Searched refs:pw (Results 76 - 100 of 393) sorted by relevance

1234567891011>>

/macosx-10.10/adv_cmds-158/finger/
H A Dfinger.c174 struct passwd *pw; local
179 if ((pw = getpwnam(UNPRIV_NAME)) && pw->pw_uid > 0) {
180 setgid(pw->pw_gid);
181 setuid(pw->pw_uid);
244 struct passwd *pw; local
259 if ((pw = getpwnam(name)) == NULL)
261 if (hide(pw))
263 pn = enter_person(pw);
288 struct passwd *pw; local
[all...]
H A Dutil.c69 match(struct passwd *pw, const char *user) argument
74 if (!strcasecmp(pw->pw_name, user))
81 (void)strncpy(p = tbuf, pw->pw_gecos, sizeof(tbuf));
92 (void)strncpy(t, pw->pw_name,
163 enter_person(struct passwd *pw) argument
172 key.data = pw->pw_name;
173 key.size = strlen(pw->pw_name);
186 userinfo(pn, pw);
200 struct passwd *pw; local
210 if ((pw
338 userinfo(PERSON *pn, struct passwd *pw) argument
405 hide(struct passwd *pw) argument
[all...]
/macosx-10.10/sudo-73/src/auth/
H A Dpam.c84 pam_init(pw, auth)
85 struct passwd *pw;
97 pam_status = pam_start("sudo-i", pw->pw_name, &pam_conv, &pamh);
100 pam_status = pam_start("sudo", pw->pw_name, &pam_conv, &pamh);
130 pam_verify(pw, prompt, auth)
131 struct passwd *pw;
192 pam_cleanup(pw, auth)
193 struct passwd *pw;
208 pam_begin_session(pw)
209 struct passwd *pw;
[all...]
H A Dfwtk.c53 fwtk_init(pw, auth)
54 struct passwd *pw;
84 fwtk_verify(pw, prompt, auth)
85 struct passwd *pw;
95 (void) snprintf(buf, sizeof(buf), "authorize %s 'sudo'", pw->pw_name);
151 fwtk_cleanup(pw, auth)
152 struct passwd *pw;
H A Dkerb5.c93 kerb5_setup(pw, promptp, auth)
94 struct passwd *pw;
116 pw->pw_name, error_message(error));
132 kerb5_init(pw, auth)
133 struct passwd *pw;
153 if ((error = krb5_parse_name(sudo_context, pw->pw_name,
156 "%s: unable to parse '%s': %s", auth->name, pw->pw_name,
178 kerb5_verify(pw, pass, auth)
179 struct passwd *pw;
197 kerb5_verify(pw, pas
[all...]
/macosx-10.10/curl-83.1.2/curl/lib/
H A Dnetrc.c82 struct passwd pw, *pw_res; local
84 if(!getpwuid_r(geteuid(), &pw, pwbuf, sizeof(pwbuf), &pw_res)
86 home = strdup(pw.pw_dir);
94 struct passwd *pw; local
95 pw= getpwuid(geteuid());
96 if(pw) {
97 home = pw->pw_dir;
/macosx-10.10/OpenSSH-189/openssh/
H A Dauth2-pubkey.c148 if (PRIVSEP(user_key_allowed(authctxt->pw, key)) &&
166 if (PRIVSEP(user_key_allowed(authctxt->pw, key))) {
207 match_principals_file(char *file, struct passwd *pw, struct KeyCert *cert) argument
214 temporarily_use_uid(pw);
216 if ((f = auth_openprincipals(file, pw, options.strict_modes)) == NULL) {
250 if (auth_parse_options(pw, line_opts,
269 check_authkeys_file(FILE *f, char *file, Key* key, struct passwd *pw) argument
315 if (auth_parse_options(pw, key_options, file,
341 authorized_principals == NULL ? pw->pw_name : NULL,
344 if (auth_cert_options(key, pw) !
378 user_cert_trusted_ca(struct passwd *pw, Key *key) argument
436 user_key_allowed2(struct passwd *pw, Key *key, char *file) argument
463 struct passwd *pw; local
606 user_key_allowed(struct passwd *pw, Key *key) argument
[all...]
H A Dauth2-jpake.c227 if ((lc = login_getclass(authctxt->pw->pw_class)) == NULL &&
280 debug3("%s: valid %d pw %.5s...", __func__,
281 authctxt->valid, authctxt->pw->pw_passwd);
287 if (strncmp(authctxt->pw->pw_passwd, "$2$", 3) == 0 &&
288 strlen(authctxt->pw->pw_passwd) > 28) {
295 strlcpy(*salt, authctxt->pw->pw_passwd, salt_len);
297 } else if (strncmp(authctxt->pw->pw_passwd, "$2a$", 4) == 0 &&
298 strlen(authctxt->pw->pw_passwd) > 29) {
305 strlcpy(*salt, authctxt->pw->pw_passwd, salt_len);
307 } else if (strncmp(authctxt->pw
[all...]
/macosx-10.10/tcl-105/tcl_ext/tcllib/tcllib/modules/md5crypt/
H A Dmd5crypt.tcl53 proc ::md5crypt::md5crypt_tcl {magic pw salt} {
66 MD5Update $ctx $pw
71 MD5Update $ctx2 $pw
73 MD5Update $ctx2 $pw
76 for {set pl [string length $pw]} {$pl > 0} {incr pl -16} {
81 for {set i [string length $pw]} {$i != 0} {set i [expr {$i >> 1}]} {
85 set c [string index $pw 0]
97 MD5Update $ctx $pw
105 MD5Update $ctx $pw
110 MD5Update $ctx $pw
[all...]
H A Dmd5cryptc.tcl55 static char * md5crypt(const char *pw,
83 MD5Update(&ctx,(const unsigned char *)pw,strlen(pw));
91 /* Then just as many characters of the MD5(pw,salt,pw) */
93 MD5Update(&ctx1,(const unsigned char *)pw,strlen(pw));
95 MD5Update(&ctx1,(const unsigned char *)pw,strlen(pw));
98 for(pl = strlen(pw); p
[all...]
/macosx-10.10/cron-39/cron/
H A Duser.c53 load_user(crontab_fd, pw, name)
55 struct passwd *pw; /* NULL implies syscrontab */
66 pw = pw; // avoid unused parameter warning
111 e = load_entry(file, log_error, pw, envp);
/macosx-10.10/ksh-23/ksh/src/lib/libast/string/
H A Dstrgid.c74 register struct passwd* pw; local
90 else if (pw = getpwnam(name))
91 id = pw->pw_gid;
105 else if (pw = getpwnam("Administrator"))
106 id = pw->pw_gid;
/macosx-10.10/tcl-105/tcl_ext/sdx/sdx/lib/app-sdx/
H A Dfetch.tcl25 if {![regexp $re $url - x user pw site src]} {
31 set pw $tcl_platform(user)@[info hostname]
34 if {$pw == ""} {
36 set pw [gets stdin]
39 if {![FTP::Open $site $user $pw \
/macosx-10.10/Heimdal-398.1.2/appl/popper/
H A Dpop_pass.c95 struct passwd *pw; local
98 if ((pw = k_getpwnam(p->user)) == NULL) {
111 if (pop_dropcopy(p, pw) != POP_SUCCESS) return (POP_FAILURE);
116 if(changeuser(p, pw) != POP_SUCCESS) return POP_FAILURE;
127 struct passwd *pw; local
137 if ((pw = k_getpwnam(p->user)) == NULL)
167 if (pw->pw_passwd == NULL)
183 else if (!strcmp(crypt(p->pop_parm[1], pw->pw_passwd), pw->pw_passwd))
/macosx-10.10/Security-57031.1.35/securityd/src/
H A Dcredential.cpp29 extern "C" int checkpw_internal( const struct passwd *pw, const char* password );
48 struct passwd *pw = getpwnam(user); local
51 if (!pw) {
56 mUid = pw->pw_uid;
57 mName = pw->pw_name;
58 mRealName = pw->pw_gecos;
61 int checkpw_status = checkpw_internal(pw, passwd);
64 syslog(LOG_ERR, "checkpw() returned %d; failed to authenticate user %s (uid %lu).", checkpw_status, pw->pw_name, pw->pw_uid);
/macosx-10.10/system_cmds-643.1.1/pwd_mkdb.tproj/
H A Dpwd_mkdb.c357 scan(FILE *fp, struct passwd *pw, int *flags) argument
378 if (!pw_scan(line, pw, flags)) {
497 db_store(FILE *fp, FILE *oldfp, DB *edp, DB *dp, struct passwd *pw, argument
514 for (cnt = 1; scan(fp, pw, &flags); ++cnt) {
517 if (pw->pw_name == NULL)
523 if ((pw->pw_name[0] == '+') || (pw->pw_name[0] == '-'))
527 if (pw->pw_name[0] == '+') {
528 if (!(flags & _PASSWORD_NOUID) && !pw->pw_uid)
531 if (!(flags & _PASSWORD_NOGID) && !pw
[all...]
/macosx-10.10/Security-57031.1.35/Security/include/security_asn1/
H A Dsecport.c365 threadmark_mark *tm, **pw; local
389 pw = &pool->first_mark;
390 while( *pw ) {
391 pw = &(*pw)->next;
394 *pw = tm;
421 threadmark_mark **pw, *tm; local
430 pw = &pool->first_mark;
431 while( *pw && (mark != (*pw)
469 threadmark_mark **pw, *tm; local
[all...]
/macosx-10.10/Security-57031.1.35/Security/libsecurity_asn1/Security/
H A Dsecport.c365 threadmark_mark *tm, **pw; local
389 pw = &pool->first_mark;
390 while( *pw ) {
391 pw = &(*pw)->next;
394 *pw = tm;
421 threadmark_mark **pw, *tm; local
430 pw = &pool->first_mark;
431 while( *pw && (mark != (*pw)
469 threadmark_mark **pw, *tm; local
[all...]
/macosx-10.10/Security-57031.1.35/Security/libsecurity_asn1/lib/
H A Dsecport.c365 threadmark_mark *tm, **pw; local
389 pw = &pool->first_mark;
390 while( *pw ) {
391 pw = &(*pw)->next;
394 *pw = tm;
421 threadmark_mark **pw, *tm; local
430 pw = &pool->first_mark;
431 while( *pw && (mark != (*pw)
469 threadmark_mark **pw, *tm; local
[all...]
/macosx-10.10/Security-57031.1.35/Security/libsecurity_asn1/security_asn1/
H A Dsecport.c365 threadmark_mark *tm, **pw; local
389 pw = &pool->first_mark;
390 while( *pw ) {
391 pw = &(*pw)->next;
394 *pw = tm;
421 threadmark_mark **pw, *tm; local
430 pw = &pool->first_mark;
431 while( *pw && (mark != (*pw)
469 threadmark_mark **pw, *tm; local
[all...]
/macosx-10.10/OpenLDAP-499.27/OpenLDAP/servers/slapd/back-passwd/
H A Dsearch.c53 struct passwd *pw,
61 struct passwd *pw; local
138 for ( pw = getpwent(); pw != NULL; pw = getpwent() ) {
158 if ( pw2entry( op->o_bd, pw, &e ) ) {
225 pw = getpwnam( rdn[0]->la_value.bv_val );
226 if ( pw == NULL ) {
233 rc = pw2entry( op->o_bd, pw, &e );
277 pw2entry( Backend *be, struct passwd *pw, Entr argument
[all...]
/macosx-10.10/Heimdal-398.1.2/appl/otp/
H A Dotp.c80 char pw[64]; local
94 if (UI_UTIL_read_pw_string (pw, sizeof(pw), prompt, 0) == 0 &&
95 otp_parse (newctx.key, pw, alg) == 0) {
143 char pw[OTP_MAX_PASSPHRASE + 1]; local
156 if (UI_UTIL_read_pw_string (pw, sizeof(pw), "Pass-phrase: ", 1))
158 if (strlen (pw) < OTP_MIN_PASSPHRASE)
161 } while(strlen(pw) < OTP_MIN_PASSPHRASE);
162 ctx.alg->init (ctx.key, pw, ct
271 struct passwd *pw; local
[all...]
/macosx-10.10/apache-793/httpd/support/
H A Dpasswd_common.c181 char *pw; local
198 pw = ctx->passwd;
203 apr_sha1_base64(pw, strlen(pw), ctx->out);
210 rv = apr_md5_encode(pw, salt, ctx->out, ctx->out_len);
220 apr_cpystrn(ctx->out, pw, ctx->out_len);
228 cbuf = crypt(pw, salt);
237 if (strlen(pw) > 8) {
238 char *truncpw = apr_pstrdup(ctx->pool, pw);
244 memset(truncpw, '\0', strlen(pw));
[all...]
/macosx-10.10/Heimdal-398.1.2/appl/login/
H A Dshadow.c64 check_shadow(const struct passwd *pw, const struct spwd *sp) argument
87 change_passwd(pw);
/macosx-10.10/Heimdal-398.1.2/lib/gssapi/krb5/
H A Dpname_to_uid.c51 struct passwd pw, *pwd;
68 if (getpwnam_r(localname, &pw, pwbuf, sizeof(pwbuf), &pwd) != 0) {

Completed in 146 milliseconds

1234567891011>>