Home
last modified time | relevance | path

Searched refs:password (Results 1 – 25 of 318) sorted by relevance

12345678910>>...13

/OK3568_Linux_fs/yocto/poky/meta/recipes-extended/shadow/files/
H A Dshadow-update-pam-conf.patch4 common-password and common-session.
18 -password include system-auth
19 +password include common-password
27 -password include system-auth
28 +password include common-password
36 -password include system-auth
37 +password include common-password
45 -password include system-auth
46 +password include common-password
54 -password include system-auth
[all …]
/OK3568_Linux_fs/kernel/drivers/net/wireless/rockchip_wlan/mvl88w8977/mlan/esa/common/
H A Dpass_phrase.c49 Mrvl_F(void *priv, char *password, unsigned char *ssid, int ssidlength, in Mrvl_F() argument
56 int len = pass_strlen(password); in Mrvl_F()
70 (unsigned char *)password, in Mrvl_F()
83 (unsigned char *)password, in Mrvl_F()
102 Mrvl_PasswordHash(void *priv, char *password, unsigned char *ssid, in Mrvl_PasswordHash() argument
107 if ((pass_strlen(password) > 63) || (ssidlength > 32)) { in Mrvl_PasswordHash()
111 Mrvl_F((void *)priv, password, ssid, ssidlength, 4096, 2, output); in Mrvl_PasswordHash()
113 Mrvl_F((void *)priv, password, ssid, ssidlength, 4096, 1, output); in Mrvl_PasswordHash()
/OK3568_Linux_fs/yocto/poky/bitbake/lib/layerindexlib/
H A Drestapi.py144 def _get_json_response(apiurl=None, username=None, password=None, retry=True): argument
152 password=up.password
160 … res = self.layerindex._fetch_url(up_stripped.geturl(), username=username, password=password)
167 … _get_json_response(apiurl=up_stripped.geturl(), username=username, password=password, retry=False)
197 … index.apilinks = _get_json_response(apiurl=url, username=up.username, password=up.password)
214 username=up.username, password=up.password)
226 username=up.username, password=up.password)
242 username=up.username, password=up.password)
263 username=up.username, password=up.password)
/OK3568_Linux_fs/yocto/meta-openembedded/meta-oe/recipes-graphics/lxdm/lxdm/
H A D0007-greeter.c-support-to-update-expired-password.patch4 Subject: [PATCH 7/8] greeter.c: support to update expired password
6 Update greeter to work with ui to handle expired password. It checks
7 whether password is expired after input user and password. If expired,
8 force user to update password immediately. It allows 3 times to try. If
38 + gtk_label_set_text(GTK_LABEL(prompt), _("New password:"));
40 + gtk_label_set_text(GTK_LABEL(prompt), _("Retype new password:"));
83 + // if new password is same as old one
97 + printf("update-new-password user=%s newpass=%s session=%s lang=%s\n",
113 /* password check failed */
153 + else if (!strncmp(str, "password-expire", 15))
[all …]
H A D0005-ui.c-handle-password-expire-and-update-new-password.patch4 Subject: [PATCH 5/8] ui.c: handle password-expire and update-new-password
22 + xwrite(greeter_pipe[0], "password-expire\n", 16);
31 + else if (!strncmp(str, "update-new-password", 19)) {
32 + xwrite(greeter_pipe[0], "update-new-password\n", 20);
40 + xwrite(greeter_pipe[0], "invalid-new-password\n", 21);
H A D0008-greeter.c-show-information-on-gtk-label-info.patch37 + gtk_label_set_text((GtkLabel *)info, _("Maximum number of failed update password attempts ex…
45 + gtk_label_set_text((GtkLabel *)info, _("New password is same as old one, password unchanged.…
82 else if (!strncmp(str, "password-expire", 15))
85 + gtk_label_set_text(GTK_LABEL(info), _("You are required to change your password immediately."));
88 else if( !strncmp(str, "password", 8))
93 + gtk_label_set_text(GTK_LABEL(info), _("Invalid new password. Please input new password again.")…
H A D0009-greeter.c-disallow-empty-new-password.patch4 Subject: [PATCH] greeter.c: disallow empty new password
7 is required to update password, it only shows input box without label
10 And disallow empty new password when user is required to update it.
37 + gtk_label_set_text((GtkLabel *)info, _("Empty password is not allowed."));
43 …gtk_label_set_text((GtkLabel *)info, _("Maximum number of failed update password attempts exceeded…
48 // if new password is same as old one
/OK3568_Linux_fs/kernel/security/keys/encrypted-keys/
H A Decryptfs_format.c21 return auth_tok->token.password.session_key_encryption_key; in ecryptfs_get_auth_tok_key()
57 strncpy((char *)auth_tok->token.password.signature, key_desc, in ecryptfs_fill_auth_tok()
59 auth_tok->token.password.session_key_encryption_key_bytes = in ecryptfs_fill_auth_tok()
67 auth_tok->token.password.flags |= in ecryptfs_fill_auth_tok()
73 auth_tok->token.password.hash_algo = PGP_DIGEST_ALGO_SHA512; in ecryptfs_fill_auth_tok()
74 auth_tok->token.password.flags &= ~(ECRYPTFS_PERSISTENT_PASSWORD); in ecryptfs_fill_auth_tok()
/OK3568_Linux_fs/yocto/meta-openembedded/meta-oe/recipes-core/plymouth/files/
H A D0001-Make-full-path-to-systemd-tty-ask-password-agent-con.patch4 Subject: [PATCH] Make full path to systemd-tty-ask-password-agent configurable
24 -AC_PATH_PROG([SYSTEMD_ASK_PASSWORD_AGENT], [systemd-tty-ask-password-agent])
25password-agent, AS_HELP_STRING([--with-systemd-tty-ask-password-agent],[path of systemd-tty-ask-pa…
/OK3568_Linux_fs/yocto/meta-openembedded/meta-python/recipes-devtools/python/
H A Dpython3-passlib_1.7.4.bb1 SUMMARY = "comprehensive password hashing framework supporting over 30 schemes"
3 Passlib is a password hashing library for Python 2 & 3, which provides cross-platform \
4 implementations of over 30 password hashing algorithms, as well as a framework for \
5 managing existing password hashes. It’s designed to be useful for a wide range of \
6 tasks, from verifying a hash found in /etc/shadow, to providing full-strength password \
/OK3568_Linux_fs/buildroot/package/mkpasswd/
H A Dmkpasswd.c143 char *password = NULL; in main() local
220 password = argv[0]; in main()
223 password = argv[0]; in main()
310 if (password) { in main()
317 password = NOFAIL(malloc(128)); in main()
323 if (!fgets(password, 128, fp)) { in main()
328 p = strpbrk(password, "\n\r"); in main()
332 password = getpass(_("Password: ")); in main()
333 if (!password) { in main()
341 result = crypt(password, salt); in main()
/OK3568_Linux_fs/yocto/poky/bitbake/lib/bb/fetch2/
H A Dssh.py87 password = m.group('pass')
96 if password:
97 fr += ':%s' % password
127 password = m.group('pass')
136 if password:
137 fr += ':%s' % password
/OK3568_Linux_fs/yocto/poky/meta/recipes-extended/pam/libpam/pam.d/
H A Dcommon-password2 # /etc/pam.d/common-password - password-related modules common to all services
16 password [success=1 default=ignore] pam_unix.so sha512
18 password requisite pam_deny.so
22 password required pam_permit.so
/OK3568_Linux_fs/yocto/poky/meta/recipes-connectivity/wpa-supplicant/wpa-supplicant/
H A Dwpa_supplicant.conf477 password="foobar"
492 password="foobar"
505 password="foobar"
570 password="foobar"
628 password="foobar"
676 password="foobar"
/OK3568_Linux_fs/buildroot/support/testing/tests/core/
H A Dtest_root_password.py7 password = "foo" variable in TestRootPassword
13 """.format(password)
27 self.assertEqual(crypt(self.password, h), h)
34 self.emulator.login(self.password)
/OK3568_Linux_fs/yocto/meta-openembedded/meta-oe/recipes-graphics/lxdm/
H A Dlxdm_0.5.3.bb14 file://0003-check-whether-password-expired-with-pam.patch \
15 file://0004-lxdm.c-add-function-to-change-password-with-pam.patch \
16 file://0005-ui.c-handle-password-expire-and-update-new-password.patch \
18 file://0007-greeter.c-support-to-update-expired-password.patch \
20 file://0009-greeter.c-disallow-empty-new-password.patch \
42 EXTRA_OECONF += "--enable-gtk3=yes --enable-password=yes --with-x -with-xconn=xcb \
52 …# default background configured not available / no password field available / no default screensav…
/OK3568_Linux_fs/yocto/poky/meta/recipes-gnome/epiphany/files/
H A DCVE-2023-26081.patch8 disable the password manager entirely so the untrusted web content
54 save(origin, targetOrigin, username, password, usernameField, passwordField, isNew)
57 + Ephy.log(`Not saving password for origin=${origin} because web content is sandboxed`);
61 …Ephy.log(`Saving password for origin=${origin}, targetOrigin=${targetOrigin}, username=${username}…
66 … requestSave(origin, targetOrigin, username, password, usernameField, passwordField, isNew, pageID)
69 + Ephy.log(`Not requesting to save password for origin=${origin} because web content is …
73 …Ephy.log(`Requesting to save password for origin=${origin}, targetOrigin=${targetOrigin}, username…
/OK3568_Linux_fs/buildroot/docs/manual/
H A Dmakeusers-syntax.txt14 |username |uid |group |gid |password |home |shell |groups |comment
30 - +password+ is the crypt(3)-encoded password. If prefixed with +!+,
33 +!=+, then the password will be crypt-encoded (using MD5) and login
35 +-+, then no password value will be set.
69 - clear-text +password+ is: +blabla+, will be crypt(3)-encoded, and login is disabled.
85 - +password+ is empty (aka no password).
/OK3568_Linux_fs/yocto/meta-openembedded/meta-oe/recipes-security/passwdqc/
H A Dpasswdqc_1.3.1.bb1 SUMMARY = "A password/passphrase strength checking and enforcement toolset"
3 passwdqc is a password/passphrase strength checking and policy enforcement \
6 pam_passwdqc is normally invoked on password changes by programs such as \
7 passwd(1). It is capable of checking password or passphrase strength, \
11 pwqcheck and pwqgen are standalone password/passphrase strength checking \
/OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm32/include/openssl/
H A Dpkcs8.h127 CBS *in, const char *password);
185 OPENSSL_EXPORT int PKCS12_parse(const PKCS12 *p12, const char *password,
197 OPENSSL_EXPORT int PKCS12_verify_mac(const PKCS12 *p12, const char *password,
217 OPENSSL_EXPORT PKCS12 *PKCS12_create(const char *password, const char *name,
/OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm64/host_include/openssl/
H A Dpkcs8.h127 CBS *in, const char *password);
185 OPENSSL_EXPORT int PKCS12_parse(const PKCS12 *p12, const char *password,
197 OPENSSL_EXPORT int PKCS12_verify_mac(const PKCS12 *p12, const char *password,
217 OPENSSL_EXPORT PKCS12 *PKCS12_create(const char *password, const char *name,
/OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm32/host_include/openssl/
H A Dpkcs8.h127 CBS *in, const char *password);
185 OPENSSL_EXPORT int PKCS12_parse(const PKCS12 *p12, const char *password,
197 OPENSSL_EXPORT int PKCS12_verify_mac(const PKCS12 *p12, const char *password,
217 OPENSSL_EXPORT PKCS12 *PKCS12_create(const char *password, const char *name,
/OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm64/include/openssl/
H A Dpkcs8.h127 CBS *in, const char *password);
185 OPENSSL_EXPORT int PKCS12_parse(const PKCS12 *p12, const char *password,
197 OPENSSL_EXPORT int PKCS12_verify_mac(const PKCS12 *p12, const char *password,
217 OPENSSL_EXPORT PKCS12 *PKCS12_create(const char *password, const char *name,
/OK3568_Linux_fs/yocto/poky/meta/recipes-support/curl/curl/
H A DCVE-2022-27782-1.patch164 - data->set.ssl.password = data->set.str[STRING_TLSAUTH_PASSWORD];
166 + data->set.ssl.primary.password = data->set.str[STRING_TLSAUTH_PASSWORD];
169 - data->set.proxy_ssl.password = data->set.str[STRING_TLSAUTH_PASSWORD_PROXY];
172 + data->set.proxy_ssl.primary.password =
191 + char *password; /* TLS password (for, e.g., SRP) */
210 char *key_passwd; /* plain text private key password */
213 - char *password; /* TLS password (for, e.g., SRP) */
241 - SSL_SET_OPTION(password));
243 + SSL_SET_OPTION(primary.password));
384 + char * const ssl_password = SSL_SET_OPTION(primary.password);
[all …]
/OK3568_Linux_fs/yocto/meta-openembedded/meta-python/recipes-extended/python-pykickstart/files/
H A D0002-pykickstart-parser.py-add-lock-for-readKickstart-and.patch58 def readKickstart(self, f, reset=True, username=None, password=None):
60 + self._readKickstart(f, reset=reset, username=username, password=password)
62 + def _readKickstart(self, f, reset=True, username=None, password=None):

12345678910>>...13