/freebsd-current/contrib/dma/ |
H A D | dma.c | 180 struct passwd *pw; local 224 pw = getpwnam(it->addr); 225 if (pw == NULL) 441 struct passwd *pw; local 444 pw = getpwnam(DMA_ROOT_USER); 445 if (pw == NULL) { 452 if (setuid(pw->pw_uid) != 0)
|
/freebsd-current/contrib/wpa/src/tls/ |
H A D | pkcs5.c | 400 static int pkcs12_key_gen(const u8 *pw, size_t pw_len, const u8 *salt, argument 431 *pos++ = pw[i % pw_len]; 492 u8 *pw; local 501 pw = os_malloc(2 * (pw_len + 1)); 502 if (!pw) 506 WPA_PUT_BE16(&pw[2 * i], passwd[i]); 510 if (pkcs12_key_gen(pw, pw_len, params->salt, params->salt_len, 513 pkcs12_key_gen(pw, pw_len, params->salt, params->salt_len, 516 os_free(pw); 520 os_free(pw); [all...] |
/freebsd-current/usr.sbin/inetd/ |
H A D | builtins.c | 355 struct passwd *pw = NULL; local 569 /* Look up the pw to get the username and home directory*/ 571 pw = getpwuid(uc.cr_uid); 572 if (pw == NULL) 576 snprintf(idbuf, sizeof(idbuf), "%u", (unsigned)pw->pw_uid); 578 strlcpy(idbuf, pw->pw_name, sizeof(idbuf)); 585 if (asprintf(&p, "%s/.noident", pw->pw_dir) == -1) 607 if (initgroups(pw->pw_name, pw->pw_gid) == -1) 609 if (seteuid(pw [all...] |
/freebsd-current/crypto/openssh/ |
H A D | ssh-keygen.c | 256 ask_filename(struct passwd *pw, const char *prompt) argument 302 "%s/%s", pw->pw_dir, name); 344 do_convert_to_ssh2(struct passwd *pw, struct sshkey *k) argument 361 pw->pw_name, hostname); 426 do_convert_to(struct passwd *pw) argument 433 ask_filename(pw, "Enter file in which the key is"); 440 do_convert_to_ssh2(pw, k); 646 do_convert_from_ssh2(struct passwd *pw, struct sshkey **k, int *private) argument 762 do_convert_from(struct passwd *pw) argument 769 ask_filename(pw, "Ente 823 do_print_public(struct passwd *pw) argument 850 do_download(struct passwd *pw) argument 960 do_fingerprint(struct passwd *pw) argument 1057 do_gen_all_hostkeys(struct passwd *pw) argument 1310 do_known_hosts(struct passwd *pw, const char *name, int find_host, int delete_host, int hash_hosts) argument 1417 do_change_passphrase(struct passwd *pw) argument 1496 do_print_resource_record(struct passwd *pw, char *fname, char *hname, int print_generic, char * const *opts, size_t nopts) argument 1533 do_change_comment(struct passwd *pw, const char *identity_comment) argument 1767 do_ca_sign(struct passwd *pw, const char *ca_key_path, int prefer_agent, unsigned long long cert_serial, int cert_serial_autoinc, int argc, char **argv) argument 2174 do_show_cert(struct passwd *pw) argument 2281 update_krl_from_file(struct passwd *pw, const char *file, int wild_ca, const struct sshkey *ca, struct ssh_krl *krl) argument 2435 do_gen_krl(struct passwd *pw, int updating, const char *ca_key_path, unsigned long long krl_version, const char *krl_comment, int argc, char **argv) argument 2491 do_check_krl(struct passwd *pw, int print_krl, int argc, char **argv) argument 3347 struct passwd *pw; local [all...] |
H A D | misc.c | 484 pwcopy(struct passwd *pw) argument 488 copy->pw_name = xstrdup(pw->pw_name); 489 copy->pw_passwd = xstrdup(pw->pw_passwd == NULL ? "*" : pw->pw_passwd); 491 copy->pw_gecos = xstrdup(pw->pw_gecos); 493 copy->pw_uid = pw->pw_uid; 494 copy->pw_gid = pw->pw_gid; 496 copy->pw_expire = pw->pw_expire; 499 copy->pw_change = pw->pw_change; 502 copy->pw_class = xstrdup(pw 1168 struct passwd *pw; local 2270 safe_path_fd(int fd, const char *file, struct passwd *pw, char *err, size_t errlen) argument 2711 subprocess(const char *tag, const char *command, int ac, char **av, FILE **child, u_int flags, struct passwd *pw, privdrop_fn *drop_privs, privrestore_fn *restore_privs) argument [all...] |
H A D | monitor_wrap.c | 249 fatal_fr(r, "parse pw %s", #id); \ 250 if (len != sizeof(pw->id)) \ 252 memcpy(&pw->id, p, len); \ 259 struct passwd *pw; local 282 pw = NULL; 287 pw = xcalloc(sizeof(*pw), 1); 296 if ((r = sshbuf_get_cstring(m, &pw->pw_name, NULL)) != 0 || 297 (r = sshbuf_get_cstring(m, &pw->pw_passwd, NULL)) != 0 || 299 (r = sshbuf_get_cstring(m, &pw 438 mm_user_key_allowed(struct ssh *ssh, struct passwd *pw, struct sshkey *key, int pubkey_auth_attempt, struct sshauthopt **authoptp) argument 446 mm_hostbased_key_allowed(struct ssh *ssh, struct passwd *pw, const char *user, const char *host, struct sshkey *key) argument [all...] |
H A D | auth.h | 66 struct passwd *pw; /* set if 'valid' */ member in struct:Authctxt 193 char *expand_authorized_keys(const char *, struct passwd *pw);
|
H A D | auth-shadow.c | 91 const char *user = ctxt->pw->pw_name;
|
/freebsd-current/stand/libsa/geli/ |
H A D | geliboot.c | 376 geli_passphrase(struct geli_dev *gdev, char *pw) argument 383 if (i == 0 && pw[0] != '\0') { 384 if (geli_probe(gdev, pw, NULL) == 0) { 389 pwgets(pw, GELI_PW_MAXLEN, 392 if (geli_probe(gdev, pw, NULL) == 0) {
|
/freebsd-current/contrib/tnftp/src/ |
H A D | main.c | 149 struct passwd *pw; local 458 pw = NULL; 461 pw = getpwnam(cp); 462 if (pw == NULL) 463 pw = getpwuid(getuid()); 464 if (pw != NULL) { 465 if (localhome == NULL && !EMPTYSTRING(pw->pw_dir)) 466 localhome = ftp_strdup(pw->pw_dir); 467 localname = ftp_strdup(pw->pw_name);
|
/freebsd-current/usr.sbin/ypldap/ |
H A D | ypldap.c | 502 struct passwd *pw; local 601 if ((pw = getpwnam(YPLDAP_USER)) == NULL) 605 if (setgroups(1, &pw->pw_gid) || 606 setresgid(pw->pw_gid, pw->pw_gid, pw->pw_gid) || 607 setresuid(pw->pw_uid, pw->pw_uid, pw->pw_uid))
|
/freebsd-current/usr.sbin/daemon/ |
H A D | daemon.c | 592 struct passwd *pw = NULL; local 594 pw = getpwnam(user); 595 if (pw == NULL) { 599 if (setusercontext(NULL, pw, pw->pw_uid, LOGIN_SETALL) != 0) { 603 setenv("USER", pw->pw_name, 1); 604 setenv("HOME", pw->pw_dir, 1); 605 setenv("SHELL", *pw->pw_shell ? pw->pw_shell : _PATH_BSHELL, 1);
|
/freebsd-current/crypto/heimdal/lib/hdb/ |
H A D | ext.c | 290 heim_octet_string pw; local 308 &pw); 310 ret = der_copy_octet_string(&ext->data.u.password.password, &pw); 317 xstr = pw.data; 318 if (xstr[pw.length - 1] != '\0') { 325 der_free_octet_string(&pw);
|
/freebsd-current/contrib/sendmail/src/ |
H A D | recipient.c | 1185 register struct passwd *pw; local 1252 while ((pw = getpwent()) != NULL) 1257 if (SM_STRCASEEQ(pw->pw_name, name)) 1265 sm_pwfullname(pw->pw_gecos, pw->pw_name, buf, sizeof(buf)); 1269 sm_dprintf("fuzzy matches %s\n", pw->pw_name); 1270 message("sending to login name %s", pw->pw_name); 1274 if (pw != NULL) 1281 if (pw == NULL) 1283 sm_mbdb_frompw(user, pw); 1765 register struct passwd *pw; local [all...] |
/freebsd-current/crypto/heimdal/kdc/ |
H A D | string2key.c | 73 const char *pw, 82 ret = krb5_string_to_key_salt(context, enctype, pw, salt, &key); 71 tokey(krb5_context context, krb5_enctype enctype, const char *pw, krb5_salt salt, const char *label) argument
|
/freebsd-current/contrib/wpa/src/common/ |
H A D | sae.h | 154 bool sae_pk_valid_password(const char *pw); 156 static inline bool sae_pk_valid_password(const char *pw) argument
|
/freebsd-current/contrib/sendmail/makemap/ |
H A D | makemap.c | 233 struct passwd *pw; local 236 pw = getpwnam(b); 237 if (pw == NULL) 242 TrustedUid = pw->pw_uid; 375 struct passwd *pw; local 405 pw = getpwuid(RealUid); 406 if (pw != NULL) 407 (void) sm_strlcpy(rnamebuf, pw->pw_name, sizeof rnamebuf);
|
/freebsd-current/contrib/mtree/ |
H A D | specspec.c | 59 struct passwd *pw; local 82 pw = getpwuid(n->st_uid); 83 if (pw == NULL) 86 printf(" uname=%s", pw->pw_name);
|
/freebsd-current/contrib/netcat/ |
H A D | socks.c | 116 static char pw[256]; local 120 if (readpassphrase(prompt, pw, sizeof(pw), RPP_REQUIRE_TTY) == NULL) 122 return (pw);
|
/freebsd-current/crypto/heimdal/appl/ftp/ftp/ |
H A D | main.c | 91 struct passwd *pw = NULL; local 138 pw = k_getpwuid(getuid()); 139 if (pw != NULL) { 140 strlcpy(homedir, pw->pw_dir, sizeof(homedir));
|
/freebsd-current/usr.sbin/gssd/ |
H A D | gssd.c | 745 struct passwd pwd, *pw; local 759 pw = NULL; 766 &pw); 775 if (pw) { 778 result->gid = pw->pw_gid; 779 getgrouplist(pw->pw_name, pw->pw_gid, 1123 struct passwd *pw; local 1128 pw = getpwuid(uid); 1185 if (pw ! 1283 struct passwd *pw; local [all...] |
/freebsd-current/contrib/wpa/src/crypto/ |
H A D | aes-siv.c | 120 const u8 *pw, size_t pwlen, 143 _addr[num_elem] = pw; 153 os_memcpy(crypt_pw, pw, pwlen); 119 aes_siv_encrypt(const u8 *key, size_t key_len, const u8 *pw, size_t pwlen, size_t num_elem, const u8 *addr[], const size_t *len, u8 *out) argument
|
/freebsd-current/crypto/heimdal/lib/kadm5/ |
H A D | ent_setup.c | 77 heim_utf8_string pw = tl_data->tl_data_contents; local 79 if (pw[tl_data->tl_data_length] != '\0') 82 ret = hdb_entry_set_password(context, db, &ent->entry, pw);
|
/freebsd-current/usr.sbin/cron/cron/ |
H A D | database.c | 240 struct passwd *pw = NULL; local 246 if (strcmp(fname, SYS_NAME) != 0 && !(pw = getpwnam(uname))) { 290 u = load_user(crontab_fd, pw, fname);
|
/freebsd-current/sbin/fsdb/ |
H A D | fsdbutil.c | 109 struct passwd *pw; local 177 if ((pw = getpwuid(DIP(dp, di_uid)))) 178 printf("OWNER=%s ", pw->pw_name);
|