/macosx-10.9.5/OpenSSH-186/openssh/ |
H A D | auth-rh-rsa.c | 42 auth_rhosts_rsa_key_allowed(struct passwd *pw, char *cuser, char *chost, argument 51 if (!auth_rhosts(pw, cuser)) 54 host_status = check_key_in_hostfiles(pw, client_host_key, 69 struct passwd *pw = authctxt->pw; local 81 if (!PRIVSEP(auth_rhosts_rsa_key_allowed(pw, cuser, chost, client_host_key))) { 100 pw->pw_name, cuser, chost);
|
H A D | uidswap.c | 59 temporarily_use_uid(struct passwd *pw) argument 66 (u_int)pw->pw_uid, (u_int)pw->pw_gid, 97 if (initgroups(pw->pw_name, pw->pw_gid) < 0) 98 fatal("initgroups: %s: %.100s", pw->pw_name, 103 if (initgroups(pw->pw_name, pw->pw_gid) < 0) 104 fatal("initgroups: %s: %.100s", pw->pw_name, 132 if (setegid(pw 204 permanently_set_uid(struct passwd *pw) argument [all...] |
H A D | auth-rhosts.c | 187 auth_rhosts(struct passwd *pw, const char *client_user) argument 193 return auth_rhosts2(pw, client_user, hostname, ipaddr); 197 auth_rhosts2_raw(struct passwd *pw, const char *client_user, const char *hostname, argument 209 temporarily_use_uid(pw); 219 pw->pw_dir, rhosts_files[rhosts_file_index]); 233 if (pw->pw_uid != 0) { 235 client_user, pw->pw_name)) { 241 client_user, pw->pw_name)) { 251 if (stat(pw->pw_dir, &st) < 0) { 253 "no home directory %.200s", pw 317 auth_rhosts2(struct passwd *pw, const char *client_user, const char *hostname, const char *ipaddr) argument [all...] |
H A D | platform.c | 93 platform_setusercontext(struct passwd *pw) argument 103 solaris_set_default_project(pw); 126 if (getluid() == -1 && setluid(pw->pw_uid) == -1) 137 platform_setusercontext_post_groups(struct passwd *pw) argument 152 irix_setusercontext(pw); 156 aix_usrinfo(pw); 160 if (set_id(pw->pw_name) != 0) { 179 if (setpcred(pw->pw_name, creds) == -1) 184 ssh_selinux_setup_exec_context(pw->pw_name);
|
H A D | auth.c | 96 allowed_user(struct passwd * pw) argument 105 /* Shouldn't be called if pw is NULL, but better safe than sorry... */ 106 if (!pw || !pw->pw_name) 111 spw = getspnam(pw->pw_name); 119 passwd = pw->pw_passwd; 123 passwd = get_iaf_password(pw); 151 pw->pw_name); 162 char *shell = xstrdup((pw->pw_shell[0] == '\0') ? 163 _PATH_BSHELL : pw 340 expand_authorized_keys(const char *filename, struct passwd *pw) argument 363 authorized_principals_file(struct passwd *pw) argument 373 check_key_in_hostfiles(struct passwd *pw, Key *key, const char *host, const char *sysfile, const char *userfile) argument 495 secure_filename(FILE *f, const char *file, struct passwd *pw, char *err, size_t errlen) argument 510 auth_openfile(const char *file, struct passwd *pw, int strict_modes, int log_missing, char *file_type) argument 553 auth_openkeyfile(const char *file, struct passwd *pw, int strict_modes) argument 559 auth_openprincipals(const char *file, struct passwd *pw, int strict_modes) argument 574 struct passwd *pw; local [all...] |
/macosx-10.9.5/OpenSSH-186/openssh/openbsd-compat/ |
H A D | port-irix.c | 47 irix_setusercontext(struct passwd *pw) argument 59 jid = jlimit_startjob(pw->pw_name, pw->pw_uid, "interactive"); 72 if ((projid = getdfltprojuser(pw->pw_name)) == -1) { 78 (int)projid, pw->pw_name, strerror(errno)); 82 debug("Setting sat id to %d", (int) pw->pw_uid); 83 if (satsetid(pw->pw_uid))
|
H A D | port-uw.c | 55 struct passwd *pw = authctxt->pw; local 60 char *pw_password = authctxt->valid ? shadow_pw(pw) : pw->pw_passwd; 74 if (!nischeck(pw->pw_name)) { 132 get_iaf_password(struct passwd *pw) argument 137 if (!ia_openinfo(pw->pw_name,&uinfo)) {
|
/macosx-10.9.5/system_cmds-597.90.1/passwd.tproj/ |
H A D | file_passwd.c | 49 static struct passwd pw; local 55 free(pw.pw_name); 56 free(pw.pw_passwd); 57 free(pw.pw_class); 58 free(pw.pw_gecos); 59 free(pw.pw_dir); 60 free(pw.pw_shell); 61 memset(&pw, 0, sizeof(pw)); 90 pw 117 struct passwd *pw = parse_user(line, len); local 149 struct passwd *pw = parse_user(line, len); local 189 struct passwd *pw; local [all...] |
/macosx-10.9.5/system_cmds-597.90.1/system_cmds-597.1.1/passwd.tproj/ |
H A D | file_passwd.c | 49 static struct passwd pw; local 55 free(pw.pw_name); 56 free(pw.pw_passwd); 57 free(pw.pw_class); 58 free(pw.pw_gecos); 59 free(pw.pw_dir); 60 free(pw.pw_shell); 61 memset(&pw, 0, sizeof(pw)); 90 pw 117 struct passwd *pw = parse_user(line, len); local 149 struct passwd *pw = parse_user(line, len); local 189 struct passwd *pw; local [all...] |
/macosx-10.9.5/apache-786.1/httpd/srclib/apr/user/unix/ |
H A D | userinfo.c | 36 struct passwd *pw, 48 rv = getpwnam_r(username, pw, pwbuf, PWBUF_SIZE, &pwptr); 60 memcpy(pw, pwptr, sizeof *pw); 73 struct passwd pw; local 77 if ((rv = getpwnam_safe(username, &pw, pwbuf)) != APR_SUCCESS) 82 *dirname = apr_pstrcat(p, pw.pw_dir, pw.pw_name, NULL); 84 *dirname = apr_pstrdup(p, pw.pw_dir); 107 struct passwd pw; local 35 getpwnam_safe(const char *username, struct passwd *pw, char pwbuf[PWBUF_SIZE]) argument 123 struct passwd *pw; local [all...] |
/macosx-10.9.5/apr-30/apr/apr/user/unix/ |
H A D | userinfo.c | 36 struct passwd *pw, 48 rv = getpwnam_r(username, pw, pwbuf, PWBUF_SIZE, &pwptr); 60 memcpy(pw, pwptr, sizeof *pw); 73 struct passwd pw; local 77 if ((rv = getpwnam_safe(username, &pw, pwbuf)) != APR_SUCCESS) 82 *dirname = apr_pstrcat(p, pw.pw_dir, pw.pw_name, NULL); 84 *dirname = apr_pstrdup(p, pw.pw_dir); 107 struct passwd pw; local 35 getpwnam_safe(const char *username, struct passwd *pw, char pwbuf[PWBUF_SIZE]) argument 123 struct passwd *pw; local [all...] |
/macosx-10.9.5/tcl-102/tk/tk/generic/ttk/ |
H A D | ttkPanedwindow.c | 47 * pos(sash[#sash]) = size(pw) // sentinel value, constraint 49 * size(pw) = sum(size(pane(0..#pane))) + sum(size(sash(0..#sash))) 111 static Pane *CreatePane(Tcl_Interp *interp, Paned *pw, Tk_Window slaveWindow) argument 113 Tk_OptionTable optionTable = pw->paned.paneOptionTable; 124 = pw->paned.orient == TTK_ORIENT_HORIZONTAL 133 static void DestroyPane(Paned *pw, Pane *pane) argument 136 Tk_FreeConfigOptions(record, pw->paned.paneOptionTable, pw->core.tkwin); 144 Tcl_Interp *interp, Paned *pw, Pane *pane, Tk_Window slaveWindow, 147 Ttk_Manager *mgr = pw 143 ConfigurePane( Tcl_Interp *interp, Paned *pw, Pane *pane, Tk_Window slaveWindow, int objc, Tcl_Obj *const objv[]) argument 188 ShoveUp(Paned *pw, int i, int pos) argument 208 ShoveDown(Paned *pw, int i, int pos) argument 231 Paned *pw = recordPtr; local 273 AdjustPanes(Paned *pw) argument 303 PlaceSashes(Paned *pw, int width, int height) argument 368 PlacePanes(Paned *pw) argument 400 Paned *pw = managerData; local 407 Paned *pw = managerData; local 412 AddPane( Tcl_Interp *interp, Paned *pw, int destIndex, Tk_Window slaveWindow, int objc, Tcl_Obj *const objv[]) argument 449 Paned *pw = managerData; local 498 Paned *pw = recordPtr; local 510 Paned *pw = recordPtr; local 523 Paned *pw = clientData; local 544 Paned *pw = recordPtr; local 580 SashLayout(Paned *pw, int index) argument 597 DrawSash(Paned *pw, int index, Drawable d) argument 604 Paned *pw = recordPtr; local 622 Paned *pw = recordPtr; local 647 Paned *pw = recordPtr; local 692 Paned *pw = recordPtr; local 719 Paned *pw = recordPtr; local 771 Paned *pw = recordPtr; local 808 Paned *pw = recordPtr; local 835 Paned *pw = recordPtr; local [all...] |
/macosx-10.9.5/sudo-72/src/auth/ |
H A D | sudo_auth.h | 31 int (*init) __P((struct passwd *pw, struct sudo_auth *auth)); 32 int (*setup) __P((struct passwd *pw, char **prompt, struct sudo_auth *auth)); 33 int (*verify) __P((struct passwd *pw, char *p, struct sudo_auth *auth)); 34 int (*cleanup) __P((struct passwd *pw, struct sudo_auth *auth)); 49 int fwtk_init __P((struct passwd *pw, sudo_auth *auth)); 50 int fwtk_verify __P((struct passwd *pw, char *prompt, sudo_auth *auth)); 51 int fwtk_cleanup __P((struct passwd *pw, sudo_auth *auth)); 52 int pam_init __P((struct passwd *pw, sudo_auth *auth)); 53 int pam_verify __P((struct passwd *pw, char *prompt, sudo_auth *auth)); 54 int pam_cleanup __P((struct passwd *pw, sudo_aut [all...] |
H A D | kerb4.c | 51 kerb4_init(pw, auth) 52 struct passwd *pw; 58 if (pw->pw_uid == 0) 72 kerb4_verify(pw, pass, auth) 73 struct passwd *pw; 86 _PATH_SUDO_TIMEDIR, (unsigned int) pw->pw_uid); 90 error = krb_get_pw_in_tkt(pw->pw_name, "", realm, "krbtgt", realm,
|
H A D | secureware.c | 56 secureware_init(pw, auth) 57 struct passwd *pw; 67 auth->data = sudo_getepw(pw); 73 secureware_verify(pw, pass, auth) 74 struct passwd *pw; 103 secureware_cleanup(pw, auth) 104 struct passwd *pw;
|
H A D | securid.c | 59 securid_init(pw, auth) 60 struct passwd *pw; 74 securid_setup(pw, promptp, auth) 75 struct passwd *pw; 84 strlcpy(sd->username, pw->pw_name, 32); 93 securid_verify(pw, pass, auth) 94 struct passwd *pw;
|
/macosx-10.9.5/remote_cmds-41.90.1/rpc_yppasswdd.tproj/ |
H A D | passwd.c | 275 /* for use in pw_copy(). Compare a pw entry to a pw struct. */ 277 pw_equal (buf, pw) 279 struct passwd *pw; 287 return !strcmp(pw->pw_name, buf_pw.pw_name) 288 && pw->pw_uid == buf_pw.pw_uid 289 && pw->pw_gid == buf_pw.pw_gid 290 && !strcmp(pw->pw_class, buf_pw.pw_class) 291 && (long)pw->pw_change == (long)buf_pw.pw_change 292 && (long)pw [all...] |
/macosx-10.9.5/system_cmds-597.90.1/chpass.tproj/ |
H A D | field.c | 90 p_login(char *p, struct passwd *pw, ENTRY *ep __unused) argument 101 if (!(pw->pw_name = strdup(p))) { 118 p_passwd(char *p, struct passwd *pw, ENTRY *ep __unused) argument 121 if (!(pw->pw_passwd = strdup(p))) { 132 p_uid(char *p, struct passwd *pw, ENTRY *ep __unused) argument 152 pw->pw_uid = id; 159 p_gid(char *p, struct passwd *pw, ENTRY *ep __unused) argument 175 pw->pw_gid = gr->gr_gid; 186 pw->pw_gid = id; 193 p_class(char *p, struct passwd *pw, ENTR argument 207 p_change(char *p, struct passwd *pw, ENTRY *ep __unused) argument 219 p_expire(char *p, struct passwd *pw, ENTRY *ep __unused) argument 244 p_hdir(char *p, struct passwd *pw, ENTRY *ep __unused) argument 262 p_shell(char *p, struct passwd *pw, ENTRY *ep __unused) argument [all...] |
H A D | edit.c | 98 static int display(const char *tfn, struct passwd *pw); 99 static struct passwd *verify(const char *tfn, struct passwd *pw); 104 edit(const char *tfn, CFDictionaryRef pw) argument 107 edit(const char *tfn, struct passwd *pw) 118 if (display(tfn, pw) == -1) 132 return (pw_dup(pw)); 137 if ((npw = verify(tfn, pw)) != NULL) 163 display(const char *tfn, struct passwd *pw) 204 "#Changing user information for %s.\n", pw->pw_name); 206 (void)fprintf(fp, "Login: %s\n", pw 285 verify(const char* tfn, CFDictionaryRef pw) argument [all...] |
/macosx-10.9.5/system_cmds-597.90.1/system_cmds-597.1.1/chpass.tproj/ |
H A D | field.c | 90 p_login(char *p, struct passwd *pw, ENTRY *ep __unused) argument 101 if (!(pw->pw_name = strdup(p))) { 118 p_passwd(char *p, struct passwd *pw, ENTRY *ep __unused) argument 121 if (!(pw->pw_passwd = strdup(p))) { 132 p_uid(char *p, struct passwd *pw, ENTRY *ep __unused) argument 152 pw->pw_uid = id; 159 p_gid(char *p, struct passwd *pw, ENTRY *ep __unused) argument 175 pw->pw_gid = gr->gr_gid; 186 pw->pw_gid = id; 193 p_class(char *p, struct passwd *pw, ENTR argument 207 p_change(char *p, struct passwd *pw, ENTRY *ep __unused) argument 219 p_expire(char *p, struct passwd *pw, ENTRY *ep __unused) argument 244 p_hdir(char *p, struct passwd *pw, ENTRY *ep __unused) argument 262 p_shell(char *p, struct passwd *pw, ENTRY *ep __unused) argument [all...] |
/macosx-10.9.5/Heimdal-323.92.1/kadmin/ |
H A D | random_password.c | 50 static void generate_password(char **pw, int num_classes, ...); 54 random_password(char *pw, size_t len) argument 61 otp_print_stddict (newkey, pw, len); 62 strlwr(pw); 70 strlcpy(pw, pass, len); 112 generate_password(char **pw, int num_classes, ...) argument 124 *pw = NULL; 138 *pw = malloc(len + 1); 139 if(*pw == NULL) { 149 (*pw)[ [all...] |
/macosx-10.9.5/system_cmds-597.90.1/pwd_mkdb.tproj/ |
H A D | pw_scan.c | 58 pw_scan(char *bp, struct passwd *pw, int *flags) argument 69 pw->pw_name = NULL; 76 pw->pw_name = p; 77 root = !strcmp(pw->pw_name, "root"); 79 if (!(pw->pw_passwd = strsep(&bp, ":"))) /* passwd */ 101 pw->pw_uid = (uid_t)id; 120 pw->pw_gid = (gid_t)id; 124 pw->pw_class = strsep(&bp, ":"); /* class */ 127 pw->pw_change = atol(p); 132 pw [all...] |
/macosx-10.9.5/system_cmds-597.90.1/system_cmds-597.1.1/pwd_mkdb.tproj/ |
H A D | pw_scan.c | 58 pw_scan(char *bp, struct passwd *pw, int *flags) argument 69 pw->pw_name = NULL; 76 pw->pw_name = p; 77 root = !strcmp(pw->pw_name, "root"); 79 if (!(pw->pw_passwd = strsep(&bp, ":"))) /* passwd */ 101 pw->pw_uid = (uid_t)id; 120 pw->pw_gid = (gid_t)id; 124 pw->pw_class = strsep(&bp, ":"); /* class */ 127 pw->pw_change = atol(p); 132 pw [all...] |
/macosx-10.9.5/OpenLDAP-491.1/OpenLDAP/libraries/liblutil/ |
H A D | ptest.c | 50 static struct berval pw[] = { variable in typeref:struct:berval 69 for( j = 0; pw[j].bv_len; j++ ) { 71 rc = lutil_authpasswd_hash( &pw[j], 76 passwd = lutil_passwd_hash( &pw[j], hash[i] ); 82 hash[i], pw[j].bv_val, pw[j].bv_len ); 88 rc = lutil_authpasswd( &pw[j], passwd, salt, NULL ); 90 rc = lutil_passwd( passwd, &pw[j], NULL ); 94 pw[j].bv_val, pw[ [all...] |
/macosx-10.9.5/misc_cmds-32/calendar/ |
H A D | calendar.c | 61 struct passwd *pw; variable in typeref:struct:passwd 129 while ((pw = getpwent()) != NULL) { 130 (void)setegid(pw->pw_gid); 131 (void)initgroups(pw->pw_name, pw->pw_gid); 132 (void)seteuid(pw->pw_uid); 133 if (!chdir(pw->pw_dir))
|