Home
last modified time | relevance | path

Searched refs:passwd (Results 1 – 25 of 352) sorted by relevance

12345678910>>...15

/external/openssh/
Dmd5crypt.c53 static char passwd[120], salt_copy[9], *p; in md5_crypt() local
112 snprintf(passwd, sizeof(passwd), "%s%s$", magic, salt_copy); in md5_crypt()
142 p = passwd + strlen(passwd); in md5_crypt()
145 strlcat(passwd, to64(l, 4), sizeof(passwd)); in md5_crypt()
147 strlcat(passwd, to64(l, 4), sizeof(passwd)); in md5_crypt()
149 strlcat(passwd, to64(l, 4), sizeof(passwd)); in md5_crypt()
151 strlcat(passwd, to64(l, 4), sizeof(passwd)); in md5_crypt()
153 strlcat(passwd, to64(l, 4), sizeof(passwd)); in md5_crypt()
155 strlcat(passwd, to64(l, 2), sizeof(passwd)); in md5_crypt()
164 return (passwd); in md5_crypt()
Dauth.h63 struct passwd *pw; /* set if 'valid' */
115 int auth_rhosts(struct passwd *, const char *);
117 auth_rhosts2(struct passwd *, const char *, const char *, const char *);
125 int auth_rsa_key_allowed(struct passwd *, BIGNUM *, Key **);
127 int auth_rhosts_rsa_key_allowed(struct passwd *, char *, char *, Key *);
128 int hostbased_key_allowed(struct passwd *, const char *, char *, Key *);
129 int user_key_allowed(struct passwd *, Key *);
186 int allowed_user(struct passwd *);
187 struct passwd * getpwnamallow(const char *user);
193 char *expand_authorized_keys(const char *, struct passwd *pw);
[all …]
Dauth.c82 extern struct passwd *privsep_pw;
98 allowed_user(struct passwd * pw) in allowed_user()
101 const char *hostname = NULL, *ipaddr = NULL, *passwd = NULL; in allowed_user() local
121 passwd = pw->pw_passwd; in allowed_user()
125 passwd = get_iaf_password(pw); in allowed_user()
127 passwd = spw->sp_pwdp; in allowed_user()
132 if (!options.use_pam && passwd && *passwd) { in allowed_user()
136 if (strcmp(passwd, LOCKED_PASSWD_STRING) == 0) in allowed_user()
140 if (strncmp(passwd, LOCKED_PASSWD_PREFIX, in allowed_user()
145 if (strstr(passwd, LOCKED_PASSWD_SUBSTR)) in allowed_user()
[all …]
Dmonitor_wrap.h45 struct passwd *mm_getpwnamallow(const char *);
49 int mm_user_key_allowed(struct passwd *, Key *);
50 int mm_hostbased_key_allowed(struct passwd *, char *, char *, Key *);
51 int mm_auth_rhosts_rsa_key_allowed(struct passwd *, char *, char *, Key *);
53 int mm_auth_rsa_key_allowed(struct passwd *, BIGNUM *, Key **);
Duidswap.h15 void temporarily_use_uid(struct passwd *);
17 void permanently_set_uid(struct passwd *);
Dplatform.h29 void platform_setusercontext(struct passwd *);
30 void platform_setusercontext_post_groups(struct passwd *);
Dauth-options.h36 int auth_parse_options(struct passwd *, char *, char *, u_long);
38 int auth_cert_options(struct sshkey *, struct passwd *);
/external/libvncserver/common/
Dvncauth.c72 rfbEncryptAndStorePasswd(char *passwd, char *fname) in rfbEncryptAndStorePasswd() argument
88 if (i < strlen(passwd)) { in rfbEncryptAndStorePasswd()
89 encryptedPasswd[i] = passwd[i]; in rfbEncryptAndStorePasswd()
121 unsigned char *passwd = (unsigned char *)malloc(9); in rfbDecryptPasswdFromFile() local
124 free(passwd); in rfbDecryptPasswdFromFile()
132 free(passwd); in rfbDecryptPasswdFromFile()
135 passwd[i] = ch; in rfbDecryptPasswdFromFile()
141 rfbDes(passwd, passwd); in rfbDecryptPasswdFromFile()
143 passwd[8] = 0; in rfbDecryptPasswdFromFile()
145 return (char *)passwd; in rfbDecryptPasswdFromFile()
[all …]
/external/scrypt/patches/
Duse_openssl_pbkdf2.patch17 @@ -256,7 +260,11 @@ crypto_scrypt(const uint8_t * passwd, size_t passwdlen,
22 + PKCS5_PBKDF2_HMAC((const char *)passwd, passwdlen, salt, saltlen, 1, EVP_sha256(), p * 128 * r, B…
24 PBKDF2_SHA256(passwd, passwdlen, salt, saltlen, 1, B, p * 128 * r);
29 @@ -265,7 +273,11 @@ crypto_scrypt(const uint8_t * passwd, size_t passwdlen,
34 + PKCS5_PBKDF2_HMAC((const char *)passwd, passwdlen, B, p * 128 * r, 1, EVP_sha256(), buflen, buf);
36 PBKDF2_SHA256(passwd, passwdlen, B, p * 128 * r, 1, buf, buflen);
57 @@ -332,7 +336,11 @@ crypto_scrypt(const uint8_t * passwd, size_t passwdlen,
62 + PKCS5_PBKDF2_HMAC((const char *)passwd, passwdlen, salt, saltlen, 1, EVP_sha256(), p * 128 * r, B…
64 PBKDF2_SHA256(passwd, passwdlen, salt, saltlen, 1, B, p * 128 * r);
69 @@ -341,7 +349,11 @@ crypto_scrypt(const uint8_t * passwd, size_t passwdlen,
[all …]
/external/ppp/pppd/plugins/
Dpasswordfd.c33 static int pwfd_passwd (char *user, char *passwd) in pwfd_passwd() argument
40 if (passwd == NULL) in pwfd_passwd()
44 strcpy (passwd, save_passwd); in pwfd_passwd()
50 red = read (passwdfd, passwd + readgood, MAXSECRETLEN - 1 - readgood); in pwfd_passwd()
66 passwd[readgood] = 0; in pwfd_passwd()
67 strcpy (save_passwd, passwd); in pwfd_passwd()
Dpassprompt.c28 static int promptpass(char *user, char *passwd) in promptpass() argument
38 if (!passwd) in promptpass()
73 red = read(p[0], passwd + readgood, MAXSECRETLEN-1 - readgood); in promptpass()
97 passwd[readgood] = 0; in promptpass()
/external/zlib/src/contrib/minizip/
Dcrypt.h65 static void init_keys(const char* passwd,unsigned long* pkeys,const z_crc_t* pcrc_32_tab) in init_keys() argument
70 while (*passwd != '\0') { in init_keys()
71 update_keys(pkeys,pcrc_32_tab,(int)*passwd); in init_keys()
72 passwd++; in init_keys()
90 static int crypthead(const char* passwd, /* password string */ in crypthead() argument
114 init_keys(passwd, pkeys, pcrc_32_tab); in crypthead()
121 init_keys(passwd, pkeys, pcrc_32_tab); in crypthead()
/external/libedit/
Dacinclude.m433 dnl POSIX draft version returns 'struct passwd *' (used on Solaris)
40 # int getpwnam_r(char *, struct passwd *, char *, size_t, struct passwd **)
41 # int getpwuid_r(uid_t, struct passwd *, char *, size_t, struct passwd **);
56 # struct passwd *getpwuid_r(uid_t, struct passwd *, char *, int);
57 # struct passwd *getpwnam_r(char *, struct passwd *, char *, int);
/external/jetty/src/java/org/eclipse/jetty/util/security/
DPassword.java218 String passwd = System.getProperty(realm, dft); in getPassword() local
219 if (passwd == null || passwd.length() == 0) in getPassword()
227 if (len > 0) passwd = new String(buf, 0, len).trim(); in getPassword()
233 if (passwd == null || passwd.length() == 0) passwd = promptDft; in getPassword()
235 return new Password(passwd); in getPassword()
/external/ppp/pppd/
Dauth.c170 int (*pap_auth_hook) __P((char *user, char *passwd, char **msgp,
178 int (*pap_passwd_hook) __P((char *user, char *passwd)) = NULL;
184 int (*chap_passwd_hook) __P((char *user, char *passwd)) = NULL;
368 { "password", o_string, passwd,
463 strlcpy(passwd, p, sizeof(passwd));
788 if (passwd[0] == 0 && !explicit_passwd) {
790 if (!get_pap_passwd(passwd))
793 upap_authwithpeer(unit, user, passwd);
995 BZERO(passwd, MAXSECRETLEN);
1036 BZERO(passwd, MAXSECRETLEN);
[all …]
Dsession.c169 session_start(flags, user, passwd, ttyName, msg) in session_start() argument
172 const char *passwd;
182 struct passwd *pw;
217 PAM_password = passwd;
360 cbuf = crypt(passwd, pw->pw_passwd);
/external/nist-sip/java/gov/nist/javax/sip/clientauthutils/
DMessageDigestAlgorithm.java115 String passwd, String nonce_value, String nc_value, String cnonce_value, in calculateResponse() argument
121 + (passwd != null && passwd.trim().length() > 0) + ", " + nonce_value + ", " in calculateResponse()
126 if (username_value == null || realm_value == null || passwd == null || method == null in calculateResponse()
137 A1 = username_value + ":" + realm_value + ":" + passwd; in calculateResponse()
143 A1 = H(username_value + ":" + realm_value + ":" + passwd) + ":" + nonce_value + ":" in calculateResponse()
/external/selinux/policycoreutils/run_init/
Drun_init.c89 int authenticate_via_pam(const struct passwd *);
107 int authenticate_via_pam(const struct passwd *p_passwd_line) in authenticate_via_pam()
164 int authenticate_via_shadow_passwd(const struct passwd *);
182 int authenticate_via_shadow_passwd(const struct passwd *p_passwd_line) in authenticate_via_shadow_passwd()
237 struct passwd *p_passwd_line; /* struct derived from passwd file line */
/external/openssh/openbsd-compat/
Dport-uw.c56 struct passwd *pw = authctxt->pw; in sys_auth_passwd()
96 struct passwd *ent = NULL; in nischeck()
133 get_iaf_password(struct passwd *pw) in get_iaf_password()
/external/wpa_supplicant_8/src/tls/
Dpkcs5.c140 const char *passwd) in pkcs5_crypto_init() argument
150 addr[0] = (const u8 *) passwd; in pkcs5_crypto_init()
151 len[0] = os_strlen(passwd); in pkcs5_crypto_init()
172 const char *passwd, size_t *data_len) in pkcs5_decrypt() argument
184 ctx = pkcs5_crypto_init(&params, passwd); in pkcs5_decrypt()
/external/compiler-rt/test/sanitizer_common/TestCases/Linux/
Dgetpwnam_r_invalid_user.cc12 struct passwd pwd; in main()
13 struct passwd *pwdres; in main()
/external/wpa_supplicant_8/src/crypto/
Dcrypto_internal-rsa.c40 const char *passwd) in crypto_private_key_import() argument
49 if (passwd) { in crypto_private_key_import()
51 res = pkcs8_enc_key_import(key, len, passwd); in crypto_private_key_import()
/external/scrypt/lib/crypto/
Dcrypto_scrypt-neon.c193 crypto_scrypt(const uint8_t * passwd, size_t passwdlen, in crypto_scrypt() argument
267 PKCS5_PBKDF2_HMAC((const char *)passwd, passwdlen, salt, saltlen, 1, EVP_sha256(), p * 128 * r, B); in crypto_scrypt()
269 PBKDF2_SHA256(passwd, passwdlen, salt, saltlen, 1, B, p * 128 * r); in crypto_scrypt()
280 PKCS5_PBKDF2_HMAC((const char *)passwd, passwdlen, B, p * 128 * r, 1, EVP_sha256(), buflen, buf); in crypto_scrypt()
282 PBKDF2_SHA256(passwd, passwdlen, B, p * 128 * r, 1, buf, buflen); in crypto_scrypt()
Dcrypto_scrypt-ref.c220 crypto_scrypt(const uint8_t * passwd, size_t passwdlen, in crypto_scrypt() argument
263 PKCS5_PBKDF2_HMAC((const char *)passwd, passwdlen, salt, saltlen, 1, EVP_sha256(), p * 128 * r, B); in crypto_scrypt()
265 PBKDF2_SHA256(passwd, passwdlen, salt, saltlen, 1, B, p * 128 * r); in crypto_scrypt()
276 PKCS5_PBKDF2_HMAC((const char *)passwd, passwdlen, B, p * 128 * r, 1, EVP_sha256(), buflen, buf); in crypto_scrypt()
278 PBKDF2_SHA256(passwd, passwdlen, B, p * 128 * r, 1, buf, buflen); in crypto_scrypt()
/external/e2fsprogs/include/nonunix/
Dpwd.h7 __inline struct passwd* getpwnam (char* g){return 0;} in getpwnam()
10 struct passwd struct

12345678910>>...15