/macosx-10.10/Heimdal-398.1.2/tests/apple/ |
H A D | check-apple-server.in | 77 pw=admin 82 password ${pw}\n 85 ${rkpty} ${testdir}/setup.txt ${slapconfig} -createldapmasterandadmin diradmin ${pw} 1000 dc=heimdal-servername-test,dc=apple,dc=com ${R} || exit 1 98 oldpw="${pw}" 99 pw=ak4unandsop39NuJ 106 send ${pw}\n 108 send ${pw}\n 117 echo ${pw} > ${testdir}/foopassword
|
/macosx-10.10/OpenSSH-189/openssh/ |
H A D | md5crypt.c | 51 md5_crypt(const char *pw, const char *salt) argument 83 MD5_Update(&ctx, pw, strlen(pw)); 91 /* Then just as many characters of the MD5(pw, salt, pw) */ 93 MD5_Update(&ctx1, pw, strlen(pw)); 95 MD5_Update(&ctx1, pw, strlen(pw)); 98 for(pl = strlen(pw); p [all...] |
H A D | auth-sia.c | 83 session_setup_sia(struct passwd *pw, char *tty) argument 90 if (sia_ses_init(&ent, saved_argc, saved_argv, host, pw->pw_name, 94 if (sia_make_entity_pwd(pw, ent) != SIASUCCESS) { 102 pw->pw_name, host); 106 pw->pw_name, host); 111 permanently_set_uid(pw);
|
H A D | groupaccess.c | 62 ga_init(struct passwd *pw) argument 69 if (0 != mbr_uid_to_uuid(pw->pw_uid, u_uuid)) 83 if (-1 == (ngroups = getgrouplist_2(pw->pw_name, pw->pw_gid, 95 if (getgrouplist(pw->pw_name, pw->pw_gid, groups_bygid, &ngroups) == -1) {
|
H A D | auth-passwd.c | 83 struct passwd * pw = authctxt->pw; local 90 if (pw->pw_uid == 0 && options.permit_root_login != PERMIT_YES) 106 HANDLE hToken = cygwin_logon_user(pw, password); 169 struct passwd *pw = authctxt->pw; local 173 as = auth_usercheck(pw->pw_name, authctxt->style, "auth-ssh", 194 struct passwd *pw = authctxt->pw; local 198 char *pw_password = authctxt->valid ? shadow_pw(pw) [all...] |
/macosx-10.10/bind9-45.101/bind9/unit/atf-src/atf-run/ |
H A D | user.cpp | 65 const struct passwd* pw = ::getpwnam(user.c_str()); local 66 if (pw == NULL) 68 return std::make_pair(pw->pw_uid, pw->pw_gid);
|
/macosx-10.10/sudo-73/src/auth/ |
H A D | afs.c | 53 afs_verify(pw, pass, auth) 54 struct passwd *pw; 63 if (ka_GetAdminToken(pw->pw_name, /* name */ 75 pw->pw_name, /* name */
|
H A D | passwd.c | 53 passwd_init(pw, auth) 54 struct passwd *pw; 58 if (skeyaccess(pw, user_tty, NULL, NULL) == 0) 62 auth->data = sudo_getepw(pw); 68 passwd_verify(pw, pass, auth) 69 struct passwd *pw; 111 passwd_cleanup(pw, auth) 112 struct passwd *pw;
|
H A D | securid5.c | 61 * pw - UNUSED 70 securid_init(pw, auth) 71 struct passwd *pw; 91 * pw - struct passwd for username 100 securid_setup(pw, promptp, auth) 101 struct passwd *pw; 115 retval = SD_Lock(*sd, pw->pw_name); 144 * pw - struct passwd for username 153 securid_verify(pw, pass, auth) 154 struct passwd *pw; [all...] |
H A D | sia.c | 90 sia_setup(pw, promptp, auth) 91 struct passwd *pw; 99 if (sia_ses_init(&siah, Argc, Argv, NULL, pw->pw_name, ttyname(0), 1, NULL) 112 sia_verify(pw, prompt, auth) 113 struct passwd *pw; 129 sia_cleanup(pw, auth) 130 struct passwd *pw;
|
H A D | aix_auth.c | 54 aixauth_verify(pw, prompt, auth) 55 struct passwd *pw; 69 result = authenticate(pw->pw_name, pass, &reenter, &message); 85 aixauth_cleanup(pw, auth) 86 struct passwd *pw;
|
H A D | bsdauth.c | 66 bsdauth_init(pw, auth) 67 struct passwd *pw; 73 if (pw->pw_class && *pw->pw_class) 74 state.lc = login_getclass(pw->pw_class); 76 state.lc = login_getclass(pw->pw_uid ? LOGIN_DEFCLASS : LOGIN_DEFROOTCLASS); 79 "unable to get login class for user %s", pw->pw_name); 100 auth_setitem(state.as, AUTHV_NAME, pw->pw_name) < 0 || 113 bsdauth_verify(pw, prompt, auth) 114 struct passwd *pw; [all...] |
/macosx-10.10/KerberosHelper-151/regression/ |
H A D | kinit.tcl | 6 set pw [lindex $argv 1] 7 send "$pw\n"
|
H A D | kdcsetup.tcl | 6 set pw [lindex $argv 0] 7 send "$pw\n"
|
/macosx-10.10/OpenSSH-189/openssh/openbsd-compat/ |
H A D | xcrypt.c | 90 shadow_pw(struct passwd *pw) argument 92 char *pw_password = pw->pw_passwd; 95 struct spwd *spw = getspnam(pw->pw_name); 102 return(get_iaf_password(pw)); 107 if (issecure() && (spw = getpwanam(pw->pw_name)) != NULL) 110 struct pr_passwd *spw = getprpwnam(pw->pw_name);
|
/macosx-10.10/OpenLDAP-499.27/OpenLDAP/servers/slapd/shell-backends/ |
H A D | passwd-shell.c | 49 static struct ldentry *pw2entry LDAP_P(( struct ldop *op, struct passwd *pw )); 115 struct passwd *pw; local 121 for ( pw = getpwent(); pw != NULL; pw = getpwent()) { 122 if (( entry = pw2entry( op, pw )) != NULL ) { 141 pw2entry( struct ldop *op, struct passwd *pw ) 154 i = snprintf( tmpbuf, sizeof( tmpbuf ), "cn=%s, %s", pw->pw_name, op->ldop_suffixes[ 0 ] ); 159 i = snprintf( tmpbuf, sizeof( tmpbuf ), "%s@%s", pw->pw_name, op->ldop_suffixes[ 0 ] ); 188 attr->lda_values[ 0 ] = estrdup( pw [all...] |
/macosx-10.10/sudo-73/src/ |
H A D | sudo_nss.c | 213 reset_groups(pw) 214 struct passwd *pw; 217 if (pw != sudo_user.pw) { 219 aix_setauthdb(pw->pw_name); 221 if (initgroups(pw->pw_name, pw->pw_gid) == -1) 249 display_privs(snl, pw) 251 struct passwd *pw; 258 reset_groups(pw); [all...] |
H A D | tsgetgrpw.c | 18 * Trivial replacements for the libc get{gr,pw}{uid,nam}() routines 20 * We need our own since many platforms don't provide set{pw,gr}file(). 101 static struct passwd pw; local 109 zero_bytes(&pw, sizeof(pw)); 113 pw.pw_name = cp; 117 pw.pw_passwd = cp; 121 pw.pw_uid = atoi(cp); 125 pw.pw_gid = atoi(cp); 129 pw 145 struct passwd *pw; local 169 struct passwd *pw; local [all...] |
H A D | getspwuid.c | 78 * Return a copy of the encrypted password for the user described by pw. 82 sudo_getepw(pw) 83 const struct passwd *pw; 101 if ((spw = getprpwnam(pw->pw_name)) && spw->ufld.fd_encrypt) { 113 if ((spw = getspnam(pw->pw_name)) && spw->sp_pwdp) 121 if ((spw = getspwuid(pw->pw_uid)) && spw->pw_passwd) 129 if ((spw = getpwanam(pw->pw_name)) && spw->pwa_passwd) 137 if ((spw = getauthuid(pw->pw_uid)) && spw->a_password) 146 return estrdup(epw ? epw : pw->pw_passwd);
|
/macosx-10.10/Heimdal-398.1.2/kdc/ |
H A D | main.c | 76 struct passwd *pw; local 78 pw = getpwnam(runas_string); 79 if (pw == NULL) 82 if (initgroups(pw->pw_name, pw->pw_gid) < 0) 86 if (setgid(pw->pw_gid) < 0) 89 if (setuid(pw->pw_uid) < 0) 97 if (capng_change_id(pw->pw_uid, pw->pw_gid,
|
/macosx-10.10/ksh-23/ksh/src/lib/libast/string/ |
H A D | struid.c | 68 register struct passwd* pw; local 82 if (pw = getpwnam(name)) 83 id = pw->pw_uid; 93 else if (streq(name, "root") && (pw = getpwnam("Administrator"))) 94 id = pw->pw_uid;
|
/macosx-10.10/passwordserver_sasl-193/cyrus_sasl/saslauthd/ |
H A D | auth_getpwent.c | 80 struct passwd *pw; /* pointer to passwd file entry */ 85 pw = getpwnam(login); 89 if (pw == NULL) { 109 if (strcmp(pw->pw_passwd, (const char *)crypt(password, pw->pw_passwd))) { 79 struct passwd *pw; /* pointer to passwd file entry */ local
|
/macosx-10.10/apache-793/httpd/modules/lua/ |
H A D | lua_passwd.c | 89 char *pw; local 97 pw = ctx->passwd; 101 apr_sha1_base64(pw, strlen(pw), ctx->out); 110 rv = apr_md5_encode(pw, salt, ctx->out, ctx->out_len); 123 cbuf = crypt(pw, salt); 132 if (strlen(pw) > 8) { 133 char *truncpw = apr_pstrdup(ctx->pool, pw); 140 memset(truncpw, '\0', strlen(pw)); 157 rv = apr_bcrypt_encode(pw, ct [all...] |
/macosx-10.10/postfix-255/Postfix.ServerSetup/ |
H A D | set_credentials.sh | 16 # get pw from existing dovecot submit.passdb 18 pw=`grep "^submit:" /private/etc/dovecot/submit.passdb | sed -e 's,.*},,' -e 's,:.*,,'` 20 pw=`grep "^submit:" /Library/Server/Mail/Config/dovecot/submit.passdb | sed -e 's,.*},,' -e 's,:.*,,'` 23 # if no existing pw, create a new one 24 if [ ! "$pw" ] ; then 25 pw=`dd if=/dev/urandom bs=256 count=1 2>&1 | env LANG=C tr -dc a-zA-Z0-9 2>&1 | cut -b 1-22 2>&1` 28 # set submit.cred with host name & pw 29 if [ "$pw" -a "$hostname" ]; then 31 echo "$hostname|submit|$pw" >> /Library/Server/Mail/Config/postfix/submit.cred
|
/macosx-10.10/system_cmds-643.1.1/login.tproj/ |
H A D | klogin.c | 84 klogin(pw, instance, localhost, password) 85 struct passwd *pw; 105 if (strcmp(pw->pw_name, "root") == 0 || 116 (void)sprintf(tkt_location, "%s%d", TKT_ROOT, pw->pw_uid); 118 (void)sprintf(tkt_location, "%s_root_%d", TKT_ROOT, pw->pw_uid); 131 kerror = krb_get_pw_in_tkt(pw->pw_name, instance, 151 if (chown(TKT_FILE, pw->pw_uid, pw->pw_gid) < 0)
|