/external/openssh/openbsd-compat/ |
H A D | port-irix.c | 59 jid = jlimit_startjob(pw->pw_name, pw->pw_uid, "interactive"); 72 if ((projid = getdfltprojuser(pw->pw_name)) == -1) { 78 (int)projid, pw->pw_name, strerror(errno));
|
H A D | port-uw.c | 75 if (!nischeck(pw->pw_name)) { 113 if (strcmp (ent->pw_name, namep) == 0) { 138 if (!ia_openinfo(pw->pw_name,&uinfo)) {
|
H A D | port-aix.c | 80 len = sizeof("LOGNAME= NAME= ") + (2 * strlen(pw->pw_name)); 83 i = snprintf(cp, len, "LOGNAME=%s%cNAME=%s%c", pw->pw_name, '\0', 84 pw->pw_name, '\0'); 176 char *authmsg = NULL, *msg = NULL, *name = ctxt->pw->pw_name; 251 result = loginrestrictions(pw->pw_name, S_RLOGIN, NULL, &msg); 269 logit("Login restricted for %s: %.100s", pw->pw_name, msg); 381 aix_krb5_get_principal_name(char *pw_name) argument 386 if (getuserattr(pw_name, S_AUTHDOMAIN, &authdomain, SEC_CHAR) != 0) 388 if (getuserattr(pw_name, S_AUTHNAME, &authname, SEC_CHAR) != 0) 392 xasprintf(&principal, "%s@%s", authname ? authname : pw_name, authdomai [all...] |
H A D | xcrypt.c | 100 struct spwd *spw = getspnam(pw->pw_name); 112 if (issecure() && (spw = getpwanam(pw->pw_name)) != NULL) 115 struct pr_passwd *spw = getprpwnam(pw->pw_name);
|
H A D | port-solaris.c | 217 if ((defaultproject = getdefaultproj(pw->pw_name, &tempproject, &buf, 220 if (setproject(defaultproject->pj_name, pw->pw_name, 226 debug("getdefaultproj(%s): %s", pw->pw_name, strerror(errno));
|
/external/e2fsprogs/include/nonunix/ |
H A D | pwd.h | 12 char *pw_name; member in struct:passwd
|
/external/openssh/ |
H A D | platform.c | 182 if (setpcred(pw->pw_name, creds) == -1) 187 ssh_selinux_setup_exec_context(pw->pw_name); 192 platform_krb5_get_principal_name(const char *pw_name) argument 195 return aix_krb5_get_principal_name(pw_name);
|
H A D | auth-sia.c | 90 if (sia_ses_init(&ent, saved_argc, saved_argv, host, pw->pw_name, 102 pw->pw_name, host); 106 pw->pw_name, host);
|
H A D | auth-rhosts.c | 249 client_user, pw->pw_name)) { 255 client_user, pw->pw_name)) { 268 "no home directory %.200s", pw->pw_name, pw->pw_dir); 270 "no home directory %.200s", pw->pw_name, pw->pw_dir); 277 "bad ownership or modes for home directory.", pw->pw_name); 279 "bad ownership or modes for home directory.", pw->pw_name); 304 pw->pw_name, buf); 319 client_user, pw->pw_name)) { 326 client_user, pw->pw_name);
|
H A D | auth-skey.c | 81 skey_haskey(authctxt->pw->pw_name) == 0 && 82 skey_passcheck(authctxt->pw->pw_name, responses[0]) != -1)
|
H A D | auth.c | 108 if (!pw || !pw->pw_name) 113 spw = getspnam(pw->pw_name); 153 pw->pw_name); 169 "does not exist", pw->pw_name, shell); 176 "is not executable", pw->pw_name, shell); 192 if (match_user(pw->pw_name, hostname, ipaddr, 196 pw->pw_name, hostname); 203 if (match_user(pw->pw_name, hostname, ipaddr, 209 "not listed in AllowUsers", pw->pw_name, hostname); 215 if (ga_init(pw->pw_name, p [all...] |
H A D | auth-rh-rsa.c | 103 pw->pw_name, cuser, chost);
|
H A D | uidswap.c | 105 if (initgroups(pw->pw_name, pw->pw_gid) < 0) 106 fatal("initgroups: %s: %.100s", pw->pw_name, 252 if (initgroups(pw->pw_name, pw->pw_gid) < 0) 254 pw->pw_name, (u_int)pw->pw_gid, strerror(errno));
|
/external/toybox/toys/pending/ |
H A D | useradd.c | 67 pwd.pw_name = s; 100 if (getgrnam(pwd.pw_name)) error_exit("group '%s' in use", pwd.pw_name); 122 entry = xmprintf("%s:%s:%ld:%ld:%s:%s:%s", pwd.pw_name, pwd.pw_passwd, 124 if (update_password("/etc/passwd", pwd.pw_name, entry)) error_exit("updating passwd file failed"); 128 entry = xmprintf("%s:!!:%u::::::", pwd.pw_name, 130 else entry = xmprintf("%s:!!:%u:%ld:%ld:%ld:::", pwd.pw_name, 132 update_password("/etc/shadow", pwd.pw_name, entry); 153 if (xrun((char *[]){"passwd", pwd.pw_name, 0})) error_exit("passwd");
|
H A D | ipcs.c | 212 printf("%-10d %-10.10s", shmid, pw->pw_name); 222 printf("%-10d %-10.10s", shmid, pw->pw_name); 227 if ((pw = getpwuid(buf.shm_perm.cuid))) printf(" %-10s", pw->pw_name); 231 if ((pw = getpwuid(buf.shm_perm.uid))) printf(" %-10s", pw->pw_name); 238 printf("%-10d %-10.10s", shmid, pw->pw_name); 310 if (pw) printf("%-8d %-10.10s", semid, pw->pw_name); 319 if ((pw = getpwuid(buf.sem_perm.cuid))) printf(" %-10s", pw->pw_name); 323 if ((pw = getpwuid(buf.sem_perm.uid))) printf(" %-10s", pw->pw_name); 329 if (pw) printf("%-10d %-10.9s", semid, pw->pw_name); 390 if (pw) printf("%-8d %-10.10s", msqid, pw->pw_name); [all...] |
H A D | crontab.c | 275 snprintf(toybuf, sizeof(toybuf), "%s%s", TT.cdir, pwd->pw_name); 283 } else printf("No crontab for '%s'- using an empty one\n", pwd->pw_name); 294 if (setenv("USER", pwd->pw_name, 1)) _exit(1); 295 if (setenv("LOGNAME", pwd->pw_name, 1)) _exit(1); 329 update_crontab(tname, pwd->pw_name); 353 do_replace(pwd->pw_name); 356 else if (toys.optflags & FLAG_l) do_list(pwd->pw_name); 357 else if (toys.optflags & FLAG_r) do_remove(pwd->pw_name); 363 do_replace(pwd->pw_name);
|
H A D | userdel.c | 97 update_password("/etc/passwd", pwd->pw_name, NULL); 98 update_password("/etc/shadow", pwd->pw_name, NULL); 112 sprintf(toybuf, "/var/spool/mail/%s",pwd->pw_name);
|
H A D | groupdel.c | 54 if (pw) error_exit("can't remove primary group of user '%s'", pw->pw_name);
|
H A D | logger.c | 52 TT.ident = xstrdup(pw->pw_name);
|
/external/selinux/libselinux/utils/ |
H A D | togglesebool.c | 83 if (pwd && pwd->pw_name) 86 argv[i], pwd->pw_name);
|
/external/selinux/policycoreutils/run_init/ |
H A D | run_init.c | 124 p_passwd_line->pw_name, 192 p_shadow_line = getspnam(p_passwd_line->pw_name); 262 printf("Authenticating %s.\n", p_passwd_line->pw_name); 276 p_passwd_line->pw_name);
|
/external/toybox/toys/posix/ |
H A D | id.c | 99 if (TT.is_groups) printf("%s : ", pw->pw_name); 104 if (TT.do_u) s_or_u(pw->pw_name, pw->pw_uid, 1); 110 showid("uid=", pw->pw_uid, pw->pw_name); 116 showid(" euid=", pw->pw_uid, pw->pw_name);
|
/external/toybox/toys/lsb/ |
H A D | su.c | 85 setenv("USER", up->pw_name, 1); 86 setenv("LOGNAME", up->pw_name, 1);
|
/external/toybox/toys/other/ |
H A D | login.c | 137 setenv("USER", pwd->pw_name, 1); 138 setenv("LOGNAME", pwd->pw_name, 1); 218 syslog(LOG_INFO, "%s logged in on %s %s %s", pwd->pw_name,
|
/external/selinux/policycoreutils/newrole/ |
H A D | newrole.c | 435 if (!(pw && pw->pw_name && pw->pw_name[0] && pw->pw_shell 444 pw->pw_name = strdup(pw->pw_name); 448 if (!(pw->pw_name && pw->pw_dir && pw->pw_shell)) { 460 free(pw->pw_name); 524 rc |= setenv("USER", pw->pw_name, 1); 525 rc |= setenv("LOGNAME", pw->pw_name, 1); 1119 pam_status = pam_start(service_name, pw.pw_name, &pam_conversation, 1128 if (!authenticate_via_shadow_passwd(pw.pw_name)) [all...] |