/external/openssh/openbsd-compat/ |
H A D | port-uw.h | 28 char * get_iaf_password(struct passwd *pw);
|
H A D | port-irix.h | 35 void irix_setusercontext(struct passwd *pw);
|
H A D | port-irix.c | 47 irix_setusercontext(struct passwd *pw) argument 59 jid = jlimit_startjob(pw->pw_name, pw->pw_uid, "interactive"); 72 if ((projid = getdfltprojuser(pw->pw_name)) == -1) { 78 (int)projid, pw->pw_name, strerror(errno)); 82 debug("Setting sat id to %d", (int) pw->pw_uid); 83 if (satsetid(pw->pw_uid))
|
H A D | port-uw.c | 56 struct passwd *pw = authctxt->pw; local 61 char *pw_password = authctxt->valid ? shadow_pw(pw) : pw->pw_passwd; 75 if (!nischeck(pw->pw_name)) { 133 get_iaf_password(struct passwd *pw) argument 138 if (!ia_openinfo(pw->pw_name,&uinfo)) {
|
H A D | xcrypt.c | 95 shadow_pw(struct passwd *pw) argument 97 char *pw_password = pw->pw_passwd; 100 struct spwd *spw = getspnam(pw->pw_name); 107 return(get_iaf_password(pw)); 112 if (issecure() && (spw = getpwanam(pw->pw_name)) != NULL) 115 struct pr_passwd *spw = getprpwnam(pw->pw_name);
|
/external/openssh/ |
H A D | auth-rh-rsa.c | 45 auth_rhosts_rsa_key_allowed(struct passwd *pw, char *cuser, char *chost, argument 54 if (!auth_rhosts(pw, cuser)) 57 host_status = check_key_in_hostfiles(pw, client_host_key, 72 struct passwd *pw = authctxt->pw; local 84 if (!PRIVSEP(auth_rhosts_rsa_key_allowed(pw, cuser, chost, client_host_key))) { 103 pw->pw_name, cuser, chost);
|
H A D | uidswap.c | 66 temporarily_use_uid(struct passwd *pw) argument 73 (u_int)pw->pw_uid, (u_int)pw->pw_gid, 105 if (initgroups(pw->pw_name, pw->pw_gid) < 0) 106 fatal("initgroups: %s: %.100s", pw->pw_name, 132 if (setegid(pw->pw_gid) < 0) 133 fatal("setegid %u: %.100s", (u_int)pw->pw_gid, 135 if (seteuid(pw->pw_uid) == -1) 136 fatal("seteuid %u: %.100s", (u_int)pw 206 permanently_set_uid(struct passwd *pw) argument [all...] |
H A D | platform.c | 102 platform_setusercontext(struct passwd *pw) argument 112 solaris_set_default_project(pw); 135 if (getluid() == -1 && setluid(pw->pw_uid) == -1) 146 platform_setusercontext_post_groups(struct passwd *pw) argument 161 irix_setusercontext(pw); 165 aix_usrinfo(pw); 182 if (setpcred(pw->pw_name, creds) == -1) 187 ssh_selinux_setup_exec_context(pw->pw_name);
|
H A D | md5crypt.c | 51 md5_crypt(const char *pw, const char *salt) argument 83 MD5_Update(&ctx, pw, strlen(pw)); 91 /* Then just as many characters of the MD5(pw, salt, pw) */ 93 MD5_Update(&ctx1, pw, strlen(pw)); 95 MD5_Update(&ctx1, pw, strlen(pw)); 98 for(pl = strlen(pw); p [all...] |
H A D | auth-rhosts.c | 190 auth_rhosts(struct passwd *pw, const char *client_user) argument 196 return auth_rhosts2(pw, client_user, hostname, ipaddr); 200 auth_rhosts2_raw(struct passwd *pw, const char *client_user, const char *hostname, argument 212 temporarily_use_uid(pw); 223 pw->pw_dir, rhosts_files[rhosts_file_index]); 245 if (pw->pw_uid == 0) 249 client_user, pw->pw_name)) { 255 client_user, pw->pw_name)) { 266 if (stat(pw->pw_dir, &st) < 0) { 268 "no home directory %.200s", pw 337 auth_rhosts2(struct passwd *pw, const char *client_user, const char *hostname, const char *ipaddr) argument [all...] |
H A D | auth-sia.c | 83 session_setup_sia(struct passwd *pw, char *tty) argument 90 if (sia_ses_init(&ent, saved_argc, saved_argv, host, pw->pw_name, 94 if (sia_make_entity_pwd(pw, ent) != SIASUCCESS) { 102 pw->pw_name, host); 106 pw->pw_name, host); 111 permanently_set_uid(pw);
|
H A D | auth.c | 98 allowed_user(struct passwd * pw) argument 107 /* Shouldn't be called if pw is NULL, but better safe than sorry... */ 108 if (!pw || !pw->pw_name) 113 spw = getspnam(pw->pw_name); 121 passwd = pw->pw_passwd; 125 passwd = get_iaf_password(pw); 153 pw->pw_name); 164 char *shell = xstrdup((pw->pw_shell[0] == '\0') ? 165 _PATH_BSHELL : pw 378 expand_authorized_keys(const char *filename, struct passwd *pw) argument 401 authorized_principals_file(struct passwd *pw) argument 411 check_key_in_hostfiles(struct passwd *pw, Key *key, const char *host, const char *sysfile, const char *userfile) argument 542 secure_filename(FILE *f, const char *file, struct passwd *pw, char *err, size_t errlen) argument 557 auth_openfile(const char *file, struct passwd *pw, int strict_modes, int log_missing, char *file_type) argument 600 auth_openkeyfile(const char *file, struct passwd *pw, int strict_modes) argument 606 auth_openprincipals(const char *file, struct passwd *pw, int strict_modes) argument 621 struct passwd *pw; local [all...] |
H A D | auth-passwd.c | 84 struct passwd * pw = authctxt->pw; local 91 if (pw->pw_uid == 0 && options.permit_root_login != PERMIT_YES) 107 HANDLE hToken = cygwin_logon_user(pw, password); 170 struct passwd *pw = authctxt->pw; local 174 as = auth_usercheck(pw->pw_name, authctxt->style, "auth-ssh", 195 struct passwd *pw = authctxt->pw; local 199 char *pw_password = authctxt->valid ? shadow_pw(pw) [all...] |
/external/jarjar/src/main/com/tonicsystems/jarjar/ |
H A D | StringDumper.java | 28 public void run(String classPath, PrintWriter pw) throws IOException { argument 29 StringReader stringReader = new DumpStringReader(pw); 42 pw.flush(); 53 private final PrintWriter pw; field in class:StringDumper.DumpStringReader 56 public DumpStringReader(PrintWriter pw) { argument 57 this.pw = pw; 64 pw.println(className.replace('/', '.')); 66 pw.print("\t"); 68 pw [all...] |
/external/apache-xml/src/main/java/org/apache/xml/utils/ |
H A D | DefaultErrorHandler.java | 56 public DefaultErrorHandler(PrintWriter pw) argument 58 m_pw = pw; 64 public DefaultErrorHandler(PrintStream pw) argument 66 m_pw = new PrintWriter(pw, true); 119 PrintWriter pw = getErrorWriter(); 121 printLocation(pw, exception); 122 pw.println("Parser warning: " + exception.getMessage()); 200 PrintWriter pw = getErrorWriter(); 202 printLocation(pw, exception); 203 pw 310 printLocation(PrintStream pw, TransformerException exception) argument 315 printLocation(java.io.PrintStream pw, org.xml.sax.SAXParseException exception) argument 320 printLocation(PrintWriter pw, Throwable exception) argument [all...] |
/external/smali/util/src/main/java/org/jf/util/ |
H A D | SmaliHelpFormatter.java | 42 PrintWriter pw = new PrintWriter(System.out); 43 super.printOptions(pw, getWidth(), debugOptions, getLeftPadding(), getDescPadding()); 44 pw.flush();
|
/external/emma/core/java12/com/vladium/util/exception/ |
H A D | IThrowableWrapper.java | 40 * this method delegates to super.printStackTrace(pw) where 'super' is the 45 void __printStackTrace (PrintWriter pw); argument
|
/external/wpa_supplicant_8/hostapd/src/utils/ |
H A D | ext_password.c | 104 void ext_password_free(struct wpabuf *pw) argument 106 if (pw == NULL) 108 os_memset(wpabuf_mhead(pw), 0, wpabuf_len(pw)); 110 if (munlock(wpabuf_head(pw), wpabuf_len(pw)) < 0) { 115 wpabuf_free(pw);
|
/external/wpa_supplicant_8/src/utils/ |
H A D | ext_password.c | 104 void ext_password_free(struct wpabuf *pw) argument 106 if (pw == NULL) 108 os_memset(wpabuf_mhead(pw), 0, wpabuf_len(pw)); 110 if (munlock(wpabuf_head(pw), wpabuf_len(pw)) < 0) { 115 wpabuf_free(pw);
|
/external/wpa_supplicant_8/wpa_supplicant/src/utils/ |
H A D | ext_password.c | 104 void ext_password_free(struct wpabuf *pw) argument 106 if (pw == NULL) 108 os_memset(wpabuf_mhead(pw), 0, wpabuf_len(pw)); 110 if (munlock(wpabuf_head(pw), wpabuf_len(pw)) < 0) { 115 wpabuf_free(pw);
|
/external/toybox/toys/posix/ |
H A D | id.c | 87 struct passwd *pw; local 96 pw = xgetpwnam(username); 97 uid = euid = pw->pw_uid; 98 gid = egid = pw->pw_gid; 99 if (TT.is_groups) printf("%s : ", pw->pw_name); 103 pw = xgetpwuid(i ? uid : euid); 104 if (TT.do_u) s_or_u(pw->pw_name, pw->pw_uid, 1); 110 showid("uid=", pw->pw_uid, pw [all...] |
/external/toybox/toys/pending/ |
H A D | groupdel.c | 49 struct passwd *pw; local 51 for (endpwent(); (pw = getpwent());) 52 if (pw->pw_gid == grp->gr_gid) break; 54 if (pw) error_exit("can't remove primary group of user '%s'", pw->pw_name);
|
H A D | ipcs.c | 153 struct passwd *pw; local 211 if ((pw = getpwuid(buf.shm_perm.uid))) 212 printf("%-10d %-10.10s", shmid, pw->pw_name); 221 if ((pw = getpwuid(buf.shm_perm.uid))) 222 printf("%-10d %-10.10s", shmid, pw->pw_name); 227 if ((pw = getpwuid(buf.shm_perm.cuid))) printf(" %-10s", pw->pw_name); 231 if ((pw = getpwuid(buf.shm_perm.uid))) printf(" %-10s", pw->pw_name); 237 if ((pw 255 struct passwd *pw; local 342 struct passwd *pw; local [all...] |
/external/javasqlite/src/main/java/SQLite/ |
H A D | Shell.java | 29 PrintWriter pw; field in class:Shell 40 public Shell(PrintWriter pw, PrintWriter err) { argument 41 this.pw = pw; 46 pw = new PrintWriter(ps); 51 Shell s = new Shell(this.pw, this.err); 183 pw.println(""); 186 pw.println(cols[i] + " = " + 202 pw.print(csep + cols[i]); 207 pw [all...] |
/external/wpa_supplicant_8/hs20/server/www/ |
H A D | add-mo.php | 16 $pw = $_POST["password"]; variable 17 if (strlen($id) < 32 || !isset($user) || !isset($pw)) { 45 if (!$db->exec("UPDATE sessions SET user='$user', password='$pw', realm='$realm', type='password' WHERE rowid=$rowid")) {
|