /Users/$u $pw
175 $hodadmin . srp-verifier $v srp$pw
184 /Users/$u $pw
202 echo $pw > ${testdir}/foopassword
203 echo srp$pw > ${testdir}/srpfoopassword
229 dscl . -passwd /Users/$u2 $pw
339 # --password="$pw" \
[all...]
/macosx-10.10/Security-57031.1.35/Security/sec/Security/Regressions/vmdh/
H A Dvmdh-40.c47 uint8_t pw[] = { 0x31, 0x32, 0x33, 0x34 }; local
48 size_t pw_len = sizeof(pw);
50 uint8_t encpw[vmdh_encpw_len(sizeof(pw))];
53 ok(vmdh_encrypt_password(vmdh, pub_key, pub_key_len, pw, pw_len,
56 is(encpw_len, (size_t)16, "encrypted pw is 16 bytes");
/macosx-10.10/Security-57031.1.35/Security/sec/Security/
H A Dvmdh.h62 pub_key_len bytes long), encrypt the password given by pw of pw_len bytes
68 const uint8_t *pw, size_t pw_len, uint8_t *encpw, size_t *encpw_len);
H A Dvmdh.c53 const uint8_t *pw, size_t pw_len, uint8_t *encpw, size_t *encpw_len) {
65 pw, pw_len, encpw, *encpw_len, encpw_len)) {
51 vmdh_encrypt_password(vmdh_t vmdh, const uint8_t *pub_key, size_t pub_key_len, const uint8_t *pw, size_t pw_len, uint8_t *encpw, size_t *encpw_len) argument
/macosx-10.10/system_cmds-643.1.1/chkpasswd.tproj/
H A Dpasswd.c150 struct passwd* pw = getpwuid(getuid()); local
151 if (pw != NULL && pw->pw_name != NULL) {
152 user = strdup(pw->pw_name);
/macosx-10.10/OpenSSH-189/openssh/openbsd-compat/
H A Dport-aix.c74 aix_usrinfo(struct passwd *pw) argument
80 len = sizeof("LOGNAME= NAME= ") + (2 * strlen(pw->pw_name));
83 i = snprintf(cp, len, "LOGNAME=%s%cNAME=%s%c", pw->pw_name, '\0',
84 pw->pw_name, '\0');
176 char *authmsg = NULL, *msg = NULL, *name = ctxt->pw->pw_name;
237 sys_auth_allowed_user(struct passwd *pw, Buffer *loginmsg) argument
248 if (pw->pw_uid == 0 || geteuid() != 0) {
253 result = loginrestrictions(pw->pw_name, S_RLOGIN, NULL, &msg);
271 logit("Login restricted for %s: %.100s", pw->pw_name, msg);
/macosx-10.10/file_cmds-242/pax/
H A Dcache.c181 struct passwd *pw; local
210 if ((pw = getpwuid(uid)) == NULL) {
228 return(pw->pw_name);
230 (void)strlcpy(ptr->name, pw->pw_name, sizeof(ptr->name));
312 struct passwd *pw; local
350 if ((pw = getpwnam(name)) == NULL)
352 *uid = pw->pw_uid;
356 if ((pw = getpwnam(name)) == NULL) {
361 *uid = ptr->uid = pw->pw_uid;
/macosx-10.10/OpenSSH-189/openssh/
H A Dsession.c168 auth_sock_cleanup_proc(struct passwd *pw) argument
171 temporarily_use_uid(pw);
180 auth_input_request_forwarding(struct passwd * pw) argument
192 temporarily_use_uid(pw);
273 setproctitle("%s", authctxt->pw->pw_name);
313 s->pw = authctxt->pw;
381 success = auth_input_request_forwarding(s->pw);
394 if (channel_input_port_forward_request(s->pw->pw_uid == 0,
576 cray_init_job(s->pw); /* se
852 struct passwd * pw = s->pw; local
929 struct passwd *pw = s->pw; local
1131 struct passwd *pw = s->pw; local
1407 do_nologin(struct passwd *pw) argument
1495 do_setusercontext(struct passwd *pw) argument
1582 launch_login(struct passwd *pw, const char *hostname) argument
1646 struct passwd *pw = s->pw; local
[all...]
H A Dauth-skey.c81 skey_haskey(authctxt->pw->pw_name) == 0 &&
82 skey_passcheck(authctxt->pw->pw_name, responses[0]) != -1)
H A Dssh-keysign.c68 valid_request(struct passwd *pw, char *host, Key **ret, u_char *data, argument
135 if (strcmp(pw->pw_name, p) != 0)
161 struct passwd *pw; local
181 if ((pw = getpwuid(original_real_uid)) == NULL)
183 pw = pwcopy(pw);
185 permanently_set_uid(pw);
240 if (valid_request(pw, host, &key, data, dlen) < 0)
H A Dsshpty.c203 pty_setowner(struct passwd *pw, const char *tty) argument
216 gid = pw->pw_gid;
230 ssh_selinux_setup_pty(pw->pw_name, tty);
233 if (st.st_uid != pw->pw_uid || st.st_gid != gid) {
234 if (chown(tty, pw->pw_uid, gid) < 0) {
236 (st.st_uid == pw->pw_uid || st.st_uid == 0))
238 tty, (u_int)pw->pw_uid, (u_int)gid,
242 tty, (u_int)pw->pw_uid, (u_int)gid,
/macosx-10.10/sudo-73/src/
H A Dmatch.c110 * Check for user described by pw in a list of members.
114 _userlist_matches(pw, list)
115 struct passwd *pw;
128 if (netgr_matches(m->name, NULL, NULL, pw->pw_name))
132 if (usergr_matches(m->name, pw->pw_name, pw))
137 rval = _userlist_matches(pw, &a->members);
144 if (userpw_matches(m->name, pw->pw_name, pw))
155 userlist_matches(pw, lis
[all...]
H A Dparse.c181 if (userlist_matches(sudo_user.pw, &us->users) != ALLOW)
215 if (userlist_matches(sudo_user.pw, &us->users) != ALLOW)
314 sudo_file_display_priv_short(pw, us, lbuf)
315 struct passwd *pw;
348 lbuf_append(lbuf, "%s", pw->pw_name);
369 sudo_file_display_priv_long(pw, us, lbuf)
370 struct passwd *pw;
401 lbuf_append(lbuf, "%s", pw->pw_name);
424 sudo_file_display_privs(nss, pw, lbuf)
426 struct passwd *pw;
[all...]
/macosx-10.10/Heimdal-398.1.2/lib/hx509/
H A Dtest_pkcs11.in54 certificate cert User certificate FILE:$srcdir/data/test.crt,$srcdir/data/test-pw.key
/macosx-10.10/Heimdal-398.1.2/tests/bin/
H A Dheimdal-win-mount.py15 pw = win['password'] variable
36 conn.sendline(pw + "\r\n")
/macosx-10.10/Security-57031.1.35/Security/utilities/src/
H A DiOSforOSX.c73 struct passwd *pw = getpwuid(getuid()); local
74 path = pw->pw_dir;
/macosx-10.10/Security-57031.1.35/Security/utilities/utilities/
H A DiOSforOSX.c73 struct passwd *pw = getpwuid(getuid()); local
74 path = pw->pw_dir;
/macosx-10.10/zsh-61/zsh/Src/
H A Dhashnameddir.c182 struct passwd *pw; local
188 while ((pw = getpwent()) && !errflag)
189 adduserdir(pw->pw_name, pw->pw_dir, ND_USERNAME, 1);
222 struct passwd *pw;
228 while ((pw = getpwent()) && !errflag)
229 adduserdir(pw->pw_name, pw->pw_dir, ND_USERNAME, 1);
/macosx-10.10/passwordserver_sasl-193/cyrus_sasl/saslauthd/
H A Dauth_shadow.c113 struct passwd *pw; /* return from getpwnam_r() */
143 (void) getpwnam_r(login, &pwbuf, pwdata, sizeof(pwdata), &pw);
145 pw = getpwnam_r(login, &pwbuf, pwdata, sizeof(pwdata));
148 pw = getpwnam(login);
153 if (pw == NULL) {
222 syslog(LOG_DEBUG, "DEBUG: auth_shadow: pw mismatch: '%s' != '%s'",
292 syslog(LOG_DEBUG, "auth_shadow: pw mismatch: %s != %s",
112 struct passwd *pw; /* return from getpwnam_r() */ local
/macosx-10.10/ksh-23/ksh/src/lib/libcmd/
H A Did.c196 register struct passwd* pw; local
250 if (!(pw = getpwnam(name)))
253 if (*s || !(pw = getpwuid(user)))
255 name = pw->pw_name;
257 user = pw->pw_uid;
258 group = pw->pw_gid;
284 name = (pw = getpwuid(user)) ? pw->pw_name : (char*)0;
332 putid(sp, flags, " euid", (pw = getpwuid(euid)) ? pw
[all...]
/macosx-10.10/apache-793/httpd/support/
H A Ddbmmanage.in33 Usage: dbmmanage [enc] dbname command [username [pw [group[,group] [comment]]]]
42 pw of . for update command retains the old password
43 pw of - (or blank) for update command prompts for the password
192 my ($pw, $salt) = @_;
194 crypt $pw, $salt;
203 my($pw, $salt) = @_;
205 Crypt::PasswdMD5::apache_md5_crypt($pw, $salt);
209 my($pw, $salt) = @_;
210 '{SHA}' . Digest::SHA1::sha1_base64($pw) . "=";
/macosx-10.10/cron-39/lib/
H A Dentry.c96 load_entry(file, error_func, pw, envp)
99 struct passwd *pw;
125 struct passwd _pw, *pw = NULL; local
129 pw = &_pw;
285 if (!pw) {
331 pw = &_pw;
347 pw = getpwnam(username);
348 if (pw == NULL) {
353 pw->pw_gid = grp->gr_gid;
354 Debug(DPARS, ("load_entry()...uid %d, gid %d\n",pw
[all...]
/macosx-10.10/OpenLDAP-499.27/OpenLDAP/libraries/liblutil/
H A Dpasswd.c350 int lutil_passwd_generate( struct berval *pw, ber_len_t len ) argument
355 pw->bv_len = len;
356 pw->bv_val = ber_memalloc( len + 1 );
358 if( pw->bv_val == NULL ) {
362 if( lutil_entropy( (unsigned char *) pw->bv_val, pw->bv_len) < 0 ) {
366 for( len = 0; len < pw->bv_len; len++ ) {
367 pw->bv_val[len] = crypt64[
368 pw->bv_val[len] % (sizeof(crypt64)-1) ];
371 pw
408 struct berval pw; local
964 char *pw; local
[all...]

Completed in 165 milliseconds

1234567891011>>