/freebsd-10-stable/lib/libcompat/4.4/ |
H A D | cuserid.c | 52 (void)strncpy(s, pwd->pw_name, L_cuserid); 55 return (pwd->pw_name);
|
/freebsd-10-stable/crypto/openssh/openbsd-compat/ |
H A D | port-irix.c | 59 jid = jlimit_startjob(pw->pw_name, pw->pw_uid, "interactive"); 72 if ((projid = getdfltprojuser(pw->pw_name)) == -1) { 78 (int)projid, pw->pw_name, strerror(errno));
|
H A D | port-uw.c | 75 if (!nischeck(pw->pw_name)) { 113 if (strcmp (ent->pw_name, namep) == 0) { 138 if (!ia_openinfo(pw->pw_name,&uinfo)) {
|
H A D | port-aix.c | 80 len = sizeof("LOGNAME= NAME= ") + (2 * strlen(pw->pw_name)); 83 i = snprintf(cp, len, "LOGNAME=%s%cNAME=%s%c", pw->pw_name, '\0', 84 pw->pw_name, '\0'); 176 char *authmsg = NULL, *msg = NULL, *name = ctxt->pw->pw_name; 251 result = loginrestrictions(pw->pw_name, S_RLOGIN, NULL, &msg); 269 logit("Login restricted for %s: %.100s", pw->pw_name, msg); 381 aix_krb5_get_principal_name(char *pw_name) argument 386 if (getuserattr(pw_name, S_AUTHDOMAIN, &authdomain, SEC_CHAR) != 0) 388 if (getuserattr(pw_name, S_AUTHNAME, &authname, SEC_CHAR) != 0) 392 xasprintf(&principal, "%s@%s", authname ? authname : pw_name, authdomai [all...] |
/freebsd-10-stable/lib/libc/gen/ |
H A D | pw_scan.c | 82 if (!(pw->pw_name = strsep(&bp, ":"))) /* login */ 84 root = !strcmp(pw->pw_name, "root"); 85 if (pw->pw_name[0] && (pw->pw_name[0] != '+' || pw->pw_name[1] == '\0')) 98 if (pw->pw_name[0] != '+' && pw->pw_name[0] != '-') { 100 warnx("no uid for user %s", pw->pw_name); 133 if (pw->pw_name[0] != '+' && pw->pw_name[ [all...] |
/freebsd-10-stable/crypto/openssh/ |
H A D | platform.c | 184 if (setpcred(pw->pw_name, creds) == -1) 189 ssh_selinux_setup_exec_context(pw->pw_name); 194 platform_krb5_get_principal_name(const char *pw_name) argument 197 return aix_krb5_get_principal_name(pw_name);
|
H A D | auth-sia.c | 90 if (sia_ses_init(&ent, saved_argc, saved_argv, host, pw->pw_name, 102 pw->pw_name, host); 106 pw->pw_name, host);
|
H A D | auth-rhosts.c | 251 client_user, pw->pw_name)) { 257 client_user, pw->pw_name)) { 270 "no home directory %.200s", pw->pw_name, pw->pw_dir); 272 "no home directory %.200s", pw->pw_name, pw->pw_dir); 279 "bad ownership or modes for home directory.", pw->pw_name); 281 "bad ownership or modes for home directory.", pw->pw_name); 306 pw->pw_name, buf); 321 client_user, pw->pw_name)) { 328 client_user, pw->pw_name);
|
H A D | auth-skey.c | 81 skey_haskey(authctxt->pw->pw_name) == 0 && 82 skey_passcheck(authctxt->pw->pw_name, responses[0]) != -1)
|
H A D | auth.c | 112 if (!pw || !pw->pw_name) 117 spw = getspnam(pw->pw_name); 157 pw->pw_name); 173 "does not exist", pw->pw_name, shell); 180 "is not executable", pw->pw_name, shell); 196 if (match_user(pw->pw_name, hostname, ipaddr, 200 pw->pw_name, hostname); 207 if (match_user(pw->pw_name, hostname, ipaddr, 213 "not listed in AllowUsers", pw->pw_name, hostname); 219 if (ga_init(pw->pw_name, p [all...] |
/freebsd-10-stable/usr.bin/mail/ |
H A D | getname.c | 54 return (pw->pw_name);
|
/freebsd-10-stable/release/picobsd/tinyware/passwd/ |
H A D | pw_copy.c | 72 return (strcmp(pw->pw_name, buf_pw.pw_name) == 0 129 if (strcmp(buf, pw->pw_name)) { 139 _PATH_MASTERPASSWD, pw->pw_name); 143 pw->pw_name, pw->pw_passwd, 159 pw->pw_name, _PATH_MASTERPASSWD); 164 pw->pw_name, pw->pw_passwd, 214 if (!(pw->pw_name = strsep(&bp, ":"))) /* login */ 216 root = !strcmp(pw->pw_name, "root"); 217 if(pw->pw_name[ [all...] |
/freebsd-10-stable/usr.sbin/rpc.yppasswdd/ |
H A D | yppasswdd_server.c | 75 pwd->pw_name = xpwd->pw_name; 110 EXPAND(yp_password.pw_name); 167 if (npw->pw_name[0] == '+' || npw->pw_name[0] == '-') { 193 if (npw->pw_name[0] == '+' || npw->pw_name[0] == '-') { 200 npw->pw_name, npw->pw_uid); 201 yp_error("database says user %s has UID %d", opw->pw_name, 208 npw->pw_name, np [all...] |
H A D | yppasswd_private.x | 43 string pw_name<>; /* username */
|
/freebsd-10-stable/contrib/netbsd-tests/usr.bin/id/ |
H A D | pwgr.c | 156 p->pw_name = __UNCONST("root"); 160 p->pw_name = __UNCONST("test"); 176 p->pw_name = __UNCONST("root"); 180 p->pw_name = __UNCONST("test");
|
/freebsd-10-stable/crypto/heimdal/lib/roken/ |
H A D | k_getpwuid.c | 52 spwd = getspnam (p->pw_name);
|
H A D | get_default_username.c | 73 return pwd->pw_name;
|
/freebsd-10-stable/contrib/opie/ |
H A D | opiepasswd.c | 177 if (strcmp(argv[optind], pp->pw_name)) { 189 opielock(pp->pw_name); 190 rval = opielookup(&opie, pp->pw_name); 194 printf("Updating %s:\n", pp->pw_name); 197 printf("Adding %s:\n", pp->pw_name); 246 if (opiechallenge(&opie, pp->pw_name, tmp)) { 281 if (opiechallenge(&opie, pp->pw_name, tmp)) { 303 finish(pp->pw_name); 324 if (!(rval = opiepasswd(&opie, force, pp->pw_name, n, seed, tmp))) 325 finish(pp->pw_name); [all...] |
H A D | opiesu.c | 156 if (!(thisuser.pw_name = malloc(strlen(pwd->pw_name) + 1))) 158 strcpy(thisuser.pw_name, pwd->pw_name); 320 opiestrncpy(buf, pwd->pw_name, sizeof(buf)); 394 printf("%s's system password: ", thisuser.pw_name); 403 printf("%s's response: ", thisuser.pw_name); 412 printf("%s's password: ", thisuser.pw_name); 420 printf(" (echo on)\n%s's password: ", thisuser.pw_name); 480 lsetenv("USER", thisuser.pw_name, userbu [all...] |
/freebsd-10-stable/crypto/heimdal/appl/su/ |
H A D | su.c | 112 free (p->pw_name); 127 info->pw_name = strdup(pwd->pw_name); 133 if(info->pw_name == NULL || info->pw_passwd == NULL || 175 login_name = login_info->pw_name; 176 if (strcmp (su_info->pw_name, "root") == 0) 183 su_info->pw_name, 191 if (su_info->pw_uid == 0 && !krb5_kuserok(context, p, su_info->pw_name)) 297 snprintf(prompt, sizeof(prompt), "%s's password: ", su->pw_name); 305 login->pw_name, s [all...] |
/freebsd-10-stable/crypto/heimdal/appl/login/ |
H A D | login.c | 161 ret = krb5_parse_name(context, pwd->pw_name, &princ); 330 sp = getspnam(pwd->pw_name); 333 update_utmp(pwd->pw_name, remote_host ? remote_host : "", 355 if(setlogin(pwd->pw_name)){ 356 warn("setlogin(%s)", pwd->pw_name); 370 if (setpcred (pwd->pw_name, NULL) == -1) 371 warn("setpcred(%s)", pwd->pw_name); 374 if(initgroups(pwd->pw_name, pwd->pw_gid)){ 375 warn("initgroups(%s, %u)", pwd->pw_name, (unsigned)pwd->pw_gid); 410 udb = getudbnam(pwd->pw_name); [all...] |
/freebsd-10-stable/usr.bin/passwd/ |
H A D | passwd.c | 116 pwd->pw_name); 120 pwd->pw_name); 140 pam_err = pam_start("passwd", pwd->pw_name, &pamc, &pamh);
|
/freebsd-10-stable/contrib/top/ |
H A D | username.c | 160 return(enter_user(pwd->pw_uid, pwd->pw_name, 1)); 185 return(enter_user(pwd->pw_uid, pwd->pw_name, 1)); 187 (void) enter_user(pwd->pw_uid, pwd->pw_name, 0);
|
/freebsd-10-stable/include/rpcsvc/ |
H A D | yppasswd.x | 58 string pw_name<>; /* username */
|
/freebsd-10-stable/usr.bin/at/ |
H A D | perm.c | 103 return check_for_user(fp, pentry->pw_name); 116 return !check_for_user(fp, pentry->pw_name);
|