/external/openssh/openbsd-compat/ |
H A D | port-uw.h | 28 char * get_iaf_password(struct passwd *pw);
|
H A D | port-irix.h | 35 void irix_setusercontext(struct passwd *pw);
|
H A D | port-irix.c | 47 irix_setusercontext(struct passwd *pw) argument 59 jid = jlimit_startjob(pw->pw_name, pw->pw_uid, "interactive"); 72 if ((projid = getdfltprojuser(pw->pw_name)) == -1) { 78 (int)projid, pw->pw_name, strerror(errno)); 82 debug("Setting sat id to %d", (int) pw->pw_uid); 83 if (satsetid(pw->pw_uid))
|
H A D | port-uw.c | 55 struct passwd *pw = authctxt->pw; local 60 char *pw_password = authctxt->valid ? shadow_pw(pw) : pw->pw_passwd; 74 if (!nischeck(pw->pw_name)) { 132 get_iaf_password(struct passwd *pw) argument 137 if (!ia_openinfo(pw->pw_name,&uinfo)) {
|
H A D | xcrypt.c | 90 shadow_pw(struct passwd *pw) argument 92 char *pw_password = pw->pw_passwd; 95 struct spwd *spw = getspnam(pw->pw_name); 102 return(get_iaf_password(pw)); 107 if (issecure() && (spw = getpwanam(pw->pw_name)) != NULL) 110 struct pr_passwd *spw = getprpwnam(pw->pw_name);
|
/external/openssh/ |
H A D | uidswap.c | 65 temporarily_use_uid(struct passwd *pw) argument 72 (u_int)pw->pw_uid, (u_int)pw->pw_gid, 105 if (initgroups(pw->pw_name, pw->pw_gid) < 0) 106 fatal("initgroups: %s: %.100s", pw->pw_name, 133 if (setegid(pw->pw_gid) < 0) 134 fatal("setegid %u: %.100s", (u_int)pw->pw_gid, 136 if (seteuid(pw->pw_uid) == -1) 137 fatal("seteuid %u: %.100s", (u_int)pw 217 permanently_set_uid(struct passwd *pw) argument [all...] |
H A D | auth-rh-rsa.c | 42 auth_rhosts_rsa_key_allowed(struct passwd *pw, char *cuser, char *chost, argument 51 if (!auth_rhosts(pw, cuser)) 54 host_status = check_key_in_hostfiles(pw, client_host_key, 69 struct passwd *pw = authctxt->pw; local 81 if (!PRIVSEP(auth_rhosts_rsa_key_allowed(pw, cuser, chost, client_host_key))) { 100 pw->pw_name, cuser, chost);
|
H A D | auth-rhosts.c | 187 auth_rhosts(struct passwd *pw, const char *client_user) argument 193 return auth_rhosts2(pw, client_user, hostname, ipaddr); 197 auth_rhosts2_raw(struct passwd *pw, const char *client_user, const char *hostname, argument 209 temporarily_use_uid(pw); 219 pw->pw_dir, rhosts_files[rhosts_file_index]); 233 if (pw->pw_uid != 0) { 235 client_user, pw->pw_name)) { 241 client_user, pw->pw_name)) { 251 if (stat(pw->pw_dir, &st) < 0) { 253 "no home directory %.200s", pw 317 auth_rhosts2(struct passwd *pw, const char *client_user, const char *hostname, const char *ipaddr) argument [all...] |
H A D | platform.c | 93 platform_setusercontext(struct passwd *pw) argument 103 solaris_set_default_project(pw); 126 if (getluid() == -1 && setluid(pw->pw_uid) == -1) 137 platform_setusercontext_post_groups(struct passwd *pw) argument 152 irix_setusercontext(pw); 156 aix_usrinfo(pw); 160 if (set_id(pw->pw_name) != 0) { 179 if (setpcred(pw->pw_name, creds) == -1) 184 ssh_selinux_setup_exec_context(pw->pw_name);
|
H A D | auth.c | 95 allowed_user(struct passwd * pw) argument 104 /* Shouldn't be called if pw is NULL, but better safe than sorry... */ 105 if (!pw || !pw->pw_name) 110 spw = getspnam(pw->pw_name); 118 passwd = pw->pw_passwd; 122 passwd = get_iaf_password(pw); 150 pw->pw_name); 161 char *shell = xstrdup((pw->pw_shell[0] == '\0') ? 162 _PATH_BSHELL : pw 335 expand_authorized_keys(const char *filename, struct passwd *pw) argument 358 authorized_principals_file(struct passwd *pw) argument 367 check_key_in_hostfiles(struct passwd *pw, Key *key, const char *host, const char *sysfile, const char *userfile) argument 425 secure_filename(FILE *f, const char *file, struct passwd *pw, char *err, size_t errlen) argument 490 auth_openfile(const char *file, struct passwd *pw, int strict_modes, int log_missing, char *file_type) argument 533 auth_openkeyfile(const char *file, struct passwd *pw, int strict_modes) argument 539 auth_openprincipals(const char *file, struct passwd *pw, int strict_modes) argument 554 struct passwd *pw; local [all...] |
H A D | md5crypt.c | 51 md5_crypt(const char *pw, const char *salt) argument 83 MD5_Update(&ctx, pw, strlen(pw)); 91 /* Then just as many characters of the MD5(pw, salt, pw) */ 93 MD5_Update(&ctx1, pw, strlen(pw)); 95 MD5_Update(&ctx1, pw, strlen(pw)); 98 for(pl = strlen(pw); p [all...] |
H A D | auth-sia.c | 83 session_setup_sia(struct passwd *pw, char *tty) argument 90 if (sia_ses_init(&ent, saved_argc, saved_argv, host, pw->pw_name, 94 if (sia_make_entity_pwd(pw, ent) != SIASUCCESS) { 102 pw->pw_name, host); 106 pw->pw_name, host); 111 permanently_set_uid(pw);
|
H A D | auth-passwd.c | 83 struct passwd * pw = authctxt->pw; local 90 if (pw->pw_uid == 0 && options.permit_root_login != PERMIT_YES) 106 HANDLE hToken = cygwin_logon_user(pw, password); 169 struct passwd *pw = authctxt->pw; local 173 as = auth_usercheck(pw->pw_name, authctxt->style, "auth-ssh", 194 struct passwd *pw = authctxt->pw; local 198 char *pw_password = authctxt->valid ? shadow_pw(pw) [all...] |
H A D | auth2-pubkey.c | 142 if (PRIVSEP(user_key_allowed(authctxt->pw, key)) && 160 if (PRIVSEP(user_key_allowed(authctxt->pw, key))) { 201 match_principals_file(char *file, struct passwd *pw, struct KeyCert *cert) argument 208 temporarily_use_uid(pw); 210 if ((f = auth_openprincipals(file, pw, options.strict_modes)) == NULL) { 243 if (auth_parse_options(pw, line_opts, 259 user_key_allowed2(struct passwd *pw, Key *key, char *file) argument 270 temporarily_use_uid(pw); 273 f = auth_openkeyfile(file, pw, options.strict_modes); 317 if (auth_parse_options(pw, key_option 382 user_cert_trusted_ca(struct passwd *pw, Key *key) argument 437 user_key_allowed(struct passwd *pw, Key *key) argument [all...] |
/external/apache-harmony/luni/src/test/api/common/org/apache/harmony/luni/tests/java/io/ |
H A D | PipedReaderTest.java | 29 public PipedWriter pw; field in class:PipedReaderTest.PWriter 33 pw = new PipedWriter(reader); 40 pw = new PipedWriter(); 47 pw.write(c); 143 preader.connect(pwriter.pw); 151 preader.connect(pwriter.pw); 202 PipedWriter pw = new PipedWriter(); 205 obj = new PipedReader(pw); 213 PipedWriter pw = new PipedWriter(); 216 obj = new PipedReader(pw); [all...] |
H A D | PrintWriterTest.java | 58 PrintWriter pw; field in class:PrintWriterTest 72 pw.println("Random Chars"); 73 pw.write("Hello World"); 74 pw.flush(); 94 pw = new PrintWriter(bao, true); 95 pw.println("Random Chars"); 96 pw.write("Hello World"); 102 pw.flush(); 121 pw = new PrintWriter(sw = new Support_StringWriter()); 122 pw [all...] |
H A D | PipedWriterTest.java | 31 public PReader(PipedWriter pw) { argument 33 pr = new PipedReader(pw); 65 PipedWriter pw; field in class:PipedWriterTest 83 pw = new PipedWriter(rd); 86 pw.write(buf); 87 pw.close(); 101 pw = new PipedWriter(rd); 103 pw.close(); 105 pw.write(buf); 120 pw [all...] |
H A D | PipedInputStreamTest.java | 53 PWriter pw; field in class:PipedInputStreamTest 86 t = new Thread(pw = new PWriter(pos, 1000)); 109 t = new Thread(pw = new PWriter(pos, 1000)); 112 synchronized (pw) { 113 pw.wait(10000); 160 t = new Thread(pw = new PWriter(pos, 1000)); 163 synchronized (pw) { 164 pw.wait(10000); 178 t = new Thread(pw = new PWriter(pos, 1000)); 181 synchronized (pw) { [all...] |
/external/apache-xml/src/main/java/org/apache/xml/utils/ |
H A D | DefaultErrorHandler.java | 56 public DefaultErrorHandler(PrintWriter pw) argument 58 m_pw = pw; 64 public DefaultErrorHandler(PrintStream pw) argument 66 m_pw = new PrintWriter(pw, true); 119 PrintWriter pw = getErrorWriter(); 121 printLocation(pw, exception); 122 pw.println("Parser warning: " + exception.getMessage()); 200 PrintWriter pw = getErrorWriter(); 202 printLocation(pw, exception); 203 pw 310 printLocation(PrintStream pw, TransformerException exception) argument 315 printLocation(java.io.PrintStream pw, org.xml.sax.SAXParseException exception) argument 320 printLocation(PrintWriter pw, Throwable exception) argument [all...] |
/external/smali/util/src/main/java/org/jf/util/ |
H A D | SmaliHelpFormatter.java | 42 PrintWriter pw = new PrintWriter(System.out); 43 super.printOptions(pw, getWidth(), debugOptions, getLeftPadding(), getDescPadding()); 44 pw.flush();
|
/external/emma/core/java12/com/vladium/util/exception/ |
H A D | IThrowableWrapper.java | 40 * this method delegates to super.printStackTrace(pw) where 'super' is the 45 void __printStackTrace (PrintWriter pw); argument
|
/external/wpa_supplicant_8/hostapd/src/utils/ |
H A D | ext_password.c | 104 void ext_password_free(struct wpabuf *pw) argument 106 if (pw == NULL) 108 os_memset(wpabuf_mhead(pw), 0, wpabuf_len(pw)); 110 if (munlock(wpabuf_head(pw), wpabuf_len(pw)) < 0) { 115 wpabuf_free(pw);
|
/external/wpa_supplicant_8/src/utils/ |
H A D | ext_password.c | 104 void ext_password_free(struct wpabuf *pw) argument 106 if (pw == NULL) 108 os_memset(wpabuf_mhead(pw), 0, wpabuf_len(pw)); 110 if (munlock(wpabuf_head(pw), wpabuf_len(pw)) < 0) { 115 wpabuf_free(pw);
|
/external/wpa_supplicant_8/wpa_supplicant/src/utils/ |
H A D | ext_password.c | 104 void ext_password_free(struct wpabuf *pw) argument 106 if (pw == NULL) 108 os_memset(wpabuf_mhead(pw), 0, wpabuf_len(pw)); 110 if (munlock(wpabuf_head(pw), wpabuf_len(pw)) < 0) { 115 wpabuf_free(pw);
|
/external/javasqlite/src/main/java/SQLite/ |
H A D | Shell.java | 29 PrintWriter pw; field in class:Shell 40 public Shell(PrintWriter pw, PrintWriter err) { argument 41 this.pw = pw; 46 pw = new PrintWriter(ps); 51 Shell s = new Shell(this.pw, this.err); 183 pw.println(""); 186 pw.println(cols[i] + " = " + 202 pw.print(csep + cols[i]); 207 pw [all...] |