/third_party/python/Lib/ |
H A D | getpass.py | 44 passwd = None 62 passwd = fallback_getpass(prompt, stream) 77 passwd = _raw_input(prompt, stream, input=input) 82 if passwd is not None: 91 passwd = fallback_getpass(prompt, stream) 94 return passwd
|
H A D | ftplib.py | 9 >>> ftp.login() # default, i.e.: user anonymous, passwd anonymous@ 78 host, user, passwd, acct, timeout, source_address, encoding 109 def __init__(self, host='', user='', passwd='', acct='', 115 and user, passwd, acct (for login()). 123 self.login(user, passwd, acct) 395 def login(self, user = '', passwd = '', acct = ''): 399 if not passwd: 400 passwd = '' 403 if user == 'anonymous' and passwd in {'', '-'}: 411 passwd [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/tls/ |
H A D | tlsv1_cred.c | 307 const char *passwd) in tlsv1_set_key_enc_pem() 314 if (passwd == NULL) in tlsv1_set_key_enc_pem() 327 pkey = crypto_private_key_import(der, der_len, passwd); in tlsv1_set_key_enc_pem() 425 const char *passwd) in pkcs12_pkcs8_keybag() 430 key = pkcs8_enc_key_import(buf, len, passwd); in pkcs12_pkcs8_keybag() 607 const u8 *buf, size_t len, const char *passwd) in pkcs12_safebag() 669 return pkcs12_pkcs8_keybag(cred, value, value_len, passwd); in pkcs12_safebag() 680 const char *passwd) in pkcs12_safecontents() 709 if (pkcs12_safebag(cred, hdr.payload, hdr.length, passwd) < 0) in pkcs12_safecontents() 720 const char *passwd) in pkcs12_parse_content_data() 305 tlsv1_set_key_enc_pem(const u8 *key, size_t len, const char *passwd) tlsv1_set_key_enc_pem() argument 423 pkcs12_pkcs8_keybag(struct tlsv1_credentials *cred, const u8 *buf, size_t len, const char *passwd) pkcs12_pkcs8_keybag() argument 606 pkcs12_safebag(struct tlsv1_credentials *cred, const u8 *buf, size_t len, const char *passwd) pkcs12_safebag() argument 678 pkcs12_safecontents(struct tlsv1_credentials *cred, const u8 *buf, size_t len, const char *passwd) pkcs12_safecontents() argument 718 pkcs12_parse_content_data(struct tlsv1_credentials *cred, const u8 *pos, const u8 *end, const char *passwd) pkcs12_parse_content_data() argument 737 pkcs12_parse_content_enc_data(struct tlsv1_credentials *cred, const u8 *pos, const u8 *end, const char *passwd) pkcs12_parse_content_enc_data() argument 843 pkcs12_parse_content(struct tlsv1_credentials *cred, const u8 *buf, size_t len, const char *passwd) pkcs12_parse_content() argument 884 pkcs12_parse(struct tlsv1_credentials *cred, const u8 *key, size_t len, const char *passwd) pkcs12_parse() argument 1006 tlsv1_set_key(struct tlsv1_credentials *cred, const u8 *key, size_t len, const char *passwd) tlsv1_set_key() argument [all...] |
/test/xts/acts/commonlibrary/thirdparty/musl/entry/src/main/cpp/ |
H A D | pwdndk.cpp | 42 struct passwd *p = getpwent();
in Getpwent() 55 struct passwd *getval = getpwent();
in Setpwent() 82 struct passwd *pw = nullptr;
in Getpwnam() 106 struct passwd pwd = {PARAM_0};
in GetpwnamR() 107 struct passwd *p = nullptr;
in GetpwnamR() 122 struct passwd pw = {PARAM_0};
in GetpwuidR() 123 struct passwd *res = nullptr;
in GetpwuidR() 138 struct passwd *ret = nullptr;
in Getpwuid()
|
/third_party/musl/Benchmark/musl/ |
H A D | libc_pwd.cpp | 36 struct passwd pwd; in Bm_function_Getpwnam_r() 37 struct passwd *result; in Bm_function_Getpwnam_r() 53 struct passwd pwd; in Bm_function_Getpwuid_r() 54 struct passwd *result; in Bm_function_Getpwuid_r()
|
/third_party/musl/src/passwd/ |
H A D | fgetpwent.c | 4 struct passwd *fgetpwent(FILE *f) in fgetpwent() 7 static struct passwd pw; in fgetpwent() 9 struct passwd *res; in fgetpwent()
|
/third_party/ltp/testcases/kernel/security/mmc_security/ |
H A D | ask_password.sh | 52 while [ -z "$passwd" ]; do 53 read -s -p "MMC password: " passwd; echo 55 if ! keyctl instantiate $1 "$passwd" $2 >/dev/null 2>&1; then
|
/kernel/liteos_a/testsuites/unittest/libc/sys/full/ |
H A D | sys_test_021.cpp | 35 struct passwd pwd; in TestCase() 36 struct passwd *user1 = nullptr; in TestCase() 37 struct passwd *user2 = nullptr; in TestCase() 38 struct passwd *user3 = nullptr; in TestCase() 39 struct passwd *user4 = nullptr; in TestCase() 40 struct passwd *user5 = nullptr; in TestCase() 44 CHAR *pathList[] = {"/etc/group", "/etc/passwd"}; in TestCase() 48 ret = PrepareFileEnv(pathList, streamList, streamLen, 2); /* 2, group & passwd */ in TestCase() 51 (VOID)RecoveryFileEnv(pathList, 2); /* 2, group & passwd */ in TestCase() 113 (VOID)RecoveryFileEnv(pathList, 2); /* 2, group & passwd */ in TestCase() [all...] |
H A D | sys_test_018.cpp | 35 struct passwd *user1 = nullptr; in TestCase() 36 struct passwd *user2 = nullptr; in TestCase() 37 struct passwd *user3 = nullptr; in TestCase() 38 struct passwd *user4 = nullptr; in TestCase() 40 CHAR *pathList[] = {"/etc/group", "/etc/passwd"}; in TestCase() 44 ret = PrepareFileEnv(pathList, streamList, streamLen, 2); /* 2, group & passwd */ in TestCase() 47 (VOID)RecoveryFileEnv(pathList, 2); /* 2, group & passwd */ in TestCase() 88 (VOID)RecoveryFileEnv(pathList, 2); /* 2, group & passwd */ in TestCase() 91 (VOID)RecoveryFileEnv(pathList, 2); /* 2, group & passwd */ in TestCase()
|
H A D | sys_test_020.cpp | 35 struct passwd *user1 = nullptr; in TestCase() 36 struct passwd *user2 = nullptr; in TestCase() 37 struct passwd *user3 = nullptr; in TestCase() 38 struct passwd *user4 = nullptr; in TestCase() 40 CHAR *pathList[] = {"/etc/group", "/etc/passwd"}; in TestCase() 44 ret = PrepareFileEnv(pathList, streamList, streamLen, 2); /* 2, group & passwd */ in TestCase() 47 (VOID)RecoveryFileEnv(pathList, 2); /* 2, group & passwd */ in TestCase() 90 (VOID)RecoveryFileEnv(pathList, 2); /* 2, group & passwd */ in TestCase() 93 (VOID)RecoveryFileEnv(pathList, 2); /* 2, group & passwd */ in TestCase()
|
/third_party/ltp/testcases/kernel/syscalls/setresgid/ |
H A D | setresgid01.c | 87 struct passwd *exp_rgid; /* Expected real GID */ 88 struct passwd *exp_egid; /* Expected effective GID */ 89 struct passwd *exp_sgid; /* Expected saved GID */ 95 static struct passwd nobody, root; 182 struct passwd *passwd_p; in setup()
|
/third_party/toybox/openharmony/ |
H A D | su.c | 35 struct passwd *xgetpwnam(char *name) in xgetpwnam() 37 struct passwd *up = getpwnam(name); in xgetpwnam() 56 static void reset_env(struct passwd *p, int clear) in reset_env() 83 static void xsetuser(struct passwd *pwd) in xsetuser() 95 printf("\t-s Shell to use (default is user's shell from /etc/passwd)\n"); in usage() 104 struct passwd *up; in main()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/tls/ |
H A D | pkcs5.c | 384 pkcs5_crypto_init_pbes2(struct pkcs5_params *params, const char *passwd) in pkcs5_crypto_init_pbes2() argument 393 passwd, os_strlen(passwd)); in pkcs5_crypto_init_pbes2() 398 if (pbkdf2_sha1(passwd, params->salt, params->salt_len, in pkcs5_crypto_init_pbes2() 511 pkcs12_crypto_init_sha1(struct pkcs5_params *params, const char *passwd) in pkcs12_crypto_init_sha1() argument 522 pw_len = passwd ? os_strlen(passwd) : 0; in pkcs12_crypto_init_sha1() 528 WPA_PUT_BE16(&pw[2 * i], passwd[i]); in pkcs12_crypto_init_sha1() 552 const char *passwd) in pkcs5_crypto_init() 560 return pkcs5_crypto_init_pbes2(params, passwd); in pkcs5_crypto_init() 551 pkcs5_crypto_init(struct pkcs5_params *params, const char *passwd) pkcs5_crypto_init() argument 588 pkcs5_decrypt(const u8 *enc_alg, size_t enc_alg_len, const u8 *enc_data, size_t enc_data_len, const char *passwd, size_t *data_len) pkcs5_decrypt() argument [all...] |
H A D | tlsv1_cred.c | 307 const char *passwd) in tlsv1_set_key_enc_pem() 314 if (passwd == NULL) in tlsv1_set_key_enc_pem() 327 pkey = crypto_private_key_import(der, der_len, passwd); in tlsv1_set_key_enc_pem() 425 const char *passwd) in pkcs12_pkcs8_keybag() 430 key = pkcs8_enc_key_import(buf, len, passwd); in pkcs12_pkcs8_keybag() 623 const u8 *buf, size_t len, const char *passwd) in pkcs12_safebag() 691 return pkcs12_pkcs8_keybag(cred, value, value_len, passwd); in pkcs12_safebag() 702 const char *passwd) in pkcs12_safecontents() 736 if (pkcs12_safebag(cred, hdr.payload, hdr.length, passwd) < 0) in pkcs12_safecontents() 747 const char *passwd) in pkcs12_parse_content_data() 305 tlsv1_set_key_enc_pem(const u8 *key, size_t len, const char *passwd) tlsv1_set_key_enc_pem() argument 423 pkcs12_pkcs8_keybag(struct tlsv1_credentials *cred, const u8 *buf, size_t len, const char *passwd) pkcs12_pkcs8_keybag() argument 622 pkcs12_safebag(struct tlsv1_credentials *cred, const u8 *buf, size_t len, const char *passwd) pkcs12_safebag() argument 700 pkcs12_safecontents(struct tlsv1_credentials *cred, const u8 *buf, size_t len, const char *passwd) pkcs12_safecontents() argument 745 pkcs12_parse_content_data(struct tlsv1_credentials *cred, const u8 *pos, const u8 *end, const char *passwd) pkcs12_parse_content_data() argument 767 pkcs12_parse_content_enc_data(struct tlsv1_credentials *cred, const u8 *pos, const u8 *end, const char *passwd) pkcs12_parse_content_enc_data() argument 882 pkcs12_parse_content(struct tlsv1_credentials *cred, const u8 *buf, size_t len, const char *passwd) pkcs12_parse_content() argument 925 pkcs12_parse(struct tlsv1_credentials *cred, const u8 *key, size_t len, const char *passwd) pkcs12_parse() argument 1062 tlsv1_set_key(struct tlsv1_credentials *cred, const u8 *key, size_t len, const char *passwd) tlsv1_set_key() argument [all...] |
/third_party/lwip/src/netif/ppp/ |
H A D | auth.c | 171 int (*pap_auth_hook) (char *user, char *passwd, char **msgp, 179 int (*pap_passwd_hook) (char *user, char *passwd) = NULL; 185 int (*chap_passwd_hook) (char *user, char *passwd) = NULL; 213 bool uselogin = 0; /* Use /etc/passwd for checking PAP */ 370 { "password", o_string, passwd, 467 if (override_value("passwd", option_priority, fname)) { 468 strlcpy(ppp_settings.passwd, p, sizeof(ppp_settings.passwd)); 843 upap_authwithpeer(pcb, pcb->settings.user, pcb->settings.passwd); in link_established() 999 * auth_check_passwd - Check the user name and passwd agains [all...] |
/third_party/python/Modules/ |
H A D | pwdmodule.c | 80 mkpwent(PyObject *module, struct passwd *p) in mkpwent() 133 struct passwd *p; in pwd_getpwuid() 146 struct passwd pwd; in pwd_getpwuid() 217 struct passwd *p; in pwd_getpwnam_impl() 229 struct passwd pwd; in pwd_getpwnam_impl() 294 struct passwd *p; in pwd_getpwall_impl()
|
/third_party/libwebsockets/lib/plat/unix/ |
H A D | unix-caps.c | 56 struct passwd *p; 91 struct passwd pr; 113 struct passwd *p; 143 struct passwd pr; 200 struct passwd pr;
|
/third_party/pulseaudio/src/tests/ |
H A D | usergroup-test.c | 35 static int load_reference_structs(struct group **gr, struct passwd **pw) { in load_reference_structs() 81 static int compare_passwd(const struct passwd *a, const struct passwd *b) { in compare_passwd() 122 struct passwd *pw; in START_TEST() 124 struct passwd *reference_passwd = NULL; in START_TEST()
|
/third_party/curl/lib/ |
H A D | curl_sasl.c | 373 if((enabledmechs & SASL_MECH_EXTERNAL) && !conn->passwd[0]) { in Curl_sasl_start() 393 conn->passwd, in Curl_sasl_start() 412 conn->passwd, &conn->gsasl); in Curl_sasl_start() 425 conn->passwd, &conn->gsasl); in Curl_sasl_start() 454 conn->user, conn->passwd, in Curl_sasl_start() 491 conn->user, conn->passwd, in Curl_sasl_start() 576 conn->user, conn->passwd, &resp); in Curl_sasl_continue() 583 result = Curl_auth_create_login_message(conn->passwd, &resp); in Curl_sasl_continue() 602 conn->passwd, &resp); in Curl_sasl_continue() 608 conn->user, conn->passwd, in Curl_sasl_continue() [all...] |
H A D | ldap.c | 222 const char *passwd, unsigned long authflags) in ldap_win_bind_auth() 252 if(method && user && passwd) { in ldap_win_bind_auth() 253 rc = Curl_create_sspi_identity(user, passwd, &cred); in ldap_win_bind_auth() 269 const char *user, const char *passwd) in ldap_win_bind() 276 if(user && passwd && (data->set.httpauth & CURLAUTH_BASIC)) { in ldap_win_bind() 278 inpass = curlx_convert_UTF8_to_tchar((char *) passwd); in ldap_win_bind() 287 rc = ldap_win_bind_auth(server, user, passwd, data->set.httpauth); in ldap_win_bind() 325 char *passwd = NULL; in ldap_do() local 362 passwd = conn->passwd; in ldap_do() 221 ldap_win_bind_auth(LDAP *server, const char *user, const char *passwd, unsigned long authflags) ldap_win_bind_auth() argument 268 ldap_win_bind(struct Curl_easy *data, LDAP *server, const char *user, const char *passwd) ldap_win_bind() argument [all...] |
/kernel/linux/linux-6.6/fs/smb/client/ |
H A D | smbencrypt.c | 72 E_md4hash(const unsigned char *passwd, unsigned char *p16, in E_md4hash() argument 80 if (passwd) /* Password must be converted to NT unicode */ in E_md4hash() 81 len = cifs_strtoUTF16(wpwd, passwd, 128, codepage); in E_md4hash()
|
/third_party/curl/lib/vauth/ |
H A D | cleartext.c | 57 * passwd [in] - The password. 64 const char *passwd, in Curl_auth_create_plain_message() 75 plen = strlen(passwd); in Curl_auth_create_plain_message() 93 memcpy(plainauth + zlen + clen + 2, passwd, plen); in Curl_auth_create_plain_message() 62 Curl_auth_create_plain_message(const char *authzid, const char *authcid, const char *passwd, struct bufref *out) Curl_auth_create_plain_message() argument
|
H A D | digest_sspi.c | 432 /* If the user/passwd that was used to make the identity for http_context in Curl_auth_create_digest_http_message() 435 (passwdp && !digest->passwd) || (!passwdp && digest->passwd) || in Curl_auth_create_digest_http_message() 437 (passwdp && digest->passwd && Curl_timestrcmp(passwdp, digest->passwd))) { in Curl_auth_create_digest_http_message() 443 Curl_safefree(digest->passwd); in Curl_auth_create_digest_http_message() 487 /* free the copy of user/passwd used to make the previous identity */ in Curl_auth_create_digest_http_message() 489 Curl_safefree(digest->passwd); in Curl_auth_create_digest_http_message() 522 digest->passwd = strdup(passwdp); in Curl_auth_create_digest_http_message() 524 if(!digest->passwd) { in Curl_auth_create_digest_http_message() [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/ |
H A D | crypto_internal-rsa.c | 40 const char *passwd) in crypto_private_key_import() 49 if (passwd) { in crypto_private_key_import() 51 res = pkcs8_enc_key_import(key, len, passwd); in crypto_private_key_import() 38 crypto_private_key_import(const u8 *key, size_t len, const char *passwd) crypto_private_key_import() argument
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/ |
H A D | crypto_internal-rsa.c | 40 const char *passwd) in crypto_private_key_import() 49 if (passwd) { in crypto_private_key_import() 51 res = pkcs8_enc_key_import(key, len, passwd); in crypto_private_key_import() 38 crypto_private_key_import(const u8 *key, size_t len, const char *passwd) crypto_private_key_import() argument
|