Searched refs:password (Results 1 - 25 of 37) sorted by relevance

12

/src/share/doc/smm/17.password/
H A DMakefile4 ARTICLE=morris78-password
5 SRCS= password.ms
/src/games/larn/
H A Dconfig.c46 const char *password = "pvnert(x)"; /* the wizards password <=32 */ variable in typeref:typename:const char *
H A Dglobal.c35 extern const char *password;
743 function to ask user for a password (no echo)
756 i = strlen(password);
761 if (strcmp(gpwbuf, password) != 0) {
/src/sys/lib/libsa/
H A Dcheckpasswd.c109 check_password(const char *password) argument
117 if (password[i])
120 return 1; /* no password set */
127 if (memcmp(pwdigest, password, 16) == 0)
/src/share/doc/smm/
H A DMakefile12 SUBDIR= 01.setup config 04.quotas 05.fastfs 06.nfs 17.password 18.net
27 # 15.uucpnet 16.security 17.password 18.net 19.perl
/src/common/dist/zlib/contrib/minizip/
H A Dzip.h235 const char* password,
252 const char* password,
259 password : crypting password (NULL for no crypting)
277 const char* password,
297 const char* password,
H A Dminiunz.c194 printf("Usage : miniunz [-e] [-x] [-v] [-l] [-o] [-p password] file.zip [file_to_extr.] [-d extractdir]\n\n" \
201 " -p extract encrypted file using password\n\n");
307 static int do_extract_currentfile(unzFile uf, const int* popt_extract_without_path, int* popt_overwrite, const char* password) { argument
373 err = unzOpenCurrentFilePassword(uf,password);
478 static int do_extract(unzFile uf, int opt_extract_without_path, int opt_overwrite, const char* password) { argument
491 password) != UNZ_OK)
508 static int do_extract_onefile(unzFile uf, const char* filename, int opt_extract_without_path, int opt_overwrite, const char* password) { argument
517 password) == UNZ_OK)
527 const char *password=NULL; local in function:main
574 password
[all...]
H A Dunzip.h338 const char* password);
341 password is a crypting password
362 const char* password);
H A Dminizip.c168 printf("Usage : minizip [-o] [-a] [-0 to -9] [-p password] [-j] file.zip [files_to_add]\n\n" \
249 const char* password=NULL; local in function:main
280 password=argv[i+1];
408 if ((password != NULL) && (err==ZIP_OK))
446 password,crcFile, zip64);
H A Dzip.c1021 const char* password, uLong crcForCrypting,
1031 if (password != NULL)
1093 if (password != NULL)
1215 if ((err==Z_OK) && (password != NULL))
1221 /*init_keys(password,zi->ci.keys,zi->ci.pcrc_32_tab);*/
1223 sizeHead=crypthead(password,bufHead,RAND_HEAD_LEN,zi->ci.keys,zi->ci.pcrc_32_tab,crcForCrypting);
1241 const char* password, uLong crcForCrypting,
1248 password, crcForCrypting, versionMadeBy, flagBase, 0);
1256 const char* password, uLong crcForCrypting) {
1262 password, crcForCryptin
1016 zipOpenNewFileInZip4_64(zipFile file,const char * filename,const zip_fileinfo * zipfi,const void * extrafield_local,uInt size_extrafield_local,const void * extrafield_global,uInt size_extrafield_global,const char * comment,int method,int level,int raw,int windowBits,int memLevel,int strategy,const char * password,uLong crcForCrypting,uLong versionMadeBy,uLong flagBase,int zip64) argument
1236 zipOpenNewFileInZip4(zipFile file,const char * filename,const zip_fileinfo * zipfi,const void * extrafield_local,uInt size_extrafield_local,const void * extrafield_global,uInt size_extrafield_global,const char * comment,int method,int level,int raw,int windowBits,int memLevel,int strategy,const char * password,uLong crcForCrypting,uLong versionMadeBy,uLong flagBase) argument
1251 zipOpenNewFileInZip3(zipFile file,const char * filename,const zip_fileinfo * zipfi,const void * extrafield_local,uInt size_extrafield_local,const void * extrafield_global,uInt size_extrafield_global,const char * comment,int method,int level,int raw,int windowBits,int memLevel,int strategy,const char * password,uLong crcForCrypting) argument
1265 zipOpenNewFileInZip3_64(zipFile file,const char * filename,const zip_fileinfo * zipfi,const void * extrafield_local,uInt size_extrafield_local,const void * extrafield_global,uInt size_extrafield_global,const char * comment,int method,int level,int raw,int windowBits,int memLevel,int strategy,const char * password,uLong crcForCrypting,int zip64) argument
[all...]
/src/distrib/utils/embedded/files/
H A Dcreds_msdos125 local password="$2"
127 local pwhash=$(pwhash "$password")
170 echo "Added user ${user} via password hash method."
174 echo "Added user ${user} via password method, shredding credentials file."
/src/sys/dev/iscsi/
H A Discsi_ioctl.h53 unsigned int password:1; member in struct:__anon4249e8840108::__anon4249e8840208
71 void *password; member in struct:__anon4249e8840108
137 password
138 Contains the password to use during login authentication of the
142 Contains the password to use during login authentication of the target
/src/sys/arch/macppc/stand/installboot/
H A Dinstallboot.h63 IB_PASSWORD = 1<<18, /* i386 boot password */
86 const char *password; /* boot password */ member in struct:__anon56486e750208
/src/usr.sbin/rpc.pcnfsd/
H A Dpcnfsd.x5 /* The maximum number of bytes in a password argument */
52 typedef string password<PASSWORDLEN>;
54 ** The type password is used for passing an encode password for
55 ** authentication. The server should decode the password as described
162 ** indicates that the server was able to verify the ident and password
269 password pw;
500 password pw;
537 ** Perform user authentication - map username, password into uid, gid.
593 ** Perform user authentication - map username, password int
[all...]
/src/sbin/umbctl/
H A Dumbctl.c325 { "password", _set_password, 1 },
377 char const * password)
379 umbp->passwordlen = _char_to_utf16(password, umbp->password,
380 sizeof(umbp->password));
382 || (size_t)umbp->passwordlen > sizeof(umbp->password))
376 _set_password(char const * ifname,struct umb_parameter * umbp,char const * password) argument
/src/usr.bin/ftp/
H A Dcmds.c1482 char *password; local in function:user
1492 UPRINTF("usage: %s username [password [account]]\n",
1500 password = getpass("Password: ");
1501 if (password == NULL)
1502 password = emptypass;
1504 password = argv[2];
1506 n = command("PASS %s", password);
1507 memset(password, 0, strlen(password));
1512 password
[all...]
/src/distrib/sets/
H A Dmakesrctars23 Usage: ${prog} [-N password/group dir] [-q] [-x xsrcdir] srcdir setdir
/src/usr.sbin/installboot/
H A Dinstallboot.h65 IB_PASSWORD = 1<<18, /* i386 boot password */
103 const char *password; /* boot password */ member in struct:__anona97acc310308
/src/sys/external/isc/libsodium/dist/
H A DREADME.markdown9 decryption, signatures, password hashing and more.
/src/sys/external/isc/libsodium/dist/test/default/
H A Dpwhash_scrypt_ll.exp6 scrypt('password', 'NaCl', 1024, 8, 16, 64) =
/src/games/backgammon/backgammon/
H A Dmain.c86 static const char password[] = "losfurng"; variable in typeref:typename:const char[]
208 if (pbuf[i] != password[i])
/src/sys/dev/usb/
H A Dif_umbreg.h266 uint16_t password[UMB_PASSWORD_MAXLEN]; member in struct:umb_parameter
318 uint16_t password[UMB_PASSWORD_MAXLEN]; member in struct:umb_info
/src/usr.bin/login/
H A Dk5login.c328 * 1 if Kerberos failed (try local password in login)
331 k5login(struct passwd *pw, char *instance, char *localhost, char *password) argument
347 * for a password. If that's ok, log the user in
412 kerror = krb5_get_init_creds_password(kcontext, &my_creds, me, password,
/src/usr.sbin/installboot/arch/
H A Di386.c270 if (params->password[0]) {
273 MD5Update(&md5ctx, params->password,
274 strlen(params->password));
/src/usr.sbin/user/
H A Duser.c86 char *u_password; /* encrypted password */
95 char *u_expire; /* when password will expire */
927 /* structure which defines a password type */
931 size_t length; /* length of password */
932 const char *regex; /* regexp to output the password */
948 /* return non-zero if it's a valid password - check length for cipher type */
1072 char password[PasswordLength + 1]; local in function:adduser
1206 warnx("Warning: inactive time `%s' invalid, password expiry off",
1218 password[sizeof(password)
2147 char password[PasswordLength + 1]; local in function:userdel
[all...]

Completed in 19 milliseconds

12