Searched refs:_PASSWORD_LEN (Results 1 - 13 of 13) sorted by relevance

/netbsd-6-1-5-RELEASE/lib/libc/gen/
H A Dgetpass.c64 static char buf[_PASSWORD_LEN + 1];
95 if (p < buf + _PASSWORD_LEN)
H A Dsysconf.c345 return _PASSWORD_LEN;
/netbsd-6-1-5-RELEASE/usr.bin/pwhash/
H A Dpwhash.c88 char buf[_PASSWORD_LEN];
107 error = pw_gensalt(buf, _PASSWORD_LEN, "md5", extra);
111 error = pw_gensalt(buf, _PASSWORD_LEN, "sha1", extra);
115 error = pw_gensalt(buf, _PASSWORD_LEN, "blowfish", extra);
126 error = pw_gensalt(buf, _PASSWORD_LEN, key, opt);
/netbsd-6-1-5-RELEASE/usr.bin/passwd/
H A Dyp_passwd.c66 #ifndef _PASSWORD_LEN
67 #define _PASSWORD_LEN PASS_MAX macro
88 static char buf[_PASSWORD_LEN + 1];
89 char salt[_PASSWORD_LEN + 1];
140 if (pw_gensalt(salt, _PASSWORD_LEN, key, opt) == -1) {
H A Dlocal_passwd.c67 char buf[_PASSWORD_LEN+1], salt[_PASSWORD_LEN+1];
114 if(pw_gensalt(salt, _PASSWORD_LEN, key, opt) == -1) {
/netbsd-6-1-5-RELEASE/include/
H A Dpwd.h92 #define _PASSWORD_LEN 128 /* max length, not counting NUL */ macro
/netbsd-6-1-5-RELEASE/usr.bin/skeyinit/
H A Dskeyinit.c121 if (strlen(optarg) >= _PASSWORD_LEN)
123 if ((pw = malloc(_PASSWORD_LEN + 1)) == NULL)
125 strlcpy(pw, optarg, _PASSWORD_LEN + 1);
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssh/dist/
H A Dreadpassphrase.c131 static char buf[_PASSWORD_LEN + 1];
/netbsd-6-1-5-RELEASE/usr.bin/newgrp/
H A Dgrutil.c258 (void)memset(p, '\0', _PASSWORD_LEN);
261 (void)memset(p, '\0', _PASSWORD_LEN);
/netbsd-6-1-5-RELEASE/lib/libpam/modules/pam_unix/
H A Dpam_unix.c411 char salt[_PASSWORD_LEN+1];
607 if (pw_gensalt(salt, _PASSWORD_LEN, key, opt) == -1) {
/netbsd-6-1-5-RELEASE/bin/ed/
H A Dcbc.c240 MEMZERO(p, _PASSWORD_LEN);
/netbsd-6-1-5-RELEASE/lib/libcrypt/
H A Dbcrypt.c79 static char encrypted[_PASSWORD_LEN];
/netbsd-6-1-5-RELEASE/sbin/init/
H A Dinit.c698 (void)memset(clear, 0, _PASSWORD_LEN);

Completed in 204 milliseconds