Home
last modified time | relevance | path

Searched refs:authtok (Results 1 – 25 of 68) sorted by relevance

123

/dports/security/pam_krb5/pam-krb5-4.9/tests/module/
H A Dpassword-t.c40 const char *authtok; in trace_event_set_state_dynamic_init()
42 retval = pam_get_item(pamh, PAM_AUTHTOK, (PAM_CONST void **) &authtok); in trace_event_set_state_dynamic_init()
44 is_string(config->newpass, authtok, "...and it is correct"); in trace_event_set_state_dynamic_init()
79 config.authtok = newpass;
88 config.authtok = NULL;
129 config.authtok = newpass;
134 config.authtok = krbconf->password;
143 config.authtok = NULL;
H A Dalt-auth-t.c42 config.authtok = krbconf->password; in main()
68 config.authtok = "bogus incorrect password"; in main()
75 config.authtok = krbconf->password; in main()
H A Dexpired-t.c151 config.authtok = krbconf->password; in main()
156 config.authtok = newpass; in main()
H A Dbad-authtok-t.c40 config.authtok = "BAD PASSWORD THAT WILL NOT WORK"; in main()
H A Dstacked-t.c37 config.authtok = krbconf->password;
/dports/sysutils/pam_mount/pam_mount-2.12/src/
H A Dpam_mount.c302 char *authtok = NULL; in auth_grab_authtok() local
311 authtok = xstrdup(ptr); in auth_grab_authtok()
313 if (authtok == NULL && Args.get_pw_interactive) { in auth_grab_authtok()
334 if (authtok != NULL) { in auth_grab_authtok()
338 if (mlock(authtok, strlen(authtok) + 1) < 0) in auth_grab_authtok()
464 char *authtok = NULL; in ses_grab_authtok() local
470 return authtok; in ses_grab_authtok()
480 if (authtok != NULL) { in ses_grab_authtok()
482 authtok, clean_system_authtok); in ses_grab_authtok()
484 if (mlock(authtok, strlen(authtok) + 1) < 0) in ses_grab_authtok()
[all …]
/dports/net/nss-pam-ldapd/nss-pam-ldapd-0.9.11/compat/
H A Dpam_get_authtok.c38 int pam_get_authtok(pam_handle_t *pamh, int item, const char **authtok, in pam_get_authtok() argument
46 *authtok = NULL; in pam_get_authtok()
47 rc = pam_get_item(pamh, item, (PAM_ITEM_CONST void **)authtok); in pam_get_authtok()
48 if ((rc == PAM_SUCCESS) && (*authtok != NULL)) in pam_get_authtok()
93 return pam_get_item(pamh, item, (PAM_ITEM_CONST void **)authtok); in pam_get_authtok()
/dports/net/nss-pam-ldapd-sasl/nss-pam-ldapd-0.9.11/compat/
H A Dpam_get_authtok.c38 int pam_get_authtok(pam_handle_t *pamh, int item, const char **authtok, in pam_get_authtok() argument
46 *authtok = NULL; in pam_get_authtok()
47 rc = pam_get_item(pamh, item, (PAM_ITEM_CONST void **)authtok); in pam_get_authtok()
48 if ((rc == PAM_SUCCESS) && (*authtok != NULL)) in pam_get_authtok()
93 return pam_get_item(pamh, item, (PAM_ITEM_CONST void **)authtok); in pam_get_authtok()
/dports/net/openldap25-server/openldap-2.5.9/contrib/slapd-modules/rbac/
H A Drbacreq.c43 BER_BVZERO( &reqp->authtok ); in rbac_alloc_req()
70 if ( !BER_BVISNULL( &reqp->authtok ) ) in rbac_free_req()
71 ber_memfree( reqp->authtok.bv_val ); in rbac_free_req()
/dports/net/openldap25-client/openldap-2.5.9/contrib/slapd-modules/rbac/
H A Drbacreq.c43 BER_BVZERO( &reqp->authtok ); in rbac_alloc_req()
70 if ( !BER_BVISNULL( &reqp->authtok ) ) in rbac_free_req()
71 ber_memfree( reqp->authtok.bv_val ); in rbac_free_req()
/dports/net/openldap26-client/openldap-2.6.0/contrib/slapd-modules/rbac/
H A Drbacreq.c43 BER_BVZERO( &reqp->authtok ); in rbac_alloc_req()
70 if ( !BER_BVISNULL( &reqp->authtok ) ) in rbac_free_req()
71 ber_memfree( reqp->authtok.bv_val ); in rbac_free_req()
/dports/net/openldap26-server/openldap-2.6.0/contrib/slapd-modules/rbac/
H A Drbacreq.c43 BER_BVZERO( &reqp->authtok ); in rbac_alloc_req()
70 if ( !BER_BVISNULL( &reqp->authtok ) ) in rbac_free_req()
71 ber_memfree( reqp->authtok.bv_val ); in rbac_free_req()
/dports/security/pam_krb5-rh/pam_krb5-2.4.13/tests/tools/
H A Dpam_harness.c127 char *authtok; in main() member
131 char *tty, *ruser, *rhost, *authtok, *oldauthtok, *run, *prompt; in main() local
160 tty = ruser = rhost = authtok = oldauthtok = run = prompt = NULL; in main()
208 authtok = argv[++i]; in main()
344 if (authtok) { in main()
350 i = pam_set_item(pamh, PAM_AUTHTOK, authtok); in main()
352 printf("Error setting AUTHTOK item `%s'.\n", authtok); in main()
620 if (authtok) { in main()
622 authtok) != PAM_SUCCESS) { in main()
/dports/security/pam_krb5-rh/pam_krb5-2.4.13/src/
H A Dharness.c67 char *authtok; member
192 const char *user, *service, *authtok, *old_authtok, **pargv; in main() local
228 authtok = NULL; in main()
261 authtok = argv[i + 1]; in main()
277 if (authtok != NULL) { in main()
278 ret = pam_set_item(pamh, PAM_AUTHTOK, authtok); in main()
/dports/security/pam_krb5-rh/pam_krb5-2.4.13/tests/012-armor/
H A Drun.sh10 test_run -auth -session -run grepenvc.sh -authtok foo $test_principal $pam_krb5 $test_flags use_fir…
14 test_run -auth -session -run grepenvc.sh -authtok foo $test_principal $pam_krb5 $test_flags use_fir…
/dports/security/pam_krb5/pam-krb5-4.9/module/
H A Dauth.c231 maybe_retrieve_password(struct pam_args *args, int authtok, const char **pass) in maybe_retrieve_password() argument
241 status = pam_get_item(args->pamh, authtok, (PAM_CONST void **) pass); in maybe_retrieve_password()
278 prompt_password(struct pam_args *args, int authtok, const char **pass) in prompt_password() argument
282 const char *prompt = (authtok == PAM_AUTHTOK) ? NULL : "Current"; in prompt_password()
304 status = pam_set_item(args->pamh, authtok, password); in prompt_password()
313 status = pam_get_item(args->pamh, authtok, (PAM_CONST void **) pass); in prompt_password()
772 int authtok = (service == NULL) ? PAM_AUTHTOK : PAM_OLDAUTHTOK; in pamk5_password_auth() local
843 status = maybe_retrieve_password(args, authtok, &pass); in pamk5_password_auth()
872 status = prompt_password(args, authtok, &pass); in pamk5_password_auth()
/dports/security/pam_krb5/pam-krb5-4.9/tests/fakepam/
H A Ddata.c110 *data = pamh->authtok; in pam_get_item()
154 free(pamh->authtok); in pam_set_item()
155 pamh->authtok = strdup(data); in pam_set_item()
156 if (pamh->authtok == NULL) in pam_set_item()
H A Dscript.h56 const char *authtok; /* Stored as AUTHTOK before PAM. */ member
/dports/multimedia/audacious-plugins/audacious-plugins-4.1/src/neon/
H A Dneon.cc343 char * * authtok = g_strsplit (m_purl.userinfo, ":", 2); in server_auth() local
345 if (strlen (authtok[1]) > NE_ABUFSIZ - 1 || strlen (authtok[0]) > NE_ABUFSIZ - 1) in server_auth()
348 g_strfreev (authtok); in server_auth()
352 g_strlcpy (username, authtok[0], NE_ABUFSIZ); in server_auth()
353 g_strlcpy (password, authtok[1], NE_ABUFSIZ); in server_auth()
357 g_strfreev (authtok); in server_auth()
/dports/x11/lightdm/lightdm-1.30.0/tests/scripts/
H A Dautologin-new-authtok.conf6 autologin-user=new-authtok
/dports/x11/lightdm/lightdm-1.30.0/tests/
H A Dtest-login-new-authtok-gobject2 ./src/dbus-env ./src/test-runner login-new-authtok test-gobject-greeter
H A Dtest-login-new-authtok-python2 ./src/dbus-env ./src/test-runner login-new-authtok test-python-greeter
H A Dtest-login-new-authtok-qt42 ./src/dbus-env ./src/test-runner login-new-authtok test-qt4-greeter
H A Dtest-login-new-authtok-qt52 ./src/dbus-env ./src/test-runner login-new-authtok test-qt5-greeter
H A Dtest-autologin-new-authtok2 ./src/dbus-env ./src/test-runner autologin-new-authtok test-gobject-greeter

123