/freebsd-9.3-release/crypto/openssh/ |
H A D | auth-sia.c | 83 session_setup_sia(struct passwd *pw, char *tty) argument 90 if (sia_ses_init(&ent, saved_argc, saved_argv, host, pw->pw_name, 94 if (sia_make_entity_pwd(pw, ent) != SIASUCCESS) { 102 pw->pw_name, host); 106 pw->pw_name, host); 111 permanently_set_uid(pw);
|
H A D | auth.c | 99 allowed_user(struct passwd * pw) argument 108 /* Shouldn't be called if pw is NULL, but better safe than sorry... */ 109 if (!pw || !pw->pw_name) 114 spw = getspnam(pw->pw_name); 122 passwd = pw->pw_passwd; 126 passwd = get_iaf_password(pw); 154 pw->pw_name); 165 char *shell = xstrdup((pw->pw_shell[0] == '\0') ? 166 _PATH_BSHELL : pw 364 expand_authorized_keys(const char *filename, struct passwd *pw) argument 387 authorized_principals_file(struct passwd *pw) argument 397 check_key_in_hostfiles(struct passwd *pw, Key *key, const char *host, const char *sysfile, const char *userfile) argument 519 secure_filename(FILE *f, const char *file, struct passwd *pw, char *err, size_t errlen) argument 534 auth_openfile(const char *file, struct passwd *pw, int strict_modes, int log_missing, char *file_type) argument 577 auth_openkeyfile(const char *file, struct passwd *pw, int strict_modes) argument 583 auth_openprincipals(const char *file, struct passwd *pw, int strict_modes) argument 598 struct passwd *pw; local [all...] |
H A D | auth-passwd.c | 83 struct passwd * pw = authctxt->pw; local 90 if (pw->pw_uid == 0 && options.permit_root_login != PERMIT_YES) 106 HANDLE hToken = cygwin_logon_user(pw, password); 169 struct passwd *pw = authctxt->pw; local 173 as = auth_usercheck(pw->pw_name, authctxt->style, "auth-ssh", 194 struct passwd *pw = authctxt->pw; local 198 char *pw_password = authctxt->valid ? shadow_pw(pw) [all...] |
H A D | auth2-pubkey.c | 160 if (PRIVSEP(user_key_allowed(authctxt->pw, key)) && 178 if (PRIVSEP(user_key_allowed(authctxt->pw, key))) { 253 match_principals_file(char *file, struct passwd *pw, struct KeyCert *cert) argument 260 temporarily_use_uid(pw); 262 if ((f = auth_openprincipals(file, pw, options.strict_modes)) == NULL) { 296 if (auth_parse_options(pw, line_opts, 315 check_authkeys_file(FILE *f, char *file, Key* key, struct passwd *pw) argument 363 if (auth_parse_options(pw, key_options, file, 389 authorized_principals == NULL ? pw->pw_name : NULL, 392 if (auth_cert_options(key, pw) ! 425 user_cert_trusted_ca(struct passwd *pw, Key *key) argument 481 user_key_allowed2(struct passwd *pw, Key *key, char *file) argument 508 struct passwd *pw; local 651 user_key_allowed(struct passwd *pw, Key *key) argument [all...] |
H A D | auth-rsa.c | 168 rsa_key_allowed_in_file(struct passwd *pw, char *file, argument 178 if ((f = auth_openkeyfile(file, pw, options.strict_modes)) == NULL) 252 if (!auth_parse_options(pw, key_options, file, linenum)) 279 auth_rsa_key_allowed(struct passwd *pw, BIGNUM *client_n, Key **rkey) argument 284 temporarily_use_uid(pw); 290 options.authorized_keys_files[i], pw); 291 allowed = rsa_key_allowed_in_file(pw, file, client_n, rkey); 309 struct passwd *pw = authctxt->pw; local 315 if (!PRIVSEP(auth_rsa_key_allowed(pw, client_ [all...] |
H A D | auth2-hostbased.c | 131 if (PRIVSEP(hostbased_key_allowed(authctxt->pw, cuser, chost, key)) && 151 hostbased_key_allowed(struct passwd *pw, const char *cuser, char *chost, argument 174 if (auth_rhosts2(pw, cuser, chost, chost) == 0) 182 if (auth_rhosts2(pw, cuser, resolvedname, ipaddr) == 0) 195 host_status = check_key_in_hostfiles(pw, key, lookup, 201 host_status = check_key_in_hostfiles(pw, key, lookup,
|
/freebsd-9.3-release/kerberos5/lib/libgssapi_krb5/ |
H A D | pname_to_uid.c | 42 struct passwd pwd, *pw; local 59 pw = NULL; 65 error = getpwnam_r(lname, &pwd, bufp, buflen, &pw); 74 if (pw) { 75 *uidp = pw->pw_uid;
|
/freebsd-9.3-release/sbin/hastd/ |
H A D | subr.c | 156 struct passwd *pw; local 168 pw = getpwnam(HAST_USER); 169 if (pw == NULL) { 183 jailst.path = pw->pw_dir; 201 "Unable to jail to directory to %s", pw->pw_dir); 202 if (chroot(pw->pw_dir) == -1) { 205 pw->pw_dir); 210 gidset[0] = pw->pw_gid; 213 (unsigned int)pw->pw_gid); 216 if (setgid(pw [all...] |
/freebsd-9.3-release/usr.bin/chkey/ |
H A D | chkey.c | 90 struct passwd *pw; local 130 pw = ypgetpwuid(uid); 132 pw = getpwuid(uid); 134 if (pw == NULL) { 144 pw = getpwuid(0); 145 if (pw == NULL) 152 if (strcmp(crypt(pass, pw->pw_passwd), pw->pw_passwd) != 0) 250 static struct passwd pw; local 262 pw [all...] |
/freebsd-9.3-release/crypto/openssh/openbsd-compat/ |
H A D | xcrypt.c | 95 shadow_pw(struct passwd *pw) argument 97 char *pw_password = pw->pw_passwd; 100 struct spwd *spw = getspnam(pw->pw_name); 107 return(get_iaf_password(pw)); 112 if (issecure() && (spw = getpwanam(pw->pw_name)) != NULL) 115 struct pr_passwd *spw = getprpwnam(pw->pw_name);
|
H A D | pwcache.c | 56 struct passwd *pw; local 67 if ((pw = getpwuid(uid)) == NULL) { 75 cp->name = strdup(pw ? pw->pw_name : nbuf);
|
/freebsd-9.3-release/usr.bin/finger/ |
H A D | finger.c | 161 struct passwd *pw; local 166 if ((pw = getpwnam(UNPRIV_NAME)) && pw->pw_uid > 0) { 167 if (setgid(pw->pw_gid) != 0) 169 if (setuid(pw->pw_uid) != 0) 235 struct passwd *pw; local 247 if ((pw = getpwnam(user->ut_user)) == NULL) 249 if (hide(pw)) 251 pn = enter_person(pw); 276 struct passwd *pw; local [all...] |
H A D | util.c | 65 match(struct passwd *pw, const char *user) argument 70 if (!strcasecmp(pw->pw_name, user)) 77 (void)strncpy(p = tbuf, pw->pw_gecos, sizeof(tbuf)); 88 (void)strncpy(t, pw->pw_name, 155 enter_person(struct passwd *pw) argument 164 key.data = pw->pw_name; 165 key.size = strlen(pw->pw_name); 178 userinfo(pn, pw); 192 struct passwd *pw; local 200 if ((pw 324 userinfo(PERSON *pn, struct passwd *pw) argument 391 hide(struct passwd *pw) argument [all...] |
/freebsd-9.3-release/contrib/pam_modules/pam_passwdqc/ |
H A D | passwdqc.h | 21 const char *newpass, const char *oldpass, struct passwd *pw);
|
/freebsd-9.3-release/crypto/heimdal/kadmin/ |
H A D | cpw.c | 67 char pw[128]; local 69 random_password (pw, sizeof(pw)); 70 ret = kadm5_chpass_principal(kadm_handle, principal, pw); 76 printf ("%s's password set to \"%s\"\n", princ_name, pw); 79 memset (pw, 0, sizeof(pw));
|
/freebsd-9.3-release/usr.bin/calendar/ |
H A D | calendar.c | 60 struct passwd *pw; variable in typeref:struct:passwd 200 while ((pw = getpwent()) != NULL) { 201 (void)setegid(pw->pw_gid); 202 (void)initgroups(pw->pw_name, pw->pw_gid); 203 (void)seteuid(pw->pw_uid); 204 if (!chdir(pw->pw_dir))
|
/freebsd-9.3-release/contrib/amd/amd/ |
H A D | info_passwd.c | 98 struct passwd *pw; local 104 pw = getpwnam(key); 106 if (pw) { 114 * var0:=pw-prefix:=anydir 115 * var1:=pw-rhost:=dom3.dom2.dom1 116 * var2:=pw-user:=user 117 * var3:=pw-home:=/anydir/dom1/dom2/dom3/user 126 dir = strdup(pw->pw_dir); 179 dir+1, rhost, user, pw->pw_dir, p);
|
/freebsd-9.3-release/contrib/nvi/ex/ |
H A D | ex_cd.c | 41 struct passwd *pw; local 64 if ((pw = getpwuid(getuid())) == NULL || 65 pw->pw_dir == NULL || pw->pw_dir[0] == '\0') { 70 dir = pw->pw_dir;
|
/freebsd-9.3-release/lib/libc/net/ |
H A D | rcmdsh.c | 70 struct passwd *pw; local 79 if ((pw = getpwnam(locuser)) == NULL) { 135 if (setuid(pw->pw_uid) == -1) { 137 pw->pw_uid, strerror(errno)); 147 if (pw->pw_shell[0] == '\0') 150 rshprog = pw->pw_shell;
|
/freebsd-9.3-release/crypto/heimdal/appl/login/ |
H A D | shadow.c | 64 check_shadow(const struct passwd *pw, const struct spwd *sp) argument 87 change_passwd(pw);
|
/freebsd-9.3-release/usr.sbin/rpc.yppasswdd/ |
H A D | yppasswdd_server.c | 247 find_domain(struct x_passwd *pw) argument 276 key.data = pw->pw_name; 277 key.size = strlen(pw->pw_name); 285 if (yp_password.pw_uid == (uid_t)pw->pw_uid && 286 yp_password.pw_gid == (gid_t)pw->pw_gid) { 316 update_inplace(struct passwd *pw, char *domain) argument 335 "%llu", (unsigned long long)pw->pw_uid); 339 key.data = pw->pw_name; 340 key.size = strlen(pw->pw_name); 376 if (strncmp(data.data, pw [all...] |
/freebsd-9.3-release/crypto/heimdal/lib/krb5/ |
H A D | get_default_principal.c | 79 struct passwd *pw = getpwuid(uid); local 80 if(pw != NULL) 81 user = pw->pw_name;
|
/freebsd-9.3-release/lib/libpam/modules/pam_rhosts/ |
H A D | pam_rhosts.c | 56 struct passwd *pw; local 65 if ((pw = getpwnam(user)) == NULL) 67 if (pw->pw_uid == 0 &&
|
/freebsd-9.3-release/usr.bin/talk/ |
H A D | get_names.c | 74 struct passwd *pw; local 76 if ((pw = getpwuid(getuid())) == NULL) 78 my_name = pw->pw_name;
|
/freebsd-9.3-release/contrib/pf/pflogd/ |
H A D | privsep.c | 74 struct passwd *pw; local 87 pw = getpwnam("_pflogd"); 88 if (pw == NULL) 100 if (chroot(pw->pw_dir) != 0) 105 gidset[0] = pw->pw_gid; 106 if (setresgid(pw->pw_gid, pw->pw_gid, pw->pw_gid) == -1) 110 if (setresuid(pw->pw_uid, pw [all...] |