Searched refs:username (Results 76 - 100 of 187) sorted by relevance

12345678

/freebsd-11-stable/usr.bin/top/
H A DMakefile8 username.c utils.c version.c
/freebsd-11-stable/contrib/unbound/
H A Dfreebsd-configure.sh41 --with-username=unbound
/freebsd-11-stable/contrib/subversion/subversion/libsvn_repos/
H A Dhooks.c741 const char *username,
762 args[3] = username;
786 const char *username,
808 args[2] = username;
826 const char *username,
845 args[3] = username ? username : "";
862 const char *username,
884 args[2] = username ? username
736 svn_repos__hooks_pre_lock(svn_repos_t *repos, apr_hash_t *hooks_env, const char **token, const char *path, const char *username, const char *comment, svn_boolean_t steal_lock, apr_pool_t *pool) argument
782 svn_repos__hooks_post_lock(svn_repos_t *repos, apr_hash_t *hooks_env, const apr_array_header_t *paths, const char *username, apr_pool_t *pool) argument
822 svn_repos__hooks_pre_unlock(svn_repos_t *repos, apr_hash_t *hooks_env, const char *path, const char *username, const char *token, svn_boolean_t break_lock, apr_pool_t *pool) argument
858 svn_repos__hooks_post_unlock(svn_repos_t *repos, apr_hash_t *hooks_env, const apr_array_header_t *paths, const char *username, apr_pool_t *pool) argument
[all...]
H A Dfs-wrap.c596 const char *username = NULL;
612 SVN_ERR(svn_fs_access_get_username(&username, access_ctx));
614 if (! username)
617 "Cannot lock path, no authenticated username available.");
630 username, comment, steal_lock, iterpool);
665 baton.paths, username,
755 const char *username = NULL;
771 SVN_ERR(svn_fs_access_get_username(&username, access_ctx));
773 if (! break_lock && ! username)
776 _("Cannot unlock, no authenticated username availabl
593 const char *username = NULL; local
752 const char *username = NULL; local
[all...]
/freebsd-11-stable/crypto/heimdal/kdc/
H A Ddigest.c166 const char *username,
174 /* get username */
175 ret = krb5_parse_name(context, username, &clientprincipal);
640 ireq.u.digestRequest.username,
671 ireq.u.digestRequest.username);
696 ireq.u.digestRequest.username,
704 EVP_DigestUpdate(ctx, ireq.u.digestRequest.username,
705 strlen(ireq.u.digestRequest.username));
796 ireq.u.digestRequest.username);
804 const char *username; local
164 get_password_entry(krb5_context context, krb5_kdc_configuration *config, const char *username, char **password) argument
[all...]
/freebsd-11-stable/crypto/openssl/crypto/srp/
H A Dsrp_vfy.c394 * string(username):base64(v):base64(salt):int(index)
510 static SRP_user_pwd *find_user(SRP_VBASE *vb, char *username) argument
520 if (strcmp(user->id, username) == 0)
532 SRP_user_pwd *SRP_VBASE_get_by_user(SRP_VBASE *vb, char *username) argument
534 return find_user(vb, username);
541 SRP_user_pwd *SRP_VBASE_get1_by_user(SRP_VBASE *vb, char *username) argument
551 if ((user = find_user(vb, username)) != NULL)
565 if (!SRP_user_pwd_set_ids(user, username, NULL))
573 EVP_DigestUpdate(&ctxt, username, strlen(username));
[all...]
/freebsd-11-stable/contrib/subversion/subversion/libsvn_ra_svn/
H A Dcyrus_auth.c288 /* A baton type used by the SASL username and password callbacks. */
294 /* Unfortunately SASL uses two separate callbacks for the username and
298 const char *username; member in struct:cred_baton
314 /* Call svn_auth_{first,next}_credentials. If successful, set BATON->username
315 and BATON->password to the new username and password and return TRUE,
340 baton->username = ((svn_auth_cred_simple_t *)creds)->username;
347 /* The username callback. Implements the sasl_getsimple_t interface. */
349 get_username_cb(void *b, int id, const char **username, size_t *len) argument
353 if (baton->username || get_credential
[all...]
H A Dinternal_auth.c104 user = ((svn_auth_cred_simple_t *) creds)->username;
/freebsd-11-stable/usr.sbin/pwd_mkdb/
H A Dpwd_mkdb.c114 char *username; local
122 username = NULL;
155 username = optarg;
165 if (argc != 1 || (username && (*username == '+' || *username == '-')))
215 warnx("%s: username too long", pwd.pw_name);
224 if (username) {
260 len = strlen(username);
262 /* Only check that username fit
[all...]
/freebsd-11-stable/crypto/heimdal/appl/ftp/ftp/
H A Dextern.h166 extern char username[32];
/freebsd-11-stable/contrib/wpa/src/eap_peer/
H A Deap_mschapv2.c500 /* TODO: prevent retries using same username/password */
519 const u8 *username, *password, *new_password;
526 username = eap_get_config_identity(sm, &username_len);
529 if (username == NULL || password == NULL || new_password == NULL)
532 username = mschapv2_remove_domain(username, &username_len);
592 wpa_hexdump_ascii(MSG_DEBUG, "EAP-MSCHAPV2: username",
593 username, username_len);
597 username, username_len,
608 username, username_le
[all...]
/freebsd-11-stable/contrib/llvm-project/lldb/source/Host/posix/
H A DHostInfoPosix.cpp56 std::string username; member in struct:PasswdEntry
84 return password->username;
/freebsd-11-stable/contrib/subversion/subversion/libsvn_fs_base/
H A Dlock.c131 /* There better be a username attached to the fs. */
132 if (!trail->fs->access_ctx || !trail->fs->access_ctx->username)
218 lock->owner = apr_pstrdup(args->result_pool, trail->fs->access_ctx->username);
346 /* There better be a username attached to the fs. */
347 if (!trail->fs->access_ctx || !trail->fs->access_ctx->username)
350 /* And that username better be the same as the lock's owner. */
351 if (strcmp(trail->fs->access_ctx->username, lock->owner) != 0)
354 trail->fs->access_ctx->username,
598 If no username is attached to the FS, return SVN_ERR_FS_NO_USER.
600 If the FS username does
[all...]
/freebsd-11-stable/contrib/opie/
H A Dopiepasswd.c81 fprintf(stderr, "usage: %s [-v] [-h] [-c|-d] [-f] [-n initial_sequence_number]\n [-s seed] [username]\n", myname);
121 char *username; local
128 username = getlogin();
129 pp = getpwnam(username);
130 if (username == NULL || pp == NULL || pp->pw_uid != ruid)
/freebsd-11-stable/contrib/subversion/subversion/libsvn_auth_kwallet/
H A Dkwallet.cpp197 const char *username,
249 QString::fromUtf8(username) + "@" + QString::fromUtf8(realmstring);
278 const char *username,
340 QString key = QString::fromUtf8(username) + "@"
192 kwallet_password_get(svn_boolean_t *done, const char **password, apr_hash_t *creds, const char *realmstring, const char *username, apr_hash_t *parameters, svn_boolean_t non_interactive, apr_pool_t *pool) argument
274 kwallet_password_set(svn_boolean_t *done, apr_hash_t *creds, const char *realmstring, const char *username, const char *password, apr_hash_t *parameters, svn_boolean_t non_interactive, apr_pool_t *pool) argument
/freebsd-11-stable/contrib/subversion/subversion/include/
H A Dsvn_auth.h45 * return a specific set of credentials. (e.g. username/password,
59 * username/password provider that looks in disk store, then register
60 * a username/password provider that prompts the user.)
174 /** Simple username/password pair credential kind.
193 const char *username;
211 #define SVN_AUTH_CRED_USERNAME "svn.username"
217 const char *username;
219 * GUI prompt implementation with a remember username checkbox shall set
350 * example, if authentication requires a username and password, a
352 * username an
192 const char *username; member in struct:svn_auth_cred_simple_t
216 const char *username; member in struct:svn_auth_cred_username_t
[all...]
/freebsd-11-stable/contrib/amd/hlfsd/
H A Dstubs.c283 untab[idx].username,
287 dlog("nfs_lookup: successful lookup for uid=%ld, gid=%ld: username=%s",
288 (long) uid, (long) gid, untab[idx].username);
306 char *username; local
337 username = (char *) &argp->fh_data[sizeof(int)];
338 if (!(res.rlr_u.rlr_data_u = mailbox(userid, username)))
/freebsd-11-stable/usr.bin/ipcs/
H A Dipcs.c58 uid_t user2uid(char *username);
535 user2uid(char *username) argument
541 uid = strtoul(username, &r, 0);
542 if (!*r && r != username)
544 if ((pwd = getpwnam(username)) == NULL)
/freebsd-11-stable/contrib/subversion/subversion/libsvn_subr/
H A Dprompt.c615 const char *username,
625 if (username)
626 ret->username = apr_pstrdup(pool, username);
628 SVN_ERR(prompt(&(ret->username), _("Username: "), FALSE, pb, pool));
630 pass_prompt = apr_psprintf(pool, _("Password for '%s': "), ret->username);
651 SVN_ERR(prompt(&(ret->username), _("Username: "), FALSE, pb, pool));
609 svn_cmdline_auth_simple_prompt(svn_auth_cred_simple_t **cred_p, void *baton, const char *realm, const char *username, svn_boolean_t may_save, apr_pool_t *pool) argument
/freebsd-11-stable/contrib/libpcap/rpcapd/
H A Ddaemon.c122 static int daemon_AuthUserPwd(char *username, char *password, char *errbuf);
1007 char *username, *passwd; local
1011 username = (char *) malloc (usernamelen + 1);
1012 if (username == NULL)
1018 status = rpcapd_recv(pars->sockctrl, username, usernamelen, &plen, errmsgbuf);
1021 free(username);
1026 free(username);
1029 username[usernamelen] = '\0';
1037 free(username);
1043 free(username);
1160 daemon_AuthUserPwd(char *username, char *password, char *errbuf) argument
[all...]
/freebsd-11-stable/crypto/openssh/
H A Dauth2-pubkey.c644 char *tmp, *username = NULL, *command = NULL, **av = NULL; local
664 username = percent_expand(options.authorized_principals_command_user,
666 pw = getpwnam(username);
669 username, strerror(errno));
752 free(username);
828 * their username in the certificate principals list.
902 * against the username.
975 char *username = NULL, *key_fp = NULL, *keytext = NULL; local
993 username = percent_expand(options.authorized_keys_command_user,
995 pw = getpwnam(username);
[all...]
/freebsd-11-stable/contrib/bsnmp/snmp_usm/
H A Dusm_snmp.c501 char username[SNMP_ADM_STR32_SIZ]; local
504 if (usm_user_index_decode(oid, sub, engineid, &enginelen, username) < 0)
507 return (usm_find_user(engineid, enginelen, username));
514 char username[SNMP_ADM_STR32_SIZ]; local
521 if (usm_user_index_decode(oid, sub, engineid, &enginelen, username) < 0)
524 if ((uuser = usm_find_user(engineid, enginelen, username)) != NULL)
/freebsd-11-stable/usr.sbin/cron/lib/
H A Dentry.c60 "bad username",
229 * username/command.
298 /* ch is the first character of a command, or a username */
302 char *username = cmd; /* temp buffer */ local
309 Debug(DPARS, ("load_entry()...about to parse username\n"))
310 ch = get_string(username, MAX_COMMAND, file, " \t");
312 Debug(DPARS, ("load_entry()...got %s\n",username))
319 if ((s = strrchr(username, '/')) != NULL) {
340 if ((s = strrchr(username, ':')) != NULL) {
348 pw = getpwnam(username);
[all...]
/freebsd-11-stable/contrib/amd/fsinfo/
H A Dfsinfo.h56 extern char *username;
/freebsd-11-stable/contrib/wpa/src/utils/
H A Dhttp_curl.c1349 const char *ca_fname, const char *username,
1361 "username=%s%s", address, ca_fname, username, extra);
1401 if (username) {
1403 curl_easy_setopt(curl, CURLOPT_USERNAME, username);
1412 const char *ca_fname, const char *username,
1421 clone_str(&ctx->svc_username, username);
1437 ctx->curl = setup_curl_post(ctx, ctx->svc_address, ca_fname, username,
1447 const char *ca_fname, const char *username,
1451 if (post_init_client(ctx, address, ca_fname, username, passwor
1348 setup_curl_post(struct http_ctx *ctx, const char *address, const char *ca_fname, const char *username, const char *password, const char *client_cert, const char *client_key) argument
1411 post_init_client(struct http_ctx *ctx, const char *address, const char *ca_fname, const char *username, const char *password, const char *client_cert, const char *client_key) argument
1446 soap_init_client(struct http_ctx *ctx, const char *address, const char *ca_fname, const char *username, const char *password, const char *client_cert, const char *client_key) argument
1469 char *username = NULL; local
1680 http_post(struct http_ctx *ctx, const char *url, const char *data, const char *content_type, const char *ext_hdr, const char *ca_fname, const char *username, const char *password, const char *client_cert, const char *client_key, size_t *resp_len) argument
[all...]

Completed in 247 milliseconds

12345678