/netbsd-current/usr.bin/rdist/ |
H A D | main.c | 99 strlcpy(user, pw->pw_name, sizeof(user));
|
H A D | expand.c | 218 if (pw == NULL || strcmp(pw->pw_name, expbuf+1) != 0) { 587 if (pw == NULL || strcmp(pw->pw_name, file) != 0) {
|
/netbsd-current/external/bsd/tmux/dist/ |
H A D | server-acl.c | 84 name = pw->pw_name;
|
/netbsd-current/crypto/external/bsd/openssh/dist/ |
H A D | auth-passwd.c | 152 as = auth_usercheck(authctxt->pw->pw_name, authctxt->style, "auth-ssh",
|
H A D | auth2-pubkey.c | 381 "u", user_pw->pw_name, (char *)NULL); 428 "u", user_pw->pw_name, 537 use_authorized_principals ? NULL : pw->pw_name, &reason) != 0) 652 "u", user_pw->pw_name, (char *)NULL); 689 "u", user_pw->pw_name, 710 av[1] = xstrdup(user_pw->pw_name);
|
H A D | session.c | 328 setproctitle("%s", authctxt->pw->pw_name); 692 s->pw->pw_name, 747 record_login(pid, s->tty, pw->pw_name, pw->pw_uid, 925 child_set_env(&env, &envsize, "USER", pw->pw_name); 926 child_set_env(&env, &envsize, "LOGNAME", pw->pw_name); 933 snprintf(buf, sizeof buf, "%.200s/%.50s", _PATH_MAILDIR, pw->pw_name); 1152 logit("User %.100s not allowed because %s exists", pw->pw_name, nl); 1236 if (setlogin(pw->pw_name) < 0) 1243 if (initgroups(pw->pw_name, pw->pw_gid) < 0) { 1266 "u", pw->pw_name, " [all...] |
/netbsd-current/lib/libpam/modules/pam_ssh/ |
H A D | pam_ssh.c | 313 if (initgroups(pwd->pw_name, pwd->pw_gid) == -1) { 316 __func__, pwd->pw_name, strerror(errno));
|
/netbsd-current/lib/libc/gen/ |
H A D | pwcache.c | 312 return (pw->pw_name); 314 (void)strlcpy(ptr->name, pw->pw_name, UNMLEN);
|
/netbsd-current/libexec/identd/ |
H A D | identd.c | 468 lport, fport, pw->pw_name, 470 (void)strlcpy(userbuf, pw->pw_name, sizeof(userbuf)); 476 " to %s", pw->pw_name, gethost((struct sockaddr *)&ss[0])); 959 (void)snprintf(&dest[bp], len - bp, "%s", pw->pw_name); 980 if (strcmp(*gmp, pw->pw_name) == 0) { 1003 if (strcmp(*gmp, pw->pw_name) == 0) {
|
/netbsd-current/dist/pf/usr.sbin/authpf/ |
H A D | authpf.c | 145 pw->pw_name, pw->pw_uid); 158 if (strlcpy(luser, pw->pw_name, sizeof(luser)) >= sizeof(luser)) { 159 syslog(LOG_ERR, "username too long: %s", pw->pw_name);
|
/netbsd-current/lib/libedit/ |
H A D | readline.c | 1906 && text[0] == pass->pw_name[0] 1907 && strcmp(text, pass->pw_name) == 0) 1914 return strdup(pass->pw_name);
|
/netbsd-current/usr.sbin/repquota/ |
H A D | repquota.c | 306 (void)addid(pw->pw_uid, idtype, pw->pw_name); 522 name = pw->pw_name;
|
/netbsd-current/usr.bin/at/ |
H A D | at.c | 293 mailname = pass_entry->pw_name; 489 LOGIN_NAME_MAX, pw ? pw->pw_name : "???",
|
/netbsd-current/usr.bin/vacation/ |
H A D | vacation.c | 268 cur->name = pw->pw_name; 280 sendmessage(pw->pw_name);
|
/netbsd-current/external/bsd/libbind/dist/irs/ |
H A D | dns_pw.c | 194 pvt->passwd.pw_name = cp;
|
H A D | lcl_pw.c | 298 EXPAND(pvt->passwd.pw_name);
|
H A D | nis_pw.c | 231 pvt->passwd.pw_name = cp;
|
/netbsd-current/libexec/comsat/ |
H A D | comsat.c | 266 initgroups(p->pw_name, p->pw_gid) == -1 ||
|
/netbsd-current/sbin/dump/ |
H A D | dumprmt.c | 122 if ((name = strdup(pwd->pw_name)) == NULL)
|
/netbsd-current/usr.bin/write/ |
H A D | write.c | 227 login = pwd->pw_name;
|
/netbsd-current/external/cddl/osnet/dist/lib/pyzfs/common/ |
H A D | userspace.py | 74 (0, 0): ("POSIX User", lambda id: pwd.getpwuid(int(id)).pw_name)
|
/netbsd-current/sys/external/bsd/compiler_rt/dist/lib/sanitizer_common/ |
H A D | sanitizer_platform_limits_openbsd.h | 152 char *pw_name; member in struct:__sanitizer::__sanitizer_passwd
|
H A D | sanitizer_platform_limits_solaris.h | 143 char *pw_name; member in struct:__sanitizer::__sanitizer_passwd
|
/netbsd-current/external/bsd/cron/dist/ |
H A D | database.c | 293 statbuf->st_uid != pw->pw_uid || strcmp(uname, pw->pw_name) != 0)) {
|
/netbsd-current/lib/libutil/ |
H A D | login_cap.c | 615 if (initgroups(pwd->pw_name, pwd->pw_gid) == -1) { 617 pwd->pw_name, pwd->pw_gid); 697 if (setlogin(pwd->pw_name) == -1) { 699 pwd->pw_name);
|