Home
last modified time | relevance | path

Searched refs:pw (Results 1 – 25 of 149) sorted by relevance

123456

/external/apache-harmony/luni/src/test/api/common/org/apache/harmony/luni/tests/java/io/
DPrintWriterTest.java58 PrintWriter pw; field in PrintWriterTest
72 pw.println("Random Chars"); in test_ConstructorLjava_io_OutputStream()
73 pw.write("Hello World"); in test_ConstructorLjava_io_OutputStream()
74 pw.flush(); in test_ConstructorLjava_io_OutputStream()
94 pw = new PrintWriter(bao, true); in test_ConstructorLjava_io_OutputStreamZ()
95 pw.println("Random Chars"); in test_ConstructorLjava_io_OutputStreamZ()
96 pw.write("Hello World"); in test_ConstructorLjava_io_OutputStreamZ()
102 pw.flush(); in test_ConstructorLjava_io_OutputStreamZ()
121 pw = new PrintWriter(sw = new Support_StringWriter()); in test_ConstructorLjava_io_Writer()
122 pw.print("Hello"); in test_ConstructorLjava_io_Writer()
[all …]
DPipedReaderTest.java29 public PipedWriter pw; field in PipedReaderTest.PWriter
33 pw = new PipedWriter(reader); in PWriter()
40 pw = new PipedWriter(); in PWriter()
47 pw.write(c); in run()
143 preader.connect(pwriter.pw); in test_connectLjava_io_PipedWriter()
151 preader.connect(pwriter.pw); in test_connectLjava_io_PipedWriter()
202 PipedWriter pw = new PipedWriter(); in test_read$CII_ExceptionPriority() local
205 obj = new PipedReader(pw); in test_read$CII_ExceptionPriority()
213 PipedWriter pw = new PipedWriter(); in test_read$CII_ExceptionPriority2() local
216 obj = new PipedReader(pw); in test_read$CII_ExceptionPriority2()
[all …]
DPipedWriterTest.java31 public PReader(PipedWriter pw) { in PReader() argument
33 pr = new PipedReader(pw); in PReader()
65 PipedWriter pw; field in PipedWriterTest
83 pw = new PipedWriter(rd); in test_ConstructorLjava_io_PipedReader()
86 pw.write(buf); in test_ConstructorLjava_io_PipedReader()
87 pw.close(); in test_ConstructorLjava_io_PipedReader()
101 pw = new PipedWriter(rd); in test_close()
103 pw.close(); in test_close()
105 pw.write(buf); in test_close()
120 pw = new PipedWriter(); in test_connectLjava_io_PipedReader()
[all …]
DPipedInputStreamTest.java53 PWriter pw; field in PipedInputStreamTest
86 t = new Thread(pw = new PWriter(pos, 1000)); in test_readException()
109 t = new Thread(pw = new PWriter(pos, 1000)); in test_available()
112 synchronized (pw) { in test_available()
113 pw.wait(10000); in test_available()
160 t = new Thread(pw = new PWriter(pos, 1000)); in test_connectLjava_io_PipedOutputStream()
163 synchronized (pw) { in test_connectLjava_io_PipedOutputStream()
164 pw.wait(10000); in test_connectLjava_io_PipedOutputStream()
178 t = new Thread(pw = new PWriter(pos, 1000)); in test_read()
181 synchronized (pw) { in test_read()
[all …]
/external/openssh/
Duidswap.c65 temporarily_use_uid(struct passwd *pw) in temporarily_use_uid() argument
72 (u_int)pw->pw_uid, (u_int)pw->pw_gid, in temporarily_use_uid()
105 if (initgroups(pw->pw_name, pw->pw_gid) < 0) in temporarily_use_uid()
106 fatal("initgroups: %s: %.100s", pw->pw_name, in temporarily_use_uid()
133 if (setegid(pw->pw_gid) < 0) in temporarily_use_uid()
134 fatal("setegid %u: %.100s", (u_int)pw->pw_gid, in temporarily_use_uid()
136 if (seteuid(pw->pw_uid) == -1) in temporarily_use_uid()
137 fatal("seteuid %u: %.100s", (u_int)pw->pw_uid, in temporarily_use_uid()
217 permanently_set_uid(struct passwd *pw) in permanently_set_uid() argument
226 if (pw == NULL) in permanently_set_uid()
[all …]
Dauth.c95 allowed_user(struct passwd * pw) in allowed_user() argument
105 if (!pw || !pw->pw_name) in allowed_user()
110 spw = getspnam(pw->pw_name); in allowed_user()
118 passwd = pw->pw_passwd; in allowed_user()
122 passwd = get_iaf_password(pw); in allowed_user()
150 pw->pw_name); in allowed_user()
161 char *shell = xstrdup((pw->pw_shell[0] == '\0') ? in allowed_user()
162 _PATH_BSHELL : pw->pw_shell); /* empty = /bin/sh */ in allowed_user()
166 "does not exist", pw->pw_name, shell); in allowed_user()
173 "is not executable", pw->pw_name, shell); in allowed_user()
[all …]
Dauth-rhosts.c187 auth_rhosts(struct passwd *pw, const char *client_user) in auth_rhosts() argument
193 return auth_rhosts2(pw, client_user, hostname, ipaddr); in auth_rhosts()
197 auth_rhosts2_raw(struct passwd *pw, const char *client_user, const char *hostname, in auth_rhosts2_raw() argument
209 temporarily_use_uid(pw); in auth_rhosts2_raw()
219 pw->pw_dir, rhosts_files[rhosts_file_index]); in auth_rhosts2_raw()
233 if (pw->pw_uid != 0) { in auth_rhosts2_raw()
235 client_user, pw->pw_name)) { in auth_rhosts2_raw()
241 client_user, pw->pw_name)) { in auth_rhosts2_raw()
251 if (stat(pw->pw_dir, &st) < 0) { in auth_rhosts2_raw()
253 "no home directory %.200s", pw->pw_name, pw->pw_dir); in auth_rhosts2_raw()
[all …]
Dmd5crypt.c51 md5_crypt(const char *pw, const char *salt) in md5_crypt() argument
83 MD5_Update(&ctx, pw, strlen(pw)); in md5_crypt()
93 MD5_Update(&ctx1, pw, strlen(pw)); in md5_crypt()
95 MD5_Update(&ctx1, pw, strlen(pw)); in md5_crypt()
98 for(pl = strlen(pw); pl > 0; pl -= 16) in md5_crypt()
105 for (j = 0, i = strlen(pw); i != 0; i >>= 1) in md5_crypt()
109 MD5_Update(&ctx, pw + j, 1); in md5_crypt()
124 MD5_Update(&ctx1, pw, strlen(pw)); in md5_crypt()
132 MD5_Update(&ctx1, pw, strlen(pw)); in md5_crypt()
137 MD5_Update(&ctx1, pw, strlen(pw)); in md5_crypt()
Dplatform.c93 platform_setusercontext(struct passwd *pw) in platform_setusercontext() argument
103 solaris_set_default_project(pw); in platform_setusercontext()
126 if (getluid() == -1 && setluid(pw->pw_uid) == -1) in platform_setusercontext()
137 platform_setusercontext_post_groups(struct passwd *pw) in platform_setusercontext_post_groups() argument
152 irix_setusercontext(pw); in platform_setusercontext_post_groups()
156 aix_usrinfo(pw); in platform_setusercontext_post_groups()
160 if (set_id(pw->pw_name) != 0) { in platform_setusercontext_post_groups()
179 if (setpcred(pw->pw_name, creds) == -1) in platform_setusercontext_post_groups()
184 ssh_selinux_setup_exec_context(pw->pw_name); in platform_setusercontext_post_groups()
Dauth2-pubkey.c142 if (PRIVSEP(user_key_allowed(authctxt->pw, key)) && in userauth_pubkey()
160 if (PRIVSEP(user_key_allowed(authctxt->pw, key))) { in userauth_pubkey()
201 match_principals_file(char *file, struct passwd *pw, struct KeyCert *cert) in match_principals_file() argument
208 temporarily_use_uid(pw); in match_principals_file()
210 if ((f = auth_openprincipals(file, pw, options.strict_modes)) == NULL) { in match_principals_file()
243 if (auth_parse_options(pw, line_opts, in match_principals_file()
259 user_key_allowed2(struct passwd *pw, Key *key, char *file) in user_key_allowed2() argument
270 temporarily_use_uid(pw); in user_key_allowed2()
273 f = auth_openkeyfile(file, pw, options.strict_modes); in user_key_allowed2()
317 if (auth_parse_options(pw, key_options, file, in user_key_allowed2()
[all …]
Dauth-passwd.c83 struct passwd * pw = authctxt->pw; in auth_password() local
90 if (pw->pw_uid == 0 && options.permit_root_login != PERMIT_YES) in auth_password()
106 HANDLE hToken = cygwin_logon_user(pw, password); in auth_password()
169 struct passwd *pw = authctxt->pw; in sys_auth_passwd() local
173 as = auth_usercheck(pw->pw_name, authctxt->style, "auth-ssh", in sys_auth_passwd()
194 struct passwd *pw = authctxt->pw; in sys_auth_passwd() local
198 char *pw_password = authctxt->valid ? shadow_pw(pw) : pw->pw_passwd; in sys_auth_passwd()
Dsession.c168 auth_sock_cleanup_proc(struct passwd *pw) in auth_sock_cleanup_proc() argument
171 temporarily_use_uid(pw); in auth_sock_cleanup_proc()
180 auth_input_request_forwarding(struct passwd * pw) in auth_input_request_forwarding() argument
192 temporarily_use_uid(pw); in auth_input_request_forwarding()
273 setproctitle("%s", authctxt->pw->pw_name); in do_authenticated()
310 s->pw = authctxt->pw; in do_authenticated1()
378 success = auth_input_request_forwarding(s->pw); in do_authenticated1()
391 if (channel_input_port_forward_request(s->pw->pw_uid == 0, in do_authenticated1()
573 cray_init_job(s->pw); /* set up cray jid and tmpdir */ in do_exec_no_pty()
714 cray_init_job(s->pw); /* set up cray jid and tmpdir */ in do_exec_pty()
[all …]
Dauth-rh-rsa.c42 auth_rhosts_rsa_key_allowed(struct passwd *pw, char *cuser, char *chost, in auth_rhosts_rsa_key_allowed() argument
51 if (!auth_rhosts(pw, cuser)) in auth_rhosts_rsa_key_allowed()
54 host_status = check_key_in_hostfiles(pw, client_host_key, in auth_rhosts_rsa_key_allowed()
69 struct passwd *pw = authctxt->pw; in auth_rhosts_rsa() local
81 if (!PRIVSEP(auth_rhosts_rsa_key_allowed(pw, cuser, chost, client_host_key))) { in auth_rhosts_rsa()
100 pw->pw_name, cuser, chost); in auth_rhosts_rsa()
Dauth2-jpake.c227 if ((lc = login_getclass(authctxt->pw->pw_class)) == NULL && in fake_salt_and_scheme()
281 authctxt->valid, authctxt->pw->pw_passwd); in auth2_jpake_get_pwdata()
287 if (strncmp(authctxt->pw->pw_passwd, "$2$", 3) == 0 && in auth2_jpake_get_pwdata()
288 strlen(authctxt->pw->pw_passwd) > 28) { in auth2_jpake_get_pwdata()
295 strlcpy(*salt, authctxt->pw->pw_passwd, salt_len); in auth2_jpake_get_pwdata()
297 } else if (strncmp(authctxt->pw->pw_passwd, "$2a$", 4) == 0 && in auth2_jpake_get_pwdata()
298 strlen(authctxt->pw->pw_passwd) > 29) { in auth2_jpake_get_pwdata()
305 strlcpy(*salt, authctxt->pw->pw_passwd, salt_len); in auth2_jpake_get_pwdata()
307 } else if (strncmp(authctxt->pw->pw_passwd, "$1$", 3) == 0 && in auth2_jpake_get_pwdata()
308 strlen(authctxt->pw->pw_passwd) > 5) { in auth2_jpake_get_pwdata()
[all …]
Dauth-sia.c83 session_setup_sia(struct passwd *pw, char *tty) in session_setup_sia() argument
90 if (sia_ses_init(&ent, saved_argc, saved_argv, host, pw->pw_name, in session_setup_sia()
94 if (sia_make_entity_pwd(pw, ent) != SIASUCCESS) { in session_setup_sia()
102 pw->pw_name, host); in session_setup_sia()
106 pw->pw_name, host); in session_setup_sia()
111 permanently_set_uid(pw); in session_setup_sia()
Dauth-rsa.c164 rsa_key_allowed_in_file(struct passwd *pw, char *file, in rsa_key_allowed_in_file() argument
175 if ((f = auth_openkeyfile(file, pw, options.strict_modes)) == NULL) in rsa_key_allowed_in_file()
244 if (!auth_parse_options(pw, key_options, file, linenum)) in rsa_key_allowed_in_file()
271 auth_rsa_key_allowed(struct passwd *pw, BIGNUM *client_n, Key **rkey) in auth_rsa_key_allowed() argument
276 temporarily_use_uid(pw); in auth_rsa_key_allowed()
280 options.authorized_keys_files[i], pw); in auth_rsa_key_allowed()
281 allowed = rsa_key_allowed_in_file(pw, file, client_n, rkey); in auth_rsa_key_allowed()
300 struct passwd *pw = authctxt->pw; in auth_rsa() local
306 if (!PRIVSEP(auth_rsa_key_allowed(pw, client_n, &key))) { in auth_rsa()
Dsshpty.c208 pty_setowner(struct passwd *pw, const char *tty) in pty_setowner() argument
221 gid = pw->pw_gid; in pty_setowner()
235 ssh_selinux_setup_pty(pw->pw_name, tty); in pty_setowner()
238 if (st.st_uid != pw->pw_uid || st.st_gid != gid) { in pty_setowner()
239 if (chown(tty, pw->pw_uid, gid) < 0) { in pty_setowner()
241 (st.st_uid == pw->pw_uid || st.st_uid == 0)) in pty_setowner()
243 tty, (u_int)pw->pw_uid, (u_int)gid, in pty_setowner()
247 tty, (u_int)pw->pw_uid, (u_int)gid, in pty_setowner()
/external/apache-xml/src/main/java/org/apache/xml/utils/
DDefaultErrorHandler.java56 public DefaultErrorHandler(PrintWriter pw) in DefaultErrorHandler() argument
58 m_pw = pw; in DefaultErrorHandler()
64 public DefaultErrorHandler(PrintStream pw) in DefaultErrorHandler() argument
66 m_pw = new PrintWriter(pw, true); in DefaultErrorHandler()
119 PrintWriter pw = getErrorWriter(); in warning() local
121 printLocation(pw, exception); in warning()
122 pw.println("Parser warning: " + exception.getMessage()); in warning()
200 PrintWriter pw = getErrorWriter(); in warning() local
202 printLocation(pw, exception); in warning()
203 pw.println(exception.getMessage()); in warning()
[all …]
/external/javasqlite/src/main/java/SQLite/
DShell.java29 PrintWriter pw; field in Shell
40 public Shell(PrintWriter pw, PrintWriter err) { in Shell() argument
41 this.pw = pw; in Shell()
46 pw = new PrintWriter(ps); in Shell()
51 Shell s = new Shell(this.pw, this.err); in clone()
183 pw.println(""); in newrow()
186 pw.println(cols[i] + " = " + in newrow()
202 pw.print(csep + cols[i]); in newrow()
207 pw.println(""); in newrow()
215 pw.print(csep + (args[i] == null ? "NULL" : args[i])); in newrow()
[all …]
/external/openssh/openbsd-compat/
Dport-irix.c47 irix_setusercontext(struct passwd *pw) in irix_setusercontext() argument
59 jid = jlimit_startjob(pw->pw_name, pw->pw_uid, "interactive"); in irix_setusercontext()
72 if ((projid = getdfltprojuser(pw->pw_name)) == -1) { in irix_setusercontext()
78 (int)projid, pw->pw_name, strerror(errno)); in irix_setusercontext()
82 debug("Setting sat id to %d", (int) pw->pw_uid); in irix_setusercontext()
83 if (satsetid(pw->pw_uid)) in irix_setusercontext()
Dport-uw.c55 struct passwd *pw = authctxt->pw; in sys_auth_passwd() local
60 char *pw_password = authctxt->valid ? shadow_pw(pw) : pw->pw_passwd; in sys_auth_passwd()
74 if (!nischeck(pw->pw_name)) { in sys_auth_passwd()
132 get_iaf_password(struct passwd *pw) in get_iaf_password() argument
137 if (!ia_openinfo(pw->pw_name,&uinfo)) { in get_iaf_password()
Dxcrypt.c90 shadow_pw(struct passwd *pw) in shadow_pw() argument
92 char *pw_password = pw->pw_passwd; in shadow_pw()
95 struct spwd *spw = getspnam(pw->pw_name); in shadow_pw()
102 return(get_iaf_password(pw)); in shadow_pw()
107 if (issecure() && (spw = getpwanam(pw->pw_name)) != NULL) in shadow_pw()
110 struct pr_passwd *spw = getprpwnam(pw->pw_name); in shadow_pw()
/external/dropbear/
Dsvr-auth.c146 !(svr_opts.norootpass && ses.authstate.pw->pw_uid == 0) ) { in recv_msg_userauth_request()
159 !(svr_opts.norootpass && ses.authstate.pw->pw_uid == 0) ) { in recv_msg_userauth_request()
213 ses.authstate.pw = getpwnam((char*)username); in checkusername()
219 if (ses.authstate.pw == NULL) { in checkusername()
229 ses.authstate.printableuser = m_strdup(ses.authstate.pw->pw_name); in checkusername()
232 if (svr_opts.norootlogin && ses.authstate.pw->pw_uid == 0) { in checkusername()
240 if (ses.authstate.pw->pw_passwd[0] == '\0') { in checkusername()
248 TRACE(("shell is %s", ses.authstate.pw->pw_shell)) in checkusername()
251 usershell = ses.authstate.pw->pw_shell; in checkusername()
280 TRACE(("uid = %d", ses.authstate.pw->pw_uid)) in checkusername()
[all …]
/external/dbus/bus/
Dactivation-helper.c188 struct passwd *pw; in check_permissions() local
190 pw = NULL; in check_permissions()
196 pw = getpwnam(dbus_user); in check_permissions()
197 if (!pw) in check_permissions()
204 if (pw->pw_uid != uid) in check_permissions()
313 struct passwd *pw; in switch_user() local
316 pw = getpwnam (user); in switch_user()
317 if (!pw) in switch_user()
325 if (initgroups (user, pw->pw_gid)) in switch_user()
333 if (setgid (pw->pw_gid)) in switch_user()
[all …]
/external/libselinux/src/
Dandroid.c262 struct passwd *pw; in selinux_android_setfilecon() local
280 pw = getpwuid(uid); in selinux_android_setfilecon()
281 if (!pw) in selinux_android_setfilecon()
293 if (strncasecmp(pw->pw_name, cur->user, cur->len-1)) in selinux_android_setfilecon()
296 if (strcasecmp(pw->pw_name, cur->user)) in selinux_android_setfilecon()
314 if (cur->levelFromUid && !strncmp(pw->pw_name, "app_", 4)) { in selinux_android_setfilecon()
319 id = strtoul(pw->pw_name + 4, NULL, 10); in selinux_android_setfilecon()
370 struct passwd *pw; in selinux_android_setcontext() local
388 pw = getpwuid(uid); in selinux_android_setcontext()
389 if (!pw) in selinux_android_setcontext()
[all …]

123456