/third_party/libuv/test/ |
H A D | test-get-passwd.c | 36 uv_passwd_t pwd; in TEST_IMPL() local 41 r = uv_os_get_passwd(&pwd); in TEST_IMPL() 43 len = strlen(pwd.username); in TEST_IMPL() 47 ASSERT_NULL(pwd.shell); in TEST_IMPL() 49 len = strlen(pwd.shell); in TEST_IMPL() 55 len = strlen(pwd.homedir); in TEST_IMPL() 59 if (len == 3 && pwd.homedir[1] == ':') in TEST_IMPL() 60 ASSERT_EQ(pwd.homedir[2], '\\'); in TEST_IMPL() 62 ASSERT_NE(pwd.homedir[len - 1], '\\'); in TEST_IMPL() 65 ASSERT_EQ(pwd in TEST_IMPL() 110 uv_passwd_t pwd; TEST_IMPL() local 176 uv_passwd_t pwd; TEST_IMPL() local [all...] |
H A D | test-platform-output.c | 37 uv_passwd_t pwd; in TEST_IMPL() local 151 err = uv_os_get_passwd(&pwd); in TEST_IMPL() 154 err = uv_os_get_group(&grp, pwd.gid); in TEST_IMPL() 157 ASSERT_EQ(pwd.uid, (unsigned long) -1); in TEST_IMPL() 158 ASSERT_EQ(pwd.gid, (unsigned long) -1); in TEST_IMPL() 163 ASSERT_EQ(pwd.gid, grp.gid); in TEST_IMPL() 167 printf(" euid: %ld\n", pwd.uid); in TEST_IMPL() 168 printf(" gid: %ld (%s)\n", pwd.gid, grp.groupname); in TEST_IMPL() 176 printf(" username: %s\n", pwd.username); in TEST_IMPL() 177 if (pwd in TEST_IMPL() [all...] |
/third_party/toybox/toys/pending/ |
H A D | useradd.c | 45 struct passwd pwd; in useradd_main() local 64 pwd.pw_name = s; in useradd_main() 65 pwd.pw_passwd = "x"; in useradd_main() 66 pwd.pw_gecos = TT.gecos ? TT.gecos : "Linux User,"; in useradd_main() 67 pwd.pw_dir = TT.dir ? TT.dir : xmprintf("/home/%s", *toys.optargs); in useradd_main() 79 pwd.pw_shell = TT.shell; in useradd_main() 90 pwd.pw_uid = TT.uid; in useradd_main() 97 if (getgrnam(pwd.pw_name)) error_exit("group '%s' in use", pwd.pw_name); in useradd_main() 101 pwd in useradd_main() [all...] |
H A D | crontab.c | 266 static void do_edit(struct passwd *pwd) in do_edit() argument 278 snprintf(toybuf, sizeof(toybuf), "%s%s", TT.cdir, pwd->pw_name); in do_edit() 286 } else printf("No crontab for '%s'- using an empty one\n", pwd->pw_name); in do_edit() 293 char *prog = pwd->pw_shell; in do_edit() 295 xsetuser(pwd); in do_edit() 296 if (pwd->pw_uid) { in do_edit() 297 if (setenv("USER", pwd->pw_name, 1)) _exit(1); in do_edit() 298 if (setenv("LOGNAME", pwd->pw_name, 1)) _exit(1); in do_edit() 300 if (setenv("HOME", pwd->pw_dir, 1)) _exit(1); in do_edit() 332 update_crontab(tname, pwd in do_edit() 338 struct passwd *pwd = NULL; crontab_main() local [all...] |
H A D | sulogin.c | 39 static int validate_password(char *pwd) in validate_password() argument 63 pass = crypt(toybuf, pwd); in validate_password() 65 if( pass && !strcmp(pass, pwd)) ret = 0; in validate_password() 79 struct passwd *pwd = NULL; in sulogin_main() local 100 if (!(pwd = getpwuid(0))) error_exit("invalid user"); in sulogin_main() 101 pass = pwd->pw_passwd; in sulogin_main() 104 if ((spwd = getspnam (pwd->pw_name))) pass = spwd->sp_pwdp; in sulogin_main() 116 || (shell = pwd->pw_shell)) in sulogin_main()
|
H A D | userdel.c | 93 struct passwd *pwd = xgetpwnam(*toys.optargs); in userdel_main() local 95 update_password("/etc/passwd", pwd->pw_name, NULL); in userdel_main() 96 update_password("/etc/shadow", pwd->pw_name, NULL); in userdel_main() 108 char *arg[] = {"rm", "-fr", pwd->pw_dir, NULL, NULL}; in userdel_main() 110 sprintf(toybuf, "/var/spool/mail/%s",pwd->pw_name); in userdel_main()
|
/third_party/toybox/toys/other/ |
H A D | login.c | 43 struct passwd *pwd = 0; in login_main() local 74 if ((pwd = getpwnam(username))) { in login_main() 76 if (TT.f || !*pwd->pw_passwd) break; in login_main() 79 if (*(pass = pwd->pw_passwd) == 'x') { in login_main() 95 syslog(LOG_WARNING, "invalid password for '%s' on %s %s%s", pwd->pw_name, in login_main() 102 pwd = 0; in login_main() 106 if (!pwd) error_exit("max retries (3)"); in login_main() 110 if (pwd->pw_uid && !access("/etc/nologin", R_OK)) { in login_main() 119 if (fchown(tty, pwd->pw_uid, pwd in login_main() [all...] |
/third_party/python/Lib/test/ |
H A D | test_pwd.py | 5 pwd = import_helper.import_module('pwd') variable 7 @unittest.skipUnless(hasattr(pwd, 'getpwall'), 'Does not have getpwall()') 11 entries = pwd.getpwall() 32 # self.assertEqual(pwd.getpwuid(e.pw_uid), e) 37 entries = pwd.getpwall() 53 self.assertIn(pwd.getpwnam(e.pw_name), entriesbyname[e.pw_name]) 54 self.assertIn(pwd.getpwuid(e.pw_uid), entriesbyuid[e.pw_uid]) 57 self.assertRaises(TypeError, pwd.getpwuid) 58 self.assertRaises(TypeError, pwd [all...] |
/third_party/ltp/testcases/open_posix_testsuite/conformance/interfaces/clock_getcpuclockid/ |
H A D | 5-1.c | 13 #include <pwd.h> 34 struct passwd *pwd; in main() 36 pwd = getpwnam("nobody"); in main() 37 if (pwd != NULL) { in main() 38 if (setgid(pwd->pw_gid)) { in main() 42 if (setuid(pwd->pw_uid)) { in main()
|
/third_party/toybox/openharmony/ |
H A D | su.c | 21 #include <pwd.h> 83 static void xsetuser(struct passwd *pwd) in xsetuser() argument 85 if (pwd == NULL) { in xsetuser() 88 if (initgroups(pwd->pw_name, pwd->pw_gid) || setgid(pwd->pw_uid) || setuid(pwd->pw_uid)) in xsetuser() 89 fprintf(stderr, "failed to set user %s, err = %d\n", pwd->pw_name, errno); in xsetuser()
|
/third_party/toybox/toys/posix/ |
H A D | pwd.c | 0 /* pwd.c - Print working directory. 5 * See http://opengroup.org/onlinepubs/9699919799/utilities/pwd.html 7 USE_PWD(NEWTOY(pwd, ">0LP[-LP]", TOYFLAG_BIN|TOYFLAG_MAYFORK)) 10 bool "pwd" 13 usage: pwd [-L|-P] 26 char *s, *pwd = getcwd(0, 0), *PWD; in pwd_main() local 43 if (s && pwd) in pwd_main() 44 if (stat(pwd, &st1) || stat(PWD, &st2) || st1.st_ino != st2.st_ino || in pwd_main() 49 if (s || (s = pwd)) puts(s); in pwd_main() 50 free(pwd); in pwd_main() [all...] |
/third_party/mbedtls/library/ |
H A D | pem.c | 77 const unsigned char *pwd, size_t pwdlen) in pem_pbkdf1() 94 * key[ 0..15] = MD5(pwd || IV) in pem_pbkdf1() 99 if ((ret = mbedtls_md_update(&md5_ctx, pwd, pwdlen)) != 0) { in pem_pbkdf1() 117 * key[16..23] = MD5(key[ 0..15] || pwd || IV]) in pem_pbkdf1() 125 if ((ret = mbedtls_md_update(&md5_ctx, pwd, pwdlen)) != 0) { in pem_pbkdf1() 155 const unsigned char *pwd, size_t pwdlen) in pem_des_decrypt() 163 if ((ret = pem_pbkdf1(des_key, 8, des_iv, pwd, pwdlen)) != 0) { in pem_des_decrypt() 185 const unsigned char *pwd, size_t pwdlen) in pem_des3_decrypt() 193 if ((ret = pem_pbkdf1(des3_key, 24, des3_iv, pwd, pwdlen)) != 0) { in pem_des3_decrypt() 217 const unsigned char *pwd, size_ in pem_aes_decrypt() 75 pem_pbkdf1(unsigned char *key, size_t keylen, unsigned char *iv, const unsigned char *pwd, size_t pwdlen) pem_pbkdf1() argument 153 pem_des_decrypt(unsigned char des_iv[8], unsigned char *buf, size_t buflen, const unsigned char *pwd, size_t pwdlen) pem_des_decrypt() argument 183 pem_des3_decrypt(unsigned char des3_iv[8], unsigned char *buf, size_t buflen, const unsigned char *pwd, size_t pwdlen) pem_des3_decrypt() argument 215 pem_aes_decrypt(unsigned char aes_iv[16], unsigned int keylen, unsigned char *buf, size_t buflen, const unsigned char *pwd, size_t pwdlen) pem_aes_decrypt() argument 268 mbedtls_pem_read_buffer(mbedtls_pem_context *ctx, const char *header, const char *footer, const unsigned char *data, const unsigned char *pwd, size_t pwdlen, size_t *use_len) mbedtls_pem_read_buffer() argument [all...] |
H A D | pkcs12.c | 77 const unsigned char *pwd, size_t pwdlen, in pkcs12_pbe_derive_key_iv() 99 unipwd[i * 2 + 1] = pwd[i]; in pkcs12_pbe_derive_key_iv() 125 const unsigned char *pwd, size_t pwdlen, 134 const unsigned char *pwd, size_t pwdlen, in mbedtls_pkcs12_pbe() 145 pwd, pwdlen, data, len, output, SIZE_MAX, in mbedtls_pkcs12_pbe() 152 const unsigned char *pwd, size_t pwdlen, in mbedtls_pkcs12_pbe_ext() 166 if (pwd == NULL && pwdlen != 0) { in mbedtls_pkcs12_pbe_ext() 191 if ((ret = pkcs12_pbe_derive_key_iv(pbe_params, md_type, pwd, pwdlen, in mbedtls_pkcs12_pbe_ext() 327 const unsigned char *pwd, size_t pwdlen, in mbedtls_pkcs12_derivation() 349 if (pwd in mbedtls_pkcs12_derivation() 76 pkcs12_pbe_derive_key_iv(mbedtls_asn1_buf *pbe_params, mbedtls_md_type_t md_type, const unsigned char *pwd, size_t pwdlen, unsigned char *key, size_t keylen, unsigned char *iv, size_t ivlen) pkcs12_pbe_derive_key_iv() argument 132 mbedtls_pkcs12_pbe(mbedtls_asn1_buf *pbe_params, int mode, mbedtls_cipher_type_t cipher_type, mbedtls_md_type_t md_type, const unsigned char *pwd, size_t pwdlen, const unsigned char *data, size_t len, unsigned char *output) mbedtls_pkcs12_pbe() argument 150 mbedtls_pkcs12_pbe_ext(mbedtls_asn1_buf *pbe_params, int mode, mbedtls_cipher_type_t cipher_type, mbedtls_md_type_t md_type, const unsigned char *pwd, size_t pwdlen, const unsigned char *data, size_t len, unsigned char *output, size_t output_size, size_t *output_len) mbedtls_pkcs12_pbe_ext() argument 326 mbedtls_pkcs12_derivation(unsigned char *data, size_t datalen, const unsigned char *pwd, size_t pwdlen, const unsigned char *salt, size_t saltlen, mbedtls_md_type_t md_type, int id, int iterations) mbedtls_pkcs12_derivation() argument [all...] |
H A D | pkparse.c | 868 const unsigned char *pwd, size_t pwdlen, in mbedtls_pk_parse_key_pkcs8_encrypted_der() 928 pwd, pwdlen, p, len, buf, len, &outlen)) != 0) { in mbedtls_pk_parse_key_pkcs8_encrypted_der() 941 if ((ret = mbedtls_pkcs5_pbes2_ext(&pbe_params, MBEDTLS_PKCS5_DECRYPT, pwd, pwdlen, in mbedtls_pk_parse_key_pkcs8_encrypted_der() 954 ((void) pwd); in mbedtls_pk_parse_key_pkcs8_encrypted_der() 975 const unsigned char *pwd, size_t pwdlen, in mbedtls_pk_parse_key() 999 key, pwd, pwdlen, &len); in mbedtls_pk_parse_key() 1029 key, pwd, pwdlen, &len); in mbedtls_pk_parse_key() 1084 pwd, pwdlen, f_rng, p_rng)) != 0) { in mbedtls_pk_parse_key() 1095 ((void) pwd); in mbedtls_pk_parse_key() 1117 pwd, pwdle in mbedtls_pk_parse_key() 865 mbedtls_pk_parse_key_pkcs8_encrypted_der( mbedtls_pk_context *pk, unsigned char *key, size_t keylen, const unsigned char *pwd, size_t pwdlen, int (*f_rng)(void *, unsigned char *, size_t), void *p_rng) mbedtls_pk_parse_key_pkcs8_encrypted_der() argument 973 mbedtls_pk_parse_key(mbedtls_pk_context *pk, const unsigned char *key, size_t keylen, const unsigned char *pwd, size_t pwdlen, int (*f_rng)(void *, unsigned char *, size_t), void *p_rng) mbedtls_pk_parse_key() argument 1347 mbedtls_pk_parse_keyfile(mbedtls_pk_context *ctx, const char *path, const char *pwd, int (*f_rng)(void *, unsigned char *, size_t), void *p_rng) mbedtls_pk_parse_keyfile() argument [all...] |
/third_party/node/test/parallel/ |
H A D | test-os.js | 219 const pwd = os.userInfo(); 220 is.object(pwd); 224 assert.strictEqual(pwd.uid, -1); 225 assert.strictEqual(pwd.gid, -1); 226 assert.strictEqual(pwd.shell, null); 231 is.number(pwd.uid); 232 is.number(pwd.gid); 233 assert.strictEqual(typeof pwd.shell, 'string'); 235 if (pwd.shell.length > 0) { 236 assert(pwd [all...] |
/third_party/selinux/libselinux/utils/ |
H A D | togglesebool.c | 8 #include <pwd.h> 81 struct passwd *pwd = getpwuid(getuid()); in main() local 83 if (pwd && pwd->pw_name) in main() 86 argv[i], pwd->pw_name); in main()
|
/third_party/curl/tests/ |
H A D | testcurl.pl | 71 use vars qw($version $fixed $infixed $CURLDIR $git $pwd $build $buildlog 226 chdir $pwd; # cd back to the original root dir 228 if ($pwd && $build) { 231 rmtree "$pwd/$build"; 244 my $configfile = "$pwd/$build/lib/curl_config.h"; 361 # Make $pwd to become the path without newline. We'll use that in order to cut 363 $pwd = getcwd(); 389 $buildlog="$pwd/$buildlogname"; 544 chdir "$pwd/$build"; 643 s/$pwd// [all...] |
/third_party/ltp/testcases/kernel/syscalls/execve/ |
H A D | execve02.c | 23 #include <pwd.h> 69 struct passwd *pwd; in setup() local 73 pwd = SAFE_GETPWNAM(USER_NAME); in setup() 74 nobody_uid = pwd->pw_uid; in setup()
|
/third_party/musl/libc-test/src/functionalext/supplement/passwd/ |
H A D | getgrouplist.c | 18 #include <pwd.h> 36 struct passwd *pwd = getpwnam(server_user); in getgrouplist_0100() local 37 if (!pwd) { in getgrouplist_0100() 41 gid_t server_gid = pwd->pw_gid; in getgrouplist_0100()
|
/third_party/node/deps/uv/src/unix/ |
H A D | core.c | 43 #include <pwd.h> 1081 uv_passwd_t pwd; in uv_os_homedir() local 1094 r = uv__getpwuid_r(&pwd); in uv_os_homedir() 1100 len = strlen(pwd.homedir); in uv_os_homedir() 1104 uv_os_free_passwd(&pwd); in uv_os_homedir() 1108 memcpy(buffer, pwd.homedir, len + 1); in uv_os_homedir() 1110 uv_os_free_passwd(&pwd); in uv_os_homedir() 1167 int uv__getpwuid_r(uv_passwd_t* pwd) { in uv__getpwuid_r() argument 1178 if (pwd == NULL) in uv__getpwuid_r() 1213 pwd in uv__getpwuid_r() 1241 uv_os_free_passwd(uv_passwd_t* pwd) uv_os_free_passwd() argument 1257 uv_os_get_passwd(uv_passwd_t* pwd) uv_os_get_passwd() argument [all...] |
/third_party/musl/Benchmark/musl/ |
H A D | libc_pwd.cpp | 16 #include "pwd.h" 36 struct passwd pwd; in Bm_function_Getpwnam_r() local 45 benchmark::DoNotOptimize(getpwnam_r("root", &pwd, buf, bufSize, &result)); in Bm_function_Getpwnam_r() 53 struct passwd pwd; in Bm_function_Getpwuid_r() local 62 benchmark::DoNotOptimize(getpwuid_r(0, &pwd, buf, bufSize, &result)); in Bm_function_Getpwuid_r()
|
/third_party/node/deps/uv/src/win/ |
H A D | util.c | 1083 uv_passwd_t pwd; in uv_os_homedir() local 1097 r = uv__getpwuid_r(&pwd); in uv_os_homedir() 1103 len = strlen(pwd.homedir); in uv_os_homedir() 1107 uv_os_free_passwd(&pwd); in uv_os_homedir() 1111 memcpy(buffer, pwd.homedir, len + 1); in uv_os_homedir() 1113 uv_os_free_passwd(&pwd); in uv_os_homedir() 1184 void uv_os_free_passwd(uv_passwd_t* pwd) { in uv_os_free_passwd() argument 1185 if (pwd == NULL) in uv_os_free_passwd() 1188 uv__free(pwd->username); in uv_os_free_passwd() 1189 uv__free(pwd in uv_os_free_passwd() 1291 uv__getpwuid_r(uv_passwd_t* pwd) uv__getpwuid_r() argument 1364 uv_os_get_passwd(uv_passwd_t* pwd) uv_os_get_passwd() argument [all...] |
/third_party/node/src/ |
H A D | node_credentials.cc | 8 #include <pwd.h> // getpwnam() 147 struct passwd pwd; in uid_by_name() local 154 if (getpwnam_r(name, &pwd, buf, sizeof(buf), &pp) == 0 && pp != nullptr) in uid_by_name() 161 struct passwd pwd; in name_by_uid() local 169 if ((rc = getpwuid_r(uid, &pwd, buf, sizeof(buf), &pp)) == 0 && in name_by_uid() 180 struct group pwd; in gid_by_name() local 187 if (getgrnam_r(name, &pwd, buf, sizeof(buf), &pp) == 0 && pp != nullptr) in gid_by_name() 195 struct group pwd; 203 if ((rc = getgrgid_r(gid, &pwd, buf, sizeof(buf), &pp)) == 0 &&
|
H A D | node_os.cc | 274 uv_passwd_t pwd; in GetUserInfo() local 290 const int err = uv_os_get_passwd(&pwd); in GetUserInfo() 299 auto free_passwd = OnScopeLeave([&]() { uv_os_free_passwd(&pwd); }); in GetUserInfo() 303 Local<Value> uid = Number::New(env->isolate(), pwd.uid); in GetUserInfo() 304 Local<Value> gid = Number::New(env->isolate(), pwd.gid); in GetUserInfo() 306 pwd.username, in GetUserInfo() 310 pwd.homedir, in GetUserInfo() 315 if (pwd.shell == nullptr) in GetUserInfo() 318 shell = StringBytes::Encode(env->isolate(), pwd.shell, encoding, &error); in GetUserInfo()
|
/third_party/python/Lib/ |
H A D | zipfile.py | 587 def _ZipDecrypter(pwd): 608 for p in pwd: 823 def __init__(self, fileobj, mode, zipinfo, pwd=None, 826 self._pwd = pwd 862 if pwd: 1265 self.pwd = None 1490 def setpassword(self, pwd): 1492 if pwd and not isinstance(pwd, bytes): 1493 raise TypeError("pwd [all...] |