/external/linux-tools-perf/util/ |
abspath.c | 6 char *pwd; local 10 pwd = getenv("PWD"); 11 if (pwd && strcmp(pwd, cwd)) { 13 if (!stat(pwd, &pwd_stat) && 16 strlcpy(cwd, pwd, PATH_MAX);
|
/external/chromium_org/content/public/browser/android/ |
devtools_auth.h | 10 #include <pwd.h>
|
/external/openssh/openbsd-compat/ |
port-solaris.h | 23 #include <pwd.h>
|
/bionic/tests/ |
stubs_test.cpp | 21 #include <pwd.h> 39 passwd* pwd = getpwuid(uid); local 40 ASSERT_TRUE(pwd != NULL); 42 EXPECT_STREQ(username, pwd->pw_name); 43 EXPECT_EQ(uid, pwd->pw_uid); 44 EXPECT_EQ(uid, pwd->pw_gid); 47 EXPECT_STREQ("/", pwd->pw_dir); 49 EXPECT_STREQ("/data", pwd->pw_dir); 52 EXPECT_STREQ("/system/bin/sh", pwd->pw_shell);
|
/external/openssh/ |
platform.h | 21 #include <pwd.h>
|
sftp-server-main.c | 21 #include <pwd.h>
|
auth-rh-rsa.c | 20 #include <pwd.h>
|
/libcore/crypto/src/main/java/org/conscrypt/ |
KeyManagerFactoryImpl.java | 44 private char[] pwd; field in class:KeyManagerFactoryImpl 56 pwd = password.clone(); 58 pwd = EmptyArray.CHAR; 75 pwd = EmptyArray.CHAR; 77 pwd = keyStorePwd.toCharArray(); 80 keyStore.load(new FileInputStream(new File(keyStoreName)), pwd); 113 return new KeyManager[] { new KeyManagerImpl(keyStore, pwd) };
|
DefaultSSLContextImpl.java | 73 char[] pwd = (keystorepwd == null) ? null : keystorepwd.toCharArray(); local 79 ks.load(is, pwd); 88 kmf.init(ks, pwd); 105 char[] pwd = (keystorepwd == null) ? null : keystorepwd.toCharArray(); local 112 ks.load(is, pwd);
|
/external/apache-harmony/auth/src/test/java/common/org/apache/harmony/auth/tests/javax/security/auth/callback/ |
PasswordCallbackTest.java | 44 char[] pwd = {'a','b','c'}; local 45 pc.setPassword(pwd); 46 assertEquals(new String(pwd), new String(pc.getPassword())); 48 assertEquals(pwd.length, pc.getPassword().length); 49 assertFalse(new String(pwd).equals(pc.getPassword()));
|
/system/core/sh/ |
cd.c | 52 * The cd and pwd commands. 103 error("PWD not set"); 263 setvar("PWD", curdir, VEXPORT); 265 unsetvar("PWD", 0); 295 setvar("PWD", curdir, VEXPORT); 300 * Posix says the default should be 'pwd -L' (as below), however 323 setvar("PWD", curdir, VEXPORT); 341 char *pwd; local 350 pwd = getenv("PWD"); 369 char *pwd; local [all...] |
/external/apache-harmony/auth/src/test/java/common/org/apache/harmony/auth/tests/javax/security/auth/callback/serialization/ |
PasswordCallbackTest.java | 39 char[] pwd = {'a', 'b', 'c'}; local 41 p.setPassword(pwd);
|
/external/chromium_org/remoting/host/ |
username.cc | 12 #include <pwd.h>
|
/external/ppp/pppd/plugins/radius/ |
includes.h | 43 #include <pwd.h>
|
/external/iptables/extensions/ |
libxt_owner.c | 8 #include <pwd.h> 139 struct passwd *pwd; local 146 if ((pwd = getpwnam(cb->arg)) != NULL) 147 id = pwd->pw_uid; 186 struct passwd *pwd; local 193 if ((pwd = getpwnam(cb->arg)) != NULL) 194 id = pwd->pw_uid; 244 struct passwd *pwd; local 251 if ((pwd = getpwnam(cb->arg)) != NULL) 252 from = to = pwd->pw_uid 301 struct passwd *pwd = getpwuid(info->uid); local 350 struct passwd *pwd = getpwuid(info->uid); local 399 const struct passwd *pwd = getpwuid(info->uid_min); local [all...] |
/external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/java/security/ |
KeyStore_Impl3Test.java | 114 char[] pwd = { 'p', 'a', 's', 's', 'w', 'd' }; local 115 KeyStore.PasswordProtection pPath = new KeyStore.PasswordProtection(pwd); 134 kss[i].setKeyEntry(aliases[3], pk, pwd, certs); 138 kss[i].store(null, pwd); 147 kss[i].store(bos, pwd); 150 kss1[i].load(bis, pwd); 190 assertEquals("Incorrect entry", kss[i].getKey(aliases[3], pwd), 191 kss1[i].getKey(aliases[3], pwd));
|
KeyStore_Impl1Test.java | 470 char[] pwd = { 'p', 'a', 's', 's', 'w', 'd' }; local 471 KeyStore.PasswordProtection pPath = new KeyStore.PasswordProtection(pwd); 510 key = kss[i].getKey(aliases[j], pwd); 583 char [] pwd = {'p', 'a', 's', 's', 'w', 'd'}; local 584 KeyStore.PasswordProtection pPath = new KeyStore.PasswordProtection(pwd); 606 key1 = kss[i].getKey(aliases[j], pwd); 735 char[] pwd = new char[0]; local 746 kss[i].setKeyEntry("ZZZ", null, pwd, certs); 751 kss[i].setKeyEntry("ZZZ", key, pwd, null); 757 kss[i].setKeyEntry("ZZZ", key, pwd, 846 char[] pwd = { 'p', 'a', 's', 's', 'w', 'd' }; local 910 char [] pwd = {'p', 'a', 's', 's', 'w', 'd'}; local 964 char [] pwd = new char[0]; local [all...] |
/external/libppp/src/ |
systems.c | 34 #include <pwd.h> 72 struct passwd *pwd; local 143 pwd = getpwuid(ID0realuid()); 147 pwd = getpwnam(to); 149 if (pwd == NULL) 152 strncpy(to, pwd->pw_dir, endto - to); 209 struct passwd *pwd; local 214 pwd = getpwuid(ID0realuid()); 215 if (pwd != NULL) 217 if (!strcmp("*", arg->argv[f]) || !strcmp(pwd->pw_name, arg->argv[f])) [all...] |
/device/generic/goldfish/opengl/shared/OpenglOsUtils/ |
osProcessUnix.cpp | 24 #include <pwd.h>
|
/external/chromium/chrome/browser/policy/ |
policy_path_parser_posix.cc | 5 #include <pwd.h>
|
/external/e2fsprogs/include/nonunix/ |
unistd.h | 35 #include <pwd.h>
|
/sdk/emulator/opengl/shared/OpenglOsUtils/ |
osProcessUnix.cpp | 24 #include <pwd.h>
|
/external/apache-harmony/x-net/src/test/impl/java.injected/org/apache/harmony/xnet/provider/jsse/ |
DigitalSignatureTest.java | 39 char[] pwd = JSSETestData.KS_PASSWORD; local 43 new KeyStore.PasswordProtection(pwd));
|
KeyManagerImplTest.java | 63 char[] pwd = JSSETestData.KS_PASSWORD; local 65 KeyManagerImpl km = new KeyManagerImpl(ks, pwd);
|
/external/ipsec-tools/src/racoon/ |
isakmp_xauth.c | 47 #include <pwd.h> 229 outlet = &xst->authdata.generic.pwd; 254 (xst->authdata.generic.pwd != NULL)) { 258 char *pwd = xst->authdata.generic.pwd; local 263 "Got username \"%s\", password \"%s\"\n", usr, pwd); 277 res = privsep_xauth_login_system(usr, pwd); 281 res = xauth_login_radius(iph1, usr, pwd); 287 iph1->remote, usr, pwd); 292 res = xauth_login_ldap(iph1, usr, pwd); 1382 vchar_t *pwd = NULL; local [all...] |