/dports/security/pinentry/pinentry-1.1.1/fltk/ |
H A D | pinwindow.cxx | 55 ,passwd_(NULL) ,timeout_(0) in PinWindow() 68 if (NULL != passwd_) in release() 70 memset(passwd_, 0, strlen(passwd_)); in release() 71 secmem_free(passwd_); in release() 73 passwd_ = NULL; in release() 221 self->passwd_ = reinterpret_cast<char*>(secmem_malloc(len)); in ok_cb() 222 if (NULL != self->passwd_) in ok_cb() 223 memcpy(self->passwd_, passwd, len); in ok_cb()
|
H A D | pinwindow.h | 61 char *passwd_; // SECURE_MEMORY variable 69 inline const char* passwd() const { return passwd_; } in passwd()
|
/dports/security/pinentry-curses/pinentry-1.1.1/fltk/ |
H A D | pinwindow.cxx | 55 ,passwd_(NULL) ,timeout_(0) 68 if (NULL != passwd_) 70 memset(passwd_, 0, strlen(passwd_)); 71 secmem_free(passwd_); 73 passwd_ = NULL; 221 self->passwd_ = reinterpret_cast<char*>(secmem_malloc(len)); 222 if (NULL != self->passwd_) 223 memcpy(self->passwd_, passwd, len);
|
H A D | pinwindow.h | 61 char *passwd_; // SECURE_MEMORY variable 69 inline const char* passwd() const { return passwd_; } in passwd()
|
/dports/security/pinentry-fltk/pinentry-1.1.1/fltk/ |
H A D | pinwindow.cxx | 55 ,passwd_(NULL) ,timeout_(0) 68 if (NULL != passwd_) 70 memset(passwd_, 0, strlen(passwd_)); 71 secmem_free(passwd_); 73 passwd_ = NULL; 221 self->passwd_ = reinterpret_cast<char*>(secmem_malloc(len)); 222 if (NULL != self->passwd_) 223 memcpy(self->passwd_, passwd, len);
|
H A D | pinwindow.h | 61 char *passwd_; // SECURE_MEMORY 69 inline const char* passwd() const { return passwd_; }
|
/dports/security/pinentry-tty/pinentry-1.1.1/fltk/ |
H A D | pinwindow.cxx | 55 ,passwd_(NULL) ,timeout_(0) in PinWindow() 68 if (NULL != passwd_) in release() 70 memset(passwd_, 0, strlen(passwd_)); in release() 71 secmem_free(passwd_); in release() 73 passwd_ = NULL; in release() 221 self->passwd_ = reinterpret_cast<char*>(secmem_malloc(len)); in ok_cb() 222 if (NULL != self->passwd_) in ok_cb() 223 memcpy(self->passwd_, passwd, len); in ok_cb()
|
H A D | pinwindow.h | 61 char *passwd_; // SECURE_MEMORY variable 69 inline const char* passwd() const { return passwd_; } in passwd()
|
/dports/security/pinentry-gtk2/pinentry-1.1.1/fltk/ |
H A D | pinwindow.cxx | 55 ,passwd_(NULL) ,timeout_(0) in PinWindow() 68 if (NULL != passwd_) in release() 70 memset(passwd_, 0, strlen(passwd_)); in release() 71 secmem_free(passwd_); in release() 73 passwd_ = NULL; in release() 221 self->passwd_ = reinterpret_cast<char*>(secmem_malloc(len)); in ok_cb() 222 if (NULL != self->passwd_) in ok_cb() 223 memcpy(self->passwd_, passwd, len); in ok_cb()
|
H A D | pinwindow.h | 61 char *passwd_; // SECURE_MEMORY variable 69 inline const char* passwd() const { return passwd_; } in passwd()
|
/dports/security/pinentry-gnome3/pinentry-1.1.1/fltk/ |
H A D | pinwindow.cxx | 55 ,passwd_(NULL) ,timeout_(0) in PinWindow() 68 if (NULL != passwd_) in release() 70 memset(passwd_, 0, strlen(passwd_)); in release() 71 secmem_free(passwd_); in release() 73 passwd_ = NULL; in release() 221 self->passwd_ = reinterpret_cast<char*>(secmem_malloc(len)); in ok_cb() 222 if (NULL != self->passwd_) in ok_cb() 223 memcpy(self->passwd_, passwd, len); in ok_cb()
|
H A D | pinwindow.h | 61 char *passwd_; // SECURE_MEMORY variable 69 inline const char* passwd() const { return passwd_; } in passwd()
|
/dports/security/pinentry-efl/pinentry-1.1.1/fltk/ |
H A D | pinwindow.cxx | 55 ,passwd_(NULL) ,timeout_(0) in PinWindow() 68 if (NULL != passwd_) in release() 70 memset(passwd_, 0, strlen(passwd_)); in release() 71 secmem_free(passwd_); in release() 73 passwd_ = NULL; in release() 221 self->passwd_ = reinterpret_cast<char*>(secmem_malloc(len)); in ok_cb() 222 if (NULL != self->passwd_) in ok_cb() 223 memcpy(self->passwd_, passwd, len); in ok_cb()
|
H A D | pinwindow.h | 61 char *passwd_; // SECURE_MEMORY variable 69 inline const char* passwd() const { return passwd_; } in passwd()
|
/dports/security/pinentry-qt5/pinentry-1.1.1/fltk/ |
H A D | pinwindow.cxx | 55 ,passwd_(NULL) ,timeout_(0) 68 if (NULL != passwd_) 70 memset(passwd_, 0, strlen(passwd_)); 71 secmem_free(passwd_); 73 passwd_ = NULL; 221 self->passwd_ = reinterpret_cast<char*>(secmem_malloc(len)); 222 if (NULL != self->passwd_) 223 memcpy(self->passwd_, passwd, len);
|
H A D | pinwindow.h | 61 char *passwd_; // SECURE_MEMORY 69 inline const char* passwd() const { return passwd_; }
|
/dports/net-mgmt/seafile-gui/seafile-client-7.0.9/src/ui/ |
H A D | create-repo-dialog.cpp | 104 if (!passwd_.isEmpty() && account_.isAtLeastVersion(4, 4, 0)) { in createAction() 112 enc_version, repo_id, passwd_, &magic, &random_key, &salt) < 0) { in createAction() 126 request_ = new CreateRepoRequest(account_, name_, name_, passwd_); in createAction() 174 passwd_ = passwd; in validateInputs() 176 passwd_ = QString::null; in validateInputs() 203 passwd_, in createSuccess()
|
/dports/net-im/kopete/kopete-21.12.3/protocols/jabber/libjingle/talk/examples/login/ |
H A D | xmppauth.cc | 46 passwd_ = pass; in StartPreXmppAuth() 84 return new buzz::SaslPlainMechanism(jid_, passwd_); in CreateSaslMechanism()
|
/dports/sysutils/bareos-server/bareos-Release-20.0.3/core/src/dird/ |
H A D | auth_pam.cc | 36 const std::string& passwd_; member 39 : UA_sock_(UA_sock), passwd_(passwd) in PamData() 160 resp[0].resp = strdup(pam_data->passwd_.c_str()); in PamLocalCallback()
|
/dports/sysutils/bareos18-client/bareos-Release-18.2.12/core/src/dird/ |
H A D | auth_pam.cc | 36 const std::string &passwd_; member 40 , passwd_(passwd) { } in PamData() 147 resp[0].resp = actuallystrdup(pam_data->passwd_.c_str()); in PamLocalCallback()
|
/dports/sysutils/bareos18-traymonitor/bareos-Release-18.2.12/core/src/dird/ |
H A D | auth_pam.cc | 36 const std::string &passwd_; member 40 , passwd_(passwd) { } in PamData() 147 resp[0].resp = actuallystrdup(pam_data->passwd_.c_str()); in PamLocalCallback()
|
/dports/sysutils/bareos19-traymonitor/bareos-Release-19.2.11/core/src/dird/ |
H A D | auth_pam.cc | 36 const std::string& passwd_; member 39 : UA_sock_(UA_sock), passwd_(passwd) in PamData() 160 resp[0].resp = strdup(pam_data->passwd_.c_str()); in PamLocalCallback()
|
/dports/sysutils/bareos19-server/bareos-Release-19.2.11/core/src/dird/ |
H A D | auth_pam.cc | 36 const std::string& passwd_; member 39 : UA_sock_(UA_sock), passwd_(passwd) in PamData() 160 resp[0].resp = strdup(pam_data->passwd_.c_str()); in PamLocalCallback()
|
/dports/sysutils/bareos19-client/bareos-Release-19.2.11/core/src/dird/ |
H A D | auth_pam.cc | 36 const std::string& passwd_; member 39 : UA_sock_(UA_sock), passwd_(passwd) in PamData() 160 resp[0].resp = strdup(pam_data->passwd_.c_str()); in PamLocalCallback()
|
/dports/sysutils/bareos-client/bareos-Release-20.0.3/core/src/dird/ |
H A D | auth_pam.cc | 36 const std::string& passwd_; member 39 : UA_sock_(UA_sock), passwd_(passwd) in PamData() 160 resp[0].resp = strdup(pam_data->passwd_.c_str()); in PamLocalCallback()
|