/external/toybox/toys/pending/ |
useradd.c | 45 struct passwd pwd; local 64 pwd.pw_name = s; 65 pwd.pw_passwd = "x"; 66 pwd.pw_gecos = TT.gecos ? TT.gecos : "Linux User,"; 67 pwd.pw_dir = TT.dir ? TT.dir : xmprintf("/home/%s", *toys.optargs); 79 pwd.pw_shell = TT.shell; 90 pwd.pw_uid = TT.uid; 97 if (getgrnam(pwd.pw_name)) error_exit("group '%s' in use", pwd.pw_name); 101 pwd.pw_gid = TT.gid [all...] |
sulogin.c | 39 static int validate_password(char *pwd) 63 pass = crypt(toybuf, pwd); 65 if( pass && !strcmp(pass, pwd)) ret = 0; 79 struct passwd *pwd = NULL; local 100 if (!(pwd = getpwuid(0))) error_exit("invalid user"); 101 pass = pwd->pw_passwd; 104 if ((spwd = getspnam (pwd->pw_name))) pass = spwd->sp_pwdp; 116 || (shell = pwd->pw_shell))
|
crontab.c | 263 static void do_edit(struct passwd *pwd) 275 snprintf(toybuf, sizeof(toybuf), "%s%s", TT.cdir, pwd->pw_name); 283 } else printf("No crontab for '%s'- using an empty one\n", pwd->pw_name); 290 char *prog = pwd->pw_shell; 292 xsetuser(pwd); 293 if (pwd->pw_uid) { 294 if (setenv("USER", pwd->pw_name, 1)) _exit(1); 295 if (setenv("LOGNAME", pwd->pw_name, 1)) _exit(1); 297 if (setenv("HOME", pwd->pw_dir, 1)) _exit(1); 329 update_crontab(tname, pwd->pw_name) 335 struct passwd *pwd = NULL; local [all...] |
userdel.c | 94 struct passwd *pwd = NULL; local 96 pwd = xgetpwnam(*toys.optargs); 97 update_password("/etc/passwd", pwd->pw_name, NULL); 98 update_password("/etc/shadow", pwd->pw_name, NULL); 110 char *arg[] = {"rm", "-fr", pwd->pw_dir, NULL, NULL}; 112 sprintf(toybuf, "/var/spool/mail/%s",pwd->pw_name);
|
/external/compiler-rt/test/sanitizer_common/TestCases/Linux/ |
getpwnam_r_invalid_user.cc | 6 #include <pwd.h> 13 struct passwd pwd; local 16 int res = getpwnam_r("no-such-user", &pwd, buf, sizeof(buf), &pwdres);
|
/external/toybox/toys/other/ |
login.c | 52 struct passwd *pwd = 0; local 87 pwd = getpwnam(username); 88 if (pwd && *pwd->pw_passwd != '!' && *pwd->pw_passwd != '*') { 91 if (TT.username || !*pwd->pw_passwd) break; 94 if (*(pass = pwd->pw_passwd) == 'x') { 110 syslog(LOG_WARNING, "invalid password for '%s' on %s %s%s", pwd->pw_name, 117 pwd = 0; 124 if (!pwd) error_exit("max retries (3)") [all...] |
/external/toybox/toys/posix/ |
pwd.c | 0 /* pwd.c - Print working directory. 5 * See http://opengroup.org/onlinepubs/9699919799/utilities/pwd.html 7 USE_PWD(NEWTOY(pwd, ">0LP[-LP]", TOYFLAG_BIN)) 9 config PWD 10 bool "pwd" 13 usage: pwd [-L|-P] 17 -L Use shell's path from $PWD (when applicable) 26 char *s, *pwd = getcwd(0, 0), *PWD; local 28 // Only use $PWD if it's an absolute path alias for cwd with no "." or ".. [all...] |
/toolchain/binutils/binutils-2.25/libiberty/ |
getpwd.c | 62 /* Get the working directory. Use the PWD environment variable if it's 70 static char *pwd; local 73 char *p = pwd; 79 if (! ((p = getenv ("PWD")) != 0 103 pwd = p; 117 static char *pwd = 0; local 119 if (!pwd) 120 pwd = getcwd (XNEWVEC (char, MAXPATHLEN + 1), MAXPATHLEN + 1 125 return pwd;
|
/external/libbrillo/brillo/ |
userdb_utils.cc | 8 #include <pwd.h> 24 passwd* pwd = nullptr; local 26 if (getpwnam_r(user.c_str(), &pwd_buf, buf.data(), buf_len, &pwd) || !pwd) { 32 *uid = pwd->pw_uid; 34 *gid = pwd->pw_gid;
|
/external/conscrypt/src/main/java/org/conscrypt/ |
KeyManagerFactoryImpl.java | 44 private char[] pwd; field in class:KeyManagerFactoryImpl 56 pwd = password.clone(); 58 pwd = EmptyArray.CHAR; 75 pwd = EmptyArray.CHAR; 77 pwd = keyStorePwd.toCharArray(); 80 keyStore.load(new FileInputStream(new File(keyStoreName)), pwd); 113 return new KeyManager[] { new KeyManagerImpl(keyStore, pwd) };
|
DefaultSSLContextImpl.java | 72 char[] pwd = (keystorepwd == null) ? null : keystorepwd.toCharArray(); local 78 ks.load(is, pwd); 87 kmf.init(ks, pwd); 104 char[] pwd = (keystorepwd == null) ? null : keystorepwd.toCharArray(); local 111 ks.load(is, pwd);
|
/external/selinux/libselinux/utils/ |
togglesebool.c | 8 #include <pwd.h> 81 struct passwd *pwd = getpwuid(getuid()); local 83 if (pwd && pwd->pw_name) 86 argv[i], pwd->pw_name);
|
/bionic/tests/ |
stubs_test.cpp | 21 #include <pwd.h> 36 static void check_passwd(const passwd* pwd, const char* username, uid_t uid, uid_type_t uid_type) { 37 ASSERT_TRUE(pwd != NULL); 38 ASSERT_STREQ(username, pwd->pw_name); 39 ASSERT_EQ(uid, pwd->pw_uid); 40 ASSERT_EQ(uid, pwd->pw_gid); 41 ASSERT_EQ(NULL, pwd->pw_passwd); 43 ASSERT_EQ(NULL, pwd->pw_gecos); 47 ASSERT_STREQ("/", pwd->pw_dir); 49 ASSERT_STREQ("/data", pwd->pw_dir) 56 passwd* pwd = getpwuid(uid); local 64 passwd* pwd = getpwnam(username); local 76 passwd* pwd = NULL; local 90 passwd* pwd = NULL; local [all...] |
/external/selinux/policycoreutils/restorecond/ |
utmpwatcher.c | 40 #include <pwd.h> 87 struct passwd *pwd = getpwnam(ptr->string); local 88 if (pwd) { 90 if (asprintf(&path, "%s%s", pwd->pw_dir, file) < 0)
|
restorecond.c | 57 #include <pwd.h> 207 struct passwd *pwd = getpwuid(uid); local 208 if (!pwd) 211 homedir = pwd->pw_dir;
|
/external/mockftpserver/branches/1.x_Branch/src/test/java/org/mockftpserver/stub/ |
StubFtpServer_StartTest.java | 62 PwdCommandHandler pwd = new PwdCommandHandler();
local 63 pwd.setDirectory(DIR);
67 stubFtpServer.setCommandHandler(CommandNames.PWD, pwd);
75 assertEquals("pwd", DIR, ftpClient.printWorkingDirectory());
|
/external/selinux/policycoreutils/sandbox/ |
seunshare.c | 15 #include <pwd.h> 382 struct passwd *pwd, int copy_content) 394 if (cmdbuf && spawn_command(cmdbuf, pwd->pw_uid) != 0) { 408 if (cmdbuf && spawn_command(cmdbuf, pwd->pw_uid) != 0) rc++; 419 if ((uid_t)setfsuid(pwd->pw_uid) != 0) { 434 struct stat *out_st, struct passwd *pwd, security_context_t execcon) 444 if ((uid_t)setfsuid(pwd->pw_uid) != 0) 465 if ((uid_t)setfsuid(0) != pwd->pw_uid) 469 if (asprintf(&tmpdir, "/tmp/.sandbox-%s-XXXXXX", pwd->pw_name) == -1) { 521 if ((uid_t)setfsuid(pwd->pw_uid) != 0 656 struct passwd *pwd=getpwuid(uid); local [all...] |
/external/toybox/toys/lsb/ |
passwd.c | 70 static int verify_passwd(char * pwd) 74 if (!pwd) return 1; 75 if (pwd[0] == '!' || pwd[0] == '*') return 1; 77 pass = crypt(toybuf, pwd); 78 if (pass && !strcmp(pass, pwd)) return 0;
|
/external/ppp/pppd/plugins/radius/ |
includes.h | 43 #include <pwd.h>
|
/external/iptables/extensions/ |
libxt_owner.c | 8 #include <pwd.h> 140 struct passwd *pwd; local 147 if ((pwd = getpwnam(cb->arg)) != NULL) 148 id = pwd->pw_uid; 187 struct passwd *pwd; local 194 if ((pwd = getpwnam(cb->arg)) != NULL) 195 id = pwd->pw_uid; 245 struct passwd *pwd; local 252 if ((pwd = getpwnam(cb->arg)) != NULL) 253 from = to = pwd->pw_uid 302 struct passwd *pwd = getpwuid(info->uid); local 351 struct passwd *pwd = getpwuid(info->uid); local 400 const struct passwd *pwd = getpwuid(info->uid_min); local [all...] |
/external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/java/security/ |
KeyStore_Impl3Test.java | 114 char[] pwd = { 'p', 'a', 's', 's', 'w', 'd' }; local 115 KeyStore.PasswordProtection pPath = new KeyStore.PasswordProtection(pwd); 134 kss[i].setKeyEntry(aliases[3], pk, pwd, certs); 138 kss[i].store(null, pwd); 147 kss[i].store(bos, pwd); 150 kss1[i].load(bis, pwd); 190 assertEquals("Incorrect entry", kss[i].getKey(aliases[3], pwd), 191 kss1[i].getKey(aliases[3], pwd));
|
/platform_testing/tests/androidbvt/src/com/android/androidbvt/ |
SysUILockScreenTests.java | 133 * @param pwd text of Password or Pin for lockscreen 136 private void setScreenLock(String pwd, String mode) throws Exception { 143 pinField.setText(pwd); 146 pinField.setText(pwd); 165 private void removeScreenLock(String pwd) throws Exception { 169 pinField.setText(pwd); 175 private void unlockScreen(String pwd) throws Exception { 179 String command = String.format(" %s %s %s", "input", "text", pwd);
|
/external/e2fsprogs/include/nonunix/ |
unistd.h | 35 #include <pwd.h>
|
/external/libunwind/src/coredump/ |
_UCD_lib.h | 53 #include <pwd.h>
|
/external/ltrace/sysdeps/linux-gnu/ |
hooks.c | 25 #include <pwd.h> 105 struct passwd *pwd = getpwuid(getuid()); local 106 if (pwd != NULL) 107 home = pwd->pw_dir;
|