/external/autotest/client/tests/cgroup/ |
D | cgroup_common.py | 23 @param _client: Test script pwd + name 54 pwd = mkdtemp(prefix='cgroup-', dir=root) + '/' 56 pwd = mkdtemp(prefix='cgroup-', dir=self.root) + '/' 60 return pwd 63 def rm_cgroup(self, pwd, supress=False): argument 67 @param pwd: cgroup directory. 72 os.rmdir(pwd) 95 def is_cgroup(self, pid, pwd): argument 97 Checks if the 'pid' process is in 'pwd' cgroup 99 @param pwd: cgroup directory [all …]
|
/external/toybox/toys/posix/ |
D | pwd.c | 1 /* pwd.c - Print working directory. 5 * See http://opengroup.org/onlinepubs/9699919799/utilities/pwd.html 7 USE_PWD(NEWTOY(pwd, ">0LP[-LP]", TOYFLAG_BIN)) 9 config PWD 10 bool "pwd" 13 usage: pwd [-L|-P] 17 -L Use shell's path from $PWD (when applicable) 26 char *s, *pwd = getcwd(0, 0), *PWD; in pwd_main() local 28 // Only use $PWD if it's an absolute path alias for cwd with no "." or ".." in pwd_main() 29 if (!(toys.optflags & FLAG_P) && (s = PWD = getenv("PWD"))) { in pwd_main() [all …]
|
/external/wpa_supplicant_8/src/eap_peer/ |
D | eap_pwd.c | 2 * EAP peer method: EAP-pwd (RFC 5931) 62 return "PWD-ID-Req"; in eap_pwd_state_txt() 64 return "PWD-Commit-Req"; in eap_pwd_state_txt() 66 return "PWD-Confirm-Req"; in eap_pwd_state_txt() 74 return "PWD-UNK"; in eap_pwd_state_txt() 82 wpa_printf(MSG_DEBUG, "EAP-PWD: %s -> %s", in eap_pwd_state() 98 wpa_printf(MSG_INFO, "EAP-PWD: No password configured!"); in eap_pwd_init() 104 wpa_printf(MSG_INFO, "EAP-PWD: No identity configured!"); in eap_pwd_init() 109 wpa_printf(MSG_INFO, "EAP-PWD: memory allocation data fail"); in eap_pwd_init() 114 wpa_printf(MSG_INFO, "EAP-PWD: memory allocation id fail"); in eap_pwd_init() [all …]
|
/external/python/cpython3/Lib/test/ |
D | test_pwd.py | 5 pwd = support.import_module('pwd') variable 7 @unittest.skipUnless(hasattr(pwd, 'getpwall'), 'Does not have getpwall()') 11 entries = pwd.getpwall() 32 # self.assertEqual(pwd.getpwuid(e.pw_uid), e) 37 entries = pwd.getpwall() 53 self.assertIn(pwd.getpwnam(e.pw_name), entriesbyname[e.pw_name]) 54 self.assertIn(pwd.getpwuid(e.pw_uid), entriesbyuid[e.pw_uid]) 57 self.assertRaises(TypeError, pwd.getpwuid) 58 self.assertRaises(TypeError, pwd.getpwuid, 3.14) 59 self.assertRaises(TypeError, pwd.getpwnam) [all …]
|
/external/toybox/toys/pending/ |
D | useradd.c | 45 struct passwd pwd; local 64 pwd.pw_name = s; 65 pwd.pw_passwd = "x"; 66 pwd.pw_gecos = TT.gecos ? TT.gecos : "Linux User,"; 67 pwd.pw_dir = TT.dir ? TT.dir : xmprintf("/home/%s", *toys.optargs); 79 pwd.pw_shell = TT.shell; 90 pwd.pw_uid = TT.uid; 97 if (getgrnam(pwd.pw_name)) error_exit("group '%s' in use", pwd.pw_name); 101 pwd.pw_gid = TT.gid; 105 char *s = xmprintf("-g%ld", (long)pwd.pw_gid); [all …]
|
D | crontab.c | 263 static void do_edit(struct passwd *pwd) in do_edit() argument 275 snprintf(toybuf, sizeof(toybuf), "%s%s", TT.cdir, pwd->pw_name); in do_edit() 283 } else printf("No crontab for '%s'- using an empty one\n", pwd->pw_name); in do_edit() 290 char *prog = pwd->pw_shell; in do_edit() 292 xsetuser(pwd); in do_edit() 293 if (pwd->pw_uid) { in do_edit() 294 if (setenv("USER", pwd->pw_name, 1)) _exit(1); in do_edit() 295 if (setenv("LOGNAME", pwd->pw_name, 1)) _exit(1); in do_edit() 297 if (setenv("HOME", pwd->pw_dir, 1)) _exit(1); in do_edit() 329 update_crontab(tname, pwd->pw_name); in do_edit() [all …]
|
D | sulogin.c | 39 static int validate_password(char *pwd) in validate_password() argument 63 pass = crypt(toybuf, pwd); in validate_password() 65 if( pass && !strcmp(pass, pwd)) ret = 0; in validate_password() 79 struct passwd *pwd = NULL; in sulogin_main() local 100 if (!(pwd = getpwuid(0))) error_exit("invalid user"); in sulogin_main() 101 pass = pwd->pw_passwd; in sulogin_main() 104 if ((spwd = getspnam (pwd->pw_name))) pass = spwd->sp_pwdp; in sulogin_main() 116 || (shell = pwd->pw_shell)) in sulogin_main()
|
/external/python/cpython2/Lib/test/ |
D | test_pwd.py | 5 pwd = test_support.import_module('pwd') variable 10 entries = pwd.getpwall() 31 # self.assertEqual(pwd.getpwuid(e.pw_uid), e) 36 entries = pwd.getpwall() 52 self.assertIn(pwd.getpwnam(e.pw_name), entriesbyname[e.pw_name]) 53 self.assertIn(pwd.getpwuid(e.pw_uid), entriesbyuid[e.pw_uid]) 56 self.assertRaises(TypeError, pwd.getpwuid) 57 self.assertRaises(TypeError, pwd.getpwuid, 3.14) 58 self.assertRaises(TypeError, pwd.getpwnam) 59 self.assertRaises(TypeError, pwd.getpwnam, 42) [all …]
|
/external/elfutils/tests/ |
D | run-prelink-addr-test.sh | 39 00111000-00112000 r-xp 00000000 fd:01 1 `pwd`/testfile52-32.so 40 00112000-00113000 rw-p 00000000 fd:01 1 `pwd`/testfile52-32.so 41 41000000-41001000 r-xp 00000000 fd:01 2 `pwd`/testfile52-32.prelink.so 42 41001000-41002000 rw-p 00000000 fd:01 2 `pwd`/testfile52-32.prelink.so 43 42000000-42001000 r-xp 00000000 fd:01 3 `pwd`/testfile52-32.noshdrs.so 44 42001000-42002000 rw-p 00000000 fd:01 3 `pwd`/testfile52-32.noshdrs.so 68 1000000000-1000001000 r-xp 00000000 fd:11 1 `pwd`/testfile52-64.so 69 1000001000-1000200000 ---p 00001000 fd:11 1 `pwd`/testfile52-64.so 70 1000200000-1000201000 rw-p 00000000 fd:11 1 `pwd`/testfile52-64.so 71 3000000000-3000001000 r-xp 00000000 fd:11 2 `pwd`/testfile52-64.prelink.so [all …]
|
/external/toybox/tests/ |
D | pwd.test | 9 testing "pwd" "[ $(stat -c %i "$(pwd)") = $(stat -c %i .) ] && echo yes" \ 11 testing "-P" "[ $(stat -c %i "$(pwd -P)") = $(stat -c %i .) ] && echo yes" \ 17 testing "pwd" "[ $(stat -c %i "$(pwd)") = $(stat -c %i "$PWD") ] && echo yes" \ 19 testing "-P" "[ $(stat -c %i "$(pwd -P)") = $(stat -c %i "$PWD") ] || echo yes" \ 24 export PWD=walrus 25 testing "(bad PWD)" "[ "$(pwd)" = "$(cd . ; pwd)" ] && echo yes" \
|
/external/wpa_supplicant_8/src/eap_server/ |
D | eap_server_pwd.c | 2 * hostapd / EAP-pwd (RFC 5931) server 62 return "PWD-ID-Req"; in eap_pwd_state_txt() 64 return "PWD-Commit-Req"; in eap_pwd_state_txt() 66 return "PWD-Confirm-Req"; in eap_pwd_state_txt() 72 return "PWD-Unk"; in eap_pwd_state_txt() 79 wpa_printf(MSG_DEBUG, "EAP-pwd: %s -> %s", in eap_pwd_state() 91 wpa_printf(MSG_INFO, "EAP-PWD (server): Password is not " in eap_pwd_init() 101 wpa_printf(MSG_DEBUG, "EAP-pwd: Selected group number %d", in eap_pwd_init() 111 wpa_printf(MSG_INFO, "EAP-PWD: Memory allocation password " in eap_pwd_init() 126 "EAP-pwd: Memory allocation of salt failed"); in eap_pwd_init() [all …]
|
/external/toybox/toys/other/ |
D | login.c | 43 struct passwd *pwd = 0; in login_main() local 74 if ((pwd = getpwnam(username))) { in login_main() 76 if (TT.f || !*pwd->pw_passwd) break; in login_main() 79 if (*(pass = pwd->pw_passwd) == 'x') { in login_main() 95 syslog(LOG_WARNING, "invalid password for '%s' on %s %s%s", pwd->pw_name, in login_main() 102 pwd = 0; in login_main() 106 if (!pwd) error_exit("max retries (3)"); in login_main() 110 if (pwd->pw_uid && !access("/etc/nologin", R_OK)) { in login_main() 119 if (fchown(tty, pwd->pw_uid, pwd->pw_gid) || fchmod(tty, 0600)) in login_main() 121 xsetuser(pwd); in login_main() [all …]
|
/external/ImageMagick/config/ |
D | lndir.sh | 29 # Do "pwd" command *after* "cd $DIRTO". 66 pwd=`pwd` 68 if [ `(cd $DIRFROM; pwd)` = $pwd ] 70 echo "$pwd: FROM and TO are identical!" 83 pwd=`pwd` 88 if [ `(cd $DIRFROM/$file; pwd)` = $pwd ] 90 echo "$pwd: FROM and TO are identical!"
|
/external/ltp/testcases/kernel/device-drivers/usb/tusb/ |
D | Makefile | 13 PWD := $(shell pwd) macro 16 $(MAKE) -C $(KDIR) SUBDIRS=$(PWD) modules 17 # $(MAKE) -C $(KERNELDIR) SUBDIRS=$(PWD) modules 20 $(MAKE) -C $(KDIR) SUBDIRS=$(PWD) clean 24 $(MAKE) -C $(KDIR) SUBDIRS=$(PWD) help 27 $(MAKE) -C $(KDIR) SUBDIRS=$(PWD) modules_install
|
/external/python/cpython3/Modules/ |
D | pwdmodule.c | 7 #include <pwd.h> 11 module pwd 27 "pwd.struct_passwd: Results from getpw*() routines.\n\n\ 33 "pwd.struct_passwd", 44 items from the password database (see `<pwd.h>'), in order:\n\ 105 pwd.getpwuid 112 See `help(pwd)` for more on password database entries. 141 pwd.getpwnam 148 See `help(pwd)` for more on password database entries. 177 pwd.getpwall [all …]
|
/external/ltp/testcases/kernel/device-drivers/v4l/kernel_space/ |
D | Makefile | 9 PWD := $(shell pwd) macro 12 $(MAKE) -C $(KDIR) SUBDIRS=$(PWD) modules 15 $(MAKE) -C $(KDIR) SUBDIRS=$(PWD) clean 19 $(MAKE) -C $(KDIR) SUBDIRS=$(PWD) help 22 $(MAKE) -C $(KDIR) SUBDIRS=$(PWD) modules_install
|
/external/ltp/testcases/kernel/device-drivers/misc_modules/per_cpu_allocator_module/ |
D | Makefile | 9 PWD := $(shell pwd) macro 12 $(MAKE) -C $(KDIR) SUBDIRS=$(PWD) modules 15 $(MAKE) -C $(KDIR) SUBDIRS=$(PWD) clean 19 $(MAKE) -C $(KDIR) SUBDIRS=$(PWD) help 22 $(MAKE) -C $(KDIR) SUBDIRS=$(PWD) modules_install
|
/external/ltp/testscripts/ |
D | tpm_tools.sh | 31 export LTPROOT=${PWD} 36 export LTPROOT=${PWD} 160 export OWN_PWD="OWN PWD" 161 export NEW_OWN_PWD="NEW OWN PWD" 162 export SRK_PWD="SRK PWD" 163 export NEW_SRK_PWD="NEW SRK PWD" 164 export P11_SO_PWD="P11 SO PWD" 165 export NEW_P11_SO_PWD="NEW P11 SO PWD" 166 export P11_USER_PWD="P11 USER PWD" 167 export NEW_P11_USER_PWD="NEW P11 USER PWD"
|
/external/ltp/testcases/commands/which/ |
D | which01.sh | 103 1) which_test "" "pname" "$PWD/pname|./pname";; 104 2) which_test "-all" "pname" "$PWD/bin/pname|./bin/pname^$PWD/pname|./pname";; 105 3) which_test "-a" "pname" "$PWD/bin/pname|./bin/pname^$PWD/pname|./pname";; 106 4) which_test "--read-alias" "pname" "pname='pname -i'^$PWD/pname";; 107 5) which_test "-i" "pname" "pname='pname -i'^$PWD/pname";; 109 which_test "--skip-alias" "pname" "$PWD/pname";
|
/external/wpa_supplicant_8/src/eap_common/ |
D | eap_pwd_common.c | 2 * EAP server/peer: EAP-pwd shared routines 102 wpa_printf(MSG_INFO, "EAP-pwd: unsuitable group %u", num); in get_eap_pwd_group() 110 wpa_printf(MSG_INFO, "EAP-pwd: unable to create EC group"); in get_eap_pwd_group() 116 wpa_printf(MSG_INFO, "EAP-pwd: provisioned group %d", num); in get_eap_pwd_group() 175 wpa_printf(MSG_INFO, "EAP-pwd: unable to create bignums"); in compute_password_element() 180 wpa_printf(MSG_INFO, "EAP-pwd: unable to malloc space for prf " in compute_password_element() 221 * pwd-seed = H(token | peer-id | server-id | password | in compute_password_element() 237 (u8 *) "EAP-pwd Hunting And Pecking", in compute_password_element() 238 os_strlen("EAP-pwd Hunting And Pecking"), in compute_password_element() 251 "EAP-pwd: unable to create x_candidate"); in compute_password_element() [all …]
|
/external/ltp/scripts/tests/ |
D | test_abspath.sh | 30 :$PWD \ 31 .:$PWD \ 32 foo/bar:$PWD/foo/bar \ 49 ./.foo:$PWD/.foo \ 51 ./.foo/.bar:$PWD/.foo/.bar \ 55 testcases/kernel/controllers/libcontrollers/../../../..:$PWD 87 expected_string="$PWD" 104 expected_string="$PWD $PWD"
|
/external/iptables/extensions/ |
D | libxt_owner.c | 8 #include <pwd.h> 140 struct passwd *pwd; in owner_mt_parse_v0() local 147 if ((pwd = getpwnam(cb->arg)) != NULL) in owner_mt_parse_v0() 148 id = pwd->pw_uid; in owner_mt_parse_v0() 187 struct passwd *pwd; in owner_mt6_parse_v0() local 194 if ((pwd = getpwnam(cb->arg)) != NULL) in owner_mt6_parse_v0() 195 id = pwd->pw_uid; in owner_mt6_parse_v0() 245 struct passwd *pwd; in owner_mt_parse() local 252 if ((pwd = getpwnam(cb->arg)) != NULL) in owner_mt_parse() 253 from = to = pwd->pw_uid; in owner_mt_parse() [all …]
|
/external/ltp/scripts/lib/ |
D | file_functions.sh | 30 # 1. Empty string - print out $PWD. 32 # i. Prefix all relative paths with $PWD. 42 echo "$@" | awk -v PWD=$(pwd) '{ 45 print PWD 48 $0 = PWD "/" $0 60 print PWD
|
/external/swiftshader/third_party/LLVM/utils/ |
D | webNLT.pl | 10 unless($q->param('pwd')) 13 print $q->password_field(-name=>"pwd", -size=>20, -maxlength=>20); 23 $passwd=$q->param('pwd'); 53 print $q->hidden("pwd", $q->param('pwd')); 69 $str = "pwd=" . $q->param('pwd');
|
/external/robolectric-shadows/ |
D | wrapper_test.sh | 84 "$WRAPPER" module "$PWD/output" "$PWD/retval" 'wrap' "$@" \ 90 "$WRAPPER" module "$PWD/output" "$PWD/retval" 'eval' "$@" \ 102 whenWrap "$PWD/script.sh" 121 whenWrap "$PWD/script.sh" 141 whenWrap "$PWD/script.sh"
|