/dports/security/pear-Auth/Auth-1.6.4/Auth/Container/ |
H A D | SMBPasswd.php | 72 var $pwfile; variable in Auth_Container_SMBPasswd 86 $this->pwfile = new File_SMBPasswd($filename,0); 88 if (!$this->pwfile->load()) { 108 return $this->pwfile->verifyAccount($username, $password); 117 return $this->pwfile->getAccounts(); 135 $res = $this->pwfile->addUser($user, $additional['userid'], $pass); 137 return $this->pwfile->save(); 153 $res = $this->pwfile->delUser($username); 155 return $this->pwfile->save(); 172 $res = $this->pwfile->modUser($username, '', $password); [all …]
|
/dports/sysutils/py-salt/salt-3004.1/salt/modules/ |
H A D | webutil.py | 33 def useradd(pwfile, user, password, opts="", runas=None): argument 66 if not os.path.exists(pwfile): 69 cmd = ["htpasswd", "-b{}".format(opts), pwfile, user, password] 73 def userdel(pwfile, user, runas=None, all_results=False): argument 95 if not os.path.exists(pwfile): 98 cmd = ["htpasswd", "-D", pwfile, user] 108 def verify(pwfile, user, password, opts="", runas=None): argument 140 if not os.path.exists(pwfile): 143 cmd = ["htpasswd", "-bv{}".format(opts), pwfile, user, password]
|
/dports/security/p5-Authen-Htpasswd/Authen-Htpasswd-0.171/ |
H A D | README | 8 if ($pwfile->check_user_password('bob', 'foo')) { ... } 11 $pwfile->update_user('bob', $password, $info); 12 $pwfile->add_user('jim', $password); 13 $pwfile->delete_user('jim'); 16 my $user = $pwfile->lookup_user('bob'); 51 my $userobj = $pwfile->lookup_user($username); 57 my @users = $pwfile->all_users; 66 $pwfile->update_user($userobj); 74 $pwfile->add_user($userobj); 82 $pwfile->delete_user($userobj); [all …]
|
/dports/www/firefox-legacy/firefox-52.8.0esr/build/pgo/ |
H A D | genpgocert.py | 71 with NamedTemporaryFile() as pwfile, NamedTemporaryFile() as rndfile: 75 pwfile.write("\n") 78 status = runUtil(certutil, ["-N", "-d", tempDbDir, "-f", pwfile.name]) 87 …il, ["-L", "-d", tempDbDir, "-n", "pgo temporary ca", "-a", "-o", pgoCAPathSrc, "-f", pwfile.name]) 91 …oCAModulePathSrc, "-n", "pgo temporary ca", "-d", tempDbDir, "-w", pwfile.name, "-k", pwfile.name]) 103 with NamedTemporaryFile() as pwfile, NamedTemporaryFile() as rndfile: 106 pwfile.write("\n") 113 status = runUtil(certutil, ["-N", "-d", srcDir, "-f", pwfile.name]) 117 … status = runUtil(pk12util, ["-i", pgoCAPath, "-w", pwfile.name, "-d", srcDir, "-k", pwfile.name]) 155 …tutil, ["-D", "-n", "pgo server certificate", "-d", srcDir, "-z", rndfile.name, "-f", pwfile.name]) [all …]
|
/dports/net/mosquitto/mosquitto-2.0.13/test/random/ |
H A D | random.conf | 7 password_file pwfile 13 password_file pwfile 27 password_file pwfile 39 password_file pwfile 49 password_file pwfile 57 password_file pwfile 73 password_file pwfile 87 password_file pwfile
|
/dports/www/domoticz/domoticz-2020.2/extern/mosquitto/test/random/ |
H A D | random.conf | 7 password_file pwfile 13 password_file pwfile 27 password_file pwfile 39 password_file pwfile 49 password_file pwfile 57 password_file pwfile 73 password_file pwfile 87 password_file pwfile
|
/dports/www/htdigest/httpd-2.4.6/modules/aaa/ |
H A D | mod_authn_file.c | 32 char *pwfile; member 44 conf->pwfile = NULL; /* just to illustrate the default really */ in create_authn_file_dir_config() 51 (void *)APR_OFFSETOF(authn_file_config_rec, pwfile), 68 if (!conf->pwfile) { in check_password() 74 status = ap_pcfg_openfile(&f, r->pool, conf->pwfile); in check_password() 78 "Could not open password file: %s", conf->pwfile); in check_password() 123 if (!conf->pwfile) { in get_realm_hash() 129 status = ap_pcfg_openfile(&f, r->pool, conf->pwfile); in get_realm_hash() 133 "Could not open password file: %s", conf->pwfile); in get_realm_hash()
|
H A D | mod_authn_dbm.c | 48 const char *pwfile; member 56 conf->pwfile = NULL; in create_authn_dbm_dir_config() 75 (void *)APR_OFFSETOF(authn_dbm_config_rec, pwfile), 127 rv = fetch_dbm_value(conf->dbmtype, conf->pwfile, user, &dbm_password, in check_dbm_pw() 133 conf->dbmtype, conf->pwfile); in check_dbm_pw() 165 rv = fetch_dbm_value(conf->dbmtype, conf->pwfile, in get_dbm_realm_hash() 172 conf->dbmtype, conf->pwfile); in get_dbm_realm_hash()
|
/dports/www/apache24/httpd-2.4.53/modules/aaa/ |
H A D | mod_authn_file.c | 32 char *pwfile; member 44 conf->pwfile = NULL; /* just to illustrate the default really */ in create_authn_file_dir_config() 51 (void *)APR_OFFSETOF(authn_file_config_rec, pwfile), 68 if (!conf->pwfile) { in check_password() 74 status = ap_pcfg_openfile(&f, r->pool, conf->pwfile); in check_password() 78 "Could not open password file: %s", conf->pwfile); in check_password() 123 if (!conf->pwfile) { in get_realm_hash() 129 status = ap_pcfg_openfile(&f, r->pool, conf->pwfile); in get_realm_hash() 133 "Could not open password file: %s", conf->pwfile); in get_realm_hash()
|
/dports/sysutils/py-salt/salt-3004.1/salt/auth/ |
H A D | file.py | 165 with salt.utils.files.fopen(filename, "r") as pwfile: 166 for line in pwfile.readlines(): 209 pwfile = HtpasswdFile(kwargs["filename"]) 213 return pwfile.verify(username, password) 215 return pwfile.check_password(username, password) 233 pwfile = HtdigestFile(kwargs["filename"]) 237 return pwfile.verify(username, realm, password) 239 return pwfile.check_password(username, realm, password)
|
/dports/databases/memcached/memcached-1.6.12/ |
H A D | authfile.c | 36 FILE *pwfile = fopen(file, "r"); in authfile_load() local 37 if (pwfile == NULL) { in authfile_load() 39 } else if (fstat(fileno(pwfile), &sb)) { in authfile_load() 40 fclose(pwfile); in authfile_load() 51 …cur, auth_end - auth_cur < MAX_ENTRY_LEN ? auth_end - auth_cur : MAX_ENTRY_LEN, pwfile)) != NULL) { in authfile_load() 79 (void)fclose(pwfile); in authfile_load() 106 (void)fclose(pwfile); in authfile_load()
|
/dports/net/openldap24-server/openldap-2.4.59/servers/slapd/ |
H A D | slappasswd.c | 108 char *pwfile = NULL; in slappasswd() local 134 if ( pwfile != NULL ) { in slappasswd() 169 if ( pwfile != NULL ) { in slappasswd() 188 if ( pwfile != NULL ) { in slappasswd() 197 pwfile = optarg; in slappasswd() 233 if( pwfile != NULL ) { in slappasswd() 234 if( lutil_get_filed_password( pwfile, &passwd )) { in slappasswd()
|
/dports/net/openldap24-client/openldap-2.4.59/servers/slapd/ |
H A D | slappasswd.c | 108 char *pwfile = NULL; in slappasswd() local 134 if ( pwfile != NULL ) { in slappasswd() 169 if ( pwfile != NULL ) { in slappasswd() 188 if ( pwfile != NULL ) { in slappasswd() 197 pwfile = optarg; in slappasswd() 233 if( pwfile != NULL ) { in slappasswd() 234 if( lutil_get_filed_password( pwfile, &passwd )) { in slappasswd()
|
/dports/biology/sra-tools/sra-tools-2.11.0/ncbi-vdb/libs/kfs/ |
H A D | manager.c | 226 const KFile * pwfile; in KFSManagerOpenFileRead() local 232 rc = KFileMakeFDFileRead (&pwfile, atoi (obuff)); in KFSManagerOpenFileRead() 238 rc = KFileRead (pwfile, 0, obuff, sizeof obuff, &z); in KFSManagerOpenFileRead() 240 KFileRelease (pwfile); in KFSManagerOpenFileRead() 354 const KFile * pwfile; in KFSManagerOpenFileWrite() local 360 rc = KFileMakeFDFileRead (&pwfile, atoi (obuff)); in KFSManagerOpenFileWrite() 366 rc = KFileRead (pwfile, 0, obuff, sizeof obuff, &z); in KFSManagerOpenFileWrite() 368 KFileRelease (pwfile); in KFSManagerOpenFileWrite() 481 const KFile * pwfile; in KFSManagerCreateFile() local 487 rc = KFileMakeFDFileRead (&pwfile, atoi (obuff)); in KFSManagerCreateFile() [all …]
|
/dports/biology/ncbi-vdb/ncbi-vdb-2.11.0/libs/kfs/ |
H A D | manager.c | 226 const KFile * pwfile; in KFSManagerOpenFileRead() local 232 rc = KFileMakeFDFileRead (&pwfile, atoi (obuff)); in KFSManagerOpenFileRead() 238 rc = KFileRead (pwfile, 0, obuff, sizeof obuff, &z); in KFSManagerOpenFileRead() 240 KFileRelease (pwfile); in KFSManagerOpenFileRead() 354 const KFile * pwfile; in KFSManagerOpenFileWrite() local 360 rc = KFileMakeFDFileRead (&pwfile, atoi (obuff)); in KFSManagerOpenFileWrite() 366 rc = KFileRead (pwfile, 0, obuff, sizeof obuff, &z); in KFSManagerOpenFileWrite() 368 KFileRelease (pwfile); in KFSManagerOpenFileWrite() 481 const KFile * pwfile; in KFSManagerCreateFile() local 487 rc = KFileMakeFDFileRead (&pwfile, atoi (obuff)); in KFSManagerCreateFile() [all …]
|
/dports/mail/avenger/avenger-0.8.5/util/ |
H A D | macutil.c | 90 getmacpw (FILE *pwfile, const char *aux) in getmacpw() argument 97 if (!fgets (pwbuf, sizeof (pwbuf), pwfile)) in getmacpw() 197 pw = getmacpw (pwfile, auxsrc); in do_check() 237 FILE *pwfile = fopen (opt_pwfile, "r"); in firstpw() local 238 if (!pwfile) { in firstpw() 242 ret = getmacpw (pwfile, opt_aux); in firstpw() 243 fclose (pwfile); in firstpw() 362 FILE *pwfile; in main() local 439 pwfile = fopen (opt_pwfile, "r"); in main() 440 if (!pwfile) { in main() [all …]
|
H A D | omacutil.c | 96 getmacpw (FILE *pwfile) in getmacpw() argument 216 pw = getmacpw (pwfile); in do_check() 252 FILE *pwfile = fopen (opt_pwfile, "r"); in firstpw() local 253 if (!pwfile) { in firstpw() 257 ret = getmacpw (pwfile); in firstpw() 258 fclose (pwfile); in firstpw() 376 FILE *pwfile; in main() local 450 pwfile = fopen (opt_pwfile, "r"); in main() 451 if (!pwfile) { in main() 460 char *pw = getmacpw (pwfile); in main() [all …]
|
/dports/net/openldap25-client/openldap-2.5.9/servers/slapd/ |
H A D | slappasswd.c | 118 char *pwfile = NULL; in slappasswd() local 144 if ( pwfile != NULL ) { in slappasswd() 179 if ( pwfile != NULL ) { in slappasswd() 198 if ( pwfile != NULL ) { in slappasswd() 207 pwfile = optarg; in slappasswd() 244 if( pwfile != NULL ) { in slappasswd() 245 if( lutil_get_filed_password( pwfile, &passwd )) { in slappasswd()
|
/dports/net/openldap25-server/openldap-2.5.9/servers/slapd/ |
H A D | slappasswd.c | 118 char *pwfile = NULL; in slappasswd() local 144 if ( pwfile != NULL ) { in slappasswd() 179 if ( pwfile != NULL ) { in slappasswd() 198 if ( pwfile != NULL ) { in slappasswd() 207 pwfile = optarg; in slappasswd() 244 if( pwfile != NULL ) { in slappasswd() 245 if( lutil_get_filed_password( pwfile, &passwd )) { in slappasswd()
|
/dports/net/openldap26-server/openldap-2.6.0/servers/slapd/ |
H A D | slappasswd.c | 118 char *pwfile = NULL; in slappasswd() local 144 if ( pwfile != NULL ) { in slappasswd() 179 if ( pwfile != NULL ) { in slappasswd() 198 if ( pwfile != NULL ) { in slappasswd() 207 pwfile = optarg; in slappasswd() 244 if( pwfile != NULL ) { in slappasswd() 245 if( lutil_get_filed_password( pwfile, &passwd )) { in slappasswd()
|
/dports/net/openldap26-client/openldap-2.6.0/servers/slapd/ |
H A D | slappasswd.c | 118 char *pwfile = NULL; in slappasswd() local 144 if ( pwfile != NULL ) { in slappasswd() 179 if ( pwfile != NULL ) { in slappasswd() 198 if ( pwfile != NULL ) { in slappasswd() 207 pwfile = optarg; in slappasswd() 244 if( pwfile != NULL ) { in slappasswd() 245 if( lutil_get_filed_password( pwfile, &passwd )) { in slappasswd()
|
/dports/java/openjdk8/jdk8u-jdk8u312-b07.1/jdk/test/com/sun/security/sasl/ |
H A D | Cram.java | 45 private static String pwfile, namesfile; field in Cram 49 pwfile = "pw.properties"; in main() 59 pwfile = args[i++]; in main() 65 pwfile = "pw.properties"; in main() 73 new PropertiesFileCallbackHandler(pwfile, namesfile, null); in main()
|
/dports/java/openjdk8-jre/jdk8u-jdk8u312-b07.1/jdk/test/com/sun/security/sasl/ |
H A D | Cram.java | 45 private static String pwfile, namesfile; field in Cram 49 pwfile = "pw.properties"; in main() 59 pwfile = args[i++]; in main() 65 pwfile = "pw.properties"; in main() 73 new PropertiesFileCallbackHandler(pwfile, namesfile, null); in main()
|
/dports/java/openjdk11/jdk11u-jdk-11.0.13-8-1/test/jdk/com/sun/security/sasl/ |
H A D | Cram.java | 47 private static String pwfile, namesfile; field in Cram 51 pwfile = "pw.properties"; in main() 61 pwfile = args[i++]; in main() 67 pwfile = "pw.properties"; in main() 75 new PropertiesFileCallbackHandler(pwfile, namesfile, null); in main()
|
/dports/java/openjdk12/openjdk-jdk12u-jdk-12.0.2-10-4/test/jdk/com/sun/security/sasl/ |
H A D | Cram.java | 47 private static String pwfile, namesfile; field in Cram 51 pwfile = "pw.properties"; in main() 61 pwfile = args[i++]; in main() 67 pwfile = "pw.properties"; in main() 75 new PropertiesFileCallbackHandler(pwfile, namesfile, null); in main()
|