/freebsd-11-stable/usr.sbin/pw/ |
H A D | pw_nis.c | 31 "$FreeBSD: stable/11/usr.sbin/pw/pw_nis.c 330449 2018-03-05 07:26:05Z eadler $"; 41 #include "pw.h" 47 struct passwd *pw = NULL; local 52 pw = pw_dup(pwd); 67 if (pw_copy(pfd, tfd, pw, old_pw) == -1) { 79 free(pw);
|
/freebsd-11-stable/crypto/heimdal/kadmin/ |
H A D | cpw.c | 65 char pw[128]; local 67 random_password (pw, sizeof(pw)); 68 ret = kadm5_chpass_principal(kadm_handle, principal, pw); 74 printf ("%s's password set to \"%s\"\n", princ_name, pw); 77 memset (pw, 0, sizeof(pw));
|
/freebsd-11-stable/contrib/netbsd-tests/lib/libc/sys/ |
H A D | t_issetugid.c | 47 struct passwd *pw; local 51 pw = getpwnam("nobody"); 53 if (pw == NULL) 63 if (fuid != NULL && (*fuid)(pw->pw_uid) != 0) 66 if (fgid != NULL && (*fgid)(pw->pw_gid) != 0)
|
H A D | t_mkdir.c | 113 struct passwd *pw; local 120 pw = getpwnam("nobody"); 122 ATF_REQUIRE(pw != NULL); 130 if (setuid(pw->pw_uid) != 0) 153 if (st_b.st_uid != pw->pw_uid)
|
H A D | t_msgctl.c | 116 struct passwd *pw; local 123 pw = getpwnam("nobody"); 127 ATF_REQUIRE(pw != NULL); 135 if (setuid(pw->pw_uid) != 0) 174 "message queue", pw->pw_uid); 262 struct passwd *pw; local 267 pw = getpwnam("nobody"); 271 ATF_REQUIRE(pw != NULL); 274 msgds.msg_perm.uid = pw->pw_uid; 280 msgds.msg_perm.gid = pw [all...] |
/freebsd-11-stable/contrib/nvi/ex/ |
H A D | ex_cd.c | 39 struct passwd *pw; local 63 if ((pw = getpwuid(getuid())) == NULL || 64 pw->pw_dir == NULL || pw->pw_dir[0] == '\0') { 69 dir = pw->pw_dir;
|
/freebsd-11-stable/contrib/amd/amd/ |
H A D | info_passwd.c | 94 struct passwd *pw; local 100 pw = getpwnam(key); 102 if (pw) { 110 * var0:=pw-prefix:=anydir 111 * var1:=pw-rhost:=dom3.dom2.dom1 112 * var2:=pw-user:=user 113 * var3:=pw-home:=/anydir/dom1/dom2/dom3/user 122 dir = xstrdup(pw->pw_dir); 175 dir+1, rhost, user, pw->pw_dir, p);
|
/freebsd-11-stable/lib/libc/net/ |
H A D | rcmdsh.c | 67 struct passwd *pw; local 76 if ((pw = getpwnam(locuser)) == NULL) { 132 if (setuid(pw->pw_uid) == -1) { 134 pw->pw_uid, strerror(errno)); 144 if (pw->pw_shell[0] == '\0') 147 rshprog = pw->pw_shell;
|
/freebsd-11-stable/crypto/openssh/ |
H A D | auth2-pubkey.c | 178 if (PRIVSEP(user_key_allowed(authctxt->pw, key, 1)) && 201 if (PRIVSEP(user_key_allowed(authctxt->pw, key, 0))) { 395 subprocess(const char *tag, struct passwd *pw, const char *command, argument 409 tag, command, pw->pw_name); 416 temporarily_use_uid(pw); 457 child_set_env(&child_env, &envsize, "USER", pw->pw_name); 458 child_set_env(&child_env, &envsize, "LOGNAME", pw->pw_name); 459 child_set_env(&child_env, &envsize, "HOME", pw->pw_dir); 480 if (setresgid(pw->pw_gid, pw 562 process_principals(FILE *f, char *file, struct passwd *pw, const struct sshkey_cert *cert) argument 614 match_principals_file(char *file, struct passwd *pw, struct sshkey_cert *cert) argument 641 struct passwd *pw; local 764 check_authkeys_file(FILE *f, char *file, Key* key, struct passwd *pw) argument 879 user_cert_trusted_ca(struct passwd *pw, Key *key) argument 945 user_key_allowed2(struct passwd *pw, Key *key, char *file) argument 972 struct passwd *pw; local 1091 user_key_allowed(struct passwd *pw, Key *key, int auth_attempt) argument [all...] |
H A D | session.c | 172 auth_sock_cleanup_proc(struct passwd *pw) argument 175 temporarily_use_uid(pw); 184 auth_input_request_forwarding(struct passwd * pw) argument 195 temporarily_use_uid(pw); 257 setproctitle("%s", authctxt->pw->pw_name); 420 cray_init_job(s->pw); /* set up cray jid and tmpdir */ 548 cray_init_job(s->pw); /* set up cray jid and tmpdir */ 606 record_utmp_only(pid, s->tty, s->pw->pw_name, 661 s->pw->pw_name, 670 char *shell = s->pw 701 struct passwd * pw = s->pw; local 778 struct passwd *pw = s->pw; local 986 struct passwd *pw = s->pw; local 1261 do_nologin(struct passwd *pw) argument 1347 do_setusercontext(struct passwd *pw) argument 1503 struct passwd *pw = s->pw; local [all...] |
/freebsd-11-stable/contrib/netbsd-tests/lib/libcrypt/ |
H A D | t_crypt.c | 74 const char *pw; member in struct:__anon4718 127 char *hash = crypt(tests[i].pw, tests[i].hash);
|
/freebsd-11-stable/crypto/heimdal/appl/login/ |
H A D | shadow.c | 64 check_shadow(const struct passwd *pw, const struct spwd *sp) argument 87 change_passwd(pw);
|
/freebsd-11-stable/crypto/heimdal/lib/gssapi/krb5/ |
H A D | pname_to_uid.c | 51 struct passwd pw, *pwd; 68 if (getpwnam_r(localname, &pw, pwbuf, sizeof(pwbuf), &pwd) != 0) {
|
/freebsd-11-stable/usr.sbin/rpc.yppasswdd/ |
H A D | yppasswdd_server.c | 250 find_domain(struct x_passwd *pw) argument 279 key.data = pw->pw_name; 280 key.size = strlen(pw->pw_name); 288 if (yp_password.pw_uid == (uid_t)pw->pw_uid && 289 yp_password.pw_gid == (gid_t)pw->pw_gid) { 319 update_inplace(struct passwd *pw, char *domain) argument 339 "%llu", (unsigned long long)pw->pw_uid); 343 key.data = pw->pw_name; 344 key.size = strlen(pw->pw_name); 380 if (strncmp(data.data, pw [all...] |
/freebsd-11-stable/crypto/openssh/openbsd-compat/ |
H A D | pwcache.c | 56 struct passwd *pw; local 67 if ((pw = getpwuid(uid)) == NULL) { 75 cp->name = strdup(pw ? pw->pw_name : nbuf);
|
/freebsd-11-stable/contrib/dma/ |
H A D | dma-mbox-create.c | 88 struct passwd *pw; local 128 pw = getpwnam(user); 129 if (!pw) 136 user_uid = pw->pw_uid;
|
/freebsd-11-stable/contrib/wpa/src/crypto/ |
H A D | aes_siv.h | 13 const u8 *pw, size_t pwlen,
|
/freebsd-11-stable/lib/libpam/modules/pam_rhosts/ |
H A D | pam_rhosts.c | 56 struct passwd *pw; local 65 if ((pw = getpwnam(user)) == NULL) 67 if (pw->pw_uid == 0 &&
|
/freebsd-11-stable/crypto/heimdal/lib/krb5/ |
H A D | salt-des.c | 50 krb5_DES_AFS3_CMU_string_to_key (krb5_data pw, argument 58 char c = ((i < pw.length) ? ((char*)pw.data)[i] : 0) ^ 79 krb5_DES_AFS3_Transarc_string_to_key (krb5_data pw, argument 89 memcpy(password, pw.data, min(pw.length, sizeof(password))); 90 if(pw.length < sizeof(password)) { 91 int len = min(cell.length, sizeof(password) - pw.length); 94 memcpy(password + pw.length, cell.data, len); 95 for (i = pw [all...] |
H A D | get_default_principal.c | 79 struct passwd *pw = getpwuid(uid); local 80 if(pw != NULL) 81 user = pw->pw_name;
|
H A D | salt.c | 158 krb5_data pw; local 159 pw.data = rk_UNCONST(password); 160 pw.length = strlen(password); 161 return krb5_string_to_key_data(context, enctype, pw, principal, key); 222 krb5_data pw; local 223 pw.data = rk_UNCONST(password); 224 pw.length = strlen(password); 225 return krb5_string_to_key_data_salt(context, enctype, pw, salt, key); 236 krb5_data pw; local 237 pw [all...] |
/freebsd-11-stable/usr.bin/talk/ |
H A D | get_names.c | 74 struct passwd *pw; local 76 if ((pw = getpwuid(getuid())) == NULL) 78 my_name = pw->pw_name;
|
/freebsd-11-stable/contrib/pf/pflogd/ |
H A D | privsep.c | 74 struct passwd *pw; local 87 pw = getpwnam("_pflogd"); 88 if (pw == NULL) 100 if (chroot(pw->pw_dir) != 0) 105 gidset[0] = pw->pw_gid; 106 if (setresgid(pw->pw_gid, pw->pw_gid, pw->pw_gid) == -1) 110 if (setresuid(pw->pw_uid, pw [all...] |
/freebsd-11-stable/release/tools/ |
H A D | vagrant.conf | 40 /usr/sbin/pw -R ${DESTDIR} \ 43 /usr/sbin/pw -R ${DESTDIR} \ 49 echo 'vagrant' | /usr/sbin/pw -R ${DESTDIR} \
|
/freebsd-11-stable/usr.sbin/cron/cron/ |
H A D | user.c | 53 load_user(crontab_fd, pw, name) 55 struct passwd *pw; /* NULL implies syscrontab */ 105 e = load_entry(file, log_error, pw, envp);
|