Searched refs:pw_name (Results 1 - 25 of 211) sorted by relevance

123456789

/freebsd-9.3-release/lib/libcompat/4.4/
H A Dcuserid.c52 (void)strncpy(s, pwd->pw_name, L_cuserid);
55 return (pwd->pw_name);
/freebsd-9.3-release/crypto/openssh/openbsd-compat/
H A Dport-irix.c59 jid = jlimit_startjob(pw->pw_name, pw->pw_uid, "interactive");
72 if ((projid = getdfltprojuser(pw->pw_name)) == -1) {
78 (int)projid, pw->pw_name, strerror(errno));
H A Dport-uw.c74 if (!nischeck(pw->pw_name)) {
112 if (strcmp (ent->pw_name, namep) == 0) {
137 if (!ia_openinfo(pw->pw_name,&uinfo)) {
H A Dport-aix.c80 len = sizeof("LOGNAME= NAME= ") + (2 * strlen(pw->pw_name));
83 i = snprintf(cp, len, "LOGNAME=%s%cNAME=%s%c", pw->pw_name, '\0',
84 pw->pw_name, '\0');
176 char *authmsg = NULL, *msg = NULL, *name = ctxt->pw->pw_name;
251 result = loginrestrictions(pw->pw_name, S_RLOGIN, NULL, &msg);
269 logit("Login restricted for %s: %.100s", pw->pw_name, msg);
381 aix_krb5_get_principal_name(char *pw_name) argument
386 if (getuserattr(pw_name, S_AUTHDOMAIN, &authdomain, SEC_CHAR) != 0)
388 if (getuserattr(pw_name, S_AUTHNAME, &authname, SEC_CHAR) != 0)
392 xasprintf(&principal, "%s@%s", authname ? authname : pw_name, authdomai
[all...]
H A Dxcrypt.c100 struct spwd *spw = getspnam(pw->pw_name);
112 if (issecure() && (spw = getpwanam(pw->pw_name)) != NULL)
115 struct pr_passwd *spw = getprpwnam(pw->pw_name);
/freebsd-9.3-release/lib/libc/gen/
H A Dpw_scan.c82 if (!(pw->pw_name = strsep(&bp, ":"))) /* login */
84 root = !strcmp(pw->pw_name, "root");
85 if (pw->pw_name[0] && (pw->pw_name[0] != '+' || pw->pw_name[1] == '\0'))
98 if (pw->pw_name[0] != '+' && pw->pw_name[0] != '-') {
100 warnx("no uid for user %s", pw->pw_name);
133 if (pw->pw_name[0] != '+' && pw->pw_name[
[all...]
/freebsd-9.3-release/crypto/openssh/
H A Dplatform.c181 if (setpcred(pw->pw_name, creds) == -1)
186 ssh_selinux_setup_exec_context(pw->pw_name);
191 platform_krb5_get_principal_name(const char *pw_name) argument
194 return aix_krb5_get_principal_name(pw_name);
H A Dauth-rhosts.c235 client_user, pw->pw_name)) {
241 client_user, pw->pw_name)) {
253 "no home directory %.200s", pw->pw_name, pw->pw_dir);
255 "no home directory %.200s", pw->pw_name, pw->pw_dir);
262 "bad ownership or modes for home directory.", pw->pw_name);
264 "bad ownership or modes for home directory.", pw->pw_name);
289 pw->pw_name, buf);
300 if (check_rhosts_file(buf, hostname, ipaddr, client_user, pw->pw_name)) {
306 hostname, ipaddr, client_user, pw->pw_name);
H A Dauth-sia.c90 if (sia_ses_init(&ent, saved_argc, saved_argv, host, pw->pw_name,
102 pw->pw_name, host);
106 pw->pw_name, host);
H A Dauth-skey.c81 skey_haskey(authctxt->pw->pw_name) == 0 &&
82 skey_passcheck(authctxt->pw->pw_name, responses[0]) != -1)
H A Dauth.c109 if (!pw || !pw->pw_name)
114 spw = getspnam(pw->pw_name);
154 pw->pw_name);
170 "does not exist", pw->pw_name, shell);
177 "is not executable", pw->pw_name, shell);
193 if (match_user(pw->pw_name, hostname, ipaddr,
197 pw->pw_name, hostname);
204 if (match_user(pw->pw_name, hostname, ipaddr,
210 "not listed in AllowUsers", pw->pw_name, hostname);
216 if (ga_init(pw->pw_name, p
[all...]
/freebsd-9.3-release/usr.bin/mail/
H A Dgetname.c54 return (pw->pw_name);
/freebsd-9.3-release/release/picobsd/tinyware/passwd/
H A Dpw_copy.c72 return (strcmp(pw->pw_name, buf_pw.pw_name) == 0
129 if (strcmp(buf, pw->pw_name)) {
139 _PATH_MASTERPASSWD, pw->pw_name);
143 pw->pw_name, pw->pw_passwd,
159 pw->pw_name, _PATH_MASTERPASSWD);
164 pw->pw_name, pw->pw_passwd,
214 if (!(pw->pw_name = strsep(&bp, ":"))) /* login */
216 root = !strcmp(pw->pw_name, "root");
217 if(pw->pw_name[
[all...]
/freebsd-9.3-release/usr.sbin/rpc.yppasswdd/
H A Dyppasswdd_server.c75 pwd->pw_name = xpwd->pw_name;
107 EXPAND(yp_password.pw_name);
164 if (npw->pw_name[0] == '+' || npw->pw_name[0] == '-') {
190 if (npw->pw_name[0] == '+' || npw->pw_name[0] == '-') {
197 npw->pw_name, npw->pw_uid);
198 yp_error("database says user %s has UID %d", opw->pw_name,
205 npw->pw_name, np
[all...]
H A Dyppasswd_private.x43 string pw_name<>; /* username */
/freebsd-9.3-release/crypto/heimdal/appl/su/
H A Dsu.c115 free (p->pw_name);
130 info->pw_name = strdup(pwd->pw_name);
136 if(info->pw_name == NULL || info->pw_passwd == NULL ||
198 login_name = login_info->pw_name;
199 if (strcmp (su_info->pw_name, "root") == 0)
206 su_info->pw_name,
214 if (su_info->pw_uid == 0 && !krb5_kuserok(context, p, su_info->pw_name))
304 login_name = login_info->pw_name;
305 if (strcmp (su_info->pw_name, "roo
[all...]
/freebsd-9.3-release/crypto/heimdal/lib/roken/
H A Dk_getpwuid.c55 spwd = getspnam (p->pw_name);
H A Dget_default_username.c76 return pwd->pw_name;
/freebsd-9.3-release/contrib/opie/
H A Dopiepasswd.c177 if (strcmp(argv[optind], pp->pw_name)) {
189 opielock(pp->pw_name);
190 rval = opielookup(&opie, pp->pw_name);
194 printf("Updating %s:\n", pp->pw_name);
197 printf("Adding %s:\n", pp->pw_name);
246 if (opiechallenge(&opie, pp->pw_name, tmp)) {
281 if (opiechallenge(&opie, pp->pw_name, tmp)) {
303 finish(pp->pw_name);
324 if (!(rval = opiepasswd(&opie, force, pp->pw_name, n, seed, tmp)))
325 finish(pp->pw_name);
[all...]
H A Dopiesu.c156 if (!(thisuser.pw_name = malloc(strlen(pwd->pw_name) + 1)))
158 strcpy(thisuser.pw_name, pwd->pw_name);
320 opiestrncpy(buf, pwd->pw_name, sizeof(buf));
394 printf("%s's system password: ", thisuser.pw_name);
403 printf("%s's response: ", thisuser.pw_name);
412 printf("%s's password: ", thisuser.pw_name);
420 printf(" (echo on)\n%s's password: ", thisuser.pw_name);
480 lsetenv("USER", thisuser.pw_name, userbu
[all...]
/freebsd-9.3-release/contrib/top/
H A Dusername.c154 return(enter_user(pwd->pw_uid, pwd->pw_name, 1));
179 return(enter_user(pwd->pw_uid, pwd->pw_name, 1));
181 (void) enter_user(pwd->pw_uid, pwd->pw_name, 0);
/freebsd-9.3-release/usr.bin/passwd/
H A Dpasswd.c116 pwd->pw_name);
120 pwd->pw_name);
140 pam_err = pam_start("passwd", pwd->pw_name, &pamc, &pamh);
/freebsd-9.3-release/include/rpcsvc/
H A Dyppasswd.x56 string pw_name<>; /* username */
/freebsd-9.3-release/usr.bin/at/
H A Dperm.c103 return check_for_user(fp, pentry->pw_name);
116 return !check_for_user(fp, pentry->pw_name);
/freebsd-9.3-release/usr.sbin/pw/
H A Dpwupd.c117 pwd->pw_name, (long) pwd->pw_uid, (long) pwd->pw_gid,
122 pwd->pw_name, pw, (long) pwd->pw_uid, (long) pwd->pw_gid,
158 int isrename = pwd!=NULL && strcmp(user, pwd->pw_name);
198 return pw_update(pwd, pwd->pw_name, UPD_CREATE);
210 return pw_update(NULL, pwd->pw_name, UPD_DELETE);

Completed in 203 milliseconds

123456789