Searched refs:pw_passwd (Results 1 - 25 of 89) sorted by relevance

1234

/macosx-10.9.5/passwordserver_sasl-170/cyrus_sasl/pwcheck/
H A Dpwcheck_getpwnam.c41 else if (pwd->pw_passwd[0] == '*') {
44 else if (strcmp(pwd->pw_passwd, crypt(password, pwd->pw_passwd)) != 0) {
/macosx-10.9.5/Heimdal-323.92.1/lib/roken/
H A Dverify.c53 if(strlen(pw->pw_passwd) == 0 && strlen(password) == 0)
55 if(strcmp(crypt(password, pw->pw_passwd), pw->pw_passwd) == 0)
H A Dk_getpwnam.c54 p->pw_passwd = spwd->sp_pwdp;
H A Dk_getpwuid.c54 p->pw_passwd = spwd->sp_pwdp;
/macosx-10.9.5/emacs-92/emacs/nt/inc/
H A Dpwd.h9 char *pw_passwd; member in struct:passwd
/macosx-10.9.5/passwordserver_sasl-170/cyrus_sasl/mac/CommonKClient/mac_kclient3/Headers/KerberosSupport/
H A Dpwd.h53 /* $Copyright: * * Copyright 1998-2000 by the Massachusetts Institute of Technology. * * All rights reserved. * * Permission to use, copy, modify, and distribute this software and its * documentation for any purpose and without fee is hereby granted, * provided that the above copyright notice appear in all copies and that * both that copyright notice and this permission notice appear in * supporting documentation, and that the name of M.I.T. not be used in * advertising or publicity pertaining to distribution of the software * without specific, written prior permission. Furthermore if you modify * this software you must label your software as modified software and not * distribute it in such a fashion that it might be confused with the * original MIT software. M.I.T. makes no representations about the * suitability of this software for any purpose. It is provided "as is" * without express or implied warranty. * * THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR IMPLIED * WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF * MERCHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE. * * Individual source code files are copyright MIT, Cygnus Support, * OpenVision, Oracle, Sun Soft, FundsXpress, and others. * * Project Athena, Athena, Athena MUSE, Discuss, Hesiod, Kerberos, Moira, * and Zephyr are trademarks of the Massachusetts Institute of Technology * (MIT). No commercial use of these trademarks may be made without prior * written permission of MIT. * * "Commercial use" means use of a name in a product or other for-profit * manner. It does NOT prevent a commercial firm from referring to the MIT * trademarks in order to convey information (although in doing so, * recognition of their trademark status should be given). * $ */ /* $Header: /Volumes/backup/dsmigrate/Dumps/../CVS/passwordserver_sasl/cyrus_sasl/mac/CommonKClient/mac_kclient3/Headers/KerberosSupport/pwd.h,v 1.4 2005/01/10 19:10:48 snsimon Exp $ */ /* pwd.h -- struct passwd */ #ifndef __PWD__ #define __PWD__ #include <stat.h> /* passwd structure for passwd fields */ struct passwd { char *pw_name; char *pw_passwd; uid_t pw_uid; uid_t pw_gid; int pw_quota; char *pw_comment; char *pw_gecos; (…)
1 /* $Copyright member in struct:passwd
/macosx-10.9.5/passwordserver_sasl-170/cyrus_sasl/saslauthd/
H A Dauth_getpwent.c83 if (strcmp(pw->pw_passwd, (const char *)crypt(password, pw->pw_passwd))) {
/macosx-10.9.5/postfix-252/postfix/src/global/
H A Dmypwd.h20 char *pw_passwd; member in struct:mypasswd
/macosx-10.9.5/pyobjc-42/2.5/pyobjc/pyobjc-framework-Cocoa/Examples/AppKit/CocoaBindings/TableModel/
H A DTableModelAppDelegate.py10 'password': pw.pw_passwd,
/macosx-10.9.5/pyobjc-42/2.5/pyobjc/pyobjc-framework-Cocoa/Examples/AppKit/CocoaBindings/TableModelWithSearch/
H A DTableModelWithSearchAppDelegate.py10 'password': pw.pw_passwd,
/macosx-10.9.5/pyobjc-42/pyobjc/pyobjc-framework-Cocoa/Examples/AppKit/CocoaBindings/TableModel/
H A DTableModelAppDelegate.py10 'password': pw.pw_passwd,
/macosx-10.9.5/pyobjc-42/pyobjc/pyobjc-framework-Cocoa/Examples/AppKit/CocoaBindings/TableModelWithSearch/
H A DTableModelWithSearchAppDelegate.py10 'password': pw.pw_passwd,
/macosx-10.9.5/OpenSSH-186/openssh/
H A Dauth2-jpake.c281 authctxt->valid, authctxt->pw->pw_passwd);
287 if (strncmp(authctxt->pw->pw_passwd, "$2$", 3) == 0 &&
288 strlen(authctxt->pw->pw_passwd) > 28) {
295 strlcpy(*salt, authctxt->pw->pw_passwd, salt_len);
297 } else if (strncmp(authctxt->pw->pw_passwd, "$2a$", 4) == 0 &&
298 strlen(authctxt->pw->pw_passwd) > 29) {
305 strlcpy(*salt, authctxt->pw->pw_passwd, salt_len);
307 } else if (strncmp(authctxt->pw->pw_passwd, "$1$", 3) == 0 &&
308 strlen(authctxt->pw->pw_passwd) > 5) {
313 cp = strchr(authctxt->pw->pw_passwd
[all...]
/macosx-10.9.5/remote_cmds-41.90.1/rpc_yppasswdd.tproj/
H A Dyppasswdd_mkpw.c139 pw->pw_name, pw->pw_passwd, pw->pw_uid, pw->pw_gid,
148 pw->pw_name, pw->pw_passwd, pw->pw_uid, pw->pw_gid,
249 EXPAND(pw.pw_passwd);
262 if (pw.pw_passwd[0] != '\0' && argp->oldpass != NULL && argp->oldpass[0] != '\0') {
263 if (strcmp(crypt(argp->oldpass, pw.pw_passwd), pw.pw_passwd) != 0)
267 if (!nopw && badchars(argp->newpw.pw_passwd))
280 pw.pw_passwd = argp->newpw.pw_passwd;
291 if (strlen(pw.pw_name) + 1 + strlen(pw.pw_passwd)
[all...]
/macosx-10.9.5/tcsh-65/tcsh/win32/
H A Dbogus.c76 pass_bogus.pw_passwd= &dummy[0];
78 pass_bogus.pw_passwd= &dummy[0];
103 pass_bogus.pw_passwd= &dummy[0];
105 pass_bogus.pw_passwd= &dummy[0];
/macosx-10.9.5/Librpcsvc-23/
H A Dyppasswd.x57 string pw_passwd<>; /* encrypted password */
/macosx-10.9.5/system_cmds-597.90.1/chkpasswd.tproj/
H A Dfile_passwd.c69 if (pw.pw_passwd != NULL) free(pw.pw_passwd);
70 pw.pw_passwd = NULL;
93 pw.pw_passwd = tokens[i++];
200 newpw->pw_name, newpw->pw_passwd, newpw->pw_uid, newpw->pw_gid,
206 if ((newpw->pw_passwd == NULL) || (newpw->pw_passwd[0] == '\0'))
270 checkpasswd(uname, pw->pw_passwd);
H A Dnis_passwd.c131 checkpasswd(uname, pwd->pw_passwd);
150 pwent->pw_passwd = "*";
168 pwent->pw_passwd = p;
/macosx-10.9.5/system_cmds-597.90.1/system_cmds-597.1.1/chkpasswd.tproj/
H A Dfile_passwd.c69 if (pw.pw_passwd != NULL) free(pw.pw_passwd);
70 pw.pw_passwd = NULL;
93 pw.pw_passwd = tokens[i++];
200 newpw->pw_name, newpw->pw_passwd, newpw->pw_uid, newpw->pw_gid,
206 if ((newpw->pw_passwd == NULL) || (newpw->pw_passwd[0] == '\0'))
270 checkpasswd(uname, pw->pw_passwd);
H A Dnis_passwd.c131 checkpasswd(uname, pwd->pw_passwd);
150 pwent->pw_passwd = "*";
168 pwent->pw_passwd = p;
/macosx-10.9.5/procmail-14/procmail/src/
H A Dauthenticate.c105 rpw=pass->pw->pw_passwd; /* get the regular (encrypted) password */
141 if(op->pw_passwd)
142 bbzero(op->pw_passwd,strlen(op->pw_passwd));
151 if(p->pw_passwd)bbzero(p->pw_passwd,strlen(p->pw_passwd));
/macosx-10.9.5/OpenPAM-20/openpam/modules/pam_unix/
H A Dpam_unix.c122 if ((!pwd->pw_passwd[0] && (flags & PAM_DISALLOW_NULL_AUTHTOK)) ||
123 (crypt_password = crypt(password, pwd->pw_passwd)) == NULL ||
124 strcmp(crypt_password, pwd->pw_passwd) != 0)
/macosx-10.9.5/sudo-72/src/
H A Dgetspwuid.c121 if ((spw = getspwuid(pw->pw_uid)) && spw->pw_passwd)
122 epw = spw->pw_passwd;
146 return estrdup(epw ? epw : pw->pw_passwd);
/macosx-10.9.5/Libinfo-449.1.3/nis.subproj/
H A Dyppasswdd_xdr.c72 if (!xdr_string(xdrs, &objp->pw_passwd, ~0)) {
/macosx-10.9.5/pyobjc-42/2.5/pyobjc/pyobjc-framework-Cocoa/Examples/AppKit/CocoaBindings/MutableTableModel/
H A DTableModelAppDelegate.py11 'password': pw.pw_passwd,

Completed in 310 milliseconds

1234