/busybox-1.35.0/shell/hush_test/hush-misc/ |
D | exec.right | 1 pass fd out open 2 pass fd out dup 3 pass fd out close 4 pass fd in open 5 pass fd in dup 6 pass fd in close
|
D | exec.tests | 7 echo pass fd out open 12 echo pass fd out dup 16 echo pass fd out close 21 echo pass fd in open 26 echo pass fd in dup 30 echo pass fd in close
|
/busybox-1.35.0/loginutils/ |
D | chpasswd.c | 71 char *pass; in chpasswd_main() local 74 pass = strchr(name, ':'); in chpasswd_main() 75 if (!pass) in chpasswd_main() 77 *pass++ = '\0'; in chpasswd_main() 91 free_me = pass = pw_encrypt(pass, salt, 0); in chpasswd_main() 97 rc = update_passwd(bb_path_shadow_file, name, pass, NULL); in chpasswd_main() 99 pass = (char*)"x"; in chpasswd_main() 103 rc = update_passwd(bb_path_passwd_file, name, pass, NULL); in chpasswd_main()
|
/busybox-1.35.0/libbb/ |
D | correct_password.c | 43 const char *pass; in get_passwd() local 48 pass = pw->pw_passwd; in get_passwd() 51 if ((pass[0] == 'x' || pass[0] == '*') && !pass[1]) { in get_passwd() 58 pass = (r || !result) ? "aa" : result->sp_pwdp; in get_passwd() 61 return pass; in get_passwd()
|
/busybox-1.35.0/mailutils/ |
D | popmaildir.c | 169 md5_hash(&md5.ctx, G.pass, strlen(G.pass)); in popmaildir_main() 182 pop3_check("PASS %s", G.pass); in popmaildir_main() 287 free(G.pass); in popmaildir_main()
|
D | sendmail.c | 287 G.pass = xstrdup(a+1); in sendmail_main() 356 if (!G.user || !G.pass) in sendmail_main() 369 unsigned pass_len = strlen(G.pass); in sendmail_main() 376 strcpy(stpcpy(plain_auth + 1, G.user) + 1, G.pass); in sendmail_main() 391 printstr_base64(G.pass); in sendmail_main()
|
D | mail.c | 194 G.pass = bb_ask_noecho(fd, /* timeout: */ 0, "Password: "); in get_cred_or_die() 197 G.pass = xmalloc_reads(fd, /* maxsize: */ NULL); in get_cred_or_die() 199 if (!G.user || !*G.user || !G.pass) in get_cred_or_die()
|
D | mail.h | 15 char *pass; member
|
/busybox-1.35.0/networking/ |
D | ether-wake.c | 202 char *pass; in ether_wake_main() local 214 flags = getopt32(argv, "^" "bi:p:" "\0" "=1", &ifname, &pass); in ether_wake_main() 216 wol_passwd_sz = get_wol_pw(pass, wol_passwd); in ether_wake_main()
|
D | wget.c | 829 char *pass; in prepare_ftp_session() local 843 pass = (char*)"busybox"; /* password for "anonymous" */ in prepare_ftp_session() 845 pass = strchr(target->user, ':'); in prepare_ftp_session() 846 if (pass) in prepare_ftp_session() 847 *pass++ = '\0'; in prepare_ftp_session() 855 if (ftpcmd("PASS ", pass, sfp) == 230) in prepare_ftp_session()
|
D | Config.src | 95 Command line options to pass to udhcpc from ifup.
|
D | httpd.c | 2781 IF_FEATURE_HTTPD_AUTH_MD5(const char *pass;) in httpd_main() 2807 IF_FEATURE_HTTPD_AUTH_MD5(, &pass) in httpd_main() 2829 puts(pw_encrypt(pass, salt, /*cleanup:*/ 0)); in httpd_main()
|
D | telnetd.ctrlSQ.patch | 106 * don't need to guess whether it's ok to pass -i to us */
|
/busybox-1.35.0/archival/ |
D | rpm.c | 97 unsigned pass, idx; in rpm_gettags() local 112 for (pass = 0; pass < 2; pass++) { in rpm_gettags() 132 if (pass == 0) in rpm_gettags() 137 if (pass == 0) in rpm_gettags()
|
/busybox-1.35.0/networking/udhcp/ |
D | Config.src | 82 bool "Do not pass malformed host and domain names"
|
/busybox-1.35.0/docs/ |
D | mdev.txt | 142 or if two seconds pass, mdev runs as usual, then it rewrites /dev/mdev.seq
|
D | keep_data_small.txt | 85 In case you don't want to pass this additional parameter everywhere,
|
D | unicode_UTF-8-test.txt | 10 "pass" or "fail" this test file, even though the texts suggests a
|
/busybox-1.35.0/ |
D | Config.in | 502 Additional CFLAGS to pass to the compiler verbatim. 508 Additional LDFLAGS to pass to the linker verbatim. 514 Additional LDLIBS to pass to the linker with -l.
|