/src/share/doc/smm/17.password/ |
Makefile | 4 ARTICLE=morris78-password 5 SRCS= password.ms
|
/src/games/larn/ |
config.c | 46 const char *password = "pvnert(x)"; /* the wizards password <=32 */ variable in typeref:typename:const char *
|
global.c | 35 extern const char *password; 743 function to ask user for a password (no echo) 754 lprcat("\nEnter Password: "); 756 i = strlen(password); 761 if (strcmp(gpwbuf, password) != 0) {
|
/src/sys/lib/libsa/ |
checkpasswd.c | 109 check_password(const char *password) 117 if (password[i]) 120 return 1; /* no password set */ 123 passwd = getpass("Password: "); 127 if (memcmp(pwdigest, password, 16) == 0)
|
/src/share/doc/smm/ |
Makefile | 12 SUBDIR= 01.setup config 04.quotas 05.fastfs 06.nfs 17.password 18.net 27 # 15.uucpnet 16.security 17.password 18.net 19.perl
|
/src/common/dist/zlib/contrib/minizip/ |
zip.h | 235 const char* password, 252 const char* password, 259 password : crypting password (NULL for no crypting) 277 const char* password, 297 const char* password,
|
miniunz.c | 194 printf("Usage : miniunz [-e] [-x] [-v] [-l] [-o] [-p password] file.zip [file_to_extr.] [-d extractdir]\n\n" \ 201 " -p extract encrypted file using password\n\n"); 307 static int do_extract_currentfile(unzFile uf, const int* popt_extract_without_path, int* popt_overwrite, const char* password) { 373 err = unzOpenCurrentFilePassword(uf,password); 478 static int do_extract(unzFile uf, int opt_extract_without_path, int opt_overwrite, const char* password) { 491 password) != UNZ_OK) 508 static int do_extract_onefile(unzFile uf, const char* filename, int opt_extract_without_path, int opt_overwrite, const char* password) { 517 password) == UNZ_OK) 527 const char *password=NULL; local in function:main 574 password=argv[i+1] [all...] |
unzip.h | 338 const char* password); 341 password is a crypting password 362 const char* password);
|
minizip.c | 168 printf("Usage : minizip [-o] [-a] [-0 to -9] [-p password] [-j] file.zip [files_to_add]\n\n" \ 249 const char* password=NULL; local in function:main 280 password=argv[i+1]; 408 if ((password != NULL) && (err==ZIP_OK)) 446 password,crcFile, zip64);
|
zip.c | 1021 const char* password, uLong crcForCrypting, 1031 if (password != NULL) 1093 if (password != NULL) 1215 if ((err==Z_OK) && (password != NULL)) 1221 /*init_keys(password,zi->ci.keys,zi->ci.pcrc_32_tab);*/ 1223 sizeHead=crypthead(password,bufHead,RAND_HEAD_LEN,zi->ci.keys,zi->ci.pcrc_32_tab,crcForCrypting); 1241 const char* password, uLong crcForCrypting, 1248 password, crcForCrypting, versionMadeBy, flagBase, 0); 1256 const char* password, uLong crcForCrypting) { 1262 password, crcForCrypting, VERSIONMADEBY, 0, 0) [all...] |
/src/distrib/utils/embedded/files/ |
creds_msdos | 125 local password="$2" 127 local pwhash=$(pwhash "$password") 170 echo "Added user ${user} via password hash method." 174 echo "Added user ${user} via password method, shredding credentials file."
|
/src/sys/dev/iscsi/ |
iscsi_ioctl.h | 53 unsigned int password:1; member in struct:__anonb1d6e0de0108::__anonb1d6e0de0208 71 void *password; member in struct:__anonb1d6e0de0108 137 password 138 Contains the password to use during login authentication of the 142 Contains the password to use during login authentication of the target
|
/src/sys/arch/macppc/stand/installboot/ |
installboot.h | 63 IB_PASSWORD = 1<<18, /* i386 boot password */ 86 const char *password; /* boot password */ member in struct:__anon551177cf0208
|
/src/usr.sbin/rpc.pcnfsd/ |
pcnfsd.x | 5 /* The maximum number of bytes in a password argument */ 52 typedef string password<PASSWORDLEN>; 54 ** The type password is used for passing an encode password for 55 ** authentication. The server should decode the password as described 162 ** indicates that the server was able to verify the ident and password 269 password pw; 500 password pw; 537 ** Perform user authentication - map username, password into uid, gid. 593 ** Perform user authentication - map username, password into uid, gid [all...] |
/src/sbin/umbctl/ |
umbctl.c | 325 { "password", _set_password, 1 }, 377 char const * password) 379 umbp->passwordlen = _char_to_utf16(password, umbp->password, 380 sizeof(umbp->password)); 382 || (size_t)umbp->passwordlen > sizeof(umbp->password)) 383 return _error(-1, "%s: %s", ifname, "Password too long");
|
/src/usr.bin/ftp/ |
cmds.c | 1482 char *password; local in function:user 1492 UPRINTF("usage: %s username [password [account]]\n", 1500 password = getpass("Password: "); 1501 if (password == NULL) 1502 password = emptypass; 1504 password = argv[2]; 1506 n = command("PASS %s", password); 1507 memset(password, 0, strlen(password)); [all...] |
/src/distrib/sets/ |
makesrctars | 23 Usage: ${prog} [-N password/group dir] [-q] [-x xsrcdir] srcdir setdir
|
/src/usr.sbin/installboot/ |
installboot.h | 65 IB_PASSWORD = 1<<18, /* i386 boot password */ 103 const char *password; /* boot password */ member in struct:__anon78e59b4b0308
|
/src/sys/dev/usb/ |
if_umbreg.h | 266 uint16_t password[UMB_PASSWORD_MAXLEN]; member in struct:umb_parameter 318 uint16_t password[UMB_PASSWORD_MAXLEN]; member in struct:umb_info
|
/src/sys/external/isc/libsodium/dist/ |
README.markdown | 9 decryption, signatures, password hashing and more.
|
/src/sys/external/isc/libsodium/dist/test/default/ |
pwhash_scrypt_ll.exp | 6 scrypt('password', 'NaCl', 1024, 8, 16, 64) =
|
/src/usr.bin/login/ |
k5login.c | 328 * 1 if Kerberos failed (try local password in login) 331 k5login(struct passwd *pw, char *instance, char *localhost, char *password) 347 * for a password. If that's ok, log the user in 412 kerror = krb5_get_init_creds_password(kcontext, &my_creds, me, password, 424 printf("%s: Kerberos Password incorrect\n", principal);
|
/src/games/backgammon/backgammon/ |
main.c | 86 static const char password[] = "losfurng"; variable in typeref:typename:const char[] 192 writel("Password:"); 208 if (pbuf[i] != password[i])
|
/src/usr.sbin/installboot/arch/ |
i386.c | 270 if (params->password[0]) { 273 MD5Update(&md5ctx, params->password, 274 strlen(params->password));
|
/src/usr.sbin/user/ |
user.c | 86 char *u_password; /* encrypted password */ 95 char *u_expire; /* when password will expire */ 927 /* structure which defines a password type */ 931 size_t length; /* length of password */ 932 const char *regex; /* regexp to output the password */ 948 /* return non-zero if it's a valid password - check length for cipher type */ 1072 char password[PasswordLength + 1]; local in function:adduser 1206 warnx("Warning: inactive time `%s' invalid, password expiry off", 1218 password[sizeof(password) - 1] = '\0' 2147 char password[PasswordLength + 1]; local in function:userdel [all...] |