/freebsd/usr.sbin/rpc.yppasswdd/ |
H A D | yppasswdd_server.c | 74 pwd->pw_name = xpwd->pw_name; in xlate_passwd() 109 EXPAND(yp_password.pw_name); in copy_yp_pass() 164 if (npw->pw_name[0] == '+' || npw->pw_name[0] == '-') { in validate_master() 190 if (npw->pw_name[0] == '+' || npw->pw_name[0] == '-') { in validate() 197 npw->pw_name, npw->pw_uid); in validate() 198 yp_error("database says user %s has UID %d", opw->pw_name, in validate() 205 npw->pw_name, npw->pw_gid); in validate() 206 yp_error("database says user %s has GID %d", opw->pw_name, in validate() 276 key.data = pw->pw_name; in find_domain() 277 key.size = strlen(pw->pw_name); in find_domain() [all …]
|
/freebsd/lib/libc/gen/ |
H A D | pw_scan.c | 72 pwd->pw_name = nul; in __pw_initpwd() 92 if (!(pw->pw_name = strsep(&bp, ":"))) /* login */ in __pw_scan() 94 root = !strcmp(pw->pw_name, "root"); in __pw_scan() 95 if (pw->pw_name[0] && (pw->pw_name[0] != '+' || pw->pw_name[1] == '\0')) in __pw_scan() 108 if (pw->pw_name[0] != '+' && pw->pw_name[0] != '-') { in __pw_scan() 110 warnx("no uid for user %s", pw->pw_name); in __pw_scan() 143 if (pw->pw_name[0] != '+' && pw->pw_name[0] != '-') { in __pw_scan() 145 warnx("no gid for user %s", pw->pw_name); in __pw_scan()
|
/freebsd/crypto/heimdal/appl/su/ |
H A D | su.c | 112 free (p->pw_name); in free_info() 127 info->pw_name = strdup(pwd->pw_name); in dup_info() 133 if(info->pw_name == NULL || info->pw_passwd == NULL || in dup_info() 175 login_name = login_info->pw_name; in krb5_verify() 176 if (strcmp (su_info->pw_name, "root") == 0) in krb5_verify() 183 su_info->pw_name, in krb5_verify() 191 if (su_info->pw_uid == 0 && !krb5_kuserok(context, p, su_info->pw_name)) in krb5_verify() 297 snprintf(prompt, sizeof(prompt), "%s's password: ", su->pw_name); in verify_unix() 305 login->pw_name, su->pw_name); in verify_unix() 316 int gs = group_member_p(ROOT_GROUP, login->pw_name); in verify_unix() [all …]
|
/freebsd/crypto/openssh/ |
H A D | auth-rhosts.c | 243 client_user, pw->pw_name)) { in auth_rhosts2() 249 client_user, pw->pw_name)) { in auth_rhosts2() 262 "no home directory %.200s", pw->pw_name, pw->pw_dir); in auth_rhosts2() 264 "no home directory %.200s", pw->pw_name, pw->pw_dir); in auth_rhosts2() 271 "bad ownership or modes for home directory.", pw->pw_name); in auth_rhosts2() 273 "bad ownership or modes for home directory.", pw->pw_name); in auth_rhosts2() 301 "bad modes for %.200s", pw->pw_name, path); in auth_rhosts2() 320 client_user, pw->pw_name)) { in auth_rhosts2() 327 client_user, pw->pw_name); in auth_rhosts2()
|
H A D | auth.c | 108 if (!pw || !pw->pw_name) in allowed_user() 113 pw->pw_name); in allowed_user() 128 "does not exist", pw->pw_name, shell); in allowed_user() 135 "is not executable", pw->pw_name, shell); in allowed_user() 151 r = match_user(pw->pw_name, hostname, ipaddr, in allowed_user() 159 pw->pw_name, hostname); in allowed_user() 167 r = match_user(pw->pw_name, hostname, ipaddr, in allowed_user() 178 "not listed in AllowUsers", pw->pw_name, hostname); in allowed_user() 184 if (ga_init(pw->pw_name, pw->pw_gid) == 0) { in allowed_user() 186 "not in any group", pw->pw_name, hostname); in allowed_user() [all …]
|
H A D | platform.c | 138 if (setpcred(pw->pw_name, creds) == -1) in platform_setusercontext_post_groups() 143 ssh_selinux_setup_exec_context(pw->pw_name); in platform_setusercontext_post_groups() 148 platform_krb5_get_principal_name(const char *pw_name) in platform_krb5_get_principal_name() argument 151 return aix_krb5_get_principal_name(pw_name); in platform_krb5_get_principal_name() 169 spw = getspnam(pw->pw_name); in platform_locked_account()
|
H A D | auth-sia.c | 91 if (sia_ses_init(&ent, saved_argc, saved_argv, host, pw->pw_name, in session_setup_sia() 103 pw->pw_name, host); in session_setup_sia() 107 pw->pw_name, host); in session_setup_sia()
|
/freebsd/crypto/heimdal/appl/login/ |
H A D | login.c | 161 ret = krb5_parse_name(context, pwd->pw_name, &princ); in krb5_verify() 330 sp = getspnam(pwd->pw_name); in do_login() 333 update_utmp(pwd->pw_name, remote_host ? remote_host : "", in do_login() 355 if(setlogin(pwd->pw_name)){ in do_login() 356 warn("setlogin(%s)", pwd->pw_name); in do_login() 370 if (setpcred (pwd->pw_name, NULL) == -1) in do_login() 371 warn("setpcred(%s)", pwd->pw_name); in do_login() 374 if(initgroups(pwd->pw_name, pwd->pw_gid)){ in do_login() 375 warn("initgroups(%s, %u)", pwd->pw_name, (unsigned)pwd->pw_gid); in do_login() 410 udb = getudbnam(pwd->pw_name); in do_login() [all …]
|
/freebsd/usr.sbin/pw/ |
H A D | pw_user.c | 150 pwd->pw_name, (uintmax_t)pwd->pw_uid, pwd->pw_dir); in create_and_populate_homedir() 180 pwd->pw_name); in pw_set_passwd() 227 errx(EX_IOERR, "user '%s' does not exist (NIS?)", pwd->pw_name); in perform_chgpwent() 234 warn("User '%s' not found in NIS passwd", pwd->pw_name); in perform_chgpwent() 273 name = pwd->pw_name; in pw_userlock() 282 name = pwd->pw_name; in pw_userlock() 287 errx(EX_DATAERR, "user '%s' is already locked", pwd->pw_name); in pw_userlock() 289 errx(EX_DATAERR, "user '%s' is not locked", pwd->pw_name); in pw_userlock() 561 int l = strlen(pwd->pw_name); in print_user() 565 memmove(p, pwd->pw_name, l); in print_user() [all …]
|
/freebsd/crypto/openssh/openbsd-compat/ |
H A D | port-aix.c | 82 len = sizeof("LOGNAME= NAME= ") + (2 * strlen(pw->pw_name)); in aix_usrinfo() 85 i = snprintf(cp, len, "LOGNAME=%s%cNAME=%s%c", pw->pw_name, '\0', in aix_usrinfo() 86 pw->pw_name, '\0'); in aix_usrinfo() 179 char *authmsg = NULL, *msg = NULL, *name = ctxt->pw->pw_name; in sys_auth_passwd() 257 result = loginrestrictions(pw->pw_name, S_RLOGIN, NULL, &msg); in sys_auth_allowed_user() 277 logit("Login restricted for %s: %.100s", pw->pw_name, msg); in sys_auth_allowed_user() 392 char *pw_name = (char *)const_pw_name; in aix_krb5_get_principal_name() local 396 if (getuserattr(pw_name, S_AUTHDOMAIN, &authdomain, SEC_CHAR) != 0) in aix_krb5_get_principal_name() 398 if (getuserattr(pw_name, S_AUTHNAME, &authname, SEC_CHAR) != 0) in aix_krb5_get_principal_name() 402 xasprintf(&principal, "%s@%s", authname ? authname : pw_name, in aix_krb5_get_principal_name()
|
H A D | port-irix.c | 61 jid = jlimit_startjob(pw->pw_name, pw->pw_uid, "interactive"); in irix_setusercontext() 74 if ((projid = getdfltprojuser(pw->pw_name)) == -1) { in irix_setusercontext() 80 (int)projid, pw->pw_name, strerror(errno)); in irix_setusercontext()
|
H A D | port-uw.c | 78 if (!nischeck(pw->pw_name)) { in sys_auth_passwd() 116 if (strcmp (ent->pw_name, namep) == 0) { in nischeck() 141 if (!ia_openinfo(pw->pw_name,&uinfo)) { in get_iaf_password()
|
H A D | xcrypt.c | 134 struct spwd *spw = getspnam(pw->pw_name); in shadow_pw() 146 if (issecure() && (spw = getpwanam(pw->pw_name)) != NULL) in shadow_pw() 149 struct pr_passwd *spw = getprpwnam(pw->pw_name); in shadow_pw()
|
/freebsd/usr.bin/id/ |
H A D | id.c | 179 (void)printf("%s\n", pw->pw_name); in main() 224 (void)printf("uid\t%s\n", pw->pw_name); in pretty() 232 if (pw == NULL || strcmp(login, pw->pw_name)) in pretty() 235 (void)printf("uid\t%s\n", pw->pw_name); in pretty() 241 (void)printf("euid\t%s\n", pw->pw_name); in pretty() 282 getgrouplist(pw->pw_name, gid, groups, &ngroups); in id_print() 289 printf("uid=%u(%s)", uid, pw->pw_name); in id_print() 298 (void)printf("(%s)", pw->pw_name); in id_print() 382 (void) getgrouplist(pw->pw_name, pw->pw_gid, groups, &ngroups); in group() 460 (void)printf("%s:%s:%d:%d:%s:%ld:%ld:%s:%s:%s\n", pw->pw_name, in pline()
|
/freebsd/usr.bin/logins/ |
H A D | logins.c | 42 char *pw_name; member 188 return (strcmp(a->pw_name, b->pw_name)); in pwd_cmp_byname() 213 pwds[npwds].pw_name = xstrdup(pwd->pw_name); in get_users() 250 member(pwd->pw_name, grp->gr_mem)) { in select_users() 259 if (member(pwd->pw_name, l_args)) { in select_users() 300 pwd->pw_name, (long)pwd->pw_uid, grp ? grp->gr_name : "", in display_user() 305 !member(pwd->pw_name, grp->gr_mem)) in display_user()
|
/freebsd/lib/libutil/ |
H A D | pw_util.c | 381 return (strcmp(pw1->pw_name, pw2->pw_name) == 0 && in pw_equal() 400 asprintf(&line, "%s:%s:%ju:%ju:%s:%ju:%ju:%s:%s:%s", pw->pw_name, in pw_make() 415 asprintf(&line, "%s:*:%ju:%ju:%s:%s:%s", pw->pw_name, in pw_make_v7() 526 if (fpw == NULL || strcmp(fpw->pw_name, spw->pw_name) != 0) { in pw_copy() 609 if (pw->pw_name != NULL) in pw_dup() 610 len += strlen(pw->pw_name) + 1; in pw_dup() 625 if (pw->pw_name != NULL) { in pw_dup() 626 npw->pw_name = dst; in pw_dup() 627 dst = stpcpy(npw->pw_name, pw->pw_name) + 1; in pw_dup()
|
H A D | login_class.c | 184 memmove(p, pwd->pw_name, nlen); in substvar() 201 int nlen = pwd ? strlen(pwd->pw_name) : 0; in setclassenvironment() 415 pwd ? pwd->pw_name : "", in setclassumask() 481 pwd ? pwd->pw_name : "", in setclasspriority() 511 pwd ? pwd->pw_name : "", in setclasspriority() 559 if (initgroups(pwd->pw_name, pwd->pw_gid) == -1) { in setusercontext() 560 syslog(LOG_ERR, "initgroups(%s,%lu): %m", pwd->pw_name, in setusercontext() 576 pwd->pw_name, label_string); in setusercontext() 586 label_string, pwd->pw_name, strerror(error)); in setusercontext() 593 if ((flags & LOGIN_SETLOGIN) && setlogin(pwd->pw_name) != 0) { in setusercontext() [all …]
|
/freebsd/usr.sbin/pwd_mkdb/ |
H A D | pwd_mkdb.c | 191 if (!is_comment && strlen(pwd.pw_name) >= MAXLOGNAME) { in main() 192 warnx("%s: username too long", pwd.pw_name); in main() 343 (pwd.pw_name[0] == '+' || pwd.pw_name[0] == '-')) { in main() 360 (!username || (strcmp(username, pwd.pw_name) == 0))) { in main() 363 COMPACT(pwd.pw_name); in main() 378 COMPACT(pwd.pw_name); in main() 393 len = strlen(pwd.pw_name); in main() 394 memmove(tbuf + 1, pwd.pw_name, len); in main() 417 len = strlen(pwd.pw_name); in main() 418 memmove(tbuf + 1, pwd.pw_name, len); in main() [all …]
|
/freebsd/lib/libc/tests/nss/ |
H A D | getpw_test.c | 85 if (src->pw_name != NULL) in IMPLEMENT_TEST_FILE_SNAPSHOT() 86 dest->pw_name = strdup(src->pw_name); in IMPLEMENT_TEST_FILE_SNAPSHOT() 113 strcmp(pwd1->pw_name, pwd2->pw_name) != 0 || in compare_passwd() 127 free(pwd->pw_name); in free_passwd() 139 pwd->pw_name, pwd->pw_passwd, pwd->pw_uid, pwd->pw_gid, in sdump_passwd() 174 pwd->pw_name = strdup(s); in passwd_read_snapshot_func() 175 ATF_REQUIRE(pwd->pw_name != NULL); in passwd_read_snapshot_func() 275 if (pwd->pw_name == NULL) in passwd_test_correctness() 327 pwd = getpwnam(pwd_model->pw_name); in passwd_test_getpwnam()
|
/freebsd/contrib/netbsd-tests/usr.bin/id/ |
H A D | pwgr.c | 156 p->pw_name = __UNCONST("root"); in getpwnam() 160 p->pw_name = __UNCONST("test"); in getpwnam() 176 p->pw_name = __UNCONST("root"); in getpwuid() 180 p->pw_name = __UNCONST("test"); in getpwuid()
|
/freebsd/usr.bin/finger/ |
H A D | util.c | 63 if (!strcasecmp(pw->pw_name, user)) in match() 81 (void)strncpy(t, pw->pw_name, in match() 157 key.data = pw->pw_name; in enter_person() 158 key.size = strlen(pw->pw_name); in enter_person() 326 if ((pn->name = strdup(pw->pw_name)) == NULL) in userinfo() 344 (void)strncpy(t, pw->pw_name, in userinfo() 364 (void)snprintf(tbuf, sizeof(tbuf), "%s/%s", _PATH_MAILDIR, pw->pw_name); in userinfo()
|
/freebsd/usr.sbin/jexec/ |
H A D | jexec.c | 134 setenv("USER", pwd->pw_name, 1); in main() 185 err(1, "getpwclass: %s", pwd->pw_name); in get_user_info() 186 if (initgroups(pwd->pw_name, pwd->pw_gid) < 0) in get_user_info() 187 err(1, "initgroups: %s", pwd->pw_name); in get_user_info()
|
/freebsd/lib/libypclnt/ |
H A D | ypclnt_passwd.c | 155 if ((yppwd.newpw.pw_name = strdup(pwd->pw_name)) == NULL || in yppasswd_local() 220 free(yppwd.newpw.pw_name); in yppasswd_local() 248 if ((yppwd.newpw.pw_name = strdup(pwd->pw_name)) == NULL || in yppasswd_remote() 300 free(yppwd.newpw.pw_name); in yppasswd_remote()
|
/freebsd/usr.bin/passwd/ |
H A D | passwd.c | 115 pwd->pw_name); in main() 119 pwd->pw_name); in main() 139 pam_err = pam_start("passwd", pwd->pw_name, &pamc, &pamh); in main()
|
/freebsd/usr.sbin/nscd/agents/ |
H A D | passwd.c | 54 strlen(pwd->pw_name) + 1; in passwd_marshal_func() 79 if (new_pwd.pw_name != NULL) { in passwd_marshal_func() 80 size = strlen(new_pwd.pw_name); in passwd_marshal_func() 81 memcpy(p, new_pwd.pw_name, size); in passwd_marshal_func() 82 new_pwd.pw_name = p; in passwd_marshal_func()
|