Home
last modified time | relevance | path

Searched refs:PAM_MAX_RESP_SIZE (Results 1 – 17 of 17) sorted by relevance

/dports/security/pam_krb5/pam-krb5-4.9/tests/module/
H A Dlong-t.c32 password = bcalloc_type(PAM_MAX_RESP_SIZE + 1, char); in main()
33 memset(password, 'a', PAM_MAX_RESP_SIZE); in main()
H A Dpassword-t.c71 newpass = bcalloc_type(PAM_MAX_RESP_SIZE + 1, char); in trace_event_set_vcpu_state_dynamic()
72 memset(newpass, 'a', PAM_MAX_RESP_SIZE);
/dports/security/pam_krb5/pam-krb5-4.9/portable/
H A Dpam.h87 #ifndef PAM_MAX_RESP_SIZE
88 # define PAM_MAX_RESP_SIZE 512 macro
/dports/x11/xdm/xdm-1.1.12/greeter/
H A DLogin.h162 # define NAME_LEN PAM_MAX_RESP_SIZE
163 # define PASSWORD_LEN PAM_MAX_RESP_SIZE
/dports/security/pam_krb5/pam-krb5-4.9/module/
H A Dpassword.c50 if (strlen(tmp) > PAM_MAX_RESP_SIZE - 1) { in pamk5_password_prompt()
52 PAM_MAX_RESP_SIZE - 1); in pamk5_password_prompt()
67 if (strlen(pass1) > PAM_MAX_RESP_SIZE - 1) { in pamk5_password_prompt()
69 PAM_MAX_RESP_SIZE - 1); in pamk5_password_prompt()
H A Dauth.c249 if (*pass != NULL && strlen(*pass) > PAM_MAX_RESP_SIZE - 1) { in maybe_retrieve_password()
251 PAM_MAX_RESP_SIZE - 1); in maybe_retrieve_password()
295 if (strlen(password) > PAM_MAX_RESP_SIZE - 1) { in prompt_password()
297 PAM_MAX_RESP_SIZE - 1); in prompt_password()
/dports/security/doas/doas-6.3p6/compat/
H A Dpm_pam_conv.c70 char input[PAM_MAX_RESP_SIZE + 1]; in getinput()
89 if (i < PAM_MAX_RESP_SIZE) { in getinput()
/dports/ftp/wzdftpd/wzdftpd-0.8.3/libwzd-auth/
H A Dwzd_pam.c193 r->resp = (char*)malloc(PAM_MAX_RESP_SIZE); in su_conv()
194 fgets(r->resp, PAM_MAX_RESP_SIZE-1, stdin); in su_conv()
/dports/ftp/wzdftpd/wzdftpd-0.8.3/backends/pam/
H A Dlibpam_main.c97 r->resp = (char *)malloc(PAM_MAX_RESP_SIZE); in su_conv()
98 fgets(r->resp, PAM_MAX_RESP_SIZE-1, stdin); in su_conv()
/dports/sysutils/heirloom/heirloom-070715/su/
H A Dsu.c64 #define PAM_MAX_RESP_SIZE 512 macro
332 rsp = smalloc(PAM_MAX_RESP_SIZE + 1); in ask()
334 if (i < PAM_MAX_RESP_SIZE) in ask()
/dports/security/duo/duo_unix-1.11.4/tests/
H A Dtestpam.c28 char buf[PAM_MAX_RESP_SIZE]; in my_conv()
/dports/security/sudo/sudo-1.9.8p2/plugins/sudoers/auth/
H A Dpam.c721 if (strlen(pass) >= PAM_MAX_RESP_SIZE) { in converse()
723 "password longer than %d", PAM_MAX_RESP_SIZE); in converse()
/dports/sysutils/polkit/polkit-0.120/src/polkitagent/
H A Dpolkitagenthelper-pam.c243 char buf[PAM_MAX_RESP_SIZE]; in conversation_function()
/dports/security/openssh-portable/openssh-8.8p1/
H A Dauth-pam.c692 #if defined(PAM_SUN_CODEBASE) && defined(PAM_MAX_RESP_SIZE) in sshpam_init()
694 if (strlen(user) >= PAM_MAX_RESP_SIZE) in sshpam_init()
/dports/security/pam_krb5/pam-krb5-4.9/docs/
H A Dpam_krb5.pod49 Passwords as long or longer than PAM_MAX_RESP_SIZE octets (normally 512
131 Passwords as long or longer than PAM_MAX_RESP_SIZE octets (normally 512
/dports/x11/gdm/gdm-3.28.4/daemon/
H A Dgdm-session-worker.c948 *response = strndup (user_answer, PAM_MAX_RESP_SIZE - 1); in gdm_session_worker_process_pam_message()
/dports/security/pam_krb5/pam-krb5-4.9/
H A DNEWS12 Reject passwords as long or longer than PAM_MAX_RESP_SIZE (normally