Searched refs:pw_shell (Results 1 – 18 of 18) sorted by relevance
/external/toybox/toys/pending/ |
D | useradd.c | 75 if (pw && pw->pw_shell && *pw->pw_shell) TT.shell = xstrdup(pw->pw_shell); 79 pwd.pw_shell = TT.shell; 121 pwd.pw_shell);
|
D | sulogin.c | 116 || (shell = pwd->pw_shell)) in sulogin_main()
|
D | crontab.c | 290 char *prog = pwd->pw_shell; in do_edit()
|
/external/toybox/toys/other/ |
D | login.c | 151 setenv("SHELL", pwd->pw_shell, 1); in login_main() 163 execl(pwd->pw_shell, xmprintf("-%s", pwd->pw_shell), (char *)0); in login_main() 164 perror_exit("exec shell '%s'", pwd->pw_shell); in login_main()
|
/external/selinux/policycoreutils/newrole/ |
D | newrole.c | 435 if (!(pw && pw->pw_name && pw->pw_name[0] && pw->pw_shell in extract_pw_data() 436 && pw->pw_shell[0] && pw->pw_dir && pw->pw_dir[0])) { in extract_pw_data() 446 pw->pw_shell = strdup(pw->pw_shell); in extract_pw_data() 448 if (!(pw->pw_name && pw->pw_dir && pw->pw_shell)) { in extract_pw_data() 453 if (verify_shell(pw->pw_shell) == 0) { in extract_pw_data() 462 free(pw->pw_shell); in extract_pw_data() 523 rc |= setenv("SHELL", pw->pw_shell, 1); in restore_environment() 1240 free(pw.pw_shell); in main() 1283 if (asprintf(&shell_argv0, "-%s", pw.pw_shell) < 0) { in main() 1329 execv(pw.pw_shell, argv + optind - 1); in main() [all …]
|
/external/toybox/toys/lsb/ |
D | su.c | 69 *(argv++) = TT.s ? TT.s : up->pw_shell; in su_main() 84 setenv("SHELL", up->pw_shell, 1); in su_main()
|
/external/e2fsprogs/include/nonunix/ |
D | pwd.h | 18 char *pw_shell; member
|
/external/curl/lib/ |
D | setup-vms.h | 179 vms_passwd_cache.pw_shell = my_passwd->pw_shell; in vms_getpwuid()
|
/external/openssh/ |
D | auth.c | 164 char *shell = xstrdup((pw->pw_shell[0] == '\0') ? in allowed_user() 165 _PATH_BSHELL : pw->pw_shell); /* empty = /bin/sh */ in allowed_user() 789 fake.pw_shell = "/nonexist"; in fakepw()
|
D | misc.c | 226 copy->pw_shell = xstrdup(pw->pw_shell); in pwcopy()
|
D | session.c | 829 char *shell = s->pw->pw_shell; in do_exec() 1736 shell = (pw->pw_shell[0] == '\0') ? _PATH_BSHELL : pw->pw_shell; in do_child()
|
D | monitor_wrap.c | 276 pw->pw_shell = buffer_get_string(&m, NULL); in mm_getpwnamallow()
|
D | monitor.c | 828 buffer_put_cstring(m, pwent->pw_shell); in mm_answer_pwnamallow()
|
/external/selinux/policycoreutils/sandbox/ |
D | seunshare.c | 662 if (verify_shell(pwd->pw_shell) < 0) { in main() 820 rc |= setenv("SHELL", pwd->pw_shell, 1); in main()
|
/external/compiler-rt/lib/sanitizer_common/ |
D | sanitizer_platform_limits_posix.h | 340 char *pw_shell; member
|
D | sanitizer_platform_limits_posix.cc | 1199 CHECK_SIZE_AND_OFFSET(passwd, pw_shell);
|
D | sanitizer_common_interceptors.inc | 1291 if (pwd->pw_shell) 1292 COMMON_INTERCEPTOR_INITIALIZE_RANGE(pwd->pw_shell, 1293 REAL(strlen)(pwd->pw_shell) + 1);
|
/external/selinux/libsemanage/src/ |
D | genhomedircon.c | 365 if (!semanage_list_find(shells, pwbuf->pw_shell)) in get_home_dirs()
|