/dports/security/sudo/sudo-1.9.8p2/plugins/sudoers/auth/ |
H A D | secureware.c | 73 char *epass = NULL; in sudo_secureware_verify() local 82 epass = dispcrypt(pass, pw_epasswd, crypt_type); in sudo_secureware_verify() 85 epass = bigcrypt(pass, pw_epasswd); in sudo_secureware_verify() 87 epass = crypt(pass, pw_epasswd); in sudo_secureware_verify() 90 epass = bigcrypt(pass, pw_epasswd); in sudo_secureware_verify() 93 if (epass != NULL && strcmp(pw_epasswd, epass) == 0) in sudo_secureware_verify()
|
H A D | passwd.c | 62 char sav, *epass; in sudo_passwd_verify() local 86 epass = (char *) crypt(pass, pw_epasswd); in sudo_passwd_verify() 88 if (epass != NULL) { in sudo_passwd_verify() 89 if (HAS_AGEINFO(pw_epasswd, pw_len) && strlen(epass) == DESLEN) in sudo_passwd_verify() 90 matched = !strncmp(pw_epasswd, epass, DESLEN); in sudo_passwd_verify() 92 matched = !strcmp(pw_epasswd, epass); in sudo_passwd_verify()
|
/dports/security/p5-Crypt-Imail/Imail/ |
H A D | Imail.pm | 13 my ($user, $epass) = @_; 20 my @epass = ($epass =~ /(..)/g); 27 @pass = map $data{$_} + $key[$counter++], @epass; 44 my @epass = map {($apass[$_] + $offset) - $key[$_]} (0..$#apass); 48 join '', map $data{$_}, @epass;
|
/dports/net/xrdp-devel/xrdp-0.9.16/sesman/ |
H A D | verify_user.c | 59 const char *epass; in auth_userpass() local 93 epass = crypt(pass, encr); in auth_userpass() 94 if (epass == 0) in auth_userpass() 98 return (strcmp(encr, epass) == 0); in auth_userpass()
|
/dports/x11-drivers/xorgxrdp/xrdp-0.9.17/sesman/ |
H A D | verify_user.c | 59 const char *epass; in auth_userpass() local 93 epass = crypt(pass, encr); in auth_userpass() 94 if (epass == 0) in auth_userpass() 98 return (strcmp(encr, epass) == 0); in auth_userpass()
|
/dports/www/twiki/twiki/lib/TWiki/Users/ |
H A D | ApacheHtpasswdUser.pm | 174 my $epass = $this->fetchPass( $login ); 175 $salt = substr( $epass, 0, 2 ) if ( $epass );
|
/dports/www/mod_auth_xradius/mod_auth_xradius-0.4.6/src/ |
H A D | xradius_cache.c | 174 const char* epass; in xrad_cache_dbm_check() local 212 epass = dbmval.dptr+sizeof(apr_time_t)+sizeof(char); in xrad_cache_dbm_check() 217 password, epass); in xrad_cache_dbm_check() 220 if (strcmp(password, epass) == 0) { in xrad_cache_dbm_check() 228 if (strcmp(password, epass) == 0) { in xrad_cache_dbm_check()
|
/dports/lang/php73/php-7.3.33/ext/filter/tests/ |
H A D | bug81122.phpt | 11 "https://user:\\epass@test.com",
|
/dports/www/mod_php81/php-8.1.1/ext/filter/tests/ |
H A D | bug81122.phpt | 11 "https://user:\\epass@test.com",
|
/dports/lang/php81/php-8.1.1/ext/filter/tests/ |
H A D | bug81122.phpt | 11 "https://user:\\epass@test.com",
|
/dports/lang/php80/php-8.0.15/ext/filter/tests/ |
H A D | bug81122.phpt | 11 "https://user:\\epass@test.com",
|
/dports/lang/php74/php-7.4.27/ext/filter/tests/ |
H A D | bug81122.phpt | 11 "https://user:\\epass@test.com",
|
/dports/security/php80-filter/php-8.0.15/ext/filter/tests/ |
H A D | bug81122.phpt | 11 "https://user:\\epass@test.com",
|
/dports/security/php73-filter/php-7.3.33/ext/filter/tests/ |
H A D | bug81122.phpt | 11 "https://user:\\epass@test.com",
|
/dports/security/php74-filter/php-7.4.27/ext/filter/tests/ |
H A D | bug81122.phpt | 11 "https://user:\\epass@test.com",
|
/dports/security/php81-filter/php-8.1.1/ext/filter/tests/ |
H A D | bug81122.phpt | 11 "https://user:\\epass@test.com",
|
/dports/www/mod_php73/php-7.3.33/ext/filter/tests/ |
H A D | bug81122.phpt | 11 "https://user:\\epass@test.com",
|
/dports/www/mod_php74/php-7.4.27/ext/filter/tests/ |
H A D | bug81122.phpt | 11 "https://user:\\epass@test.com",
|
/dports/www/mod_php80/php-8.0.15/ext/filter/tests/ |
H A D | bug81122.phpt | 11 "https://user:\\epass@test.com",
|
/dports/mail/qpopper/qpopper4.1.0/password/ |
H A D | README | 42 epass 106/tcp poppassd 45 epass stream tcp nowait root /usr/sbin/tcpd in.epassd -p -s
|
/dports/net-im/jabberd/jabberd-2.7.0/storage/ |
H A D | authreg_mysql.c | 226 …char euser[MYSQL_LU*2+1], erealm[MYSQL_LR*2+1], epass[513], sql[1024+MYSQL_LU*2+MYSQL_LR*2+512+1];… in _ar_mysql_set_password() local 261 mysql_real_escape_string(conn, epass, password, strlen(password)); in _ar_mysql_set_password() 263 sprintf(sql, ctx->sql_setpassword, epass, euser, erealm); in _ar_mysql_set_password()
|
H A D | authreg_pgsql.c | 290 …char euser[PGSQL_LU*2+1], erealm[PGSQL_LR*2+1], epass[513], sql[1024+PGSQL_LU*2+PGSQL_LR*2+512+1];… in _ar_pgsql_set_password() local 319 PQescapeString(epass, password, strlen(password)); in _ar_pgsql_set_password() 321 sprintf(sql, ctx->sql_setpassword, epass, euser, erealm); in _ar_pgsql_set_password()
|
/dports/net-im/p5-DJabberd/DJabberd-0.85/lib/DJabberd/ |
H A D | IQ.pm | 427 my $epass = exml($password); 431 <password>$epass</password>
|
/dports/irc/bitlbee-discord/bitlbee-discord-0.4.3-7-g607f988/src/ |
H A D | discord-http.c | 624 gchar *epass = discord_escape_string(acc->pass); in discord_http_login() local 629 epass); in discord_http_login() 645 g_free(epass); in discord_http_login()
|
/dports/x11-fonts/wqy/wqy-fonts-20100803_10,1/wqy-zenhei/ |
H A D | AUTHORS | 276 2 epass
|