/external/openssh/ |
D | md5crypt.c | 53 static char passwd[120], salt_copy[9], *p; in md5_crypt() local 112 snprintf(passwd, sizeof(passwd), "%s%s$", magic, salt_copy); in md5_crypt() 142 p = passwd + strlen(passwd); in md5_crypt() 145 strlcat(passwd, to64(l, 4), sizeof(passwd)); in md5_crypt() 147 strlcat(passwd, to64(l, 4), sizeof(passwd)); in md5_crypt() 149 strlcat(passwd, to64(l, 4), sizeof(passwd)); in md5_crypt() 151 strlcat(passwd, to64(l, 4), sizeof(passwd)); in md5_crypt() 153 strlcat(passwd, to64(l, 4), sizeof(passwd)); in md5_crypt() 155 strlcat(passwd, to64(l, 2), sizeof(passwd)); in md5_crypt() 164 return (passwd); in md5_crypt()
|
D | auth.h | 63 struct passwd *pw; /* set if 'valid' */ 115 int auth_rhosts(struct passwd *, const char *); 117 auth_rhosts2(struct passwd *, const char *, const char *, const char *); 125 int auth_rsa_key_allowed(struct passwd *, BIGNUM *, Key **); 127 int auth_rhosts_rsa_key_allowed(struct passwd *, char *, char *, Key *); 128 int hostbased_key_allowed(struct passwd *, const char *, char *, Key *); 129 int user_key_allowed(struct passwd *, Key *); 186 int allowed_user(struct passwd *); 187 struct passwd * getpwnamallow(const char *user); 193 char *expand_authorized_keys(const char *, struct passwd *pw); [all …]
|
D | auth.c | 82 extern struct passwd *privsep_pw; 98 allowed_user(struct passwd * pw) in allowed_user() 101 const char *hostname = NULL, *ipaddr = NULL, *passwd = NULL; in allowed_user() local 121 passwd = pw->pw_passwd; in allowed_user() 125 passwd = get_iaf_password(pw); in allowed_user() 127 passwd = spw->sp_pwdp; in allowed_user() 132 if (!options.use_pam && passwd && *passwd) { in allowed_user() 136 if (strcmp(passwd, LOCKED_PASSWD_STRING) == 0) in allowed_user() 140 if (strncmp(passwd, LOCKED_PASSWD_PREFIX, in allowed_user() 145 if (strstr(passwd, LOCKED_PASSWD_SUBSTR)) in allowed_user() [all …]
|
D | monitor_wrap.h | 45 struct passwd *mm_getpwnamallow(const char *); 49 int mm_user_key_allowed(struct passwd *, Key *); 50 int mm_hostbased_key_allowed(struct passwd *, char *, char *, Key *); 51 int mm_auth_rhosts_rsa_key_allowed(struct passwd *, char *, char *, Key *); 53 int mm_auth_rsa_key_allowed(struct passwd *, BIGNUM *, Key **);
|
D | uidswap.h | 15 void temporarily_use_uid(struct passwd *); 17 void permanently_set_uid(struct passwd *);
|
D | platform.h | 29 void platform_setusercontext(struct passwd *); 30 void platform_setusercontext_post_groups(struct passwd *);
|
D | auth-options.h | 36 int auth_parse_options(struct passwd *, char *, char *, u_long); 38 int auth_cert_options(struct sshkey *, struct passwd *);
|
/external/libvncserver/common/ |
D | vncauth.c | 72 rfbEncryptAndStorePasswd(char *passwd, char *fname) in rfbEncryptAndStorePasswd() argument 88 if (i < strlen(passwd)) { in rfbEncryptAndStorePasswd() 89 encryptedPasswd[i] = passwd[i]; in rfbEncryptAndStorePasswd() 121 unsigned char *passwd = (unsigned char *)malloc(9); in rfbDecryptPasswdFromFile() local 124 free(passwd); in rfbDecryptPasswdFromFile() 132 free(passwd); in rfbDecryptPasswdFromFile() 135 passwd[i] = ch; in rfbDecryptPasswdFromFile() 141 rfbDes(passwd, passwd); in rfbDecryptPasswdFromFile() 143 passwd[8] = 0; in rfbDecryptPasswdFromFile() 145 return (char *)passwd; in rfbDecryptPasswdFromFile() [all …]
|
/external/scrypt/patches/ |
D | use_openssl_pbkdf2.patch | 17 @@ -256,7 +260,11 @@ crypto_scrypt(const uint8_t * passwd, size_t passwdlen, 22 + PKCS5_PBKDF2_HMAC((const char *)passwd, passwdlen, salt, saltlen, 1, EVP_sha256(), p * 128 * r, B… 24 PBKDF2_SHA256(passwd, passwdlen, salt, saltlen, 1, B, p * 128 * r); 29 @@ -265,7 +273,11 @@ crypto_scrypt(const uint8_t * passwd, size_t passwdlen, 34 + PKCS5_PBKDF2_HMAC((const char *)passwd, passwdlen, B, p * 128 * r, 1, EVP_sha256(), buflen, buf); 36 PBKDF2_SHA256(passwd, passwdlen, B, p * 128 * r, 1, buf, buflen); 57 @@ -332,7 +336,11 @@ crypto_scrypt(const uint8_t * passwd, size_t passwdlen, 62 + PKCS5_PBKDF2_HMAC((const char *)passwd, passwdlen, salt, saltlen, 1, EVP_sha256(), p * 128 * r, B… 64 PBKDF2_SHA256(passwd, passwdlen, salt, saltlen, 1, B, p * 128 * r); 69 @@ -341,7 +349,11 @@ crypto_scrypt(const uint8_t * passwd, size_t passwdlen, [all …]
|
/external/ppp/pppd/plugins/ |
D | passwordfd.c | 33 static int pwfd_passwd (char *user, char *passwd) in pwfd_passwd() argument 40 if (passwd == NULL) in pwfd_passwd() 44 strcpy (passwd, save_passwd); in pwfd_passwd() 50 red = read (passwdfd, passwd + readgood, MAXSECRETLEN - 1 - readgood); in pwfd_passwd() 66 passwd[readgood] = 0; in pwfd_passwd() 67 strcpy (save_passwd, passwd); in pwfd_passwd()
|
D | passprompt.c | 28 static int promptpass(char *user, char *passwd) in promptpass() argument 38 if (!passwd) in promptpass() 73 red = read(p[0], passwd + readgood, MAXSECRETLEN-1 - readgood); in promptpass() 97 passwd[readgood] = 0; in promptpass()
|
/external/zlib/src/contrib/minizip/ |
D | crypt.h | 65 static void init_keys(const char* passwd,unsigned long* pkeys,const z_crc_t* pcrc_32_tab) in init_keys() argument 70 while (*passwd != '\0') { in init_keys() 71 update_keys(pkeys,pcrc_32_tab,(int)*passwd); in init_keys() 72 passwd++; in init_keys() 90 static int crypthead(const char* passwd, /* password string */ in crypthead() argument 114 init_keys(passwd, pkeys, pcrc_32_tab); in crypthead() 121 init_keys(passwd, pkeys, pcrc_32_tab); in crypthead()
|
/external/libedit/ |
D | acinclude.m4 | 33 dnl POSIX draft version returns 'struct passwd *' (used on Solaris) 40 # int getpwnam_r(char *, struct passwd *, char *, size_t, struct passwd **) 41 # int getpwuid_r(uid_t, struct passwd *, char *, size_t, struct passwd **); 56 # struct passwd *getpwuid_r(uid_t, struct passwd *, char *, int); 57 # struct passwd *getpwnam_r(char *, struct passwd *, char *, int);
|
/external/jetty/src/java/org/eclipse/jetty/util/security/ |
D | Password.java | 218 String passwd = System.getProperty(realm, dft); in getPassword() local 219 if (passwd == null || passwd.length() == 0) in getPassword() 227 if (len > 0) passwd = new String(buf, 0, len).trim(); in getPassword() 233 if (passwd == null || passwd.length() == 0) passwd = promptDft; in getPassword() 235 return new Password(passwd); in getPassword()
|
/external/ppp/pppd/ |
D | auth.c | 170 int (*pap_auth_hook) __P((char *user, char *passwd, char **msgp, 178 int (*pap_passwd_hook) __P((char *user, char *passwd)) = NULL; 184 int (*chap_passwd_hook) __P((char *user, char *passwd)) = NULL; 368 { "password", o_string, passwd, 463 strlcpy(passwd, p, sizeof(passwd)); 788 if (passwd[0] == 0 && !explicit_passwd) { 790 if (!get_pap_passwd(passwd)) 793 upap_authwithpeer(unit, user, passwd); 995 BZERO(passwd, MAXSECRETLEN); 1036 BZERO(passwd, MAXSECRETLEN); [all …]
|
D | session.c | 169 session_start(flags, user, passwd, ttyName, msg) in session_start() argument 172 const char *passwd; 182 struct passwd *pw; 217 PAM_password = passwd; 360 cbuf = crypt(passwd, pw->pw_passwd);
|
/external/nist-sip/java/gov/nist/javax/sip/clientauthutils/ |
D | MessageDigestAlgorithm.java | 115 String passwd, String nonce_value, String nc_value, String cnonce_value, in calculateResponse() argument 121 + (passwd != null && passwd.trim().length() > 0) + ", " + nonce_value + ", " in calculateResponse() 126 if (username_value == null || realm_value == null || passwd == null || method == null in calculateResponse() 137 A1 = username_value + ":" + realm_value + ":" + passwd; in calculateResponse() 143 A1 = H(username_value + ":" + realm_value + ":" + passwd) + ":" + nonce_value + ":" in calculateResponse()
|
/external/selinux/policycoreutils/run_init/ |
D | run_init.c | 89 int authenticate_via_pam(const struct passwd *); 107 int authenticate_via_pam(const struct passwd *p_passwd_line) in authenticate_via_pam() 164 int authenticate_via_shadow_passwd(const struct passwd *); 182 int authenticate_via_shadow_passwd(const struct passwd *p_passwd_line) in authenticate_via_shadow_passwd() 237 struct passwd *p_passwd_line; /* struct derived from passwd file line */
|
/external/openssh/openbsd-compat/ |
D | port-uw.c | 56 struct passwd *pw = authctxt->pw; in sys_auth_passwd() 96 struct passwd *ent = NULL; in nischeck() 133 get_iaf_password(struct passwd *pw) in get_iaf_password()
|
/external/wpa_supplicant_8/src/tls/ |
D | pkcs5.c | 140 const char *passwd) in pkcs5_crypto_init() argument 150 addr[0] = (const u8 *) passwd; in pkcs5_crypto_init() 151 len[0] = os_strlen(passwd); in pkcs5_crypto_init() 172 const char *passwd, size_t *data_len) in pkcs5_decrypt() argument 184 ctx = pkcs5_crypto_init(¶ms, passwd); in pkcs5_decrypt()
|
/external/compiler-rt/test/sanitizer_common/TestCases/Linux/ |
D | getpwnam_r_invalid_user.cc | 12 struct passwd pwd; in main() 13 struct passwd *pwdres; in main()
|
/external/wpa_supplicant_8/src/crypto/ |
D | crypto_internal-rsa.c | 40 const char *passwd) in crypto_private_key_import() argument 49 if (passwd) { in crypto_private_key_import() 51 res = pkcs8_enc_key_import(key, len, passwd); in crypto_private_key_import()
|
/external/scrypt/lib/crypto/ |
D | crypto_scrypt-neon.c | 193 crypto_scrypt(const uint8_t * passwd, size_t passwdlen, in crypto_scrypt() argument 267 PKCS5_PBKDF2_HMAC((const char *)passwd, passwdlen, salt, saltlen, 1, EVP_sha256(), p * 128 * r, B); in crypto_scrypt() 269 PBKDF2_SHA256(passwd, passwdlen, salt, saltlen, 1, B, p * 128 * r); in crypto_scrypt() 280 PKCS5_PBKDF2_HMAC((const char *)passwd, passwdlen, B, p * 128 * r, 1, EVP_sha256(), buflen, buf); in crypto_scrypt() 282 PBKDF2_SHA256(passwd, passwdlen, B, p * 128 * r, 1, buf, buflen); in crypto_scrypt()
|
D | crypto_scrypt-ref.c | 220 crypto_scrypt(const uint8_t * passwd, size_t passwdlen, in crypto_scrypt() argument 263 PKCS5_PBKDF2_HMAC((const char *)passwd, passwdlen, salt, saltlen, 1, EVP_sha256(), p * 128 * r, B); in crypto_scrypt() 265 PBKDF2_SHA256(passwd, passwdlen, salt, saltlen, 1, B, p * 128 * r); in crypto_scrypt() 276 PKCS5_PBKDF2_HMAC((const char *)passwd, passwdlen, B, p * 128 * r, 1, EVP_sha256(), buflen, buf); in crypto_scrypt() 278 PBKDF2_SHA256(passwd, passwdlen, B, p * 128 * r, 1, buf, buflen); in crypto_scrypt()
|
/external/e2fsprogs/include/nonunix/ |
D | pwd.h | 7 __inline struct passwd* getpwnam (char* g){return 0;} in getpwnam() 10 struct passwd struct
|