/macosx-10.10/adv_cmds-158/finger/ |
H A D | finger.c | 174 struct passwd *pw; local 179 if ((pw = getpwnam(UNPRIV_NAME)) && pw->pw_uid > 0) { 180 setgid(pw->pw_gid); 181 setuid(pw->pw_uid); 244 struct passwd *pw; local 259 if ((pw = getpwnam(name)) == NULL) 261 if (hide(pw)) 263 pn = enter_person(pw); 288 struct passwd *pw; local [all...] |
H A D | util.c | 69 match(struct passwd *pw, const char *user) argument 74 if (!strcasecmp(pw->pw_name, user)) 81 (void)strncpy(p = tbuf, pw->pw_gecos, sizeof(tbuf)); 92 (void)strncpy(t, pw->pw_name, 163 enter_person(struct passwd *pw) argument 172 key.data = pw->pw_name; 173 key.size = strlen(pw->pw_name); 186 userinfo(pn, pw); 200 struct passwd *pw; local 210 if ((pw 338 userinfo(PERSON *pn, struct passwd *pw) argument 405 hide(struct passwd *pw) argument [all...] |
/macosx-10.10/sudo-73/src/auth/ |
H A D | pam.c | 84 pam_init(pw, auth) 85 struct passwd *pw; 97 pam_status = pam_start("sudo-i", pw->pw_name, &pam_conv, &pamh); 100 pam_status = pam_start("sudo", pw->pw_name, &pam_conv, &pamh); 130 pam_verify(pw, prompt, auth) 131 struct passwd *pw; 192 pam_cleanup(pw, auth) 193 struct passwd *pw; 208 pam_begin_session(pw) 209 struct passwd *pw; [all...] |
H A D | fwtk.c | 53 fwtk_init(pw, auth) 54 struct passwd *pw; 84 fwtk_verify(pw, prompt, auth) 85 struct passwd *pw; 95 (void) snprintf(buf, sizeof(buf), "authorize %s 'sudo'", pw->pw_name); 151 fwtk_cleanup(pw, auth) 152 struct passwd *pw;
|
H A D | kerb5.c | 93 kerb5_setup(pw, promptp, auth) 94 struct passwd *pw; 116 pw->pw_name, error_message(error)); 132 kerb5_init(pw, auth) 133 struct passwd *pw; 153 if ((error = krb5_parse_name(sudo_context, pw->pw_name, 156 "%s: unable to parse '%s': %s", auth->name, pw->pw_name, 178 kerb5_verify(pw, pass, auth) 179 struct passwd *pw; 197 kerb5_verify(pw, pas [all...] |
/macosx-10.10/curl-83.1.2/curl/lib/ |
H A D | netrc.c | 82 struct passwd pw, *pw_res; local 84 if(!getpwuid_r(geteuid(), &pw, pwbuf, sizeof(pwbuf), &pw_res) 86 home = strdup(pw.pw_dir); 94 struct passwd *pw; local 95 pw= getpwuid(geteuid()); 96 if(pw) { 97 home = pw->pw_dir;
|
/macosx-10.10/OpenSSH-189/openssh/ |
H A D | auth2-pubkey.c | 148 if (PRIVSEP(user_key_allowed(authctxt->pw, key)) && 166 if (PRIVSEP(user_key_allowed(authctxt->pw, key))) { 207 match_principals_file(char *file, struct passwd *pw, struct KeyCert *cert) argument 214 temporarily_use_uid(pw); 216 if ((f = auth_openprincipals(file, pw, options.strict_modes)) == NULL) { 250 if (auth_parse_options(pw, line_opts, 269 check_authkeys_file(FILE *f, char *file, Key* key, struct passwd *pw) argument 315 if (auth_parse_options(pw, key_options, file, 341 authorized_principals == NULL ? pw->pw_name : NULL, 344 if (auth_cert_options(key, pw) ! 378 user_cert_trusted_ca(struct passwd *pw, Key *key) argument 436 user_key_allowed2(struct passwd *pw, Key *key, char *file) argument 463 struct passwd *pw; local 606 user_key_allowed(struct passwd *pw, Key *key) argument [all...] |
H A D | auth2-jpake.c | 227 if ((lc = login_getclass(authctxt->pw->pw_class)) == NULL && 280 debug3("%s: valid %d pw %.5s...", __func__, 281 authctxt->valid, authctxt->pw->pw_passwd); 287 if (strncmp(authctxt->pw->pw_passwd, "$2$", 3) == 0 && 288 strlen(authctxt->pw->pw_passwd) > 28) { 295 strlcpy(*salt, authctxt->pw->pw_passwd, salt_len); 297 } else if (strncmp(authctxt->pw->pw_passwd, "$2a$", 4) == 0 && 298 strlen(authctxt->pw->pw_passwd) > 29) { 305 strlcpy(*salt, authctxt->pw->pw_passwd, salt_len); 307 } else if (strncmp(authctxt->pw [all...] |
/macosx-10.10/tcl-105/tcl_ext/tcllib/tcllib/modules/md5crypt/ |
H A D | md5crypt.tcl | 53 proc ::md5crypt::md5crypt_tcl {magic pw salt} { 66 MD5Update $ctx $pw 71 MD5Update $ctx2 $pw 73 MD5Update $ctx2 $pw 76 for {set pl [string length $pw]} {$pl > 0} {incr pl -16} { 81 for {set i [string length $pw]} {$i != 0} {set i [expr {$i >> 1}]} { 85 set c [string index $pw 0] 97 MD5Update $ctx $pw 105 MD5Update $ctx $pw 110 MD5Update $ctx $pw [all...] |
H A D | md5cryptc.tcl | 55 static char * md5crypt(const char *pw, 83 MD5Update(&ctx,(const unsigned char *)pw,strlen(pw)); 91 /* Then just as many characters of the MD5(pw,salt,pw) */ 93 MD5Update(&ctx1,(const unsigned char *)pw,strlen(pw)); 95 MD5Update(&ctx1,(const unsigned char *)pw,strlen(pw)); 98 for(pl = strlen(pw); p [all...] |
/macosx-10.10/cron-39/cron/ |
H A D | user.c | 53 load_user(crontab_fd, pw, name) 55 struct passwd *pw; /* NULL implies syscrontab */ 66 pw = pw; // avoid unused parameter warning 111 e = load_entry(file, log_error, pw, envp);
|
/macosx-10.10/ksh-23/ksh/src/lib/libast/string/ |
H A D | strgid.c | 74 register struct passwd* pw; local 90 else if (pw = getpwnam(name)) 91 id = pw->pw_gid; 105 else if (pw = getpwnam("Administrator")) 106 id = pw->pw_gid;
|
/macosx-10.10/tcl-105/tcl_ext/sdx/sdx/lib/app-sdx/ |
H A D | fetch.tcl | 25 if {![regexp $re $url - x user pw site src]} { 31 set pw $tcl_platform(user)@[info hostname] 34 if {$pw == ""} { 36 set pw [gets stdin] 39 if {![FTP::Open $site $user $pw \
|
/macosx-10.10/Heimdal-398.1.2/appl/popper/ |
H A D | pop_pass.c | 95 struct passwd *pw; local 98 if ((pw = k_getpwnam(p->user)) == NULL) { 111 if (pop_dropcopy(p, pw) != POP_SUCCESS) return (POP_FAILURE); 116 if(changeuser(p, pw) != POP_SUCCESS) return POP_FAILURE; 127 struct passwd *pw; local 137 if ((pw = k_getpwnam(p->user)) == NULL) 167 if (pw->pw_passwd == NULL) 183 else if (!strcmp(crypt(p->pop_parm[1], pw->pw_passwd), pw->pw_passwd))
|
/macosx-10.10/Security-57031.1.35/securityd/src/ |
H A D | credential.cpp | 29 extern "C" int checkpw_internal( const struct passwd *pw, const char* password ); 48 struct passwd *pw = getpwnam(user); local 51 if (!pw) { 56 mUid = pw->pw_uid; 57 mName = pw->pw_name; 58 mRealName = pw->pw_gecos; 61 int checkpw_status = checkpw_internal(pw, passwd); 64 syslog(LOG_ERR, "checkpw() returned %d; failed to authenticate user %s (uid %lu).", checkpw_status, pw->pw_name, pw->pw_uid);
|
/macosx-10.10/system_cmds-643.1.1/pwd_mkdb.tproj/ |
H A D | pwd_mkdb.c | 357 scan(FILE *fp, struct passwd *pw, int *flags) argument 378 if (!pw_scan(line, pw, flags)) { 497 db_store(FILE *fp, FILE *oldfp, DB *edp, DB *dp, struct passwd *pw, argument 514 for (cnt = 1; scan(fp, pw, &flags); ++cnt) { 517 if (pw->pw_name == NULL) 523 if ((pw->pw_name[0] == '+') || (pw->pw_name[0] == '-')) 527 if (pw->pw_name[0] == '+') { 528 if (!(flags & _PASSWORD_NOUID) && !pw->pw_uid) 531 if (!(flags & _PASSWORD_NOGID) && !pw [all...] |
/macosx-10.10/Security-57031.1.35/Security/include/security_asn1/ |
H A D | secport.c | 365 threadmark_mark *tm, **pw; local 389 pw = &pool->first_mark; 390 while( *pw ) { 391 pw = &(*pw)->next; 394 *pw = tm; 421 threadmark_mark **pw, *tm; local 430 pw = &pool->first_mark; 431 while( *pw && (mark != (*pw) 469 threadmark_mark **pw, *tm; local [all...] |
/macosx-10.10/Security-57031.1.35/Security/libsecurity_asn1/Security/ |
H A D | secport.c | 365 threadmark_mark *tm, **pw; local 389 pw = &pool->first_mark; 390 while( *pw ) { 391 pw = &(*pw)->next; 394 *pw = tm; 421 threadmark_mark **pw, *tm; local 430 pw = &pool->first_mark; 431 while( *pw && (mark != (*pw) 469 threadmark_mark **pw, *tm; local [all...] |
/macosx-10.10/Security-57031.1.35/Security/libsecurity_asn1/lib/ |
H A D | secport.c | 365 threadmark_mark *tm, **pw; local 389 pw = &pool->first_mark; 390 while( *pw ) { 391 pw = &(*pw)->next; 394 *pw = tm; 421 threadmark_mark **pw, *tm; local 430 pw = &pool->first_mark; 431 while( *pw && (mark != (*pw) 469 threadmark_mark **pw, *tm; local [all...] |
/macosx-10.10/Security-57031.1.35/Security/libsecurity_asn1/security_asn1/ |
H A D | secport.c | 365 threadmark_mark *tm, **pw; local 389 pw = &pool->first_mark; 390 while( *pw ) { 391 pw = &(*pw)->next; 394 *pw = tm; 421 threadmark_mark **pw, *tm; local 430 pw = &pool->first_mark; 431 while( *pw && (mark != (*pw) 469 threadmark_mark **pw, *tm; local [all...] |
/macosx-10.10/OpenLDAP-499.27/OpenLDAP/servers/slapd/back-passwd/ |
H A D | search.c | 53 struct passwd *pw, 61 struct passwd *pw; local 138 for ( pw = getpwent(); pw != NULL; pw = getpwent() ) { 158 if ( pw2entry( op->o_bd, pw, &e ) ) { 225 pw = getpwnam( rdn[0]->la_value.bv_val ); 226 if ( pw == NULL ) { 233 rc = pw2entry( op->o_bd, pw, &e ); 277 pw2entry( Backend *be, struct passwd *pw, Entr argument [all...] |
/macosx-10.10/Heimdal-398.1.2/appl/otp/ |
H A D | otp.c | 80 char pw[64]; local 94 if (UI_UTIL_read_pw_string (pw, sizeof(pw), prompt, 0) == 0 && 95 otp_parse (newctx.key, pw, alg) == 0) { 143 char pw[OTP_MAX_PASSPHRASE + 1]; local 156 if (UI_UTIL_read_pw_string (pw, sizeof(pw), "Pass-phrase: ", 1)) 158 if (strlen (pw) < OTP_MIN_PASSPHRASE) 161 } while(strlen(pw) < OTP_MIN_PASSPHRASE); 162 ctx.alg->init (ctx.key, pw, ct 271 struct passwd *pw; local [all...] |
/macosx-10.10/apache-793/httpd/support/ |
H A D | passwd_common.c | 181 char *pw; local 198 pw = ctx->passwd; 203 apr_sha1_base64(pw, strlen(pw), ctx->out); 210 rv = apr_md5_encode(pw, salt, ctx->out, ctx->out_len); 220 apr_cpystrn(ctx->out, pw, ctx->out_len); 228 cbuf = crypt(pw, salt); 237 if (strlen(pw) > 8) { 238 char *truncpw = apr_pstrdup(ctx->pool, pw); 244 memset(truncpw, '\0', strlen(pw)); [all...] |
/macosx-10.10/Heimdal-398.1.2/appl/login/ |
H A D | shadow.c | 64 check_shadow(const struct passwd *pw, const struct spwd *sp) argument 87 change_passwd(pw);
|
/macosx-10.10/Heimdal-398.1.2/lib/gssapi/krb5/ |
H A D | pname_to_uid.c | 51 struct passwd pw, *pwd; 68 if (getpwnam_r(localname, &pw, pwbuf, sizeof(pwbuf), &pwd) != 0) {
|