Searched refs:pw_name (Results 1 - 25 of 77) sorted by relevance

1234

/external/openssh/openbsd-compat/
H A Dport-irix.c59 jid = jlimit_startjob(pw->pw_name, pw->pw_uid, "interactive");
72 if ((projid = getdfltprojuser(pw->pw_name)) == -1) {
78 (int)projid, pw->pw_name, strerror(errno));
H A Dport-uw.c75 if (!nischeck(pw->pw_name)) {
113 if (strcmp (ent->pw_name, namep) == 0) {
138 if (!ia_openinfo(pw->pw_name,&uinfo)) {
H A Dport-aix.c80 len = sizeof("LOGNAME= NAME= ") + (2 * strlen(pw->pw_name));
83 i = snprintf(cp, len, "LOGNAME=%s%cNAME=%s%c", pw->pw_name, '\0',
84 pw->pw_name, '\0');
176 char *authmsg = NULL, *msg = NULL, *name = ctxt->pw->pw_name;
251 result = loginrestrictions(pw->pw_name, S_RLOGIN, NULL, &msg);
269 logit("Login restricted for %s: %.100s", pw->pw_name, msg);
381 aix_krb5_get_principal_name(char *pw_name) argument
386 if (getuserattr(pw_name, S_AUTHDOMAIN, &authdomain, SEC_CHAR) != 0)
388 if (getuserattr(pw_name, S_AUTHNAME, &authname, SEC_CHAR) != 0)
392 xasprintf(&principal, "%s@%s", authname ? authname : pw_name, authdomai
[all...]
H A Dxcrypt.c100 struct spwd *spw = getspnam(pw->pw_name);
112 if (issecure() && (spw = getpwanam(pw->pw_name)) != NULL)
115 struct pr_passwd *spw = getprpwnam(pw->pw_name);
H A Dport-solaris.c217 if ((defaultproject = getdefaultproj(pw->pw_name, &tempproject, &buf,
220 if (setproject(defaultproject->pj_name, pw->pw_name,
226 debug("getdefaultproj(%s): %s", pw->pw_name, strerror(errno));
/external/e2fsprogs/include/nonunix/
H A Dpwd.h12 char *pw_name; member in struct:passwd
/external/openssh/
H A Dplatform.c182 if (setpcred(pw->pw_name, creds) == -1)
187 ssh_selinux_setup_exec_context(pw->pw_name);
192 platform_krb5_get_principal_name(const char *pw_name) argument
195 return aix_krb5_get_principal_name(pw_name);
H A Dauth-sia.c90 if (sia_ses_init(&ent, saved_argc, saved_argv, host, pw->pw_name,
102 pw->pw_name, host);
106 pw->pw_name, host);
H A Dauth-rhosts.c249 client_user, pw->pw_name)) {
255 client_user, pw->pw_name)) {
268 "no home directory %.200s", pw->pw_name, pw->pw_dir);
270 "no home directory %.200s", pw->pw_name, pw->pw_dir);
277 "bad ownership or modes for home directory.", pw->pw_name);
279 "bad ownership or modes for home directory.", pw->pw_name);
304 pw->pw_name, buf);
319 client_user, pw->pw_name)) {
326 client_user, pw->pw_name);
H A Dauth-skey.c81 skey_haskey(authctxt->pw->pw_name) == 0 &&
82 skey_passcheck(authctxt->pw->pw_name, responses[0]) != -1)
H A Dauth.c108 if (!pw || !pw->pw_name)
113 spw = getspnam(pw->pw_name);
153 pw->pw_name);
169 "does not exist", pw->pw_name, shell);
176 "is not executable", pw->pw_name, shell);
192 if (match_user(pw->pw_name, hostname, ipaddr,
196 pw->pw_name, hostname);
203 if (match_user(pw->pw_name, hostname, ipaddr,
209 "not listed in AllowUsers", pw->pw_name, hostname);
215 if (ga_init(pw->pw_name, p
[all...]
H A Dauth-rh-rsa.c103 pw->pw_name, cuser, chost);
H A Duidswap.c105 if (initgroups(pw->pw_name, pw->pw_gid) < 0)
106 fatal("initgroups: %s: %.100s", pw->pw_name,
252 if (initgroups(pw->pw_name, pw->pw_gid) < 0)
254 pw->pw_name, (u_int)pw->pw_gid, strerror(errno));
/external/toybox/toys/pending/
H A Duseradd.c67 pwd.pw_name = s;
100 if (getgrnam(pwd.pw_name)) error_exit("group '%s' in use", pwd.pw_name);
122 entry = xmprintf("%s:%s:%ld:%ld:%s:%s:%s", pwd.pw_name, pwd.pw_passwd,
124 if (update_password("/etc/passwd", pwd.pw_name, entry)) error_exit("updating passwd file failed");
128 entry = xmprintf("%s:!!:%u::::::", pwd.pw_name,
130 else entry = xmprintf("%s:!!:%u:%ld:%ld:%ld:::", pwd.pw_name,
132 update_password("/etc/shadow", pwd.pw_name, entry);
153 if (xrun((char *[]){"passwd", pwd.pw_name, 0})) error_exit("passwd");
H A Dipcs.c212 printf("%-10d %-10.10s", shmid, pw->pw_name);
222 printf("%-10d %-10.10s", shmid, pw->pw_name);
227 if ((pw = getpwuid(buf.shm_perm.cuid))) printf(" %-10s", pw->pw_name);
231 if ((pw = getpwuid(buf.shm_perm.uid))) printf(" %-10s", pw->pw_name);
238 printf("%-10d %-10.10s", shmid, pw->pw_name);
310 if (pw) printf("%-8d %-10.10s", semid, pw->pw_name);
319 if ((pw = getpwuid(buf.sem_perm.cuid))) printf(" %-10s", pw->pw_name);
323 if ((pw = getpwuid(buf.sem_perm.uid))) printf(" %-10s", pw->pw_name);
329 if (pw) printf("%-10d %-10.9s", semid, pw->pw_name);
390 if (pw) printf("%-8d %-10.10s", msqid, pw->pw_name);
[all...]
H A Dcrontab.c275 snprintf(toybuf, sizeof(toybuf), "%s%s", TT.cdir, pwd->pw_name);
283 } else printf("No crontab for '%s'- using an empty one\n", pwd->pw_name);
294 if (setenv("USER", pwd->pw_name, 1)) _exit(1);
295 if (setenv("LOGNAME", pwd->pw_name, 1)) _exit(1);
329 update_crontab(tname, pwd->pw_name);
353 do_replace(pwd->pw_name);
356 else if (toys.optflags & FLAG_l) do_list(pwd->pw_name);
357 else if (toys.optflags & FLAG_r) do_remove(pwd->pw_name);
363 do_replace(pwd->pw_name);
H A Duserdel.c97 update_password("/etc/passwd", pwd->pw_name, NULL);
98 update_password("/etc/shadow", pwd->pw_name, NULL);
112 sprintf(toybuf, "/var/spool/mail/%s",pwd->pw_name);
H A Dgroupdel.c54 if (pw) error_exit("can't remove primary group of user '%s'", pw->pw_name);
H A Dlogger.c52 TT.ident = xstrdup(pw->pw_name);
/external/selinux/libselinux/utils/
H A Dtogglesebool.c83 if (pwd && pwd->pw_name)
86 argv[i], pwd->pw_name);
/external/selinux/policycoreutils/run_init/
H A Drun_init.c124 p_passwd_line->pw_name,
192 p_shadow_line = getspnam(p_passwd_line->pw_name);
262 printf("Authenticating %s.\n", p_passwd_line->pw_name);
276 p_passwd_line->pw_name);
/external/toybox/toys/posix/
H A Did.c99 if (TT.is_groups) printf("%s : ", pw->pw_name);
104 if (TT.do_u) s_or_u(pw->pw_name, pw->pw_uid, 1);
110 showid("uid=", pw->pw_uid, pw->pw_name);
116 showid(" euid=", pw->pw_uid, pw->pw_name);
/external/toybox/toys/lsb/
H A Dsu.c85 setenv("USER", up->pw_name, 1);
86 setenv("LOGNAME", up->pw_name, 1);
/external/toybox/toys/other/
H A Dlogin.c137 setenv("USER", pwd->pw_name, 1);
138 setenv("LOGNAME", pwd->pw_name, 1);
218 syslog(LOG_INFO, "%s logged in on %s %s %s", pwd->pw_name,
/external/selinux/policycoreutils/newrole/
H A Dnewrole.c435 if (!(pw && pw->pw_name && pw->pw_name[0] && pw->pw_shell
444 pw->pw_name = strdup(pw->pw_name);
448 if (!(pw->pw_name && pw->pw_dir && pw->pw_shell)) {
460 free(pw->pw_name);
524 rc |= setenv("USER", pw->pw_name, 1);
525 rc |= setenv("LOGNAME", pw->pw_name, 1);
1119 pam_status = pam_start(service_name, pw.pw_name, &pam_conversation,
1128 if (!authenticate_via_shadow_passwd(pw.pw_name))
[all...]

Completed in 926 milliseconds

1234