/external/apache-harmony/luni/src/test/api/common/org/apache/harmony/luni/tests/java/io/ |
D | PrintWriterTest.java | 58 PrintWriter pw; field in PrintWriterTest 72 pw.println("Random Chars"); in test_ConstructorLjava_io_OutputStream() 73 pw.write("Hello World"); in test_ConstructorLjava_io_OutputStream() 74 pw.flush(); in test_ConstructorLjava_io_OutputStream() 94 pw = new PrintWriter(bao, true); in test_ConstructorLjava_io_OutputStreamZ() 95 pw.println("Random Chars"); in test_ConstructorLjava_io_OutputStreamZ() 96 pw.write("Hello World"); in test_ConstructorLjava_io_OutputStreamZ() 102 pw.flush(); in test_ConstructorLjava_io_OutputStreamZ() 121 pw = new PrintWriter(sw = new Support_StringWriter()); in test_ConstructorLjava_io_Writer() 122 pw.print("Hello"); in test_ConstructorLjava_io_Writer() [all …]
|
D | PipedReaderTest.java | 29 public PipedWriter pw; field in PipedReaderTest.PWriter 33 pw = new PipedWriter(reader); in PWriter() 40 pw = new PipedWriter(); in PWriter() 47 pw.write(c); in run() 143 preader.connect(pwriter.pw); in test_connectLjava_io_PipedWriter() 151 preader.connect(pwriter.pw); in test_connectLjava_io_PipedWriter() 202 PipedWriter pw = new PipedWriter(); in test_read$CII_ExceptionPriority() local 205 obj = new PipedReader(pw); in test_read$CII_ExceptionPriority() 213 PipedWriter pw = new PipedWriter(); in test_read$CII_ExceptionPriority2() local 216 obj = new PipedReader(pw); in test_read$CII_ExceptionPriority2() [all …]
|
D | PipedWriterTest.java | 31 public PReader(PipedWriter pw) { in PReader() argument 33 pr = new PipedReader(pw); in PReader() 65 PipedWriter pw; field in PipedWriterTest 83 pw = new PipedWriter(rd); in test_ConstructorLjava_io_PipedReader() 86 pw.write(buf); in test_ConstructorLjava_io_PipedReader() 87 pw.close(); in test_ConstructorLjava_io_PipedReader() 101 pw = new PipedWriter(rd); in test_close() 103 pw.close(); in test_close() 105 pw.write(buf); in test_close() 120 pw = new PipedWriter(); in test_connectLjava_io_PipedReader() [all …]
|
D | PipedInputStreamTest.java | 53 PWriter pw; field in PipedInputStreamTest 86 t = new Thread(pw = new PWriter(pos, 1000)); in test_readException() 109 t = new Thread(pw = new PWriter(pos, 1000)); in test_available() 112 synchronized (pw) { in test_available() 113 pw.wait(10000); in test_available() 160 t = new Thread(pw = new PWriter(pos, 1000)); in test_connectLjava_io_PipedOutputStream() 163 synchronized (pw) { in test_connectLjava_io_PipedOutputStream() 164 pw.wait(10000); in test_connectLjava_io_PipedOutputStream() 178 t = new Thread(pw = new PWriter(pos, 1000)); in test_read() 181 synchronized (pw) { in test_read() [all …]
|
/external/openssh/ |
D | uidswap.c | 65 temporarily_use_uid(struct passwd *pw) in temporarily_use_uid() argument 72 (u_int)pw->pw_uid, (u_int)pw->pw_gid, in temporarily_use_uid() 105 if (initgroups(pw->pw_name, pw->pw_gid) < 0) in temporarily_use_uid() 106 fatal("initgroups: %s: %.100s", pw->pw_name, in temporarily_use_uid() 133 if (setegid(pw->pw_gid) < 0) in temporarily_use_uid() 134 fatal("setegid %u: %.100s", (u_int)pw->pw_gid, in temporarily_use_uid() 136 if (seteuid(pw->pw_uid) == -1) in temporarily_use_uid() 137 fatal("seteuid %u: %.100s", (u_int)pw->pw_uid, in temporarily_use_uid() 217 permanently_set_uid(struct passwd *pw) in permanently_set_uid() argument 226 if (pw == NULL) in permanently_set_uid() [all …]
|
D | auth.c | 95 allowed_user(struct passwd * pw) in allowed_user() argument 105 if (!pw || !pw->pw_name) in allowed_user() 110 spw = getspnam(pw->pw_name); in allowed_user() 118 passwd = pw->pw_passwd; in allowed_user() 122 passwd = get_iaf_password(pw); in allowed_user() 150 pw->pw_name); in allowed_user() 161 char *shell = xstrdup((pw->pw_shell[0] == '\0') ? in allowed_user() 162 _PATH_BSHELL : pw->pw_shell); /* empty = /bin/sh */ in allowed_user() 166 "does not exist", pw->pw_name, shell); in allowed_user() 173 "is not executable", pw->pw_name, shell); in allowed_user() [all …]
|
D | auth-rhosts.c | 187 auth_rhosts(struct passwd *pw, const char *client_user) in auth_rhosts() argument 193 return auth_rhosts2(pw, client_user, hostname, ipaddr); in auth_rhosts() 197 auth_rhosts2_raw(struct passwd *pw, const char *client_user, const char *hostname, in auth_rhosts2_raw() argument 209 temporarily_use_uid(pw); in auth_rhosts2_raw() 219 pw->pw_dir, rhosts_files[rhosts_file_index]); in auth_rhosts2_raw() 233 if (pw->pw_uid != 0) { in auth_rhosts2_raw() 235 client_user, pw->pw_name)) { in auth_rhosts2_raw() 241 client_user, pw->pw_name)) { in auth_rhosts2_raw() 251 if (stat(pw->pw_dir, &st) < 0) { in auth_rhosts2_raw() 253 "no home directory %.200s", pw->pw_name, pw->pw_dir); in auth_rhosts2_raw() [all …]
|
D | md5crypt.c | 51 md5_crypt(const char *pw, const char *salt) in md5_crypt() argument 83 MD5_Update(&ctx, pw, strlen(pw)); in md5_crypt() 93 MD5_Update(&ctx1, pw, strlen(pw)); in md5_crypt() 95 MD5_Update(&ctx1, pw, strlen(pw)); in md5_crypt() 98 for(pl = strlen(pw); pl > 0; pl -= 16) in md5_crypt() 105 for (j = 0, i = strlen(pw); i != 0; i >>= 1) in md5_crypt() 109 MD5_Update(&ctx, pw + j, 1); in md5_crypt() 124 MD5_Update(&ctx1, pw, strlen(pw)); in md5_crypt() 132 MD5_Update(&ctx1, pw, strlen(pw)); in md5_crypt() 137 MD5_Update(&ctx1, pw, strlen(pw)); in md5_crypt()
|
D | platform.c | 93 platform_setusercontext(struct passwd *pw) in platform_setusercontext() argument 103 solaris_set_default_project(pw); in platform_setusercontext() 126 if (getluid() == -1 && setluid(pw->pw_uid) == -1) in platform_setusercontext() 137 platform_setusercontext_post_groups(struct passwd *pw) in platform_setusercontext_post_groups() argument 152 irix_setusercontext(pw); in platform_setusercontext_post_groups() 156 aix_usrinfo(pw); in platform_setusercontext_post_groups() 160 if (set_id(pw->pw_name) != 0) { in platform_setusercontext_post_groups() 179 if (setpcred(pw->pw_name, creds) == -1) in platform_setusercontext_post_groups() 184 ssh_selinux_setup_exec_context(pw->pw_name); in platform_setusercontext_post_groups()
|
D | auth2-pubkey.c | 142 if (PRIVSEP(user_key_allowed(authctxt->pw, key)) && in userauth_pubkey() 160 if (PRIVSEP(user_key_allowed(authctxt->pw, key))) { in userauth_pubkey() 201 match_principals_file(char *file, struct passwd *pw, struct KeyCert *cert) in match_principals_file() argument 208 temporarily_use_uid(pw); in match_principals_file() 210 if ((f = auth_openprincipals(file, pw, options.strict_modes)) == NULL) { in match_principals_file() 243 if (auth_parse_options(pw, line_opts, in match_principals_file() 259 user_key_allowed2(struct passwd *pw, Key *key, char *file) in user_key_allowed2() argument 270 temporarily_use_uid(pw); in user_key_allowed2() 273 f = auth_openkeyfile(file, pw, options.strict_modes); in user_key_allowed2() 317 if (auth_parse_options(pw, key_options, file, in user_key_allowed2() [all …]
|
D | auth-passwd.c | 83 struct passwd * pw = authctxt->pw; in auth_password() local 90 if (pw->pw_uid == 0 && options.permit_root_login != PERMIT_YES) in auth_password() 106 HANDLE hToken = cygwin_logon_user(pw, password); in auth_password() 169 struct passwd *pw = authctxt->pw; in sys_auth_passwd() local 173 as = auth_usercheck(pw->pw_name, authctxt->style, "auth-ssh", in sys_auth_passwd() 194 struct passwd *pw = authctxt->pw; in sys_auth_passwd() local 198 char *pw_password = authctxt->valid ? shadow_pw(pw) : pw->pw_passwd; in sys_auth_passwd()
|
D | session.c | 168 auth_sock_cleanup_proc(struct passwd *pw) in auth_sock_cleanup_proc() argument 171 temporarily_use_uid(pw); in auth_sock_cleanup_proc() 180 auth_input_request_forwarding(struct passwd * pw) in auth_input_request_forwarding() argument 192 temporarily_use_uid(pw); in auth_input_request_forwarding() 273 setproctitle("%s", authctxt->pw->pw_name); in do_authenticated() 310 s->pw = authctxt->pw; in do_authenticated1() 378 success = auth_input_request_forwarding(s->pw); in do_authenticated1() 391 if (channel_input_port_forward_request(s->pw->pw_uid == 0, in do_authenticated1() 573 cray_init_job(s->pw); /* set up cray jid and tmpdir */ in do_exec_no_pty() 714 cray_init_job(s->pw); /* set up cray jid and tmpdir */ in do_exec_pty() [all …]
|
D | auth-rh-rsa.c | 42 auth_rhosts_rsa_key_allowed(struct passwd *pw, char *cuser, char *chost, in auth_rhosts_rsa_key_allowed() argument 51 if (!auth_rhosts(pw, cuser)) in auth_rhosts_rsa_key_allowed() 54 host_status = check_key_in_hostfiles(pw, client_host_key, in auth_rhosts_rsa_key_allowed() 69 struct passwd *pw = authctxt->pw; in auth_rhosts_rsa() local 81 if (!PRIVSEP(auth_rhosts_rsa_key_allowed(pw, cuser, chost, client_host_key))) { in auth_rhosts_rsa() 100 pw->pw_name, cuser, chost); in auth_rhosts_rsa()
|
D | auth2-jpake.c | 227 if ((lc = login_getclass(authctxt->pw->pw_class)) == NULL && in fake_salt_and_scheme() 281 authctxt->valid, authctxt->pw->pw_passwd); in auth2_jpake_get_pwdata() 287 if (strncmp(authctxt->pw->pw_passwd, "$2$", 3) == 0 && in auth2_jpake_get_pwdata() 288 strlen(authctxt->pw->pw_passwd) > 28) { in auth2_jpake_get_pwdata() 295 strlcpy(*salt, authctxt->pw->pw_passwd, salt_len); in auth2_jpake_get_pwdata() 297 } else if (strncmp(authctxt->pw->pw_passwd, "$2a$", 4) == 0 && in auth2_jpake_get_pwdata() 298 strlen(authctxt->pw->pw_passwd) > 29) { in auth2_jpake_get_pwdata() 305 strlcpy(*salt, authctxt->pw->pw_passwd, salt_len); in auth2_jpake_get_pwdata() 307 } else if (strncmp(authctxt->pw->pw_passwd, "$1$", 3) == 0 && in auth2_jpake_get_pwdata() 308 strlen(authctxt->pw->pw_passwd) > 5) { in auth2_jpake_get_pwdata() [all …]
|
D | auth-sia.c | 83 session_setup_sia(struct passwd *pw, char *tty) in session_setup_sia() argument 90 if (sia_ses_init(&ent, saved_argc, saved_argv, host, pw->pw_name, in session_setup_sia() 94 if (sia_make_entity_pwd(pw, ent) != SIASUCCESS) { in session_setup_sia() 102 pw->pw_name, host); in session_setup_sia() 106 pw->pw_name, host); in session_setup_sia() 111 permanently_set_uid(pw); in session_setup_sia()
|
D | auth-rsa.c | 164 rsa_key_allowed_in_file(struct passwd *pw, char *file, in rsa_key_allowed_in_file() argument 175 if ((f = auth_openkeyfile(file, pw, options.strict_modes)) == NULL) in rsa_key_allowed_in_file() 244 if (!auth_parse_options(pw, key_options, file, linenum)) in rsa_key_allowed_in_file() 271 auth_rsa_key_allowed(struct passwd *pw, BIGNUM *client_n, Key **rkey) in auth_rsa_key_allowed() argument 276 temporarily_use_uid(pw); in auth_rsa_key_allowed() 280 options.authorized_keys_files[i], pw); in auth_rsa_key_allowed() 281 allowed = rsa_key_allowed_in_file(pw, file, client_n, rkey); in auth_rsa_key_allowed() 300 struct passwd *pw = authctxt->pw; in auth_rsa() local 306 if (!PRIVSEP(auth_rsa_key_allowed(pw, client_n, &key))) { in auth_rsa()
|
D | sshpty.c | 208 pty_setowner(struct passwd *pw, const char *tty) in pty_setowner() argument 221 gid = pw->pw_gid; in pty_setowner() 235 ssh_selinux_setup_pty(pw->pw_name, tty); in pty_setowner() 238 if (st.st_uid != pw->pw_uid || st.st_gid != gid) { in pty_setowner() 239 if (chown(tty, pw->pw_uid, gid) < 0) { in pty_setowner() 241 (st.st_uid == pw->pw_uid || st.st_uid == 0)) in pty_setowner() 243 tty, (u_int)pw->pw_uid, (u_int)gid, in pty_setowner() 247 tty, (u_int)pw->pw_uid, (u_int)gid, in pty_setowner()
|
/external/apache-xml/src/main/java/org/apache/xml/utils/ |
D | DefaultErrorHandler.java | 56 public DefaultErrorHandler(PrintWriter pw) in DefaultErrorHandler() argument 58 m_pw = pw; in DefaultErrorHandler() 64 public DefaultErrorHandler(PrintStream pw) in DefaultErrorHandler() argument 66 m_pw = new PrintWriter(pw, true); in DefaultErrorHandler() 119 PrintWriter pw = getErrorWriter(); in warning() local 121 printLocation(pw, exception); in warning() 122 pw.println("Parser warning: " + exception.getMessage()); in warning() 200 PrintWriter pw = getErrorWriter(); in warning() local 202 printLocation(pw, exception); in warning() 203 pw.println(exception.getMessage()); in warning() [all …]
|
/external/javasqlite/src/main/java/SQLite/ |
D | Shell.java | 29 PrintWriter pw; field in Shell 40 public Shell(PrintWriter pw, PrintWriter err) { in Shell() argument 41 this.pw = pw; in Shell() 46 pw = new PrintWriter(ps); in Shell() 51 Shell s = new Shell(this.pw, this.err); in clone() 183 pw.println(""); in newrow() 186 pw.println(cols[i] + " = " + in newrow() 202 pw.print(csep + cols[i]); in newrow() 207 pw.println(""); in newrow() 215 pw.print(csep + (args[i] == null ? "NULL" : args[i])); in newrow() [all …]
|
/external/openssh/openbsd-compat/ |
D | port-irix.c | 47 irix_setusercontext(struct passwd *pw) in irix_setusercontext() argument 59 jid = jlimit_startjob(pw->pw_name, pw->pw_uid, "interactive"); in irix_setusercontext() 72 if ((projid = getdfltprojuser(pw->pw_name)) == -1) { in irix_setusercontext() 78 (int)projid, pw->pw_name, strerror(errno)); in irix_setusercontext() 82 debug("Setting sat id to %d", (int) pw->pw_uid); in irix_setusercontext() 83 if (satsetid(pw->pw_uid)) in irix_setusercontext()
|
D | port-uw.c | 55 struct passwd *pw = authctxt->pw; in sys_auth_passwd() local 60 char *pw_password = authctxt->valid ? shadow_pw(pw) : pw->pw_passwd; in sys_auth_passwd() 74 if (!nischeck(pw->pw_name)) { in sys_auth_passwd() 132 get_iaf_password(struct passwd *pw) in get_iaf_password() argument 137 if (!ia_openinfo(pw->pw_name,&uinfo)) { in get_iaf_password()
|
D | xcrypt.c | 90 shadow_pw(struct passwd *pw) in shadow_pw() argument 92 char *pw_password = pw->pw_passwd; in shadow_pw() 95 struct spwd *spw = getspnam(pw->pw_name); in shadow_pw() 102 return(get_iaf_password(pw)); in shadow_pw() 107 if (issecure() && (spw = getpwanam(pw->pw_name)) != NULL) in shadow_pw() 110 struct pr_passwd *spw = getprpwnam(pw->pw_name); in shadow_pw()
|
/external/dropbear/ |
D | svr-auth.c | 146 !(svr_opts.norootpass && ses.authstate.pw->pw_uid == 0) ) { in recv_msg_userauth_request() 159 !(svr_opts.norootpass && ses.authstate.pw->pw_uid == 0) ) { in recv_msg_userauth_request() 213 ses.authstate.pw = getpwnam((char*)username); in checkusername() 219 if (ses.authstate.pw == NULL) { in checkusername() 229 ses.authstate.printableuser = m_strdup(ses.authstate.pw->pw_name); in checkusername() 232 if (svr_opts.norootlogin && ses.authstate.pw->pw_uid == 0) { in checkusername() 240 if (ses.authstate.pw->pw_passwd[0] == '\0') { in checkusername() 248 TRACE(("shell is %s", ses.authstate.pw->pw_shell)) in checkusername() 251 usershell = ses.authstate.pw->pw_shell; in checkusername() 280 TRACE(("uid = %d", ses.authstate.pw->pw_uid)) in checkusername() [all …]
|
/external/dbus/bus/ |
D | activation-helper.c | 188 struct passwd *pw; in check_permissions() local 190 pw = NULL; in check_permissions() 196 pw = getpwnam(dbus_user); in check_permissions() 197 if (!pw) in check_permissions() 204 if (pw->pw_uid != uid) in check_permissions() 313 struct passwd *pw; in switch_user() local 316 pw = getpwnam (user); in switch_user() 317 if (!pw) in switch_user() 325 if (initgroups (user, pw->pw_gid)) in switch_user() 333 if (setgid (pw->pw_gid)) in switch_user() [all …]
|
/external/libselinux/src/ |
D | android.c | 262 struct passwd *pw; in selinux_android_setfilecon() local 280 pw = getpwuid(uid); in selinux_android_setfilecon() 281 if (!pw) in selinux_android_setfilecon() 293 if (strncasecmp(pw->pw_name, cur->user, cur->len-1)) in selinux_android_setfilecon() 296 if (strcasecmp(pw->pw_name, cur->user)) in selinux_android_setfilecon() 314 if (cur->levelFromUid && !strncmp(pw->pw_name, "app_", 4)) { in selinux_android_setfilecon() 319 id = strtoul(pw->pw_name + 4, NULL, 10); in selinux_android_setfilecon() 370 struct passwd *pw; in selinux_android_setcontext() local 388 pw = getpwuid(uid); in selinux_android_setcontext() 389 if (!pw) in selinux_android_setcontext() [all …]
|