| /src/lib/libcompat/4.4/ |
| cuserid.c | 49 char pwbuf[1024]; local 53 if (getpwuid_r(geteuid(), &pwres, pwbuf, sizeof(pwbuf), &pw) != 0
|
| /src/lib/libpam/modules/pam_chroot/ |
| pam_chroot.c | 65 char pwbuf[1024]; local 69 getpwnam_r(user, &pwres, pwbuf, sizeof(pwbuf), &pwd) != 0 ||
|
| /src/lib/libpam/modules/pam_rhosts/ |
| pam_rhosts.c | 66 char pwbuf[1024]; local 72 if (getpwnam_r(user, &pwres, pwbuf, sizeof(pwbuf), &pwd) != 0 ||
|
| /src/lib/libpam/modules/pam_securetty/ |
| pam_securetty.c | 71 char pwbuf[1024]; local 78 getpwnam_r(user, &pwres, pwbuf, sizeof(pwbuf), &pwd) != 0 ||
|
| /src/lib/libpam/modules/pam_self/ |
| pam_self.c | 67 char pwbuf[1024]; local 73 getpwnam_r(luser, &pwres, pwbuf, sizeof(pwbuf), &pwd) != 0 ||
|
| /src/crypto/external/bsd/heimdal/dist/kcm/ |
| client.c | 178 char pwbuf[2048]; local 180 if (rk_getpwuid_r(getuid(), &pw, pwbuf, sizeof(pwbuf), &pwd) == 0) {
|
| /src/crypto/external/bsd/heimdal/dist/lib/krb5/ |
| get_default_principal.c | 82 char pwbuf[2048]; local 84 if (rk_getpwuid_r(uid, &pw, pwbuf, sizeof(pwbuf), &pwd) == 0)
|
| /src/lib/libpam/modules/pam_ftpusers/ |
| pam_ftpusers.c | 71 char pwbuf[1024], grbuf[1024]; local 77 getpwnam_r(user, &pwres, pwbuf, sizeof(pwbuf), &pwd) != 0 ||
|
| /src/lib/libpam/modules/pam_nologin/ |
| pam_nologin.c | 80 char pwbuf[1024]; local 95 if (getpwnam_r(user, &pwres, pwbuf, sizeof(pwbuf), &pwd) != 0 ||
|
| /src/crypto/external/bsd/heimdal/dist/kadmin/ |
| init.c | 58 char pwbuf[512]; local 60 random_password(pwbuf, sizeof(pwbuf)); 61 password = pwbuf;
|
| ank.c | 87 char pwbuf[1024]; local 122 random_password (pwbuf, sizeof(pwbuf)); 123 password = pwbuf; 125 random_password (pwbuf, sizeof(pwbuf)); 126 password = pwbuf; 142 ret = UI_UTIL_read_pw_string (pwbuf, sizeof(pwbuf), prompt, 151 password = pwbuf; [all...] |
| cpw.c | 89 char pwbuf[128]; local 103 ret = UI_UTIL_read_pw_string(pwbuf, sizeof(pwbuf), prompt, 110 password = pwbuf; 115 memset_s(pwbuf, sizeof(pwbuf), 0, sizeof(pwbuf));
|
| /src/external/bsd/libbind/dist/irs/ |
| dns_pw.c | 55 char * pwbuf; member in struct:pvt 116 if (pvt->pwbuf) 117 free(pvt->pwbuf); 188 if (pvt->pwbuf) 189 free(pvt->pwbuf); 190 pvt->pwbuf = strdup(*hes_list); 193 cp = pvt->pwbuf; 228 free(pvt->pwbuf); 229 pvt->pwbuf = NULL;
|
| nis_pw.c | 70 char * pwbuf; member in struct:pvt 128 if (pvt->pwbuf) 129 free(pvt->pwbuf); 225 if (pvt->pwbuf) 226 free(pvt->pwbuf); 227 pvt->pwbuf = pvt->curval_data; 230 cp = pvt->pwbuf; 272 free(pvt->pwbuf); 273 pvt->pwbuf = NULL;
|
| /src/external/ibm-public/postfix/dist/src/global/ |
| mypwd.c | 206 struct passwd pwbuf; local 209 err = getpwuid_r(uid, &pwbuf, pwstore, sizeof(pwstore), &pwd); 269 struct passwd pwbuf; local 272 err = getpwnam_r(name, &pwbuf, pwstore, sizeof(pwstore), &pwd);
|
| /src/lib/libpam/modules/pam_group/ |
| pam_group.c | 77 char pwbuf[1024]; local 83 getpwnam_r(user, &pwres, pwbuf, sizeof(pwbuf), &pwd) != 0 || 92 getpwnam_r(ruser, &pwres, pwbuf, sizeof(pwbuf), &pwd) != 0 ||
|
| /src/usr.bin/passwd/ |
| krb5_passwd.c | 87 char pwbuf[BUFSIZ]; local 192 if (UI_UTIL_read_pw_string(pwbuf, sizeof(pwbuf), 196 ret = krb5_set_password(context, &cred, pwbuf, NULL, 283 char pwbuf[BUFSIZ]; local 341 if(UI_UTIL_read_pw_string(pwbuf, sizeof(pwbuf), "New password: ", 1) != 0) 344 ret = krb5_set_password (context, &cred, pwbuf, NULL,
|
| /src/crypto/external/bsd/heimdal/dist/kpasswd/ |
| kpasswd.c | 67 char pwbuf[BUFSIZ]; local 88 ret = UI_UTIL_read_pw_string (pwbuf, sizeof(pwbuf), msg, 97 ret = krb5_set_password_using_ccache (context, id, pwbuf,
|
| /src/crypto/external/bsd/heimdal/dist/lib/gssapi/krb5/ |
| acquire_cred.c | 528 gss_const_buffer_t pwbuf = credential_data; local 531 if (pwbuf == NULL) { 539 pw = strndup(pwbuf->value, pwbuf->length);
|
| /src/lib/libpam/modules/pam_lastlog/ |
| pam_lastlog.c | 123 char pwbuf[1024]; local 133 getpwnam_r(user, &pwres, pwbuf, sizeof(pwbuf), &pwd) != 0 ||
|
| /src/lib/libpam/modules/pam_radius/ |
| pam_radius.c | 272 char pwbuf[1024]; local 340 if (getpwnam_r(tmpuser, &pwres, pwbuf, 341 sizeof(pwbuf), &pwd) != 0 ||
|
| /src/lib/libpam/modules/pam_ssh/ |
| pam_ssh.c | 172 char pwbuf[1024]; local 183 if (getpwnam_r(user, &pwres, pwbuf, sizeof(pwbuf), &pwd) != 0 || 421 char pwbuf[1024]; local 432 if (getpwnam_r(user, &pwres, pwbuf, sizeof(pwbuf), &pwd) != 0 ||
|
| /src/lib/libpam/modules/pam_unix/ |
| pam_unix.c | 91 char pwbuf[1024]; local 95 (void) getpwnam_r(getlogin(), &pwres, pwbuf, sizeof(pwbuf), local 102 (void) getpwnam_r(user, &pwres, pwbuf, sizeof(pwbuf), &pwd); 154 char pwbuf[1024]; local 161 getpwnam_r(user, &pwres, pwbuf, sizeof(pwbuf), &pwd) != 0 ||
|
| /src/lib/libtelnet/ |
| kerberos5.c | 443 char pwbuf[1024]; local 450 if (getpwnam_r(UserNameRequested, &pws, pwbuf, 451 sizeof(pwbuf), &pwd) != 0 || pwd == NULL)
|
| sra.c | 447 char pwbuf[1024]; local 449 if (getpwnam_r(usr, &pws, pwbuf, sizeof(pwbuf), &pwd) != 0 || 472 char pwbuf[1024]; local 481 if (getpwnam_r(name, &pws, pwbuf, sizeof(pwbuf), &pw) == 0 &&
|