/external/compiler-rt/test/sanitizer_common/TestCases/Linux/ |
getpwnam_r_invalid_user.cc | 5 #include <pwd.h> 12 struct passwd pwd; local 15 int res = getpwnam_r("no-such-user", &pwd, buf, sizeof(buf), &pwdres);
|
/external/linux-tools-perf/perf-3.12.0/tools/perf/util/ |
abspath.c | 6 char *pwd; local 10 pwd = getenv("PWD"); 11 if (pwd && strcmp(pwd, cwd)) { 13 if (!stat(pwd, &pwd_stat) && 16 strlcpy(cwd, pwd, PATH_MAX);
|
target.c | 12 #include <pwd.h> 63 struct passwd pwd, *result; local 72 getpwnam_r(str, &pwd, buf, sizeof(buf), &result); 84 getpwuid_r(uid, &pwd, buf, sizeof(buf), &result);
|
/bionic/tests/ |
stubs_test.cpp | 21 #include <pwd.h> 38 passwd* pwd = getpwuid(uid); local 39 ASSERT_TRUE(pwd != NULL); 41 EXPECT_STREQ(username, pwd->pw_name); 42 EXPECT_EQ(uid, pwd->pw_uid); 43 EXPECT_EQ(uid, pwd->pw_gid); 44 ASSERT_EQ(NULL, pwd->pw_passwd); 46 ASSERT_EQ(NULL, pwd->pw_gecos); 50 EXPECT_STREQ("/", pwd->pw_dir); 52 EXPECT_STREQ("/data", pwd->pw_dir) [all...] |
/external/conscrypt/src/main/java/org/conscrypt/ |
KeyManagerFactoryImpl.java | 44 private char[] pwd; field in class:KeyManagerFactoryImpl 56 pwd = password.clone(); 58 pwd = EmptyArray.CHAR; 75 pwd = EmptyArray.CHAR; 77 pwd = keyStorePwd.toCharArray(); 80 keyStore.load(new FileInputStream(new File(keyStoreName)), pwd); 113 return new KeyManager[] { new KeyManagerImpl(keyStore, pwd) };
|
DefaultSSLContextImpl.java | 73 char[] pwd = (keystorepwd == null) ? null : keystorepwd.toCharArray(); local 79 ks.load(is, pwd); 88 kmf.init(ks, pwd); 105 char[] pwd = (keystorepwd == null) ? null : keystorepwd.toCharArray(); local 112 ks.load(is, pwd);
|
/external/chromium_org/content/browser/android/ |
devtools_auth.cc | 7 #include <pwd.h>
|
/external/chromium_org/remoting/host/ |
username.cc | 12 #include <pwd.h>
|
/external/ppp/pppd/plugins/radius/ |
includes.h | 43 #include <pwd.h>
|
/external/iptables/extensions/ |
libxt_owner.c | 8 #include <pwd.h> 140 struct passwd *pwd; local 147 if ((pwd = getpwnam(cb->arg)) != NULL) 148 id = pwd->pw_uid; 187 struct passwd *pwd; local 194 if ((pwd = getpwnam(cb->arg)) != NULL) 195 id = pwd->pw_uid; 245 struct passwd *pwd; local 252 if ((pwd = getpwnam(cb->arg)) != NULL) 253 from = to = pwd->pw_uid 302 struct passwd *pwd = getpwuid(info->uid); local 351 struct passwd *pwd = getpwuid(info->uid); local 400 const struct passwd *pwd = getpwuid(info->uid_min); local [all...] |
/external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/java/security/ |
KeyStore_Impl3Test.java | 114 char[] pwd = { 'p', 'a', 's', 's', 'w', 'd' }; local 115 KeyStore.PasswordProtection pPath = new KeyStore.PasswordProtection(pwd); 134 kss[i].setKeyEntry(aliases[3], pk, pwd, certs); 138 kss[i].store(null, pwd); 147 kss[i].store(bos, pwd); 150 kss1[i].load(bis, pwd); 190 assertEquals("Incorrect entry", kss[i].getKey(aliases[3], pwd), 191 kss1[i].getKey(aliases[3], pwd));
|
KeyStore_Impl1Test.java | 467 char[] pwd = { 'p', 'a', 's', 's', 'w', 'd' }; local 468 KeyStore.PasswordProtection pPath = new KeyStore.PasswordProtection(pwd); 507 key = kss[i].getKey(aliases[j], pwd); 580 char[] pwd = { 'p', 'a', 's', 's', 'w', 'd' }; local 581 KeyStore.PasswordProtection pPath = new KeyStore.PasswordProtection(pwd); 603 key1 = kss[i].getKey(aliases[j], pwd); 730 char[] pwd = new char[0]; local 741 kss[i].setKeyEntry("ZZZ", null, pwd, certs); 746 kss[i].setKeyEntry("ZZZ", key, pwd, null); 752 kss[i].setKeyEntry("ZZZ", key, pwd, 840 char[] pwd = { 'p', 'a', 's', 's', 'w', 'd' }; local 903 char[] pwd = { 'p', 'a', 's', 's', 'w', 'd' }; local 957 char[] pwd = new char[0]; local [all...] |
/external/e2fsprogs/include/nonunix/ |
unistd.h | 35 #include <pwd.h>
|
/external/libunwind/src/coredump/ |
_UCD_lib.h | 53 #include <pwd.h>
|
/external/ltrace/sysdeps/linux-gnu/ |
hooks.c | 25 #include <pwd.h> 105 struct passwd *pwd = getpwuid(getuid()); local 106 if (pwd != NULL) 107 home = pwd->pw_dir;
|
/sdk/emulator/opengl/shared/OpenglOsUtils/ |
osProcessUnix.cpp | 24 #include <pwd.h>
|
/system/core/toolbox/ |
pwcache.c | 30 #include <pwd.h>
|
/external/apache-harmony/x-net/src/test/impl/java.injected/org/apache/harmony/xnet/provider/jsse/ |
DigitalSignatureTest.java | 38 char[] pwd = JSSETestData.KS_PASSWORD; local 42 new KeyStore.PasswordProtection(pwd));
|
KeyManagerImplTest.java | 62 char[] pwd = JSSETestData.KS_PASSWORD; local 64 KeyManagerImpl km = new KeyManagerImpl(ks, pwd);
|
ServerHandshakeImplTest.java | 43 char[] pwd = JSSETestData.KS_PASSWORD; local 47 kmf.init(ks, pwd);
|
/external/ipsec-tools/src/racoon/ |
isakmp_xauth.c | 47 #include <pwd.h> 229 outlet = &xst->authdata.generic.pwd; 254 (xst->authdata.generic.pwd != NULL)) { 258 char *pwd = xst->authdata.generic.pwd; local 263 "Got username \"%s\", password \"%s\"\n", usr, pwd); 277 res = privsep_xauth_login_system(usr, pwd); 281 res = xauth_login_radius(iph1, usr, pwd); 287 iph1->remote, usr, pwd); 292 res = xauth_login_ldap(iph1, usr, pwd); 1382 vchar_t *pwd = NULL; local [all...] |
/libcore/luni/src/main/java/java/security/ |
KeyStoreSpi.java | 303 char[] pwd; local 307 pwd = ((KeyStore.PasswordProtection) pp).getPassword(); 308 engineLoad(null, pwd); 316 pwd = getPasswordFromCallBack(pp); 317 engineLoad(null, pwd);
|
/cts/apps/CtsVerifier/jni/verifier/ |
com_android_cts_verifier_os_FileUtils.cpp | 22 #include <pwd.h> 80 struct passwd *pwd = getpwuid(uid); local 81 return env->NewStringUTF(pwd->pw_name);
|
/cts/libs/deviceutil/jni/ |
android_cts_FileUtils.cpp | 19 #include <pwd.h> 83 struct passwd *pwd = getpwuid(uid); local 84 return env->NewStringUTF(pwd->pw_name);
|
/libcore/harmony-tests/src/test/java/org/apache/harmony/tests/javax/security/auth/callback/ |
PasswordCallbackTest.java | 121 char[] pwd = { 'a', 'b', 'c' }; local 123 p.setPassword(pwd);
|