Lines Matching refs:pwd
82 #include <pwd.h>
263 static struct passwd *pwd = NULL;
518 if ((pwd = getpwnam(user_name)) == NULL) {
551 if (pwd->pw_uid == 0) {
576 if (di_devperm_login((const char *)ttyn, pwd->pw_uid, pwd->pw_gid,
595 if (setuid(pwd->pw_uid) == -1) {
610 if (pwd->pw_uid == 0) {
744 if ((pwd = getpwnam(user_name)) != NULL) {
951 if (((pwd = getpwnam(user_name)) == NULL) &&
1170 if (pwd == NULL || pwd->pw_uid != 0 || zflag != B_FALSE ||
1602 pwd = &nouser;
1608 pwd = getpwnam(lusername);
1609 if (pwd == NULL) {
1610 pwd = &nouser;
1685 audit_success(ADT_passwd, pwd, zone_name);
1712 offset = (long long) pwd->pw_uid * (long long) sizeof (struct lastlog);
1735 if (chdir(pwd->pw_dir) < 0) {
1746 remote_host, NMAX, pwd->pw_name);
1750 ttyn, NMAX, pwd->pw_name);
1758 pwd->pw_dir = "/";
1817 audit_failure(get_audit_id(), ADT_FAIL_PAM + err, pwd,
1850 audit_failure(get_audit_id(), ADT_FAIL_VALUE_MAX_TRIES, pwd,
1861 if ((pwd = getpwnam(user_name)) != NULL) {
1915 if (setgid(pwd->pw_gid) == -1) {
1923 (initgroups(user_name, pwd->pw_gid) == -1)) {
1940 audit_success(get_audit_id(), pwd, zone_name);
1981 if (strncmp("pri=", pwd->pw_gecos, 4) == 0) {
1986 if (pwd->pw_gecos[i] == '-') {
1991 while (pwd->pw_gecos[i] >= '0' && pwd->pw_gecos[i] <= '9')
1992 pri = (pri * 10) + pwd->pw_gecos[i++] - '0';
2121 if (*pwd->pw_shell == '*') {
2124 if (chroot(pwd->pw_dir) < 0) {
2129 pwd, remote_host, ttyn, zone_name);
2139 (void) printf("Subsystem root: %s\n", pwd->pw_dir);
2212 ENVSTRNCAT(logname, pwd->pw_name);
2255 ENVSTRNCAT(home, pwd->pw_dir);
2269 if (*pwd->pw_shell == '\0') {
2275 pwd->pw_shell = SHELL;
2277 pwd->pw_shell = SHELL2;
2280 ENVSTRNCAT(shell, pwd->pw_shell);
2285 (void) strlcat(mail, pwd->pw_name, sizeof (mail));
2477 (void) strlcat(minusnam, basename(pwd->pw_shell),
2483 (void) execl(pwd->pw_shell, minusnam, (char *)0);
2486 * pwd->pw_shell was not an executable object file, maybe it
2496 if (access(pwd->pw_shell, R_OK|X_OK) == 0) {
2497 (void) execl(SHELL, "sh", pwd->pw_shell, (char *)0);
2498 (void) execl(SHELL2, "sh", pwd->pw_shell, (char *)0);
2517 pwd, remote_host, ttyn, zone_name);