/external/linux-tools-perf/util/ |
H A D | abspath.c | 6 char *pwd; local 10 pwd = getenv("PWD"); 11 if (pwd && strcmp(pwd, cwd)) { 13 if (!stat(pwd, &pwd_stat) && 16 strlcpy(cwd, pwd, PATH_MAX);
|
/external/openssh/openbsd-compat/ |
H A D | port-solaris.h | 23 #include <pwd.h>
|
H A D | port-uw.c | 33 #include <pwd.h>
|
H A D | xcrypt.c | 29 #include <pwd.h>
|
/external/openssh/ |
H A D | platform.h | 21 #include <pwd.h>
|
H A D | sftp-server-main.c | 21 #include <pwd.h>
|
H A D | auth-rh-rsa.c | 20 #include <pwd.h>
|
H A D | auth-sia.c | 30 #include <pwd.h>
|
H A D | auth-skey.c | 32 #include <pwd.h>
|
/external/apache-harmony/auth/src/test/java/common/org/apache/harmony/auth/tests/javax/security/auth/callback/ |
H A D | PasswordCallbackTest.java | 44 char[] pwd = {'a','b','c'}; 45 pc.setPassword(pwd); 46 assertEquals(new String(pwd), new String(pc.getPassword())); 48 assertEquals(pwd.length, pc.getPassword().length); 49 assertFalse(new String(pwd).equals(pc.getPassword()));
|
/external/apache-harmony/auth/src/test/java/common/org/apache/harmony/auth/tests/javax/security/auth/callback/serialization/ |
H A D | PasswordCallbackTest.java | 39 char[] pwd = {'a', 'b', 'c'}; 41 p.setPassword(pwd);
|
/external/ppp/pppd/plugins/radius/ |
H A D | includes.h | 43 #include <pwd.h>
|
/external/iptables/extensions/ |
H A D | libxt_owner.c | 8 #include <pwd.h> 139 struct passwd *pwd; local 146 if ((pwd = getpwnam(cb->arg)) != NULL) 147 id = pwd->pw_uid; 186 struct passwd *pwd; local 193 if ((pwd = getpwnam(cb->arg)) != NULL) 194 id = pwd->pw_uid; 244 struct passwd *pwd; local 251 if ((pwd = getpwnam(cb->arg)) != NULL) 252 from = to = pwd 301 struct passwd *pwd = getpwuid(info->uid); local 350 struct passwd *pwd = getpwuid(info->uid); local 399 const struct passwd *pwd = getpwuid(info->uid_min); local [all...] |
/external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/java/security/ |
H A D | KeyStore_Impl3Test.java | 114 char[] pwd = { 'p', 'a', 's', 's', 'w', 'd' }; 115 KeyStore.PasswordProtection pPath = new KeyStore.PasswordProtection(pwd); 134 kss[i].setKeyEntry(aliases[3], pk, pwd, certs); 138 kss[i].store(null, pwd); 147 kss[i].store(bos, pwd); 150 kss1[i].load(bis, pwd); 190 assertEquals("Incorrect entry", kss[i].getKey(aliases[3], pwd), 191 kss1[i].getKey(aliases[3], pwd));
|
H A D | KeyStore_Impl1Test.java | 470 char[] pwd = { 'p', 'a', 's', 's', 'w', 'd' }; 471 KeyStore.PasswordProtection pPath = new KeyStore.PasswordProtection(pwd); 510 key = kss[i].getKey(aliases[j], pwd); 583 char [] pwd = {'p', 'a', 's', 's', 'w', 'd'}; 584 KeyStore.PasswordProtection pPath = new KeyStore.PasswordProtection(pwd); 606 key1 = kss[i].getKey(aliases[j], pwd); 735 char[] pwd = new char[0]; 746 kss[i].setKeyEntry("ZZZ", null, pwd, certs); 751 kss[i].setKeyEntry("ZZZ", key, pwd, null); 757 kss[i].setKeyEntry("ZZZ", key, pwd, [all...] |
/external/libppp/src/ |
H A D | systems.c | 34 #include <pwd.h> 72 struct passwd *pwd; local 143 pwd = getpwuid(ID0realuid()); 147 pwd = getpwnam(to); 149 if (pwd == NULL) 152 strncpy(to, pwd->pw_dir, endto - to); 209 struct passwd *pwd; local 214 pwd = getpwuid(ID0realuid()); 215 if (pwd != NULL) 217 if (!strcmp("*", arg->argv[f]) || !strcmp(pwd [all...] |
/external/chromium/chrome/browser/policy/ |
H A D | policy_path_parser_posix.cc | 5 #include <pwd.h>
|
/external/e2fsprogs/include/nonunix/ |
H A D | unistd.h | 35 #include <pwd.h>
|
/external/apache-harmony/x-net/src/test/impl/java.injected/org/apache/harmony/xnet/provider/jsse/ |
H A D | DigitalSignatureTest.java | 39 char[] pwd = JSSETestData.KS_PASSWORD; 43 new KeyStore.PasswordProtection(pwd));
|
H A D | KeyManagerImplTest.java | 63 char[] pwd = JSSETestData.KS_PASSWORD; 65 KeyManagerImpl km = new KeyManagerImpl(ks, pwd);
|
H A D | ServerHandshakeImplTest.java | 44 char[] pwd = JSSETestData.KS_PASSWORD; 48 kmf.init(ks, pwd);
|
/external/ipsec-tools/src/racoon/ |
H A D | isakmp_xauth.c | 47 #include <pwd.h> 229 outlet = &xst->authdata.generic.pwd; 254 (xst->authdata.generic.pwd != NULL)) { 258 char *pwd = xst->authdata.generic.pwd; local 263 "Got username \"%s\", password \"%s\"\n", usr, pwd); 277 res = privsep_xauth_login_system(usr, pwd); 281 res = xauth_login_radius(iph1, usr, pwd); 287 iph1->remote, usr, pwd); 292 res = xauth_login_ldap(iph1, usr, pwd); 1382 vchar_t *pwd = NULL; local [all...] |
H A D | isakmp_xauth.h | 67 char *pwd; member in struct:xauth_state::__anon6947::authgeneric
|
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/ |
H A D | KeyStore3Test.java | 167 char[] pwd = new char[] { '1', '2', '3', '4', '5', '6' }; 171 ks.load(fis, pwd); 172 Builder b = Builder.newInstance(ks, new PasswordProtection(pwd)); 180 new KeyStore.PasswordProtection(pwd));
|
/external/dropbear/ |
H A D | netbsd_getpass.c | 47 #include <pwd.h>
|