pwd 100 src/cronnext.c printf("%s - user: %s\n", indent, e->pwd->pw_name); pwd 53 src/do_command.c (long) e->pwd->pw_uid, (long) e->pwd->pw_gid)); pwd 126 src/do_command.c usernm = e->pwd->pw_name; pwd 201 src/do_command.c if (cron_change_user_permanently(e->pwd, env_get("HOME", jobenv)) < 0) pwd 312 src/do_command.c if (cron_change_user_permanently(e->pwd, env_get("HOME", jobenv)) < 0) pwd 409 src/do_command.c mailfrom = e->pwd->pw_name; pwd 439 src/do_command.c if (!(mail = cron_popen(mailcmd, "w", e->pwd, jobenv))) { pwd 72 src/entry.c free(e->pwd); pwd 303 src/entry.c if ((e->pwd = pw_dup(pw)) == NULL) { pwd 307 src/entry.c memset(e->pwd->pw_passwd, 0, strlen(e->pwd->pw_passwd)); pwd 422 src/entry.c free(e->pwd); pwd 53 src/job.c uname = e->pwd->pw_name; pwd 59 src/job.c e->pwd->pw_name, (long) temppwd->pw_uid, pwd 65 src/job.c free(e->pwd); pwd 66 src/job.c e->pwd = newpwd; pwd 68 src/job.c if ((tenvp = env_update_home(e->envp, e->pwd->pw_dir)) == NULL) { pwd 129 src/security.c if ((!u->system || e->pwd->pw_uid != 0) && (ret = cron_start_pam(e->pwd)) != 0) { pwd 130 src/security.c log_it(e->pwd->pw_name, getpid(), "FAILED to authorize user with PAM", pwd 143 src/security.c log_it(e->pwd->pw_name, getpid(), "ERROR", pwd 149 src/security.c log_it(e->pwd->pw_name, getpid(), "ERROR", pwd 159 src/security.c if (pamh != NULL && (ret = cron_open_pam_session(e->pwd)) != 0) { pwd 160 src/security.c log_it(e->pwd->pw_name, getpid(), pwd 166 src/security.c if (cron_change_groups(e->pwd) != 0) { pwd 188 src/security.c log_it(e->pwd->pw_name, getpid(), "INFO", buf, 0); pwd 35 src/structs.h struct passwd *pwd;