/external/openssh/openbsd-compat/ |
H A D | port-irix.c | 47 irix_setusercontext(struct passwd *pw) argument 59 jid = jlimit_startjob(pw->pw_name, pw->pw_uid, "interactive"); 72 if ((projid = getdfltprojuser(pw->pw_name)) == -1) { 78 (int)projid, pw->pw_name, strerror(errno)); 82 debug("Setting sat id to %d", (int) pw->pw_uid); 83 if (satsetid(pw->pw_uid))
|
H A D | xcrypt.c | 90 shadow_pw(struct passwd *pw) argument 92 char *pw_password = pw->pw_passwd; 95 struct spwd *spw = getspnam(pw->pw_name); 102 return(get_iaf_password(pw)); 107 if (issecure() && (spw = getpwanam(pw->pw_name)) != NULL) 110 struct pr_passwd *spw = getprpwnam(pw->pw_name);
|
H A D | port-uw.c | 55 struct passwd *pw = authctxt->pw; local 60 char *pw_password = authctxt->valid ? shadow_pw(pw) : pw->pw_passwd; 74 if (!nischeck(pw->pw_name)) { 132 get_iaf_password(struct passwd *pw) argument 137 if (!ia_openinfo(pw->pw_name,&uinfo)) {
|
H A D | port-solaris.c | 210 solaris_set_default_project(struct passwd *pw) argument 217 if ((defaultproject = getdefaultproj(pw->pw_name, &tempproject, &buf, 220 if (setproject(defaultproject->pj_name, pw->pw_name, 226 debug("getdefaultproj(%s): %s", pw->pw_name, strerror(errno));
|
H A D | pwcache.c | 56 struct passwd *pw; local 67 if ((pw = getpwuid(uid)) == NULL) { 75 cp->name = strdup(pw ? pw->pw_name : nbuf);
|
/external/emma/core/java12/com/vladium/util/exception/ |
H A D | IThrowableWrapper.java | 40 * this method delegates to super.printStackTrace(pw) where 'super' is the 45 void __printStackTrace (PrintWriter pw); argument
|
H A D | AbstractException.java | 285 public void __printStackTrace (final PrintWriter pw) argument 287 super.printStackTrace (pw);
|
H A D | AbstractRuntimeException.java | 285 public void __printStackTrace (final PrintWriter pw) argument 287 super.printStackTrace (pw);
|
/external/openssh/ |
H A D | auth-rh-rsa.c | 42 auth_rhosts_rsa_key_allowed(struct passwd *pw, char *cuser, char *chost, argument 51 if (!auth_rhosts(pw, cuser)) 54 host_status = check_key_in_hostfiles(pw, client_host_key, 69 struct passwd *pw = authctxt->pw; local 81 if (!PRIVSEP(auth_rhosts_rsa_key_allowed(pw, cuser, chost, client_host_key))) { 100 pw->pw_name, cuser, chost);
|
H A D | auth-sia.c | 83 session_setup_sia(struct passwd *pw, char *tty) argument 90 if (sia_ses_init(&ent, saved_argc, saved_argv, host, pw->pw_name, 94 if (sia_make_entity_pwd(pw, ent) != SIASUCCESS) { 102 pw->pw_name, host); 106 pw->pw_name, host); 111 permanently_set_uid(pw);
|
H A D | platform.c | 93 platform_setusercontext(struct passwd *pw) argument 103 solaris_set_default_project(pw); 126 if (getluid() == -1 && setluid(pw->pw_uid) == -1) 137 platform_setusercontext_post_groups(struct passwd *pw) argument 152 irix_setusercontext(pw); 156 aix_usrinfo(pw); 160 if (set_id(pw->pw_name) != 0) { 179 if (setpcred(pw->pw_name, creds) == -1) 184 ssh_selinux_setup_exec_context(pw->pw_name);
|
H A D | uidswap.c | 65 temporarily_use_uid(struct passwd *pw) argument 72 (u_int)pw->pw_uid, (u_int)pw->pw_gid, 105 if (initgroups(pw->pw_name, pw->pw_gid) < 0) 106 fatal("initgroups: %s: %.100s", pw->pw_name, 133 if (setegid(pw->pw_gid) < 0) 134 fatal("setegid %u: %.100s", (u_int)pw->pw_gid, 136 if (seteuid(pw->pw_uid) == -1) 137 fatal("seteuid %u: %.100s", (u_int)pw 217 permanently_set_uid(struct passwd *pw) argument [all...] |
H A D | auth-passwd.c | 83 struct passwd * pw = authctxt->pw; local 90 if (pw->pw_uid == 0 && options.permit_root_login != PERMIT_YES) 106 HANDLE hToken = cygwin_logon_user(pw, password); 169 struct passwd *pw = authctxt->pw; local 173 as = auth_usercheck(pw->pw_name, authctxt->style, "auth-ssh", 194 struct passwd *pw = authctxt->pw; local 198 char *pw_password = authctxt->valid ? shadow_pw(pw) [all...] |
H A D | auth-rhosts.c | 187 auth_rhosts(struct passwd *pw, const char *client_user) argument 193 return auth_rhosts2(pw, client_user, hostname, ipaddr); 197 auth_rhosts2_raw(struct passwd *pw, const char *client_user, const char *hostname, argument 209 temporarily_use_uid(pw); 219 pw->pw_dir, rhosts_files[rhosts_file_index]); 233 if (pw->pw_uid != 0) { 235 client_user, pw->pw_name)) { 241 client_user, pw->pw_name)) { 251 if (stat(pw->pw_dir, &st) < 0) { 253 "no home directory %.200s", pw 317 auth_rhosts2(struct passwd *pw, const char *client_user, const char *hostname, const char *ipaddr) argument [all...] |
H A D | auth2-hostbased.c | 121 if (PRIVSEP(hostbased_key_allowed(authctxt->pw, cuser, chost, key)) && 141 hostbased_key_allowed(struct passwd *pw, const char *cuser, char *chost, argument 164 if (auth_rhosts2(pw, cuser, chost, chost) == 0) 172 if (auth_rhosts2(pw, cuser, resolvedname, ipaddr) == 0) 185 host_status = check_key_in_hostfiles(pw, key, lookup, 191 host_status = check_key_in_hostfiles(pw, key, lookup,
|
H A D | md5crypt.c | 51 md5_crypt(const char *pw, const char *salt) argument 83 MD5_Update(&ctx, pw, strlen(pw)); 91 /* Then just as many characters of the MD5(pw, salt, pw) */ 93 MD5_Update(&ctx1, pw, strlen(pw)); 95 MD5_Update(&ctx1, pw, strlen(pw)); 98 for(pl = strlen(pw); p [all...] |
H A D | sshpty.c | 208 pty_setowner(struct passwd *pw, const char *tty) argument 221 gid = pw->pw_gid; 235 ssh_selinux_setup_pty(pw->pw_name, tty); 238 if (st.st_uid != pw->pw_uid || st.st_gid != gid) { 239 if (chown(tty, pw->pw_uid, gid) < 0) { 241 (st.st_uid == pw->pw_uid || st.st_uid == 0)) 243 tty, (u_int)pw->pw_uid, (u_int)gid, 247 tty, (u_int)pw->pw_uid, (u_int)gid,
|
/external/apache-xml/src/main/java/org/apache/xml/utils/ |
H A D | DefaultErrorHandler.java | 56 public DefaultErrorHandler(PrintWriter pw) argument 58 m_pw = pw; 64 public DefaultErrorHandler(PrintStream pw) argument 66 m_pw = new PrintWriter(pw, true); 119 PrintWriter pw = getErrorWriter(); 121 printLocation(pw, exception); 122 pw.println("Parser warning: " + exception.getMessage()); 200 PrintWriter pw = getErrorWriter(); 202 printLocation(pw, exception); 203 pw 310 printLocation(PrintStream pw, TransformerException exception) argument 315 printLocation(java.io.PrintStream pw, org.xml.sax.SAXParseException exception) argument 320 printLocation(PrintWriter pw, Throwable exception) argument [all...] |
/external/wpa_supplicant_8/hostapd/src/utils/ |
H A D | ext_password.c | 104 void ext_password_free(struct wpabuf *pw) argument 106 if (pw == NULL) 108 os_memset(wpabuf_mhead(pw), 0, wpabuf_len(pw)); 110 if (munlock(wpabuf_head(pw), wpabuf_len(pw)) < 0) { 115 wpabuf_free(pw);
|
/external/wpa_supplicant_8/src/utils/ |
H A D | ext_password.c | 104 void ext_password_free(struct wpabuf *pw) argument 106 if (pw == NULL) 108 os_memset(wpabuf_mhead(pw), 0, wpabuf_len(pw)); 110 if (munlock(wpabuf_head(pw), wpabuf_len(pw)) < 0) { 115 wpabuf_free(pw);
|
/external/wpa_supplicant_8/wpa_supplicant/src/utils/ |
H A D | ext_password.c | 104 void ext_password_free(struct wpabuf *pw) argument 106 if (pw == NULL) 108 os_memset(wpabuf_mhead(pw), 0, wpabuf_len(pw)); 110 if (munlock(wpabuf_head(pw), wpabuf_len(pw)) < 0) { 115 wpabuf_free(pw);
|
/external/dropbear/ |
H A D | auth.h | 95 struct passwd * pw; member in struct:AuthState
|
H A D | cli-kex.c | 158 struct passwd * pw = NULL; local 159 pw = getpwuid(getuid()); 160 if (pw) { 161 homedir = pw->pw_dir;
|
H A D | sshpty.c | 356 pty_setowner(struct passwd *pw, const char *tty_name) argument 369 gid = pw->pw_gid; 383 if (st.st_uid != pw->pw_uid || st.st_gid != gid) { 384 if (chown(tty_name, pw->pw_uid, gid) < 0) { 386 (st.st_uid == pw->pw_uid || st.st_uid == 0)) { 389 tty_name, (unsigned int)pw->pw_uid, (unsigned int)gid, 393 tty_name, (unsigned int)pw->pw_uid, (unsigned int)gid,
|
/external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/crypto/ |
H A D | PEMDecoder.java | 227 private static void decryptPEM(PEMStructure ps, byte[] pw) throws IOException argument 243 des3.init(false, generateKeyFromPasswordSaltWithMD5(pw, salt, 24)); 249 des.init(false, generateKeyFromPasswordSaltWithMD5(pw, salt, 8)); 255 aes.init(false, generateKeyFromPasswordSaltWithMD5(pw, salt, 16)); 261 aes.init(false, generateKeyFromPasswordSaltWithMD5(pw, salt, 24)); 267 aes.init(false, generateKeyFromPasswordSaltWithMD5(pw, salt, 32));
|