Searched refs:PAM_MAX_RESP_SIZE (Results 1 – 17 of 17) sorted by relevance
/dports/security/pam_krb5/pam-krb5-4.9/tests/module/ |
H A D | long-t.c | 32 password = bcalloc_type(PAM_MAX_RESP_SIZE + 1, char); in main() 33 memset(password, 'a', PAM_MAX_RESP_SIZE); in main()
|
H A D | password-t.c | 71 newpass = bcalloc_type(PAM_MAX_RESP_SIZE + 1, char); in trace_event_set_vcpu_state_dynamic() 72 memset(newpass, 'a', PAM_MAX_RESP_SIZE);
|
/dports/security/pam_krb5/pam-krb5-4.9/portable/ |
H A D | pam.h | 87 #ifndef PAM_MAX_RESP_SIZE 88 # define PAM_MAX_RESP_SIZE 512 macro
|
/dports/x11/xdm/xdm-1.1.12/greeter/ |
H A D | Login.h | 162 # define NAME_LEN PAM_MAX_RESP_SIZE 163 # define PASSWORD_LEN PAM_MAX_RESP_SIZE
|
/dports/security/pam_krb5/pam-krb5-4.9/module/ |
H A D | password.c | 50 if (strlen(tmp) > PAM_MAX_RESP_SIZE - 1) { in pamk5_password_prompt() 52 PAM_MAX_RESP_SIZE - 1); in pamk5_password_prompt() 67 if (strlen(pass1) > PAM_MAX_RESP_SIZE - 1) { in pamk5_password_prompt() 69 PAM_MAX_RESP_SIZE - 1); in pamk5_password_prompt()
|
H A D | auth.c | 249 if (*pass != NULL && strlen(*pass) > PAM_MAX_RESP_SIZE - 1) { in maybe_retrieve_password() 251 PAM_MAX_RESP_SIZE - 1); in maybe_retrieve_password() 295 if (strlen(password) > PAM_MAX_RESP_SIZE - 1) { in prompt_password() 297 PAM_MAX_RESP_SIZE - 1); in prompt_password()
|
/dports/security/doas/doas-6.3p6/compat/ |
H A D | pm_pam_conv.c | 70 char input[PAM_MAX_RESP_SIZE + 1]; in getinput() 89 if (i < PAM_MAX_RESP_SIZE) { in getinput()
|
/dports/ftp/wzdftpd/wzdftpd-0.8.3/libwzd-auth/ |
H A D | wzd_pam.c | 193 r->resp = (char*)malloc(PAM_MAX_RESP_SIZE); in su_conv() 194 fgets(r->resp, PAM_MAX_RESP_SIZE-1, stdin); in su_conv()
|
/dports/ftp/wzdftpd/wzdftpd-0.8.3/backends/pam/ |
H A D | libpam_main.c | 97 r->resp = (char *)malloc(PAM_MAX_RESP_SIZE); in su_conv() 98 fgets(r->resp, PAM_MAX_RESP_SIZE-1, stdin); in su_conv()
|
/dports/sysutils/heirloom/heirloom-070715/su/ |
H A D | su.c | 64 #define PAM_MAX_RESP_SIZE 512 macro 332 rsp = smalloc(PAM_MAX_RESP_SIZE + 1); in ask() 334 if (i < PAM_MAX_RESP_SIZE) in ask()
|
/dports/security/duo/duo_unix-1.11.4/tests/ |
H A D | testpam.c | 28 char buf[PAM_MAX_RESP_SIZE]; in my_conv()
|
/dports/security/sudo/sudo-1.9.8p2/plugins/sudoers/auth/ |
H A D | pam.c | 721 if (strlen(pass) >= PAM_MAX_RESP_SIZE) { in converse() 723 "password longer than %d", PAM_MAX_RESP_SIZE); in converse()
|
/dports/sysutils/polkit/polkit-0.120/src/polkitagent/ |
H A D | polkitagenthelper-pam.c | 243 char buf[PAM_MAX_RESP_SIZE]; in conversation_function()
|
/dports/security/openssh-portable/openssh-8.8p1/ |
H A D | auth-pam.c | 692 #if defined(PAM_SUN_CODEBASE) && defined(PAM_MAX_RESP_SIZE) in sshpam_init() 694 if (strlen(user) >= PAM_MAX_RESP_SIZE) in sshpam_init()
|
/dports/security/pam_krb5/pam-krb5-4.9/docs/ |
H A D | pam_krb5.pod | 49 Passwords as long or longer than PAM_MAX_RESP_SIZE octets (normally 512 131 Passwords as long or longer than PAM_MAX_RESP_SIZE octets (normally 512
|
/dports/x11/gdm/gdm-3.28.4/daemon/ |
H A D | gdm-session-worker.c | 948 *response = strndup (user_answer, PAM_MAX_RESP_SIZE - 1); in gdm_session_worker_process_pam_message()
|
/dports/security/pam_krb5/pam-krb5-4.9/ |
H A D | NEWS | 12 Reject passwords as long or longer than PAM_MAX_RESP_SIZE (normally
|