Home | History | Annotate | Download | only in openssh

Lines Matching defs:pw

172 		if (PRIVSEP(user_key_allowed(authctxt->pw, key)) &&
194 if (PRIVSEP(user_key_allowed(authctxt->pw, key))) {
272 match_principals_file(char *file, struct passwd *pw, struct sshkey_cert *cert)
279 temporarily_use_uid(pw);
281 if ((f = auth_openprincipals(file, pw, options.strict_modes)) == NULL) {
315 if (auth_parse_options(pw, line_opts,
334 check_authkeys_file(FILE *f, char *file, Key* key, struct passwd *pw)
382 if (auth_parse_options(pw, key_options, file,
409 authorized_principals == NULL ? pw->pw_name : NULL,
412 if (auth_cert_options(key, pw) != 0) {
423 if (auth_parse_options(pw, key_options, file,
447 user_cert_trusted_ca(struct passwd *pw, Key *key)
472 if ((principals_file = authorized_principals_file(pw)) != NULL) {
473 if (!match_principals_file(principals_file, pw, key->cert)) {
483 principals_file == NULL ? pw->pw_name : NULL, &reason) != 0)
485 if (auth_cert_options(key, pw) != 0)
504 user_key_allowed2(struct passwd *pw, Key *key, char *file)
510 temporarily_use_uid(pw);
513 if ((f = auth_openkeyfile(file, pw, options.strict_modes)) != NULL) {
514 found_key = check_authkeys_file(f, file, key, pw);
531 struct passwd *pw;
548 pw = getpwnam(username);
549 if (pw == NULL) {
557 temporarily_use_uid(pw);
576 options.authorized_keys_command, user_pw->pw_name, pw->pw_name);
608 if (setresgid(pw->pw_gid, pw->pw_gid, pw->pw_gid) != 0) {
609 error("setresgid %u: %s", (u_int)pw->pw_gid,
613 if (setresuid(pw->pw_uid, pw->pw_uid, pw->pw_uid) != 0) {
614 error("setresuid %u: %s", (u_int)pw->pw_uid,
634 temporarily_use_uid(pw);
646 ok = check_authkeys_file(f, options.authorized_keys_command, key, pw);
674 user_key_allowed(struct passwd *pw, Key *key)
684 success = user_cert_trusted_ca(pw, key);
688 success = user_key_command_allowed2(pw, key);
697 options.authorized_keys_files[i], pw);
699 success = user_key_allowed2(pw, key, file);