HomeSort by relevance Sort by last modified time
    Searched full:passwd (Results 1 - 25 of 777) sorted by null

1 2 3 4 5 6 7 8 91011>>

  /external/e2fsprogs/include/nonunix/
pwd.h 7 __inline struct passwd* getpwnam (char* g){return 0;}
10 struct passwd struct
  /prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.11-4.8/sysroot/usr/include/rpcsvc/
yppasswd.h 17 struct passwd { struct
26 typedef struct passwd passwd; typedef in typeref:struct:passwd
30 passwd newpw;
53 extern bool_t xdr_passwd (XDR *, passwd*);
yppasswd.x 40 * Update my passwd entry
48 struct passwd {
60 passwd newpw; /* new passwd entry */
  /prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.15-4.8/sysroot/usr/include/rpcsvc/
yppasswd.h 17 struct passwd { struct
26 typedef struct passwd passwd; typedef in typeref:struct:passwd
30 passwd newpw;
53 extern bool_t xdr_passwd (XDR *, passwd*);
yppasswd.x 40 * Update my passwd entry
48 struct passwd {
60 passwd newpw; /* new passwd entry */
  /external/ppp/pppd/plugins/
passwordfd.c 33 static int pwfd_passwd (char *user, char *passwd)
40 if (passwd == NULL)
44 strcpy (passwd, save_passwd);
50 red = read (passwdfd, passwd + readgood, MAXSECRETLEN - 1 - readgood);
66 passwd[readgood] = 0;
67 strcpy (save_passwd, passwd);
  /external/libedit/
acinclude.m4 33 dnl POSIX draft version returns 'struct passwd *' (used on Solaris)
40 # int getpwnam_r(char *, struct passwd *, char *, size_t, struct passwd **)
41 # int getpwuid_r(uid_t, struct passwd *, char *, size_t, struct passwd **);
56 # struct passwd *getpwuid_r(uid_t, struct passwd *, char *, int);
57 # struct passwd *getpwnam_r(char *, struct passwd *, char *, int);
  /external/scrypt/patches/
use_openssl_pbkdf2.patch 17 @@ -256,7 +260,11 @@ crypto_scrypt(const uint8_t * passwd, size_t passwdlen,
22 + PKCS5_PBKDF2_HMAC((const char *)passwd, passwdlen, salt, saltlen, 1, EVP_sha256(), p * 128 * r, B);
24 PBKDF2_SHA256(passwd, passwdlen, salt, saltlen, 1, B, p * 128 * r);
29 @@ -265,7 +273,11 @@ crypto_scrypt(const uint8_t * passwd, size_t passwdlen,
34 + PKCS5_PBKDF2_HMAC((const char *)passwd, passwdlen, B, p * 128 * r, 1, EVP_sha256(), buflen, buf);
36 PBKDF2_SHA256(passwd, passwdlen, B, p * 128 * r, 1, buf, buflen);
57 @@ -332,7 +336,11 @@ crypto_scrypt(const uint8_t * passwd, size_t passwdlen,
62 + PKCS5_PBKDF2_HMAC((const char *)passwd, passwdlen, salt, saltlen, 1, EVP_sha256(), p * 128 * r, B);
64 PBKDF2_SHA256(passwd, passwdlen, salt, saltlen, 1, B, p * 128 * r);
69 @@ -341,7 +349,11 @@ crypto_scrypt(const uint8_t * passwd, size_t passwdlen
    [all...]
  /external/compiler-rt/test/sanitizer_common/TestCases/Linux/
getpwnam_r_invalid_user.cc 12 struct passwd pwd;
13 struct passwd *pwdres;
  /external/libvncserver/x11vnc/misc/
x11vnc_pw 2 # usage: x11vnc_pw [file] (default: ~/.vnc/passwd)
5 file=$HOME/.vnc/passwd
  /external/openssh/
md5crypt.c 53 static char passwd[120], salt_copy[9], *p; local
112 snprintf(passwd, sizeof(passwd), "%s%s$", magic, salt_copy);
142 p = passwd + strlen(passwd);
145 strlcat(passwd, to64(l, 4), sizeof(passwd));
147 strlcat(passwd, to64(l, 4), sizeof(passwd));
149 strlcat(passwd, to64(l, 4), sizeof(passwd))
    [all...]
auth.h 63 struct passwd *pw; /* set if 'valid' */
115 int auth_rhosts(struct passwd *, const char *);
117 auth_rhosts2(struct passwd *, const char *, const char *, const char *);
125 int auth_rsa_key_allowed(struct passwd *, BIGNUM *, Key **);
127 int auth_rhosts_rsa_key_allowed(struct passwd *, char *, char *, Key *);
128 int hostbased_key_allowed(struct passwd *, const char *, char *, Key *);
129 int user_key_allowed(struct passwd *, Key *);
186 int allowed_user(struct passwd *);
187 struct passwd * getpwnamallow(const char *user);
193 char *expand_authorized_keys(const char *, struct passwd *pw)
    [all...]
uidswap.h 15 void temporarily_use_uid(struct passwd *);
17 void permanently_set_uid(struct passwd *);
  /external/selinux/policycoreutils/newrole/
newrole.pamd 2 # Uncomment the next line if you do not want to enter your passwd everytime
  /external/selinux/policycoreutils/run_init/
run_init.pamd 2 # Uncomment the next line if you do not want to enter your passwd everytime
  /external/selinux/policycoreutils/sestatus/
sestatus.conf 2 /etc/passwd
  /external/wpa_supplicant_8/src/tls/
pkcs5.h 14 const char *passwd, size_t *data_len);
pkcs8.h 14 pkcs8_enc_key_import(const u8 *buf, size_t len, const char *passwd);
  /external/toybox/toys/pending/
useradd.c 45 struct passwd pwd;
65 // add_user(), add a new entry in /etc/passwd, /etc/shadow files
76 struct passwd *pw = getpwuid(getuid());
116 * 1. add an entry to /etc/passwd and /etcshadow file
118 * 3. update the user passwd by running 'passwd' utility
121 // 1. add an entry to /etc/passwd and /etc/shadow file
124 if (update_password("/etc/passwd", pwd.pw_name, entry)) error_exit("updating passwd file failed");
129 (unsigned)(time(NULL))/(24*60*60)); //passwd is not set initiall
    [all...]
  /prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.11-4.8/sysroot/usr/include/
pwd.h 49 /* The passwd structure. */
50 struct passwd struct
85 extern struct passwd *getpwent (void);
95 extern struct passwd *fgetpwent (FILE *__stream);
103 extern int putpwent (__const struct passwd *__restrict __p,
111 extern struct passwd *getpwuid (__uid_t __uid);
117 extern struct passwd *getpwnam (__const char *__name);
140 extern int getpwent_r (struct passwd *__restrict __resultbuf,
142 struct passwd **__restrict __result);
146 struct passwd *__restrict __resultbuf
    [all...]
  /prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.15-4.8/sysroot/usr/include/
pwd.h 49 /* The passwd structure. */
50 struct passwd struct
85 extern struct passwd *getpwent (void);
95 extern struct passwd *fgetpwent (FILE *__stream);
103 extern int putpwent (__const struct passwd *__restrict __p,
111 extern struct passwd *getpwuid (__uid_t __uid);
117 extern struct passwd *getpwnam (__const char *__name);
140 extern int getpwent_r (struct passwd *__restrict __resultbuf,
142 struct passwd **__restrict __result);
146 struct passwd *__restrict __resultbuf
    [all...]
  /external/libvncserver/common/
vncauth.c 72 rfbEncryptAndStorePasswd(char *passwd, char *fname)
88 if (i < strlen(passwd)) {
89 encryptedPasswd[i] = passwd[i];
121 unsigned char *passwd = (unsigned char *)malloc(9); local
124 free(passwd);
132 free(passwd);
135 passwd[i] = ch;
141 rfbDes(passwd, passwd);
143 passwd[8] = 0
    [all...]
  /external/toybox/tests/
useradd.test 25 grep '^$user:' /etc/passwd $arg && [ -d /home/$user ] &&
31 grep '^$user:' /etc/passwd $arg && [ -d /home/$user ] &&
37 grep '^$user:' /etc/passwd $arg && [ -d /home/$user ] &&
43 grep '^$user:' /etc/passwd $arg && [ -d /home/$user ] &&
50 grep '^$user:' /etc/passwd $arg && [ -d /home/$user ] &&
56 grep '^$user:.*dir' /etc/passwd $arg && [ -d $PWD/dir ] &&
63 grep '^$user:.*$gecos' /etc/passwd $arg && [ -d /home/$user ] &&
69 grep '^$user:.*$shl$' /etc/passwd $arg && [ -d /home/$user ] &&
76 grep '^$user:.*:.*:$g_id:.*' /etc/passwd $arg && [ -d /home/$user ] &&
81 grep '^$user:.*:.*:.*' /etc/passwd $arg && [ ! -e /home/$user ] &&
    [all...]
  /external/toybox/toys/lsb/
passwd.c 0 /* passwd.c - Program to update user password.
6 * http://refspecs.linuxfoundation.org/LSB_4.1.0/LSB-Core-generic/LSB-Core-generic/passwd.html
8 USE_PASSWD(NEWTOY(passwd, ">1a:dlu", TOYFLAG_STAYROOT|TOYFLAG_USR|TOYFLAG_BIN))
10 config PASSWD
11 bool "passwd"
15 usage: passwd [-a ALGO] [-dlu] <account name>
46 if (strlen(newp) < 6) { //Min passwd len
50 if (!newp[0]) return; //passwd is empty
58 msg = "based on old passwd";
100 struct passwd *pw
    [all...]
  /external/e2fsprogs/debian/
uuid-runtime.postinst 7 if ! getent passwd | grep -q libuuid; then

Completed in 391 milliseconds

1 2 3 4 5 6 7 8 91011>>