Home
last modified time | relevance | path

Searched refs:pw_name (Results 1 – 25 of 51) sorted by relevance

123

/external/openssh/
Dauth.c105 if (!pw || !pw->pw_name) in allowed_user()
110 spw = getspnam(pw->pw_name); in allowed_user()
150 pw->pw_name); in allowed_user()
166 "does not exist", pw->pw_name, shell); in allowed_user()
173 "is not executable", pw->pw_name, shell); in allowed_user()
189 if (match_user(pw->pw_name, hostname, ipaddr, in allowed_user()
193 pw->pw_name, hostname); in allowed_user()
200 if (match_user(pw->pw_name, hostname, ipaddr, in allowed_user()
206 "not listed in AllowUsers", pw->pw_name, hostname); in allowed_user()
212 if (ga_init(pw->pw_name, pw->pw_gid) == 0) { in allowed_user()
[all …]
Dauth-rhosts.c235 client_user, pw->pw_name)) { in auth_rhosts2_raw()
241 client_user, pw->pw_name)) { in auth_rhosts2_raw()
253 "no home directory %.200s", pw->pw_name, pw->pw_dir); in auth_rhosts2_raw()
255 "no home directory %.200s", pw->pw_name, pw->pw_dir); in auth_rhosts2_raw()
262 "bad ownership or modes for home directory.", pw->pw_name); in auth_rhosts2_raw()
264 "bad ownership or modes for home directory.", pw->pw_name); in auth_rhosts2_raw()
289 pw->pw_name, buf); in auth_rhosts2_raw()
300 if (check_rhosts_file(buf, hostname, ipaddr, client_user, pw->pw_name)) { in auth_rhosts2_raw()
306 hostname, ipaddr, client_user, pw->pw_name); in auth_rhosts2_raw()
Dplatform.c160 if (set_id(pw->pw_name) != 0) { in platform_setusercontext_post_groups()
179 if (setpcred(pw->pw_name, creds) == -1) in platform_setusercontext_post_groups()
184 ssh_selinux_setup_exec_context(pw->pw_name); in platform_setusercontext_post_groups()
189 platform_krb5_get_principal_name(const char *pw_name) in platform_krb5_get_principal_name() argument
192 return aix_krb5_get_principal_name(pw_name); in platform_krb5_get_principal_name()
Dauth-sia.c90 if (sia_ses_init(&ent, saved_argc, saved_argv, host, pw->pw_name, in session_setup_sia()
102 pw->pw_name, host); in session_setup_sia()
106 pw->pw_name, host); in session_setup_sia()
Dauth-skey.c81 skey_haskey(authctxt->pw->pw_name) == 0 && in skey_respond()
82 skey_passcheck(authctxt->pw->pw_name, responses[0]) != -1) in skey_respond()
Duidswap.c105 if (initgroups(pw->pw_name, pw->pw_gid) < 0) in temporarily_use_uid()
106 fatal("initgroups: %s: %.100s", pw->pw_name, in temporarily_use_uid()
272 if (initgroups(pw->pw_name, pw->pw_gid) < 0) in permanently_set_uid()
274 pw->pw_name, (u_int)pw->pw_gid, strerror(errno)); in permanently_set_uid()
Dsession.c273 setproctitle("%s", authctxt->pw->pw_name); in do_authenticated()
780 record_utmp_only(pid, s->tty, s->pw->pw_name, in do_pre_login()
868 record_login(pid, s->tty, pw->pw_name, pw->pw_uid, in do_login()
1165 child_set_env(&env, &envsize, "USER", pw->pw_name); in do_setup_env()
1166 child_set_env(&env, &envsize, "LOGNAME", pw->pw_name); in do_setup_env()
1168 child_set_env(&env, &envsize, "LOGIN", pw->pw_name); in do_setup_env()
1197 _PATH_MAILDIR, pw->pw_name); in do_setup_env()
1408 logit("User %.100s not allowed because %s exists", pw->pw_name, nl); in do_nologin()
1488 if (setlogin(pw->pw_name) < 0) in do_setusercontext()
1495 if (initgroups(pw->pw_name, pw->pw_gid) < 0) { in do_setusercontext()
[all …]
Dauth-krb5.c84 platform_client = platform_krb5_get_principal_name(authctxt->pw->pw_name); in auth_krb5_password()
85 client = platform_client ? platform_client : authctxt->pw->pw_name; in auth_krb5_password()
Dauth-rh-rsa.c100 pw->pw_name, cuser, chost); in auth_rhosts_rsa()
Dauth-shadow.c91 const char *user = ctxt->pw->pw_name; in auth_shadow_pwexpired()
Dauth2-pubkey.c343 authorized_principals == NULL ? pw->pw_name : NULL, in user_key_allowed2()
417 principals_file == NULL ? pw->pw_name : NULL, &reason) != 0) in user_cert_trusted_ca()
Dauth-passwd.c173 as = auth_usercheck(pw->pw_name, authctxt->style, "auth-ssh", in sys_auth_passwd()
Dlogintest.c101 strlcpy(username, pw->pw_name, sizeof(username)); in testAPI()
Dauth-options.c294 pw->pw_name, remote_host, remote_ip); in auth_parse_options()
532 "(ip=%.200s).", pw->pw_name, in parse_option_list()
/external/openssh/openbsd-compat/
Dport-aix.c80 len = sizeof("LOGNAME= NAME= ") + (2 * strlen(pw->pw_name)); in aix_usrinfo()
83 i = snprintf(cp, len, "LOGNAME=%s%cNAME=%s%c", pw->pw_name, '\0', in aix_usrinfo()
84 pw->pw_name, '\0'); in aix_usrinfo()
176 char *authmsg = NULL, *msg = NULL, *name = ctxt->pw->pw_name; in sys_auth_passwd()
253 result = loginrestrictions(pw->pw_name, S_RLOGIN, NULL, &msg); in sys_auth_allowed_user()
271 logit("Login restricted for %s: %.100s", pw->pw_name, msg); in sys_auth_allowed_user()
383 aix_krb5_get_principal_name(char *pw_name) in aix_krb5_get_principal_name() argument
388 if (getuserattr(pw_name, S_AUTHDOMAIN, &authdomain, SEC_CHAR) != 0) in aix_krb5_get_principal_name()
390 if (getuserattr(pw_name, S_AUTHNAME, &authname, SEC_CHAR) != 0) in aix_krb5_get_principal_name()
394 xasprintf(&principal, "%s@%s", authname ? authname : pw_name, authdomain); in aix_krb5_get_principal_name()
Dport-irix.c59 jid = jlimit_startjob(pw->pw_name, pw->pw_uid, "interactive"); in irix_setusercontext()
72 if ((projid = getdfltprojuser(pw->pw_name)) == -1) { in irix_setusercontext()
78 (int)projid, pw->pw_name, strerror(errno)); in irix_setusercontext()
Dport-uw.c74 if (!nischeck(pw->pw_name)) { in sys_auth_passwd()
112 if (strcmp (ent->pw_name, namep) == 0) { in nischeck()
137 if (!ia_openinfo(pw->pw_name,&uinfo)) { in get_iaf_password()
Dxcrypt.c95 struct spwd *spw = getspnam(pw->pw_name); in shadow_pw()
107 if (issecure() && (spw = getpwanam(pw->pw_name)) != NULL) in shadow_pw()
110 struct pr_passwd *spw = getprpwnam(pw->pw_name); in shadow_pw()
Dport-solaris.c217 if ((defaultproject = getdefaultproj(pw->pw_name, &tempproject, &buf, in solaris_set_default_project()
220 if (setproject(defaultproject->pj_name, pw->pw_name, in solaris_set_default_project()
226 debug("getdefaultproj(%s): %s", pw->pw_name, strerror(errno)); in solaris_set_default_project()
Dpwcache.c75 cp->name = strdup(pw ? pw->pw_name : nbuf); in user_from_uid()
/external/iptables/extensions/
Dlibxt_owner.c303 if (pwd != NULL && pwd->pw_name != NULL) { in owner_mt_print_item_v0()
304 printf(" %s", pwd->pw_name); in owner_mt_print_item_v0()
352 if (pwd != NULL && pwd->pw_name != NULL) { in owner_mt6_print_item_v0()
353 printf(" %s", pwd->pw_name); in owner_mt6_print_item_v0()
401 if (pwd != NULL && pwd->pw_name != NULL) { in owner_mt_print_item()
402 printf(" %s", pwd->pw_name); in owner_mt_print_item()
/external/e2fsprogs/include/nonunix/
Dpwd.h12 char *pw_name; member
/external/chromium/chrome/browser/policy/
Dpolicy_path_parser_posix.cc28 result.replace(position, strlen(kUserNamePolicyVarName), user->pw_name); in ExpandPathVariables()
/external/dropbear/
Dcli-runopts.c346 if (pw == NULL || pw->pw_name == NULL) { in parsehostname()
350 cli_opts.username = m_strdup(pw->pw_name); in parsehostname()
/external/libcap-ng/libcap-ng-0.7/utils/
Dpscap.c166 name = p->pw_name; in main()

123