/src/lib/libpam/modules/pam_skey/ |
pam_skey.c | 57 const char *user, *skinfo, *pass; local in function:pam_sm_authenticate 83 retval = pam_get_authtok(pamh, PAM_AUTHTOK, &pass, skprompt); 87 response = strdup(pass);
|
/src/games/sail/ |
lo_main.c | 72 struct passwd *pass; local in function:lo_curses 103 if (longfmt && (pass = getpwuid(log.l_uid)) != NULL) 105 "%10.10s (%s)", log.l_name, pass->pw_name); 127 struct passwd *pass; local in function:lo_main 145 if (longfmt && (pass = getpwuid(log.l_uid)) != NULL) 147 "%10.10s (%s)", log.l_name, pass->pw_name);
|
/src/libexec/rexecd/unit-tests/ |
rexec.c | 52 char *pass = __UNCONST("h@x0R"); local in function:main 65 pass = optarg; 77 if ((s = rexec(&host, sv->s_port, user, pass, cmd, NULL)) == -1)
|
/src/usr.bin/skey/ |
skey.c | 43 int n, cnt, i, pass = 0, hexmode = 0; local in function:main 61 pass = 1; 116 if (!pass) {
|
/src/sys/external/isc/libsodium/dist/src/libsodium/crypto_pwhash/argon2/ |
argon2.c | 32 uint32_t pass; local in function:argon2_ctx 75 for (pass = 0; pass < instance.passes; pass++) { 76 fill_memory_blocks(&instance, pass);
|
argon2-core.h | 114 uint32_t pass; member in struct:Argon2_position_t 144 * Pass 0: 148 * Pass 1+: 157 if (position->pass == 0) { 158 /* First pass */ 176 /* Second pass */ 198 if (position->pass != 0) { 295 void fill_memory_blocks(argon2_instance_t *instance, uint32_t pass);
|
/src/lib/libpam/modules/pam_group/ |
pam_group.c | 156 const char *pass; local in function:authenticate 162 retval = pam_get_authtok(pamh, PAM_AUTHTOK, &pass, password_prompt); 168 if (strcmp(crypt(pass, pwd->pw_passwd), pwd->pw_passwd) == 0)
|
/src/sys/external/bsd/drm2/dist/drm/i915/gt/ |
selftest_rc6.c | 158 int pass; local in function:live_rc6_ctx_wa 160 for (pass = 0; pass < 2; pass++) {
|
selftest_timeline.c | 198 const struct __igt_sync pass[] = { local in function:igt_sync 221 for (p = pass; p->name; p++) { 239 for (p = pass; p->name; p++) {
|
/src/usr.sbin/timed/timed/ |
networkdelta.c | 168 int pass; local in function:median 179 for (pass = 1; ; pass++) { /* loop over the data */ 211 (long)a, pass, npts); 236 (long)a, pass, npts); 260 fprintf(fd, "%ld in %d passes\n", (long)a, pass);
|
/src/libexec/httpd/ |
auth-bozo.c | 57 char user[BOZO_MINBUFSIZE], *pass; local in function:bozo_auth_check 99 if ((pass = strchr(user, ':')) == NULL) 101 *pass++ = '\0'; 105 user, pass, request->hr_authuser, 109 if (strcmp(crypt(request->hr_authpass, pass), 110 pass) != 0) 153 char *pass = NULL; local in function:bozo_auth_check_headers 167 (pass = strchr(authbuf, ':')) == NULL) 170 *pass++ = '\0'; 172 request->hr_authpass = bozostrdup(httpd, request, pass); [all...] |
/src/sys/net/npf/ |
npf_handler.c | 97 * Reassembly is disabled: just pass the packet through 187 /* Pass to IPv4/IPv6 reassembly mechanism. */ 198 /* Just pass-through if specially tagged. */ 200 goto pass; 210 goto pass; 224 const bool pass = npf_default_pass(npf); local in function:npfk_packet_handler 227 if (pass) { 229 goto pass; 249 /* reverse between pass and block conditions */ 262 * Establish a "pass" connection, if required. Just proceed i [all...] |
/src/regress/sys/kern/getcwd/ |
getcwd.c | 112 static int pass = 0; variable in typeref:typename:int 160 pass++; 300 pass = 0; 319 pass++; 539 printf ("%d passes\n", pass);
|
/src/sys/altq/ |
altq_flowvalve.h | 87 u_int pass; /* # of packets that have the fve member in struct:flowvalve::__anon0e1301d90408
|
/src/sys/external/bsd/drm2/dist/drm/i915/selftests/ |
i915_syncmap.c | 279 unsigned int pass, order; local in function:igt_syncmap_join_above 293 * Each pass the common prefix shrinks and we have to insert a join. 300 for (pass = 0; pass < 3; pass++) {
|
/src/sbin/ifconfig/ |
carp.c | 95 struct pstr pass = PSTR_INITIALIZER(&pass, "pass", setcarp_passwd, variable in typeref:struct:pstr 96 "pass", &command_root.pb_parser); 108 , {.k_word = "pass", .k_nextparser = &pass.ps_parser} 166 data = (prop_data_t)prop_dictionary_get(env, "pass"); 288 "[ pass passphrase ] [ state state ] [ vhid n ]\n");
|
/src/lib/libpam/modules/pam_ksu/ |
pam_ksu.c | 134 const char *pass; local in function:auth_krb5 150 pass = NULL; 151 pamret = pam_get_authtok(pamh, PAM_AUTHTOK, &pass, prompt); 155 pass, NULL, NULL, 0, NULL, gic_opt);
|
/src/lib/libpam/modules/pam_radius/ |
pam_radius.c | 99 const char *pass, const char *nas_id, const char *nas_ipaddr, 123 (pass != NULL && 124 rad_put_string(radh, RAD_USER_PASSWORD, pass) == -1) || 269 const char *user, *pass; local in function:pam_sm_authenticate 288 retval = pam_get_authtok(pamh, PAM_AUTHTOK, &pass, PASSWORD_PROMPT); 310 if (build_access_request(radh, user, pass, nas_id, nas_ipaddr, NULL,
|
/src/lib/libpam/modules/pam_ssh/ |
pam_ssh.c | 171 int nkeys, nullok, pam_err, pass; local in function:pam_sm_authenticate 190 pass = (pam_get_item(pamh, PAM_AUTHTOK, &item) == PAM_SUCCESS && 221 if (nkeys == 0 && pass == 1 && 224 pass = 0;
|
/src/lib/libradius/ |
radlib_private.h | 83 char pass[PASSSIZE]; /* Cleartext password */ member in struct:rad_handle
|
/src/lib/libtelnet/ |
sra.c | 62 char *user, *pass, *xuser, *xpass; variable in typeref:typename:char ** 128 pass = malloc(SMALL_LEN); 133 if (user == NULL || xuser == NULL || pass == NULL || xpass == 161 /* server received an IS -- could be SRA KEY, USER, or PASS */ 215 pk_decode(xpass, pass, &ck); 218 valid = check_user(user, pass); 329 memset(pass, 0, SMALL_LEN); 330 if (telnet_gets(passprompt, pass, SMALL_LEN - 1, 0) == NULL) { 334 pk_encode(pass, xpass, &ck); 425 strncpy(buf, " PASS ", buflen) 510 const char *pass; member in struct:cred_t [all...] |
/src/libexec/rexecd/ |
rexecd.c | 149 char user[16], pass[16]; local in function:doit 219 getstr(pass, sizeof(pass), "password"); 231 !pam_ok(pam_set_item(pamh, PAM_AUTHTOK, pass))) { 246 namep = crypt(pass, pwd->pw_passwd);
|
/src/sys/arch/usermode/usermode/ |
trap.c | 584 * handle pass to userland signals 643 unsigned int n, pass; local in function:sigio 646 for (pass = 0; pass < 2; pass++) {
|
/src/sys/external/bsd/drm2/dist/drm/i915/gem/selftests/ |
i915_gem_object_blt.c | 40 int pass; local in function:__perf_fill_blt 50 for (pass = 0; pass < ARRAY_SIZE(t); pass++) { 67 t[pass] = ktime_sub(t1, t0); 120 int pass; local in function:__perf_copy_blt 130 for (pass = 0; pass < ARRAY_SIZE(t); pass++) { 147 t[pass] = ktime_sub(t1, t0) [all...] |
/src/lib/libpam/modules/pam_unix/ |
pam_unix.c | 90 const char *pass, *user, *realpw; local in function:pam_sm_authenticate 119 retval = pam_get_authtok(pamh, PAM_AUTHTOK, &pass, NULL); 124 if (strcmp(crypt(pass, realpw), realpw) == 0)
|