/freebsd-11-stable/usr.bin/top/ |
H A D | Makefile | 8 username.c utils.c version.c
|
/freebsd-11-stable/contrib/unbound/ |
H A D | freebsd-configure.sh | 41 --with-username=unbound
|
/freebsd-11-stable/contrib/subversion/subversion/libsvn_repos/ |
H A D | hooks.c | 741 const char *username, 762 args[3] = username; 786 const char *username, 808 args[2] = username; 826 const char *username, 845 args[3] = username ? username : ""; 862 const char *username, 884 args[2] = username ? username 736 svn_repos__hooks_pre_lock(svn_repos_t *repos, apr_hash_t *hooks_env, const char **token, const char *path, const char *username, const char *comment, svn_boolean_t steal_lock, apr_pool_t *pool) argument 782 svn_repos__hooks_post_lock(svn_repos_t *repos, apr_hash_t *hooks_env, const apr_array_header_t *paths, const char *username, apr_pool_t *pool) argument 822 svn_repos__hooks_pre_unlock(svn_repos_t *repos, apr_hash_t *hooks_env, const char *path, const char *username, const char *token, svn_boolean_t break_lock, apr_pool_t *pool) argument 858 svn_repos__hooks_post_unlock(svn_repos_t *repos, apr_hash_t *hooks_env, const apr_array_header_t *paths, const char *username, apr_pool_t *pool) argument [all...] |
H A D | fs-wrap.c | 596 const char *username = NULL; 612 SVN_ERR(svn_fs_access_get_username(&username, access_ctx)); 614 if (! username) 617 "Cannot lock path, no authenticated username available."); 630 username, comment, steal_lock, iterpool); 665 baton.paths, username, 755 const char *username = NULL; 771 SVN_ERR(svn_fs_access_get_username(&username, access_ctx)); 773 if (! break_lock && ! username) 776 _("Cannot unlock, no authenticated username availabl 593 const char *username = NULL; local 752 const char *username = NULL; local [all...] |
/freebsd-11-stable/crypto/heimdal/kdc/ |
H A D | digest.c | 166 const char *username, 174 /* get username */ 175 ret = krb5_parse_name(context, username, &clientprincipal); 640 ireq.u.digestRequest.username, 671 ireq.u.digestRequest.username); 696 ireq.u.digestRequest.username, 704 EVP_DigestUpdate(ctx, ireq.u.digestRequest.username, 705 strlen(ireq.u.digestRequest.username)); 796 ireq.u.digestRequest.username); 804 const char *username; local 164 get_password_entry(krb5_context context, krb5_kdc_configuration *config, const char *username, char **password) argument [all...] |
/freebsd-11-stable/crypto/openssl/crypto/srp/ |
H A D | srp_vfy.c | 394 * string(username):base64(v):base64(salt):int(index) 510 static SRP_user_pwd *find_user(SRP_VBASE *vb, char *username) argument 520 if (strcmp(user->id, username) == 0) 532 SRP_user_pwd *SRP_VBASE_get_by_user(SRP_VBASE *vb, char *username) argument 534 return find_user(vb, username); 541 SRP_user_pwd *SRP_VBASE_get1_by_user(SRP_VBASE *vb, char *username) argument 551 if ((user = find_user(vb, username)) != NULL) 565 if (!SRP_user_pwd_set_ids(user, username, NULL)) 573 EVP_DigestUpdate(&ctxt, username, strlen(username)); [all...] |
/freebsd-11-stable/contrib/subversion/subversion/libsvn_ra_svn/ |
H A D | cyrus_auth.c | 288 /* A baton type used by the SASL username and password callbacks. */ 294 /* Unfortunately SASL uses two separate callbacks for the username and 298 const char *username; member in struct:cred_baton 314 /* Call svn_auth_{first,next}_credentials. If successful, set BATON->username 315 and BATON->password to the new username and password and return TRUE, 340 baton->username = ((svn_auth_cred_simple_t *)creds)->username; 347 /* The username callback. Implements the sasl_getsimple_t interface. */ 349 get_username_cb(void *b, int id, const char **username, size_t *len) argument 353 if (baton->username || get_credential [all...] |
H A D | internal_auth.c | 104 user = ((svn_auth_cred_simple_t *) creds)->username;
|
/freebsd-11-stable/usr.sbin/pwd_mkdb/ |
H A D | pwd_mkdb.c | 114 char *username; local 122 username = NULL; 155 username = optarg; 165 if (argc != 1 || (username && (*username == '+' || *username == '-'))) 215 warnx("%s: username too long", pwd.pw_name); 224 if (username) { 260 len = strlen(username); 262 /* Only check that username fit [all...] |
/freebsd-11-stable/crypto/heimdal/appl/ftp/ftp/ |
H A D | extern.h | 166 extern char username[32];
|
/freebsd-11-stable/contrib/wpa/src/eap_peer/ |
H A D | eap_mschapv2.c | 500 /* TODO: prevent retries using same username/password */ 519 const u8 *username, *password, *new_password; 526 username = eap_get_config_identity(sm, &username_len); 529 if (username == NULL || password == NULL || new_password == NULL) 532 username = mschapv2_remove_domain(username, &username_len); 592 wpa_hexdump_ascii(MSG_DEBUG, "EAP-MSCHAPV2: username", 593 username, username_len); 597 username, username_len, 608 username, username_le [all...] |
/freebsd-11-stable/contrib/llvm-project/lldb/source/Host/posix/ |
H A D | HostInfoPosix.cpp | 56 std::string username; member in struct:PasswdEntry 84 return password->username;
|
/freebsd-11-stable/contrib/subversion/subversion/libsvn_fs_base/ |
H A D | lock.c | 131 /* There better be a username attached to the fs. */ 132 if (!trail->fs->access_ctx || !trail->fs->access_ctx->username) 218 lock->owner = apr_pstrdup(args->result_pool, trail->fs->access_ctx->username); 346 /* There better be a username attached to the fs. */ 347 if (!trail->fs->access_ctx || !trail->fs->access_ctx->username) 350 /* And that username better be the same as the lock's owner. */ 351 if (strcmp(trail->fs->access_ctx->username, lock->owner) != 0) 354 trail->fs->access_ctx->username, 598 If no username is attached to the FS, return SVN_ERR_FS_NO_USER. 600 If the FS username does [all...] |
/freebsd-11-stable/contrib/opie/ |
H A D | opiepasswd.c | 81 fprintf(stderr, "usage: %s [-v] [-h] [-c|-d] [-f] [-n initial_sequence_number]\n [-s seed] [username]\n", myname); 121 char *username; local 128 username = getlogin(); 129 pp = getpwnam(username); 130 if (username == NULL || pp == NULL || pp->pw_uid != ruid)
|
/freebsd-11-stable/contrib/subversion/subversion/libsvn_auth_kwallet/ |
H A D | kwallet.cpp | 197 const char *username, 249 QString::fromUtf8(username) + "@" + QString::fromUtf8(realmstring); 278 const char *username, 340 QString key = QString::fromUtf8(username) + "@" 192 kwallet_password_get(svn_boolean_t *done, const char **password, apr_hash_t *creds, const char *realmstring, const char *username, apr_hash_t *parameters, svn_boolean_t non_interactive, apr_pool_t *pool) argument 274 kwallet_password_set(svn_boolean_t *done, apr_hash_t *creds, const char *realmstring, const char *username, const char *password, apr_hash_t *parameters, svn_boolean_t non_interactive, apr_pool_t *pool) argument
|
/freebsd-11-stable/contrib/subversion/subversion/include/ |
H A D | svn_auth.h | 45 * return a specific set of credentials. (e.g. username/password, 59 * username/password provider that looks in disk store, then register 60 * a username/password provider that prompts the user.) 174 /** Simple username/password pair credential kind. 193 const char *username; 211 #define SVN_AUTH_CRED_USERNAME "svn.username" 217 const char *username; 219 * GUI prompt implementation with a remember username checkbox shall set 350 * example, if authentication requires a username and password, a 352 * username an 192 const char *username; member in struct:svn_auth_cred_simple_t 216 const char *username; member in struct:svn_auth_cred_username_t [all...] |
/freebsd-11-stable/contrib/amd/hlfsd/ |
H A D | stubs.c | 283 untab[idx].username, 287 dlog("nfs_lookup: successful lookup for uid=%ld, gid=%ld: username=%s", 288 (long) uid, (long) gid, untab[idx].username); 306 char *username; local 337 username = (char *) &argp->fh_data[sizeof(int)]; 338 if (!(res.rlr_u.rlr_data_u = mailbox(userid, username)))
|
/freebsd-11-stable/usr.bin/ipcs/ |
H A D | ipcs.c | 58 uid_t user2uid(char *username); 535 user2uid(char *username) argument 541 uid = strtoul(username, &r, 0); 542 if (!*r && r != username) 544 if ((pwd = getpwnam(username)) == NULL)
|
/freebsd-11-stable/contrib/subversion/subversion/libsvn_subr/ |
H A D | prompt.c | 615 const char *username, 625 if (username) 626 ret->username = apr_pstrdup(pool, username); 628 SVN_ERR(prompt(&(ret->username), _("Username: "), FALSE, pb, pool)); 630 pass_prompt = apr_psprintf(pool, _("Password for '%s': "), ret->username); 651 SVN_ERR(prompt(&(ret->username), _("Username: "), FALSE, pb, pool)); 609 svn_cmdline_auth_simple_prompt(svn_auth_cred_simple_t **cred_p, void *baton, const char *realm, const char *username, svn_boolean_t may_save, apr_pool_t *pool) argument
|
/freebsd-11-stable/contrib/libpcap/rpcapd/ |
H A D | daemon.c | 122 static int daemon_AuthUserPwd(char *username, char *password, char *errbuf); 1007 char *username, *passwd; local 1011 username = (char *) malloc (usernamelen + 1); 1012 if (username == NULL) 1018 status = rpcapd_recv(pars->sockctrl, username, usernamelen, &plen, errmsgbuf); 1021 free(username); 1026 free(username); 1029 username[usernamelen] = '\0'; 1037 free(username); 1043 free(username); 1160 daemon_AuthUserPwd(char *username, char *password, char *errbuf) argument [all...] |
/freebsd-11-stable/crypto/openssh/ |
H A D | auth2-pubkey.c | 644 char *tmp, *username = NULL, *command = NULL, **av = NULL; local 664 username = percent_expand(options.authorized_principals_command_user, 666 pw = getpwnam(username); 669 username, strerror(errno)); 752 free(username); 828 * their username in the certificate principals list. 902 * against the username. 975 char *username = NULL, *key_fp = NULL, *keytext = NULL; local 993 username = percent_expand(options.authorized_keys_command_user, 995 pw = getpwnam(username); [all...] |
/freebsd-11-stable/contrib/bsnmp/snmp_usm/ |
H A D | usm_snmp.c | 501 char username[SNMP_ADM_STR32_SIZ]; local 504 if (usm_user_index_decode(oid, sub, engineid, &enginelen, username) < 0) 507 return (usm_find_user(engineid, enginelen, username)); 514 char username[SNMP_ADM_STR32_SIZ]; local 521 if (usm_user_index_decode(oid, sub, engineid, &enginelen, username) < 0) 524 if ((uuser = usm_find_user(engineid, enginelen, username)) != NULL)
|
/freebsd-11-stable/usr.sbin/cron/lib/ |
H A D | entry.c | 60 "bad username", 229 * username/command. 298 /* ch is the first character of a command, or a username */ 302 char *username = cmd; /* temp buffer */ local 309 Debug(DPARS, ("load_entry()...about to parse username\n")) 310 ch = get_string(username, MAX_COMMAND, file, " \t"); 312 Debug(DPARS, ("load_entry()...got %s\n",username)) 319 if ((s = strrchr(username, '/')) != NULL) { 340 if ((s = strrchr(username, ':')) != NULL) { 348 pw = getpwnam(username); [all...] |
/freebsd-11-stable/contrib/amd/fsinfo/ |
H A D | fsinfo.h | 56 extern char *username;
|
/freebsd-11-stable/contrib/wpa/src/utils/ |
H A D | http_curl.c | 1349 const char *ca_fname, const char *username, 1361 "username=%s%s", address, ca_fname, username, extra); 1401 if (username) { 1403 curl_easy_setopt(curl, CURLOPT_USERNAME, username); 1412 const char *ca_fname, const char *username, 1421 clone_str(&ctx->svc_username, username); 1437 ctx->curl = setup_curl_post(ctx, ctx->svc_address, ca_fname, username, 1447 const char *ca_fname, const char *username, 1451 if (post_init_client(ctx, address, ca_fname, username, passwor 1348 setup_curl_post(struct http_ctx *ctx, const char *address, const char *ca_fname, const char *username, const char *password, const char *client_cert, const char *client_key) argument 1411 post_init_client(struct http_ctx *ctx, const char *address, const char *ca_fname, const char *username, const char *password, const char *client_cert, const char *client_key) argument 1446 soap_init_client(struct http_ctx *ctx, const char *address, const char *ca_fname, const char *username, const char *password, const char *client_cert, const char *client_key) argument 1469 char *username = NULL; local 1680 http_post(struct http_ctx *ctx, const char *url, const char *data, const char *content_type, const char *ext_hdr, const char *ca_fname, const char *username, const char *password, const char *client_cert, const char *client_key, size_t *resp_len) argument [all...] |