| /third_party/libuv/test/ |
| D | test-get-passwd.c | 36 uv_passwd_t pwd; in TEST_IMPL() local 41 r = uv_os_get_passwd(&pwd); in TEST_IMPL() 43 len = strlen(pwd.username); in TEST_IMPL() 47 ASSERT_NULL(pwd.shell); in TEST_IMPL() 49 len = strlen(pwd.shell); in TEST_IMPL() 55 len = strlen(pwd.homedir); in TEST_IMPL() 59 if (len == 3 && pwd.homedir[1] == ':') in TEST_IMPL() 60 ASSERT_EQ(pwd.homedir[2], '\\'); in TEST_IMPL() 62 ASSERT_NE(pwd.homedir[len - 1], '\\'); in TEST_IMPL() 65 ASSERT_EQ(pwd.homedir[0], '/'); in TEST_IMPL() [all …]
|
| /third_party/toybox/toys/posix/ |
| D | pwd.c | 1 /* pwd.c - Print working directory. 5 * See http://opengroup.org/onlinepubs/9699919799/utilities/pwd.html 7 USE_PWD(NEWTOY(pwd, ">0LP[-LP]", TOYFLAG_BIN)) 9 config PWD 10 bool "pwd" 13 usage: pwd [-L|-P] 17 -L Use shell's path from $PWD (when applicable) 26 char *s, *pwd = getcwd(0, 0), *PWD; in pwd_main() local 28 // Only use $PWD if it's an absolute path alias for cwd with no "." or ".." in pwd_main() 29 if (!(toys.optflags & FLAG_P) && (s = PWD = getenv("PWD"))) { in pwd_main() [all …]
|
| /third_party/elfutils/tests/ |
| D | run-debuginfod-tmp-home.sh | 25 DB=${PWD}/.debuginfod_tmp.sqlite 27 export DEBUGINFOD_CACHE_PATH=${PWD}/.client_cache 61 echo "int main() { return 0; }" > ${PWD}/p+r%o\$g.c 65 gcc -Wl,--build-id -g -o p+r%o\$g ${PWD}/foobar///./../p+r%o\$g.c 66 testrun ${abs_top_builddir}/src/strip -g -f p+r%o\$g.debug ${PWD}/p+r%o\$g 84 testrun env HOME=$PWD/tmphome XDG_CACHE_HOME= DEBUGINFOD_CACHE_PATH= ${abs_top_builddir}/debuginfod… 85 if [ ! -f $PWD/tmphome/.cache/debuginfod_client/$BUILDID/debuginfo ]; then 86 echo "could not find cache in $PWD/tmphome/.cache" 91 testrun env HOME=$PWD/tmphome XDG_CACHE_HOME= DEBUGINFOD_CACHE_PATH= ${abs_top_builddir}/debuginfod… 92 if [ ! -f $PWD/tmphome/.cache/debuginfod_client/$BUILDID/executable ]; then [all …]
|
| D | run-prelink-addr-test.sh | 39 00111000-00112000 r-xp 00000000 fd:01 1 `pwd`/testfile52-32.so 40 00112000-00113000 rw-p 00000000 fd:01 1 `pwd`/testfile52-32.so 41 41000000-41001000 r-xp 00000000 fd:01 2 `pwd`/testfile52-32.prelink.so 42 41001000-41002000 rw-p 00000000 fd:01 2 `pwd`/testfile52-32.prelink.so 43 42000000-42001000 r-xp 00000000 fd:01 3 `pwd`/testfile52-32.noshdrs.so 44 42001000-42002000 rw-p 00000000 fd:01 3 `pwd`/testfile52-32.noshdrs.so 68 1000000000-1000001000 r-xp 00000000 fd:11 1 `pwd`/testfile52-64.so 69 1000001000-1000200000 ---p 00001000 fd:11 1 `pwd`/testfile52-64.so 70 1000200000-1000201000 rw-p 00000000 fd:11 1 `pwd`/testfile52-64.so 71 3000000000-3000001000 r-xp 00000000 fd:11 2 `pwd`/testfile52-64.prelink.so [all …]
|
| D | run-debuginfod-artifact-running.sh | 30 DB=${PWD}/.debuginfod_tmp.sqlite 32 export DEBUGINFOD_CACHE_PATH=${PWD}/.client_cache 34 echo 'int main(int argc, char * argv){ return 0; }' > ${PWD}/prog.c 35 gcc -Wl,--build-id -g -o prog ${PWD}/prog.c 36 testrun ${abs_top_builddir}/src/strip -g -f prog.debug ${PWD}/prog 68 echo "int main() { return 0; }" > ${PWD}/prog2.c 70 gcc -Wl,--build-id -g -o prog2 ${PWD}/prog2.c 71 #testrun ${abs_top_builddir}/src/strip -g -f prog.debug ${PWD}/prog 95 filename=`testrun ${abs_top_builddir}/debuginfod/debuginfod-find source $BUILDID ${PWD}/foobar///./… 96 cmp $filename ${PWD}/prog.c [all …]
|
| D | run-debuginfod-find.sh | 32 DB=${PWD}/.debuginfod_tmp.sqlite 34 export DEBUGINFOD_CACHE_PATH=${PWD}/.client_cache 46 rm -rf F R D L Z ${PWD}/foobar ${PWD}/mocktree ${PWD}/.client_cache* ${PWD}/tmp* 150 echo "int main() { return 0; }" > ${PWD}/prog.c 154 gcc -Wl,--build-id -g -o prog ${PWD}/foobar///./../prog.c 155 testrun ${abs_top_builddir}/src/strip -g -f prog.debug ${PWD}/prog 224 filename=`testrun ${abs_top_builddir}/debuginfod/debuginfod-find source $BUILDID ${PWD}/foobar///./… 225 cmp $filename ${PWD}/prog.c 228 filename=`testrun ${abs_top_builddir}/debuginfod/debuginfod-find source $BUILDID ${PWD}/prog.c` 229 cmp $filename ${PWD}/prog.c [all …]
|
| D | run-debuginfod-percent-escape.sh | 27 DB=${PWD}/.debuginfod_tmp.sqlite 31 -F -R -d $DB -p $PORT1 -t0 -g0 -v R ${PWD}/F > vlog$PORT1 2>&1 & 41 echo "int main() { return 0; }" > ${PWD}/F/p++r\$\#o^^g.c 42 gcc -Wl,--build-id -g -o ${PWD}/F/p++r\$\#o^^g ${PWD}/F/p++r\$\#o^^g.c 44 -a ${PWD}/F/p++r\\$\#o^^g | grep 'Build ID' | cut -d ' ' -f 7` 45 tempfiles ${PWD}/F/p++r\$\#o^^g.c ${PWD}/F/p++r\$\#o^^g 53 env DEBUGINFOD_CACHE_PATH=${PWD}/.client_cache DEBUGINFOD_URLS="http://127.0.0.1:$PORT1" \
|
| D | run-debuginfod-sizetime.sh | 28 DB=${PWD}/.debuginfod_tmp.sqlite 30 export DEBUGINFOD_CACHE_PATH=${PWD}/.client_cache 32 echo "int main() { return 0; }" > ${PWD}/prog.c 35 gcc -Wl,--build-id -g -o prog ${PWD}/foobar///./../prog.c 36 testrun ${abs_top_builddir}/src/strip -g -f prog.debug ${PWD}/prog 41 …_builddir}/../debuginfod/debuginfod $VERBOSE -F -p $PORT1 -d $DB -t0 -g0 ${PWD} > vlog$PORT1 2>&1 & 54 …${abs_top_builddir}/debuginfod/debuginfod-find -v -v executable ${PWD}/prog 2> find-vlog$PORT1 || … 60 grep 'serving file '$(realpath ${PWD})'/prog' vlog$PORT1 69 …${abs_top_builddir}/debuginfod/debuginfod-find -v -v debuginfo ${PWD}/prog.debug 2> find-vlog$PORT…
|
| /third_party/python/Lib/test/ |
| D | test_pwd.py | 5 pwd = import_helper.import_module('pwd') variable 7 @unittest.skipUnless(hasattr(pwd, 'getpwall'), 'Does not have getpwall()') 11 entries = pwd.getpwall() 32 # self.assertEqual(pwd.getpwuid(e.pw_uid), e) 37 entries = pwd.getpwall() 53 self.assertIn(pwd.getpwnam(e.pw_name), entriesbyname[e.pw_name]) 54 self.assertIn(pwd.getpwuid(e.pw_uid), entriesbyuid[e.pw_uid]) 57 self.assertRaises(TypeError, pwd.getpwuid) 58 self.assertRaises(TypeError, pwd.getpwuid, 3.14) 59 self.assertRaises(TypeError, pwd.getpwnam) [all …]
|
| /third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_peer/ |
| D | eap_pwd.c | 2 * EAP peer method: EAP-pwd (RFC 5931) 66 return "PWD-ID-Req"; in eap_pwd_state_txt() 68 return "PWD-Commit-Req"; in eap_pwd_state_txt() 70 return "PWD-Confirm-Req"; in eap_pwd_state_txt() 78 return "PWD-UNK"; in eap_pwd_state_txt() 86 wpa_printf(MSG_DEBUG, "EAP-PWD: %s -> %s", in eap_pwd_state() 103 wpa_printf(MSG_INFO, "EAP-PWD: No password configured!"); in eap_pwd_init() 109 wpa_printf(MSG_INFO, "EAP-PWD: No identity configured!"); in eap_pwd_init() 114 wpa_printf(MSG_INFO, "EAP-PWD: memory allocation data fail"); in eap_pwd_init() 119 wpa_printf(MSG_INFO, "EAP-PWD: memory allocation id fail"); in eap_pwd_init() [all …]
|
| /third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_peer/ |
| D | eap_pwd.c | 2 * EAP peer method: EAP-pwd (RFC 5931) 66 return "PWD-ID-Req"; in eap_pwd_state_txt() 68 return "PWD-Commit-Req"; in eap_pwd_state_txt() 70 return "PWD-Confirm-Req"; in eap_pwd_state_txt() 78 return "PWD-UNK"; in eap_pwd_state_txt() 86 wpa_printf(MSG_DEBUG, "EAP-PWD: %s -> %s", in eap_pwd_state() 103 wpa_printf(MSG_INFO, "EAP-PWD: No password configured!"); in eap_pwd_init() 109 wpa_printf(MSG_INFO, "EAP-PWD: No identity configured!"); in eap_pwd_init() 114 wpa_printf(MSG_INFO, "EAP-PWD: memory allocation data fail"); in eap_pwd_init() 119 wpa_printf(MSG_INFO, "EAP-PWD: memory allocation id fail"); in eap_pwd_init() [all …]
|
| /third_party/toybox/toys/pending/ |
| D | useradd.c | 45 struct passwd pwd; local 64 pwd.pw_name = s; 65 pwd.pw_passwd = "x"; 66 pwd.pw_gecos = TT.gecos ? TT.gecos : "Linux User,"; 67 pwd.pw_dir = TT.dir ? TT.dir : xmprintf("/home/%s", *toys.optargs); 79 pwd.pw_shell = TT.shell; 90 pwd.pw_uid = TT.uid; 97 if (getgrnam(pwd.pw_name)) error_exit("group '%s' in use", pwd.pw_name); 101 pwd.pw_gid = TT.gid; 105 char *s = xmprintf("-g%ld", (long)pwd.pw_gid); [all …]
|
| /third_party/toybox/tests/ |
| D | pwd.test | 9 testing "pwd" "[ $(stat -c %i "$(pwd)") = $(stat -c %i .) ] && echo yes" \ 11 testing "-P" "[ $(stat -c %i "$(pwd -P)") = $(stat -c %i .) ] && echo yes" \ 17 testing "pwd" "[ $(stat -c %i "$(pwd)") = $(stat -c %i "$PWD") ] && echo yes" \ 19 testing "-P" "[ $(stat -c %i "$(pwd -P)") = $(stat -c %i "$PWD") ] || echo yes" \ 24 export PWD=walrus 25 testing "(bad PWD)" "[ "$(pwd)" = "$(cd . ; pwd)" ] && echo yes" \
|
| /third_party/libwebsockets/test-apps/android/app/src/main/jni/ |
| D | NativeLibs.mk | 187 -DCMAKE_C_COMPILER=$(shell pwd)/$(TOOLCHAIN_X86)/bin/$(TOOLCHAIN_X86_PREFIX)-gcc \ 188 -DCMAKE_AR=$(shell pwd)/$(TOOLCHAIN_X86)/bin/$(TOOLCHAIN_X86_PREFIX)-ar \ 189 -DCMAKE_RANLIB=$(shell pwd)/$(TOOLCHAIN_X86)/bin/$(TOOLCHAIN_X86_PREFIX)-ranlib \ 202 -DCMAKE_C_COMPILER=$(shell pwd)/$(TOOLCHAIN_X86_64)/bin/$(TOOLCHAIN_X86_64_PREFIX)-gcc \ 203 -DCMAKE_AR=$(shell pwd)/$(TOOLCHAIN_X86_64)/bin/$(TOOLCHAIN_X86_64_PREFIX)-ar \ 204 -DCMAKE_RANLIB=$(shell pwd)/$(TOOLCHAIN_X86_64)/bin/$(TOOLCHAIN_X86_64_PREFIX)-ranlib \ 217 -DCMAKE_C_COMPILER=$(shell pwd)/$(TOOLCHAIN_ARM)/bin/$(TOOLCHAIN_ARM_PREFIX)-gcc \ 218 -DCMAKE_AR=$(shell pwd)/$(TOOLCHAIN_ARM)/bin/$(TOOLCHAIN_ARM_PREFIX)-ar \ 219 -DCMAKE_RANLIB=$(shell pwd)/$(TOOLCHAIN_ARM)/bin/$(TOOLCHAIN_ARM_PREFIX)-ranlib \ 232 -DCMAKE_C_COMPILER=$(shell pwd)/$(TOOLCHAIN_ARM_V7A)/bin/$(TOOLCHAIN_ARM_V7A_PREFIX)-gcc \ [all …]
|
| /third_party/node/test/parallel/ |
| D | test-path-zero-length-strings.js | 11 const pwd = process.cwd(); constant 19 assert.strictEqual(path.join(pwd), pwd); 20 assert.strictEqual(path.join(pwd, ''), pwd); 25 assert.strictEqual(path.normalize(pwd), pwd); 33 assert.strictEqual(path.resolve(''), pwd); 34 assert.strictEqual(path.resolve('', ''), pwd); 37 assert.strictEqual(path.relative('', pwd), ''); 38 assert.strictEqual(path.relative(pwd, ''), ''); 39 assert.strictEqual(path.relative(pwd, pwd), '');
|
| D | test-os.js | 219 const pwd = os.userInfo(); constant 220 is.object(pwd); 224 assert.strictEqual(pwd.uid, -1); 225 assert.strictEqual(pwd.gid, -1); 226 assert.strictEqual(pwd.shell, null); 231 is.number(pwd.uid); 232 is.number(pwd.gid); 233 assert.strictEqual(typeof pwd.shell, 'string'); 235 if (pwd.shell.length > 0) { 236 assert(pwd.shell.includes(path.sep)); [all …]
|
| /third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/ |
| D | eap_server_pwd.c | 2 * hostapd / EAP-pwd (RFC 5931) server 62 return "PWD-ID-Req"; in eap_pwd_state_txt() 64 return "PWD-Commit-Req"; in eap_pwd_state_txt() 66 return "PWD-Confirm-Req"; in eap_pwd_state_txt() 72 return "PWD-Unk"; in eap_pwd_state_txt() 79 wpa_printf(MSG_DEBUG, "EAP-pwd: %s -> %s", in eap_pwd_state() 91 wpa_printf(MSG_INFO, "EAP-PWD (server): Password is not " in eap_pwd_init() 101 wpa_printf(MSG_DEBUG, "EAP-pwd: Selected group number %d", in eap_pwd_init() 111 wpa_printf(MSG_INFO, "EAP-PWD: Memory allocation password " in eap_pwd_init() 126 "EAP-pwd: Memory allocation of salt failed"); in eap_pwd_init() [all …]
|
| /third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/ |
| D | eap_server_pwd.c | 2 * hostapd / EAP-pwd (RFC 5931) server 62 return "PWD-ID-Req"; in eap_pwd_state_txt() 64 return "PWD-Commit-Req"; in eap_pwd_state_txt() 66 return "PWD-Confirm-Req"; in eap_pwd_state_txt() 72 return "PWD-Unk"; in eap_pwd_state_txt() 79 wpa_printf(MSG_DEBUG, "EAP-pwd: %s -> %s", in eap_pwd_state() 91 wpa_printf(MSG_INFO, "EAP-PWD (server): Password is not " in eap_pwd_init() 101 wpa_printf(MSG_DEBUG, "EAP-pwd: Selected group number %d", in eap_pwd_init() 111 wpa_printf(MSG_INFO, "EAP-PWD: Memory allocation password " in eap_pwd_init() 126 "EAP-pwd: Memory allocation of salt failed"); in eap_pwd_init() [all …]
|
| /third_party/openssl/ |
| D | NOTES-NONSTOP.md | 215 assumes that your PWD is set according to your installation standards. 217 ./Configure nonstop-nsx --prefix=${PWD} \ 218 --openssldir=${PWD}/ssl no-threads \ 220 ./Configure nonstop-nsx_g --prefix=${PWD} \ 221 --openssldir=${PWD}/ssl no-threads \ 223 ./Configure nonstop-nsx_put --prefix=${PWD} \ 224 --openssldir=${PWD}/ssl threads "-D_REENTRANT" \ 226 ./Configure nonstop-nsx_spt_floss --prefix=${PWD} \ 227 --openssldir=${PWD}/ssl threads "-D_REENTRANT" \ 229 ./Configure nonstop-nsx_64 --prefix=${PWD} \ [all …]
|
| /third_party/node/deps/openssl/openssl/ |
| D | NOTES-NONSTOP.md | 215 assumes that your PWD is set according to your installation standards. 217 ./Configure nonstop-nsx --prefix=${PWD} \ 218 --openssldir=${PWD}/ssl no-threads \ 220 ./Configure nonstop-nsx_g --prefix=${PWD} \ 221 --openssldir=${PWD}/ssl no-threads \ 223 ./Configure nonstop-nsx_put --prefix=${PWD} \ 224 --openssldir=${PWD}/ssl threads "-D_REENTRANT" \ 226 ./Configure nonstop-nsx_spt_floss --prefix=${PWD} \ 227 --openssldir=${PWD}/ssl threads "-D_REENTRANT" \ 229 ./Configure nonstop-nsx_64 --prefix=${PWD} \ [all …]
|
| /third_party/toybox/toys/other/ |
| D | login.c | 43 struct passwd *pwd = 0; in login_main() local 74 if ((pwd = getpwnam(username))) { in login_main() 76 if (TT.f || !*pwd->pw_passwd) break; in login_main() 79 if (*(pass = pwd->pw_passwd) == 'x') { in login_main() 95 syslog(LOG_WARNING, "invalid password for '%s' on %s %s%s", pwd->pw_name, in login_main() 102 pwd = 0; in login_main() 106 if (!pwd) error_exit("max retries (3)"); in login_main() 110 if (pwd->pw_uid && !access("/etc/nologin", R_OK)) { in login_main() 119 if (fchown(tty, pwd->pw_uid, pwd->pw_gid) || fchmod(tty, 0600)) in login_main() 121 xsetuser(pwd); in login_main() [all …]
|
| /third_party/python/Modules/ |
| D | pwdmodule.c | 7 #include <pwd.h> 11 module pwd 27 "pwd.struct_passwd: Results from getpw*() routines.\n\n\ 33 "pwd.struct_passwd", 44 items from the password database (see `<pwd.h>'), in order:\n\ 116 pwd.getpwuid 123 See `help(pwd)` for more on password database entries. 145 /* Note: 'pwd' will be used via pointer 'p' on getpwuid_r success. */ in pwd_getpwuid() 146 struct passwd pwd; in pwd_getpwuid() local 162 status = getpwuid_r(uid, &pwd, buf, bufsize, &p); in pwd_getpwuid() [all …]
|
| /third_party/protobuf/benchmarks/ |
| D | Makefile.am | 33 …oldpwd=`pwd` && ( cd $(srcdir) && $$oldpwd/../src/protoc$(EXEEXT) -I. -I$(top_srcdir)/src --cpp_ou… 37 …oldpwd=`pwd` && ( cd $(srcdir) && $$oldpwd/../src/protoc$(EXEEXT) -I. -I$(top_srcdir)/src --cpp_ou… 40 all_data = $$(find $$(cd $(srcdir) && pwd) -type f -name "dataset.*.pb" -not -path "$$(cd $(srcdir)… 93 oldpwd=`pwd` 249 …oldpwd=`pwd` && ( cd $(srcdir) && $$oldpwd/../src/protoc$(EXEEXT) -I. -I$(top_srcdir)/src --go_out… 250 …oldpwd=`pwd` && ( cd $(srcdir) && $$oldpwd/../src/protoc$(EXEEXT) -I. -I$(top_srcdir)/src --go_out… 251 …oldpwd=`pwd` && ( cd $(srcdir) && $$oldpwd/../src/protoc$(EXEEXT) -I. -I$(top_srcdir)/src --go_out… 252 …oldpwd=`pwd` && ( cd $(srcdir) && $$oldpwd/../src/protoc$(EXEEXT) -I. -I$(top_srcdir)/src --go_out… 253 …oldpwd=`pwd` && ( cd $(srcdir) && $$oldpwd/../src/protoc$(EXEEXT) -I. -I$(top_srcdir)/src --go_out… 254 …oldpwd=`pwd` && ( cd $(srcdir) && $$oldpwd/../src/protoc$(EXEEXT) -I. -I$(top_srcdir)/src --go_out… [all …]
|
| /third_party/nghttp2/.github/workflows/ |
| D | build.yml | 109 make -C src install PREFIX=$PWD/build 115 ./config --prefix=$PWD/build 123 ./config enable-ktls --prefix=$PWD/build --libdir=$PWD/build/lib 142 ./configure --prefix=$PWD/build --enable-lib-only 151 ./configure --prefix=$PWD/build --enable-lib-only \ 153 BORINGSSL_CFLAGS="-I$PWD/../boringssl/include/" \ 154 … BORINGSSL_LIBS="-L$PWD/../boringssl/build/ssl -lssl -L$PWD/../boringssl/build/crypto -lcrypto" \ 164 ./configure --prefix=$PWD/build --enable-lib-only \ 166 BORINGSSL_CFLAGS="-I$PWD/../boringssl/include/" \ 167 … BORINGSSL_LIBS="-L$PWD/../boringssl/build/ssl -lssl -L$PWD/../boringssl/build/crypto -lcrypto" \ [all …]
|
| /third_party/ltp/testcases/kernel/device-drivers/usb/tusb/ |
| D | Makefile | 13 PWD := $(shell pwd) macro 16 $(MAKE) -C $(KDIR) M=$(PWD) modules 17 # $(MAKE) -C $(KERNELDIR) M=$(PWD) modules 20 $(MAKE) -C $(KDIR) M=$(PWD) clean 24 $(MAKE) -C $(KDIR) M=$(PWD) help 27 $(MAKE) -C $(KDIR) M=$(PWD) modules_install
|