/macosx-10.10/OpenLDAP-499.27/OpenLDAP/libraries/liblber/ |
H A D | sockbuf.c | 267 ber_len_t pw; local 272 for ( pw = LBER_MIN_BUFF_SIZE; pw < minsize; pw <<= 1 ) { 273 if (pw > LBER_MAX_BUFF_SIZE) return -1; 276 if ( buf->buf_size < pw ) { 277 p = LBER_REALLOC( buf->buf_base, pw ); 280 buf->buf_size = pw;
|
/macosx-10.10/OpenSSH-189/openssh/ |
H A D | loginrec.c | 298 struct passwd *pw; local 308 pw = getpwuid(uid); 309 if (pw == NULL) 315 strlcpy(li->username, pw->pw_name, sizeof(li->username)); 366 struct passwd *pw; local 378 pw = getpwnam(li->username); 379 if (pw == NULL) { 383 li->uid = pw->pw_uid;
|
H A D | ssh-add.c | 529 struct passwd *pw; local 534 if ((pw = getpwuid(getuid())) == NULL) { 541 pw_dir = xstrdup(pw->pw_dir);
|
H A D | monitor.c | 424 if (authctxt->pw->pw_uid == 0 && 790 authctxt->pw = fakepw(); 795 authctxt->pw = pwent; 1012 skey_haskey(authctxt->pw->pw_name) == 0 && 1013 skey_passcheck(authctxt->pw->pw_name, response) != -1); 1193 user_key_allowed(authctxt->pw, key); 1200 hostbased_key_allowed(authctxt->pw, 1207 auth_rhosts_rsa_key_allowed(authctxt->pw, 1424 mm_record_login(Session *s, struct passwd *pw) argument 1443 record_login(s->pid, s->tty, pw [all...] |
/macosx-10.10/tcl-105/tcl_ext/bwidget/bwidget/demo/ |
H A D | manager.tcl | 67 set pw1 [PanedWindow $parent.pw -side top] 70 set pw2 [PanedWindow $pane.pw -side left]
|
/macosx-10.10/vim-55/runtime/syntax/ |
H A D | pcap.vim | 31 syn match pcapKeyword contained ':\(br\|du\|fc\|fs\|mx\|pc\|pl\|pw\|px\|py\|xc\|xs\)#\d\+'
|
/macosx-10.10/xar-254/xar/lib/ |
H A D | stat.c | 394 struct passwd *pw; local 487 pw = getpwuid(XAR(x)->sbcache.st_uid); 488 if( pw ) 489 xar_prop_set(f, "user", pw->pw_name); 556 struct passwd *pw; local 561 pw = getpwnam(opt); 562 if( pw ) { 563 u = pw->pw_uid;
|
/macosx-10.10/Security-57031.1.35/Security/include/security_keychain/ |
H A D | StorageManager.cpp | 1103 struct passwd *pw = getpwuid(uid); local 1104 if (pw == NULL) { 1108 char *userName = pw->pw_name; 1560 struct passwd *pw = getpwuid(uid); local 1561 if (!pw) 1563 homeDir = pw->pw_dir; 1701 struct passwd *pw = getpwuid(uid); // fallback case... local 1702 if (pw) 1703 userName = pw->pw_name; 1905 struct passwd* pw local [all...] |
/macosx-10.10/Security-57031.1.35/Security/libsecurity_keychain/Security/ |
H A D | StorageManager.cpp | 1103 struct passwd *pw = getpwuid(uid); local 1104 if (pw == NULL) { 1108 char *userName = pw->pw_name; 1560 struct passwd *pw = getpwuid(uid); local 1561 if (!pw) 1563 homeDir = pw->pw_dir; 1701 struct passwd *pw = getpwuid(uid); // fallback case... local 1702 if (pw) 1703 userName = pw->pw_name; 1905 struct passwd* pw local [all...] |
/macosx-10.10/Security-57031.1.35/Security/libsecurity_keychain/lib/ |
H A D | StorageManager.cpp | 1103 struct passwd *pw = getpwuid(uid); local 1104 if (pw == NULL) { 1108 char *userName = pw->pw_name; 1560 struct passwd *pw = getpwuid(uid); local 1561 if (!pw) 1563 homeDir = pw->pw_dir; 1701 struct passwd *pw = getpwuid(uid); // fallback case... local 1702 if (pw) 1703 userName = pw->pw_name; 1905 struct passwd* pw local [all...] |
/macosx-10.10/Heimdal-398.1.2/lib/hx509/ |
H A D | ks_file.c | 178 const struct _hx509_password *pw; local 257 pw = _hx509_lock_get_passwords(lock); 258 if (pw != NULL) { 262 for (i = 0; i < pw->len; i++) { 263 password = pw->val[i];
|
H A D | ks_p12.c | 613 const struct _hx509_password *pw; 615 pw = _hx509_lock_get_passwords(lock); 616 if (pw != NULL) { 628 ret = calculate_hash(&aspath, pw, pfx.macData);
|
/macosx-10.10/MITKerberosShim-66/profile/ |
H A D | prof_file.c | 212 struct passwd *pw, pwx; local 216 if (!k5_getpwuid_r(uid, &pwx, pwbuf, sizeof(pwbuf), &pw) 217 && pw != NULL && pw->pw_dir[0] != 0) 218 home_env = pw->pw_dir;
|
/macosx-10.10/emacs-93/emacs/src/ |
H A D | xrdb.c | 302 struct passwd *pw; 310 pw = getpwnam (ptr); 312 pw = getpwuid (getuid ()); 314 if (pw) 315 ptr = pw->pw_dir; 301 struct passwd *pw; local
|
/macosx-10.10/remote_cmds-47/rlogin.tproj/ |
H A D | rlogin.c | 158 struct passwd *pw; local 269 if (!(pw = getpwuid(uid = getuid()))) 284 user = pw->pw_name; 286 localname = pw->pw_name; 393 rem = rcmd(&host, sp->s_port, pw->pw_name, user, term, 0); 397 // rem = rcmd(&host, sp->s_port, pw->pw_name, user, term, 0);
|
/macosx-10.10/tcsh-65/tcsh/ |
H A D | tw.init.c | 610 struct passwd *pw; local 622 pw = getpwent(); 624 pw = NULL; 628 if (pw == NULL) { 634 Strbuf_append(res, str2short(pw->pw_name));
|
/macosx-10.10/ppp-786.1.1/Helpers/pppd/ |
H A D | auth.c | 1790 struct passwd *pw = getpwnam(user); 1793 if (pw == NULL) 1810 pw->pw_passwd = spwd->sp_pwdp; 1817 if (pw->pw_passwd == NULL || strlen(pw->pw_passwd) < 2 1818 || strcmp(crypt(passwd, pw->pw_passwd), pw->pw_passwd) != 0) 1847 if (pw != (struct passwd *)NULL) { 1852 (void)lseek(fd, (off_t)(pw->pw_uid * sizeof(ll)), SEEK_SET); 2782 struct passwd *pw; local [all...] |
/macosx-10.10/BerkeleyDB-21/db/java/src/com/sleepycat/db/internal/ |
H A D | DbEnv.java | 227 final java.io.PrintWriter pw = new java.io.PrintWriter(stream); 232 pw.print(prefix + ": "); 233 pw.println(buf); 234 pw.flush(); 245 final java.io.PrintWriter pw = new java.io.PrintWriter(stream); 249 pw.println(msg); 250 pw.flush();
|
/macosx-10.10/configd-699.1.5/SystemConfiguration.fproj/ |
H A D | SCPreferencesKeychainPrivate.c | 315 void * pw = NULL; local 318 status = SecKeychainItemCopyContent(item, NULL, NULL, &pw_len, &pw); 320 keychain_password = CFDataCreate(NULL, pw, pw_len); 321 status = SecKeychainItemFreeContent(NULL, pw); 494 const void *pw = NULL; local 499 pw = CFDataGetBytePtr(password); 507 pw);
|
/macosx-10.10/diskdev_cmds-576/quotacheck.tproj/ |
H A D | quotacheck.c | 150 register struct passwd *pw; local 242 while ((pw = getpwent()) != 0) 243 (void) addid((u_long)pw->pw_uid, USRQUOTA, pw->pw_name); 903 struct passwd *pw; local 915 if ((pw = getpwuid(id)) != 0) { 916 name = pw->pw_name;
|
/macosx-10.10/Heimdal-398.1.2/appl/dceutils/ |
H A D | k5dcecon.c | 723 struct passwd *pw; local 772 if ((pw = getpwnam(lusername)) == NULL) { 777 luid = pw->pw_uid;
|
/macosx-10.10/Heimdal-398.1.2/appl/su/ |
H A D | su.c | 294 char *pw; local 301 pw = crypt(pw_buf, su->pw_passwd); 303 if(strcmp(pw, su->pw_passwd) != 0) {
|
/macosx-10.10/Heimdal-398.1.2/tests/kdc/ |
H A D | check-kdc.in | 148 ${kadmin} add -p foo --use-defaults pw-expire@${R} || exit 1 149 ${kadmin} modify --pw-expiration-time=+1day pw-expire@${R} || exit 1 167 enctypes=`grep Keytypes: tempfile | sed 's/(pw-salt)//g' | sed 's/,//g' | sed 's/Keytypes://' | sed 's/\[[0-9]*\]//g'` 442 ${kinit} $type -C FILE:${hx509_data}/pkinit.crt,${hx509_data}/pkinit-pw.key --password-file=${testdir}/foopassword foo@${R} || \ 554 echo "Getting client pw expire"; > ${logfile} 556 pw-expire@${R} 2>${testdir}/kinit-log.tmp|| \ 561 ${test_gic} --client=pw-expire@${R} --password=foo \
|
/macosx-10.10/diskdev_cmds-576/mount.tproj/ |
H A D | mount.c | 477 struct passwd *pw; local 490 if ((pw = getpwuid(sfp->f_owner)) != NULL) 491 (void)printf("%s", pw->pw_name);
|
/macosx-10.10/tcl-105/tcl_ext/tkimg/tkimg/compat/libtiff/tools/ |
H A D | tiff2ps.c | 448 * pw : image width in pixels 454 setupPageState(TIFF* tif, uint32* pw, uint32* ph, double* pprw, double* pprh) argument 458 TIFFGetField(tif, TIFFTAG_IMAGEWIDTH, pw); 487 *pprw = PSUNITS(*pw, xres); 687 double pw, double ph, double lm, double bm, int cnt) 712 if (pw != 0) { 713 psw = pw * PS_UNIT_SIZE; 797 if (pw != 0 || ph != 0) { 799 split = PlaceImage(tif,fd,&npages,w,h,pw,ph,prw,prh, 811 split = PlaceImage(tif,fd,&npages,w,h,pw,p 686 TIFF2PS(FILE* fd, TIFF* tif, double pw, double ph, double lm, double bm, int cnt) argument 935 PSHead(FILE *fd, TIFF *tif, uint32 w, uint32 h, double pw, double ph, double ox, double oy) argument [all...] |