Home
last modified time | relevance | path

Searched full:pwd (Results 1 – 25 of 2399) sorted by relevance

12345678910>>...96

/external/autotest/client/tests/cgroup/
Dcgroup_common.py23 @param _client: Test script pwd + name
54 pwd = mkdtemp(prefix='cgroup-', dir=root) + '/'
56 pwd = mkdtemp(prefix='cgroup-', dir=self.root) + '/'
60 return pwd
63 def rm_cgroup(self, pwd, supress=False): argument
67 @param pwd: cgroup directory.
72 os.rmdir(pwd)
95 def is_cgroup(self, pid, pwd): argument
97 Checks if the 'pid' process is in 'pwd' cgroup
99 @param pwd: cgroup directory
[all …]
/external/toybox/toys/posix/
Dpwd.c1 /* pwd.c - Print working directory.
5 * See http://opengroup.org/onlinepubs/9699919799/utilities/pwd.html
7 USE_PWD(NEWTOY(pwd, ">0LP[-LP]", TOYFLAG_BIN))
9 config PWD
10 bool "pwd"
13 usage: pwd [-L|-P]
17 -L Use shell's path from $PWD (when applicable)
26 char *s, *pwd = getcwd(0, 0), *PWD; in pwd_main() local
28 // Only use $PWD if it's an absolute path alias for cwd with no "." or ".." in pwd_main()
29 if (!(toys.optflags & FLAG_P) && (s = PWD = getenv("PWD"))) { in pwd_main()
[all …]
/external/wpa_supplicant_8/src/eap_peer/
Deap_pwd.c2 * EAP peer method: EAP-pwd (RFC 5931)
62 return "PWD-ID-Req"; in eap_pwd_state_txt()
64 return "PWD-Commit-Req"; in eap_pwd_state_txt()
66 return "PWD-Confirm-Req"; in eap_pwd_state_txt()
74 return "PWD-UNK"; in eap_pwd_state_txt()
82 wpa_printf(MSG_DEBUG, "EAP-PWD: %s -> %s", in eap_pwd_state()
98 wpa_printf(MSG_INFO, "EAP-PWD: No password configured!"); in eap_pwd_init()
104 wpa_printf(MSG_INFO, "EAP-PWD: No identity configured!"); in eap_pwd_init()
109 wpa_printf(MSG_INFO, "EAP-PWD: memory allocation data fail"); in eap_pwd_init()
114 wpa_printf(MSG_INFO, "EAP-PWD: memory allocation id fail"); in eap_pwd_init()
[all …]
/external/python/cpython3/Lib/test/
Dtest_pwd.py5 pwd = support.import_module('pwd') variable
7 @unittest.skipUnless(hasattr(pwd, 'getpwall'), 'Does not have getpwall()')
11 entries = pwd.getpwall()
32 # self.assertEqual(pwd.getpwuid(e.pw_uid), e)
37 entries = pwd.getpwall()
53 self.assertIn(pwd.getpwnam(e.pw_name), entriesbyname[e.pw_name])
54 self.assertIn(pwd.getpwuid(e.pw_uid), entriesbyuid[e.pw_uid])
57 self.assertRaises(TypeError, pwd.getpwuid)
58 self.assertRaises(TypeError, pwd.getpwuid, 3.14)
59 self.assertRaises(TypeError, pwd.getpwnam)
[all …]
/external/toybox/toys/pending/
Duseradd.c45 struct passwd pwd; local
64 pwd.pw_name = s;
65 pwd.pw_passwd = "x";
66 pwd.pw_gecos = TT.gecos ? TT.gecos : "Linux User,";
67 pwd.pw_dir = TT.dir ? TT.dir : xmprintf("/home/%s", *toys.optargs);
79 pwd.pw_shell = TT.shell;
90 pwd.pw_uid = TT.uid;
97 if (getgrnam(pwd.pw_name)) error_exit("group '%s' in use", pwd.pw_name);
101 pwd.pw_gid = TT.gid;
105 char *s = xmprintf("-g%ld", (long)pwd.pw_gid);
[all …]
Dcrontab.c263 static void do_edit(struct passwd *pwd) in do_edit() argument
275 snprintf(toybuf, sizeof(toybuf), "%s%s", TT.cdir, pwd->pw_name); in do_edit()
283 } else printf("No crontab for '%s'- using an empty one\n", pwd->pw_name); in do_edit()
290 char *prog = pwd->pw_shell; in do_edit()
292 xsetuser(pwd); in do_edit()
293 if (pwd->pw_uid) { in do_edit()
294 if (setenv("USER", pwd->pw_name, 1)) _exit(1); in do_edit()
295 if (setenv("LOGNAME", pwd->pw_name, 1)) _exit(1); in do_edit()
297 if (setenv("HOME", pwd->pw_dir, 1)) _exit(1); in do_edit()
329 update_crontab(tname, pwd->pw_name); in do_edit()
[all …]
Dsulogin.c39 static int validate_password(char *pwd) in validate_password() argument
63 pass = crypt(toybuf, pwd); in validate_password()
65 if( pass && !strcmp(pass, pwd)) ret = 0; in validate_password()
79 struct passwd *pwd = NULL; in sulogin_main() local
100 if (!(pwd = getpwuid(0))) error_exit("invalid user"); in sulogin_main()
101 pass = pwd->pw_passwd; in sulogin_main()
104 if ((spwd = getspnam (pwd->pw_name))) pass = spwd->sp_pwdp; in sulogin_main()
116 || (shell = pwd->pw_shell)) in sulogin_main()
/external/python/cpython2/Lib/test/
Dtest_pwd.py5 pwd = test_support.import_module('pwd') variable
10 entries = pwd.getpwall()
31 # self.assertEqual(pwd.getpwuid(e.pw_uid), e)
36 entries = pwd.getpwall()
52 self.assertIn(pwd.getpwnam(e.pw_name), entriesbyname[e.pw_name])
53 self.assertIn(pwd.getpwuid(e.pw_uid), entriesbyuid[e.pw_uid])
56 self.assertRaises(TypeError, pwd.getpwuid)
57 self.assertRaises(TypeError, pwd.getpwuid, 3.14)
58 self.assertRaises(TypeError, pwd.getpwnam)
59 self.assertRaises(TypeError, pwd.getpwnam, 42)
[all …]
/external/elfutils/tests/
Drun-prelink-addr-test.sh39 00111000-00112000 r-xp 00000000 fd:01 1 `pwd`/testfile52-32.so
40 00112000-00113000 rw-p 00000000 fd:01 1 `pwd`/testfile52-32.so
41 41000000-41001000 r-xp 00000000 fd:01 2 `pwd`/testfile52-32.prelink.so
42 41001000-41002000 rw-p 00000000 fd:01 2 `pwd`/testfile52-32.prelink.so
43 42000000-42001000 r-xp 00000000 fd:01 3 `pwd`/testfile52-32.noshdrs.so
44 42001000-42002000 rw-p 00000000 fd:01 3 `pwd`/testfile52-32.noshdrs.so
68 1000000000-1000001000 r-xp 00000000 fd:11 1 `pwd`/testfile52-64.so
69 1000001000-1000200000 ---p 00001000 fd:11 1 `pwd`/testfile52-64.so
70 1000200000-1000201000 rw-p 00000000 fd:11 1 `pwd`/testfile52-64.so
71 3000000000-3000001000 r-xp 00000000 fd:11 2 `pwd`/testfile52-64.prelink.so
[all …]
/external/toybox/tests/
Dpwd.test9 testing "pwd" "[ $(stat -c %i "$(pwd)") = $(stat -c %i .) ] && echo yes" \
11 testing "-P" "[ $(stat -c %i "$(pwd -P)") = $(stat -c %i .) ] && echo yes" \
17 testing "pwd" "[ $(stat -c %i "$(pwd)") = $(stat -c %i "$PWD") ] && echo yes" \
19 testing "-P" "[ $(stat -c %i "$(pwd -P)") = $(stat -c %i "$PWD") ] || echo yes" \
24 export PWD=walrus
25 testing "(bad PWD)" "[ "$(pwd)" = "$(cd . ; pwd)" ] && echo yes" \
/external/wpa_supplicant_8/src/eap_server/
Deap_server_pwd.c2 * hostapd / EAP-pwd (RFC 5931) server
62 return "PWD-ID-Req"; in eap_pwd_state_txt()
64 return "PWD-Commit-Req"; in eap_pwd_state_txt()
66 return "PWD-Confirm-Req"; in eap_pwd_state_txt()
72 return "PWD-Unk"; in eap_pwd_state_txt()
79 wpa_printf(MSG_DEBUG, "EAP-pwd: %s -> %s", in eap_pwd_state()
91 wpa_printf(MSG_INFO, "EAP-PWD (server): Password is not " in eap_pwd_init()
101 wpa_printf(MSG_DEBUG, "EAP-pwd: Selected group number %d", in eap_pwd_init()
111 wpa_printf(MSG_INFO, "EAP-PWD: Memory allocation password " in eap_pwd_init()
126 "EAP-pwd: Memory allocation of salt failed"); in eap_pwd_init()
[all …]
/external/toybox/toys/other/
Dlogin.c43 struct passwd *pwd = 0; in login_main() local
74 if ((pwd = getpwnam(username))) { in login_main()
76 if (TT.f || !*pwd->pw_passwd) break; in login_main()
79 if (*(pass = pwd->pw_passwd) == 'x') { in login_main()
95 syslog(LOG_WARNING, "invalid password for '%s' on %s %s%s", pwd->pw_name, in login_main()
102 pwd = 0; in login_main()
106 if (!pwd) error_exit("max retries (3)"); in login_main()
110 if (pwd->pw_uid && !access("/etc/nologin", R_OK)) { in login_main()
119 if (fchown(tty, pwd->pw_uid, pwd->pw_gid) || fchmod(tty, 0600)) in login_main()
121 xsetuser(pwd); in login_main()
[all …]
/external/ImageMagick/config/
Dlndir.sh29 # Do "pwd" command *after* "cd $DIRTO".
66 pwd=`pwd`
68 if [ `(cd $DIRFROM; pwd)` = $pwd ]
70 echo "$pwd: FROM and TO are identical!"
83 pwd=`pwd`
88 if [ `(cd $DIRFROM/$file; pwd)` = $pwd ]
90 echo "$pwd: FROM and TO are identical!"
/external/ltp/testcases/kernel/device-drivers/usb/tusb/
DMakefile13 PWD := $(shell pwd) macro
16 $(MAKE) -C $(KDIR) SUBDIRS=$(PWD) modules
17 # $(MAKE) -C $(KERNELDIR) SUBDIRS=$(PWD) modules
20 $(MAKE) -C $(KDIR) SUBDIRS=$(PWD) clean
24 $(MAKE) -C $(KDIR) SUBDIRS=$(PWD) help
27 $(MAKE) -C $(KDIR) SUBDIRS=$(PWD) modules_install
/external/python/cpython3/Modules/
Dpwdmodule.c7 #include <pwd.h>
11 module pwd
27 "pwd.struct_passwd: Results from getpw*() routines.\n\n\
33 "pwd.struct_passwd",
44 items from the password database (see `<pwd.h>'), in order:\n\
105 pwd.getpwuid
112 See `help(pwd)` for more on password database entries.
141 pwd.getpwnam
148 See `help(pwd)` for more on password database entries.
177 pwd.getpwall
[all …]
/external/ltp/testcases/kernel/device-drivers/v4l/kernel_space/
DMakefile9 PWD := $(shell pwd) macro
12 $(MAKE) -C $(KDIR) SUBDIRS=$(PWD) modules
15 $(MAKE) -C $(KDIR) SUBDIRS=$(PWD) clean
19 $(MAKE) -C $(KDIR) SUBDIRS=$(PWD) help
22 $(MAKE) -C $(KDIR) SUBDIRS=$(PWD) modules_install
/external/ltp/testcases/kernel/device-drivers/misc_modules/per_cpu_allocator_module/
DMakefile9 PWD := $(shell pwd) macro
12 $(MAKE) -C $(KDIR) SUBDIRS=$(PWD) modules
15 $(MAKE) -C $(KDIR) SUBDIRS=$(PWD) clean
19 $(MAKE) -C $(KDIR) SUBDIRS=$(PWD) help
22 $(MAKE) -C $(KDIR) SUBDIRS=$(PWD) modules_install
/external/ltp/testscripts/
Dtpm_tools.sh31 export LTPROOT=${PWD}
36 export LTPROOT=${PWD}
160 export OWN_PWD="OWN PWD"
161 export NEW_OWN_PWD="NEW OWN PWD"
162 export SRK_PWD="SRK PWD"
163 export NEW_SRK_PWD="NEW SRK PWD"
164 export P11_SO_PWD="P11 SO PWD"
165 export NEW_P11_SO_PWD="NEW P11 SO PWD"
166 export P11_USER_PWD="P11 USER PWD"
167 export NEW_P11_USER_PWD="NEW P11 USER PWD"
/external/ltp/testcases/commands/which/
Dwhich01.sh103 1) which_test "" "pname" "$PWD/pname|./pname";;
104 2) which_test "-all" "pname" "$PWD/bin/pname|./bin/pname^$PWD/pname|./pname";;
105 3) which_test "-a" "pname" "$PWD/bin/pname|./bin/pname^$PWD/pname|./pname";;
106 4) which_test "--read-alias" "pname" "pname='pname -i'^$PWD/pname";;
107 5) which_test "-i" "pname" "pname='pname -i'^$PWD/pname";;
109 which_test "--skip-alias" "pname" "$PWD/pname";
/external/wpa_supplicant_8/src/eap_common/
Deap_pwd_common.c2 * EAP server/peer: EAP-pwd shared routines
102 wpa_printf(MSG_INFO, "EAP-pwd: unsuitable group %u", num); in get_eap_pwd_group()
110 wpa_printf(MSG_INFO, "EAP-pwd: unable to create EC group"); in get_eap_pwd_group()
116 wpa_printf(MSG_INFO, "EAP-pwd: provisioned group %d", num); in get_eap_pwd_group()
175 wpa_printf(MSG_INFO, "EAP-pwd: unable to create bignums"); in compute_password_element()
180 wpa_printf(MSG_INFO, "EAP-pwd: unable to malloc space for prf " in compute_password_element()
221 * pwd-seed = H(token | peer-id | server-id | password | in compute_password_element()
237 (u8 *) "EAP-pwd Hunting And Pecking", in compute_password_element()
238 os_strlen("EAP-pwd Hunting And Pecking"), in compute_password_element()
251 "EAP-pwd: unable to create x_candidate"); in compute_password_element()
[all …]
/external/ltp/scripts/tests/
Dtest_abspath.sh30 :$PWD \
31 .:$PWD \
32 foo/bar:$PWD/foo/bar \
49 ./.foo:$PWD/.foo \
51 ./.foo/.bar:$PWD/.foo/.bar \
55 testcases/kernel/controllers/libcontrollers/../../../..:$PWD
87 expected_string="$PWD"
104 expected_string="$PWD $PWD"
/external/iptables/extensions/
Dlibxt_owner.c8 #include <pwd.h>
140 struct passwd *pwd; in owner_mt_parse_v0() local
147 if ((pwd = getpwnam(cb->arg)) != NULL) in owner_mt_parse_v0()
148 id = pwd->pw_uid; in owner_mt_parse_v0()
187 struct passwd *pwd; in owner_mt6_parse_v0() local
194 if ((pwd = getpwnam(cb->arg)) != NULL) in owner_mt6_parse_v0()
195 id = pwd->pw_uid; in owner_mt6_parse_v0()
245 struct passwd *pwd; in owner_mt_parse() local
252 if ((pwd = getpwnam(cb->arg)) != NULL) in owner_mt_parse()
253 from = to = pwd->pw_uid; in owner_mt_parse()
[all …]
/external/ltp/scripts/lib/
Dfile_functions.sh30 # 1. Empty string - print out $PWD.
32 # i. Prefix all relative paths with $PWD.
42 echo "$@" | awk -v PWD=$(pwd) '{
45 print PWD
48 $0 = PWD "/" $0
60 print PWD
/external/swiftshader/third_party/LLVM/utils/
DwebNLT.pl10 unless($q->param('pwd'))
13 print $q->password_field(-name=>"pwd", -size=>20, -maxlength=>20);
23 $passwd=$q->param('pwd');
53 print $q->hidden("pwd", $q->param('pwd'));
69 $str = "pwd=" . $q->param('pwd');
/external/robolectric-shadows/
Dwrapper_test.sh84 "$WRAPPER" module "$PWD/output" "$PWD/retval" 'wrap' "$@" \
90 "$WRAPPER" module "$PWD/output" "$PWD/retval" 'eval' "$@" \
102 whenWrap "$PWD/script.sh"
121 whenWrap "$PWD/script.sh"
141 whenWrap "$PWD/script.sh"

12345678910>>...96