Home
last modified time | relevance | path

Searched refs:passwd (Results 26 - 50 of 416) sorted by relevance

12345678910>>...17

/third_party/python/Lib/
H A Dgetpass.py44 passwd = None
62 passwd = fallback_getpass(prompt, stream)
77 passwd = _raw_input(prompt, stream, input=input)
82 if passwd is not None:
91 passwd = fallback_getpass(prompt, stream)
94 return passwd
H A Dftplib.py9 >>> ftp.login() # default, i.e.: user anonymous, passwd anonymous@
78 host, user, passwd, acct, timeout, source_address, encoding
109 def __init__(self, host='', user='', passwd='', acct='',
115 and user, passwd, acct (for login()).
123 self.login(user, passwd, acct)
395 def login(self, user = '', passwd = '', acct = ''):
399 if not passwd:
400 passwd = ''
403 if user == 'anonymous' and passwd in {'', '-'}:
411 passwd
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/tls/
H A Dtlsv1_cred.c307 const char *passwd) in tlsv1_set_key_enc_pem()
314 if (passwd == NULL) in tlsv1_set_key_enc_pem()
327 pkey = crypto_private_key_import(der, der_len, passwd); in tlsv1_set_key_enc_pem()
425 const char *passwd) in pkcs12_pkcs8_keybag()
430 key = pkcs8_enc_key_import(buf, len, passwd); in pkcs12_pkcs8_keybag()
607 const u8 *buf, size_t len, const char *passwd) in pkcs12_safebag()
669 return pkcs12_pkcs8_keybag(cred, value, value_len, passwd); in pkcs12_safebag()
680 const char *passwd) in pkcs12_safecontents()
709 if (pkcs12_safebag(cred, hdr.payload, hdr.length, passwd) < 0) in pkcs12_safecontents()
720 const char *passwd) in pkcs12_parse_content_data()
305 tlsv1_set_key_enc_pem(const u8 *key, size_t len, const char *passwd) tlsv1_set_key_enc_pem() argument
423 pkcs12_pkcs8_keybag(struct tlsv1_credentials *cred, const u8 *buf, size_t len, const char *passwd) pkcs12_pkcs8_keybag() argument
606 pkcs12_safebag(struct tlsv1_credentials *cred, const u8 *buf, size_t len, const char *passwd) pkcs12_safebag() argument
678 pkcs12_safecontents(struct tlsv1_credentials *cred, const u8 *buf, size_t len, const char *passwd) pkcs12_safecontents() argument
718 pkcs12_parse_content_data(struct tlsv1_credentials *cred, const u8 *pos, const u8 *end, const char *passwd) pkcs12_parse_content_data() argument
737 pkcs12_parse_content_enc_data(struct tlsv1_credentials *cred, const u8 *pos, const u8 *end, const char *passwd) pkcs12_parse_content_enc_data() argument
843 pkcs12_parse_content(struct tlsv1_credentials *cred, const u8 *buf, size_t len, const char *passwd) pkcs12_parse_content() argument
884 pkcs12_parse(struct tlsv1_credentials *cred, const u8 *key, size_t len, const char *passwd) pkcs12_parse() argument
1006 tlsv1_set_key(struct tlsv1_credentials *cred, const u8 *key, size_t len, const char *passwd) tlsv1_set_key() argument
[all...]
/test/xts/acts/commonlibrary/thirdparty/musl/entry/src/main/cpp/
H A Dpwdndk.cpp42 struct passwd *p = getpwent(); in Getpwent()
55 struct passwd *getval = getpwent(); in Setpwent()
82 struct passwd *pw = nullptr; in Getpwnam()
106 struct passwd pwd = {PARAM_0}; in GetpwnamR()
107 struct passwd *p = nullptr; in GetpwnamR()
122 struct passwd pw = {PARAM_0}; in GetpwuidR()
123 struct passwd *res = nullptr; in GetpwuidR()
138 struct passwd *ret = nullptr; in Getpwuid()
/third_party/musl/Benchmark/musl/
H A Dlibc_pwd.cpp36 struct passwd pwd; in Bm_function_Getpwnam_r()
37 struct passwd *result; in Bm_function_Getpwnam_r()
53 struct passwd pwd; in Bm_function_Getpwuid_r()
54 struct passwd *result; in Bm_function_Getpwuid_r()
/third_party/musl/src/passwd/
H A Dfgetpwent.c4 struct passwd *fgetpwent(FILE *f) in fgetpwent()
7 static struct passwd pw; in fgetpwent()
9 struct passwd *res; in fgetpwent()
/third_party/ltp/testcases/kernel/security/mmc_security/
H A Dask_password.sh52 while [ -z "$passwd" ]; do
53 read -s -p "MMC password: " passwd; echo
55 if ! keyctl instantiate $1 "$passwd" $2 >/dev/null 2>&1; then
/kernel/liteos_a/testsuites/unittest/libc/sys/full/
H A Dsys_test_021.cpp35 struct passwd pwd; in TestCase()
36 struct passwd *user1 = nullptr; in TestCase()
37 struct passwd *user2 = nullptr; in TestCase()
38 struct passwd *user3 = nullptr; in TestCase()
39 struct passwd *user4 = nullptr; in TestCase()
40 struct passwd *user5 = nullptr; in TestCase()
44 CHAR *pathList[] = {"/etc/group", "/etc/passwd"}; in TestCase()
48 ret = PrepareFileEnv(pathList, streamList, streamLen, 2); /* 2, group & passwd */ in TestCase()
51 (VOID)RecoveryFileEnv(pathList, 2); /* 2, group & passwd */ in TestCase()
113 (VOID)RecoveryFileEnv(pathList, 2); /* 2, group & passwd */ in TestCase()
[all...]
H A Dsys_test_018.cpp35 struct passwd *user1 = nullptr; in TestCase()
36 struct passwd *user2 = nullptr; in TestCase()
37 struct passwd *user3 = nullptr; in TestCase()
38 struct passwd *user4 = nullptr; in TestCase()
40 CHAR *pathList[] = {"/etc/group", "/etc/passwd"}; in TestCase()
44 ret = PrepareFileEnv(pathList, streamList, streamLen, 2); /* 2, group & passwd */ in TestCase()
47 (VOID)RecoveryFileEnv(pathList, 2); /* 2, group & passwd */ in TestCase()
88 (VOID)RecoveryFileEnv(pathList, 2); /* 2, group & passwd */ in TestCase()
91 (VOID)RecoveryFileEnv(pathList, 2); /* 2, group & passwd */ in TestCase()
H A Dsys_test_020.cpp35 struct passwd *user1 = nullptr; in TestCase()
36 struct passwd *user2 = nullptr; in TestCase()
37 struct passwd *user3 = nullptr; in TestCase()
38 struct passwd *user4 = nullptr; in TestCase()
40 CHAR *pathList[] = {"/etc/group", "/etc/passwd"}; in TestCase()
44 ret = PrepareFileEnv(pathList, streamList, streamLen, 2); /* 2, group & passwd */ in TestCase()
47 (VOID)RecoveryFileEnv(pathList, 2); /* 2, group & passwd */ in TestCase()
90 (VOID)RecoveryFileEnv(pathList, 2); /* 2, group & passwd */ in TestCase()
93 (VOID)RecoveryFileEnv(pathList, 2); /* 2, group & passwd */ in TestCase()
/third_party/ltp/testcases/kernel/syscalls/setresgid/
H A Dsetresgid01.c87 struct passwd *exp_rgid; /* Expected real GID */
88 struct passwd *exp_egid; /* Expected effective GID */
89 struct passwd *exp_sgid; /* Expected saved GID */
95 static struct passwd nobody, root;
182 struct passwd *passwd_p; in setup()
/third_party/toybox/openharmony/
H A Dsu.c35 struct passwd *xgetpwnam(char *name) in xgetpwnam()
37 struct passwd *up = getpwnam(name); in xgetpwnam()
56 static void reset_env(struct passwd *p, int clear) in reset_env()
83 static void xsetuser(struct passwd *pwd) in xsetuser()
95 printf("\t-s Shell to use (default is user's shell from /etc/passwd)\n"); in usage()
104 struct passwd *up; in main()
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/tls/
H A Dpkcs5.c384 pkcs5_crypto_init_pbes2(struct pkcs5_params *params, const char *passwd) in pkcs5_crypto_init_pbes2() argument
393 passwd, os_strlen(passwd)); in pkcs5_crypto_init_pbes2()
398 if (pbkdf2_sha1(passwd, params->salt, params->salt_len, in pkcs5_crypto_init_pbes2()
511 pkcs12_crypto_init_sha1(struct pkcs5_params *params, const char *passwd) in pkcs12_crypto_init_sha1() argument
522 pw_len = passwd ? os_strlen(passwd) : 0; in pkcs12_crypto_init_sha1()
528 WPA_PUT_BE16(&pw[2 * i], passwd[i]); in pkcs12_crypto_init_sha1()
552 const char *passwd) in pkcs5_crypto_init()
560 return pkcs5_crypto_init_pbes2(params, passwd); in pkcs5_crypto_init()
551 pkcs5_crypto_init(struct pkcs5_params *params, const char *passwd) pkcs5_crypto_init() argument
588 pkcs5_decrypt(const u8 *enc_alg, size_t enc_alg_len, const u8 *enc_data, size_t enc_data_len, const char *passwd, size_t *data_len) pkcs5_decrypt() argument
[all...]
H A Dtlsv1_cred.c307 const char *passwd) in tlsv1_set_key_enc_pem()
314 if (passwd == NULL) in tlsv1_set_key_enc_pem()
327 pkey = crypto_private_key_import(der, der_len, passwd); in tlsv1_set_key_enc_pem()
425 const char *passwd) in pkcs12_pkcs8_keybag()
430 key = pkcs8_enc_key_import(buf, len, passwd); in pkcs12_pkcs8_keybag()
623 const u8 *buf, size_t len, const char *passwd) in pkcs12_safebag()
691 return pkcs12_pkcs8_keybag(cred, value, value_len, passwd); in pkcs12_safebag()
702 const char *passwd) in pkcs12_safecontents()
736 if (pkcs12_safebag(cred, hdr.payload, hdr.length, passwd) < 0) in pkcs12_safecontents()
747 const char *passwd) in pkcs12_parse_content_data()
305 tlsv1_set_key_enc_pem(const u8 *key, size_t len, const char *passwd) tlsv1_set_key_enc_pem() argument
423 pkcs12_pkcs8_keybag(struct tlsv1_credentials *cred, const u8 *buf, size_t len, const char *passwd) pkcs12_pkcs8_keybag() argument
622 pkcs12_safebag(struct tlsv1_credentials *cred, const u8 *buf, size_t len, const char *passwd) pkcs12_safebag() argument
700 pkcs12_safecontents(struct tlsv1_credentials *cred, const u8 *buf, size_t len, const char *passwd) pkcs12_safecontents() argument
745 pkcs12_parse_content_data(struct tlsv1_credentials *cred, const u8 *pos, const u8 *end, const char *passwd) pkcs12_parse_content_data() argument
767 pkcs12_parse_content_enc_data(struct tlsv1_credentials *cred, const u8 *pos, const u8 *end, const char *passwd) pkcs12_parse_content_enc_data() argument
882 pkcs12_parse_content(struct tlsv1_credentials *cred, const u8 *buf, size_t len, const char *passwd) pkcs12_parse_content() argument
925 pkcs12_parse(struct tlsv1_credentials *cred, const u8 *key, size_t len, const char *passwd) pkcs12_parse() argument
1062 tlsv1_set_key(struct tlsv1_credentials *cred, const u8 *key, size_t len, const char *passwd) tlsv1_set_key() argument
[all...]
/third_party/lwip/src/netif/ppp/
H A Dauth.c171 int (*pap_auth_hook) (char *user, char *passwd, char **msgp,
179 int (*pap_passwd_hook) (char *user, char *passwd) = NULL;
185 int (*chap_passwd_hook) (char *user, char *passwd) = NULL;
213 bool uselogin = 0; /* Use /etc/passwd for checking PAP */
370 { "password", o_string, passwd,
467 if (override_value("passwd", option_priority, fname)) {
468 strlcpy(ppp_settings.passwd, p, sizeof(ppp_settings.passwd));
843 upap_authwithpeer(pcb, pcb->settings.user, pcb->settings.passwd); in link_established()
999 * auth_check_passwd - Check the user name and passwd agains
[all...]
/third_party/python/Modules/
H A Dpwdmodule.c80 mkpwent(PyObject *module, struct passwd *p) in mkpwent()
133 struct passwd *p; in pwd_getpwuid()
146 struct passwd pwd; in pwd_getpwuid()
217 struct passwd *p; in pwd_getpwnam_impl()
229 struct passwd pwd; in pwd_getpwnam_impl()
294 struct passwd *p; in pwd_getpwall_impl()
/third_party/libwebsockets/lib/plat/unix/
H A Dunix-caps.c56 struct passwd *p;
91 struct passwd pr;
113 struct passwd *p;
143 struct passwd pr;
200 struct passwd pr;
/third_party/pulseaudio/src/tests/
H A Dusergroup-test.c35 static int load_reference_structs(struct group **gr, struct passwd **pw) { in load_reference_structs()
81 static int compare_passwd(const struct passwd *a, const struct passwd *b) { in compare_passwd()
122 struct passwd *pw; in START_TEST()
124 struct passwd *reference_passwd = NULL; in START_TEST()
/third_party/curl/lib/
H A Dcurl_sasl.c373 if((enabledmechs & SASL_MECH_EXTERNAL) && !conn->passwd[0]) { in Curl_sasl_start()
393 conn->passwd, in Curl_sasl_start()
412 conn->passwd, &conn->gsasl); in Curl_sasl_start()
425 conn->passwd, &conn->gsasl); in Curl_sasl_start()
454 conn->user, conn->passwd, in Curl_sasl_start()
491 conn->user, conn->passwd, in Curl_sasl_start()
576 conn->user, conn->passwd, &resp); in Curl_sasl_continue()
583 result = Curl_auth_create_login_message(conn->passwd, &resp); in Curl_sasl_continue()
602 conn->passwd, &resp); in Curl_sasl_continue()
608 conn->user, conn->passwd, in Curl_sasl_continue()
[all...]
H A Dldap.c222 const char *passwd, unsigned long authflags) in ldap_win_bind_auth()
252 if(method && user && passwd) { in ldap_win_bind_auth()
253 rc = Curl_create_sspi_identity(user, passwd, &cred); in ldap_win_bind_auth()
269 const char *user, const char *passwd) in ldap_win_bind()
276 if(user && passwd && (data->set.httpauth & CURLAUTH_BASIC)) { in ldap_win_bind()
278 inpass = curlx_convert_UTF8_to_tchar((char *) passwd); in ldap_win_bind()
287 rc = ldap_win_bind_auth(server, user, passwd, data->set.httpauth); in ldap_win_bind()
325 char *passwd = NULL; in ldap_do() local
362 passwd = conn->passwd; in ldap_do()
221 ldap_win_bind_auth(LDAP *server, const char *user, const char *passwd, unsigned long authflags) ldap_win_bind_auth() argument
268 ldap_win_bind(struct Curl_easy *data, LDAP *server, const char *user, const char *passwd) ldap_win_bind() argument
[all...]
/kernel/linux/linux-6.6/fs/smb/client/
H A Dsmbencrypt.c72 E_md4hash(const unsigned char *passwd, unsigned char *p16, in E_md4hash() argument
80 if (passwd) /* Password must be converted to NT unicode */ in E_md4hash()
81 len = cifs_strtoUTF16(wpwd, passwd, 128, codepage); in E_md4hash()
/third_party/curl/lib/vauth/
H A Dcleartext.c57 * passwd [in] - The password.
64 const char *passwd, in Curl_auth_create_plain_message()
75 plen = strlen(passwd); in Curl_auth_create_plain_message()
93 memcpy(plainauth + zlen + clen + 2, passwd, plen); in Curl_auth_create_plain_message()
62 Curl_auth_create_plain_message(const char *authzid, const char *authcid, const char *passwd, struct bufref *out) Curl_auth_create_plain_message() argument
H A Ddigest_sspi.c432 /* If the user/passwd that was used to make the identity for http_context in Curl_auth_create_digest_http_message()
435 (passwdp && !digest->passwd) || (!passwdp && digest->passwd) || in Curl_auth_create_digest_http_message()
437 (passwdp && digest->passwd && Curl_timestrcmp(passwdp, digest->passwd))) { in Curl_auth_create_digest_http_message()
443 Curl_safefree(digest->passwd); in Curl_auth_create_digest_http_message()
487 /* free the copy of user/passwd used to make the previous identity */ in Curl_auth_create_digest_http_message()
489 Curl_safefree(digest->passwd); in Curl_auth_create_digest_http_message()
522 digest->passwd = strdup(passwdp); in Curl_auth_create_digest_http_message()
524 if(!digest->passwd) { in Curl_auth_create_digest_http_message()
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/
H A Dcrypto_internal-rsa.c40 const char *passwd) in crypto_private_key_import()
49 if (passwd) { in crypto_private_key_import()
51 res = pkcs8_enc_key_import(key, len, passwd); in crypto_private_key_import()
38 crypto_private_key_import(const u8 *key, size_t len, const char *passwd) crypto_private_key_import() argument
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/
H A Dcrypto_internal-rsa.c40 const char *passwd) in crypto_private_key_import()
49 if (passwd) { in crypto_private_key_import()
51 res = pkcs8_enc_key_import(key, len, passwd); in crypto_private_key_import()
38 crypto_private_key_import(const u8 *key, size_t len, const char *passwd) crypto_private_key_import() argument

Completed in 13 milliseconds

12345678910>>...17