/dports/x11/xscreensaver/xscreensaver-5.44/driver/ |
H A D | setuid.c | 45 (p && p->pw_name ? p->pw_name : "???"), in uid_gid_string() 155 (p && p->pw_name ? p->pw_name : "???"), in set_ids_by_number() 221 (p && p->pw_name ? p->pw_name : "???"), in set_ids_by_number() 340 !p->pw_name || in hack_uid() 341 !*p->pw_name || in hack_uid() 342 !strcmp (p->pw_name, "root") || in hack_uid() 347 !strcmp (p->pw_name, "bin") || in hack_uid() 348 !strcmp (p->pw_name, "adm") || in hack_uid() 349 !strcmp (p->pw_name, "sys") || in hack_uid() 350 !strcmp (p->pw_name, "games")) in hack_uid() [all …]
|
/dports/devel/aegis/aegis-4.25.D510/libaegis/ |
H A D | getpw_cache.cc | 47 result->pw_name = 0; in passwd_null() 63 result->pw_name = "nobody"; in passwd_null() 91 result->pw_name = mem_copy_string(pw->pw_name); in passwd_copy() 148 data->pw_name = mem_copy_string(name.c_str()); in getpwnam_cached() 149 data->pw_gecos = data->pw_name; in getpwnam_cached() 159 if (!data->pw_name) in getpwnam_cached() 196 nstring name = pw->pw_name; in getpwuid_cached() 211 if (!data->pw_name) in getpwuid_cached() 232 double weight = fstrcmp(name.c_str(), pw->pw_name); in getpwnam_fuzzy() 235 best = nstring(pw->pw_name); in getpwnam_fuzzy()
|
/dports/net/samba412/samba-4.12.15/testsuite/smbd/ |
H A D | se_access_check_allowsome.c | 51 len1 = (int)strlen(pw->pw_name) - strlen("user0"); in allowsome_check() 52 len2 = (int)strlen(pw->pw_name) - strlen("user2"); in allowsome_check() 54 if ((strncmp("user0", &pw->pw_name[MAX(len1, 0)], in allowsome_check() 56 (strncmp("user2", &pw->pw_name[MAX(len2, 0)], in allowsome_check() 60 pw->pw_name); in allowsome_check() 64 printf("FAIL: access granted for %s\n", pw->pw_name); in allowsome_check() 69 pw->pw_name); in allowsome_check()
|
H A D | se_access_check_denysome.c | 53 len1 = (int)strlen(pw->pw_name) - strlen("user1"); in denysome_check() 54 len2 = (int)strlen(pw->pw_name) - strlen("user3"); in denysome_check() 56 if ((strncmp("user1", &pw->pw_name[MAX(len1, 0)], in denysome_check() 58 (strncmp("user3", &pw->pw_name[MAX(len2, 0)], in denysome_check() 62 pw->pw_name); in denysome_check() 66 printf("FAIL: access denied for %s\n", pw->pw_name); in denysome_check() 71 pw->pw_name); in denysome_check()
|
/dports/sysutils/busybox/busybox-1.26.2/loginutils/ |
H A D | adduser.c | 102 if (getpwnam(p->pw_name)) { in passwd_study() 103 bb_error_msg_and_die("%s '%s' in use", "user", p->pw_name); in passwd_study() 131 if (getgrnam(p->pw_name)) { in passwd_study() 132 bb_error_msg_and_die("%s '%s' in use", "group", p->pw_name); in passwd_study() 146 argv[2] = p->pw_name; in addgroup_wrapper() 164 argv[4] = p->pw_name; in addgroup_wrapper() 231 pw.pw_name = argv[0]; in adduser_main() 241 die_if_bad_username(pw.pw_name); in adduser_main() 263 if (update_passwd(bb_path_passwd_file, pw.pw_name, p, NULL) < 0) { in adduser_main() 282 update_passwd(bb_path_shadow_file, pw.pw_name, p, NULL); in adduser_main() [all …]
|
/dports/x11/mlterm/mlterm-3.9.1/baselib/src/ |
H A D | bl_utmp_sysv.c | 48 if (((pwent = getpwuid(getuid())) == NULL) || (pwent->pw_name == NULL)) { in get_pw_name() 51 return pwent->pw_name; in get_pw_name() 64 const char *pw_name; in bl_utmp_new() local 103 pw_name = get_pw_name(); in bl_utmp_new() 104 strncpy(ut.ut_user, pw_name, BL_MIN(sizeof(ut.ut_user), strlen(pw_name))); in bl_utmp_new() 181 const char *pw_name; in bl_utmp_destroy() local 185 pw_name = get_pw_name(); in bl_utmp_destroy() 186 strncpy(ut.ut_user, pw_name, BL_MIN(sizeof(ut.ut_user), strlen(pw_name))); in bl_utmp_destroy()
|
H A D | bl_utmp_login.c | 35 char *pw_name; in bl_utmp_new() local 50 if ((pwent = getpwuid(getuid())) == NULL || pwent->pw_name == NULL) { in bl_utmp_new() 51 pw_name = "?"; in bl_utmp_new() 53 pw_name = pwent->pw_name; in bl_utmp_new() 61 strncpy(ut.ut_name, pw_name, BL_MIN(sizeof(ut.ut_name) - 2, strlen(pw_name))); in bl_utmp_new()
|
/dports/security/tor-devel/tor-0.4.7.2-alpha/src/lib/fs/ |
H A D | userdb.c | 35 if (pw->pw_name) in tor_passwd_dup() 36 new_pw->pw_name = tor_strdup(pw->pw_name); in tor_passwd_dup() 55 tor_free(pw->pw_name); in tor_passwd_free_() 84 passwd_cached->pw_name, username); in tor_getpwnam() 89 if (! passwd_cached || ! passwd_cached->pw_name) in tor_getpwnam() 92 if (! strcmp(username, passwd_cached->pw_name)) in tor_getpwnam()
|
/dports/security/tor/tor-0.4.6.8/src/lib/fs/ |
H A D | userdb.c | 35 if (pw->pw_name) in tor_passwd_dup() 36 new_pw->pw_name = tor_strdup(pw->pw_name); in tor_passwd_dup() 55 tor_free(pw->pw_name); in tor_passwd_free_() 84 passwd_cached->pw_name, username); in tor_getpwnam() 89 if (! passwd_cached || ! passwd_cached->pw_name) in tor_getpwnam() 92 if (! strcmp(username, passwd_cached->pw_name)) in tor_getpwnam()
|
/dports/sysutils/py-google-compute-engine/compute-image-packages-20190522/packages/google-compute-engine-oslogin/libnss_cache_oslogin/ |
H A D | nss_cache_oslogin.c | 221 ret = strcoll(result->pw_name, name); in _nss_cache_oslogin_pwnam_wrap() 384 char *pw_name; in _nss_cache_oslogin_getpwnam_r() local 392 pw_name = malloc(strlen(name) + 1); in _nss_cache_oslogin_getpwnam_r() 393 if (pw_name == NULL) { in _nss_cache_oslogin_getpwnam_r() 397 strncpy(pw_name, name, strlen(name) + 1); in _nss_cache_oslogin_getpwnam_r() 402 free(pw_name); in _nss_cache_oslogin_getpwnam_r() 410 args.lookup_value = pw_name; in _nss_cache_oslogin_getpwnam_r() 414 args.lookup_key = pw_name; in _nss_cache_oslogin_getpwnam_r() 415 args.lookup_key_length = strlen(pw_name); in _nss_cache_oslogin_getpwnam_r() 417 DEBUG("Binary search for user %s\n", pw_name); in _nss_cache_oslogin_getpwnam_r() [all …]
|
/dports/shells/jailkit/jailkit-2.22/src/ |
H A D | jk_chrootsh.c | 244 if (!pw->pw_name || strlen(pw->pw_name)==0) { in main() 248 if (user && strcmp(user,pw->pw_name)!=0) { in main() 249 syslog(LOG_ERR, "abort, asked for user %s, got user info for %s", user, pw->pw_name); in main() 256 DEBUG_MSG("got user %s\nget group info\n",pw->pw_name); in main() 287 if (iniparser_has_section(parser, pw->pw_name)) { in main() 288 section = strdup(pw->pw_name); in main() 362 syslog(LOG_ERR, "abort, got an empty home directory for user %s (%u)", pw->pw_name, getuid()); in main() 484 oldpw_name = strdup(pw->pw_name); in main() 506 if (strcmp(pw->pw_name, oldpw_name)!=0) { in main() 546 setenv("USER",pw->pw_name,1); in main() [all …]
|
H A D | jk_uchroot.c | 177 if (!pw->pw_name || strlen(pw->pw_name)==0) { in main() 181 if (user && strcmp(user,pw->pw_name)!=0) { in main() 182 syslog(LOG_ERR, "abort, asked for user %s, got user info for %s", user, pw->pw_name); in main() 186 …ort, started by user ID %u, got user info %s with user ID %u,", getuid(), pw->pw_name, pw->pw_uid); in main() 264 if (iniparser_has_section(parser, pw->pw_name)) { in main() 265 section = strdup(pw->pw_name); in main() 291 …n for user %s (%u) or group %s (%u) or DEFAULT found in "CONFIGFILE, pw->pw_name,getuid(),gr->gr_n… in main() 333 syslog(LOG_ERR,"abort, user %s (%u) is not allowed in jail %s",pw->pw_name, getuid(),jail); in main() 355 …syslog(LOG_INFO, "entering jail %s for user %s (%u) in order to execute %s", jail, pw->pw_name, ge… in main() 410 oldpw_name = strdup(pw->pw_name); in main() [all …]
|
/dports/sysutils/toybox/toybox-0.8.5/toys/pending/ |
H A D | useradd.c | 64 pwd.pw_name = s; 97 if (getgrnam(pwd.pw_name)) error_exit("group '%s' in use", pwd.pw_name); 119 entry = xmprintf("%s:%s:%ld:%ld:%s:%s:%s", pwd.pw_name, pwd.pw_passwd, 122 if (update_password("/etc/passwd", pwd.pw_name, entry)) error_exit("updating passwd file failed"); 126 entry = xmprintf("%s:!!:%u::::::", pwd.pw_name, 128 else entry = xmprintf("%s:!!:%u:0:99999:7:::", pwd.pw_name, 130 update_password("/etc/shadow", pwd.pw_name, entry); 151 if (xrun((char *[]){"passwd", pwd.pw_name, 0})) error_exit("passwd");
|
/dports/databases/xtrabackup8/percona-xtrabackup-8.0.14/unittest/gunit/ |
H A D | mysys_my_getpw-t.cc | 41 pv.pw_name = "root"; in TEST() 43 EXPECT_EQ(std::string{"root"}, copy.pw_name); in TEST() 45 EXPECT_EQ(std::string{"root"}, moved.pw_name); in TEST() 48 EXPECT_EQ(std::string{"root"}, assigned.pw_name); in TEST() 54 EXPECT_EQ(std::string{"root"}, rootpw.pw_name); in TEST() 62 EXPECT_EQ(std::string{"root"}, rootpw.pw_name); in TEST()
|
/dports/security/gnome-ssh-askpass/openssh-6.6p1/ |
H A D | auth.c | 107 if (!pw || !pw->pw_name) in allowed_user() 112 spw = getspnam(pw->pw_name); in allowed_user() 152 pw->pw_name); in allowed_user() 168 "does not exist", pw->pw_name, shell); in allowed_user() 195 pw->pw_name, hostname); in allowed_user() 227 pw->pw_name, hostname); in allowed_user() 368 "u", pw->pw_name, (char *)NULL); in expand_authorized_keys() 414 pw->pw_name, user_hostfile); in check_key_in_hostfiles() 553 pw->pw_name, file_type, file); in auth_openfile() 620 user, pw->pw_name); in getpwnamallow() [all …]
|
H A D | auth-rhosts.c | 235 client_user, pw->pw_name)) { in auth_rhosts2_raw() 241 client_user, pw->pw_name)) { in auth_rhosts2_raw() 253 "no home directory %.200s", pw->pw_name, pw->pw_dir); in auth_rhosts2_raw() 255 "no home directory %.200s", pw->pw_name, pw->pw_dir); in auth_rhosts2_raw() 262 "bad ownership or modes for home directory.", pw->pw_name); in auth_rhosts2_raw() 264 "bad ownership or modes for home directory.", pw->pw_name); in auth_rhosts2_raw() 289 pw->pw_name, buf); in auth_rhosts2_raw() 300 if (check_rhosts_file(buf, hostname, ipaddr, client_user, pw->pw_name)) { in auth_rhosts2_raw() 306 hostname, ipaddr, client_user, pw->pw_name); in auth_rhosts2_raw()
|
/dports/sysutils/coreutils/coreutils-8.32/src/ |
H A D | id.c | 73 static void print_stuff (const char *pw_name); 130 char *pw_name = NULL; in main() local 259 pw_name = xstrdup (pwd->pw_name); in main() 262 print_stuff (pw_name); in main() 263 free (pw_name); in main() 304 print_stuff (pw_name); in main() 350 char *s = pwd ? pwd->pw_name : uidtostr (uid); in print_user() 365 printf ("(%s)", pwd->pw_name); in print_full_info() 377 printf ("(%s)", pwd->pw_name); in print_full_info() 432 print_stuff (const char *pw_name) in print_stuff() argument [all …]
|
/dports/security/cops/cops_104+/src/ |
H A D | pass.c | 341 (void) sprintf (guess, "##%s", pwd->pw_name); in chkpw() 354 pwdadj = getpwanam(pwd->pw_name); in chkpw() 371 pwd->pw_name, pwd->pw_shell); in chkpw() 374 Curpw, pwd->pw_name, pwd->pw_shell); in chkpw() 389 if (uandltry(pwd,pwd->pw_name)) in chkpw() 393 strcpy(guess,pwd->pw_name); in chkpw() 394 strcat(guess,pwd->pw_name); in chkpw() 529 pwd -> pw_name); 542 pwd -> pw_name, pwd -> pw_shell, guess); 552 Curpw, pwd -> pw_name, pwd -> pw_shell); [all …]
|
/dports/security/pam_ssh/pam_ssh-8.0/openssh/ |
H A D | auth-rhosts.c | 239 client_user, pw->pw_name)) { 245 client_user, pw->pw_name)) { 258 "no home directory %.200s", pw->pw_name, pw->pw_dir); 260 "no home directory %.200s", pw->pw_name, pw->pw_dir); 267 "bad ownership or modes for home directory.", pw->pw_name); 269 "bad ownership or modes for home directory.", pw->pw_name); 294 pw->pw_name, buf); 309 client_user, pw->pw_name)) { 316 client_user, pw->pw_name);
|
/dports/security/openssh-portable/openssh-8.8p1/ |
H A D | auth-rhosts.c | 238 client_user, pw->pw_name)) { in auth_rhosts2() 244 client_user, pw->pw_name)) { in auth_rhosts2() 257 "no home directory %.200s", pw->pw_name, pw->pw_dir); in auth_rhosts2() 259 "no home directory %.200s", pw->pw_name, pw->pw_dir); in auth_rhosts2() 266 "bad ownership or modes for home directory.", pw->pw_name); in auth_rhosts2() 268 "bad ownership or modes for home directory.", pw->pw_name); in auth_rhosts2() 293 pw->pw_name, buf); in auth_rhosts2() 310 client_user, pw->pw_name)) { in auth_rhosts2() 317 client_user, pw->pw_name); in auth_rhosts2()
|
/dports/lang/gcc12-devel/gcc-12-20211205/libphobos/libdruntime/core/sys/posix/ |
H A D | pwd.d | 56 char* pw_name; in version() member 69 char* pw_name; 85 char* pw_name; /* user name */ 102 char* pw_name; /* user name */ 118 char* pw_name; /* user name */ 134 char* pw_name; /* user name */ 151 char* pw_name; 166 char* pw_name; 178 char *pw_name; 191 char* pw_name;
|
/dports/lang/gcc11/gcc-11.2.0/libphobos/libdruntime/core/sys/posix/ |
H A D | pwd.d | 56 char* pw_name; in version() member 69 char* pw_name; 85 char* pw_name; /* user name */ 102 char* pw_name; /* user name */ 118 char* pw_name; /* user name */ 134 char* pw_name; /* user name */ 151 char* pw_name; 166 char* pw_name; 178 char *pw_name; 191 char* pw_name;
|
/dports/lang/gcc10/gcc-10.3.0/libphobos/libdruntime/core/sys/posix/ |
H A D | pwd.d | 55 char* pw_name; in version() member 68 char* pw_name; 84 char* pw_name; /* user name */ 101 char* pw_name; /* user name */ 117 char* pw_name; /* user name */ 133 char* pw_name; /* user name */ 150 char* pw_name; 165 char* pw_name; 177 char *pw_name; 190 char* pw_name;
|
/dports/lang/gcc11-devel/gcc-11-20211009/libphobos/libdruntime/core/sys/posix/ |
H A D | pwd.d | 56 char* pw_name; in version() member 69 char* pw_name; 85 char* pw_name; /* user name */ 102 char* pw_name; /* user name */ 118 char* pw_name; /* user name */ 134 char* pw_name; /* user name */ 151 char* pw_name; 166 char* pw_name; 178 char *pw_name; 191 char* pw_name;
|
/dports/devel/avr-gcc/gcc-10.2.0/libphobos/libdruntime/core/sys/posix/ |
H A D | pwd.d | 55 char* pw_name; in version() member 68 char* pw_name; 84 char* pw_name; /* user name */ 101 char* pw_name; /* user name */ 117 char* pw_name; /* user name */ 133 char* pw_name; /* user name */ 150 char* pw_name; 165 char* pw_name; 177 char *pw_name; 190 char* pw_name;
|