/external/toybox/toys/pending/ |
D | useradd.c | 45 struct passwd pwd; local 64 pwd.pw_name = s; 65 pwd.pw_passwd = "x"; 66 pwd.pw_gecos = TT.gecos ? TT.gecos : "Linux User,"; 67 pwd.pw_dir = TT.dir ? TT.dir : xmprintf("/home/%s", *toys.optargs); 79 pwd.pw_shell = TT.shell; 90 pwd.pw_uid = TT.uid; 97 if (getgrnam(pwd.pw_name)) error_exit("group '%s' in use", pwd.pw_name); 101 pwd.pw_gid = TT.gid; 105 char *s = xmprintf("-g%ld", (long)pwd.pw_gid); [all …]
|
D | crontab.c | 263 static void do_edit(struct passwd *pwd) in do_edit() argument 275 snprintf(toybuf, sizeof(toybuf), "%s%s", TT.cdir, pwd->pw_name); in do_edit() 283 } else printf("No crontab for '%s'- using an empty one\n", pwd->pw_name); in do_edit() 290 char *prog = pwd->pw_shell; in do_edit() 292 xsetuser(pwd); in do_edit() 293 if (pwd->pw_uid) { in do_edit() 294 if (setenv("USER", pwd->pw_name, 1)) _exit(1); in do_edit() 295 if (setenv("LOGNAME", pwd->pw_name, 1)) _exit(1); in do_edit() 297 if (setenv("HOME", pwd->pw_dir, 1)) _exit(1); in do_edit() 329 update_crontab(tname, pwd->pw_name); in do_edit() [all …]
|
D | sulogin.c | 39 static int validate_password(char *pwd) in validate_password() argument 63 pass = crypt(toybuf, pwd); in validate_password() 65 if( pass && !strcmp(pass, pwd)) ret = 0; in validate_password() 79 struct passwd *pwd = NULL; in sulogin_main() local 100 if (!(pwd = getpwuid(0))) error_exit("invalid user"); in sulogin_main() 101 pass = pwd->pw_passwd; in sulogin_main() 104 if ((spwd = getspnam (pwd->pw_name))) pass = spwd->sp_pwdp; in sulogin_main() 116 || (shell = pwd->pw_shell)) in sulogin_main()
|
D | userdel.c | 94 struct passwd *pwd = NULL; in userdel_main() local 96 pwd = xgetpwnam(*toys.optargs); in userdel_main() 97 update_password("/etc/passwd", pwd->pw_name, NULL); in userdel_main() 98 update_password("/etc/shadow", pwd->pw_name, NULL); in userdel_main() 110 char *arg[] = {"rm", "-fr", pwd->pw_dir, NULL, NULL}; in userdel_main() 112 sprintf(toybuf, "/var/spool/mail/%s",pwd->pw_name); in userdel_main()
|
/external/autotest/client/tests/cgroup/ |
D | cgroup_common.py | 54 pwd = mkdtemp(prefix='cgroup-', dir=root) + '/' 56 pwd = mkdtemp(prefix='cgroup-', dir=self.root) + '/' 60 return pwd 63 def rm_cgroup(self, pwd, supress=False): argument 72 os.rmdir(pwd) 95 def is_cgroup(self, pid, pwd): argument 102 if open(pwd + '/tasks').readlines().count("%d\n" % pid) > 0: 117 def set_cgroup(self, pid, pwd): argument 125 open(pwd+'/tasks', 'w').write(str(pid)) 129 if self.is_cgroup(pid, pwd): [all …]
|
D | cgroup.py | 83 if item.rm_cgroup(pwd): 102 pwd = item.mk_cgroup() 103 if pwd == None: 173 if item.set_cgroup(ps.pid, pwd): 175 if item.set_prop("memory.limit_in_bytes", ("%dM" % (mem/2)), pwd): 221 if item.set_cgroup(ps.pid, pwd): 223 if item.set_prop("memory.memsw.limit_in_bytes", "%dM"%(mem/2), pwd): 333 if item.rm_cgroup(pwd): 357 pwd = item.mk_cgroup() 358 if pwd == None: [all …]
|
/external/toybox/toys/other/ |
D | login.c | 43 struct passwd *pwd = 0; in login_main() local 74 if ((pwd = getpwnam(username))) { in login_main() 76 if (TT.f || !*pwd->pw_passwd) break; in login_main() 79 if (*(pass = pwd->pw_passwd) == 'x') { in login_main() 95 syslog(LOG_WARNING, "invalid password for '%s' on %s %s%s", pwd->pw_name, in login_main() 102 pwd = 0; in login_main() 106 if (!pwd) error_exit("max retries (3)"); in login_main() 110 if (pwd->pw_uid && !access("/etc/nologin", R_OK)) { in login_main() 119 if (fchown(tty, pwd->pw_uid, pwd->pw_gid) || fchmod(tty, 0600)) in login_main() 121 xsetuser(pwd); in login_main() [all …]
|
/external/python/cpython3/Lib/test/ |
D | test_pwd.py | 5 pwd = support.import_module('pwd') variable 7 @unittest.skipUnless(hasattr(pwd, 'getpwall'), 'Does not have getpwall()') 11 entries = pwd.getpwall() 37 entries = pwd.getpwall() 53 self.assertIn(pwd.getpwnam(e.pw_name), entriesbyname[e.pw_name]) 54 self.assertIn(pwd.getpwuid(e.pw_uid), entriesbyuid[e.pw_uid]) 57 self.assertRaises(TypeError, pwd.getpwuid) 58 self.assertRaises(TypeError, pwd.getpwuid, 3.14) 59 self.assertRaises(TypeError, pwd.getpwnam) 60 self.assertRaises(TypeError, pwd.getpwnam, 42) [all …]
|
/external/python/cpython2/Lib/test/ |
D | test_pwd.py | 5 pwd = test_support.import_module('pwd') variable 10 entries = pwd.getpwall() 36 entries = pwd.getpwall() 52 self.assertIn(pwd.getpwnam(e.pw_name), entriesbyname[e.pw_name]) 53 self.assertIn(pwd.getpwuid(e.pw_uid), entriesbyuid[e.pw_uid]) 56 self.assertRaises(TypeError, pwd.getpwuid) 57 self.assertRaises(TypeError, pwd.getpwuid, 3.14) 58 self.assertRaises(TypeError, pwd.getpwnam) 59 self.assertRaises(TypeError, pwd.getpwnam, 42) 60 self.assertRaises(TypeError, pwd.getpwall, 42) [all …]
|
/external/curl/tests/ |
D | testcurl.pl | 69 use vars qw($version $fixed $infixed $CURLDIR $git $pwd $build $buildlog 234 chdir $pwd; # cd back to the original root dir 236 if ($pwd && $build) { 239 rmtree "$pwd/$build"; 252 my $configfile = "$pwd/$build/lib/curl_config.h"; 371 $pwd = getcwd(); 397 $buildlog="$pwd/$buildlogname"; 562 chdir "$pwd/$build"; 670 s/$pwd//g; 682 chdir "$pwd/$build"; [all …]
|
/external/selinux/sandbox/ |
D | seunshare.c | 382 struct passwd *pwd, int copy_content) in cleanup_tmpdir() argument 394 if (cmdbuf && spawn_command(cmdbuf, pwd->pw_uid) != 0) { in cleanup_tmpdir() 408 if (cmdbuf && spawn_command(cmdbuf, pwd->pw_uid) != 0) rc++; in cleanup_tmpdir() 419 if ((uid_t)setfsuid(pwd->pw_uid) != 0) { in cleanup_tmpdir() 434 struct stat *out_st, struct passwd *pwd, security_context_t execcon) in create_tmpdir() argument 444 if ((uid_t)setfsuid(pwd->pw_uid) != 0) in create_tmpdir() 465 if ((uid_t)setfsuid(0) != pwd->pw_uid) in create_tmpdir() 469 if (asprintf(&tmpdir, "/tmp/.sandbox-%s-XXXXXX", pwd->pw_name) == -1) { in create_tmpdir() 521 if ((uid_t)setfsuid(pwd->pw_uid) != 0) in create_tmpdir() 529 if ((uid_t)setfsuid(0) != pwd->pw_uid) in create_tmpdir() [all …]
|
/external/iptables/extensions/ |
D | libxt_owner.c | 140 struct passwd *pwd; in owner_mt_parse_v0() local 147 if ((pwd = getpwnam(cb->arg)) != NULL) in owner_mt_parse_v0() 148 id = pwd->pw_uid; in owner_mt_parse_v0() 187 struct passwd *pwd; in owner_mt6_parse_v0() local 194 if ((pwd = getpwnam(cb->arg)) != NULL) in owner_mt6_parse_v0() 195 id = pwd->pw_uid; in owner_mt6_parse_v0() 245 struct passwd *pwd; in owner_mt_parse() local 252 if ((pwd = getpwnam(cb->arg)) != NULL) in owner_mt_parse() 253 from = to = pwd->pw_uid; in owner_mt_parse() 302 struct passwd *pwd = getpwuid(info->uid); in owner_mt_print_item_v0() local [all …]
|
/external/conscrypt/repackaged/common/src/main/java/com/android/org/conscrypt/ |
D | KeyManagerFactoryImpl.java | 46 private char[] pwd; field in KeyManagerFactoryImpl 58 pwd = password.clone(); in engineInit() 60 pwd = EmptyArray.CHAR; in engineInit() 77 pwd = EmptyArray.CHAR; in engineInit() 79 pwd = keyStorePwd.toCharArray(); in engineInit() 82 keyStore.load(new FileInputStream(new File(keyStoreName)), pwd); in engineInit() 115 return new KeyManager[] { new KeyManagerImpl(keyStore, pwd) }; in engineGetKeyManagers()
|
D | DefaultSSLContextImpl.java | 76 char[] pwd = (keystorepwd == null) ? null : keystorepwd.toCharArray(); in getKeyManagers() local 82 ks.load(is, pwd); in getKeyManagers() 91 kmf.init(ks, pwd); in getKeyManagers() 108 char[] pwd = (keystorepwd == null) ? null : keystorepwd.toCharArray(); in getTrustManagers() local 115 ks.load(is, pwd); in getTrustManagers()
|
/external/conscrypt/common/src/main/java/org/conscrypt/ |
D | KeyManagerFactoryImpl.java | 44 private char[] pwd; field in KeyManagerFactoryImpl 56 pwd = password.clone(); in engineInit() 58 pwd = EmptyArray.CHAR; in engineInit() 75 pwd = EmptyArray.CHAR; in engineInit() 77 pwd = keyStorePwd.toCharArray(); in engineInit() 80 keyStore.load(new FileInputStream(new File(keyStoreName)), pwd); in engineInit() 113 return new KeyManager[] { new KeyManagerImpl(keyStore, pwd) }; in engineGetKeyManagers()
|
D | DefaultSSLContextImpl.java | 72 char[] pwd = (keystorepwd == null) ? null : keystorepwd.toCharArray(); in getKeyManagers() local 78 ks.load(is, pwd); in getKeyManagers() 87 kmf.init(ks, pwd); in getKeyManagers() 104 char[] pwd = (keystorepwd == null) ? null : keystorepwd.toCharArray(); in getTrustManagers() local 111 ks.load(is, pwd); in getTrustManagers()
|
/external/ltp/testcases/open_posix_testsuite/conformance/interfaces/clock_getcpuclockid/ |
D | 5-1.c | 34 struct passwd *pwd; in main() 36 pwd = getpwnam("nobody"); in main() 37 if (pwd != NULL) { in main() 38 setgid(pwd->pw_gid); in main() 39 setuid(pwd->pw_uid); in main()
|
/external/toybox/toys/posix/ |
D | pwd.c | 26 char *s, *pwd = getcwd(0, 0), *PWD; in pwd_main() local 43 if (s && pwd) in pwd_main() 44 if (stat(pwd, &st1) || stat(PWD, &st2) || st1.st_ino != st2.st_ino || in pwd_main() 49 if (!s && !(s = pwd)) perror_exit("xgetcwd"); in pwd_main() 53 if (CFG_TOYBOX_FREE) free(pwd); in pwd_main()
|
/external/libbrillo/brillo/ |
D | userdb_utils.cc | 24 passwd* pwd = nullptr; in GetUserInfo() local 26 if (getpwnam_r(user.c_str(), &pwd_buf, buf.data(), buf_len, &pwd) || !pwd) { in GetUserInfo() 32 *uid = pwd->pw_uid; in GetUserInfo() 34 *gid = pwd->pw_gid; in GetUserInfo()
|
/external/autotest/client/deps/dejagnu/ |
D | dejagnu.py | 18 pwd = os.getcwd() variable 20 tarball = os.path.join(pwd, 'dejagnu-1.4.4.tar.bz2') 21 utils.update_version(pwd+'/src', False, version, setup, tarball, pwd)
|
/external/autotest/client/deps/libnet/ |
D | libnet.py | 21 pwd = os.getcwd() variable 22 tarball = os.path.join(pwd, 'libnet.tar.gz') 23 utils.update_version(pwd+'/src', False, version, setup, tarball, pwd)
|
/external/autotest/client/deps/pgsql/ |
D | pgsql.py | 20 pwd = os.getcwd() variable 21 tarball = os.path.join(pwd, 'postgresql-8.3.1.tar.bz2') 22 utils.update_version(pwd+'/src', False, version, setup, tarball, pwd)
|
/external/autotest/client/deps/pgpool/ |
D | pgpool.py | 25 pwd = os.getcwd() variable 26 tarball = os.path.join(pwd, 'pgpool-II-1.0.1.tar.gz') 27 utils.update_version(pwd+'/src', False, version, setup, tarball, pwd)
|
/external/autotest/client/deps/mysql/ |
D | mysql.py | 34 pwd = os.getcwd() variable 35 tarball = os.path.join(pwd, 'mysql-5.0.45.tar.gz') 36 utils.update_version(pwd+'/src', False, version, setup, tarball, pwd)
|
/external/ipsec-tools/src/racoon/ |
D | isakmp_xauth.c | 229 outlet = &xst->authdata.generic.pwd; 254 (xst->authdata.generic.pwd != NULL)) { 258 char *pwd = xst->authdata.generic.pwd; local 263 "Got username \"%s\", password \"%s\"\n", usr, pwd); 277 res = privsep_xauth_login_system(usr, pwd); 281 res = xauth_login_radius(iph1, usr, pwd); 287 iph1->remote, usr, pwd); 292 res = xauth_login_ldap(iph1, usr, pwd); 496 xauth_login_radius(iph1, usr, pwd) in xauth_login_radius() argument 499 char *pwd; [all …]
|