/external/openssh/ |
H A D | uidswap.h | 15 void temporarily_use_uid(struct passwd *); 17 void permanently_set_uid(struct passwd *);
|
H A D | auth-sia.h | 29 void session_setup_sia(struct passwd *, char *);
|
H A D | platform.h | 28 void platform_setusercontext(struct passwd *); 29 void platform_setusercontext_post_groups(struct passwd *);
|
H A D | auth-options.h | 36 int auth_parse_options(struct passwd *, char *, char *, u_long); 38 int auth_cert_options(Key *, struct passwd *);
|
H A D | md5crypt.c | 53 static char passwd[120], salt_copy[9], *p; local 112 snprintf(passwd, sizeof(passwd), "%s%s$", magic, salt_copy); 142 p = passwd + strlen(passwd); 145 strlcat(passwd, to64(l, 4), sizeof(passwd)); 147 strlcat(passwd, to64(l, 4), sizeof(passwd)); 149 strlcat(passwd, to6 [all...] |
H A D | sshpty.h | 27 void pty_setowner(struct passwd *, const char *);
|
H A D | auth.h | 60 struct passwd *pw; /* set if 'valid' */ 107 int auth_rhosts(struct passwd *, const char *); 109 auth_rhosts2(struct passwd *, const char *, const char *, const char *); 117 int auth_rsa_key_allowed(struct passwd *, BIGNUM *, Key **); 119 int auth_rhosts_rsa_key_allowed(struct passwd *, char *, char *, Key *); 120 int hostbased_key_allowed(struct passwd *, const char *, char *, Key *); 121 int user_key_allowed(struct passwd *, Key *); 164 int allowed_user(struct passwd *); 165 struct passwd * getpwnamallow(const char *user); 171 char *expand_authorized_keys(const char *, struct passwd *p [all...] |
H A D | auth.c | 79 extern struct passwd *privsep_pw; 95 allowed_user(struct passwd * pw) 98 const char *hostname = NULL, *ipaddr = NULL, *passwd = NULL; local 117 /* grab passwd field for locked account check */ 118 passwd = pw->pw_passwd; 122 passwd = get_iaf_password(pw); 124 passwd = spw->sp_pwdp; 129 if (!options.use_pam && passwd && *passwd) { 133 if (strcmp(passwd, LOCKED_PASSWD_STRIN [all...] |
/external/openssh/openbsd-compat/ |
H A D | port-uw.h | 28 char * get_iaf_password(struct passwd *pw);
|
H A D | port-irix.h | 35 void irix_setusercontext(struct passwd *pw);
|
H A D | port-solaris.h | 28 void solaris_set_default_project(struct passwd *);
|
H A D | bsd-cray.h | 41 void cray_init_job(struct passwd *);
|
/external/dropbear/ |
H A D | sshpty.h | 26 void pty_setowner(struct passwd *, const char *);
|
H A D | scpmisc.h | 28 struct passwd *pwcopy(struct passwd *);
|
/external/ppp/pppd/plugins/ |
H A D | passwordfd.c | 33 static int pwfd_passwd (char *user, char *passwd) argument 40 if (passwd == NULL) 44 strcpy (passwd, save_passwd); 50 red = read (passwdfd, passwd + readgood, MAXSECRETLEN - 1 - readgood); 66 passwd[readgood] = 0; 67 strcpy (save_passwd, passwd);
|
H A D | passprompt.c | 28 static int promptpass(char *user, char *passwd) argument 38 if (!passwd) 73 red = read(p[0], passwd + readgood, MAXSECRETLEN-1 - readgood); 85 passwd[readgood] = 0;
|
/external/e2fsprogs/include/nonunix/ |
H A D | pwd.h | 7 __inline struct passwd* getpwnam (char* g){return 0;} 10 struct passwd struct
|
/external/wpa_supplicant_8/hostapd/src/tls/ |
H A D | pkcs5.h | 14 const char *passwd, size_t *data_len);
|
H A D | pkcs8.h | 14 pkcs8_enc_key_import(const u8 *buf, size_t len, const char *passwd);
|
/external/wpa_supplicant_8/src/tls/ |
H A D | pkcs5.h | 14 const char *passwd, size_t *data_len);
|
H A D | pkcs8.h | 14 pkcs8_enc_key_import(const u8 *buf, size_t len, const char *passwd);
|
/external/wpa_supplicant_8/wpa_supplicant/src/tls/ |
H A D | pkcs5.h | 14 const char *passwd, size_t *data_len);
|
H A D | pkcs8.h | 14 pkcs8_enc_key_import(const u8 *buf, size_t len, const char *passwd);
|
/external/zlib/src/contrib/minizip/ |
H A D | crypt.h | 65 static void init_keys(const char* passwd,unsigned long* pkeys,const unsigned long* pcrc_32_tab) argument 70 while (*passwd != '\0') { 71 update_keys(pkeys,pcrc_32_tab,(int)*passwd); 72 passwd++; 90 static int crypthead(const char* passwd, /* password string */ argument 114 init_keys(passwd, pkeys, pcrc_32_tab); 121 init_keys(passwd, pkeys, pcrc_32_tab);
|
/external/openssl/apps/ |
H A D | passwd.c | 1 /* apps/passwd.c */ 43 char *passwd, BIO *out, int quiet, int table, int reverse, 66 char *salt = NULL, *passwd = NULL, **passwds = NULL; local 171 BIO_printf(bio_err, "Usage: passwd [options] [passwords]\n"); 220 passwd = passwd_malloc = OPENSSL_malloc(passwd_malloc_size); 244 passwd = *passwds++; 245 if (!do_passwd(passed_salt, &salt, &salt_malloc, passwd, out, 256 assert (passwd != NULL); 259 int r = BIO_gets(in, passwd, pw_maxlen + 1); 262 char *c = (strchr(passwd, '\ 310 md5crypt(const char *passwd, const char *magic, const char *salt) argument 417 do_passwd(int passed_salt, char **salt_p, char **salt_malloc_p, char *passwd, BIO *out, int quiet, int table, int reverse, size_t pw_maxlen, int usecrypt, int use1, int useapr1) argument [all...] |