/external/openssh/ |
D | auth.c | 105 if (!pw || !pw->pw_name) in allowed_user() 110 spw = getspnam(pw->pw_name); in allowed_user() 150 pw->pw_name); in allowed_user() 166 "does not exist", pw->pw_name, shell); in allowed_user() 173 "is not executable", pw->pw_name, shell); in allowed_user() 189 if (match_user(pw->pw_name, hostname, ipaddr, in allowed_user() 193 pw->pw_name, hostname); in allowed_user() 200 if (match_user(pw->pw_name, hostname, ipaddr, in allowed_user() 206 "not listed in AllowUsers", pw->pw_name, hostname); in allowed_user() 212 if (ga_init(pw->pw_name, pw->pw_gid) == 0) { in allowed_user() [all …]
|
D | auth-rhosts.c | 235 client_user, pw->pw_name)) { in auth_rhosts2_raw() 241 client_user, pw->pw_name)) { in auth_rhosts2_raw() 253 "no home directory %.200s", pw->pw_name, pw->pw_dir); in auth_rhosts2_raw() 255 "no home directory %.200s", pw->pw_name, pw->pw_dir); in auth_rhosts2_raw() 262 "bad ownership or modes for home directory.", pw->pw_name); in auth_rhosts2_raw() 264 "bad ownership or modes for home directory.", pw->pw_name); in auth_rhosts2_raw() 289 pw->pw_name, buf); in auth_rhosts2_raw() 300 if (check_rhosts_file(buf, hostname, ipaddr, client_user, pw->pw_name)) { in auth_rhosts2_raw() 306 hostname, ipaddr, client_user, pw->pw_name); in auth_rhosts2_raw()
|
D | platform.c | 160 if (set_id(pw->pw_name) != 0) { in platform_setusercontext_post_groups() 179 if (setpcred(pw->pw_name, creds) == -1) in platform_setusercontext_post_groups() 184 ssh_selinux_setup_exec_context(pw->pw_name); in platform_setusercontext_post_groups() 189 platform_krb5_get_principal_name(const char *pw_name) in platform_krb5_get_principal_name() argument 192 return aix_krb5_get_principal_name(pw_name); in platform_krb5_get_principal_name()
|
D | auth-sia.c | 90 if (sia_ses_init(&ent, saved_argc, saved_argv, host, pw->pw_name, in session_setup_sia() 102 pw->pw_name, host); in session_setup_sia() 106 pw->pw_name, host); in session_setup_sia()
|
D | auth-skey.c | 81 skey_haskey(authctxt->pw->pw_name) == 0 && in skey_respond() 82 skey_passcheck(authctxt->pw->pw_name, responses[0]) != -1) in skey_respond()
|
D | uidswap.c | 105 if (initgroups(pw->pw_name, pw->pw_gid) < 0) in temporarily_use_uid() 106 fatal("initgroups: %s: %.100s", pw->pw_name, in temporarily_use_uid() 272 if (initgroups(pw->pw_name, pw->pw_gid) < 0) in permanently_set_uid() 274 pw->pw_name, (u_int)pw->pw_gid, strerror(errno)); in permanently_set_uid()
|
D | session.c | 273 setproctitle("%s", authctxt->pw->pw_name); in do_authenticated() 780 record_utmp_only(pid, s->tty, s->pw->pw_name, in do_pre_login() 868 record_login(pid, s->tty, pw->pw_name, pw->pw_uid, in do_login() 1165 child_set_env(&env, &envsize, "USER", pw->pw_name); in do_setup_env() 1166 child_set_env(&env, &envsize, "LOGNAME", pw->pw_name); in do_setup_env() 1168 child_set_env(&env, &envsize, "LOGIN", pw->pw_name); in do_setup_env() 1197 _PATH_MAILDIR, pw->pw_name); in do_setup_env() 1408 logit("User %.100s not allowed because %s exists", pw->pw_name, nl); in do_nologin() 1488 if (setlogin(pw->pw_name) < 0) in do_setusercontext() 1495 if (initgroups(pw->pw_name, pw->pw_gid) < 0) { in do_setusercontext() [all …]
|
D | auth-krb5.c | 84 platform_client = platform_krb5_get_principal_name(authctxt->pw->pw_name); in auth_krb5_password() 85 client = platform_client ? platform_client : authctxt->pw->pw_name; in auth_krb5_password()
|
D | auth-rh-rsa.c | 100 pw->pw_name, cuser, chost); in auth_rhosts_rsa()
|
D | auth-shadow.c | 91 const char *user = ctxt->pw->pw_name; in auth_shadow_pwexpired()
|
D | auth2-pubkey.c | 343 authorized_principals == NULL ? pw->pw_name : NULL, in user_key_allowed2() 417 principals_file == NULL ? pw->pw_name : NULL, &reason) != 0) in user_cert_trusted_ca()
|
D | auth-passwd.c | 173 as = auth_usercheck(pw->pw_name, authctxt->style, "auth-ssh", in sys_auth_passwd()
|
D | logintest.c | 101 strlcpy(username, pw->pw_name, sizeof(username)); in testAPI()
|
D | auth-options.c | 294 pw->pw_name, remote_host, remote_ip); in auth_parse_options() 532 "(ip=%.200s).", pw->pw_name, in parse_option_list()
|
/external/openssh/openbsd-compat/ |
D | port-aix.c | 80 len = sizeof("LOGNAME= NAME= ") + (2 * strlen(pw->pw_name)); in aix_usrinfo() 83 i = snprintf(cp, len, "LOGNAME=%s%cNAME=%s%c", pw->pw_name, '\0', in aix_usrinfo() 84 pw->pw_name, '\0'); in aix_usrinfo() 176 char *authmsg = NULL, *msg = NULL, *name = ctxt->pw->pw_name; in sys_auth_passwd() 253 result = loginrestrictions(pw->pw_name, S_RLOGIN, NULL, &msg); in sys_auth_allowed_user() 271 logit("Login restricted for %s: %.100s", pw->pw_name, msg); in sys_auth_allowed_user() 383 aix_krb5_get_principal_name(char *pw_name) in aix_krb5_get_principal_name() argument 388 if (getuserattr(pw_name, S_AUTHDOMAIN, &authdomain, SEC_CHAR) != 0) in aix_krb5_get_principal_name() 390 if (getuserattr(pw_name, S_AUTHNAME, &authname, SEC_CHAR) != 0) in aix_krb5_get_principal_name() 394 xasprintf(&principal, "%s@%s", authname ? authname : pw_name, authdomain); in aix_krb5_get_principal_name()
|
D | port-irix.c | 59 jid = jlimit_startjob(pw->pw_name, pw->pw_uid, "interactive"); in irix_setusercontext() 72 if ((projid = getdfltprojuser(pw->pw_name)) == -1) { in irix_setusercontext() 78 (int)projid, pw->pw_name, strerror(errno)); in irix_setusercontext()
|
D | port-uw.c | 74 if (!nischeck(pw->pw_name)) { in sys_auth_passwd() 112 if (strcmp (ent->pw_name, namep) == 0) { in nischeck() 137 if (!ia_openinfo(pw->pw_name,&uinfo)) { in get_iaf_password()
|
D | xcrypt.c | 95 struct spwd *spw = getspnam(pw->pw_name); in shadow_pw() 107 if (issecure() && (spw = getpwanam(pw->pw_name)) != NULL) in shadow_pw() 110 struct pr_passwd *spw = getprpwnam(pw->pw_name); in shadow_pw()
|
D | port-solaris.c | 217 if ((defaultproject = getdefaultproj(pw->pw_name, &tempproject, &buf, in solaris_set_default_project() 220 if (setproject(defaultproject->pj_name, pw->pw_name, in solaris_set_default_project() 226 debug("getdefaultproj(%s): %s", pw->pw_name, strerror(errno)); in solaris_set_default_project()
|
D | pwcache.c | 75 cp->name = strdup(pw ? pw->pw_name : nbuf); in user_from_uid()
|
/external/iptables/extensions/ |
D | libxt_owner.c | 303 if (pwd != NULL && pwd->pw_name != NULL) { in owner_mt_print_item_v0() 304 printf(" %s", pwd->pw_name); in owner_mt_print_item_v0() 352 if (pwd != NULL && pwd->pw_name != NULL) { in owner_mt6_print_item_v0() 353 printf(" %s", pwd->pw_name); in owner_mt6_print_item_v0() 401 if (pwd != NULL && pwd->pw_name != NULL) { in owner_mt_print_item() 402 printf(" %s", pwd->pw_name); in owner_mt_print_item()
|
/external/e2fsprogs/include/nonunix/ |
D | pwd.h | 12 char *pw_name; member
|
/external/chromium/chrome/browser/policy/ |
D | policy_path_parser_posix.cc | 28 result.replace(position, strlen(kUserNamePolicyVarName), user->pw_name); in ExpandPathVariables()
|
/external/dropbear/ |
D | cli-runopts.c | 346 if (pw == NULL || pw->pw_name == NULL) { in parsehostname() 350 cli_opts.username = m_strdup(pw->pw_name); in parsehostname()
|
/external/libcap-ng/libcap-ng-0.7/utils/ |
D | pscap.c | 166 name = p->pw_name; in main()
|