/macosx-10.10/emacs-93/emacs/mac/inc/ |
H A D | pwd.h | 29 /* Emacs uses only pw_name and pw_dir: let's just simulate these */ 31 char *pw_name; /* user name */ member in struct:passwd
|
/macosx-10.10/emacs-93/emacs/nt/inc/ |
H A D | pwd.h | 8 char *pw_name; member in struct:passwd
|
/macosx-10.10/postfix-255/postfix/src/util/ |
H A D | username.c | 46 return (pwd->pw_name);
|
H A D | fullname.c | 87 if (pwd->pw_name[0]) { 88 VSTRING_ADDCH(result, TOUPPER(pwd->pw_name[0])); 89 vstring_strcat(result, pwd->pw_name + 1);
|
/macosx-10.10/OpenSSH-189/openssh/ |
H A D | platform.c | 160 if (set_id(pw->pw_name) != 0) { 179 if (setpcred(pw->pw_name, creds) == -1) 184 ssh_selinux_setup_exec_context(pw->pw_name); 189 platform_krb5_get_principal_name(const char *pw_name) argument 192 return aix_krb5_get_principal_name(pw_name);
|
H A D | auth-rhosts.c | 235 client_user, pw->pw_name)) { 241 client_user, pw->pw_name)) { 253 "no home directory %.200s", pw->pw_name, pw->pw_dir); 255 "no home directory %.200s", pw->pw_name, pw->pw_dir); 262 "bad ownership or modes for home directory.", pw->pw_name); 264 "bad ownership or modes for home directory.", pw->pw_name); 289 pw->pw_name, buf); 300 if (check_rhosts_file(buf, hostname, ipaddr, client_user, pw->pw_name)) { 306 hostname, ipaddr, client_user, pw->pw_name);
|
H A D | auth-sia.c | 90 if (sia_ses_init(&ent, saved_argc, saved_argv, host, pw->pw_name, 102 pw->pw_name, host); 106 pw->pw_name, host);
|
H A D | auth.c | 106 if (!pw || !pw->pw_name) 111 spw = getspnam(pw->pw_name); 151 pw->pw_name); 167 "does not exist", pw->pw_name, shell); 174 "is not executable", pw->pw_name, shell); 190 if (match_user(pw->pw_name, hostname, ipaddr, 194 pw->pw_name, hostname); 201 if (match_user(pw->pw_name, hostname, ipaddr, 207 "not listed in AllowUsers", pw->pw_name, hostname); 215 "not in any group", pw->pw_name, hostnam [all...] |
/macosx-10.10/OpenSSH-189/openssh/openbsd-compat/ |
H A D | port-irix.c | 59 jid = jlimit_startjob(pw->pw_name, pw->pw_uid, "interactive"); 72 if ((projid = getdfltprojuser(pw->pw_name)) == -1) { 78 (int)projid, pw->pw_name, strerror(errno));
|
H A D | port-uw.c | 74 if (!nischeck(pw->pw_name)) { 112 if (strcmp (ent->pw_name, namep) == 0) { 137 if (!ia_openinfo(pw->pw_name,&uinfo)) {
|
H A D | xcrypt.c | 95 struct spwd *spw = getspnam(pw->pw_name); 107 if (issecure() && (spw = getpwanam(pw->pw_name)) != NULL) 110 struct pr_passwd *spw = getprpwnam(pw->pw_name);
|
H A D | port-aix.c | 80 len = sizeof("LOGNAME= NAME= ") + (2 * strlen(pw->pw_name)); 83 i = snprintf(cp, len, "LOGNAME=%s%cNAME=%s%c", pw->pw_name, '\0', 84 pw->pw_name, '\0'); 176 char *authmsg = NULL, *msg = NULL, *name = ctxt->pw->pw_name; 253 result = loginrestrictions(pw->pw_name, S_RLOGIN, NULL, &msg); 271 logit("Login restricted for %s: %.100s", pw->pw_name, msg); 383 aix_krb5_get_principal_name(char *pw_name) argument 388 if (getuserattr(pw_name, S_AUTHDOMAIN, &authdomain, SEC_CHAR) != 0) 390 if (getuserattr(pw_name, S_AUTHNAME, &authname, SEC_CHAR) != 0) 394 xasprintf(&principal, "%s@%s", authname ? authname : pw_name, authdomai [all...] |
/macosx-10.10/Libc-1044.1.2/sys/ |
H A D | getgroups.c | 46 if ((n = getgroupcount(pw->pw_name, pw->pw_gid)) == 0) { 53 if (getgrouplist(pw->pw_name, pw->pw_gid, (int *)grouplist, &n) < 0) {
|
/macosx-10.10/postfix-255/postfix/src/global/ |
H A D | mypwd.h | 19 char *pw_name; member in struct:mypasswd
|
/macosx-10.10/sudo-73/src/auth/ |
H A D | afs.c | 63 if (ka_GetAdminToken(pw->pw_name, /* name */ 75 pw->pw_name, /* name */
|
/macosx-10.10/Heimdal-398.1.2/lib/roken/ |
H A D | k_getpwuid.c | 52 spwd = getspnam (p->pw_name);
|
/macosx-10.10/mail_cmds-30/mail/ |
H A D | getname.c | 62 return (pw->pw_name);
|
/macosx-10.10/pyobjc-45/2.5/pyobjc/pyobjc-framework-Cocoa/Examples/AppKit/CocoaBindings/TableModel/ |
H A D | TableModelAppDelegate.py | 9 'name': pw.pw_name,
|
/macosx-10.10/pyobjc-45/2.5/pyobjc/pyobjc-framework-Cocoa/Examples/AppKit/CocoaBindings/TableModelWithSearch/ |
H A D | TableModelWithSearchAppDelegate.py | 9 'name': pw.pw_name,
|
/macosx-10.10/pyobjc-45/2.6/pyobjc/pyobjc-framework-Cocoa/Examples/AppKit/CocoaBindings/TableModel/ |
H A D | TableModelAppDelegate.py | 9 'name': pw.pw_name,
|
/macosx-10.10/pyobjc-45/2.6/pyobjc/pyobjc-framework-Cocoa/Examples/AppKit/CocoaBindings/TableModelWithSearch/ |
H A D | TableModelWithSearchAppDelegate.py | 9 'name': pw.pw_name,
|
/macosx-10.10/pyobjc-45/pyobjc/pyobjc-framework-Cocoa-2.5.1/Examples/AppKit/CocoaBindings/TableModel/ |
H A D | TableModelAppDelegate.py | 9 'name': pw.pw_name,
|
/macosx-10.10/pyobjc-45/pyobjc/pyobjc-framework-Cocoa-2.5.1/Examples/AppKit/CocoaBindings/TableModelWithSearch/ |
H A D | TableModelWithSearchAppDelegate.py | 9 'name': pw.pw_name,
|
/macosx-10.10/procmail-14/procmail/src/ |
H A D | authenticate.c | 108 if(spwd=getspnam(pass->pw->pw_name)) /* any shadow password? */ 137 np->pw_name=cstr(np->pw_name,op->pw_name); 149 { bbzero(p->pw_name,strlen(p->pw_name)); 171 free(p->pw_name),free(p->pw_dir),free(p->pw_shell),free(p); 193 strlen(pass->pw->pw_name)+1+STRLEN(MAILSPOOLSUFFIX)))) 197 for(p=pass->mbox+STRLEN(mailspooldir),n=pass->pw->pw_name, 203 strcpy(p,pass->pw->pw_name); [all...] |
/macosx-10.10/Heimdal-398.1.2/appl/su/ |
H A D | su.c | 112 free (p->pw_name); 127 info->pw_name = strdup(pwd->pw_name); 133 if(info->pw_name == NULL || info->pw_passwd == NULL || 175 login_name = login_info->pw_name; 176 if (strcmp (su_info->pw_name, "root") == 0) 183 su_info->pw_name, 191 if (su_info->pw_uid == 0 && !krb5_kuserok(context, p, su_info->pw_name)) 297 snprintf(prompt, sizeof(prompt), "%s's password: ", su->pw_name); 305 login->pw_name, s [all...] |