| /OK3568_Linux_fs/yocto/poky/meta/recipes-extended/shadow/files/ |
| H A D | shadow-update-pam-conf.patch | 4 common-password and common-session. 18 -password include system-auth 19 +password include common-password 27 -password include system-auth 28 +password include common-password 36 -password include system-auth 37 +password include common-password 45 -password include system-auth 46 +password include common-password 54 -password include system-auth [all …]
|
| /OK3568_Linux_fs/kernel/drivers/net/wireless/rockchip_wlan/mvl88w8977/mlan/esa/common/ |
| H A D | pass_phrase.c | 49 Mrvl_F(void *priv, char *password, unsigned char *ssid, int ssidlength, in Mrvl_F() argument 56 int len = pass_strlen(password); in Mrvl_F() 70 (unsigned char *)password, in Mrvl_F() 83 (unsigned char *)password, in Mrvl_F() 102 Mrvl_PasswordHash(void *priv, char *password, unsigned char *ssid, in Mrvl_PasswordHash() argument 107 if ((pass_strlen(password) > 63) || (ssidlength > 32)) { in Mrvl_PasswordHash() 111 Mrvl_F((void *)priv, password, ssid, ssidlength, 4096, 2, output); in Mrvl_PasswordHash() 113 Mrvl_F((void *)priv, password, ssid, ssidlength, 4096, 1, output); in Mrvl_PasswordHash()
|
| /OK3568_Linux_fs/yocto/poky/bitbake/lib/layerindexlib/ |
| H A D | restapi.py | 144 def _get_json_response(apiurl=None, username=None, password=None, retry=True): argument 152 password=up.password 160 … res = self.layerindex._fetch_url(up_stripped.geturl(), username=username, password=password) 167 … _get_json_response(apiurl=up_stripped.geturl(), username=username, password=password, retry=False) 197 … index.apilinks = _get_json_response(apiurl=url, username=up.username, password=up.password) 214 username=up.username, password=up.password) 226 username=up.username, password=up.password) 242 username=up.username, password=up.password) 263 username=up.username, password=up.password)
|
| /OK3568_Linux_fs/yocto/meta-openembedded/meta-oe/recipes-graphics/lxdm/lxdm/ |
| H A D | 0007-greeter.c-support-to-update-expired-password.patch | 4 Subject: [PATCH 7/8] greeter.c: support to update expired password 6 Update greeter to work with ui to handle expired password. It checks 7 whether password is expired after input user and password. If expired, 8 force user to update password immediately. It allows 3 times to try. If 38 + gtk_label_set_text(GTK_LABEL(prompt), _("New password:")); 40 + gtk_label_set_text(GTK_LABEL(prompt), _("Retype new password:")); 83 + // if new password is same as old one 97 + printf("update-new-password user=%s newpass=%s session=%s lang=%s\n", 113 /* password check failed */ 153 + else if (!strncmp(str, "password-expire", 15)) [all …]
|
| H A D | 0005-ui.c-handle-password-expire-and-update-new-password.patch | 4 Subject: [PATCH 5/8] ui.c: handle password-expire and update-new-password 22 + xwrite(greeter_pipe[0], "password-expire\n", 16); 31 + else if (!strncmp(str, "update-new-password", 19)) { 32 + xwrite(greeter_pipe[0], "update-new-password\n", 20); 40 + xwrite(greeter_pipe[0], "invalid-new-password\n", 21);
|
| H A D | 0008-greeter.c-show-information-on-gtk-label-info.patch | 37 + gtk_label_set_text((GtkLabel *)info, _("Maximum number of failed update password attempts ex… 45 + gtk_label_set_text((GtkLabel *)info, _("New password is same as old one, password unchanged.… 82 else if (!strncmp(str, "password-expire", 15)) 85 + gtk_label_set_text(GTK_LABEL(info), _("You are required to change your password immediately.")); 88 else if( !strncmp(str, "password", 8)) 93 + gtk_label_set_text(GTK_LABEL(info), _("Invalid new password. Please input new password again.")…
|
| H A D | 0009-greeter.c-disallow-empty-new-password.patch | 4 Subject: [PATCH] greeter.c: disallow empty new password 7 is required to update password, it only shows input box without label 10 And disallow empty new password when user is required to update it. 37 + gtk_label_set_text((GtkLabel *)info, _("Empty password is not allowed.")); 43 …gtk_label_set_text((GtkLabel *)info, _("Maximum number of failed update password attempts exceeded… 48 // if new password is same as old one
|
| /OK3568_Linux_fs/kernel/security/keys/encrypted-keys/ |
| H A D | ecryptfs_format.c | 21 return auth_tok->token.password.session_key_encryption_key; in ecryptfs_get_auth_tok_key() 57 strncpy((char *)auth_tok->token.password.signature, key_desc, in ecryptfs_fill_auth_tok() 59 auth_tok->token.password.session_key_encryption_key_bytes = in ecryptfs_fill_auth_tok() 67 auth_tok->token.password.flags |= in ecryptfs_fill_auth_tok() 73 auth_tok->token.password.hash_algo = PGP_DIGEST_ALGO_SHA512; in ecryptfs_fill_auth_tok() 74 auth_tok->token.password.flags &= ~(ECRYPTFS_PERSISTENT_PASSWORD); in ecryptfs_fill_auth_tok()
|
| /OK3568_Linux_fs/yocto/meta-openembedded/meta-oe/recipes-core/plymouth/files/ |
| H A D | 0001-Make-full-path-to-systemd-tty-ask-password-agent-con.patch | 4 Subject: [PATCH] Make full path to systemd-tty-ask-password-agent configurable 24 -AC_PATH_PROG([SYSTEMD_ASK_PASSWORD_AGENT], [systemd-tty-ask-password-agent]) 25 …password-agent, AS_HELP_STRING([--with-systemd-tty-ask-password-agent],[path of systemd-tty-ask-pa…
|
| /OK3568_Linux_fs/yocto/meta-openembedded/meta-python/recipes-devtools/python/ |
| H A D | python3-passlib_1.7.4.bb | 1 SUMMARY = "comprehensive password hashing framework supporting over 30 schemes" 3 Passlib is a password hashing library for Python 2 & 3, which provides cross-platform \ 4 implementations of over 30 password hashing algorithms, as well as a framework for \ 5 managing existing password hashes. It’s designed to be useful for a wide range of \ 6 tasks, from verifying a hash found in /etc/shadow, to providing full-strength password \
|
| /OK3568_Linux_fs/buildroot/package/mkpasswd/ |
| H A D | mkpasswd.c | 143 char *password = NULL; in main() local 220 password = argv[0]; in main() 223 password = argv[0]; in main() 310 if (password) { in main() 317 password = NOFAIL(malloc(128)); in main() 323 if (!fgets(password, 128, fp)) { in main() 328 p = strpbrk(password, "\n\r"); in main() 332 password = getpass(_("Password: ")); in main() 333 if (!password) { in main() 341 result = crypt(password, salt); in main()
|
| /OK3568_Linux_fs/yocto/poky/bitbake/lib/bb/fetch2/ |
| H A D | ssh.py | 87 password = m.group('pass') 96 if password: 97 fr += ':%s' % password 127 password = m.group('pass') 136 if password: 137 fr += ':%s' % password
|
| /OK3568_Linux_fs/yocto/poky/meta/recipes-extended/pam/libpam/pam.d/ |
| H A D | common-password | 2 # /etc/pam.d/common-password - password-related modules common to all services 16 password [success=1 default=ignore] pam_unix.so sha512 18 password requisite pam_deny.so 22 password required pam_permit.so
|
| /OK3568_Linux_fs/yocto/poky/meta/recipes-connectivity/wpa-supplicant/wpa-supplicant/ |
| H A D | wpa_supplicant.conf | 477 password="foobar" 492 password="foobar" 505 password="foobar" 570 password="foobar" 628 password="foobar" 676 password="foobar"
|
| /OK3568_Linux_fs/buildroot/support/testing/tests/core/ |
| H A D | test_root_password.py | 7 password = "foo" variable in TestRootPassword 13 """.format(password) 27 self.assertEqual(crypt(self.password, h), h) 34 self.emulator.login(self.password)
|
| /OK3568_Linux_fs/yocto/meta-openembedded/meta-oe/recipes-graphics/lxdm/ |
| H A D | lxdm_0.5.3.bb | 14 file://0003-check-whether-password-expired-with-pam.patch \ 15 file://0004-lxdm.c-add-function-to-change-password-with-pam.patch \ 16 file://0005-ui.c-handle-password-expire-and-update-new-password.patch \ 18 file://0007-greeter.c-support-to-update-expired-password.patch \ 20 file://0009-greeter.c-disallow-empty-new-password.patch \ 42 EXTRA_OECONF += "--enable-gtk3=yes --enable-password=yes --with-x -with-xconn=xcb \ 52 …# default background configured not available / no password field available / no default screensav…
|
| /OK3568_Linux_fs/yocto/poky/meta/recipes-gnome/epiphany/files/ |
| H A D | CVE-2023-26081.patch | 8 disable the password manager entirely so the untrusted web content 54 save(origin, targetOrigin, username, password, usernameField, passwordField, isNew) 57 + Ephy.log(`Not saving password for origin=${origin} because web content is sandboxed`); 61 …Ephy.log(`Saving password for origin=${origin}, targetOrigin=${targetOrigin}, username=${username}… 66 … requestSave(origin, targetOrigin, username, password, usernameField, passwordField, isNew, pageID) 69 + Ephy.log(`Not requesting to save password for origin=${origin} because web content is … 73 …Ephy.log(`Requesting to save password for origin=${origin}, targetOrigin=${targetOrigin}, username…
|
| /OK3568_Linux_fs/buildroot/docs/manual/ |
| H A D | makeusers-syntax.txt | 14 |username |uid |group |gid |password |home |shell |groups |comment 30 - +password+ is the crypt(3)-encoded password. If prefixed with +!+, 33 +!=+, then the password will be crypt-encoded (using MD5) and login 35 +-+, then no password value will be set. 69 - clear-text +password+ is: +blabla+, will be crypt(3)-encoded, and login is disabled. 85 - +password+ is empty (aka no password).
|
| /OK3568_Linux_fs/yocto/meta-openembedded/meta-oe/recipes-security/passwdqc/ |
| H A D | passwdqc_1.3.1.bb | 1 SUMMARY = "A password/passphrase strength checking and enforcement toolset" 3 passwdqc is a password/passphrase strength checking and policy enforcement \ 6 pam_passwdqc is normally invoked on password changes by programs such as \ 7 passwd(1). It is capable of checking password or passphrase strength, \ 11 pwqcheck and pwqgen are standalone password/passphrase strength checking \
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm32/include/openssl/ |
| H A D | pkcs8.h | 127 CBS *in, const char *password); 185 OPENSSL_EXPORT int PKCS12_parse(const PKCS12 *p12, const char *password, 197 OPENSSL_EXPORT int PKCS12_verify_mac(const PKCS12 *p12, const char *password, 217 OPENSSL_EXPORT PKCS12 *PKCS12_create(const char *password, const char *name,
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm64/host_include/openssl/ |
| H A D | pkcs8.h | 127 CBS *in, const char *password); 185 OPENSSL_EXPORT int PKCS12_parse(const PKCS12 *p12, const char *password, 197 OPENSSL_EXPORT int PKCS12_verify_mac(const PKCS12 *p12, const char *password, 217 OPENSSL_EXPORT PKCS12 *PKCS12_create(const char *password, const char *name,
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm32/host_include/openssl/ |
| H A D | pkcs8.h | 127 CBS *in, const char *password); 185 OPENSSL_EXPORT int PKCS12_parse(const PKCS12 *p12, const char *password, 197 OPENSSL_EXPORT int PKCS12_verify_mac(const PKCS12 *p12, const char *password, 217 OPENSSL_EXPORT PKCS12 *PKCS12_create(const char *password, const char *name,
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm64/include/openssl/ |
| H A D | pkcs8.h | 127 CBS *in, const char *password); 185 OPENSSL_EXPORT int PKCS12_parse(const PKCS12 *p12, const char *password, 197 OPENSSL_EXPORT int PKCS12_verify_mac(const PKCS12 *p12, const char *password, 217 OPENSSL_EXPORT PKCS12 *PKCS12_create(const char *password, const char *name,
|
| /OK3568_Linux_fs/yocto/poky/meta/recipes-support/curl/curl/ |
| H A D | CVE-2022-27782-1.patch | 164 - data->set.ssl.password = data->set.str[STRING_TLSAUTH_PASSWORD]; 166 + data->set.ssl.primary.password = data->set.str[STRING_TLSAUTH_PASSWORD]; 169 - data->set.proxy_ssl.password = data->set.str[STRING_TLSAUTH_PASSWORD_PROXY]; 172 + data->set.proxy_ssl.primary.password = 191 + char *password; /* TLS password (for, e.g., SRP) */ 210 char *key_passwd; /* plain text private key password */ 213 - char *password; /* TLS password (for, e.g., SRP) */ 241 - SSL_SET_OPTION(password)); 243 + SSL_SET_OPTION(primary.password)); 384 + char * const ssl_password = SSL_SET_OPTION(primary.password); [all …]
|
| /OK3568_Linux_fs/yocto/meta-openembedded/meta-python/recipes-extended/python-pykickstart/files/ |
| H A D | 0002-pykickstart-parser.py-add-lock-for-readKickstart-and.patch | 58 def readKickstart(self, f, reset=True, username=None, password=None): 60 + self._readKickstart(f, reset=reset, username=username, password=password) 62 + def _readKickstart(self, f, reset=True, username=None, password=None):
|