/external/openssh/ |
D | md5crypt.c | 53 static char passwd[120], salt_copy[9], *p; in md5_crypt() local 112 snprintf(passwd, sizeof(passwd), "%s%s$", magic, salt_copy); in md5_crypt() 142 p = passwd + strlen(passwd); in md5_crypt() 145 strlcat(passwd, to64(l, 4), sizeof(passwd)); in md5_crypt() 147 strlcat(passwd, to64(l, 4), sizeof(passwd)); in md5_crypt() 149 strlcat(passwd, to64(l, 4), sizeof(passwd)); in md5_crypt() 151 strlcat(passwd, to64(l, 4), sizeof(passwd)); in md5_crypt() 153 strlcat(passwd, to64(l, 4), sizeof(passwd)); in md5_crypt() 155 strlcat(passwd, to64(l, 2), sizeof(passwd)); in md5_crypt() 164 return (passwd); in md5_crypt()
|
D | auth.h | 60 struct passwd *pw; /* set if 'valid' */ 107 int auth_rhosts(struct passwd *, const char *); 109 auth_rhosts2(struct passwd *, const char *, const char *, const char *); 117 int auth_rsa_key_allowed(struct passwd *, BIGNUM *, Key **); 119 int auth_rhosts_rsa_key_allowed(struct passwd *, char *, char *, Key *); 120 int hostbased_key_allowed(struct passwd *, const char *, char *, Key *); 121 int user_key_allowed(struct passwd *, Key *); 164 int allowed_user(struct passwd *); 165 struct passwd * getpwnamallow(const char *user); 171 char *expand_authorized_keys(const char *, struct passwd *pw); [all …]
|
D | auth.c | 79 extern struct passwd *privsep_pw; 95 allowed_user(struct passwd * pw) in allowed_user() 98 const char *hostname = NULL, *ipaddr = NULL, *passwd = NULL; in allowed_user() local 118 passwd = pw->pw_passwd; in allowed_user() 122 passwd = get_iaf_password(pw); in allowed_user() 124 passwd = spw->sp_pwdp; in allowed_user() 129 if (!options.use_pam && passwd && *passwd) { in allowed_user() 133 if (strcmp(passwd, LOCKED_PASSWD_STRING) == 0) in allowed_user() 137 if (strncmp(passwd, LOCKED_PASSWD_PREFIX, in allowed_user() 142 if (strstr(passwd, LOCKED_PASSWD_SUBSTR)) in allowed_user() [all …]
|
D | monitor_wrap.h | 45 struct passwd *mm_getpwnamallow(const char *); 49 int mm_user_key_allowed(struct passwd *, Key *); 50 int mm_hostbased_key_allowed(struct passwd *, char *, char *, Key *); 51 int mm_auth_rhosts_rsa_key_allowed(struct passwd *, char *, char *, Key *); 53 int mm_auth_rsa_key_allowed(struct passwd *, BIGNUM *, Key **);
|
D | uidswap.h | 15 void temporarily_use_uid(struct passwd *); 17 void permanently_set_uid(struct passwd *);
|
D | platform.h | 28 void platform_setusercontext(struct passwd *); 29 void platform_setusercontext_post_groups(struct passwd *);
|
D | auth-options.h | 36 int auth_parse_options(struct passwd *, char *, char *, u_long); 38 int auth_cert_options(Key *, struct passwd *);
|
D | sftp.h | 98 struct passwd; 100 int sftp_server_main(int, char **, struct passwd *);
|
D | auth-rh-rsa.c | 42 auth_rhosts_rsa_key_allowed(struct passwd *pw, char *cuser, char *chost, in auth_rhosts_rsa_key_allowed() 69 struct passwd *pw = authctxt->pw; in auth_rhosts_rsa()
|
D | session.h | 35 struct passwd *pw; 79 void do_setusercontext(struct passwd *);
|
/external/openssl/apps/ |
D | passwd.c | 43 char *passwd, BIO *out, int quiet, int table, int reverse, 66 char *salt = NULL, *passwd = NULL, **passwds = NULL; in MAIN() local 220 passwd = passwd_malloc = OPENSSL_malloc(passwd_malloc_size); in MAIN() 244 passwd = *passwds++; in MAIN() 245 if (!do_passwd(passed_salt, &salt, &salt_malloc, passwd, out, in MAIN() 256 assert (passwd != NULL); in MAIN() 259 int r = BIO_gets(in, passwd, pw_maxlen + 1); in MAIN() 262 char *c = (strchr(passwd, '\n')) ; in MAIN() 274 if (!do_passwd(passed_salt, &salt, &salt_malloc, passwd, out, in MAIN() 310 static char *md5crypt(const char *passwd, const char *magic, const char *salt) in md5crypt() argument [all …]
|
/external/ppp/pppd/plugins/ |
D | passwordfd.c | 33 static int pwfd_passwd (char *user, char *passwd) in pwfd_passwd() argument 40 if (passwd == NULL) in pwfd_passwd() 44 strcpy (passwd, save_passwd); in pwfd_passwd() 50 red = read (passwdfd, passwd + readgood, MAXSECRETLEN - 1 - readgood); in pwfd_passwd() 66 passwd[readgood] = 0; in pwfd_passwd() 67 strcpy (save_passwd, passwd); in pwfd_passwd()
|
D | passprompt.c | 28 static int promptpass(char *user, char *passwd) in promptpass() argument 38 if (!passwd) in promptpass() 73 red = read(p[0], passwd + readgood, MAXSECRETLEN-1 - readgood); in promptpass() 85 passwd[readgood] = 0; in promptpass()
|
/external/zlib/src/contrib/minizip/ |
D | crypt.h | 65 static void init_keys(const char* passwd,unsigned long* pkeys,const unsigned long* pcrc_32_tab) in init_keys() argument 70 while (*passwd != '\0') { in init_keys() 71 update_keys(pkeys,pcrc_32_tab,(int)*passwd); in init_keys() 72 passwd++; in init_keys() 90 static int crypthead(const char* passwd, /* password string */ in crypthead() argument 114 init_keys(passwd, pkeys, pcrc_32_tab); in crypthead() 121 init_keys(passwd, pkeys, pcrc_32_tab); in crypthead()
|
/external/ppp/pppd/ |
D | auth.c | 175 int (*pap_auth_hook) __P((char *user, char *passwd, char **msgp, 183 int (*pap_passwd_hook) __P((char *user, char *passwd)) = NULL; 189 int (*chap_passwd_hook) __P((char *user, char *passwd)) = NULL; 368 { "password", o_string, passwd, 451 strlcpy(passwd, p, sizeof(passwd)); 763 if (passwd[0] == 0) { 765 if (!get_pap_passwd(passwd)) 768 upap_authwithpeer(unit, user, passwd); 968 BZERO(passwd, MAXSECRETLEN); 1007 BZERO(passwd, MAXSECRETLEN); [all …]
|
/external/nist-sip/java/gov/nist/javax/sip/clientauthutils/ |
D | MessageDigestAlgorithm.java | 115 String passwd, String nonce_value, String nc_value, String cnonce_value, in calculateResponse() argument 121 + (passwd != null && passwd.trim().length() > 0) + ", " + nonce_value + ", " in calculateResponse() 126 if (username_value == null || realm_value == null || passwd == null || method == null in calculateResponse() 137 A1 = username_value + ":" + realm_value + ":" + passwd; in calculateResponse() 143 A1 = H(username_value + ":" + realm_value + ":" + passwd) + ":" + nonce_value + ":" in calculateResponse()
|
/external/smack/src/org/jivesoftware/smack/proxy/ |
D | Socks5ProxySocketFactory.java | 84 String passwd = proxy.getProxyPassword(); in socks5ProxifiedSocket() local 146 if(user==null || passwd==null) in socks5ProxifiedSocket() 176 buf[index++]=(byte)(passwd.length()); in socks5ProxifiedSocket() 177 System.arraycopy(passwd.getBytes(), 0, buf, index, in socks5ProxifiedSocket() 178 passwd.length()); in socks5ProxifiedSocket() 179 index+=passwd.length(); in socks5ProxifiedSocket()
|
/external/dropbear/ |
D | svr-authpam.c | 44 char* passwd; member 118 resp->resp = m_strdup(userDatap->passwd); in pamConvFunc() 119 m_burn(userDatap->passwd, strlen(userDatap->passwd)); in pamConvFunc() 199 userData.passwd = password; in svr_auth_pam()
|
D | scpmisc.h | 28 struct passwd *pwcopy(struct passwd *);
|
/external/chromium/chrome/browser/sync/resources/ |
D | gaia_login.js | 33 } else if (form.passwd) { 34 form.passwd.focus(); 48 f.passwd.value = ""; // Reset the password field 178 "pass" : f.passwd.value, 227 if (null == f.passwd.value || "" == f.passwd.value) {
|
/external/openssh/openbsd-compat/ |
D | port-uw.c | 55 struct passwd *pw = authctxt->pw; in sys_auth_passwd() 95 struct passwd *ent = NULL; in nischeck() 132 get_iaf_password(struct passwd *pw) in get_iaf_password()
|
/external/chromium/chrome/browser/resources/options/ |
D | sync_setup_overlay.js | 488 var passwd = $('gaia-passwd'); 491 } else if (passwd) { 492 passwd.focus(); 533 var passwd = $('gaia-passwd'); 537 passwd.value = ""; // Reset the password field 607 var passwd = $('gaia-passwd'); 613 if (null == passwd.value || "" == passwd.value) { 640 var passwd = $('gaia-passwd'); 642 "pass" : passwd.value,
|
/external/wpa_supplicant_8/src/tls/ |
D | pkcs5.c | 140 const char *passwd) in pkcs5_crypto_init() argument 150 addr[0] = (const u8 *) passwd; in pkcs5_crypto_init() 151 len[0] = os_strlen(passwd); in pkcs5_crypto_init() 172 const char *passwd, size_t *data_len) in pkcs5_decrypt() argument 184 ctx = pkcs5_crypto_init(¶ms, passwd); in pkcs5_decrypt()
|
/external/wpa_supplicant_8/src/crypto/ |
D | crypto_internal-rsa.c | 31 const char *passwd) in crypto_private_key_import() argument 40 if (passwd) { in crypto_private_key_import() 42 res = pkcs8_enc_key_import(key, len, passwd); in crypto_private_key_import()
|
/external/e2fsprogs/include/nonunix/ |
D | pwd.h | 7 __inline struct passwd* getpwnam (char* g){return 0;} in getpwnam() 10 struct passwd struct
|