Home
last modified time | relevance | path

Searched refs:passwd (Results 1 - 25 of 375) sorted by relevance

12345678910>>...15

/third_party/pulseaudio/src/pulsecore/
H A Dusergroup.c65 plus the size of a struct passwd.
79 full_size = (size_t) n + sizeof(struct passwd); in starting_getpw_buflen()
247 finished with the returned passwd data.
252 struct passwd *pa_getpwnam_malloc(const char *name) { in pa_getpwnam_malloc()
257 struct passwd *result = NULL; in pa_getpwnam_malloc()
262 getpw_buflen = buflen - sizeof(struct passwd); in pa_getpwnam_malloc()
263 getpw_buf = (char *)buf + sizeof(struct passwd); in pa_getpwnam_malloc()
265 while ((err = getpwnam_r(name, (struct passwd *)buf, getpw_buf, getpw_buflen, &result)) == ERANGE) { in pa_getpwnam_malloc()
269 getpw_buflen = buflen - sizeof(struct passwd); in pa_getpwnam_malloc()
270 getpw_buf = (char *)buf + sizeof(struct passwd); in pa_getpwnam_malloc()
286 pa_getpwnam_free(struct passwd *passwd) pa_getpwnam_free() argument
296 pa_getpwnam_free(struct passwd *passwd) pa_getpwnam_free() argument
345 pa_getpwuid_free(struct passwd *passwd) pa_getpwuid_free() argument
355 pa_getpwuid_free(struct passwd *passwd) pa_getpwuid_free() argument
[all...]
H A Dusergroup.h41 struct passwd *pa_getpwuid_malloc(uid_t uid);
42 void pa_getpwuid_free(struct passwd *passwd);
44 struct passwd *pa_getpwnam_malloc(const char *name);
45 void pa_getpwnam_free(struct passwd *passwd);
/third_party/musl/porting/liteos_m_iccarm/kernel/include/
H A Dpwd.h20 struct passwd { struct
33 struct passwd *getpwent (void);
36 struct passwd *getpwuid (uid_t);
37 struct passwd *getpwnam (const char *);
38 int getpwuid_r (uid_t, struct passwd *, char *, size_t, struct passwd **);
39 int getpwnam_r (const char *, struct passwd *, char *, size_t, struct passwd **);
42 struct passwd *fgetpwent(FILE *);
43 int putpwent(const struct passwd *, FIL
[all...]
/third_party/musl/porting/liteos_m/kernel/include/
H A Dpwd.h20 struct passwd { struct
33 struct passwd *getpwent (void);
36 struct passwd *getpwuid (uid_t);
37 struct passwd *getpwnam (const char *);
38 int getpwuid_r (uid_t, struct passwd *, char *, size_t, struct passwd **);
39 int getpwnam_r (const char *, struct passwd *, char *, size_t, struct passwd **);
42 struct passwd *fgetpwent(FILE *);
43 int putpwent(const struct passwd *, FIL
[all...]
/third_party/musl/porting/uniproton/kernel/include/
H A Dpwd.h20 struct passwd { struct
33 struct passwd *getpwent (void);
36 struct passwd *getpwuid (uid_t);
37 struct passwd *getpwnam (const char *);
38 int getpwuid_r (uid_t, struct passwd *, char *, size_t, struct passwd **);
39 int getpwnam_r (const char *, struct passwd *, char *, size_t, struct passwd **);
42 struct passwd *fgetpwent(FILE *);
43 int putpwent(const struct passwd *, FIL
[all...]
/third_party/musl/include/
H A Dpwd.h20 struct passwd { struct
33 struct passwd *getpwent (void);
36 struct passwd *getpwuid (uid_t);
37 struct passwd *getpwnam (const char *);
38 int getpwuid_r (uid_t, struct passwd *, char *, size_t, struct passwd **);
39 int getpwnam_r (const char *, struct passwd *, char *, size_t, struct passwd **);
42 struct passwd *fgetpwent(FILE *);
43 int putpwent(const struct passwd *, FIL
[all...]
/third_party/ltp/
H A DIDcheck.sh41 passwd="$DESTDIR/etc/passwd"
72 for i in "$passwd" "$group"; do
79 fe root "$passwd"; NO_ROOT_ID=$?
80 fe bin "$passwd"; NO_BIN_ID=$?
81 fe daemon "$passwd"; NO_DAEMON_ID=$?
82 fe nobody "$passwd"; NO_NOBODY_ID=$?
97 echo "Password file: $passwd"
115 if ! touch "$group" "$passwd" 2>/dev/null; then
116 echo "Failed to touch $group or $passwd"
[all...]
/third_party/musl/libc-test/src/api/
H A Dpwd.c10 struct passwd x; in f()
17 {struct passwd*(*p)(const char*) = getpwnam;} in f()
18 {int(*p)(const char*,struct passwd*,char*,size_t,struct passwd**) = getpwnam_r;} in f()
19 {struct passwd*(*p)(uid_t) = getpwuid;} in f()
20 {int(*p)(uid_t,struct passwd*,char*,size_t,struct passwd**) = getpwuid_r;} in f()
23 {struct passwd*(*p)(void) = getpwent;} in f()
/third_party/musl/src/passwd/
H A Dgetpwent.c5 static struct passwd pw;
16 struct passwd *getpwent() in getpwent()
18 struct passwd *res; in getpwent()
19 if (!f) f = fopen("/etc/passwd", "rbe"); in getpwent()
25 struct passwd *getpwuid(uid_t uid) in getpwuid()
27 struct passwd *res; in getpwuid()
32 struct passwd *getpwnam(const char *name) in getpwnam()
34 struct passwd *res; in getpwnam()
H A Dgetpw_r.c6 static int getpw_r(const char *name, uid_t uid, struct passwd *pw, char *buf, size_t size, struct passwd **res) in getpw_r()
23 FIX(passwd); in getpw_r()
34 int getpwnam_r(const char *name, struct passwd *pw, char *buf, size_t size, struct passwd **res) in getpwnam_r()
39 int getpwuid_r(uid_t uid, struct passwd *pw, char *buf, size_t size, struct passwd **res) in getpwuid_r()
H A Dfgetpwent.c4 struct passwd *fgetpwent(FILE *f) in fgetpwent()
7 static struct passwd pw; in fgetpwent()
9 struct passwd *res; in fgetpwent()
/third_party/node/deps/openssl/openssl/apps/
H A Dpasswd.c49 char *passwd, BIO *out, int quiet, int table,
96 char *infile = NULL, *salt = NULL, *passwd = NULL, **passwds = NULL; in passwd_main() local
226 passwd = passwd_malloc = in passwd_main()
261 passwd = *passwds++; in passwd_main()
262 if (!do_passwd(passed_salt, &salt, &salt_malloc, passwd, bio_out, in passwd_main()
270 assert(passwd != NULL); in passwd_main()
272 int r = BIO_gets(in, passwd, pw_maxlen + 1); in passwd_main()
274 char *c = (strchr(passwd, '\n')); in passwd_main()
286 (passed_salt, &salt, &salt_malloc, passwd, bio_out, quiet, in passwd_main()
314 static char *md5crypt(const char *passwd, cons argument
496 shacrypt(const char *passwd, const char *magic, const char *salt) shacrypt() argument
777 do_passwd(int passed_salt, char **salt_p, char **salt_malloc_p, char *passwd, BIO *out, int quiet, int table, int reverse, size_t pw_maxlen, passwd_modes mode) do_passwd() argument
[all...]
/third_party/openssl/apps/
H A Dpasswd.c49 char *passwd, BIO *out, int quiet, int table,
96 char *infile = NULL, *salt = NULL, *passwd = NULL, **passwds = NULL; in passwd_main() local
226 passwd = passwd_malloc = in passwd_main()
261 passwd = *passwds++; in passwd_main()
262 if (!do_passwd(passed_salt, &salt, &salt_malloc, passwd, bio_out, in passwd_main()
270 assert(passwd != NULL); in passwd_main()
272 int r = BIO_gets(in, passwd, pw_maxlen + 1); in passwd_main()
274 char *c = (strchr(passwd, '\n')); in passwd_main()
286 (passed_salt, &salt, &salt_malloc, passwd, bio_out, quiet, in passwd_main()
314 static char *md5crypt(const char *passwd, cons argument
496 shacrypt(const char *passwd, const char *magic, const char *salt) shacrypt() argument
777 do_passwd(int passed_salt, char **salt_p, char **salt_malloc_p, char *passwd, BIO *out, int quiet, int table, int reverse, size_t pw_maxlen, passwd_modes mode) do_passwd() argument
[all...]
/third_party/node/deps/v8/third_party/zlib/contrib/minizip/
H A Dcrypt.h65 static void init_keys(const char* passwd,unsigned long* pkeys,const z_crc_t* pcrc_32_tab) in init_keys() argument
70 while (*passwd != '\0') { in init_keys()
71 update_keys(pkeys,pcrc_32_tab,(int)*passwd); in init_keys()
72 passwd++; in init_keys()
90 static int crypthead(const char* passwd, /* password string */ in crypthead() argument
114 init_keys(passwd, pkeys, pcrc_32_tab); in crypthead()
121 init_keys(passwd, pkeys, pcrc_32_tab); in crypthead()
/third_party/skia/third_party/externals/zlib/contrib/minizip/
H A Dcrypt.h65 static void init_keys(const char* passwd,unsigned long* pkeys,const z_crc_t* pcrc_32_tab) in init_keys() argument
70 while (*passwd != '\0') { in init_keys()
71 update_keys(pkeys,pcrc_32_tab,(int)*passwd); in init_keys()
72 passwd++; in init_keys()
90 static int crypthead(const char* passwd, /* password string */ in crypthead() argument
114 init_keys(passwd, pkeys, pcrc_32_tab); in crypthead()
121 init_keys(passwd, pkeys, pcrc_32_tab); in crypthead()
/third_party/zlib/contrib/minizip/
H A Dcrypt.h66 static void init_keys(const char* passwd, unsigned long* pkeys, const z_crc_t* pcrc_32_tab) in init_keys() argument
71 while (*passwd != '\0') { in init_keys()
72 update_keys(pkeys,pcrc_32_tab,(int)*passwd); in init_keys()
73 passwd++; in init_keys()
91 static unsigned crypthead(const char* passwd, /* password string */ in crypthead() argument
115 init_keys(passwd, pkeys, pcrc_32_tab); in crypthead()
122 init_keys(passwd, pkeys, pcrc_32_tab); in crypthead()
/third_party/musl/libc-test/src/functionalext/supplement/passwd/
H A Dgetpwent.c29 struct passwd *user = getpwent(); in getpwent_0100()
40 struct passwd *ret = getpwnam("root"); in getpwnam_0100()
56 struct passwd *ret = getpwnam("abcdefg"); in getpwnam_0200()
67 struct passwd *ret = getpwuid(getuid()); in getpwuid_0100()
81 struct passwd *ret = getpwuid(TEST_ERROR_UID); in getpwuid_0200()
H A Dgetpw_r.c28 struct passwd pw; in getpwuid_r_0100()
29 struct passwd *res = NULL; in getpwuid_r_0100()
46 struct passwd pw; in getpwuid_r_0200()
47 struct passwd *res = NULL; in getpwuid_r_0200()
/third_party/python/Lib/urllib/
H A Drequest.py56 passwd='geheim$parole')
837 self.passwd = {}
839 def add_password(self, realm, uri, user, passwd):
843 if realm not in self.passwd:
844 self.passwd[realm] = {}
848 self.passwd[realm][reduced_uri] = (user, passwd)
851 domains = self.passwd.get(realm, {})
914 def add_password(self, realm, uri, user, passwd, is_authenticated=False):
918 super().add_password(None, uri, user, passwd)
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/tls/
H A Dpkcs5.c362 pkcs5_crypto_init_pbes2(struct pkcs5_params *params, const char *passwd) in pkcs5_crypto_init_pbes2() argument
371 passwd, os_strlen(passwd)); in pkcs5_crypto_init_pbes2()
376 if (pbkdf2_sha1(passwd, params->salt, params->salt_len, in pkcs5_crypto_init_pbes2()
489 pkcs12_crypto_init_sha1(struct pkcs5_params *params, const char *passwd) in pkcs12_crypto_init_sha1() argument
500 pw_len = passwd ? os_strlen(passwd) : 0; in pkcs12_crypto_init_sha1()
506 WPA_PUT_BE16(&pw[2 * i], passwd[i]); in pkcs12_crypto_init_sha1()
530 const char *passwd) in pkcs5_crypto_init()
538 return pkcs5_crypto_init_pbes2(params, passwd); in pkcs5_crypto_init()
529 pkcs5_crypto_init(struct pkcs5_params *params, const char *passwd) pkcs5_crypto_init() argument
566 pkcs5_decrypt(const u8 *enc_alg, size_t enc_alg_len, const u8 *enc_data, size_t enc_data_len, const char *passwd, size_t *data_len) pkcs5_decrypt() argument
[all...]
H A Dtlsv1_cred.c307 const char *passwd) in tlsv1_set_key_enc_pem()
314 if (passwd == NULL) in tlsv1_set_key_enc_pem()
327 pkey = crypto_private_key_import(der, der_len, passwd); in tlsv1_set_key_enc_pem()
425 const char *passwd) in pkcs12_pkcs8_keybag()
430 key = pkcs8_enc_key_import(buf, len, passwd); in pkcs12_pkcs8_keybag()
607 const u8 *buf, size_t len, const char *passwd) in pkcs12_safebag()
669 return pkcs12_pkcs8_keybag(cred, value, value_len, passwd); in pkcs12_safebag()
680 const char *passwd) in pkcs12_safecontents()
709 if (pkcs12_safebag(cred, hdr.payload, hdr.length, passwd) < 0) in pkcs12_safecontents()
720 const char *passwd) in pkcs12_parse_content_data()
305 tlsv1_set_key_enc_pem(const u8 *key, size_t len, const char *passwd) tlsv1_set_key_enc_pem() argument
423 pkcs12_pkcs8_keybag(struct tlsv1_credentials *cred, const u8 *buf, size_t len, const char *passwd) pkcs12_pkcs8_keybag() argument
606 pkcs12_safebag(struct tlsv1_credentials *cred, const u8 *buf, size_t len, const char *passwd) pkcs12_safebag() argument
678 pkcs12_safecontents(struct tlsv1_credentials *cred, const u8 *buf, size_t len, const char *passwd) pkcs12_safecontents() argument
718 pkcs12_parse_content_data(struct tlsv1_credentials *cred, const u8 *pos, const u8 *end, const char *passwd) pkcs12_parse_content_data() argument
737 pkcs12_parse_content_enc_data(struct tlsv1_credentials *cred, const u8 *pos, const u8 *end, const char *passwd) pkcs12_parse_content_enc_data() argument
843 pkcs12_parse_content(struct tlsv1_credentials *cred, const u8 *buf, size_t len, const char *passwd) pkcs12_parse_content() argument
884 pkcs12_parse(struct tlsv1_credentials *cred, const u8 *key, size_t len, const char *passwd) pkcs12_parse() argument
1006 tlsv1_set_key(struct tlsv1_credentials *cred, const u8 *key, size_t len, const char *passwd) tlsv1_set_key() argument
[all...]
/third_party/curl/lib/
H A Dcurl_sspi.c149 xcharp_u passwd, dup_passwd; in Curl_create_sspi_identity() local
201 passwd.tchar_ptr = curlx_convert_UTF8_to_tchar((char *)passwdp); in Curl_create_sspi_identity()
202 if(!passwd.tchar_ptr) in Curl_create_sspi_identity()
204 dup_passwd.tchar_ptr = _tcsdup(passwd.tchar_ptr); in Curl_create_sspi_identity()
206 curlx_unicodefree(passwd.tchar_ptr); in Curl_create_sspi_identity()
213 curlx_unicodefree(passwd.tchar_ptr); in Curl_create_sspi_identity()
/third_party/python/Lib/
H A Dgetpass.py44 passwd = None
62 passwd = fallback_getpass(prompt, stream)
77 passwd = _raw_input(prompt, stream, input=input)
82 if passwd is not None:
91 passwd = fallback_getpass(prompt, stream)
94 return passwd
/third_party/musl/Benchmark/musl/
H A Dlibc_pwd.cpp36 struct passwd pwd; in Bm_function_Getpwnam_r()
37 struct passwd *result; in Bm_function_Getpwnam_r()
53 struct passwd pwd; in Bm_function_Getpwuid_r()
54 struct passwd *result; in Bm_function_Getpwuid_r()
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/tls/
H A Dpkcs5.c384 pkcs5_crypto_init_pbes2(struct pkcs5_params *params, const char *passwd) in pkcs5_crypto_init_pbes2() argument
393 passwd, os_strlen(passwd)); in pkcs5_crypto_init_pbes2()
398 if (pbkdf2_sha1(passwd, params->salt, params->salt_len, in pkcs5_crypto_init_pbes2()
511 pkcs12_crypto_init_sha1(struct pkcs5_params *params, const char *passwd) in pkcs12_crypto_init_sha1() argument
522 pw_len = passwd ? os_strlen(passwd) : 0; in pkcs12_crypto_init_sha1()
528 WPA_PUT_BE16(&pw[2 * i], passwd[i]); in pkcs12_crypto_init_sha1()
552 const char *passwd) in pkcs5_crypto_init()
560 return pkcs5_crypto_init_pbes2(params, passwd); in pkcs5_crypto_init()
551 pkcs5_crypto_init(struct pkcs5_params *params, const char *passwd) pkcs5_crypto_init() argument
588 pkcs5_decrypt(const u8 *enc_alg, size_t enc_alg_len, const u8 *enc_data, size_t enc_data_len, const char *passwd, size_t *data_len) pkcs5_decrypt() argument
[all...]

Completed in 15 milliseconds

12345678910>>...15