Searched refs:pw (Results 51 - 75 of 393) sorted by relevance

1234567891011>>

/macosx-10.10/Heimdal-398.1.2/tests/apple/
H A Dcheck-apple-server.in77 pw=admin
82 password ${pw}\n
85 ${rkpty} ${testdir}/setup.txt ${slapconfig} -createldapmasterandadmin diradmin ${pw} 1000 dc=heimdal-servername-test,dc=apple,dc=com ${R} || exit 1
98 oldpw="${pw}"
99 pw=ak4unandsop39NuJ
106 send ${pw}\n
108 send ${pw}\n
117 echo ${pw} > ${testdir}/foopassword
/macosx-10.10/OpenSSH-189/openssh/
H A Dmd5crypt.c51 md5_crypt(const char *pw, const char *salt) argument
83 MD5_Update(&ctx, pw, strlen(pw));
91 /* Then just as many characters of the MD5(pw, salt, pw) */
93 MD5_Update(&ctx1, pw, strlen(pw));
95 MD5_Update(&ctx1, pw, strlen(pw));
98 for(pl = strlen(pw); p
[all...]
H A Dauth-sia.c83 session_setup_sia(struct passwd *pw, char *tty) argument
90 if (sia_ses_init(&ent, saved_argc, saved_argv, host, pw->pw_name,
94 if (sia_make_entity_pwd(pw, ent) != SIASUCCESS) {
102 pw->pw_name, host);
106 pw->pw_name, host);
111 permanently_set_uid(pw);
H A Dgroupaccess.c62 ga_init(struct passwd *pw) argument
69 if (0 != mbr_uid_to_uuid(pw->pw_uid, u_uuid))
83 if (-1 == (ngroups = getgrouplist_2(pw->pw_name, pw->pw_gid,
95 if (getgrouplist(pw->pw_name, pw->pw_gid, groups_bygid, &ngroups) == -1) {
H A Dauth-passwd.c83 struct passwd * pw = authctxt->pw; local
90 if (pw->pw_uid == 0 && options.permit_root_login != PERMIT_YES)
106 HANDLE hToken = cygwin_logon_user(pw, password);
169 struct passwd *pw = authctxt->pw; local
173 as = auth_usercheck(pw->pw_name, authctxt->style, "auth-ssh",
194 struct passwd *pw = authctxt->pw; local
198 char *pw_password = authctxt->valid ? shadow_pw(pw)
[all...]
/macosx-10.10/bind9-45.101/bind9/unit/atf-src/atf-run/
H A Duser.cpp65 const struct passwd* pw = ::getpwnam(user.c_str()); local
66 if (pw == NULL)
68 return std::make_pair(pw->pw_uid, pw->pw_gid);
/macosx-10.10/sudo-73/src/auth/
H A Dafs.c53 afs_verify(pw, pass, auth)
54 struct passwd *pw;
63 if (ka_GetAdminToken(pw->pw_name, /* name */
75 pw->pw_name, /* name */
H A Dpasswd.c53 passwd_init(pw, auth)
54 struct passwd *pw;
58 if (skeyaccess(pw, user_tty, NULL, NULL) == 0)
62 auth->data = sudo_getepw(pw);
68 passwd_verify(pw, pass, auth)
69 struct passwd *pw;
111 passwd_cleanup(pw, auth)
112 struct passwd *pw;
H A Dsecurid5.c61 * pw - UNUSED
70 securid_init(pw, auth)
71 struct passwd *pw;
91 * pw - struct passwd for username
100 securid_setup(pw, promptp, auth)
101 struct passwd *pw;
115 retval = SD_Lock(*sd, pw->pw_name);
144 * pw - struct passwd for username
153 securid_verify(pw, pass, auth)
154 struct passwd *pw;
[all...]
H A Dsia.c90 sia_setup(pw, promptp, auth)
91 struct passwd *pw;
99 if (sia_ses_init(&siah, Argc, Argv, NULL, pw->pw_name, ttyname(0), 1, NULL)
112 sia_verify(pw, prompt, auth)
113 struct passwd *pw;
129 sia_cleanup(pw, auth)
130 struct passwd *pw;
H A Daix_auth.c54 aixauth_verify(pw, prompt, auth)
55 struct passwd *pw;
69 result = authenticate(pw->pw_name, pass, &reenter, &message);
85 aixauth_cleanup(pw, auth)
86 struct passwd *pw;
H A Dbsdauth.c66 bsdauth_init(pw, auth)
67 struct passwd *pw;
73 if (pw->pw_class && *pw->pw_class)
74 state.lc = login_getclass(pw->pw_class);
76 state.lc = login_getclass(pw->pw_uid ? LOGIN_DEFCLASS : LOGIN_DEFROOTCLASS);
79 "unable to get login class for user %s", pw->pw_name);
100 auth_setitem(state.as, AUTHV_NAME, pw->pw_name) < 0 ||
113 bsdauth_verify(pw, prompt, auth)
114 struct passwd *pw;
[all...]
/macosx-10.10/KerberosHelper-151/regression/
H A Dkinit.tcl6 set pw [lindex $argv 1]
7 send "$pw\n"
H A Dkdcsetup.tcl6 set pw [lindex $argv 0]
7 send "$pw\n"
/macosx-10.10/OpenSSH-189/openssh/openbsd-compat/
H A Dxcrypt.c90 shadow_pw(struct passwd *pw) argument
92 char *pw_password = pw->pw_passwd;
95 struct spwd *spw = getspnam(pw->pw_name);
102 return(get_iaf_password(pw));
107 if (issecure() && (spw = getpwanam(pw->pw_name)) != NULL)
110 struct pr_passwd *spw = getprpwnam(pw->pw_name);
/macosx-10.10/OpenLDAP-499.27/OpenLDAP/servers/slapd/shell-backends/
H A Dpasswd-shell.c49 static struct ldentry *pw2entry LDAP_P(( struct ldop *op, struct passwd *pw ));
115 struct passwd *pw; local
121 for ( pw = getpwent(); pw != NULL; pw = getpwent()) {
122 if (( entry = pw2entry( op, pw )) != NULL ) {
141 pw2entry( struct ldop *op, struct passwd *pw )
154 i = snprintf( tmpbuf, sizeof( tmpbuf ), "cn=%s, %s", pw->pw_name, op->ldop_suffixes[ 0 ] );
159 i = snprintf( tmpbuf, sizeof( tmpbuf ), "%s@%s", pw->pw_name, op->ldop_suffixes[ 0 ] );
188 attr->lda_values[ 0 ] = estrdup( pw
[all...]
/macosx-10.10/sudo-73/src/
H A Dsudo_nss.c213 reset_groups(pw)
214 struct passwd *pw;
217 if (pw != sudo_user.pw) {
219 aix_setauthdb(pw->pw_name);
221 if (initgroups(pw->pw_name, pw->pw_gid) == -1)
249 display_privs(snl, pw)
251 struct passwd *pw;
258 reset_groups(pw);
[all...]
H A Dtsgetgrpw.c18 * Trivial replacements for the libc get{gr,pw}{uid,nam}() routines
20 * We need our own since many platforms don't provide set{pw,gr}file().
101 static struct passwd pw; local
109 zero_bytes(&pw, sizeof(pw));
113 pw.pw_name = cp;
117 pw.pw_passwd = cp;
121 pw.pw_uid = atoi(cp);
125 pw.pw_gid = atoi(cp);
129 pw
145 struct passwd *pw; local
169 struct passwd *pw; local
[all...]
H A Dgetspwuid.c78 * Return a copy of the encrypted password for the user described by pw.
82 sudo_getepw(pw)
83 const struct passwd *pw;
101 if ((spw = getprpwnam(pw->pw_name)) && spw->ufld.fd_encrypt) {
113 if ((spw = getspnam(pw->pw_name)) && spw->sp_pwdp)
121 if ((spw = getspwuid(pw->pw_uid)) && spw->pw_passwd)
129 if ((spw = getpwanam(pw->pw_name)) && spw->pwa_passwd)
137 if ((spw = getauthuid(pw->pw_uid)) && spw->a_password)
146 return estrdup(epw ? epw : pw->pw_passwd);
/macosx-10.10/Heimdal-398.1.2/kdc/
H A Dmain.c76 struct passwd *pw; local
78 pw = getpwnam(runas_string);
79 if (pw == NULL)
82 if (initgroups(pw->pw_name, pw->pw_gid) < 0)
86 if (setgid(pw->pw_gid) < 0)
89 if (setuid(pw->pw_uid) < 0)
97 if (capng_change_id(pw->pw_uid, pw->pw_gid,
/macosx-10.10/ksh-23/ksh/src/lib/libast/string/
H A Dstruid.c68 register struct passwd* pw; local
82 if (pw = getpwnam(name))
83 id = pw->pw_uid;
93 else if (streq(name, "root") && (pw = getpwnam("Administrator")))
94 id = pw->pw_uid;
/macosx-10.10/passwordserver_sasl-193/cyrus_sasl/saslauthd/
H A Dauth_getpwent.c80 struct passwd *pw; /* pointer to passwd file entry */
85 pw = getpwnam(login);
89 if (pw == NULL) {
109 if (strcmp(pw->pw_passwd, (const char *)crypt(password, pw->pw_passwd))) {
79 struct passwd *pw; /* pointer to passwd file entry */ local
/macosx-10.10/apache-793/httpd/modules/lua/
H A Dlua_passwd.c89 char *pw; local
97 pw = ctx->passwd;
101 apr_sha1_base64(pw, strlen(pw), ctx->out);
110 rv = apr_md5_encode(pw, salt, ctx->out, ctx->out_len);
123 cbuf = crypt(pw, salt);
132 if (strlen(pw) > 8) {
133 char *truncpw = apr_pstrdup(ctx->pool, pw);
140 memset(truncpw, '\0', strlen(pw));
157 rv = apr_bcrypt_encode(pw, ct
[all...]
/macosx-10.10/postfix-255/Postfix.ServerSetup/
H A Dset_credentials.sh16 # get pw from existing dovecot submit.passdb
18 pw=`grep "^submit:" /private/etc/dovecot/submit.passdb | sed -e 's,.*},,' -e 's,:.*,,'`
20 pw=`grep "^submit:" /Library/Server/Mail/Config/dovecot/submit.passdb | sed -e 's,.*},,' -e 's,:.*,,'`
23 # if no existing pw, create a new one
24 if [ ! "$pw" ] ; then
25 pw=`dd if=/dev/urandom bs=256 count=1 2>&1 | env LANG=C tr -dc a-zA-Z0-9 2>&1 | cut -b 1-22 2>&1`
28 # set submit.cred with host name & pw
29 if [ "$pw" -a "$hostname" ]; then
31 echo "$hostname|submit|$pw" >> /Library/Server/Mail/Config/postfix/submit.cred
/macosx-10.10/system_cmds-643.1.1/login.tproj/
H A Dklogin.c84 klogin(pw, instance, localhost, password)
85 struct passwd *pw;
105 if (strcmp(pw->pw_name, "root") == 0 ||
116 (void)sprintf(tkt_location, "%s%d", TKT_ROOT, pw->pw_uid);
118 (void)sprintf(tkt_location, "%s_root_%d", TKT_ROOT, pw->pw_uid);
131 kerror = krb_get_pw_in_tkt(pw->pw_name, instance,
151 if (chown(TKT_FILE, pw->pw_uid, pw->pw_gid) < 0)

Completed in 189 milliseconds

1234567891011>>