Lines Matching defs:user
109 # define LOG_AUTH_FAIL_USER ", user=", (int)MAX_AUTH_LOG_LEN, auth_user
853 char *user;
1135 user = NULL;
1690 user = macvalue(macid("{auth_authen}"), e);
1697 (void **)&user);
1700 user = "";
1710 xtextify(user, "<>\")"));
1780 shortenstring(user, 128),
3137 /* If discarding, don't bother to verify user */
3339 message("252 2.5.2 Cannot VRFY user; try RCPT to attempt delivery (or try finger)");
3531 case CMDHELP: /* help -- give user info */
4866 sm_dprintf("auth=\"%.100s\" not trusted user=\"%.100s\"\n",
5167 /* "user" is currently unused */
5173 result = sasl_listmech(conn, "user", /* XXX */
5214 ** def_realm -- default user realm.
5215 ** urlen -- user realm length.
5256 ** user -- allowed user (output).
5264 proxy_policy(context, auth_identity, requested_user, user, errstr)
5268 const char **user;
5271 if (user == NULL || auth_identity == NULL)
5273 *user = newstr(auth_identity);
5616 ** GET_SASL_USER -- extract user part from SASL reply
5622 ** user -- output buffer for extract user
5623 ** user_len -- length of output buffer (user)
5629 ** (non-printable) characters, but the returned value (user)
5634 get_sasl_user(val, len, auth_type, user, user_len)
5638 char *user;
5644 SM_ASSERT(user != NULL);
5647 *user = '\0';
5713 (void) sm_strlcpy(user,
5723 ** Extracting the "user" from other mechanisms
5748 (void) sm_strlcpy(user, val, user_len);