/external/toybox/toys/pending/ |
D | useradd.c | 64 pwd.pw_name = s; 97 if (getgrnam(pwd.pw_name)) error_exit("group '%s' in use", pwd.pw_name); 119 entry = xmprintf("%s:%s:%ld:%ld:%s:%s:%s", pwd.pw_name, pwd.pw_passwd, 122 if (update_password("/etc/passwd", pwd.pw_name, entry)) error_exit("updating passwd file failed"); 126 entry = xmprintf("%s:!!:%u::::::", pwd.pw_name, 128 else entry = xmprintf("%s:!!:%u:0:99999:7:::", pwd.pw_name, 130 update_password("/etc/shadow", pwd.pw_name, entry); 151 if (xrun((char *[]){"passwd", pwd.pw_name, 0})) error_exit("passwd");
|
D | ipcs.c | 212 printf("%-10d %-10.10s", shmid, pw->pw_name); in shm_array() 222 printf("%-10d %-10.10s", shmid, pw->pw_name); in shm_array() 227 if ((pw = getpwuid(buf.shm_perm.cuid))) printf(" %-10s", pw->pw_name); in shm_array() 231 if ((pw = getpwuid(buf.shm_perm.uid))) printf(" %-10s", pw->pw_name); in shm_array() 238 printf("%-10d %-10.10s", shmid, pw->pw_name); in shm_array() 310 if (pw) printf("%-8d %-10.10s", semid, pw->pw_name); in sem_array() 319 if ((pw = getpwuid(buf.sem_perm.cuid))) printf(" %-10s", pw->pw_name); in sem_array() 323 if ((pw = getpwuid(buf.sem_perm.uid))) printf(" %-10s", pw->pw_name); in sem_array() 329 if (pw) printf("%-10d %-10.9s", semid, pw->pw_name); in sem_array() 390 if (pw) printf("%-8d %-10.10s", msqid, pw->pw_name); in msg_array() [all …]
|
D | crontab.c | 275 snprintf(toybuf, sizeof(toybuf), "%s%s", TT.cdir, pwd->pw_name); in do_edit() 283 } else printf("No crontab for '%s'- using an empty one\n", pwd->pw_name); in do_edit() 294 if (setenv("USER", pwd->pw_name, 1)) _exit(1); in do_edit() 295 if (setenv("LOGNAME", pwd->pw_name, 1)) _exit(1); in do_edit() 329 update_crontab(tname, pwd->pw_name); in do_edit() 351 do_replace(pwd->pw_name); in crontab_main() 354 else if (toys.optflags & FLAG_l) do_list(pwd->pw_name); in crontab_main() 355 else if (toys.optflags & FLAG_r) do_remove(pwd->pw_name); in crontab_main() 358 do_replace(pwd->pw_name); in crontab_main()
|
D | userdel.c | 97 update_password("/etc/passwd", pwd->pw_name, NULL); in userdel_main() 98 update_password("/etc/shadow", pwd->pw_name, NULL); in userdel_main() 112 sprintf(toybuf, "/var/spool/mail/%s",pwd->pw_name); in userdel_main()
|
D | groupdel.c | 54 if (pw) error_exit("can't remove primary group of user '%s'", pw->pw_name); in groupdel_main()
|
D | logger.c | 52 TT.ident = xstrdup(pw->pw_name); in logger_main()
|
D | sulogin.c | 104 if ((spwd = getspnam (pwd->pw_name))) pass = spwd->sp_pwdp; in sulogin_main()
|
/external/toybox/toys/other/ |
D | login.c | 110 syslog(LOG_WARNING, "invalid password for '%s' on %s %s%s", pwd->pw_name, in login_main() 148 setenv("USER", pwd->pw_name, 1); in login_main() 149 setenv("LOGNAME", pwd->pw_name, 1); in login_main() 159 syslog(LOG_INFO, "%s logged in on %s %s %s", pwd->pw_name, in login_main()
|
D | stat.c | 103 else if (type == 'U') xprintf("%8s", TT.user_name->pw_name); in print_stat()
|
/external/toybox/toys/posix/ |
D | id.c | 100 if (TT.is_groups) printf("%s : ", pw->pw_name); in do_id() 105 if (toys.optflags&FLAG_u) s_or_u(pw->pw_name, pw->pw_uid, 1); in do_id() 111 showid("uid=", pw->pw_uid, pw->pw_name); in do_id() 117 showid(" euid=", pw->pw_uid, pw->pw_name); in do_id()
|
/external/selinux/policycoreutils/run_init/ |
D | run_init.c | 124 p_passwd_line->pw_name, in authenticate_via_pam() 192 p_shadow_line = getspnam(p_passwd_line->pw_name); in authenticate_via_shadow_passwd() 262 printf("Authenticating %s.\n", p_passwd_line->pw_name); 276 p_passwd_line->pw_name);
|
/external/selinux/policycoreutils/newrole/ |
D | newrole.c | 435 if (!(pw && pw->pw_name && pw->pw_name[0] && pw->pw_shell in extract_pw_data() 444 pw->pw_name = strdup(pw->pw_name); in extract_pw_data() 448 if (!(pw->pw_name && pw->pw_dir && pw->pw_shell)) { in extract_pw_data() 460 free(pw->pw_name); in extract_pw_data() 524 rc |= setenv("USER", pw->pw_name, 1); in restore_environment() 525 rc |= setenv("LOGNAME", pw->pw_name, 1); in restore_environment() 1146 pam_status = pam_start(service_name, pw.pw_name, &pam_conversation, in main() 1155 if (!authenticate_via_shadow_passwd(pw.pw_name)) in main() 1159 pw.pw_name); in main() 1238 free(pw.pw_name); in main() [all …]
|
/external/selinux/libselinux/utils/ |
D | togglesebool.c | 83 if (pwd && pwd->pw_name) in main() 86 argv[i], pwd->pw_name); in main()
|
/external/toybox/toys/lsb/ |
D | su.c | 85 setenv("USER", up->pw_name, 1); in su_main() 86 setenv("LOGNAME", up->pw_name, 1); in su_main()
|
D | passwd.c | 120 else name = xstrdup(pw->pw_name); in passwd_main()
|
/external/iptables/extensions/ |
D | libxt_owner.c | 304 if (pwd != NULL && pwd->pw_name != NULL) { in owner_mt_print_item_v0() 305 printf(" %s", pwd->pw_name); in owner_mt_print_item_v0() 353 if (pwd != NULL && pwd->pw_name != NULL) { in owner_mt6_print_item_v0() 354 printf(" %s", pwd->pw_name); in owner_mt6_print_item_v0() 402 if (pwd != NULL && pwd->pw_name != NULL) { in owner_mt_print_item() 403 printf(" %s", pwd->pw_name); in owner_mt_print_item()
|
/external/e2fsprogs/include/nonunix/ |
D | pwd.h | 12 char *pw_name; member
|
/external/selinux/policycoreutils/setsebool/ |
D | setsebool.c | 286 if (pwd && pwd->pw_name) in setbool() 289 name, value_ptr, pwd->pw_name); in setbool()
|
/external/curl/lib/ |
D | setup-vms.h | 175 vms_passwd_cache.pw_name = my_passwd->pw_name; in vms_getpwuid()
|
/external/autotest/client/site_tests/security_ProfilePermissions/ |
D | security_ProfilePermissions.py | 37 actual_owner = pwd.getpwuid(s.st_uid).pw_name
|
/external/autotest/client/site_tests/security_RootfsStatefulSymlinks/ |
D | security_RootfsStatefulSymlinks.py | 54 owner = pwd.getpwuid(s.st_uid).pw_name
|
/external/libcap-ng/libcap-ng-0.7/utils/ |
D | pscap.c | 162 name = p->pw_name; in main()
|
/external/selinux/policycoreutils/sandbox/ |
D | seunshare.c | 469 if (asprintf(&tmpdir, "/tmp/.sandbox-%s-XXXXXX", pwd->pw_name) == -1) { in create_tmpdir() 821 rc |= setenv("USER", pwd->pw_name, 1); in main() 822 rc |= setenv("LOGNAME", pwd->pw_name, 1); in main()
|
/external/compiler-rt/lib/msan/tests/ |
D | msan_test.cc | 3279 EXPECT_NOT_POISONED(p->pw_name); in TEST() 3280 ASSERT_TRUE(p->pw_name != NULL); in TEST() 3281 EXPECT_NOT_POISONED(p->pw_name[0]); in TEST() 3292 EXPECT_NOT_POISONED(pwd.pw_name); in TEST() 3293 ASSERT_TRUE(pwd.pw_name != NULL); in TEST() 3294 EXPECT_NOT_POISONED(pwd.pw_name[0]); in TEST() 3306 EXPECT_NOT_POISONED(pwd.pw_name); in TEST() 3307 ASSERT_TRUE(pwd.pw_name != NULL); in TEST() 3308 EXPECT_NOT_POISONED(pwd.pw_name[0]); in TEST() 3344 EXPECT_NOT_POISONED(p->pw_name); in TEST() [all …]
|
/external/autotest/client/cros/ |
D | pkcs11.py | 97 path_user = pwd.getpwuid(stat_buf.st_uid).pw_name
|