Home
last modified time | relevance | path

Searched refs:pw_name (Results 1 – 25 of 4352) sorted by relevance

12345678910>>...175

/dports/x11/xscreensaver/xscreensaver-5.44/driver/
H A Dsetuid.c45 (p && p->pw_name ? p->pw_name : "???"), in uid_gid_string()
155 (p && p->pw_name ? p->pw_name : "???"), in set_ids_by_number()
221 (p && p->pw_name ? p->pw_name : "???"), in set_ids_by_number()
340 !p->pw_name || in hack_uid()
341 !*p->pw_name || in hack_uid()
342 !strcmp (p->pw_name, "root") || in hack_uid()
347 !strcmp (p->pw_name, "bin") || in hack_uid()
348 !strcmp (p->pw_name, "adm") || in hack_uid()
349 !strcmp (p->pw_name, "sys") || in hack_uid()
350 !strcmp (p->pw_name, "games")) in hack_uid()
[all …]
/dports/devel/aegis/aegis-4.25.D510/libaegis/
H A Dgetpw_cache.cc47 result->pw_name = 0; in passwd_null()
63 result->pw_name = "nobody"; in passwd_null()
91 result->pw_name = mem_copy_string(pw->pw_name); in passwd_copy()
148 data->pw_name = mem_copy_string(name.c_str()); in getpwnam_cached()
149 data->pw_gecos = data->pw_name; in getpwnam_cached()
159 if (!data->pw_name) in getpwnam_cached()
196 nstring name = pw->pw_name; in getpwuid_cached()
211 if (!data->pw_name) in getpwuid_cached()
232 double weight = fstrcmp(name.c_str(), pw->pw_name); in getpwnam_fuzzy()
235 best = nstring(pw->pw_name); in getpwnam_fuzzy()
/dports/net/samba412/samba-4.12.15/testsuite/smbd/
H A Dse_access_check_allowsome.c51 len1 = (int)strlen(pw->pw_name) - strlen("user0"); in allowsome_check()
52 len2 = (int)strlen(pw->pw_name) - strlen("user2"); in allowsome_check()
54 if ((strncmp("user0", &pw->pw_name[MAX(len1, 0)], in allowsome_check()
56 (strncmp("user2", &pw->pw_name[MAX(len2, 0)], in allowsome_check()
60 pw->pw_name); in allowsome_check()
64 printf("FAIL: access granted for %s\n", pw->pw_name); in allowsome_check()
69 pw->pw_name); in allowsome_check()
H A Dse_access_check_denysome.c53 len1 = (int)strlen(pw->pw_name) - strlen("user1"); in denysome_check()
54 len2 = (int)strlen(pw->pw_name) - strlen("user3"); in denysome_check()
56 if ((strncmp("user1", &pw->pw_name[MAX(len1, 0)], in denysome_check()
58 (strncmp("user3", &pw->pw_name[MAX(len2, 0)], in denysome_check()
62 pw->pw_name); in denysome_check()
66 printf("FAIL: access denied for %s\n", pw->pw_name); in denysome_check()
71 pw->pw_name); in denysome_check()
/dports/sysutils/busybox/busybox-1.26.2/loginutils/
H A Dadduser.c102 if (getpwnam(p->pw_name)) { in passwd_study()
103 bb_error_msg_and_die("%s '%s' in use", "user", p->pw_name); in passwd_study()
131 if (getgrnam(p->pw_name)) { in passwd_study()
132 bb_error_msg_and_die("%s '%s' in use", "group", p->pw_name); in passwd_study()
146 argv[2] = p->pw_name; in addgroup_wrapper()
164 argv[4] = p->pw_name; in addgroup_wrapper()
231 pw.pw_name = argv[0]; in adduser_main()
241 die_if_bad_username(pw.pw_name); in adduser_main()
263 if (update_passwd(bb_path_passwd_file, pw.pw_name, p, NULL) < 0) { in adduser_main()
282 update_passwd(bb_path_shadow_file, pw.pw_name, p, NULL); in adduser_main()
[all …]
/dports/x11/mlterm/mlterm-3.9.1/baselib/src/
H A Dbl_utmp_sysv.c48 if (((pwent = getpwuid(getuid())) == NULL) || (pwent->pw_name == NULL)) { in get_pw_name()
51 return pwent->pw_name; in get_pw_name()
64 const char *pw_name; in bl_utmp_new() local
103 pw_name = get_pw_name(); in bl_utmp_new()
104 strncpy(ut.ut_user, pw_name, BL_MIN(sizeof(ut.ut_user), strlen(pw_name))); in bl_utmp_new()
181 const char *pw_name; in bl_utmp_destroy() local
185 pw_name = get_pw_name(); in bl_utmp_destroy()
186 strncpy(ut.ut_user, pw_name, BL_MIN(sizeof(ut.ut_user), strlen(pw_name))); in bl_utmp_destroy()
H A Dbl_utmp_login.c35 char *pw_name; in bl_utmp_new() local
50 if ((pwent = getpwuid(getuid())) == NULL || pwent->pw_name == NULL) { in bl_utmp_new()
51 pw_name = "?"; in bl_utmp_new()
53 pw_name = pwent->pw_name; in bl_utmp_new()
61 strncpy(ut.ut_name, pw_name, BL_MIN(sizeof(ut.ut_name) - 2, strlen(pw_name))); in bl_utmp_new()
/dports/security/tor-devel/tor-0.4.7.2-alpha/src/lib/fs/
H A Duserdb.c35 if (pw->pw_name) in tor_passwd_dup()
36 new_pw->pw_name = tor_strdup(pw->pw_name); in tor_passwd_dup()
55 tor_free(pw->pw_name); in tor_passwd_free_()
84 passwd_cached->pw_name, username); in tor_getpwnam()
89 if (! passwd_cached || ! passwd_cached->pw_name) in tor_getpwnam()
92 if (! strcmp(username, passwd_cached->pw_name)) in tor_getpwnam()
/dports/security/tor/tor-0.4.6.8/src/lib/fs/
H A Duserdb.c35 if (pw->pw_name) in tor_passwd_dup()
36 new_pw->pw_name = tor_strdup(pw->pw_name); in tor_passwd_dup()
55 tor_free(pw->pw_name); in tor_passwd_free_()
84 passwd_cached->pw_name, username); in tor_getpwnam()
89 if (! passwd_cached || ! passwd_cached->pw_name) in tor_getpwnam()
92 if (! strcmp(username, passwd_cached->pw_name)) in tor_getpwnam()
/dports/sysutils/py-google-compute-engine/compute-image-packages-20190522/packages/google-compute-engine-oslogin/libnss_cache_oslogin/
H A Dnss_cache_oslogin.c221 ret = strcoll(result->pw_name, name); in _nss_cache_oslogin_pwnam_wrap()
384 char *pw_name; in _nss_cache_oslogin_getpwnam_r() local
392 pw_name = malloc(strlen(name) + 1); in _nss_cache_oslogin_getpwnam_r()
393 if (pw_name == NULL) { in _nss_cache_oslogin_getpwnam_r()
397 strncpy(pw_name, name, strlen(name) + 1); in _nss_cache_oslogin_getpwnam_r()
402 free(pw_name); in _nss_cache_oslogin_getpwnam_r()
410 args.lookup_value = pw_name; in _nss_cache_oslogin_getpwnam_r()
414 args.lookup_key = pw_name; in _nss_cache_oslogin_getpwnam_r()
415 args.lookup_key_length = strlen(pw_name); in _nss_cache_oslogin_getpwnam_r()
417 DEBUG("Binary search for user %s\n", pw_name); in _nss_cache_oslogin_getpwnam_r()
[all …]
/dports/shells/jailkit/jailkit-2.22/src/
H A Djk_chrootsh.c244 if (!pw->pw_name || strlen(pw->pw_name)==0) { in main()
248 if (user && strcmp(user,pw->pw_name)!=0) { in main()
249 syslog(LOG_ERR, "abort, asked for user %s, got user info for %s", user, pw->pw_name); in main()
256 DEBUG_MSG("got user %s\nget group info\n",pw->pw_name); in main()
287 if (iniparser_has_section(parser, pw->pw_name)) { in main()
288 section = strdup(pw->pw_name); in main()
362 syslog(LOG_ERR, "abort, got an empty home directory for user %s (%u)", pw->pw_name, getuid()); in main()
484 oldpw_name = strdup(pw->pw_name); in main()
506 if (strcmp(pw->pw_name, oldpw_name)!=0) { in main()
546 setenv("USER",pw->pw_name,1); in main()
[all …]
H A Djk_uchroot.c177 if (!pw->pw_name || strlen(pw->pw_name)==0) { in main()
181 if (user && strcmp(user,pw->pw_name)!=0) { in main()
182 syslog(LOG_ERR, "abort, asked for user %s, got user info for %s", user, pw->pw_name); in main()
186 …ort, started by user ID %u, got user info %s with user ID %u,", getuid(), pw->pw_name, pw->pw_uid); in main()
264 if (iniparser_has_section(parser, pw->pw_name)) { in main()
265 section = strdup(pw->pw_name); in main()
291 …n for user %s (%u) or group %s (%u) or DEFAULT found in "CONFIGFILE, pw->pw_name,getuid(),gr->gr_n… in main()
333 syslog(LOG_ERR,"abort, user %s (%u) is not allowed in jail %s",pw->pw_name, getuid(),jail); in main()
355 …syslog(LOG_INFO, "entering jail %s for user %s (%u) in order to execute %s", jail, pw->pw_name, ge… in main()
410 oldpw_name = strdup(pw->pw_name); in main()
[all …]
/dports/sysutils/toybox/toybox-0.8.5/toys/pending/
H A Duseradd.c64 pwd.pw_name = s;
97 if (getgrnam(pwd.pw_name)) error_exit("group '%s' in use", pwd.pw_name);
119 entry = xmprintf("%s:%s:%ld:%ld:%s:%s:%s", pwd.pw_name, pwd.pw_passwd,
122 if (update_password("/etc/passwd", pwd.pw_name, entry)) error_exit("updating passwd file failed");
126 entry = xmprintf("%s:!!:%u::::::", pwd.pw_name,
128 else entry = xmprintf("%s:!!:%u:0:99999:7:::", pwd.pw_name,
130 update_password("/etc/shadow", pwd.pw_name, entry);
151 if (xrun((char *[]){"passwd", pwd.pw_name, 0})) error_exit("passwd");
/dports/databases/xtrabackup8/percona-xtrabackup-8.0.14/unittest/gunit/
H A Dmysys_my_getpw-t.cc41 pv.pw_name = "root"; in TEST()
43 EXPECT_EQ(std::string{"root"}, copy.pw_name); in TEST()
45 EXPECT_EQ(std::string{"root"}, moved.pw_name); in TEST()
48 EXPECT_EQ(std::string{"root"}, assigned.pw_name); in TEST()
54 EXPECT_EQ(std::string{"root"}, rootpw.pw_name); in TEST()
62 EXPECT_EQ(std::string{"root"}, rootpw.pw_name); in TEST()
/dports/security/gnome-ssh-askpass/openssh-6.6p1/
H A Dauth.c107 if (!pw || !pw->pw_name) in allowed_user()
112 spw = getspnam(pw->pw_name); in allowed_user()
152 pw->pw_name); in allowed_user()
168 "does not exist", pw->pw_name, shell); in allowed_user()
195 pw->pw_name, hostname); in allowed_user()
227 pw->pw_name, hostname); in allowed_user()
368 "u", pw->pw_name, (char *)NULL); in expand_authorized_keys()
414 pw->pw_name, user_hostfile); in check_key_in_hostfiles()
553 pw->pw_name, file_type, file); in auth_openfile()
620 user, pw->pw_name); in getpwnamallow()
[all …]
H A Dauth-rhosts.c235 client_user, pw->pw_name)) { in auth_rhosts2_raw()
241 client_user, pw->pw_name)) { in auth_rhosts2_raw()
253 "no home directory %.200s", pw->pw_name, pw->pw_dir); in auth_rhosts2_raw()
255 "no home directory %.200s", pw->pw_name, pw->pw_dir); in auth_rhosts2_raw()
262 "bad ownership or modes for home directory.", pw->pw_name); in auth_rhosts2_raw()
264 "bad ownership or modes for home directory.", pw->pw_name); in auth_rhosts2_raw()
289 pw->pw_name, buf); in auth_rhosts2_raw()
300 if (check_rhosts_file(buf, hostname, ipaddr, client_user, pw->pw_name)) { in auth_rhosts2_raw()
306 hostname, ipaddr, client_user, pw->pw_name); in auth_rhosts2_raw()
/dports/sysutils/coreutils/coreutils-8.32/src/
H A Did.c73 static void print_stuff (const char *pw_name);
130 char *pw_name = NULL; in main() local
259 pw_name = xstrdup (pwd->pw_name); in main()
262 print_stuff (pw_name); in main()
263 free (pw_name); in main()
304 print_stuff (pw_name); in main()
350 char *s = pwd ? pwd->pw_name : uidtostr (uid); in print_user()
365 printf ("(%s)", pwd->pw_name); in print_full_info()
377 printf ("(%s)", pwd->pw_name); in print_full_info()
432 print_stuff (const char *pw_name) in print_stuff() argument
[all …]
/dports/security/cops/cops_104+/src/
H A Dpass.c341 (void) sprintf (guess, "##%s", pwd->pw_name); in chkpw()
354 pwdadj = getpwanam(pwd->pw_name); in chkpw()
371 pwd->pw_name, pwd->pw_shell); in chkpw()
374 Curpw, pwd->pw_name, pwd->pw_shell); in chkpw()
389 if (uandltry(pwd,pwd->pw_name)) in chkpw()
393 strcpy(guess,pwd->pw_name); in chkpw()
394 strcat(guess,pwd->pw_name); in chkpw()
529 pwd -> pw_name);
542 pwd -> pw_name, pwd -> pw_shell, guess);
552 Curpw, pwd -> pw_name, pwd -> pw_shell);
[all …]
/dports/security/pam_ssh/pam_ssh-8.0/openssh/
H A Dauth-rhosts.c239 client_user, pw->pw_name)) {
245 client_user, pw->pw_name)) {
258 "no home directory %.200s", pw->pw_name, pw->pw_dir);
260 "no home directory %.200s", pw->pw_name, pw->pw_dir);
267 "bad ownership or modes for home directory.", pw->pw_name);
269 "bad ownership or modes for home directory.", pw->pw_name);
294 pw->pw_name, buf);
309 client_user, pw->pw_name)) {
316 client_user, pw->pw_name);
/dports/security/openssh-portable/openssh-8.8p1/
H A Dauth-rhosts.c238 client_user, pw->pw_name)) { in auth_rhosts2()
244 client_user, pw->pw_name)) { in auth_rhosts2()
257 "no home directory %.200s", pw->pw_name, pw->pw_dir); in auth_rhosts2()
259 "no home directory %.200s", pw->pw_name, pw->pw_dir); in auth_rhosts2()
266 "bad ownership or modes for home directory.", pw->pw_name); in auth_rhosts2()
268 "bad ownership or modes for home directory.", pw->pw_name); in auth_rhosts2()
293 pw->pw_name, buf); in auth_rhosts2()
310 client_user, pw->pw_name)) { in auth_rhosts2()
317 client_user, pw->pw_name); in auth_rhosts2()
/dports/lang/gcc12-devel/gcc-12-20211205/libphobos/libdruntime/core/sys/posix/
H A Dpwd.d56 char* pw_name; in version() member
69 char* pw_name;
85 char* pw_name; /* user name */
102 char* pw_name; /* user name */
118 char* pw_name; /* user name */
134 char* pw_name; /* user name */
151 char* pw_name;
166 char* pw_name;
178 char *pw_name;
191 char* pw_name;
/dports/lang/gcc11/gcc-11.2.0/libphobos/libdruntime/core/sys/posix/
H A Dpwd.d56 char* pw_name; in version() member
69 char* pw_name;
85 char* pw_name; /* user name */
102 char* pw_name; /* user name */
118 char* pw_name; /* user name */
134 char* pw_name; /* user name */
151 char* pw_name;
166 char* pw_name;
178 char *pw_name;
191 char* pw_name;
/dports/lang/gcc10/gcc-10.3.0/libphobos/libdruntime/core/sys/posix/
H A Dpwd.d55 char* pw_name; in version() member
68 char* pw_name;
84 char* pw_name; /* user name */
101 char* pw_name; /* user name */
117 char* pw_name; /* user name */
133 char* pw_name; /* user name */
150 char* pw_name;
165 char* pw_name;
177 char *pw_name;
190 char* pw_name;
/dports/lang/gcc11-devel/gcc-11-20211009/libphobos/libdruntime/core/sys/posix/
H A Dpwd.d56 char* pw_name; in version() member
69 char* pw_name;
85 char* pw_name; /* user name */
102 char* pw_name; /* user name */
118 char* pw_name; /* user name */
134 char* pw_name; /* user name */
151 char* pw_name;
166 char* pw_name;
178 char *pw_name;
191 char* pw_name;
/dports/devel/avr-gcc/gcc-10.2.0/libphobos/libdruntime/core/sys/posix/
H A Dpwd.d55 char* pw_name; in version() member
68 char* pw_name;
84 char* pw_name; /* user name */
101 char* pw_name; /* user name */
117 char* pw_name; /* user name */
133 char* pw_name; /* user name */
150 char* pw_name;
165 char* pw_name;
177 char *pw_name;
190 char* pw_name;

12345678910>>...175