/freebsd-11-stable/crypto/openssh/ |
H A D | monitor.c | 329 if (authctxt->pw->pw_uid == 0 && 723 authctxt->pw = fakepw(); 728 authctxt->pw = pwent; 950 skey_haskey(authctxt->pw->pw_name) == 0 && 951 skey_passcheck(authctxt->pw->pw_name, response) != -1); 1153 user_key_allowed(authctxt->pw, key, 1165 hostbased_key_allowed(authctxt->pw, 1394 mm_record_login(Session *s, struct passwd *pw) argument 1414 record_login(s->pid, s->tty, pw->pw_name, pw [all...] |
H A D | ssh-add.c | 587 struct passwd *pw; local 591 if ((pw = getpwuid(getuid())) == NULL) { 599 snprintf(buf, sizeof(buf), "%s/%s", pw->pw_dir,
|
H A D | readconf.c | 135 static int read_config_file_depth(const char *filename, struct passwd *pw, 138 static int process_config_line_depth(Options *options, struct passwd *pw, 559 match_cfg_line(Options *options, char **condition, struct passwd *pw, argument 573 ruser = options->user == NULL ? pw->pw_name : options->user; 637 criteria = xstrdup(pw->pw_name); 638 r = match_pattern_list(pw->pw_name, arg, 0) == 1; 650 "d", pw->pw_dir, 656 "u", pw->pw_name, 825 process_config_line(Options *options, struct passwd *pw, const char *host, argument 829 return process_config_line_depth(options, pw, hos 835 process_config_line_depth(Options *options, struct passwd *pw, const char *host, const char *original_host, char *line, const char *filename, int linenum, int *activep, int flags, int depth) argument 1734 read_config_file(const char *filename, struct passwd *pw, const char *host, const char *original_host, Options *options, int flags) argument 1745 read_config_file_depth(const char *filename, struct passwd *pw, const char *host, const char *original_host, Options *options, int flags, int *activep, int depth) argument [all...] |
/freebsd-11-stable/contrib/openbsm/bin/auditdistd/ |
H A D | receiver.c | 530 struct passwd *pw; local 538 pw = getpwnam(ADIST_USER); 539 if (pw == NULL) { 553 if (chown(adhost->adh_directory, pw->pw_uid, pw->pw_gid) == -1) {
|
/freebsd-11-stable/crypto/heimdal/lib/hx509/ |
H A D | ks_file.c | 178 const struct _hx509_password *pw; local 257 pw = _hx509_lock_get_passwords(lock); 258 if (pw != NULL) { 262 for (i = 0; i < pw->len; i++) { 263 password = pw->val[i];
|
H A D | ks_p12.c | 613 const struct _hx509_password *pw; 615 pw = _hx509_lock_get_passwords(lock); 616 if (pw != NULL) { 628 ret = calculate_hash(&aspath, pw, pfx.macData);
|
/freebsd-11-stable/usr.sbin/pw/tests/ |
H A D | pw_useradd_test.sh | 1 # $FreeBSD: stable/11/usr.sbin/pw/tests/pw_useradd_test.sh 330694 2018-03-09 14:45:17Z dab $ 196 # pw useradd should fail because of the space in the user 235 atf_check -e inline:"pw: Invalid date\n" -s exit:1 \ 237 atf_check -e inline:"pw: Invalid date\n" -s exit:1 \ 241 atf_check -e inline:"pw: Invalid date\n" -s exit:1 \ 336 atf_check -e inline:"pw: WARNING: new account \`foo' has a uid of 0 (superuser access!)\n" \ 346 atf_check -s exit:64 -e inline:"pw: Bad id '9999999999999': too large\n" \ 364 -e inline:"pw: login name \`foo' already exists\n" \ 372 atf_check -s exit:1 -e match:"pw: Invalid value for default password" \ 416 ${PW} useradd -D -C ${HOME}/pw [all...] |
/freebsd-11-stable/contrib/tcsh/ |
H A D | tw.init.c | 610 struct passwd *pw; local 622 pw = getpwent(); 624 pw = NULL; 628 if (pw == NULL) { 634 Strbuf_append(res, str2short(pw->pw_name));
|
/freebsd-11-stable/lib/librpcsec_gss/ |
H A D | svc_rpcsec_gss.c | 567 struct passwd pwd, *pw; local 579 getpwuid_r(uid, &pwd, buf, sizeof(buf), &pw); 580 if (pw) { 582 uc->uid = pw->pw_uid; 583 uc->gid = pw->pw_gid; 585 getgrouplist(pw->pw_name, pw->pw_gid, uc->gidlist, &len);
|
/freebsd-11-stable/contrib/wpa/src/wps/ |
H A D | wps_common.c | 676 struct wpabuf *pw; local 679 pw = wpabuf_alloc(WPS_OOB_DEVICE_PASSWORD_LEN); 680 if (pw == NULL) 683 if (random_get_bytes(wpabuf_put(pw, WPS_OOB_DEVICE_PASSWORD_LEN), 686 wpabuf_free(pw); 691 wpabuf_free(pw); 697 *dev_pw = pw;
|
/freebsd-11-stable/contrib/wpa/src/utils/ |
H A D | utils_module_tests.c | 257 struct wpabuf *pw; local 268 pw = ext_password_get(data, "foo"); 269 if (pw != NULL) 271 ext_password_free(pw); 275 pw = ext_password_get(NULL, "foo"); 276 if (pw != NULL) 278 ext_password_free(pw);
|
/freebsd-11-stable/crypto/heimdal/appl/su/ |
H A D | su.c | 294 char *pw; local 301 pw = crypt(pw_buf, su->pw_passwd); 303 if(strcmp(pw, su->pw_passwd) != 0) {
|
/freebsd-11-stable/sbin/shutdown/ |
H A D | shutdown.c | 112 struct passwd *pw; local 225 whom = (pw = getpwuid(getuid())) ? pw->pw_name : "???";
|
/freebsd-11-stable/sbin/quotacheck/ |
H A D | quotacheck.c | 140 struct passwd *pw; local 193 while ((pw = getpwent()) != NULL) 194 (void) addid((u_long)pw->pw_uid, USRQUOTA, pw->pw_name,
|
/freebsd-11-stable/contrib/nvi/common/ |
H A D | recover.c | 328 struct passwd *pw; local 349 if ((pw = getpwuid(uid = getuid())) == NULL) { 414 "To: ", pw->pw_name, "@", host, 428 "On ", ctime(&now), ", the user ", pw->pw_name,
|
/freebsd-11-stable/contrib/smbfs/lib/smb/ |
H A D | ctx.c | 392 struct passwd *pw; local 408 pw = getpwnam(pair); 409 if (pw) { 410 *uid = pw->pw_uid;
|
/freebsd-11-stable/crypto/openssh/openbsd-compat/ |
H A D | openbsd-compat.h | 300 char *shadow_pw(struct passwd *pw);
|
/freebsd-11-stable/usr.bin/at/ |
H A D | at.c | 462 struct passwd *pw; local 517 pw = getpwuid(buf.st_uid); 521 pw ? pw->pw_name : "???",
|
/freebsd-11-stable/usr.sbin/rwhod/ |
H A D | rwhod.c | 306 struct passwd *pw; local 309 pw = getpwnam(UNPRIV_USER); 310 if (pw == NULL) { 314 *uid = pw->pw_uid;
|
/freebsd-11-stable/usr.sbin/bluetooth/sdpd/ |
H A D | server.c | 350 struct passwd *pw; local 364 pw = getpwuid(cr.cr_uid); 365 if (pw != NULL) 366 priv = (strcmp(pw->pw_name, "root") == 0);
|
/freebsd-11-stable/usr.sbin/rpc.lockd/ |
H A D | kern.c | 131 struct passwd *pw; local 165 pw = getpwnam(DAEMON_USERNAME); 166 if (pw == NULL) { 170 daemon_uid = pw->pw_uid;
|
/freebsd-11-stable/contrib/wpa/wpa_supplicant/ |
H A D | ap.h | 76 const struct wpabuf *pw, const u8 *pubkey_hash);
|
/freebsd-11-stable/contrib/sendmail/src/ |
H A D | err.c | 134 struct passwd *pw; local 205 pw = sm_getpwuid(RealUid); 206 if (pw != NULL) 207 user = pw->pw_name;
|
H A D | readcf.c | 1577 struct passwd *pw; local 1596 pw = sm_getpwnam(q); 1597 if (pw == NULL) 1604 m->m_uid = pw->pw_uid; 1605 m->m_gid = pw->pw_gid; 3592 register struct passwd *pw; local 3595 pw = sm_getpwnam(val); 3596 if (pw == NULL) 3603 DefUid = pw->pw_uid; 3604 DefGid = pw 3928 register struct passwd *pw; local 4135 register struct passwd *pw; local [all...] |
/freebsd-11-stable/contrib/tcpdump/ |
H A D | tcpdump.c | 599 struct passwd *pw = NULL; local 607 pw = getpwnam(username); 608 if (pw) { 618 int ret = capng_change_id(pw->pw_uid, pw->pw_gid, CAPNG_NO_FLAG); 625 if (initgroups(pw->pw_name, pw->pw_gid) != 0 || 626 setgid(pw->pw_gid) != 0 || setuid(pw->pw_uid) != 0) { 629 (unsigned long)pw [all...] |