/third_party/curl/lib/ |
H A D | http_aws_sigv4.c | 763 data->state.aptr.passwd ? in Curl_output_aws_sigv4() 764 data->state.aptr.passwd : ""); in Curl_output_aws_sigv4()
|
H A D | curl_ntlm_wb.c | 127 struct passwd pw, *pw_res; in ntlm_wb_init()
|
/foundation/window/window_manager/window_scene/common/src/ |
H A D | session_permission.cpp | 346 if (struct passwd* user = getpwuid(uid)) { in GetCallingBundleName()
|
/foundation/distributeddatamgr/kv_store/frameworks/libs/distributeddb/storage/src/gaussdb_rd/ |
H A D | rd_utils.cpp | 35 option.passwd != CipherPassword() || in CheckOption()
|
H A D | rd_single_ver_storage_executor.h | 153 int AttachMainDbAndCacheDb(CipherType type, const CipherPassword &passwd,
|
/third_party/musl/src/regex/ |
H A D | glob.c | 205 struct passwd pw, *res; in expand_tilde()
|
/third_party/libfuse/util/ |
H A D | mount.fuse.c | 409 struct passwd *pwd = getpwnam(setuid_name); in main()
|
/third_party/ltp/testcases/kernel/syscalls/nftw/ |
H A D | nftw.c | 49 struct passwd *ltpuser; /* password struct for ltpuser */ 681 perror("nobody not found in /etc/passwd"); in setup()
|
H A D | nftw64.c | 49 struct passwd *ltpuser; /* password struct for ltpuser */ 708 perror("change_owner: nobody not found in /etc/passwd"); in setup()
|
/third_party/rust/crates/libc/src/unix/linux_like/android/b64/ |
H A D | mod.rs | 37 pub struct passwd { structure names
|
/third_party/toybox/toys/pending/ |
H A D | tftpd.c | 31 struct passwd *pw;
|
/third_party/selinux/libselinux/src/ |
H A D | seusers.c | 97 struct passwd pwstorage, *pwent = NULL; in get_default_gid()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/ |
H A D | crypto.h | 308 * @passwd: Key encryption password or %NULL if key is not encrypted 317 const char *passwd);
|
H A D | tls_openssl.c | 3309 const char *passwd) in tls_parse_pkcs12() 3320 if (!passwd) in tls_parse_pkcs12() 3321 passwd = ""; in tls_parse_pkcs12() 3322 if (!PKCS12_parse(p12, passwd, &pkey, &cert, &certs)) { in tls_parse_pkcs12() 3440 const char *private_key, const char *passwd) in tls_read_pkcs12() 3459 return tls_parse_pkcs12(data, ssl, p12, passwd); in tls_read_pkcs12() 3470 const u8 *blob, size_t len, const char *passwd) in tls_read_pkcs12_blob() 3482 return tls_parse_pkcs12(data, ssl, p12, passwd); in tls_read_pkcs12_blob() 3308 tls_parse_pkcs12(struct tls_data *data, SSL *ssl, PKCS12 *p12, const char *passwd) tls_parse_pkcs12() argument 3439 tls_read_pkcs12(struct tls_data *data, SSL *ssl, const char *private_key, const char *passwd) tls_read_pkcs12() argument 3469 tls_read_pkcs12_blob(struct tls_data *data, SSL *ssl, const u8 *blob, size_t len, const char *passwd) tls_read_pkcs12_blob() argument
|
/third_party/rust/crates/libc/src/unix/haiku/ |
H A D | mod.rs | 302 pub struct passwd { structure names 1781 pwd: *mut passwd, in getpwnam_r() 1784 result: *mut *mut passwd, in getpwnam_r() 1788 pwd: *mut passwd, in getpwuid_r() 1791 result: *mut *mut passwd, in getpwuid_r() 1793 pub fn getpwent() -> *mut passwd; in getpwent()
|
/third_party/rust/crates/libc/src/unix/nto/ |
H A D | mod.rs | 281 pub struct passwd { structure names 2758 pub fn getpwent() -> *mut passwd; in getpwent() 2918 pwd: *mut passwd, in getpwnam_r() 2921 result: *mut *mut passwd, in getpwnam_r() 2925 pwd: *mut passwd, in getpwuid_r() 2928 result: *mut *mut passwd, in getpwuid_r() 3090 pwd: *mut ::passwd, in getpwent_r() 3093 __result: *mut *mut ::passwd, in getpwent_r()
|
/third_party/rust/crates/libc/src/unix/solarish/ |
H A D | mod.rs | 123 pub struct passwd { structure names 2757 pub fn getpwent() -> *mut passwd; in getpwent() 3007 pwd: *mut passwd, in getpwnam_r() 3010 result: *mut *mut passwd, in getpwnam_r() 3018 pwd: *mut passwd, in getpwuid_r() 3021 result: *mut *mut passwd, in getpwuid_r() 3027 fn native_getpwent_r(pwd: *mut passwd, buf: *mut ::c_char, buflen: ::c_int) -> *mut passwd; in native_getpwent_r()
|
/foundation/distributeddatamgr/kv_store/frameworks/libs/distributeddb/test/moduletest/src/ |
H A D | distributeddb_kv_backup_test.cpp | 476 * @tc.desc: Verify that passwd parameter of export interface decide the file exported is encrypted or not. 497 * @tc.steps: step2. call export interface with the passwd = password(129B). in HWTEST_F() 508 * @tc.steps: step3. call export interface with the passwd = password(1B). in HWTEST_F() 512 passwordVector.assign(1, 'b'); // 1 Byte of passwd. in HWTEST_F() 519 * @tc.steps: step3. call export interface with the passwd = password(128B). in HWTEST_F() 523 passwordVector.assign(BATCH_RECORDS, 'b'); // 1 Byte of passwd. in HWTEST_F() 585 * @tc.steps: step7. call import interface with passwd = password(129B). in HWTEST_F() 1001 DistributedDB::CipherPassword passwd[] = {NULL_PASSWD, NULL_PASSWD, NULL_PASSWD, g_filePasswd1, g_filePasswd2}; in KvSubImportThread() local 1006 delegate2->Export(filePath[index], passwd[index]); in KvSubImportThread() 1012 EXPECT_EQ(delegate2->Import(filePath[index], passwd[inde in KvSubImportThread() [all...] |
/foundation/distributeddatamgr/kv_store/frameworks/libs/distributeddb/test/unittest/common/syncer/ |
H A D | distributeddb_relational_multi_user_test.cpp | 254 CipherPassword passwd; 255 param.option = {true, false, CipherType::DEFAULT, passwd, "", false, g_testDir, nullptr, 357 CipherPassword passwd; in TestSyncWithUserChange() local
|
/third_party/lwip/src/netif/ppp/ |
H A D | ppp.c | 218 void ppp_set_auth(ppp_pcb *pcb, u8_t authtype, const char *user, const char *passwd) { in ppp_set_auth() argument 235 pcb->settings.passwd = passwd; in ppp_set_auth()
|
/third_party/rust/crates/libc/src/unix/hermit/ |
H A D | mod.rs | 410 pub struct passwd { // Unverified structure names 980 pwd: *mut passwd, in getpwuid_r() 983 result: *mut *mut passwd, in getpwuid_r()
|
/third_party/toybox/toys/posix/ |
H A D | tar.c | 180 struct passwd *pw = pw; in add_to_tar() 511 struct passwd *pw = getpwnam(TT.hdr.uname); in extract_to_disk() 660 struct passwd *pw = getpwnam(TT.hdr.uname); in unpack_tar()
|
/third_party/rust/crates/libc/src/unix/redox/ |
H A D | mod.rs | 155 pub struct passwd { structure names 1021 pwd: *mut passwd, in getpwuid_r() 1024 result: *mut *mut passwd, in getpwuid_r()
|
/foundation/distributeddatamgr/kv_store/frameworks/libs/distributeddb/test/unittest/common/storage/ |
H A D | distributeddb_storage_transaction_record_test.cpp | 64 CipherPassword passwd; in SetUp() local 65 int errCode = g_transaction->Initialize(g_storeDir, false, CipherType::AES_256_GCM, passwd); in SetUp()
|
/foundation/distributeddatamgr/kv_store/frameworks/libs/distributeddb/storage/src/sqlite/ |
H A D | sqlite_single_ver_storage_executor_cache.cpp | 194 int SQLiteSingleVerStorageExecutor::AttachMainDbAndCacheDb(CipherType type, const CipherPassword &passwd, in AttachMainDbAndCacheDb() argument 209 int errCode = SQLiteUtils::AttachNewDatabase(dbHandle_, type, passwd, attachDbAbsPath, attachAsName); in AttachMainDbAndCacheDb()
|