Home
last modified time | relevance | path

Searched refs:passwd (Results 51 - 75 of 515) sorted by relevance

12345678910>>...21

/third_party/ltp/testcases/kernel/syscalls/setresgid/
H A Dsetresgid01.c87 struct passwd *exp_rgid; /* Expected real GID */
88 struct passwd *exp_egid; /* Expected effective GID */
89 struct passwd *exp_sgid; /* Expected saved GID */
95 static struct passwd nobody, root;
182 struct passwd *passwd_p; in setup()
/third_party/toybox/openharmony/
H A Dsu.c35 struct passwd *xgetpwnam(char *name) in xgetpwnam()
37 struct passwd *up = getpwnam(name); in xgetpwnam()
56 static void reset_env(struct passwd *p, int clear) in reset_env()
83 static void xsetuser(struct passwd *pwd) in xsetuser()
95 printf("\t-s Shell to use (default is user's shell from /etc/passwd)\n"); in usage()
104 struct passwd *up; in main()
/foundation/distributeddatamgr/kv_store/frameworks/libs/distributeddb/test/fuzztest/importfile_fuzzer/
H A Dimportfile_fuzzer.cpp36 CipherPassword passwd; in SingerVerImport() local
37 passwd.SetValue(data, size); in SingerVerImport()
38 KvStoreNbDelegate::Option option = {true, false, true, CipherType::DEFAULT, passwd}; in SingerVerImport()
51 kvNbDelegatePtr->Import(importFile, passwd); in SingerVerImport()
/foundation/distributeddatamgr/kv_store/frameworks/libs/distributeddb/storage/src/multiver/
H A Dmulti_ver_kvdata_storage.h50 CipherPassword passwd; member
70 int RunRekeyLogic(CipherType type, const CipherPassword &passwd);
72 int RunExportLogic(CipherType type, const CipherPassword &passwd, const std::string &dbDir) const;
78 int ImportDatabase(const Property &property, const std::string &dir, const CipherPassword &passwd);
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/tls/
H A Dpkcs5.c384 pkcs5_crypto_init_pbes2(struct pkcs5_params *params, const char *passwd) in pkcs5_crypto_init_pbes2() argument
393 passwd, os_strlen(passwd)); in pkcs5_crypto_init_pbes2()
398 if (pbkdf2_sha1(passwd, params->salt, params->salt_len, in pkcs5_crypto_init_pbes2()
511 pkcs12_crypto_init_sha1(struct pkcs5_params *params, const char *passwd) in pkcs12_crypto_init_sha1() argument
522 pw_len = passwd ? os_strlen(passwd) : 0; in pkcs12_crypto_init_sha1()
528 WPA_PUT_BE16(&pw[2 * i], passwd[i]); in pkcs12_crypto_init_sha1()
552 const char *passwd) in pkcs5_crypto_init()
560 return pkcs5_crypto_init_pbes2(params, passwd); in pkcs5_crypto_init()
551 pkcs5_crypto_init(struct pkcs5_params *params, const char *passwd) pkcs5_crypto_init() argument
588 pkcs5_decrypt(const u8 *enc_alg, size_t enc_alg_len, const u8 *enc_data, size_t enc_data_len, const char *passwd, size_t *data_len) pkcs5_decrypt() argument
[all...]
H A Dtlsv1_cred.c307 const char *passwd) in tlsv1_set_key_enc_pem()
314 if (passwd == NULL) in tlsv1_set_key_enc_pem()
327 pkey = crypto_private_key_import(der, der_len, passwd); in tlsv1_set_key_enc_pem()
425 const char *passwd) in pkcs12_pkcs8_keybag()
430 key = pkcs8_enc_key_import(buf, len, passwd); in pkcs12_pkcs8_keybag()
623 const u8 *buf, size_t len, const char *passwd) in pkcs12_safebag()
691 return pkcs12_pkcs8_keybag(cred, value, value_len, passwd); in pkcs12_safebag()
702 const char *passwd) in pkcs12_safecontents()
736 if (pkcs12_safebag(cred, hdr.payload, hdr.length, passwd) < 0) in pkcs12_safecontents()
747 const char *passwd) in pkcs12_parse_content_data()
305 tlsv1_set_key_enc_pem(const u8 *key, size_t len, const char *passwd) tlsv1_set_key_enc_pem() argument
423 pkcs12_pkcs8_keybag(struct tlsv1_credentials *cred, const u8 *buf, size_t len, const char *passwd) pkcs12_pkcs8_keybag() argument
622 pkcs12_safebag(struct tlsv1_credentials *cred, const u8 *buf, size_t len, const char *passwd) pkcs12_safebag() argument
700 pkcs12_safecontents(struct tlsv1_credentials *cred, const u8 *buf, size_t len, const char *passwd) pkcs12_safecontents() argument
745 pkcs12_parse_content_data(struct tlsv1_credentials *cred, const u8 *pos, const u8 *end, const char *passwd) pkcs12_parse_content_data() argument
767 pkcs12_parse_content_enc_data(struct tlsv1_credentials *cred, const u8 *pos, const u8 *end, const char *passwd) pkcs12_parse_content_enc_data() argument
882 pkcs12_parse_content(struct tlsv1_credentials *cred, const u8 *buf, size_t len, const char *passwd) pkcs12_parse_content() argument
925 pkcs12_parse(struct tlsv1_credentials *cred, const u8 *key, size_t len, const char *passwd) pkcs12_parse() argument
1062 tlsv1_set_key(struct tlsv1_credentials *cred, const u8 *key, size_t len, const char *passwd) tlsv1_set_key() argument
[all...]
/foundation/distributeddatamgr/kv_store/frameworks/libs/distributeddb/test/unittest/common/interfaces/
H A Ddistributeddb_interfaces_device_identifier_test.cpp414 CipherPassword passwd; in HWTEST_F() local
415 EXPECT_EQ(errStore->Export(g_testDir, passwd), -E_INVALID_DB); in HWTEST_F()
421 EXPECT_EQ(errStore->Import(g_testDir, passwd), -E_INVALID_DB); in HWTEST_F()
427 EXPECT_EQ(errStore->Rekey(passwd), -E_INVALID_DB); in HWTEST_F()
711 CipherPassword passwd; in HWTEST_F() local
713 EXPECT_EQ(g_store->Export(filePath, passwd), -E_NOT_SUPPORT); in HWTEST_F()
714 EXPECT_EQ(g_store->Import(filePath, passwd), -E_NOT_SUPPORT); in HWTEST_F()
715 EXPECT_EQ(g_store->Rekey(passwd), -E_NOT_SUPPORT); in HWTEST_F()
722 EXPECT_EQ(g_store->Export(filePath, passwd), -E_BUSY); in HWTEST_F()
723 EXPECT_EQ(g_store->Import(filePath, passwd), in HWTEST_F()
[all...]
H A Ddistributeddb_interfaces_database_test.cpp122 CipherPassword passwd; in OpenOpenedKvstoreWithSchema() local
124 passwd.SetValue(passwdBuffer.data(), passwdBuffer.size()); in OpenOpenedKvstoreWithSchema()
125 option.passwd = passwd; in OpenOpenedKvstoreWithSchema()
183 CipherPassword passwd; in OpenClosedSchemaKvStore() local
185 passwd.SetValue(passwdBuffer.data(), passwdBuffer.size()); in OpenClosedSchemaKvStore()
186 option.passwd = passwd; in OpenClosedSchemaKvStore()
266 CipherPassword passwd; in OpenClosedNormalKvStore() local
268 passwd in OpenClosedNormalKvStore()
497 CipherPassword passwd; HWTEST_F() local
700 CipherPassword passwd; HWTEST_F() local
746 CipherPassword passwd; HWTEST_F() local
821 CipherPassword passwd; HWTEST_F() local
898 CipherPassword passwd; HWTEST_F() local
998 CipherPassword passwd; HWTEST_F() local
[all...]
/third_party/libwebsockets/lib/plat/unix/
H A Dunix-caps.c56 struct passwd *p;
91 struct passwd pr;
113 struct passwd *p;
143 struct passwd pr;
200 struct passwd pr;
/third_party/pulseaudio/src/tests/
H A Dusergroup-test.c35 static int load_reference_structs(struct group **gr, struct passwd **pw) { in load_reference_structs()
81 static int compare_passwd(const struct passwd *a, const struct passwd *b) { in compare_passwd()
122 struct passwd *pw; in START_TEST()
124 struct passwd *reference_passwd = NULL; in START_TEST()
/third_party/python/Modules/
H A Dpwdmodule.c80 mkpwent(PyObject *module, struct passwd *p) in mkpwent()
133 struct passwd *p; in pwd_getpwuid()
146 struct passwd pwd; in pwd_getpwuid()
217 struct passwd *p; in pwd_getpwnam_impl()
229 struct passwd pwd; in pwd_getpwnam_impl()
294 struct passwd *p; in pwd_getpwall_impl()
/third_party/lwip/src/netif/ppp/
H A Dauth.c171 int (*pap_auth_hook) (char *user, char *passwd, char **msgp,
179 int (*pap_passwd_hook) (char *user, char *passwd) = NULL;
185 int (*chap_passwd_hook) (char *user, char *passwd) = NULL;
213 bool uselogin = 0; /* Use /etc/passwd for checking PAP */
370 { "password", o_string, passwd,
467 if (override_value("passwd", option_priority, fname)) {
468 strlcpy(ppp_settings.passwd, p, sizeof(ppp_settings.passwd));
843 upap_authwithpeer(pcb, pcb->settings.user, pcb->settings.passwd); in link_established()
999 * auth_check_passwd - Check the user name and passwd agains
[all...]
/third_party/curl/lib/
H A Dcurl_sasl.c373 if((enabledmechs & SASL_MECH_EXTERNAL) && !conn->passwd[0]) { in Curl_sasl_start()
393 conn->passwd, in Curl_sasl_start()
412 conn->passwd, &conn->gsasl); in Curl_sasl_start()
425 conn->passwd, &conn->gsasl); in Curl_sasl_start()
454 conn->user, conn->passwd, in Curl_sasl_start()
491 conn->user, conn->passwd, in Curl_sasl_start()
576 conn->user, conn->passwd, &resp); in Curl_sasl_continue()
583 result = Curl_auth_create_login_message(conn->passwd, &resp); in Curl_sasl_continue()
602 conn->passwd, &resp); in Curl_sasl_continue()
608 conn->user, conn->passwd, in Curl_sasl_continue()
[all...]
H A Dldap.c222 const char *passwd, unsigned long authflags) in ldap_win_bind_auth()
252 if(method && user && passwd) { in ldap_win_bind_auth()
253 rc = Curl_create_sspi_identity(user, passwd, &cred); in ldap_win_bind_auth()
269 const char *user, const char *passwd) in ldap_win_bind()
276 if(user && passwd && (data->set.httpauth & CURLAUTH_BASIC)) { in ldap_win_bind()
278 inpass = curlx_convert_UTF8_to_tchar((char *) passwd); in ldap_win_bind()
287 rc = ldap_win_bind_auth(server, user, passwd, data->set.httpauth); in ldap_win_bind()
325 char *passwd = NULL; in ldap_do() local
362 passwd = conn->passwd; in ldap_do()
221 ldap_win_bind_auth(LDAP *server, const char *user, const char *passwd, unsigned long authflags) ldap_win_bind_auth() argument
268 ldap_win_bind(struct Curl_easy *data, LDAP *server, const char *user, const char *passwd) ldap_win_bind() argument
[all...]
/kernel/linux/linux-6.6/fs/smb/client/
H A Dsmbencrypt.c72 E_md4hash(const unsigned char *passwd, unsigned char *p16, in E_md4hash() argument
80 if (passwd) /* Password must be converted to NT unicode */ in E_md4hash()
81 len = cifs_strtoUTF16(wpwd, passwd, 128, codepage); in E_md4hash()
/third_party/curl/lib/vauth/
H A Dcleartext.c57 * passwd [in] - The password.
64 const char *passwd, in Curl_auth_create_plain_message()
75 plen = strlen(passwd); in Curl_auth_create_plain_message()
93 memcpy(plainauth + zlen + clen + 2, passwd, plen); in Curl_auth_create_plain_message()
62 Curl_auth_create_plain_message(const char *authzid, const char *authcid, const char *passwd, struct bufref *out) Curl_auth_create_plain_message() argument
H A Ddigest_sspi.c432 /* If the user/passwd that was used to make the identity for http_context in Curl_auth_create_digest_http_message()
435 (passwdp && !digest->passwd) || (!passwdp && digest->passwd) || in Curl_auth_create_digest_http_message()
437 (passwdp && digest->passwd && Curl_timestrcmp(passwdp, digest->passwd))) { in Curl_auth_create_digest_http_message()
443 Curl_safefree(digest->passwd); in Curl_auth_create_digest_http_message()
487 /* free the copy of user/passwd used to make the previous identity */ in Curl_auth_create_digest_http_message()
489 Curl_safefree(digest->passwd); in Curl_auth_create_digest_http_message()
522 digest->passwd = strdup(passwdp); in Curl_auth_create_digest_http_message()
524 if(!digest->passwd) { in Curl_auth_create_digest_http_message()
[all...]
/kernel/liteos_a/testsuites/unittest/libc/sys/full/
H A Dsys_test_018.cpp35 struct passwd *user1 = nullptr; in TestCase()
36 struct passwd *user2 = nullptr; in TestCase()
37 struct passwd *user3 = nullptr; in TestCase()
38 struct passwd *user4 = nullptr; in TestCase()
40 CHAR *pathList[] = {"/etc/group", "/etc/passwd"}; in TestCase()
44 ret = PrepareFileEnv(pathList, streamList, streamLen, 2); /* 2, group & passwd */ in TestCase()
47 (VOID)RecoveryFileEnv(pathList, 2); /* 2, group & passwd */ in TestCase()
88 (VOID)RecoveryFileEnv(pathList, 2); /* 2, group & passwd */ in TestCase()
91 (VOID)RecoveryFileEnv(pathList, 2); /* 2, group & passwd */ in TestCase()
H A Dsys_test_020.cpp35 struct passwd *user1 = nullptr; in TestCase()
36 struct passwd *user2 = nullptr; in TestCase()
37 struct passwd *user3 = nullptr; in TestCase()
38 struct passwd *user4 = nullptr; in TestCase()
40 CHAR *pathList[] = {"/etc/group", "/etc/passwd"}; in TestCase()
44 ret = PrepareFileEnv(pathList, streamList, streamLen, 2); /* 2, group & passwd */ in TestCase()
47 (VOID)RecoveryFileEnv(pathList, 2); /* 2, group & passwd */ in TestCase()
90 (VOID)RecoveryFileEnv(pathList, 2); /* 2, group & passwd */ in TestCase()
93 (VOID)RecoveryFileEnv(pathList, 2); /* 2, group & passwd */ in TestCase()
/third_party/python/Lib/
H A Dftplib.py9 >>> ftp.login() # default, i.e.: user anonymous, passwd anonymous@
78 host, user, passwd, acct, timeout, source_address, encoding
109 def __init__(self, host='', user='', passwd='', acct='',
115 and user, passwd, acct (for login()).
123 self.login(user, passwd, acct)
395 def login(self, user = '', passwd = '', acct = ''):
399 if not passwd:
400 passwd = ''
403 if user == 'anonymous' and passwd in {'', '-'}:
411 passwd
[all...]
/foundation/distributeddatamgr/kv_store/frameworks/libs/distributeddb/interfaces/include/
H A Dkv_store_delegate.h36 CipherPassword passwd; member
101 DB_API virtual DBStatus Export(const std::string &filePath, const CipherPassword &passwd) = 0;
104 DB_API virtual DBStatus Import(const std::string &filePath, const CipherPassword &passwd) = 0;
/foundation/distributeddatamgr/kv_store/frameworks/libs/distributeddb/storage/src/sqlite/kv/
H A Dsqlite_local_kvdb_connection.h85 int Rekey(const CipherPassword &passwd) override;
87 int Export(const std::string &filePath, const CipherPassword &passwd) override;
89 int Import(const std::string &filePath, const CipherPassword &passwd) override;
/foundation/distributeddatamgr/kv_store/frameworks/libs/distributeddb/storage/src/sqlite/
H A Dsqlite_multi_ver_data_storage.h63 int RunRekeyLogic(CipherType type, const CipherPassword &passwd);
65 int RunExportLogic(CipherType type, const CipherPassword &passwd, const std::string &dbDir);
73 int ImportDatabase(const Property &property, const std::string &dir, const CipherPassword &passwd) override;
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/
H A Dcrypto_internal-rsa.c40 const char *passwd) in crypto_private_key_import()
49 if (passwd) { in crypto_private_key_import()
51 res = pkcs8_enc_key_import(key, len, passwd); in crypto_private_key_import()
38 crypto_private_key_import(const u8 *key, size_t len, const char *passwd) crypto_private_key_import() argument
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/
H A Dcrypto_internal-rsa.c40 const char *passwd) in crypto_private_key_import()
49 if (passwd) { in crypto_private_key_import()
51 res = pkcs8_enc_key_import(key, len, passwd); in crypto_private_key_import()
38 crypto_private_key_import(const u8 *key, size_t len, const char *passwd) crypto_private_key_import() argument

Completed in 13 milliseconds

12345678910>>...21