pw_name 96 anacron/runjob.c if (ps == NULL || ps->pw_name == NULL) die_e("getpwuid() error"); pw_name 98 anacron/runjob.c user = strdup(ps->pw_name); pw_name 100 src/cronnext.c printf("%s - user: %s\n", indent, e->pwd->pw_name); pw_name 282 src/cronnext.c pw.pw_name = *additional; pw_name 225 src/crontab.c if (strlen(pw->pw_name) >= sizeof User) { pw_name 229 src/crontab.c strcpy(User, pw->pw_name); pw_name 102 src/database.c strcmp(uname, pw->pw_name) != 0)) { pw_name 126 src/do_command.c usernm = e->pwd->pw_name; pw_name 409 src/do_command.c mailfrom = e->pwd->pw_name; pw_name 294 src/entry.c temppw.pw_name = username; pw_name 370 src/entry.c if (glue_strings(envstr, sizeof envstr, "LOGNAME", pw->pw_name, '=')) { pw_name 380 src/entry.c if (glue_strings(envstr, sizeof envstr, "USER", pw->pw_name, '=')) { pw_name 53 src/job.c uname = e->pwd->pw_name; pw_name 59 src/job.c e->pwd->pw_name, (long) temppwd->pw_uid, pw_name 55 src/pw_dup.c if (pw->pw_name) { pw_name 56 src/pw_dup.c nsize = strlen(pw->pw_name) + 1; pw_name 91 src/pw_dup.c if (pw->pw_name) { pw_name 92 src/pw_dup.c (void)memcpy(cp, pw->pw_name, nsize); pw_name 93 src/pw_dup.c newpw->pw_name = cp; pw_name 84 src/security.c log_it(pw->pw_name, getpid(), "PAM ERROR", pam_strerror(pamh, retcode), 0); \ pw_name 130 src/security.c log_it(e->pwd->pw_name, getpid(), "FAILED to authorize user with PAM", pw_name 143 src/security.c log_it(e->pwd->pw_name, getpid(), "ERROR", pw_name 149 src/security.c log_it(e->pwd->pw_name, getpid(), "ERROR", pw_name 160 src/security.c log_it(e->pwd->pw_name, getpid(), pw_name 188 src/security.c log_it(e->pwd->pw_name, getpid(), "INFO", buf, 0); pw_name 198 src/security.c retcode = pam_start("crond", pw->pw_name, &conv, &pamh); pw_name 245 src/security.c if (initgroups(pw->pw_name, pw->pw_gid) != 0) {