/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | tls_openssl.c | 2717 const char *passwd) 2728 if (!passwd) 2729 passwd = ""; 2730 if (!PKCS12_parse(p12, passwd, &pkey, &cert, &certs)) { 2848 const char *private_key, const char *passwd) 2867 return tls_parse_pkcs12(data, ssl, p12, passwd); 2878 const u8 *blob, size_t len, const char *passwd) 2890 return tls_parse_pkcs12(data, ssl, p12, passwd); 3054 char *passwd; local 3061 passwd 2716 tls_parse_pkcs12(struct tls_data *data, SSL *ssl, PKCS12 *p12, const char *passwd) argument 2847 tls_read_pkcs12(struct tls_data *data, SSL *ssl, const char *private_key, const char *passwd) argument 2877 tls_read_pkcs12_blob(struct tls_data *data, SSL *ssl, const u8 *blob, size_t len, const char *passwd) argument 3186 char *passwd; local [all...] |
/external/wpa_supplicant_8/src/crypto/ |
H A D | tls_openssl.c | 2717 const char *passwd) 2728 if (!passwd) 2729 passwd = ""; 2730 if (!PKCS12_parse(p12, passwd, &pkey, &cert, &certs)) { 2848 const char *private_key, const char *passwd) 2867 return tls_parse_pkcs12(data, ssl, p12, passwd); 2878 const u8 *blob, size_t len, const char *passwd) 2890 return tls_parse_pkcs12(data, ssl, p12, passwd); 3054 char *passwd; local 3061 passwd 2716 tls_parse_pkcs12(struct tls_data *data, SSL *ssl, PKCS12 *p12, const char *passwd) argument 2847 tls_read_pkcs12(struct tls_data *data, SSL *ssl, const char *private_key, const char *passwd) argument 2877 tls_read_pkcs12_blob(struct tls_data *data, SSL *ssl, const u8 *blob, size_t len, const char *passwd) argument 3186 char *passwd; local [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | tls_openssl.c | 2717 const char *passwd) 2728 if (!passwd) 2729 passwd = ""; 2730 if (!PKCS12_parse(p12, passwd, &pkey, &cert, &certs)) { 2848 const char *private_key, const char *passwd) 2867 return tls_parse_pkcs12(data, ssl, p12, passwd); 2878 const u8 *blob, size_t len, const char *passwd) 2890 return tls_parse_pkcs12(data, ssl, p12, passwd); 3054 char *passwd; local 3061 passwd 2716 tls_parse_pkcs12(struct tls_data *data, SSL *ssl, PKCS12 *p12, const char *passwd) argument 2847 tls_read_pkcs12(struct tls_data *data, SSL *ssl, const char *private_key, const char *passwd) argument 2877 tls_read_pkcs12_blob(struct tls_data *data, SSL *ssl, const u8 *blob, size_t len, const char *passwd) argument 3186 char *passwd; local [all...] |
/external/ltp/testcases/kernel/module/create_module/ |
H A D | create_module02.c | 120 struct passwd *ltpuser;
|
/external/ltp/testcases/kernel/syscalls/acct/ |
H A D | acct01.c | 84 static struct passwd *ltpuser;
|
/external/ltp/testcases/kernel/syscalls/chmod/ |
H A D | chmod06.c | 165 struct passwd *nobody;
|
/external/ltp/testcases/kernel/syscalls/chown/ |
H A D | chown04.c | 138 struct passwd *ltpuser;
|
/external/ltp/testcases/kernel/syscalls/linkat/ |
H A D | linkat02.c | 83 static struct passwd *ltpuser;
|
/external/ltp/testcases/kernel/syscalls/mkdir/ |
H A D | mkdir02.c | 308 struct passwd *pw;
|
/external/ltp/testcases/kernel/syscalls/mlockall/ |
H A D | mlockall03.c | 217 struct passwd *ltpuser;
|
/external/ltp/testcases/kernel/syscalls/rmdir/ |
H A D | rmdir03.c | 300 struct passwd *pw;
|
/external/ltp/testcases/kernel/syscalls/setns/ |
H A D | setns01.c | 105 static struct passwd *ltpuser;
|
/external/ltp/testcases/kernel/syscalls/setregid/ |
H A D | setregid02.c | 42 static struct passwd *ltpuser;
|
H A D | setregid03.c | 45 struct passwd nobody;
|
/external/ltp/testcases/kernel/syscalls/stat/ |
H A D | stat03.c | 103 struct passwd *ltpuser;
|
/external/ltp/testcases/kernel/syscalls/symlink/ |
H A D | symlink03.c | 145 struct passwd *ltpuser;
|
/external/ltp/testcases/kernel/syscalls/truncate/ |
H A D | truncate03.c | 119 struct passwd *ltpuser;
|
/external/ltp/testcases/kernel/syscalls/utimes/ |
H A D | utimes01.c | 115 struct passwd *ltpuser;
|
/external/ltp/testscripts/ |
H A D | runEALtests.sh | 63 (export PASSWD = passwd of remote host) 168 # echo "INFO: Please export PASSWD = 'passwd of the remote host machine'"
|
/external/ppp/pppd/ |
H A D | pppd.h | 297 extern char passwd[MAXSECRETLEN]; /* Password for PAP or CHAP */ 300 extern bool uselogin; /* Use /etc/passwd for checking PAP */ 730 extern int (*pap_auth_hook) __P((char *user, char *passwd, char **msgp, 734 extern int (*pap_passwd_hook) __P((char *user, char *passwd)); 743 extern int (*chap_passwd_hook) __P((char *user, char *passwd));
|
/external/toybox/toys/lsb/ |
H A D | passwd.c | 0 /* passwd.c - Program to update user password. 6 * http://refspecs.linuxfoundation.org/LSB_4.1.0/LSB-Core-generic/LSB-Core-generic/passwd.html 8 USE_PASSWD(NEWTOY(passwd, ">1a:dlu", TOYFLAG_STAYROOT|TOYFLAG_USR|TOYFLAG_BIN)) 11 bool "passwd" 15 usage: passwd [-a ALGO] [-dlu] <account name> 53 if (strlen(newp) < 6) { //Min passwd len 57 if (!newp[0]) return; //passwd is empty 65 msg = "based on old passwd"; 107 struct passwd *pw; 128 //get shadow passwd [all...] |
/external/toybox/toys/other/ |
H A D | login.c | 52 struct passwd *pwd = 0;
|
/external/toybox/toys/pending/ |
H A D | mdev.c | 140 struct passwd *pass;
|
/external/toybox/toys/posix/ |
H A D | id.c | 88 struct passwd *pw;
|
/external/libxml2/ |
H A D | nanoftp.c | 120 char *passwd; /* passwd string */ member in struct:xmlNanoFTPCtxt 142 static char *proxyPasswd = NULL;/* passwd for proxy authentication */ 250 * @passwd: the proxy password 260 const char *passwd, int type) { 277 if (passwd) 278 proxyPasswd = xmlMemStrdup(passwd); 339 ctxt->passwd = xmlMemStrdup(cptr+1); 507 if (ctxt->passwd != NULL) xmlFree(ctxt->passwd); 259 xmlNanoFTPProxy(const char *host, int port, const char *user, const char *passwd, int type) argument [all...] |