Searched refs:pw_name (Results 26 - 50 of 116) sorted by relevance

12345

/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/zebra/vtysh/
H A Dvtysh_user.c173 user = user_lookup (passwd->pw_name);
179 if (vtysh_pam (passwd->pw_name))
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/testsuite/nsswitch/
H A Dgetpwent_r.c35 fprintf(fptr,"%s:%s:%s:%d:%d\n", pw->pw_name, pw->pw_passwd,
/netgear-R7000-V1.0.7.12_1.2.5/src/router/busybox-1.x/include/
H A Dpwd_.h35 char *pw_name; /* Username. */ member in struct:passwd
/netgear-R7000-V1.0.7.12_1.2.5/src/router/busybox-1.x/libbb/
H A Dbb_pwd.c53 (myuser ? myuser->pw_name : (char*)myuser),
H A Dobscure.c103 if (string_checker(new_p, pw->pw_name)) {
/netgear-R7000-V1.0.7.12_1.2.5/src/router/busybox-1.x/loginutils/
H A Dsu.c48 old_user = xstrdup(USE_FEATURE_UTMP(getlogin() ? : ) (pw = getpwuid(cur_uid)) ? pw->pw_name : "");
H A Dsulogin.c85 if (getspnam_r(pwd->pw_name, &spw, buffer, sizeof(buffer), &result)) {
H A Dpasswd.c31 pw->pw_name);
133 if (getspnam_r(pw->pw_name, &spw, buffer, sizeof(buffer), &result)
H A Dvlock.c108 printf("Virtual Console%s locked by %s.\n", (o_lock_all) ? "s" : "", pw->pw_name);
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/netatalk-2.2.5/etc/afpd/
H A Duam.c245 int len = strlen(pwent->pw_name);
247 strncpy(name,pwent->pw_name, MAXUSERLEN);
249 LOG(log_error, logtype_uams, "MAJOR:The name %s is longer than %d",pwent->pw_name,MAXUSERLEN);
271 pwent->pw_name, -1, pwname, sizeof(username));
281 strlcpy(name, pwent->pw_name, len);
301 LOG(log_info, logtype_afpd, "uam_checkuser: User %s does not have a shell", pwd->pw_name);
312 LOG(log_info, logtype_afpd, "illegal shell %s for %s", pwd->pw_shell, pwd->pw_name);
H A Dauth.c255 afp_versions[afp_version_index].av_name, pwd->pw_name);
273 pwd->pw_name, pwd->pw_uid, addr_net, addr_node, nodename);
279 fprintf(fp, "%s:%d\n", pwd->pw_name, mypid);
287 fprintf(fp, "%s:%d\n", pwd->pw_name, mypid);
310 LOG(log_info, logtype_afpd, "admin login -- %s", pwd->pw_name );
334 sprintf( hostname, "%s@%s", pwd->pw_name, clientname );
336 if( sia_become_user( NULL, argc, argv, hostname, pwd->pw_name,
345 LOG(log_error, logtype_afpd, "login: %s %s", pwd->pw_name, strerror(errno) );
351 LOG(log_error, logtype_afpd, "login: %s %s", pwd->pw_name, strerror(errno) );
404 if (initgroups(pwd->pw_name, pw
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/auth/
H A Dpass_check.c178 (unsigned char *)pw->pw_name,
185 pw->pw_name, dce_errstr));
198 pw->pw_name, dce_errstr));
328 pw->pw_name, pw->pw_uid, pw->pw_gid));
654 spass = getspnam(pass->pw_name);
667 if (ia_openinfo(pass->pw_name, &uinfo) != -1)
674 struct pr_passwd *pr_pw = getprpwnam(pass->pw_name);
H A Dauth_server.c377 nt_status = smb_pam_accountcheck(pass->pw_name);
382 nt_status = make_server_info_pw(server_info, pass->pw_name, pass);
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/torture/
H A Dnsstest.c336 pwd->pw_name,
395 printf("Testing user %s\n", pwd->pw_name);
404 pwd = nss_getpwnam(pwd->pw_name);
411 printf("initgroups: "); nss_test_initgroups(pwd->pw_name, pwd->pw_gid);
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/netatalk-2.2.5/etc/papd/
H A Duam.c215 (strncasecmp(pwent->pw_name, name, len) == 0)) {
216 strncpy(name, pwent->pw_name, len);
243 LOG(log_info, logtype_papd, "illegal shell %s for %s",pwd->pw_shell,pwd->pw_name);
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/passdb/
H A Dpassdb.c145 pdb_set_username(user, pwd->pw_name, PDB_SET);
164 if ( strequal( pwd->pw_name, guest_account ) ) {
173 if (pwd->pw_name[strlen(pwd->pw_name)-1] == '$') {
178 pwd->pw_name));
187 pwd->pw_name));
194 lp_logon_path(), pwd->pw_name, domain, pwd->pw_uid, pwd->pw_gid),
197 lp_logon_home(), pwd->pw_name, domain, pwd->pw_uid, pwd->pw_gid),
200 lp_logon_drive(), pwd->pw_name, domain, pwd->pw_uid, pwd->pw_gid),
203 lp_logon_script(), pwd->pw_name, domai
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/iptables-1.4.12.1/extensions/
H A Dlibxt_owner.c304 if (pwd != NULL && pwd->pw_name != NULL) {
305 printf(" %s", pwd->pw_name);
353 if (pwd != NULL && pwd->pw_name != NULL) {
354 printf(" %s", pwd->pw_name);
402 if (pwd != NULL && pwd->pw_name != NULL) {
403 printf(" %s", pwd->pw_name);
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/smbd/
H A Dchgpasswd.c351 DEBUG(3, ("chat_with_program: Cannot Allocate pty for password change: %s\n", pass->pw_name));
363 DEBUG(3, ("chat_with_program: Cannot fork() child for password change: %s\n", pass->pw_name));
372 DEBUG(3, ("chat_with_program: Child failed to change password: %s\n", pass->pw_name));
429 DEBUG(3, ("chat_with_program: Dochild for user %s (uid=%d,gid=%d) (as_root = %s)\n", pass->pw_name,
446 (chstat ? "" : "un"), pass->pw_name));
506 ret = smb_pam_passchange(pass->pw_name, oldpass, newpass);
/netgear-R7000-V1.0.7.12_1.2.5/src/router/iptables-1.4.12/src/extensions/
H A Dlibxt_owner.c304 if (pwd != NULL && pwd->pw_name != NULL) {
305 printf(" %s", pwd->pw_name);
353 if (pwd != NULL && pwd->pw_name != NULL) {
354 printf(" %s", pwd->pw_name);
402 if (pwd != NULL && pwd->pw_name != NULL) {
403 printf(" %s", pwd->pw_name);
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/netatalk-2.2.5/bin/afppasswd/
H A Dafppasswd.c238 if (strlen(pwd->pw_name) + FORMAT_LEN > sizeof(buf) - 1)
240 strcpy(buf, pwd->pw_name);
354 return update_passwd(path, pwd->pw_name, flags);
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/netatalk-2.2.5/etc/uams/
H A Duams_passwd.c106 if (( sp = getspnam( pwd->pw_name )) == NULL ) {
244 if (( sp = getspnam( pwd->pw_name )) == NULL ) {
334 if (( sp = getspnam( pwd->pw_name )) == NULL ) {
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/curl/curl-7.36.0/lib/
H A Dsetup-vms.h175 vms_passwd_cache.pw_name = my_passwd->pw_name;
/netgear-R7000-V1.0.7.12_1.2.5/src/router/iptables-1.x/extensions/
H A Dlibip6t_owner.c154 if(pwd && pwd->pw_name) {
155 printf("%s ", pwd->pw_name);
H A Dlibipt_owner.c155 if(pwd && pwd->pw_name) {
156 printf("%s ", pwd->pw_name);
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/bftpd-1.6.6/
H A Doptions.c127 endp->pwd.pw_name = strdup(temp->pw_name);
240 if (!strcmp(user, pwdlist->pwd.pw_name))

Completed in 148 milliseconds

12345