/external/chromium_org/content/browser/android/ |
H A D | devtools_auth.cc | 18 if (!creds || !creds->pw_name) { 24 (strcmp("root", creds->pw_name) == 0 || // For rooted devices 25 strcmp("shell", creds->pw_name) == 0 || // For non-rooted devices 31 LOG(WARNING) << "DevTools: connection attempt from " << creds->pw_name;
|
/external/e2fsprogs/include/nonunix/ |
H A D | pwd.h | 12 char *pw_name; member in struct:passwd
|
/external/chromium_org/remoting/host/ |
H A D | username.cc | 29 return passwd_result ? passwd_result->pw_name : std::string();
|
/external/chromium_org/chrome/browser/policy/ |
H A D | policy_path_parser_linux.cc | 39 result.replace(position, strlen(kUserNamePolicyVarName), user->pw_name);
|
/external/iptables/extensions/ |
H A D | libxt_owner.c | 304 if (pwd != NULL && pwd->pw_name != NULL) { 305 printf(" %s", pwd->pw_name); 353 if (pwd != NULL && pwd->pw_name != NULL) { 354 printf(" %s", pwd->pw_name); 402 if (pwd != NULL && pwd->pw_name != NULL) { 403 printf(" %s", pwd->pw_name);
|
/external/libcap-ng/libcap-ng-0.7/utils/ |
H A D | pscap.c | 166 name = p->pw_name;
|
H A D | netcap.c | 233 tacct = p->pw_name;
|
/external/lldb/source/Host/common/ |
H A D | FileSpec.cpp | 162 if (strstr(user_entry->pw_name, name_start) == user_entry->pw_name) 165 tmp_buf.append(user_entry->pw_name);
|
H A D | Host.cpp | 1193 user_name.assign (user_info_ptr->pw_name);
|
/external/compiler-rt/lib/msan/tests/ |
H A D | msan_test.cc | 3079 EXPECT_NOT_POISONED(p->pw_name); 3080 ASSERT_TRUE(p->pw_name != NULL); 3081 EXPECT_NOT_POISONED(p->pw_name[0]); 3092 EXPECT_NOT_POISONED(pwd.pw_name); 3093 ASSERT_TRUE(pwd.pw_name != NULL); 3094 EXPECT_NOT_POISONED(pwd.pw_name[0]); 3106 EXPECT_NOT_POISONED(pwd.pw_name); 3107 ASSERT_TRUE(pwd.pw_name != NULL); 3108 EXPECT_NOT_POISONED(pwd.pw_name[0]); 3142 EXPECT_NOT_POISONED(p->pw_name); [all...] |
/external/e2fsprogs/e2fsck/ |
H A D | logfile.c | 143 append_string(s, pw->pw_name, 0);
|
/external/libedit/src/ |
H A D | readline.c | 1709 && text[0] == pass->pw_name[0] 1710 && strcmp(text, pass->pw_name) == 0) 1717 return strdup(pass->pw_name);
|
/external/e2fsprogs/lib/e2p/ |
H A D | ls.c | 35 fprintf(f, "(user %s)\n", pw->pw_name);
|
/external/compiler-rt/lib/sanitizer_common/ |
H A D | sanitizer_platform_limits_posix.h | 307 char *pw_name; member in struct:__sanitizer::__sanitizer_passwd
|
H A D | sanitizer_platform_limits_posix.cc | 1106 CHECK_SIZE_AND_OFFSET(passwd, pw_name);
|
H A D | sanitizer_common_interceptors.inc | 1037 if (pwd->pw_name) 1038 COMMON_INTERCEPTOR_INITIALIZE_RANGE(pwd->pw_name, 1039 REAL(strlen)(pwd->pw_name) + 1);
|
/external/ppp/pppd/ |
H A D | main.c | 505 if (pw != NULL && pw->pw_name != NULL) 506 p = pw->pw_name;
|
H A D | auth.c | 2538 if ((pw = getpwuid(getuid())) != NULL && pw->pw_name != NULL) 2539 user_name = pw->pw_name;
|
/external/compiler-rt/test/dfsan/ |
H A D | custom.c | 567 assert(strcmp(pwd.pw_name, "root") == 0);
|
/external/tcpdump/ |
H A D | tcpdump.c | 568 if (initgroups(pw->pw_name, pw->pw_gid) != 0 ||
|