/external/toybox/toys/pending/ |
D | useradd.c | 75 if (pw && pw->pw_shell && *pw->pw_shell) TT.shell = xstrdup(pw->pw_shell); 79 pwd.pw_shell = TT.shell; 121 pwd.pw_shell);
|
D | sulogin.c | 116 || (shell = pwd->pw_shell)) in sulogin_main()
|
D | crontab.c | 290 char *prog = pwd->pw_shell; in do_edit()
|
/external/toybox/toys/other/ |
D | login.c | 151 setenv("SHELL", pwd->pw_shell, 1); in login_main() 163 execl(pwd->pw_shell, xmprintf("-%s", pwd->pw_shell), (char *)0); in login_main() 164 perror_exit("exec shell '%s'", pwd->pw_shell); in login_main()
|
/external/selinux/policycoreutils/newrole/ |
D | newrole.c | 431 if (!(pw && pw->pw_name && pw->pw_name[0] && pw->pw_shell in extract_pw_data() 432 && pw->pw_shell[0] && pw->pw_dir && pw->pw_dir[0])) { in extract_pw_data() 442 pw->pw_shell = strdup(pw->pw_shell); in extract_pw_data() 444 if (!(pw->pw_name && pw->pw_dir && pw->pw_shell)) { in extract_pw_data() 449 if (verify_shell(pw->pw_shell) == 0) { in extract_pw_data() 458 free(pw->pw_shell); in extract_pw_data() 461 pw->pw_shell = NULL; in extract_pw_data() 522 rc |= setenv("SHELL", pw->pw_shell, 1); in restore_environment() 1240 free(pw.pw_shell); in main() 1283 if (asprintf(&shell_argv0, "-%s", pw.pw_shell) < 0) { in main() [all …]
|
/external/toybox/toys/lsb/ |
D | su.c | 69 *(argv++) = TT.s ? TT.s : up->pw_shell; in su_main() 84 setenv("SHELL", up->pw_shell, 1); in su_main()
|
/external/python/cpython2/Lib/test/ |
D | test_pwd.py | 26 self.assertEqual(e[6], e.pw_shell) 27 self.assertIsInstance(e.pw_shell, basestring)
|
/external/e2fsprogs/include/mingw/ |
D | pwd.h | 16 char *pw_shell; member
|
/external/e2fsprogs/include/nonunix/ |
D | pwd.h | 18 char *pw_shell; member
|
/external/curl/lib/ |
D | setup-vms.h | 180 vms_passwd_cache.pw_shell = my_passwd->pw_shell; in vms_getpwuid()
|
/external/openssh/ |
D | auth.c | 168 char *shell = xstrdup((pw->pw_shell[0] == '\0') ? in allowed_user() 169 _PATH_BSHELL : pw->pw_shell); /* empty = /bin/sh */ in allowed_user() 809 fake.pw_shell = "/nonexist"; in fakepw()
|
D | misc.c | 227 copy->pw_shell = xstrdup(pw->pw_shell); in pwcopy()
|
D | session.c | 669 char *shell = s->pw->pw_shell; in do_exec() 1542 shell = (pw->pw_shell[0] == '\0') ? _PATH_BSHELL : pw->pw_shell; in do_child()
|
D | monitor_wrap.c | 276 pw->pw_shell = buffer_get_string(&m, NULL); in mm_getpwnamallow()
|
D | monitor.c | 742 buffer_put_cstring(m, pwent->pw_shell); in mm_answer_pwnamallow()
|
/external/python/cpython2/Lib/plat-os2emx/ |
D | pwd.py | 133 self.pw_shell)
|
/external/python/cpython2/Modules/ |
D | pwdmodule.c | 84 SETS(setIndex++, p->pw_shell); in mkpwent()
|
/external/python/cpython2/Doc/library/ |
D | pwd.rst | 32 | 6 | ``pw_shell`` | User command interpreter |
|
/external/selinux/sandbox/ |
D | seunshare.c | 662 if (verify_shell(pwd->pw_shell) < 0) { in main() 820 rc |= setenv("SHELL", pwd->pw_shell, 1); in main()
|
/external/compiler-rt/lib/sanitizer_common/ |
D | sanitizer_platform_limits_posix.h | 344 char *pw_shell; member
|
D | sanitizer_platform_limits_posix.cc | 1208 CHECK_SIZE_AND_OFFSET(passwd, pw_shell);
|
D | sanitizer_common_interceptors.inc | 1460 if (pwd->pw_shell) 1461 COMMON_INTERCEPTOR_INITIALIZE_RANGE(pwd->pw_shell, 1462 REAL(strlen)(pwd->pw_shell) + 1);
|
/external/selinux/libsemanage/src/ |
D | genhomedircon.c | 375 if (!semanage_list_find(shells, pwbuf->pw_shell)) in get_home_dirs()
|