HomeSort by: relevance | last modified time | path
    Searched refs:password (Results 1 - 25 of 39) sorted by relevancy

1 2

  /src/share/doc/smm/17.password/
Makefile 4 ARTICLE=morris78-password
5 SRCS= password.ms
  /src/games/larn/
config.c 46 const char *password = "pvnert(x)"; /* the wizards password <=32 */ variable in typeref:typename:const char *
global.c 35 extern const char *password;
743 function to ask user for a password (no echo)
754 lprcat("\nEnter Password: ");
756 i = strlen(password);
761 if (strcmp(gpwbuf, password) != 0) {
  /src/sys/lib/libsa/
checkpasswd.c 109 check_password(const char *password)
117 if (password[i])
120 return 1; /* no password set */
123 passwd = getpass("Password: ");
127 if (memcmp(pwdigest, password, 16) == 0)
  /src/share/doc/smm/
Makefile 12 SUBDIR= 01.setup config 04.quotas 05.fastfs 06.nfs 17.password 18.net
27 # 15.uucpnet 16.security 17.password 18.net 19.perl
  /src/common/dist/zlib/contrib/minizip/
zip.h 235 const char* password,
252 const char* password,
259 password : crypting password (NULL for no crypting)
277 const char* password,
297 const char* password,
miniunz.c 194 printf("Usage : miniunz [-e] [-x] [-v] [-l] [-o] [-p password] file.zip [file_to_extr.] [-d extractdir]\n\n" \
201 " -p extract encrypted file using password\n\n");
307 static int do_extract_currentfile(unzFile uf, const int* popt_extract_without_path, int* popt_overwrite, const char* password) {
373 err = unzOpenCurrentFilePassword(uf,password);
478 static int do_extract(unzFile uf, int opt_extract_without_path, int opt_overwrite, const char* password) {
491 password) != UNZ_OK)
508 static int do_extract_onefile(unzFile uf, const char* filename, int opt_extract_without_path, int opt_overwrite, const char* password) {
517 password) == UNZ_OK)
527 const char *password=NULL; local in function:main
574 password=argv[i+1]
    [all...]
unzip.h 338 const char* password);
341 password is a crypting password
362 const char* password);
minizip.c 168 printf("Usage : minizip [-o] [-a] [-0 to -9] [-p password] [-j] file.zip [files_to_add]\n\n" \
249 const char* password=NULL; local in function:main
280 password=argv[i+1];
408 if ((password != NULL) && (err==ZIP_OK))
446 password,crcFile, zip64);
zip.c 1021 const char* password, uLong crcForCrypting,
1031 if (password != NULL)
1093 if (password != NULL)
1215 if ((err==Z_OK) && (password != NULL))
1221 /*init_keys(password,zi->ci.keys,zi->ci.pcrc_32_tab);*/
1223 sizeHead=crypthead(password,bufHead,RAND_HEAD_LEN,zi->ci.keys,zi->ci.pcrc_32_tab,crcForCrypting);
1241 const char* password, uLong crcForCrypting,
1248 password, crcForCrypting, versionMadeBy, flagBase, 0);
1256 const char* password, uLong crcForCrypting) {
1262 password, crcForCrypting, VERSIONMADEBY, 0, 0)
    [all...]
  /src/distrib/utils/embedded/files/
creds_msdos 125 local password="$2"
127 local pwhash=$(pwhash "$password")
170 echo "Added user ${user} via password hash method."
174 echo "Added user ${user} via password method, shredding credentials file."
  /src/sys/dev/iscsi/
iscsi_ioctl.h 53 unsigned int password:1; member in struct:__anonb1d6e0de0108::__anonb1d6e0de0208
71 void *password; member in struct:__anonb1d6e0de0108
137 password
138 Contains the password to use during login authentication of the
142 Contains the password to use during login authentication of the target
  /src/sys/arch/macppc/stand/installboot/
installboot.h 63 IB_PASSWORD = 1<<18, /* i386 boot password */
86 const char *password; /* boot password */ member in struct:__anon551177cf0208
  /src/usr.sbin/rpc.pcnfsd/
pcnfsd.x 5 /* The maximum number of bytes in a password argument */
52 typedef string password<PASSWORDLEN>;
54 ** The type password is used for passing an encode password for
55 ** authentication. The server should decode the password as described
162 ** indicates that the server was able to verify the ident and password
269 password pw;
500 password pw;
537 ** Perform user authentication - map username, password into uid, gid.
593 ** Perform user authentication - map username, password into uid, gid
    [all...]
  /src/sbin/umbctl/
umbctl.c 325 { "password", _set_password, 1 },
377 char const * password)
379 umbp->passwordlen = _char_to_utf16(password, umbp->password,
380 sizeof(umbp->password));
382 || (size_t)umbp->passwordlen > sizeof(umbp->password))
383 return _error(-1, "%s: %s", ifname, "Password too long");
  /src/usr.bin/ftp/
cmds.c 1482 char *password; local in function:user
1492 UPRINTF("usage: %s username [password [account]]\n",
1500 password = getpass("Password: ");
1501 if (password == NULL)
1502 password = emptypass;
1504 password = argv[2];
1506 n = command("PASS %s", password);
1507 memset(password, 0, strlen(password));
    [all...]
  /src/distrib/sets/
makesrctars 23 Usage: ${prog} [-N password/group dir] [-q] [-x xsrcdir] srcdir setdir
  /src/usr.sbin/installboot/
installboot.h 65 IB_PASSWORD = 1<<18, /* i386 boot password */
103 const char *password; /* boot password */ member in struct:__anon78e59b4b0308
  /src/sys/dev/usb/
if_umbreg.h 266 uint16_t password[UMB_PASSWORD_MAXLEN]; member in struct:umb_parameter
318 uint16_t password[UMB_PASSWORD_MAXLEN]; member in struct:umb_info
  /src/sys/external/isc/libsodium/dist/
README.markdown 9 decryption, signatures, password hashing and more.
  /src/sys/external/isc/libsodium/dist/test/default/
pwhash_scrypt_ll.exp 6 scrypt('password', 'NaCl', 1024, 8, 16, 64) =
  /src/usr.bin/login/
k5login.c 328 * 1 if Kerberos failed (try local password in login)
331 k5login(struct passwd *pw, char *instance, char *localhost, char *password)
347 * for a password. If that's ok, log the user in
412 kerror = krb5_get_init_creds_password(kcontext, &my_creds, me, password,
424 printf("%s: Kerberos Password incorrect\n", principal);
  /src/games/backgammon/backgammon/
main.c 86 static const char password[] = "losfurng"; variable in typeref:typename:const char[]
192 writel("Password:");
208 if (pbuf[i] != password[i])
  /src/usr.sbin/installboot/arch/
i386.c 270 if (params->password[0]) {
273 MD5Update(&md5ctx, params->password,
274 strlen(params->password));
  /src/usr.sbin/user/
user.c 86 char *u_password; /* encrypted password */
95 char *u_expire; /* when password will expire */
927 /* structure which defines a password type */
931 size_t length; /* length of password */
932 const char *regex; /* regexp to output the password */
948 /* return non-zero if it's a valid password - check length for cipher type */
1072 char password[PasswordLength + 1]; local in function:adduser
1206 warnx("Warning: inactive time `%s' invalid, password expiry off",
1218 password[sizeof(password) - 1] = '\0'
2147 char password[PasswordLength + 1]; local in function:userdel
    [all...]

Completed in 27 milliseconds

1 2