HomeSort by relevance Sort by last modified time
    Searched refs:pwd (Results 1 - 25 of 187) sorted by null

1 2 3 4 5 6 7 8

  /external/toybox/toys/pending/
useradd.c 45 struct passwd pwd; local
64 pwd.pw_name = s;
65 pwd.pw_passwd = "x";
66 pwd.pw_gecos = TT.gecos ? TT.gecos : "Linux User,";
67 pwd.pw_dir = TT.dir ? TT.dir : xmprintf("/home/%s", *toys.optargs);
79 pwd.pw_shell = TT.shell;
90 pwd.pw_uid = TT.uid;
97 if (getgrnam(pwd.pw_name)) error_exit("group '%s' in use", pwd.pw_name);
101 pwd.pw_gid = TT.gid
    [all...]
sulogin.c 39 static int validate_password(char *pwd)
63 pass = crypt(toybuf, pwd);
65 if( pass && !strcmp(pass, pwd)) ret = 0;
79 struct passwd *pwd = NULL; local
100 if (!(pwd = getpwuid(0))) error_exit("invalid user");
101 pass = pwd->pw_passwd;
104 if ((spwd = getspnam (pwd->pw_name))) pass = spwd->sp_pwdp;
116 || (shell = pwd->pw_shell))
crontab.c 263 static void do_edit(struct passwd *pwd)
275 snprintf(toybuf, sizeof(toybuf), "%s%s", TT.cdir, pwd->pw_name);
283 } else printf("No crontab for '%s'- using an empty one\n", pwd->pw_name);
290 char *prog = pwd->pw_shell;
292 xsetuser(pwd);
293 if (pwd->pw_uid) {
294 if (setenv("USER", pwd->pw_name, 1)) _exit(1);
295 if (setenv("LOGNAME", pwd->pw_name, 1)) _exit(1);
297 if (setenv("HOME", pwd->pw_dir, 1)) _exit(1);
329 update_crontab(tname, pwd->pw_name)
335 struct passwd *pwd = NULL; local
    [all...]
userdel.c 94 struct passwd *pwd = NULL; local
96 pwd = xgetpwnam(*toys.optargs);
97 update_password("/etc/passwd", pwd->pw_name, NULL);
98 update_password("/etc/shadow", pwd->pw_name, NULL);
110 char *arg[] = {"rm", "-fr", pwd->pw_dir, NULL, NULL};
112 sprintf(toybuf, "/var/spool/mail/%s",pwd->pw_name);
  /external/compiler-rt/test/sanitizer_common/TestCases/Linux/
getpwnam_r_invalid_user.cc 6 #include <pwd.h>
13 struct passwd pwd; local
16 int res = getpwnam_r("no-such-user", &pwd, buf, sizeof(buf), &pwdres);
  /external/toybox/toys/other/
login.c 52 struct passwd *pwd = 0; local
87 pwd = getpwnam(username);
88 if (pwd && *pwd->pw_passwd != '!' && *pwd->pw_passwd != '*') {
91 if (TT.username || !*pwd->pw_passwd) break;
94 if (*(pass = pwd->pw_passwd) == 'x') {
110 syslog(LOG_WARNING, "invalid password for '%s' on %s %s%s", pwd->pw_name,
117 pwd = 0;
124 if (!pwd) error_exit("max retries (3)")
    [all...]
  /external/toybox/toys/posix/
pwd.c 0 /* pwd.c - Print working directory.
5 * See http://opengroup.org/onlinepubs/9699919799/utilities/pwd.html
7 USE_PWD(NEWTOY(pwd, ">0LP[-LP]", TOYFLAG_BIN))
9 config PWD
10 bool "pwd"
13 usage: pwd [-L|-P]
17 -L Use shell's path from $PWD (when applicable)
26 char *s, *pwd = getcwd(0, 0), *PWD; local
28 // Only use $PWD if it's an absolute path alias for cwd with no "." or "..
    [all...]
  /toolchain/binutils/binutils-2.25/libiberty/
getpwd.c 62 /* Get the working directory. Use the PWD environment variable if it's
70 static char *pwd; local
73 char *p = pwd;
79 if (! ((p = getenv ("PWD")) != 0
103 pwd = p;
117 static char *pwd = 0; local
119 if (!pwd)
120 pwd = getcwd (XNEWVEC (char, MAXPATHLEN + 1), MAXPATHLEN + 1
125 return pwd;
  /external/libbrillo/brillo/
userdb_utils.cc 8 #include <pwd.h>
24 passwd* pwd = nullptr; local
26 if (getpwnam_r(user.c_str(), &pwd_buf, buf.data(), buf_len, &pwd) || !pwd) {
32 *uid = pwd->pw_uid;
34 *gid = pwd->pw_gid;
  /external/conscrypt/src/main/java/org/conscrypt/
KeyManagerFactoryImpl.java 44 private char[] pwd; field in class:KeyManagerFactoryImpl
56 pwd = password.clone();
58 pwd = EmptyArray.CHAR;
75 pwd = EmptyArray.CHAR;
77 pwd = keyStorePwd.toCharArray();
80 keyStore.load(new FileInputStream(new File(keyStoreName)), pwd);
113 return new KeyManager[] { new KeyManagerImpl(keyStore, pwd) };
DefaultSSLContextImpl.java 72 char[] pwd = (keystorepwd == null) ? null : keystorepwd.toCharArray(); local
78 ks.load(is, pwd);
87 kmf.init(ks, pwd);
104 char[] pwd = (keystorepwd == null) ? null : keystorepwd.toCharArray(); local
111 ks.load(is, pwd);
  /external/selinux/libselinux/utils/
togglesebool.c 8 #include <pwd.h>
81 struct passwd *pwd = getpwuid(getuid()); local
83 if (pwd && pwd->pw_name)
86 argv[i], pwd->pw_name);
  /bionic/tests/
stubs_test.cpp 21 #include <pwd.h>
36 static void check_passwd(const passwd* pwd, const char* username, uid_t uid, uid_type_t uid_type) {
37 ASSERT_TRUE(pwd != NULL);
38 ASSERT_STREQ(username, pwd->pw_name);
39 ASSERT_EQ(uid, pwd->pw_uid);
40 ASSERT_EQ(uid, pwd->pw_gid);
41 ASSERT_EQ(NULL, pwd->pw_passwd);
43 ASSERT_EQ(NULL, pwd->pw_gecos);
47 ASSERT_STREQ("/", pwd->pw_dir);
49 ASSERT_STREQ("/data", pwd->pw_dir)
56 passwd* pwd = getpwuid(uid); local
64 passwd* pwd = getpwnam(username); local
76 passwd* pwd = NULL; local
90 passwd* pwd = NULL; local
    [all...]
  /external/ImageMagick/config/
lndir.sh 29 # Do "pwd" command *after* "cd $DIRTO".
66 pwd=`pwd`
68 if [ `(cd $DIRFROM; pwd)` = $pwd ]
70 echo "$pwd: FROM and TO are identical!"
83 pwd=`pwd`
88 if [ `(cd $DIRFROM/$file; pwd)` = $pwd ]
    [all...]
  /external/selinux/policycoreutils/restorecond/
utmpwatcher.c 40 #include <pwd.h>
87 struct passwd *pwd = getpwnam(ptr->string); local
88 if (pwd) {
90 if (asprintf(&path, "%s%s", pwd->pw_dir, file) < 0)
restorecond.c 57 #include <pwd.h>
207 struct passwd *pwd = getpwuid(uid); local
208 if (!pwd)
211 homedir = pwd->pw_dir;
  /external/mockftpserver/branches/1.x_Branch/src/test/java/org/mockftpserver/stub/
StubFtpServer_StartTest.java 62 PwdCommandHandler pwd = new PwdCommandHandler(); local
63 pwd.setDirectory(DIR);
67 stubFtpServer.setCommandHandler(CommandNames.PWD, pwd);
75 assertEquals("pwd", DIR, ftpClient.printWorkingDirectory());
  /external/selinux/policycoreutils/sandbox/
seunshare.c 15 #include <pwd.h>
382 struct passwd *pwd, int copy_content)
394 if (cmdbuf && spawn_command(cmdbuf, pwd->pw_uid) != 0) {
408 if (cmdbuf && spawn_command(cmdbuf, pwd->pw_uid) != 0) rc++;
419 if ((uid_t)setfsuid(pwd->pw_uid) != 0) {
434 struct stat *out_st, struct passwd *pwd, security_context_t execcon)
444 if ((uid_t)setfsuid(pwd->pw_uid) != 0)
465 if ((uid_t)setfsuid(0) != pwd->pw_uid)
469 if (asprintf(&tmpdir, "/tmp/.sandbox-%s-XXXXXX", pwd->pw_name) == -1) {
521 if ((uid_t)setfsuid(pwd->pw_uid) != 0
656 struct passwd *pwd=getpwuid(uid); local
    [all...]
  /external/toybox/toys/lsb/
passwd.c 70 static int verify_passwd(char * pwd)
74 if (!pwd) return 1;
75 if (pwd[0] == '!' || pwd[0] == '*') return 1;
77 pass = crypt(toybuf, pwd);
78 if (pass && !strcmp(pass, pwd)) return 0;
  /external/ppp/pppd/plugins/radius/
includes.h 43 #include <pwd.h>
  /external/iptables/extensions/
libxt_owner.c 8 #include <pwd.h>
140 struct passwd *pwd; local
147 if ((pwd = getpwnam(cb->arg)) != NULL)
148 id = pwd->pw_uid;
187 struct passwd *pwd; local
194 if ((pwd = getpwnam(cb->arg)) != NULL)
195 id = pwd->pw_uid;
245 struct passwd *pwd; local
252 if ((pwd = getpwnam(cb->arg)) != NULL)
253 from = to = pwd->pw_uid
302 struct passwd *pwd = getpwuid(info->uid); local
351 struct passwd *pwd = getpwuid(info->uid); local
400 const struct passwd *pwd = getpwuid(info->uid_min); local
    [all...]
  /external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/java/security/
KeyStore_Impl3Test.java 114 char[] pwd = { 'p', 'a', 's', 's', 'w', 'd' }; local
115 KeyStore.PasswordProtection pPath = new KeyStore.PasswordProtection(pwd);
134 kss[i].setKeyEntry(aliases[3], pk, pwd, certs);
138 kss[i].store(null, pwd);
147 kss[i].store(bos, pwd);
150 kss1[i].load(bis, pwd);
190 assertEquals("Incorrect entry", kss[i].getKey(aliases[3], pwd),
191 kss1[i].getKey(aliases[3], pwd));
  /external/e2fsprogs/include/nonunix/
unistd.h 35 #include <pwd.h>
  /external/libunwind/src/coredump/
_UCD_lib.h 53 #include <pwd.h>
  /external/ltrace/sysdeps/linux-gnu/
hooks.c 25 #include <pwd.h>
105 struct passwd *pwd = getpwuid(getuid()); local
106 if (pwd != NULL)
107 home = pwd->pw_dir;

Completed in 7741 milliseconds

1 2 3 4 5 6 7 8