/external/openssh/openbsd-compat/ |
H A D | port-uw.h | 28 char * get_iaf_password(struct passwd *pw);
|
H A D | port-irix.h | 35 void irix_setusercontext(struct passwd *pw);
|
H A D | port-irix.c | 47 irix_setusercontext(struct passwd *pw) argument 59 jid = jlimit_startjob(pw->pw_name, pw->pw_uid, "interactive"); 72 if ((projid = getdfltprojuser(pw->pw_name)) == -1) { 78 (int)projid, pw->pw_name, strerror(errno)); 82 debug("Setting sat id to %d", (int) pw->pw_uid); 83 if (satsetid(pw->pw_uid))
|
H A D | port-uw.c | 56 struct passwd *pw = authctxt->pw; local 61 char *pw_password = authctxt->valid ? shadow_pw(pw) : pw->pw_passwd; 75 if (!nischeck(pw->pw_name)) { 133 get_iaf_password(struct passwd *pw) argument 138 if (!ia_openinfo(pw->pw_name,&uinfo)) {
|
/external/openssh/ |
H A D | auth-rh-rsa.c | 45 auth_rhosts_rsa_key_allowed(struct passwd *pw, char *cuser, char *chost, argument 54 if (!auth_rhosts(pw, cuser)) 57 host_status = check_key_in_hostfiles(pw, client_host_key, 72 struct passwd *pw = authctxt->pw; local 84 if (!PRIVSEP(auth_rhosts_rsa_key_allowed(pw, cuser, chost, client_host_key))) { 103 pw->pw_name, cuser, chost);
|
H A D | uidswap.c | 70 temporarily_use_uid(struct passwd *pw) argument 77 (u_int)pw->pw_uid, (u_int)pw->pw_gid, 109 if (initgroups(pw->pw_name, pw->pw_gid) < 0) 110 fatal("initgroups: %s: %.100s", pw->pw_name, 136 if (setegid(pw->pw_gid) < 0) 137 fatal("setegid %u: %.100s", (u_int)pw->pw_gid, 139 if (seteuid(pw->pw_uid) == -1) 140 fatal("seteuid %u: %.100s", (u_int)pw 210 permanently_set_uid(struct passwd *pw) argument [all...] |
H A D | platform.c | 102 platform_setusercontext(struct passwd *pw) argument 112 solaris_set_default_project(pw); 135 if (getluid() == -1 && setluid(pw->pw_uid) == -1) 146 platform_setusercontext_post_groups(struct passwd *pw) argument 161 irix_setusercontext(pw); 165 aix_usrinfo(pw); 182 if (setpcred(pw->pw_name, creds) == -1) 187 ssh_selinux_setup_exec_context(pw->pw_name);
|
H A D | md5crypt.c | 51 md5_crypt(const char *pw, const char *salt) argument 83 MD5_Update(&ctx, pw, strlen(pw)); 91 /* Then just as many characters of the MD5(pw, salt, pw) */ 93 MD5_Update(&ctx1, pw, strlen(pw)); 95 MD5_Update(&ctx1, pw, strlen(pw)); 98 for(pl = strlen(pw); p [all...] |
H A D | auth-rhosts.c | 190 auth_rhosts(struct passwd *pw, const char *client_user) argument 196 return auth_rhosts2(pw, client_user, hostname, ipaddr); 200 auth_rhosts2_raw(struct passwd *pw, const char *client_user, const char *hostname, argument 212 temporarily_use_uid(pw); 223 pw->pw_dir, rhosts_files[rhosts_file_index]); 245 if (pw->pw_uid == 0) 249 client_user, pw->pw_name)) { 255 client_user, pw->pw_name)) { 266 if (stat(pw->pw_dir, &st) < 0) { 268 "no home directory %.200s", pw 337 auth_rhosts2(struct passwd *pw, const char *client_user, const char *hostname, const char *ipaddr) argument [all...] |
H A D | auth-sia.c | 83 session_setup_sia(struct passwd *pw, char *tty) argument 90 if (sia_ses_init(&ent, saved_argc, saved_argv, host, pw->pw_name, 94 if (sia_make_entity_pwd(pw, ent) != SIASUCCESS) { 102 pw->pw_name, host); 106 pw->pw_name, host); 111 permanently_set_uid(pw);
|
H A D | auth.c | 98 allowed_user(struct passwd * pw) argument 107 /* Shouldn't be called if pw is NULL, but better safe than sorry... */ 108 if (!pw || !pw->pw_name) 113 spw = getspnam(pw->pw_name); 121 passwd = pw->pw_passwd; 125 passwd = get_iaf_password(pw); 153 pw->pw_name); 164 char *shell = xstrdup((pw->pw_shell[0] == '\0') ? 165 _PATH_BSHELL : pw 380 expand_authorized_keys(const char *filename, struct passwd *pw) argument 403 authorized_principals_file(struct passwd *pw) argument 412 check_key_in_hostfiles(struct passwd *pw, Key *key, const char *host, const char *sysfile, const char *userfile) argument 543 secure_filename(FILE *f, const char *file, struct passwd *pw, char *err, size_t errlen) argument 558 auth_openfile(const char *file, struct passwd *pw, int strict_modes, int log_missing, char *file_type) argument 601 auth_openkeyfile(const char *file, struct passwd *pw, int strict_modes) argument 607 auth_openprincipals(const char *file, struct passwd *pw, int strict_modes) argument 622 struct passwd *pw; local [all...] |
/external/icu/icu4j/tools/build/src/com/ibm/icu/dev/tool/docs/ |
H A D | ReportAPI.java | 73 public void print(PrintWriter pw, boolean detail, boolean html) { argument 74 pw.print(" "); 75 removed.print(pw, detail, html); 77 pw.println("</br>"); 79 pw.println(); 80 pw.print("--> "); 82 added.print(pw, detail, html); 274 PrintWriter pw = null; 276 pw = new PrintWriter(new BufferedWriter(new OutputStreamWriter(os, "UTF-8"))); 290 pw 440 printResults(Collection<? extends APIInfo> c, PrintWriter pw, boolean html, boolean isChangedAPIs) argument [all...] |
H A D | CollectAPI.java | 42 PrintWriter pw = new PrintWriter(new BufferedWriter(new OutputStreamWriter(fos, "UTF-8"))); 47 pw.println("<!DOCTYPE HTML PUBLIC \"-//W3C//DTD HTML 4.01 Transitional//EN\">"); 48 pw.println("<html>"); 49 pw.println("<head>"); 50 pw.println("<meta http-equiv=\"Content-Type\" content=\"text/html; charset=utf-8\">"); 51 pw.println("<title>" + title + "</title>"); 52 pw.println("</head>"); 53 pw.println("<body>"); 55 pw.println("<h1>" + title + "</h1>"); 79 pw [all...] |
H A D | SwatDeprecated.java | 37 private PrintWriter pw = new PrintWriter(System.out); field in class:SwatDeprecated 123 pw.println("replacing '" + srcTag + "'"); 124 pw.println(" with '" + trgTag + "'"); 125 pw.println(); 126 pw.println(" source: '" + srcPrefix + "'"); 127 pw.println("destination: '" + dstPrefix + "'"); 128 pw.println(" overwrite: " + overwrite); 129 pw.println(" verbosity: " + verbosity); 130 pw.flush(); 140 pw [all...] |
/external/jarjar/src/main/com/tonicsystems/jarjar/ |
H A D | StringDumper.java | 28 public void run(String classPath, PrintWriter pw) throws IOException { argument 29 StringReader stringReader = new DumpStringReader(pw); 42 pw.flush(); 53 private final PrintWriter pw; field in class:StringDumper.DumpStringReader 56 public DumpStringReader(PrintWriter pw) { argument 57 this.pw = pw; 64 pw.println(className.replace('/', '.')); 66 pw.print("\t"); 68 pw [all...] |
/external/apache-xml/src/main/java/org/apache/xml/utils/ |
H A D | DefaultErrorHandler.java | 56 public DefaultErrorHandler(PrintWriter pw) argument 58 m_pw = pw; 64 public DefaultErrorHandler(PrintStream pw) argument 66 m_pw = new PrintWriter(pw, true); 119 PrintWriter pw = getErrorWriter(); 121 printLocation(pw, exception); 122 pw.println("Parser warning: " + exception.getMessage()); 200 PrintWriter pw = getErrorWriter(); 202 printLocation(pw, exception); 203 pw 310 printLocation(PrintStream pw, TransformerException exception) argument 315 printLocation(java.io.PrintStream pw, org.xml.sax.SAXParseException exception) argument 320 printLocation(PrintWriter pw, Throwable exception) argument [all...] |
/external/smali/util/src/main/java/org/jf/util/ |
H A D | SmaliHelpFormatter.java | 42 PrintWriter pw = new PrintWriter(System.out); 43 super.printOptions(pw, getWidth(), debugOptions, getLeftPadding(), getDescPadding()); 44 pw.flush();
|
/external/emma/core/java12/com/vladium/util/exception/ |
H A D | IThrowableWrapper.java | 40 * this method delegates to super.printStackTrace(pw) where 'super' is the 45 void __printStackTrace (PrintWriter pw); argument
|
/external/wpa_supplicant_8/hostapd/src/utils/ |
H A D | ext_password.c | 104 void ext_password_free(struct wpabuf *pw) argument 106 if (pw == NULL) 108 os_memset(wpabuf_mhead(pw), 0, wpabuf_len(pw)); 110 if (munlock(wpabuf_head(pw), wpabuf_len(pw)) < 0) { 115 wpabuf_free(pw);
|
/external/wpa_supplicant_8/src/utils/ |
H A D | ext_password.c | 104 void ext_password_free(struct wpabuf *pw) argument 106 if (pw == NULL) 108 os_memset(wpabuf_mhead(pw), 0, wpabuf_len(pw)); 110 if (munlock(wpabuf_head(pw), wpabuf_len(pw)) < 0) { 115 wpabuf_free(pw);
|
/external/wpa_supplicant_8/wpa_supplicant/src/utils/ |
H A D | ext_password.c | 104 void ext_password_free(struct wpabuf *pw) argument 106 if (pw == NULL) 108 os_memset(wpabuf_mhead(pw), 0, wpabuf_len(pw)); 110 if (munlock(wpabuf_head(pw), wpabuf_len(pw)) < 0) { 115 wpabuf_free(pw);
|
/external/toybox/toys/posix/ |
H A D | id.c | 88 struct passwd *pw; local 97 pw = xgetpwnam(username); 98 uid = euid = pw->pw_uid; 99 gid = egid = pw->pw_gid; 100 if (TT.is_groups) printf("%s : ", pw->pw_name); 104 pw = xgetpwuid(i ? uid : euid); 105 if (toys.optflags&FLAG_u) s_or_u(pw->pw_name, pw->pw_uid, 1); 111 showid("uid=", pw->pw_uid, pw [all...] |
/external/toybox/toys/pending/ |
H A D | groupdel.c | 49 struct passwd *pw; local 51 for (endpwent(); (pw = getpwent());) 52 if (pw->pw_gid == grp->gr_gid) break; 54 if (pw) error_exit("can't remove primary group of user '%s'", pw->pw_name);
|
H A D | ipcs.c | 153 struct passwd *pw; local 211 if ((pw = getpwuid(buf.shm_perm.uid))) 212 printf("%-10d %-10.10s", shmid, pw->pw_name); 221 if ((pw = getpwuid(buf.shm_perm.uid))) 222 printf("%-10d %-10.10s", shmid, pw->pw_name); 227 if ((pw = getpwuid(buf.shm_perm.cuid))) printf(" %-10s", pw->pw_name); 231 if ((pw = getpwuid(buf.shm_perm.uid))) printf(" %-10s", pw->pw_name); 237 if ((pw 255 struct passwd *pw; local 342 struct passwd *pw; local [all...] |
/external/javasqlite/src/main/java/SQLite/ |
H A D | Shell.java | 29 PrintWriter pw; field in class:Shell 40 public Shell(PrintWriter pw, PrintWriter err) { argument 41 this.pw = pw; 46 pw = new PrintWriter(ps); 51 Shell s = new Shell(this.pw, this.err); 183 pw.println(""); 186 pw.println(cols[i] + " = " + 202 pw.print(csep + cols[i]); 207 pw [all...] |