/external/openssh/ |
D | md5crypt.c | 53 static char passwd[120], salt_copy[9], *p; in md5_crypt() local 112 snprintf(passwd, sizeof(passwd), "%s%s$", magic, salt_copy); in md5_crypt() 142 p = passwd + strlen(passwd); in md5_crypt() 145 strlcat(passwd, to64(l, 4), sizeof(passwd)); in md5_crypt() 147 strlcat(passwd, to64(l, 4), sizeof(passwd)); in md5_crypt() 149 strlcat(passwd, to64(l, 4), sizeof(passwd)); in md5_crypt() 151 strlcat(passwd, to64(l, 4), sizeof(passwd)); in md5_crypt() 153 strlcat(passwd, to64(l, 4), sizeof(passwd)); in md5_crypt() 155 strlcat(passwd, to64(l, 2), sizeof(passwd)); in md5_crypt() 164 return (passwd); in md5_crypt()
|
D | auth.h | 63 struct passwd *pw; /* set if 'valid' */ 116 auth_rhosts2(struct passwd *, const char *, const char *, const char *); 120 int hostbased_key_allowed(struct passwd *, const char *, char *, Key *); 121 int user_key_allowed(struct passwd *, Key *, int); 177 int allowed_user(struct passwd *); 178 struct passwd * getpwnamallow(const char *user); 180 char *expand_authorized_keys(const char *, struct passwd *pw); 181 char *authorized_principals_file(struct passwd *); 183 FILE *auth_openkeyfile(const char *, struct passwd *, int); 184 FILE *auth_openprincipals(const char *, struct passwd *, int); [all …]
|
D | auth.c | 84 extern struct passwd *privsep_pw; 100 allowed_user(struct passwd * pw) in allowed_user() 104 const char *hostname = NULL, *ipaddr = NULL, *passwd = NULL; in allowed_user() local 125 passwd = pw->pw_passwd; in allowed_user() 129 passwd = get_iaf_password(pw); in allowed_user() 131 passwd = spw->sp_pwdp; in allowed_user() 136 if (!options.use_pam && passwd && *passwd) { in allowed_user() 140 if (strcmp(passwd, LOCKED_PASSWD_STRING) == 0) in allowed_user() 144 if (strncmp(passwd, LOCKED_PASSWD_PREFIX, in allowed_user() 149 if (strstr(passwd, LOCKED_PASSWD_SUBSTR)) in allowed_user() [all …]
|
/external/one-true-awk/testdir/ |
D | T.redir | 5 $awk '{ print >"foo" }' /etc/passwd 6 diff foo /etc/passwd || echo 'BAD: T.redir (print >"foo")' 9 $awk '{ print >>"foo" }' /etc/passwd 10 diff foo /etc/passwd || echo 'BAD: T.redir (print >>"foo")' 14 NR%2 == 0 { print >"foo" }' /etc/passwd 15 diff foo /etc/passwd || echo 'BAD: T.redir (print > and >>"foo")' 18 $awk '{ print | "cat >foo" }' /etc/passwd 19 diff foo /etc/passwd || echo 'BAD: T.redir (print | "cat >foo")' 31 $awk '{ print >"/dev/stderr" }' /etc/passwd 1>foo1 2>foo2 32 diff foo2 /etc/passwd || echo 'BAD: T.redir (print >"/dev/stderr")' [all …]
|
D | T.getline | 27 while (getline <"/etc/passwd") 32 cmp -s /etc/passwd foo || echo 'BAD: T.getline (getline <file)' 34 cat /etc/passwd | $awk ' 41 cmp -s /etc/passwd foo || echo 'BAD: T.getline (getline <"-")' 49 ' /etc/passwd >foo 50 cmp -s /etc/passwd foo || echo 'BAD: T.getline (getline <arg)' 58 ' /etc/passwd >foo 59 cmp -s /etc/passwd foo || echo 'BAD: T.getline (getline x <arg)' 67 ' /etc/passwd >foo 68 cmp -s /etc/passwd foo || echo 'BAD: T.getline (cat arg | getline)' [all …]
|
D | T.-f-f | 14 echo '/a/' | $awk -f - /etc/passwd >foo1 15 $awk '/a/' /etc/passwd >foo2 19 cp /etc/passwd foo1 23 $awk -f foo2 -f foo3 -f foo4 /etc/passwd >foo5 34 $awk -f foo2 -f foo3 -f foo4 /etc/passwd >foo5 2>foo6
|
/external/ltp/ |
D | IDcheck.sh | 39 passwd="$DESTDIR/etc/passwd" 70 for i in "$passwd" "$group"; do 77 fe bin "$passwd"; NO_BIN_ID=$? 78 fe daemon "$passwd"; NO_DAEMON_ID=$? 79 fe nobody "$passwd"; NO_NOBODY_ID=$? 93 echo "Password file: $passwd" 109 if ! touch "$group" "$passwd" 2>/dev/null; then 110 echo "Failed to touch $group or $passwd" 125 if ! fe "$name" "$passwd" && [ $no_id -ne 0 ] ; then 126 echo "${name}:x:${id}:${id}:${name}::" >> "$passwd" [all …]
|
/external/openssh/openbsd-compat/ |
D | xcrypt.c | 75 struct passwd *pw; in pick_salt() 76 char *passwd, *p; in pick_salt() local 85 passwd = shadow_pw(pw); in pick_salt() 86 if (passwd[0] == '$' && (p = strrchr(passwd+1, '$')) != NULL) { in pick_salt() 87 typelen = p - passwd + 1; in pick_salt() 88 strlcpy(salt, passwd, MIN(typelen, sizeof(salt))); in pick_salt() 89 explicit_bzero(passwd, strlen(passwd)); in pick_salt() 135 shadow_pw(struct passwd *pw) in shadow_pw()
|
/external/scrypt/patches/ |
D | use_openssl_pbkdf2.patch | 17 @@ -256,7 +260,11 @@ crypto_scrypt(const uint8_t * passwd, size_t passwdlen, 22 + PKCS5_PBKDF2_HMAC((const char *)passwd, passwdlen, salt, saltlen, 1, EVP_sha256(), p * 128 * r, B… 24 PBKDF2_SHA256(passwd, passwdlen, salt, saltlen, 1, B, p * 128 * r); 29 @@ -265,7 +273,11 @@ crypto_scrypt(const uint8_t * passwd, size_t passwdlen, 34 + PKCS5_PBKDF2_HMAC((const char *)passwd, passwdlen, B, p * 128 * r, 1, EVP_sha256(), buflen, buf); 36 PBKDF2_SHA256(passwd, passwdlen, B, p * 128 * r, 1, buf, buflen); 57 @@ -332,7 +336,11 @@ crypto_scrypt(const uint8_t * passwd, size_t passwdlen, 62 + PKCS5_PBKDF2_HMAC((const char *)passwd, passwdlen, salt, saltlen, 1, EVP_sha256(), p * 128 * r, B… 64 PBKDF2_SHA256(passwd, passwdlen, salt, saltlen, 1, B, p * 128 * r); 69 @@ -341,7 +349,11 @@ crypto_scrypt(const uint8_t * passwd, size_t passwdlen, [all …]
|
/external/ltp/testcases/kernel/syscalls/setresuid/ |
D | setresuid02.c | 80 struct passwd nobody, bin; 91 struct passwd *exp_real_usr; 92 struct passwd *exp_eff_usr; 93 struct passwd *exp_sav_usr; 110 uid_verify(struct passwd *ru, struct passwd *eu, struct passwd *su, char *); 214 uid_verify(struct passwd *ru, struct passwd *eu, struct passwd *su, char *when) in uid_verify()
|
D | setresuid01.c | 78 struct passwd nobody, bin, root; 89 struct passwd *exp_real_usr; 90 struct passwd *exp_eff_usr; 91 struct passwd *exp_sav_usr; 120 uid_verify(struct passwd *ru, struct passwd *eu, struct passwd *su, char *when); 204 uid_verify(struct passwd *ru, struct passwd *eu, struct passwd *su, char *when) in uid_verify()
|
D | setresuid03.c | 86 struct passwd nobody, bin, root; 98 struct passwd *exp_real_usr; 99 struct passwd *exp_eff_usr; 100 struct passwd *exp_sav_usr; 118 uid_verify(struct passwd *ru, struct passwd *eu, struct passwd *su, char *); 227 uid_verify(struct passwd *ru, struct passwd *eu, struct passwd *su, char *when) in uid_verify()
|
/external/ppp/pppd/plugins/ |
D | passwordfd.c | 33 static int pwfd_passwd (char *user, char *passwd) in pwfd_passwd() argument 40 if (passwd == NULL) in pwfd_passwd() 44 strcpy (passwd, save_passwd); in pwfd_passwd() 50 red = read (passwdfd, passwd + readgood, MAXSECRETLEN - 1 - readgood); in pwfd_passwd() 66 passwd[readgood] = 0; in pwfd_passwd() 67 strcpy (save_passwd, passwd); in pwfd_passwd()
|
/external/v8/third_party/zlib/contrib/minizip/ |
D | crypt.h | 65 static void init_keys(const char* passwd,unsigned long* pkeys,const z_crc_t* pcrc_32_tab) in init_keys() argument 70 while (*passwd != '\0') { in init_keys() 71 update_keys(pkeys,pcrc_32_tab,(int)*passwd); in init_keys() 72 passwd++; in init_keys() 90 static int crypthead(const char* passwd, /* password string */ in crypthead() argument 114 init_keys(passwd, pkeys, pcrc_32_tab); in crypthead() 121 init_keys(passwd, pkeys, pcrc_32_tab); in crypthead()
|
/external/zlib/contrib/minizip/ |
D | crypt.h | 65 static void init_keys(const char* passwd,unsigned long* pkeys,const z_crc_t* pcrc_32_tab) in init_keys() argument 70 while (*passwd != '\0') { in init_keys() 71 update_keys(pkeys,pcrc_32_tab,(int)*passwd); in init_keys() 72 passwd++; in init_keys() 90 static int crypthead(const char* passwd, /* password string */ in crypthead() argument 114 init_keys(passwd, pkeys, pcrc_32_tab); in crypthead() 121 init_keys(passwd, pkeys, pcrc_32_tab); in crypthead()
|
/external/ltp/testcases/kernel/syscalls/setreuid/ |
D | setreuid04.c | 38 static struct passwd nobody, root; 48 struct passwd *exp_real_usr; 49 struct passwd *exp_eff_usr; 61 static void uid_verify(struct passwd *, struct passwd *, char *); 133 static void uid_verify(struct passwd *ru, struct passwd *eu, char *when) in uid_verify()
|
D | setreuid02.c | 36 static struct passwd nobody, daemonpw, root, bin; 46 struct passwd *exp_real_usr; 47 struct passwd *exp_eff_usr; 65 static void uid_verify(struct passwd *ru, struct passwd *eu, char *when); 134 static void uid_verify(struct passwd *ru, struct passwd *eu, char *when) in uid_verify()
|
D | setreuid03.c | 42 static struct passwd nobody, bin, root; 53 struct passwd *exp_real_usr; 54 struct passwd *exp_eff_usr; 91 static void uid_verify(struct passwd *, struct passwd *, char *); 182 static void uid_verify(struct passwd *ru, struct passwd *eu, char *when) in uid_verify()
|
D | setreuid05.c | 40 static struct passwd nobody, daemonpw, root, bin; 46 struct passwd *exp_real_usr; 47 struct passwd *exp_eff_usr; 83 static void uid_verify(struct passwd *, struct passwd *, char *); 189 static void uid_verify(struct passwd *ru, struct passwd *eu, char *when) in uid_verify()
|
/external/python/cpython2/Lib/ |
D | ftplib.py | 116 def __init__(self, host='', user='', passwd='', acct='', argument 122 self.login(user, passwd, acct) 380 def login(self, user = '', passwd = '', acct = ''): argument 383 if not passwd: passwd = '' 385 if user == 'anonymous' and passwd in ('', '-'): 393 passwd = passwd + 'anonymous@' 395 if resp[0] == '3': resp = self.sendcmd('PASS ' + passwd) 660 def __init__(self, host='', user='', passwd='', acct='', keyfile=None, argument 677 FTP.__init__(self, host, user, passwd, acct, timeout) 679 def login(self, user='', passwd='', acct='', secure=True): argument [all …]
|
D | getpass.py | 55 passwd = fallback_getpass(prompt, stream) 61 passwd = None 71 passwd = _raw_input(prompt, stream, input=input) 76 if passwd is not None: 83 passwd = fallback_getpass(prompt, stream) 86 return passwd
|
/external/crosvm/sys_util/src/ |
D | passwd.rs | 19 let mut passwd: libc::passwd = unsafe { mem::zeroed() }; in get_user_id() localVariable 20 let mut passwd_result: *mut libc::passwd = ptr::null_mut(); in get_user_id() 33 &mut passwd, in get_user_id() 43 Ok(passwd.pw_uid) in get_user_id()
|
/external/curl/lib/ |
D | curl_sspi.c | 146 xcharp_u passwd, dup_passwd; in Curl_create_sspi_identity() local 198 passwd.tchar_ptr = Curl_convert_UTF8_to_tchar((char *)passwdp); in Curl_create_sspi_identity() 199 if(!passwd.tchar_ptr) in Curl_create_sspi_identity() 201 dup_passwd.tchar_ptr = _tcsdup(passwd.tchar_ptr); in Curl_create_sspi_identity() 203 Curl_unicodefree(passwd.tchar_ptr); in Curl_create_sspi_identity() 210 Curl_unicodefree(passwd.tchar_ptr); in Curl_create_sspi_identity()
|
/external/python/cpython3/Lib/urllib/ |
D | request.py | 839 self.passwd = {} 841 def add_password(self, realm, uri, user, passwd): argument 845 if realm not in self.passwd: 846 self.passwd[realm] = {} 850 self.passwd[realm][reduced_uri] = (user, passwd) 853 domains = self.passwd.get(realm, {}) 916 def add_password(self, realm, uri, user, passwd, is_authenticated=False): argument 920 super().add_password(None, uri, user, passwd) 921 super().add_password(realm, uri, user, passwd) 958 self.passwd = password_mgr [all …]
|
/external/python/cpython3/Lib/ |
D | getpass.py | 44 passwd = None 62 passwd = fallback_getpass(prompt, stream) 77 passwd = _raw_input(prompt, stream, input=input) 82 if passwd is not None: 91 passwd = fallback_getpass(prompt, stream) 94 return passwd
|