/freebsd-11-stable/contrib/amd/hlfsd/ |
H A D | homedir.c | 69 char *homeof(char *username); 70 int uidof(char *username); 323 * get index of UserName table entry which matches username. 327 untab_index(char *username) argument 336 cmp = strcmp(untab[mid].username, username); 345 if (STREQ(untab[max].username, username)) 347 if (STREQ(untab[min].username, username)) 360 uidof(char *username) argument 375 homeof(char *username) argument 386 mailbox(int uid, char *username) argument [all...] |
H A D | hlfsd.h | 113 char *uname; /* an xref ptr to username2uid_t->username */ 119 char *username; /* really allocated */ member in struct:username2uid_t 141 extern int untab_index(char *username);
|
/freebsd-11-stable/crypto/heimdal/lib/gssapi/ntlm/ |
H A D | init_sec_context.c | 38 char **username, struct ntlm_buf *key) 62 *username = strdup(u); 77 char **username, struct ntlm_buf *key) 87 if (from_file(fn, target_name->domain, username, key) == 0) 98 get_user_ccache(const ntlm_name name, char **username, struct ntlm_buf *key) argument 107 *username = NULL; 126 username); 172 ret = get_user_file(target_name, &cred->username, &cred->key); 174 ret = get_user_ccache(target_name, &cred->username, &cred->key); 192 (*to)->username 37 from_file(const char *fn, const char *target_domain, char **username, struct ntlm_buf *key) argument 76 get_user_file(const ntlm_name target_name, char **username, struct ntlm_buf *key) argument [all...] |
/freebsd-11-stable/contrib/wpa/src/eap_server/ |
H A D | eap_sim_db.h | 41 const char *username, int max_chal, 69 char *permanent; /* Permanent username */ 70 char *reauth_id; /* Fast re-authentication username */ 85 int eap_sim_db_get_aka_auth(struct eap_sim_db_data *data, const char *username, 90 const char *username, const u8 *auts,
|
H A D | eap_server_aka.c | 54 char permanent[20]; /* Permanent username */ 93 const char *username) 96 username[0] != EAP_AKA_PRIME_REAUTH_ID_PREFIX) 99 username[0] != EAP_AKA_REAUTH_ID_PREFIX) 102 wpa_printf(MSG_DEBUG, "EAP-AKA: Reauth username '%s'", username); 104 username); 135 char *username; local 139 username = sim_get_username(sm->identity, sm->identity_len); 140 if (username 91 eap_aka_check_identity_reauth(struct eap_sm *sm, struct eap_aka_data *data, const char *username) argument 734 char *username; local [all...] |
/freebsd-11-stable/contrib/subversion/subversion/libsvn_repos/ |
H A D | repos.h | 312 const char *username, 330 const char *username, 347 const char *username, 365 const char *username,
|
/freebsd-11-stable/usr.sbin/adduser/ |
H A D | adduser.sh | 175 err "Invalid shell ($_sh) for user $username." 237 _name="-n '$username'" 292 err "There was an error adding user ($username)." 295 info "Successfully added ($username) to the user database." 298 info "Password for ($username) is: $randompass" 303 if ${PWCMD} lock $username ; then 304 info "Account ($username) is locked." 306 info "Account ($username) could NOT be locked." 331 done | ${MAILCMD} -s"Welcome" ${username} 332 info "Sent welcome message to ($username) [all...] |
/freebsd-11-stable/contrib/wpa/src/utils/ |
H A D | http-utils.h | 39 const char *ca_fname, const char *username, 54 const char *username, const char *password,
|
/freebsd-11-stable/crypto/openssh/ |
H A D | logintest.c | 77 li->username, li->hostname, li->exit, 91 char username[32]; local 101 strlcpy(username, pw->pw_name, sizeof(username)); 108 li1 = login_alloc_entry((int)getpid(), username, NULL, ttyname(0));
|
H A D | loginrec.c | 307 * If we don't have a 'real' lastlog, we need the username to 316 if (strlcpy(li->username, pw->pw_name, sizeof(li->username)) >= 317 sizeof(li->username)) { 318 error("%s: username too long (%lu > max %lu)", __func__, 320 (unsigned long)sizeof(li->username) - 1); 341 logininfo *login_alloc_entry(pid_t pid, const char *username, argument 347 login_init_entry(newli, pid, username, hostname, line); 369 login_init_entry(struct logininfo *li, pid_t pid, const char *username, argument 382 if (username) { 1661 record_failed_login(const char *username, const char *hostname, const char *ttyn) argument [all...] |
/freebsd-11-stable/contrib/amd/amq/ |
H A D | pawd.c | 90 char username[MAXPATHLEN]; local 112 /* Now the username */ 114 to = username; 118 fprintf(stderr, "partition %s, username %s\n", partition, username); 122 "%s.homes-remote", username); 147 xstrlcat(transform, username, sizeof(transform));
|
/freebsd-11-stable/usr.sbin/cron/lib/ |
H A D | misc.c | 343 /* int allowed(char *username) 349 allowed(username) 350 char *username; 369 isallowed = in_file(username, allow); 371 isallowed = !in_file(username, deny); 374 isallowed = (strcmp(username, ROOT_USER) == 0); 388 log_it(char *username, int xpid, char *event, const char *detail) argument 406 msg = malloc(strlen(username) 428 username, 460 syslog(LOG_INFO, "(%s) %s (%s)\n", username, even [all...] |
/freebsd-11-stable/usr.bin/login/ |
H A D | login.c | 135 static char *username; /* user name */ variable 190 badlogin(username); 233 username = strdup(*argv); 234 if (username == NULL) 281 olduser = username; 282 username = getloginname(); 289 * for nonexistent name (mistyped username). 291 if (failures && strcmp(olduser, username) != 0) { 299 pam_err = pam_start("login", username, &pamc, &pamh); 324 pwd = getpwnam(username); [all...] |
/freebsd-11-stable/contrib/libreadline/ |
H A D | tilde.c | 115 the end of a username, instead of just "/". Bash sets this to 225 username. */ 346 char *dirname, *expansion, *username; local 372 username = isolate_tilde_prefix (filename, &user_len); 376 expansion = (*tilde_expansion_preexpansion_hook) (username); 380 free (username); 390 user_entry = getpwnam (username); 400 expansion = (*tilde_expansion_failure_hook) (username); 417 free (username);
|
/freebsd-11-stable/lib/libpam/modules/pam_login_access/ |
H A D | login_access.c | 49 /* login_access - match username/group and host/tty with access control file */ 179 group_match(const char *tok, const char *username) argument 186 if ((passwd = getpwnam(username)) == NULL) 191 syslog(LOG_ERR, "getgrnam() failed for %s: %s", username, strerror(errno)); 193 syslog(LOG_NOTICE, "group not found: %s", username); 197 syslog(LOG_ERR, "cannot allocate memory for grouplist: %s", username); 201 if (getgrouplist(username, passwd->pw_gid, grouplist, &ngroups) != 0) 202 syslog(LOG_ERR, "getgrouplist() failed for %s", username); 210 /* user_match - match a username against one token */ 222 * Otherwise, return YES if the token fully matches the username, o [all...] |
/freebsd-11-stable/crypto/heimdal/appl/ftp/ftp/ |
H A D | globals.c | 75 char username[32]; variable
|
/freebsd-11-stable/usr.bin/mail/ |
H A D | temp.c | 73 if ((cp = username()) == NULL) {
|
H A D | v7.local.c | 83 username(void) function
|
/freebsd-11-stable/contrib/subversion/subversion/include/ |
H A D | svn_cmdline.h | 220 const char *username, 226 * the user for their username via the command line. 323 * @a non_interactive, @a username, @a password, @a config_dir, 358 const char *username, 382 const char *username, 408 const char *username,
|
/freebsd-11-stable/contrib/unbound/daemon/ |
H A D | unbound.c | 450 if(cfg->username && cfg->username[0]) { 451 if((pwd = getpwnam(cfg->username)) == NULL) 452 fatal_exit("user '%s' does not exist.", cfg->username); 532 if(cfg->username && cfg->username[0] && cfg_uid != (uid_t)-1 && 551 if(cfg->username && cfg->username[0] && cfg_uid != (uid_t)-1) { 559 cfg->username, strerror(errno)); 620 if(cfg->username [all...] |
/freebsd-11-stable/crypto/heimdal/appl/login/ |
H A D | login.c | 266 update_utmp(const char *username, const char *hostname, argument 272 if (utmpx_login(tty, username, hostname) != 0 && !f_flag) { 277 utmp_login(ttyn, username, hostname); 549 arg_printusage(args, nargs, NULL, "[username]"); 570 char username[32]; local 621 strlcpy (username, *argv, sizeof(username)); 655 ret = read_string("login: ", username, sizeof(username), 1); 661 pwd = k_getpwnam(username); [all...] |
/freebsd-11-stable/usr.bin/su/ |
H A D | su.c | 165 char *username, *class, shellbuf[MAXPATHLEN]; local 230 EPERM, 1, "username too long: '%s'", user)) 233 errx(1, "username too long"); 257 username = getlogin(); 258 if (username != NULL) 259 pwd = getpwnam(username); 265 "unable to determine invoking subject: '%s'", username)) 271 username = strdup(pwd->pw_name); 272 if (username == NULL) 295 PAM_SET_ITEM(PAM_RUSER, username); [all...] |
/freebsd-11-stable/contrib/subversion/subversion/libsvn_subr/ |
H A D | win32_crypto.c | 117 const char *username, 129 SVN_ERR(svn_auth__simple_password_set(done, creds, realmstring, username, 145 const char *username, 153 SVN_ERR(svn_auth__simple_password_get(done, &in, creds, realmstring, username, 241 const char *username, 254 username, coded->data, 270 const char *username, 279 username, parameters, 112 windows_password_encrypter(svn_boolean_t *done, apr_hash_t *creds, const char *realmstring, const char *username, const char *in, apr_hash_t *parameters, svn_boolean_t non_interactive, apr_pool_t *pool) argument 139 windows_password_decrypter(svn_boolean_t *done, const char **out, apr_hash_t *creds, const char *realmstring, const char *username, apr_hash_t *parameters, svn_boolean_t non_interactive, apr_pool_t *pool) argument 235 windows_ssl_client_cert_pw_encrypter(svn_boolean_t *done, apr_hash_t *creds, const char *realmstring, const char *username, const char *in, apr_hash_t *parameters, svn_boolean_t non_interactive, apr_pool_t *pool) argument 263 windows_ssl_client_cert_pw_decrypter(svn_boolean_t *done, const char **out, apr_hash_t *creds, const char *realmstring, const char *username, apr_hash_t *parameters, svn_boolean_t non_interactive, apr_pool_t *pool) argument
|
/freebsd-11-stable/contrib/subversion/subversion/libsvn_auth_gnome_keyring/ |
H A D | gnome_keyring.c | 115 const char *username, 131 "user", username, 154 const char *username, 175 "user", username, 312 const char *username, 326 result = gnome_keyring_find_network_password_sync(username, realmstring, 366 const char *username, 382 username, realmstring, 110 password_get_gnome_keyring(svn_boolean_t *done, const char **password, apr_hash_t *creds, const char *realmstring, const char *username, apr_hash_t *parameters, svn_boolean_t non_interactive, apr_pool_t *pool) argument 150 password_set_gnome_keyring(svn_boolean_t *done, apr_hash_t *creds, const char *realmstring, const char *username, const char *password, apr_hash_t *parameters, svn_boolean_t non_interactive, apr_pool_t *pool) argument 307 password_get_gnome_keyring(svn_boolean_t *done, const char **password, apr_hash_t *creds, const char *realmstring, const char *username, apr_hash_t *parameters, svn_boolean_t non_interactive, apr_pool_t *pool) argument 362 password_set_gnome_keyring(svn_boolean_t *done, apr_hash_t *creds, const char *realmstring, const char *username, const char *password, apr_hash_t *parameters, svn_boolean_t non_interactive, apr_pool_t *pool) argument
|
/freebsd-11-stable/contrib/libpcap/testprogs/ |
H A D | findalldevstest.c | 106 char username[128+1]; local 120 if (fgets(username, sizeof username, stdin) == NULL) 122 p = strchr(username, '\n'); 127 auth.username = username;
|