/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/zebra/vtysh/ |
H A D | vtysh_user.c | 173 user = user_lookup (passwd->pw_name); 179 if (vtysh_pam (passwd->pw_name))
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/testsuite/nsswitch/ |
H A D | getpwent_r.c | 35 fprintf(fptr,"%s:%s:%s:%d:%d\n", pw->pw_name, pw->pw_passwd,
|
/netgear-R7000-V1.0.7.12_1.2.5/src/router/busybox-1.x/include/ |
H A D | pwd_.h | 35 char *pw_name; /* Username. */ member in struct:passwd
|
/netgear-R7000-V1.0.7.12_1.2.5/src/router/busybox-1.x/libbb/ |
H A D | bb_pwd.c | 53 (myuser ? myuser->pw_name : (char*)myuser),
|
H A D | obscure.c | 103 if (string_checker(new_p, pw->pw_name)) {
|
/netgear-R7000-V1.0.7.12_1.2.5/src/router/busybox-1.x/loginutils/ |
H A D | su.c | 48 old_user = xstrdup(USE_FEATURE_UTMP(getlogin() ? : ) (pw = getpwuid(cur_uid)) ? pw->pw_name : "");
|
H A D | sulogin.c | 85 if (getspnam_r(pwd->pw_name, &spw, buffer, sizeof(buffer), &result)) {
|
H A D | passwd.c | 31 pw->pw_name); 133 if (getspnam_r(pw->pw_name, &spw, buffer, sizeof(buffer), &result)
|
H A D | vlock.c | 108 printf("Virtual Console%s locked by %s.\n", (o_lock_all) ? "s" : "", pw->pw_name);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/netatalk-2.2.5/etc/afpd/ |
H A D | uam.c | 245 int len = strlen(pwent->pw_name); 247 strncpy(name,pwent->pw_name, MAXUSERLEN); 249 LOG(log_error, logtype_uams, "MAJOR:The name %s is longer than %d",pwent->pw_name,MAXUSERLEN); 271 pwent->pw_name, -1, pwname, sizeof(username)); 281 strlcpy(name, pwent->pw_name, len); 301 LOG(log_info, logtype_afpd, "uam_checkuser: User %s does not have a shell", pwd->pw_name); 312 LOG(log_info, logtype_afpd, "illegal shell %s for %s", pwd->pw_shell, pwd->pw_name);
|
H A D | auth.c | 255 afp_versions[afp_version_index].av_name, pwd->pw_name); 273 pwd->pw_name, pwd->pw_uid, addr_net, addr_node, nodename); 279 fprintf(fp, "%s:%d\n", pwd->pw_name, mypid); 287 fprintf(fp, "%s:%d\n", pwd->pw_name, mypid); 310 LOG(log_info, logtype_afpd, "admin login -- %s", pwd->pw_name ); 334 sprintf( hostname, "%s@%s", pwd->pw_name, clientname ); 336 if( sia_become_user( NULL, argc, argv, hostname, pwd->pw_name, 345 LOG(log_error, logtype_afpd, "login: %s %s", pwd->pw_name, strerror(errno) ); 351 LOG(log_error, logtype_afpd, "login: %s %s", pwd->pw_name, strerror(errno) ); 404 if (initgroups(pwd->pw_name, pw [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/auth/ |
H A D | pass_check.c | 178 (unsigned char *)pw->pw_name, 185 pw->pw_name, dce_errstr)); 198 pw->pw_name, dce_errstr)); 328 pw->pw_name, pw->pw_uid, pw->pw_gid)); 654 spass = getspnam(pass->pw_name); 667 if (ia_openinfo(pass->pw_name, &uinfo) != -1) 674 struct pr_passwd *pr_pw = getprpwnam(pass->pw_name);
|
H A D | auth_server.c | 377 nt_status = smb_pam_accountcheck(pass->pw_name); 382 nt_status = make_server_info_pw(server_info, pass->pw_name, pass);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/torture/ |
H A D | nsstest.c | 336 pwd->pw_name, 395 printf("Testing user %s\n", pwd->pw_name); 404 pwd = nss_getpwnam(pwd->pw_name); 411 printf("initgroups: "); nss_test_initgroups(pwd->pw_name, pwd->pw_gid);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/netatalk-2.2.5/etc/papd/ |
H A D | uam.c | 215 (strncasecmp(pwent->pw_name, name, len) == 0)) { 216 strncpy(name, pwent->pw_name, len); 243 LOG(log_info, logtype_papd, "illegal shell %s for %s",pwd->pw_shell,pwd->pw_name);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/passdb/ |
H A D | passdb.c | 145 pdb_set_username(user, pwd->pw_name, PDB_SET); 164 if ( strequal( pwd->pw_name, guest_account ) ) { 173 if (pwd->pw_name[strlen(pwd->pw_name)-1] == '$') { 178 pwd->pw_name)); 187 pwd->pw_name)); 194 lp_logon_path(), pwd->pw_name, domain, pwd->pw_uid, pwd->pw_gid), 197 lp_logon_home(), pwd->pw_name, domain, pwd->pw_uid, pwd->pw_gid), 200 lp_logon_drive(), pwd->pw_name, domain, pwd->pw_uid, pwd->pw_gid), 203 lp_logon_script(), pwd->pw_name, domai [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/iptables-1.4.12.1/extensions/ |
H A D | libxt_owner.c | 304 if (pwd != NULL && pwd->pw_name != NULL) { 305 printf(" %s", pwd->pw_name); 353 if (pwd != NULL && pwd->pw_name != NULL) { 354 printf(" %s", pwd->pw_name); 402 if (pwd != NULL && pwd->pw_name != NULL) { 403 printf(" %s", pwd->pw_name);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/smbd/ |
H A D | chgpasswd.c | 351 DEBUG(3, ("chat_with_program: Cannot Allocate pty for password change: %s\n", pass->pw_name)); 363 DEBUG(3, ("chat_with_program: Cannot fork() child for password change: %s\n", pass->pw_name)); 372 DEBUG(3, ("chat_with_program: Child failed to change password: %s\n", pass->pw_name)); 429 DEBUG(3, ("chat_with_program: Dochild for user %s (uid=%d,gid=%d) (as_root = %s)\n", pass->pw_name, 446 (chstat ? "" : "un"), pass->pw_name)); 506 ret = smb_pam_passchange(pass->pw_name, oldpass, newpass);
|
/netgear-R7000-V1.0.7.12_1.2.5/src/router/iptables-1.4.12/src/extensions/ |
H A D | libxt_owner.c | 304 if (pwd != NULL && pwd->pw_name != NULL) { 305 printf(" %s", pwd->pw_name); 353 if (pwd != NULL && pwd->pw_name != NULL) { 354 printf(" %s", pwd->pw_name); 402 if (pwd != NULL && pwd->pw_name != NULL) { 403 printf(" %s", pwd->pw_name);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/netatalk-2.2.5/bin/afppasswd/ |
H A D | afppasswd.c | 238 if (strlen(pwd->pw_name) + FORMAT_LEN > sizeof(buf) - 1) 240 strcpy(buf, pwd->pw_name); 354 return update_passwd(path, pwd->pw_name, flags);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/netatalk-2.2.5/etc/uams/ |
H A D | uams_passwd.c | 106 if (( sp = getspnam( pwd->pw_name )) == NULL ) { 244 if (( sp = getspnam( pwd->pw_name )) == NULL ) { 334 if (( sp = getspnam( pwd->pw_name )) == NULL ) {
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/curl/curl-7.36.0/lib/ |
H A D | setup-vms.h | 175 vms_passwd_cache.pw_name = my_passwd->pw_name;
|
/netgear-R7000-V1.0.7.12_1.2.5/src/router/iptables-1.x/extensions/ |
H A D | libip6t_owner.c | 154 if(pwd && pwd->pw_name) { 155 printf("%s ", pwd->pw_name);
|
H A D | libipt_owner.c | 155 if(pwd && pwd->pw_name) { 156 printf("%s ", pwd->pw_name);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/bftpd-1.6.6/ |
H A D | options.c | 127 endp->pwd.pw_name = strdup(temp->pw_name); 240 if (!strcmp(user, pwdlist->pwd.pw_name))
|