/third_party/pulseaudio/src/pulsecore/ |
H A D | usergroup.c | 65 plus the size of a struct passwd. 79 full_size = (size_t) n + sizeof(struct passwd); in starting_getpw_buflen() 247 finished with the returned passwd data. 252 struct passwd *pa_getpwnam_malloc(const char *name) { in pa_getpwnam_malloc() 257 struct passwd *result = NULL; in pa_getpwnam_malloc() 262 getpw_buflen = buflen - sizeof(struct passwd); in pa_getpwnam_malloc() 263 getpw_buf = (char *)buf + sizeof(struct passwd); in pa_getpwnam_malloc() 265 while ((err = getpwnam_r(name, (struct passwd *)buf, getpw_buf, getpw_buflen, &result)) == ERANGE) { in pa_getpwnam_malloc() 269 getpw_buflen = buflen - sizeof(struct passwd); in pa_getpwnam_malloc() 270 getpw_buf = (char *)buf + sizeof(struct passwd); in pa_getpwnam_malloc() 286 pa_getpwnam_free(struct passwd *passwd) pa_getpwnam_free() argument 296 pa_getpwnam_free(struct passwd *passwd) pa_getpwnam_free() argument 345 pa_getpwuid_free(struct passwd *passwd) pa_getpwuid_free() argument 355 pa_getpwuid_free(struct passwd *passwd) pa_getpwuid_free() argument [all...] |
H A D | usergroup.h | 41 struct passwd *pa_getpwuid_malloc(uid_t uid); 42 void pa_getpwuid_free(struct passwd *passwd); 44 struct passwd *pa_getpwnam_malloc(const char *name); 45 void pa_getpwnam_free(struct passwd *passwd);
|
/third_party/musl/porting/liteos_m_iccarm/kernel/include/ |
H A D | pwd.h | 20 struct passwd { struct 33 struct passwd *getpwent (void); 36 struct passwd *getpwuid (uid_t); 37 struct passwd *getpwnam (const char *); 38 int getpwuid_r (uid_t, struct passwd *, char *, size_t, struct passwd **); 39 int getpwnam_r (const char *, struct passwd *, char *, size_t, struct passwd **); 42 struct passwd *fgetpwent(FILE *); 43 int putpwent(const struct passwd *, FIL [all...] |
/third_party/musl/porting/liteos_m/kernel/include/ |
H A D | pwd.h | 20 struct passwd { struct 33 struct passwd *getpwent (void); 36 struct passwd *getpwuid (uid_t); 37 struct passwd *getpwnam (const char *); 38 int getpwuid_r (uid_t, struct passwd *, char *, size_t, struct passwd **); 39 int getpwnam_r (const char *, struct passwd *, char *, size_t, struct passwd **); 42 struct passwd *fgetpwent(FILE *); 43 int putpwent(const struct passwd *, FIL [all...] |
/third_party/musl/porting/uniproton/kernel/include/ |
H A D | pwd.h | 20 struct passwd { struct 33 struct passwd *getpwent (void); 36 struct passwd *getpwuid (uid_t); 37 struct passwd *getpwnam (const char *); 38 int getpwuid_r (uid_t, struct passwd *, char *, size_t, struct passwd **); 39 int getpwnam_r (const char *, struct passwd *, char *, size_t, struct passwd **); 42 struct passwd *fgetpwent(FILE *); 43 int putpwent(const struct passwd *, FIL [all...] |
/third_party/musl/include/ |
H A D | pwd.h | 20 struct passwd { struct 33 struct passwd *getpwent (void); 36 struct passwd *getpwuid (uid_t); 37 struct passwd *getpwnam (const char *); 38 int getpwuid_r (uid_t, struct passwd *, char *, size_t, struct passwd **); 39 int getpwnam_r (const char *, struct passwd *, char *, size_t, struct passwd **); 42 struct passwd *fgetpwent(FILE *); 43 int putpwent(const struct passwd *, FIL [all...] |
/third_party/ltp/ |
H A D | IDcheck.sh | 41 passwd="$DESTDIR/etc/passwd" 72 for i in "$passwd" "$group"; do 79 fe root "$passwd"; NO_ROOT_ID=$? 80 fe bin "$passwd"; NO_BIN_ID=$? 81 fe daemon "$passwd"; NO_DAEMON_ID=$? 82 fe nobody "$passwd"; NO_NOBODY_ID=$? 97 echo "Password file: $passwd" 115 if ! touch "$group" "$passwd" 2>/dev/null; then 116 echo "Failed to touch $group or $passwd" [all...] |
/third_party/musl/libc-test/src/api/ |
H A D | pwd.c | 10 struct passwd x; in f() 17 {struct passwd*(*p)(const char*) = getpwnam;} in f() 18 {int(*p)(const char*,struct passwd*,char*,size_t,struct passwd**) = getpwnam_r;} in f() 19 {struct passwd*(*p)(uid_t) = getpwuid;} in f() 20 {int(*p)(uid_t,struct passwd*,char*,size_t,struct passwd**) = getpwuid_r;} in f() 23 {struct passwd*(*p)(void) = getpwent;} in f()
|
/third_party/musl/src/passwd/ |
H A D | getpwent.c | 5 static struct passwd pw; 16 struct passwd *getpwent() in getpwent() 18 struct passwd *res; in getpwent() 19 if (!f) f = fopen("/etc/passwd", "rbe"); in getpwent() 25 struct passwd *getpwuid(uid_t uid) in getpwuid() 27 struct passwd *res; in getpwuid() 32 struct passwd *getpwnam(const char *name) in getpwnam() 34 struct passwd *res; in getpwnam()
|
H A D | getpw_r.c | 6 static int getpw_r(const char *name, uid_t uid, struct passwd *pw, char *buf, size_t size, struct passwd **res) in getpw_r() 23 FIX(passwd); in getpw_r() 34 int getpwnam_r(const char *name, struct passwd *pw, char *buf, size_t size, struct passwd **res) in getpwnam_r() 39 int getpwuid_r(uid_t uid, struct passwd *pw, char *buf, size_t size, struct passwd **res) in getpwuid_r()
|
H A D | fgetpwent.c | 4 struct passwd *fgetpwent(FILE *f) in fgetpwent() 7 static struct passwd pw; in fgetpwent() 9 struct passwd *res; in fgetpwent()
|
/third_party/node/deps/openssl/openssl/apps/ |
H A D | passwd.c | 49 char *passwd, BIO *out, int quiet, int table, 96 char *infile = NULL, *salt = NULL, *passwd = NULL, **passwds = NULL; in passwd_main() local 226 passwd = passwd_malloc = in passwd_main() 261 passwd = *passwds++; in passwd_main() 262 if (!do_passwd(passed_salt, &salt, &salt_malloc, passwd, bio_out, in passwd_main() 270 assert(passwd != NULL); in passwd_main() 272 int r = BIO_gets(in, passwd, pw_maxlen + 1); in passwd_main() 274 char *c = (strchr(passwd, '\n')); in passwd_main() 286 (passed_salt, &salt, &salt_malloc, passwd, bio_out, quiet, in passwd_main() 314 static char *md5crypt(const char *passwd, cons argument 496 shacrypt(const char *passwd, const char *magic, const char *salt) shacrypt() argument 777 do_passwd(int passed_salt, char **salt_p, char **salt_malloc_p, char *passwd, BIO *out, int quiet, int table, int reverse, size_t pw_maxlen, passwd_modes mode) do_passwd() argument [all...] |
/third_party/openssl/apps/ |
H A D | passwd.c | 49 char *passwd, BIO *out, int quiet, int table, 96 char *infile = NULL, *salt = NULL, *passwd = NULL, **passwds = NULL; in passwd_main() local 226 passwd = passwd_malloc = in passwd_main() 261 passwd = *passwds++; in passwd_main() 262 if (!do_passwd(passed_salt, &salt, &salt_malloc, passwd, bio_out, in passwd_main() 270 assert(passwd != NULL); in passwd_main() 272 int r = BIO_gets(in, passwd, pw_maxlen + 1); in passwd_main() 274 char *c = (strchr(passwd, '\n')); in passwd_main() 286 (passed_salt, &salt, &salt_malloc, passwd, bio_out, quiet, in passwd_main() 314 static char *md5crypt(const char *passwd, cons argument 496 shacrypt(const char *passwd, const char *magic, const char *salt) shacrypt() argument 777 do_passwd(int passed_salt, char **salt_p, char **salt_malloc_p, char *passwd, BIO *out, int quiet, int table, int reverse, size_t pw_maxlen, passwd_modes mode) do_passwd() argument [all...] |
/third_party/node/deps/v8/third_party/zlib/contrib/minizip/ |
H A D | crypt.h | 65 static void init_keys(const char* passwd,unsigned long* pkeys,const z_crc_t* pcrc_32_tab) in init_keys() argument 70 while (*passwd != '\0') { in init_keys() 71 update_keys(pkeys,pcrc_32_tab,(int)*passwd); in init_keys() 72 passwd++; in init_keys() 90 static int crypthead(const char* passwd, /* password string */ in crypthead() argument 114 init_keys(passwd, pkeys, pcrc_32_tab); in crypthead() 121 init_keys(passwd, pkeys, pcrc_32_tab); in crypthead()
|
/third_party/skia/third_party/externals/zlib/contrib/minizip/ |
H A D | crypt.h | 65 static void init_keys(const char* passwd,unsigned long* pkeys,const z_crc_t* pcrc_32_tab) in init_keys() argument 70 while (*passwd != '\0') { in init_keys() 71 update_keys(pkeys,pcrc_32_tab,(int)*passwd); in init_keys() 72 passwd++; in init_keys() 90 static int crypthead(const char* passwd, /* password string */ in crypthead() argument 114 init_keys(passwd, pkeys, pcrc_32_tab); in crypthead() 121 init_keys(passwd, pkeys, pcrc_32_tab); in crypthead()
|
/third_party/zlib/contrib/minizip/ |
H A D | crypt.h | 66 static void init_keys(const char* passwd, unsigned long* pkeys, const z_crc_t* pcrc_32_tab) in init_keys() argument 71 while (*passwd != '\0') { in init_keys() 72 update_keys(pkeys,pcrc_32_tab,(int)*passwd); in init_keys() 73 passwd++; in init_keys() 91 static unsigned crypthead(const char* passwd, /* password string */ in crypthead() argument 115 init_keys(passwd, pkeys, pcrc_32_tab); in crypthead() 122 init_keys(passwd, pkeys, pcrc_32_tab); in crypthead()
|
/third_party/musl/libc-test/src/functionalext/supplement/passwd/ |
H A D | getpwent.c | 29 struct passwd *user = getpwent(); in getpwent_0100() 40 struct passwd *ret = getpwnam("root"); in getpwnam_0100() 56 struct passwd *ret = getpwnam("abcdefg"); in getpwnam_0200() 67 struct passwd *ret = getpwuid(getuid()); in getpwuid_0100() 81 struct passwd *ret = getpwuid(TEST_ERROR_UID); in getpwuid_0200()
|
H A D | getpw_r.c | 28 struct passwd pw; in getpwuid_r_0100() 29 struct passwd *res = NULL; in getpwuid_r_0100() 46 struct passwd pw; in getpwuid_r_0200() 47 struct passwd *res = NULL; in getpwuid_r_0200()
|
/third_party/python/Lib/urllib/ |
H A D | request.py | 56 passwd='geheim$parole') 837 self.passwd = {} 839 def add_password(self, realm, uri, user, passwd): 843 if realm not in self.passwd: 844 self.passwd[realm] = {} 848 self.passwd[realm][reduced_uri] = (user, passwd) 851 domains = self.passwd.get(realm, {}) 914 def add_password(self, realm, uri, user, passwd, is_authenticated=False): 918 super().add_password(None, uri, user, passwd) [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/tls/ |
H A D | pkcs5.c | 362 pkcs5_crypto_init_pbes2(struct pkcs5_params *params, const char *passwd) in pkcs5_crypto_init_pbes2() argument 371 passwd, os_strlen(passwd)); in pkcs5_crypto_init_pbes2() 376 if (pbkdf2_sha1(passwd, params->salt, params->salt_len, in pkcs5_crypto_init_pbes2() 489 pkcs12_crypto_init_sha1(struct pkcs5_params *params, const char *passwd) in pkcs12_crypto_init_sha1() argument 500 pw_len = passwd ? os_strlen(passwd) : 0; in pkcs12_crypto_init_sha1() 506 WPA_PUT_BE16(&pw[2 * i], passwd[i]); in pkcs12_crypto_init_sha1() 530 const char *passwd) in pkcs5_crypto_init() 538 return pkcs5_crypto_init_pbes2(params, passwd); in pkcs5_crypto_init() 529 pkcs5_crypto_init(struct pkcs5_params *params, const char *passwd) pkcs5_crypto_init() argument 566 pkcs5_decrypt(const u8 *enc_alg, size_t enc_alg_len, const u8 *enc_data, size_t enc_data_len, const char *passwd, size_t *data_len) pkcs5_decrypt() argument [all...] |
H A D | tlsv1_cred.c | 307 const char *passwd) in tlsv1_set_key_enc_pem() 314 if (passwd == NULL) in tlsv1_set_key_enc_pem() 327 pkey = crypto_private_key_import(der, der_len, passwd); in tlsv1_set_key_enc_pem() 425 const char *passwd) in pkcs12_pkcs8_keybag() 430 key = pkcs8_enc_key_import(buf, len, passwd); in pkcs12_pkcs8_keybag() 607 const u8 *buf, size_t len, const char *passwd) in pkcs12_safebag() 669 return pkcs12_pkcs8_keybag(cred, value, value_len, passwd); in pkcs12_safebag() 680 const char *passwd) in pkcs12_safecontents() 709 if (pkcs12_safebag(cred, hdr.payload, hdr.length, passwd) < 0) in pkcs12_safecontents() 720 const char *passwd) in pkcs12_parse_content_data() 305 tlsv1_set_key_enc_pem(const u8 *key, size_t len, const char *passwd) tlsv1_set_key_enc_pem() argument 423 pkcs12_pkcs8_keybag(struct tlsv1_credentials *cred, const u8 *buf, size_t len, const char *passwd) pkcs12_pkcs8_keybag() argument 606 pkcs12_safebag(struct tlsv1_credentials *cred, const u8 *buf, size_t len, const char *passwd) pkcs12_safebag() argument 678 pkcs12_safecontents(struct tlsv1_credentials *cred, const u8 *buf, size_t len, const char *passwd) pkcs12_safecontents() argument 718 pkcs12_parse_content_data(struct tlsv1_credentials *cred, const u8 *pos, const u8 *end, const char *passwd) pkcs12_parse_content_data() argument 737 pkcs12_parse_content_enc_data(struct tlsv1_credentials *cred, const u8 *pos, const u8 *end, const char *passwd) pkcs12_parse_content_enc_data() argument 843 pkcs12_parse_content(struct tlsv1_credentials *cred, const u8 *buf, size_t len, const char *passwd) pkcs12_parse_content() argument 884 pkcs12_parse(struct tlsv1_credentials *cred, const u8 *key, size_t len, const char *passwd) pkcs12_parse() argument 1006 tlsv1_set_key(struct tlsv1_credentials *cred, const u8 *key, size_t len, const char *passwd) tlsv1_set_key() argument [all...] |
/third_party/curl/lib/ |
H A D | curl_sspi.c | 149 xcharp_u passwd, dup_passwd; in Curl_create_sspi_identity() local 201 passwd.tchar_ptr = curlx_convert_UTF8_to_tchar((char *)passwdp); in Curl_create_sspi_identity() 202 if(!passwd.tchar_ptr) in Curl_create_sspi_identity() 204 dup_passwd.tchar_ptr = _tcsdup(passwd.tchar_ptr); in Curl_create_sspi_identity() 206 curlx_unicodefree(passwd.tchar_ptr); in Curl_create_sspi_identity() 213 curlx_unicodefree(passwd.tchar_ptr); in Curl_create_sspi_identity()
|
/third_party/python/Lib/ |
H A D | getpass.py | 44 passwd = None 62 passwd = fallback_getpass(prompt, stream) 77 passwd = _raw_input(prompt, stream, input=input) 82 if passwd is not None: 91 passwd = fallback_getpass(prompt, stream) 94 return passwd
|
/third_party/musl/Benchmark/musl/ |
H A D | libc_pwd.cpp | 36 struct passwd pwd; in Bm_function_Getpwnam_r() 37 struct passwd *result; in Bm_function_Getpwnam_r() 53 struct passwd pwd; in Bm_function_Getpwuid_r() 54 struct passwd *result; in Bm_function_Getpwuid_r()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/tls/ |
H A D | pkcs5.c | 384 pkcs5_crypto_init_pbes2(struct pkcs5_params *params, const char *passwd) in pkcs5_crypto_init_pbes2() argument 393 passwd, os_strlen(passwd)); in pkcs5_crypto_init_pbes2() 398 if (pbkdf2_sha1(passwd, params->salt, params->salt_len, in pkcs5_crypto_init_pbes2() 511 pkcs12_crypto_init_sha1(struct pkcs5_params *params, const char *passwd) in pkcs12_crypto_init_sha1() argument 522 pw_len = passwd ? os_strlen(passwd) : 0; in pkcs12_crypto_init_sha1() 528 WPA_PUT_BE16(&pw[2 * i], passwd[i]); in pkcs12_crypto_init_sha1() 552 const char *passwd) in pkcs5_crypto_init() 560 return pkcs5_crypto_init_pbes2(params, passwd); in pkcs5_crypto_init() 551 pkcs5_crypto_init(struct pkcs5_params *params, const char *passwd) pkcs5_crypto_init() argument 588 pkcs5_decrypt(const u8 *enc_alg, size_t enc_alg_len, const u8 *enc_data, size_t enc_data_len, const char *passwd, size_t *data_len) pkcs5_decrypt() argument [all...] |