/dragonfly/sbin/mount_tmpfs/ |
H A D | mount_tmpfs.c | 275 struct passwd *pw; in a_uid() local 279 if ((pw = getpwnam(s)) != NULL) in a_uid() 280 uid = pw->pw_uid; in a_uid()
|
/dragonfly/contrib/cvs-1.12/src/ |
H A D | filesubr.c | 808 struct passwd *pw; in get_homedir() local 815 else if ((pw = (struct passwd *) getpwuid (getuid ())) in get_homedir() 816 && pw->pw_dir) in get_homedir() 817 home = xstrdup (pw->pw_dir); in get_homedir()
|
H A D | lock.c | 986 struct passwd *pw; in set_lockers_name() local 990 pw = (struct passwd *) getpwuid (statp->st_uid); in set_lockers_name() 991 if (pw != NULL) in set_lockers_name() 992 lockers_name = xstrdup (pw->pw_name); in set_lockers_name()
|
/dragonfly/bin/pax/ |
H A D | sel_subs.c | 103 struct passwd *pw; in usr_add() local 126 if ((pw = getpwnam(str)) == NULL) { in usr_add() 130 uid = (uid_t)pw->pw_uid; in usr_add()
|
/dragonfly/contrib/wpa_supplicant/src/common/ |
H A D | common_module_tests.c | 261 const char *pw = "mekmitasdigoat"; in sae_tests() local 346 sae_prepare_commit(addr1, addr2, (const u8 *) pw, os_strlen(pw), in sae_tests()
|
/dragonfly/contrib/wpa_supplicant/src/utils/ |
H A D | utils_module_tests.c | 257 struct wpabuf *pw; in ext_password_tests() local 268 pw = ext_password_get(data, "foo"); in ext_password_tests() 269 if (pw != NULL) in ext_password_tests() 271 ext_password_free(pw); in ext_password_tests() 275 pw = ext_password_get(NULL, "foo"); in ext_password_tests() 276 if (pw != NULL) in ext_password_tests() 278 ext_password_free(pw); in ext_password_tests()
|
H A D | ext_password.h | 22 void ext_password_free(struct wpabuf *pw);
|
/dragonfly/contrib/libedit/src/ |
H A D | eln.c | 305 const wchar_t *pw; in el_get() local 306 ret = el_wget(el, op, &pw); in el_get() 307 *p = ct_encode_string(pw, &el->el_lgcyconv); in el_get()
|
/dragonfly/crypto/openssh/ |
H A D | auth.h | 66 struct passwd *pw; /* set if 'valid' */ member 193 char *expand_authorized_keys(const char *, struct passwd *pw);
|
H A D | monitor.c | 319 if (authctxt->pw->pw_uid == 0 && in monitor_child_preauth() 733 authctxt->pw = fakepw(); in mm_answer_pwnamallow() 738 authctxt->pw = pwent; in mm_answer_pwnamallow() 1179 allowed = user_key_allowed(ssh, authctxt->pw, key, in mm_answer_keyallowed() 1191 allowed = hostbased_key_allowed(ssh, authctxt->pw, in mm_answer_keyallowed() 1510 mm_record_login(struct ssh *ssh, Session *s, struct passwd *pw) in mm_record_login() argument 1529 record_login(s->pid, s->tty, pw->pw_name, pw->pw_uid, in mm_record_login() 1559 s->pw = authctxt->pw; in mm_answer_pty() 1564 pty_setowner(authctxt->pw, s->tty); in mm_answer_pty() 1574 mm_record_login(ssh, s, authctxt->pw); in mm_answer_pty()
|
H A D | readconf.c | 597 ruser = options->user == NULL ? pw->pw_name : options->user; in match_cfg_line() 678 criteria = xstrdup(pw->pw_name); in match_cfg_line() 679 r = match_pattern_list(pw->pw_name, arg, 0) == 1; in match_cfg_line() 691 (unsigned long long)pw->pw_uid); in match_cfg_line() 700 "d", pw->pw_dir, in match_cfg_line() 707 "u", pw->pw_name, in match_cfg_line() 1661 value = match_cfg_line(options, &str, pw, host, original_host, in process_config_line_depth() 1898 pw, host, original_host, options, in process_config_line_depth() 2228 return read_config_file_depth(filename, pw, host, original_host, in read_config_file() 2234 read_config_file_depth(const char *filename, struct passwd *pw, in read_config_file_depth() argument [all …]
|
H A D | sftp-server.c | 69 static struct passwd *pw = NULL; variable 1583 if (tilde_expand(path, pw->pw_uid, &npath) != 0) { in process_extended_expand() 1714 verbose("home-directory \"%s\"", pw->pw_dir); in process_extended_home_directory() 1716 s.name = s.long_name = pw->pw_dir; in process_extended_home_directory() 1818 client_addr, pw->pw_name); in process() 1879 if (pw != NULL && client_addr != NULL) { in sftp_server_cleanup_exit() 1882 pw->pw_name, client_addr); in sftp_server_cleanup_exit() 1916 pw = pwcopy(user_pw); in sftp_server_main() 1958 (unsigned long long)pw->pw_uid); in sftp_server_main() 2012 pw->pw_name, client_addr); in sftp_server_main()
|
H A D | auth2.c | 286 authctxt->pw = PRIVSEP(getpwnamallow(ssh, user)); in input_userauth_request() 288 if (authctxt->pw && strcmp(service, "ssh-connection")==0) { in input_userauth_request() 294 authctxt->pw = fakepw(); in input_userauth_request() 376 if (authenticated && authctxt->pw->pw_uid == 0 && in userauth_finish()
|
/dragonfly/sbin/quotacheck/ |
H A D | quotacheck.c | 120 struct passwd *pw; in main() local 165 while ((pw = getpwent()) != NULL) in main() 166 addid((u_long)pw->pw_uid, USRQUOTA, pw->pw_name); in main()
|
/dragonfly/contrib/tcsh-6/ |
H A D | tw.init.c | 610 struct passwd *pw; in tw_logname_next() local 622 pw = getpwent(); in tw_logname_next() 624 pw = NULL; in tw_logname_next() 628 if (pw == NULL) { in tw_logname_next() 634 Strbuf_append(res, str2short(pw->pw_name)); in tw_logname_next()
|
/dragonfly/sbin/shutdown/ |
H A D | shutdown.c | 103 struct passwd *pw; in main() local 220 whom = (pw = getpwuid(getuid())) ? pw->pw_name : "???"; in main()
|
/dragonfly/contrib/tcpdump/ |
H A D | tcpdump.c | 774 struct passwd *pw = NULL; in droproot() local 779 pw = getpwnam(username); in droproot() 780 if (pw) { in droproot() 788 int ret = capng_change_id(pw->pw_uid, pw->pw_gid, CAPNG_NO_FLAG); in droproot() 795 if (initgroups(pw->pw_name, pw->pw_gid) != 0 || in droproot() 796 setgid(pw->pw_gid) != 0 || setuid(pw->pw_uid) != 0) in droproot() 799 (unsigned long)pw->pw_uid, in droproot() 800 (unsigned long)pw->pw_gid, in droproot()
|
/dragonfly/contrib/nvi2/ex/ |
H A D | ex_argv.c | 315 struct passwd *pw; in argv_flt_user() local 329 while ((pw = getpwent()) != NULL) { in argv_flt_user() 330 len = strlen(pw->pw_name); in argv_flt_user() 332 (nlen > len || memcmp(np, pw->pw_name, nlen))) in argv_flt_user() 336 CHAR2INT(sp, pw->pw_name, len + 1, uname, ulen); in argv_flt_user()
|
/dragonfly/usr.bin/at/ |
H A D | at.c | 466 struct passwd *pw; in list_jobs() local 516 pw = getpwuid(buf.st_uid); in list_jobs() 524 pw ? pw->pw_name : "???", in list_jobs()
|
/dragonfly/usr.sbin/rwhod/ |
H A D | rwhod.c | 402 struct passwd *pw; in run_as() local 405 pw = getpwnam(UNPRIV_USER); in run_as() 406 if (!pw) in run_as() 409 *uid = pw->pw_uid; in run_as()
|
/dragonfly/contrib/wpa_supplicant/src/crypto/ |
H A D | aes_siv.h | 13 const u8 *pw, size_t pwlen,
|
/dragonfly/sbin/newfs_hammer2/ |
H A D | mkfs_hammer2.h | 75 int64_t getsize(const char *str, int64_t minval, int64_t maxval, int pw);
|
/dragonfly/contrib/smbfs/lib/smb/ |
H A D | ctx.c | 354 struct passwd *pw; in smb_parse_owner() local 370 pw = getpwnam(pair); in smb_parse_owner() 371 if (pw) { in smb_parse_owner() 372 *uid = pw->pw_uid; in smb_parse_owner()
|
/dragonfly/contrib/nvi2/common/ |
H A D | recover.c | 316 struct passwd *pw; in rcv_mailfile() local 337 if ((pw = getpwuid(uid = getuid())) == NULL) { in rcv_mailfile() 402 "To: ", pw->pw_name, "@", host, in rcv_mailfile() 416 "On ", ctime(&now), ", the user ", pw->pw_name, in rcv_mailfile()
|
/dragonfly/contrib/pam_passwdqc/ |
H A D | passwdqc.h | 51 const char *newpass, const char *oldpass, const struct passwd *pw);
|