/dragonfly/crypto/openssh/ |
H A D | ssh-add.c | 977 struct passwd *pw; in main() local 981 if ((pw = getpwuid(getuid())) == NULL) { in main() 989 snprintf(buf, sizeof(buf), "%s/%s", pw->pw_dir, in main()
|
H A D | sshd.c | 546 if (authctxt->pw->pw_uid == 0) { 580 do_setusercontext(authctxt->pw); 2283 temporarily_use_uid(authctxt->pw);
|
H A D | sshconnect.c | 1541 struct sockaddr *hostaddr, u_short port, struct passwd *pw, int timeout_ms, in ssh_login() argument 1548 local_user = xstrdup(pw->pw_name); in ssh_login()
|
H A D | servconf.c | 1010 struct passwd *pw; in match_cfg_line_group() local 1015 if ((pw = getpwnam(user)) == NULL) { in match_cfg_line_group() 1018 } else if (ga_init(pw->pw_name, pw->pw_gid) == 0) { in match_cfg_line_group()
|
/dragonfly/contrib/tcsh-6/ |
H A D | sh.exp.c | 631 struct passwd *pw; in filetest() local 905 if (altout && (pw = xgetpwuid(st->st_uid))) { in filetest() 907 return(Strsave(str2short(pw->pw_name))); in filetest()
|
H A D | tc.os.c | 1590 cygwin_xcrypt(struct passwd *pw, const char *password, const char *expected_pwd) in cygwin_xcrypt() argument 1593 HANDLE token = cygwin_logon_user(pw, password); in cygwin_xcrypt()
|
/dragonfly/libexec/ftpd/ |
H A D | ftpcmd.y | 71 extern struct passwd *pw; 1288 (pw ? pw -> pw_name : "unknown"), timeout); 1718 user = pw->pw_name;
|
/dragonfly/bin/sh/ |
H A D | expand.c | 369 struct passwd *pw; in exptilde() local 398 pw = getpwnam(user); in exptilde() 399 home = pw != NULL ? pw->pw_dir : NULL; in exptilde()
|
/dragonfly/contrib/wpa_supplicant/wpa_supplicant/ |
H A D | ap.c | 1454 const struct wpabuf *pw, const u8 *pubkey_hash) in wpas_ap_wps_add_nfc_pw() argument 1491 pw ? wpabuf_head(pw) : NULL, in wpas_ap_wps_add_nfc_pw() 1492 pw ? wpabuf_len(pw) : 0, 1); in wpas_ap_wps_add_nfc_pw()
|
H A D | wpa_supplicant.c | 1619 if (pw == NULL) { in wpa_supplicant_set_suites() 1625 if (wpabuf_len(pw) < 8 || wpabuf_len(pw) > 64) { in wpa_supplicant_set_suites() 1628 (int) wpabuf_len(pw)); in wpa_supplicant_set_suites() 1629 ext_password_free(pw); in wpa_supplicant_set_suites() 1633 os_memcpy(pw_str, wpabuf_head(pw), wpabuf_len(pw)); in wpa_supplicant_set_suites() 1634 pw_str[wpabuf_len(pw)] = '\0'; in wpa_supplicant_set_suites() 1637 if (wpabuf_len(pw) >= 8 && wpabuf_len(pw) < 64 && bss) in wpa_supplicant_set_suites() 1651 if (wpabuf_len(pw) == 2 * PMK_LEN) { in wpa_supplicant_set_suites() 1656 ext_password_free(pw); in wpa_supplicant_set_suites() 1670 ext_password_free(pw); in wpa_supplicant_set_suites() [all …]
|
H A D | wps_supplicant.c | 2317 char pw[32 * 2 + 1]; in wpas_wps_start_nfc() local 2362 wpa_snprintf_hex_uppercase(pw, sizeof(pw), in wpas_wps_start_nfc() 2367 dev_pw ? pw : NULL, in wpas_wps_start_nfc()
|
/dragonfly/contrib/wpa_supplicant/src/ap/ |
H A D | ieee802_11.c | 395 struct sae_password_entry *pw; in auth_build_sae_commit() local 401 for (pw = hapd->conf->sae_passwords; pw; pw = pw->next) { in auth_build_sae_commit() 402 if (!is_broadcast_ether_addr(pw->peer_addr) && in auth_build_sae_commit() 403 os_memcmp(pw->peer_addr, sta->addr, ETH_ALEN) != 0) in auth_build_sae_commit() 405 if ((rx_id && !pw->identifier) || (!rx_id && pw->identifier)) in auth_build_sae_commit() 407 if (rx_id && pw->identifier && in auth_build_sae_commit() 408 os_strcmp(rx_id, pw->identifier) != 0) in auth_build_sae_commit() 410 password = pw->password; in auth_build_sae_commit() 428 if (pw && pw->vlan_id) { in auth_build_sae_commit() 434 sta->sae->tmp->vlan_id = pw->vlan_id; in auth_build_sae_commit()
|
/dragonfly/contrib/cvs-1.12/src/ |
H A D | subr.c | 292 struct passwd *pw; in getcaller() local 325 if ((pw = (struct passwd *) getpwuid (uid)) == NULL) in getcaller() 330 cache = xstrdup (pw->pw_name); in getcaller()
|
H A D | commit.c | 361 struct passwd *pw; in commit() local 363 if ((pw = getpwnam (getcaller ())) == NULL) in commit() 367 if (pw->pw_uid == (uid_t) 0) in commit()
|
/dragonfly/initrd/rescue/ |
H A D | Makefile | 191 pw \
|
/dragonfly/usr.bin/telnet/ |
H A D | commands.c | 2402 struct passwd *pw; in tn() local 2406 ((pw = getpwnam(user)) && pw->pw_uid != getuid())) { in tn() 2407 if ((pw = getpwuid(getuid()))) in tn() 2408 user = pw->pw_name; in tn()
|
/dragonfly/usr.sbin/pwd_mkdb/ |
H A D | pwd_mkdb.c | 623 scan(FILE *fp, struct passwd *pw) in scan() argument 659 if (!__pw_scan(line, pw, _PWSCAN_WARN|_PWSCAN_MASTER)) { in scan()
|
/dragonfly/etc/ |
H A D | Makefile | 133 sh ${.CURDIR}/../tools/pw-update.sh \ 277 sh ${.CURDIR}/../tools/pw-update.sh \
|
/dragonfly/sys/dev/drm/i915/ |
H A D | i915_reg.h | 8256 #define _HSW_PW_REG_IDX(pw) ((pw) >> 4) argument 8257 #define _HSW_PW_SHIFT(pw) (((pw) & 0xf) * 2) argument 8259 #define HSW_PWR_WELL_CTL_BIOS(pw) _MMIO(_PICK(_HSW_PW_REG_IDX(pw), \ argument 8261 #define HSW_PWR_WELL_CTL_DRIVER(pw) _MMIO(_PICK(_HSW_PW_REG_IDX(pw), \ argument 8264 #define HSW_PWR_WELL_CTL_DEBUG(pw) _MMIO(_PICK(_HSW_PW_REG_IDX(pw), \ argument 8267 #define HSW_PWR_WELL_CTL_REQ(pw) (1 << (_HSW_PW_SHIFT(pw) + 1)) argument 8268 #define HSW_PWR_WELL_CTL_STATE(pw) (1 << _HSW_PW_SHIFT(pw)) argument 8285 #define SKL_PW_TO_PG(pw) ((pw) - SKL_DISP_PW_1 + SKL_PG1) argument
|
/dragonfly/usr.sbin/zic/ |
H A D | zic.c | 2733 struct passwd *pw; in setuser() local 2738 pw = getpwnam(name); in setuser() 2739 if (pw == NULL) { in setuser() 2750 *flag = pw->pw_uid; in setuser()
|
/dragonfly/sbin/newfs_hammer/ |
H A D | newfs_hammer.c | 41 static int64_t getsize(const char *str, int pw);
|
/dragonfly/usr.sbin/inetd/ |
H A D | inetd.c | 1457 struct passwd *pw; in getconfigent() local 1470 if ((pw = getpwnam(user)) == NULL) { in getconfigent() 1474 sep->se_sockuid = pw->pw_uid; in getconfigent()
|
/dragonfly/nrelease/ |
H A D | Makefile | 252 pw -V ${ISOROOT}/etc useradd installer -o -u 0 -g 0 \
|
/dragonfly/contrib/libarchive/libarchive/ |
H A D | archive_write_set_format_zip.c | 1551 trad_enc_init(struct trad_enc_ctx *ctx, const char *pw, size_t pw_len) in trad_enc_init() argument 1559 trad_enc_update_keys(ctx, *pw++); in trad_enc_init()
|
/dragonfly/contrib/wpa_supplicant/src/radius/ |
H A D | radius_server.c | 1331 u8 *pw; in radius_server_macacl() local 1336 if (radius_msg_get_attr_ptr(request, RADIUS_ATTR_USER_PASSWORD, &pw, in radius_server_macacl() 1361 os_memcmp_const(pw, buf, res) != 0) { in radius_server_macacl()
|