/freebsd-current/lib/libcompat/4.4/ |
H A D | cuserid.c | 49 (void)strncpy(s, pwd->pw_name, L_cuserid); 52 return (pwd->pw_name);
|
/freebsd-current/crypto/openssh/openbsd-compat/ |
H A D | port-irix.c | 61 jid = jlimit_startjob(pw->pw_name, pw->pw_uid, "interactive"); 74 if ((projid = getdfltprojuser(pw->pw_name)) == -1) { 80 (int)projid, pw->pw_name, strerror(errno));
|
H A D | port-uw.c | 78 if (!nischeck(pw->pw_name)) { 116 if (strcmp (ent->pw_name, namep) == 0) { 141 if (!ia_openinfo(pw->pw_name,&uinfo)) {
|
H A D | port-aix.c | 82 len = sizeof("LOGNAME= NAME= ") + (2 * strlen(pw->pw_name)); 85 i = snprintf(cp, len, "LOGNAME=%s%cNAME=%s%c", pw->pw_name, '\0', 86 pw->pw_name, '\0'); 179 char *authmsg = NULL, *msg = NULL, *name = ctxt->pw->pw_name; 257 result = loginrestrictions(pw->pw_name, S_RLOGIN, NULL, &msg); 277 logit("Login restricted for %s: %.100s", pw->pw_name, msg); 392 char *pw_name = (char *)const_pw_name; local 396 if (getuserattr(pw_name, S_AUTHDOMAIN, &authdomain, SEC_CHAR) != 0) 398 if (getuserattr(pw_name, S_AUTHNAME, &authname, SEC_CHAR) != 0) 402 xasprintf(&principal, "%s@%s", authname ? authname : pw_name, [all...] |
H A D | xcrypt.c | 134 struct spwd *spw = getspnam(pw->pw_name); 146 if (issecure() && (spw = getpwanam(pw->pw_name)) != NULL) 149 struct pr_passwd *spw = getprpwnam(pw->pw_name);
|
/freebsd-current/lib/libc/gen/ |
H A D | pw_scan.c | 72 pwd->pw_name = nul; 92 if (!(pw->pw_name = strsep(&bp, ":"))) /* login */ 94 root = !strcmp(pw->pw_name, "root"); 95 if (pw->pw_name[0] && (pw->pw_name[0] != '+' || pw->pw_name[1] == '\0')) 108 if (pw->pw_name[0] != '+' && pw->pw_name[0] != '-') { 110 warnx("no uid for user %s", pw->pw_name); 143 if (pw->pw_name[ [all...] |
/freebsd-current/usr.bin/mail/ |
H A D | getname.c | 48 return (pw->pw_name);
|
/freebsd-current/usr.sbin/rpc.yppasswdd/ |
H A D | yppasswdd_server.c | 74 pwd->pw_name = xpwd->pw_name; 109 EXPAND(yp_password.pw_name); 164 if (npw->pw_name[0] == '+' || npw->pw_name[0] == '-') { 190 if (npw->pw_name[0] == '+' || npw->pw_name[0] == '-') { 197 npw->pw_name, npw->pw_uid); 198 yp_error("database says user %s has UID %d", opw->pw_name, 205 npw->pw_name, np [all...] |
H A D | yppasswd_private.x | 42 string pw_name<>; /* username */
|
/freebsd-current/include/rpcsvc/ |
H A D | yppasswd.x | 49 string pw_name<>; /* username */
|
/freebsd-current/contrib/netbsd-tests/usr.bin/id/ |
H A D | pwgr.c | 156 p->pw_name = __UNCONST("root"); 160 p->pw_name = __UNCONST("test"); 176 p->pw_name = __UNCONST("root"); 180 p->pw_name = __UNCONST("test");
|
/freebsd-current/crypto/heimdal/lib/roken/ |
H A D | k_getpwuid.c | 52 spwd = getspnam (p->pw_name);
|
H A D | get_default_username.c | 73 return pwd->pw_name;
|
/freebsd-current/crypto/openssh/ |
H A D | auth-sia.c | 91 if (sia_ses_init(&ent, saved_argc, saved_argv, host, pw->pw_name, 103 pw->pw_name, host); 107 pw->pw_name, host);
|
H A D | platform.c | 183 if (setpcred(pw->pw_name, creds) == -1) 188 ssh_selinux_setup_exec_context(pw->pw_name); 193 platform_krb5_get_principal_name(const char *pw_name) argument 196 return aix_krb5_get_principal_name(pw_name); 214 spw = getspnam(pw->pw_name);
|
H A D | auth-rhosts.c | 244 client_user, pw->pw_name)) { 250 client_user, pw->pw_name)) { 263 "no home directory %.200s", pw->pw_name, pw->pw_dir); 265 "no home directory %.200s", pw->pw_name, pw->pw_dir); 272 "bad ownership or modes for home directory.", pw->pw_name); 274 "bad ownership or modes for home directory.", pw->pw_name); 302 "bad modes for %.200s", pw->pw_name, path); 321 client_user, pw->pw_name)) { 328 client_user, pw->pw_name);
|
H A D | auth.c | 109 if (!pw || !pw->pw_name) 114 pw->pw_name); 129 "does not exist", pw->pw_name, shell); 136 "is not executable", pw->pw_name, shell); 152 r = match_user(pw->pw_name, hostname, ipaddr, 160 pw->pw_name, hostname); 168 r = match_user(pw->pw_name, hostname, ipaddr, 179 "not listed in AllowUsers", pw->pw_name, hostname); 185 if (ga_init(pw->pw_name, pw->pw_gid) == 0) { 187 "not in any group", pw->pw_name, hostnam [all...] |
/freebsd-current/crypto/heimdal/appl/su/ |
H A D | su.c | 112 free (p->pw_name); 127 info->pw_name = strdup(pwd->pw_name); 133 if(info->pw_name == NULL || info->pw_passwd == NULL || 175 login_name = login_info->pw_name; 176 if (strcmp (su_info->pw_name, "root") == 0) 183 su_info->pw_name, 191 if (su_info->pw_uid == 0 && !krb5_kuserok(context, p, su_info->pw_name)) 297 snprintf(prompt, sizeof(prompt), "%s's password: ", su->pw_name); 305 login->pw_name, s [all...] |
/freebsd-current/crypto/heimdal/appl/login/ |
H A D | login.c | 161 ret = krb5_parse_name(context, pwd->pw_name, &princ); 330 sp = getspnam(pwd->pw_name); 333 update_utmp(pwd->pw_name, remote_host ? remote_host : "", 355 if(setlogin(pwd->pw_name)){ 356 warn("setlogin(%s)", pwd->pw_name); 370 if (setpcred (pwd->pw_name, NULL) == -1) 371 warn("setpcred(%s)", pwd->pw_name); 374 if(initgroups(pwd->pw_name, pwd->pw_gid)){ 375 warn("initgroups(%s, %u)", pwd->pw_name, (unsigned)pwd->pw_gid); 410 udb = getudbnam(pwd->pw_name); [all...] |
/freebsd-current/usr.bin/passwd/ |
H A D | passwd.c | 115 pwd->pw_name); 119 pwd->pw_name); 139 pam_err = pam_start("passwd", pwd->pw_name, &pamc, &pamh);
|
/freebsd-current/usr.bin/at/ |
H A D | perm.c | 104 return check_for_user(fp, pentry->pw_name); 117 return !check_for_user(fp, pentry->pw_name);
|
/freebsd-current/usr.sbin/lpr/lprm/ |
H A D | lprm.c | 100 if (strlen(p->pw_name) >= sizeof(luser)) 102 strcpy(luser, p->pw_name);
|
/freebsd-current/usr.bin/id/ |
H A D | id.c | 179 (void)printf("%s\n", pw->pw_name); 224 (void)printf("uid\t%s\n", pw->pw_name); 232 if (pw == NULL || strcmp(login, pw->pw_name)) 235 (void)printf("uid\t%s\n", pw->pw_name); 241 (void)printf("euid\t%s\n", pw->pw_name); 282 getgrouplist(pw->pw_name, gid, groups, &ngroups); 289 printf("uid=%u(%s)", uid, pw->pw_name); 298 (void)printf("(%s)", pw->pw_name); 382 (void) getgrouplist(pw->pw_name, pw->pw_gid, groups, &ngroups); 460 (void)printf("%s:%s:%d:%d:%s:%ld:%ld:%s:%s:%s\n", pw->pw_name, [all...] |
/freebsd-current/usr.bin/logins/ |
H A D | logins.c | 42 char *pw_name; member in struct:xpasswd 188 return (strcmp(a->pw_name, b->pw_name)); 213 pwds[npwds].pw_name = xstrdup(pwd->pw_name); 250 member(pwd->pw_name, grp->gr_mem)) { 259 if (member(pwd->pw_name, l_args)) { 300 pwd->pw_name, (long)pwd->pw_uid, grp ? grp->gr_name : "", 305 !member(pwd->pw_name, grp->gr_mem))
|
/freebsd-current/contrib/kyua/utils/ |
H A D | passwd.cpp | 131 INV(pw->pw_name == name); 132 return user(pw->pw_name, pw->pw_uid, pw->pw_gid); 161 return user(pw->pw_name, pw->pw_uid, pw->pw_gid);
|